sock: sockc cookie initializer
[linux-block.git] / net / ipv6 / icmp.c
CommitLineData
1da177e4
LT
1/*
2 * Internet Control Message Protocol (ICMPv6)
3 * Linux INET6 implementation
4 *
5 * Authors:
6 * Pedro Roque <roque@di.fc.ul.pt>
7 *
1da177e4
LT
8 * Based on net/ipv4/icmp.c
9 *
10 * RFC 1885
11 *
12 * This program is free software; you can redistribute it and/or
13 * modify it under the terms of the GNU General Public License
14 * as published by the Free Software Foundation; either version
15 * 2 of the License, or (at your option) any later version.
16 */
17
18/*
19 * Changes:
20 *
21 * Andi Kleen : exception handling
22 * Andi Kleen add rate limits. never reply to a icmp.
23 * add more length checks and other fixes.
24 * yoshfuji : ensure to sent parameter problem for
25 * fragments.
26 * YOSHIFUJI Hideaki @USAGI: added sysctl for icmp rate limit.
27 * Randy Dunlap and
28 * YOSHIFUJI Hideaki @USAGI: Per-interface statistics support
29 * Kazunori MIYAZAWA @USAGI: change output process to use ip6_append_data
30 */
31
f3213831
JP
32#define pr_fmt(fmt) "IPv6: " fmt
33
1da177e4
LT
34#include <linux/module.h>
35#include <linux/errno.h>
36#include <linux/types.h>
37#include <linux/socket.h>
38#include <linux/in.h>
39#include <linux/kernel.h>
1da177e4
LT
40#include <linux/sockios.h>
41#include <linux/net.h>
42#include <linux/skbuff.h>
43#include <linux/init.h>
763ecff1 44#include <linux/netfilter.h>
5a0e3ad6 45#include <linux/slab.h>
1da177e4
LT
46
47#ifdef CONFIG_SYSCTL
48#include <linux/sysctl.h>
49#endif
50
51#include <linux/inet.h>
52#include <linux/netdevice.h>
53#include <linux/icmpv6.h>
54
55#include <net/ip.h>
56#include <net/sock.h>
57
58#include <net/ipv6.h>
59#include <net/ip6_checksum.h>
6d0bfe22 60#include <net/ping.h>
1da177e4
LT
61#include <net/protocol.h>
62#include <net/raw.h>
63#include <net/rawv6.h>
64#include <net/transp_v6.h>
65#include <net/ip6_route.h>
66#include <net/addrconf.h>
67#include <net/icmp.h>
8b7817f3 68#include <net/xfrm.h>
1ed8516f 69#include <net/inet_common.h>
825edac4 70#include <net/dsfield.h>
ca254490 71#include <net/l3mdev.h>
1da177e4 72
7c0f6ba6 73#include <linux/uaccess.h>
1da177e4 74
1da177e4
LT
75/*
76 * The ICMP socket(s). This is the most convenient way to flow control
77 * our ICMP output as well as maintain a clean interface throughout
78 * all layers. All Socketless IP sends will soon be gone.
79 *
80 * On SMP we have one ICMP socket per-cpu.
81 */
98c6d1b2
DL
82static inline struct sock *icmpv6_sk(struct net *net)
83{
84 return net->ipv6.icmp_sk[smp_processor_id()];
85}
1da177e4 86
6f809da2
SK
87static void icmpv6_err(struct sk_buff *skb, struct inet6_skb_parm *opt,
88 u8 type, u8 code, int offset, __be32 info)
89{
6d0bfe22
LC
90 /* icmpv6_notify checks 8 bytes can be pulled, icmp6hdr is 8 bytes */
91 struct icmp6hdr *icmp6 = (struct icmp6hdr *) (skb->data + offset);
6f809da2
SK
92 struct net *net = dev_net(skb->dev);
93
94 if (type == ICMPV6_PKT_TOOBIG)
e2d118a1 95 ip6_update_pmtu(skb, net, info, 0, 0, sock_net_uid(net, NULL));
6f809da2 96 else if (type == NDISC_REDIRECT)
e2d118a1
LC
97 ip6_redirect(skb, net, skb->dev->ifindex, 0,
98 sock_net_uid(net, NULL));
6d0bfe22
LC
99
100 if (!(type & ICMPV6_INFOMSG_MASK))
101 if (icmp6->icmp6_type == ICMPV6_ECHO_REQUEST)
dcb94b88 102 ping_err(skb, offset, ntohl(info));
6f809da2
SK
103}
104
e5bbef20 105static int icmpv6_rcv(struct sk_buff *skb);
1da177e4 106
41135cc8 107static const struct inet6_protocol icmpv6_protocol = {
1da177e4 108 .handler = icmpv6_rcv,
6f809da2 109 .err_handler = icmpv6_err,
8b7817f3 110 .flags = INET6_PROTO_NOPOLICY|INET6_PROTO_FINAL,
1da177e4
LT
111};
112
7ba91ecb 113/* Called with BH disabled */
fdc0bde9 114static __inline__ struct sock *icmpv6_xmit_lock(struct net *net)
1da177e4 115{
fdc0bde9
DL
116 struct sock *sk;
117
fdc0bde9 118 sk = icmpv6_sk(net);
405666db 119 if (unlikely(!spin_trylock(&sk->sk_lock.slock))) {
1da177e4
LT
120 /* This can happen if the output path (f.e. SIT or
121 * ip6ip6 tunnel) signals dst_link_failure() for an
122 * outgoing ICMP6 packet.
123 */
fdc0bde9 124 return NULL;
1da177e4 125 }
fdc0bde9 126 return sk;
1da177e4
LT
127}
128
405666db 129static __inline__ void icmpv6_xmit_unlock(struct sock *sk)
1da177e4 130{
7ba91ecb 131 spin_unlock(&sk->sk_lock.slock);
1da177e4
LT
132}
133
1da177e4
LT
134/*
135 * Figure out, may we reply to this packet with icmp error.
136 *
137 * We do not reply, if:
138 * - it was icmp error message.
