xref: /openbmc/linux/net/ipv6/icmp.c (revision 1c2dd16a)
1 /*
2  *	Internet Control Message Protocol (ICMPv6)
3  *	Linux INET6 implementation
4  *
5  *	Authors:
6  *	Pedro Roque		<roque@di.fc.ul.pt>
7  *
8  *	Based on net/ipv4/icmp.c
9  *
10  *	RFC 1885
11  *
12  *	This program is free software; you can redistribute it and/or
13  *      modify it under the terms of the GNU General Public License
14  *      as published by the Free Software Foundation; either version
15  *      2 of the License, or (at your option) any later version.
16  */
17 
18 /*
19  *	Changes:
20  *
21  *	Andi Kleen		:	exception handling
22  *	Andi Kleen			add rate limits. never reply to a icmp.
23  *					add more length checks and other fixes.
24  *	yoshfuji		:	ensure to sent parameter problem for
25  *					fragments.
26  *	YOSHIFUJI Hideaki @USAGI:	added sysctl for icmp rate limit.
27  *	Randy Dunlap and
28  *	YOSHIFUJI Hideaki @USAGI:	Per-interface statistics support
29  *	Kazunori MIYAZAWA @USAGI:       change output process to use ip6_append_data
30  */
31 
32 #define pr_fmt(fmt) "IPv6: " fmt
33 
34 #include <linux/module.h>
35 #include <linux/errno.h>
36 #include <linux/types.h>
37 #include <linux/socket.h>
38 #include <linux/in.h>
39 #include <linux/kernel.h>
40 #include <linux/sockios.h>
41 #include <linux/net.h>
42 #include <linux/skbuff.h>
43 #include <linux/init.h>
44 #include <linux/netfilter.h>
45 #include <linux/slab.h>
46 
47 #ifdef CONFIG_SYSCTL
48 #include <linux/sysctl.h>
49 #endif
50 
51 #include <linux/inet.h>
52 #include <linux/netdevice.h>
53 #include <linux/icmpv6.h>
54 
55 #include <net/ip.h>
56 #include <net/sock.h>
57 
58 #include <net/ipv6.h>
59 #include <net/ip6_checksum.h>
60 #include <net/ping.h>
61 #include <net/protocol.h>
62 #include <net/raw.h>
63 #include <net/rawv6.h>
64 #include <net/transp_v6.h>
65 #include <net/ip6_route.h>
66 #include <net/addrconf.h>
67 #include <net/icmp.h>
68 #include <net/xfrm.h>
69 #include <net/inet_common.h>
70 #include <net/dsfield.h>
71 #include <net/l3mdev.h>
72 
73 #include <linux/uaccess.h>
74 
75 /*
76  *	The ICMP socket(s). This is the most convenient way to flow control
77  *	our ICMP output as well as maintain a clean interface throughout
78  *	all layers. All Socketless IP sends will soon be gone.
79  *
80  *	On SMP we have one ICMP socket per-cpu.
81  */
82 static inline struct sock *icmpv6_sk(struct net *net)
83 {
84 	return net->ipv6.icmp_sk[smp_processor_id()];
85 }
86 
87 static void icmpv6_err(struct sk_buff *skb, struct inet6_skb_parm *opt,
88 		       u8 type, u8 code, int offset, __be32 info)
89 {
90 	/* icmpv6_notify checks 8 bytes can be pulled, icmp6hdr is 8 bytes */
91 	struct icmp6hdr *icmp6 = (struct icmp6hdr *) (skb->data + offset);
92 	struct net *net = dev_net(skb->dev);
93 
94 	if (type == ICMPV6_PKT_TOOBIG)
95 		ip6_update_pmtu(skb, net, info, 0, 0, sock_net_uid(net, NULL));
96 	else if (type == NDISC_REDIRECT)
97 		ip6_redirect(skb, net, skb->dev->ifindex, 0,
98 			     sock_net_uid(net, NULL));
99 
100 	if (!(type & ICMPV6_INFOMSG_MASK))
101 		if (icmp6->icmp6_type == ICMPV6_ECHO_REQUEST)
102 			ping_err(skb, offset, ntohl(info));
103 }
104 
105 static int icmpv6_rcv(struct sk_buff *skb);
106 
107 static const struct inet6_protocol icmpv6_protocol = {
108 	.handler	=	icmpv6_rcv,
109 	.err_handler	=	icmpv6_err,
110 	.flags		=	INET6_PROTO_NOPOLICY|INET6_PROTO_FINAL,
111 };
112 
113 /* Called with BH disabled */
114 static __inline__ struct sock *icmpv6_xmit_lock(struct net *net)
115 {
116 	struct sock *sk;
117 
118 	sk = icmpv6_sk(net);
119 	if (unlikely(!spin_trylock(&sk->sk_lock.slock))) {
120 		/* This can happen if the output path (f.e. SIT or
121 		 * ip6ip6 tunnel) signals dst_link_failure() for an
122 		 * outgoing ICMP6 packet.
123 		 */
124 		return NULL;
125 	}
126 	return sk;
127 }
128 
129 static __inline__ void icmpv6_xmit_unlock(struct sock *sk)
130 {
131 	spin_unlock(&sk->sk_lock.slock);
132 }
133 
134 /*
135  * Figure out, may we reply to this packet with icmp error.
136  *
137  * We do not reply, if:
138  *	- it was icmp error message.
