11da177e4SLinus Torvalds /* 21da177e4SLinus Torvalds * Internet Control Message Protocol (ICMPv6) 31da177e4SLinus Torvalds * Linux INET6 implementation 41da177e4SLinus Torvalds * 51da177e4SLinus Torvalds * Authors: 61da177e4SLinus Torvalds * Pedro Roque <roque@di.fc.ul.pt> 71da177e4SLinus Torvalds * 81da177e4SLinus Torvalds * Based on net/ipv4/icmp.c 91da177e4SLinus Torvalds * 101da177e4SLinus Torvalds * RFC 1885 111da177e4SLinus Torvalds * 121da177e4SLinus Torvalds * This program is free software; you can redistribute it and/or 131da177e4SLinus Torvalds * modify it under the terms of the GNU General Public License 141da177e4SLinus Torvalds * as published by the Free Software Foundation; either version 151da177e4SLinus Torvalds * 2 of the License, or (at your option) any later version. 161da177e4SLinus Torvalds */ 171da177e4SLinus Torvalds 181da177e4SLinus Torvalds /* 191da177e4SLinus Torvalds * Changes: 201da177e4SLinus Torvalds * 211da177e4SLinus Torvalds * Andi Kleen : exception handling 221da177e4SLinus Torvalds * Andi Kleen add rate limits. never reply to a icmp. 231da177e4SLinus Torvalds * add more length checks and other fixes. 241da177e4SLinus Torvalds * yoshfuji : ensure to sent parameter problem for 251da177e4SLinus Torvalds * fragments. 261da177e4SLinus Torvalds * YOSHIFUJI Hideaki @USAGI: added sysctl for icmp rate limit. 271da177e4SLinus Torvalds * Randy Dunlap and 281da177e4SLinus Torvalds * YOSHIFUJI Hideaki @USAGI: Per-interface statistics support 291da177e4SLinus Torvalds * Kazunori MIYAZAWA @USAGI: change output process to use ip6_append_data 301da177e4SLinus Torvalds */ 311da177e4SLinus Torvalds 32f3213831SJoe Perches #define pr_fmt(fmt) "IPv6: " fmt 33f3213831SJoe Perches 341da177e4SLinus Torvalds #include <linux/module.h> 351da177e4SLinus Torvalds #include <linux/errno.h> 361da177e4SLinus Torvalds #include <linux/types.h> 371da177e4SLinus Torvalds #include <linux/socket.h> 381da177e4SLinus Torvalds #include <linux/in.h> 391da177e4SLinus Torvalds #include <linux/kernel.h> 401da177e4SLinus Torvalds #include <linux/sockios.h> 411da177e4SLinus Torvalds #include <linux/net.h> 421da177e4SLinus Torvalds #include <linux/skbuff.h> 431da177e4SLinus Torvalds #include <linux/init.h> 44763ecff1SYasuyuki Kozakai #include <linux/netfilter.h> 455a0e3ad6STejun Heo #include <linux/slab.h> 461da177e4SLinus Torvalds 471da177e4SLinus Torvalds #ifdef CONFIG_SYSCTL 481da177e4SLinus Torvalds #include <linux/sysctl.h> 491da177e4SLinus Torvalds #endif 501da177e4SLinus Torvalds 511da177e4SLinus Torvalds #include <linux/inet.h> 521da177e4SLinus Torvalds #include <linux/netdevice.h> 531da177e4SLinus Torvalds #include <linux/icmpv6.h> 541da177e4SLinus Torvalds 551da177e4SLinus Torvalds #include <net/ip.h> 561da177e4SLinus Torvalds #include <net/sock.h> 571da177e4SLinus Torvalds 581da177e4SLinus Torvalds #include <net/ipv6.h> 591da177e4SLinus Torvalds #include <net/ip6_checksum.h> 606d0bfe22SLorenzo Colitti #include <net/ping.h> 611da177e4SLinus Torvalds #include <net/protocol.h> 621da177e4SLinus Torvalds #include <net/raw.h> 631da177e4SLinus Torvalds #include <net/rawv6.h> 641da177e4SLinus Torvalds #include <net/transp_v6.h> 651da177e4SLinus Torvalds #include <net/ip6_route.h> 661da177e4SLinus Torvalds #include <net/addrconf.h> 671da177e4SLinus Torvalds #include <net/icmp.h> 688b7817f3SHerbert Xu #include <net/xfrm.h> 691ed8516fSDenis V. Lunev #include <net/inet_common.h> 70825edac4SHannes Frederic Sowa #include <net/dsfield.h> 711da177e4SLinus Torvalds 721da177e4SLinus Torvalds #include <asm/uaccess.h> 731da177e4SLinus Torvalds 741da177e4SLinus Torvalds /* 751da177e4SLinus Torvalds * The ICMP socket(s). This is the most convenient way to flow control 761da177e4SLinus Torvalds * our ICMP output as well as maintain a clean interface throughout 771da177e4SLinus Torvalds * all layers. All Socketless IP sends will soon be gone. 781da177e4SLinus Torvalds * 791da177e4SLinus Torvalds * On SMP we have one ICMP socket per-cpu. 801da177e4SLinus Torvalds */ 8198c6d1b2SDenis V. Lunev static inline struct sock *icmpv6_sk(struct net *net) 8298c6d1b2SDenis V. Lunev { 8398c6d1b2SDenis V. Lunev return net->ipv6.icmp_sk[smp_processor_id()]; 8498c6d1b2SDenis V. Lunev } 851da177e4SLinus Torvalds 866f809da2SSteffen Klassert static void icmpv6_err(struct sk_buff *skb, struct inet6_skb_parm *opt, 876f809da2SSteffen Klassert u8 type, u8 code, int offset, __be32 info) 886f809da2SSteffen Klassert { 896d0bfe22SLorenzo Colitti /* icmpv6_notify checks 8 bytes can be pulled, icmp6hdr is 8 bytes */ 906d0bfe22SLorenzo Colitti struct icmp6hdr *icmp6 = (struct icmp6hdr *) (skb->data + offset); 916f809da2SSteffen Klassert struct net *net = dev_net(skb->dev); 926f809da2SSteffen Klassert 936f809da2SSteffen Klassert if (type == ICMPV6_PKT_TOOBIG) 946f809da2SSteffen Klassert ip6_update_pmtu(skb, net, info, 0, 0); 956f809da2SSteffen Klassert else if (type == NDISC_REDIRECT) 96b55b76b2SDuan Jiong ip6_redirect(skb, net, skb->dev->ifindex, 0); 976d0bfe22SLorenzo Colitti 986d0bfe22SLorenzo Colitti if (!(type & ICMPV6_INFOMSG_MASK)) 996d0bfe22SLorenzo Colitti if (icmp6->icmp6_type == ICMPV6_ECHO_REQUEST) 1006d0bfe22SLorenzo Colitti ping_err(skb, offset, info); 1016f809da2SSteffen Klassert } 1026f809da2SSteffen Klassert 103e5bbef20SHerbert Xu static int icmpv6_rcv(struct sk_buff *skb); 1041da177e4SLinus Torvalds 10541135cc8SAlexey Dobriyan static const struct inet6_protocol icmpv6_protocol = { 1061da177e4SLinus Torvalds .handler = icmpv6_rcv, 1076f809da2SSteffen Klassert .err_handler = icmpv6_err, 1088b7817f3SHerbert Xu .flags = INET6_PROTO_NOPOLICY|INET6_PROTO_FINAL, 1091da177e4SLinus Torvalds }; 1101da177e4SLinus Torvalds 111fdc0bde9SDenis V. Lunev static __inline__ struct sock *icmpv6_xmit_lock(struct net *net) 1121da177e4SLinus Torvalds { 113fdc0bde9SDenis V. Lunev struct sock *sk; 114fdc0bde9SDenis V. Lunev 1151da177e4SLinus Torvalds local_bh_disable(); 1161da177e4SLinus Torvalds 117fdc0bde9SDenis V. Lunev sk = icmpv6_sk(net); 118405666dbSDenis V. Lunev if (unlikely(!spin_trylock(&sk->sk_lock.slock))) { 1191da177e4SLinus Torvalds /* This can happen if the output path (f.e. SIT or 1201da177e4SLinus Torvalds * ip6ip6 tunnel) signals dst_link_failure() for an 1211da177e4SLinus Torvalds * outgoing ICMP6 packet. 