Linux Audio

Check our new training course

Real-Time Linux with PREEMPT_RT training

Feb 18-20, 2025
Register
Loading...
v5.14.15
   1// SPDX-License-Identifier: GPL-2.0-or-later
   2/*
   3 *	Neighbour Discovery for IPv6
   4 *	Linux INET6 implementation
   5 *
   6 *	Authors:
   7 *	Pedro Roque		<roque@di.fc.ul.pt>
   8 *	Mike Shaver		<shaver@ingenia.com>
 
 
 
 
 
   9 */
  10
  11/*
  12 *	Changes:
  13 *
  14 *	Alexey I. Froloff		:	RFC6106 (DNSSL) support
  15 *	Pierre Ynard			:	export userland ND options
  16 *						through netlink (RDNSS support)
  17 *	Lars Fenneberg			:	fixed MTU setting on receipt
  18 *						of an RA.
  19 *	Janos Farkas			:	kmalloc failure checks
  20 *	Alexey Kuznetsov		:	state machine reworked
  21 *						and moved to net/core.
  22 *	Pekka Savola			:	RFC2461 validation
  23 *	YOSHIFUJI Hideaki @USAGI	:	Verify ND options properly
  24 */
  25
  26#define pr_fmt(fmt) "ICMPv6: " fmt
  27
  28#include <linux/module.h>
  29#include <linux/errno.h>
  30#include <linux/types.h>
  31#include <linux/socket.h>
  32#include <linux/sockios.h>
  33#include <linux/sched.h>
  34#include <linux/net.h>
  35#include <linux/in6.h>
  36#include <linux/route.h>
  37#include <linux/init.h>
  38#include <linux/rcupdate.h>
  39#include <linux/slab.h>
  40#ifdef CONFIG_SYSCTL
  41#include <linux/sysctl.h>
  42#endif
  43
  44#include <linux/if_addr.h>
  45#include <linux/if_ether.h>
  46#include <linux/if_arp.h>
  47#include <linux/ipv6.h>
  48#include <linux/icmpv6.h>
  49#include <linux/jhash.h>
  50
  51#include <net/sock.h>
  52#include <net/snmp.h>
  53
  54#include <net/ipv6.h>
  55#include <net/protocol.h>
  56#include <net/ndisc.h>
  57#include <net/ip6_route.h>
  58#include <net/addrconf.h>
  59#include <net/icmp.h>
  60
  61#include <net/netlink.h>
  62#include <linux/rtnetlink.h>
  63
  64#include <net/flow.h>
  65#include <net/ip6_checksum.h>
  66#include <net/inet_common.h>
  67#include <linux/proc_fs.h>
  68
  69#include <linux/netfilter.h>
  70#include <linux/netfilter_ipv6.h>
  71
  72static u32 ndisc_hash(const void *pkey,
  73		      const struct net_device *dev,
  74		      __u32 *hash_rnd);
  75static bool ndisc_key_eq(const struct neighbour *neigh, const void *pkey);
  76static bool ndisc_allow_add(const struct net_device *dev,
  77			    struct netlink_ext_ack *extack);
  78static int ndisc_constructor(struct neighbour *neigh);
  79static void ndisc_solicit(struct neighbour *neigh, struct sk_buff *skb);
  80static void ndisc_error_report(struct neighbour *neigh, struct sk_buff *skb);
  81static int pndisc_constructor(struct pneigh_entry *n);
  82static void pndisc_destructor(struct pneigh_entry *n);
  83static void pndisc_redo(struct sk_buff *skb);
  84static int ndisc_is_multicast(const void *pkey);
  85
  86static const struct neigh_ops ndisc_generic_ops = {
  87	.family =		AF_INET6,
  88	.solicit =		ndisc_solicit,
  89	.error_report =		ndisc_error_report,
  90	.output =		neigh_resolve_output,
  91	.connected_output =	neigh_connected_output,
  92};
  93
  94static const struct neigh_ops ndisc_hh_ops = {
  95	.family =		AF_INET6,
  96	.solicit =		ndisc_solicit,
  97	.error_report =		ndisc_error_report,
  98	.output =		neigh_resolve_output,
  99	.connected_output =	neigh_resolve_output,
 100};
 101
 102
 103static const struct neigh_ops ndisc_direct_ops = {
 104	.family =		AF_INET6,
 105	.output =		neigh_direct_output,
 106	.connected_output =	neigh_direct_output,
 107};
 108
 109struct neigh_table nd_tbl = {
 110	.family =	AF_INET6,
 111	.key_len =	sizeof(struct in6_addr),
 112	.protocol =	cpu_to_be16(ETH_P_IPV6),
 113	.hash =		ndisc_hash,
 114	.key_eq =	ndisc_key_eq,
 115	.constructor =	ndisc_constructor,
 116	.pconstructor =	pndisc_constructor,
 117	.pdestructor =	pndisc_destructor,
 118	.proxy_redo =	pndisc_redo,
 119	.is_multicast =	ndisc_is_multicast,
 120	.allow_add  =   ndisc_allow_add,
 121	.id =		"ndisc_cache",
 122	.parms = {
 123		.tbl			= &nd_tbl,
 124		.reachable_time		= ND_REACHABLE_TIME,
 125		.data = {
 126			[NEIGH_VAR_MCAST_PROBES] = 3,
 127			[NEIGH_VAR_UCAST_PROBES] = 3,
 128			[NEIGH_VAR_RETRANS_TIME] = ND_RETRANS_TIMER,
 129			[NEIGH_VAR_BASE_REACHABLE_TIME] = ND_REACHABLE_TIME,
 130			[NEIGH_VAR_DELAY_PROBE_TIME] = 5 * HZ,
 131			[NEIGH_VAR_GC_STALETIME] = 60 * HZ,
 132			[NEIGH_VAR_QUEUE_LEN_BYTES] = SK_WMEM_MAX,
 133			[NEIGH_VAR_PROXY_QLEN] = 64,
 134			[NEIGH_VAR_ANYCAST_DELAY] = 1 * HZ,
 135			[NEIGH_VAR_PROXY_DELAY] = (8 * HZ) / 10,
 136		},
 137	},
 138	.gc_interval =	  30 * HZ,
 139	.gc_thresh1 =	 128,
 140	.gc_thresh2 =	 512,
 141	.gc_thresh3 =	1024,
 142};
 143EXPORT_SYMBOL_GPL(nd_tbl);
 144
 145void __ndisc_fill_addr_option(struct sk_buff *skb, int type, void *data,
 146			      int data_len, int pad)
 147{
 148	int space = __ndisc_opt_addr_space(data_len, pad);
 149	u8 *opt = skb_put(skb, space);
 150
 151	opt[0] = type;
 152	opt[1] = space>>3;
 153
 154	memset(opt + 2, 0, pad);
 155	opt   += pad;
 156	space -= pad;
 157
 158	memcpy(opt+2, data, data_len);
 159	data_len += 2;
 160	opt += data_len;
 161	space -= data_len;
 162	if (space > 0)
 163		memset(opt, 0, space);
 164}
 165EXPORT_SYMBOL_GPL(__ndisc_fill_addr_option);
 166
 167static inline void ndisc_fill_addr_option(struct sk_buff *skb, int type,
 168					  void *data, u8 icmp6_type)
 169{
 170	__ndisc_fill_addr_option(skb, type, data, skb->dev->addr_len,
 171				 ndisc_addr_option_pad(skb->dev->type));
 172	ndisc_ops_fill_addr_option(skb->dev, skb, icmp6_type);
 173}
 174
 175static inline void ndisc_fill_redirect_addr_option(struct sk_buff *skb,
 176						   void *ha,
 177						   const u8 *ops_data)
 178{
 179	ndisc_fill_addr_option(skb, ND_OPT_TARGET_LL_ADDR, ha, NDISC_REDIRECT);
 180	ndisc_ops_fill_redirect_addr_option(skb->dev, skb, ops_data);
 181}
 182
 183static struct nd_opt_hdr *ndisc_next_option(struct nd_opt_hdr *cur,
 184					    struct nd_opt_hdr *end)
 185{
 186	int type;
 187	if (!cur || !end || cur >= end)
 188		return NULL;
 189	type = cur->nd_opt_type;
 190	do {
 191		cur = ((void *)cur) + (cur->nd_opt_len << 3);
 192	} while (cur < end && cur->nd_opt_type != type);
 193	return cur <= end && cur->nd_opt_type == type ? cur : NULL;
 194}
 195
 196static inline int ndisc_is_useropt(const struct net_device *dev,
 197				   struct nd_opt_hdr *opt)
 198{
 199	return opt->nd_opt_type == ND_OPT_RDNSS ||
 200		opt->nd_opt_type == ND_OPT_DNSSL ||
 201		opt->nd_opt_type == ND_OPT_CAPTIVE_PORTAL ||
 202		opt->nd_opt_type == ND_OPT_PREF64 ||
 203		ndisc_ops_is_useropt(dev, opt->nd_opt_type);
 204}
 205
 206static struct nd_opt_hdr *ndisc_next_useropt(const struct net_device *dev,
 207					     struct nd_opt_hdr *cur,
 208					     struct nd_opt_hdr *end)
 209{
 210	if (!cur || !end || cur >= end)
 211		return NULL;
 212	do {
 213		cur = ((void *)cur) + (cur->nd_opt_len << 3);
 214	} while (cur < end && !ndisc_is_useropt(dev, cur));
 215	return cur <= end && ndisc_is_useropt(dev, cur) ? cur : NULL;
 216}
 217
 218struct ndisc_options *ndisc_parse_options(const struct net_device *dev,
 219					  u8 *opt, int opt_len,
 220					  struct ndisc_options *ndopts)
 221{
 222	struct nd_opt_hdr *nd_opt = (struct nd_opt_hdr *)opt;
 223
 224	if (!nd_opt || opt_len < 0 || !ndopts)
 225		return NULL;
 226	memset(ndopts, 0, sizeof(*ndopts));
 227	while (opt_len) {
 228		int l;
 229		if (opt_len < sizeof(struct nd_opt_hdr))
 230			return NULL;
 231		l = nd_opt->nd_opt_len << 3;
 232		if (opt_len < l || l == 0)
 233			return NULL;
 234		if (ndisc_ops_parse_options(dev, nd_opt, ndopts))
 235			goto next_opt;
 236		switch (nd_opt->nd_opt_type) {
 237		case ND_OPT_SOURCE_LL_ADDR:
 238		case ND_OPT_TARGET_LL_ADDR:
 239		case ND_OPT_MTU:
 240		case ND_OPT_NONCE:
 241		case ND_OPT_REDIRECT_HDR:
 242			if (ndopts->nd_opt_array[nd_opt->nd_opt_type]) {
 243				ND_PRINTK(2, warn,
 244					  "%s: duplicated ND6 option found: type=%d\n",
 245					  __func__, nd_opt->nd_opt_type);
 246			} else {
 247				ndopts->nd_opt_array[nd_opt->nd_opt_type] = nd_opt;
 248			}
 249			break;
 250		case ND_OPT_PREFIX_INFO:
 251			ndopts->nd_opts_pi_end = nd_opt;
 252			if (!ndopts->nd_opt_array[nd_opt->nd_opt_type])
 253				ndopts->nd_opt_array[nd_opt->nd_opt_type] = nd_opt;
 254			break;
 255#ifdef CONFIG_IPV6_ROUTE_INFO
 256		case ND_OPT_ROUTE_INFO:
 257			ndopts->nd_opts_ri_end = nd_opt;
 258			if (!ndopts->nd_opts_ri)
 259				ndopts->nd_opts_ri = nd_opt;
 260			break;
 261#endif
 262		default:
 263			if (ndisc_is_useropt(dev, nd_opt)) {
 264				ndopts->nd_useropts_end = nd_opt;
 265				if (!ndopts->nd_useropts)
 266					ndopts->nd_useropts = nd_opt;
 267			} else {
 268				/*
 269				 * Unknown options must be silently ignored,
 270				 * to accommodate future extension to the
 271				 * protocol.
 272				 */
 273				ND_PRINTK(2, notice,
 274					  "%s: ignored unsupported option; type=%d, len=%d\n",
 275					  __func__,
 276					  nd_opt->nd_opt_type,
 277					  nd_opt->nd_opt_len);
 278			}
 279		}
 280next_opt:
 281		opt_len -= l;
 282		nd_opt = ((void *)nd_opt) + l;
 283	}
 284	return ndopts;
 285}
 286
 287int ndisc_mc_map(const struct in6_addr *addr, char *buf, struct net_device *dev, int dir)
 288{
 289	switch (dev->type) {
 290	case ARPHRD_ETHER:
 291	case ARPHRD_IEEE802:	/* Not sure. Check it later. --ANK */
 292	case ARPHRD_FDDI:
 293		ipv6_eth_mc_map(addr, buf);
 294		return 0;
 295	case ARPHRD_ARCNET:
 296		ipv6_arcnet_mc_map(addr, buf);
 297		return 0;
 298	case ARPHRD_INFINIBAND:
 299		ipv6_ib_mc_map(addr, dev->broadcast, buf);
 300		return 0;
 301	case ARPHRD_IPGRE:
 302		return ipv6_ipgre_mc_map(addr, dev->broadcast, buf);
 303	default:
 304		if (dir) {
 305			memcpy(buf, dev->broadcast, dev->addr_len);
 306			return 0;
 307		}
 308	}
 309	return -EINVAL;
 310}
 311EXPORT_SYMBOL(ndisc_mc_map);
 312
 313static u32 ndisc_hash(const void *pkey,
 314		      const struct net_device *dev,
 315		      __u32 *hash_rnd)
 316{
 317	return ndisc_hashfn(pkey, dev, hash_rnd);
 318}
 319
 320static bool ndisc_key_eq(const struct neighbour *n, const void *pkey)
 321{
 322	return neigh_key_eq128(n, pkey);
 323}
 324
 325static int ndisc_constructor(struct neighbour *neigh)
 326{
 327	struct in6_addr *addr = (struct in6_addr *)&neigh->primary_key;
 328	struct net_device *dev = neigh->dev;
 329	struct inet6_dev *in6_dev;
 330	struct neigh_parms *parms;
 331	bool is_multicast = ipv6_addr_is_multicast(addr);
 332
 333	in6_dev = in6_dev_get(dev);
 334	if (!in6_dev) {
 335		return -EINVAL;
 336	}
 337
 338	parms = in6_dev->nd_parms;
 339	__neigh_parms_put(neigh->parms);
 340	neigh->parms = neigh_parms_clone(parms);
 341
 342	neigh->type = is_multicast ? RTN_MULTICAST : RTN_UNICAST;
 343	if (!dev->header_ops) {
 344		neigh->nud_state = NUD_NOARP;
 345		neigh->ops = &ndisc_direct_ops;
 346		neigh->output = neigh_direct_output;
 347	} else {
 348		if (is_multicast) {
 349			neigh->nud_state = NUD_NOARP;
 350			ndisc_mc_map(addr, neigh->ha, dev, 1);
 351		} else if (dev->flags&(IFF_NOARP|IFF_LOOPBACK)) {
 352			neigh->nud_state = NUD_NOARP;
 353			memcpy(neigh->ha, dev->dev_addr, dev->addr_len);
 354			if (dev->flags&IFF_LOOPBACK)
 355				neigh->type = RTN_LOCAL;
 356		} else if (dev->flags&IFF_POINTOPOINT) {
 357			neigh->nud_state = NUD_NOARP;
 358			memcpy(neigh->ha, dev->broadcast, dev->addr_len);
 359		}
 360		if (dev->header_ops->cache)
 361			neigh->ops = &ndisc_hh_ops;
 362		else
 363			neigh->ops = &ndisc_generic_ops;
 364		if (neigh->nud_state&NUD_VALID)
 365			neigh->output = neigh->ops->connected_output;
 366		else
 367			neigh->output = neigh->ops->output;
 368	}
 369	in6_dev_put(in6_dev);
 370	return 0;
 371}
 372
 373static int pndisc_constructor(struct pneigh_entry *n)
 374{
 375	struct in6_addr *addr = (struct in6_addr *)&n->key;
 376	struct in6_addr maddr;
 377	struct net_device *dev = n->dev;
 378
 379	if (!dev || !__in6_dev_get(dev))
 380		return -EINVAL;
 381	addrconf_addr_solict_mult(addr, &maddr);
 382	ipv6_dev_mc_inc(dev, &maddr);
 383	return 0;
 384}
 385
 386static void pndisc_destructor(struct pneigh_entry *n)
 387{
 388	struct in6_addr *addr = (struct in6_addr *)&n->key;
 389	struct in6_addr maddr;
 390	struct net_device *dev = n->dev;
 391
 392	if (!dev || !__in6_dev_get(dev))
 393		return;
 394	addrconf_addr_solict_mult(addr, &maddr);
 395	ipv6_dev_mc_dec(dev, &maddr);
 396}
 397
 398/* called with rtnl held */
 399static bool ndisc_allow_add(const struct net_device *dev,
 400			    struct netlink_ext_ack *extack)
 401{
 402	struct inet6_dev *idev = __in6_dev_get(dev);
 403
 404	if (!idev || idev->cnf.disable_ipv6) {
 405		NL_SET_ERR_MSG(extack, "IPv6 is disabled on this device");
 406		return false;
 407	}
 408
 409	return true;
 410}
 411
 412static struct sk_buff *ndisc_alloc_skb(struct net_device *dev,
 413				       int len)
 414{
 415	int hlen = LL_RESERVED_SPACE(dev);
 416	int tlen = dev->needed_tailroom;
 417	struct sock *sk = dev_net(dev)->ipv6.ndisc_sk;
 418	struct sk_buff *skb;
 419
 420	skb = alloc_skb(hlen + sizeof(struct ipv6hdr) + len + tlen, GFP_ATOMIC);
 421	if (!skb) {
 422		ND_PRINTK(0, err, "ndisc: %s failed to allocate an skb\n",
 423			  __func__);
 424		return NULL;
 425	}
 426
 427	skb->protocol = htons(ETH_P_IPV6);
 428	skb->dev = dev;
 429
 430	skb_reserve(skb, hlen + sizeof(struct ipv6hdr));
 431	skb_reset_transport_header(skb);
 432
 433	/* Manually assign socket ownership as we avoid calling
 434	 * sock_alloc_send_pskb() to bypass wmem buffer limits
 435	 */
 436	skb_set_owner_w(skb, sk);
 437
 438	return skb;
 439}
 440
 441static void ip6_nd_hdr(struct sk_buff *skb,
 442		       const struct in6_addr *saddr,
 443		       const struct in6_addr *daddr,
 444		       int hop_limit, int len)
 445{
 446	struct ipv6hdr *hdr;
 447	struct inet6_dev *idev;
 448	unsigned tclass;
 449
 450	rcu_read_lock();
 451	idev = __in6_dev_get(skb->dev);
 452	tclass = idev ? idev->cnf.ndisc_tclass : 0;
 453	rcu_read_unlock();
 454
 455	skb_push(skb, sizeof(*hdr));
 456	skb_reset_network_header(skb);
 457	hdr = ipv6_hdr(skb);
 458
 459	ip6_flow_hdr(hdr, tclass, 0);
 460
 461	hdr->payload_len = htons(len);
 462	hdr->nexthdr = IPPROTO_ICMPV6;
 463	hdr->hop_limit = hop_limit;
 464
 465	hdr->saddr = *saddr;
 466	hdr->daddr = *daddr;
 467}
 468
 469static void ndisc_send_skb(struct sk_buff *skb,
 470			   const struct in6_addr *daddr,
 471			   const struct in6_addr *saddr)
 472{
 473	struct dst_entry *dst = skb_dst(skb);
 474	struct net *net = dev_net(skb->dev);
 475	struct sock *sk = net->ipv6.ndisc_sk;
 476	struct inet6_dev *idev;
 477	int err;
 478	struct icmp6hdr *icmp6h = icmp6_hdr(skb);
 479	u8 type;
 480
 481	type = icmp6h->icmp6_type;
 482
 483	if (!dst) {
 484		struct flowi6 fl6;
 485		int oif = skb->dev->ifindex;
 486
 487		icmpv6_flow_init(sk, &fl6, type, saddr, daddr, oif);
 488		dst = icmp6_dst_alloc(skb->dev, &fl6);
 489		if (IS_ERR(dst)) {
 490			kfree_skb(skb);
 491			return;
 492		}
 493
 494		skb_dst_set(skb, dst);
 495	}
 496
 497	icmp6h->icmp6_cksum = csum_ipv6_magic(saddr, daddr, skb->len,
 498					      IPPROTO_ICMPV6,
 499					      csum_partial(icmp6h,
 500							   skb->len, 0));
 501
 502	ip6_nd_hdr(skb, saddr, daddr, inet6_sk(sk)->hop_limit, skb->len);
 503
 504	rcu_read_lock();
 505	idev = __in6_dev_get(dst->dev);
 506	IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUT, skb->len);
 507
 508	err = NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT,
 509		      net, sk, skb, NULL, dst->dev,
 510		      dst_output);
 511	if (!err) {
 512		ICMP6MSGOUT_INC_STATS(net, idev, type);
 513		ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS);
 514	}
 515
 516	rcu_read_unlock();
 517}
 518
 519void ndisc_send_na(struct net_device *dev, const struct in6_addr *daddr,
 520		   const struct in6_addr *solicited_addr,
 521		   bool router, bool solicited, bool override, bool inc_opt)
 522{
 523	struct sk_buff *skb;
 524	struct in6_addr tmpaddr;
 525	struct inet6_ifaddr *ifp;
 526	const struct in6_addr *src_addr;
 527	struct nd_msg *msg;
 528	int optlen = 0;
 529
 530	/* for anycast or proxy, solicited_addr != src_addr */
 531	ifp = ipv6_get_ifaddr(dev_net(dev), solicited_addr, dev, 1);
 532	if (ifp) {
 533		src_addr = solicited_addr;
 534		if (ifp->flags & IFA_F_OPTIMISTIC)
 535			override = false;
 536		inc_opt |= ifp->idev->cnf.force_tllao;
 537		in6_ifa_put(ifp);
 538	} else {
 539		if (ipv6_dev_get_saddr(dev_net(dev), dev, daddr,
 540				       inet6_sk(dev_net(dev)->ipv6.ndisc_sk)->srcprefs,
 541				       &tmpaddr))
 542			return;
 543		src_addr = &tmpaddr;
 544	}
 545
 546	if (!dev->addr_len)
 547		inc_opt = false;
 548	if (inc_opt)
 549		optlen += ndisc_opt_addr_space(dev,
 550					       NDISC_NEIGHBOUR_ADVERTISEMENT);
 551
 552	skb = ndisc_alloc_skb(dev, sizeof(*msg) + optlen);
 553	if (!skb)
 554		return;
 555
 556	msg = skb_put(skb, sizeof(*msg));
 557	*msg = (struct nd_msg) {
 558		.icmph = {
 559			.icmp6_type = NDISC_NEIGHBOUR_ADVERTISEMENT,
 560			.icmp6_router = router,
 561			.icmp6_solicited = solicited,
 562			.icmp6_override = override,
 563		},
 564		.target = *solicited_addr,
 565	};
 566
 567	if (inc_opt)
 568		ndisc_fill_addr_option(skb, ND_OPT_TARGET_LL_ADDR,
 569				       dev->dev_addr,
 570				       NDISC_NEIGHBOUR_ADVERTISEMENT);
 571
 572	ndisc_send_skb(skb, daddr, src_addr);
 573}
 574
 575static void ndisc_send_unsol_na(struct net_device *dev)
 576{
 577	struct inet6_dev *idev;
 578	struct inet6_ifaddr *ifa;
 579
 580	idev = in6_dev_get(dev);
 581	if (!idev)
 582		return;
 583
 584	read_lock_bh(&idev->lock);
 585	list_for_each_entry(ifa, &idev->addr_list, if_list) {
 586		/* skip tentative addresses until dad completes */
 587		if (ifa->flags & IFA_F_TENTATIVE &&
 588		    !(ifa->flags & IFA_F_OPTIMISTIC))
 589			continue;
 590
 591		ndisc_send_na(dev, &in6addr_linklocal_allnodes, &ifa->addr,
 592			      /*router=*/ !!idev->cnf.forwarding,
 593			      /*solicited=*/ false, /*override=*/ true,
 594			      /*inc_opt=*/ true);
 595	}
 596	read_unlock_bh(&idev->lock);
 597
 598	in6_dev_put(idev);
 599}
 600
 601void ndisc_send_ns(struct net_device *dev, const struct in6_addr *solicit,
 602		   const struct in6_addr *daddr, const struct in6_addr *saddr,
 603		   u64 nonce)
 604{
 605	struct sk_buff *skb;
 606	struct in6_addr addr_buf;
 607	int inc_opt = dev->addr_len;
 608	int optlen = 0;
 609	struct nd_msg *msg;
 610
 611	if (!saddr) {
 612		if (ipv6_get_lladdr(dev, &addr_buf,
 613				   (IFA_F_TENTATIVE|IFA_F_OPTIMISTIC)))
 614			return;
 615		saddr = &addr_buf;
 616	}
 617
 618	if (ipv6_addr_any(saddr))
 619		inc_opt = false;
 620	if (inc_opt)
 621		optlen += ndisc_opt_addr_space(dev,
 622					       NDISC_NEIGHBOUR_SOLICITATION);
 623	if (nonce != 0)
 624		optlen += 8;
 625
 626	skb = ndisc_alloc_skb(dev, sizeof(*msg) + optlen);
 627	if (!skb)
 628		return;
 629
 630	msg = skb_put(skb, sizeof(*msg));
 631	*msg = (struct nd_msg) {
 632		.icmph = {
 633			.icmp6_type = NDISC_NEIGHBOUR_SOLICITATION,
 634		},
 635		.target = *solicit,
 636	};
 637
 638	if (inc_opt)
 639		ndisc_fill_addr_option(skb, ND_OPT_SOURCE_LL_ADDR,
 640				       dev->dev_addr,
 641				       NDISC_NEIGHBOUR_SOLICITATION);
 642	if (nonce != 0) {
 643		u8 *opt = skb_put(skb, 8);