139  *	- it is truncated, so that it is known, that protocol is ICMPV6
140  *	  (i.e. in the middle of some exthdr)
141  *
142  *	--ANK (980726)
143  */
144 
145 static bool is_ineligible(const struct sk_buff *skb)
146 {
147 	int ptr = (u8 *)(ipv6_hdr(skb) + 1) - skb->data;
148 	int len = skb->len - ptr;
149 	__u8 nexthdr = ipv6_hdr(skb)->nexthdr;
150 	__be16 frag_off;
151 
152 	if (len < 0)
153 		return true;
154 
155 	ptr = ipv6_skip_exthdr(skb, ptr, &nexthdr, &frag_off);
156 	if (ptr < 0)
157 		return false;
158 	if (nexthdr == IPPROTO_ICMPV6) {
159 		u8 _type, *tp;
160 		tp = skb_header_pointer(skb,
161 			ptr+offsetof(struct icmp6hdr, icmp6_type),
162 			sizeof(_type), &_type);
163 		if (!tp || !(*tp & ICMPV6_INFOMSG_MASK))
164 			return true;
165 	}
166 	return false;
167 }
168 
169 static bool icmpv6_mask_allow(int type)
170 {
171 	/* Informational messages are not limited. */
172 	if (type & ICMPV6_INFOMSG_MASK)
173 		return true;
174 
175 	/* Do not limit pmtu discovery, it would break it. */
176 	if (type == ICMPV6_PKT_TOOBIG)
177 		return true;
178 
179 	return false;
180 }
181 
182 static bool icmpv6_global_allow(int type)
183 {
184 	if (icmpv6_mask_allow(type))
185 		return true;
186 
187 	if (icmp_global_allow())
188 		return true;
189 
190 	return false;
191 }
192 
193 /*
194  * Check the ICMP output rate limit
195  */
196 static bool icmpv6_xrlim_allow(struct sock *sk, u8 type,
197 			       struct flowi6 *fl6)
198 {
199 	struct net *net = sock_net(sk);
200 	struct dst_entry *dst;
201 	bool res = false;
202 
203 	if (icmpv6_mask_allow(type))
204 		return true;
205 
206 	/*
207 	 * Look up the output route.
208 	 * XXX: perhaps the expire for routing entries cloned by
209 	 * this lookup should be more aggressive (not longer than timeout).
210 	 */
211 	dst = ip6_route_output(net, sk, fl6);
212 	if (dst->error) {
213 		IP6_INC_STATS(net, ip6_dst_idev(dst),
214 			      IPSTATS_MIB_OUTNOROUTES);
215 	} else if (dst->dev && (dst->dev->flags&IFF_LOOPBACK)) {
216 		res = true;
217 	} else {
218 		struct rt6_info *rt = (struct rt6_info *)dst;
219 		int tmo = net->ipv6.sysctl.icmpv6_time;
220 		struct inet_peer *peer;
221 
222 		/* Give more bandwidth to wider prefixes. */
223 		if (rt->rt6i_dst.plen < 128)
224 			tmo >>= ((128 - rt->rt6i_dst.plen)>>5);
225 
226 		peer = inet_getpeer_v6(net->ipv6.peers, &fl6->daddr, 1);
227 		res = inet_peer_xrlim_allow(peer, tmo);
228 		if (peer)
229 			inet_putpeer(peer);
230 	}
231 	dst_release(dst);
232 	return res;
233 }
234 
235 /*
236  *	an inline helper for the "simple" if statement below
237  *	checks if parameter problem report is caused by an
238  *	unrecognized IPv6 option that has the Option Type
239  *	highest-order two bits set to 10
240  */
241 
242 static bool opt_unrec(struct sk_buff *skb, __u32 offset)
243 {
244 	u8 _optval, *op;
245 
246 	offset += skb_network_offset(skb);
247 	op = skb_header_pointer(skb, offset, sizeof(_optval), &_optval);
248 	if (!op)
249 		return true;
250 	return (*op & 0xC0) == 0x80;
251 }
252 
253 int icmpv6_push_pending_frames(struct sock *sk, struct flowi6 *fl6,
254 			       struct icmp6hdr *thdr, int len)
255 {
256 	struct sk_buff *skb;
257 	struct icmp6hdr *icmp6h;
258 	int err = 0;
259 
260 	skb = skb_peek(&sk->sk_write_queue);
261 	if (!skb)
262 		goto out;
263 
264 	icmp6h = icmp6_hdr(skb);
265 	memcpy(icmp6h, thdr, sizeof(struct icmp6hdr));
266 	icmp6h->icmp6_cksum = 0;
267 
268 	if (skb_queue_len(&sk->sk_write_queue) == 1) {
269 		skb->csum = csum_partial(icmp6h,
270 					sizeof(struct icmp6hdr), skb->csum);
271 		icmp6h->icmp6_cksum = csum_ipv6_magic(&fl6->saddr,
272 						      &fl6->daddr,
273 						      len, fl6->flowi6_proto,
274 						      skb->csum);
275 	} else {
276 		__wsum tmp_csum = 0;
277 
278 		skb_queue_walk(&sk->sk_write_queue, skb) {
279 			tmp_csum = csum_add(tmp_csum, skb->csum);
280 		}
281 
282 		tmp_csum = csum_partial(icmp6h,
283 					sizeof(struct icmp6hdr), tmp_csum);
284 		icmp6h->icmp6_cksum = csum_ipv6_magic(&fl6->saddr,
