Commit | Line | Data |
---|---|---|
b2441318 | 1 | // SPDX-License-Identifier: GPL-2.0 |
2a8cc6c8 YH |
2 | /* |
3 | * IPv6 Address Label subsystem | |
4 | * for the IPv6 "Default" Source Address Selection | |
5 | * | |
6 | * Copyright (C)2007 USAGI/WIDE Project | |
7 | */ | |
8 | /* | |
9 | * Author: | |
1c8669e0 | 10 | * YOSHIFUJI Hideaki @ USAGI/WIDE Project <yoshfuji@linux-ipv6.org> |
2a8cc6c8 YH |
11 | */ |
12 | ||
13 | #include <linux/kernel.h> | |
14 | #include <linux/list.h> | |
15 | #include <linux/rcupdate.h> | |
16 | #include <linux/in6.h> | |
5a0e3ad6 | 17 | #include <linux/slab.h> |
2a8cc6c8 YH |
18 | #include <net/addrconf.h> |
19 | #include <linux/if_addrlabel.h> | |
20 | #include <linux/netlink.h> | |
21 | #include <linux/rtnetlink.h> | |
87078f26 | 22 | #include <linux/refcount.h> |
2a8cc6c8 YH |
23 | |
24 | #if 0 | |
25 | #define ADDRLABEL(x...) printk(x) | |
26 | #else | |
1c8669e0 | 27 | #define ADDRLABEL(x...) do { ; } while (0) |
2a8cc6c8 YH |
28 | #endif |
29 | ||
30 | /* | |
31 | * Policy Table | |
32 | */ | |
22b285d6 | 33 | struct ip6addrlbl_entry { |
0c5c9fb5 | 34 | possible_net_t lbl_net; |
2a8cc6c8 YH |
35 | struct in6_addr prefix; |
36 | int prefixlen; | |
37 | int ifindex; | |
38 | int addrtype; | |
39 | u32 label; | |
40 | struct hlist_node list; | |
87078f26 | 41 | refcount_t refcnt; |
2a8cc6c8 YH |
42 | struct rcu_head rcu; |
43 | }; | |
44 | ||
45 | static struct ip6addrlbl_table | |
46 | { | |
47 | struct hlist_head head; | |
48 | spinlock_t lock; | |
49 | u32 seq; | |
50 | } ip6addrlbl_table; | |
51 | ||
3de23255 BT |
52 | static inline |
53 | struct net *ip6addrlbl_net(const struct ip6addrlbl_entry *lbl) | |
54 | { | |
c2d9ba9b | 55 | return read_pnet(&lbl->lbl_net); |
3de23255 BT |
56 | } |
57 | ||
2a8cc6c8 | 58 | /* |
417962a0 | 59 | * Default policy table (RFC6724 + extensions) |
2a8cc6c8 YH |
60 | * |
61 | * prefix addr_type label | |
62 | * ------------------------------------------------------------------------- | |
63 | * ::1/128 LOOPBACK 0 | |
64 | * ::/0 N/A 1 | |
65 | * 2002::/16 N/A 2 | |
66 | * ::/96 COMPATv4 3 | |
67 | * ::ffff:0:0/96 V4MAPPED 4 | |
68 | * fc00::/7 N/A 5 ULA (RFC 4193) | |
69 | * 2001::/32 N/A 6 Teredo (RFC 4380) | |
5fe47b8a | 70 | * 2001:10::/28 N/A 7 ORCHID (RFC 4843) |
417962a0 YH |
71 | * fec0::/10 N/A 11 Site-local |
72 | * (deprecated by RFC3879) | |
73 | * 3ffe::/16 N/A 12 6bone | |
2a8cc6c8 YH |
74 | * |
75 | * Note: 0xffffffff is used if we do not have any policies. | |
417962a0 | 76 | * Note: Labels for ULA and 6to4 are different from labels listed in RFC6724. |
2a8cc6c8 YH |
77 | */ |
78 | ||
79 | #define IPV6_ADDR_LABEL_DEFAULT 0xffffffffUL | |
80 | ||
04a6f82c | 81 | static const __net_initconst struct ip6addrlbl_init_table |
