3 * Linux INET6 implementation
6 * Pedro Roque <roque@di.fc.ul.pt>
8 * Adapted from linux/net/ipv4/raw.c
10 * $Id: raw.c,v 1.51 2002/02/01 22:01:04 davem Exp $
13 * Hideaki YOSHIFUJI : sin6_scope_id support
14 * YOSHIFUJI,H.@USAGI : raw checksum (RFC2292(bis) compliance)
15 * Kazunori MIYAZAWA @USAGI: change process style to use ip6_append_data
17 * This program is free software; you can redistribute it and/or
18 * modify it under the terms of the GNU General Public License
19 * as published by the Free Software Foundation; either version
20 * 2 of the License, or (at your option) any later version.
23 #include <linux/errno.h>
24 #include <linux/types.h>
25 #include <linux/socket.h>
26 #include <linux/sockios.h>
27 #include <linux/net.h>
28 #include <linux/in6.h>
29 #include <linux/netdevice.h>
30 #include <linux/if_arp.h>
31 #include <linux/icmpv6.h>
32 #include <linux/netfilter.h>
33 #include <linux/netfilter_ipv6.h>
34 #include <linux/skbuff.h>
35 #include <asm/uaccess.h>
36 #include <asm/ioctls.h>
38 #include <net/net_namespace.h>
44 #include <net/ndisc.h>
45 #include <net/protocol.h>
46 #include <net/ip6_route.h>
47 #include <net/ip6_checksum.h>
48 #include <net/addrconf.h>
49 #include <net/transp_v6.h>
51 #include <net/inet_common.h>
52 #include <net/tcp_states.h>
53 #if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
58 #include <net/rawv6.h>
61 #include <linux/proc_fs.h>
62 #include <linux/seq_file.h>
64 static struct raw_hashinfo raw_v6_hashinfo
= {
65 .lock
= __RW_LOCK_UNLOCKED(raw_v6_hashinfo
.lock
),
68 static struct sock
*__raw_v6_lookup(struct net
*net
, struct sock
*sk
,
69 unsigned short num
, struct in6_addr
*loc_addr
,
70 struct in6_addr
*rmt_addr
, int dif
)
72 struct hlist_node
*node
;
73 int is_multicast
= ipv6_addr_is_multicast(loc_addr
);
75 sk_for_each_from(sk
, node
)
76 if (inet_sk(sk
)->num
== num
) {
77 struct ipv6_pinfo
*np
= inet6_sk(sk
);
79 if (sock_net(sk
) != net
)
82 if (!ipv6_addr_any(&np
->daddr
) &&
83 !ipv6_addr_equal(&np
->daddr
, rmt_addr
))
86 if (sk
->sk_bound_dev_if
&& sk
->sk_bound_dev_if
!= dif
)
89 if (!ipv6_addr_any(&np
->rcv_saddr
)) {
90 if (ipv6_addr_equal(&np
->rcv_saddr
, loc_addr
))
93 inet6_mc_check(sk
, loc_addr
, rmt_addr
))
108 static __inline__
int icmpv6_filter(struct sock
*sk
, struct sk_buff
*skb
)
110 struct icmp6hdr
*icmph
;
111 struct raw6_sock
*rp
= raw6_sk(sk
);
113 if (pskb_may_pull(skb
, sizeof(struct icmp6hdr
))) {
114 __u32
*data
= &rp
->filter
.data
[0];
117 icmph
= (struct icmp6hdr
*) skb
->data
;
118 bit_nr
= icmph
->icmp6_type
;
120 return (data
[bit_nr
>> 5] & (1 << (bit_nr
& 31))) != 0;
125 #if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
126 static int (*mh_filter
)(struct sock
*sock
, struct sk_buff
*skb
);
128 int rawv6_mh_filter_register(int (*filter
)(struct sock
*sock
,
129 struct sk_buff
*skb
))
131 rcu_assign_pointer(mh_filter
, filter
);
134 EXPORT_SYMBOL(rawv6_mh_filter_register
);
136 int rawv6_mh_filter_unregister(int (*filter
)(struct sock
*sock
,
137 struct sk_buff
*skb
))
139 rcu_assign_pointer(mh_filter
, NULL
);
143 EXPORT_SYMBOL(rawv6_mh_filter_unregister
);
148 * demultiplex raw sockets.
149 * (should consider queueing the skb in the sock receive_queue
150 * without calling rawv6.c)
152 * Caller owns SKB so we must make clones.
