ip_sockglue.c 43 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832
  1. // SPDX-License-Identifier: GPL-2.0
  2. /*
  3. * INET An implementation of the TCP/IP protocol suite for the LINUX
  4. * operating system. INET is implemented using the BSD Socket
  5. * interface as the means of communication with the user level.
  6. *
  7. * The IP to API glue.
  8. *
  9. * Authors: see ip.c
  10. *
  11. * Fixes:
  12. * Many : Split from ip.c , see ip.c for history.
  13. * Martin Mares : TOS setting fixed.
  14. * Alan Cox : Fixed a couple of oopses in Martin's
  15. * TOS tweaks.
  16. * Mike McLagan : Routing by source
  17. */
  18. #include <linux/module.h>
  19. #include <linux/types.h>
  20. #include <linux/mm.h>
  21. #include <linux/skbuff.h>
  22. #include <linux/ip.h>
  23. #include <linux/icmp.h>
  24. #include <linux/inetdevice.h>
  25. #include <linux/netdevice.h>
  26. #include <linux/slab.h>
  27. #include <net/sock.h>
  28. #include <net/ip.h>
  29. #include <net/icmp.h>
  30. #include <net/tcp_states.h>
  31. #include <linux/udp.h>
  32. #include <linux/igmp.h>
  33. #include <linux/netfilter.h>
  34. #include <linux/route.h>
  35. #include <linux/mroute.h>
  36. #include <net/inet_ecn.h>
  37. #include <net/route.h>
  38. #include <net/xfrm.h>
  39. #include <net/compat.h>
  40. #include <net/checksum.h>
  41. #if IS_ENABLED(CONFIG_IPV6)
  42. #include <net/transp_v6.h>
  43. #endif
  44. #include <net/ip_fib.h>
  45. #include <linux/errqueue.h>
  46. #include <linux/uaccess.h>
  47. #include <linux/bpfilter.h>
  48. /*
  49. * SOL_IP control messages.
  50. */
  51. static void ip_cmsg_recv_pktinfo(struct msghdr *msg, struct sk_buff *skb)
  52. {
  53. struct in_pktinfo info = *PKTINFO_SKB_CB(skb);
  54. info.ipi_addr.s_addr = ip_hdr(skb)->daddr;
  55. put_cmsg(msg, SOL_IP, IP_PKTINFO, sizeof(info), &info);
  56. }
  57. static void ip_cmsg_recv_ttl(struct msghdr *msg, struct sk_buff *skb)
  58. {
  59. int ttl = ip_hdr(skb)->ttl;
  60. put_cmsg(msg, SOL_IP, IP_TTL, sizeof(int), &ttl);
  61. }
  62. static void ip_cmsg_recv_tos(struct msghdr *msg, struct sk_buff *skb)
  63. {
  64. put_cmsg(msg, SOL_IP, IP_TOS, 1, &ip_hdr(skb)->tos);
  65. }
  66. static void ip_cmsg_recv_opts(struct msghdr *msg, struct sk_buff *skb)
  67. {
  68. if (IPCB(skb)->opt.optlen == 0)
  69. return;
  70. put_cmsg(msg, SOL_IP, IP_RECVOPTS, IPCB(skb)->opt.optlen,
  71. ip_hdr(skb) + 1);
  72. }
  73. static void ip_cmsg_recv_retopts(struct net *net, struct msghdr *msg,
  74. struct sk_buff *skb)
  75. {
  76. unsigned char optbuf[sizeof(struct ip_options) + 40];
  77. struct ip_options *opt = (struct ip_options *)optbuf;
  78. if (IPCB(skb)->opt.optlen == 0)
  79. return;
  80. if (ip_options_echo(net, opt, skb)) {
  81. msg->msg_flags |= MSG_CTRUNC;
  82. return;
  83. }
  84. ip_options_undo(opt);
  85. put_cmsg(msg, SOL_IP, IP_RETOPTS, opt->optlen, opt->__data);
  86. }
  87. static void ip_cmsg_recv_fragsize(struct msghdr *msg, struct sk_buff *skb)
  88. {
  89. int val;
  90. if (IPCB(skb)->frag_max_size == 0)
  91. return;
  92. val = IPCB(skb)->frag_max_size;
  93. put_cmsg(msg, SOL_IP, IP_RECVFRAGSIZE, sizeof(val), &val);
  94. }
  95. static void ip_cmsg_recv_checksum(struct msghdr *msg, struct sk_buff *skb,
  96. int tlen, int offset)
  97. {
  98. __wsum csum = skb->csum;
  99. if (skb->ip_summed != CHECKSUM_COMPLETE)
  100. return;
  101. if (offset != 0) {
  102. int tend_off = skb_transport_offset(skb) + tlen;
  103. csum = csum_sub(csum, skb_checksum(skb, tend_off, offset, 0));
  104. }
  105. put_cmsg(msg, SOL_IP, IP_CHECKSUM, sizeof(__wsum), &csum);
  106. }
  107. static void ip_cmsg_recv_security(struct msghdr *msg, struct sk_buff *skb)
  108. {
  109. char *secdata;
  110. u32 seclen, secid;
  111. int err;
  112. err = security_socket_getpeersec_dgram(NULL, skb, &secid);
  113. if (err)
  114. return;
  115. err = security_secid_to_secctx(secid, &secdata, &seclen);
  116. if (err)
  117. return;
  118. put_cmsg(msg, SOL_IP, SCM_SECURITY, seclen, secdata);
  119. security_release_secctx(secdata, seclen);
  120. }
  121. static void ip_cmsg_recv_dstaddr(struct msghdr *msg, struct sk_buff *skb)
  122. {
  123. __be16 _ports[2], *ports;
  124. struct sockaddr_in sin;
  125. /* All current transport protocols have the port numbers in the
  126. * first four bytes of the transport header and this function is
  127. * written with this assumption in mind.
  128. */
  129. ports = skb_header_pointer(skb, skb_transport_offset(skb),
  130. sizeof(_ports), &_ports);
  131. if (!ports)
  132. return;
  133. sin.sin_family = AF_INET;
  134. sin.sin_addr.s_addr = ip_hdr(skb)->daddr;
  135. sin.sin_port = ports[1];
  136. memset(sin.sin_zero, 0, sizeof(sin.sin_zero));
  137. put_cmsg(msg, SOL_IP, IP_ORIGDSTADDR, sizeof(sin), &sin);
  138. }
  139. void ip_cmsg_recv_offset(struct msghdr *msg, struct sock *sk,
  140. struct sk_buff *skb, int tlen, int offset)
  141. {
  142. struct inet_sock *inet = inet_sk(sk);
  143. unsigned int flags = inet->cmsg_flags;
  144. /* Ordered by supposed usage frequency */
  145. if (flags & IP_CMSG_PKTINFO) {
  146. ip_cmsg_recv_pktinfo(msg, skb);
  147. flags &= ~IP_CMSG_PKTINFO;
  148. if (!flags)
  149. return;
  150. }
  151. if (flags & IP_CMSG_TTL) {
  152. ip_cmsg_recv_ttl(msg, skb);
  153. flags &= ~IP_CMSG_TTL;
  154. if (!flags)
  155. return;
  156. }
  157. if (flags & IP_CMSG_TOS) {
  158. ip_cmsg_recv_tos(msg, skb);
  159. flags &= ~IP_CMSG_TOS;
  160. if (!flags)
  161. return;
  162. }
  163. if (flags & IP_CMSG_RECVOPTS) {
  164. ip_cmsg_recv_opts(msg, skb);
  165. flags &= ~IP_CMSG_RECVOPTS;
  166. if (!flags)
  167. return;
  168. }
  169. if (flags & IP_CMSG_RETOPTS) {
  170. ip_cmsg_recv_retopts(sock_net(sk), msg, skb);
  171. flags &= ~IP_CMSG_RETOPTS;
  172. if (!flags)
  173. return;
  174. }
  175. if (flags & IP_CMSG_PASSSEC) {
  176. ip_cmsg_recv_security(msg, skb);
  177. flags &= ~IP_CMSG_PASSSEC;
  178. if (!flags)
  179. return;
  180. }
  181. if (flags & IP_CMSG_ORIGDSTADDR) {
  182. ip_cmsg_recv_dstaddr(msg, skb);
  183. flags &= ~IP_CMSG_ORIGDSTADDR;
  184. if (!flags)
  185. return;
  186. }
  187. if (flags & IP_CMSG_CHECKSUM)
  188. ip_cmsg_recv_checksum(msg, skb, tlen, offset);
  189. if (flags & IP_CMSG_RECVFRAGSIZE)
  190. ip_cmsg_recv_fragsize(msg, skb);
  191. }
  192. EXPORT_SYMBOL(ip_cmsg_recv_offset);
  193. int ip_cmsg_send(struct sock *sk, struct msghdr *msg, struct ipcm_cookie *ipc,
  194. bool allow_ipv6)
  195. {
  196. int err, val;
  197. struct cmsghdr *cmsg;
  198. struct net *net = sock_net(sk);
  199. for_each_cmsghdr(cmsg, msg) {
  200. if (!CMSG_OK(msg, cmsg))
  201. return -EINVAL;
