net: fec: make sure to init MAC address
[linux-block.git] / net / ipv6 / icmp.c
CommitLineData
1da177e4
LT
1/*
2 * Internet Control Message Protocol (ICMPv6)
3 * Linux INET6 implementation
4 *
5 * Authors:
6 * Pedro Roque <roque@di.fc.ul.pt>
7 *
1da177e4
LT
8 * Based on net/ipv4/icmp.c
9 *
10 * RFC 1885
11 *
12 * This program is free software; you can redistribute it and/or
13 * modify it under the terms of the GNU General Public License
14 * as published by the Free Software Foundation; either version
15 * 2 of the License, or (at your option) any later version.
16 */
17
18/*
19 * Changes:
20 *
21 * Andi Kleen : exception handling
22 * Andi Kleen add rate limits. never reply to a icmp.
23 * add more length checks and other fixes.
24 * yoshfuji : ensure to sent parameter problem for
25 * fragments.
26 * YOSHIFUJI Hideaki @USAGI: added sysctl for icmp rate limit.
27 * Randy Dunlap and
28 * YOSHIFUJI Hideaki @USAGI: Per-interface statistics support
29 * Kazunori MIYAZAWA @USAGI: change output process to use ip6_append_data
30 */
31
f3213831
JP
32#define pr_fmt(fmt) "IPv6: " fmt
33
1da177e4
LT
34#include <linux/module.h>
35#include <linux/errno.h>
36#include <linux/types.h>
37#include <linux/socket.h>
38#include <linux/in.h>
39#include <linux/kernel.h>
1da177e4
LT
40#include <linux/sockios.h>
41#include <linux/net.h>
42#include <linux/skbuff.h>
43#include <linux/init.h>
763ecff1 44#include <linux/netfilter.h>
5a0e3ad6 45#include <linux/slab.h>
1da177e4
LT
46
47#ifdef CONFIG_SYSCTL
48#include <linux/sysctl.h>
49#endif
50
51#include <linux/inet.h>
52#include <linux/netdevice.h>
53#include <linux/icmpv6.h>
54
55#include <net/ip.h>
56#include <net/sock.h>
57
58#include <net/ipv6.h>
59#include <net/ip6_checksum.h>
6d0bfe22 60#include <net/ping.h>
1da177e4
LT
61#include <net/protocol.h>
62#include <net/raw.h>
63#include <net/rawv6.h>
64#include <net/transp_v6.h>
65#include <net/ip6_route.h>
66#include <net/addrconf.h>
67#include <net/icmp.h>
8b7817f3 68#include <net/xfrm.h>
1ed8516f 69#include <net/inet_common.h>
825edac4 70#include <net/dsfield.h>
1da177e4
LT
71
72#include <asm/uaccess.h>
1da177e4 73
1da177e4
LT
74/*
75 * The ICMP socket(s). This is the most convenient way to flow control
76 * our ICMP output as well as maintain a clean interface throughout
77 * all layers. All Socketless IP sends will soon be gone.
78 *
79 * On SMP we have one ICMP socket per-cpu.
80 */
98c6d1b2
DL
81static inline struct sock *icmpv6_sk(struct net *net)
82{
83 return net->ipv6.icmp_sk[smp_processor_id()];
84}
1da177e4 85
6f809da2
SK
86static void icmpv6_err(struct sk_buff *skb, struct inet6_skb_parm *opt,
87 u8 type, u8 code, int offset, __be32 info)
88{
6d0bfe22
LC
89 /* icmpv6_notify checks 8 bytes can be pulled, icmp6hdr is 8 bytes */
90 struct icmp6hdr *icmp6 = (struct icmp6hdr *) (skb->data + offset);
6f809da2
SK
91 struct net *net = dev_net(skb->dev);
92
93 if (type == ICMPV6_PKT_TOOBIG)
94 ip6_update_pmtu(skb, net, info, 0, 0);
95 else if (type == NDISC_REDIRECT)
b55b76b2 96 ip6_redirect(skb, net, skb->dev->ifindex, 0);
6d0bfe22
LC
97
98 if (!(type & ICMPV6_INFOMSG_MASK))
99 if (icmp6->icmp6_type == ICMPV6_ECHO_REQUEST)
100 ping_err(skb, offset, info);
6f809da2
SK
101}
102
e5bbef20 103static int icmpv6_rcv(struct sk_buff *skb);
1da177e4 104
41135cc8 105static const struct inet6_protocol icmpv6_protocol = {
1da177e4 106 .handler = icmpv6_rcv,
6f809da2 107 .err_handler = icmpv6_err,
8b7817f3 108 .flags = INET6_PROTO_NOPOLICY|INET6_PROTO_FINAL,
1da177e4
LT
109};
110
fdc0bde9 111static __inline__ struct sock *icmpv6_xmit_lock(struct net *net)
1da177e4 112{
fdc0bde9
DL
113 struct sock *sk;
114
1da177e4
LT
115 local_bh_disable();
116
fdc0bde9 117 sk = icmpv6_sk(net);
405666db 118 if (unlikely(!spin_trylock(&sk->sk_lock.slock))) {
1da177e4
LT
119 /* This can happen if the output path (f.e. SIT or
120 * ip6ip6 tunnel) signals dst_link_failure() for an
121 * outgoing ICMP6 packet.
122 */
123 local_bh_enable();
fdc0bde9 124 return NULL;
1da177e4 125 }
fdc0bde9 126 return sk;
1da177e4
LT
127}
128
405666db 129static __inline__ void icmpv6_xmit_unlock(struct sock *sk)
1da177e4 130{
405666db 131 spin_unlock_bh(&sk->sk_lock.slock);
1da177e4
LT
132}
133
1da177e4
LT
134/*
135 * Figure out, may we reply to this packet with icmp error.
