xref: /openbmc/linux/net/core/neighbour.c (revision c9933d49)
1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3  *	Generic address resolution entity
4  *
5  *	Authors:
6  *	Pedro Roque		<roque@di.fc.ul.pt>
7  *	Alexey Kuznetsov	<kuznet@ms2.inr.ac.ru>
8  *
9  *	Fixes:
10  *	Vitaly E. Lavrov	releasing NULL neighbor in neigh_add.
11  *	Harald Welte		Add neighbour cache statistics like rtstat
12  */
13 
14 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
15 
16 #include <linux/slab.h>
17 #include <linux/kmemleak.h>
18 #include <linux/types.h>
19 #include <linux/kernel.h>
20 #include <linux/module.h>
21 #include <linux/socket.h>
22 #include <linux/netdevice.h>
23 #include <linux/proc_fs.h>
24 #ifdef CONFIG_SYSCTL
25 #include <linux/sysctl.h>
26 #endif
27 #include <linux/times.h>
28 #include <net/net_namespace.h>
29 #include <net/neighbour.h>
30 #include <net/arp.h>
31 #include <net/dst.h>
32 #include <net/sock.h>
33 #include <net/netevent.h>
34 #include <net/netlink.h>
35 #include <linux/rtnetlink.h>
36 #include <linux/random.h>
37 #include <linux/string.h>
38 #include <linux/log2.h>
39 #include <linux/inetdevice.h>
40 #include <net/addrconf.h>
41 
42 #include <trace/events/neigh.h>
43 
44 #define NEIGH_DEBUG 1
45 #define neigh_dbg(level, fmt, ...)		\
46 do {						\
47 	if (level <= NEIGH_DEBUG)		\
48 		pr_debug(fmt, ##__VA_ARGS__);	\
49 } while (0)
50 
51 #define PNEIGH_HASHMASK		0xF
52 
53 static void neigh_timer_handler(struct timer_list *t);
54 static void __neigh_notify(struct neighbour *n, int type, int flags,
55 			   u32 pid);
56 static void neigh_update_notify(struct neighbour *neigh, u32 nlmsg_pid);
57 static int pneigh_ifdown_and_unlock(struct neigh_table *tbl,
58 				    struct net_device *dev);
59 
60 #ifdef CONFIG_PROC_FS
61 static const struct seq_operations neigh_stat_seq_ops;
62 #endif
63 
64 /*
65    Neighbour hash table buckets are protected with rwlock tbl->lock.
66 
67    - All the scans/updates to hash buckets MUST be made under this lock.
68    - NOTHING clever should be made under this lock: no callbacks
69      to protocol backends, no attempts to send something to network.
70      It will result in deadlocks, if backend/driver wants to use neighbour
71      cache.
72    - If the entry requires some non-trivial actions, increase
73      its reference count and release table lock.
74 
75    Neighbour entries are protected:
76    - with reference count.
77    - with rwlock neigh->lock
78 
79    Reference count prevents destruction.
80 
81    neigh->lock mainly serializes ll address data and its validity state.
82    However, the same lock is used to protect another entry fields:
83     - timer
84     - resolution queue
85 
86    Again, nothing clever shall be made under neigh->lock,
87    the most complicated procedure, which we allow is dev->hard_header.
88    It is supposed, that dev->hard_header is simplistic and does
89    not make callbacks to neighbour tables.
90  */
91 
92 static int neigh_blackhole(struct neighbour *neigh, struct sk_buff *skb)
93 {
94 	kfree_skb(skb);
95 	return -ENETDOWN;
96 }
97 
98 static void neigh_cleanup_and_release(struct neighbour *neigh)
99 {
100 	trace_neigh_cleanup_and_release(neigh, 0);
101 	__neigh_notify(neigh, RTM_DELNEIGH, 0, 0);
102 	call_netevent_notifiers(NETEVENT_NEIGH_UPDATE, neigh);
103 	neigh_release(neigh);
104 }
105 
106 /*
107  * It is random distribution in the interval (1/2)*base...(3/2)*base.
108  * It corresponds to default IPv6 settings and is not overridable,
109  * because it is really reasonable choice.
110  */
111 
112 unsigned long neigh_rand_reach_time(unsigned long base)
113 {
114 	return base ? (prandom_u32() % base) + (base >> 1) : 0;
115 }
116 EXPORT_SYMBOL(neigh_rand_reach_time);
117 
118 static void neigh_mark_dead(struct neighbour *n)
119 {
120 	n->dead = 1;
121 	if (!list_empty(&n->gc_list)) {
122 		list_del_init(&n->gc_list);
123 		atomic_dec(&n->tbl->gc_entries);
124 	}
125 	if (!list_empty(&n->managed_list))
126 		list_del_init(&n->managed_list);
127 }
128 
129 static void neigh_update_gc_list(struct neighbour *n)
130 {
131 	bool on_gc_list, exempt_from_gc;
132 
133 	write_lock_bh(&n->tbl->lock);
134 	write_lock(&n->lock);
135 	if (n->dead)
136 		goto out;
137 
138 	/* remove from the gc list if new state is permanent or if neighbor
139 	 * is externally learned; otherwise entry should be on the gc list
140 	 */
141 	exempt_from_gc = n->nud_state & NUD_PERMANENT ||
142 			 n->flags & NTF_EXT_LEARNED;
143 	on_gc_list = !list_empty(&n->gc_list);
144 
145 	if (exempt_from_gc && on_gc_list) {
146 		list_del_init(&n->gc_list);
147 		atomic_dec(&n->tbl->gc_entries);
148 	} else if (!exempt_from_gc && !on_gc_list) {
149 		/* add entries to the tail; cleaning removes from the front */
150 		list_add_tail(&n->gc_list, &n->tbl->gc_list);
151 		atomic_inc(&n->tbl->gc_entries);
152 	}
153 out:
154 	write_unlock(&n->lock);
155 	write_unlock_bh(&n->tbl->lock);
156 }
157 
158 static void neigh_update_managed_list(struct neighbour *n)
159 {
160 	bool on_managed_list, add_to_managed;
161 
162 	write_lock_bh(&n->tbl->lock);
163 	write_lock(&n->lock);
164 	if (n->dead)
165 		goto out;
166 
167 	add_to_managed = n->flags & NTF_MANAGED;
168 	on_managed_list = !list_empty(&n->managed_list);
169 
170 	if (!add_to_managed && on_managed_list)
171 		list_del_init(&n->managed_list);
172 	else if (add_to_managed && !on_managed_list)
173 		list_add_tail(&n->managed_list, &n->tbl->managed_list);
174 out:
175 	write_unlock(&n->lock);
176 	write_unlock_bh(&n->tbl->lock);
177 }
178 
179 static void neigh_update_flags(struct neighbour *neigh, u32 flags, int *notify,
180 			       bool *gc_update, bool *managed_update)
181 {
182 	u32 ndm_flags, old_flags = neigh->flags;
183 
184 	if (!(flags & NEIGH_UPDATE_F_ADMIN))
185 		return;
186 
187 	ndm_flags  = (flags & NEIGH_UPDATE_F_EXT_LEARNED) ? NTF_EXT_LEARNED : 0;
188 	ndm_flags |= (flags & NEIGH_UPDATE_F_MANAGED) ? NTF_MANAGED : 0;
189 
190 	if ((old_flags ^ ndm_flags) & NTF_EXT_LEARNED) {
191 		if (ndm_flags & NTF_EXT_LEARNED)
192 			neigh->flags |= NTF_EXT_LEARNED;
193 		else
194 			neigh->flags &= ~NTF_EXT_LEARNED;
195 		*notify = 1;
196 		*gc_update = true;
197 	}
198 	if ((old_flags ^ ndm_flags) & NTF_MANAGED) {
199 		if (ndm_flags & NTF_MANAGED)
200 			neigh->flags |= NTF_MANAGED;
201 		else
202 			neigh->flags &= ~NTF_MANAGED;
203 		*notify = 1;
204 		*managed_update = true;
205 	}
206 }
207 
208 static bool neigh_del(struct neighbour *n, struct neighbour __rcu **np,
209 		      struct neigh_table *tbl)
210 {
211 	bool retval = false;
212 
213 	write_lock(&n->lock);
214 	if (refcount_read(&n->refcnt) == 1) {
215 		struct neighbour *neigh;
216 
217 		neigh = rcu_dereference_protected(n->next,
218 						  lockdep_is_held(&tbl->lock));
219 		rcu_assign_pointer(*np, neigh);
220 		neigh_mark_dead(n);
221 		retval = true;
222 	}
223 	write_unlock(&n->lock);
224 	if (retval)
225 		neigh_cleanup_and_release(n);
226 	return retval;
227 }
228 
229 bool neigh_remove_one(struct neighbour *ndel, struct neigh_table *tbl)
230 {
231 	struct neigh_hash_table *nht;
232 	void *pkey = ndel->primary_key;
233 	u32 hash_val;
234 	struct neighbour *n;
235 	struct neighbour __rcu **np;
236 
237 	nht = rcu_dereference_protected(tbl->nht,
238 					lockdep_is_held(&tbl->lock));
239 	hash_val = tbl->hash(pkey, ndel->dev, nht->hash_rnd);
240 	hash_val = hash_val >> (32 - nht->hash_shift);
241 
242 	np = &nht->hash_buckets[hash_val];
243 	while ((n = rcu_dereference_protected(*np,
244 					      lockdep_is_held(&tbl->lock)))) {
245 		if (n == ndel)
246 			return neigh_del(n, np, tbl);
247 		np = &n->next;
248 	}
249 	return false;
250 }
251 
252 static int neigh_forced_gc(struct neigh_table *tbl)
253 {
254 	int max_clean = atomic_read(&tbl->gc_entries) - tbl->gc_thresh2;
255 	unsigned long tref = jiffies - 5 * HZ;
256 	struct neighbour *n, *tmp;
257 	int shrunk = 0;
258 
259 	NEIGH_CACHE_STAT_INC(tbl, forced_gc_runs);
260 
261 	write_lock_bh(&tbl->lock);
262 
263 	list_for_each_entry_safe(n, tmp, &tbl->gc_list, gc_list) {
264 		if (refcount_read(&n->refcnt) == 1) {
265 			bool remove = false;
266 
267 			write_lock(&n->lock);
268 			if ((n->nud_state == NUD_FAILED) ||
269 			    (n->nud_state == NUD_NOARP) ||
270 			    (tbl->is_multicast &&
271 			     tbl->is_multicast(n->primary_key)) ||
272 			    time_after(tref, n->updated))
273 				remove = true;
274 			write_unlock(&n->lock);
275 
276 			if (remove && neigh_remove_one(n, tbl))
277 				shrunk++;
278 			if (shrunk >= max_clean)
279 				break;
280 		}
281 	}
282 
283 	tbl->last_flush = jiffies;
284 
285 	write_unlock_bh(&tbl->lock);
286 
287 	return shrunk;
288 }
289 
290 static void neigh_add_timer(struct neighbour *n, unsigned long when)
291 {
292 	neigh_hold(n);
293 	if (unlikely(mod_timer(&n->timer, when))) {
294 		printk("NEIGH: BUG, double timer add, state is %x\n",
295 		       n->nud_state);
296 		dump_stack();
297 	}
298 }
299 
300 static int neigh_del_timer(struct neighbour *n)
301 {
302 	if ((n->nud_state & NUD_IN_TIMER) &&
303 	    del_timer(&n->timer)) {
304 		neigh_release(n);
305 		return 1;
306 	}
307 	return 0;
308 }
309 
310 static void pneigh_queue_purge(struct sk_buff_head *list)
311 {
312 	struct sk_buff *skb;
313 
314 	while ((skb = skb_dequeue(list)) != NULL) {
315 		dev_put(skb->dev);
316 		kfree_skb(skb);
317 	}
318 }
319 
320 static void neigh_flush_dev(struct neigh_table *tbl, struct net_device *dev,
321 			    bool skip_perm)
322 {
323 	int i;
324 	struct neigh_hash_table *nht;
325 
326 	nht = rcu_dereference_protected(tbl->nht,
327 					lockdep_is_held(&tbl->lock));
328 
329 	for (i = 0; i < (1 << nht->hash_shift); i++) {
330 		struct neighbour *n;
331 		struct neighbour __rcu **np = &nht->hash_buckets[i];
332 
333 		while ((n = rcu_dereference_protected(*np,
334 					lockdep_is_held(&tbl->lock))) != NULL) {
335 			if (dev && n->dev != dev) {
336 				np = &n->next;
337 				continue;
338 			}
339 			if (skip_perm && n->nud_state & NUD_PERMANENT) {
340 				np = &n->next;
341 				continue;
342 			}
343 			rcu_assign_pointer(*np,
344 				   rcu_dereference_protected(n->next,
345 						lockdep_is_held(&tbl->lock)));
346 			write_lock(&n->lock);
347 			neigh_del_timer(n);
348 			neigh_mark_dead(n);
349 			if (refcount_read(&n->refcnt) != 1) {
350 				/* The most unpleasant situation.
351 				   We must destroy neighbour entry,
352 				   but someone still uses it.
353 
354 				   The destroy will be delayed until
355 				   the last user releases us, but
356 				   we must kill timers etc. and move
357 				   it to safe state.
358 				 */
359 				__skb_queue_purge(&n->arp_queue);
360 				n->arp_queue_len_bytes = 0;
361 				n->output = neigh_blackhole;
362 				if (n->nud_state & NUD_VALID)
363 					n->nud_state = NUD_NOARP;
364 				else
365 					n->nud_state = NUD_NONE;
366 				neigh_dbg(2, "neigh %p is stray\n", n);
367 			}
368 			write_unlock(&n->lock);
369 			neigh_cleanup_and_release(n);
370 		}
371 	}
372 }
373 
374 void neigh_changeaddr(struct neigh_table *tbl, struct net_device *dev)
375 {
376 	write_lock_bh(&tbl->lock);
377 	neigh_flush_dev(tbl, dev, false);
378 	write_unlock_bh(&tbl->lock);
379 }
380 EXPORT_SYMBOL(neigh_changeaddr);
381 
382 static int __neigh_ifdown(struct neigh_table *tbl, struct net_device *dev,
383 			  bool skip_perm)
384 {
385 	write_lock_bh(&tbl->lock);
386 	neigh_flush_dev(tbl, dev, skip_perm);
387 	pneigh_ifdown_and_unlock(tbl, dev);
388 
389 	del_timer_sync(&tbl->proxy_timer);
390 	pneigh_queue_purge(&tbl->proxy_queue);
391 	return 0;
392 }
393 
394 int neigh_carrier_down(struct neigh_table *tbl, struct net_device *dev)
395 {
396 	__neigh_ifdown(tbl, dev, true);
397 	return 0;
398 }
399 EXPORT_SYMBOL(neigh_carrier_down);
400 
401 int neigh_ifdown(struct neigh_table *tbl, struct net_device *dev)
402 {
403 	__neigh_ifdown(tbl, dev, false);
404 	return 0;
405 }
406 EXPORT_SYMBOL(neigh_ifdown);
407 
408 static struct neighbour *neigh_alloc(struct neigh_table *tbl,
409 				     struct net_device *dev,
410 				     u32 flags, bool exempt_from_gc)
411 {
412 	struct neighbour *n = NULL;
413 	unsigned long now = jiffies;
414 	int entries;
415 
416 	if (exempt_from_gc)
417 		goto do_alloc;
418 
419 	entries = atomic_inc_return(&tbl->gc_entries) - 1;
420 	if (entries >= tbl->gc_thresh3 ||
421 	    (entries >= tbl->gc_thresh2 &&
422 	     time_after(now, tbl->last_flush + 5 * HZ))) {
423 		if (!neigh_forced_gc(tbl) &&
424 		    entries >= tbl->gc_thresh3) {
425 			net_info_ratelimited("%s: neighbor table overflow!\n",
426 					     tbl->id);
427 			NEIGH_CACHE_STAT_INC(tbl, table_fulls);
428 			goto out_entries;
429 		}
430 	}
431 
432 do_alloc:
433 	n = kzalloc(tbl->entry_size + dev->neigh_priv_len, GFP_ATOMIC);
434 	if (!n)
435 		goto out_entries;
436 
437 	__skb_queue_head_init(&n->arp_queue);
438 	rwlock_init(&n->lock);
439 	seqlock_init(&n->ha_lock);
440 	n->updated	  = n->used = now;
441 	n->nud_state	  = NUD_NONE;
442 	n->output	  = neigh_blackhole;
443 	n->flags	  = flags;
444 	seqlock_init(&n->hh.hh_lock);
445 	n->parms	  = neigh_parms_clone(&tbl->parms);
446 	timer_setup(&n->timer, neigh_timer_handler, 0);
447 
448 	NEIGH_CACHE_STAT_INC(tbl, allocs);
449 	n->tbl		  = tbl;
450 	refcount_set(&n->refcnt, 1);
451 	n->dead		  = 1;
452 	INIT_LIST_HEAD(&n->gc_list);
453 	INIT_LIST_HEAD(&n->managed_list);
454 
455 	atomic_inc(&tbl->entries);
456 out:
457 	return n;
458 
459 out_entries:
460 	if (!exempt_from_gc)
461 		atomic_dec(&tbl->gc_entries);
462 	goto out;
463 }
464 
465 static void neigh_get_hash_rnd(u32 *x)
466 {
467 	*x = get_random_u32() | 1;
468 }
469 
470 static struct neigh_hash_table *neigh_hash_alloc(unsigned int shift)
471 {
472 	size_t size = (1 << shift) * sizeof(struct neighbour *);
473 	struct neigh_hash_table *ret;
474 	struct neighbour __rcu **buckets;
475 	int i;
476 
477 	ret = kmalloc(sizeof(*ret), GFP_ATOMIC);
478 	if (!ret)
479 		return NULL;
480 	if (size <= PAGE_SIZE) {
481 		buckets = kzalloc(size, GFP_ATOMIC);
482 	} else {
483 		buckets = (struct neighbour __rcu **)
484 			  __get_free_pages(GFP_ATOMIC | __GFP_ZERO,
485 					   get_order(size));
486 		kmemleak_alloc(buckets, size, 1, GFP_ATOMIC);
487 	}
488 	if (!buckets) {
489 		kfree(ret);
490 		return NULL;
491 	}
492 	ret->hash_buckets = buckets;
493 	ret->hash_shift = shift;
494 	for (i = 0; i < NEIGH_NUM_HASH_RND; i++)
495 		neigh_get_hash_rnd(&ret->hash_rnd[i]);
496 	return ret;
497 }
498 
499 static void neigh_hash_free_rcu(struct rcu_head *head)
500 {
501 	struct neigh_hash_table *nht = container_of(head,
502 						    struct neigh_hash_table,
503 						    rcu);
504 	size_t size = (1 << nht->hash_shift) * sizeof(struct neighbour *);
