3 * Linux INET6 implementation
6 * Pedro Roque <roque@di.fc.ul.pt>
8 * Adapted from linux/net/ipv4/raw.c
10 * $Id: raw.c,v 1.51 2002/02/01 22:01:04 davem Exp $
13 * Hideaki YOSHIFUJI : sin6_scope_id support
14 * YOSHIFUJI,H.@USAGI : raw checksum (RFC2292(bis) compliance)
15 * Kazunori MIYAZAWA @USAGI: change process style to use ip6_append_data
17 * This program is free software; you can redistribute it and/or
18 * modify it under the terms of the GNU General Public License
19 * as published by the Free Software Foundation; either version
20 * 2 of the License, or (at your option) any later version.
23 #include <linux/errno.h>
24 #include <linux/types.h>
25 #include <linux/socket.h>
26 #include <linux/sockios.h>
27 #include <linux/net.h>
28 #include <linux/in6.h>
29 #include <linux/netdevice.h>
30 #include <linux/if_arp.h>
31 #include <linux/icmpv6.h>
32 #include <linux/netfilter.h>
33 #include <linux/netfilter_ipv6.h>
34 #include <linux/skbuff.h>
35 #include <asm/uaccess.h>
36 #include <asm/ioctls.h>
43 #include <net/ndisc.h>
44 #include <net/protocol.h>
45 #include <net/ip6_route.h>
46 #include <net/ip6_checksum.h>
47 #include <net/addrconf.h>
48 #include <net/transp_v6.h>
50 #include <net/inet_common.h>
51 #include <net/tcp_states.h>
52 #ifdef CONFIG_IPV6_MIP6
56 #include <net/rawv6.h>
59 #include <linux/proc_fs.h>
60 #include <linux/seq_file.h>
62 struct hlist_head raw_v6_htable
[RAWV6_HTABLE_SIZE
];
63 DEFINE_RWLOCK(raw_v6_lock
);
65 static void raw_v6_hash(struct sock
*sk
)
67 struct hlist_head
*list
= &raw_v6_htable
[inet_sk(sk
)->num
&
68 (RAWV6_HTABLE_SIZE
- 1)];
70 write_lock_bh(&raw_v6_lock
);
71 sk_add_node(sk
, list
);
72 sock_prot_inc_use(sk
->sk_prot
);
73 write_unlock_bh(&raw_v6_lock
);
76 static void raw_v6_unhash(struct sock
*sk
)
78 write_lock_bh(&raw_v6_lock
);
79 if (sk_del_node_init(sk
))
80 sock_prot_dec_use(sk
->sk_prot
);
81 write_unlock_bh(&raw_v6_lock
);
85 /* Grumble... icmp and ip_input want to get at this... */
86 struct sock
*__raw_v6_lookup(struct sock
*sk
, unsigned short num
,
87 struct in6_addr
*loc_addr
, struct in6_addr
*rmt_addr
,
90 struct hlist_node
*node
;
91 int is_multicast
= ipv6_addr_is_multicast(loc_addr
);
93 sk_for_each_from(sk
, node
)
94 if (inet_sk(sk
)->num
== num
) {
95 struct ipv6_pinfo
*np
= inet6_sk(sk
);
97 if (!ipv6_addr_any(&np
->daddr
) &&
98 !ipv6_addr_equal(&np
->daddr
, rmt_addr
))
101 if (sk
->sk_bound_dev_if
&& sk
->sk_bound_dev_if
!= dif
)
104 if (!ipv6_addr_any(&np
->rcv_saddr
)) {
105 if (ipv6_addr_equal(&np
->rcv_saddr
, loc_addr
))
108 inet6_mc_check(sk
, loc_addr
, rmt_addr
))
123 static __inline__
int icmpv6_filter(struct sock
*sk
, struct sk_buff
*skb
)
125 struct icmp6hdr
*icmph
;
126 struct raw6_sock
*rp
= raw6_sk(sk
);
128 if (pskb_may_pull(skb
, sizeof(struct icmp6hdr
))) {
129 __u32
*data
= &rp
->filter
.data
[0];
132 icmph
= (struct icmp6hdr
*) skb
->data
;
133 bit_nr
= icmph
->icmp6_type
;
135 return (data
[bit_nr
>> 5] & (1 << (bit_nr
& 31))) != 0;
141 * demultiplex raw sockets.
142 * (should consider queueing the skb in the sock receive_queue
143 * without calling rawv6.c)
145 * Caller owns SKB so we must make clones.
