[IPV6]: Replace sk_buff ** with sk_buff * in input handlers
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / net / ipv6 / exthdrs.c
CommitLineData
1da177e4
LT
1/*
2 * Extension Header handling for IPv6
3 * Linux INET6 implementation
4 *
5 * Authors:
6 * Pedro Roque <roque@di.fc.ul.pt>
7 * Andi Kleen <ak@muc.de>
8 * Alexey Kuznetsov <kuznet@ms2.inr.ac.ru>
9 *
10 * $Id: exthdrs.c,v 1.13 2001/06/19 15:58:56 davem Exp $
11 *
12 * This program is free software; you can redistribute it and/or
13 * modify it under the terms of the GNU General Public License
14 * as published by the Free Software Foundation; either version
15 * 2 of the License, or (at your option) any later version.
16 */
17
18/* Changes:
1ab1457c 19 * yoshfuji : ensure not to overrun while parsing
1da177e4
LT
20 * tlv options.
21 * Mitsuru KANDA @USAGI and: Remove ipv6_parse_exthdrs().
22 * YOSHIFUJI Hideaki @USAGI Register inbound extension header
23 * handlers as inet6_protocol{}.
24 */
25
26#include <linux/errno.h>
27#include <linux/types.h>
28#include <linux/socket.h>
29#include <linux/sockios.h>
1da177e4
LT
30#include <linux/net.h>
31#include <linux/netdevice.h>
32#include <linux/in6.h>
33#include <linux/icmpv6.h>
34
35#include <net/sock.h>
36#include <net/snmp.h>
37
38#include <net/ipv6.h>
39#include <net/protocol.h>
40#include <net/transp_v6.h>
41#include <net/rawv6.h>
42#include <net/ndisc.h>
43#include <net/ip6_route.h>
44#include <net/addrconf.h>
59fbb3a6 45#if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
65d4ed92
MN
46#include <net/xfrm.h>
47#endif
1da177e4
LT
48
49#include <asm/uaccess.h>
50
c61a4043
MN
51int ipv6_find_tlv(struct sk_buff *skb, int offset, int type)
52{
d56f90a7 53 const unsigned char *nh = skb_network_header(skb);
27a884dc 54 int packet_len = skb->tail - skb->network_header;
c61a4043
MN
55 struct ipv6_opt_hdr *hdr;
56 int len;
57
58 if (offset + 2 > packet_len)
59 goto bad;
d56f90a7 60 hdr = (struct ipv6_opt_hdr *)(nh + offset);
c61a4043
MN
61 len = ((hdr->hdrlen + 1) << 3);
62
63 if (offset + len > packet_len)
64 goto bad;
65
66 offset += 2;
67 len -= 2;
68
69 while (len > 0) {
d56f90a7 70 int opttype = nh[offset];
c61a4043
MN
71 int optlen;
72
73 if (opttype == type)
74 return offset;
75
76 switch (opttype) {
77 case IPV6_TLV_PAD0:
78 optlen = 1;
79 break;
80 default:
d56f90a7 81 optlen = nh[offset + 1] + 2;
c61a4043
MN
82 if (optlen > len)
83 goto bad;
84 break;
85 }
86 offset += optlen;
87 len -= optlen;
88 }
89 /* not_found */
c61a4043
MN
90 bad:
91 return -1;
92}
59fbb3a6 93EXPORT_SYMBOL_GPL(ipv6_find_tlv);
c61a4043 94
1da177e4
LT
95/*
96 * Parsing tlv encoded headers.
97 *
98 * Parsing function "func" returns 1, if parsing succeed
99 * and 0, if it failed.
100 * It MUST NOT touch skb->h.
101 */
102
103struct tlvtype_proc {
104 int type;
e5bbef20 105 int (*func)(struct sk_buff *skb, int offset);
1da177e4
LT
106};
107
108/*********************
109 Generic functions
110 *********************/
111
112/* An unknown option is detected, decide what to do */
113
e5bbef20 114static int ip6_tlvopt_unknown(struct sk_buff *skb, int optoff)
1da177e4 115{
d56f90a7 116 switch ((skb_network_header(skb)[optoff] & 0xC0) >> 6) {
1da177e4
LT
117 case 0: /* ignore */
118 return 1;
119
120 case 1: /* drop packet */
121 break;
122
123 case 3: /* Send ICMP if not a multicast address and drop packet */
124 /* Actually, it is redundant check. icmp_send
125 will recheck in any case.
