ptp_qoriq: support automatic configuration for ptp timer
[linux-block.git] / net / ipv6 / icmp.c
CommitLineData
1da177e4
LT
1/*
2 * Internet Control Message Protocol (ICMPv6)
3 * Linux INET6 implementation
4 *
5 * Authors:
6 * Pedro Roque <roque@di.fc.ul.pt>
7 *
1da177e4
LT
8 * Based on net/ipv4/icmp.c
9 *
10 * RFC 1885
11 *
12 * This program is free software; you can redistribute it and/or
13 * modify it under the terms of the GNU General Public License
14 * as published by the Free Software Foundation; either version
15 * 2 of the License, or (at your option) any later version.
16 */
17
18/*
19 * Changes:
20 *
21 * Andi Kleen : exception handling
22 * Andi Kleen add rate limits. never reply to a icmp.
23 * add more length checks and other fixes.
24 * yoshfuji : ensure to sent parameter problem for
25 * fragments.
26 * YOSHIFUJI Hideaki @USAGI: added sysctl for icmp rate limit.
27 * Randy Dunlap and
28 * YOSHIFUJI Hideaki @USAGI: Per-interface statistics support
29 * Kazunori MIYAZAWA @USAGI: change output process to use ip6_append_data
30 */
31
f3213831
JP
32#define pr_fmt(fmt) "IPv6: " fmt
33
1da177e4
LT
34#include <linux/module.h>
35#include <linux/errno.h>
36#include <linux/types.h>
37#include <linux/socket.h>
38#include <linux/in.h>
39#include <linux/kernel.h>
1da177e4
LT
40#include <linux/sockios.h>
41#include <linux/net.h>
42#include <linux/skbuff.h>
43#include <linux/init.h>
763ecff1 44#include <linux/netfilter.h>
5a0e3ad6 45#include <linux/slab.h>
1da177e4
LT
46
47#ifdef CONFIG_SYSCTL
48#include <linux/sysctl.h>
49#endif
50
51#include <linux/inet.h>
52#include <linux/netdevice.h>
53#include <linux/icmpv6.h>
54
55#include <net/ip.h>
56#include <net/sock.h>
57
58#include <net/ipv6.h>
59#include <net/ip6_checksum.h>
6d0bfe22 60#include <net/ping.h>
1da177e4
LT
61#include <net/protocol.h>
62#include <net/raw.h>
63#include <net/rawv6.h>
64#include <net/transp_v6.h>
65#include <net/ip6_route.h>
66#include <net/addrconf.h>
67#include <net/icmp.h>
8b7817f3 68#include <net/xfrm.h>
1ed8516f 69#include <net/inet_common.h>
825edac4 70#include <net/dsfield.h>
ca254490 71#include <net/l3mdev.h>
1da177e4 72
7c0f6ba6 73#include <linux/uaccess.h>
1da177e4 74
1da177e4
LT
75/*
76 * The ICMP socket(s). This is the most convenient way to flow control
77 * our ICMP output as well as maintain a clean interface throughout
78 * all layers. All Socketless IP sends will soon be gone.
79 *
80 * On SMP we have one ICMP socket per-cpu.
81 */
98c6d1b2
DL
82static inline struct sock *icmpv6_sk(struct net *net)
83{
84 return net->ipv6.icmp_sk[smp_processor_id()];
85}
1da177e4 86
6f809da2
SK
87static void icmpv6_err(struct sk_buff *skb, struct inet6_skb_parm *opt,
88 u8 type, u8 code, int offset, __be32 info)
89{
6d0bfe22
LC
90 /* icmpv6_notify checks 8 bytes can be pulled, icmp6hdr is 8 bytes */
91 struct icmp6hdr *icmp6 = (struct icmp6hdr *) (skb->data + offset);
6f809da2
SK
92 struct net *net = dev_net(skb->dev);
93
94 if (type == ICMPV6_PKT_TOOBIG)
e2d118a1 95 ip6_update_pmtu(skb, net, info, 0, 0, sock_net_uid(net, NULL));
6f809da2 96 else if (type == NDISC_REDIRECT)
e2d118a1
LC
97 ip6_redirect(skb, net, skb->dev->ifindex, 0,
98 sock_net_uid(net, NULL));
6d0bfe22
LC
99
100 if (!(type & ICMPV6_INFOMSG_MASK))
101 if (icmp6->icmp6_type == ICMPV6_ECHO_REQUEST)
dcb94b88 102 ping_err(skb, offset, ntohl(info));
6f809da2
SK
103}
104
e5bbef20 105static int icmpv6_rcv(struct sk_buff *skb);
1da177e4 106
41135cc8 107static const struct inet6_protocol icmpv6_protocol = {
1da177e4 108 .handler = icmpv6_rcv,
6f809da2 109 .err_handler = icmpv6_err,
8b7817f3 110 .flags = INET6_PROTO_NOPOLICY|INET6_PROTO_FINAL,
1da177e4
LT
111};
112
7ba91ecb 113/* Called with BH disabled */
fdc0bde9 114static __inline__ struct sock *icmpv6_xmit_lock(struct net *net)
1da177e4 115{
fdc0bde9
DL
116 struct sock *sk;
117
fdc0bde9 118 sk = icmpv6_sk(net);
405666db 119 if (unlikely(!spin_trylock(&sk->sk_lock.slock))) {
1da177e4
LT
120 /* This can happen if the output path (f.e. SIT or
121 * ip6ip6 tunnel) signals dst_link_failure() for an
122 * outgoing ICMP6 packet.
123 */
fdc0bde9 124 return NULL;
1da177e4 125 }
fdc0bde9 126 return sk;
1da177e4
LT
127}
128
405666db 129static __inline__ void icmpv6_xmit_unlock(struct sock *sk)
1da177e4 130{
7ba91ecb 131 spin_unlock(&sk->sk_lock.slock);
1da177e4
LT
132}
133
1da177e4
LT
134/*
135 * Figure out, may we reply to this packet with icmp error.
136 *
137 * We do not reply, if:
138 * - it was icmp error message.
