net: Remove CONFIG_KMOD from net/ (towards removing CONFIG_KMOD entirely)
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / net / ipv4 / devinet.c
CommitLineData
1da177e4
LT
1/*
2 * NET3 IP device support routines.
3 *
1da177e4
LT
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
8 *
9 * Derived from the IP parts of dev.c 1.0.19
02c30a84 10 * Authors: Ross Biro
1da177e4
LT
11 * Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
12 * Mark Evans, <evansmp@uhura.aston.ac.uk>
13 *
14 * Additional Authors:
15 * Alan Cox, <gw4pts@gw4pts.ampr.org>
16 * Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
17 *
18 * Changes:
19 * Alexey Kuznetsov: pa_* fields are replaced with ifaddr
20 * lists.
21 * Cyrus Durgin: updated for kmod
22 * Matthias Andree: in devinet_ioctl, compare label and
23 * address (4.4BSD alias style support),
24 * fall back to comparing just the label
25 * if no match found.
26 */
27
1da177e4
LT
28
29#include <asm/uaccess.h>
30#include <asm/system.h>
31#include <linux/bitops.h>
4fc268d2 32#include <linux/capability.h>
1da177e4
LT
33#include <linux/module.h>
34#include <linux/types.h>
35#include <linux/kernel.h>
1da177e4
LT
36#include <linux/string.h>
37#include <linux/mm.h>
38#include <linux/socket.h>
39#include <linux/sockios.h>
40#include <linux/in.h>
41#include <linux/errno.h>
42#include <linux/interrupt.h>
1823730f 43#include <linux/if_addr.h>
1da177e4
LT
44#include <linux/if_ether.h>
45#include <linux/inet.h>
46#include <linux/netdevice.h>
47#include <linux/etherdevice.h>
48#include <linux/skbuff.h>
1da177e4
LT
49#include <linux/init.h>
50#include <linux/notifier.h>
51#include <linux/inetdevice.h>
52#include <linux/igmp.h>
53#ifdef CONFIG_SYSCTL
54#include <linux/sysctl.h>
55#endif
56#include <linux/kmod.h>
57
14c85021 58#include <net/arp.h>
1da177e4
LT
59#include <net/ip.h>
60#include <net/route.h>
61#include <net/ip_fib.h>
63f3444f 62#include <net/rtnetlink.h>
752d14dc 63#include <net/net_namespace.h>
1da177e4 64
0027ba84 65static struct ipv4_devconf ipv4_devconf = {
42f811b8
HX
66 .data = {
67 [NET_IPV4_CONF_ACCEPT_REDIRECTS - 1] = 1,
68 [NET_IPV4_CONF_SEND_REDIRECTS - 1] = 1,
69 [NET_IPV4_CONF_SECURE_REDIRECTS - 1] = 1,
70 [NET_IPV4_CONF_SHARED_MEDIA - 1] = 1,
71 },
1da177e4
LT
72};
73
74static struct ipv4_devconf ipv4_devconf_dflt = {
42f811b8
HX
75 .data = {
76 [NET_IPV4_CONF_ACCEPT_REDIRECTS - 1] = 1,
77 [NET_IPV4_CONF_SEND_REDIRECTS - 1] = 1,
78 [NET_IPV4_CONF_SECURE_REDIRECTS - 1] = 1,
79 [NET_IPV4_CONF_SHARED_MEDIA - 1] = 1,
80 [NET_IPV4_CONF_ACCEPT_SOURCE_ROUTE - 1] = 1,
81 },
1da177e4
LT
82};
83
9355bbd6
PE
84#define IPV4_DEVCONF_DFLT(net, attr) \
85 IPV4_DEVCONF((*net->ipv4.devconf_dflt), attr)
42f811b8 86
ef7c79ed 87static const struct nla_policy ifa_ipv4_policy[IFA_MAX+1] = {
5c753978
TG
88 [IFA_LOCAL] = { .type = NLA_U32 },
89 [IFA_ADDRESS] = { .type = NLA_U32 },
90 [IFA_BROADCAST] = { .type = NLA_U32 },
5176f91e 91 [IFA_LABEL] = { .type = NLA_STRING, .len = IFNAMSIZ - 1 },
5c753978
TG
92};
93
d6062cbb 94static void rtmsg_ifa(int event, struct in_ifaddr *, struct nlmsghdr *, u32);
1da177e4 95
e041c683 96static BLOCKING_NOTIFIER_HEAD(inetaddr_chain);
1da177e4
LT
97static void inet_del_ifa(struct in_device *in_dev, struct in_ifaddr **ifap,
98 int destroy);
99#ifdef CONFIG_SYSCTL
66f27a52 100static void devinet_sysctl_register(struct in_device *idev);
51602b2a
PE
101static void devinet_sysctl_unregister(struct in_device *idev);
102#else
103static inline void devinet_sysctl_register(struct in_device *idev)
104{
105}
106static inline void devinet_sysctl_unregister(struct in_device *idev)
107{
108}
1da177e4
LT
109#endif
110
111/* Locks all the inet devices. */
112
113static struct in_ifaddr *inet_alloc_ifa(void)
114{
0da974f4 115 struct in_ifaddr *ifa = kzalloc(sizeof(*ifa), GFP_KERNEL);
1da177e4
LT
116
117 if (ifa) {
1da177e4
LT
118 INIT_RCU_HEAD(&ifa->rcu_head);
119 }
120
121 return ifa;
122}
123
124static void inet_rcu_free_ifa(struct rcu_head *head)
125{
126 struct in_ifaddr *ifa = container_of(head, struct in_ifaddr, rcu_head);
127 if (ifa->ifa_dev)
128 in_dev_put(ifa->ifa_dev);
129 kfree(ifa);
130}
131
132static inline void inet_free_ifa(struct in_ifaddr *ifa)
133{
134 call_rcu(&ifa->rcu_head, inet_rcu_free_ifa);
135}
136
137void in_dev_finish_destroy(struct in_device *idev)
138{
139 struct net_device *dev = idev->dev;
140
547b792c
IJ
141 WARN_ON(idev->ifa_list);
142 WARN_ON(idev->mc_list);
1da177e4
LT
143#ifdef NET_REFCNT_DEBUG
144 printk(KERN_DEBUG "in_dev_finish_destroy: %p=%s\n",
145 idev, dev ? dev->name : "NIL");
146#endif
147 dev_put(dev);
148 if (!idev->dead)
149 printk("Freeing alive in_device %p\n", idev);
150 else {
151 kfree(idev);
152 }
153}
154
71e27da9 155static struct in_device *inetdev_init(struct net_device *dev)
1da177e4
LT
156{
157 struct in_device *in_dev;
158
159 ASSERT_RTNL();
160
0da974f4 161 in_dev = kzalloc(sizeof(*in_dev), GFP_KERNEL);
1da177e4
LT
162 if (!in_dev)
163 goto out;
1da177e4 164 INIT_RCU_HEAD(&in_dev->rcu_head);
c346dca1 165 memcpy(&in_dev->cnf, dev_net(dev)->ipv4.devconf_dflt,
9355bbd6 166 sizeof(in_dev->cnf));
1da177e4
LT
167 in_dev->cnf.sysctl = NULL;
168 in_dev->dev = dev;
169 if ((in_dev->arp_parms = neigh_parms_alloc(dev, &arp_tbl)) == NULL)
170 goto out_kfree;
0187bdfb
BH
171 if (IPV4_DEVCONF(in_dev->cnf, FORWARDING))
172 dev_disable_lro(dev);
1da177e4
LT
173 /* Reference in_dev->dev */
174 dev_hold(dev);
30c4cf57 175 /* Account for reference dev->ip_ptr (below) */
1da177e4 176 in_dev_hold(in_dev);
1da177e4 177
66f27a52 178 devinet_sysctl_register(in_dev);
