ipv4,ipv6: grab rtnl before locking the socket
[deliverable/linux.git] / net / ipv6 / ipv6_sockglue.c
CommitLineData
1da177e4
LT
1/*
2 * IPv6 BSD socket options interface
1ab1457c 3 * Linux INET6 implementation
1da177e4
LT
4 *
5 * Authors:
1ab1457c 6 * Pedro Roque <roque@di.fc.ul.pt>
1da177e4
LT
7 *
8 * Based on linux/net/ipv4/ip_sockglue.c
9 *
1da177e4
LT
10 * This program is free software; you can redistribute it and/or
11 * modify it under the terms of the GNU General Public License
12 * as published by the Free Software Foundation; either version
13 * 2 of the License, or (at your option) any later version.
14 *
15 * FIXME: Make the setsockopt code POSIX compliant: That is
16 *
1da177e4
LT
17 * o Truncate getsockopt returns
18 * o Return an optlen of the truncated length if need be
19 *
20 * Changes:
21 * David L Stevens <dlstevens@us.ibm.com>:
22 * - added multicast source filtering API for MLDv2
23 */
24
25#include <linux/module.h>
4fc268d2 26#include <linux/capability.h>
1da177e4
LT
27#include <linux/errno.h>
28#include <linux/types.h>
29#include <linux/socket.h>
30#include <linux/sockios.h>
1da177e4
LT
31#include <linux/net.h>
32#include <linux/in6.h>
7bc570c8 33#include <linux/mroute6.h>
1da177e4
LT
34#include <linux/netdevice.h>
35#include <linux/if_arp.h>
36#include <linux/init.h>
37#include <linux/sysctl.h>
38#include <linux/netfilter.h>
5a0e3ad6 39#include <linux/slab.h>
1da177e4
LT
40
41#include <net/sock.h>
42#include <net/snmp.h>
43#include <net/ipv6.h>
44#include <net/ndisc.h>
45#include <net/protocol.h>
46#include <net/transp_v6.h>
47#include <net/ip6_route.h>
48#include <net/addrconf.h>
49#include <net/inet_common.h>
50#include <net/tcp.h>
51#include <net/udp.h>
ba4e58ec 52#include <net/udplite.h>
1da177e4 53#include <net/xfrm.h>
dae50295 54#include <net/compat.h>
1da177e4
LT
55
56#include <asm/uaccess.h>
57
1da177e4
LT
58struct ip6_ra_chain *ip6_ra_chain;
59DEFINE_RWLOCK(ip6_ra_lock);
60
725a8ff0 61int ip6_ra_control(struct sock *sk, int sel)
1da177e4
LT
62{
63 struct ip6_ra_chain *ra, *new_ra, **rap;
64
65 /* RA packet may be delivered ONLY to IPPROTO_RAW socket */
c720c7e8 66 if (sk->sk_type != SOCK_RAW || inet_sk(sk)->inet_num != IPPROTO_RAW)
1717699c 67 return -ENOPROTOOPT;
1da177e4 68
67ba4152 69 new_ra = (sel >= 0) ? kmalloc(sizeof(*new_ra), GFP_KERNEL) : NULL;
1da177e4
LT
70
71 write_lock_bh(&ip6_ra_lock);
67ba4152 72 for (rap = &ip6_ra_chain; (ra = *rap) != NULL; rap = &ra->next) {
1da177e4 73 if (ra->sk == sk) {
67ba4152 74 if (sel >= 0) {
1da177e4 75 write_unlock_bh(&ip6_ra_lock);
a51482bd 76 kfree(new_ra);
1da177e4
LT
77 return -EADDRINUSE;
78 }
79
80 *rap = ra->next;
81 write_unlock_bh(&ip6_ra_lock);
82
1da177e4
LT
83 sock_put(sk);
84 kfree(ra);
85 return 0;
86 }
87 }
88 if (new_ra == NULL) {
89 write_unlock_bh(&ip6_ra_lock);
90 return -ENOBUFS;
91 }
92 new_ra->sk = sk;
93 new_ra->sel = sel;
1da177e4
LT
94 new_ra->next = ra;
95 *rap = new_ra;
96 sock_hold(sk);
97 write_unlock_bh(&ip6_ra_lock);
98 return 0;
99}
100
e7712f1a
YH
101static
102struct ipv6_txoptions *ipv6_update_options(struct sock *sk,
103 struct ipv6_txoptions *opt)
104{
105 if (inet_sk(sk)->is_icsk) {
106 if (opt &&
107 !((1 << sk->sk_state) & (TCPF_LISTEN | TCPF_CLOSE)) &&
c720c7e8 108 inet_sk(sk)->inet_daddr != LOOPBACK4_IPV6) {
e7712f1a
YH
109 struct inet_connection_sock *icsk = inet_csk(sk);
110 icsk->icsk_ext_hdr_len = opt->opt_flen + opt->opt_nflen;
111 icsk->icsk_sync_mss(sk, icsk->icsk_pmtu_cookie);
112 }
e7712f1a 113 }
86fe8f89 114 opt = xchg(&inet6_sk(sk)->opt, opt);
e7712f1a
YH
115 sk_dst_reset(sk);
116
117 return opt;
118}
119
baf606d9
MRL
120static bool setsockopt_needs_rtnl(int optname)
121{
122 switch (optname) {
123 case IPV6_ADD_MEMBERSHIP:
124 case IPV6_DROP_MEMBERSHIP:
125 case MCAST_JOIN_GROUP:
126 case MCAST_LEAVE_GROUP:
127 return true;
128 }
129 return false;
130}
131
3fdadf7d 132static int do_ipv6_setsockopt(struct sock *sk, int level, int optname,
b7058842 133 char __user *optval, unsigned int optlen)
1da177e4
LT
134{
135 struct ipv6_pinfo *np = inet6_sk(sk);
3b1e0a65 136 struct net *net = sock_net(sk);
1da177e4
LT
137 int val, valbool;
138 int retv = -ENOPROTOOPT;
baf606d9 139 bool needs_rtnl = setsockopt_needs_rtnl(optname);
1da177e4 140
1da177e4 141 if (optval == NULL)
67ba4152 142 val = 0;
b2a9d7c2
YH
143 else {
144 if (optlen >= sizeof(int)) {
145 if (get_user(val, (int __user *) optval))
146 return -EFAULT;
147 } else
148 val = 0;
149 }
1da177e4 150
67ba4152 151 valbool = (val != 0);
1da177e4 152
7bc570c8
YH
153 if (ip6_mroute_opt(optname))
154 return ip6_mroute_setsockopt(sk, optname, optval, optlen);
155
baf606d9
MRL
156 if (needs_rtnl)
157 rtnl_lock();
1da177e4
LT
158 lock_sock(sk);
159
160 switch (optname) {
161
162 case IPV6_ADDRFORM:
b2a9d7c2
YH
163 if (optlen < sizeof(int))
164 goto e_inval;
1da177e4
LT
165 if (val == PF_INET) {
166 struct ipv6_txoptions *opt;
167 struct sk_buff *pktopt;
168
49d074f4
DL
169 if (sk->sk_type == SOCK_RAW)
170 break;
171
9596cc82
DL
172 if (sk->sk_protocol == IPPROTO_UDP ||
173 sk->sk_protocol == IPPROTO_UDPLITE) {
174 struct udp_sock *up = udp_sk(sk);
175 if (up->pending == AF_INET6) {
176 retv = -EBUSY;
177 break;
178 }
179 } else if (sk->sk_protocol != IPPROTO_TCP)
1da177e4
LT
180 break;
181
182 if (sk->sk_state != TCP_ESTABLISHED) {
183 retv = -ENOTCONN;
184 break;
185 }
186
187 if (ipv6_only_sock(sk) ||
efe4208f 188 !ipv6_addr_v4mapped(&sk->sk_v6_daddr)) {
1da177e4
LT
189 retv = -EADDRNOTAVAIL;
190 break;
191 }
192
193 fl6_free_socklist(sk);
194 ipv6_sock_mc_close(sk);
195
e6848976
ACM
196 /*
197 * Sock is moving from IPv6 to IPv4 (sk_prot), so
198 * remove it from the refcnt debug socks count in the
199 * original family...
