datagram.c 25 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044
  1. /*
  2. * common UDP/RAW code
  3. * Linux INET6 implementation
  4. *
  5. * Authors:
  6. * Pedro Roque <roque@di.fc.ul.pt>
  7. *
  8. * This program is free software; you can redistribute it and/or
  9. * modify it under the terms of the GNU General Public License
  10. * as published by the Free Software Foundation; either version
  11. * 2 of the License, or (at your option) any later version.
  12. */
  13. #include <linux/capability.h>
  14. #include <linux/errno.h>
  15. #include <linux/types.h>
  16. #include <linux/kernel.h>
  17. #include <linux/interrupt.h>
  18. #include <linux/socket.h>
  19. #include <linux/sockios.h>
  20. #include <linux/in6.h>
  21. #include <linux/ipv6.h>
  22. #include <linux/route.h>
  23. #include <linux/slab.h>
  24. #include <linux/export.h>
  25. #include <net/ipv6.h>
  26. #include <net/ndisc.h>
  27. #include <net/addrconf.h>
  28. #include <net/transp_v6.h>
  29. #include <net/ip6_route.h>
  30. #include <net/tcp_states.h>
  31. #include <net/dsfield.h>
  32. #include <linux/errqueue.h>
  33. #include <linux/uaccess.h>
  34. static bool ipv6_mapped_addr_any(const struct in6_addr *a)
  35. {
  36. return ipv6_addr_v4mapped(a) && (a->s6_addr32[3] == 0);
  37. }
  38. static void ip6_datagram_flow_key_init(struct flowi6 *fl6, struct sock *sk)
  39. {
  40. struct inet_sock *inet = inet_sk(sk);
  41. struct ipv6_pinfo *np = inet6_sk(sk);
  42. memset(fl6, 0, sizeof(*fl6));
  43. fl6->flowi6_proto = sk->sk_protocol;
  44. fl6->daddr = sk->sk_v6_daddr;
  45. fl6->saddr = np->saddr;
  46. fl6->flowi6_oif = sk->sk_bound_dev_if;
  47. fl6->flowi6_mark = sk->sk_mark;
  48. fl6->fl6_dport = inet->inet_dport;
  49. fl6->fl6_sport = inet->inet_sport;
  50. fl6->flowlabel = np->flow_label;
  51. fl6->flowi6_uid = sk->sk_uid;
  52. if (!fl6->flowi6_oif)
  53. fl6->flowi6_oif = np->sticky_pktinfo.ipi6_ifindex;
  54. if (!fl6->flowi6_oif && ipv6_addr_is_multicast(&fl6->daddr))
  55. fl6->flowi6_oif = np->mcast_oif;
  56. security_sk_classify_flow(sk, flowi6_to_flowi(fl6));
  57. }
  58. int ip6_datagram_dst_update(struct sock *sk, bool fix_sk_saddr)
  59. {
  60. struct ip6_flowlabel *flowlabel = NULL;
  61. struct in6_addr *final_p, final;
  62. struct ipv6_txoptions *opt;
  63. struct dst_entry *dst;
  64. struct inet_sock *inet = inet_sk(sk);
  65. struct ipv6_pinfo *np = inet6_sk(sk);
  66. struct flowi6 fl6;
  67. int err = 0;
  68. if (np->sndflow && (np->flow_label & IPV6_FLOWLABEL_MASK)) {
  69. flowlabel = fl6_sock_lookup(sk, np->flow_label);
  70. if (!flowlabel)
  71. return -EINVAL;
  72. }
  73. ip6_datagram_flow_key_init(&fl6, sk);
  74. rcu_read_lock();
  75. opt = flowlabel ? flowlabel->opt : rcu_dereference(np->opt);
  76. final_p = fl6_update_dst(&fl6, opt, &final);
  77. rcu_read_unlock();
  78. dst = ip6_dst_lookup_flow(sk, &fl6, final_p);
  79. if (IS_ERR(dst)) {
  80. err = PTR_ERR(dst);
  81. goto out;
  82. }
  83. if (fix_sk_saddr) {
  84. if (ipv6_addr_any(&np->saddr))
  85. np->saddr = fl6.saddr;
  86. if (ipv6_addr_any(&sk->sk_v6_rcv_saddr)) {
  87. sk->sk_v6_rcv_saddr = fl6.saddr;
  88. inet->inet_rcv_saddr = LOOPBACK4_IPV6;
  89. if (sk->sk_prot->rehash)
  90. sk->sk_prot->rehash(sk);
  91. }
  92. }
  93. ip6_dst_store(sk, dst,
  94. ipv6_addr_equal(&fl6.daddr, &sk->sk_v6_daddr) ?
  95. &sk->sk_v6_daddr : NULL,
  96. #ifdef CONFIG_IPV6_SUBTREES
  97. ipv6_addr_equal(&fl6.saddr, &np->saddr) ?