139 * - it is truncated, so that it is known, that protocol is ICMPV6
140 * (i.e. in the middle of some exthdr)
141 *
142 * --ANK (980726)
143 */
144
a50feda5 145static bool is_ineligible(const struct sk_buff *skb)
1da177e4 146{
0660e03f 147 int ptr = (u8 *)(ipv6_hdr(skb) + 1) - skb->data;
1da177e4 148 int len = skb->len - ptr;
0660e03f 149 __u8 nexthdr = ipv6_hdr(skb)->nexthdr;
75f2811c 150 __be16 frag_off;
1da177e4
LT
151
152 if (len < 0)
a50feda5 153 return true;
1da177e4 154
75f2811c 155 ptr = ipv6_skip_exthdr(skb, ptr, &nexthdr, &frag_off);
1da177e4 156 if (ptr < 0)
a50feda5 157 return false;
1da177e4
LT
158 if (nexthdr == IPPROTO_ICMPV6) {
159 u8 _type, *tp;
160 tp = skb_header_pointer(skb,
161 ptr+offsetof(struct icmp6hdr, icmp6_type),
162 sizeof(_type), &_type);
63159f29 163 if (!tp || !(*tp & ICMPV6_INFOMSG_MASK))
a50feda5 164 return true;
1da177e4 165 }
a50feda5 166 return false;
1da177e4
LT
167}
168
c0303efe
JDB
169static bool icmpv6_mask_allow(int type)
170{
171 /* Informational messages are not limited. */
172 if (type & ICMPV6_INFOMSG_MASK)
173 return true;
174
175 /* Do not limit pmtu discovery, it would break it. */
176 if (type == ICMPV6_PKT_TOOBIG)
177 return true;
178
179 return false;
180}
181
182static bool icmpv6_global_allow(int type)
183{
184 if (icmpv6_mask_allow(type))
185 return true;
186
187 if (icmp_global_allow())
188 return true;
189
190 return false;
191}
192
1ab1457c
YH
193/*
194 * Check the ICMP output rate limit
1da177e4 195 */
4cdf507d
ED
196static bool icmpv6_xrlim_allow(struct sock *sk, u8 type,
197 struct flowi6 *fl6)
1da177e4 198{
3b1e0a65 199 struct net *net = sock_net(sk);
4cdf507d 200 struct dst_entry *dst;
92d86829 201 bool res = false;
1da177e4 202
c0303efe 203 if (icmpv6_mask_allow(type))
92d86829 204 return true;
1da177e4 205
1ab1457c 206 /*
1da177e4
LT
207 * Look up the output route.
208 * XXX: perhaps the expire for routing entries cloned by
209 * this lookup should be more aggressive (not longer than timeout).
210 */
4c9483b2 211 dst = ip6_route_output(net, sk, fl6);
1da177e4 212 if (dst->error) {
3bd653c8 213 IP6_INC_STATS(net, ip6_dst_idev(dst),
a11d206d 214 IPSTATS_MIB_OUTNOROUTES);
1da177e4 215 } else if (dst->dev && (dst->dev->flags&IFF_LOOPBACK)) {
92d86829 216 res = true;
1da177e4
LT
217 } else {
218 struct rt6_info *rt = (struct rt6_info *)dst;
9a43b709 219 int tmo = net->ipv6.sysctl.icmpv6_time;
c0303efe 220 struct inet_peer *peer;
1da177e4
LT
221
222 /* Give more bandwidth to wider prefixes. */
223 if (rt->rt6i_dst.plen < 128)
224 tmo >>= ((128 - rt->rt6i_dst.plen)>>5);
225
c0303efe
JDB
226 peer = inet_getpeer_v6(net->ipv6.peers, &fl6->daddr, 1);
227 res = inet_peer_xrlim_allow(peer, tmo);
228 if (peer)
229 inet_putpeer(peer);
1da177e4
LT
230 }
231 dst_release(dst);
232 return res;
233}
234
235/*
236 * an inline helper for the "simple" if statement below
237 * checks if parameter problem report is caused by an
1ab1457c 238 * unrecognized IPv6 option that has the Option Type
1da177e4
LT
239 * highest-order two bits set to 10
240 */
241
a50feda5 242static bool opt_unrec(struct sk_buff *skb, __u32 offset)
1da177e4
LT
243{
244 u8 _optval, *op;
245
bbe735e4 246 offset += skb_network_offset(skb);
1da177e4 247 op = skb_header_pointer(skb, offset, sizeof(_optval), &_optval);
63159f29 248 if (!op)
a50feda5 249 return true;
1da177e4
LT
250 return (*op & 0xC0) == 0x80;
251}
252
4e64b1ed
JP
253void icmpv6_push_pending_frames(struct sock *sk, struct flowi6 *fl6,
254 struct icmp6hdr *thdr, int len)
1da177e4
LT
255{
256 struct sk_buff *skb;
257 struct icmp6hdr *icmp6h;
1da177e4 258
e5d08d71 259 skb = skb_peek(&sk->sk_write_queue);
63159f29 260 if (!skb)
4e64b1ed 261 return;
1da177e4 262
cc70ab26 263 icmp6h = icmp6_hdr(skb);
1da177e4
LT
264 memcpy(icmp6h, thdr, sizeof(struct icmp6hdr));
265 icmp6h->icmp6_cksum = 0;
266
267 if (skb_queue_len(&sk->sk_write_queue) == 1) {
07f0757a 268 skb->csum = csum_partial(icmp6h,
1da177e4 269 sizeof(struct icmp6hdr), skb->csum);
4c9483b2
DM
270 icmp6h->icmp6_cksum = csum_ipv6_magic(&fl6->saddr,
271 &fl6->daddr,
272 len, fl6->flowi6_proto,
1da177e4
LT
273 skb->csum);
274 } else {
868c86bc 275 __wsum tmp_csum = 0;
1da177e4
LT
276
277 skb_queue_walk(&sk->sk_write_queue, skb) {
278 tmp_csum = csum_add(tmp_csum, skb->csum);
279 }
280
07f0757a 281 tmp_csum = csum_partial(icmp6h,
1da177e4 282 sizeof(struct icmp6hdr), tmp_csum);
4c9483b2
DM
283 icmp6h->icmp6_cksum = csum_ipv6_magic(&fl6->saddr,
284 &fl6->daddr,
285 len, fl6->flowi6_proto,
868c86bc 286 tmp_csum);
1da177e4 287 }
1da177e4 288 ip6_push_pending_frames(sk);
1da177e4
LT
289}
290
291struct icmpv6_msg {
