datagram.c 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992
  1. /*
  2. * common UDP/RAW code
  3. * Linux INET6 implementation
  4. *
  5. * Authors:
  6. * Pedro Roque <roque@di.fc.ul.pt>
  7. *
  8. * This program is free software; you can redistribute it and/or
  9. * modify it under the terms of the GNU General Public License
  10. * as published by the Free Software Foundation; either version
  11. * 2 of the License, or (at your option) any later version.
  12. */
  13. #include <linux/capability.h>
  14. #include <linux/errno.h>
  15. #include <linux/types.h>
  16. #include <linux/kernel.h>
  17. #include <linux/interrupt.h>
  18. #include <linux/socket.h>
  19. #include <linux/sockios.h>
  20. #include <linux/in6.h>
  21. #include <linux/ipv6.h>
  22. #include <linux/route.h>
  23. #include <linux/slab.h>
  24. #include <linux/export.h>
  25. #include <net/ipv6.h>
  26. #include <net/ndisc.h>
  27. #include <net/addrconf.h>
  28. #include <net/transp_v6.h>
  29. #include <net/ip6_route.h>
  30. #include <net/tcp_states.h>
  31. #include <net/dsfield.h>
  32. #include <linux/errqueue.h>
  33. #include <asm/uaccess.h>
  34. static bool ipv6_mapped_addr_any(const struct in6_addr *a)
  35. {
  36. return ipv6_addr_v4mapped(a) && (a->s6_addr32[3] == 0);
  37. }
  38. static int __ip6_datagram_connect(struct sock *sk, struct sockaddr *uaddr, int addr_len)
  39. {
  40. struct sockaddr_in6 *usin = (struct sockaddr_in6 *) uaddr;
  41. struct inet_sock *inet = inet_sk(sk);
  42. struct ipv6_pinfo *np = inet6_sk(sk);
  43. struct in6_addr *daddr, *final_p, final;
  44. struct dst_entry *dst;
  45. struct flowi6 fl6;
  46. struct ip6_flowlabel *flowlabel = NULL;
  47. struct ipv6_txoptions *opt;
  48. int addr_type;
  49. int err;
  50. if (usin->sin6_family == AF_INET) {
  51. if (__ipv6_only_sock(sk))
  52. return -EAFNOSUPPORT;
  53. err = __ip4_datagram_connect(sk, uaddr, addr_len);
  54. goto ipv4_connected;
  55. }
  56. if (addr_len < SIN6_LEN_RFC2133)
  57. return -EINVAL;
  58. if (usin->sin6_family != AF_INET6)
  59. return -EAFNOSUPPORT;
  60. memset(&fl6, 0, sizeof(fl6));
  61. if (np->sndflow) {
  62. fl6.flowlabel = usin->sin6_flowinfo&IPV6_FLOWINFO_MASK;
  63. if (fl6.flowlabel&IPV6_FLOWLABEL_MASK) {
  64. flowlabel = fl6_sock_lookup(sk, fl6.flowlabel);
  65. if (!flowlabel)
  66. return -EINVAL;
  67. }
  68. }
  69. if (ipv6_addr_any(&usin->sin6_addr)) {
  70. /*
  71. * connect to self
  72. */
  73. if (ipv6_addr_v4mapped(&sk->sk_v6_rcv_saddr))
  74. ipv6_addr_set_v4mapped(htonl(INADDR_LOOPBACK),
  75. &usin->sin6_addr);
  76. else
  77. usin->sin6_addr = in6addr_loopback;
  78. }
  79. addr_type = ipv6_addr_type(&usin->sin6_addr);
  80. daddr = &usin->sin6_addr;
  81. if (addr_type & IPV6_ADDR_MAPPED) {
  82. struct sockaddr_in sin;
  83. if (__ipv6_only_sock(sk)) {
  84. err = -ENETUNREACH;
  85. goto out;
  86. }
  87. sin.sin_family = AF_INET;
  88. sin.sin_addr.s_addr = daddr->s6_addr32[3];
  89. sin.sin_port = usin->sin6_port;
  90. err = __ip4_datagram_connect(sk,
  91. (struct sockaddr *) &sin,
  92. sizeof(sin));
  93. ipv4_connected:
  94. if (err)
  95. goto out;
  96. ipv6_addr_set_v4mapped(inet->inet_daddr, &sk->sk_v6_daddr);
  97. if (ipv6_addr_any(&np->saddr) ||
  98. ipv6_mapped_addr_any(&np->saddr))
  99. ipv6_addr_set_v4mapped(inet->inet_saddr, &np->saddr);
  100. if (ipv6_addr_any(&sk->sk_v6_rcv_saddr) ||
  101. ipv6_mapped_addr_any(&sk->sk_v6_rcv_saddr)) {
  102. ipv6_addr_set_v4mapped(inet->inet_rcv_saddr,
  103. &sk->sk_v6_rcv_saddr);
  104. if (sk->sk_prot->rehash)
  105. sk->sk_prot->rehash(sk);
  106. }
  107. goto out;
  108. }
  109. if (__ipv6_addr_needs_scope_id(addr_type)) {
  110. if (addr_len >= sizeof(struct sockaddr_in6) &&
  111. usin->sin6_scope_id) {
  112. if (sk->sk_bound_dev_if &&
  113. sk->sk_bound_dev_if != usin->sin6_scope_id) {
  114. err = -EINVAL;
  115. goto out;
  116. }
  117. sk->sk_bound_dev_if = usin->sin6_scope_id;
  118. }
  119. if (!sk->sk_bound_dev_if && (addr_type & IPV6_ADDR_MULTICAST))
  120. sk->sk_bound_dev_if = np->mcast_oif;
  121. /* Connect to link-local address requires an interface */
  122. if (!sk->sk_bound_dev_if) {
  123. err = -EINVAL;
  124. goto out;
  125. }
  126. }
  127. sk->sk_v6_daddr = *daddr;
  128. np->flow_label = fl6.flowlabel;
  129. inet->inet_dport = usin->sin6_port;
  130. /*
  131. * Check for a route to destination an obtain the
  132. * destination cache for it.
