datagram.c 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856
  1. /*
  2. * common UDP/RAW code
  3. * Linux INET6 implementation
  4. *
  5. * Authors:
  6. * Pedro Roque <roque@di.fc.ul.pt>
  7. *
  8. * This program is free software; you can redistribute it and/or
  9. * modify it under the terms of the GNU General Public License
  10. * as published by the Free Software Foundation; either version
  11. * 2 of the License, or (at your option) any later version.
  12. */
  13. #include <linux/capability.h>
  14. #include <linux/errno.h>
  15. #include <linux/types.h>
  16. #include <linux/kernel.h>
  17. #include <linux/interrupt.h>
  18. #include <linux/socket.h>
  19. #include <linux/sockios.h>
  20. #include <linux/in6.h>
  21. #include <linux/ipv6.h>
  22. #include <linux/route.h>
  23. #include <linux/slab.h>
  24. #include <net/ipv6.h>
  25. #include <net/ndisc.h>
  26. #include <net/addrconf.h>
  27. #include <net/transp_v6.h>
  28. #include <net/ip6_route.h>
  29. #include <net/tcp_states.h>
  30. #include <linux/errqueue.h>
  31. #include <asm/uaccess.h>
  32. int ip6_datagram_connect(struct sock *sk, struct sockaddr *uaddr, int addr_len)
  33. {
  34. struct sockaddr_in6 *usin = (struct sockaddr_in6 *) uaddr;
  35. struct inet_sock *inet = inet_sk(sk);
  36. struct ipv6_pinfo *np = inet6_sk(sk);
  37. struct in6_addr *daddr, *final_p = NULL, final;
  38. struct dst_entry *dst;
  39. struct flowi fl;
  40. struct ip6_flowlabel *flowlabel = NULL;
  41. int addr_type;
  42. int err;
  43. if (usin->sin6_family == AF_INET) {
  44. if (__ipv6_only_sock(sk))
  45. return -EAFNOSUPPORT;
  46. err = ip4_datagram_connect(sk, uaddr, addr_len);
  47. goto ipv4_connected;
  48. }
  49. if (addr_len < SIN6_LEN_RFC2133)
  50. return -EINVAL;
  51. if (usin->sin6_family != AF_INET6)
  52. return -EAFNOSUPPORT;
  53. memset(&fl, 0, sizeof(fl));
  54. if (np->sndflow) {
  55. fl.fl6_flowlabel = usin->sin6_flowinfo&IPV6_FLOWINFO_MASK;
  56. if (fl.fl6_flowlabel&IPV6_FLOWLABEL_MASK) {
  57. flowlabel = fl6_sock_lookup(sk, fl.fl6_flowlabel);
  58. if (flowlabel == NULL)
  59. return -EINVAL;
  60. ipv6_addr_copy(&usin->sin6_addr, &flowlabel->dst);
  61. }
  62. }
  63. addr_type = ipv6_addr_type(&usin->sin6_addr);
  64. if (addr_type == IPV6_ADDR_ANY) {
  65. /*
  66. * connect to self
  67. */
  68. usin->sin6_addr.s6_addr[15] = 0x01;
  69. }
  70. daddr = &usin->sin6_addr;
  71. if (addr_type == IPV6_ADDR_MAPPED) {
  72. struct sockaddr_in sin;
  73. if (__ipv6_only_sock(sk)) {
  74. err = -ENETUNREACH;
  75. goto out;
  76. }
  77. sin.sin_family = AF_INET;
  78. sin.sin_addr.s_addr = daddr->s6_addr32[3];
  79. sin.sin_port = usin->sin6_port;
  80. err = ip4_datagram_connect(sk,
  81. (struct sockaddr*) &sin,
  82. sizeof(sin));
  83. ipv4_connected:
  84. if (err)
  85. goto out;
  86. ipv6_addr_set_v4mapped(inet->inet_daddr, &np->daddr);
  87. if (ipv6_addr_any(&np->saddr))
  88. ipv6_addr_set_v4mapped(inet->inet_saddr, &np->saddr);
  89. if (ipv6_addr_any(&np->rcv_saddr))
  90. ipv6_addr_set_v4mapped(inet->inet_rcv_saddr,
  91. &np->rcv_saddr);
  92. goto out;
  93. }
  94. if (addr_type&IPV6_ADDR_LINKLOCAL) {
  95. if (addr_len >= sizeof(struct sockaddr_in6) &&
  96. usin->sin6_scope_id) {
  97. if (sk->sk_bound_dev_if &&
  98. sk->sk_bound_dev_if != usin->sin6_scope_id) {
  99. err = -EINVAL;
  100. goto out;
  101. }
  102. sk->sk_bound_dev_if = usin->sin6_scope_id;
  103. }
  104. if (!sk->sk_bound_dev_if && (addr_type & IPV6_ADDR_MULTICAST))
  105. sk->sk_bound_dev_if = np->mcast_oif;
  106. /* Connect to link-local address requires an interface */
  107. if (!sk->sk_bound_dev_if) {
  108. err = -EINVAL;
  109. goto out;
  110. }
  111. }
  112. ipv6_addr_copy(&np->daddr, daddr);
  113. np->flow_label = fl.fl6_flowlabel;
  114. inet->inet_dport = usin->sin6_port;
  115. /*
  116. * Check for a route to destination an obtain the
  117. * destination cache for it.