154 static int ipv6_raw_deliver(struct sk_buff
*skb
, int nexthdr
)
156 struct in6_addr
*saddr
;
157 struct in6_addr
*daddr
;
163 saddr
= &ipv6_hdr(skb
)->saddr
;
166 hash
= nexthdr
& (MAX_INET_PROTOS
- 1);
168 read_lock(&raw_v6_hashinfo
.lock
);
169 sk
= sk_head(&raw_v6_hashinfo
.ht
[hash
]);
172 * The first socket found will be delivered after
173 * delivery to transport protocols.
179 net
= dev_net(skb
->dev
);
180 sk
= __raw_v6_lookup(net
, sk
, nexthdr
, daddr
, saddr
, IP6CB(skb
)->iif
);
188 filtered
= icmpv6_filter(sk
, skb
);
191 #if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
194 /* XXX: To validate MH only once for each packet,
195 * this is placed here. It should be after checking
196 * xfrm policy, however it doesn't. The checking xfrm
197 * policy is placed in rawv6_rcv() because it is
198 * required for each socket.
200 int (*filter
)(struct sock
*sock
, struct sk_buff
*skb
);
202 filter
= rcu_dereference(mh_filter
);
203 filtered
= filter
? filter(sk
, skb
) : 0;
215 struct sk_buff
*clone
= skb_clone(skb
, GFP_ATOMIC
);
217 /* Not releasing hash table! */
220 rawv6_rcv(sk
, clone
);
223 sk
= __raw_v6_lookup(net
, sk_next(sk
), nexthdr
, daddr
, saddr
,
227 read_unlock(&raw_v6_hashinfo
.lock
);
231 int raw6_local_deliver(struct sk_buff
*skb
, int nexthdr
)
235 raw_sk
= sk_head(&raw_v6_hashinfo
.ht
[nexthdr
& (MAX_INET_PROTOS
- 1)]);
236 if (raw_sk
&& !ipv6_raw_deliver(skb
, nexthdr
))
239 return raw_sk
!= NULL
;
242 /* This cleans up af_inet6 a bit. -DaveM */
243 static int rawv6_bind(struct sock
*sk
, struct sockaddr
*uaddr
, int addr_len
)
245 struct inet_sock
*inet
= inet_sk(sk
);
246 struct ipv6_pinfo
*np
= inet6_sk(sk
);
247 struct sockaddr_in6
*addr
= (struct sockaddr_in6
*) uaddr
;
252 if (addr_len
< SIN6_LEN_RFC2133
)
254 addr_type
= ipv6_addr_type(&addr
->sin6_addr
);
256 /* Raw sockets are IPv6 only */
257 if (addr_type
== IPV6_ADDR_MAPPED
)
258 return(-EADDRNOTAVAIL
);
263 if (sk
->sk_state
!= TCP_CLOSE
)
266 /* Check if the address belongs to the host. */
267 if (addr_type
!= IPV6_ADDR_ANY
) {
268 struct net_device
*dev
= NULL
;
270 if (addr_type
& IPV6_ADDR_LINKLOCAL
) {
271 if (addr_len
>= sizeof(struct sockaddr_in6
) &&
272 addr
->sin6_scope_id
) {
273 /* Override any existing binding, if another
274 * one is supplied by user.
276 sk
->sk_bound_dev_if
= addr
->sin6_scope_id
;
279 /* Binding to link-local address requires an interface */
280 if (!sk
->sk_bound_dev_if
)
283 dev
= dev_get_by_index(sock_net(sk
), sk
->sk_bound_dev_if
);
290 /* ipv4 addr of the socket is invalid. Only the
291 * unspecified and mapped address have a v4 equivalent.
293 v4addr
= LOOPBACK4_IPV6
;
294 if (!(addr_type
& IPV6_ADDR_MULTICAST
)) {
295 err
= -EADDRNOTAVAIL
;
296 if (!ipv6_chk_addr(sock_net(sk
), &addr
->sin6_addr
,
307 inet
->rcv_saddr
= inet
->saddr
= v4addr
;
308 ipv6_addr_copy(&np
->rcv_saddr
, &addr
->sin6_addr
);
309 if (!(addr_type
& IPV6_ADDR_MULTICAST
))
310 ipv6_addr_copy(&np
->saddr
, &addr
->sin6_addr
);
317 static void rawv6_err(struct sock
*sk
, struct sk_buff
*skb
,
318 struct inet6_skb_parm
*opt
,
319 int type
, int code
, int offset
, __be32 info
)
321 struct inet_sock
*inet
= inet_sk(sk
);
322 struct ipv6_pinfo
*np
= inet6_sk(sk
);
326 /* Report error on raw socket, if:
327 1. User requested recverr.
328 2. Socket is connected (otherwise the error indication
329 is useless without recverr and error is hard.