200 */
201 sk_refcnt_debug_dec(sk);
202
1da177e4 203 if (sk->sk_protocol == IPPROTO_TCP) {
d83d8461 204 struct inet_connection_sock *icsk = inet_csk(sk);
1da177e4 205 local_bh_disable();
c29a0bc4
PE
206 sock_prot_inuse_add(net, sk->sk_prot, -1);
207 sock_prot_inuse_add(net, &tcp_prot, 1);
1da177e4
LT
208 local_bh_enable();
209 sk->sk_prot = &tcp_prot;
d83d8461 210 icsk->icsk_af_ops = &ipv4_specific;
1da177e4
LT
211 sk->sk_socket->ops = &inet_stream_ops;
212 sk->sk_family = PF_INET;
d83d8461 213 tcp_sync_mss(sk, icsk->icsk_pmtu_cookie);
1da177e4 214 } else {
ba4e58ec
GR
215 struct proto *prot = &udp_prot;
216
db8dac20 217 if (sk->sk_protocol == IPPROTO_UDPLITE)
ba4e58ec 218 prot = &udplite_prot;
1da177e4 219 local_bh_disable();
c29a0bc4
PE
220 sock_prot_inuse_add(net, sk->sk_prot, -1);
221 sock_prot_inuse_add(net, prot, 1);
1da177e4 222 local_bh_enable();
ba4e58ec 223 sk->sk_prot = prot;
1da177e4
LT
224 sk->sk_socket->ops = &inet_dgram_ops;
225 sk->sk_family = PF_INET;
226 }
227 opt = xchg(&np->opt, NULL);
228 if (opt)
229 sock_kfree_s(sk, opt, opt->tot_len);
230 pktopt = xchg(&np->pktoptions, NULL);
800d55f1 231 kfree_skb(pktopt);
1da177e4
LT
232
233 sk->sk_destruct = inet_sock_destruct;
e6848976
ACM
234 /*
235 * ... and add it to the refcnt debug socks count
236 * in the new family. -acme
237 */
238 sk_refcnt_debug_inc(sk);
1da177e4
LT
239 module_put(THIS_MODULE);
240 retv = 0;
241 break;
242 }
243 goto e_inval;
244
245 case IPV6_V6ONLY:
b2a9d7c2 246 if (optlen < sizeof(int) ||
c720c7e8 247 inet_sk(sk)->inet_num)
1da177e4 248 goto e_inval;
9fe516ba 249 sk->sk_ipv6only = valbool;
1da177e4
LT
250 retv = 0;
251 break;
252
333fad53 253 case IPV6_RECVPKTINFO:
b2a9d7c2
YH
254 if (optlen < sizeof(int))
255 goto e_inval;
1da177e4
LT
256 np->rxopt.bits.rxinfo = valbool;
257 retv = 0;
258 break;
1ab1457c 259
333fad53 260 case IPV6_2292PKTINFO:
b2a9d7c2
YH
261 if (optlen < sizeof(int))
262 goto e_inval;
333fad53
YH
263 np->rxopt.bits.rxoinfo = valbool;
264 retv = 0;
265 break;
1da177e4 266
333fad53 267 case IPV6_RECVHOPLIMIT:
b2a9d7c2
YH
268 if (optlen < sizeof(int))
269 goto e_inval;
1da177e4
LT
270 np->rxopt.bits.rxhlim = valbool;
271 retv = 0;
272 break;
273
333fad53 274 case IPV6_2292HOPLIMIT:
b2a9d7c2
YH
275 if (optlen < sizeof(int))
276 goto e_inval;
333fad53
YH
277 np->rxopt.bits.rxohlim = valbool;
278 retv = 0;
279 break;
280
281 case IPV6_RECVRTHDR:
b2a9d7c2
YH
282 if (optlen < sizeof(int))
283 goto e_inval;
4c752098 284 np->rxopt.bits.srcrt = valbool;
1da177e4
LT
285 retv = 0;
286 break;
287
333fad53 288 case IPV6_2292RTHDR:
b2a9d7c2
YH
289 if (optlen < sizeof(int))
290 goto e_inval;
4c752098 291 np->rxopt.bits.osrcrt = valbool;
333fad53
YH
292 retv = 0;
293 break;
294
295 case IPV6_RECVHOPOPTS:
b2a9d7c2
YH
296 if (optlen < sizeof(int))
297 goto e_inval;
1da177e4
LT
298 np->rxopt.bits.hopopts = valbool;
299 retv = 0;
300 break;
301
333fad53 302 case IPV6_2292HOPOPTS:
b2a9d7c2
YH
303 if (optlen < sizeof(int))
304 goto e_inval;
333fad53
YH
305 np->rxopt.bits.ohopopts = valbool;
306 retv = 0;
307 break;
308
309 case IPV6_RECVDSTOPTS:
b2a9d7c2
YH
310 if (optlen < sizeof(int))
311 goto e_inval;
1da177e4
LT
312 np->rxopt.bits.dstopts = valbool;
313 retv = 0;
314 break;
315
333fad53 316 case IPV6_2292DSTOPTS:
b2a9d7c2
YH
317 if (optlen < sizeof(int))
318 goto e_inval;
333fad53
YH
319 np->rxopt.bits.odstopts = valbool;
320 retv = 0;
321 break;
322
41a1f8ea 323 case IPV6_TCLASS:
b2a9d7c2
YH
324 if (optlen < sizeof(int))
325 goto e_inval;
d0ee011f 326 if (val < -1 || val > 0xff)
41a1f8ea 327 goto e_inval;
26ced1e4
GR
328 /* RFC 3542, 6.5: default traffic class of 0x0 */
329 if (val == -1)
330 val = 0;
41a1f8ea
YH
331 np->tclass = val;
332 retv = 0;
333 break;
1ab1457c 334
41a1f8ea 335 case IPV6_RECVTCLASS:
b2a9d7c2
YH
336 if (optlen < sizeof(int))
337 goto e_inval;
41a1f8ea
YH
338 np->rxopt.bits.rxtclass = valbool;
339 retv = 0;
340 break;
341
1da177e4 342 case IPV6_FLOWINFO:
b2a9d7c2
YH
343 if (optlen < sizeof(int))
344 goto e_inval;
1da177e4
LT
345 np->rxopt.bits.rxflow = valbool;
346 retv = 0;
347 break;
348
793b1473
BH
349 case IPV6_RECVPATHMTU:
350 if (optlen < sizeof(int))
351 goto e_inval;
352 np->rxopt.bits.rxpmtu = valbool;
353 retv = 0;
354 break;
355
6c468622 356 case IPV6_TRANSPARENT:
af31f412
EB
357 if (valbool && !ns_capable(net->user_ns, CAP_NET_ADMIN) &&
358 !ns_capable(net->user_ns, CAP_NET_RAW)) {
b889416b
BS
359 retv = -EPERM;
360 break;
361 }
6c468622
BS
362 if (optlen < sizeof(int))
363 goto e_inval;
364 /* we don't have a separate transparent bit for IPV6 we use the one in the IPv4 socket */
365 inet_sk(sk)->transparent = valbool;
366 retv = 0;
367 break;
368
369 case IPV6_RECVORIGDSTADDR:
370 if (optlen < sizeof(int))
371 goto e_inval;
372 np->rxopt.bits.rxorigdstaddr = valbool;
373 retv = 0;
374 break;
375
333fad53
YH
376 case IPV6_HOPOPTS:
377 case IPV6_RTHDRDSTOPTS:
378 case IPV6_RTHDR:
379 case IPV6_DSTOPTS:
380 {
381 struct ipv6_txoptions *opt;
aea7427f
SW
382
383 /* remove any sticky options header with a zero option
384 * length, per RFC3542.