139 * - it is truncated, so that it is known, that protocol is ICMPV6
140 * (i.e. in the middle of some exthdr)
141 *
142 * --ANK (980726)
143 */
144
a50feda5 145static bool is_ineligible(const struct sk_buff *skb)
1da177e4 146{
0660e03f 147 int ptr = (u8 *)(ipv6_hdr(skb) + 1) - skb->data;
1da177e4 148 int len = skb->len - ptr;
0660e03f 149 __u8 nexthdr = ipv6_hdr(skb)->nexthdr;
75f2811c 150 __be16 frag_off;
1da177e4
LT
151
152 if (len < 0)
a50feda5 153 return true;
1da177e4 154
75f2811c 155 ptr = ipv6_skip_exthdr(skb, ptr, &nexthdr, &frag_off);
1da177e4 156 if (ptr < 0)
a50feda5 157 return false;
1da177e4
LT
158 if (nexthdr == IPPROTO_ICMPV6) {
159 u8 _type, *tp;
160 tp = skb_header_pointer(skb,
161 ptr+offsetof(struct icmp6hdr, icmp6_type),
162 sizeof(_type), &_type);
63159f29 163 if (!tp || !(*tp & ICMPV6_INFOMSG_MASK))
a50feda5 164 return true;
1da177e4 165 }
a50feda5 166 return false;
1da177e4
LT
167}
168
c0303efe
JDB
169static bool icmpv6_mask_allow(int type)
170{
171 /* Informational messages are not limited. */
172 if (type & ICMPV6_INFOMSG_MASK)
173 return true;
174
175 /* Do not limit pmtu discovery, it would break it. */
176 if (type == ICMPV6_PKT_TOOBIG)
177 return true;
178
179 return false;
180}
181
182static bool icmpv6_global_allow(int type)
183{
184 if (icmpv6_mask_allow(type))
185 return true;
186
187 if (icmp_global_allow())
188 return true;
189
190 return false;
191}
192
1ab1457c
YH
193/*
194 * Check the ICMP output rate limit
1da177e4 195 */
4cdf507d
ED
196static bool icmpv6_xrlim_allow(struct sock *sk, u8 type,
197 struct flowi6 *fl6)
1da177e4 198{
3b1e0a65 199 struct net *net = sock_net(sk);
4cdf507d 200 struct dst_entry *dst;
92d86829 201 bool res = false;
1da177e4 202
c0303efe 203 if (icmpv6_mask_allow(type))
92d86829 204 return true;
1da177e4 205
1ab1457c 206 /*
1da177e4
LT
207 * Look up the output route.
208 * XXX: perhaps the expire for routing entries cloned by
209 * this lookup should be more aggressive (not longer than timeout).
210 */
4c9483b2 211 dst = ip6_route_output(net, sk, fl6);
1da177e4 212 if (dst->error) {
3bd653c8 213 IP6_INC_STATS(net, ip6_dst_idev(dst),
a11d206d 214 IPSTATS_MIB_OUTNOROUTES);
1da177e4 215 } else if (dst->dev && (dst->dev->flags&IFF_LOOPBACK)) {
92d86829 216 res = true;
1da177e4
LT
217 } else {
218 struct rt6_info *rt = (struct rt6_info *)dst;
9a43b709 219 int tmo = net->ipv6.sysctl.icmpv6_time;
c0303efe 220 struct inet_peer *peer;
1da177e4
LT
221
222 /* Give more bandwidth to wider prefixes. */
223 if (rt->rt6i_dst.plen < 128)
224 tmo >>= ((128 - rt->rt6i_dst.plen)>>5);
225
c0303efe
JDB
226 peer = inet_getpeer_v6(net->ipv6.peers, &fl6->daddr, 1);
227 res = inet_peer_xrlim_allow(peer, tmo);
228 if (peer)
229 inet_putpeer(peer);
1da177e4
LT
230 }
231 dst_release(dst);
232 return res;
233}
234
235/*
236 * an inline helper for the "simple" if statement below
237 * checks if parameter problem report is caused by an
1ab1457c 238 * unrecognized IPv6 option that has the Option Type
1da177e4
LT
239 * highest-order two bits set to 10
240 */
241
a50feda5 242static bool opt_unrec(struct sk_buff *skb, __u32 offset)
1da177e4
LT
243{
244 u8 _optval, *op;
245
bbe735e4 246 offset += skb_network_offset(skb);
1da177e4 247 op = skb_header_pointer(skb, offset, sizeof(_optval), &_optval);
63159f29 248 if (!op)
a50feda5 249 return true;
1da177e4
LT
250 return (*op & 0xC0) == 0x80;
251}
252
4e64b1ed
JP
253void icmpv6_push_pending_frames(struct sock *sk, struct flowi6 *fl6,
254 struct icmp6hdr *thdr, int len)
1da177e4
LT
255{
256 struct sk_buff *skb;
257 struct icmp6hdr *icmp6h;
1da177e4 258
e5d08d71 259 skb = skb_peek(&sk->sk_write_queue);
63159f29 260 if (!skb)
4e64b1ed 261 return;
1da177e4 262
cc70ab26 263 icmp6h = icmp6_hdr(skb);
1da177e4
LT
264 memcpy(icmp6h, thdr, sizeof(struct icmp6hdr));
265 icmp6h->icmp6_cksum = 0;
266
267 if (skb_queue_len(&sk->sk_write_queue) == 1) {
07f0757a 268 skb->csum = csum_partial(icmp6h,
1da177e4 269 sizeof(struct icmp6hdr), skb->csum);
4c9483b2
DM
270 icmp6h->icmp6_cksum = csum_ipv6_magic(&fl6->saddr,
271 &fl6->daddr,
272 len, fl6->flowi6_proto,
1da177e4
LT
273 skb->csum);
274 } else {
868c86bc 275 __wsum tmp_csum = 0;
1da177e4
LT
276
277 skb_queue_walk(&sk->sk_write_queue, skb) {
278 tmp_csum = csum_add(tmp_csum, skb->csum);
279 }
280
07f0757a 281 tmp_csum = csum_partial(icmp6h,
1da177e4 282 sizeof(struct icmp6hdr), tmp_csum);
4c9483b2
DM
283 icmp6h->icmp6_cksum = csum_ipv6_magic(&fl6->saddr,
284 &fl6->daddr,
285 len, fl6->flowi6_proto,
868c86bc 286 tmp_csum);
1da177e4 287 }
1da177e4 288 ip6_push_pending_frames(sk);
1da177e4
LT
289}
290
291struct icmpv6_msg {
292 struct sk_buff *skb;
293 int offset;
763ecff1 294 uint8_t type;