 644
 645		opt[0] = ND_OPT_NONCE;
 646		opt[1] = 8 >> 3;
 647		memcpy(opt + 2, &nonce, 6);
 648	}
 649
 650	ndisc_send_skb(skb, daddr, saddr);
 651}
 652
 653void ndisc_send_rs(struct net_device *dev, const struct in6_addr *saddr,
 654		   const struct in6_addr *daddr)
 655{
 656	struct sk_buff *skb;
 657	struct rs_msg *msg;
 658	int send_sllao = dev->addr_len;
 659	int optlen = 0;
 660
 661#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
 662	/*
 663	 * According to section 2.2 of RFC 4429, we must not
 664	 * send router solicitations with a sllao from
 665	 * optimistic addresses, but we may send the solicitation
 666	 * if we don't include the sllao.  So here we check
 667	 * if our address is optimistic, and if so, we
 668	 * suppress the inclusion of the sllao.
 669	 */
 670	if (send_sllao) {
 671		struct inet6_ifaddr *ifp = ipv6_get_ifaddr(dev_net(dev), saddr,
 672							   dev, 1);
 673		if (ifp) {
 674			if (ifp->flags & IFA_F_OPTIMISTIC)  {
 675				send_sllao = 0;
 676			}
 677			in6_ifa_put(ifp);
 678		} else {
 679			send_sllao = 0;
 680		}
 681	}
 682#endif
 683	if (send_sllao)
 684		optlen += ndisc_opt_addr_space(dev, NDISC_ROUTER_SOLICITATION);
 685
 686	skb = ndisc_alloc_skb(dev, sizeof(*msg) + optlen);
 687	if (!skb)
 688		return;
 689
 690	msg = skb_put(skb, sizeof(*msg));
 691	*msg = (struct rs_msg) {
 692		.icmph = {
 693			.icmp6_type = NDISC_ROUTER_SOLICITATION,
 694		},
 695	};
 696
 697	if (send_sllao)
 698		ndisc_fill_addr_option(skb, ND_OPT_SOURCE_LL_ADDR,
 699				       dev->dev_addr,
 700				       NDISC_ROUTER_SOLICITATION);
 701
 702	ndisc_send_skb(skb, daddr, saddr);
 703}
 704
 705
 706static void ndisc_error_report(struct neighbour *neigh, struct sk_buff *skb)
 707{
 708	/*
 709	 *	"The sender MUST return an ICMP
 710	 *	 destination unreachable"
 711	 */
 712	dst_link_failure(skb);
 713	kfree_skb(skb);
 714}
 715
 716/* Called with locked neigh: either read or both */
 717
 718static void ndisc_solicit(struct neighbour *neigh, struct sk_buff *skb)
 719{
 720	struct in6_addr *saddr = NULL;
 721	struct in6_addr mcaddr;
 722	struct net_device *dev = neigh->dev;
 723	struct in6_addr *target = (struct in6_addr *)&neigh->primary_key;
 724	int probes = atomic_read(&neigh->probes);
 725
 726	if (skb && ipv6_chk_addr_and_flags(dev_net(dev), &ipv6_hdr(skb)->saddr,
 727					   dev, false, 1,
 728					   IFA_F_TENTATIVE|IFA_F_OPTIMISTIC))
 729		saddr = &ipv6_hdr(skb)->saddr;
 730	probes -= NEIGH_VAR(neigh->parms, UCAST_PROBES);
 731	if (probes < 0) {
 732		if (!(neigh->nud_state & NUD_VALID)) {
 733			ND_PRINTK(1, dbg,
 734				  "%s: trying to ucast probe in NUD_INVALID: %pI6\n",
 735				  __func__, target);
 736		}
 737		ndisc_send_ns(dev, target, target, saddr, 0);
 738	} else if ((probes -= NEIGH_VAR(neigh->parms, APP_PROBES)) < 0) {
 739		neigh_app_ns(neigh);
 740	} else {
 741		addrconf_addr_solict_mult(target, &mcaddr);
 742		ndisc_send_ns(dev, target, &mcaddr, saddr, 0);
 743	}
 744}
 745
 746static int pndisc_is_router(const void *pkey,
 747			    struct net_device *dev)
 748{
 749	struct pneigh_entry *n;
 750	int ret = -1;
 751
 752	read_lock_bh(&nd_tbl.lock);
 753	n = __pneigh_lookup(&nd_tbl, dev_net(dev), pkey, dev);
 754	if (n)
 755		ret = !!(n->flags & NTF_ROUTER);
 756	read_unlock_bh(&nd_tbl.lock);
 757
 758	return ret;
 759}
 760
 761void ndisc_update(const struct net_device *dev, struct neighbour *neigh,
 762		  const u8 *lladdr, u8 new, u32 flags, u8 icmp6_type,
 763		  struct ndisc_options *ndopts)
 764{
 765	neigh_update(neigh, lladdr, new, flags, 0);
 766	/* report ndisc ops about neighbour update */
 767	ndisc_ops_update(dev, neigh, flags, icmp6_type, ndopts);
 768}
 769
 770static void ndisc_recv_ns(struct sk_buff *skb)
 771{
 772	struct nd_msg *msg = (struct nd_msg *)skb_transport_header(skb);
 773	const struct in6_addr *saddr = &ipv6_hdr(skb)->saddr;
 774	const struct in6_addr *daddr = &ipv6_hdr(skb)->daddr;
 775	u8 *lladdr = NULL;
 776	u32 ndoptlen = skb_tail_pointer(skb) - (skb_transport_header(skb) +
 777				    offsetof(struct nd_msg, opt));
 778	struct ndisc_options ndopts;
 779	struct net_device *dev = skb->dev;
 780	struct inet6_ifaddr *ifp;
 781	struct inet6_dev *idev = NULL;
 782	struct neighbour *neigh;
 783	int dad = ipv6_addr_any(saddr);
 784	bool inc;
 785	int is_router = -1;
 786	u64 nonce = 0;
 787
 788	if (skb->len < sizeof(struct nd_msg)) {
 789		ND_PRINTK(2, warn, "NS: packet too short\n");
 790		return;
 791	}
 792
 793	if (ipv6_addr_is_multicast(&msg->target)) {
 794		ND_PRINTK(2, warn, "NS: multicast target address\n");
 795		return;
 796	}
 797
 798	/*
 799	 * RFC2461 7.1.1:
 800	 * DAD has to be destined for solicited node multicast address.
 801	 */
 802	if (dad && !ipv6_addr_is_solict_mult(daddr)) {
 803		ND_PRINTK(2, warn, "NS: bad DAD packet (wrong destination)\n");
 804		return;
 805	}
 806
 807	if (!ndisc_parse_options(dev, msg->opt, ndoptlen, &ndopts)) {
 808		ND_PRINTK(2, warn, "NS: invalid ND options\n");
 809		return;
 810	}
 811
 812	if (ndopts.nd_opts_src_lladdr) {
 813		lladdr = ndisc_opt_addr_data(ndopts.nd_opts_src_lladdr, dev);
 814		if (!lladdr) {
 815			ND_PRINTK(2, warn,
 816				  "NS: invalid link-layer address length\n");
 817			return;
 818		}
 819
 820		/* RFC2461 7.1.1:
 821		 *	If the IP source address is the unspecified address,
 822		 *	there MUST NOT be source link-layer address option
 823		 *	in the message.
 824		 */
 825		if (dad) {
 826			ND_PRINTK(2, warn,
 827				  "NS: bad DAD packet (link-layer address option)\n");
 828			return;
 829		}
 830	}
 831	if (ndopts.nd_opts_nonce && ndopts.nd_opts_nonce->nd_opt_len == 1)
 832		memcpy(&nonce, (u8 *)(ndopts.nd_opts_nonce + 1), 6);
 833
 834	inc = ipv6_addr_is_multicast(daddr);
 835
 836	ifp = ipv6_get_ifaddr(dev_net(dev), &msg->target, dev, 1);
 837	if (ifp) {
 838have_ifp:
 839		if (ifp->flags & (IFA_F_TENTATIVE|IFA_F_OPTIMISTIC)) {
 840			if (dad) {
 841				if (nonce != 0 && ifp->dad_nonce == nonce) {
 842					u8 *np = (u8 *)&nonce;
 843					/* Matching nonce if looped back */
 844					ND_PRINTK(2, notice,
 845						  "%s: IPv6 DAD loopback for address %pI6c nonce %pM ignored\n",
 846						  ifp->idev->dev->name,
 847						  &ifp->addr, np);
 848					goto out;
 849				}
 850				/*
 851				 * We are colliding with another node
 852				 * who is doing DAD
 853				 * so fail our DAD process
 854				 */
 855				addrconf_dad_failure(skb, ifp);
 856				return;
 857			} else {
 858				/*
 859				 * This is not a dad solicitation.
 860				 * If we are an optimistic node,
 861				 * we should respond.
 862				 * Otherwise, we should ignore it.
 863				 */
 864				if (!(ifp->flags & IFA_F_OPTIMISTIC))
 865					goto out;
 866			}
 867		}
 868
 869		idev = ifp->idev;
 870	} else {
 871		struct net *net = dev_net(dev);
 872
 873		/* perhaps an address on the master device */
 874		if (netif_is_l3_slave(dev)) {
 875			struct net_device *mdev;
 876
 877			mdev = netdev_master_upper_dev_get_rcu(dev);
 878			if (mdev) {
 879				ifp = ipv6_get_ifaddr(net, &msg->target, mdev, 1);
 880				if (ifp)
 881					goto have_ifp;
 882			}
 883		}
 884
 885		idev = in6_dev_get(dev);
 886		if (!idev) {
 887			/* XXX: count this drop? */
 888			return;
 889		}
 890
 891		if (ipv6_chk_acast_addr(net, dev, &msg->target) ||
 892		    (idev->cnf.forwarding &&
 893		     (net->ipv6.devconf_all->proxy_ndp || idev->cnf.proxy_ndp) &&
 894		     (is_router = pndisc_is_router(&msg->target, dev)) >= 0)) {
 895			if (!(NEIGH_CB(skb)->flags & LOCALLY_ENQUEUED) &&
 896			    skb->pkt_type != PACKET_HOST &&
 897			    inc &&
 898			    NEIGH_VAR(idev->nd_parms, PROXY_DELAY) != 0) {
 899				/*
 900				 * for anycast or proxy,
 901				 * sender should delay its response
 902				 * by a random time between 0 and
 903				 * MAX_ANYCAST_DELAY_TIME seconds.
 904				 * (RFC2461) -- yoshfuji
 905				 */
 906				struct sk_buff *n = skb_clone(skb, GFP_ATOMIC);
 907				if (n)
 908					pneigh_enqueue(&nd_tbl, idev->nd_parms, n);
 909				goto out;
 910			}
 911		} else
 912			goto out;
 913	}
 914
 915	if (is_router < 0)
 916		is_router = idev->cnf.forwarding;
 917
 918	if (dad) {
 919		ndisc_send_na(dev, &in6addr_linklocal_allnodes, &msg->target,
 920			      !!is_router, false, (ifp != NULL), true);
 921		goto out;
 922	}
 923
 924	if (inc)
 925		NEIGH_CACHE_STAT_INC(&nd_tbl, rcv_probes_mcast);
 926	else
 927		NEIGH_CACHE_STAT_INC(&nd_tbl, rcv_probes_ucast);
 928
 929	/*
 930	 *	update / create cache entry
 931	 *	for the source address
 932	 */
 933	neigh = __neigh_lookup(&nd_tbl, saddr, dev,
 934			       !inc || lladdr || !dev->addr_len);
 935	if (neigh)
 936		ndisc_update(dev, neigh, lladdr, NUD_STALE,
 937			     NEIGH_UPDATE_F_WEAK_OVERRIDE|
 938			     NEIGH_UPDATE_F_OVERRIDE,
 939			     NDISC_NEIGHBOUR_SOLICITATION, &ndopts);
 940	if (neigh || !dev->header_ops) {
 941		ndisc_send_na(dev, saddr, &msg->target, !!is_router,
 942			      true, (ifp != NULL && inc), inc);
 943		if (neigh)
 944			neigh_release(neigh);
 945	}
 946
 947out:
 948	if (ifp)
 949		in6_ifa_put(ifp);
 950	else
 951		in6_dev_put(idev);
 952}
 953
 954static void ndisc_recv_na(struct sk_buff *skb)
 955{
 956	struct nd_msg *msg = (struct nd_msg *)skb_transport_header(skb);
 957	struct in6_addr *saddr = &ipv6_hdr(skb)->saddr;
 958	const struct in6_addr *daddr = &ipv6_hdr(skb)->daddr;
 959	u8 *lladdr = NULL;
 960	u32 ndoptlen = skb_tail_pointer(skb) - (skb_transport_header(skb) +
 961				    offsetof(struct nd_msg, opt));
 962	struct ndisc_options ndopts;
 963	struct net_device *dev = skb->dev;
 964	struct inet6_dev *idev = __in6_dev_get(dev);
 965	struct inet6_ifaddr *ifp;
 966	struct neighbour *neigh;
 967
 968	if (skb->len < sizeof(struct nd_msg)) {
 969		ND_PRINTK(2, warn, "NA: packet too short\n");
 970		return;
 971	}
 972
 973	if (ipv6_addr_is_multicast(&msg->target)) {
 974		ND_PRINTK(2, warn, "NA: target address is multicast\n");
 975		return;
 976	}
 977
 978	if (ipv6_addr_is_multicast(daddr) &&
 979	    msg->icmph.icmp6_solicited) {
 980		ND_PRINTK(2, warn, "NA: solicited NA is multicasted\n");
 981		return;
 982	}
 983
 984	/* For some 802.11 wireless deployments (and possibly other networks),
 985	 * there will be a NA proxy and unsolicitd packets are attacks
 986	 * and thus should not be accepted.
 987	 */
 988	if (!msg->icmph.icmp6_solicited && idev &&
 989	    idev->cnf.drop_unsolicited_na)
 990		return;
 991
 992	if (!ndisc_parse_options(dev, msg->opt, ndoptlen, &ndopts)) {
 993		ND_PRINTK(2, warn, "NS: invalid ND option\n");
 994		return;
 995	}
 996	if (ndopts.nd_opts_tgt_lladdr) {
 997		lladdr = ndisc_opt_addr_data(ndopts.nd_opts_tgt_lladdr, dev);
 998		if (!lladdr) {
 999			ND_PRINTK(2, warn,
1000				  "NA: invalid link-layer address length\n");
1001			return;
1002		}
1003	}
1004	ifp = ipv6_get_ifaddr(dev_net(dev), &msg->target, dev, 1);
1005	if (ifp) {
1006		if (skb->pkt_type != PACKET_LOOPBACK
1007		    && (ifp->flags & IFA_F_TENTATIVE)) {
1008				addrconf_dad_failure(skb, ifp);
1009				return;
1010		}
1011		/* What should we make now? The advertisement
1012		   is invalid, but ndisc specs say nothing
1013		   about it. It could be misconfiguration, or
1014		   an smart proxy agent tries to help us :-)
1015
1016		   We should not print the error if NA has been
1017		   received from loopback - it is just our own
1018		   unsolicited advertisement.
1019		 */
1020		if (skb->pkt_type != PACKET_LOOPBACK)
1021			ND_PRINTK(1, warn,
1022				  "NA: %pM advertised our address %pI6c on %s!\n",
1023				  eth_hdr(skb)->h_source, &ifp->addr, ifp->idev->dev->name);
1024		in6_ifa_put(ifp);
1025		return;
1026	}
1027	neigh = neigh_lookup(&nd_tbl, &msg->target, dev);
1028
1029	if (neigh) {
1030		u8 old_flags = neigh->flags;
1031		struct net *net = dev_net(dev);
1032
1033		if (neigh->nud_state & NUD_FAILED)
1034			goto out;
1035
1036		/*
1037		 * Don't update the neighbor cache entry on a proxy NA from
1038		 * ourselves because either the proxied node is off link or it
1039		 * has already sent a NA to us.
1040		 */
1041		if (lladdr && !memcmp(lladdr, dev->dev_addr, dev->addr_len) &&
1042		    net->ipv6.devconf_all->forwarding && net->ipv6.devconf_all->proxy_ndp &&
1043		    pneigh_lookup(&nd_tbl, net, &msg->target, dev, 0)) {
1044			/* XXX: idev->cnf.proxy_ndp */
1045			goto out;
1046		}
1047
1048		ndisc_update(dev, neigh, lladdr,
1049			     msg->icmph.icmp6_solicited ? NUD_REACHABLE : NUD_STALE,
1050			     NEIGH_UPDATE_F_WEAK_OVERRIDE|
1051			     (msg->icmph.icmp6_override ? NEIGH_UPDATE_F_OVERRIDE : 0)|
1052			     NEIGH_UPDATE_F_OVERRIDE_ISROUTER|
1053			     (msg->icmph.icmp6_router ? NEIGH_UPDATE_F_ISROUTER : 0),
1054			     NDISC_NEIGHBOUR_ADVERTISEMENT, &ndopts);
1055
1056		if ((old_flags & ~neigh->flags) & NTF_ROUTER) {
1057			/*
1058			 * Change: router to host
1059			 */
1060			rt6_clean_tohost(dev_net(dev),  saddr);
1061		}
1062
1063out:
1064		neigh_release(neigh);
1065	}
1066}
1067
1068static void ndisc_recv_rs(struct sk_buff *skb)
1069{
1070	struct rs_msg *rs_msg = (struct rs_msg *)skb_transport_header(skb);
1071	unsigned long ndoptlen = skb->len - sizeof(*rs_msg);
1072	struct neighbour *neigh;
1073	struct inet6_dev *idev;
1074	const struct in6_addr *saddr = &ipv6_hdr(skb)->saddr;
1075	struct ndisc_options ndopts;
1076	u8 *lladdr = NULL;
1077
1078	if (skb->len < sizeof(*rs_msg))
1079		return;
1080
1081	idev = __in6_dev_get(skb->dev);
1082	if (!idev) {
1083		ND_PRINTK(1, err, "RS: can't find in6 device\n");
1084		return;
1085	}
1086
1087	/* Don't accept RS if we're not in router mode */
1088	if (!idev->cnf.forwarding)
1089		goto out;
1090
1091	/*
1092	 * Don't update NCE if src = ::;
1093	 * this implies that the source node has no ip address assigned yet.
1094	 */
1095	if (ipv6_addr_any(saddr))
1096		goto out;
1097
1098	/* Parse ND options */
1099	if (!ndisc_parse_options(skb->dev, rs_msg->opt, ndoptlen, &ndopts)) {
1100		ND_PRINTK(2, notice, "NS: invalid ND option, ignored\n");
1101		goto out;
1102	}
1103
1104	if (ndopts.nd_opts_src_lladdr) {
1105		lladdr = ndisc_opt_addr_data(ndopts.nd_opts_src_lladdr,
1106					     skb->dev);
1107		if (!lladdr)
1108			goto out;
1109	}
1110
1111	neigh = __neigh_lookup(&nd_tbl, saddr, skb->dev, 1);
1112	if (neigh) {
1113		ndisc_update(skb->dev, neigh, lladdr, NUD_STALE,
1114			     NEIGH_UPDATE_F_WEAK_OVERRIDE|
1115			     NEIGH_UPDATE_F_OVERRIDE|
1116			     NEIGH_UPDATE_F_OVERRIDE_ISROUTER,
1117			     NDISC_ROUTER_SOLICITATION, &ndopts);
1118		neigh_release(neigh);
1119	}
1120out:
1121	return;
1122}
1123
1124static void ndisc_ra_useropt(struct sk_buff *ra, struct nd_opt_hdr *opt)
1125{
1126	struct icmp6hdr *icmp6h = (struct icmp6hdr *)skb_transport_header(ra);
1127	struct sk_buff *skb;
1128	struct nlmsghdr *nlh;
1129	struct nduseroptmsg *ndmsg;
1130	struct net *net = dev_net(ra->dev);
1131	int err;
1132	int base_size = NLMSG_ALIGN(sizeof(struct nduseroptmsg)
1133				    + (opt->nd_opt_len << 3));
1134	size_t msg_size = base_size + nla_total_size(sizeof(struct in6_addr));
1135
1136	skb = nlmsg_new(msg_size, GFP_ATOMIC);
1137	if (!skb) {
1138		err = -ENOBUFS;
1139		goto errout;
1140	}
1141
1142	nlh = nlmsg_put(skb, 0, 0, RTM_NEWNDUSEROPT, base_size, 0);
1143	if (!nlh) {
1144		goto nla_put_failure;
1145	}
1146
1147	ndmsg = nlmsg_data(nlh);
1148	ndmsg->nduseropt_family = AF_INET6;
1149	ndmsg->nduseropt_ifindex = ra->dev->ifindex;
1150	ndmsg->nduseropt_icmp_type = icmp6h->icmp6_type;
1151	ndmsg->nduseropt_icmp_code = icmp6h->icmp6_code;
1152	ndmsg->nduseropt_opts_len = opt->nd_opt_len << 3;
1153
1154	memcpy(ndmsg + 1, opt, opt->nd_opt_len << 3);
1155
1156	if (nla_put_in6_addr(skb, NDUSEROPT_SRCADDR, &ipv6_hdr(ra)->saddr))
1157		goto nla_put_failure;
1158	nlmsg_end(skb, nlh);
1159
1160	rtnl_notify(skb, net, 0, RTNLGRP_ND_USEROPT, NULL, GFP_ATOMIC);
1161	return;
1162
1163nla_put_failure:
1164	nlmsg_free(skb);
1165	err = -EMSGSIZE;
1166errout:
1167	rtnl_set_sk_err(net, RTNLGRP_ND_USEROPT, err);
1168}
1169
1170static void ndisc_router_discovery(struct sk_buff *skb)
1171{
1172	struct ra_msg *ra_msg = (struct ra_msg *)skb_transport_header(skb);
1173	struct neighbour *neigh = NULL;
1174	struct inet6_dev *in6_dev;
1175	struct fib6_info *rt = NULL;
1176	u32 defrtr_usr_metric;
1177	struct net *net;
1178	int lifetime;
1179	struct ndisc_options ndopts;
1180	int optlen;
1181	unsigned int pref = 0;
1182	__u32 old_if_flags;
1183	bool send_ifinfo_notify = false;
1184
1185	__u8 *opt = (__u8 *)(ra_msg + 1);
1186
1187	optlen = (skb_tail_pointer(skb) - skb_transport_header(skb)) -
1188		sizeof(struct ra_msg);
1189
1190	ND_PRINTK(2, info,
1191		  "RA: %s, dev: %s\n",
1192		  __func__, skb->dev->name);
1193	if (!(ipv6_addr_type(&ipv6_hdr(skb)->saddr) & IPV6_ADDR_LINKLOCAL)) {
1194		ND_PRINTK(2, warn, "RA: source address is not link-local\n");
1195		return;
1196	}
1197	if (optlen < 0) {
1198		ND_PRINTK(2, warn, "RA: packet too short\n");
1199		return;
1200	}
1201
1202#ifdef CONFIG_IPV6_NDISC_NODETYPE
1203	if (skb->ndisc_nodetype == NDISC_NODETYPE_HOST) {
1204		ND_PRINTK(2, warn, "RA: from host or unauthorized router\n");
1205		return;
1206	}
1207#endif
1208
1209	/*
1210	 *	set the RA_RECV flag in the interface
1211	 */
1212
1213	in6_dev = __in6_dev_get(skb->dev);
1214	if (!in6_dev) {
1215		ND_PRINTK(0, err, "RA: can't find inet6 device for %s\n",
1216			  skb->dev->name);
1217		return;
1218	}
1219
1220	if (!ndisc_parse_options(skb->dev, opt, optlen, &ndopts)) {
1221		ND_PRINTK(2, warn, "RA: invalid ND options\n");
1222		return;
1223	}
1224
1225	if (!ipv6_accept_ra(in6_dev)) {
1226		ND_PRINTK(2, info,
1227			  "RA: %s, did not accept ra for dev: %s\n",
1228			  __func__, skb->dev->name);
1229		goto skip_linkparms;
1230	}
1231
1232#ifdef CONFIG_IPV6_NDISC_NODETYPE
1233	/* skip link-specific parameters from interior routers */
1234	if (skb->ndisc_nodetype == NDISC_NODETYPE_NODEFAULT) {
1235		ND_PRINTK(2, info,
1236			  "RA: %s, nodetype is NODEFAULT, dev: %s\n",
1237			  __func__, skb->dev->name);
1238		goto skip_linkparms;
1239	}
1240#endif
1241
1242	if (in6_dev->if_flags & IF_RS_SENT) {
1243		/*
1244		 *	flag that an RA was received after an RS was sent
1245		 *	out on this interface.
1246		 */
1247		in6_dev->if_flags |= IF_RA_RCVD;
1248	}
1249
1250	/*
1251	 * Remember the managed/otherconf flags from most recently
1252	 * received RA message (RFC 2462) -- yoshfuji
1253	 */
1254	old_if_flags = in6_dev->if_flags;
1255	in6_dev->if_flags = (in6_dev->if_flags & ~(IF_RA_MANAGED |
1256				IF_RA_OTHERCONF)) |
1257				(ra_msg->icmph.icmp6_addrconf_managed ?
1258					IF_RA_MANAGED : 0) |
1259				(ra_msg->icmph.icmp6_addrconf_other ?
1260					IF_RA_OTHERCONF : 0);
1261
1262	if (old_if_flags != in6_dev->if_flags)
1263		send_ifinfo_notify = true;
1264
1265	if (!in6_dev->cnf.accept_ra_defrtr) {
1266		ND_PRINTK(2, info,
1267			  "RA: %s, defrtr is false for dev: %s\n",
1268			  __func__, skb->dev->name);
1269		goto skip_defrtr;
1270	}
1271
1272	/* Do not accept RA with source-addr found on local machine unless
1273	 * accept_ra_from_local is set to true.
1274	 */
1275	net = dev_net(in6_dev->dev);
1276	if (!in6_dev->cnf.accept_ra_from_local &&
1277	    ipv6_chk_addr(net, &ipv6_hdr(skb)->saddr, in6_dev->dev, 0)) {
 