1221da177e4SLinus Torvalds */ 1231da177e4SLinus Torvalds local_bh_enable(); 124fdc0bde9SDenis V. Lunev return NULL; 1251da177e4SLinus Torvalds } 126fdc0bde9SDenis V. Lunev return sk; 1271da177e4SLinus Torvalds } 1281da177e4SLinus Torvalds 129405666dbSDenis V. Lunev static __inline__ void icmpv6_xmit_unlock(struct sock *sk) 1301da177e4SLinus Torvalds { 131405666dbSDenis V. Lunev spin_unlock_bh(&sk->sk_lock.slock); 1321da177e4SLinus Torvalds } 1331da177e4SLinus Torvalds 1341da177e4SLinus Torvalds /* 1351da177e4SLinus Torvalds * Figure out, may we reply to this packet with icmp error. 1361da177e4SLinus Torvalds * 1371da177e4SLinus Torvalds * We do not reply, if: 1381da177e4SLinus Torvalds * - it was icmp error message. 1391da177e4SLinus Torvalds * - it is truncated, so that it is known, that protocol is ICMPV6 1401da177e4SLinus Torvalds * (i.e. in the middle of some exthdr) 1411da177e4SLinus Torvalds * 1421da177e4SLinus Torvalds * --ANK (980726) 1431da177e4SLinus Torvalds */ 1441da177e4SLinus Torvalds 145a50feda5SEric Dumazet static bool is_ineligible(const struct sk_buff *skb) 1461da177e4SLinus Torvalds { 1470660e03fSArnaldo Carvalho de Melo int ptr = (u8 *)(ipv6_hdr(skb) + 1) - skb->data; 1481da177e4SLinus Torvalds int len = skb->len - ptr; 1490660e03fSArnaldo Carvalho de Melo __u8 nexthdr = ipv6_hdr(skb)->nexthdr; 15075f2811cSJesse Gross __be16 frag_off; 1511da177e4SLinus Torvalds 1521da177e4SLinus Torvalds if (len < 0) 153a50feda5SEric Dumazet return true; 1541da177e4SLinus Torvalds 15575f2811cSJesse Gross ptr = ipv6_skip_exthdr(skb, ptr, &nexthdr, &frag_off); 1561da177e4SLinus Torvalds if (ptr < 0) 157a50feda5SEric Dumazet return false; 1581da177e4SLinus Torvalds if (nexthdr == IPPROTO_ICMPV6) { 1591da177e4SLinus Torvalds u8 _type, *tp; 1601da177e4SLinus Torvalds tp = skb_header_pointer(skb, 1611da177e4SLinus Torvalds ptr+offsetof(struct icmp6hdr, icmp6_type), 1621da177e4SLinus Torvalds sizeof(_type), &_type); 1631da177e4SLinus Torvalds if (tp == NULL || 1641da177e4SLinus Torvalds !(*tp & ICMPV6_INFOMSG_MASK)) 165a50feda5SEric Dumazet return true; 1661da177e4SLinus Torvalds } 167a50feda5SEric Dumazet return false; 1681da177e4SLinus Torvalds } 1691da177e4SLinus Torvalds 1701da177e4SLinus Torvalds /* 1711da177e4SLinus Torvalds * Check the ICMP output rate limit 1721da177e4SLinus Torvalds */ 17392d86829SDavid S. Miller static inline bool icmpv6_xrlim_allow(struct sock *sk, u8 type, 1744c9483b2SDavid S. Miller struct flowi6 *fl6) 1751da177e4SLinus Torvalds { 1761da177e4SLinus Torvalds struct dst_entry *dst; 1773b1e0a65SYOSHIFUJI Hideaki struct net *net = sock_net(sk); 17892d86829SDavid S. Miller bool res = false; 1791da177e4SLinus Torvalds 1801da177e4SLinus Torvalds /* Informational messages are not limited. */ 1811da177e4SLinus Torvalds if (type & ICMPV6_INFOMSG_MASK) 18292d86829SDavid S. Miller return true; 1831da177e4SLinus Torvalds 1841da177e4SLinus Torvalds /* Do not limit pmtu discovery, it would break it. */ 1851da177e4SLinus Torvalds if (type == ICMPV6_PKT_TOOBIG) 18692d86829SDavid S. Miller return true; 1871da177e4SLinus Torvalds 1881da177e4SLinus Torvalds /* 1891da177e4SLinus Torvalds * Look up the output route. 1901da177e4SLinus Torvalds * XXX: perhaps the expire for routing entries cloned by 1911da177e4SLinus Torvalds * this lookup should be more aggressive (not longer than timeout). 1921da177e4SLinus Torvalds */ 1934c9483b2SDavid S. Miller dst = ip6_route_output(net, sk, fl6); 1941da177e4SLinus Torvalds if (dst->error) { 1953bd653c8SDenis V. Lunev IP6_INC_STATS(net, ip6_dst_idev(dst), 196a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_OUTNOROUTES); 1971da177e4SLinus Torvalds } else if (dst->dev && (dst->dev->flags&IFF_LOOPBACK)) { 19892d86829SDavid S. Miller res = true; 1991da177e4SLinus Torvalds } else { 2001da177e4SLinus Torvalds struct rt6_info *rt = (struct rt6_info *)dst; 2019a43b709SBenjamin Thery int tmo = net->ipv6.sysctl.icmpv6_time; 202fbfe95a4SDavid S. Miller struct inet_peer *peer; 2031da177e4SLinus Torvalds 2041da177e4SLinus Torvalds /* Give more bandwidth to wider prefixes. */ 2051da177e4SLinus Torvalds if (rt->rt6i_dst.plen < 128) 2061da177e4SLinus Torvalds tmo >>= ((128 - rt->rt6i_dst.plen)>>5); 2071da177e4SLinus Torvalds 2081d861aa4SDavid S. Miller peer = inet_getpeer_v6(net->ipv6.peers, &rt->rt6i_dst.addr, 1); 209fbfe95a4SDavid S. Miller res = inet_peer_xrlim_allow(peer, tmo); 2101d861aa4SDavid S. Miller if (peer) 2111d861aa4SDavid S. Miller inet_putpeer(peer); 2121da177e4SLinus Torvalds } 2131da177e4SLinus Torvalds dst_release(dst); 2141da177e4SLinus Torvalds return res; 2151da177e4SLinus Torvalds } 2161da177e4SLinus Torvalds 2171da177e4SLinus Torvalds /* 2181da177e4SLinus Torvalds * an inline helper for the "simple" if statement below 2191da177e4SLinus Torvalds * checks if parameter problem report is caused by an 2201da177e4SLinus Torvalds * unrecognized IPv6 option that has the Option Type 2211da177e4SLinus Torvalds * highest-order two bits set to 10 2221da177e4SLinus Torvalds */ 2231da177e4SLinus Torvalds 224a50feda5SEric Dumazet static bool opt_unrec(struct sk_buff *skb, __u32 offset) 2251da177e4SLinus Torvalds { 2261da177e4SLinus Torvalds u8 _optval, *op; 2271da177e4SLinus Torvalds 228bbe735e4SArnaldo Carvalho de Melo offset += skb_network_offset(skb); 2291da177e4SLinus Torvalds op = skb_header_pointer(skb, offset, sizeof(_optval), &_optval); 2301da177e4SLinus Torvalds if (op == NULL) 231a50feda5SEric Dumazet return true; 2321da177e4SLinus Torvalds return (*op & 0xC0) == 0x80; 2331da177e4SLinus Torvalds } 2341da177e4SLinus Torvalds 2356d0bfe22SLorenzo Colitti int icmpv6_push_pending_frames(struct sock *sk, struct flowi6 *fl6, 2366d0bfe22SLorenzo Colitti struct icmp6hdr *thdr, int len) 2371da177e4SLinus Torvalds { 2381da177e4SLinus Torvalds struct sk_buff *skb; 2391da177e4SLinus Torvalds struct icmp6hdr *icmp6h; 2401da177e4SLinus Torvalds int err = 0; 2411da177e4SLinus Torvalds 2421da177e4SLinus Torvalds if ((skb = skb_peek(&sk->sk_write_queue)) == NULL) 2431da177e4SLinus Torvalds goto out; 2441da177e4SLinus Torvalds 245cc70ab26SArnaldo Carvalho de Melo icmp6h = icmp6_hdr(skb); 2461da177e4SLinus Torvalds memcpy(icmp6h, thdr, sizeof(struct icmp6hdr)); 2471da177e4SLinus Torvalds icmp6h->icmp6_cksum = 0; 2481da177e4SLinus Torvalds 2491da177e4SLinus Torvalds if (skb_queue_len(&sk->sk_write_queue) == 1) { 25007f0757aSJoe Perches skb->csum = csum_partial(icmp6h, 2511da177e4SLinus Torvalds sizeof(struct icmp6hdr), skb->csum); 2524c9483b2SDavid S. Miller icmp6h->icmp6_cksum = csum_ipv6_magic(&fl6->saddr, 2534c9483b2SDavid S. Miller &fl6->daddr, 2544c9483b2SDavid S. Miller len, fl6->flowi6_proto, 2551da177e4SLinus Torvalds skb->csum); 2561da177e4SLinus Torvalds } else { 257868c86bcSAl Viro __wsum tmp_csum = 0; 2581da177e4SLinus Torvalds 2591da177e4SLinus Torvalds skb_queue_walk(&sk->sk_write_queue, skb) { 2601da177e4SLinus Torvalds tmp_csum = csum_add(tmp_csum, skb->csum); 2611da177e4SLinus Torvalds } 2621da177e4SLinus Torvalds 26307f0757aSJoe Perches tmp_csum = csum_partial(icmp6h, 2641da177e4SLinus Torvalds sizeof(struct icmp6hdr), tmp_csum); 2654c9483b2SDavid S. Miller icmp6h->icmp6_cksum = csum_ipv6_magic(&fl6->saddr, 2664c9483b2SDavid S. Miller &fl6->daddr, 2674c9483b2SDavid S. Miller len, fl6->flowi6_proto, 268868c86bcSAl Viro tmp_csum); 2691da177e4SLinus Torvalds } 2701da177e4SLinus Torvalds ip6_push_pending_frames(sk); 2711da177e4SLinus Torvalds out: 2721da177e4SLinus Torvalds return err; 2731da177e4SLinus Torvalds } 2741da177e4SLinus Torvalds 2751da177e4SLinus Torvalds struct icmpv6_msg { 2761da177e4SLinus Torvalds struct sk_buff *skb; 2771da177e4SLinus Torvalds int offset; 278763ecff1SYasuyuki Kozakai uint8_t type; 2791da177e4SLinus Torvalds }; 2801da177e4SLinus Torvalds 2811da177e4SLinus Torvalds static int icmpv6_getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb) 2821da177e4SLinus Torvalds { 2831da177e4SLinus Torvalds struct icmpv6_msg *msg = (struct icmpv6_msg *) from; 2841da177e4SLinus Torvalds struct sk_buff *org_skb = msg->skb; 2855f92a738SAl Viro __wsum csum = 0; 2861da177e4SLinus Torvalds 2871da177e4SLinus Torvalds csum = skb_copy_and_csum_bits(org_skb, msg->offset + offset, 2881da177e4SLinus Torvalds to, len, csum); 2891da177e4SLinus Torvalds skb->csum = csum_block_add(skb->csum, csum, odd); 290763ecff1SYasuyuki Kozakai if (!(msg->type & ICMPV6_INFOMSG_MASK)) 291763ecff1SYasuyuki Kozakai nf_ct_attach(skb, org_skb); 2921da177e4SLinus Torvalds return 0; 2931da177e4SLinus Torvalds } 2941da177e4SLinus Torvalds 29507a93626SAmerigo Wang #if IS_ENABLED(CONFIG_IPV6_MIP6) 29679383236SMasahide NAKAMURA static void mip6_addr_swap(struct sk_buff *skb) 29779383236SMasahide NAKAMURA { 2980660e03fSArnaldo Carvalho de Melo struct ipv6hdr *iph = ipv6_hdr(skb); 29979383236SMasahide NAKAMURA struct inet6_skb_parm *opt = IP6CB(skb); 30079383236SMasahide NAKAMURA struct ipv6_destopt_hao *hao; 30179383236SMasahide NAKAMURA struct in6_addr tmp; 30279383236SMasahide NAKAMURA int off; 30379383236SMasahide NAKAMURA 30479383236SMasahide NAKAMURA if (opt->dsthao) { 30579383236SMasahide NAKAMURA off = ipv6_find_tlv(skb, opt->dsthao, IPV6_TLV_HAO); 30679383236SMasahide NAKAMURA if (likely(off >= 0)) { 307d56f90a7SArnaldo Carvalho de Melo hao = (struct ipv6_destopt_hao *) 308d56f90a7SArnaldo Carvalho de Melo (skb_network_header(skb) + off); 3094e3fd7a0SAlexey Dobriyan tmp = iph->saddr; 3104e3fd7a0SAlexey Dobriyan iph->saddr = hao->addr; 3114e3fd7a0SAlexey Dobriyan hao->addr = tmp; 31279383236SMasahide NAKAMURA } 31379383236SMasahide NAKAMURA } 31479383236SMasahide NAKAMURA } 31579383236SMasahide NAKAMURA #else 31679383236SMasahide NAKAMURA static inline void mip6_addr_swap(struct sk_buff *skb) {} 31779383236SMasahide NAKAMURA #endif 31879383236SMasahide NAKAMURA 319e8243534Sstephen hemminger static struct dst_entry *icmpv6_route_lookup(struct net *net, 320e8243534Sstephen hemminger struct sk_buff *skb, 321e8243534Sstephen hemminger struct sock *sk, 322e8243534Sstephen hemminger struct flowi6 *fl6) 323b42835dbSDavid S. Miller { 324b42835dbSDavid S. Miller struct dst_entry *dst, *dst2; 3254c9483b2SDavid S. Miller struct flowi6 fl2; 326b42835dbSDavid S. Miller int err; 327b42835dbSDavid S. Miller 3284c9483b2SDavid S. Miller err = ip6_dst_lookup(sk, &dst, fl6); 329b42835dbSDavid S. Miller if (err) 330b42835dbSDavid S. Miller return ERR_PTR(err); 331b42835dbSDavid S. Miller 332b42835dbSDavid S. Miller /* 333b42835dbSDavid S. Miller * We won't send icmp if the destination is known 334b42835dbSDavid S. Miller * anycast. 335b42835dbSDavid S. Miller */ 336b42835dbSDavid S. Miller if (((struct rt6_info *)dst)->rt6i_flags & RTF_ANYCAST) { 3375f5624cfSPravin B Shelar LIMIT_NETDEBUG(KERN_DEBUG "icmp6_send: acast source\n"); 338b42835dbSDavid S. Miller dst_release(dst); 339b42835dbSDavid S. Miller return ERR_PTR(-EINVAL); 340b42835dbSDavid S. Miller } 341b42835dbSDavid S. Miller 342b42835dbSDavid S. Miller /* No need to clone since we're just using its address. */ 343b42835dbSDavid S. Miller dst2 = dst; 344b42835dbSDavid S. Miller 3454c9483b2SDavid S. Miller dst = xfrm_lookup(net, dst, flowi6_to_flowi(fl6), sk, 0); 346452edd59SDavid S. Miller if (!IS_ERR(dst)) { 347b42835dbSDavid S. Miller if (dst != dst2) 348b42835dbSDavid S. Miller return dst; 349452edd59SDavid S. Miller } else { 350452edd59SDavid S. Miller if (PTR_ERR(dst) == -EPERM) 351b42835dbSDavid S. Miller dst = NULL; 352452edd59SDavid S. Miller else 353452edd59SDavid S. Miller return dst; 354b42835dbSDavid S. Miller } 355b42835dbSDavid S. Miller 3564c9483b2SDavid S. Miller err = xfrm_decode_session_reverse(skb, flowi6_to_flowi(&fl2), AF_INET6); 357b42835dbSDavid S. Miller if (err) 358b42835dbSDavid S. Miller goto relookup_failed; 359b42835dbSDavid S. Miller 360b42835dbSDavid S. Miller err = ip6_dst_lookup(sk, &dst2, &fl2); 361b42835dbSDavid S. Miller if (err) 362b42835dbSDavid S. Miller goto relookup_failed; 363b42835dbSDavid S. Miller 3644c9483b2SDavid S. Miller dst2 = xfrm_lookup(net, dst2, flowi6_to_flowi(&fl2), sk, XFRM_LOOKUP_ICMP); 365452edd59SDavid S. Miller if (!IS_ERR(dst2)) { 366b42835dbSDavid