1da177e4
LT
295};
296
297static int icmpv6_getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb)
298{
299 struct icmpv6_msg *msg = (struct icmpv6_msg *) from;
300 struct sk_buff *org_skb = msg->skb;
5f92a738 301 __wsum csum = 0;
1da177e4
LT
302
303 csum = skb_copy_and_csum_bits(org_skb, msg->offset + offset,
304 to, len, csum);
305 skb->csum = csum_block_add(skb->csum, csum, odd);
763ecff1
YK
306 if (!(msg->type & ICMPV6_INFOMSG_MASK))
307 nf_ct_attach(skb, org_skb);
1da177e4
LT
308 return 0;
309}
310
07a93626 311#if IS_ENABLED(CONFIG_IPV6_MIP6)
79383236
MN
312static void mip6_addr_swap(struct sk_buff *skb)
313{
0660e03f 314 struct ipv6hdr *iph = ipv6_hdr(skb);
79383236
MN
315 struct inet6_skb_parm *opt = IP6CB(skb);
316 struct ipv6_destopt_hao *hao;
317 struct in6_addr tmp;
318 int off;
319
320 if (opt->dsthao) {
321 off = ipv6_find_tlv(skb, opt->dsthao, IPV6_TLV_HAO);
322 if (likely(off >= 0)) {
d56f90a7
ACM
323 hao = (struct ipv6_destopt_hao *)
324 (skb_network_header(skb) + off);
4e3fd7a0
AD
325 tmp = iph->saddr;
326 iph->saddr = hao->addr;
327 hao->addr = tmp;
79383236
MN
328 }
329 }
330}
331#else
332static inline void mip6_addr_swap(struct sk_buff *skb) {}
333#endif
334
e8243534 335static struct dst_entry *icmpv6_route_lookup(struct net *net,
336 struct sk_buff *skb,
337 struct sock *sk,
338 struct flowi6 *fl6)
b42835db
DM
339{
340 struct dst_entry *dst, *dst2;
4c9483b2 341 struct flowi6 fl2;
b42835db
DM
342 int err;
343
343d60aa 344 err = ip6_dst_lookup(net, sk, &dst, fl6);
b42835db
DM
345 if (err)
346 return ERR_PTR(err);
347
348 /*
349 * We won't send icmp if the destination is known
350 * anycast.
351 */
2647a9b0 352 if (ipv6_anycast_destination(dst, &fl6->daddr)) {
ba7a46f1 353 net_dbg_ratelimited("icmp6_send: acast source\n");
b42835db
DM
354 dst_release(dst);
355 return ERR_PTR(-EINVAL);
356 }
357
358 /* No need to clone since we're just using its address. */
359 dst2 = dst;
360
4c9483b2 361 dst = xfrm_lookup(net, dst, flowi6_to_flowi(fl6), sk, 0);
452edd59 362 if (!IS_ERR(dst)) {
b42835db
DM
363 if (dst != dst2)
364 return dst;
452edd59
DM
365 } else {
366 if (PTR_ERR(dst) == -EPERM)
367 dst = NULL;
368 else
369 return dst;
b42835db
DM
370 }
371
4c9483b2 372 err = xfrm_decode_session_reverse(skb, flowi6_to_flowi(&fl2), AF_INET6);
b42835db
DM
373 if (err)
374 goto relookup_failed;
375
343d60aa 376 err = ip6_dst_lookup(net, sk, &dst2, &fl2);
b42835db
DM
377 if (err)
378 goto relookup_failed;
379
4c9483b2 380 dst2 = xfrm_lookup(net, dst2, flowi6_to_flowi(&fl2), sk, XFRM_LOOKUP_ICMP);
452edd59 381 if (!IS_ERR(dst2)) {
b42835db
DM
382 dst_release(dst);
383 dst = dst2;
452edd59
DM
384 } else {
385 err = PTR_ERR(dst2);
386 if (err == -EPERM) {
387 dst_release(dst);
388 return dst2;
389 } else
390 goto relookup_failed;
b42835db
DM
391 }
392
393relookup_failed:
394 if (dst)
395 return dst;
396 return ERR_PTR(err);
397}
398
1b70d792
DA
399static int icmp6_iif(const struct sk_buff *skb)
400{
401 int iif = skb->dev->ifindex;
402
403 /* for local traffic to local address, skb dev is the loopback
404 * device. Check if there is a dst attached to the skb and if so
24b711ed
DA
405 * get the real device index. Same is needed for replies to a link
406 * local address on a device enslaved to an L3 master device
1b70d792 407 */
24b711ed 408 if (unlikely(iif == LOOPBACK_IFINDEX || netif_is_l3_master(skb->dev))) {
1b70d792
DA
409 const struct rt6_info *rt6 = skb_rt6_info(skb);
410
411 if (rt6)
412 iif = rt6->rt6i_idev->dev->ifindex;
413 }
414
415 return iif;
416}
417
1da177e4
LT
418/*
419 * Send an ICMP message in response to a packet in error
420 */
b1cadc1a
ED
421static void icmp6_send(struct sk_buff *skb, u8 type, u8 code, __u32 info,
422 const struct in6_addr *force_saddr)
1da177e4 423{
c346dca1 424 struct net *net = dev_net(skb->dev);
1da177e4 425 struct inet6_dev *idev = NULL;
0660e03f 426 struct ipv6hdr *hdr = ipv6_hdr(skb);
84427d53
YH
427 struct sock *sk;
428 struct ipv6_pinfo *np;
b71d1d42 429 const struct in6_addr *saddr = NULL;
1da177e4
LT
430 struct dst_entry *dst;
431 struct icmp6hdr tmp_hdr;
4c9483b2 432 struct flowi6 fl6;
1da177e4 433 struct icmpv6_msg msg;
26879da5 434 struct ipcm6_cookie ipc6;
1da177e4
LT
435 int iif = 0;
436 int addr_type = 0;
437 int len;
e110861f 438 u32 mark = IP6_REPLY_MARK(net, skb->mark);
1da177e4 439
27a884dc 440 if ((u8 *)hdr < skb->head ||
29a3cad5 441 (skb_network_header(skb) + sizeof(*hdr)) > skb_tail_pointer(skb))
1da177e4
LT
442 return;
443
444 /*
1ab1457c 445 * Make sure we respect the rules
1da177e4 446 * i.e. RFC 1885 2.4(e)
5f5624cf 447 * Rule (e.1) is enforced by not using icmp6_send
1da177e4
LT
448 * in any code that processes icmp errors.
