1 /* SCTP kernel implementation
2 * (C) Copyright IBM Corp. 2002, 2004
3 * Copyright (c) 2001 Nokia, Inc.
4 * Copyright (c) 2001 La Monte H.P. Yarroll
5 * Copyright (c) 2002-2003 Intel Corp.
7 * This file is part of the SCTP kernel implementation
11 * This SCTP implementation is free software;
12 * you can redistribute it and/or modify it under the terms of
13 * the GNU General Public License as published by
14 * the Free Software Foundation; either version 2, or (at your option)
17 * This SCTP implementation is distributed in the hope that it
18 * will be useful, but WITHOUT ANY WARRANTY; without even the implied
19 * ************************
20 * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
21 * See the GNU General Public License for more details.
23 * You should have received a copy of the GNU General Public License
24 * along with GNU CC; see the file COPYING. If not, see
25 * <http://www.gnu.org/licenses/>.
27 * Please send any bug reports or fixes you make to the
29 * lksctp developers <linux-sctp@vger.kernel.org>
31 * Written or modified by:
32 * Le Yanqun <yanqun.le@nokia.com>
33 * Hui Huang <hui.huang@nokia.com>
34 * La Monte H.P. Yarroll <piggy@acm.org>
35 * Sridhar Samudrala <sri@us.ibm.com>
36 * Jon Grimm <jgrimm@us.ibm.com>
37 * Ardelle Fan <ardelle.fan@intel.com>
40 * linux/net/ipv6/tcp_ipv6.c
43 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
45 #include <linux/module.h>
46 #include <linux/errno.h>
47 #include <linux/types.h>
48 #include <linux/socket.h>
49 #include <linux/sockios.h>
50 #include <linux/net.h>
52 #include <linux/in6.h>
53 #include <linux/netdevice.h>
54 #include <linux/init.h>
55 #include <linux/ipsec.h>
56 #include <linux/slab.h>
58 #include <linux/ipv6.h>
59 #include <linux/icmpv6.h>
60 #include <linux/random.h>
61 #include <linux/seq_file.h>
63 #include <net/protocol.h>
64 #include <net/ndisc.h>
67 #include <net/transp_v6.h>
68 #include <net/addrconf.h>
69 #include <net/ip6_route.h>
70 #include <net/inet_common.h>
71 #include <net/inet_ecn.h>
72 #include <net/sctp/sctp.h>
74 #include <linux/uaccess.h>
76 static inline int sctp_v6_addr_match_len(union sctp_addr
*s1
,
78 static void sctp_v6_to_addr(union sctp_addr
*addr
, struct in6_addr
*saddr
,
80 static int sctp_v6_cmp_addr(const union sctp_addr
*addr1
,
81 const union sctp_addr
*addr2
);
83 /* Event handler for inet6 address addition/deletion events.
84 * The sctp_local_addr_list needs to be protocted by a spin lock since
85 * multiple notifiers (say IPv4 and IPv6) may be running at the same
86 * time and thus corrupt the list.
87 * The reader side is protected with RCU.
89 static int sctp_inet6addr_event(struct notifier_block
*this, unsigned long ev
,
92 struct inet6_ifaddr
*ifa
= (struct inet6_ifaddr
*)ptr
;
93 struct sctp_sockaddr_entry
*addr
= NULL
;
94 struct sctp_sockaddr_entry
*temp
;
95 struct net
*net
= dev_net(ifa
->idev
->dev
);
100 addr
= kzalloc(sizeof(*addr
), GFP_ATOMIC
);
102 addr
->a
.v6
.sin6_family
= AF_INET6
;
103 addr
->a
.v6
.sin6_addr
= ifa
->addr
;
104 addr
->a
.v6
.sin6_scope_id
= ifa
->idev
->dev
->ifindex
;
106 spin_lock_bh(&net
->sctp
.local_addr_lock
);
107 list_add_tail_rcu(&addr
->list
, &net
->sctp
.local_addr_list
);
108 sctp_addr_wq_mgmt(net
, addr
, SCTP_ADDR_NEW
);
109 spin_unlock_bh(&net
->sctp
.local_addr_lock
);
113 spin_lock_bh(&net
->sctp
.local_addr_lock
);
114 list_for_each_entry_safe(addr
, temp
,
115 &net
->sctp
.local_addr_list
, list
) {
116 if (addr
->a
.sa
.sa_family
== AF_INET6
&&
117 ipv6_addr_equal(&addr
->a
.v6
.sin6_addr
,
119 sctp_addr_wq_mgmt(net
, addr
, SCTP_ADDR_DEL
);
122 list_del_rcu(&addr
->list
);
126 spin_unlock_bh(&net
->sctp
.local_addr_lock
);
128 kfree_rcu(addr
, rcu
);
135 static struct notifier_block sctp_inet6addr_notifier
= {
136 .notifier_call
= sctp_inet6addr_event
,
139 /* ICMP error handler. */
140 static void sctp_v6_err(struct sk_buff
*skb
, struct inet6_skb_parm
*opt
,
141 u8 type
, u8 code
, int offset
