1 /*
2 * PF_INET6 socket protocol family
3 * Linux INET6 implementation
4 *
5 * Authors:
6 * Pedro Roque <roque@di.fc.ul.pt>
7 *
8 * Adapted from linux/net/ipv4/af_inet.c
9 *
10 * Fixes:
11 * piggy, Karl Knutson : Socket protocol table
12 * Hideaki YOSHIFUJI : sin6_scope_id support
13 * Arnaldo Melo : check proc_net_create return, cleanups
14 *
15 * This program is free software; you can redistribute it and/or
16 * modify it under the terms of the GNU General Public License
17 * as published by the Free Software Foundation; either version
18 * 2 of the License, or (at your option) any later version.
19 */
20
21 #define pr_fmt(fmt) "IPv6: " fmt
22
23 #include <linux/module.h>
24 #include <linux/capability.h>
25 #include <linux/errno.h>
26 #include <linux/types.h>
27 #include <linux/socket.h>
28 #include <linux/in.h>
29 #include <linux/kernel.h>
30 #include <linux/timer.h>
31 #include <linux/string.h>
32 #include <linux/sockios.h>
33 #include <linux/net.h>
34 #include <linux/fcntl.h>
35 #include <linux/mm.h>
36 #include <linux/interrupt.h>
37 #include <linux/proc_fs.h>
38 #include <linux/stat.h>
39 #include <linux/init.h>
40 #include <linux/slab.h>
41
42 #include <linux/inet.h>
43 #include <linux/netdevice.h>
44 #include <linux/icmpv6.h>
45 #include <linux/netfilter_ipv6.h>
46
47 #include <net/ip.h>
48 #include <net/ipv6.h>
49 #include <net/udp.h>
50 #include <net/udplite.h>
51 #include <net/tcp.h>
52 #include <net/ping.h>
53 #include <net/protocol.h>
54 #include <net/inet_common.h>
55 #include <net/route.h>
56 #include <net/transp_v6.h>
57 #include <net/ip6_route.h>
58 #include <net/addrconf.h>
59 #include <net/ndisc.h>
60 #ifdef CONFIG_IPV6_TUNNEL
61 #include <net/ip6_tunnel.h>
62 #endif
63 #include <net/calipso.h>
64
65 #include <asm/uaccess.h>
66 #include <linux/mroute6.h>
67
68 #ifdef CONFIG_ANDROID_PARANOID_NETWORK
69 #include <linux/android_aid.h>
70
current_has_network(void)71 static inline int current_has_network(void)
72 {
73 return in_egroup_p(AID_INET) || capable(CAP_NET_RAW);
74 }
75 #else
current_has_network(void)76 static inline int current_has_network(void)
77 {
78 return 1;
79 }
80 #endif
81
82 #include "ip6_offload.h"
83
84 MODULE_AUTHOR("Cast of dozens");
85 MODULE_DESCRIPTION("IPv6 protocol stack for Linux");
86 MODULE_LICENSE("GPL");
87
88 /* The inetsw6 table contains everything that inet6_create needs to
89 * build a new socket.
90 */
91 static struct list_head inetsw6[SOCK_MAX];
92 static DEFINE_SPINLOCK(inetsw6_lock);
93
94 struct ipv6_params ipv6_defaults = {
95 .disable_ipv6 = 0,
96 .autoconf = 1,
97 };
98
99 static int disable_ipv6_mod;
100
101 module_param_named(disable, disable_ipv6_mod, int, 0444);
102 MODULE_PARM_DESC(disable, "Disable IPv6 module such that it is non-functional");
103
104 module_param_named(disable_ipv6, ipv6_defaults.disable_ipv6, int, 0444);
105 MODULE_PARM_DESC(disable_ipv6, "Disable IPv6 on all interfaces");
106
107 module_param_named(autoconf, ipv6_defaults.autoconf, int, 0444);
108 MODULE_PARM_DESC(autoconf, "Enable IPv6 address autoconfiguration on all interfaces");
109
ipv6_mod_enabled(void)110 bool ipv6_mod_enabled(void)
111 {
112 return disable_ipv6_mod == 0;
113 }
114 EXPORT_SYMBOL_GPL(ipv6_mod_enabled);
115
inet6_sk_generic(struct sock * sk)116 static __inline__ struct ipv6_pinfo *inet6_sk_generic(struct sock *sk)
117 {
118 const int offset = sk->sk_prot->obj_size - sizeof(struct ipv6_pinfo);
119
120 return (struct ipv6_pinfo *)(((u8 *)sk) + offset);
121 }
122
inet6_create(struct net * net,struct socket * sock,int protocol,int kern)123 static int inet6_create(struct net *net, struct socket *sock, int protocol,
