3 * Linux INET6 implementation
6 * Pedro Roque <pedro_m@yahoo.com>
8 * $Id: datagram.c,v 1.23 2001/09/01 00:31:50 davem Exp $
10 * This program is free software; you can redistribute it and/or
11 * modify it under the terms of the GNU General Public License
12 * as published by the Free Software Foundation; either version
13 * 2 of the License, or (at your option) any later version.
16 #include <linux/errno.h>
17 #include <linux/types.h>
18 #include <linux/kernel.h>
19 #include <linux/sched.h>
20 #include <linux/interrupt.h>
21 #include <linux/socket.h>
22 #include <linux/sockios.h>
23 #include <linux/in6.h>
24 #include <linux/ipv6.h>
25 #include <linux/route.h>
28 #include <net/ndisc.h>
29 #include <net/addrconf.h>
30 #include <net/transp_v6.h>
32 #include <linux/errqueue.h>
33 #include <asm/uaccess.h>
35 void ipv6_icmp_error(struct sock *sk, struct sk_buff *skb, int err,
36 u16 port, u32 info, u8 *payload)
38 struct icmp6hdr *icmph = (struct icmp6hdr *)skb->h.raw;
39 struct sock_exterr_skb *serr;
41 if (!sk->net_pinfo.af_inet6.recverr)
44 skb = skb_clone(skb, GFP_ATOMIC);
48 serr = SKB_EXT_ERR(skb);
49 serr->ee.ee_errno = err;
50 serr->ee.ee_origin = SO_EE_ORIGIN_ICMP6;
51 serr->ee.ee_type = icmph->icmp6_type;
52 serr->ee.ee_code = icmph->icmp6_code;
54 serr->ee.ee_info = info;
56 serr->addr_offset = (u8*)&(((struct ipv6hdr*)(icmph+1))->daddr) - skb->nh.raw;
60 __skb_pull(skb, payload - skb->data);
62 if (sock_queue_err_skb(sk, skb))
66 void ipv6_local_error(struct sock *sk, int err, struct flowi *fl, u32 info)
68 struct sock_exterr_skb *serr;
72 if (!sk->net_pinfo.af_inet6.recverr)
75 skb = alloc_skb(sizeof(struct ipv6hdr), GFP_ATOMIC);
79 iph = (struct ipv6hdr*)skb_put(skb, sizeof(struct ipv6hdr));
81 memcpy(&iph->daddr, fl->fl6_dst, 16);
83 serr = SKB_EXT_ERR(skb);
84 serr->ee.ee_errno = err;
85 serr->ee.ee_origin = SO_EE_ORIGIN_LOCAL;
89 serr->ee.ee_info = info;
91 serr->addr_offset = (u8*)&iph->daddr - skb->nh.raw;
92 serr->port = fl->uli_u.ports.dport;
94 skb->h.raw = skb->tail;
95 __skb_pull(skb, skb->tail - skb->data);
97 if (sock_queue_err_skb(sk, skb))
102 * Handle MSG_ERRQUEUE
104 int ipv6_recv_error(struct sock *sk, struct msghdr *msg, int len)
106 struct sock_exterr_skb *serr;
107 struct sk_buff *skb, *skb2;
108 struct sockaddr_in6 *sin;
110 struct sock_extended_err ee;
111 struct sockaddr_in6 offender;
117 skb = skb_dequeue(&sk->error_queue);
123 msg->msg_flags |= MSG_TRUNC;
126 err = skb_copy_datagram_iovec(skb, 0, msg->msg_iov, copied);
130 sock_recv_timestamp(msg, sk, skb);
132 serr = SKB_EXT_ERR(skb);
134 sin = (struct sockaddr_in6 *)msg->msg_name;
136 sin->sin6_family = AF_INET6;
137 sin->sin6_flowinfo = 0;
138 sin->sin6_port = serr->port;
139 sin->sin6_scope_id = 0;
140 if (serr->ee.ee_origin == SO_EE_ORIGIN_ICMP6) {