  118. */
  119. fl.proto = sk->sk_protocol;
  120. ipv6_addr_copy(&fl.fl6_dst, &np->daddr);
  121. ipv6_addr_copy(&fl.fl6_src, &np->saddr);
  122. fl.oif = sk->sk_bound_dev_if;
  123. fl.mark = sk->sk_mark;
  124. fl.fl_ip_dport = inet->inet_dport;
  125. fl.fl_ip_sport = inet->inet_sport;
  126. if (!fl.oif && (addr_type&IPV6_ADDR_MULTICAST))
  127. fl.oif = np->mcast_oif;
  128. security_sk_classify_flow(sk, &fl);
  129. if (flowlabel) {
  130. if (flowlabel->opt && flowlabel->opt->srcrt) {
  131. struct rt0_hdr *rt0 = (struct rt0_hdr *) flowlabel->opt->srcrt;
  132. ipv6_addr_copy(&final, &fl.fl6_dst);
  133. ipv6_addr_copy(&fl.fl6_dst, rt0->addr);
  134. final_p = &final;
  135. }
  136. } else if (np->opt && np->opt->srcrt) {
  137. struct rt0_hdr *rt0 = (struct rt0_hdr *)np->opt->srcrt;
  138. ipv6_addr_copy(&final, &fl.fl6_dst);
  139. ipv6_addr_copy(&fl.fl6_dst, rt0->addr);
  140. final_p = &final;
  141. }
  142. err = ip6_dst_lookup(sk, &dst, &fl);
  143. if (err)
  144. goto out;
  145. if (final_p)
  146. ipv6_addr_copy(&fl.fl6_dst, final_p);
  147. err = __xfrm_lookup(sock_net(sk), &dst, &fl, sk, XFRM_LOOKUP_WAIT);
  148. if (err < 0) {
  149. if (err == -EREMOTE)
  150. err = ip6_dst_blackhole(sk, &dst, &fl);
  151. if (err < 0)
  152. goto out;
  153. }
  154. /* source address lookup done in ip6_dst_lookup */
  155. if (ipv6_addr_any(&np->saddr))
  156. ipv6_addr_copy(&np->saddr, &fl.fl6_src);
  157. if (ipv6_addr_any(&np->rcv_saddr)) {
  158. ipv6_addr_copy(&np->rcv_saddr, &fl.fl6_src);
  159. inet->inet_rcv_saddr = LOOPBACK4_IPV6;
  160. }
  161. ip6_dst_store(sk, dst,
  162. ipv6_addr_equal(&fl.fl6_dst, &np->daddr) ?
  163. &np->daddr : NULL,
  164. #ifdef CONFIG_IPV6_SUBTREES
  165. ipv6_addr_equal(&fl.fl6_src, &np->saddr) ?
