blob: af88934e4d79aebe751d420737866656418397af [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * Internet Control Message Protocol (ICMPv6)
3 * Linux INET6 implementation
4 *
5 * Authors:
6 * Pedro Roque <roque@di.fc.ul.pt>
7 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07008 * Based on net/ipv4/icmp.c
9 *
10 * RFC 1885
11 *
12 * This program is free software; you can redistribute it and/or
13 * modify it under the terms of the GNU General Public License
14 * as published by the Free Software Foundation; either version
15 * 2 of the License, or (at your option) any later version.
16 */
17
18/*
19 * Changes:
20 *
21 * Andi Kleen : exception handling
22 * Andi Kleen add rate limits. never reply to a icmp.
23 * add more length checks and other fixes.
24 * yoshfuji : ensure to sent parameter problem for
25 * fragments.
26 * YOSHIFUJI Hideaki @USAGI: added sysctl for icmp rate limit.
27 * Randy Dunlap and
28 * YOSHIFUJI Hideaki @USAGI: Per-interface statistics support
29 * Kazunori MIYAZAWA @USAGI: change output process to use ip6_append_data
30 */
31
32#include <linux/module.h>
33#include <linux/errno.h>
34#include <linux/types.h>
35#include <linux/socket.h>
36#include <linux/in.h>
37#include <linux/kernel.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070038#include <linux/sockios.h>
39#include <linux/net.h>
40#include <linux/skbuff.h>
41#include <linux/init.h>
Yasuyuki Kozakai763ecff2006-02-15 15:24:15 -080042#include <linux/netfilter.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090043#include <linux/slab.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070044
45#ifdef CONFIG_SYSCTL
46#include <linux/sysctl.h>
47#endif
48
49#include <linux/inet.h>
50#include <linux/netdevice.h>
51#include <linux/icmpv6.h>
52
53#include <net/ip.h>
54#include <net/sock.h>
55
56#include <net/ipv6.h>
57#include <net/ip6_checksum.h>
58#include <net/protocol.h>
59#include <net/raw.h>
60#include <net/rawv6.h>
61#include <net/transp_v6.h>
62#include <net/ip6_route.h>
63#include <net/addrconf.h>
64#include <net/icmp.h>
Herbert Xu8b7817f2007-12-12 10:44:43 -080065#include <net/xfrm.h>
Denis V. Lunev1ed85162008-04-03 14:31:03 -070066#include <net/inet_common.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070067
68#include <asm/uaccess.h>
69#include <asm/system.h>
70
Linus Torvalds1da177e2005-04-16 15:20:36 -070071/*
72 * The ICMP socket(s). This is the most convenient way to flow control
73 * our ICMP output as well as maintain a clean interface throughout
74 * all layers. All Socketless IP sends will soon be gone.
75 *
76 * On SMP we have one ICMP socket per-cpu.
77 */
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -080078static inline struct sock *icmpv6_sk(struct net *net)
79{
80 return net->ipv6.icmp_sk[smp_processor_id()];
81}
Linus Torvalds1da177e2005-04-16 15:20:36 -070082
Herbert Xue5bbef22007-10-15 12:50:28 -070083static int icmpv6_rcv(struct sk_buff *skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -070084
Alexey Dobriyan41135cc2009-09-14 12:22:28 +000085static const struct inet6_protocol icmpv6_protocol = {
Linus Torvalds1da177e2005-04-16 15:20:36 -070086 .handler = icmpv6_rcv,
Herbert Xu8b7817f2007-12-12 10:44:43 -080087 .flags = INET6_PROTO_NOPOLICY|INET6_PROTO_FINAL,
Linus Torvalds1da177e2005-04-16 15:20:36 -070088};
89
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -070090static __inline__ struct sock *icmpv6_xmit_lock(struct net *net)
Linus Torvalds1da177e2005-04-16 15:20:36 -070091{
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -070092 struct sock *sk;
93
Linus Torvalds1da177e2005-04-16 15:20:36 -070094 local_bh_disable();
95
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -070096 sk = icmpv6_sk(net);
Denis V. Lunev405666d2008-02-29 11:16:46 -080097 if (unlikely(!spin_trylock(&sk->sk_lock.slock))) {
Linus Torvalds1da177e2005-04-16 15:20:36 -070098 /* This can happen if the output path (f.e. SIT or
99 * ip6ip6 tunnel) signals dst_link_failure() for an
100 * outgoing ICMP6 packet.
101 */
102 local_bh_enable();
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700103 return NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700104 }
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700105 return sk;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700106}
107
Denis V. Lunev405666d2008-02-29 11:16:46 -0800108static __inline__ void icmpv6_xmit_unlock(struct sock *sk)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700109{
Denis V. Lunev405666d2008-02-29 11:16:46 -0800110 spin_unlock_bh(&sk->sk_lock.slock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700111}
112
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900113/*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700114 * Slightly more convenient version of icmpv6_send.
115 */
Brian Haleyd5fdd6b2009-06-23 04:31:07 -0700116void icmpv6_param_prob(struct sk_buff *skb, u8 code, int pos)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700117{
Alexey Dobriyan3ffe5332010-02-18 08:25:24 +0000118 icmpv6_send(skb, ICMPV6_PARAMPROB, code, pos);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700119 kfree_skb(skb);
120}
121
122/*
123 * Figure out, may we reply to this packet with icmp error.
124 *
125 * We do not reply, if:
126 * - it was icmp error message.
