blob: 2688f3e8216528a116f90f00d433a331ee0ae983 [file] [log] [blame]
Thomas Gleixner2874c5f2019-05-27 08:55:01 +02001// SPDX-License-Identifier: GPL-2.0-or-later
Linus Torvalds1da177e2005-04-16 15:20:36 -07002/*
3 * Internet Control Message Protocol (ICMPv6)
4 * Linux INET6 implementation
5 *
6 * Authors:
7 * Pedro Roque <roque@di.fc.ul.pt>
8 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07009 * Based on net/ipv4/icmp.c
10 *
11 * RFC 1885
Linus Torvalds1da177e2005-04-16 15:20:36 -070012 */
13
14/*
15 * Changes:
16 *
17 * Andi Kleen : exception handling
18 * Andi Kleen add rate limits. never reply to a icmp.
19 * add more length checks and other fixes.
20 * yoshfuji : ensure to sent parameter problem for
21 * fragments.
22 * YOSHIFUJI Hideaki @USAGI: added sysctl for icmp rate limit.
23 * Randy Dunlap and
24 * YOSHIFUJI Hideaki @USAGI: Per-interface statistics support
25 * Kazunori MIYAZAWA @USAGI: change output process to use ip6_append_data
26 */
27
Joe Perchesf3213832012-05-15 14:11:53 +000028#define pr_fmt(fmt) "IPv6: " fmt
29
Linus Torvalds1da177e2005-04-16 15:20:36 -070030#include <linux/module.h>
31#include <linux/errno.h>
32#include <linux/types.h>
33#include <linux/socket.h>
34#include <linux/in.h>
35#include <linux/kernel.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070036#include <linux/sockios.h>
37#include <linux/net.h>
38#include <linux/skbuff.h>
39#include <linux/init.h>
Yasuyuki Kozakai763ecff2006-02-15 15:24:15 -080040#include <linux/netfilter.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090041#include <linux/slab.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070042
43#ifdef CONFIG_SYSCTL
44#include <linux/sysctl.h>
45#endif
46
47#include <linux/inet.h>
48#include <linux/netdevice.h>
49#include <linux/icmpv6.h>
50
51#include <net/ip.h>
52#include <net/sock.h>
53
54#include <net/ipv6.h>
55#include <net/ip6_checksum.h>
Lorenzo Colitti6d0bfe22013-05-22 20:17:31 +000056#include <net/ping.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070057#include <net/protocol.h>
58#include <net/raw.h>
59#include <net/rawv6.h>
60#include <net/transp_v6.h>
61#include <net/ip6_route.h>
62#include <net/addrconf.h>
63#include <net/icmp.h>
Herbert Xu8b7817f2007-12-12 10:44:43 -080064#include <net/xfrm.h>
Denis V. Lunev1ed85162008-04-03 14:31:03 -070065#include <net/inet_common.h>
Hannes Frederic Sowa825edac2014-01-11 11:55:46 +010066#include <net/dsfield.h>
David Ahernca254492015-10-12 11:47:10 -070067#include <net/l3mdev.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070068
Linus Torvalds7c0f6ba2016-12-24 11:46:01 -080069#include <linux/uaccess.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070070
Linus Torvalds1da177e2005-04-16 15:20:36 -070071/*
72 * The ICMP socket(s). This is the most convenient way to flow control
73 * our ICMP output as well as maintain a clean interface throughout
74 * all layers. All Socketless IP sends will soon be gone.
75 *
76 * On SMP we have one ICMP socket per-cpu.
77 */
Eric Dumazet2789c142019-05-31 15:27:00 -070078static struct sock *icmpv6_sk(struct net *net)
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -080079{
Eric Dumazet2789c142019-05-31 15:27:00 -070080 return this_cpu_read(*net->ipv6.icmp_sk);
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -080081}
Linus Torvalds1da177e2005-04-16 15:20:36 -070082
Stefano Brivio32bbd872018-11-08 12:19:21 +010083static int icmpv6_err(struct sk_buff *skb, struct inet6_skb_parm *opt,
Steffen Klassert6f809da2013-01-16 22:09:49 +000084 u8 type, u8 code, int offset, __be32 info)
85{
Lorenzo Colitti6d0bfe22013-05-22 20:17:31 +000086 /* icmpv6_notify checks 8 bytes can be pulled, icmp6hdr is 8 bytes */
87 struct icmp6hdr *icmp6 = (struct icmp6hdr *) (skb->data + offset);
Steffen Klassert6f809da2013-01-16 22:09:49 +000088 struct net *net = dev_net(skb->dev);
89
90 if (type == ICMPV6_PKT_TOOBIG)
Georg Kohmann5f379ef2018-08-02 13:56:58 +020091 ip6_update_pmtu(skb, net, info, skb->dev->ifindex, 0, sock_net_uid(net, NULL));
Steffen Klassert6f809da2013-01-16 22:09:49 +000092 else if (type == NDISC_REDIRECT)
Lorenzo Colittie2d118a2016-11-04 02:23:43 +090093 ip6_redirect(skb, net, skb->dev->ifindex, 0,
94 sock_net_uid(net, NULL));
Lorenzo Colitti6d0bfe22013-05-22 20:17:31 +000095
96 if (!(type & ICMPV6_INFOMSG_MASK))
97 if (icmp6->icmp6_type == ICMPV6_ECHO_REQUEST)
Hannes Frederic Sowadcb94b82016-06-11 20:32:06 +020098 ping_err(skb, offset, ntohl(info));
Stefano Brivio32bbd872018-11-08 12:19:21 +010099
100 return 0;
Steffen Klassert6f809da2013-01-16 22:09:49 +0000101}
102
Herbert Xue5bbef22007-10-15 12:50:28 -0700103static int icmpv6_rcv(struct sk_buff *skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700104
Alexey Dobriyan41135cc2009-09-14 12:22:28 +0000105static const struct inet6_protocol icmpv6_protocol = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700106 .handler = icmpv6_rcv,
Steffen Klassert6f809da2013-01-16 22:09:49 +0000107 .err_handler = icmpv6_err,
Herbert Xu8b7817f2007-12-12 10:44:43 -0800108 .flags = INET6_PROTO_NOPOLICY|INET6_PROTO_FINAL,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700109};
110
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100111/* Called with BH disabled */
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700112static __inline__ struct sock *icmpv6_xmit_lock(struct net *net)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700113{
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700114 struct sock *sk;
115
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700116 sk = icmpv6_sk(net);
Denis V. Lunev405666d2008-02-29 11:16:46 -0800117 if (unlikely(!spin_trylock(&sk->sk_lock.slock))) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700118 /* This can happen if the output path (f.e. SIT or
119 * ip6ip6 tunnel) signals dst_link_failure() for an
120 * outgoing ICMP6 packet.
121 */
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700122 return NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700123 }
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700124 return sk;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700125}
126
Denis V. Lunev405666d2008-02-29 11:16:46 -0800127static __inline__ void icmpv6_xmit_unlock(struct sock *sk)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700128{
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100129 spin_unlock(&sk->sk_lock.slock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700130}
131
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900132/*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700133 * Figure out, may we reply to this packet with icmp error.
134 *
135 * We do not reply, if:
136 * - it was icmp error message.