1278		ND_PRINTK(2, info,
1279			  "RA from local address detected on dev: %s: default router ignored\n",
1280			  skb->dev->name);
1281		goto skip_defrtr;
1282	}
1283
1284	lifetime = ntohs(ra_msg->icmph.icmp6_rt_lifetime);
1285
1286#ifdef CONFIG_IPV6_ROUTER_PREF
1287	pref = ra_msg->icmph.icmp6_router_pref;
1288	/* 10b is handled as if it were 00b (medium) */
1289	if (pref == ICMPV6_ROUTER_PREF_INVALID ||
1290	    !in6_dev->cnf.accept_ra_rtr_pref)
1291		pref = ICMPV6_ROUTER_PREF_MEDIUM;
1292#endif
1293	/* routes added from RAs do not use nexthop objects */
1294	rt = rt6_get_dflt_router(net, &ipv6_hdr(skb)->saddr, skb->dev);
 
1295	if (rt) {
1296		neigh = ip6_neigh_lookup(&rt->fib6_nh->fib_nh_gw6,
1297					 rt->fib6_nh->fib_nh_dev, NULL,
1298					  &ipv6_hdr(skb)->saddr);
1299		if (!neigh) {
1300			ND_PRINTK(0, err,
1301				  "RA: %s got default router without neighbour\n",
1302				  __func__);
1303			fib6_info_release(rt);
1304			return;
1305		}
1306	}
1307	/* Set default route metric as specified by user */
1308	defrtr_usr_metric = in6_dev->cnf.ra_defrtr_metric;
1309	/* delete the route if lifetime is 0 or if metric needs change */
1310	if (rt && (lifetime == 0 || rt->fib6_metric != defrtr_usr_metric)) {
1311		ip6_del_rt(net, rt, false);
1312		rt = NULL;
1313	}
1314
1315	ND_PRINTK(3, info, "RA: rt: %p  lifetime: %d, metric: %d, for dev: %s\n",
1316		  rt, lifetime, defrtr_usr_metric, skb->dev->name);
1317	if (!rt && lifetime) {
1318		ND_PRINTK(3, info, "RA: adding default router\n");
1319
1320		rt = rt6_add_dflt_router(net, &ipv6_hdr(skb)->saddr,
1321					 skb->dev, pref, defrtr_usr_metric);
1322		if (!rt) {
1323			ND_PRINTK(0, err,
1324				  "RA: %s failed to add default route\n",
1325				  __func__);
1326			return;
1327		}
1328
1329		neigh = ip6_neigh_lookup(&rt->fib6_nh->fib_nh_gw6,
1330					 rt->fib6_nh->fib_nh_dev, NULL,
1331					  &ipv6_hdr(skb)->saddr);
1332		if (!neigh) {
1333			ND_PRINTK(0, err,
1334				  "RA: %s got default router without neighbour\n",
1335				  __func__);
1336			fib6_info_release(rt);
1337			return;
1338		}
1339		neigh->flags |= NTF_ROUTER;
1340	} else if (rt) {
1341		rt->fib6_flags = (rt->fib6_flags & ~RTF_PREF_MASK) | RTF_PREF(pref);
1342	}
1343
1344	if (rt)
1345		fib6_set_expires(rt, jiffies + (HZ * lifetime));
1346	if (in6_dev->cnf.accept_ra_min_hop_limit < 256 &&
1347	    ra_msg->icmph.icmp6_hop_limit) {
1348		if (in6_dev->cnf.accept_ra_min_hop_limit <= ra_msg->icmph.icmp6_hop_limit) {
1349			in6_dev->cnf.hop_limit = ra_msg->icmph.icmp6_hop_limit;
1350			fib6_metric_set(rt, RTAX_HOPLIMIT,
1351					ra_msg->icmph.icmp6_hop_limit);
 
1352		} else {
1353			ND_PRINTK(2, warn, "RA: Got route advertisement with lower hop_limit than minimum\n");
1354		}
1355	}
1356
1357skip_defrtr:
1358
1359	/*
1360	 *	Update Reachable Time and Retrans Timer
1361	 */
1362
1363	if (in6_dev->nd_parms) {
1364		unsigned long rtime = ntohl(ra_msg->retrans_timer);
1365
1366		if (rtime && rtime/1000 < MAX_SCHEDULE_TIMEOUT/HZ) {
1367			rtime = (rtime*HZ)/1000;
1368			if (rtime < HZ/100)
1369				rtime = HZ/100;
1370			NEIGH_VAR_SET(in6_dev->nd_parms, RETRANS_TIME, rtime);
1371			in6_dev->tstamp = jiffies;
1372			send_ifinfo_notify = true;
1373		}
1374
1375		rtime = ntohl(ra_msg->reachable_time);
1376		if (rtime && rtime/1000 < MAX_SCHEDULE_TIMEOUT/(3*HZ)) {
1377			rtime = (rtime*HZ)/1000;
1378
1379			if (rtime < HZ/10)
1380				rtime = HZ/10;
1381
1382			if (rtime != NEIGH_VAR(in6_dev->nd_parms, BASE_REACHABLE_TIME)) {
1383				NEIGH_VAR_SET(in6_dev->nd_parms,
1384					      BASE_REACHABLE_TIME, rtime);
1385				NEIGH_VAR_SET(in6_dev->nd_parms,
1386					      GC_STALETIME, 3 * rtime);
1387				in6_dev->nd_parms->reachable_time = neigh_rand_reach_time(rtime);
1388				in6_dev->tstamp = jiffies;
1389				send_ifinfo_notify = true;
1390			}
1391		}
1392	}
1393
1394	/*
1395	 *	Send a notify if RA changed managed/otherconf flags or timer settings
1396	 */
1397	if (send_ifinfo_notify)
1398		inet6_ifinfo_notify(RTM_NEWLINK, in6_dev);
1399
1400skip_linkparms:
1401
1402	/*
1403	 *	Process options.
1404	 */
1405
1406	if (!neigh)
1407		neigh = __neigh_lookup(&nd_tbl, &ipv6_hdr(skb)->saddr,
1408				       skb->dev, 1);
1409	if (neigh) {
1410		u8 *lladdr = NULL;
1411		if (ndopts.nd_opts_src_lladdr) {
1412			lladdr = ndisc_opt_addr_data(ndopts.nd_opts_src_lladdr,
1413						     skb->dev);
1414			if (!lladdr) {
1415				ND_PRINTK(2, warn,
1416					  "RA: invalid link-layer address length\n");
1417				goto out;
1418			}
1419		}
1420		ndisc_update(skb->dev, neigh, lladdr, NUD_STALE,
1421			     NEIGH_UPDATE_F_WEAK_OVERRIDE|
1422			     NEIGH_UPDATE_F_OVERRIDE|
1423			     NEIGH_UPDATE_F_OVERRIDE_ISROUTER|
1424			     NEIGH_UPDATE_F_ISROUTER,
1425			     NDISC_ROUTER_ADVERTISEMENT, &ndopts);
1426	}
1427
1428	if (!ipv6_accept_ra(in6_dev)) {
1429		ND_PRINTK(2, info,
1430			  "RA: %s, accept_ra is false for dev: %s\n",
1431			  __func__, skb->dev->name);
1432		goto out;
1433	}
1434
1435#ifdef CONFIG_IPV6_ROUTE_INFO
1436	if (!in6_dev->cnf.accept_ra_from_local &&
1437	    ipv6_chk_addr(dev_net(in6_dev->dev), &ipv6_hdr(skb)->saddr,
1438			  in6_dev->dev, 0)) {
1439		ND_PRINTK(2, info,
1440			  "RA from local address detected on dev: %s: router info ignored.\n",
1441			  skb->dev->name);
1442		goto skip_routeinfo;
1443	}
1444
1445	if (in6_dev->cnf.accept_ra_rtr_pref && ndopts.nd_opts_ri) {
1446		struct nd_opt_hdr *p;
1447		for (p = ndopts.nd_opts_ri;
1448		     p;
1449		     p = ndisc_next_option(p, ndopts.nd_opts_ri_end)) {
1450			struct route_info *ri = (struct route_info *)p;
1451#ifdef CONFIG_IPV6_NDISC_NODETYPE
1452			if (skb->ndisc_nodetype == NDISC_NODETYPE_NODEFAULT &&
1453			    ri->prefix_len == 0)
1454				continue;
1455#endif
1456			if (ri->prefix_len == 0 &&
1457			    !in6_dev->cnf.accept_ra_defrtr)
1458				continue;
1459			if (ri->prefix_len < in6_dev->cnf.accept_ra_rt_info_min_plen)
1460				continue;
1461			if (ri->prefix_len > in6_dev->cnf.accept_ra_rt_info_max_plen)
1462				continue;
1463			rt6_route_rcv(skb->dev, (u8 *)p, (p->nd_opt_len) << 3,
1464				      &ipv6_hdr(skb)->saddr);
1465		}
1466	}
1467
1468skip_routeinfo:
1469#endif
1470
1471#ifdef CONFIG_IPV6_NDISC_NODETYPE
1472	/* skip link-specific ndopts from interior routers */
1473	if (skb->ndisc_nodetype == NDISC_NODETYPE_NODEFAULT) {
1474		ND_PRINTK(2, info,
1475			  "RA: %s, nodetype is NODEFAULT (interior routes), dev: %s\n",
1476			  __func__, skb->dev->name);
1477		goto out;
1478	}
1479#endif
1480
1481	if (in6_dev->cnf.accept_ra_pinfo && ndopts.nd_opts_pi) {
1482		struct nd_opt_hdr *p;
1483		for (p = ndopts.nd_opts_pi;
1484		     p;
1485		     p = ndisc_next_option(p, ndopts.nd_opts_pi_end)) {
1486			addrconf_prefix_rcv(skb->dev, (u8 *)p,
1487					    (p->nd_opt_len) << 3,
1488					    ndopts.nd_opts_src_lladdr != NULL);
1489		}
1490	}
1491
1492	if (ndopts.nd_opts_mtu && in6_dev->cnf.accept_ra_mtu) {
1493		__be32 n;
1494		u32 mtu;
1495
1496		memcpy(&n, ((u8 *)(ndopts.nd_opts_mtu+1))+2, sizeof(mtu));
1497		mtu = ntohl(n);
1498
1499		if (mtu < IPV6_MIN_MTU || mtu > skb->dev->mtu) {
1500			ND_PRINTK(2, warn, "RA: invalid mtu: %d\n", mtu);
1501		} else if (in6_dev->cnf.mtu6 != mtu) {
1502			in6_dev->cnf.mtu6 = mtu;
1503			fib6_metric_set(rt, RTAX_MTU, mtu);
 
