blob: b90f3e9fdd5fe6325f7861fbe0845b92e852f3d8 [file] [log] [blame]
Eric Andersen51b8bd62002-07-03 11:46:38 +00001/* vi: set sw=4 ts=4: */
2/*
3 * Utility routines.
4 *
Eric Andersenaff114c2004-04-14 17:51:38 +00005 * create raw socket for icmp (IPv6 version) protocol test permission
6 * and drop root privileges if running setuid
Eric Andersen51b8bd62002-07-03 11:46:38 +00007 *
8 */
9
10#include <sys/types.h>
11#include <netdb.h>
12#include <sys/socket.h>
Eric Andersen51b8bd62002-07-03 11:46:38 +000013#include "libbb.h"
14
Glenn L McGrathd7fb1b32002-11-26 02:40:56 +000015#ifdef CONFIG_FEATURE_IPV6
Eric Andersen51b8bd62002-07-03 11:46:38 +000016int create_icmp6_socket(void)
17{
18 struct protoent *proto;
19 int sock;
20
21 proto = getprotobyname("ipv6-icmp");
22 /* if getprotobyname failed, just silently force
23 * proto->p_proto to have the correct value for "ipv6-icmp" */
Denis Vlasenko19c238b2007-03-03 00:36:35 +000024 sock = socket(AF_INET6, SOCK_RAW,
25 (proto ? proto->p_proto : IPPROTO_ICMPV6));
26 if (sock < 0) {
Eric Andersen51b8bd62002-07-03 11:46:38 +000027 if (errno == EPERM)
Manuel Novoa III cad53642003-03-19 09:13:01 +000028 bb_error_msg_and_die(bb_msg_perm_denied_are_you_root);
Denis Vlasenko19c238b2007-03-03 00:36:35 +000029 bb_perror_msg_and_die(bb_msg_can_not_create_raw_socket);
Eric Andersen51b8bd62002-07-03 11:46:38 +000030 }
31
32 /* drop root privs if running setuid */
Rob Landley53437472006-07-16 08:14:35 +000033 xsetuid(getuid());
Eric Andersen51b8bd62002-07-03 11:46:38 +000034
35 return sock;
36}
37#endif