2008-01-11 15:57:09 +01:00
|
|
|
/* SCTP kernel implementation
|
2005-04-17 00:20:36 +02:00
|
|
|
* (C) Copyright IBM Corp. 2002, 2004
|
|
|
|
* Copyright (c) 2001 Nokia, Inc.
|
|
|
|
* Copyright (c) 2001 La Monte H.P. Yarroll
|
|
|
|
* Copyright (c) 2002-2003 Intel Corp.
|
|
|
|
*
|
2008-01-11 15:57:09 +01:00
|
|
|
* This file is part of the SCTP kernel implementation
|
2005-04-17 00:20:36 +02:00
|
|
|
*
|
|
|
|
* SCTP over IPv6.
|
|
|
|
*
|
2008-01-11 15:57:09 +01:00
|
|
|
* This SCTP implementation is free software;
|
2005-04-17 00:20:36 +02:00
|
|
|
* you can redistribute it and/or modify it under the terms of
|
|
|
|
* the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2, or (at your option)
|
|
|
|
* any later version.
|
|
|
|
*
|
2008-01-11 15:57:09 +01:00
|
|
|
* This SCTP implementation is distributed in the hope that it
|
2005-04-17 00:20:36 +02:00
|
|
|
* will be useful, but WITHOUT ANY WARRANTY; without even the implied
|
|
|
|
* ************************
|
|
|
|
* warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
|
|
|
|
* See the GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with GNU CC; see the file COPYING. If not, write to
|
|
|
|
* the Free Software Foundation, 59 Temple Place - Suite 330,
|
|
|
|
* Boston, MA 02111-1307, USA.
|
|
|
|
*
|
|
|
|
* Please send any bug reports or fixes you make to the
|
|
|
|
* email address(es):
|
|
|
|
* lksctp developers <lksctp-developers@lists.sourceforge.net>
|
|
|
|
*
|
|
|
|
* Or submit a bug report through the following website:
|
|
|
|
* http://www.sf.net/projects/lksctp
|
|
|
|
*
|
|
|
|
* Written or modified by:
|
|
|
|
* Le Yanqun <yanqun.le@nokia.com>
|
|
|
|
* Hui Huang <hui.huang@nokia.com>
|
|
|
|
* La Monte H.P. Yarroll <piggy@acm.org>
|
|
|
|
* Sridhar Samudrala <sri@us.ibm.com>
|
|
|
|
* Jon Grimm <jgrimm@us.ibm.com>
|
|
|
|
* Ardelle Fan <ardelle.fan@intel.com>
|
|
|
|
*
|
|
|
|
* Based on:
|
|
|
|
* linux/net/ipv6/tcp_ipv6.c
|
|
|
|
*
|
|
|
|
* Any bugs reported given to us we will try to fix... any fixes shared will
|
|
|
|
* be incorporated into the next SCTP release.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/errno.h>
|
|
|
|
#include <linux/types.h>
|
|
|
|
#include <linux/socket.h>
|
|
|
|
#include <linux/sockios.h>
|
|
|
|
#include <linux/net.h>
|
|
|
|
#include <linux/in.h>
|
|
|
|
#include <linux/in6.h>
|
|
|
|
#include <linux/netdevice.h>
|
|
|
|
#include <linux/init.h>
|
|
|
|
#include <linux/ipsec.h>
|
|
|
|
|
|
|
|
#include <linux/ipv6.h>
|
|
|
|
#include <linux/icmpv6.h>
|
|
|
|
#include <linux/random.h>
|
|
|
|
#include <linux/seq_file.h>
|
|
|
|
|
|
|
|
#include <net/protocol.h>
|
|
|
|
#include <net/ndisc.h>
|
2005-08-10 05:08:28 +02:00
|
|
|
#include <net/ip.h>
|
2005-04-17 00:20:36 +02:00
|
|
|
#include <net/ipv6.h>
|
|
|
|
#include <net/transp_v6.h>
|
|
|
|
#include <net/addrconf.h>
|
|
|
|
#include <net/ip6_route.h>
|
|
|
|
#include <net/inet_common.h>
|
|
|
|
#include <net/inet_ecn.h>
|
|
|
|
#include <net/sctp/sctp.h>
|
|
|
|
|
|
|
|
#include <asm/uaccess.h>
|
|
|
|
|
2007-09-17 01:02:12 +02:00
|
|
|
/* Event handler for inet6 address addition/deletion events.
|
|
|
|
* The sctp_local_addr_list needs to be protocted by a spin lock since
|
|
|
|
* multiple notifiers (say IPv4 and IPv6) may be running at the same
|
|
|
|
* time and thus corrupt the list.
|
|
|
|
* The reader side is protected with RCU.
|
|
|
|
*/
|
2006-12-21 01:08:22 +01:00
|
|
|
static int sctp_inet6addr_event(struct notifier_block *this, unsigned long ev,
|
|
|
|
void *ptr)
|
2006-12-14 01:26:26 +01:00
|
|
|
{
|
|
|
|
struct inet6_ifaddr *ifa = (struct inet6_ifaddr *)ptr;
|
2007-09-17 01:02:12 +02:00
|
|
|
struct sctp_sockaddr_entry *addr = NULL;
|
|
|
|
struct sctp_sockaddr_entry *temp;
|
2008-03-12 02:05:02 +01:00
|
|
|
int found = 0;
|
2006-12-14 01:26:26 +01:00
|
|
|
|
|
|
|
switch (ev) {
|
|
|
|
case NETDEV_UP:
|
|
|
|
addr = kmalloc(sizeof(struct sctp_sockaddr_entry), GFP_ATOMIC);
|
|
|
|
if (addr) {
|
|
|
|
addr->a.v6.sin6_family = AF_INET6;
|
|
|
|
addr->a.v6.sin6_port = 0;
|
2009-01-22 22:49:44 +01:00
|
|
|
ipv6_addr_copy(&addr->a.v6.sin6_addr, &ifa->addr);
|
2006-12-14 01:26:26 +01:00
|
|
|
addr->a.v6.sin6_scope_id = ifa->idev->dev->ifindex;
|
2007-09-17 01:02:12 +02:00
|
|
|
addr->valid = 1;
|
|
|
|
spin_lock_bh(&sctp_local_addr_lock);
|
|
|
|
list_add_tail_rcu(&addr->list, &sctp_local_addr_list);
|
|
|
|
spin_unlock_bh(&sctp_local_addr_lock);
|
2006-12-14 01:26:26 +01:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case NETDEV_DOWN:
|
2007-09-17 01:02:12 +02:00
|
|
|
spin_lock_bh(&sctp_local_addr_lock);
|
|
|
|
list_for_each_entry_safe(addr, temp,
|
|
|
|
&sctp_local_addr_list, list) {
|
2008-04-13 03:40:38 +02:00
|
|
|
if (addr->a.sa.sa_family == AF_INET6 &&
|
|
|
|
ipv6_addr_equal(&addr->a.v6.sin6_addr,
|
|
|
|
&ifa->addr)) {
|
2008-03-12 02:05:02 +01:00
|
|
|
found = 1;
|
2007-09-17 01:02:12 +02:00
|
|
|
addr->valid = 0;
|
|
|
|
list_del_rcu(&addr->list);
|
2006-12-14 01:26:26 +01:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2007-09-17 01:02:12 +02:00
|
|
|
spin_unlock_bh(&sctp_local_addr_lock);
|
2008-03-12 02:05:02 +01:00
|
|
|
if (found)
|
2007-09-17 01:02:12 +02:00
|
|
|
call_rcu(&addr->rcu, sctp_local_addr_free);
|
2006-12-14 01:26:26 +01:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NOTIFY_DONE;
|
|
|
|
}
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
static struct notifier_block sctp_inet6addr_notifier = {
|
2006-12-14 01:26:26 +01:00
|
|
|
.notifier_call = sctp_inet6addr_event,
|
2005-04-17 00:20:36 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
/* ICMP error handler. */
|
|
|
|
SCTP_STATIC void sctp_v6_err(struct sk_buff *skb, struct inet6_skb_parm *opt,
|
2009-06-23 13:31:07 +02:00
|
|
|
u8 type, u8 code, int offset, __be32 info)
|
2005-04-17 00:20:36 +02:00
|
|
|
{
|
|
|
|
struct inet6_dev *idev;
|
|
|
|
struct sock *sk;
|
|
|
|
struct sctp_association *asoc;
|
|
|
|
struct sctp_transport *transport;
|
|
|
|
struct ipv6_pinfo *np;
|
[SK_BUFF]: Use offsets for skb->{mac,network,transport}_header on 64bit architectures
With this we save 8 bytes per network packet, leaving a 4 bytes hole to be used
in further shrinking work, likely with the offsetization of other pointers,
such as ->{data,tail,end}, at the cost of adds, that were minimized by the
usual practice of setting skb->{mac,nh,n}.raw to a local variable that is then
accessed multiple times in each function, it also is not more expensive than
before with regards to most of the handling of such headers, like setting one
of these headers to another (transport to network, etc), or subtracting, adding
to/from it, comparing them, etc.