285 						      &fl6->daddr,
286 						      len, fl6->flowi6_proto,
287 						      tmp_csum);
288 	}
289 	ip6_push_pending_frames(sk);
290 out:
291 	return err;
292 }
293 
294 struct icmpv6_msg {
295 	struct sk_buff	*skb;
296 	int		offset;
297 	uint8_t		type;
298 };
299 
300 static int icmpv6_getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb)
301 {
302 	struct icmpv6_msg *msg = (struct icmpv6_msg *) from;
303 	struct sk_buff *org_skb = msg->skb;
304 	__wsum csum = 0;
305 
306 	csum = skb_copy_and_csum_bits(org_skb, msg->offset + offset,
307 				      to, len, csum);
308 	skb->csum = csum_block_add(skb->csum, csum, odd);
309 	if (!(msg->type & ICMPV6_INFOMSG_MASK))
310 		nf_ct_attach(skb, org_skb);
311 	return 0;
312 }
313 
314 #if IS_ENABLED(CONFIG_IPV6_MIP6)
315 static void mip6_addr_swap(struct sk_buff *skb)
316 {
317 	struct ipv6hdr *iph = ipv6_hdr(skb);
318 	struct inet6_skb_parm *opt = IP6CB(skb);
319 	struct ipv6_destopt_hao *hao;
320 	struct in6_addr tmp;
321 	int off;
322 
323 	if (opt->dsthao) {
324 		off = ipv6_find_tlv(skb, opt->dsthao, IPV6_TLV_HAO);
325 		if (likely(off >= 0)) {
326 			hao = (struct ipv6_destopt_hao *)
327 					(skb_network_header(skb) + off);
328 			tmp = iph->saddr;
329 			iph->saddr = hao->addr;
330 			hao->addr = tmp;
331 		}
332 	}
333 }
334 #else
335 static inline void mip6_addr_swap(struct sk_buff *skb) {}
336 #endif
337 
338 static struct dst_entry *icmpv6_route_lookup(struct net *net,
339 					     struct sk_buff *skb,
340 					     struct sock *sk,
341 					     struct flowi6 *fl6)
342 {
343 	struct dst_entry *dst, *dst2;
344 	struct flowi6 fl2;
345 	int err;
346 
347 	err = ip6_dst_lookup(net, sk, &dst, fl6);
348 	if (err)
349 		return ERR_PTR(err);
350 
351 	/*
352 	 * We won't send icmp if the destination is known
353 	 * anycast.
354 	 */
355 	if (ipv6_anycast_destination(dst, &fl6->daddr)) {
356 		net_dbg_ratelimited("icmp6_send: acast source\n");
357 		dst_release(dst);
358 		return ERR_PTR(-EINVAL);
359 	}
360 
361 	/* No need to clone since we're just using its address. */
362 	dst2 = dst;
363 
364 	dst = xfrm_lookup(net, dst, flowi6_to_flowi(fl6), sk, 0);
365 	if (!IS_ERR(dst)) {
366 		if (dst != dst2)
367 			return dst;
368 	} else {
369 		if (PTR_ERR(dst) == -EPERM)
370 			dst = NULL;
371 		else
372 			return dst;
373 	}
374 
375 	err = xfrm_decode_session_reverse(skb, flowi6_to_flowi(&fl2), AF_INET6);
376 	if (err)
377 		goto relookup_failed;
378 
379 	err = ip6_dst_lookup(net, sk, &dst2, &fl2);
380 	if (err)
381 		goto relookup_failed;
382 
383 	dst2 = xfrm_lookup(net, dst2, flowi6_to_flowi(&fl2), sk, XFRM_LOOKUP_ICMP);
384 	if (!IS_ERR(dst2)) {
385 		dst_release(dst);
386 		dst = dst2;
387 	} else {
388 		err = PTR_ERR(dst2);
389 		if (err == -EPERM) {
390 			dst_release(dst);
391 			return dst2;
392 		} else
393 			goto relookup_failed;
394 	}
395 
396 relookup_failed:
397 	if (dst)
398 		return dst;
399 	return ERR_PTR(err);
400 }
401 
402 /*
403  *	Send an ICMP message in response to a packet in error
404  */
405 static void icmp6_send(struct sk_buff *skb, u8 type, u8 code, __u32 info,
406 		       const struct in6_addr *force_saddr)
407 {
408 	struct net *net = dev_net(skb->dev);
409 	struct inet6_dev *idev = NULL;
410 	struct ipv6hdr *hdr = ipv6_hdr(skb);
411 	struct sock *sk;
412 	struct ipv6_pinfo *np;
413 	const struct in6_addr *saddr = NULL;
414 	struct dst_entry *dst;
415 	struct icmp6hdr tmp_hdr;
416 	struct flowi6 fl6;
417 	struct icmpv6_msg msg;
418 	struct sockcm_cookie sockc_unused = {0};
419 	struct ipcm6_cookie ipc6;
420 	int iif = 0;
421 	int addr_type = 0;
422 	int len;
423 	int err = 0;
424 	u32 mark = IP6_REPLY_MARK(net, skb->mark);
425 
426 	if ((u8 *)hdr < skb->head ||
427 	    (skb_network_header(skb) + sizeof(*hdr)) > skb_tail_pointer(skb))
428 		return;
429 
430 	/*
431 	 *	Make sure we respect the rules
432 	 *	i.e. RFC 1885 2.4(e)
433 	 *	Rule (e.1) is enforced by not using icmp6_send
434 	 *	in any code that processes icmp errors.