  133. */
  134. fl6.flowi6_proto = sk->sk_protocol;
  135. fl6.daddr = sk->sk_v6_daddr;
  136. fl6.saddr = np->saddr;
  137. fl6.flowi6_oif = sk->sk_bound_dev_if;
  138. fl6.flowi6_mark = sk->sk_mark;
  139. fl6.fl6_dport = inet->inet_dport;
  140. fl6.fl6_sport = inet->inet_sport;
  141. if (!fl6.flowi6_oif)
  142. fl6.flowi6_oif = np->sticky_pktinfo.ipi6_ifindex;
  143. if (!fl6.flowi6_oif && (addr_type&IPV6_ADDR_MULTICAST))
  144. fl6.flowi6_oif = np->mcast_oif;
  145. security_sk_classify_flow(sk, flowi6_to_flowi(&fl6));
  146. rcu_read_lock();
  147. opt = flowlabel ? flowlabel->opt : rcu_dereference(np->opt);
  148. final_p = fl6_update_dst(&fl6, opt, &final);
  149. rcu_read_unlock();
  150. dst = ip6_dst_lookup_flow(sk, &fl6, final_p);
  151. err = 0;
  152. if (IS_ERR(dst)) {
  153. err = PTR_ERR(dst);
  154. goto out;
  155. }
  156. /* source address lookup done in ip6_dst_lookup */
  157. if (ipv6_addr_any(&np->saddr))
  158. np->saddr = fl6.saddr;
  159. if (ipv6_addr_any(&sk->sk_v6_rcv_saddr)) {
  160. sk->sk_v6_rcv_saddr = fl6.saddr;
  161. inet->inet_rcv_saddr = LOOPBACK4_IPV6;
  162. if (sk->sk_prot->rehash)
  163. sk->sk_prot->rehash(sk);
  164. }
  165. ip6_dst_store(sk, dst,
  166. ipv6_addr_equal(&fl6.daddr, &sk->sk_v6_daddr) ?
  167. &sk->sk_v6_daddr : NULL,
  168. #ifdef CONFIG_IPV6_SUBTREES
  169. ipv6_addr_equal(&fl6.saddr, &np->saddr) ?
  170. &np->saddr :
  171. #endif
  172. NULL);
  173. sk->sk_state = TCP_ESTABLISHED;
  174. sk_set_txhash(sk);
  175. out:
  176. fl6_sock_release(flowlabel);
  177. return err;
  178. }
  179. int ip6_datagram_connect(struct sock *sk, struct sockaddr *uaddr, int addr_len)
  180. {
  181. int res;
  182. lock_sock(sk);
  183. res = __ip6_datagram_connect(sk, uaddr, addr_len);
  184. release_sock(sk);
  185. return res;
  186. }
  187. EXPORT_SYMBOL_GPL(ip6_datagram_connect);
  188. int ip6_datagram_connect_v6_only(struct sock *sk, struct sockaddr *uaddr,
  189. int addr_len)
  190. {
  191. DECLARE_SOCKADDR(struct sockaddr_in6 *, sin6, uaddr);
  192. if (sin6->sin6_family != AF_INET6)
  193. return -EAFNOSUPPORT;
  194. return ip6_datagram_connect(sk, uaddr, addr_len);
  195. }
  196. EXPORT_SYMBOL_GPL(ip6_datagram_connect_v6_only);
  197. void ipv6_icmp_error(struct sock *sk, struct sk_buff *skb, int err,
  198. __be16 port, u32 info, u8 *payload)
  199. {
  200. struct ipv6_pinfo *np = inet6_sk(sk);
  201. struct icmp6hdr *icmph = icmp6_hdr(skb);
  202. struct sock_exterr_skb *serr;
  203. if (!np->recverr)
  204. return;
  205. skb = skb_clone(skb, GFP_ATOMIC);
  206. if (!skb)
  207. return;
  208. skb->protocol = htons(ETH_P_IPV6);
  209. serr = SKB_EXT_ERR(skb);
  210. serr->ee.ee_errno = err;
  211. serr->ee.ee_origin = SO_EE_ORIGIN_ICMP6;
  212. serr->ee.ee_type = icmph->icmp6_type;
  213. serr->ee.ee_code = icmph->icmp6_code;
  214. serr->ee.ee_pad = 0;
  215. serr->ee.ee_info = info;
  216. serr->ee.ee_data = 0;
  217. serr->addr_offset = (u8 *)&(((struct ipv6hdr *)(icmph + 1))->daddr) -
  218. skb_network_header(skb);
  219. serr->port = port;
  220. __skb_pull(skb, payload - skb->data);
