blob: 523541730777db2fe167e2ff5d02f5db7ce5d855 [file] [log] [blame]
yuezonghe824eb0c2024-06-27 02:32:26 -07001/*
2 * INET An implementation of the TCP/IP protocol suite for the LINUX
3 * operating system. INET is implemented using the BSD Socket
4 * interface as the means of communication with the user level.
5 *
6 * The options processing module for ip.c
7 *
8 * Authors: A.N.Kuznetsov
9 *
10 */
11
12#define pr_fmt(fmt) "IPv4: " fmt
13
14#include <linux/capability.h>
15#include <linux/module.h>
16#include <linux/slab.h>
17#include <linux/types.h>
18#include <asm/uaccess.h>
19#include <asm/unaligned.h>
20#include <linux/skbuff.h>
21#include <linux/ip.h>
22#include <linux/icmp.h>
23#include <linux/netdevice.h>
24#include <linux/rtnetlink.h>
25#include <net/sock.h>
26#include <net/ip.h>
27#include <net/icmp.h>
28#include <net/route.h>
29#include <net/cipso_ipv4.h>
30
31/*
32 * Write options to IP header, record destination address to
33 * source route option, address of outgoing interface
34 * (we should already know it, so that this function is allowed be
35 * called only after routing decision) and timestamp,
36 * if we originate this datagram.
37 *
38 * daddr is real destination address, next hop is recorded in IP header.
39 * saddr is address of outgoing interface.
40 */
41
42void ip_options_build(struct sk_buff *skb, struct ip_options *opt,
43 __be32 daddr, struct rtable *rt, int is_frag)
44{
45 unsigned char *iph = skb_network_header(skb);
46
47 memcpy(&(IPCB(skb)->opt), opt, sizeof(struct ip_options));
48 memcpy(iph+sizeof(struct iphdr), opt->__data, opt->optlen);
49 opt = &(IPCB(skb)->opt);
50
51 if (opt->srr)
52 memcpy(iph+opt->srr+iph[opt->srr+1]-4, &daddr, 4);
53
54 if (!is_frag) {
55 if (opt->rr_needaddr)
56 ip_rt_get_source(iph+opt->rr+iph[opt->rr+2]-5, skb, rt);
57 if (opt->ts_needaddr)
58 ip_rt_get_source(iph+opt->ts+iph[opt->ts+2]-9, skb, rt);
59 if (opt->ts_needtime) {
60 struct timespec tv;
61 __be32 midtime;
62 getnstimeofday(&tv);
63 midtime = htonl((tv.tv_sec % 86400) * MSEC_PER_SEC + tv.tv_nsec / NSEC_PER_MSEC);
64 memcpy(iph+opt->ts+iph[opt->ts+2]-5, &midtime, 4);
65 }
66 return;
67 }
68 if (opt->rr) {
69 memset(iph+opt->rr, IPOPT_NOP, iph[opt->rr+1]);
70 opt->rr = 0;
71 opt->rr_needaddr = 0;
72 }
73 if (opt->ts) {
74 memset(iph+opt->ts, IPOPT_NOP, iph[opt->ts+1]);
75 opt->ts = 0;
76 opt->ts_needaddr = opt->ts_needtime = 0;
77 }
78}
79
80/*
81 * Provided (sopt, skb) points to received options,
82 * build in dopt compiled option set appropriate for answering.
83 * i.e. invert SRR option, copy anothers,
84 * and grab room in RR/TS options.
85 *
86 * NOTE: dopt cannot point to skb.