  98. &np->saddr :
  99. #endif
  100. NULL);
  101. out:
  102. fl6_sock_release(flowlabel);
  103. return err;
  104. }
  105. void ip6_datagram_release_cb(struct sock *sk)
  106. {
  107. struct dst_entry *dst;
  108. if (ipv6_addr_v4mapped(&sk->sk_v6_daddr))
  109. return;
  110. rcu_read_lock();
  111. dst = __sk_dst_get(sk);
  112. if (!dst || !dst->obsolete ||
  113. dst->ops->check(dst, inet6_sk(sk)->dst_cookie)) {
  114. rcu_read_unlock();
  115. return;
  116. }
  117. rcu_read_unlock();
  118. ip6_datagram_dst_update(sk, false);
  119. }
  120. EXPORT_SYMBOL_GPL(ip6_datagram_release_cb);
  121. int __ip6_datagram_connect(struct sock *sk, struct sockaddr *uaddr,
  122. int addr_len)
  123. {
  124. struct sockaddr_in6 *usin = (struct sockaddr_in6 *) uaddr;
  125. struct inet_sock *inet = inet_sk(sk);
  126. struct ipv6_pinfo *np = inet6_sk(sk);
  127. struct in6_addr *daddr;
  128. int addr_type;
  129. int err;
  130. __be32 fl6_flowlabel = 0;
  131. if (usin->sin6_family == AF_INET) {
  132. if (__ipv6_only_sock(sk))
  133. return -EAFNOSUPPORT;
  134. err = __ip4_datagram_connect(sk, uaddr, addr_len);
  135. goto ipv4_connected;
  136. }
  137. if (addr_len < SIN6_LEN_RFC2133)
  138. return -EINVAL;
  139. if (usin->sin6_family != AF_INET6)
  140. return -EAFNOSUPPORT;
  141. if (np->sndflow)
  142. fl6_flowlabel = usin->sin6_flowinfo & IPV6_FLOWINFO_MASK;
  143. addr_type = ipv6_addr_type(&usin->sin6_addr);
  144. if (addr_type == IPV6_ADDR_ANY) {
  145. /*
  146. * connect to self
  147. */
  148. usin->sin6_addr.s6_addr[15] = 0x01;
  149. }
  150. daddr = &usin->sin6_addr;
  151. if (addr_type == IPV6_ADDR_MAPPED) {
  152. struct sockaddr_in sin;
  153. if (__ipv6_only_sock(sk)) {
  154. err = -ENETUNREACH;
  155. goto out;
  156. }
  157. sin.sin_family = AF_INET;
  158. sin.sin_addr.s_addr = daddr->s6_addr32[3];
  159. sin.sin_port = usin->sin6_port;
  160. err = __ip4_datagram_connect(sk,
  161. (struct sockaddr *) &sin,
  162. sizeof(sin));
  163. ipv4_connected:
  164. if (err)
  165. goto out;
  166. ipv6_addr_set_v4mapped(inet->inet_daddr, &sk->sk_v6_daddr);
  167. if (ipv6_addr_any(&np->saddr) ||
  168. ipv6_mapped_addr_any(&np->saddr))
  169. ipv6_addr_set_v4mapped(inet->inet_saddr, &np->saddr);
  170. if (ipv6_addr_any(&sk->sk_v6_rcv_saddr) ||
  171. ipv6_mapped_addr_any(&sk->sk_v6_rcv_saddr)) {
  172. ipv6_addr_set_v4mapped(inet->inet_rcv_saddr,
  173. &sk->sk_v6_rcv_saddr);
  174. if (sk->sk_prot->rehash)
  175. sk->sk_prot->rehash(sk);
  176. }
  177. goto out;
  178. }
  179. if (__ipv6_addr_needs_scope_id(addr_type)) {
  180. if (addr_len >= sizeof(struct sockaddr_in6) &&
  181. usin->sin6_scope_id) {
  182. if (sk->sk_bound_dev_if &&
  183. sk->sk_bound_dev_if != usin->sin6_scope_id) {
  184. err = -EINVAL;
  185. goto out;
  186. }
  187. sk->sk_bound_dev_if = usin->sin6_scope_id;
  188. }
  189. if (!sk->sk_bound_dev_if && (addr_type & IPV6_ADDR_MULTICAST))
  190. sk->sk_bound_dev_if = np->mcast_oif;
  191. /* Connect to link-local address requires an interface */
  192. if (!sk->sk_bound_dev_if) {
  193. err = -EINVAL;
  194. goto out;
  195. }
  196. }
  197. sk->sk_v6_daddr = *daddr;
  198. np->flow_label = fl6_flowlabel;
  199. inet->inet_dport = usin->sin6_port;
  200. /*
  201. * Check for a route to destination an obtain the
  202. * destination cache for it.