385 */
333fad53 386 if (optlen == 0)
cb422c46 387 optval = NULL;
cfb266c0
YH
388 else if (optval == NULL)
389 goto e_inval;
aea7427f
SW
390 else if (optlen < sizeof(struct ipv6_opt_hdr) ||
391 optlen & 0x7 || optlen > 8 * 255)
392 goto e_inval;
333fad53
YH
393
394 /* hop-by-hop / destination options are privileged option */
395 retv = -EPERM;
af31f412 396 if (optname != IPV6_RTHDR && !ns_capable(net->user_ns, CAP_NET_RAW))
333fad53
YH
397 break;
398
333fad53
YH
399 opt = ipv6_renew_options(sk, np->opt, optname,
400 (struct ipv6_opt_hdr __user *)optval,
401 optlen);
402 if (IS_ERR(opt)) {
403 retv = PTR_ERR(opt);
404 break;
405 }
406
407 /* routing header option needs extra check */
6e093d9d 408 retv = -EINVAL;
dfee0a72 409 if (optname == IPV6_RTHDR && opt && opt->srcrt) {
333fad53 410 struct ipv6_rt_hdr *rthdr = opt->srcrt;
280a9d34 411 switch (rthdr->type) {
07a93626 412#if IS_ENABLED(CONFIG_IPV6_MIP6)
280a9d34 413 case IPV6_SRCRT_TYPE_2:
6e093d9d
BH
414 if (rthdr->hdrlen != 2 ||
415 rthdr->segments_left != 1)
416 goto sticky_done;
417
280a9d34 418 break;
bb4dbf9e 419#endif
280a9d34 420 default:
333fad53 421 goto sticky_done;
280a9d34 422 }
333fad53
YH
423 }
424
425 retv = 0;
e7712f1a 426 opt = ipv6_update_options(sk, opt);
333fad53
YH
427sticky_done:
428 if (opt)
429 sock_kfree_s(sk, opt, opt->tot_len);
430 break;
431 }
432
b24a2516
YH
433 case IPV6_PKTINFO:
434 {
435 struct in6_pktinfo pkt;
436
437 if (optlen == 0)
438 goto e_inval;
439 else if (optlen < sizeof(struct in6_pktinfo) || optval == NULL)
440 goto e_inval;
441
914d1164 442 if (copy_from_user(&pkt, optval, sizeof(struct in6_pktinfo))) {
b24a2516
YH
443 retv = -EFAULT;
444 break;
445 }
446 if (sk->sk_bound_dev_if && pkt.ipi6_ifindex != sk->sk_bound_dev_if)
447 goto e_inval;
448
449 np->sticky_pktinfo.ipi6_ifindex = pkt.ipi6_ifindex;
4e3fd7a0 450 np->sticky_pktinfo.ipi6_addr = pkt.ipi6_addr;
b24a2516
YH
451 retv = 0;
452 break;
453 }
454
333fad53 455 case IPV6_2292PKTOPTIONS:
1da177e4
LT
456 {
457 struct ipv6_txoptions *opt = NULL;
458 struct msghdr msg;
4c9483b2 459 struct flowi6 fl6;
1da177e4
LT
460 int junk;
461
4c9483b2
DM
462 memset(&fl6, 0, sizeof(fl6));
463 fl6.flowi6_oif = sk->sk_bound_dev_if;
464 fl6.flowi6_mark = sk->sk_mark;
1da177e4
LT
465
466 if (optlen == 0)
467 goto update;
468
469 /* 1K is probably excessive
470 * 1K is surely not enough, 2K per standard header is 16K.