292 struct sk_buff *skb;
293 int offset;
763ecff1 294 uint8_t type;
1da177e4
LT
295};
296
297static int icmpv6_getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb)
298{
299 struct icmpv6_msg *msg = (struct icmpv6_msg *) from;
300 struct sk_buff *org_skb = msg->skb;
5f92a738 301 __wsum csum = 0;
1da177e4
LT
302
303 csum = skb_copy_and_csum_bits(org_skb, msg->offset + offset,
304 to, len, csum);
305 skb->csum = csum_block_add(skb->csum, csum, odd);
763ecff1
YK
306 if (!(msg->type & ICMPV6_INFOMSG_MASK))
307 nf_ct_attach(skb, org_skb);
1da177e4
LT
308 return 0;
309}
310
07a93626 311#if IS_ENABLED(CONFIG_IPV6_MIP6)
79383236
MN
312static void mip6_addr_swap(struct sk_buff *skb)
313{
0660e03f 314 struct ipv6hdr *iph = ipv6_hdr(skb);
79383236
MN
315 struct inet6_skb_parm *opt = IP6CB(skb);
316 struct ipv6_destopt_hao *hao;
317 struct in6_addr tmp;
318 int off;
319
320 if (opt->dsthao) {
321 off = ipv6_find_tlv(skb, opt->dsthao, IPV6_TLV_HAO);
322 if (likely(off >= 0)) {
d56f90a7
ACM
323 hao = (struct ipv6_destopt_hao *)
324 (skb_network_header(skb) + off);
4e3fd7a0
AD
325 tmp = iph->saddr;
326 iph->saddr = hao->addr;
327 hao->addr = tmp;
79383236
MN
328 }
329 }
330}
331#else
332static inline void mip6_addr_swap(struct sk_buff *skb) {}
333#endif
334
e8243534 335static struct dst_entry *icmpv6_route_lookup(struct net *net,
336 struct sk_buff *skb,
337 struct sock *sk,
338 struct flowi6 *fl6)
b42835db
DM
339{
340 struct dst_entry *dst, *dst2;
4c9483b2 341 struct flowi6 fl2;
b42835db
DM
342 int err;
343
343d60aa 344 err = ip6_dst_lookup(net, sk, &dst, fl6);
b42835db
DM
345 if (err)
346 return ERR_PTR(err);
347
348 /*
349 * We won't send icmp if the destination is known
350 * anycast.
351 */
2647a9b0 352 if (ipv6_anycast_destination(dst, &fl6->daddr)) {
ba7a46f1 353 net_dbg_ratelimited("icmp6_send: acast source\n");
b42835db
DM
354 dst_release(dst);
355 return ERR_PTR(-EINVAL);
356 }
357
358 /* No need to clone since we're just using its address. */
359 dst2 = dst;
360
4c9483b2 361 dst = xfrm_lookup(net, dst, flowi6_to_flowi(fl6), sk, 0);
452edd59 362 if (!IS_ERR(dst)) {
b42835db
DM
363 if (dst != dst2)
364 return dst;
452edd59
DM
365 } else {
366 if (PTR_ERR(dst) == -EPERM)
367 dst = NULL;
368 else
369 return dst;
b42835db
DM
370 }
371
4c9483b2 372 err = xfrm_decode_session_reverse(skb, flowi6_to_flowi(&fl2), AF_INET6);
b42835db
DM
373 if (err)
374 goto relookup_failed;
375
343d60aa 376 err = ip6_dst_lookup(net, sk, &dst2, &fl2);
b42835db
DM
377 if (err)
378 goto relookup_failed;
379
4c9483b2 380 dst2 = xfrm_lookup(net, dst2, flowi6_to_flowi(&fl2), sk, XFRM_LOOKUP_ICMP);
452edd59 381 if (!IS_ERR(dst2)) {
b42835db
DM
382 dst_release(dst);
383 dst = dst2;
452edd59
DM
384 } else {
385 err = PTR_ERR(dst2);
386 if (err == -EPERM) {
387 dst_release(dst);
388 return dst2;
389 } else
390 goto relookup_failed;
b42835db
DM
391 }
392
393relookup_failed:
394 if (dst)
395 return dst;
396 return ERR_PTR(err);
397}
398
1b70d792
DA
399static int icmp6_iif(const struct sk_buff *skb)
400{
401 int iif = skb->dev->ifindex;
402
403 /* for local traffic to local address, skb dev is the loopback
404 * device. Check if there is a dst attached to the skb and if so
405 * get the real device index.
406 */
407 if (unlikely(iif == LOOPBACK_IFINDEX)) {
408 const struct rt6_info *rt6 = skb_rt6_info(skb);
409
410 if (rt6)
411 iif = rt6->rt6i_idev->dev->ifindex;
412 }
413
414 return iif;
415}
416
1da177e4
LT
417/*
418 * Send an ICMP message in response to a packet in error
419 */
b1cadc1a
ED
420static void icmp6_send(struct sk_buff *skb, u8 type, u8 code, __u32 info,
421 const struct in6_addr *force_saddr)
1da177e4 422{
c346dca1 423 struct net *net = dev_net(skb->dev);
1da177e4 424 struct inet6_dev *idev = NULL;
0660e03f 425 struct ipv6hdr *hdr = ipv6_hdr(skb);
84427d53
YH
426 struct sock *sk;
427 struct ipv6_pinfo *np;
b71d1d42 428 const struct in6_addr *saddr = NULL;
1da177e4
LT
429 struct dst_entry *dst;
430 struct icmp6hdr tmp_hdr;
4c9483b2 431 struct flowi6 fl6;
1da177e4 432 struct icmpv6_msg msg;
c14ac945 433 struct sockcm_cookie sockc_unused = {0};
26879da5 434 struct ipcm6_cookie ipc6;
1da177e4
LT
435 int iif = 0;
436 int addr_type = 0;
437 int len;
e110861f 438 u32 mark = IP6_REPLY_MARK(net, skb->mark);
1da177e4 439
27a884dc 440 if ((u8 *)hdr < skb->head ||
29a3cad5 441 (skb_network_header(skb) + sizeof(*hdr)) > skb_tail_pointer(skb))
1da177e4
LT
442 return;
443
444 /*
1ab1457c 445 * Make sure we respect the rules
1da177e4 446 * i.e. RFC 1885 2.4(e)
5f5624cf 447 * Rule (e.1) is enforced by not using icmp6_send
1da177e4
LT
448 * in any code that processes icmp errors.