87 */
88
89int ip_options_echo(struct ip_options *dopt, struct sk_buff *skb)
90{
91 const struct ip_options *sopt;
92 unsigned char *sptr, *dptr;
93 int soffset, doffset;
94 int optlen;
95 __be32 daddr;
96
97 memset(dopt, 0, sizeof(struct ip_options));
98
99 sopt = &(IPCB(skb)->opt);
100
101 if (sopt->optlen == 0)
102 return 0;
103
104 sptr = skb_network_header(skb);
105 dptr = dopt->__data;
106
107 daddr = skb_rtable(skb)->rt_spec_dst;
108
109 if (sopt->rr) {
110 optlen = sptr[sopt->rr+1];
111 soffset = sptr[sopt->rr+2];
112 dopt->rr = dopt->optlen + sizeof(struct iphdr);
113 memcpy(dptr, sptr+sopt->rr, optlen);
114 if (sopt->rr_needaddr && soffset <= optlen) {
115 if (soffset + 3 > optlen)
116 return -EINVAL;
117 dptr[2] = soffset + 4;
118 dopt->rr_needaddr = 1;
119 }
120 dptr += optlen;
121 dopt->optlen += optlen;
122 }
123 if (sopt->ts) {
124 optlen = sptr[sopt->ts+1];
125 soffset = sptr[sopt->ts+2];
126 dopt->ts = dopt->optlen + sizeof(struct iphdr);
127 memcpy(dptr, sptr+sopt->ts, optlen);
128 if (soffset <= optlen) {
129 if (sopt->ts_needaddr) {
130 if (soffset + 3 > optlen)
131 return -EINVAL;
132 dopt->ts_needaddr = 1;
133 soffset += 4;
134 }
135 if (sopt->ts_needtime) {
136 if (soffset + 3 > optlen)
137 return -EINVAL;
138 if ((dptr[3]&0xF) != IPOPT_TS_PRESPEC) {
139 dopt->ts_needtime = 1;
140 soffset += 4;
141 } else {
142 dopt->ts_needtime = 0;
143
144 if (soffset + 7 <= optlen) {
145 __be32 addr;
146
147 memcpy(&addr, dptr+soffset-1, 4);
148 if (inet_addr_type(dev_net(skb_dst(skb)->dev), addr) != RTN_UNICAST) {
149 dopt->ts_needtime = 1;
150 soffset += 8;
151 }
152 }
153 }
154 }
155 dptr[2] = soffset;
156 }
157 dptr += optlen;
158 dopt->optlen += optlen;
159 }
160 if (sopt->srr) {
161 unsigned char *start = sptr+sopt->srr;
162 __be32 faddr;
163
164 optlen = start[1];
165 soffset = start[2];
166 doffset = 0;
167 if (soffset > optlen)
168 soffset = optlen + 1;
169 soffset -= 4;
170 if (soffset > 3) {
171 memcpy(&faddr, &start[soffset-1], 4);
172 for (soffset-=4, doffset=4; soffset > 3; soffset-=4, doffset+=4)
173 memcpy(&dptr[doffset-1], &start[soffset-1], 4);
174 /*
175 * RFC1812 requires to fix illegal source routes.
176 */
177 if (memcmp(&ip_hdr(skb)->saddr,
178 &start[soffset + 3], 4) == 0)
179 doffset -= 4;
180 }
181 if (doffset > 3) {
182 memcpy(&start[doffset-1], &daddr, 4);
183 dopt->faddr = faddr;
184 dptr[0] = start[0];
185 dptr[1] = doffset+3;
186 dptr[2] = 4;
187 dptr += doffset+3;
188 dopt->srr = dopt->optlen + sizeof(struct iphdr);
189 dopt->optlen += doffset+3;
190 dopt->is_strictroute = sopt->is_strictroute;
191 }
192 }
193 if (sopt->cipso) {
194 optlen = sptr[sopt->cipso+1];
195 dopt->cipso = dopt->optlen+sizeof(struct iphdr);
196 memcpy(dptr, sptr+sopt->cipso, optlen);
197 dptr += optlen;
198 dopt->optlen += optlen;
199 }
200 while (dopt->optlen & 3) {
201 *dptr++ = IPOPT_END;
202 dopt->optlen++;
203 }
204 return 0;
205}
206
207/*
208 * Options "fragmenting", just fill options not
209 * allowed in fragments with NOOPs.
210 * Simple and stupid 8), but the most efficient way.
211 */
212
213void ip_options_fragment(struct sk_buff * skb)
214{
215 unsigned char *optptr = skb_network_header(skb) + sizeof(struct iphdr);
216 struct ip_options * opt = &(IPCB(skb)->opt);
217 int l = opt->optlen;
218 int optlen;
219
220 while (l > 0) {
221 switch (*optptr) {
222 case IPOPT_END:
223 return;
224 case IPOPT_NOOP:
225 l--;
226 optptr++;
227 continue;
228 }
229 optlen = optptr[1];
230 if (optlen<2 || optlen>l)
231 return;
232 if (!IPOPT_COPIED(*optptr))
233 memset(optptr, IPOPT_NOOP, optlen);
234 l -= optlen;
235 optptr += optlen;
236 }
237 opt->ts = 0;
238 opt->rr = 0;
239 opt->rr_needaddr = 0;
240 opt->ts_needaddr = 0;
241 opt->ts_needtime = 0;
242}
243
244/*
245 * Verify options and fill pointers in struct options.
246 * Caller should clear *opt, and set opt->data.
247 * If opt == NULL, then skb->data should point to IP header.
