2019-05-27 06:55:01 +00:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-or-later
|
2005-04-16 22:20:36 +00:00
|
|
|
/*
|
|
|
|
* Neighbour Discovery for IPv6
|
2007-02-09 14:24:49 +00:00
|
|
|
* Linux INET6 implementation
|
2005-04-16 22:20:36 +00:00
|
|
|
*
|
|
|
|
* Authors:
|
2007-02-09 14:24:49 +00:00
|
|
|
* Pedro Roque <roque@di.fc.ul.pt>
|
2005-04-16 22:20:36 +00:00
|
|
|
* Mike Shaver <shaver@ingenia.com>
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Changes:
|
|
|
|
*
|
2012-04-06 05:50:58 +00:00
|
|
|
* Alexey I. Froloff : RFC6106 (DNSSL) support
|
2007-10-11 04:22:05 +00:00
|
|
|
* Pierre Ynard : export userland ND options
|
|
|
|
* through netlink (RDNSS support)
|
2005-04-16 22:20:36 +00:00
|
|
|
* Lars Fenneberg : fixed MTU setting on receipt
|
|
|
|
* of an RA.
|
|
|
|
* Janos Farkas : kmalloc failure checks
|
|
|
|
* Alexey Kuznetsov : state machine reworked
|
|
|
|
* and moved to net/core.
|
|
|
|
* Pekka Savola : RFC2461 validation
|
|
|
|
* YOSHIFUJI Hideaki @USAGI : Verify ND options properly
|
|
|
|
*/
|
|
|
|
|
2012-05-16 19:28:38 +00:00
|
|
|
#define pr_fmt(fmt) "ICMPv6: " fmt
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/errno.h>
|
|
|
|
#include <linux/types.h>
|
|
|
|
#include <linux/socket.h>
|
|
|
|
#include <linux/sockios.h>
|
|
|
|
#include <linux/sched.h>
|
|
|
|
#include <linux/net.h>
|
|
|
|
#include <linux/in6.h>
|
|
|
|
#include <linux/route.h>
|
|
|
|
#include <linux/init.h>
|
|
|
|
#include <linux/rcupdate.h>
|
include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h
percpu.h is included by sched.h and module.h and thus ends up being
included when building most .c files. percpu.h includes slab.h which
in turn includes gfp.h making everything defined by the two files
universally available and complicating inclusion dependencies.
percpu.h -> slab.h dependency is about to be removed. Prepare for
this change by updating users of gfp and slab facilities include those
headers directly instead of assuming availability. As this conversion
needs to touch large number of source files, the following script is
used as the basis of conversion.
http://userweb.kernel.org/~tj/misc/slabh-sweep.py
The script does the followings.
* Scan files for gfp and slab usages and update includes such that
only the necessary includes are there. ie. if only gfp is used,
gfp.h, if slab is used, slab.h.
* When the script inserts a new include, it looks at the include
blocks and try to put the new include such that its order conforms
to its surrounding. It's put in the include block which contains
core kernel includes, in the same order that the rest are ordered -
alphabetical, Christmas tree, rev-Xmas-tree or at the end if there
doesn't seem to be any matching order.
* If the script can't find a place to put a new include (mostly
because the file doesn't have fitting include block), it prints out
an error message indicating which .h file needs to be added to the
file.
The conversion was done in the following steps.
1. The initial automatic conversion of all .c files updated slightly
over 4000 files, deleting around 700 includes and adding ~480 gfp.h
and ~3000 slab.h inclusions. The script emitted errors for ~400
files.
2. Each error was manually checked. Some didn't need the inclusion,
some needed manual addition while adding it to implementation .h or
embedding .c file was more appropriate for others. This step added
inclusions to around 150 files.
3. The script was run again and the output was compared to the edits
from #2 to make sure no file was left behind.
4. Several build tests were done and a couple of problems were fixed.
e.g. lib/decompress_*.c used malloc/free() wrappers around slab
APIs requiring slab.h to be added manually.
5. The script was run on all .h files but without automatically
editing them as sprinkling gfp.h and slab.h inclusions around .h
files could easily lead to inclusion dependency hell. Most gfp.h
inclusion directives were ignored as stuff from gfp.h was usually
wildly available and often used in preprocessor macros. Each
slab.h inclusion directive was examined and added manually as
necessary.
6. percpu.h was updated not to include slab.h.
7. Build test were done on the following configurations and failures
were fixed. CONFIG_GCOV_KERNEL was turned off for all tests (as my
distributed build env didn't work with gcov compiles) and a few
more options had to be turned off depending on archs to make things
build (like ipr on powerpc/64 which failed due to missing writeq).
* x86 and x86_64 UP and SMP allmodconfig and a custom test config.
* powerpc and powerpc64 SMP allmodconfig
* sparc and sparc64 SMP allmodconfig
* ia64 SMP allmodconfig
* s390 SMP allmodconfig
* alpha SMP allmodconfig
* um on x86_64 SMP allmodconfig
8. percpu.h modifications were reverted so that it could be applied as
a separate patch and serve as bisection point.
Given the fact that I had only a couple of failures from tests on step
6, I'm fairly confident about the coverage of this conversion patch.
If there is a breakage, it's likely to be something in one of the arch
headers which should be easily discoverable easily on most builds of
the specific arch.
Signed-off-by: Tejun Heo <tj@kernel.org>
Guess-its-ok-by: Christoph Lameter <cl@linux-foundation.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Lee Schermerhorn <Lee.Schermerhorn@hp.com>
2010-03-24 08:04:11 +00:00
|
|
|
#include <linux/slab.h>
|
2005-04-16 22:20:36 +00:00
|
|
|
#ifdef CONFIG_SYSCTL
|
|
|
|
#include <linux/sysctl.h>
|
|
|
|
#endif
|
|
|
|
|
2006-08-05 06:04:54 +00:00
|
|
|
#include <linux/if_addr.h>
|
2017-10-30 23:38:52 +00:00
|
|
|
#include <linux/if_ether.h>
|
2005-04-16 22:20:36 +00:00
|
|
|
#include <linux/if_arp.h>
|
|
|
|
#include <linux/ipv6.h>
|
|
|
|
#include <linux/icmpv6.h>
|
|
|
|
#include <linux/jhash.h>
|
|
|
|
|
|
|
|
#include <net/sock.h>
|
|
|
|
#include <net/snmp.h>
|
|
|
|
|
|
|
|
#include <net/ipv6.h>
|
|
|
|
#include <net/protocol.h>
|
|
|
|
#include <net/ndisc.h>
|
|
|
|
#include <net/ip6_route.h>
|
|
|
|
#include <net/addrconf.h>
|
|
|
|
#include <net/icmp.h>
|
|
|
|
|
2007-10-11 04:22:05 +00:00
|
|
|
#include <net/netlink.h>
|
|
|
|
#include <linux/rtnetlink.h>
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
#include <net/flow.h>
|
|
|
|
#include <net/ip6_checksum.h>
|
2008-04-03 21:31:03 +00:00
|
|
|
#include <net/inet_common.h>
|
2005-04-16 22:20:36 +00:00
|
|
|
#include <linux/proc_fs.h>
|
|
|
|
|
|
|
|
#include <linux/netfilter.h>
|
|
|
|
#include <linux/netfilter_ipv6.h>
|
|
|
|
|
2010-10-04 06:15:44 +00:00
|
|
|
static u32 ndisc_hash(const void *pkey,
|
|
|
|
const struct net_device *dev,
|
2011-12-28 20:06:58 +00:00
|
|
|
__u32 *hash_rnd);
|
2015-03-03 23:10:44 +00:00
|
|
|
static bool ndisc_key_eq(const struct neighbour *neigh, const void *pkey);
|
2019-04-17 00:31:43 +00:00
|
|
|
static bool ndisc_allow_add(const struct net_device *dev,
|
|
|
|
struct netlink_ext_ack *extack);
|
2005-04-16 22:20:36 +00:00
|
|
|
static int ndisc_constructor(struct neighbour *neigh);
|
|
|
|
static void ndisc_solicit(struct neighbour *neigh, struct sk_buff *skb);
|
|
|
|
static void ndisc_error_report(struct neighbour *neigh, struct sk_buff *skb);
|
|
|
|
static int pndisc_constructor(struct pneigh_entry *n);
|
|
|
|
static void pndisc_destructor(struct pneigh_entry *n);
|
|
|
|
static void pndisc_redo(struct sk_buff *skb);
|
2020-11-13 01:58:15 +00:00
|
|
|
static int ndisc_is_multicast(const void *pkey);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2009-09-01 11:13:19 +00:00
|
|
|
static const struct neigh_ops ndisc_generic_ops = {
|
2005-04-16 22:20:36 +00:00
|
|
|
.family = AF_INET6,
|
|
|
|
.solicit = ndisc_solicit,
|
|
|
|
.error_report = ndisc_error_report,
|
|
|
|
.output = neigh_resolve_output,
|
|
|
|
.connected_output = neigh_connected_output,
|
|
|
|
};
|
|
|
|
|
2009-09-01 11:13:19 +00:00
|
|
|
static const struct neigh_ops ndisc_hh_ops = {
|
2005-04-16 22:20:36 +00:00
|
|
|
.family = AF_INET6,
|
|
|
|
.solicit = ndisc_solicit,
|
|
|
|
.error_report = ndisc_error_report,
|
|
|
|
.output = neigh_resolve_output,
|
|
|
|
.connected_output = neigh_resolve_output,
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2009-09-01 11:13:19 +00:00
|
|
|
static const struct neigh_ops ndisc_direct_ops = {
|
2005-04-16 22:20:36 +00:00
|
|
|
.family = AF_INET6,
|
2011-07-17 20:34:11 +00:00
|
|
|
.output = neigh_direct_output,
|
|
|
|
.connected_output = neigh_direct_output,
|
2005-04-16 22:20:36 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
struct neigh_table nd_tbl = {
|
|
|
|
.family = AF_INET6,
|
|
|
|
.key_len = sizeof(struct in6_addr),
|
2015-03-02 06:13:22 +00:00
|
|
|
.protocol = cpu_to_be16(ETH_P_IPV6),
|
2005-04-16 22:20:36 +00:00
|
|
|
.hash = ndisc_hash,
|
2015-03-03 23:10:44 +00:00
|
|
|
.key_eq = ndisc_key_eq,
|
2005-04-16 22:20:36 +00:00
|
|
|
.constructor = ndisc_constructor,
|
|
|
|
.pconstructor = pndisc_constructor,
|
|
|
|
.pdestructor = pndisc_destructor,
|
|
|
|
.proxy_redo = pndisc_redo,
|
2020-11-13 01:58:15 +00:00
|
|
|
.is_multicast = ndisc_is_multicast,
|
2019-04-17 00:31:43 +00:00
|
|
|
.allow_add = ndisc_allow_add,
|
2005-04-16 22:20:36 +00:00
|
|
|
.id = "ndisc_cache",
|
|
|
|
.parms = {
|
2010-12-01 18:05:12 +00:00
|
|
|
.tbl = &nd_tbl,
|
|
|
|
.reachable_time = ND_REACHABLE_TIME,
|
2013-12-07 18:26:53 +00:00
|
|
|
.data = {
|
|
|
|
[NEIGH_VAR_MCAST_PROBES] = 3,
|
|
|
|
[NEIGH_VAR_UCAST_PROBES] = 3,
|
|
|
|
[NEIGH_VAR_RETRANS_TIME] = ND_RETRANS_TIMER,
|
|
|
|
[NEIGH_VAR_BASE_REACHABLE_TIME] = ND_REACHABLE_TIME,
|
|
|
|
[NEIGH_VAR_DELAY_PROBE_TIME] = 5 * HZ,
|
|
|
|
[NEIGH_VAR_GC_STALETIME] = 60 * HZ,
|
2017-08-29 22:16:01 +00:00
|
|
|
[NEIGH_VAR_QUEUE_LEN_BYTES] = SK_WMEM_MAX,
|
2013-12-07 18:26:53 +00:00
|
|
|
[NEIGH_VAR_PROXY_QLEN] = 64,
|
|
|
|
[NEIGH_VAR_ANYCAST_DELAY] = 1 * HZ,
|
|
|
|
[NEIGH_VAR_PROXY_DELAY] = (8 * HZ) / 10,
|
|
|
|
},
|
2005-04-16 22:20:36 +00:00
|
|
|
},
|
|
|
|
.gc_interval = 30 * HZ,
|
|
|
|
.gc_thresh1 = 128,
|
|
|
|
.gc_thresh2 = 512,
|
|
|
|
.gc_thresh3 = 1024,
|
|
|
|
};
|
2015-10-12 18:47:08 +00:00
|
|
|
EXPORT_SYMBOL_GPL(nd_tbl);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2021-10-12 15:58:38 +00:00
|
|
|
void __ndisc_fill_addr_option(struct sk_buff *skb, int type, const void *data,
|
2016-06-15 19:20:24 +00:00
|
|
|
int data_len, int pad)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
2016-06-15 19:20:21 +00:00
|
|
|
int space = __ndisc_opt_addr_space(data_len, pad);
|
2013-01-21 06:48:53 +00:00
|
|
|
u8 *opt = skb_put(skb, space);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
opt[0] = type;
|
|
|
|
opt[1] = space>>3;
|
|
|
|
|
|
|
|
memset(opt + 2, 0, pad);
|
|
|
|
opt += pad;
|
|
|
|
space -= pad;
|
|
|
|
|
|
|
|
memcpy(opt+2, data, data_len);
|
|
|
|
data_len += 2;
|
|
|
|
opt += data_len;
|
2014-11-23 21:28:43 +00:00
|
|
|
space -= data_len;
|
|
|
|
if (space > 0)
|
2005-04-16 22:20:36 +00:00
|
|
|
memset(opt, 0, space);
|
|
|
|
}
|
2016-06-15 19:20:24 +00:00
|
|
|
EXPORT_SYMBOL_GPL(__ndisc_fill_addr_option);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2016-06-15 19:20:21 +00:00
|
|
|
static inline void ndisc_fill_addr_option(struct sk_buff *skb, int type,
|
2021-10-12 15:58:38 +00:00
|
|
|
const void *data, u8 icmp6_type)
|
2016-06-15 19:20:21 +00:00
|
|
|
{
|
|
|
|
__ndisc_fill_addr_option(skb, type, data, skb->dev->addr_len,
|
|
|
|
ndisc_addr_option_pad(skb->dev->type));
|
2016-06-15 19:20:23 +00:00
|
|
|
ndisc_ops_fill_addr_option(skb->dev, skb, icmp6_type);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void ndisc_fill_redirect_addr_option(struct sk_buff *skb,
|
|
|
|
void *ha,
|
|
|
|
const u8 *ops_data)
|
|
|
|
{
|
|
|
|
ndisc_fill_addr_option(skb, ND_OPT_TARGET_LL_ADDR, ha, NDISC_REDIRECT);
|
|
|
|
ndisc_ops_fill_redirect_addr_option(skb->dev, skb, ops_data);
|
2016-06-15 19:20:21 +00:00
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
static struct nd_opt_hdr *ndisc_next_option(struct nd_opt_hdr *cur,
|
|
|
|
struct nd_opt_hdr *end)
|
|
|
|
{
|
|
|
|
int type;
|
|
|
|
if (!cur || !end || cur >= end)
|
|
|
|
return NULL;
|
|
|
|
type = cur->nd_opt_type;
|
|
|
|
do {
|
|
|
|
cur = ((void *)cur) + (cur->nd_opt_len << 3);
|
2014-08-24 20:53:10 +00:00
|
|
|
} while (cur < end && cur->nd_opt_type != type);
|
2010-09-22 20:43:57 +00:00
|
|
|
return cur <= end && cur->nd_opt_type == type ? cur : NULL;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2016-06-15 19:20:23 +00:00
|
|
|
static inline int ndisc_is_useropt(const struct net_device *dev,
|
|
|
|
struct nd_opt_hdr *opt)
|
2007-10-11 04:22:05 +00:00
|
|
|
{
|
2012-04-06 05:50:58 +00:00
|
|
|
return opt->nd_opt_type == ND_OPT_RDNSS ||
|
2016-06-15 19:20:23 +00:00
|
|
|
opt->nd_opt_type == ND_OPT_DNSSL ||
|
2019-07-19 06:30:03 +00:00
|
|
|
opt->nd_opt_type == ND_OPT_CAPTIVE_PORTAL ||
|
2020-03-24 01:10:19 +00:00
|
|
|
opt->nd_opt_type == ND_OPT_PREF64 ||
|
2016-06-15 19:20:23 +00:00
|
|
|
ndisc_ops_is_useropt(dev, opt->nd_opt_type);
|
2007-10-11 04:22:05 +00:00
|
|
|
}
|
|
|
|
|
2016-06-15 19:20:23 +00:00
|
|
|
static struct nd_opt_hdr *ndisc_next_useropt(const struct net_device *dev,
|
|
|
|
struct nd_opt_hdr *cur,
|
2007-10-11 04:22:05 +00:00
|
|
|
struct nd_opt_hdr *end)
|
|
|
|
{
|
|
|
|
if (!cur || !end || cur >= end)
|
|
|
|
return NULL;
|
|
|
|
do {
|
|
|
|
cur = ((void *)cur) + (cur->nd_opt_len << 3);
|
2016-06-15 19:20:23 +00:00
|
|
|
} while (cur < end && !ndisc_is_useropt(dev, cur));
|
|
|
|
return cur <= end && ndisc_is_useropt(dev, cur) ? cur : NULL;
|
2007-10-11 04:22:05 +00:00
|
|
|
}
|
|
|
|
|
2016-06-15 19:20:23 +00:00
|
|
|
struct ndisc_options *ndisc_parse_options(const struct net_device *dev,
|
|
|
|
u8 *opt, int opt_len,
|
2012-07-12 06:26:46 +00:00
|
|
|
struct ndisc_options *ndopts)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
|
|
|
struct nd_opt_hdr *nd_opt = (struct nd_opt_hdr *)opt;
|
|
|
|
|
|
|
|
if (!nd_opt || opt_len < 0 || !ndopts)
|
|
|
|
return NULL;
|
|
|
|
memset(ndopts, 0, sizeof(*ndopts));
|
|
|
|
while (opt_len) {
|
|
|
|
int l;
|
|
|
|
if (opt_len < sizeof(struct nd_opt_hdr))
|
|
|
|
return NULL;
|
|
|
|
l = nd_opt->nd_opt_len << 3;
|
|
|
|
if (opt_len < l || l == 0)
|
|
|
|
return NULL;
|
2016-06-15 19:20:23 +00:00
|
|
|
if (ndisc_ops_parse_options(dev, nd_opt, ndopts))
|
|
|
|
goto next_opt;
|
2005-04-16 22:20:36 +00:00
|
|
|
switch (nd_opt->nd_opt_type) {
|
|
|
|
case ND_OPT_SOURCE_LL_ADDR:
|
|
|
|
case ND_OPT_TARGET_LL_ADDR:
|
|
|
|
case ND_OPT_MTU:
|
2016-12-02 22:00:08 +00:00
|
|
|
case ND_OPT_NONCE:
|
2005-04-16 22:20:36 +00:00
|
|
|
case ND_OPT_REDIRECT_HDR:
|
|
|
|
if (ndopts->nd_opt_array[nd_opt->nd_opt_type]) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn,
|
|
|
|
"%s: duplicated ND6 option found: type=%d\n",
|
|
|
|
__func__, nd_opt->nd_opt_type);
|
2005-04-16 22:20:36 +00:00
|
|
|
} else {
|
|
|
|
ndopts->nd_opt_array[nd_opt->nd_opt_type] = nd_opt;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case ND_OPT_PREFIX_INFO:
|
|
|
|
ndopts->nd_opts_pi_end = nd_opt;
|
2007-10-09 08:59:42 +00:00
|
|
|
if (!ndopts->nd_opt_array[nd_opt->nd_opt_type])
|
2005-04-16 22:20:36 +00:00
|
|
|
ndopts->nd_opt_array[nd_opt->nd_opt_type] = nd_opt;
|
|
|
|
break;
|
2006-03-21 01:06:24 +00:00
|
|
|
#ifdef CONFIG_IPV6_ROUTE_INFO
|
|
|
|
case ND_OPT_ROUTE_INFO:
|
|
|
|
ndopts->nd_opts_ri_end = nd_opt;
|
|
|
|
if (!ndopts->nd_opts_ri)
|
|
|
|
ndopts->nd_opts_ri = nd_opt;
|
|
|
|
break;
|
|
|
|
#endif
|
2005-04-16 22:20:36 +00:00
|
|
|
default:
|
2016-06-15 19:20:23 +00:00
|
|
|
if (ndisc_is_useropt(dev, nd_opt)) {
|
2007-10-11 04:22:05 +00:00
|
|
|
ndopts->nd_useropts_end = nd_opt;
|
|
|
|
if (!ndopts->nd_useropts)
|
|
|
|
ndopts->nd_useropts = nd_opt;
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* Unknown options must be silently ignored,
|
|
|
|
* to accommodate future extension to the
|
|
|
|
* protocol.
