f8b1e0494d7539fc864c373a6eefb41108aa2a88
[deliverable/linux.git] / net / ipv4 / devinet.c
1 /*
2 * NET3 IP device support routines.
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
8 *
9 * Derived from the IP parts of dev.c 1.0.19
10 * Authors: Ross Biro
11 * Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
12 * Mark Evans, <evansmp@uhura.aston.ac.uk>
13 *
14 * Additional Authors:
15 * Alan Cox, <gw4pts@gw4pts.ampr.org>
16 * Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
17 *
18 * Changes:
19 * Alexey Kuznetsov: pa_* fields are replaced with ifaddr
20 * lists.
21 * Cyrus Durgin: updated for kmod
22 * Matthias Andree: in devinet_ioctl, compare label and
23 * address (4.4BSD alias style support),
24 * fall back to comparing just the label
25 * if no match found.
26 */
27
28
29 #include <asm/uaccess.h>
30 #include <linux/bitops.h>
31 #include <linux/capability.h>
32 #include <linux/module.h>
33 #include <linux/types.h>
34 #include <linux/kernel.h>
35 #include <linux/string.h>
36 #include <linux/mm.h>
37 #include <linux/socket.h>
38 #include <linux/sockios.h>
39 #include <linux/in.h>
40 #include <linux/errno.h>
41 #include <linux/interrupt.h>
42 #include <linux/if_addr.h>
43 #include <linux/if_ether.h>
44 #include <linux/inet.h>
45 #include <linux/netdevice.h>
46 #include <linux/etherdevice.h>
47 #include <linux/skbuff.h>
48 #include <linux/init.h>
49 #include <linux/notifier.h>
50 #include <linux/inetdevice.h>
51 #include <linux/igmp.h>
52 #include <linux/slab.h>
53 #include <linux/hash.h>
54 #ifdef CONFIG_SYSCTL
55 #include <linux/sysctl.h>
56 #endif
57 #include <linux/kmod.h>
58 #include <linux/netconf.h>
59
60 #include <net/arp.h>
61 #include <net/ip.h>
62 #include <net/route.h>
63 #include <net/ip_fib.h>
64 #include <net/rtnetlink.h>
65 #include <net/net_namespace.h>
66
67 #include "fib_lookup.h"
68
69 static struct ipv4_devconf ipv4_devconf = {
70 .data = {
71 [IPV4_DEVCONF_ACCEPT_REDIRECTS - 1] = 1,
72 [IPV4_DEVCONF_SEND_REDIRECTS - 1] = 1,
73 [IPV4_DEVCONF_SECURE_REDIRECTS - 1] = 1,
74 [IPV4_DEVCONF_SHARED_MEDIA - 1] = 1,
75 },
76 };
77
78 static struct ipv4_devconf ipv4_devconf_dflt = {
79 .data = {
80 [IPV4_DEVCONF_ACCEPT_REDIRECTS - 1] = 1,
81 [IPV4_DEVCONF_SEND_REDIRECTS - 1] = 1,
82 [IPV4_DEVCONF_SECURE_REDIRECTS - 1] = 1,
83 [IPV4_DEVCONF_SHARED_MEDIA - 1] = 1,
84 [IPV4_DEVCONF_ACCEPT_SOURCE_ROUTE - 1] = 1,
85 },
86 };
87
88 #define IPV4_DEVCONF_DFLT(net, attr) \
89 IPV4_DEVCONF((*net->ipv4.devconf_dflt), attr)
90
91 static const struct nla_policy ifa_ipv4_policy[IFA_MAX+1] = {
92 [IFA_LOCAL] = { .type = NLA_U32 },
93 [IFA_ADDRESS] = { .type = NLA_U32 },
94 [IFA_BROADCAST] = { .type = NLA_U32 },
95 [IFA_LABEL] = { .type = NLA_STRING, .len = IFNAMSIZ - 1 },
96 };
97
98 #define IN4_ADDR_HSIZE_SHIFT 8
99 #define IN4_ADDR_HSIZE (1U << IN4_ADDR_HSIZE_SHIFT)
100
101 static struct hlist_head inet_addr_lst[IN4_ADDR_HSIZE];
102 static DEFINE_SPINLOCK(inet_addr_hash_lock);
103
104 static u32 inet_addr_hash(struct net *net, __be32 addr)
105 {
106 u32 val = (__force u32) addr ^ net_hash_mix(net);
107
108 return hash_32(val, IN4_ADDR_HSIZE_SHIFT);
109 }
110
111 static void inet_hash_insert(struct net *net, struct in_ifaddr *ifa)
112 {
113 u32 hash = inet_addr_hash(net, ifa->ifa_local);
114
115 spin_lock(&inet_addr_hash_lock);
116 hlist_add_head_rcu(&ifa->hash, &inet_addr_lst[hash]);
117 spin_unlock(&inet_addr_hash_lock);
118 }
119
120 static void inet_hash_remove(struct in_ifaddr *ifa)
121 {
122 spin_lock(&inet_addr_hash_lock);
123 hlist_del_init_rcu(&ifa->hash);
124 spin_unlock(&inet_addr_hash_lock);
125 }
126
127 /**
128 * __ip_dev_find - find the first device with a given source address.