1da177e4
LT
179 ip_mc_init_dev(in_dev);
180 if (dev->flags & IFF_UP)
181 ip_mc_up(in_dev);
483479ec 182
30c4cf57
DS
183 /* we can receive as soon as ip_ptr is set -- do this last */
184 rcu_assign_pointer(dev->ip_ptr, in_dev);
483479ec 185out:
1da177e4
LT
186 return in_dev;
187out_kfree:
188 kfree(in_dev);
189 in_dev = NULL;
190 goto out;
191}
192
193static void in_dev_rcu_put(struct rcu_head *head)
194{
195 struct in_device *idev = container_of(head, struct in_device, rcu_head);
196 in_dev_put(idev);
197}
198
199static void inetdev_destroy(struct in_device *in_dev)
200{
201 struct in_ifaddr *ifa;
202 struct net_device *dev;
203
204 ASSERT_RTNL();
205
206 dev = in_dev->dev;
1da177e4
LT
207
208 in_dev->dead = 1;
209
210 ip_mc_destroy_dev(in_dev);
211
212 while ((ifa = in_dev->ifa_list) != NULL) {
213 inet_del_ifa(in_dev, &in_dev->ifa_list, 0);
214 inet_free_ifa(ifa);
215 }
216
1da177e4
LT
217 dev->ip_ptr = NULL;
218
51602b2a 219 devinet_sysctl_unregister(in_dev);
1da177e4
LT
220 neigh_parms_release(&arp_tbl, in_dev->arp_parms);
221 arp_ifdown(dev);
222
223 call_rcu(&in_dev->rcu_head, in_dev_rcu_put);
224}
225
ff428d72 226int inet_addr_onlink(struct in_device *in_dev, __be32 a, __be32 b)
1da177e4
LT
227{
228 rcu_read_lock();
229 for_primary_ifa(in_dev) {
230 if (inet_ifa_match(a, ifa)) {
231 if (!b || inet_ifa_match(b, ifa)) {
232 rcu_read_unlock();
233 return 1;
234 }
235 }
236 } endfor_ifa(in_dev);
237 rcu_read_unlock();
238 return 0;
239}
240
d6062cbb
TG
241static void __inet_del_ifa(struct in_device *in_dev, struct in_ifaddr **ifap,
242 int destroy, struct nlmsghdr *nlh, u32 pid)
1da177e4 243{
8f937c60 244 struct in_ifaddr *promote = NULL;
0ff60a45
JHS
245 struct in_ifaddr *ifa, *ifa1 = *ifap;
246 struct in_ifaddr *last_prim = in_dev->ifa_list;
247 struct in_ifaddr *prev_prom = NULL;
248 int do_promote = IN_DEV_PROMOTE_SECONDARIES(in_dev);
1da177e4
LT
249
250 ASSERT_RTNL();
251
e905a9ed 252 /* 1. Deleting primary ifaddr forces deletion all secondaries
8f937c60
HW
253 * unless alias promotion is set
254 **/
1da177e4
LT
255
256 if (!(ifa1->ifa_flags & IFA_F_SECONDARY)) {
1da177e4
LT
257 struct in_ifaddr **ifap1 = &ifa1->ifa_next;
258
259 while ((ifa = *ifap1) != NULL) {
e905a9ed 260 if (!(ifa->ifa_flags & IFA_F_SECONDARY) &&
0ff60a45
JHS
261 ifa1->ifa_scope <= ifa->ifa_scope)
262 last_prim = ifa;
263
1da177e4
LT
264 if (!(ifa->ifa_flags & IFA_F_SECONDARY) ||
265 ifa1->ifa_mask != ifa->ifa_mask ||
266 !inet_ifa_match(ifa1->ifa_address, ifa)) {
267 ifap1 = &ifa->ifa_next;
0ff60a45 268 prev_prom = ifa;
1da177e4
LT
269 continue;
270 }
271
0ff60a45 272 if (!do_promote) {
8f937c60 273 *ifap1 = ifa->ifa_next;
1da177e4 274
d6062cbb 275 rtmsg_ifa(RTM_DELADDR, ifa, nlh, pid);
e041c683
AS
276 blocking_notifier_call_chain(&inetaddr_chain,
277 NETDEV_DOWN, ifa);
8f937c60
HW
278 inet_free_ifa(ifa);
279 } else {
280 promote = ifa;
281 break;
282 }
1da177e4
LT
283 }
284 }
285
286 /* 2. Unlink it */
287
288 *ifap = ifa1->ifa_next;
289
290 /* 3. Announce address deletion */
291
292 /* Send message first, then call notifier.
293 At first sight, FIB update triggered by notifier
294 will refer to already deleted ifaddr, that could confuse
295 netlink listeners. It is not true: look, gated sees
296 that route deleted and if it still thinks that ifaddr
297 is valid, it will try to restore deleted routes... Grr.
298 So that, this order is correct.
299 */
d6062cbb 300 rtmsg_ifa(RTM_DELADDR, ifa1, nlh, pid);
e041c683 301 blocking_notifier_call_chain(&inetaddr_chain, NETDEV_DOWN, ifa1);
1da177e4 302
0ff60a45
JHS
303 if (promote) {
304
305 if (prev_prom) {
306 prev_prom->ifa_next = promote->ifa_next;
307 promote->ifa_next = last_prim->ifa_next;
308 last_prim->ifa_next = promote;
309 }
8f937c60 310
8f937c60 311 promote->ifa_flags &= ~IFA_F_SECONDARY;
d6062cbb 312 rtmsg_ifa(RTM_NEWADDR, promote, nlh, pid);
e041c683
AS
313 blocking_notifier_call_chain(&inetaddr_chain,
314 NETDEV_UP, promote);
0ff60a45
JHS
315 for (ifa = promote->ifa_next; ifa; ifa = ifa->ifa_next) {
316 if (ifa1->ifa_mask != ifa->ifa_mask ||
317 !inet_ifa_match(ifa1->ifa_address, ifa))
318 continue;
319 fib_add_ifaddr(ifa);
320 }
321
322 }
6363097c 323 if (destroy)
0ff60a45 324 inet_free_ifa(ifa1);
1da177e4
LT
325}
326
d6062cbb
TG
327static void inet_del_ifa(struct in_device *in_dev, struct in_ifaddr **ifap,
328 int destroy)
329{
330 __inet_del_ifa(in_dev, ifap, destroy, NULL, 0);
331}
332
333static int __inet_insert_ifa(struct in_ifaddr *ifa, struct nlmsghdr *nlh,
334 u32 pid)
1da177e4
LT
335{
336 struct in_device *in_dev = ifa->ifa_dev;
337 struct in_ifaddr *ifa1, **ifap, **last_primary;
338
339 ASSERT_RTNL();
340
341 if (!ifa->ifa_local) {
342 inet_free_ifa(ifa);
343 return 0;
344 }
345
346 ifa->ifa_flags &= ~IFA_F_SECONDARY;
347 last_primary = &in_dev->ifa_list;
348
349 for (ifap = &in_dev->ifa_list; (ifa1 = *ifap) != NULL;
350 ifap = &ifa1->ifa_next) {
351 if (!(ifa1->ifa_flags & IFA_F_SECONDARY) &&
352 ifa->ifa_scope <= ifa1->ifa_scope)
353 last_primary = &ifa1->ifa_next;
354 if (ifa1->ifa_mask == ifa->ifa_mask &&
355 inet_ifa_match(ifa1->ifa_address, ifa)) {
356 if (ifa1->ifa_local == ifa->ifa_local) {
357 inet_free_ifa(ifa);
358 return -EEXIST;
359 }
360 if (ifa1->ifa_scope != ifa->ifa_scope) {
361 inet_free_ifa(ifa);
362 return -EINVAL;
363 }
364 ifa->ifa_flags |= IFA_F_SECONDARY;
365 }
366 }
367
368 if (!(ifa->ifa_flags & IFA_F_SECONDARY)) {
369 net_srandom(ifa->ifa_local);
370 ifap = last_primary;
371 }
372
373 ifa->ifa_next = *ifap;
374 *ifap = ifa;
375
376 /* Send message first, then call notifier.
