]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blame - net/ipv6/icmp.c
ipv6: icmp: use icmpv6_sk_exit()
[mirror_ubuntu-jammy-kernel.git] / net / ipv6 / icmp.c
CommitLineData
1da177e4
LT
1/*
2 * Internet Control Message Protocol (ICMPv6)
3 * Linux INET6 implementation
4 *
5 * Authors:
6 * Pedro Roque <roque@di.fc.ul.pt>
7 *
1da177e4
LT
8 * Based on net/ipv4/icmp.c
9 *
10 * RFC 1885
11 *
12 * This program is free software; you can redistribute it and/or
13 * modify it under the terms of the GNU General Public License
14 * as published by the Free Software Foundation; either version
15 * 2 of the License, or (at your option) any later version.
16 */
17
18/*
19 * Changes:
20 *
21 * Andi Kleen : exception handling
22 * Andi Kleen add rate limits. never reply to a icmp.
23 * add more length checks and other fixes.
24 * yoshfuji : ensure to sent parameter problem for
25 * fragments.
26 * YOSHIFUJI Hideaki @USAGI: added sysctl for icmp rate limit.
27 * Randy Dunlap and
28 * YOSHIFUJI Hideaki @USAGI: Per-interface statistics support
29 * Kazunori MIYAZAWA @USAGI: change output process to use ip6_append_data
30 */
31
f3213831
JP
32#define pr_fmt(fmt) "IPv6: " fmt
33
1da177e4
LT
34#include <linux/module.h>
35#include <linux/errno.h>
36#include <linux/types.h>
37#include <linux/socket.h>
38#include <linux/in.h>
39#include <linux/kernel.h>
1da177e4
LT
40#include <linux/sockios.h>
41#include <linux/net.h>
42#include <linux/skbuff.h>
43#include <linux/init.h>
763ecff1 44#include <linux/netfilter.h>
5a0e3ad6 45#include <linux/slab.h>
1da177e4
LT
46
47#ifdef CONFIG_SYSCTL
48#include <linux/sysctl.h>
49#endif
50
51#include <linux/inet.h>
52#include <linux/netdevice.h>
53#include <linux/icmpv6.h>
54
55#include <net/ip.h>
56#include <net/sock.h>
57
58#include <net/ipv6.h>
59#include <net/ip6_checksum.h>
6d0bfe22 60#include <net/ping.h>
1da177e4
LT
61#include <net/protocol.h>
62#include <net/raw.h>
63#include <net/rawv6.h>
64#include <net/transp_v6.h>
65#include <net/ip6_route.h>
66#include <net/addrconf.h>
67#include <net/icmp.h>
8b7817f3 68#include <net/xfrm.h>
1ed8516f 69#include <net/inet_common.h>
825edac4 70#include <net/dsfield.h>
ca254490 71#include <net/l3mdev.h>
1da177e4 72
7c0f6ba6 73#include <linux/uaccess.h>
1da177e4 74
1da177e4
LT
75/*
76 * The ICMP socket(s). This is the most convenient way to flow control
77 * our ICMP output as well as maintain a clean interface throughout
78 * all layers. All Socketless IP sends will soon be gone.
79 *
80 * On SMP we have one ICMP socket per-cpu.
81 */
98c6d1b2
DL
82static inline struct sock *icmpv6_sk(struct net *net)
83{
84 return net->ipv6.icmp_sk[smp_processor_id()];
85}
1da177e4 86
32bbd879 87static int icmpv6_err(struct sk_buff *skb, struct inet6_skb_parm *opt,
6f809da2
SK
88 u8 type, u8 code, int offset, __be32 info)
89{
6d0bfe22
LC
90 /* icmpv6_notify checks 8 bytes can be pulled, icmp6hdr is 8 bytes */
91 struct icmp6hdr *icmp6 = (struct icmp6hdr *) (skb->data + offset);
6f809da2
SK
92 struct net *net = dev_net(skb->dev);
93
94 if (type == ICMPV6_PKT_TOOBIG)
5f379ef5 95 ip6_update_pmtu(skb, net, info, skb->dev->ifindex, 0, sock_net_uid(net, NULL));
6f809da2 96 else if (type == NDISC_REDIRECT)
e2d118a1
LC
97 ip6_redirect(skb, net, skb->dev->ifindex, 0,
98 sock_net_uid(net, NULL));
6d0bfe22
LC
99
100 if (!(type & ICMPV6_INFOMSG_MASK))
101 if (icmp6->icmp6_type == ICMPV6_ECHO_REQUEST)
dcb94b88 102 ping_err(skb, offset, ntohl(info));
32bbd879
SB
103
104 return 0;
6f809da2
SK
105}
106
e5bbef20 107static int icmpv6_rcv(struct sk_buff *skb);
1da177e4 108
41135cc8 109static const struct inet6_protocol icmpv6_protocol = {
1da177e4 110 .handler = icmpv6_rcv,
6f809da2 111 .err_handler = icmpv6_err,
8b7817f3 112 .flags = INET6_PROTO_NOPOLICY|INET6_PROTO_FINAL,
1da177e4
LT
113};
114
7ba91ecb 115/* Called with BH disabled */
fdc0bde9 116static __inline__ struct sock *icmpv6_xmit_lock(struct net *net)
1da177e4 117{
fdc0bde9
DL
118 struct sock *sk;
119
fdc0bde9 120 sk = icmpv6_sk(net);
405666db 121 if (unlikely(!spin_trylock(&sk->sk_lock.slock))) {
1da177e4
LT
122 /* This can happen if the output path (f.e. SIT or
123 * ip6ip6 tunnel) signals dst_link_failure() for an
124 * outgoing ICMP6 packet.
125 */
fdc0bde9 126 return NULL;
1da177e4 127 }
fdc0bde9 128 return sk;
1da177e4
LT
129}
130
405666db 131static __inline__ void icmpv6_xmit_unlock(struct sock *sk)
1da177e4 132{
7ba91ecb 133 spin_unlock(&sk->sk_lock.slock);
1da177e4
LT
134}
135
1da177e4
LT
136/*
137 * Figure out, may we reply to this packet with icmp error.
138 *
139 * We do not reply, if:
140 * - it was icmp error message.
