/Linux-v5.15/net/ipv6/netfilter/ |
D | ip6t_srh.c | 27 struct ipv6_sr_hdr *srh; in srh_mt6() local 33 srh = skb_header_pointer(skb, srhoff, sizeof(_srh), &_srh); in srh_mt6() 34 if (!srh) in srh_mt6() 37 hdrlen = ipv6_optlen(srh); in srh_mt6() 41 if (srh->type != IPV6_SRCRT_TYPE_4) in srh_mt6() 44 if (srh->segments_left > srh->first_segment) in srh_mt6() 50 !(srh->nexthdr == srhinfo->next_hdr))) in srh_mt6() 56 !(srh->hdrlen == srhinfo->hdr_len))) in srh_mt6() 61 !(srh->hdrlen > srhinfo->hdr_len))) in srh_mt6() 66 !(srh->hdrlen < srhinfo->hdr_len))) in srh_mt6() [all …]
|
D | Kconfig | 176 tristate '"srh" Segment Routing header match support' 179 srh matching allows you to match packets based on the segment
|
/Linux-v5.15/tools/testing/selftests/bpf/progs/ |
D | test_lwt_seg6local.c | 56 struct ip6_srh_t *srh; in get_srh() local 77 srh = cursor_advance(cursor, sizeof(*srh)); in get_srh() 78 if ((void *)srh + sizeof(*srh) > data_end) in get_srh() 81 if (srh->type != 4) in get_srh() 84 return srh; in get_srh() 118 int is_valid_tlv_boundary(struct __sk_buff *skb, struct ip6_srh_t *srh, in is_valid_tlv_boundary() argument 126 srh_off = (char *)srh - (char *)(long)skb->data; in is_valid_tlv_boundary() 128 cur_off = srh_off + sizeof(*srh) + in is_valid_tlv_boundary() 129 sizeof(struct ip6_addr_t) * (srh->first_segment + 1); in is_valid_tlv_boundary() 141 if (cur_off >= srh_off + ((srh->hdrlen + 1) << 3)) in is_valid_tlv_boundary() [all …]
|
D | test_seg6_loop.c | 56 struct ip6_srh_t *srh; in get_srh() local 77 srh = cursor_advance(cursor, sizeof(*srh)); in get_srh() 78 if ((void *)srh + sizeof(*srh) > data_end) in get_srh() 81 if (srh->type != 4) in get_srh() 84 return srh; in get_srh() 118 struct ip6_srh_t *srh, in is_valid_tlv_boundary() argument 127 srh_off = (char *)srh - (char *)(long)skb->data; in is_valid_tlv_boundary() 129 cur_off = srh_off + sizeof(*srh) + in is_valid_tlv_boundary() 130 sizeof(struct ip6_addr_t) * (srh->first_segment + 1); in is_valid_tlv_boundary() 144 if (cur_off >= srh_off + ((srh->hdrlen + 1) << 3)) in is_valid_tlv_boundary() [all …]
|
/Linux-v5.15/net/ipv6/ |
D | rpl_iptunnel.c | 16 struct ipv6_rpl_sr_hdr srh[0]; member 39 static bool rpl_validate_srh(struct net *net, struct ipv6_rpl_sr_hdr *srh, in rpl_validate_srh() argument 44 if ((srh->hdrlen << 3) != seglen) in rpl_validate_srh() 48 if (!srh->segments_left || in rpl_validate_srh() 49 (srh->segments_left * sizeof(struct in6_addr)) != seglen) in rpl_validate_srh() 52 if (srh->cmpri || srh->cmpre) in rpl_validate_srh() 55 err = ipv6_chk_rpl_srh_loop(net, srh->rpl_segaddr, in rpl_validate_srh() 56 srh->segments_left); in rpl_validate_srh() 60 if (ipv6_addr_type(&srh->rpl_segaddr[srh->segments_left - 1]) & in rpl_validate_srh() 74 struct ipv6_rpl_sr_hdr *srh; in rpl_build_state() local [all …]
|
D | seg6_local.c | 128 struct ipv6_sr_hdr *srh; member 155 struct ipv6_sr_hdr *srh; in get_srh() local 161 if (!pskb_may_pull(skb, srhoff + sizeof(*srh))) in get_srh() 164 srh = (struct ipv6_sr_hdr *)(skb->data + srhoff); in get_srh() 166 len = (srh->hdrlen + 1) << 3; in get_srh() 174 srh = (struct ipv6_sr_hdr *)(skb->data + srhoff); in get_srh() 176 if (!seg6_validate_srh(srh, len, true)) in get_srh() 179 return srh; in get_srh() 184 struct ipv6_sr_hdr *srh; in get_and_validate_srh() local 186 srh = get_srh(skb, IP6_FH_F_SKIP_RH); in get_and_validate_srh() [all …]
|