141 memcpy(&sin->sin6_addr, skb->nh.raw + serr->addr_offset, 16);
142 if (sk->net_pinfo.af_inet6.sndflow)
143 sin->sin6_flowinfo = *(u32*)(skb->nh.raw + serr->addr_offset - 24) & IPV6_FLOWINFO_MASK;
144 if (ipv6_addr_type(&sin->sin6_addr) & IPV6_ADDR_LINKLOCAL) {
145 struct inet6_skb_parm *opt = (struct inet6_skb_parm *) skb->cb;
146 sin->sin6_scope_id = opt->iif;
149 ipv6_addr_set(&sin->sin6_addr, 0, 0,
151 *(u32*)(skb->nh.raw + serr->addr_offset));
155 memcpy(&errhdr.ee, &serr->ee, sizeof(struct sock_extended_err));
156 sin = &errhdr.offender;
157 sin->sin6_family = AF_UNSPEC;
158 if (serr->ee.ee_origin != SO_EE_ORIGIN_LOCAL) {
159 sin->sin6_family = AF_INET6;
160 sin->sin6_flowinfo = 0;
161 sin->sin6_scope_id = 0;
162 if (serr->ee.ee_origin == SO_EE_ORIGIN_ICMP6) {
163 memcpy(&sin->sin6_addr, &skb->nh.ipv6h->saddr, 16);
164 if (sk->net_pinfo.af_inet6.rxopt.all)
165 datagram_recv_ctl(sk, msg, skb);
166 if (ipv6_addr_type(&sin->sin6_addr) & IPV6_ADDR_LINKLOCAL) {
167 struct inet6_skb_parm *opt = (struct inet6_skb_parm *) skb->cb;
168 sin->sin6_scope_id = opt->iif;
171 ipv6_addr_set(&sin->sin6_addr, 0, 0,
174 if (sk->protinfo.af_inet.cmsg_flags)
175 ip_cmsg_recv(msg, skb);
179 put_cmsg(msg, SOL_IPV6, IPV6_RECVERR, sizeof(errhdr), &errhdr);
181 /* Now we could try to dump offended packet options */
183 msg->msg_flags |= MSG_ERRQUEUE;
186 /* Reset and regenerate socket error */
187 spin_lock_irq(&sk->error_queue.lock);
189 if ((skb2 = skb_peek(&sk->error_queue)) != NULL) {
190 sk->err = SKB_EXT_ERR(skb2)->ee.ee_errno;
191 spin_unlock_irq(&sk->error_queue.lock);
192 sk->error_report(sk);
194 spin_unlock_irq(&sk->error_queue.lock);
205 int datagram_recv_ctl(struct sock *sk, struct msghdr *msg, struct sk_buff *skb)
207 struct ipv6_pinfo *np = &sk->net_pinfo.af_inet6;
208 struct inet6_skb_parm *opt = (struct inet6_skb_parm *) skb->cb;
210 if (np->rxopt.bits.rxinfo) {
211 struct in6_pktinfo src_info;
213 src_info.ipi6_ifindex = opt->iif;
214 ipv6_addr_copy(&src_info.ipi6_addr, &skb->nh.ipv6h->daddr);
215 put_cmsg(msg, SOL_IPV6, IPV6_PKTINFO, sizeof(src_info), &src_info);
218 if (np->rxopt.bits.rxhlim) {
219 int hlim = skb->nh.ipv6h->hop_limit;
220 put_cmsg(msg, SOL_IPV6, IPV6_HOPLIMIT, sizeof(hlim), &hlim);
223 if (np->rxopt.bits.rxflow && (*(u32*)skb->nh.raw & IPV6_FLOWINFO_MASK)) {
224 u32 flowinfo = *(u32*)skb->nh.raw & IPV6_FLOWINFO_MASK;
225 put_cmsg(msg, SOL_IPV6, IPV6_FLOWINFO, sizeof(flowinfo), &flowinfo);
227 if (np->rxopt.bits.hopopts && opt->hop) {
228 u8 *ptr = skb->nh.raw + opt->hop;
229 put_cmsg(msg, SOL_IPV6, IPV6_HOPOPTS, (ptr[1]+1)<<3, ptr);
231 if (np->rxopt.bits.dstopts && opt->dst0) {
232 u8 *ptr = skb->nh.raw + opt->dst0;
233 put_cmsg(msg, SOL_IPV6, IPV6_DSTOPTS, (ptr[1]+1)<<3, ptr);
235 if (np->rxopt.bits.srcrt && opt->srcrt) {
