3 * Linux INET6 implementation
6 * Pedro Roque <roque@di.fc.ul.pt>
8 * Adapted from linux/net/ipv4/raw.c
11 * Hideaki YOSHIFUJI : sin6_scope_id support
12 * YOSHIFUJI,H.@USAGI : raw checksum (RFC2292(bis) compliance)
13 * Kazunori MIYAZAWA @USAGI: change process style to use ip6_append_data
15 * This program is free software; you can redistribute it and/or
16 * modify it under the terms of the GNU General Public License
17 * as published by the Free Software Foundation; either version
18 * 2 of the License, or (at your option) any later version.
21 #include <linux/errno.h>
22 #include <linux/types.h>
23 #include <linux/socket.h>
24 #include <linux/slab.h>
25 #include <linux/sockios.h>
26 #include <linux/net.h>
27 #include <linux/in6.h>
28 #include <linux/netdevice.h>
29 #include <linux/if_arp.h>
30 #include <linux/icmpv6.h>
31 #include <linux/netfilter.h>
32 #include <linux/netfilter_ipv6.h>
33 #include <linux/skbuff.h>
34 #include <linux/compat.h>
35 #include <asm/uaccess.h>
36 #include <asm/ioctls.h>
38 #include <net/net_namespace.h>
44 #include <net/ndisc.h>
45 #include <net/protocol.h>
46 #include <net/ip6_route.h>
47 #include <net/ip6_checksum.h>
48 #include <net/addrconf.h>
49 #include <net/transp_v6.h>
51 #include <net/inet_common.h>
52 #include <net/tcp_states.h>
53 #if IS_ENABLED(CONFIG_IPV6_MIP6)
56 #include <linux/mroute6.h>
59 #include <net/rawv6.h>
62 #include <linux/proc_fs.h>
63 #include <linux/seq_file.h>
64 #include <linux/export.h>
66 #define ICMPV6_HDRLEN 4 /* ICMPv6 header, RFC 4443 Section 2.1 */
68 static struct raw_hashinfo raw_v6_hashinfo
= {
69 .lock
= __RW_LOCK_UNLOCKED(raw_v6_hashinfo
.lock
),
72 static struct sock
*__raw_v6_lookup(struct net
*net
, struct sock
*sk
,
73 unsigned short num
, const struct in6_addr
*loc_addr
,
74 const struct in6_addr
*rmt_addr
, int dif
)
76 bool is_multicast
= ipv6_addr_is_multicast(loc_addr
);
79 if (inet_sk(sk
)->inet_num
== num
) {
80 struct ipv6_pinfo
*np
= inet6_sk(sk
);
82 if (!net_eq(sock_net(sk
), net
))
85 if (!ipv6_addr_any(&np
->daddr
) &&
86 !ipv6_addr_equal(&np
->daddr
, rmt_addr
))
89 if (sk
->sk_bound_dev_if
&& sk
->sk_bound_dev_if
!= dif
)
92 if (!ipv6_addr_any(&np
->rcv_saddr
)) {
93 if (ipv6_addr_equal(&np
->rcv_saddr
, loc_addr
))
96 inet6_mc_check(sk
, loc_addr
, rmt_addr
))
111 static int icmpv6_filter(const struct sock
*sk
, const struct sk_buff
*skb
)
113 struct icmp6hdr _hdr
;
114 const struct icmp6hdr
*hdr
;
116 /* We require only the four bytes of the ICMPv6 header, not any
117 * additional bytes of message body in "struct icmp6hdr".
119 hdr
= skb_header_pointer(skb
, skb_transport_offset(skb
),
120 ICMPV6_HDRLEN
, &_hdr
);
122 const __u32
*data
= &raw6_sk(sk
)->filter
.data
[0];
123 unsigned int type
= hdr
->icmp6_type
;
125 return (data
[type
>> 5] & (1U << (type
& 31))) != 0;
130 #if IS_ENABLED(CONFIG_IPV6_MIP6)
131 typedef int mh_filter_t(struct sock
*sock
, struct sk_buff
*skb
);
133 static mh_filter_t __rcu
*mh_filter __read_mostly
;
135 int rawv6_mh_filter_register(mh_filter_t filter
)
137 rcu_assign_pointer(mh_filter
, filter
);
140 EXPORT_SYMBOL(rawv6_mh_filter_register
);
142 int rawv6_mh_filter_unregister(mh_filter_t filter
)
144 RCU_INIT_POINTER(mh_filter
, NULL
);
148 EXPORT_SYMBOL(rawv6_mh_filter_unregister
);
153 * demultiplex raw sockets.
154 * (should consider queueing the skb in the sock receive_queue
155 * without calling rawv6.c)
157 * Caller owns SKB so we must make clones.