471 */
472 retv = -EINVAL;
473 if (optlen > 64*1024)
474 break;
475
476 opt = sock_kmalloc(sk, sizeof(*opt) + optlen, GFP_KERNEL);
477 retv = -ENOBUFS;
478 if (opt == NULL)
479 break;
480
481 memset(opt, 0, sizeof(*opt));
482 opt->tot_len = sizeof(*opt) + optlen;
483 retv = -EFAULT;
484 if (copy_from_user(opt+1, optval, optlen))
485 goto done;
486
487 msg.msg_controllen = optlen;
67ba4152 488 msg.msg_control = (void *)(opt+1);
1da177e4 489
73df66f8
TP
490 retv = ip6_datagram_send_ctl(net, sk, &msg, &fl6, opt, &junk,
491 &junk, &junk);
1da177e4
LT
492 if (retv)
493 goto done;
494update:
495 retv = 0;
e7712f1a 496 opt = ipv6_update_options(sk, opt);
1da177e4
LT
497done:
498 if (opt)
499 sock_kfree_s(sk, opt, opt->tot_len);
500 break;
501 }
502 case IPV6_UNICAST_HOPS:
b2a9d7c2
YH
503 if (optlen < sizeof(int))
504 goto e_inval;
1da177e4
LT
505 if (val > 255 || val < -1)
506 goto e_inval;
507 np->hop_limit = val;
508 retv = 0;
509 break;
510
511 case IPV6_MULTICAST_HOPS:
512 if (sk->sk_type == SOCK_STREAM)
1717699c 513 break;
b2a9d7c2
YH
514 if (optlen < sizeof(int))
515 goto e_inval;
1da177e4
LT
516 if (val > 255 || val < -1)
517 goto e_inval;
2a38e6d5 518 np->mcast_hops = (val == -1 ? IPV6_DEFAULT_MCASTHOPS : val);
1da177e4
LT
519 retv = 0;
520 break;
521
522 case IPV6_MULTICAST_LOOP:
b2a9d7c2
YH
523 if (optlen < sizeof(int))
524 goto e_inval;
28d44882
YH
525 if (val != valbool)
526 goto e_inval;
1da177e4
LT
527 np->mc_loop = valbool;
528 retv = 0;
529 break;
530
c4062dfc
EH
531 case IPV6_UNICAST_IF:
532 {
533 struct net_device *dev = NULL;
534 int ifindex;
535
536 if (optlen != sizeof(int))
537 goto e_inval;
538
539 ifindex = (__force int)ntohl((__force __be32)val);
540 if (ifindex == 0) {
541 np->ucast_oif = 0;
542 retv = 0;
543 break;
544 }
545
546 dev = dev_get_by_index(net, ifindex);
547 retv = -EADDRNOTAVAIL;
548 if (!dev)
549 break;
550 dev_put(dev);
551
552 retv = -EINVAL;
553 if (sk->sk_bound_dev_if)
554 break;
555
556 np->ucast_oif = ifindex;
557 retv = 0;
558 break;
559 }
560
1da177e4
LT
561 case IPV6_MULTICAST_IF:
562 if (sk->sk_type == SOCK_STREAM)
1717699c 563 break;
b2a9d7c2
YH
564 if (optlen < sizeof(int))
565 goto e_inval;
1da177e4 566
4953f0fc 567 if (val) {
55b80503
ED
568 struct net_device *dev;
569
4953f0fc
BH
570 if (sk->sk_bound_dev_if && sk->sk_bound_dev_if != val)
571 goto e_inval;
572
55b80503
ED
573 dev = dev_get_by_index(net, val);
574 if (!dev) {
4953f0fc
BH
575 retv = -ENODEV;
576 break;
577 }
55b80503 578 dev_put(dev);
1da177e4
LT
579 }
580 np->mcast_oif = val;
581 retv = 0;
582 break;
583 case IPV6_ADD_MEMBERSHIP:
584 case IPV6_DROP_MEMBERSHIP:
585 {
586 struct ipv6_mreq mreq;
587
a28398ba
WC
588 if (optlen < sizeof(struct ipv6_mreq))
589 goto e_inval;
590
a96fb49b
FL
591 retv = -EPROTO;
592 if (inet_sk(sk)->is_icsk)
593 break;
594
1da177e4
LT
595 retv = -EFAULT;
596 if (copy_from_user(&mreq, optval, sizeof(struct ipv6_mreq)))
597 break;
598
599 if (optname == IPV6_ADD_MEMBERSHIP)
baf606d9 600 retv = __ipv6_sock_mc_join(sk, mreq.ipv6mr_ifindex, &mreq.ipv6mr_multiaddr);
1da177e4 601 else
baf606d9 602 retv = __ipv6_sock_mc_drop(sk, mreq.ipv6mr_ifindex, &mreq.ipv6mr_multiaddr);
1da177e4
LT
603 break;
604 }
605 case IPV6_JOIN_ANYCAST:
606 case IPV6_LEAVE_ANYCAST:
607 {
608 struct ipv6_mreq mreq;
609
a28398ba 610 if (optlen < sizeof(struct ipv6_mreq))
1da177e4
LT
611 goto e_inval;
612
613 retv = -EFAULT;
614 if (copy_from_user(&mreq, optval, sizeof(struct ipv6_mreq)))
615 break;
616
617 if (optname == IPV6_JOIN_ANYCAST)
618 retv = ipv6_sock_ac_join(sk, mreq.ipv6mr_ifindex, &mreq.ipv6mr_acaddr);
619 else
620 retv = ipv6_sock_ac_drop(sk, mreq.ipv6mr_ifindex, &mreq.ipv6mr_acaddr);
621 break;
622 }
623 case MCAST_JOIN_GROUP:
624 case MCAST_LEAVE_GROUP:
625 {
626 struct group_req greq;
627 struct sockaddr_in6 *psin6;
628
a28398ba
WC
629 if (optlen < sizeof(struct group_req))
630 goto e_inval;
631
1da177e4
LT
632 retv = -EFAULT;
633 if (copy_from_user(&greq, optval, sizeof(struct group_req)))
634 break;
635 if (greq.gr_group.ss_family != AF_INET6) {
636 retv = -EADDRNOTAVAIL;
637 break;
638 }
639 psin6 = (struct sockaddr_in6 *)&greq.gr_group;
640 if (optname == MCAST_JOIN_GROUP)
baf606d9
MRL
641 retv = __ipv6_sock_mc_join(sk, greq.gr_interface,
642 &psin6->sin6_addr);
1da177e4 643 else
baf606d9
MRL
644 retv = __ipv6_sock_mc_drop(sk, greq.gr_interface,
645 &psin6->sin6_addr);
1da177e4
LT
646 break;
647 }
648 case MCAST_JOIN_SOURCE_GROUP:
649 case MCAST_LEAVE_SOURCE_GROUP:
650 case MCAST_BLOCK_SOURCE:
651 case MCAST_UNBLOCK_SOURCE:
652 {
653 struct group_source_req greqs;
654 int omode, add;
655
a28398ba 656 if (optlen < sizeof(struct group_source_req))
1da177e4
LT
657 goto e_inval;
658 if (copy_from_user(&greqs, optval, sizeof(greqs))) {
659 retv = -EFAULT;
660 break;
661 }
662 if (greqs.gsr_group.ss_family != AF_INET6 ||