  166. &np->saddr :
  167. #endif
  168. NULL);
  169. sk->sk_state = TCP_ESTABLISHED;
  170. out:
  171. fl6_sock_release(flowlabel);
  172. return err;
  173. }
  174. void ipv6_icmp_error(struct sock *sk, struct sk_buff *skb, int err,
  175. __be16 port, u32 info, u8 *payload)
  176. {
  177. struct ipv6_pinfo *np = inet6_sk(sk);
  178. struct icmp6hdr *icmph = icmp6_hdr(skb);
  179. struct sock_exterr_skb *serr;
  180. if (!np->recverr)
  181. return;
  182. skb = skb_clone(skb, GFP_ATOMIC);
  183. if (!skb)
  184. return;
  185. serr = SKB_EXT_ERR(skb);
  186. serr->ee.ee_errno = err;
  187. serr->ee.ee_origin = SO_EE_ORIGIN_ICMP6;
  188. serr->ee.ee_type = icmph->icmp6_type;
  189. serr->ee.ee_code = icmph->icmp6_code;
  190. serr->ee.ee_pad = 0;
  191. serr->ee.ee_info = info;
  192. serr->ee.ee_data = 0;
  193. serr->addr_offset = (u8 *)&(((struct ipv6hdr *)(icmph + 1))->daddr) -
  194. skb_network_header(skb);
  195. serr->port = port;
  196. __skb_pull(skb, payload - skb->data);
  197. skb_reset_transport_header(skb);
  198. if (sock_queue_err_skb(sk, skb))
  199. kfree_skb(skb);
  200. }
  201. void ipv6_local_error(struct sock *sk, int err, struct flowi *fl, u32 info)
  202. {
  203. struct ipv6_pinfo *np = inet6_sk(sk);
  204. struct sock_exterr_skb *serr;
  205. struct ipv6hdr *iph;
  206. struct sk_buff *skb;
  207. if (!np->recverr)
  208. return;
  209. skb = alloc_skb(sizeof(struct ipv6hdr), GFP_ATOMIC);
  210. if (!skb)
  211. return;
  212. skb_put(skb, sizeof(struct ipv6hdr));
  213. skb_reset_network_header(skb);
  214. iph = ipv6_hdr(skb);
  215. ipv6_addr_copy(&iph->daddr, &fl->fl6_dst);
  216. serr = SKB_EXT_ERR(skb);
  217. serr->ee.ee_errno = err;
  218. serr->ee.ee_origin = SO_EE_ORIGIN_LOCAL;
  219. serr->ee.ee_type = 0;
  220. serr->ee.ee_code = 0;
  221. serr->ee.ee_pad = 0;
  222. serr->ee.ee_info = info;
  223. serr->ee.ee_data = 0;
  224. serr->addr_offset = (u8 *)&iph->daddr - skb_network_header(skb);
  225. serr->port = fl->fl_ip_dport;
  226. __skb_pull(skb, skb_tail_pointer(skb) - skb->data);
  227. skb_reset_transport_header(skb);
  228. if (sock_queue_err_skb(sk, skb))
  229. kfree_skb(skb);
  230. }
  231. void ipv6_local_rxpmtu(struct sock *sk, struct flowi *fl, u32 mtu)
  232. {
  233. struct ipv6_pinfo *np = inet6_sk(sk);
  234. struct ipv6hdr *iph;
  235. struct sk_buff *skb;
  236. struct ip6_mtuinfo *mtu_info;
  237. if (!np->rxopt.bits.rxpmtu)
  238. return;
  239. skb = alloc_skb(sizeof(struct ipv6hdr), GFP_ATOMIC);
  240. if (!skb)
  241. return;
  242. skb_put(skb, sizeof(struct ipv6hdr));
  243. skb_reset_network_header(skb);
  244. iph = ipv6_hdr(skb);
  245. ipv6_addr_copy(&iph->daddr, &fl->fl6_dst);
  246. mtu_info = IP6CBMTU(skb);
  247. if (!mtu_info) {
  248. kfree_skb(skb);
  249. return;
  250. }
  251. mtu_info->ip6m_mtu = mtu;
  252. mtu_info->ip6m_addr.sin6_family = AF_INET6;
  253. mtu_info->ip6m_addr.sin6_port = 0;
  254. mtu_info->ip6m_addr.sin6_flowinfo = 0;
  255. mtu_info->ip6m_addr.sin6_scope_id = fl->oif;
