1 // SPDX-License-Identifier: GPL-2.0-or-later 2 /* 3 * INET An implementation of the TCP/IP protocol suite for the LINUX 4 * operating system. INET is implemented using the BSD Socket 5 * interface as the means of communication with the user level. 6 * 7 * "Ping" sockets 8 * 9 * Based on ipv4/ping.c code. 10 * 11 * Authors: Lorenzo Colitti (IPv6 support) 12 * Vasiliy Kulikov / Openwall (IPv4 implementation, for Linux 2.6), 13 * Pavel Kankovsky (IPv4 implementation, for Linux 2.4.32) 14 */ 15 16 #include <net/addrconf.h> 17 #include <net/ipv6.h> 18 #include <net/ip6_route.h> 19 #include <net/protocol.h> 20 #include <net/udp.h> 21 #include <net/transp_v6.h> 22 #include <linux/proc_fs.h> 23 #include <linux/bpf-cgroup.h> 24 #include <net/ping.h> 25 26 /* Compatibility glue so we can support IPv6 when it's compiled as a module */ 27 static int dummy_ipv6_recv_error(struct sock *sk, struct msghdr *msg, int len, 28 int *addr_len) 29 { 30 return -EAFNOSUPPORT; 31 } 32 static void dummy_ip6_datagram_recv_ctl(struct sock *sk, struct msghdr *msg, 33 struct sk_buff *skb) 34 { 35 } 36 static int dummy_icmpv6_err_convert(u8 type, u8 code, int *err) 37 { 38 return -EAFNOSUPPORT; 39 } 40 static void dummy_ipv6_icmp_error(struct sock *sk, struct sk_buff *skb, int err, 41 __be16 port, u32 info, u8 *payload) {} 42 static int dummy_ipv6_chk_addr(struct net *net, const struct in6_addr *addr, 43 const struct net_device *dev, int strict) 44 { 45 return 0; 46 } 47 48 static int ping_v6_pre_connect(struct sock *sk, struct sockaddr *uaddr, 49 int addr_len) 50 { 51 /* This check is replicated from __ip6_datagram_connect() and 52 * intended to prevent BPF program called below from accessing 53 * bytes that are out of the bound specified by user in addr_len. 54 */ 55 56 if (addr_len < SIN6_LEN_RFC2133) 57 return -EINVAL; 58 59 return BPF_CGROUP_RUN_PROG_INET6_CONNECT_LOCK(sk, uaddr, &addr_len); 60 } 61 62 static int ping_v6_sendmsg(struct sock *sk, struct msghdr *msg, size_t len) 63 { 64 struct inet_sock *inet = inet_sk(sk); 65 struct ipv6_pinfo *np = inet6_sk(sk); 66 struct icmp6hdr user_icmph; 67 int addr_type; 68 struct in6_addr *daddr; 69 int oif = 0; 70 struct flowi6 fl6; 71 int err; 72 struct dst_entry *dst; 73 struct rt6_info *rt; 74 struct pingfakehdr pfh; 75 struct ipcm6_cookie ipc6; 76 77 err = ping_common_sendmsg(AF_INET6, msg, len, &user_icmph, 78 sizeof(user_icmph)); 79 if (err) 80 return err; 81 82 memset(&fl6, 0, sizeof(fl6)); 83 84 if (msg->msg_name) { 85 DECLARE_SOCKADDR(struct sockaddr_in6 *, u, msg->msg_name); 86 if (msg->msg_namelen < sizeof(*u)) 87 return -EINVAL; 88 if (u->sin6_family != AF_INET6) { 89 return -EAFNOSUPPORT; 90 } 91 daddr = &(u->sin6_addr); 92 if (inet6_test_bit(SNDFLOW, sk)) 93 fl6.flowlabel = u->sin6_flowinfo & IPV6_FLOWINFO_MASK; 94 if (__ipv6_addr_needs_scope_id(ipv6_addr_type(daddr))) 95 oif = u->sin6_scope_id; 96 } else { 97 if (sk->sk_state != TCP_ESTABLISHED) 98 return -EDESTADDRREQ; 99 daddr = &sk->sk_v6_daddr; 100 fl6.flowlabel = np->flow_label; 101 } 102 103 if (!oif) 104 oif = sk->sk_bound_dev_if; 