|
|
|
|
*/
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, notice,
|
|
|
|
"%s: ignored unsupported option; type=%d, len=%d\n",
|
|
|
|
__func__,
|
|
|
|
nd_opt->nd_opt_type,
|
|
|
|
nd_opt->nd_opt_len);
|
2007-10-11 04:22:05 +00:00
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
2016-06-15 19:20:23 +00:00
|
|
|
next_opt:
|
2005-04-16 22:20:36 +00:00
|
|
|
opt_len -= l;
|
|
|
|
nd_opt = ((void *)nd_opt) + l;
|
|
|
|
}
|
|
|
|
return ndopts;
|
|
|
|
}
|
|
|
|
|
2011-04-22 04:53:02 +00:00
|
|
|
int ndisc_mc_map(const struct in6_addr *addr, char *buf, struct net_device *dev, int dir)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
|
|
|
switch (dev->type) {
|
|
|
|
case ARPHRD_ETHER:
|
|
|
|
case ARPHRD_IEEE802: /* Not sure. Check it later. --ANK */
|
|
|
|
case ARPHRD_FDDI:
|
|
|
|
ipv6_eth_mc_map(addr, buf);
|
|
|
|
return 0;
|
|
|
|
case ARPHRD_ARCNET:
|
|
|
|
ipv6_arcnet_mc_map(addr, buf);
|
|
|
|
return 0;
|
|
|
|
case ARPHRD_INFINIBAND:
|
2007-12-10 20:38:41 +00:00
|
|
|
ipv6_ib_mc_map(addr, dev->broadcast, buf);
|
2005-04-16 22:20:36 +00:00
|
|
|
return 0;
|
2011-03-28 22:40:53 +00:00
|
|
|
case ARPHRD_IPGRE:
|
|
|
|
return ipv6_ipgre_mc_map(addr, dev->broadcast, buf);
|
2005-04-16 22:20:36 +00:00
|
|
|
default:
|
|
|
|
if (dir) {
|
|
|
|
memcpy(buf, dev->broadcast, dev->addr_len);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
2007-02-22 13:05:40 +00:00
|
|
|
EXPORT_SYMBOL(ndisc_mc_map);
|
|
|
|
|
2010-10-04 06:15:44 +00:00
|
|
|
static u32 ndisc_hash(const void *pkey,
|
|
|
|
const struct net_device *dev,
|
2011-12-28 20:06:58 +00:00
|
|
|
__u32 *hash_rnd)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
2011-12-28 20:06:58 +00:00
|
|
|
return ndisc_hashfn(pkey, dev, hash_rnd);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2015-03-03 23:10:44 +00:00
|
|
|
static bool ndisc_key_eq(const struct neighbour *n, const void *pkey)
|
|
|
|
{
|
|
|
|
return neigh_key_eq128(n, pkey);
|
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
static int ndisc_constructor(struct neighbour *neigh)
|
|
|
|
{
|
2014-08-24 20:53:10 +00:00
|
|
|
struct in6_addr *addr = (struct in6_addr *)&neigh->primary_key;
|
2005-04-16 22:20:36 +00:00
|
|
|
struct net_device *dev = neigh->dev;
|
|
|
|
struct inet6_dev *in6_dev;
|
|
|
|
struct neigh_parms *parms;
|
2012-05-18 18:57:34 +00:00
|
|
|
bool is_multicast = ipv6_addr_is_multicast(addr);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
in6_dev = in6_dev_get(dev);
|
2015-03-29 13:00:04 +00:00
|
|
|
if (!in6_dev) {
|
2005-04-16 22:20:36 +00:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
parms = in6_dev->nd_parms;
|
|
|
|
__neigh_parms_put(neigh->parms);
|
|
|
|
neigh->parms = neigh_parms_clone(parms);
|
|
|
|
|
|
|
|
neigh->type = is_multicast ? RTN_MULTICAST : RTN_UNICAST;
|
2007-10-09 08:40:57 +00:00
|
|
|
if (!dev->header_ops) {
|
2005-04-16 22:20:36 +00:00
|
|
|
neigh->nud_state = NUD_NOARP;
|
|
|
|
neigh->ops = &ndisc_direct_ops;
|
2011-07-17 20:34:11 +00:00
|
|
|
neigh->output = neigh_direct_output;
|
2005-04-16 22:20:36 +00:00
|
|
|
} else {
|
|
|
|
if (is_multicast) {
|
|
|
|
neigh->nud_state = NUD_NOARP;
|
|
|
|
ndisc_mc_map(addr, neigh->ha, dev, 1);
|
|
|
|
} else if (dev->flags&(IFF_NOARP|IFF_LOOPBACK)) {
|
|
|
|
neigh->nud_state = NUD_NOARP;
|
|
|
|
memcpy(neigh->ha, dev->dev_addr, dev->addr_len);
|
|
|
|
if (dev->flags&IFF_LOOPBACK)
|
|
|
|
neigh->type = RTN_LOCAL;
|
|
|
|
} else if (dev->flags&IFF_POINTOPOINT) {
|
|
|
|
neigh->nud_state = NUD_NOARP;
|
|
|
|
memcpy(neigh->ha, dev->broadcast, dev->addr_len);
|
|
|
|
}
|
2007-10-09 08:40:57 +00:00
|
|
|
if (dev->header_ops->cache)
|
2005-04-16 22:20:36 +00:00
|
|
|
neigh->ops = &ndisc_hh_ops;
|
|
|
|
else
|
|
|
|
neigh->ops = &ndisc_generic_ops;
|
|
|
|
if (neigh->nud_state&NUD_VALID)
|
|
|
|
neigh->output = neigh->ops->connected_output;
|
|
|
|
else
|
|
|
|
neigh->output = neigh->ops->output;
|
|
|
|
}
|
|
|
|
in6_dev_put(in6_dev);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int pndisc_constructor(struct pneigh_entry *n)
|
|
|
|
{
|
2014-08-24 20:53:10 +00:00
|
|
|
struct in6_addr *addr = (struct in6_addr *)&n->key;
|
2005-04-16 22:20:36 +00:00
|
|
|
struct in6_addr maddr;
|
|
|
|
struct net_device *dev = n->dev;
|
|
|
|
|
2015-03-29 13:00:04 +00:00
|
|
|
if (!dev || !__in6_dev_get(dev))
|
2005-04-16 22:20:36 +00:00
|
|
|
return -EINVAL;
|
|
|
|
addrconf_addr_solict_mult(addr, &maddr);
|
|
|
|
ipv6_dev_mc_inc(dev, &maddr);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void pndisc_destructor(struct pneigh_entry *n)
|
|
|
|
{
|
2014-08-24 20:53:10 +00:00
|
|
|
struct in6_addr *addr = (struct in6_addr *)&n->key;
|
2005-04-16 22:20:36 +00:00
|
|
|
struct in6_addr maddr;
|
|
|
|
struct net_device *dev = n->dev;
|
|
|
|
|
2015-03-29 13:00:04 +00:00
|
|
|
if (!dev || !__in6_dev_get(dev))
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
|
|
|
addrconf_addr_solict_mult(addr, &maddr);
|
|
|
|
ipv6_dev_mc_dec(dev, &maddr);
|
|
|
|
}
|
|
|
|
|
2019-04-17 00:31:43 +00:00
|
|
|
/* called with rtnl held */
|
|
|
|
static bool ndisc_allow_add(const struct net_device *dev,
|
|
|
|
struct netlink_ext_ack *extack)
|
|
|
|
{
|
|
|
|
struct inet6_dev *idev = __in6_dev_get(dev);
|
|
|
|
|
|
|
|
if (!idev || idev->cnf.disable_ipv6) {
|
|
|
|
NL_SET_ERR_MSG(extack, "IPv6 is disabled on this device");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2013-01-21 06:48:14 +00:00
|
|
|
static struct sk_buff *ndisc_alloc_skb(struct net_device *dev,
|
|
|
|
int len)
|
|
|
|
{
|
|
|
|
int hlen = LL_RESERVED_SPACE(dev);
|
|
|
|
int tlen = dev->needed_tailroom;
|
|
|
|
struct sock *sk = dev_net(dev)->ipv6.ndisc_sk;
|
|
|
|
struct sk_buff *skb;
|
|
|
|
|
2013-09-03 11:37:01 +00:00
|
|
|
skb = alloc_skb(hlen + sizeof(struct ipv6hdr) + len + tlen, GFP_ATOMIC);
|
2013-01-21 06:48:14 +00:00
|
|
|
if (!skb) {
|
2013-09-03 11:37:01 +00:00
|
|
|
ND_PRINTK(0, err, "ndisc: %s failed to allocate an skb\n",
|
|
|
|
__func__);
|
2013-01-21 06:48:14 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2013-01-21 06:48:29 +00:00
|
|
|
skb->protocol = htons(ETH_P_IPV6);
|
|
|
|
skb->dev = dev;
|
|
|
|
|
2013-01-21 06:48:39 +00:00
|
|
|
skb_reserve(skb, hlen + sizeof(struct ipv6hdr));
|
2013-01-21 06:48:44 +00:00
|
|
|
skb_reset_transport_header(skb);
|
2013-01-21 06:48:14 +00:00
|
|
|
|
2013-09-03 11:37:01 +00:00
|
|
|
/* Manually assign socket ownership as we avoid calling
|
|
|
|
* sock_alloc_send_pskb() to bypass wmem buffer limits
|
|
|
|
*/
|
|
|
|
skb_set_owner_w(skb, sk);
|
|
|
|
|
2013-01-21 06:48:14 +00:00
|
|
|
return skb;
|
|
|
|
}
|
|
|
|
|
2013-01-21 06:48:29 +00:00
|
|
|
static void ip6_nd_hdr(struct sk_buff *skb,
|
2013-01-21 06:48:19 +00:00
|
|
|
const struct in6_addr *saddr,
|
|
|
|
const struct in6_addr *daddr,
|
2013-01-21 06:48:24 +00:00
|
|
|
int hop_limit, int len)
|
2013-01-21 06:48:19 +00:00
|
|
|
{
|
|
|
|
struct ipv6hdr *hdr;
|
net: ipv6: sysctl to specify IPv6 ND traffic class
Add a per-device sysctl to specify the default traffic class to use for
kernel originated IPv6 Neighbour Discovery packets.
Currently this includes:
- Router Solicitation (ICMPv6 type 133)
ndisc_send_rs() -> ndisc_send_skb() -> ip6_nd_hdr()
- Neighbour Solicitation (ICMPv6 type 135)
ndisc_send_ns() -> ndisc_send_skb() -> ip6_nd_hdr()
- Neighbour Advertisement (ICMPv6 type 136)
ndisc_send_na() -> ndisc_send_skb() -> ip6_nd_hdr()
- Redirect (ICMPv6 type 137)
ndisc_send_redirect() -> ndisc_send_skb() -> ip6_nd_hdr()
and if the kernel ever gets around to generating RA's,
it would presumably also include:
- Router Advertisement (ICMPv6 type 134)
(radvd daemon could pick up on the kernel setting and use it)
Interface drivers may examine the Traffic Class value and translate
the DiffServ Code Point into a link-layer appropriate traffic
prioritization scheme. An example of mapping IETF DSCP values to
IEEE 802.11 User Priority values can be found here:
https://tools.ietf.org/html/draft-ietf-tsvwg-ieee-802-11
The expected primary use case is to properly prioritize ND over wifi.
Testing:
jzem22:~# cat /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
0
jzem22:~# echo -1 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
-bash: echo: write error: Invalid argument
jzem22:~# echo 256 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
-bash: echo: write error: Invalid argument
jzem22:~# echo 0 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
jzem22:~# echo 255 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
jzem22:~# cat /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
255
jzem22:~# echo 34 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
jzem22:~# cat /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
34
jzem22:~# echo $[0xDC] > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
jzem22:~# tcpdump -v -i eth0 icmp6 and src host jzem22.pgc and dst host fe80::1
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
IP6 (class 0xdc, hlim 255, next-header ICMPv6 (58) payload length: 24)
jzem22.pgc > fe80::1: [icmp6 sum ok] ICMP6, neighbor advertisement,
length 24, tgt is jzem22.pgc, Flags [solicited]
(based on original change written by Erik Kline, with minor changes)
v2: fix 'suspicious rcu_dereference_check() usage'
by explicitly grabbing the rcu_read_lock.
Cc: Lorenzo Colitti <lorenzo@google.com>
Signed-off-by: Erik Kline <ek@google.com>
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-11-08 05:52:09 +00:00
|
|
|
struct inet6_dev *idev;
|
|
|
|
unsigned tclass;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
idev = __in6_dev_get(skb->dev);
|
|
|
|
tclass = idev ? idev->cnf.ndisc_tclass : 0;
|
|
|
|
rcu_read_unlock();
|
2013-01-21 06:48:19 +00:00
|
|
|
|
2013-01-21 06:48:39 +00:00
|
|
|
skb_push(skb, sizeof(*hdr));
|
2013-01-21 06:48:19 +00:00
|
|
|
skb_reset_network_header(skb);
|
|
|
|
hdr = ipv6_hdr(skb);
|
|
|
|
|
net: ipv6: sysctl to specify IPv6 ND traffic class
Add a per-device sysctl to specify the default traffic class to use for
kernel originated IPv6 Neighbour Discovery packets.
Currently this includes:
- Router Solicitation (ICMPv6 type 133)
ndisc_send_rs() -> ndisc_send_skb() -> ip6_nd_hdr()
- Neighbour Solicitation (ICMPv6 type 135)
ndisc_send_ns() -> ndisc_send_skb() -> ip6_nd_hdr()
- Neighbour Advertisement (ICMPv6 type 136)
ndisc_send_na() -> ndisc_send_skb() -> ip6_nd_hdr()
- Redirect (ICMPv6 type 137)
ndisc_send_redirect() -> ndisc_send_skb() -> ip6_nd_hdr()
and if the kernel ever gets around to generating RA's,
it would presumably also include:
- Router Advertisement (ICMPv6 type 134)
(radvd daemon could pick up on the kernel setting and use it)
Interface drivers may examine the Traffic Class value and translate
the DiffServ Code Point into a link-layer appropriate traffic
prioritization scheme. An example of mapping IETF DSCP values to
IEEE 802.11 User Priority values can be found here:
https://tools.ietf.org/html/draft-ietf-tsvwg-ieee-802-11
The expected primary use case is to properly prioritize ND over wifi.
Testing:
jzem22:~# cat /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
0
jzem22:~# echo -1 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
-bash: echo: write error: Invalid argument
jzem22:~# echo 256 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
-bash: echo: write error: Invalid argument
jzem22:~# echo 0 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
jzem22:~# echo 255 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
jzem22:~# cat /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
255
jzem22:~# echo 34 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
jzem22:~# cat /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
34
jzem22:~# echo $[0xDC] > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
jzem22:~# tcpdump -v -i eth0 icmp6 and src host jzem22.pgc and dst host fe80::1
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
IP6 (class 0xdc, hlim 255, next-header ICMPv6 (58) payload length: 24)
jzem22.pgc > fe80::1: [icmp6 sum ok] ICMP6, neighbor advertisement,
length 24, tgt is jzem22.pgc, Flags [solicited]
(based on original change written by Erik Kline, with minor changes)
v2: fix 'suspicious rcu_dereference_check() usage'
by explicitly grabbing the rcu_read_lock.
Cc: Lorenzo Colitti <lorenzo@google.com>
Signed-off-by: Erik Kline <ek@google.com>
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-11-08 05:52:09 +00:00
|
|
|
ip6_flow_hdr(hdr, tclass, 0);
|
2013-01-21 06:48:19 +00:00
|
|
|
|
|
|
|
hdr->payload_len = htons(len);
|
2013-01-21 06:48:24 +00:00
|
|
|
hdr->nexthdr = IPPROTO_ICMPV6;
|
|
|
|
hdr->hop_limit = hop_limit;
|
2013-01-21 06:48:19 +00:00
|
|
|
|
|
|
|
hdr->saddr = *saddr;
|
|
|
|
hdr->daddr = *daddr;
|
|
|
|
}
|
|
|
|
|
2022-02-21 05:54:53 +00:00
|
|
|
void ndisc_send_skb(struct sk_buff *skb, const struct in6_addr *daddr,
|
|
|
|
const struct in6_addr *saddr)
|
bonding: send IPv6 neighbor advertisement on failover
This patch adds better IPv6 failover support for bonding devices,
especially when in active-backup mode and there are only IPv6 addresses
configured, as reported by Alex Sidorenko.
- Creates a new file, net/drivers/bonding/bond_ipv6.c, for the
IPv6-specific routines. Both regular bonds and VLANs over bonds
are supported.
- Adds a new tunable, num_unsol_na, to limit the number of unsolicited
IPv6 Neighbor Advertisements that are sent on a failover event.
Default is 1.
- Creates two new IPv6 neighbor discovery functions:
ndisc_build_skb()
ndisc_send_skb()
These were required to support VLANs since we have to be able to
add the VLAN id to the skb since ndisc_send_na() and friends
shouldn't be asked to do this. These two routines are basically
__ndisc_send() split into two pieces, in a slightly different order.
- Updates Documentation/networking/bonding.txt and bumps the rev of bond
support to 3.4.0.
On failover, this new code will generate one packet:
- An unsolicited IPv6 Neighbor Advertisement, which helps the switch
learn that the address has moved to the new slave.
Testing has shown that sending just the NA results in pretty good
behavior when in active-back mode, I saw no lost ping packets for example.
Signed-off-by: Brian Haley <brian.haley@hp.com>
Signed-off-by: Jay Vosburgh <fubar@us.ibm.com>
Signed-off-by: Jeff Garzik <jgarzik@redhat.com>
2008-11-05 01:51:14 +00:00
|
|
|
{
|
2013-01-21 06:49:03 +00:00
|
|
|
struct dst_entry *dst = skb_dst(skb);
|
2013-01-21 06:48:34 +00:00
|
|
|
struct net *net = dev_net(skb->dev);
|
2013-01-21 06:49:08 +00:00
|
|
|
struct sock *sk = net->ipv6.ndisc_sk;
|
bonding: send IPv6 neighbor advertisement on failover
This patch adds better IPv6 failover support for bonding devices,
especially when in active-backup mode and there are only IPv6 addresses
configured, as reported by Alex Sidorenko.
- Creates a new file, net/drivers/bonding/bond_ipv6.c, for the
IPv6-specific routines. Both regular bonds and VLANs over bonds
are supported.
- Adds a new tunable, num_unsol_na, to limit the number of unsolicited
IPv6 Neighbor Advertisements that are sent on a failover event.
Default is 1.
- Creates two new IPv6 neighbor discovery functions:
ndisc_build_skb()
ndisc_send_skb()
These were required to support VLANs since we have to be able to
add the VLAN id to the skb since ndisc_send_na() and friends
shouldn't be asked to do this. These two routines are basically
__ndisc_send() split into two pieces, in a slightly different order.
- Updates Documentation/networking/bonding.txt and bumps the rev of bond
support to 3.4.0.
On failover, this new code will generate one packet:
- An unsolicited IPv6 Neighbor Advertisement, which helps the switch
learn that the address has moved to the new slave.
Testing has shown that sending just the NA results in pretty good
behavior when in active-back mode, I saw no lost ping packets for example.
Signed-off-by: Brian Haley <brian.haley@hp.com>
Signed-off-by: Jay Vosburgh <fubar@us.ibm.com>
Signed-off-by: Jeff Garzik <jgarzik@redhat.com>
2008-11-05 01:51:14 +00:00
|
|
|
struct inet6_dev *idev;
|
|
|
|
int err;
|
2013-01-21 06:48:58 +00:00
|
|
|
struct icmp6hdr *icmp6h = icmp6_hdr(skb);
|
bonding: send IPv6 neighbor advertisement on failover
This patch adds better IPv6 failover support for bonding devices,
especially when in active-backup mode and there are only IPv6 addresses
configured, as reported by Alex Sidorenko.
- Creates a new file, net/drivers/bonding/bond_ipv6.c, for the
IPv6-specific routines. Both regular bonds and VLANs over bonds
are supported.
- Adds a new tunable, num_unsol_na, to limit the number of unsolicited
IPv6 Neighbor Advertisements that are sent on a failover event.