124 int kern)
125 {
126 struct inet_sock *inet;
127 struct ipv6_pinfo *np;
128 struct sock *sk;
129 struct inet_protosw *answer;
130 struct proto *answer_prot;
131 unsigned char answer_flags;
132 int try_loading_module = 0;
133 int err;
134
135 if (protocol < 0 || protocol >= IPPROTO_MAX)
136 return -EINVAL;
137
138 if (!current_has_network())
139 return -EACCES;
140
141 /* Look for the requested type/protocol pair. */
142 lookup_protocol:
143 err = -ESOCKTNOSUPPORT;
144 rcu_read_lock();
145 list_for_each_entry_rcu(answer, &inetsw6[sock->type], list) {
146
147 err = 0;
148 /* Check the non-wild match. */
149 if (protocol == answer->protocol) {
150 if (protocol != IPPROTO_IP)
151 break;
152 } else {
153 /* Check for the two wild cases. */
154 if (IPPROTO_IP == protocol) {
155 protocol = answer->protocol;
156 break;
157 }
158 if (IPPROTO_IP == answer->protocol)
159 break;
160 }
161 err = -EPROTONOSUPPORT;
162 }
163
164 if (err) {
165 if (try_loading_module < 2) {
166 rcu_read_unlock();
167 /*
168 * Be more specific, e.g. net-pf-10-proto-132-type-1
169 * (net-pf-PF_INET6-proto-IPPROTO_SCTP-type-SOCK_STREAM)
170 */
171 if (++try_loading_module == 1)
172 request_module("net-pf-%d-proto-%d-type-%d",
173 PF_INET6, protocol, sock->type);
174 /*
175 * Fall back to generic, e.g. net-pf-10-proto-132
176 * (net-pf-PF_INET6-proto-IPPROTO_SCTP)
177 */
178 else
179 request_module("net-pf-%d-proto-%d",
180 PF_INET6, protocol);
181 goto lookup_protocol;
182 } else
183 goto out_rcu_unlock;
184 }
185
186 err = -EPERM;
187 if (sock->type == SOCK_RAW && !kern && !capable(CAP_NET_RAW))
188 goto out_rcu_unlock;
189
190 sock->ops = answer->ops;
191 answer_prot = answer->prot;
192 answer_flags = answer->flags;
193 rcu_read_unlock();
194
195 WARN_ON(!answer_prot->slab);
196
197 err = -ENOBUFS;
198 sk = sk_alloc(net, PF_INET6, GFP_KERNEL, answer_prot, kern);
199 if (!sk)
200 goto out;
201
202 sock_init_data(sock, sk);
203
204 err = 0;
205 if (INET_PROTOSW_REUSE & answer_flags)
206 sk->sk_reuse = SK_CAN_REUSE;
207
208 inet = inet_sk(sk);
209 inet->is_icsk = (INET_PROTOSW_ICSK & answer_flags) != 0;
210
211 if (SOCK_RAW == sock->type) {
212 inet->inet_num = protocol;
213 if (IPPROTO_RAW == protocol)
214 inet->hdrincl = 1;
215 }
216
217 sk->sk_destruct = inet_sock_destruct;
218 sk->sk_family = PF_INET6;
219 sk->sk_protocol = protocol;
220
221 sk->sk_backlog_rcv = answer->prot->backlog_rcv;
222
223 inet_sk(sk)->pinet6 = np = inet6_sk_generic(sk);
224 np->hop_limit = -1;
225 np->mcast_hops = IPV6_DEFAULT_MCASTHOPS;
226 np->mc_loop = 1;
227 np->pmtudisc = IPV6_PMTUDISC_WANT;
228 sk->sk_ipv6only = net->ipv6.sysctl.bindv6only;
229
230 /* Init the ipv4 part of the socket since we can have sockets
231 * using v6 API for ipv4.
232 */
233 inet->uc_ttl = -1;
234
235 inet->mc_loop = 1;
236 inet->mc_ttl = 1;
237 inet->mc_index = 0;
238 inet->mc_list = NULL;
239 inet->rcv_tos = 0;
240
241 if (net->ipv4.sysctl_ip_no_pmtu_disc)
242 inet->pmtudisc = IP_PMTUDISC_DONT;
243 else
244 inet->pmtudisc = IP_PMTUDISC_WANT;
245 /*
246 * Increment only the relevant sk_prot->socks debug field, this changes
247 * the previous behaviour of incrementing both the equivalent to
248 * answer->prot->socks (inet6_sock_nr) and inet_sock_nr.
249 *
250 * This allows better debug granularity as we'll know exactly how many
251 * UDPv6, TCPv6, etc socks were allocated, not the sum of all IPv6
252 * transport protocol socks. -acme
253 */
254 sk_refcnt_debug_inc(sk);
255
256 if (inet->inet_num) {
257 /* It assumes that any protocol which allows
258 * the user to assign a number at socket
259 * creation time automatically shares.