127 * - it is truncated, so that it is known, that protocol is ICMPV6
128 * (i.e. in the middle of some exthdr)
129 *
130 * --ANK (980726)
131 */
132
133static int is_ineligible(struct sk_buff *skb)
134{
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700135 int ptr = (u8 *)(ipv6_hdr(skb) + 1) - skb->data;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700136 int len = skb->len - ptr;
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700137 __u8 nexthdr = ipv6_hdr(skb)->nexthdr;
Jesse Gross75f28112011-11-30 17:05:51 -0800138 __be16 frag_off;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700139
140 if (len < 0)
141 return 1;
142
Jesse Gross75f28112011-11-30 17:05:51 -0800143 ptr = ipv6_skip_exthdr(skb, ptr, &nexthdr, &frag_off);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700144 if (ptr < 0)
145 return 0;
146 if (nexthdr == IPPROTO_ICMPV6) {
147 u8 _type, *tp;
148 tp = skb_header_pointer(skb,
149 ptr+offsetof(struct icmp6hdr, icmp6_type),
150 sizeof(_type), &_type);
151 if (tp == NULL ||
152 !(*tp & ICMPV6_INFOMSG_MASK))
153 return 1;
154 }
155 return 0;
156}
157
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900158/*
159 * Check the ICMP output rate limit
Linus Torvalds1da177e2005-04-16 15:20:36 -0700160 */
David S. Miller92d86822011-02-04 15:55:25 -0800161static inline bool icmpv6_xrlim_allow(struct sock *sk, u8 type,
David S. Miller4c9483b2011-03-12 16:22:43 -0500162 struct flowi6 *fl6)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700163{
164 struct dst_entry *dst;
YOSHIFUJI Hideaki3b1e0a62008-03-26 02:26:21 +0900165 struct net *net = sock_net(sk);
David S. Miller92d86822011-02-04 15:55:25 -0800166 bool res = false;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700167
168 /* Informational messages are not limited. */
169 if (type & ICMPV6_INFOMSG_MASK)
David S. Miller92d86822011-02-04 15:55:25 -0800170 return true;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700171
172 /* Do not limit pmtu discovery, it would break it. */
173 if (type == ICMPV6_PKT_TOOBIG)
David S. Miller92d86822011-02-04 15:55:25 -0800174 return true;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700175
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900176 /*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700177 * Look up the output route.
178 * XXX: perhaps the expire for routing entries cloned by
179 * this lookup should be more aggressive (not longer than timeout).
180 */
David S. Miller4c9483b2011-03-12 16:22:43 -0500181 dst = ip6_route_output(net, sk, fl6);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700182 if (dst->error) {
Denis V. Lunev3bd653c2008-10-08 10:54:51 -0700183 IP6_INC_STATS(net, ip6_dst_idev(dst),
YOSHIFUJI Hideakia11d2062006-11-04 20:11:37 +0900184 IPSTATS_MIB_OUTNOROUTES);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700185 } else if (dst->dev && (dst->dev->flags&IFF_LOOPBACK)) {
David S. Miller92d86822011-02-04 15:55:25 -0800186 res = true;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700187 } else {
188 struct rt6_info *rt = (struct rt6_info *)dst;
Benjamin Thery9a43b702008-03-05 10:49:18 -0800189 int tmo = net->ipv6.sysctl.icmpv6_time;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700190
191 /* Give more bandwidth to wider prefixes. */
192 if (rt->rt6i_dst.plen < 128)
193 tmo >>= ((128 - rt->rt6i_dst.plen)>>5);
194
David S. Miller92d86822011-02-04 15:55:25 -0800195 if (!rt->rt6i_peer)
196 rt6_bind_peer(rt, 1);
197 res = inet_peer_xrlim_allow(rt->rt6i_peer, tmo);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700198 }
199 dst_release(dst);
200 return res;
201}
202
203/*
204 * an inline helper for the "simple" if statement below
205 * checks if parameter problem report is caused by an
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900206 * unrecognized IPv6 option that has the Option Type
Linus Torvalds1da177e2005-04-16 15:20:36 -0700207 * highest-order two bits set to 10
208 */
209
210static __inline__ int opt_unrec(struct sk_buff *skb, __u32 offset)
211{
212 u8 _optval, *op;
213
Arnaldo Carvalho de Melobbe735e2007-03-10 22:16:10 -0300214 offset += skb_network_offset(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700215 op = skb_header_pointer(skb, offset, sizeof(_optval), &_optval);
216 if (op == NULL)
217 return 1;
218 return (*op & 0xC0) == 0x80;
219}
220
David S. Miller4c9483b2011-03-12 16:22:43 -0500221static int icmpv6_push_pending_frames(struct sock *sk, struct flowi6 *fl6, struct icmp6hdr *thdr, int len)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700222{
223 struct sk_buff *skb;
224 struct icmp6hdr *icmp6h;
225 int err = 0;
226
227 if ((skb = skb_peek(&sk->sk_write_queue)) == NULL)
228 goto out;
229
Arnaldo Carvalho de Melocc70ab22007-03-13 14:03:22 -0300230 icmp6h = icmp6_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700231 memcpy(icmp6h, thdr, sizeof(struct icmp6hdr));
232 icmp6h->icmp6_cksum = 0;
233
234 if (skb_queue_len(&sk->sk_write_queue) == 1) {
Joe Perches07f07572008-11-19 15:44:53 -0800235 skb->csum = csum_partial(icmp6h,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700236 sizeof(struct icmp6hdr), skb->csum);
David S. Miller4c9483b2011-03-12 16:22:43 -0500237 icmp6h->icmp6_cksum = csum_ipv6_magic(&fl6->saddr,
238 &fl6->daddr,
239 len, fl6->flowi6_proto,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700240 skb->csum);
241 } else {
Al Viro868c86b2006-11-14 21:35:48 -0800242 __wsum tmp_csum = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700243
244 skb_queue_walk(&sk->sk_write_queue, skb) {
245 tmp_csum = csum_add(tmp_csum, skb->csum);
246 }
247
Joe Perches07f07572008-11-19 15:44:53 -0800248 tmp_csum = csum_partial(icmp6h,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700249 sizeof(struct icmp6hdr), tmp_csum);
David S. Miller4c9483b2011-03-12 16:22:43 -0500250 icmp6h->icmp6_cksum = csum_ipv6_magic(&fl6->saddr,
251 &fl6->daddr,
252 len, fl6->flowi6_proto,