136 *
137 * We do not reply, if:
138 * - it was icmp error message.
139 * - it is truncated, so that it is known, that protocol is ICMPV6
140 * (i.e. in the middle of some exthdr)
141 *
142 * --ANK (980726)
143 */
144
a50feda5 145static bool is_ineligible(const struct sk_buff *skb)
1da177e4 146{
0660e03f 147 int ptr = (u8 *)(ipv6_hdr(skb) + 1) - skb->data;
1da177e4 148 int len = skb->len - ptr;
0660e03f 149 __u8 nexthdr = ipv6_hdr(skb)->nexthdr;
75f2811c 150 __be16 frag_off;
1da177e4
LT
151
152 if (len < 0)
a50feda5 153 return true;
1da177e4 154
75f2811c 155 ptr = ipv6_skip_exthdr(skb, ptr, &nexthdr, &frag_off);
1da177e4 156 if (ptr < 0)
a50feda5 157 return false;
1da177e4
LT
158 if (nexthdr == IPPROTO_ICMPV6) {
159 u8 _type, *tp;
160 tp = skb_header_pointer(skb,
161 ptr+offsetof(struct icmp6hdr, icmp6_type),
162 sizeof(_type), &_type);
163 if (tp == NULL ||
164 !(*tp & ICMPV6_INFOMSG_MASK))
a50feda5 165 return true;
1da177e4 166 }
a50feda5 167 return false;
1da177e4
LT
168}
169
1ab1457c
YH
170/*
171 * Check the ICMP output rate limit
1da177e4 172 */
92d86829 173static inline bool icmpv6_xrlim_allow(struct sock *sk, u8 type,
4c9483b2 174 struct flowi6 *fl6)
1da177e4
LT
175{
176 struct dst_entry *dst;
3b1e0a65 177 struct net *net = sock_net(sk);
92d86829 178 bool res = false;
1da177e4
LT
179
180 /* Informational messages are not limited. */
181 if (type & ICMPV6_INFOMSG_MASK)
92d86829 182 return true;
1da177e4
LT
183
184 /* Do not limit pmtu discovery, it would break it. */
185 if (type == ICMPV6_PKT_TOOBIG)
92d86829 186 return true;
1da177e4 187
1ab1457c 188 /*
1da177e4
LT
189 * Look up the output route.
190 * XXX: perhaps the expire for routing entries cloned by
191 * this lookup should be more aggressive (not longer than timeout).
192 */
4c9483b2 193 dst = ip6_route_output(net, sk, fl6);
1da177e4 194 if (dst->error) {
3bd653c8 195 IP6_INC_STATS(net, ip6_dst_idev(dst),
a11d206d 196 IPSTATS_MIB_OUTNOROUTES);
1da177e4 197 } else if (dst->dev && (dst->dev->flags&IFF_LOOPBACK)) {
92d86829 198 res = true;
1da177e4
LT
199 } else {
200 struct rt6_info *rt = (struct rt6_info *)dst;
9a43b709 201 int tmo = net->ipv6.sysctl.icmpv6_time;
fbfe95a4 202 struct inet_peer *peer;
1da177e4
LT
203
204 /* Give more bandwidth to wider prefixes. */
205 if (rt->rt6i_dst.plen < 128)
206 tmo >>= ((128 - rt->rt6i_dst.plen)>>5);
207
1d861aa4 208 peer = inet_getpeer_v6(net->ipv6.peers, &rt->rt6i_dst.addr, 1);
fbfe95a4 209 res = inet_peer_xrlim_allow(peer, tmo);
1d861aa4
DM
210 if (peer)
211 inet_putpeer(peer);
1da177e4
LT
212 }
213 dst_release(dst);
214 return res;
215}
216
217/*
218 * an inline helper for the "simple" if statement below
219 * checks if parameter problem report is caused by an
1ab1457c 220 * unrecognized IPv6 option that has the Option Type
1da177e4
LT
221 * highest-order two bits set to 10
222 */
223
a50feda5 224static bool opt_unrec(struct sk_buff *skb, __u32 offset)
1da177e4
LT
225{
226 u8 _optval, *op;
227
bbe735e4 228 offset += skb_network_offset(skb);
1da177e4
LT
229 op = skb_header_pointer(skb, offset, sizeof(_optval), &_optval);
230 if (op == NULL)
a50feda5 231 return true;
1da177e4
LT
232 return (*op & 0xC0) == 0x80;
233}
234
6d0bfe22
LC
235int icmpv6_push_pending_frames(struct sock *sk, struct flowi6 *fl6,
236 struct icmp6hdr *thdr, int len)
1da177e4
LT
237{
238 struct sk_buff *skb;
239 struct icmp6hdr *icmp6h;
240 int err = 0;
241
242 if ((skb = skb_peek(&sk->sk_write_queue)) == NULL)
243 goto out;
244
cc70ab26 245 icmp6h = icmp6_hdr(skb);
1da177e4
LT
246 memcpy(icmp6h, thdr, sizeof(struct icmp6hdr));
247 icmp6h->icmp6_cksum = 0;
248
249 if (skb_queue_len(&sk->sk_write_queue) == 1) {
07f0757a 250 skb->csum = csum_partial(icmp6h,
1da177e4 251 sizeof(struct icmp6hdr), skb->csum);
4c9483b2
DM
252 icmp6h->icmp6_cksum = csum_ipv6_magic(&fl6->saddr,
253 &fl6->daddr,
254 len, fl6->flowi6_proto,
1da177e4
LT
255 skb->csum);
256 } else {
868c86bc 257 __wsum tmp_csum = 0;
1da177e4
LT
258
259 skb_queue_walk(&sk->sk_write_queue, skb) {
260 tmp_csum = csum_add(tmp_csum, skb->csum);
261 }
262
07f0757a 263 tmp_csum = csum_partial(icmp6h,
1da177e4 264 sizeof(struct icmp6hdr), tmp_csum);
4c9483b2
DM