260 */
261 inet->inet_sport = htons(inet->inet_num);
262 err = sk->sk_prot->hash(sk);
263 if (err) {
264 sk_common_release(sk);
265 goto out;
266 }
267 }
268 if (sk->sk_prot->init) {
269 err = sk->sk_prot->init(sk);
270 if (err) {
271 sk_common_release(sk);
272 goto out;
273 }
274 }
275 out:
276 return err;
277 out_rcu_unlock:
278 rcu_read_unlock();
279 goto out;
280 }
281
282
283 /* bind for INET6 API */
inet6_bind(struct socket * sock,struct sockaddr * uaddr,int addr_len)284 int inet6_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len)
285 {
286 struct sockaddr_in6 *addr = (struct sockaddr_in6 *)uaddr;
287 struct sock *sk = sock->sk;
288 struct inet_sock *inet = inet_sk(sk);
289 struct ipv6_pinfo *np = inet6_sk(sk);
290 struct net *net = sock_net(sk);
291 __be32 v4addr = 0;
292 unsigned short snum;
293 bool saved_ipv6only;
294 int addr_type = 0;
295 int err = 0;
296
297 /* If the socket has its own bind function then use it. */
298 if (sk->sk_prot->bind)
299 return sk->sk_prot->bind(sk, uaddr, addr_len);
300
301 if (addr_len < SIN6_LEN_RFC2133)
302 return -EINVAL;
303
304 if (addr->sin6_family != AF_INET6)
305 return -EAFNOSUPPORT;
306
307 addr_type = ipv6_addr_type(&addr->sin6_addr);
308 if ((addr_type & IPV6_ADDR_MULTICAST) && sock->type == SOCK_STREAM)
309 return -EINVAL;
310
311 snum = ntohs(addr->sin6_port);
312 if (snum && snum < PROT_SOCK && !ns_capable(net->user_ns, CAP_NET_BIND_SERVICE))
313 return -EACCES;
314
315 lock_sock(sk);
316
317 /* Check these errors (active socket, double bind). */
318 if (sk->sk_state != TCP_CLOSE || inet->inet_num) {
319 err = -EINVAL;
320 goto out;
321 }
322
323 /* Check if the address belongs to the host. */
324 if (addr_type == IPV6_ADDR_MAPPED) {
325 int chk_addr_ret;
326
327 /* Binding to v4-mapped address on a v6-only socket
328 * makes no sense
329 */
330 if (sk->sk_ipv6only) {
331 err = -EINVAL;
332 goto out;
333 }
334
335 /* Reproduce AF_INET checks to make the bindings consistent */
336 v4addr = addr->sin6_addr.s6_addr32[3];
337 chk_addr_ret = inet_addr_type(net, v4addr);
338 if (!net->ipv4.sysctl_ip_nonlocal_bind &&
339 !(inet->freebind || inet->transparent) &&
340 v4addr != htonl(INADDR_ANY) &&
341 chk_addr_ret != RTN_LOCAL &&
342 chk_addr_ret != RTN_MULTICAST &&
343 chk_addr_ret != RTN_BROADCAST) {
344 err = -EADDRNOTAVAIL;
345 goto out;
346 }
347 } else {
348 if (addr_type != IPV6_ADDR_ANY) {
349 struct net_device *dev = NULL;
350
351 rcu_read_lock();
352 if (__ipv6_addr_needs_scope_id(addr_type)) {
353 if (addr_len >= sizeof(struct sockaddr_in6) &&
354 addr->sin6_scope_id) {
355 /* Override any existing binding, if another one
356 * is supplied by user.
357 */
358 sk->sk_bound_dev_if = addr->sin6_scope_id;
359 }
360
361 /* Binding to link-local address requires an interface */
362 if (!sk->sk_bound_dev_if) {
363 err = -EINVAL;
364 goto out_unlock;
365 }
366 dev = dev_get_by_index_rcu(net, sk->sk_bound_dev_if);
367 if (!dev) {
368 err = -ENODEV;
369 goto out_unlock;
370 }
371 }
372
373 /* ipv4 addr of the socket is invalid. Only the
374 * unspecified and mapped address have a v4 equivalent.