505 	struct neighbour __rcu **buckets = nht->hash_buckets;
506 
507 	if (size <= PAGE_SIZE) {
508 		kfree(buckets);
509 	} else {
510 		kmemleak_free(buckets);
511 		free_pages((unsigned long)buckets, get_order(size));
512 	}
513 	kfree(nht);
514 }
515 
516 static struct neigh_hash_table *neigh_hash_grow(struct neigh_table *tbl,
517 						unsigned long new_shift)
518 {
519 	unsigned int i, hash;
520 	struct neigh_hash_table *new_nht, *old_nht;
521 
522 	NEIGH_CACHE_STAT_INC(tbl, hash_grows);
523 
524 	old_nht = rcu_dereference_protected(tbl->nht,
525 					    lockdep_is_held(&tbl->lock));
526 	new_nht = neigh_hash_alloc(new_shift);
527 	if (!new_nht)
528 		return old_nht;
529 
530 	for (i = 0; i < (1 << old_nht->hash_shift); i++) {
531 		struct neighbour *n, *next;
532 
533 		for (n = rcu_dereference_protected(old_nht->hash_buckets[i],
534 						   lockdep_is_held(&tbl->lock));
535 		     n != NULL;
536 		     n = next) {
537 			hash = tbl->hash(n->primary_key, n->dev,
538 					 new_nht->hash_rnd);
539 
540 			hash >>= (32 - new_nht->hash_shift);
541 			next = rcu_dereference_protected(n->next,
542 						lockdep_is_held(&tbl->lock));
543 
544 			rcu_assign_pointer(n->next,
545 					   rcu_dereference_protected(
546 						new_nht->hash_buckets[hash],
547 						lockdep_is_held(&tbl->lock)));
548 			rcu_assign_pointer(new_nht->hash_buckets[hash], n);
549 		}
550 	}
551 
552 	rcu_assign_pointer(tbl->nht, new_nht);
553 	call_rcu(&old_nht->rcu, neigh_hash_free_rcu);
554 	return new_nht;
555 }
556 
557 struct neighbour *neigh_lookup(struct neigh_table *tbl, const void *pkey,
558 			       struct net_device *dev)
559 {
560 	struct neighbour *n;
561 
562 	NEIGH_CACHE_STAT_INC(tbl, lookups);
563 
564 	rcu_read_lock_bh();
565 	n = __neigh_lookup_noref(tbl, pkey, dev);
566 	if (n) {
567 		if (!refcount_inc_not_zero(&n->refcnt))
568 			n = NULL;
569 		NEIGH_CACHE_STAT_INC(tbl, hits);
570 	}
571 
572 	rcu_read_unlock_bh();
573 	return n;
574 }
575 EXPORT_SYMBOL(neigh_lookup);
576 
577 struct neighbour *neigh_lookup_nodev(struct neigh_table *tbl, struct net *net,
578 				     const void *pkey)
579 {
580 	struct neighbour *n;
581 	unsigned int key_len = tbl->key_len;
582 	u32 hash_val;
583 	struct neigh_hash_table *nht;
584 
585 	NEIGH_CACHE_STAT_INC(tbl, lookups);
586 
587 	rcu_read_lock_bh();
588 	nht = rcu_dereference_bh(tbl->nht);
589 	hash_val = tbl->hash(pkey, NULL, nht->hash_rnd) >> (32 - nht->hash_shift);
590 
591 	for (n = rcu_dereference_bh(nht->hash_buckets[hash_val]);
592 	     n != NULL;
593 	     n = rcu_dereference_bh(n->next)) {
594 		if (!memcmp(n->primary_key, pkey, key_len) &&
595 		    net_eq(dev_net(n->dev), net)) {
596 			if (!refcount_inc_not_zero(&n->refcnt))
597 				n = NULL;
598 			NEIGH_CACHE_STAT_INC(tbl, hits);
599 			break;
600 		}
601 	}
602 
603 	rcu_read_unlock_bh();
604 	return n;
605 }
606 EXPORT_SYMBOL(neigh_lookup_nodev);
607 
608 static struct neighbour *
609 ___neigh_create(struct neigh_table *tbl, const void *pkey,
610 		struct net_device *dev, u32 flags,
611 		bool exempt_from_gc, bool want_ref)
612 {
613 	u32 hash_val, key_len = tbl->key_len;
614 	struct neighbour *n1, *rc, *n;
615 	struct neigh_hash_table *nht;
616 	int error;
617 
618 	n = neigh_alloc(tbl, dev, flags, exempt_from_gc);
619 	trace_neigh_create(tbl, dev, pkey, n, exempt_from_gc);
620 	if (!n) {
621 		rc = ERR_PTR(-ENOBUFS);
622 		goto out;
623 	}
624 
625 	memcpy(n->primary_key, pkey, key_len);
626 	n->dev = dev;
627 	dev_hold_track(dev, &n->dev_tracker, GFP_ATOMIC);
628 
629 	/* Protocol specific setup. */
630 	if (tbl->constructor &&	(error = tbl->constructor(n)) < 0) {
631 		rc = ERR_PTR(error);
632 		goto out_neigh_release;
633 	}
634 
635 	if (dev->netdev_ops->ndo_neigh_construct) {
636 		error = dev->netdev_ops->ndo_neigh_construct(dev, n);
637 		if (error < 0) {
638 			rc = ERR_PTR(error);
639 			goto out_neigh_release;
640 		}
641 	}
642 
643 	/* Device specific setup. */
644 	if (n->parms->neigh_setup &&
645 	    (error = n->parms->neigh_setup(n)) < 0) {
646 		rc = ERR_PTR(error);
647 		goto out_neigh_release;
648 	}
649 
650 	n->confirmed = jiffies - (NEIGH_VAR(n->parms, BASE_REACHABLE_TIME) << 1);
651 
652 	write_lock_bh(&tbl->lock);
653 	nht = rcu_dereference_protected(tbl->nht,
654 					lockdep_is_held(&tbl->lock));
655 
656 	if (atomic_read(&tbl->entries) > (1 << nht->hash_shift))
657 		nht = neigh_hash_grow(tbl, nht->hash_shift + 1);
658 
659 	hash_val = tbl->hash(n->primary_key, dev, nht->hash_rnd) >> (32 - nht->hash_shift);
660 
661 	if (n->parms->dead) {
662 		rc = ERR_PTR(-EINVAL);
663 		goto out_tbl_unlock;
664 	}
665 
666 	for (n1 = rcu_dereference_protected(nht->hash_buckets[hash_val],
667 					    lockdep_is_held(&tbl->lock));
668 	     n1 != NULL;
669 	     n1 = rcu_dereference_protected(n1->next,
670 			lockdep_is_held(&tbl->lock))) {
671 		if (dev == n1->dev && !memcmp(n1->primary_key, n->primary_key, key_len)) {
672 			if (want_ref)
673 				neigh_hold(n1);
674 			rc = n1;
675 			goto out_tbl_unlock;
676 		}
677 	}
678 
679 	n->dead = 0;
680 	if (!exempt_from_gc)
681 		list_add_tail(&n->gc_list, &n->tbl->gc_list);
682 	if (n->flags & NTF_MANAGED)
683 		list_add_tail(&n->managed_list, &n->tbl->managed_list);
684 	if (want_ref)
685 		neigh_hold(n);
686 	rcu_assign_pointer(n->next,
687 			   rcu_dereference_protected(nht->hash_buckets[hash_val],
688 						     lockdep_is_held(&tbl->lock)));
689 	rcu_assign_pointer(nht->hash_buckets[hash_val], n);
690 	write_unlock_bh(&tbl->lock);
691 	neigh_dbg(2, "neigh %p is created\n", n);
692 	rc = n;
693 out:
694 	return rc;
695 out_tbl_unlock:
696 	write_unlock_bh(&tbl->lock);
697 out_neigh_release:
698 	if (!exempt_from_gc)
699 		atomic_dec(&tbl->gc_entries);
700 	neigh_release(n);
701 	goto out;
702 }
703 
704 struct neighbour *__neigh_create(struct neigh_table *tbl, const void *pkey,
705 				 struct net_device *dev, bool want_ref)
706 {
707 	return ___neigh_create(tbl, pkey, dev, 0, false, want_ref);
708 }
709 EXPORT_SYMBOL(__neigh_create);
710 
711 static u32 pneigh_hash(const void *pkey, unsigned int key_len)
712 {
713 	u32 hash_val = *(u32 *)(pkey + key_len - 4);
714 	hash_val ^= (hash_val >> 16);
715 	hash_val ^= hash_val >> 8;
716 	hash_val ^= hash_val >> 4;
717 	hash_val &= PNEIGH_HASHMASK;
718 	return hash_val;
719 }
720 
721 static struct pneigh_entry *__pneigh_lookup_1(struct pneigh_entry *n,
722 					      struct net *net,
723 					      const void *pkey,
724 					      unsigned int key_len,
725 					      struct net_device *dev)
726 {
727 	while (n) {
728 		if (!memcmp(n->key, pkey, key_len) &&
729 		    net_eq(pneigh_net(n), net) &&
730 		    (n->dev == dev || !n->dev))
731 			return n;
732 		n = n->next;
733 	}
734 	return NULL;
735 }
736 
737 struct pneigh_entry *__pneigh_lookup(struct neigh_table *tbl,
738 		struct net *net, const void *pkey, struct net_device *dev)
739 {
740 	unsigned int key_len = tbl->key_len;
741 	u32 hash_val = pneigh_hash(pkey, key_len);
742 
743 	return __pneigh_lookup_1(tbl->phash_buckets[hash_val],
744 				 net, pkey, key_len, dev);
745 }
746 EXPORT_SYMBOL_GPL(__pneigh_lookup);
747 
748 struct pneigh_entry * pneigh_lookup(struct neigh_table *tbl,
749 				    struct net *net, const void *pkey,
750 				    struct net_device *dev, int creat)
751 {
752 	struct pneigh_entry *n;
753 	unsigned int key_len = tbl->key_len;
754 	u32 hash_val = pneigh_hash(pkey, key_len);
755 
756 	read_lock_bh(&tbl->lock);
757 	n = __pneigh_lookup_1(tbl->phash_buckets[hash_val],
758 			      net, pkey, key_len, dev);
759 	read_unlock_bh(&tbl->lock);
760 
761 	if (n || !creat)
762 		goto out;
763 
764 	ASSERT_RTNL();
765 
766 	n = kzalloc(sizeof(*n) + key_len, GFP_KERNEL);
767 	if (!n)
768 		goto out;
769 
770 	write_pnet(&n->net, net);
771 	memcpy(n->key, pkey, key_len);
772 	n->dev = dev;
773 	dev_hold_track(dev, &n->dev_tracker, GFP_KERNEL);
774 
775 	if (tbl->pconstructor && tbl->pconstructor(n)) {
776 		dev_put_track(dev, &n->dev_tracker);
777 		kfree(n);
778 		n = NULL;
779 		goto out;
780 	}
781 
782 	write_lock_bh(&tbl->lock);
783 	n->next = tbl->phash_buckets[hash_val];
784 	tbl->phash_buckets[hash_val] = n;
785 	write_unlock_bh(&tbl->lock);
786 out:
787 	return n;
788 }
789 EXPORT_SYMBOL(pneigh_lookup);
790 
791 
792 int pneigh_delete(struct neigh_table *tbl, struct net *net, const void *pkey,
793 		  struct net_device *dev)
794 {
795 	struct pneigh_entry *n, **np;
796 	unsigned int key_len = tbl->key_len;
797 	u32 hash_val = pneigh_hash(pkey, key_len);
798 
799 	write_lock_bh(&tbl->lock);
800 	for (np = &tbl->phash_buckets[hash_val]; (n = *np) != NULL;
801 	     np = &n->next) {
802 		if (!memcmp(n->key, pkey, key_len) && n->dev == dev &&
803 		    net_eq(pneigh_net(n), net)) {
804 			*np = n->next;
805 			write_unlock_bh(&tbl->lock);
806 			if (tbl->pdestructor)
807 				tbl->pdestructor(n);
808 			dev_put_track(n->dev, &n->dev_tracker);
809 			kfree(n);
810 			return 0;
811 		}
812 	}
813 	write_unlock_bh(&tbl->lock);
814 	return -ENOENT;
815 }
816 
817 static int pneigh_ifdown_and_unlock(struct neigh_table *tbl,
818 				    struct net_device *dev)
819 {
820 	struct pneigh_entry *n, **np, *freelist = NULL;
821 	u32 h;
822 
823 	for (h = 0; h <= PNEIGH_HASHMASK; h++) {
824 		np = &tbl->phash_buckets[h];
825 		while ((n = *np) != NULL) {
826 			if (!dev || n->dev == dev) {
827 				*np = n->next;
828 				n->next = freelist;
829 				freelist = n;
830 				continue;
831 			}
832 			np = &n->next;
833 		}
834 	}
835 	write_unlock_bh(&tbl->lock);
836 	while ((n = freelist)) {
837 		freelist = n->next;
838 		n->next = NULL;
839 		if (tbl->pdestructor)
840 			tbl->pdestructor(n);
841 		dev_put_track(n->dev, &n->dev_tracker);
842 		kfree(n);
843 	}
844 	return -ENOENT;
845 }
846 
847 static void neigh_parms_destroy(struct neigh_parms *parms);
848 
849 static inline void neigh_parms_put(struct neigh_parms *parms)
850 {
851 	if (refcount_dec_and_test(&parms->refcnt))
852 		neigh_parms_destroy(parms);
853 }
854 
855 /*
856  *	neighbour must already be out of the table;
857  *
858  */
859 void neigh_destroy(struct neighbour *neigh)
860 {
861 	struct net_device *dev = neigh->dev;
862 
863 	NEIGH_CACHE_STAT_INC(neigh->tbl, destroys);
864 
865 	if (!neigh->dead) {
866 		pr_warn("Destroying alive neighbour %p\n", neigh);
867 		dump_stack();
868 		return;
869 	}
870 
871 	if (neigh_del_timer(neigh))
872 		pr_warn("Impossible event\n");
873 
874 	write_lock_bh(&neigh->lock);
875 	__skb_queue_purge(&neigh->arp_queue);
876 	write_unlock_bh(&neigh->lock);
877 	neigh->arp_queue_len_bytes = 0;
878 
879 	if (dev->netdev_ops->ndo_neigh_destroy)
880 		dev->netdev_ops->ndo_neigh_destroy(dev, neigh);
881 
882 	dev_put_track(dev, &neigh->dev_tracker);
883 	neigh_parms_put(neigh->parms);
884 
885 	neigh_dbg(2, "neigh %p is destroyed\n", neigh);
886 
887 	atomic_dec(&neigh->tbl->entries);
888 	kfree_rcu(neigh, rcu);
889 }
890 EXPORT_SYMBOL(neigh_destroy);
891 
892 /* Neighbour state is suspicious;
893    disable fast path.
894 
895    Called with write_locked neigh.
896  */
897 static void neigh_suspect(struct neighbour *neigh)
898 {
899 	neigh_dbg(2, "neigh %p is suspected\n", neigh);
900 
901 	neigh->output = neigh->ops->output;
902 }
903 
904 /* Neighbour state is OK;
905    enable fast path.
906 
907    Called with write_locked neigh.
908  */
909 static void neigh_connect(struct neighbour *neigh)
910 {
911 	neigh_dbg(2, "neigh %p is connected\n", neigh);
912 
913 	neigh->output = neigh->ops->connected_output;
914 }
915 
916 static void neigh_periodic_work(struct work_struct *work)
917 {
918 	struct neigh_table *tbl = container_of(work, struct neigh_table, gc_work.work);
919 	struct neighbour *n;
920 	struct neighbour __rcu **np;
921 	unsigned int i;
922 	struct neigh_hash_table *nht;
923 
924 	NEIGH_CACHE_STAT_INC(tbl, periodic_gc_runs);
925 
926 	write_lock_bh(&tbl->lock);
927 	nht = rcu_dereference_protected(tbl->nht,
928 					lockdep_is_held(&tbl->lock));
929 
930 	/*
931 	 *	periodically recompute ReachableTime from random function
932 	 */
933 
934 	if (time_after(jiffies, tbl->last_rand + 300 * HZ)) {
935 		struct neigh_parms *p;
936 		tbl->last_rand = jiffies;
937 		list_for_each_entry(p, &tbl->parms_list, list)
938 			p->reachable_time =
939 				neigh_rand_reach_time(NEIGH_VAR(p, BASE_REACHABLE_TIME));
940 	}
941 
942 	if (atomic_read(&tbl->entries) < tbl->gc_thresh1)
943 		goto out;
944 
945 	for (i = 0 ; i < (1 << nht->hash_shift); i++) {
946 		np = &nht->hash_buckets[i];
947 
948 		while ((n = rcu_dereference_protected(*np,
949 				lockdep_is_held(&tbl->lock))) != NULL) {
950 			unsigned int state;
951 
952 			write_lock(&n->lock);
953 
954 			state = n->nud_state;
955 			if ((state & (NUD_PERMANENT | NUD_IN_TIMER)) ||
956 			    (n->flags & NTF_EXT_LEARNED)) {
957 				write_unlock(&n->lock);
958 				goto next_elt;
959 			}
960 
961 			if (time_before(n->used, n->confirmed))
962 				n->used = n->confirmed;
963 
964 			if (refcount_read(&n->refcnt) == 1 &&
965 			    (state == NUD_FAILED ||
966 			     time_after(jiffies, n->used + NEIGH_VAR(n->parms, GC_STALETIME)))) {
967 				*np = n->next;
968 				neigh_mark_dead(n);
969 				write_unlock(&n->lock);
970 				neigh_cleanup_and_release(n);
971 				continue;
972 			}
973 			write_unlock(&n->lock);
974 
975 next_elt:
976 			np = &n->next;
977 		}
978 		/*
979 		 * It's fine to release lock here, even if hash table
980 		 * grows while we are preempted.
981 		 */
982 		write_unlock_bh(&tbl->lock);
983 		cond_resched();
984 		write_lock_bh(&tbl->lock);
985 		nht = rcu_dereference_protected(tbl->nht,
986 						lockdep_is_held(&tbl->lock));
987 	}
988 out:
989 	/* Cycle through all hash buckets every BASE_REACHABLE_TIME/2 ticks.
990 	 * ARP entry timeouts range from 1/2 BASE_REACHABLE_TIME to 3/2
991 	 * BASE_REACHABLE_TIME.
992 	 */
993 	queue_delayed_work(system_power_efficient_wq, &tbl->gc_work,
994 			      NEIGH_VAR(&tbl->parms, BASE_REACHABLE_TIME) >> 1);
995 	write_unlock_bh(&tbl->lock);
996 }
997 
998 static __inline__ int neigh_max_probes(struct neighbour *n)
999 {
1000 	struct neigh_parms *p = n->parms;
1001 	return NEIGH_VAR(p, UCAST_PROBES) + NEIGH_VAR(p, APP_PROBES) +
1002 	       (n->nud_state & NUD_PROBE ? NEIGH_VAR(p, MCAST_REPROBES) :
1003 	        NEIGH_VAR(p, MCAST_PROBES));
1004 }
1005 
1006 static void neigh_invalidate(struct neighbour *neigh)
1007 	__releases(neigh->lock)
1008 	__acquires(neigh->lock)
1009 {
1010 	struct sk_buff *skb;
1011 
1012 	NEIGH_CACHE_STAT_INC(neigh->tbl, res_failed);
1013 	neigh_dbg(2, "neigh %p is failed\n", neigh);
1014 	neigh->updated = jiffies;
1015 
1016 	/* It is very thin place. report_unreachable is very complicated
1017 	   routine. Particularly, it can hit the same neighbour entry!