  202. #if IS_ENABLED(CONFIG_IPV6)
  203. if (allow_ipv6 &&
  204. cmsg->cmsg_level == SOL_IPV6 &&
  205. cmsg->cmsg_type == IPV6_PKTINFO) {
  206. struct in6_pktinfo *src_info;
  207. if (cmsg->cmsg_len < CMSG_LEN(sizeof(*src_info)))
  208. return -EINVAL;
  209. src_info = (struct in6_pktinfo *)CMSG_DATA(cmsg);
  210. if (!ipv6_addr_v4mapped(&src_info->ipi6_addr))
  211. return -EINVAL;
  212. if (src_info->ipi6_ifindex)
  213. ipc->oif = src_info->ipi6_ifindex;
  214. ipc->addr = src_info->ipi6_addr.s6_addr32[3];
  215. continue;
  216. }
  217. #endif
  218. if (cmsg->cmsg_level == SOL_SOCKET) {
  219. err = __sock_cmsg_send(sk, msg, cmsg, &ipc->sockc);
  220. if (err)
  221. return err;
  222. continue;
  223. }
  224. if (cmsg->cmsg_level != SOL_IP)
  225. continue;
  226. switch (cmsg->cmsg_type) {
  227. case IP_RETOPTS:
  228. err = cmsg->cmsg_len - sizeof(struct cmsghdr);
  229. /* Our caller is responsible for freeing ipc->opt */
  230. err = ip_options_get(net, &ipc->opt,
  231. KERNEL_SOCKPTR(CMSG_DATA(cmsg)),
  232. err < 40 ? err : 40);
  233. if (err)
  234. return err;
  235. break;
  236. case IP_PKTINFO:
  237. {
  238. struct in_pktinfo *info;
  239. if (cmsg->cmsg_len != CMSG_LEN(sizeof(struct in_pktinfo)))
  240. return -EINVAL;
  241. info = (struct in_pktinfo *)CMSG_DATA(cmsg);
  242. if (info->ipi_ifindex)
  243. ipc->oif = info->ipi_ifindex;
  244. ipc->addr = info->ipi_spec_dst.s_addr;
  245. break;
  246. }
  247. case IP_TTL:
  248. if (cmsg->cmsg_len != CMSG_LEN(sizeof(int)))
  249. return -EINVAL;
  250. val = *(int *)CMSG_DATA(cmsg);
  251. if (val < 1 || val > 255)
  252. return -EINVAL;
  253. ipc->ttl = val;
  254. break;
  255. case IP_TOS:
  256. if (cmsg->cmsg_len == CMSG_LEN(sizeof(int)))
  257. val = *(int *)CMSG_DATA(cmsg);
  258. else if (cmsg->cmsg_len == CMSG_LEN(sizeof(u8)))
  259. val = *(u8 *)CMSG_DATA(cmsg);
  260. else
  261. return -EINVAL;
  262. if (val < 0 || val > 255)
  263. return -EINVAL;
  264. ipc->tos = val;
  265. ipc->priority = rt_tos2priority(ipc->tos);
  266. break;
  267. case IP_PROTOCOL:
  268. if (cmsg->cmsg_len != CMSG_LEN(sizeof(int)))
  269. return -EINVAL;
  270. val = *(int *)CMSG_DATA(cmsg);
  271. if (val < 1 || val > 255)
  272. return -EINVAL;
  273. ipc->protocol = val;
  274. break;
  275. default:
  276. return -EINVAL;
  277. }
  278. }
  279. return 0;
  280. }
  281. static void ip_ra_destroy_rcu(struct rcu_head *head)
  282. {
  283. struct ip_ra_chain *ra = container_of(head, struct ip_ra_chain, rcu);
  284. sock_put(ra->saved_sk);
  285. kfree(ra);
  286. }
  287. int ip_ra_control(struct sock *sk, unsigned char on,
  288. void (*destructor)(struct sock *))
  289. {
  290. struct ip_ra_chain *ra, *new_ra;
  291. struct ip_ra_chain __rcu **rap;
  292. struct net *net = sock_net(sk);
  293. if (sk->sk_type != SOCK_RAW || inet_sk(sk)->inet_num == IPPROTO_RAW)
  294. return -EINVAL;
  295. new_ra = on ? kmalloc(sizeof(*new_ra), GFP_KERNEL) : NULL;
  296. if (on && !new_ra)
  297. return -ENOMEM;
  298. mutex_lock(&net->ipv4.ra_mutex);
  299. for (rap = &net->ipv4.ra_chain;
  300. (ra = rcu_dereference_protected(*rap,
  301. lockdep_is_held(&net->ipv4.ra_mutex))) != NULL;
  302. rap = &ra->next) {
  303. if (ra->sk == sk) {
  304. if (on) {
  305. mutex_unlock(&net->ipv4.ra_mutex);
  306. kfree(new_ra);
  307. return -EADDRINUSE;
  308. }
  309. /* dont let ip_call_ra_chain() use sk again */
  310. ra->sk = NULL;
  311. RCU_INIT_POINTER(*rap, ra->next);
  312. mutex_unlock(&net->ipv4.ra_mutex);
  313. if (ra->destructor)
  314. ra->destructor(sk);
  315. /*
  316. * Delay sock_put(sk) and kfree(ra) after one rcu grace
  317. * period. This guarantee ip_call_ra_chain() dont need
  318. * to mess with socket refcounts.
  319. */
  320. ra->saved_sk = sk;
  321. call_rcu(&ra->rcu, ip_ra_destroy_rcu);
  322. return 0;
  323. }
  324. }
  325. if (!new_ra) {
  326. mutex_unlock(&net->ipv4.ra_mutex);
  327. return -ENOBUFS;
  328. }
  329. new_ra->sk = sk;
  330. new_ra->destructor = destructor;
  331. RCU_INIT_POINTER(new_ra->next, ra);
  332. rcu_assign_pointer(*rap, new_ra);
  333. sock_hold(sk);
  334. mutex_unlock(&net->ipv4.ra_mutex);
  335. return 0;
  336. }
  337. static void ipv4_icmp_error_rfc4884(const struct sk_buff *skb,
  338. struct sock_ee_data_rfc4884 *out)
  339. {
  340. switch (icmp_hdr(skb)->type) {
  341. case ICMP_DEST_UNREACH:
  342. case ICMP_TIME_EXCEEDED:
  343. case ICMP_PARAMETERPROB:
  344. ip_icmp_error_rfc4884(skb, out, sizeof(struct icmphdr),
  345. icmp_hdr(skb)->un.reserved[1] * 4);
  346. }
  347. }
  348. void ip_icmp_error(struct sock *sk, struct sk_buff *skb, int err,
  349. __be16 port, u32 info, u8 *payload)
  350. {
  351. struct sock_exterr_skb *serr;
  352. skb = skb_clone(skb, GFP_ATOMIC);
  353. if (!skb)
  354. return;
  355. serr = SKB_EXT_ERR(skb);
  356. serr->ee.ee_errno = err;
  357. serr->ee.ee_origin = SO_EE_ORIGIN_ICMP;
  358. serr->ee.ee_type = icmp_hdr(skb)->type;
  359. serr->ee.ee_code = icmp_hdr(skb)->code;
  360. serr->ee.ee_pad = 0;
  361. serr->ee.ee_info = info;
  362. serr->ee.ee_data = 0;
  363. serr->addr_offset = (u8 *)&(((struct iphdr *)(icmp_hdr(skb) + 1))->daddr) -
  364. skb_network_header(skb);
  365. serr->port = port;
  366. if (skb_pull(skb, payload - skb->data)) {
  367. if (inet_sk(sk)->recverr_rfc4884)
  368. ipv4_icmp_error_rfc4884(skb, &serr->ee.ee_rfc4884);
  369. skb_reset_transport_header(skb);
  370. if (sock_queue_err_skb(sk, skb) == 0)
  371. return;
  372. }
  373. kfree_skb(skb);
  374. }
  375. void ip_local_error(struct sock *sk, int err, __be32 daddr, __be16 port, u32 info)
  376. {
  377. struct inet_sock *inet = inet_sk(sk);
  378. struct sock_exterr_skb *serr;
  379. struct iphdr *iph;
  380. struct sk_buff *skb;
  381. if (!inet->recverr)
  382. return;
  383. skb = alloc_skb(sizeof(struct iphdr), GFP_ATOMIC);
  384. if (!skb)
  385. return;
  386. skb_put(skb, sizeof(struct iphdr));
  387. skb_reset_network_header(skb);
  388. iph = ip_hdr(skb);
  389. iph->daddr = daddr;
  390. serr = SKB_EXT_ERR(skb);
  391. serr->ee.ee_errno = err;
  392. serr->ee.ee_origin = SO_EE_ORIGIN_LOCAL;
  393. serr->ee.ee_type = 0;
  394. serr->ee.ee_code = 0;
  395. serr->ee.ee_pad = 0;
  396. serr->ee.ee_info = info;
  397. serr->ee.ee_data = 0;
  398. serr->addr_offset = (u8 *)&iph->daddr - skb_network_header(skb);
  399. serr->port = port;
  400. __skb_pull(skb, skb_tail_pointer(skb) - skb->data);
  401. skb_reset_transport_header(skb);
  402. if (sock_queue_err_skb(sk, skb))
  403. kfree_skb(skb);
  404. }
  405. /* For some errors we have valid addr_offset even with zero payload and
  406. * zero port. Also, addr_offset should be supported if port is set.
