Linux Audio

Check our new training course

Loading...
v4.17
   1/*
   2 *	Neighbour Discovery for IPv6
   3 *	Linux INET6 implementation
   4 *
   5 *	Authors:
   6 *	Pedro Roque		<roque@di.fc.ul.pt>
   7 *	Mike Shaver		<shaver@ingenia.com>
   8 *
   9 *	This program is free software; you can redistribute it and/or
  10 *      modify it under the terms of the GNU General Public License
  11 *      as published by the Free Software Foundation; either version
  12 *      2 of the License, or (at your option) any later version.
  13 */
  14
  15/*
  16 *	Changes:
  17 *
  18 *	Alexey I. Froloff		:	RFC6106 (DNSSL) support
  19 *	Pierre Ynard			:	export userland ND options
  20 *						through netlink (RDNSS support)
  21 *	Lars Fenneberg			:	fixed MTU setting on receipt
  22 *						of an RA.
  23 *	Janos Farkas			:	kmalloc failure checks
  24 *	Alexey Kuznetsov		:	state machine reworked
  25 *						and moved to net/core.
  26 *	Pekka Savola			:	RFC2461 validation
  27 *	YOSHIFUJI Hideaki @USAGI	:	Verify ND options properly
  28 */
  29
  30#define pr_fmt(fmt) "ICMPv6: " fmt
  31
  32#include <linux/module.h>
  33#include <linux/errno.h>
  34#include <linux/types.h>
  35#include <linux/socket.h>
  36#include <linux/sockios.h>
  37#include <linux/sched.h>
  38#include <linux/net.h>
  39#include <linux/in6.h>
  40#include <linux/route.h>
  41#include <linux/init.h>
  42#include <linux/rcupdate.h>
  43#include <linux/slab.h>
  44#ifdef CONFIG_SYSCTL
  45#include <linux/sysctl.h>
  46#endif
  47
  48#include <linux/if_addr.h>
  49#include <linux/if_ether.h>
  50#include <linux/if_arp.h>
  51#include <linux/ipv6.h>
  52#include <linux/icmpv6.h>
  53#include <linux/jhash.h>
  54
  55#include <net/sock.h>
  56#include <net/snmp.h>
  57
  58#include <net/ipv6.h>
  59#include <net/protocol.h>
  60#include <net/ndisc.h>
  61#include <net/ip6_route.h>
  62#include <net/addrconf.h>
  63#include <net/icmp.h>
  64
  65#include <net/netlink.h>
  66#include <linux/rtnetlink.h>
  67
  68#include <net/flow.h>
  69#include <net/ip6_checksum.h>
  70#include <net/inet_common.h>
 
  71#include <linux/proc_fs.h>
  72
  73#include <linux/netfilter.h>
  74#include <linux/netfilter_ipv6.h>
  75
 
 
 
 
 
 
 
 
 
  76static u32 ndisc_hash(const void *pkey,
  77		      const struct net_device *dev,
  78		      __u32 *hash_rnd);
  79static bool ndisc_key_eq(const struct neighbour *neigh, const void *pkey);
  80static int ndisc_constructor(struct neighbour *neigh);
  81static void ndisc_solicit(struct neighbour *neigh, struct sk_buff *skb);
  82static void ndisc_error_report(struct neighbour *neigh, struct sk_buff *skb);
  83static int pndisc_constructor(struct pneigh_entry *n);
  84static void pndisc_destructor(struct pneigh_entry *n);
  85static void pndisc_redo(struct sk_buff *skb);
  86
  87static const struct neigh_ops ndisc_generic_ops = {
  88	.family =		AF_INET6,
  89	.solicit =		ndisc_solicit,
  90	.error_report =		ndisc_error_report,
  91	.output =		neigh_resolve_output,
  92	.connected_output =	neigh_connected_output,
  93};
  94
  95static const struct neigh_ops ndisc_hh_ops = {
  96	.family =		AF_INET6,
  97	.solicit =		ndisc_solicit,
  98	.error_report =		ndisc_error_report,
  99	.output =		neigh_resolve_output,
 100	.connected_output =	neigh_resolve_output,
 101};
 102
 103
 104static const struct neigh_ops ndisc_direct_ops = {
 105	.family =		AF_INET6,
 106	.output =		neigh_direct_output,
 107	.connected_output =	neigh_direct_output,
 108};
 109
 110struct neigh_table nd_tbl = {
 111	.family =	AF_INET6,
 112	.key_len =	sizeof(struct in6_addr),
 113	.protocol =	cpu_to_be16(ETH_P_IPV6),
 114	.hash =		ndisc_hash,
 115	.key_eq =	ndisc_key_eq,
 116	.constructor =	ndisc_constructor,
 117	.pconstructor =	pndisc_constructor,
 118	.pdestructor =	pndisc_destructor,
 119	.proxy_redo =	pndisc_redo,
 120	.id =		"ndisc_cache",
 121	.parms = {
 122		.tbl			= &nd_tbl,
 123		.reachable_time		= ND_REACHABLE_TIME,
 124		.data = {
 125			[NEIGH_VAR_MCAST_PROBES] = 3,
 126			[NEIGH_VAR_UCAST_PROBES] = 3,
 127			[NEIGH_VAR_RETRANS_TIME] = ND_RETRANS_TIMER,
 128			[NEIGH_VAR_BASE_REACHABLE_TIME] = ND_REACHABLE_TIME,
 129			[NEIGH_VAR_DELAY_PROBE_TIME] = 5 * HZ,
 130			[NEIGH_VAR_GC_STALETIME] = 60 * HZ,
 131			[NEIGH_VAR_QUEUE_LEN_BYTES] = SK_WMEM_MAX,
 132			[NEIGH_VAR_PROXY_QLEN] = 64,
 133			[NEIGH_VAR_ANYCAST_DELAY] = 1 * HZ,
 134			[NEIGH_VAR_PROXY_DELAY] = (8 * HZ) / 10,
 135		},
 136	},
 137	.gc_interval =	  30 * HZ,
 138	.gc_thresh1 =	 128,
 139	.gc_thresh2 =	 512,
 140	.gc_thresh3 =	1024,
 141};
 142EXPORT_SYMBOL_GPL(nd_tbl);
 143
 144void __ndisc_fill_addr_option(struct sk_buff *skb, int type, void *data,
 145			      int data_len, int pad)
 146{
 147	int space = __ndisc_opt_addr_space(data_len, pad);
 
 
 148	u8 *opt = skb_put(skb, space);
 149
 150	opt[0] = type;
 151	opt[1] = space>>3;
 152
 153	memset(opt + 2, 0, pad);
 154	opt   += pad;
 155	space -= pad;
 156
 157	memcpy(opt+2, data, data_len);
 158	data_len += 2;
 159	opt += data_len;
 160	space -= data_len;
 161	if (space > 0)
 162		memset(opt, 0, space);
 163}
 164EXPORT_SYMBOL_GPL(__ndisc_fill_addr_option);
 165
 166static inline void ndisc_fill_addr_option(struct sk_buff *skb, int type,
 167					  void *data, u8 icmp6_type)
 168{
 169	__ndisc_fill_addr_option(skb, type, data, skb->dev->addr_len,
 170				 ndisc_addr_option_pad(skb->dev->type));
 171	ndisc_ops_fill_addr_option(skb->dev, skb, icmp6_type);
 172}
 173
 174static inline void ndisc_fill_redirect_addr_option(struct sk_buff *skb,
 175						   void *ha,
 176						   const u8 *ops_data)
 177{
 178	ndisc_fill_addr_option(skb, ND_OPT_TARGET_LL_ADDR, ha, NDISC_REDIRECT);
 179	ndisc_ops_fill_redirect_addr_option(skb->dev, skb, ops_data);
 180}
 181
 182static struct nd_opt_hdr *ndisc_next_option(struct nd_opt_hdr *cur,
 183					    struct nd_opt_hdr *end)
 184{
 185	int type;
 186	if (!cur || !end || cur >= end)
 187		return NULL;
 188	type = cur->nd_opt_type;
 189	do {
 190		cur = ((void *)cur) + (cur->nd_opt_len << 3);
 191	} while (cur < end && cur->nd_opt_type != type);
 192	return cur <= end && cur->nd_opt_type == type ? cur : NULL;
 193}
 194
 195static inline int ndisc_is_useropt(const struct net_device *dev,
 196				   struct nd_opt_hdr *opt)
 197{
 198	return opt->nd_opt_type == ND_OPT_RDNSS ||
 199		opt->nd_opt_type == ND_OPT_DNSSL ||
 200		ndisc_ops_is_useropt(dev, opt->nd_opt_type);
 201}
 202
 203static struct nd_opt_hdr *ndisc_next_useropt(const struct net_device *dev,
 204					     struct nd_opt_hdr *cur,
 205					     struct nd_opt_hdr *end)
 206{
 207	if (!cur || !end || cur >= end)
 208		return NULL;
 209	do {
 210		cur = ((void *)cur) + (cur->nd_opt_len << 3);
 211	} while (cur < end && !ndisc_is_useropt(dev, cur));
 212	return cur <= end && ndisc_is_useropt(dev, cur) ? cur : NULL;
 213}
 214
 215struct ndisc_options *ndisc_parse_options(const struct net_device *dev,
 216					  u8 *opt, int opt_len,
 217					  struct ndisc_options *ndopts)
 218{
 219	struct nd_opt_hdr *nd_opt = (struct nd_opt_hdr *)opt;
 220
 221	if (!nd_opt || opt_len < 0 || !ndopts)
 222		return NULL;
 223	memset(ndopts, 0, sizeof(*ndopts));
 224	while (opt_len) {
 225		int l;
 226		if (opt_len < sizeof(struct nd_opt_hdr))
 227			return NULL;
 228		l = nd_opt->nd_opt_len << 3;
 229		if (opt_len < l || l == 0)
 230			return NULL;
 231		if (ndisc_ops_parse_options(dev, nd_opt, ndopts))
 232			goto next_opt;
 233		switch (nd_opt->nd_opt_type) {
 234		case ND_OPT_SOURCE_LL_ADDR:
 235		case ND_OPT_TARGET_LL_ADDR:
 236		case ND_OPT_MTU:
 237		case ND_OPT_NONCE:
 238		case ND_OPT_REDIRECT_HDR:
 239			if (ndopts->nd_opt_array[nd_opt->nd_opt_type]) {
 240				ND_PRINTK(2, warn,
 241					  "%s: duplicated ND6 option found: type=%d\n",
 242					  __func__, nd_opt->nd_opt_type);
 243			} else {
 244				ndopts->nd_opt_array[nd_opt->nd_opt_type] = nd_opt;
 245			}
 246			break;
 247		case ND_OPT_PREFIX_INFO:
 248			ndopts->nd_opts_pi_end = nd_opt;
 249			if (!ndopts->nd_opt_array[nd_opt->nd_opt_type])
 250				ndopts->nd_opt_array[nd_opt->nd_opt_type] = nd_opt;
 251			break;
 252#ifdef CONFIG_IPV6_ROUTE_INFO
 253		case ND_OPT_ROUTE_INFO:
 254			ndopts->nd_opts_ri_end = nd_opt;
 255			if (!ndopts->nd_opts_ri)
 256				ndopts->nd_opts_ri = nd_opt;
 257			break;
 258#endif
 259		default:
 260			if (ndisc_is_useropt(dev, nd_opt)) {
 261				ndopts->nd_useropts_end = nd_opt;
 262				if (!ndopts->nd_useropts)
 263					ndopts->nd_useropts = nd_opt;
 264			} else {
 265				/*
 266				 * Unknown options must be silently ignored,
 267				 * to accommodate future extension to the
 268				 * protocol.
 269				 */
 270				ND_PRINTK(2, notice,
 271					  "%s: ignored unsupported option; type=%d, len=%d\n",
 272					  __func__,
 273					  nd_opt->nd_opt_type,
 274					  nd_opt->nd_opt_len);
 275			}
 276		}
 277next_opt:
 278		opt_len -= l;
 279		nd_opt = ((void *)nd_opt) + l;
 280	}
 281	return ndopts;
 282}
 283
 284int ndisc_mc_map(const struct in6_addr *addr, char *buf, struct net_device *dev, int dir)
 285{
 286	switch (dev->type) {
 287	case ARPHRD_ETHER:
 288	case ARPHRD_IEEE802:	/* Not sure. Check it later. --ANK */
 289	case ARPHRD_FDDI:
 290		ipv6_eth_mc_map(addr, buf);
 291		return 0;
 292	case ARPHRD_ARCNET:
 293		ipv6_arcnet_mc_map(addr, buf);
 294		return 0;
 295	case ARPHRD_INFINIBAND:
 296		ipv6_ib_mc_map(addr, dev->broadcast, buf);
 297		return 0;
 298	case ARPHRD_IPGRE:
 299		return ipv6_ipgre_mc_map(addr, dev->broadcast, buf);
 300	default:
 301		if (dir) {
 302			memcpy(buf, dev->broadcast, dev->addr_len);
 303			return 0;
 304		}
 305	}
 306	return -EINVAL;
 307}
 308EXPORT_SYMBOL(ndisc_mc_map);
 309
 310static u32 ndisc_hash(const void *pkey,
 311		      const struct net_device *dev,
 312		      __u32 *hash_rnd)
 313{
 314	return ndisc_hashfn(pkey, dev, hash_rnd);
 315}
 316
 317static bool ndisc_key_eq(const struct neighbour *n, const void *pkey)
 318{
 319	return neigh_key_eq128(n, pkey);
 320}
 321
 322static int ndisc_constructor(struct neighbour *neigh)
 323{
 324	struct in6_addr *addr = (struct in6_addr *)&neigh->primary_key;
 325	struct net_device *dev = neigh->dev;
 326	struct inet6_dev *in6_dev;
 327	struct neigh_parms *parms;
 328	bool is_multicast = ipv6_addr_is_multicast(addr);
 329
 330	in6_dev = in6_dev_get(dev);
 331	if (!in6_dev) {
 332		return -EINVAL;
 333	}
 334
 335	parms = in6_dev->nd_parms;
 336	__neigh_parms_put(neigh->parms);
 337	neigh->parms = neigh_parms_clone(parms);
 338
 339	neigh->type = is_multicast ? RTN_MULTICAST : RTN_UNICAST;
 340	if (!dev->header_ops) {
 341		neigh->nud_state = NUD_NOARP;
 342		neigh->ops = &ndisc_direct_ops;
 343		neigh->output = neigh_direct_output;
 344	} else {
 345		if (is_multicast) {
 346			neigh->nud_state = NUD_NOARP;
 347			ndisc_mc_map(addr, neigh->ha, dev, 1);
 348		} else if (dev->flags&(IFF_NOARP|IFF_LOOPBACK)) {
 349			neigh->nud_state = NUD_NOARP;
 350			memcpy(neigh->ha, dev->dev_addr, dev->addr_len);
 351			if (dev->flags&IFF_LOOPBACK)
 352				neigh->type = RTN_LOCAL;
 353		} else if (dev->flags&IFF_POINTOPOINT) {
 354			neigh->nud_state = NUD_NOARP;
 355			memcpy(neigh->ha, dev->broadcast, dev->addr_len);
 356		}
 357		if (dev->header_ops->cache)
 358			neigh->ops = &ndisc_hh_ops;
 359		else
 360			neigh->ops = &ndisc_generic_ops;
 361		if (neigh->nud_state&NUD_VALID)
 362			neigh->output = neigh->ops->connected_output;
 363		else
 364			neigh->output = neigh->ops->output;
 365	}
 366	in6_dev_put(in6_dev);
 367	return 0;
 368}
 369
 370static int pndisc_constructor(struct pneigh_entry *n)
 371{
 372	struct in6_addr *addr = (struct in6_addr *)&n->key;
 373	struct in6_addr maddr;
 374	struct net_device *dev = n->dev;
 375
 376	if (!dev || !__in6_dev_get(dev))
 377		return -EINVAL;
 378	addrconf_addr_solict_mult(addr, &maddr);
 379	ipv6_dev_mc_inc(dev, &maddr);
 380	return 0;
 381}
 382
 383static void pndisc_destructor(struct pneigh_entry *n)
 384{
 385	struct in6_addr *addr = (struct in6_addr *)&n->key;
 386	struct in6_addr maddr;
 387	struct net_device *dev = n->dev;
 388
 389	if (!dev || !__in6_dev_get(dev))
 390		return;
 391	addrconf_addr_solict_mult(addr, &maddr);
 392	ipv6_dev_mc_dec(dev, &maddr);
 393}
 394
 395static struct sk_buff *ndisc_alloc_skb(struct net_device *dev,
 396				       int len)
 397{
 398	int hlen = LL_RESERVED_SPACE(dev);
 399	int tlen = dev->needed_tailroom;
 400	struct sock *sk = dev_net(dev)->ipv6.ndisc_sk;
 401	struct sk_buff *skb;
 402
 403	skb = alloc_skb(hlen + sizeof(struct ipv6hdr) + len + tlen, GFP_ATOMIC);
 404	if (!skb) {
 405		ND_PRINTK(0, err, "ndisc: %s failed to allocate an skb\n",
 406			  __func__);
 407		return NULL;
 408	}
 409
 410	skb->protocol = htons(ETH_P_IPV6);
 411	skb->dev = dev;
 412
 413	skb_reserve(skb, hlen + sizeof(struct ipv6hdr));
 414	skb_reset_transport_header(skb);
 415
 416	/* Manually assign socket ownership as we avoid calling
 417	 * sock_alloc_send_pskb() to bypass wmem buffer limits
 418	 */
 419	skb_set_owner_w(skb, sk);
 420
 421	return skb;
 422}
 423
 424static void ip6_nd_hdr(struct sk_buff *skb,
 425		       const struct in6_addr *saddr,
 426		       const struct in6_addr *daddr,
 427		       int hop_limit, int len)
 428{
 429	struct ipv6hdr *hdr;
 430	struct inet6_dev *idev;
 431	unsigned tclass;
 432
 433	rcu_read_lock();
 434	idev = __in6_dev_get(skb->dev);
 435	tclass = idev ? idev->cnf.ndisc_tclass : 0;
 436	rcu_read_unlock();
 437
 438	skb_push(skb, sizeof(*hdr));
 439	skb_reset_network_header(skb);
 440	hdr = ipv6_hdr(skb);
 441
 442	ip6_flow_hdr(hdr, tclass, 0);
 443
 444	hdr->payload_len = htons(len);
 445	hdr->nexthdr = IPPROTO_ICMPV6;
 446	hdr->hop_limit = hop_limit;
 447
 448	hdr->saddr = *saddr;
 449	hdr->daddr = *daddr;
 450}
 451
 452static void ndisc_send_skb(struct sk_buff *skb,
 453			   const struct in6_addr *daddr,
 454			   const struct in6_addr *saddr)
 455{
 456	struct dst_entry *dst = skb_dst(skb);
 457	struct net *net = dev_net(skb->dev);
 458	struct sock *sk = net->ipv6.ndisc_sk;
 459	struct inet6_dev *idev;
 460	int err;
 461	struct icmp6hdr *icmp6h = icmp6_hdr(skb);
 462	u8 type;
 463
 464	type = icmp6h->icmp6_type;
 465
 466	if (!dst) {
 467		struct flowi6 fl6;
 468		int oif = skb->dev->ifindex;
 469
 470		icmpv6_flow_init(sk, &fl6, type, saddr, daddr, oif);
 
