From patchwork Mon Apr 15 17:52:13 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tom Herbert X-Patchwork-Id: 1085852 Return-Path: X-Original-To: patchwork-incoming-netdev@ozlabs.org Delivered-To: patchwork-incoming-netdev@ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=vger.kernel.org (client-ip=209.132.180.67; helo=vger.kernel.org; envelope-from=netdev-owner@vger.kernel.org; receiver=) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=herbertland.com Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=herbertland-com.20150623.gappssmtp.com header.i=@herbertland-com.20150623.gappssmtp.com header.b="S7Hzl87F"; dkim-atps=neutral Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 44jbgm3sGfz9s9N for ; Tue, 16 Apr 2019 03:52:51 +1000 (AEST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727558AbfDORwt (ORCPT ); Mon, 15 Apr 2019 13:52:49 -0400 Received: from mail-pf1-f196.google.com ([209.85.210.196]:33137 "EHLO mail-pf1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726980AbfDORwt (ORCPT ); Mon, 15 Apr 2019 13:52:49 -0400 Received: by mail-pf1-f196.google.com with SMTP id h5so8997912pfo.0 for ; Mon, 15 Apr 2019 10:52:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id; bh=vJKD8GugISGvvjgzEN/G1/PUQCoVxBUU4RdM09E+WdU=; b=S7Hzl87FP3cVqp4YqnChbrghkC5TyMciqaCwQdYFnnocwe18VAheG4SZRj+Lht7M7d WuftCZpVpocdtTfFOH5pnf195er9/alpVo/W2WtOF+LZtfMrBgG5INTH2+lDanz+2yYh QsPAPrLjm7UU6Jcxyr9M2b55d6ivGGYFFSWyAPo8QodEYUEyaLV6NoIFEHx5hF4xlGS3 Nzy+2G2cRvRkCYpJ4CJdxQgGyl0fInne7vFVSLjE/zEmIfb/yd8DxYFXhLMXhJLrOwaz o96vzYlgAKWZ51CqTVsp8bIxLaCh6DlhAeqFj5NaZo0BSjOSBjG/TJ2A1FogOw+TJqiF Pheg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=vJKD8GugISGvvjgzEN/G1/PUQCoVxBUU4RdM09E+WdU=; b=oxbELTuOw28bU6pFcWXhtoRAb3NpOgXLDXzFR5n5DzlgAHvFb6N262hV9RmCc3XvTW OT754isb2EeaCb0uRmE7jOAK0Y7fh+DHdBwl/8ECBgFpgfKwXkJkbIGImHFnq1WPPYHD X1X2TApZ7Wh2gx/CVwLyW04OdLguf6YP18+nfR6MimqkptlfdaYJ60GeYnG33tru8cgK UvKo/cUSrrsb30juHp9pcnsgndwJmEwuJSh1Fw63a8rsipGtjrjhpTAbj7JhYkloDv2T zgXbAQaVZiUziewlkwrHXXGXoF9fJsUjBqcX6kT0WYYEwhuElrp0kuWKFNt1e4xDNipo T+xQ== X-Gm-Message-State: APjAAAWOYis/QP8aUUJGdsVEBCVUd6W4d0ipPHPBoct+NVuKChTaV1oL 6kN6LyOlas6MQZgtRiF3mQwj8N7MiS4= X-Google-Smtp-Source: APXvYqyVUP7rFeyq60dpRBUxXhufkI3uFrPv7CczDv7lD7c1adnGPxIMfnZHZc16s37w/PyMFSgyOQ== X-Received: by 2002:a63:2b03:: with SMTP id r3mr70628872pgr.105.1555350767643; Mon, 15 Apr 2019 10:52:47 -0700 (PDT) Received: from localhost.localdomain (c-73-223-249-119.hsd1.ca.comcast.net. [73.223.249.119]) by smtp.gmail.com with ESMTPSA id t24sm58751170pfe.110.2019.04.15.10.52.46 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 15 Apr 2019 10:52:46 -0700 (PDT) From: Tom Herbert X-Google-Original-From: Tom Herbert To: davem@davemloft.net, netdev@vger.kernel.org Cc: Tom Herbert Subject: [PATCH v3 net-next 0/7] exthdrs: Make ext. headers & options useful - Part I Date: Mon, 15 Apr 2019 10:52:13 -0700 Message-Id: <1555350740-23490-1-git-send-email-tom@quantonium.net> X-Mailer: git-send-email 2.7.4 Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org Extension headers are the mechanism of extensibility for the IPv6 protocol, however to date they have only seen limited deployment. The reasons for that are because intermediate devices don't handle them well, and there haven't really be any useful extension headers defined. In particular, Destination and Hop-by-Hop options have not been deployed to any extent. The landscape may be changing as there are now a number of serious efforts to define and deploy extension headers. In particular, a number of uses for Hop-by-Hop Options are currently being proposed, Some of these are from