377 Notifier will trigger FIB update, so that
378 listeners of netlink will know about new ifaddr */
d6062cbb 379 rtmsg_ifa(RTM_NEWADDR, ifa, nlh, pid);
e041c683 380 blocking_notifier_call_chain(&inetaddr_chain, NETDEV_UP, ifa);
1da177e4
LT
381
382 return 0;
383}
384
d6062cbb
TG
385static int inet_insert_ifa(struct in_ifaddr *ifa)
386{
387 return __inet_insert_ifa(ifa, NULL, 0);
388}
389
1da177e4
LT
390static int inet_set_ifa(struct net_device *dev, struct in_ifaddr *ifa)
391{
e5ed6399 392 struct in_device *in_dev = __in_dev_get_rtnl(dev);
1da177e4
LT
393
394 ASSERT_RTNL();
395
396 if (!in_dev) {
71e27da9
HX
397 inet_free_ifa(ifa);
398 return -ENOBUFS;
1da177e4 399 }
71e27da9 400 ipv4_devconf_setall(in_dev);
1da177e4 401 if (ifa->ifa_dev != in_dev) {
547b792c 402 WARN_ON(ifa->ifa_dev);
1da177e4
LT
403 in_dev_hold(in_dev);
404 ifa->ifa_dev = in_dev;
405 }
f97c1e0c 406 if (ipv4_is_loopback(ifa->ifa_local))
1da177e4
LT
407 ifa->ifa_scope = RT_SCOPE_HOST;
408 return inet_insert_ifa(ifa);
409}
410
7fee0ca2 411struct in_device *inetdev_by_index(struct net *net, int ifindex)
1da177e4
LT
412{
413 struct net_device *dev;
414 struct in_device *in_dev = NULL;
415 read_lock(&dev_base_lock);
7fee0ca2 416 dev = __dev_get_by_index(net, ifindex);
1da177e4
LT
417 if (dev)
418 in_dev = in_dev_get(dev);
419 read_unlock(&dev_base_lock);
420 return in_dev;
421}
422
423/* Called only from RTNL semaphored context. No locks. */
424
60cad5da
AV
425struct in_ifaddr *inet_ifa_byprefix(struct in_device *in_dev, __be32 prefix,
426 __be32 mask)
1da177e4
LT
427{
428 ASSERT_RTNL();
429
430 for_primary_ifa(in_dev) {
431 if (ifa->ifa_mask == mask && inet_ifa_match(prefix, ifa))
432 return ifa;
433 } endfor_ifa(in_dev);
434 return NULL;
435}
436
437static int inet_rtm_deladdr(struct sk_buff *skb, struct nlmsghdr *nlh, void *arg)
438{
3b1e0a65 439 struct net *net = sock_net(skb->sk);
dfdd5fd4 440 struct nlattr *tb[IFA_MAX+1];
1da177e4 441 struct in_device *in_dev;
dfdd5fd4 442 struct ifaddrmsg *ifm;
1da177e4 443 struct in_ifaddr *ifa, **ifap;
dfdd5fd4 444 int err = -EINVAL;
1da177e4
LT
445
446 ASSERT_RTNL();
447
dfdd5fd4
TG
448 err = nlmsg_parse(nlh, sizeof(*ifm), tb, IFA_MAX, ifa_ipv4_policy);
449 if (err < 0)
450 goto errout;
451
452 ifm = nlmsg_data(nlh);
7fee0ca2 453 in_dev = inetdev_by_index(net, ifm->ifa_index);
dfdd5fd4
TG
454 if (in_dev == NULL) {
455 err = -ENODEV;
456 goto errout;
457 }
458
1da177e4
LT
459 __in_dev_put(in_dev);
460
461 for (ifap = &in_dev->ifa_list; (ifa = *ifap) != NULL;
462 ifap = &ifa->ifa_next) {
dfdd5fd4 463 if (tb[IFA_LOCAL] &&
a7a628c4 464 ifa->ifa_local != nla_get_be32(tb[IFA_LOCAL]))
dfdd5fd4
TG
465 continue;
466
467 if (tb[IFA_LABEL] && nla_strcmp(tb[IFA_LABEL], ifa->ifa_label))
1da177e4 468 continue;
dfdd5fd4
TG
469
470 if (tb[IFA_ADDRESS] &&
471 (ifm->ifa_prefixlen != ifa->ifa_prefixlen ||
a7a628c4 472 !inet_ifa_match(nla_get_be32(tb[IFA_ADDRESS]), ifa)))
dfdd5fd4
TG
473 continue;
474
d6062cbb 475 __inet_del_ifa(in_dev, ifap, 1, nlh, NETLINK_CB(skb).pid);
1da177e4
LT
476 return 0;
477 }
dfdd5fd4
TG
478
479 err = -EADDRNOTAVAIL;
480errout:
481 return err;
1da177e4
LT
482}
483
4b8aa9ab 484static struct in_ifaddr *rtm_to_ifaddr(struct net *net, struct nlmsghdr *nlh)
1da177e4 485{
5c753978
TG
486 struct nlattr *tb[IFA_MAX+1];
487 struct in_ifaddr *ifa;
488 struct ifaddrmsg *ifm;
1da177e4
LT
489 struct net_device *dev;
490 struct in_device *in_dev;
7b218574 491 int err;
1da177e4 492
5c753978
TG
493 err = nlmsg_parse(nlh, sizeof(*ifm), tb, IFA_MAX, ifa_ipv4_policy);
494 if (err < 0)
495 goto errout;
1da177e4 496
5c753978 497 ifm = nlmsg_data(nlh);
7b218574
DL
498 err = -EINVAL;
499 if (ifm->ifa_prefixlen > 32 || tb[IFA_LOCAL] == NULL)
5c753978 500 goto errout;
1da177e4 501
4b8aa9ab 502 dev = __dev_get_by_index(net, ifm->ifa_index);
7b218574
DL
503 err = -ENODEV;
504 if (dev == NULL)
5c753978 505 goto errout;
1da177e4 506
5c753978 507 in_dev = __in_dev_get_rtnl(dev);
7b218574
DL
508 err = -ENOBUFS;
509 if (in_dev == NULL)
71e27da9 510 goto errout;
1da177e4 511
5c753978 512 ifa = inet_alloc_ifa();
7b218574 513 if (ifa == NULL)
5c753978
TG
514 /*
515 * A potential indev allocation can be left alive, it stays
516 * assigned to its device and is destroy with it.
517 */
5c753978 518 goto errout;
5c753978 519
a4e65d36 520 ipv4_devconf_setall(in_dev);
5c753978
TG
521 in_dev_hold(in_dev);
522
523 if (tb[IFA_ADDRESS] == NULL)
524 tb[IFA_ADDRESS] = tb[IFA_LOCAL];
1da177e4 525
1da177e4
LT
526 ifa->ifa_prefixlen = ifm->ifa_prefixlen;
527 ifa->ifa_mask = inet_make_mask(ifm->ifa_prefixlen);
1da177e4
LT
528 ifa->ifa_flags = ifm->ifa_flags;
529 ifa->ifa_scope = ifm->ifa_scope;
5c753978
TG
530 ifa->ifa_dev = in_dev;
531
a7a628c4
AV
532 ifa->ifa_local = nla_get_be32(tb[IFA_LOCAL]);
533 ifa->ifa_address = nla_get_be32(tb[IFA_ADDRESS]);
5c753978
TG
534
535 if (tb[IFA_BROADCAST])
a7a628c4 536 ifa->ifa_broadcast = nla_get_be32(tb[IFA_BROADCAST]);
5c753978 537
5c753978
TG
538 if (tb[IFA_LABEL])
539 nla_strlcpy(ifa->ifa_label, tb[IFA_LABEL], IFNAMSIZ);
1da177e4
LT
540 else
541 memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
542
5c753978
TG
543 return ifa;
544
545errout:
546 return ERR_PTR(err);
547}
548
549static int inet_rtm_newaddr(struct sk_buff *skb, struct nlmsghdr *nlh, void *arg)
550{
3b1e0a65 551 struct net *net = sock_net(skb->sk);
5c753978
TG
552 struct in_ifaddr *ifa;
553
554 ASSERT_RTNL();
555
4b8aa9ab 556 ifa = rtm_to_ifaddr(net, nlh);
5c753978
TG
557 if (IS_ERR(ifa))
558 return PTR_ERR(ifa);
559
d6062cbb 560 return __inet_insert_ifa(ifa, nlh, NETLINK_CB(skb).pid);
1da177e4
LT
561}
562
563/*
564 * Determine a default network mask, based on the IP address.
565 */
566
714e85be 567static __inline__ int inet_abc_len(__be32 addr)
1da177e4
LT
568{
569 int rc = -1; /* Something else, probably a multicast. */
570
f97c1e0c 571 if (ipv4_is_zeronet(addr))
e905a9ed 572 rc = 0;
1da177e4 573 else {
714e85be 574 __u32 haddr = ntohl(addr);
1da177e4 575
714e85be 576 if (IN_CLASSA(haddr))
1da177e4 577 rc = 8;
714e85be 578 else if (IN_CLASSB(haddr))
1da177e4 579 rc = 16;
714e85be 580 else if (IN_CLASSC(haddr))
1da177e4
LT
581 rc = 24;
582 }
583
e905a9ed 584 return rc;
1da177e4
LT
585}
586
587
e5b13cb1 588int devinet_ioctl(struct net *net, unsigned int cmd, void __user *arg)
1da177e4
LT
589{
590 struct ifreq ifr;
591 struct sockaddr_in sin_orig;
592 struct sockaddr_in *sin = (struct sockaddr_in *)&ifr.ifr_addr;
593 struct in_device *in_dev;
594 struct in_ifaddr **ifap = NULL;
595 struct in_ifaddr *ifa = NULL;
596 struct net_device *dev;
597 char *colon;
598 int ret = -EFAULT;
599 int tryaddrmatch = 0;
600
601 /*
602 * Fetch the caller's info block into kernel space
603 */
604
605 if (copy_from_user(&ifr, arg, sizeof(struct ifreq)))
606 goto out;
607 ifr.ifr_name[IFNAMSIZ - 1] = 0;
608
609 /* save original address for comparison */
610 memcpy(&sin_orig, sin, sizeof(*sin));
611
612 colon = strchr(ifr.ifr_name, ':');
613 if (colon)
614 *colon = 0;
615
e5b13cb1 616 dev_load(net, ifr.ifr_name);
1da177e4 617
132adf54 618 switch (cmd) {
1da177e4
LT
619 case SIOCGIFADDR: /* Get interface address */
620 case SIOCGIFBRDADDR: /* Get the broadcast address */
621 case SIOCGIFDSTADDR: /* Get the destination address */
622 case SIOCGIFNETMASK: /* Get the netmask for the interface */
623 /* Note that these ioctls will not sleep,
624 so that we do not impose a lock.
