blob: 62c997201970a664cbcfd526d426af07ae019b0e [file] [log] [blame]
Thomas Gleixner2874c5f2019-05-27 08:55:01 +02001// SPDX-License-Identifier: GPL-2.0-or-later
Linus Torvalds1da177e2005-04-16 15:20:36 -07002/*
3 * Internet Control Message Protocol (ICMPv6)
4 * Linux INET6 implementation
5 *
6 * Authors:
7 * Pedro Roque <roque@di.fc.ul.pt>
8 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07009 * Based on net/ipv4/icmp.c
10 *
11 * RFC 1885
Linus Torvalds1da177e2005-04-16 15:20:36 -070012 */
13
14/*
15 * Changes:
16 *
17 * Andi Kleen : exception handling
18 * Andi Kleen add rate limits. never reply to a icmp.
19 * add more length checks and other fixes.
20 * yoshfuji : ensure to sent parameter problem for
21 * fragments.
22 * YOSHIFUJI Hideaki @USAGI: added sysctl for icmp rate limit.
23 * Randy Dunlap and
24 * YOSHIFUJI Hideaki @USAGI: Per-interface statistics support
25 * Kazunori MIYAZAWA @USAGI: change output process to use ip6_append_data
26 */
27
Joe Perchesf3213832012-05-15 14:11:53 +000028#define pr_fmt(fmt) "IPv6: " fmt
29
Linus Torvalds1da177e2005-04-16 15:20:36 -070030#include <linux/module.h>
31#include <linux/errno.h>
32#include <linux/types.h>
33#include <linux/socket.h>
34#include <linux/in.h>
35#include <linux/kernel.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070036#include <linux/sockios.h>
37#include <linux/net.h>
38#include <linux/skbuff.h>
39#include <linux/init.h>
Yasuyuki Kozakai763ecff2006-02-15 15:24:15 -080040#include <linux/netfilter.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090041#include <linux/slab.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070042
43#ifdef CONFIG_SYSCTL
44#include <linux/sysctl.h>
45#endif
46
47#include <linux/inet.h>
48#include <linux/netdevice.h>
49#include <linux/icmpv6.h>
50
51#include <net/ip.h>
52#include <net/sock.h>
53
54#include <net/ipv6.h>
55#include <net/ip6_checksum.h>
Lorenzo Colitti6d0bfe22013-05-22 20:17:31 +000056#include <net/ping.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070057#include <net/protocol.h>
58#include <net/raw.h>
59#include <net/rawv6.h>
60#include <net/transp_v6.h>
61#include <net/ip6_route.h>
62#include <net/addrconf.h>
63#include <net/icmp.h>
Herbert Xu8b7817f2007-12-12 10:44:43 -080064#include <net/xfrm.h>
Denis V. Lunev1ed85162008-04-03 14:31:03 -070065#include <net/inet_common.h>
Hannes Frederic Sowa825edac2014-01-11 11:55:46 +010066#include <net/dsfield.h>
David Ahernca254492015-10-12 11:47:10 -070067#include <net/l3mdev.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070068
Linus Torvalds7c0f6ba2016-12-24 11:46:01 -080069#include <linux/uaccess.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070070
Linus Torvalds1da177e2005-04-16 15:20:36 -070071/*
72 * The ICMP socket(s). This is the most convenient way to flow control
73 * our ICMP output as well as maintain a clean interface throughout
74 * all layers. All Socketless IP sends will soon be gone.
75 *
76 * On SMP we have one ICMP socket per-cpu.
77 */
Eric Dumazet2789c142019-05-31 15:27:00 -070078static struct sock *icmpv6_sk(struct net *net)
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -080079{
Eric Dumazet2789c142019-05-31 15:27:00 -070080 return this_cpu_read(*net->ipv6.icmp_sk);
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -080081}
Linus Torvalds1da177e2005-04-16 15:20:36 -070082
Stefano Brivio32bbd872018-11-08 12:19:21 +010083static int icmpv6_err(struct sk_buff *skb, struct inet6_skb_parm *opt,
Steffen Klassert6f809da2013-01-16 22:09:49 +000084 u8 type, u8 code, int offset, __be32 info)
85{
Lorenzo Colitti6d0bfe22013-05-22 20:17:31 +000086 /* icmpv6_notify checks 8 bytes can be pulled, icmp6hdr is 8 bytes */
87 struct icmp6hdr *icmp6 = (struct icmp6hdr *) (skb->data + offset);
Steffen Klassert6f809da2013-01-16 22:09:49 +000088 struct net *net = dev_net(skb->dev);
89
90 if (type == ICMPV6_PKT_TOOBIG)
Georg Kohmann5f379ef2018-08-02 13:56:58 +020091 ip6_update_pmtu(skb, net, info, skb->dev->ifindex, 0, sock_net_uid(net, NULL));
Steffen Klassert6f809da2013-01-16 22:09:49 +000092 else if (type == NDISC_REDIRECT)
Lorenzo Colittie2d118a2016-11-04 02:23:43 +090093 ip6_redirect(skb, net, skb->dev->ifindex, 0,
94 sock_net_uid(net, NULL));
Lorenzo Colitti6d0bfe22013-05-22 20:17:31 +000095
96 if (!(type & ICMPV6_INFOMSG_MASK))
97 if (icmp6->icmp6_type == ICMPV6_ECHO_REQUEST)
Hannes Frederic Sowadcb94b82016-06-11 20:32:06 +020098 ping_err(skb, offset, ntohl(info));
Stefano Brivio32bbd872018-11-08 12:19:21 +010099
100 return 0;
Steffen Klassert6f809da2013-01-16 22:09:49 +0000101}
102
Herbert Xue5bbef22007-10-15 12:50:28 -0700103static int icmpv6_rcv(struct sk_buff *skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700104
Alexey Dobriyan41135cc2009-09-14 12:22:28 +0000105static const struct inet6_protocol icmpv6_protocol = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700106 .handler = icmpv6_rcv,
Steffen Klassert6f809da2013-01-16 22:09:49 +0000107 .err_handler = icmpv6_err,
Herbert Xu8b7817f2007-12-12 10:44:43 -0800108 .flags = INET6_PROTO_NOPOLICY|INET6_PROTO_FINAL,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700109};
110
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100111/* Called with BH disabled */
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700112static __inline__ struct sock *icmpv6_xmit_lock(struct net *net)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700113{
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700114 struct sock *sk;
115
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700116 sk = icmpv6_sk(net);
Denis V. Lunev405666d2008-02-29 11:16:46 -0800117 if (unlikely(!spin_trylock(&sk->sk_lock.slock))) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700118 /* This can happen if the output path (f.e. SIT or
119 * ip6ip6 tunnel) signals dst_link_failure() for an
120 * outgoing ICMP6 packet.
121 */
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700122 return NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700123 }
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700124 return sk;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700125}
126
Denis V. Lunev405666d2008-02-29 11:16:46 -0800127static __inline__ void icmpv6_xmit_unlock(struct sock *sk)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700128{
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100129 spin_unlock(&sk->sk_lock.slock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700130}
131
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900132/*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700133 * Figure out, may we reply to this packet with icmp error.
134 *
135 * We do not reply, if:
136 * - it was icmp error message.