137 * - it is truncated, so that it is known, that protocol is ICMPV6
138 * (i.e. in the middle of some exthdr)
139 *
140 * --ANK (980726)
141 */
142
Eric Dumazeta50feda2012-05-18 18:57:34 +0000143static bool is_ineligible(const struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700144{
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700145 int ptr = (u8 *)(ipv6_hdr(skb) + 1) - skb->data;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700146 int len = skb->len - ptr;
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700147 __u8 nexthdr = ipv6_hdr(skb)->nexthdr;
Jesse Gross75f28112011-11-30 17:05:51 -0800148 __be16 frag_off;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700149
150 if (len < 0)
Eric Dumazeta50feda2012-05-18 18:57:34 +0000151 return true;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700152
Jesse Gross75f28112011-11-30 17:05:51 -0800153 ptr = ipv6_skip_exthdr(skb, ptr, &nexthdr, &frag_off);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700154 if (ptr < 0)
Eric Dumazeta50feda2012-05-18 18:57:34 +0000155 return false;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700156 if (nexthdr == IPPROTO_ICMPV6) {
157 u8 _type, *tp;
158 tp = skb_header_pointer(skb,
159 ptr+offsetof(struct icmp6hdr, icmp6_type),
160 sizeof(_type), &_type);
Ian Morris63159f22015-03-29 14:00:04 +0100161 if (!tp || !(*tp & ICMPV6_INFOMSG_MASK))
Eric Dumazeta50feda2012-05-18 18:57:34 +0000162 return true;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700163 }
Eric Dumazeta50feda2012-05-18 18:57:34 +0000164 return false;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700165}
166
Stephen Suryaputra0bc19982019-04-17 16:35:49 -0400167static bool icmpv6_mask_allow(struct net *net, int type)
Jesper Dangaard Brouerc0303ef2017-01-09 16:04:09 +0100168{
Stephen Suryaputra0bc19982019-04-17 16:35:49 -0400169 if (type > ICMPV6_MSG_MAX)
Jesper Dangaard Brouerc0303ef2017-01-09 16:04:09 +0100170 return true;
171
Stephen Suryaputra0bc19982019-04-17 16:35:49 -0400172 /* Limit if icmp type is set in ratemask. */
173 if (!test_bit(type, net->ipv6.sysctl.icmpv6_ratemask))
Jesper Dangaard Brouerc0303ef2017-01-09 16:04:09 +0100174 return true;
175
176 return false;
177}
178
Stephen Suryaputra0bc19982019-04-17 16:35:49 -0400179static bool icmpv6_global_allow(struct net *net, int type)
Jesper Dangaard Brouerc0303ef2017-01-09 16:04:09 +0100180{
Stephen Suryaputra0bc19982019-04-17 16:35:49 -0400181 if (icmpv6_mask_allow(net, type))
Jesper Dangaard Brouerc0303ef2017-01-09 16:04:09 +0100182 return true;
183
184 if (icmp_global_allow())
185 return true;
186
187 return false;
188}
189
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900190/*
191 * Check the ICMP output rate limit
Linus Torvalds1da177e2005-04-16 15:20:36 -0700192 */
Eric Dumazet4cdf5072014-09-19 07:38:40 -0700193static bool icmpv6_xrlim_allow(struct sock *sk, u8 type,
194 struct flowi6 *fl6)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700195{
YOSHIFUJI Hideaki3b1e0a62008-03-26 02:26:21 +0900196 struct net *net = sock_net(sk);
Eric Dumazet4cdf5072014-09-19 07:38:40 -0700197 struct dst_entry *dst;
David S. Miller92d86822011-02-04 15:55:25 -0800198 bool res = false;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700199
Stephen Suryaputra0bc19982019-04-17 16:35:49 -0400200 if (icmpv6_mask_allow(net, type))
David S. Miller92d86822011-02-04 15:55:25 -0800201 return true;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700202
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900203 /*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700204 * Look up the output route.
205 * XXX: perhaps the expire for routing entries cloned by
206 * this lookup should be more aggressive (not longer than timeout).
207 */
David S. Miller4c9483b2011-03-12 16:22:43 -0500208 dst = ip6_route_output(net, sk, fl6);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700209 if (dst->error) {
Denis V. Lunev3bd653c2008-10-08 10:54:51 -0700210 IP6_INC_STATS(net, ip6_dst_idev(dst),
YOSHIFUJI Hideakia11d2062006-11-04 20:11:37 +0900211 IPSTATS_MIB_OUTNOROUTES);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700212 } else if (dst->dev && (dst->dev->flags&IFF_LOOPBACK)) {
David S. Miller92d86822011-02-04 15:55:25 -0800213 res = true;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700214 } else {
215 struct rt6_info *rt = (struct rt6_info *)dst;
Benjamin Thery9a43b702008-03-05 10:49:18 -0800216 int tmo = net->ipv6.sysctl.icmpv6_time;
Jesper Dangaard Brouerc0303ef2017-01-09 16:04:09 +0100217 struct inet_peer *peer;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700218
219 /* Give more bandwidth to wider prefixes. */
220 if (rt->rt6i_dst.plen < 128)
221 tmo >>= ((128 - rt->rt6i_dst.plen)>>5);
222
Jesper Dangaard Brouerc0303ef2017-01-09 16:04:09 +0100223 peer = inet_getpeer_v6(net->ipv6.peers, &fl6->daddr, 1);
224 res = inet_peer_xrlim_allow(peer, tmo);
225 if (peer)
226 inet_putpeer(peer);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700227 }
228 dst_release(dst);
229 return res;
230}
231
232/*
233 * an inline helper for the "simple" if statement below
234 * checks if parameter problem report is caused by an
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900235 * unrecognized IPv6 option that has the Option Type
Linus Torvalds1da177e2005-04-16 15:20:36 -0700236 * highest-order two bits set to 10
237 */
238
Eric Dumazeta50feda2012-05-18 18:57:34 +0000239static bool opt_unrec(struct sk_buff *skb, __u32 offset)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700240{
241 u8 _optval, *op;
242
Arnaldo Carvalho de Melobbe735e2007-03-10 22:16:10 -0300243 offset += skb_network_offset(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700244 op = skb_header_pointer(skb, offset, sizeof(_optval), &_optval);
Ian Morris63159f22015-03-29 14:00:04 +0100245 if (!op)
Eric Dumazeta50feda2012-05-18 18:57:34 +0000246 return true;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700247 return (*op & 0xC0) == 0x80;
248}
249
Joe Perches4e64b1e2017-10-05 23:46:14 -0700250void icmpv6_push_pending_frames(struct sock *sk, struct flowi6 *fl6,
251 struct icmp6hdr *thdr, int len)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700252{
253 struct sk_buff *skb;
254 struct icmp6hdr *icmp6h;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700255
Ian Morrise5d08d72014-11-23 21:28:43 +0000256 skb = skb_peek(&sk->sk_write_queue);
Ian Morris63159f22015-03-29 14:00:04 +0100257 if (!skb)
Joe Perches4e64b1e2017-10-05 23:46:14 -0700258 return;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700259
Arnaldo Carvalho de Melocc70ab22007-03-13 14:03:22 -0300260 icmp6h = icmp6_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700261 memcpy(icmp6h, thdr, sizeof(struct icmp6hdr));
262 icmp6h->icmp6_cksum = 0;
263
264 if (skb_queue_len(&sk->sk_write_queue) == 1) {
Joe Perches07f07572008-11-19 15:44:53 -0800265 skb->csum = csum_partial(icmp6h,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700266 sizeof(struct icmp6hdr), skb->csum);
David S. Miller4c9483b2011-03-12 16:22:43 -0500267 icmp6h->icmp6_cksum = csum_ipv6_magic(&fl6->saddr,
268 &fl6->daddr,
269 len, fl6->flowi6_proto,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700270 skb->csum);
271 } else {
Al Viro868c86b2006-11-14 21:35:48 -0800272 __wsum tmp_csum = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700273
274 skb_queue_walk(&sk->sk_write_queue, skb) {
275 tmp_csum = csum_add(tmp_csum, skb->csum);
276 }
277
Joe Perches07f07572008-11-19 15:44:53 -0800278 tmp_csum = csum_partial(icmp6h,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700279 sizeof(struct icmp6hdr), tmp_csum);
David S. Miller4c9483b2011-03-12 16:22:43 -0500280 icmp6h->icmp6_cksum = csum_ipv6_magic(&fl6->saddr,
281 &fl6->daddr,
282 len, fl6->flowi6_proto,
Al Viro868c86b2006-11-14 21:35:48 -0800283 tmp_csum);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700284 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700285 ip6_push_pending_frames(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700286}
287
288struct icmpv6_msg {
289 struct sk_buff *skb;
290 int offset;
Yasuyuki Kozakai763ecff2006-02-15 15:24:15 -0800291 uint8_t type;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700292};
293
294static int icmpv6_getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb)
295{
296 struct icmpv6_msg *msg = (struct icmpv6_msg *) from;
297 struct sk_buff *org_skb = msg->skb;
Al Viro5f92a732006-11-14 21:36:54 -0800298 __wsum csum = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700299
300 csum = skb_copy_and_csum_bits(org_skb, msg->offset + offset,
301 to, len, csum);
302 skb->csum = csum_block_add(skb->csum, csum, odd);
Yasuyuki Kozakai763ecff2006-02-15 15:24:15 -0800303 if (!(msg->type & ICMPV6_INFOMSG_MASK))
304 nf_ct_attach(skb, org_skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700305 return 0;
306}
307
Amerigo Wang07a93622012-10-29 16:23:10 +0000308#if IS_ENABLED(CONFIG_IPV6_MIP6)
Masahide NAKAMURA79383232006-08-23 19:27:25 -0700309static void mip6_addr_swap(struct sk_buff *skb)
310{
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700311 struct ipv6hdr *iph = ipv6_hdr(skb);
Masahide NAKAMURA79383232006-08-23 19:27:25 -0700312 struct inet6_skb_parm *opt = IP6CB(skb);
313 struct ipv6_destopt_hao *hao;
314 struct in6_addr tmp;
315 int off;
316
317 if (opt->dsthao) {
318 off = ipv6_find_tlv(skb, opt->dsthao, IPV6_TLV_HAO);
319 if (likely(off >= 0)) {
Arnaldo Carvalho de Melod56f90a2007-04-10 20:50:43 -0700320 hao = (struct ipv6_destopt_hao *)
321 (skb_network_header(skb) + off);
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000322 tmp = iph->saddr;
323 iph->saddr = hao->addr;
324 hao->addr = tmp;
Masahide NAKAMURA79383232006-08-23 19:27:25 -0700325 }
326 }
327}
328#else
329static inline void mip6_addr_swap(struct sk_buff *skb) {}
330#endif
331
stephen hemmingere8243532013-12-29 14:03:31 -0800332static struct dst_entry *icmpv6_route_lookup(struct net *net,
333 struct sk_buff *skb,
334 struct sock *sk,
335 struct flowi6 *fl6)
David S. Millerb42835d2011-03-01 22:06:22 -0800336{
337 struct dst_entry *dst, *dst2;
David S. Miller4c9483b2011-03-12 16:22:43 -0500338 struct flowi6 fl2;
David S. Millerb42835d2011-03-01 22:06:22 -0800339 int err;
340
Roopa Prabhu343d60a2015-07-30 13:34:53 -0700341 err = ip6_dst_lookup(net, sk, &dst, fl6);
David S. Millerb42835d2011-03-01 22:06:22 -0800342 if (err)
343 return ERR_PTR(err);
344
345 /*
346 * We won't send icmp if the destination is known
347 * anycast.