  203. */
  204. err = ip6_datagram_dst_update(sk, true);
  205. if (err)
  206. goto out;
  207. sk->sk_state = TCP_ESTABLISHED;
  208. sk_set_txhash(sk);
  209. out:
  210. return err;
  211. }
  212. EXPORT_SYMBOL_GPL(__ip6_datagram_connect);
  213. int ip6_datagram_connect(struct sock *sk, struct sockaddr *uaddr, int addr_len)
  214. {
  215. int res;
  216. lock_sock(sk);
  217. res = __ip6_datagram_connect(sk, uaddr, addr_len);
  218. release_sock(sk);
  219. return res;
  220. }
  221. EXPORT_SYMBOL_GPL(ip6_datagram_connect);
  222. int ip6_datagram_connect_v6_only(struct sock *sk, struct sockaddr *uaddr,
  223. int addr_len)
  224. {
  225. DECLARE_SOCKADDR(struct sockaddr_in6 *, sin6, uaddr);
  226. if (sin6->sin6_family != AF_INET6)
  227. return -EAFNOSUPPORT;
  228. return ip6_datagram_connect(sk, uaddr, addr_len);
  229. }
  230. EXPORT_SYMBOL_GPL(ip6_datagram_connect_v6_only);
  231. void ipv6_icmp_error(struct sock *sk, struct sk_buff *skb, int err,
  232. __be16 port, u32 info, u8 *payload)
  233. {
  234. struct ipv6_pinfo *np = inet6_sk(sk);
  235. struct icmp6hdr *icmph = icmp6_hdr(skb);
  236. struct sock_exterr_skb *serr;
  237. if (!np->recverr)
  238. return;
  239. skb = skb_clone(skb, GFP_ATOMIC);
  240. if (!skb)
  241. return;
  242. skb->protocol = htons(ETH_P_IPV6);
  243. serr = SKB_EXT_ERR(skb);
  244. serr->ee.ee_errno = err;
  245. serr->ee.ee_origin = SO_EE_ORIGIN_ICMP6;
  246. serr->ee.ee_type = icmph->icmp6_type;
  247. serr->ee.ee_code = icmph->icmp6_code;
  248. serr->ee.ee_pad = 0;
  249. serr->ee.ee_info = info;
  250. serr->ee.ee_data = 0;
  251. serr->addr_offset = (u8 *)&(((struct ipv6hdr *)(icmph + 1))->daddr) -
  252. skb_network_header(skb);
  253. serr->port = port;
  254. __skb_pull(skb, payload - skb->data);
  255. skb_reset_transport_header(skb);
  256. if (sock_queue_err_skb(sk, skb))
  257. kfree_skb(skb);
  258. }
  259. void ipv6_local_error(struct sock *sk, int err, struct flowi6 *fl6, u32 info)
  260. {
  261. const struct ipv6_pinfo *np = inet6_sk(sk);
  262. struct sock_exterr_skb *serr;
  263. struct ipv6hdr *iph;
  264. struct sk_buff *skb;
  265. if (!np->recverr)
  266. return;
  267. skb = alloc_skb(sizeof(struct ipv6hdr), GFP_ATOMIC);
  268. if (!skb)
  269. return;
  270. skb->protocol = htons(ETH_P_IPV6);
  271. skb_put(skb, sizeof(struct ipv6hdr));
  272. skb_reset_network_header(skb);
  273. iph = ipv6_hdr(skb);
  274. iph->daddr = fl6->daddr;
  275. serr = SKB_EXT_ERR(skb);
  276. serr->ee.ee_errno = err;
  277. serr->ee.ee_origin = SO_EE_ORIGIN_LOCAL;
  278. serr->ee.ee_type = 0;
  279. serr->ee.ee_code = 0;
  280. serr->ee.ee_pad = 0;
  281. serr->ee.ee_info = info;
  282. serr->ee.ee_data = 0;
  283. serr->addr_offset = (u8 *)&iph->daddr - skb_network_header(skb);
  284. serr->port = fl6->fl6_dport;
  285. __skb_pull(skb, skb_tail_pointer(skb) - skb->data);
  286. skb_reset_transport_header(skb);
  287. if (sock_queue_err_skb(sk, skb))
  288. kfree_skb(skb);
  289. }
  290. void ipv6_local_rxpmtu(struct sock *sk, struct flowi6 *fl6, u32 mtu)
  291. {
  292. struct ipv6_pinfo *np = inet6_sk(sk);
  293. struct ipv6hdr *iph;
  294. struct sk_buff *skb;
  295. struct ip6_mtuinfo *mtu_info;
  296. if (!np->rxopt.bits.rxpmtu)
  297. return;
  298. skb = alloc_skb(sizeof(struct ipv6hdr), GFP_ATOMIC);
  299. if (!skb)
  300. return;
  301. skb_put(skb, sizeof(struct ipv6hdr));
  302. skb_reset_network_header(skb);
  303. iph = ipv6_hdr(skb);
  304. iph->daddr = fl6->daddr;
  305. mtu_info = IP6CBMTU(skb);
  306. mtu_info->ip6m_mtu = mtu;
  307. mtu_info->ip6m_addr.sin6_family = AF_INET6;
  308. mtu_info->ip6m_addr.sin6_port = 0;
  309. mtu_info->ip6m_addr.sin6_flowinfo = 0;
  310. mtu_info->ip6m_addr.sin6_scope_id = fl6->flowi6_oif;
  311. mtu_info->ip6m_addr.sin6_addr = ipv6_hdr(skb)->daddr;
  312. __skb_pull(skb, skb_tail_pointer(skb) - skb->data);
  313. skb_reset_transport_header(skb);
  314. skb = xchg(&np->rxpmtu, skb);
  315. kfree_skb(skb);
  316. }
  317. /* For some errors we have valid addr_offset even with zero payload and
  318. * zero port. Also, addr_offset should be supported if port is set.
  319. */
  320. static inline bool ipv6_datagram_support_addr(struct sock_exterr_skb *serr)
  321. {
  322. return serr->ee.ee_origin == SO_EE_ORIGIN_ICMP6 ||
  323. serr->ee.ee_origin == SO_EE_ORIGIN_ICMP ||
  324. serr->ee.ee_origin == SO_EE_ORIGIN_LOCAL || serr->port;
  325. }
  326. /* IPv6 supports cmsg on all origins aside from SO_EE_ORIGIN_LOCAL.