126 */
0660e03f 127 if (ipv6_addr_is_multicast(&ipv6_hdr(skb)->daddr))
1da177e4
LT
128 break;
129 case 2: /* send ICMP PARM PROB regardless and drop packet */
130 icmpv6_param_prob(skb, ICMPV6_UNK_OPTION, optoff);
131 return 0;
3ff50b79 132 }
1da177e4
LT
133
134 kfree_skb(skb);
135 return 0;
136}
137
138/* Parse tlv encoded option header (hop-by-hop or destination) */
139
e5bbef20 140static int ip6_parse_tlv(struct tlvtype_proc *procs, struct sk_buff *skb)
1da177e4
LT
141{
142 struct tlvtype_proc *curr;
d56f90a7 143 const unsigned char *nh = skb_network_header(skb);
cfe1fc77 144 int off = skb_network_header_len(skb);
9c70220b 145 int len = (skb_transport_header(skb)[1] + 1) << 3;
1da177e4 146
ea2ae17d 147 if (skb_transport_offset(skb) + len > skb_headlen(skb))
1da177e4
LT
148 goto bad;
149
150 off += 2;
151 len -= 2;
152
153 while (len > 0) {
d56f90a7 154 int optlen = nh[off + 1] + 2;
1da177e4 155
d56f90a7 156 switch (nh[off]) {
1da177e4
LT
157 case IPV6_TLV_PAD0:
158 optlen = 1;
159 break;
160
161 case IPV6_TLV_PADN:
162 break;
163
164 default: /* Other TLV code so scan list */
165 if (optlen > len)
166 goto bad;
167 for (curr=procs; curr->type >= 0; curr++) {
d56f90a7 168 if (curr->type == nh[off]) {
1ab1457c
YH
169 /* type specific length/alignment
170 checks will be performed in the
1da177e4 171 func(). */
e5bbef20 172 if (curr->func(skb, off) == 0)
1da177e4
LT
173 return 0;
174 break;
175 }
176 }
177 if (curr->type < 0) {
e5bbef20 178 if (ip6_tlvopt_unknown(skb, off) == 0)
1da177e4
LT
179 return 0;
180 }
181 break;
182 }
183 off += optlen;
184 len -= optlen;
185 }
186 if (len == 0)
187 return 1;
188bad:
189 kfree_skb(skb);
190 return 0;
191}
192
193/*****************************
194 Destination options header.
195 *****************************/
196
59fbb3a6 197#if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
e5bbef20 198static int ipv6_dest_hao(struct sk_buff *skb, int optoff)
a831f5bb 199{
a831f5bb
MN
200 struct ipv6_destopt_hao *hao;
201 struct inet6_skb_parm *opt = IP6CB(skb);
0660e03f 202 struct ipv6hdr *ipv6h = ipv6_hdr(skb);
a831f5bb
MN
203 struct in6_addr tmp_addr;
204 int ret;
205
206 if (opt->dsthao) {
207 LIMIT_NETDEBUG(KERN_DEBUG "hao duplicated\n");
208 goto discard;
209 }
210 opt->dsthao = opt->dst1;
211 opt->dst1 = 0;
212
d56f90a7 213 hao = (struct ipv6_destopt_hao *)(skb_network_header(skb) + optoff);
a831f5bb
MN
214
215 if (hao->length != 16) {
216 LIMIT_NETDEBUG(
217 KERN_DEBUG "hao invalid option length = %d\n", hao->length);
218 goto discard;
219 }
220
221 if (!(ipv6_addr_type(&hao->addr) & IPV6_ADDR_UNICAST)) {
222 LIMIT_NETDEBUG(
223 KERN_DEBUG "hao is not an unicast addr: " NIP6_FMT "\n", NIP6(hao->addr));
224 goto discard;
225 }
226
227 ret = xfrm6_input_addr(skb, (xfrm_address_t *)&ipv6h->daddr,
228 (xfrm_address_t *)&hao->addr, IPPROTO_DSTOPTS);
229 if (unlikely(ret < 0))
230 goto discard;
231
232 if (skb_cloned(skb)) {
65c88466 233 if (pskb_expand_head(skb, 0, 0, GFP_ATOMIC))
a831f5bb
MN
234 goto discard;
235
a831f5bb 236 /* update all variable using below by copied skbuff */