137 * - it is truncated, so that it is known, that protocol is ICMPV6
138 * (i.e. in the middle of some exthdr)
139 *
140 * --ANK (980726)
141 */
142
Eric Dumazeta50feda2012-05-18 18:57:34 +0000143static bool is_ineligible(const struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700144{
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700145 int ptr = (u8 *)(ipv6_hdr(skb) + 1) - skb->data;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700146 int len = skb->len - ptr;
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700147 __u8 nexthdr = ipv6_hdr(skb)->nexthdr;
Jesse Gross75f28112011-11-30 17:05:51 -0800148 __be16 frag_off;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700149
150 if (len < 0)
Eric Dumazeta50feda2012-05-18 18:57:34 +0000151 return true;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700152
Jesse Gross75f28112011-11-30 17:05:51 -0800153 ptr = ipv6_skip_exthdr(skb, ptr, &nexthdr, &frag_off);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700154 if (ptr < 0)
Eric Dumazeta50feda2012-05-18 18:57:34 +0000155 return false;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700156 if (nexthdr == IPPROTO_ICMPV6) {
157 u8 _type, *tp;
158 tp = skb_header_pointer(skb,
159 ptr+offsetof(struct icmp6hdr, icmp6_type),
160 sizeof(_type), &_type);
Ian Morris63159f22015-03-29 14:00:04 +0100161 if (!tp || !(*tp & ICMPV6_INFOMSG_MASK))
Eric Dumazeta50feda2012-05-18 18:57:34 +0000162 return true;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700163 }
Eric Dumazeta50feda2012-05-18 18:57:34 +0000164 return false;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700165}
166
Stephen Suryaputra0bc19982019-04-17 16:35:49 -0400167static bool icmpv6_mask_allow(struct net *net, int type)
Jesper Dangaard Brouerc0303ef2017-01-09 16:04:09 +0100168{
Stephen Suryaputra0bc19982019-04-17 16:35:49 -0400169 if (type > ICMPV6_MSG_MAX)
Jesper Dangaard Brouerc0303ef2017-01-09 16:04:09 +0100170 return true;
171
Stephen Suryaputra0bc19982019-04-17 16:35:49 -0400172 /* Limit if icmp type is set in ratemask. */
173 if (!test_bit(type, net->ipv6.sysctl.icmpv6_ratemask))
Jesper Dangaard Brouerc0303ef2017-01-09 16:04:09 +0100174 return true;
175
176 return false;
177}
178
Stephen Suryaputra0bc19982019-04-17 16:35:49 -0400179static bool icmpv6_global_allow(struct net *net, int type)
Jesper Dangaard Brouerc0303ef2017-01-09 16:04:09 +0100180{
Stephen Suryaputra0bc19982019-04-17 16:35:49 -0400181 if (icmpv6_mask_allow(net, type))
Jesper Dangaard Brouerc0303ef2017-01-09 16:04:09 +0100182 return true;
183
184 if (icmp_global_allow())
185 return true;
186
187 return false;
188}
189
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900190/*
191 * Check the ICMP output rate limit
Linus Torvalds1da177e2005-04-16 15:20:36 -0700192 */
Eric Dumazet4cdf5072014-09-19 07:38:40 -0700193static bool icmpv6_xrlim_allow(struct sock *sk, u8 type,
194 struct flowi6 *fl6)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700195{
YOSHIFUJI Hideaki3b1e0a62008-03-26 02:26:21 +0900196 struct net *net = sock_net(sk);
Eric Dumazet4cdf5072014-09-19 07:38:40 -0700197 struct dst_entry *dst;
David S. Miller92d86822011-02-04 15:55:25 -0800198 bool res = false;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700199
Stephen Suryaputra0bc19982019-04-17 16:35:49 -0400200 if (icmpv6_mask_allow(net, type))
David S. Miller92d86822011-02-04 15:55:25 -0800201 return true;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700202
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900203 /*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700204 * Look up the output route.
205 * XXX: perhaps the expire for routing entries cloned by
206 * this lookup should be more aggressive (not longer than timeout).
207 */
David S. Miller4c9483b2011-03-12 16:22:43 -0500208 dst = ip6_route_output(net, sk, fl6);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700209 if (dst->error) {
Denis V. Lunev3bd653c2008-10-08 10:54:51 -0700210 IP6_INC_STATS(net, ip6_dst_idev(dst),
YOSHIFUJI Hideakia11d2062006-11-04 20:11:37 +0900211 IPSTATS_MIB_OUTNOROUTES);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700212 } else if (dst->dev && (dst->dev->flags&IFF_LOOPBACK)) {
David S. Miller92d86822011-02-04 15:55:25 -0800213 res = true;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700214 } else {
215 struct rt6_info *rt = (struct rt6_info *)dst;
Benjamin Thery9a43b702008-03-05 10:49:18 -0800216 int tmo = net->ipv6.sysctl.icmpv6_time;
Jesper Dangaard Brouerc0303ef2017-01-09 16:04:09 +0100217 struct inet_peer *peer;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700218
219 /* Give more bandwidth to wider prefixes. */
220 if (rt->rt6i_dst.plen < 128)
221 tmo >>= ((128 - rt->rt6i_dst.plen)>>5);
222
Jesper Dangaard Brouerc0303ef2017-01-09 16:04:09 +0100223 peer = inet_getpeer_v6(net->ipv6.peers, &fl6->daddr, 1);
224 res = inet_peer_xrlim_allow(peer, tmo);
225 if (peer)
226 inet_putpeer(peer);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700227 }
228 dst_release(dst);
229 return res;
230}
231
232/*
233 * an inline helper for the "simple" if statement below
234 * checks if parameter problem report is caused by an
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900235 * unrecognized IPv6 option that has the Option Type
Linus Torvalds1da177e2005-04-16 15:20:36 -0700236 * highest-order two bits set to 10
237 */
238
Eric Dumazeta50feda2012-05-18 18:57:34 +0000239static bool opt_unrec(struct sk_buff *skb, __u32 offset)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700240{
241 u8 _optval, *op;
242
Arnaldo Carvalho de Melobbe735e2007-03-10 22:16:10 -0300243 offset += skb_network_offset(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700244 op = skb_header_pointer(skb, offset, sizeof(_optval), &_optval);
Ian Morris63159f22015-03-29 14:00:04 +0100245 if (!op)
Eric Dumazeta50feda2012-05-18 18:57:34 +0000246 return true;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700247 return (*op & 0xC0) == 0x80;
248}
249
Joe Perches4e64b1e2017-10-05 23:46:14 -0700250void icmpv6_push_pending_frames(struct sock *sk, struct flowi6 *fl6,
251 struct icmp6hdr *thdr, int len)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700252{
253 struct sk_buff *skb;
254 struct icmp6hdr *icmp6h;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700255
Ian Morrise5d08d72014-11-23 21:28:43 +0000256 skb = skb_peek(&sk->sk_write_queue);
Ian Morris63159f22015-03-29 14:00:04 +0100257 if (!skb)
Joe Perches4e64b1e2017-10-05 23:46:14 -0700258 return;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700259
Arnaldo Carvalho de Melocc70ab22007-03-13 14:03:22 -0300260 icmp6h = icmp6_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700261 memcpy(icmp6h, thdr, sizeof(struct icmp6hdr));
262 icmp6h->icmp6_cksum = 0;
263
264 if (skb_queue_len(&sk->sk_write_queue) == 1) {
Joe Perches07f07572008-11-19 15:44:53 -0800265 skb->csum = csum_partial(icmp6h,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700266 sizeof(struct icmp6hdr), skb->csum);
David S. Miller4c9483b2011-03-12 16:22:43 -0500267 icmp6h->icmp6_cksum = csum_ipv6_magic(&fl6->saddr,
268 &fl6->daddr,
269 len, fl6->flowi6_proto,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700270 skb->csum);
271 } else {
Al Viro868c86b2006-11-14 21:35:48 -0800272 __wsum tmp_csum = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700273
274 skb_queue_walk(&sk->sk_write_queue, skb) {
275 tmp_csum = csum_add(tmp_csum, skb->csum);
276 }
277
Joe Perches07f07572008-11-19 15:44:53 -0800278 tmp_csum = csum_partial(icmp6h,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700279 sizeof(struct icmp6hdr), tmp_csum);
David S. Miller4c9483b2011-03-12 16:22:43 -0500280 icmp6h->icmp6_cksum = csum_ipv6_magic(&fl6->saddr,
281 &fl6->daddr,
282 len, fl6->flowi6_proto,
Al Viro868c86b2006-11-14 21:35:48 -0800283 tmp_csum);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700284 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700285 ip6_push_pending_frames(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700286}
287
288struct icmpv6_msg {
289 struct sk_buff *skb;
290 int offset;
Yasuyuki Kozakai763ecff2006-02-15 15:24:15 -0800291 uint8_t type;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700292};
293
294static int icmpv6_getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb)
295{
296 struct icmpv6_msg *msg = (struct icmpv6_msg *) from;
297 struct sk_buff *org_skb = msg->skb;
Al Viro5f92a732006-11-14 21:36:54 -0800298 __wsum csum = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700299
300 csum = skb_copy_and_csum_bits(org_skb, msg->offset + offset,
301 to, len, csum);
302 skb->csum = csum_block_add(skb->csum, csum, odd);
Yasuyuki Kozakai763ecff2006-02-15 15:24:15 -0800303 if (!(msg->type & ICMPV6_INFOMSG_MASK))
304 nf_ct_attach(skb, org_skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700305 return 0;
306}
307
Amerigo Wang07a93622012-10-29 16:23:10 +0000308#if IS_ENABLED(CONFIG_IPV6_MIP6)
Masahide NAKAMURA79383232006-08-23 19:27:25 -0700309static void mip6_addr_swap(struct sk_buff *skb)
310{
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700311 struct ipv6hdr *iph = ipv6_hdr(skb);
Masahide NAKAMURA79383232006-08-23 19:27:25 -0700312 struct inet6_skb_parm *opt = IP6CB(skb);
313 struct ipv6_destopt_hao *hao;
314 struct in6_addr tmp;
315 int off;
316
317 if (opt->dsthao) {
318 off = ipv6_find_tlv(skb, opt->dsthao, IPV6_TLV_HAO);
319 if (likely(off >= 0)) {
Arnaldo Carvalho de Melod56f90a2007-04-10 20:50:43 -0700320 hao = (struct ipv6_destopt_hao *)
321 (skb_network_header(skb) + off);
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000322 tmp = iph->saddr;
323 iph->saddr = hao->addr;
324 hao->addr = tmp;
Masahide NAKAMURA79383232006-08-23 19:27:25 -0700325 }
326 }
327}
328#else
329static inline void mip6_addr_swap(struct sk_buff *skb) {}
330#endif
331
stephen hemmingere8243532013-12-29 14:03:31 -0800332static struct dst_entry *icmpv6_route_lookup(struct net *net,
333 struct sk_buff *skb,
334 struct sock *sk,
335 struct flowi6 *fl6)
David S. Millerb42835d2011-03-01 22:06:22 -0800336{
337 struct dst_entry *dst, *dst2;
David S. Miller4c9483b2011-03-12 16:22:43 -0500338 struct flowi6 fl2;
David S. Millerb42835d2011-03-01 22:06:22 -0800339 int err;
340
Roopa Prabhu343d60a2015-07-30 13:34:53 -0700341 err = ip6_dst_lookup(net, sk, &dst, fl6);
David S. Millerb42835d2011-03-01 22:06:22 -0800342 if (err)
343 return ERR_PTR(err);
344
345 /*
346 * We won't send icmp if the destination is known
347 * anycast.