, __be32 info
)
143 struct inet6_dev
*idev
;
145 struct sctp_association
*asoc
;
146 struct sctp_transport
*transport
;
147 struct ipv6_pinfo
*np
;
148 __u16 saveip
, savesctp
;
150 struct net
*net
= dev_net(skb
->dev
);
152 idev
= in6_dev_get(skb
->dev
);
154 /* Fix up skb to look at the embedded net header. */
155 saveip
= skb
->network_header
;
156 savesctp
= skb
->transport_header
;
157 skb_reset_network_header(skb
);
158 skb_set_transport_header(skb
, offset
);
159 sk
= sctp_err_lookup(net
, AF_INET6
, skb
, sctp_hdr(skb
), &asoc
, &transport
);
160 /* Put back, the original pointers. */
161 skb
->network_header
= saveip
;
162 skb
->transport_header
= savesctp
;
164 __ICMP6_INC_STATS(net
, idev
, ICMP6_MIB_INERRORS
);
168 /* Warning: The sock lock is held. Remember to call
173 case ICMPV6_PKT_TOOBIG
:
174 if (ip6_sk_accept_pmtu(sk
))
175 sctp_icmp_frag_needed(sk
, asoc
, transport
, ntohl(info
));
177 case ICMPV6_PARAMPROB
:
178 if (ICMPV6_UNK_NEXTHDR
== code
) {
179 sctp_icmp_proto_unreachable(sk
, asoc
, transport
);
184 sctp_icmp_redirect(sk
, transport
, skb
);
191 icmpv6_err_convert(type
, code
, &err
);
192 if (!sock_owned_by_user(sk
) && np
->recverr
) {
194 sk
->sk_error_report(sk
);
195 } else { /* Only an error on timeout */
196 sk
->sk_err_soft
= err
;
200 sctp_err_finish(sk
, transport
);
202 if (likely(idev
!= NULL
))
206 static int sctp_v6_xmit(struct sk_buff
*skb
, struct sctp_transport
*transport
)
208 struct sock
*sk
= skb
->sk
;
209 struct ipv6_pinfo
*np
= inet6_sk(sk
);
210 struct flowi6
*fl6
= &transport
->fl
.u
.ip6
;
211 __u8 tclass
= np
->tclass
;
214 pr_debug("%s: skb:%p, len:%d, src:%pI6 dst:%pI6\n", __func__
, skb
,
215 skb
->len
, &fl6
->saddr
, &fl6
->daddr
);
217 if (transport
->dscp
& SCTP_DSCP_SET_MASK
)
218 tclass
= transport
->dscp
& SCTP_DSCP_VAL_MASK
;
220 if (INET_ECN_is_capable(tclass
))
221 IP6_ECN_flow_xmit(sk
, fl6
->flowlabel
);
223 if (!(transport
->param_flags
& SPP_PMTUD_ENABLE
))
226 SCTP_INC_STATS(sock_net(sk
), SCTP_MIB_OUTSCTPPACKS
);
229 res
= ip6_xmit(sk
, skb
, fl6
, sk
->sk_mark
, rcu_dereference(np
->opt
),
235 /* Returns the dst cache entry for the given source and destination ip
238 static void sctp_v6_get_dst(struct sctp_transport
*t
, union sctp_addr
*saddr
,
239 struct flowi
*fl
, struct sock
*sk
)
241 struct sctp_association
*asoc
= t
->asoc
;
242 struct dst_entry
*dst
= NULL
;
244 struct flowi6
*fl6
= &_fl
.u
.ip6
;
245 struct sctp_bind_addr
*bp
;
246 struct ipv6_pinfo
*np
= inet6_sk(sk
);
247 struct sctp_sockaddr_entry
*laddr
;
248 union sctp_addr
*daddr
= &t
->ipaddr
;
249 union sctp_addr dst_saddr
;
250 struct in6_addr
*final_p
, final
;
251 enum sctp_scope scope
;
254 memset(&_fl
, 0, sizeof(_fl
));
255 fl6
->daddr
= daddr
->v6
.sin6_addr
;
256 fl6
->fl6_dport
= daddr
->v6
.sin6_port
;
257 fl6
->flowi6_proto
= IPPROTO_SCTP
;
258 if (ipv6_addr_type(&daddr
->v6
.sin6_addr
) & IPV6_ADDR_LINKLOCAL
)
259 fl6
->flowi6_oif
= daddr
->v6
.sin6_scope_id
;
261 fl6
->flowi6_oif
= asoc
->base
.sk
->sk_bound_dev_if
;
262 if (t
->flowlabel
& SCTP_FLOWLABEL_SET_MASK
)
263 fl6
->flowlabel
= htonl(t
->flowlabel
& SCTP_FLOWLABEL_VAL_MASK
);
265 if (np
->sndflow
&& (fl6
->flowlabel
& IPV6_FLOWLABEL_MASK
)) {
266 struct ip6_flowlabel
*flowlabel
;
268 flowlabel
= fl6_sock_lookup(sk
, fl6
->flowlabel
);
271 fl6_sock_release(flowlabel
);
274 pr_debug("%s: dst=%pI6 ", __func__
, &fl6
->daddr
);
277 fl6
->fl6_sport
= htons(asoc
->base
.bind_addr
.port
);
280 fl6
->saddr
= saddr
->v6
.sin6_addr
;
282 fl6
->fl6_sport
= saddr
->v6
.sin6_port
;
284 pr_debug("src=%pI6 - ", &fl6
->saddr
);
288 final_p
= fl6_update_dst(fl6
, rcu_dereference(np
->opt
), &final
);
291 dst
= ip6_dst_lookup_flow(sock_net(sk
), sk
, fl6
, final_p
);
292 if (!asoc
|| saddr
) {
294 memcpy(fl
, &_fl
, sizeof(_fl
));
298 bp
= &asoc
->base
.bind_addr
;
299 scope
= sctp_scope(daddr
);
300 /* ip6_dst_lookup has filled in the fl6->saddr for us. Check
301 * to see if we can use it.