  327. *
  328. * At one point, excluding local errors was a quick test to identify icmp/icmp6
  329. * errors. This is no longer true, but the test remained, so the v6 stack,
  330. * unlike v4, also honors cmsg requests on all wifi and timestamp errors.
  331. *
  332. * Timestamp code paths do not initialize the fields expected by cmsg:
  333. * the PKTINFO fields in skb->cb[]. Fill those in here.
  334. */
  335. static bool ip6_datagram_support_cmsg(struct sk_buff *skb,
  336. struct sock_exterr_skb *serr)
  337. {
  338. if (serr->ee.ee_origin == SO_EE_ORIGIN_ICMP ||
  339. serr->ee.ee_origin == SO_EE_ORIGIN_ICMP6)
  340. return true;
  341. if (serr->ee.ee_origin == SO_EE_ORIGIN_LOCAL)
  342. return false;
  343. if (!skb->dev)
  344. return false;
  345. if (skb->protocol == htons(ETH_P_IPV6))
  346. IP6CB(skb)->iif = skb->dev->ifindex;
  347. else
  348. PKTINFO_SKB_CB(skb)->ipi_ifindex = skb->dev->ifindex;
  349. return true;
  350. }
  351. /*
  352. * Handle MSG_ERRQUEUE
  353. */
  354. int ipv6_recv_error(struct sock *sk, struct msghdr *msg, int len, int *addr_len)
  355. {
  356. struct ipv6_pinfo *np = inet6_sk(sk);
  357. struct sock_exterr_skb *serr;
  358. struct sk_buff *skb;
  359. DECLARE_SOCKADDR(struct sockaddr_in6 *, sin, msg->msg_name);
  360. struct {
  361. struct sock_extended_err ee;
  362. struct sockaddr_in6 offender;
  363. } errhdr;
  364. int err;
  365. int copied;
  366. err = -EAGAIN;
  367. skb = sock_dequeue_err_skb(sk);
  368. if (!skb)
  369. goto out;
  370. copied = skb->len;
  371. if (copied > len) {
  372. msg->msg_flags |= MSG_TRUNC;
  373. copied = len;
  374. }
  375. err = skb_copy_datagram_msg(skb, 0, msg, copied);
  376. if (unlikely(err)) {
  377. kfree_skb(skb);
  378. return err;
  379. }
  380. sock_recv_timestamp(msg, sk, skb);
  381. serr = SKB_EXT_ERR(skb);
  382. if (sin && ipv6_datagram_support_addr(serr)) {
  383. const unsigned char *nh = skb_network_header(skb);
  384. sin->sin6_family = AF_INET6;
  385. sin->sin6_flowinfo = 0;
  386. sin->sin6_port = serr->port;
  387. if (skb->protocol == htons(ETH_P_IPV6)) {
  388. const struct ipv6hdr *ip6h = container_of((struct in6_addr *)(nh + serr->addr_offset),
  389. struct ipv6hdr, daddr);
  390. sin->sin6_addr = ip6h->daddr;
  391. if (np->sndflow)
  392. sin->sin6_flowinfo = ip6_flowinfo(ip6h);
  393. sin->sin6_scope_id =
  394. ipv6_iface_scope_id(&sin->sin6_addr,
  395. IP6CB(skb)->iif);
  396. } else {
  397. ipv6_addr_set_v4mapped(*(__be32 *)(nh + serr->addr_offset),
  398. &sin->sin6_addr);
  399. sin->sin6_scope_id = 0;
  400. }
  401. *addr_len = sizeof(*sin);
  402. }
  403. memcpy(&errhdr.ee, &serr->ee, sizeof(struct sock_extended_err));
  404. sin = &errhdr.offender;
  405. memset(sin, 0, sizeof(*sin));
  406. if (ip6_datagram_support_cmsg(skb, serr)) {
  407. sin->sin6_family = AF_INET6;
  408. if (np->rxopt.all)
  409. ip6_datagram_recv_common_ctl(sk, msg, skb);
  410. if (skb->protocol == htons(ETH_P_IPV6)) {
  411. sin->sin6_addr = ipv6_hdr(skb)->saddr;
  412. if (np->rxopt.all)
  413. ip6_datagram_recv_specific_ctl(sk, msg, skb);
  414. sin->sin6_scope_id =
  415. ipv6_iface_scope_id(&sin->sin6_addr,
  416. IP6CB(skb)->iif);
  417. } else {
  418. ipv6_addr_set_v4mapped(ip_hdr(skb)->saddr,
  419. &sin->sin6_addr);
  420. if (inet_sk(sk)->cmsg_flags)
  421. ip_cmsg_recv(msg, skb);
  422. }
  423. }
  424. put_cmsg(msg, SOL_IPV6, IPV6_RECVERR, sizeof(errhdr), &errhdr);