147 int ipv6_raw_deliver(struct sk_buff
*skb
, int nexthdr
)
149 struct in6_addr
*saddr
;
150 struct in6_addr
*daddr
;
155 saddr
= &skb
->nh
.ipv6h
->saddr
;
158 hash
= nexthdr
& (MAX_INET_PROTOS
- 1);
160 read_lock(&raw_v6_lock
);
161 sk
= sk_head(&raw_v6_htable
[hash
]);
164 * The first socket found will be delivered after
165 * delivery to transport protocols.
171 sk
= __raw_v6_lookup(sk
, nexthdr
, daddr
, saddr
, IP6CB(skb
)->iif
);
179 filtered
= icmpv6_filter(sk
, skb
);
181 #ifdef CONFIG_IPV6_MIP6
183 /* XXX: To validate MH only once for each packet,
184 * this is placed here. It should be after checking
185 * xfrm policy, however it doesn't. The checking xfrm
186 * policy is placed in rawv6_rcv() because it is
187 * required for each socket.
189 filtered
= mip6_mh_filter(sk
, skb
);
200 struct sk_buff
*clone
= skb_clone(skb
, GFP_ATOMIC
);
202 /* Not releasing hash table! */
205 rawv6_rcv(sk
, clone
);
208 sk
= __raw_v6_lookup(sk_next(sk
), nexthdr
, daddr
, saddr
,
212 read_unlock(&raw_v6_lock
);
216 /* This cleans up af_inet6 a bit. -DaveM */
217 static int rawv6_bind(struct sock
*sk
, struct sockaddr
*uaddr
, int addr_len
)
219 struct inet_sock
*inet
= inet_sk(sk
);
220 struct ipv6_pinfo
*np
= inet6_sk(sk
);
221 struct sockaddr_in6
*addr
= (struct sockaddr_in6
*) uaddr
;
226 if (addr_len
< SIN6_LEN_RFC2133
)
228 addr_type
= ipv6_addr_type(&addr
->sin6_addr
);
230 /* Raw sockets are IPv6 only */
231 if (addr_type
== IPV6_ADDR_MAPPED
)
232 return(-EADDRNOTAVAIL
);
237 if (sk
->sk_state
!= TCP_CLOSE
)
240 /* Check if the address belongs to the host. */
241 if (addr_type
!= IPV6_ADDR_ANY
) {
242 struct net_device
*dev
= NULL
;
244 if (addr_type
& IPV6_ADDR_LINKLOCAL
) {
245 if (addr_len
>= sizeof(struct sockaddr_in6
) &&
246 addr
->sin6_scope_id
) {
247 /* Override any existing binding, if another
248 * one is supplied by user.
250 sk
->sk_bound_dev_if
= addr
->sin6_scope_id
;
253 /* Binding to link-local address requires an interface */
254 if (!sk
->sk_bound_dev_if
)
257 dev
= dev_get_by_index(sk
->sk_bound_dev_if
);
264 /* ipv4 addr of the socket is invalid. Only the
265 * unspecified and mapped address have a v4 equivalent.
267 v4addr
= LOOPBACK4_IPV6
;
268 if (!(addr_type
& IPV6_ADDR_MULTICAST
)) {
269 err
= -EADDRNOTAVAIL
;
270 if (!ipv6_chk_addr(&addr
->sin6_addr
, dev
, 0)) {
280 inet
->rcv_saddr
= inet
->saddr
= v4addr
;
281 ipv6_addr_copy(&np
->rcv_saddr
, &addr
->sin6_addr
);
282 if (!(addr_type
& IPV6_ADDR_MULTICAST
))
283 ipv6_addr_copy(&np
->saddr
, &addr
->sin6_addr
);
290 void rawv6_err(struct sock
*sk
, struct sk_buff
*skb
,
291 struct inet6_skb_parm
*opt
,
292 int type
, int code
, int offset
, __be32 info
)
294 struct inet_sock
*inet
= inet_sk(sk
);
295 struct ipv6_pinfo
*np
= inet6_sk(sk
);
299 /* Report error on raw socket, if:
300 1. User requested recverr.
301 2. Socket is connected (otherwise the error indication
302 is useless without recverr and error is hard.