304 /* Walk through the bind address list and look for a bind
305 * address that matches the source address of the returned dst.
307 sctp_v6_to_addr(&dst_saddr
, &fl6
->saddr
, htons(bp
->port
));
309 list_for_each_entry_rcu(laddr
, &bp
->address_list
, list
) {
310 if (!laddr
->valid
|| laddr
->state
== SCTP_ADDR_DEL
||
311 (laddr
->state
!= SCTP_ADDR_SRC
&&
312 !asoc
->src_out_of_asoc_ok
))
315 /* Do not compare against v4 addrs */
316 if ((laddr
->a
.sa
.sa_family
== AF_INET6
) &&
317 (sctp_v6_cmp_addr(&dst_saddr
, &laddr
->a
))) {
320 memcpy(fl
, &_fl
, sizeof(_fl
));
325 /* None of the bound addresses match the source address of the
326 * dst. So release it.
332 /* Walk through the bind address list and try to get the
333 * best source address for a given destination.
336 list_for_each_entry_rcu(laddr
, &bp
->address_list
, list
) {
337 struct dst_entry
*bdst
;
341 laddr
->state
!= SCTP_ADDR_SRC
||
342 laddr
->a
.sa
.sa_family
!= AF_INET6
||
343 scope
> sctp_scope(&laddr
->a
))
346 fl6
->saddr
= laddr
->a
.v6
.sin6_addr
;
347 fl6
->fl6_sport
= laddr
->a
.v6
.sin6_port
;
348 final_p
= fl6_update_dst(fl6
, rcu_dereference(np
->opt
), &final
);
349 bdst
= ip6_dst_lookup_flow(sock_net(sk
), sk
, fl6
, final_p
);
354 if (ipv6_chk_addr(dev_net(bdst
->dev
),
355 &laddr
->a
.v6
.sin6_addr
, bdst
->dev
, 1)) {
356 if (!IS_ERR_OR_NULL(dst
))
360 memcpy(fl
, &_fl
, sizeof(_fl
));
364 bmatchlen
= sctp_v6_addr_match_len(daddr
, &laddr
->a
);
365 if (matchlen
> bmatchlen
) {
370 if (!IS_ERR_OR_NULL(dst
))
373 matchlen
= bmatchlen
;
375 memcpy(fl
, &_fl
, sizeof(_fl
));
380 if (!IS_ERR_OR_NULL(dst
)) {
383 rt
= (struct rt6_info
*)dst
;
384 t
->dst_cookie
= rt6_get_cookie(rt
);
385 pr_debug("rt6_dst:%pI6/%d rt6_src:%pI6\n",
386 &rt
->rt6i_dst
.addr
, rt
->rt6i_dst
.plen
,
390 pr_debug("no route\n");
394 /* Returns the number of consecutive initial bits that match in the 2 ipv6
397 static inline int sctp_v6_addr_match_len(union sctp_addr
*s1
,
400 return ipv6_addr_diff(&s1
->v6
.sin6_addr
, &s2
->v6
.sin6_addr
);
403 /* Fills in the source address(saddr) based on the destination address(daddr)
404 * and asoc's bind address list.
406 static void sctp_v6_get_saddr(struct sctp_sock
*sk
,
407 struct sctp_transport
*t
,
410 struct flowi6
*fl6
= &fl
->u
.ip6
;
411 union sctp_addr
*saddr
= &t
->saddr
;
413 pr_debug("%s: asoc:%p dst:%p\n", __func__
, t
->asoc
, t
->dst
);
416 saddr
->v6
.sin6_family
= AF_INET6
;
417 saddr
->v6
.sin6_addr
= fl6
->saddr
;
421 /* Make a copy of all potential local addresses. */
422 static void sctp_v6_copy_addrlist(struct list_head
*addrlist
,
423 struct net_device
*dev
)
425 struct inet6_dev
*in6_dev
;
426 struct inet6_ifaddr
*ifp
;
427 struct sctp_sockaddr_entry
*addr
;
430 if ((in6_dev
= __in6_dev_get(dev
)) == NULL
) {
435 read_lock_bh(&in6_dev
->lock
);
436 list_for_each_entry(ifp
, &in6_dev
->addr_list
, if_list
) {
437 /* Add the address to the local list. */
438 addr
= kzalloc(sizeof(*addr
), GFP_ATOMIC
);
440 addr
->a
.v6
.sin6_family
= AF_INET6
;
441 addr
->a
.v6
.sin6_addr
= ifp
->addr
;
442 addr
->a
.v6
.sin6_scope_id
= dev
->ifindex
;
444 INIT_LIST_HEAD(&addr
->list
);
445 list_add_tail(&addr
->list
, addrlist
);
449 read_unlock_bh(&in6_dev
->lock
);
453 /* Copy over any ip options */
454 static void sctp_v6_copy_ip_options(struct sock
*sk
, struct sock
*newsk
)
456 struct ipv6_pinfo
*newnp
, *np
= inet6_sk(sk
);
457 struct ipv6_txoptions
*opt
;
459 newnp
= inet6_sk(newsk
);
462 opt
= rcu_dereference(np
->opt
);
464 opt
= ipv6_dup_options(newsk
, opt
);
466 pr_err("%s: Failed to copy ip options\n", __func__
);
468 RCU_INIT_POINTER(newnp
->opt
, opt
);
472 /* Account for the IP options */
473 static int sctp_v6_ip_options_len(struct sock
*sk
)
475 struct ipv6_pinfo
*np
= inet6_sk(sk
);
476 struct ipv6_txoptions
*opt
;
480 opt
= rcu_dereference(np
->opt
);