141 * - it is truncated, so that it is known, that protocol is ICMPV6
142 * (i.e. in the middle of some exthdr)
143 *
144 * --ANK (980726)
145 */
146
a50feda5 147static bool is_ineligible(const struct sk_buff *skb)
1da177e4 148{
0660e03f 149 int ptr = (u8 *)(ipv6_hdr(skb) + 1) - skb->data;
1da177e4 150 int len = skb->len - ptr;
0660e03f 151 __u8 nexthdr = ipv6_hdr(skb)->nexthdr;
75f2811c 152 __be16 frag_off;
1da177e4
LT
153
154 if (len < 0)
a50feda5 155 return true;
1da177e4 156
75f2811c 157 ptr = ipv6_skip_exthdr(skb, ptr, &nexthdr, &frag_off);
1da177e4 158 if (ptr < 0)
a50feda5 159 return false;
1da177e4
LT
160 if (nexthdr == IPPROTO_ICMPV6) {
161 u8 _type, *tp;
162 tp = skb_header_pointer(skb,
163 ptr+offsetof(struct icmp6hdr, icmp6_type),
164 sizeof(_type), &_type);
63159f29 165 if (!tp || !(*tp & ICMPV6_INFOMSG_MASK))
a50feda5 166 return true;
1da177e4 167 }
a50feda5 168 return false;
1da177e4
LT
169}
170
c0303efe
JDB
171static bool icmpv6_mask_allow(int type)
172{
173 /* Informational messages are not limited. */
174 if (type & ICMPV6_INFOMSG_MASK)
175 return true;
176
177 /* Do not limit pmtu discovery, it would break it. */
178 if (type == ICMPV6_PKT_TOOBIG)
179 return true;
180
181 return false;
182}
183
184static bool icmpv6_global_allow(int type)
185{
186 if (icmpv6_mask_allow(type))
187 return true;
188
189 if (icmp_global_allow())
190 return true;
191
192 return false;
193}
194
1ab1457c
YH
195/*
196 * Check the ICMP output rate limit
1da177e4 197 */
4cdf507d
ED
198static bool icmpv6_xrlim_allow(struct sock *sk, u8 type,
199 struct flowi6 *fl6)
1da177e4 200{
3b1e0a65 201 struct net *net = sock_net(sk);
4cdf507d 202 struct dst_entry *dst;
92d86829 203 bool res = false;
1da177e4 204
c0303efe 205 if (icmpv6_mask_allow(type))
92d86829 206 return true;
1da177e4 207
1ab1457c 208 /*
1da177e4
LT
209 * Look up the output route.
210 * XXX: perhaps the expire for routing entries cloned by
211 * this lookup should be more aggressive (not longer than timeout).
212 */
4c9483b2 213 dst = ip6_route_output(net, sk, fl6);
1da177e4 214 if (dst->error) {
3bd653c8 215 IP6_INC_STATS(net, ip6_dst_idev(dst),
a11d206d 216 IPSTATS_MIB_OUTNOROUTES);
1da177e4 217 } else if (dst->dev && (dst->dev->flags&IFF_LOOPBACK)) {
92d86829 218 res = true;
1da177e4
LT
219 } else {
220 struct rt6_info *rt = (struct rt6_info *)dst;
9a43b709 221 int tmo = net->ipv6.sysctl.icmpv6_time;
c0303efe 222 struct inet_peer *peer;
1da177e4
LT
223
224 /* Give more bandwidth to wider prefixes. */
225 if (rt->rt6i_dst.plen < 128)
226 tmo >>= ((128 - rt->rt6i_dst.plen)>>5);
227
c0303efe
JDB
228 peer = inet_getpeer_v6(net->ipv6.peers, &fl6->daddr, 1);
229 res = inet_peer_xrlim_allow(peer, tmo);
230 if (peer)
231 inet_putpeer(peer);
1da177e4
LT
232 }
233 dst_release(dst);
234 return res;
235}
236
237/*
238 * an inline helper for the "simple" if statement below
239 * checks if parameter problem report is caused by an
1ab1457c 240 * unrecognized IPv6 option that has the Option Type
1da177e4
LT
241 * highest-order two bits set to 10
242 */
243
a50feda5 244static bool opt_unrec(struct sk_buff *skb, __u32 offset)
1da177e4
LT
245{
246 u8 _optval, *op;
247
bbe735e4 248 offset += skb_network_offset(skb);
1da177e4 249 op = skb_header_pointer(skb, offset, sizeof(_optval), &_optval);
63159f29 250 if (!op)
a50feda5 251 return true;
1da177e4
LT
252 return (*op & 0xC0) == 0x80;
253}
254
4e64b1ed
JP
255void icmpv6_push_pending_frames(struct sock *sk, struct flowi6 *fl6,
256 struct icmp6hdr *thdr, int len)
1da177e4
LT
257{
258 struct sk_buff *skb;
259 struct icmp6hdr *icmp6h;
1da177e4 260
e5d08d71 261 skb = skb_peek(&sk->sk_write_queue);
63159f29 262 if (!skb)
4e64b1ed 263 return;
1da177e4 264
cc70ab26 265 icmp6h = icmp6_hdr(skb);
1da177e4
LT
266 memcpy(icmp6h, thdr, sizeof(struct icmp6hdr));
267 icmp6h->icmp6_cksum = 0;
268
269 if (skb_queue_len(&sk->sk_write_queue) == 1) {
07f0757a 270 skb->csum = csum_partial(icmp6h,
1da177e4 271 sizeof(struct icmp6hdr), skb->csum);
4c9483b2
DM
272 icmp6h->icmp6_cksum = csum_ipv6_magic(&fl6->saddr,
273 &fl6->daddr,
274 len, fl6->flowi6_proto,
1da177e4
LT
275 skb->csum);
276 } else {
868c86bc 277 __wsum tmp_csum = 0;
1da177e4
LT
278
279 skb_queue_walk(&sk->sk_write_queue, skb) {
280 tmp_csum = csum_add(tmp_csum, skb->csum);
281 }
282
07f0757a 283 tmp_csum = csum_partial(icmp6h,
1da177e4 284 sizeof(struct icmp6hdr), tmp_csum);
4c9483b2
DM
285 icmp6h->icmp6_cksum = csum_ipv6_magic(&fl6->saddr,
286 &fl6->daddr,
287 len, fl6->flowi6_proto,
868c86bc 288 tmp_csum);
1da177e4 289 }
1da177e4 290 ip6_push_pending_frames(sk);
1da177e4
LT
291}
292
293struct icmpv6_msg {
294 struct sk_buff *skb;
295 int offset;
763ecff1 296 uint8_t type;
1da177e4
LT
297};
298