129 * @net: the net namespace
130 * @addr: the source address
131 * @devref: if true, take a reference on the found device
132 *
133 * If a caller uses devref=false, it should be protected by RCU, or RTNL
134 */
135 struct net_device *__ip_dev_find(struct net *net, __be32 addr, bool devref)
136 {
137 u32 hash = inet_addr_hash(net, addr);
138 struct net_device *result = NULL;
139 struct in_ifaddr *ifa;
140 struct hlist_node *node;
141
142 rcu_read_lock();
143 hlist_for_each_entry_rcu(ifa, node, &inet_addr_lst[hash], hash) {
144 if (ifa->ifa_local == addr) {
145 struct net_device *dev = ifa->ifa_dev->dev;
146
147 if (!net_eq(dev_net(dev), net))
148 continue;
149 result = dev;
150 break;
151 }
152 }
153 if (!result) {
154 struct flowi4 fl4 = { .daddr = addr };
155 struct fib_result res = { 0 };
156 struct fib_table *local;
157
158 /* Fallback to FIB local table so that communication
159 * over loopback subnets work.
160 */
161 local = fib_get_table(net, RT_TABLE_LOCAL);
162 if (local &&
163 !fib_table_lookup(local, &fl4, &res, FIB_LOOKUP_NOREF) &&
164 res.type == RTN_LOCAL)
165 result = FIB_RES_DEV(res);
166 }
167 if (result && devref)
168 dev_hold(result);
169 rcu_read_unlock();
170 return result;
171 }
172 EXPORT_SYMBOL(__ip_dev_find);
173
174 static void rtmsg_ifa(int event, struct in_ifaddr *, struct nlmsghdr *, u32);
175
176 static BLOCKING_NOTIFIER_HEAD(inetaddr_chain);
177 static void inet_del_ifa(struct in_device *in_dev, struct in_ifaddr **ifap,
178 int destroy);
179 #ifdef CONFIG_SYSCTL
180 static void devinet_sysctl_register(struct in_device *idev);
181 static void devinet_sysctl_unregister(struct in_device *idev);
182 #else
183 static void devinet_sysctl_register(struct in_device *idev)
184 {
185 }
186 static void devinet_sysctl_unregister(struct in_device *idev)
187 {
188 }
189 #endif
190
191 /* Locks all the inet devices. */
192
193 static struct in_ifaddr *inet_alloc_ifa(void)
194 {
195 return kzalloc(sizeof(struct in_ifaddr), GFP_KERNEL);
196 }
197
198 static void inet_rcu_free_ifa(struct rcu_head *head)
199 {
200 struct in_ifaddr *ifa = container_of(head, struct in_ifaddr, rcu_head);
201 if (ifa->ifa_dev)
202 in_dev_put(ifa->ifa_dev);
203 kfree(ifa);
204 }
205
206 static void inet_free_ifa(struct in_ifaddr *ifa)
207 {
208 call_rcu(&ifa->rcu_head, inet_rcu_free_ifa);
209 }
210
211 void in_dev_finish_destroy(struct in_device *idev)
212 {
213 struct net_device *dev = idev->dev;
214
215 WARN_ON(idev->ifa_list);
216 WARN_ON(idev->mc_list);
217 #ifdef NET_REFCNT_DEBUG
218 pr_debug("%s: %p=%s\n", __func__, idev, dev ? dev->name : "NIL");
219 #endif
220 dev_put(dev);
221 if (!idev->dead)
222 pr_err("Freeing alive in_device %p\n", idev);
223 else
224 kfree(idev);
225 }
226 EXPORT_SYMBOL(in_dev_finish_destroy);
227
228 static struct in_device *inetdev_init(struct net_device *dev)