  256. ipv6_addr_copy(&mtu_info->ip6m_addr.sin6_addr, &ipv6_hdr(skb)->daddr);
  257. __skb_pull(skb, skb_tail_pointer(skb) - skb->data);
  258. skb_reset_transport_header(skb);
  259. skb = xchg(&np->rxpmtu, skb);
  260. kfree_skb(skb);
  261. }
  262. /*
  263. * Handle MSG_ERRQUEUE
  264. */
  265. int ipv6_recv_error(struct sock *sk, struct msghdr *msg, int len)
  266. {
  267. struct ipv6_pinfo *np = inet6_sk(sk);
  268. struct sock_exterr_skb *serr;
  269. struct sk_buff *skb, *skb2;
  270. struct sockaddr_in6 *sin;
  271. struct {
  272. struct sock_extended_err ee;
  273. struct sockaddr_in6 offender;
  274. } errhdr;
  275. int err;
  276. int copied;
  277. err = -EAGAIN;
  278. skb = skb_dequeue(&sk->sk_error_queue);
  279. if (skb == NULL)
  280. goto out;
  281. copied = skb->len;
  282. if (copied > len) {
  283. msg->msg_flags |= MSG_TRUNC;
  284. copied = len;
  285. }
  286. err = skb_copy_datagram_iovec(skb, 0, msg->msg_iov, copied);
  287. if (err)
  288. goto out_free_skb;
  289. sock_recv_timestamp(msg, sk, skb);
  290. serr = SKB_EXT_ERR(skb);
  291. sin = (struct sockaddr_in6 *)msg->msg_name;
  292. if (sin) {
  293. const unsigned char *nh = skb_network_header(skb);
  294. sin->sin6_family = AF_INET6;
  295. sin->sin6_flowinfo = 0;
  296. sin->sin6_port = serr->port;
  297. sin->sin6_scope_id = 0;
  298. if (serr->ee.ee_origin == SO_EE_ORIGIN_ICMP6) {
  299. ipv6_addr_copy(&sin->sin6_addr,
  300. (struct in6_addr *)(nh + serr->addr_offset));
  301. if (np->sndflow)
  302. sin->sin6_flowinfo =
  303. (*(__be32 *)(nh + serr->addr_offset - 24) &
  304. IPV6_FLOWINFO_MASK);
  305. if (ipv6_addr_type(&sin->sin6_addr) & IPV6_ADDR_LINKLOCAL)
  306. sin->sin6_scope_id = IP6CB(skb)->iif;
  307. } else {
  308. ipv6_addr_set_v4mapped(*(__be32 *)(nh + serr->addr_offset),
  309. &sin->sin6_addr);
  310. }
  311. }
  312. memcpy(&errhdr.ee, &serr->ee, sizeof(struct sock_extended_err));
  313. sin = &errhdr.offender;
  314. sin->sin6_family = AF_UNSPEC;
  315. if (serr->ee.ee_origin != SO_EE_ORIGIN_LOCAL) {
  316. sin->sin6_family = AF_INET6;
  317. sin->sin6_flowinfo = 0;
  318. sin->sin6_scope_id = 0;
  319. if (serr->ee.ee_origin == SO_EE_ORIGIN_ICMP6) {
  320. ipv6_addr_copy(&sin->sin6_addr, &ipv6_hdr(skb)->saddr);
  321. if (np->rxopt.all)
  322. datagram_recv_ctl(sk, msg, skb);
  323. if (ipv6_addr_type(&sin->sin6_addr) & IPV6_ADDR_LINKLOCAL)
  324. sin->sin6_scope_id = IP6CB(skb)->iif;
  325. } else {
  326. struct inet_sock *inet = inet_sk(sk);
  327. ipv6_addr_set_v4mapped(ip_hdr(skb)->saddr,
  328. &sin->sin6_addr);
  329. if (inet->cmsg_flags)
  330. ip_cmsg_recv(msg, skb);
  331. }
  332. }
  333. put_cmsg(msg, SOL_IPV6, IPV6_RECVERR, sizeof(errhdr), &errhdr);
  334. /* Now we could try to dump offended packet options */
  335. msg->msg_flags |= MSG_ERRQUEUE;
  336. err = copied;
  337. /* Reset and regenerate socket error */
  338. spin_lock_bh(&sk->sk_error_queue.lock);
  339. sk->sk_err = 0;
  340. if ((skb2 = skb_peek(&sk->sk_error_queue)) != NULL) {