Al Viro868c86b2006-11-14 21:35:48 -0800253 tmp_csum);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700254 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700255 ip6_push_pending_frames(sk);
256out:
257 return err;
258}
259
260struct icmpv6_msg {
261 struct sk_buff *skb;
262 int offset;
Yasuyuki Kozakai763ecff2006-02-15 15:24:15 -0800263 uint8_t type;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700264};
265
266static int icmpv6_getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb)
267{
268 struct icmpv6_msg *msg = (struct icmpv6_msg *) from;
269 struct sk_buff *org_skb = msg->skb;
Al Viro5f92a732006-11-14 21:36:54 -0800270 __wsum csum = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700271
272 csum = skb_copy_and_csum_bits(org_skb, msg->offset + offset,
273 to, len, csum);
274 skb->csum = csum_block_add(skb->csum, csum, odd);
Yasuyuki Kozakai763ecff2006-02-15 15:24:15 -0800275 if (!(msg->type & ICMPV6_INFOMSG_MASK))
276 nf_ct_attach(skb, org_skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700277 return 0;
278}
279
Masahide NAKAMURA59fbb3a62007-06-26 23:56:32 -0700280#if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
Masahide NAKAMURA79383232006-08-23 19:27:25 -0700281static void mip6_addr_swap(struct sk_buff *skb)
282{
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700283 struct ipv6hdr *iph = ipv6_hdr(skb);
Masahide NAKAMURA79383232006-08-23 19:27:25 -0700284 struct inet6_skb_parm *opt = IP6CB(skb);
285 struct ipv6_destopt_hao *hao;
286 struct in6_addr tmp;
287 int off;
288
289 if (opt->dsthao) {
290 off = ipv6_find_tlv(skb, opt->dsthao, IPV6_TLV_HAO);
291 if (likely(off >= 0)) {
Arnaldo Carvalho de Melod56f90a2007-04-10 20:50:43 -0700292 hao = (struct ipv6_destopt_hao *)
293 (skb_network_header(skb) + off);
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000294 tmp = iph->saddr;
295 iph->saddr = hao->addr;
296 hao->addr = tmp;
Masahide NAKAMURA79383232006-08-23 19:27:25 -0700297 }
298 }
299}
300#else
301static inline void mip6_addr_swap(struct sk_buff *skb) {}
302#endif
303
David S. Millerb42835d2011-03-01 22:06:22 -0800304static struct dst_entry *icmpv6_route_lookup(struct net *net, struct sk_buff *skb,
David S. Miller4c9483b2011-03-12 16:22:43 -0500305 struct sock *sk, struct flowi6 *fl6)
David S. Millerb42835d2011-03-01 22:06:22 -0800306{
307 struct dst_entry *dst, *dst2;
David S. Miller4c9483b2011-03-12 16:22:43 -0500308 struct flowi6 fl2;
David S. Millerb42835d2011-03-01 22:06:22 -0800309 int err;
310
David S. Miller4c9483b2011-03-12 16:22:43 -0500311 err = ip6_dst_lookup(sk, &dst, fl6);
David S. Millerb42835d2011-03-01 22:06:22 -0800312 if (err)
313 return ERR_PTR(err);
314
315 /*
316 * We won't send icmp if the destination is known
317 * anycast.
318 */
319 if (((struct rt6_info *)dst)->rt6i_flags & RTF_ANYCAST) {
320 LIMIT_NETDEBUG(KERN_DEBUG "icmpv6_send: acast source\n");
321 dst_release(dst);
322 return ERR_PTR(-EINVAL);
323 }
324
325 /* No need to clone since we're just using its address. */
326 dst2 = dst;
327
David S. Miller4c9483b2011-03-12 16:22:43 -0500328 dst = xfrm_lookup(net, dst, flowi6_to_flowi(fl6), sk, 0);
David S. Miller452edd52011-03-02 13:27:41 -0800329 if (!IS_ERR(dst)) {
David S. Millerb42835d2011-03-01 22:06:22 -0800330 if (dst != dst2)
331 return dst;
David S. Miller452edd52011-03-02 13:27:41 -0800332 } else {
333 if (PTR_ERR(dst) == -EPERM)
334 dst = NULL;
335 else
336 return dst;
David S. Millerb42835d2011-03-01 22:06:22 -0800337 }
338
David S. Miller4c9483b2011-03-12 16:22:43 -0500339 err = xfrm_decode_session_reverse(skb, flowi6_to_flowi(&fl2), AF_INET6);
David S. Millerb42835d2011-03-01 22:06:22 -0800340 if (err)
341 goto relookup_failed;
342
343 err = ip6_dst_lookup(sk, &dst2, &fl2);
344 if (err)
345 goto relookup_failed;
346
David S. Miller4c9483b2011-03-12 16:22:43 -0500347 dst2 = xfrm_lookup(net, dst2, flowi6_to_flowi(&fl2), sk, XFRM_LOOKUP_ICMP);
David S. Miller452edd52011-03-02 13:27:41 -0800348 if (!IS_ERR(dst2)) {
David S. Millerb42835d2011-03-01 22:06:22 -0800349 dst_release(dst);
350 dst = dst2;
David S. Miller452edd52011-03-02 13:27:41 -0800351 } else {
352 err = PTR_ERR(dst2);
353 if (err == -EPERM) {
354 dst_release(dst);
355 return dst2;
356 } else
357 goto relookup_failed;
David S. Millerb42835d2011-03-01 22:06:22 -0800358 }
359
360relookup_failed:
361 if (dst)
362 return dst;
363 return ERR_PTR(err);
364}
365
Linus Torvalds1da177e2005-04-16 15:20:36 -0700366/*
367 * Send an ICMP message in response to a packet in error
368 */
Alexey Dobriyan3ffe5332010-02-18 08:25:24 +0000369void icmpv6_send(struct sk_buff *skb, u8 type, u8 code, __u32 info)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700370{
YOSHIFUJI Hideakic346dca2008-03-25 21:47:49 +0900371 struct net *net = dev_net(skb->dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700372 struct inet6_dev *idev = NULL;
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700373 struct ipv6hdr *hdr = ipv6_hdr(skb);
YOSHIFUJI Hideaki84427d52005-06-13 14:59:44 -0700374 struct sock *sk;
375 struct ipv6_pinfo *np;
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000376 const struct in6_addr *saddr = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700377 struct dst_entry *dst;
378 struct icmp6hdr tmp_hdr;
David S. Miller4c9483b2011-03-12 16:22:43 -0500379 struct flowi6 fl6;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700380 struct icmpv6_msg msg;
381 int iif = 0;
382 int addr_type = 0;
383 int len;
Gerrit Renkere651f032009-08-09 08:12:48 +0000384 int hlimit;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700385 int err = 0;
386
Arnaldo Carvalho de Melo27a884d2007-04-19 20:29:13 -0700387 if ((u8 *)hdr < skb->head ||
388 (skb->network_header + sizeof(*hdr)) > skb->tail)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700389 return;
390
391 /*
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900392 * Make sure we respect the rules
Linus Torvalds1da177e2005-04-16 15:20:36 -0700393 * i.e. RFC 1885 2.4(e)
394 * Rule (e.1) is enforced by not using icmpv6_send
395 * in any code that processes icmp errors.