304 if (!np
->recverr
&& sk
->sk_state
!= TCP_ESTABLISHED
)
307 harderr
= icmpv6_err_convert(type
, code
, &err
);
308 if (type
== ICMPV6_PKT_TOOBIG
)
309 harderr
= (np
->pmtudisc
== IPV6_PMTUDISC_DO
);
312 u8
*payload
= skb
->data
;
315 ipv6_icmp_error(sk
, skb
, err
, 0, ntohl(info
), payload
);
318 if (np
->recverr
|| harderr
) {
320 sk
->sk_error_report(sk
);
324 static inline int rawv6_rcv_skb(struct sock
* sk
, struct sk_buff
* skb
)
326 if ((raw6_sk(sk
)->checksum
|| sk
->sk_filter
) &&
327 skb_checksum_complete(skb
)) {
328 /* FIXME: increment a raw6 drops counter here */
333 /* Charge it to the socket. */
334 if (sock_queue_rcv_skb(sk
,skb
)<0) {
335 /* FIXME: increment a raw6 drops counter here */
344 * This is next to useless...
345 * if we demultiplex in network layer we don't need the extra call
346 * just to queue the skb...
347 * maybe we could have the network decide upon a hint if it
348 * should call raw_rcv for demultiplexing
350 int rawv6_rcv(struct sock
*sk
, struct sk_buff
*skb
)
352 struct inet_sock
*inet
= inet_sk(sk
);
353 struct raw6_sock
*rp
= raw6_sk(sk
);
355 if (!xfrm6_policy_check(sk
, XFRM_POLICY_IN
, skb
)) {
361 skb
->ip_summed
= CHECKSUM_UNNECESSARY
;
363 if (skb
->ip_summed
== CHECKSUM_COMPLETE
) {
364 skb_postpull_rcsum(skb
, skb
->nh
.raw
,
365 skb
->h
.raw
- skb
->nh
.raw
);
366 if (!csum_ipv6_magic(&skb
->nh
.ipv6h
->saddr
,
367 &skb
->nh
.ipv6h
->daddr
,
368 skb
->len
, inet
->num
, skb
->csum
))
369 skb
->ip_summed
= CHECKSUM_UNNECESSARY
;
371 if (skb
->ip_summed
!= CHECKSUM_UNNECESSARY
)
372 skb
->csum
= ~csum_unfold(csum_ipv6_magic(&skb
->nh
.ipv6h
->saddr
,
373 &skb
->nh
.ipv6h
->daddr
,
374 skb
->len
, inet
->num
, 0));
377 if (skb_checksum_complete(skb
)) {
378 /* FIXME: increment a raw6 drops counter here */
384 rawv6_rcv_skb(sk
, skb
);
390 * This should be easy, if there is something there
391 * we return it, otherwise we block.
394 static int rawv6_recvmsg(struct kiocb
*iocb
, struct sock
*sk
,
395 struct msghdr
*msg
, size_t len
,
396 int noblock
, int flags
, int *addr_len
)
398 struct ipv6_pinfo
*np
= inet6_sk(sk
);
399 struct sockaddr_in6
*sin6
= (struct sockaddr_in6
*)msg
->msg_name
;
408 *addr_len
=sizeof(*sin6
);
410 if (flags
& MSG_ERRQUEUE
)
411 return ipv6_recv_error(sk
, msg
, len
);
413 skb
= skb_recv_datagram(sk
, flags
, noblock
, &err
);
420 msg
->msg_flags
|= MSG_TRUNC
;
423 if (skb
->ip_summed
==CHECKSUM_UNNECESSARY
) {
424 err
= skb_copy_datagram_iovec(skb
, 0, msg
->msg_iov
, copied
);
425 } else if (msg
->msg_flags
&MSG_TRUNC
) {
426 if (__skb_checksum_complete(skb
))
428 err
= skb_copy_datagram_iovec(skb
, 0, msg
->msg_iov
, copied
);
430 err
= skb_copy_and_csum_datagram_iovec(skb
, 0, msg
->msg_iov
);
437 /* Copy the address. */
439 sin6
->sin6_family
= AF_INET6
;
441 ipv6_addr_copy(&sin6
->sin6_addr
, &skb
->nh
.ipv6h
->saddr
);
442 sin6
->sin6_flowinfo
= 0;
443 sin6
->sin6_scope_id
= 0;
444 if (ipv6_addr_type(&sin6
->sin6_addr
) & IPV6_ADDR_LINKLOCAL
)
445 sin6
->sin6_scope_id
= IP6CB(skb
)->iif
;
448 sock_recv_timestamp(msg
, sk
, skb
);
451 datagram_recv_ctl(sk
, msg
, skb
);
454 if (flags
& MSG_TRUNC
)
458 skb_free_datagram(sk
, skb
);
463 skb_kill_datagram(sk
, skb
, flags
);
465 /* Error for blocking case is chosen to masquerade
466 as some normal condition.