  341. sk->sk_err = SKB_EXT_ERR(skb2)->ee.ee_errno;
  342. spin_unlock_bh(&sk->sk_error_queue.lock);
  343. sk->sk_error_report(sk);
  344. } else {
  345. spin_unlock_bh(&sk->sk_error_queue.lock);
  346. }
  347. out_free_skb:
  348. kfree_skb(skb);
  349. out:
  350. return err;
  351. }
  352. /*
  353. * Handle IPV6_RECVPATHMTU
  354. */
  355. int ipv6_recv_rxpmtu(struct sock *sk, struct msghdr *msg, int len)
  356. {
  357. struct ipv6_pinfo *np = inet6_sk(sk);
  358. struct sk_buff *skb;
  359. struct sockaddr_in6 *sin;
  360. struct ip6_mtuinfo mtu_info;
  361. int err;
  362. int copied;
  363. err = -EAGAIN;
  364. skb = xchg(&np->rxpmtu, NULL);
  365. if (skb == NULL)
  366. goto out;
  367. copied = skb->len;
  368. if (copied > len) {
  369. msg->msg_flags |= MSG_TRUNC;
  370. copied = len;
  371. }
  372. err = skb_copy_datagram_iovec(skb, 0, msg->msg_iov, copied);
  373. if (err)
  374. goto out_free_skb;
  375. sock_recv_timestamp(msg, sk, skb);
  376. memcpy(&mtu_info, IP6CBMTU(skb), sizeof(mtu_info));
  377. sin = (struct sockaddr_in6 *)msg->msg_name;
  378. if (sin) {
  379. sin->sin6_family = AF_INET6;
  380. sin->sin6_flowinfo = 0;
  381. sin->sin6_port = 0;
  382. sin->sin6_scope_id = mtu_info.ip6m_addr.sin6_scope_id;
  383. ipv6_addr_copy(&sin->sin6_addr, &mtu_info.ip6m_addr.sin6_addr);
  384. }
  385. put_cmsg(msg, SOL_IPV6, IPV6_PATHMTU, sizeof(mtu_info), &mtu_info);
  386. err = copied;
  387. out_free_skb:
  388. kfree_skb(skb);
  389. out:
  390. return err;
  391. }
  392. int datagram_recv_ctl(struct sock *sk, struct msghdr *msg, struct sk_buff *skb)
  393. {
  394. struct ipv6_pinfo *np = inet6_sk(sk);
  395. struct inet6_skb_parm *opt = IP6CB(skb);
  396. unsigned char *nh = skb_network_header(skb);
  397. if (np->rxopt.bits.rxinfo) {
  398. struct in6_pktinfo src_info;
  399. src_info.ipi6_ifindex = opt->iif;
  400. ipv6_addr_copy(&src_info.ipi6_addr, &ipv6_hdr(skb)->daddr);
  401. put_cmsg(msg, SOL_IPV6, IPV6_PKTINFO, sizeof(src_info), &src_info);
  402. }
  403. if (np->rxopt.bits.rxhlim) {
  404. int hlim = ipv6_hdr(skb)->hop_limit;
  405. put_cmsg(msg, SOL_IPV6, IPV6_HOPLIMIT, sizeof(hlim), &hlim);
  406. }
  407. if (np->rxopt.bits.rxtclass) {
  408. int tclass = (ntohl(*(__be32 *)ipv6_hdr(skb)) >> 20) & 0xff;
  409. put_cmsg(msg, SOL_IPV6, IPV6_TCLASS, sizeof(tclass), &tclass);
  410. }
  411. if (np->rxopt.bits.rxflow && (*(__be32 *)nh & IPV6_FLOWINFO_MASK)) {
  412. __be32 flowinfo = *(__be32 *)nh & IPV6_FLOWINFO_MASK;
  413. put_cmsg(msg, SOL_IPV6, IPV6_FLOWINFO, sizeof(flowinfo), &flowinfo);
  414. }
  415. /* HbH is allowed only once */
  416. if (np->rxopt.bits.hopopts && opt->hop) {
  417. u8 *ptr = nh + opt->hop;
  418. put_cmsg(msg, SOL_IPV6, IPV6_HOPOPTS, (ptr[1]+1)<<3, ptr);
  419. }
  420. if (opt->lastopt &&
  421. (np->rxopt.bits.dstopts || np->rxopt.bits.srcrt)) {
  422. /*
  423. * Silly enough, but we need to reparse in order to
  424. * report extension headers (except for HbH)
  425. * in order.