229 {
230 struct in_device *in_dev;
231
232 ASSERT_RTNL();
233
234 in_dev = kzalloc(sizeof(*in_dev), GFP_KERNEL);
235 if (!in_dev)
236 goto out;
237 memcpy(&in_dev->cnf, dev_net(dev)->ipv4.devconf_dflt,
238 sizeof(in_dev->cnf));
239 in_dev->cnf.sysctl = NULL;
240 in_dev->dev = dev;
241 in_dev->arp_parms = neigh_parms_alloc(dev, &arp_tbl);
242 if (!in_dev->arp_parms)
243 goto out_kfree;
244 if (IPV4_DEVCONF(in_dev->cnf, FORWARDING))
245 dev_disable_lro(dev);
246 /* Reference in_dev->dev */
247 dev_hold(dev);
248 /* Account for reference dev->ip_ptr (below) */
249 in_dev_hold(in_dev);
250
251 devinet_sysctl_register(in_dev);
252 ip_mc_init_dev(in_dev);
253 if (dev->flags & IFF_UP)
254 ip_mc_up(in_dev);
255
256 /* we can receive as soon as ip_ptr is set -- do this last */
257 rcu_assign_pointer(dev->ip_ptr, in_dev);
258 out:
259 return in_dev;
260 out_kfree:
261 kfree(in_dev);
262 in_dev = NULL;
263 goto out;
264 }
265
266 static void in_dev_rcu_put(struct rcu_head *head)
267 {
268 struct in_device *idev = container_of(head, struct in_device, rcu_head);
269 in_dev_put(idev);
270 }
271
272 static void inetdev_destroy(struct in_device *in_dev)
273 {
274 struct in_ifaddr *ifa;
275 struct net_device *dev;
276
277 ASSERT_RTNL();
278
279 dev = in_dev->dev;
280
281 in_dev->dead = 1;
282
283 ip_mc_destroy_dev(in_dev);
284
285 while ((ifa = in_dev->ifa_list) != NULL) {
286 inet_del_ifa(in_dev, &in_dev->ifa_list, 0);
287 inet_free_ifa(ifa);
288 }
289
290 RCU_INIT_POINTER(dev->ip_ptr, NULL);
291
292 devinet_sysctl_unregister(in_dev);
293 neigh_parms_release(&arp_tbl, in_dev->arp_parms);
294 arp_ifdown(dev);
295
296 call_rcu(&in_dev->rcu_head, in_dev_rcu_put);
297 }
298
299 int inet_addr_onlink(struct in_device *in_dev, __be32 a, __be32 b)
300 {
301 rcu_read_lock();
302 for_primary_ifa(in_dev) {
303 if (inet_ifa_match(a, ifa)) {
304 if (!b || inet_ifa_match(b, ifa)) {
305 rcu_read_unlock();
306 return 1;
307 }
308 }
309 } endfor_ifa(in_dev);
310 rcu_read_unlock();
311 return 0;
312 }
313
314 static void __inet_del_ifa(struct in_device *in_dev, struct in_ifaddr **ifap,
315 int destroy, struct nlmsghdr *nlh, u32 portid)
316 {
317 struct in_ifaddr *promote = NULL;
318 struct in_ifaddr *ifa, *ifa1 = *ifap;
319 struct in_ifaddr *last_prim = in_dev->ifa_list;
320 struct in_ifaddr *prev_prom = NULL;
321 int do_promote = IN_DEV_PROMOTE_SECONDARIES(in_dev);
322
323 ASSERT_RTNL();
324
325 /* 1. Deleting primary ifaddr forces deletion all secondaries
326 * unless alias promotion is set
327 **/
328
329 if (!(ifa1->ifa_flags & IFA_F_SECONDARY)) {
330 struct in_ifaddr **ifap1 = &ifa1->ifa_next;
331
332 while ((ifa = *ifap1) != NULL) {
333 if (!(ifa->ifa_flags & IFA_F_SECONDARY) &&
334 ifa1->ifa_scope <= ifa->ifa_scope)
335 last_prim = ifa;
336
337 if (!(ifa->ifa_flags & IFA_F_SECONDARY) ||