299static int icmpv6_getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb)
300{
301 struct icmpv6_msg *msg = (struct icmpv6_msg *) from;
302 struct sk_buff *org_skb = msg->skb;
5f92a738 303 __wsum csum = 0;
1da177e4
LT
304
305 csum = skb_copy_and_csum_bits(org_skb, msg->offset + offset,
306 to, len, csum);
307 skb->csum = csum_block_add(skb->csum, csum, odd);
763ecff1
YK
308 if (!(msg->type & ICMPV6_INFOMSG_MASK))
309 nf_ct_attach(skb, org_skb);
1da177e4
LT
310 return 0;
311}
312
07a93626 313#if IS_ENABLED(CONFIG_IPV6_MIP6)
79383236
MN
314static void mip6_addr_swap(struct sk_buff *skb)
315{
0660e03f 316 struct ipv6hdr *iph = ipv6_hdr(skb);
79383236
MN
317 struct inet6_skb_parm *opt = IP6CB(skb);
318 struct ipv6_destopt_hao *hao;
319 struct in6_addr tmp;
320 int off;
321
322 if (opt->dsthao) {
323 off = ipv6_find_tlv(skb, opt->dsthao, IPV6_TLV_HAO);
324 if (likely(off >= 0)) {
d56f90a7
ACM
325 hao = (struct ipv6_destopt_hao *)
326 (skb_network_header(skb) + off);
4e3fd7a0
AD
327 tmp = iph->saddr;
328 iph->saddr = hao->addr;
329 hao->addr = tmp;
79383236
MN
330 }
331 }
332}
333#else
334static inline void mip6_addr_swap(struct sk_buff *skb) {}
335#endif
336
e8243534 337static struct dst_entry *icmpv6_route_lookup(struct net *net,
338 struct sk_buff *skb,
339 struct sock *sk,
340 struct flowi6 *fl6)
b42835db
DM
341{
342 struct dst_entry *dst, *dst2;
4c9483b2 343 struct flowi6 fl2;
b42835db
DM
344 int err;
345
343d60aa 346 err = ip6_dst_lookup(net, sk, &dst, fl6);
b42835db
DM
347 if (err)
348 return ERR_PTR(err);
349
350 /*
351 * We won't send icmp if the destination is known
352 * anycast.
353 */
2647a9b0 354 if (ipv6_anycast_destination(dst, &fl6->daddr)) {
ba7a46f1 355 net_dbg_ratelimited("icmp6_send: acast source\n");
b42835db
DM
356 dst_release(dst);
357 return ERR_PTR(-EINVAL);
358 }
359
360 /* No need to clone since we're just using its address. */
361 dst2 = dst;
362
4c9483b2 363 dst = xfrm_lookup(net, dst, flowi6_to_flowi(fl6), sk, 0);
452edd59 364 if (!IS_ERR(dst)) {
b42835db
DM
365 if (dst != dst2)
366 return dst;
452edd59
DM
367 } else {
368 if (PTR_ERR(dst) == -EPERM)
369 dst = NULL;
370 else
371 return dst;
b42835db
DM
372 }
373
4c9483b2 374 err = xfrm_decode_session_reverse(skb, flowi6_to_flowi(&fl2), AF_INET6);
b42835db
DM
375 if (err)
376 goto relookup_failed;
377
343d60aa 378 err = ip6_dst_lookup(net, sk, &dst2, &fl2);
b42835db
DM
379 if (err)
380 goto relookup_failed;
381
4c9483b2 382 dst2 = xfrm_lookup(net, dst2, flowi6_to_flowi(&fl2), sk, XFRM_LOOKUP_ICMP);
452edd59 383 if (!IS_ERR(dst2)) {
b42835db
DM
384 dst_release(dst);
385 dst = dst2;
452edd59
DM
386 } else {
387 err = PTR_ERR(dst2);
388 if (err == -EPERM) {
389 dst_release(dst);
390 return dst2;
391 } else
392 goto relookup_failed;
b42835db
DM
393 }
394
395relookup_failed:
396 if (dst)
397 return dst;
398 return ERR_PTR(err);
399}
400
1b70d792
DA
401static int icmp6_iif(const struct sk_buff *skb)
402{
403 int iif = skb->dev->ifindex;
404
405 /* for local traffic to local address, skb dev is the loopback
406 * device. Check if there is a dst attached to the skb and if so
24b711ed
DA
407 * get the real device index. Same is needed for replies to a link
408 * local address on a device enslaved to an L3 master device
1b70d792 409 */
24b711ed 410 if (unlikely(iif == LOOPBACK_IFINDEX || netif_is_l3_master(skb->dev))) {
1b70d792
DA
411 const struct rt6_info *rt6 = skb_rt6_info(skb);
412
413 if (rt6)
414 iif = rt6->rt6i_idev->dev->ifindex;
415 }
416
417 return iif;
418}
419
1da177e4
LT
420/*
421 * Send an ICMP message in response to a packet in error
422 */
b1cadc1a
ED
423static void icmp6_send(struct sk_buff *skb, u8 type, u8 code, __u32 info,
424 const struct in6_addr *force_saddr)
1da177e4
LT
425{
426 struct inet6_dev *idev = NULL;
0660e03f 427 struct ipv6hdr *hdr = ipv6_hdr(skb);
84427d53 428 struct sock *sk;
8d933670 429 struct net *net;
84427d53 430 struct ipv6_pinfo *np;
b71d1d42 431 const struct in6_addr *saddr = NULL;
1da177e4
LT
432 struct dst_entry *dst;
433 struct icmp6hdr tmp_hdr;
4c9483b2 434 struct flowi6 fl6;
1da177e4 435 struct icmpv6_msg msg;
26879da5 436 struct ipcm6_cookie ipc6;
1da177e4
LT
437 int iif = 0;
438 int addr_type = 0;
439 int len;
8d933670 440 u32 mark;
1da177e4 441
27a884dc 442 if ((u8 *)hdr < skb->head ||
29a3cad5 443 (skb_network_header(skb) + sizeof(*hdr)) > skb_tail_pointer(skb))
1da177e4
LT
444 return;
445
8d933670
ED
446 if (!skb->dev)
447 return;
448 net = dev_net(skb->dev);
449 mark = IP6_REPLY_MARK(net, skb->mark);
1da177e4 450 /*
1ab1457c 451 * Make sure we respect the rules
1da177e4 452 * i.e. RFC 1885 2.4(e)
5f5624cf 453 * Rule (e.1) is enforced by not using icmp6_send
1da177e4
LT
454 * in any code that processes icmp errors.