  425. /* Now we could try to dump offended packet options */
  426. msg->msg_flags |= MSG_ERRQUEUE;
  427. err = copied;
  428. consume_skb(skb);
  429. out:
  430. return err;
  431. }
  432. EXPORT_SYMBOL_GPL(ipv6_recv_error);
  433. /*
  434. * Handle IPV6_RECVPATHMTU
  435. */
  436. int ipv6_recv_rxpmtu(struct sock *sk, struct msghdr *msg, int len,
  437. int *addr_len)
  438. {
  439. struct ipv6_pinfo *np = inet6_sk(sk);
  440. struct sk_buff *skb;
  441. struct ip6_mtuinfo mtu_info;
  442. DECLARE_SOCKADDR(struct sockaddr_in6 *, sin, msg->msg_name);
  443. int err;
  444. int copied;
  445. err = -EAGAIN;
  446. skb = xchg(&np->rxpmtu, NULL);
  447. if (!skb)
  448. goto out;
  449. copied = skb->len;
  450. if (copied > len) {
  451. msg->msg_flags |= MSG_TRUNC;
  452. copied = len;
  453. }
  454. err = skb_copy_datagram_msg(skb, 0, msg, copied);
  455. if (err)
  456. goto out_free_skb;
  457. sock_recv_timestamp(msg, sk, skb);
  458. memcpy(&mtu_info, IP6CBMTU(skb), sizeof(mtu_info));
  459. if (sin) {
  460. sin->sin6_family = AF_INET6;
  461. sin->sin6_flowinfo = 0;
  462. sin->sin6_port = 0;
  463. sin->sin6_scope_id = mtu_info.ip6m_addr.sin6_scope_id;
  464. sin->sin6_addr = mtu_info.ip6m_addr.sin6_addr;
  465. *addr_len = sizeof(*sin);
  466. }
  467. put_cmsg(msg, SOL_IPV6, IPV6_PATHMTU, sizeof(mtu_info), &mtu_info);
  468. err = copied;
  469. out_free_skb:
  470. kfree_skb(skb);
  471. out:
  472. return err;
  473. }
  474. void ip6_datagram_recv_common_ctl(struct sock *sk, struct msghdr *msg,
  475. struct sk_buff *skb)
  476. {
  477. struct ipv6_pinfo *np = inet6_sk(sk);
  478. bool is_ipv6 = skb->protocol == htons(ETH_P_IPV6);
  479. if (np->rxopt.bits.rxinfo) {
  480. struct in6_pktinfo src_info;
  481. if (is_ipv6) {
  482. src_info.ipi6_ifindex = IP6CB(skb)->iif;
  483. src_info.ipi6_addr = ipv6_hdr(skb)->daddr;
  484. } else {
  485. src_info.ipi6_ifindex =
  486. PKTINFO_SKB_CB(skb)->ipi_ifindex;
  487. ipv6_addr_set_v4mapped(ip_hdr(skb)->daddr,
  488. &src_info.ipi6_addr);
  489. }
  490. if (src_info.ipi6_ifindex >= 0)
  491. put_cmsg(msg, SOL_IPV6, IPV6_PKTINFO,
  492. sizeof(src_info), &src_info);
  493. }
  494. }
  495. void ip6_datagram_recv_specific_ctl(struct sock *sk, struct msghdr *msg,
  496. struct sk_buff *skb)
  497. {
  498. struct ipv6_pinfo *np = inet6_sk(sk);
  499. struct inet6_skb_parm *opt = IP6CB(skb);
  500. unsigned char *nh = skb_network_header(skb);
  501. if (np->rxopt.bits.rxhlim) {
  502. int hlim = ipv6_hdr(skb)->hop_limit;
  503. put_cmsg(msg, SOL_IPV6, IPV6_HOPLIMIT, sizeof(hlim), &hlim);
  504. }
  505. if (np->rxopt.bits.rxtclass) {
  506. int tclass = ipv6_get_dsfield(ipv6_hdr(skb));
  507. put_cmsg(msg, SOL_IPV6, IPV6_TCLASS, sizeof(tclass), &tclass);
  508. }
  509. if (np->rxopt.bits.rxflow) {
  510. __be32 flowinfo = ip6_flowinfo((struct ipv6hdr *)nh);
  511. if (flowinfo)
  512. put_cmsg(msg, SOL_IPV6, IPV6_FLOWINFO, sizeof(flowinfo), &flowinfo);
  513. }
  514. /* HbH is allowed only once */
  515. if (np->rxopt.bits.hopopts && (opt->flags & IP6SKB_HOPBYHOP)) {
  516. u8 *ptr = nh + sizeof(struct ipv6hdr);
  517. put_cmsg(msg, SOL_IPV6, IPV6_HOPOPTS, (ptr[1]+1)<<3, ptr);
  518. }
  519. if (opt->lastopt &&
  520. (np->rxopt.bits.dstopts || np->rxopt.bits.srcrt)) {
  521. /*
  522. * Silly enough, but we need to reparse in order to
  523. * report extension headers (except for HbH)
  524. * in order.