  221. skb_reset_transport_header(skb);
  222. if (sock_queue_err_skb(sk, skb))
  223. kfree_skb(skb);
  224. }
  225. void ipv6_local_error(struct sock *sk, int err, struct flowi6 *fl6, u32 info)
  226. {
  227. const struct ipv6_pinfo *np = inet6_sk(sk);
  228. struct sock_exterr_skb *serr;
  229. struct ipv6hdr *iph;
  230. struct sk_buff *skb;
  231. if (!np->recverr)
  232. return;
  233. skb = alloc_skb(sizeof(struct ipv6hdr), GFP_ATOMIC);
  234. if (!skb)
  235. return;
  236. skb->protocol = htons(ETH_P_IPV6);
  237. skb_put(skb, sizeof(struct ipv6hdr));
  238. skb_reset_network_header(skb);
  239. iph = ipv6_hdr(skb);
  240. iph->daddr = fl6->daddr;
  241. ip6_flow_hdr(iph, 0, 0);
  242. serr = SKB_EXT_ERR(skb);
  243. serr->ee.ee_errno = err;
  244. serr->ee.ee_origin = SO_EE_ORIGIN_LOCAL;
  245. serr->ee.ee_type = 0;
  246. serr->ee.ee_code = 0;
  247. serr->ee.ee_pad = 0;
  248. serr->ee.ee_info = info;
  249. serr->ee.ee_data = 0;
  250. serr->addr_offset = (u8 *)&iph->daddr - skb_network_header(skb);
  251. serr->port = fl6->fl6_dport;
  252. __skb_pull(skb, skb_tail_pointer(skb) - skb->data);
  253. skb_reset_transport_header(skb);
  254. if (sock_queue_err_skb(sk, skb))
  255. kfree_skb(skb);
  256. }
  257. void ipv6_local_rxpmtu(struct sock *sk, struct flowi6 *fl6, u32 mtu)
  258. {
  259. struct ipv6_pinfo *np = inet6_sk(sk);
  260. struct ipv6hdr *iph;
  261. struct sk_buff *skb;
  262. struct ip6_mtuinfo *mtu_info;
  263. if (!np->rxopt.bits.rxpmtu)
  264. return;
  265. skb = alloc_skb(sizeof(struct ipv6hdr), GFP_ATOMIC);
  266. if (!skb)
  267. return;
  268. skb_put(skb, sizeof(struct ipv6hdr));
  269. skb_reset_network_header(skb);
  270. iph = ipv6_hdr(skb);
  271. iph->daddr = fl6->daddr;
  272. mtu_info = IP6CBMTU(skb);
  273. mtu_info->ip6m_mtu = mtu;
  274. mtu_info->ip6m_addr.sin6_family = AF_INET6;
  275. mtu_info->ip6m_addr.sin6_port = 0;
  276. mtu_info->ip6m_addr.sin6_flowinfo = 0;
  277. mtu_info->ip6m_addr.sin6_scope_id = fl6->flowi6_oif;
  278. mtu_info->ip6m_addr.sin6_addr = ipv6_hdr(skb)->daddr;
  279. __skb_pull(skb, skb_tail_pointer(skb) - skb->data);
  280. skb_reset_transport_header(skb);
  281. skb = xchg(&np->rxpmtu, skb);
  282. kfree_skb(skb);
  283. }
  284. /* For some errors we have valid addr_offset even with zero payload and
  285. * zero port. Also, addr_offset should be supported if port is set.
  286. */
  287. static inline bool ipv6_datagram_support_addr(struct sock_exterr_skb *serr)
  288. {
  289. return serr->ee.ee_origin == SO_EE_ORIGIN_ICMP6 ||
  290. serr->ee.ee_origin == SO_EE_ORIGIN_ICMP ||
  291. serr->ee.ee_origin == SO_EE_ORIGIN_LOCAL || serr->port;
  292. }
  293. /* IPv6 supports cmsg on all origins aside from SO_EE_ORIGIN_LOCAL.
  294. *
  295. * At one point, excluding local errors was a quick test to identify icmp/icmp6
  296. * errors. This is no longer true, but the test remained, so the v6 stack,
  297. * unlike v4, also honors cmsg requests on all wifi and timestamp errors.
  298. *
  299. * Timestamp code paths do not initialize the fields expected by cmsg:
  300. * the PKTINFO fields in skb->cb[]. Fill those in here.