396 */
397 addr_type = ipv6_addr_type(&hdr->daddr);
398
Benjamin Thery9a43b702008-03-05 10:49:18 -0800399 if (ipv6_chk_addr(net, &hdr->daddr, skb->dev, 0))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700400 saddr = &hdr->daddr;
401
402 /*
403 * Dest addr check
404 */
405
406 if ((addr_type & IPV6_ADDR_MULTICAST || skb->pkt_type != PACKET_HOST)) {
407 if (type != ICMPV6_PKT_TOOBIG &&
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900408 !(type == ICMPV6_PARAMPROB &&
409 code == ICMPV6_UNK_OPTION &&
Linus Torvalds1da177e2005-04-16 15:20:36 -0700410 (opt_unrec(skb, info))))
411 return;
412
413 saddr = NULL;
414 }
415
416 addr_type = ipv6_addr_type(&hdr->saddr);
417
418 /*
419 * Source addr check
420 */
421
422 if (addr_type & IPV6_ADDR_LINKLOCAL)
423 iif = skb->dev->ifindex;
424
425 /*
YOSHIFUJI Hideaki8de33512005-12-21 22:57:06 +0900426 * Must not send error if the source does not uniquely
427 * identify a single node (RFC2463 Section 2.4).
428 * We check unspecified / multicast addresses here,
429 * and anycast addresses will be checked later.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700430 */
431 if ((addr_type == IPV6_ADDR_ANY) || (addr_type & IPV6_ADDR_MULTICAST)) {
Patrick McHardy64ce2072005-08-09 20:50:53 -0700432 LIMIT_NETDEBUG(KERN_DEBUG "icmpv6_send: addr_any/mcast source\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700433 return;
434 }
435
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900436 /*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700437 * Never answer to a ICMP packet.
438 */
439 if (is_ineligible(skb)) {
Patrick McHardy64ce2072005-08-09 20:50:53 -0700440 LIMIT_NETDEBUG(KERN_DEBUG "icmpv6_send: no reply to icmp error\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700441 return;
442 }
443
Masahide NAKAMURA79383232006-08-23 19:27:25 -0700444 mip6_addr_swap(skb);
445
David S. Miller4c9483b2011-03-12 16:22:43 -0500446 memset(&fl6, 0, sizeof(fl6));
447 fl6.flowi6_proto = IPPROTO_ICMPV6;
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000448 fl6.daddr = hdr->saddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700449 if (saddr)
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000450 fl6.saddr = *saddr;
David S. Miller4c9483b2011-03-12 16:22:43 -0500451 fl6.flowi6_oif = iif;
David S. Miller1958b852011-03-12 16:36:19 -0500452 fl6.fl6_icmp_type = type;
453 fl6.fl6_icmp_code = code;
David S. Miller4c9483b2011-03-12 16:22:43 -0500454 security_skb_classify_flow(skb, flowi6_to_flowi(&fl6));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700455
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700456 sk = icmpv6_xmit_lock(net);
457 if (sk == NULL)
Denis V. Lunev405666d2008-02-29 11:16:46 -0800458 return;
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700459 np = inet6_sk(sk);
Denis V. Lunev405666d2008-02-29 11:16:46 -0800460
David S. Miller4c9483b2011-03-12 16:22:43 -0500461 if (!icmpv6_xrlim_allow(sk, type, &fl6))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700462 goto out;
463
464 tmp_hdr.icmp6_type = type;
465 tmp_hdr.icmp6_code = code;
466 tmp_hdr.icmp6_cksum = 0;
467 tmp_hdr.icmp6_pointer = htonl(info);
468
David S. Miller4c9483b2011-03-12 16:22:43 -0500469 if (!fl6.flowi6_oif && ipv6_addr_is_multicast(&fl6.daddr))
470 fl6.flowi6_oif = np->mcast_oif;
Erich E. Hooverc4062df2012-02-08 09:11:08 +0000471 else if (!fl6.flowi6_oif)
472 fl6.flowi6_oif = np->ucast_oif;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700473
David S. Miller4c9483b2011-03-12 16:22:43 -0500474 dst = icmpv6_route_lookup(net, skb, sk, &fl6);
David S. Millerb42835d2011-03-01 22:06:22 -0800475 if (IS_ERR(dst))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700476 goto out;
YOSHIFUJI Hideaki8de33512005-12-21 22:57:06 +0900477
David S. Miller4c9483b2011-03-12 16:22:43 -0500478 if (ipv6_addr_is_multicast(&fl6.daddr))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700479 hlimit = np->mcast_hops;
480 else
481 hlimit = np->hop_limit;
482 if (hlimit < 0)
YOSHIFUJI Hideaki6b75d092008-03-10 06:00:30 -0400483 hlimit = ip6_dst_hoplimit(dst);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700484
485 msg.skb = skb;
Arnaldo Carvalho de Melobbe735e2007-03-10 22:16:10 -0300486 msg.offset = skb_network_offset(skb);
Yasuyuki Kozakai763ecff2006-02-15 15:24:15 -0800487 msg.type = type;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700488
489 len = skb->len - msg.offset;
490 len = min_t(unsigned int, len, IPV6_MIN_MTU - sizeof(struct ipv6hdr) -sizeof(struct icmp6hdr));
491 if (len < 0) {
Patrick McHardy64ce2072005-08-09 20:50:53 -0700492 LIMIT_NETDEBUG(KERN_DEBUG "icmp: len problem\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700493 goto out_dst_release;
494 }
495
Eric Dumazetcfdf7642011-07-27 21:13:03 +0000496 rcu_read_lock();
497 idev = __in6_dev_get(skb->dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700498
499 err = ip6_append_data(sk, icmpv6_getfrag, &msg,
500 len + sizeof(struct icmp6hdr),
Gerrit Renkere651f032009-08-09 08:12:48 +0000501 sizeof(struct icmp6hdr), hlimit,
David S. Miller4c9483b2011-03-12 16:22:43 -0500502 np->tclass, NULL, &fl6, (struct rt6_info*)dst,
Brian Haley13b52cd2010-04-23 11:26:08 +0000503 MSG_DONTWAIT, np->dontfrag);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700504 if (err) {
Eric Dumazet00d9d6a2010-06-07 22:24:44 +0000505 ICMP6_INC_STATS_BH(net, idev, ICMP6_MIB_OUTERRORS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700506 ip6_flush_pending_frames(sk);
Eric Dumazetcfdf7642011-07-27 21:13:03 +0000507 } else {
508 err = icmpv6_push_pending_frames(sk, &fl6, &tmp_hdr,
509 len + sizeof(struct icmp6hdr));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700510 }
Eric Dumazetcfdf7642011-07-27 21:13:03 +0000511 rcu_read_unlock();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700512out_dst_release:
513 dst_release(dst);
514out:
Denis V. Lunev405666d2008-02-29 11:16:46 -0800515 icmpv6_xmit_unlock(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700516}