449 */
450 addr_type = ipv6_addr_type(&hdr->daddr);
451
446fab59 452 if (ipv6_chk_addr(net, &hdr->daddr, skb->dev, 0) ||
d94c1f92 453 ipv6_chk_acast_addr_src(net, skb->dev, &hdr->daddr))
1da177e4
LT
454 saddr = &hdr->daddr;
455
456 /*
457 * Dest addr check
458 */
459
9a6b4b39 460 if (addr_type & IPV6_ADDR_MULTICAST || skb->pkt_type != PACKET_HOST) {
1da177e4 461 if (type != ICMPV6_PKT_TOOBIG &&
1ab1457c
YH
462 !(type == ICMPV6_PARAMPROB &&
463 code == ICMPV6_UNK_OPTION &&
1da177e4
LT
464 (opt_unrec(skb, info))))
465 return;
466
467 saddr = NULL;
468 }
469
470 addr_type = ipv6_addr_type(&hdr->saddr);
471
472 /*
473 * Source addr check
474 */
475
4832c30d 476 if (__ipv6_addr_needs_scope_id(addr_type)) {
1b70d792 477 iif = icmp6_iif(skb);
4832c30d 478 } else {
79dc7e3f
DA
479 dst = skb_dst(skb);
480 iif = l3mdev_master_ifindex(dst ? dst->dev : skb->dev);
481 }
1da177e4
LT
482
483 /*
8de3351e
YH
484 * Must not send error if the source does not uniquely
485 * identify a single node (RFC2463 Section 2.4).
486 * We check unspecified / multicast addresses here,
487 * and anycast addresses will be checked later.
1da177e4
LT
488 */
489 if ((addr_type == IPV6_ADDR_ANY) || (addr_type & IPV6_ADDR_MULTICAST)) {
4b3418fb
BM
490 net_dbg_ratelimited("icmp6_send: addr_any/mcast source [%pI6c > %pI6c]\n",
491 &hdr->saddr, &hdr->daddr);
1da177e4
LT
492 return;
493 }
494
1ab1457c 495 /*
1da177e4
LT
496 * Never answer to a ICMP packet.
497 */
498 if (is_ineligible(skb)) {
4b3418fb
BM
499 net_dbg_ratelimited("icmp6_send: no reply to icmp error [%pI6c > %pI6c]\n",
500 &hdr->saddr, &hdr->daddr);
1da177e4
LT
501 return;
502 }
503
7ba91ecb
JDB
504 /* Needed by both icmp_global_allow and icmpv6_xmit_lock */
505 local_bh_disable();
506
507 /* Check global sysctl_icmp_msgs_per_sec ratelimit */
849a44de 508 if (!(skb->dev->flags&IFF_LOOPBACK) && !icmpv6_global_allow(type))
7ba91ecb
JDB
509 goto out_bh_enable;
510
79383236
MN
511 mip6_addr_swap(skb);
512
4c9483b2
DM
513 memset(&fl6, 0, sizeof(fl6));
514 fl6.flowi6_proto = IPPROTO_ICMPV6;
4e3fd7a0 515 fl6.daddr = hdr->saddr;
b1cadc1a
ED
516 if (force_saddr)
517 saddr = force_saddr;
1da177e4 518 if (saddr)
4e3fd7a0 519 fl6.saddr = *saddr;
e110861f 520 fl6.flowi6_mark = mark;
4c9483b2 521 fl6.flowi6_oif = iif;
1958b856
DM
522 fl6.fl6_icmp_type = type;
523 fl6.fl6_icmp_code = code;
e2d118a1 524 fl6.flowi6_uid = sock_net_uid(net, NULL);
b4bac172 525 fl6.mp_hash = rt6_multipath_hash(net, &fl6, skb, NULL);
4c9483b2 526 security_skb_classify_flow(skb, flowi6_to_flowi(&fl6));
1da177e4 527
fdc0bde9 528 sk = icmpv6_xmit_lock(net);
63159f29 529 if (!sk)
7ba91ecb 530 goto out_bh_enable;
c0303efe 531
e110861f 532 sk->sk_mark = mark;
fdc0bde9 533 np = inet6_sk(sk);
405666db 534
4c9483b2 535 if (!icmpv6_xrlim_allow(sk, type, &fl6))
1da177e4
LT
536 goto out;
537
538 tmp_hdr.icmp6_type = type;
539 tmp_hdr.icmp6_code = code;
540 tmp_hdr.icmp6_cksum = 0;
541 tmp_hdr.icmp6_pointer = htonl(info);
542
4c9483b2
DM
543 if (!fl6.flowi6_oif && ipv6_addr_is_multicast(&fl6.daddr))
544 fl6.flowi6_oif = np->mcast_oif;
c4062dfc
EH
545 else if (!fl6.flowi6_oif)
546 fl6.flowi6_oif = np->ucast_oif;
1da177e4 547
b515430a 548 ipcm6_init_sk(&ipc6, np);
38b7097b
HFS
549 fl6.flowlabel = ip6_make_flowinfo(ipc6.tclass, fl6.flowlabel);
550
4c9483b2 551 dst = icmpv6_route_lookup(net, skb, sk, &fl6);
b42835db 552 if (IS_ERR(dst))
1da177e4 553 goto out;
8de3351e 554
26879da5 555 ipc6.hlimit = ip6_sk_dst_hoplimit(np, &fl6, dst);
1da177e4
LT
556
557 msg.skb = skb;
bbe735e4 558 msg.offset = skb_network_offset(skb);
763ecff1 559 msg.type = type;
1da177e4
LT
560
561 len = skb->len - msg.offset;
67ba4152 562 len = min_t(unsigned int, len, IPV6_MIN_MTU - sizeof(struct ipv6hdr) - sizeof(struct icmp6hdr));
1da177e4 563 if (len < 0) {
4b3418fb
BM
564 net_dbg_ratelimited("icmp: len problem [%pI6c > %pI6c]\n",
565 &hdr->saddr, &hdr->daddr);
1da177e4
LT
566 goto out_dst_release;
567 }
568
cfdf7647
ED
569 rcu_read_lock();
570 idev = __in6_dev_get(skb->dev);
1da177e4 571
4e64b1ed
JP
572 if (ip6_append_data(sk, icmpv6_getfrag, &msg,
573 len + sizeof(struct icmp6hdr),
574 sizeof(struct icmp6hdr),
575 &ipc6, &fl6, (struct rt6_info *)dst,
5fdaa88d 576 MSG_DONTWAIT)) {
43a43b60 577 ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTERRORS);
1da177e4 578 ip6_flush_pending_frames(sk);
cfdf7647 579 } else {
4e64b1ed
JP
580 icmpv6_push_pending_frames(sk, &fl6, &tmp_hdr,
581 len + sizeof(struct icmp6hdr));
1da177e4 582 }
cfdf7647 583 rcu_read_unlock();
1da177e4
LT
584out_dst_release:
585 dst_release(dst);
586out:
405666db 587 icmpv6_xmit_unlock(sk);
7ba91ecb
JDB
588out_bh_enable:
589 local_bh_enable();
1da177e4 590}
5f5624cf
PS
591
592/* Slightly more convenient version of icmp6_send.
