blob: ef2505aefc159d9a5a3fc544179bc5d086377dd2 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * Internet Control Message Protocol (ICMPv6)
3 * Linux INET6 implementation
4 *
5 * Authors:
6 * Pedro Roque <roque@di.fc.ul.pt>
7 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07008 * Based on net/ipv4/icmp.c
9 *
10 * RFC 1885
11 *
12 * This program is free software; you can redistribute it and/or
13 * modify it under the terms of the GNU General Public License
14 * as published by the Free Software Foundation; either version
15 * 2 of the License, or (at your option) any later version.
16 */
17
18/*
19 * Changes:
20 *
21 * Andi Kleen : exception handling
22 * Andi Kleen add rate limits. never reply to a icmp.
23 * add more length checks and other fixes.
24 * yoshfuji : ensure to sent parameter problem for
25 * fragments.
26 * YOSHIFUJI Hideaki @USAGI: added sysctl for icmp rate limit.
27 * Randy Dunlap and
28 * YOSHIFUJI Hideaki @USAGI: Per-interface statistics support
29 * Kazunori MIYAZAWA @USAGI: change output process to use ip6_append_data
30 */
31
Joe Perchesf3213832012-05-15 14:11:53 +000032#define pr_fmt(fmt) "IPv6: " fmt
33
Linus Torvalds1da177e2005-04-16 15:20:36 -070034#include <linux/module.h>
35#include <linux/errno.h>
36#include <linux/types.h>
37#include <linux/socket.h>
38#include <linux/in.h>
39#include <linux/kernel.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070040#include <linux/sockios.h>
41#include <linux/net.h>
42#include <linux/skbuff.h>
43#include <linux/init.h>
Yasuyuki Kozakai763ecff2006-02-15 15:24:15 -080044#include <linux/netfilter.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090045#include <linux/slab.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070046
47#ifdef CONFIG_SYSCTL
48#include <linux/sysctl.h>
49#endif
50
51#include <linux/inet.h>
52#include <linux/netdevice.h>
53#include <linux/icmpv6.h>
54
55#include <net/ip.h>
56#include <net/sock.h>
57
58#include <net/ipv6.h>
59#include <net/ip6_checksum.h>
Lorenzo Colitti6d0bfe22013-05-22 20:17:31 +000060#include <net/ping.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070061#include <net/protocol.h>
62#include <net/raw.h>
63#include <net/rawv6.h>
64#include <net/transp_v6.h>
65#include <net/ip6_route.h>
66#include <net/addrconf.h>
67#include <net/icmp.h>
Herbert Xu8b7817f2007-12-12 10:44:43 -080068#include <net/xfrm.h>
Denis V. Lunev1ed85162008-04-03 14:31:03 -070069#include <net/inet_common.h>
Hannes Frederic Sowa825edac2014-01-11 11:55:46 +010070#include <net/dsfield.h>
David Ahernca254492015-10-12 11:47:10 -070071#include <net/l3mdev.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070072
Linus Torvalds7c0f6ba2016-12-24 11:46:01 -080073#include <linux/uaccess.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070074
Linus Torvalds1da177e2005-04-16 15:20:36 -070075/*
76 * The ICMP socket(s). This is the most convenient way to flow control
77 * our ICMP output as well as maintain a clean interface throughout
78 * all layers. All Socketless IP sends will soon be gone.
79 *
80 * On SMP we have one ICMP socket per-cpu.
81 */
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -080082static inline struct sock *icmpv6_sk(struct net *net)
83{
84 return net->ipv6.icmp_sk[smp_processor_id()];
85}
Linus Torvalds1da177e2005-04-16 15:20:36 -070086
Steffen Klassert6f809da2013-01-16 22:09:49 +000087static void icmpv6_err(struct sk_buff *skb, struct inet6_skb_parm *opt,
88 u8 type, u8 code, int offset, __be32 info)
89{
Lorenzo Colitti6d0bfe22013-05-22 20:17:31 +000090 /* icmpv6_notify checks 8 bytes can be pulled, icmp6hdr is 8 bytes */
91 struct icmp6hdr *icmp6 = (struct icmp6hdr *) (skb->data + offset);
Steffen Klassert6f809da2013-01-16 22:09:49 +000092 struct net *net = dev_net(skb->dev);
93
94 if (type == ICMPV6_PKT_TOOBIG)
Lorenzo Colittie2d118a2016-11-04 02:23:43 +090095 ip6_update_pmtu(skb, net, info, 0, 0, sock_net_uid(net, NULL));
Steffen Klassert6f809da2013-01-16 22:09:49 +000096 else if (type == NDISC_REDIRECT)
Lorenzo Colittie2d118a2016-11-04 02:23:43 +090097 ip6_redirect(skb, net, skb->dev->ifindex, 0,
98 sock_net_uid(net, NULL));
Lorenzo Colitti6d0bfe22013-05-22 20:17:31 +000099
100 if (!(type & ICMPV6_INFOMSG_MASK))
101 if (icmp6->icmp6_type == ICMPV6_ECHO_REQUEST)
Hannes Frederic Sowadcb94b82016-06-11 20:32:06 +0200102 ping_err(skb, offset, ntohl(info));
Steffen Klassert6f809da2013-01-16 22:09:49 +0000103}
104
Herbert Xue5bbef22007-10-15 12:50:28 -0700105static int icmpv6_rcv(struct sk_buff *skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700106
Alexey Dobriyan41135cc2009-09-14 12:22:28 +0000107static const struct inet6_protocol icmpv6_protocol = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700108 .handler = icmpv6_rcv,
Steffen Klassert6f809da2013-01-16 22:09:49 +0000109 .err_handler = icmpv6_err,
Herbert Xu8b7817f2007-12-12 10:44:43 -0800110 .flags = INET6_PROTO_NOPOLICY|INET6_PROTO_FINAL,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700111};
112
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100113/* Called with BH disabled */
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700114static __inline__ struct sock *icmpv6_xmit_lock(struct net *net)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700115{
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700116 struct sock *sk;
117
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700118 sk = icmpv6_sk(net);
Denis V. Lunev405666d2008-02-29 11:16:46 -0800119 if (unlikely(!spin_trylock(&sk->sk_lock.slock))) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700120 /* This can happen if the output path (f.e. SIT or
121 * ip6ip6 tunnel) signals dst_link_failure() for an
122 * outgoing ICMP6 packet.
123 */
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700124 return NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700125 }
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700126 return sk;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700127}
128
Denis V. Lunev405666d2008-02-29 11:16:46 -0800129static __inline__ void icmpv6_xmit_unlock(struct sock *sk)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700130{
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100131 spin_unlock(&sk->sk_lock.slock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700132}
133
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900134/*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700135 * Figure out, may we reply to this packet with icmp error.
136 *
137 * We do not reply, if:
138 * - it was icmp error message.