  426. *
  427. * Also note that IPV6_RECVRTHDRDSTOPTS is NOT
  428. * (and WILL NOT be) defined because
  429. * IPV6_RECVDSTOPTS is more generic. --yoshfuji
  430. */
  431. unsigned int off = sizeof(struct ipv6hdr);
  432. u8 nexthdr = ipv6_hdr(skb)->nexthdr;
  433. while (off <= opt->lastopt) {
  434. unsigned len;
  435. u8 *ptr = nh + off;
  436. switch(nexthdr) {
  437. case IPPROTO_DSTOPTS:
  438. nexthdr = ptr[0];
  439. len = (ptr[1] + 1) << 3;
  440. if (np->rxopt.bits.dstopts)
  441. put_cmsg(msg, SOL_IPV6, IPV6_DSTOPTS, len, ptr);
  442. break;
  443. case IPPROTO_ROUTING:
  444. nexthdr = ptr[0];
  445. len = (ptr[1] + 1) << 3;
  446. if (np->rxopt.bits.srcrt)
  447. put_cmsg(msg, SOL_IPV6, IPV6_RTHDR, len, ptr);
  448. break;
  449. case IPPROTO_AH:
  450. nexthdr = ptr[0];
  451. len = (ptr[1] + 2) << 2;
  452. break;
  453. default:
  454. nexthdr = ptr[0];
  455. len = (ptr[1] + 1) << 3;
  456. break;
  457. }
  458. off += len;
  459. }
  460. }
  461. /* socket options in old style */
  462. if (np->rxopt.bits.rxoinfo) {
  463. struct in6_pktinfo src_info;
  464. src_info.ipi6_ifindex = opt->iif;
  465. ipv6_addr_copy(&src_info.ipi6_addr, &ipv6_hdr(skb)->daddr);
  466. put_cmsg(msg, SOL_IPV6, IPV6_2292PKTINFO, sizeof(src_info), &src_info);
  467. }
  468. if (np->rxopt.bits.rxohlim) {
  469. int hlim = ipv6_hdr(skb)->hop_limit;
  470. put_cmsg(msg, SOL_IPV6, IPV6_2292HOPLIMIT, sizeof(hlim), &hlim);
  471. }
  472. if (np->rxopt.bits.ohopopts && opt->hop) {
  473. u8 *ptr = nh + opt->hop;
  474. put_cmsg(msg, SOL_IPV6, IPV6_2292HOPOPTS, (ptr[1]+1)<<3, ptr);
  475. }
  476. if (np->rxopt.bits.odstopts && opt->dst0) {
  477. u8 *ptr = nh + opt->dst0;
  478. put_cmsg(msg, SOL_IPV6, IPV6_2292DSTOPTS, (ptr[1]+1)<<3, ptr);
  479. }
  480. if (np->rxopt.bits.osrcrt && opt->srcrt) {
  481. struct ipv6_rt_hdr *rthdr = (struct ipv6_rt_hdr *)(nh + opt->srcrt);
  482. put_cmsg(msg, SOL_IPV6, IPV6_2292RTHDR, (rthdr->hdrlen+1) << 3, rthdr);
  483. }
  484. if (np->rxopt.bits.odstopts && opt->dst1) {
  485. u8 *ptr = nh + opt->dst1;
  486. put_cmsg(msg, SOL_IPV6, IPV6_2292DSTOPTS, (ptr[1]+1)<<3, ptr);
  487. }
  488. return 0;
  489. }
  490. int datagram_send_ctl(struct net *net,
  491. struct msghdr *msg, struct flowi *fl,
  492. struct ipv6_txoptions *opt,
  493. int *hlimit, int *tclass, int *dontfrag)
  494. {
  495. struct in6_pktinfo *src_info;
  496. struct cmsghdr *cmsg;
  497. struct ipv6_rt_hdr *rthdr;
  498. struct ipv6_opt_hdr *hdr;
  499. int len;
  500. int err = 0;
  501. for (cmsg = CMSG_FIRSTHDR(msg); cmsg; cmsg = CMSG_NXTHDR(msg, cmsg)) {
  502. int addr_type;
  503. if (!CMSG_OK(msg, cmsg)) {
  504. err = -EINVAL;
  505. goto exit_f;
  506. }
  507. if (cmsg->cmsg_level != SOL_IPV6)
  508. continue;
  509. switch (cmsg->cmsg_type) {
  510. case IPV6_PKTINFO:
  511. case IPV6_2292PKTINFO:
  512. {
  513. struct net_device *dev = NULL;
  514. if (cmsg->cmsg_len < CMSG_LEN(sizeof(struct in6_pktinfo))) {
  515. err = -EINVAL;
  516. goto exit_f;
  517. }
  518. src_info = (struct in6_pktinfo *)CMSG_DATA(cmsg);
  519. if (src_info->ipi6_ifindex) {
  520. if (fl->oif && src_info->ipi6_ifindex != fl->oif)
  521. return -EINVAL;
  522. fl->oif = src_info->ipi6_ifindex;
  523. }
  524. addr_type = __ipv6_addr_type(&src_info->ipi6_addr);
  525. rcu_read_lock();
  526. if (fl->oif) {
  527. dev = dev_get_by_index_rcu(net, fl->oif);
  528. if (!dev) {
  529. rcu_read_unlock();
  530. return -ENODEV;
  531. }
  532. } else if (addr_type & IPV6_ADDR_LINKLOCAL) {
  533. rcu_read_unlock();
  534. return -EINVAL;
  535. }
  536. if (addr_type != IPV6_ADDR_ANY) {
  537. int strict = __ipv6_addr_src_scope(addr_type) <= IPV6_ADDR_SCOPE_LINKLOCAL;
  538. if (!ipv6_chk_addr(net, &src_info->ipi6_addr,
  539. strict ? dev : NULL, 0))
  540. err = -EINVAL;
  541. else
  542. ipv6_addr_copy(&fl->fl6_src, &src_info->ipi6_addr);
  543. }
  544. rcu_read_unlock();
  545. if (err)
  546. goto exit_f;
  547. break;
  548. }
  549. case IPV6_FLOWINFO:
  550. if (cmsg->cmsg_len < CMSG_LEN(4)) {
  551. err = -EINVAL;
  552. goto exit_f;
  553. }
  554. if (fl->fl6_flowlabel&IPV6_FLOWINFO_MASK) {
  555. if ((fl->fl6_flowlabel^*(__be32 *)CMSG_DATA(cmsg))&~IPV6_FLOWINFO_MASK) {
  556. err = -EINVAL;
  557. goto exit_f;
  558. }
  559. }
  560. fl->fl6_flowlabel = IPV6_FLOWINFO_MASK & *(__be32 *)CMSG_DATA(cmsg);
  561. break;
  562. case IPV6_2292HOPOPTS:
  563. case IPV6_HOPOPTS:
  564. if (opt->hopopt || cmsg->cmsg_len < CMSG_LEN(sizeof(struct ipv6_opt_hdr))) {
  565. err = -EINVAL;
  566. goto exit_f;
  567. }
  568. hdr = (struct ipv6_opt_hdr *)CMSG_DATA(cmsg);
  569. len = ((hdr->hdrlen + 1) << 3);
  570. if (cmsg->cmsg_len < CMSG_LEN(len)) {
  571. err = -EINVAL;
  572. goto exit_f;
  573. }
  574. if (!capable(CAP_NET_RAW)) {
  575. err = -EPERM;
  576. goto exit_f;
  577. }
  578. opt->opt_nflen += len;
  579. opt->hopopt = hdr;
  580. break;
  581. case IPV6_2292DSTOPTS:
  582. if (cmsg->cmsg_len < CMSG_LEN(sizeof(struct ipv6_opt_hdr))) {
  583. err = -EINVAL;
  584. goto exit_f;
  585. }
  586. hdr = (struct ipv6_opt_hdr *)CMSG_DATA(cmsg);
  587. len = ((hdr->hdrlen + 1) << 3);
  588. if (cmsg->cmsg_len < CMSG_LEN(len)) {
  589. err = -EINVAL;
  590. goto exit_f;
  591. }
  592. if (!capable(CAP_NET_RAW)) {
  593. err = -EPERM;
  594. goto exit_f;
  595. }
  596. if (opt->dst1opt) {
  597. err = -EINVAL;
  598. goto exit_f;
  599. }
  600. opt->opt_flen += len;
  601. opt->dst1opt = hdr;
  602. break;
  603. case IPV6_DSTOPTS:
  604. case IPV6_RTHDRDSTOPTS:
  605. if (cmsg->cmsg_len < CMSG_LEN(sizeof(struct ipv6_opt_hdr))) {
  606. err = -EINVAL;