  525. *
  526. * Also note that IPV6_RECVRTHDRDSTOPTS is NOT
  527. * (and WILL NOT be) defined because
  528. * IPV6_RECVDSTOPTS is more generic. --yoshfuji
  529. */
  530. unsigned int off = sizeof(struct ipv6hdr);
  531. u8 nexthdr = ipv6_hdr(skb)->nexthdr;
  532. while (off <= opt->lastopt) {
  533. unsigned int len;
  534. u8 *ptr = nh + off;
  535. switch (nexthdr) {
  536. case IPPROTO_DSTOPTS:
  537. nexthdr = ptr[0];
  538. len = (ptr[1] + 1) << 3;
  539. if (np->rxopt.bits.dstopts)
  540. put_cmsg(msg, SOL_IPV6, IPV6_DSTOPTS, len, ptr);
  541. break;
  542. case IPPROTO_ROUTING:
  543. nexthdr = ptr[0];
  544. len = (ptr[1] + 1) << 3;
  545. if (np->rxopt.bits.srcrt)
  546. put_cmsg(msg, SOL_IPV6, IPV6_RTHDR, len, ptr);
  547. break;
  548. case IPPROTO_AH:
  549. nexthdr = ptr[0];
  550. len = (ptr[1] + 2) << 2;
  551. break;
  552. default:
  553. nexthdr = ptr[0];
  554. len = (ptr[1] + 1) << 3;
  555. break;
  556. }
  557. off += len;
  558. }
  559. }
  560. /* socket options in old style */
  561. if (np->rxopt.bits.rxoinfo) {
  562. struct in6_pktinfo src_info;
  563. src_info.ipi6_ifindex = opt->iif;
  564. src_info.ipi6_addr = ipv6_hdr(skb)->daddr;
  565. put_cmsg(msg, SOL_IPV6, IPV6_2292PKTINFO, sizeof(src_info), &src_info);
  566. }
  567. if (np->rxopt.bits.rxohlim) {
  568. int hlim = ipv6_hdr(skb)->hop_limit;
  569. put_cmsg(msg, SOL_IPV6, IPV6_2292HOPLIMIT, sizeof(hlim), &hlim);
  570. }
  571. if (np->rxopt.bits.ohopopts && (opt->flags & IP6SKB_HOPBYHOP)) {
  572. u8 *ptr = nh + sizeof(struct ipv6hdr);
  573. put_cmsg(msg, SOL_IPV6, IPV6_2292HOPOPTS, (ptr[1]+1)<<3, ptr);
  574. }
  575. if (np->rxopt.bits.odstopts && opt->dst0) {
  576. u8 *ptr = nh + opt->dst0;
  577. put_cmsg(msg, SOL_IPV6, IPV6_2292DSTOPTS, (ptr[1]+1)<<3, ptr);
  578. }
  579. if (np->rxopt.bits.osrcrt && opt->srcrt) {
  580. struct ipv6_rt_hdr *rthdr = (struct ipv6_rt_hdr *)(nh + opt->srcrt);
  581. put_cmsg(msg, SOL_IPV6, IPV6_2292RTHDR, (rthdr->hdrlen+1) << 3, rthdr);
  582. }
  583. if (np->rxopt.bits.odstopts && opt->dst1) {
  584. u8 *ptr = nh + opt->dst1;
  585. put_cmsg(msg, SOL_IPV6, IPV6_2292DSTOPTS, (ptr[1]+1)<<3, ptr);
  586. }
  587. if (np->rxopt.bits.rxorigdstaddr) {
  588. struct sockaddr_in6 sin6;
  589. __be16 *ports = (__be16 *) skb_transport_header(skb);
  590. if (skb_transport_offset(skb) + 4 <= (int)skb->len) {
  591. /* All current transport protocols have the port numbers in the
  592. * first four bytes of the transport header and this function is
  593. * written with this assumption in mind.
  594. */
  595. sin6.sin6_family = AF_INET6;
  596. sin6.sin6_addr = ipv6_hdr(skb)->daddr;
  597. sin6.sin6_port = ports[1];
  598. sin6.sin6_flowinfo = 0;
  599. sin6.sin6_scope_id =
  600. ipv6_iface_scope_id(&ipv6_hdr(skb)->daddr,
  601. opt->iif);
  602. put_cmsg(msg, SOL_IPV6, IPV6_ORIGDSTADDR, sizeof(sin6), &sin6);
  603. }
  604. }
  605. if (np->rxopt.bits.recvfragsize && opt->frag_max_size) {
  606. int val = opt->frag_max_size;
  607. put_cmsg(msg, SOL_IPV6, IPV6_RECVFRAGSIZE, sizeof(val), &val);
  608. }
  609. }
  610. void ip6_datagram_recv_ctl(struct sock *sk, struct msghdr *msg,
  611. struct sk_buff *skb)
  612. {
  613. ip6_datagram_recv_common_ctl(sk, msg, skb);
  614. ip6_datagram_recv_specific_ctl(sk, msg, skb);
  615. }
  616. EXPORT_SYMBOL_GPL(ip6_datagram_recv_ctl);
  617. int ip6_datagram_send_ctl(struct net *net, struct sock *sk,
  618. struct msghdr *msg, struct flowi6 *fl6,
  619. struct ipcm6_cookie *ipc6, struct sockcm_cookie *sockc)
  620. {
  621. struct in6_pktinfo *src_info;
  622. struct cmsghdr *cmsg;
  623. struct ipv6_rt_hdr *rthdr;