331 if (!np
->recverr
&& sk
->sk_state
!= TCP_ESTABLISHED
)
334 harderr
= icmpv6_err_convert(type
, code
, &err
);
335 if (type
== ICMPV6_PKT_TOOBIG
)
336 harderr
= (np
->pmtudisc
== IPV6_PMTUDISC_DO
);
339 u8
*payload
= skb
->data
;
342 ipv6_icmp_error(sk
, skb
, err
, 0, ntohl(info
), payload
);
345 if (np
->recverr
|| harderr
) {
347 sk
->sk_error_report(sk
);
351 void raw6_icmp_error(struct sk_buff
*skb
, int nexthdr
,
352 int type
, int code
, int inner_offset
, __be32 info
)
356 struct in6_addr
*saddr
, *daddr
;
359 hash
= nexthdr
& (RAW_HTABLE_SIZE
- 1);
361 read_lock(&raw_v6_hashinfo
.lock
);
362 sk
= sk_head(&raw_v6_hashinfo
.ht
[hash
]);
364 saddr
= &ipv6_hdr(skb
)->saddr
;
365 daddr
= &ipv6_hdr(skb
)->daddr
;
366 net
= dev_net(skb
->dev
);
368 while ((sk
= __raw_v6_lookup(net
, sk
, nexthdr
, saddr
, daddr
,
370 rawv6_err(sk
, skb
, NULL
, type
, code
,
375 read_unlock(&raw_v6_hashinfo
.lock
);
378 static inline int rawv6_rcv_skb(struct sock
* sk
, struct sk_buff
* skb
)
380 if ((raw6_sk(sk
)->checksum
|| sk
->sk_filter
) &&
381 skb_checksum_complete(skb
)) {
382 atomic_inc(&sk
->sk_drops
);
387 /* Charge it to the socket. */
388 if (sock_queue_rcv_skb(sk
,skb
)<0) {
389 atomic_inc(&sk
->sk_drops
);
398 * This is next to useless...
399 * if we demultiplex in network layer we don't need the extra call
400 * just to queue the skb...
401 * maybe we could have the network decide upon a hint if it
402 * should call raw_rcv for demultiplexing
404 int rawv6_rcv(struct sock
*sk
, struct sk_buff
*skb
)
406 struct inet_sock
*inet
= inet_sk(sk
);
407 struct raw6_sock
*rp
= raw6_sk(sk
);
409 if (!xfrm6_policy_check(sk
, XFRM_POLICY_IN
, skb
)) {
410 atomic_inc(&sk
->sk_drops
);
416 skb
->ip_summed
= CHECKSUM_UNNECESSARY
;
418 if (skb
->ip_summed
== CHECKSUM_COMPLETE
) {
419 skb_postpull_rcsum(skb
, skb_network_header(skb
),
420 skb_network_header_len(skb
));
421 if (!csum_ipv6_magic(&ipv6_hdr(skb
)->saddr
,
422 &ipv6_hdr(skb
)->daddr
,
423 skb
->len
, inet
->num
, skb
->csum
))
424 skb
->ip_summed
= CHECKSUM_UNNECESSARY
;
426 if (!skb_csum_unnecessary(skb
))
427 skb
->csum
= ~csum_unfold(csum_ipv6_magic(&ipv6_hdr(skb
)->saddr
,
428 &ipv6_hdr(skb
)->daddr
,
433 if (skb_checksum_complete(skb
)) {
434 atomic_inc(&sk
->sk_drops
);
440 rawv6_rcv_skb(sk
, skb
);
446 * This should be easy, if there is something there
447 * we return it, otherwise we block.
450 static int rawv6_recvmsg(struct kiocb
*iocb
, struct sock
*sk
,
451 struct msghdr
*msg
, size_t len
,
452 int noblock
, int flags
, int *addr_len
)
454 struct ipv6_pinfo
*np
= inet6_sk(sk
);
455 struct sockaddr_in6
*sin6
= (struct sockaddr_in6
*)msg
->msg_name
;
464 *addr_len
=sizeof(*sin6
);
466 if (flags
& MSG_ERRQUEUE
)
467 return ipv6_recv_error(sk
, msg
, len
);
469 skb
= skb_recv_datagram(sk
, flags
, noblock
, &err
);
476 msg
->msg_flags
|= MSG_TRUNC
;
479 if (skb_csum_unnecessary(skb
)) {
480 err
= skb_copy_datagram_iovec(skb
, 0, msg
->msg_iov
, copied
);
481 } else if (msg
->msg_flags
&MSG_TRUNC
) {
482 if (__skb_checksum_complete(skb
))
484 err
= skb_copy_datagram_iovec(skb
, 0, msg
->msg_iov
, copied
);
486 err
= skb_copy_and_csum_datagram_iovec(skb
, 0, msg
->msg_iov
);
493 /* Copy the address. */
495 sin6
->sin6_family
= AF_INET6
;
497 ipv6_addr_copy(&sin6
->sin6_addr
, &ipv6_hdr(skb
)->saddr
);
498 sin6
->sin6_flowinfo
= 0;
499 sin6
->sin6_scope_id
= 0;
500 if (ipv6_addr_type(&sin6
->sin6_addr
) & IPV6_ADDR_LINKLOCAL
)
501 sin6
->sin6_scope_id
= IP6CB(skb
)->iif
;
504 sock_recv_timestamp(msg
, sk
, skb
);
507 datagram_recv_ctl(sk
, msg
, skb
);
510 if (flags
& MSG_TRUNC
)
514 skb_free_datagram(sk
, skb
);
519 skb_kill_datagram(sk
, skb
, flags
);
521 /* Error for blocking case is chosen to masquerade
522 as some normal condition.