65c88466 237 hao = (struct ipv6_destopt_hao *)(skb_network_header(skb) +
d56f90a7 238 optoff);
65c88466 239 ipv6h = ipv6_hdr(skb);
a831f5bb
MN
240 }
241
242 if (skb->ip_summed == CHECKSUM_COMPLETE)
243 skb->ip_summed = CHECKSUM_NONE;
244
245 ipv6_addr_copy(&tmp_addr, &ipv6h->saddr);
246 ipv6_addr_copy(&ipv6h->saddr, &hao->addr);
247 ipv6_addr_copy(&hao->addr, &tmp_addr);
248
b7aa0bf7 249 if (skb->tstamp.tv64 == 0)
a831f5bb
MN
250 __net_timestamp(skb);
251
252 return 1;
253
254 discard:
255 kfree_skb(skb);
256 return 0;
257}
258#endif
259
1da177e4 260static struct tlvtype_proc tlvprocdestopt_lst[] = {
59fbb3a6 261#if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
a831f5bb
MN
262 {
263 .type = IPV6_TLV_HAO,
264 .func = ipv6_dest_hao,
265 },
266#endif
1da177e4
LT
267 {-1, NULL}
268};
269
e5bbef20 270static int ipv6_destopt_rcv(struct sk_buff *skb)
1da177e4 271{
1da177e4 272 struct inet6_skb_parm *opt = IP6CB(skb);
59fbb3a6 273#if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
a831f5bb
MN
274 __u16 dstbuf;
275#endif
a11d206d 276 struct dst_entry *dst;
1da177e4 277
ea2ae17d
ACM
278 if (!pskb_may_pull(skb, skb_transport_offset(skb) + 8) ||
279 !pskb_may_pull(skb, (skb_transport_offset(skb) +
9c70220b 280 ((skb_transport_header(skb)[1] + 1) << 3)))) {
a11d206d
YH
281 IP6_INC_STATS_BH(ip6_dst_idev(skb->dst),
282 IPSTATS_MIB_INHDRERRORS);
1da177e4
LT
283 kfree_skb(skb);
284 return -1;
285 }
286
cfe1fc77 287 opt->lastopt = opt->dst1 = skb_network_header_len(skb);
59fbb3a6 288#if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
a831f5bb
MN
289 dstbuf = opt->dst1;
290#endif
1da177e4 291
a11d206d 292 dst = dst_clone(skb->dst);
e5bbef20 293 if (ip6_parse_tlv(tlvprocdestopt_lst, skb)) {
a11d206d 294 dst_release(dst);
b0e380b1 295 skb->transport_header += (skb_transport_header(skb)[1] + 1) << 3;
dc435e6d 296 opt = IP6CB(skb);
59fbb3a6 297#if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
a831f5bb
MN
298 opt->nhoff = dstbuf;
299#else
951dbc8a 300 opt->nhoff = opt->dst1;
a831f5bb 301#endif
1da177e4
LT
302 return 1;
303 }
304
a11d206d
YH
305 IP6_INC_STATS_BH(ip6_dst_idev(dst), IPSTATS_MIB_INHDRERRORS);
306 dst_release(dst);
1da177e4
LT
307 return -1;
308}
309
310static struct inet6_protocol destopt_protocol = {
311 .handler = ipv6_destopt_rcv,
adcfc7d0 312 .flags = INET6_PROTO_NOPOLICY | INET6_PROTO_GSO_EXTHDR,
1da177e4
LT
313};
314
315void __init ipv6_destopt_init(void)
316{
317 if (inet6_add_protocol(&destopt_protocol, IPPROTO_DSTOPTS) < 0)
318 printk(KERN_ERR "ipv6_destopt_init: Could not register protocol\n");
319}
320
321/********************************
322 NONE header. No data in packet.
323 ********************************/
324
e5bbef20 325static int ipv6_nodata_rcv(struct sk_buff *skb)
1da177e4 326{
1da177e4
LT
327 kfree_skb(skb);
328 return 0;
329}
330
331static struct inet6_protocol nodata_protocol = {
332 .handler = ipv6_nodata_rcv,
333 .flags = INET6_PROTO_NOPOLICY,
334};
335
336void __init ipv6_nodata_init(void)
337{
338 if (inet6_add_protocol(&nodata_protocol, IPPROTO_NONE) < 0)
339 printk(KERN_ERR "ipv6_nodata_init: Could not register protocol\n");