482 len
= opt
->opt_flen
+ opt
->opt_nflen
;
488 /* Initialize a sockaddr_storage from in incoming skb. */
489 static void sctp_v6_from_skb(union sctp_addr
*addr
, struct sk_buff
*skb
,
492 /* Always called on head skb, so this is safe */
493 struct sctphdr
*sh
= sctp_hdr(skb
);
494 struct sockaddr_in6
*sa
= &addr
->v6
;
496 addr
->v6
.sin6_family
= AF_INET6
;
497 addr
->v6
.sin6_flowinfo
= 0; /* FIXME */
498 addr
->v6
.sin6_scope_id
= ((struct inet6_skb_parm
*)skb
->cb
)->iif
;
501 sa
->sin6_port
= sh
->source
;
502 sa
->sin6_addr
= ipv6_hdr(skb
)->saddr
;
504 sa
->sin6_port
= sh
->dest
;
505 sa
->sin6_addr
= ipv6_hdr(skb
)->daddr
;
509 /* Initialize an sctp_addr from a socket. */
510 static void sctp_v6_from_sk(union sctp_addr
*addr
, struct sock
*sk
)
512 addr
->v6
.sin6_family
= AF_INET6
;
513 addr
->v6
.sin6_port
= 0;
514 addr
->v6
.sin6_addr
= sk
->sk_v6_rcv_saddr
;
517 /* Initialize sk->sk_rcv_saddr from sctp_addr. */
518 static void sctp_v6_to_sk_saddr(union sctp_addr
*addr
, struct sock
*sk
)
520 if (addr
->sa
.sa_family
== AF_INET
) {
521 sk
->sk_v6_rcv_saddr
.s6_addr32
[0] = 0;
522 sk
->sk_v6_rcv_saddr
.s6_addr32
[1] = 0;
523 sk
->sk_v6_rcv_saddr
.s6_addr32
[2] = htonl(0x0000ffff);
524 sk
->sk_v6_rcv_saddr
.s6_addr32
[3] =
525 addr
->v4
.sin_addr
.s_addr
;
527 sk
->sk_v6_rcv_saddr
= addr
->v6
.sin6_addr
;
531 /* Initialize sk->sk_daddr from sctp_addr. */
532 static void sctp_v6_to_sk_daddr(union sctp_addr
*addr
, struct sock
*sk
)
534 if (addr
->sa
.sa_family
== AF_INET
) {
535 sk
->sk_v6_daddr
.s6_addr32
[0] = 0;
536 sk
->sk_v6_daddr
.s6_addr32
[1] = 0;
537 sk
->sk_v6_daddr
.s6_addr32
[2] = htonl(0x0000ffff);
538 sk
->sk_v6_daddr
.s6_addr32
[3] = addr
->v4
.sin_addr
.s_addr
;
540 sk
->sk_v6_daddr
= addr
->v6
.sin6_addr
;
544 /* Initialize a sctp_addr from an address parameter. */
545 static void sctp_v6_from_addr_param(union sctp_addr
*addr
,
546 union sctp_addr_param
*param
,
547 __be16 port
, int iif
)
549 addr
->v6
.sin6_family
= AF_INET6
;
550 addr
->v6
.sin6_port
= port
;
551 addr
->v6
.sin6_flowinfo
= 0; /* BUG */
552 addr
->v6
.sin6_addr
= param
->v6
.addr
;
553 addr
->v6
.sin6_scope_id
= iif
;
556 /* Initialize an address parameter from a sctp_addr and return the length
557 * of the address parameter.
559 static int sctp_v6_to_addr_param(const union sctp_addr
*addr
,
560 union sctp_addr_param
*param
)
562 int length
= sizeof(struct sctp_ipv6addr_param
);
564 param
->v6
.param_hdr
.type
= SCTP_PARAM_IPV6_ADDRESS
;
565 param
->v6
.param_hdr
.length
= htons(length
);
566 param
->v6
.addr
= addr
->v6
.sin6_addr
;
571 /* Initialize a sctp_addr from struct in6_addr. */
572 static void sctp_v6_to_addr(union sctp_addr
*addr
, struct in6_addr
*saddr
,
575 addr
->sa
.sa_family
= AF_INET6
;
576 addr
->v6
.sin6_port
= port
;
577 addr
->v6
.sin6_flowinfo
= 0;
578 addr
->v6
.sin6_addr
= *saddr
;
579 addr
->v6
.sin6_scope_id
= 0;
582 static int __sctp_v6_cmp_addr(const union sctp_addr
*addr1
,
583 const union sctp_addr
*addr2
)
585 if (addr1
->sa
.sa_family
!= addr2
->sa
.sa_family
) {
586 if (addr1
->sa
.sa_family
== AF_INET
&&
587 addr2
->sa
.sa_family
== AF_INET6
&&
588 ipv6_addr_v4mapped(&addr2
->v6
.sin6_addr
) &&
589 addr2
->v6
.sin6_addr
.s6_addr32
[3] ==
590 addr1
->v4
.sin_addr
.s_addr
)
593 if (addr2
->sa
.sa_family
== AF_INET
&&
594 addr1
->sa
.sa_family
== AF_INET6
&&
595 ipv6_addr_v4mapped(&addr1
->v6
.sin6_addr
) &&
596 addr1
->v6
.sin6_addr
.s6_addr32
[3] ==
597 addr2
->v4
.sin_addr
.s_addr
)
603 if (!ipv6_addr_equal(&addr1
->v6
.sin6_addr
, &addr2
->v6
.sin6_addr
))
606 /* If this is a linklocal address, compare the scope_id. */
607 if ((ipv6_addr_type(&addr1
->v6
.sin6_addr
) & IPV6_ADDR_LINKLOCAL
) &&
608 addr1
->v6
.sin6_scope_id
&& addr2
->v6
.sin6_scope_id
&&
609 addr1
->v6
.sin6_scope_id
!= addr2
->v6
.sin6_scope_id
)
615 /* Compare addresses exactly.