2a8cc6c8 YH |
82 | { |
83 | const struct in6_addr *prefix; | |
84 | int prefixlen; | |
85 | u32 label; | |
86 | } ip6addrlbl_init_table[] = { | |
87 | { /* ::/0 */ | |
88 | .prefix = &in6addr_any, | |
89 | .label = 1, | |
1c8669e0 WY |
90 | }, { /* fc00::/7 */ |
91 | .prefix = &(struct in6_addr){ { { 0xfc } } } , | |
2a8cc6c8 YH |
92 | .prefixlen = 7, |
93 | .label = 5, | |
1c8669e0 WY |
94 | }, { /* fec0::/10 */ |
95 | .prefix = &(struct in6_addr){ { { 0xfe, 0xc0 } } }, | |
417962a0 YH |
96 | .prefixlen = 10, |
97 | .label = 11, | |
1c8669e0 WY |
98 | }, { /* 2002::/16 */ |
99 | .prefix = &(struct in6_addr){ { { 0x20, 0x02 } } }, | |
2a8cc6c8 YH |
100 | .prefixlen = 16, |
101 | .label = 2, | |
1c8669e0 WY |
102 | }, { /* 3ffe::/16 */ |
103 | .prefix = &(struct in6_addr){ { { 0x3f, 0xfe } } }, | |
417962a0 YH |
104 | .prefixlen = 16, |
105 | .label = 12, | |
1c8669e0 WY |
106 | }, { /* 2001::/32 */ |
107 | .prefix = &(struct in6_addr){ { { 0x20, 0x01 } } }, | |
2a8cc6c8 YH |
108 | .prefixlen = 32, |
109 | .label = 6, | |
1c8669e0 WY |
110 | }, { /* 2001:10::/28 */ |
111 | .prefix = &(struct in6_addr){ { { 0x20, 0x01, 0x00, 0x10 } } }, | |
5fe47b8a JMT |
112 | .prefixlen = 28, |
113 | .label = 7, | |
1c8669e0 WY |
114 | }, { /* ::ffff:0:0 */ |
115 | .prefix = &(struct in6_addr){ { { [10] = 0xff, [11] = 0xff } } }, | |
2a8cc6c8 YH |
116 | .prefixlen = 96, |
117 | .label = 4, | |
1c8669e0 | 118 | }, { /* ::/96 */ |
2a8cc6c8 YH |
119 | .prefix = &in6addr_any, |
120 | .prefixlen = 96, | |
121 | .label = 3, | |
1c8669e0 | 122 | }, { /* ::1/128 */ |
2a8cc6c8 YH |
123 | .prefix = &in6addr_loopback, |
124 | .prefixlen = 128, | |
125 | .label = 0, | |
126 | } | |
127 | }; | |
128 | ||
129 | /* Object management */ | |
130 | static inline void ip6addrlbl_free(struct ip6addrlbl_entry *p) | |
131 | { | |
132 | kfree(p); | |
133 | } | |
134 | ||
85040bcb YH |
135 | static void ip6addrlbl_free_rcu(struct rcu_head *h) |
136 | { | |
137 | ip6addrlbl_free(container_of(h, struct ip6addrlbl_entry, rcu)); | |
138 | } | |
139 | ||
a50feda5 | 140 | static bool ip6addrlbl_hold(struct ip6addrlbl_entry *p) |
2a8cc6c8 | 141 | { |
87078f26 | 142 | return refcount_inc_not_zero(&p->refcnt); |
2a8cc6c8 YH |
143 | } |
144 | ||
145 | static inline void ip6addrlbl_put(struct ip6addrlbl_entry *p) | |
146 | { | |
87078f26 | 147 | if (refcount_dec_and_test(&p->refcnt)) |
85040bcb | 148 | call_rcu(&p->rcu, ip6addrlbl_free_rcu); |
2a8cc6c8 YH |
149 | } |
150 | ||
151 | /* Find label */ | |
a50feda5 ED |
152 | static bool __ip6addrlbl_match(struct net *net, |
153 | const struct ip6addrlbl_entry *p, | |
154 | const struct in6_addr *addr, | |
155 | int addrtype, int ifindex) | |
2a8cc6c8 | 156 | { |
3de23255 | 157 | if (!net_eq(ip6addrlbl_net(p), net)) |