625 One day we will be forced to put shlock here (I mean SMP)
626 */
627 tryaddrmatch = (sin_orig.sin_family == AF_INET);
628 memset(sin, 0, sizeof(*sin));
629 sin->sin_family = AF_INET;
630 break;
631
632 case SIOCSIFFLAGS:
633 ret = -EACCES;
634 if (!capable(CAP_NET_ADMIN))
635 goto out;
636 break;
637 case SIOCSIFADDR: /* Set interface address (and family) */
638 case SIOCSIFBRDADDR: /* Set the broadcast address */
639 case SIOCSIFDSTADDR: /* Set the destination address */
640 case SIOCSIFNETMASK: /* Set the netmask for the interface */
641 ret = -EACCES;
642 if (!capable(CAP_NET_ADMIN))
643 goto out;
644 ret = -EINVAL;
645 if (sin->sin_family != AF_INET)
646 goto out;
647 break;
648 default:
649 ret = -EINVAL;
650 goto out;
651 }
652
653 rtnl_lock();
654
655 ret = -ENODEV;
e5b13cb1 656 if ((dev = __dev_get_by_name(net, ifr.ifr_name)) == NULL)
1da177e4
LT
657 goto done;
658
659 if (colon)
660 *colon = ':';
661
e5ed6399 662 if ((in_dev = __in_dev_get_rtnl(dev)) != NULL) {
1da177e4
LT
663 if (tryaddrmatch) {
664 /* Matthias Andree */
665 /* compare label and address (4.4BSD style) */
666 /* note: we only do this for a limited set of ioctls
667 and only if the original address family was AF_INET.
668 This is checked above. */
669 for (ifap = &in_dev->ifa_list; (ifa = *ifap) != NULL;
670 ifap = &ifa->ifa_next) {
671 if (!strcmp(ifr.ifr_name, ifa->ifa_label) &&
672 sin_orig.sin_addr.s_addr ==
673 ifa->ifa_address) {
674 break; /* found */
675 }
676 }
677 }
678 /* we didn't get a match, maybe the application is
679 4.3BSD-style and passed in junk so we fall back to
680 comparing just the label */
681 if (!ifa) {
682 for (ifap = &in_dev->ifa_list; (ifa = *ifap) != NULL;
683 ifap = &ifa->ifa_next)
684 if (!strcmp(ifr.ifr_name, ifa->ifa_label))
685 break;
686 }
687 }
688
689 ret = -EADDRNOTAVAIL;
690 if (!ifa && cmd != SIOCSIFADDR && cmd != SIOCSIFFLAGS)
691 goto done;
692
132adf54 693 switch (cmd) {
1da177e4
LT
694 case SIOCGIFADDR: /* Get interface address */
695 sin->sin_addr.s_addr = ifa->ifa_local;
696 goto rarok;
697
698 case SIOCGIFBRDADDR: /* Get the broadcast address */
699 sin->sin_addr.s_addr = ifa->ifa_broadcast;
700 goto rarok;
701
702 case SIOCGIFDSTADDR: /* Get the destination address */
703 sin->sin_addr.s_addr = ifa->ifa_address;
704 goto rarok;
705
706 case SIOCGIFNETMASK: /* Get the netmask for the interface */
707 sin->sin_addr.s_addr = ifa->ifa_mask;
708 goto rarok;
709
710 case SIOCSIFFLAGS:
711 if (colon) {
712 ret = -EADDRNOTAVAIL;
713 if (!ifa)
714 break;
715 ret = 0;
716 if (!(ifr.ifr_flags & IFF_UP))
717 inet_del_ifa(in_dev, ifap, 1);
718 break;
719 }
720 ret = dev_change_flags(dev, ifr.ifr_flags);
721 break;
722
723 case SIOCSIFADDR: /* Set interface address (and family) */
724 ret = -EINVAL;
725 if (inet_abc_len(sin->sin_addr.s_addr) < 0)
726 break;
727
728 if (!ifa) {
729 ret = -ENOBUFS;
730 if ((ifa = inet_alloc_ifa()) == NULL)
731 break;
732 if (colon)
733 memcpy(ifa->ifa_label, ifr.ifr_name, IFNAMSIZ);
734 else
735 memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
736 } else {
737 ret = 0;
738 if (ifa->ifa_local == sin->sin_addr.s_addr)
739 break;
740 inet_del_ifa(in_dev, ifap, 0);
741 ifa->ifa_broadcast = 0;
148f9729 742 ifa->ifa_scope = 0;
1da177e4
LT
743 }
744
745 ifa->ifa_address = ifa->ifa_local = sin->sin_addr.s_addr;
746
747 if (!(dev->flags & IFF_POINTOPOINT)) {
748 ifa->ifa_prefixlen = inet_abc_len(ifa->ifa_address);
749 ifa->ifa_mask = inet_make_mask(ifa->ifa_prefixlen);
750 if ((dev->flags & IFF_BROADCAST) &&
751 ifa->ifa_prefixlen < 31)
752 ifa->ifa_broadcast = ifa->ifa_address |
753 ~ifa->ifa_mask;
754 } else {
755 ifa->ifa_prefixlen = 32;
756 ifa->ifa_mask = inet_make_mask(32);
757 }
758 ret = inet_set_ifa(dev, ifa);
759 break;
760
761 case SIOCSIFBRDADDR: /* Set the broadcast address */
762 ret = 0;
763 if (ifa->ifa_broadcast != sin->sin_addr.s_addr) {
764 inet_del_ifa(in_dev, ifap, 0);
765 ifa->ifa_broadcast = sin->sin_addr.s_addr;
766 inet_insert_ifa(ifa);
767 }
768 break;
769
770 case SIOCSIFDSTADDR: /* Set the destination address */
771 ret = 0;
772 if (ifa->ifa_address == sin->sin_addr.s_addr)
773 break;
774 ret = -EINVAL;
775 if (inet_abc_len(sin->sin_addr.s_addr) < 0)
776 break;
777 ret = 0;
778 inet_del_ifa(in_dev, ifap, 0);
779 ifa->ifa_address = sin->sin_addr.s_addr;
780 inet_insert_ifa(ifa);
781 break;
782
783 case SIOCSIFNETMASK: /* Set the netmask for the interface */
784
785 /*
786 * The mask we set must be legal.
787 */
788 ret = -EINVAL;
789 if (bad_mask(sin->sin_addr.s_addr, 0))
790 break;
791 ret = 0;
792 if (ifa->ifa_mask != sin->sin_addr.s_addr) {
a144ea4b 793 __be32 old_mask = ifa->ifa_mask;
1da177e4
LT
794 inet_del_ifa(in_dev, ifap, 0);
795 ifa->ifa_mask = sin->sin_addr.s_addr;
796 ifa->ifa_prefixlen = inet_mask_len(ifa->ifa_mask);
797
798 /* See if current broadcast address matches
799 * with current netmask, then recalculate
800 * the broadcast address. Otherwise it's a
801 * funny address, so don't touch it since
802 * the user seems to know what (s)he's doing...
803 */
804 if ((dev->flags & IFF_BROADCAST) &&
805 (ifa->ifa_prefixlen < 31) &&
806 (ifa->ifa_broadcast ==
dcab5e1e 807 (ifa->ifa_local|~old_mask))) {
1da177e4
LT
808 ifa->ifa_broadcast = (ifa->ifa_local |
809 ~sin->sin_addr.s_addr);
810 }
811 inet_insert_ifa(ifa);
812 }
813 break;
814 }
815done:
816 rtnl_unlock();
817out:
818 return ret;
819rarok:
820 rtnl_unlock();
821 ret = copy_to_user(arg, &ifr, sizeof(struct ifreq)) ? -EFAULT : 0;
822 goto out;
823}
824
825static int inet_gifconf(struct net_device *dev, char __user *buf, int len)
826{
e5ed6399 827 struct in_device *in_dev = __in_dev_get_rtnl(dev);
1da177e4
LT
828 struct in_ifaddr *ifa;
829 struct ifreq ifr;
830 int done = 0;
831
832 if (!in_dev || (ifa = in_dev->ifa_list) == NULL)
833 goto out;
834
835 for (; ifa; ifa = ifa->ifa_next) {
836 if (!buf) {
837 done += sizeof(ifr);
838 continue;
839 }
840 if (len < (int) sizeof(ifr))
841 break;
842 memset(&ifr, 0, sizeof(struct ifreq));
843 if (ifa->ifa_label)
844 strcpy(ifr.ifr_name, ifa->ifa_label);
845 else
846 strcpy(ifr.ifr_name, dev->name);
847
848 (*(struct sockaddr_in *)&ifr.ifr_addr).sin_family = AF_INET;
849 (*(struct sockaddr_in *)&ifr.ifr_addr).sin_addr.s_addr =
850 ifa->ifa_local;
851
852 if (copy_to_user(buf, &ifr, sizeof(struct ifreq))) {
853 done = -EFAULT;
854 break;
855 }
856 buf += sizeof(struct ifreq);
857 len -= sizeof(struct ifreq);
858 done += sizeof(struct ifreq);
859 }
860out:
861 return done;
862}
863
a61ced5d 864__be32 inet_select_addr(const struct net_device *dev, __be32 dst, int scope)
1da177e4 865{
a61ced5d 866 __be32 addr = 0;
1da177e4 867 struct in_device *in_dev;
c346dca1 868 struct net *net = dev_net(dev);
1da177e4
LT
869
870 rcu_read_lock();
e5ed6399 871 in_dev = __in_dev_get_rcu(dev);
1da177e4
LT
872 if (!in_dev)
873 goto no_in_dev;
874
875 for_primary_ifa(in_dev) {
876 if (ifa->ifa_scope > scope)
877 continue;
878 if (!dst || inet_ifa_match(dst, ifa)) {
879 addr = ifa->ifa_local;
880 break;
881 }
882 if (!addr)
883 addr = ifa->ifa_local;
884 } endfor_ifa(in_dev);
885no_in_dev:
886 rcu_read_unlock();
887
888 if (addr)
889 goto out;
890
891 /* Not loopback addresses on loopback should be preferred
892 in this case. It is importnat that lo is the first interface
893 in dev_base list.