S. Miller dst_release(dst); 367b42835dbSDavid S. Miller dst = dst2; 368452edd59SDavid S. Miller } else { 369452edd59SDavid S. Miller err = PTR_ERR(dst2); 370452edd59SDavid S. Miller if (err == -EPERM) { 371b42835dbSDavid S. Miller dst_release(dst); 372452edd59SDavid S. Miller return dst2; 373452edd59SDavid S. Miller } else 374b42835dbSDavid S. Miller goto relookup_failed; 375b42835dbSDavid S. Miller } 376b42835dbSDavid S. Miller 377b42835dbSDavid S. Miller relookup_failed: 378b42835dbSDavid S. Miller if (dst) 379b42835dbSDavid S. Miller return dst; 380b42835dbSDavid S. Miller return ERR_PTR(err); 381b42835dbSDavid S. Miller } 382b42835dbSDavid S. Miller 3831da177e4SLinus Torvalds /* 3841da177e4SLinus Torvalds * Send an ICMP message in response to a packet in error 3851da177e4SLinus Torvalds */ 3865f5624cfSPravin B Shelar static void icmp6_send(struct sk_buff *skb, u8 type, u8 code, __u32 info) 3871da177e4SLinus Torvalds { 388c346dca1SYOSHIFUJI Hideaki struct net *net = dev_net(skb->dev); 3891da177e4SLinus Torvalds struct inet6_dev *idev = NULL; 3900660e03fSArnaldo Carvalho de Melo struct ipv6hdr *hdr = ipv6_hdr(skb); 39184427d53SYOSHIFUJI Hideaki struct sock *sk; 39284427d53SYOSHIFUJI Hideaki struct ipv6_pinfo *np; 393b71d1d42SEric Dumazet const struct in6_addr *saddr = NULL; 3941da177e4SLinus Torvalds struct dst_entry *dst; 3951da177e4SLinus Torvalds struct icmp6hdr tmp_hdr; 3964c9483b2SDavid S. Miller struct flowi6 fl6; 3971da177e4SLinus Torvalds struct icmpv6_msg msg; 3981da177e4SLinus Torvalds int iif = 0; 3991da177e4SLinus Torvalds int addr_type = 0; 4001da177e4SLinus Torvalds int len; 401e651f03aSGerrit Renker int hlimit; 4021da177e4SLinus Torvalds int err = 0; 403e110861fSLorenzo Colitti u32 mark = IP6_REPLY_MARK(net, skb->mark); 4041da177e4SLinus Torvalds 40527a884dcSArnaldo Carvalho de Melo if ((u8 *)hdr < skb->head || 40629a3cad5SSimon Horman (skb_network_header(skb) + sizeof(*hdr)) > skb_tail_pointer(skb)) 4071da177e4SLinus Torvalds return; 4081da177e4SLinus Torvalds 4091da177e4SLinus Torvalds /* 4101da177e4SLinus Torvalds * Make sure we respect the rules 4111da177e4SLinus Torvalds * i.e. RFC 1885 2.4(e) 4125f5624cfSPravin B Shelar * Rule (e.1) is enforced by not using icmp6_send 4131da177e4SLinus Torvalds * in any code that processes icmp errors. 4141da177e4SLinus Torvalds */ 4151da177e4SLinus Torvalds addr_type = ipv6_addr_type(&hdr->daddr); 4161da177e4SLinus Torvalds 417446fab59SFX Le Bail if (ipv6_chk_addr(net, &hdr->daddr, skb->dev, 0) || 418d94c1f92SFX Le Bail ipv6_chk_acast_addr_src(net, skb->dev, &hdr->daddr)) 4191da177e4SLinus Torvalds saddr = &hdr->daddr; 4201da177e4SLinus Torvalds 4211da177e4SLinus Torvalds /* 4221da177e4SLinus Torvalds * Dest addr check 4231da177e4SLinus Torvalds */ 4241da177e4SLinus Torvalds 4251da177e4SLinus Torvalds if ((addr_type & IPV6_ADDR_MULTICAST || skb->pkt_type != PACKET_HOST)) { 4261da177e4SLinus Torvalds if (type != ICMPV6_PKT_TOOBIG && 4271da177e4SLinus Torvalds !(type == ICMPV6_PARAMPROB && 4281da177e4SLinus Torvalds code == ICMPV6_UNK_OPTION && 4291da177e4SLinus Torvalds (opt_unrec(skb, info)))) 4301da177e4SLinus Torvalds return; 4311da177e4SLinus Torvalds 4321da177e4SLinus Torvalds saddr = NULL; 4331da177e4SLinus Torvalds } 4341da177e4SLinus Torvalds 4351da177e4SLinus Torvalds addr_type = ipv6_addr_type(&hdr->saddr); 4361da177e4SLinus Torvalds 4371da177e4SLinus Torvalds /* 4381da177e4SLinus Torvalds * Source addr check 4391da177e4SLinus Torvalds */ 4401da177e4SLinus Torvalds 441842df073SHannes Frederic Sowa if (__ipv6_addr_needs_scope_id(addr_type)) 4421da177e4SLinus Torvalds iif = skb->dev->ifindex; 4431da177e4SLinus Torvalds 4441da177e4SLinus Torvalds /* 4458de3351eSYOSHIFUJI Hideaki * Must not send error if the source does not uniquely 4468de3351eSYOSHIFUJI Hideaki * identify a single node (RFC2463 Section 2.4). 4478de3351eSYOSHIFUJI Hideaki * We check unspecified / multicast addresses here, 4488de3351eSYOSHIFUJI Hideaki * and anycast addresses will be checked later. 4491da177e4SLinus Torvalds */ 4501da177e4SLinus Torvalds if ((addr_type == IPV6_ADDR_ANY) || (addr_type & IPV6_ADDR_MULTICAST)) { 4515f5624cfSPravin B Shelar LIMIT_NETDEBUG(KERN_DEBUG "icmp6_send: addr_any/mcast source\n"); 4521da177e4SLinus Torvalds return; 4531da177e4SLinus Torvalds } 4541da177e4SLinus Torvalds 4551da177e4SLinus Torvalds /* 4561da177e4SLinus Torvalds * Never answer to a ICMP packet. 4571da177e4SLinus Torvalds */ 4581da177e4SLinus Torvalds if (is_ineligible(skb)) { 4595f5624cfSPravin B Shelar LIMIT_NETDEBUG(KERN_DEBUG "icmp6_send: no reply to icmp error\n"); 4601da177e4SLinus Torvalds return; 4611da177e4SLinus Torvalds } 4621da177e4SLinus Torvalds 46379383236SMasahide NAKAMURA mip6_addr_swap(skb); 46479383236SMasahide NAKAMURA 4654c9483b2SDavid S. Miller memset(&fl6, 0, sizeof(fl6)); 4664c9483b2SDavid S. Miller fl6.flowi6_proto = IPPROTO_ICMPV6; 4674e3fd7a0SAlexey Dobriyan fl6.daddr = hdr->saddr; 4681da177e4SLinus Torvalds if (saddr) 4694e3fd7a0SAlexey Dobriyan fl6.saddr = *saddr; 470e110861fSLorenzo Colitti fl6.flowi6_mark = mark; 4714c9483b2SDavid S. Miller fl6.flowi6_oif = iif; 4721958b856SDavid S. Miller fl6.fl6_icmp_type = type; 4731958b856SDavid S. Miller fl6.fl6_icmp_code = code; 4744c9483b2SDavid S. Miller security_skb_classify_flow(skb, flowi6_to_flowi(&fl6)); 4751da177e4SLinus Torvalds 476fdc0bde9SDenis V. Lunev sk = icmpv6_xmit_lock(net); 477fdc0bde9SDenis V. Lunev if (sk == NULL) 478405666dbSDenis V. Lunev return; 479e110861fSLorenzo Colitti sk->sk_mark = mark; 480fdc0bde9SDenis V. Lunev np = inet6_sk(sk); 481405666dbSDenis V. Lunev 4824c9483b2SDavid S. Miller if (!icmpv6_xrlim_allow(sk, type, &fl6)) 4831da177e4SLinus Torvalds goto out; 4841da177e4SLinus Torvalds 4851da177e4SLinus Torvalds tmp_hdr.icmp6_type = type; 4861da177e4SLinus Torvalds tmp_hdr.icmp6_code = code; 4871da177e4SLinus Torvalds tmp_hdr.icmp6_cksum = 0; 4881da177e4SLinus Torvalds tmp_hdr.icmp6_pointer = htonl(info); 4891da177e4SLinus Torvalds 4904c9483b2SDavid S. Miller if (!fl6.flowi6_oif && ipv6_addr_is_multicast(&fl6.daddr)) 4914c9483b2SDavid S. Miller fl6.flowi6_oif = np->mcast_oif; 492c4062dfcSErich