Default is 1.
- Creates two new IPv6 neighbor discovery functions:
ndisc_build_skb()
ndisc_send_skb()
These were required to support VLANs since we have to be able to
add the VLAN id to the skb since ndisc_send_na() and friends
shouldn't be asked to do this. These two routines are basically
__ndisc_send() split into two pieces, in a slightly different order.
- Updates Documentation/networking/bonding.txt and bumps the rev of bond
support to 3.4.0.
On failover, this new code will generate one packet:
- An unsolicited IPv6 Neighbor Advertisement, which helps the switch
learn that the address has moved to the new slave.
Testing has shown that sending just the NA results in pretty good
behavior when in active-back mode, I saw no lost ping packets for example.
Signed-off-by: Brian Haley <brian.haley@hp.com>
Signed-off-by: Jay Vosburgh <fubar@us.ibm.com>
Signed-off-by: Jeff Garzik <jgarzik@redhat.com>
2008-11-05 01:51:14 +00:00
|
|
|
u8 type;
|
|
|
|
|
|
|
|
type = icmp6h->icmp6_type;
|
|
|
|
|
2013-01-21 06:49:03 +00:00
|
|
|
if (!dst) {
|
|
|
|
struct flowi6 fl6;
|
2016-09-10 19:09:57 +00:00
|
|
|
int oif = skb->dev->ifindex;
|
bonding: send IPv6 neighbor advertisement on failover
This patch adds better IPv6 failover support for bonding devices,
especially when in active-backup mode and there are only IPv6 addresses
configured, as reported by Alex Sidorenko.
- Creates a new file, net/drivers/bonding/bond_ipv6.c, for the
IPv6-specific routines. Both regular bonds and VLANs over bonds
are supported.
- Adds a new tunable, num_unsol_na, to limit the number of unsolicited
IPv6 Neighbor Advertisements that are sent on a failover event.
Default is 1.
- Creates two new IPv6 neighbor discovery functions:
ndisc_build_skb()
ndisc_send_skb()
These were required to support VLANs since we have to be able to
add the VLAN id to the skb since ndisc_send_na() and friends
shouldn't be asked to do this. These two routines are basically
__ndisc_send() split into two pieces, in a slightly different order.
- Updates Documentation/networking/bonding.txt and bumps the rev of bond
support to 3.4.0.
On failover, this new code will generate one packet:
- An unsolicited IPv6 Neighbor Advertisement, which helps the switch
learn that the address has moved to the new slave.
Testing has shown that sending just the NA results in pretty good
behavior when in active-back mode, I saw no lost ping packets for example.
Signed-off-by: Brian Haley <brian.haley@hp.com>
Signed-off-by: Jay Vosburgh <fubar@us.ibm.com>
Signed-off-by: Jeff Garzik <jgarzik@redhat.com>
2008-11-05 01:51:14 +00:00
|
|
|
|
2015-10-12 18:47:10 +00:00
|
|
|
icmpv6_flow_init(sk, &fl6, type, saddr, daddr, oif);
|
2013-01-21 06:49:03 +00:00
|
|
|
dst = icmp6_dst_alloc(skb->dev, &fl6);
|
|
|
|
if (IS_ERR(dst)) {
|
|
|
|
kfree_skb(skb);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
skb_dst_set(skb, dst);
|
|
|
|
}
|
2007-04-24 11:44:52 +00:00
|
|
|
|
2013-01-21 06:49:08 +00:00
|
|
|
icmp6h->icmp6_cksum = csum_ipv6_magic(saddr, daddr, skb->len,
|
|
|
|
IPPROTO_ICMPV6,
|
|
|
|
csum_partial(icmp6h,
|
|
|
|
skb->len, 0));
|
|
|
|
|
|
|
|
ip6_nd_hdr(skb, saddr, daddr, inet6_sk(sk)->hop_limit, skb->len);
|
|
|
|
|
2011-07-27 21:13:03 +00:00
|
|
|
rcu_read_lock();
|
|
|
|
idev = __in6_dev_get(dst->dev);
|
2009-04-27 09:45:02 +00:00
|
|
|
IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUT, skb->len);
|
2007-04-24 11:44:52 +00:00
|
|
|
|
2015-09-16 01:04:16 +00:00
|
|
|
err = NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT,
|
|
|
|
net, sk, skb, NULL, dst->dev,
|
2015-10-07 21:48:35 +00:00
|
|
|
dst_output);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (!err) {
|
2008-10-08 17:33:50 +00:00
|
|
|
ICMP6MSGOUT_INC_STATS(net, idev, type);
|
2008-10-08 17:33:06 +00:00
|
|
|
ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2011-07-27 21:13:03 +00:00
|
|
|
rcu_read_unlock();
|
2007-02-09 14:24:49 +00:00
|
|
|
}
|
2022-02-21 05:54:53 +00:00
|
|
|
EXPORT_SYMBOL(ndisc_send_skb);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2015-09-22 16:57:13 +00:00
|
|
|
void ndisc_send_na(struct net_device *dev, const struct in6_addr *daddr,
|
2013-08-31 05:44:36 +00:00
|
|
|
const struct in6_addr *solicited_addr,
|
|
|
|
bool router, bool solicited, bool override, bool inc_opt)
|
2007-04-24 11:44:52 +00:00
|
|
|
{
|
2013-01-21 06:49:13 +00:00
|
|
|
struct sk_buff *skb;
|
2007-04-24 11:44:52 +00:00
|
|
|
struct in6_addr tmpaddr;
|
|
|
|
struct inet6_ifaddr *ifp;
|
[IPV6]: Make address arguments const.
- net/ipv6/addrconf.c:
ipv6_get_ifaddr(), ipv6_dev_get_saddr()
- net/ipv6/mcast.c:
ipv6_sock_mc_join(), ipv6_sock_mc_drop(),
inet6_mc_check(),
ipv6_dev_mc_inc(), __ipv6_dev_mc_dec(), ipv6_dev_mc_dec(),
ipv6_chk_mcast_addr()
- net/ipv6/route.c:
rt6_lookup(), icmp6_dst_alloc()
- net/ipv6/ip6_output.c:
ip6_nd_hdr()
- net/ipv6/ndisc.c:
ndisc_send_ns(), ndisc_send_rs(), ndisc_send_redirect(),
ndisc_get_neigh(), __ndisc_send()
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
2008-04-10 06:42:10 +00:00
|
|
|
const struct in6_addr *src_addr;
|
2013-01-21 06:49:17 +00:00
|
|
|
struct nd_msg *msg;
|
|
|
|
int optlen = 0;
|
2007-04-24 11:44:52 +00:00
|
|
|
|
|
|
|
/* for anycast or proxy, solicited_addr != src_addr */
|
2008-03-25 12:47:49 +00:00
|
|
|
ifp = ipv6_get_ifaddr(dev_net(dev), solicited_addr, dev, 1);
|
2007-04-24 11:44:52 +00:00
|
|
|
if (ifp) {
|
|
|
|
src_addr = solicited_addr;
|
|
|
|
if (ifp->flags & IFA_F_OPTIMISTIC)
|
2013-07-13 08:26:51 +00:00
|
|
|
override = false;
|
2010-06-21 11:00:13 +00:00
|
|
|
inc_opt |= ifp->idev->cnf.force_tllao;
|
2007-04-24 11:44:52 +00:00
|
|
|
in6_ifa_put(ifp);
|
|
|
|
} else {
|
2008-08-14 22:33:21 +00:00
|
|
|
if (ipv6_dev_get_saddr(dev_net(dev), dev, daddr,
|
2008-03-25 12:47:49 +00:00
|
|
|
inet6_sk(dev_net(dev)->ipv6.ndisc_sk)->srcprefs,
|
2008-03-25 00:37:42 +00:00
|
|
|
&tmpaddr))
|
2007-04-24 11:44:52 +00:00
|
|
|
return;
|
|
|
|
src_addr = &tmpaddr;
|
|
|
|
}
|
|
|
|
|
2013-01-21 06:49:17 +00:00
|
|
|
if (!dev->addr_len)
|
2018-03-05 22:11:54 +00:00
|
|
|
inc_opt = false;
|
2013-01-21 06:49:17 +00:00
|
|
|
if (inc_opt)
|
2016-06-15 19:20:23 +00:00
|
|
|
optlen += ndisc_opt_addr_space(dev,
|
|
|
|
NDISC_NEIGHBOUR_ADVERTISEMENT);
|
2007-04-24 11:44:52 +00:00
|
|
|
|
2013-01-21 06:49:17 +00:00
|
|
|
skb = ndisc_alloc_skb(dev, sizeof(*msg) + optlen);
|
2013-01-21 06:49:13 +00:00
|
|
|
if (!skb)
|
|
|
|
return;
|
|
|
|
|
networking: make skb_put & friends return void pointers
It seems like a historic accident that these return unsigned char *,
and in many places that means casts are required, more often than not.
Make these functions (skb_put, __skb_put and pskb_put) return void *
and remove all the casts across the tree, adding a (u8 *) cast only
where the unsigned char pointer was used directly, all done with the
following spatch:
@@
expression SKB, LEN;
typedef u8;
identifier fn = { skb_put, __skb_put };
@@
- *(fn(SKB, LEN))
+ *(u8 *)fn(SKB, LEN)
@@
expression E, SKB, LEN;
identifier fn = { skb_put, __skb_put };
type T;
@@
- E = ((T *)(fn(SKB, LEN)))
+ E = fn(SKB, LEN)
which actually doesn't cover pskb_put since there are only three
users overall.
A handful of stragglers were converted manually, notably a macro in
drivers/isdn/i4l/isdn_bsdcomp.c and, oddly enough, one of the many
instances in net/bluetooth/hci_sock.c. In the former file, I also
had to fix one whitespace problem spatch introduced.
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 12:29:21 +00:00
|
|
|
msg = skb_put(skb, sizeof(*msg));
|
2013-01-21 06:49:17 +00:00
|
|
|
*msg = (struct nd_msg) {
|
|
|
|
.icmph = {
|
|
|
|
.icmp6_type = NDISC_NEIGHBOUR_ADVERTISEMENT,
|
|
|
|
.icmp6_router = router,
|
|
|
|
.icmp6_solicited = solicited,
|
|
|
|
.icmp6_override = override,
|
|
|
|
},
|
|
|
|
.target = *solicited_addr,
|
|
|
|
};
|
|
|
|
|
|
|
|
if (inc_opt)
|
|
|
|
ndisc_fill_addr_option(skb, ND_OPT_TARGET_LL_ADDR,
|
2016-06-15 19:20:23 +00:00
|
|
|
dev->dev_addr,
|
|
|
|
NDISC_NEIGHBOUR_ADVERTISEMENT);
|
2013-01-21 06:49:17 +00:00
|
|
|
|
2013-01-21 06:49:13 +00:00
|
|
|
ndisc_send_skb(skb, daddr, src_addr);
|
2007-04-24 11:44:52 +00:00
|
|
|
}
|
|
|
|
|
2011-04-15 13:46:02 +00:00
|
|
|
static void ndisc_send_unsol_na(struct net_device *dev)
|
|
|
|
{
|
|
|
|
struct inet6_dev *idev;
|
|
|
|
struct inet6_ifaddr *ifa;
|
|
|
|
|
|
|
|
idev = in6_dev_get(dev);
|
|
|
|
if (!idev)
|
|
|
|
return;
|
|
|
|
|
|
|
|
read_lock_bh(&idev->lock);
|
|
|
|
list_for_each_entry(ifa, &idev->addr_list, if_list) {
|
2018-01-26 04:16:29 +00:00
|
|
|
/* skip tentative addresses until dad completes */
|
|
|
|
if (ifa->flags & IFA_F_TENTATIVE &&
|
|
|
|
!(ifa->flags & IFA_F_OPTIMISTIC))
|
|
|
|
continue;
|
|
|
|
|
2015-09-22 16:57:13 +00:00
|
|
|
ndisc_send_na(dev, &in6addr_linklocal_allnodes, &ifa->addr,
|
2011-04-15 13:46:02 +00:00
|
|
|
/*router=*/ !!idev->cnf.forwarding,
|
|
|
|
/*solicited=*/ false, /*override=*/ true,
|
|
|
|
/*inc_opt=*/ true);
|
|
|
|
}
|
|
|
|
read_unlock_bh(&idev->lock);
|
|
|
|
|
|
|
|
in6_dev_put(idev);
|
|
|
|
}
|
|
|
|
|
2022-02-21 05:54:53 +00:00
|
|
|
struct sk_buff *ndisc_ns_create(struct net_device *dev, const struct in6_addr *solicit,
|
|
|
|
const struct in6_addr *saddr, u64 nonce)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
2013-01-21 06:49:17 +00:00
|
|
|
int inc_opt = dev->addr_len;
|
2022-02-21 05:54:53 +00:00
|
|
|
struct sk_buff *skb;
|
2013-01-21 06:49:17 +00:00
|
|
|
struct nd_msg *msg;
|
2022-02-21 05:54:53 +00:00
|
|
|
int optlen = 0;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2022-02-21 05:54:53 +00:00
|
|
|
if (!saddr)
|
|
|
|
return NULL;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2013-01-21 06:49:17 +00:00
|
|
|
if (ipv6_addr_any(saddr))
|
2013-07-13 08:26:51 +00:00
|
|
|
inc_opt = false;
|
2013-01-21 06:49:17 +00:00
|
|
|
if (inc_opt)
|
2016-06-15 19:20:23 +00:00
|
|
|
optlen += ndisc_opt_addr_space(dev,
|
|
|
|
NDISC_NEIGHBOUR_SOLICITATION);
|
2016-12-02 22:00:08 +00:00
|
|
|
if (nonce != 0)
|
|
|
|
optlen += 8;
|
2013-01-21 06:49:17 +00:00
|
|
|
|
|
|
|
skb = ndisc_alloc_skb(dev, sizeof(*msg) + optlen);
|
2013-01-21 06:49:13 +00:00
|
|
|
if (!skb)
|
2022-02-21 05:54:53 +00:00
|
|
|
return NULL;
|
2013-01-21 06:49:13 +00:00
|
|
|
|
networking: make skb_put & friends return void pointers
It seems like a historic accident that these return unsigned char *,
and in many places that means casts are required, more often than not.
Make these functions (skb_put, __skb_put and pskb_put) return void *
and remove all the casts across the tree, adding a (u8 *) cast only
where the unsigned char pointer was used directly, all done with the
following spatch:
@@
expression SKB, LEN;
typedef u8;
identifier fn = { skb_put, __skb_put };
@@
- *(fn(SKB, LEN))
+ *(u8 *)fn(SKB, LEN)
@@
expression E, SKB, LEN;
identifier fn = { skb_put, __skb_put };
type T;
@@
- E = ((T *)(fn(SKB, LEN)))
+ E = fn(SKB, LEN)
which actually doesn't cover pskb_put since there are only three
users overall.
A handful of stragglers were converted manually, notably a macro in
drivers/isdn/i4l/isdn_bsdcomp.c and, oddly enough, one of the many
instances in net/bluetooth/hci_sock.c. In the former file, I also
had to fix one whitespace problem spatch introduced.
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 12:29:21 +00:00
|
|
|
msg = skb_put(skb, sizeof(*msg));
|
2013-01-21 06:49:17 +00:00
|
|
|
*msg = (struct nd_msg) {
|
|
|
|
.icmph = {
|
|
|
|
.icmp6_type = NDISC_NEIGHBOUR_SOLICITATION,
|
|
|
|
},
|
|
|
|
.target = *solicit,
|
|
|
|
};
|
|
|
|
|
|
|
|
if (inc_opt)
|
|
|
|
ndisc_fill_addr_option(skb, ND_OPT_SOURCE_LL_ADDR,
|
2016-06-15 19:20:23 +00:00
|
|
|
dev->dev_addr,
|
|
|
|
NDISC_NEIGHBOUR_SOLICITATION);
|
2016-12-02 22:00:08 +00:00
|
|
|
if (nonce != 0) {
|
|
|
|
u8 *opt = skb_put(skb, 8);
|
|
|
|
|
|
|
|
opt[0] = ND_OPT_NONCE;
|
|
|
|
opt[1] = 8 >> 3;
|
|
|
|
memcpy(opt + 2, &nonce, 6);
|
|
|
|
}
|
2013-01-21 06:49:17 +00:00
|
|
|
|
2022-02-21 05:54:53 +00:00
|
|
|
return skb;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(ndisc_ns_create);
|
|
|
|
|
|
|
|
void ndisc_send_ns(struct net_device *dev, const struct in6_addr *solicit,
|
|
|
|
const struct in6_addr *daddr, const struct in6_addr *saddr,
|
|
|
|
u64 nonce)
|
|
|
|
{
|
|
|
|
struct in6_addr addr_buf;
|
|
|
|
struct sk_buff *skb;
|
|
|
|
|
|
|
|
if (!saddr) {
|
|
|
|
if (ipv6_get_lladdr(dev, &addr_buf,
|
|
|
|
(IFA_F_TENTATIVE | IFA_F_OPTIMISTIC)))
|
|
|
|
return;
|
|
|
|
saddr = &addr_buf;
|
|
|
|
}
|
|
|
|
|
|
|
|
skb = ndisc_ns_create(dev, solicit, saddr, nonce);
|
|
|
|
|
|
|
|
if (skb)
|
|
|
|
ndisc_send_skb(skb, daddr, saddr);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
[IPV6]: Make address arguments const.
- net/ipv6/addrconf.c:
ipv6_get_ifaddr(), ipv6_dev_get_saddr()
- net/ipv6/mcast.c:
ipv6_sock_mc_join(), ipv6_sock_mc_drop(),
inet6_mc_check(),
ipv6_dev_mc_inc(), __ipv6_dev_mc_dec(), ipv6_dev_mc_dec(),
ipv6_chk_mcast_addr()
- net/ipv6/route.c:
rt6_lookup(), icmp6_dst_alloc()
- net/ipv6/ip6_output.c:
ip6_nd_hdr()
- net/ipv6/ndisc.c:
ndisc_send_ns(), ndisc_send_rs(), ndisc_send_redirect(),
ndisc_get_neigh(), __ndisc_send()
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
2008-04-10 06:42:10 +00:00
|
|
|
void ndisc_send_rs(struct net_device *dev, const struct in6_addr *saddr,
|
|
|
|
const struct in6_addr *daddr)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
2013-01-21 06:49:13 +00:00
|
|
|
struct sk_buff *skb;
|
2013-01-21 06:49:17 +00:00
|
|
|
struct rs_msg *msg;
|
2007-04-26 00:08:10 +00:00
|
|
|
int send_sllao = dev->addr_len;
|
2013-01-21 06:49:17 +00:00
|
|
|
int optlen = 0;
|
2007-04-26 00:08:10 +00:00
|
|
|
|
|
|
|
#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
|
|
|
|
/*
|
|
|
|
* According to section 2.2 of RFC 4429, we must not
|
|
|
|
* send router solicitations with a sllao from
|
|
|
|
* optimistic addresses, but we may send the solicitation
|
|
|
|
* if we don't include the sllao. So here we check
|
|
|
|
* if our address is optimistic, and if so, we
|
2007-12-20 22:01:35 +00:00
|
|
|
* suppress the inclusion of the sllao.
|
2007-04-26 00:08:10 +00:00
|
|
|
*/
|
|
|
|
if (send_sllao) {
|
2008-03-25 12:47:49 +00:00
|
|
|
struct inet6_ifaddr *ifp = ipv6_get_ifaddr(dev_net(dev), saddr,
|
2008-01-11 06:44:09 +00:00
|
|
|
dev, 1);
|
2007-04-26 00:08:10 +00:00
|
|
|
if (ifp) {
|
|
|
|
if (ifp->flags & IFA_F_OPTIMISTIC) {
|
2007-02-28 14:13:20 +00:00
|
|
|
send_sllao = 0;
|
2007-04-26 00:08:10 +00:00
|
|
|
}
|
2007-02-28 14:13:20 +00:00
|
|
|
in6_ifa_put(ifp);
|
2007-04-26 00:08:10 +00:00
|
|
|
} else {
|
|
|
|
send_sllao = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
2013-01-21 06:49:17 +00:00
|
|
|
if (send_sllao)
|
2016-06-15 19:20:23 +00:00
|
|
|
optlen += ndisc_opt_addr_space(dev, NDISC_ROUTER_SOLICITATION);
|
2013-01-21 06:49:17 +00:00
|
|
|
|
|
|
|
skb = ndisc_alloc_skb(dev, sizeof(*msg) + optlen);
|
2013-01-21 06:49:13 +00:00
|
|
|
if (!skb)
|
|
|
|
return;
|
|
|
|
|
networking: make skb_put & friends return void pointers
It seems like a historic accident that these return unsigned char *,
and in many places that means casts are required, more often than not.