265 icmp6h->icmp6_cksum = csum_ipv6_magic(&fl6->saddr,
266 &fl6->daddr,
267 len, fl6->flowi6_proto,
868c86bc 268 tmp_csum);
1da177e4 269 }
1da177e4
LT
270 ip6_push_pending_frames(sk);
271out:
272 return err;
273}
274
275struct icmpv6_msg {
276 struct sk_buff *skb;
277 int offset;
763ecff1 278 uint8_t type;
1da177e4
LT
279};
280
281static int icmpv6_getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb)
282{
283 struct icmpv6_msg *msg = (struct icmpv6_msg *) from;
284 struct sk_buff *org_skb = msg->skb;
5f92a738 285 __wsum csum = 0;
1da177e4
LT
286
287 csum = skb_copy_and_csum_bits(org_skb, msg->offset + offset,
288 to, len, csum);
289 skb->csum = csum_block_add(skb->csum, csum, odd);
763ecff1
YK
290 if (!(msg->type & ICMPV6_INFOMSG_MASK))
291 nf_ct_attach(skb, org_skb);
1da177e4
LT
292 return 0;
293}
294
07a93626 295#if IS_ENABLED(CONFIG_IPV6_MIP6)
79383236
MN
296static void mip6_addr_swap(struct sk_buff *skb)
297{
0660e03f 298 struct ipv6hdr *iph = ipv6_hdr(skb);
79383236
MN
299 struct inet6_skb_parm *opt = IP6CB(skb);
300 struct ipv6_destopt_hao *hao;
301 struct in6_addr tmp;
302 int off;
303
304 if (opt->dsthao) {
305 off = ipv6_find_tlv(skb, opt->dsthao, IPV6_TLV_HAO);
306 if (likely(off >= 0)) {
d56f90a7
ACM
307 hao = (struct ipv6_destopt_hao *)
308 (skb_network_header(skb) + off);
4e3fd7a0
AD
309 tmp = iph->saddr;
310 iph->saddr = hao->addr;
311 hao->addr = tmp;
79383236
MN
312 }
313 }
314}
315#else
316static inline void mip6_addr_swap(struct sk_buff *skb) {}
317#endif
318
e8243534 319static struct dst_entry *icmpv6_route_lookup(struct net *net,
320 struct sk_buff *skb,
321 struct sock *sk,
322 struct flowi6 *fl6)
b42835db
DM
323{
324 struct dst_entry *dst, *dst2;
4c9483b2 325 struct flowi6 fl2;
b42835db
DM
326 int err;
327
4c9483b2 328 err = ip6_dst_lookup(sk, &dst, fl6);
b42835db
DM
329 if (err)
330 return ERR_PTR(err);
331
332 /*
333 * We won't send icmp if the destination is known
334 * anycast.
335 */
336 if (((struct rt6_info *)dst)->rt6i_flags & RTF_ANYCAST) {
5f5624cf 337 LIMIT_NETDEBUG(KERN_DEBUG "icmp6_send: acast source\n");
b42835db
DM
338 dst_release(dst);
339 return ERR_PTR(-EINVAL);
340 }
341
342 /* No need to clone since we're just using its address. */
343 dst2 = dst;
344
4c9483b2 345 dst = xfrm_lookup(net, dst, flowi6_to_flowi(fl6), sk, 0);
452edd59 346 if (!IS_ERR(dst)) {
b42835db
DM
347 if (dst != dst2)
348 return dst;
452edd59
DM
349 } else {
350 if (PTR_ERR(dst) == -EPERM)
351 dst = NULL;
352 else
353 return dst;
b42835db
DM
354 }
355
4c9483b2 356 err = xfrm_decode_session_reverse(skb, flowi6_to_flowi(&fl2), AF_INET6);
b42835db
DM
357 if (err)
358 goto relookup_failed;
359
360 err = ip6_dst_lookup(sk, &dst2, &fl2);
361 if (err)
362 goto relookup_failed;
363
4c9483b2 364 dst2 = xfrm_lookup(net, dst2, flowi6_to_flowi(&fl2), sk, XFRM_LOOKUP_ICMP);
452edd59 365 if (!IS_ERR(dst2)) {
b42835db
DM
366 dst_release(dst);
367 dst = dst2;
452edd59
DM
368 } else {
369 err = PTR_ERR(dst2);
370 if (err == -EPERM) {
371 dst_release(dst);
372 return dst2;
373 } else
374 goto relookup_failed;
b42835db
DM
375 }
376
377relookup_failed:
378 if (dst)
379 return dst;
380 return ERR_PTR(err);
381}
382
1da177e4
LT
383/*
384 * Send an ICMP message in response to a packet in error
385 */
5f5624cf 386static void icmp6_send(struct sk_buff *skb, u8 type, u8 code, __u32 info)
1da177e4 387{
c346dca1 388 struct net *net = dev_net(skb->dev);
1da177e4 389 struct inet6_dev *idev = NULL;
0660e03f 390 struct ipv6hdr *hdr = ipv6_hdr(skb);
84427d53
YH
391 struct sock *sk;
392 struct ipv6_pinfo *np;
b71d1d42 393 const struct in6_addr *saddr = NULL;
1da177e4
LT
394 struct dst_entry *dst;
395 struct icmp6hdr tmp_hdr;
4c9483b2 396 struct flowi6 fl6;
1da177e4
LT
397 struct icmpv6_msg msg;
398 int iif = 0;
399 int addr_type = 0;
400 int len;
e651f03a 401 int hlimit;
1da177e4
LT
402 int err = 0;
403
27a884dc 404 if ((u8 *)hdr < skb->head ||
29a3cad5 405 (skb_network_header(skb) + sizeof(*hdr)) > skb_tail_pointer(skb))
1da177e4
LT
406 return;
407
408 /*
1ab1457c 409 * Make sure we respect the rules
1da177e4 410 * i.e. RFC 1885 2.4(e)
5f5624cf 411 * Rule (e.1) is enforced by not using icmp6_send
1da177e4
LT
412 * in any code that processes icmp errors.