E. Hoover else if (!fl6.flowi6_oif) 493c4062dfcSErich E. Hoover fl6.flowi6_oif = np->ucast_oif; 4941da177e4SLinus Torvalds 4954c9483b2SDavid S. Miller dst = icmpv6_route_lookup(net, skb, sk, &fl6); 496b42835dbSDavid S. Miller if (IS_ERR(dst)) 4971da177e4SLinus Torvalds goto out; 4988de3351eSYOSHIFUJI Hideaki 4995c98631cSLorenzo Colitti hlimit = ip6_sk_dst_hoplimit(np, &fl6, dst); 5001da177e4SLinus Torvalds 5011da177e4SLinus Torvalds msg.skb = skb; 502bbe735e4SArnaldo Carvalho de Melo msg.offset = skb_network_offset(skb); 503763ecff1SYasuyuki Kozakai msg.type = type; 5041da177e4SLinus Torvalds 5051da177e4SLinus Torvalds len = skb->len - msg.offset; 5061da177e4SLinus Torvalds len = min_t(unsigned int, len, IPV6_MIN_MTU - sizeof(struct ipv6hdr) -sizeof(struct icmp6hdr)); 5071da177e4SLinus Torvalds if (len < 0) { 50864ce2073SPatrick McHardy LIMIT_NETDEBUG(KERN_DEBUG "icmp: len problem\n"); 5091da177e4SLinus Torvalds goto out_dst_release; 5101da177e4SLinus Torvalds } 5111da177e4SLinus Torvalds 512cfdf7647SEric Dumazet rcu_read_lock(); 513cfdf7647SEric Dumazet idev = __in6_dev_get(skb->dev); 5141da177e4SLinus Torvalds 5151da177e4SLinus Torvalds err = ip6_append_data(sk, icmpv6_getfrag, &msg, 5161da177e4SLinus Torvalds len + sizeof(struct icmp6hdr), 517e651f03aSGerrit Renker sizeof(struct icmp6hdr), hlimit, 5184c9483b2SDavid S. Miller np->tclass, NULL, &fl6, (struct rt6_info *)dst, 51913b52cd4SBrian Haley MSG_DONTWAIT, np->dontfrag); 5201da177e4SLinus Torvalds if (err) { 52143a43b60SHannes Frederic Sowa ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTERRORS); 5221da177e4SLinus Torvalds ip6_flush_pending_frames(sk); 523cfdf7647SEric Dumazet } else { 524cfdf7647SEric Dumazet err = icmpv6_push_pending_frames(sk, &fl6, &tmp_hdr, 525cfdf7647SEric Dumazet len + sizeof(struct icmp6hdr)); 5261da177e4SLinus Torvalds } 527cfdf7647SEric Dumazet rcu_read_unlock(); 5281da177e4SLinus Torvalds out_dst_release: 5291da177e4SLinus Torvalds dst_release(dst); 5301da177e4SLinus Torvalds out: 531405666dbSDenis V. Lunev icmpv6_xmit_unlock(sk); 5321da177e4SLinus Torvalds } 5335f5624cfSPravin B Shelar 5345f5624cfSPravin B Shelar /* Slightly more convenient version of icmp6_send. 5355f5624cfSPravin B Shelar */ 5365f5624cfSPravin B Shelar void icmpv6_param_prob(struct sk_buff *skb, u8 code, int pos) 5375f5624cfSPravin B Shelar { 5385f5624cfSPravin B Shelar icmp6_send(skb, ICMPV6_PARAMPROB, code, pos); 5395f5624cfSPravin B Shelar kfree_skb(skb); 5405f5624cfSPravin B Shelar } 5417159039aSYOSHIFUJI Hideaki 5421da177e4SLinus Torvalds static void icmpv6_echo_reply(struct sk_buff *skb) 5431da177e4SLinus Torvalds { 544c346dca1SYOSHIFUJI Hideaki struct net *net = dev_net(skb->dev); 54584427d53SYOSHIFUJI Hideaki struct sock *sk; 5461da177e4SLinus Torvalds struct inet6_dev *idev; 54784427d53SYOSHIFUJI Hideaki struct ipv6_pinfo *np; 548b71d1d42SEric Dumazet const struct in6_addr *saddr = NULL; 549cc70ab26SArnaldo Carvalho de Melo struct icmp6hdr *icmph = icmp6_hdr(skb); 5501da177e4SLinus Torvalds struct icmp6hdr tmp_hdr; 5514c9483b2SDavid S. Miller struct flowi6 fl6; 5521da177e4SLinus Torvalds struct icmpv6_msg msg; 5531da177e4SLinus Torvalds struct dst_entry *dst; 5541da177e4SLinus Torvalds int err = 0; 5551da177e4SLinus Torvalds int hlimit; 556825edac4SHannes Frederic Sowa u8 tclass; 557e110861fSLorenzo Colitti u32 mark = IP6_REPLY_MARK(net, skb->mark); 5581da177e4SLinus Torvalds 5590660e03fSArnaldo Carvalho de Melo saddr = &ipv6_hdr(skb)->daddr; 5601da177e4SLinus Torvalds 561509aba3bSFX Le Bail if (!ipv6_unicast_destination(skb) && 562ec35b61eSFX Le Bail !(net->ipv6.sysctl.anycast_src_echo_reply && 563509aba3bSFX Le Bail ipv6_anycast_destination(skb))) 5641da177e4SLinus Torvalds saddr = NULL; 5651da177e4SLinus Torvalds 5661da177e4SLinus Torvalds memcpy(&tmp_hdr, icmph, sizeof(tmp_hdr)); 5671da177e4SLinus Torvalds tmp_hdr.icmp6_type = ICMPV6_ECHO_REPLY; 5681da177e4SLinus Torvalds 5694c9483b2SDavid S. Miller memset(&fl6, 0, sizeof(fl6)); 5704c9483b2SDavid S. Miller fl6.flowi6_proto = IPPROTO_ICMPV6; 5714e3fd7a0SAlexey Dobriyan fl6.daddr = ipv6_hdr(skb)->saddr; 5721da177e4SLinus Torvalds if (saddr) 5734e3fd7a0SAlexey Dobriyan fl6.saddr = *saddr; 5744c9483b2SDavid S. Miller fl6.flowi6_oif = skb->dev->ifindex; 5751958b856SDavid S. Miller fl6.fl6_icmp_type = ICMPV6_ECHO_REPLY; 576e110861fSLorenzo Colitti fl6.flowi6_mark = mark; 5774c9483b2SDavid S. Miller security_skb_classify_flow(skb, flowi6_to_flowi(&fl6)); 5781da177e4SLinus Torvalds 579fdc0bde9SDenis V. Lunev sk = icmpv6_xmit_lock(net); 580fdc0bde9SDenis V. Lunev if (sk == NULL) 581405666dbSDenis V. Lunev return; 582e110861fSLorenzo Colitti sk->sk_mark = mark; 583fdc0bde9SDenis V. Lunev np = inet6_sk(sk); 584405666dbSDenis V. Lunev 5854c9483b2SDavid S. Miller if (!fl6.flowi6_oif && ipv6_addr_is_multicast(&fl6.daddr)) 5864c9483b2SDavid S. Miller fl6.flowi6_oif = np->mcast_oif; 587c4062dfcSErich E. Hoover else if (!fl6.flowi6_oif) 588c4062dfcSErich E. Hoover fl6.flowi6_oif = np->ucast_oif; 5891da177e4SLinus Torvalds 5904c9483b2SDavid S. Miller err = ip6_dst_lookup(sk, &dst, &fl6); 5911da177e4SLinus Torvalds if (err) 5921da177e4SLinus Torvalds goto out; 5934c9483b2SDavid S. Miller dst = xfrm_lookup(net, dst, flowi6_to_flowi(&fl6), sk, 0); 594452edd59SDavid S. Miller if (IS_ERR(dst)) 595e104411bSPatrick McHardy goto out; 5961da177e4SLinus Torvalds 5975c98631cSLorenzo Colitti hlimit = ip6_sk_dst_hoplimit(np, &fl6, dst); 5981da177e4SLinus Torvalds 599cfdf7647SEric Dumazet idev = __in6_dev_get(skb->dev); 6001da177e4SLinus Torvalds 6011da177e4SLinus Torvalds msg.skb = skb; 6021da177e4SLinus Torvalds msg.offset = 0; 603763ecff1SYasuyuki Kozakai msg.type = ICMPV6_ECHO_REPLY; 6041da177e4SLinus Torvalds 605825edac4SHannes Frederic Sowa tclass = ipv6_get_dsfield(ipv6_hdr(skb)); 6061da177e4SLinus Torvalds err = ip6_append_data(sk, icmpv6_getfrag, &msg, skb->len + sizeof(struct icmp6hdr), 607825edac4SHannes Frederic Sowa sizeof(struct icmp6hdr), hlimit, tclass, NULL, &fl6, 60813b52cd4SBrian Haley (struct rt6_info *)dst, MSG_DONTWAIT, 60913b52cd4SBrian Haley np->dontfrag); 6101da177e4SLinus Torvalds 6111da177e4SLinus