  301. */
  302. static bool ip6_datagram_support_cmsg(struct sk_buff *skb,
  303. struct sock_exterr_skb *serr)
  304. {
  305. if (serr->ee.ee_origin == SO_EE_ORIGIN_ICMP ||
  306. serr->ee.ee_origin == SO_EE_ORIGIN_ICMP6)
  307. return true;
  308. if (serr->ee.ee_origin == SO_EE_ORIGIN_LOCAL)
  309. return false;
  310. if (!skb->dev)
  311. return false;
  312. if (skb->protocol == htons(ETH_P_IPV6))
  313. IP6CB(skb)->iif = skb->dev->ifindex;
  314. else
  315. PKTINFO_SKB_CB(skb)->ipi_ifindex = skb->dev->ifindex;
  316. return true;
  317. }
  318. /*
  319. * Handle MSG_ERRQUEUE
  320. */
  321. int ipv6_recv_error(struct sock *sk, struct msghdr *msg, int len, int *addr_len)
  322. {
  323. struct ipv6_pinfo *np = inet6_sk(sk);
  324. struct sock_exterr_skb *serr;
  325. struct sk_buff *skb;
  326. DECLARE_SOCKADDR(struct sockaddr_in6 *, sin, msg->msg_name);
  327. struct {
  328. struct sock_extended_err ee;
  329. struct sockaddr_in6 offender;
  330. } errhdr;
  331. int err;
  332. int copied;
  333. err = -EAGAIN;
  334. skb = sock_dequeue_err_skb(sk);
  335. if (!skb)
  336. goto out;
  337. copied = skb->len;
  338. if (copied > len) {
  339. msg->msg_flags |= MSG_TRUNC;
  340. copied = len;
  341. }
  342. err = skb_copy_datagram_msg(skb, 0, msg, copied);
  343. if (err)
  344. goto out_free_skb;
  345. sock_recv_timestamp(msg, sk, skb);
  346. serr = SKB_EXT_ERR(skb);
  347. if (sin && ipv6_datagram_support_addr(serr)) {
  348. const unsigned char *nh = skb_network_header(skb);
  349. sin->sin6_family = AF_INET6;
  350. sin->sin6_flowinfo = 0;
  351. sin->sin6_port = serr->port;
  352. if (skb->protocol == htons(ETH_P_IPV6)) {
  353. const struct ipv6hdr *ip6h = container_of((struct in6_addr *)(nh + serr->addr_offset),
  354. struct ipv6hdr, daddr);
  355. sin->sin6_addr = ip6h->daddr;
  356. if (np->sndflow)
  357. sin->sin6_flowinfo = ip6_flowinfo(ip6h);
  358. sin->sin6_scope_id =
  359. ipv6_iface_scope_id(&sin->sin6_addr,
  360. IP6CB(skb)->iif);
  361. } else {
  362. ipv6_addr_set_v4mapped(*(__be32 *)(nh + serr->addr_offset),
  363. &sin->sin6_addr);
  364. sin->sin6_scope_id = 0;
  365. }
  366. *addr_len = sizeof(*sin);
  367. }
  368. memcpy(&errhdr.ee, &serr->ee, sizeof(struct sock_extended_err));
  369. sin = &errhdr.offender;
  370. memset(sin, 0, sizeof(*sin));
  371. if (ip6_datagram_support_cmsg(skb, serr)) {
  372. sin->sin6_family = AF_INET6;
  373. if (np->rxopt.all)
  374. ip6_datagram_recv_common_ctl(sk, msg, skb);
  375. if (skb->protocol == htons(ETH_P_IPV6)) {
  376. sin->sin6_addr = ipv6_hdr(skb)->saddr;
  377. if (np->rxopt.all)
  378. ip6_datagram_recv_specific_ctl(sk, msg, skb);
  379. sin->sin6_scope_id =
  380. ipv6_iface_scope_id(&sin->sin6_addr,
  381. IP6CB(skb)->iif);
  382. } else {
  383. ipv6_addr_set_v4mapped(ip_hdr(skb)->saddr,
  384. &sin->sin6_addr);
  385. if (inet_sk(sk)->cmsg_flags)
  386. ip_cmsg_recv(msg, skb);
  387. }
  388. }
  389. put_cmsg(msg, SOL_IPV6, IPV6_RECVERR, sizeof(errhdr), &errhdr);
  390. /* Now we could try to dump offended packet options */
  391. msg->msg_flags |= MSG_ERRQUEUE;
  392. err = copied;
  393. out_free_skb:
  394. kfree_skb(skb);
  395. out:
  396. return err;
  397. }