375 */
376 v4addr = LOOPBACK4_IPV6;
377 if (!(addr_type & IPV6_ADDR_MULTICAST)) {
378 if (!net->ipv6.sysctl.ip_nonlocal_bind &&
379 !(inet->freebind || inet->transparent) &&
380 !ipv6_chk_addr(net, &addr->sin6_addr,
381 dev, 0)) {
382 err = -EADDRNOTAVAIL;
383 goto out_unlock;
384 }
385 }
386 rcu_read_unlock();
387 }
388 }
389
390 inet->inet_rcv_saddr = v4addr;
391 inet->inet_saddr = v4addr;
392
393 sk->sk_v6_rcv_saddr = addr->sin6_addr;
394
395 if (!(addr_type & IPV6_ADDR_MULTICAST))
396 np->saddr = addr->sin6_addr;
397
398 saved_ipv6only = sk->sk_ipv6only;
399 if (addr_type != IPV6_ADDR_ANY && addr_type != IPV6_ADDR_MAPPED)
400 sk->sk_ipv6only = 1;
401
402 /* Make sure we are allowed to bind here. */
403 if ((snum || !inet->bind_address_no_port) &&
404 sk->sk_prot->get_port(sk, snum)) {
405 sk->sk_ipv6only = saved_ipv6only;
406 inet_reset_saddr(sk);
407 err = -EADDRINUSE;
408 goto out;
409 }
410
411 if (addr_type != IPV6_ADDR_ANY)
412 sk->sk_userlocks |= SOCK_BINDADDR_LOCK;
413 if (snum)
414 sk->sk_userlocks |= SOCK_BINDPORT_LOCK;
415 inet->inet_sport = htons(inet->inet_num);
416 inet->inet_dport = 0;
417 inet->inet_daddr = 0;
418 out:
419 release_sock(sk);
420 return err;
421 out_unlock:
422 rcu_read_unlock();
423 goto out;
424 }
425 EXPORT_SYMBOL(inet6_bind);
426
inet6_release(struct socket * sock)427 int inet6_release(struct socket *sock)
428 {
429 struct sock *sk = sock->sk;
430
431 if (!sk)
432 return -EINVAL;
433
434 /* Free mc lists */
435 ipv6_sock_mc_close(sk);
436
437 /* Free ac lists */
438 ipv6_sock_ac_close(sk);
439
440 return inet_release(sock);
441 }
442 EXPORT_SYMBOL(inet6_release);
443
inet6_destroy_sock(struct sock * sk)444 void inet6_destroy_sock(struct sock *sk)
445 {
446 struct ipv6_pinfo *np = inet6_sk(sk);
447 struct sk_buff *skb;
448 struct ipv6_txoptions *opt;
449
450 /* Release rx options */
451
452 skb = xchg(&np->pktoptions, NULL);
453 if (skb)
454 kfree_skb(skb);
455
456 skb = xchg(&np->rxpmtu, NULL);
457 if (skb)
458 kfree_skb(skb);
459
460 /* Free flowlabels */
461 fl6_free_socklist(sk);
462
463 /* Free tx options */
464
465 opt = xchg((__force struct ipv6_txoptions **)&np->opt, NULL);
466 if (opt) {
467 atomic_sub(opt->tot_len, &sk->sk_omem_alloc);
468 txopt_put(opt);
469 }
470 }
471 EXPORT_SYMBOL_GPL(inet6_destroy_sock);
472
473 /*
474 * This does both peername and sockname.
475 */
476
inet6_getname(struct socket * sock,struct sockaddr * uaddr,int * uaddr_len,int peer)477 int inet6_getname(struct socket *sock, struct sockaddr *uaddr,
478 int *uaddr_len, int peer)
479 {
480 struct sockaddr_in6 *sin = (struct sockaddr_in6 *)uaddr;
481 struct sock *sk = sock->sk;
482 struct inet_sock *inet = inet_sk(sk);
483 struct ipv6_pinfo *np = inet6_sk(sk);
484
485 sin->sin6_family = AF_INET6;
486 sin->sin6_flowinfo = 0;
487 sin->sin6_scope_id = 0;
488 if (peer) {
489 if (!inet->inet_dport)
490 return -ENOTCONN;
491 if (((1 << sk->sk_state) & (TCPF_CLOSE | TCPF_SYN_SENT)) &&
492 peer == 1)
493 return -ENOTCONN;
494 sin->sin6_port = inet->inet_dport;
495 sin->sin6_addr = sk->sk_v6_daddr;
496 if (np->sndflow)
497 sin->sin6_flowinfo = np->flow_label;
498 } else {
499 if (ipv6_addr_any(&sk->sk_v6_rcv_saddr))
500 sin->sin6_addr = np->saddr;
501 else
502 sin->sin6_addr = sk->sk_v6_rcv_saddr;
503
504 sin->sin6_port = inet->inet_sport;
505 }
506 sin->sin6_scope_id = ipv6_iface_scope_id(&sin->sin6_addr,
507 sk->sk_bound_dev_if);
508 *uaddr_len = sizeof(*sin);
509 return 0;
510 }
511 EXPORT_SYMBOL(inet6_getname);
512
inet6_ioctl(struct socket * sock,unsigned int cmd,unsigned long arg)513 int inet6_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg)
514 {
515 struct sock *sk = sock->sk;
516 struct net *net = sock_net(sk);
517
518 switch (cmd) {
519 case SIOCGSTAMP:
520 return sock_get_timestamp(sk, (struct timeval __user *)arg);
521
522 case SIOCGSTAMPNS:
523 return sock_get_timestampns(sk, (struct timespec __user *)arg);
524
525 case SIOCADDRT:
526 case SIOCDELRT:
527
528 return ipv6_route_ioctl(net, cmd, (void __user *)arg);
529
530 case SIOCSIFADDR:
531 return addrconf_add_ifaddr(net, (void __user *) arg);
532 case SIOCDIFADDR:
533 return addrconf_del_ifaddr(net, (void __user *) arg);
534 case SIOCSIFDSTADDR:
535 return addrconf_set_dstaddr(net, (void __user *) arg);
536 default:
537 if (!sk->sk_prot->ioctl)
538 return -ENOIOCTLCMD;
539 return sk->sk_prot->ioctl(sk, cmd, arg);
540 }
541 /*NOTREACHED*/
542 return 0;
543 }
544 EXPORT_SYMBOL(inet6_ioctl);
545
546 const struct proto_ops inet6_stream_ops = {
547 .family = PF_INET6,
548 .owner = THIS_MODULE,
549 .release = inet6_release,
550 .bind = inet6_bind,
551 .connect = inet_stream_connect, /* ok */
552 .socketpair = sock_no_socketpair, /* a do nothing */
553 .accept = inet_accept, /* ok */
554 .getname = inet6_getname,
555 .poll = tcp_poll, /* ok */
556 .ioctl = inet6_ioctl, /* must change */
557 .listen = inet_listen, /* ok */
558 .shutdown = inet_shutdown, /* ok */
559 .setsockopt = sock_common_setsockopt, /* ok */
560 .getsockopt = sock_common_getsockopt, /* ok */
561 .sendmsg = inet_sendmsg, /* ok */
562 .recvmsg = inet_recvmsg, /* ok */
563 .mmap = sock_no_mmap,
564 .sendpage = inet_sendpage,
565 .splice_read = tcp_splice_read,
566 .read_sock = tcp_read_sock,
567 .peek_len = tcp_peek_len,
568 #ifdef CONFIG_COMPAT
569 .compat_setsockopt = compat_sock_common_setsockopt,
570 .compat_getsockopt = compat_sock_common_getsockopt,
571 #endif
572 };
573
574 const struct proto_ops inet6_dgram_ops = {
575 .family = PF_INET6,
576 .owner = THIS_MODULE,
577 .release = inet6_release,
578 .bind = inet6_bind,
579 .connect = inet_dgram_connect, /* ok */
580 .socketpair = sock_no_socketpair, /* a do nothing */
581 .accept = sock_no_accept, /* a do nothing */
582 .getname = inet6_getname,
583 .poll = udp_poll, /* ok */
584 .ioctl = inet6_ioctl, /* must change */
585 .listen = sock_no_listen, /* ok */
586 .shutdown = inet_shutdown, /* ok */
587 .setsockopt = sock_common_setsockopt, /* ok */
588 .getsockopt = sock_common_getsockopt, /* ok */
589 .sendmsg = inet_sendmsg, /* ok */
590 .recvmsg = inet_recvmsg, /* ok */
591 .mmap = sock_no_mmap,
592 .sendpage = sock_no_sendpage,
593 .set_peek_off = sk_set_peek_off,
594 #ifdef CONFIG_COMPAT
595 .compat_setsockopt = compat_sock_common_setsockopt,
596 .compat_getsockopt = compat_sock_common_getsockopt,
597 #endif
598 };
599
600 static const struct net_proto_family inet6_family_ops = {
601 .family = PF_INET6,
602 .create = inet6_create,
603 .owner = THIS_MODULE,
604 };
605
inet6_register_protosw(struct inet_protosw * p)606 int inet6_register_protosw(struct inet_protosw *p)
607 {
608 struct list_head *lh;
609 struct inet_protosw *answer;
610 struct list_head *last_perm;
611 int protocol = p->protocol;
612 int ret;
613
614 spin_lock_bh(&inetsw6_lock);
615
616 ret = -EINVAL;
617 if (p->type >= SOCK_MAX)
618 goto out_illegal;
619
620 /* If we are trying to override a permanent protocol, bail. */
621 answer = NULL;
622 ret = -EPERM;
623 last_perm = &inetsw6[p->type];
624 list_for_each(lh, &inetsw6[p->type]) {
625 answer = list_entry(lh, struct inet_protosw, list);
626
627 /* Check only the non-wild match. */
628 if (INET_PROTOSW_PERMANENT & answer->flags) {
629 if (protocol == answer->protocol)
630 break;
631 last_perm = lh;
632 }
633
634 answer = NULL;
635 }
636 if (answer)
637 goto out_permanent;
638
639 /* Add the new entry after the last permanent entry if any, so that
640 * the new entry does not override a permanent entry when matched with
641 * a wild-card protocol. But it is allowed to override any existing
642 * non-permanent entry. This means that when we remove this entry, the
643 * system automatically returns to the old behavior.