  407. */
  408. static inline bool ipv4_datagram_support_addr(struct sock_exterr_skb *serr)
  409. {
  410. return serr->ee.ee_origin == SO_EE_ORIGIN_ICMP ||
  411. serr->ee.ee_origin == SO_EE_ORIGIN_LOCAL || serr->port;
  412. }
  413. /* IPv4 supports cmsg on all imcp errors and some timestamps
  414. *
  415. * Timestamp code paths do not initialize the fields expected by cmsg:
  416. * the PKTINFO fields in skb->cb[]. Fill those in here.
  417. */
  418. static bool ipv4_datagram_support_cmsg(const struct sock *sk,
  419. struct sk_buff *skb,
  420. int ee_origin)
  421. {
  422. struct in_pktinfo *info;
  423. if (ee_origin == SO_EE_ORIGIN_ICMP)
  424. return true;
  425. if (ee_origin == SO_EE_ORIGIN_LOCAL)
  426. return false;
  427. /* Support IP_PKTINFO on tstamp packets if requested, to correlate
  428. * timestamp with egress dev. Not possible for packets without iif
  429. * or without payload (SOF_TIMESTAMPING_OPT_TSONLY).
  430. */
  431. info = PKTINFO_SKB_CB(skb);
  432. if (!(sk->sk_tsflags & SOF_TIMESTAMPING_OPT_CMSG) ||
  433. !info->ipi_ifindex)
  434. return false;
  435. info->ipi_spec_dst.s_addr = ip_hdr(skb)->saddr;
  436. return true;
  437. }
  438. /*
  439. * Handle MSG_ERRQUEUE
  440. */
  441. int ip_recv_error(struct sock *sk, struct msghdr *msg, int len, int *addr_len)
  442. {
  443. struct sock_exterr_skb *serr;
  444. struct sk_buff *skb;
  445. DECLARE_SOCKADDR(struct sockaddr_in *, sin, msg->msg_name);
  446. struct {
  447. struct sock_extended_err ee;
  448. struct sockaddr_in offender;
  449. } errhdr;
  450. int err;
  451. int copied;
  452. err = -EAGAIN;
  453. skb = sock_dequeue_err_skb(sk);
  454. if (!skb)
  455. goto out;
  456. copied = skb->len;
  457. if (copied > len) {
  458. msg->msg_flags |= MSG_TRUNC;
  459. copied = len;
  460. }
  461. err = skb_copy_datagram_msg(skb, 0, msg, copied);
  462. if (unlikely(err)) {
  463. kfree_skb(skb);
  464. return err;
  465. }
  466. sock_recv_timestamp(msg, sk, skb);
  467. serr = SKB_EXT_ERR(skb);
  468. if (sin && ipv4_datagram_support_addr(serr)) {
  469. sin->sin_family = AF_INET;
  470. sin->sin_addr.s_addr = *(__be32 *)(skb_network_header(skb) +
  471. serr->addr_offset);
  472. sin->sin_port = serr->port;
  473. memset(&sin->sin_zero, 0, sizeof(sin->sin_zero));
  474. *addr_len = sizeof(*sin);
  475. }
  476. memcpy(&errhdr.ee, &serr->ee, sizeof(struct sock_extended_err));
  477. sin = &errhdr.offender;
  478. memset(sin, 0, sizeof(*sin));
  479. if (ipv4_datagram_support_cmsg(sk, skb, serr->ee.ee_origin)) {
  480. sin->sin_family = AF_INET;
  481. sin->sin_addr.s_addr = ip_hdr(skb)->saddr;
  482. if (inet_sk(sk)->cmsg_flags)
  483. ip_cmsg_recv(msg, skb);
  484. }
  485. put_cmsg(msg, SOL_IP, IP_RECVERR, sizeof(errhdr), &errhdr);
  486. /* Now we could try to dump offended packet options */
  487. msg->msg_flags |= MSG_ERRQUEUE;
  488. err = copied;
  489. consume_skb(skb);
  490. out:
  491. return err;
  492. }
  493. void __ip_sock_set_tos(struct sock *sk, int val)
  494. {
  495. if (sk->sk_type == SOCK_STREAM) {
  496. val &= ~INET_ECN_MASK;
  497. val |= inet_sk(sk)->tos & INET_ECN_MASK;
  498. }
  499. if (inet_sk(sk)->tos != val) {
  500. inet_sk(sk)->tos = val;
  501. WRITE_ONCE(sk->sk_priority, rt_tos2priority(val));
  502. sk_dst_reset(sk);
  503. }
  504. }
  505. void ip_sock_set_tos(struct sock *sk, int val)
  506. {
  507. lock_sock(sk);
  508. __ip_sock_set_tos(sk, val);
  509. release_sock(sk);
  510. }
  511. EXPORT_SYMBOL(ip_sock_set_tos);
  512. void ip_sock_set_freebind(struct sock *sk)
  513. {
  514. lock_sock(sk);
  515. inet_sk(sk)->freebind = true;
  516. release_sock(sk);
  517. }
  518. EXPORT_SYMBOL(ip_sock_set_freebind);
  519. void ip_sock_set_recverr(struct sock *sk)
  520. {
  521. lock_sock(sk);
  522. inet_sk(sk)->recverr = true;
  523. release_sock(sk);
  524. }
  525. EXPORT_SYMBOL(ip_sock_set_recverr);
  526. int ip_sock_set_mtu_discover(struct sock *sk, int val)
  527. {
  528. if (val < IP_PMTUDISC_DONT || val > IP_PMTUDISC_OMIT)
  529. return -EINVAL;
  530. lock_sock(sk);
  531. inet_sk(sk)->pmtudisc = val;
  532. release_sock(sk);
  533. return 0;
  534. }
  535. EXPORT_SYMBOL(ip_sock_set_mtu_discover);
  536. void ip_sock_set_pktinfo(struct sock *sk)
  537. {
  538. lock_sock(sk);
  539. inet_sk(sk)->cmsg_flags |= IP_CMSG_PKTINFO;
  540. release_sock(sk);
  541. }
  542. EXPORT_SYMBOL(ip_sock_set_pktinfo);
  543. /*
  544. * Socket option code for IP. This is the end of the line after any
  545. * TCP,UDP etc options on an IP socket.