449 */
450 addr_type = ipv6_addr_type(&hdr->daddr);
451
446fab59 452 if (ipv6_chk_addr(net, &hdr->daddr, skb->dev, 0) ||
d94c1f92 453 ipv6_chk_acast_addr_src(net, skb->dev, &hdr->daddr))
1da177e4
LT
454 saddr = &hdr->daddr;
455
456 /*
457 * Dest addr check
458 */
459
9a6b4b39 460 if (addr_type & IPV6_ADDR_MULTICAST || skb->pkt_type != PACKET_HOST) {
1da177e4 461 if (type != ICMPV6_PKT_TOOBIG &&
1ab1457c
YH
462 !(type == ICMPV6_PARAMPROB &&
463 code == ICMPV6_UNK_OPTION &&
1da177e4
LT
464 (opt_unrec(skb, info))))
465 return;
466
467 saddr = NULL;
468 }
469
470 addr_type = ipv6_addr_type(&hdr->saddr);
471
472 /*
473 * Source addr check
474 */
475
4832c30d 476 if (__ipv6_addr_needs_scope_id(addr_type)) {
1b70d792 477 iif = icmp6_iif(skb);
4832c30d 478 } else {
79dc7e3f
DA
479 dst = skb_dst(skb);
480 iif = l3mdev_master_ifindex(dst ? dst->dev : skb->dev);
481 }
1da177e4
LT
482
483 /*
8de3351e
YH
484 * Must not send error if the source does not uniquely
485 * identify a single node (RFC2463 Section 2.4).
486 * We check unspecified / multicast addresses here,
487 * and anycast addresses will be checked later.
1da177e4
LT
488 */
489 if ((addr_type == IPV6_ADDR_ANY) || (addr_type & IPV6_ADDR_MULTICAST)) {
4b3418fb
BM
490 net_dbg_ratelimited("icmp6_send: addr_any/mcast source [%pI6c > %pI6c]\n",
491 &hdr->saddr, &hdr->daddr);
1da177e4
LT
492 return;
493 }
494
1ab1457c 495 /*
1da177e4
LT
496 * Never answer to a ICMP packet.
497 */
498 if (is_ineligible(skb)) {
4b3418fb
BM
499 net_dbg_ratelimited("icmp6_send: no reply to icmp error [%pI6c > %pI6c]\n",
500 &hdr->saddr, &hdr->daddr);
1da177e4
LT
501 return;
502 }
503
7ba91ecb
JDB
504 /* Needed by both icmp_global_allow and icmpv6_xmit_lock */
505 local_bh_disable();
506
507 /* Check global sysctl_icmp_msgs_per_sec ratelimit */
849a44de 508 if (!(skb->dev->flags&IFF_LOOPBACK) && !icmpv6_global_allow(type))
7ba91ecb
JDB
509 goto out_bh_enable;
510
79383236
MN
511 mip6_addr_swap(skb);
512
4c9483b2
DM
513 memset(&fl6, 0, sizeof(fl6));
514 fl6.flowi6_proto = IPPROTO_ICMPV6;
4e3fd7a0 515 fl6.daddr = hdr->saddr;
b1cadc1a
ED
516 if (force_saddr)
517 saddr = force_saddr;
1da177e4 518 if (saddr)
4e3fd7a0 519 fl6.saddr = *saddr;
e110861f 520 fl6.flowi6_mark = mark;
4c9483b2 521 fl6.flowi6_oif = iif;
1958b856
DM
522 fl6.fl6_icmp_type = type;
523 fl6.fl6_icmp_code = code;
e2d118a1 524 fl6.flowi6_uid = sock_net_uid(net, NULL);
b4bac172 525 fl6.mp_hash = rt6_multipath_hash(net, &fl6, skb, NULL);
4c9483b2 526 security_skb_classify_flow(skb, flowi6_to_flowi(&fl6));
1da177e4 527
fdc0bde9 528 sk = icmpv6_xmit_lock(net);
63159f29 529 if (!sk)
7ba91ecb 530 goto out_bh_enable;
c0303efe 531
e110861f 532 sk->sk_mark = mark;
fdc0bde9 533 np = inet6_sk(sk);
405666db 534
4c9483b2 535 if (!icmpv6_xrlim_allow(sk, type, &fl6))
1da177e4
LT
536 goto out;
537
538 tmp_hdr.icmp6_type = type;
539 tmp_hdr.icmp6_code = code;
540 tmp_hdr.icmp6_cksum = 0;
541 tmp_hdr.icmp6_pointer = htonl(info);
542
4c9483b2
DM
543 if (!fl6.flowi6_oif && ipv6_addr_is_multicast(&fl6.daddr))
544 fl6.flowi6_oif = np->mcast_oif;
c4062dfc
EH
545 else if (!fl6.flowi6_oif)
546 fl6.flowi6_oif = np->ucast_oif;
1da177e4 547
b515430a 548 ipcm6_init_sk(&ipc6, np);
38b7097b
HFS
549 fl6.flowlabel = ip6_make_flowinfo(ipc6.tclass, fl6.flowlabel);
550
4c9483b2 551 dst = icmpv6_route_lookup(net, skb, sk, &fl6);
b42835db 552 if (IS_ERR(dst))
1da177e4 553 goto out;
8de3351e 554
26879da5 555 ipc6.hlimit = ip6_sk_dst_hoplimit(np, &fl6, dst);
1da177e4
LT
556
557 msg.skb = skb;
bbe735e4 558 msg.offset = skb_network_offset(skb);
763ecff1 559 msg.type = type;
1da177e4
LT
560
561 len = skb->len - msg.offset;
67ba4152 562 len = min_t(unsigned int, len, IPV6_MIN_MTU - sizeof(struct ipv6hdr) - sizeof(struct icmp6hdr));
1da177e4 563 if (len < 0) {
4b3418fb
BM
564 net_dbg_ratelimited("icmp: len problem [%pI6c > %pI6c]\n",
565 &hdr->saddr, &hdr->daddr);
1da177e4
LT
566 goto out_dst_release;
567 }
568
cfdf7647
ED
569 rcu_read_lock();
570 idev = __in6_dev_get(skb->dev);
1da177e4 571
4e64b1ed
JP
572 if (ip6_append_data(sk, icmpv6_getfrag, &msg,
573 len + sizeof(struct icmp6hdr),
574 sizeof(struct icmp6hdr),
575 &ipc6, &fl6, (struct rt6_info *)dst,
576 MSG_DONTWAIT, &sockc_unused)) {
43a43b60 577 ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTERRORS);
1da177e4 578 ip6_flush_pending_frames(sk);
cfdf7647 579 } else {
4e64b1ed
JP
580 icmpv6_push_pending_frames(sk, &fl6, &tmp_hdr,
581 len + sizeof(struct icmp6hdr));
1da177e4 582 }
cfdf7647 583 rcu_read_unlock();
1da177e4
LT
584out_dst_release:
585 dst_release(dst);
586out:
405666db 587 icmpv6_xmit_unlock(sk);
7ba91ecb
JDB
588out_bh_enable:
589 local_bh_enable();
1da177e4 590}
5f5624cf
PS
591
592/* Slightly more convenient version of icmp6_send.