139 * - it is truncated, so that it is known, that protocol is ICMPV6
140 * (i.e. in the middle of some exthdr)
141 *
142 * --ANK (980726)
143 */
144
Eric Dumazeta50feda2012-05-18 18:57:34 +0000145static bool is_ineligible(const struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700146{
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700147 int ptr = (u8 *)(ipv6_hdr(skb) + 1) - skb->data;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700148 int len = skb->len - ptr;
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700149 __u8 nexthdr = ipv6_hdr(skb)->nexthdr;
Jesse Gross75f28112011-11-30 17:05:51 -0800150 __be16 frag_off;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700151
152 if (len < 0)
Eric Dumazeta50feda2012-05-18 18:57:34 +0000153 return true;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700154
Jesse Gross75f28112011-11-30 17:05:51 -0800155 ptr = ipv6_skip_exthdr(skb, ptr, &nexthdr, &frag_off);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700156 if (ptr < 0)
Eric Dumazeta50feda2012-05-18 18:57:34 +0000157 return false;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700158 if (nexthdr == IPPROTO_ICMPV6) {
159 u8 _type, *tp;
160 tp = skb_header_pointer(skb,
161 ptr+offsetof(struct icmp6hdr, icmp6_type),
162 sizeof(_type), &_type);
Ian Morris63159f22015-03-29 14:00:04 +0100163 if (!tp || !(*tp & ICMPV6_INFOMSG_MASK))
Eric Dumazeta50feda2012-05-18 18:57:34 +0000164 return true;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700165 }
Eric Dumazeta50feda2012-05-18 18:57:34 +0000166 return false;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700167}
168
Jesper Dangaard Brouerc0303ef2017-01-09 16:04:09 +0100169static bool icmpv6_mask_allow(int type)
170{
171 /* Informational messages are not limited. */
172 if (type & ICMPV6_INFOMSG_MASK)
173 return true;
174
175 /* Do not limit pmtu discovery, it would break it. */
176 if (type == ICMPV6_PKT_TOOBIG)
177 return true;
178
179 return false;
180}
181
182static bool icmpv6_global_allow(int type)
183{
184 if (icmpv6_mask_allow(type))
185 return true;
186
187 if (icmp_global_allow())
188 return true;
189
190 return false;
191}
192
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900193/*
194 * Check the ICMP output rate limit
Linus Torvalds1da177e2005-04-16 15:20:36 -0700195 */
Eric Dumazet4cdf5072014-09-19 07:38:40 -0700196static bool icmpv6_xrlim_allow(struct sock *sk, u8 type,
197 struct flowi6 *fl6)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700198{
YOSHIFUJI Hideaki3b1e0a62008-03-26 02:26:21 +0900199 struct net *net = sock_net(sk);
Eric Dumazet4cdf5072014-09-19 07:38:40 -0700200 struct dst_entry *dst;
David S. Miller92d86822011-02-04 15:55:25 -0800201 bool res = false;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700202
Jesper Dangaard Brouerc0303ef2017-01-09 16:04:09 +0100203 if (icmpv6_mask_allow(type))
David S. Miller92d86822011-02-04 15:55:25 -0800204 return true;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700205
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900206 /*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700207 * Look up the output route.
208 * XXX: perhaps the expire for routing entries cloned by
209 * this lookup should be more aggressive (not longer than timeout).
210 */
David S. Miller4c9483b2011-03-12 16:22:43 -0500211 dst = ip6_route_output(net, sk, fl6);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700212 if (dst->error) {
Denis V. Lunev3bd653c2008-10-08 10:54:51 -0700213 IP6_INC_STATS(net, ip6_dst_idev(dst),
YOSHIFUJI Hideakia11d2062006-11-04 20:11:37 +0900214 IPSTATS_MIB_OUTNOROUTES);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700215 } else if (dst->dev && (dst->dev->flags&IFF_LOOPBACK)) {
David S. Miller92d86822011-02-04 15:55:25 -0800216 res = true;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700217 } else {
218 struct rt6_info *rt = (struct rt6_info *)dst;
Benjamin Thery9a43b702008-03-05 10:49:18 -0800219 int tmo = net->ipv6.sysctl.icmpv6_time;
Jesper Dangaard Brouerc0303ef2017-01-09 16:04:09 +0100220 struct inet_peer *peer;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700221
222 /* Give more bandwidth to wider prefixes. */
223 if (rt->rt6i_dst.plen < 128)
224 tmo >>= ((128 - rt->rt6i_dst.plen)>>5);
225
Jesper Dangaard Brouerc0303ef2017-01-09 16:04:09 +0100226 peer = inet_getpeer_v6(net->ipv6.peers, &fl6->daddr, 1);
227 res = inet_peer_xrlim_allow(peer, tmo);
228 if (peer)
229 inet_putpeer(peer);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700230 }
231 dst_release(dst);
232 return res;
233}
234
235/*
236 * an inline helper for the "simple" if statement below
237 * checks if parameter problem report is caused by an
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900238 * unrecognized IPv6 option that has the Option Type
Linus Torvalds1da177e2005-04-16 15:20:36 -0700239 * highest-order two bits set to 10
240 */
241
Eric Dumazeta50feda2012-05-18 18:57:34 +0000242static bool opt_unrec(struct sk_buff *skb, __u32 offset)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700243{
244 u8 _optval, *op;
245
Arnaldo Carvalho de Melobbe735e2007-03-10 22:16:10 -0300246 offset += skb_network_offset(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700247 op = skb_header_pointer(skb, offset, sizeof(_optval), &_optval);
Ian Morris63159f22015-03-29 14:00:04 +0100248 if (!op)
Eric Dumazeta50feda2012-05-18 18:57:34 +0000249 return true;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700250 return (*op & 0xC0) == 0x80;
251}
252
Joe Perches4e64b1e2017-10-05 23:46:14 -0700253void icmpv6_push_pending_frames(struct sock *sk, struct flowi6 *fl6,
254 struct icmp6hdr *thdr, int len)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700255{
256 struct sk_buff *skb;
257 struct icmp6hdr *icmp6h;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700258
Ian Morrise5d08d72014-11-23 21:28:43 +0000259 skb = skb_peek(&sk->sk_write_queue);
Ian Morris63159f22015-03-29 14:00:04 +0100260 if (!skb)
Joe Perches4e64b1e2017-10-05 23:46:14 -0700261 return;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700262
Arnaldo Carvalho de Melocc70ab22007-03-13 14:03:22 -0300263 icmp6h = icmp6_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700264 memcpy(icmp6h, thdr, sizeof(struct icmp6hdr));
265 icmp6h->icmp6_cksum = 0;
266
267 if (skb_queue_len(&sk->sk_write_queue) == 1) {
Joe Perches07f07572008-11-19 15:44:53 -0800268 skb->csum = csum_partial(icmp6h,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700269 sizeof(struct icmp6hdr), skb->csum);
David S. Miller4c9483b2011-03-12 16:22:43 -0500270 icmp6h->icmp6_cksum = csum_ipv6_magic(&fl6->saddr,
271 &fl6->daddr,
272 len, fl6->flowi6_proto,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700273 skb->csum);
274 } else {
Al Viro868c86b2006-11-14 21:35:48 -0800275 __wsum tmp_csum = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700276
277 skb_queue_walk(&sk->sk_write_queue, skb) {
278 tmp_csum = csum_add(tmp_csum, skb->csum);
279 }
280
Joe Perches07f07572008-11-19 15:44:53 -0800281 tmp_csum = csum_partial(icmp6h,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700282 sizeof(struct icmp6hdr), tmp_csum);
David S. Miller4c9483b2011-03-12 16:22:43 -0500283 icmp6h->icmp6_cksum = csum_ipv6_magic(&fl6->saddr,
284 &fl6->daddr,
285 len, fl6->flowi6_proto,
Al Viro868c86b2006-11-14 21:35:48 -0800286 tmp_csum);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700287 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700288 ip6_push_pending_frames(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700289}
290
291struct icmpv6_msg {
292 struct sk_buff *skb;
293 int offset;
Yasuyuki Kozakai763ecff2006-02-15 15:24:15 -0800294 uint8_t type;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700295};
296
297static int icmpv6_getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb)
298{
299 struct icmpv6_msg *msg = (struct icmpv6_msg *) from;
300 struct sk_buff *org_skb = msg->skb;
Al Viro5f92a732006-11-14 21:36:54 -0800301 __wsum csum = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700302
303 csum = skb_copy_and_csum_bits(org_skb, msg->offset + offset,
304 to, len, csum);
305 skb->csum = csum_block_add(skb->csum, csum, odd);
Yasuyuki Kozakai763ecff2006-02-15 15:24:15 -0800306 if (!(msg->type & ICMPV6_INFOMSG_MASK))
307 nf_ct_attach(skb, org_skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700308 return 0;
309}
310
Amerigo Wang07a93622012-10-29 16:23:10 +0000311#if IS_ENABLED(CONFIG_IPV6_MIP6)
Masahide NAKAMURA79383232006-08-23 19:27:25 -0700312static void mip6_addr_swap(struct sk_buff *skb)
313{
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700314 struct ipv6hdr *iph = ipv6_hdr(skb);
Masahide NAKAMURA79383232006-08-23 19:27:25 -0700315 struct inet6_skb_parm *opt = IP6CB(skb);
316 struct ipv6_destopt_hao *hao;
317 struct in6_addr tmp;
318 int off;
319
320 if (opt->dsthao) {
321 off = ipv6_find_tlv(skb, opt->dsthao, IPV6_TLV_HAO);
322 if (likely(off >= 0)) {
Arnaldo Carvalho de Melod56f90a2007-04-10 20:50:43 -0700323 hao = (struct ipv6_destopt_hao *)
324 (skb_network_header(skb) + off);
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000325 tmp = iph->saddr;
326 iph->saddr = hao->addr;
327 hao->addr = tmp;
Masahide NAKAMURA79383232006-08-23 19:27:25 -0700328 }
329 }
330}
331#else
332static inline void mip6_addr_swap(struct sk_buff *skb) {}
333#endif
334
stephen hemmingere8243532013-12-29 14:03:31 -0800335static struct dst_entry *icmpv6_route_lookup(struct net *net,
336 struct sk_buff *skb,
337 struct sock *sk,
338 struct flowi6 *fl6)
David S. Millerb42835d2011-03-01 22:06:22 -0800339{
340 struct dst_entry *dst, *dst2;
David S. Miller4c9483b2011-03-12 16:22:43 -0500341 struct flowi6 fl2;
David S. Millerb42835d2011-03-01 22:06:22 -0800342 int err;
343
Roopa Prabhu343d60a2015-07-30 13:34:53 -0700344 err = ip6_dst_lookup(net, sk, &dst, fl6);
David S. Millerb42835d2011-03-01 22:06:22 -0800345 if (err)
346 return ERR_PTR(err);
347
348 /*
349 * We won't send icmp if the destination is known
350 * anycast.
