linux/net/ipv6/icmp.c
<<
>>
Prefs
   1/*
   2 *      Internet Control Message Protocol (ICMPv6)
   3 *      Linux INET6 implementation
   4 *
   5 *      Authors:
   6 *      Pedro Roque             <roque@di.fc.ul.pt>
   7 *
   8 *      Based on net/ipv4/icmp.c
   9 *
  10 *      RFC 1885
  11 *
  12 *      This program is free software; you can redistribute it and/or
  13 *      modify it under the terms of the GNU General Public License
  14 *      as published by the Free Software Foundation; either version
  15 *      2 of the License, or (at your option) any later version.
  16 */
  17
  18/*
  19 *      Changes:
  20 *
  21 *      Andi Kleen              :       exception handling
  22 *      Andi Kleen                      add rate limits. never reply to a icmp.
  23 *                                      add more length checks and other fixes.
  24 *      yoshfuji                :       ensure to sent parameter problem for
  25 *                                      fragments.
  26 *      YOSHIFUJI Hideaki @USAGI:       added sysctl for icmp rate limit.
  27 *      Randy Dunlap and
  28 *      YOSHIFUJI Hideaki @USAGI:       Per-interface statistics support
  29 *      Kazunori MIYAZAWA @USAGI:       change output process to use ip6_append_data
  30 */
  31
  32#define pr_fmt(fmt) "IPv6: " fmt
  33
  34#include <linux/module.h>
  35#include <linux/errno.h>
  36#include <linux/types.h>
  37#include <linux/socket.h>
  38#include <linux/in.h>
  39#include <linux/kernel.h>
  40#include <linux/sockios.h>
  41#include <linux/net.h>
  42#include <linux/skbuff.h>
  43#include <linux/init.h>
  44#include <linux/netfilter.h>
  45#include <linux/slab.h>
  46
  47#ifdef CONFIG_SYSCTL
  48#include <linux/sysctl.h>
  49#endif
  50
  51#include <linux/inet.h>
  52#include <linux/netdevice.h>
  53#include <linux/icmpv6.h>
  54
  55#include <net/ip.h>
  56#include <net/sock.h>
  57
  58#include <net/ipv6.h>
  59#include <net/ip6_checksum.h>
  60#include <net/protocol.h>
  61#include <net/raw.h>
  62#include <net/rawv6.h>
  63#include <net/transp_v6.h>
  64#include <net/ip6_route.h>
  65#include <net/addrconf.h>
  66#include <net/icmp.h>
  67#include <net/xfrm.h>
  68#include <net/inet_common.h>
  69
  70#include <asm/uaccess.h>
  71
  72/*
  73 *      The ICMP socket(s). This is the most convenient way to flow control
  74 *      our ICMP output as well as maintain a clean interface throughout
  75 *      all layers. All Socketless IP sends will soon be gone.
  76 *
  77 *      On SMP we have one ICMP socket per-cpu.
  78 */
  79static inline struct sock *icmpv6_sk(struct net *net)
  80{
  81        return net->ipv6.icmp_sk[smp_processor_id()];
  82}
  83
  84static int icmpv6_rcv(struct sk_buff *skb);
  85
  86static const struct inet6_protocol icmpv6_protocol = {
  87        .handler        =       icmpv6_rcv,
  88        .flags          =       INET6_PROTO_NOPOLICY|INET6_PROTO_FINAL,
  89};
  90
  91static __inline__ struct sock *icmpv6_xmit_lock(struct net *net)
  92{
  93        struct sock *sk;
  94
  95        local_bh_disable();
  96
  97        sk = icmpv6_sk(net);
  98        if (unlikely(!spin_trylock(&sk->sk_lock.slock))) {
  99                /* This can happen if the output path (f.e. SIT or
 100                 * ip6ip6 tunnel) signals dst_link_failure() for an
 101                 * outgoing ICMP6 packet.
 102                 */
 103                local_bh_enable();
 104                return NULL;
 105        }
 106        return sk;
 107}
 108
 109static __inline__ void icmpv6_xmit_unlock(struct sock *sk)
 110{
 111        spin_unlock_bh(&sk->sk_lock.slock);
 112}
 113
 114/*
 115 * Slightly more convenient version of icmpv6_send.
 116 */
 117void icmpv6_param_prob(struct sk_buff *skb, u8 code, int pos)
 118{
 119        icmpv6_send(skb, ICMPV6_PARAMPROB, code, pos);
 120        kfree_skb(skb);
 121}
 122
 123/*
 124 * Figure out, may we reply to this packet with icmp error.
 125 *
 126 * We do not reply, if:
 127 *      - it was icmp error message.