413 */
414 addr_type = ipv6_addr_type(&hdr->daddr);
415
446fab59 416 if (ipv6_chk_addr(net, &hdr->daddr, skb->dev, 0) ||
d94c1f92 417 ipv6_chk_acast_addr_src(net, skb->dev, &hdr->daddr))
1da177e4
LT
418 saddr = &hdr->daddr;
419
420 /*
421 * Dest addr check
422 */
423
424 if ((addr_type & IPV6_ADDR_MULTICAST || skb->pkt_type != PACKET_HOST)) {
425 if (type != ICMPV6_PKT_TOOBIG &&
1ab1457c
YH
426 !(type == ICMPV6_PARAMPROB &&
427 code == ICMPV6_UNK_OPTION &&
1da177e4
LT
428 (opt_unrec(skb, info))))
429 return;
430
431 saddr = NULL;
432 }
433
434 addr_type = ipv6_addr_type(&hdr->saddr);
435
436 /*
437 * Source addr check
438 */
439
842df073 440 if (__ipv6_addr_needs_scope_id(addr_type))
1da177e4
LT
441 iif = skb->dev->ifindex;
442
443 /*
8de3351e
YH
444 * Must not send error if the source does not uniquely
445 * identify a single node (RFC2463 Section 2.4).
446 * We check unspecified / multicast addresses here,
447 * and anycast addresses will be checked later.
1da177e4
LT
448 */
449 if ((addr_type == IPV6_ADDR_ANY) || (addr_type & IPV6_ADDR_MULTICAST)) {
5f5624cf 450 LIMIT_NETDEBUG(KERN_DEBUG "icmp6_send: addr_any/mcast source\n");
1da177e4
LT
451 return;
452 }
453
1ab1457c 454 /*
1da177e4
LT
455 * Never answer to a ICMP packet.
456 */
457 if (is_ineligible(skb)) {
5f5624cf 458 LIMIT_NETDEBUG(KERN_DEBUG "icmp6_send: no reply to icmp error\n");
1da177e4
LT
459 return;
460 }
461
79383236
MN
462 mip6_addr_swap(skb);
463
4c9483b2
DM
464 memset(&fl6, 0, sizeof(fl6));
465 fl6.flowi6_proto = IPPROTO_ICMPV6;
4e3fd7a0 466 fl6.daddr = hdr->saddr;
1da177e4 467 if (saddr)
4e3fd7a0 468 fl6.saddr = *saddr;
4c9483b2 469 fl6.flowi6_oif = iif;
1958b856
DM
470 fl6.fl6_icmp_type = type;
471 fl6.fl6_icmp_code = code;
4c9483b2 472 security_skb_classify_flow(skb, flowi6_to_flowi(&fl6));
1da177e4 473
fdc0bde9
DL
474 sk = icmpv6_xmit_lock(net);
475 if (sk == NULL)
405666db 476 return;
fdc0bde9 477 np = inet6_sk(sk);
405666db 478
4c9483b2 479 if (!icmpv6_xrlim_allow(sk, type, &fl6))
1da177e4
LT
480 goto out;
481
482 tmp_hdr.icmp6_type = type;
483 tmp_hdr.icmp6_code = code;
484 tmp_hdr.icmp6_cksum = 0;
485 tmp_hdr.icmp6_pointer = htonl(info);
486
4c9483b2
DM
487 if (!fl6.flowi6_oif && ipv6_addr_is_multicast(&fl6.daddr))
488 fl6.flowi6_oif = np->mcast_oif;
c4062dfc
EH
489 else if (!fl6.flowi6_oif)
490 fl6.flowi6_oif = np->ucast_oif;
1da177e4 491
4c9483b2 492 dst = icmpv6_route_lookup(net, skb, sk, &fl6);
b42835db 493 if (IS_ERR(dst))
1da177e4 494 goto out;
8de3351e 495
4c9483b2 496 if (ipv6_addr_is_multicast(&fl6.daddr))
1da177e4
LT
497 hlimit = np->mcast_hops;
498 else
499 hlimit = np->hop_limit;
500 if (hlimit < 0)
6b75d090 501 hlimit = ip6_dst_hoplimit(dst);
1da177e4
LT
502
503 msg.skb = skb;
bbe735e4 504 msg.offset = skb_network_offset(skb);
763ecff1 505 msg.type = type;
1da177e4
LT
506
507 len = skb->len - msg.offset;
508 len = min_t(unsigned int, len, IPV6_MIN_MTU - sizeof(struct ipv6hdr) -sizeof(struct icmp6hdr));
509 if (len < 0) {
64ce2073 510 LIMIT_NETDEBUG(KERN_DEBUG "icmp: len problem\n");
1da177e4
LT
511 goto out_dst_release;
512 }
513
cfdf7647
ED
514 rcu_read_lock();
515 idev = __in6_dev_get(skb->dev);
1da177e4
LT
516
517 err = ip6_append_data(sk, icmpv6_getfrag, &msg,
518 len + sizeof(struct icmp6hdr),
e651f03a 519 sizeof(struct icmp6hdr), hlimit,
a2d91a09 520 np->tclass, NULL, &fl6, (struct rt6_info *)dst,
13b52cd4 521 MSG_DONTWAIT, np->dontfrag);
1da177e4 522 if (err) {
00d9d6a1 523 ICMP6_INC_STATS_BH(net, idev, ICMP6_MIB_OUTERRORS);
1da177e4 524 ip6_flush_pending_frames(sk);
cfdf7647
ED
525 } else {
526 err = icmpv6_push_pending_frames(sk, &fl6, &tmp_hdr,
527 len + sizeof(struct icmp6hdr));
1da177e4 528 }
cfdf7647 529 rcu_read_unlock();
1da177e4
LT
530out_dst_release:
531 dst_release(dst);
532out:
405666db 533 icmpv6_xmit_unlock(sk);
1da177e4 534}
5f5624cf
PS
535
536/* Slightly more convenient version of icmp6_send.