348 */
Martin KaFai Lau2647a9b2015-05-22 20:55:58 -0700349 if (ipv6_anycast_destination(dst, &fl6->daddr)) {
Joe Perchesba7a46f2014-11-11 10:59:17 -0800350 net_dbg_ratelimited("icmp6_send: acast source\n");
David S. Millerb42835d2011-03-01 22:06:22 -0800351 dst_release(dst);
352 return ERR_PTR(-EINVAL);
353 }
354
355 /* No need to clone since we're just using its address. */
356 dst2 = dst;
357
David S. Miller4c9483b2011-03-12 16:22:43 -0500358 dst = xfrm_lookup(net, dst, flowi6_to_flowi(fl6), sk, 0);
David S. Miller452edd52011-03-02 13:27:41 -0800359 if (!IS_ERR(dst)) {
David S. Millerb42835d2011-03-01 22:06:22 -0800360 if (dst != dst2)
361 return dst;
David S. Miller452edd52011-03-02 13:27:41 -0800362 } else {
363 if (PTR_ERR(dst) == -EPERM)
364 dst = NULL;
365 else
366 return dst;
David S. Millerb42835d2011-03-01 22:06:22 -0800367 }
368
David S. Miller4c9483b2011-03-12 16:22:43 -0500369 err = xfrm_decode_session_reverse(skb, flowi6_to_flowi(&fl2), AF_INET6);
David S. Millerb42835d2011-03-01 22:06:22 -0800370 if (err)
371 goto relookup_failed;
372
Roopa Prabhu343d60a2015-07-30 13:34:53 -0700373 err = ip6_dst_lookup(net, sk, &dst2, &fl2);
David S. Millerb42835d2011-03-01 22:06:22 -0800374 if (err)
375 goto relookup_failed;
376
David S. Miller4c9483b2011-03-12 16:22:43 -0500377 dst2 = xfrm_lookup(net, dst2, flowi6_to_flowi(&fl2), sk, XFRM_LOOKUP_ICMP);
David S. Miller452edd52011-03-02 13:27:41 -0800378 if (!IS_ERR(dst2)) {
David S. Millerb42835d2011-03-01 22:06:22 -0800379 dst_release(dst);
380 dst = dst2;
David S. Miller452edd52011-03-02 13:27:41 -0800381 } else {
382 err = PTR_ERR(dst2);
383 if (err == -EPERM) {
384 dst_release(dst);
385 return dst2;
386 } else
387 goto relookup_failed;
David S. Millerb42835d2011-03-01 22:06:22 -0800388 }
389
390relookup_failed:
391 if (dst)
392 return dst;
393 return ERR_PTR(err);
394}
395
Stephen Suryaputrae1ae5c22019-06-10 10:32:50 -0400396static struct net_device *icmp6_dev(const struct sk_buff *skb)
David Ahern1b70d7922017-08-28 13:53:34 -0700397{
Stephen Suryaputrae1ae5c22019-06-10 10:32:50 -0400398 struct net_device *dev = skb->dev;
David Ahern1b70d7922017-08-28 13:53:34 -0700399
400 /* for local traffic to local address, skb dev is the loopback
401 * device. Check if there is a dst attached to the skb and if so
David Ahern24b711e2018-07-19 12:41:18 -0700402 * get the real device index. Same is needed for replies to a link
403 * local address on a device enslaved to an L3 master device
David Ahern1b70d7922017-08-28 13:53:34 -0700404 */
Stephen Suryaputrae1ae5c22019-06-10 10:32:50 -0400405 if (unlikely(dev->ifindex == LOOPBACK_IFINDEX || netif_is_l3_master(skb->dev))) {
David Ahern1b70d7922017-08-28 13:53:34 -0700406 const struct rt6_info *rt6 = skb_rt6_info(skb);
407
408 if (rt6)
Stephen Suryaputrae1ae5c22019-06-10 10:32:50 -0400409 dev = rt6->rt6i_idev->dev;
David Ahern1b70d7922017-08-28 13:53:34 -0700410 }
411
Stephen Suryaputrae1ae5c22019-06-10 10:32:50 -0400412 return dev;
413}
414
415static int icmp6_iif(const struct sk_buff *skb)
416{
417 return icmp6_dev(skb)->ifindex;
David Ahern1b70d7922017-08-28 13:53:34 -0700418}
419
Linus Torvalds1da177e2005-04-16 15:20:36 -0700420/*
421 * Send an ICMP message in response to a packet in error
422 */
Eric Dumazetb1cadc12016-06-18 21:52:02 -0700423static void icmp6_send(struct sk_buff *skb, u8 type, u8 code, __u32 info,
424 const struct in6_addr *force_saddr)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700425{
426 struct inet6_dev *idev = NULL;
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700427 struct ipv6hdr *hdr = ipv6_hdr(skb);
YOSHIFUJI Hideaki84427d52005-06-13 14:59:44 -0700428 struct sock *sk;
Eric Dumazet8d933672019-01-04 11:00:00 -0800429 struct net *net;
YOSHIFUJI Hideaki84427d52005-06-13 14:59:44 -0700430 struct ipv6_pinfo *np;
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000431 const struct in6_addr *saddr = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700432 struct dst_entry *dst;
433 struct icmp6hdr tmp_hdr;
David S. Miller4c9483b2011-03-12 16:22:43 -0500434 struct flowi6 fl6;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700435 struct icmpv6_msg msg;
Wei Wang26879da2016-05-02 21:40:07 -0700436 struct ipcm6_cookie ipc6;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700437 int iif = 0;
438 int addr_type = 0;
439 int len;
Eric Dumazet8d933672019-01-04 11:00:00 -0800440 u32 mark;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700441
Arnaldo Carvalho de Melo27a884d2007-04-19 20:29:13 -0700442 if ((u8 *)hdr < skb->head ||
Simon Horman29a3cad2013-05-28 20:34:26 +0000443 (skb_network_header(skb) + sizeof(*hdr)) > skb_tail_pointer(skb))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700444 return;
445
Eric Dumazet8d933672019-01-04 11:00:00 -0800446 if (!skb->dev)
447 return;
448 net = dev_net(skb->dev);
449 mark = IP6_REPLY_MARK(net, skb->mark);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700450 /*
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900451 * Make sure we respect the rules
Linus Torvalds1da177e2005-04-16 15:20:36 -0700452 * i.e. RFC 1885 2.4(e)
Pravin B Shelar5f5624c2013-04-25 11:08:30 +0000453 * Rule (e.1) is enforced by not using icmp6_send
Linus Torvalds1da177e2005-04-16 15:20:36 -0700454 * in any code that processes icmp errors.