YOSHIFUJI Hideaki71590392007-02-22 22:05:40 +0900517EXPORT_SYMBOL(icmpv6_send);
518
Linus Torvalds1da177e2005-04-16 15:20:36 -0700519static void icmpv6_echo_reply(struct sk_buff *skb)
520{
YOSHIFUJI Hideakic346dca2008-03-25 21:47:49 +0900521 struct net *net = dev_net(skb->dev);
YOSHIFUJI Hideaki84427d52005-06-13 14:59:44 -0700522 struct sock *sk;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700523 struct inet6_dev *idev;
YOSHIFUJI Hideaki84427d52005-06-13 14:59:44 -0700524 struct ipv6_pinfo *np;
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000525 const struct in6_addr *saddr = NULL;
Arnaldo Carvalho de Melocc70ab22007-03-13 14:03:22 -0300526 struct icmp6hdr *icmph = icmp6_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700527 struct icmp6hdr tmp_hdr;
David S. Miller4c9483b2011-03-12 16:22:43 -0500528 struct flowi6 fl6;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700529 struct icmpv6_msg msg;
530 struct dst_entry *dst;
531 int err = 0;
532 int hlimit;
533
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700534 saddr = &ipv6_hdr(skb)->daddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700535
536 if (!ipv6_unicast_destination(skb))
537 saddr = NULL;
538
539 memcpy(&tmp_hdr, icmph, sizeof(tmp_hdr));
540 tmp_hdr.icmp6_type = ICMPV6_ECHO_REPLY;
541
David S. Miller4c9483b2011-03-12 16:22:43 -0500542 memset(&fl6, 0, sizeof(fl6));
543 fl6.flowi6_proto = IPPROTO_ICMPV6;
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000544 fl6.daddr = ipv6_hdr(skb)->saddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700545 if (saddr)
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000546 fl6.saddr = *saddr;
David S. Miller4c9483b2011-03-12 16:22:43 -0500547 fl6.flowi6_oif = skb->dev->ifindex;
David S. Miller1958b852011-03-12 16:36:19 -0500548 fl6.fl6_icmp_type = ICMPV6_ECHO_REPLY;
David S. Miller4c9483b2011-03-12 16:22:43 -0500549 security_skb_classify_flow(skb, flowi6_to_flowi(&fl6));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700550
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700551 sk = icmpv6_xmit_lock(net);
552 if (sk == NULL)
Denis V. Lunev405666d2008-02-29 11:16:46 -0800553 return;
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700554 np = inet6_sk(sk);
Denis V. Lunev405666d2008-02-29 11:16:46 -0800555
David S. Miller4c9483b2011-03-12 16:22:43 -0500556 if (!fl6.flowi6_oif && ipv6_addr_is_multicast(&fl6.daddr))
557 fl6.flowi6_oif = np->mcast_oif;
Erich E. Hooverc4062df2012-02-08 09:11:08 +0000558 else if (!fl6.flowi6_oif)
559 fl6.flowi6_oif = np->ucast_oif;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700560
David S. Miller4c9483b2011-03-12 16:22:43 -0500561 err = ip6_dst_lookup(sk, &dst, &fl6);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700562 if (err)
563 goto out;
David S. Miller4c9483b2011-03-12 16:22:43 -0500564 dst = xfrm_lookup(net, dst, flowi6_to_flowi(&fl6), sk, 0);
David S. Miller452edd52011-03-02 13:27:41 -0800565 if (IS_ERR(dst))
Patrick McHardye104411b2005-09-08 15:11:55 -0700566 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700567
David S. Miller4c9483b2011-03-12 16:22:43 -0500568 if (ipv6_addr_is_multicast(&fl6.daddr))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700569 hlimit = np->mcast_hops;
570 else
571 hlimit = np->hop_limit;
572 if (hlimit < 0)
YOSHIFUJI Hideaki6b75d092008-03-10 06:00:30 -0400573 hlimit = ip6_dst_hoplimit(dst);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700574
Eric Dumazetcfdf7642011-07-27 21:13:03 +0000575 idev = __in6_dev_get(skb->dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700576
577 msg.skb = skb;
578 msg.offset = 0;
Yasuyuki Kozakai763ecff2006-02-15 15:24:15 -0800579 msg.type = ICMPV6_ECHO_REPLY;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700580
581 err = ip6_append_data(sk, icmpv6_getfrag, &msg, skb->len + sizeof(struct icmp6hdr),
David S. Miller4c9483b2011-03-12 16:22:43 -0500582 sizeof(struct icmp6hdr), hlimit, np->tclass, NULL, &fl6,
Brian Haley13b52cd2010-04-23 11:26:08 +0000583 (struct rt6_info*)dst, MSG_DONTWAIT,
584 np->dontfrag);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700585
586 if (err) {
Eric Dumazet00d9d6a2010-06-07 22:24:44 +0000587 ICMP6_INC_STATS_BH(net, idev, ICMP6_MIB_OUTERRORS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700588 ip6_flush_pending_frames(sk);
Eric Dumazetcfdf7642011-07-27 21:13:03 +0000589 } else {
590 err = icmpv6_push_pending_frames(sk, &fl6, &tmp_hdr,
591 skb->len + sizeof(struct icmp6hdr));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700592 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700593 dst_release(dst);
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900594out:
Denis V. Lunev405666d2008-02-29 11:16:46 -0800595 icmpv6_xmit_unlock(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700596}
597
Brian Haleyd5fdd6b2009-06-23 04:31:07 -0700598static void icmpv6_notify(struct sk_buff *skb, u8 type, u8 code, __be32 info)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700599{
Alexey Dobriyan41135cc2009-09-14 12:22:28 +0000600 const struct inet6_protocol *ipprot;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700601 int inner_offset;
602 int hash;
603 u8 nexthdr;
Jesse Gross75f28112011-11-30 17:05:51 -0800604 __be16 frag_off;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700605
606 if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
607 return;
608
609 nexthdr = ((struct ipv6hdr *)skb->data)->nexthdr;
610 if (ipv6_ext_hdr(nexthdr)) {
611 /* now skip over extension headers */
Jesse Gross75f28112011-11-30 17:05:51 -0800612 inner_offset = ipv6_skip_exthdr(skb, sizeof(struct ipv6hdr),
613 &nexthdr, &frag_off);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700614 if (inner_offset<0)
615 return;
616 } else {
617 inner_offset = sizeof(struct ipv6hdr);
618 }
619
620 /* Checkin header including 8 bytes of inner protocol header. */
621 if (!pskb_may_pull(skb, inner_offset+8))
622 return;
623
Linus Torvalds1da177e2005-04-16 15:20:36 -0700624 /* BUGGG_FUTURE: we should try to parse exthdrs in this packet.