 128 *      - it is truncated, so that it is known, that protocol is ICMPV6
 129 *        (i.e. in the middle of some exthdr)
 130 *
 131 *      --ANK (980726)
 132 */
 133
 134static bool is_ineligible(const struct sk_buff *skb)
 135{
 136        int ptr = (u8 *)(ipv6_hdr(skb) + 1) - skb->data;
 137        int len = skb->len - ptr;
 138        __u8 nexthdr = ipv6_hdr(skb)->nexthdr;
 139        __be16 frag_off;
 140
 141        if (len < 0)
 142                return true;
 143
 144        ptr = ipv6_skip_exthdr(skb, ptr, &nexthdr, &frag_off);
 145        if (ptr < 0)
 146                return false;
 147        if (nexthdr == IPPROTO_ICMPV6) {
 148                u8 _type, *tp;
 149                tp = skb_header_pointer(skb,
 150                        ptr+offsetof(struct icmp6hdr, icmp6_type),
 151                        sizeof(_type), &_type);
 152                if (tp == NULL ||
 153                    !(*tp & ICMPV6_INFOMSG_MASK))
 154                        return true;
 155        }
 156        return false;
 157}
 158
 159/*
 160 * Check the ICMP output rate limit
 161 */
 162static inline bool icmpv6_xrlim_allow(struct sock *sk, u8 type,
 163                                      struct flowi6 *fl6)
 164{
 165        struct dst_entry *dst;
 166        struct net *net = sock_net(sk);
 167        bool res = false;
 168
 169        /* Informational messages are not limited. */
 170        if (type & ICMPV6_INFOMSG_MASK)
 171                return true;
 172
 173        /* Do not limit pmtu discovery, it would break it. */
 174        if (type == ICMPV6_PKT_TOOBIG)
 175                return true;
 176
 177        /*
 178         * Look up the output route.
 179         * XXX: perhaps the expire for routing entries cloned by
 180         * this lookup should be more aggressive (not longer than timeout).
 181         */
 182        dst = ip6_route_output(net, sk, fl6);
 183        if (dst->error) {
 184                IP6_INC_STATS(net, ip6_dst_idev(dst),
 185                              IPSTATS_MIB_OUTNOROUTES);
 186        } else if (dst->dev && (dst->dev->flags&IFF_LOOPBACK)) {
 187                res = true;
 188        } else {
 189                struct rt6_info *rt = (struct rt6_info *)dst;
 190                int tmo = net->ipv6.sysctl.icmpv6_time;
 191                struct inet_peer *peer;
 192
 193                /* Give more bandwidth to wider prefixes. */
 194                if (rt->rt6i_dst.plen < 128)
 195                        tmo >>= ((128 - rt->rt6i_dst.plen)>>5);
 196
 197                peer = inet_getpeer_v6(net->ipv6.peers, &rt->rt6i_dst.addr, 1);
 198                res = inet_peer_xrlim_allow(peer, tmo);
 199                if (peer)
 200                        inet_putpeer(peer);
 201        }
 202        dst_release(dst);
 203        return res;
 204}
 205
 206/*
 207 *      an inline helper for the "simple" if statement below
 208 *      checks if parameter problem report is caused by an
 209 *      unrecognized IPv6 option that has the Option Type
 210 *      highest-order two bits set to 10
 211 */
 212
 213static bool opt_unrec(struct sk_buff *skb, __u32 offset)
 214{
 215        u8 _optval, *op;
 216
 217        offset += skb_network_offset(skb);
 218        op = skb_header_pointer(skb, offset, sizeof(_optval), &_optval);
 219        if (op == NULL)
 220                return true;
 221        return (*op & 0xC0) == 0x80;
 222}
 223
 224static int icmpv6_push_pending_frames(struct sock *sk, struct flowi6 *fl6, struct icmp6hdr *thdr, int len)
 225{
 226        struct sk_buff *skb;
 227        struct icmp6hdr *icmp6h;
 228        int err = 0;
 229
 230        if ((skb = skb_peek(&sk->sk_write_queue)) == NULL)
 231                goto out;
 232
 233        icmp6h = icmp6_hdr(skb);
 234        memcpy(icmp6h, thdr, sizeof(struct icmp6hdr));
 235        icmp6h->icmp6_cksum = 0;
 236
 237        if (skb_queue_len(&sk->sk_write_queue) == 1) {
 238                skb->csum = csum_partial(icmp6h,
 239                                        sizeof(struct icmp6hdr), skb->csum);
 240                icmp6h->icmp6_cksum = csum_ipv6_magic(&fl6->saddr,
 241                                                      &fl6->daddr,
 242                                                      len, fl6->flowi6_proto,
 243                                                      skb->csum);
 244        } else {
 245                __wsum tmp_csum = 0;
 246
 247                skb_queue_walk(&sk->sk_write_queue, skb) {
 248                        tmp_csum = csum_add(tmp_csum, skb->csum);
 249                }
 250
 251                tmp_csum = csum_partial(icmp6h,
 252                                        sizeof(struct icmp6hdr), tmp_csum);
 253                icmp6h->icmp6_cksum = csum_ipv6_magic(&fl6->saddr,
 254                                                      &fl6->daddr,
 255                                                      len, fl6->flowi6_proto,