455 */
456 addr_type = ipv6_addr_type(&hdr->daddr);
457
446fab59 458 if (ipv6_chk_addr(net, &hdr->daddr, skb->dev, 0) ||
d94c1f92 459 ipv6_chk_acast_addr_src(net, skb->dev, &hdr->daddr))
1da177e4
LT
460 saddr = &hdr->daddr;
461
462 /*
463 * Dest addr check
464 */
465
9a6b4b39 466 if (addr_type & IPV6_ADDR_MULTICAST || skb->pkt_type != PACKET_HOST) {
1da177e4 467 if (type != ICMPV6_PKT_TOOBIG &&
1ab1457c
YH
468 !(type == ICMPV6_PARAMPROB &&
469 code == ICMPV6_UNK_OPTION &&
1da177e4
LT
470 (opt_unrec(skb, info))))
471 return;
472
473 saddr = NULL;
474 }
475
476 addr_type = ipv6_addr_type(&hdr->saddr);
477
478 /*
479 * Source addr check
480 */
481
4832c30d 482 if (__ipv6_addr_needs_scope_id(addr_type)) {
1b70d792 483 iif = icmp6_iif(skb);
4832c30d 484 } else {
79dc7e3f
DA
485 dst = skb_dst(skb);
486 iif = l3mdev_master_ifindex(dst ? dst->dev : skb->dev);
487 }
1da177e4
LT
488
489 /*
8de3351e
YH
490 * Must not send error if the source does not uniquely
491 * identify a single node (RFC2463 Section 2.4).
492 * We check unspecified / multicast addresses here,
493 * and anycast addresses will be checked later.
1da177e4
LT
494 */
495 if ((addr_type == IPV6_ADDR_ANY) || (addr_type & IPV6_ADDR_MULTICAST)) {
4b3418fb
BM
496 net_dbg_ratelimited("icmp6_send: addr_any/mcast source [%pI6c > %pI6c]\n",
497 &hdr->saddr, &hdr->daddr);
1da177e4
LT
498 return;
499 }
500
1ab1457c 501 /*
1da177e4
LT
502 * Never answer to a ICMP packet.
503 */
504 if (is_ineligible(skb)) {
4b3418fb
BM
505 net_dbg_ratelimited("icmp6_send: no reply to icmp error [%pI6c > %pI6c]\n",
506 &hdr->saddr, &hdr->daddr);
1da177e4
LT
507 return;
508 }
509
7ba91ecb
JDB
510 /* Needed by both icmp_global_allow and icmpv6_xmit_lock */
511 local_bh_disable();
512
513 /* Check global sysctl_icmp_msgs_per_sec ratelimit */
849a44de 514 if (!(skb->dev->flags&IFF_LOOPBACK) && !icmpv6_global_allow(type))
7ba91ecb
JDB
515 goto out_bh_enable;
516
79383236
MN
517 mip6_addr_swap(skb);
518
4c9483b2
DM
519 memset(&fl6, 0, sizeof(fl6));
520 fl6.flowi6_proto = IPPROTO_ICMPV6;
4e3fd7a0 521 fl6.daddr = hdr->saddr;
b1cadc1a
ED
522 if (force_saddr)
523 saddr = force_saddr;
1da177e4 524 if (saddr)
4e3fd7a0 525 fl6.saddr = *saddr;
e110861f 526 fl6.flowi6_mark = mark;
4c9483b2 527 fl6.flowi6_oif = iif;
1958b856
DM
528 fl6.fl6_icmp_type = type;
529 fl6.fl6_icmp_code = code;
e2d118a1 530 fl6.flowi6_uid = sock_net_uid(net, NULL);
b4bac172 531 fl6.mp_hash = rt6_multipath_hash(net, &fl6, skb, NULL);
4c9483b2 532 security_skb_classify_flow(skb, flowi6_to_flowi(&fl6));
1da177e4 533
fdc0bde9 534 sk = icmpv6_xmit_lock(net);
63159f29 535 if (!sk)
7ba91ecb 536 goto out_bh_enable;
c0303efe 537
e110861f 538 sk->sk_mark = mark;
fdc0bde9 539 np = inet6_sk(sk);
405666db 540
4c9483b2 541 if (!icmpv6_xrlim_allow(sk, type, &fl6))
1da177e4
LT
542 goto out;
543
544 tmp_hdr.icmp6_type = type;
545 tmp_hdr.icmp6_code = code;
546 tmp_hdr.icmp6_cksum = 0;
547 tmp_hdr.icmp6_pointer = htonl(info);
548
4c9483b2
DM
549 if (!fl6.flowi6_oif && ipv6_addr_is_multicast(&fl6.daddr))
550 fl6.flowi6_oif = np->mcast_oif;
c4062dfc
EH
551 else if (!fl6.flowi6_oif)
552 fl6.flowi6_oif = np->ucast_oif;
1da177e4 553
b515430a 554 ipcm6_init_sk(&ipc6, np);
38b7097b
HFS
555 fl6.flowlabel = ip6_make_flowinfo(ipc6.tclass, fl6.flowlabel);
556
4c9483b2 557 dst = icmpv6_route_lookup(net, skb, sk, &fl6);
b42835db 558 if (IS_ERR(dst))
1da177e4 559 goto out;
8de3351e 560
26879da5 561 ipc6.hlimit = ip6_sk_dst_hoplimit(np, &fl6, dst);
1da177e4
LT
562
563 msg.skb = skb;
bbe735e4 564 msg.offset = skb_network_offset(skb);
763ecff1 565 msg.type = type;
1da177e4
LT
566
567 len = skb->len - msg.offset;
67ba4152 568 len = min_t(unsigned int, len, IPV6_MIN_MTU - sizeof(struct ipv6hdr) - sizeof(struct icmp6hdr));
1da177e4 569 if (len < 0) {
4b3418fb
BM
570 net_dbg_ratelimited("icmp: len problem [%pI6c > %pI6c]\n",
571 &hdr->saddr, &hdr->daddr);
1da177e4
LT
572 goto out_dst_release;
573 }
574
cfdf7647
ED
575 rcu_read_lock();
576 idev = __in6_dev_get(skb->dev);
1da177e4 577
4e64b1ed
JP
578 if (ip6_append_data(sk, icmpv6_getfrag, &msg,
579 len + sizeof(struct icmp6hdr),
580 sizeof(struct icmp6hdr),
581 &ipc6, &fl6, (struct rt6_info *)dst,
5fdaa88d 582 MSG_DONTWAIT)) {
43a43b60 583 ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTERRORS);
1da177e4 584 ip6_flush_pending_frames(sk);
cfdf7647 585 } else {
4e64b1ed
JP
586 icmpv6_push_pending_frames(sk, &fl6, &tmp_hdr,
587 len + sizeof(struct icmp6hdr));
1da177e4 588 }
cfdf7647 589 rcu_read_unlock();
1da177e4
LT
590out_dst_release:
591 dst_release(dst);
592out:
405666db 593 icmpv6_xmit_unlock(sk);
7ba91ecb
JDB
594out_bh_enable:
595 local_bh_enable();
1da177e4 596}
5f5624cf
PS
597
598/* Slightly more convenient version of icmp6_send.