340}
341
342/********************************
343 Routing header.
344 ********************************/
345
e5bbef20 346static int ipv6_rthdr_rcv(struct sk_buff *skb)
1da177e4 347{
1da177e4 348 struct inet6_skb_parm *opt = IP6CB(skb);
65d4ed92 349 struct in6_addr *addr = NULL;
1da177e4 350 struct in6_addr daddr;
0bcbc926 351 struct inet6_dev *idev;
1da177e4 352 int n, i;
1da177e4
LT
353 struct ipv6_rt_hdr *hdr;
354 struct rt0_hdr *rthdr;
0bcbc926
YH
355 int accept_source_route = ipv6_devconf.accept_source_route;
356
c382bb9d
YH
357 idev = in6_dev_get(skb->dev);
358 if (idev) {
359 if (accept_source_route > idev->cnf.accept_source_route)
360 accept_source_route = idev->cnf.accept_source_route;
0bcbc926 361 in6_dev_put(idev);
0bcbc926
YH
362 }
363
ea2ae17d
ACM
364 if (!pskb_may_pull(skb, skb_transport_offset(skb) + 8) ||
365 !pskb_may_pull(skb, (skb_transport_offset(skb) +
9c70220b 366 ((skb_transport_header(skb)[1] + 1) << 3)))) {
a11d206d
YH
367 IP6_INC_STATS_BH(ip6_dst_idev(skb->dst),
368 IPSTATS_MIB_INHDRERRORS);
1da177e4
LT
369 kfree_skb(skb);
370 return -1;
371 }
372
9c70220b 373 hdr = (struct ipv6_rt_hdr *)skb_transport_header(skb);
1da177e4 374
0660e03f 375 if (ipv6_addr_is_multicast(&ipv6_hdr(skb)->daddr) ||
1da177e4 376 skb->pkt_type != PACKET_HOST) {
a11d206d
YH
377 IP6_INC_STATS_BH(ip6_dst_idev(skb->dst),
378 IPSTATS_MIB_INADDRERRORS);
1da177e4
LT
379 kfree_skb(skb);
380 return -1;
381 }
382
383looped_back:
384 if (hdr->segments_left == 0) {
65d4ed92 385 switch (hdr->type) {
59fbb3a6 386#if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
65d4ed92
MN
387 case IPV6_SRCRT_TYPE_2:
388 /* Silently discard type 2 header unless it was
389 * processed by own
390 */
391 if (!addr) {
a11d206d
YH
392 IP6_INC_STATS_BH(ip6_dst_idev(skb->dst),
393 IPSTATS_MIB_INADDRERRORS);
65d4ed92
MN
394 kfree_skb(skb);
395 return -1;
396 }
397 break;
398#endif
399 default:
400 break;
401 }
402
cfe1fc77 403 opt->lastopt = opt->srcrt = skb_network_header_len(skb);
b0e380b1 404 skb->transport_header += (hdr->hdrlen + 1) << 3;
1da177e4
LT
405 opt->dst0 = opt->dst1;
406 opt->dst1 = 0;
d56f90a7 407 opt->nhoff = (&hdr->nexthdr) - skb_network_header(skb);
1da177e4
LT
408 return 1;
409 }
410
65d4ed92 411 switch (hdr->type) {
59fbb3a6 412#if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
65d4ed92 413 case IPV6_SRCRT_TYPE_2:
c382bb9d
YH
414 if (accept_source_route < 0)
415 goto unknown_rh;
65d4ed92
MN
416 /* Silently discard invalid RTH type 2 */
417 if (hdr->hdrlen != 2 || hdr->segments_left != 1) {
a11d206d
YH
418 IP6_INC_STATS_BH(ip6_dst_idev(skb->dst),
419 IPSTATS_MIB_INHDRERRORS);
65d4ed92
MN
420 kfree_skb(skb);
421 return -1;
422 }
423 break;
424#endif
c382bb9d
YH
425 default:
426 goto unknown_rh;
1da177e4 427 }
1da177e4
LT
428
429 /*
430 * This is the routing header forwarding algorithm from
431 * RFC 2460, page 16.
432 */
433
434 n = hdr->hdrlen >> 1;
435
436 if (hdr->segments_left > n) {
a11d206d
YH
437 IP6_INC_STATS_BH(ip6_dst_idev(skb->dst),
438 IPSTATS_MIB_INHDRERRORS);
d56f90a7
ACM
439 icmpv6_param_prob(skb, ICMPV6_HDR_FIELD,
440 ((&hdr->segments_left) -
441 skb_network_header(skb)));
1da177e4
LT
442 return -1;
443 }
444
445 /* We are about to mangle packet header. Be careful!