524 err
= (flags
&MSG_DONTWAIT
) ? -EAGAIN
: -EHOSTUNREACH
;
525 atomic_inc(&sk
->sk_drops
);
529 static int rawv6_push_pending_frames(struct sock
*sk
, struct flowi
*fl
,
530 struct raw6_sock
*rp
)
543 if ((skb
= skb_peek(&sk
->sk_write_queue
)) == NULL
)
547 total_len
= inet_sk(sk
)->cork
.length
- (skb_network_header(skb
) -
549 if (offset
>= total_len
- 1) {
551 ip6_flush_pending_frames(sk
);
555 /* should be check HW csum miyazawa */
556 if (skb_queue_len(&sk
->sk_write_queue
) == 1) {
558 * Only one fragment on the socket.
560 tmp_csum
= skb
->csum
;
562 struct sk_buff
*csum_skb
= NULL
;
565 skb_queue_walk(&sk
->sk_write_queue
, skb
) {
566 tmp_csum
= csum_add(tmp_csum
, skb
->csum
);
571 len
= skb
->len
- skb_transport_offset(skb
);
583 offset
+= skb_transport_offset(skb
);
584 if (skb_copy_bits(skb
, offset
, &csum
, 2))
587 /* in case cksum was not initialized */
589 tmp_csum
= csum_sub(tmp_csum
, csum_unfold(csum
));
591 csum
= csum_ipv6_magic(&fl
->fl6_src
,
593 total_len
, fl
->proto
, tmp_csum
);
595 if (csum
== 0 && fl
->proto
== IPPROTO_UDP
)
596 csum
= CSUM_MANGLED_0
;
598 if (skb_store_bits(skb
, offset
, &csum
, 2))
602 err
= ip6_push_pending_frames(sk
);
607 static int rawv6_send_hdrinc(struct sock
*sk
, void *from
, int length
,
608 struct flowi
*fl
, struct rt6_info
*rt
,
611 struct ipv6_pinfo
*np
= inet6_sk(sk
);
617 if (length
> rt
->u
.dst
.dev
->mtu
) {
618 ipv6_local_error(sk
, EMSGSIZE
, fl
, rt
->u
.dst
.dev
->mtu
);
624 hh_len
= LL_RESERVED_SPACE(rt
->u
.dst
.dev
);
626 skb
= sock_alloc_send_skb(sk
, length
+hh_len
+15,
627 flags
&MSG_DONTWAIT
, &err
);
630 skb_reserve(skb
, hh_len
);
632 skb
->priority
= sk
->sk_priority
;
633 skb
->mark
= sk
->sk_mark
;
634 skb
->dst
= dst_clone(&rt
->u
.dst
);
636 skb_put(skb
, length
);
637 skb_reset_network_header(skb
);
640 skb
->ip_summed
= CHECKSUM_NONE
;
642 skb
->transport_header
= skb
->network_header
;
643 err
= memcpy_fromiovecend((void *)iph
, from
, 0, length
);
647 IP6_INC_STATS(rt
->rt6i_idev
, IPSTATS_MIB_OUTREQUESTS
);
648 err
= NF_HOOK(PF_INET6
, NF_INET_LOCAL_OUT
, skb
, NULL
, rt
->u
.dst
.dev
,
651 err
= np
->recverr
? net_xmit_errno(err
) : 0;
661 IP6_INC_STATS(rt
->rt6i_idev
, IPSTATS_MIB_OUTDISCARDS
);
665 static int rawv6_probe_proto_opt(struct flowi
*fl
, struct msghdr
*msg
)
668 u8 __user
*type
= NULL
;
669 u8 __user
*code
= NULL
;
677 for (i
= 0; i
< msg
->msg_iovlen
; i
++) {
678 iov
= &msg
->msg_iov