455 */
456 addr_type = ipv6_addr_type(&hdr->daddr);
457
FX Le Bail446fab52014-01-19 17:00:36 +0100458 if (ipv6_chk_addr(net, &hdr->daddr, skb->dev, 0) ||
FX Le Baild94c1f92014-02-07 11:22:37 +0100459 ipv6_chk_acast_addr_src(net, skb->dev, &hdr->daddr))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700460 saddr = &hdr->daddr;
461
462 /*
463 * Dest addr check
464 */
465
zhuyj9a6b4b32015-01-14 17:23:59 +0800466 if (addr_type & IPV6_ADDR_MULTICAST || skb->pkt_type != PACKET_HOST) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700467 if (type != ICMPV6_PKT_TOOBIG &&
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900468 !(type == ICMPV6_PARAMPROB &&
469 code == ICMPV6_UNK_OPTION &&
Linus Torvalds1da177e2005-04-16 15:20:36 -0700470 (opt_unrec(skb, info))))
471 return;
472
473 saddr = NULL;
474 }
475
476 addr_type = ipv6_addr_type(&hdr->saddr);
477
478 /*
479 * Source addr check
480 */
481
David Ahern4832c302017-08-17 12:17:20 -0700482 if (__ipv6_addr_needs_scope_id(addr_type)) {
David Ahern1b70d7922017-08-28 13:53:34 -0700483 iif = icmp6_iif(skb);
David Ahern4832c302017-08-17 12:17:20 -0700484 } else {
David Ahern79dc7e32016-11-27 18:52:53 -0800485 dst = skb_dst(skb);
486 iif = l3mdev_master_ifindex(dst ? dst->dev : skb->dev);
487 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700488
489 /*
YOSHIFUJI Hideaki8de33512005-12-21 22:57:06 +0900490 * Must not send error if the source does not uniquely
491 * identify a single node (RFC2463 Section 2.4).
492 * We check unspecified / multicast addresses here,
493 * and anycast addresses will be checked later.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700494 */
495 if ((addr_type == IPV6_ADDR_ANY) || (addr_type & IPV6_ADDR_MULTICAST)) {
Bjørn Mork4b3418f2015-10-24 14:00:20 +0200496 net_dbg_ratelimited("icmp6_send: addr_any/mcast source [%pI6c > %pI6c]\n",
497 &hdr->saddr, &hdr->daddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700498 return;
499 }
500
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900501 /*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700502 * Never answer to a ICMP packet.
503 */
504 if (is_ineligible(skb)) {
Bjørn Mork4b3418f2015-10-24 14:00:20 +0200505 net_dbg_ratelimited("icmp6_send: no reply to icmp error [%pI6c > %pI6c]\n",
506 &hdr->saddr, &hdr->daddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700507 return;
508 }
509
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100510 /* Needed by both icmp_global_allow and icmpv6_xmit_lock */
511 local_bh_disable();
512
513 /* Check global sysctl_icmp_msgs_per_sec ratelimit */
Stephen Suryaputra0bc19982019-04-17 16:35:49 -0400514 if (!(skb->dev->flags & IFF_LOOPBACK) && !icmpv6_global_allow(net, type))
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100515 goto out_bh_enable;
516
Masahide NAKAMURA79383232006-08-23 19:27:25 -0700517 mip6_addr_swap(skb);
518
Francesco Ruggerifac6fce2019-10-30 17:40:02 -0700519 sk = icmpv6_xmit_lock(net);
520 if (!sk)
521 goto out_bh_enable;
522
David S. Miller4c9483b2011-03-12 16:22:43 -0500523 memset(&fl6, 0, sizeof(fl6));
524 fl6.flowi6_proto = IPPROTO_ICMPV6;
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000525 fl6.daddr = hdr->saddr;
Eric Dumazetb1cadc12016-06-18 21:52:02 -0700526 if (force_saddr)
527 saddr = force_saddr;
Francesco Ruggerifac6fce2019-10-30 17:40:02 -0700528 if (saddr) {
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000529 fl6.saddr = *saddr;
Francesco Ruggerifac6fce2019-10-30 17:40:02 -0700530 } else {
531 /* select a more meaningful saddr from input if */
532 struct net_device *in_netdev;
533
534 in_netdev = dev_get_by_index(net, IP6CB(skb)->iif);
535 if (in_netdev) {
536 ipv6_dev_get_saddr(net, in_netdev, &fl6.daddr,
537 inet6_sk(sk)->srcprefs,
538 &fl6.saddr);
539 dev_put(in_netdev);
540 }
541 }
Lorenzo Colittie1108612014-05-13 10:17:33 -0700542 fl6.flowi6_mark = mark;
David S. Miller4c9483b2011-03-12 16:22:43 -0500543 fl6.flowi6_oif = iif;
David S. Miller1958b852011-03-12 16:36:19 -0500544 fl6.fl6_icmp_type = type;
545 fl6.fl6_icmp_code = code;
Lorenzo Colittie2d118a2016-11-04 02:23:43 +0900546 fl6.flowi6_uid = sock_net_uid(net, NULL);
David Ahernb4bac172018-03-02 08:32:18 -0800547 fl6.mp_hash = rt6_multipath_hash(net, &fl6, skb, NULL);
David S. Miller4c9483b2011-03-12 16:22:43 -0500548 security_skb_classify_flow(skb, flowi6_to_flowi(&fl6));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700549
Lorenzo Colittie1108612014-05-13 10:17:33 -0700550 sk->sk_mark = mark;
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700551 np = inet6_sk(sk);
Denis V. Lunev405666d2008-02-29 11:16:46 -0800552
David S. Miller4c9483b2011-03-12 16:22:43 -0500553 if (!icmpv6_xrlim_allow(sk, type, &fl6))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700554 goto out;
555
556 tmp_hdr.icmp6_type = type;
557 tmp_hdr.icmp6_code = code;
558 tmp_hdr.icmp6_cksum = 0;
559 tmp_hdr.icmp6_pointer = htonl(info);
560
David S. Miller4c9483b2011-03-12 16:22:43 -0500561 if (!fl6.flowi6_oif && ipv6_addr_is_multicast(&fl6.daddr))
562 fl6.flowi6_oif = np->mcast_oif;
Erich E. Hooverc4062df2012-02-08 09:11:08 +0000563 else if (!fl6.flowi6_oif)
564 fl6.flowi6_oif = np->ucast_oif;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700565
Willem de Bruijnb515430a2018-07-06 10:12:55 -0400566 ipcm6_init_sk(&ipc6, np);
Hannes Frederic Sowa38b70972016-06-11 20:08:19 +0200567 fl6.flowlabel = ip6_make_flowinfo(ipc6.tclass, fl6.flowlabel);
568
David S. Miller4c9483b2011-03-12 16:22:43 -0500569 dst = icmpv6_route_lookup(net, skb, sk, &fl6);
David S. Millerb42835d2011-03-01 22:06:22 -0800570 if (IS_ERR(dst))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700571 goto out;
YOSHIFUJI Hideaki8de33512005-12-21 22:57:06 +0900572
Wei Wang26879da2016-05-02 21:40:07 -0700573 ipc6.hlimit = ip6_sk_dst_hoplimit(np, &fl6, dst);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700574
575 msg.skb = skb;
Arnaldo Carvalho de Melobbe735e2007-03-10 22:16:10 -0300576 msg.offset = skb_network_offset(skb);
Yasuyuki Kozakai763ecff2006-02-15 15:24:15 -0800577 msg.type = type;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700578
579 len = skb->len - msg.offset;
Ian Morris67ba4152014-08-24 21:53:10 +0100580 len = min_t(unsigned int, len, IPV6_MIN_MTU - sizeof(struct ipv6hdr) - sizeof(struct icmp6hdr));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700581 if (len < 0) {
Bjørn Mork4b3418f2015-10-24 14:00:20 +0200582 net_dbg_ratelimited("icmp: len problem [%pI6c > %pI6c]\n",
583 &hdr->saddr, &hdr->daddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700584 goto out_dst_release;
585 }
586
Eric Dumazetcfdf7642011-07-27 21:13:03 +0000587 rcu_read_lock();
588 idev = __in6_dev_get(skb->dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700589
Joe Perches4e64b1e2017-10-05 23:46:14 -0700590 if (ip6_append_data(sk, icmpv6_getfrag, &msg,
591 len + sizeof(struct icmp6hdr),
592 sizeof(struct icmp6hdr),
593 &ipc6, &fl6, (struct rt6_info *)dst,
Willem de Bruijn5fdaa882018-07-06 10:12:57 -0400594 MSG_DONTWAIT)) {
Hannes Frederic Sowa43a43b62014-03-31 20:14:10 +0200595 ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTERRORS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700596 ip6_flush_pending_frames(sk);
Eric Dumazetcfdf7642011-07-27 21:13:03 +0000597 } else {
Joe Perches4e64b1e2017-10-05 23:46:14 -0700598 icmpv6_push_pending_frames(sk, &fl6, &tmp_hdr,
599 len + sizeof(struct icmp6hdr));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700600 }
Eric Dumazetcfdf7642011-07-27 21:13:03 +0000601 rcu_read_unlock();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700602out_dst_release:
603 dst_release(dst);
604out:
Denis V. Lunev405666d2008-02-29 11:16:46 -0800605 icmpv6_xmit_unlock(sk);
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100606out_bh_enable:
607 local_bh_enable();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700608}
Pravin B Shelar5f5624c2013-04-25 11:08:30 +0000609
610/* Slightly more convenient version of icmp6_send.