159 static bool ipv6_raw_deliver(struct sk_buff
*skb
, int nexthdr
)
161 const struct in6_addr
*saddr
;
162 const struct in6_addr
*daddr
;
164 bool delivered
= false;
168 saddr
= &ipv6_hdr(skb
)->saddr
;
171 hash
= nexthdr
& (RAW_HTABLE_SIZE
- 1);
173 read_lock(&raw_v6_hashinfo
.lock
);
174 sk
= sk_head(&raw_v6_hashinfo
.ht
[hash
]);
179 net
= dev_net(skb
->dev
);
180 sk
= __raw_v6_lookup(net
, sk
, nexthdr
, daddr
, saddr
, IP6CB(skb
)->iif
);
188 filtered
= icmpv6_filter(sk
, skb
);
191 #if IS_ENABLED(CONFIG_IPV6_MIP6)
194 /* XXX: To validate MH only once for each packet,
195 * this is placed here. It should be after checking
196 * xfrm policy, however it doesn't. The checking xfrm
197 * policy is placed in rawv6_rcv() because it is
198 * required for each socket.
202 filter
= rcu_dereference(mh_filter
);
203 filtered
= filter
? (*filter
)(sk
, skb
) : 0;
215 struct sk_buff
*clone
= skb_clone(skb
, GFP_ATOMIC
);
217 /* Not releasing hash table! */
220 rawv6_rcv(sk
, clone
);
223 sk
= __raw_v6_lookup(net
, sk_next(sk
), nexthdr
, daddr
, saddr
,
227 read_unlock(&raw_v6_hashinfo
.lock
);
231 bool raw6_local_deliver(struct sk_buff
*skb
, int nexthdr
)
235 raw_sk
= sk_head(&raw_v6_hashinfo
.ht
[nexthdr
& (RAW_HTABLE_SIZE
- 1)]);
236 if (raw_sk
&& !ipv6_raw_deliver(skb
, nexthdr
))
239 return raw_sk
!= NULL
;
242 /* This cleans up af_inet6 a bit. -DaveM */
243 static int rawv6_bind(struct sock
*sk
, struct sockaddr
*uaddr
, int addr_len
)
245 struct inet_sock
*inet
= inet_sk(sk
);
246 struct ipv6_pinfo
*np
= inet6_sk(sk
);
247 struct sockaddr_in6
*addr
= (struct sockaddr_in6
*) uaddr
;
252 if (addr_len
< SIN6_LEN_RFC2133
)
254 addr_type
= ipv6_addr_type(&addr
->sin6_addr
);
256 /* Raw sockets are IPv6 only */
257 if (addr_type
== IPV6_ADDR_MAPPED
)
258 return -EADDRNOTAVAIL
;
263 if (sk
->sk_state
!= TCP_CLOSE
)
267 /* Check if the address belongs to the host. */
268 if (addr_type
!= IPV6_ADDR_ANY
) {
269 struct net_device
*dev
= NULL
;
271 if (__ipv6_addr_needs_scope_id(addr_type
)) {
272 if (addr_len
>= sizeof(struct sockaddr_in6
) &&
273 addr
->sin6_scope_id
) {
274 /* Override any existing binding, if another
275 * one is supplied by user.
277 sk
->sk_bound_dev_if
= addr
->sin6_scope_id
;
280 /* Binding to link-local address requires an interface */
281 if (!sk
->sk_bound_dev_if
)
285 dev
= dev_get_by_index_rcu(sock_net(sk
),
286 sk
->sk_bound_dev_if
);
291 /* ipv4 addr of the socket is invalid. Only the
292 * unspecified and mapped address have a v4 equivalent.
294 v4addr
= LOOPBACK4_IPV6
;
295 if (!(addr_type
& IPV6_ADDR_MULTICAST
)) {
296 err
= -EADDRNOTAVAIL
;
297 if (!ipv6_chk_addr(sock_net(sk
), &addr
->sin6_addr
,
304 inet
->inet_rcv_saddr
= inet
->inet_saddr
= v4addr
;
305 np
->rcv_saddr
= addr
->sin6_addr
;
306 if (!(addr_type
& IPV6_ADDR_MULTICAST
))
307 np
->saddr
= addr
->sin6_addr
;
316 static void rawv6_err(struct sock
*sk
, struct sk_buff
*skb
,
317 struct inet6_skb_parm
*opt
,
318 u8 type
, u8 code
, int offset
, __be32 info
)
320 struct inet_sock
*inet
= inet_sk(sk
);
321 struct ipv6_pinfo
*np
= inet6_sk(sk
);
325 /* Report error on raw socket, if:
326 1. User requested recverr.
327 2. Socket is connected (otherwise the error indication
328 is useless without recverr and error is hard.