351 */
Martin KaFai Lau2647a9b2015-05-22 20:55:58 -0700352 if (ipv6_anycast_destination(dst, &fl6->daddr)) {
Joe Perchesba7a46f2014-11-11 10:59:17 -0800353 net_dbg_ratelimited("icmp6_send: acast source\n");
David S. Millerb42835d2011-03-01 22:06:22 -0800354 dst_release(dst);
355 return ERR_PTR(-EINVAL);
356 }
357
358 /* No need to clone since we're just using its address. */
359 dst2 = dst;
360
David S. Miller4c9483b2011-03-12 16:22:43 -0500361 dst = xfrm_lookup(net, dst, flowi6_to_flowi(fl6), sk, 0);
David S. Miller452edd52011-03-02 13:27:41 -0800362 if (!IS_ERR(dst)) {
David S. Millerb42835d2011-03-01 22:06:22 -0800363 if (dst != dst2)
364 return dst;
David S. Miller452edd52011-03-02 13:27:41 -0800365 } else {
366 if (PTR_ERR(dst) == -EPERM)
367 dst = NULL;
368 else
369 return dst;
David S. Millerb42835d2011-03-01 22:06:22 -0800370 }
371
David S. Miller4c9483b2011-03-12 16:22:43 -0500372 err = xfrm_decode_session_reverse(skb, flowi6_to_flowi(&fl2), AF_INET6);
David S. Millerb42835d2011-03-01 22:06:22 -0800373 if (err)
374 goto relookup_failed;
375
Roopa Prabhu343d60a2015-07-30 13:34:53 -0700376 err = ip6_dst_lookup(net, sk, &dst2, &fl2);
David S. Millerb42835d2011-03-01 22:06:22 -0800377 if (err)
378 goto relookup_failed;
379
David S. Miller4c9483b2011-03-12 16:22:43 -0500380 dst2 = xfrm_lookup(net, dst2, flowi6_to_flowi(&fl2), sk, XFRM_LOOKUP_ICMP);
David S. Miller452edd52011-03-02 13:27:41 -0800381 if (!IS_ERR(dst2)) {
David S. Millerb42835d2011-03-01 22:06:22 -0800382 dst_release(dst);
383 dst = dst2;
David S. Miller452edd52011-03-02 13:27:41 -0800384 } else {
385 err = PTR_ERR(dst2);
386 if (err == -EPERM) {
387 dst_release(dst);
388 return dst2;
389 } else
390 goto relookup_failed;
David S. Millerb42835d2011-03-01 22:06:22 -0800391 }
392
393relookup_failed:
394 if (dst)
395 return dst;
396 return ERR_PTR(err);
397}
398
David Ahern1b70d7922017-08-28 13:53:34 -0700399static int icmp6_iif(const struct sk_buff *skb)
400{
401 int iif = skb->dev->ifindex;
402
403 /* for local traffic to local address, skb dev is the loopback
404 * device. Check if there is a dst attached to the skb and if so
David Ahern24b711e2018-07-19 12:41:18 -0700405 * get the real device index. Same is needed for replies to a link
406 * local address on a device enslaved to an L3 master device
David Ahern1b70d7922017-08-28 13:53:34 -0700407 */
David Ahern24b711e2018-07-19 12:41:18 -0700408 if (unlikely(iif == LOOPBACK_IFINDEX || netif_is_l3_master(skb->dev))) {
David Ahern1b70d7922017-08-28 13:53:34 -0700409 const struct rt6_info *rt6 = skb_rt6_info(skb);
410
411 if (rt6)
412 iif = rt6->rt6i_idev->dev->ifindex;
413 }
414
415 return iif;
416}
417
Linus Torvalds1da177e2005-04-16 15:20:36 -0700418/*
419 * Send an ICMP message in response to a packet in error
420 */
Eric Dumazetb1cadc12016-06-18 21:52:02 -0700421static void icmp6_send(struct sk_buff *skb, u8 type, u8 code, __u32 info,
422 const struct in6_addr *force_saddr)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700423{
YOSHIFUJI Hideakic346dca2008-03-25 21:47:49 +0900424 struct net *net = dev_net(skb->dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700425 struct inet6_dev *idev = NULL;
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700426 struct ipv6hdr *hdr = ipv6_hdr(skb);
YOSHIFUJI Hideaki84427d52005-06-13 14:59:44 -0700427 struct sock *sk;
428 struct ipv6_pinfo *np;
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000429 const struct in6_addr *saddr = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700430 struct dst_entry *dst;
431 struct icmp6hdr tmp_hdr;
David S. Miller4c9483b2011-03-12 16:22:43 -0500432 struct flowi6 fl6;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700433 struct icmpv6_msg msg;
Soheil Hassas Yeganehc14ac942016-04-02 23:08:12 -0400434 struct sockcm_cookie sockc_unused = {0};
Wei Wang26879da2016-05-02 21:40:07 -0700435 struct ipcm6_cookie ipc6;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700436 int iif = 0;
437 int addr_type = 0;
438 int len;
Lorenzo Colittie1108612014-05-13 10:17:33 -0700439 u32 mark = IP6_REPLY_MARK(net, skb->mark);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700440
Arnaldo Carvalho de Melo27a884d2007-04-19 20:29:13 -0700441 if ((u8 *)hdr < skb->head ||
Simon Horman29a3cad2013-05-28 20:34:26 +0000442 (skb_network_header(skb) + sizeof(*hdr)) > skb_tail_pointer(skb))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700443 return;
444
445 /*
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900446 * Make sure we respect the rules
Linus Torvalds1da177e2005-04-16 15:20:36 -0700447 * i.e. RFC 1885 2.4(e)
Pravin B Shelar5f5624c2013-04-25 11:08:30 +0000448 * Rule (e.1) is enforced by not using icmp6_send
Linus Torvalds1da177e2005-04-16 15:20:36 -0700449 * in any code that processes icmp errors.