Now we have this layout for sk_buff on a x86_64 machine:
[acme@mica net-2.6.22]$ pahole vmlinux sk_buff
struct sk_buff {
struct sk_buff * next; /* 0 8 */
struct sk_buff * prev; /* 8 8 */
struct rb_node rb; /* 16 24 */
struct sock * sk; /* 40 8 */
ktime_t tstamp; /* 48 8 */
struct net_device * dev; /* 56 8 */
/* --- cacheline 1 boundary (64 bytes) --- */
struct net_device * input_dev; /* 64 8 */
sk_buff_data_t transport_header; /* 72 4 */
sk_buff_data_t network_header; /* 76 4 */
sk_buff_data_t mac_header; /* 80 4 */
/* XXX 4 bytes hole, try to pack */
struct dst_entry * dst; /* 88 8 */
struct sec_path * sp; /* 96 8 */
char cb[48]; /* 104 48 */
/* cacheline 2 boundary (128 bytes) was 24 bytes ago*/
unsigned int len; /* 152 4 */
unsigned int data_len; /* 156 4 */
unsigned int mac_len; /* 160 4 */
union {
__wsum csum; /* 4 */
__u32 csum_offset; /* 4 */
}; /* 164 4 */
__u32 priority; /* 168 4 */
__u8 local_df:1; /* 172 1 */
__u8 cloned:1; /* 172 1 */
__u8 ip_summed:2; /* 172 1 */
__u8 nohdr:1; /* 172 1 */
__u8 nfctinfo:3; /* 172 1 */
__u8 pkt_type:3; /* 173 1 */
__u8 fclone:2; /* 173 1 */
__u8 ipvs_property:1; /* 173 1 */
/* XXX 2 bits hole, try to pack */
__be16 protocol; /* 174 2 */
void (*destructor)(struct sk_buff *); /* 176 8 */
struct nf_conntrack * nfct; /* 184 8 */
/* --- cacheline 3 boundary (192 bytes) --- */
struct sk_buff * nfct_reasm; /* 192 8 */
struct nf_bridge_info *nf_bridge; /* 200 8 */
__u16 tc_index; /* 208 2 */
__u16 tc_verd; /* 210 2 */
dma_cookie_t dma_cookie; /* 212 4 */
__u32 secmark; /* 216 4 */
__u32 mark; /* 220 4 */
unsigned int truesize; /* 224 4 */
atomic_t users; /* 228 4 */
unsigned char * head; /* 232 8 */
unsigned char * data; /* 240 8 */
unsigned char * tail; /* 248 8 */
/* --- cacheline 4 boundary (256 bytes) --- */
unsigned char * end; /* 256 8 */
}; /* size: 264, cachelines: 5 */
/* sum members: 260, holes: 1, sum holes: 4 */
/* bit holes: 1, sum bit holes: 2 bits */
/* last cacheline: 8 bytes */
On 32 bits nothing changes, and pointers continue to be used with the compiler
turning all this abstraction layer into dust. But there are some sk_buff
validation tricks that are now possible, humm... :-)
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-04-11 06:22:35 +02:00
|
|
|
sk_buff_data_t saveip, savesctp;
|
2005-04-17 00:20:36 +02:00
|
|
|
int err;
|
|
|
|
|
|
|
|
idev = in6_dev_get(skb->dev);
|
|
|
|
|
|
|
|
/* Fix up skb to look at the embedded net header. */
|
2007-04-11 06:21:55 +02:00
|
|
|
saveip = skb->network_header;
|
|
|
|
savesctp = skb->transport_header;
|
2007-03-10 23:57:15 +01:00
|
|
|
skb_reset_network_header(skb);
|
2007-03-13 21:17:10 +01:00
|
|
|
skb_set_transport_header(skb, offset);
|
|
|
|
sk = sctp_err_lookup(AF_INET6, skb, sctp_hdr(skb), &asoc, &transport);
|
2005-04-17 00:20:36 +02:00
|
|
|
/* Put back, the original pointers. */
|
2007-04-11 06:21:55 +02:00
|
|
|
skb->network_header = saveip;
|
|
|
|
skb->transport_header = savesctp;
|
2005-04-17 00:20:36 +02:00
|
|
|
if (!sk) {
|
2008-10-08 19:33:26 +02:00
|
|
|
ICMP6_INC_STATS_BH(dev_net(skb->dev), idev, ICMP6_MIB_INERRORS);
|
2005-04-17 00:20:36 +02:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Warning: The sock lock is held. Remember to call
|
|
|
|
* sctp_err_finish!
|
|
|
|
*/
|
|
|
|
|
|
|
|
switch (type) {
|
|
|
|
case ICMPV6_PKT_TOOBIG:
|
|
|
|
sctp_icmp_frag_needed(sk, asoc, transport, ntohl(info));
|
|
|
|
goto out_unlock;
|
|
|
|
case ICMPV6_PARAMPROB:
|
|
|
|
if (ICMPV6_UNK_NEXTHDR == code) {
|
2005-07-18 22:44:10 +02:00
|
|
|
sctp_icmp_proto_unreachable(sk, asoc, transport);
|
2005-04-17 00:20:36 +02:00
|
|
|
goto out_unlock;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
np = inet6_sk(sk);
|
|
|
|
icmpv6_err_convert(type, code, &err);
|
|
|
|
if (!sock_owned_by_user(sk) && np->recverr) {
|
|
|
|
sk->sk_err = err;
|
|
|
|
sk->sk_error_report(sk);
|
|
|
|
} else { /* Only an error on timeout */
|
|
|
|
sk->sk_err_soft = err;
|
|
|
|
}
|
|
|
|
|
|
|
|
out_unlock:
|
2005-07-18 22:44:10 +02:00
|
|
|
sctp_err_finish(sk, asoc);
|
2005-04-17 00:20:36 +02:00
|
|
|
out:
|
|
|
|
if (likely(idev != NULL))
|
|
|
|
in6_dev_put(idev);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Based on tcp_v6_xmit() in tcp_ipv6.c. */
|
2008-08-04 06:15:08 +02:00
|
|
|
static int sctp_v6_xmit(struct sk_buff *skb, struct sctp_transport *transport)
|
2005-04-17 00:20:36 +02:00
|
|
|
{
|
|
|
|
struct sock *sk = skb->sk;
|
|
|
|
struct ipv6_pinfo *np = inet6_sk(sk);
|
|
|
|
struct flowi fl;
|
|
|
|
|
|
|
|
memset(&fl, 0, sizeof(fl));
|
|
|
|
|
|
|
|
fl.proto = sk->sk_protocol;
|
|
|
|
|
|
|
|
/* Fill in the dest address from the route entry passed with the skb
|
|
|
|
* and the source address from the transport.