 
 471		dst = icmp6_dst_alloc(skb->dev, &fl6);
 472		if (IS_ERR(dst)) {
 473			kfree_skb(skb);
 474			return;
 475		}
 476
 477		skb_dst_set(skb, dst);
 478	}
 479
 480	icmp6h->icmp6_cksum = csum_ipv6_magic(saddr, daddr, skb->len,
 481					      IPPROTO_ICMPV6,
 482					      csum_partial(icmp6h,
 483							   skb->len, 0));
 484
 485	ip6_nd_hdr(skb, saddr, daddr, inet6_sk(sk)->hop_limit, skb->len);
 486
 487	rcu_read_lock();
 488	idev = __in6_dev_get(dst->dev);
 489	IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUT, skb->len);
 490
 491	err = NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT,
 492		      net, sk, skb, NULL, dst->dev,
 493		      dst_output);
 494	if (!err) {
 495		ICMP6MSGOUT_INC_STATS(net, idev, type);
 496		ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS);
 497	}
 498
 499	rcu_read_unlock();
 500}
 501
 502void ndisc_send_na(struct net_device *dev, const struct in6_addr *daddr,
 503		   const struct in6_addr *solicited_addr,
 504		   bool router, bool solicited, bool override, bool inc_opt)
 505{
 506	struct sk_buff *skb;
 507	struct in6_addr tmpaddr;
 508	struct inet6_ifaddr *ifp;
 509	const struct in6_addr *src_addr;
 510	struct nd_msg *msg;
 511	int optlen = 0;
 512
 513	/* for anycast or proxy, solicited_addr != src_addr */
 514	ifp = ipv6_get_ifaddr(dev_net(dev), solicited_addr, dev, 1);
 515	if (ifp) {
 516		src_addr = solicited_addr;
 517		if (ifp->flags & IFA_F_OPTIMISTIC)
 518			override = false;
 519		inc_opt |= ifp->idev->cnf.force_tllao;
 520		in6_ifa_put(ifp);
 521	} else {
 522		if (ipv6_dev_get_saddr(dev_net(dev), dev, daddr,
 523				       inet6_sk(dev_net(dev)->ipv6.ndisc_sk)->srcprefs,
 524				       &tmpaddr))
 525			return;
 526		src_addr = &tmpaddr;
 527	}
 528
 529	if (!dev->addr_len)
 530		inc_opt = false;
 531	if (inc_opt)
 532		optlen += ndisc_opt_addr_space(dev,
 533					       NDISC_NEIGHBOUR_ADVERTISEMENT);
 534
 535	skb = ndisc_alloc_skb(dev, sizeof(*msg) + optlen);
 536	if (!skb)
 537		return;
 538
 539	msg = skb_put(skb, sizeof(*msg));
 540	*msg = (struct nd_msg) {
 541		.icmph = {
 542			.icmp6_type = NDISC_NEIGHBOUR_ADVERTISEMENT,
 543			.icmp6_router = router,
 544			.icmp6_solicited = solicited,
 545			.icmp6_override = override,
 546		},
 547		.target = *solicited_addr,
 548	};
 549
 550	if (inc_opt)
 551		ndisc_fill_addr_option(skb, ND_OPT_TARGET_LL_ADDR,
 552				       dev->dev_addr,
 553				       NDISC_NEIGHBOUR_ADVERTISEMENT);
 554
 555	ndisc_send_skb(skb, daddr, src_addr);
 556}
 557
 558static void ndisc_send_unsol_na(struct net_device *dev)
 559{
 560	struct inet6_dev *idev;
 561	struct inet6_ifaddr *ifa;
 562
 563	idev = in6_dev_get(dev);
 564	if (!idev)
 565		return;
 566
 567	read_lock_bh(&idev->lock);
 568	list_for_each_entry(ifa, &idev->addr_list, if_list) {
 569		/* skip tentative addresses until dad completes */
 570		if (ifa->flags & IFA_F_TENTATIVE &&
 571		    !(ifa->flags & IFA_F_OPTIMISTIC))
 572			continue;
 573
 574		ndisc_send_na(dev, &in6addr_linklocal_allnodes, &ifa->addr,
 575			      /*router=*/ !!idev->cnf.forwarding,
 576			      /*solicited=*/ false, /*override=*/ true,
 577			      /*inc_opt=*/ true);
 578	}
 579	read_unlock_bh(&idev->lock);
 580
 581	in6_dev_put(idev);
 582}
 583
 584void ndisc_send_ns(struct net_device *dev, const struct in6_addr *solicit,
 585		   const struct in6_addr *daddr, const struct in6_addr *saddr,
 586		   u64 nonce)
 587{
 588	struct sk_buff *skb;
 589	struct in6_addr addr_buf;
 590	int inc_opt = dev->addr_len;
 591	int optlen = 0;
 592	struct nd_msg *msg;
 593
 594	if (!saddr) {
 595		if (ipv6_get_lladdr(dev, &addr_buf,
 596				   (IFA_F_TENTATIVE|IFA_F_OPTIMISTIC)))
 597			return;
 598		saddr = &addr_buf;
 599	}
 600
 601	if (ipv6_addr_any(saddr))
 602		inc_opt = false;
 603	if (inc_opt)
 604		optlen += ndisc_opt_addr_space(dev,
 605					       NDISC_NEIGHBOUR_SOLICITATION);
 606	if (nonce != 0)
 607		optlen += 8;
 608
 609	skb = ndisc_alloc_skb(dev, sizeof(*msg) + optlen);
 610	if (!skb)
 611		return;
 612
 613	msg = skb_put(skb, sizeof(*msg));
 614	*msg = (struct nd_msg) {
 615		.icmph = {
 616			.icmp6_type = NDISC_NEIGHBOUR_SOLICITATION,
 617		},
 618		.target = *solicit,
 619	};
 620
 621	if (inc_opt)
 622		ndisc_fill_addr_option(skb, ND_OPT_SOURCE_LL_ADDR,
 623				       dev->dev_addr,
 624				       NDISC_NEIGHBOUR_SOLICITATION);
 625	if (nonce != 0) {
 626		u8 *opt = skb_put(skb, 8);
 627
 628		opt[0] = ND_OPT_NONCE;
 629		opt[1] = 8 >> 3;
 630		memcpy(opt + 2, &nonce, 6);
 631	}
 632
 633	ndisc_send_skb(skb, daddr, saddr);
 634}
 635
 636void ndisc_send_rs(struct net_device *dev, const struct in6_addr *saddr,
 637		   const struct in6_addr *daddr)
 638{
 639	struct sk_buff *skb;
 640	struct rs_msg *msg;
 641	int send_sllao = dev->addr_len;
 642	int optlen = 0;
 643
 644#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
 645	/*
 646	 * According to section 2.2 of RFC 4429, we must not
 647	 * send router solicitations with a sllao from
 648	 * optimistic addresses, but we may send the solicitation
 649	 * if we don't include the sllao.  So here we check
 650	 * if our address is optimistic, and if so, we
 651	 * suppress the inclusion of the sllao.
 652	 */
 653	if (send_sllao) {
 654		struct inet6_ifaddr *ifp = ipv6_get_ifaddr(dev_net(dev), saddr,
 655							   dev, 1);
 656		if (ifp) {
 657			if (ifp->flags & IFA_F_OPTIMISTIC)  {
 658				send_sllao = 0;
 659			}
 660			in6_ifa_put(ifp);
 661		} else {
 662			send_sllao = 0;
 663		}
 664	}
 665#endif
 666	if (send_sllao)
 667		optlen += ndisc_opt_addr_space(dev, NDISC_ROUTER_SOLICITATION);
 668
 669	skb = ndisc_alloc_skb(dev, sizeof(*msg) + optlen);
 670	if (!skb)
 671		return;
 672
 673	msg = skb_put(skb, sizeof(*msg));
 674	*msg = (struct rs_msg) {
 675		.icmph = {
 676			.icmp6_type = NDISC_ROUTER_SOLICITATION,
 677		},
 678	};
 679
 680	if (send_sllao)
 681		ndisc_fill_addr_option(skb, ND_OPT_SOURCE_LL_ADDR,
 682				       dev->dev_addr,
 683				       NDISC_ROUTER_SOLICITATION);
 684
 685	ndisc_send_skb(skb, daddr, saddr);
 686}
 687
 688
 689static void ndisc_error_report(struct neighbour *neigh, struct sk_buff *skb)
 690{
 691	/*
 692	 *	"The sender MUST return an ICMP
 693	 *	 destination unreachable"
 694	 */
 695	dst_link_failure(skb);
 696	kfree_skb(skb);
 697}
 698
 699/* Called with locked neigh: either read or both */
 700
 701static void ndisc_solicit(struct neighbour *neigh, struct sk_buff *skb)
 702{
 703	struct in6_addr *saddr = NULL;
 704	struct in6_addr mcaddr;
 705	struct net_device *dev = neigh->dev;
 706	struct in6_addr *target = (struct in6_addr *)&neigh->primary_key;
 707	int probes = atomic_read(&neigh->probes);
 708
 709	if (skb && ipv6_chk_addr_and_flags(dev_net(dev), &ipv6_hdr(skb)->saddr,
 710					   dev, false, 1,
 711					   IFA_F_TENTATIVE|IFA_F_OPTIMISTIC))
 712		saddr = &ipv6_hdr(skb)->saddr;
 713	probes -= NEIGH_VAR(neigh->parms, UCAST_PROBES);
 714	if (probes < 0) {
 715		if (!(neigh->nud_state & NUD_VALID)) {
 716			ND_PRINTK(1, dbg,
 717				  "%s: trying to ucast probe in NUD_INVALID: %pI6\n",
 718				  __func__, target);
 719		}
 720		ndisc_send_ns(dev, target, target, saddr, 0);
 721	} else if ((probes -= NEIGH_VAR(neigh->parms, APP_PROBES)) < 0) {
 722		neigh_app_ns(neigh);
 723	} else {
 724		addrconf_addr_solict_mult(target, &mcaddr);
 725		ndisc_send_ns(dev, target, &mcaddr, saddr, 0);
 726	}
 727}
 728
 729static int pndisc_is_router(const void *pkey,
 730			    struct net_device *dev)
 731{
 732	struct pneigh_entry *n;
 733	int ret = -1;
 734
 735	read_lock_bh(&nd_tbl.lock);
 736	n = __pneigh_lookup(&nd_tbl, dev_net(dev), pkey, dev);
 737	if (n)
 738		ret = !!(n->flags & NTF_ROUTER);
 739	read_unlock_bh(&nd_tbl.lock);
 740
 741	return ret;
 742}
 743
 744void ndisc_update(const struct net_device *dev, struct neighbour *neigh,
 745		  const u8 *lladdr, u8 new, u32 flags, u8 icmp6_type,
 746		  struct ndisc_options *ndopts)
 747{
 748	neigh_update(neigh, lladdr, new, flags, 0);
 749	/* report ndisc ops about neighbour update */
 750	ndisc_ops_update(dev, neigh, flags, icmp6_type, ndopts);
 751}
 752
 753static void ndisc_recv_ns(struct sk_buff *skb)
 754{
 755	struct nd_msg *msg = (struct nd_msg *)skb_transport_header(skb);
 756	const struct in6_addr *saddr = &ipv6_hdr(skb)->saddr;
 757	const struct in6_addr *daddr = &ipv6_hdr(skb)->daddr;
 758	u8 *lladdr = NULL;
 759	u32 ndoptlen = skb_tail_pointer(skb) - (skb_transport_header(skb) +
 760				    offsetof(struct nd_msg, opt));
 761	struct ndisc_options ndopts;
 762	struct net_device *dev = skb->dev;
 763	struct inet6_ifaddr *ifp;
 764	struct inet6_dev *idev = NULL;
 765	struct neighbour *neigh;
 766	int dad = ipv6_addr_any(saddr);
 767	bool inc;
 768	int is_router = -1;
 769	u64 nonce = 0;
 770
 771	if (skb->len < sizeof(struct nd_msg)) {
 772		ND_PRINTK(2, warn, "NS: packet too short\n");
 773		return;
 774	}
 775
 776	if (ipv6_addr_is_multicast(&msg->target)) {
 777		ND_PRINTK(2, warn, "NS: multicast target address\n");
 778		return;
 779	}
 780
 781	/*
 782	 * RFC2461 7.1.1:
 783	 * DAD has to be destined for solicited node multicast address.
 784	 */
 785	if (dad && !ipv6_addr_is_solict_mult(daddr)) {
 786		ND_PRINTK(2, warn, "NS: bad DAD packet (wrong destination)\n");
 787		return;
 788	}
 789
 790	if (!ndisc_parse_options(dev, msg->opt, ndoptlen, &ndopts)) {
 791		ND_PRINTK(2, warn, "NS: invalid ND options\n");
 792		return;
 793	}
 794
 795	if (ndopts.nd_opts_src_lladdr) {
 796		lladdr = ndisc_opt_addr_data(ndopts.nd_opts_src_lladdr, dev);
 797		if (!lladdr) {
 798			ND_PRINTK(2, warn,
 799				  "NS: invalid link-layer address length\n");
 800			return;
 801		}
 802
 803		/* RFC2461 7.1.1:
 804		 *	If the IP source address is the unspecified address,
 805		 *	there MUST NOT be source link-layer address option
 806		 *	in the message.
 807		 */
 808		if (dad) {
 809			ND_PRINTK(2, warn,
 810				  "NS: bad DAD packet (link-layer address option)\n");
 811			return;
 812		}
 813	}
 814	if (ndopts.nd_opts_nonce)
 815		memcpy(&nonce, (u8 *)(ndopts.nd_opts_nonce + 1), 6);
 816
 817	inc = ipv6_addr_is_multicast(daddr);
 818
 819	ifp = ipv6_get_ifaddr(dev_net(dev), &msg->target, dev, 1);
 820	if (ifp) {
 821have_ifp:
 822		if (ifp->flags & (IFA_F_TENTATIVE|IFA_F_OPTIMISTIC)) {
 823			if (dad) {
 824				if (nonce != 0 && ifp->dad_nonce == nonce) {
 825					u8 *np = (u8 *)&nonce;
 826					/* Matching nonce if looped back */
 827					ND_PRINTK(2, notice,
 828						  "%s: IPv6 DAD loopback for address %pI6c nonce %pM ignored\n",
 829						  ifp->idev->dev->name,
 830						  &ifp->addr, np);
 831					goto out;
 832				}
 833				/*
 834				 * We are colliding with another node
 835				 * who is doing DAD
 836				 * so fail our DAD process
 837				 */
 838				addrconf_dad_failure(skb, ifp);
 839				return;
 840			} else {
 841				/*
 842				 * This is not a dad solicitation.
 843				 * If we are an optimistic node,
 844				 * we should respond.
 845				 * Otherwise, we should ignore it.
 846				 */
 847				if (!(ifp->flags & IFA_F_OPTIMISTIC))
 848					goto out;
 849			}
 850		}
 851
 852		idev = ifp->idev;
 853	} else {
 854		struct net *net = dev_net(dev);
 855
 856		/* perhaps an address on the master device */
 857		if (netif_is_l3_slave(dev)) {
 858			struct net_device *mdev;
 859
 860			mdev = netdev_master_upper_dev_get_rcu(dev);
 861			if (mdev) {
 862				ifp = ipv6_get_ifaddr(net, &msg->target, mdev, 1);
 863				if (ifp)
 864					goto have_ifp;
 865			}
 866		}
 867
 868		idev = in6_dev_get(dev);
 869		if (!idev) {
 870			/* XXX: count this drop? */
 871			return;
 872		}
 873
 874		if (ipv6_chk_acast_addr(net, dev, &msg->target) ||
 875		    (idev->cnf.forwarding &&
 876		     (net->ipv6.devconf_all->proxy_ndp || idev->cnf.proxy_ndp) &&
 877		     (is_router = pndisc_is_router(&msg->target, dev)) >= 0)) {
 878			if (!(NEIGH_CB(skb)->flags & LOCALLY_ENQUEUED) &&
 879			    skb->pkt_type != PACKET_HOST &&
 880			    inc &&
 881			    NEIGH_VAR(idev->nd_parms, PROXY_DELAY) != 0) {
 882				/*
 883				 * for anycast or proxy,
 884				 * sender should delay its response
 885				 * by a random time between 0 and
 886				 * MAX_ANYCAST_DELAY_TIME seconds.
 887				 * (RFC2461) -- yoshfuji
 888				 */
 889				struct sk_buff *n = skb_clone(skb, GFP_ATOMIC);
 890				if (n)
 891					pneigh_enqueue(&nd_tbl, idev->nd_parms, n);
 892				goto out;
 893			}
 894		} else
 895			goto out;
 896	}
 897
 898	if (is_router < 0)
 899		is_router = idev->cnf.forwarding;
 900
 901	if (dad) {
 902		ndisc_send_na(dev, &in6addr_linklocal_allnodes, &msg->target,
 903			      !!is_router, false, (ifp != NULL), true);
 904		goto out;
 905	}
 906
 907	if (inc)
 908		NEIGH_CACHE_STAT_INC(&nd_tbl, rcv_probes_mcast);
 909	else
 910		NEIGH_CACHE_STAT_INC(&nd_tbl, rcv_probes_ucast);
 911
 912	/*
 913	 *	update / create cache entry
 914	 *	for the source address
 915	 */
 916	neigh = __neigh_lookup(&nd_tbl, saddr, dev,
 917			       !inc || lladdr || !dev->addr_len);
 918	if (neigh)
 919		ndisc_update(dev, neigh, lladdr, NUD_STALE,
 920			     NEIGH_UPDATE_F_WEAK_OVERRIDE|
 921			     NEIGH_UPDATE_F_OVERRIDE,
 922			     NDISC_NEIGHBOUR_SOLICITATION, &ndopts);
 923	if (neigh || !dev->header_ops) {
 924		ndisc_send_na(dev, saddr, &msg->target, !!is_router,
 925			      true, (ifp != NULL && inc), inc);
 926		if (neigh)
 927			neigh_release(neigh);
 928	}
 929
 930out:
 931	if (ifp)
 932		in6_ifa_put(ifp);
 933	else
 934		in6_dev_put(idev);
 935}
 936
 937static void ndisc_recv_na(struct sk_buff *skb)
 938{
 939	struct nd_msg *msg = (struct nd_msg *)skb_transport_header(skb);
 940	struct in6_addr *saddr = &ipv6_hdr(skb)->saddr;
 941	const struct in6_addr *daddr = &ipv6_hdr(skb)->daddr;
 942	u8 *lladdr = NULL;
 943	u32 ndoptlen = skb_tail_pointer(skb) - (skb_transport_header(skb) +
 944				    offsetof(struct nd_msg, opt));
 945	struct ndisc_options ndopts;
 946	struct net_device *dev = skb->dev;
 947	struct inet6_dev *idev = __in6_dev_get(dev);
 948	struct inet6_ifaddr *ifp;
 949	struct neighbour *neigh;
 950
 951	if (skb->len < sizeof(struct nd_msg)) {
 952		ND_PRINTK(2, warn, "NA: packet too short\n");
 953		return;
 954	}
 955
 956	if (ipv6_addr_is_multicast(&msg->target)) {
 957		ND_PRINTK(2, warn, "NA: target address is multicast\n");
 958		return;
 959	}
 960
 961	if (ipv6_addr_is_multicast(daddr) &&
 962	    msg->icmph.icmp6_solicited) {
 963		ND_PRINTK(2, warn, "NA: solicited NA is multicasted\n");
 964		return;
 965	}
 966
 967	/* For some 802.11 wireless deployments (and possibly other networks),
 968	 * there will be a NA proxy and unsolicitd packets are attacks
 969	 * and thus should not be accepted.
 970	 */
 971	if (!msg->icmph.icmp6_solicited && idev &&
 972	    idev->cnf.drop_unsolicited_na)
 973		return;
 974
 975	if (!ndisc_parse_options(dev, msg->opt, ndoptlen, &ndopts)) {
 976		ND_PRINTK(2, warn, "NS: invalid ND option\n");
 977		return;
 978	}
 979	if (ndopts.nd_opts_tgt_lladdr) {
 980		lladdr = ndisc_opt_addr_data(ndopts.nd_opts_tgt_lladdr, dev);
 981		if (!lladdr) {
 982			ND_PRINTK(2, warn,
 983				  "NA: invalid link-layer address length\n");
 984			return;
 985		}
 986	}
 987	ifp = ipv6_get_ifaddr(dev_net(dev), &msg->target, dev, 1);
 988	if (ifp) {
 989		if (skb->pkt_type != PACKET_LOOPBACK
 990		    && (ifp->flags & IFA_F_TENTATIVE)) {
 991				addrconf_dad_failure(skb, ifp);
 992				return;
 993		}
 994		/* What should we make now? The advertisement
 995		   is invalid, but ndisc specs say nothing
 996		   about it. It could be misconfiguration, or
 997		   an smart proxy agent tries to help us :-)
 998
 999		   We should not print the error if NA has been
1000		   received from loopback - it is just our own
1001		   unsolicited advertisement.
1002		 */
1003		if (skb->pkt_type != PACKET_LOOPBACK)
1004			ND_PRINTK(1, warn,
1005				  "NA: %pM advertised our address %pI6c on %s!\n",
1006				  eth_hdr(skb)->h_source, &ifp->addr, ifp->idev->dev->name);
1007		in6_ifa_put(ifp);
1008		return;
1009	}
1010	neigh = neigh_lookup(&nd_tbl, &msg->target, dev);
1011
1012	if (neigh) {
1013		u8 old_flags = neigh->flags;
1014		struct net *net = dev_net(dev);
1015
1016		if (neigh->nud_state & NUD_FAILED)
1017			goto out;
1018
1019		/*
1020		 * Don't update the neighbor cache entry on a proxy NA from
1021		 * ourselves because either the proxied node is off link or it
1022		 * has already sent a NA to us.
1023		 */
1024		if (lladdr && !memcmp(lladdr, dev->dev_addr, dev->addr_len) &&
1025		    net->ipv6.devconf_all->forwarding && net->ipv6.devconf_all->proxy_ndp &&
1026		    pneigh_lookup(&nd_tbl, net, &msg->target, dev, 0)) {
1027			/* XXX: idev->cnf.proxy_ndp */
1028			goto out;
1029		}
1030
1031		ndisc_update(dev, neigh, lladdr,