1018 
1019 	   So that, we try to be accurate and avoid dead loop. --ANK
1020 	 */
1021 	while (neigh->nud_state == NUD_FAILED &&
1022 	       (skb = __skb_dequeue(&neigh->arp_queue)) != NULL) {
1023 		write_unlock(&neigh->lock);
1024 		neigh->ops->error_report(neigh, skb);
1025 		write_lock(&neigh->lock);
1026 	}
1027 	__skb_queue_purge(&neigh->arp_queue);
1028 	neigh->arp_queue_len_bytes = 0;
1029 }
1030 
1031 static void neigh_probe(struct neighbour *neigh)
1032 	__releases(neigh->lock)
1033 {
1034 	struct sk_buff *skb = skb_peek_tail(&neigh->arp_queue);
1035 	/* keep skb alive even if arp_queue overflows */
1036 	if (skb)
1037 		skb = skb_clone(skb, GFP_ATOMIC);
1038 	write_unlock(&neigh->lock);
1039 	if (neigh->ops->solicit)
1040 		neigh->ops->solicit(neigh, skb);
1041 	atomic_inc(&neigh->probes);
1042 	consume_skb(skb);
1043 }
1044 
1045 /* Called when a timer expires for a neighbour entry. */
1046 
1047 static void neigh_timer_handler(struct timer_list *t)
1048 {
1049 	unsigned long now, next;
1050 	struct neighbour *neigh = from_timer(neigh, t, timer);
1051 	unsigned int state;
1052 	int notify = 0;
1053 
1054 	write_lock(&neigh->lock);
1055 
1056 	state = neigh->nud_state;
1057 	now = jiffies;
1058 	next = now + HZ;
1059 
1060 	if (!(state & NUD_IN_TIMER))
1061 		goto out;
1062 
1063 	if (state & NUD_REACHABLE) {
1064 		if (time_before_eq(now,
1065 				   neigh->confirmed + neigh->parms->reachable_time)) {
1066 			neigh_dbg(2, "neigh %p is still alive\n", neigh);
1067 			next = neigh->confirmed + neigh->parms->reachable_time;
1068 		} else if (time_before_eq(now,
1069 					  neigh->used +
1070 					  NEIGH_VAR(neigh->parms, DELAY_PROBE_TIME))) {
1071 			neigh_dbg(2, "neigh %p is delayed\n", neigh);
1072 			neigh->nud_state = NUD_DELAY;
1073 			neigh->updated = jiffies;
1074 			neigh_suspect(neigh);
1075 			next = now + NEIGH_VAR(neigh->parms, DELAY_PROBE_TIME);
1076 		} else {
1077 			neigh_dbg(2, "neigh %p is suspected\n", neigh);
1078 			neigh->nud_state = NUD_STALE;
1079 			neigh->updated = jiffies;
1080 			neigh_suspect(neigh);
1081 			notify = 1;
1082 		}
1083 	} else if (state & NUD_DELAY) {
1084 		if (time_before_eq(now,
1085 				   neigh->confirmed +
1086 				   NEIGH_VAR(neigh->parms, DELAY_PROBE_TIME))) {
1087 			neigh_dbg(2, "neigh %p is now reachable\n", neigh);
1088 			neigh->nud_state = NUD_REACHABLE;
1089 			neigh->updated = jiffies;
1090 			neigh_connect(neigh);
1091 			notify = 1;
1092 			next = neigh->confirmed + neigh->parms->reachable_time;
1093 		} else {
1094 			neigh_dbg(2, "neigh %p is probed\n", neigh);
1095 			neigh->nud_state = NUD_PROBE;
1096 			neigh->updated = jiffies;
1097 			atomic_set(&neigh->probes, 0);
1098 			notify = 1;
1099 			next = now + max(NEIGH_VAR(neigh->parms, RETRANS_TIME),
1100 					 HZ/100);
1101 		}
1102 	} else {
1103 		/* NUD_PROBE|NUD_INCOMPLETE */
1104 		next = now + max(NEIGH_VAR(neigh->parms, RETRANS_TIME), HZ/100);
1105 	}
1106 
1107 	if ((neigh->nud_state & (NUD_INCOMPLETE | NUD_PROBE)) &&
1108 	    atomic_read(&neigh->probes) >= neigh_max_probes(neigh)) {
1109 		neigh->nud_state = NUD_FAILED;
1110 		notify = 1;
1111 		neigh_invalidate(neigh);
1112 		goto out;
1113 	}
1114 
1115 	if (neigh->nud_state & NUD_IN_TIMER) {
1116 		if (time_before(next, jiffies + HZ/100))
1117 			next = jiffies + HZ/100;
1118 		if (!mod_timer(&neigh->timer, next))
1119 			neigh_hold(neigh);
1120 	}
1121 	if (neigh->nud_state & (NUD_INCOMPLETE | NUD_PROBE)) {
1122 		neigh_probe(neigh);
1123 	} else {
1124 out:
1125 		write_unlock(&neigh->lock);
1126 	}
1127 
1128 	if (notify)
1129 		neigh_update_notify(neigh, 0);
1130 
1131 	trace_neigh_timer_handler(neigh, 0);
1132 
1133 	neigh_release(neigh);
1134 }
1135 
1136 int __neigh_event_send(struct neighbour *neigh, struct sk_buff *skb,
1137 		       const bool immediate_ok)
1138 {
1139 	int rc;
1140 	bool immediate_probe = false;
1141 
1142 	write_lock_bh(&neigh->lock);
1143 
1144 	rc = 0;
1145 	if (neigh->nud_state & (NUD_CONNECTED | NUD_DELAY | NUD_PROBE))
1146 		goto out_unlock_bh;
1147 	if (neigh->dead)
1148 		goto out_dead;
1149 
1150 	if (!(neigh->nud_state & (NUD_STALE | NUD_INCOMPLETE))) {
1151 		if (NEIGH_VAR(neigh->parms, MCAST_PROBES) +
1152 		    NEIGH_VAR(neigh->parms, APP_PROBES)) {
1153 			unsigned long next, now = jiffies;
1154 
1155 			atomic_set(&neigh->probes,
1156 				   NEIGH_VAR(neigh->parms, UCAST_PROBES));
1157 			neigh_del_timer(neigh);
1158 			neigh->nud_state = NUD_INCOMPLETE;
1159 			neigh->updated = now;
1160 			if (!immediate_ok) {
1161 				next = now + 1;
1162 			} else {
1163 				immediate_probe = true;
1164 				next = now + max(NEIGH_VAR(neigh->parms,
1165 							   RETRANS_TIME),
1166 						 HZ / 100);
1167 			}
1168 			neigh_add_timer(neigh, next);
1169 		} else {
1170 			neigh->nud_state = NUD_FAILED;
1171 			neigh->updated = jiffies;
1172 			write_unlock_bh(&neigh->lock);
1173 
1174 			kfree_skb_reason(skb, SKB_DROP_REASON_NEIGH_FAILED);
1175 			return 1;
1176 		}
1177 	} else if (neigh->nud_state & NUD_STALE) {
1178 		neigh_dbg(2, "neigh %p is delayed\n", neigh);
1179 		neigh_del_timer(neigh);
1180 		neigh->nud_state = NUD_DELAY;
1181 		neigh->updated = jiffies;
1182 		neigh_add_timer(neigh, jiffies +
1183 				NEIGH_VAR(neigh->parms, DELAY_PROBE_TIME));
1184 	}
1185 
1186 	if (neigh->nud_state == NUD_INCOMPLETE) {
1187 		if (skb) {
1188 			while (neigh->arp_queue_len_bytes + skb->truesize >
1189 			       NEIGH_VAR(neigh->parms, QUEUE_LEN_BYTES)) {
1190 				struct sk_buff *buff;
1191 
1192 				buff = __skb_dequeue(&neigh->arp_queue);
1193 				if (!buff)
1194 					break;
1195 				neigh->arp_queue_len_bytes -= buff->truesize;
1196 				kfree_skb_reason(buff, SKB_DROP_REASON_NEIGH_QUEUEFULL);
1197 				NEIGH_CACHE_STAT_INC(neigh->tbl, unres_discards);
1198 			}
1199 			skb_dst_force(skb);
1200 			__skb_queue_tail(&neigh->arp_queue, skb);
1201 			neigh->arp_queue_len_bytes += skb->truesize;
1202 		}
1203 		rc = 1;
1204 	}
1205 out_unlock_bh:
1206 	if (immediate_probe)
1207 		neigh_probe(neigh);
1208 	else
1209 		write_unlock(&neigh->lock);
1210 	local_bh_enable();
1211 	trace_neigh_event_send_done(neigh, rc);
1212 	return rc;
1213 
1214 out_dead:
1215 	if (neigh->nud_state & NUD_STALE)
1216 		goto out_unlock_bh;
1217 	write_unlock_bh(&neigh->lock);
1218 	kfree_skb_reason(skb, SKB_DROP_REASON_NEIGH_DEAD);
1219 	trace_neigh_event_send_dead(neigh, 1);
1220 	return 1;
1221 }
1222 EXPORT_SYMBOL(__neigh_event_send);
1223 
1224 static void neigh_update_hhs(struct neighbour *neigh)
1225 {
1226 	struct hh_cache *hh;
1227 	void (*update)(struct hh_cache*, const struct net_device*, const unsigned char *)
1228 		= NULL;
1229 
1230 	if (neigh->dev->header_ops)
1231 		update = neigh->dev->header_ops->cache_update;
1232 
1233 	if (update) {
1234 		hh = &neigh->hh;
1235 		if (READ_ONCE(hh->hh_len)) {
1236 			write_seqlock_bh(&hh->hh_lock);
1237 			update(hh, neigh->dev, neigh->ha);
1238 			write_sequnlock_bh(&hh->hh_lock);
1239 		}
1240 	}
1241 }
1242 
1243 /* Generic update routine.
1244    -- lladdr is new lladdr or NULL, if it is not supplied.
1245    -- new    is new state.
1246    -- flags
1247 	NEIGH_UPDATE_F_OVERRIDE allows to override existing lladdr,
1248 				if it is different.
1249 	NEIGH_UPDATE_F_WEAK_OVERRIDE will suspect existing "connected"
1250 				lladdr instead of overriding it
1251 				if it is different.
1252 	NEIGH_UPDATE_F_ADMIN	means that the change is administrative.
1253 	NEIGH_UPDATE_F_USE	means that the entry is user triggered.
1254 	NEIGH_UPDATE_F_MANAGED	means that the entry will be auto-refreshed.
1255 	NEIGH_UPDATE_F_OVERRIDE_ISROUTER allows to override existing
1256 				NTF_ROUTER flag.
1257 	NEIGH_UPDATE_F_ISROUTER	indicates if the neighbour is known as
1258 				a router.
1259 
1260    Caller MUST hold reference count on the entry.
1261  */
1262 static int __neigh_update(struct neighbour *neigh, const u8 *lladdr,
1263 			  u8 new, u32 flags, u32 nlmsg_pid,
1264 			  struct netlink_ext_ack *extack)
1265 {
1266 	bool gc_update = false, managed_update = false;
1267 	int update_isrouter = 0;
1268 	struct net_device *dev;
1269 	int err, notify = 0;
1270 	u8 old;
1271 
1272 	trace_neigh_update(neigh, lladdr, new, flags, nlmsg_pid);
1273 
1274 	write_lock_bh(&neigh->lock);
1275 
1276 	dev    = neigh->dev;
1277 	old    = neigh->nud_state;
1278 	err    = -EPERM;
1279 
1280 	if (neigh->dead) {
1281 		NL_SET_ERR_MSG(extack, "Neighbor entry is now dead");
1282 		new = old;
1283 		goto out;
1284 	}
1285 	if (!(flags & NEIGH_UPDATE_F_ADMIN) &&
1286 	    (old & (NUD_NOARP | NUD_PERMANENT)))
1287 		goto out;
1288 
1289 	neigh_update_flags(neigh, flags, &notify, &gc_update, &managed_update);
1290 	if (flags & (NEIGH_UPDATE_F_USE | NEIGH_UPDATE_F_MANAGED)) {
1291 		new = old & ~NUD_PERMANENT;
1292 		neigh->nud_state = new;
1293 		err = 0;
1294 		goto out;
1295 	}
1296 
1297 	if (!(new & NUD_VALID)) {
1298 		neigh_del_timer(neigh);
1299 		if (old & NUD_CONNECTED)
1300 			neigh_suspect(neigh);
1301 		neigh->nud_state = new;
1302 		err = 0;
1303 		notify = old & NUD_VALID;
1304 		if ((old & (NUD_INCOMPLETE | NUD_PROBE)) &&
1305 		    (new & NUD_FAILED)) {
1306 			neigh_invalidate(neigh);
1307 			notify = 1;
1308 		}
1309 		goto out;
1310 	}
1311 
1312 	/* Compare new lladdr with cached one */
1313 	if (!dev->addr_len) {
1314 		/* First case: device needs no address. */
1315 		lladdr = neigh->ha;
1316 	} else if (lladdr) {
1317 		/* The second case: if something is already cached
1318 		   and a new address is proposed:
1319 		   - compare new & old
1320 		   - if they are different, check override flag
1321 		 */
1322 		if ((old & NUD_VALID) &&
1323 		    !memcmp(lladdr, neigh->ha, dev->addr_len))
1324 			lladdr = neigh->ha;
1325 	} else {
1326 		/* No address is supplied; if we know something,
1327 		   use it, otherwise discard the request.
1328 		 */
1329 		err = -EINVAL;
1330 		if (!(old & NUD_VALID)) {
1331 			NL_SET_ERR_MSG(extack, "No link layer address given");
1332 			goto out;
1333 		}
1334 		lladdr = neigh->ha;
1335 	}
1336 
1337 	/* Update confirmed timestamp for neighbour entry after we
1338 	 * received ARP packet even if it doesn't change IP to MAC binding.
1339 	 */
1340 	if (new & NUD_CONNECTED)
1341 		neigh->confirmed = jiffies;
1342 
1343 	/* If entry was valid and address is not changed,
1344 	   do not change entry state, if new one is STALE.
1345 	 */
1346 	err = 0;
1347 	update_isrouter = flags & NEIGH_UPDATE_F_OVERRIDE_ISROUTER;
1348 	if (old & NUD_VALID) {
1349 		if (lladdr != neigh->ha && !(flags & NEIGH_UPDATE_F_OVERRIDE)) {
1350 			update_isrouter = 0;
1351 			if ((flags & NEIGH_UPDATE_F_WEAK_OVERRIDE) &&
1352 			    (old & NUD_CONNECTED)) {
1353 				lladdr = neigh->ha;
1354 				new = NUD_STALE;
1355 			} else
1356 				goto out;
1357 		} else {
1358 			if (lladdr == neigh->ha && new == NUD_STALE &&
1359 			    !(flags & NEIGH_UPDATE_F_ADMIN))
1360 				new = old;
1361 		}
1362 	}
1363 
1364 	/* Update timestamp only once we know we will make a change to the
1365 	 * neighbour entry. Otherwise we risk to move the locktime window with
1366 	 * noop updates and ignore relevant ARP updates.
1367 	 */
1368 	if (new != old || lladdr != neigh->ha)
1369 		neigh->updated = jiffies;
1370 
1371 	if (new != old) {
1372 		neigh_del_timer(neigh);
1373 		if (new & NUD_PROBE)
1374 			atomic_set(&neigh->probes, 0);
1375 		if (new & NUD_IN_TIMER)
1376 			neigh_add_timer(neigh, (jiffies +
1377 						((new & NUD_REACHABLE) ?
1378 						 neigh->parms->reachable_time :
1379 						 0)));
1380 		neigh->nud_state = new;
1381 		notify = 1;
1382 	}
1383 
1384 	if (lladdr != neigh->ha) {
1385 		write_seqlock(&neigh->ha_lock);
1386 		memcpy(&neigh->ha, lladdr, dev->addr_len);
1387 		write_sequnlock(&neigh->ha_lock);
1388 		neigh_update_hhs(neigh);
1389 		if (!(new & NUD_CONNECTED))
1390 			neigh->confirmed = jiffies -
1391 				      (NEIGH_VAR(neigh->parms, BASE_REACHABLE_TIME) << 1);
1392 		notify = 1;
1393 	}
1394 	if (new == old)
1395 		goto out;
1396 	if (new & NUD_CONNECTED)
1397 		neigh_connect(neigh);
1398 	else
1399 		neigh_suspect(neigh);
1400 	if (!(old & NUD_VALID)) {
1401 		struct sk_buff *skb;
1402 
1403 		/* Again: avoid dead loop if something went wrong */
1404 
1405 		while (neigh->nud_state & NUD_VALID &&
1406 		       (skb = __skb_dequeue(&neigh->arp_queue)) != NULL) {
1407 			struct dst_entry *dst = skb_dst(skb);
1408 			struct neighbour *n2, *n1 = neigh;
1409 			write_unlock_bh(&neigh->lock);
1410 
1411 			rcu_read_lock();
1412 
1413 			/* Why not just use 'neigh' as-is?  The problem is that
1414 			 * things such as shaper, eql, and sch_teql can end up
1415 			 * using alternative, different, neigh objects to output
1416 			 * the packet in the output path.  So what we need to do
1417 			 * here is re-lookup the top-level neigh in the path so
1418 			 * we can reinject the packet there.
1419 			 */
1420 			n2 = NULL;
1421 			if (dst && dst->obsolete != DST_OBSOLETE_DEAD) {
1422 				n2 = dst_neigh_lookup_skb(dst, skb);
1423 				if (n2)
1424 					n1 = n2;
1425 			}
1426 			n1->output(n1, skb);
1427 			if (n2)
1428 				neigh_release(n2);
1429 			rcu_read_unlock();
1430 
1431 			write_lock_bh(&neigh->lock);
1432 		}
1433 		__skb_queue_purge(&neigh->arp_queue);
1434 		neigh->arp_queue_len_bytes = 0;
1435 	}
1436 out:
1437 	if (update_isrouter)
1438 		neigh_update_is_router(neigh, flags, &notify);
1439 	write_unlock_bh(&neigh->lock);
1440 	if (((new ^ old) & NUD_PERMANENT) || gc_update)
1441 		neigh_update_gc_list(neigh);
1442 	if (managed_update)
1443 		neigh_update_managed_list(neigh);
1444 	if (notify)
1445 		neigh_update_notify(neigh, nlmsg_pid);
1446 	trace_neigh_update_done(neigh, err);
1447 	return err;
1448 }
1449 
1450 int neigh_update(struct neighbour *neigh, const u8 *lladdr, u8 new,
1451 		 u32 flags, u32 nlmsg_pid)
1452 {
1453 	return __neigh_update(neigh, lladdr, new, flags, nlmsg_pid, NULL);
1454 }
1455 EXPORT_SYMBOL(neigh_update);
1456 
1457 /* Update the neigh to listen temporarily for probe responses, even if it is
1458  * in a NUD_FAILED state. The caller has to hold neigh->lock for writing.
1459  */
1460 void __neigh_set_probe_once(struct neighbour *neigh)
1461 {
1462 	if (neigh->dead)
1463 		return;
1464 	neigh->updated = jiffies;
1465 	if (!(neigh->nud_state & NUD_FAILED))
1466 		return;
1467 	neigh->nud_state = NUD_INCOMPLETE;
1468 	atomic_set(&neigh->probes, neigh_max_probes(neigh));
1469 	neigh_add_timer(neigh,
1470 			jiffies + max(NEIGH_VAR(neigh->parms, RETRANS_TIME),
1471 				      HZ/100));
1472 }
1473 EXPORT_SYMBOL(__neigh_set_probe_once);
1474 
1475 struct neighbour *neigh_event_ns(struct neigh_table *tbl,
1476 				 u8 *lladdr, void *saddr,
1477 				 struct net_device *dev)
1478 {
1479 	struct neighbour *neigh = __neigh_lookup(tbl, saddr, dev,
1480 						 lladdr || !dev->addr_len);
1481 	if (neigh)
1482 		neigh_update(neigh, lladdr, NUD_STALE,
1483 			     NEIGH_UPDATE_F_OVERRIDE, 0);
1484 	return neigh;
1485 }
1486 EXPORT_SYMBOL(neigh_event_ns);
1487 
1488 /* called with read_lock_bh(&n->lock); */
1489 static void neigh_hh_init(struct neighbour *n)
1490 {
1491 	struct net_device *dev = n->dev;
1492 	__be16 prot = n->tbl->protocol;
1493 	struct hh_cache	*hh = &n->hh;
1494 
1495 	write_lock_bh(&n->lock);
1496 
1497 	/* Only one thread can come in here and initialize the
1498 	 * hh_cache entry.