599 */
600void icmpv6_param_prob(struct sk_buff *skb, u8 code, int pos)
601{
b1cadc1a 602 icmp6_send(skb, ICMPV6_PARAMPROB, code, pos, NULL);
5f5624cf
PS
603 kfree_skb(skb);
604}
7159039a 605
5fbba8ac
ED
606/* Generate icmpv6 with type/code ICMPV6_DEST_UNREACH/ICMPV6_ADDR_UNREACH
607 * if sufficient data bytes are available
608 * @nhs is the size of the tunnel header(s) :
609 * Either an IPv4 header for SIT encap
610 * an IPv4 header + GRE header for GRE encap
611 */
20e1954f
ED
612int ip6_err_gen_icmpv6_unreach(struct sk_buff *skb, int nhs, int type,
613 unsigned int data_len)
5fbba8ac 614{
2d7a3b27 615 struct in6_addr temp_saddr;
5fbba8ac
ED
616 struct rt6_info *rt;
617 struct sk_buff *skb2;
20e1954f 618 u32 info = 0;
5fbba8ac
ED
619
620 if (!pskb_may_pull(skb, nhs + sizeof(struct ipv6hdr) + 8))
621 return 1;
622
20e1954f
ED
623 /* RFC 4884 (partial) support for ICMP extensions */
624 if (data_len < 128 || (data_len & 7) || skb->len < data_len)
625 data_len = 0;
626
627 skb2 = data_len ? skb_copy(skb, GFP_ATOMIC) : skb_clone(skb, GFP_ATOMIC);
5fbba8ac
ED
628
629 if (!skb2)
630 return 1;
631
632 skb_dst_drop(skb2);
633 skb_pull(skb2, nhs);
634 skb_reset_network_header(skb2);
635
b75cc8f9
DA
636 rt = rt6_lookup(dev_net(skb->dev), &ipv6_hdr(skb2)->saddr, NULL, 0,
637 skb, 0);
5fbba8ac
ED
638
639 if (rt && rt->dst.dev)
640 skb2->dev = rt->dst.dev;
641
2d7a3b27 642 ipv6_addr_set_v4mapped(ip_hdr(skb)->saddr, &temp_saddr);
20e1954f
ED
643
644 if (data_len) {
645 /* RFC 4884 (partial) support :
646 * insert 0 padding at the end, before the extensions
647 */
648 __skb_push(skb2, nhs);
649 skb_reset_network_header(skb2);
650 memmove(skb2->data, skb2->data + nhs, data_len - nhs);
651 memset(skb2->data + data_len - nhs, 0, nhs);
652 /* RFC 4884 4.5 : Length is measured in 64-bit words,
653 * and stored in reserved[0]
654 */
655 info = (data_len/8) << 24;
656 }
2d7a3b27
ED
657 if (type == ICMP_TIME_EXCEEDED)
658 icmp6_send(skb2, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT,
20e1954f 659 info, &temp_saddr);
2d7a3b27
ED
660 else
661 icmp6_send(skb2, ICMPV6_DEST_UNREACH, ICMPV6_ADDR_UNREACH,
20e1954f 662 info, &temp_saddr);
5fbba8ac
ED
663 if (rt)
664 ip6_rt_put(rt);
665
666 kfree_skb(skb2);
667
668 return 0;
669}
670EXPORT_SYMBOL(ip6_err_gen_icmpv6_unreach);
671
1da177e4
LT
672static void icmpv6_echo_reply(struct sk_buff *skb)
673{
c346dca1 674 struct net *net = dev_net(skb->dev);
84427d53 675 struct sock *sk;
1da177e4 676 struct inet6_dev *idev;
84427d53 677 struct ipv6_pinfo *np;
b71d1d42 678 const struct in6_addr *saddr = NULL;
cc70ab26 679 struct icmp6hdr *icmph = icmp6_hdr(skb);
1da177e4 680 struct icmp6hdr tmp_hdr;
4c9483b2 681 struct flowi6 fl6;
1da177e4
LT
682 struct icmpv6_msg msg;
683 struct dst_entry *dst;
26879da5 684 struct ipcm6_cookie ipc6;
e110861f 685 u32 mark = IP6_REPLY_MARK(net, skb->mark);
1da177e4 686
0660e03f 687 saddr = &ipv6_hdr(skb)->daddr;
1da177e4 688
509aba3b 689 if (!ipv6_unicast_destination(skb) &&
ec35b61e 690 !(net->ipv6.sysctl.anycast_src_echo_reply &&
2647a9b0 691 ipv6_anycast_destination(skb_dst(skb), saddr)))
1da177e4
LT
692 saddr = NULL;
693
694 memcpy(&tmp_hdr, icmph, sizeof(tmp_hdr));
695 tmp_hdr.icmp6_type = ICMPV6_ECHO_REPLY;
696
4c9483b2
DM
697 memset(&fl6, 0, sizeof(fl6));
698 fl6.flowi6_proto = IPPROTO_ICMPV6;
4e3fd7a0 699 fl6.daddr = ipv6_hdr(skb)->saddr;
1da177e4 700 if (saddr)
4e3fd7a0 701 fl6.saddr = *saddr;
1b70d792 702 fl6.flowi6_oif = icmp6_iif(skb);
1958b856 703 fl6.fl6_icmp_type = ICMPV6_ECHO_REPLY;
e110861f 704 fl6.flowi6_mark = mark;
e2d118a1 705 fl6.flowi6_uid = sock_net_uid(net, NULL);
4c9483b2 706 security_skb_classify_flow(skb, flowi6_to_flowi(&fl6));
1da177e4 707
7ba91ecb 708 local_bh_disable();
fdc0bde9 709 sk = icmpv6_xmit_lock(net);
63159f29 710 if (!sk)
7ba91ecb 711 goto out_bh_enable;
e110861f 712 sk->sk_mark = mark;
fdc0bde9 713 np = inet6_sk(sk);
405666db 714
4c9483b2
DM
715 if (!fl6.flowi6_oif && ipv6_addr_is_multicast(&fl6.daddr))
716 fl6.flowi6_oif = np->mcast_oif;
c4062dfc
EH
717 else if (!fl6.flowi6_oif)
718 fl6.flowi6_oif = np->ucast_oif;
1da177e4 719
4e64b1ed 720 if (ip6_dst_lookup(net, sk, &dst, &fl6))