|
|
|
|
*/
|
2006-11-21 02:22:43 +01:00
|
|
|
ipv6_addr_copy(&fl.fl6_dst, &transport->ipaddr.v6.sin6_addr);
|
2006-11-21 02:13:58 +01:00
|
|
|
ipv6_addr_copy(&fl.fl6_src, &transport->saddr.v6.sin6_addr);
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
fl.fl6_flowlabel = np->flow_label;
|
|
|
|
IP6_ECN_flow_xmit(sk, fl.fl6_flowlabel);
|
|
|
|
if (ipv6_addr_type(&fl.fl6_src) & IPV6_ADDR_LINKLOCAL)
|
2006-11-21 02:13:58 +01:00
|
|
|
fl.oif = transport->saddr.v6.sin6_scope_id;
|
2005-04-17 00:20:36 +02:00
|
|
|
else
|
|
|
|
fl.oif = sk->sk_bound_dev_if;
|
|
|
|
|
|
|
|
if (np->opt && np->opt->srcrt) {
|
|
|
|
struct rt0_hdr *rt0 = (struct rt0_hdr *) np->opt->srcrt;
|
|
|
|
ipv6_addr_copy(&fl.fl6_dst, rt0->addr);
|
|
|
|
}
|
|
|
|
|
2008-10-29 20:52:50 +01:00
|
|
|
SCTP_DEBUG_PRINTK("%s: skb:%p, len:%d, src:%pI6 dst:%pI6\n",
|
2008-03-06 05:47:47 +01:00
|
|
|
__func__, skb, skb->len,
|
2008-10-29 00:10:17 +01:00
|
|
|
&fl.fl6_src, &fl.fl6_dst);
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
SCTP_INC_STATS(SCTP_MIB_OUTSCTPPACKS);
|
|
|
|
|
2008-08-04 06:15:08 +02:00
|
|
|
if (!(transport->param_flags & SPP_PMTUD_ENABLE))
|
|
|
|
skb->local_df = 1;
|
|
|
|
|
|
|
|
return ip6_xmit(sk, skb, &fl, np->opt, 0);
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Returns the dst cache entry for the given source and destination ip
|
|
|
|
* addresses.
|
|
|
|
*/
|
|
|
|
static struct dst_entry *sctp_v6_get_dst(struct sctp_association *asoc,
|
|
|
|
union sctp_addr *daddr,
|
|
|
|
union sctp_addr *saddr)
|
|
|
|
{
|
|
|
|
struct dst_entry *dst;
|
|
|
|
struct flowi fl;
|
|
|
|
|
|
|
|
memset(&fl, 0, sizeof(fl));
|
|
|
|
ipv6_addr_copy(&fl.fl6_dst, &daddr->v6.sin6_addr);
|
|
|
|
if (ipv6_addr_type(&daddr->v6.sin6_addr) & IPV6_ADDR_LINKLOCAL)
|
|
|
|
fl.oif = daddr->v6.sin6_scope_id;
|
2007-02-09 15:25:18 +01:00
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2008-10-29 20:52:50 +01:00
|
|
|
SCTP_DEBUG_PRINTK("%s: DST=%pI6 ", __func__, &fl.fl6_dst);
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
if (saddr) {
|
|
|
|
ipv6_addr_copy(&fl.fl6_src, &saddr->v6.sin6_addr);
|
2008-10-29 20:52:50 +01:00
|
|
|
SCTP_DEBUG_PRINTK("SRC=%pI6 - ", &fl.fl6_src);
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
2008-03-05 19:48:10 +01:00
|
|
|
dst = ip6_route_output(&init_net, NULL, &fl);
|
2006-10-17 07:10:05 +02:00
|
|
|
if (!dst->error) {
|
2005-04-17 00:20:36 +02:00
|
|
|
struct rt6_info *rt;
|
|
|
|
rt = (struct rt6_info *)dst;
|
2008-10-29 20:52:50 +01:00
|
|
|
SCTP_DEBUG_PRINTK("rt6_dst:%pI6 rt6_src:%pI6\n",
|
2008-10-29 00:10:17 +01:00
|
|
|
&rt->rt6i_dst.addr, &rt->rt6i_src.addr);
|
2006-10-17 07:10:05 +02:00
|
|
|
return dst;
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
2006-10-17 07:10:05 +02:00
|
|
|
SCTP_DEBUG_PRINTK("NO ROUTE\n");
|
|
|
|
dst_release(dst);
|
|
|
|
return NULL;
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Returns the number of consecutive initial bits that match in the 2 ipv6
|
|
|
|
* addresses.
|
|
|
|
*/
|
|
|
|
static inline int sctp_v6_addr_match_len(union sctp_addr *s1,
|
|
|
|
union sctp_addr *s2)
|
|
|
|
{
|
|
|
|
struct in6_addr *a1 = &s1->v6.sin6_addr;
|
|
|
|
struct in6_addr *a2 = &s2->v6.sin6_addr;
|
|
|
|
int i, j;
|
|
|
|
|
|
|
|
for (i = 0; i < 4 ; i++) {
|
2006-11-21 02:01:42 +01:00
|
|
|
__be32 a1xora2;
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
a1xora2 = a1->s6_addr32[i] ^ a2->s6_addr32[i];
|
|
|
|
|
|
|
|
if ((j = fls(ntohl(a1xora2))))
|
|
|
|
return (i * 32 + 32 - j);
|
|
|
|
}
|
|
|
|
|
|
|
|
return (i*32);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Fills in the source address(saddr) based on the destination address(daddr)
|
|
|
|
* and asoc's bind address list.
|
|
|
|
*/
|
2008-05-29 12:55:05 +02:00
|
|
|
static void sctp_v6_get_saddr(struct sctp_sock *sk,
|
|
|
|
struct sctp_association *asoc,
|
2005-04-17 00:20:36 +02:00
|
|
|
struct dst_entry *dst,
|
|
|
|
union sctp_addr *daddr,
|
|
|
|
union sctp_addr *saddr)
|
|
|
|
{
|
|
|
|
struct sctp_bind_addr *bp;
|
|
|
|
struct sctp_sockaddr_entry *laddr;
|
|
|
|
sctp_scope_t scope;
|
|
|
|
union sctp_addr *baddr = NULL;
|
|
|
|
__u8 matchlen = 0;
|
|
|
|
__u8 bmatchlen;
|
|
|
|
|
2008-10-29 20:52:50 +01:00
|
|
|
SCTP_DEBUG_PRINTK("%s: asoc:%p dst:%p daddr:%pI6 ",
|
2008-10-29 00:10:17 +01:00
|
|
|
__func__, asoc, dst, &daddr->v6.sin6_addr);
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
if (!asoc) {
|
2008-08-15 00:33:21 +02:00
|
|
|
ipv6_dev_get_saddr(sock_net(sctp_opt2sk(sk)),
|
|
|
|
dst ? ip6_dst_idev(dst)->dev : NULL,
|
2008-03-25 01:37:42 +01:00
|
|
|
&daddr->v6.sin6_addr,
|
2008-05-29 12:55:05 +02:00
|
|
|
inet6_sk(&sk->inet.sk)->srcprefs,
|
2008-03-25 01:37:42 +01:00
|
|
|
&saddr->v6.sin6_addr);
|
2008-10-29 20:52:50 +01:00
|
|
|
SCTP_DEBUG_PRINTK("saddr from ipv6_get_saddr: %pI6\n",
|
2008-10-29 00:10:17 +01:00
|
|
|
&saddr->v6.sin6_addr);
|
2005-04-17 00:20:36 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
scope = sctp_scope(daddr);
|
|
|
|
|
|
|
|
bp = &asoc->base.bind_addr;
|
|
|
|
|
|
|
|
/* Go through the bind address list and find the best source address
|
|
|
|
* that matches the scope of the destination address.