Torvalds if (err) { 61200d9d6a1SEric Dumazet ICMP6_INC_STATS_BH(net, idev, ICMP6_MIB_OUTERRORS); 6131da177e4SLinus Torvalds ip6_flush_pending_frames(sk); 614cfdf7647SEric Dumazet } else { 615cfdf7647SEric Dumazet err = icmpv6_push_pending_frames(sk, &fl6, &tmp_hdr, 616cfdf7647SEric Dumazet skb->len + sizeof(struct icmp6hdr)); 6171da177e4SLinus Torvalds } 6181da177e4SLinus Torvalds dst_release(dst); 6191da177e4SLinus Torvalds out: 620405666dbSDenis V. Lunev icmpv6_xmit_unlock(sk); 6211da177e4SLinus Torvalds } 6221da177e4SLinus Torvalds 623b94f1c09SDavid S. Miller void icmpv6_notify(struct sk_buff *skb, u8 type, u8 code, __be32 info) 6241da177e4SLinus Torvalds { 62541135cc8SAlexey Dobriyan const struct inet6_protocol *ipprot; 6261da177e4SLinus Torvalds int inner_offset; 62775f2811cSJesse Gross __be16 frag_off; 628f9242b6bSDavid S. Miller u8 nexthdr; 6291da177e4SLinus Torvalds 6301da177e4SLinus Torvalds if (!pskb_may_pull(skb, sizeof(struct ipv6hdr))) 6311da177e4SLinus Torvalds return; 6321da177e4SLinus Torvalds 6331da177e4SLinus Torvalds nexthdr = ((struct ipv6hdr *)skb->data)->nexthdr; 6341da177e4SLinus Torvalds if (ipv6_ext_hdr(nexthdr)) { 6351da177e4SLinus Torvalds /* now skip over extension headers */ 63675f2811cSJesse Gross inner_offset = ipv6_skip_exthdr(skb, sizeof(struct ipv6hdr), 63775f2811cSJesse Gross &nexthdr, &frag_off); 6381da177e4SLinus Torvalds if (inner_offset<0) 6391da177e4SLinus Torvalds return; 6401da177e4SLinus Torvalds } else { 6411da177e4SLinus Torvalds inner_offset = sizeof(struct ipv6hdr); 6421da177e4SLinus Torvalds } 6431da177e4SLinus Torvalds 6441da177e4SLinus Torvalds /* Checkin header including 8 bytes of inner protocol header. */ 6451da177e4SLinus Torvalds if (!pskb_may_pull(skb, inner_offset+8)) 6461da177e4SLinus Torvalds return; 6471da177e4SLinus Torvalds 6481da177e4SLinus Torvalds /* BUGGG_FUTURE: we should try to parse exthdrs in this packet. 6491da177e4SLinus Torvalds Without this we will not able f.e. to make source routed 6501da177e4SLinus Torvalds pmtu discovery. 6511da177e4SLinus Torvalds Corresponding argument (opt) to notifiers is already added. 6521da177e4SLinus Torvalds --ANK (980726) 6531da177e4SLinus Torvalds */ 6541da177e4SLinus Torvalds 6551da177e4SLinus Torvalds rcu_read_lock(); 656f9242b6bSDavid S. Miller ipprot = rcu_dereference(inet6_protos[nexthdr]); 6571da177e4SLinus Torvalds if (ipprot && ipprot->err_handler) 6581da177e4SLinus Torvalds ipprot->err_handler(skb, NULL, type, code, inner_offset, info); 6591da177e4SLinus Torvalds rcu_read_unlock(); 6601da177e4SLinus Torvalds 66169d6da0bSPavel Emelyanov raw6_icmp_error(skb, nexthdr, type, code, inner_offset, info); 6621da177e4SLinus Torvalds } 6631da177e4SLinus Torvalds 6641da177e4SLinus Torvalds /* 6651da177e4SLinus Torvalds * Handle icmp messages 6661da177e4SLinus Torvalds */ 6671da177e4SLinus Torvalds 668e5bbef20SHerbert Xu static int icmpv6_rcv(struct sk_buff *skb) 6691da177e4SLinus Torvalds { 6701da177e4SLinus Torvalds struct net_device *dev = skb->dev; 6711da177e4SLinus Torvalds struct inet6_dev *idev = __in6_dev_get(dev); 672b71d1d42SEric Dumazet const struct in6_addr *saddr, *daddr; 6731da177e4SLinus Torvalds struct icmp6hdr *hdr; 674d5fdd6baSBrian Haley u8 type; 6751da177e4SLinus Torvalds 676aebcf82cSHerbert Xu if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb)) { 677def8b4faSAlexey Dobriyan struct sec_path *sp = skb_sec_path(skb); 6788b7817f3SHerbert Xu int nh; 6798b7817f3SHerbert Xu 680def8b4faSAlexey Dobriyan if (!(sp && sp->xvec[sp->len - 1]->props.flags & 681aebcf82cSHerbert Xu XFRM_STATE_ICMP)) 682aebcf82cSHerbert Xu goto drop_no_count; 683aebcf82cSHerbert Xu 68481aded24SDavid S. Miller if (!pskb_may_pull(skb, sizeof(*hdr) + sizeof(struct ipv6hdr))) 6858b7817f3SHerbert Xu goto drop_no_count; 6868b7817f3SHerbert Xu 6878b7817f3SHerbert Xu nh = skb_network_offset(skb); 6888b7817f3SHerbert Xu skb_set_network_header(skb, sizeof(*hdr)); 6898b7817f3SHerbert Xu 6908b7817f3SHerbert Xu if (!xfrm6_policy_check_reverse(NULL, XFRM_POLICY_IN, skb)) 6918b7817f3SHerbert Xu goto drop_no_count; 6928b7817f3SHerbert Xu 6938b7817f3SHerbert Xu skb_set_network_header(skb, nh); 6948b7817f3SHerbert Xu } 6958b7817f3SHerbert Xu 696e41b5368SDenis V. Lunev ICMP6_INC_STATS_BH(dev_net(dev), idev, ICMP6_MIB_INMSGS); 6971da177e4SLinus Torvalds 6980660e03fSArnaldo Carvalho de Melo saddr = &ipv6_hdr(skb)->saddr; 6990660e03fSArnaldo Carvalho de Melo daddr = &ipv6_hdr(skb)->daddr; 7001da177e4SLinus Torvalds 70139471ac8STom Herbert if (skb_checksum_validate(skb, IPPROTO_ICMPV6, ip6_compute_pseudo)) { 7026d0bfe22SLorenzo Colitti LIMIT_NETDEBUG(KERN_DEBUG 7036d0bfe22SLorenzo Colitti "ICMPv6 checksum failed [%pI6c > %pI6c]\n", 7040c6ce78aSHarvey Harrison saddr, daddr); 7056a5dc9e5SEric Dumazet goto csum_error; 7061da177e4SLinus Torvalds } 7071da177e4SLinus Torvalds 7088cf22943SHerbert Xu if (!pskb_pull(skb, sizeof(*hdr))) 7098cf22943SHerbert Xu goto discard_it; 7101da177e4SLinus Torvalds 711cc70ab26SArnaldo Carvalho de Melo hdr = icmp6_hdr(skb); 7121da177e4SLinus Torvalds 7131da177e4SLinus Torvalds type = hdr->icmp6_type; 7141da177e4SLinus Torvalds 71555d43808SDenis V. Lunev ICMP6MSGIN_INC_STATS_BH(dev_net(dev), idev, type); 7161da177e4SLinus Torvalds 7171da177e4SLinus Torvalds switch (type) { 7181da177e4SLinus Torvalds case ICMPV6_ECHO_REQUEST: 7191da177e4SLinus Torvalds icmpv6_echo_reply(skb); 7201da177e4SLinus Torvalds break; 7211da177e4SLinus Torvalds 7221da177e4SLinus Torvalds case ICMPV6_ECHO_REPLY: 7236d0bfe22SLorenzo Colitti ping_rcv(skb); 7241da177e4SLinus Torvalds break; 7251da177e4SLinus Torvalds 7261da177e4SLinus Torvalds case ICMPV6_PKT_TOOBIG: 7271da177e4SLinus Torvalds /* BUGGG_FUTURE: if packet contains rthdr, we cannot update 7281da177e4SLinus Torvalds standard destination cache. Seems, only "advanced" 7291da177e4SLinus Torvalds destination cache will allow to solve this problem 7301da177e4SLinus Torvalds --ANK (980726) 7311da177e4SLinus Torvalds */ 7321da177e4SLinus Torvalds if (!pskb_may_pull(skb, sizeof(struct ipv6hdr))) 7331da177e4SLinus Torvalds goto discard_it; 734cc70ab26SArnaldo Carvalho de Melo hdr = icmp6_hdr(skb); 7351da177e4SLinus Torvalds 7361da177e4SLinus Torvalds /* 7371da177e4SLinus Torvalds * Drop through to notify 7381da177e4SLinus Torvalds */ 7391da177e4SLinus Torvalds 7401da177e4SLinus Torvalds case ICMPV6_DEST_UNREACH: 7411da177e4SLinus Torvalds case ICMPV6_TIME_EXCEED: 7421da177e4SLinus Torvalds case ICMPV6_PARAMPROB: 7431da177e4SLinus Torvalds icmpv6_notify(skb, type, hdr->icmp6_code, hdr->icmp6_mtu); 7441da177e4SLinus Torvalds break; 7451da177e4SLinus Torvalds 7461da177e4SLinus Torvalds case NDISC_ROUTER_SOLICITATION: 7471da177e4SLinus Torvalds case NDISC_ROUTER_ADVERTISEMENT: 7481da177e4SLinus Torvalds case NDISC_NEIGHBOUR_SOLICITATION: 7491da177e4SLinus Torvalds case NDISC_NEIGHBOUR_ADVERTISEMENT: 7501da177e4SLinus Torvalds case NDISC_REDIRECT: 7511da177e4SLinus Torvalds ndisc_rcv(skb); 7521da177e4SLinus Torvalds break; 7531da177e4SLinus Torvalds 7541da177e4SLinus Torvalds case ICMPV6_MGM_QUERY: 7551da177e4SLinus Torvalds igmp6_event_query(skb); 7561da177e4SLinus Torvalds break; 7571da177e4SLinus Torvalds 7581da177e4SLinus Torvalds case ICMPV6_MGM_REPORT: 7591da177e4SLinus Torvalds igmp6_event_report(skb); 7601da177e4SLinus Torvalds break; 7611da177e4SLinus Torvalds 7621da177e4SLinus Torvalds case ICMPV6_MGM_REDUCTION: 7631da177e4SLinus Torvalds case ICMPV6_NI_QUERY: 7641da177e4SLinus Torvalds case ICMPV6_NI_REPLY: 7651da177e4SLinus Torvalds case ICMPV6_MLD2_REPORT: 7661da177e4SLinus Torvalds case ICMPV6_DHAAD_REQUEST: 7671da177e4SLinus Torvalds case ICMPV6_DHAAD_REPLY: 7681da177e4SLinus Torvalds case ICMPV6_MOBILE_PREFIX_SOL: 7691da177e4SLinus Torvalds case ICMPV6_MOBILE_PREFIX_ADV: 7701da177e4SLinus Torvalds break; 7711da177e4SLinus Torvalds 7721da177e4SLinus Torvalds default: 77364ce2073SPatrick McHardy LIMIT_NETDEBUG(KERN_DEBUG "icmpv6: msg of unknown type\n"); 7741da177e4SLinus Torvalds 7751da177e4SLinus Torvalds /* informational */ 7761da177e4SLinus Torvalds if (type & ICMPV6_INFOMSG_MASK) 7771da177e4SLinus Torvalds break; 7781da177e4SLinus Torvalds 7791da177e4SLinus Torvalds /* 7801da177e4SLinus Torvalds * error of unknown type. 7811da177e4SLinus Torvalds * must pass to upper level 7821da177e4SLinus Torvalds */ 7831da177e4SLinus Torvalds 7841da177e4SLinus Torvalds icmpv6_notify(skb, type, hdr->icmp6_code, hdr->icmp6_mtu); 7853ff50b79SStephen Hemminger } 7863ff50b79SStephen Hemminger 7871da177e4SLinus Torvalds kfree_skb(skb); 7881da177e4SLinus Torvalds return 0; 7891da177e4SLinus Torvalds 7906a5dc9e5SEric Dumazet csum_error: 7916a5dc9e5SEric Dumazet ICMP6_INC_STATS_BH(dev_net(dev), idev, ICMP6_MIB_CSUMERRORS); 7921da177e4SLinus Torvalds discard_it: 793e41b5368SDenis V. Lunev ICMP6_INC_STATS_BH(dev_net(dev), idev, ICMP6_MIB_INERRORS); 7948b7817f3SHerbert Xu drop_no_count: 7951da177e4SLinus Torvalds kfree_skb(skb); 7961da177e4SLinus Torvalds return 0; 7971da177e4SLinus Torvalds } 7981da177e4SLinus Torvalds 7994c9483b2SDavid S. Miller void icmpv6_flow_init(struct sock *sk, struct flowi6 *fl6, 80095e41e93SYOSHIFUJI Hideaki u8 type, 80195e41e93SYOSHIFUJI Hideaki const struct in6_addr *saddr, 80295e41e93SYOSHIFUJI Hideaki const struct in6_addr *daddr, 80395e41e93SYOSHIFUJI Hideaki int oif) 80495e41e93SYOSHIFUJI Hideaki { 8054c9483b2SDavid S. Miller memset(fl6, 0, sizeof(*fl6)); 8064e3fd7a0SAlexey Dobriyan fl6->saddr = *saddr; 8074e3fd7a0SAlexey Dobriyan fl6->daddr = *daddr; 8084c9483b2SDavid S. Miller fl6->flowi6_proto = IPPROTO_ICMPV6; 8091958b856SDavid S. Miller fl6->fl6_icmp_type = type; 8101958b856SDavid S. Miller fl6->fl6_icmp_code = 0; 8114c9483b2SDavid S. Miller fl6->flowi6_oif = oif; 8124c9483b2SDavid S. Miller security_sk_classify_flow(sk, flowi6_to_flowi(fl6)); 81395e41e93SYOSHIFUJI Hideaki } 81495e41e93SYOSHIFUJI Hideaki 815640c41c7SIngo Molnar /* 816b7e729c4SDenis V. Lunev * Special lock-class for __icmpv6_sk: 817640c41c7SIngo Molnar */ 818640c41c7SIngo Molnar static struct lock_class_key icmpv6_socket_sk_dst_lock_key; 819640c41c7SIngo Molnar 82098c6d1b2SDenis V. Lunev static int __net_init icmpv6_sk_init(struct net *net) 8211da177e4SLinus Torvalds { 8221da177e4SLinus Torvalds struct sock *sk; 8231da177e4SLinus Torvalds int err, i, j; 8241da177e4SLinus Torvalds 82598c6d1b2SDenis V. Lunev net->ipv6.icmp_sk = 82698c6d1b2SDenis V. Lunev kzalloc(nr_cpu_ids * sizeof(struct sock *), GFP_KERNEL); 82798c6d1b2SDenis V. Lunev if (net->ipv6.icmp_sk == NULL) 82879c91159SDenis V. Lunev return -ENOMEM; 82979c91159SDenis V. Lunev 8306f912042SKAMEZAWA Hiroyuki for_each_possible_cpu(i) { 8311ed8516fSDenis V. Lunev err = inet_ctl_sock_create(&sk, PF_INET6, 8321ed8516fSDenis V. Lunev SOCK_RAW, IPPROTO_ICMPV6, net); 8331da177e4SLinus Torvalds if (err < 0) { 834f3213831SJoe Perches pr_err("Failed to initialize the ICMP6 control socket (err %d)\n", 8351da177e4SLinus Torvalds err); 8361da177e4SLinus Torvalds goto fail; 8371da177e4SLinus Torvalds } 8381da177e4SLinus Torvalds 8391ed8516fSDenis V. Lunev net->ipv6.icmp_sk[i] = sk; 8405c8cafd6SDenis V. Lunev 841640c41c7SIngo Molnar /* 842640c41c7SIngo Molnar * Split off their lock-class, because sk->sk_dst_lock 843640c41c7SIngo Molnar * gets used from softirqs, which is safe for 844b7e729c4SDenis V. Lunev * __icmpv6_sk (because those never get directly used 845640c41c7SIngo Molnar * via userspace syscalls), but unsafe for normal sockets. 846640c41c7SIngo Molnar */ 847640c41c7SIngo Molnar lockdep_set_class(&sk->sk_dst_lock, 848640c41c7SIngo Molnar &icmpv6_socket_sk_dst_lock_key); 8491da177e4SLinus Torvalds 8501da177e4SLinus Torvalds /* Enough space for 2 64K ICMP packets, including 8511da177e4SLinus Torvalds * sk_buff struct overhead. 