  624. struct ipv6_opt_hdr *hdr;
  625. struct ipv6_txoptions *opt = ipc6->opt;
  626. int len;
  627. int err = 0;
  628. for_each_cmsghdr(cmsg, msg) {
  629. int addr_type;
  630. if (!CMSG_OK(msg, cmsg)) {
  631. err = -EINVAL;
  632. goto exit_f;
  633. }
  634. if (cmsg->cmsg_level == SOL_SOCKET) {
  635. err = __sock_cmsg_send(sk, msg, cmsg, sockc);
  636. if (err)
  637. return err;
  638. continue;
  639. }
  640. if (cmsg->cmsg_level != SOL_IPV6)
  641. continue;
  642. switch (cmsg->cmsg_type) {
  643. case IPV6_PKTINFO:
  644. case IPV6_2292PKTINFO:
  645. {
  646. struct net_device *dev = NULL;
  647. if (cmsg->cmsg_len < CMSG_LEN(sizeof(struct in6_pktinfo))) {
  648. err = -EINVAL;
  649. goto exit_f;
  650. }
  651. src_info = (struct in6_pktinfo *)CMSG_DATA(cmsg);
  652. if (src_info->ipi6_ifindex) {
  653. if (fl6->flowi6_oif &&
  654. src_info->ipi6_ifindex != fl6->flowi6_oif)
  655. return -EINVAL;
  656. fl6->flowi6_oif = src_info->ipi6_ifindex;
  657. }
  658. addr_type = __ipv6_addr_type(&src_info->ipi6_addr);
  659. rcu_read_lock();
  660. if (fl6->flowi6_oif) {
  661. dev = dev_get_by_index_rcu(net, fl6->flowi6_oif);
  662. if (!dev) {
  663. rcu_read_unlock();
  664. return -ENODEV;
  665. }
  666. } else if (addr_type & IPV6_ADDR_LINKLOCAL) {
  667. rcu_read_unlock();
  668. return -EINVAL;
  669. }
  670. if (addr_type != IPV6_ADDR_ANY) {
  671. int strict = __ipv6_addr_src_scope(addr_type) <= IPV6_ADDR_SCOPE_LINKLOCAL;
  672. if (!(inet_sk(sk)->freebind || inet_sk(sk)->transparent) &&
  673. !ipv6_chk_addr(net, &src_info->ipi6_addr,
  674. strict ? dev : NULL, 0) &&
  675. !ipv6_chk_acast_addr_src(net, dev,
  676. &src_info->ipi6_addr))
  677. err = -EINVAL;
  678. else
  679. fl6->saddr = src_info->ipi6_addr;
  680. }
  681. rcu_read_unlock();
  682. if (err)
  683. goto exit_f;
  684. break;
  685. }
  686. case IPV6_FLOWINFO:
  687. if (cmsg->cmsg_len < CMSG_LEN(4)) {
  688. err = -EINVAL;
  689. goto exit_f;
  690. }
  691. if (fl6->flowlabel&IPV6_FLOWINFO_MASK) {
  692. if ((fl6->flowlabel^*(__be32 *)CMSG_DATA(cmsg))&~IPV6_FLOWINFO_MASK) {
  693. err = -EINVAL;
  694. goto exit_f;
  695. }
  696. }
  697. fl6->flowlabel = IPV6_FLOWINFO_MASK & *(__be32 *)CMSG_DATA(cmsg);
  698. break;
  699. case IPV6_2292HOPOPTS:
  700. case IPV6_HOPOPTS:
  701. if (opt->hopopt || cmsg->cmsg_len < CMSG_LEN(sizeof(struct ipv6_opt_hdr))) {
  702. err = -EINVAL;
  703. goto exit_f;
  704. }
  705. hdr = (struct ipv6_opt_hdr *)CMSG_DATA(cmsg);
  706. len = ((hdr->hdrlen + 1) << 3);
  707. if (cmsg->cmsg_len < CMSG_LEN(len)) {
  708. err = -EINVAL;
  709. goto exit_f;
  710. }
  711. if (!ns_capable(net->user_ns, CAP_NET_RAW)) {
  712. err = -EPERM;
  713. goto exit_f;
  714. }
  715. opt->opt_nflen += len;
  716. opt->hopopt = hdr;
  717. break;
  718. case IPV6_2292DSTOPTS:
  719. if (cmsg->cmsg_len < CMSG_LEN(sizeof(struct ipv6_opt_hdr))) {
  720. err = -EINVAL;
  721. goto exit_f;
  722. }
  723. hdr = (struct ipv6_opt_hdr *)CMSG_DATA(cmsg);
  724. len = ((hdr->hdrlen + 1) << 3);
  725. if (cmsg->cmsg_len < CMSG_LEN(len)) {
  726. err = -EINVAL;
  727. goto exit_f;
  728. }
  729. if (!ns_capable(net->user_ns, CAP_NET_RAW)) {
  730. err = -EPERM;
  731. goto exit_f;
  732. }
  733. if (opt->dst1opt) {
  734. err = -EINVAL;
  735. goto exit_f;
  736. }
  737. opt->opt_flen += len;
  738. opt->dst1opt = hdr;
  739. break;
  740. case IPV6_DSTOPTS:
  741. case IPV6_RTHDRDSTOPTS:
  742. if (cmsg->cmsg_len < CMSG_LEN(sizeof(struct ipv6_opt_hdr))) {
  743. err = -EINVAL;
  744. goto exit_f;
  745. }
  746. hdr = (struct ipv6_opt_hdr *)CMSG_DATA(cmsg);