435 	 */
436 	addr_type = ipv6_addr_type(&hdr->daddr);
437 
438 	if (ipv6_chk_addr(net, &hdr->daddr, skb->dev, 0) ||
439 	    ipv6_chk_acast_addr_src(net, skb->dev, &hdr->daddr))
440 		saddr = &hdr->daddr;
441 
442 	/*
443 	 *	Dest addr check
444 	 */
445 
446 	if (addr_type & IPV6_ADDR_MULTICAST || skb->pkt_type != PACKET_HOST) {
447 		if (type != ICMPV6_PKT_TOOBIG &&
448 		    !(type == ICMPV6_PARAMPROB &&
449 		      code == ICMPV6_UNK_OPTION &&
450 		      (opt_unrec(skb, info))))
451 			return;
452 
453 		saddr = NULL;
454 	}
455 
456 	addr_type = ipv6_addr_type(&hdr->saddr);
457 
458 	/*
459 	 *	Source addr check
460 	 */
461 
462 	if (__ipv6_addr_needs_scope_id(addr_type))
463 		iif = skb->dev->ifindex;
464 	else {
465 		dst = skb_dst(skb);
466 		iif = l3mdev_master_ifindex(dst ? dst->dev : skb->dev);
467 	}
468 
469 	/*
470 	 *	Must not send error if the source does not uniquely
471 	 *	identify a single node (RFC2463 Section 2.4).
472 	 *	We check unspecified / multicast addresses here,
473 	 *	and anycast addresses will be checked later.
474 	 */
475 	if ((addr_type == IPV6_ADDR_ANY) || (addr_type & IPV6_ADDR_MULTICAST)) {
476 		net_dbg_ratelimited("icmp6_send: addr_any/mcast source [%pI6c > %pI6c]\n",
477 				    &hdr->saddr, &hdr->daddr);
478 		return;
479 	}
480 
481 	/*
482 	 *	Never answer to a ICMP packet.
483 	 */
484 	if (is_ineligible(skb)) {
485 		net_dbg_ratelimited("icmp6_send: no reply to icmp error [%pI6c > %pI6c]\n",
486 				    &hdr->saddr, &hdr->daddr);
487 		return;
488 	}
489 
490 	/* Needed by both icmp_global_allow and icmpv6_xmit_lock */
491 	local_bh_disable();
492 
493 	/* Check global sysctl_icmp_msgs_per_sec ratelimit */
494 	if (!icmpv6_global_allow(type))
495 		goto out_bh_enable;
496 
497 	mip6_addr_swap(skb);
498 
499 	memset(&fl6, 0, sizeof(fl6));
500 	fl6.flowi6_proto = IPPROTO_ICMPV6;
501 	fl6.daddr = hdr->saddr;
502 	if (force_saddr)
503 		saddr = force_saddr;
504 	if (saddr)
505 		fl6.saddr = *saddr;
506 	fl6.flowi6_mark = mark;
507 	fl6.flowi6_oif = iif;
508 	fl6.fl6_icmp_type = type;
509 	fl6.fl6_icmp_code = code;
510 	fl6.flowi6_uid = sock_net_uid(net, NULL);
511 	security_skb_classify_flow(skb, flowi6_to_flowi(&fl6));
512 
513 	sk = icmpv6_xmit_lock(net);
514 	if (!sk)
515 		goto out_bh_enable;
516 
517 	sk->sk_mark = mark;
518 	np = inet6_sk(sk);
519 
520 	if (!icmpv6_xrlim_allow(sk, type, &fl6))
521 		goto out;
522 
523 	tmp_hdr.icmp6_type = type;
524 	tmp_hdr.icmp6_code = code;
525 	tmp_hdr.icmp6_cksum = 0;
526 	tmp_hdr.icmp6_pointer = htonl(info);
527 
528 	if (!fl6.flowi6_oif && ipv6_addr_is_multicast(&fl6.daddr))
529 		fl6.flowi6_oif = np->mcast_oif;
530 	else if (!fl6.flowi6_oif)
531 		fl6.flowi6_oif = np->ucast_oif;
532 
533 	ipc6.tclass = np->tclass;
534 	fl6.flowlabel = ip6_make_flowinfo(ipc6.tclass, fl6.flowlabel);
535 
536 	dst = icmpv6_route_lookup(net, skb, sk, &fl6);
537 	if (IS_ERR(dst))
538 		goto out;
539 
540 	ipc6.hlimit = ip6_sk_dst_hoplimit(np, &fl6, dst);
541 	ipc6.dontfrag = np->dontfrag;
542 	ipc6.opt = NULL;
543 
544 	msg.skb = skb;
545 	msg.offset = skb_network_offset(skb);
546 	msg.type = type;
547 
548 	len = skb->len - msg.offset;
549 	len = min_t(unsigned int, len, IPV6_MIN_MTU - sizeof(struct ipv6hdr) - sizeof(struct icmp6hdr));
550 	if (len < 0) {
551 		net_dbg_ratelimited("icmp: len problem [%pI6c > %pI6c]\n",
552 				    &hdr->saddr, &hdr->daddr);
553 		goto out_dst_release;
554 	}
555 
556 	rcu_read_lock();
557 	idev = __in6_dev_get(skb->dev);
558 
559 	err = ip6_append_data(sk, icmpv6_getfrag, &msg,
560 			      len + sizeof(struct icmp6hdr),
561 			      sizeof(struct icmp6hdr),
562 			      &ipc6, &fl6, (struct rt6_info *)dst,
563 			      MSG_DONTWAIT, &sockc_unused);
564 	if (err) {
565 		ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTERRORS);
566 		ip6_flush_pending_frames(sk);
567 	} else {
568 		err = icmpv6_push_pending_frames(sk, &fl6, &tmp_hdr,
569 						 len + sizeof(struct icmp6hdr));
570 	}
571 	rcu_read_unlock();
572 out_dst_release:
573 	dst_release(dst);
574 out:
575 	icmpv6_xmit_unlock(sk);
576 out_bh_enable:
577 	local_bh_enable();
578 }
579 
580 /* Slightly more convenient version of icmp6_send.