[i
];
684 /* check if one-byte field is readable or not. */
685 if (iov
->iov_base
&& iov
->iov_len
< 1)
689 type
= iov
->iov_base
;
690 /* check if code field is readable or not. */
691 if (iov
->iov_len
> 1)
694 code
= iov
->iov_base
;
697 if (get_user(fl
->fl_icmp_type
, type
) ||
698 get_user(fl
->fl_icmp_code
, code
))
704 if (iov
->iov_base
&& iov
->iov_len
< 1)
706 /* check if type field is readable or not. */
707 if (iov
->iov_len
> 2 - len
) {
708 u8 __user
*p
= iov
->iov_base
;
709 if (get_user(fl
->fl_mh_type
, &p
[2 - len
]))
726 static int rawv6_sendmsg(struct kiocb
*iocb
, struct sock
*sk
,
727 struct msghdr
*msg
, size_t len
)
729 struct ipv6_txoptions opt_space
;
730 struct sockaddr_in6
* sin6
= (struct sockaddr_in6
*) msg
->msg_name
;
731 struct in6_addr
*daddr
, *final_p
= NULL
, final
;
732 struct inet_sock
*inet
= inet_sk(sk
);
733 struct ipv6_pinfo
*np
= inet6_sk(sk
);
734 struct raw6_sock
*rp
= raw6_sk(sk
);
735 struct ipv6_txoptions
*opt
= NULL
;
736 struct ip6_flowlabel
*flowlabel
= NULL
;
737 struct dst_entry
*dst
= NULL
;
739 int addr_len
= msg
->msg_namelen
;
745 /* Rough check on arithmetic overflow,
746 better check is made in ip6_append_data().
751 /* Mirror BSD error message compatibility */
752 if (msg
->msg_flags
& MSG_OOB
)
756 * Get and verify the address.
758 memset(&fl
, 0, sizeof(fl
));
760 fl
.mark
= sk
->sk_mark
;
763 if (addr_len
< SIN6_LEN_RFC2133
)
766 if (sin6
->sin6_family
&& sin6
->sin6_family
!= AF_INET6
)
767 return(-EAFNOSUPPORT
);
769 /* port is the proto value [0..255] carried in nexthdr */
770 proto
= ntohs(sin6
->sin6_port
);
774 else if (proto
!= inet
->num
)
780 daddr
= &sin6
->sin6_addr
;
782 fl
.fl6_flowlabel
= sin6
->sin6_flowinfo
&IPV6_FLOWINFO_MASK
;
783 if (fl
.fl6_flowlabel
&IPV6_FLOWLABEL_MASK
) {
784 flowlabel
= fl6_sock_lookup(sk
, fl
.fl6_flowlabel
);
785 if (flowlabel
== NULL
)
787 daddr
= &flowlabel
->dst
;
792 * Otherwise it will be difficult to maintain
795 if (sk
->sk_state
== TCP_ESTABLISHED
&&
796 ipv6_addr_equal(daddr
, &np
->daddr
))
799 if (addr_len
>= sizeof(struct sockaddr_in6
) &&
800 sin6
->sin6_scope_id
&&
801 ipv6_addr_type(daddr
)&IPV6_ADDR_LINKLOCAL
)
802 fl
.oif
= sin6
->sin6_scope_id
;
804 if (sk
->sk_state
!= TCP_ESTABLISHED
)
805 return -EDESTADDRREQ
;
809 fl
.fl6_flowlabel
= np
->flow_label
;
812 if (ipv6_addr_any(daddr
)) {
814 * unspecified destination address
815 * treated as error... is this correct ?