 256                                                      tmp_csum);
 257        }
 258        ip6_push_pending_frames(sk);
 259out:
 260        return err;
 261}
 262
 263struct icmpv6_msg {
 264        struct sk_buff  *skb;
 265        int             offset;
 266        uint8_t         type;
 267};
 268
 269static int icmpv6_getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb)
 270{
 271        struct icmpv6_msg *msg = (struct icmpv6_msg *) from;
 272        struct sk_buff *org_skb = msg->skb;
 273        __wsum csum = 0;
 274
 275        csum = skb_copy_and_csum_bits(org_skb, msg->offset + offset,
 276                                      to, len, csum);
 277        skb->csum = csum_block_add(skb->csum, csum, odd);
 278        if (!(msg->type & ICMPV6_INFOMSG_MASK))
 279                nf_ct_attach(skb, org_skb);
 280        return 0;
 281}
 282
 283#if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
 284static void mip6_addr_swap(struct sk_buff *skb)
 285{
 286        struct ipv6hdr *iph = ipv6_hdr(skb);
 287        struct inet6_skb_parm *opt = IP6CB(skb);
 288        struct ipv6_destopt_hao *hao;
 289        struct in6_addr tmp;
 290        int off;
 291
 292        if (opt->dsthao) {
 293                off = ipv6_find_tlv(skb, opt->dsthao, IPV6_TLV_HAO);
 294                if (likely(off >= 0)) {
 295                        hao = (struct ipv6_destopt_hao *)
 296                                        (skb_network_header(skb) + off);
 297                        tmp = iph->saddr;
 298                        iph->saddr = hao->addr;
 299                        hao->addr = tmp;
 300                }
 301        }
 302}
 303#else
 304static inline void mip6_addr_swap(struct sk_buff *skb) {}
 305#endif
 306
 307static struct dst_entry *icmpv6_route_lookup(struct net *net, struct sk_buff *skb,
 308                                             struct sock *sk, struct flowi6 *fl6)
 309{
 310        struct dst_entry *dst, *dst2;
 311        struct flowi6 fl2;
 312        int err;
 313
 314        err = ip6_dst_lookup(sk, &dst, fl6);
 315        if (err)
 316                return ERR_PTR(err);
 317
 318        /*
 319         * We won't send icmp if the destination is known
 320         * anycast.
 321         */
 322        if (((struct rt6_info *)dst)->rt6i_flags & RTF_ANYCAST) {
 323                LIMIT_NETDEBUG(KERN_DEBUG "icmpv6_send: acast source\n");
 324                dst_release(dst);
 325                return ERR_PTR(-EINVAL);
 326        }
 327
 328        /* No need to clone since we're just using its address. */
 329        dst2 = dst;
 330
 331        dst = xfrm_lookup(net, dst, flowi6_to_flowi(fl6), sk, 0);
 332        if (!IS_ERR(dst)) {
 333                if (dst != dst2)
 334                        return dst;
 335        } else {
 336                if (PTR_ERR(dst) == -EPERM)
 337                        dst = NULL;
 338                else
 339                        return dst;
 340        }
 341
 342        err = xfrm_decode_session_reverse(skb, flowi6_to_flowi(&fl2), AF_INET6);
 343        if (err)
 344                goto relookup_failed;
 345
 346        err = ip6_dst_lookup(sk, &dst2, &fl2);
 347        if (err)
 348                goto relookup_failed;
 349
 350        dst2 = xfrm_lookup(net, dst2, flowi6_to_flowi(&fl2), sk, XFRM_LOOKUP_ICMP);
 351        if (!IS_ERR(dst2)) {
 352                dst_release(dst);
 353                dst = dst2;
 354        } else {
 355                err = PTR_ERR(dst2);
 356                if (err == -EPERM) {
 357                        dst_release(dst);
 358                        return dst2;
 359                } else
 360                        goto relookup_failed;
 361        }
 362
 363relookup_failed:
 364        if (dst)
 365                return dst;
 366        return ERR_PTR(err);
 367}
 368
 369/*
 370 *      Send an ICMP message in response to a packet in error
 371 */
 372void icmpv6_send(struct sk_buff *skb, u8 type, u8 code, __u32 info)
 373{
 374        struct net *net = dev_net(skb->dev);
 375        struct inet6_dev *idev = NULL;
 376        struct ipv6hdr *hdr = ipv6_hdr(skb);
 377        struct sock *sk;
 378        struct ipv6_pinfo *np;
 379        const struct in6_addr *saddr = NULL;
 380        struct dst_entry *dst;
 381        struct icmp6hdr tmp_hdr;
 382        struct flowi6 fl6;
 383        struct icmpv6_msg msg;
 384        int iif = 0;
 385        int addr_type = 0;
 386        int len;
 387        int hlimit;
 388        int err = 0;
 389
 390        if ((u8 *)hdr < skb->head ||
 391            (skb->network_header + sizeof(*hdr)) > skb->tail)
 392                return;
 393
 394        /*
 395         *      Make sure we respect the rules
 396         *      i.e. RFC 1885 2.4(e)
 397         *      Rule (e.1) is enforced by not using icmpv6_send
 398         *      in any code that processes icmp errors.