593 */
594void icmpv6_param_prob(struct sk_buff *skb, u8 code, int pos)
595{
b1cadc1a 596 icmp6_send(skb, ICMPV6_PARAMPROB, code, pos, NULL);
5f5624cf
PS
597 kfree_skb(skb);
598}
7159039a 599
5fbba8ac
ED
600/* Generate icmpv6 with type/code ICMPV6_DEST_UNREACH/ICMPV6_ADDR_UNREACH
601 * if sufficient data bytes are available
602 * @nhs is the size of the tunnel header(s) :
603 * Either an IPv4 header for SIT encap
604 * an IPv4 header + GRE header for GRE encap
605 */
20e1954f
ED
606int ip6_err_gen_icmpv6_unreach(struct sk_buff *skb, int nhs, int type,
607 unsigned int data_len)
5fbba8ac 608{
2d7a3b27 609 struct in6_addr temp_saddr;
5fbba8ac
ED
610 struct rt6_info *rt;
611 struct sk_buff *skb2;
20e1954f 612 u32 info = 0;
5fbba8ac
ED
613
614 if (!pskb_may_pull(skb, nhs + sizeof(struct ipv6hdr) + 8))
615 return 1;
616
20e1954f
ED
617 /* RFC 4884 (partial) support for ICMP extensions */
618 if (data_len < 128 || (data_len & 7) || skb->len < data_len)
619 data_len = 0;
620
621 skb2 = data_len ? skb_copy(skb, GFP_ATOMIC) : skb_clone(skb, GFP_ATOMIC);
5fbba8ac
ED
622
623 if (!skb2)
624 return 1;
625
626 skb_dst_drop(skb2);
627 skb_pull(skb2, nhs);
628 skb_reset_network_header(skb2);
629
b75cc8f9
DA
630 rt = rt6_lookup(dev_net(skb->dev), &ipv6_hdr(skb2)->saddr, NULL, 0,
631 skb, 0);
5fbba8ac
ED
632
633 if (rt && rt->dst.dev)
634 skb2->dev = rt->dst.dev;
635
2d7a3b27 636 ipv6_addr_set_v4mapped(ip_hdr(skb)->saddr, &temp_saddr);
20e1954f
ED
637
638 if (data_len) {
639 /* RFC 4884 (partial) support :
640 * insert 0 padding at the end, before the extensions
641 */
642 __skb_push(skb2, nhs);
643 skb_reset_network_header(skb2);
644 memmove(skb2->data, skb2->data + nhs, data_len - nhs);
645 memset(skb2->data + data_len - nhs, 0, nhs);
646 /* RFC 4884 4.5 : Length is measured in 64-bit words,
647 * and stored in reserved[0]
648 */
649 info = (data_len/8) << 24;
650 }
2d7a3b27
ED
651 if (type == ICMP_TIME_EXCEEDED)
652 icmp6_send(skb2, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT,
20e1954f 653 info, &temp_saddr);
2d7a3b27
ED
654 else
655 icmp6_send(skb2, ICMPV6_DEST_UNREACH, ICMPV6_ADDR_UNREACH,
20e1954f 656 info, &temp_saddr);
5fbba8ac
ED
657 if (rt)
658 ip6_rt_put(rt);
659
660 kfree_skb(skb2);
661
662 return 0;
663}
664EXPORT_SYMBOL(ip6_err_gen_icmpv6_unreach);
665
1da177e4
LT
666static void icmpv6_echo_reply(struct sk_buff *skb)
667{
c346dca1 668 struct net *net = dev_net(skb->dev);
84427d53 669 struct sock *sk;
1da177e4 670 struct inet6_dev *idev;
84427d53 671 struct ipv6_pinfo *np;
b71d1d42 672 const struct in6_addr *saddr = NULL;
cc70ab26 673 struct icmp6hdr *icmph = icmp6_hdr(skb);
1da177e4 674 struct icmp6hdr tmp_hdr;
4c9483b2 675 struct flowi6 fl6;
1da177e4
LT
676 struct icmpv6_msg msg;
677 struct dst_entry *dst;
26879da5 678 struct ipcm6_cookie ipc6;
e110861f 679 u32 mark = IP6_REPLY_MARK(net, skb->mark);
c14ac945 680 struct sockcm_cookie sockc_unused = {0};
1da177e4 681
0660e03f 682 saddr = &ipv6_hdr(skb)->daddr;
1da177e4 683
509aba3b 684 if (!ipv6_unicast_destination(skb) &&
ec35b61e 685 !(net->ipv6.sysctl.anycast_src_echo_reply &&
2647a9b0 686 ipv6_anycast_destination(skb_dst(skb), saddr)))
1da177e4
LT
687 saddr = NULL;
688