a50feda5 | 158 | return false; |
2a8cc6c8 | 159 | if (p->ifindex && p->ifindex != ifindex) |
a50feda5 | 160 | return false; |
2a8cc6c8 | 161 | if (p->addrtype && p->addrtype != addrtype) |
a50feda5 | 162 | return false; |
2a8cc6c8 | 163 | if (!ipv6_prefix_equal(addr, &p->prefix, p->prefixlen)) |
a50feda5 ED |
164 | return false; |
165 | return true; | |
2a8cc6c8 YH |
166 | } |
167 | ||
3de23255 BT |
168 | static struct ip6addrlbl_entry *__ipv6_addr_label(struct net *net, |
169 | const struct in6_addr *addr, | |
2a8cc6c8 YH |
170 | int type, int ifindex) |
171 | { | |
2a8cc6c8 | 172 | struct ip6addrlbl_entry *p; |
b67bfe0d | 173 | hlist_for_each_entry_rcu(p, &ip6addrlbl_table.head, list) { |
3de23255 | 174 | if (__ip6addrlbl_match(net, p, addr, type, ifindex)) |
2a8cc6c8 YH |
175 | return p; |
176 | } | |
177 | return NULL; | |
178 | } | |
179 | ||
3de23255 BT |
180 | u32 ipv6_addr_label(struct net *net, |
181 | const struct in6_addr *addr, int type, int ifindex) | |
2a8cc6c8 YH |
182 | { |
183 | u32 label; | |
184 | struct ip6addrlbl_entry *p; | |
185 | ||
186 | type &= IPV6_ADDR_MAPPED | IPV6_ADDR_COMPATv4 | IPV6_ADDR_LOOPBACK; | |
187 | ||
188 | rcu_read_lock(); | |
3de23255 | 189 | p = __ipv6_addr_label(net, addr, type, ifindex); |
2a8cc6c8 YH |
190 | label = p ? p->label : IPV6_ADDR_LABEL_DEFAULT; |
191 | rcu_read_unlock(); | |
192 | ||
5b095d98 | 193 | ADDRLABEL(KERN_DEBUG "%s(addr=%pI6, type=%d, ifindex=%d) => %08x\n", |
0c6ce78a | 194 | __func__, addr, type, ifindex, label); |
2a8cc6c8 YH |
195 | |
196 | return label; | |
197 | } | |
198 | ||
199 | /* allocate one entry */ | |
3de23255 BT |
200 | static struct ip6addrlbl_entry *ip6addrlbl_alloc(struct net *net, |
201 | const struct in6_addr *prefix, | |
40fee36e YH |
202 | int prefixlen, int ifindex, |
203 | u32 label) | |
2a8cc6c8 YH |
204 | { |
205 | struct ip6addrlbl_entry *newp; | |
206 | int addrtype; | |
207 | ||
5b095d98 | 208 | ADDRLABEL(KERN_DEBUG "%s(prefix=%pI6, prefixlen=%d, ifindex=%d, label=%u)\n", |
0c6ce78a | 209 | __func__, prefix, prefixlen, ifindex, (unsigned int)label); |
2a8cc6c8 YH |
210 | |
211 | addrtype = ipv6_addr_type(prefix) & (IPV6_ADDR_MAPPED | IPV6_ADDR_COMPATv4 | IPV6_ADDR_LOOPBACK); | |
212 | ||
213 | switch (addrtype) { | |
214 | case IPV6_ADDR_MAPPED: | |
215 | if (prefixlen > 96) | |
216 | return ERR_PTR(-EINVAL); | |
217 | if (prefixlen < 96) | |
218 | addrtype = 0; | |
219 | break; | |
220 | case IPV6_ADDR_COMPATv4: | |
221 | if (prefixlen != 96) | |
222 | addrtype = 0; | |
223 | break; | |
224 | case IPV6_ADDR_LOOPBACK: | |
225 | if (prefixlen != 128) | |
226 | addrtype = 0; | |
227 | break; | |
228 | } | |
229 | ||
230 | newp = kmalloc(sizeof(*newp), GFP_KERNEL); | |