593 */
594void icmpv6_param_prob(struct sk_buff *skb, u8 code, int pos)
595{
b1cadc1a 596 icmp6_send(skb, ICMPV6_PARAMPROB, code, pos, NULL);
5f5624cf
PS
597 kfree_skb(skb);
598}
7159039a 599
5fbba8ac
ED
600/* Generate icmpv6 with type/code ICMPV6_DEST_UNREACH/ICMPV6_ADDR_UNREACH
601 * if sufficient data bytes are available
602 * @nhs is the size of the tunnel header(s) :
603 * Either an IPv4 header for SIT encap
604 * an IPv4 header + GRE header for GRE encap
605 */
20e1954f
ED
606int ip6_err_gen_icmpv6_unreach(struct sk_buff *skb, int nhs, int type,
607 unsigned int data_len)
5fbba8ac 608{
2d7a3b27 609 struct in6_addr temp_saddr;
5fbba8ac
ED
610 struct rt6_info *rt;
611 struct sk_buff *skb2;
20e1954f 612 u32 info = 0;
5fbba8ac
ED
613
614 if (!pskb_may_pull(skb, nhs + sizeof(struct ipv6hdr) + 8))
615 return 1;
616
20e1954f
ED
617 /* RFC 4884 (partial) support for ICMP extensions */
618 if (data_len < 128 || (data_len & 7) || skb->len < data_len)
619 data_len = 0;
620
621 skb2 = data_len ? skb_copy(skb, GFP_ATOMIC) : skb_clone(skb, GFP_ATOMIC);
5fbba8ac
ED
622
623 if (!skb2)
624 return 1;
625
626 skb_dst_drop(skb2);
627 skb_pull(skb2, nhs);
628 skb_reset_network_header(skb2);
629
b75cc8f9
DA
630 rt = rt6_lookup(dev_net(skb->dev), &ipv6_hdr(skb2)->saddr, NULL, 0,
631 skb, 0);
5fbba8ac
ED
632
633 if (rt && rt->dst.dev)
634 skb2->dev = rt->dst.dev;
635
2d7a3b27 636 ipv6_addr_set_v4mapped(ip_hdr(skb)->saddr, &temp_saddr);
20e1954f
ED
637
638 if (data_len) {
639 /* RFC 4884 (partial) support :
640 * insert 0 padding at the end, before the extensions
641 */
642 __skb_push(skb2, nhs);
643 skb_reset_network_header(skb2);
644 memmove(skb2->data, skb2->data + nhs, data_len - nhs);
645 memset(skb2->data + data_len - nhs, 0, nhs);
646 /* RFC 4884 4.5 : Length is measured in 64-bit words,
647 * and stored in reserved[0]
648 */
649 info = (data_len/8) << 24;
650 }
2d7a3b27
ED
651 if (type == ICMP_TIME_EXCEEDED)
652 icmp6_send(skb2, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT,
20e1954f 653 info, &temp_saddr);
2d7a3b27
ED
654 else
655 icmp6_send(skb2, ICMPV6_DEST_UNREACH, ICMPV6_ADDR_UNREACH,
20e1954f 656 info, &temp_saddr);
5fbba8ac
ED
657 if (rt)
658 ip6_rt_put(rt);
659
660 kfree_skb(skb2);
661
662 return 0;
663}
664EXPORT_SYMBOL(ip6_err_gen_icmpv6_unreach);
665
1da177e4
LT
666static void icmpv6_echo_reply(struct sk_buff *skb)
667{
c346dca1 668 struct net *net = dev_net(skb->dev);
84427d53 669 struct sock *sk;
1da177e4 670 struct inet6_dev *idev;
84427d53 671 struct ipv6_pinfo *np;
b71d1d42 672 const struct in6_addr *saddr = NULL;
cc70ab26 673 struct icmp6hdr *icmph = icmp6_hdr(skb);
1da177e4 674 struct icmp6hdr tmp_hdr;
4c9483b2 675 struct flowi6 fl6;
1da177e4
LT
676 struct icmpv6_msg msg;
677 struct dst_entry *dst;
26879da5 678 struct ipcm6_cookie ipc6;
e110861f 679 u32 mark = IP6_REPLY_MARK(net, skb->mark);
1da177e4 680
0660e03f 681 saddr = &ipv6_hdr(skb)->daddr;
1da177e4 682
509aba3b 683 if (!ipv6_unicast_destination(skb) &&
ec35b61e 684 !(net->ipv6.sysctl.anycast_src_echo_reply &&
2647a9b0 685 ipv6_anycast_destination(skb_dst(skb), saddr)))
1da177e4
LT
686 saddr = NULL;
687
688 memcpy(&tmp_hdr, icmph, sizeof(tmp_hdr));