 
 
1504			rt6_mtu_change(skb->dev, mtu);
1505		}
1506	}
1507
1508	if (ndopts.nd_useropts) {
1509		struct nd_opt_hdr *p;
1510		for (p = ndopts.nd_useropts;
1511		     p;
1512		     p = ndisc_next_useropt(skb->dev, p,
1513					    ndopts.nd_useropts_end)) {
1514			ndisc_ra_useropt(skb, p);
1515		}
1516	}
1517
1518	if (ndopts.nd_opts_tgt_lladdr || ndopts.nd_opts_rh) {
1519		ND_PRINTK(2, warn, "RA: invalid RA options\n");
1520	}
1521out:
1522	fib6_info_release(rt);
1523	if (neigh)
1524		neigh_release(neigh);
1525}
1526
1527static void ndisc_redirect_rcv(struct sk_buff *skb)
1528{
1529	u8 *hdr;
1530	struct ndisc_options ndopts;
1531	struct rd_msg *msg = (struct rd_msg *)skb_transport_header(skb);
1532	u32 ndoptlen = skb_tail_pointer(skb) - (skb_transport_header(skb) +
1533				    offsetof(struct rd_msg, opt));
1534
1535#ifdef CONFIG_IPV6_NDISC_NODETYPE
1536	switch (skb->ndisc_nodetype) {
1537	case NDISC_NODETYPE_HOST:
1538	case NDISC_NODETYPE_NODEFAULT:
1539		ND_PRINTK(2, warn,
1540			  "Redirect: from host or unauthorized router\n");
1541		return;
1542	}
1543#endif
1544
1545	if (!(ipv6_addr_type(&ipv6_hdr(skb)->saddr) & IPV6_ADDR_LINKLOCAL)) {
1546		ND_PRINTK(2, warn,
1547			  "Redirect: source address is not link-local\n");
1548		return;
1549	}
1550
1551	if (!ndisc_parse_options(skb->dev, msg->opt, ndoptlen, &ndopts))
1552		return;
1553
1554	if (!ndopts.nd_opts_rh) {
1555		ip6_redirect_no_header(skb, dev_net(skb->dev),
1556					skb->dev->ifindex);
1557		return;
1558	}
1559
1560	hdr = (u8 *)ndopts.nd_opts_rh;
1561	hdr += 8;
1562	if (!pskb_pull(skb, hdr - skb_transport_header(skb)))
1563		return;
1564
1565	icmpv6_notify(skb, NDISC_REDIRECT, 0, 0);
1566}
1567
1568static void ndisc_fill_redirect_hdr_option(struct sk_buff *skb,
1569					   struct sk_buff *orig_skb,
1570					   int rd_len)
1571{
1572	u8 *opt = skb_put(skb, rd_len);
1573
1574	memset(opt, 0, 8);
1575	*(opt++) = ND_OPT_REDIRECT_HDR;
1576	*(opt++) = (rd_len >> 3);
1577	opt += 6;
1578
1579	skb_copy_bits(orig_skb, skb_network_offset(orig_skb), opt,
1580		      rd_len - 8);
1581}
1582
1583void ndisc_send_redirect(struct sk_buff *skb, const struct in6_addr *target)
1584{
1585	struct net_device *dev = skb->dev;
1586	struct net *net = dev_net(dev);
1587	struct sock *sk = net->ipv6.ndisc_sk;
1588	int optlen = 0;
1589	struct inet_peer *peer;
1590	struct sk_buff *buff;
1591	struct rd_msg *msg;
1592	struct in6_addr saddr_buf;
1593	struct rt6_info *rt;
1594	struct dst_entry *dst;
1595	struct flowi6 fl6;
1596	int rd_len;
1597	u8 ha_buf[MAX_ADDR_LEN], *ha = NULL,
1598	   ops_data_buf[NDISC_OPS_REDIRECT_DATA_SPACE], *ops_data = NULL;
1599	bool ret;
1600
1601	if (netif_is_l3_master(skb->dev)) {
1602		dev = __dev_get_by_index(dev_net(skb->dev), IPCB(skb)->iif);
1603		if (!dev)
1604			return;
1605	}
1606
1607	if (ipv6_get_lladdr(dev, &saddr_buf, IFA_F_TENTATIVE)) {
1608		ND_PRINTK(2, warn, "Redirect: no link-local address on %s\n",
1609			  dev->name);
1610		return;
1611	}
1612
1613	if (!ipv6_addr_equal(&ipv6_hdr(skb)->daddr, target) &&
1614	    ipv6_addr_type(target) != (IPV6_ADDR_UNICAST|IPV6_ADDR_LINKLOCAL)) {
1615		ND_PRINTK(2, warn,
1616			  "Redirect: target address is not link-local unicast\n");
1617		return;
1618	}
1619
1620	icmpv6_flow_init(sk, &fl6, NDISC_REDIRECT,
1621			 &saddr_buf, &ipv6_hdr(skb)->saddr, dev->ifindex);
1622
1623	dst = ip6_route_output(net, NULL, &fl6);
1624	if (dst->error) {
1625		dst_release(dst);
1626		return;
1627	}
1628	dst = xfrm_lookup(net, dst, flowi6_to_flowi(&fl6), NULL, 0);
1629	if (IS_ERR(dst))
1630		return;
1631
1632	rt = (struct rt6_info *) dst;
1633
1634	if (rt->rt6i_flags & RTF_GATEWAY) {
1635		ND_PRINTK(2, warn,
1636			  "Redirect: destination is not a neighbour\n");
1637		goto release;
1638	}
1639	peer = inet_getpeer_v6(net->ipv6.peers, &ipv6_hdr(skb)->saddr, 1);
1640	ret = inet_peer_xrlim_allow(peer, 1*HZ);
1641	if (peer)
1642		inet_putpeer(peer);
1643	if (!ret)
1644		goto release;
1645
1646	if (dev->addr_len) {
1647		struct neighbour *neigh = dst_neigh_lookup(skb_dst(skb), target);
1648		if (!neigh) {
1649			ND_PRINTK(2, warn,
1650				  "Redirect: no neigh for target address\n");
1651			goto release;
1652		}
1653
1654		read_lock_bh(&neigh->lock);
1655		if (neigh->nud_state & NUD_VALID) {
1656			memcpy(ha_buf, neigh->ha, dev->addr_len);
1657			read_unlock_bh(&neigh->lock);
1658			ha = ha_buf;
1659			optlen += ndisc_redirect_opt_addr_space(dev, neigh,
1660								ops_data_buf,
1661								&ops_data);
1662		} else
1663			read_unlock_bh(&neigh->lock);
1664
1665		neigh_release(neigh);
1666	}
1667
1668	rd_len = min_t(unsigned int,
1669		       IPV6_MIN_MTU - sizeof(struct ipv6hdr) - sizeof(*msg) - optlen,
1670		       skb->len + 8);
1671	rd_len &= ~0x7;
1672	optlen += rd_len;
1673
1674	buff = ndisc_alloc_skb(dev, sizeof(*msg) + optlen);
1675	if (!buff)
1676		goto release;
1677
1678	msg = skb_put(buff, sizeof(*msg));
1679	*msg = (struct rd_msg) {
1680		.icmph = {
1681			.icmp6_type = NDISC_REDIRECT,
1682		},
1683		.target = *target,
1684		.dest = ipv6_hdr(skb)->daddr,
1685	};
1686
1687	/*
1688	 *	include target_address option
1689	 */
1690
1691	if (ha)
1692		ndisc_fill_redirect_addr_option(buff, ha, ops_data);
1693
1694	/*
1695	 *	build redirect option and copy skb over to the new packet.
1696	 */
1697
1698	if (rd_len)
1699		ndisc_fill_redirect_hdr_option(buff, skb, rd_len);
1700
1701	skb_dst_set(buff, dst);
1702	ndisc_send_skb(buff, &ipv6_hdr(skb)->saddr, &saddr_buf);
1703	return;
1704
1705release:
1706	dst_release(dst);
1707}
1708
1709static void pndisc_redo(struct sk_buff *skb)
1710{
1711	ndisc_recv_ns(skb);
1712	kfree_skb(skb);
1713}
1714
1715static int ndisc_is_multicast(const void *pkey)
1716{
1717	return ipv6_addr_is_multicast((struct in6_addr *)pkey);
1718}
1719
1720static bool ndisc_suppress_frag_ndisc(struct sk_buff *skb)
1721{
1722	struct inet6_dev *idev = __in6_dev_get(skb->dev);
1723
1724	if (!idev)
1725		return true;
1726	if (IP6CB(skb)->flags & IP6SKB_FRAGMENTED &&
1727	    idev->cnf.suppress_frag_ndisc) {
1728		net_warn_ratelimited("Received fragmented ndisc packet. Carefully consider disabling suppress_frag_ndisc.\n");
1729		return true;
1730	}
1731	return false;
1732}
1733
1734int ndisc_rcv(struct sk_buff *skb)
1735{
1736	struct nd_msg *msg;
1737
1738	if (ndisc_suppress_frag_ndisc(skb))
1739		return 0;
1740
1741	if (skb_linearize(skb))
1742		return 0;
1743
1744	msg = (struct nd_msg *)skb_transport_header(skb);
1745
1746	__skb_push(skb, skb->data - skb_transport_header(skb));
1747
1748	if (ipv6_hdr(skb)->hop_limit != 255) {
1749		ND_PRINTK(2, warn, "NDISC: invalid hop-limit: %d\n",
1750			  ipv6_hdr(skb)->hop_limit);
1751		return 0;
1752	}
1753
1754	if (msg->icmph.icmp6_code != 0) {
1755		ND_PRINTK(2, warn, "NDISC: invalid ICMPv6 code: %d\n",
1756			  msg->icmph.icmp6_code);
1757		return 0;
1758	}
1759
 
 
1760	switch (msg->icmph.icmp6_type) {
1761	case NDISC_NEIGHBOUR_SOLICITATION:
1762		memset(NEIGH_CB(skb), 0, sizeof(struct neighbour_cb));
1763		ndisc_recv_ns(skb);
1764		break;
1765
1766	case NDISC_NEIGHBOUR_ADVERTISEMENT:
1767		ndisc_recv_na(skb);
1768		break;
1769
1770	case NDISC_ROUTER_SOLICITATION:
1771		ndisc_recv_rs(skb);
1772		break;
1773
1774	case NDISC_ROUTER_ADVERTISEMENT:
1775		ndisc_router_discovery(skb);
1776		break;
1777
1778	case NDISC_REDIRECT:
1779		ndisc_redirect_rcv(skb);
1780		break;
1781	}
1782
1783	return 0;
1784}
1785
1786static int ndisc_netdev_event(struct notifier_block *this, unsigned long event, void *ptr)
1787{
1788	struct net_device *dev = netdev_notifier_info_to_dev(ptr);
1789	struct netdev_notifier_change_info *change_info;
1790	struct net *net = dev_net(dev);
1791	struct inet6_dev *idev;
1792
1793	switch (event) {
1794	case NETDEV_CHANGEADDR:
1795		neigh_changeaddr(&nd_tbl, dev);
1796		fib6_run_gc(0, net, false);
1797		fallthrough;
1798	case NETDEV_UP:
1799		idev = in6_dev_get(dev);
1800		if (!idev)
1801			break;
1802		if (idev->cnf.ndisc_notify ||
1803		    net->ipv6.devconf_all->ndisc_notify)
1804			ndisc_send_unsol_na(dev);
1805		in6_dev_put(idev);
1806		break;
1807	case NETDEV_CHANGE:
1808		change_info = ptr;
1809		if (change_info->flags_changed & IFF_NOARP)
1810			neigh_changeaddr(&nd_tbl, dev);
1811		if (!netif_carrier_ok(dev))
1812			neigh_carrier_down(&nd_tbl, dev);
1813		break;
1814	case NETDEV_DOWN:
1815		neigh_ifdown(&nd_tbl, dev);
1816		fib6_run_gc(0, net, false);
1817		break;
1818	case NETDEV_NOTIFY_PEERS:
1819		ndisc_send_unsol_na(dev);
1820		break;
1821	default:
1822		break;
1823	}
1824
1825	return NOTIFY_DONE;
1826}
1827
1828static struct notifier_block ndisc_netdev_notifier = {
1829	.notifier_call = ndisc_netdev_event,
1830	.priority = ADDRCONF_NOTIFY_PRIORITY - 5,
1831};
1832
1833#ifdef CONFIG_SYSCTL
1834static void ndisc_warn_deprecated_sysctl(struct ctl_table *ctl,
1835					 const char *func, const char *dev_name)
1836{
1837	static char warncomm[TASK_COMM_LEN];
1838	static int warned;
1839	if (strcmp(warncomm, current->comm) && warned < 5) {
1840		strcpy(warncomm, current->comm);
1841		pr_warn("process `%s' is using deprecated sysctl (%s) net.ipv6.neigh.%s.%s - use net.ipv6.neigh.%s.%s_ms instead\n",
1842			warncomm, func,
1843			dev_name, ctl->procname,
1844			dev_name, ctl->procname);
1845		warned++;
1846	}
1847}
1848
1849int ndisc_ifinfo_sysctl_change(struct ctl_table *ctl, int write, void *buffer,
1850		size_t *lenp, loff_t *ppos)
1851{
1852	struct net_device *dev = ctl->extra1;
1853	struct inet6_dev *idev;
1854	int ret;
1855
1856	if ((strcmp(ctl->procname, "retrans_time") == 0) ||
1857	    (strcmp(ctl->procname, "base_reachable_time") == 0))
1858		ndisc_warn_deprecated_sysctl(ctl, "syscall", dev ? dev->name : "default");
1859
1860	if (strcmp(ctl->procname, "retrans_time") == 0)
1861		ret = neigh_proc_dointvec(ctl, write, buffer, lenp, ppos);
1862
1863	else if (strcmp(ctl->procname, "base_reachable_time") == 0)
1864		ret = neigh_proc_dointvec_jiffies(ctl, write,
1865						  buffer, lenp, ppos);
1866
1867	else if ((strcmp(ctl->procname, "retrans_time_ms") == 0) ||
1868		 (strcmp(ctl->procname, "base_reachable_time_ms") == 0))
1869		ret = neigh_proc_dointvec_ms_jiffies(ctl, write,
1870						     buffer, lenp, ppos);
1871	else
1872		ret = -1;
1873
1874	if (write && ret == 0 && dev && (idev = in6_dev_get(dev)) != NULL) {
1875		if (ctl->data == &NEIGH_VAR(idev->nd_parms, BASE_REACHABLE_TIME))
1876			idev->nd_parms->reachable_time =
1877					neigh_rand_reach_time(NEIGH_VAR(idev->nd_parms, BASE_REACHABLE_TIME));
1878		idev->tstamp = jiffies;
1879		inet6_ifinfo_notify(RTM_NEWLINK, idev);
1880		in6_dev_put(idev);
1881	}
1882	return ret;
1883}
1884
1885
1886#endif
1887
1888static int __net_init ndisc_net_init(struct net *net)
1889{
1890	struct ipv6_pinfo *np;
1891	struct sock *sk;
1892	int err;
1893
1894	err = inet_ctl_sock_create(&sk, PF_INET6,
1895				   SOCK_RAW, IPPROTO_ICMPV6, net);
1896	if (err < 0) {
1897		ND_PRINTK(0, err,
1898			  "NDISC: Failed to initialize the control socket (err %d)\n",
1899			  err);
1900		return err;
1901	}
1902
1903	net->ipv6.ndisc_sk = sk;
1904
1905	np = inet6_sk(sk);
1906	np->hop_limit = 255;
1907	/* Do not loopback ndisc messages */
1908	np->mc_loop = 0;
1909
1910	return 0;
1911}
1912
1913static void __net_exit ndisc_net_exit(struct net *net)
1914{
1915	inet_ctl_sock_destroy(net->ipv6.ndisc_sk);
1916}
1917
1918static struct pernet_operations ndisc_net_ops = {
1919	.init = ndisc_net_init,
1920	.exit = ndisc_net_exit,
1921};
1922
1923int __init ndisc_init(void)
1924{
1925	int err;
1926
1927	err = register_pernet_subsys(&ndisc_net_ops);
1928	if (err)
1929		return err;
1930	/*
1931	 * Initialize the neighbour table
1932	 */
1933	neigh_table_init(NEIGH_ND_TABLE, &nd_tbl);
1934
1935#ifdef CONFIG_SYSCTL
1936	err = neigh_sysctl_register(NULL, &nd_tbl.parms,
1937				    ndisc_ifinfo_sysctl_change);
1938	if (err)
1939		goto out_unregister_pernet;
1940out:
1941#endif
1942	return err;
1943
1944#ifdef CONFIG_SYSCTL
1945out_unregister_pernet:
1946	unregister_pernet_subsys(&ndisc_net_ops);
1947	goto out;
1948#endif
1949}
1950
1951int __init ndisc_late_init(void)
1952{
1953	return register_netdevice_notifier(&ndisc_netdev_notifier);
1954}
1955
1956void ndisc_late_cleanup(void)
1957{
1958	unregister_netdevice_notifier(&ndisc_netdev_notifier);
1959}
1960
1961void ndisc_cleanup(void)
1962{
1963#ifdef CONFIG_SYSCTL
1964	neigh_sysctl_unregister(&nd_tbl.parms);
1965#endif
1966	neigh_table_clear(NEIGH_ND_TABLE, &nd_tbl);
1967	unregister_pernet_subsys(&ndisc_net_ops);
1968}
v4.17
 