616 * v4-mapped-v6 is also in consideration.
618 static int sctp_v6_cmp_addr(const union sctp_addr
*addr1
,
619 const union sctp_addr
*addr2
)
621 return __sctp_v6_cmp_addr(addr1
, addr2
) &&
622 addr1
->v6
.sin6_port
== addr2
->v6
.sin6_port
;
625 /* Initialize addr struct to INADDR_ANY. */
626 static void sctp_v6_inaddr_any(union sctp_addr
*addr
, __be16 port
)
628 memset(addr
, 0x00, sizeof(union sctp_addr
));
629 addr
->v6
.sin6_family
= AF_INET6
;
630 addr
->v6
.sin6_port
= port
;
633 /* Is this a wildcard address? */
634 static int sctp_v6_is_any(const union sctp_addr
*addr
)
636 return ipv6_addr_any(&addr
->v6
.sin6_addr
);
639 /* Should this be available for binding? */
640 static int sctp_v6_available(union sctp_addr
*addr
, struct sctp_sock
*sp
)
643 struct net
*net
= sock_net(&sp
->inet
.sk
);
644 const struct in6_addr
*in6
= (const struct in6_addr
*)&addr
->v6
.sin6_addr
;
646 type
= ipv6_addr_type(in6
);
647 if (IPV6_ADDR_ANY
== type
)
649 if (type
== IPV6_ADDR_MAPPED
) {
650 if (sp
&& ipv6_only_sock(sctp_opt2sk(sp
)))
652 sctp_v6_map_v4(addr
);
653 return sctp_get_af_specific(AF_INET
)->available(addr
, sp
);
655 if (!(type
& IPV6_ADDR_UNICAST
))
658 return sp
->inet
.freebind
|| net
->ipv6
.sysctl
.ip_nonlocal_bind
||
659 ipv6_chk_addr(net
, in6
, NULL
, 0);
662 /* This function checks if the address is a valid address to be used for
666 * Return 0 - If the address is a non-unicast or an illegal address.
667 * Return 1 - If the address is a unicast.
669 static int sctp_v6_addr_valid(union sctp_addr
*addr
,
670 struct sctp_sock
*sp
,
671 const struct sk_buff
*skb
)
673 int ret
= ipv6_addr_type(&addr
->v6
.sin6_addr
);
675 /* Support v4-mapped-v6 address. */
676 if (ret
== IPV6_ADDR_MAPPED
) {
677 /* Note: This routine is used in input, so v4-mapped-v6
678 * are disallowed here when there is no sctp_sock.
680 if (sp
&& ipv6_only_sock(sctp_opt2sk(sp
)))
682 sctp_v6_map_v4(addr
);
683 return sctp_get_af_specific(AF_INET
)->addr_valid(addr
, sp
, skb
);
686 /* Is this a non-unicast address */
687 if (!(ret
& IPV6_ADDR_UNICAST
))
693 /* What is the scope of 'addr'? */
694 static enum sctp_scope
sctp_v6_scope(union sctp_addr
*addr
)
696 enum sctp_scope retval
;
699 /* The IPv6 scope is really a set of bit fields.
700 * See IFA_* in <net/if_inet6.h>. Map to a generic SCTP scope.
703 v6scope
= ipv6_addr_scope(&addr
->v6
.sin6_addr
);
706 retval
= SCTP_SCOPE_LOOPBACK
;
709 retval
= SCTP_SCOPE_LINK
;
712 retval
= SCTP_SCOPE_PRIVATE
;
715 retval
= SCTP_SCOPE_GLOBAL
;
722 /* Create and initialize a new sk for the socket to be returned by accept(). */
723 static struct sock
*sctp_v6_create_accept_sk(struct sock
*sk
,
724 struct sctp_association
*asoc
,
728 struct ipv6_pinfo
*newnp
, *np
= inet6_sk(sk
);
729 struct sctp6_sock
*newsctp6sk
;
731 newsk
= sk_alloc(sock_net(sk
), PF_INET6
, GFP_KERNEL
, sk
->sk_prot
, kern
);
735 sock_init_data(NULL
, newsk
);
737 sctp_copy_sock(newsk
, sk
, asoc
);
738 sock_reset_flag(sk
, SOCK_ZAPPED
);
740 newsctp6sk
= (struct sctp6_sock
*)newsk
;
741 inet_sk(newsk
)->pinet6
= &newsctp6sk
->inet6
;
743 sctp_sk(newsk
)->v4mapped
= sctp_sk(sk
)->v4mapped
;
745 newnp
= inet6_sk(newsk
);
747 memcpy(newnp
, np
, sizeof(struct ipv6_pinfo
));
748 newnp
->ipv6_mc_list
= NULL
;
749 newnp
->ipv6_ac_list
= NULL
;
750 newnp
->ipv6_fl_list
= NULL
;
752 sctp_v6_copy_ip_options(sk
, newsk
);
754 /* Initialize sk's sport, dport, rcv_saddr and daddr for getsockname()
757 sctp_v6_to_sk_daddr(&asoc
->peer
.primary_addr
, newsk
);
759 newsk
->sk_v6_rcv_saddr
= sk
->sk_v6_rcv_saddr
;
761 sk_refcnt_debug_inc(newsk
);
763 if (newsk
->sk_prot
->init(newsk
)) {
764 sk_common_release(newsk
);
772 /* Format a sockaddr for return to user space. This makes sure the return is
773 * AF_INET or AF_INET6 depending on the SCTP_I_WANT_MAPPED_V4_ADDR option.