Make these functions (skb_put, __skb_put and pskb_put) return void *
and remove all the casts across the tree, adding a (u8 *) cast only
where the unsigned char pointer was used directly, all done with the
following spatch:
@@
expression SKB, LEN;
typedef u8;
identifier fn = { skb_put, __skb_put };
@@
- *(fn(SKB, LEN))
+ *(u8 *)fn(SKB, LEN)
@@
expression E, SKB, LEN;
identifier fn = { skb_put, __skb_put };
type T;
@@
- E = ((T *)(fn(SKB, LEN)))
+ E = fn(SKB, LEN)
which actually doesn't cover pskb_put since there are only three
users overall.
A handful of stragglers were converted manually, notably a macro in
drivers/isdn/i4l/isdn_bsdcomp.c and, oddly enough, one of the many
instances in net/bluetooth/hci_sock.c. In the former file, I also
had to fix one whitespace problem spatch introduced.
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 12:29:21 +00:00
|
|
|
msg = skb_put(skb, sizeof(*msg));
|
2013-01-21 06:49:17 +00:00
|
|
|
*msg = (struct rs_msg) {
|
|
|
|
.icmph = {
|
|
|
|
.icmp6_type = NDISC_ROUTER_SOLICITATION,
|
|
|
|
},
|
|
|
|
};
|
|
|
|
|
|
|
|
if (send_sllao)
|
|
|
|
ndisc_fill_addr_option(skb, ND_OPT_SOURCE_LL_ADDR,
|
2016-06-15 19:20:23 +00:00
|
|
|
dev->dev_addr,
|
|
|
|
NDISC_ROUTER_SOLICITATION);
|
2013-01-21 06:49:17 +00:00
|
|
|
|
2013-01-21 06:49:13 +00:00
|
|
|
ndisc_send_skb(skb, daddr, saddr);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
2007-02-09 14:24:49 +00:00
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
static void ndisc_error_report(struct neighbour *neigh, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* "The sender MUST return an ICMP
|
|
|
|
* destination unreachable"
|
|
|
|
*/
|
|
|
|
dst_link_failure(skb);
|
|
|
|
kfree_skb(skb);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Called with locked neigh: either read or both */
|
|
|
|
|
|
|
|
static void ndisc_solicit(struct neighbour *neigh, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct in6_addr *saddr = NULL;
|
|
|
|
struct in6_addr mcaddr;
|
|
|
|
struct net_device *dev = neigh->dev;
|
|
|
|
struct in6_addr *target = (struct in6_addr *)&neigh->primary_key;
|
|
|
|
int probes = atomic_read(&neigh->probes);
|
|
|
|
|
2015-02-04 11:01:23 +00:00
|
|
|
if (skb && ipv6_chk_addr_and_flags(dev_net(dev), &ipv6_hdr(skb)->saddr,
|
2018-03-13 15:29:37 +00:00
|
|
|
dev, false, 1,
|
2015-02-04 11:01:23 +00:00
|
|
|
IFA_F_TENTATIVE|IFA_F_OPTIMISTIC))
|
2007-04-26 00:54:47 +00:00
|
|
|
saddr = &ipv6_hdr(skb)->saddr;
|
2014-11-23 21:28:43 +00:00
|
|
|
probes -= NEIGH_VAR(neigh->parms, UCAST_PROBES);
|
|
|
|
if (probes < 0) {
|
2005-04-16 22:20:36 +00:00
|
|
|
if (!(neigh->nud_state & NUD_VALID)) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(1, dbg,
|
|
|
|
"%s: trying to ucast probe in NUD_INVALID: %pI6\n",
|
|
|
|
__func__, target);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
2016-12-02 22:00:08 +00:00
|
|
|
ndisc_send_ns(dev, target, target, saddr, 0);
|
2013-12-07 18:26:53 +00:00
|
|
|
} else if ((probes -= NEIGH_VAR(neigh->parms, APP_PROBES)) < 0) {
|
2005-04-16 22:20:36 +00:00
|
|
|
neigh_app_ns(neigh);
|
|
|
|
} else {
|
|
|
|
addrconf_addr_solict_mult(target, &mcaddr);
|
2016-12-02 22:00:08 +00:00
|
|
|
ndisc_send_ns(dev, target, &mcaddr, saddr, 0);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-03-28 04:37:58 +00:00
|
|
|
static int pndisc_is_router(const void *pkey,
|
|
|
|
struct net_device *dev)
|
2008-03-24 21:48:59 +00:00
|
|
|
{
|
|
|
|
struct pneigh_entry *n;
|
2008-03-28 04:37:58 +00:00
|
|
|
int ret = -1;
|
2008-03-24 21:48:59 +00:00
|
|
|
|
|
|
|
read_lock_bh(&nd_tbl.lock);
|
2008-03-28 04:37:58 +00:00
|
|
|
n = __pneigh_lookup(&nd_tbl, dev_net(dev), pkey, dev);
|
|
|
|
if (n)
|
|
|
|
ret = !!(n->flags & NTF_ROUTER);
|
2008-03-24 21:48:59 +00:00
|
|
|
read_unlock_bh(&nd_tbl.lock);
|
|
|
|
|
2008-03-28 04:37:58 +00:00
|
|
|
return ret;
|
2008-03-24 21:48:59 +00:00
|
|
|
}
|
|
|
|
|
2016-06-15 19:20:23 +00:00
|
|
|
void ndisc_update(const struct net_device *dev, struct neighbour *neigh,
|
|
|
|
const u8 *lladdr, u8 new, u32 flags, u8 icmp6_type,
|
|
|
|
struct ndisc_options *ndopts)
|
|
|
|
{
|
2017-03-20 05:01:28 +00:00
|
|
|
neigh_update(neigh, lladdr, new, flags, 0);
|
2016-06-15 19:20:23 +00:00
|
|
|
/* report ndisc ops about neighbour update */
|
|
|
|
ndisc_ops_update(dev, neigh, flags, icmp6_type, ndopts);
|
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
static void ndisc_recv_ns(struct sk_buff *skb)
|
|
|
|
{
|
2007-04-26 01:04:18 +00:00
|
|
|
struct nd_msg *msg = (struct nd_msg *)skb_transport_header(skb);
|
2011-04-22 04:53:02 +00:00
|
|
|
const struct in6_addr *saddr = &ipv6_hdr(skb)->saddr;
|
|
|
|
const struct in6_addr *daddr = &ipv6_hdr(skb)->daddr;
|
2005-04-16 22:20:36 +00:00
|
|
|
u8 *lladdr = NULL;
|
2013-05-28 20:34:26 +00:00
|
|
|
u32 ndoptlen = skb_tail_pointer(skb) - (skb_transport_header(skb) +
|
2007-04-20 03:29:13 +00:00
|
|
|
offsetof(struct nd_msg, opt));
|
2005-04-16 22:20:36 +00:00
|
|
|
struct ndisc_options ndopts;
|
|
|
|
struct net_device *dev = skb->dev;
|
|
|
|
struct inet6_ifaddr *ifp;
|
|
|
|
struct inet6_dev *idev = NULL;
|
|
|
|
struct neighbour *neigh;
|
|
|
|
int dad = ipv6_addr_any(saddr);
|
2012-05-18 18:57:34 +00:00
|
|
|
bool inc;
|
2008-03-28 04:37:58 +00:00
|
|
|
int is_router = -1;
|
2016-12-02 22:00:08 +00:00
|
|
|
u64 nonce = 0;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2013-01-18 02:05:03 +00:00
|
|
|
if (skb->len < sizeof(struct nd_msg)) {
|
|
|
|
ND_PRINTK(2, warn, "NS: packet too short\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
if (ipv6_addr_is_multicast(&msg->target)) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn, "NS: multicast target address\n");
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* RFC2461 7.1.1:
|
|
|
|
* DAD has to be destined for solicited node multicast address.
|
|
|
|
*/
|
2013-01-20 07:39:00 +00:00
|
|
|
if (dad && !ipv6_addr_is_solict_mult(daddr)) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn, "NS: bad DAD packet (wrong destination)\n");
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-06-15 19:20:23 +00:00
|
|
|
if (!ndisc_parse_options(dev, msg->opt, ndoptlen, &ndopts)) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn, "NS: invalid ND options\n");
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ndopts.nd_opts_src_lladdr) {
|
|
|
|
lladdr = ndisc_opt_addr_data(ndopts.nd_opts_src_lladdr, dev);
|
|
|
|
if (!lladdr) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn,
|
|
|
|
"NS: invalid link-layer address length\n");
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* RFC2461 7.1.1:
|
2007-02-09 14:24:49 +00:00
|
|
|
* If the IP source address is the unspecified address,
|
|
|
|
* there MUST NOT be source link-layer address option
|
2005-04-16 22:20:36 +00:00
|
|
|
* in the message.
|
|
|
|
*/
|
|
|
|
if (dad) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn,
|
|
|
|
"NS: bad DAD packet (link-layer address option)\n");
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
ipv6: make DAD fail with enhanced DAD when nonce length differs
Commit adc176c54722 ("ipv6 addrconf: Implemented enhanced DAD (RFC7527)")
added enhanced DAD with a nonce length of 6 bytes. However, RFC7527
doesn't specify the length of the nonce, other than being 6 + 8*k bytes,
with integer k >= 0 (RFC3971 5.3.2). The current implementation simply
assumes that the nonce will always be 6 bytes, but others systems are
free to choose different sizes.
If another system sends a nonce of different length but with the same 6
bytes prefix, it shouldn't be considered as the same nonce. Thus, check
that the length of the received nonce is the same as the length we sent.
Ugly scapy test script running on veth0:
def loop():
pkt=sniff(iface="veth0", filter="icmp6", count=1)
pkt = pkt[0]
b = bytearray(pkt[Raw].load)
b[1] += 1
b += b'\xde\xad\xbe\xef\xde\xad\xbe\xef'
pkt[Raw].load = bytes(b)
pkt[IPv6].plen += 8
# fixup checksum after modifying the payload
pkt[IPv6].payload.cksum -= 0x3b44
if pkt[IPv6].payload.cksum < 0:
pkt[IPv6].payload.cksum += 0xffff
sendp(pkt, iface="veth0")
This should result in DAD failure for any address added to veth0's peer,
but is currently ignored.
Fixes: adc176c54722 ("ipv6 addrconf: Implemented enhanced DAD (RFC7527)")
Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
Reviewed-by: Stefano Brivio <sbrivio@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-07-13 15:21:42 +00:00
|
|
|
if (ndopts.nd_opts_nonce && ndopts.nd_opts_nonce->nd_opt_len == 1)
|
2016-12-02 22:00:08 +00:00
|
|
|
memcpy(&nonce, (u8 *)(ndopts.nd_opts_nonce + 1), 6);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
inc = ipv6_addr_is_multicast(daddr);
|
|
|
|
|
2008-03-25 12:47:49 +00:00
|
|
|
ifp = ipv6_get_ifaddr(dev_net(dev), &msg->target, dev, 1);
|
2008-03-07 19:14:49 +00:00
|
|
|
if (ifp) {
|
2015-10-12 18:47:10 +00:00
|
|
|
have_ifp:
|
2007-04-26 00:08:10 +00:00
|
|
|
if (ifp->flags & (IFA_F_TENTATIVE|IFA_F_OPTIMISTIC)) {
|
|
|
|
if (dad) {
|
2016-12-02 22:00:08 +00:00
|
|
|
if (nonce != 0 && ifp->dad_nonce == nonce) {
|
|
|
|
u8 *np = (u8 *)&nonce;
|
|
|
|
/* Matching nonce if looped back */
|
|
|
|
ND_PRINTK(2, notice,
|
|
|
|
"%s: IPv6 DAD loopback for address %pI6c nonce %pM ignored\n",
|
|
|
|
ifp->idev->dev->name,
|
|
|
|
&ifp->addr, np);
|
|
|
|
goto out;
|
|
|
|
}
|
2007-04-26 00:08:10 +00:00
|
|
|
/*
|
|
|
|
* We are colliding with another node
|
|
|
|
* who is doing DAD
|
|
|
|
* so fail our DAD process
|
|
|
|
*/
|
2017-10-30 23:38:52 +00:00
|
|
|
addrconf_dad_failure(skb, ifp);
|
2007-09-11 09:04:49 +00:00
|
|
|
return;
|
2007-04-26 00:08:10 +00:00
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* This is not a dad solicitation.
|
|
|
|
* If we are an optimistic node,
|
|
|
|
* we should respond.
|
|
|
|
* Otherwise, we should ignore it.
|
|
|
|
*/
|
|
|
|
if (!(ifp->flags & IFA_F_OPTIMISTIC))
|
2005-04-16 22:20:36 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
idev = ifp->idev;
|
|
|
|
} else {
|
2008-07-20 05:35:03 +00:00
|
|
|
struct net *net = dev_net(dev);
|
|
|
|
|
2015-10-12 18:47:10 +00:00
|
|
|
/* perhaps an address on the master device */
|
|
|
|
if (netif_is_l3_slave(dev)) {
|
|
|
|
struct net_device *mdev;
|
|
|
|
|
|
|
|
mdev = netdev_master_upper_dev_get_rcu(dev);
|
|
|
|
if (mdev) {
|
|
|
|
ifp = ipv6_get_ifaddr(net, &msg->target, mdev, 1);
|
|
|
|
if (ifp)
|
|
|
|
goto have_ifp;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
idev = in6_dev_get(dev);
|
|
|
|
if (!idev) {
|
|
|
|
/* XXX: count this drop? */
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2008-07-20 05:35:03 +00:00
|
|
|
if (ipv6_chk_acast_addr(net, dev, &msg->target) ||
|
2007-02-09 14:24:49 +00:00
|
|
|
(idev->cnf.forwarding &&
|
2008-07-20 05:35:03 +00:00
|
|
|
(net->ipv6.devconf_all->proxy_ndp || idev->cnf.proxy_ndp) &&
|
2008-03-28 04:37:58 +00:00
|
|
|
(is_router = pndisc_is_router(&msg->target, dev)) >= 0)) {
|
2005-08-15 00:24:31 +00:00
|
|
|
if (!(NEIGH_CB(skb)->flags & LOCALLY_ENQUEUED) &&
|
2005-04-16 22:20:36 +00:00
|
|
|
skb->pkt_type != PACKET_HOST &&
|
2013-07-13 08:26:51 +00:00
|
|
|
inc &&
|
2013-12-07 18:26:53 +00:00
|
|
|
NEIGH_VAR(idev->nd_parms, PROXY_DELAY) != 0) {
|
2005-04-16 22:20:36 +00:00
|
|
|
/*
|
|
|
|
* for anycast or proxy,
|
2007-02-09 14:24:49 +00:00
|
|
|
* sender should delay its response
|
|
|
|
* by a random time between 0 and
|
2005-04-16 22:20:36 +00:00
|
|
|
* MAX_ANYCAST_DELAY_TIME seconds.
|
|
|
|
* (RFC2461) -- yoshfuji
|
|
|
|
*/
|
|
|
|
struct sk_buff *n = skb_clone(skb, GFP_ATOMIC);
|
|
|
|
if (n)
|
|
|
|
pneigh_enqueue(&nd_tbl, idev->nd_parms, n);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
} else
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2008-03-28 04:37:58 +00:00
|
|
|
if (is_router < 0)
|
2013-01-20 07:39:18 +00:00
|
|
|
is_router = idev->cnf.forwarding;
|
2006-09-22 21:43:19 +00:00
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
if (dad) {
|
2015-09-22 16:57:13 +00:00
|
|
|
ndisc_send_na(dev, &in6addr_linklocal_allnodes, &msg->target,
|
2013-01-20 07:39:18 +00:00
|
|
|
!!is_router, false, (ifp != NULL), true);
|
2005-04-16 22:20:36 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (inc)
|
|
|
|
NEIGH_CACHE_STAT_INC(&nd_tbl, rcv_probes_mcast);
|
|
|
|
else
|
|
|
|
NEIGH_CACHE_STAT_INC(&nd_tbl, rcv_probes_ucast);
|
|
|
|
|
2007-02-09 14:24:49 +00:00
|
|
|
/*
|
2005-04-16 22:20:36 +00:00
|
|
|
* update / create cache entry
|
|
|
|
* for the source address
|
|
|
|
*/
|
|
|
|
neigh = __neigh_lookup(&nd_tbl, saddr, dev,
|
|
|
|
!inc || lladdr || !dev->addr_len);
|
|
|
|
if (neigh)
|
2016-06-15 19:20:23 +00:00
|
|
|
ndisc_update(dev, neigh, lladdr, NUD_STALE,
|
2005-04-16 22:20:36 +00:00
|
|
|
NEIGH_UPDATE_F_WEAK_OVERRIDE|
|
2016-06-15 19:20:23 +00:00
|
|
|
NEIGH_UPDATE_F_OVERRIDE,
|
|
|
|
NDISC_NEIGHBOUR_SOLICITATION, &ndopts);
|
2007-10-09 08:40:57 +00:00
|
|
|
if (neigh || !dev->header_ops) {
|
2015-09-22 16:57:13 +00:00
|
|
|
ndisc_send_na(dev, saddr, &msg->target, !!is_router,
|
2013-01-20 07:39:18 +00:00
|
|
|
true, (ifp != NULL && inc), inc);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (neigh)
|
|
|
|
neigh_release(neigh);
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
if (ifp)
|
|
|
|
in6_ifa_put(ifp);
|
|
|
|
else
|
|
|
|
in6_dev_put(idev);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void ndisc_recv_na(struct sk_buff *skb)
|
|
|
|
{
|
2007-04-26 01:04:18 +00:00
|
|
|
struct nd_msg *msg = (struct nd_msg *)skb_transport_header(skb);
|
2014-05-15 07:56:14 +00:00
|
|
|
struct in6_addr *saddr = &ipv6_hdr(skb)->saddr;
|
2011-04-22 04:53:02 +00:00
|
|
|
const struct in6_addr *daddr = &ipv6_hdr(skb)->daddr;
|
2005-04-16 22:20:36 +00:00
|
|
|
u8 *lladdr = NULL;
|
2013-05-28 20:34:26 +00:00
|
|
|
u32 ndoptlen = skb_tail_pointer(skb) - (skb_transport_header(skb) +
|
2007-04-20 03:29:13 +00:00
|
|
|
offsetof(struct nd_msg, opt));
|
2005-04-16 22:20:36 +00:00
|
|
|
struct ndisc_options ndopts;
|
|
|
|
struct net_device *dev = skb->dev;
|
2016-02-04 12:31:20 +00:00
|
|
|
struct inet6_dev *idev = __in6_dev_get(dev);
|
2005-04-16 22:20:36 +00:00
|
|
|
struct inet6_ifaddr *ifp;
|
|
|
|
struct neighbour *neigh;
|
2022-05-30 10:14:14 +00:00
|
|
|
u8 new_state;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
if (skb->len < sizeof(struct nd_msg)) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn, "NA: packet too short\n");
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ipv6_addr_is_multicast(&msg->target)) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn, "NA: target address is multicast\n");
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ipv6_addr_is_multicast(daddr) &&
|
|
|
|
msg->icmph.icmp6_solicited) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn, "NA: solicited NA is multicasted\n");
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
|
|
|
}
|
2007-02-09 14:24:49 +00:00
|
|
|
|
2016-02-04 12:31:20 +00:00
|
|
|
/* For some 802.11 wireless deployments (and possibly other networks),
|
|
|
|
* there will be a NA proxy and unsolicitd packets are attacks
|
|
|
|
* and thus should not be accepted.
|
2022-05-30 10:14:14 +00:00
|
|
|
* drop_unsolicited_na takes precedence over accept_untracked_na
|
2016-02-04 12:31:20 +00:00
|
|
|
*/
|
|
|
|
if (!msg->icmph.icmp6_solicited && idev &&
|
|
|
|
idev->cnf.drop_unsolicited_na)
|
|
|
|
return;
|
|
|
|
|
2016-06-15 19:20:23 +00:00
|
|
|
if (!ndisc_parse_options(dev, msg->opt, ndoptlen, &ndopts)) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn, "NS: invalid ND option\n");
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (ndopts.nd_opts_tgt_lladdr) {
|
|
|
|
lladdr = ndisc_opt_addr_data(ndopts.nd_opts_tgt_lladdr, dev);
|
|
|
|
if (!lladdr) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn,
|
|
|
|
"NA: invalid link-layer address length\n");
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
2008-03-25 12:47:49 +00:00
|
|
|
ifp = ipv6_get_ifaddr(dev_net(dev), &msg->target, dev, 1);
|
2008-03-07 19:14:49 +00:00
|
|
|
if (ifp) {
|
2011-04-13 21:09:25 +00:00
|
|
|
if (skb->pkt_type != PACKET_LOOPBACK
|
|
|
|
&& (ifp->flags & IFA_F_TENTATIVE)) {
|
2017-10-30 23:38:52 +00:00
|
|
|
addrconf_dad_failure(skb, ifp);
|
2011-04-13 21:09:25 +00:00
|
|
|
return;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
/* What should we make now? The advertisement
|
|
|
|
is invalid, but ndisc specs say nothing
|
|
|
|
about it. It could be misconfiguration, or
|
|
|
|
an smart proxy agent tries to help us :-)
|
2008-12-09 23:48:32 +00:00
|
|
|
|
|
|
|
We should not print the error if NA has been
|
|
|
|
received from loopback - it is just our own
|
|
|
|
unsolicited advertisement.