611 */
612void icmpv6_param_prob(struct sk_buff *skb, u8 code, int pos)
613{
Eric Dumazetb1cadc12016-06-18 21:52:02 -0700614 icmp6_send(skb, ICMPV6_PARAMPROB, code, pos, NULL);
Pravin B Shelar5f5624c2013-04-25 11:08:30 +0000615 kfree_skb(skb);
616}
YOSHIFUJI Hideaki71590392007-02-22 22:05:40 +0900617
Eric Dumazet5fbba8a2016-06-18 21:52:03 -0700618/* Generate icmpv6 with type/code ICMPV6_DEST_UNREACH/ICMPV6_ADDR_UNREACH
619 * if sufficient data bytes are available
620 * @nhs is the size of the tunnel header(s) :
621 * Either an IPv4 header for SIT encap
622 * an IPv4 header + GRE header for GRE encap
623 */
Eric Dumazet20e19542016-06-18 21:52:06 -0700624int ip6_err_gen_icmpv6_unreach(struct sk_buff *skb, int nhs, int type,
625 unsigned int data_len)
Eric Dumazet5fbba8a2016-06-18 21:52:03 -0700626{
Eric Dumazet2d7a3b22016-06-18 21:52:04 -0700627 struct in6_addr temp_saddr;
Eric Dumazet5fbba8a2016-06-18 21:52:03 -0700628 struct rt6_info *rt;
629 struct sk_buff *skb2;
Eric Dumazet20e19542016-06-18 21:52:06 -0700630 u32 info = 0;
Eric Dumazet5fbba8a2016-06-18 21:52:03 -0700631
632 if (!pskb_may_pull(skb, nhs + sizeof(struct ipv6hdr) + 8))
633 return 1;
634
Eric Dumazet20e19542016-06-18 21:52:06 -0700635 /* RFC 4884 (partial) support for ICMP extensions */
636 if (data_len < 128 || (data_len & 7) || skb->len < data_len)
637 data_len = 0;
638
639 skb2 = data_len ? skb_copy(skb, GFP_ATOMIC) : skb_clone(skb, GFP_ATOMIC);
Eric Dumazet5fbba8a2016-06-18 21:52:03 -0700640
641 if (!skb2)
642 return 1;
643
644 skb_dst_drop(skb2);
645 skb_pull(skb2, nhs);
646 skb_reset_network_header(skb2);
647
David Ahernb75cc8f2018-03-02 08:32:17 -0800648 rt = rt6_lookup(dev_net(skb->dev), &ipv6_hdr(skb2)->saddr, NULL, 0,
649 skb, 0);
Eric Dumazet5fbba8a2016-06-18 21:52:03 -0700650
651 if (rt && rt->dst.dev)
652 skb2->dev = rt->dst.dev;
653
Eric Dumazet2d7a3b22016-06-18 21:52:04 -0700654 ipv6_addr_set_v4mapped(ip_hdr(skb)->saddr, &temp_saddr);
Eric Dumazet20e19542016-06-18 21:52:06 -0700655
656 if (data_len) {
657 /* RFC 4884 (partial) support :
658 * insert 0 padding at the end, before the extensions
659 */
660 __skb_push(skb2, nhs);
661 skb_reset_network_header(skb2);
662 memmove(skb2->data, skb2->data + nhs, data_len - nhs);
663 memset(skb2->data + data_len - nhs, 0, nhs);
664 /* RFC 4884 4.5 : Length is measured in 64-bit words,
665 * and stored in reserved[0]
666 */
667 info = (data_len/8) << 24;
668 }
Eric Dumazet2d7a3b22016-06-18 21:52:04 -0700669 if (type == ICMP_TIME_EXCEEDED)
670 icmp6_send(skb2, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT,
Eric Dumazet20e19542016-06-18 21:52:06 -0700671 info, &temp_saddr);
Eric Dumazet2d7a3b22016-06-18 21:52:04 -0700672 else
673 icmp6_send(skb2, ICMPV6_DEST_UNREACH, ICMPV6_ADDR_UNREACH,
Eric Dumazet20e19542016-06-18 21:52:06 -0700674 info, &temp_saddr);
Eric Dumazet5fbba8a2016-06-18 21:52:03 -0700675 if (rt)
676 ip6_rt_put(rt);
677
678 kfree_skb(skb2);
679
680 return 0;
681}
682EXPORT_SYMBOL(ip6_err_gen_icmpv6_unreach);
683
Linus Torvalds1da177e2005-04-16 15:20:36 -0700684static void icmpv6_echo_reply(struct sk_buff *skb)
685{
YOSHIFUJI Hideakic346dca2008-03-25 21:47:49 +0900686 struct net *net = dev_net(skb->dev);
YOSHIFUJI Hideaki84427d52005-06-13 14:59:44 -0700687 struct sock *sk;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700688 struct inet6_dev *idev;
YOSHIFUJI Hideaki84427d52005-06-13 14:59:44 -0700689 struct ipv6_pinfo *np;
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000690 const struct in6_addr *saddr = NULL;
Arnaldo Carvalho de Melocc70ab22007-03-13 14:03:22 -0300691 struct icmp6hdr *icmph = icmp6_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700692 struct icmp6hdr tmp_hdr;
David S. Miller4c9483b2011-03-12 16:22:43 -0500693 struct flowi6 fl6;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700694 struct icmpv6_msg msg;
695 struct dst_entry *dst;
Wei Wang26879da2016-05-02 21:40:07 -0700696 struct ipcm6_cookie ipc6;
Lorenzo Colittie1108612014-05-13 10:17:33 -0700697 u32 mark = IP6_REPLY_MARK(net, skb->mark);
Stephen Suryaputra0b03a5c2019-03-20 10:29:27 -0400698 bool acast;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700699
Stephen Suryaputra03f1ecc2019-03-19 12:37:12 -0400700 if (ipv6_addr_is_multicast(&ipv6_hdr(skb)->daddr) &&
701 net->ipv6.sysctl.icmpv6_echo_ignore_multicast)
702 return;
703
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700704 saddr = &ipv6_hdr(skb)->daddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700705
Stephen Suryaputra0b03a5c2019-03-20 10:29:27 -0400706 acast = ipv6_anycast_destination(skb_dst(skb), saddr);
707 if (acast && net->ipv6.sysctl.icmpv6_echo_ignore_anycast)
708 return;
709
FX Le Bail509aba32014-01-07 14:57:27 +0100710 if (!ipv6_unicast_destination(skb) &&
Stephen Suryaputra0b03a5c2019-03-20 10:29:27 -0400711 !(net->ipv6.sysctl.anycast_src_echo_reply && acast))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700712 saddr = NULL;
713
714 memcpy(&tmp_hdr, icmph, sizeof(tmp_hdr));
715 tmp_hdr.icmp6_type = ICMPV6_ECHO_REPLY;
716
David S. Miller4c9483b2011-03-12 16:22:43 -0500717 memset(&fl6, 0, sizeof(fl6));
Eric Dumazeta346abe2019-07-01 06:39:36 -0700718 if (net->ipv6.sysctl.flowlabel_reflect & FLOWLABEL_REFLECT_ICMPV6_ECHO_REPLIES)
719 fl6.flowlabel = ip6_flowlabel(ipv6_hdr(skb));
720
David S. Miller4c9483b2011-03-12 16:22:43 -0500721 fl6.flowi6_proto = IPPROTO_ICMPV6;
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000722 fl6.daddr = ipv6_hdr(skb)->saddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700723 if (saddr)
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000724 fl6.saddr = *saddr;
David Ahern1b70d7922017-08-28 13:53:34 -0700725 fl6.flowi6_oif = icmp6_iif(skb);
David S. Miller1958b852011-03-12 16:36:19 -0500726 fl6.fl6_icmp_type = ICMPV6_ECHO_REPLY;
Lorenzo Colittie1108612014-05-13 10:17:33 -0700727 fl6.flowi6_mark = mark;
Lorenzo Colittie2d118a2016-11-04 02:23:43 +0900728 fl6.flowi6_uid = sock_net_uid(net, NULL);
David S. Miller4c9483b2011-03-12 16:22:43 -0500729 security_skb_classify_flow(skb, flowi6_to_flowi(&fl6));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700730
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100731 local_bh_disable();
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700732 sk = icmpv6_xmit_lock(net);
Ian Morris63159f22015-03-29 14:00:04 +0100733 if (!sk)
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100734 goto out_bh_enable;
Lorenzo Colittie1108612014-05-13 10:17:33 -0700735 sk->sk_mark = mark;
Denis V. Lunevfdc0bde2008-08-23 04:43:33 -0700736 np = inet6_sk(sk);
Denis V. Lunev405666d2008-02-29 11:16:46 -0800737
David S. Miller4c9483b2011-03-12 16:22:43 -0500738 if (!fl6.flowi6_oif && ipv6_addr_is_multicast(&fl6.daddr))
739 fl6.flowi6_oif = np->mcast_oif;
Erich E. Hooverc4062df2012-02-08 09:11:08 +0000740 else if (!fl6.flowi6_oif)