1499 	 */
1500 	if (!hh->hh_len)
1501 		dev->header_ops->cache(n, hh, prot);
1502 
1503 	write_unlock_bh(&n->lock);
1504 }
1505 
1506 /* Slow and careful. */
1507 
1508 int neigh_resolve_output(struct neighbour *neigh, struct sk_buff *skb)
1509 {
1510 	int rc = 0;
1511 
1512 	if (!neigh_event_send(neigh, skb)) {
1513 		int err;
1514 		struct net_device *dev = neigh->dev;
1515 		unsigned int seq;
1516 
1517 		if (dev->header_ops->cache && !READ_ONCE(neigh->hh.hh_len))
1518 			neigh_hh_init(neigh);
1519 
1520 		do {
1521 			__skb_pull(skb, skb_network_offset(skb));
1522 			seq = read_seqbegin(&neigh->ha_lock);
1523 			err = dev_hard_header(skb, dev, ntohs(skb->protocol),
1524 					      neigh->ha, NULL, skb->len);
1525 		} while (read_seqretry(&neigh->ha_lock, seq));
1526 
1527 		if (err >= 0)
1528 			rc = dev_queue_xmit(skb);
1529 		else
1530 			goto out_kfree_skb;
1531 	}
1532 out:
1533 	return rc;
1534 out_kfree_skb:
1535 	rc = -EINVAL;
1536 	kfree_skb(skb);
1537 	goto out;
1538 }
1539 EXPORT_SYMBOL(neigh_resolve_output);
1540 
1541 /* As fast as possible without hh cache */
1542 
1543 int neigh_connected_output(struct neighbour *neigh, struct sk_buff *skb)
1544 {
1545 	struct net_device *dev = neigh->dev;
1546 	unsigned int seq;
1547 	int err;
1548 
1549 	do {
1550 		__skb_pull(skb, skb_network_offset(skb));
1551 		seq = read_seqbegin(&neigh->ha_lock);
1552 		err = dev_hard_header(skb, dev, ntohs(skb->protocol),
1553 				      neigh->ha, NULL, skb->len);
1554 	} while (read_seqretry(&neigh->ha_lock, seq));
1555 
1556 	if (err >= 0)
1557 		err = dev_queue_xmit(skb);
1558 	else {
1559 		err = -EINVAL;
1560 		kfree_skb(skb);
1561 	}
1562 	return err;
1563 }
1564 EXPORT_SYMBOL(neigh_connected_output);
1565 
1566 int neigh_direct_output(struct neighbour *neigh, struct sk_buff *skb)
1567 {
1568 	return dev_queue_xmit(skb);
1569 }
1570 EXPORT_SYMBOL(neigh_direct_output);
1571 
1572 static void neigh_managed_work(struct work_struct *work)
1573 {
1574 	struct neigh_table *tbl = container_of(work, struct neigh_table,
1575 					       managed_work.work);
1576 	struct neighbour *neigh;
1577 
1578 	write_lock_bh(&tbl->lock);
1579 	list_for_each_entry(neigh, &tbl->managed_list, managed_list)
1580 		neigh_event_send_probe(neigh, NULL, false);
1581 	queue_delayed_work(system_power_efficient_wq, &tbl->managed_work,
1582 			   NEIGH_VAR(&tbl->parms, DELAY_PROBE_TIME));
1583 	write_unlock_bh(&tbl->lock);
1584 }
1585 
1586 static void neigh_proxy_process(struct timer_list *t)
1587 {
1588 	struct neigh_table *tbl = from_timer(tbl, t, proxy_timer);
1589 	long sched_next = 0;
1590 	unsigned long now = jiffies;
1591 	struct sk_buff *skb, *n;
1592 
1593 	spin_lock(&tbl->proxy_queue.lock);
1594 
1595 	skb_queue_walk_safe(&tbl->proxy_queue, skb, n) {
1596 		long tdif = NEIGH_CB(skb)->sched_next - now;
1597 
1598 		if (tdif <= 0) {
1599 			struct net_device *dev = skb->dev;
1600 
1601 			__skb_unlink(skb, &tbl->proxy_queue);
1602 			if (tbl->proxy_redo && netif_running(dev)) {
1603 				rcu_read_lock();
1604 				tbl->proxy_redo(skb);
1605 				rcu_read_unlock();
1606 			} else {
1607 				kfree_skb(skb);
1608 			}
1609 
1610 			dev_put(dev);
1611 		} else if (!sched_next || tdif < sched_next)
1612 			sched_next = tdif;
1613 	}
1614 	del_timer(&tbl->proxy_timer);
1615 	if (sched_next)
1616 		mod_timer(&tbl->proxy_timer, jiffies + sched_next);
1617 	spin_unlock(&tbl->proxy_queue.lock);
1618 }
1619 
1620 void pneigh_enqueue(struct neigh_table *tbl, struct neigh_parms *p,
1621 		    struct sk_buff *skb)
1622 {
1623 	unsigned long sched_next = jiffies +
1624 			prandom_u32_max(NEIGH_VAR(p, PROXY_DELAY));
1625 
1626 	if (tbl->proxy_queue.qlen > NEIGH_VAR(p, PROXY_QLEN)) {
1627 		kfree_skb(skb);
1628 		return;
1629 	}
1630 
1631 	NEIGH_CB(skb)->sched_next = sched_next;
1632 	NEIGH_CB(skb)->flags |= LOCALLY_ENQUEUED;
1633 
1634 	spin_lock(&tbl->proxy_queue.lock);
1635 	if (del_timer(&tbl->proxy_timer)) {
1636 		if (time_before(tbl->proxy_timer.expires, sched_next))
1637 			sched_next = tbl->proxy_timer.expires;
1638 	}
1639 	skb_dst_drop(skb);
1640 	dev_hold(skb->dev);
1641 	__skb_queue_tail(&tbl->proxy_queue, skb);
1642 	mod_timer(&tbl->proxy_timer, sched_next);
1643 	spin_unlock(&tbl->proxy_queue.lock);
1644 }
1645 EXPORT_SYMBOL(pneigh_enqueue);
1646 
1647 static inline struct neigh_parms *lookup_neigh_parms(struct neigh_table *tbl,
1648 						      struct net *net, int ifindex)
1649 {
1650 	struct neigh_parms *p;
1651 
1652 	list_for_each_entry(p, &tbl->parms_list, list) {
1653 		if ((p->dev && p->dev->ifindex == ifindex && net_eq(neigh_parms_net(p), net)) ||
1654 		    (!p->dev && !ifindex && net_eq(net, &init_net)))
1655 			return p;
1656 	}
1657 
1658 	return NULL;
1659 }
1660 
1661 struct neigh_parms *neigh_parms_alloc(struct net_device *dev,
1662 				      struct neigh_table *tbl)
1663 {
1664 	struct neigh_parms *p;
1665 	struct net *net = dev_net(dev);
1666 	const struct net_device_ops *ops = dev->netdev_ops;
1667 
1668 	p = kmemdup(&tbl->parms, sizeof(*p), GFP_KERNEL);
1669 	if (p) {
1670 		p->tbl		  = tbl;
1671 		refcount_set(&p->refcnt, 1);
1672 		p->reachable_time =
1673 				neigh_rand_reach_time(NEIGH_VAR(p, BASE_REACHABLE_TIME));
1674 		dev_hold_track(dev, &p->dev_tracker, GFP_KERNEL);
1675 		p->dev = dev;
1676 		write_pnet(&p->net, net);
1677 		p->sysctl_table = NULL;
1678 
1679 		if (ops->ndo_neigh_setup && ops->ndo_neigh_setup(dev, p)) {
1680 			dev_put_track(dev, &p->dev_tracker);
1681 			kfree(p);
1682 			return NULL;
1683 		}
1684 
1685 		write_lock_bh(&tbl->lock);
1686 		list_add(&p->list, &tbl->parms.list);
1687 		write_unlock_bh(&tbl->lock);
1688 
1689 		neigh_parms_data_state_cleanall(p);
1690 	}
1691 	return p;
1692 }
1693 EXPORT_SYMBOL(neigh_parms_alloc);
1694 
1695 static void neigh_rcu_free_parms(struct rcu_head *head)
1696 {
1697 	struct neigh_parms *parms =
1698 		container_of(head, struct neigh_parms, rcu_head);
1699 
1700 	neigh_parms_put(parms);
1701 }
1702 
1703 void neigh_parms_release(struct neigh_table *tbl, struct neigh_parms *parms)
1704 {
1705 	if (!parms || parms == &tbl->parms)
1706 		return;
1707 	write_lock_bh(&tbl->lock);
1708 	list_del(&parms->list);
1709 	parms->dead = 1;
1710 	write_unlock_bh(&tbl->lock);
1711 	dev_put_track(parms->dev, &parms->dev_tracker);
1712 	call_rcu(&parms->rcu_head, neigh_rcu_free_parms);
1713 }
1714 EXPORT_SYMBOL(neigh_parms_release);
1715 
1716 static void neigh_parms_destroy(struct neigh_parms *parms)
1717 {
1718 	kfree(parms);
1719 }
1720 
1721 static struct lock_class_key neigh_table_proxy_queue_class;
1722 
1723 static struct neigh_table *neigh_tables[NEIGH_NR_TABLES] __read_mostly;
1724 
1725 void neigh_table_init(int index, struct neigh_table *tbl)
1726 {
1727 	unsigned long now = jiffies;
1728 	unsigned long phsize;
1729 
1730 	INIT_LIST_HEAD(&tbl->parms_list);
1731 	INIT_LIST_HEAD(&tbl->gc_list);
1732 	INIT_LIST_HEAD(&tbl->managed_list);
1733 
1734 	list_add(&tbl->parms.list, &tbl->parms_list);
1735 	write_pnet(&tbl->parms.net, &init_net);
1736 	refcount_set(&tbl->parms.refcnt, 1);
1737 	tbl->parms.reachable_time =
1738 			  neigh_rand_reach_time(NEIGH_VAR(&tbl->parms, BASE_REACHABLE_TIME));
1739 
1740 	tbl->stats = alloc_percpu(struct neigh_statistics);
1741 	if (!tbl->stats)
1742 		panic("cannot create neighbour cache statistics");
1743 
1744 #ifdef CONFIG_PROC_FS
1745 	if (!proc_create_seq_data(tbl->id, 0, init_net.proc_net_stat,
1746 			      &neigh_stat_seq_ops, tbl))
1747 		panic("cannot create neighbour proc dir entry");
1748 #endif
1749 
1750 	RCU_INIT_POINTER(tbl->nht, neigh_hash_alloc(3));
1751 
1752 	phsize = (PNEIGH_HASHMASK + 1) * sizeof(struct pneigh_entry *);
1753 	tbl->phash_buckets = kzalloc(phsize, GFP_KERNEL);
1754 
1755 	if (!tbl->nht || !tbl->phash_buckets)
1756 		panic("cannot allocate neighbour cache hashes");
1757 
1758 	if (!tbl->entry_size)
1759 		tbl->entry_size = ALIGN(offsetof(struct neighbour, primary_key) +
1760 					tbl->key_len, NEIGH_PRIV_ALIGN);
1761 	else
1762 		WARN_ON(tbl->entry_size % NEIGH_PRIV_ALIGN);
1763 
1764 	rwlock_init(&tbl->lock);
1765 
1766 	INIT_DEFERRABLE_WORK(&tbl->gc_work, neigh_periodic_work);
1767 	queue_delayed_work(system_power_efficient_wq, &tbl->gc_work,
1768 			tbl->parms.reachable_time);
1769 	INIT_DEFERRABLE_WORK(&tbl->managed_work, neigh_managed_work);
1770 	queue_delayed_work(system_power_efficient_wq, &tbl->managed_work, 0);
1771 
1772 	timer_setup(&tbl->proxy_timer, neigh_proxy_process, 0);
1773 	skb_queue_head_init_class(&tbl->proxy_queue,
1774 			&neigh_table_proxy_queue_class);
1775 
1776 	tbl->last_flush = now;
1777 	tbl->last_rand	= now + tbl->parms.reachable_time * 20;
1778 
1779 	neigh_tables[index] = tbl;
1780 }
1781 EXPORT_SYMBOL(neigh_table_init);
1782 
1783 int neigh_table_clear(int index, struct neigh_table *tbl)
1784 {
1785 	neigh_tables[index] = NULL;
1786 	/* It is not clean... Fix it to unload IPv6 module safely */
1787 	cancel_delayed_work_sync(&tbl->managed_work);
1788 	cancel_delayed_work_sync(&tbl->gc_work);
1789 	del_timer_sync(&tbl->proxy_timer);
1790 	pneigh_queue_purge(&tbl->proxy_queue);
1791 	neigh_ifdown(tbl, NULL);
1792 	if (atomic_read(&tbl->entries))
1793 		pr_crit("neighbour leakage\n");
1794 
1795 	call_rcu(&rcu_dereference_protected(tbl->nht, 1)->rcu,
1796 		 neigh_hash_free_rcu);
1797 	tbl->nht = NULL;
1798 
1799 	kfree(tbl->phash_buckets);
1800 	tbl->phash_buckets = NULL;
1801 
1802 	remove_proc_entry(tbl->id, init_net.proc_net_stat);
1803 
1804 	free_percpu(tbl->stats);
1805 	tbl->stats = NULL;
1806 
1807 	return 0;
1808 }
1809 EXPORT_SYMBOL(neigh_table_clear);
1810 
1811 static struct neigh_table *neigh_find_table(int family)
1812 {
1813 	struct neigh_table *tbl = NULL;
1814 
1815 	switch (family) {
1816 	case AF_INET:
1817 		tbl = neigh_tables[NEIGH_ARP_TABLE];
1818 		break;
1819 	case AF_INET6:
1820 		tbl = neigh_tables[NEIGH_ND_TABLE];
1821 		break;
1822 	case AF_DECnet:
1823 		tbl = neigh_tables[NEIGH_DN_TABLE];
1824 		break;
1825 	}
1826 
1827 	return tbl;
1828 }
1829 
1830 const struct nla_policy nda_policy[NDA_MAX+1] = {
1831 	[NDA_UNSPEC]		= { .strict_start_type = NDA_NH_ID },
1832 	[NDA_DST]		= { .type = NLA_BINARY, .len = MAX_ADDR_LEN },
1833 	[NDA_LLADDR]		= { .type = NLA_BINARY, .len = MAX_ADDR_LEN },
1834 	[NDA_CACHEINFO]		= { .len = sizeof(struct nda_cacheinfo) },
1835 	[NDA_PROBES]		= { .type = NLA_U32 },
1836 	[NDA_VLAN]		= { .type = NLA_U16 },
1837 	[NDA_PORT]		= { .type = NLA_U16 },
1838 	[NDA_VNI]		= { .type = NLA_U32 },
1839 	[NDA_IFINDEX]		= { .type = NLA_U32 },
1840 	[NDA_MASTER]		= { .type = NLA_U32 },
1841 	[NDA_PROTOCOL]		= { .type = NLA_U8 },
1842 	[NDA_NH_ID]		= { .type = NLA_U32 },
1843 	[NDA_FLAGS_EXT]		= NLA_POLICY_MASK(NLA_U32, NTF_EXT_MASK),
1844 	[NDA_FDB_EXT_ATTRS]	= { .type = NLA_NESTED },
1845 };
1846 
1847 static int neigh_delete(struct sk_buff *skb, struct nlmsghdr *nlh,
1848 			struct netlink_ext_ack *extack)
1849 {
1850 	struct net *net = sock_net(skb->sk);
1851 	struct ndmsg *ndm;
1852 	struct nlattr *dst_attr;
1853 	struct neigh_table *tbl;
1854 	struct neighbour *neigh;
1855 	struct net_device *dev = NULL;
1856 	int err = -EINVAL;
1857 
1858 	ASSERT_RTNL();
1859 	if (nlmsg_len(nlh) < sizeof(*ndm))
1860 		goto out;
1861 
1862 	dst_attr = nlmsg_find_attr(nlh, sizeof(*ndm), NDA_DST);
1863 	if (!dst_attr) {
1864 		NL_SET_ERR_MSG(extack, "Network address not specified");
1865 		goto out;
1866 	}
1867 
1868 	ndm = nlmsg_data(nlh);
1869 	if (ndm->ndm_ifindex) {
1870 		dev = __dev_get_by_index(net, ndm->ndm_ifindex);
1871 		if (dev == NULL) {
1872 			err = -ENODEV;
1873 			goto out;
1874 		}
1875 	}
1876 
1877 	tbl = neigh_find_table(ndm->ndm_family);
1878 	if (tbl == NULL)
1879 		return -EAFNOSUPPORT;
1880 
1881 	if (nla_len(dst_attr) < (int)tbl->key_len) {
1882 		NL_SET_ERR_MSG(extack, "Invalid network address");
1883 		goto out;
1884 	}
1885 
1886 	if (ndm->ndm_flags & NTF_PROXY) {
1887 		err = pneigh_delete(tbl, net, nla_data(dst_attr), dev);
1888 		goto out;
1889 	}
1890 
1891 	if (dev == NULL)
1892 		goto out;
1893 
1894 	neigh = neigh_lookup(tbl, nla_data(dst_attr), dev);
1895 	if (neigh == NULL) {
1896 		err = -ENOENT;
1897 		goto out;
1898 	}
1899 
1900 	err = __neigh_update(neigh, NULL, NUD_FAILED,
1901 			     NEIGH_UPDATE_F_OVERRIDE | NEIGH_UPDATE_F_ADMIN,
1902 			     NETLINK_CB(skb).portid, extack);
1903 	write_lock_bh(&tbl->lock);
1904 	neigh_release(neigh);
1905 	neigh_remove_one(neigh, tbl);
1906 	write_unlock_bh(&tbl->lock);
1907 
1908 out:
1909 	return err;
1910 }
1911 