1032			     msg->icmph.icmp6_solicited ? NUD_REACHABLE : NUD_STALE,
1033			     NEIGH_UPDATE_F_WEAK_OVERRIDE|
1034			     (msg->icmph.icmp6_override ? NEIGH_UPDATE_F_OVERRIDE : 0)|
1035			     NEIGH_UPDATE_F_OVERRIDE_ISROUTER|
1036			     (msg->icmph.icmp6_router ? NEIGH_UPDATE_F_ISROUTER : 0),
1037			     NDISC_NEIGHBOUR_ADVERTISEMENT, &ndopts);
1038
1039		if ((old_flags & ~neigh->flags) & NTF_ROUTER) {
1040			/*
1041			 * Change: router to host
1042			 */
1043			rt6_clean_tohost(dev_net(dev),  saddr);
1044		}
1045
1046out:
1047		neigh_release(neigh);
1048	}
1049}
1050
1051static void ndisc_recv_rs(struct sk_buff *skb)
1052{
1053	struct rs_msg *rs_msg = (struct rs_msg *)skb_transport_header(skb);
1054	unsigned long ndoptlen = skb->len - sizeof(*rs_msg);
1055	struct neighbour *neigh;
1056	struct inet6_dev *idev;
1057	const struct in6_addr *saddr = &ipv6_hdr(skb)->saddr;
1058	struct ndisc_options ndopts;
1059	u8 *lladdr = NULL;
1060
1061	if (skb->len < sizeof(*rs_msg))
1062		return;
1063
1064	idev = __in6_dev_get(skb->dev);
1065	if (!idev) {
1066		ND_PRINTK(1, err, "RS: can't find in6 device\n");
1067		return;
1068	}
1069
1070	/* Don't accept RS if we're not in router mode */
1071	if (!idev->cnf.forwarding)
1072		goto out;
1073
1074	/*
1075	 * Don't update NCE if src = ::;
1076	 * this implies that the source node has no ip address assigned yet.
1077	 */
1078	if (ipv6_addr_any(saddr))
1079		goto out;
1080
1081	/* Parse ND options */
1082	if (!ndisc_parse_options(skb->dev, rs_msg->opt, ndoptlen, &ndopts)) {
1083		ND_PRINTK(2, notice, "NS: invalid ND option, ignored\n");
1084		goto out;
1085	}
1086
1087	if (ndopts.nd_opts_src_lladdr) {
1088		lladdr = ndisc_opt_addr_data(ndopts.nd_opts_src_lladdr,
1089					     skb->dev);
1090		if (!lladdr)
1091			goto out;
1092	}
1093
1094	neigh = __neigh_lookup(&nd_tbl, saddr, skb->dev, 1);
1095	if (neigh) {
1096		ndisc_update(skb->dev, neigh, lladdr, NUD_STALE,
1097			     NEIGH_UPDATE_F_WEAK_OVERRIDE|
1098			     NEIGH_UPDATE_F_OVERRIDE|
1099			     NEIGH_UPDATE_F_OVERRIDE_ISROUTER,
1100			     NDISC_ROUTER_SOLICITATION, &ndopts);
1101		neigh_release(neigh);
1102	}
1103out:
1104	return;
1105}
1106
1107static void ndisc_ra_useropt(struct sk_buff *ra, struct nd_opt_hdr *opt)
1108{
1109	struct icmp6hdr *icmp6h = (struct icmp6hdr *)skb_transport_header(ra);
1110	struct sk_buff *skb;
1111	struct nlmsghdr *nlh;
1112	struct nduseroptmsg *ndmsg;
1113	struct net *net = dev_net(ra->dev);
1114	int err;
1115	int base_size = NLMSG_ALIGN(sizeof(struct nduseroptmsg)
1116				    + (opt->nd_opt_len << 3));
1117	size_t msg_size = base_size + nla_total_size(sizeof(struct in6_addr));
1118
1119	skb = nlmsg_new(msg_size, GFP_ATOMIC);
1120	if (!skb) {
1121		err = -ENOBUFS;
1122		goto errout;
1123	}
1124
1125	nlh = nlmsg_put(skb, 0, 0, RTM_NEWNDUSEROPT, base_size, 0);
1126	if (!nlh) {
1127		goto nla_put_failure;
1128	}
1129
1130	ndmsg = nlmsg_data(nlh);
1131	ndmsg->nduseropt_family = AF_INET6;
1132	ndmsg->nduseropt_ifindex = ra->dev->ifindex;
1133	ndmsg->nduseropt_icmp_type = icmp6h->icmp6_type;
1134	ndmsg->nduseropt_icmp_code = icmp6h->icmp6_code;
1135	ndmsg->nduseropt_opts_len = opt->nd_opt_len << 3;
1136
1137	memcpy(ndmsg + 1, opt, opt->nd_opt_len << 3);
1138
1139	if (nla_put_in6_addr(skb, NDUSEROPT_SRCADDR, &ipv6_hdr(ra)->saddr))
1140		goto nla_put_failure;
1141	nlmsg_end(skb, nlh);
1142
1143	rtnl_notify(skb, net, 0, RTNLGRP_ND_USEROPT, NULL, GFP_ATOMIC);
1144	return;
1145
1146nla_put_failure:
1147	nlmsg_free(skb);
1148	err = -EMSGSIZE;
1149errout:
1150	rtnl_set_sk_err(net, RTNLGRP_ND_USEROPT, err);
1151}
1152
1153static void ndisc_router_discovery(struct sk_buff *skb)
1154{
1155	struct ra_msg *ra_msg = (struct ra_msg *)skb_transport_header(skb);
1156	struct neighbour *neigh = NULL;
1157	struct inet6_dev *in6_dev;
1158	struct rt6_info *rt = NULL;
1159	int lifetime;
1160	struct ndisc_options ndopts;
1161	int optlen;
1162	unsigned int pref = 0;
1163	__u32 old_if_flags;
1164	bool send_ifinfo_notify = false;
1165
1166	__u8 *opt = (__u8 *)(ra_msg + 1);
1167
1168	optlen = (skb_tail_pointer(skb) - skb_transport_header(skb)) -
1169		sizeof(struct ra_msg);
1170
1171	ND_PRINTK(2, info,
1172		  "RA: %s, dev: %s\n",
1173		  __func__, skb->dev->name);
1174	if (!(ipv6_addr_type(&ipv6_hdr(skb)->saddr) & IPV6_ADDR_LINKLOCAL)) {
1175		ND_PRINTK(2, warn, "RA: source address is not link-local\n");
1176		return;
1177	}
1178	if (optlen < 0) {
1179		ND_PRINTK(2, warn, "RA: packet too short\n");
1180		return;
1181	}
1182
1183#ifdef CONFIG_IPV6_NDISC_NODETYPE
1184	if (skb->ndisc_nodetype == NDISC_NODETYPE_HOST) {
1185		ND_PRINTK(2, warn, "RA: from host or unauthorized router\n");
1186		return;
1187	}
1188#endif
1189
1190	/*
1191	 *	set the RA_RECV flag in the interface
1192	 */
1193
1194	in6_dev = __in6_dev_get(skb->dev);
1195	if (!in6_dev) {
1196		ND_PRINTK(0, err, "RA: can't find inet6 device for %s\n",
1197			  skb->dev->name);
1198		return;
1199	}
1200
1201	if (!ndisc_parse_options(skb->dev, opt, optlen, &ndopts)) {
1202		ND_PRINTK(2, warn, "RA: invalid ND options\n");
1203		return;
1204	}
1205
1206	if (!ipv6_accept_ra(in6_dev)) {
1207		ND_PRINTK(2, info,
1208			  "RA: %s, did not accept ra for dev: %s\n",
1209			  __func__, skb->dev->name);
1210		goto skip_linkparms;
1211	}
1212
1213#ifdef CONFIG_IPV6_NDISC_NODETYPE
1214	/* skip link-specific parameters from interior routers */
1215	if (skb->ndisc_nodetype == NDISC_NODETYPE_NODEFAULT) {
1216		ND_PRINTK(2, info,
1217			  "RA: %s, nodetype is NODEFAULT, dev: %s\n",
1218			  __func__, skb->dev->name);
1219		goto skip_linkparms;
1220	}
1221#endif
1222
1223	if (in6_dev->if_flags & IF_RS_SENT) {
1224		/*
1225		 *	flag that an RA was received after an RS was sent
1226		 *	out on this interface.
1227		 */
1228		in6_dev->if_flags |= IF_RA_RCVD;
1229	}
1230
1231	/*
1232	 * Remember the managed/otherconf flags from most recently
1233	 * received RA message (RFC 2462) -- yoshfuji
1234	 */
1235	old_if_flags = in6_dev->if_flags;
1236	in6_dev->if_flags = (in6_dev->if_flags & ~(IF_RA_MANAGED |
1237				IF_RA_OTHERCONF)) |
1238				(ra_msg->icmph.icmp6_addrconf_managed ?
1239					IF_RA_MANAGED : 0) |
1240				(ra_msg->icmph.icmp6_addrconf_other ?
1241					IF_RA_OTHERCONF : 0);
1242
1243	if (old_if_flags != in6_dev->if_flags)
1244		send_ifinfo_notify = true;
1245
1246	if (!in6_dev->cnf.accept_ra_defrtr) {
1247		ND_PRINTK(2, info,
1248			  "RA: %s, defrtr is false for dev: %s\n",
1249			  __func__, skb->dev->name);
1250		goto skip_defrtr;
1251	}
1252
1253	/* Do not accept RA with source-addr found on local machine unless
1254	 * accept_ra_from_local is set to true.
1255	 */
1256	if (!in6_dev->cnf.accept_ra_from_local &&
1257	    ipv6_chk_addr(dev_net(in6_dev->dev), &ipv6_hdr(skb)->saddr,
1258			  in6_dev->dev, 0)) {
1259		ND_PRINTK(2, info,
1260			  "RA from local address detected on dev: %s: default router ignored\n",
1261			  skb->dev->name);
1262		goto skip_defrtr;
1263	}
1264
1265	lifetime = ntohs(ra_msg->icmph.icmp6_rt_lifetime);
1266
1267#ifdef CONFIG_IPV6_ROUTER_PREF
1268	pref = ra_msg->icmph.icmp6_router_pref;
1269	/* 10b is handled as if it were 00b (medium) */
1270	if (pref == ICMPV6_ROUTER_PREF_INVALID ||
1271	    !in6_dev->cnf.accept_ra_rtr_pref)
1272		pref = ICMPV6_ROUTER_PREF_MEDIUM;
1273#endif
1274
1275	rt = rt6_get_dflt_router(&ipv6_hdr(skb)->saddr, skb->dev);
1276
1277	if (rt) {
1278		neigh = dst_neigh_lookup(&rt->dst, &ipv6_hdr(skb)->saddr);
1279		if (!neigh) {
1280			ND_PRINTK(0, err,
1281				  "RA: %s got default router without neighbour\n",
1282				  __func__);
1283			ip6_rt_put(rt);
1284			return;
1285		}
1286	}
1287	if (rt && lifetime == 0) {
1288		ip6_del_rt(rt);
1289		rt = NULL;
1290	}
1291
1292	ND_PRINTK(3, info, "RA: rt: %p  lifetime: %d, for dev: %s\n",
1293		  rt, lifetime, skb->dev->name);
1294	if (!rt && lifetime) {
1295		ND_PRINTK(3, info, "RA: adding default router\n");
1296
1297		rt = rt6_add_dflt_router(&ipv6_hdr(skb)->saddr, skb->dev, pref);
1298		if (!rt) {
1299			ND_PRINTK(0, err,
1300				  "RA: %s failed to add default route\n",
1301				  __func__);
1302			return;
1303		}
1304
1305		neigh = dst_neigh_lookup(&rt->dst, &ipv6_hdr(skb)->saddr);
1306		if (!neigh) {
1307			ND_PRINTK(0, err,
1308				  "RA: %s got default router without neighbour\n",
1309				  __func__);
1310			ip6_rt_put(rt);
1311			return;
1312		}
1313		neigh->flags |= NTF_ROUTER;
1314	} else if (rt) {
1315		rt->rt6i_flags = (rt->rt6i_flags & ~RTF_PREF_MASK) | RTF_PREF(pref);
1316	}
1317
1318	if (rt)
1319		rt6_set_expires(rt, jiffies + (HZ * lifetime));
1320	if (in6_dev->cnf.accept_ra_min_hop_limit < 256 &&
1321	    ra_msg->icmph.icmp6_hop_limit) {
1322		if (in6_dev->cnf.accept_ra_min_hop_limit <= ra_msg->icmph.icmp6_hop_limit) {
1323			in6_dev->cnf.hop_limit = ra_msg->icmph.icmp6_hop_limit;
1324			if (rt)
1325				dst_metric_set(&rt->dst, RTAX_HOPLIMIT,
1326					       ra_msg->icmph.icmp6_hop_limit);
1327		} else {
1328			ND_PRINTK(2, warn, "RA: Got route advertisement with lower hop_limit than minimum\n");
1329		}
1330	}
1331
1332skip_defrtr:
1333
1334	/*
1335	 *	Update Reachable Time and Retrans Timer
1336	 */
1337
1338	if (in6_dev->nd_parms) {
1339		unsigned long rtime = ntohl(ra_msg->retrans_timer);
1340
1341		if (rtime && rtime/1000 < MAX_SCHEDULE_TIMEOUT/HZ) {
1342			rtime = (rtime*HZ)/1000;
1343			if (rtime < HZ/10)
1344				rtime = HZ/10;
1345			NEIGH_VAR_SET(in6_dev->nd_parms, RETRANS_TIME, rtime);
1346			in6_dev->tstamp = jiffies;
1347			send_ifinfo_notify = true;
1348		}
1349
1350		rtime = ntohl(ra_msg->reachable_time);
1351		if (rtime && rtime/1000 < MAX_SCHEDULE_TIMEOUT/(3*HZ)) {
1352			rtime = (rtime*HZ)/1000;
1353
1354			if (rtime < HZ/10)
1355				rtime = HZ/10;
1356
1357			if (rtime != NEIGH_VAR(in6_dev->nd_parms, BASE_REACHABLE_TIME)) {
1358				NEIGH_VAR_SET(in6_dev->nd_parms,
1359					      BASE_REACHABLE_TIME, rtime);
1360				NEIGH_VAR_SET(in6_dev->nd_parms,
1361					      GC_STALETIME, 3 * rtime);
1362				in6_dev->nd_parms->reachable_time = neigh_rand_reach_time(rtime);
1363				in6_dev->tstamp = jiffies;
1364				send_ifinfo_notify = true;
1365			}
1366		}
1367	}
1368
1369	/*
1370	 *	Send a notify if RA changed managed/otherconf flags or timer settings
1371	 */
1372	if (send_ifinfo_notify)
1373		inet6_ifinfo_notify(RTM_NEWLINK, in6_dev);
1374
1375skip_linkparms:
1376
1377	/*
1378	 *	Process options.
1379	 */
1380
1381	if (!neigh)
1382		neigh = __neigh_lookup(&nd_tbl, &ipv6_hdr(skb)->saddr,
1383				       skb->dev, 1);
1384	if (neigh) {
1385		u8 *lladdr = NULL;
1386		if (ndopts.nd_opts_src_lladdr) {
1387			lladdr = ndisc_opt_addr_data(ndopts.nd_opts_src_lladdr,
1388						     skb->dev);
1389			if (!lladdr) {
1390				ND_PRINTK(2, warn,
1391					  "RA: invalid link-layer address length\n");
1392				goto out;
1393			}
1394		}
1395		ndisc_update(skb->dev, neigh, lladdr, NUD_STALE,
1396			     NEIGH_UPDATE_F_WEAK_OVERRIDE|
1397			     NEIGH_UPDATE_F_OVERRIDE|
1398			     NEIGH_UPDATE_F_OVERRIDE_ISROUTER|
1399			     NEIGH_UPDATE_F_ISROUTER,
1400			     NDISC_ROUTER_ADVERTISEMENT, &ndopts);
1401	}
1402
1403	if (!ipv6_accept_ra(in6_dev)) {
1404		ND_PRINTK(2, info,
1405			  "RA: %s, accept_ra is false for dev: %s\n",
1406			  __func__, skb->dev->name);
1407		goto out;
1408	}
1409
1410#ifdef CONFIG_IPV6_ROUTE_INFO
1411	if (!in6_dev->cnf.accept_ra_from_local &&
1412	    ipv6_chk_addr(dev_net(in6_dev->dev), &ipv6_hdr(skb)->saddr,
1413			  in6_dev->dev, 0)) {
1414		ND_PRINTK(2, info,
1415			  "RA from local address detected on dev: %s: router info ignored.\n",
1416			  skb->dev->name);
1417		goto skip_routeinfo;
1418	}
1419
1420	if (in6_dev->cnf.accept_ra_rtr_pref && ndopts.nd_opts_ri) {
1421		struct nd_opt_hdr *p;
1422		for (p = ndopts.nd_opts_ri;
1423		     p;
1424		     p = ndisc_next_option(p, ndopts.nd_opts_ri_end)) {
1425			struct route_info *ri = (struct route_info *)p;
1426#ifdef CONFIG_IPV6_NDISC_NODETYPE
1427			if (skb->ndisc_nodetype == NDISC_NODETYPE_NODEFAULT &&
1428			    ri->prefix_len == 0)
1429				continue;
1430#endif
1431			if (ri->prefix_len == 0 &&
1432			    !in6_dev->cnf.accept_ra_defrtr)
1433				continue;
1434			if (ri->prefix_len < in6_dev->cnf.accept_ra_rt_info_min_plen)
1435				continue;
1436			if (ri->prefix_len > in6_dev->cnf.accept_ra_rt_info_max_plen)
1437				continue;
1438			rt6_route_rcv(skb->dev, (u8 *)p, (p->nd_opt_len) << 3,
1439				      &ipv6_hdr(skb)->saddr);
1440		}
1441	}
1442
1443skip_routeinfo:
1444#endif
1445
1446#ifdef CONFIG_IPV6_NDISC_NODETYPE
1447	/* skip link-specific ndopts from interior routers */
1448	if (skb->ndisc_nodetype == NDISC_NODETYPE_NODEFAULT) {
1449		ND_PRINTK(2, info,
1450			  "RA: %s, nodetype is NODEFAULT (interior routes), dev: %s\n",
1451			  __func__, skb->dev->name);
1452		goto out;
1453	}
1454#endif
1455
1456	if (in6_dev->cnf.accept_ra_pinfo && ndopts.nd_opts_pi) {
1457		struct nd_opt_hdr *p;
1458		for (p = ndopts.nd_opts_pi;
1459		     p;
1460		     p = ndisc_next_option(p, ndopts.nd_opts_pi_end)) {
1461			addrconf_prefix_rcv(skb->dev, (u8 *)p,
1462					    (p->nd_opt_len) << 3,
1463					    ndopts.nd_opts_src_lladdr != NULL);
1464		}
1465	}
1466
1467	if (ndopts.nd_opts_mtu && in6_dev->cnf.accept_ra_mtu) {
1468		__be32 n;
1469		u32 mtu;
1470
1471		memcpy(&n, ((u8 *)(ndopts.nd_opts_mtu+1))+2, sizeof(mtu));
1472		mtu = ntohl(n);
1473
1474		if (mtu < IPV6_MIN_MTU || mtu > skb->dev->mtu) {
1475			ND_PRINTK(2, warn, "RA: invalid mtu: %d\n", mtu);
1476		} else if (in6_dev->cnf.mtu6 != mtu) {
1477			in6_dev->cnf.mtu6 = mtu;
1478
1479			if (rt)
1480				dst_metric_set(&rt->dst, RTAX_MTU, mtu);
1481
1482			rt6_mtu_change(skb->dev, mtu);
1483		}
1484	}
1485
1486	if (ndopts.nd_useropts) {
1487		struct nd_opt_hdr *p;
1488		for (p = ndopts.nd_useropts;
1489		     p;
1490		     p = ndisc_next_useropt(skb->dev, p,
1491					    ndopts.nd_useropts_end)) {
1492			ndisc_ra_useropt(skb, p);
1493		}
1494	}
1495
1496	if (ndopts.nd_opts_tgt_lladdr || ndopts.nd_opts_rh) {
1497		ND_PRINTK(2, warn, "RA: invalid RA options\n");
1498	}
1499out:
1500	ip6_rt_put(rt);
1501	if (neigh)
1502		neigh_release(neigh);
1503}
1504
1505static void ndisc_redirect_rcv(struct sk_buff *skb)
1506{
1507	u8 *hdr;
1508	struct ndisc_options ndopts;
1509	struct rd_msg *msg = (struct rd_msg *)skb_transport_header(skb);
1510	u32 ndoptlen = skb_tail_pointer(skb) - (skb_transport_header(skb) +
1511				    offsetof(struct rd_msg, opt));
1512
1513#ifdef CONFIG_IPV6_NDISC_NODETYPE
1514	switch (skb->ndisc_nodetype) {
1515	case NDISC_NODETYPE_HOST:
1516	case NDISC_NODETYPE_NODEFAULT:
1517		ND_PRINTK(2, warn,
1518			  "Redirect: from host or unauthorized router\n");
1519		return;
1520	}
1521#endif
1522
1523	if (!(ipv6_addr_type(&ipv6_hdr(skb)->saddr) & IPV6_ADDR_LINKLOCAL)) {
1524		ND_PRINTK(2, warn,
1525			  "Redirect: source address is not link-local\n");
1526		return;
1527	}
1528
1529	if (!ndisc_parse_options(skb->dev, msg->opt, ndoptlen, &ndopts))
1530		return;
1531
1532	if (!ndopts.nd_opts_rh) {
1533		ip6_redirect_no_header(skb, dev_net(skb->dev),
1534					skb->dev->ifindex, 0);
1535		return;
1536	}
1537
1538	hdr = (u8 *)ndopts.nd_opts_rh;
1539	hdr += 8;
1540	if (!pskb_pull(skb, hdr - skb_transport_header(skb)))
1541		return;
1542
1543	icmpv6_notify(skb, NDISC_REDIRECT, 0, 0);
1544}
1545
1546static void ndisc_fill_redirect_hdr_option(struct sk_buff *skb,
1547					   struct sk_buff *orig_skb,
1548					   int rd_len)
1549{
1550	u8 *opt = skb_put(skb, rd_len);
1551
1552	memset(opt, 0, 8);
1553	*(opt++) = ND_OPT_REDIRECT_HDR;
1554	*(opt++) = (rd_len >> 3);
1555	opt += 6;
1556
1557	skb_copy_bits(orig_skb, skb_network_offset(orig_skb), opt,
1558		      rd_len - 8);
1559}
1560
1561void ndisc_send_redirect(struct sk_buff *skb, const struct in6_addr *target)
1562{
1563	struct net_device *dev = skb->dev;
1564	struct net *net = dev_net(dev);
1565	struct sock *sk = net->ipv6.ndisc_sk;
1566	int optlen = 0;
1567	struct inet_peer *peer;
1568	struct sk_buff *buff;
1569	struct rd_msg *msg;
1570	struct in6_addr saddr_buf;
1571	struct rt6_info *rt;
1572	struct dst_entry *dst;
1573	struct flowi6 fl6;
1574	int rd_len;
1575	u8 ha_buf[MAX_ADDR_LEN], *ha = NULL,
1576	   ops_data_buf[NDISC_OPS_REDIRECT_DATA_SPACE], *ops_data = NULL;
1577	bool ret;
1578
1579	if (ipv6_get_lladdr(dev, &saddr_buf, IFA_F_TENTATIVE)) {
1580		ND_PRINTK(2, warn, "Redirect: no link-local address on %s\n",
1581			  dev->name);
1582		return;
1583	}
1584
1585	if (!ipv6_addr_equal(&ipv6_hdr(skb)->daddr, target) &&
1586	    ipv6_addr_type(target) != (IPV6_ADDR_UNICAST|IPV6_ADDR_LINKLOCAL)) {
1587		ND_PRINTK(2, warn,
1588			  "Redirect: target address is not link-local unicast\n");
1589		return;
1590	}
1591
1592	icmpv6_flow_init(sk, &fl6, NDISC_REDIRECT,
1593			 &saddr_buf, &ipv6_hdr(skb)->saddr, dev->ifindex);
 