330 if (!np
->recverr
&& sk
->sk_state
!= TCP_ESTABLISHED
)
333 harderr
= icmpv6_err_convert(type
, code
, &err
);
334 if (type
== ICMPV6_PKT_TOOBIG
) {
335 ip6_sk_update_pmtu(skb
, sk
, info
);
336 harderr
= (np
->pmtudisc
== IPV6_PMTUDISC_DO
);
338 if (type
== NDISC_REDIRECT
)
339 ip6_sk_redirect(skb
, sk
);
341 u8
*payload
= skb
->data
;
344 ipv6_icmp_error(sk
, skb
, err
, 0, ntohl(info
), payload
);
347 if (np
->recverr
|| harderr
) {
349 sk
->sk_error_report(sk
);
353 void raw6_icmp_error(struct sk_buff
*skb
, int nexthdr
,
354 u8 type
, u8 code
, int inner_offset
, __be32 info
)
358 const struct in6_addr
*saddr
, *daddr
;
361 hash
= nexthdr
& (RAW_HTABLE_SIZE
- 1);
363 read_lock(&raw_v6_hashinfo
.lock
);
364 sk
= sk_head(&raw_v6_hashinfo
.ht
[hash
]);
366 /* Note: ipv6_hdr(skb) != skb->data */
367 const struct ipv6hdr
*ip6h
= (const struct ipv6hdr
*)skb
->data
;
368 saddr
= &ip6h
->saddr
;
369 daddr
= &ip6h
->daddr
;
370 net
= dev_net(skb
->dev
);
372 while ((sk
= __raw_v6_lookup(net
, sk
, nexthdr
, saddr
, daddr
,
374 rawv6_err(sk
, skb
, NULL
, type
, code
,
379 read_unlock(&raw_v6_hashinfo
.lock
);
382 static inline int rawv6_rcv_skb(struct sock
*sk
, struct sk_buff
*skb
)
384 if ((raw6_sk(sk
)->checksum
|| rcu_access_pointer(sk
->sk_filter
)) &&
385 skb_checksum_complete(skb
)) {
386 atomic_inc(&sk
->sk_drops
);
391 /* Charge it to the socket. */
393 if (sock_queue_rcv_skb(sk
, skb
) < 0) {
402 * This is next to useless...
403 * if we demultiplex in network layer we don't need the extra call
404 * just to queue the skb...
405 * maybe we could have the network decide upon a hint if it
406 * should call raw_rcv for demultiplexing
408 int rawv6_rcv(struct sock
*sk
, struct sk_buff
*skb
)
410 struct inet_sock
*inet
= inet_sk(sk
);
411 struct raw6_sock
*rp
= raw6_sk(sk
);
413 if (!xfrm6_policy_check(sk
, XFRM_POLICY_IN
, skb
)) {
414 atomic_inc(&sk
->sk_drops
);
420 skb
->ip_summed
= CHECKSUM_UNNECESSARY
;
422 if (skb
->ip_summed
== CHECKSUM_COMPLETE
) {
423 skb_postpull_rcsum(skb
, skb_network_header(skb
),
424 skb_network_header_len(skb
));
425 if (!csum_ipv6_magic(&ipv6_hdr(skb
)->saddr
,
426 &ipv6_hdr(skb
)->daddr
,
427 skb
->len
, inet
->inet_num
, skb
->csum
))
428 skb
->ip_summed
= CHECKSUM_UNNECESSARY
;
430 if (!skb_csum_unnecessary(skb
))
431 skb
->csum
= ~csum_unfold(csum_ipv6_magic(&ipv6_hdr(skb
)->saddr
,
432 &ipv6_hdr(skb
)->daddr
,
437 if (skb_checksum_complete(skb
)) {
438 atomic_inc(&sk
->sk_drops
);
444 rawv6_rcv_skb(sk
, skb
);
450 * This should be easy, if there is something there
451 * we return it, otherwise we block.