450 */
451 addr_type = ipv6_addr_type(&hdr->daddr);
452
FX Le Bail446fab52014-01-19 17:00:36 +0100453 if (ipv6_chk_addr(net, &hdr->daddr, skb->dev, 0) ||
FX Le Baild94c1f92014-02-07 11:22:37 +0100454 ipv6_chk_acast_addr_src(net, skb->dev, &hdr->daddr))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700455 saddr = &hdr->daddr;
456
457 /*
458 * Dest addr check
459 */
460
zhuyj9a6b4b32015-01-14 17:23:59 +0800461 if (addr_type & IPV6_ADDR_MULTICAST || skb->pkt_type != PACKET_HOST) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700462 if (type != ICMPV6_PKT_TOOBIG &&
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900463 !(type == ICMPV6_PARAMPROB &&
464 code == ICMPV6_UNK_OPTION &&
Linus Torvalds1da177e2005-04-16 15:20:36 -0700465 (opt_unrec(skb, info))))
466 return;
467
468 saddr = NULL;
469 }
470
471 addr_type = ipv6_addr_type(&hdr->saddr);
472
473 /*
474 * Source addr check
475 */
476
David Ahern4832c302017-08-17 12:17:20 -0700477 if (__ipv6_addr_needs_scope_id(addr_type)) {
David Ahern1b70d7922017-08-28 13:53:34 -0700478 iif = icmp6_iif(skb);
David Ahern4832c302017-08-17 12:17:20 -0700479 } else {
David Ahern79dc7e32016-11-27 18:52:53 -0800480 dst = skb_dst(skb);
481 iif = l3mdev_master_ifindex(dst ? dst->dev : skb->dev);
482 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700483
484 /*
YOSHIFUJI Hideaki8de33512005-12-21 22:57:06 +0900485 * Must not send error if the source does not uniquely
486 * identify a single node (RFC2463 Section 2.4).
487 * We check unspecified / multicast addresses here,
488 * and anycast addresses will be checked later.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700489 */
490 if ((addr_type == IPV6_ADDR_ANY) || (addr_type & IPV6_ADDR_MULTICAST)) {
Bjørn Mork4b3418f2015-10-24 14:00:20 +0200491 net_dbg_ratelimited("icmp6_send: addr_any/mcast source [%pI6c > %pI6c]\n",
492 &hdr->saddr, &hdr->daddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700493 return;
494 }
495
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900496 /*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700497 * Never answer to a ICMP packet.
498 */
499 if (is_ineligible(skb)) {
Bjørn Mork4b3418f2015-10-24 14:00:20 +0200500 net_dbg_ratelimited("icmp6_send: no reply to icmp error [%pI6c > %pI6c]\n",
501 &hdr->saddr, &hdr->daddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700502 return;
503 }
504
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100505 /* Needed by both icmp_global_allow and icmpv6_xmit_lock */
506 local_bh_disable();
507
508 /* Check global sysctl_icmp_msgs_per_sec ratelimit */
Jesper Dangaard Brouer849a44d2017-06-14 13:27:37 +0200509 if (!(skb->dev->flags&IFF_LOOPBACK) && !icmpv6_global_allow(type))
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100510 goto out_bh_enable;
511
Masahide NAKAMURA79383232006-08-23 19:27:25 -0700512 mip6_addr_swap(skb);
513
David S. Miller4c9483b2011-03-12 16:22:43 -0500514 memset(&fl6, 0, sizeof(fl6));
515 fl6.flowi6_proto = IPPROTO_ICMPV6;
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000516 fl6.daddr = hdr->saddr;
Eric Dumazetb1cadc12016-06-18 21:52:02 -0700517 if (force_saddr)
518 saddr = force_saddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700519 if (saddr)
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000520 fl6.saddr = *saddr;
Lorenzo Colittie1108612014-05-13 10:17:33 -0700521 fl6.flowi6_mark = mark;
David S. Miller4c9483b2011-03-12 16:22:43 -0500522 fl6.flowi6_oif = iif;
David S. Miller1958b852011-03-12 16:36:19 -0500523 fl6.fl6_icmp_type = type;
524 fl6.fl6_icmp_code = code;
Lorenzo Colittie2d118a2016-11-04 02:23:43 +0900525 fl6.flowi6_uid = sock_net_uid(net, NULL);
David Ahernb4bac172018-03-02 08:32:18 -0800526 fl6.mp_hash = rt6_multipath_hash(net, &fl6, skb, NULL);
David S. Miller4c9483b2011-03-12 16:22:43 -0500527 security_skb_classify_flow(skb, flowi6_to_flowi(&fl6));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700528
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700529 sk = icmpv6_xmit_lock(net);
Ian Morris63159f22015-03-29 14:00:04 +0100530 if (!sk)
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100531 goto out_bh_enable;
Jesper Dangaard Brouerc0303ef2017-01-09 16:04:09 +0100532
Lorenzo Colittie1108612014-05-13 10:17:33 -0700533 sk->sk_mark = mark;
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700534 np = inet6_sk(sk);
Denis V. Lunev405666d2008-02-29 11:16:46 -0800535
David S. Miller4c9483b2011-03-12 16:22:43 -0500536 if (!icmpv6_xrlim_allow(sk, type, &fl6))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700537 goto out;
538
539 tmp_hdr.icmp6_type = type;
540 tmp_hdr.icmp6_code = code;
541 tmp_hdr.icmp6_cksum = 0;
542 tmp_hdr.icmp6_pointer = htonl(info);
543
David S. Miller4c9483b2011-03-12 16:22:43 -0500544 if (!fl6.flowi6_oif && ipv6_addr_is_multicast(&fl6.daddr))
545 fl6.flowi6_oif = np->mcast_oif;
Erich E. Hooverc4062df2012-02-08 09:11:08 +0000546 else if (!fl6.flowi6_oif)
547 fl6.flowi6_oif = np->ucast_oif;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700548
Hannes Frederic Sowa38b70972016-06-11 20:08:19 +0200549 ipc6.tclass = np->tclass;
550 fl6.flowlabel = ip6_make_flowinfo(ipc6.tclass, fl6.flowlabel);
551
David S. Miller4c9483b2011-03-12 16:22:43 -0500552 dst = icmpv6_route_lookup(net, skb, sk, &fl6);
David S. Millerb42835d2011-03-01 22:06:22 -0800553 if (IS_ERR(dst))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700554 goto out;
YOSHIFUJI Hideaki8de33512005-12-21 22:57:06 +0900555
Wei Wang26879da2016-05-02 21:40:07 -0700556 ipc6.hlimit = ip6_sk_dst_hoplimit(np, &fl6, dst);
Wei Wang26879da2016-05-02 21:40:07 -0700557 ipc6.dontfrag = np->dontfrag;
558 ipc6.opt = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700559
560 msg.skb = skb;
Arnaldo Carvalho de Melobbe735e2007-03-10 22:16:10 -0300561 msg.offset = skb_network_offset(skb);
Yasuyuki Kozakai763ecff2006-02-15 15:24:15 -0800562 msg.type = type;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700563
564 len = skb->len - msg.offset;
Ian Morris67ba4152014-08-24 21:53:10 +0100565 len = min_t(unsigned int, len, IPV6_MIN_MTU - sizeof(struct ipv6hdr) - sizeof(struct icmp6hdr));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700566 if (len < 0) {
Bjørn Mork4b3418f2015-10-24 14:00:20 +0200567 net_dbg_ratelimited("icmp: len problem [%pI6c > %pI6c]\n",
568 &hdr->saddr, &hdr->daddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700569 goto out_dst_release;
570 }
571
Eric Dumazetcfdf7642011-07-27 21:13:03 +0000572 rcu_read_lock();
573 idev = __in6_dev_get(skb->dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700574
Joe Perches4e64b1e2017-10-05 23:46:14 -0700575 if (ip6_append_data(sk, icmpv6_getfrag, &msg,
576 len + sizeof(struct icmp6hdr),
577 sizeof(struct icmp6hdr),
578 &ipc6, &fl6, (struct rt6_info *)dst,
579 MSG_DONTWAIT, &sockc_unused)) {
Hannes Frederic Sowa43a43b62014-03-31 20:14:10 +0200580 ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTERRORS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700581 ip6_flush_pending_frames(sk);
Eric Dumazetcfdf7642011-07-27 21:13:03 +0000582 } else {
Joe Perches4e64b1e2017-10-05 23:46:14 -0700583 icmpv6_push_pending_frames(sk, &fl6, &tmp_hdr,
584 len + sizeof(struct icmp6hdr));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700585 }
Eric Dumazetcfdf7642011-07-27 21:13:03 +0000586 rcu_read_unlock();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700587out_dst_release:
588 dst_release(dst);
589out:
Denis V. Lunev405666d2008-02-29 11:16:46 -0800590 icmpv6_xmit_unlock(sk);
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100591out_bh_enable:
592 local_bh_enable();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700593}
Pravin B Shelar5f5624c2013-04-25 11:08:30 +0000594
595/* Slightly more convenient version of icmp6_send.