  398. EXPORT_SYMBOL_GPL(ipv6_recv_error);
  399. /*
  400. * Handle IPV6_RECVPATHMTU
  401. */
  402. int ipv6_recv_rxpmtu(struct sock *sk, struct msghdr *msg, int len,
  403. int *addr_len)
  404. {
  405. struct ipv6_pinfo *np = inet6_sk(sk);
  406. struct sk_buff *skb;
  407. struct ip6_mtuinfo mtu_info;
  408. DECLARE_SOCKADDR(struct sockaddr_in6 *, sin, msg->msg_name);
  409. int err;
  410. int copied;
  411. err = -EAGAIN;
  412. skb = xchg(&np->rxpmtu, NULL);
  413. if (!skb)
  414. goto out;
  415. copied = skb->len;
  416. if (copied > len) {
  417. msg->msg_flags |= MSG_TRUNC;
  418. copied = len;
  419. }
  420. err = skb_copy_datagram_msg(skb, 0, msg, copied);
  421. if (err)
  422. goto out_free_skb;
  423. sock_recv_timestamp(msg, sk, skb);
  424. memcpy(&mtu_info, IP6CBMTU(skb), sizeof(mtu_info));
  425. if (sin) {
  426. sin->sin6_family = AF_INET6;
  427. sin->sin6_flowinfo = 0;
  428. sin->sin6_port = 0;
  429. sin->sin6_scope_id = mtu_info.ip6m_addr.sin6_scope_id;
  430. sin->sin6_addr = mtu_info.ip6m_addr.sin6_addr;
  431. *addr_len = sizeof(*sin);
  432. }
  433. put_cmsg(msg, SOL_IPV6, IPV6_PATHMTU, sizeof(mtu_info), &mtu_info);
  434. err = copied;
  435. out_free_skb:
  436. kfree_skb(skb);
  437. out:
  438. return err;
  439. }
  440. void ip6_datagram_recv_common_ctl(struct sock *sk, struct msghdr *msg,
  441. struct sk_buff *skb)
  442. {
  443. struct ipv6_pinfo *np = inet6_sk(sk);
  444. bool is_ipv6 = skb->protocol == htons(ETH_P_IPV6);
  445. if (np->rxopt.bits.rxinfo) {
  446. struct in6_pktinfo src_info;
  447. if (is_ipv6) {
  448. src_info.ipi6_ifindex = IP6CB(skb)->iif;
  449. src_info.ipi6_addr = ipv6_hdr(skb)->daddr;
  450. } else {
  451. src_info.ipi6_ifindex =
  452. PKTINFO_SKB_CB(skb)->ipi_ifindex;
  453. ipv6_addr_set_v4mapped(ip_hdr(skb)->daddr,
  454. &src_info.ipi6_addr);
  455. }
  456. if (src_info.ipi6_ifindex >= 0)
  457. put_cmsg(msg, SOL_IPV6, IPV6_PKTINFO,
  458. sizeof(src_info), &src_info);
  459. }
  460. }
  461. void ip6_datagram_recv_specific_ctl(struct sock *sk, struct msghdr *msg,
  462. struct sk_buff *skb)
  463. {
  464. struct ipv6_pinfo *np = inet6_sk(sk);
  465. struct inet6_skb_parm *opt = IP6CB(skb);
  466. unsigned char *nh = skb_network_header(skb);
  467. if (np->rxopt.bits.rxhlim) {
  468. int hlim = ipv6_hdr(skb)->hop_limit;
  469. put_cmsg(msg, SOL_IPV6, IPV6_HOPLIMIT, sizeof(hlim), &hlim);
  470. }
  471. if (np->rxopt.bits.rxtclass) {
  472. int tclass = ipv6_get_dsfield(ipv6_hdr(skb));
  473. put_cmsg(msg, SOL_IPV6, IPV6_TCLASS, sizeof(tclass), &tclass);
  474. }
  475. if (np->rxopt.bits.rxflow) {
  476. __be32 flowinfo = ip6_flowinfo((struct ipv6hdr *)nh);
  477. if (flowinfo)
  478. put_cmsg(msg, SOL_IPV6, IPV6_FLOWINFO, sizeof(flowinfo), &flowinfo);
  479. }
  480. /* HbH is allowed only once */
  481. if (np->rxopt.bits.hopopts && (opt->flags & IP6SKB_HOPBYHOP)) {
  482. u8 *ptr = nh + sizeof(struct ipv6hdr);
  483. put_cmsg(msg, SOL_IPV6, IPV6_HOPOPTS, (ptr[1]+1)<<3, ptr);
  484. }
  485. if (opt->lastopt &&
  486. (np->rxopt.bits.dstopts || np->rxopt.bits.srcrt)) {
  487. /*
  488. * Silly enough, but we need to reparse in order to
  489. * report extension headers (except for HbH)
  490. * in order.