1912 static int neigh_add(struct sk_buff *skb, struct nlmsghdr *nlh,
1913 		     struct netlink_ext_ack *extack)
1914 {
1915 	int flags = NEIGH_UPDATE_F_ADMIN | NEIGH_UPDATE_F_OVERRIDE |
1916 		    NEIGH_UPDATE_F_OVERRIDE_ISROUTER;
1917 	struct net *net = sock_net(skb->sk);
1918 	struct ndmsg *ndm;
1919 	struct nlattr *tb[NDA_MAX+1];
1920 	struct neigh_table *tbl;
1921 	struct net_device *dev = NULL;
1922 	struct neighbour *neigh;
1923 	void *dst, *lladdr;
1924 	u8 protocol = 0;
1925 	u32 ndm_flags;
1926 	int err;
1927 
1928 	ASSERT_RTNL();
1929 	err = nlmsg_parse_deprecated(nlh, sizeof(*ndm), tb, NDA_MAX,
1930 				     nda_policy, extack);
1931 	if (err < 0)
1932 		goto out;
1933 
1934 	err = -EINVAL;
1935 	if (!tb[NDA_DST]) {
1936 		NL_SET_ERR_MSG(extack, "Network address not specified");
1937 		goto out;
1938 	}
1939 
1940 	ndm = nlmsg_data(nlh);
1941 	ndm_flags = ndm->ndm_flags;
1942 	if (tb[NDA_FLAGS_EXT]) {
1943 		u32 ext = nla_get_u32(tb[NDA_FLAGS_EXT]);
1944 
1945 		BUILD_BUG_ON(sizeof(neigh->flags) * BITS_PER_BYTE <
1946 			     (sizeof(ndm->ndm_flags) * BITS_PER_BYTE +
1947 			      hweight32(NTF_EXT_MASK)));
1948 		ndm_flags |= (ext << NTF_EXT_SHIFT);
1949 	}
1950 	if (ndm->ndm_ifindex) {
1951 		dev = __dev_get_by_index(net, ndm->ndm_ifindex);
1952 		if (dev == NULL) {
1953 			err = -ENODEV;
1954 			goto out;
1955 		}
1956 
1957 		if (tb[NDA_LLADDR] && nla_len(tb[NDA_LLADDR]) < dev->addr_len) {
1958 			NL_SET_ERR_MSG(extack, "Invalid link address");
1959 			goto out;
1960 		}
1961 	}
1962 
1963 	tbl = neigh_find_table(ndm->ndm_family);
1964 	if (tbl == NULL)
1965 		return -EAFNOSUPPORT;
1966 
1967 	if (nla_len(tb[NDA_DST]) < (int)tbl->key_len) {
1968 		NL_SET_ERR_MSG(extack, "Invalid network address");
1969 		goto out;
1970 	}
1971 
1972 	dst = nla_data(tb[NDA_DST]);
1973 	lladdr = tb[NDA_LLADDR] ? nla_data(tb[NDA_LLADDR]) : NULL;
1974 
1975 	if (tb[NDA_PROTOCOL])
1976 		protocol = nla_get_u8(tb[NDA_PROTOCOL]);
1977 	if (ndm_flags & NTF_PROXY) {
1978 		struct pneigh_entry *pn;
1979 
1980 		if (ndm_flags & NTF_MANAGED) {
1981 			NL_SET_ERR_MSG(extack, "Invalid NTF_* flag combination");
1982 			goto out;
1983 		}
1984 
1985 		err = -ENOBUFS;
1986 		pn = pneigh_lookup(tbl, net, dst, dev, 1);
1987 		if (pn) {
1988 			pn->flags = ndm_flags;
1989 			if (protocol)
1990 				pn->protocol = protocol;
1991 			err = 0;
1992 		}
1993 		goto out;
1994 	}
1995 
1996 	if (!dev) {
1997 		NL_SET_ERR_MSG(extack, "Device not specified");
1998 		goto out;
1999 	}
2000 
2001 	if (tbl->allow_add && !tbl->allow_add(dev, extack)) {
2002 		err = -EINVAL;
2003 		goto out;
2004 	}
2005 
2006 	neigh = neigh_lookup(tbl, dst, dev);
2007 	if (neigh == NULL) {
2008 		bool ndm_permanent  = ndm->ndm_state & NUD_PERMANENT;
2009 		bool exempt_from_gc = ndm_permanent ||
2010 				      ndm_flags & NTF_EXT_LEARNED;
2011 
2012 		if (!(nlh->nlmsg_flags & NLM_F_CREATE)) {
2013 			err = -ENOENT;
2014 			goto out;
2015 		}
2016 		if (ndm_permanent && (ndm_flags & NTF_MANAGED)) {
2017 			NL_SET_ERR_MSG(extack, "Invalid NTF_* flag for permanent entry");
2018 			err = -EINVAL;
2019 			goto out;
2020 		}
2021 
2022 		neigh = ___neigh_create(tbl, dst, dev,
2023 					ndm_flags &
2024 					(NTF_EXT_LEARNED | NTF_MANAGED),
2025 					exempt_from_gc, true);
2026 		if (IS_ERR(neigh)) {
2027 			err = PTR_ERR(neigh);
2028 			goto out;
2029 		}
2030 	} else {
2031 		if (nlh->nlmsg_flags & NLM_F_EXCL) {
2032 			err = -EEXIST;
2033 			neigh_release(neigh);
2034 			goto out;
2035 		}
2036 
2037 		if (!(nlh->nlmsg_flags & NLM_F_REPLACE))
2038 			flags &= ~(NEIGH_UPDATE_F_OVERRIDE |
2039 				   NEIGH_UPDATE_F_OVERRIDE_ISROUTER);
2040 	}
2041 
2042 	if (protocol)
2043 		neigh->protocol = protocol;
2044 	if (ndm_flags & NTF_EXT_LEARNED)
2045 		flags |= NEIGH_UPDATE_F_EXT_LEARNED;
2046 	if (ndm_flags & NTF_ROUTER)
2047 		flags |= NEIGH_UPDATE_F_ISROUTER;
2048 	if (ndm_flags & NTF_MANAGED)
2049 		flags |= NEIGH_UPDATE_F_MANAGED;
2050 	if (ndm_flags & NTF_USE)
2051 		flags |= NEIGH_UPDATE_F_USE;
2052 
2053 	err = __neigh_update(neigh, lladdr, ndm->ndm_state, flags,
2054 			     NETLINK_CB(skb).portid, extack);
2055 	if (!err && ndm_flags & (NTF_USE | NTF_MANAGED)) {
2056 		neigh_event_send(neigh, NULL);
2057 		err = 0;
2058 	}
2059 	neigh_release(neigh);
2060 out:
2061 	return err;
2062 }
2063 
2064 static int neightbl_fill_parms(struct sk_buff *skb, struct neigh_parms *parms)
2065 {
2066 	struct nlattr *nest;
2067 
2068 	nest = nla_nest_start_noflag(skb, NDTA_PARMS);
2069 	if (nest == NULL)
2070 		return -ENOBUFS;
2071 
2072 	if ((parms->dev &&
2073 	     nla_put_u32(skb, NDTPA_IFINDEX, parms->dev->ifindex)) ||
2074 	    nla_put_u32(skb, NDTPA_REFCNT, refcount_read(&parms->refcnt)) ||
2075 	    nla_put_u32(skb, NDTPA_QUEUE_LENBYTES,
2076 			NEIGH_VAR(parms, QUEUE_LEN_BYTES)) ||
2077 	    /* approximative value for deprecated QUEUE_LEN (in packets) */
2078 	    nla_put_u32(skb, NDTPA_QUEUE_LEN,
2079 			NEIGH_VAR(parms, QUEUE_LEN_BYTES) / SKB_TRUESIZE(ETH_FRAME_LEN)) ||
2080 	    nla_put_u32(skb, NDTPA_PROXY_QLEN, NEIGH_VAR(parms, PROXY_QLEN)) ||
2081 	    nla_put_u32(skb, NDTPA_APP_PROBES, NEIGH_VAR(parms, APP_PROBES)) ||
2082 	    nla_put_u32(skb, NDTPA_UCAST_PROBES,
2083 			NEIGH_VAR(parms, UCAST_PROBES)) ||
2084 	    nla_put_u32(skb, NDTPA_MCAST_PROBES,
2085 			NEIGH_VAR(parms, MCAST_PROBES)) ||
2086 	    nla_put_u32(skb, NDTPA_MCAST_REPROBES,
2087 			NEIGH_VAR(parms, MCAST_REPROBES)) ||
2088 	    nla_put_msecs(skb, NDTPA_REACHABLE_TIME, parms->reachable_time,
2089 			  NDTPA_PAD) ||
2090 	    nla_put_msecs(skb, NDTPA_BASE_REACHABLE_TIME,
2091 			  NEIGH_VAR(parms, BASE_REACHABLE_TIME), NDTPA_PAD) ||
2092 	    nla_put_msecs(skb, NDTPA_GC_STALETIME,
2093 			  NEIGH_VAR(parms, GC_STALETIME), NDTPA_PAD) ||
2094 	    nla_put_msecs(skb, NDTPA_DELAY_PROBE_TIME,
2095 			  NEIGH_VAR(parms, DELAY_PROBE_TIME), NDTPA_PAD) ||
2096 	    nla_put_msecs(skb, NDTPA_RETRANS_TIME,
2097 			  NEIGH_VAR(parms, RETRANS_TIME), NDTPA_PAD) ||
2098 	    nla_put_msecs(skb, NDTPA_ANYCAST_DELAY,
2099 			  NEIGH_VAR(parms, ANYCAST_DELAY), NDTPA_PAD) ||
2100 	    nla_put_msecs(skb, NDTPA_PROXY_DELAY,
2101 			  NEIGH_VAR(parms, PROXY_DELAY), NDTPA_PAD) ||
2102 	    nla_put_msecs(skb, NDTPA_LOCKTIME,
2103 			  NEIGH_VAR(parms, LOCKTIME), NDTPA_PAD))
2104 		goto nla_put_failure;
2105 	return nla_nest_end(skb, nest);
2106 
2107 nla_put_failure:
2108 	nla_nest_cancel(skb, nest);
2109 	return -EMSGSIZE;
2110 }
2111 
2112 static int neightbl_fill_info(struct sk_buff *skb, struct neigh_table *tbl,
2113 			      u32 pid, u32 seq, int type, int flags)
2114 {
2115 	struct nlmsghdr *nlh;
2116 	struct ndtmsg *ndtmsg;
2117 
2118 	nlh = nlmsg_put(skb, pid, seq, type, sizeof(*ndtmsg), flags);
2119 	if (nlh == NULL)
2120 		return -EMSGSIZE;
2121 
2122 	ndtmsg = nlmsg_data(nlh);
2123 
2124 	read_lock_bh(&tbl->lock);
2125 	ndtmsg->ndtm_family = tbl->family;
2126 	ndtmsg->ndtm_pad1   = 0;
2127 	ndtmsg->ndtm_pad2   = 0;
2128 
2129 	if (nla_put_string(skb, NDTA_NAME, tbl->id) ||
2130 	    nla_put_msecs(skb, NDTA_GC_INTERVAL, tbl->gc_interval, NDTA_PAD) ||
2131 	    nla_put_u32(skb, NDTA_THRESH1, tbl->gc_thresh1) ||
2132 	    nla_put_u32(skb, NDTA_THRESH2, tbl->gc_thresh2) ||
2133 	    nla_put_u32(skb, NDTA_THRESH3, tbl->gc_thresh3))
2134 		goto nla_put_failure;
2135 	{
2136 		unsigned long now = jiffies;
2137 		long flush_delta = now - tbl->last_flush;
2138 		long rand_delta = now - tbl->last_rand;
2139 		struct neigh_hash_table *nht;
2140 		struct ndt_config ndc = {
2141 			.ndtc_key_len		= tbl->key_len,
2142 			.ndtc_entry_size	= tbl->entry_size,
2143 			.ndtc_entries		= atomic_read(&tbl->entries),
2144 			.ndtc_last_flush	= jiffies_to_msecs(flush_delta),
2145 			.ndtc_last_rand		= jiffies_to_msecs(rand_delta),
2146 			.ndtc_proxy_qlen	= tbl->proxy_queue.qlen,
2147 		};
2148 
2149 		rcu_read_lock_bh();
2150 		nht = rcu_dereference_bh(tbl->nht);
2151 		ndc.ndtc_hash_rnd = nht->hash_rnd[0];
2152 		ndc.ndtc_hash_mask = ((1 << nht->hash_shift) - 1);
2153 		rcu_read_unlock_bh();
2154 
2155 		if (nla_put(skb, NDTA_CONFIG, sizeof(ndc), &ndc))
2156 			goto nla_put_failure;
2157 	}
2158 
2159 	{
2160 		int cpu;
2161 		struct ndt_stats ndst;
2162 
2163 		memset(&ndst, 0, sizeof(ndst));
2164 
2165 		for_each_possible_cpu(cpu) {
2166 			struct neigh_statistics	*st;
2167 
2168 			st = per_cpu_ptr(tbl->stats, cpu);
2169 			ndst.ndts_allocs		+= st->allocs;
2170 			ndst.ndts_destroys		+= st->destroys;
2171 			ndst.ndts_hash_grows		+= st->hash_grows;
2172 			ndst.ndts_res_failed		+= st->res_failed;
2173 			ndst.ndts_lookups		+= st->lookups;
2174 			ndst.ndts_hits			+= st->hits;
2175 			ndst.ndts_rcv_probes_mcast	+= st->rcv_probes_mcast;
2176 			ndst.ndts_rcv_probes_ucast	+= st->rcv_probes_ucast;
2177 			ndst.ndts_periodic_gc_runs	+= st->periodic_gc_runs;
2178 			ndst.ndts_forced_gc_runs	+= st->forced_gc_runs;
2179 			ndst.ndts_table_fulls		+= st->table_fulls;
2180 		}
2181 
2182 		if (nla_put_64bit(skb, NDTA_STATS, sizeof(ndst), &ndst,
2183 				  NDTA_PAD))
2184 			goto nla_put_failure;
2185 	}
2186 
2187 	BUG_ON(tbl->parms.dev);
2188 	if (neightbl_fill_parms(skb, &tbl->parms) < 0)
2189 		goto nla_put_failure;
2190 
2191 	read_unlock_bh(&tbl->lock);
2192 	nlmsg_end(skb, nlh);
2193 	return 0;
2194 
2195 nla_put_failure:
2196 	read_unlock_bh(&tbl->lock);
2197 	nlmsg_cancel(skb, nlh);
2198 	return -EMSGSIZE;
2199 }
2200 
2201 static int neightbl_fill_param_info(struct sk_buff *skb,
2202 				    struct neigh_table *tbl,
2203 				    struct neigh_parms *parms,
2204 				    u32 pid, u32 seq, int type,
2205 				    unsigned int flags)
2206 {
2207 	struct ndtmsg *ndtmsg;
2208 	struct nlmsghdr *nlh;
2209 
2210 	nlh = nlmsg_put(skb, pid, seq, type, sizeof(*ndtmsg), flags);
2211 	if (nlh == NULL)
2212 		return -EMSGSIZE;
2213 
2214 	ndtmsg = nlmsg_data(nlh);
2215 
2216 	read_lock_bh(&tbl->lock);
2217 	ndtmsg->ndtm_family = tbl->family;
2218 	ndtmsg->ndtm_pad1   = 0;
2219 	ndtmsg->ndtm_pad2   = 0;
2220 
2221 	if (nla_put_string(skb, NDTA_NAME, tbl->id) < 0 ||
2222 	    neightbl_fill_parms(skb, parms) < 0)
2223 		goto errout;
2224 
2225 	read_unlock_bh(&tbl->lock);
2226 	nlmsg_end(skb, nlh);
2227 	return 0;
2228 errout:
2229 	read_unlock_bh(&tbl->lock);
2230 	nlmsg_cancel(skb, nlh);
2231 	return -EMSGSIZE;
2232 }
2233 
2234 static const struct nla_policy nl_neightbl_policy[NDTA_MAX+1] = {
2235 	[NDTA_NAME]		= { .type = NLA_STRING },
2236 	[NDTA_THRESH1]		= { .type = NLA_U32 },
2237 	[NDTA_THRESH2]		= { .type = NLA_U32 },
2238 	[NDTA_THRESH3]		= { .type = NLA_U32 },
2239 	[NDTA_GC_INTERVAL]	= { .type = NLA_U64 },
2240 	[NDTA_PARMS]		= { .type = NLA_NESTED },
2241 };
2242 
2243 static const struct nla_policy nl_ntbl_parm_policy[NDTPA_MAX+1] = {
2244 	[NDTPA_IFINDEX]			= { .type = NLA_U32 },
2245 	[NDTPA_QUEUE_LEN]		= { .type = NLA_U32 },
2246 	[NDTPA_PROXY_QLEN]		= { .type = NLA_U32 },
2247 	[NDTPA_APP_PROBES]		= { .type = NLA_U32 },
2248 	[NDTPA_UCAST_PROBES]		= { .type = NLA_U32 },
2249 	[NDTPA_MCAST_PROBES]		= { .type = NLA_U32 },
2250 	[NDTPA_MCAST_REPROBES]		= { .type = NLA_U32 },
2251 	[NDTPA_BASE_REACHABLE_TIME]	= { .type = NLA_U64 },
2252 	[NDTPA_GC_STALETIME]		= { .type = NLA_U64 },
2253 	[NDTPA_DELAY_PROBE_TIME]	= { .type = NLA_U64 },
2254 	[NDTPA_RETRANS_TIME]		= { .type = NLA_U64 },
2255 	[NDTPA_ANYCAST_DELAY]		= { .type = NLA_U64 },
2256 	[NDTPA_PROXY_DELAY]		= { .type = NLA_U64 },
2257 	[NDTPA_LOCKTIME]		= { .type = NLA_U64 },
2258 };
2259 
2260 static int neightbl_set(struct sk_buff *skb, struct nlmsghdr *nlh,
2261 			struct netlink_ext_ack *extack)
2262 {
2263 	struct net *net = sock_net(skb->sk);
2264 	struct neigh_table *tbl;
2265 	struct ndtmsg *ndtmsg;
2266 	struct nlattr *tb[NDTA_MAX+1];
2267 	bool found = false;
2268 	int err, tidx;
2269 
2270 	err = nlmsg_parse_deprecated(nlh, sizeof(*ndtmsg), tb, NDTA_MAX,
2271 				     nl_neightbl_policy, extack);
2272 	if (err < 0)
2273 		goto errout;
2274 
2275 	if (tb[NDTA_NAME] == NULL) {
2276 		err = -EINVAL;
2277 		goto errout;
2278 	}
2279 
2280 	ndtmsg = nlmsg_data(nlh);
2281 
2282 	for (tidx = 0; tidx < NEIGH_NR_TABLES; tidx++) {
2283 		tbl = neigh_tables[tidx];
2284 		if (!tbl)
2285 			continue;
2286 		if (ndtmsg->ndtm_family && tbl->family != ndtmsg->ndtm_family)
2287 			continue;
2288 		if (nla_strcmp(tb[NDTA_NAME], tbl->id) == 0) {
2289 			found = true;
2290 			break;
2291 		}
2292 	}
2293 
2294 	if (!found)
2295 		return -ENOENT;
2296 
2297 	/*
2298 	 * We acquire tbl->lock to be nice to the periodic timers and
2299 	 * make sure they always see a consistent set of values.