   1/*
   2 *	Neighbour Discovery for IPv6
   3 *	Linux INET6 implementation
   4 *
   5 *	Authors:
   6 *	Pedro Roque		<roque@di.fc.ul.pt>
   7 *	Mike Shaver		<shaver@ingenia.com>
   8 *
   9 *	This program is free software; you can redistribute it and/or
  10 *      modify it under the terms of the GNU General Public License
  11 *      as published by the Free Software Foundation; either version
  12 *      2 of the License, or (at your option) any later version.
  13 */
  14
  15/*
  16 *	Changes:
  17 *
  18 *	Alexey I. Froloff		:	RFC6106 (DNSSL) support
  19 *	Pierre Ynard			:	export userland ND options
  20 *						through netlink (RDNSS support)
  21 *	Lars Fenneberg			:	fixed MTU setting on receipt
  22 *						of an RA.
  23 *	Janos Farkas			:	kmalloc failure checks
  24 *	Alexey Kuznetsov		:	state machine reworked
  25 *						and moved to net/core.
  26 *	Pekka Savola			:	RFC2461 validation
  27 *	YOSHIFUJI Hideaki @USAGI	:	Verify ND options properly
  28 */
  29
  30#define pr_fmt(fmt) "ICMPv6: " fmt
  31
  32#include <linux/module.h>
  33#include <linux/errno.h>
  34#include <linux/types.h>
  35#include <linux/socket.h>
  36#include <linux/sockios.h>
  37#include <linux/sched.h>
  38#include <linux/net.h>
  39#include <linux/in6.h>
  40#include <linux/route.h>
  41#include <linux/init.h>
  42#include <linux/rcupdate.h>
  43#include <linux/slab.h>
  44#ifdef CONFIG_SYSCTL
  45#include <linux/sysctl.h>
  46#endif
  47
  48#include <linux/if_addr.h>
  49#include <linux/if_ether.h>
  50#include <linux/if_arp.h>
  51#include <linux/ipv6.h>
  52#include <linux/icmpv6.h>
  53#include <linux/jhash.h>
  54
  55#include <net/sock.h>
  56#include <net/snmp.h>
  57
  58#include <net/ipv6.h>
  59#include <net/protocol.h>
  60#include <net/ndisc.h>
  61#include <net/ip6_route.h>
  62#include <net/addrconf.h>
  63#include <net/icmp.h>
  64
  65#include <net/netlink.h>
  66#include <linux/rtnetlink.h>
  67
  68#include <net/flow.h>
  69#include <net/ip6_checksum.h>
  70#include <net/inet_common.h>
  71#include <linux/proc_fs.h>
  72
  73#include <linux/netfilter.h>
  74#include <linux/netfilter_ipv6.h>
  75
  76static u32 ndisc_hash(const void *pkey,
  77		      const struct net_device *dev,
  78		      __u32 *hash_rnd);
  79static bool ndisc_key_eq(const struct neighbour *neigh, const void *pkey);
 
 
  80static int ndisc_constructor(struct neighbour *neigh);
  81static void ndisc_solicit(struct neighbour *neigh, struct sk_buff *skb);
  82static void ndisc_error_report(struct neighbour *neigh, struct sk_buff *skb);
  83static int pndisc_constructor(struct pneigh_entry *n);
  84static void pndisc_destructor(struct pneigh_entry *n);
  85static void pndisc_redo(struct sk_buff *skb);
 
  86
  87static const struct neigh_ops ndisc_generic_ops = {
  88	.family =		AF_INET6,
  89	.solicit =		ndisc_solicit,
  90	.error_report =		ndisc_error_report,
  91	.output =		neigh_resolve_output,
  92	.connected_output =	neigh_connected_output,
  93};
  94
  95static const struct neigh_ops ndisc_hh_ops = {
  96	.family =		AF_INET6,
  97	.solicit =		ndisc_solicit,
  98	.error_report =		ndisc_error_report,
  99	.output =		neigh_resolve_output,
 100	.connected_output =	neigh_resolve_output,
 101};
 102
 103
 104static const struct neigh_ops ndisc_direct_ops = {
 105	.family =		AF_INET6,
 106	.output =		neigh_direct_output,
 107	.connected_output =	neigh_direct_output,
 108};
 109
 110struct neigh_table nd_tbl = {
 111	.family =	AF_INET6,
 112	.key_len =	sizeof(struct in6_addr),
 113	.protocol =	cpu_to_be16(ETH_P_IPV6),
 114	.hash =		ndisc_hash,
 115	.key_eq =	ndisc_key_eq,
 116	.constructor =	ndisc_constructor,
 117	.pconstructor =	pndisc_constructor,
 118	.pdestructor =	pndisc_destructor,
 119	.proxy_redo =	pndisc_redo,
 
 
 120	.id =		"ndisc_cache",
 121	.parms = {
 122		.tbl			= &nd_tbl,
 123		.reachable_time		= ND_REACHABLE_TIME,
 124		.data = {
 125			[NEIGH_VAR_MCAST_PROBES] = 3,
 126			[NEIGH_VAR_UCAST_PROBES] = 3,
 127			[NEIGH_VAR_RETRANS_TIME] = ND_RETRANS_TIMER,
 128			[NEIGH_VAR_BASE_REACHABLE_TIME] = ND_REACHABLE_TIME,
 129			[NEIGH_VAR_DELAY_PROBE_TIME] = 5 * HZ,
 130			[NEIGH_VAR_GC_STALETIME] = 60 * HZ,
 131			[NEIGH_VAR_QUEUE_LEN_BYTES] = SK_WMEM_MAX,
 132			[NEIGH_VAR_PROXY_QLEN] = 64,
 133			[NEIGH_VAR_ANYCAST_DELAY] = 1 * HZ,
 134			[NEIGH_VAR_PROXY_DELAY] = (8 * HZ) / 10,
 135		},
 136	},
 137	.gc_interval =	  30 * HZ,
 138	.gc_thresh1 =	 128,
 139	.gc_thresh2 =	 512,
 140	.gc_thresh3 =	1024,
 141};
 142EXPORT_SYMBOL_GPL(nd_tbl);
 143
 144void __ndisc_fill_addr_option(struct sk_buff *skb, int type, void *data,
 145			      int data_len, int pad)
 146{
 147	int space = __ndisc_opt_addr_space(data_len, pad);
 148	u8 *opt = skb_put(skb, space);
 149
 150	opt[0] = type;
 151	opt[1] = space>>3;
 152
 153	memset(opt + 2, 0, pad);
 154	opt   += pad;
 155	space -= pad;
 156
 157	memcpy(opt+2, data, data_len);
 158	data_len += 2;
 159	opt += data_len;
 160	space -= data_len;
 161	if (space > 0)
 162		memset(opt, 0, space);
 163}
 164EXPORT_SYMBOL_GPL(__ndisc_fill_addr_option);
 165
 166static inline void ndisc_fill_addr_option(struct sk_buff *skb, int type,
 167					  void *data, u8 icmp6_type)
 168{
 169	__ndisc_fill_addr_option(skb, type, data, skb->dev->addr_len,
 170				 ndisc_addr_option_pad(skb->dev->type));
 171	ndisc_ops_fill_addr_option(skb->dev, skb, icmp6_type);
 172}
 173
 174static inline void ndisc_fill_redirect_addr_option(struct sk_buff *skb,
 175						   void *ha,
 176						   const u8 *ops_data)
 177{
 178	ndisc_fill_addr_option(skb, ND_OPT_TARGET_LL_ADDR, ha, NDISC_REDIRECT);
 179	ndisc_ops_fill_redirect_addr_option(skb->dev, skb, ops_data);
 180}
 181
 182static struct nd_opt_hdr *ndisc_next_option(struct nd_opt_hdr *cur,
 183					    struct nd_opt_hdr *end)
 184{
 185	int type;
 186	if (!cur || !end || cur >= end)
 187		return NULL;
 188	type = cur->nd_opt_type;
 189	do {
 190		cur = ((void *)cur) + (cur->nd_opt_len << 3);
 191	} while (cur < end && cur->nd_opt_type != type);
 192	return cur <= end && cur->nd_opt_type == type ? cur : NULL;
 193}
 194
 195static inline int ndisc_is_useropt(const struct net_device *dev,
 196				   struct nd_opt_hdr *opt)
 197{
 198	return opt->nd_opt_type == ND_OPT_RDNSS ||
 199		opt->nd_opt_type == ND_OPT_DNSSL ||
 