468 err
= (flags
&MSG_DONTWAIT
) ? -EAGAIN
: -EHOSTUNREACH
;
469 /* FIXME: increment a raw6 drops counter here */
473 static int rawv6_push_pending_frames(struct sock
*sk
, struct flowi
*fl
,
474 struct raw6_sock
*rp
)
487 if ((skb
= skb_peek(&sk
->sk_write_queue
)) == NULL
)
491 total_len
= inet_sk(sk
)->cork
.length
- (skb
->nh
.raw
- skb
->data
);
492 if (offset
>= total_len
- 1) {
494 ip6_flush_pending_frames(sk
);
498 /* should be check HW csum miyazawa */
499 if (skb_queue_len(&sk
->sk_write_queue
) == 1) {
501 * Only one fragment on the socket.
503 tmp_csum
= skb
->csum
;
505 struct sk_buff
*csum_skb
= NULL
;
508 skb_queue_walk(&sk
->sk_write_queue
, skb
) {
509 tmp_csum
= csum_add(tmp_csum
, skb
->csum
);
514 len
= skb
->len
- (skb
->h
.raw
- skb
->data
);
526 offset
+= skb
->h
.raw
- skb
->data
;
527 if (skb_copy_bits(skb
, offset
, &csum
, 2))
530 /* in case cksum was not initialized */
532 tmp_csum
= csum_sub(tmp_csum
, csum_unfold(csum
));
534 csum
= csum_ipv6_magic(&fl
->fl6_src
,
536 total_len
, fl
->proto
, tmp_csum
);
538 if (csum
== 0 && fl
->proto
== IPPROTO_UDP
)
539 csum
= CSUM_MANGLED_0
;
541 if (skb_store_bits(skb
, offset
, &csum
, 2))
545 err
= ip6_push_pending_frames(sk
);
550 static int rawv6_send_hdrinc(struct sock
*sk
, void *from
, int length
,
551 struct flowi
*fl
, struct rt6_info
*rt
,
554 struct ipv6_pinfo
*np
= inet6_sk(sk
);
560 if (length
> rt
->u
.dst
.dev
->mtu
) {
561 ipv6_local_error(sk
, EMSGSIZE
, fl
, rt
->u
.dst
.dev
->mtu
);
567 hh_len
= LL_RESERVED_SPACE(rt
->u
.dst
.dev
);
569 skb
= sock_alloc_send_skb(sk
, length
+hh_len
+15,
570 flags
&MSG_DONTWAIT
, &err
);
573 skb_reserve(skb
, hh_len
);
575 skb
->priority
= sk
->sk_priority
;
576 skb
->dst
= dst_clone(&rt
->u
.dst
);
578 skb
->nh
.ipv6h
= iph
= (struct ipv6hdr
*)skb_put(skb
, length
);
580 skb
->ip_summed
= CHECKSUM_NONE
;
582 skb
->h
.raw
= skb
->nh
.raw
;
583 err
= memcpy_fromiovecend((void *)iph
, from
, 0, length
);
587 IP6_INC_STATS(rt
->rt6i_idev
, IPSTATS_MIB_OUTREQUESTS
);
588 err
= NF_HOOK(PF_INET6
, NF_IP6_LOCAL_OUT
, skb
, NULL
, rt
->u
.dst
.dev
,
591 err
= np
->recverr
? net_xmit_errno(err
) : 0;
601 IP6_INC_STATS(rt
->rt6i_idev
, IPSTATS_MIB_OUTDISCARDS
);
605 static int rawv6_probe_proto_opt(struct flowi
*fl
, struct msghdr
*msg
)
608 u8 __user
*type
= NULL
;
609 u8 __user
*code
= NULL
;
610 #ifdef CONFIG_IPV6_MIP6
619 for (i
= 0; i
< msg
->msg_iovlen
; i
++) {
620 iov
= &msg