248 */
249
250int ip_options_compile(struct net *net,
251 struct ip_options * opt, struct sk_buff * skb)
252{
253 int l;
254 unsigned char * iph;
255 unsigned char * optptr;
256 int optlen;
257 unsigned char * pp_ptr = NULL;
258 struct rtable *rt = NULL;
259
260 if (skb != NULL) {
261 rt = skb_rtable(skb);
262 optptr = (unsigned char *)&(ip_hdr(skb)[1]);
263 } else
264 optptr = opt->__data;
265 iph = optptr - sizeof(struct iphdr);
266
267 for (l = opt->optlen; l > 0; ) {
268 switch (*optptr) {
269 case IPOPT_END:
270 for (optptr++, l--; l>0; optptr++, l--) {
271 if (*optptr != IPOPT_END) {
272 *optptr = IPOPT_END;
273 opt->is_changed = 1;
274 }
275 }
276 goto eol;
277 case IPOPT_NOOP:
278 l--;
279 optptr++;
280 continue;
281 }
282 if (unlikely(l < 2)) {
283 pp_ptr = optptr;
284 goto error;
285 }
286 optlen = optptr[1];
287 if (optlen<2 || optlen>l) {
288 pp_ptr = optptr;
289 goto error;
290 }
291 switch (*optptr) {
292 case IPOPT_SSRR:
293 case IPOPT_LSRR:
294 if (optlen < 3) {
295 pp_ptr = optptr + 1;
296 goto error;
297 }
298 if (optptr[2] < 4) {
299 pp_ptr = optptr + 2;
300 goto error;
301 }
302 /* NB: cf RFC-1812 5.2.4.1 */
303 if (opt->srr) {
304 pp_ptr = optptr;
305 goto error;
306 }
307 if (!skb) {
308 if (optptr[2] != 4 || optlen < 7 || ((optlen-3) & 3)) {
309 pp_ptr = optptr + 1;
310 goto error;
311 }
312 memcpy(&opt->faddr, &optptr[3], 4);
313 if (optlen > 7)
314 memmove(&optptr[3], &optptr[7], optlen-7);
315 }
316 opt->is_strictroute = (optptr[0] == IPOPT_SSRR);
317 opt->srr = optptr - iph;
318 break;
319 case IPOPT_RR:
320 if (opt->rr) {
321 pp_ptr = optptr;
322 goto error;
323 }
324 if (optlen < 3) {
325 pp_ptr = optptr + 1;
326 goto error;
327 }
328 if (optptr[2] < 4) {
329 pp_ptr = optptr + 2;
330 goto error;
331 }
332 if (optptr[2] <= optlen) {
333 if (optptr[2]+3 > optlen) {
334 pp_ptr = optptr + 2;
335 goto error;
336 }
337 if (rt) {
338 memcpy(&optptr[optptr[2]-1], &rt->rt_spec_dst, 4);
339 opt->is_changed = 1;
340 }
341 optptr[2] += 4;
342 opt->rr_needaddr = 1;
343 }
344 opt->rr = optptr - iph;
345 break;
346 case IPOPT_TIMESTAMP:
347 if (opt->ts) {
348 pp_ptr = optptr;
349 goto error;
350 }
351 if (optlen < 4) {
352 pp_ptr = optptr + 1;
353 goto error;
354 }
355 if (optptr[2] < 5) {
356 pp_ptr = optptr + 2;
357 goto error;
358 }
359 if (optptr[2] <= optlen) {
360 unsigned char *timeptr = NULL;
361 if (optptr[2]+3 > optptr[1]) {
362 pp_ptr = optptr + 2;
363 goto error;
364 }
365 switch (optptr[3]&0xF) {
366 case IPOPT_TS_TSONLY:
367 if (skb)
368 timeptr = &optptr[optptr[2]-1];
369 opt->ts_needtime = 1;
370 optptr[2] += 4;
371 break;
372 case IPOPT_TS_TSANDADDR:
373 if (optptr[2]+7 > optptr[1]) {
374 pp_ptr = optptr + 2;
375 goto error;
376 }
377 if (rt) {
378 memcpy(&optptr[optptr[2]-1], &rt->rt_spec_dst, 4);
379 timeptr = &optptr[optptr[2]+3];
380 }
381 opt->ts_needaddr = 1;
382 opt->ts_needtime = 1;
383 optptr[2] += 8;
384 break;
385 case IPOPT_TS_PRESPEC:
386 if (optptr[2]+7 > optptr[1]) {
387 pp_ptr = optptr + 2;
388 goto error;
389 }
390 {
391 __be32 addr;
392 memcpy(&addr, &optptr[optptr[2]-1], 4);
393 if (inet_addr_type(net, addr) == RTN_UNICAST)
394 break;
395 if (skb)
396 timeptr = &optptr[optptr[2]+3];
397 }
398 opt->ts_needtime = 1;