689 tmp_hdr.icmp6_type = ICMPV6_ECHO_REPLY;
690
4c9483b2
DM
691 memset(&fl6, 0, sizeof(fl6));
692 fl6.flowi6_proto = IPPROTO_ICMPV6;
4e3fd7a0 693 fl6.daddr = ipv6_hdr(skb)->saddr;
1da177e4 694 if (saddr)
4e3fd7a0 695 fl6.saddr = *saddr;
1b70d792 696 fl6.flowi6_oif = icmp6_iif(skb);
1958b856 697 fl6.fl6_icmp_type = ICMPV6_ECHO_REPLY;
e110861f 698 fl6.flowi6_mark = mark;
e2d118a1 699 fl6.flowi6_uid = sock_net_uid(net, NULL);
4c9483b2 700 security_skb_classify_flow(skb, flowi6_to_flowi(&fl6));
1da177e4 701
7ba91ecb 702 local_bh_disable();
fdc0bde9 703 sk = icmpv6_xmit_lock(net);
63159f29 704 if (!sk)
7ba91ecb 705 goto out_bh_enable;
e110861f 706 sk->sk_mark = mark;
fdc0bde9 707 np = inet6_sk(sk);
405666db 708
4c9483b2
DM
709 if (!fl6.flowi6_oif && ipv6_addr_is_multicast(&fl6.daddr))
710 fl6.flowi6_oif = np->mcast_oif;
c4062dfc
EH
711 else if (!fl6.flowi6_oif)
712 fl6.flowi6_oif = np->ucast_oif;
1da177e4 713
4e64b1ed 714 if (ip6_dst_lookup(net, sk, &dst, &fl6))
1da177e4 715 goto out;
4c9483b2 716 dst = xfrm_lookup(net, dst, flowi6_to_flowi(&fl6), sk, 0);
452edd59 717 if (IS_ERR(dst))
e104411b 718 goto out;
1da177e4 719
cfdf7647 720 idev = __in6_dev_get(skb->dev);
1da177e4
LT
721
722 msg.skb = skb;
723 msg.offset = 0;
763ecff1 724 msg.type = ICMPV6_ECHO_REPLY;
1da177e4 725
b515430a 726 ipcm6_init_sk(&ipc6, np);
26879da5
WW
727 ipc6.hlimit = ip6_sk_dst_hoplimit(np, &fl6, dst);
728 ipc6.tclass = ipv6_get_dsfield(ipv6_hdr(skb));
26879da5 729
4e64b1ed
JP
730 if (ip6_append_data(sk, icmpv6_getfrag, &msg,
731 skb->len + sizeof(struct icmp6hdr),
732 sizeof(struct icmp6hdr), &ipc6, &fl6,
5fdaa88d 733 (struct rt6_info *)dst, MSG_DONTWAIT)) {
a16292a0 734 __ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTERRORS);
1da177e4 735 ip6_flush_pending_frames(sk);
cfdf7647 736 } else {
4e64b1ed
JP
737 icmpv6_push_pending_frames(sk, &fl6, &tmp_hdr,
738 skb->len + sizeof(struct icmp6hdr));
1da177e4 739 }
1da177e4 740 dst_release(dst);
1ab1457c 741out:
405666db 742 icmpv6_xmit_unlock(sk);
7ba91ecb
JDB
743out_bh_enable:
744 local_bh_enable();
1da177e4
LT
745}
746
b94f1c09 747void icmpv6_notify(struct sk_buff *skb, u8 type, u8 code, __be32 info)
1da177e4 748{
41135cc8 749 const struct inet6_protocol *ipprot;
1da177e4 750 int inner_offset;
75f2811c 751 __be16 frag_off;
f9242b6b 752 u8 nexthdr;
7304fe46 753 struct net *net = dev_net(skb->dev);
1da177e4
LT
754
755 if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
7304fe46 756 goto out;
1da177e4
LT
757
758 nexthdr = ((struct ipv6hdr *)skb->data)->nexthdr;
759 if (ipv6_ext_hdr(nexthdr)) {
760 /* now skip over extension headers */
75f2811c
JG
761 inner_offset = ipv6_skip_exthdr(skb, sizeof(struct ipv6hdr),
762 &nexthdr, &frag_off);
67ba4152 763 if (inner_offset < 0)
7304fe46 764 goto out;
1da177e4
LT
765 } else {
766 inner_offset = sizeof(struct ipv6hdr);
767 }
768
769 /* Checkin header including 8 bytes of inner protocol header. */
770 if (!pskb_may_pull(skb, inner_offset+8))
7304fe46 771 goto out;
1da177e4 772
1da177e4
LT
773 /* BUGGG_FUTURE: we should try to parse exthdrs in this packet.
774 Without this we will not able f.e. to make source routed
775 pmtu discovery.