446 Do not damage packets queued somewhere.
447 */
448 if (skb_cloned(skb)) {
1da177e4 449 /* the copy is a forwarded packet */
65c88466 450 if (pskb_expand_head(skb, 0, 0, GFP_ATOMIC)) {
a11d206d
YH
451 IP6_INC_STATS_BH(ip6_dst_idev(skb->dst),
452 IPSTATS_MIB_OUTDISCARDS);
453 kfree_skb(skb);
1da177e4
LT
454 return -1;
455 }
65c88466 456 hdr = (struct ipv6_rt_hdr *)skb_transport_header(skb);
1da177e4
LT
457 }
458
84fa7933 459 if (skb->ip_summed == CHECKSUM_COMPLETE)
1da177e4
LT
460 skb->ip_summed = CHECKSUM_NONE;
461
462 i = n - --hdr->segments_left;
463
464 rthdr = (struct rt0_hdr *) hdr;
465 addr = rthdr->addr;
466 addr += i - 1;
467
65d4ed92 468 switch (hdr->type) {
59fbb3a6 469#if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
65d4ed92
MN
470 case IPV6_SRCRT_TYPE_2:
471 if (xfrm6_input_addr(skb, (xfrm_address_t *)addr,
0660e03f 472 (xfrm_address_t *)&ipv6_hdr(skb)->saddr,
65d4ed92 473 IPPROTO_ROUTING) < 0) {
a11d206d
YH
474 IP6_INC_STATS_BH(ip6_dst_idev(skb->dst),
475 IPSTATS_MIB_INADDRERRORS);
65d4ed92
MN
476 kfree_skb(skb);
477 return -1;
478 }
479 if (!ipv6_chk_home_addr(addr)) {
a11d206d
YH
480 IP6_INC_STATS_BH(ip6_dst_idev(skb->dst),
481 IPSTATS_MIB_INADDRERRORS);
65d4ed92
MN
482 kfree_skb(skb);
483 return -1;
484 }
485 break;
486#endif
487 default:
488 break;
489 }
490
1da177e4 491 if (ipv6_addr_is_multicast(addr)) {
a11d206d
YH
492 IP6_INC_STATS_BH(ip6_dst_idev(skb->dst),
493 IPSTATS_MIB_INADDRERRORS);
1da177e4
LT
494 kfree_skb(skb);
495 return -1;
496 }
497
498 ipv6_addr_copy(&daddr, addr);
0660e03f
ACM
499 ipv6_addr_copy(addr, &ipv6_hdr(skb)->daddr);
500 ipv6_addr_copy(&ipv6_hdr(skb)->daddr, &daddr);
1da177e4
LT
501
502 dst_release(xchg(&skb->dst, NULL));
503 ip6_route_input(skb);
504 if (skb->dst->error) {
d56f90a7 505 skb_push(skb, skb->data - skb_network_header(skb));
1da177e4
LT
506 dst_input(skb);
507 return -1;
508 }
509
510 if (skb->dst->dev->flags&IFF_LOOPBACK) {
0660e03f 511 if (ipv6_hdr(skb)->hop_limit <= 1) {
a11d206d
YH
512 IP6_INC_STATS_BH(ip6_dst_idev(skb->dst),
513 IPSTATS_MIB_INHDRERRORS);
1da177e4
LT
514 icmpv6_send(skb, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT,
515 0, skb->dev);
516 kfree_skb(skb);
517 return -1;
518 }
0660e03f 519 ipv6_hdr(skb)->hop_limit--;
1da177e4
LT
520 goto looped_back;
521 }
522
d56f90a7 523 skb_push(skb, skb->data - skb_network_header(skb));
1da177e4
LT
524 dst_input(skb);
525 return -1;
c382bb9d
YH
526
527unknown_rh:
528 IP6_INC_STATS_BH(ip6_dst_idev(skb->dst), IPSTATS_MIB_INHDRERRORS);
529 icmpv6_param_prob(skb, ICMPV6_HDR_FIELD,
530 (&hdr->type) - skb_network_header(skb));
531 return -1;
1da177e4
LT
532}
533
534static struct inet6_protocol rthdr_protocol = {
535 .handler = ipv6_rthdr_rcv,
adcfc7d0 536 .flags = INET6_PROTO_NOPOLICY | INET6_PROTO_GSO_EXTHDR,
1da177e4
LT
537};
538
539void __init ipv6_rthdr_init(void)
540{
541 if (inet6_add_protocol(&rthdr_protocol, IPPROTO_ROUTING) < 0)
542 printk(KERN_ERR "ipv6_rthdr_init: Could not register protocol\n");
543};
544
1da177e4
LT
545/**********************************
546 Hop-by-hop options.
547 **********************************/
548
e76b2b25
YH
549/*
550 * Note: we cannot rely on skb->dst before we assign it in ip6_route_input().