581  */
582 void icmpv6_param_prob(struct sk_buff *skb, u8 code, int pos)
583 {
584 	icmp6_send(skb, ICMPV6_PARAMPROB, code, pos, NULL);
585 	kfree_skb(skb);
586 }
587 
588 /* Generate icmpv6 with type/code ICMPV6_DEST_UNREACH/ICMPV6_ADDR_UNREACH
589  * if sufficient data bytes are available
590  * @nhs is the size of the tunnel header(s) :
591  *  Either an IPv4 header for SIT encap
592  *         an IPv4 header + GRE header for GRE encap
593  */
594 int ip6_err_gen_icmpv6_unreach(struct sk_buff *skb, int nhs, int type,
595 			       unsigned int data_len)
596 {
597 	struct in6_addr temp_saddr;
598 	struct rt6_info *rt;
599 	struct sk_buff *skb2;
600 	u32 info = 0;
601 
602 	if (!pskb_may_pull(skb, nhs + sizeof(struct ipv6hdr) + 8))
603 		return 1;
604 
605 	/* RFC 4884 (partial) support for ICMP extensions */
606 	if (data_len < 128 || (data_len & 7) || skb->len < data_len)
607 		data_len = 0;
608 
609 	skb2 = data_len ? skb_copy(skb, GFP_ATOMIC) : skb_clone(skb, GFP_ATOMIC);
610 
611 	if (!skb2)
612 		return 1;
613 
614 	skb_dst_drop(skb2);
615 	skb_pull(skb2, nhs);
616 	skb_reset_network_header(skb2);
617 
618 	rt = rt6_lookup(dev_net(skb->dev), &ipv6_hdr(skb2)->saddr, NULL, 0, 0);
619 
620 	if (rt && rt->dst.dev)
621 		skb2->dev = rt->dst.dev;
622 
623 	ipv6_addr_set_v4mapped(ip_hdr(skb)->saddr, &temp_saddr);
624 
625 	if (data_len) {
626 		/* RFC 4884 (partial) support :
627 		 * insert 0 padding at the end, before the extensions
628 		 */
629 		__skb_push(skb2, nhs);
630 		skb_reset_network_header(skb2);
631 		memmove(skb2->data, skb2->data + nhs, data_len - nhs);
632 		memset(skb2->data + data_len - nhs, 0, nhs);
633 		/* RFC 4884 4.5 : Length is measured in 64-bit words,
634 		 * and stored in reserved[0]
635 		 */
636 		info = (data_len/8) << 24;
637 	}
638 	if (type == ICMP_TIME_EXCEEDED)
639 		icmp6_send(skb2, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT,
640 			   info, &temp_saddr);
641 	else
642 		icmp6_send(skb2, ICMPV6_DEST_UNREACH, ICMPV6_ADDR_UNREACH,
643 			   info, &temp_saddr);
644 	if (rt)
645 		ip6_rt_put(rt);
646 
647 	kfree_skb(skb2);
648 
649 	return 0;
650 }
651 EXPORT_SYMBOL(ip6_err_gen_icmpv6_unreach);
652 
653 static void icmpv6_echo_reply(struct sk_buff *skb)
654 {
655 	struct net *net = dev_net(skb->dev);
656 	struct sock *sk;
657 	struct inet6_dev *idev;
658 	struct ipv6_pinfo *np;
659 	const struct in6_addr *saddr = NULL;
660 	struct icmp6hdr *icmph = icmp6_hdr(skb);
661 	struct icmp6hdr tmp_hdr;
662 	struct flowi6 fl6;
663 	struct icmpv6_msg msg;
664 	struct dst_entry *dst;
665 	struct ipcm6_cookie ipc6;
666 	int err = 0;
667 	u32 mark = IP6_REPLY_MARK(net, skb->mark);
668 	struct sockcm_cookie sockc_unused = {0};
669 
670 	saddr = &ipv6_hdr(skb)->daddr;
671 
672 	if (!ipv6_unicast_destination(skb) &&
673 	    !(net->ipv6.sysctl.anycast_src_echo_reply &&
674 	      ipv6_anycast_destination(skb_dst(skb), saddr)))
675 		saddr = NULL;
676 
677 	memcpy(&tmp_hdr, icmph, sizeof(tmp_hdr));
678 	tmp_hdr.icmp6_type = ICMPV6_ECHO_REPLY;
679 
680 	memset(&fl6, 0, sizeof(fl6));
681 	fl6.flowi6_proto = IPPROTO_ICMPV6;
682 	fl6.daddr = ipv6_hdr(skb)->saddr;
683 	if (saddr)
684 		fl6.saddr = *saddr;
685 	fl6.flowi6_oif = skb->dev->ifindex;
686 	fl6.fl6_icmp_type = ICMPV6_ECHO_REPLY;
687 	fl6.flowi6_mark = mark;
688 	fl6.flowi6_uid = sock_net_uid(net, NULL);
689 	security_skb_classify_flow(skb, flowi6_to_flowi(&fl6));
690 
691 	local_bh_disable();
692 	sk = icmpv6_xmit_lock(net);
693 	if (!sk)
694 		goto out_bh_enable;
695 	sk->sk_mark = mark;
696 	np = inet6_sk(sk);
697 
698 	if (!fl6.flowi6_oif && ipv6_addr_is_multicast(&fl6.daddr))
699 		fl6.flowi6_oif = np->mcast_oif;