  546. */
  547. static bool setsockopt_needs_rtnl(int optname)
  548. {
  549. switch (optname) {
  550. case IP_ADD_MEMBERSHIP:
  551. case IP_ADD_SOURCE_MEMBERSHIP:
  552. case IP_BLOCK_SOURCE:
  553. case IP_DROP_MEMBERSHIP:
  554. case IP_DROP_SOURCE_MEMBERSHIP:
  555. case IP_MSFILTER:
  556. case IP_UNBLOCK_SOURCE:
  557. case MCAST_BLOCK_SOURCE:
  558. case MCAST_MSFILTER:
  559. case MCAST_JOIN_GROUP:
  560. case MCAST_JOIN_SOURCE_GROUP:
  561. case MCAST_LEAVE_GROUP:
  562. case MCAST_LEAVE_SOURCE_GROUP:
  563. case MCAST_UNBLOCK_SOURCE:
  564. return true;
  565. }
  566. return false;
  567. }
  568. static int set_mcast_msfilter(struct sock *sk, int ifindex,
  569. int numsrc, int fmode,
  570. struct sockaddr_storage *group,
  571. struct sockaddr_storage *list)
  572. {
  573. struct ip_msfilter *msf;
  574. struct sockaddr_in *psin;
  575. int err, i;
  576. msf = kmalloc(IP_MSFILTER_SIZE(numsrc), GFP_KERNEL);
  577. if (!msf)
  578. return -ENOBUFS;
  579. psin = (struct sockaddr_in *)group;
  580. if (psin->sin_family != AF_INET)
  581. goto Eaddrnotavail;
  582. msf->imsf_multiaddr = psin->sin_addr.s_addr;
  583. msf->imsf_interface = 0;
  584. msf->imsf_fmode = fmode;
  585. msf->imsf_numsrc = numsrc;
  586. for (i = 0; i < numsrc; ++i) {
  587. psin = (struct sockaddr_in *)&list[i];
  588. if (psin->sin_family != AF_INET)
  589. goto Eaddrnotavail;
  590. msf->imsf_slist_flex[i] = psin->sin_addr.s_addr;
  591. }
  592. err = ip_mc_msfilter(sk, msf, ifindex);
  593. kfree(msf);
  594. return err;
  595. Eaddrnotavail:
  596. kfree(msf);
  597. return -EADDRNOTAVAIL;
  598. }
  599. static int copy_group_source_from_sockptr(struct group_source_req *greqs,
  600. sockptr_t optval, int optlen)
  601. {
  602. if (in_compat_syscall()) {
  603. struct compat_group_source_req gr32;
  604. if (optlen != sizeof(gr32))
  605. return -EINVAL;
  606. if (copy_from_sockptr(&gr32, optval, sizeof(gr32)))
  607. return -EFAULT;
  608. greqs->gsr_interface = gr32.gsr_interface;
  609. greqs->gsr_group = gr32.gsr_group;
  610. greqs->gsr_source = gr32.gsr_source;
  611. } else {
  612. if (optlen != sizeof(*greqs))
  613. return -EINVAL;
  614. if (copy_from_sockptr(greqs, optval, sizeof(*greqs)))
  615. return -EFAULT;
  616. }
  617. return 0;
  618. }
  619. static int do_mcast_group_source(struct sock *sk, int optname,
  620. sockptr_t optval, int optlen)
  621. {
  622. struct group_source_req greqs;
  623. struct ip_mreq_source mreqs;
  624. struct sockaddr_in *psin;
  625. int omode, add, err;
  626. err = copy_group_source_from_sockptr(&greqs, optval, optlen);
  627. if (err)
  628. return err;
  629. if (greqs.gsr_group.ss_family != AF_INET ||
  630. greqs.gsr_source.ss_family != AF_INET)
  631. return -EADDRNOTAVAIL;
  632. psin = (struct sockaddr_in *)&greqs.gsr_group;
  633. mreqs.imr_multiaddr = psin->sin_addr.s_addr;
  634. psin = (struct sockaddr_in *)&greqs.gsr_source;
  635. mreqs.imr_sourceaddr = psin->sin_addr.s_addr;
  636. mreqs.imr_interface = 0; /* use index for mc_source */
  637. if (optname == MCAST_BLOCK_SOURCE) {
  638. omode = MCAST_EXCLUDE;
  639. add = 1;
  640. } else if (optname == MCAST_UNBLOCK_SOURCE) {
  641. omode = MCAST_EXCLUDE;
  642. add = 0;
  643. } else if (optname == MCAST_JOIN_SOURCE_GROUP) {
  644. struct ip_mreqn mreq;
  645. psin = (struct sockaddr_in *)&greqs.gsr_group;
  646. mreq.imr_multiaddr = psin->sin_addr;
  647. mreq.imr_address.s_addr = 0;
  648. mreq.imr_ifindex = greqs.gsr_interface;
  649. err = ip_mc_join_group_ssm(sk, &mreq, MCAST_INCLUDE);
  650. if (err && err != -EADDRINUSE)
  651. return err;
  652. greqs.gsr_interface = mreq.imr_ifindex;
  653. omode = MCAST_INCLUDE;
  654. add = 1;
  655. } else /* MCAST_LEAVE_SOURCE_GROUP */ {
  656. omode = MCAST_INCLUDE;
  657. add = 0;
  658. }
  659. return ip_mc_source(add, omode, sk, &mreqs, greqs.gsr_interface);
  660. }
  661. static int ip_set_mcast_msfilter(struct sock *sk, sockptr_t optval, int optlen)
  662. {
  663. struct group_filter *gsf = NULL;
  664. int err;
  665. if (optlen < GROUP_FILTER_SIZE(0))
  666. return -EINVAL;
  667. if (optlen > READ_ONCE(sysctl_optmem_max))
  668. return -ENOBUFS;
  669. gsf = memdup_sockptr(optval, optlen);
  670. if (IS_ERR(gsf))
  671. return PTR_ERR(gsf);
  672. /* numsrc >= (4G-140)/128 overflow in 32 bits */
  673. err = -ENOBUFS;
  674. if (gsf->gf_numsrc >= 0x1ffffff ||
  675. gsf->gf_numsrc > READ_ONCE(sock_net(sk)->ipv4.sysctl_igmp_max_msf))
  676. goto out_free_gsf;
  677. err = -EINVAL;
  678. if (GROUP_FILTER_SIZE(gsf->gf_numsrc) > optlen)
  679. goto out_free_gsf;
  680. err = set_mcast_msfilter(sk, gsf->gf_interface, gsf->gf_numsrc,
  681. gsf->gf_fmode, &gsf->gf_group,
  682. gsf->gf_slist_flex);
  683. out_free_gsf:
  684. kfree(gsf);
  685. return err;
  686. }
  687. static int compat_ip_set_mcast_msfilter(struct sock *sk, sockptr_t optval,
  688. int optlen)
  689. {
  690. const int size0 = offsetof(struct compat_group_filter, gf_slist_flex);
  691. struct compat_group_filter *gf32;
  692. unsigned int n;
  693. void *p;
  694. int err;
  695. if (optlen < size0)
  696. return -EINVAL;
  697. if (optlen > READ_ONCE(sysctl_optmem_max) - 4)
  698. return -ENOBUFS;
  699. p = kmalloc(optlen + 4, GFP_KERNEL);
  700. if (!p)
  701. return -ENOMEM;
  702. gf32 = p + 4; /* we want ->gf_group and ->gf_slist_flex aligned */
  703. err = -EFAULT;
  704. if (copy_from_sockptr(gf32, optval, optlen))
  705. goto out_free_gsf;
  706. /* numsrc >= (4G-140)/128 overflow in 32 bits */
  707. n = gf32->gf_numsrc;
  708. err = -ENOBUFS;
  709. if (n >= 0x1ffffff)
  710. goto out_free_gsf;
  711. err = -EINVAL;
  712. if (offsetof(struct compat_group_filter, gf_slist_flex[n]) > optlen)
  713. goto out_free_gsf;
  714. /* numsrc >= (4G-140)/128 overflow in 32 bits */
  715. err = -ENOBUFS;
  716. if (n > READ_ONCE(sock_net(sk)->ipv4.sysctl_igmp_max_msf))
  717. goto out_free_gsf;
  718. err = set_mcast_msfilter(sk, gf32->gf_interface, n, gf32->gf_fmode,
  719. &gf32->gf_group, gf32->gf_slist_flex);
  720. out_free_gsf:
  721. kfree(p);
  722. return err;
  723. }
  724. static int ip_mcast_join_leave(struct sock *sk, int optname,
  725. sockptr_t optval, int optlen)
  726. {
  727. struct ip_mreqn mreq = { };
  728. struct sockaddr_in *psin;
  729. struct group_req greq;
  730. if (optlen < sizeof(struct group_req))
  731. return -EINVAL;
  732. if (copy_from_sockptr(&greq, optval, sizeof(greq)))
  733. return -EFAULT;
  734. psin = (struct sockaddr_in *)&greq.gr_group;
  735. if (psin->sin_family != AF_INET)
  736. return -EINVAL;
  737. mreq.imr_multiaddr = psin->sin_addr;
  738. mreq.imr_ifindex = greq.gr_interface;
  739. if (optname == MCAST_JOIN_GROUP)
  740. return ip_mc_join_group(sk, &mreq);
  741. return ip_mc_leave_group(sk, &mreq);
  742. }
  743. static int compat_ip_mcast_join_leave(struct sock *sk, int optname,
  744. sockptr_t optval, int optlen)
  745. {
  746. struct compat_group_req greq;
  747. struct ip_mreqn mreq = { };
  748. struct sockaddr_in *psin;
  749. if (optlen < sizeof(struct compat_group_req))