625 Without this we will not able f.e. to make source routed
626 pmtu discovery.
627 Corresponding argument (opt) to notifiers is already added.
628 --ANK (980726)
629 */
630
631 hash = nexthdr & (MAX_INET_PROTOS - 1);
632
633 rcu_read_lock();
634 ipprot = rcu_dereference(inet6_protos[hash]);
635 if (ipprot && ipprot->err_handler)
636 ipprot->err_handler(skb, NULL, type, code, inner_offset, info);
637 rcu_read_unlock();
638
Pavel Emelyanov69d6da02007-11-19 22:35:57 -0800639 raw6_icmp_error(skb, nexthdr, type, code, inner_offset, info);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700640}
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900641
Linus Torvalds1da177e2005-04-16 15:20:36 -0700642/*
643 * Handle icmp messages
644 */
645
Herbert Xue5bbef22007-10-15 12:50:28 -0700646static int icmpv6_rcv(struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700647{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700648 struct net_device *dev = skb->dev;
649 struct inet6_dev *idev = __in6_dev_get(dev);
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000650 const struct in6_addr *saddr, *daddr;
651 const struct ipv6hdr *orig_hdr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700652 struct icmp6hdr *hdr;
Brian Haleyd5fdd6b2009-06-23 04:31:07 -0700653 u8 type;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700654
Herbert Xuaebcf822007-12-12 18:54:16 -0800655 if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb)) {
Alexey Dobriyandef8b4f2008-10-28 13:24:06 -0700656 struct sec_path *sp = skb_sec_path(skb);
Herbert Xu8b7817f2007-12-12 10:44:43 -0800657 int nh;
658
Alexey Dobriyandef8b4f2008-10-28 13:24:06 -0700659 if (!(sp && sp->xvec[sp->len - 1]->props.flags &
Herbert Xuaebcf822007-12-12 18:54:16 -0800660 XFRM_STATE_ICMP))
661 goto drop_no_count;
662
Herbert Xu8b7817f2007-12-12 10:44:43 -0800663 if (!pskb_may_pull(skb, sizeof(*hdr) + sizeof(*orig_hdr)))
664 goto drop_no_count;
665
666 nh = skb_network_offset(skb);
667 skb_set_network_header(skb, sizeof(*hdr));
668
669 if (!xfrm6_policy_check_reverse(NULL, XFRM_POLICY_IN, skb))
670 goto drop_no_count;
671
672 skb_set_network_header(skb, nh);
673 }
674
Denis V. Luneve41b5362008-10-08 10:33:26 -0700675 ICMP6_INC_STATS_BH(dev_net(dev), idev, ICMP6_MIB_INMSGS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700676
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700677 saddr = &ipv6_hdr(skb)->saddr;
678 daddr = &ipv6_hdr(skb)->daddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700679
680 /* Perform checksum. */
Herbert Xufb286bb2005-11-10 13:01:24 -0800681 switch (skb->ip_summed) {
Patrick McHardy84fa7932006-08-29 16:44:56 -0700682 case CHECKSUM_COMPLETE:
Herbert Xufb286bb2005-11-10 13:01:24 -0800683 if (!csum_ipv6_magic(saddr, daddr, skb->len, IPPROTO_ICMPV6,
684 skb->csum))
685 break;
686 /* fall through */
687 case CHECKSUM_NONE:
Al Viro868c86b2006-11-14 21:35:48 -0800688 skb->csum = ~csum_unfold(csum_ipv6_magic(saddr, daddr, skb->len,
689 IPPROTO_ICMPV6, 0));
Herbert Xufb286bb2005-11-10 13:01:24 -0800690 if (__skb_checksum_complete(skb)) {
Harvey Harrison5b095d9892008-10-29 12:52:50 -0700691 LIMIT_NETDEBUG(KERN_DEBUG "ICMPv6 checksum failed [%pI6 > %pI6]\n",
Harvey Harrison0c6ce782008-10-28 16:09:23 -0700692 saddr, daddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700693 goto discard_it;
694 }
695 }
696
Herbert Xu8cf22942008-02-05 03:15:50 -0800697 if (!pskb_pull(skb, sizeof(*hdr)))
698 goto discard_it;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700699
Arnaldo Carvalho de Melocc70ab22007-03-13 14:03:22 -0300700 hdr = icmp6_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700701
702 type = hdr->icmp6_type;
703
Denis V. Lunev55d43802008-10-08 10:34:54 -0700704 ICMP6MSGIN_INC_STATS_BH(dev_net(dev), idev, type);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700705
706 switch (type) {
707 case ICMPV6_ECHO_REQUEST:
708 icmpv6_echo_reply(skb);
709 break;
710
711 case ICMPV6_ECHO_REPLY:
712 /* we couldn't care less */
713 break;
714
715 case ICMPV6_PKT_TOOBIG:
716 /* BUGGG_FUTURE: if packet contains rthdr, we cannot update
717 standard destination cache. Seems, only "advanced"
718 destination cache will allow to solve this problem
719 --ANK (980726)
720 */
721 if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
722 goto discard_it;