105 106 if (!oif) 107 oif = np->sticky_pktinfo.ipi6_ifindex; 108 109 if (!oif && ipv6_addr_is_multicast(daddr)) 110 oif = READ_ONCE(np->mcast_oif); 111 else if (!oif) 112 oif = READ_ONCE(np->ucast_oif); 113 114 addr_type = ipv6_addr_type(daddr); 115 if ((__ipv6_addr_needs_scope_id(addr_type) && !oif) || 116 (addr_type & IPV6_ADDR_MAPPED) || 117 (oif && sk->sk_bound_dev_if && oif != sk->sk_bound_dev_if && 118 l3mdev_master_ifindex_by_index(sock_net(sk), oif) != sk->sk_bound_dev_if)) 119 return -EINVAL; 120 121 ipcm6_init_sk(&ipc6, sk); 122 ipc6.sockc.priority = READ_ONCE(sk->sk_priority); 123 ipc6.sockc.tsflags = READ_ONCE(sk->sk_tsflags); 124 ipc6.sockc.mark = READ_ONCE(sk->sk_mark); 125 126 fl6.flowi6_oif = oif; 127 128 if (msg->msg_controllen) { 129 struct ipv6_txoptions opt = {}; 130 131 opt.tot_len = sizeof(opt); 132 ipc6.opt = &opt; 133 134 err = ip6_datagram_send_ctl(sock_net(sk), sk, msg, &fl6, &ipc6); 135 if (err < 0) 136 return err; 137 138 /* Changes to txoptions and flow info are not implemented, yet. 139 * Drop the options. 140 */ 141 ipc6.opt = NULL; 142 } 143 144 fl6.flowi6_proto = IPPROTO_ICMPV6; 145 fl6.saddr = np->saddr; 146 fl6.daddr = *daddr; 147 fl6.flowi6_mark = ipc6.sockc.mark; 148 fl6.flowi6_uid = sk->sk_uid; 149 fl6.fl6_icmp_type = user_icmph.icmp6_type; 150 fl6.fl6_icmp_code = user_icmph.icmp6_code; 151 security_sk_classify_flow(sk, flowi6_to_flowi_common(&fl6)); 152 153 fl6.flowlabel = ip6_make_flowinfo(ipc6.tclass, fl6.flowlabel); 154 155 dst = ip6_sk_dst_lookup_flow(sk, &fl6, daddr, false); 156 if (IS_ERR(dst)) 157 return PTR_ERR(dst); 158 rt = dst_rt6_info(dst); 159 160 if (!fl6.flowi6_oif && ipv6_addr_is_multicast(&fl6.daddr)) 161 fl6.flowi6_oif = READ_ONCE(np->mcast_oif); 162 else if (!fl6.flowi6_oif) 163 fl6.flowi6_oif = READ_ONCE(np->ucast_oif); 164 165 pfh.icmph.type = user_icmph.icmp6_type; 166 pfh.icmph.code = user_icmph.icmp6_code; 167 pfh.icmph.checksum = 0; 168 pfh.icmph.un.echo.id = inet->inet_sport; 169 pfh.icmph.un.echo.sequence = user_icmph.icmp6_sequence; 170 pfh.msg = msg; 171 pfh.wcheck = 0; 172 pfh.family = AF_INET6; 173 174 if (ipc6.hlimit < 0) 175 ipc6.hlimit = ip6_sk_dst_hoplimit(np, &fl6, dst); 176 177 lock_sock(sk); 178 err = ip6_append_data(sk, ping_getfrag, &pfh, len, 179 sizeof(struct icmp6hdr), &ipc6, &fl6, rt, 180 MSG_DONTWAIT); 181 182 if (err) { 183 ICMP6_INC_STATS(sock_net(sk), rt->rt6i_idev, 184 ICMP6_MIB_OUTERRORS); 185 ip6_flush_pending_frames(sk); 186 } else { 187 icmpv6_push_pending_frames(sk, &fl6, 188 (struct icmp6hdr *)&pfh.icmph, len); 189 } 190 release_sock(sk); 191 192 dst_release(dst); 193 194 if (err) 195 return err; 196 197 return len; 198 } 199 200 struct proto pingv6_prot = { 201 .name = "PINGv6", 202 .owner = THIS_MODULE, 203 .init = ping_init_sock, 204 .close = ping_close, 205 .pre_connect = ping_v6_pre_connect, 206 .connect = ip6_datagram_connect_v6_only, 207 .disconnect = __udp_disconnect, 208 .setsockopt = ipv6_setsockopt, 209 .getsockopt = ipv6_getsockopt, 210 .sendmsg = ping_v6_sendmsg, 211 .recvmsg = ping_recvmsg, 212 .bind = ping_bind, 213 .backlog_rcv = ping_queue_rcv_skb, 214 .hash = ping_hash, 215 .unhash = ping_unhash, 216 .get_port = ping_get_port, 217 .put_port = ping_unhash, 218 .obj_size = sizeof(struct raw6_sock), 219 .ipv6_pinfo_offset = offsetof(struct raw6_sock, inet6), 220 }; 221 EXPORT_SYMBOL_GPL(pingv6_prot); 222 223 static struct inet_protosw pingv6_protosw = { 224 .type = SOCK_DGRAM, 225 .protocol = IPPROTO_ICMPV6, 226 .prot = &pingv6_prot, 227 .ops = &inet6_sockraw_ops, 228 .flags = INET_PROTOSW_REUSE, 229 }; 230 231 #ifdef CONFIG_PROC_FS 232 static void *ping_v6_seq_start(struct seq_file *seq, loff_t *pos) 233 { 234 return ping_seq_start(seq, pos, AF_INET6); 235 } 236 237 static int ping_v6_seq_show(struct seq_file *seq, void *v) 238 { 239 if (v == SEQ_START_TOKEN) { 240 seq_puts(seq, IPV6_SEQ_DGRAM_HEADER); 241 } else { 242 int bucket = ((struct ping_iter_state *) seq->private)->bucket; 243 struct inet_sock *inet = inet_sk((struct sock *)v); 244 __u16 srcp = ntohs(inet->inet_sport); 245 __u16 destp = ntohs(inet->inet_dport); 246 ip6_dgram_sock_seq_show(seq, v, srcp, destp, bucket); 247 } 248 return 0; 249 } 250 251 static const struct seq_operations ping_v6_seq_ops = { 252 .start = ping_v6_seq_start, 253 .show = ping_v6_seq_show, 254 .next = ping_seq_next, 255 .stop = ping_seq_stop, 256 }; 257 258 static int __net_init ping_v6_proc_init_net(struct net *net) 259 { 260 if (!proc_create_net("icmp6", 0444, net->proc_net, &ping_v6_seq_ops, 261 sizeof(struct ping_iter_state))) 262 return -ENOMEM; 263 return 0; 264 } 265 266 static void __net_exit ping_v6_proc_exit_net(struct net *net) 267 { 268 remove_proc_entry("icmp6", net->proc_net); 269 } 270 271 static struct pernet_operations ping_v6_net_ops = { 272 .init = ping_v6_proc_init_net, 273 .exit = ping_v6_proc_exit_net, 274 }; 275 #endif 276 277 int __init pingv6_init(void) 278 { 279 #ifdef CONFIG_PROC_FS 280 int ret = register_pernet_subsys(&ping_v6_net_ops); 281 if (ret) 282 return ret; 283 #endif 284 pingv6_ops.ipv6_recv_error = ipv6_recv_error; 285 pingv6_ops.ip6_datagram_recv_common_ctl = ip6_datagram_recv_common_ctl; 286 pingv6_ops.ip6_datagram_recv_specific_ctl = 287 ip6_datagram_recv_specific_ctl; 288 pingv6_ops.icmpv6_err_convert = icmpv6_err_convert; 289 pingv6_ops.ipv6_icmp_error = ipv6_icmp_error; 290 pingv6_ops.ipv6_chk_addr = ipv6_chk_addr; 291 return inet6_register_protosw(&pingv6_protosw); 292 } 293 294 /* This never gets called because it's not possible to unload the ipv6 module, 295 * but just in case. 296 */ 297 void pingv6_exit(void) 298 { 299 pingv6_ops.ipv6_recv_error = dummy_ipv6_recv_error; 300 pingv6_ops.ip6_datagram_recv_common_ctl = dummy_ip6_datagram_recv_ctl; 301 pingv6_ops.ip6_datagram_recv_specific_ctl = dummy_ip6_datagram_recv_ctl; 302 pingv6_ops.icmpv6_err_convert = dummy_icmpv6_err_convert; 303 pingv6_ops.ipv6_icmp_error = dummy_ipv6_icmp_error; 304 pingv6_ops.ipv6_chk_addr = dummy_ipv6_chk_addr; 305 #ifdef CONFIG_PROC_FS 306 unregister_pernet_subsys(&ping_v6_net_ops); 307 #endif 308 inet6_unregister_protosw(&pingv6_protosw); 309 } 310