596 */
597void icmpv6_param_prob(struct sk_buff *skb, u8 code, int pos)
598{
Eric Dumazetb1cadc12016-06-18 21:52:02 -0700599 icmp6_send(skb, ICMPV6_PARAMPROB, code, pos, NULL);
Pravin B Shelar5f5624c2013-04-25 11:08:30 +0000600 kfree_skb(skb);
601}
YOSHIFUJI Hideaki71590392007-02-22 22:05:40 +0900602
Eric Dumazet5fbba8a2016-06-18 21:52:03 -0700603/* Generate icmpv6 with type/code ICMPV6_DEST_UNREACH/ICMPV6_ADDR_UNREACH
604 * if sufficient data bytes are available
605 * @nhs is the size of the tunnel header(s) :
606 * Either an IPv4 header for SIT encap
607 * an IPv4 header + GRE header for GRE encap
608 */
Eric Dumazet20e19542016-06-18 21:52:06 -0700609int ip6_err_gen_icmpv6_unreach(struct sk_buff *skb, int nhs, int type,
610 unsigned int data_len)
Eric Dumazet5fbba8a2016-06-18 21:52:03 -0700611{
Eric Dumazet2d7a3b22016-06-18 21:52:04 -0700612 struct in6_addr temp_saddr;
Eric Dumazet5fbba8a2016-06-18 21:52:03 -0700613 struct rt6_info *rt;
614 struct sk_buff *skb2;
Eric Dumazet20e19542016-06-18 21:52:06 -0700615 u32 info = 0;
Eric Dumazet5fbba8a2016-06-18 21:52:03 -0700616
617 if (!pskb_may_pull(skb, nhs + sizeof(struct ipv6hdr) + 8))
618 return 1;
619
Eric Dumazet20e19542016-06-18 21:52:06 -0700620 /* RFC 4884 (partial) support for ICMP extensions */
621 if (data_len < 128 || (data_len & 7) || skb->len < data_len)
622 data_len = 0;
623
624 skb2 = data_len ? skb_copy(skb, GFP_ATOMIC) : skb_clone(skb, GFP_ATOMIC);
Eric Dumazet5fbba8a2016-06-18 21:52:03 -0700625
626 if (!skb2)
627 return 1;
628
629 skb_dst_drop(skb2);
630 skb_pull(skb2, nhs);
631 skb_reset_network_header(skb2);
632
David Ahernb75cc8f2018-03-02 08:32:17 -0800633 rt = rt6_lookup(dev_net(skb->dev), &ipv6_hdr(skb2)->saddr, NULL, 0,
634 skb, 0);
Eric Dumazet5fbba8a2016-06-18 21:52:03 -0700635
636 if (rt && rt->dst.dev)
637 skb2->dev = rt->dst.dev;
638
Eric Dumazet2d7a3b22016-06-18 21:52:04 -0700639 ipv6_addr_set_v4mapped(ip_hdr(skb)->saddr, &temp_saddr);
Eric Dumazet20e19542016-06-18 21:52:06 -0700640
641 if (data_len) {
642 /* RFC 4884 (partial) support :
643 * insert 0 padding at the end, before the extensions
644 */
645 __skb_push(skb2, nhs);
646 skb_reset_network_header(skb2);
647 memmove(skb2->data, skb2->data + nhs, data_len - nhs);
648 memset(skb2->data + data_len - nhs, 0, nhs);
649 /* RFC 4884 4.5 : Length is measured in 64-bit words,
650 * and stored in reserved[0]
651 */
652 info = (data_len/8) << 24;
653 }
Eric Dumazet2d7a3b22016-06-18 21:52:04 -0700654 if (type == ICMP_TIME_EXCEEDED)
655 icmp6_send(skb2, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT,
Eric Dumazet20e19542016-06-18 21:52:06 -0700656 info, &temp_saddr);
Eric Dumazet2d7a3b22016-06-18 21:52:04 -0700657 else
658 icmp6_send(skb2, ICMPV6_DEST_UNREACH, ICMPV6_ADDR_UNREACH,
Eric Dumazet20e19542016-06-18 21:52:06 -0700659 info, &temp_saddr);
Eric Dumazet5fbba8a2016-06-18 21:52:03 -0700660 if (rt)
661 ip6_rt_put(rt);
662
663 kfree_skb(skb2);
664
665 return 0;
666}
667EXPORT_SYMBOL(ip6_err_gen_icmpv6_unreach);
668
Linus Torvalds1da177e2005-04-16 15:20:36 -0700669static void icmpv6_echo_reply(struct sk_buff *skb)
670{
YOSHIFUJI Hideakic346dca2008-03-25 21:47:49 +0900671 struct net *net = dev_net(skb->dev);
YOSHIFUJI Hideaki84427d52005-06-13 14:59:44 -0700672 struct sock *sk;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700673 struct inet6_dev *idev;
YOSHIFUJI Hideaki84427d52005-06-13 14:59:44 -0700674 struct ipv6_pinfo *np;
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000675 const struct in6_addr *saddr = NULL;
Arnaldo Carvalho de Melocc70ab22007-03-13 14:03:22 -0300676 struct icmp6hdr *icmph = icmp6_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700677 struct icmp6hdr tmp_hdr;
David S. Miller4c9483b2011-03-12 16:22:43 -0500678 struct flowi6 fl6;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700679 struct icmpv6_msg msg;
680 struct dst_entry *dst;
Wei Wang26879da2016-05-02 21:40:07 -0700681 struct ipcm6_cookie ipc6;
Lorenzo Colittie1108612014-05-13 10:17:33 -0700682 u32 mark = IP6_REPLY_MARK(net, skb->mark);
Soheil Hassas Yeganehc14ac942016-04-02 23:08:12 -0400683 struct sockcm_cookie sockc_unused = {0};
Linus Torvalds1da177e2005-04-16 15:20:36 -0700684
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700685 saddr = &ipv6_hdr(skb)->daddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700686
FX Le Bail509aba32014-01-07 14:57:27 +0100687 if (!ipv6_unicast_destination(skb) &&
FX Le Bailec35b612014-01-13 15:59:01 +0100688 !(net->ipv6.sysctl.anycast_src_echo_reply &&
Martin KaFai Lau2647a9b2015-05-22 20:55:58 -0700689 ipv6_anycast_destination(skb_dst(skb), saddr)))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700690 saddr = NULL;
691
692 memcpy(&tmp_hdr, icmph, sizeof(tmp_hdr));
693 tmp_hdr.icmp6_type = ICMPV6_ECHO_REPLY;
694
David S. Miller4c9483b2011-03-12 16:22:43 -0500695 memset(&fl6, 0, sizeof(fl6));
696 fl6.flowi6_proto = IPPROTO_ICMPV6;
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000697 fl6.daddr = ipv6_hdr(skb)->saddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700698 if (saddr)