551 */
552static inline struct inet6_dev *ipv6_skb_idev(struct sk_buff *skb)
553{
554 return skb->dst ? ip6_dst_idev(skb->dst) : __in6_dev_get(skb->dev);
555}
556
1da177e4
LT
557/* Router Alert as of RFC 2711 */
558
e5bbef20 559static int ipv6_hop_ra(struct sk_buff *skb, int optoff)
1da177e4 560{
d56f90a7 561 const unsigned char *nh = skb_network_header(skb);
a80ff03e 562
d56f90a7 563 if (nh[optoff + 1] == 2) {
1da177e4
LT
564 IP6CB(skb)->ra = optoff;
565 return 1;
566 }
64ce2073 567 LIMIT_NETDEBUG(KERN_DEBUG "ipv6_hop_ra: wrong RA length %d\n",
d56f90a7 568 nh[optoff + 1]);
1da177e4
LT
569 kfree_skb(skb);
570 return 0;
571}
572
573/* Jumbo payload */
574
e5bbef20 575static int ipv6_hop_jumbo(struct sk_buff *skb, int optoff)
1da177e4 576{
d56f90a7 577 const unsigned char *nh = skb_network_header(skb);
1da177e4
LT
578 u32 pkt_len;
579
d56f90a7 580 if (nh[optoff + 1] != 4 || (optoff & 3) != 2) {
64ce2073 581 LIMIT_NETDEBUG(KERN_DEBUG "ipv6_hop_jumbo: wrong jumbo opt length/alignment %d\n",
d56f90a7 582 nh[optoff+1]);
e76b2b25 583 IP6_INC_STATS_BH(ipv6_skb_idev(skb),
a11d206d 584 IPSTATS_MIB_INHDRERRORS);
1da177e4
LT
585 goto drop;
586 }
587
d56f90a7 588 pkt_len = ntohl(*(__be32 *)(nh + optoff + 2));
1da177e4 589 if (pkt_len <= IPV6_MAXPLEN) {
e76b2b25 590 IP6_INC_STATS_BH(ipv6_skb_idev(skb), IPSTATS_MIB_INHDRERRORS);
1da177e4
LT
591 icmpv6_param_prob(skb, ICMPV6_HDR_FIELD, optoff+2);
592 return 0;
593 }
0660e03f 594 if (ipv6_hdr(skb)->payload_len) {
e76b2b25 595 IP6_INC_STATS_BH(ipv6_skb_idev(skb), IPSTATS_MIB_INHDRERRORS);
1da177e4
LT
596 icmpv6_param_prob(skb, ICMPV6_HDR_FIELD, optoff);
597 return 0;
598 }
599
600 if (pkt_len > skb->len - sizeof(struct ipv6hdr)) {
e76b2b25 601 IP6_INC_STATS_BH(ipv6_skb_idev(skb), IPSTATS_MIB_INTRUNCATEDPKTS);
1da177e4
LT
602 goto drop;
603 }
42ca89c1
SH
604
605 if (pskb_trim_rcsum(skb, pkt_len + sizeof(struct ipv6hdr)))
606 goto drop;
607
1da177e4
LT
608 return 1;
609
610drop:
611 kfree_skb(skb);
612 return 0;
613}
614
615static struct tlvtype_proc tlvprochopopt_lst[] = {
616 {
617 .type = IPV6_TLV_ROUTERALERT,
618 .func = ipv6_hop_ra,
619 },
620 {
621 .type = IPV6_TLV_JUMBO,
622 .func = ipv6_hop_jumbo,
623 },
624 { -1, }
625};
626
e5bbef20 627int ipv6_parse_hopopts(struct sk_buff *skb)
1da177e4 628{
951dbc8a
PM
629 struct inet6_skb_parm *opt = IP6CB(skb);
630
ec670095 631 /*
d56f90a7 632 * skb_network_header(skb) is equal to skb->data, and
cfe1fc77 633 * skb_network_header_len(skb) is always equal to
ec670095
YH
634 * sizeof(struct ipv6hdr) by definition of
635 * hop-by-hop options.
636 */
637 if (!pskb_may_pull(skb, sizeof(struct ipv6hdr) + 8) ||
9c70220b
ACM
638 !pskb_may_pull(skb, (sizeof(struct ipv6hdr) +
639 ((skb_transport_header(skb)[1] + 1) << 3)))) {
ec670095
YH
640 kfree_skb(skb);
641 return -1;
642 }
643
951dbc8a 644 opt->hop = sizeof(struct ipv6hdr);
e5bbef20 645 if (ip6_parse_tlv(tlvprochopopt_lst, skb)) {
b0e380b1 646 skb->transport_header += (skb_transport_header(skb)[1] + 1) << 3;
dc435e6d 647 opt = IP6CB(skb);
951dbc8a 648 opt->nhoff = sizeof(struct ipv6hdr);
b809739a 649 return 1;
951dbc8a 650 }
1da177e4
LT
651 return -1;
652}
653
654/*
655 * Creating outbound headers.