663 greqs.gsr_source.ss_family != AF_INET6) {
664 retv = -EADDRNOTAVAIL;
665 break;
666 }
667 if (optname == MCAST_BLOCK_SOURCE) {
668 omode = MCAST_EXCLUDE;
669 add = 1;
670 } else if (optname == MCAST_UNBLOCK_SOURCE) {
671 omode = MCAST_EXCLUDE;
672 add = 0;
673 } else if (optname == MCAST_JOIN_SOURCE_GROUP) {
674 struct sockaddr_in6 *psin6;
675
676 psin6 = (struct sockaddr_in6 *)&greqs.gsr_group;
baf606d9
MRL
677 retv = __ipv6_sock_mc_join(sk, greqs.gsr_interface,
678 &psin6->sin6_addr);
c9e3e8b6
DS
679 /* prior join w/ different source is ok */
680 if (retv && retv != -EADDRINUSE)
1da177e4
LT
681 break;
682 omode = MCAST_INCLUDE;
683 add = 1;
c9e3e8b6 684 } else /* MCAST_LEAVE_SOURCE_GROUP */ {
1da177e4
LT
685 omode = MCAST_INCLUDE;
686 add = 0;
687 }
688 retv = ip6_mc_source(add, omode, sk, &greqs);
689 break;
690 }
691 case MCAST_MSFILTER:
692 {
1da177e4
LT
693 struct group_filter *gsf;
694
695 if (optlen < GROUP_FILTER_SIZE(0))
696 goto e_inval;
697 if (optlen > sysctl_optmem_max) {
698 retv = -ENOBUFS;
699 break;
700 }
67ba4152 701 gsf = kmalloc(optlen, GFP_KERNEL);
cfcabdcc 702 if (!gsf) {
1da177e4
LT
703 retv = -ENOBUFS;
704 break;
705 }
706 retv = -EFAULT;
707 if (copy_from_user(gsf, optval, optlen)) {
708 kfree(gsf);
709 break;
710 }
711 /* numsrc >= (4G-140)/128 overflow in 32 bits */
712 if (gsf->gf_numsrc >= 0x1ffffffU ||
713 gsf->gf_numsrc > sysctl_mld_max_msf) {
714 kfree(gsf);
715 retv = -ENOBUFS;
716 break;
717 }
718 if (GROUP_FILTER_SIZE(gsf->gf_numsrc) > optlen) {
719 kfree(gsf);
720 retv = -EINVAL;
721 break;
722 }
723 retv = ip6_mc_msfilter(sk, gsf);
724 kfree(gsf);
725
726 break;
727 }
728 case IPV6_ROUTER_ALERT:
b2a9d7c2
YH
729 if (optlen < sizeof(int))
730 goto e_inval;
725a8ff0 731 retv = ip6_ra_control(sk, val);
1da177e4
LT
732 break;
733 case IPV6_MTU_DISCOVER:
b2a9d7c2
YH
734 if (optlen < sizeof(int))
735 goto e_inval;
0b95227a 736 if (val < IPV6_PMTUDISC_DONT || val > IPV6_PMTUDISC_OMIT)
1da177e4
LT
737 goto e_inval;
738 np->pmtudisc = val;
739 retv = 0;
740 break;
741 case IPV6_MTU:
b2a9d7c2
YH
742 if (optlen < sizeof(int))
743 goto e_inval;
1da177e4
LT
744 if (val && val < IPV6_MIN_MTU)
745 goto e_inval;
746 np->frag_size = val;
747 retv = 0;
748 break;
749 case IPV6_RECVERR:
b2a9d7c2
YH
750 if (optlen < sizeof(int))
751 goto e_inval;
1da177e4
LT
752 np->recverr = valbool;
753 if (!val)
754 skb_queue_purge(&sk->sk_error_queue);
755 retv = 0;
756 break;
757 case IPV6_FLOWINFO_SEND:
b2a9d7c2
YH
758 if (optlen < sizeof(int))
759 goto e_inval;
1da177e4
LT
760 np->sndflow = valbool;
761 retv = 0;
762 break;
763 case IPV6_FLOWLABEL_MGR:
764 retv = ipv6_flowlabel_opt(sk, optval, optlen);
765 break;
766 case IPV6_IPSEC_POLICY:
767 case IPV6_XFRM_POLICY:
6fc0b4a7 768 retv = -EPERM;
af31f412 769 if (!ns_capable(net->user_ns, CAP_NET_ADMIN))
6fc0b4a7 770 break;
1da177e4
LT
771 retv = xfrm_user_policy(sk, optname, optval, optlen);
772 break;
773
7cbca67c
YH
774 case IPV6_ADDR_PREFERENCES:
775 {
776 unsigned int pref = 0;
777 unsigned int prefmask = ~0;
778
b2a9d7c2
YH
779 if (optlen < sizeof(int))
780 goto e_inval;
781
7cbca67c
YH
782 retv = -EINVAL;
783
784 /* check PUBLIC/TMP/PUBTMP_DEFAULT conflicts */
785 switch (val & (IPV6_PREFER_SRC_PUBLIC|
786 IPV6_PREFER_SRC_TMP|
787 IPV6_PREFER_SRC_PUBTMP_DEFAULT)) {
788 case IPV6_PREFER_SRC_PUBLIC:
789 pref |= IPV6_PREFER_SRC_PUBLIC;
790 break;
791 case IPV6_PREFER_SRC_TMP:
792 pref |= IPV6_PREFER_SRC_TMP;
793 break;
794 case IPV6_PREFER_SRC_PUBTMP_DEFAULT:
795 break;
796 case 0:
797 goto pref_skip_pubtmp;
798 default:
799 goto e_inval;
800 }
801
802 prefmask &= ~(IPV6_PREFER_SRC_PUBLIC|
803 IPV6_PREFER_SRC_TMP);
804pref_skip_pubtmp:
805
806 /* check HOME/COA conflicts */
807 switch (val & (IPV6_PREFER_SRC_HOME|IPV6_PREFER_SRC_COA)) {
808 case IPV6_PREFER_SRC_HOME:
809 break;
810 case IPV6_PREFER_SRC_COA:
811 pref |= IPV6_PREFER_SRC_COA;
812 case 0:
813 goto pref_skip_coa;
814 default:
815 goto e_inval;
816 }
817
818 prefmask &= ~IPV6_PREFER_SRC_COA;
819pref_skip_coa:
820
821 /* check CGA/NONCGA conflicts */
822 switch (val & (IPV6_PREFER_SRC_CGA|IPV6_PREFER_SRC_NONCGA)) {
823 case IPV6_PREFER_SRC_CGA:
824 case IPV6_PREFER_SRC_NONCGA:
825 case 0:
826 break;
827 default:
828 goto e_inval;
829 }
830
831 np->srcprefs = (np->srcprefs & prefmask) | pref;
832 retv = 0;
833
834 break;
835 }
e802af9c
SH
836 case IPV6_MINHOPCOUNT:
837 if (optlen < sizeof(int))
838 goto e_inval;
839 if (val < 0 || val > 255)
840 goto e_inval;
841 np->min_hopcount = val;
d4596bad 842 retv = 0;
793b1473
BH
843 break;
844 case IPV6_DONTFRAG:
845 np->dontfrag = valbool;
e802af9c
SH
846 retv = 0;
847 break;
cb1ce2ef
TH
848 case IPV6_AUTOFLOWLABEL:
849 np->autoflowlabel = valbool;
850 retv = 0;
851 break;
1da177e4 852 }
7cbca67c 853
1da177e4 854 release_sock(sk);
baf606d9
MRL
855 if (needs_rtnl)