700 	else if (!fl6.flowi6_oif)
701 		fl6.flowi6_oif = np->ucast_oif;
702 
703 	err = ip6_dst_lookup(net, sk, &dst, &fl6);
704 	if (err)
705 		goto out;
706 	dst = xfrm_lookup(net, dst, flowi6_to_flowi(&fl6), sk, 0);
707 	if (IS_ERR(dst))
708 		goto out;
709 
710 	idev = __in6_dev_get(skb->dev);
711 
712 	msg.skb = skb;
713 	msg.offset = 0;
714 	msg.type = ICMPV6_ECHO_REPLY;
715 
716 	ipc6.hlimit = ip6_sk_dst_hoplimit(np, &fl6, dst);
717 	ipc6.tclass = ipv6_get_dsfield(ipv6_hdr(skb));
718 	ipc6.dontfrag = np->dontfrag;
719 	ipc6.opt = NULL;
720 
721 	err = ip6_append_data(sk, icmpv6_getfrag, &msg, skb->len + sizeof(struct icmp6hdr),
722 				sizeof(struct icmp6hdr), &ipc6, &fl6,
723 				(struct rt6_info *)dst, MSG_DONTWAIT,
724 				&sockc_unused);
725 
726 	if (err) {
727 		__ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTERRORS);
728 		ip6_flush_pending_frames(sk);
729 	} else {
730 		err = icmpv6_push_pending_frames(sk, &fl6, &tmp_hdr,
731 						 skb->len + sizeof(struct icmp6hdr));
732 	}
733 	dst_release(dst);
734 out:
735 	icmpv6_xmit_unlock(sk);
736 out_bh_enable:
737 	local_bh_enable();
738 }
739 
740 void icmpv6_notify(struct sk_buff *skb, u8 type, u8 code, __be32 info)
741 {
742 	const struct inet6_protocol *ipprot;
743 	int inner_offset;
744 	__be16 frag_off;
745 	u8 nexthdr;
746 	struct net *net = dev_net(skb->dev);
747 
748 	if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
749 		goto out;
750 
751 	nexthdr = ((struct ipv6hdr *)skb->data)->nexthdr;
752 	if (ipv6_ext_hdr(nexthdr)) {
753 		/* now skip over extension headers */
754 		inner_offset = ipv6_skip_exthdr(skb, sizeof(struct ipv6hdr),
755 						&nexthdr, &frag_off);
756 		if (inner_offset < 0)
757 			goto out;
758 	} else {
759 		inner_offset = sizeof(struct ipv6hdr);
760 	}
761 
762 	/* Checkin header including 8 bytes of inner protocol header. */
763 	if (!pskb_may_pull(skb, inner_offset+8))
764 		goto out;
765 
766 	/* BUGGG_FUTURE: we should try to parse exthdrs in this packet.
767 	   Without this we will not able f.e. to make source routed
768 	   pmtu discovery.
769 	   Corresponding argument (opt) to notifiers is already added.
770 	   --ANK (980726)
771 	 */
772 
773 	ipprot = rcu_dereference(inet6_protos[nexthdr]);
774 	if (ipprot && ipprot->err_handler)
775 		ipprot->err_handler(skb, NULL, type, code, inner_offset, info);
776 
777 	raw6_icmp_error(skb, nexthdr, type, code, inner_offset, info);
778 	return;
779 
780 out:
781 	__ICMP6_INC_STATS(net, __in6_dev_get(skb->dev), ICMP6_MIB_INERRORS);
782 }
783 
784 /*
785  *	Handle icmp messages
786  */
787 
788 static int icmpv6_rcv(struct sk_buff *skb)
789 {
790 	struct net_device *dev = skb->dev;
791 	struct inet6_dev *idev = __in6_dev_get(dev);
792 	const struct in6_addr *saddr, *daddr;
793 	struct icmp6hdr *hdr;
794 	u8 type;
795 	bool success = false;
796 
797 	if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb)) {
798 		struct sec_path *sp = skb_sec_path(skb);
799 		int nh;
800 
801 		if (!(sp && sp->xvec[sp->len - 1]->props.flags &
802 				 XFRM_STATE_ICMP))
803 			goto drop_no_count;
804 
805 		if (!pskb_may_pull(skb, sizeof(*hdr) + sizeof(struct ipv6hdr)))
806 			goto drop_no_count;
807 
808 		nh = skb_network_offset(skb);
809 		skb_set_network_header(skb, sizeof(*hdr));
810 
811 		if (!xfrm6_policy_check_reverse(NULL, XFRM_POLICY_IN, skb))
812 			goto drop_no_count;
813 
814 		skb_set_network_header(skb, nh);
815 	}
816 
817 	__ICMP6_INC_STATS(dev_net(dev), idev, ICMP6_MIB_INMSGS);
818 
819 	saddr = &ipv6_hdr(skb)->saddr;
820 	daddr = &ipv6_hdr(skb)->daddr;
821 
822 	if (skb_checksum_validate(skb, IPPROTO_ICMPV6, ip6_compute_pseudo)) {
823 		net_dbg_ratelimited("ICMPv6 checksum failed [%pI6c > %pI6c]\n",