454 static int rawv6_recvmsg(struct kiocb
*iocb
, struct sock
*sk
,
455 struct msghdr
*msg
, size_t len
,
456 int noblock
, int flags
, int *addr_len
)
458 struct ipv6_pinfo
*np
= inet6_sk(sk
);
459 struct sockaddr_in6
*sin6
= (struct sockaddr_in6
*)msg
->msg_name
;
468 *addr_len
=sizeof(*sin6
);
470 if (flags
& MSG_ERRQUEUE
)
471 return ipv6_recv_error(sk
, msg
, len
);
473 if (np
->rxpmtu
&& np
->rxopt
.bits
.rxpmtu
)
474 return ipv6_recv_rxpmtu(sk
, msg
, len
);
476 skb
= skb_recv_datagram(sk
, flags
, noblock
, &err
);
483 msg
->msg_flags
|= MSG_TRUNC
;
486 if (skb_csum_unnecessary(skb
)) {
487 err
= skb_copy_datagram_iovec(skb
, 0, msg
->msg_iov
, copied
);
488 } else if (msg
->msg_flags
&MSG_TRUNC
) {
489 if (__skb_checksum_complete(skb
))
491 err
= skb_copy_datagram_iovec(skb
, 0, msg
->msg_iov
, copied
);
493 err
= skb_copy_and_csum_datagram_iovec(skb
, 0, msg
->msg_iov
);
500 /* Copy the address. */
502 sin6
->sin6_family
= AF_INET6
;
504 sin6
->sin6_addr
= ipv6_hdr(skb
)->saddr
;
505 sin6
->sin6_flowinfo
= 0;
506 sin6
->sin6_scope_id
= ipv6_iface_scope_id(&sin6
->sin6_addr
,
510 sock_recv_ts_and_drops(msg
, sk
, skb
);
513 ip6_datagram_recv_ctl(sk
, msg
, skb
);
516 if (flags
& MSG_TRUNC
)
520 skb_free_datagram(sk
, skb
);
525 skb_kill_datagram(sk
, skb
, flags
);
527 /* Error for blocking case is chosen to masquerade
528 as some normal condition.
530 err
= (flags
&MSG_DONTWAIT
) ? -EAGAIN
: -EHOSTUNREACH
;
534 static int rawv6_push_pending_frames(struct sock
*sk
, struct flowi6
*fl6
,
535 struct raw6_sock
*rp
)
548 if ((skb
= skb_peek(&sk
->sk_write_queue
)) == NULL
)
552 total_len
= inet_sk(sk
)->cork
.base
.length
;
553 if (offset
>= total_len
- 1) {
555 ip6_flush_pending_frames(sk
);
559 /* should be check HW csum miyazawa */
560 if (skb_queue_len(&sk
->sk_write_queue
) == 1) {
562 * Only one fragment on the socket.
564 tmp_csum
= skb
->csum
;
566 struct sk_buff
*csum_skb
= NULL
;
569 skb_queue_walk(&sk
->sk_write_queue
, skb
) {
570 tmp_csum
= csum_add(tmp_csum
, skb
->csum
);
575 len
= skb
->len
- skb_transport_offset(skb
);
587 offset
+= skb_transport_offset(skb
);
588 if (skb_copy_bits(skb
, offset
, &csum
, 2))
591 /* in case cksum was not initialized */
593 tmp_csum
= csum_sub(tmp_csum
, csum_unfold(csum
));
595 csum
= csum_ipv6_magic(&fl6
->saddr
, &fl6
->daddr
,
596 total_len
, fl6
->flowi6_proto
, tmp_csum
);
598 if (csum
== 0 && fl6
->flowi6_proto
== IPPROTO_UDP
)
599 csum
= CSUM_MANGLED_0
;
601 if (skb_store_bits(skb
, offset
, &csum
, 2))
605 err
= ip6_push_pending_frames(sk
);
610 static int rawv6_send_hdrinc(struct sock
*sk
, void *from
, int length
,
611 struct flowi6
*fl6
, struct dst_entry
**dstp
,
614 struct ipv6_pinfo
*np
= inet6_sk(sk
);
618 struct rt6_info
*rt
= (struct rt6_info
*)*dstp
;
619 int hlen
= LL_RESERVED_SPACE(rt
->dst
.dev
);
620 int tlen
= rt
->dst
.dev
->needed_tailroom
;
622 if (length
> rt
->dst
.dev
->mtu
) {
623 ipv6_local_error(sk
, EMSGSIZE
, fl6
, rt
->dst
.dev
->mtu
);
629 skb
= sock_alloc_send_skb(sk
,
630 length
+ hlen
+ tlen
+ 15,
631 flags
& MSG_DONTWAIT
, &err
);
634 skb_reserve(skb
, hlen
);
636 skb
->protocol
= htons(ETH_P_IPV6
);
637 skb
->priority
= sk