644 */
645 list_add_rcu(&p->list, last_perm);
646 ret = 0;
647 out:
648 spin_unlock_bh(&inetsw6_lock);
649 return ret;
650
651 out_permanent:
652 pr_err("Attempt to override permanent protocol %d\n", protocol);
653 goto out;
654
655 out_illegal:
656 pr_err("Ignoring attempt to register invalid socket type %d\n",
657 p->type);
658 goto out;
659 }
660 EXPORT_SYMBOL(inet6_register_protosw);
661
662 void
inet6_unregister_protosw(struct inet_protosw * p)663 inet6_unregister_protosw(struct inet_protosw *p)
664 {
665 if (INET_PROTOSW_PERMANENT & p->flags) {
666 pr_err("Attempt to unregister permanent protocol %d\n",
667 p->protocol);
668 } else {
669 spin_lock_bh(&inetsw6_lock);
670 list_del_rcu(&p->list);
671 spin_unlock_bh(&inetsw6_lock);
672
673 synchronize_net();
674 }
675 }
676 EXPORT_SYMBOL(inet6_unregister_protosw);
677
inet6_sk_rebuild_header(struct sock * sk)678 int inet6_sk_rebuild_header(struct sock *sk)
679 {
680 struct ipv6_pinfo *np = inet6_sk(sk);
681 struct dst_entry *dst;
682
683 dst = __sk_dst_check(sk, np->dst_cookie);
684
685 if (!dst) {
686 struct inet_sock *inet = inet_sk(sk);
687 struct in6_addr *final_p, final;
688 struct flowi6 fl6;
689
690 memset(&fl6, 0, sizeof(fl6));
691 fl6.flowi6_proto = sk->sk_protocol;
692 fl6.daddr = sk->sk_v6_daddr;
693 fl6.saddr = np->saddr;
694 fl6.flowlabel = np->flow_label;
695 fl6.flowi6_oif = sk->sk_bound_dev_if;
696 fl6.flowi6_mark = sk->sk_mark;
697 fl6.fl6_dport = inet->inet_dport;
698 fl6.fl6_sport = inet->inet_sport;
699 fl6.flowi6_uid = sk->sk_uid;
700 security_sk_classify_flow(sk, flowi6_to_flowi(&fl6));
701
702 rcu_read_lock();
703 final_p = fl6_update_dst(&fl6, rcu_dereference(np->opt),
704 &final);
705 rcu_read_unlock();
706
707 dst = ip6_dst_lookup_flow(sk, &fl6, final_p);
708 if (IS_ERR(dst)) {
709 sk->sk_route_caps = 0;
710 sk->sk_err_soft = -PTR_ERR(dst);
711 return PTR_ERR(dst);
712 }
713
714 ip6_dst_store(sk, dst, NULL, NULL);
715 }
716
717 return 0;
718 }
719 EXPORT_SYMBOL_GPL(inet6_sk_rebuild_header);
720
ipv6_opt_accepted(const struct sock * sk,const struct sk_buff * skb,const struct inet6_skb_parm * opt)721 bool ipv6_opt_accepted(const struct sock *sk, const struct sk_buff *skb,
722 const struct inet6_skb_parm *opt)
723 {
724 const struct ipv6_pinfo *np = inet6_sk(sk);
725
726 if (np->rxopt.all) {
727 if (((opt->flags & IP6SKB_HOPBYHOP) &&
728 (np->rxopt.bits.hopopts || np->rxopt.bits.ohopopts)) ||
729 (ip6_flowinfo((struct ipv6hdr *) skb_network_header(skb)) &&
730 np->rxopt.bits.rxflow) ||
731 (opt->srcrt && (np->rxopt.bits.srcrt ||
732 np->rxopt.bits.osrcrt)) ||
733 ((opt->dst1 || opt->dst0) &&
734 (np->rxopt.bits.dstopts || np->rxopt.bits.odstopts)))
735 return true;
736 }
737 return false;
738 }
739 EXPORT_SYMBOL_GPL(ipv6_opt_accepted);
740
741 static struct packet_type ipv6_packet_type __read_mostly = {
742 .type = cpu_to_be16(ETH_P_IPV6),
743 .func = ipv6_rcv,
744 };
745
ipv6_packet_init(void)746 static int __init ipv6_packet_init(void)
747 {
748 dev_add_pack(&ipv6_packet_type);
749 return 0;
750 }
751
ipv6_packet_cleanup(void)752 static void ipv6_packet_cleanup(void)
753 {
754 dev_remove_pack(&ipv6_packet_type);
755 }
756
ipv6_init_mibs(struct net * net)757 static int __net_init ipv6_init_mibs(struct net *net)
758 {
759 int i;
760
761 net->mib.udp_stats_in6 = alloc_percpu(struct udp_mib);
762 if (!net->mib.udp_stats_in6)
763 return -ENOMEM;
764 net->mib.udplite_stats_in6 = alloc_percpu(struct udp_mib);
765 if (!net->mib.udplite_stats_in6)
766 goto err_udplite_mib;
767 net->mib.ipv6_statistics = alloc_percpu(struct ipstats_mib);
768 if (!net->mib.ipv6_statistics)
769 goto err_ip_mib;
770
771 for_each_possible_cpu(i) {
772 struct ipstats_mib *af_inet6_stats;
773 af_inet6_stats = per_cpu_ptr(net->mib.ipv6_statistics, i);
774 u64_stats_init(&af_inet6_stats->syncp);
775 }
776
777
778 net->mib.icmpv6_statistics = alloc_percpu(struct icmpv6_mib);
779 if (!net->mib.icmpv6_statistics)
780 goto err_icmp_mib;