348 */
Martin KaFai Lau2647a9b2015-05-22 20:55:58 -0700349 if (ipv6_anycast_destination(dst, &fl6->daddr)) {
Joe Perchesba7a46f2014-11-11 10:59:17 -0800350 net_dbg_ratelimited("icmp6_send: acast source\n");
David S. Millerb42835d2011-03-01 22:06:22 -0800351 dst_release(dst);
352 return ERR_PTR(-EINVAL);
353 }
354
355 /* No need to clone since we're just using its address. */
356 dst2 = dst;
357
David S. Miller4c9483b2011-03-12 16:22:43 -0500358 dst = xfrm_lookup(net, dst, flowi6_to_flowi(fl6), sk, 0);
David S. Miller452edd52011-03-02 13:27:41 -0800359 if (!IS_ERR(dst)) {
David S. Millerb42835d2011-03-01 22:06:22 -0800360 if (dst != dst2)
361 return dst;
David S. Miller452edd52011-03-02 13:27:41 -0800362 } else {
363 if (PTR_ERR(dst) == -EPERM)
364 dst = NULL;
365 else
366 return dst;
David S. Millerb42835d2011-03-01 22:06:22 -0800367 }
368
David S. Miller4c9483b2011-03-12 16:22:43 -0500369 err = xfrm_decode_session_reverse(skb, flowi6_to_flowi(&fl2), AF_INET6);
David S. Millerb42835d2011-03-01 22:06:22 -0800370 if (err)
371 goto relookup_failed;
372
Roopa Prabhu343d60a2015-07-30 13:34:53 -0700373 err = ip6_dst_lookup(net, sk, &dst2, &fl2);
David S. Millerb42835d2011-03-01 22:06:22 -0800374 if (err)
375 goto relookup_failed;
376
David S. Miller4c9483b2011-03-12 16:22:43 -0500377 dst2 = xfrm_lookup(net, dst2, flowi6_to_flowi(&fl2), sk, XFRM_LOOKUP_ICMP);
David S. Miller452edd52011-03-02 13:27:41 -0800378 if (!IS_ERR(dst2)) {
David S. Millerb42835d2011-03-01 22:06:22 -0800379 dst_release(dst);
380 dst = dst2;
David S. Miller452edd52011-03-02 13:27:41 -0800381 } else {
382 err = PTR_ERR(dst2);
383 if (err == -EPERM) {
384 dst_release(dst);
385 return dst2;
386 } else
387 goto relookup_failed;
David S. Millerb42835d2011-03-01 22:06:22 -0800388 }
389
390relookup_failed:
391 if (dst)
392 return dst;
393 return ERR_PTR(err);
394}
395
Stephen Suryaputrae1ae5c22019-06-10 10:32:50 -0400396static struct net_device *icmp6_dev(const struct sk_buff *skb)
David Ahern1b70d7922017-08-28 13:53:34 -0700397{
Stephen Suryaputrae1ae5c22019-06-10 10:32:50 -0400398 struct net_device *dev = skb->dev;
David Ahern1b70d7922017-08-28 13:53:34 -0700399
400 /* for local traffic to local address, skb dev is the loopback
401 * device. Check if there is a dst attached to the skb and if so
David Ahern24b711e2018-07-19 12:41:18 -0700402 * get the real device index. Same is needed for replies to a link
403 * local address on a device enslaved to an L3 master device
David Ahern1b70d7922017-08-28 13:53:34 -0700404 */
Stephen Suryaputrae1ae5c22019-06-10 10:32:50 -0400405 if (unlikely(dev->ifindex == LOOPBACK_IFINDEX || netif_is_l3_master(skb->dev))) {
David Ahern1b70d7922017-08-28 13:53:34 -0700406 const struct rt6_info *rt6 = skb_rt6_info(skb);
407
408 if (rt6)
Stephen Suryaputrae1ae5c22019-06-10 10:32:50 -0400409 dev = rt6->rt6i_idev->dev;
David Ahern1b70d7922017-08-28 13:53:34 -0700410 }
411
Stephen Suryaputrae1ae5c22019-06-10 10:32:50 -0400412 return dev;
413}
414
415static int icmp6_iif(const struct sk_buff *skb)
416{
417 return icmp6_dev(skb)->ifindex;
David Ahern1b70d7922017-08-28 13:53:34 -0700418}
419
Linus Torvalds1da177e2005-04-16 15:20:36 -0700420/*
421 * Send an ICMP message in response to a packet in error
422 */
Eric Dumazetb1cadc12016-06-18 21:52:02 -0700423static void icmp6_send(struct sk_buff *skb, u8 type, u8 code, __u32 info,
424 const struct in6_addr *force_saddr)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700425{
426 struct inet6_dev *idev = NULL;
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700427 struct ipv6hdr *hdr = ipv6_hdr(skb);
YOSHIFUJI Hideaki84427d52005-06-13 14:59:44 -0700428 struct sock *sk;
Eric Dumazet8d933672019-01-04 11:00:00 -0800429 struct net *net;
YOSHIFUJI Hideaki84427d52005-06-13 14:59:44 -0700430 struct ipv6_pinfo *np;
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000431 const struct in6_addr *saddr = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700432 struct dst_entry *dst;
433 struct icmp6hdr tmp_hdr;
David S. Miller4c9483b2011-03-12 16:22:43 -0500434 struct flowi6 fl6;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700435 struct icmpv6_msg msg;
Wei Wang26879da2016-05-02 21:40:07 -0700436 struct ipcm6_cookie ipc6;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700437 int iif = 0;
438 int addr_type = 0;
439 int len;
Eric Dumazet8d933672019-01-04 11:00:00 -0800440 u32 mark;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700441
Arnaldo Carvalho de Melo27a884d2007-04-19 20:29:13 -0700442 if ((u8 *)hdr < skb->head ||
Simon Horman29a3cad2013-05-28 20:34:26 +0000443 (skb_network_header(skb) + sizeof(*hdr)) > skb_tail_pointer(skb))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700444 return;
445
Eric Dumazet8d933672019-01-04 11:00:00 -0800446 if (!skb->dev)
447 return;
448 net = dev_net(skb->dev);
449 mark = IP6_REPLY_MARK(net, skb->mark);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700450 /*
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900451 * Make sure we respect the rules
Linus Torvalds1da177e2005-04-16 15:20:36 -0700452 * i.e. RFC 1885 2.4(e)
Pravin B Shelar5f5624c2013-04-25 11:08:30 +0000453 * Rule (e.1) is enforced by not using icmp6_send
Linus Torvalds1da177e2005-04-16 15:20:36 -0700454 * in any code that processes icmp errors.