  607. goto exit_f;
  608. }
  609. hdr = (struct ipv6_opt_hdr *)CMSG_DATA(cmsg);
  610. len = ((hdr->hdrlen + 1) << 3);
  611. if (cmsg->cmsg_len < CMSG_LEN(len)) {
  612. err = -EINVAL;
  613. goto exit_f;
  614. }
  615. if (!capable(CAP_NET_RAW)) {
  616. err = -EPERM;
  617. goto exit_f;
  618. }
  619. if (cmsg->cmsg_type == IPV6_DSTOPTS) {
  620. opt->opt_flen += len;
  621. opt->dst1opt = hdr;
  622. } else {
  623. opt->opt_nflen += len;
  624. opt->dst0opt = hdr;
  625. }
  626. break;
  627. case IPV6_2292RTHDR:
  628. case IPV6_RTHDR:
  629. if (cmsg->cmsg_len < CMSG_LEN(sizeof(struct ipv6_rt_hdr))) {
  630. err = -EINVAL;
  631. goto exit_f;
  632. }
  633. rthdr = (struct ipv6_rt_hdr *)CMSG_DATA(cmsg);
  634. switch (rthdr->type) {
  635. #if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
  636. case IPV6_SRCRT_TYPE_2:
  637. if (rthdr->hdrlen != 2 ||
  638. rthdr->segments_left != 1) {
  639. err = -EINVAL;
  640. goto exit_f;
  641. }
  642. break;
  643. #endif
  644. default:
  645. err = -EINVAL;
  646. goto exit_f;
  647. }
  648. len = ((rthdr->hdrlen + 1) << 3);
  649. if (cmsg->cmsg_len < CMSG_LEN(len)) {
  650. err = -EINVAL;
  651. goto exit_f;
  652. }
  653. /* segments left must also match */
  654. if ((rthdr->hdrlen >> 1) != rthdr->segments_left) {
  655. err = -EINVAL;
  656. goto exit_f;
  657. }
  658. opt->opt_nflen += len;
  659. opt->srcrt = rthdr;
  660. if (cmsg->cmsg_type == IPV6_2292RTHDR && opt->dst1opt) {
  661. int dsthdrlen = ((opt->dst1opt->hdrlen+1)<<3);
  662. opt->opt_nflen += dsthdrlen;
  663. opt->dst0opt = opt->dst1opt;
  664. opt->dst1opt = NULL;
  665. opt->opt_flen -= dsthdrlen;
  666. }
  667. break;
  668. case IPV6_2292HOPLIMIT:
  669. case IPV6_HOPLIMIT:
  670. if (cmsg->cmsg_len != CMSG_LEN(sizeof(int))) {
  671. err = -EINVAL;
  672. goto exit_f;
  673. }
  674. *hlimit = *(int *)CMSG_DATA(cmsg);
  675. if (*hlimit < -1 || *hlimit > 0xff) {
  676. err = -EINVAL;
  677. goto exit_f;
  678. }
  679. break;
  680. case IPV6_TCLASS:
  681. {
  682. int tc;
  683. err = -EINVAL;
  684. if (cmsg->cmsg_len != CMSG_LEN(sizeof(int))) {
  685. goto exit_f;
  686. }
  687. tc = *(int *)CMSG_DATA(cmsg);
  688. if (tc < -1 || tc > 0xff)
  689. goto exit_f;
  690. err = 0;
  691. *tclass = tc;
  692. break;
  693. }
  694. case IPV6_DONTFRAG:
  695. {
  696. int df;
  697. err = -EINVAL;
  698. if (cmsg->cmsg_len != CMSG_LEN(sizeof(int))) {
  699. goto exit_f;
  700. }
  701. df = *(int *)CMSG_DATA(cmsg);
  702. if (df < 0 || df > 1)
  703. goto exit_f;
  704. err = 0;
  705. *dontfrag = df;
  706. break;
  707. }
  708. default:
  709. LIMIT_NETDEBUG(KERN_DEBUG "invalid cmsg type: %d\n",
  710. cmsg->cmsg_type);
  711. err = -EINVAL;
  712. goto exit_f;
  713. }
  714. }
  715. exit_f:
  716. return err;
  717. }