2300 	 */
2301 	write_lock_bh(&tbl->lock);
2302 
2303 	if (tb[NDTA_PARMS]) {
2304 		struct nlattr *tbp[NDTPA_MAX+1];
2305 		struct neigh_parms *p;
2306 		int i, ifindex = 0;
2307 
2308 		err = nla_parse_nested_deprecated(tbp, NDTPA_MAX,
2309 						  tb[NDTA_PARMS],
2310 						  nl_ntbl_parm_policy, extack);
2311 		if (err < 0)
2312 			goto errout_tbl_lock;
2313 
2314 		if (tbp[NDTPA_IFINDEX])
2315 			ifindex = nla_get_u32(tbp[NDTPA_IFINDEX]);
2316 
2317 		p = lookup_neigh_parms(tbl, net, ifindex);
2318 		if (p == NULL) {
2319 			err = -ENOENT;
2320 			goto errout_tbl_lock;
2321 		}
2322 
2323 		for (i = 1; i <= NDTPA_MAX; i++) {
2324 			if (tbp[i] == NULL)
2325 				continue;
2326 
2327 			switch (i) {
2328 			case NDTPA_QUEUE_LEN:
2329 				NEIGH_VAR_SET(p, QUEUE_LEN_BYTES,
2330 					      nla_get_u32(tbp[i]) *
2331 					      SKB_TRUESIZE(ETH_FRAME_LEN));
2332 				break;
2333 			case NDTPA_QUEUE_LENBYTES:
2334 				NEIGH_VAR_SET(p, QUEUE_LEN_BYTES,
2335 					      nla_get_u32(tbp[i]));
2336 				break;
2337 			case NDTPA_PROXY_QLEN:
2338 				NEIGH_VAR_SET(p, PROXY_QLEN,
2339 					      nla_get_u32(tbp[i]));
2340 				break;
2341 			case NDTPA_APP_PROBES:
2342 				NEIGH_VAR_SET(p, APP_PROBES,
2343 					      nla_get_u32(tbp[i]));
2344 				break;
2345 			case NDTPA_UCAST_PROBES:
2346 				NEIGH_VAR_SET(p, UCAST_PROBES,
2347 					      nla_get_u32(tbp[i]));
2348 				break;
2349 			case NDTPA_MCAST_PROBES:
2350 				NEIGH_VAR_SET(p, MCAST_PROBES,
2351 					      nla_get_u32(tbp[i]));
2352 				break;
2353 			case NDTPA_MCAST_REPROBES:
2354 				NEIGH_VAR_SET(p, MCAST_REPROBES,
2355 					      nla_get_u32(tbp[i]));
2356 				break;
2357 			case NDTPA_BASE_REACHABLE_TIME:
2358 				NEIGH_VAR_SET(p, BASE_REACHABLE_TIME,
2359 					      nla_get_msecs(tbp[i]));
2360 				/* update reachable_time as well, otherwise, the change will
2361 				 * only be effective after the next time neigh_periodic_work
2362 				 * decides to recompute it (can be multiple minutes)
2363 				 */
2364 				p->reachable_time =
2365 					neigh_rand_reach_time(NEIGH_VAR(p, BASE_REACHABLE_TIME));
2366 				break;
2367 			case NDTPA_GC_STALETIME:
2368 				NEIGH_VAR_SET(p, GC_STALETIME,
2369 					      nla_get_msecs(tbp[i]));
2370 				break;
2371 			case NDTPA_DELAY_PROBE_TIME:
2372 				NEIGH_VAR_SET(p, DELAY_PROBE_TIME,
2373 					      nla_get_msecs(tbp[i]));
2374 				call_netevent_notifiers(NETEVENT_DELAY_PROBE_TIME_UPDATE, p);
2375 				break;
2376 			case NDTPA_RETRANS_TIME:
2377 				NEIGH_VAR_SET(p, RETRANS_TIME,
2378 					      nla_get_msecs(tbp[i]));
2379 				break;
2380 			case NDTPA_ANYCAST_DELAY:
2381 				NEIGH_VAR_SET(p, ANYCAST_DELAY,
2382 					      nla_get_msecs(tbp[i]));
2383 				break;
2384 			case NDTPA_PROXY_DELAY:
2385 				NEIGH_VAR_SET(p, PROXY_DELAY,
2386 					      nla_get_msecs(tbp[i]));
2387 				break;
2388 			case NDTPA_LOCKTIME:
2389 				NEIGH_VAR_SET(p, LOCKTIME,
2390 					      nla_get_msecs(tbp[i]));
2391 				break;
2392 			}
2393 		}
2394 	}
2395 
2396 	err = -ENOENT;
2397 	if ((tb[NDTA_THRESH1] || tb[NDTA_THRESH2] ||
2398 	     tb[NDTA_THRESH3] || tb[NDTA_GC_INTERVAL]) &&
2399 	    !net_eq(net, &init_net))
2400 		goto errout_tbl_lock;
2401 
2402 	if (tb[NDTA_THRESH1])
2403 		tbl->gc_thresh1 = nla_get_u32(tb[NDTA_THRESH1]);
2404 
2405 	if (tb[NDTA_THRESH2])
2406 		tbl->gc_thresh2 = nla_get_u32(tb[NDTA_THRESH2]);
2407 
2408 	if (tb[NDTA_THRESH3])
2409 		tbl->gc_thresh3 = nla_get_u32(tb[NDTA_THRESH3]);
2410 
2411 	if (tb[NDTA_GC_INTERVAL])
2412 		tbl->gc_interval = nla_get_msecs(tb[NDTA_GC_INTERVAL]);
2413 
2414 	err = 0;
2415 
2416 errout_tbl_lock:
2417 	write_unlock_bh(&tbl->lock);
2418 errout:
2419 	return err;
2420 }
2421 
2422 static int neightbl_valid_dump_info(const struct nlmsghdr *nlh,
2423 				    struct netlink_ext_ack *extack)
2424 {
2425 	struct ndtmsg *ndtm;
2426 
2427 	if (nlh->nlmsg_len < nlmsg_msg_size(sizeof(*ndtm))) {
2428 		NL_SET_ERR_MSG(extack, "Invalid header for neighbor table dump request");
2429 		return -EINVAL;
2430 	}
2431 
2432 	ndtm = nlmsg_data(nlh);
2433 	if (ndtm->ndtm_pad1  || ndtm->ndtm_pad2) {
2434 		NL_SET_ERR_MSG(extack, "Invalid values in header for neighbor table dump request");
2435 		return -EINVAL;
2436 	}
2437 
2438 	if (nlmsg_attrlen(nlh, sizeof(*ndtm))) {
2439 		NL_SET_ERR_MSG(extack, "Invalid data after header in neighbor table dump request");
2440 		return -EINVAL;
2441 	}
2442 
2443 	return 0;
2444 }
2445 
2446 static int neightbl_dump_info(struct sk_buff *skb, struct netlink_callback *cb)
2447 {
2448 	const struct nlmsghdr *nlh = cb->nlh;
2449 	struct net *net = sock_net(skb->sk);
2450 	int family, tidx, nidx = 0;
2451 	int tbl_skip = cb->args[0];
2452 	int neigh_skip = cb->args[1];
2453 	struct neigh_table *tbl;
2454 
2455 	if (cb->strict_check) {
2456 		int err = neightbl_valid_dump_info(nlh, cb->extack);
2457 
2458 		if (err < 0)
2459 			return err;
2460 	}
2461 
2462 	family = ((struct rtgenmsg *)nlmsg_data(nlh))->rtgen_family;
2463 
2464 	for (tidx = 0; tidx < NEIGH_NR_TABLES; tidx++) {
2465 		struct neigh_parms *p;
2466 
2467 		tbl = neigh_tables[tidx];
2468 		if (!tbl)
2469 			continue;
2470 
2471 		if (tidx < tbl_skip || (family && tbl->family != family))
2472 			continue;
2473 
2474 		if (neightbl_fill_info(skb, tbl, NETLINK_CB(cb->skb).portid,
2475 				       nlh->nlmsg_seq, RTM_NEWNEIGHTBL,
2476 				       NLM_F_MULTI) < 0)
2477 			break;
2478 
2479 		nidx = 0;
2480 		p = list_next_entry(&tbl->parms, list);
2481 		list_for_each_entry_from(p, &tbl->parms_list, list) {
2482 			if (!net_eq(neigh_parms_net(p), net))
2483 				continue;
2484 
2485 			if (nidx < neigh_skip)
2486 				goto next;
2487 
2488 			if (neightbl_fill_param_info(skb, tbl, p,
2489 						     NETLINK_CB(cb->skb).portid,
2490 						     nlh->nlmsg_seq,
2491 						     RTM_NEWNEIGHTBL,
2492 						     NLM_F_MULTI) < 0)
2493 				goto out;
2494 		next:
2495 			nidx++;
2496 		}
2497 
2498 		neigh_skip = 0;
2499 	}
2500 out:
2501 	cb->args[0] = tidx;
2502 	cb->args[1] = nidx;
2503 
2504 	return skb->len;
2505 }
2506 
2507 static int neigh_fill_info(struct sk_buff *skb, struct neighbour *neigh,
2508 			   u32 pid, u32 seq, int type, unsigned int flags)
2509 {
2510 	u32 neigh_flags, neigh_flags_ext;
2511 	unsigned long now = jiffies;
2512 	struct nda_cacheinfo ci;
2513 	struct nlmsghdr *nlh;
2514 	struct ndmsg *ndm;
2515 
2516 	nlh = nlmsg_put(skb, pid, seq, type, sizeof(*ndm), flags);
2517 	if (nlh == NULL)
2518 		return -EMSGSIZE;
2519 
2520 	neigh_flags_ext = neigh->flags >> NTF_EXT_SHIFT;
2521 	neigh_flags     = neigh->flags & NTF_OLD_MASK;
2522 
2523 	ndm = nlmsg_data(nlh);
2524 	ndm->ndm_family	 = neigh->ops->family;
2525 	ndm->ndm_pad1    = 0;
2526 	ndm->ndm_pad2    = 0;
2527 	ndm->ndm_flags	 = neigh_flags;
2528 	ndm->ndm_type	 = neigh->type;
2529 	ndm->ndm_ifindex = neigh->dev->ifindex;
2530 
2531 	if (nla_put(skb, NDA_DST, neigh->tbl->key_len, neigh->primary_key))
2532 		goto nla_put_failure;
2533 
2534 	read_lock_bh(&neigh->lock);
2535 	ndm->ndm_state	 = neigh->nud_state;
2536 	if (neigh->nud_state & NUD_VALID) {
2537 		char haddr[MAX_ADDR_LEN];
2538 
2539 		neigh_ha_snapshot(haddr, neigh, neigh->dev);
2540 		if (nla_put(skb, NDA_LLADDR, neigh->dev->addr_len, haddr) < 0) {
2541 			read_unlock_bh(&neigh->lock);
2542 			goto nla_put_failure;
2543 		}
2544 	}
2545 
2546 	ci.ndm_used	 = jiffies_to_clock_t(now - neigh->used);
2547 	ci.ndm_confirmed = jiffies_to_clock_t(now - neigh->confirmed);
2548 	ci.ndm_updated	 = jiffies_to_clock_t(now - neigh->updated);
2549 	ci.ndm_refcnt	 = refcount_read(&neigh->refcnt) - 1;
2550 	read_unlock_bh(&neigh->lock);
2551 
2552 	if (nla_put_u32(skb, NDA_PROBES, atomic_read(&neigh->probes)) ||
2553 	    nla_put(skb, NDA_CACHEINFO, sizeof(ci), &ci))
2554 		goto nla_put_failure;
2555 
2556 	if (neigh->protocol && nla_put_u8(skb, NDA_PROTOCOL, neigh->protocol))
2557 		goto nla_put_failure;
2558 	if (neigh_flags_ext && nla_put_u32(skb, NDA_FLAGS_EXT, neigh_flags_ext))
2559 		goto nla_put_failure;
2560 
2561 	nlmsg_end(skb, nlh);
2562 	return 0;
2563 
2564 nla_put_failure:
2565 	nlmsg_cancel(skb, nlh);
2566 	return -EMSGSIZE;
2567 }
2568 
2569 static int pneigh_fill_info(struct sk_buff *skb, struct pneigh_entry *pn,
2570 			    u32 pid, u32 seq, int type, unsigned int flags,
2571 			    struct neigh_table *tbl)
2572 {
2573 	u32 neigh_flags, neigh_flags_ext;
2574 	struct nlmsghdr *nlh;
2575 	struct ndmsg *ndm;
2576 
2577 	nlh = nlmsg_put(skb, pid, seq, type, sizeof(*ndm), flags);
2578 	if (nlh == NULL)
2579 		return -EMSGSIZE;
2580 
2581 	neigh_flags_ext = pn->flags >> NTF_EXT_SHIFT;
2582 	neigh_flags     = pn->flags & NTF_OLD_MASK;
2583 
2584 	ndm = nlmsg_data(nlh);
2585 	ndm->ndm_family	 = tbl->family;
2586 	ndm->ndm_pad1    = 0;
2587 	ndm->ndm_pad2    = 0;
2588 	ndm->ndm_flags	 = neigh_flags | NTF_PROXY;
2589 	ndm->ndm_type	 = RTN_UNICAST;
2590 	ndm->ndm_ifindex = pn->dev ? pn->dev->ifindex : 0;
2591 	ndm->ndm_state	 = NUD_NONE;
2592 
2593 	if (nla_put(skb, NDA_DST, tbl->key_len, pn->key))
2594 		goto nla_put_failure;
2595 
2596 	if (pn->protocol && nla_put_u8(skb, NDA_PROTOCOL, pn->protocol))
2597 		goto nla_put_failure;
2598 	if (neigh_flags_ext && nla_put_u32(skb, NDA_FLAGS_EXT, neigh_flags_ext))
2599 		goto nla_put_failure;
2600 
2601 	nlmsg_end(skb, nlh);
2602 	return 0;
2603 
2604 nla_put_failure:
2605 	nlmsg_cancel(skb, nlh);
2606 	return -EMSGSIZE;
2607 }
2608 
2609 static void neigh_update_notify(struct neighbour *neigh, u32 nlmsg_pid)
2610 {
2611 	call_netevent_notifiers(NETEVENT_NEIGH_UPDATE, neigh);
2612 	__neigh_notify(neigh, RTM_NEWNEIGH, 0, nlmsg_pid);
2613 }
2614 
2615 static bool neigh_master_filtered(struct net_device *dev, int master_idx)
2616 {
2617 	struct net_device *master;
2618 
2619 	if (!master_idx)
2620 		return false;
2621 
2622 	master = dev ? netdev_master_upper_dev_get(dev) : NULL;
2623 
2624 	/* 0 is already used to denote NDA_MASTER wasn't passed, therefore need another
2625 	 * invalid value for ifindex to denote "no master".
2626 	 */
2627 	if (master_idx == -1)
2628 		return !!master;
2629 
2630 	if (!master || master->ifindex != master_idx)
2631 		return true;
2632 
2633 	return false;
2634 }
2635 
2636 static bool neigh_ifindex_filtered(struct net_device *dev, int filter_idx)
2637 {
2638 	if (filter_idx && (!dev || dev->ifindex != filter_idx))
2639 		return true;
2640 
2641 	return false;
2642 }
2643 
2644 struct neigh_dump_filter {
2645 	int master_idx;
2646 	int dev_idx;
2647 };
2648 
2649 static int neigh_dump_table(struct neigh_table *tbl, struct sk_buff *skb,
2650 			    struct netlink_callback *cb,
2651 			    struct neigh_dump_filter *filter)
2652 {
2653 	struct net *net = sock_net(skb->sk);
2654 	struct neighbour *n;
2655 	int rc, h, s_h = cb->args[1];
2656 	int idx, s_idx = idx = cb->args[2];
2657 	struct neigh_hash_table *nht;
2658 	unsigned int flags = NLM_F_MULTI;
2659 
2660 	if (filter->dev_idx || filter->master_idx)
2661 		flags |= NLM_F_DUMP_FILTERED;
2662 
2663 	rcu_read_lock_bh();
2664 	nht = rcu_dereference_bh(tbl->nht);
2665 
2666 	for (h = s_h; h < (1 << nht->hash_shift); h++) {
2667 		if (h > s_h)
2668 			s_idx = 0;
2669 		for (n = rcu_dereference_bh(nht->hash_buckets[h]), idx = 0;
2670 		     n != NULL;
2671 		     n = rcu_dereference_bh(n->next)) {
2672 			if (idx < s_idx || !net_eq(dev_net(n->dev), net))
2673 				goto next;
2674 			if (neigh_ifindex_filtered(n->dev, filter->dev_idx) ||
2675 			    neigh_master_filtered(n->dev, filter->master_idx))
2676 				goto next;
2677 			if (neigh_fill_info(skb, n, NETLINK_CB(cb->skb).portid,
2678 					    cb->nlh->nlmsg_seq,
2679 					    RTM_NEWNEIGH,
2680 					    flags) < 0) {
2681 				rc = -1;
2682 				goto out;
2683 			}
2684 next:
2685 			idx++;
2686 		}
2687 	}
2688 	rc = skb->len;
2689 out:
2690 	rcu_read_unlock_bh();
2691 	cb->args[1] = h;
2692 	cb->args[2] = idx;
2693 	return rc;
2694 }
2695 
2696 static int pneigh_dump_table(struct neigh_table *tbl, struct sk_buff *skb,
2697 			     struct netlink_callback *cb,
2698 			     struct neigh_dump_filter *filter)
2699 {
2700 	struct pneigh_entry *n;
2701 	struct net *net = sock_net(skb->sk);
2702 	int rc, h, s_h = cb->args[3];
2703 	int idx, s_idx = idx = cb->args[4];
2704 	unsigned int flags = NLM_F_MULTI;
2705 
2706 	if (filter->dev_idx || filter->master_idx)
2707 		flags |= NLM_F_DUMP_FILTERED;
2708 
2709 	read_lock_bh(&tbl->lock);
2710 
2711 	for (h = s_h; h <= PNEIGH_HASHMASK; h++) {
2712 		if (h > s_h)
2713 			s_idx = 0;
2714 		for (n = tbl->phash_buckets[h], idx = 0; n; n = n->next) {
2715 			if (idx < s_idx || pneigh_net(n) != net)
2716 				goto next;
2717 			if (neigh_ifindex_filtered(n->dev, filter->dev_idx) ||
2718 			    neigh_master_filtered(n->dev, filter->master_idx))
2719 				goto next;
2720 			if (pneigh_fill_info(skb, n, NETLINK_CB(cb->skb).portid,
2721 					    cb->nlh->nlmsg_seq,
2722 					    RTM_NEWNEIGH, flags, tbl) < 0) {
2723 				read_unlock_bh(&tbl->lock);
2724 				rc = -1;
2725 				goto out;
2726 			}
2727 		next:
2728 			idx++;
2729 		}
2730 	}
2731 
2732 	read_unlock_bh(&tbl->lock);
2733 	rc = skb->len;
2734 out:
2735 	cb->args[3] = h;
2736 	cb->args[4] = idx;
2737 	return rc;
2738 
2739 }
2740 
2741 static int neigh_valid_dump_req(const struct nlmsghdr *nlh,
2742 				bool strict_check,
2743 				struct neigh_dump_filter *filter,
2744 				struct netlink_ext_ack *extack)
2745 {
2746 	struct nlattr *tb[NDA_MAX + 1];
2747 	int err, i;
2748 
2749 	if (strict_check) {
2750 		struct ndmsg *ndm;
2751 
2752 		if (nlh->nlmsg_len < nlmsg_msg_size(sizeof(*ndm))) {
2753 			NL_SET_ERR_MSG(extack, "Invalid header for neighbor dump request");
2754 			return -EINVAL;
2755 		}
2756 
2757 		ndm = nlmsg_data(nlh);
2758 		if (ndm->ndm_pad1  || ndm->ndm_pad2  || ndm->ndm_ifindex ||
2759 		    ndm->ndm_state || ndm->ndm_type) {
2760 			NL_SET_ERR_MSG(extack, "Invalid values in header for neighbor dump request");
2761 			return -EINVAL;
2762 		}
2763 
2764 		if (ndm->ndm_flags & ~NTF_PROXY) {
2765 			NL_SET_ERR_MSG(extack, "Invalid flags in header for neighbor dump request");
2766 			return -EINVAL;
2767 		}
2768 
2769 		err = nlmsg_parse_deprecated_strict(nlh, sizeof(struct ndmsg),
2770 						    tb, NDA_MAX, nda_policy,
2771 						    extack);
2772 	} else {
2773 		err = nlmsg_parse_deprecated(nlh, sizeof(struct ndmsg), tb,
2774 					     NDA_MAX, nda_policy, extack);
2775 	}
2776 	if (err < 0)
2777 		return err;
2778 
2779 	for (i = 0; i <= NDA_MAX; ++i) {
2780 		if (!tb[i])
2781 			continue;
2782 
2783 		/* all new attributes should require strict_check */
2784 		switch (i) {
2785 		case NDA_IFINDEX:
2786 			filter->dev_idx = nla_get_u32(tb[i]);
2787 			break;
2788 		case NDA_MASTER:
2789 			filter->master_idx = nla_get_u32(tb[i]);
2790 			break;
2791 		default:
2792 			if (strict_check) {
2793 				NL_SET_ERR_MSG(extack, "Unsupported attribute in neighbor dump request");
2794 				return -EINVAL;
2795 			}
2796 		}
2797 	}
2798 
2799 	return 0;
2800 }
2801 
2802 static int neigh_dump_info(struct sk_buff *skb, struct netlink_callback *cb)
2803 {
2804 	const struct nlmsghdr *nlh = cb->nlh;
2805 	struct neigh_dump_filter filter = {};
2806 	struct neigh_table *tbl;
2807 	int t, family, s_t;
2808 	int proxy = 0;
2809 	int err;
2810 
2811 	family = ((struct rtgenmsg *)nlmsg_data(nlh))->rtgen_family;
2812 