824 				    saddr, daddr);
825 		goto csum_error;
826 	}
827 
828 	if (!pskb_pull(skb, sizeof(*hdr)))
829 		goto discard_it;
830 
831 	hdr = icmp6_hdr(skb);
832 
833 	type = hdr->icmp6_type;
834 
835 	ICMP6MSGIN_INC_STATS(dev_net(dev), idev, type);
836 
837 	switch (type) {
838 	case ICMPV6_ECHO_REQUEST:
839 		icmpv6_echo_reply(skb);
840 		break;
841 
842 	case ICMPV6_ECHO_REPLY:
843 		success = ping_rcv(skb);
844 		break;
845 
846 	case ICMPV6_PKT_TOOBIG:
847 		/* BUGGG_FUTURE: if packet contains rthdr, we cannot update
848 		   standard destination cache. Seems, only "advanced"
849 		   destination cache will allow to solve this problem
850 		   --ANK (980726)
851 		 */
852 		if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
853 			goto discard_it;
854 		hdr = icmp6_hdr(skb);
855 
856 		/*
857 		 *	Drop through to notify
858 		 */
859 
860 	case ICMPV6_DEST_UNREACH:
861 	case ICMPV6_TIME_EXCEED:
862 	case ICMPV6_PARAMPROB:
863 		icmpv6_notify(skb, type, hdr->icmp6_code, hdr->icmp6_mtu);
864 		break;
865 
866 	case NDISC_ROUTER_SOLICITATION:
867 	case NDISC_ROUTER_ADVERTISEMENT:
868 	case NDISC_NEIGHBOUR_SOLICITATION:
869 	case NDISC_NEIGHBOUR_ADVERTISEMENT:
870 	case NDISC_REDIRECT:
871 		ndisc_rcv(skb);
872 		break;
873 
874 	case ICMPV6_MGM_QUERY:
875 		igmp6_event_query(skb);
876 		break;
877 
878 	case ICMPV6_MGM_REPORT:
879 		igmp6_event_report(skb);
880 		break;
881 
882 	case ICMPV6_MGM_REDUCTION:
883 	case ICMPV6_NI_QUERY:
884 	case ICMPV6_NI_REPLY:
885 	case ICMPV6_MLD2_REPORT:
886 	case ICMPV6_DHAAD_REQUEST:
887 	case ICMPV6_DHAAD_REPLY:
888 	case ICMPV6_MOBILE_PREFIX_SOL:
889 	case ICMPV6_MOBILE_PREFIX_ADV:
890 		break;
891 
892 	default:
893 		/* informational */
894 		if (type & ICMPV6_INFOMSG_MASK)
895 			break;
896 
897 		net_dbg_ratelimited("icmpv6: msg of unknown type [%pI6c > %pI6c]\n",
898 				    saddr, daddr);
899 
900 		/*
901 		 * error of unknown type.
902 		 * must pass to upper level
903 		 */
904 
905 		icmpv6_notify(skb, type, hdr->icmp6_code, hdr->icmp6_mtu);
906 	}
907 
908 	/* until the v6 path can be better sorted assume failure and
909 	 * preserve the status quo behaviour for the rest of the paths to here
910 	 */
911 	if (success)
912 		consume_skb(skb);
913 	else
914 		kfree_skb(skb);
915 
916 	return 0;
917 
918 csum_error:
919 	__ICMP6_INC_STATS(dev_net(dev), idev, ICMP6_MIB_CSUMERRORS);
920 discard_it:
921 	__ICMP6_INC_STATS(dev_net(dev), idev, ICMP6_MIB_INERRORS);
922 drop_no_count:
923 	kfree_skb(skb);
924 	return 0;
925 }
926 
927 void icmpv6_flow_init(struct sock *sk, struct flowi6 *fl6,
928 		      u8 type,
929 		      const struct in6_addr *saddr,
930 		      const struct in6_addr *daddr,
931 		      int oif)
932 {
933 	memset(fl6, 0, sizeof(*fl6));
934 	fl6->saddr = *saddr;
935 	fl6->daddr = *daddr;
936 	fl6->flowi6_proto	= IPPROTO_ICMPV6;
937 	fl6->fl6_icmp_type	= type;
938 	fl6->fl6_icmp_code	= 0;
939 	fl6->flowi6_oif		= oif;
940 	security_sk_classify_flow(sk, flowi6_to_flowi(fl6));
941 }
942 
943 static int __net_init icmpv6_sk_init(struct net *net)
944 {
945 	struct sock *sk;
946 	int err, i, j;
947 
948 	net->ipv6.icmp_sk =
949 		kzalloc(nr_cpu_ids * sizeof(struct sock *), GFP_KERNEL);
950 	if (!net->ipv6.icmp_sk)
951 		return -ENOMEM;
952 
953 	for_each_possible_cpu(i) {
954 		err = inet_ctl_sock_create(&sk, PF_INET6,
955 					   SOCK_RAW, IPPROTO_ICMPV6, net);
956 		if (err < 0) {
957 			pr_err("Failed to initialize the ICMP6 control socket (err %d)\n",
958 			       err);
959 			goto fail;
960 		}
961 
962 		net->ipv6.icmp_sk[i] = sk;
963 
964 		/* Enough space for 2 64K ICMP packets, including
965 		 * sk_buff struct overhead.