741 fl6.flowi6_oif = np->ucast_oif;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700742
Joe Perches4e64b1e2017-10-05 23:46:14 -0700743 if (ip6_dst_lookup(net, sk, &dst, &fl6))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700744 goto out;
David S. Miller4c9483b2011-03-12 16:22:43 -0500745 dst = xfrm_lookup(net, dst, flowi6_to_flowi(&fl6), sk, 0);
David S. Miller452edd52011-03-02 13:27:41 -0800746 if (IS_ERR(dst))
Patrick McHardye104411b2005-09-08 15:11:55 -0700747 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700748
Stephen Suryaputra0bc19982019-04-17 16:35:49 -0400749 /* Check the ratelimit */
750 if ((!(skb->dev->flags & IFF_LOOPBACK) && !icmpv6_global_allow(net, ICMPV6_ECHO_REPLY)) ||
751 !icmpv6_xrlim_allow(sk, ICMPV6_ECHO_REPLY, &fl6))
752 goto out_dst_release;
753
Eric Dumazetcfdf7642011-07-27 21:13:03 +0000754 idev = __in6_dev_get(skb->dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700755
756 msg.skb = skb;
757 msg.offset = 0;
Yasuyuki Kozakai763ecff2006-02-15 15:24:15 -0800758 msg.type = ICMPV6_ECHO_REPLY;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700759
Willem de Bruijnb515430a2018-07-06 10:12:55 -0400760 ipcm6_init_sk(&ipc6, np);
Wei Wang26879da2016-05-02 21:40:07 -0700761 ipc6.hlimit = ip6_sk_dst_hoplimit(np, &fl6, dst);
762 ipc6.tclass = ipv6_get_dsfield(ipv6_hdr(skb));
Wei Wang26879da2016-05-02 21:40:07 -0700763
Joe Perches4e64b1e2017-10-05 23:46:14 -0700764 if (ip6_append_data(sk, icmpv6_getfrag, &msg,
765 skb->len + sizeof(struct icmp6hdr),
766 sizeof(struct icmp6hdr), &ipc6, &fl6,
Willem de Bruijn5fdaa882018-07-06 10:12:57 -0400767 (struct rt6_info *)dst, MSG_DONTWAIT)) {
Eric Dumazeta16292a2016-04-27 16:44:36 -0700768 __ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTERRORS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700769 ip6_flush_pending_frames(sk);
Eric Dumazetcfdf7642011-07-27 21:13:03 +0000770 } else {
Joe Perches4e64b1e2017-10-05 23:46:14 -0700771 icmpv6_push_pending_frames(sk, &fl6, &tmp_hdr,
772 skb->len + sizeof(struct icmp6hdr));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700773 }
Stephen Suryaputra0bc19982019-04-17 16:35:49 -0400774out_dst_release:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700775 dst_release(dst);
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900776out:
Denis V. Lunev405666d2008-02-29 11:16:46 -0800777 icmpv6_xmit_unlock(sk);
Jesper Dangaard Brouer7ba91ec2017-01-09 16:04:14 +0100778out_bh_enable:
779 local_bh_enable();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700780}
781
David S. Millerb94f1c02012-07-12 00:33:37 -0700782void icmpv6_notify(struct sk_buff *skb, u8 type, u8 code, __be32 info)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700783{
Alexey Dobriyan41135cc2009-09-14 12:22:28 +0000784 const struct inet6_protocol *ipprot;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700785 int inner_offset;
Jesse Gross75f28112011-11-30 17:05:51 -0800786 __be16 frag_off;
David S. Millerf9242b62012-06-19 18:56:21 -0700787 u8 nexthdr;
Duan Jiong7304fe42014-07-31 17:54:32 +0800788 struct net *net = dev_net(skb->dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700789
790 if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
Duan Jiong7304fe42014-07-31 17:54:32 +0800791 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700792
793 nexthdr = ((struct ipv6hdr *)skb->data)->nexthdr;
794 if (ipv6_ext_hdr(nexthdr)) {
795 /* now skip over extension headers */
Jesse Gross75f28112011-11-30 17:05:51 -0800796 inner_offset = ipv6_skip_exthdr(skb, sizeof(struct ipv6hdr),
797 &nexthdr, &frag_off);
Ian Morris67ba4152014-08-24 21:53:10 +0100798 if (inner_offset < 0)
Duan Jiong7304fe42014-07-31 17:54:32 +0800799 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700800 } else {
801 inner_offset = sizeof(struct ipv6hdr);
802 }
803
804 /* Checkin header including 8 bytes of inner protocol header. */
805 if (!pskb_may_pull(skb, inner_offset+8))
Duan Jiong7304fe42014-07-31 17:54:32 +0800806 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700807
Linus Torvalds1da177e2005-04-16 15:20:36 -0700808 /* BUGGG_FUTURE: we should try to parse exthdrs in this packet.
809 Without this we will not able f.e. to make source routed
810 pmtu discovery.
811 Corresponding argument (opt) to notifiers is already added.
812 --ANK (980726)
813 */
814
David S. Millerf9242b62012-06-19 18:56:21 -0700815 ipprot = rcu_dereference(inet6_protos[nexthdr]);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700816 if (ipprot && ipprot->err_handler)
817 ipprot->err_handler(skb, NULL, type, code, inner_offset, info);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700818
Pavel Emelyanov69d6da02007-11-19 22:35:57 -0800819 raw6_icmp_error(skb, nexthdr, type, code, inner_offset, info);
Duan Jiong7304fe42014-07-31 17:54:32 +0800820 return;
821
822out:
Eric Dumazeta16292a2016-04-27 16:44:36 -0700823 __ICMP6_INC_STATS(net, __in6_dev_get(skb->dev), ICMP6_MIB_INERRORS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700824}
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900825
Linus Torvalds1da177e2005-04-16 15:20:36 -0700826/*
827 * Handle icmp messages
828 */
829
Herbert Xue5bbef22007-10-15 12:50:28 -0700830static int icmpv6_rcv(struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700831{
Virgile Jarrye6f86b02018-08-10 17:48:15 +0200832 struct net *net = dev_net(skb->dev);
Stephen Suryaputrae1ae5c22019-06-10 10:32:50 -0400833 struct net_device *dev = icmp6_dev(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700834 struct inet6_dev *idev = __in6_dev_get(dev);
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000835 const struct in6_addr *saddr, *daddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700836 struct icmp6hdr *hdr;
Brian Haleyd5fdd6b2009-06-23 04:31:07 -0700837 u8 type;
Rick Jonese3e32172014-11-17 14:04:29 -0800838 bool success = false;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700839
Herbert Xuaebcf822007-12-12 18:54:16 -0800840 if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb)) {
Alexey Dobriyandef8b4f2008-10-28 13:24:06 -0700841 struct sec_path *sp = skb_sec_path(skb);
Herbert Xu8b7817f2007-12-12 10:44:43 -0800842 int nh;
843
Alexey Dobriyandef8b4f2008-10-28 13:24:06 -0700844 if (!(sp && sp->xvec[sp->len - 1]->props.flags &
Herbert Xuaebcf822007-12-12 18:54:16 -0800845 XFRM_STATE_ICMP))
846 goto drop_no_count;
847
David S. Miller81aded22012-06-15 14:54:11 -0700848 if (!pskb_may_pull(skb, sizeof(*hdr) + sizeof(struct ipv6hdr)))
Herbert Xu8b7817f2007-12-12 10:44:43 -0800849 goto drop_no_count;
850
851 nh = skb_network_offset(skb);
852 skb_set_network_header(skb, sizeof(*hdr));
853
854 if (!xfrm6_policy_check_reverse(NULL, XFRM_POLICY_IN, skb))
855 goto drop_no_count;
856
857 skb_set_network_header(skb, nh);
858 }
859