  750. return -EINVAL;
  751. if (copy_from_sockptr(&greq, optval, sizeof(greq)))
  752. return -EFAULT;
  753. psin = (struct sockaddr_in *)&greq.gr_group;
  754. if (psin->sin_family != AF_INET)
  755. return -EINVAL;
  756. mreq.imr_multiaddr = psin->sin_addr;
  757. mreq.imr_ifindex = greq.gr_interface;
  758. if (optname == MCAST_JOIN_GROUP)
  759. return ip_mc_join_group(sk, &mreq);
  760. return ip_mc_leave_group(sk, &mreq);
  761. }
  762. DEFINE_STATIC_KEY_FALSE(ip4_min_ttl);
  763. int do_ip_setsockopt(struct sock *sk, int level, int optname,
  764. sockptr_t optval, unsigned int optlen)
  765. {
  766. struct inet_sock *inet = inet_sk(sk);
  767. struct net *net = sock_net(sk);
  768. int val = 0, err;
  769. bool needs_rtnl = setsockopt_needs_rtnl(optname);
  770. switch (optname) {
  771. case IP_PKTINFO:
  772. case IP_RECVTTL:
  773. case IP_RECVOPTS:
  774. case IP_RECVTOS:
  775. case IP_RETOPTS:
  776. case IP_TOS:
  777. case IP_TTL:
  778. case IP_HDRINCL:
  779. case IP_MTU_DISCOVER:
  780. case IP_RECVERR:
  781. case IP_ROUTER_ALERT:
  782. case IP_FREEBIND:
  783. case IP_PASSSEC:
  784. case IP_TRANSPARENT:
  785. case IP_MINTTL:
  786. case IP_NODEFRAG:
  787. case IP_BIND_ADDRESS_NO_PORT:
  788. case IP_UNICAST_IF:
  789. case IP_MULTICAST_TTL:
  790. case IP_MULTICAST_ALL:
  791. case IP_MULTICAST_LOOP:
  792. case IP_RECVORIGDSTADDR:
  793. case IP_CHECKSUM:
  794. case IP_RECVFRAGSIZE:
  795. case IP_RECVERR_RFC4884:
  796. case IP_LOCAL_PORT_RANGE:
  797. if (optlen >= sizeof(int)) {
  798. if (copy_from_sockptr(&val, optval, sizeof(val)))
  799. return -EFAULT;
  800. } else if (optlen >= sizeof(char)) {
  801. unsigned char ucval;
  802. if (copy_from_sockptr(&ucval, optval, sizeof(ucval)))
  803. return -EFAULT;
  804. val = (int) ucval;
  805. }
  806. }
  807. /* If optlen==0, it is equivalent to val == 0 */
  808. if (optname == IP_ROUTER_ALERT)
  809. return ip_ra_control(sk, val ? 1 : 0, NULL);
  810. if (ip_mroute_opt(optname))
  811. return ip_mroute_setsockopt(sk, optname, optval, optlen);
  812. err = 0;
  813. if (needs_rtnl)
  814. rtnl_lock();
  815. sockopt_lock_sock(sk);
  816. switch (optname) {
  817. case IP_OPTIONS:
  818. {
  819. struct ip_options_rcu *old, *opt = NULL;
  820. if (optlen > 40)
  821. goto e_inval;
  822. err = ip_options_get(sock_net(sk), &opt, optval, optlen);
  823. if (err)
  824. break;
  825. old = rcu_dereference_protected(inet->inet_opt,
  826. lockdep_sock_is_held(sk));
  827. if (inet->is_icsk) {
  828. struct inet_connection_sock *icsk = inet_csk(sk);
  829. #if IS_ENABLED(CONFIG_IPV6)
  830. if (sk->sk_family == PF_INET ||
  831. (!((1 << sk->sk_state) &
  832. (TCPF_LISTEN | TCPF_CLOSE)) &&
  833. inet->inet_daddr != LOOPBACK4_IPV6)) {
  834. #endif
  835. if (old)
  836. icsk->icsk_ext_hdr_len -= old->opt.optlen;
  837. if (opt)
  838. icsk->icsk_ext_hdr_len += opt->opt.optlen;
  839. icsk->icsk_sync_mss(sk, icsk->icsk_pmtu_cookie);
  840. #if IS_ENABLED(CONFIG_IPV6)
  841. }
  842. #endif
  843. }
  844. rcu_assign_pointer(inet->inet_opt, opt);
  845. if (old)
  846. kfree_rcu(old, rcu);
  847. break;
  848. }
  849. case IP_PKTINFO:
  850. if (val)
  851. inet->cmsg_flags |= IP_CMSG_PKTINFO;
  852. else
  853. inet->cmsg_flags &= ~IP_CMSG_PKTINFO;
  854. break;
  855. case IP_RECVTTL:
  856. if (val)
  857. inet->cmsg_flags |= IP_CMSG_TTL;
  858. else
  859. inet->cmsg_flags &= ~IP_CMSG_TTL;
  860. break;
  861. case IP_RECVTOS:
  862. if (val)
  863. inet->cmsg_flags |= IP_CMSG_TOS;
  864. else
  865. inet->cmsg_flags &= ~IP_CMSG_TOS;
  866. break;
  867. case IP_RECVOPTS:
  868. if (val)
  869. inet->cmsg_flags |= IP_CMSG_RECVOPTS;
  870. else
  871. inet->cmsg_flags &= ~IP_CMSG_RECVOPTS;
  872. break;
  873. case IP_RETOPTS:
  874. if (val)
  875. inet->cmsg_flags |= IP_CMSG_RETOPTS;
  876. else
  877. inet->cmsg_flags &= ~IP_CMSG_RETOPTS;
  878. break;
  879. case IP_PASSSEC:
  880. if (val)
  881. inet->cmsg_flags |= IP_CMSG_PASSSEC;
  882. else
  883. inet->cmsg_flags &= ~IP_CMSG_PASSSEC;
  884. break;
  885. case IP_RECVORIGDSTADDR:
  886. if (val)
  887. inet->cmsg_flags |= IP_CMSG_ORIGDSTADDR;
  888. else
  889. inet->cmsg_flags &= ~IP_CMSG_ORIGDSTADDR;
  890. break;
  891. case IP_CHECKSUM:
  892. if (val) {
  893. if (!(inet->cmsg_flags & IP_CMSG_CHECKSUM)) {
  894. inet_inc_convert_csum(sk);
  895. inet->cmsg_flags |= IP_CMSG_CHECKSUM;
  896. }
  897. } else {
  898. if (inet->cmsg_flags & IP_CMSG_CHECKSUM) {
  899. inet_dec_convert_csum(sk);
  900. inet->cmsg_flags &= ~IP_CMSG_CHECKSUM;
  901. }
  902. }
  903. break;
  904. case IP_RECVFRAGSIZE:
  905. if (sk->sk_type != SOCK_RAW && sk->sk_type != SOCK_DGRAM)
  906. goto e_inval;
  907. if (val)
  908. inet->cmsg_flags |= IP_CMSG_RECVFRAGSIZE;
  909. else
  910. inet->cmsg_flags &= ~IP_CMSG_RECVFRAGSIZE;
  911. break;
  912. case IP_TOS: /* This sets both TOS and Precedence */
  913. __ip_sock_set_tos(sk, val);
  914. break;
  915. case IP_TTL:
  916. if (optlen < 1)
  917. goto e_inval;
  918. if (val != -1 && (val < 1 || val > 255))
  919. goto e_inval;
  920. inet->uc_ttl = val;
  921. break;
  922. case IP_HDRINCL:
  923. if (sk->sk_type != SOCK_RAW) {
  924. err = -ENOPROTOOPT;
  925. break;
  926. }
  927. inet->hdrincl = val ? 1 : 0;
  928. break;
  929. case IP_NODEFRAG:
  930. if (sk->sk_type != SOCK_RAW) {
  931. err = -ENOPROTOOPT;
  932. break;
  933. }
  934. inet->nodefrag = val ? 1 : 0;
  935. break;
  936. case IP_BIND_ADDRESS_NO_PORT:
  937. inet->bind_address_no_port = val ? 1 : 0;
  938. break;
  939. case IP_MTU_DISCOVER:
  940. if (val < IP_PMTUDISC_DONT || val > IP_PMTUDISC_OMIT)
  941. goto e_inval;
  942. inet->pmtudisc = val;
  943. break;
  944. case IP_RECVERR:
  945. inet->recverr = !!val;
  946. if (!val)
  947. skb_queue_purge(&sk->sk_error_queue);
  948. break;
  949. case IP_RECVERR_RFC4884:
  950. if (val < 0 || val > 1)
  951. goto e_inval;
  952. inet->recverr_rfc4884 = !!val;
  953. break;
  954. case IP_MULTICAST_TTL:
  955. if (sk->sk_type == SOCK_STREAM)
  956. goto e_inval;
  957. if (optlen < 1)
  958. goto e_inval;
  959. if (val == -1)
  960. val = 1;
  961. if (val < 0 || val > 255)
  962. goto e_inval;
  963. inet->mc_ttl = val;
  964. break;
  965. case IP_MULTICAST_LOOP:
  966. if (optlen < 1)
  967. goto e_inval;
  968. inet->mc_loop = !!val;
  969. break;
  970. case IP_UNICAST_IF:
  971. {
  972. struct net_device *dev = NULL;
  973. int ifindex;
  974. int midx;
  975. if (optlen != sizeof(int))
  976. goto e_inval;
  977. ifindex = (__force int)ntohl((__force __be32)val);
  978. if (ifindex == 0) {
  979. inet->uc_index = 0;
  980. err = 0;
  981. break;
  982. }
  983. dev = dev_get_by_index(sock_net(sk), ifindex);
  984. err = -EADDRNOTAVAIL;
  985. if (!dev)
  986. break;
  987. midx = l3mdev_master_ifindex(dev);
  988. dev_put(dev);
  989. err = -EINVAL;
  990. if (sk->sk_bound_dev_if && midx != sk->sk_bound_dev_if)
  991. break;
  992. inet->uc_index = ifindex;
  993. err = 0;
  994. break;
  995. }
  996. case IP_MULTICAST_IF:
  997. {
  998. struct ip_mreqn mreq;