|
|
|
|
*/
|
2007-09-17 01:03:28 +02:00
|
|
|
rcu_read_lock();
|
|
|
|
list_for_each_entry_rcu(laddr, &bp->address_list, list) {
|
|
|
|
if (!laddr->valid)
|
|
|
|
continue;
|
2007-12-20 23:12:24 +01:00
|
|
|
if ((laddr->state == SCTP_ADDR_SRC) &&
|
2006-11-21 02:21:44 +01:00
|
|
|
(laddr->a.sa.sa_family == AF_INET6) &&
|
|
|
|
(scope <= sctp_scope(&laddr->a))) {
|
2006-11-21 02:12:41 +01:00
|
|
|
bmatchlen = sctp_v6_addr_match_len(daddr, &laddr->a);
|
2005-04-17 00:20:36 +02:00
|
|
|
if (!baddr || (matchlen < bmatchlen)) {
|
2006-11-21 02:12:41 +01:00
|
|
|
baddr = &laddr->a;
|
2005-04-17 00:20:36 +02:00
|
|
|
matchlen = bmatchlen;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (baddr) {
|
|
|
|
memcpy(saddr, baddr, sizeof(union sctp_addr));
|
2008-10-29 20:52:50 +01:00
|
|
|
SCTP_DEBUG_PRINTK("saddr: %pI6\n", &saddr->v6.sin6_addr);
|
2005-04-17 00:20:36 +02:00
|
|
|
} else {
|
|
|
|
printk(KERN_ERR "%s: asoc:%p Could not find a valid source "
|
2008-10-29 20:52:50 +01:00
|
|
|
"address for the dest:%pI6\n",
|
2008-10-29 00:10:17 +01:00
|
|
|
__func__, asoc, &daddr->v6.sin6_addr);
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
2007-09-17 01:03:28 +02:00
|
|
|
rcu_read_unlock();
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Make a copy of all potential local addresses. */
|
|
|
|
static void sctp_v6_copy_addrlist(struct list_head *addrlist,
|
|
|
|
struct net_device *dev)
|
|
|
|
{
|
|
|
|
struct inet6_dev *in6_dev;
|
|
|
|
struct inet6_ifaddr *ifp;
|
|
|
|
struct sctp_sockaddr_entry *addr;
|
|
|
|
|
2006-09-22 23:44:24 +02:00
|
|
|
rcu_read_lock();
|
2005-04-17 00:20:36 +02:00
|
|
|
if ((in6_dev = __in6_dev_get(dev)) == NULL) {
|
2006-09-22 23:44:24 +02:00
|
|
|
rcu_read_unlock();
|
2005-04-17 00:20:36 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2007-03-08 23:43:41 +01:00
|
|
|
read_lock_bh(&in6_dev->lock);
|
2005-04-17 00:20:36 +02:00
|
|
|
for (ifp = in6_dev->addr_list; ifp; ifp = ifp->if_next) {
|
|
|
|
/* Add the address to the local list. */
|
|
|
|
addr = t_new(struct sctp_sockaddr_entry, GFP_ATOMIC);
|
|
|
|
if (addr) {
|
2006-11-21 02:04:42 +01:00
|
|
|
addr->a.v6.sin6_family = AF_INET6;
|
|
|
|
addr->a.v6.sin6_port = 0;
|
|
|
|
addr->a.v6.sin6_addr = ifp->addr;
|
|
|
|
addr->a.v6.sin6_scope_id = dev->ifindex;
|
2007-09-17 01:02:12 +02:00
|
|
|
addr->valid = 1;
|
2005-04-17 00:20:36 +02:00
|
|
|
INIT_LIST_HEAD(&addr->list);
|
2007-09-17 01:02:12 +02:00
|
|
|
INIT_RCU_HEAD(&addr->rcu);
|
2005-04-17 00:20:36 +02:00
|
|
|
list_add_tail(&addr->list, addrlist);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2007-03-08 23:43:41 +01:00
|
|
|
read_unlock_bh(&in6_dev->lock);
|
2006-09-22 23:44:24 +02:00
|
|
|
rcu_read_unlock();
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Initialize a sockaddr_storage from in incoming skb. */
|
|
|
|
static void sctp_v6_from_skb(union sctp_addr *addr,struct sk_buff *skb,
|
|
|
|
int is_saddr)
|
|
|
|
{
|
|
|
|
void *from;
|
2006-11-21 02:09:40 +01:00
|
|
|
__be16 *port;
|
2005-04-17 00:20:36 +02:00
|
|
|
struct sctphdr *sh;
|
|
|
|
|
|
|
|
port = &addr->v6.sin6_port;
|
|
|
|
addr->v6.sin6_family = AF_INET6;
|
|
|
|
addr->v6.sin6_flowinfo = 0; /* FIXME */
|
|
|
|
addr->v6.sin6_scope_id = ((struct inet6_skb_parm *)skb->cb)->iif;
|
|
|
|
|
2007-03-13 17:59:32 +01:00
|
|
|
sh = sctp_hdr(skb);
|
2005-04-17 00:20:36 +02:00
|
|
|
if (is_saddr) {
|
2006-11-21 02:09:40 +01:00
|
|
|
*port = sh->source;
|
2007-04-26 02:54:47 +02:00
|
|
|
from = &ipv6_hdr(skb)->saddr;
|
2005-04-17 00:20:36 +02:00
|
|
|
} else {
|
2006-11-21 02:09:40 +01:00
|
|
|
*port = sh->dest;
|
2007-04-26 02:54:47 +02:00
|
|
|
from = &ipv6_hdr(skb)->daddr;
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
ipv6_addr_copy(&addr->v6.sin6_addr, from);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Initialize an sctp_addr from a socket. */
|
|
|
|
static void sctp_v6_from_sk(union sctp_addr *addr, struct sock *sk)
|
|
|
|
{
|
|
|
|
addr->v6.sin6_family = AF_INET6;
|
2006-11-21 02:24:21 +01:00
|
|
|
addr->v6.sin6_port = 0;
|
2005-04-17 00:20:36 +02:00
|
|
|
addr->v6.sin6_addr = inet6_sk(sk)->rcv_saddr;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Initialize sk->sk_rcv_saddr from sctp_addr. */
|
|
|
|
static void sctp_v6_to_sk_saddr(union sctp_addr *addr, struct sock *sk)
|
|
|
|
{
|
|
|
|
if (addr->sa.sa_family == AF_INET && sctp_sk(sk)->v4mapped) {
|
|
|
|
inet6_sk(sk)->rcv_saddr.s6_addr32[0] = 0;
|
|
|
|
inet6_sk(sk)->rcv_saddr.s6_addr32[1] = 0;
|
|
|
|
inet6_sk(sk)->rcv_saddr.s6_addr32[2] = htonl(0x0000ffff);
|
|
|
|
inet6_sk(sk)->rcv_saddr.s6_addr32[3] =
|
|
|
|
addr->v4.sin_addr.s_addr;
|
|
|
|
} else {
|
|
|
|
inet6_sk(sk)->rcv_saddr = addr->v6.sin6_addr;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Initialize sk->sk_daddr from sctp_addr. */
|
|
|
|
static void sctp_v6_to_sk_daddr(union sctp_addr *addr, struct sock *sk)
|
|
|
|
{
|
|
|
|
if (addr->sa.sa_family == AF_INET && sctp_sk(sk)->v4mapped) {
|
|
|
|
inet6_sk(sk)->daddr.s6_addr32[0] = 0;
|
|
|
|
inet6_sk(sk)->daddr.s6_addr32[1] = 0;
|
|
|
|
inet6_sk(sk)->daddr.s6_addr32[2] = htonl(0x0000ffff);
|
|
|
|
inet6_sk(sk)->daddr.s6_addr32[3] = addr->v4.sin_addr.s_addr;
|
|
|
|
} else {
|
|
|
|
inet6_sk(sk)->daddr = addr->v6.sin6_addr;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Initialize a sctp_addr from an address parameter. */
|
|
|
|
static void sctp_v6_from_addr_param(union sctp_addr *addr,
|
|
|
|
union sctp_addr_param *param,
|
2006-11-21 02:11:13 +01:00
|
|
|
__be16 port, int iif)
|
2005-04-17 00:20:36 +02:00
|
|
|
{
|
|
|
|
addr->v6.sin6_family = AF_INET6;
|
|
|
|
addr->v6.sin6_port = port;
|
|
|
|
addr->v6.sin6_flowinfo = 0; /* BUG */
|
|
|
|
ipv6_addr_copy(&addr->v6.sin6_addr, ¶m->v6.addr);
|
|
|
|
addr->v6.sin6_scope_id = iif;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Initialize an address parameter from a sctp_addr and return the length
|
|
|
|
* of the address parameter.