236 struct ipv6_rt_hdr *rthdr = (struct ipv6_rt_hdr *)(skb->nh.raw + opt->srcrt);
237 put_cmsg(msg, SOL_IPV6, IPV6_RTHDR, (rthdr->hdrlen+1) << 3, rthdr);
239 if (np->rxopt.bits.authhdr && opt->auth) {
240 u8 *ptr = skb->nh.raw + opt->auth;
241 put_cmsg(msg, SOL_IPV6, IPV6_AUTHHDR, (ptr[1]+1)<<2, ptr);
243 if (np->rxopt.bits.dstopts && opt->dst1) {
244 u8 *ptr = skb->nh.raw + opt->dst1;
245 put_cmsg(msg, SOL_IPV6, IPV6_DSTOPTS, (ptr[1]+1)<<3, ptr);
250 int datagram_send_ctl(struct msghdr *msg, struct flowi *fl,
251 struct ipv6_txoptions *opt,
254 struct in6_pktinfo *src_info;
255 struct cmsghdr *cmsg;
256 struct ipv6_rt_hdr *rthdr;
257 struct ipv6_opt_hdr *hdr;
261 for (cmsg = CMSG_FIRSTHDR(msg); cmsg; cmsg = CMSG_NXTHDR(msg, cmsg)) {
263 if (!CMSG_OK(msg, cmsg)) {
268 if (cmsg->cmsg_level != SOL_IPV6)
271 switch (cmsg->cmsg_type) {
273 if (cmsg->cmsg_len < CMSG_LEN(sizeof(struct in6_pktinfo))) {
278 src_info = (struct in6_pktinfo *)CMSG_DATA(cmsg);
280 if (src_info->ipi6_ifindex) {
281 if (fl->oif && src_info->ipi6_ifindex != fl->oif)
283 fl->oif = src_info->ipi6_ifindex;
286 if (!ipv6_addr_any(&src_info->ipi6_addr)) {
287 if (!ipv6_chk_addr(&src_info->ipi6_addr, NULL)) {
292 fl->fl6_src = &src_info->ipi6_addr;
298 if (cmsg->cmsg_len < CMSG_LEN(4)) {
303 if (fl->fl6_flowlabel&IPV6_FLOWINFO_MASK) {
304 if ((fl->fl6_flowlabel^*(u32 *)CMSG_DATA(cmsg))&~IPV6_FLOWINFO_MASK) {
309 fl->fl6_flowlabel = IPV6_FLOWINFO_MASK & *(u32 *)CMSG_DATA(cmsg);
313 if (opt->hopopt || cmsg->cmsg_len < CMSG_LEN(sizeof(struct ipv6_opt_hdr))) {
318 hdr = (struct ipv6_opt_hdr *)CMSG_DATA(cmsg);
319 len = ((hdr->hdrlen + 1) << 3);
320 if (cmsg->cmsg_len < CMSG_LEN(len)) {
324 if (!capable(CAP_NET_RAW)) {
328 opt->opt_nflen += len;
333 if (cmsg->cmsg_len < CMSG_LEN(sizeof(struct ipv6_opt_hdr))) {
338 hdr = (struct ipv6_opt_hdr *)CMSG_DATA(cmsg);
339 len = ((hdr->hdrlen + 1) << 3);
340 if (cmsg->cmsg_len < CMSG_LEN(len)) {
344 if (!capable(CAP_NET_RAW)) {
352 opt->opt_flen += len;
357 if (cmsg->cmsg_len < CMSG_LEN(sizeof(struct ipv6_opt_hdr))) {
362 hdr = (struct ipv6_opt_hdr *)CMSG_DATA(cmsg);
363 len = ((hdr->hdrlen + 2) << 2);
364 if (cmsg->cmsg_len < CMSG_LEN(len)) {
372 opt->opt_flen += len;
377 if (cmsg->cmsg_len < CMSG_LEN(sizeof(struct ipv6_rt_hdr))) {
382 rthdr = (struct ipv6_rt_hdr *)CMSG_DATA(cmsg);
392 len = ((rthdr->hdrlen + 1) << 3);
394 if (cmsg->cmsg_len < CMSG_LEN(len)) {
399 /* segments left must also match */
400 if ((rthdr->hdrlen >> 1) != rthdr->segments_left) {
405 opt->opt_nflen += len;
409 int dsthdrlen = ((opt->dst1opt->hdrlen+1)<<3);
411 opt->opt_nflen += dsthdrlen;
412 opt->dst0opt = opt->dst1opt;
414 opt->opt_flen -= dsthdrlen;
420 if (cmsg->cmsg_len != CMSG_LEN(sizeof(int))) {
425 *hlimit = *(int *)CMSG_DATA(cmsg);
430 printk(KERN_DEBUG "invalid cmsg type: %d\n", cmsg->cmsg_type);