781 net->mib.icmpv6msg_statistics = kzalloc(sizeof(struct icmpv6msg_mib),
782 GFP_KERNEL);
783 if (!net->mib.icmpv6msg_statistics)
784 goto err_icmpmsg_mib;
785 return 0;
786
787 err_icmpmsg_mib:
788 free_percpu(net->mib.icmpv6_statistics);
789 err_icmp_mib:
790 free_percpu(net->mib.ipv6_statistics);
791 err_ip_mib:
792 free_percpu(net->mib.udplite_stats_in6);
793 err_udplite_mib:
794 free_percpu(net->mib.udp_stats_in6);
795 return -ENOMEM;
796 }
797
ipv6_cleanup_mibs(struct net * net)798 static void ipv6_cleanup_mibs(struct net *net)
799 {
800 free_percpu(net->mib.udp_stats_in6);
801 free_percpu(net->mib.udplite_stats_in6);
802 free_percpu(net->mib.ipv6_statistics);
803 free_percpu(net->mib.icmpv6_statistics);
804 kfree(net->mib.icmpv6msg_statistics);
805 }
806
inet6_net_init(struct net * net)807 static int __net_init inet6_net_init(struct net *net)
808 {
809 int err = 0;
810
811 net->ipv6.sysctl.bindv6only = 0;
812 net->ipv6.sysctl.icmpv6_time = 1*HZ;
813 net->ipv6.sysctl.flowlabel_consistency = 1;
814 net->ipv6.sysctl.auto_flowlabels = IP6_DEFAULT_AUTO_FLOW_LABELS;
815 net->ipv6.sysctl.idgen_retries = 3;
816 net->ipv6.sysctl.idgen_delay = 1 * HZ;
817 net->ipv6.sysctl.flowlabel_state_ranges = 0;
818 atomic_set(&net->ipv6.fib6_sernum, 1);
819
820 err = ipv6_init_mibs(net);
821 if (err)
822 return err;
823 #ifdef CONFIG_PROC_FS
824 err = udp6_proc_init(net);
825 if (err)
826 goto out;
827 err = tcp6_proc_init(net);
828 if (err)
829 goto proc_tcp6_fail;
830 err = ac6_proc_init(net);
831 if (err)
832 goto proc_ac6_fail;
833 #endif
834 return err;
835
836 #ifdef CONFIG_PROC_FS
837 proc_ac6_fail:
838 tcp6_proc_exit(net);
839 proc_tcp6_fail:
840 udp6_proc_exit(net);
841 out:
842 ipv6_cleanup_mibs(net);
843 return err;
844 #endif
845 }
846
inet6_net_exit(struct net * net)847 static void __net_exit inet6_net_exit(struct net *net)
848 {
849 #ifdef CONFIG_PROC_FS
850 udp6_proc_exit(net);
851 tcp6_proc_exit(net);
852 ac6_proc_exit(net);
853 #endif
854 ipv6_cleanup_mibs(net);
855 }
856
857 static struct pernet_operations inet6_net_ops = {
858 .init = inet6_net_init,
859 .exit = inet6_net_exit,
860 };
861
862 static const struct ipv6_stub ipv6_stub_impl = {
863 .ipv6_sock_mc_join = ipv6_sock_mc_join,
864 .ipv6_sock_mc_drop = ipv6_sock_mc_drop,
865 .ipv6_dst_lookup = ip6_dst_lookup,
866 .udpv6_encap_enable = udpv6_encap_enable,
867 .ndisc_send_na = ndisc_send_na,
868 .nd_tbl = &nd_tbl,
869 };
870
inet6_init(void)871 static int __init inet6_init(void)
872 {
873 struct list_head *r;
874 int err = 0;
875
876 sock_skb_cb_check_size(sizeof(struct inet6_skb_parm));
877
878 /* Register the socket-side information for inet6_create. */
879 for (r = &inetsw6[0]; r < &inetsw6[SOCK_MAX]; ++r)
880 INIT_LIST_HEAD(r);
881
882 if (disable_ipv6_mod) {
883 pr_info("Loaded, but administratively disabled, reboot required to enable\n");
884 goto out;
885 }
886
887 err = proto_register(&tcpv6_prot, 1);
888 if (err)
889 goto out;
890
891 err = proto_register(&udpv6_prot, 1);
892 if (err)
893 goto out_unregister_tcp_proto;
894
895 err = proto_register(&udplitev6_prot, 1);
896 if (err)
897 goto out_unregister_udp_proto;
898
899 err = proto_register(&rawv6_prot, 1);
900 if (err)
901 goto out_unregister_udplite_proto;
902
903 err = proto_register(&pingv6_prot, 1);
904 if (err)
905 goto out_unregister_ping_proto;
906
907 /* We MUST register RAW sockets before we create the ICMP6,
908 * IGMP6, or NDISC control sockets.
909 */
910 err = rawv6_init();
911 if (err)
912 goto out_unregister_raw_proto;
913
914 /* Register the family here so that the init calls below will
915 * be able to create sockets. (?? is this dangerous ??)
916 */
917 err = sock_register(&inet6_family_ops);
918 if (err)
919 goto out_sock_register_fail;
920
921 /*
922 * ipngwg API draft makes clear that the correct semantics
923 * for TCP and UDP is to consider one TCP and UDP instance
924 * in a host available by both INET and INET6 APIs and
925 * able to communicate via both network protocols.