1da177e4 721 goto out;
4c9483b2 722 dst = xfrm_lookup(net, dst, flowi6_to_flowi(&fl6), sk, 0);
452edd59 723 if (IS_ERR(dst))
e104411b 724 goto out;
1da177e4 725
cfdf7647 726 idev = __in6_dev_get(skb->dev);
1da177e4
LT
727
728 msg.skb = skb;
729 msg.offset = 0;
763ecff1 730 msg.type = ICMPV6_ECHO_REPLY;
1da177e4 731
b515430a 732 ipcm6_init_sk(&ipc6, np);
26879da5
WW
733 ipc6.hlimit = ip6_sk_dst_hoplimit(np, &fl6, dst);
734 ipc6.tclass = ipv6_get_dsfield(ipv6_hdr(skb));
26879da5 735
4e64b1ed
JP
736 if (ip6_append_data(sk, icmpv6_getfrag, &msg,
737 skb->len + sizeof(struct icmp6hdr),
738 sizeof(struct icmp6hdr), &ipc6, &fl6,
5fdaa88d 739 (struct rt6_info *)dst, MSG_DONTWAIT)) {
a16292a0 740 __ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTERRORS);
1da177e4 741 ip6_flush_pending_frames(sk);
cfdf7647 742 } else {
4e64b1ed
JP
743 icmpv6_push_pending_frames(sk, &fl6, &tmp_hdr,
744 skb->len + sizeof(struct icmp6hdr));
1da177e4 745 }
1da177e4 746 dst_release(dst);
1ab1457c 747out:
405666db 748 icmpv6_xmit_unlock(sk);
7ba91ecb
JDB
749out_bh_enable:
750 local_bh_enable();
1da177e4
LT
751}
752
b94f1c09 753void icmpv6_notify(struct sk_buff *skb, u8 type, u8 code, __be32 info)
1da177e4 754{
41135cc8 755 const struct inet6_protocol *ipprot;
1da177e4 756 int inner_offset;
75f2811c 757 __be16 frag_off;
f9242b6b 758 u8 nexthdr;
7304fe46 759 struct net *net = dev_net(skb->dev);
1da177e4
LT
760
761 if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
7304fe46 762 goto out;
1da177e4
LT
763
764 nexthdr = ((struct ipv6hdr *)skb->data)->nexthdr;
765 if (ipv6_ext_hdr(nexthdr)) {
766 /* now skip over extension headers */
75f2811c
JG
767 inner_offset = ipv6_skip_exthdr(skb, sizeof(struct ipv6hdr),
768 &nexthdr, &frag_off);
67ba4152 769 if (inner_offset < 0)
7304fe46 770 goto out;
1da177e4
LT
771 } else {
772 inner_offset = sizeof(struct ipv6hdr);
773 }
774
775 /* Checkin header including 8 bytes of inner protocol header. */
776 if (!pskb_may_pull(skb, inner_offset+8))
7304fe46 777 goto out;
1da177e4 778
1da177e4
LT
779 /* BUGGG_FUTURE: we should try to parse exthdrs in this packet.
780 Without this we will not able f.e. to make source routed
781 pmtu discovery.
782 Corresponding argument (opt) to notifiers is already added.
783 --ANK (980726)
784 */
785
f9242b6b 786 ipprot = rcu_dereference(inet6_protos[nexthdr]);
1da177e4
LT
787 if (ipprot && ipprot->err_handler)
788 ipprot->err_handler(skb, NULL, type, code, inner_offset, info);
1da177e4 789
69d6da0b 790 raw6_icmp_error(skb, nexthdr, type, code, inner_offset, info);
7304fe46
DJ
791 return;
792
793out:
a16292a0 794 __ICMP6_INC_STATS(net, __in6_dev_get(skb->dev), ICMP6_MIB_INERRORS);
1da177e4 795}
1ab1457c 796
1da177e4
LT
797/*
798 * Handle icmp messages
799 */
800
e5bbef20 801static int icmpv6_rcv(struct sk_buff *skb)
1da177e4 802{
e6f86b0f 803 struct net *net = dev_net(skb->dev);
1da177e4
LT
804 struct net_device *dev = skb->dev;
805 struct inet6_dev *idev = __in6_dev_get(dev);
b71d1d42 806 const struct in6_addr *saddr, *daddr;
1da177e4 807 struct icmp6hdr *hdr;
d5fdd6ba 808 u8 type;
e3e32170 809 bool success = false;
1da177e4 810
aebcf82c 811 if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb)) {
def8b4fa 812 struct sec_path *sp = skb_sec_path(skb);
8b7817f3
HX
813 int nh;
814
def8b4fa 815 if (!(sp && sp->xvec[sp->len - 1]->props.flags &
aebcf82c
HX
816 XFRM_STATE_ICMP))
817 goto drop_no_count;
818
81aded24 819 if (!pskb_may_pull(skb, sizeof(*hdr) + sizeof(struct ipv6hdr)))
8b7817f3
HX
820 goto drop_no_count;
821
822 nh = skb_network_offset(skb);
823 skb_set_network_header(skb, sizeof(*hdr));
824
825 if (!xfrm6_policy_check_reverse(NULL, XFRM_POLICY_IN, skb))
826 goto drop_no_count;
827
828 skb_set_network_header(skb, nh);
829 }
830
a16292a0 831 __ICMP6_INC_STATS(dev_net(dev), idev, ICMP6_MIB_INMSGS);
1da177e4 832
0660e03f
ACM
833 saddr = &ipv6_hdr(skb)->saddr;
834 daddr = &ipv6_hdr(skb)->daddr;
1da177e4 835
39471ac8 836 if (skb_checksum_validate(skb, IPPROTO_ICMPV6, ip6_compute_pseudo)) {
ba7a46f1
JP
837 net_dbg_ratelimited("ICMPv6 checksum failed [%pI6c > %pI6c]\n",
838 saddr, daddr);
39471ac8 839 goto csum_error;
1da177e4