D | seg6_hmac.c | 84 static struct sr6_tlv_hmac *seg6_get_tlv_hmac(struct ipv6_sr_hdr *srh) in seg6_get_tlv_hmac() argument 88 if (srh->hdrlen < (srh->first_segment + 1) * 2 + 5) in seg6_get_tlv_hmac() 91 if (!sr_has_hmac(srh)) in seg6_get_tlv_hmac() 95 ((char *)srh + ((srh->hdrlen + 1) << 3) - 40); in seg6_get_tlv_hmac() 242 struct ipv6_sr_hdr *srh; in seg6_hmac_validate_skb() local 247 srh = (struct ipv6_sr_hdr *)skb_transport_header(skb); in seg6_hmac_validate_skb() 249 tlv = seg6_get_tlv_hmac(srh); in seg6_hmac_validate_skb() 269 if (seg6_hmac_compute(hinfo, srh, &ipv6_hdr(skb)->saddr, hmac_output)) in seg6_hmac_validate_skb() 326 struct ipv6_sr_hdr *srh) in seg6_push_hmac() argument 332 tlv = seg6_get_tlv_hmac(srh); in seg6_push_hmac() [all …]
|
D | seg6.c | 28 bool seg6_validate_srh(struct ipv6_sr_hdr *srh, int len, bool reduced) in seg6_validate_srh() argument 34 if (srh->type != IPV6_SRCRT_TYPE_4) in seg6_validate_srh() 37 if (((srh->hdrlen + 1) << 3) != len) in seg6_validate_srh() 40 if (!reduced && srh->segments_left > srh->first_segment) { in seg6_validate_srh() 43 max_last_entry = (srh->hdrlen / 2) - 1; in seg6_validate_srh() 45 if (srh->first_segment > max_last_entry) in seg6_validate_srh() 48 if (srh->segments_left > srh->first_segment + 1) in seg6_validate_srh() 52 tlv_offset = sizeof(*srh) + ((srh->first_segment + 1) << 4); in seg6_validate_srh() 65 tlv = (struct sr6_tlv *)((unsigned char *)srh + tlv_offset); in seg6_validate_srh()
|
D | seg6_iptunnel.c | 45 return ((tuninfo->srh->hdrlen + 1) << 3) + head; in seg6_lwt_headroom() 255 err = seg6_do_srh_inline(skb, tinfo->srh); in seg6_do_srh() 271 err = seg6_do_srh_encap(skb, tinfo->srh, proto); in seg6_do_srh() 289 err = seg6_do_srh_encap(skb, tinfo->srh, IPPROTO_ETHERNET); in seg6_do_srh() 514 if (!seg6_validate_srh(tuninfo->srh, tuninfo_len - sizeof(*tuninfo), false)) in seg6_build_state()
|
D | exthdrs.c | 1396 struct ipv6_sr_hdr *srh = (struct ipv6_sr_hdr *)opt->srcrt; in fl6_update_dst() local 1398 fl6->daddr = srh->segments[srh->segments_left]; in fl6_update_dst()
|
D | ipv6_sockglue.c | 370 struct ipv6_sr_hdr *srh = in ipv6_set_opt_hdr() local 373 if (!seg6_validate_srh(srh, optlen, false)) in ipv6_set_opt_hdr()
|
/Linux-v5.15/include/uapi/linux/ |
D | rpl_iptunnel.h | 19 #define RPL_IPTUNNEL_SRH_SIZE(srh) (((srh)->hdrlen + 1) << 3) argument
|
D | seg6_iptunnel.h | 29 struct ipv6_sr_hdr srh[0]; member 32 #define SEG6_IPTUN_ENCAP_SIZE(x) ((sizeof(*x)) + (((x)->srh->hdrlen + 1) << 3))
|
D | seg6.h | 47 #define sr_has_hmac(srh) ((srh)->flags & SR6_FLAG1_HMAC) argument
|
/Linux-v5.15/tools/include/uapi/linux/ |
D | seg6.h | 47 #define sr_has_hmac(srh) ((srh)->flags & SR6_FLAG1_HMAC) argument
|
/Linux-v5.15/include/net/ |
D | seg6_local.h | 22 struct ipv6_sr_hdr *srh; member
|
D | seg6_hmac.h | 50 struct ipv6_sr_hdr *srh);
|
D | seg6.h | 60 extern bool seg6_validate_srh(struct ipv6_sr_hdr *srh, int len, bool reduced);
|
/Linux-v5.15/net/core/ |
D | filter.c | 5824 struct ipv6_sr_hdr *srh = (struct ipv6_sr_hdr *)hdr; in bpf_push_seg6_encap() local 5826 if (!seg6_validate_srh(srh, len, false)) in bpf_push_seg6_encap() 5834 err = seg6_do_srh_inline(skb, srh); in bpf_push_seg6_encap() 5839 err = seg6_do_srh_encap(skb, srh, IPPROTO_IPV6); in bpf_push_seg6_encap() 5921 struct ipv6_sr_hdr *srh = srh_state->srh; in BPF_CALL_4() local 5925 if (srh == NULL) in BPF_CALL_4() 5928 srh_tlvs = (void *)((char *)srh + ((srh->first_segment + 1) << 4)); in BPF_CALL_4() 5929 srh_end = (void *)((char *)srh + sizeof(*srh) + srh_state->hdrlen); in BPF_CALL_4() 5934 else if (ptr < (void *)&srh->flags || in BPF_CALL_4() 5935 ptr + len > (void *)&srh->segments) in BPF_CALL_4() [all …]
|
/Linux-v5.15/Documentation/ide/ |
D | ChangeLog.ide-cd.1994-2004 | 36 * Richard Hirst <srh@gpt.co.uk> for diagnosing this.
|