775 static int sctp_v6_addr_to_user(struct sctp_sock
*sp
, union sctp_addr
*addr
)
778 if (addr
->sa
.sa_family
== AF_INET
)
779 sctp_v4_map_v6(addr
);
781 if (addr
->sa
.sa_family
== AF_INET6
&&
782 ipv6_addr_v4mapped(&addr
->v6
.sin6_addr
))
783 sctp_v6_map_v4(addr
);
786 if (addr
->sa
.sa_family
== AF_INET
) {
787 memset(addr
->v4
.sin_zero
, 0, sizeof(addr
->v4
.sin_zero
));
788 return sizeof(struct sockaddr_in
);
790 return sizeof(struct sockaddr_in6
);
793 /* Where did this skb come from? */
794 static int sctp_v6_skb_iif(const struct sk_buff
*skb
)
796 return IP6CB(skb
)->iif
;
799 /* Was this packet marked by Explicit Congestion Notification? */
800 static int sctp_v6_is_ce(const struct sk_buff
*skb
)
802 return *((__u32
*)(ipv6_hdr(skb
))) & (__force __u32
)htonl(1 << 20);
805 /* Dump the v6 addr to the seq file. */
806 static void sctp_v6_seq_dump_addr(struct seq_file
*seq
, union sctp_addr
*addr
)
808 seq_printf(seq
, "%pI6 ", &addr
->v6
.sin6_addr
);
811 static void sctp_v6_ecn_capable(struct sock
*sk
)
813 inet6_sk(sk
)->tclass
|= INET_ECN_ECT_0
;
816 /* Initialize a PF_INET msgname from a ulpevent. */
817 static void sctp_inet6_event_msgname(struct sctp_ulpevent
*event
,
818 char *msgname
, int *addrlen
)
820 union sctp_addr
*addr
;
821 struct sctp_association
*asoc
;
822 union sctp_addr
*paddr
;
827 addr
= (union sctp_addr
*)msgname
;
829 paddr
= &asoc
->peer
.primary_addr
;
831 if (paddr
->sa
.sa_family
== AF_INET
) {
832 addr
->v4
.sin_family
= AF_INET
;
833 addr
->v4
.sin_port
= htons(asoc
->peer
.port
);
834 addr
->v4
.sin_addr
= paddr
->v4
.sin_addr
;
836 addr
->v6
.sin6_family
= AF_INET6
;
837 addr
->v6
.sin6_flowinfo
= 0;
838 if (ipv6_addr_type(&paddr
->v6
.sin6_addr
) & IPV6_ADDR_LINKLOCAL
)
839 addr
->v6
.sin6_scope_id
= paddr
->v6
.sin6_scope_id
;
841 addr
->v6
.sin6_scope_id
= 0;
842 addr
->v6
.sin6_port
= htons(asoc
->peer
.port
);
843 addr
->v6
.sin6_addr
= paddr
->v6
.sin6_addr
;
846 *addrlen
= sctp_v6_addr_to_user(sctp_sk(asoc
->base
.sk
), addr
);
849 /* Initialize a msg_name from an inbound skb. */
850 static void sctp_inet6_skb_msgname(struct sk_buff
*skb
, char *msgname
,
853 union sctp_addr
*addr
;
859 addr
= (union sctp_addr
*)msgname
;
862 if (ip_hdr(skb
)->version
== 4) {
863 addr
->v4
.sin_family
= AF_INET
;
864 addr
->v4
.sin_port
= sh
->source
;
865 addr
->v4
.sin_addr
.s_addr
= ip_hdr(skb
)->saddr
;
867 addr
->v6
.sin6_family
= AF_INET6
;
868 addr
->v6
.sin6_flowinfo
= 0;
869 addr
->v6
.sin6_port
= sh
->source
;
870 addr
->v6
.sin6_addr
= ipv6_hdr(skb
)->saddr
;
871 if (ipv6_addr_type(&addr
->v6
.sin6_addr
) & IPV6_ADDR_LINKLOCAL
)
872 addr
->v6
.sin6_scope_id
= sctp_v6_skb_iif(skb
);
874 addr
->v6
.sin6_scope_id
= 0;
877 *addr_len
= sctp_v6_addr_to_user(sctp_sk(skb
->sk
), addr
);
880 /* Do we support this AF? */
881 static int sctp_inet6_af_supported(sa_family_t family
, struct sctp_sock
*sp
)
886 /* v4-mapped-v6 addresses */
888 if (!__ipv6_only_sock(sctp_opt2sk(sp
)))
896 /* Address matching with wildcards allowed. This extra level
897 * of indirection lets us choose whether a PF_INET6 should
898 * disallow any v4 addresses if we so choose.