|
2005-04-16 22:20:36 +00:00
|
|
|
*/
|
2008-12-09 23:48:32 +00:00
|
|
|
if (skb->pkt_type != PACKET_LOOPBACK)
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(1, warn,
|
2017-10-30 23:38:52 +00:00
|
|
|
"NA: %pM advertised our address %pI6c on %s!\n",
|
|
|
|
eth_hdr(skb)->h_source, &ifp->addr, ifp->idev->dev->name);
|
2005-04-16 22:20:36 +00:00
|
|
|
in6_ifa_put(ifp);
|
|
|
|
return;
|
|
|
|
}
|
2022-05-30 10:14:14 +00:00
|
|
|
|
|
|
|
neigh = neigh_lookup(&nd_tbl, &msg->target, dev);
|
|
|
|
|
2022-04-15 08:34:02 +00:00
|
|
|
/* RFC 9131 updates original Neighbour Discovery RFC 4861.
|
2022-05-30 10:14:14 +00:00
|
|
|
* NAs with Target LL Address option without a corresponding
|
|
|
|
* entry in the neighbour cache can now create a STALE neighbour
|
|
|
|
* cache entry on routers.
|
|
|
|
*
|
|
|
|
* entry accept fwding solicited behaviour
|
|
|
|
* ------- ------ ------ --------- ----------------------
|
|
|
|
* present X X 0 Set state to STALE
|
|
|
|
* present X X 1 Set state to REACHABLE
|
|
|
|
* absent 0 X X Do nothing
|
|
|
|
* absent 1 0 X Do nothing
|
|
|
|
* absent 1 1 X Add a new STALE entry
|
2022-04-15 08:34:02 +00:00
|
|
|
*
|
|
|
|
* Note that we don't do a (daddr == all-routers-mcast) check.
|
|
|
|
*/
|
2022-05-30 10:14:14 +00:00
|
|
|
new_state = msg->icmph.icmp6_solicited ? NUD_REACHABLE : NUD_STALE;
|
|
|
|
if (!neigh && lladdr &&
|
|
|
|
idev && idev->cnf.forwarding &&
|
|
|
|
idev->cnf.accept_untracked_na) {
|
|
|
|
neigh = neigh_create(&nd_tbl, &msg->target, dev);
|
|
|
|
new_state = NUD_STALE;
|
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2022-05-30 10:14:14 +00:00
|
|
|
if (neigh && !IS_ERR(neigh)) {
|
2005-04-16 22:20:36 +00:00
|
|
|
u8 old_flags = neigh->flags;
|
2008-07-20 05:35:03 +00:00
|
|
|
struct net *net = dev_net(dev);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
if (neigh->nud_state & NUD_FAILED)
|
|
|
|
goto out;
|
|
|
|
|
2006-09-22 21:42:46 +00:00
|
|
|
/*
|
|
|
|
* Don't update the neighbor cache entry on a proxy NA from
|
|
|
|
* ourselves because either the proxied node is off link or it
|
|
|
|
* has already sent a NA to us.
|
|
|
|
*/
|
|
|
|
if (lladdr && !memcmp(lladdr, dev->dev_addr, dev->addr_len) &&
|
2008-07-20 05:35:03 +00:00
|
|
|
net->ipv6.devconf_all->forwarding && net->ipv6.devconf_all->proxy_ndp &&
|
|
|
|
pneigh_lookup(&nd_tbl, net, &msg->target, dev, 0)) {
|
2012-11-07 05:05:38 +00:00
|
|
|
/* XXX: idev->cnf.proxy_ndp */
|
2006-09-22 21:42:46 +00:00
|
|
|
goto out;
|
2006-09-22 21:43:49 +00:00
|
|
|
}
|
2006-09-22 21:42:46 +00:00
|
|
|
|
2016-06-15 19:20:23 +00:00
|
|
|
ndisc_update(dev, neigh, lladdr,
|
2022-05-30 10:14:14 +00:00
|
|
|
new_state,
|
2005-04-16 22:20:36 +00:00
|
|
|
NEIGH_UPDATE_F_WEAK_OVERRIDE|
|
|
|
|
(msg->icmph.icmp6_override ? NEIGH_UPDATE_F_OVERRIDE : 0)|
|
|
|
|
NEIGH_UPDATE_F_OVERRIDE_ISROUTER|
|
2016-06-15 19:20:23 +00:00
|
|
|
(msg->icmph.icmp6_router ? NEIGH_UPDATE_F_ISROUTER : 0),
|
|
|
|
NDISC_NEIGHBOUR_ADVERTISEMENT, &ndopts);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
if ((old_flags & ~neigh->flags) & NTF_ROUTER) {
|
|
|
|
/*
|
|
|
|
* Change: router to host
|
|
|
|
*/
|
2014-05-15 07:56:14 +00:00
|
|
|
rt6_clean_tohost(dev_net(dev), saddr);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
neigh_release(neigh);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void ndisc_recv_rs(struct sk_buff *skb)
|
|
|
|
{
|
2007-04-26 01:04:18 +00:00
|
|
|
struct rs_msg *rs_msg = (struct rs_msg *)skb_transport_header(skb);
|
2005-04-16 22:20:36 +00:00
|
|
|
unsigned long ndoptlen = skb->len - sizeof(*rs_msg);
|
|
|
|
struct neighbour *neigh;
|
|
|
|
struct inet6_dev *idev;
|
2011-04-22 04:53:02 +00:00
|
|
|
const struct in6_addr *saddr = &ipv6_hdr(skb)->saddr;
|
2005-04-16 22:20:36 +00:00
|
|
|
struct ndisc_options ndopts;
|
|
|
|
u8 *lladdr = NULL;
|
|
|
|
|
|
|
|
if (skb->len < sizeof(*rs_msg))
|
|
|
|
return;
|
|
|
|
|
2011-07-27 21:13:03 +00:00
|
|
|
idev = __in6_dev_get(skb->dev);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (!idev) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(1, err, "RS: can't find in6 device\n");
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Don't accept RS if we're not in router mode */
|
|
|
|
if (!idev->cnf.forwarding)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Don't update NCE if src = ::;
|
|
|
|
* this implies that the source node has no ip address assigned yet.
|
|
|
|
*/
|
|
|
|
if (ipv6_addr_any(saddr))
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
/* Parse ND options */
|
2016-06-15 19:20:23 +00:00
|
|
|
if (!ndisc_parse_options(skb->dev, rs_msg->opt, ndoptlen, &ndopts)) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, notice, "NS: invalid ND option, ignored\n");
|
2005-04-16 22:20:36 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ndopts.nd_opts_src_lladdr) {
|
|
|
|
lladdr = ndisc_opt_addr_data(ndopts.nd_opts_src_lladdr,
|
|
|
|
skb->dev);
|
|
|
|
if (!lladdr)
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
neigh = __neigh_lookup(&nd_tbl, saddr, skb->dev, 1);
|
|
|
|
if (neigh) {
|
2016-06-15 19:20:23 +00:00
|
|
|
ndisc_update(skb->dev, neigh, lladdr, NUD_STALE,
|
2005-04-16 22:20:36 +00:00
|
|
|
NEIGH_UPDATE_F_WEAK_OVERRIDE|
|
|
|
|
NEIGH_UPDATE_F_OVERRIDE|
|
2016-06-15 19:20:23 +00:00
|
|
|
NEIGH_UPDATE_F_OVERRIDE_ISROUTER,
|
|
|
|
NDISC_ROUTER_SOLICITATION, &ndopts);
|
2005-04-16 22:20:36 +00:00
|
|
|
neigh_release(neigh);
|
|
|
|
}
|
|
|
|
out:
|
2011-07-27 21:13:03 +00:00
|
|
|
return;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2007-10-11 04:22:05 +00:00
|
|
|
static void ndisc_ra_useropt(struct sk_buff *ra, struct nd_opt_hdr *opt)
|
|
|
|
{
|
|
|
|
struct icmp6hdr *icmp6h = (struct icmp6hdr *)skb_transport_header(ra);
|
|
|
|
struct sk_buff *skb;
|
|
|
|
struct nlmsghdr *nlh;
|
|
|
|
struct nduseroptmsg *ndmsg;
|
2008-03-25 12:47:49 +00:00
|
|
|
struct net *net = dev_net(ra->dev);
|
2007-10-11 04:22:05 +00:00
|
|
|
int err;
|
|
|
|
int base_size = NLMSG_ALIGN(sizeof(struct nduseroptmsg)
|
|
|
|
+ (opt->nd_opt_len << 3));
|
|
|
|
size_t msg_size = base_size + nla_total_size(sizeof(struct in6_addr));
|
|
|
|
|
|
|
|
skb = nlmsg_new(msg_size, GFP_ATOMIC);
|
2015-03-29 13:00:04 +00:00
|
|
|
if (!skb) {
|
2007-10-11 04:22:05 +00:00
|
|
|
err = -ENOBUFS;
|
|
|
|
goto errout;
|
|
|
|
}
|
|
|
|
|
|
|
|
nlh = nlmsg_put(skb, 0, 0, RTM_NEWNDUSEROPT, base_size, 0);
|
2015-03-29 13:00:04 +00:00
|
|
|
if (!nlh) {
|
2007-10-11 04:22:05 +00:00
|
|
|
goto nla_put_failure;
|
|
|
|
}
|
|
|
|
|
|
|
|
ndmsg = nlmsg_data(nlh);
|
|
|
|
ndmsg->nduseropt_family = AF_INET6;
|
2007-11-13 01:58:35 +00:00
|
|
|
ndmsg->nduseropt_ifindex = ra->dev->ifindex;
|
2007-10-11 04:22:05 +00:00
|
|
|
ndmsg->nduseropt_icmp_type = icmp6h->icmp6_type;
|
|
|
|
ndmsg->nduseropt_icmp_code = icmp6h->icmp6_code;
|
|
|
|
ndmsg->nduseropt_opts_len = opt->nd_opt_len << 3;
|
|
|
|
|
|
|
|
memcpy(ndmsg + 1, opt, opt->nd_opt_len << 3);
|
|
|
|
|
2015-03-29 14:59:25 +00:00
|
|
|
if (nla_put_in6_addr(skb, NDUSEROPT_SRCADDR, &ipv6_hdr(ra)->saddr))
|
2012-04-02 00:27:33 +00:00
|
|
|
goto nla_put_failure;
|
2007-10-11 04:22:05 +00:00
|
|
|
nlmsg_end(skb, nlh);
|
|
|
|
|
2009-02-25 07:18:28 +00:00
|
|
|
rtnl_notify(skb, net, 0, RTNLGRP_ND_USEROPT, NULL, GFP_ATOMIC);
|
2007-10-11 04:22:05 +00:00
|
|
|
return;
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(skb);
|
|
|
|
err = -EMSGSIZE;
|
|
|
|
errout:
|
2008-03-07 19:14:49 +00:00
|
|
|
rtnl_set_sk_err(net, RTNLGRP_ND_USEROPT, err);
|
2007-10-11 04:22:05 +00:00
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
static void ndisc_router_discovery(struct sk_buff *skb)
|
|
|
|
{
|
2007-04-26 01:04:18 +00:00
|
|
|
struct ra_msg *ra_msg = (struct ra_msg *)skb_transport_header(skb);
|
2005-04-16 22:20:36 +00:00
|
|
|
struct neighbour *neigh = NULL;
|
|
|
|
struct inet6_dev *in6_dev;
|
2018-04-18 00:33:26 +00:00
|
|
|
struct fib6_info *rt = NULL;
|
net: allow user to set metric on default route learned via Router Advertisement
For IPv4, default route is learned via DHCPv4 and user is allowed to change
metric using config etc/network/interfaces. But for IPv6, default route can
be learned via RA, for which, currently a fixed metric value 1024 is used.
Ideally, user should be able to configure metric on default route for IPv6
similar to IPv4. This patch adds sysctl for the same.
Logs:
For IPv4:
Config in etc/network/interfaces:
auto eth0
iface eth0 inet dhcp
metric 4261413864
IPv4 Kernel Route Table:
$ ip route list
default via 172.21.47.1 dev eth0 metric 4261413864
FRR Table, if a static route is configured:
[In real scenario, it is useful to prefer BGP learned default route over DHCPv4 default route.]
Codes: K - kernel route, C - connected, S - static, R - RIP,
O - OSPF, I - IS-IS, B - BGP, P - PIM, E - EIGRP, N - NHRP,
T - Table, v - VNC, V - VNC-Direct, A - Babel, D - SHARP,
> - selected route, * - FIB route
S>* 0.0.0.0/0 [20/0] is directly connected, eth0, 00:00:03
K 0.0.0.0/0 [254/1000] via 172.21.47.1, eth0, 6d08h51m
i.e. User can prefer Default Router learned via Routing Protocol in IPv4.
Similar behavior is not possible for IPv6, without this fix.
After fix [for IPv6]:
sudo sysctl -w net.ipv6.conf.eth0.net.ipv6.conf.eth0.ra_defrtr_metric=1996489705
IP monitor: [When IPv6 RA is received]
default via fe80::xx16:xxxx:feb3:ce8e dev eth0 proto ra metric 1996489705 pref high
Kernel IPv6 routing table
$ ip -6 route list
default via fe80::be16:65ff:feb3:ce8e dev eth0 proto ra metric 1996489705 expires 21sec hoplimit 64 pref high
FRR Table, if a static route is configured:
[In real scenario, it is useful to prefer BGP learned default route over IPv6 RA default route.]
Codes: K - kernel route, C - connected, S - static, R - RIPng,
O - OSPFv3, I - IS-IS, B - BGP, N - NHRP, T - Table,
v - VNC, V - VNC-Direct, A - Babel, D - SHARP,
> - selected route, * - FIB route
S>* ::/0 [20/0] is directly connected, eth0, 00:00:06
K ::/0 [119/1001] via fe80::xx16:xxxx:feb3:ce8e, eth0, 6d07h43m
If the metric is changed later, the effect will be seen only when next IPv6
RA is received, because the default route must be fully controlled by RA msg.
Below metric is changed from 1996489705 to 1996489704.
$ sudo sysctl -w net.ipv6.conf.eth0.ra_defrtr_metric=1996489704
net.ipv6.conf.eth0.ra_defrtr_metric = 1996489704
IP monitor:
[On next IPv6 RA msg, Kernel deletes prev route and installs new route with updated metric]
Deleted default via fe80::xx16:xxxx:feb3:ce8e dev eth0 proto ra metric 1996489705 expires 3sec hoplimit 64 pref high
default via fe80::xx16:xxxx:feb3:ce8e dev eth0 proto ra metric 1996489704 pref high
Signed-off-by: Praveen Chaudhary <pchaudhary@linkedin.com>
Signed-off-by: Zhenggen Xu <zxu@linkedin.com>
Reviewed-by: David Ahern <dsahern@kernel.org>
Link: https://lore.kernel.org/r/20210125214430.24079-1-pchaudhary@linkedin.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
2021-01-25 21:44:30 +00:00
|
|
|
u32 defrtr_usr_metric;
|
2018-04-18 00:33:11 +00:00
|
|
|
struct net *net;
|
2005-04-16 22:20:36 +00:00
|
|
|
int lifetime;
|
|
|
|
struct ndisc_options ndopts;
|
|
|
|
int optlen;
|
2006-03-21 01:04:53 +00:00
|
|
|
unsigned int pref = 0;
|
2015-08-31 13:59:22 +00:00
|
|
|
__u32 old_if_flags;
|
2015-08-31 23:57:30 +00:00
|
|
|
bool send_ifinfo_notify = false;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2014-08-24 20:53:10 +00:00
|
|
|
__u8 *opt = (__u8 *)(ra_msg + 1);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2013-05-28 20:34:26 +00:00
|
|
|
optlen = (skb_tail_pointer(skb) - skb_transport_header(skb)) -
|
|
|
|
sizeof(struct ra_msg);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2014-06-25 21:44:52 +00:00
|
|
|
ND_PRINTK(2, info,
|
|
|
|
"RA: %s, dev: %s\n",
|
|
|
|
__func__, skb->dev->name);
|
2007-04-26 00:54:47 +00:00
|
|
|
if (!(ipv6_addr_type(&ipv6_hdr(skb)->saddr) & IPV6_ADDR_LINKLOCAL)) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn, "RA: source address is not link-local\n");
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (optlen < 0) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn, "RA: packet too short\n");
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2008-03-16 03:59:18 +00:00
|
|
|
#ifdef CONFIG_IPV6_NDISC_NODETYPE
|
2008-03-11 22:35:59 +00:00
|
|
|
if (skb->ndisc_nodetype == NDISC_NODETYPE_HOST) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn, "RA: from host or unauthorized router\n");
|
2008-03-11 22:35:59 +00:00
|
|
|
return;
|
|
|
|
}
|
2008-03-16 03:59:18 +00:00
|
|
|
#endif
|
2008-03-11 22:35:59 +00:00
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
/*
|
|
|
|
* set the RA_RECV flag in the interface
|
|
|
|
*/
|
|
|
|
|
2011-07-27 21:13:03 +00:00
|
|
|
in6_dev = __in6_dev_get(skb->dev);
|
2015-03-29 13:00:04 +00:00
|
|
|
if (!in6_dev) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(0, err, "RA: can't find inet6 device for %s\n",
|
|
|
|
skb->dev->name);
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-06-15 19:20:23 +00:00
|
|
|
if (!ndisc_parse_options(skb->dev, opt, optlen, &ndopts)) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn, "RA: invalid ND options\n");
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-06-25 21:44:52 +00:00
|
|
|
if (!ipv6_accept_ra(in6_dev)) {
|
|
|
|
ND_PRINTK(2, info,
|
|
|
|
"RA: %s, did not accept ra for dev: %s\n",
|
|
|
|
__func__, skb->dev->name);
|
2009-08-29 07:04:09 +00:00
|
|
|
goto skip_linkparms;
|
2014-06-25 21:44:52 +00:00
|
|
|
}
|
2009-08-29 07:04:09 +00:00
|
|
|
|
2008-03-16 03:59:18 +00:00
|
|
|
#ifdef CONFIG_IPV6_NDISC_NODETYPE
|
2008-03-11 22:35:59 +00:00
|
|
|
/* skip link-specific parameters from interior routers */
|
2014-06-25 21:44:52 +00:00
|
|
|
if (skb->ndisc_nodetype == NDISC_NODETYPE_NODEFAULT) {
|
|
|
|
ND_PRINTK(2, info,
|
|
|
|
"RA: %s, nodetype is NODEFAULT, dev: %s\n",
|
|
|
|
__func__, skb->dev->name);
|
2008-03-11 22:35:59 +00:00
|
|
|
goto skip_linkparms;
|
2014-06-25 21:44:52 +00:00
|
|
|
}
|
2008-03-16 03:59:18 +00:00
|
|
|
#endif
|
2008-03-11 22:35:59 +00:00
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
if (in6_dev->if_flags & IF_RS_SENT) {
|
|
|
|
/*
|
|
|
|
* flag that an RA was received after an RS was sent
|
|
|
|
* out on this interface.
|
|
|
|
*/
|
|
|
|
in6_dev->if_flags |= IF_RA_RCVD;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Remember the managed/otherconf flags from most recently
|
|
|
|
* received RA message (RFC 2462) -- yoshfuji
|
|
|
|
*/
|
2015-08-31 13:59:22 +00:00
|
|
|
old_if_flags = in6_dev->if_flags;
|
2005-04-16 22:20:36 +00:00
|
|
|
in6_dev->if_flags = (in6_dev->if_flags & ~(IF_RA_MANAGED |
|
|
|
|
IF_RA_OTHERCONF)) |
|
|
|
|
(ra_msg->icmph.icmp6_addrconf_managed ?