894 */
895 read_lock(&dev_base_lock);
896 rcu_read_lock();
c4544c72 897 for_each_netdev(net, dev) {
e5ed6399 898 if ((in_dev = __in_dev_get_rcu(dev)) == NULL)
1da177e4
LT
899 continue;
900
901 for_primary_ifa(in_dev) {
902 if (ifa->ifa_scope != RT_SCOPE_LINK &&
903 ifa->ifa_scope <= scope) {
904 addr = ifa->ifa_local;
905 goto out_unlock_both;
906 }
907 } endfor_ifa(in_dev);
908 }
909out_unlock_both:
910 read_unlock(&dev_base_lock);
911 rcu_read_unlock();
912out:
913 return addr;
914}
915
60cad5da
AV
916static __be32 confirm_addr_indev(struct in_device *in_dev, __be32 dst,
917 __be32 local, int scope)
1da177e4
LT
918{
919 int same = 0;
a144ea4b 920 __be32 addr = 0;
1da177e4
LT
921
922 for_ifa(in_dev) {
923 if (!addr &&
924 (local == ifa->ifa_local || !local) &&
925 ifa->ifa_scope <= scope) {
926 addr = ifa->ifa_local;
927 if (same)
928 break;
929 }
930 if (!same) {
931 same = (!local || inet_ifa_match(local, ifa)) &&
932 (!dst || inet_ifa_match(dst, ifa));
933 if (same && addr) {
934 if (local || !dst)
935 break;
936 /* Is the selected addr into dst subnet? */
937 if (inet_ifa_match(addr, ifa))
938 break;
939 /* No, then can we use new local src? */
940 if (ifa->ifa_scope <= scope) {
941 addr = ifa->ifa_local;
942 break;
943 }
944 /* search for large dst subnet for addr */
945 same = 0;
946 }
947 }
948 } endfor_ifa(in_dev);
949
950 return same? addr : 0;
951}
952
953/*
954 * Confirm that local IP address exists using wildcards:
9bd85e32 955 * - in_dev: only on this interface, 0=any interface
1da177e4
LT
956 * - dst: only in the same subnet as dst, 0=any dst
957 * - local: address, 0=autoselect the local address
958 * - scope: maximum allowed scope value for the local address
959 */
9bd85e32
DL
960__be32 inet_confirm_addr(struct in_device *in_dev,
961 __be32 dst, __be32 local, int scope)
1da177e4 962{
60cad5da 963 __be32 addr = 0;
9bd85e32 964 struct net_device *dev;
39a6d063 965 struct net *net;
1da177e4 966
39a6d063 967 if (scope != RT_SCOPE_LINK)
9bd85e32 968 return confirm_addr_indev(in_dev, dst, local, scope);
1da177e4 969
c346dca1 970 net = dev_net(in_dev->dev);
1da177e4
LT
971 read_lock(&dev_base_lock);
972 rcu_read_lock();
39a6d063 973 for_each_netdev(net, dev) {
e5ed6399 974 if ((in_dev = __in_dev_get_rcu(dev))) {
1da177e4
LT
975 addr = confirm_addr_indev(in_dev, dst, local, scope);
976 if (addr)
977 break;
978 }
979 }
980 rcu_read_unlock();
981 read_unlock(&dev_base_lock);
982
983 return addr;
984}
985
986/*
987 * Device notifier
988 */
989
990int register_inetaddr_notifier(struct notifier_block *nb)
991{
e041c683 992 return blocking_notifier_chain_register(&inetaddr_chain, nb);
1da177e4
LT
993}
994
995int unregister_inetaddr_notifier(struct notifier_block *nb)
996{
e041c683 997 return blocking_notifier_chain_unregister(&inetaddr_chain, nb);
1da177e4
LT
998}
999
1000/* Rename ifa_labels for a device name change. Make some effort to preserve existing
1001 * alias numbering and to create unique labels if possible.
1002*/
1003static void inetdev_changename(struct net_device *dev, struct in_device *in_dev)
e905a9ed 1004{
1da177e4
LT
1005 struct in_ifaddr *ifa;
1006 int named = 0;
1007
e905a9ed
YH
1008 for (ifa = in_dev->ifa_list; ifa; ifa = ifa->ifa_next) {
1009 char old[IFNAMSIZ], *dot;
1da177e4
LT
1010
1011 memcpy(old, ifa->ifa_label, IFNAMSIZ);
e905a9ed 1012 memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
1da177e4 1013 if (named++ == 0)
573bf470 1014 goto skip;
44344b2a 1015 dot = strchr(old, ':');
e905a9ed
YH
1016 if (dot == NULL) {
1017 sprintf(old, ":%d", named);
1da177e4
LT
1018 dot = old;
1019 }
e905a9ed
YH
1020 if (strlen(dot) + strlen(dev->name) < IFNAMSIZ) {
1021 strcat(ifa->ifa_label, dot);
1022 } else {
1023 strcpy(ifa->ifa_label + (IFNAMSIZ - strlen(dot) - 1), dot);
1024 }
573bf470
TG
1025skip:
1026 rtmsg_ifa(RTM_NEWADDR, ifa, NULL, 0);
e905a9ed
YH
1027 }
1028}
1da177e4 1029
06770843
BL
1030static inline bool inetdev_valid_mtu(unsigned mtu)
1031{
1032 return mtu >= 68;
1033}
1034
1da177e4
LT
1035/* Called only under RTNL semaphore */
1036
1037static int inetdev_event(struct notifier_block *this, unsigned long event,
1038 void *ptr)
1039{
1040 struct net_device *dev = ptr;
e5ed6399 1041 struct in_device *in_dev = __in_dev_get_rtnl(dev);
1da177e4
LT
1042
1043 ASSERT_RTNL();
1044
1045 if (!in_dev) {
8030f544 1046 if (event == NETDEV_REGISTER) {
1da177e4 1047 in_dev = inetdev_init(dev);
b217d616
HX
1048 if (!in_dev)
1049 return notifier_from_errno(-ENOMEM);
0cc217e1 1050 if (dev->flags & IFF_LOOPBACK) {
42f811b8
HX
1051 IN_DEV_CONF_SET(in_dev, NOXFRM, 1);
1052 IN_DEV_CONF_SET(in_dev, NOPOLICY, 1);
8030f544 1053 }
06770843
BL
1054 } else if (event == NETDEV_CHANGEMTU) {
1055 /* Re-enabling IP */
1056 if (inetdev_valid_mtu(dev->mtu))
1057 in_dev = inetdev_init(dev);
1da177e4
LT
1058 }
1059 goto out;
1060 }
1061
1062 switch (event) {
1063 case NETDEV_REGISTER:
1064 printk(KERN_DEBUG "inetdev_event: bug\n");
1065 dev->ip_ptr = NULL;
1066 break;
1067 case NETDEV_UP:
06770843 1068 if (!inetdev_valid_mtu(dev->mtu))
1da177e4 1069 break;
0cc217e1 1070 if (dev->flags & IFF_LOOPBACK) {
1da177e4
LT
1071 struct in_ifaddr *ifa;
1072 if ((ifa = inet_alloc_ifa()) != NULL) {
1073 ifa->ifa_local =
1074 ifa->ifa_address = htonl(INADDR_LOOPBACK);
1075 ifa->ifa_prefixlen = 8;
1076 ifa->ifa_mask = inet_make_mask(8);
1077 in_dev_hold(in_dev);
1078 ifa->ifa_dev = in_dev;
1079 ifa->ifa_scope = RT_SCOPE_HOST;
1080 memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
1081 inet_insert_ifa(ifa);
1082 }
1083 }
1084 ip_mc_up(in_dev);
1085 break;
1086 case NETDEV_DOWN:
1087 ip_mc_down(in_dev);
1088 break;
1089 case NETDEV_CHANGEMTU:
06770843 1090 if (inetdev_valid_mtu(dev->mtu))
1da177e4 1091 break;
06770843 1092 /* disable IP when MTU is not enough */
1da177e4
LT
1093 case NETDEV_UNREGISTER:
1094 inetdev_destroy(in_dev);
1095 break;
1096 case NETDEV_CHANGENAME:
1097 /* Do not notify about label change, this event is
1098 * not interesting to applications using netlink.