router vendors so there is hope that they might start start to fix their brokenness. These proposals include IOAM, Path MTU, Firewall and Service Tickets, SRv6, CRH, etc. Assuming that IPv6 extension headers gain traction, that leaves a noticeable gap in IPv4 support. IPv4 options have long been considered a non-starter for deployment. An alternative being proposed is to enable use of IPv6 options with IPv4 (draft-herbert-ipv4-eh-00). This series of patch sets endeavours to make extension headers and related options useful and easy to use. The following items will be addressed: - Reorganize extension header files - Allow registration of TLV handlers - Elaborate on the TLV tables to include more characteristics - Add a netlink interface to set TLV parameters (such as alignment requirements, authorization to send, etc.) - Enhance validation of TLVs being sent. Validation is strict (unless overridden by admin) following that sending clause of the robustness principle - Allow non-privileged users to set Hop-by-Hop and Destination Options if authorized by the admin - Add an API that allows individual Hop-by-Hop and Destination Options to be set or removed for a connected socket. The backend end enforces permissions on what TLVs may be set and merges set TLVs per following the rules in the TLV parameter table (for instance, TLV parameters include a preferred sending order that merging adheres to) - Add an infrastructure to allow Hop-by-Hop and Destination Options to be processed in the context of a connected socket - Support for some of the aforementioned options - Enable IPv4 extension headers ------ In this series: - Create exhdrs_options.c. Move options specific processing to this file from exthdrs.c (for RA, Jumbo, Calipso, and HAO) - Move generic functions exthdrs_core.c. - Allow modules to register TLV handlers for Destination and HBH options. - Add parameters block to TLV type entries that describe characteristics related to the TLV. For the most part, these encode rules about sending each TLV (TLV alignment requirements for instance). - Add a netlink interface to manage parameters in the TLV table. - Add validation of HBH and Destination Options that are set on a socket or in ancillary data in sendmsg. The validation applies the rules that are encoded in the TLV parameters. - TLV parameters includes permissions that may allow non-privileged users to set specific TLVs on a socket HBH options or Destination options. Strong validation can be enabled for this to constrain what the non-privileged user is able to do. v2: - Don't rename extension header files with IPv6 specific code before code for IPv4 extension headers is present - Added patches for creating TLV parameters and validation v3: - Fix kbuild errors. Ensure build and operation when IPv6 is disabled. Tested: Set Hop-by-Hop options on TCP/UDP socket and verified to be functional. Tom Herbert (7): exthdrs: Create exthdrs_options.c exthdrs: Move generic EH functions to exthdrs_core.c ipv6: Consolidate option cases in ip6_datagram_send_ctl exthdrs: Registration of TLV handlers and parameters exthdrs: Add TX parameters ip6tlvs: Add netlink interface ip6tlvs: Validation of TX Destination and Hop-by-Hop options include/net/ipv6.h | 127 ++++++ include/uapi/linux/in6.h | 49 ++ net/ipv6/Makefile | 2 +- net/ipv6/datagram.c | 89 ++-- net/ipv6/exthdrs.c | 388 ++-------------- net/ipv6/exthdrs_core.c | 1091 ++++++++++++++++++++++++++++++++++++++++++++ net/ipv6/exthdrs_options.c | 347 ++++++++++++++ net/ipv6/ipv6_sockglue.c | 43 +- 8 files changed, 1699 insertions(+), 437 deletions(-) create mode 100644 net/ipv6/exthdrs_options.c