|
|
|
|
IF_RA_MANAGED : 0) |
|
|
|
|
(ra_msg->icmph.icmp6_addrconf_other ?
|
|
|
|
IF_RA_OTHERCONF : 0);
|
|
|
|
|
2015-08-31 13:59:22 +00:00
|
|
|
if (old_if_flags != in6_dev->if_flags)
|
2015-08-31 23:57:30 +00:00
|
|
|
send_ifinfo_notify = true;
|
2015-08-31 13:59:22 +00:00
|
|
|
|
2014-06-25 21:44:52 +00:00
|
|
|
if (!in6_dev->cnf.accept_ra_defrtr) {
|
|
|
|
ND_PRINTK(2, info,
|
|
|
|
"RA: %s, defrtr is false for dev: %s\n",
|
|
|
|
__func__, skb->dev->name);
|
2006-03-21 00:55:08 +00:00
|
|
|
goto skip_defrtr;
|
2014-06-25 21:44:52 +00:00
|
|
|
}
|
2006-03-21 00:55:08 +00:00
|
|
|
|
2014-06-25 21:44:53 +00:00
|
|
|
/* Do not accept RA with source-addr found on local machine unless
|
|
|
|
* accept_ra_from_local is set to true.
|
|
|
|
*/
|
2018-04-18 00:33:11 +00:00
|
|
|
net = dev_net(in6_dev->dev);
|
2014-07-10 10:02:46 +00:00
|
|
|
if (!in6_dev->cnf.accept_ra_from_local &&
|
2018-04-18 00:33:11 +00:00
|
|
|
ipv6_chk_addr(net, &ipv6_hdr(skb)->saddr, in6_dev->dev, 0)) {
|
2014-06-25 21:44:52 +00:00
|
|
|
ND_PRINTK(2, info,
|
2014-06-25 21:44:53 +00:00
|
|
|
"RA from local address detected on dev: %s: default router ignored\n",
|
|
|
|
skb->dev->name);
|
2011-10-24 23:13:15 +00:00
|
|
|
goto skip_defrtr;
|
2014-06-25 21:44:52 +00:00
|
|
|
}
|
2011-10-24 23:13:15 +00:00
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
lifetime = ntohs(ra_msg->icmph.icmp6_rt_lifetime);
|
|
|
|
|
2006-03-21 01:04:53 +00:00
|
|
|
#ifdef CONFIG_IPV6_ROUTER_PREF
|
|
|
|
pref = ra_msg->icmph.icmp6_router_pref;
|
|
|
|
/* 10b is handled as if it were 00b (medium) */
|
2006-03-21 01:05:30 +00:00
|
|
|
if (pref == ICMPV6_ROUTER_PREF_INVALID ||
|
2007-06-22 23:07:04 +00:00
|
|
|
!in6_dev->cnf.accept_ra_rtr_pref)
|
2006-03-21 01:04:53 +00:00
|
|
|
pref = ICMPV6_ROUTER_PREF_MEDIUM;
|
|
|
|
#endif
|
2019-06-04 03:19:52 +00:00
|
|
|
/* routes added from RAs do not use nexthop objects */
|
2018-04-18 00:33:11 +00:00
|
|
|
rt = rt6_get_dflt_router(net, &ipv6_hdr(skb)->saddr, skb->dev);
|
2012-01-27 23:07:56 +00:00
|
|
|
if (rt) {
|
2019-05-23 03:27:59 +00:00
|
|
|
neigh = ip6_neigh_lookup(&rt->fib6_nh->fib_nh_gw6,
|
|
|
|
rt->fib6_nh->fib_nh_dev, NULL,
|
2018-04-18 00:33:21 +00:00
|
|
|
&ipv6_hdr(skb)->saddr);
|
2012-01-27 23:07:56 +00:00
|
|
|
if (!neigh) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(0, err,
|
|
|
|
"RA: %s got default router without neighbour\n",
|
|
|
|
__func__);
|
2018-04-18 00:33:25 +00:00
|
|
|
fib6_info_release(rt);
|
2012-01-27 23:07:56 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
net: allow user to set metric on default route learned via Router Advertisement
For IPv4, default route is learned via DHCPv4 and user is allowed to change
metric using config etc/network/interfaces. But for IPv6, default route can
be learned via RA, for which, currently a fixed metric value 1024 is used.
Ideally, user should be able to configure metric on default route for IPv6
similar to IPv4. This patch adds sysctl for the same.
Logs:
For IPv4:
Config in etc/network/interfaces:
auto eth0
iface eth0 inet dhcp
metric 4261413864
IPv4 Kernel Route Table:
$ ip route list
default via 172.21.47.1 dev eth0 metric 4261413864
FRR Table, if a static route is configured:
[In real scenario, it is useful to prefer BGP learned default route over DHCPv4 default route.]
Codes: K - kernel route, C - connected, S - static, R - RIP,
O - OSPF, I - IS-IS, B - BGP, P - PIM, E - EIGRP, N - NHRP,
T - Table, v - VNC, V - VNC-Direct, A - Babel, D - SHARP,
> - selected route, * - FIB route
S>* 0.0.0.0/0 [20/0] is directly connected, eth0, 00:00:03
K 0.0.0.0/0 [254/1000] via 172.21.47.1, eth0, 6d08h51m
i.e. User can prefer Default Router learned via Routing Protocol in IPv4.
Similar behavior is not possible for IPv6, without this fix.
After fix [for IPv6]:
sudo sysctl -w net.ipv6.conf.eth0.net.ipv6.conf.eth0.ra_defrtr_metric=1996489705
IP monitor: [When IPv6 RA is received]
default via fe80::xx16:xxxx:feb3:ce8e dev eth0 proto ra metric 1996489705 pref high
Kernel IPv6 routing table
$ ip -6 route list
default via fe80::be16:65ff:feb3:ce8e dev eth0 proto ra metric 1996489705 expires 21sec hoplimit 64 pref high
FRR Table, if a static route is configured:
[In real scenario, it is useful to prefer BGP learned default route over IPv6 RA default route.]
Codes: K - kernel route, C - connected, S - static, R - RIPng,
O - OSPFv3, I - IS-IS, B - BGP, N - NHRP, T - Table,
v - VNC, V - VNC-Direct, A - Babel, D - SHARP,
> - selected route, * - FIB route
S>* ::/0 [20/0] is directly connected, eth0, 00:00:06
K ::/0 [119/1001] via fe80::xx16:xxxx:feb3:ce8e, eth0, 6d07h43m
If the metric is changed later, the effect will be seen only when next IPv6
RA is received, because the default route must be fully controlled by RA msg.
Below metric is changed from 1996489705 to 1996489704.
$ sudo sysctl -w net.ipv6.conf.eth0.ra_defrtr_metric=1996489704
net.ipv6.conf.eth0.ra_defrtr_metric = 1996489704
IP monitor:
[On next IPv6 RA msg, Kernel deletes prev route and installs new route with updated metric]
Deleted default via fe80::xx16:xxxx:feb3:ce8e dev eth0 proto ra metric 1996489705 expires 3sec hoplimit 64 pref high
default via fe80::xx16:xxxx:feb3:ce8e dev eth0 proto ra metric 1996489704 pref high
Signed-off-by: Praveen Chaudhary <pchaudhary@linkedin.com>
Signed-off-by: Zhenggen Xu <zxu@linkedin.com>
Reviewed-by: David Ahern <dsahern@kernel.org>
Link: https://lore.kernel.org/r/20210125214430.24079-1-pchaudhary@linkedin.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
2021-01-25 21:44:30 +00:00
|
|
|
/* Set default route metric as specified by user */
|
|
|
|
defrtr_usr_metric = in6_dev->cnf.ra_defrtr_metric;
|
|
|
|
/* delete the route if lifetime is 0 or if metric needs change */
|
|
|
|
if (rt && (lifetime == 0 || rt->fib6_metric != defrtr_usr_metric)) {
|
2020-04-27 20:56:45 +00:00
|
|
|
ip6_del_rt(net, rt, false);
|
2005-04-16 22:20:36 +00:00
|
|
|
rt = NULL;
|
|
|
|
}
|
|
|
|
|
net: allow user to set metric on default route learned via Router Advertisement
For IPv4, default route is learned via DHCPv4 and user is allowed to change
metric using config etc/network/interfaces. But for IPv6, default route can
be learned via RA, for which, currently a fixed metric value 1024 is used.
Ideally, user should be able to configure metric on default route for IPv6
similar to IPv4. This patch adds sysctl for the same.
Logs:
For IPv4:
Config in etc/network/interfaces:
auto eth0
iface eth0 inet dhcp
metric 4261413864
IPv4 Kernel Route Table:
$ ip route list
default via 172.21.47.1 dev eth0 metric 4261413864
FRR Table, if a static route is configured:
[In real scenario, it is useful to prefer BGP learned default route over DHCPv4 default route.]
Codes: K - kernel route, C - connected, S - static, R - RIP,
O - OSPF, I - IS-IS, B - BGP, P - PIM, E - EIGRP, N - NHRP,
T - Table, v - VNC, V - VNC-Direct, A - Babel, D - SHARP,
> - selected route, * - FIB route
S>* 0.0.0.0/0 [20/0] is directly connected, eth0, 00:00:03
K 0.0.0.0/0 [254/1000] via 172.21.47.1, eth0, 6d08h51m
i.e. User can prefer Default Router learned via Routing Protocol in IPv4.
Similar behavior is not possible for IPv6, without this fix.
After fix [for IPv6]:
sudo sysctl -w net.ipv6.conf.eth0.net.ipv6.conf.eth0.ra_defrtr_metric=1996489705
IP monitor: [When IPv6 RA is received]
default via fe80::xx16:xxxx:feb3:ce8e dev eth0 proto ra metric 1996489705 pref high
Kernel IPv6 routing table
$ ip -6 route list
default via fe80::be16:65ff:feb3:ce8e dev eth0 proto ra metric 1996489705 expires 21sec hoplimit 64 pref high
FRR Table, if a static route is configured:
[In real scenario, it is useful to prefer BGP learned default route over IPv6 RA default route.]
Codes: K - kernel route, C - connected, S - static, R - RIPng,
O - OSPFv3, I - IS-IS, B - BGP, N - NHRP, T - Table,
v - VNC, V - VNC-Direct, A - Babel, D - SHARP,
> - selected route, * - FIB route
S>* ::/0 [20/0] is directly connected, eth0, 00:00:06
K ::/0 [119/1001] via fe80::xx16:xxxx:feb3:ce8e, eth0, 6d07h43m
If the metric is changed later, the effect will be seen only when next IPv6
RA is received, because the default route must be fully controlled by RA msg.
Below metric is changed from 1996489705 to 1996489704.
$ sudo sysctl -w net.ipv6.conf.eth0.ra_defrtr_metric=1996489704
net.ipv6.conf.eth0.ra_defrtr_metric = 1996489704
IP monitor:
[On next IPv6 RA msg, Kernel deletes prev route and installs new route with updated metric]
Deleted default via fe80::xx16:xxxx:feb3:ce8e dev eth0 proto ra metric 1996489705 expires 3sec hoplimit 64 pref high
default via fe80::xx16:xxxx:feb3:ce8e dev eth0 proto ra metric 1996489704 pref high
Signed-off-by: Praveen Chaudhary <pchaudhary@linkedin.com>
Signed-off-by: Zhenggen Xu <zxu@linkedin.com>
Reviewed-by: David Ahern <dsahern@kernel.org>
Link: https://lore.kernel.org/r/20210125214430.24079-1-pchaudhary@linkedin.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
2021-01-25 21:44:30 +00:00
|
|
|
ND_PRINTK(3, info, "RA: rt: %p lifetime: %d, metric: %d, for dev: %s\n",
|
|
|
|
rt, lifetime, defrtr_usr_metric, skb->dev->name);
|
2015-03-29 13:00:04 +00:00
|
|
|
if (!rt && lifetime) {
|
2014-06-25 21:44:52 +00:00
|
|
|
ND_PRINTK(3, info, "RA: adding default router\n");
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2018-04-18 00:33:11 +00:00
|
|
|
rt = rt6_add_dflt_router(net, &ipv6_hdr(skb)->saddr,
|
net: allow user to set metric on default route learned via Router Advertisement
For IPv4, default route is learned via DHCPv4 and user is allowed to change
metric using config etc/network/interfaces. But for IPv6, default route can
be learned via RA, for which, currently a fixed metric value 1024 is used.
Ideally, user should be able to configure metric on default route for IPv6
similar to IPv4. This patch adds sysctl for the same.
Logs:
For IPv4:
Config in etc/network/interfaces:
auto eth0
iface eth0 inet dhcp
metric 4261413864
IPv4 Kernel Route Table:
$ ip route list
default via 172.21.47.1 dev eth0 metric 4261413864
FRR Table, if a static route is configured:
[In real scenario, it is useful to prefer BGP learned default route over DHCPv4 default route.]
Codes: K - kernel route, C - connected, S - static, R - RIP,
O - OSPF, I - IS-IS, B - BGP, P - PIM, E - EIGRP, N - NHRP,
T - Table, v - VNC, V - VNC-Direct, A - Babel, D - SHARP,
> - selected route, * - FIB route
S>* 0.0.0.0/0 [20/0] is directly connected, eth0, 00:00:03
K 0.0.0.0/0 [254/1000] via 172.21.47.1, eth0, 6d08h51m
i.e. User can prefer Default Router learned via Routing Protocol in IPv4.
Similar behavior is not possible for IPv6, without this fix.
After fix [for IPv6]:
sudo sysctl -w net.ipv6.conf.eth0.net.ipv6.conf.eth0.ra_defrtr_metric=1996489705
IP monitor: [When IPv6 RA is received]
default via fe80::xx16:xxxx:feb3:ce8e dev eth0 proto ra metric 1996489705 pref high
Kernel IPv6 routing table
$ ip -6 route list
default via fe80::be16:65ff:feb3:ce8e dev eth0 proto ra metric 1996489705 expires 21sec hoplimit 64 pref high
FRR Table, if a static route is configured:
[In real scenario, it is useful to prefer BGP learned default route over IPv6 RA default route.]
Codes: K - kernel route, C - connected, S - static, R - RIPng,
O - OSPFv3, I - IS-IS, B - BGP, N - NHRP, T - Table,
v - VNC, V - VNC-Direct, A - Babel, D - SHARP,
> - selected route, * - FIB route
S>* ::/0 [20/0] is directly connected, eth0, 00:00:06
K ::/0 [119/1001] via fe80::xx16:xxxx:feb3:ce8e, eth0, 6d07h43m
If the metric is changed later, the effect will be seen only when next IPv6
RA is received, because the default route must be fully controlled by RA msg.
Below metric is changed from 1996489705 to 1996489704.