856 rtnl_unlock();
1da177e4 857
1da177e4
LT
858 return retv;
859
860e_inval:
861 release_sock(sk);
baf606d9
MRL
862 if (needs_rtnl)
863 rtnl_unlock();
1da177e4
LT
864 return -EINVAL;
865}
866
3fdadf7d 867int ipv6_setsockopt(struct sock *sk, int level, int optname,
b7058842 868 char __user *optval, unsigned int optlen)
3fdadf7d
DM
869{
870 int err;
871
872 if (level == SOL_IP && sk->sk_type != SOCK_RAW)
873 return udp_prot.setsockopt(sk, level, optname, optval, optlen);
874
875 if (level != SOL_IPV6)
876 return -ENOPROTOOPT;
877
878 err = do_ipv6_setsockopt(sk, level, optname, optval, optlen);
879#ifdef CONFIG_NETFILTER
880 /* we need to exclude all possible ENOPROTOOPTs except default case */
881 if (err == -ENOPROTOOPT && optname != IPV6_IPSEC_POLICY &&
882 optname != IPV6_XFRM_POLICY) {
883 lock_sock(sk);
884 err = nf_setsockopt(sk, PF_INET6, optname, optval,
885 optlen);
886 release_sock(sk);
887 }
888#endif
889 return err;
890}
7159039a 891EXPORT_SYMBOL(ipv6_setsockopt);
3fdadf7d
DM
892
893#ifdef CONFIG_COMPAT
894int compat_ipv6_setsockopt(struct sock *sk, int level, int optname,
b7058842 895 char __user *optval, unsigned int optlen)
3fdadf7d
DM
896{
897 int err;
898
899 if (level == SOL_IP && sk->sk_type != SOCK_RAW) {
543d9cfe
ACM
900 if (udp_prot.compat_setsockopt != NULL)
901 return udp_prot.compat_setsockopt(sk, level, optname,
902 optval, optlen);
903 return udp_prot.setsockopt(sk, level, optname, optval, optlen);
3fdadf7d
DM
904 }
905
906 if (level != SOL_IPV6)
907 return -ENOPROTOOPT;
908
dae50295
DS
909 if (optname >= MCAST_JOIN_GROUP && optname <= MCAST_MSFILTER)
910 return compat_mc_setsockopt(sk, level, optname, optval, optlen,
911 ipv6_setsockopt);
912
3fdadf7d
DM
913 err = do_ipv6_setsockopt(sk, level, optname, optval, optlen);
914#ifdef CONFIG_NETFILTER
915 /* we need to exclude all possible ENOPROTOOPTs except default case */
916 if (err == -ENOPROTOOPT && optname != IPV6_IPSEC_POLICY &&
543d9cfe 917 optname != IPV6_XFRM_POLICY) {
3fdadf7d 918 lock_sock(sk);
543d9cfe
ACM
919 err = compat_nf_setsockopt(sk, PF_INET6, optname,
920 optval, optlen);
3fdadf7d
DM
921 release_sock(sk);
922 }
923#endif
924 return err;
925}
543d9cfe 926EXPORT_SYMBOL(compat_ipv6_setsockopt);
3fdadf7d
DM
927#endif
928
28693079 929static int ipv6_getsockopt_sticky(struct sock *sk, struct ipv6_txoptions *opt,
4c6510a7 930 int optname, char __user *optval, int len)
333fad53 931{
28693079
DM
932 struct ipv6_opt_hdr *hdr;
933
4c6510a7
YH
934 if (!opt)
935 return 0;
936
67ba4152 937 switch (optname) {
4c6510a7
YH
938 case IPV6_HOPOPTS:
939 hdr = opt->hopopt;
940 break;
941 case IPV6_RTHDRDSTOPTS:
942 hdr = opt->dst0opt;
943 break;
944 case IPV6_RTHDR:
945 hdr = (struct ipv6_opt_hdr *)opt->srcrt;
946 break;
947 case IPV6_DSTOPTS:
948 hdr = opt->dst1opt;
949 break;
950 default:
951 return -EINVAL; /* should not happen */
952 }
953
954 if (!hdr)
333fad53 955 return 0;
28693079 956
d2b02ed9 957 len = min_t(unsigned int, len, ipv6_optlen(hdr));
660adc6e 958 if (copy_to_user(optval, hdr, len))
333fad53 959 return -EFAULT;
95b496b6 960 return len;
333fad53
YH
961}
962
3fdadf7d 963static int do_ipv6_getsockopt(struct sock *sk, int level, int optname,
95c96174 964 char __user *optval, int __user *optlen, unsigned int flags)
1da177e4
LT
965{
966 struct ipv6_pinfo *np = inet6_sk(sk);
967 int len;
968 int val;
969
7bc570c8
YH
970 if (ip6_mroute_opt(optname))
971 return ip6_mroute_getsockopt(sk, optname, optval, optlen);
972
1da177e4
LT
973 if (get_user(len, optlen))
974 return -EFAULT;
975 switch (optname) {
976 case IPV6_ADDRFORM:
977 if (sk->sk_protocol != IPPROTO_UDP &&
ba4e58ec 978 sk->sk_protocol != IPPROTO_UDPLITE &&
1da177e4 979 sk->sk_protocol != IPPROTO_TCP)
1717699c 980 return -ENOPROTOOPT;
1da177e4
LT
981 if (sk->sk_state != TCP_ESTABLISHED)
982 return -ENOTCONN;
983 val = sk->sk_family;
984 break;
985 case MCAST_MSFILTER:
986 {
987 struct group_filter gsf;
988 int err;
989
990 if (len < GROUP_FILTER_SIZE(0))
991 return -EINVAL;
992 if (copy_from_user(&gsf, optval, GROUP_FILTER_SIZE(0)))
993 return -EFAULT;
20c61fbd
YH
994 if (gsf.gf_group.ss_family != AF_INET6)
995 return -EADDRNOTAVAIL;
1da177e4
LT
996 lock_sock(sk);
997 err = ip6_mc_msfget(sk, &gsf,
998 (struct group_filter __user *)optval, optlen);
999 release_sock(sk);
1000 return err;
1001 }
1002
333fad53 1003 case IPV6_2292PKTOPTIONS:
1da177e4
LT
1004 {
1005 struct msghdr msg;
1006 struct sk_buff *skb;
1007
1008 if (sk->sk_type != SOCK_STREAM)
1009 return -ENOPROTOOPT;
1010
1011 msg.msg_control = optval;
1012 msg.msg_controllen = len;
98e77438 1013 msg.msg_flags = flags;
1da177e4
LT
1014
1015 lock_sock(sk);
1016 skb = np->pktoptions;
1017 if (skb)
4b261c75 1018 ip6_datagram_recv_ctl(sk, &msg, skb);
1dc7b90f
ED
1019 release_sock(sk);
1020 if (!skb) {
1da177e4
LT
1021 if (np->rxopt.bits.rxinfo) {