  491. *
  492. * Also note that IPV6_RECVRTHDRDSTOPTS is NOT
  493. * (and WILL NOT be) defined because
  494. * IPV6_RECVDSTOPTS is more generic. --yoshfuji
  495. */
  496. unsigned int off = sizeof(struct ipv6hdr);
  497. u8 nexthdr = ipv6_hdr(skb)->nexthdr;
  498. while (off <= opt->lastopt) {
  499. unsigned int len;
  500. u8 *ptr = nh + off;
  501. switch (nexthdr) {
  502. case IPPROTO_DSTOPTS:
  503. nexthdr = ptr[0];
  504. len = (ptr[1] + 1) << 3;
  505. if (np->rxopt.bits.dstopts)
  506. put_cmsg(msg, SOL_IPV6, IPV6_DSTOPTS, len, ptr);
  507. break;
  508. case IPPROTO_ROUTING:
  509. nexthdr = ptr[0];
  510. len = (ptr[1] + 1) << 3;
  511. if (np->rxopt.bits.srcrt)
  512. put_cmsg(msg, SOL_IPV6, IPV6_RTHDR, len, ptr);
  513. break;
  514. case IPPROTO_AH:
  515. nexthdr = ptr[0];
  516. len = (ptr[1] + 2) << 2;
  517. break;
  518. default:
  519. nexthdr = ptr[0];
  520. len = (ptr[1] + 1) << 3;
  521. break;
  522. }
  523. off += len;
  524. }
  525. }
  526. /* socket options in old style */
  527. if (np->rxopt.bits.rxoinfo) {
  528. struct in6_pktinfo src_info;
  529. src_info.ipi6_ifindex = opt->iif;
  530. src_info.ipi6_addr = ipv6_hdr(skb)->daddr;
  531. put_cmsg(msg, SOL_IPV6, IPV6_2292PKTINFO, sizeof(src_info), &src_info);
  532. }
  533. if (np->rxopt.bits.rxohlim) {
  534. int hlim = ipv6_hdr(skb)->hop_limit;
  535. put_cmsg(msg, SOL_IPV6, IPV6_2292HOPLIMIT, sizeof(hlim), &hlim);
  536. }
  537. if (np->rxopt.bits.ohopopts && (opt->flags & IP6SKB_HOPBYHOP)) {
  538. u8 *ptr = nh + sizeof(struct ipv6hdr);
  539. put_cmsg(msg, SOL_IPV6, IPV6_2292HOPOPTS, (ptr[1]+1)<<3, ptr);
  540. }
  541. if (np->rxopt.bits.odstopts && opt->dst0) {
  542. u8 *ptr = nh + opt->dst0;
  543. put_cmsg(msg, SOL_IPV6, IPV6_2292DSTOPTS, (ptr[1]+1)<<3, ptr);
  544. }
  545. if (np->rxopt.bits.osrcrt && opt->srcrt) {
  546. struct ipv6_rt_hdr *rthdr = (struct ipv6_rt_hdr *)(nh + opt->srcrt);
  547. put_cmsg(msg, SOL_IPV6, IPV6_2292RTHDR, (rthdr->hdrlen+1) << 3, rthdr);
  548. }
  549. if (np->rxopt.bits.odstopts && opt->dst1) {
  550. u8 *ptr = nh + opt->dst1;
  551. put_cmsg(msg, SOL_IPV6, IPV6_2292DSTOPTS, (ptr[1]+1)<<3, ptr);
  552. }
  553. if (np->rxopt.bits.rxorigdstaddr) {
  554. struct sockaddr_in6 sin6;
  555. __be16 _ports[2], *ports;
  556. ports = skb_header_pointer(skb, skb_transport_offset(skb),
  557. sizeof(_ports), &_ports);
  558. if (ports) {
  559. /* All current transport protocols have the port numbers in the
  560. * first four bytes of the transport header and this function is
  561. * written with this assumption in mind.
  562. */
  563. sin6.sin6_family = AF_INET6;
  564. sin6.sin6_addr = ipv6_hdr(skb)->daddr;
  565. sin6.sin6_port = ports[1];
  566. sin6.sin6_flowinfo = 0;
  567. sin6.sin6_scope_id =
  568. ipv6_iface_scope_id(&ipv6_hdr(skb)->daddr,
  569. opt->iif);
  570. put_cmsg(msg, SOL_IPV6, IPV6_ORIGDSTADDR, sizeof(sin6), &sin6);
  571. }
  572. }
  573. }
  574. void ip6_datagram_recv_ctl(struct sock *sk, struct msghdr *msg,
  575. struct sk_buff *skb)
  576. {
  577. ip6_datagram_recv_common_ctl(sk, msg, skb);
  578. ip6_datagram_recv_specific_ctl(sk, msg, skb);
  579. }
  580. EXPORT_SYMBOL_GPL(ip6_datagram_recv_ctl);
  581. int ip6_datagram_send_ctl(struct net *net, struct sock *sk,
  582. struct msghdr *msg, struct flowi6 *fl6,
  583. struct ipv6_txoptions *opt,
  584. int *hlimit, int *tclass, int *dontfrag)
  585. {
  586. struct in6_pktinfo *src_info;
  587. struct cmsghdr *cmsg;
  588. struct ipv6_rt_hdr *rthdr;