$ sudo sysctl -w net.ipv6.conf.eth0.ra_defrtr_metric=1996489704
net.ipv6.conf.eth0.ra_defrtr_metric = 1996489704
IP monitor:
[On next IPv6 RA msg, Kernel deletes prev route and installs new route with updated metric]
Deleted default via fe80::xx16:xxxx:feb3:ce8e dev eth0 proto ra metric 1996489705 expires 3sec hoplimit 64 pref high
default via fe80::xx16:xxxx:feb3:ce8e dev eth0 proto ra metric 1996489704 pref high
Signed-off-by: Praveen Chaudhary <pchaudhary@linkedin.com>
Signed-off-by: Zhenggen Xu <zxu@linkedin.com>
Reviewed-by: David Ahern <dsahern@kernel.org>
Link: https://lore.kernel.org/r/20210125214430.24079-1-pchaudhary@linkedin.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
2021-01-25 21:44:30 +00:00
|
|
|
skb->dev, pref, defrtr_usr_metric);
|
2015-03-29 13:00:04 +00:00
|
|
|
if (!rt) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(0, err,
|
|
|
|
"RA: %s failed to add default route\n",
|
|
|
|
__func__);
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-05-23 03:27:59 +00:00
|
|
|
neigh = ip6_neigh_lookup(&rt->fib6_nh->fib_nh_gw6,
|
|
|
|
rt->fib6_nh->fib_nh_dev, NULL,
|
2018-04-18 00:33:21 +00:00
|
|
|
&ipv6_hdr(skb)->saddr);
|
2015-03-29 13:00:04 +00:00
|
|
|
if (!neigh) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(0, err,
|
|
|
|
"RA: %s got default router without neighbour\n",
|
|
|
|
__func__);
|
2018-04-18 00:33:25 +00:00
|
|
|
fib6_info_release(rt);
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
neigh->flags |= NTF_ROUTER;
|
2022-02-10 22:09:35 +00:00
|
|
|
} else if (rt && IPV6_EXTRACT_PREF(rt->fib6_flags) != pref) {
|
|
|
|
struct nl_info nlinfo = {
|
|
|
|
.nl_net = net,
|
|
|
|
};
|
2018-04-18 22:38:59 +00:00
|
|
|
rt->fib6_flags = (rt->fib6_flags & ~RTF_PREF_MASK) | RTF_PREF(pref);
|
2022-02-10 22:09:35 +00:00
|
|
|
inet6_rt_notify(RTM_NEWROUTE, rt, &nlinfo, NLM_F_REPLACE);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (rt)
|
2018-04-18 00:33:17 +00:00
|
|
|
fib6_set_expires(rt, jiffies + (HZ * lifetime));
|
2015-07-30 06:28:42 +00:00
|
|
|
if (in6_dev->cnf.accept_ra_min_hop_limit < 256 &&
|
|
|
|
ra_msg->icmph.icmp6_hop_limit) {
|
|
|
|
if (in6_dev->cnf.accept_ra_min_hop_limit <= ra_msg->icmph.icmp6_hop_limit) {
|
2015-03-25 08:28:15 +00:00
|
|
|
in6_dev->cnf.hop_limit = ra_msg->icmph.icmp6_hop_limit;
|
2018-04-18 00:33:16 +00:00
|
|
|
fib6_metric_set(rt, RTAX_HOPLIMIT,
|
|
|
|
ra_msg->icmph.icmp6_hop_limit);
|
2015-03-25 08:28:15 +00:00
|
|
|
} else {
|
2015-07-30 06:28:42 +00:00
|
|
|
ND_PRINTK(2, warn, "RA: Got route advertisement with lower hop_limit than minimum\n");
|
2015-03-25 08:28:15 +00:00
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2006-03-21 00:55:08 +00:00
|
|
|
skip_defrtr:
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
/*
|
|
|
|
* Update Reachable Time and Retrans Timer
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (in6_dev->nd_parms) {
|
|
|
|
unsigned long rtime = ntohl(ra_msg->retrans_timer);
|
|
|
|
|
|
|
|
if (rtime && rtime/1000 < MAX_SCHEDULE_TIMEOUT/HZ) {
|
|
|
|
rtime = (rtime*HZ)/1000;
|
2020-04-01 06:46:20 +00:00
|
|
|
if (rtime < HZ/100)
|
|
|
|
rtime = HZ/100;
|
2013-12-07 18:26:53 +00:00
|
|
|
NEIGH_VAR_SET(in6_dev->nd_parms, RETRANS_TIME, rtime);
|
2005-04-16 22:20:36 +00:00
|
|
|
in6_dev->tstamp = jiffies;
|
2015-08-31 23:57:30 +00:00
|
|
|
send_ifinfo_notify = true;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
rtime = ntohl(ra_msg->reachable_time);
|
|
|
|
if (rtime && rtime/1000 < MAX_SCHEDULE_TIMEOUT/(3*HZ)) {
|
|
|
|
rtime = (rtime*HZ)/1000;
|
|
|
|
|
|
|
|
if (rtime < HZ/10)
|
|
|
|
rtime = HZ/10;
|
|
|
|
|
2013-12-07 18:26:53 +00:00
|
|
|
if (rtime != NEIGH_VAR(in6_dev->nd_parms, BASE_REACHABLE_TIME)) {
|
|
|
|
NEIGH_VAR_SET(in6_dev->nd_parms,
|
|
|
|
BASE_REACHABLE_TIME, rtime);
|
|
|
|
NEIGH_VAR_SET(in6_dev->nd_parms,
|
|
|
|
GC_STALETIME, 3 * rtime);
|
2005-04-16 22:20:36 +00:00
|
|
|
in6_dev->nd_parms->reachable_time = neigh_rand_reach_time(rtime);
|
|
|
|
in6_dev->tstamp = jiffies;
|
2015-08-31 23:57:30 +00:00
|
|
|
send_ifinfo_notify = true;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-03-11 22:35:59 +00:00
|
|
|
skip_linkparms:
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
/*
|
|
|
|
* Process options.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (!neigh)
|
2007-04-26 00:54:47 +00:00
|
|
|
neigh = __neigh_lookup(&nd_tbl, &ipv6_hdr(skb)->saddr,
|
2005-04-16 22:20:36 +00:00
|
|
|
skb->dev, 1);
|
|
|
|
if (neigh) {
|
|
|
|
u8 *lladdr = NULL;
|
|
|
|
if (ndopts.nd_opts_src_lladdr) {
|
|
|
|
lladdr = ndisc_opt_addr_data(ndopts.nd_opts_src_lladdr,
|
|
|
|
skb->dev);
|
|
|
|
if (!lladdr) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn,
|
|
|
|
"RA: invalid link-layer address length\n");
|
2005-04-16 22:20:36 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
2016-06-15 19:20:23 +00:00
|
|
|
ndisc_update(skb->dev, neigh, lladdr, NUD_STALE,
|
2005-04-16 22:20:36 +00:00
|
|
|
NEIGH_UPDATE_F_WEAK_OVERRIDE|
|
|
|
|
NEIGH_UPDATE_F_OVERRIDE|
|
|
|
|
NEIGH_UPDATE_F_OVERRIDE_ISROUTER|
|
2016-06-15 19:20:23 +00:00
|
|
|
NEIGH_UPDATE_F_ISROUTER,
|
|
|
|
NDISC_ROUTER_ADVERTISEMENT, &ndopts);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2014-06-25 21:44:52 +00:00
|
|
|
if (!ipv6_accept_ra(in6_dev)) {
|
|
|
|
ND_PRINTK(2, info,
|
|
|
|
"RA: %s, accept_ra is false for dev: %s\n",
|
|
|
|
__func__, skb->dev->name);
|
2009-08-29 07:04:09 +00:00
|
|
|
goto out;
|
2014-06-25 21:44:52 +00:00
|
|
|
}
|
2009-08-29 07:04:09 +00:00
|
|
|
|
2006-03-21 01:06:24 +00:00
|
|
|
#ifdef CONFIG_IPV6_ROUTE_INFO
|
2014-07-10 10:02:46 +00:00
|
|
|
if (!in6_dev->cnf.accept_ra_from_local &&
|
|
|
|
ipv6_chk_addr(dev_net(in6_dev->dev), &ipv6_hdr(skb)->saddr,
|
2015-12-23 21:44:37 +00:00
|
|
|
in6_dev->dev, 0)) {
|
2014-06-25 21:44:52 +00:00
|
|
|
ND_PRINTK(2, info,
|
2014-06-25 21:44:53 +00:00
|
|
|
"RA from local address detected on dev: %s: router info ignored.\n",
|
|
|
|
skb->dev->name);
|
2011-10-24 23:13:15 +00:00
|
|
|
goto skip_routeinfo;
|
2014-06-25 21:44:52 +00:00
|
|
|
}
|
2011-10-24 23:13:15 +00:00
|
|
|
|
2006-03-21 01:07:03 +00:00
|
|
|
if (in6_dev->cnf.accept_ra_rtr_pref && ndopts.nd_opts_ri) {
|
2006-03-21 01:06:24 +00:00
|
|
|
struct nd_opt_hdr *p;
|
|
|
|
for (p = ndopts.nd_opts_ri;
|
|
|
|
p;
|
|
|
|
p = ndisc_next_option(p, ndopts.nd_opts_ri_end)) {
|
2008-03-16 03:56:52 +00:00
|
|
|
struct route_info *ri = (struct route_info *)p;
|
|
|
|
#ifdef CONFIG_IPV6_NDISC_NODETYPE
|
|
|
|
if (skb->ndisc_nodetype == NDISC_NODETYPE_NODEFAULT &&
|
|
|
|
ri->prefix_len == 0)
|
|
|
|
continue;
|
|
|
|
#endif
|
2013-11-26 07:46:56 +00:00
|
|
|
if (ri->prefix_len == 0 &&
|
|
|
|
!in6_dev->cnf.accept_ra_defrtr)
|
|
|
|
continue;
|
2017-03-22 09:19:04 +00:00
|
|
|
if (ri->prefix_len < in6_dev->cnf.accept_ra_rt_info_min_plen)
|
|
|
|
continue;
|
2008-03-16 03:56:52 +00:00
|
|
|
if (ri->prefix_len > in6_dev->cnf.accept_ra_rt_info_max_plen)
|
2006-03-21 01:07:03 +00:00
|
|
|
continue;
|
2014-08-24 20:53:10 +00:00
|
|
|
rt6_route_rcv(skb->dev, (u8 *)p, (p->nd_opt_len) << 3,
|
2007-04-26 00:54:47 +00:00
|
|
|
&ipv6_hdr(skb)->saddr);
|
2006-03-21 01:06:24 +00:00
|
|
|
}
|
|
|
|
}
|
2011-10-24 23:13:15 +00:00
|
|
|
|
|
|
|
skip_routeinfo:
|
2006-03-21 01:06:24 +00:00
|
|
|
#endif
|
|
|
|
|
2008-03-16 03:59:18 +00:00
|
|
|
#ifdef CONFIG_IPV6_NDISC_NODETYPE
|
2008-03-11 22:35:59 +00:00
|
|
|
/* skip link-specific ndopts from interior routers */
|
2014-06-25 21:44:52 +00:00
|
|
|
if (skb->ndisc_nodetype == NDISC_NODETYPE_NODEFAULT) {
|
|
|
|
ND_PRINTK(2, info,
|
|
|
|
"RA: %s, nodetype is NODEFAULT (interior routes), dev: %s\n",
|
|
|
|
__func__, skb->dev->name);
|
2008-03-11 22:35:59 +00:00
|
|
|
goto out;
|
2014-06-25 21:44:52 +00:00
|
|
|
}
|
2008-03-16 03:59:18 +00:00
|
|
|
#endif
|
2008-03-11 22:35:59 +00:00
|
|
|
|
2006-03-21 00:55:26 +00:00
|
|
|
if (in6_dev->cnf.accept_ra_pinfo && ndopts.nd_opts_pi) {
|
2005-04-16 22:20:36 +00:00
|
|
|
struct nd_opt_hdr *p;
|
|
|
|
for (p = ndopts.nd_opts_pi;
|
|
|
|
p;
|
|
|
|
p = ndisc_next_option(p, ndopts.nd_opts_pi_end)) {
|
2012-01-04 10:49:15 +00:00
|
|
|
addrconf_prefix_rcv(skb->dev, (u8 *)p,
|
|
|
|
(p->nd_opt_len) << 3,
|
|
|
|
ndopts.nd_opts_src_lladdr != NULL);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-20 17:06:05 +00:00
|
|
|
if (ndopts.nd_opts_mtu && in6_dev->cnf.accept_ra_mtu) {
|
2006-11-15 04:56:00 +00:00
|
|
|
__be32 n;
|
2005-04-16 22:20:36 +00:00
|
|
|
u32 mtu;
|
|
|
|
|
2014-08-24 20:53:10 +00:00
|
|
|
memcpy(&n, ((u8 *)(ndopts.nd_opts_mtu+1))+2, sizeof(mtu));
|
2006-11-15 04:56:00 +00:00
|
|
|
mtu = ntohl(n);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
ipv6: add IFLA_INET6_RA_MTU to expose mtu value
The kernel provides a "/proc/sys/net/ipv6/conf/<iface>/mtu"
file, which can temporarily record the mtu value of the last
received RA message when the RA mtu value is lower than the
interface mtu, but this proc has following limitations:
(1) when the interface mtu (/sys/class/net/<iface>/mtu) is
updeated, mtu6 (/proc/sys/net/ipv6/conf/<iface>/mtu) will
be updated to the value of interface mtu;
(2) mtu6 (/proc/sys/net/ipv6/conf/<iface>/mtu) only affect
ipv6 connection, and not affect ipv4.
Therefore, when the mtu option is carried in the RA message,
there will be a problem that the user sometimes cannot obtain
RA mtu value correctly by reading mtu6.
After this patch set, if a RA message carries the mtu option,
you can send a netlink msg which nlmsg_type is RTM_GETLINK,
and then by parsing the attribute of IFLA_INET6_RA_MTU to
get the mtu value carried in the RA message received on the
inet6 device. In addition, you can also get a link notification
when ra_mtu is updated so it doesn't have to poll.
In this way, if the MTU values that the device receives from
the network in the PCO IPv4 and the RA IPv6 procedures are
different, the user can obtain the correct ipv6 ra_mtu value
and compare the value of ra_mtu and ipv4 mtu, then the device
can use the lower MTU value for both IPv4 and IPv6.
Signed-off-by: Rocco Yue <rocco.yue@mediatek.com>
Reviewed-by: David Ahern <dsahern@kernel.org>
Link: https://lore.kernel.org/r/20210827150412.9267-1-rocco.yue@mediatek.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
2021-08-27 15:04:12 +00:00
|
|
|
if (in6_dev->ra_mtu != mtu) {
|
|
|
|
in6_dev->ra_mtu = mtu;
|
|
|
|
send_ifinfo_notify = true;
|
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
if (mtu < IPV6_MIN_MTU || mtu > skb->dev->mtu) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn, "RA: invalid mtu: %d\n", mtu);
|
2005-04-16 22:20:36 +00:00
|
|
|
} else if (in6_dev->cnf.mtu6 != mtu) {
|
|
|
|
in6_dev->cnf.mtu6 = mtu;
|
2018-04-18 00:33:16 +00:00
|
|
|
fib6_metric_set(rt, RTAX_MTU, mtu);
|
2005-04-16 22:20:36 +00:00
|
|
|
rt6_mtu_change(skb->dev, mtu);
|
|
|
|
}
|
|
|
|
}
|
2007-02-09 14:24:49 +00:00
|
|
|
|
2007-10-11 04:22:05 +00:00
|
|
|
if (ndopts.nd_useropts) {
|
2008-01-22 08:32:53 +00:00
|
|
|
struct nd_opt_hdr *p;
|
|
|
|
for (p = ndopts.nd_useropts;
|
|
|
|
p;
|
2016-06-15 19:20:23 +00:00
|
|
|
p = ndisc_next_useropt(skb->dev, p,
|
|
|
|
ndopts.nd_useropts_end)) {
|
2008-01-22 08:32:53 +00:00
|
|
|
ndisc_ra_useropt(skb, p);
|
2007-10-11 04:22:05 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
if (ndopts.nd_opts_tgt_lladdr || ndopts.nd_opts_rh) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn, "RA: invalid RA options\n");
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
out:
|
ipv6: add IFLA_INET6_RA_MTU to expose mtu value
The kernel provides a "/proc/sys/net/ipv6/conf/<iface>/mtu"
file, which can temporarily record the mtu value of the last
received RA message when the RA mtu value is lower than the
interface mtu, but this proc has following limitations:
(1) when the interface mtu (/sys/class/net/<iface>/mtu) is
updeated, mtu6 (/proc/sys/net/ipv6/conf/<iface>/mtu) will
be updated to the value of interface mtu;
(2) mtu6 (/proc/sys/net/ipv6/conf/<iface>/mtu) only affect
ipv6 connection, and not affect ipv4.
Therefore, when the mtu option is carried in the RA message,
there will be a problem that the user sometimes cannot obtain
RA mtu value correctly by reading mtu6.
After this patch set, if a RA message carries the mtu option,
you can send a netlink msg which nlmsg_type is RTM_GETLINK,
and then by parsing the attribute of IFLA_INET6_RA_MTU to
get the mtu value carried in the RA message received on the
inet6 device. In addition, you can also get a link notification
when ra_mtu is updated so it doesn't have to poll.
In this way, if the MTU values that the device receives from
the network in the PCO IPv4 and the RA IPv6 procedures are
different, the user can obtain the correct ipv6 ra_mtu value
and compare the value of ra_mtu and ipv4 mtu, then the device
can use the lower MTU value for both IPv4 and IPv6.
Signed-off-by: Rocco Yue <rocco.yue@mediatek.com>
Reviewed-by: David Ahern <dsahern@kernel.org>
Link: https://lore.kernel.org/r/20210827150412.9267-1-rocco.yue@mediatek.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
2021-08-27 15:04:12 +00:00
|
|
|
/* Send a notify if RA changed managed/otherconf flags or
|
|
|
|
* timer settings or ra_mtu value
|
|
|
|
*/
|
|
|
|
if (send_ifinfo_notify)
|
|
|
|
inet6_ifinfo_notify(RTM_NEWLINK, in6_dev);
|
|
|
|
|
2018-04-18 00:33:25 +00:00
|
|
|
fib6_info_release(rt);
|
2012-01-27 23:07:56 +00:00
|
|
|
if (neigh)
|
2005-04-16 22:20:36 +00:00
|
|
|
neigh_release(neigh);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void ndisc_redirect_rcv(struct sk_buff *skb)
|
|
|
|
{
|
2012-12-14 02:59:59 +00:00
|
|
|
u8 *hdr;
|
|
|
|
struct ndisc_options ndopts;
|
|
|
|
struct rd_msg *msg = (struct rd_msg *)skb_transport_header(skb);
|
2013-05-28 20:34:26 +00:00
|
|
|
u32 ndoptlen = skb_tail_pointer(skb) - (skb_transport_header(skb) +
|
2012-12-14 02:59:59 +00:00
|
|
|
offsetof(struct rd_msg, opt));
|
|
|
|
|
2008-03-16 03:59:18 +00:00
|
|
|
#ifdef CONFIG_IPV6_NDISC_NODETYPE
|
2008-03-11 22:35:59 +00:00
|
|
|
switch (skb->ndisc_nodetype) {
|
|
|
|
case NDISC_NODETYPE_HOST:
|
|
|
|
case NDISC_NODETYPE_NODEFAULT:
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn,
|
|
|
|
"Redirect: from host or unauthorized router\n");
|
2008-03-11 22:35:59 +00:00
|
|
|
return;
|
|
|
|
}
|
2008-03-16 03:59:18 +00:00
|
|
|
#endif
|
2008-03-11 22:35:59 +00:00
|
|
|
|
2007-04-26 00:54:47 +00:00
|
|
|
if (!(ipv6_addr_type(&ipv6_hdr(skb)->saddr) & IPV6_ADDR_LINKLOCAL)) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn,
|
|
|
|
"Redirect: source address is not link-local\n");
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-06-15 19:20:23 +00:00
|
|
|
if (!ndisc_parse_options(skb->dev, msg->opt, ndoptlen, &ndopts))
|
2012-12-14 02:59:59 +00:00
|
|
|
return;
|
|
|
|
|
2013-08-22 04:07:35 +00:00
|
|
|
if (!ndopts.nd_opts_rh) {
|
2013-09-04 11:44:21 +00:00
|
|
|
ip6_redirect_no_header(skb, dev_net(skb->dev),
|
2018-09-30 06:44:50 +00:00
|
|
|
skb->dev->ifindex);
|
2012-12-14 02:59:59 +00:00
|
|
|
return;
|
2013-08-22 04:07:35 +00:00
|
|
|
}
|
2012-12-14 02:59:59 +00:00
|
|
|
|
|
|
|
hdr = (u8 *)ndopts.nd_opts_rh;
|
|
|
|
hdr += 8;
|
|
|
|
if (!pskb_pull(skb, hdr - skb_transport_header(skb)))
|
|
|
|
return;
|
|
|
|
|
2012-07-12 07:33:37 +00:00
|
|
|
icmpv6_notify(skb, NDISC_REDIRECT, 0, 0);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2013-01-21 06:48:53 +00:00
|
|
|
static void ndisc_fill_redirect_hdr_option(struct sk_buff *skb,
|
|
|
|
struct sk_buff *orig_skb,
|
|
|
|
int rd_len)
|
2013-01-21 06:48:09 +00:00
|
|
|
{
|
2013-01-21 06:48:53 +00:00
|
|
|
u8 *opt = skb_put(skb, rd_len);
|
|
|
|
|
2013-01-21 06:48:09 +00:00
|
|
|
memset(opt, 0, 8);
|
|
|
|
*(opt++) = ND_OPT_REDIRECT_HDR;
|
|
|
|
*(opt++) = (rd_len >> 3);
|
|
|
|
opt += 6;
|
|
|
|
|
2018-03-08 16:00:02 +00:00
|
|
|
skb_copy_bits(orig_skb, skb_network_offset(orig_skb), opt,
|
|
|
|
rd_len - 8);
|
2013-01-21 06:48:09 +00:00
|
|
|
}
|
|
|
|
|
2012-01-27 23:30:48 +00:00
|
|
|
void ndisc_send_redirect(struct sk_buff *skb, const struct in6_addr *target)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
2008-03-07 19:15:34 +00:00
|
|
|
struct net_device *dev = skb->dev;
|
2008-03-25 12:47:49 +00:00
|
|
|
struct net *net = dev_net(dev);
|
2008-03-07 19:15:34 +00:00
|
|
|
struct sock *sk = net->ipv6.ndisc_sk;
|
2013-01-21 06:48:49 +00:00
|
|
|
int optlen = 0;
|
2012-06-09 06:24:18 +00:00
|
|
|
struct inet_peer *peer;
|
2005-04-16 22:20:36 +00:00
|
|
|
struct sk_buff *buff;
|
2013-01-05 16:34:51 +00:00
|
|
|
struct rd_msg *msg;
|
2005-04-16 22:20:36 +00:00
|
|
|
struct in6_addr saddr_buf;
|
|
|
|
struct rt6_info *rt;
|
|
|
|
struct dst_entry *dst;
|
2011-03-12 21:22:43 +00:00
|
|
|
struct flowi6 fl6;
|
2005-04-16 22:20:36 +00:00
|
|
|
int rd_len;
|
2016-06-15 19:20:23 +00:00
|
|
|
u8 ha_buf[MAX_ADDR_LEN], *ha = NULL,
|
|
|
|
ops_data_buf[NDISC_OPS_REDIRECT_DATA_SPACE], *ops_data = NULL;
|
2012-07-10 10:58:16 +00:00
|
|
|
bool ret;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2018-06-01 04:05:21 +00:00
|
|
|
if (netif_is_l3_master(skb->dev)) {
|
|
|
|
dev = __dev_get_by_index(dev_net(skb->dev), IPCB(skb)->iif);
|
|
|
|
if (!dev)
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2007-04-26 00:08:10 +00:00
|
|
|
if (ipv6_get_lladdr(dev, &saddr_buf, IFA_F_TENTATIVE)) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn, "Redirect: no link-local address on %s\n",
|
|
|
|
dev->name);
|
2007-02-09 14:24:49 +00:00
|
|
|
return;
|
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2007-04-26 00:54:47 +00:00
|
|
|
if (!ipv6_addr_equal(&ipv6_hdr(skb)->daddr, target) &&
|
2007-10-08 07:12:05 +00:00
|
|
|
ipv6_addr_type(target) != (IPV6_ADDR_UNICAST|IPV6_ADDR_LINKLOCAL)) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn,
|
|
|
|
"Redirect: target address is not link-local unicast\n");
|
[IPV6]: fix BUG of ndisc_send_redirect()
When I tested IPv6 redirect function about kernel 2.6.19.1, and found
that the kernel can send redirect packets whose target address is global
address, and the target is not the actual endpoint of communication.
But the criteria conform to RFC2461, the target address defines as
following:
Target Address An IP address that is a better first hop to use for
he ICMP Destination Address. When the target is
the actual endpoint of communication, i.e., the
destination is a neighbor, the Target Address field
MUST contain the same value as the ICMP Destination
Address field. Otherwise the target is a better
first-hop router and the Target Address MUST be the
router's link-local address so that hosts can
uniquely identify routers.
According to this definition, when a router redirect to a host, the
target address either the better first-hop router's link-local address
or the same as the ICMP destination address field. But the function of
ndisc_send_redirect() in net/ipv6/ndisc.c, does not check the target
address correctly.
There is another definition about receive Redirect message in RFC2461:
8.1. Validation of Redirect Messages
A host MUST silently discard any received Redirect message that does
not satisfy all of the following validity checks:
......
- The ICMP Target Address is either a link-local address (when
redirected to a router) or the same as the ICMP Destination
Address (when redirected to the on-link destination).
......
And the receive redirect function of ndisc_redirect_rcv() implemented
this definition, checks the target address correctly.
if (ipv6_addr_equal(dest, target)) {
on_link = 1;
} else if (!(ipv6_addr_type(target) & IPV6_ADDR_LINKLOCAL)) {
ND_PRINTK2(KERN_WARNING
"ICMPv6 Redirect: target address is not link-local.\n");
return;
}
So, I think the send redirect function must check the target address
also.