537 */
538void icmpv6_param_prob(struct sk_buff *skb, u8 code, int pos)
539{
540 icmp6_send(skb, ICMPV6_PARAMPROB, code, pos);
541 kfree_skb(skb);
542}
7159039a 543
1da177e4
LT
544static void icmpv6_echo_reply(struct sk_buff *skb)
545{
c346dca1 546 struct net *net = dev_net(skb->dev);
84427d53 547 struct sock *sk;
1da177e4 548 struct inet6_dev *idev;
84427d53 549 struct ipv6_pinfo *np;
b71d1d42 550 const struct in6_addr *saddr = NULL;
cc70ab26 551 struct icmp6hdr *icmph = icmp6_hdr(skb);
1da177e4 552 struct icmp6hdr tmp_hdr;
4c9483b2 553 struct flowi6 fl6;
1da177e4
LT
554 struct icmpv6_msg msg;
555 struct dst_entry *dst;
556 int err = 0;
557 int hlimit;
825edac4 558 u8 tclass;
1da177e4 559
0660e03f 560 saddr = &ipv6_hdr(skb)->daddr;
1da177e4 561
509aba3b 562 if (!ipv6_unicast_destination(skb) &&
ec35b61e 563 !(net->ipv6.sysctl.anycast_src_echo_reply &&
509aba3b 564 ipv6_anycast_destination(skb)))
1da177e4
LT
565 saddr = NULL;
566
567 memcpy(&tmp_hdr, icmph, sizeof(tmp_hdr));
568 tmp_hdr.icmp6_type = ICMPV6_ECHO_REPLY;
569
4c9483b2
DM
570 memset(&fl6, 0, sizeof(fl6));
571 fl6.flowi6_proto = IPPROTO_ICMPV6;
4e3fd7a0 572 fl6.daddr = ipv6_hdr(skb)->saddr;
1da177e4 573 if (saddr)
4e3fd7a0 574 fl6.saddr = *saddr;
4c9483b2 575 fl6.flowi6_oif = skb->dev->ifindex;
1958b856 576 fl6.fl6_icmp_type = ICMPV6_ECHO_REPLY;
4c9483b2 577 security_skb_classify_flow(skb, flowi6_to_flowi(&fl6));
1da177e4 578
fdc0bde9
DL
579 sk = icmpv6_xmit_lock(net);
580 if (sk == NULL)
405666db 581 return;
fdc0bde9 582 np = inet6_sk(sk);
405666db 583
4c9483b2
DM
584 if (!fl6.flowi6_oif && ipv6_addr_is_multicast(&fl6.daddr))
585 fl6.flowi6_oif = np->mcast_oif;
c4062dfc
EH
586 else if (!fl6.flowi6_oif)
587 fl6.flowi6_oif = np->ucast_oif;
1da177e4 588
4c9483b2 589 err = ip6_dst_lookup(sk, &dst, &fl6);
1da177e4
LT
590 if (err)
591 goto out;
4c9483b2 592 dst = xfrm_lookup(net, dst, flowi6_to_flowi(&fl6), sk, 0);
452edd59 593 if (IS_ERR(dst))
e104411b 594 goto out;
1da177e4 595
4c9483b2 596 if (ipv6_addr_is_multicast(&fl6.daddr))
1da177e4
LT
597 hlimit = np->mcast_hops;
598 else
599 hlimit = np->hop_limit;
600 if (hlimit < 0)
6b75d090 601 hlimit = ip6_dst_hoplimit(dst);
1da177e4 602
cfdf7647 603 idev = __in6_dev_get(skb->dev);
1da177e4
LT
604
605 msg.skb = skb;
606 msg.offset = 0;
763ecff1 607 msg.type = ICMPV6_ECHO_REPLY;
1da177e4 608
825edac4 609 tclass = ipv6_get_dsfield(ipv6_hdr(skb));
1da177e4 610 err = ip6_append_data(sk, icmpv6_getfrag, &msg, skb->len + sizeof(struct icmp6hdr),
825edac4 611 sizeof(struct icmp6hdr), hlimit, tclass, NULL, &fl6,
a2d91a09 612 (struct rt6_info *)dst, MSG_DONTWAIT,
13b52cd4 613 np->dontfrag);
1da177e4
LT
614
615 if (err) {
00d9d6a1 616 ICMP6_INC_STATS_BH(net, idev, ICMP6_MIB_OUTERRORS);
1da177e4 617 ip6_flush_pending_frames(sk);
cfdf7647
ED
618 } else {
619 err = icmpv6_push_pending_frames(sk, &fl6, &tmp_hdr,
620 skb->len + sizeof(struct icmp6hdr));
1da177e4 621 }
1da177e4 622 dst_release(dst);
1ab1457c 623out:
405666db 624 icmpv6_xmit_unlock(sk);
1da177e4
LT
625}
626
b94f1c09 627void icmpv6_notify(struct sk_buff *skb, u8 type, u8 code, __be32 info)
1da177e4 628{
41135cc8 629 const struct inet6_protocol *ipprot;
1da177e4 630 int inner_offset;
75f2811c 631 __be16 frag_off;
f9242b6b 632 u8 nexthdr;
1da177e4
LT
633
634 if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
635 return;
636
637 nexthdr = ((struct ipv6hdr *)skb->data)->nexthdr;