 
 
1594
1595	dst = ip6_route_output(net, NULL, &fl6);
1596	if (dst->error) {
1597		dst_release(dst);
1598		return;
1599	}
1600	dst = xfrm_lookup(net, dst, flowi6_to_flowi(&fl6), NULL, 0);
1601	if (IS_ERR(dst))
1602		return;
1603
1604	rt = (struct rt6_info *) dst;
1605
1606	if (rt->rt6i_flags & RTF_GATEWAY) {
1607		ND_PRINTK(2, warn,
1608			  "Redirect: destination is not a neighbour\n");
1609		goto release;
1610	}
1611	peer = inet_getpeer_v6(net->ipv6.peers, &ipv6_hdr(skb)->saddr, 1);
1612	ret = inet_peer_xrlim_allow(peer, 1*HZ);
1613	if (peer)
1614		inet_putpeer(peer);
1615	if (!ret)
1616		goto release;
1617
1618	if (dev->addr_len) {
1619		struct neighbour *neigh = dst_neigh_lookup(skb_dst(skb), target);
1620		if (!neigh) {
1621			ND_PRINTK(2, warn,
1622				  "Redirect: no neigh for target address\n");
1623			goto release;
1624		}
1625
1626		read_lock_bh(&neigh->lock);
1627		if (neigh->nud_state & NUD_VALID) {
1628			memcpy(ha_buf, neigh->ha, dev->addr_len);
1629			read_unlock_bh(&neigh->lock);
1630			ha = ha_buf;
1631			optlen += ndisc_redirect_opt_addr_space(dev, neigh,
1632								ops_data_buf,
1633								&ops_data);
1634		} else
1635			read_unlock_bh(&neigh->lock);
1636
1637		neigh_release(neigh);
1638	}
1639
1640	rd_len = min_t(unsigned int,
1641		       IPV6_MIN_MTU - sizeof(struct ipv6hdr) - sizeof(*msg) - optlen,
1642		       skb->len + 8);
1643	rd_len &= ~0x7;
1644	optlen += rd_len;
1645
1646	buff = ndisc_alloc_skb(dev, sizeof(*msg) + optlen);
1647	if (!buff)
1648		goto release;
1649
1650	msg = skb_put(buff, sizeof(*msg));
1651	*msg = (struct rd_msg) {
1652		.icmph = {
1653			.icmp6_type = NDISC_REDIRECT,
1654		},
1655		.target = *target,
1656		.dest = ipv6_hdr(skb)->daddr,
1657	};
1658
1659	/*
1660	 *	include target_address option
1661	 */
1662
1663	if (ha)
1664		ndisc_fill_redirect_addr_option(buff, ha, ops_data);
1665
1666	/*
1667	 *	build redirect option and copy skb over to the new packet.
1668	 */
1669
1670	if (rd_len)
1671		ndisc_fill_redirect_hdr_option(buff, skb, rd_len);
1672
1673	skb_dst_set(buff, dst);
1674	ndisc_send_skb(buff, &ipv6_hdr(skb)->saddr, &saddr_buf);
1675	return;
1676
1677release:
1678	dst_release(dst);
1679}
1680
1681static void pndisc_redo(struct sk_buff *skb)
1682{
1683	ndisc_recv_ns(skb);
1684	kfree_skb(skb);
1685}
1686
1687static bool ndisc_suppress_frag_ndisc(struct sk_buff *skb)
1688{
1689	struct inet6_dev *idev = __in6_dev_get(skb->dev);
1690
1691	if (!idev)
1692		return true;
1693	if (IP6CB(skb)->flags & IP6SKB_FRAGMENTED &&
1694	    idev->cnf.suppress_frag_ndisc) {
1695		net_warn_ratelimited("Received fragmented ndisc packet. Carefully consider disabling suppress_frag_ndisc.\n");
1696		return true;
1697	}
1698	return false;
1699}
1700
1701int ndisc_rcv(struct sk_buff *skb)
1702{
1703	struct nd_msg *msg;
1704
1705	if (ndisc_suppress_frag_ndisc(skb))
1706		return 0;
1707
1708	if (skb_linearize(skb))
1709		return 0;
1710
1711	msg = (struct nd_msg *)skb_transport_header(skb);
1712
1713	__skb_push(skb, skb->data - skb_transport_header(skb));
1714
1715	if (ipv6_hdr(skb)->hop_limit != 255) {
1716		ND_PRINTK(2, warn, "NDISC: invalid hop-limit: %d\n",
1717			  ipv6_hdr(skb)->hop_limit);
1718		return 0;
1719	}
1720
1721	if (msg->icmph.icmp6_code != 0) {
1722		ND_PRINTK(2, warn, "NDISC: invalid ICMPv6 code: %d\n",
1723			  msg->icmph.icmp6_code);
1724		return 0;
1725	}
1726
1727	memset(NEIGH_CB(skb), 0, sizeof(struct neighbour_cb));
1728
1729	switch (msg->icmph.icmp6_type) {
1730	case NDISC_NEIGHBOUR_SOLICITATION:
1731		ndisc_recv_ns(skb);
1732		break;
1733
1734	case NDISC_NEIGHBOUR_ADVERTISEMENT:
1735		ndisc_recv_na(skb);
1736		break;
1737
1738	case NDISC_ROUTER_SOLICITATION:
1739		ndisc_recv_rs(skb);
1740		break;
1741
1742	case NDISC_ROUTER_ADVERTISEMENT:
1743		ndisc_router_discovery(skb);
1744		break;
1745
1746	case NDISC_REDIRECT:
1747		ndisc_redirect_rcv(skb);
1748		break;
1749	}
1750
1751	return 0;
1752}
1753
1754static int ndisc_netdev_event(struct notifier_block *this, unsigned long event, void *ptr)
1755{
1756	struct net_device *dev = netdev_notifier_info_to_dev(ptr);
1757	struct netdev_notifier_change_info *change_info;
1758	struct net *net = dev_net(dev);
1759	struct inet6_dev *idev;
1760
1761	switch (event) {
1762	case NETDEV_CHANGEADDR:
1763		neigh_changeaddr(&nd_tbl, dev);
1764		fib6_run_gc(0, net, false);
1765		/* fallthrough */
1766	case NETDEV_UP:
1767		idev = in6_dev_get(dev);
1768		if (!idev)
1769			break;
1770		if (idev->cnf.ndisc_notify ||
1771		    net->ipv6.devconf_all->ndisc_notify)
1772			ndisc_send_unsol_na(dev);
1773		in6_dev_put(idev);
1774		break;
1775	case NETDEV_CHANGE:
1776		change_info = ptr;
1777		if (change_info->flags_changed & IFF_NOARP)
1778			neigh_changeaddr(&nd_tbl, dev);
1779		break;
1780	case NETDEV_DOWN:
1781		neigh_ifdown(&nd_tbl, dev);
1782		fib6_run_gc(0, net, false);
1783		break;
1784	case NETDEV_NOTIFY_PEERS:
1785		ndisc_send_unsol_na(dev);
1786		break;
1787	default:
1788		break;
1789	}
1790
1791	return NOTIFY_DONE;
1792}
1793
1794static struct notifier_block ndisc_netdev_notifier = {
1795	.notifier_call = ndisc_netdev_event,
1796	.priority = ADDRCONF_NOTIFY_PRIORITY - 5,
1797};
1798
1799#ifdef CONFIG_SYSCTL
1800static void ndisc_warn_deprecated_sysctl(struct ctl_table *ctl,
1801					 const char *func, const char *dev_name)
1802{
1803	static char warncomm[TASK_COMM_LEN];
1804	static int warned;
1805	if (strcmp(warncomm, current->comm) && warned < 5) {
1806		strcpy(warncomm, current->comm);
1807		pr_warn("process `%s' is using deprecated sysctl (%s) net.ipv6.neigh.%s.%s - use net.ipv6.neigh.%s.%s_ms instead\n",
1808			warncomm, func,
1809			dev_name, ctl->procname,
1810			dev_name, ctl->procname);
1811		warned++;
1812	}
1813}
1814
1815int ndisc_ifinfo_sysctl_change(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos)
1816{
1817	struct net_device *dev = ctl->extra1;
1818	struct inet6_dev *idev;
1819	int ret;
1820
1821	if ((strcmp(ctl->procname, "retrans_time") == 0) ||
1822	    (strcmp(ctl->procname, "base_reachable_time") == 0))
1823		ndisc_warn_deprecated_sysctl(ctl, "syscall", dev ? dev->name : "default");
1824
1825	if (strcmp(ctl->procname, "retrans_time") == 0)
1826		ret = neigh_proc_dointvec(ctl, write, buffer, lenp, ppos);
1827
1828	else if (strcmp(ctl->procname, "base_reachable_time") == 0)
1829		ret = neigh_proc_dointvec_jiffies(ctl, write,
1830						  buffer, lenp, ppos);
1831
1832	else if ((strcmp(ctl->procname, "retrans_time_ms") == 0) ||
1833		 (strcmp(ctl->procname, "base_reachable_time_ms") == 0))
1834		ret = neigh_proc_dointvec_ms_jiffies(ctl, write,
1835						     buffer, lenp, ppos);
1836	else
1837		ret = -1;
1838
1839	if (write && ret == 0 && dev && (idev = in6_dev_get(dev)) != NULL) {
1840		if (ctl->data == &NEIGH_VAR(idev->nd_parms, BASE_REACHABLE_TIME))
1841			idev->nd_parms->reachable_time =
1842					neigh_rand_reach_time(NEIGH_VAR(idev->nd_parms, BASE_REACHABLE_TIME));
1843		idev->tstamp = jiffies;
1844		inet6_ifinfo_notify(RTM_NEWLINK, idev);
1845		in6_dev_put(idev);
1846	}
1847	return ret;
1848}
1849
1850
1851#endif
1852
1853static int __net_init ndisc_net_init(struct net *net)
1854{
1855	struct ipv6_pinfo *np;
1856	struct sock *sk;
1857	int err;
1858
1859	err = inet_ctl_sock_create(&sk, PF_INET6,
1860				   SOCK_RAW, IPPROTO_ICMPV6, net);
1861	if (err < 0) {
1862		ND_PRINTK(0, err,
1863			  "NDISC: Failed to initialize the control socket (err %d)\n",
1864			  err);
1865		return err;
1866	}
1867
1868	net->ipv6.ndisc_sk = sk;
1869
1870	np = inet6_sk(sk);
1871	np->hop_limit = 255;
1872	/* Do not loopback ndisc messages */
1873	np->mc_loop = 0;
1874
1875	return 0;
1876}
1877
1878static void __net_exit ndisc_net_exit(struct net *net)
1879{
1880	inet_ctl_sock_destroy(net->ipv6.ndisc_sk);
1881}
1882
1883static struct pernet_operations ndisc_net_ops = {
1884	.init = ndisc_net_init,
1885	.exit = ndisc_net_exit,
1886};
1887
1888int __init ndisc_init(void)
1889{
1890	int err;
1891
1892	err = register_pernet_subsys(&ndisc_net_ops);
1893	if (err)
1894		return err;
1895	/*
1896	 * Initialize the neighbour table
1897	 */
1898	neigh_table_init(NEIGH_ND_TABLE, &nd_tbl);
1899
1900#ifdef CONFIG_SYSCTL
1901	err = neigh_sysctl_register(NULL, &nd_tbl.parms,
1902				    ndisc_ifinfo_sysctl_change);
1903	if (err)
1904		goto out_unregister_pernet;
1905out:
1906#endif
1907	return err;
1908
1909#ifdef CONFIG_SYSCTL
1910out_unregister_pernet:
1911	unregister_pernet_subsys(&ndisc_net_ops);
1912	goto out;
1913#endif
1914}
1915
1916int __init ndisc_late_init(void)
1917{
1918	return register_netdevice_notifier(&ndisc_netdev_notifier);
1919}
1920
1921void ndisc_late_cleanup(void)
1922{
1923	unregister_netdevice_notifier(&ndisc_netdev_notifier);
1924}
1925
1926void ndisc_cleanup(void)
1927{
1928#ifdef CONFIG_SYSCTL
1929	neigh_sysctl_unregister(&nd_tbl.parms);
1930#endif
1931	neigh_table_clear(NEIGH_ND_TABLE, &nd_tbl);
1932	unregister_pernet_subsys(&ndisc_net_ops);
1933}
v4.6
   1/*
   2 *	Neighbour Discovery for IPv6
   3 *	Linux INET6 implementation
   4 *
   5 *	Authors:
   6 *	Pedro Roque		<roque@di.fc.ul.pt>
   7 *	Mike Shaver		<shaver@ingenia.com>
   8 *
   9 *	This program is free software; you can redistribute it and/or
  10 *      modify it under the terms of the GNU General Public License
  11 *      as published by the Free Software Foundation; either version
  12 *      2 of the License, or (at your option) any later version.
  13 */
  14
  15/*
  16 *	Changes:
  17 *
  18 *	Alexey I. Froloff		:	RFC6106 (DNSSL) support
  19 *	Pierre Ynard			:	export userland ND options
  20 *						through netlink (RDNSS support)
  21 *	Lars Fenneberg			:	fixed MTU setting on receipt
  22 *						of an RA.
  23 *	Janos Farkas			:	kmalloc failure checks
  24 *	Alexey Kuznetsov		:	state machine reworked
  25 *						and moved to net/core.
  26 *	Pekka Savola			:	RFC2461 validation
  27 *	YOSHIFUJI Hideaki @USAGI	:	Verify ND options properly
  28 */
  29
  30#define pr_fmt(fmt) "ICMPv6: " fmt
  31
  32#include <linux/module.h>
  33#include <linux/errno.h>
  34#include <linux/types.h>
  35#include <linux/socket.h>
  36#include <linux/sockios.h>
  37#include <linux/sched.h>
  38#include <linux/net.h>
  39#include <linux/in6.h>
  40#include <linux/route.h>
  41#include <linux/init.h>
  42#include <linux/rcupdate.h>
  43#include <linux/slab.h>
  44#ifdef CONFIG_SYSCTL
  45#include <linux/sysctl.h>
  46#endif
  47
  48#include <linux/if_addr.h>
 