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000699 fl6.saddr = *saddr;
David Ahern1b70d7922017-08-28 13:53:34 -0700700 fl6.flowi6_oif = icmp6_iif(skb);
David S. Miller1958b852011-03-12 16:36:19 -0500701 fl6.fl6_icmp_type = ICMPV6_ECHO_REPLY;
Lorenzo Colittie1108612014-05-13 10:17:33 -0700702 fl6.flowi6_mark = mark;
Lorenzo Colittie2d118a2016-11-04 02:23:43 +0900703 fl6.flowi6_uid = sock_net_uid(net, NULL);
David S. Miller4c9483b2011-03-12 16:22:43 -0500704 security_skb_classify_flow(skb, flowi6_to_flowi(&fl6));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700705
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100706 local_bh_disable();
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700707 sk = icmpv6_xmit_lock(net);
Ian Morris63159f22015-03-29 14:00:04 +0100708 if (!sk)
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100709 goto out_bh_enable;
Lorenzo Colittie1108612014-05-13 10:17:33 -0700710 sk->sk_mark = mark;
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700711 np = inet6_sk(sk);
Denis V. Lunev405666d2008-02-29 11:16:46 -0800712
David S. Miller4c9483b2011-03-12 16:22:43 -0500713 if (!fl6.flowi6_oif && ipv6_addr_is_multicast(&fl6.daddr))
714 fl6.flowi6_oif = np->mcast_oif;
Erich E. Hooverc4062df2012-02-08 09:11:08 +0000715 else if (!fl6.flowi6_oif)
716 fl6.flowi6_oif = np->ucast_oif;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700717
Joe Perches4e64b1e2017-10-05 23:46:14 -0700718 if (ip6_dst_lookup(net, sk, &dst, &fl6))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700719 goto out;
David S. Miller4c9483b2011-03-12 16:22:43 -0500720 dst = xfrm_lookup(net, dst, flowi6_to_flowi(&fl6), sk, 0);
David S. Miller452edd52011-03-02 13:27:41 -0800721 if (IS_ERR(dst))
Patrick McHardye104411b2005-09-08 15:11:55 -0700722 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700723
Eric Dumazetcfdf7642011-07-27 21:13:03 +0000724 idev = __in6_dev_get(skb->dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700725
726 msg.skb = skb;
727 msg.offset = 0;
Yasuyuki Kozakai763ecff2006-02-15 15:24:15 -0800728 msg.type = ICMPV6_ECHO_REPLY;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700729
Wei Wang26879da2016-05-02 21:40:07 -0700730 ipc6.hlimit = ip6_sk_dst_hoplimit(np, &fl6, dst);
731 ipc6.tclass = ipv6_get_dsfield(ipv6_hdr(skb));
732 ipc6.dontfrag = np->dontfrag;
733 ipc6.opt = NULL;
734
Joe Perches4e64b1e2017-10-05 23:46:14 -0700735 if (ip6_append_data(sk, icmpv6_getfrag, &msg,
736 skb->len + sizeof(struct icmp6hdr),
737 sizeof(struct icmp6hdr), &ipc6, &fl6,
738 (struct rt6_info *)dst, MSG_DONTWAIT,
739 &sockc_unused)) {
Eric Dumazeta16292a2016-04-27 16:44:36 -0700740 __ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTERRORS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700741 ip6_flush_pending_frames(sk);
Eric Dumazetcfdf7642011-07-27 21:13:03 +0000742 } else {
Joe Perches4e64b1e2017-10-05 23:46:14 -0700743 icmpv6_push_pending_frames(sk, &fl6, &tmp_hdr,
744 skb->len + sizeof(struct icmp6hdr));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700745 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700746 dst_release(dst);
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900747out:
Denis V. Lunev405666d2008-02-29 11:16:46 -0800748 icmpv6_xmit_unlock(sk);
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100749out_bh_enable:
750 local_bh_enable();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700751}
752
David S. Millerb94f1c02012-07-12 00:33:37 -0700753void icmpv6_notify(struct sk_buff *skb, u8 type, u8 code, __be32 info)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700754{
Alexey Dobriyan41135cc2009-09-14 12:22:28 +0000755 const struct inet6_protocol *ipprot;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700756 int inner_offset;
Jesse Gross75f28112011-11-30 17:05:51 -0800757 __be16 frag_off;
David S. Millerf9242b62012-06-19 18:56:21 -0700758 u8 nexthdr;
Duan Jiong7304fe42014-07-31 17:54:32 +0800759 struct net *net = dev_net(skb->dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700760
761 if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
Duan Jiong7304fe42014-07-31 17:54:32 +0800762 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700763
764 nexthdr = ((struct ipv6hdr *)skb->data)->nexthdr;
765 if (ipv6_ext_hdr(nexthdr)) {
766 /* now skip over extension headers */
Jesse Gross75f28112011-11-30 17:05:51 -0800767 inner_offset = ipv6_skip_exthdr(skb, sizeof(struct ipv6hdr),
768 &nexthdr, &frag_off);
Ian Morris67ba4152014-08-24 21:53:10 +0100769 if (inner_offset < 0)
Duan Jiong7304fe42014-07-31 17:54:32 +0800770 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700771 } else {
772 inner_offset = sizeof(struct ipv6hdr);
773 }
774
775 /* Checkin header including 8 bytes of inner protocol header. */
776 if (!pskb_may_pull(skb, inner_offset+8))
Duan Jiong7304fe42014-07-31 17:54:32 +0800777 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700778
Linus Torvalds1da177e2005-04-16 15:20:36 -0700779 /* BUGGG_FUTURE: we should try to parse exthdrs in this packet.
780 Without this we will not able f.e. to make source routed
781 pmtu discovery.