455 */
456 addr_type = ipv6_addr_type(&hdr->daddr);
457
FX Le Bail446fab52014-01-19 17:00:36 +0100458 if (ipv6_chk_addr(net, &hdr->daddr, skb->dev, 0) ||
FX Le Baild94c1f92014-02-07 11:22:37 +0100459 ipv6_chk_acast_addr_src(net, skb->dev, &hdr->daddr))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700460 saddr = &hdr->daddr;
461
462 /*
463 * Dest addr check
464 */
465
zhuyj9a6b4b32015-01-14 17:23:59 +0800466 if (addr_type & IPV6_ADDR_MULTICAST || skb->pkt_type != PACKET_HOST) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700467 if (type != ICMPV6_PKT_TOOBIG &&
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900468 !(type == ICMPV6_PARAMPROB &&
469 code == ICMPV6_UNK_OPTION &&
Linus Torvalds1da177e2005-04-16 15:20:36 -0700470 (opt_unrec(skb, info))))
471 return;
472
473 saddr = NULL;
474 }
475
476 addr_type = ipv6_addr_type(&hdr->saddr);
477
478 /*
479 * Source addr check
480 */
481
David Ahern4832c302017-08-17 12:17:20 -0700482 if (__ipv6_addr_needs_scope_id(addr_type)) {
David Ahern1b70d7922017-08-28 13:53:34 -0700483 iif = icmp6_iif(skb);
David Ahern4832c302017-08-17 12:17:20 -0700484 } else {
David Ahern79dc7e32016-11-27 18:52:53 -0800485 dst = skb_dst(skb);
486 iif = l3mdev_master_ifindex(dst ? dst->dev : skb->dev);
487 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700488
489 /*
YOSHIFUJI Hideaki8de33512005-12-21 22:57:06 +0900490 * Must not send error if the source does not uniquely
491 * identify a single node (RFC2463 Section 2.4).
492 * We check unspecified / multicast addresses here,
493 * and anycast addresses will be checked later.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700494 */
495 if ((addr_type == IPV6_ADDR_ANY) || (addr_type & IPV6_ADDR_MULTICAST)) {
Bjørn Mork4b3418f2015-10-24 14:00:20 +0200496 net_dbg_ratelimited("icmp6_send: addr_any/mcast source [%pI6c > %pI6c]\n",
497 &hdr->saddr, &hdr->daddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700498 return;
499 }
500
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900501 /*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700502 * Never answer to a ICMP packet.
503 */
504 if (is_ineligible(skb)) {
Bjørn Mork4b3418f2015-10-24 14:00:20 +0200505 net_dbg_ratelimited("icmp6_send: no reply to icmp error [%pI6c > %pI6c]\n",
506 &hdr->saddr, &hdr->daddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700507 return;
508 }
509
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100510 /* Needed by both icmp_global_allow and icmpv6_xmit_lock */
511 local_bh_disable();
512
513 /* Check global sysctl_icmp_msgs_per_sec ratelimit */
Stephen Suryaputra0bc19982019-04-17 16:35:49 -0400514 if (!(skb->dev->flags & IFF_LOOPBACK) && !icmpv6_global_allow(net, type))
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100515 goto out_bh_enable;
516
Masahide NAKAMURA79383232006-08-23 19:27:25 -0700517 mip6_addr_swap(skb);
518
David S. Miller4c9483b2011-03-12 16:22:43 -0500519 memset(&fl6, 0, sizeof(fl6));
520 fl6.flowi6_proto = IPPROTO_ICMPV6;
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000521 fl6.daddr = hdr->saddr;
Eric Dumazetb1cadc12016-06-18 21:52:02 -0700522 if (force_saddr)
523 saddr = force_saddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700524 if (saddr)
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000525 fl6.saddr = *saddr;
Lorenzo Colittie1108612014-05-13 10:17:33 -0700526 fl6.flowi6_mark = mark;
David S. Miller4c9483b2011-03-12 16:22:43 -0500527 fl6.flowi6_oif = iif;
David S. Miller1958b852011-03-12 16:36:19 -0500528 fl6.fl6_icmp_type = type;
529 fl6.fl6_icmp_code = code;
Lorenzo Colittie2d118a2016-11-04 02:23:43 +0900530 fl6.flowi6_uid = sock_net_uid(net, NULL);
David Ahernb4bac172018-03-02 08:32:18 -0800531 fl6.mp_hash = rt6_multipath_hash(net, &fl6, skb, NULL);
David S. Miller4c9483b2011-03-12 16:22:43 -0500532 security_skb_classify_flow(skb, flowi6_to_flowi(&fl6));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700533
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700534 sk = icmpv6_xmit_lock(net);
Ian Morris63159f22015-03-29 14:00:04 +0100535 if (!sk)
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100536 goto out_bh_enable;
Jesper Dangaard Brouerc0303ef2017-01-09 16:04:09 +0100537
Lorenzo Colittie1108612014-05-13 10:17:33 -0700538 sk->sk_mark = mark;
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700539 np = inet6_sk(sk);
Denis V. Lunev405666d2008-02-29 11:16:46 -0800540
David S. Miller4c9483b2011-03-12 16:22:43 -0500541 if (!icmpv6_xrlim_allow(sk, type, &fl6))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700542 goto out;
543
544 tmp_hdr.icmp6_type = type;
545 tmp_hdr.icmp6_code = code;
546 tmp_hdr.icmp6_cksum = 0;
547 tmp_hdr.icmp6_pointer = htonl(info);
548
David S. Miller4c9483b2011-03-12 16:22:43 -0500549 if (!fl6.flowi6_oif && ipv6_addr_is_multicast(&fl6.daddr))
550 fl6.flowi6_oif = np->mcast_oif;
Erich E. Hooverc4062df2012-02-08 09:11:08 +0000551 else if (!fl6.flowi6_oif)
552 fl6.flowi6_oif = np->ucast_oif;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700553
Willem de Bruijnb515430a2018-07-06 10:12:55 -0400554 ipcm6_init_sk(&ipc6, np);
Hannes Frederic Sowa38b70972016-06-11 20:08:19 +0200555 fl6.flowlabel = ip6_make_flowinfo(ipc6.tclass, fl6.flowlabel);
556
David S. Miller4c9483b2011-03-12 16:22:43 -0500557 dst = icmpv6_route_lookup(net, skb, sk, &fl6);
David S. Millerb42835d2011-03-01 22:06:22 -0800558 if (IS_ERR(dst))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700559 goto out;
YOSHIFUJI Hideaki8de33512005-12-21 22:57:06 +0900560
Wei Wang26879da2016-05-02 21:40:07 -0700561 ipc6.hlimit = ip6_sk_dst_hoplimit(np, &fl6, dst);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700562
563 msg.skb = skb;
Arnaldo Carvalho de Melobbe735e2007-03-10 22:16:10 -0300564 msg.offset = skb_network_offset(skb);
Yasuyuki Kozakai763ecff2006-02-15 15:24:15 -0800565 msg.type = type;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700566
567 len = skb->len - msg.offset;
Ian Morris67ba4152014-08-24 21:53:10 +0100568 len = min_t(unsigned int, len, IPV6_MIN_MTU - sizeof(struct ipv6hdr) - sizeof(struct icmp6hdr));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700569 if (len < 0) {
Bjørn Mork4b3418f2015-10-24 14:00:20 +0200570 net_dbg_ratelimited("icmp: len problem [%pI6c > %pI6c]\n",
571 &hdr->saddr, &hdr->daddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700572 goto out_dst_release;
573 }
574
Eric Dumazetcfdf7642011-07-27 21:13:03 +0000575 rcu_read_lock();
576 idev = __in6_dev_get(skb->dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700577
Joe Perches4e64b1e2017-10-05 23:46:14 -0700578 if (ip6_append_data(sk, icmpv6_getfrag, &msg,
579 len + sizeof(struct icmp6hdr),
580 sizeof(struct icmp6hdr),
581 &ipc6, &fl6, (struct rt6_info *)dst,
Willem de Bruijn5fdaa882018-07-06 10:12:57 -0400582 MSG_DONTWAIT)) {
Hannes Frederic Sowa43a43b62014-03-31 20:14:10 +0200583 ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTERRORS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700584 ip6_flush_pending_frames(sk);
Eric Dumazetcfdf7642011-07-27 21:13:03 +0000585 } else {
Joe Perches4e64b1e2017-10-05 23:46:14 -0700586 icmpv6_push_pending_frames(sk, &fl6, &tmp_hdr,
587 len + sizeof(struct icmp6hdr));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700588 }
Eric Dumazetcfdf7642011-07-27 21:13:03 +0000589 rcu_read_unlock();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700590out_dst_release:
591 dst_release(dst);
592out:
Denis V. Lunev405666d2008-02-29 11:16:46 -0800593 icmpv6_xmit_unlock(sk);
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100594out_bh_enable:
595 local_bh_enable();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700596}
Pravin B Shelar5f5624c2013-04-25 11:08:30 +0000597
598/* Slightly more convenient version of icmp6_send.