926 */
927
928 err = register_pernet_subsys(&inet6_net_ops);
929 if (err)
930 goto register_pernet_fail;
931 err = ip6_mr_init();
932 if (err)
933 goto ipmr_fail;
934 err = icmpv6_init();
935 if (err)
936 goto icmp_fail;
937 err = ndisc_init();
938 if (err)
939 goto ndisc_fail;
940 err = igmp6_init();
941 if (err)
942 goto igmp_fail;
943
944 ipv6_stub = &ipv6_stub_impl;
945
946 err = ipv6_netfilter_init();
947 if (err)
948 goto netfilter_fail;
949 /* Create /proc/foo6 entries. */
950 #ifdef CONFIG_PROC_FS
951 err = -ENOMEM;
952 if (raw6_proc_init())
953 goto proc_raw6_fail;
954 if (udplite6_proc_init())
955 goto proc_udplite6_fail;
956 if (ipv6_misc_proc_init())
957 goto proc_misc6_fail;
958 if (if6_proc_init())
959 goto proc_if6_fail;
960 #endif
961 err = ip6_route_init();
962 if (err)
963 goto ip6_route_fail;
964 err = ndisc_late_init();
965 if (err)
966 goto ndisc_late_fail;
967 err = ip6_flowlabel_init();
968 if (err)
969 goto ip6_flowlabel_fail;
970 err = addrconf_init();
971 if (err)
972 goto addrconf_fail;
973
974 /* Init v6 extension headers. */
975 err = ipv6_exthdrs_init();
976 if (err)
977 goto ipv6_exthdrs_fail;
978
979 err = ipv6_frag_init();
980 if (err)
981 goto ipv6_frag_fail;
982
983 /* Init v6 transport protocols. */
984 err = udpv6_init();
985 if (err)
986 goto udpv6_fail;
987
988 err = udplitev6_init();
989 if (err)
990 goto udplitev6_fail;
991
992 err = udpv6_offload_init();
993 if (err)
994 goto udpv6_offload_fail;
995
996 err = tcpv6_init();
997 if (err)
998 goto tcpv6_fail;
999
1000 err = ipv6_packet_init();
1001 if (err)
1002 goto ipv6_packet_fail;
1003
1004 err = pingv6_init();
1005 if (err)
1006 goto pingv6_fail;
1007
1008 err = calipso_init();
1009 if (err)
1010 goto calipso_fail;
1011
1012 #ifdef CONFIG_SYSCTL
1013 err = ipv6_sysctl_register();
1014 if (err)
1015 goto sysctl_fail;
1016 #endif
1017 out:
1018 return err;
1019
1020 #ifdef CONFIG_SYSCTL
1021 sysctl_fail:
1022 calipso_exit();
1023 #endif
1024 calipso_fail:
1025 pingv6_exit();
1026 pingv6_fail:
1027 ipv6_packet_cleanup();
1028 ipv6_packet_fail:
1029 tcpv6_exit();
1030 tcpv6_fail:
1031 udpv6_offload_exit();
1032 udpv6_offload_fail:
1033 udplitev6_exit();
1034 udplitev6_fail:
1035 udpv6_exit();
1036 udpv6_fail:
1037 ipv6_frag_exit();
1038 ipv6_frag_fail:
1039 ipv6_exthdrs_exit();
1040 ipv6_exthdrs_fail:
1041 addrconf_cleanup();
1042 addrconf_fail:
1043 ip6_flowlabel_cleanup();
1044 ip6_flowlabel_fail:
1045 ndisc_late_cleanup();
1046 ndisc_late_fail:
1047 ip6_route_cleanup();
1048 ip6_route_fail:
1049 #ifdef CONFIG_PROC_FS
1050 if6_proc_exit();
1051 proc_if6_fail:
1052 ipv6_misc_proc_exit();
1053 proc_misc6_fail:
1054 udplite6_proc_exit();
1055 proc_udplite6_fail:
1056 raw6_proc_exit();
1057 proc_raw6_fail:
1058 #endif
1059 ipv6_netfilter_fini();
1060 netfilter_fail:
1061 igmp6_cleanup();
1062 igmp_fail:
1063 ndisc_cleanup();
1064 ndisc_fail:
1065 ip6_mr_cleanup();
1066 icmp_fail:
1067 unregister_pernet_subsys(&inet6_net_ops);
1068 ipmr_fail:
1069 icmpv6_cleanup();
1070 register_pernet_fail:
1071 sock_unregister(PF_INET6);
1072 rtnl_unregister_all(PF_INET6);
1073 out_sock_register_fail:
1074 rawv6_exit();
1075 out_unregister_ping_proto:
1076 proto_unregister(&pingv6_prot);
1077 out_unregister_raw_proto:
1078 proto_unregister(&rawv6_prot);
1079 out_unregister_udplite_proto:
1080 proto_unregister(&udplitev6_prot);
1081 out_unregister_udp_proto:
1082 proto_unregister(&udpv6_prot);
1083 out_unregister_tcp_proto:
1084 proto_unregister(&tcpv6_prot);
1085 goto out;
1086 }
1087 module_init(inet6_init);
1088
1089 MODULE_ALIAS_NETPROTO(PF_INET6);
1090