Eric Dumazeta16292a2016-04-27 16:44:36 -0700860 __ICMP6_INC_STATS(dev_net(dev), idev, ICMP6_MIB_INMSGS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700861
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700862 saddr = &ipv6_hdr(skb)->saddr;
863 daddr = &ipv6_hdr(skb)->daddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700864
Tom Herbert39471ac2014-05-07 16:52:29 -0700865 if (skb_checksum_validate(skb, IPPROTO_ICMPV6, ip6_compute_pseudo)) {
Joe Perchesba7a46f2014-11-11 10:59:17 -0800866 net_dbg_ratelimited("ICMPv6 checksum failed [%pI6c > %pI6c]\n",
867 saddr, daddr);
Tom Herbert39471ac2014-05-07 16:52:29 -0700868 goto csum_error;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700869 }
870
Herbert Xu8cf22942008-02-05 03:15:50 -0800871 if (!pskb_pull(skb, sizeof(*hdr)))
872 goto discard_it;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700873
Arnaldo Carvalho de Melocc70ab22007-03-13 14:03:22 -0300874 hdr = icmp6_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700875
876 type = hdr->icmp6_type;
877
Eric Dumazetf3832ed2016-04-27 16:44:42 -0700878 ICMP6MSGIN_INC_STATS(dev_net(dev), idev, type);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700879
880 switch (type) {
881 case ICMPV6_ECHO_REQUEST:
Virgile Jarrye6f86b02018-08-10 17:48:15 +0200882 if (!net->ipv6.sysctl.icmpv6_echo_ignore_all)
883 icmpv6_echo_reply(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700884 break;
885
886 case ICMPV6_ECHO_REPLY:
Rick Jonese3e32172014-11-17 14:04:29 -0800887 success = ping_rcv(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700888 break;
889
890 case ICMPV6_PKT_TOOBIG:
891 /* BUGGG_FUTURE: if packet contains rthdr, we cannot update
892 standard destination cache. Seems, only "advanced"
893 destination cache will allow to solve this problem
894 --ANK (980726)
895 */
896 if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
897 goto discard_it;
Arnaldo Carvalho de Melocc70ab22007-03-13 14:03:22 -0300898 hdr = icmp6_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700899
Gustavo A. R. Silva275757e62017-10-16 16:36:52 -0500900 /* to notify */
Joe Perchesa8eceea2020-03-12 15:50:22 -0700901 fallthrough;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700902 case ICMPV6_DEST_UNREACH:
903 case ICMPV6_TIME_EXCEED:
904 case ICMPV6_PARAMPROB:
905 icmpv6_notify(skb, type, hdr->icmp6_code, hdr->icmp6_mtu);
906 break;
907
908 case NDISC_ROUTER_SOLICITATION:
909 case NDISC_ROUTER_ADVERTISEMENT:
910 case NDISC_NEIGHBOUR_SOLICITATION:
911 case NDISC_NEIGHBOUR_ADVERTISEMENT:
912 case NDISC_REDIRECT:
913 ndisc_rcv(skb);
914 break;
915
916 case ICMPV6_MGM_QUERY:
917 igmp6_event_query(skb);
918 break;
919
920 case ICMPV6_MGM_REPORT:
921 igmp6_event_report(skb);
922 break;
923
924 case ICMPV6_MGM_REDUCTION:
925 case ICMPV6_NI_QUERY:
926 case ICMPV6_NI_REPLY:
927 case ICMPV6_MLD2_REPORT:
928 case ICMPV6_DHAAD_REQUEST:
929 case ICMPV6_DHAAD_REPLY:
930 case ICMPV6_MOBILE_PREFIX_SOL:
931 case ICMPV6_MOBILE_PREFIX_ADV:
932 break;
933
934 default:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700935 /* informational */
936 if (type & ICMPV6_INFOMSG_MASK)
937 break;
938
Bjørn Mork4b3418f2015-10-24 14:00:20 +0200939 net_dbg_ratelimited("icmpv6: msg of unknown type [%pI6c > %pI6c]\n",
940 saddr, daddr);
David S. Millerea85a0a2014-10-07 16:33:53 -0400941
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900942 /*
943 * error of unknown type.
944 * must pass to upper level
Linus Torvalds1da177e2005-04-16 15:20:36 -0700945 */
946
947 icmpv6_notify(skb, type, hdr->icmp6_code, hdr->icmp6_mtu);
Stephen Hemminger3ff50b72007-04-20 17:09:22 -0700948 }
949
Rick Jonese3e32172014-11-17 14:04:29 -0800950 /* until the v6 path can be better sorted assume failure and
951 * preserve the status quo behaviour for the rest of the paths to here
952 */
953 if (success)
954 consume_skb(skb);
955 else
956 kfree_skb(skb);
957
Linus Torvalds1da177e2005-04-16 15:20:36 -0700958 return 0;
959
Eric Dumazet6a5dc9e2013-04-29 08:39:56 +0000960csum_error:
Eric Dumazeta16292a2016-04-27 16:44:36 -0700961 __ICMP6_INC_STATS(dev_net(dev), idev, ICMP6_MIB_CSUMERRORS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700962discard_it:
Eric Dumazeta16292a2016-04-27 16:44:36 -0700963 __ICMP6_INC_STATS(dev_net(dev), idev, ICMP6_MIB_INERRORS);
Herbert Xu8b7817f2007-12-12 10:44:43 -0800964drop_no_count:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700965 kfree_skb(skb);
966 return 0;
967}
968
David S. Miller4c9483b2011-03-12 16:22:43 -0500969void icmpv6_flow_init(struct sock *sk, struct flowi6 *fl6,
YOSHIFUJI Hideaki95e41e92007-12-06 15:43:30 -0800970 u8 type,
971 const struct in6_addr *saddr,
972 const struct in6_addr *daddr,
973 int oif)
974{
David S. Miller4c9483b2011-03-12 16:22:43 -0500975 memset(fl6, 0, sizeof(*fl6));
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000976 fl6->saddr = *saddr;
977 fl6->daddr = *daddr;
Ian Morris67ba4152014-08-24 21:53:10 +0100978 fl6->flowi6_proto = IPPROTO_ICMPV6;
David S. Miller1958b852011-03-12 16:36:19 -0500979 fl6->fl6_icmp_type = type;
980 fl6->fl6_icmp_code = 0;
David S. Miller4c9483b2011-03-12 16:22:43 -0500981 fl6->flowi6_oif = oif;
982 security_sk_classify_flow(sk, flowi6_to_flowi(fl6));
YOSHIFUJI Hideaki95e41e92007-12-06 15:43:30 -0800983}
984
Kefeng Wang3232a1e2019-02-23 15:28:27 +0800985static void __net_exit icmpv6_sk_exit(struct net *net)
986{
987 int i;
988
989 for_each_possible_cpu(i)
Kefeng Wang75efc252019-02-23 15:28:28 +0800990 inet_ctl_sock_destroy(*per_cpu_ptr(net->ipv6.icmp_sk, i));
991 free_percpu(net->ipv6.icmp_sk);
Kefeng Wang3232a1e2019-02-23 15:28:27 +0800992}
993
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -0800994static int __net_init icmpv6_sk_init(struct net *net)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700995{
996 struct sock *sk;
Kefeng Wang3232a1e2019-02-23 15:28:27 +0800997 int err, i;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700998
Kefeng Wang75efc252019-02-23 15:28:28 +0800999 net->ipv6.icmp_sk = alloc_percpu(struct sock *);
Ian Morris63159f22015-03-29 14:00:04 +01001000 if (!net->ipv6.icmp_sk)
Denis V. Lunev79c91152008-02-29 11:17:11 -08001001 return -ENOMEM;
1002
KAMEZAWA Hiroyuki6f912042006-04-10 22:52:50 -07001003 for_each_possible_cpu(i) {
Denis V. Lunev1ed85162008-04-03 14:31:03 -07001004 err = inet_ctl_sock_create(&sk, PF_INET6,
1005 SOCK_RAW, IPPROTO_ICMPV6, net);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001006 if (err < 0) {
Joe Perchesf3213832012-05-15 14:11:53 +00001007 pr_err("Failed to initialize the ICMP6 control socket (err %d)\n",
Linus Torvalds1da177e2005-04-16 15:20:36 -07001008 err);
1009 goto fail;
1010 }
1011
Kefeng Wang75efc252019-02-23 15:28:28 +08001012 *per_cpu_ptr(net->ipv6.icmp_sk, i) = sk;
Denis V. Lunev5c8cafd2008-02-29 11:19:22 -08001013
Linus Torvalds1da177e2005-04-16 15:20:36 -07001014 /* Enough space for 2 64K ICMP packets, including
1015 * sk_buff struct overhead.