->sk_priority
;
638 skb
->mark
= sk
->sk_mark
;
639 skb_dst_set(skb
, &rt
->dst
);
642 skb_put(skb
, length
);
643 skb_reset_network_header(skb
);
646 skb
->ip_summed
= CHECKSUM_NONE
;
648 skb
->transport_header
= skb
->network_header
;
649 err
= memcpy_fromiovecend((void *)iph
, from
, 0, length
);
653 IP6_UPD_PO_STATS(sock_net(sk
), rt
->rt6i_idev
, IPSTATS_MIB_OUT
, skb
->len
);
654 err
= NF_HOOK(NFPROTO_IPV6
, NF_INET_LOCAL_OUT
, skb
, NULL
,
655 rt
->dst
.dev
, dst_output
);
657 err
= net_xmit_errno(err
);
667 IP6_INC_STATS(sock_net(sk
), rt
->rt6i_idev
, IPSTATS_MIB_OUTDISCARDS
);
668 if (err
== -ENOBUFS
&& !np
->recverr
)
673 static int rawv6_probe_proto_opt(struct flowi6
*fl6
, struct msghdr
*msg
)
676 u8 __user
*type
= NULL
;
677 u8 __user
*code
= NULL
;
685 for (i
= 0; i
< msg
->msg_iovlen
; i
++) {
686 iov
= &msg
->msg_iov
[i
];
690 switch (fl6
->flowi6_proto
) {
692 /* check if one-byte field is readable or not. */
693 if (iov
->iov_base
&& iov
->iov_len
< 1)
697 type
= iov
->iov_base
;
698 /* check if code field is readable or not. */
699 if (iov
->iov_len
> 1)
702 code
= iov
->iov_base
;
705 if (get_user(fl6
->fl6_icmp_type
, type
) ||
706 get_user(fl6
->fl6_icmp_code
, code
))
712 if (iov
->iov_base
&& iov
->iov_len
< 1)
714 /* check if type field is readable or not. */
715 if (iov
->iov_len
> 2 - len
) {
716 u8 __user
*p
= iov
->iov_base
;
717 if (get_user(fl6
->fl6_mh_type
, &p
[2 - len
]))
734 static int rawv6_sendmsg(struct kiocb
*iocb
, struct sock
*sk
,
735 struct msghdr
*msg
, size_t len
)
737 struct ipv6_txoptions opt_space
;
738 struct sockaddr_in6
* sin6
= (struct sockaddr_in6
*) msg
->msg_name
;
739 struct in6_addr
*daddr
, *final_p
, final
;
740 struct inet_sock
*inet
= inet_sk(sk
);
741 struct ipv6_pinfo
*np
= inet6_sk(sk
);
742 struct raw6_sock
*rp
= raw6_sk(sk
);
743 struct ipv6_txoptions
*opt
= NULL
;
744 struct ip6_flowlabel
*flowlabel
= NULL
;
745 struct dst_entry
*dst
= NULL
;
747 int addr_len
= msg
->msg_namelen
;
754 /* Rough check on arithmetic overflow,
755 better check is made in ip6_append_data().
760 /* Mirror BSD error message compatibility */
761 if (msg
->msg_flags
& MSG_OOB
)
765 * Get and verify the address.
767 memset(&fl6
, 0, sizeof(fl6
));
769 fl6
.flowi6_mark
= sk
->sk_mark
;
772 if (addr_len
< SIN6_LEN_RFC2133
)
775 if (sin6
->sin6_family
&& sin6
->sin6_family
!= AF_INET6
)
776 return -EAFNOSUPPORT
;
778 /* port is the proto value [0..255] carried in nexthdr */
779 proto
= ntohs(sin6
->sin6_port
);
782 proto
= inet
->inet_num
;
783 else if (proto
!= inet
->inet_num
)
789 daddr
= &sin6
->sin6_addr
;
791 fl6
.flowlabel
= sin6
->sin6_flowinfo
&IPV6_FLOWINFO_MASK
;
792 if (fl6
.flowlabel
&IPV6_FLOWLABEL_MASK
) {
793 flowlabel
= fl6_sock_lookup(sk
, fl6
.flowlabel
);
794 if (flowlabel
== NULL
)
796 daddr
= &flowlabel
->dst
;
801 * Otherwise it will be difficult to maintain
804 if (sk
->sk_state
== TCP_ESTABLISHED
&&
805 ipv6_addr_equal(daddr
, &np
->daddr
))
808 if (addr_len
>= sizeof(struct sockaddr_in6
) &&
809 sin6
->sin6_scope_id
&&
810 __ipv6_addr_needs_scope_id(__ipv6_addr_type(daddr
)))
811 fl6
.flowi6_oif
= sin6
->sin6_scope_id
;
813 if (sk
->sk_state