1099 */
1100 inetdev_changename(dev, in_dev);
1101
51602b2a 1102 devinet_sysctl_unregister(in_dev);
66f27a52 1103 devinet_sysctl_register(in_dev);
1da177e4
LT
1104 break;
1105 }
1106out:
1107 return NOTIFY_DONE;
1108}
1109
1110static struct notifier_block ip_netdev_notifier = {
1111 .notifier_call =inetdev_event,
1112};
1113
339bf98f
TG
1114static inline size_t inet_nlmsg_size(void)
1115{
1116 return NLMSG_ALIGN(sizeof(struct ifaddrmsg))
1117 + nla_total_size(4) /* IFA_ADDRESS */
1118 + nla_total_size(4) /* IFA_LOCAL */
1119 + nla_total_size(4) /* IFA_BROADCAST */
339bf98f
TG
1120 + nla_total_size(IFNAMSIZ); /* IFA_LABEL */
1121}
1122
1da177e4 1123static int inet_fill_ifaddr(struct sk_buff *skb, struct in_ifaddr *ifa,
b6544c0b 1124 u32 pid, u32 seq, int event, unsigned int flags)
1da177e4
LT
1125{
1126 struct ifaddrmsg *ifm;
1127 struct nlmsghdr *nlh;
1da177e4 1128
47f68512
TG
1129 nlh = nlmsg_put(skb, pid, seq, event, sizeof(*ifm), flags);
1130 if (nlh == NULL)
26932566 1131 return -EMSGSIZE;
47f68512
TG
1132
1133 ifm = nlmsg_data(nlh);
1da177e4
LT
1134 ifm->ifa_family = AF_INET;
1135 ifm->ifa_prefixlen = ifa->ifa_prefixlen;
1136 ifm->ifa_flags = ifa->ifa_flags|IFA_F_PERMANENT;
1137 ifm->ifa_scope = ifa->ifa_scope;
1138 ifm->ifa_index = ifa->ifa_dev->dev->ifindex;
47f68512 1139
1da177e4 1140 if (ifa->ifa_address)
a7a628c4 1141 NLA_PUT_BE32(skb, IFA_ADDRESS, ifa->ifa_address);
47f68512 1142
1da177e4 1143 if (ifa->ifa_local)
a7a628c4 1144 NLA_PUT_BE32(skb, IFA_LOCAL, ifa->ifa_local);
47f68512 1145
1da177e4 1146 if (ifa->ifa_broadcast)
a7a628c4 1147 NLA_PUT_BE32(skb, IFA_BROADCAST, ifa->ifa_broadcast);
47f68512 1148
1da177e4 1149 if (ifa->ifa_label[0])
47f68512 1150 NLA_PUT_STRING(skb, IFA_LABEL, ifa->ifa_label);
1da177e4 1151
47f68512
TG
1152 return nlmsg_end(skb, nlh);
1153
1154nla_put_failure:
26932566
PM
1155 nlmsg_cancel(skb, nlh);
1156 return -EMSGSIZE;
1da177e4
LT
1157}
1158
1159static int inet_dump_ifaddr(struct sk_buff *skb, struct netlink_callback *cb)
1160{
3b1e0a65 1161 struct net *net = sock_net(skb->sk);
1da177e4
LT
1162 int idx, ip_idx;
1163 struct net_device *dev;
1164 struct in_device *in_dev;
1165 struct in_ifaddr *ifa;
1166 int s_ip_idx, s_idx = cb->args[0];
1167
1168 s_ip_idx = ip_idx = cb->args[1];
7562f876 1169 idx = 0;
4b8aa9ab 1170 for_each_netdev(net, dev) {
1da177e4 1171 if (idx < s_idx)
7562f876 1172 goto cont;
1da177e4
LT
1173 if (idx > s_idx)
1174 s_ip_idx = 0;
6313c1e0 1175 if ((in_dev = __in_dev_get_rtnl(dev)) == NULL)
7562f876 1176 goto cont;
1da177e4
LT
1177
1178 for (ifa = in_dev->ifa_list, ip_idx = 0; ifa;
1179 ifa = ifa->ifa_next, ip_idx++) {
1180 if (ip_idx < s_ip_idx)
596e4150 1181 continue;
1da177e4
LT
1182 if (inet_fill_ifaddr(skb, ifa, NETLINK_CB(cb->skb).pid,
1183 cb->nlh->nlmsg_seq,
6313c1e0 1184 RTM_NEWADDR, NLM_F_MULTI) <= 0)
1da177e4 1185 goto done;
1da177e4 1186 }
7562f876
PE
1187cont:
1188 idx++;
1da177e4
LT
1189 }
1190
1191done:
1da177e4
LT
1192 cb->args[0] = idx;
1193 cb->args[1] = ip_idx;
1194
1195 return skb->len;
1196}
1197
d6062cbb
TG
1198static void rtmsg_ifa(int event, struct in_ifaddr* ifa, struct nlmsghdr *nlh,
1199 u32 pid)
1da177e4 1200{
47f68512 1201 struct sk_buff *skb;
d6062cbb
TG
1202 u32 seq = nlh ? nlh->nlmsg_seq : 0;
1203 int err = -ENOBUFS;
4b8aa9ab 1204 struct net *net;
1da177e4 1205
c346dca1 1206 net = dev_net(ifa->ifa_dev->dev);
339bf98f 1207 skb = nlmsg_new(inet_nlmsg_size(), GFP_KERNEL);
47f68512 1208 if (skb == NULL)
d6062cbb
TG
1209 goto errout;
1210
1211 err = inet_fill_ifaddr(skb, ifa, pid, seq, event, 0);
26932566
PM
1212 if (err < 0) {
1213 /* -EMSGSIZE implies BUG in inet_nlmsg_size() */
1214 WARN_ON(err == -EMSGSIZE);
1215 kfree_skb(skb);
1216 goto errout;
1217 }
4b8aa9ab 1218 err = rtnl_notify(skb, net, pid, RTNLGRP_IPV4_IFADDR, nlh, GFP_KERNEL);
d6062cbb
TG
1219errout:
1220 if (err < 0)
4b8aa9ab 1221 rtnl_set_sk_err(net, RTNLGRP_IPV4_IFADDR, err);
1da177e4
LT
1222}
1223
1da177e4
LT
1224#ifdef CONFIG_SYSCTL
1225
c0ce9fb3 1226static void devinet_copy_dflt_conf(struct net *net, int i)
31be3085
HX
1227{
1228 struct net_device *dev;
1229
1230 read_lock(&dev_base_lock);
c0ce9fb3 1231 for_each_netdev(net, dev) {
31be3085
HX
1232 struct in_device *in_dev;
1233 rcu_read_lock();
1234 in_dev = __in_dev_get_rcu(dev);
1235 if (in_dev && !test_bit(i, in_dev->cnf.state))
9355bbd6 1236 in_dev->cnf.data[i] = net->ipv4.devconf_dflt->data[i];
31be3085
HX
1237 rcu_read_unlock();
1238 }
1239 read_unlock(&dev_base_lock);
1240}
1241
c0ce9fb3 1242static void inet_forward_change(struct net *net)
68dd299b
PE
1243{
1244 struct net_device *dev;
586f1211 1245 int on = IPV4_DEVCONF_ALL(net, FORWARDING);
68dd299b 1246
586f1211 1247 IPV4_DEVCONF_ALL(net, ACCEPT_REDIRECTS) = !on;
9355bbd6 1248 IPV4_DEVCONF_DFLT(net, FORWARDING) = on;
68dd299b
PE
1249
1250 read_lock(&dev_base_lock);
c0ce9fb3 1251 for_each_netdev(net, dev) {
68dd299b 1252 struct in_device *in_dev;
0187bdfb
BH
1253 if (on)
1254 dev_disable_lro(dev);
68dd299b
PE
1255 rcu_read_lock();
1256 in_dev = __in_dev_get_rcu(dev);
1257 if (in_dev)
1258 IN_DEV_CONF_SET(in_dev, FORWARDING, on);
1259 rcu_read_unlock();
1260 }
1261 read_unlock(&dev_base_lock);
68dd299b
PE
1262}
1263
31be3085
HX
1264static int devinet_conf_proc(ctl_table *ctl, int write,
1265 struct file* filp, void __user *buffer,
1266 size_t *lenp, loff_t *ppos)
1267{
1268 int ret = proc_dointvec(ctl, write, filp, buffer, lenp, ppos);
1269
1270 if (write) {
1271 struct ipv4_devconf *cnf = ctl->extra1;
c0ce9fb3 1272 struct net *net = ctl->extra2;
31be3085
HX
1273 int i = (int *)ctl->data - cnf->data;
1274
1275 set_bit(i, cnf->state);
1276
9355bbd6 1277 if (cnf == net->ipv4.devconf_dflt)
c0ce9fb3 1278 devinet_copy_dflt_conf(net, i);
31be3085
HX
1279 }
1280
1281 return ret;
1282}
1283
1284static int devinet_conf_sysctl(ctl_table *table, int __user *name, int nlen,
1285 void __user *oldval, size_t __user *oldlenp,
1286 void __user *newval, size_t newlen)
1287{
1288 struct ipv4_devconf *cnf;
c0ce9fb3 1289 struct net *net;
31be3085
HX
1290 int *valp = table->data;
1291 int new;
1292 int i;
1293
1294 if (!newval || !newlen)
1295 return 0;
1296
1297 if (newlen != sizeof(int))
1298 return -EINVAL;
1299
1300 if (get_user(new, (int __user *)newval))
1301 return -EFAULT;
1302
1303 if (new == *valp)