  49#include <linux/if_arp.h>
  50#include <linux/ipv6.h>
  51#include <linux/icmpv6.h>
  52#include <linux/jhash.h>
  53
  54#include <net/sock.h>
  55#include <net/snmp.h>
  56
  57#include <net/ipv6.h>
  58#include <net/protocol.h>
  59#include <net/ndisc.h>
  60#include <net/ip6_route.h>
  61#include <net/addrconf.h>
  62#include <net/icmp.h>
  63
  64#include <net/netlink.h>
  65#include <linux/rtnetlink.h>
  66
  67#include <net/flow.h>
  68#include <net/ip6_checksum.h>
  69#include <net/inet_common.h>
  70#include <net/l3mdev.h>
  71#include <linux/proc_fs.h>
  72
  73#include <linux/netfilter.h>
  74#include <linux/netfilter_ipv6.h>
  75
  76/* Set to 3 to get tracing... */
  77#define ND_DEBUG 1
  78
  79#define ND_PRINTK(val, level, fmt, ...)				\
  80do {								\
  81	if (val <= ND_DEBUG)					\
  82		net_##level##_ratelimited(fmt, ##__VA_ARGS__);	\
  83} while (0)
  84
  85static u32 ndisc_hash(const void *pkey,
  86		      const struct net_device *dev,
  87		      __u32 *hash_rnd);
  88static bool ndisc_key_eq(const struct neighbour *neigh, const void *pkey);
  89static int ndisc_constructor(struct neighbour *neigh);
  90static void ndisc_solicit(struct neighbour *neigh, struct sk_buff *skb);
  91static void ndisc_error_report(struct neighbour *neigh, struct sk_buff *skb);
  92static int pndisc_constructor(struct pneigh_entry *n);
  93static void pndisc_destructor(struct pneigh_entry *n);
  94static void pndisc_redo(struct sk_buff *skb);
  95
  96static const struct neigh_ops ndisc_generic_ops = {
  97	.family =		AF_INET6,
  98	.solicit =		ndisc_solicit,
  99	.error_report =		ndisc_error_report,
 100	.output =		neigh_resolve_output,
 101	.connected_output =	neigh_connected_output,
 102};
 103
 104static const struct neigh_ops ndisc_hh_ops = {
 105	.family =		AF_INET6,
 106	.solicit =		ndisc_solicit,
 107	.error_report =		ndisc_error_report,
 108	.output =		neigh_resolve_output,
 109	.connected_output =	neigh_resolve_output,
 110};
 111
 112
 113static const struct neigh_ops ndisc_direct_ops = {
 114	.family =		AF_INET6,
 115	.output =		neigh_direct_output,
 116	.connected_output =	neigh_direct_output,
 117};
 118
 119struct neigh_table nd_tbl = {
 120	.family =	AF_INET6,
 121	.key_len =	sizeof(struct in6_addr),
 122	.protocol =	cpu_to_be16(ETH_P_IPV6),
 123	.hash =		ndisc_hash,
 124	.key_eq =	ndisc_key_eq,
 125	.constructor =	ndisc_constructor,
 126	.pconstructor =	pndisc_constructor,
 127	.pdestructor =	pndisc_destructor,
 128	.proxy_redo =	pndisc_redo,
 129	.id =		"ndisc_cache",
 130	.parms = {
 131		.tbl			= &nd_tbl,
 132		.reachable_time		= ND_REACHABLE_TIME,
 133		.data = {
 134			[NEIGH_VAR_MCAST_PROBES] = 3,
 135			[NEIGH_VAR_UCAST_PROBES] = 3,
 136			[NEIGH_VAR_RETRANS_TIME] = ND_RETRANS_TIMER,
 137			[NEIGH_VAR_BASE_REACHABLE_TIME] = ND_REACHABLE_TIME,
 138			[NEIGH_VAR_DELAY_PROBE_TIME] = 5 * HZ,
 139			[NEIGH_VAR_GC_STALETIME] = 60 * HZ,
 140			[NEIGH_VAR_QUEUE_LEN_BYTES] = 64 * 1024,
 141			[NEIGH_VAR_PROXY_QLEN] = 64,
 142			[NEIGH_VAR_ANYCAST_DELAY] = 1 * HZ,
 143			[NEIGH_VAR_PROXY_DELAY] = (8 * HZ) / 10,
 144		},
 145	},
 146	.gc_interval =	  30 * HZ,
 147	.gc_thresh1 =	 128,
 148	.gc_thresh2 =	 512,
 149	.gc_thresh3 =	1024,
 150};
 151EXPORT_SYMBOL_GPL(nd_tbl);
 152
 153static void ndisc_fill_addr_option(struct sk_buff *skb, int type, void *data)
 
 154{
 155	int pad   = ndisc_addr_option_pad(skb->dev->type);
 156	int data_len = skb->dev->addr_len;
 157	int space = ndisc_opt_addr_space(skb->dev);
 158	u8 *opt = skb_put(skb, space);
 159
 160	opt[0] = type;
 161	opt[1] = space>>3;
 162
 163	memset(opt + 2, 0, pad);
 164	opt   += pad;
 165	space -= pad;
 166
 167	memcpy(opt+2, data, data_len);
 168	data_len += 2;
 169	opt += data_len;
 170	space -= data_len;
 171	if (space > 0)
 172		memset(opt, 0, space);
 173}
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 174
 175static struct nd_opt_hdr *ndisc_next_option(struct nd_opt_hdr *cur,
 176					    struct nd_opt_hdr *end)
 177{
 178	int type;
 179	if (!cur || !end || cur >= end)
 180		return NULL;
 181	type = cur->nd_opt_type;
 182	do {
 183		cur = ((void *)cur) + (cur->nd_opt_len << 3);
 184	} while (cur < end && cur->nd_opt_type != type);
 185	return cur <= end && cur->nd_opt_type == type ? cur : NULL;
 186}
 187
 188static inline int ndisc_is_useropt(struct nd_opt_hdr *opt)
 
 189{
 190	return opt->nd_opt_type == ND_OPT_RDNSS ||
 191		opt->nd_opt_type == ND_OPT_DNSSL;
 
 192}
 193
 194static struct nd_opt_hdr *ndisc_next_useropt(struct nd_opt_hdr *cur,
 
 195					     struct nd_opt_hdr *end)
 196{
 197	if (!cur || !end || cur >= end)
 198		return NULL;
 199	do {
 200		cur = ((void *)cur) + (cur->nd_opt_len << 3);
 201	} while (cur < end && !ndisc_is_useropt(cur));
 202	return cur <= end && ndisc_is_useropt(cur) ? cur : NULL;
 203}
 204
 205struct ndisc_options *ndisc_parse_options(u8 *opt, int opt_len,
 
 206					  struct ndisc_options *ndopts)
 207{
 208	struct nd_opt_hdr *nd_opt = (struct nd_opt_hdr *)opt;
 209
 210	if (!nd_opt || opt_len < 0 || !ndopts)
 211		return NULL;
 212	memset(ndopts, 0, sizeof(*ndopts));
 213	while (opt_len) {
 214		int l;
 215		if (opt_len < sizeof(struct nd_opt_hdr))
 216			return NULL;
 217		l = nd_opt->nd_opt_len << 3;
 218		if (opt_len < l || l == 0)
 219			return NULL;
 
 
 220		switch (nd_opt->nd_opt_type) {
 221		case ND_OPT_SOURCE_LL_ADDR:
 222		case ND_OPT_TARGET_LL_ADDR:
 223		case ND_OPT_MTU:
 
 224		case ND_OPT_REDIRECT_HDR:
 225			if (ndopts->nd_opt_array[nd_opt->nd_opt_type]) {
 226				ND_PRINTK(2, warn,
 227					  "%s: duplicated ND6 option found: type=%d\n",
 228					  __func__, nd_opt->nd_opt_type);
 229			} else {
 230				ndopts->nd_opt_array[nd_opt->nd_opt_type] = nd_opt;
 231			}
 232			break;
 233		case ND_OPT_PREFIX_INFO:
 234			ndopts->nd_opts_pi_end = nd_opt;
 235			if (!ndopts->nd_opt_array[nd_opt->nd_opt_type])
 236				ndopts->nd_opt_array[nd_opt->nd_opt_type] = nd_opt;
 237			break;
 238#ifdef CONFIG_IPV6_ROUTE_INFO
 239		case ND_OPT_ROUTE_INFO:
 240			ndopts->nd_opts_ri_end = nd_opt;
 241			if (!ndopts->nd_opts_ri)
 242				ndopts->nd_opts_ri = nd_opt;
 243			break;
 244#endif
 245		default:
 246			if (ndisc_is_useropt(nd_opt)) {
 247				ndopts->nd_useropts_end = nd_opt;
 248				if (!ndopts->nd_useropts)
 249					ndopts->nd_useropts = nd_opt;
 250			} else {
 251				/*
 252				 * Unknown options must be silently ignored,
 253				 * to accommodate future extension to the
 254				 * protocol.
 255				 */
 256				ND_PRINTK(2, notice,
 257					  "%s: ignored unsupported option; type=%d, len=%d\n",
 258					  __func__,
 259					  nd_opt->nd_opt_type,
 260					  nd_opt->nd_opt_len);
 261			}
 262		}
 
 263		opt_len -= l;
 264		nd_opt = ((void *)nd_opt) + l;
 265	}
 266	return ndopts;
 267}
 268
 269int ndisc_mc_map(const struct in6_addr *addr, char *buf, struct net_device *dev, int dir)
 270{
 271	switch (dev->type) {
 272	case ARPHRD_ETHER:
 273	case ARPHRD_IEEE802:	/* Not sure. Check it later. --ANK */
 274	case ARPHRD_FDDI:
 275		ipv6_eth_mc_map(addr, buf);
 276		return 0;
 277	case ARPHRD_ARCNET:
 278		ipv6_arcnet_mc_map(addr, buf);
 279		return 0;
 280	case ARPHRD_INFINIBAND:
 281		ipv6_ib_mc_map(addr, dev->broadcast, buf);
 282		return 0;
 283	case ARPHRD_IPGRE:
 284		return ipv6_ipgre_mc_map(addr, dev->broadcast, buf);
 285	default:
 286		if (dir) {
 287			memcpy(buf, dev->broadcast, dev->addr_len);
 288			return 0;
 289		}
 290	}
 291	return -EINVAL;
 292}
 293EXPORT_SYMBOL(ndisc_mc_map);
 294
 295static u32 ndisc_hash(const void *pkey,
 296		      const struct net_device *dev,
 297		      __u32 *hash_rnd)
 298{
 299	return ndisc_hashfn(pkey, dev, hash_rnd);
 300}
 301
 302static bool ndisc_key_eq(const struct neighbour *n, const void *pkey)
 303{
 304	return neigh_key_eq128(n, pkey);
 305}
 306
 307static int ndisc_constructor(struct neighbour *neigh)
 308{
 309	struct in6_addr *addr = (struct in6_addr *)&neigh->primary_key;
 310	struct net_device *dev = neigh->dev;
 311	struct inet6_dev *in6_dev;
 312	struct neigh_parms *parms;
 313	bool is_multicast = ipv6_addr_is_multicast(addr);
 314
 315	in6_dev = in6_dev_get(dev);
 316	if (!in6_dev) {
 317		return -EINVAL;
 318	}
 319
 320	parms = in6_dev->nd_parms;
 321	__neigh_parms_put(neigh->parms);
 322	neigh->parms = neigh_parms_clone(parms);
 323
 324	neigh->type = is_multicast ? RTN_MULTICAST : RTN_UNICAST;
 325	if (!dev->header_ops) {
 326		neigh->nud_state = NUD_NOARP;
 327		neigh->ops = &ndisc_direct_ops;
 328		neigh->output = neigh_direct_output;
 329	} else {
 330		if (is_multicast) {
 331			neigh->nud_state = NUD_NOARP;
 332			ndisc_mc_map(addr, neigh->ha, dev, 1);
 333		} else if (dev->flags&(IFF_NOARP|IFF_LOOPBACK)) {
 334			neigh->nud_state = NUD_NOARP;
 335			memcpy(neigh->ha, dev->dev_addr, dev->addr_len);
 336			if (dev->flags&IFF_LOOPBACK)
 337				neigh->type = RTN_LOCAL;
 338		} else if (dev->flags&IFF_POINTOPOINT) {
 339			neigh->nud_state = NUD_NOARP;
 340			memcpy(neigh->ha, dev->broadcast, dev->addr_len);
 341		}
 342		if (dev->header_ops->cache)
 343			neigh->ops = &ndisc_hh_ops;
 344		else
 345			neigh->ops = &ndisc_generic_ops;
 346		if (neigh->nud_state&NUD_VALID)
 347			neigh->output = neigh->ops->connected_output;
 348		else
 349			neigh->output = neigh->ops->output;
 350	}
 351	in6_dev_put(in6_dev);
 352	return 0;
 353}
 354
 355static int pndisc_constructor(struct pneigh_entry *n)
 356{
 357	struct in6_addr *addr = (struct in6_addr *)&n->key;
 358	struct in6_addr maddr;
 359	struct net_device *dev = n->dev;
 360
 361	if (!dev || !__in6_dev_get(dev))
 362		return -EINVAL;
 363	addrconf_addr_solict_mult(addr, &maddr);
 364	ipv6_dev_mc_inc(dev, &maddr);
 365	return 0;
 366}
 367
 368static void pndisc_destructor(struct pneigh_entry *n)
 369{
 370	struct in6_addr *addr = (struct in6_addr *)&n->key;
 371	struct in6_addr maddr;
 372	struct net_device *dev = n->dev;
 373
 374	if (!dev || !__in6_dev_get(dev))
 375		return;
 376	addrconf_addr_solict_mult(addr, &maddr);
 377	ipv6_dev_mc_dec(dev, &maddr);
 378}
 379
 380static struct sk_buff *ndisc_alloc_skb(struct net_device *dev,
 381				       int len)
 382{
 383	int hlen = LL_RESERVED_SPACE(dev);
 384	int tlen = dev->needed_tailroom;
 385	struct sock *sk = dev_net(dev)->ipv6.ndisc_sk;
 386	struct sk_buff *skb;
 387
 388	skb = alloc_skb(hlen + sizeof(struct ipv6hdr) + len + tlen, GFP_ATOMIC);
 389	if (!skb) {
 390		ND_PRINTK(0, err, "ndisc: %s failed to allocate an skb\n",
 391			  __func__);
 392		return NULL;
 393	}
 394
 395	skb->protocol = htons(ETH_P_IPV6);
 396	skb->dev = dev;
 397
 398	skb_reserve(skb, hlen + sizeof(struct ipv6hdr));
 399	skb_reset_transport_header(skb);
 400
 401	/* Manually assign socket ownership as we avoid calling
 402	 * sock_alloc_send_pskb() to bypass wmem buffer limits
 403	 */
 404	skb_set_owner_w(skb, sk);
 405
 406	return skb;
 407}
 408
 409static void ip6_nd_hdr(struct sk_buff *skb,
 410		       const struct in6_addr *saddr,
 411		       const struct in6_addr *daddr,
 412		       int hop_limit, int len)
 413{
 414	struct ipv6hdr *hdr;
 
 
 
 
 
 
 