  999. struct net_device *dev = NULL;
  1000. int midx;
  1001. if (sk->sk_type == SOCK_STREAM)
  1002. goto e_inval;
  1003. /*
  1004. * Check the arguments are allowable
  1005. */
  1006. if (optlen < sizeof(struct in_addr))
  1007. goto e_inval;
  1008. err = -EFAULT;
  1009. if (optlen >= sizeof(struct ip_mreqn)) {
  1010. if (copy_from_sockptr(&mreq, optval, sizeof(mreq)))
  1011. break;
  1012. } else {
  1013. memset(&mreq, 0, sizeof(mreq));
  1014. if (optlen >= sizeof(struct ip_mreq)) {
  1015. if (copy_from_sockptr(&mreq, optval,
  1016. sizeof(struct ip_mreq)))
  1017. break;
  1018. } else if (optlen >= sizeof(struct in_addr)) {
  1019. if (copy_from_sockptr(&mreq.imr_address, optval,
  1020. sizeof(struct in_addr)))
  1021. break;
  1022. }
  1023. }
  1024. if (!mreq.imr_ifindex) {
  1025. if (mreq.imr_address.s_addr == htonl(INADDR_ANY)) {
  1026. inet->mc_index = 0;
  1027. inet->mc_addr = 0;
  1028. err = 0;
  1029. break;
  1030. }
  1031. dev = ip_dev_find(sock_net(sk), mreq.imr_address.s_addr);
  1032. if (dev)
  1033. mreq.imr_ifindex = dev->ifindex;
  1034. } else
  1035. dev = dev_get_by_index(sock_net(sk), mreq.imr_ifindex);
  1036. err = -EADDRNOTAVAIL;
  1037. if (!dev)
  1038. break;
  1039. midx = l3mdev_master_ifindex(dev);
  1040. dev_put(dev);
  1041. err = -EINVAL;
  1042. if (sk->sk_bound_dev_if &&
  1043. mreq.imr_ifindex != sk->sk_bound_dev_if &&
  1044. midx != sk->sk_bound_dev_if)
  1045. break;
  1046. inet->mc_index = mreq.imr_ifindex;
  1047. inet->mc_addr = mreq.imr_address.s_addr;
  1048. err = 0;
  1049. break;
  1050. }
  1051. case IP_ADD_MEMBERSHIP:
  1052. case IP_DROP_MEMBERSHIP:
  1053. {
  1054. struct ip_mreqn mreq;
  1055. err = -EPROTO;
  1056. if (inet_sk(sk)->is_icsk)
  1057. break;
  1058. if (optlen < sizeof(struct ip_mreq))
  1059. goto e_inval;
  1060. err = -EFAULT;
  1061. if (optlen >= sizeof(struct ip_mreqn)) {
  1062. if (copy_from_sockptr(&mreq, optval, sizeof(mreq)))
  1063. break;
  1064. } else {
  1065. memset(&mreq, 0, sizeof(mreq));
  1066. if (copy_from_sockptr(&mreq, optval,
  1067. sizeof(struct ip_mreq)))
  1068. break;
  1069. }
  1070. if (optname == IP_ADD_MEMBERSHIP)
  1071. err = ip_mc_join_group(sk, &mreq);
  1072. else
  1073. err = ip_mc_leave_group(sk, &mreq);
  1074. break;
  1075. }
  1076. case IP_MSFILTER:
  1077. {
  1078. struct ip_msfilter *msf;
  1079. if (optlen < IP_MSFILTER_SIZE(0))
  1080. goto e_inval;
  1081. if (optlen > READ_ONCE(sysctl_optmem_max)) {
  1082. err = -ENOBUFS;
  1083. break;
  1084. }
  1085. msf = memdup_sockptr(optval, optlen);
  1086. if (IS_ERR(msf)) {
  1087. err = PTR_ERR(msf);
  1088. break;
  1089. }
  1090. /* numsrc >= (1G-4) overflow in 32 bits */
  1091. if (msf->imsf_numsrc >= 0x3ffffffcU ||
  1092. msf->imsf_numsrc > READ_ONCE(net->ipv4.sysctl_igmp_max_msf)) {
  1093. kfree(msf);
  1094. err = -ENOBUFS;
  1095. break;
  1096. }
  1097. if (IP_MSFILTER_SIZE(msf->imsf_numsrc) > optlen) {
  1098. kfree(msf);
  1099. err = -EINVAL;
  1100. break;
  1101. }
  1102. err = ip_mc_msfilter(sk, msf, 0);
  1103. kfree(msf);
  1104. break;
  1105. }
  1106. case IP_BLOCK_SOURCE:
  1107. case IP_UNBLOCK_SOURCE:
  1108. case IP_ADD_SOURCE_MEMBERSHIP:
  1109. case IP_DROP_SOURCE_MEMBERSHIP:
  1110. {
  1111. struct ip_mreq_source mreqs;
  1112. int omode, add;
  1113. if (optlen != sizeof(struct ip_mreq_source))
  1114. goto e_inval;
  1115. if (copy_from_sockptr(&mreqs, optval, sizeof(mreqs))) {
  1116. err = -EFAULT;
  1117. break;
  1118. }
  1119. if (optname == IP_BLOCK_SOURCE) {
  1120. omode = MCAST_EXCLUDE;
  1121. add = 1;
  1122. } else if (optname == IP_UNBLOCK_SOURCE) {
  1123. omode = MCAST_EXCLUDE;
  1124. add = 0;
  1125. } else if (optname == IP_ADD_SOURCE_MEMBERSHIP) {
  1126. struct ip_mreqn mreq;
  1127. mreq.imr_multiaddr.s_addr = mreqs.imr_multiaddr;
  1128. mreq.imr_address.s_addr = mreqs.imr_interface;
  1129. mreq.imr_ifindex = 0;
  1130. err = ip_mc_join_group_ssm(sk, &mreq, MCAST_INCLUDE);
  1131. if (err && err != -EADDRINUSE)
  1132. break;
  1133. omode = MCAST_INCLUDE;
  1134. add = 1;
  1135. } else /* IP_DROP_SOURCE_MEMBERSHIP */ {
  1136. omode = MCAST_INCLUDE;
  1137. add = 0;
  1138. }
  1139. err = ip_mc_source(add, omode, sk, &mreqs, 0);
  1140. break;
  1141. }
  1142. case MCAST_JOIN_GROUP:
  1143. case MCAST_LEAVE_GROUP:
  1144. if (in_compat_syscall())
  1145. err = compat_ip_mcast_join_leave(sk, optname, optval,
  1146. optlen);
  1147. else
  1148. err = ip_mcast_join_leave(sk, optname, optval, optlen);
  1149. break;
  1150. case MCAST_JOIN_SOURCE_GROUP:
  1151. case MCAST_LEAVE_SOURCE_GROUP:
  1152. case MCAST_BLOCK_SOURCE:
  1153. case MCAST_UNBLOCK_SOURCE:
  1154. err = do_mcast_group_source(sk, optname, optval, optlen);
  1155. break;
  1156. case MCAST_MSFILTER:
  1157. if (in_compat_syscall())
  1158. err = compat_ip_set_mcast_msfilter(sk, optval, optlen);
  1159. else
  1160. err = ip_set_mcast_msfilter(sk, optval, optlen);
  1161. break;
  1162. case IP_MULTICAST_ALL:
  1163. if (optlen < 1)
  1164. goto e_inval;
  1165. if (val != 0 && val != 1)
  1166. goto e_inval;
  1167. inet->mc_all = val;
  1168. break;
  1169. case IP_FREEBIND:
  1170. if (optlen < 1)
  1171. goto e_inval;
  1172. inet->freebind = !!val;
  1173. break;
  1174. case IP_IPSEC_POLICY:
  1175. case IP_XFRM_POLICY:
  1176. err = -EPERM;
  1177. if (!sockopt_ns_capable(sock_net(sk)->user_ns, CAP_NET_ADMIN))
  1178. break;
  1179. err = xfrm_user_policy(sk, optname, optval, optlen);
  1180. break;
  1181. case IP_TRANSPARENT:
  1182. if (!!val && !sockopt_ns_capable(sock_net(sk)->user_ns, CAP_NET_RAW) &&
  1183. !sockopt_ns_capable(sock_net(sk)->user_ns, CAP_NET_ADMIN)) {
  1184. err = -EPERM;
  1185. break;
  1186. }
  1187. if (optlen < 1)
  1188. goto e_inval;
  1189. inet->transparent = !!val;
  1190. break;
  1191. case IP_MINTTL:
  1192. if (optlen < 1)
  1193. goto e_inval;
  1194. if (val < 0 || val > 255)
  1195. goto e_inval;
  1196. if (val)
  1197. static_branch_enable(&ip4_min_ttl);
  1198. /* tcp_v4_err() and tcp_v4_rcv() might read min_ttl
  1199. * while we are changint it.
  1200. */
  1201. WRITE_ONCE(inet->min_ttl, val);
  1202. break;
  1203. case IP_LOCAL_PORT_RANGE:
  1204. {
  1205. const __u16 lo = val;
  1206. const __u16 hi = val >> 16;
  1207. if (optlen != sizeof(__u32))
  1208. goto e_inval;
  1209. if (lo != 0 && hi != 0 && lo > hi)
  1210. goto e_inval;
  1211. inet->local_port_range.lo = lo;
  1212. inet->local_port_range.hi = hi;
  1213. break;
  1214. }
  1215. default:
  1216. err = -ENOPROTOOPT;
  1217. break;
  1218. }
  1219. sockopt_release_sock(sk);
  1220. if (needs_rtnl)
  1221. rtnl_unlock();
  1222. return err;
  1223. e_inval:
  1224. sockopt_release_sock(sk);
  1225. if (needs_rtnl)
  1226. rtnl_unlock();
  1227. return -EINVAL;
  1228. }
  1229. /**
  1230. * ipv4_pktinfo_prepare - transfer some info from rtable to skb
  1231. * @sk: socket
  1232. * @skb: buffer
  1233. *
  1234. * To support IP_CMSG_PKTINFO option, we store rt_iif and specific
  1235. * destination in skb->cb[] before dst drop.