8521da177e4SLinus Torvalds */ 85387fb4b7bSEric Dumazet sk->sk_sndbuf = 2 * SKB_TRUESIZE(64 * 1024); 8541da177e4SLinus Torvalds } 8551da177e4SLinus Torvalds return 0; 8561da177e4SLinus Torvalds 8571da177e4SLinus Torvalds fail: 8585c8cafd6SDenis V. Lunev for (j = 0; j < i; j++) 8591ed8516fSDenis V. Lunev inet_ctl_sock_destroy(net->ipv6.icmp_sk[j]); 86098c6d1b2SDenis V. Lunev kfree(net->ipv6.icmp_sk); 8611da177e4SLinus Torvalds return err; 8621da177e4SLinus Torvalds } 8631da177e4SLinus Torvalds 86498c6d1b2SDenis V. Lunev static void __net_exit icmpv6_sk_exit(struct net *net) 8651da177e4SLinus Torvalds { 8661da177e4SLinus Torvalds int i; 8671da177e4SLinus Torvalds 8686f912042SKAMEZAWA Hiroyuki for_each_possible_cpu(i) { 8691ed8516fSDenis V. Lunev inet_ctl_sock_destroy(net->ipv6.icmp_sk[i]); 8701da177e4SLinus Torvalds } 87198c6d1b2SDenis V. Lunev kfree(net->ipv6.icmp_sk); 87298c6d1b2SDenis V. Lunev } 87398c6d1b2SDenis V. Lunev 8748ed7edceSAlexey Dobriyan static struct pernet_operations icmpv6_sk_ops = { 87598c6d1b2SDenis V. Lunev .init = icmpv6_sk_init, 87698c6d1b2SDenis V. Lunev .exit = icmpv6_sk_exit, 87798c6d1b2SDenis V. Lunev }; 87898c6d1b2SDenis V. Lunev 87998c6d1b2SDenis V. Lunev int __init icmpv6_init(void) 88098c6d1b2SDenis V. Lunev { 88198c6d1b2SDenis V. Lunev int err; 88298c6d1b2SDenis V. Lunev 88398c6d1b2SDenis V. Lunev err = register_pernet_subsys(&icmpv6_sk_ops); 88498c6d1b2SDenis V. Lunev if (err < 0) 88598c6d1b2SDenis V. Lunev return err; 88698c6d1b2SDenis V. Lunev 88798c6d1b2SDenis V. Lunev err = -EAGAIN; 88898c6d1b2SDenis V. Lunev if (inet6_add_protocol(&icmpv6_protocol, IPPROTO_ICMPV6) < 0) 88998c6d1b2SDenis V. Lunev goto fail; 8905f5624cfSPravin B Shelar 8915f5624cfSPravin B Shelar err = inet6_register_icmp_sender(icmp6_send); 8925f5624cfSPravin B Shelar if (err) 8935f5624cfSPravin B Shelar goto sender_reg_err; 89498c6d1b2SDenis V. Lunev return 0; 89598c6d1b2SDenis V. Lunev 8965f5624cfSPravin B Shelar sender_reg_err: 8975f5624cfSPravin B Shelar inet6_del_protocol(&icmpv6_protocol, IPPROTO_ICMPV6); 89898c6d1b2SDenis V. Lunev fail: 899f3213831SJoe Perches pr_err("Failed to register ICMP6 protocol\n"); 90098c6d1b2SDenis V. Lunev unregister_pernet_subsys(&icmpv6_sk_ops); 90198c6d1b2SDenis V. Lunev return err; 90298c6d1b2SDenis V. Lunev } 90398c6d1b2SDenis V. Lunev 9048ed7edceSAlexey Dobriyan void icmpv6_cleanup(void) 90598c6d1b2SDenis V. Lunev { 9065f5624cfSPravin B Shelar inet6_unregister_icmp_sender(icmp6_send); 90798c6d1b2SDenis V. Lunev unregister_pernet_subsys(&icmpv6_sk_ops); 9081da177e4SLinus Torvalds inet6_del_protocol(&icmpv6_protocol, IPPROTO_ICMPV6); 9091da177e4SLinus Torvalds } 9101da177e4SLinus Torvalds 91198c6d1b2SDenis V. Lunev 9129b5b5cffSArjan van de Ven static const struct icmp6_err { 9131da177e4SLinus Torvalds int err; 9141da177e4SLinus Torvalds int fatal; 9151da177e4SLinus Torvalds } tab_unreach[] = { 9161da177e4SLinus Torvalds { /* NOROUTE */ 9171da177e4SLinus Torvalds .err = ENETUNREACH, 9181da177e4SLinus Torvalds .fatal = 0, 9191da177e4SLinus Torvalds }, 9201da177e4SLinus Torvalds { /* ADM_PROHIBITED */ 9211da177e4SLinus Torvalds .err = EACCES, 9221da177e4SLinus Torvalds .fatal = 1, 9231da177e4SLinus Torvalds }, 9241da177e4SLinus Torvalds { /* Was NOT_NEIGHBOUR, now reserved */ 9251da177e4SLinus Torvalds .err = EHOSTUNREACH, 9261da177e4SLinus Torvalds .fatal = 0, 9271da177e4SLinus Torvalds }, 9281da177e4SLinus Torvalds { /* ADDR_UNREACH */ 9291da177e4SLinus Torvalds .err = EHOSTUNREACH, 9301da177e4SLinus Torvalds .fatal = 0, 9311da177e4SLinus Torvalds }, 9321da177e4SLinus Torvalds { /* PORT_UNREACH */ 9331da177e4SLinus Torvalds .err = ECONNREFUSED, 9341da177e4SLinus Torvalds .fatal = 1, 9351da177e4SLinus Torvalds }, 93661e76b17SJiri Bohac { /* POLICY_FAIL */ 93761e76b17SJiri Bohac .err = EACCES, 93861e76b17SJiri Bohac .fatal = 1, 93961e76b17SJiri Bohac }, 94061e76b17SJiri Bohac { /* REJECT_ROUTE */ 94161e76b17SJiri Bohac .err = EACCES, 94261e76b17SJiri Bohac .fatal = 1, 94361e76b17SJiri Bohac }, 9441da177e4SLinus Torvalds }; 9451da177e4SLinus Torvalds 946d5fdd6baSBrian Haley int icmpv6_err_convert(u8 type, u8 code, int *err) 9471da177e4SLinus Torvalds { 9481da177e4SLinus Torvalds int fatal = 0; 9491da177e4SLinus Torvalds 9501da177e4SLinus Torvalds *err = EPROTO; 9511da177e4SLinus Torvalds 9521da177e4SLinus Torvalds switch (type) { 9531da177e4SLinus Torvalds case ICMPV6_DEST_UNREACH: 9541da177e4SLinus Torvalds fatal = 1; 95561e76b17SJiri Bohac if (code < ARRAY_SIZE(tab_unreach)) { 9561da177e4SLinus Torvalds *err = tab_unreach[code].err; 9571da177e4SLinus Torvalds fatal = tab_unreach[code].fatal; 9581da177e4SLinus Torvalds } 9591da177e4SLinus Torvalds break; 9601da177e4SLinus Torvalds 9611da177e4SLinus Torvalds case ICMPV6_PKT_TOOBIG: 9621da177e4SLinus Torvalds *err = EMSGSIZE; 9631da177e4SLinus Torvalds break; 9641da177e4SLinus Torvalds 9651da177e4SLinus Torvalds case ICMPV6_PARAMPROB: 9661da177e4SLinus Torvalds *err = EPROTO; 9671da177e4SLinus Torvalds fatal = 1; 9681da177e4SLinus Torvalds break; 9691da177e4SLinus Torvalds 9701da177e4SLinus Torvalds case ICMPV6_TIME_EXCEED: 9711da177e4SLinus Torvalds *err = EHOSTUNREACH; 9721da177e4SLinus Torvalds break; 9733ff50b79SStephen Hemminger } 9741da177e4SLinus Torvalds 9751da177e4SLinus Torvalds return fatal; 9761da177e4SLinus Torvalds } 9777159039aSYOSHIFUJI Hideaki EXPORT_SYMBOL(icmpv6_err_convert); 9787159039aSYOSHIFUJI Hideaki 9791da177e4SLinus Torvalds #ifdef CONFIG_SYSCTL 980e8243534Sstephen hemminger static struct ctl_table ipv6_icmp_table_template[] = { 9811da177e4SLinus Torvalds { 9821da177e4SLinus Torvalds .procname = "ratelimit", 98341a76906SDaniel Lezcano .data = &init_net.ipv6.sysctl.icmpv6_time, 9841da177e4SLinus Torvalds .maxlen = sizeof(int), 9851da177e4SLinus Torvalds .mode = 0644, 9866d9f239aSAlexey Dobriyan .proc_handler = proc_dointvec_ms_jiffies, 9871da177e4SLinus Torvalds }, 988f8572d8fSEric W. Biederman { }, 9891da177e4SLinus Torvalds }; 990760f2d01SDaniel Lezcano 9912c8c1e72SAlexey Dobriyan struct ctl_table * __net_init ipv6_icmp_sysctl_init(struct net *net) 992760f2d01SDaniel Lezcano { 993760f2d01SDaniel Lezcano struct ctl_table *table; 994760f2d01SDaniel Lezcano 995760f2d01SDaniel Lezcano table = kmemdup(ipv6_icmp_table_template, 996760f2d01SDaniel Lezcano sizeof(ipv6_icmp_table_template), 997760f2d01SDaniel Lezcano GFP_KERNEL); 9985ee09105SYOSHIFUJI Hideaki 999c027aab4SEric W. Biederman if (table) 10005ee09105SYOSHIFUJI Hideaki table[0].data = &net->ipv6.sysctl.icmpv6_time; 10015ee09105SYOSHIFUJI Hideaki 1002760f2d01SDaniel Lezcano return table; 1003760f2d01SDaniel Lezcano } 10041da177e4SLinus Torvalds #endif 10051da177e4SLinus Torvalds 1006