2813 	/* check for full ndmsg structure presence, family member is
2814 	 * the same for both structures
2815 	 */
2816 	if (nlmsg_len(nlh) >= sizeof(struct ndmsg) &&
2817 	    ((struct ndmsg *)nlmsg_data(nlh))->ndm_flags == NTF_PROXY)
2818 		proxy = 1;
2819 
2820 	err = neigh_valid_dump_req(nlh, cb->strict_check, &filter, cb->extack);
2821 	if (err < 0 && cb->strict_check)
2822 		return err;
2823 
2824 	s_t = cb->args[0];
2825 
2826 	for (t = 0; t < NEIGH_NR_TABLES; t++) {
2827 		tbl = neigh_tables[t];
2828 
2829 		if (!tbl)
2830 			continue;
2831 		if (t < s_t || (family && tbl->family != family))
2832 			continue;
2833 		if (t > s_t)
2834 			memset(&cb->args[1], 0, sizeof(cb->args) -
2835 						sizeof(cb->args[0]));
2836 		if (proxy)
2837 			err = pneigh_dump_table(tbl, skb, cb, &filter);
2838 		else
2839 			err = neigh_dump_table(tbl, skb, cb, &filter);
2840 		if (err < 0)
2841 			break;
2842 	}
2843 
2844 	cb->args[0] = t;
2845 	return skb->len;
2846 }
2847 
2848 static int neigh_valid_get_req(const struct nlmsghdr *nlh,
2849 			       struct neigh_table **tbl,
2850 			       void **dst, int *dev_idx, u8 *ndm_flags,
2851 			       struct netlink_ext_ack *extack)
2852 {
2853 	struct nlattr *tb[NDA_MAX + 1];
2854 	struct ndmsg *ndm;
2855 	int err, i;
2856 
2857 	if (nlh->nlmsg_len < nlmsg_msg_size(sizeof(*ndm))) {
2858 		NL_SET_ERR_MSG(extack, "Invalid header for neighbor get request");
2859 		return -EINVAL;
2860 	}
2861 
2862 	ndm = nlmsg_data(nlh);
2863 	if (ndm->ndm_pad1  || ndm->ndm_pad2  || ndm->ndm_state ||
2864 	    ndm->ndm_type) {
2865 		NL_SET_ERR_MSG(extack, "Invalid values in header for neighbor get request");
2866 		return -EINVAL;
2867 	}
2868 
2869 	if (ndm->ndm_flags & ~NTF_PROXY) {
2870 		NL_SET_ERR_MSG(extack, "Invalid flags in header for neighbor get request");
2871 		return -EINVAL;
2872 	}
2873 
2874 	err = nlmsg_parse_deprecated_strict(nlh, sizeof(struct ndmsg), tb,
2875 					    NDA_MAX, nda_policy, extack);
2876 	if (err < 0)
2877 		return err;
2878 
2879 	*ndm_flags = ndm->ndm_flags;
2880 	*dev_idx = ndm->ndm_ifindex;
2881 	*tbl = neigh_find_table(ndm->ndm_family);
2882 	if (*tbl == NULL) {
2883 		NL_SET_ERR_MSG(extack, "Unsupported family in header for neighbor get request");
2884 		return -EAFNOSUPPORT;
2885 	}
2886 
2887 	for (i = 0; i <= NDA_MAX; ++i) {
2888 		if (!tb[i])
2889 			continue;
2890 
2891 		switch (i) {
2892 		case NDA_DST:
2893 			if (nla_len(tb[i]) != (int)(*tbl)->key_len) {
2894 				NL_SET_ERR_MSG(extack, "Invalid network address in neighbor get request");
2895 				return -EINVAL;
2896 			}
2897 			*dst = nla_data(tb[i]);
2898 			break;
2899 		default:
2900 			NL_SET_ERR_MSG(extack, "Unsupported attribute in neighbor get request");
2901 			return -EINVAL;
2902 		}
2903 	}
2904 
2905 	return 0;
2906 }
2907 
2908 static inline size_t neigh_nlmsg_size(void)
2909 {
2910 	return NLMSG_ALIGN(sizeof(struct ndmsg))
2911 	       + nla_total_size(MAX_ADDR_LEN) /* NDA_DST */
2912 	       + nla_total_size(MAX_ADDR_LEN) /* NDA_LLADDR */
2913 	       + nla_total_size(sizeof(struct nda_cacheinfo))
2914 	       + nla_total_size(4)  /* NDA_PROBES */
2915 	       + nla_total_size(4)  /* NDA_FLAGS_EXT */
2916 	       + nla_total_size(1); /* NDA_PROTOCOL */
2917 }
2918 
2919 static int neigh_get_reply(struct net *net, struct neighbour *neigh,
2920 			   u32 pid, u32 seq)
2921 {
2922 	struct sk_buff *skb;
2923 	int err = 0;
2924 
2925 	skb = nlmsg_new(neigh_nlmsg_size(), GFP_KERNEL);
2926 	if (!skb)
2927 		return -ENOBUFS;
2928 
2929 	err = neigh_fill_info(skb, neigh, pid, seq, RTM_NEWNEIGH, 0);
2930 	if (err) {
2931 		kfree_skb(skb);
2932 		goto errout;
2933 	}
2934 
2935 	err = rtnl_unicast(skb, net, pid);
2936 errout:
2937 	return err;
2938 }
2939 
2940 static inline size_t pneigh_nlmsg_size(void)
2941 {
2942 	return NLMSG_ALIGN(sizeof(struct ndmsg))
2943 	       + nla_total_size(MAX_ADDR_LEN) /* NDA_DST */
2944 	       + nla_total_size(4)  /* NDA_FLAGS_EXT */
2945 	       + nla_total_size(1); /* NDA_PROTOCOL */
2946 }
2947 
2948 static int pneigh_get_reply(struct net *net, struct pneigh_entry *neigh,
2949 			    u32 pid, u32 seq, struct neigh_table *tbl)
2950 {
2951 	struct sk_buff *skb;
2952 	int err = 0;
2953 
2954 	skb = nlmsg_new(pneigh_nlmsg_size(), GFP_KERNEL);
2955 	if (!skb)
2956 		return -ENOBUFS;
2957 
2958 	err = pneigh_fill_info(skb, neigh, pid, seq, RTM_NEWNEIGH, 0, tbl);
2959 	if (err) {
2960 		kfree_skb(skb);
2961 		goto errout;
2962 	}
2963 
2964 	err = rtnl_unicast(skb, net, pid);
2965 errout:
2966 	return err;
2967 }
2968 
2969 static int neigh_get(struct sk_buff *in_skb, struct nlmsghdr *nlh,
2970 		     struct netlink_ext_ack *extack)
2971 {
2972 	struct net *net = sock_net(in_skb->sk);
2973 	struct net_device *dev = NULL;
2974 	struct neigh_table *tbl = NULL;
2975 	struct neighbour *neigh;
2976 	void *dst = NULL;
2977 	u8 ndm_flags = 0;
2978 	int dev_idx = 0;
2979 	int err;
2980 
2981 	err = neigh_valid_get_req(nlh, &tbl, &dst, &dev_idx, &ndm_flags,
2982 				  extack);
2983 	if (err < 0)
2984 		return err;
2985 
2986 	if (dev_idx) {
2987 		dev = __dev_get_by_index(net, dev_idx);
2988 		if (!dev) {
2989 			NL_SET_ERR_MSG(extack, "Unknown device ifindex");
2990 			return -ENODEV;
2991 		}
2992 	}
2993 
2994 	if (!dst) {
2995 		NL_SET_ERR_MSG(extack, "Network address not specified");
2996 		return -EINVAL;
2997 	}
2998 
2999 	if (ndm_flags & NTF_PROXY) {
3000 		struct pneigh_entry *pn;
3001 
3002 		pn = pneigh_lookup(tbl, net, dst, dev, 0);
3003 		if (!pn) {
3004 			NL_SET_ERR_MSG(extack, "Proxy neighbour entry not found");
3005 			return -ENOENT;
3006 		}
3007 		return pneigh_get_reply(net, pn, NETLINK_CB(in_skb).portid,
3008 					nlh->nlmsg_seq, tbl);
3009 	}
3010 
3011 	if (!dev) {
3012 		NL_SET_ERR_MSG(extack, "No device specified");
3013 		return -EINVAL;
3014 	}
3015 
3016 	neigh = neigh_lookup(tbl, dst, dev);
3017 	if (!neigh) {
3018 		NL_SET_ERR_MSG(extack, "Neighbour entry not found");
3019 		return -ENOENT;
3020 	}
3021 
3022 	err = neigh_get_reply(net, neigh, NETLINK_CB(in_skb).portid,
3023 			      nlh->nlmsg_seq);
3024 
3025 	neigh_release(neigh);
3026 
3027 	return err;
3028 }
3029 
3030 void neigh_for_each(struct neigh_table *tbl, void (*cb)(struct neighbour *, void *), void *cookie)
3031 {
3032 	int chain;
3033 	struct neigh_hash_table *nht;
3034 
3035 	rcu_read_lock_bh();
3036 	nht = rcu_dereference_bh(tbl->nht);
3037 
3038 	read_lock(&tbl->lock); /* avoid resizes */
3039 	for (chain = 0; chain < (1 << nht->hash_shift); chain++) {
3040 		struct neighbour *n;
3041 
3042 		for (n = rcu_dereference_bh(nht->hash_buckets[chain]);
3043 		     n != NULL;
3044 		     n = rcu_dereference_bh(n->next))
3045 			cb(n, cookie);
3046 	}
3047 	read_unlock(&tbl->lock);
3048 	rcu_read_unlock_bh();
3049 }
3050 EXPORT_SYMBOL(neigh_for_each);
3051 
3052 /* The tbl->lock must be held as a writer and BH disabled. */
3053 void __neigh_for_each_release(struct neigh_table *tbl,
3054 			      int (*cb)(struct neighbour *))
3055 {
3056 	int chain;
3057 	struct neigh_hash_table *nht;
3058 
3059 	nht = rcu_dereference_protected(tbl->nht,
3060 					lockdep_is_held(&tbl->lock));
3061 	for (chain = 0; chain < (1 << nht->hash_shift); chain++) {
3062 		struct neighbour *n;
3063 		struct neighbour __rcu **np;
3064 
3065 		np = &nht->hash_buckets[chain];
3066 		while ((n = rcu_dereference_protected(*np,
3067 					lockdep_is_held(&tbl->lock))) != NULL) {
3068 			int release;
3069 
3070 			write_lock(&n->lock);
3071 			release = cb(n);
3072 			if (release) {
3073 				rcu_assign_pointer(*np,
3074 					rcu_dereference_protected(n->next,
3075 						lockdep_is_held(&tbl->lock)));
3076 				neigh_mark_dead(n);
3077 			} else
3078 				np = &n->next;
3079 			write_unlock(&n->lock);
3080 			if (release)
3081 				neigh_cleanup_and_release(n);
3082 		}
3083 	}
3084 }
3085 EXPORT_SYMBOL(__neigh_for_each_release);
3086 
3087 int neigh_xmit(int index, struct net_device *dev,
3088 	       const void *addr, struct sk_buff *skb)
3089 {
3090 	int err = -EAFNOSUPPORT;
3091 	if (likely(index < NEIGH_NR_TABLES)) {
3092 		struct neigh_table *tbl;
3093 		struct neighbour *neigh;
3094 
3095 		tbl = neigh_tables[index];
3096 		if (!tbl)
3097 			goto out;
3098 		rcu_read_lock_bh();
3099 		if (index == NEIGH_ARP_TABLE) {
3100 			u32 key = *((u32 *)addr);
3101 
3102 			neigh = __ipv4_neigh_lookup_noref(dev, key);
3103 		} else {
3104 			neigh = __neigh_lookup_noref(tbl, addr, dev);
3105 		}
3106 		if (!neigh)
3107 			neigh = __neigh_create(tbl, addr, dev, false);
3108 		err = PTR_ERR(neigh);
3109 		if (IS_ERR(neigh)) {
3110 			rcu_read_unlock_bh();
3111 			goto out_kfree_skb;
3112 		}
3113 		err = neigh->output(neigh, skb);
3114 		rcu_read_unlock_bh();
3115 	}
3116 	else if (index == NEIGH_LINK_TABLE) {
3117 		err = dev_hard_header(skb, dev, ntohs(skb->protocol),
3118 				      addr, NULL, skb->len);
3119 		if (err < 0)
3120 			goto out_kfree_skb;
3121 		err = dev_queue_xmit(skb);
3122 	}
3123 out:
3124 	return err;
3125 out_kfree_skb:
3126 	kfree_skb(skb);
3127 	goto out;
3128 }
3129 EXPORT_SYMBOL(neigh_xmit);
3130 
3131 #ifdef CONFIG_PROC_FS
3132 
3133 static struct neighbour *neigh_get_first(struct seq_file *seq)
3134 {
3135 	struct neigh_seq_state *state = seq->private;
3136 	struct net *net = seq_file_net(seq);
3137 	struct neigh_hash_table *nht = state->nht;
3138 	struct neighbour *n = NULL;
3139 	int bucket;
3140 
3141 	state->flags &= ~NEIGH_SEQ_IS_PNEIGH;
3142 	for (bucket = 0; bucket < (1 << nht->hash_shift); bucket++) {
3143 		n = rcu_dereference_bh(nht->hash_buckets[bucket]);
3144 
3145 		while (n) {
3146 			if (!net_eq(dev_net(n->dev), net))
3147 				goto next;
3148 			if (state->neigh_sub_iter) {
3149 				loff_t fakep = 0;
3150 				void *v;
3151 
3152 				v = state->neigh_sub_iter(state, n, &fakep);
3153 				if (!v)
3154 					goto next;
3155 			}
3156 			if (!(state->flags & NEIGH_SEQ_SKIP_NOARP))
3157 				break;
3158 			if (n->nud_state & ~NUD_NOARP)
3159 				break;
3160 next:
3161 			n = rcu_dereference_bh(n->next);
3162 		}
3163 
3164 		if (n)
3165 			break;
3166 	}
3167 	state->bucket = bucket;
3168 
3169 	return n;
3170 }
3171 
3172 static struct neighbour *neigh_get_next(struct seq_file *seq,
3173 					struct neighbour *n,
3174 					loff_t *pos)
3175 {
3176 	struct neigh_seq_state *state = seq->private;
3177 	struct net *net = seq_file_net(seq);
3178 	struct neigh_hash_table *nht = state->nht;
3179 
3180 	if (state->neigh_sub_iter) {
3181 		void *v = state->neigh_sub_iter(state, n, pos);
3182 		if (v)
3183 			return n;
3184 	}
3185 	n = rcu_dereference_bh(n->next);
3186 
3187 	while (1) {
3188 		while (n) {
3189 			if (!net_eq(dev_net(n->dev), net))
3190 				goto next;
3191 			if (state->neigh_sub_iter) {
3192 				void *v = state->neigh_sub_iter(state, n, pos);
3193 				if (v)
3194 					return n;
3195 				goto next;
3196 			}
3197 			if (!(state->flags & NEIGH_SEQ_SKIP_NOARP))
3198 				break;
3199 
3200 			if (n->nud_state & ~NUD_NOARP)
3201 				break;
3202 next:
3203 			n = rcu_dereference_bh(n->next);
3204 		}
3205 
3206 		if (n)
3207 			break;
3208 
3209 		if (++state->bucket >= (1 << nht->hash_shift))
3210 			break;
3211 
3212 		n = rcu_dereference_bh(nht->hash_buckets[state->bucket]);
3213 	}
3214 
3215 	if (n && pos)
3216 		--(*pos);
3217 	return n;
3218 }
3219 
3220 static struct neighbour *neigh_get_idx(struct seq_file *seq, loff_t *pos)
3221 {
3222 	struct neighbour *n = neigh_get_first(seq);
3223 
3224 	if (n) {
3225 		--(*pos);
3226 		while (*pos) {
3227 			n = neigh_get_next(seq, n, pos);
3228 			if (!n)
3229 				break;
3230 		}
3231 	}
3232 	return *pos ? NULL : n;
3233 }
3234 
3235 static struct pneigh_entry *pneigh_get_first(struct seq_file *seq)
3236 {
3237 	struct neigh_seq_state *state = seq->private;
3238 	struct net *net = seq_file_net(seq);
3239 	struct neigh_table *tbl = state->tbl;
3240 	struct pneigh_entry *pn = NULL;
3241 	int bucket;
3242 
3243 	state->flags |= NEIGH_SEQ_IS_PNEIGH;
3244 	for (bucket = 0; bucket <= PNEIGH_HASHMASK; bucket++) {
3245 		pn = tbl->phash_buckets[bucket];
3246 		while (pn && !net_eq(pneigh_net(pn), net))
3247 			pn = pn->next;
3248 		if (pn)
3249 			break;
3250 	}
3251 	state->bucket = bucket;
3252 
3253 	return pn;
3254 }
3255 
3256 static struct pneigh_entry *pneigh_get_next(struct seq_file *seq,
3257 					    struct pneigh_entry *pn,
3258 					    loff_t *pos)
3259 {
3260 	struct neigh_seq_state *state = seq->private;
3261 	struct net *net = seq_file_net(seq);
3262 	struct neigh_table *tbl = state->tbl;
3263 
3264 	do {
3265 		pn = pn->next;
3266 	} while (pn && !net_eq(pneigh_net(pn), net));
3267 
3268 	while (!pn) {
3269 		if (++state->bucket > PNEIGH_HASHMASK)
3270 			break;
3271 		pn = tbl->phash_buckets[state->bucket];
3272 		while (pn && !net_eq(pneigh_net(pn), net))
3273 			pn = pn->next;
3274 		if (pn)
3275 			break;
3276 	}
3277 
3278 	if (pn && pos)
3279 		--(*pos);
3280 
3281 	return pn;
3282 }
3283 
3284 static struct pneigh_entry *pneigh_get_idx(struct seq_file *seq, loff_t *pos)
3285 {
3286 	struct pneigh_entry *pn = pneigh_get_first(seq);
3287 
3288 	if (pn) {
3289 		--(*pos);
3290 		while (*pos) {
3291 			pn = pneigh_get_next(seq, pn, pos);
3292 			if (!pn)
3293 				break;
3294 		}
3295 	}
3296 	return *pos ? NULL : pn;
3297 }
3298 
3299 static void *neigh_get_idx_any(struct seq_file *seq, loff_t *pos)
3300 {
3301 	struct neigh_seq_state *state = seq->private;
3302 	void *rc;
3303 	loff_t idxpos = *pos;
3304 
3305 	rc = neigh_get_idx(seq, &idxpos);
3306 	if (!rc && !(state->flags & NEIGH_SEQ_NEIGH_ONLY))
3307 		rc = pneigh_get_idx(seq, &idxpos);
3308 
3309 	return rc;
3310 }
3311 
3312 void *neigh_seq_start(struct seq_file *seq, loff_t *pos, struct neigh_table *tbl, unsigned int neigh_seq_flags)
3313 	__acquires(tbl->lock)
3314 	__acquires(rcu_bh)
3315 {
3316 	struct neigh_seq_state *state = seq->private;
3317 
3318 	state->tbl = tbl;
3319 	state->bucket = 0;
3320 	state->flags = (neigh_seq_flags & ~NEIGH_SEQ_IS_PNEIGH);
3321 
3322 	rcu_read_lock_bh();
3323 	state->nht = rcu_dereference_bh(tbl->nht);
3324 	read_lock(&tbl->lock);
3325 
3326 	return *pos ? neigh_get_idx_any(seq, pos) : SEQ_START_TOKEN;
3327 }
3328 EXPORT_SYMBOL(neigh_seq_start);
3329 
3330 void *neigh_seq_next(struct seq_file *seq, void *v, loff_t *pos)
3331 {
3332 	struct neigh_seq_state *state;
3333 	void *rc;
3334 
3335 	if (v == SEQ_START_TOKEN) {
3336 		rc = neigh_get_first(seq);
3337 		goto out;
3338 	}
3339 
3340 	state = seq->private;
3341 	if (!(state->flags & NEIGH_SEQ_IS_PNEIGH)) {
3342 		rc = neigh_get_next(seq, v, NULL);
3343 		if (rc)
3344 			goto out;
3345 		if (!(state->flags & NEIGH_SEQ_NEIGH_ONLY))
3346 			rc = pneigh_get_first(seq);
3347 	} else {
3348 		BUG_ON(state->flags & NEIGH_SEQ_NEIGH_ONLY);
3349 		rc = pneigh_get_next(seq, v, NULL);
3350 	}
3351 out:
3352 	++(*pos);
3353 	return rc;
3354 }
3355 EXPORT_SYMBOL(neigh_seq_next);
3356 
3357 void neigh_seq_stop(struct seq_file *seq, void *v)
3358 	__releases(tbl->lock)
3359 	__releases(rcu_bh)
3360 {
3361 	struct neigh_seq_state *state = seq->private;
3362 	struct neigh_table *tbl = state->tbl;
3363 
3364 	read_unlock(&tbl->lock);
3365 	rcu_read_unlock_bh();
3366 }
3367 EXPORT_SYMBOL(neigh_seq_stop);
3368 
3369 /* statistics via seq_file */
3370 