966 		 */
967 		sk->sk_sndbuf = 2 * SKB_TRUESIZE(64 * 1024);
968 	}
969 	return 0;
970 
971  fail:
972 	for (j = 0; j < i; j++)
973 		inet_ctl_sock_destroy(net->ipv6.icmp_sk[j]);
974 	kfree(net->ipv6.icmp_sk);
975 	return err;
976 }
977 
978 static void __net_exit icmpv6_sk_exit(struct net *net)
979 {
980 	int i;
981 
982 	for_each_possible_cpu(i) {
983 		inet_ctl_sock_destroy(net->ipv6.icmp_sk[i]);
984 	}
985 	kfree(net->ipv6.icmp_sk);
986 }
987 
988 static struct pernet_operations icmpv6_sk_ops = {
989 	.init = icmpv6_sk_init,
990 	.exit = icmpv6_sk_exit,
991 };
992 
993 int __init icmpv6_init(void)
994 {
995 	int err;
996 
997 	err = register_pernet_subsys(&icmpv6_sk_ops);
998 	if (err < 0)
999 		return err;
1000 
1001 	err = -EAGAIN;
1002 	if (inet6_add_protocol(&icmpv6_protocol, IPPROTO_ICMPV6) < 0)
1003 		goto fail;
1004 
1005 	err = inet6_register_icmp_sender(icmp6_send);
1006 	if (err)
1007 		goto sender_reg_err;
1008 	return 0;
1009 
1010 sender_reg_err:
1011 	inet6_del_protocol(&icmpv6_protocol, IPPROTO_ICMPV6);
1012 fail:
1013 	pr_err("Failed to register ICMP6 protocol\n");
1014 	unregister_pernet_subsys(&icmpv6_sk_ops);
1015 	return err;
1016 }
1017 
1018 void icmpv6_cleanup(void)
1019 {
1020 	inet6_unregister_icmp_sender(icmp6_send);
1021 	unregister_pernet_subsys(&icmpv6_sk_ops);
1022 	inet6_del_protocol(&icmpv6_protocol, IPPROTO_ICMPV6);
1023 }
1024 
1025 
1026 static const struct icmp6_err {
1027 	int err;
1028 	int fatal;
1029 } tab_unreach[] = {
1030 	{	/* NOROUTE */
1031 		.err	= ENETUNREACH,
1032 		.fatal	= 0,
1033 	},
1034 	{	/* ADM_PROHIBITED */
1035 		.err	= EACCES,
1036 		.fatal	= 1,
1037 	},
1038 	{	/* Was NOT_NEIGHBOUR, now reserved */
1039 		.err	= EHOSTUNREACH,
1040 		.fatal	= 0,
1041 	},
1042 	{	/* ADDR_UNREACH	*/
1043 		.err	= EHOSTUNREACH,
1044 		.fatal	= 0,
1045 	},
1046 	{	/* PORT_UNREACH	*/
1047 		.err	= ECONNREFUSED,
1048 		.fatal	= 1,
1049 	},
1050 	{	/* POLICY_FAIL */
1051 		.err	= EACCES,
1052 		.fatal	= 1,
1053 	},
1054 	{	/* REJECT_ROUTE	*/
1055 		.err	= EACCES,
1056 		.fatal	= 1,
1057 	},
1058 };
1059 
1060 int icmpv6_err_convert(u8 type, u8 code, int *err)
1061 {
1062 	int fatal = 0;
1063 
1064 	*err = EPROTO;
1065 
1066 	switch (type) {
1067 	case ICMPV6_DEST_UNREACH:
1068 		fatal = 1;
1069 		if (code < ARRAY_SIZE(tab_unreach)) {
1070 			*err  = tab_unreach[code].err;
1071 			fatal = tab_unreach[code].fatal;
1072 		}
1073 		break;
1074 
1075 	case ICMPV6_PKT_TOOBIG:
1076 		*err = EMSGSIZE;
1077 		break;
1078 
1079 	case ICMPV6_PARAMPROB:
1080 		*err = EPROTO;
1081 		fatal = 1;
1082 		break;
1083 
1084 	case ICMPV6_TIME_EXCEED:
1085 		*err = EHOSTUNREACH;
1086 		break;
1087 	}
1088 
1089 	return fatal;
1090 }
1091 EXPORT_SYMBOL(icmpv6_err_convert);
1092 
1093 #ifdef CONFIG_SYSCTL
1094 static struct ctl_table ipv6_icmp_table_template[] = {
1095 	{
1096 		.procname	= "ratelimit",
1097 		.data		= &init_net.ipv6.sysctl.icmpv6_time,
1098 		.maxlen		= sizeof(int),
1099 		.mode		= 0644,
1100 		.proc_handler	= proc_dointvec_ms_jiffies,
1101 	},
1102 	{ },
1103 };
1104 
1105 struct ctl_table * __net_init ipv6_icmp_sysctl_init(struct net *net)
1106 {
1107 	struct ctl_table *table;
1108 
1109 	table = kmemdup(ipv6_icmp_table_template,
1110 			sizeof(ipv6_icmp_table_template),
1111 			GFP_KERNEL);
1112 
1113 	if (table)
1114 		table[0].data = &net->ipv6.sysctl.icmpv6_time;
1115 
1116 	return table;
1117 }
1118 #endif
1119