638 if (ipv6_ext_hdr(nexthdr)) {
639 /* now skip over extension headers */
75f2811c
JG
640 inner_offset = ipv6_skip_exthdr(skb, sizeof(struct ipv6hdr),
641 &nexthdr, &frag_off);
1da177e4
LT
642 if (inner_offset<0)
643 return;
644 } else {
645 inner_offset = sizeof(struct ipv6hdr);
646 }
647
648 /* Checkin header including 8 bytes of inner protocol header. */
649 if (!pskb_may_pull(skb, inner_offset+8))
650 return;
651
1da177e4
LT
652 /* BUGGG_FUTURE: we should try to parse exthdrs in this packet.
653 Without this we will not able f.e. to make source routed
654 pmtu discovery.
655 Corresponding argument (opt) to notifiers is already added.
656 --ANK (980726)
657 */
658
1da177e4 659 rcu_read_lock();
f9242b6b 660 ipprot = rcu_dereference(inet6_protos[nexthdr]);
1da177e4
LT
661 if (ipprot && ipprot->err_handler)
662 ipprot->err_handler(skb, NULL, type, code, inner_offset, info);
663 rcu_read_unlock();
664
69d6da0b 665 raw6_icmp_error(skb, nexthdr, type, code, inner_offset, info);
1da177e4 666}
1ab1457c 667
1da177e4
LT
668/*
669 * Handle icmp messages
670 */
671
e5bbef20 672static int icmpv6_rcv(struct sk_buff *skb)
1da177e4 673{
1da177e4
LT
674 struct net_device *dev = skb->dev;
675 struct inet6_dev *idev = __in6_dev_get(dev);
b71d1d42 676 const struct in6_addr *saddr, *daddr;
1da177e4 677 struct icmp6hdr *hdr;
d5fdd6ba 678 u8 type;
1da177e4 679
aebcf82c 680 if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb)) {
def8b4fa 681 struct sec_path *sp = skb_sec_path(skb);
8b7817f3
HX
682 int nh;
683
def8b4fa 684 if (!(sp && sp->xvec[sp->len - 1]->props.flags &
aebcf82c
HX
685 XFRM_STATE_ICMP))
686 goto drop_no_count;
687
81aded24 688 if (!pskb_may_pull(skb, sizeof(*hdr) + sizeof(struct ipv6hdr)))
8b7817f3
HX
689 goto drop_no_count;
690
691 nh = skb_network_offset(skb);
692 skb_set_network_header(skb, sizeof(*hdr));
693
694 if (!xfrm6_policy_check_reverse(NULL, XFRM_POLICY_IN, skb))
695 goto drop_no_count;
696
697 skb_set_network_header(skb, nh);
698 }
699
e41b5368 700 ICMP6_INC_STATS_BH(dev_net(dev), idev, ICMP6_MIB_INMSGS);
1da177e4 701
0660e03f
ACM
702 saddr = &ipv6_hdr(skb)->saddr;
703 daddr = &ipv6_hdr(skb)->daddr;
1da177e4
LT
704
705 /* Perform checksum. */
fb286bb2 706 switch (skb->ip_summed) {
84fa7933 707 case CHECKSUM_COMPLETE:
fb286bb2
HX
708 if (!csum_ipv6_magic(saddr, daddr, skb->len, IPPROTO_ICMPV6,
709 skb->csum))
710 break;
711 /* fall through */
712 case CHECKSUM_NONE:
868c86bc
AV
713 skb->csum = ~csum_unfold(csum_ipv6_magic(saddr, daddr, skb->len,
714 IPPROTO_ICMPV6, 0));
fb286bb2 715 if (__skb_checksum_complete(skb)) {
6d0bfe22
LC
716 LIMIT_NETDEBUG(KERN_DEBUG
717 "ICMPv6 checksum failed [%pI6c > %pI6c]\n",
0c6ce78a 718 saddr, daddr);
6a5dc9e5 719 goto csum_error;
1da177e4
LT
720 }
721 }
722
8cf22943
HX
723 if (!pskb_pull(skb, sizeof(*hdr)))
724 goto discard_it;
1da177e4 725
cc70ab26 726 hdr = icmp6_hdr(skb);
1da177e4
LT
727
728 type = hdr->icmp6_type;
729
55d43808 730 ICMP6MSGIN_INC_STATS_BH(dev_net(dev), idev, type);
1da177e4
LT
731
732 switch (type) {
733 case ICMPV6_ECHO_REQUEST:
734 icmpv6_echo_reply(skb);
735 break;
736
737 case ICMPV6_ECHO_REPLY:
6d0bfe22 738 ping_rcv(skb);
1da177e4
LT
739 break;
740
741 case ICMPV6_PKT_TOOBIG:
742 /* BUGGG_FUTURE: if packet contains rthdr, we cannot update
743 standard destination cache. Seems, only "advanced"
744 destination cache will allow to solve this problem
745 --ANK (980726)
746 */