817 fl6_sock_release(flowlabel
);
822 fl
.oif
= sk
->sk_bound_dev_if
;
824 if (msg
->msg_controllen
) {
826 memset(opt
, 0, sizeof(struct ipv6_txoptions
));
827 opt
->tot_len
= sizeof(struct ipv6_txoptions
);
829 err
= datagram_send_ctl(msg
, &fl
, opt
, &hlimit
, &tclass
);
831 fl6_sock_release(flowlabel
);
834 if ((fl
.fl6_flowlabel
&IPV6_FLOWLABEL_MASK
) && !flowlabel
) {
835 flowlabel
= fl6_sock_lookup(sk
, fl
.fl6_flowlabel
);
836 if (flowlabel
== NULL
)
839 if (!(opt
->opt_nflen
|opt
->opt_flen
))
845 opt
= fl6_merge_options(&opt_space
, flowlabel
, opt
);
846 opt
= ipv6_fixup_options(&opt_space
, opt
);
849 err
= rawv6_probe_proto_opt(&fl
, msg
);
853 ipv6_addr_copy(&fl
.fl6_dst
, daddr
);
854 if (ipv6_addr_any(&fl
.fl6_src
) && !ipv6_addr_any(&np
->saddr
))
855 ipv6_addr_copy(&fl
.fl6_src
, &np
->saddr
);
857 /* merge ip6_build_xmit from ip6_output */
858 if (opt
&& opt
->srcrt
) {
859 struct rt0_hdr
*rt0
= (struct rt0_hdr
*) opt
->srcrt
;
860 ipv6_addr_copy(&final
, &fl
.fl6_dst
);
861 ipv6_addr_copy(&fl
.fl6_dst
, rt0
->addr
);
865 if (!fl
.oif
&& ipv6_addr_is_multicast(&fl
.fl6_dst
))
866 fl
.oif
= np
->mcast_oif
;
867 security_sk_classify_flow(sk
, &fl
);
869 err
= ip6_dst_lookup(sk
, &dst
, &fl
);
873 ipv6_addr_copy(&fl
.fl6_dst
, final_p
);
875 if ((err
= __xfrm_lookup(&dst
, &fl
, sk
, XFRM_LOOKUP_WAIT
)) < 0) {
877 err
= ip6_dst_blackhole(sk
, &dst
, &fl
);
883 if (ipv6_addr_is_multicast(&fl
.fl6_dst
))
884 hlimit
= np
->mcast_hops
;
886 hlimit
= np
->hop_limit
;
888 hlimit
= ip6_dst_hoplimit(dst
);
897 if (msg
->msg_flags
&MSG_CONFIRM
)
902 err
= rawv6_send_hdrinc(sk
, msg
->msg_iov
, len
, &fl
, (struct rt6_info
*)dst
, msg
->msg_flags
);
905 err
= ip6_append_data(sk
, ip_generic_getfrag
, msg
->msg_iov
,
906 len
, 0, hlimit
, tclass
, opt
, &fl
, (struct rt6_info
*)dst
,
910 ip6_flush_pending_frames(sk
);
911 else if (!(msg
->msg_flags
& MSG_MORE
))
912 err
= rawv6_push_pending_frames(sk
, &fl
, rp
);
918 fl6_sock_release(flowlabel
);
919 return err
<0?err
:len
;
922 if (!(msg
->msg_flags
& MSG_PROBE
) || len
)
923 goto back_from_confirm
;
928 static int rawv6_seticmpfilter(struct sock
*sk
, int level
, int optname
,
929 char __user
*optval
, int optlen
)
933 if (optlen
> sizeof(struct icmp6_filter
))
934 optlen
= sizeof(struct icmp6_filter
);
935 if (copy_from_user(&raw6_sk(sk
)->filter
, optval
, optlen
))
945 static int rawv6_geticmpfilter(struct sock
*sk
, int level
, int optname
,
946 char __user
*optval
, int __user
*optlen
)
952 if (get_user(len
, optlen
))
956 if (len
> sizeof(struct icmp6_filter
))
957 len
= sizeof(struct icmp6_filter
);
958 if (put_user(len
, optlen
))
960 if (copy_to_user(optval
, &raw6_sk(sk
)->filter
, len
))
971 static int do_rawv6_setsockopt(struct sock
*sk
, int level
, int optname
,
972 char __user
*optval
, int optlen
)
974 struct raw6_sock
*rp
= raw6_sk(sk
);
977 if (get_user(val
, (int __user
*)optval
))
982 /* You may get strange result with a positive odd offset;
983 RFC2292bis agrees with me. */
984 if (val
> 0 && (val
&1))
997 return(-ENOPROTOOPT
);
1001 static int rawv6_setsockopt(struct sock
*sk
, int level
, int optname
,
1002 char __user
*optval
, int optlen
)
1009 if (inet_sk(sk
)->num
!= IPPROTO_ICMPV6
)
1011 return rawv6_seticmpfilter(sk
, level
, optname
, optval
,
1014 if (optname
== IPV6_CHECKSUM
)
1017 return ipv6_setsockopt(sk