900 static int sctp_inet6_cmp_addr(const union sctp_addr
*addr1
,
901 const union sctp_addr
*addr2
,
902 struct sctp_sock
*opt
)
904 struct sock
*sk
= sctp_opt2sk(opt
);
905 struct sctp_af
*af1
, *af2
;
907 af1
= sctp_get_af_specific(addr1
->sa
.sa_family
);
908 af2
= sctp_get_af_specific(addr2
->sa
.sa_family
);
913 /* If the socket is IPv6 only, v4 addrs will not match */
914 if (__ipv6_only_sock(sk
) && af1
!= af2
)
917 /* Today, wildcard AF_INET/AF_INET6. */
918 if (sctp_is_any(sk
, addr1
) || sctp_is_any(sk
, addr2
))
921 if (addr1
->sa
.sa_family
== AF_INET
&& addr2
->sa
.sa_family
== AF_INET
)
922 return addr1
->v4
.sin_addr
.s_addr
== addr2
->v4
.sin_addr
.s_addr
;
924 return __sctp_v6_cmp_addr(addr1
, addr2
);
927 /* Verify that the provided sockaddr looks bindable. Common verification,
928 * has already been taken care of.
930 static int sctp_inet6_bind_verify(struct sctp_sock
*opt
, union sctp_addr
*addr
)
934 /* ASSERT: address family has already been verified. */
935 if (addr
->sa
.sa_family
!= AF_INET6
)
936 af
= sctp_get_af_specific(addr
->sa
.sa_family
);
938 int type
= ipv6_addr_type(&addr
->v6
.sin6_addr
);
939 struct net_device
*dev
;
941 if (type
& IPV6_ADDR_LINKLOCAL
) {
943 if (!addr
->v6
.sin6_scope_id
)
945 net
= sock_net(&opt
->inet
.sk
);
947 dev
= dev_get_by_index_rcu(net
, addr
->v6
.sin6_scope_id
);
948 if (!dev
|| !(opt
->inet
.freebind
||
949 net
->ipv6
.sysctl
.ip_nonlocal_bind
||
950 ipv6_chk_addr(net
, &addr
->v6
.sin6_addr
,
960 return af
->available(addr
, opt
);
963 /* Verify that the provided sockaddr looks sendable. Common verification,
964 * has already been taken care of.
966 static int sctp_inet6_send_verify(struct sctp_sock
*opt
, union sctp_addr
*addr
)
968 struct sctp_af
*af
= NULL
;
970 /* ASSERT: address family has already been verified. */
971 if (addr
->sa
.sa_family
!= AF_INET6
)
972 af
= sctp_get_af_specific(addr
->sa
.sa_family
);
974 int type
= ipv6_addr_type(&addr
->v6
.sin6_addr
);
975 struct net_device
*dev
;
977 if (type
& IPV6_ADDR_LINKLOCAL
) {
978 if (!addr
->v6
.sin6_scope_id
)
981 dev
= dev_get_by_index_rcu(sock_net(&opt
->inet
.sk
),
982 addr
->v6
.sin6_scope_id
);
993 /* Fill in Supported Address Type information for INIT and INIT-ACK
994 * chunks. Note: In the future, we may want to look at sock options
995 * to determine whether a PF_INET6 socket really wants to have IPV4
997 * Returns number of addresses supported.
999 static int sctp_inet6_supported_addrs(const struct sctp_sock
*opt
,
1002 types
[0] = SCTP_PARAM_IPV6_ADDRESS
;
1003 if (!opt
|| !ipv6_only_sock(sctp_opt2sk(opt
))) {
1004 types
[1] = SCTP_PARAM_IPV4_ADDRESS
;
1010 /* Handle SCTP_I_WANT_MAPPED_V4_ADDR for getpeername() and getsockname() */
1011 static int sctp_getname(struct socket
*sock
, struct sockaddr
*uaddr
,
1016 rc
= inet6_getname(sock
, uaddr
, peer
);
1021 rc
= sctp_v6_addr_to_user(sctp_sk(sock
->sk
),
1022 (union sctp_addr
*)uaddr
);
1027 static const struct proto_ops inet6_seqpacket_ops
= {
1029 .owner
= THIS_MODULE
,
1030 .release
= inet6_release
,
1032 .connect
= sctp_inet_connect
,
1033 .socketpair
= sock_no_socketpair
,
1034 .accept
= inet_accept
,
1035 .getname
= sctp_getname
,
1037 .ioctl
= inet6_ioctl
,
1038 .listen
= sctp_inet_listen
,
1039 .shutdown
= inet_shutdown
,
1040 .setsockopt
= sock_common_setsockopt
,
1041 .getsockopt
= sock_common_getsockopt
,
1042 .sendmsg
= inet_sendmsg
,
1043 .recvmsg
= inet_recvmsg
,
1044 .mmap
= sock_no_mmap
,
1045 #ifdef CONFIG_COMPAT
1046 .compat_setsockopt
= compat_sock_common_setsockopt
,
1047 .compat_getsockopt
= compat_sock_common_getsockopt
,
1051 static struct inet_protosw sctpv6_seqpacket_protosw
= {
1052 .type
= SOCK_SEQPACKET
,