 415
 416	skb_push(skb, sizeof(*hdr));
 417	skb_reset_network_header(skb);
 418	hdr = ipv6_hdr(skb);
 419
 420	ip6_flow_hdr(hdr, 0, 0);
 421
 422	hdr->payload_len = htons(len);
 423	hdr->nexthdr = IPPROTO_ICMPV6;
 424	hdr->hop_limit = hop_limit;
 425
 426	hdr->saddr = *saddr;
 427	hdr->daddr = *daddr;
 428}
 429
 430static void ndisc_send_skb(struct sk_buff *skb,
 431			   const struct in6_addr *daddr,
 432			   const struct in6_addr *saddr)
 433{
 434	struct dst_entry *dst = skb_dst(skb);
 435	struct net *net = dev_net(skb->dev);
 436	struct sock *sk = net->ipv6.ndisc_sk;
 437	struct inet6_dev *idev;
 438	int err;
 439	struct icmp6hdr *icmp6h = icmp6_hdr(skb);
 440	u8 type;
 441
 442	type = icmp6h->icmp6_type;
 443
 444	if (!dst) {
 445		struct flowi6 fl6;
 446		int oif = l3mdev_fib_oif(skb->dev);
 447
 448		icmpv6_flow_init(sk, &fl6, type, saddr, daddr, oif);
 449		if (oif != skb->dev->ifindex)
 450			fl6.flowi6_flags |= FLOWI_FLAG_L3MDEV_SRC;
 451		dst = icmp6_dst_alloc(skb->dev, &fl6);
 452		if (IS_ERR(dst)) {
 453			kfree_skb(skb);
 454			return;
 455		}
 456
 457		skb_dst_set(skb, dst);
 458	}
 459
 460	icmp6h->icmp6_cksum = csum_ipv6_magic(saddr, daddr, skb->len,
 461					      IPPROTO_ICMPV6,
 462					      csum_partial(icmp6h,
 463							   skb->len, 0));
 464
 465	ip6_nd_hdr(skb, saddr, daddr, inet6_sk(sk)->hop_limit, skb->len);
 466
 467	rcu_read_lock();
 468	idev = __in6_dev_get(dst->dev);
 469	IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUT, skb->len);
 470
 471	err = NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT,
 472		      net, sk, skb, NULL, dst->dev,
 473		      dst_output);
 474	if (!err) {
 475		ICMP6MSGOUT_INC_STATS(net, idev, type);
 476		ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS);
 477	}
 478
 479	rcu_read_unlock();
 480}
 481
 482void ndisc_send_na(struct net_device *dev, const struct in6_addr *daddr,
 483		   const struct in6_addr *solicited_addr,
 484		   bool router, bool solicited, bool override, bool inc_opt)
 485{
 486	struct sk_buff *skb;
 487	struct in6_addr tmpaddr;
 488	struct inet6_ifaddr *ifp;
 489	const struct in6_addr *src_addr;
 490	struct nd_msg *msg;
 491	int optlen = 0;
 492
 493	/* for anycast or proxy, solicited_addr != src_addr */
 494	ifp = ipv6_get_ifaddr(dev_net(dev), solicited_addr, dev, 1);
 495	if (ifp) {
 496		src_addr = solicited_addr;
 497		if (ifp->flags & IFA_F_OPTIMISTIC)
 498			override = false;
 499		inc_opt |= ifp->idev->cnf.force_tllao;
 500		in6_ifa_put(ifp);
 501	} else {
 502		if (ipv6_dev_get_saddr(dev_net(dev), dev, daddr,
 503				       inet6_sk(dev_net(dev)->ipv6.ndisc_sk)->srcprefs,
 504				       &tmpaddr))
 505			return;
 506		src_addr = &tmpaddr;
 507	}
 508
 509	if (!dev->addr_len)
 510		inc_opt = 0;
 511	if (inc_opt)
 512		optlen += ndisc_opt_addr_space(dev);
 
 513
 514	skb = ndisc_alloc_skb(dev, sizeof(*msg) + optlen);
 515	if (!skb)
 516		return;
 517
 518	msg = (struct nd_msg *)skb_put(skb, sizeof(*msg));
 519	*msg = (struct nd_msg) {
 520		.icmph = {
 521			.icmp6_type = NDISC_NEIGHBOUR_ADVERTISEMENT,
 522			.icmp6_router = router,
 523			.icmp6_solicited = solicited,
 524			.icmp6_override = override,
 525		},
 526		.target = *solicited_addr,
 527	};
 528
 529	if (inc_opt)
 530		ndisc_fill_addr_option(skb, ND_OPT_TARGET_LL_ADDR,
 531				       dev->dev_addr);
 532
 533
 534	ndisc_send_skb(skb, daddr, src_addr);
 535}
 536
 537static void ndisc_send_unsol_na(struct net_device *dev)
 538{
 539	struct inet6_dev *idev;
 540	struct inet6_ifaddr *ifa;
 541
 542	idev = in6_dev_get(dev);
 543	if (!idev)
 544		return;
 545
 546	read_lock_bh(&idev->lock);
 547	list_for_each_entry(ifa, &idev->addr_list, if_list) {
 
 
 
 
 
 548		ndisc_send_na(dev, &in6addr_linklocal_allnodes, &ifa->addr,
 549			      /*router=*/ !!idev->cnf.forwarding,
 550			      /*solicited=*/ false, /*override=*/ true,
 551			      /*inc_opt=*/ true);
 552	}
 553	read_unlock_bh(&idev->lock);
 554
 555	in6_dev_put(idev);
 556}
 557
 558void ndisc_send_ns(struct net_device *dev, const struct in6_addr *solicit,
 559		   const struct in6_addr *daddr, const struct in6_addr *saddr)
 
 560{
 561	struct sk_buff *skb;
 562	struct in6_addr addr_buf;
 563	int inc_opt = dev->addr_len;
 564	int optlen = 0;
 565	struct nd_msg *msg;
 566
 567	if (!saddr) {
 568		if (ipv6_get_lladdr(dev, &addr_buf,
 569				   (IFA_F_TENTATIVE|IFA_F_OPTIMISTIC)))
 570			return;
 571		saddr = &addr_buf;
 572	}
 573
 574	if (ipv6_addr_any(saddr))
 575		inc_opt = false;
 576	if (inc_opt)
 577		optlen += ndisc_opt_addr_space(dev);
 
 
 
 578
 579	skb = ndisc_alloc_skb(dev, sizeof(*msg) + optlen);
 580	if (!skb)
 581		return;
 582
 583	msg = (struct nd_msg *)skb_put(skb, sizeof(*msg));
 584	*msg = (struct nd_msg) {
 585		.icmph = {
 586			.icmp6_type = NDISC_NEIGHBOUR_SOLICITATION,
 587		},
 588		.target = *solicit,
 589	};
 590
 591	if (inc_opt)
 592		ndisc_fill_addr_option(skb, ND_OPT_SOURCE_LL_ADDR,
 593				       dev->dev_addr);
 
 
 
 
 
 
 
 
 594
 595	ndisc_send_skb(skb, daddr, saddr);
 596}
 597
 598void ndisc_send_rs(struct net_device *dev, const struct in6_addr *saddr,
 599		   const struct in6_addr *daddr)
 600{
 601	struct sk_buff *skb;
 602	struct rs_msg *msg;
 603	int send_sllao = dev->addr_len;
 604	int optlen = 0;
 605
 606#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
 607	/*
 608	 * According to section 2.2 of RFC 4429, we must not
 609	 * send router solicitations with a sllao from
 610	 * optimistic addresses, but we may send the solicitation
 611	 * if we don't include the sllao.  So here we check
 612	 * if our address is optimistic, and if so, we
 613	 * suppress the inclusion of the sllao.
 614	 */
 615	if (send_sllao) {
 616		struct inet6_ifaddr *ifp = ipv6_get_ifaddr(dev_net(dev), saddr,
 617							   dev, 1);
 618		if (ifp) {
 619			if (ifp->flags & IFA_F_OPTIMISTIC)  {
 620				send_sllao = 0;
 621			}
 622			in6_ifa_put(ifp);
 623		} else {
 624			send_sllao = 0;
 625		}
 626	}
 627#endif
 628	if (send_sllao)
 629		optlen += ndisc_opt_addr_space(dev);
 630
 631	skb = ndisc_alloc_skb(dev, sizeof(*msg) + optlen);
 632	if (!skb)
 633		return;
 634
 635	msg = (struct rs_msg *)skb_put(skb, sizeof(*msg));
 636	*msg = (struct rs_msg) {
 637		.icmph = {
 638			.icmp6_type = NDISC_ROUTER_SOLICITATION,
 639		},
 640	};
 641
 642	if (send_sllao)
 643		ndisc_fill_addr_option(skb, ND_OPT_SOURCE_LL_ADDR,
 644				       dev->dev_addr);
 
 645
 646	ndisc_send_skb(skb, daddr, saddr);
 647}
 648
 649
 650static void ndisc_error_report(struct neighbour *neigh, struct sk_buff *skb)
 651{
 652	/*
 653	 *	"The sender MUST return an ICMP
 654	 *	 destination unreachable"
 655	 */
 656	dst_link_failure(skb);
 657	kfree_skb(skb);
 658}
 659
 660/* Called with locked neigh: either read or both */
 661
 662static void ndisc_solicit(struct neighbour *neigh, struct sk_buff *skb)
 663{
 664	struct in6_addr *saddr = NULL;
 665	struct in6_addr mcaddr;
 666	struct net_device *dev = neigh->dev;
 667	struct in6_addr *target = (struct in6_addr *)&neigh->primary_key;
 668	int probes = atomic_read(&neigh->probes);
 669
 670	if (skb && ipv6_chk_addr_and_flags(dev_net(dev), &ipv6_hdr(skb)->saddr,
 671					   dev, 1,
 672					   IFA_F_TENTATIVE|IFA_F_OPTIMISTIC))
 673		saddr = &ipv6_hdr(skb)->saddr;
 674	probes -= NEIGH_VAR(neigh->parms, UCAST_PROBES);
 675	if (probes < 0) {
 676		if (!(neigh->nud_state & NUD_VALID)) {
 677			ND_PRINTK(1, dbg,
 678				  "%s: trying to ucast probe in NUD_INVALID: %pI6\n",
 679				  __func__, target);
 680		}
 681		ndisc_send_ns(dev, target, target, saddr);
 682	} else if ((probes -= NEIGH_VAR(neigh->parms, APP_PROBES)) < 0) {
 683		neigh_app_ns(neigh);
 684	} else {
 685		addrconf_addr_solict_mult(target, &mcaddr);
 686		ndisc_send_ns(dev, target, &mcaddr, saddr);
 687	}
 688}
 689
 690static int pndisc_is_router(const void *pkey,
 691			    struct net_device *dev)
 692{
 693	struct pneigh_entry *n;
 694	int ret = -1;
 695
 696	read_lock_bh(&nd_tbl.lock);
 697	n = __pneigh_lookup(&nd_tbl, dev_net(dev), pkey, dev);
 698	if (n)
 699		ret = !!(n->flags & NTF_ROUTER);
 700	read_unlock_bh(&nd_tbl.lock);
 701
 702	return ret;
 703}
 704
 
 
 
 
 
 
 
 
 
 705static void ndisc_recv_ns(struct sk_buff *skb)
 706{
 707	struct nd_msg *msg = (struct nd_msg *)skb_transport_header(skb);
 708	const struct in6_addr *saddr = &ipv6_hdr(skb)->saddr;
 709	const struct in6_addr *daddr = &ipv6_hdr(skb)->daddr;
 710	u8 *lladdr = NULL;
 711	u32 ndoptlen = skb_tail_pointer(skb) - (skb_transport_header(skb) +
 712				    offsetof(struct nd_msg, opt));
 713	struct ndisc_options ndopts;
 714	struct net_device *dev = skb->dev;
 715	struct inet6_ifaddr *ifp;
 716	struct inet6_dev *idev = NULL;
 717	struct neighbour *neigh;
 718	int dad = ipv6_addr_any(saddr);
 719	bool inc;
 720	int is_router = -1;
 
 721
 722	if (skb->len < sizeof(struct nd_msg)) {
 723		ND_PRINTK(2, warn, "NS: packet too short\n");
 724		return;
 725	}
 726
 727	if (ipv6_addr_is_multicast(&msg->target)) {
 728		ND_PRINTK(2, warn, "NS: multicast target address\n");
 729		return;
 730	}
 731
 732	/*
 733	 * RFC2461 7.1.1:
 734	 * DAD has to be destined for solicited node multicast address.
 735	 */
 736	if (dad && !ipv6_addr_is_solict_mult(daddr)) {
 737		ND_PRINTK(2, warn, "NS: bad DAD packet (wrong destination)\n");
 738		return;
 739	}
 740
 741	if (!ndisc_parse_options(msg->opt, ndoptlen, &ndopts)) {
 742		ND_PRINTK(2, warn, "NS: invalid ND options\n");
 743		return;
 744	}
 745
 746	if (ndopts.nd_opts_src_lladdr) {
 747		lladdr = ndisc_opt_addr_data(ndopts.nd_opts_src_lladdr, dev);
 748		if (!lladdr) {
 749			ND_PRINTK(2, warn,
 750				  "NS: invalid link-layer address length\n");
 751			return;
 752		}
 753
 754		/* RFC2461 7.1.1:
 755		 *	If the IP source address is the unspecified address,
 756		 *	there MUST NOT be source link-layer address option
 757		 *	in the message.
 758		 */
 759		if (dad) {
 760			ND_PRINTK(2, warn,
 761				  "NS: bad DAD packet (link-layer address option)\n");
 762			return;
 763		}
 764	}
 
 
 765
 766	inc = ipv6_addr_is_multicast(daddr);
 767
 768	ifp = ipv6_get_ifaddr(dev_net(dev), &msg->target, dev, 1);
 769	if (ifp) {
 770have_ifp:
 771		if (ifp->flags & (IFA_F_TENTATIVE|IFA_F_OPTIMISTIC)) {
 772			if (dad) {
 
 
 
 
 
 
 
 
 
 773				/*
 774				 * We are colliding with another node
 775				 * who is doing DAD
 776				 * so fail our DAD process
 777				 */
 778				addrconf_dad_failure(ifp);
 779				return;
 780			} else {
 781				/*
 782				 * This is not a dad solicitation.
 783				 * If we are an optimistic node,
 784				 * we should respond.
 785				 * Otherwise, we should ignore it.
 786				 */
 787				if (!(ifp->flags & IFA_F_OPTIMISTIC))
 788					goto out;
 789			}
 790		}
 791
 792		idev = ifp->idev;
 793	} else {
 794		struct net *net = dev_net(dev);
 795
 796		/* perhaps an address on the master device */
 797		if (netif_is_l3_slave(dev)) {
 798			struct net_device *mdev;
 799
 800			mdev = netdev_master_upper_dev_get_rcu(dev);
 801			if (mdev) {
 802				ifp = ipv6_get_ifaddr(net, &msg->target, mdev, 1);
 803				if (ifp)
 804					goto have_ifp;
 805			}
 806		}
 807
 808		idev = in6_dev_get(dev);
 809		if (!idev) {
 810			/* XXX: count this drop? */
 811			return;
 812		}
 813
 814		if (ipv6_chk_acast_addr(net, dev, &msg->target) ||
 815		    (idev->cnf.forwarding &&
 816		     (net->ipv6.devconf_all->proxy_ndp || idev->cnf.proxy_ndp) &&
 817		     (is_router = pndisc_is_router(&msg->target, dev)) >= 0)) {
 818			if (!(NEIGH_CB(skb)->flags & LOCALLY_ENQUEUED) &&
 819			    skb->pkt_type != PACKET_HOST &&
 820			    inc &&
 821			    NEIGH_VAR(idev->nd_parms, PROXY_DELAY) != 0) {
 822				/*
 823				 * for anycast or proxy,
 824				 * sender should delay its response
 825				 * by a random time between 0 and
 826				 * MAX_ANYCAST_DELAY_TIME seconds.
 827				 * (RFC2461) -- yoshfuji
 828				 */
 829				struct sk_buff *n = skb_clone(skb, GFP_ATOMIC);
 830				if (n)
 831					pneigh_enqueue(&nd_tbl, idev->nd_parms, n);
 832				goto out;
 833			}
 834		} else
 835			goto out;
 836	}
 837
 838	if (is_router < 0)
 839		is_router = idev->cnf.forwarding;
 840
 841	if (dad) {
 842		ndisc_send_na(dev, &in6addr_linklocal_allnodes, &msg->target,
 843			      !!is_router, false, (ifp != NULL), true);
 844		goto out;
 845	}
 846
 847	if (inc)
 848		NEIGH_CACHE_STAT_INC(&nd_tbl, rcv_probes_mcast);
 849	else
 850		NEIGH_CACHE_STAT_INC(&nd_tbl, rcv_probes_ucast);
 851
 852	/*
 853	 *	update / create cache entry
 854	 *	for the source address
 855	 */
 856	neigh = __neigh_lookup(&nd_tbl, saddr, dev,
 857			       !inc || lladdr || !dev->addr_len);
 858	if (neigh)
 859		neigh_update(neigh, lladdr, NUD_STALE,
 860			     NEIGH_UPDATE_F_WEAK_OVERRIDE|
 861			     NEIGH_UPDATE_F_OVERRIDE);
 