Arnaldo Carvalho de Melocc70ab22007-03-13 14:03:22 -0300723 hdr = icmp6_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700724 orig_hdr = (struct ipv6hdr *) (hdr + 1);
725 rt6_pmtu_discovery(&orig_hdr->daddr, &orig_hdr->saddr, dev,
726 ntohl(hdr->icmp6_mtu));
727
728 /*
729 * Drop through to notify
730 */
731
732 case ICMPV6_DEST_UNREACH:
733 case ICMPV6_TIME_EXCEED:
734 case ICMPV6_PARAMPROB:
735 icmpv6_notify(skb, type, hdr->icmp6_code, hdr->icmp6_mtu);
736 break;
737
738 case NDISC_ROUTER_SOLICITATION:
739 case NDISC_ROUTER_ADVERTISEMENT:
740 case NDISC_NEIGHBOUR_SOLICITATION:
741 case NDISC_NEIGHBOUR_ADVERTISEMENT:
742 case NDISC_REDIRECT:
743 ndisc_rcv(skb);
744 break;
745
746 case ICMPV6_MGM_QUERY:
747 igmp6_event_query(skb);
748 break;
749
750 case ICMPV6_MGM_REPORT:
751 igmp6_event_report(skb);
752 break;
753
754 case ICMPV6_MGM_REDUCTION:
755 case ICMPV6_NI_QUERY:
756 case ICMPV6_NI_REPLY:
757 case ICMPV6_MLD2_REPORT:
758 case ICMPV6_DHAAD_REQUEST:
759 case ICMPV6_DHAAD_REPLY:
760 case ICMPV6_MOBILE_PREFIX_SOL:
761 case ICMPV6_MOBILE_PREFIX_ADV:
762 break;
763
764 default:
Patrick McHardy64ce2072005-08-09 20:50:53 -0700765 LIMIT_NETDEBUG(KERN_DEBUG "icmpv6: msg of unknown type\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700766
767 /* informational */
768 if (type & ICMPV6_INFOMSG_MASK)
769 break;
770
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900771 /*
772 * error of unknown type.
773 * must pass to upper level
Linus Torvalds1da177e2005-04-16 15:20:36 -0700774 */
775
776 icmpv6_notify(skb, type, hdr->icmp6_code, hdr->icmp6_mtu);
Stephen Hemminger3ff50b72007-04-20 17:09:22 -0700777 }
778
Linus Torvalds1da177e2005-04-16 15:20:36 -0700779 kfree_skb(skb);
780 return 0;
781
782discard_it:
Denis V. Luneve41b5362008-10-08 10:33:26 -0700783 ICMP6_INC_STATS_BH(dev_net(dev), idev, ICMP6_MIB_INERRORS);
Herbert Xu8b7817f2007-12-12 10:44:43 -0800784drop_no_count:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700785 kfree_skb(skb);
786 return 0;
787}
788
David S. Miller4c9483b2011-03-12 16:22:43 -0500789void icmpv6_flow_init(struct sock *sk, struct flowi6 *fl6,
YOSHIFUJI Hideaki95e41e92007-12-06 15:43:30 -0800790 u8 type,
791 const struct in6_addr *saddr,
792 const struct in6_addr *daddr,
793 int oif)
794{
David S. Miller4c9483b2011-03-12 16:22:43 -0500795 memset(fl6, 0, sizeof(*fl6));
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000796 fl6->saddr = *saddr;
797 fl6->daddr = *daddr;
David S. Miller4c9483b2011-03-12 16:22:43 -0500798 fl6->flowi6_proto = IPPROTO_ICMPV6;
David S. Miller1958b852011-03-12 16:36:19 -0500799 fl6->fl6_icmp_type = type;
800 fl6->fl6_icmp_code = 0;
David S. Miller4c9483b2011-03-12 16:22:43 -0500801 fl6->flowi6_oif = oif;
802 security_sk_classify_flow(sk, flowi6_to_flowi(fl6));
YOSHIFUJI Hideaki95e41e92007-12-06 15:43:30 -0800803}
804
Ingo Molnar640c41c2006-08-15 00:06:56 -0700805/*
Denis V. Lunevb7e729c2008-02-29 11:16:08 -0800806 * Special lock-class for __icmpv6_sk:
Ingo Molnar640c41c2006-08-15 00:06:56 -0700807 */
808static struct lock_class_key icmpv6_socket_sk_dst_lock_key;
809
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -0800810static int __net_init icmpv6_sk_init(struct net *net)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700811{
812 struct sock *sk;
813 int err, i, j;
814
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -0800815 net->ipv6.icmp_sk =
816 kzalloc(nr_cpu_ids * sizeof(struct sock *), GFP_KERNEL);
817 if (net->ipv6.icmp_sk == NULL)
Denis V. Lunev79c91152008-02-29 11:17:11 -0800818 return -ENOMEM;
819
KAMEZAWA Hiroyuki6f912042006-04-10 22:52:50 -0700820 for_each_possible_cpu(i) {
Denis V. Lunev1ed85162008-04-03 14:31:03 -0700821 err = inet_ctl_sock_create(&sk, PF_INET6,
822 SOCK_RAW, IPPROTO_ICMPV6, net);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700823 if (err < 0) {
824 printk(KERN_ERR
825 "Failed to initialize the ICMP6 control socket "
826 "(err %d).\n",
827 err);
828 goto fail;
829 }
830
Denis V. Lunev1ed85162008-04-03 14:31:03 -0700831 net->ipv6.icmp_sk[i] = sk;
Denis V. Lunev5c8cafd2008-02-29 11:19:22 -0800832
Ingo Molnar640c41c2006-08-15 00:06:56 -0700833 /*
834 * Split off their lock-class, because sk->sk_dst_lock
835 * gets used from softirqs, which is safe for
Denis V. Lunevb7e729c2008-02-29 11:16:08 -0800836 * __icmpv6_sk (because those never get directly used
Ingo Molnar640c41c2006-08-15 00:06:56 -0700837 * via userspace syscalls), but unsafe for normal sockets.
