blob: c3d1b5578d08fe7dfe38464b17bf0e37f1641e2c [file] [log] [blame]
Eric Andersen51b8bd62002-07-03 11:46:38 +00001/* vi: set sw=4 ts=4: */
2/*
3 * Utility routines.
4 *
Eric Andersenaff114c2004-04-14 17:51:38 +00005 * create raw socket for icmp (IPv6 version) protocol test permission
6 * and drop root privileges if running setuid
Eric Andersen51b8bd62002-07-03 11:46:38 +00007 *
8 */
9
10#include <sys/types.h>
11#include <netdb.h>
12#include <sys/socket.h>
13#include <errno.h>
14#include <unistd.h>
15#include "libbb.h"
16
Glenn L McGrathd7fb1b32002-11-26 02:40:56 +000017#ifdef CONFIG_FEATURE_IPV6
Eric Andersen51b8bd62002-07-03 11:46:38 +000018int create_icmp6_socket(void)
19{
20 struct protoent *proto;
21 int sock;
22
23 proto = getprotobyname("ipv6-icmp");
24 /* if getprotobyname failed, just silently force
25 * proto->p_proto to have the correct value for "ipv6-icmp" */
26 if ((sock = socket(AF_INET6, SOCK_RAW,
27 (proto ? proto->p_proto : IPPROTO_ICMPV6))) < 0) {
28 if (errno == EPERM)
Manuel Novoa III cad53642003-03-19 09:13:01 +000029 bb_error_msg_and_die(bb_msg_perm_denied_are_you_root);
Eric Andersen51b8bd62002-07-03 11:46:38 +000030 else
Manuel Novoa III cad53642003-03-19 09:13:01 +000031 bb_perror_msg_and_die(bb_msg_can_not_create_raw_socket);
Eric Andersen51b8bd62002-07-03 11:46:38 +000032 }
33
34 /* drop root privs if running setuid */
Rob Landley53437472006-07-16 08:14:35 +000035 xsetuid(getuid());
Eric Andersen51b8bd62002-07-03 11:46:38 +000036
37 return sock;
38}
39#endif