399 optptr[2] += 8;
400 break;
401 default:
402 if (!skb && !capable(CAP_NET_RAW)) {
403 pp_ptr = optptr + 3;
404 goto error;
405 }
406 break;
407 }
408 if (timeptr) {
409 struct timespec tv;
410 u32 midtime;
411 getnstimeofday(&tv);
412 midtime = (tv.tv_sec % 86400) * MSEC_PER_SEC + tv.tv_nsec / NSEC_PER_MSEC;
413 put_unaligned_be32(midtime, timeptr);
414 opt->is_changed = 1;
415 }
416 } else {
417 unsigned overflow = optptr[3]>>4;
418 if (overflow == 15) {
419 pp_ptr = optptr + 3;
420 goto error;
421 }
422 if (skb) {
423 optptr[3] = (optptr[3]&0xF)|((overflow+1)<<4);
424 opt->is_changed = 1;
425 }
426 }
427 opt->ts = optptr - iph;
428 break;
429 case IPOPT_RA:
430 if (optlen < 4) {
431 pp_ptr = optptr + 1;
432 goto error;
433 }
434 if (optptr[2] == 0 && optptr[3] == 0)
435 opt->router_alert = optptr - iph;
436 break;
437 case IPOPT_CIPSO:
438 if ((!skb && !capable(CAP_NET_RAW)) || opt->cipso) {
439 pp_ptr = optptr;
440 goto error;
441 }
442 opt->cipso = optptr - iph;
443 if (cipso_v4_validate(skb, &optptr)) {
444 pp_ptr = optptr;
445 goto error;
446 }
447 break;
448 case IPOPT_SEC:
449 case IPOPT_SID:
450 default:
451 if (!skb && !capable(CAP_NET_RAW)) {
452 pp_ptr = optptr;
453 goto error;
454 }
455 break;
456 }
457 l -= optlen;
458 optptr += optlen;
459 }
460
461eol:
462 if (!pp_ptr)
463 return 0;
464
465error:
466 if (skb) {
467 icmp_send(skb, ICMP_PARAMETERPROB, 0, htonl((pp_ptr-iph)<<24));
468 }
469 return -EINVAL;
470}
471EXPORT_SYMBOL(ip_options_compile);
472
473/*
474 * Undo all the changes done by ip_options_compile().
475 */
476
477void ip_options_undo(struct ip_options * opt)
478{
479 if (opt->srr) {
480 unsigned char * optptr = opt->__data+opt->srr-sizeof(struct iphdr);
481 memmove(optptr+7, optptr+3, optptr[1]-7);
482 memcpy(optptr+3, &opt->faddr, 4);
483 }
484 if (opt->rr_needaddr) {
485 unsigned char * optptr = opt->__data+opt->rr-sizeof(struct iphdr);
486 optptr[2] -= 4;
487 memset(&optptr[optptr[2]-1], 0, 4);
488 }
489 if (opt->ts) {
490 unsigned char * optptr = opt->__data+opt->ts-sizeof(struct iphdr);
491 if (opt->ts_needtime) {
492 optptr[2] -= 4;
493 memset(&optptr[optptr[2]-1], 0, 4);
494 if ((optptr[3]&0xF) == IPOPT_TS_PRESPEC)
495 optptr[2] -= 4;
496 }
497 if (opt->ts_needaddr) {
498 optptr[2] -= 4;
499 memset(&optptr[optptr[2]-1], 0, 4);
500 }
501 }
502}
503
504static struct ip_options_rcu *ip_options_get_alloc(const int optlen)
505{
506 return kzalloc(sizeof(struct ip_options_rcu) + ((optlen + 3) & ~3),
507 GFP_KERNEL);
508}
509
510static int ip_options_get_finish(struct net *net, struct ip_options_rcu **optp,
511 struct ip_options_rcu *opt, int optlen)
512{
513 while (optlen & 3)
514 opt->opt.__data[optlen++] = IPOPT_END;
515 opt->opt.optlen = optlen;
516 if (optlen && ip_options_compile(net, &opt->opt, NULL)) {
517 kfree(opt);
518 return -EINVAL;
519 }
520 kfree(*optp);
521 *optp = opt;
522 return 0;
523}
524
525int ip_options_get_from_user(struct net *net, struct ip_options_rcu **optp,
526 unsigned char __user *data, int optlen)
527{
528 struct ip_options_rcu *opt = ip_options_get_alloc(optlen);
529
530 if (!opt)
531 return -ENOMEM;
532 if (optlen && copy_from_user(opt->opt.__data, data, optlen)) {
533 kfree(opt);