 862	if (neigh || !dev->header_ops) {
 863		ndisc_send_na(dev, saddr, &msg->target, !!is_router,
 864			      true, (ifp != NULL && inc), inc);
 865		if (neigh)
 866			neigh_release(neigh);
 867	}
 868
 869out:
 870	if (ifp)
 871		in6_ifa_put(ifp);
 872	else
 873		in6_dev_put(idev);
 874}
 875
 876static void ndisc_recv_na(struct sk_buff *skb)
 877{
 878	struct nd_msg *msg = (struct nd_msg *)skb_transport_header(skb);
 879	struct in6_addr *saddr = &ipv6_hdr(skb)->saddr;
 880	const struct in6_addr *daddr = &ipv6_hdr(skb)->daddr;
 881	u8 *lladdr = NULL;
 882	u32 ndoptlen = skb_tail_pointer(skb) - (skb_transport_header(skb) +
 883				    offsetof(struct nd_msg, opt));
 884	struct ndisc_options ndopts;
 885	struct net_device *dev = skb->dev;
 886	struct inet6_dev *idev = __in6_dev_get(dev);
 887	struct inet6_ifaddr *ifp;
 888	struct neighbour *neigh;
 889
 890	if (skb->len < sizeof(struct nd_msg)) {
 891		ND_PRINTK(2, warn, "NA: packet too short\n");
 892		return;
 893	}
 894
 895	if (ipv6_addr_is_multicast(&msg->target)) {
 896		ND_PRINTK(2, warn, "NA: target address is multicast\n");
 897		return;
 898	}
 899
 900	if (ipv6_addr_is_multicast(daddr) &&
 901	    msg->icmph.icmp6_solicited) {
 902		ND_PRINTK(2, warn, "NA: solicited NA is multicasted\n");
 903		return;
 904	}
 905
 906	/* For some 802.11 wireless deployments (and possibly other networks),
 907	 * there will be a NA proxy and unsolicitd packets are attacks
 908	 * and thus should not be accepted.
 909	 */
 910	if (!msg->icmph.icmp6_solicited && idev &&
 911	    idev->cnf.drop_unsolicited_na)
 912		return;
 913
 914	if (!ndisc_parse_options(msg->opt, ndoptlen, &ndopts)) {
 915		ND_PRINTK(2, warn, "NS: invalid ND option\n");
 916		return;
 917	}
 918	if (ndopts.nd_opts_tgt_lladdr) {
 919		lladdr = ndisc_opt_addr_data(ndopts.nd_opts_tgt_lladdr, dev);
 920		if (!lladdr) {
 921			ND_PRINTK(2, warn,
 922				  "NA: invalid link-layer address length\n");
 923			return;
 924		}
 925	}
 926	ifp = ipv6_get_ifaddr(dev_net(dev), &msg->target, dev, 1);
 927	if (ifp) {
 928		if (skb->pkt_type != PACKET_LOOPBACK
 929		    && (ifp->flags & IFA_F_TENTATIVE)) {
 930				addrconf_dad_failure(ifp);
 931				return;
 932		}
 933		/* What should we make now? The advertisement
 934		   is invalid, but ndisc specs say nothing
 935		   about it. It could be misconfiguration, or
 936		   an smart proxy agent tries to help us :-)
 937
 938		   We should not print the error if NA has been
 939		   received from loopback - it is just our own
 940		   unsolicited advertisement.
 941		 */
 942		if (skb->pkt_type != PACKET_LOOPBACK)
 943			ND_PRINTK(1, warn,
 944				  "NA: someone advertises our address %pI6 on %s!\n",
 945				  &ifp->addr, ifp->idev->dev->name);
 946		in6_ifa_put(ifp);
 947		return;
 948	}
 949	neigh = neigh_lookup(&nd_tbl, &msg->target, dev);
 950
 951	if (neigh) {
 952		u8 old_flags = neigh->flags;
 953		struct net *net = dev_net(dev);
 954
 955		if (neigh->nud_state & NUD_FAILED)
 956			goto out;
 957
 958		/*
 959		 * Don't update the neighbor cache entry on a proxy NA from
 960		 * ourselves because either the proxied node is off link or it
 961		 * has already sent a NA to us.
 962		 */
 963		if (lladdr && !memcmp(lladdr, dev->dev_addr, dev->addr_len) &&
 964		    net->ipv6.devconf_all->forwarding && net->ipv6.devconf_all->proxy_ndp &&
 965		    pneigh_lookup(&nd_tbl, net, &msg->target, dev, 0)) {
 966			/* XXX: idev->cnf.proxy_ndp */
 967			goto out;
 968		}
 969
 970		neigh_update(neigh, lladdr,
 971			     msg->icmph.icmp6_solicited ? NUD_REACHABLE : NUD_STALE,
 972			     NEIGH_UPDATE_F_WEAK_OVERRIDE|
 973			     (msg->icmph.icmp6_override ? NEIGH_UPDATE_F_OVERRIDE : 0)|
 974			     NEIGH_UPDATE_F_OVERRIDE_ISROUTER|
 975			     (msg->icmph.icmp6_router ? NEIGH_UPDATE_F_ISROUTER : 0));
 
 976
 977		if ((old_flags & ~neigh->flags) & NTF_ROUTER) {
 978			/*
 979			 * Change: router to host
 980			 */
 981			rt6_clean_tohost(dev_net(dev),  saddr);
 982		}
 983
 984out:
 985		neigh_release(neigh);
 986	}
 987}
 988
 989static void ndisc_recv_rs(struct sk_buff *skb)
 990{
 991	struct rs_msg *rs_msg = (struct rs_msg *)skb_transport_header(skb);
 992	unsigned long ndoptlen = skb->len - sizeof(*rs_msg);
 993	struct neighbour *neigh;
 994	struct inet6_dev *idev;
 995	const struct in6_addr *saddr = &ipv6_hdr(skb)->saddr;
 996	struct ndisc_options ndopts;
 997	u8 *lladdr = NULL;
 998
 999	if (skb->len < sizeof(*rs_msg))
1000		return;
1001
1002	idev = __in6_dev_get(skb->dev);
1003	if (!idev) {
1004		ND_PRINTK(1, err, "RS: can't find in6 device\n");
1005		return;
1006	}
1007
1008	/* Don't accept RS if we're not in router mode */
1009	if (!idev->cnf.forwarding)
1010		goto out;
1011
1012	/*
1013	 * Don't update NCE if src = ::;
1014	 * this implies that the source node has no ip address assigned yet.
1015	 */
1016	if (ipv6_addr_any(saddr))
1017		goto out;
1018
1019	/* Parse ND options */
1020	if (!ndisc_parse_options(rs_msg->opt, ndoptlen, &ndopts)) {
1021		ND_PRINTK(2, notice, "NS: invalid ND option, ignored\n");
1022		goto out;
1023	}
1024
1025	if (ndopts.nd_opts_src_lladdr) {
1026		lladdr = ndisc_opt_addr_data(ndopts.nd_opts_src_lladdr,
1027					     skb->dev);
1028		if (!lladdr)
1029			goto out;
1030	}
1031
1032	neigh = __neigh_lookup(&nd_tbl, saddr, skb->dev, 1);
1033	if (neigh) {
1034		neigh_update(neigh, lladdr, NUD_STALE,
1035			     NEIGH_UPDATE_F_WEAK_OVERRIDE|
1036			     NEIGH_UPDATE_F_OVERRIDE|
1037			     NEIGH_UPDATE_F_OVERRIDE_ISROUTER);
 
1038		neigh_release(neigh);
1039	}
1040out:
1041	return;
1042}
1043
1044static void ndisc_ra_useropt(struct sk_buff *ra, struct nd_opt_hdr *opt)
1045{
1046	struct icmp6hdr *icmp6h = (struct icmp6hdr *)skb_transport_header(ra);
1047	struct sk_buff *skb;
1048	struct nlmsghdr *nlh;
1049	struct nduseroptmsg *ndmsg;
1050	struct net *net = dev_net(ra->dev);
1051	int err;
1052	int base_size = NLMSG_ALIGN(sizeof(struct nduseroptmsg)
1053				    + (opt->nd_opt_len << 3));
1054	size_t msg_size = base_size + nla_total_size(sizeof(struct in6_addr));
1055
1056	skb = nlmsg_new(msg_size, GFP_ATOMIC);
1057	if (!skb) {
1058		err = -ENOBUFS;
1059		goto errout;
1060	}
1061
1062	nlh = nlmsg_put(skb, 0, 0, RTM_NEWNDUSEROPT, base_size, 0);
1063	if (!nlh) {
1064		goto nla_put_failure;
1065	}
1066
1067	ndmsg = nlmsg_data(nlh);
1068	ndmsg->nduseropt_family = AF_INET6;
1069	ndmsg->nduseropt_ifindex = ra->dev->ifindex;
1070	ndmsg->nduseropt_icmp_type = icmp6h->icmp6_type;
1071	ndmsg->nduseropt_icmp_code = icmp6h->icmp6_code;
1072	ndmsg->nduseropt_opts_len = opt->nd_opt_len << 3;
1073
1074	memcpy(ndmsg + 1, opt, opt->nd_opt_len << 3);
1075
1076	if (nla_put_in6_addr(skb, NDUSEROPT_SRCADDR, &ipv6_hdr(ra)->saddr))
1077		goto nla_put_failure;
1078	nlmsg_end(skb, nlh);
1079
1080	rtnl_notify(skb, net, 0, RTNLGRP_ND_USEROPT, NULL, GFP_ATOMIC);
1081	return;
1082
1083nla_put_failure:
1084	nlmsg_free(skb);
1085	err = -EMSGSIZE;
1086errout:
1087	rtnl_set_sk_err(net, RTNLGRP_ND_USEROPT, err);
1088}
1089
1090static void ndisc_router_discovery(struct sk_buff *skb)
1091{
1092	struct ra_msg *ra_msg = (struct ra_msg *)skb_transport_header(skb);
1093	struct neighbour *neigh = NULL;
1094	struct inet6_dev *in6_dev;
1095	struct rt6_info *rt = NULL;
1096	int lifetime;
1097	struct ndisc_options ndopts;
1098	int optlen;
1099	unsigned int pref = 0;
1100	__u32 old_if_flags;
1101	bool send_ifinfo_notify = false;
1102
1103	__u8 *opt = (__u8 *)(ra_msg + 1);
1104
1105	optlen = (skb_tail_pointer(skb) - skb_transport_header(skb)) -
1106		sizeof(struct ra_msg);
1107
1108	ND_PRINTK(2, info,
1109		  "RA: %s, dev: %s\n",
1110		  __func__, skb->dev->name);
1111	if (!(ipv6_addr_type(&ipv6_hdr(skb)->saddr) & IPV6_ADDR_LINKLOCAL)) {
1112		ND_PRINTK(2, warn, "RA: source address is not link-local\n");
1113		return;
1114	}
1115	if (optlen < 0) {
1116		ND_PRINTK(2, warn, "RA: packet too short\n");
1117		return;
1118	}
1119
1120#ifdef CONFIG_IPV6_NDISC_NODETYPE
1121	if (skb->ndisc_nodetype == NDISC_NODETYPE_HOST) {
1122		ND_PRINTK(2, warn, "RA: from host or unauthorized router\n");
1123		return;
1124	}
1125#endif
1126
1127	/*
1128	 *	set the RA_RECV flag in the interface
1129	 */
1130
1131	in6_dev = __in6_dev_get(skb->dev);
1132	if (!in6_dev) {
1133		ND_PRINTK(0, err, "RA: can't find inet6 device for %s\n",
1134			  skb->dev->name);
1135		return;
1136	}
1137
1138	if (!ndisc_parse_options(opt, optlen, &ndopts)) {
1139		ND_PRINTK(2, warn, "RA: invalid ND options\n");
1140		return;
1141	}
1142
1143	if (!ipv6_accept_ra(in6_dev)) {
1144		ND_PRINTK(2, info,
1145			  "RA: %s, did not accept ra for dev: %s\n",
1146			  __func__, skb->dev->name);
1147		goto skip_linkparms;
1148	}
1149
1150#ifdef CONFIG_IPV6_NDISC_NODETYPE
1151	/* skip link-specific parameters from interior routers */
1152	if (skb->ndisc_nodetype == NDISC_NODETYPE_NODEFAULT) {
1153		ND_PRINTK(2, info,
1154			  "RA: %s, nodetype is NODEFAULT, dev: %s\n",
1155			  __func__, skb->dev->name);
1156		goto skip_linkparms;
1157	}
1158#endif
1159
1160	if (in6_dev->if_flags & IF_RS_SENT) {
1161		/*
1162		 *	flag that an RA was received after an RS was sent
1163		 *	out on this interface.
1164		 */
1165		in6_dev->if_flags |= IF_RA_RCVD;
1166	}
1167
1168	/*
1169	 * Remember the managed/otherconf flags from most recently
1170	 * received RA message (RFC 2462) -- yoshfuji
1171	 */
1172	old_if_flags = in6_dev->if_flags;
1173	in6_dev->if_flags = (in6_dev->if_flags & ~(IF_RA_MANAGED |
1174				IF_RA_OTHERCONF)) |
1175				(ra_msg->icmph.icmp6_addrconf_managed ?
1176					IF_RA_MANAGED : 0) |
1177				(ra_msg->icmph.icmp6_addrconf_other ?
1178					IF_RA_OTHERCONF : 0);
1179
1180	if (old_if_flags != in6_dev->if_flags)
1181		send_ifinfo_notify = true;
1182
1183	if (!in6_dev->cnf.accept_ra_defrtr) {
1184		ND_PRINTK(2, info,
1185			  "RA: %s, defrtr is false for dev: %s\n",
1186			  __func__, skb->dev->name);
1187		goto skip_defrtr;
1188	}
1189
1190	/* Do not accept RA with source-addr found on local machine unless
1191	 * accept_ra_from_local is set to true.
1192	 */
1193	if (!in6_dev->cnf.accept_ra_from_local &&
1194	    ipv6_chk_addr(dev_net(in6_dev->dev), &ipv6_hdr(skb)->saddr,
1195			  in6_dev->dev, 0)) {
1196		ND_PRINTK(2, info,
1197			  "RA from local address detected on dev: %s: default router ignored\n",
1198			  skb->dev->name);
1199		goto skip_defrtr;
1200	}
1201
1202	lifetime = ntohs(ra_msg->icmph.icmp6_rt_lifetime);
1203
1204#ifdef CONFIG_IPV6_ROUTER_PREF
1205	pref = ra_msg->icmph.icmp6_router_pref;
1206	/* 10b is handled as if it were 00b (medium) */
1207	if (pref == ICMPV6_ROUTER_PREF_INVALID ||
1208	    !in6_dev->cnf.accept_ra_rtr_pref)
1209		pref = ICMPV6_ROUTER_PREF_MEDIUM;
1210#endif
1211
1212	rt = rt6_get_dflt_router(&ipv6_hdr(skb)->saddr, skb->dev);
1213
1214	if (rt) {
1215		neigh = dst_neigh_lookup(&rt->dst, &ipv6_hdr(skb)->saddr);
1216		if (!neigh) {
1217			ND_PRINTK(0, err,
1218				  "RA: %s got default router without neighbour\n",
1219				  __func__);
1220			ip6_rt_put(rt);
1221			return;
1222		}
1223	}
1224	if (rt && lifetime == 0) {
1225		ip6_del_rt(rt);
1226		rt = NULL;
1227	}
1228
1229	ND_PRINTK(3, info, "RA: rt: %p  lifetime: %d, for dev: %s\n",
1230		  rt, lifetime, skb->dev->name);
1231	if (!rt && lifetime) {
1232		ND_PRINTK(3, info, "RA: adding default router\n");
1233
1234		rt = rt6_add_dflt_router(&ipv6_hdr(skb)->saddr, skb->dev, pref);
1235		if (!rt) {
1236			ND_PRINTK(0, err,
1237				  "RA: %s failed to add default route\n",
1238				  __func__);
1239			return;
1240		}
1241
1242		neigh = dst_neigh_lookup(&rt->dst, &ipv6_hdr(skb)->saddr);
1243		if (!neigh) {
1244			ND_PRINTK(0, err,
1245				  "RA: %s got default router without neighbour\n",
1246				  __func__);
1247			ip6_rt_put(rt);
1248			return;
1249		}
1250		neigh->flags |= NTF_ROUTER;
1251	} else if (rt) {
1252		rt->rt6i_flags = (rt->rt6i_flags & ~RTF_PREF_MASK) | RTF_PREF(pref);
1253	}
1254
1255	if (rt)
1256		rt6_set_expires(rt, jiffies + (HZ * lifetime));
1257	if (in6_dev->cnf.accept_ra_min_hop_limit < 256 &&
1258	    ra_msg->icmph.icmp6_hop_limit) {
1259		if (in6_dev->cnf.accept_ra_min_hop_limit <= ra_msg->icmph.icmp6_hop_limit) {
1260			in6_dev->cnf.hop_limit = ra_msg->icmph.icmp6_hop_limit;
1261			if (rt)
1262				dst_metric_set(&rt->dst, RTAX_HOPLIMIT,
1263					       ra_msg->icmph.icmp6_hop_limit);
1264		} else {
1265			ND_PRINTK(2, warn, "RA: Got route advertisement with lower hop_limit than minimum\n");
1266		}
1267	}
1268
1269skip_defrtr:
1270
1271	/*
1272	 *	Update Reachable Time and Retrans Timer
1273	 */
1274
1275	if (in6_dev->nd_parms) {
1276		unsigned long rtime = ntohl(ra_msg->retrans_timer);
1277
1278		if (rtime && rtime/1000 < MAX_SCHEDULE_TIMEOUT/HZ) {
1279			rtime = (rtime*HZ)/1000;
1280			if (rtime < HZ/10)
1281				rtime = HZ/10;
1282			NEIGH_VAR_SET(in6_dev->nd_parms, RETRANS_TIME, rtime);
1283			in6_dev->tstamp = jiffies;
1284			send_ifinfo_notify = true;
1285		}
1286
1287		rtime = ntohl(ra_msg->reachable_time);
1288		if (rtime && rtime/1000 < MAX_SCHEDULE_TIMEOUT/(3*HZ)) {
1289			rtime = (rtime*HZ)/1000;
1290
1291			if (rtime < HZ/10)
1292				rtime = HZ/10;
1293
1294			if (rtime != NEIGH_VAR(in6_dev->nd_parms, BASE_REACHABLE_TIME)) {
1295				NEIGH_VAR_SET(in6_dev->nd_parms,
1296					      BASE_REACHABLE_TIME, rtime);
1297				NEIGH_VAR_SET(in6_dev->nd_parms,
1298					      GC_STALETIME, 3 * rtime);
1299				in6_dev->nd_parms->reachable_time = neigh_rand_reach_time(rtime);
1300				in6_dev->tstamp = jiffies;
1301				send_ifinfo_notify = true;
1302			}
1303		}
1304	}
1305
1306	/*
1307	 *	Send a notify if RA changed managed/otherconf flags or timer settings
1308	 */
1309	if (send_ifinfo_notify)
1310		inet6_ifinfo_notify(RTM_NEWLINK, in6_dev);
1311
1312skip_linkparms:
1313
1314	/*
1315	 *	Process options.
1316	 */
1317
1318	if (!neigh)
1319		neigh = __neigh_lookup(&nd_tbl, &ipv6_hdr(skb)->saddr,
1320				       skb->dev, 1);
1321	if (neigh) {
1322		u8 *lladdr = NULL;
1323		if (ndopts.nd_opts_src_lladdr) {
1324			lladdr = ndisc_opt_addr_data(ndopts.nd_opts_src_lladdr,
1325						     skb->dev);
1326			if (!lladdr) {
1327				ND_PRINTK(2, warn,
1328					  "RA: invalid link-layer address length\n");
1329				goto out;
1330			}
1331		}
1332		neigh_update(neigh, lladdr, NUD_STALE,
1333			     NEIGH_UPDATE_F_WEAK_OVERRIDE|
1334			     NEIGH_UPDATE_F_OVERRIDE|
1335			     NEIGH_UPDATE_F_OVERRIDE_ISROUTER|
1336			     NEIGH_UPDATE_F_ISROUTER);
 
1337	}
1338
1339	if (!ipv6_accept_ra(in6_dev)) {
1340		ND_PRINTK(2, info,
1341			  "RA: %s, accept_ra is false for dev: %s\n",
1342			  __func__, skb->dev->name);
1343		goto out;
1344	}
1345
1346#ifdef CONFIG_IPV6_ROUTE_INFO
1347	if (!in6_dev->cnf.accept_ra_from_local &&
1348	    ipv6_chk_addr(dev_net(in6_dev->dev), &ipv6_hdr(skb)->saddr,
1349			  in6_dev->dev, 0)) {
1350		ND_PRINTK(2, info,
1351			  "RA from local address detected on dev: %s: router info ignored.\n",
1352			  skb->dev->name);
1353		goto skip_routeinfo;
1354	}
1355
1356	if (in6_dev->cnf.accept_ra_rtr_pref && ndopts.nd_opts_ri) {
1357		struct nd_opt_hdr *p;
1358		for (p = ndopts.nd_opts_ri;
1359		     p;
1360		     p = ndisc_next_option(p, ndopts.nd_opts_ri_end)) {
1361			struct route_info *ri = (struct route_info *)p;
1362#ifdef CONFIG_IPV6_NDISC_NODETYPE
1363			if (skb->ndisc_nodetype == NDISC_NODETYPE_NODEFAULT &&
1364			    ri->prefix_len == 0)
1365				continue;
1366#endif
1367			if (ri->prefix_len == 0 &&
1368			    !in6_dev->cnf.accept_ra_defrtr)
1369				continue;
 