599 */
600void icmpv6_param_prob(struct sk_buff *skb, u8 code, int pos)
601{
Eric Dumazetb1cadc12016-06-18 21:52:02 -0700602 icmp6_send(skb, ICMPV6_PARAMPROB, code, pos, NULL);
Pravin B Shelar5f5624c2013-04-25 11:08:30 +0000603 kfree_skb(skb);
604}
YOSHIFUJI Hideaki71590392007-02-22 22:05:40 +0900605
Eric Dumazet5fbba8a2016-06-18 21:52:03 -0700606/* Generate icmpv6 with type/code ICMPV6_DEST_UNREACH/ICMPV6_ADDR_UNREACH
607 * if sufficient data bytes are available
608 * @nhs is the size of the tunnel header(s) :
609 * Either an IPv4 header for SIT encap
610 * an IPv4 header + GRE header for GRE encap
611 */
Eric Dumazet20e19542016-06-18 21:52:06 -0700612int ip6_err_gen_icmpv6_unreach(struct sk_buff *skb, int nhs, int type,
613 unsigned int data_len)
Eric Dumazet5fbba8a2016-06-18 21:52:03 -0700614{
Eric Dumazet2d7a3b22016-06-18 21:52:04 -0700615 struct in6_addr temp_saddr;
Eric Dumazet5fbba8a2016-06-18 21:52:03 -0700616 struct rt6_info *rt;
617 struct sk_buff *skb2;
Eric Dumazet20e19542016-06-18 21:52:06 -0700618 u32 info = 0;
Eric Dumazet5fbba8a2016-06-18 21:52:03 -0700619
620 if (!pskb_may_pull(skb, nhs + sizeof(struct ipv6hdr) + 8))
621 return 1;
622
Eric Dumazet20e19542016-06-18 21:52:06 -0700623 /* RFC 4884 (partial) support for ICMP extensions */
624 if (data_len < 128 || (data_len & 7) || skb->len < data_len)
625 data_len = 0;
626
627 skb2 = data_len ? skb_copy(skb, GFP_ATOMIC) : skb_clone(skb, GFP_ATOMIC);
Eric Dumazet5fbba8a2016-06-18 21:52:03 -0700628
629 if (!skb2)
630 return 1;
631
632 skb_dst_drop(skb2);
633 skb_pull(skb2, nhs);
634 skb_reset_network_header(skb2);
635
David Ahernb75cc8f2018-03-02 08:32:17 -0800636 rt = rt6_lookup(dev_net(skb->dev), &ipv6_hdr(skb2)->saddr, NULL, 0,
637 skb, 0);
Eric Dumazet5fbba8a2016-06-18 21:52:03 -0700638
639 if (rt && rt->dst.dev)
640 skb2->dev = rt->dst.dev;
641
Eric Dumazet2d7a3b22016-06-18 21:52:04 -0700642 ipv6_addr_set_v4mapped(ip_hdr(skb)->saddr, &temp_saddr);
Eric Dumazet20e19542016-06-18 21:52:06 -0700643
644 if (data_len) {
645 /* RFC 4884 (partial) support :
646 * insert 0 padding at the end, before the extensions
647 */
648 __skb_push(skb2, nhs);
649 skb_reset_network_header(skb2);
650 memmove(skb2->data, skb2->data + nhs, data_len - nhs);
651 memset(skb2->data + data_len - nhs, 0, nhs);
652 /* RFC 4884 4.5 : Length is measured in 64-bit words,
653 * and stored in reserved[0]
654 */
655 info = (data_len/8) << 24;
656 }
Eric Dumazet2d7a3b22016-06-18 21:52:04 -0700657 if (type == ICMP_TIME_EXCEEDED)
658 icmp6_send(skb2, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT,
Eric Dumazet20e19542016-06-18 21:52:06 -0700659 info, &temp_saddr);
Eric Dumazet2d7a3b22016-06-18 21:52:04 -0700660 else
661 icmp6_send(skb2, ICMPV6_DEST_UNREACH, ICMPV6_ADDR_UNREACH,
Eric Dumazet20e19542016-06-18 21:52:06 -0700662 info, &temp_saddr);
Eric Dumazet5fbba8a2016-06-18 21:52:03 -0700663 if (rt)
664 ip6_rt_put(rt);
665
666 kfree_skb(skb2);
667
668 return 0;
669}
670EXPORT_SYMBOL(ip6_err_gen_icmpv6_unreach);
671
Linus Torvalds1da177e2005-04-16 15:20:36 -0700672static void icmpv6_echo_reply(struct sk_buff *skb)
673{
YOSHIFUJI Hideakic346dca2008-03-25 21:47:49 +0900674 struct net *net = dev_net(skb->dev);
YOSHIFUJI Hideaki84427d52005-06-13 14:59:44 -0700675 struct sock *sk;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700676 struct inet6_dev *idev;
YOSHIFUJI Hideaki84427d52005-06-13 14:59:44 -0700677 struct ipv6_pinfo *np;
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000678 const struct in6_addr *saddr = NULL;
Arnaldo Carvalho de Melocc70ab22007-03-13 14:03:22 -0300679 struct icmp6hdr *icmph = icmp6_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700680 struct icmp6hdr tmp_hdr;
David S. Miller4c9483b2011-03-12 16:22:43 -0500681 struct flowi6 fl6;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700682 struct icmpv6_msg msg;
683 struct dst_entry *dst;
Wei Wang26879da2016-05-02 21:40:07 -0700684 struct ipcm6_cookie ipc6;
Lorenzo Colittie1108612014-05-13 10:17:33 -0700685 u32 mark = IP6_REPLY_MARK(net, skb->mark);
Stephen Suryaputra0b03a5c2019-03-20 10:29:27 -0400686 bool acast;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700687
Stephen Suryaputra03f1ecc2019-03-19 12:37:12 -0400688 if (ipv6_addr_is_multicast(&ipv6_hdr(skb)->daddr) &&
689 net->ipv6.sysctl.icmpv6_echo_ignore_multicast)
690 return;
691
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700692 saddr = &ipv6_hdr(skb)->daddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700693
Stephen Suryaputra0b03a5c2019-03-20 10:29:27 -0400694 acast = ipv6_anycast_destination(skb_dst(skb), saddr);
695 if (acast && net->ipv6.sysctl.icmpv6_echo_ignore_anycast)
696 return;
697
FX Le Bail509aba32014-01-07 14:57:27 +0100698 if (!ipv6_unicast_destination(skb) &&
Stephen Suryaputra0b03a5c2019-03-20 10:29:27 -0400699 !(net->ipv6.sysctl.anycast_src_echo_reply && acast))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700700 saddr = NULL;
701
702 memcpy(&tmp_hdr, icmph, sizeof(tmp_hdr));
703 tmp_hdr.icmp6_type = ICMPV6_ECHO_REPLY;
704
David S. Miller4c9483b2011-03-12 16:22:43 -0500705 memset(&fl6, 0, sizeof(fl6));
Eric Dumazeta346abe2019-07-01 06:39:36 -0700706 if (net->ipv6.sysctl.flowlabel_reflect & FLOWLABEL_REFLECT_ICMPV6_ECHO_REPLIES)
707 fl6.flowlabel = ip6_flowlabel(ipv6_hdr(skb));
708
David S. Miller4c9483b2011-03-12 16:22:43 -0500709 fl6.flowi6_proto = IPPROTO_ICMPV6;
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000710 fl6.daddr = ipv6_hdr(skb)->saddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700711 if (saddr)
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000712 fl6.saddr = *saddr;
David Ahern1b70d7922017-08-28 13:53:34 -0700713 fl6.flowi6_oif = icmp6_iif(skb);
David S. Miller1958b852011-03-12 16:36:19 -0500714 fl6.fl6_icmp_type = ICMPV6_ECHO_REPLY;
Lorenzo Colittie1108612014-05-13 10:17:33 -0700715 fl6.flowi6_mark = mark;
Lorenzo Colittie2d118a2016-11-04 02:23:43 +0900716 fl6.flowi6_uid = sock_net_uid(net, NULL);
David S. Miller4c9483b2011-03-12 16:22:43 -0500717 security_skb_classify_flow(skb, flowi6_to_flowi(&fl6));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700718
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100719 local_bh_disable();
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700720 sk = icmpv6_xmit_lock(net);
Ian Morris63159f22015-03-29 14:00:04 +0100721 if (!sk)
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100722 goto out_bh_enable;
Lorenzo Colittie1108612014-05-13 10:17:33 -0700723 sk->sk_mark = mark;
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700724 np = inet6_sk(sk);
Denis V. Lunev405666d2008-02-29 11:16:46 -0800725
David S. Miller4c9483b2011-03-12 16:22:43 -0500726 if (!fl6.flowi6_oif && ipv6_addr_is_multicast(&fl6.daddr))
727 fl6.flowi6_oif = np->mcast_oif;
Erich E. Hooverc4062df2012-02-08 09:11:08 +0000728 else if (!fl6.flowi6_oif)