231 | if (!newp) | |
232 | return ERR_PTR(-ENOMEM); | |
233 | ||
234 | ipv6_addr_prefix(&newp->prefix, prefix, prefixlen); | |
235 | newp->prefixlen = prefixlen; | |
236 | newp->ifindex = ifindex; | |
237 | newp->addrtype = addrtype; | |
238 | newp->label = label; | |
239 | INIT_HLIST_NODE(&newp->list); | |
0c5c9fb5 | 240 | write_pnet(&newp->lbl_net, net); |
87078f26 | 241 | refcount_set(&newp->refcnt, 1); |
2a8cc6c8 YH |
242 | return newp; |
243 | } | |
244 | ||
245 | /* add a label */ | |
40fee36e | 246 | static int __ip6addrlbl_add(struct ip6addrlbl_entry *newp, int replace) |
2a8cc6c8 | 247 | { |
639739b5 HFS |
248 | struct hlist_node *n; |
249 | struct ip6addrlbl_entry *last = NULL, *p = NULL; | |
2a8cc6c8 YH |
250 | int ret = 0; |
251 | ||
639739b5 HFS |
252 | ADDRLABEL(KERN_DEBUG "%s(newp=%p, replace=%d)\n", __func__, newp, |
253 | replace); | |
2a8cc6c8 | 254 | |
639739b5 HFS |
255 | hlist_for_each_entry_safe(p, n, &ip6addrlbl_table.head, list) { |
256 | if (p->prefixlen == newp->prefixlen && | |
257 | net_eq(ip6addrlbl_net(p), ip6addrlbl_net(newp)) && | |
258 | p->ifindex == newp->ifindex && | |
259 | ipv6_addr_equal(&p->prefix, &newp->prefix)) { | |
260 | if (!replace) { | |
261 | ret = -EEXIST; | |
2a8cc6c8 YH |
262 | goto out; |
263 | } | |
639739b5 HFS |
264 | hlist_replace_rcu(&p->list, &newp->list); |
265 | ip6addrlbl_put(p); | |
266 | goto out; | |
267 | } else if ((p->prefixlen == newp->prefixlen && !p->ifindex) || | |
268 | (p->prefixlen < newp->prefixlen)) { | |
269 | hlist_add_before_rcu(&newp->list, &p->list); | |
270 | goto out; | |
2a8cc6c8 | 271 | } |
639739b5 | 272 | last = p; |
2a8cc6c8 | 273 | } |
639739b5 | 274 | if (last) |
1d023284 | 275 | hlist_add_behind_rcu(&newp->list, &last->list); |
639739b5 HFS |
276 | else |
277 | hlist_add_head_rcu(&newp->list, &ip6addrlbl_table.head); | |
2a8cc6c8 YH |
278 | out: |
279 | if (!ret) | |
280 | ip6addrlbl_table.seq++; | |
281 | return ret; | |
282 | } | |
283 | ||
284 | /* add a label */ | |
3de23255 BT |
285 | static int ip6addrlbl_add(struct net *net, |
286 | const struct in6_addr *prefix, int prefixlen, | |
40fee36e | 287 | int ifindex, u32 label, int replace) |
2a8cc6c8 YH |
288 | { |
289 | struct ip6addrlbl_entry *newp; | |
290 | int ret = 0; | |
291 | ||
5b095d98 | 292 | ADDRLABEL(KERN_DEBUG "%s(prefix=%pI6, prefixlen=%d, ifindex=%d, label=%u, replace=%d)\n", |
0c6ce78a HH |
293 | __func__, prefix, prefixlen, ifindex, (unsigned int)label, |
294 | replace); | |
2a8cc6c8 | 295 | |
3de23255 | 296 | newp = ip6addrlbl_alloc(net, prefix, prefixlen, ifindex, label); |
2a8cc6c8 YH |
297 | if (IS_ERR(newp)) |
298 | return PTR_ERR(newp); | |
299 | spin_lock(&ip6addrlbl_table.lock); | |
300 | ret = __ip6addrlbl_add(newp, replace); | |