!= TCP_ESTABLISHED
)
814 return -EDESTADDRREQ
;
816 proto
= inet
->inet_num
;
818 fl6
.flowlabel
= np
->flow_label
;
821 if (fl6
.flowi6_oif
== 0)
822 fl6
.flowi6_oif
= sk
->sk_bound_dev_if
;
824 if (msg
->msg_controllen
) {
826 memset(opt
, 0, sizeof(struct ipv6_txoptions
));
827 opt
->tot_len
= sizeof(struct ipv6_txoptions
);
829 err
= ip6_datagram_send_ctl(sock_net(sk
), sk
, msg
, &fl6
, opt
,
830 &hlimit
, &tclass
, &dontfrag
);
832 fl6_sock_release(flowlabel
);
835 if ((fl6
.flowlabel
&IPV6_FLOWLABEL_MASK
) && !flowlabel
) {
836 flowlabel
= fl6_sock_lookup(sk
, fl6
.flowlabel
);
837 if (flowlabel
== NULL
)
840 if (!(opt
->opt_nflen
|opt
->opt_flen
))
846 opt
= fl6_merge_options(&opt_space
, flowlabel
, opt
);
847 opt
= ipv6_fixup_options(&opt_space
, opt
);
849 fl6
.flowi6_proto
= proto
;
850 err
= rawv6_probe_proto_opt(&fl6
, msg
);
854 if (!ipv6_addr_any(daddr
))
857 fl6
.daddr
.s6_addr
[15] = 0x1; /* :: means loopback (BSD'ism) */
858 if (ipv6_addr_any(&fl6
.saddr
) && !ipv6_addr_any(&np
->saddr
))
859 fl6
.saddr
= np
->saddr
;
861 final_p
= fl6_update_dst(&fl6
, opt
, &final
);
863 if (!fl6
.flowi6_oif
&& ipv6_addr_is_multicast(&fl6
.daddr
))
864 fl6
.flowi6_oif
= np
->mcast_oif
;
865 else if (!fl6
.flowi6_oif
)
866 fl6
.flowi6_oif
= np
->ucast_oif
;
867 security_sk_classify_flow(sk
, flowi6_to_flowi(&fl6
));
869 dst
= ip6_dst_lookup_flow(sk
, &fl6
, final_p
, true);
875 if (ipv6_addr_is_multicast(&fl6
.daddr
))
876 hlimit
= np
->mcast_hops
;
878 hlimit
= np
->hop_limit
;
880 hlimit
= ip6_dst_hoplimit(dst
);
887 dontfrag
= np
->dontfrag
;
889 if (msg
->msg_flags
&MSG_CONFIRM
)
894 err
= rawv6_send_hdrinc(sk
, msg
->msg_iov
, len
, &fl6
, &dst
, msg
->msg_flags
);
897 err
= ip6_append_data(sk
, ip_generic_getfrag
, msg
->msg_iov
,
898 len
, 0, hlimit
, tclass
, opt
, &fl6
, (struct rt6_info
*)dst
,
899 msg
->msg_flags
, dontfrag
);
902 ip6_flush_pending_frames(sk
);
903 else if (!(msg
->msg_flags
& MSG_MORE
))
904 err
= rawv6_push_pending_frames(sk
, &fl6
, rp
);
910 fl6_sock_release(flowlabel
);
911 return err
<0?err
:len
;
914 if (!(msg
->msg_flags
& MSG_PROBE
) || len
)
915 goto back_from_confirm
;
920 static int rawv6_seticmpfilter(struct sock
*sk
, int level
, int optname
,
921 char __user
*optval
, int optlen
)
925 if (optlen
> sizeof(struct icmp6_filter
))
926 optlen
= sizeof(struct icmp6_filter
);
927 if (copy_from_user(&raw6_sk(sk
)->filter
, optval
, optlen
))
937 static int rawv6_geticmpfilter(struct sock
*sk
, int level
, int optname
,
938 char __user
*optval
, int __user
*optlen
)
944 if (get_user(len
, optlen
))
948 if (len
> sizeof(struct icmp6_filter
))
949 len
= sizeof(struct icmp6_filter
);
950 if (put_user(len
, optlen
))
952 if (copy_to_user(optval
, &raw6_sk(sk
)->filter
, len
))
963 static int do_rawv6_setsockopt(struct sock
*sk
, int level
, int optname
,
964 char __user
*optval
, unsigned int optlen
)
966 struct raw6_sock
*rp
= raw6_sk(sk
);
969 if (get_user(val
, (int __user
*)optval
))
974 if (inet_sk(sk
)->inet_num
== IPPROTO_ICMPV6
&&
975 level
== IPPROTO_IPV6
) {
977 * RFC3542 tells that IPV6_CHECKSUM socket
978 * option in the IPPROTO_IPV6 level is not
979 * allowed on ICMPv6 sockets.