 
 200		ndisc_ops_is_useropt(dev, opt->nd_opt_type);
 201}
 202
 203static struct nd_opt_hdr *ndisc_next_useropt(const struct net_device *dev,
 204					     struct nd_opt_hdr *cur,
 205					     struct nd_opt_hdr *end)
 206{
 207	if (!cur || !end || cur >= end)
 208		return NULL;
 209	do {
 210		cur = ((void *)cur) + (cur->nd_opt_len << 3);
 211	} while (cur < end && !ndisc_is_useropt(dev, cur));
 212	return cur <= end && ndisc_is_useropt(dev, cur) ? cur : NULL;
 213}
 214
 215struct ndisc_options *ndisc_parse_options(const struct net_device *dev,
 216					  u8 *opt, int opt_len,
 217					  struct ndisc_options *ndopts)
 218{
 219	struct nd_opt_hdr *nd_opt = (struct nd_opt_hdr *)opt;
 220
 221	if (!nd_opt || opt_len < 0 || !ndopts)
 222		return NULL;
 223	memset(ndopts, 0, sizeof(*ndopts));
 224	while (opt_len) {
 225		int l;
 226		if (opt_len < sizeof(struct nd_opt_hdr))
 227			return NULL;
 228		l = nd_opt->nd_opt_len << 3;
 229		if (opt_len < l || l == 0)
 230			return NULL;
 231		if (ndisc_ops_parse_options(dev, nd_opt, ndopts))
 232			goto next_opt;
 233		switch (nd_opt->nd_opt_type) {
 234		case ND_OPT_SOURCE_LL_ADDR:
 235		case ND_OPT_TARGET_LL_ADDR:
 236		case ND_OPT_MTU:
 237		case ND_OPT_NONCE:
 238		case ND_OPT_REDIRECT_HDR:
 239			if (ndopts->nd_opt_array[nd_opt->nd_opt_type]) {
 240				ND_PRINTK(2, warn,
 241					  "%s: duplicated ND6 option found: type=%d\n",
 242					  __func__, nd_opt->nd_opt_type);
 243			} else {
 244				ndopts->nd_opt_array[nd_opt->nd_opt_type] = nd_opt;
 245			}
 246			break;
 247		case ND_OPT_PREFIX_INFO:
 248			ndopts->nd_opts_pi_end = nd_opt;
 249			if (!ndopts->nd_opt_array[nd_opt->nd_opt_type])
 250				ndopts->nd_opt_array[nd_opt->nd_opt_type] = nd_opt;
 251			break;
 252#ifdef CONFIG_IPV6_ROUTE_INFO
 253		case ND_OPT_ROUTE_INFO:
 254			ndopts->nd_opts_ri_end = nd_opt;
 255			if (!ndopts->nd_opts_ri)
 256				ndopts->nd_opts_ri = nd_opt;
 257			break;
 258#endif
 259		default:
 260			if (ndisc_is_useropt(dev, nd_opt)) {
 261				ndopts->nd_useropts_end = nd_opt;
 262				if (!ndopts->nd_useropts)
 263					ndopts->nd_useropts = nd_opt;
 264			} else {
 265				/*
 266				 * Unknown options must be silently ignored,
 267				 * to accommodate future extension to the
 268				 * protocol.
 269				 */
 270				ND_PRINTK(2, notice,
 271					  "%s: ignored unsupported option; type=%d, len=%d\n",
 272					  __func__,
 273					  nd_opt->nd_opt_type,
 274					  nd_opt->nd_opt_len);
 275			}
 276		}
 277next_opt:
 278		opt_len -= l;
 279		nd_opt = ((void *)nd_opt) + l;
 280	}
 281	return ndopts;
 282}
 283
 284int ndisc_mc_map(const struct in6_addr *addr, char *buf, struct net_device *dev, int dir)
 285{
 286	switch (dev->type) {
 287	case ARPHRD_ETHER:
 288	case ARPHRD_IEEE802:	/* Not sure. Check it later. --ANK */
 289	case ARPHRD_FDDI:
 290		ipv6_eth_mc_map(addr, buf);
 291		return 0;
 292	case ARPHRD_ARCNET:
 293		ipv6_arcnet_mc_map(addr, buf);
 294		return 0;
 295	case ARPHRD_INFINIBAND:
 296		ipv6_ib_mc_map(addr, dev->broadcast, buf);
 297		return 0;
 298	case ARPHRD_IPGRE:
 299		return ipv6_ipgre_mc_map(addr, dev->broadcast, buf);
 300	default:
 301		if (dir) {
 302			memcpy(buf, dev->broadcast, dev->addr_len);
 303			return 0;
 304		}
 305	}
 306	return -EINVAL;
 307}
 308EXPORT_SYMBOL(ndisc_mc_map);
 309
 310static u32 ndisc_hash(const void *pkey,
 311		      const struct net_device *dev,
 312		      __u32 *hash_rnd)
 313{
 314	return ndisc_hashfn(pkey, dev, hash_rnd);
 315}
 316
 317static bool ndisc_key_eq(const struct neighbour *n, const void *pkey)
 318{
 319	return neigh_key_eq128(n, pkey);
 320}
 321
 322static int ndisc_constructor(struct neighbour *neigh)
 323{
 324	struct in6_addr *addr = (struct in6_addr *)&neigh->primary_key;
 325	struct net_device *dev = neigh->dev;
 326	struct inet6_dev *in6_dev;
 327	struct neigh_parms *parms;
 328	bool is_multicast = ipv6_addr_is_multicast(addr);
 329
 330	in6_dev = in6_dev_get(dev);
 331	if (!in6_dev) {
 332		return -EINVAL;
 333	}
 334
 335	parms = in6_dev->nd_parms;
 336	__neigh_parms_put(neigh->parms);
 337	neigh->parms = neigh_parms_clone(parms);
 338
 339	neigh->type = is_multicast ? RTN_MULTICAST : RTN_UNICAST;
 340	if (!dev->header_ops) {
 341		neigh->nud_state = NUD_NOARP;
 342		neigh->ops = &ndisc_direct_ops;
 343		neigh->output = neigh_direct_output;
 344	} else {
 345		if (is_multicast) {
 346			neigh->nud_state = NUD_NOARP;
 347			ndisc_mc_map(addr, neigh->ha, dev, 1);
 348		} else if (dev->flags&(IFF_NOARP|IFF_LOOPBACK)) {
 349			neigh->nud_state = NUD_NOARP;
 350			memcpy(neigh->ha, dev->dev_addr, dev->addr_len);
 351			if (dev->flags&IFF_LOOPBACK)
 352				neigh->type = RTN_LOCAL;
 353		} else if (dev->flags&IFF_POINTOPOINT) {
 354			neigh->nud_state = NUD_NOARP;
 355			memcpy(neigh->ha, dev->broadcast, dev->addr_len);
 356		}
 357		if (dev->header_ops->cache)
 358			neigh->ops = &ndisc_hh_ops;
 359		else
 360			neigh->ops = &ndisc_generic_ops;
 361		if (neigh->nud_state&NUD_VALID)
 362			neigh->output = neigh->ops->connected_output;
 363		else
 364			neigh->output = neigh->ops->output;
 365	}
 366	in6_dev_put(in6_dev);
 367	return 0;
 368}
 369
 370static int pndisc_constructor(struct pneigh_entry *n)
 371{
 372	struct in6_addr *addr = (struct in6_addr *)&n->key;
 373	struct in6_addr maddr;
 374	struct net_device *dev = n->dev;
 375
 376	if (!dev || !__in6_dev_get(dev))
 377		return -EINVAL;
 378	addrconf_addr_solict_mult(addr, &maddr);
 379	ipv6_dev_mc_inc(dev, &maddr);
 380	return 0;
 381}
 382
 383static void pndisc_destructor(struct pneigh_entry *n)
 384{
 385	struct in6_addr *addr = (struct in6_addr *)&n->key;
 386	struct in6_addr maddr;
 387	struct net_device *dev = n->dev;
 388
 389	if (!dev || !__in6_dev_get(dev))
 390		return;
 391	addrconf_addr_solict_mult(addr, &maddr);
 392	ipv6_dev_mc_dec(dev, &maddr);
 393}
 394
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 395static struct sk_buff *ndisc_alloc_skb(struct net_device *dev,
 396				       int len)
 397{
 398	int hlen = LL_RESERVED_SPACE(dev);
 399	int tlen = dev->needed_tailroom;
 400	struct sock *sk = dev_net(dev)->ipv6.ndisc_sk;
 401	struct sk_buff *skb;
 402
 403	skb = alloc_skb(hlen + sizeof(struct ipv6hdr) + len + tlen, GFP_ATOMIC);
 404	if (!skb) {
 405		ND_PRINTK(0, err, "ndisc: %s failed to allocate an skb\n",
 406			  __func__);
 407		return NULL;
 408	}
 409
 410	skb->protocol = htons(ETH_P_IPV6);
 411	skb->dev = dev;
 412
 413	skb_reserve(skb, hlen + sizeof(struct ipv6hdr));
 414	skb_reset_transport_header(skb);
 415
 416	/* Manually assign socket ownership as we avoid calling
 417	 * sock_alloc_send_pskb() to bypass wmem buffer limits
 418	 */
 419	skb_set_owner_w(skb, sk);
 420
 421	return skb;
 422}
 423
 424static void ip6_nd_hdr(struct sk_buff *skb,
 425		       const struct in6_addr *saddr,
 426		       const struct in6_addr *daddr,
 427		       int hop_limit, int len)
 428{
 429	struct ipv6hdr *hdr;
 430	struct inet6_dev *idev;
 431	unsigned tclass;
 432
 433	rcu_read_lock();
 434	idev = __in6_dev_get(skb->dev);
 435	tclass = idev ? idev->cnf.ndisc_tclass : 0;
 436	rcu_read_unlock();
 437
 438	skb_push(skb, sizeof(*hdr));
 439	skb_reset_network_header(skb);
 440	hdr = ipv6_hdr(skb);
 441
 442	ip6_flow_hdr(hdr, tclass, 0);
 443
 444	hdr->payload_len = htons(len);
 445	hdr->nexthdr = IPPROTO_ICMPV6;
 446	hdr->hop_limit = hop_limit;
 447
 448	hdr->saddr = *saddr;
 449	hdr->daddr = *daddr;
 450}
 451
 452static void ndisc_send_skb(struct sk_buff *skb,
 453			   const struct in6_addr *daddr,
 454			   const struct in6_addr *saddr)
 455{
 456	struct dst_entry *dst = skb_dst(skb);
 457	struct net *net = dev_net(skb->dev);
 458	struct sock *sk = net->ipv6.ndisc_sk;
 459	struct inet6_dev *idev;
 460	int err;
 461	struct icmp6hdr *icmp6h = icmp6_hdr(skb);
 462	u8 type;
 463
 464	type = icmp6h->icmp6_type;
 465
 466	if (!dst) {
 467		struct flowi6 fl6;
 468		int oif = skb->dev->ifindex;
 469
 470		icmpv6_flow_init(sk, &fl6, type, saddr, daddr, oif);
 471		dst = icmp6_dst_alloc(skb->dev, &fl6);
 472		if (IS_ERR(dst)) {
 473			kfree_skb(skb);
 474			return;
 475		}
 476
 477		skb_dst_set(skb, dst);
 478	}
 479
 480	icmp6h->icmp6_cksum = csum_ipv6_magic(saddr, daddr, skb->len,
 481					      IPPROTO_ICMPV6,
 482					      csum_partial(icmp6h,
 483							   skb->len, 0));
 484
 485	ip6_nd_hdr(skb, saddr, daddr, inet6_sk(sk)->hop_limit, skb->len);
 486
 487	rcu_read_lock();
 488	idev = __in6_dev_get(dst->dev);
 489	IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUT, skb->len);
 490
 491	err = NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT,
 492		      net, sk, skb, NULL, dst->dev,
 493		      dst_output);
 494	if (!err) {
 495		ICMP6MSGOUT_INC_STATS(net, idev, type);
 496		ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS);
 497	}
 498
 499	rcu_read_unlock();
 500}
 501
 502void ndisc_send_na(struct net_device *dev, const struct in6_addr *daddr,
 503		   const struct in6_addr *solicited_addr,
 504		   bool router, bool solicited, bool override, bool inc_opt)
 505{
 506	struct sk_buff *skb;
 507	struct in6_addr tmpaddr;
 508	struct inet6_ifaddr *ifp;
 509	const struct in6_addr *src_addr;
 510	struct nd_msg *msg;
 511	int optlen = 0;
 512
 513	/* for anycast or proxy, solicited_addr != src_addr */
 514	ifp = ipv6_get_ifaddr(dev_net(dev), solicited_addr, dev, 1);
 515	if (ifp) {
 516		src_addr = solicited_addr;
 517		if (ifp->flags & IFA_F_OPTIMISTIC)
 518			override = false;
 519		inc_opt |= ifp->idev->cnf.force_tllao;
 520		in6_ifa_put(ifp);
 521	} else {
 522		if (ipv6_dev_get_saddr(dev_net(dev), dev, daddr,
 523				       inet6_sk(dev_net(dev)->ipv6.ndisc_sk)->srcprefs,
 524				       &tmpaddr))
 525			return;
 526		src_addr = &tmpaddr;
 527	}
 528
 529	if (!dev->addr_len)
 530		inc_opt = false;
 531	if (inc_opt)
 532		optlen += ndisc_opt_addr_space(dev,
 533					       NDISC_NEIGHBOUR_ADVERTISEMENT);
 534
 535	skb = ndisc_alloc_skb(dev, sizeof(*msg) + optlen);
 536	if (!skb)
 537		return;
 538
 539	msg = skb_put(skb, sizeof(*msg));
 540	*msg = (struct nd_msg) {
 541		.icmph = {
 542			.icmp6_type = NDISC_NEIGHBOUR_ADVERTISEMENT,
 543			.icmp6_router = router,
 544			.icmp6_solicited = solicited,
 545			.icmp6_override = override,
 546		},
 547		.target = *solicited_addr,
 548	};
 549
 550	if (inc_opt)
 551		ndisc_fill_addr_option(skb, ND_OPT_TARGET_LL_ADDR,
 552				       dev->dev_addr,
 553				       NDISC_NEIGHBOUR_ADVERTISEMENT);
 554
 555	ndisc_send_skb(skb, daddr, src_addr);
 556}
 557
 558static void ndisc_send_unsol_na(struct net_device *dev)
 559{
 560	struct inet6_dev *idev;
 561	struct inet6_ifaddr *ifa;
 562
 563	idev = in6_dev_get(dev);
 564	if (!idev)
 565		return;
 566
 567	read_lock_bh(&idev->lock);
 568	list_for_each_entry(ifa, &idev->addr_list, if_list) {
 569		/* skip tentative addresses until dad completes */
 570		if (ifa->flags & IFA_F_TENTATIVE &&
 571		    !(ifa->flags & IFA_F_OPTIMISTIC))
 572			continue;
 573
 574		ndisc_send_na(dev, &in6addr_linklocal_allnodes, &ifa->addr,
 575			      /*router=*/ !!idev->cnf.forwarding,
 576			      /*solicited=*/ false, /*override=*/ true,
 577			      /*inc_opt=*/ true);
 578	}
 579	read_unlock_bh(&idev->lock);
 580
 581	in6_dev_put(idev);
 582}
 583
 584void ndisc_send_ns(struct net_device *dev, const struct in6_addr *solicit,
 585		   const struct in6_addr *daddr, const struct in6_addr *saddr,
 586		   u64 nonce)
 587{
 588	struct sk_buff *skb;
 589	struct in6_addr addr_buf;
 590	int inc_opt = dev->addr_len;
 591	int optlen = 0;
 592	struct nd_msg *msg;
 593
 594	if (!saddr) {
 595		if (ipv6_get_lladdr(dev, &addr_buf,
 596				   (IFA_F_TENTATIVE|IFA_F_OPTIMISTIC)))
 597			return;
 598		saddr = &addr_buf;
 599	}
 600
 601	if (ipv6_addr_any(saddr))
 602		inc_opt = false;
 603	if (inc_opt)
 604		optlen += ndisc_opt_addr_space(dev,
 605					       NDISC_NEIGHBOUR_SOLICITATION);
 606	if (nonce != 0)
 607		optlen += 8;
 608
 609	skb = ndisc_alloc_skb(dev, sizeof(*msg) + optlen);
 610	if (!skb)
 611		return;
 612
 613	msg = skb_put(skb, sizeof(*msg));
 614	*msg = (struct nd_msg) {
 615		.icmph = {
 616			.icmp6_type = NDISC_NEIGHBOUR_SOLICITATION,
 617		},
 618		.target = *solicit,
 619	};
 620
 621	if (inc_opt)
 622		ndisc_fill_addr_option(skb, ND_OPT_SOURCE_LL_ADDR,
 623				       dev->dev_addr,
 624				       NDISC_NEIGHBOUR_SOLICITATION);
 625	if (nonce != 0) {
 626		u8 *opt = skb_put(skb, 8);
 627
 628		opt[0] = ND_OPT_NONCE;
 629		opt[1] = 8 >> 3;
 630		memcpy(opt + 2, &nonce, 6);
 631	}
 632
 633	ndisc_send_skb(skb, daddr, saddr);
 634}
 635
 636void ndisc_send_rs(struct net_device *dev, const struct in6_addr *saddr,
 637		   const struct in6_addr *daddr)
 638{
 639	struct sk_buff *skb;
 640	struct rs_msg *msg;
 641	int send_sllao = dev->addr_len;
 642	int optlen = 0;
 643
 644#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
 645	/*
 646	 * According to section 2.2 of RFC 4429, we must not
 647	 * send router solicitations with a sllao from
 648	 * optimistic addresses, but we may send the solicitation
 649	 * if we don't include the sllao.  So here we check
 650	 * if our address is optimistic, and if so, we
 651	 * suppress the inclusion of the sllao.
 652	 */
 653	if (send_sllao) {
 654		struct inet6_ifaddr *ifp = ipv6_get_ifaddr(dev_net(dev), saddr,
 655							   dev, 1);
 656		if (ifp) {
 657			if (ifp->flags & IFA_F_OPTIMISTIC)  {
 658				send_sllao = 0;
 659			}
 660			in6_ifa_put(ifp);
 661		} else {
 662			send_sllao = 0;
 663		}
 664	}
 665#endif
 666	if (send_sllao)
 667		optlen += ndisc_opt_addr_space(dev, NDISC_ROUTER_SOLICITATION);
 668
 669	skb = ndisc_alloc_skb(dev, sizeof(*msg) + optlen);
 670	if (!skb)
 671		return;
 672
 673	msg = skb_put(skb, sizeof(*msg));
 674	*msg = (struct rs_msg) {
 675		.icmph = {
 676			.icmp6_type = NDISC_ROUTER_SOLICITATION,
 677		},
 678	};
 679
 680	if (send_sllao)
 681		ndisc_fill_addr_option(skb, ND_OPT_SOURCE_LL_ADDR,
 682				       dev->dev_addr,
 683				       NDISC_ROUTER_SOLICITATION);
 684
 685	ndisc_send_skb(skb, daddr, saddr);
 686}
 687
 688
 689static void ndisc_error_report(struct neighbour *neigh, struct sk_buff *skb)
 690{
 691	/*
 692	 *	"The sender MUST return an ICMP
 693	 *	 destination unreachable"
 694	 */
 695	dst_link_failure(skb);
 696	kfree_skb(skb);
 697}
 698
 699/* Called with locked neigh: either read or both */
 700
 701static void ndisc_solicit(struct neighbour *neigh, struct sk_buff *skb)
 702{
 703	struct in6_addr *saddr = NULL;
 704	struct in6_addr mcaddr;
 705	struct net_device *dev = neigh->dev;
 706	struct in6_addr *target = (struct in6_addr *)&neigh->primary_key;
 707	int probes = atomic_read(&neigh->probes);
 708
 709	if (skb && ipv6_chk_addr_and_flags(dev_net(dev), &ipv6_hdr(skb)->saddr,
 710					   dev, false, 1,
 711					   IFA_F_TENTATIVE|IFA_F_OPTIMISTIC))
 712		saddr = &ipv6_hdr(skb)->saddr;
 713	probes -= NEIGH_VAR(neigh->parms, UCAST_PROBES);
 714	if (probes < 0) {
 715		if (!(neigh->nud_state & NUD_VALID)) {
 716			ND_PRINTK(1, dbg,
 717				  "%s: trying to ucast probe in NUD_INVALID: %pI6\n",
 718				  __func__, target);
 719		}
 720		ndisc_send_ns(dev, target, target, saddr, 0);
 721	} else if ((probes -= NEIGH_VAR(neigh->parms, APP_PROBES)) < 0) {
 722		neigh_app_ns(neigh);
 723	} else {
 724		addrconf_addr_solict_mult(target, &mcaddr);
 725		ndisc_send_ns(dev, target, &mcaddr, saddr, 0);
 726	}
 727}
 728
 729static int pndisc_is_router(const void *pkey,
 730			    struct net_device *dev)
 731{
 732	struct pneigh_entry *n;
 733	int ret = -1;
 734
 735	read_lock_bh(&nd_tbl.lock);
 736	n = __pneigh_lookup(&nd_tbl, dev_net(dev), pkey, dev);
 737	if (n)
 738		ret = !!(n->flags & NTF_ROUTER);
 739	read_unlock_bh(&nd_tbl.lock);
 740
 741	return ret;
 742}
 743
 744void ndisc_update(const struct net_device *dev, struct neighbour *neigh,
 745		  const u8 *lladdr, u8 new, u32 flags, u8 icmp6_type,
 746		  struct ndisc_options *ndopts)
 747{
 748	neigh_update(neigh, lladdr, new, flags, 0);
 749	/* report ndisc ops about neighbour update */
 750	ndisc_ops_update(dev, neigh, flags, icmp6_type, ndopts);
 751}
 752
 753static void ndisc_recv_ns(struct sk_buff *skb)
 754{
 755	struct nd_msg *msg = (struct nd_msg *)skb_transport_header(skb);
 756	const struct in6_addr *saddr = &ipv6_hdr(skb)->saddr;
 757	const struct in6_addr *daddr = &ipv6_hdr(skb)->daddr;
 758	u8 *lladdr = NULL;
 759	u32 ndoptlen = skb_tail_pointer(skb) - (skb_transport_header(skb) +
 760				    offsetof(struct nd_msg, opt));
 761	struct ndisc_options ndopts;
 762	struct net_device *dev = skb->dev;
 763	struct inet6_ifaddr *ifp;
 764	struct inet6_dev *idev = NULL;
 765	struct neighbour *neigh;
 766	int dad = ipv6_addr_any(saddr);
 767	bool inc;
 768	int is_router = -1;
 769	u64 nonce = 0;
 770
 771	if (skb->len < sizeof(struct nd_msg)) {
 772		ND_PRINTK(2, warn, "NS: packet too short\n");
 773		return;
 774	}
 775
 776	if (ipv6_addr_is_multicast(&msg->target)) {
 777		ND_PRINTK(2, warn, "NS: multicast target address\n");
 778		return;
 779	}
 780
 781	/*
 782	 * RFC2461 7.1.1:
 783	 * DAD has to be destined for solicited node multicast address.
 784	 */
 785	if (dad && !ipv6_addr_is_solict_mult(daddr)) {
 786		ND_PRINTK(2, warn, "NS: bad DAD packet (wrong destination)\n");
 787		return;
 788	}
 789
 790	if (!ndisc_parse_options(dev, msg->opt, ndoptlen, &ndopts)) {
 791		ND_PRINTK(2, warn, "NS: invalid ND options\n");
 792		return;
 793	}
 794
 795	if (ndopts.nd_opts_src_lladdr) {
 796		lladdr = ndisc_opt_addr_data(ndopts.nd_opts_src_lladdr, dev);
 797		if (!lladdr) {
 798			ND_PRINTK(2, warn,
 799				  "NS: invalid link-layer address length\n");
 800			return;
 801		}
 802
 803		/* RFC2461 7.1.1:
 804		 *	If the IP source address is the unspecified address,
 805		 *	there MUST NOT be source link-layer address option
 806		 *	in the message.
 807		 */
 808		if (dad) {
 809			ND_PRINTK(2, warn,
 810				  "NS: bad DAD packet (link-layer address option)\n");
 811			return;
 812		}
 813	}
 814	if (ndopts.nd_opts_nonce)
 815		memcpy(&nonce, (u8 *)(ndopts.nd_opts_nonce + 1), 6);
 816
 817	inc = ipv6_addr_is_multicast(daddr);
 818
 819	ifp = ipv6_get_ifaddr(dev_net(dev), &msg->target, dev, 1);
 820	if (ifp) {
 821have_ifp:
 822		if (ifp->flags & (IFA_F_TENTATIVE|IFA_F_OPTIMISTIC)) {
 823			if (dad) {
 824				if (nonce != 0 && ifp->dad_nonce == nonce) {
 825					u8 *np = (u8 *)&nonce;
 826					/* Matching nonce if looped back */
 827					ND_PRINTK(2, notice,
 828						  "%s: IPv6 DAD loopback for address %pI6c nonce %pM ignored\n",
 829						  ifp->idev->dev->name,
 830						  &ifp->addr, np);
 831					goto out;
 832				}
 833				/*
 834				 * We are colliding with another node
 835				 * who is doing DAD
 836				 * so fail our DAD process
 837				 */
 838				addrconf_dad_failure(skb, ifp);
 839				return;
 840			} else {
 841				/*
 842				 * This is not a dad solicitation.
 843				 * If we are an optimistic node,
 844				 * we should respond.
 845				 * Otherwise, we should ignore it.
 846				 */
 847				if (!(ifp->flags & IFA_F_OPTIMISTIC))
 848					goto out;
 849			}
 850		}
 851
 852		idev = ifp->idev;
 853	} else {
 854		struct net *net = dev_net(dev);
 855
 856		/* perhaps an address on the master device */
 857		if (netif_is_l3_slave(dev)) {
 858			struct net_device *mdev;
 859
 860			mdev = netdev_master_upper_dev_get_rcu(dev);
 861			if (mdev) {
 862				ifp = ipv6_get_ifaddr(net, &msg->target, mdev, 1);
 863				if (ifp)
 864					goto have_ifp;
 865			}
 866		}
 867
 868		idev = in6_dev_get(dev);
 869		if (!idev) {
 870			/* XXX: count this drop? */
 871			return;
 872		}
 873
 874		if (ipv6_chk_acast_addr(net, dev, &msg->target) ||
 875		    (idev->cnf.forwarding &&
 876		     (net->ipv6.devconf_all->proxy_ndp || idev->cnf.proxy_ndp) &&
 877		     (is_router = pndisc_is_router(&msg->target, dev)) >= 0)) {
 878			if (!(NEIGH_CB(skb)->flags & LOCALLY_ENQUEUED) &&
 879			    skb->pkt_type != PACKET_HOST &&
 880			    inc &&
 881			    NEIGH_VAR(idev->nd_parms, PROXY_DELAY) != 0) {
 882				/*
 883				 * for anycast or proxy,
 884				 * sender should delay its response
 885				 * by a random time between 0 and
 886				 * MAX_ANYCAST_DELAY_TIME seconds.
 887				 * (RFC2461) -- yoshfuji
 888				 */
 889				struct sk_buff *n = skb_clone(skb, GFP_ATOMIC);
 890				if (n)
 891					pneigh_enqueue(&nd_tbl, idev->nd_parms, n);
 892				goto out;
 893			}
 894		} else
 895			goto out;
 896	}
 897
 898	if (is_router < 0)
 899		is_router = idev->cnf.forwarding;
 900
 901	if (dad) {
 902		ndisc_send_na(dev, &in6addr_linklocal_allnodes, &msg->target,
 903			      !!is_router, false, (ifp != NULL), true);
 904		goto out;
 905	}
 906
 907	if (inc)
 908		NEIGH_CACHE_STAT_INC(&nd_tbl, rcv_probes_mcast);
 909	else
 910		NEIGH_CACHE_STAT_INC(&nd_tbl, rcv_probes_ucast);
 911
 912	/*
 913	 *	update / create cache entry
 914	 *	for the source address
 915	 */
 916	neigh = __neigh_lookup(&nd_tbl, saddr, dev,
 917			       !inc || lladdr || !dev->addr_len);
 918	if (neigh)
 919		ndisc_update(dev, neigh, lladdr, NUD_STALE,
 920			     NEIGH_UPDATE_F_WEAK_OVERRIDE|
 921			     NEIGH_UPDATE_F_OVERRIDE,
 922			     NDISC_NEIGHBOUR_SOLICITATION, &ndopts);
 923	if (neigh || !dev->header_ops) {
 924		ndisc_send_na(dev, saddr, &msg->target, !!is_router,
 925			      true, (ifp != NULL && inc), inc);
 926		if (neigh)
 927			neigh_release(neigh);
 928	}
 929
 930out:
 931	if (ifp)
 932		in6_ifa_put(ifp);
 933	else
 934		in6_dev_put(idev);
 935}
 936
 937static void ndisc_recv_na(struct sk_buff *skb)
 938{
 939	struct nd_msg *msg = (struct nd_msg *)skb_transport_header(skb);
 940	struct in6_addr *saddr = &ipv6_hdr(skb)->saddr;
 941	const struct in6_addr *daddr = &ipv6_hdr(skb)->daddr;
 942	u8 *lladdr = NULL;
 943	u32 ndoptlen = skb_tail_pointer(skb) - (skb_transport_header(skb) +
 944				    offsetof(struct nd_msg, opt));
 945	struct ndisc_options ndopts;
 946	struct net_device *dev = skb->dev;
 947	struct inet6_dev *idev = __in6_dev_get(dev);
 948	struct inet6_ifaddr *ifp;
 949	struct neighbour *neigh;
 950
 951	if (skb->len < sizeof(struct nd_msg)) {
 952		ND_PRINTK(2, warn, "NA: packet too short\n");
 953		return;
 954	}
 955
 956	if (ipv6_addr_is_multicast(&msg->target)) {
 957		ND_PRINTK(2, warn, "NA: target address is multicast\n");
 958		return;
 959	}
 960
 961	if (ipv6_addr_is_multicast(daddr) &&
 962	    msg->icmph.icmp6_solicited) {
 963		ND_PRINTK(2, warn, "NA: solicited NA is multicasted\n");
 964		return;
 965	}
 966
 967	/* For some 802.11 wireless deployments (and possibly other networks),
 968	 * there will be a NA proxy and unsolicitd packets are attacks
 969	 * and thus should not be accepted.
 970	 */
 971	if (!msg->icmph.icmp6_solicited && idev &&
 972	    idev->cnf.drop_unsolicited_na)
 973		return;
 974
 975	if (!ndisc_parse_options(dev, msg->opt, ndoptlen, &ndopts)) {
 976		ND_PRINTK(2, warn, "NS: invalid ND option\n");
 977		return;
 978	}
 979	if (ndopts.nd_opts_tgt_lladdr) {
 980		lladdr = ndisc_opt_addr_data(ndopts.nd_opts_tgt_lladdr, dev);
 981		if (!lladdr) {
 982			ND_PRINTK(2, warn,
 983				  "NA: invalid link-layer address length\n");
 984			return;
 985		}
 986	}
 987	ifp = ipv6_get_ifaddr(dev_net(dev), &msg->target, dev, 1);
 988	if (ifp) {
 989		if (skb->pkt_type != PACKET_LOOPBACK
 990		    && (ifp->flags & IFA_F_TENTATIVE)) {
 991				addrconf_dad_failure(skb, ifp);
 992				return;
 993		}
 994		/* What should we make now? The advertisement
 995		   is invalid, but ndisc specs say nothing
 996		   about it. It could be misconfiguration, or
 997		   an smart proxy agent tries to help us :-)
 998
 999		   We should not print the error if NA has been
1000		   received from loopback - it is just our own
1001		   unsolicited advertisement.
1002		 */
1003		if (skb->pkt_type != PACKET_LOOPBACK)
1004			ND_PRINTK(1, warn,
1005				  "NA: %pM advertised our address %pI6c on %s!\n",
1006				  eth_hdr(skb)->h_source, &ifp->addr, ifp->idev->dev->name);
1007		in6_ifa_put(ifp);
1008		return;
1009	}
1010	neigh = neigh_lookup(&nd_tbl, &msg->target, dev);
1011
1012	if (neigh) {
1013		u8 old_flags = neigh->flags;
1014		struct net *net = dev_net(dev);
1015
1016		if (neigh->nud_state & NUD_FAILED)
1017			goto out;
1018
1019		/*
1020		 * Don't update the neighbor cache entry on a proxy NA from
1021		 * ourselves because either the proxied node is off link or it
1022		 * has already sent a NA to us.
1023		 */
1024		if (lladdr && !memcmp(lladdr, dev->dev_addr, dev->addr_len) &&
1025		    net->ipv6.devconf_all->forwarding && net->ipv6.devconf_all->proxy_ndp &&
1026		    pneigh_lookup(&nd_tbl, net, &msg->target, dev, 0)) {
1027			/* XXX: idev->cnf.proxy_ndp */
1028			goto out;
1029		}
1030
1031		ndisc_update(dev, neigh, lladdr,
1032			     msg->icmph.icmp6_solicited ? NUD_REACHABLE : NUD_STALE,
1033			     NEIGH_UPDATE_F_WEAK_OVERRIDE|
1034			     (msg->icmph.icmp6_override ? NEIGH_UPDATE_F_OVERRIDE : 0)|
1035			     NEIGH_UPDATE_F_OVERRIDE_ISROUTER|
1036			     (msg->icmph.icmp6_router ? NEIGH_UPDATE_F_ISROUTER : 0),
1037			     NDISC_NEIGHBOUR_ADVERTISEMENT, &ndopts);
1038
1039		if ((old_flags & ~neigh->flags) & NTF_ROUTER) {
1040			/*
1041			 * Change: router to host
1042			 */
1043			rt6_clean_tohost(dev_net(dev),  saddr);
1044		}
1045
1046out:
1047		neigh_release(neigh);
1048	}
1049}
1050
1051static void ndisc_recv_rs(struct sk_buff *skb)
1052{
1053	struct rs_msg *rs_msg = (struct rs_msg *)skb_transport_header(skb);
1054	unsigned long ndoptlen = skb->len - sizeof(*rs_msg);
1055	struct neighbour *neigh;
1056	struct inet6_dev *idev;
1057	const struct in6_addr *saddr = &ipv6_hdr(skb)->saddr;
1058	struct ndisc_options ndopts;
1059	u8 *lladdr = NULL;
1060
1061	if (skb->len < sizeof(*rs_msg))
1062		return;
1063
1064	idev = __in6_dev_get(skb->dev);
1065	if (!idev) {
1066		ND_PRINTK(1, err, "RS: can't find in6 device\n");
1067		return;
1068	}
1069
1070	/* Don't accept RS if we're not in router mode */
1071	if (!idev->cnf.forwarding)
1072		goto out;
1073
1074	/*
1075	 * Don't update NCE if src = ::;
1076	 * this implies that the source node has no ip address assigned yet.
1077	 */
1078	if (ipv6_addr_any(saddr))
1079		goto out;
1080
1081	/* Parse ND options */
1082	if (!ndisc_parse_options(skb->dev, rs_msg->opt, ndoptlen, &ndopts)) {
1083		ND_PRINTK(2, notice, "NS: invalid ND option, ignored\n");
1084		goto out;
1085	}
1086
1087	if (ndopts.nd_opts_src_lladdr) {
1088		lladdr = ndisc_opt_addr_data(ndopts.nd_opts_src_lladdr,
1089					     skb->dev);
1090		if (!lladdr)
1091			goto out;
1092	}
1093
1094	neigh = __neigh_lookup(&nd_tbl, saddr, skb->dev, 1);
1095	if (neigh) {
1096		ndisc_update(skb->dev, neigh, lladdr, NUD_STALE,
1097			     NEIGH_UPDATE_F_WEAK_OVERRIDE|
1098			     NEIGH_UPDATE_F_OVERRIDE|
1099			     NEIGH_UPDATE_F_OVERRIDE_ISROUTER,
1100			     NDISC_ROUTER_SOLICITATION, &ndopts);
1101		neigh_release(neigh);
1102	}
1103out:
1104	return;
1105}
1106
1107static void ndisc_ra_useropt(struct sk_buff *ra, struct nd_opt_hdr *opt)
1108{
1109	struct icmp6hdr *icmp6h = (struct icmp6hdr *)skb_transport_header(ra);
1110	struct sk_buff *skb;
1111	struct nlmsghdr *nlh;
1112	struct nduseroptmsg *ndmsg;
1113	struct net *net = dev_net(ra->dev);
1114	int err;
1115	int base_size = NLMSG_ALIGN(sizeof(struct nduseroptmsg)
1116				    + (opt->nd_opt_len << 3));
1117	size_t msg_size = base_size + nla_total_size(sizeof(struct in6_addr));
1118
1119	skb = nlmsg_new(msg_size, GFP_ATOMIC);
1120	if (!skb) {
1121		err = -ENOBUFS;
1122		goto errout;
1123	}
1124
1125	nlh = nlmsg_put(skb, 0, 0, RTM_NEWNDUSEROPT, base_size, 0);
1126	if (!nlh) {
1127		goto nla_put_failure;
1128	}
1129
1130	ndmsg = nlmsg_data(nlh);
1131	ndmsg->nduseropt_family = AF_INET6;
1132	ndmsg->nduseropt_ifindex = ra->dev->ifindex;
1133	ndmsg->nduseropt_icmp_type = icmp6h->icmp6_type;
1134	ndmsg->nduseropt_icmp_code = icmp6h->icmp6_code;
1135	ndmsg->nduseropt_opts_len = opt->nd_opt_len << 3;
1136
1137	memcpy(ndmsg + 1, opt, opt->nd_opt_len << 3);
1138
1139	if (nla_put_in6_addr(skb, NDUSEROPT_SRCADDR, &ipv6_hdr(ra)->saddr))
1140		goto nla_put_failure;
1141	nlmsg_end(skb, nlh);
1142
1143	rtnl_notify(skb, net, 0, RTNLGRP_ND_USEROPT, NULL, GFP_ATOMIC);
1144	return;
1145
1146nla_put_failure:
1147	nlmsg_free(skb);
1148	err = -EMSGSIZE;
1149errout:
1150	rtnl_set_sk_err(net, RTNLGRP_ND_USEROPT, err);
1151}
1152
1153static void ndisc_router_discovery(struct sk_buff *skb)
1154{
1155	struct ra_msg *ra_msg = (struct ra_msg *)skb_transport_header(skb);
1156	struct neighbour *neigh = NULL;
1157	struct inet6_dev *in6_dev;
1158	struct rt6_info *rt = NULL;
 