->msg_iov
[i
];
626 /* check if one-byte field is readable or not. */
627 if (iov
->iov_base
&& iov
->iov_len
< 1)
631 type
= iov
->iov_base
;
632 /* check if code field is readable or not. */
633 if (iov
->iov_len
> 1)
636 code
= iov
->iov_base
;
639 if (get_user(fl
->fl_icmp_type
, type
) ||
640 get_user(fl
->fl_icmp_code
, code
))
645 #ifdef CONFIG_IPV6_MIP6
647 if (iov
->iov_base
&& iov
->iov_len
< 1)
649 /* check if type field is readable or not. */
650 if (iov
->iov_len
> 2 - len
) {
651 u8 __user
*p
= iov
->iov_base
;
652 if (get_user(fl
->fl_mh_type
, &p
[2 - len
]))
670 static int rawv6_sendmsg(struct kiocb
*iocb
, struct sock
*sk
,
671 struct msghdr
*msg
, size_t len
)
673 struct ipv6_txoptions opt_space
;
674 struct sockaddr_in6
* sin6
= (struct sockaddr_in6
*) msg
->msg_name
;
675 struct in6_addr
*daddr
, *final_p
= NULL
, final
;
676 struct inet_sock
*inet
= inet_sk(sk
);
677 struct ipv6_pinfo
*np
= inet6_sk(sk
);
678 struct raw6_sock
*rp
= raw6_sk(sk
);
679 struct ipv6_txoptions
*opt
= NULL
;
680 struct ip6_flowlabel
*flowlabel
= NULL
;
681 struct dst_entry
*dst
= NULL
;
683 int addr_len
= msg
->msg_namelen
;
689 /* Rough check on arithmetic overflow,
690 better check is made in ip6_append_data().
695 /* Mirror BSD error message compatibility */
696 if (msg
->msg_flags
& MSG_OOB
)
700 * Get and verify the address.
702 memset(&fl
, 0, sizeof(fl
));
705 if (addr_len
< SIN6_LEN_RFC2133
)
708 if (sin6
->sin6_family
&& sin6
->sin6_family
!= AF_INET6
)
709 return(-EAFNOSUPPORT
);
711 /* port is the proto value [0..255] carried in nexthdr */
712 proto
= ntohs(sin6
->sin6_port
);
716 else if (proto
!= inet
->num
)
722 daddr
= &sin6
->sin6_addr
;
724 fl
.fl6_flowlabel
= sin6
->sin6_flowinfo
&IPV6_FLOWINFO_MASK
;
725 if (fl
.fl6_flowlabel
&IPV6_FLOWLABEL_MASK
) {
726 flowlabel
= fl6_sock_lookup(sk
, fl
.fl6_flowlabel
);
727 if (flowlabel
== NULL
)
729 daddr
= &flowlabel
->dst
;
734 * Otherwise it will be difficult to maintain
737 if (sk
->sk_state
== TCP_ESTABLISHED
&&
738 ipv6_addr_equal(daddr
, &np
->daddr
))
741 if (addr_len
>= sizeof(struct sockaddr_in6
) &&
742 sin6
->sin6_scope_id
&&
743 ipv6_addr_type(daddr
)&IPV6_ADDR_LINKLOCAL
)
744 fl
.oif
= sin6
->sin6_scope_id
;
746 if (sk
->sk_state
!= TCP_ESTABLISHED
)
747 return -EDESTADDRREQ
;
751 fl
.fl6_flowlabel
= np
->flow_label
;
754 if (ipv6_addr_any(daddr
)) {
756 * unspecified destination address
757 * treated as error... is this correct ?