301 | spin_unlock(&ip6addrlbl_table.lock); | |
302 | if (ret) | |
303 | ip6addrlbl_free(newp); | |
304 | return ret; | |
305 | } | |
306 | ||
307 | /* remove a label */ | |
3de23255 BT |
308 | static int __ip6addrlbl_del(struct net *net, |
309 | const struct in6_addr *prefix, int prefixlen, | |
40fee36e | 310 | int ifindex) |
2a8cc6c8 YH |
311 | { |
312 | struct ip6addrlbl_entry *p = NULL; | |
b67bfe0d | 313 | struct hlist_node *n; |
2a8cc6c8 YH |
314 | int ret = -ESRCH; |
315 | ||
5b095d98 | 316 | ADDRLABEL(KERN_DEBUG "%s(prefix=%pI6, prefixlen=%d, ifindex=%d)\n", |
0c6ce78a | 317 | __func__, prefix, prefixlen, ifindex); |
2a8cc6c8 | 318 | |
b67bfe0d | 319 | hlist_for_each_entry_safe(p, n, &ip6addrlbl_table.head, list) { |
2a8cc6c8 | 320 | if (p->prefixlen == prefixlen && |
3de23255 | 321 | net_eq(ip6addrlbl_net(p), net) && |
2a8cc6c8 YH |
322 | p->ifindex == ifindex && |
323 | ipv6_addr_equal(&p->prefix, prefix)) { | |
324 | hlist_del_rcu(&p->list); | |
325 | ip6addrlbl_put(p); | |
2a8cc6c8 YH |
326 | ret = 0; |
327 | break; | |
328 | } | |
329 | } | |
330 | return ret; | |
331 | } | |
332 | ||
3de23255 BT |
333 | static int ip6addrlbl_del(struct net *net, |
334 | const struct in6_addr *prefix, int prefixlen, | |
40fee36e | 335 | int ifindex) |
2a8cc6c8 YH |
336 | { |
337 | struct in6_addr prefix_buf; | |
338 | int ret; | |
339 | ||
5b095d98 | 340 | ADDRLABEL(KERN_DEBUG "%s(prefix=%pI6, prefixlen=%d, ifindex=%d)\n", |
0c6ce78a | 341 | __func__, prefix, prefixlen, ifindex); |
2a8cc6c8 YH |
342 | |
343 | ipv6_addr_prefix(&prefix_buf, prefix, prefixlen); | |
344 | spin_lock(&ip6addrlbl_table.lock); | |
3de23255 | 345 | ret = __ip6addrlbl_del(net, &prefix_buf, prefixlen, ifindex); |
2a8cc6c8 YH |
346 | spin_unlock(&ip6addrlbl_table.lock); |
347 | return ret; | |
348 | } | |
349 | ||
350 | /* add default label */ | |
3de23255 | 351 | static int __net_init ip6addrlbl_net_init(struct net *net) |
2a8cc6c8 YH |
352 | { |
353 | int err = 0; | |
354 | int i; | |
355 | ||
f3213831 | 356 | ADDRLABEL(KERN_DEBUG "%s\n", __func__); |
2a8cc6c8 YH |
357 | |
358 | for (i = 0; i < ARRAY_SIZE(ip6addrlbl_init_table); i++) { | |
3de23255 BT |
359 | int ret = ip6addrlbl_add(net, |
360 | ip6addrlbl_init_table[i].prefix, | |
2a8cc6c8 YH |
361 | ip6addrlbl_init_table[i].prefixlen, |
362 | 0, | |
363 | ip6addrlbl_init_table[i].label, 0); | |
364 | /* XXX: should we free all rules when we catch an error? */ | |
365 | if (ret && (!err || err != -ENOMEM)) | |
366 | err = ret; | |
367 | } | |
368 | return err; | |
369 | } | |
370 | ||
3de23255 BT |
371 | static void __net_exit ip6addrlbl_net_exit(struct net *net) |
372 | { | |
373 | struct ip6addrlbl_entry *p = NULL; | |
b67bfe0d | 374 | struct hlist_node *n; |
3de23255 BT |
375 | |