 
1159	int lifetime;
1160	struct ndisc_options ndopts;
1161	int optlen;
1162	unsigned int pref = 0;
1163	__u32 old_if_flags;
1164	bool send_ifinfo_notify = false;
1165
1166	__u8 *opt = (__u8 *)(ra_msg + 1);
1167
1168	optlen = (skb_tail_pointer(skb) - skb_transport_header(skb)) -
1169		sizeof(struct ra_msg);
1170
1171	ND_PRINTK(2, info,
1172		  "RA: %s, dev: %s\n",
1173		  __func__, skb->dev->name);
1174	if (!(ipv6_addr_type(&ipv6_hdr(skb)->saddr) & IPV6_ADDR_LINKLOCAL)) {
1175		ND_PRINTK(2, warn, "RA: source address is not link-local\n");
1176		return;
1177	}
1178	if (optlen < 0) {
1179		ND_PRINTK(2, warn, "RA: packet too short\n");
1180		return;
1181	}
1182
1183#ifdef CONFIG_IPV6_NDISC_NODETYPE
1184	if (skb->ndisc_nodetype == NDISC_NODETYPE_HOST) {
1185		ND_PRINTK(2, warn, "RA: from host or unauthorized router\n");
1186		return;
1187	}
1188#endif
1189
1190	/*
1191	 *	set the RA_RECV flag in the interface
1192	 */
1193
1194	in6_dev = __in6_dev_get(skb->dev);
1195	if (!in6_dev) {
1196		ND_PRINTK(0, err, "RA: can't find inet6 device for %s\n",
1197			  skb->dev->name);
1198		return;
1199	}
1200
1201	if (!ndisc_parse_options(skb->dev, opt, optlen, &ndopts)) {
1202		ND_PRINTK(2, warn, "RA: invalid ND options\n");
1203		return;
1204	}
1205
1206	if (!ipv6_accept_ra(in6_dev)) {
1207		ND_PRINTK(2, info,
1208			  "RA: %s, did not accept ra for dev: %s\n",
1209			  __func__, skb->dev->name);
1210		goto skip_linkparms;
1211	}
1212
1213#ifdef CONFIG_IPV6_NDISC_NODETYPE
1214	/* skip link-specific parameters from interior routers */
1215	if (skb->ndisc_nodetype == NDISC_NODETYPE_NODEFAULT) {
1216		ND_PRINTK(2, info,
1217			  "RA: %s, nodetype is NODEFAULT, dev: %s\n",
1218			  __func__, skb->dev->name);
1219		goto skip_linkparms;
1220	}
1221#endif
1222
1223	if (in6_dev->if_flags & IF_RS_SENT) {
1224		/*
1225		 *	flag that an RA was received after an RS was sent
1226		 *	out on this interface.
1227		 */
1228		in6_dev->if_flags |= IF_RA_RCVD;
1229	}
1230
1231	/*
1232	 * Remember the managed/otherconf flags from most recently
1233	 * received RA message (RFC 2462) -- yoshfuji
1234	 */
1235	old_if_flags = in6_dev->if_flags;
1236	in6_dev->if_flags = (in6_dev->if_flags & ~(IF_RA_MANAGED |
1237				IF_RA_OTHERCONF)) |
1238				(ra_msg->icmph.icmp6_addrconf_managed ?
1239					IF_RA_MANAGED : 0) |
1240				(ra_msg->icmph.icmp6_addrconf_other ?
1241					IF_RA_OTHERCONF : 0);
1242
1243	if (old_if_flags != in6_dev->if_flags)
1244		send_ifinfo_notify = true;
1245
1246	if (!in6_dev->cnf.accept_ra_defrtr) {
1247		ND_PRINTK(2, info,
1248			  "RA: %s, defrtr is false for dev: %s\n",
1249			  __func__, skb->dev->name);
1250		goto skip_defrtr;
1251	}
1252
1253	/* Do not accept RA with source-addr found on local machine unless
1254	 * accept_ra_from_local is set to true.
1255	 */
 
1256	if (!in6_dev->cnf.accept_ra_from_local &&
1257	    ipv6_chk_addr(dev_net(in6_dev->dev), &ipv6_hdr(skb)->saddr,
1258			  in6_dev->dev, 0)) {
1259		ND_PRINTK(2, info,
1260			  "RA from local address detected on dev: %s: default router ignored\n",
1261			  skb->dev->name);
1262		goto skip_defrtr;
1263	}
1264
1265	lifetime = ntohs(ra_msg->icmph.icmp6_rt_lifetime);
1266
1267#ifdef CONFIG_IPV6_ROUTER_PREF
1268	pref = ra_msg->icmph.icmp6_router_pref;
1269	/* 10b is handled as if it were 00b (medium) */
1270	if (pref == ICMPV6_ROUTER_PREF_INVALID ||
1271	    !in6_dev->cnf.accept_ra_rtr_pref)
1272		pref = ICMPV6_ROUTER_PREF_MEDIUM;
1273#endif
1274
1275	rt = rt6_get_dflt_router(&ipv6_hdr(skb)->saddr, skb->dev);
1276
1277	if (rt) {
1278		neigh = dst_neigh_lookup(&rt->dst, &ipv6_hdr(skb)->saddr);
 
 
1279		if (!neigh) {
1280			ND_PRINTK(0, err,
1281				  "RA: %s got default router without neighbour\n",
1282				  __func__);
1283			ip6_rt_put(rt);
1284			return;
1285		}
1286	}
1287	if (rt && lifetime == 0) {
1288		ip6_del_rt(rt);
 
 
 
1289		rt = NULL;
1290	}
1291
1292	ND_PRINTK(3, info, "RA: rt: %p  lifetime: %d, for dev: %s\n",
1293		  rt, lifetime, skb->dev->name);
1294	if (!rt && lifetime) {
1295		ND_PRINTK(3, info, "RA: adding default router\n");
1296
1297		rt = rt6_add_dflt_router(&ipv6_hdr(skb)->saddr, skb->dev, pref);
 
1298		if (!rt) {
1299			ND_PRINTK(0, err,
1300				  "RA: %s failed to add default route\n",
1301				  __func__);
1302			return;
1303		}
1304
1305		neigh = dst_neigh_lookup(&rt->dst, &ipv6_hdr(skb)->saddr);
 