729 fl6.flowi6_oif = np->ucast_oif;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700730
Joe Perches4e64b1e2017-10-05 23:46:14 -0700731 if (ip6_dst_lookup(net, sk, &dst, &fl6))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700732 goto out;
David S. Miller4c9483b2011-03-12 16:22:43 -0500733 dst = xfrm_lookup(net, dst, flowi6_to_flowi(&fl6), sk, 0);
David S. Miller452edd52011-03-02 13:27:41 -0800734 if (IS_ERR(dst))
Patrick McHardye104411b2005-09-08 15:11:55 -0700735 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700736
Stephen Suryaputra0bc19982019-04-17 16:35:49 -0400737 /* Check the ratelimit */
738 if ((!(skb->dev->flags & IFF_LOOPBACK) && !icmpv6_global_allow(net, ICMPV6_ECHO_REPLY)) ||
739 !icmpv6_xrlim_allow(sk, ICMPV6_ECHO_REPLY, &fl6))
740 goto out_dst_release;
741
Eric Dumazetcfdf7642011-07-27 21:13:03 +0000742 idev = __in6_dev_get(skb->dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700743
744 msg.skb = skb;
745 msg.offset = 0;
Yasuyuki Kozakai763ecff2006-02-15 15:24:15 -0800746 msg.type = ICMPV6_ECHO_REPLY;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700747
Willem de Bruijnb515430a2018-07-06 10:12:55 -0400748 ipcm6_init_sk(&ipc6, np);
Wei Wang26879da2016-05-02 21:40:07 -0700749 ipc6.hlimit = ip6_sk_dst_hoplimit(np, &fl6, dst);
750 ipc6.tclass = ipv6_get_dsfield(ipv6_hdr(skb));
Wei Wang26879da2016-05-02 21:40:07 -0700751
Joe Perches4e64b1e2017-10-05 23:46:14 -0700752 if (ip6_append_data(sk, icmpv6_getfrag, &msg,
753 skb->len + sizeof(struct icmp6hdr),
754 sizeof(struct icmp6hdr), &ipc6, &fl6,
Willem de Bruijn5fdaa882018-07-06 10:12:57 -0400755 (struct rt6_info *)dst, MSG_DONTWAIT)) {
Eric Dumazeta16292a2016-04-27 16:44:36 -0700756 __ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTERRORS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700757 ip6_flush_pending_frames(sk);
Eric Dumazetcfdf7642011-07-27 21:13:03 +0000758 } else {
Joe Perches4e64b1e2017-10-05 23:46:14 -0700759 icmpv6_push_pending_frames(sk, &fl6, &tmp_hdr,
760 skb->len + sizeof(struct icmp6hdr));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700761 }
Stephen Suryaputra0bc19982019-04-17 16:35:49 -0400762out_dst_release:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700763 dst_release(dst);
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900764out:
Denis V. Lunev405666d2008-02-29 11:16:46 -0800765 icmpv6_xmit_unlock(sk);
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100766out_bh_enable:
767 local_bh_enable();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700768}
769
David S. Millerb94f1c02012-07-12 00:33:37 -0700770void icmpv6_notify(struct sk_buff *skb, u8 type, u8 code, __be32 info)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700771{
Alexey Dobriyan41135cc2009-09-14 12:22:28 +0000772 const struct inet6_protocol *ipprot;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700773 int inner_offset;
Jesse Gross75f28112011-11-30 17:05:51 -0800774 __be16 frag_off;
David S. Millerf9242b62012-06-19 18:56:21 -0700775 u8 nexthdr;
Duan Jiong7304fe42014-07-31 17:54:32 +0800776 struct net *net = dev_net(skb->dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700777
778 if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
Duan Jiong7304fe42014-07-31 17:54:32 +0800779 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700780
781 nexthdr = ((struct ipv6hdr *)skb->data)->nexthdr;
782 if (ipv6_ext_hdr(nexthdr)) {
783 /* now skip over extension headers */
Jesse Gross75f28112011-11-30 17:05:51 -0800784 inner_offset = ipv6_skip_exthdr(skb, sizeof(struct ipv6hdr),
785 &nexthdr, &frag_off);
Ian Morris67ba4152014-08-24 21:53:10 +0100786 if (inner_offset < 0)
Duan Jiong7304fe42014-07-31 17:54:32 +0800787 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700788 } else {
789 inner_offset = sizeof(struct ipv6hdr);
790 }
791
792 /* Checkin header including 8 bytes of inner protocol header. */
793 if (!pskb_may_pull(skb, inner_offset+8))
Duan Jiong7304fe42014-07-31 17:54:32 +0800794 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700795
Linus Torvalds1da177e2005-04-16 15:20:36 -0700796 /* BUGGG_FUTURE: we should try to parse exthdrs in this packet.
797 Without this we will not able f.e. to make source routed
798 pmtu discovery.
799 Corresponding argument (opt) to notifiers is already added.
800 --ANK (980726)
801 */
802
David S. Millerf9242b62012-06-19 18:56:21 -0700803 ipprot = rcu_dereference(inet6_protos[nexthdr]);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700804 if (ipprot && ipprot->err_handler)
805 ipprot->err_handler(skb, NULL, type, code, inner_offset, info);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700806
Pavel Emelyanov69d6da02007-11-19 22:35:57 -0800807 raw6_icmp_error(skb, nexthdr, type, code, inner_offset, info);
Duan Jiong7304fe42014-07-31 17:54:32 +0800808 return;
809
810out:
Eric Dumazeta16292a2016-04-27 16:44:36 -0700811 __ICMP6_INC_STATS(net, __in6_dev_get(skb->dev), ICMP6_MIB_INERRORS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700812}
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900813
Linus Torvalds1da177e2005-04-16 15:20:36 -0700814/*
815 * Handle icmp messages
816 */
817
Herbert Xue5bbef22007-10-15 12:50:28 -0700818static int icmpv6_rcv(struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700819{
Virgile Jarrye6f86b02018-08-10 17:48:15 +0200820 struct net *net = dev_net(skb->dev);
Stephen Suryaputrae1ae5c22019-06-10 10:32:50 -0400821 struct net_device *dev = icmp6_dev(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700822 struct inet6_dev *idev = __in6_dev_get(dev);
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000823 const struct in6_addr *saddr, *daddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700824 struct icmp6hdr *hdr;
Brian Haleyd5fdd6b2009-06-23 04:31:07 -0700825 u8 type;
Rick Jonese3e32172014-11-17 14:04:29 -0800826 bool success = false;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700827
Herbert Xuaebcf822007-12-12 18:54:16 -0800828 if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb)) {
Alexey Dobriyandef8b4f2008-10-28 13:24:06 -0700829 struct sec_path *sp = skb_sec_path(skb);
Herbert Xu8b7817f2007-12-12 10:44:43 -0800830 int nh;
831
Alexey Dobriyandef8b4f2008-10-28 13:24:06 -0700832 if (!(sp && sp->xvec[sp->len - 1]->props.flags &
Herbert Xuaebcf822007-12-12 18:54:16 -0800833 XFRM_STATE_ICMP))
834 goto drop_no_count;
835
David S. Miller81aded22012-06-15 14:54:11 -0700836 if (!pskb_may_pull(skb, sizeof(*hdr) + sizeof(struct ipv6hdr)))
Herbert Xu8b7817f2007-12-12 10:44:43 -0800837 goto drop_no_count;
838
839 nh = skb_network_offset(skb);
840 skb_set_network_header(skb, sizeof(*hdr));
841
842 if (!xfrm6_policy_check_reverse(NULL, XFRM_POLICY_IN, skb))
843 goto drop_no_count;
844
845 skb_set_network_header(skb, nh);
846 }
847