759 fl6_sock_release(flowlabel
);
764 fl
.oif
= sk
->sk_bound_dev_if
;
766 if (msg
->msg_controllen
) {
768 memset(opt
, 0, sizeof(struct ipv6_txoptions
));
769 opt
->tot_len
= sizeof(struct ipv6_txoptions
);
771 err
= datagram_send_ctl(msg
, &fl
, opt
, &hlimit
, &tclass
);
773 fl6_sock_release(flowlabel
);
776 if ((fl
.fl6_flowlabel
&IPV6_FLOWLABEL_MASK
) && !flowlabel
) {
777 flowlabel
= fl6_sock_lookup(sk
, fl
.fl6_flowlabel
);
778 if (flowlabel
== NULL
)
781 if (!(opt
->opt_nflen
|opt
->opt_flen
))
787 opt
= fl6_merge_options(&opt_space
, flowlabel
, opt
);
788 opt
= ipv6_fixup_options(&opt_space
, opt
);
791 err
= rawv6_probe_proto_opt(&fl
, msg
);
795 ipv6_addr_copy(&fl
.fl6_dst
, daddr
);
796 if (ipv6_addr_any(&fl
.fl6_src
) && !ipv6_addr_any(&np
->saddr
))
797 ipv6_addr_copy(&fl
.fl6_src
, &np
->saddr
);
799 /* merge ip6_build_xmit from ip6_output */
800 if (opt
&& opt
->srcrt
) {
801 struct rt0_hdr
*rt0
= (struct rt0_hdr
*) opt
->srcrt
;
802 ipv6_addr_copy(&final
, &fl
.fl6_dst
);
803 ipv6_addr_copy(&fl
.fl6_dst
, rt0
->addr
);
807 if (!fl
.oif
&& ipv6_addr_is_multicast(&fl
.fl6_dst
))
808 fl
.oif
= np
->mcast_oif
;
809 security_sk_classify_flow(sk
, &fl
);
811 err
= ip6_dst_lookup(sk
, &dst
, &fl
);
815 ipv6_addr_copy(&fl
.fl6_dst
, final_p
);
817 if ((err
= xfrm_lookup(&dst
, &fl
, sk
, 1)) < 0)
821 if (ipv6_addr_is_multicast(&fl
.fl6_dst
))
822 hlimit
= np
->mcast_hops
;
824 hlimit
= np
->hop_limit
;
826 hlimit
= dst_metric(dst
, RTAX_HOPLIMIT
);
828 hlimit
= ipv6_get_hoplimit(dst
->dev
);
837 if (msg
->msg_flags
&MSG_CONFIRM
)
842 err
= rawv6_send_hdrinc(sk
, msg
->msg_iov
, len
, &fl
, (struct rt6_info
*)dst
, msg
->msg_flags
);
845 err
= ip6_append_data(sk
, ip_generic_getfrag
, msg
->msg_iov
,
846 len
, 0, hlimit
, tclass
, opt
, &fl
, (struct rt6_info
*)dst
,
850 ip6_flush_pending_frames(sk
);
851 else if (!(msg
->msg_flags
& MSG_MORE
))
852 err
= rawv6_push_pending_frames(sk
, &fl
, rp
);
859 fl6_sock_release(flowlabel
);
860 return err
<0?err
:len
;
863 if (!(msg
->msg_flags
& MSG_PROBE
) || len
)
864 goto back_from_confirm
;
869 static int rawv6_seticmpfilter(struct sock
*sk
, int level
, int optname
,
870 char __user
*optval
, int optlen
)
874 if (optlen
> sizeof(struct icmp6_filter
))
875 optlen
= sizeof(struct icmp6_filter
);
876 if (copy_from_user(&raw6_sk(sk
)->filter
, optval
, optlen
))
886 static int rawv6_geticmpfilter(struct sock
*sk
, int level
, int optname
,
887 char __user
*optval
, int __user
*optlen
)
893 if (get_user(len
, optlen
))
897 if (len
> sizeof(struct icmp6_filter
))
898 len
= sizeof(struct icmp6_filter
);
899 if (put_user(len
, optlen
))
901 if (copy_to_user(optval
, &raw6_sk(sk
)->filter
, len
))
912 static int do_rawv6_setsockopt(struct sock
*sk
, int level
, int optname
,
913 char __user
*optval
, int optlen
)
915 struct raw6_sock
*rp
= raw6_sk(sk
);
918 if (get_user(val
, (int __user
*)optval
))
923 /* You may get strange result with a positive odd offset;
924 RFC2292bis agrees with me. */
925 if (val
> 0 && (val
&1))
938 return(-ENOPROTOOPT
);
942 static int rawv6_setsockopt(struct sock
*sk
, int level
, int optname
,
943 char __user
*optval
, int optlen
)
950 if (inet_sk(sk
)->num
!= IPPROTO_ICMPV6
)