1053 .protocol
= IPPROTO_SCTP
,
1054 .prot
= &sctpv6_prot
,
1055 .ops
= &inet6_seqpacket_ops
,
1056 .flags
= SCTP_PROTOSW_FLAG
1058 static struct inet_protosw sctpv6_stream_protosw
= {
1059 .type
= SOCK_STREAM
,
1060 .protocol
= IPPROTO_SCTP
,
1061 .prot
= &sctpv6_prot
,
1062 .ops
= &inet6_seqpacket_ops
,
1063 .flags
= SCTP_PROTOSW_FLAG
,
1066 static int sctp6_rcv(struct sk_buff
*skb
)
1068 return sctp_rcv(skb
) ? -1 : 0;
1071 static const struct inet6_protocol sctpv6_protocol
= {
1072 .handler
= sctp6_rcv
,
1073 .err_handler
= sctp_v6_err
,
1074 .flags
= INET6_PROTO_NOPOLICY
| INET6_PROTO_FINAL
,
1077 static struct sctp_af sctp_af_inet6
= {
1078 .sa_family
= AF_INET6
,
1079 .sctp_xmit
= sctp_v6_xmit
,
1080 .setsockopt
= ipv6_setsockopt
,
1081 .getsockopt
= ipv6_getsockopt
,
1082 .get_dst
= sctp_v6_get_dst
,
1083 .get_saddr
= sctp_v6_get_saddr
,
1084 .copy_addrlist
= sctp_v6_copy_addrlist
,
1085 .from_skb
= sctp_v6_from_skb
,
1086 .from_sk
= sctp_v6_from_sk
,
1087 .from_addr_param
= sctp_v6_from_addr_param
,
1088 .to_addr_param
= sctp_v6_to_addr_param
,
1089 .cmp_addr
= sctp_v6_cmp_addr
,
1090 .scope
= sctp_v6_scope
,
1091 .addr_valid
= sctp_v6_addr_valid
,
1092 .inaddr_any
= sctp_v6_inaddr_any
,
1093 .is_any
= sctp_v6_is_any
,
1094 .available
= sctp_v6_available
,
1095 .skb_iif
= sctp_v6_skb_iif
,
1096 .is_ce
= sctp_v6_is_ce
,
1097 .seq_dump_addr
= sctp_v6_seq_dump_addr
,
1098 .ecn_capable
= sctp_v6_ecn_capable
,
1099 .net_header_len
= sizeof(struct ipv6hdr
),
1100 .sockaddr_len
= sizeof(struct sockaddr_in6
),
1101 .ip_options_len
= sctp_v6_ip_options_len
,
1102 #ifdef CONFIG_COMPAT
1103 .compat_setsockopt
= compat_ipv6_setsockopt
,
1104 .compat_getsockopt
= compat_ipv6_getsockopt
,
1108 static struct sctp_pf sctp_pf_inet6
= {
1109 .event_msgname
= sctp_inet6_event_msgname
,
1110 .skb_msgname
= sctp_inet6_skb_msgname
,
1111 .af_supported
= sctp_inet6_af_supported
,
1112 .cmp_addr
= sctp_inet6_cmp_addr
,
1113 .bind_verify
= sctp_inet6_bind_verify
,
1114 .send_verify
= sctp_inet6_send_verify
,
1115 .supported_addrs
= sctp_inet6_supported_addrs
,
1116 .create_accept_sk
= sctp_v6_create_accept_sk
,
1117 .addr_to_user
= sctp_v6_addr_to_user
,
1118 .to_sk_saddr
= sctp_v6_to_sk_saddr
,
1119 .to_sk_daddr
= sctp_v6_to_sk_daddr
,
1120 .copy_ip_options
= sctp_v6_copy_ip_options
,
1121 .af
= &sctp_af_inet6
,
1124 /* Initialize IPv6 support and register with socket layer. */
1125 void sctp_v6_pf_init(void)
1127 /* Register the SCTP specific PF_INET6 functions. */
1128 sctp_register_pf(&sctp_pf_inet6
, PF_INET6
);
1130 /* Register the SCTP specific AF_INET6 functions. */
1131 sctp_register_af(&sctp_af_inet6
);
1134 void sctp_v6_pf_exit(void)
1136 list_del(&sctp_af_inet6
.list
);
1139 /* Initialize IPv6 support and register with socket layer. */
1140 int sctp_v6_protosw_init(void)
1144 rc
= proto_register(&sctpv6_prot
, 1);
1148 /* Add SCTPv6(UDP and TCP style) to inetsw6 linked list. */
1149 inet6_register_protosw(&sctpv6_seqpacket_protosw
);
1150 inet6_register_protosw(&sctpv6_stream_protosw
);
1155 void sctp_v6_protosw_exit(void)
1157 inet6_unregister_protosw(&sctpv6_seqpacket_protosw
);
1158 inet6_unregister_protosw(&sctpv6_stream_protosw
);
1159 proto_unregister(&sctpv6_prot
);
1163 /* Register with inet6 layer. */
1164 int sctp_v6_add_protocol(void)
1166 /* Register notifier for inet6 address additions/deletions. */
1167 register_inet6addr_notifier(&sctp_inet6addr_notifier
);
1169 if (inet6_add_protocol(&sctpv6_protocol
, IPPROTO_SCTP
) < 0)
1175 /* Unregister with inet6 layer. */
1176 void sctp_v6_del_protocol(void)
1178 inet6_del_protocol(&sctpv6_protocol
, IPPROTO_SCTP
);
1179 unregister_inet6addr_notifier(&sctp_inet6addr_notifier
);