Signed-off-by: Li Yewang <lyw@nanjing-fnst.com>
Acked-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-01-30 22:33:20 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2011-03-12 21:22:43 +00:00
|
|
|
icmpv6_flow_init(sk, &fl6, NDISC_REDIRECT,
|
2016-09-10 19:09:57 +00:00
|
|
|
&saddr_buf, &ipv6_hdr(skb)->saddr, dev->ifindex);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2011-03-12 21:22:43 +00:00
|
|
|
dst = ip6_route_output(net, NULL, &fl6);
|
2012-02-21 22:10:49 +00:00
|
|
|
if (dst->error) {
|
|
|
|
dst_release(dst);
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
2012-02-21 22:10:49 +00:00
|
|
|
}
|
2011-03-12 21:22:43 +00:00
|
|
|
dst = xfrm_lookup(net, dst, flowi6_to_flowi(&fl6), NULL, 0);
|
2011-03-02 21:27:41 +00:00
|
|
|
if (IS_ERR(dst))
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
|
|
|
|
|
|
|
rt = (struct rt6_info *) dst;
|
|
|
|
|
|
|
|
if (rt->rt6i_flags & RTF_GATEWAY) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn,
|
|
|
|
"Redirect: destination is not a neighbour\n");
|
2009-02-07 07:47:37 +00:00
|
|
|
goto release;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
2015-05-23 03:55:57 +00:00
|
|
|
peer = inet_getpeer_v6(net->ipv6.peers, &ipv6_hdr(skb)->saddr, 1);
|
2012-07-10 10:58:16 +00:00
|
|
|
ret = inet_peer_xrlim_allow(peer, 1*HZ);
|
|
|
|
if (peer)
|
|
|
|
inet_putpeer(peer);
|
|
|
|
if (!ret)
|
2009-02-07 07:47:37 +00:00
|
|
|
goto release;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
if (dev->addr_len) {
|
2012-01-27 23:30:48 +00:00
|
|
|
struct neighbour *neigh = dst_neigh_lookup(skb_dst(skb), target);
|
|
|
|
if (!neigh) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn,
|
|
|
|
"Redirect: no neigh for target address\n");
|
2012-01-27 23:30:48 +00:00
|
|
|
goto release;
|
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
read_lock_bh(&neigh->lock);
|
|
|
|
if (neigh->nud_state & NUD_VALID) {
|
|
|
|
memcpy(ha_buf, neigh->ha, dev->addr_len);
|
|
|
|
read_unlock_bh(&neigh->lock);
|
|
|
|
ha = ha_buf;
|
2016-06-15 19:20:23 +00:00
|
|
|
optlen += ndisc_redirect_opt_addr_space(dev, neigh,
|
|
|
|
ops_data_buf,
|
|
|
|
&ops_data);
|
2005-04-16 22:20:36 +00:00
|
|
|
} else
|
|
|
|
read_unlock_bh(&neigh->lock);
|
2012-01-27 23:30:48 +00:00
|
|
|
|
|
|
|
neigh_release(neigh);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
rd_len = min_t(unsigned int,
|
2013-01-21 06:48:49 +00:00
|
|
|
IPV6_MIN_MTU - sizeof(struct ipv6hdr) - sizeof(*msg) - optlen,
|
|
|
|
skb->len + 8);
|
2005-04-16 22:20:36 +00:00
|
|
|
rd_len &= ~0x7;
|
2013-01-21 06:48:49 +00:00
|
|
|
optlen += rd_len;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2013-01-21 06:48:49 +00:00
|
|
|
buff = ndisc_alloc_skb(dev, sizeof(*msg) + optlen);
|
2013-01-21 06:48:14 +00:00
|
|
|
if (!buff)
|
2009-02-07 07:47:37 +00:00
|
|
|
goto release;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
networking: make skb_put & friends return void pointers
It seems like a historic accident that these return unsigned char *,
and in many places that means casts are required, more often than not.
Make these functions (skb_put, __skb_put and pskb_put) return void *
and remove all the casts across the tree, adding a (u8 *) cast only
where the unsigned char pointer was used directly, all done with the
following spatch:
@@
expression SKB, LEN;
typedef u8;
identifier fn = { skb_put, __skb_put };
@@
- *(fn(SKB, LEN))
+ *(u8 *)fn(SKB, LEN)
@@
expression E, SKB, LEN;
identifier fn = { skb_put, __skb_put };
type T;
@@
- E = ((T *)(fn(SKB, LEN)))
+ E = fn(SKB, LEN)
which actually doesn't cover pskb_put since there are only three
users overall.
A handful of stragglers were converted manually, notably a macro in
drivers/isdn/i4l/isdn_bsdcomp.c and, oddly enough, one of the many
instances in net/bluetooth/hci_sock.c. In the former file, I also
had to fix one whitespace problem spatch introduced.
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 12:29:21 +00:00
|
|
|
msg = skb_put(buff, sizeof(*msg));
|
2013-01-21 06:49:25 +00:00
|
|
|
*msg = (struct rd_msg) {
|
|
|
|
.icmph = {
|
|
|
|
.icmp6_type = NDISC_REDIRECT,
|
|
|
|
},
|
|
|
|
.target = *target,
|
|
|
|
.dest = ipv6_hdr(skb)->daddr,
|
|
|
|
};
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* include target_address option
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (ha)
|
2016-06-15 19:20:23 +00:00
|
|
|
ndisc_fill_redirect_addr_option(buff, ha, ops_data);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* build redirect option and copy skb over to the new packet.
|
|
|
|
*/
|
|
|
|
|
2013-01-21 06:48:09 +00:00
|
|
|
if (rd_len)
|
2013-01-21 06:48:53 +00:00
|
|
|
ndisc_fill_redirect_hdr_option(buff, skb, rd_len);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2009-06-02 05:19:30 +00:00
|
|
|
skb_dst_set(buff, dst);
|
2013-01-21 06:49:03 +00:00
|
|
|
ndisc_send_skb(buff, &ipv6_hdr(skb)->saddr, &saddr_buf);
|
2009-02-07 07:47:37 +00:00
|
|
|
return;
|
|
|
|
|
|
|
|
release:
|
|
|
|
dst_release(dst);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void pndisc_redo(struct sk_buff *skb)
|
|
|
|
{
|
2005-10-05 19:11:41 +00:00
|
|
|
ndisc_recv_ns(skb);
|
2005-04-16 22:20:36 +00:00
|
|
|
kfree_skb(skb);
|
|
|
|
}
|
|
|
|
|
2020-11-13 01:58:15 +00:00
|
|
|
static int ndisc_is_multicast(const void *pkey)
|
|
|
|
{
|
|
|
|
return ipv6_addr_is_multicast((struct in6_addr *)pkey);
|
|
|
|
}
|
|
|
|
|
2013-08-26 23:36:51 +00:00
|
|
|
static bool ndisc_suppress_frag_ndisc(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct inet6_dev *idev = __in6_dev_get(skb->dev);
|
|
|
|
|
|
|
|
if (!idev)
|
|
|
|
return true;
|
|
|
|
if (IP6CB(skb)->flags & IP6SKB_FRAGMENTED &&
|
|
|
|
idev->cnf.suppress_frag_ndisc) {
|
|
|
|
net_warn_ratelimited("Received fragmented ndisc packet. Carefully consider disabling suppress_frag_ndisc.\n");
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
int ndisc_rcv(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct nd_msg *msg;
|
|
|
|
|
2013-08-26 23:36:51 +00:00
|
|
|
if (ndisc_suppress_frag_ndisc(skb))
|
|
|
|
return 0;
|
|
|
|
|
2013-01-21 06:48:03 +00:00
|
|
|
if (skb_linearize(skb))
|
2005-04-16 22:20:36 +00:00
|
|
|
return 0;
|
|
|
|
|
2007-04-26 01:04:18 +00:00
|
|
|
msg = (struct nd_msg *)skb_transport_header(skb);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2007-04-26 01:04:18 +00:00
|
|
|
__skb_push(skb, skb->data - skb_transport_header(skb));
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2007-04-26 00:54:47 +00:00
|
|
|
if (ipv6_hdr(skb)->hop_limit != 255) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn, "NDISC: invalid hop-limit: %d\n",
|
|
|
|
ipv6_hdr(skb)->hop_limit);
|
2005-04-16 22:20:36 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (msg->icmph.icmp6_code != 0) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(2, warn, "NDISC: invalid ICMPv6 code: %d\n",
|
|
|
|
msg->icmph.icmp6_code);
|
2005-04-16 22:20:36 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (msg->icmph.icmp6_type) {
|
|
|
|
case NDISC_NEIGHBOUR_SOLICITATION:
|
2018-10-24 12:37:21 +00:00
|
|
|
memset(NEIGH_CB(skb), 0, sizeof(struct neighbour_cb));
|
2005-04-16 22:20:36 +00:00
|
|
|
ndisc_recv_ns(skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case NDISC_NEIGHBOUR_ADVERTISEMENT:
|
|
|
|
ndisc_recv_na(skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case NDISC_ROUTER_SOLICITATION:
|
|
|
|
ndisc_recv_rs(skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case NDISC_ROUTER_ADVERTISEMENT:
|
|
|
|
ndisc_router_discovery(skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case NDISC_REDIRECT:
|
|
|
|
ndisc_redirect_rcv(skb);
|
|
|
|
break;
|
2007-04-21 00:09:22 +00:00
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ndisc_netdev_event(struct notifier_block *this, unsigned long event, void *ptr)
|
|
|
|
{
|
2013-05-28 01:30:21 +00:00
|
|
|
struct net_device *dev = netdev_notifier_info_to_dev(ptr);
|
2015-07-29 10:01:41 +00:00
|
|
|
struct netdev_notifier_change_info *change_info;
|
2008-03-25 12:47:49 +00:00
|
|
|
struct net *net = dev_net(dev);
|
2012-11-06 16:46:20 +00:00
|
|
|
struct inet6_dev *idev;
|
2021-11-01 17:36:29 +00:00
|
|
|
bool evict_nocarrier;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
switch (event) {
|
|
|
|
case NETDEV_CHANGEADDR:
|
|
|
|
neigh_changeaddr(&nd_tbl, dev);
|
2013-08-01 08:04:14 +00:00
|
|
|
fib6_run_gc(0, net, false);
|
2020-03-12 22:50:22 +00:00
|
|
|
fallthrough;
|
2017-04-12 18:49:04 +00:00
|
|
|
case NETDEV_UP:
|
2012-11-06 16:46:20 +00:00
|
|
|
idev = in6_dev_get(dev);
|
|
|
|
if (!idev)
|
|
|
|
break;
|
2017-04-22 16:10:13 +00:00
|
|
|
if (idev->cnf.ndisc_notify ||
|
|
|
|
net->ipv6.devconf_all->ndisc_notify)
|
2012-11-06 16:46:20 +00:00
|
|
|
ndisc_send_unsol_na(dev);
|
|
|
|
in6_dev_put(idev);
|
2005-04-16 22:20:36 +00:00
|
|
|
break;
|
2015-07-29 10:01:41 +00:00
|
|
|
case NETDEV_CHANGE:
|
2021-11-01 17:36:29 +00:00
|
|
|
idev = in6_dev_get(dev);
|
|
|
|
if (!idev)
|
|
|
|
evict_nocarrier = true;
|
|
|
|
else {
|
|
|
|
evict_nocarrier = idev->cnf.ndisc_evict_nocarrier &&
|
|
|
|
net->ipv6.devconf_all->ndisc_evict_nocarrier;
|
|
|
|
in6_dev_put(idev);
|
|
|
|
}
|
|
|
|
|
2015-07-29 10:01:41 +00:00
|
|
|
change_info = ptr;
|
|
|
|
if (change_info->flags_changed & IFF_NOARP)
|
|
|
|
neigh_changeaddr(&nd_tbl, dev);
|
2021-11-01 17:36:29 +00:00
|
|
|
if (evict_nocarrier && !netif_carrier_ok(dev))
|
2018-10-12 03:33:49 +00:00
|
|
|
neigh_carrier_down(&nd_tbl, dev);
|
2015-07-29 10:01:41 +00:00
|
|
|
break;
|
2005-04-16 22:20:36 +00:00
|
|
|
case NETDEV_DOWN:
|
|
|
|
neigh_ifdown(&nd_tbl, dev);
|
2013-08-01 08:04:14 +00:00
|
|
|
fib6_run_gc(0, net, false);
|
2005-04-16 22:20:36 +00:00
|
|
|
break;
|
2011-04-15 13:46:02 +00:00
|
|
|
case NETDEV_NOTIFY_PEERS:
|
|
|
|
ndisc_send_unsol_na(dev);
|
|
|
|
break;
|
2005-04-16 22:20:36 +00:00
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NOTIFY_DONE;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct notifier_block ndisc_netdev_notifier = {
|
|
|
|
.notifier_call = ndisc_netdev_event,
|
2017-08-08 21:51:02 +00:00
|
|
|
.priority = ADDRCONF_NOTIFY_PRIORITY - 5,
|
2005-04-16 22:20:36 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
#ifdef CONFIG_SYSCTL
|
|
|
|
static void ndisc_warn_deprecated_sysctl(struct ctl_table *ctl,
|
|
|
|
const char *func, const char *dev_name)
|
|
|
|
{
|
|
|
|
static char warncomm[TASK_COMM_LEN];
|
|
|
|
static int warned;
|
|
|
|
if (strcmp(warncomm, current->comm) && warned < 5) {
|
|
|
|
strcpy(warncomm, current->comm);
|
2012-05-15 14:11:53 +00:00
|
|
|
pr_warn("process `%s' is using deprecated sysctl (%s) net.ipv6.neigh.%s.%s - use net.ipv6.neigh.%s.%s_ms instead\n",
|
2005-04-16 22:20:36 +00:00
|
|
|
warncomm, func,
|
|
|
|
dev_name, ctl->procname,
|
|
|
|
dev_name, ctl->procname);
|
|
|
|
warned++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-24 06:43:38 +00:00
|
|
|
int ndisc_ifinfo_sysctl_change(struct ctl_table *ctl, int write, void *buffer,
|
|
|
|
size_t *lenp, loff_t *ppos)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
|
|
|
struct net_device *dev = ctl->extra1;
|
|
|
|
struct inet6_dev *idev;
|
|
|
|
int ret;
|
|
|
|
|
2007-10-18 10:05:25 +00:00
|
|
|
if ((strcmp(ctl->procname, "retrans_time") == 0) ||
|
|
|
|
(strcmp(ctl->procname, "base_reachable_time") == 0))
|
2005-04-16 22:20:36 +00:00
|
|
|
ndisc_warn_deprecated_sysctl(ctl, "syscall", dev ? dev->name : "default");
|
|
|
|
|
2007-10-18 10:05:25 +00:00
|
|
|
if (strcmp(ctl->procname, "retrans_time") == 0)
|
2013-12-07 18:26:54 +00:00
|
|
|
ret = neigh_proc_dointvec(ctl, write, buffer, lenp, ppos);
|
2007-10-18 10:05:25 +00:00
|
|
|
|
|
|
|
else if (strcmp(ctl->procname, "base_reachable_time") == 0)
|
2013-12-07 18:26:54 +00:00
|
|
|
ret = neigh_proc_dointvec_jiffies(ctl, write,
|
|
|
|
buffer, lenp, ppos);
|
2007-10-18 10:05:25 +00:00
|
|
|
|
|
|
|
else if ((strcmp(ctl->procname, "retrans_time_ms") == 0) ||
|
2007-10-29 08:32:23 +00:00
|
|
|
(strcmp(ctl->procname, "base_reachable_time_ms") == 0))
|
2013-12-07 18:26:54 +00:00
|
|
|
ret = neigh_proc_dointvec_ms_jiffies(ctl, write,
|
|
|
|
buffer, lenp, ppos);
|
2007-10-18 10:05:25 +00:00
|
|
|
else
|
2005-04-16 22:20:36 +00:00
|
|
|
ret = -1;
|
|
|
|
|
|
|
|
if (write && ret == 0 && dev && (idev = in6_dev_get(dev)) != NULL) {
|
2013-12-07 18:26:53 +00:00
|
|
|
if (ctl->data == &NEIGH_VAR(idev->nd_parms, BASE_REACHABLE_TIME))
|
|
|
|
idev->nd_parms->reachable_time =
|
|
|
|
neigh_rand_reach_time(NEIGH_VAR(idev->nd_parms, BASE_REACHABLE_TIME));
|
2005-04-16 22:20:36 +00:00
|
|
|
idev->tstamp = jiffies;
|
|
|
|
inet6_ifinfo_notify(RTM_NEWLINK, idev);
|
|
|
|
in6_dev_put(idev);
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
2010-01-17 03:35:32 +00:00
|
|
|
static int __net_init ndisc_net_init(struct net *net)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
|
|
|
struct ipv6_pinfo *np;
|
|
|
|
struct sock *sk;
|
2007-02-09 14:24:49 +00:00
|
|
|
int err;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2008-04-03 21:31:03 +00:00
|
|
|
err = inet_ctl_sock_create(&sk, PF_INET6,
|
|
|
|
SOCK_RAW, IPPROTO_ICMPV6, net);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (err < 0) {
|
2012-05-16 19:28:38 +00:00
|
|
|
ND_PRINTK(0, err,
|
|
|
|
"NDISC: Failed to initialize the control socket (err %d)\n",
|
|
|
|
err);
|
2005-04-16 22:20:36 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2008-04-03 21:31:03 +00:00
|
|
|
net->ipv6.ndisc_sk = sk;
|
2008-03-07 19:15:34 +00:00
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
np = inet6_sk(sk);
|
|
|
|
np->hop_limit = 255;
|
|
|
|
/* Do not loopback ndisc messages */
|
|
|
|
np->mc_loop = 0;
|
|
|
|
|
2008-03-07 19:15:34 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-01-17 03:35:32 +00:00
|
|
|
static void __net_exit ndisc_net_exit(struct net *net)
|
2008-03-07 19:15:34 +00:00
|
|
|
{
|
2008-04-03 21:31:03 +00:00
|
|
|
inet_ctl_sock_destroy(net->ipv6.ndisc_sk);
|
2008-03-07 19:15:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct pernet_operations ndisc_net_ops = {
|
|
|
|
.init = ndisc_net_init,
|
|
|
|
.exit = ndisc_net_exit,
|
|
|
|
};
|
|
|
|
|
|
|
|
int __init ndisc_init(void)
|
|
|
|
{
|
|
|
|
int err;
|
|
|
|
|
|
|
|
err = register_pernet_subsys(&ndisc_net_ops);
|
|
|
|
if (err)
|
|
|
|
return err;
|
2007-02-09 14:24:49 +00:00
|
|
|
/*
|
|
|
|
* Initialize the neighbour table
|
|
|
|
*/
|
2014-11-10 23:59:36 +00:00
|
|
|
neigh_table_init(NEIGH_ND_TABLE, &nd_tbl);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
#ifdef CONFIG_SYSCTL
|
2013-12-07 18:26:55 +00:00
|
|
|
err = neigh_sysctl_register(NULL, &nd_tbl.parms,
|
2014-07-24 20:19:37 +00:00
|
|
|
ndisc_ifinfo_sysctl_change);
|
2008-03-07 19:15:34 +00:00
|
|
|
if (err)
|
|
|
|
goto out_unregister_pernet;
|
|
|
|
out:
|
2013-11-16 02:52:08 +00:00
|
|
|
#endif
|
2008-03-07 19:15:34 +00:00
|
|
|
return err;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2008-03-07 19:15:34 +00:00
|
|
|
#ifdef CONFIG_SYSCTL
|
|
|
|
out_unregister_pernet:
|
|
|
|
unregister_pernet_subsys(&ndisc_net_ops);
|
|
|
|
goto out;
|
2013-09-09 19:45:04 +00:00
|
|
|
#endif
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2013-09-09 19:45:04 +00:00
|
|
|
int __init ndisc_late_init(void)
|
|
|
|
{
|
|
|
|
return register_netdevice_notifier(&ndisc_netdev_notifier);
|
|
|
|
}
|
|
|
|
|
|
|
|
void ndisc_late_cleanup(void)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
2006-11-04 00:08:19 +00:00
|
|
|
unregister_netdevice_notifier(&ndisc_netdev_notifier);
|
2013-09-09 19:45:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void ndisc_cleanup(void)
|
|
|
|
{
|
2005-04-16 22:20:36 +00:00
|
|
|
#ifdef CONFIG_SYSCTL
|
|
|
|
neigh_sysctl_unregister(&nd_tbl.parms);
|
|
|
|
#endif
|
2014-11-10 23:59:36 +00:00
|
|
|
neigh_table_clear(NEIGH_ND_TABLE, &nd_tbl);
|
2008-03-07 19:15:34 +00:00
|
|
|
unregister_pernet_subsys(&ndisc_net_ops);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|