952 return rawv6_seticmpfilter(sk
, level
, optname
, optval
,
955 if (optname
== IPV6_CHECKSUM
)
958 return ipv6_setsockopt(sk
, level
, optname
, optval
,
961 return do_rawv6_setsockopt(sk
, level
, optname
, optval
, optlen
);
965 static int compat_rawv6_setsockopt(struct sock
*sk
, int level
, int optname
,
966 char __user
*optval
, int optlen
)
972 if (inet_sk(sk
)->num
!= IPPROTO_ICMPV6
)
974 return rawv6_seticmpfilter(sk
, level
, optname
, optval
, optlen
);
976 if (optname
== IPV6_CHECKSUM
)
979 return compat_ipv6_setsockopt(sk
, level
, optname
,
982 return do_rawv6_setsockopt(sk
, level
, optname
, optval
, optlen
);
986 static int do_rawv6_getsockopt(struct sock
*sk
, int level
, int optname
,
987 char __user
*optval
, int __user
*optlen
)
989 struct raw6_sock
*rp
= raw6_sk(sk
);
992 if (get_user(len
,optlen
))
997 if (rp
->checksum
== 0)
1004 return -ENOPROTOOPT
;
1007 len
= min_t(unsigned int, sizeof(int), len
);
1009 if (put_user(len
, optlen
))
1011 if (copy_to_user(optval
,&val
,len
))
1016 static int rawv6_getsockopt(struct sock
*sk
, int level
, int optname
,
1017 char __user
*optval
, int __user
*optlen
)
1024 if (inet_sk(sk
)->num
!= IPPROTO_ICMPV6
)
1026 return rawv6_geticmpfilter(sk
, level
, optname
, optval
,
1029 if (optname
== IPV6_CHECKSUM
)
1032 return ipv6_getsockopt(sk
, level
, optname
, optval
,
1035 return do_rawv6_getsockopt(sk
, level
, optname
, optval
, optlen
);
1038 #ifdef CONFIG_COMPAT
1039 static int compat_rawv6_getsockopt(struct sock
*sk
, int level
, int optname
,
1040 char __user
*optval
, int __user
*optlen
)
1046 if (inet_sk(sk
)->num
!= IPPROTO_ICMPV6
)
1048 return rawv6_geticmpfilter(sk
, level
, optname
, optval
, optlen
);
1050 if (optname
== IPV6_CHECKSUM
)
1053 return compat_ipv6_getsockopt(sk
, level
, optname
,
1056 return do_rawv6_getsockopt(sk
, level
, optname
, optval
, optlen
);
1060 static int rawv6_ioctl(struct sock
*sk
, int cmd
, unsigned long arg
)
1065 int amount
= atomic_read(&sk
->sk_wmem_alloc
);
1066 return put_user(amount
, (int __user
*)arg
);
1070 struct sk_buff
*skb
;
1073 spin_lock_bh(&sk
->sk_receive_queue
.lock
);
1074 skb
= skb_peek(&sk
->sk_receive_queue
);
1076 amount
= skb
->tail
- skb
->h
.raw
;
1077 spin_unlock_bh(&sk
->sk_receive_queue
.lock
);
1078 return put_user(amount
, (int __user
*)arg
);
1082 return -ENOIOCTLCMD
;
1086 static void rawv6_close(struct sock
*sk
, long timeout
)
1088 if (inet_sk(sk
)->num
== IPPROTO_RAW
)
1089 ip6_ra_control(sk
, -1, NULL
);
1091 sk_common_release(sk
);
1094 static int rawv6_init_sk(struct sock
*sk
)
1096 struct raw6_sock
*rp
= raw6_sk(sk
);
1098 switch (inet_sk(sk
)->num
) {
1099 case IPPROTO_ICMPV6
:
1113 struct proto rawv6_prot
= {
1115 .owner
= THIS_MODULE
,
1116 .close
= rawv6_close
,
1117 .connect
= ip6_datagram_connect
,
1118 .disconnect
= udp_disconnect
,
1119 .ioctl
= rawv6_ioctl
,
1120 .init
= rawv6_init_sk
,
1121 .destroy
= inet6_destroy_sock
,
1122 .setsockopt
= rawv6_setsockopt
,
1123 .getsockopt
= rawv6_getsockopt
,
1124 .sendmsg
= rawv6_sendmsg
,
1125 .recvmsg
= rawv6_recvmsg
,
1127 .backlog_rcv
= rawv6_rcv_skb
,
1128 .hash
= raw_v6_hash
,
1129 .unhash
= raw_v6_unhash
,
1130 .obj_size
= sizeof(struct raw6_sock
),
1131 #ifdef CONFIG_COMPAT
1132 .compat_setsockopt