656 *
657 * "build" functions work when skb is filled from head to tail (datagram)
658 * "push" functions work when headers are added from tail to head (tcp)
659 *
660 * In both cases we assume, that caller reserved enough room
661 * for headers.
662 */
663
664static void ipv6_push_rthdr(struct sk_buff *skb, u8 *proto,
665 struct ipv6_rt_hdr *opt,
666 struct in6_addr **addr_p)
667{
668 struct rt0_hdr *phdr, *ihdr;
669 int hops;
670
671 ihdr = (struct rt0_hdr *) opt;
1ab1457c 672
1da177e4
LT
673 phdr = (struct rt0_hdr *) skb_push(skb, (ihdr->rt_hdr.hdrlen + 1) << 3);
674 memcpy(phdr, ihdr, sizeof(struct rt0_hdr));
675
676 hops = ihdr->rt_hdr.hdrlen >> 1;
677
678 if (hops > 1)
679 memcpy(phdr->addr, ihdr->addr + 1,
680 (hops - 1) * sizeof(struct in6_addr));
681
682 ipv6_addr_copy(phdr->addr + (hops - 1), *addr_p);
683 *addr_p = ihdr->addr;
684
685 phdr->rt_hdr.nexthdr = *proto;
686 *proto = NEXTHDR_ROUTING;
687}
688
689static void ipv6_push_exthdr(struct sk_buff *skb, u8 *proto, u8 type, struct ipv6_opt_hdr *opt)
690{
691 struct ipv6_opt_hdr *h = (struct ipv6_opt_hdr *)skb_push(skb, ipv6_optlen(opt));
692
693 memcpy(h, opt, ipv6_optlen(opt));
694 h->nexthdr = *proto;
695 *proto = type;
696}
697
698void ipv6_push_nfrag_opts(struct sk_buff *skb, struct ipv6_txoptions *opt,
699 u8 *proto,
700 struct in6_addr **daddr)
701{
333fad53 702 if (opt->srcrt) {
1da177e4 703 ipv6_push_rthdr(skb, proto, opt->srcrt, daddr);
333fad53
YH
704 /*
705 * IPV6_RTHDRDSTOPTS is ignored
706 * unless IPV6_RTHDR is set (RFC3542).
707 */
708 if (opt->dst0opt)
709 ipv6_push_exthdr(skb, proto, NEXTHDR_DEST, opt->dst0opt);
710 }
1da177e4
LT
711 if (opt->hopopt)
712 ipv6_push_exthdr(skb, proto, NEXTHDR_HOP, opt->hopopt);
713}
714
7159039a
YH
715EXPORT_SYMBOL(ipv6_push_nfrag_opts);
716
1da177e4
LT
717void ipv6_push_frag_opts(struct sk_buff *skb, struct ipv6_txoptions *opt, u8 *proto)
718{
719 if (opt->dst1opt)
720 ipv6_push_exthdr(skb, proto, NEXTHDR_DEST, opt->dst1opt);
721}
722
723struct ipv6_txoptions *
724ipv6_dup_options(struct sock *sk, struct ipv6_txoptions *opt)
725{
726 struct ipv6_txoptions *opt2;
727
728 opt2 = sock_kmalloc(sk, opt->tot_len, GFP_ATOMIC);
729 if (opt2) {
730 long dif = (char*)opt2 - (char*)opt;
731 memcpy(opt2, opt, opt->tot_len);
732 if (opt2->hopopt)
733 *((char**)&opt2->hopopt) += dif;
734 if (opt2->dst0opt)
735 *((char**)&opt2->dst0opt) += dif;
736 if (opt2->dst1opt)
737 *((char**)&opt2->dst1opt) += dif;
738 if (opt2->srcrt)
739 *((char**)&opt2->srcrt) += dif;
740 }
741 return opt2;
742}
333fad53 743
3cf3dc6c
ACM
744EXPORT_SYMBOL_GPL(ipv6_dup_options);
745
333fad53
YH
746static int ipv6_renew_option(void *ohdr,
747 struct ipv6_opt_hdr __user *newopt, int newoptlen,
748 int inherit,
749 struct ipv6_opt_hdr **hdr,
750 char **p)
751{
752 if (inherit) {
753 if (ohdr) {
754 memcpy(*p, ohdr, ipv6_optlen((struct ipv6_opt_hdr *)ohdr));
755 *hdr = (struct ipv6_opt_hdr *)*p;
756 *p += CMSG_ALIGN(ipv6_optlen(*(struct ipv6_opt_hdr **)hdr));