1016 */
Eric Dumazet87fb4b72011-10-13 07:28:54 +00001017 sk->sk_sndbuf = 2 * SKB_TRUESIZE(64 * 1024);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001018 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001019 return 0;
1020
1021 fail:
Kefeng Wang3232a1e2019-02-23 15:28:27 +08001022 icmpv6_sk_exit(net);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001023 return err;
1024}
1025
Alexey Dobriyan8ed7edc2008-03-03 12:02:54 -08001026static struct pernet_operations icmpv6_sk_ops = {
Ian Morris67ba4152014-08-24 21:53:10 +01001027 .init = icmpv6_sk_init,
1028 .exit = icmpv6_sk_exit,
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -08001029};
1030
1031int __init icmpv6_init(void)
1032{
1033 int err;
1034
1035 err = register_pernet_subsys(&icmpv6_sk_ops);
1036 if (err < 0)
1037 return err;
1038
1039 err = -EAGAIN;
1040 if (inet6_add_protocol(&icmpv6_protocol, IPPROTO_ICMPV6) < 0)
1041 goto fail;
Pravin B Shelar5f5624c2013-04-25 11:08:30 +00001042
1043 err = inet6_register_icmp_sender(icmp6_send);
1044 if (err)
1045 goto sender_reg_err;
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -08001046 return 0;
1047
Pravin B Shelar5f5624c2013-04-25 11:08:30 +00001048sender_reg_err:
1049 inet6_del_protocol(&icmpv6_protocol, IPPROTO_ICMPV6);
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -08001050fail:
Joe Perchesf3213832012-05-15 14:11:53 +00001051 pr_err("Failed to register ICMP6 protocol\n");
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -08001052 unregister_pernet_subsys(&icmpv6_sk_ops);
1053 return err;
1054}
1055
Alexey Dobriyan8ed7edc2008-03-03 12:02:54 -08001056void icmpv6_cleanup(void)
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -08001057{
Pravin B Shelar5f5624c2013-04-25 11:08:30 +00001058 inet6_unregister_icmp_sender(icmp6_send);
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -08001059 unregister_pernet_subsys(&icmpv6_sk_ops);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001060 inet6_del_protocol(&icmpv6_protocol, IPPROTO_ICMPV6);
1061}
1062
Denis V. Lunev98c6d1b2008-02-29 11:21:22 -08001063
Arjan van de Ven9b5b5cf2005-11-29 16:21:38 -08001064static const struct icmp6_err {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001065 int err;
1066 int fatal;
1067} tab_unreach[] = {
1068 { /* NOROUTE */
1069 .err = ENETUNREACH,
1070 .fatal = 0,
1071 },
1072 { /* ADM_PROHIBITED */
1073 .err = EACCES,
1074 .fatal = 1,
1075 },
1076 { /* Was NOT_NEIGHBOUR, now reserved */
1077 .err = EHOSTUNREACH,
1078 .fatal = 0,
1079 },
1080 { /* ADDR_UNREACH */
1081 .err = EHOSTUNREACH,
1082 .fatal = 0,
1083 },
1084 { /* PORT_UNREACH */
1085 .err = ECONNREFUSED,
1086 .fatal = 1,
1087 },
Jiri Bohac61e76b12013-08-30 11:18:45 +02001088 { /* POLICY_FAIL */
1089 .err = EACCES,
1090 .fatal = 1,
1091 },
1092 { /* REJECT_ROUTE */
1093 .err = EACCES,
1094 .fatal = 1,
1095 },
Linus Torvalds1da177e2005-04-16 15:20:36 -07001096};
1097
Brian Haleyd5fdd6b2009-06-23 04:31:07 -07001098int icmpv6_err_convert(u8 type, u8 code, int *err)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001099{
1100 int fatal = 0;
1101
1102 *err = EPROTO;
1103
1104 switch (type) {
1105 case ICMPV6_DEST_UNREACH:
1106 fatal = 1;
Jiri Bohac61e76b12013-08-30 11:18:45 +02001107 if (code < ARRAY_SIZE(tab_unreach)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001108 *err = tab_unreach[code].err;
1109 fatal = tab_unreach[code].fatal;
1110 }
1111 break;
1112
1113 case ICMPV6_PKT_TOOBIG:
1114 *err = EMSGSIZE;
1115 break;
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001116
Linus Torvalds1da177e2005-04-16 15:20:36 -07001117 case ICMPV6_PARAMPROB:
1118 *err = EPROTO;
1119 fatal = 1;
1120 break;
1121
1122 case ICMPV6_TIME_EXCEED:
1123 *err = EHOSTUNREACH;
1124 break;
Stephen Hemminger3ff50b72007-04-20 17:09:22 -07001125 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001126
1127 return fatal;
1128}
YOSHIFUJI Hideaki71590392007-02-22 22:05:40 +09001129EXPORT_SYMBOL(icmpv6_err_convert);
1130
Linus Torvalds1da177e2005-04-16 15:20:36 -07001131#ifdef CONFIG_SYSCTL
stephen hemmingere8243532013-12-29 14:03:31 -08001132static struct ctl_table ipv6_icmp_table_template[] = {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001133 {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001134 .procname = "ratelimit",
Daniel Lezcano41a76902008-01-10 03:02:40 -08001135 .data = &init_net.ipv6.sysctl.icmpv6_time,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001136 .maxlen = sizeof(int),
1137 .mode = 0644,
Alexey Dobriyan6d9f2392008-11-03 18:21:05 -08001138 .proc_handler = proc_dointvec_ms_jiffies,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001139 },
Virgile Jarrye6f86b02018-08-10 17:48:15 +02001140 {
1141 .procname = "echo_ignore_all",
1142 .data = &init_net.ipv6.sysctl.icmpv6_echo_ignore_all,
1143 .maxlen = sizeof(int),
1144 .mode = 0644,
1145 .proc_handler = proc_dointvec,
1146 },
Stephen Suryaputra03f1ecc2019-03-19 12:37:12 -04001147 {
1148 .procname = "echo_ignore_multicast",
1149 .data = &init_net.ipv6.sysctl.icmpv6_echo_ignore_multicast,
1150 .maxlen = sizeof(int),
1151 .mode = 0644,
1152 .proc_handler = proc_dointvec,
1153 },
Stephen Suryaputra0b03a5c2019-03-20 10:29:27 -04001154 {
1155 .procname = "echo_ignore_anycast",
1156 .data = &init_net.ipv6.sysctl.icmpv6_echo_ignore_anycast,
1157 .maxlen = sizeof(int),
1158 .mode = 0644,
1159 .proc_handler = proc_dointvec,
1160 },
Stephen Suryaputra0bc19982019-04-17 16:35:49 -04001161 {
1162 .procname = "ratemask",
1163 .data = &init_net.ipv6.sysctl.icmpv6_ratemask_ptr,
1164 .maxlen = ICMPV6_MSG_MAX + 1,
1165 .mode = 0644,
1166 .proc_handler = proc_do_large_bitmap,
1167 },
Eric W. Biedermanf8572d82009-11-05 13:32:03 -08001168 { },
Linus Torvalds1da177e2005-04-16 15:20:36 -07001169};
Daniel Lezcano760f2d02008-01-10 02:53:43 -08001170
Alexey Dobriyan2c8c1e72010-01-17 03:35:32 +00001171struct ctl_table * __net_init ipv6_icmp_sysctl_init(struct net *net)
Daniel Lezcano760f2d02008-01-10 02:53:43 -08001172{
1173 struct ctl_table *table;
1174
1175 table = kmemdup(ipv6_icmp_table_template,
1176 sizeof(ipv6_icmp_table_template),
1177 GFP_KERNEL);
YOSHIFUJI Hideaki5ee09102008-02-28 00:24:28 +09001178
Virgile Jarrye6f86b02018-08-10 17:48:15 +02001179 if (table) {
YOSHIFUJI Hideaki5ee09102008-02-28 00:24:28 +09001180 table[0].data = &net->ipv6.sysctl.icmpv6_time;
Virgile Jarrye6f86b02018-08-10 17:48:15 +02001181 table[1].data = &net->ipv6.sysctl.icmpv6_echo_ignore_all;
Stephen Suryaputra03f1ecc2019-03-19 12:37:12 -04001182 table[2].data = &net->ipv6.sysctl.icmpv6_echo_ignore_multicast;
Stephen Suryaputra0b03a5c2019-03-20 10:29:27 -04001183 table[3].data = &net->ipv6.sysctl.icmpv6_echo_ignore_anycast;
Stephen Suryaputra0bc19982019-04-17 16:35:49 -04001184 table[4].data = &net->ipv6.sysctl.icmpv6_ratemask_ptr;
Virgile Jarrye6f86b02018-08-10 17:48:15 +02001185 }
Daniel Lezcano760f2d02008-01-10 02:53:43 -08001186 return table;
1187}
Linus Torvalds1da177e2005-04-16 15:20:36 -07001188#endif