1304 return 0;
1305
1306 if (oldval && oldlenp) {
1307 size_t len;
1308
1309 if (get_user(len, oldlenp))
1310 return -EFAULT;
1311
1312 if (len) {
1313 if (len > table->maxlen)
1314 len = table->maxlen;
1315 if (copy_to_user(oldval, valp, len))
1316 return -EFAULT;
1317 if (put_user(len, oldlenp))
1318 return -EFAULT;
1319 }
1320 }
1321
1322 *valp = new;
1323
1324 cnf = table->extra1;
c0ce9fb3 1325 net = table->extra2;
31be3085
HX
1326 i = (int *)table->data - cnf->data;
1327
1328 set_bit(i, cnf->state);
1329
9355bbd6 1330 if (cnf == net->ipv4.devconf_dflt)
c0ce9fb3 1331 devinet_copy_dflt_conf(net, i);
31be3085
HX
1332
1333 return 1;
1334}
1335
1da177e4
LT
1336static int devinet_sysctl_forward(ctl_table *ctl, int write,
1337 struct file* filp, void __user *buffer,
1338 size_t *lenp, loff_t *ppos)
1339{
1340 int *valp = ctl->data;
1341 int val = *valp;
1342 int ret = proc_dointvec(ctl, write, filp, buffer, lenp, ppos);
1343
1344 if (write && *valp != val) {
c0ce9fb3
PE
1345 struct net *net = ctl->extra2;
1346
0187bdfb
BH
1347 if (valp != &IPV4_DEVCONF_DFLT(net, FORWARDING)) {
1348 rtnl_lock();
1349 if (valp == &IPV4_DEVCONF_ALL(net, FORWARDING)) {
1350 inet_forward_change(net);
1351 } else if (*valp) {
1352 struct ipv4_devconf *cnf = ctl->extra1;
1353 struct in_device *idev =
1354 container_of(cnf, struct in_device, cnf);
1355 dev_disable_lro(idev->dev);
1356 }
1357 rtnl_unlock();
76e6ebfb 1358 rt_cache_flush(net, 0);
0187bdfb 1359 }
1da177e4
LT
1360 }
1361
1362 return ret;
1363}
1364
1365int ipv4_doint_and_flush(ctl_table *ctl, int write,
1366 struct file* filp, void __user *buffer,
1367 size_t *lenp, loff_t *ppos)
1368{
1369 int *valp = ctl->data;
1370 int val = *valp;
1371 int ret = proc_dointvec(ctl, write, filp, buffer, lenp, ppos);
76e6ebfb 1372 struct net *net = ctl->extra2;
1da177e4
LT
1373
1374 if (write && *valp != val)
76e6ebfb 1375 rt_cache_flush(net, 0);
1da177e4
LT
1376
1377 return ret;
1378}
1379
1380int ipv4_doint_and_flush_strategy(ctl_table *table, int __user *name, int nlen,
1381 void __user *oldval, size_t __user *oldlenp,
1f29bcd7 1382 void __user *newval, size_t newlen)
1da177e4 1383{
31be3085
HX
1384 int ret = devinet_conf_sysctl(table, name, nlen, oldval, oldlenp,
1385 newval, newlen);
76e6ebfb 1386 struct net *net = table->extra2;
1da177e4 1387
31be3085 1388 if (ret == 1)
76e6ebfb 1389 rt_cache_flush(net, 0);
1da177e4 1390
31be3085 1391 return ret;
1da177e4
LT
1392}
1393
1394
42f811b8
HX
1395#define DEVINET_SYSCTL_ENTRY(attr, name, mval, proc, sysctl) \
1396 { \
1397 .ctl_name = NET_IPV4_CONF_ ## attr, \
1398 .procname = name, \
1399 .data = ipv4_devconf.data + \
1400 NET_IPV4_CONF_ ## attr - 1, \
1401 .maxlen = sizeof(int), \
1402 .mode = mval, \
1403 .proc_handler = proc, \
1404 .strategy = sysctl, \
31be3085 1405 .extra1 = &ipv4_devconf, \
42f811b8
HX
1406 }
1407
1408#define DEVINET_SYSCTL_RW_ENTRY(attr, name) \
31be3085
HX
1409 DEVINET_SYSCTL_ENTRY(attr, name, 0644, devinet_conf_proc, \
1410 devinet_conf_sysctl)
42f811b8
HX
1411
1412#define DEVINET_SYSCTL_RO_ENTRY(attr, name) \
31be3085
HX
1413 DEVINET_SYSCTL_ENTRY(attr, name, 0444, devinet_conf_proc, \
1414 devinet_conf_sysctl)
42f811b8
HX
1415
1416#define DEVINET_SYSCTL_COMPLEX_ENTRY(attr, name, proc, sysctl) \
1417 DEVINET_SYSCTL_ENTRY(attr, name, 0644, proc, sysctl)
1418
1419#define DEVINET_SYSCTL_FLUSHING_ENTRY(attr, name) \
1420 DEVINET_SYSCTL_COMPLEX_ENTRY(attr, name, ipv4_doint_and_flush, \
1421 ipv4_doint_and_flush_strategy)
1422
1da177e4
LT
1423static struct devinet_sysctl_table {
1424 struct ctl_table_header *sysctl_header;
bfada697
PE
1425 struct ctl_table devinet_vars[__NET_IPV4_CONF_MAX];
1426 char *dev_name;
1da177e4
LT
1427} devinet_sysctl = {
1428 .devinet_vars = {
42f811b8 1429 DEVINET_SYSCTL_COMPLEX_ENTRY(FORWARDING, "forwarding",
31be3085
HX
1430 devinet_sysctl_forward,
1431 devinet_conf_sysctl),
42f811b8
HX
1432 DEVINET_SYSCTL_RO_ENTRY(MC_FORWARDING, "mc_forwarding"),
1433
1434 DEVINET_SYSCTL_RW_ENTRY(ACCEPT_REDIRECTS, "accept_redirects"),
1435 DEVINET_SYSCTL_RW_ENTRY(SECURE_REDIRECTS, "secure_redirects"),
1436 DEVINET_SYSCTL_RW_ENTRY(SHARED_MEDIA, "shared_media"),
1437 DEVINET_SYSCTL_RW_ENTRY(RP_FILTER, "rp_filter"),
1438 DEVINET_SYSCTL_RW_ENTRY(SEND_REDIRECTS, "send_redirects"),
1439 DEVINET_SYSCTL_RW_ENTRY(ACCEPT_SOURCE_ROUTE,
1440 "accept_source_route"),
1441 DEVINET_SYSCTL_RW_ENTRY(PROXY_ARP, "proxy_arp"),
1442 DEVINET_SYSCTL_RW_ENTRY(MEDIUM_ID, "medium_id"),
1443 DEVINET_SYSCTL_RW_ENTRY(BOOTP_RELAY, "bootp_relay"),
1444 DEVINET_SYSCTL_RW_ENTRY(LOG_MARTIANS, "log_martians"),
1445 DEVINET_SYSCTL_RW_ENTRY(TAG, "tag"),
1446 DEVINET_SYSCTL_RW_ENTRY(ARPFILTER, "arp_filter"),
1447 DEVINET_SYSCTL_RW_ENTRY(ARP_ANNOUNCE, "arp_announce"),
1448 DEVINET_SYSCTL_RW_ENTRY(ARP_IGNORE, "arp_ignore"),
1449 DEVINET_SYSCTL_RW_ENTRY(ARP_ACCEPT, "arp_accept"),
1450
1451 DEVINET_SYSCTL_FLUSHING_ENTRY(NOXFRM, "disable_xfrm"),
1452 DEVINET_SYSCTL_FLUSHING_ENTRY(NOPOLICY, "disable_policy"),
1453 DEVINET_SYSCTL_FLUSHING_ENTRY(FORCE_IGMP_VERSION,
1454 "force_igmp_version"),
1455 DEVINET_SYSCTL_FLUSHING_ENTRY(PROMOTE_SECONDARIES,
1456 "promote_secondaries"),
1da177e4 1457 },
1da177e4
LT
1458};
1459
ea40b324
PE
1460static int __devinet_sysctl_register(struct net *net, char *dev_name,
1461 int ctl_name, struct ipv4_devconf *p)
1da177e4
LT
1462{
1463 int i;
9fa89642 1464 struct devinet_sysctl_table *t;
1da177e4 1465
bfada697
PE
1466#define DEVINET_CTL_PATH_DEV 3
1467
1468 struct ctl_path devinet_ctl_path[] = {
1469 { .procname = "net", .ctl_name = CTL_NET, },
1470 { .procname = "ipv4", .ctl_name = NET_IPV4, },
1471 { .procname = "conf", .ctl_name = NET_IPV4_CONF, },
1472 { /* to be set */ },
1473 { },
1474 };
1475
9fa89642 1476 t = kmemdup(&devinet_sysctl, sizeof(*t), GFP_KERNEL);
1da177e4 1477 if (!t)
9fa89642
PE
1478 goto out;
1479
1da177e4
LT
1480 for (i = 0; i < ARRAY_SIZE(t->devinet_vars) - 1; i++) {
1481 t->devinet_vars[i].data += (char *)p - (char *)&ipv4_devconf;
31be3085 1482 t->devinet_vars[i].extra1 = p;
c0ce9fb3 1483 t->devinet_vars[i].extra2 = net;
1da177e4
LT
1484 }
1485
e905a9ed
YH
1486 /*
1487 * Make a copy of dev_name, because '.procname' is regarded as const
1da177e4
LT
1488 * by sysctl and we wouldn't want anyone to change it under our feet
1489 * (see SIOCSIFNAME).