980 * If you want to set it, use IPPROTO_RAW
981 * level IPV6_CHECKSUM socket option
987 /* You may get strange result with a positive odd offset;
988 RFC2292bis agrees with me. */
989 if (val
> 0 && (val
&1))
1001 return -ENOPROTOOPT
;
1005 static int rawv6_setsockopt(struct sock
*sk
, int level
, int optname
,
1006 char __user
*optval
, unsigned int optlen
)
1013 if (inet_sk(sk
)->inet_num
!= IPPROTO_ICMPV6
)
1015 return rawv6_seticmpfilter(sk
, level
, optname
, optval
, optlen
);
1017 if (optname
== IPV6_CHECKSUM
)
1020 return ipv6_setsockopt(sk
, level
, optname
, optval
, optlen
);
1023 return do_rawv6_setsockopt(sk
, level
, optname
, optval
, optlen
);
1026 #ifdef CONFIG_COMPAT
1027 static int compat_rawv6_setsockopt(struct sock
*sk
, int level
, int optname
,
1028 char __user
*optval
, unsigned int optlen
)
1034 if (inet_sk(sk
)->inet_num
!= IPPROTO_ICMPV6
)
1036 return rawv6_seticmpfilter(sk
, level
, optname
, optval
, optlen
);
1038 if (optname
== IPV6_CHECKSUM
)
1041 return compat_ipv6_setsockopt(sk
, level
, optname
,
1044 return do_rawv6_setsockopt(sk
, level
, optname
, optval
, optlen
);
1048 static int do_rawv6_getsockopt(struct sock
*sk
, int level
, int optname
,
1049 char __user
*optval
, int __user
*optlen
)
1051 struct raw6_sock
*rp
= raw6_sk(sk
);
1054 if (get_user(len
,optlen
))
1060 * We allow getsockopt() for IPPROTO_IPV6-level
1061 * IPV6_CHECKSUM socket option on ICMPv6 sockets
1062 * since RFC3542 is silent about it.
1064 if (rp
->checksum
== 0)
1071 return -ENOPROTOOPT
;
1074 len
= min_t(unsigned int, sizeof(int), len
);
1076 if (put_user(len
, optlen
))
1078 if (copy_to_user(optval
,&val
,len
))
1083 static int rawv6_getsockopt(struct sock
*sk
, int level
, int optname
,
1084 char __user
*optval
, int __user
*optlen
)
1091 if (inet_sk(sk
)->inet_num
!= IPPROTO_ICMPV6
)
1093 return rawv6_geticmpfilter(sk
, level
, optname
, optval
, optlen
);
1095 if (optname
== IPV6_CHECKSUM
)
1098 return ipv6_getsockopt(sk
, level
, optname
, optval
, optlen
);
1101 return do_rawv6_getsockopt(sk
, level
, optname
, optval
, optlen
);
1104 #ifdef CONFIG_COMPAT
1105 static int compat_rawv6_getsockopt(struct sock
*sk
, int level
, int optname
,
1106 char __user
*optval
, int __user
*optlen
)
1112 if (inet_sk(sk
)->inet_num
!= IPPROTO_ICMPV6
)
1114 return rawv6_geticmpfilter(sk
, level
, optname
, optval
, optlen
);
1116 if (optname
== IPV6_CHECKSUM
)
1119 return compat_ipv6_getsockopt(sk
, level
, optname
,
1122 return do_rawv6_getsockopt(sk
, level
, optname
, optval
, optlen
);
1126 static int rawv6_ioctl(struct sock
*sk
, int cmd
, unsigned long arg
)
1130 int amount
= sk_wmem_alloc_get(sk
);
1132 return put_user(amount
, (int __user
*)arg
);
1135 struct sk_buff
*skb
;
1138 spin_lock_bh(&sk
->sk_receive_queue
.lock
);
1139 skb
= skb_peek(&sk
->sk_receive_queue
);
1141 amount
= skb_tail_pointer(skb
) -
1142 skb_transport_header(skb
);
1143 spin_unlock_bh(&sk
->sk_receive_queue
.lock
);
1144 return put_user(amount
, (int __user
*)arg
);
1148 #ifdef CONFIG_IPV6_MROUTE
1149 return ip6mr_ioctl(sk
, cmd
, (void __user
*)arg
);
1151 return -ENOIOCTLCMD
;
1156 #ifdef CONFIG_COMPAT
1157 static int compat_rawv6_ioctl(struct sock
*sk
, unsigned int cmd
, unsigned long arg
)
1162 return -ENOIOCTLCMD
;
1164 #ifdef CONFIG_IPV6_MROUTE
1165 return ip6mr_compat_ioctl(sk
, cmd
, compat_ptr(arg
));
1167 return -ENOIOCTLCMD
;
1173 static void rawv6_close(struct sock
*sk
, long timeout
)
1175 if (inet_sk(sk
)->inet_num
== IPPROTO_RAW
)
1176 ip6_ra_control(sk
, -1);
1178 sk_common_release(sk
);
1181 static void raw6_destroy(struct sock
*sk
)
1184 ip6_flush_pending_frames(sk