782 Corresponding argument (opt) to notifiers is already added.
783 --ANK (980726)
784 */
785
David S. Millerf9242b62012-06-19 18:56:21 -0700786 ipprot = rcu_dereference(inet6_protos[nexthdr]);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700787 if (ipprot && ipprot->err_handler)
788 ipprot->err_handler(skb, NULL, type, code, inner_offset, info);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700789
Pavel Emelyanov69d6da02007-11-19 22:35:57 -0800790 raw6_icmp_error(skb, nexthdr, type, code, inner_offset, info);
Duan Jiong7304fe42014-07-31 17:54:32 +0800791 return;
792
793out:
Eric Dumazeta16292a2016-04-27 16:44:36 -0700794 __ICMP6_INC_STATS(net, __in6_dev_get(skb->dev), ICMP6_MIB_INERRORS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700795}
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900796
Linus Torvalds1da177e2005-04-16 15:20:36 -0700797/*
798 * Handle icmp messages
799 */
800
Herbert Xue5bbef22007-10-15 12:50:28 -0700801static int icmpv6_rcv(struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700802{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700803 struct net_device *dev = skb->dev;
804 struct inet6_dev *idev = __in6_dev_get(dev);
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000805 const struct in6_addr *saddr, *daddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700806 struct icmp6hdr *hdr;
Brian Haleyd5fdd6b2009-06-23 04:31:07 -0700807 u8 type;
Rick Jonese3e32172014-11-17 14:04:29 -0800808 bool success = false;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700809
Herbert Xuaebcf822007-12-12 18:54:16 -0800810 if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb)) {
Alexey Dobriyandef8b4f2008-10-28 13:24:06 -0700811 struct sec_path *sp = skb_sec_path(skb);
Herbert Xu8b7817f2007-12-12 10:44:43 -0800812 int nh;
813
Alexey Dobriyandef8b4f2008-10-28 13:24:06 -0700814 if (!(sp && sp->xvec[sp->len - 1]->props.flags &
Herbert Xuaebcf822007-12-12 18:54:16 -0800815 XFRM_STATE_ICMP))
816 goto drop_no_count;
817
David S. Miller81aded22012-06-15 14:54:11 -0700818 if (!pskb_may_pull(skb, sizeof(*hdr) + sizeof(struct ipv6hdr)))
Herbert Xu8b7817f2007-12-12 10:44:43 -0800819 goto drop_no_count;
820
821 nh = skb_network_offset(skb);
822 skb_set_network_header(skb, sizeof(*hdr));
823
824 if (!xfrm6_policy_check_reverse(NULL, XFRM_POLICY_IN, skb))
825 goto drop_no_count;
826
827 skb_set_network_header(skb, nh);
828 }
829
Eric Dumazeta16292a2016-04-27 16:44:36 -0700830 __ICMP6_INC_STATS(dev_net(dev), idev, ICMP6_MIB_INMSGS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700831
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700832 saddr = &ipv6_hdr(skb)->saddr;
833 daddr = &ipv6_hdr(skb)->daddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700834
Tom Herbert39471ac2014-05-07 16:52:29 -0700835 if (skb_checksum_validate(skb, IPPROTO_ICMPV6, ip6_compute_pseudo)) {
Joe Perchesba7a46f2014-11-11 10:59:17 -0800836 net_dbg_ratelimited("ICMPv6 checksum failed [%pI6c > %pI6c]\n",
837 saddr, daddr);
Tom Herbert39471ac2014-05-07 16:52:29 -0700838 goto csum_error;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700839 }
840
Herbert Xu8cf22942008-02-05 03:15:50 -0800841 if (!pskb_pull(skb, sizeof(*hdr)))
842 goto discard_it;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700843
Arnaldo Carvalho de Melocc70ab22007-03-13 14:03:22 -0300844 hdr = icmp6_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700845
846 type = hdr->icmp6_type;
847
Eric Dumazetf3832ed2016-04-27 16:44:42 -0700848 ICMP6MSGIN_INC_STATS(dev_net(dev), idev, type);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700849
850 switch (type) {
851 case ICMPV6_ECHO_REQUEST:
852 icmpv6_echo_reply(skb);
853 break;
854
855 case ICMPV6_ECHO_REPLY:
Rick Jonese3e32172014-11-17 14:04:29 -0800856 success = ping_rcv(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700857 break;
858
859 case ICMPV6_PKT_TOOBIG:
860 /* BUGGG_FUTURE: if packet contains rthdr, we cannot update
861 standard destination cache. Seems, only "advanced"
862 destination cache will allow to solve this problem
863 --ANK (980726)
864 */
865 if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
866 goto discard_it;
Arnaldo Carvalho de Melocc70ab22007-03-13 14:03:22 -0300867 hdr = icmp6_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700868
Gustavo A. R. Silva275757e62017-10-16 16:36:52 -0500869 /* to notify */
870 /* fall through */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700871 case ICMPV6_DEST_UNREACH:
872 case ICMPV6_TIME_EXCEED:
873 case ICMPV6_PARAMPROB:
874 icmpv6_notify(skb, type, hdr->icmp6_code, hdr->icmp6_mtu);
875 break;
876
877 case NDISC_ROUTER_SOLICITATION:
878 case NDISC_ROUTER_ADVERTISEMENT:
879 case NDISC_NEIGHBOUR_SOLICITATION:
880 case NDISC_NEIGHBOUR_ADVERTISEMENT:
881 case NDISC_REDIRECT:
882 ndisc_rcv(skb);
883 break;
884
885 case ICMPV6_MGM_QUERY:
886 igmp6_event_query(skb);
887 break;
888
889 case ICMPV6_MGM_REPORT:
890 igmp6_event_report(skb);
891 break;
892
893 case ICMPV6_MGM_REDUCTION:
894 case ICMPV6_NI_QUERY:
895 case ICMPV6_NI_REPLY:
896 case ICMPV6_MLD2_REPORT:
897 case ICMPV6_DHAAD_REQUEST:
898 case ICMPV6_DHAAD_REPLY:
899 case ICMPV6_MOBILE_PREFIX_SOL:
900 case ICMPV6_MOBILE_PREFIX_ADV:
901 break;
902
903 default:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700904 /* informational */
905 if (type & ICMPV6_INFOMSG_MASK)
906 break;
907
Bjørn Mork4b3418f2015-10-24 14:00:20 +0200908 net_dbg_ratelimited("icmpv6: msg of unknown type [%pI6c > %pI6c]\n",
909 saddr, daddr);
David S. Millerea85a0a2014-10-07 16:33:53 -0400910
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900911 /*
912 * error of unknown type.
913 * must pass to upper level
Linus Torvalds1da177e2005-04-16 15:20:36 -0700914 */
915
916 icmpv6_notify(skb, type, hdr->icmp6_code, hdr->icmp6_mtu);
Stephen Hemminger3ff50b72007-04-20 17:09:22 -0700917 }
918
Rick Jonese3e32172014-11-17 14:04:29 -0800919 /* until the v6 path can be better sorted assume failure and
920 * preserve the status quo behaviour for the rest of the paths to here
921 */
922 if (success)
923 consume_skb(skb);
924 else
925 kfree_skb(skb);
926
Linus Torvalds1da177e2005-04-16 15:20:36 -0700927 return 0;
928
Eric Dumazet6a5dc9e2013-04-29 08:39:56 +0000929csum_error:
Eric Dumazeta16292a2016-04-27 16:44:36 -0700930 __ICMP6_INC_STATS(dev_net(dev), idev, ICMP6_MIB_CSUMERRORS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700931discard_it:
Eric Dumazeta16292a2016-04-27 16:44:36 -0700932 __ICMP6_INC_STATS(dev_net(dev), idev, ICMP6_MIB_INERRORS);
Herbert Xu8b7817f2007-12-12 10:44:43 -0800933drop_no_count:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700934 kfree_skb(skb);
935 return 0;
936}
937
David S. Miller4c9483b2011-03-12 16:22:43 -0500938void icmpv6_flow_init(struct sock *sk, struct flowi6 *fl6,
YOSHIFUJI Hideaki95e41e92007-12-06 15:43:30 -0800939 u8 type,
940 const struct in6_addr *saddr,
941 const struct in6_addr *daddr,
942 int oif)
943{
David S. Miller4c9483b2011-03-12 16:22:43 -0500944 memset(fl6, 0, sizeof(*fl6));
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000945 fl6->saddr = *saddr;
946 fl6->daddr = *daddr;
Ian Morris67ba4152014-08-24 21:53:10 +0100947 fl6->flowi6_proto = IPPROTO_ICMPV6;
David S. Miller1958b852011-03-12 16:36:19 -0500948 fl6->fl6_icmp_type = type;
949 fl6->fl6_icmp_code = 0;
David S. Miller4c9483b2011-03-12 16:22:43 -0500950 fl6->flowi6_oif = oif;
951 security_sk_classify_flow(sk, flowi6_to_flowi(fl6));
YOSHIFUJI Hideaki95e41e92007-12-06 15:43:30 -0800952}
953
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -0800954static int __net_init icmpv6_sk_init(struct net *net)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700955{
956 struct sock *sk;
957 int err, i, j;
958
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -0800959 net->ipv6.icmp_sk =
Kees Cook6396bb22018-06-12 14:03:40 -0700960 kcalloc(nr_cpu_ids, sizeof(struct sock *), GFP_KERNEL);
Ian Morris63159f22015-03-29 14:00:04 +0100961 if (!net->ipv6.icmp_sk)
Denis V. Lunev79c91152008-02-29 11:17:11 -0800962 return -ENOMEM;
963
KAMEZAWA Hiroyuki6f912042006-04-10 22:52:50 -0700964 for_each_possible_cpu(i) {
Denis V. Lunev1ed85162008-04-03 14:31:03 -0700965 err = inet_ctl_sock_create(&sk, PF_INET6,
966 SOCK_RAW, IPPROTO_ICMPV6, net);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700967 if (err < 0) {
Joe Perchesf3213832012-05-15 14:11:53 +0000968 pr_err("Failed to initialize the ICMP6 control socket (err %d)\n",
Linus Torvalds1da177e2005-04-16 15:20:36 -0700969 err);
970 goto fail;
971 }
972
Denis V. Lunev1ed85162008-04-03 14:31:03 -0700973 net->ipv6.icmp_sk[i] = sk;
Denis V. Lunev5c8cafd2008-02-29 11:19:22 -0800974
Linus Torvalds1da177e2005-04-16 15:20:36 -0700975 /* Enough space for 2 64K ICMP packets, including
976 * sk_buff struct overhead.