376 | /* Remove all labels belonging to the exiting net */ | |
377 | spin_lock(&ip6addrlbl_table.lock); | |
b67bfe0d | 378 | hlist_for_each_entry_safe(p, n, &ip6addrlbl_table.head, list) { |
3de23255 BT |
379 | if (net_eq(ip6addrlbl_net(p), net)) { |
380 | hlist_del_rcu(&p->list); | |
381 | ip6addrlbl_put(p); | |
382 | } | |
383 | } | |
384 | spin_unlock(&ip6addrlbl_table.lock); | |
385 | } | |
386 | ||
387 | static struct pernet_operations ipv6_addr_label_ops = { | |
388 | .init = ip6addrlbl_net_init, | |
389 | .exit = ip6addrlbl_net_exit, | |
390 | }; | |
391 | ||
2a8cc6c8 YH |
392 | int __init ipv6_addr_label_init(void) |
393 | { | |
394 | spin_lock_init(&ip6addrlbl_table.lock); | |
395 | ||
3de23255 | 396 | return register_pernet_subsys(&ipv6_addr_label_ops); |
2a8cc6c8 YH |
397 | } |
398 | ||
2cc6d2bf NH |
399 | void ipv6_addr_label_cleanup(void) |
400 | { | |
401 | unregister_pernet_subsys(&ipv6_addr_label_ops); | |
402 | } | |
403 | ||
2a8cc6c8 YH |
404 | static const struct nla_policy ifal_policy[IFAL_MAX+1] = { |
405 | [IFAL_ADDRESS] = { .len = sizeof(struct in6_addr), }, | |
406 | [IFAL_LABEL] = { .len = sizeof(u32), }, | |
407 | }; | |
408 | ||
a6f57028 FW |
409 | static bool addrlbl_ifindex_exists(struct net *net, int ifindex) |
410 | { | |
411 | ||
412 | struct net_device *dev; | |
413 | ||
414 | rcu_read_lock(); | |
415 | dev = dev_get_by_index_rcu(net, ifindex); | |
416 | rcu_read_unlock(); | |
417 | ||
418 | return dev != NULL; | |
419 | } | |
420 | ||
c21ef3e3 DA |
421 | static int ip6addrlbl_newdel(struct sk_buff *skb, struct nlmsghdr *nlh, |
422 | struct netlink_ext_ack *extack) | |
2a8cc6c8 | 423 | { |
3b1e0a65 | 424 | struct net *net = sock_net(skb->sk); |
2a8cc6c8 YH |
425 | struct ifaddrlblmsg *ifal; |
426 | struct nlattr *tb[IFAL_MAX+1]; | |
427 | struct in6_addr *pfx; | |
428 | u32 label; | |
429 | int err = 0; | |
430 | ||
c21ef3e3 DA |
431 | err = nlmsg_parse(nlh, sizeof(*ifal), tb, IFAL_MAX, ifal_policy, |
432 | extack); | |
2a8cc6c8 YH |
433 | if (err < 0) |
434 | return err; | |
435 | ||
436 | ifal = nlmsg_data(nlh); | |
437 | ||
438 | if (ifal->ifal_family != AF_INET6 || | |
439 | ifal->ifal_prefixlen > 128) | |
440 | return -EINVAL; | |
441 | ||
2a8cc6c8 YH |
442 | if (!tb[IFAL_ADDRESS]) |
443 | return -EINVAL; | |
2a8cc6c8 | 444 | pfx = nla_data(tb[IFAL_ADDRESS]); |
2a8cc6c8 YH |
445 | |
446 | if (!tb[IFAL_LABEL]) | |
447 | return -EINVAL; | |
448 | label = nla_get_u32(tb[IFAL_LABEL]); | |
449 | if (label == IPV6_ADDR_LABEL_DEFAULT) | |
450 | return -EINVAL; | |
451 | ||
1c8669e0 | 452 | switch (nlh->nlmsg_type) { |
2a8cc6c8 | 453 | case RTM_NEWADDRLABEL: |
0771275b | 454 | if (ifal->ifal_index && |
a6f57028 | 455 | !addrlbl_ifindex_exists(net, ifal->ifal_index)) |