747 if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
748 goto discard_it;
cc70ab26 749 hdr = icmp6_hdr(skb);
1da177e4
LT
750
751 /*
752 * Drop through to notify
753 */
754
755 case ICMPV6_DEST_UNREACH:
756 case ICMPV6_TIME_EXCEED:
757 case ICMPV6_PARAMPROB:
758 icmpv6_notify(skb, type, hdr->icmp6_code, hdr->icmp6_mtu);
759 break;
760
761 case NDISC_ROUTER_SOLICITATION:
762 case NDISC_ROUTER_ADVERTISEMENT:
763 case NDISC_NEIGHBOUR_SOLICITATION:
764 case NDISC_NEIGHBOUR_ADVERTISEMENT:
765 case NDISC_REDIRECT:
766 ndisc_rcv(skb);
767 break;
768
769 case ICMPV6_MGM_QUERY:
770 igmp6_event_query(skb);
771 break;
772
773 case ICMPV6_MGM_REPORT:
774 igmp6_event_report(skb);
775 break;
776
777 case ICMPV6_MGM_REDUCTION:
778 case ICMPV6_NI_QUERY:
779 case ICMPV6_NI_REPLY:
780 case ICMPV6_MLD2_REPORT:
781 case ICMPV6_DHAAD_REQUEST:
782 case ICMPV6_DHAAD_REPLY:
783 case ICMPV6_MOBILE_PREFIX_SOL:
784 case ICMPV6_MOBILE_PREFIX_ADV:
785 break;
786
787 default:
64ce2073 788 LIMIT_NETDEBUG(KERN_DEBUG "icmpv6: msg of unknown type\n");
1da177e4
LT
789
790 /* informational */
791 if (type & ICMPV6_INFOMSG_MASK)
792 break;
793
1ab1457c
YH
794 /*
795 * error of unknown type.
796 * must pass to upper level
1da177e4
LT
797 */
798
799 icmpv6_notify(skb, type, hdr->icmp6_code, hdr->icmp6_mtu);
3ff50b79
SH
800 }
801
1da177e4
LT
802 kfree_skb(skb);
803 return 0;
804
6a5dc9e5
ED
805csum_error:
806 ICMP6_INC_STATS_BH(dev_net(dev), idev, ICMP6_MIB_CSUMERRORS);
1da177e4 807discard_it:
e41b5368 808 ICMP6_INC_STATS_BH(dev_net(dev), idev, ICMP6_MIB_INERRORS);
8b7817f3 809drop_no_count:
1da177e4
LT
810 kfree_skb(skb);
811 return 0;
812}
813
4c9483b2 814void icmpv6_flow_init(struct sock *sk, struct flowi6 *fl6,
95e41e93
YH
815 u8 type,
816 const struct in6_addr *saddr,
817 const struct in6_addr *daddr,
818 int oif)
819{
4c9483b2 820 memset(fl6, 0, sizeof(*fl6));
4e3fd7a0
AD
821 fl6->saddr = *saddr;
822 fl6->daddr = *daddr;
4c9483b2 823 fl6->flowi6_proto = IPPROTO_ICMPV6;
1958b856
DM
824 fl6->fl6_icmp_type = type;
825 fl6->fl6_icmp_code = 0;
4c9483b2
DM
826 fl6->flowi6_oif = oif;
827 security_sk_classify_flow(sk, flowi6_to_flowi(fl6));
95e41e93
YH
828}
829
640c41c7 830/*
b7e729c4 831 * Special lock-class for __icmpv6_sk:
640c41c7
IM
832 */
833static struct lock_class_key icmpv6_socket_sk_dst_lock_key;
834
98c6d1b2 835static int __net_init icmpv6_sk_init(struct net *net)
1da177e4
LT
836{
837 struct sock *sk;
838 int err, i, j;
839
98c6d1b2
DL
840 net->ipv6.icmp_sk =
841 kzalloc(nr_cpu_ids * sizeof(struct sock *), GFP_KERNEL);
842 if (net->ipv6.icmp_sk == NULL)
79c91159
DL
843 return -ENOMEM;
844
6f912042 845 for_each_possible_cpu(i) {
1ed8516f
DL
846 err = inet_ctl_sock_create(&sk, PF_INET6,
847 SOCK_RAW, IPPROTO_ICMPV6, net);
1da177e4 848 if (err < 0) {
f3213831 849 pr_err("Failed to initialize the ICMP6 control socket (err %d)\n",
1da177e4
LT
850 err);
851 goto fail;
852 }
853
1ed8516f 854 net->ipv6.icmp_sk[i] = sk;
5c8cafd6 855
640c41c7
IM
856 /*
857 * Split off their lock-class, because sk->sk_dst_lock
858 * gets used from softirqs, which is safe for
b7e729c4 859 * __icmpv6_sk (because those never get directly used
640c41c7
IM
860 * via userspace syscalls), but unsafe for normal sockets.
861 */
862 lockdep_set_class(&sk->sk_dst_lock,
863 &icmpv6_socket_sk_dst_lock_key);
1da177e4
LT
864
865 /* Enough space for 2 64K ICMP packets, including
866 * sk_buff struct overhead.