977 */
Eric Dumazet87fb4b72011-10-13 07:28:54 +0000978 sk->sk_sndbuf = 2 * SKB_TRUESIZE(64 * 1024);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700979 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700980 return 0;
981
982 fail:
Denis V. Lunev5c8cafd2008-02-29 11:19:22 -0800983 for (j = 0; j < i; j++)
Denis V. Lunev1ed85162008-04-03 14:31:03 -0700984 inet_ctl_sock_destroy(net->ipv6.icmp_sk[j]);
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -0800985 kfree(net->ipv6.icmp_sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700986 return err;
987}
988
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -0800989static void __net_exit icmpv6_sk_exit(struct net *net)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700990{
991 int i;
992
KAMEZAWA Hiroyuki6f912042006-04-10 22:52:50 -0700993 for_each_possible_cpu(i) {
Denis V. Lunev1ed85162008-04-03 14:31:03 -0700994 inet_ctl_sock_destroy(net->ipv6.icmp_sk[i]);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700995 }
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -0800996 kfree(net->ipv6.icmp_sk);
997}
998
Alexey Dobriyan8ed7edc2008-03-03 12:02:54 -0800999static struct pernet_operations icmpv6_sk_ops = {
Ian Morris67ba4152014-08-24 21:53:10 +01001000 .init = icmpv6_sk_init,
1001 .exit = icmpv6_sk_exit,
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -08001002};
1003
1004int __init icmpv6_init(void)
1005{
1006 int err;
1007
1008 err = register_pernet_subsys(&icmpv6_sk_ops);
1009 if (err < 0)
1010 return err;
1011
1012 err = -EAGAIN;
1013 if (inet6_add_protocol(&icmpv6_protocol, IPPROTO_ICMPV6) < 0)
1014 goto fail;
Pravin B Shelar5f5624c2013-04-25 11:08:30 +00001015
1016 err = inet6_register_icmp_sender(icmp6_send);
1017 if (err)
1018 goto sender_reg_err;
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -08001019 return 0;
1020
Pravin B Shelar5f5624c2013-04-25 11:08:30 +00001021sender_reg_err:
1022 inet6_del_protocol(&icmpv6_protocol, IPPROTO_ICMPV6);
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -08001023fail:
Joe Perchesf3213832012-05-15 14:11:53 +00001024 pr_err("Failed to register ICMP6 protocol\n");
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -08001025 unregister_pernet_subsys(&icmpv6_sk_ops);
1026 return err;
1027}
1028
Alexey Dobriyan8ed7edc2008-03-03 12:02:54 -08001029void icmpv6_cleanup(void)
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -08001030{
Pravin B Shelar5f5624c2013-04-25 11:08:30 +00001031 inet6_unregister_icmp_sender(icmp6_send);
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -08001032 unregister_pernet_subsys(&icmpv6_sk_ops);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001033 inet6_del_protocol(&icmpv6_protocol, IPPROTO_ICMPV6);
1034}
1035
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -08001036
Arjan van de Ven9b5b5cf2005-11-29 16:21:38 -08001037static const struct icmp6_err {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001038 int err;
1039 int fatal;
1040} tab_unreach[] = {
1041 { /* NOROUTE */
1042 .err = ENETUNREACH,
1043 .fatal = 0,
1044 },
1045 { /* ADM_PROHIBITED */
1046 .err = EACCES,
1047 .fatal = 1,
1048 },
1049 { /* Was NOT_NEIGHBOUR, now reserved */
1050 .err = EHOSTUNREACH,
1051 .fatal = 0,
1052 },
1053 { /* ADDR_UNREACH */
1054 .err = EHOSTUNREACH,
1055 .fatal = 0,
1056 },
1057 { /* PORT_UNREACH */
1058 .err = ECONNREFUSED,
1059 .fatal = 1,
1060 },
Jiri Bohac61e76b12013-08-30 11:18:45 +02001061 { /* POLICY_FAIL */
1062 .err = EACCES,
1063 .fatal = 1,
1064 },
1065 { /* REJECT_ROUTE */
1066 .err = EACCES,
1067 .fatal = 1,
1068 },
Linus Torvalds1da177e2005-04-16 15:20:36 -07001069};
1070
Brian Haleyd5fdd6b2009-06-23 04:31:07 -07001071int icmpv6_err_convert(u8 type, u8 code, int *err)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001072{
1073 int fatal = 0;
1074
1075 *err = EPROTO;
1076
1077 switch (type) {
1078 case ICMPV6_DEST_UNREACH:
1079 fatal = 1;
Jiri Bohac61e76b12013-08-30 11:18:45 +02001080 if (code < ARRAY_SIZE(tab_unreach)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001081 *err = tab_unreach[code].err;
1082 fatal = tab_unreach[code].fatal;
1083 }
1084 break;
1085
1086 case ICMPV6_PKT_TOOBIG:
1087 *err = EMSGSIZE;
1088 break;
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001089
Linus Torvalds1da177e2005-04-16 15:20:36 -07001090 case ICMPV6_PARAMPROB:
1091 *err = EPROTO;
1092 fatal = 1;
1093 break;
1094
1095 case ICMPV6_TIME_EXCEED:
1096 *err = EHOSTUNREACH;
1097 break;
Stephen Hemminger3ff50b72007-04-20 17:09:22 -07001098 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001099
1100 return fatal;
1101}
YOSHIFUJI Hideaki71590392007-02-22 22:05:40 +09001102EXPORT_SYMBOL(icmpv6_err_convert);
1103
Linus Torvalds1da177e2005-04-16 15:20:36 -07001104#ifdef CONFIG_SYSCTL
stephen hemmingere8243532013-12-29 14:03:31 -08001105static struct ctl_table ipv6_icmp_table_template[] = {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001106 {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001107 .procname = "ratelimit",
Daniel Lezcano41a76902008-01-10 03:02:40 -08001108 .data = &init_net.ipv6.sysctl.icmpv6_time,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001109 .maxlen = sizeof(int),
1110 .mode = 0644,
Alexey Dobriyan6d9f2392008-11-03 18:21:05 -08001111 .proc_handler = proc_dointvec_ms_jiffies,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001112 },
Eric W. Biedermanf8572d82009-11-05 13:32:03 -08001113 { },
Linus Torvalds1da177e2005-04-16 15:20:36 -07001114};
Daniel Lezcano760f2d02008-01-10 02:53:43 -08001115
Alexey Dobriyan2c8c1e72010-01-17 03:35:32 +00001116struct ctl_table * __net_init ipv6_icmp_sysctl_init(struct net *net)
Daniel Lezcano760f2d02008-01-10 02:53:43 -08001117{
1118 struct ctl_table *table;
1119
1120 table = kmemdup(ipv6_icmp_table_template,
1121 sizeof(ipv6_icmp_table_template),
1122 GFP_KERNEL);
YOSHIFUJI Hideaki5ee09102008-02-28 00:24:28 +09001123
Eric W. Biedermanc027aab2012-11-16 03:03:10 +00001124 if (table)
YOSHIFUJI Hideaki5ee09102008-02-28 00:24:28 +09001125 table[0].data = &net->ipv6.sysctl.icmpv6_time;
1126
Daniel Lezcano760f2d02008-01-10 02:53:43 -08001127 return table;
1128}
Linus Torvalds1da177e2005-04-16 15:20:36 -07001129#endif