|
|
|
|
*/
|
|
|
|
static int sctp_v6_to_addr_param(const union sctp_addr *addr,
|
|
|
|
union sctp_addr_param *param)
|
|
|
|
{
|
|
|
|
int length = sizeof(sctp_ipv6addr_param_t);
|
|
|
|
|
|
|
|
param->v6.param_hdr.type = SCTP_PARAM_IPV6_ADDRESS;
|
2006-11-21 02:01:42 +01:00
|
|
|
param->v6.param_hdr.length = htons(length);
|
2005-04-17 00:20:36 +02:00
|
|
|
ipv6_addr_copy(¶m->v6.addr, &addr->v6.sin6_addr);
|
|
|
|
|
|
|
|
return length;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Initialize a sctp_addr from a dst_entry. */
|
|
|
|
static void sctp_v6_dst_saddr(union sctp_addr *addr, struct dst_entry *dst,
|
2006-11-21 02:06:24 +01:00
|
|
|
__be16 port)
|
2005-04-17 00:20:36 +02:00
|
|
|
{
|
|
|
|
struct rt6_info *rt = (struct rt6_info *)dst;
|
|
|
|
addr->sa.sa_family = AF_INET6;
|
|
|
|
addr->v6.sin6_port = port;
|
|
|
|
ipv6_addr_copy(&addr->v6.sin6_addr, &rt->rt6i_src.addr);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Compare addresses exactly.
|
|
|
|
* v4-mapped-v6 is also in consideration.
|
|
|
|
*/
|
|
|
|
static int sctp_v6_cmp_addr(const union sctp_addr *addr1,
|
|
|
|
const union sctp_addr *addr2)
|
|
|
|
{
|
|
|
|
if (addr1->sa.sa_family != addr2->sa.sa_family) {
|
|
|
|
if (addr1->sa.sa_family == AF_INET &&
|
|
|
|
addr2->sa.sa_family == AF_INET6 &&
|
2007-08-25 08:16:08 +02:00
|
|
|
ipv6_addr_v4mapped(&addr2->v6.sin6_addr)) {
|
2005-04-17 00:20:36 +02:00
|
|
|
if (addr2->v6.sin6_port == addr1->v4.sin_port &&
|
|
|
|
addr2->v6.sin6_addr.s6_addr32[3] ==
|
|
|
|
addr1->v4.sin_addr.s_addr)
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
if (addr2->sa.sa_family == AF_INET &&
|
|
|
|
addr1->sa.sa_family == AF_INET6 &&
|
2007-08-25 08:16:08 +02:00
|
|
|
ipv6_addr_v4mapped(&addr1->v6.sin6_addr)) {
|
2005-04-17 00:20:36 +02:00
|
|
|
if (addr1->v6.sin6_port == addr2->v4.sin_port &&
|
|
|
|
addr1->v6.sin6_addr.s6_addr32[3] ==
|
|
|
|
addr2->v4.sin_addr.s_addr)
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (!ipv6_addr_equal(&addr1->v6.sin6_addr, &addr2->v6.sin6_addr))
|
|
|
|
return 0;
|
|
|
|
/* If this is a linklocal address, compare the scope_id. */
|
|
|
|
if (ipv6_addr_type(&addr1->v6.sin6_addr) & IPV6_ADDR_LINKLOCAL) {
|
|
|
|
if (addr1->v6.sin6_scope_id && addr2->v6.sin6_scope_id &&
|
|
|
|
(addr1->v6.sin6_scope_id != addr2->v6.sin6_scope_id)) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Initialize addr struct to INADDR_ANY. */
|
2006-11-21 02:24:53 +01:00
|
|
|
static void sctp_v6_inaddr_any(union sctp_addr *addr, __be16 port)
|
2005-04-17 00:20:36 +02:00
|
|
|
{
|
|
|
|
memset(addr, 0x00, sizeof(union sctp_addr));
|
|
|
|
addr->v6.sin6_family = AF_INET6;
|
|
|
|
addr->v6.sin6_port = port;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Is this a wildcard address? */
|
|
|
|
static int sctp_v6_is_any(const union sctp_addr *addr)
|
|
|
|
{
|
2005-04-28 20:59:16 +02:00
|
|
|
return ipv6_addr_any(&addr->v6.sin6_addr);
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Should this be available for binding? */
|
|
|
|
static int sctp_v6_available(union sctp_addr *addr, struct sctp_sock *sp)
|
|
|
|
{
|
|
|
|
int type;
|
|
|
|
struct in6_addr *in6 = (struct in6_addr *)&addr->v6.sin6_addr;
|
|
|
|
|
|
|
|
type = ipv6_addr_type(in6);
|
|
|
|
if (IPV6_ADDR_ANY == type)
|
|
|
|
return 1;
|
|
|
|
if (type == IPV6_ADDR_MAPPED) {
|
|
|
|
if (sp && !sp->v4mapped)
|
|
|
|
return 0;
|
|
|
|
if (sp && ipv6_only_sock(sctp_opt2sk(sp)))
|
|
|
|
return 0;
|
|
|
|
sctp_v6_map_v4(addr);
|
|
|
|
return sctp_get_af_specific(AF_INET)->available(addr, sp);
|
|
|
|
}
|
|
|
|
if (!(type & IPV6_ADDR_UNICAST))
|
|
|
|
return 0;
|
|
|
|
|
2008-01-11 07:43:18 +01:00
|
|
|
return ipv6_chk_addr(&init_net, in6, NULL, 0);
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* This function checks if the address is a valid address to be used for
|
|
|
|
* SCTP.
|
|
|
|
*
|
|
|
|
* Output:
|
|
|
|
* Return 0 - If the address is a non-unicast or an illegal address.
|
|
|
|
* Return 1 - If the address is a unicast.
|
|
|
|
*/
|
2006-06-18 07:55:35 +02:00
|
|
|
static int sctp_v6_addr_valid(union sctp_addr *addr,
|
|
|
|
struct sctp_sock *sp,
|
|
|
|
const struct sk_buff *skb)
|
2005-04-17 00:20:36 +02:00
|
|
|
{
|
|
|
|
int ret = ipv6_addr_type(&addr->v6.sin6_addr);
|
|
|
|
|
|
|
|
/* Support v4-mapped-v6 address. */
|
|
|
|
if (ret == IPV6_ADDR_MAPPED) {
|
|
|
|
/* Note: This routine is used in input, so v4-mapped-v6
|
|
|
|
* are disallowed here when there is no sctp_sock.
|
|
|
|
*/
|
|
|
|
if (!sp || !sp->v4mapped)
|
|
|
|
return 0;
|
|
|
|
if (sp && ipv6_only_sock(sctp_opt2sk(sp)))
|
|
|
|
return 0;
|
|
|
|
sctp_v6_map_v4(addr);
|
2006-06-18 07:55:35 +02:00
|
|
|
return sctp_get_af_specific(AF_INET)->addr_valid(addr, sp, skb);
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Is this a non-unicast address */
|
|
|
|
if (!(ret & IPV6_ADDR_UNICAST))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* What is the scope of 'addr'? */
|
|
|
|
static sctp_scope_t sctp_v6_scope(union sctp_addr *addr)
|
|
|
|
{
|
|
|
|
int v6scope;
|
|
|
|
sctp_scope_t retval;
|
|
|
|
|
|
|
|
/* The IPv6 scope is really a set of bit fields.
|
|
|
|
* See IFA_* in <net/if_inet6.h>. Map to a generic SCTP scope.
|
|
|
|
*/
|
|
|
|
|
|
|
|
v6scope = ipv6_addr_scope(&addr->v6.sin6_addr);
|
|
|
|
switch (v6scope) {
|
|
|
|
case IFA_HOST:
|
|
|
|
retval = SCTP_SCOPE_LOOPBACK;
|
|
|
|
break;
|
|
|
|
case IFA_LINK:
|
|
|
|
retval = SCTP_SCOPE_LINK;
|
|
|
|
break;
|
|
|
|
case IFA_SITE:
|
|
|
|
retval = SCTP_SCOPE_PRIVATE;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
retval = SCTP_SCOPE_GLOBAL;
|
|
|
|
break;
|
2007-04-21 02:09:22 +02:00
|
|
|
}
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Create and initialize a new sk for the socket to be returned by accept(). */
|
|
|
|
static struct sock *sctp_v6_create_accept_sk(struct sock *sk,
|
|
|
|
struct sctp_association *asoc)
|
|
|
|
{
|
|
|
|
struct sock *newsk;
|
|
|
|
struct ipv6_pinfo *newnp, *np = inet6_sk(sk);
|
|
|
|
struct sctp6_sock *newsctp6sk;
|
|
|
|
|
2008-03-25 18:26:21 +01:00
|
|
|
newsk = sk_alloc(sock_net(sk), PF_INET6, GFP_KERNEL, sk->sk_prot);
|
2005-04-17 00:20:36 +02:00
|
|
|
if (!newsk)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
sock_init_data(NULL, newsk);
|
|
|
|
|
2009-02-13 09:33:44 +01:00
|
|
|
sctp_copy_sock(newsk, sk, asoc);
|
2005-04-17 00:20:36 +02:00
|
|
|
sock_reset_flag(sk, SOCK_ZAPPED);
|
|
|
|
|
|
|
|
newsctp6sk = (struct sctp6_sock *)newsk;
|
|
|
|
inet_sk(newsk)->pinet6 = &newsctp6sk->inet6;
|
|
|
|
|
2007-07-26 01:49:29 +02:00
|
|
|
sctp_sk(newsk)->v4mapped = sctp_sk(sk)->v4mapped;
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
newnp = inet6_sk(newsk);
|
|
|
|
|
|
|
|
memcpy(newnp, np, sizeof(struct ipv6_pinfo));
|
|
|
|
|
|
|
|
/* Initialize sk's sport, dport, rcv_saddr and daddr for getsockname()
|
|
|
|
* and getpeername().