867 */
87fb4b7b 868 sk->sk_sndbuf = 2 * SKB_TRUESIZE(64 * 1024);
1da177e4 869 }
1da177e4
LT
870 return 0;
871
872 fail:
5c8cafd6 873 for (j = 0; j < i; j++)
1ed8516f 874 inet_ctl_sock_destroy(net->ipv6.icmp_sk[j]);
98c6d1b2 875 kfree(net->ipv6.icmp_sk);
1da177e4
LT
876 return err;
877}
878
98c6d1b2 879static void __net_exit icmpv6_sk_exit(struct net *net)
1da177e4
LT
880{
881 int i;
882
6f912042 883 for_each_possible_cpu(i) {
1ed8516f 884 inet_ctl_sock_destroy(net->ipv6.icmp_sk[i]);
1da177e4 885 }
98c6d1b2
DL
886 kfree(net->ipv6.icmp_sk);
887}
888
8ed7edce 889static struct pernet_operations icmpv6_sk_ops = {
98c6d1b2
DL
890 .init = icmpv6_sk_init,
891 .exit = icmpv6_sk_exit,
892};
893
894int __init icmpv6_init(void)
895{
896 int err;
897
898 err = register_pernet_subsys(&icmpv6_sk_ops);
899 if (err < 0)
900 return err;
901
902 err = -EAGAIN;
903 if (inet6_add_protocol(&icmpv6_protocol, IPPROTO_ICMPV6) < 0)
904 goto fail;
5f5624cf
PS
905
906 err = inet6_register_icmp_sender(icmp6_send);
907 if (err)
908 goto sender_reg_err;
98c6d1b2
DL
909 return 0;
910
5f5624cf
PS
911sender_reg_err:
912 inet6_del_protocol(&icmpv6_protocol, IPPROTO_ICMPV6);
98c6d1b2 913fail:
f3213831 914 pr_err("Failed to register ICMP6 protocol\n");
98c6d1b2
DL
915 unregister_pernet_subsys(&icmpv6_sk_ops);
916 return err;
917}
918
8ed7edce 919void icmpv6_cleanup(void)
98c6d1b2 920{
5f5624cf 921 inet6_unregister_icmp_sender(icmp6_send);
98c6d1b2 922 unregister_pernet_subsys(&icmpv6_sk_ops);
1da177e4
LT
923 inet6_del_protocol(&icmpv6_protocol, IPPROTO_ICMPV6);
924}
925
98c6d1b2 926
9b5b5cff 927static const struct icmp6_err {
1da177e4
LT
928 int err;
929 int fatal;
930} tab_unreach[] = {
931 { /* NOROUTE */
932 .err = ENETUNREACH,
933 .fatal = 0,
934 },
935 { /* ADM_PROHIBITED */
936 .err = EACCES,
937 .fatal = 1,
938 },
939 { /* Was NOT_NEIGHBOUR, now reserved */
940 .err = EHOSTUNREACH,
941 .fatal = 0,
942 },
943 { /* ADDR_UNREACH */
944 .err = EHOSTUNREACH,
945 .fatal = 0,
946 },
947 { /* PORT_UNREACH */
948 .err = ECONNREFUSED,
949 .fatal = 1,
950 },
61e76b17
JB
951 { /* POLICY_FAIL */
952 .err = EACCES,
953 .fatal = 1,
954 },
955 { /* REJECT_ROUTE */
956 .err = EACCES,
957 .fatal = 1,
958 },
1da177e4
LT
959};
960
d5fdd6ba 961int icmpv6_err_convert(u8 type, u8 code, int *err)
1da177e4
LT
962{
963 int fatal = 0;
964
965 *err = EPROTO;
966
967 switch (type) {
968 case ICMPV6_DEST_UNREACH:
969 fatal = 1;
61e76b17 970 if (code < ARRAY_SIZE(tab_unreach)) {
1da177e4
LT
971 *err = tab_unreach[code].err;
972 fatal = tab_unreach[code].fatal;
973 }
974 break;
975
976 case ICMPV6_PKT_TOOBIG:
977 *err = EMSGSIZE;
978 break;
1ab1457c 979
1da177e4
LT
980 case ICMPV6_PARAMPROB:
981 *err = EPROTO;
982 fatal = 1;
983 break;
984
985 case ICMPV6_TIME_EXCEED:
986 *err = EHOSTUNREACH;
987 break;
3ff50b79 988 }
1da177e4
LT
989
990 return fatal;
991}
7159039a
YH
992EXPORT_SYMBOL(icmpv6_err_convert);
993
1da177e4 994#ifdef CONFIG_SYSCTL
e8243534 995static struct ctl_table ipv6_icmp_table_template[] = {
1da177e4 996 {
1da177e4 997 .procname = "ratelimit",
41a76906 998 .data = &init_net.ipv6.sysctl.icmpv6_time,
1da177e4
LT
999 .maxlen = sizeof(int),
1000 .mode = 0644,
6d9f239a 1001 .proc_handler = proc_dointvec_ms_jiffies,
1da177e4 1002 },
f8572d8f 1003 { },
1da177e4 1004};
760f2d01 1005
2c8c1e72 1006struct ctl_table * __net_init ipv6_icmp_sysctl_init(struct net *net)
760f2d01
DL
1007{
1008 struct ctl_table *table;
1009
1010 table = kmemdup(ipv6_icmp_table_template,
1011 sizeof(ipv6_icmp_table_template),
1012 GFP_KERNEL);
5ee09105 1013
c027aab4 1014 if (table)
5ee09105
YH
1015 table[0].data = &net->ipv6.sysctl.icmpv6_time;
1016
760f2d01
DL
1017 return table;
1018}
1da177e4
LT
1019#endif
1020