1022 struct in6_pktinfo src_info;
f250dcda
YH
1023 src_info.ipi6_ifindex = np->mcast_oif ? np->mcast_oif :
1024 np->sticky_pktinfo.ipi6_ifindex;
efe4208f 1025 src_info.ipi6_addr = np->mcast_oif ? sk->sk_v6_daddr : np->sticky_pktinfo.ipi6_addr;
1da177e4
LT
1026 put_cmsg(&msg, SOL_IPV6, IPV6_PKTINFO, sizeof(src_info), &src_info);
1027 }
1028 if (np->rxopt.bits.rxhlim) {
1029 int hlim = np->mcast_hops;
1030 put_cmsg(&msg, SOL_IPV6, IPV6_HOPLIMIT, sizeof(hlim), &hlim);
1031 }
4c507d28 1032 if (np->rxopt.bits.rxtclass) {
d76ed22b
LR
1033 int tclass = (int)ip6_tclass(np->rcv_flowinfo);
1034
4c507d28
JB
1035 put_cmsg(&msg, SOL_IPV6, IPV6_TCLASS, sizeof(tclass), &tclass);
1036 }
333fad53
YH
1037 if (np->rxopt.bits.rxoinfo) {
1038 struct in6_pktinfo src_info;
f250dcda
YH
1039 src_info.ipi6_ifindex = np->mcast_oif ? np->mcast_oif :
1040 np->sticky_pktinfo.ipi6_ifindex;
efe4208f
ED
1041 src_info.ipi6_addr = np->mcast_oif ? sk->sk_v6_daddr :
1042 np->sticky_pktinfo.ipi6_addr;
333fad53
YH
1043 put_cmsg(&msg, SOL_IPV6, IPV6_2292PKTINFO, sizeof(src_info), &src_info);
1044 }
1045 if (np->rxopt.bits.rxohlim) {
1046 int hlim = np->mcast_hops;
1047 put_cmsg(&msg, SOL_IPV6, IPV6_2292HOPLIMIT, sizeof(hlim), &hlim);
1048 }
1397ed35 1049 if (np->rxopt.bits.rxflow) {
68536053
FF
1050 __be32 flowinfo = np->rcv_flowinfo;
1051
1397ed35
FF
1052 put_cmsg(&msg, SOL_IPV6, IPV6_FLOWINFO, sizeof(flowinfo), &flowinfo);
1053 }
1da177e4
LT
1054 }
1055 len -= msg.msg_controllen;
1056 return put_user(len, optlen);
1057 }
1058 case IPV6_MTU:
1059 {
1060 struct dst_entry *dst;
b6c6712a 1061
1ab1457c 1062 val = 0;
b6c6712a
ED
1063 rcu_read_lock();
1064 dst = __sk_dst_get(sk);
1065 if (dst)
1da177e4 1066 val = dst_mtu(dst);
b6c6712a 1067 rcu_read_unlock();
1da177e4
LT
1068 if (!val)
1069 return -ENOTCONN;
1070 break;
1071 }
1072
1073 case IPV6_V6ONLY:
9fe516ba 1074 val = sk->sk_ipv6only;
1da177e4
LT
1075 break;
1076
333fad53 1077 case IPV6_RECVPKTINFO:
1da177e4
LT
1078 val = np->rxopt.bits.rxinfo;
1079 break;
1080
333fad53
YH
1081 case IPV6_2292PKTINFO:
1082 val = np->rxopt.bits.rxoinfo;
1083 break;
1084
1085 case IPV6_RECVHOPLIMIT:
1da177e4
LT
1086 val = np->rxopt.bits.rxhlim;
1087 break;
1088
333fad53
YH
1089 case IPV6_2292HOPLIMIT:
1090 val = np->rxopt.bits.rxohlim;
1091 break;
1092
1093 case IPV6_RECVRTHDR:
1da177e4
LT
1094 val = np->rxopt.bits.srcrt;
1095 break;
1096
333fad53
YH
1097 case IPV6_2292RTHDR:
1098 val = np->rxopt.bits.osrcrt;
1099 break;
1100
1da177e4 1101 case IPV6_HOPOPTS:
333fad53
YH
1102 case IPV6_RTHDRDSTOPTS:
1103 case IPV6_RTHDR:
1104 case IPV6_DSTOPTS:
1105 {
1106
1107 lock_sock(sk);
28693079 1108 len = ipv6_getsockopt_sticky(sk, np->opt,
4c6510a7 1109 optname, optval, len);
333fad53 1110 release_sock(sk);
05335c22
YH
1111 /* check if ipv6_getsockopt_sticky() returns err code */
1112 if (len < 0)
1113 return len;
333fad53
YH
1114 return put_user(len, optlen);
1115 }
1116
1117 case IPV6_RECVHOPOPTS:
1da177e4
LT
1118 val = np->rxopt.bits.hopopts;
1119 break;
1120
333fad53
YH
1121 case IPV6_2292HOPOPTS:
1122 val = np->rxopt.bits.ohopopts;
1123 break;
1124
1125 case IPV6_RECVDSTOPTS:
1da177e4
LT
1126 val = np->rxopt.bits.dstopts;
1127 break;
1128
333fad53
YH
1129 case IPV6_2292DSTOPTS:
1130 val = np->rxopt.bits.odstopts;
1131 break;
1132
41a1f8ea
YH
1133 case IPV6_TCLASS:
1134 val = np->tclass;
1135 break;
1136
1137 case IPV6_RECVTCLASS:
1138 val = np->rxopt.bits.rxtclass;
1139 break;
1140
1da177e4
LT
1141 case IPV6_FLOWINFO:
1142 val = np->rxopt.bits.rxflow;
1143 break;
1144
793b1473
BH
1145 case IPV6_RECVPATHMTU:
1146 val = np->rxopt.bits.rxpmtu;
1147 break;
1148
1149 case IPV6_PATHMTU:
1150 {
1151 struct dst_entry *dst;
1152 struct ip6_mtuinfo mtuinfo;
1153
1154 if (len < sizeof(mtuinfo))
1155 return -EINVAL;
1156
1157 len = sizeof(mtuinfo);
1158 memset(&mtuinfo, 0, sizeof(mtuinfo));
1159
1160 rcu_read_lock();
1161 dst = __sk_dst_get(sk);
1162 if (dst)
1163 mtuinfo.ip6m_mtu = dst_mtu(dst);
1164 rcu_read_unlock();
1165 if (!mtuinfo.ip6m_mtu)
1166 return -ENOTCONN;
1167
1168 if (put_user(len, optlen))
1169 return -EFAULT;
1170 if (copy_to_user(optval, &mtuinfo, len))
1171 return -EFAULT;
1172
1173 return 0;
793b1473
BH
1174 }
1175
6c468622
BS
1176 case IPV6_TRANSPARENT:
1177 val = inet_sk(sk)->transparent;
1178 break;
1179
1180 case IPV6_RECVORIGDSTADDR:
1181 val = np->rxopt.bits.rxorigdstaddr;
1182 break;
1183
1da177e4 1184 case IPV6_UNICAST_HOPS:
1da177e4 1185 case IPV6_MULTICAST_HOPS:
befffe90
BH
1186 {
1187 struct dst_entry *dst;
1188
1189 if (optname == IPV6_UNICAST_HOPS)
1190 val = np->hop_limit;
1191 else
1192 val = np->mcast_hops;
1193
b6c6712a
ED
1194 if (val < 0) {
1195 rcu_read_lock();
1196 dst = __sk_dst_get(sk);
1197 if (dst)
6b75d090 1198 val = ip6_dst_hoplimit(dst);
b6c6712a 1199 rcu_read_unlock();
befffe90 1200 }
b6c6712a 1201
befffe90 1202 if (val < 0)