, level
, optname
, optval
,
1021 return do_rawv6_setsockopt(sk
, level
, optname
, optval
, optlen
);
1024 #ifdef CONFIG_COMPAT
1025 static int compat_rawv6_setsockopt(struct sock
*sk
, int level
, int optname
,
1026 char __user
*optval
, int optlen
)
1032 if (inet_sk(sk
)->num
!= IPPROTO_ICMPV6
)
1034 return rawv6_seticmpfilter(sk
, level
, optname
, optval
, optlen
);
1036 if (optname
== IPV6_CHECKSUM
)
1039 return compat_ipv6_setsockopt(sk
, level
, optname
,
1042 return do_rawv6_setsockopt(sk
, level
, optname
, optval
, optlen
);
1046 static int do_rawv6_getsockopt(struct sock
*sk
, int level
, int optname
,
1047 char __user
*optval
, int __user
*optlen
)
1049 struct raw6_sock
*rp
= raw6_sk(sk
);
1052 if (get_user(len
,optlen
))
1057 if (rp
->checksum
== 0)
1064 return -ENOPROTOOPT
;
1067 len
= min_t(unsigned int, sizeof(int), len
);
1069 if (put_user(len
, optlen
))
1071 if (copy_to_user(optval
,&val
,len
))
1076 static int rawv6_getsockopt(struct sock
*sk
, int level
, int optname
,
1077 char __user
*optval
, int __user
*optlen
)
1084 if (inet_sk(sk
)->num
!= IPPROTO_ICMPV6
)
1086 return rawv6_geticmpfilter(sk
, level
, optname
, optval
,
1089 if (optname
== IPV6_CHECKSUM
)
1092 return ipv6_getsockopt(sk
, level
, optname
, optval
,
1096 return do_rawv6_getsockopt(sk
, level
, optname
, optval
, optlen
);
1099 #ifdef CONFIG_COMPAT
1100 static int compat_rawv6_getsockopt(struct sock
*sk
, int level
, int optname
,
1101 char __user
*optval
, int __user
*optlen
)
1107 if (inet_sk(sk
)->num
!= IPPROTO_ICMPV6
)
1109 return rawv6_geticmpfilter(sk
, level
, optname
, optval
, optlen
);
1111 if (optname
== IPV6_CHECKSUM
)
1114 return compat_ipv6_getsockopt(sk
, level
, optname
,
1117 return do_rawv6_getsockopt(sk
, level
, optname
, optval
, optlen
);
1121 static int rawv6_ioctl(struct sock
*sk
, int cmd
, unsigned long arg
)
1126 int amount
= atomic_read(&sk
->sk_wmem_alloc
);
1127 return put_user(amount
, (int __user
*)arg
);
1131 struct sk_buff
*skb
;
1134 spin_lock_bh(&sk
->sk_receive_queue
.lock
);
1135 skb
= skb_peek(&sk
->sk_receive_queue
);
1137 amount
= skb
->tail
- skb
->transport_header
;
1138 spin_unlock_bh(&sk
->sk_receive_queue
.lock
);
1139 return put_user(amount
, (int __user
*)arg
);
1143 return -ENOIOCTLCMD
;
1147 static void rawv6_close(struct sock
*sk
, long timeout
)
1149 if (inet_sk(sk
)->num
== IPPROTO_RAW
)
1150 ip6_ra_control(sk
, -1, NULL
);
1152 sk_common_release(sk
);
1155 static int rawv6_init_sk(struct sock
*sk
)
1157 struct raw6_sock
*rp
= raw6_sk(sk
);
1159 switch (inet_sk(sk
)->num
) {
1160 case IPPROTO_ICMPV6
:
1174 DEFINE_PROTO_INUSE(rawv6
)
1176 struct proto rawv6_prot
= {
1178 .owner
= THIS_MODULE
,
1179 .close
= rawv6_close
,
1180 .connect
= ip6_datagram_connect
,
1181 .disconnect
= udp_disconnect
,
1182 .ioctl
= rawv6_ioctl
,
1183 .init
= rawv6_init_sk
,
1184 .destroy
= inet6_destroy_sock
,
1185 .setsockopt
= rawv6_setsockopt
,
1186 .getsockopt
= rawv6_getsockopt
,
1187 .sendmsg
= rawv6_sendmsg
,
1188 .recvmsg
= rawv6_recvmsg
,
1190 .backlog_rcv
= rawv6_rcv_skb
,
1191 .hash
= raw_hash_sk
,
1192 .unhash
= raw_unhash_sk
,
1193 .obj_size
= sizeof(struct raw6_sock
),
1194 .h
.raw_hash
= &raw_v6_hashinfo
,
1195 #ifdef CONFIG_COMPAT
1196 .compat_setsockopt
= compat_rawv6_setsockopt
,
1197 .compat_getsockopt
= compat_rawv6_getsockopt
,