Eric Dumazeta16292a2016-04-27 16:44:36 -0700848 __ICMP6_INC_STATS(dev_net(dev), idev, ICMP6_MIB_INMSGS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700849
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700850 saddr = &ipv6_hdr(skb)->saddr;
851 daddr = &ipv6_hdr(skb)->daddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700852
Tom Herbert39471ac2014-05-07 16:52:29 -0700853 if (skb_checksum_validate(skb, IPPROTO_ICMPV6, ip6_compute_pseudo)) {
Joe Perchesba7a46f2014-11-11 10:59:17 -0800854 net_dbg_ratelimited("ICMPv6 checksum failed [%pI6c > %pI6c]\n",
855 saddr, daddr);
Tom Herbert39471ac2014-05-07 16:52:29 -0700856 goto csum_error;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700857 }
858
Herbert Xu8cf22942008-02-05 03:15:50 -0800859 if (!pskb_pull(skb, sizeof(*hdr)))
860 goto discard_it;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700861
Arnaldo Carvalho de Melocc70ab22007-03-13 14:03:22 -0300862 hdr = icmp6_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700863
864 type = hdr->icmp6_type;
865
Eric Dumazetf3832ed2016-04-27 16:44:42 -0700866 ICMP6MSGIN_INC_STATS(dev_net(dev), idev, type);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700867
868 switch (type) {
869 case ICMPV6_ECHO_REQUEST:
Virgile Jarrye6f86b02018-08-10 17:48:15 +0200870 if (!net->ipv6.sysctl.icmpv6_echo_ignore_all)
871 icmpv6_echo_reply(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700872 break;
873
874 case ICMPV6_ECHO_REPLY:
Rick Jonese3e32172014-11-17 14:04:29 -0800875 success = ping_rcv(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700876 break;
877
878 case ICMPV6_PKT_TOOBIG:
879 /* BUGGG_FUTURE: if packet contains rthdr, we cannot update
880 standard destination cache. Seems, only "advanced"
881 destination cache will allow to solve this problem
882 --ANK (980726)
883 */
884 if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
885 goto discard_it;
Arnaldo Carvalho de Melocc70ab22007-03-13 14:03:22 -0300886 hdr = icmp6_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700887
Gustavo A. R. Silva275757e62017-10-16 16:36:52 -0500888 /* to notify */
889 /* fall through */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700890 case ICMPV6_DEST_UNREACH:
891 case ICMPV6_TIME_EXCEED:
892 case ICMPV6_PARAMPROB:
893 icmpv6_notify(skb, type, hdr->icmp6_code, hdr->icmp6_mtu);
894 break;
895
896 case NDISC_ROUTER_SOLICITATION:
897 case NDISC_ROUTER_ADVERTISEMENT:
898 case NDISC_NEIGHBOUR_SOLICITATION:
899 case NDISC_NEIGHBOUR_ADVERTISEMENT:
900 case NDISC_REDIRECT:
901 ndisc_rcv(skb);
902 break;
903
904 case ICMPV6_MGM_QUERY:
905 igmp6_event_query(skb);
906 break;
907
908 case ICMPV6_MGM_REPORT:
909 igmp6_event_report(skb);
910 break;
911
912 case ICMPV6_MGM_REDUCTION:
913 case ICMPV6_NI_QUERY:
914 case ICMPV6_NI_REPLY:
915 case ICMPV6_MLD2_REPORT:
916 case ICMPV6_DHAAD_REQUEST:
917 case ICMPV6_DHAAD_REPLY:
918 case ICMPV6_MOBILE_PREFIX_SOL:
919 case ICMPV6_MOBILE_PREFIX_ADV:
920 break;
921
922 default:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700923 /* informational */
924 if (type & ICMPV6_INFOMSG_MASK)
925 break;
926
Bjørn Mork4b3418f2015-10-24 14:00:20 +0200927 net_dbg_ratelimited("icmpv6: msg of unknown type [%pI6c > %pI6c]\n",
928 saddr, daddr);
David S. Millerea85a0a2014-10-07 16:33:53 -0400929
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900930 /*
931 * error of unknown type.
932 * must pass to upper level
Linus Torvalds1da177e2005-04-16 15:20:36 -0700933 */
934
935 icmpv6_notify(skb, type, hdr->icmp6_code, hdr->icmp6_mtu);
Stephen Hemminger3ff50b72007-04-20 17:09:22 -0700936 }
937
Rick Jonese3e32172014-11-17 14:04:29 -0800938 /* until the v6 path can be better sorted assume failure and
939 * preserve the status quo behaviour for the rest of the paths to here
940 */
941 if (success)
942 consume_skb(skb);
943 else
944 kfree_skb(skb);
945
Linus Torvalds1da177e2005-04-16 15:20:36 -0700946 return 0;
947
Eric Dumazet6a5dc9e2013-04-29 08:39:56 +0000948csum_error:
Eric Dumazeta16292a2016-04-27 16:44:36 -0700949 __ICMP6_INC_STATS(dev_net(dev), idev, ICMP6_MIB_CSUMERRORS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700950discard_it:
Eric Dumazeta16292a2016-04-27 16:44:36 -0700951 __ICMP6_INC_STATS(dev_net(dev), idev, ICMP6_MIB_INERRORS);
Herbert Xu8b7817f2007-12-12 10:44:43 -0800952drop_no_count:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700953 kfree_skb(skb);
954 return 0;
955}
956
David S. Miller4c9483b2011-03-12 16:22:43 -0500957void icmpv6_flow_init(struct sock *sk, struct flowi6 *fl6,
YOSHIFUJI Hideaki95e41e92007-12-06 15:43:30 -0800958 u8 type,
959 const struct in6_addr *saddr,
960 const struct in6_addr *daddr,
961 int oif)
962{
David S. Miller4c9483b2011-03-12 16:22:43 -0500963 memset(fl6, 0, sizeof(*fl6));
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000964 fl6->saddr = *saddr;
965 fl6->daddr = *daddr;
Ian Morris67ba4152014-08-24 21:53:10 +0100966 fl6->flowi6_proto = IPPROTO_ICMPV6;
David S. Miller1958b852011-03-12 16:36:19 -0500967 fl6->fl6_icmp_type = type;
968 fl6->fl6_icmp_code = 0;
David S. Miller4c9483b2011-03-12 16:22:43 -0500969 fl6->flowi6_oif = oif;
970 security_sk_classify_flow(sk, flowi6_to_flowi(fl6));
YOSHIFUJI Hideaki95e41e92007-12-06 15:43:30 -0800971}
972
Kefeng Wang3232a1e2019-02-23 15:28:27 +0800973static void __net_exit icmpv6_sk_exit(struct net *net)
974{
975 int i;
976
977 for_each_possible_cpu(i)
Kefeng Wang75efc252019-02-23 15:28:28 +0800978 inet_ctl_sock_destroy(*per_cpu_ptr(net->ipv6.icmp_sk, i));
979 free_percpu(net->ipv6.icmp_sk);
Kefeng Wang3232a1e2019-02-23 15:28:27 +0800980}
981
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -0800982static int __net_init icmpv6_sk_init(struct net *net)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700983{
984 struct sock *sk;
Kefeng Wang3232a1e2019-02-23 15:28:27 +0800985 int err, i;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700986
Kefeng Wang75efc252019-02-23 15:28:28 +0800987 net->ipv6.icmp_sk = alloc_percpu(struct sock *);
Ian Morris63159f22015-03-29 14:00:04 +0100988 if (!net->ipv6.icmp_sk)
Denis V. Lunev79c91152008-02-29 11:17:11 -0800989 return -ENOMEM;
990
KAMEZAWA Hiroyuki6f912042006-04-10 22:52:50 -0700991 for_each_possible_cpu(i) {
Denis V. Lunev1ed85162008-04-03 14:31:03 -0700992 err = inet_ctl_sock_create(&sk, PF_INET6,
993 SOCK_RAW, IPPROTO_ICMPV6, net);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700994 if (err < 0) {
Joe Perchesf3213832012-05-15 14:11:53 +0000995 pr_err("Failed to initialize the ICMP6 control socket (err %d)\n",
Linus Torvalds1da177e2005-04-16 15:20:36 -0700996 err);
997 goto fail;
998 }
999
Kefeng Wang75efc252019-02-23 15:28:28 +08001000 *per_cpu_ptr(net->ipv6.icmp_sk, i) = sk;
Denis V. Lunev5c8cafd2008-02-29 11:19:22 -08001001
Linus Torvalds1da177e2005-04-16 15:20:36 -07001002 /* Enough space for 2 64K ICMP packets, including
1003 * sk_buff struct overhead.