|
|
|
|
*/
|
|
|
|
sctp_v6_to_sk_daddr(&asoc->peer.primary_addr, newsk);
|
|
|
|
|
2005-08-10 04:45:38 +02:00
|
|
|
sk_refcnt_debug_inc(newsk);
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
if (newsk->sk_prot->init(newsk)) {
|
|
|
|
sk_common_release(newsk);
|
|
|
|
newsk = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return newsk;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Map v4 address to mapped v6 address */
|
|
|
|
static void sctp_v6_addr_v4map(struct sctp_sock *sp, union sctp_addr *addr)
|
|
|
|
{
|
|
|
|
if (sp->v4mapped && AF_INET == addr->sa.sa_family)
|
|
|
|
sctp_v4_map_v6(addr);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Where did this skb come from? */
|
|
|
|
static int sctp_v6_skb_iif(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct inet6_skb_parm *opt = (struct inet6_skb_parm *) skb->cb;
|
|
|
|
return opt->iif;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Was this packet marked by Explicit Congestion Notification? */
|
|
|
|
static int sctp_v6_is_ce(const struct sk_buff *skb)
|
|
|
|
{
|
2007-04-26 02:54:47 +02:00
|
|
|
return *((__u32 *)(ipv6_hdr(skb))) & htonl(1 << 20);
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Dump the v6 addr to the seq file. */
|
|
|
|
static void sctp_v6_seq_dump_addr(struct seq_file *seq, union sctp_addr *addr)
|
|
|
|
{
|
2008-10-29 20:52:50 +01:00
|
|
|
seq_printf(seq, "%pI6 ", &addr->v6.sin6_addr);
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
2008-06-04 21:40:15 +02:00
|
|
|
static void sctp_v6_ecn_capable(struct sock *sk)
|
|
|
|
{
|
|
|
|
inet6_sk(sk)->tclass |= INET_ECN_ECT_0;
|
|
|
|
}
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
/* Initialize a PF_INET6 socket msg_name. */
|
|
|
|
static void sctp_inet6_msgname(char *msgname, int *addr_len)
|
|
|
|
{
|
|
|
|
struct sockaddr_in6 *sin6;
|
|
|
|
|
|
|
|
sin6 = (struct sockaddr_in6 *)msgname;
|
|
|
|
sin6->sin6_family = AF_INET6;
|
|
|
|
sin6->sin6_flowinfo = 0;
|
|
|
|
sin6->sin6_scope_id = 0; /*FIXME */
|
|
|
|
*addr_len = sizeof(struct sockaddr_in6);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Initialize a PF_INET msgname from a ulpevent. */
|
|
|
|
static void sctp_inet6_event_msgname(struct sctp_ulpevent *event,
|
|
|
|
char *msgname, int *addrlen)
|
|
|
|
{
|
|
|
|
struct sockaddr_in6 *sin6, *sin6from;
|
|
|
|
|
|
|
|
if (msgname) {
|
|
|
|
union sctp_addr *addr;
|
|
|
|
struct sctp_association *asoc;
|
|
|
|
|
|
|
|
asoc = event->asoc;
|
|
|
|
sctp_inet6_msgname(msgname, addrlen);
|
|
|
|
sin6 = (struct sockaddr_in6 *)msgname;
|
|
|
|
sin6->sin6_port = htons(asoc->peer.port);
|
|
|
|
addr = &asoc->peer.primary_addr;
|
|
|
|
|
|
|
|
/* Note: If we go to a common v6 format, this code
|
|
|
|
* will change.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* Map ipv4 address into v4-mapped-on-v6 address. */
|
|
|
|
if (sctp_sk(asoc->base.sk)->v4mapped &&
|
|
|
|
AF_INET == addr->sa.sa_family) {
|
|
|
|
sctp_v4_map_v6((union sctp_addr *)sin6);
|
|
|
|
sin6->sin6_addr.s6_addr32[3] =
|
|
|
|
addr->v4.sin_addr.s_addr;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
sin6from = &asoc->peer.primary_addr.v6;
|
|
|
|
ipv6_addr_copy(&sin6->sin6_addr, &sin6from->sin6_addr);
|
|
|
|
if (ipv6_addr_type(&sin6->sin6_addr) & IPV6_ADDR_LINKLOCAL)
|
|
|
|
sin6->sin6_scope_id = sin6from->sin6_scope_id;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Initialize a msg_name from an inbound skb. */
|
|
|
|
static void sctp_inet6_skb_msgname(struct sk_buff *skb, char *msgname,
|
|
|
|
int *addr_len)
|
|
|
|
{
|
|
|
|
struct sctphdr *sh;
|
|
|
|
struct sockaddr_in6 *sin6;
|
|
|
|
|
|
|
|
if (msgname) {
|
|
|
|
sctp_inet6_msgname(msgname, addr_len);
|
|
|
|
sin6 = (struct sockaddr_in6 *)msgname;
|
2007-03-13 17:59:32 +01:00
|
|
|
sh = sctp_hdr(skb);
|
2005-04-17 00:20:36 +02:00
|
|
|
sin6->sin6_port = sh->source;
|
|
|
|
|
|
|
|
/* Map ipv4 address into v4-mapped-on-v6 address. */
|
|
|
|
if (sctp_sk(skb->sk)->v4mapped &&
|
2007-04-21 07:47:35 +02:00
|
|
|
ip_hdr(skb)->version == 4) {
|
2005-04-17 00:20:36 +02:00
|
|
|
sctp_v4_map_v6((union sctp_addr *)sin6);
|
2007-04-21 07:47:35 +02:00
|
|
|
sin6->sin6_addr.s6_addr32[3] = ip_hdr(skb)->saddr;
|
2005-04-17 00:20:36 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Otherwise, just copy the v6 address. */
|
2007-04-26 02:54:47 +02:00
|
|
|
ipv6_addr_copy(&sin6->sin6_addr, &ipv6_hdr(skb)->saddr);
|
2005-04-17 00:20:36 +02:00
|
|
|
if (ipv6_addr_type(&sin6->sin6_addr) & IPV6_ADDR_LINKLOCAL) {
|
|
|
|
struct sctp_ulpevent *ev = sctp_skb2event(skb);
|
|
|
|
sin6->sin6_scope_id = ev->iif;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Do we support this AF? */
|
|
|
|
static int sctp_inet6_af_supported(sa_family_t family, struct sctp_sock *sp)
|
|
|
|
{
|
|
|
|
switch (family) {
|
|
|
|
case AF_INET6:
|
|
|
|
return 1;
|
|
|
|
/* v4-mapped-v6 addresses */
|
|
|
|
case AF_INET:
|
2008-07-19 08:05:40 +02:00
|
|
|
if (!__ipv6_only_sock(sctp_opt2sk(sp)))
|
2005-04-17 00:20:36 +02:00
|
|
|
return 1;
|
|
|
|
default:
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Address matching with wildcards allowed. This extra level
|
|
|
|
* of indirection lets us choose whether a PF_INET6 should
|
|
|
|
* disallow any v4 addresses if we so choose.