1199 REF_PROTO_INUSE(rawv6
)
1202 #ifdef CONFIG_PROC_FS
1203 static void raw6_sock_seq_show(struct seq_file
*seq
, struct sock
*sp
, int i
)
1205 struct ipv6_pinfo
*np
= inet6_sk(sp
);
1206 struct in6_addr
*dest
, *src
;
1210 src
= &np
->rcv_saddr
;
1212 srcp
= inet_sk(sp
)->num
;
1214 "%4d: %08X%08X%08X%08X:%04X %08X%08X%08X%08X:%04X "
1215 "%02X %08X:%08X %02X:%08lX %08X %5d %8d %lu %d %p %d\n",
1217 src
->s6_addr32
[0], src
->s6_addr32
[1],
1218 src
->s6_addr32
[2], src
->s6_addr32
[3], srcp
,
1219 dest
->s6_addr32
[0], dest
->s6_addr32
[1],
1220 dest
->s6_addr32
[2], dest
->s6_addr32
[3], destp
,
1222 atomic_read(&sp
->sk_wmem_alloc
),
1223 atomic_read(&sp
->sk_rmem_alloc
),
1227 atomic_read(&sp
->sk_refcnt
), sp
, atomic_read(&sp
->sk_drops
));
1230 static int raw6_seq_show(struct seq_file
*seq
, void *v
)
1232 if (v
== SEQ_START_TOKEN
)
1237 "st tx_queue rx_queue tr tm->when retrnsmt"
1238 " uid timeout inode drops\n");
1240 raw6_sock_seq_show(seq
, v
, raw_seq_private(seq
)->bucket
);
1244 static const struct seq_operations raw6_seq_ops
= {
1245 .start
= raw_seq_start
,
1246 .next
= raw_seq_next
,
1247 .stop
= raw_seq_stop
,
1248 .show
= raw6_seq_show
,
1251 static int raw6_seq_open(struct inode
*inode
, struct file
*file
)
1253 return raw_seq_open(inode
, file
, &raw_v6_hashinfo
, &raw6_seq_ops
);
1256 static const struct file_operations raw6_seq_fops
= {
1257 .owner
= THIS_MODULE
,
1258 .open
= raw6_seq_open
,
1260 .llseek
= seq_lseek
,
1261 .release
= seq_release_net
,
1264 static int raw6_init_net(struct net
*net
)
1266 if (!proc_net_fops_create(net
, "raw6", S_IRUGO
, &raw6_seq_fops
))
1272 static void raw6_exit_net(struct net
*net
)
1274 proc_net_remove(net
, "raw6");
1277 static struct pernet_operations raw6_net_ops
= {
1278 .init
= raw6_init_net
,
1279 .exit
= raw6_exit_net
,
1282 int __init
raw6_proc_init(void)
1284 return register_pernet_subsys(&raw6_net_ops
);
1287 void raw6_proc_exit(void)
1289 unregister_pernet_subsys(&raw6_net_ops
);
1291 #endif /* CONFIG_PROC_FS */
1293 /* Same as inet6_dgram_ops, sans udp_poll. */
1294 static const struct proto_ops inet6_sockraw_ops
= {
1296 .owner
= THIS_MODULE
,
1297 .release
= inet6_release
,
1299 .connect
= inet_dgram_connect
, /* ok */
1300 .socketpair
= sock_no_socketpair
, /* a do nothing */
1301 .accept
= sock_no_accept
, /* a do nothing */
1302 .getname
= inet6_getname
,
1303 .poll
= datagram_poll
, /* ok */
1304 .ioctl
= inet6_ioctl
, /* must change */
1305 .listen
= sock_no_listen
, /* ok */
1306 .shutdown
= inet_shutdown
, /* ok */
1307 .setsockopt
= sock_common_setsockopt
, /* ok */
1308 .getsockopt
= sock_common_getsockopt
, /* ok */
1309 .sendmsg
= inet_sendmsg
, /* ok */
1310 .recvmsg
= sock_common_recvmsg
, /* ok */
1311 .mmap
= sock_no_mmap
,
1312 .sendpage
= sock_no_sendpage
,
1313 #ifdef CONFIG_COMPAT
1314 .compat_setsockopt
= compat_sock_common_setsockopt
,
1315 .compat_getsockopt
= compat_sock_common_getsockopt
,
1319 static struct inet_protosw rawv6_protosw
= {
1321 .protocol
= IPPROTO_IP
, /* wild card */
1322 .prot
= &rawv6_prot
,
1323 .ops
= &inet6_sockraw_ops
,
1324 .capability
= CAP_NET_RAW
,
1325 .no_check
= UDP_CSUM_DEFAULT
,
1326 .flags
= INET_PROTOSW_REUSE
,
1329 int __init
rawv6_init(void)
1333 ret
= inet6_register_protosw(&rawv6_protosw
);
1340 void rawv6_exit(void)
1342 inet6_unregister_protosw(&rawv6_protosw
);