 
1370			if (ri->prefix_len > in6_dev->cnf.accept_ra_rt_info_max_plen)
1371				continue;
1372			rt6_route_rcv(skb->dev, (u8 *)p, (p->nd_opt_len) << 3,
1373				      &ipv6_hdr(skb)->saddr);
1374		}
1375	}
1376
1377skip_routeinfo:
1378#endif
1379
1380#ifdef CONFIG_IPV6_NDISC_NODETYPE
1381	/* skip link-specific ndopts from interior routers */
1382	if (skb->ndisc_nodetype == NDISC_NODETYPE_NODEFAULT) {
1383		ND_PRINTK(2, info,
1384			  "RA: %s, nodetype is NODEFAULT (interior routes), dev: %s\n",
1385			  __func__, skb->dev->name);
1386		goto out;
1387	}
1388#endif
1389
1390	if (in6_dev->cnf.accept_ra_pinfo && ndopts.nd_opts_pi) {
1391		struct nd_opt_hdr *p;
1392		for (p = ndopts.nd_opts_pi;
1393		     p;
1394		     p = ndisc_next_option(p, ndopts.nd_opts_pi_end)) {
1395			addrconf_prefix_rcv(skb->dev, (u8 *)p,
1396					    (p->nd_opt_len) << 3,
1397					    ndopts.nd_opts_src_lladdr != NULL);
1398		}
1399	}
1400
1401	if (ndopts.nd_opts_mtu && in6_dev->cnf.accept_ra_mtu) {
1402		__be32 n;
1403		u32 mtu;
1404
1405		memcpy(&n, ((u8 *)(ndopts.nd_opts_mtu+1))+2, sizeof(mtu));
1406		mtu = ntohl(n);
1407
1408		if (mtu < IPV6_MIN_MTU || mtu > skb->dev->mtu) {
1409			ND_PRINTK(2, warn, "RA: invalid mtu: %d\n", mtu);
1410		} else if (in6_dev->cnf.mtu6 != mtu) {
1411			in6_dev->cnf.mtu6 = mtu;
1412
1413			if (rt)
1414				dst_metric_set(&rt->dst, RTAX_MTU, mtu);
1415
1416			rt6_mtu_change(skb->dev, mtu);
1417		}
1418	}
1419
1420	if (ndopts.nd_useropts) {
1421		struct nd_opt_hdr *p;
1422		for (p = ndopts.nd_useropts;
1423		     p;
1424		     p = ndisc_next_useropt(p, ndopts.nd_useropts_end)) {
 
1425			ndisc_ra_useropt(skb, p);
1426		}
1427	}
1428
1429	if (ndopts.nd_opts_tgt_lladdr || ndopts.nd_opts_rh) {
1430		ND_PRINTK(2, warn, "RA: invalid RA options\n");
1431	}
1432out:
1433	ip6_rt_put(rt);
1434	if (neigh)
1435		neigh_release(neigh);
1436}
1437
1438static void ndisc_redirect_rcv(struct sk_buff *skb)
1439{
1440	u8 *hdr;
1441	struct ndisc_options ndopts;
1442	struct rd_msg *msg = (struct rd_msg *)skb_transport_header(skb);
1443	u32 ndoptlen = skb_tail_pointer(skb) - (skb_transport_header(skb) +
1444				    offsetof(struct rd_msg, opt));
1445
1446#ifdef CONFIG_IPV6_NDISC_NODETYPE
1447	switch (skb->ndisc_nodetype) {
1448	case NDISC_NODETYPE_HOST:
1449	case NDISC_NODETYPE_NODEFAULT:
1450		ND_PRINTK(2, warn,
1451			  "Redirect: from host or unauthorized router\n");
1452		return;
1453	}
1454#endif
1455
1456	if (!(ipv6_addr_type(&ipv6_hdr(skb)->saddr) & IPV6_ADDR_LINKLOCAL)) {
1457		ND_PRINTK(2, warn,
1458			  "Redirect: source address is not link-local\n");
1459		return;
1460	}
1461
1462	if (!ndisc_parse_options(msg->opt, ndoptlen, &ndopts))
1463		return;
1464
1465	if (!ndopts.nd_opts_rh) {
1466		ip6_redirect_no_header(skb, dev_net(skb->dev),
1467					skb->dev->ifindex, 0);
1468		return;
1469	}
1470
1471	hdr = (u8 *)ndopts.nd_opts_rh;
1472	hdr += 8;
1473	if (!pskb_pull(skb, hdr - skb_transport_header(skb)))
1474		return;
1475
1476	icmpv6_notify(skb, NDISC_REDIRECT, 0, 0);
1477}
1478
1479static void ndisc_fill_redirect_hdr_option(struct sk_buff *skb,
1480					   struct sk_buff *orig_skb,
1481					   int rd_len)
1482{
1483	u8 *opt = skb_put(skb, rd_len);
1484
1485	memset(opt, 0, 8);
1486	*(opt++) = ND_OPT_REDIRECT_HDR;
1487	*(opt++) = (rd_len >> 3);
1488	opt += 6;
1489
1490	memcpy(opt, ipv6_hdr(orig_skb), rd_len - 8);
 
1491}
1492
1493void ndisc_send_redirect(struct sk_buff *skb, const struct in6_addr *target)
1494{
1495	struct net_device *dev = skb->dev;
1496	struct net *net = dev_net(dev);
1497	struct sock *sk = net->ipv6.ndisc_sk;
1498	int optlen = 0;
1499	struct inet_peer *peer;
1500	struct sk_buff *buff;
1501	struct rd_msg *msg;
1502	struct in6_addr saddr_buf;
1503	struct rt6_info *rt;
1504	struct dst_entry *dst;
1505	struct flowi6 fl6;
1506	int rd_len;
1507	u8 ha_buf[MAX_ADDR_LEN], *ha = NULL;
1508	int oif = l3mdev_fib_oif(dev);
1509	bool ret;
1510
1511	if (ipv6_get_lladdr(dev, &saddr_buf, IFA_F_TENTATIVE)) {
1512		ND_PRINTK(2, warn, "Redirect: no link-local address on %s\n",
1513			  dev->name);
1514		return;
1515	}
1516
1517	if (!ipv6_addr_equal(&ipv6_hdr(skb)->daddr, target) &&
1518	    ipv6_addr_type(target) != (IPV6_ADDR_UNICAST|IPV6_ADDR_LINKLOCAL)) {
1519		ND_PRINTK(2, warn,
1520			  "Redirect: target address is not link-local unicast\n");
1521		return;
1522	}
1523
1524	icmpv6_flow_init(sk, &fl6, NDISC_REDIRECT,
1525			 &saddr_buf, &ipv6_hdr(skb)->saddr, oif);
1526
1527	if (oif != skb->dev->ifindex)
1528		fl6.flowi6_flags |= FLOWI_FLAG_L3MDEV_SRC;
1529
1530	dst = ip6_route_output(net, NULL, &fl6);
1531	if (dst->error) {
1532		dst_release(dst);
1533		return;
1534	}
1535	dst = xfrm_lookup(net, dst, flowi6_to_flowi(&fl6), NULL, 0);
1536	if (IS_ERR(dst))
1537		return;
1538
1539	rt = (struct rt6_info *) dst;
1540
1541	if (rt->rt6i_flags & RTF_GATEWAY) {
1542		ND_PRINTK(2, warn,
1543			  "Redirect: destination is not a neighbour\n");
1544		goto release;
1545	}
1546	peer = inet_getpeer_v6(net->ipv6.peers, &ipv6_hdr(skb)->saddr, 1);
1547	ret = inet_peer_xrlim_allow(peer, 1*HZ);
1548	if (peer)
1549		inet_putpeer(peer);
1550	if (!ret)
1551		goto release;
1552
1553	if (dev->addr_len) {
1554		struct neighbour *neigh = dst_neigh_lookup(skb_dst(skb), target);
1555		if (!neigh) {
1556			ND_PRINTK(2, warn,
1557				  "Redirect: no neigh for target address\n");
1558			goto release;
1559		}
1560
1561		read_lock_bh(&neigh->lock);
1562		if (neigh->nud_state & NUD_VALID) {
1563			memcpy(ha_buf, neigh->ha, dev->addr_len);
1564			read_unlock_bh(&neigh->lock);
1565			ha = ha_buf;
1566			optlen += ndisc_opt_addr_space(dev);
 
 
1567		} else
1568			read_unlock_bh(&neigh->lock);
1569
1570		neigh_release(neigh);
1571	}
1572
1573	rd_len = min_t(unsigned int,
1574		       IPV6_MIN_MTU - sizeof(struct ipv6hdr) - sizeof(*msg) - optlen,
1575		       skb->len + 8);
1576	rd_len &= ~0x7;
1577	optlen += rd_len;
1578
1579	buff = ndisc_alloc_skb(dev, sizeof(*msg) + optlen);
1580	if (!buff)
1581		goto release;
1582
1583	msg = (struct rd_msg *)skb_put(buff, sizeof(*msg));
1584	*msg = (struct rd_msg) {
1585		.icmph = {
1586			.icmp6_type = NDISC_REDIRECT,
1587		},
1588		.target = *target,
1589		.dest = ipv6_hdr(skb)->daddr,
1590	};
1591
1592	/*
1593	 *	include target_address option
1594	 */
1595
1596	if (ha)
1597		ndisc_fill_addr_option(buff, ND_OPT_TARGET_LL_ADDR, ha);
1598
1599	/*
1600	 *	build redirect option and copy skb over to the new packet.
1601	 */
1602
1603	if (rd_len)
1604		ndisc_fill_redirect_hdr_option(buff, skb, rd_len);
1605
1606	skb_dst_set(buff, dst);
1607	ndisc_send_skb(buff, &ipv6_hdr(skb)->saddr, &saddr_buf);
1608	return;
1609
1610release:
1611	dst_release(dst);
1612}
1613
1614static void pndisc_redo(struct sk_buff *skb)
1615{
1616	ndisc_recv_ns(skb);
1617	kfree_skb(skb);
1618}
1619
1620static bool ndisc_suppress_frag_ndisc(struct sk_buff *skb)
1621{
1622	struct inet6_dev *idev = __in6_dev_get(skb->dev);
1623
1624	if (!idev)
1625		return true;
1626	if (IP6CB(skb)->flags & IP6SKB_FRAGMENTED &&
1627	    idev->cnf.suppress_frag_ndisc) {
1628		net_warn_ratelimited("Received fragmented ndisc packet. Carefully consider disabling suppress_frag_ndisc.\n");
1629		return true;
1630	}
1631	return false;
1632}
1633
1634int ndisc_rcv(struct sk_buff *skb)
1635{
1636	struct nd_msg *msg;
1637
1638	if (ndisc_suppress_frag_ndisc(skb))
1639		return 0;
1640
1641	if (skb_linearize(skb))
1642		return 0;
1643
1644	msg = (struct nd_msg *)skb_transport_header(skb);
1645
1646	__skb_push(skb, skb->data - skb_transport_header(skb));
1647
1648	if (ipv6_hdr(skb)->hop_limit != 255) {
1649		ND_PRINTK(2, warn, "NDISC: invalid hop-limit: %d\n",
1650			  ipv6_hdr(skb)->hop_limit);
1651		return 0;
1652	}
1653
1654	if (msg->icmph.icmp6_code != 0) {
1655		ND_PRINTK(2, warn, "NDISC: invalid ICMPv6 code: %d\n",
1656			  msg->icmph.icmp6_code);
1657		return 0;
1658	}
1659
1660	memset(NEIGH_CB(skb), 0, sizeof(struct neighbour_cb));
1661
1662	switch (msg->icmph.icmp6_type) {
1663	case NDISC_NEIGHBOUR_SOLICITATION:
1664		ndisc_recv_ns(skb);
1665		break;
1666
1667	case NDISC_NEIGHBOUR_ADVERTISEMENT:
1668		ndisc_recv_na(skb);
1669		break;
1670
1671	case NDISC_ROUTER_SOLICITATION:
1672		ndisc_recv_rs(skb);
1673		break;
1674
1675	case NDISC_ROUTER_ADVERTISEMENT:
1676		ndisc_router_discovery(skb);
1677		break;
1678
1679	case NDISC_REDIRECT:
1680		ndisc_redirect_rcv(skb);
1681		break;
1682	}
1683
1684	return 0;
1685}
1686
1687static int ndisc_netdev_event(struct notifier_block *this, unsigned long event, void *ptr)
1688{
1689	struct net_device *dev = netdev_notifier_info_to_dev(ptr);
1690	struct netdev_notifier_change_info *change_info;
1691	struct net *net = dev_net(dev);
1692	struct inet6_dev *idev;
1693
1694	switch (event) {
1695	case NETDEV_CHANGEADDR:
1696		neigh_changeaddr(&nd_tbl, dev);
1697		fib6_run_gc(0, net, false);
 
 
1698		idev = in6_dev_get(dev);
1699		if (!idev)
1700			break;
1701		if (idev->cnf.ndisc_notify)
 
1702			ndisc_send_unsol_na(dev);
1703		in6_dev_put(idev);
1704		break;
1705	case NETDEV_CHANGE:
1706		change_info = ptr;
1707		if (change_info->flags_changed & IFF_NOARP)
1708			neigh_changeaddr(&nd_tbl, dev);
1709		break;
1710	case NETDEV_DOWN:
1711		neigh_ifdown(&nd_tbl, dev);
1712		fib6_run_gc(0, net, false);
1713		break;
1714	case NETDEV_NOTIFY_PEERS:
1715		ndisc_send_unsol_na(dev);
1716		break;
1717	default:
1718		break;
1719	}
1720
1721	return NOTIFY_DONE;
1722}
1723
1724static struct notifier_block ndisc_netdev_notifier = {
1725	.notifier_call = ndisc_netdev_event,
 
1726};
1727
1728#ifdef CONFIG_SYSCTL
1729static void ndisc_warn_deprecated_sysctl(struct ctl_table *ctl,
1730					 const char *func, const char *dev_name)
1731{
1732	static char warncomm[TASK_COMM_LEN];
1733	static int warned;
1734	if (strcmp(warncomm, current->comm) && warned < 5) {
1735		strcpy(warncomm, current->comm);
1736		pr_warn("process `%s' is using deprecated sysctl (%s) net.ipv6.neigh.%s.%s - use net.ipv6.neigh.%s.%s_ms instead\n",
1737			warncomm, func,
1738			dev_name, ctl->procname,
1739			dev_name, ctl->procname);
1740		warned++;
1741	}
1742}
1743
1744int ndisc_ifinfo_sysctl_change(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos)
1745{
1746	struct net_device *dev = ctl->extra1;
1747	struct inet6_dev *idev;
1748	int ret;
1749
1750	if ((strcmp(ctl->procname, "retrans_time") == 0) ||
1751	    (strcmp(ctl->procname, "base_reachable_time") == 0))
1752		ndisc_warn_deprecated_sysctl(ctl, "syscall", dev ? dev->name : "default");
1753
1754	if (strcmp(ctl->procname, "retrans_time") == 0)
1755		ret = neigh_proc_dointvec(ctl, write, buffer, lenp, ppos);
1756
1757	else if (strcmp(ctl->procname, "base_reachable_time") == 0)
1758		ret = neigh_proc_dointvec_jiffies(ctl, write,
1759						  buffer, lenp, ppos);
1760
1761	else if ((strcmp(ctl->procname, "retrans_time_ms") == 0) ||
1762		 (strcmp(ctl->procname, "base_reachable_time_ms") == 0))
1763		ret = neigh_proc_dointvec_ms_jiffies(ctl, write,
1764						     buffer, lenp, ppos);
1765	else
1766		ret = -1;
1767
1768	if (write && ret == 0 && dev && (idev = in6_dev_get(dev)) != NULL) {
1769		if (ctl->data == &NEIGH_VAR(idev->nd_parms, BASE_REACHABLE_TIME))
1770			idev->nd_parms->reachable_time =
1771					neigh_rand_reach_time(NEIGH_VAR(idev->nd_parms, BASE_REACHABLE_TIME));
1772		idev->tstamp = jiffies;
1773		inet6_ifinfo_notify(RTM_NEWLINK, idev);
1774		in6_dev_put(idev);
1775	}
1776	return ret;
1777}
1778
1779
1780#endif
1781
1782static int __net_init ndisc_net_init(struct net *net)
1783{
1784	struct ipv6_pinfo *np;
1785	struct sock *sk;
1786	int err;
1787
1788	err = inet_ctl_sock_create(&sk, PF_INET6,
1789				   SOCK_RAW, IPPROTO_ICMPV6, net);
1790	if (err < 0) {
1791		ND_PRINTK(0, err,
1792			  "NDISC: Failed to initialize the control socket (err %d)\n",
1793			  err);
1794		return err;
1795	}
1796
1797	net->ipv6.ndisc_sk = sk;
1798
1799	np = inet6_sk(sk);
1800	np->hop_limit = 255;
1801	/* Do not loopback ndisc messages */
1802	np->mc_loop = 0;
1803
1804	return 0;
1805}
1806
1807static void __net_exit ndisc_net_exit(struct net *net)
1808{
1809	inet_ctl_sock_destroy(net->ipv6.ndisc_sk);
1810}
1811
1812static struct pernet_operations ndisc_net_ops = {
1813	.init = ndisc_net_init,
1814	.exit = ndisc_net_exit,
1815};
1816
1817int __init ndisc_init(void)
1818{
1819	int err;
1820
1821	err = register_pernet_subsys(&ndisc_net_ops);
1822	if (err)
1823		return err;
1824	/*
1825	 * Initialize the neighbour table
1826	 */
1827	neigh_table_init(NEIGH_ND_TABLE, &nd_tbl);
1828
1829#ifdef CONFIG_SYSCTL
1830	err = neigh_sysctl_register(NULL, &nd_tbl.parms,
1831				    ndisc_ifinfo_sysctl_change);
1832	if (err)
1833		goto out_unregister_pernet;
1834out:
1835#endif
1836	return err;
1837
1838#ifdef CONFIG_SYSCTL
1839out_unregister_pernet:
1840	unregister_pernet_subsys(&ndisc_net_ops);
1841	goto out;
1842#endif
1843}
1844
1845int __init ndisc_late_init(void)
1846{
1847	return register_netdevice_notifier(&ndisc_netdev_notifier);
1848}
1849
1850void ndisc_late_cleanup(void)
1851{
1852	unregister_netdevice_notifier(&ndisc_netdev_notifier);
1853}
1854
1855void ndisc_cleanup(void)
1856{
1857#ifdef CONFIG_SYSCTL
1858	neigh_sysctl_unregister(&nd_tbl.parms);
1859#endif
1860	neigh_table_clear(NEIGH_ND_TABLE, &nd_tbl);
1861	unregister_pernet_subsys(&ndisc_net_ops);
1862}