776 Corresponding argument (opt) to notifiers is already added.
777 --ANK (980726)
778 */
779
f9242b6b 780 ipprot = rcu_dereference(inet6_protos[nexthdr]);
1da177e4
LT
781 if (ipprot && ipprot->err_handler)
782 ipprot->err_handler(skb, NULL, type, code, inner_offset, info);
1da177e4 783
69d6da0b 784 raw6_icmp_error(skb, nexthdr, type, code, inner_offset, info);
7304fe46
DJ
785 return;
786
787out:
a16292a0 788 __ICMP6_INC_STATS(net, __in6_dev_get(skb->dev), ICMP6_MIB_INERRORS);
1da177e4 789}
1ab1457c 790
1da177e4
LT
791/*
792 * Handle icmp messages
793 */
794
e5bbef20 795static int icmpv6_rcv(struct sk_buff *skb)
1da177e4 796{
1da177e4
LT
797 struct net_device *dev = skb->dev;
798 struct inet6_dev *idev = __in6_dev_get(dev);
b71d1d42 799 const struct in6_addr *saddr, *daddr;
1da177e4 800 struct icmp6hdr *hdr;
d5fdd6ba 801 u8 type;
e3e32170 802 bool success = false;
1da177e4 803
aebcf82c 804 if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb)) {
def8b4fa 805 struct sec_path *sp = skb_sec_path(skb);
8b7817f3
HX
806 int nh;
807
def8b4fa 808 if (!(sp && sp->xvec[sp->len - 1]->props.flags &
aebcf82c
HX
809 XFRM_STATE_ICMP))
810 goto drop_no_count;
811
81aded24 812 if (!pskb_may_pull(skb, sizeof(*hdr) + sizeof(struct ipv6hdr)))
8b7817f3
HX
813 goto drop_no_count;
814
815 nh = skb_network_offset(skb);
816 skb_set_network_header(skb, sizeof(*hdr));
817
818 if (!xfrm6_policy_check_reverse(NULL, XFRM_POLICY_IN, skb))
819 goto drop_no_count;
820
821 skb_set_network_header(skb, nh);
822 }
823
a16292a0 824 __ICMP6_INC_STATS(dev_net(dev), idev, ICMP6_MIB_INMSGS);
1da177e4 825
0660e03f
ACM
826 saddr = &ipv6_hdr(skb)->saddr;
827 daddr = &ipv6_hdr(skb)->daddr;
1da177e4 828
39471ac8 829 if (skb_checksum_validate(skb, IPPROTO_ICMPV6, ip6_compute_pseudo)) {
ba7a46f1
JP
830 net_dbg_ratelimited("ICMPv6 checksum failed [%pI6c > %pI6c]\n",
831 saddr, daddr);
39471ac8 832 goto csum_error;
1da177e4
LT
833 }
834
8cf22943
HX
835 if (!pskb_pull(skb, sizeof(*hdr)))
836 goto discard_it;
1da177e4 837
cc70ab26 838 hdr = icmp6_hdr(skb);
1da177e4
LT
839
840 type = hdr->icmp6_type;
841
f3832ed2 842 ICMP6MSGIN_INC_STATS(dev_net(dev), idev, type);
1da177e4
LT
843
844 switch (type) {
845 case ICMPV6_ECHO_REQUEST:
846 icmpv6_echo_reply(skb);
847 break;
848
849 case ICMPV6_ECHO_REPLY:
e3e32170 850 success = ping_rcv(skb);
1da177e4
LT
851 break;
852
853 case ICMPV6_PKT_TOOBIG:
854 /* BUGGG_FUTURE: if packet contains rthdr, we cannot update
855 standard destination cache. Seems, only "advanced"
856 destination cache will allow to solve this problem
857 --ANK (980726)
858 */
859 if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
860 goto discard_it;
cc70ab26 861 hdr = icmp6_hdr(skb);
1da177e4 862
275757e6
GS
863 /* to notify */
864 /* fall through */
1da177e4
LT
865 case ICMPV6_DEST_UNREACH:
866 case ICMPV6_TIME_EXCEED:
867 case ICMPV6_PARAMPROB:
868 icmpv6_notify(skb, type, hdr->icmp6_code, hdr->icmp6_mtu);
869 break;
870
871 case NDISC_ROUTER_SOLICITATION:
872 case NDISC_ROUTER_ADVERTISEMENT:
873 case NDISC_NEIGHBOUR_SOLICITATION:
874 case NDISC_NEIGHBOUR_ADVERTISEMENT:
875 case NDISC_REDIRECT:
876 ndisc_rcv(skb);
877 break;
878
879 case ICMPV6_MGM_QUERY:
880 igmp6_event_query(skb);
881 break;
882
883 case ICMPV6_MGM_REPORT:
884 igmp6_event_report(skb);
885 break;
886
887 case ICMPV6_MGM_REDUCTION:
888 case ICMPV6_NI_QUERY:
889 case ICMPV6_NI_REPLY:
890 case ICMPV6_MLD2_REPORT:
891 case ICMPV6_DHAAD_REQUEST:
892 case ICMPV6_DHAAD_REPLY:
893 case ICMPV6_MOBILE_PREFIX_SOL:
894 case ICMPV6_MOBILE_PREFIX_ADV:
895 break;
896
897 default:
1da177e4
LT
898 /* informational */
899 if (type & ICMPV6_INFOMSG_MASK)
900 break;
901
4b3418fb
BM
902 net_dbg_ratelimited("icmpv6: msg of unknown type [%pI6c > %pI6c]\n",
903 saddr, daddr);
ea85a0a2 904
1ab1457c
YH
905 /*
906 * error of unknown type.
907 * must pass to upper level
1da177e4
LT
908 */
909
910 icmpv6_notify(skb, type, hdr->icmp6_code, hdr->icmp6_mtu);
3ff50b79
SH
911 }
912
e3e32170
RJ
913 /* until the v6 path can be better sorted assume failure and
914 * preserve the status quo behaviour for the rest of the paths to here
915 */
916 if (success)
917 consume_skb(skb);
918 else
919 kfree_skb(skb);
920
1da177e4
LT
921 return 0;
922
6a5dc9e5 923csum_error:
a16292a0 924 __ICMP6_INC_STATS(dev_net(dev), idev, ICMP6_MIB_CSUMERRORS);
1da177e4 925discard_it:
a16292a0 926 __ICMP6_INC_STATS(dev_net(dev), idev, ICMP6_MIB_INERRORS);
8b7817f3 927drop_no_count:
1da177e4
LT
928 kfree_skb(skb);
929 return 0;
930}
931
4c9483b2 932void icmpv6_flow_init(struct sock *sk, struct flowi6 *fl6,
95e41e93
YH
933 u8 type,
934 const struct in6_addr *saddr,
935 const struct in6_addr *daddr,
936 int oif)
937{
4c9483b2 938 memset(fl6, 0, sizeof(*fl6));
4e3fd7a0
AD
939 fl6->saddr = *saddr;
940 fl6->daddr = *daddr;
67ba4152 941 fl6->flowi6_proto = IPPROTO_ICMPV6;
1958b856
DM
942 fl6->fl6_icmp_type = type;
943 fl6->fl6_icmp_code = 0;
4c9483b2
DM
944 fl6->flowi6_oif = oif;
945 security_sk_classify_flow(sk, flowi6_to_flowi(fl6));
95e41e93
YH
946}
947
98c6d1b2 948static int __net_init icmpv6_sk_init(struct net *net)
1da177e4
LT
949{
950 struct sock *sk;
951 int err, i, j;
952
98c6d1b2 953 net->ipv6.icmp_sk =
6396bb22 954 kcalloc(nr_cpu_ids, sizeof(struct sock *), GFP_KERNEL);
63159f29 955 if (!net->ipv6.icmp_sk)
79c91159
DL
956 return -ENOMEM;
957
6f912042 958 for_each_possible_cpu(i) {
1ed8516f
DL
959 err = inet_ctl_sock_create(&sk, PF_INET6,
960 SOCK_RAW, IPPROTO_ICMPV6, net);
1da177e4 961 if (err < 0) {
f3213831 962 pr_err("Failed to initialize the ICMP6 control socket (err %d)\n",
1da177e4
LT
963 err);
964 goto fail;
965 }
966
1ed8516f 967 net->ipv6.icmp_sk[i] = sk;
5c8cafd6 968
1da177e4
LT
969 /* Enough space for 2 64K ICMP packets, including
970 * sk_buff struct overhead.