  1236. * This way, receiver doesn't make cache line misses to read rtable.
  1237. */
  1238. void ipv4_pktinfo_prepare(const struct sock *sk, struct sk_buff *skb)
  1239. {
  1240. struct in_pktinfo *pktinfo = PKTINFO_SKB_CB(skb);
  1241. bool prepare = (inet_sk(sk)->cmsg_flags & IP_CMSG_PKTINFO) ||
  1242. ipv6_sk_rxinfo(sk);
  1243. if (prepare && skb_rtable(skb)) {
  1244. /* skb->cb is overloaded: prior to this point it is IP{6}CB
  1245. * which has interface index (iif) as the first member of the
  1246. * underlying inet{6}_skb_parm struct. This code then overlays
  1247. * PKTINFO_SKB_CB and in_pktinfo also has iif as the first
  1248. * element so the iif is picked up from the prior IPCB. If iif
  1249. * is the loopback interface, then return the sending interface
  1250. * (e.g., process binds socket to eth0 for Tx which is
  1251. * redirected to loopback in the rtable/dst).
  1252. */
  1253. struct rtable *rt = skb_rtable(skb);
  1254. bool l3slave = ipv4_l3mdev_skb(IPCB(skb)->flags);
  1255. if (pktinfo->ipi_ifindex == LOOPBACK_IFINDEX)
  1256. pktinfo->ipi_ifindex = inet_iif(skb);
  1257. else if (l3slave && rt && rt->rt_iif)
  1258. pktinfo->ipi_ifindex = rt->rt_iif;
  1259. pktinfo->ipi_spec_dst.s_addr = fib_compute_spec_dst(skb);
  1260. } else {
  1261. pktinfo->ipi_ifindex = 0;
  1262. pktinfo->ipi_spec_dst.s_addr = 0;
  1263. }
  1264. skb_dst_drop(skb);
  1265. }
  1266. int ip_setsockopt(struct sock *sk, int level, int optname, sockptr_t optval,
  1267. unsigned int optlen)
  1268. {
  1269. int err;
  1270. if (level != SOL_IP)
  1271. return -ENOPROTOOPT;
  1272. err = do_ip_setsockopt(sk, level, optname, optval, optlen);
  1273. #if IS_ENABLED(CONFIG_BPFILTER_UMH)
  1274. if (optname >= BPFILTER_IPT_SO_SET_REPLACE &&
  1275. optname < BPFILTER_IPT_SET_MAX)
  1276. err = bpfilter_ip_set_sockopt(sk, optname, optval, optlen);
  1277. #endif
  1278. #ifdef CONFIG_NETFILTER
  1279. /* we need to exclude all possible ENOPROTOOPTs except default case */
  1280. if (err == -ENOPROTOOPT && optname != IP_HDRINCL &&
  1281. optname != IP_IPSEC_POLICY &&
  1282. optname != IP_XFRM_POLICY &&
  1283. !ip_mroute_opt(optname))
  1284. err = nf_setsockopt(sk, PF_INET, optname, optval, optlen);
  1285. #endif
  1286. return err;
  1287. }
  1288. EXPORT_SYMBOL(ip_setsockopt);
  1289. /*
  1290. * Get the options. Note for future reference. The GET of IP options gets
  1291. * the _received_ ones. The set sets the _sent_ ones.
  1292. */
  1293. static bool getsockopt_needs_rtnl(int optname)
  1294. {
  1295. switch (optname) {
  1296. case IP_MSFILTER:
  1297. case MCAST_MSFILTER:
  1298. return true;
  1299. }
  1300. return false;
  1301. }
  1302. static int ip_get_mcast_msfilter(struct sock *sk, sockptr_t optval,
  1303. sockptr_t optlen, int len)
  1304. {
  1305. const int size0 = offsetof(struct group_filter, gf_slist_flex);
  1306. struct group_filter gsf;
  1307. int num, gsf_size;
  1308. int err;
  1309. if (len < size0)
  1310. return -EINVAL;
  1311. if (copy_from_sockptr(&gsf, optval, size0))
  1312. return -EFAULT;
  1313. num = gsf.gf_numsrc;
  1314. err = ip_mc_gsfget(sk, &gsf, optval,
  1315. offsetof(struct group_filter, gf_slist_flex));
  1316. if (err)
  1317. return err;
  1318. if (gsf.gf_numsrc < num)
  1319. num = gsf.gf_numsrc;
  1320. gsf_size = GROUP_FILTER_SIZE(num);
  1321. if (copy_to_sockptr(optlen, &gsf_size, sizeof(int)) ||
  1322. copy_to_sockptr(optval, &gsf, size0))
  1323. return -EFAULT;
  1324. return 0;
  1325. }
  1326. static int compat_ip_get_mcast_msfilter(struct sock *sk, sockptr_t optval,
  1327. sockptr_t optlen, int len)
  1328. {
  1329. const int size0 = offsetof(struct compat_group_filter, gf_slist_flex);
  1330. struct compat_group_filter gf32;
  1331. struct group_filter gf;
  1332. int num;
  1333. int err;
  1334. if (len < size0)
  1335. return -EINVAL;
  1336. if (copy_from_sockptr(&gf32, optval, size0))
  1337. return -EFAULT;
  1338. gf.gf_interface = gf32.gf_interface;
  1339. gf.gf_fmode = gf32.gf_fmode;
  1340. num = gf.gf_numsrc = gf32.gf_numsrc;
  1341. gf.gf_group = gf32.gf_group;
  1342. err = ip_mc_gsfget(sk, &gf, optval,
  1343. offsetof(struct compat_group_filter, gf_slist_flex));
  1344. if (err)
  1345. return err;
  1346. if (gf.gf_numsrc < num)
  1347. num = gf.gf_numsrc;
  1348. len = GROUP_FILTER_SIZE(num) - (sizeof(gf) - sizeof(gf32));
  1349. if (copy_to_sockptr(optlen, &len, sizeof(int)) ||
  1350. copy_to_sockptr_offset(optval, offsetof(struct compat_group_filter, gf_fmode),
  1351. &gf.gf_fmode, sizeof(gf.gf_fmode)) ||
  1352. copy_to_sockptr_offset(optval, offsetof(struct compat_group_filter, gf_numsrc),
  1353. &gf.gf_numsrc, sizeof(gf.gf_numsrc)))
  1354. return -EFAULT;
  1355. return 0;
  1356. }
  1357. int do_ip_getsockopt(struct sock *sk, int level, int optname,
  1358. sockptr_t optval, sockptr_t optlen)
  1359. {
  1360. struct inet_sock *inet = inet_sk(sk);
  1361. bool needs_rtnl = getsockopt_needs_rtnl(optname);
  1362. int val, err = 0;
  1363. int len;
  1364. if (level != SOL_IP)
  1365. return -EOPNOTSUPP;
  1366. if (ip_mroute_opt(optname))
  1367. return ip_mroute_getsockopt(sk, optname, optval, optlen);
  1368. if (copy_from_sockptr(&len, optlen, sizeof(int)))
  1369. return -EFAULT;
  1370. if (len < 0)
  1371. return -EINVAL;
  1372. if (needs_rtnl)
  1373. rtnl_lock();
  1374. sockopt_lock_sock(sk);
  1375. switch (optname) {
  1376. case IP_OPTIONS:
  1377. {
  1378. unsigned char optbuf[sizeof(struct ip_options)+40];
  1379. struct ip_options *opt = (struct ip_options *)optbuf;
  1380. struct ip_options_rcu *inet_opt;
  1381. inet_opt = rcu_dereference_protected(inet->inet_opt,
  1382. lockdep_sock_is_held(sk));
  1383. opt->optlen = 0;
  1384. if (inet_opt)
  1385. memcpy(optbuf, &inet_opt->opt,
  1386. sizeof(struct ip_options) +
  1387. inet_opt->opt.optlen);
  1388. sockopt_release_sock(sk);
  1389. if (opt->optlen == 0) {
  1390. len = 0;
  1391. return copy_to_sockptr(optlen, &len, sizeof(int));
  1392. }
  1393. ip_options_undo(opt);
  1394. len = min_t(unsigned int, len, opt->optlen);
  1395. if (copy_to_sockptr(optlen, &len, sizeof(int)))
  1396. return -EFAULT;
  1397. if (copy_to_sockptr(optval, opt->__data, len))
  1398. return -EFAULT;
  1399. return 0;
  1400. }
  1401. case IP_PKTINFO:
  1402. val = (inet->cmsg_flags & IP_CMSG_PKTINFO) != 0;
  1403. break;
  1404. case IP_RECVTTL:
  1405. val = (inet->cmsg_flags & IP_CMSG_TTL) != 0;
  1406. break;
  1407. case IP_RECVTOS:
  1408. val = (inet->cmsg_flags & IP_CMSG_TOS) != 0;
  1409. break;
  1410. case IP_RECVOPTS:
  1411. val = (inet->cmsg_flags & IP_CMSG_RECVOPTS) != 0;
  1412. break;
  1413. case IP_RETOPTS:
  1414. val = (inet->cmsg_flags & IP_CMSG_RETOPTS) != 0;
  1415. break;
  1416. case IP_PASSSEC:
  1417. val = (inet->cmsg_flags & IP_CMSG_PASSSEC) != 0;
  1418. break;
  1419. case IP_RECVORIGDSTADDR:
  1420. val = (inet->cmsg_flags & IP_CMSG_ORIGDSTADDR) != 0;
  1421. break;
  1422. case IP_CHECKSUM:
  1423. val = (inet->cmsg_flags & IP_CMSG_CHECKSUM) != 0;
  1424. break;
  1425. case IP_RECVFRAGSIZE:
  1426. val = (inet->cmsg_flags & IP_CMSG_RECVFRAGSIZE) != 0;
  1427. break;
  1428. case IP_TOS:
  1429. val = inet->tos;
  1430. break;
  1431. case IP_TTL:
  1432. {
  1433. struct net *net = sock_net(sk);
  1434. val = (inet->uc_ttl == -1 ?