  589. struct ipv6_opt_hdr *hdr;
  590. int len;
  591. int err = 0;
  592. for_each_cmsghdr(cmsg, msg) {
  593. int addr_type;
  594. if (!CMSG_OK(msg, cmsg)) {
  595. err = -EINVAL;
  596. goto exit_f;
  597. }
  598. if (cmsg->cmsg_level != SOL_IPV6)
  599. continue;
  600. switch (cmsg->cmsg_type) {
  601. case IPV6_PKTINFO:
  602. case IPV6_2292PKTINFO:
  603. {
  604. struct net_device *dev = NULL;
  605. if (cmsg->cmsg_len < CMSG_LEN(sizeof(struct in6_pktinfo))) {
  606. err = -EINVAL;
  607. goto exit_f;
  608. }
  609. src_info = (struct in6_pktinfo *)CMSG_DATA(cmsg);
  610. if (src_info->ipi6_ifindex) {
  611. if (fl6->flowi6_oif &&
  612. src_info->ipi6_ifindex != fl6->flowi6_oif)
  613. return -EINVAL;
  614. fl6->flowi6_oif = src_info->ipi6_ifindex;
  615. }
  616. addr_type = __ipv6_addr_type(&src_info->ipi6_addr);
  617. rcu_read_lock();
  618. if (fl6->flowi6_oif) {
  619. dev = dev_get_by_index_rcu(net, fl6->flowi6_oif);
  620. if (!dev) {
  621. rcu_read_unlock();
  622. return -ENODEV;
  623. }
  624. } else if (addr_type & IPV6_ADDR_LINKLOCAL) {
  625. rcu_read_unlock();
  626. return -EINVAL;
  627. }
  628. if (addr_type != IPV6_ADDR_ANY) {
  629. int strict = __ipv6_addr_src_scope(addr_type) <= IPV6_ADDR_SCOPE_LINKLOCAL;
  630. if (!(inet_sk(sk)->freebind || inet_sk(sk)->transparent) &&
  631. !ipv6_chk_addr(net, &src_info->ipi6_addr,
  632. strict ? dev : NULL, 0) &&
  633. !ipv6_chk_acast_addr_src(net, dev,
  634. &src_info->ipi6_addr))
  635. err = -EINVAL;
  636. else
  637. fl6->saddr = src_info->ipi6_addr;
  638. }
  639. rcu_read_unlock();
  640. if (err)
  641. goto exit_f;
  642. break;
  643. }
  644. case IPV6_FLOWINFO:
  645. if (cmsg->cmsg_len < CMSG_LEN(4)) {
  646. err = -EINVAL;
  647. goto exit_f;
  648. }
  649. if (fl6->flowlabel&IPV6_FLOWINFO_MASK) {
  650. if ((fl6->flowlabel^*(__be32 *)CMSG_DATA(cmsg))&~IPV6_FLOWINFO_MASK) {
  651. err = -EINVAL;
  652. goto exit_f;
  653. }
  654. }
  655. fl6->flowlabel = IPV6_FLOWINFO_MASK & *(__be32 *)CMSG_DATA(cmsg);
  656. break;
  657. case IPV6_2292HOPOPTS:
  658. case IPV6_HOPOPTS:
  659. if (opt->hopopt || cmsg->cmsg_len < CMSG_LEN(sizeof(struct ipv6_opt_hdr))) {
  660. err = -EINVAL;
  661. goto exit_f;
  662. }
  663. hdr = (struct ipv6_opt_hdr *)CMSG_DATA(cmsg);
  664. len = ((hdr->hdrlen + 1) << 3);
  665. if (cmsg->cmsg_len < CMSG_LEN(len)) {
  666. err = -EINVAL;
  667. goto exit_f;
  668. }
  669. if (!ns_capable(net->user_ns, CAP_NET_RAW)) {
  670. err = -EPERM;
  671. goto exit_f;
  672. }
  673. opt->opt_nflen += len;
  674. opt->hopopt = hdr;
  675. break;
  676. case IPV6_2292DSTOPTS:
  677. if (cmsg->cmsg_len < CMSG_LEN(sizeof(struct ipv6_opt_hdr))) {
  678. err = -EINVAL;
  679. goto exit_f;
  680. }
  681. hdr = (struct ipv6_opt_hdr *)CMSG_DATA(cmsg);
  682. len = ((hdr->hdrlen + 1) << 3);
  683. if (cmsg->cmsg_len < CMSG_LEN(len)) {
  684. err = -EINVAL;
  685. goto exit_f;
  686. }
  687. if (!ns_capable(net->user_ns, CAP_NET_RAW)) {
  688. err = -EPERM;
  689. goto exit_f;
  690. }
  691. if (opt->dst1opt) {
  692. err = -EINVAL;
  693. goto exit_f;
  694. }
  695. opt->opt_flen += len;
  696. opt->dst1opt = hdr;
  697. break;
  698. case IPV6_DSTOPTS:
  699. case IPV6_RTHDRDSTOPTS:
  700. if (cmsg->cmsg_len < CMSG_LEN(sizeof(struct ipv6_opt_hdr))) {
  701. err = -EINVAL;
  702. goto exit_f;
  703. }
  704. hdr = (struct ipv6_opt_hdr *)CMSG_DATA(cmsg);
  705. len = ((hdr->hdrlen + 1) << 3);
  706. if (cmsg->cmsg_len < CMSG_LEN(len)) {
  707. err = -EINVAL;