534 return -EFAULT;
535 }
536 return ip_options_get_finish(net, optp, opt, optlen);
537}
538
539int ip_options_get(struct net *net, struct ip_options_rcu **optp,
540 unsigned char *data, int optlen)
541{
542 struct ip_options_rcu *opt = ip_options_get_alloc(optlen);
543
544 if (!opt)
545 return -ENOMEM;
546 if (optlen)
547 memcpy(opt->opt.__data, data, optlen);
548 return ip_options_get_finish(net, optp, opt, optlen);
549}
550
551void ip_forward_options(struct sk_buff *skb)
552{
553 struct ip_options * opt = &(IPCB(skb)->opt);
554 unsigned char * optptr;
555 struct rtable *rt = skb_rtable(skb);
556 unsigned char *raw = skb_network_header(skb);
557
558 if (opt->rr_needaddr) {
559 optptr = (unsigned char *)raw + opt->rr;
560 ip_rt_get_source(&optptr[optptr[2]-5], skb, rt);
561 opt->is_changed = 1;
562 }
563 if (opt->srr_is_hit) {
564 int srrptr, srrspace;
565
566 optptr = raw + opt->srr;
567
568 for ( srrptr=optptr[2], srrspace = optptr[1];
569 srrptr <= srrspace;
570 srrptr += 4
571 ) {
572 if (srrptr + 3 > srrspace)
573 break;
574 if (memcmp(&opt->nexthop, &optptr[srrptr-1], 4) == 0)
575 break;
576 }
577 if (srrptr + 3 <= srrspace) {
578 opt->is_changed = 1;
579 ip_hdr(skb)->daddr = opt->nexthop;
580 ip_rt_get_source(&optptr[srrptr-1], skb, rt);
581 optptr[2] = srrptr+4;
582 } else if (net_ratelimit())
583 pr_crit("%s(): Argh! Destination lost!\n", __func__);
584 if (opt->ts_needaddr) {
585 optptr = raw + opt->ts;
586 ip_rt_get_source(&optptr[optptr[2]-9], skb, rt);
587 opt->is_changed = 1;
588 }
589 }
590 if (opt->is_changed) {
591 opt->is_changed = 0;
592 ip_send_check(ip_hdr(skb));
593 }
594}
595
596int ip_options_rcv_srr(struct sk_buff *skb)
597{
598 struct ip_options *opt = &(IPCB(skb)->opt);
599 int srrspace, srrptr;
600 __be32 nexthop;
601 struct iphdr *iph = ip_hdr(skb);
602 unsigned char *optptr = skb_network_header(skb) + opt->srr;
603 struct rtable *rt = skb_rtable(skb);
604 struct rtable *rt2;
605 unsigned long orefdst;
606 int err;
607
608 if (!rt)
609 return 0;
610
611 if (skb->pkt_type != PACKET_HOST)
612 return -EINVAL;
613 if (rt->rt_type == RTN_UNICAST) {
614 if (!opt->is_strictroute)
615 return 0;
616 icmp_send(skb, ICMP_PARAMETERPROB, 0, htonl(16<<24));
617 return -EINVAL;
618 }
619 if (rt->rt_type != RTN_LOCAL)
620 return -EINVAL;
621
622 for (srrptr=optptr[2], srrspace = optptr[1]; srrptr <= srrspace; srrptr += 4) {
623 if (srrptr + 3 > srrspace) {
624 icmp_send(skb, ICMP_PARAMETERPROB, 0, htonl((opt->srr+2)<<24));
625 return -EINVAL;
626 }
627 memcpy(&nexthop, &optptr[srrptr-1], 4);
628
629 orefdst = skb->_skb_refdst;
630 skb_dst_set(skb, NULL);
631 err = ip_route_input(skb, nexthop, iph->saddr, iph->tos, skb->dev);
632 rt2 = skb_rtable(skb);
633 if (err || (rt2->rt_type != RTN_UNICAST && rt2->rt_type != RTN_LOCAL)) {
634 skb_dst_drop(skb);
635 skb->_skb_refdst = orefdst;
636 return -EINVAL;
637 }
638 refdst_drop(orefdst);
639 if (rt2->rt_type != RTN_LOCAL)
640 break;
641 /* Superfast 8) loopback forward */
642 iph->daddr = nexthop;
643 opt->is_changed = 1;
644 }
645 if (srrptr <= srrspace) {
646 opt->srr_is_hit = 1;
647 opt->nexthop = nexthop;
648 opt->is_changed = 1;
649 }
650 return 0;
651}
652EXPORT_SYMBOL(ip_options_rcv_srr);