LT
840 }
841
8cf22943
HX
842 if (!pskb_pull(skb, sizeof(*hdr)))
843 goto discard_it;
1da177e4 844
cc70ab26 845 hdr = icmp6_hdr(skb);
1da177e4
LT
846
847 type = hdr->icmp6_type;
848
f3832ed2 849 ICMP6MSGIN_INC_STATS(dev_net(dev), idev, type);
1da177e4
LT
850
851 switch (type) {
852 case ICMPV6_ECHO_REQUEST:
e6f86b0f
VJ
853 if (!net->ipv6.sysctl.icmpv6_echo_ignore_all)
854 icmpv6_echo_reply(skb);
1da177e4
LT
855 break;
856
857 case ICMPV6_ECHO_REPLY:
e3e32170 858 success = ping_rcv(skb);
1da177e4
LT
859 break;
860
861 case ICMPV6_PKT_TOOBIG:
862 /* BUGGG_FUTURE: if packet contains rthdr, we cannot update
863 standard destination cache. Seems, only "advanced"
864 destination cache will allow to solve this problem
865 --ANK (980726)
866 */
867 if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
868 goto discard_it;
cc70ab26 869 hdr = icmp6_hdr(skb);
1da177e4 870
275757e6
GS
871 /* to notify */
872 /* fall through */
1da177e4
LT
873 case ICMPV6_DEST_UNREACH:
874 case ICMPV6_TIME_EXCEED:
875 case ICMPV6_PARAMPROB:
876 icmpv6_notify(skb, type, hdr->icmp6_code, hdr->icmp6_mtu);
877 break;
878
879 case NDISC_ROUTER_SOLICITATION:
880 case NDISC_ROUTER_ADVERTISEMENT:
881 case NDISC_NEIGHBOUR_SOLICITATION:
882 case NDISC_NEIGHBOUR_ADVERTISEMENT:
883 case NDISC_REDIRECT:
884 ndisc_rcv(skb);
885 break;
886
887 case ICMPV6_MGM_QUERY:
888 igmp6_event_query(skb);
889 break;
890
891 case ICMPV6_MGM_REPORT:
892 igmp6_event_report(skb);
893 break;
894
895 case ICMPV6_MGM_REDUCTION:
896 case ICMPV6_NI_QUERY:
897 case ICMPV6_NI_REPLY:
898 case ICMPV6_MLD2_REPORT:
899 case ICMPV6_DHAAD_REQUEST:
900 case ICMPV6_DHAAD_REPLY:
901 case ICMPV6_MOBILE_PREFIX_SOL:
902 case ICMPV6_MOBILE_PREFIX_ADV:
903 break;
904
905 default:
1da177e4
LT
906 /* informational */
907 if (type & ICMPV6_INFOMSG_MASK)
908 break;
909
4b3418fb
BM
910 net_dbg_ratelimited("icmpv6: msg of unknown type [%pI6c > %pI6c]\n",
911 saddr, daddr);
ea85a0a2 912
1ab1457c
YH
913 /*
914 * error of unknown type.
915 * must pass to upper level
1da177e4
LT
916 */
917
918 icmpv6_notify(skb, type, hdr->icmp6_code, hdr->icmp6_mtu);
3ff50b79
SH
919 }
920
e3e32170
RJ
921 /* until the v6 path can be better sorted assume failure and
922 * preserve the status quo behaviour for the rest of the paths to here
923 */
924 if (success)
925 consume_skb(skb);
926 else
927 kfree_skb(skb);
928
1da177e4
LT
929 return 0;
930
6a5dc9e5 931csum_error:
a16292a0 932 __ICMP6_INC_STATS(dev_net(dev), idev, ICMP6_MIB_CSUMERRORS);
1da177e4 933discard_it:
a16292a0 934 __ICMP6_INC_STATS(dev_net(dev), idev, ICMP6_MIB_INERRORS);
8b7817f3 935drop_no_count:
1da177e4
LT
936 kfree_skb(skb);
937 return 0;
938}
939
4c9483b2 940void icmpv6_flow_init(struct sock *sk, struct flowi6 *fl6,
95e41e93
YH
941 u8 type,
942 const struct in6_addr *saddr,
943 const struct in6_addr *daddr,
944 int oif)
945{
4c9483b2 946 memset(fl6, 0, sizeof(*fl6));
4e3fd7a0
AD
947 fl6->saddr = *saddr;
948 fl6->daddr = *daddr;
67ba4152 949 fl6->flowi6_proto = IPPROTO_ICMPV6;
1958b856
DM
950 fl6->fl6_icmp_type = type;
951 fl6->fl6_icmp_code = 0;
4c9483b2
DM
952 fl6->flowi6_oif = oif;
953 security_sk_classify_flow(sk, flowi6_to_flowi(fl6));
95e41e93
YH
954}
955
3232a1ef
KW
956static void __net_exit icmpv6_sk_exit(struct net *net)
957{
958 int i;
959
960 for_each_possible_cpu(i)
961 inet_ctl_sock_destroy(net->ipv6.icmp_sk[i]);
962 kfree(net->ipv6.icmp_sk);
963}
964
98c6d1b2 965static int __net_init icmpv6_sk_init(struct net *net)
1da177e4
LT
966{
967 struct sock *sk;
3232a1ef 968 int err, i;
1da177e4 969
98c6d1b2 970 net->ipv6.icmp_sk =
6396bb22 971 kcalloc(nr_cpu_ids, sizeof(struct sock *), GFP_KERNEL);
63159f29 972 if (!net->ipv6.icmp_sk)
79c91159
DL
973 return -ENOMEM;
974
6f912042 975 for_each_possible_cpu(i) {
1ed8516f
DL
976 err = inet_ctl_sock_create(&sk, PF_INET6,
977 SOCK_RAW, IPPROTO_ICMPV6, net);
1da177e4 978 if (err < 0) {
f3213831 979 pr_err("Failed to initialize the ICMP6 control socket (err %d)\n",
1da177e4
LT
980 err);
981 goto fail;
982 }
983
1ed8516f 984 net->ipv6.icmp_sk[i] = sk;
5c8cafd6 985
1da177e4
LT
986 /* Enough space for 2 64K ICMP packets, including
987 * sk_buff struct overhead.