  708. goto exit_f;
  709. }
  710. if (!ns_capable(net->user_ns, CAP_NET_RAW)) {
  711. err = -EPERM;
  712. goto exit_f;
  713. }
  714. if (cmsg->cmsg_type == IPV6_DSTOPTS) {
  715. opt->opt_flen += len;
  716. opt->dst1opt = hdr;
  717. } else {
  718. opt->opt_nflen += len;
  719. opt->dst0opt = hdr;
  720. }
  721. break;
  722. case IPV6_2292RTHDR:
  723. case IPV6_RTHDR:
  724. if (cmsg->cmsg_len < CMSG_LEN(sizeof(struct ipv6_rt_hdr))) {
  725. err = -EINVAL;
  726. goto exit_f;
  727. }
  728. rthdr = (struct ipv6_rt_hdr *)CMSG_DATA(cmsg);
  729. switch (rthdr->type) {
  730. #if IS_ENABLED(CONFIG_IPV6_MIP6)
  731. case IPV6_SRCRT_TYPE_2:
  732. if (rthdr->hdrlen != 2 ||
  733. rthdr->segments_left != 1) {
  734. err = -EINVAL;
  735. goto exit_f;
  736. }
  737. break;
  738. #endif
  739. default:
  740. err = -EINVAL;
  741. goto exit_f;
  742. }
  743. len = ((rthdr->hdrlen + 1) << 3);
  744. if (cmsg->cmsg_len < CMSG_LEN(len)) {
  745. err = -EINVAL;
  746. goto exit_f;
  747. }
  748. /* segments left must also match */
  749. if ((rthdr->hdrlen >> 1) != rthdr->segments_left) {
  750. err = -EINVAL;
  751. goto exit_f;
  752. }
  753. opt->opt_nflen += len;
  754. opt->srcrt = rthdr;
  755. if (cmsg->cmsg_type == IPV6_2292RTHDR && opt->dst1opt) {
  756. int dsthdrlen = ((opt->dst1opt->hdrlen+1)<<3);
  757. opt->opt_nflen += dsthdrlen;
  758. opt->dst0opt = opt->dst1opt;
  759. opt->dst1opt = NULL;
  760. opt->opt_flen -= dsthdrlen;
  761. }
  762. break;
  763. case IPV6_2292HOPLIMIT:
  764. case IPV6_HOPLIMIT:
  765. if (cmsg->cmsg_len != CMSG_LEN(sizeof(int))) {
  766. err = -EINVAL;
  767. goto exit_f;
  768. }
  769. *hlimit = *(int *)CMSG_DATA(cmsg);
  770. if (*hlimit < -1 || *hlimit > 0xff) {
  771. err = -EINVAL;
  772. goto exit_f;
  773. }
  774. break;
  775. case IPV6_TCLASS:
  776. {
  777. int tc;
  778. err = -EINVAL;
  779. if (cmsg->cmsg_len != CMSG_LEN(sizeof(int)))
  780. goto exit_f;
  781. tc = *(int *)CMSG_DATA(cmsg);
  782. if (tc < -1 || tc > 0xff)
  783. goto exit_f;
  784. err = 0;
  785. *tclass = tc;
  786. break;
  787. }
  788. case IPV6_DONTFRAG:
  789. {
  790. int df;
  791. err = -EINVAL;
  792. if (cmsg->cmsg_len != CMSG_LEN(sizeof(int)))
  793. goto exit_f;
  794. df = *(int *)CMSG_DATA(cmsg);
  795. if (df < 0 || df > 1)
  796. goto exit_f;
  797. err = 0;
  798. *dontfrag = df;
  799. break;
  800. }
  801. default:
  802. net_dbg_ratelimited("invalid cmsg type: %d\n",
  803. cmsg->cmsg_type);
  804. err = -EINVAL;
  805. goto exit_f;
  806. }
  807. }
  808. exit_f:
  809. return err;
  810. }
  811. EXPORT_SYMBOL_GPL(ip6_datagram_send_ctl);
  812. void ip6_dgram_sock_seq_show(struct seq_file *seq, struct sock *sp,
  813. __u16 srcp, __u16 destp, int bucket)
  814. {
  815. const struct in6_addr *dest, *src;
  816. dest = &sp->sk_v6_daddr;
  817. src = &sp->sk_v6_rcv_saddr;
  818. seq_printf(seq,
  819. "%5d: %08X%08X%08X%08X:%04X %08X%08X%08X%08X:%04X "
  820. "%02X %08X:%08X %02X:%08lX %08X %5u %8d %lu %d %pK %d\n",
  821. bucket,
  822. src->s6_addr32[0], src->s6_addr32[1],
  823. src->s6_addr32[2], src->s6_addr32[3], srcp,
  824. dest->s6_addr32[0], dest->s6_addr32[1],
  825. dest->s6_addr32[2], dest->s6_addr32[3], destp,
  826. sp->sk_state,
  827. sk_wmem_alloc_get(sp),
  828. sk_rmem_alloc_get(sp),
  829. 0, 0L, 0,
  830. from_kuid_munged(seq_user_ns(seq), sock_i_uid(sp)),
  831. 0,
  832. sock_i_ino(sp),
  833. atomic_read(&sp->sk_refcnt), sp,
  834. atomic_read(&sp->sk_drops));
  835. }