= compat_rawv6_setsockopt
,
1133 .compat_getsockopt
= compat_rawv6_getsockopt
,
1137 #ifdef CONFIG_PROC_FS
1138 struct raw6_iter_state
{
1142 #define raw6_seq_private(seq) ((struct raw6_iter_state *)(seq)->private)
1144 static struct sock
*raw6_get_first(struct seq_file
*seq
)
1147 struct hlist_node
*node
;
1148 struct raw6_iter_state
* state
= raw6_seq_private(seq
);
1150 for (state
->bucket
= 0; state
->bucket
< RAWV6_HTABLE_SIZE
; ++state
->bucket
)
1151 sk_for_each(sk
, node
, &raw_v6_htable
[state
->bucket
])
1152 if (sk
->sk_family
== PF_INET6
)
1159 static struct sock
*raw6_get_next(struct seq_file
*seq
, struct sock
*sk
)
1161 struct raw6_iter_state
* state
= raw6_seq_private(seq
);
1167 } while (sk
&& sk
->sk_family
!= PF_INET6
);
1169 if (!sk
&& ++state
->bucket
< RAWV6_HTABLE_SIZE
) {
1170 sk
= sk_head(&raw_v6_htable
[state
->bucket
]);
1176 static struct sock
*raw6_get_idx(struct seq_file
*seq
, loff_t pos
)
1178 struct sock
*sk
= raw6_get_first(seq
);
1180 while (pos
&& (sk
= raw6_get_next(seq
, sk
)) != NULL
)
1182 return pos
? NULL
: sk
;
1185 static void *raw6_seq_start(struct seq_file
*seq
, loff_t
*pos
)
1187 read_lock(&raw_v6_lock
);
1188 return *pos
? raw6_get_idx(seq
, *pos
- 1) : SEQ_START_TOKEN
;
1191 static void *raw6_seq_next(struct seq_file
*seq
, void *v
, loff_t
*pos
)
1195 if (v
== SEQ_START_TOKEN
)
1196 sk
= raw6_get_first(seq
);
1198 sk
= raw6_get_next(seq
, v
);
1203 static void raw6_seq_stop(struct seq_file
*seq
, void *v
)
1205 read_unlock(&raw_v6_lock
);
1208 static void raw6_sock_seq_show(struct seq_file
*seq
, struct sock
*sp
, int i
)
1210 struct ipv6_pinfo
*np
= inet6_sk(sp
);
1211 struct in6_addr
*dest
, *src
;
1215 src
= &np
->rcv_saddr
;
1217 srcp
= inet_sk(sp
)->num
;
1219 "%4d: %08X%08X%08X%08X:%04X %08X%08X%08X%08X:%04X "
1220 "%02X %08X:%08X %02X:%08lX %08X %5d %8d %lu %d %p\n",
1222 src
->s6_addr32
[0], src
->s6_addr32
[1],
1223 src
->s6_addr32
[2], src
->s6_addr32
[3], srcp
,
1224 dest
->s6_addr32
[0], dest
->s6_addr32
[1],
1225 dest
->s6_addr32
[2], dest
->s6_addr32
[3], destp
,
1227 atomic_read(&sp
->sk_wmem_alloc
),
1228 atomic_read(&sp
->sk_rmem_alloc
),
1232 atomic_read(&sp
->sk_refcnt
), sp
);
1235 static int raw6_seq_show(struct seq_file
*seq
, void *v
)
1237 if (v
== SEQ_START_TOKEN
)
1242 "st tx_queue rx_queue tr tm->when retrnsmt"
1243 " uid timeout inode\n");
1245 raw6_sock_seq_show(seq
, v
, raw6_seq_private(seq
)->bucket
);
1249 static struct seq_operations raw6_seq_ops
= {
1250 .start
= raw6_seq_start
,
1251 .next
= raw6_seq_next
,
1252 .stop
= raw6_seq_stop
,
1253 .show
= raw6_seq_show
,
1256 static int raw6_seq_open(struct inode
*inode
, struct file
*file
)
1258 struct seq_file
*seq
;
1260 struct raw6_iter_state
*s
= kzalloc(sizeof(*s
), GFP_KERNEL
);
1263 rc
= seq_open(file
, &raw6_seq_ops
);
1266 seq
= file
->private_data
;
1275 static const struct file_operations raw6_seq_fops
= {
1276 .owner
= THIS_MODULE
,
1277 .open
= raw6_seq_open
,
1279 .llseek
= seq_lseek
,
1280 .release
= seq_release_private
,
1283 int __init
raw6_proc_init(void)
1285 if (!proc_net_fops_create("raw6", S_IRUGO
, &raw6_seq_fops
))
1290 void raw6_proc_exit(void)
1292 proc_net_remove("raw6");
1294 #endif /* CONFIG_PROC_FS */