  1435. READ_ONCE(net->ipv4.sysctl_ip_default_ttl) :
  1436. inet->uc_ttl);
  1437. break;
  1438. }
  1439. case IP_HDRINCL:
  1440. val = inet->hdrincl;
  1441. break;
  1442. case IP_NODEFRAG:
  1443. val = inet->nodefrag;
  1444. break;
  1445. case IP_BIND_ADDRESS_NO_PORT:
  1446. val = inet->bind_address_no_port;
  1447. break;
  1448. case IP_MTU_DISCOVER:
  1449. val = inet->pmtudisc;
  1450. break;
  1451. case IP_MTU:
  1452. {
  1453. struct dst_entry *dst;
  1454. val = 0;
  1455. dst = sk_dst_get(sk);
  1456. if (dst) {
  1457. val = dst_mtu(dst);
  1458. dst_release(dst);
  1459. }
  1460. if (!val) {
  1461. sockopt_release_sock(sk);
  1462. return -ENOTCONN;
  1463. }
  1464. break;
  1465. }
  1466. case IP_RECVERR:
  1467. val = inet->recverr;
  1468. break;
  1469. case IP_RECVERR_RFC4884:
  1470. val = inet->recverr_rfc4884;
  1471. break;
  1472. case IP_MULTICAST_TTL:
  1473. val = inet->mc_ttl;
  1474. break;
  1475. case IP_MULTICAST_LOOP:
  1476. val = inet->mc_loop;
  1477. break;
  1478. case IP_UNICAST_IF:
  1479. val = (__force int)htonl((__u32) inet->uc_index);
  1480. break;
  1481. case IP_MULTICAST_IF:
  1482. {
  1483. struct in_addr addr;
  1484. len = min_t(unsigned int, len, sizeof(struct in_addr));
  1485. addr.s_addr = inet->mc_addr;
  1486. sockopt_release_sock(sk);
  1487. if (copy_to_sockptr(optlen, &len, sizeof(int)))
  1488. return -EFAULT;
  1489. if (copy_to_sockptr(optval, &addr, len))
  1490. return -EFAULT;
  1491. return 0;
  1492. }
  1493. case IP_MSFILTER:
  1494. {
  1495. struct ip_msfilter msf;
  1496. if (len < IP_MSFILTER_SIZE(0)) {
  1497. err = -EINVAL;
  1498. goto out;
  1499. }
  1500. if (copy_from_sockptr(&msf, optval, IP_MSFILTER_SIZE(0))) {
  1501. err = -EFAULT;
  1502. goto out;
  1503. }
  1504. err = ip_mc_msfget(sk, &msf, optval, optlen);
  1505. goto out;
  1506. }
  1507. case MCAST_MSFILTER:
  1508. if (in_compat_syscall())
  1509. err = compat_ip_get_mcast_msfilter(sk, optval, optlen,
  1510. len);
  1511. else
  1512. err = ip_get_mcast_msfilter(sk, optval, optlen, len);
  1513. goto out;
  1514. case IP_MULTICAST_ALL:
  1515. val = inet->mc_all;
  1516. break;
  1517. case IP_PKTOPTIONS:
  1518. {
  1519. struct msghdr msg;
  1520. sockopt_release_sock(sk);
  1521. if (sk->sk_type != SOCK_STREAM)
  1522. return -ENOPROTOOPT;
  1523. if (optval.is_kernel) {
  1524. msg.msg_control_is_user = false;
  1525. msg.msg_control = optval.kernel;
  1526. } else {
  1527. msg.msg_control_is_user = true;
  1528. msg.msg_control_user = optval.user;
  1529. }
  1530. msg.msg_controllen = len;
  1531. msg.msg_flags = in_compat_syscall() ? MSG_CMSG_COMPAT : 0;
  1532. if (inet->cmsg_flags & IP_CMSG_PKTINFO) {
  1533. struct in_pktinfo info;
  1534. info.ipi_addr.s_addr = inet->inet_rcv_saddr;
  1535. info.ipi_spec_dst.s_addr = inet->inet_rcv_saddr;
  1536. info.ipi_ifindex = inet->mc_index;
  1537. put_cmsg(&msg, SOL_IP, IP_PKTINFO, sizeof(info), &info);
  1538. }
  1539. if (inet->cmsg_flags & IP_CMSG_TTL) {
  1540. int hlim = inet->mc_ttl;
  1541. put_cmsg(&msg, SOL_IP, IP_TTL, sizeof(hlim), &hlim);
  1542. }
  1543. if (inet->cmsg_flags & IP_CMSG_TOS) {
  1544. int tos = inet->rcv_tos;
  1545. put_cmsg(&msg, SOL_IP, IP_TOS, sizeof(tos), &tos);
  1546. }
  1547. len -= msg.msg_controllen;
  1548. return copy_to_sockptr(optlen, &len, sizeof(int));
  1549. }
  1550. case IP_FREEBIND:
  1551. val = inet->freebind;
  1552. break;
  1553. case IP_TRANSPARENT:
  1554. val = inet->transparent;
  1555. break;
  1556. case IP_MINTTL:
  1557. val = inet->min_ttl;
  1558. break;
  1559. case IP_LOCAL_PORT_RANGE:
  1560. val = inet->local_port_range.hi << 16 | inet->local_port_range.lo;
  1561. break;
  1562. case IP_PROTOCOL:
  1563. val = inet_sk(sk)->inet_num;
  1564. break;
  1565. default:
  1566. sockopt_release_sock(sk);
  1567. return -ENOPROTOOPT;
  1568. }
  1569. sockopt_release_sock(sk);
  1570. if (len < sizeof(int) && len > 0 && val >= 0 && val <= 255) {
  1571. unsigned char ucval = (unsigned char)val;
  1572. len = 1;
  1573. if (copy_to_sockptr(optlen, &len, sizeof(int)))
  1574. return -EFAULT;
  1575. if (copy_to_sockptr(optval, &ucval, 1))
  1576. return -EFAULT;
  1577. } else {
  1578. len = min_t(unsigned int, sizeof(int), len);
  1579. if (copy_to_sockptr(optlen, &len, sizeof(int)))
  1580. return -EFAULT;
  1581. if (copy_to_sockptr(optval, &val, len))
  1582. return -EFAULT;
  1583. }
  1584. return 0;
  1585. out:
  1586. sockopt_release_sock(sk);
  1587. if (needs_rtnl)
  1588. rtnl_unlock();
  1589. return err;
  1590. }
  1591. int ip_getsockopt(struct sock *sk, int level,
  1592. int optname, char __user *optval, int __user *optlen)
  1593. {
  1594. int err;
  1595. err = do_ip_getsockopt(sk, level, optname,
  1596. USER_SOCKPTR(optval), USER_SOCKPTR(optlen));
  1597. #if IS_ENABLED(CONFIG_BPFILTER_UMH)
  1598. if (optname >= BPFILTER_IPT_SO_GET_INFO &&
  1599. optname < BPFILTER_IPT_GET_MAX)
  1600. err = bpfilter_ip_get_sockopt(sk, optname, optval, optlen);
  1601. #endif
  1602. #ifdef CONFIG_NETFILTER
  1603. /* we need to exclude all possible ENOPROTOOPTs except default case */
  1604. if (err == -ENOPROTOOPT && optname != IP_PKTOPTIONS &&
  1605. !ip_mroute_opt(optname)) {
  1606. int len;
  1607. if (get_user(len, optlen))
  1608. return -EFAULT;
  1609. err = nf_getsockopt(sk, PF_INET, optname, optval, &len);
  1610. if (err >= 0)
  1611. err = put_user(len, optlen);
  1612. return err;
  1613. }
  1614. #endif
  1615. return err;
  1616. }
  1617. EXPORT_SYMBOL(ip_getsockopt);