53b7997f 1203 val = sock_net(sk)->ipv6.devconf_all->hop_limit;
1da177e4 1204 break;
befffe90 1205 }
1da177e4
LT
1206
1207 case IPV6_MULTICAST_LOOP:
1208 val = np->mc_loop;
1209 break;
1210
1211 case IPV6_MULTICAST_IF:
1212 val = np->mcast_oif;
1213 break;
1214
c4062dfc
EH
1215 case IPV6_UNICAST_IF:
1216 val = (__force int)htonl((__u32) np->ucast_oif);
1217 break;
1218
1da177e4
LT
1219 case IPV6_MTU_DISCOVER:
1220 val = np->pmtudisc;
1221 break;
1222
1223 case IPV6_RECVERR:
1224 val = np->recverr;
1225 break;
1226
1227 case IPV6_FLOWINFO_SEND:
1228 val = np->sndflow;
1229 break;
1230
3fdfa5ff
FF
1231 case IPV6_FLOWLABEL_MGR:
1232 {
1233 struct in6_flowlabel_req freq;
46e5f401 1234 int flags;
3fdfa5ff
FF
1235
1236 if (len < sizeof(freq))
1237 return -EINVAL;
1238
1239 if (copy_from_user(&freq, optval, sizeof(freq)))
1240 return -EFAULT;
1241
1242 if (freq.flr_action != IPV6_FL_A_GET)
1243 return -EINVAL;
1244
1245 len = sizeof(freq);
46e5f401
FF
1246 flags = freq.flr_flags;
1247
3fdfa5ff
FF
1248 memset(&freq, 0, sizeof(freq));
1249
46e5f401 1250 val = ipv6_flowlabel_opt_get(sk, &freq, flags);
3fdfa5ff
FF
1251 if (val < 0)
1252 return val;
1253
1254 if (put_user(len, optlen))
1255 return -EFAULT;
1256 if (copy_to_user(optval, &freq, len))
1257 return -EFAULT;
1258
1259 return 0;
1260 }
1261
7cbca67c
YH
1262 case IPV6_ADDR_PREFERENCES:
1263 val = 0;
1264
1265 if (np->srcprefs & IPV6_PREFER_SRC_TMP)
1266 val |= IPV6_PREFER_SRC_TMP;
1267 else if (np->srcprefs & IPV6_PREFER_SRC_PUBLIC)
1268 val |= IPV6_PREFER_SRC_PUBLIC;
1269 else {
1270 /* XXX: should we return system default? */
1271 val |= IPV6_PREFER_SRC_PUBTMP_DEFAULT;
1272 }
1273
1274 if (np->srcprefs & IPV6_PREFER_SRC_COA)
1275 val |= IPV6_PREFER_SRC_COA;
1276 else
1277 val |= IPV6_PREFER_SRC_HOME;
1278 break;
e802af9c
SH
1279
1280 case IPV6_MINHOPCOUNT:
1281 val = np->min_hopcount;
1282 break;
793b1473
BH
1283
1284 case IPV6_DONTFRAG:
1285 val = np->dontfrag;
1286 break;
7cbca67c 1287
cb1ce2ef
TH
1288 case IPV6_AUTOFLOWLABEL:
1289 val = np->autoflowlabel;
1290 break;
1291
1da177e4 1292 default:
cf6fc4a9 1293 return -ENOPROTOOPT;
1da177e4
LT
1294 }
1295 len = min_t(unsigned int, sizeof(int), len);
67ba4152 1296 if (put_user(len, optlen))
1da177e4 1297 return -EFAULT;
67ba4152 1298 if (copy_to_user(optval, &val, len))
1da177e4
LT
1299 return -EFAULT;
1300 return 0;
1301}
1302
3fdadf7d
DM
1303int ipv6_getsockopt(struct sock *sk, int level, int optname,
1304 char __user *optval, int __user *optlen)
1305{
1306 int err;
1307
1308 if (level == SOL_IP && sk->sk_type != SOCK_RAW)
1309 return udp_prot.getsockopt(sk, level, optname, optval, optlen);
1310
67ba4152 1311 if (level != SOL_IPV6)
3fdadf7d
DM
1312 return -ENOPROTOOPT;
1313
98e77438 1314 err = do_ipv6_getsockopt(sk, level, optname, optval, optlen, 0);
3fdadf7d 1315#ifdef CONFIG_NETFILTER
cf6fc4a9
WY
1316 /* we need to exclude all possible ENOPROTOOPTs except default case */
1317 if (err == -ENOPROTOOPT && optname != IPV6_2292PKTOPTIONS) {
3fdadf7d
DM
1318 int len;
1319
1320 if (get_user(len, optlen))
1321 return -EFAULT;
1322
1323 lock_sock(sk);
1324 err = nf_getsockopt(sk, PF_INET6, optname, optval,
1325 &len);
1326 release_sock(sk);
1327 if (err >= 0)
1328 err = put_user(len, optlen);
1329 }
1330#endif
1331 return err;
1332}
7159039a
YH
1333EXPORT_SYMBOL(ipv6_getsockopt);
1334
3fdadf7d
DM
1335#ifdef CONFIG_COMPAT
1336int compat_ipv6_getsockopt(struct sock *sk, int level, int optname,
543d9cfe 1337 char __user *optval, int __user *optlen)
3fdadf7d
DM
1338{
1339 int err;
1340
1341 if (level == SOL_IP && sk->sk_type != SOCK_RAW) {
543d9cfe
ACM
1342 if (udp_prot.compat_getsockopt != NULL)
1343 return udp_prot.compat_getsockopt(sk, level, optname,
1344 optval, optlen);
1345 return udp_prot.getsockopt(sk, level, optname, optval, optlen);
3fdadf7d
DM
1346 }
1347
543d9cfe 1348 if (level != SOL_IPV6)
3fdadf7d
DM
1349 return -ENOPROTOOPT;
1350
80991790
PE
1351 if (optname == MCAST_MSFILTER)
1352 return compat_mc_getsockopt(sk, level, optname, optval, optlen,
1353 ipv6_getsockopt);
1354
98e77438
DB
1355 err = do_ipv6_getsockopt(sk, level, optname, optval, optlen,
1356 MSG_CMSG_COMPAT);
3fdadf7d 1357#ifdef CONFIG_NETFILTER
cf6fc4a9
WY
1358 /* we need to exclude all possible ENOPROTOOPTs except default case */
1359 if (err == -ENOPROTOOPT && optname != IPV6_2292PKTOPTIONS) {
3fdadf7d
DM
1360 int len;
1361
1362 if (get_user(len, optlen))
1363 return -EFAULT;
1364
1365 lock_sock(sk);
543d9cfe
ACM
1366 err = compat_nf_getsockopt(sk, PF_INET6,
1367 optname, optval, &len);
3fdadf7d
DM
1368 release_sock(sk);
1369 if (err >= 0)
1370 err = put_user(len, optlen);
1371 }
1372#endif
1373 return err;
1374}
543d9cfe 1375EXPORT_SYMBOL(compat_ipv6_getsockopt);
3fdadf7d
DM
1376#endif
1377
This page took 1.268381 seconds and 5 git commands to generate.