971 */
87fb4b7b 972 sk->sk_sndbuf = 2 * SKB_TRUESIZE(64 * 1024);
1da177e4 973 }
1da177e4
LT
974 return 0;
975
976 fail:
5c8cafd6 977 for (j = 0; j < i; j++)
1ed8516f 978 inet_ctl_sock_destroy(net->ipv6.icmp_sk[j]);
98c6d1b2 979 kfree(net->ipv6.icmp_sk);
1da177e4
LT
980 return err;
981}
982
98c6d1b2 983static void __net_exit icmpv6_sk_exit(struct net *net)
1da177e4
LT
984{
985 int i;
986
6f912042 987 for_each_possible_cpu(i) {
1ed8516f 988 inet_ctl_sock_destroy(net->ipv6.icmp_sk[i]);
1da177e4 989 }
98c6d1b2
DL
990 kfree(net->ipv6.icmp_sk);
991}
992
8ed7edce 993static struct pernet_operations icmpv6_sk_ops = {
67ba4152
IM
994 .init = icmpv6_sk_init,
995 .exit = icmpv6_sk_exit,
98c6d1b2
DL
996};
997
998int __init icmpv6_init(void)
999{
1000 int err;
1001
1002 err = register_pernet_subsys(&icmpv6_sk_ops);
1003 if (err < 0)
1004 return err;
1005
1006 err = -EAGAIN;
1007 if (inet6_add_protocol(&icmpv6_protocol, IPPROTO_ICMPV6) < 0)
1008 goto fail;
5f5624cf
PS
1009
1010 err = inet6_register_icmp_sender(icmp6_send);
1011 if (err)
1012 goto sender_reg_err;
98c6d1b2
DL
1013 return 0;
1014
5f5624cf
PS
1015sender_reg_err:
1016 inet6_del_protocol(&icmpv6_protocol, IPPROTO_ICMPV6);
98c6d1b2 1017fail:
f3213831 1018 pr_err("Failed to register ICMP6 protocol\n");
98c6d1b2
DL
1019 unregister_pernet_subsys(&icmpv6_sk_ops);
1020 return err;
1021}
1022
8ed7edce 1023void icmpv6_cleanup(void)
98c6d1b2 1024{
5f5624cf 1025 inet6_unregister_icmp_sender(icmp6_send);
98c6d1b2 1026 unregister_pernet_subsys(&icmpv6_sk_ops);
1da177e4
LT
1027 inet6_del_protocol(&icmpv6_protocol, IPPROTO_ICMPV6);
1028}
1029
98c6d1b2 1030
9b5b5cff 1031static const struct icmp6_err {
1da177e4
LT
1032 int err;
1033 int fatal;
1034} tab_unreach[] = {
1035 { /* NOROUTE */
1036 .err = ENETUNREACH,
1037 .fatal = 0,
1038 },
1039 { /* ADM_PROHIBITED */
1040 .err = EACCES,
1041 .fatal = 1,
1042 },
1043 { /* Was NOT_NEIGHBOUR, now reserved */
1044 .err = EHOSTUNREACH,
1045 .fatal = 0,
1046 },
1047 { /* ADDR_UNREACH */
1048 .err = EHOSTUNREACH,
1049 .fatal = 0,
1050 },
1051 { /* PORT_UNREACH */
1052 .err = ECONNREFUSED,
1053 .fatal = 1,
1054 },
61e76b17
JB
1055 { /* POLICY_FAIL */
1056 .err = EACCES,
1057 .fatal = 1,
1058 },
1059 { /* REJECT_ROUTE */
1060 .err = EACCES,
1061 .fatal = 1,
1062 },
1da177e4
LT
1063};
1064
d5fdd6ba 1065int icmpv6_err_convert(u8 type, u8 code, int *err)
1da177e4
LT
1066{
1067 int fatal = 0;
1068
1069 *err = EPROTO;
1070
1071 switch (type) {
1072 case ICMPV6_DEST_UNREACH:
1073 fatal = 1;
61e76b17 1074 if (code < ARRAY_SIZE(tab_unreach)) {
1da177e4
LT
1075 *err = tab_unreach[code].err;
1076 fatal = tab_unreach[code].fatal;
1077 }
1078 break;
1079
1080 case ICMPV6_PKT_TOOBIG:
1081 *err = EMSGSIZE;
1082 break;
1ab1457c 1083
1da177e4
LT
1084 case ICMPV6_PARAMPROB:
1085 *err = EPROTO;
1086 fatal = 1;
1087 break;
1088
1089 case ICMPV6_TIME_EXCEED:
1090 *err = EHOSTUNREACH;
1091 break;
3ff50b79 1092 }
1da177e4
LT
1093
1094 return fatal;
1095}
7159039a
YH
1096EXPORT_SYMBOL(icmpv6_err_convert);
1097
1da177e4 1098#ifdef CONFIG_SYSCTL
e8243534 1099static struct ctl_table ipv6_icmp_table_template[] = {
1da177e4 1100 {
1da177e4 1101 .procname = "ratelimit",
41a76906 1102 .data = &init_net.ipv6.sysctl.icmpv6_time,
1da177e4
LT
1103 .maxlen = sizeof(int),
1104 .mode = 0644,
6d9f239a 1105 .proc_handler = proc_dointvec_ms_jiffies,
1da177e4 1106 },
f8572d8f 1107 { },
1da177e4 1108};
760f2d01 1109
2c8c1e72 1110struct ctl_table * __net_init ipv6_icmp_sysctl_init(struct net *net)
760f2d01
DL
1111{
1112 struct ctl_table *table;
1113
1114 table = kmemdup(ipv6_icmp_table_template,
1115 sizeof(ipv6_icmp_table_template),
1116 GFP_KERNEL);
5ee09105 1117
c027aab4 1118 if (table)
5ee09105
YH
1119 table[0].data = &net->ipv6.sysctl.icmpv6_time;
1120
760f2d01
DL
1121 return table;
1122}
1da177e4 1123#endif