3371 static void *neigh_stat_seq_start(struct seq_file *seq, loff_t *pos)
3372 {
3373 	struct neigh_table *tbl = pde_data(file_inode(seq->file));
3374 	int cpu;
3375 
3376 	if (*pos == 0)
3377 		return SEQ_START_TOKEN;
3378 
3379 	for (cpu = *pos-1; cpu < nr_cpu_ids; ++cpu) {
3380 		if (!cpu_possible(cpu))
3381 			continue;
3382 		*pos = cpu+1;
3383 		return per_cpu_ptr(tbl->stats, cpu);
3384 	}
3385 	return NULL;
3386 }
3387 
3388 static void *neigh_stat_seq_next(struct seq_file *seq, void *v, loff_t *pos)
3389 {
3390 	struct neigh_table *tbl = pde_data(file_inode(seq->file));
3391 	int cpu;
3392 
3393 	for (cpu = *pos; cpu < nr_cpu_ids; ++cpu) {
3394 		if (!cpu_possible(cpu))
3395 			continue;
3396 		*pos = cpu+1;
3397 		return per_cpu_ptr(tbl->stats, cpu);
3398 	}
3399 	(*pos)++;
3400 	return NULL;
3401 }
3402 
3403 static void neigh_stat_seq_stop(struct seq_file *seq, void *v)
3404 {
3405 
3406 }
3407 
3408 static int neigh_stat_seq_show(struct seq_file *seq, void *v)
3409 {
3410 	struct neigh_table *tbl = pde_data(file_inode(seq->file));
3411 	struct neigh_statistics *st = v;
3412 
3413 	if (v == SEQ_START_TOKEN) {
3414 		seq_puts(seq, "entries  allocs   destroys hash_grows lookups  hits     res_failed rcv_probes_mcast rcv_probes_ucast periodic_gc_runs forced_gc_runs unresolved_discards table_fulls\n");
3415 		return 0;
3416 	}
3417 
3418 	seq_printf(seq, "%08x %08lx %08lx %08lx   %08lx %08lx %08lx   "
3419 			"%08lx         %08lx         %08lx         "
3420 			"%08lx       %08lx            %08lx\n",
3421 		   atomic_read(&tbl->entries),
3422 
3423 		   st->allocs,
3424 		   st->destroys,
3425 		   st->hash_grows,
3426 
3427 		   st->lookups,
3428 		   st->hits,
3429 
3430 		   st->res_failed,
3431 
3432 		   st->rcv_probes_mcast,
3433 		   st->rcv_probes_ucast,
3434 
3435 		   st->periodic_gc_runs,
3436 		   st->forced_gc_runs,
3437 		   st->unres_discards,
3438 		   st->table_fulls
3439 		   );
3440 
3441 	return 0;
3442 }
3443 
3444 static const struct seq_operations neigh_stat_seq_ops = {
3445 	.start	= neigh_stat_seq_start,
3446 	.next	= neigh_stat_seq_next,
3447 	.stop	= neigh_stat_seq_stop,
3448 	.show	= neigh_stat_seq_show,
3449 };
3450 #endif /* CONFIG_PROC_FS */
3451 
3452 static void __neigh_notify(struct neighbour *n, int type, int flags,
3453 			   u32 pid)
3454 {
3455 	struct net *net = dev_net(n->dev);
3456 	struct sk_buff *skb;
3457 	int err = -ENOBUFS;
3458 
3459 	skb = nlmsg_new(neigh_nlmsg_size(), GFP_ATOMIC);
3460 	if (skb == NULL)
3461 		goto errout;
3462 
3463 	err = neigh_fill_info(skb, n, pid, 0, type, flags);
3464 	if (err < 0) {
3465 		/* -EMSGSIZE implies BUG in neigh_nlmsg_size() */
3466 		WARN_ON(err == -EMSGSIZE);
3467 		kfree_skb(skb);
3468 		goto errout;
3469 	}
3470 	rtnl_notify(skb, net, 0, RTNLGRP_NEIGH, NULL, GFP_ATOMIC);
3471 	return;
3472 errout:
3473 	if (err < 0)
3474 		rtnl_set_sk_err(net, RTNLGRP_NEIGH, err);
3475 }
3476 
3477 void neigh_app_ns(struct neighbour *n)
3478 {
3479 	__neigh_notify(n, RTM_GETNEIGH, NLM_F_REQUEST, 0);
3480 }
3481 EXPORT_SYMBOL(neigh_app_ns);
3482 
3483 #ifdef CONFIG_SYSCTL
3484 static int unres_qlen_max = INT_MAX / SKB_TRUESIZE(ETH_FRAME_LEN);
3485 
3486 static int proc_unres_qlen(struct ctl_table *ctl, int write,
3487 			   void *buffer, size_t *lenp, loff_t *ppos)
3488 {
3489 	int size, ret;
3490 	struct ctl_table tmp = *ctl;
3491 
3492 	tmp.extra1 = SYSCTL_ZERO;
3493 	tmp.extra2 = &unres_qlen_max;
3494 	tmp.data = &size;
3495 
3496 	size = *(int *)ctl->data / SKB_TRUESIZE(ETH_FRAME_LEN);
3497 	ret = proc_dointvec_minmax(&tmp, write, buffer, lenp, ppos);
3498 
3499 	if (write && !ret)
3500 		*(int *)ctl->data = size * SKB_TRUESIZE(ETH_FRAME_LEN);
3501 	return ret;
3502 }
3503 
3504 static struct neigh_parms *neigh_get_dev_parms_rcu(struct net_device *dev,
3505 						   int family)
3506 {
3507 	switch (family) {
3508 	case AF_INET:
3509 		return __in_dev_arp_parms_get_rcu(dev);
3510 	case AF_INET6:
3511 		return __in6_dev_nd_parms_get_rcu(dev);
3512 	}
3513 	return NULL;
3514 }
3515 
3516 static void neigh_copy_dflt_parms(struct net *net, struct neigh_parms *p,
3517 				  int index)
3518 {
3519 	struct net_device *dev;
3520 	int family = neigh_parms_family(p);
3521 
3522 	rcu_read_lock();
3523 	for_each_netdev_rcu(net, dev) {
3524 		struct neigh_parms *dst_p =
3525 				neigh_get_dev_parms_rcu(dev, family);
3526 
3527 		if (dst_p && !test_bit(index, dst_p->data_state))
3528 			dst_p->data[index] = p->data[index];
3529 	}
3530 	rcu_read_unlock();
3531 }
3532 
3533 static void neigh_proc_update(struct ctl_table *ctl, int write)
3534 {
3535 	struct net_device *dev = ctl->extra1;
3536 	struct neigh_parms *p = ctl->extra2;
3537 	struct net *net = neigh_parms_net(p);
3538 	int index = (int *) ctl->data - p->data;
3539 
3540 	if (!write)
3541 		return;
3542 
3543 	set_bit(index, p->data_state);
3544 	if (index == NEIGH_VAR_DELAY_PROBE_TIME)
3545 		call_netevent_notifiers(NETEVENT_DELAY_PROBE_TIME_UPDATE, p);
3546 	if (!dev) /* NULL dev means this is default value */
3547 		neigh_copy_dflt_parms(net, p, index);
3548 }
3549 
3550 static int neigh_proc_dointvec_zero_intmax(struct ctl_table *ctl, int write,
3551 					   void *buffer, size_t *lenp,
3552 					   loff_t *ppos)
3553 {
3554 	struct ctl_table tmp = *ctl;
3555 	int ret;
3556 
3557 	tmp.extra1 = SYSCTL_ZERO;
3558 	tmp.extra2 = SYSCTL_INT_MAX;
3559 
3560 	ret = proc_dointvec_minmax(&tmp, write, buffer, lenp, ppos);
3561 	neigh_proc_update(ctl, write);
3562 	return ret;
3563 }
3564 
3565 int neigh_proc_dointvec(struct ctl_table *ctl, int write, void *buffer,
3566 			size_t *lenp, loff_t *ppos)
3567 {
3568 	int ret = proc_dointvec(ctl, write, buffer, lenp, ppos);
3569 
3570 	neigh_proc_update(ctl, write);
3571 	return ret;
3572 }
3573 EXPORT_SYMBOL(neigh_proc_dointvec);
3574 
3575 int neigh_proc_dointvec_jiffies(struct ctl_table *ctl, int write, void *buffer,
3576 				size_t *lenp, loff_t *ppos)
3577 {
3578 	int ret = proc_dointvec_jiffies(ctl, write, buffer, lenp, ppos);
3579 
3580 	neigh_proc_update(ctl, write);
3581 	return ret;
3582 }
3583 EXPORT_SYMBOL(neigh_proc_dointvec_jiffies);
3584 
3585 static int neigh_proc_dointvec_userhz_jiffies(struct ctl_table *ctl, int write,
3586 					      void *buffer, size_t *lenp,
3587 					      loff_t *ppos)
3588 {
3589 	int ret = proc_dointvec_userhz_jiffies(ctl, write, buffer, lenp, ppos);
3590 
3591 	neigh_proc_update(ctl, write);
3592 	return ret;
3593 }
3594 
3595 int neigh_proc_dointvec_ms_jiffies(struct ctl_table *ctl, int write,
3596 				   void *buffer, size_t *lenp, loff_t *ppos)
3597 {
3598 	int ret = proc_dointvec_ms_jiffies(ctl, write, buffer, lenp, ppos);
3599 
3600 	neigh_proc_update(ctl, write);
3601 	return ret;
3602 }
3603 EXPORT_SYMBOL(neigh_proc_dointvec_ms_jiffies);
3604 
3605 static int neigh_proc_dointvec_unres_qlen(struct ctl_table *ctl, int write,
3606 					  void *buffer, size_t *lenp,
3607 					  loff_t *ppos)
3608 {
3609 	int ret = proc_unres_qlen(ctl, write, buffer, lenp, ppos);
3610 
3611 	neigh_proc_update(ctl, write);
3612 	return ret;
3613 }
3614 
3615 static int neigh_proc_base_reachable_time(struct ctl_table *ctl, int write,
3616 					  void *buffer, size_t *lenp,
3617 					  loff_t *ppos)
3618 {
3619 	struct neigh_parms *p = ctl->extra2;
3620 	int ret;
3621 
3622 	if (strcmp(ctl->procname, "base_reachable_time") == 0)
3623 		ret = neigh_proc_dointvec_jiffies(ctl, write, buffer, lenp, ppos);
3624 	else if (strcmp(ctl->procname, "base_reachable_time_ms") == 0)
3625 		ret = neigh_proc_dointvec_ms_jiffies(ctl, write, buffer, lenp, ppos);
3626 	else
3627 		ret = -1;
3628 
3629 	if (write && ret == 0) {
3630 		/* update reachable_time as well, otherwise, the change will
3631 		 * only be effective after the next time neigh_periodic_work
3632 		 * decides to recompute it
3633 		 */
3634 		p->reachable_time =
3635 			neigh_rand_reach_time(NEIGH_VAR(p, BASE_REACHABLE_TIME));
3636 	}
3637 	return ret;
3638 }
3639 
3640 #define NEIGH_PARMS_DATA_OFFSET(index)	\
3641 	(&((struct neigh_parms *) 0)->data[index])
3642 
3643 #define NEIGH_SYSCTL_ENTRY(attr, data_attr, name, mval, proc) \
3644 	[NEIGH_VAR_ ## attr] = { \
3645 		.procname	= name, \
3646 		.data		= NEIGH_PARMS_DATA_OFFSET(NEIGH_VAR_ ## data_attr), \
3647 		.maxlen		= sizeof(int), \
3648 		.mode		= mval, \
3649 		.proc_handler	= proc, \
3650 	}
3651 
3652 #define NEIGH_SYSCTL_ZERO_INTMAX_ENTRY(attr, name) \
3653 	NEIGH_SYSCTL_ENTRY(attr, attr, name, 0644, neigh_proc_dointvec_zero_intmax)
3654 
3655 #define NEIGH_SYSCTL_JIFFIES_ENTRY(attr, name) \
3656 	NEIGH_SYSCTL_ENTRY(attr, attr, name, 0644, neigh_proc_dointvec_jiffies)
3657 
3658 #define NEIGH_SYSCTL_USERHZ_JIFFIES_ENTRY(attr, name) \
3659 	NEIGH_SYSCTL_ENTRY(attr, attr, name, 0644, neigh_proc_dointvec_userhz_jiffies)
3660 
3661 #define NEIGH_SYSCTL_MS_JIFFIES_REUSED_ENTRY(attr, data_attr, name) \
3662 	NEIGH_SYSCTL_ENTRY(attr, data_attr, name, 0644, neigh_proc_dointvec_ms_jiffies)
3663 
3664 #define NEIGH_SYSCTL_UNRES_QLEN_REUSED_ENTRY(attr, data_attr, name) \
3665 	NEIGH_SYSCTL_ENTRY(attr, data_attr, name, 0644, neigh_proc_dointvec_unres_qlen)
3666 
3667 static struct neigh_sysctl_table {
3668 	struct ctl_table_header *sysctl_header;
3669 	struct ctl_table neigh_vars[NEIGH_VAR_MAX + 1];
3670 } neigh_sysctl_template __read_mostly = {
3671 	.neigh_vars = {
3672 		NEIGH_SYSCTL_ZERO_INTMAX_ENTRY(MCAST_PROBES, "mcast_solicit"),
3673 		NEIGH_SYSCTL_ZERO_INTMAX_ENTRY(UCAST_PROBES, "ucast_solicit"),
3674 		NEIGH_SYSCTL_ZERO_INTMAX_ENTRY(APP_PROBES, "app_solicit"),
3675 		NEIGH_SYSCTL_ZERO_INTMAX_ENTRY(MCAST_REPROBES, "mcast_resolicit"),
3676 		NEIGH_SYSCTL_USERHZ_JIFFIES_ENTRY(RETRANS_TIME, "retrans_time"),
3677 		NEIGH_SYSCTL_JIFFIES_ENTRY(BASE_REACHABLE_TIME, "base_reachable_time"),
3678 		NEIGH_SYSCTL_JIFFIES_ENTRY(DELAY_PROBE_TIME, "delay_first_probe_time"),
3679 		NEIGH_SYSCTL_JIFFIES_ENTRY(GC_STALETIME, "gc_stale_time"),
3680 		NEIGH_SYSCTL_ZERO_INTMAX_ENTRY(QUEUE_LEN_BYTES, "unres_qlen_bytes"),
3681 		NEIGH_SYSCTL_ZERO_INTMAX_ENTRY(PROXY_QLEN, "proxy_qlen"),
3682 		NEIGH_SYSCTL_USERHZ_JIFFIES_ENTRY(ANYCAST_DELAY, "anycast_delay"),
3683 		NEIGH_SYSCTL_USERHZ_JIFFIES_ENTRY(PROXY_DELAY, "proxy_delay"),
3684 		NEIGH_SYSCTL_USERHZ_JIFFIES_ENTRY(LOCKTIME, "locktime"),
3685 		NEIGH_SYSCTL_UNRES_QLEN_REUSED_ENTRY(QUEUE_LEN, QUEUE_LEN_BYTES, "unres_qlen"),
3686 		NEIGH_SYSCTL_MS_JIFFIES_REUSED_ENTRY(RETRANS_TIME_MS, RETRANS_TIME, "retrans_time_ms"),
3687 		NEIGH_SYSCTL_MS_JIFFIES_REUSED_ENTRY(BASE_REACHABLE_TIME_MS, BASE_REACHABLE_TIME, "base_reachable_time_ms"),
3688 		[NEIGH_VAR_GC_INTERVAL] = {
3689 			.procname	= "gc_interval",
3690 			.maxlen		= sizeof(int),
3691 			.mode		= 0644,
3692 			.proc_handler	= proc_dointvec_jiffies,
3693 		},
3694 		[NEIGH_VAR_GC_THRESH1] = {
3695 			.procname	= "gc_thresh1",
3696 			.maxlen		= sizeof(int),
3697 			.mode		= 0644,
3698 			.extra1		= SYSCTL_ZERO,
3699 			.extra2		= SYSCTL_INT_MAX,
3700 			.proc_handler	= proc_dointvec_minmax,
3701 		},
3702 		[NEIGH_VAR_GC_THRESH2] = {
3703 			.procname	= "gc_thresh2",
3704 			.maxlen		= sizeof(int),
3705 			.mode		= 0644,
3706 			.extra1		= SYSCTL_ZERO,
3707 			.extra2		= SYSCTL_INT_MAX,
3708 			.proc_handler	= proc_dointvec_minmax,
3709 		},
3710 		[NEIGH_VAR_GC_THRESH3] = {
3711 			.procname	= "gc_thresh3",
3712 			.maxlen		= sizeof(int),
3713 			.mode		= 0644,
3714 			.extra1		= SYSCTL_ZERO,
3715 			.extra2		= SYSCTL_INT_MAX,
3716 			.proc_handler	= proc_dointvec_minmax,
3717 		},
3718 		{},
3719 	},
3720 };
3721 
3722 int neigh_sysctl_register(struct net_device *dev, struct neigh_parms *p,
3723 			  proc_handler *handler)
3724 {
3725 	int i;
3726 	struct neigh_sysctl_table *t;
3727 	const char *dev_name_source;
3728 	char neigh_path[ sizeof("net//neigh/") + IFNAMSIZ + IFNAMSIZ ];
3729 	char *p_name;
3730 
3731 	t = kmemdup(&neigh_sysctl_template, sizeof(*t), GFP_KERNEL_ACCOUNT);
3732 	if (!t)
3733 		goto err;
3734 
3735 	for (i = 0; i < NEIGH_VAR_GC_INTERVAL; i++) {
3736 		t->neigh_vars[i].data += (long) p;
3737 		t->neigh_vars[i].extra1 = dev;
3738 		t->neigh_vars[i].extra2 = p;
3739 	}
3740 
3741 	if (dev) {
3742 		dev_name_source = dev->name;
3743 		/* Terminate the table early */
3744 		memset(&t->neigh_vars[NEIGH_VAR_GC_INTERVAL], 0,
3745 		       sizeof(t->neigh_vars[NEIGH_VAR_GC_INTERVAL]));
3746 	} else {
3747 		struct neigh_table *tbl = p->tbl;
3748 		dev_name_source = "default";
3749 		t->neigh_vars[NEIGH_VAR_GC_INTERVAL].data = &tbl->gc_interval;
3750 		t->neigh_vars[NEIGH_VAR_GC_THRESH1].data = &tbl->gc_thresh1;
3751 		t->neigh_vars[NEIGH_VAR_GC_THRESH2].data = &tbl->gc_thresh2;
3752 		t->neigh_vars[NEIGH_VAR_GC_THRESH3].data = &tbl->gc_thresh3;
3753 	}
3754 
3755 	if (handler) {
3756 		/* RetransTime */
3757 		t->neigh_vars[NEIGH_VAR_RETRANS_TIME].proc_handler = handler;
3758 		/* ReachableTime */
3759 		t->neigh_vars[NEIGH_VAR_BASE_REACHABLE_TIME].proc_handler = handler;
3760 		/* RetransTime (in milliseconds)*/
3761 		t->neigh_vars[NEIGH_VAR_RETRANS_TIME_MS].proc_handler = handler;
3762 		/* ReachableTime (in milliseconds) */
3763 		t->neigh_vars[NEIGH_VAR_BASE_REACHABLE_TIME_MS].proc_handler = handler;
3764 	} else {
3765 		/* Those handlers will update p->reachable_time after
3766 		 * base_reachable_time(_ms) is set to ensure the new timer starts being
3767 		 * applied after the next neighbour update instead of waiting for
3768 		 * neigh_periodic_work to update its value (can be multiple minutes)
3769 		 * So any handler that replaces them should do this as well
3770 		 */
3771 		/* ReachableTime */
3772 		t->neigh_vars[NEIGH_VAR_BASE_REACHABLE_TIME].proc_handler =
3773 			neigh_proc_base_reachable_time;
3774 		/* ReachableTime (in milliseconds) */
3775 		t->neigh_vars[NEIGH_VAR_BASE_REACHABLE_TIME_MS].proc_handler =
3776 			neigh_proc_base_reachable_time;
3777 	}
3778 
3779 	switch (neigh_parms_family(p)) {
3780 	case AF_INET:
3781 	      p_name = "ipv4";
3782 	      break;
3783 	case AF_INET6:
3784 	      p_name = "ipv6";
3785 	      break;
3786 	default:
3787 	      BUG();
3788 	}
3789 
3790 	snprintf(neigh_path, sizeof(neigh_path), "net/%s/neigh/%s",
3791 		p_name, dev_name_source);
3792 	t->sysctl_header =
3793 		register_net_sysctl(neigh_parms_net(p), neigh_path, t->neigh_vars);
3794 	if (!t->sysctl_header)
3795 		goto free;
3796 
3797 	p->sysctl_table = t;
3798 	return 0;
3799 
3800 free:
3801 	kfree(t);
3802 err:
3803 	return -ENOBUFS;
3804 }
3805 EXPORT_SYMBOL(neigh_sysctl_register);
3806 
3807 void neigh_sysctl_unregister(struct neigh_parms *p)
3808 {
3809 	if (p->sysctl_table) {
3810 		struct neigh_sysctl_table *t = p->sysctl_table;
3811 		p->sysctl_table = NULL;
3812 		unregister_net_sysctl_table(t->sysctl_header);
3813 		kfree(t);
3814 	}
3815 }
3816 EXPORT_SYMBOL(neigh_sysctl_unregister);
3817 
3818 #endif	/* CONFIG_SYSCTL */
3819 
3820 static int __init neigh_init(void)
3821 {
3822 	rtnl_register(PF_UNSPEC, RTM_NEWNEIGH, neigh_add, NULL, 0);
3823 	rtnl_register(PF_UNSPEC, RTM_DELNEIGH, neigh_delete, NULL, 0);
3824 	rtnl_register(PF_UNSPEC, RTM_GETNEIGH, neigh_get, neigh_dump_info, 0);
3825 
3826 	rtnl_register(PF_UNSPEC, RTM_GETNEIGHTBL, NULL, neightbl_dump_info,
3827 		      0);
3828 	rtnl_register(PF_UNSPEC, RTM_SETNEIGHTBL, neightbl_set, NULL, 0);
3829 
3830 	return 0;
3831 }
3832 
3833 subsys_initcall(neigh_init);
3834