 399         */
 400        addr_type = ipv6_addr_type(&hdr->daddr);
 401
 402        if (ipv6_chk_addr(net, &hdr->daddr, skb->dev, 0))
 403                saddr = &hdr->daddr;
 404
 405        /*
 406         *      Dest addr check
 407         */
 408
 409        if ((addr_type & IPV6_ADDR_MULTICAST || skb->pkt_type != PACKET_HOST)) {
 410                if (type != ICMPV6_PKT_TOOBIG &&
 411                    !(type == ICMPV6_PARAMPROB &&
 412                      code == ICMPV6_UNK_OPTION &&
 413                      (opt_unrec(skb, info))))
 414                        return;
 415
 416                saddr = NULL;
 417        }
 418
 419        addr_type = ipv6_addr_type(&hdr->saddr);
 420
 421        /*
 422         *      Source addr check
 423         */
 424
 425        if (addr_type & IPV6_ADDR_LINKLOCAL)
 426                iif = skb->dev->ifindex;
 427
 428        /*
 429         *      Must not send error if the source does not uniquely
 430         *      identify a single node (RFC2463 Section 2.4).
 431         *      We check unspecified / multicast addresses here,
 432         *      and anycast addresses will be checked later.
 433         */
 434        if ((addr_type == IPV6_ADDR_ANY) || (addr_type & IPV6_ADDR_MULTICAST)) {
 435                LIMIT_NETDEBUG(KERN_DEBUG "icmpv6_send: addr_any/mcast source\n");
 436                return;
 437        }
 438
 439        /*
 440         *      Never answer to a ICMP packet.
 441         */
 442        if (is_ineligible(skb)) {
 443                LIMIT_NETDEBUG(KERN_DEBUG "icmpv6_send: no reply to icmp error\n");
 444                return;
 445        }
 446
 447        mip6_addr_swap(skb);
 448
 449        memset(&fl6, 0, sizeof(fl6));
 450        fl6.flowi6_proto = IPPROTO_ICMPV6;
 451        fl6.daddr = hdr->saddr;
 452        if (saddr)
 453                fl6.saddr = *saddr;
 454        fl6.flowi6_oif = iif;
 455        fl6.fl6_icmp_type = type;
 456        fl6.fl6_icmp_code = code;
 457        security_skb_classify_flow(skb, flowi6_to_flowi(&fl6));
 458
 459        sk = icmpv6_xmit_lock(net);
 460        if (sk == NULL)
 461                return;
 462        np = inet6_sk(sk);
 463
 464        if (!icmpv6_xrlim_allow(sk, type, &fl6))
 465                goto out;
 466
 467        tmp_hdr.icmp6_type = type;
 468        tmp_hdr.icmp6_code = code;
 469        tmp_hdr.icmp6_cksum = 0;
 470        tmp_hdr.icmp6_pointer = htonl(info);
 471
 472        if (!fl6.flowi6_oif && ipv6_addr_is_multicast(&fl6.daddr))
 473                fl6.flowi6_oif = np->mcast_oif;
 474        else if (!fl6.flowi6_oif)
 475                fl6.flowi6_oif = np->ucast_oif;
 476
 477        dst = icmpv6_route_lookup(net, skb, sk, &fl6);
 478        if (IS_ERR(dst))
 479                goto out;
 480
 481        if (ipv6_addr_is_multicast(&fl6.daddr))
 482                hlimit = np->mcast_hops;
 483        else
 484                hlimit = np->hop_limit;
 485        if (hlimit < 0)
 486                hlimit = ip6_dst_hoplimit(dst);
 487
 488        msg.skb = skb;
 489        msg.offset = skb_network_offset(skb);
 490        msg.type = type;
 491
 492        len = skb->len - msg.offset;
 493        len = min_t(unsigned int, len, IPV6_MIN_MTU - sizeof(struct ipv6hdr) -sizeof(struct icmp6hdr));
 494        if (len < 0) {
 495                LIMIT_NETDEBUG(KERN_DEBUG "icmp: len problem\n");
 496                goto out_dst_release;
 497        }
 498
 499        rcu_read_lock();
 500        idev = __in6_dev_get(skb->dev);
 501
 502        err = ip6_append_data(sk, icmpv6_getfrag, &msg,
 503                              len + sizeof(struct icmp6hdr),
 504                              sizeof(struct icmp6hdr), hlimit,
 505                              np->tclass, NULL, &fl6, (struct rt6_info *)dst,
 506                              MSG_DONTWAIT, np->dontfrag);
 507        if (err) {
 508                ICMP6_INC_STATS_BH(net, idev, ICMP6_MIB_OUTERRORS);
 509                ip6_flush_pending_frames(sk);
 510        } else {
 511                err = icmpv6_push_pending_frames(sk, &fl6, &tmp_hdr,