838 */
839 lockdep_set_class(&sk->sk_dst_lock,
840 &icmpv6_socket_sk_dst_lock_key);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700841
842 /* Enough space for 2 64K ICMP packets, including
843 * sk_buff struct overhead.
844 */
Eric Dumazet87fb4b72011-10-13 07:28:54 +0000845 sk->sk_sndbuf = 2 * SKB_TRUESIZE(64 * 1024);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700846 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700847 return 0;
848
849 fail:
Denis V. Lunev5c8cafd2008-02-29 11:19:22 -0800850 for (j = 0; j < i; j++)
Denis V. Lunev1ed85162008-04-03 14:31:03 -0700851 inet_ctl_sock_destroy(net->ipv6.icmp_sk[j]);
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -0800852 kfree(net->ipv6.icmp_sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700853 return err;
854}
855
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -0800856static void __net_exit icmpv6_sk_exit(struct net *net)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700857{
858 int i;
859
KAMEZAWA Hiroyuki6f912042006-04-10 22:52:50 -0700860 for_each_possible_cpu(i) {
Denis V. Lunev1ed85162008-04-03 14:31:03 -0700861 inet_ctl_sock_destroy(net->ipv6.icmp_sk[i]);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700862 }
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -0800863 kfree(net->ipv6.icmp_sk);
864}
865
Alexey Dobriyan8ed7edc2008-03-03 12:02:54 -0800866static struct pernet_operations icmpv6_sk_ops = {
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -0800867 .init = icmpv6_sk_init,
868 .exit = icmpv6_sk_exit,
869};
870
871int __init icmpv6_init(void)
872{
873 int err;
874
875 err = register_pernet_subsys(&icmpv6_sk_ops);
876 if (err < 0)
877 return err;
878
879 err = -EAGAIN;
880 if (inet6_add_protocol(&icmpv6_protocol, IPPROTO_ICMPV6) < 0)
881 goto fail;
882 return 0;
883
884fail:
885 printk(KERN_ERR "Failed to register ICMP6 protocol\n");
886 unregister_pernet_subsys(&icmpv6_sk_ops);
887 return err;
888}
889
Alexey Dobriyan8ed7edc2008-03-03 12:02:54 -0800890void icmpv6_cleanup(void)
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -0800891{
892 unregister_pernet_subsys(&icmpv6_sk_ops);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700893 inet6_del_protocol(&icmpv6_protocol, IPPROTO_ICMPV6);
894}
895
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -0800896
Arjan van de Ven9b5b5cf2005-11-29 16:21:38 -0800897static const struct icmp6_err {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700898 int err;
899 int fatal;
900} tab_unreach[] = {
901 { /* NOROUTE */
902 .err = ENETUNREACH,
903 .fatal = 0,
904 },
905 { /* ADM_PROHIBITED */
906 .err = EACCES,
907 .fatal = 1,
908 },
909 { /* Was NOT_NEIGHBOUR, now reserved */
910 .err = EHOSTUNREACH,
911 .fatal = 0,
912 },
913 { /* ADDR_UNREACH */
914 .err = EHOSTUNREACH,
915 .fatal = 0,
916 },
917 { /* PORT_UNREACH */
918 .err = ECONNREFUSED,
919 .fatal = 1,
920 },
921};
922
Brian Haleyd5fdd6b2009-06-23 04:31:07 -0700923int icmpv6_err_convert(u8 type, u8 code, int *err)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700924{
925 int fatal = 0;
926
927 *err = EPROTO;
928
929 switch (type) {
930 case ICMPV6_DEST_UNREACH:
931 fatal = 1;
932 if (code <= ICMPV6_PORT_UNREACH) {
933 *err = tab_unreach[code].err;
934 fatal = tab_unreach[code].fatal;
935 }
936 break;
937
938 case ICMPV6_PKT_TOOBIG:
939 *err = EMSGSIZE;
940 break;
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900941
Linus Torvalds1da177e2005-04-16 15:20:36 -0700942 case ICMPV6_PARAMPROB:
943 *err = EPROTO;
944 fatal = 1;
945 break;
946
947 case ICMPV6_TIME_EXCEED:
948 *err = EHOSTUNREACH;
949 break;
Stephen Hemminger3ff50b72007-04-20 17:09:22 -0700950 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700951
952 return fatal;
953}
954
YOSHIFUJI Hideaki71590392007-02-22 22:05:40 +0900955EXPORT_SYMBOL(icmpv6_err_convert);
956
Linus Torvalds1da177e2005-04-16 15:20:36 -0700957#ifdef CONFIG_SYSCTL
Daniel Lezcano760f2d02008-01-10 02:53:43 -0800958ctl_table ipv6_icmp_table_template[] = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700959 {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700960 .procname = "ratelimit",
Daniel Lezcano41a76902008-01-10 03:02:40 -0800961 .data = &init_net.ipv6.sysctl.icmpv6_time,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700962 .maxlen = sizeof(int),
963 .mode = 0644,
Alexey Dobriyan6d9f2392008-11-03 18:21:05 -0800964 .proc_handler = proc_dointvec_ms_jiffies,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700965 },
Eric W. Biedermanf8572d82009-11-05 13:32:03 -0800966 { },
Linus Torvalds1da177e2005-04-16 15:20:36 -0700967};
Daniel Lezcano760f2d02008-01-10 02:53:43 -0800968
Alexey Dobriyan2c8c1e72010-01-17 03:35:32 +0000969struct ctl_table * __net_init ipv6_icmp_sysctl_init(struct net *net)
Daniel Lezcano760f2d02008-01-10 02:53:43 -0800970{
971 struct ctl_table *table;
972
973 table = kmemdup(ipv6_icmp_table_template,
974 sizeof(ipv6_icmp_table_template),
975 GFP_KERNEL);
YOSHIFUJI Hideaki5ee09102008-02-28 00:24:28 +0900976
977 if (table)
978 table[0].data = &net->ipv6.sysctl.icmpv6_time;
979
Daniel Lezcano760f2d02008-01-10 02:53:43 -0800980 return table;
981}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700982#endif
983