988 */
87fb4b7b 989 sk->sk_sndbuf = 2 * SKB_TRUESIZE(64 * 1024);
1da177e4 990 }
1da177e4
LT
991 return 0;
992
993 fail:
3232a1ef 994 icmpv6_sk_exit(net);
1da177e4
LT
995 return err;
996}
997
8ed7edce 998static struct pernet_operations icmpv6_sk_ops = {
67ba4152
IM
999 .init = icmpv6_sk_init,
1000 .exit = icmpv6_sk_exit,
98c6d1b2
DL
1001};
1002
1003int __init icmpv6_init(void)
1004{
1005 int err;
1006
1007 err = register_pernet_subsys(&icmpv6_sk_ops);
1008 if (err < 0)
1009 return err;
1010
1011 err = -EAGAIN;
1012 if (inet6_add_protocol(&icmpv6_protocol, IPPROTO_ICMPV6) < 0)
1013 goto fail;
5f5624cf
PS
1014
1015 err = inet6_register_icmp_sender(icmp6_send);
1016 if (err)
1017 goto sender_reg_err;
98c6d1b2
DL
1018 return 0;
1019
5f5624cf
PS
1020sender_reg_err:
1021 inet6_del_protocol(&icmpv6_protocol, IPPROTO_ICMPV6);
98c6d1b2 1022fail:
f3213831 1023 pr_err("Failed to register ICMP6 protocol\n");
98c6d1b2
DL
1024 unregister_pernet_subsys(&icmpv6_sk_ops);
1025 return err;
1026}
1027
8ed7edce 1028void icmpv6_cleanup(void)
98c6d1b2 1029{
5f5624cf 1030 inet6_unregister_icmp_sender(icmp6_send);
98c6d1b2 1031 unregister_pernet_subsys(&icmpv6_sk_ops);
1da177e4
LT
1032 inet6_del_protocol(&icmpv6_protocol, IPPROTO_ICMPV6);
1033}
1034
98c6d1b2 1035
9b5b5cff 1036static const struct icmp6_err {
1da177e4
LT
1037 int err;
1038 int fatal;
1039} tab_unreach[] = {
1040 { /* NOROUTE */
1041 .err = ENETUNREACH,
1042 .fatal = 0,
1043 },
1044 { /* ADM_PROHIBITED */
1045 .err = EACCES,
1046 .fatal = 1,
1047 },
1048 { /* Was NOT_NEIGHBOUR, now reserved */
1049 .err = EHOSTUNREACH,
1050 .fatal = 0,
1051 },
1052 { /* ADDR_UNREACH */
1053 .err = EHOSTUNREACH,
1054 .fatal = 0,
1055 },
1056 { /* PORT_UNREACH */
1057 .err = ECONNREFUSED,
1058 .fatal = 1,
1059 },
61e76b17
JB
1060 { /* POLICY_FAIL */
1061 .err = EACCES,
1062 .fatal = 1,
1063 },
1064 { /* REJECT_ROUTE */
1065 .err = EACCES,
1066 .fatal = 1,
1067 },
1da177e4
LT
1068};
1069
d5fdd6ba 1070int icmpv6_err_convert(u8 type, u8 code, int *err)
1da177e4
LT
1071{
1072 int fatal = 0;
1073
1074 *err = EPROTO;
1075
1076 switch (type) {
1077 case ICMPV6_DEST_UNREACH:
1078 fatal = 1;
61e76b17 1079 if (code < ARRAY_SIZE(tab_unreach)) {
1da177e4
LT
1080 *err = tab_unreach[code].err;
1081 fatal = tab_unreach[code].fatal;
1082 }
1083 break;
1084
1085 case ICMPV6_PKT_TOOBIG:
1086 *err = EMSGSIZE;
1087 break;
1ab1457c 1088
1da177e4
LT
1089 case ICMPV6_PARAMPROB:
1090 *err = EPROTO;
1091 fatal = 1;
1092 break;
1093
1094 case ICMPV6_TIME_EXCEED:
1095 *err = EHOSTUNREACH;
1096 break;
3ff50b79 1097 }
1da177e4
LT
1098
1099 return fatal;
1100}
7159039a
YH
1101EXPORT_SYMBOL(icmpv6_err_convert);
1102
1da177e4 1103#ifdef CONFIG_SYSCTL
e8243534 1104static struct ctl_table ipv6_icmp_table_template[] = {
1da177e4 1105 {
1da177e4 1106 .procname = "ratelimit",
41a76906 1107 .data = &init_net.ipv6.sysctl.icmpv6_time,
1da177e4
LT
1108 .maxlen = sizeof(int),
1109 .mode = 0644,
6d9f239a 1110 .proc_handler = proc_dointvec_ms_jiffies,
1da177e4 1111 },
e6f86b0f
VJ
1112 {
1113 .procname = "echo_ignore_all",
1114 .data = &init_net.ipv6.sysctl.icmpv6_echo_ignore_all,
1115 .maxlen = sizeof(int),
1116 .mode = 0644,
1117 .proc_handler = proc_dointvec,
1118 },
f8572d8f 1119 { },
1da177e4 1120};
760f2d01 1121
2c8c1e72 1122struct ctl_table * __net_init ipv6_icmp_sysctl_init(struct net *net)
760f2d01
DL
1123{
1124 struct ctl_table *table;
1125
1126 table = kmemdup(ipv6_icmp_table_template,
1127 sizeof(ipv6_icmp_table_template),
1128 GFP_KERNEL);
5ee09105 1129
e6f86b0f 1130 if (table) {
5ee09105 1131 table[0].data = &net->ipv6.sysctl.icmpv6_time;
e6f86b0f
VJ
1132 table[1].data = &net->ipv6.sysctl.icmpv6_echo_ignore_all;
1133 }
760f2d01
DL
1134 return table;
1135}
1da177e4 1136#endif