 512                                                 len + sizeof(struct icmp6hdr));
 513        }
 514        rcu_read_unlock();
 515out_dst_release:
 516        dst_release(dst);
 517out:
 518        icmpv6_xmit_unlock(sk);
 519}
 520EXPORT_SYMBOL(icmpv6_send);
 521
 522static void icmpv6_echo_reply(struct sk_buff *skb)
 523{
 524        struct net *net = dev_net(skb->dev);
 525        struct sock *sk;
 526        struct inet6_dev *idev;
 527        struct ipv6_pinfo *np;
 528        const struct in6_addr *saddr = NULL;
 529        struct icmp6hdr *icmph = icmp6_hdr(skb);
 530        struct icmp6hdr tmp_hdr;
 531        struct flowi6 fl6;
 532        struct icmpv6_msg msg;
 533        struct dst_entry *dst;
 534        int err = 0;
 535        int hlimit;
 536
 537        saddr = &ipv6_hdr(skb)->daddr;
 538
 539        if (!ipv6_unicast_destination(skb))
 540                saddr = NULL;
 541
 542        memcpy(&tmp_hdr, icmph, sizeof(tmp_hdr));
 543        tmp_hdr.icmp6_type = ICMPV6_ECHO_REPLY;
 544
 545        memset(&fl6, 0, sizeof(fl6));
 546        fl6.flowi6_proto = IPPROTO_ICMPV6;
 547        fl6.daddr = ipv6_hdr(skb)->saddr;
 548        if (saddr)
 549                fl6.saddr = *saddr;
 550        fl6.flowi6_oif = skb->dev->ifindex;
 551        fl6.fl6_icmp_type = ICMPV6_ECHO_REPLY;
 552        security_skb_classify_flow(skb, flowi6_to_flowi(&fl6));
 553
 554        sk = icmpv6_xmit_lock(net);
 555        if (sk == NULL)
 556                return;
 557        np = inet6_sk(sk);
 558
 559        if (!fl6.flowi6_oif && ipv6_addr_is_multicast(&fl6.daddr))
 560                fl6.flowi6_oif = np->mcast_oif;
 561        else if (!fl6.flowi6_oif)
 562                fl6.flowi6_oif = np->ucast_oif;
 563
 564        err = ip6_dst_lookup(sk, &dst, &fl6);
 565        if (err)
 566                goto out;
 567        dst = xfrm_lookup(net, dst, flowi6_to_flowi(&fl6), sk, 0);
 568        if (IS_ERR(dst))
 569                goto out;
 570
 571        if (ipv6_addr_is_multicast(&fl6.daddr))
 572                hlimit = np->mcast_hops;
 573        else
 574                hlimit = np->hop_limit;
 575        if (hlimit < 0)
 576                hlimit = ip6_dst_hoplimit(dst);
 577
 578        idev = __in6_dev_get(skb->dev);
 579
 580        msg.skb = skb;
 581        msg.offset = 0;
 582        msg.type = ICMPV6_ECHO_REPLY;
 583
 584        err = ip6_append_data(sk, icmpv6_getfrag, &msg, skb->len + sizeof(struct icmp6hdr),
 585                                sizeof(struct icmp6hdr), hlimit, np->tclass, NULL, &fl6,
 586                                (struct rt6_info *)dst, MSG_DONTWAIT,
 587                                np->dontfrag);
 588
 589        if (err) {
 590                ICMP6_INC_STATS_BH(net, idev, ICMP6_MIB_OUTERRORS);
 591                ip6_flush_pending_frames(sk);
 592        } else {
 593                err = icmpv6_push_pending_frames(sk, &fl6, &tmp_hdr,
 594                                                 skb->len + sizeof(struct icmp6hdr));
 595        }
 596        dst_release(dst);
 597out:
 598        icmpv6_xmit_unlock(sk);
 599}
 600
 601void icmpv6_notify(struct sk_buff *skb, u8 type, u8 code, __be32 info)
 602{
 603        const struct inet6_protocol *ipprot;
 604        int inner_offset;
 605        __be16 frag_off;
 606        u8 nexthdr;
 607
 608        if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
 609                return;
 610
 611        nexthdr = ((struct ipv6hdr *)skb->data)->nexthdr;
 612        if (ipv6_ext_hdr(nexthdr)) {
 613                /* now skip over extension headers */
 614                inner_offset = ipv6_skip_exthdr(skb, sizeof(struct ipv6hdr),
 615                                                &nexthdr, &frag_off);
 616                if (inner_offset<0)
 617                        return;
 618        } else {
 619                inner_offset = sizeof(struct ipv6hdr);
 620        }
 621
 622        /* Checkin header including 8 bytes of inner protocol header. */
 623        if (!pskb_may_pull(skb, inner_offset+8))
 624                return;
 625
 626        /* BUGGG_FUTURE: we should try to parse exthdrs in this packet.