689 memcpy(&tmp_hdr, icmph, sizeof(tmp_hdr));
690 tmp_hdr.icmp6_type = ICMPV6_ECHO_REPLY;
691
4c9483b2
DM
692 memset(&fl6, 0, sizeof(fl6));
693 fl6.flowi6_proto = IPPROTO_ICMPV6;
4e3fd7a0 694 fl6.daddr = ipv6_hdr(skb)->saddr;
1da177e4 695 if (saddr)
4e3fd7a0 696 fl6.saddr = *saddr;
1b70d792 697 fl6.flowi6_oif = icmp6_iif(skb);
1958b856 698 fl6.fl6_icmp_type = ICMPV6_ECHO_REPLY;
e110861f 699 fl6.flowi6_mark = mark;
e2d118a1 700 fl6.flowi6_uid = sock_net_uid(net, NULL);
4c9483b2 701 security_skb_classify_flow(skb, flowi6_to_flowi(&fl6));
1da177e4 702
7ba91ecb 703 local_bh_disable();
fdc0bde9 704 sk = icmpv6_xmit_lock(net);
63159f29 705 if (!sk)
7ba91ecb 706 goto out_bh_enable;
e110861f 707 sk->sk_mark = mark;
fdc0bde9 708 np = inet6_sk(sk);
405666db 709
4c9483b2
DM
710 if (!fl6.flowi6_oif && ipv6_addr_is_multicast(&fl6.daddr))
711 fl6.flowi6_oif = np->mcast_oif;
c4062dfc
EH
712 else if (!fl6.flowi6_oif)
713 fl6.flowi6_oif = np->ucast_oif;
1da177e4 714
4e64b1ed 715 if (ip6_dst_lookup(net, sk, &dst, &fl6))
1da177e4 716 goto out;
4c9483b2 717 dst = xfrm_lookup(net, dst, flowi6_to_flowi(&fl6), sk, 0);
452edd59 718 if (IS_ERR(dst))
e104411b 719 goto out;
1da177e4 720
cfdf7647 721 idev = __in6_dev_get(skb->dev);
1da177e4
LT
722
723 msg.skb = skb;
724 msg.offset = 0;
763ecff1 725 msg.type = ICMPV6_ECHO_REPLY;
1da177e4 726
b515430a 727 ipcm6_init_sk(&ipc6, np);
26879da5
WW
728 ipc6.hlimit = ip6_sk_dst_hoplimit(np, &fl6, dst);
729 ipc6.tclass = ipv6_get_dsfield(ipv6_hdr(skb));
26879da5 730
4e64b1ed
JP
731 if (ip6_append_data(sk, icmpv6_getfrag, &msg,
732 skb->len + sizeof(struct icmp6hdr),
733 sizeof(struct icmp6hdr), &ipc6, &fl6,
734 (struct rt6_info *)dst, MSG_DONTWAIT,
735 &sockc_unused)) {
a16292a0 736 __ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTERRORS);
1da177e4 737 ip6_flush_pending_frames(sk);
cfdf7647 738 } else {
4e64b1ed
JP
739 icmpv6_push_pending_frames(sk, &fl6, &tmp_hdr,
740 skb->len + sizeof(struct icmp6hdr));
1da177e4 741 }
1da177e4 742 dst_release(dst);
1ab1457c 743out:
405666db 744 icmpv6_xmit_unlock(sk);
7ba91ecb
JDB
745out_bh_enable:
746 local_bh_enable();
1da177e4
LT
747}
748
b94f1c09 749void icmpv6_notify(struct sk_buff *skb, u8 type, u8 code, __be32 info)
1da177e4 750{
41135cc8 751 const struct inet6_protocol *ipprot;
1da177e4 752 int inner_offset;
75f2811c 753 __be16 frag_off;
f9242b6b 754 u8 nexthdr;
7304fe46 755 struct net *net = dev_net(skb->dev);
1da177e4
LT
756
757 if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
7304fe46 758 goto out;
1da177e4
LT
759
760 nexthdr = ((struct ipv6hdr *)skb->data)->nexthdr;
761 if (ipv6_ext_hdr(nexthdr)) {
762 /* now skip over extension headers */
75f2811c
JG
763 inner_offset = ipv6_skip_exthdr(skb, sizeof(struct ipv6hdr),
764 &nexthdr, &frag_off);
67ba4152 765 if (inner_offset < 0)
7304fe46 766 goto out;
1da177e4
LT
767 } else {
768 inner_offset = sizeof(struct ipv6hdr);
769 }
770
771 /* Checkin header including 8 bytes of inner protocol header. */
772 if (!pskb_may_pull(skb, inner_offset+8))
7304fe46 773 goto out;
1da177e4 774
1da177e4
LT
775 /* BUGGG_FUTURE: we should try to parse exthdrs in this packet.
776 Without this we will not able f.e. to make source routed
777 pmtu discovery.