757 }
758 } else {
759 if (newopt) {
760 if (copy_from_user(*p, newopt, newoptlen))
761 return -EFAULT;
762 *hdr = (struct ipv6_opt_hdr *)*p;
763 if (ipv6_optlen(*(struct ipv6_opt_hdr **)hdr) > newoptlen)
764 return -EINVAL;
765 *p += CMSG_ALIGN(newoptlen);
766 }
767 }
768 return 0;
769}
770
771struct ipv6_txoptions *
772ipv6_renew_options(struct sock *sk, struct ipv6_txoptions *opt,
773 int newtype,
774 struct ipv6_opt_hdr __user *newopt, int newoptlen)
775{
776 int tot_len = 0;
777 char *p;
778 struct ipv6_txoptions *opt2;
779 int err;
780
99c7bc01
YH
781 if (opt) {
782 if (newtype != IPV6_HOPOPTS && opt->hopopt)
783 tot_len += CMSG_ALIGN(ipv6_optlen(opt->hopopt));
784 if (newtype != IPV6_RTHDRDSTOPTS && opt->dst0opt)
785 tot_len += CMSG_ALIGN(ipv6_optlen(opt->dst0opt));
786 if (newtype != IPV6_RTHDR && opt->srcrt)
787 tot_len += CMSG_ALIGN(ipv6_optlen(opt->srcrt));
788 if (newtype != IPV6_DSTOPTS && opt->dst1opt)
789 tot_len += CMSG_ALIGN(ipv6_optlen(opt->dst1opt));
790 }
791
333fad53
YH
792 if (newopt && newoptlen)
793 tot_len += CMSG_ALIGN(newoptlen);
794
795 if (!tot_len)
796 return NULL;
797
8b8aa4b5 798 tot_len += sizeof(*opt2);
333fad53
YH
799 opt2 = sock_kmalloc(sk, tot_len, GFP_ATOMIC);
800 if (!opt2)
801 return ERR_PTR(-ENOBUFS);
802
803 memset(opt2, 0, tot_len);
804
805 opt2->tot_len = tot_len;
806 p = (char *)(opt2 + 1);
807
99c7bc01 808 err = ipv6_renew_option(opt ? opt->hopopt : NULL, newopt, newoptlen,
333fad53
YH
809 newtype != IPV6_HOPOPTS,
810 &opt2->hopopt, &p);
811 if (err)
812 goto out;
813
99c7bc01 814 err = ipv6_renew_option(opt ? opt->dst0opt : NULL, newopt, newoptlen,
333fad53
YH
815 newtype != IPV6_RTHDRDSTOPTS,
816 &opt2->dst0opt, &p);
817 if (err)
818 goto out;
819
99c7bc01 820 err = ipv6_renew_option(opt ? opt->srcrt : NULL, newopt, newoptlen,
333fad53 821 newtype != IPV6_RTHDR,
99c7bc01 822 (struct ipv6_opt_hdr **)&opt2->srcrt, &p);
333fad53
YH
823 if (err)
824 goto out;
825
99c7bc01 826 err = ipv6_renew_option(opt ? opt->dst1opt : NULL, newopt, newoptlen,
333fad53
YH
827 newtype != IPV6_DSTOPTS,
828 &opt2->dst1opt, &p);
829 if (err)
830 goto out;
831
832 opt2->opt_nflen = (opt2->hopopt ? ipv6_optlen(opt2->hopopt) : 0) +
833 (opt2->dst0opt ? ipv6_optlen(opt2->dst0opt) : 0) +
834 (opt2->srcrt ? ipv6_optlen(opt2->srcrt) : 0);
835 opt2->opt_flen = (opt2->dst1opt ? ipv6_optlen(opt2->dst1opt) : 0);
836
837 return opt2;
838out:
8b8aa4b5 839 sock_kfree_s(sk, opt2, opt2->tot_len);
333fad53
YH
840 return ERR_PTR(err);
841}
842
df9890c3
YH
843struct ipv6_txoptions *ipv6_fixup_options(struct ipv6_txoptions *opt_space,
844 struct ipv6_txoptions *opt)
845{
846 /*
847 * ignore the dest before srcrt unless srcrt is being included.
848 * --yoshfuji
849 */
850 if (opt && opt->dst0opt && !opt->srcrt) {
851 if (opt_space != opt) {
852 memcpy(opt_space, opt, sizeof(*opt_space));
853 opt = opt_space;
854 }
855 opt->opt_nflen -= ipv6_optlen(opt->dst0opt);
856 opt->dst0opt = NULL;
857 }
858
859 return opt;
860}
861