  747. len = ((hdr->hdrlen + 1) << 3);
  748. if (cmsg->cmsg_len < CMSG_LEN(len)) {
  749. err = -EINVAL;
  750. goto exit_f;
  751. }
  752. if (!ns_capable(net->user_ns, CAP_NET_RAW)) {
  753. err = -EPERM;
  754. goto exit_f;
  755. }
  756. if (cmsg->cmsg_type == IPV6_DSTOPTS) {
  757. opt->opt_flen += len;
  758. opt->dst1opt = hdr;
  759. } else {
  760. opt->opt_nflen += len;
  761. opt->dst0opt = hdr;
  762. }
  763. break;
  764. case IPV6_2292RTHDR:
  765. case IPV6_RTHDR:
  766. if (cmsg->cmsg_len < CMSG_LEN(sizeof(struct ipv6_rt_hdr))) {
  767. err = -EINVAL;
  768. goto exit_f;
  769. }
  770. rthdr = (struct ipv6_rt_hdr *)CMSG_DATA(cmsg);
  771. switch (rthdr->type) {
  772. #if IS_ENABLED(CONFIG_IPV6_MIP6)
  773. case IPV6_SRCRT_TYPE_2:
  774. if (rthdr->hdrlen != 2 ||
  775. rthdr->segments_left != 1) {
  776. err = -EINVAL;
  777. goto exit_f;
  778. }
  779. break;
  780. #endif
  781. default:
  782. err = -EINVAL;
  783. goto exit_f;
  784. }
  785. len = ((rthdr->hdrlen + 1) << 3);
  786. if (cmsg->cmsg_len < CMSG_LEN(len)) {
  787. err = -EINVAL;
  788. goto exit_f;
  789. }
  790. /* segments left must also match */
  791. if ((rthdr->hdrlen >> 1) != rthdr->segments_left) {
  792. err = -EINVAL;
  793. goto exit_f;
  794. }
  795. opt->opt_nflen += len;
  796. opt->srcrt = rthdr;
  797. if (cmsg->cmsg_type == IPV6_2292RTHDR && opt->dst1opt) {
  798. int dsthdrlen = ((opt->dst1opt->hdrlen+1)<<3);
  799. opt->opt_nflen += dsthdrlen;
  800. opt->dst0opt = opt->dst1opt;
  801. opt->dst1opt = NULL;
  802. opt->opt_flen -= dsthdrlen;
  803. }
  804. break;
  805. case IPV6_2292HOPLIMIT:
  806. case IPV6_HOPLIMIT:
  807. if (cmsg->cmsg_len != CMSG_LEN(sizeof(int))) {
  808. err = -EINVAL;
  809. goto exit_f;
  810. }
  811. ipc6->hlimit = *(int *)CMSG_DATA(cmsg);
  812. if (ipc6->hlimit < -1 || ipc6->hlimit > 0xff) {
  813. err = -EINVAL;
  814. goto exit_f;
  815. }
  816. break;
  817. case IPV6_TCLASS:
  818. {
  819. int tc;
  820. err = -EINVAL;
  821. if (cmsg->cmsg_len != CMSG_LEN(sizeof(int)))
  822. goto exit_f;
  823. tc = *(int *)CMSG_DATA(cmsg);
  824. if (tc < -1 || tc > 0xff)
  825. goto exit_f;
  826. err = 0;
  827. ipc6->tclass = tc;
  828. break;
  829. }
  830. case IPV6_DONTFRAG:
  831. {
  832. int df;
  833. err = -EINVAL;
  834. if (cmsg->cmsg_len != CMSG_LEN(sizeof(int)))
  835. goto exit_f;
  836. df = *(int *)CMSG_DATA(cmsg);
  837. if (df < 0 || df > 1)
  838. goto exit_f;
  839. err = 0;
  840. ipc6->dontfrag = df;
  841. break;
  842. }
  843. default:
  844. net_dbg_ratelimited("invalid cmsg type: %d\n",
  845. cmsg->cmsg_type);
  846. err = -EINVAL;
  847. goto exit_f;
  848. }
  849. }
  850. exit_f:
  851. return err;
  852. }
  853. EXPORT_SYMBOL_GPL(ip6_datagram_send_ctl);
  854. void ip6_dgram_sock_seq_show(struct seq_file *seq, struct sock *sp,
  855. __u16 srcp, __u16 destp, int bucket)
  856. {
  857. const struct in6_addr *dest, *src;
  858. dest = &sp->sk_v6_daddr;
  859. src = &sp->sk_v6_rcv_saddr;
  860. seq_printf(seq,
  861. "%5d: %08X%08X%08X%08X:%04X %08X%08X%08X%08X:%04X "
  862. "%02X %08X:%08X %02X:%08lX %08X %5u %8d %lu %d %pK %d\n",
  863. bucket,
  864. src->s6_addr32[0], src->s6_addr32[1],
  865. src->s6_addr32[2], src->s6_addr32[3], srcp,
  866. dest->s6_addr32[0], dest->s6_addr32[1],
  867. dest->s6_addr32[2], dest->s6_addr32[3], destp,
  868. sp->sk_state,
  869. sk_wmem_alloc_get(sp),
  870. sk_rmem_alloc_get(sp),
  871. 0, 0L, 0,
  872. from_kuid_munged(seq_user_ns(seq), sock_i_uid(sp)),
  873. 0,
  874. sock_i_ino(sp),
  875. atomic_read(&sp->sk_refcnt), sp,
  876. atomic_read(&sp->sk_drops));
  877. }