778 Corresponding argument (opt) to notifiers is already added.
779 --ANK (980726)
780 */
781
f9242b6b 782 ipprot = rcu_dereference(inet6_protos[nexthdr]);
1da177e4
LT
783 if (ipprot && ipprot->err_handler)
784 ipprot->err_handler(skb, NULL, type, code, inner_offset, info);
1da177e4 785
69d6da0b 786 raw6_icmp_error(skb, nexthdr, type, code, inner_offset, info);
7304fe46
DJ
787 return;
788
789out:
a16292a0 790 __ICMP6_INC_STATS(net, __in6_dev_get(skb->dev), ICMP6_MIB_INERRORS);
1da177e4 791}
1ab1457c 792
1da177e4
LT
793/*
794 * Handle icmp messages
795 */
796
e5bbef20 797static int icmpv6_rcv(struct sk_buff *skb)
1da177e4 798{
1da177e4
LT
799 struct net_device *dev = skb->dev;
800 struct inet6_dev *idev = __in6_dev_get(dev);
b71d1d42 801 const struct in6_addr *saddr, *daddr;
1da177e4 802 struct icmp6hdr *hdr;
d5fdd6ba 803 u8 type;
e3e32170 804 bool success = false;
1da177e4 805
aebcf82c 806 if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb)) {
def8b4fa 807 struct sec_path *sp = skb_sec_path(skb);
8b7817f3
HX
808 int nh;
809
def8b4fa 810 if (!(sp && sp->xvec[sp->len - 1]->props.flags &
aebcf82c
HX
811 XFRM_STATE_ICMP))
812 goto drop_no_count;
813
81aded24 814 if (!pskb_may_pull(skb, sizeof(*hdr) + sizeof(struct ipv6hdr)))
8b7817f3
HX
815 goto drop_no_count;
816
817 nh = skb_network_offset(skb);
818 skb_set_network_header(skb, sizeof(*hdr));
819
820 if (!xfrm6_policy_check_reverse(NULL, XFRM_POLICY_IN, skb))
821 goto drop_no_count;
822
823 skb_set_network_header(skb, nh);
824 }
825
a16292a0 826 __ICMP6_INC_STATS(dev_net(dev), idev, ICMP6_MIB_INMSGS);
1da177e4 827
0660e03f
ACM
828 saddr = &ipv6_hdr(skb)->saddr;
829 daddr = &ipv6_hdr(skb)->daddr;
1da177e4 830
39471ac8 831 if (skb_checksum_validate(skb, IPPROTO_ICMPV6, ip6_compute_pseudo)) {
ba7a46f1
JP
832 net_dbg_ratelimited("ICMPv6 checksum failed [%pI6c > %pI6c]\n",
833 saddr, daddr);
39471ac8 834 goto csum_error;
1da177e4
LT
835 }
836
8cf22943
HX
837 if (!pskb_pull(skb, sizeof(*hdr)))
838 goto discard_it;
1da177e4 839
cc70ab26 840 hdr = icmp6_hdr(skb);
1da177e4
LT
841
842 type = hdr->icmp6_type;
843
f3832ed2 844 ICMP6MSGIN_INC_STATS(dev_net(dev), idev, type);
1da177e4
LT
845
846 switch (type) {
847 case ICMPV6_ECHO_REQUEST:
848 icmpv6_echo_reply(skb);
849 break;
850
851 case ICMPV6_ECHO_REPLY:
e3e32170 852 success = ping_rcv(skb);
1da177e4
LT
853 break;
854
855 case ICMPV6_PKT_TOOBIG:
856 /* BUGGG_FUTURE: if packet contains rthdr, we cannot update
857 standard destination cache. Seems, only "advanced"
858 destination cache will allow to solve this problem
859 --ANK (980726)
860 */
861 if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
862 goto discard_it;
cc70ab26 863 hdr = icmp6_hdr(skb);
1da177e4 864
275757e6
GS
865 /* to notify */
866 /* fall through */
1da177e4
LT
867 case ICMPV6_DEST_UNREACH:
868 case ICMPV6_TIME_EXCEED:
869 case ICMPV6_PARAMPROB:
870 icmpv6_notify(skb, type, hdr->icmp6_code, hdr->icmp6_mtu);
871 break;
872
873 case NDISC_ROUTER_SOLICITATION:
874 case NDISC_ROUTER_ADVERTISEMENT:
875 case NDISC_NEIGHBOUR_SOLICITATION:
876 case NDISC_NEIGHBOUR_ADVERTISEMENT:
877 case NDISC_REDIRECT:
878 ndisc_rcv(skb);
879 break;
880
881 case ICMPV6_MGM_QUERY:
882 igmp6_event_query(skb);
883 break;
884
885 case ICMPV6_MGM_REPORT:
886 igmp6_event_report(skb);
887 break;
888
889 case ICMPV6_MGM_REDUCTION:
890 case ICMPV6_NI_QUERY:
891 case ICMPV6_NI_REPLY:
892 case ICMPV6_MLD2_REPORT:
893 case ICMPV6_DHAAD_REQUEST:
894 case ICMPV6_DHAAD_REPLY:
895 case ICMPV6_MOBILE_PREFIX_SOL:
896 case ICMPV6_MOBILE_PREFIX_ADV:
897 break;
898
899 default:
1da177e4
LT
900 /* informational */
901 if (type & ICMPV6_INFOMSG_MASK)
902 break;
903
4b3418fb
BM
904 net_dbg_ratelimited("icmpv6: msg of unknown type [%pI6c > %pI6c]\n",
905 saddr, daddr);
ea85a0a2 906
1ab1457c
YH
907 /*
908 * error of unknown type.
909 * must pass to upper level
1da177e4
LT
910 */
911
912 icmpv6_notify(skb, type, hdr->icmp6_code, hdr->icmp6_mtu);
3ff50b79
SH
913 }
914
e3e32170
RJ
915 /* until the v6 path can be better sorted assume failure and
916 * preserve the status quo behaviour for the rest of the paths to here
917 */
918 if (success)
919 consume_skb(skb);
920 else
921 kfree_skb(skb);
922
1da177e4
LT
923 return 0;
924
6a5dc9e5 925csum_error:
a16292a0 926 __ICMP6_INC_STATS(dev_net(dev), idev, ICMP6_MIB_CSUMERRORS);
1da177e4 927discard_it:
a16292a0 928 __ICMP6_INC_STATS(dev_net(dev), idev, ICMP6_MIB_INERRORS);
8b7817f3 929drop_no_count:
1da177e4
LT
930 kfree_skb(skb);
931 return 0;
932}
933
4c9483b2 934void icmpv6_flow_init(struct sock *sk, struct flowi6 *fl6,
95e41e93
YH
935 u8 type,
936 const struct in6_addr *saddr,
937 const struct in6_addr *daddr,
938 int oif)
939{
4c9483b2 940 memset(fl6, 0, sizeof(*fl6));
4e3fd7a0
AD
941 fl6->saddr = *saddr;
942 fl6->daddr = *daddr;
67ba4152 943 fl6->flowi6_proto = IPPROTO_ICMPV6;
1958b856
DM
944 fl6->fl6_icmp_type = type;
945 fl6->fl6_icmp_code = 0;
4c9483b2
DM
946 fl6->flowi6_oif = oif;
947 security_sk_classify_flow(sk, flowi6_to_flowi(fl6));
95e41e93
YH
948}
949
98c6d1b2 950static int __net_init icmpv6_sk_init(struct net *net)
1da177e4
LT
951{
952 struct sock *sk;
953 int err, i, j;
954
98c6d1b2 955 net->ipv6.icmp_sk =
6396bb22 956 kcalloc(nr_cpu_ids, sizeof(struct sock *), GFP_KERNEL);
63159f29 957 if (!net->ipv6.icmp_sk)
79c91159
DL
958 return -ENOMEM;
959
6f912042 960 for_each_possible_cpu(i) {
1ed8516f
DL
961 err = inet_ctl_sock_create(&sk, PF_INET6,
962 SOCK_RAW, IPPROTO_ICMPV6, net);
1da177e4 963 if (err < 0) {
f3213831 964 pr_err("Failed to initialize the ICMP6 control socket (err %d)\n",
1da177e4
LT
965 err);
966 goto fail;
967 }
968
1ed8516f 969 net->ipv6.icmp_sk[i] = sk;
5c8cafd6 970
1da177e4
LT
971 /* Enough space for 2 64K ICMP packets, including
972 * sk_buff struct overhead.