 
1306		if (!neigh) {
1307			ND_PRINTK(0, err,
1308				  "RA: %s got default router without neighbour\n",
1309				  __func__);
1310			ip6_rt_put(rt);
1311			return;
1312		}
1313		neigh->flags |= NTF_ROUTER;
1314	} else if (rt) {
1315		rt->rt6i_flags = (rt->rt6i_flags & ~RTF_PREF_MASK) | RTF_PREF(pref);
1316	}
1317
1318	if (rt)
1319		rt6_set_expires(rt, jiffies + (HZ * lifetime));
1320	if (in6_dev->cnf.accept_ra_min_hop_limit < 256 &&
1321	    ra_msg->icmph.icmp6_hop_limit) {
1322		if (in6_dev->cnf.accept_ra_min_hop_limit <= ra_msg->icmph.icmp6_hop_limit) {
1323			in6_dev->cnf.hop_limit = ra_msg->icmph.icmp6_hop_limit;
1324			if (rt)
1325				dst_metric_set(&rt->dst, RTAX_HOPLIMIT,
1326					       ra_msg->icmph.icmp6_hop_limit);
1327		} else {
1328			ND_PRINTK(2, warn, "RA: Got route advertisement with lower hop_limit than minimum\n");
1329		}
1330	}
1331
1332skip_defrtr:
1333
1334	/*
1335	 *	Update Reachable Time and Retrans Timer
1336	 */
1337
1338	if (in6_dev->nd_parms) {
1339		unsigned long rtime = ntohl(ra_msg->retrans_timer);
1340
1341		if (rtime && rtime/1000 < MAX_SCHEDULE_TIMEOUT/HZ) {
1342			rtime = (rtime*HZ)/1000;
1343			if (rtime < HZ/10)
1344				rtime = HZ/10;
1345			NEIGH_VAR_SET(in6_dev->nd_parms, RETRANS_TIME, rtime);
1346			in6_dev->tstamp = jiffies;
1347			send_ifinfo_notify = true;
1348		}
1349
1350		rtime = ntohl(ra_msg->reachable_time);
1351		if (rtime && rtime/1000 < MAX_SCHEDULE_TIMEOUT/(3*HZ)) {
1352			rtime = (rtime*HZ)/1000;
1353
1354			if (rtime < HZ/10)
1355				rtime = HZ/10;
1356
1357			if (rtime != NEIGH_VAR(in6_dev->nd_parms, BASE_REACHABLE_TIME)) {
1358				NEIGH_VAR_SET(in6_dev->nd_parms,
1359					      BASE_REACHABLE_TIME, rtime);
1360				NEIGH_VAR_SET(in6_dev->nd_parms,
1361					      GC_STALETIME, 3 * rtime);
1362				in6_dev->nd_parms->reachable_time = neigh_rand_reach_time(rtime);
1363				in6_dev->tstamp = jiffies;
1364				send_ifinfo_notify = true;
1365			}
1366		}
1367	}
1368
1369	/*
1370	 *	Send a notify if RA changed managed/otherconf flags or timer settings
1371	 */
1372	if (send_ifinfo_notify)
1373		inet6_ifinfo_notify(RTM_NEWLINK, in6_dev);
1374
1375skip_linkparms:
1376
1377	/*
1378	 *	Process options.
1379	 */
1380
1381	if (!neigh)
1382		neigh = __neigh_lookup(&nd_tbl, &ipv6_hdr(skb)->saddr,
1383				       skb->dev, 1);
1384	if (neigh) {
1385		u8 *lladdr = NULL;
1386		if (ndopts.nd_opts_src_lladdr) {
1387			lladdr = ndisc_opt_addr_data(ndopts.nd_opts_src_lladdr,
1388						     skb->dev);
1389			if (!lladdr) {
1390				ND_PRINTK(2, warn,
1391					  "RA: invalid link-layer address length\n");
1392				goto out;
1393			}
1394		}
1395		ndisc_update(skb->dev, neigh, lladdr, NUD_STALE,
1396			     NEIGH_UPDATE_F_WEAK_OVERRIDE|
1397			     NEIGH_UPDATE_F_OVERRIDE|
1398			     NEIGH_UPDATE_F_OVERRIDE_ISROUTER|
1399			     NEIGH_UPDATE_F_ISROUTER,
1400			     NDISC_ROUTER_ADVERTISEMENT, &ndopts);
1401	}
1402
1403	if (!ipv6_accept_ra(in6_dev)) {
1404		ND_PRINTK(2, info,
1405			  "RA: %s, accept_ra is false for dev: %s\n",
1406			  __func__, skb->dev->name);
1407		goto out;
1408	}
1409
1410#ifdef CONFIG_IPV6_ROUTE_INFO
1411	if (!in6_dev->cnf.accept_ra_from_local &&
1412	    ipv6_chk_addr(dev_net(in6_dev->dev), &ipv6_hdr(skb)->saddr,
1413			  in6_dev->dev, 0)) {
1414		ND_PRINTK(2, info,
1415			  "RA from local address detected on dev: %s: router info ignored.\n",
1416			  skb->dev->name);
1417		goto skip_routeinfo;
1418	}
1419
1420	if (in6_dev->cnf.accept_ra_rtr_pref && ndopts.nd_opts_ri) {
1421		struct nd_opt_hdr *p;
1422		for (p = ndopts.nd_opts_ri;
1423		     p;
1424		     p = ndisc_next_option(p, ndopts.nd_opts_ri_end)) {
1425			struct route_info *ri = (struct route_info *)p;
1426#ifdef CONFIG_IPV6_NDISC_NODETYPE
1427			if (skb->ndisc_nodetype == NDISC_NODETYPE_NODEFAULT &&
1428			    ri->prefix_len == 0)
1429				continue;
1430#endif
1431			if (ri->prefix_len == 0 &&
1432			    !in6_dev->cnf.accept_ra_defrtr)
1433				continue;
1434			if (ri->prefix_len < in6_dev->cnf.accept_ra_rt_info_min_plen)
1435				continue;
1436			if (ri->prefix_len > in6_dev->cnf.accept_ra_rt_info_max_plen)
1437				continue;
1438			rt6_route_rcv(skb->dev, (u8 *)p, (p->nd_opt_len) << 3,
1439				      &ipv6_hdr(skb)->saddr);
1440		}
1441	}
1442
1443skip_routeinfo:
1444#endif
1445
1446#ifdef CONFIG_IPV6_NDISC_NODETYPE
1447	/* skip link-specific ndopts from interior routers */
1448	if (skb->ndisc_nodetype == NDISC_NODETYPE_NODEFAULT) {
1449		ND_PRINTK(2, info,
1450			  "RA: %s, nodetype is NODEFAULT (interior routes), dev: %s\n",
1451			  __func__, skb->dev->name);
1452		goto out;
1453	}
1454#endif
1455
1456	if (in6_dev->cnf.accept_ra_pinfo && ndopts.nd_opts_pi) {
1457		struct nd_opt_hdr *p;
1458		for (p = ndopts.nd_opts_pi;
1459		     p;
1460		     p = ndisc_next_option(p, ndopts.nd_opts_pi_end)) {
1461			addrconf_prefix_rcv(skb->dev, (u8 *)p,
1462					    (p->nd_opt_len) << 3,
1463					    ndopts.nd_opts_src_lladdr != NULL);
1464		}
1465	}
1466
1467	if (ndopts.nd_opts_mtu && in6_dev->cnf.accept_ra_mtu) {
1468		__be32 n;
1469		u32 mtu;
1470
1471		memcpy(&n, ((u8 *)(ndopts.nd_opts_mtu+1))+2, sizeof(mtu));
1472		mtu = ntohl(n);
1473
1474		if (mtu < IPV6_MIN_MTU || mtu > skb->dev->mtu) {
1475			ND_PRINTK(2, warn, "RA: invalid mtu: %d\n", mtu);
1476		} else if (in6_dev->cnf.mtu6 != mtu) {
1477			in6_dev->cnf.mtu6 = mtu;
1478
1479			if (rt)
1480				dst_metric_set(&rt->dst, RTAX_MTU, mtu);
1481
1482			rt6_mtu_change(skb->dev, mtu);
1483		}
1484	}
1485
1486	if (ndopts.nd_useropts) {
1487		struct nd_opt_hdr *p;
1488		for (p = ndopts.nd_useropts;
1489		     p;
1490		     p = ndisc_next_useropt(skb->dev, p,
1491					    ndopts.nd_useropts_end)) {
1492			ndisc_ra_useropt(skb, p);
1493		}
1494	}
1495
1496	if (ndopts.nd_opts_tgt_lladdr || ndopts.nd_opts_rh) {
1497		ND_PRINTK(2, warn, "RA: invalid RA options\n");
1498	}
1499out:
1500	ip6_rt_put(rt);
1501	if (neigh)
1502		neigh_release(neigh);
1503}
1504
1505static void ndisc_redirect_rcv(struct sk_buff *skb)
1506{
1507	u8 *hdr;
1508	struct ndisc_options ndopts;
1509	struct rd_msg *msg = (struct rd_msg *)skb_transport_header(skb);
1510	u32 ndoptlen = skb_tail_pointer(skb) - (skb_transport_header(skb) +
1511				    offsetof(struct rd_msg, opt));
1512
1513#ifdef CONFIG_IPV6_NDISC_NODETYPE
1514	switch (skb->ndisc_nodetype) {
1515	case NDISC_NODETYPE_HOST:
1516	case NDISC_NODETYPE_NODEFAULT:
1517		ND_PRINTK(2, warn,
1518			  "Redirect: from host or unauthorized router\n");
1519		return;
1520	}
1521#endif
1522
1523	if (!(ipv6_addr_type(&ipv6_hdr(skb)->saddr) & IPV6_ADDR_LINKLOCAL)) {
1524		ND_PRINTK(2, warn,
1525			  "Redirect: source address is not link-local\n");
1526		return;
1527	}
1528
1529	if (!ndisc_parse_options(skb->dev, msg->opt, ndoptlen, &ndopts))
1530		return;
1531
1532	if (!ndopts.nd_opts_rh) {
1533		ip6_redirect_no_header(skb, dev_net(skb->dev),
1534					skb->dev->ifindex, 0);
1535		return;
1536	}
1537
1538	hdr = (u8 *)ndopts.nd_opts_rh;
1539	hdr += 8;
1540	if (!pskb_pull(skb, hdr - skb_transport_header(skb)))
1541		return;
1542
1543	icmpv6_notify(skb, NDISC_REDIRECT, 0, 0);
1544}
1545
1546static void ndisc_fill_redirect_hdr_option(struct sk_buff *skb,
1547					   struct sk_buff *orig_skb,
1548					   int rd_len)
1549{
1550	u8 *opt = skb_put(skb, rd_len);
1551
1552	memset(opt, 0, 8);
1553	*(opt++) = ND_OPT_REDIRECT_HDR;
1554	*(opt++) = (rd_len >> 3);
1555	opt += 6;
1556
1557	skb_copy_bits(orig_skb, skb_network_offset(orig_skb), opt,
1558		      rd_len - 8);
1559}
1560
1561void ndisc_send_redirect(struct sk_buff *skb, const struct in6_addr *target)
1562{
1563	struct net_device *dev = skb->dev;
1564	struct net *net = dev_net(dev);
1565	struct sock *sk = net->ipv6.ndisc_sk;
1566	int optlen = 0;
1567	struct inet_peer *peer;
1568	struct sk_buff *buff;
1569	struct rd_msg *msg;
1570	struct in6_addr saddr_buf;
1571	struct rt6_info *rt;
1572	struct dst_entry *dst;
1573	struct flowi6 fl6;
1574	int rd_len;
1575	u8 ha_buf[MAX_ADDR_LEN], *ha = NULL,
1576	   ops_data_buf[NDISC_OPS_REDIRECT_DATA_SPACE], *ops_data = NULL;
1577	bool ret;
1578
 
 
 
 
 
 
1579	if (ipv6_get_lladdr(dev, &saddr_buf, IFA_F_TENTATIVE)) {
1580		ND_PRINTK(2, warn, "Redirect: no link-local address on %s\n",
1581			  dev->name);
1582		return;
1583	}
1584
1585	if (!ipv6_addr_equal(&ipv6_hdr(skb)->daddr, target) &&
1586	    ipv6_addr_type(target) != (IPV6_ADDR_UNICAST|IPV6_ADDR_LINKLOCAL)) {
1587		ND_PRINTK(2, warn,
1588			  "Redirect: target address is not link-local unicast\n");
1589		return;
1590	}
1591
1592	icmpv6_flow_init(sk, &fl6, NDISC_REDIRECT,
1593			 &saddr_buf, &ipv6_hdr(skb)->saddr, dev->ifindex);
1594
1595	dst = ip6_route_output(net, NULL, &fl6);
1596	if (dst->error) {
1597		dst_release(dst);
1598		return;
1599	}
1600	dst = xfrm_lookup(net, dst, flowi6_to_flowi(&fl6), NULL, 0);
1601	if (IS_ERR(dst))
1602		return;
1603
1604	rt = (struct rt6_info *) dst;
1605
1606	if (rt->rt6i_flags & RTF_GATEWAY) {
1607		ND_PRINTK(2, warn,
1608			  "Redirect: destination is not a neighbour\n");
1609		goto release;
1610	}
1611	peer = inet_getpeer_v6(net->ipv6.peers, &ipv6_hdr(skb)->saddr, 1);
1612	ret = inet_peer_xrlim_allow(peer, 1*HZ);
1613	if (peer)
1614		inet_putpeer(peer);
1615	if (!ret)
1616		goto release;
1617
1618	if (dev->addr_len) {
1619		struct neighbour *neigh = dst_neigh_lookup(skb_dst(skb), target);
1620		if (!neigh) {
1621			ND_PRINTK(2, warn,
1622				  "Redirect: no neigh for target address\n");
1623			goto release;
1624		}
1625
1626		read_lock_bh(&neigh->lock);
1627		if (neigh->nud_state & NUD_VALID) {
1628			memcpy(ha_buf, neigh->ha, dev->addr_len);
1629			read_unlock_bh(&neigh->lock);
1630			ha = ha_buf;
1631			optlen += ndisc_redirect_opt_addr_space(dev, neigh,
1632								ops_data_buf,
1633								&ops_data);
1634		} else
1635			read_unlock_bh(&neigh->lock);
1636
1637		neigh_release(neigh);
1638	}
1639
1640	rd_len = min_t(unsigned int,
1641		       IPV6_MIN_MTU - sizeof(struct ipv6hdr) - sizeof(*msg) - optlen,
1642		       skb->len + 8);
1643	rd_len &= ~0x7;
1644	optlen += rd_len;
1645
1646	buff = ndisc_alloc_skb(dev, sizeof(*msg) + optlen);
1647	if (!buff)
1648		goto release;
1649
1650	msg = skb_put(buff, sizeof(*msg));
1651	*msg = (struct rd_msg) {
1652		.icmph = {
1653			.icmp6_type = NDISC_REDIRECT,
1654		},
1655		.target = *target,
1656		.dest = ipv6_hdr(skb)->daddr,
1657	};
1658
1659	/*
1660	 *	include target_address option
1661	 */
1662
1663	if (ha)
1664		ndisc_fill_redirect_addr_option(buff, ha, ops_data);
1665
1666	/*
1667	 *	build redirect option and copy skb over to the new packet.
1668	 */
1669
1670	if (rd_len)
1671		ndisc_fill_redirect_hdr_option(buff, skb, rd_len);
1672
1673	skb_dst_set(buff, dst);
1674	ndisc_send_skb(buff, &ipv6_hdr(skb)->saddr, &saddr_buf);
1675	return;
1676
1677release:
1678	dst_release(dst);
1679}
1680
1681static void pndisc_redo(struct sk_buff *skb)
1682{
1683	ndisc_recv_ns(skb);
1684	kfree_skb(skb);
1685}
1686
 
 
 
 
 
1687static bool ndisc_suppress_frag_ndisc(struct sk_buff *skb)
1688{
1689	struct inet6_dev *idev = __in6_dev_get(skb->dev);
1690
1691	if (!idev)
1692		return true;
1693	if (IP6CB(skb)->flags & IP6SKB_FRAGMENTED &&
1694	    idev->cnf.suppress_frag_ndisc) {
1695		net_warn_ratelimited("Received fragmented ndisc packet. Carefully consider disabling suppress_frag_ndisc.\n");
1696		return true;
1697	}
1698	return false;
1699}
1700
1701int ndisc_rcv(struct sk_buff *skb)
1702{
1703	struct nd_msg *msg;
1704
1705	if (ndisc_suppress_frag_ndisc(skb))
1706		return 0;
1707
1708	if (skb_linearize(skb))
1709		return 0;
1710
1711	msg = (struct nd_msg *)skb_transport_header(skb);
1712
1713	__skb_push(skb, skb->data - skb_transport_header(skb));
1714
1715	if (ipv6_hdr(skb)->hop_limit != 255) {
1716		ND_PRINTK(2, warn, "NDISC: invalid hop-limit: %d\n",
1717			  ipv6_hdr(skb)->hop_limit);
1718		return 0;
1719	}
1720
1721	if (msg->icmph.icmp6_code != 0) {
1722		ND_PRINTK(2, warn, "NDISC: invalid ICMPv6 code: %d\n",
1723			  msg->icmph.icmp6_code);
1724		return 0;
1725	}
1726
1727	memset(NEIGH_CB(skb), 0, sizeof(struct neighbour_cb));
1728
1729	switch (msg->icmph.icmp6_type) {
1730	case NDISC_NEIGHBOUR_SOLICITATION:
 
1731		ndisc_recv_ns(skb);
1732		break;
1733
1734	case NDISC_NEIGHBOUR_ADVERTISEMENT:
1735		ndisc_recv_na(skb);
1736		break;
1737
1738	case NDISC_ROUTER_SOLICITATION:
1739		ndisc_recv_rs(skb);
1740		break;
1741
1742	case NDISC_ROUTER_ADVERTISEMENT:
1743		ndisc_router_discovery(skb);
1744		break;
1745
1746	case NDISC_REDIRECT:
1747		ndisc_redirect_rcv(skb);
1748		break;
1749	}
1750
1751	return 0;
1752}
1753
1754static int ndisc_netdev_event(struct notifier_block *this, unsigned long event, void *ptr)
1755{
1756	struct net_device *dev = netdev_notifier_info_to_dev(ptr);
1757	struct netdev_notifier_change_info *change_info;
1758	struct net *net = dev_net(dev);
1759	struct inet6_dev *idev;
1760
1761	switch (event) {
1762	case NETDEV_CHANGEADDR:
1763		neigh_changeaddr(&nd_tbl, dev);
1764		fib6_run_gc(0, net, false);
1765		/* fallthrough */
1766	case NETDEV_UP:
1767		idev = in6_dev_get(dev);
1768		if (!idev)
1769			break;
1770		if (idev->cnf.ndisc_notify ||
1771		    net->ipv6.devconf_all->ndisc_notify)
1772			ndisc_send_unsol_na(dev);
1773		in6_dev_put(idev);
1774		break;
1775	case NETDEV_CHANGE:
1776		change_info = ptr;
1777		if (change_info->flags_changed & IFF_NOARP)
1778			neigh_changeaddr(&nd_tbl, dev);
 
 
1779		break;
1780	case NETDEV_DOWN:
1781		neigh_ifdown(&nd_tbl, dev);
1782		fib6_run_gc(0, net, false);
1783		break;
1784	case NETDEV_NOTIFY_PEERS:
1785		ndisc_send_unsol_na(dev);
1786		break;
1787	default:
1788		break;
1789	}
1790
1791	return NOTIFY_DONE;
1792}
1793
1794static struct notifier_block ndisc_netdev_notifier = {
1795	.notifier_call = ndisc_netdev_event,
1796	.priority = ADDRCONF_NOTIFY_PRIORITY - 5,
1797};
1798
1799#ifdef CONFIG_SYSCTL
1800static void ndisc_warn_deprecated_sysctl(struct ctl_table *ctl,
1801					 const char *func, const char *dev_name)
1802{
1803	static char warncomm[TASK_COMM_LEN];
1804	static int warned;
1805	if (strcmp(warncomm, current->comm) && warned < 5) {
1806		strcpy(warncomm, current->comm);
1807		pr_warn("process `%s' is using deprecated sysctl (%s) net.ipv6.neigh.%s.%s - use net.ipv6.neigh.%s.%s_ms instead\n",
1808			warncomm, func,
1809			dev_name, ctl->procname,
1810			dev_name, ctl->procname);
1811		warned++;
1812	}
1813}
1814
1815int ndisc_ifinfo_sysctl_change(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos)
 
1816{
1817	struct net_device *dev = ctl->extra1;
1818	struct inet6_dev *idev;
1819	int ret;
1820
1821	if ((strcmp(ctl->procname, "retrans_time") == 0) ||
1822	    (strcmp(ctl->procname, "base_reachable_time") == 0))
1823		ndisc_warn_deprecated_sysctl(ctl, "syscall", dev ? dev->name : "default");
1824
1825	if (strcmp(ctl->procname, "retrans_time") == 0)
1826		ret = neigh_proc_dointvec(ctl, write, buffer, lenp, ppos);
1827
1828	else if (strcmp(ctl->procname, "base_reachable_time") == 0)
1829		ret = neigh_proc_dointvec_jiffies(ctl, write,
1830						  buffer, lenp, ppos);
1831
1832	else if ((strcmp(ctl->procname, "retrans_time_ms") == 0) ||
1833		 (strcmp(ctl->procname, "base_reachable_time_ms") == 0))
1834		ret = neigh_proc_dointvec_ms_jiffies(ctl, write,
1835						     buffer, lenp, ppos);
1836	else
1837		ret = -1;
1838
1839	if (write && ret == 0 && dev && (idev = in6_dev_get(dev)) != NULL) {
1840		if (ctl->data == &NEIGH_VAR(idev->nd_parms, BASE_REACHABLE_TIME))
1841			idev->nd_parms->reachable_time =
1842					neigh_rand_reach_time(NEIGH_VAR(idev->nd_parms, BASE_REACHABLE_TIME));
1843		idev->tstamp = jiffies;
1844		inet6_ifinfo_notify(RTM_NEWLINK, idev);
1845		in6_dev_put(idev);
1846	}
1847	return ret;
1848}
1849
1850
1851#endif
1852
1853static int __net_init ndisc_net_init(struct net *net)
1854{
1855	struct ipv6_pinfo *np;
1856	struct sock *sk;
1857	int err;
1858
1859	err = inet_ctl_sock_create(&sk, PF_INET6,
1860				   SOCK_RAW, IPPROTO_ICMPV6, net);
1861	if (err < 0) {
1862		ND_PRINTK(0, err,
1863			  "NDISC: Failed to initialize the control socket (err %d)\n",
1864			  err);
1865		return err;
1866	}
1867
1868	net->ipv6.ndisc_sk = sk;
1869
1870	np = inet6_sk(sk);
1871	np->hop_limit = 255;
1872	/* Do not loopback ndisc messages */
1873	np->mc_loop = 0;
1874
1875	return 0;
1876}
1877
1878static void __net_exit ndisc_net_exit(struct net *net)
1879{
1880	inet_ctl_sock_destroy(net->ipv6.ndisc_sk);
1881}
1882
1883static struct pernet_operations ndisc_net_ops = {
1884	.init = ndisc_net_init,
1885	.exit = ndisc_net_exit,
1886};
1887
1888int __init ndisc_init(void)
1889{
1890	int err;
1891
1892	err = register_pernet_subsys(&ndisc_net_ops);
1893	if (err)
1894		return err;
1895	/*
1896	 * Initialize the neighbour table
1897	 */
1898	neigh_table_init(NEIGH_ND_TABLE, &nd_tbl);
1899
1900#ifdef CONFIG_SYSCTL
1901	err = neigh_sysctl_register(NULL, &nd_tbl.parms,
1902				    ndisc_ifinfo_sysctl_change);
1903	if (err)
1904		goto out_unregister_pernet;
1905out:
1906#endif
1907	return err;
1908
1909#ifdef CONFIG_SYSCTL
1910out_unregister_pernet:
1911	unregister_pernet_subsys(&ndisc_net_ops);
1912	goto out;
1913#endif
1914}
1915
1916int __init ndisc_late_init(void)
1917{
1918	return register_netdevice_notifier(&ndisc_netdev_notifier);
1919}
1920
1921void ndisc_late_cleanup(void)
1922{
1923	unregister_netdevice_notifier(&ndisc_netdev_notifier);
1924}
1925
1926void ndisc_cleanup(void)
1927{
1928#ifdef CONFIG_SYSCTL
1929	neigh_sysctl_unregister(&nd_tbl.parms);
1930#endif
1931	neigh_table_clear(NEIGH_ND_TABLE, &nd_tbl);
1932	unregister_pernet_subsys(&ndisc_net_ops);
1933}