 627           Without this we will not able f.e. to make source routed
 628           pmtu discovery.
 629           Corresponding argument (opt) to notifiers is already added.
 630           --ANK (980726)
 631         */
 632
 633        rcu_read_lock();
 634        ipprot = rcu_dereference(inet6_protos[nexthdr]);
 635        if (ipprot && ipprot->err_handler)
 636                ipprot->err_handler(skb, NULL, type, code, inner_offset, info);
 637        rcu_read_unlock();
 638
 639        raw6_icmp_error(skb, nexthdr, type, code, inner_offset, info);
 640}
 641
 642/*
 643 *      Handle icmp messages
 644 */
 645
 646static int icmpv6_rcv(struct sk_buff *skb)
 647{
 648        struct net_device *dev = skb->dev;
 649        struct inet6_dev *idev = __in6_dev_get(dev);
 650        const struct in6_addr *saddr, *daddr;
 651        struct icmp6hdr *hdr;
 652        u8 type;
 653
 654        if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb)) {
 655                struct sec_path *sp = skb_sec_path(skb);
 656                int nh;
 657
 658                if (!(sp && sp->xvec[sp->len - 1]->props.flags &
 659                                 XFRM_STATE_ICMP))
 660                        goto drop_no_count;
 661
 662                if (!pskb_may_pull(skb, sizeof(*hdr) + sizeof(struct ipv6hdr)))
 663                        goto drop_no_count;
 664
 665                nh = skb_network_offset(skb);
 666                skb_set_network_header(skb, sizeof(*hdr));
 667
 668                if (!xfrm6_policy_check_reverse(NULL, XFRM_POLICY_IN, skb))
 669                        goto drop_no_count;
 670
 671                skb_set_network_header(skb, nh);
 672        }
 673
 674        ICMP6_INC_STATS_BH(dev_net(dev), idev, ICMP6_MIB_INMSGS);
 675
 676        saddr = &ipv6_hdr(skb)->saddr;
 677        daddr = &ipv6_hdr(skb)->daddr;
 678
 679        /* Perform checksum. */
 680        switch (skb->ip_summed) {
 681        case CHECKSUM_COMPLETE:
 682                if (!csum_ipv6_magic(saddr, daddr, skb->len, IPPROTO_ICMPV6,
 683                                     skb->csum))
 684                        break;
 685                /* fall through */
 686        case CHECKSUM_NONE:
 687                skb->csum = ~csum_unfold(csum_ipv6_magic(saddr, daddr, skb->len,
 688                                             IPPROTO_ICMPV6, 0));
 689                if (__skb_checksum_complete(skb)) {
 690                        LIMIT_NETDEBUG(KERN_DEBUG "ICMPv6 checksum failed [%pI6 > %pI6]\n",
 691                                       saddr, daddr);
 692                        goto discard_it;
 693                }
 694        }
 695
 696        if (!pskb_pull(skb, sizeof(*hdr)))
 697                goto discard_it;
 698
 699        hdr = icmp6_hdr(skb);
 700
 701        type = hdr->icmp6_type;
 702
 703        ICMP6MSGIN_INC_STATS_BH(dev_net(dev), idev, type);
 704
 705        switch (type) {
 706        case ICMPV6_ECHO_REQUEST:
 707                icmpv6_echo_reply(skb);
 708                break;
 709
 710        case ICMPV6_ECHO_REPLY:
 711                /* we couldn't care less */
 712                break;
 713
 714        case ICMPV6_PKT_TOOBIG:
 715                /* BUGGG_FUTURE: if packet contains rthdr, we cannot update
 716                   standard destination cache. Seems, only "advanced"
 717                   destination cache will allow to solve this problem
 718                   --ANK (980726)
 719                 */
 720                if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
 721                        goto discard_it;
 722                hdr = icmp6_hdr(skb);
 723
 724                /*