0771275b FW |
456 | return -EINVAL; |
457 | ||
3de23255 | 458 | err = ip6addrlbl_add(net, pfx, ifal->ifal_prefixlen, |
2a8cc6c8 YH |
459 | ifal->ifal_index, label, |
460 | nlh->nlmsg_flags & NLM_F_REPLACE); | |
461 | break; | |
462 | case RTM_DELADDRLABEL: | |
3de23255 | 463 | err = ip6addrlbl_del(net, pfx, ifal->ifal_prefixlen, |
2a8cc6c8 YH |
464 | ifal->ifal_index); |
465 | break; | |
466 | default: | |
467 | err = -EOPNOTSUPP; | |
468 | } | |
469 | return err; | |
470 | } | |
471 | ||
a50feda5 ED |
472 | static void ip6addrlbl_putmsg(struct nlmsghdr *nlh, |
473 | int prefixlen, int ifindex, u32 lseq) | |
2a8cc6c8 YH |
474 | { |
475 | struct ifaddrlblmsg *ifal = nlmsg_data(nlh); | |
476 | ifal->ifal_family = AF_INET6; | |
477 | ifal->ifal_prefixlen = prefixlen; | |
478 | ifal->ifal_flags = 0; | |
479 | ifal->ifal_index = ifindex; | |
480 | ifal->ifal_seq = lseq; | |
481 | }; | |
482 | ||
483 | static int ip6addrlbl_fill(struct sk_buff *skb, | |
484 | struct ip6addrlbl_entry *p, | |
485 | u32 lseq, | |
15e47304 | 486 | u32 portid, u32 seq, int event, |
2a8cc6c8 YH |
487 | unsigned int flags) |
488 | { | |
15e47304 | 489 | struct nlmsghdr *nlh = nlmsg_put(skb, portid, seq, event, |
2a8cc6c8 YH |
490 | sizeof(struct ifaddrlblmsg), flags); |
491 | if (!nlh) | |
492 | return -EMSGSIZE; | |
493 | ||
494 | ip6addrlbl_putmsg(nlh, p->prefixlen, p->ifindex, lseq); | |
495 | ||
930345ea | 496 | if (nla_put_in6_addr(skb, IFAL_ADDRESS, &p->prefix) < 0 || |
2a8cc6c8 YH |
497 | nla_put_u32(skb, IFAL_LABEL, p->label) < 0) { |
498 | nlmsg_cancel(skb, nlh); | |
499 | return -EMSGSIZE; | |
500 | } | |
501 | ||
053c095a JB |
502 | nlmsg_end(skb, nlh); |
503 | return 0; | |
2a8cc6c8 YH |
504 | } |
505 | ||
506 | static int ip6addrlbl_dump(struct sk_buff *skb, struct netlink_callback *cb) | |
507 | { | |
3b1e0a65 | 508 | struct net *net = sock_net(skb->sk); |
2a8cc6c8 | 509 | struct ip6addrlbl_entry *p; |
2a8cc6c8 YH |
510 | int idx = 0, s_idx = cb->args[0]; |
511 | int err; | |
512 | ||
513 | rcu_read_lock(); | |
b67bfe0d | 514 | hlist_for_each_entry_rcu(p, &ip6addrlbl_table.head, list) { |
3de23255 BT |
515 | if (idx >= s_idx && |
516 | net_eq(ip6addrlbl_net(p), net)) { | |
cb6e926e WY |
517 | err = ip6addrlbl_fill(skb, p, |
518 | ip6addrlbl_table.seq, | |
519 | NETLINK_CB(cb->skb).portid, | |
520 | cb->nlh->nlmsg_seq, | |
521 | RTM_NEWADDRLABEL, | |
522 | NLM_F_MULTI); | |
053c095a | 523 | if (err < 0) |
2a8cc6c8 YH |
524 | break; |
525 | } | |
526 | idx++; | |
527 | } | |
528 | rcu_read_unlock(); | |
529 | cb->args[0] = idx; | |
530 | return skb->len; | |
531 | } | |
532 | ||
533 | static inline int ip6addrlbl_msgsize(void) | |
534 | { | |
a02cec21 | 535 | return NLMSG_ALIGN(sizeof(struct ifaddrlblmsg)) |