);
1187 inet6_destroy_sock(sk
);
1190 static int rawv6_init_sk(struct sock
*sk
)
1192 struct raw6_sock
*rp
= raw6_sk(sk
);
1194 switch (inet_sk(sk
)->inet_num
) {
1195 case IPPROTO_ICMPV6
:
1209 struct proto rawv6_prot
= {
1211 .owner
= THIS_MODULE
,
1212 .close
= rawv6_close
,
1213 .destroy
= raw6_destroy
,
1214 .connect
= ip6_datagram_connect
,
1215 .disconnect
= udp_disconnect
,
1216 .ioctl
= rawv6_ioctl
,
1217 .init
= rawv6_init_sk
,
1218 .setsockopt
= rawv6_setsockopt
,
1219 .getsockopt
= rawv6_getsockopt
,
1220 .sendmsg
= rawv6_sendmsg
,
1221 .recvmsg
= rawv6_recvmsg
,
1223 .backlog_rcv
= rawv6_rcv_skb
,
1224 .hash
= raw_hash_sk
,
1225 .unhash
= raw_unhash_sk
,
1226 .obj_size
= sizeof(struct raw6_sock
),
1227 .h
.raw_hash
= &raw_v6_hashinfo
,
1228 #ifdef CONFIG_COMPAT
1229 .compat_setsockopt
= compat_rawv6_setsockopt
,
1230 .compat_getsockopt
= compat_rawv6_getsockopt
,
1231 .compat_ioctl
= compat_rawv6_ioctl
,
1235 #ifdef CONFIG_PROC_FS
1236 static int raw6_seq_show(struct seq_file
*seq
, void *v
)
1238 if (v
== SEQ_START_TOKEN
) {
1239 seq_puts(seq
, IPV6_SEQ_DGRAM_HEADER
);
1241 struct sock
*sp
= v
;
1242 __u16 srcp
= inet_sk(sp
)->inet_num
;
1243 ip6_dgram_sock_seq_show(seq
, v
, srcp
, 0,
1244 raw_seq_private(seq
)->bucket
);
1249 static const struct seq_operations raw6_seq_ops
= {
1250 .start
= raw_seq_start
,
1251 .next
= raw_seq_next
,
1252 .stop
= raw_seq_stop
,
1253 .show
= raw6_seq_show
,
1256 static int raw6_seq_open(struct inode
*inode
, struct file
*file
)
1258 return raw_seq_open(inode
, file
, &raw_v6_hashinfo
, &raw6_seq_ops
);
1261 static const struct file_operations raw6_seq_fops
= {
1262 .owner
= THIS_MODULE
,
1263 .open
= raw6_seq_open
,
1265 .llseek
= seq_lseek
,
1266 .release
= seq_release_net
,
1269 static int __net_init
raw6_init_net(struct net
*net
)
1271 if (!proc_create("raw6", S_IRUGO
, net
->proc_net
, &raw6_seq_fops
))
1277 static void __net_exit
raw6_exit_net(struct net
*net
)
1279 remove_proc_entry("raw6", net
->proc_net
);
1282 static struct pernet_operations raw6_net_ops
= {
1283 .init
= raw6_init_net
,
1284 .exit
= raw6_exit_net
,
1287 int __init
raw6_proc_init(void)
1289 return register_pernet_subsys(&raw6_net_ops
);
1292 void raw6_proc_exit(void)
1294 unregister_pernet_subsys(&raw6_net_ops
);
1296 #endif /* CONFIG_PROC_FS */
1298 /* Same as inet6_dgram_ops, sans udp_poll. */
1299 static const struct proto_ops inet6_sockraw_ops
= {
1301 .owner
= THIS_MODULE
,
1302 .release
= inet6_release
,
1304 .connect
= inet_dgram_connect
, /* ok */
1305 .socketpair
= sock_no_socketpair
, /* a do nothing */
1306 .accept
= sock_no_accept
, /* a do nothing */
1307 .getname
= inet6_getname
,
1308 .poll
= datagram_poll
, /* ok */
1309 .ioctl
= inet6_ioctl
, /* must change */
1310 .listen
= sock_no_listen
, /* ok */
1311 .shutdown
= inet_shutdown
, /* ok */
1312 .setsockopt
= sock_common_setsockopt
, /* ok */
1313 .getsockopt
= sock_common_getsockopt
, /* ok */
1314 .sendmsg
= inet_sendmsg
, /* ok */
1315 .recvmsg
= sock_common_recvmsg
, /* ok */
1316 .mmap
= sock_no_mmap
,
1317 .sendpage
= sock_no_sendpage
,
1318 #ifdef CONFIG_COMPAT
1319 .compat_setsockopt
= compat_sock_common_setsockopt
,
1320 .compat_getsockopt
= compat_sock_common_getsockopt
,
1324 static struct inet_protosw rawv6_protosw
= {
1326 .protocol
= IPPROTO_IP
, /* wild card */
1327 .prot
= &rawv6_prot
,
1328 .ops
= &inet6_sockraw_ops
,
1329 .no_check
= UDP_CSUM_DEFAULT
,
1330 .flags
= INET_PROTOSW_REUSE
,
1333 int __init
rawv6_init(void)
1337 ret
= inet6_register_protosw(&rawv6_protosw
);
1344 void rawv6_exit(void)
1346 inet6_unregister_protosw(&rawv6_protosw
);