 725                 *      Drop through to notify
 726                 */
 727
 728        case ICMPV6_DEST_UNREACH:
 729        case ICMPV6_TIME_EXCEED:
 730        case ICMPV6_PARAMPROB:
 731                icmpv6_notify(skb, type, hdr->icmp6_code, hdr->icmp6_mtu);
 732                break;
 733
 734        case NDISC_ROUTER_SOLICITATION:
 735        case NDISC_ROUTER_ADVERTISEMENT:
 736        case NDISC_NEIGHBOUR_SOLICITATION:
 737        case NDISC_NEIGHBOUR_ADVERTISEMENT:
 738        case NDISC_REDIRECT:
 739                ndisc_rcv(skb);
 740                break;
 741
 742        case ICMPV6_MGM_QUERY:
 743                igmp6_event_query(skb);
 744                break;
 745
 746        case ICMPV6_MGM_REPORT:
 747                igmp6_event_report(skb);
 748                break;
 749
 750        case ICMPV6_MGM_REDUCTION:
 751        case ICMPV6_NI_QUERY:
 752        case ICMPV6_NI_REPLY:
 753        case ICMPV6_MLD2_REPORT:
 754        case ICMPV6_DHAAD_REQUEST:
 755        case ICMPV6_DHAAD_REPLY:
 756        case ICMPV6_MOBILE_PREFIX_SOL:
 757        case ICMPV6_MOBILE_PREFIX_ADV:
 758                break;
 759
 760        default:
 761                LIMIT_NETDEBUG(KERN_DEBUG "icmpv6: msg of unknown type\n");
 762
 763                /* informational */
 764                if (type & ICMPV6_INFOMSG_MASK)
 765                        break;
 766
 767                /*
 768                 * error of unknown type.
 769                 * must pass to upper level
 770                 */
 771
 772                icmpv6_notify(skb, type, hdr->icmp6_code, hdr->icmp6_mtu);
 773        }
 774
 775        kfree_skb(skb);
 776        return 0;
 777
 778discard_it:
 779        ICMP6_INC_STATS_BH(dev_net(dev), idev, ICMP6_MIB_INERRORS);
 780drop_no_count:
 781        kfree_skb(skb);
 782        return 0;
 783}
 784
 785void icmpv6_flow_init(struct sock *sk, struct flowi6 *fl6,
 786                      u8 type,
 787                      const struct in6_addr *saddr,
 788                      const struct in6_addr *daddr,
 789                      int oif)
 790{
 791        memset(fl6, 0, sizeof(*fl6));
 792        fl6->saddr = *saddr;
 793        fl6->daddr = *daddr;
 794        fl6->flowi6_proto       = IPPROTO_ICMPV6;
 795        fl6->fl6_icmp_type      = type;
 796        fl6->fl6_icmp_code      = 0;
 797        fl6->flowi6_oif         = oif;
 798        security_sk_classify_flow(sk, flowi6_to_flowi(fl6));
 799}
 800
 801/*
 802 * Special lock-class for __icmpv6_sk:
 803 */
 804static struct lock_class_key icmpv6_socket_sk_dst_lock_key;
 805
 806static int __net_init icmpv6_sk_init(struct net *net)
 807{
 808        struct sock *sk;
 809        int err, i, j;
 810
 811        net->ipv6.icmp_sk =
 812                kzalloc(nr_cpu_ids * sizeof(struct sock *), GFP_KERNEL);
 813        if (net->ipv6.icmp_sk == NULL)
 814                return -ENOMEM;
 815
 816        for_each_possible_cpu(i) {
 817                err = inet_ctl_sock_create(&sk, PF_INET6,
 818                                           SOCK_RAW, IPPROTO_ICMPV6, net);
 819                if (err < 0) {
 820                        pr_err("Failed to initialize the ICMP6 control socket (err %d)\n",
 821                               err);
 822                        goto fail;
 823                }
 824
 825                net->ipv6.icmp_sk[i] = sk;
 826
 827                /*
 828                 * Split off their lock-class, because sk->sk_dst_lock
 829                 * gets used from softirqs, which is safe for
 830                 * __icmpv6_sk (because those never get directly used
 831                 * via userspace syscalls), but unsafe for normal sockets.