2a8cc6c8 | 536 | + nla_total_size(16) /* IFAL_ADDRESS */ |
a02cec21 | 537 | + nla_total_size(4); /* IFAL_LABEL */ |
2a8cc6c8 YH |
538 | } |
539 | ||
c21ef3e3 DA |
540 | static int ip6addrlbl_get(struct sk_buff *in_skb, struct nlmsghdr *nlh, |
541 | struct netlink_ext_ack *extack) | |
2a8cc6c8 | 542 | { |
3b1e0a65 | 543 | struct net *net = sock_net(in_skb->sk); |
2a8cc6c8 YH |
544 | struct ifaddrlblmsg *ifal; |
545 | struct nlattr *tb[IFAL_MAX+1]; | |
546 | struct in6_addr *addr; | |
547 | u32 lseq; | |
548 | int err = 0; | |
549 | struct ip6addrlbl_entry *p; | |
550 | struct sk_buff *skb; | |
551 | ||
c21ef3e3 DA |
552 | err = nlmsg_parse(nlh, sizeof(*ifal), tb, IFAL_MAX, ifal_policy, |
553 | extack); | |
2a8cc6c8 YH |
554 | if (err < 0) |
555 | return err; | |
556 | ||
557 | ifal = nlmsg_data(nlh); | |
558 | ||
559 | if (ifal->ifal_family != AF_INET6 || | |
560 | ifal->ifal_prefixlen != 128) | |
561 | return -EINVAL; | |
562 | ||
563 | if (ifal->ifal_index && | |
a6f57028 | 564 | !addrlbl_ifindex_exists(net, ifal->ifal_index)) |
2a8cc6c8 YH |
565 | return -EINVAL; |
566 | ||
567 | if (!tb[IFAL_ADDRESS]) | |
568 | return -EINVAL; | |
2a8cc6c8 | 569 | addr = nla_data(tb[IFAL_ADDRESS]); |
2a8cc6c8 YH |
570 | |
571 | rcu_read_lock(); | |
3de23255 | 572 | p = __ipv6_addr_label(net, addr, ipv6_addr_type(addr), ifal->ifal_index); |
e459dfee | 573 | if (p && !ip6addrlbl_hold(p)) |
2a8cc6c8 YH |
574 | p = NULL; |
575 | lseq = ip6addrlbl_table.seq; | |
576 | rcu_read_unlock(); | |
577 | ||
578 | if (!p) { | |
579 | err = -ESRCH; | |
580 | goto out; | |
581 | } | |
582 | ||
cb6e926e WY |
583 | skb = nlmsg_new(ip6addrlbl_msgsize(), GFP_KERNEL); |
584 | if (!skb) { | |
2a8cc6c8 YH |
585 | ip6addrlbl_put(p); |
586 | return -ENOBUFS; | |
587 | } | |
588 | ||
589 | err = ip6addrlbl_fill(skb, p, lseq, | |
15e47304 | 590 | NETLINK_CB(in_skb).portid, nlh->nlmsg_seq, |
2a8cc6c8 YH |
591 | RTM_NEWADDRLABEL, 0); |
592 | ||
593 | ip6addrlbl_put(p); | |
594 | ||
595 | if (err < 0) { | |
596 | WARN_ON(err == -EMSGSIZE); | |
597 | kfree_skb(skb); | |
598 | goto out; | |
599 | } | |
600 | ||
15e47304 | 601 | err = rtnl_unicast(skb, net, NETLINK_CB(in_skb).portid); |
2a8cc6c8 YH |
602 | out: |
603 | return err; | |
604 | } | |
605 | ||
606 | void __init ipv6_addr_label_rtnl_register(void) | |
607 | { | |
c7ac8679 | 608 | __rtnl_register(PF_INET6, RTM_NEWADDRLABEL, ip6addrlbl_newdel, |
a6f57028 | 609 | NULL, RTNL_FLAG_DOIT_UNLOCKED); |
c7ac8679 | 610 | __rtnl_register(PF_INET6, RTM_DELADDRLABEL, ip6addrlbl_newdel, |
a6f57028 | 611 | NULL, RTNL_FLAG_DOIT_UNLOCKED); |
c7ac8679 | 612 | __rtnl_register(PF_INET6, RTM_GETADDRLABEL, ip6addrlbl_get, |
a6f57028 | 613 | ip6addrlbl_dump, RTNL_FLAG_DOIT_UNLOCKED); |
2a8cc6c8 YH |
614 | } |
615 |