|
|
|
|
*/
|
|
|
|
static int sctp_inet6_cmp_addr(const union sctp_addr *addr1,
|
|
|
|
const union sctp_addr *addr2,
|
|
|
|
struct sctp_sock *opt)
|
|
|
|
{
|
|
|
|
struct sctp_af *af1, *af2;
|
2008-08-18 16:34:34 +02:00
|
|
|
struct sock *sk = sctp_opt2sk(opt);
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
af1 = sctp_get_af_specific(addr1->sa.sa_family);
|
|
|
|
af2 = sctp_get_af_specific(addr2->sa.sa_family);
|
|
|
|
|
|
|
|
if (!af1 || !af2)
|
|
|
|
return 0;
|
2008-07-19 08:05:40 +02:00
|
|
|
|
|
|
|
/* If the socket is IPv6 only, v4 addrs will not match */
|
2008-08-18 16:34:34 +02:00
|
|
|
if (__ipv6_only_sock(sk) && af1 != af2)
|
2008-07-19 08:05:40 +02:00
|
|
|
return 0;
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
/* Today, wildcard AF_INET/AF_INET6. */
|
2008-08-18 16:34:34 +02:00
|
|
|
if (sctp_is_any(sk, addr1) || sctp_is_any(sk, addr2))
|
2005-04-17 00:20:36 +02:00
|
|
|
return 1;
|
|
|
|
|
|
|
|
if (addr1->sa.sa_family != addr2->sa.sa_family)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return af1->cmp_addr(addr1, addr2);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Verify that the provided sockaddr looks bindable. Common verification,
|
|
|
|
* has already been taken care of.
|
|
|
|
*/
|
|
|
|
static int sctp_inet6_bind_verify(struct sctp_sock *opt, union sctp_addr *addr)
|
|
|
|
{
|
|
|
|
struct sctp_af *af;
|
|
|
|
|
|
|
|
/* ASSERT: address family has already been verified. */
|
|
|
|
if (addr->sa.sa_family != AF_INET6)
|
|
|
|
af = sctp_get_af_specific(addr->sa.sa_family);
|
|
|
|
else {
|
|
|
|
int type = ipv6_addr_type(&addr->v6.sin6_addr);
|
2005-06-14 00:13:05 +02:00
|
|
|
struct net_device *dev;
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
if (type & IPV6_ADDR_LINKLOCAL) {
|
2005-06-14 00:13:05 +02:00
|
|
|
if (!addr->v6.sin6_scope_id)
|
|
|
|
return 0;
|
2009-11-06 05:56:46 +01:00
|
|
|
rcu_read_lock();
|
|
|
|
dev = dev_get_by_index_rcu(&init_net,
|
|
|
|
addr->v6.sin6_scope_id);
|
|
|
|
if (!dev ||
|
|
|
|
!ipv6_chk_addr(&init_net, &addr->v6.sin6_addr,
|
2008-01-11 07:43:18 +01:00
|
|
|
dev, 0)) {
|
2009-11-06 05:56:46 +01:00
|
|
|
rcu_read_unlock();
|
2007-07-03 20:29:23 +02:00
|
|
|
return 0;
|
|
|
|
}
|
2009-11-06 05:56:46 +01:00
|
|
|
rcu_read_unlock();
|
2008-07-19 08:05:40 +02:00
|
|
|
} else if (type == IPV6_ADDR_MAPPED) {
|
|
|
|
if (!opt->v4mapped)
|
|
|
|
return 0;
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
2008-07-19 08:05:40 +02:00
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
af = opt->pf->af;
|
|
|
|
}
|
|
|
|
return af->available(addr, opt);
|
|
|
|
}
|
|
|
|
|
2005-06-14 00:13:05 +02:00
|
|
|
/* Verify that the provided sockaddr looks sendable. Common verification,
|
2005-04-17 00:20:36 +02:00
|
|
|
* has already been taken care of.
|
|
|
|
*/
|
|
|
|
static int sctp_inet6_send_verify(struct sctp_sock *opt, union sctp_addr *addr)
|
|
|
|
{
|
|
|
|
struct sctp_af *af = NULL;
|
|
|
|
|
|
|
|
/* ASSERT: address family has already been verified. */
|
|
|
|
if (addr->sa.sa_family != AF_INET6)
|
|
|
|
af = sctp_get_af_specific(addr->sa.sa_family);
|
|
|
|
else {
|
|
|
|
int type = ipv6_addr_type(&addr->v6.sin6_addr);
|
2005-06-14 00:13:05 +02:00
|
|
|
struct net_device *dev;
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
if (type & IPV6_ADDR_LINKLOCAL) {
|
2005-06-14 00:13:05 +02:00
|
|
|
if (!addr->v6.sin6_scope_id)
|
|
|
|
return 0;
|
2009-11-06 05:56:46 +01:00
|
|
|
rcu_read_lock();
|
|
|
|
dev = dev_get_by_index_rcu(&init_net,
|
|
|
|
addr->v6.sin6_scope_id);
|
|
|
|
rcu_read_unlock();
|
2005-06-14 00:13:05 +02:00
|
|
|
if (!dev)
|
2005-04-17 00:20:36 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
af = opt->pf->af;
|
|
|
|
}
|
|
|
|
|
|
|
|
return af != NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Fill in Supported Address Type information for INIT and INIT-ACK
|
|
|
|
* chunks. Note: In the future, we may want to look at sock options
|
|
|
|
* to determine whether a PF_INET6 socket really wants to have IPV4
|
|
|
|
* addresses.
|
|
|
|
* Returns number of addresses supported.
|
|
|
|
*/
|
|
|
|
static int sctp_inet6_supported_addrs(const struct sctp_sock *opt,
|
2006-11-21 02:25:49 +01:00
|
|
|
__be16 *types)
|
2005-04-17 00:20:36 +02:00
|
|
|
{
|
2008-07-19 08:05:40 +02:00
|
|
|
types[0] = SCTP_PARAM_IPV6_ADDRESS;
|
|
|
|
if (!opt || !ipv6_only_sock(sctp_opt2sk(opt))) {
|
|
|
|
types[1] = SCTP_PARAM_IPV4_ADDRESS;
|
|
|
|
return 2;
|
|
|
|
}
|
|
|
|
return 1;
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
2005-12-22 21:49:22 +01:00
|
|
|
static const struct proto_ops inet6_seqpacket_ops = {
|
2006-03-21 07:48:35 +01:00
|
|
|
.family = PF_INET6,
|
|
|
|
.owner = THIS_MODULE,
|
|
|
|
.release = inet6_release,
|
|
|
|
.bind = inet6_bind,
|
|
|
|
.connect = inet_dgram_connect,
|
|
|
|
.socketpair = sock_no_socketpair,
|
|
|
|
.accept = inet_accept,
|
|
|
|
.getname = inet6_getname,
|
|
|
|
.poll = sctp_poll,
|
|
|
|
.ioctl = inet6_ioctl,
|
|
|
|
.listen = sctp_inet_listen,
|
|
|
|
.shutdown = inet_shutdown,
|
|
|
|
.setsockopt = sock_common_setsockopt,
|
|
|
|
.getsockopt = sock_common_getsockopt,
|
|
|
|
.sendmsg = inet_sendmsg,
|
|
|
|
.recvmsg = sock_common_recvmsg,
|
|
|
|
.mmap = sock_no_mmap,
|
2006-03-21 07:45:21 +01:00
|
|
|
#ifdef CONFIG_COMPAT
|
2006-03-21 07:48:35 +01:00
|
|
|
.compat_setsockopt = compat_sock_common_setsockopt,
|
|
|
|
.compat_getsockopt = compat_sock_common_getsockopt,
|
2006-03-21 07:45:21 +01:00
|
|
|
#endif
|
2005-04-17 00:20:36 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