 832                 */
 833                lockdep_set_class(&sk->sk_dst_lock,
 834                                  &icmpv6_socket_sk_dst_lock_key);
 835
 836                /* Enough space for 2 64K ICMP packets, including
 837                 * sk_buff struct overhead.
 838                 */
 839                sk->sk_sndbuf = 2 * SKB_TRUESIZE(64 * 1024);
 840        }
 841        return 0;
 842
 843 fail:
 844        for (j = 0; j < i; j++)
 845                inet_ctl_sock_destroy(net->ipv6.icmp_sk[j]);
 846        kfree(net->ipv6.icmp_sk);
 847        return err;
 848}
 849
 850static void __net_exit icmpv6_sk_exit(struct net *net)
 851{
 852        int i;
 853
 854        for_each_possible_cpu(i) {
 855                inet_ctl_sock_destroy(net->ipv6.icmp_sk[i]);
 856        }
 857        kfree(net->ipv6.icmp_sk);
 858}
 859
 860static struct pernet_operations icmpv6_sk_ops = {
 861       .init = icmpv6_sk_init,
 862       .exit = icmpv6_sk_exit,
 863};
 864
 865int __init icmpv6_init(void)
 866{
 867        int err;
 868
 869        err = register_pernet_subsys(&icmpv6_sk_ops);
 870        if (err < 0)
 871                return err;
 872
 873        err = -EAGAIN;
 874        if (inet6_add_protocol(&icmpv6_protocol, IPPROTO_ICMPV6) < 0)
 875                goto fail;
 876        return 0;
 877
 878fail:
 879        pr_err("Failed to register ICMP6 protocol\n");
 880        unregister_pernet_subsys(&icmpv6_sk_ops);
 881        return err;
 882}
 883
 884void icmpv6_cleanup(void)
 885{
 886        unregister_pernet_subsys(&icmpv6_sk_ops);
 887        inet6_del_protocol(&icmpv6_protocol, IPPROTO_ICMPV6);
 888}
 889
 890
 891static const struct icmp6_err {
 892        int err;
 893        int fatal;
 894} tab_unreach[] = {
 895        {       /* NOROUTE */
 896                .err    = ENETUNREACH,
 897                .fatal  = 0,
 898        },
 899        {       /* ADM_PROHIBITED */
 900                .err    = EACCES,
 901                .fatal  = 1,
 902        },
 903        {       /* Was NOT_NEIGHBOUR, now reserved */
 904                .err    = EHOSTUNREACH,
 905                .fatal  = 0,
 906        },
 907        {       /* ADDR_UNREACH */
 908                .err    = EHOSTUNREACH,
 909                .fatal  = 0,
 910        },
 911        {       /* PORT_UNREACH */
 912                .err    = ECONNREFUSED,
 913                .fatal  = 1,
 914        },
 915};
 916
 917int icmpv6_err_convert(u8 type, u8 code, int *err)
 918{
 919        int fatal = 0;
 920
 921        *err = EPROTO;
 922
 923        switch (type) {
 924        case ICMPV6_DEST_UNREACH:
 925                fatal = 1;
 926                if (code <= ICMPV6_PORT_UNREACH) {
 927                        *err  = tab_unreach[code].err;
 928                        fatal = tab_unreach[code].fatal;
 929                }
 930                break;
 931
 932        case ICMPV6_PKT_TOOBIG:
 933                *err = EMSGSIZE;
 934                break;
 935
 936        case ICMPV6_PARAMPROB:
 937                *err = EPROTO;
 938                fatal = 1;
 939                break;
 940
 941        case ICMPV6_TIME_EXCEED:
 942                *err = EHOSTUNREACH;
 943                break;
 944        }
 945
 946        return fatal;
 947}
 948EXPORT_SYMBOL(icmpv6_err_convert);
 949
 950#ifdef CONFIG_SYSCTL
 951ctl_table ipv6_icmp_table_template[] = {
 952        {
 953                .procname       = "ratelimit",
 954                .data           = &init_net.ipv6.sysctl.icmpv6_time,
 955                .maxlen         = sizeof(int),
 956                .mode           = 0644,
 957                .proc_handler   = proc_dointvec_ms_jiffies,
 958        },
 959        { },
 960};
 961
 962struct ctl_table * __net_init ipv6_icmp_sysctl_init(struct net *net)
 963{
 964        struct ctl_table *table;
 965
 966        table = kmemdup(ipv6_icmp_table_template,
 967                        sizeof(ipv6_icmp_table_template),
 968                        GFP_KERNEL);
 969
 970        if (table)
 971                table[0].data = &net->ipv6.sysctl.icmpv6_time;
 972
 973        return table;
 974}
 975#endif
 976
 977