e905a9ed 1490 */
bfada697
PE
1491 t->dev_name = kstrdup(dev_name, GFP_KERNEL);
1492 if (!t->dev_name)
9fa89642 1493 goto free;
1da177e4 1494
bfada697
PE
1495 devinet_ctl_path[DEVINET_CTL_PATH_DEV].procname = t->dev_name;
1496 devinet_ctl_path[DEVINET_CTL_PATH_DEV].ctl_name = ctl_name;
1da177e4 1497
752d14dc 1498 t->sysctl_header = register_net_sysctl_table(net, devinet_ctl_path,
bfada697 1499 t->devinet_vars);
1da177e4 1500 if (!t->sysctl_header)
9fa89642 1501 goto free_procname;
1da177e4
LT
1502
1503 p->sysctl = t;
ea40b324 1504 return 0;
1da177e4 1505
9fa89642 1506free_procname:
bfada697 1507 kfree(t->dev_name);
9fa89642 1508free:
1da177e4 1509 kfree(t);
9fa89642 1510out:
ea40b324 1511 return -ENOBUFS;
1da177e4
LT
1512}
1513
51602b2a
PE
1514static void __devinet_sysctl_unregister(struct ipv4_devconf *cnf)
1515{
1516 struct devinet_sysctl_table *t = cnf->sysctl;
1517
1518 if (t == NULL)
1519 return;
1520
1521 cnf->sysctl = NULL;
1522 unregister_sysctl_table(t->sysctl_header);
1523 kfree(t->dev_name);
1524 kfree(t);
1525}
1526
66f27a52
PE
1527static void devinet_sysctl_register(struct in_device *idev)
1528{
51602b2a
PE
1529 neigh_sysctl_register(idev->dev, idev->arp_parms, NET_IPV4,
1530 NET_IPV4_NEIGH, "ipv4", NULL, NULL);
c346dca1 1531 __devinet_sysctl_register(dev_net(idev->dev), idev->dev->name,
c0ce9fb3 1532 idev->dev->ifindex, &idev->cnf);
66f27a52
PE
1533}
1534
51602b2a 1535static void devinet_sysctl_unregister(struct in_device *idev)
1da177e4 1536{
51602b2a
PE
1537 __devinet_sysctl_unregister(&idev->cnf);
1538 neigh_sysctl_unregister(idev->arp_parms);
1da177e4 1539}
1da177e4 1540
68dd299b
PE
1541static struct ctl_table ctl_forward_entry[] = {
1542 {
1543 .ctl_name = NET_IPV4_FORWARD,
1544 .procname = "ip_forward",
1545 .data = &ipv4_devconf.data[
1546 NET_IPV4_CONF_FORWARDING - 1],
1547 .maxlen = sizeof(int),
1548 .mode = 0644,
1549 .proc_handler = devinet_sysctl_forward,
1550 .strategy = devinet_conf_sysctl,
1551 .extra1 = &ipv4_devconf,
c0ce9fb3 1552 .extra2 = &init_net,
68dd299b
PE
1553 },
1554 { },
1555};
1556
752d14dc 1557static __net_initdata struct ctl_path net_ipv4_path[] = {
68dd299b
PE
1558 { .procname = "net", .ctl_name = CTL_NET, },
1559 { .procname = "ipv4", .ctl_name = NET_IPV4, },
1560 { },
1561};
2a75de0c 1562#endif
68dd299b 1563
752d14dc
PE
1564static __net_init int devinet_init_net(struct net *net)
1565{
1566 int err;
752d14dc 1567 struct ipv4_devconf *all, *dflt;
2a75de0c
ED
1568#ifdef CONFIG_SYSCTL
1569 struct ctl_table *tbl = ctl_forward_entry;
752d14dc 1570 struct ctl_table_header *forw_hdr;
2a75de0c 1571#endif
752d14dc
PE
1572
1573 err = -ENOMEM;
1574 all = &ipv4_devconf;
1575 dflt = &ipv4_devconf_dflt;
752d14dc
PE
1576
1577 if (net != &init_net) {
1578 all = kmemdup(all, sizeof(ipv4_devconf), GFP_KERNEL);
1579 if (all == NULL)
1580 goto err_alloc_all;
1581
1582 dflt = kmemdup(dflt, sizeof(ipv4_devconf_dflt), GFP_KERNEL);
1583 if (dflt == NULL)
1584 goto err_alloc_dflt;
1585
2a75de0c 1586#ifdef CONFIG_SYSCTL
752d14dc
PE
1587 tbl = kmemdup(tbl, sizeof(ctl_forward_entry), GFP_KERNEL);
1588 if (tbl == NULL)
1589 goto err_alloc_ctl;
1590
1591 tbl[0].data = &all->data[NET_IPV4_CONF_FORWARDING - 1];
1592 tbl[0].extra1 = all;
1593 tbl[0].extra2 = net;
2a75de0c 1594#endif
752d14dc
PE
1595 }
1596
1597#ifdef CONFIG_SYSCTL
1598 err = __devinet_sysctl_register(net, "all",
1599 NET_PROTO_CONF_ALL, all);
1600 if (err < 0)
1601 goto err_reg_all;
1602
1603 err = __devinet_sysctl_register(net, "default",
1604 NET_PROTO_CONF_DEFAULT, dflt);
1605 if (err < 0)
1606 goto err_reg_dflt;
1607
1608 err = -ENOMEM;
1609 forw_hdr = register_net_sysctl_table(net, net_ipv4_path, tbl);
1610 if (forw_hdr == NULL)
1611 goto err_reg_ctl;
2a75de0c 1612 net->ipv4.forw_hdr = forw_hdr;
752d14dc
PE
1613#endif
1614
752d14dc
PE
1615 net->ipv4.devconf_all = all;
1616 net->ipv4.devconf_dflt = dflt;
1617 return 0;
1618
1619#ifdef CONFIG_SYSCTL
1620err_reg_ctl:
1621 __devinet_sysctl_unregister(dflt);
1622err_reg_dflt:
1623 __devinet_sysctl_unregister(all);
1624err_reg_all:
1625 if (tbl != ctl_forward_entry)
1626 kfree(tbl);
752d14dc 1627err_alloc_ctl:
2a75de0c 1628#endif
752d14dc
PE
1629 if (dflt != &ipv4_devconf_dflt)
1630 kfree(dflt);
1631err_alloc_dflt:
1632 if (all != &ipv4_devconf)
1633 kfree(all);
1634err_alloc_all:
1635 return err;
1636}
1637
1638static __net_exit void devinet_exit_net(struct net *net)
1639{
2a75de0c 1640#ifdef CONFIG_SYSCTL
752d14dc
PE
1641 struct ctl_table *tbl;
1642
1643 tbl = net->ipv4.forw_hdr->ctl_table_arg;
752d14dc
PE
1644 unregister_net_sysctl_table(net->ipv4.forw_hdr);
1645 __devinet_sysctl_unregister(net->ipv4.devconf_dflt);
1646 __devinet_sysctl_unregister(net->ipv4.devconf_all);
752d14dc 1647 kfree(tbl);
2a75de0c 1648#endif
752d14dc
PE
1649 kfree(net->ipv4.devconf_dflt);
1650 kfree(net->ipv4.devconf_all);
1651}
1652
1653static __net_initdata struct pernet_operations devinet_ops = {
1654 .init = devinet_init_net,
1655 .exit = devinet_exit_net,
1656};
1657
1da177e4
LT
1658void __init devinet_init(void)
1659{
752d14dc
PE
1660 register_pernet_subsys(&devinet_ops);
1661
1da177e4
LT
1662 register_gifconf(PF_INET, inet_gifconf);
1663 register_netdevice_notifier(&ip_netdev_notifier);
63f3444f
TG
1664
1665 rtnl_register(PF_INET, RTM_NEWADDR, inet_rtm_newaddr, NULL);
1666 rtnl_register(PF_INET, RTM_DELADDR, inet_rtm_deladdr, NULL);
1667 rtnl_register(PF_INET, RTM_GETADDR, NULL, inet_dump_ifaddr);
1da177e4
LT
1668}
1669
1da177e4
LT
1670EXPORT_SYMBOL(in_dev_finish_destroy);
1671EXPORT_SYMBOL(inet_select_addr);
1672EXPORT_SYMBOL(inetdev_by_index);
1673EXPORT_SYMBOL(register_inetaddr_notifier);
1674EXPORT_SYMBOL(unregister_inetaddr_notifier);