static struct inet_protosw sctpv6_seqpacket_protosw = {
|
|
|
|
.type = SOCK_SEQPACKET,
|
|
|
|
.protocol = IPPROTO_SCTP,
|
|
|
|
.prot = &sctpv6_prot,
|
|
|
|
.ops = &inet6_seqpacket_ops,
|
|
|
|
.no_check = 0,
|
|
|
|
.flags = SCTP_PROTOSW_FLAG
|
|
|
|
};
|
|
|
|
static struct inet_protosw sctpv6_stream_protosw = {
|
|
|
|
.type = SOCK_STREAM,
|
|
|
|
.protocol = IPPROTO_SCTP,
|
|
|
|
.prot = &sctpv6_prot,
|
|
|
|
.ops = &inet6_seqpacket_ops,
|
|
|
|
.no_check = 0,
|
|
|
|
.flags = SCTP_PROTOSW_FLAG,
|
|
|
|
};
|
|
|
|
|
2007-10-15 21:50:28 +02:00
|
|
|
static int sctp6_rcv(struct sk_buff *skb)
|
2005-04-17 00:20:36 +02:00
|
|
|
{
|
2007-10-15 21:50:28 +02:00
|
|
|
return sctp_rcv(skb) ? -1 : 0;
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
2009-09-14 14:22:28 +02:00
|
|
|
static const struct inet6_protocol sctpv6_protocol = {
|
2005-04-17 00:20:36 +02:00
|
|
|
.handler = sctp6_rcv,
|
|
|
|
.err_handler = sctp_v6_err,
|
|
|
|
.flags = INET6_PROTO_NOPOLICY | INET6_PROTO_FINAL,
|
|
|
|
};
|
|
|
|
|
2008-02-15 15:53:59 +01:00
|
|
|
static struct sctp_af sctp_af_inet6 = {
|
2006-03-21 07:48:35 +01:00
|
|
|
.sa_family = AF_INET6,
|
|
|
|
.sctp_xmit = sctp_v6_xmit,
|
|
|
|
.setsockopt = ipv6_setsockopt,
|
|
|
|
.getsockopt = ipv6_getsockopt,
|
|
|
|
.get_dst = sctp_v6_get_dst,
|
|
|
|
.get_saddr = sctp_v6_get_saddr,
|
|
|
|
.copy_addrlist = sctp_v6_copy_addrlist,
|
|
|
|
.from_skb = sctp_v6_from_skb,
|
|
|
|
.from_sk = sctp_v6_from_sk,
|
|
|
|
.to_sk_saddr = sctp_v6_to_sk_saddr,
|
|
|
|
.to_sk_daddr = sctp_v6_to_sk_daddr,
|
|
|
|
.from_addr_param = sctp_v6_from_addr_param,
|
|
|
|
.to_addr_param = sctp_v6_to_addr_param,
|
|
|
|
.dst_saddr = sctp_v6_dst_saddr,
|
|
|
|
.cmp_addr = sctp_v6_cmp_addr,
|
|
|
|
.scope = sctp_v6_scope,
|
|
|
|
.addr_valid = sctp_v6_addr_valid,
|
|
|
|
.inaddr_any = sctp_v6_inaddr_any,
|
|
|
|
.is_any = sctp_v6_is_any,
|
|
|
|
.available = sctp_v6_available,
|
|
|
|
.skb_iif = sctp_v6_skb_iif,
|
|
|
|
.is_ce = sctp_v6_is_ce,
|
|
|
|
.seq_dump_addr = sctp_v6_seq_dump_addr,
|
2008-06-04 21:40:15 +02:00
|
|
|
.ecn_capable = sctp_v6_ecn_capable,
|
2006-03-21 07:48:35 +01:00
|
|
|
.net_header_len = sizeof(struct ipv6hdr),
|
|
|
|
.sockaddr_len = sizeof(struct sockaddr_in6),
|
2006-03-21 07:45:21 +01:00
|
|
|
#ifdef CONFIG_COMPAT
|
2006-03-21 07:48:35 +01:00
|
|
|
.compat_setsockopt = compat_ipv6_setsockopt,
|
|
|
|
.compat_getsockopt = compat_ipv6_getsockopt,
|
2006-03-21 07:45:21 +01:00
|
|
|
#endif
|
2005-04-17 00:20:36 +02:00
|
|
|
};
|
|
|
|
|
2008-02-15 15:53:59 +01:00
|
|
|
static struct sctp_pf sctp_pf_inet6 = {
|
2005-04-17 00:20:36 +02:00
|
|
|
.event_msgname = sctp_inet6_event_msgname,
|
|
|
|
.skb_msgname = sctp_inet6_skb_msgname,
|
|
|
|
.af_supported = sctp_inet6_af_supported,
|
|
|
|
.cmp_addr = sctp_inet6_cmp_addr,
|
|
|
|
.bind_verify = sctp_inet6_bind_verify,
|
|
|
|
.send_verify = sctp_inet6_send_verify,
|
|
|
|
.supported_addrs = sctp_inet6_supported_addrs,
|
|
|
|
.create_accept_sk = sctp_v6_create_accept_sk,
|
|
|
|
.addr_v4map = sctp_v6_addr_v4map,
|
2008-02-15 15:53:59 +01:00
|
|
|
.af = &sctp_af_inet6,
|
2005-04-17 00:20:36 +02:00
|
|
|
};
|
|
|
|
|
2007-05-04 22:36:30 +02:00
|
|
|
/* Initialize IPv6 support and register with socket layer. */
|
2008-03-20 23:17:14 +01:00
|
|
|
void sctp_v6_pf_init(void)
|
2005-04-17 00:20:36 +02:00
|
|
|
{
|
2007-05-04 22:36:30 +02:00
|
|
|
/* Register the SCTP specific PF_INET6 functions. */
|
2008-02-15 15:53:59 +01:00
|
|
|
sctp_register_pf(&sctp_pf_inet6, PF_INET6);
|
2007-05-04 22:36:30 +02:00
|
|
|
|
|
|
|
/* Register the SCTP specific AF_INET6 functions. */
|
2008-02-15 15:53:59 +01:00
|
|
|
sctp_register_af(&sctp_af_inet6);
|
2008-03-20 23:17:14 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
void sctp_v6_pf_exit(void)
|
|
|
|
{
|
|
|
|
list_del(&sctp_af_inet6.list);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Initialize IPv6 support and register with socket layer. */
|
|
|
|
int sctp_v6_protosw_init(void)
|
|
|
|
{
|
|
|
|
int rc;
|
2007-05-04 22:36:30 +02:00
|
|
|
|
|
|
|
rc = proto_register(&sctpv6_prot, 1);
|
2005-04-17 00:20:36 +02:00
|
|
|
if (rc)
|
2007-05-04 22:36:30 +02:00
|
|
|
return rc;
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
/* Add SCTPv6(UDP and TCP style) to inetsw6 linked list. */
|
|
|
|
inet6_register_protosw(&sctpv6_seqpacket_protosw);
|
|
|
|
inet6_register_protosw(&sctpv6_stream_protosw);
|
|
|
|
|
2007-05-04 22:36:30 +02:00
|
|
|
return 0;
|
|
|
|
}
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2008-03-20 23:17:14 +01:00
|
|
|
void sctp_v6_protosw_exit(void)
|
|
|
|
{
|
|
|
|
inet6_unregister_protosw(&sctpv6_seqpacket_protosw);
|
|
|
|
inet6_unregister_protosw(&sctpv6_stream_protosw);
|
|
|
|
proto_unregister(&sctpv6_prot);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-05-04 22:36:30 +02:00
|
|
|
/* Register with inet6 layer. */
|
|
|
|
int sctp_v6_add_protocol(void)
|
|
|
|
{
|
2005-04-17 00:20:36 +02:00
|
|
|
/* Register notifier for inet6 address additions/deletions. */
|
|
|
|
register_inet6addr_notifier(&sctp_inet6addr_notifier);
|
2007-05-04 22:36:30 +02:00
|
|
|
|
|
|
|
if (inet6_add_protocol(&sctpv6_protocol, IPPROTO_SCTP) < 0)
|
|
|
|
return -EAGAIN;
|
|
|
|
|
|
|
|
return 0;
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
2007-05-04 22:36:30 +02:00
|
|
|
/* Unregister with inet6 layer. */
|
|
|
|
void sctp_v6_del_protocol(void)
|
|
|
|
{
|
|
|
|
inet6_del_protocol(&sctpv6_protocol, IPPROTO_SCTP);
|
|
|
|
unregister_inet6addr_notifier(&sctp_inet6addr_notifier);
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|