1004 */
Eric Dumazet87fb4b72011-10-13 07:28:54 +00001005 sk->sk_sndbuf = 2 * SKB_TRUESIZE(64 * 1024);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001006 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001007 return 0;
1008
1009 fail:
Kefeng Wang3232a1e2019-02-23 15:28:27 +08001010 icmpv6_sk_exit(net);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001011 return err;
1012}
1013
Alexey Dobriyan8ed7edc2008-03-03 12:02:54 -08001014static struct pernet_operations icmpv6_sk_ops = {
Ian Morris67ba4152014-08-24 21:53:10 +01001015 .init = icmpv6_sk_init,
1016 .exit = icmpv6_sk_exit,
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -08001017};
1018
1019int __init icmpv6_init(void)
1020{
1021 int err;
1022
1023 err = register_pernet_subsys(&icmpv6_sk_ops);
1024 if (err < 0)
1025 return err;
1026
1027 err = -EAGAIN;
1028 if (inet6_add_protocol(&icmpv6_protocol, IPPROTO_ICMPV6) < 0)
1029 goto fail;
Pravin B Shelar5f5624c2013-04-25 11:08:30 +00001030
1031 err = inet6_register_icmp_sender(icmp6_send);
1032 if (err)
1033 goto sender_reg_err;
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -08001034 return 0;
1035
Pravin B Shelar5f5624c2013-04-25 11:08:30 +00001036sender_reg_err:
1037 inet6_del_protocol(&icmpv6_protocol, IPPROTO_ICMPV6);
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -08001038fail:
Joe Perchesf3213832012-05-15 14:11:53 +00001039 pr_err("Failed to register ICMP6 protocol\n");
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -08001040 unregister_pernet_subsys(&icmpv6_sk_ops);
1041 return err;
1042}
1043
Alexey Dobriyan8ed7edc2008-03-03 12:02:54 -08001044void icmpv6_cleanup(void)
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -08001045{
Pravin B Shelar5f5624c2013-04-25 11:08:30 +00001046 inet6_unregister_icmp_sender(icmp6_send);
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -08001047 unregister_pernet_subsys(&icmpv6_sk_ops);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001048 inet6_del_protocol(&icmpv6_protocol, IPPROTO_ICMPV6);
1049}
1050
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -08001051
Arjan van de Ven9b5b5cf2005-11-29 16:21:38 -08001052static const struct icmp6_err {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001053 int err;
1054 int fatal;
1055} tab_unreach[] = {
1056 { /* NOROUTE */
1057 .err = ENETUNREACH,
1058 .fatal = 0,
1059 },
1060 { /* ADM_PROHIBITED */
1061 .err = EACCES,
1062 .fatal = 1,
1063 },
1064 { /* Was NOT_NEIGHBOUR, now reserved */
1065 .err = EHOSTUNREACH,
1066 .fatal = 0,
1067 },
1068 { /* ADDR_UNREACH */
1069 .err = EHOSTUNREACH,
1070 .fatal = 0,
1071 },
1072 { /* PORT_UNREACH */
1073 .err = ECONNREFUSED,
1074 .fatal = 1,
1075 },
Jiri Bohac61e76b12013-08-30 11:18:45 +02001076 { /* POLICY_FAIL */
1077 .err = EACCES,
1078 .fatal = 1,
1079 },
1080 { /* REJECT_ROUTE */
1081 .err = EACCES,
1082 .fatal = 1,
1083 },
Linus Torvalds1da177e2005-04-16 15:20:36 -07001084};
1085
Brian Haleyd5fdd6b2009-06-23 04:31:07 -07001086int icmpv6_err_convert(u8 type, u8 code, int *err)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001087{
1088 int fatal = 0;
1089
1090 *err = EPROTO;
1091
1092 switch (type) {
1093 case ICMPV6_DEST_UNREACH:
1094 fatal = 1;
Jiri Bohac61e76b12013-08-30 11:18:45 +02001095 if (code < ARRAY_SIZE(tab_unreach)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001096 *err = tab_unreach[code].err;
1097 fatal = tab_unreach[code].fatal;
1098 }
1099 break;
1100
1101 case ICMPV6_PKT_TOOBIG:
1102 *err = EMSGSIZE;
1103 break;
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001104
Linus Torvalds1da177e2005-04-16 15:20:36 -07001105 case ICMPV6_PARAMPROB:
1106 *err = EPROTO;
1107 fatal = 1;
1108 break;
1109
1110 case ICMPV6_TIME_EXCEED:
1111 *err = EHOSTUNREACH;
1112 break;
Stephen Hemminger3ff50b72007-04-20 17:09:22 -07001113 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001114
1115 return fatal;
1116}
YOSHIFUJI Hideaki71590392007-02-22 22:05:40 +09001117EXPORT_SYMBOL(icmpv6_err_convert);
1118
Linus Torvalds1da177e2005-04-16 15:20:36 -07001119#ifdef CONFIG_SYSCTL
stephen hemmingere8243532013-12-29 14:03:31 -08001120static struct ctl_table ipv6_icmp_table_template[] = {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001121 {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001122 .procname = "ratelimit",
Daniel Lezcano41a76902008-01-10 03:02:40 -08001123 .data = &init_net.ipv6.sysctl.icmpv6_time,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001124 .maxlen = sizeof(int),
1125 .mode = 0644,
Alexey Dobriyan6d9f2392008-11-03 18:21:05 -08001126 .proc_handler = proc_dointvec_ms_jiffies,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001127 },
Virgile Jarrye6f86b02018-08-10 17:48:15 +02001128 {
1129 .procname = "echo_ignore_all",
1130 .data = &init_net.ipv6.sysctl.icmpv6_echo_ignore_all,
1131 .maxlen = sizeof(int),
1132 .mode = 0644,
1133 .proc_handler = proc_dointvec,
1134 },
Stephen Suryaputra03f1ecc2019-03-19 12:37:12 -04001135 {
1136 .procname = "echo_ignore_multicast",
1137 .data = &init_net.ipv6.sysctl.icmpv6_echo_ignore_multicast,
1138 .maxlen = sizeof(int),
1139 .mode = 0644,
1140 .proc_handler = proc_dointvec,
1141 },
Stephen Suryaputra0b03a5c2019-03-20 10:29:27 -04001142 {
1143 .procname = "echo_ignore_anycast",
1144 .data = &init_net.ipv6.sysctl.icmpv6_echo_ignore_anycast,
1145 .maxlen = sizeof(int),
1146 .mode = 0644,
1147 .proc_handler = proc_dointvec,
1148 },
Stephen Suryaputra0bc19982019-04-17 16:35:49 -04001149 {
1150 .procname = "ratemask",
1151 .data = &init_net.ipv6.sysctl.icmpv6_ratemask_ptr,
1152 .maxlen = ICMPV6_MSG_MAX + 1,
1153 .mode = 0644,
1154 .proc_handler = proc_do_large_bitmap,
1155 },
Eric W. Biedermanf8572d82009-11-05 13:32:03 -08001156 { },
Linus Torvalds1da177e2005-04-16 15:20:36 -07001157};
Daniel Lezcano760f2d02008-01-10 02:53:43 -08001158
Alexey Dobriyan2c8c1e72010-01-17 03:35:32 +00001159struct ctl_table * __net_init ipv6_icmp_sysctl_init(struct net *net)
Daniel Lezcano760f2d02008-01-10 02:53:43 -08001160{
1161 struct ctl_table *table;
1162
1163 table = kmemdup(ipv6_icmp_table_template,
1164 sizeof(ipv6_icmp_table_template),
1165 GFP_KERNEL);
YOSHIFUJI Hideaki5ee09102008-02-28 00:24:28 +09001166
Virgile Jarrye6f86b02018-08-10 17:48:15 +02001167 if (table) {
YOSHIFUJI Hideaki5ee09102008-02-28 00:24:28 +09001168 table[0].data = &net->ipv6.sysctl.icmpv6_time;
Virgile Jarrye6f86b02018-08-10 17:48:15 +02001169 table[1].data = &net->ipv6.sysctl.icmpv6_echo_ignore_all;
Stephen Suryaputra03f1ecc2019-03-19 12:37:12 -04001170 table[2].data = &net->ipv6.sysctl.icmpv6_echo_ignore_multicast;
Stephen Suryaputra0b03a5c2019-03-20 10:29:27 -04001171 table[3].data = &net->ipv6.sysctl.icmpv6_echo_ignore_anycast;
Stephen Suryaputra0bc19982019-04-17 16:35:49 -04001172 table[4].data = &net->ipv6.sysctl.icmpv6_ratemask_ptr;
Virgile Jarrye6f86b02018-08-10 17:48:15 +02001173 }
Daniel Lezcano760f2d02008-01-10 02:53:43 -08001174 return table;
1175}
Linus Torvalds1da177e2005-04-16 15:20:36 -07001176#endif