973 */
87fb4b7b 974 sk->sk_sndbuf = 2 * SKB_TRUESIZE(64 * 1024);
1da177e4 975 }
1da177e4
LT
976 return 0;
977
978 fail:
5c8cafd6 979 for (j = 0; j < i; j++)
1ed8516f 980 inet_ctl_sock_destroy(net->ipv6.icmp_sk[j]);
98c6d1b2 981 kfree(net->ipv6.icmp_sk);
1da177e4
LT
982 return err;
983}
984
98c6d1b2 985static void __net_exit icmpv6_sk_exit(struct net *net)
1da177e4
LT
986{
987 int i;
988
6f912042 989 for_each_possible_cpu(i) {
1ed8516f 990 inet_ctl_sock_destroy(net->ipv6.icmp_sk[i]);
1da177e4 991 }
98c6d1b2
DL
992 kfree(net->ipv6.icmp_sk);
993}
994
8ed7edce 995static struct pernet_operations icmpv6_sk_ops = {
67ba4152
IM
996 .init = icmpv6_sk_init,
997 .exit = icmpv6_sk_exit,
98c6d1b2
DL
998};
999
1000int __init icmpv6_init(void)
1001{
1002 int err;
1003
1004 err = register_pernet_subsys(&icmpv6_sk_ops);
1005 if (err < 0)
1006 return err;
1007
1008 err = -EAGAIN;
1009 if (inet6_add_protocol(&icmpv6_protocol, IPPROTO_ICMPV6) < 0)
1010 goto fail;
5f5624cf
PS
1011
1012 err = inet6_register_icmp_sender(icmp6_send);
1013 if (err)
1014 goto sender_reg_err;
98c6d1b2
DL
1015 return 0;
1016
5f5624cf
PS
1017sender_reg_err:
1018 inet6_del_protocol(&icmpv6_protocol, IPPROTO_ICMPV6);
98c6d1b2 1019fail:
f3213831 1020 pr_err("Failed to register ICMP6 protocol\n");
98c6d1b2
DL
1021 unregister_pernet_subsys(&icmpv6_sk_ops);
1022 return err;
1023}
1024
8ed7edce 1025void icmpv6_cleanup(void)
98c6d1b2 1026{
5f5624cf 1027 inet6_unregister_icmp_sender(icmp6_send);
98c6d1b2 1028 unregister_pernet_subsys(&icmpv6_sk_ops);
1da177e4
LT
1029 inet6_del_protocol(&icmpv6_protocol, IPPROTO_ICMPV6);
1030}
1031
98c6d1b2 1032
9b5b5cff 1033static const struct icmp6_err {
1da177e4
LT
1034 int err;
1035 int fatal;
1036} tab_unreach[] = {
1037 { /* NOROUTE */
1038 .err = ENETUNREACH,
1039 .fatal = 0,
1040 },
1041 { /* ADM_PROHIBITED */
1042 .err = EACCES,
1043 .fatal = 1,
1044 },
1045 { /* Was NOT_NEIGHBOUR, now reserved */
1046 .err = EHOSTUNREACH,
1047 .fatal = 0,
1048 },
1049 { /* ADDR_UNREACH */
1050 .err = EHOSTUNREACH,
1051 .fatal = 0,
1052 },
1053 { /* PORT_UNREACH */
1054 .err = ECONNREFUSED,
1055 .fatal = 1,
1056 },
61e76b17
JB
1057 { /* POLICY_FAIL */
1058 .err = EACCES,
1059 .fatal = 1,
1060 },
1061 { /* REJECT_ROUTE */
1062 .err = EACCES,
1063 .fatal = 1,
1064 },
1da177e4
LT
1065};
1066
d5fdd6ba 1067int icmpv6_err_convert(u8 type, u8 code, int *err)
1da177e4
LT
1068{
1069 int fatal = 0;
1070
1071 *err = EPROTO;
1072
1073 switch (type) {
1074 case ICMPV6_DEST_UNREACH:
1075 fatal = 1;
61e76b17 1076 if (code < ARRAY_SIZE(tab_unreach)) {
1da177e4
LT
1077 *err = tab_unreach[code].err;
1078 fatal = tab_unreach[code].fatal;
1079 }
1080 break;
1081
1082 case ICMPV6_PKT_TOOBIG:
1083 *err = EMSGSIZE;
1084 break;
1ab1457c 1085
1da177e4
LT
1086 case ICMPV6_PARAMPROB:
1087 *err = EPROTO;
1088 fatal = 1;
1089 break;
1090
1091 case ICMPV6_TIME_EXCEED:
1092 *err = EHOSTUNREACH;
1093 break;
3ff50b79 1094 }
1da177e4
LT
1095
1096 return fatal;
1097}
7159039a
YH
1098EXPORT_SYMBOL(icmpv6_err_convert);
1099
1da177e4 1100#ifdef CONFIG_SYSCTL
e8243534 1101static struct ctl_table ipv6_icmp_table_template[] = {
1da177e4 1102 {
1da177e4 1103 .procname = "ratelimit",
41a76906 1104 .data = &init_net.ipv6.sysctl.icmpv6_time,
1da177e4
LT
1105 .maxlen = sizeof(int),
1106 .mode = 0644,
6d9f239a 1107 .proc_handler = proc_dointvec_ms_jiffies,
1da177e4 1108 },
f8572d8f 1109 { },
1da177e4 1110};
760f2d01 1111
2c8c1e72 1112struct ctl_table * __net_init ipv6_icmp_sysctl_init(struct net *net)
760f2d01
DL
1113{
1114 struct ctl_table *table;
1115
1116 table = kmemdup(ipv6_icmp_table_template,
1117 sizeof(ipv6_icmp_table_template),
1118 GFP_KERNEL);
5ee09105 1119
c027aab4 1120 if (table)
5ee09105
YH
1121 table[0].data = &net->ipv6.sysctl.icmpv6_time;
1122
760f2d01
DL
1123 return table;
1124}
1da177e4 1125#endif