338 ifa1->ifa_mask != ifa->ifa_mask ||
339 !inet_ifa_match(ifa1->ifa_address, ifa)) {
340 ifap1 = &ifa->ifa_next;
341 prev_prom = ifa;
342 continue;
343 }
344
345 if (!do_promote) {
346 inet_hash_remove(ifa);
347 *ifap1 = ifa->ifa_next;
348
349 rtmsg_ifa(RTM_DELADDR, ifa, nlh, portid);
350 blocking_notifier_call_chain(&inetaddr_chain,
351 NETDEV_DOWN, ifa);
352 inet_free_ifa(ifa);
353 } else {
354 promote = ifa;
355 break;
356 }
357 }
358 }
359
360 /* On promotion all secondaries from subnet are changing
361 * the primary IP, we must remove all their routes silently
362 * and later to add them back with new prefsrc. Do this
363 * while all addresses are on the device list.
364 */
365 for (ifa = promote; ifa; ifa = ifa->ifa_next) {
366 if (ifa1->ifa_mask == ifa->ifa_mask &&
367 inet_ifa_match(ifa1->ifa_address, ifa))
368 fib_del_ifaddr(ifa, ifa1);
369 }
370
371 /* 2. Unlink it */
372
373 *ifap = ifa1->ifa_next;
374 inet_hash_remove(ifa1);
375
376 /* 3. Announce address deletion */
377
378 /* Send message first, then call notifier.
379 At first sight, FIB update triggered by notifier
380 will refer to already deleted ifaddr, that could confuse
381 netlink listeners. It is not true: look, gated sees
382 that route deleted and if it still thinks that ifaddr
383 is valid, it will try to restore deleted routes... Grr.
384 So that, this order is correct.
385 */
386 rtmsg_ifa(RTM_DELADDR, ifa1, nlh, portid);
387 blocking_notifier_call_chain(&inetaddr_chain, NETDEV_DOWN, ifa1);
388
389 if (promote) {
390 struct in_ifaddr *next_sec = promote->ifa_next;
391
392 if (prev_prom) {
393 prev_prom->ifa_next = promote->ifa_next;
394 promote->ifa_next = last_prim->ifa_next;
395 last_prim->ifa_next = promote;
396 }
397
398 promote->ifa_flags &= ~IFA_F_SECONDARY;
399 rtmsg_ifa(RTM_NEWADDR, promote, nlh, portid);
400 blocking_notifier_call_chain(&inetaddr_chain,
401 NETDEV_UP, promote);
402 for (ifa = next_sec; ifa; ifa = ifa->ifa_next) {
403 if (ifa1->ifa_mask != ifa->ifa_mask ||
404 !inet_ifa_match(ifa1->ifa_address, ifa))
405 continue;
406 fib_add_ifaddr(ifa);
407 }
408
409 }
410 if (destroy)
411 inet_free_ifa(ifa1);
412 }
413
414 static void inet_del_ifa(struct in_device *in_dev, struct in_ifaddr **ifap,
415 int destroy)
416 {
417 __inet_del_ifa(in_dev, ifap, destroy, NULL, 0);
418 }
419
420 static int __inet_insert_ifa(struct in_ifaddr *ifa, struct nlmsghdr *nlh,
421 u32 portid)
422 {
423 struct in_device *in_dev = ifa->ifa_dev;
424 struct in_ifaddr *ifa1, **ifap, **last_primary;
425
426 ASSERT_RTNL();
427
428 if (!ifa->ifa_local) {
429 inet_free_ifa(ifa);
430 return 0;
431 }
432
433 ifa->ifa_flags &= ~IFA_F_SECONDARY;
434 last_primary = &in_dev->ifa_list;
435
436 for (ifap = &in_dev->ifa_list; (ifa1 = *ifap) != NULL;
437 ifap = &ifa1->ifa_next) {
438 if (!(ifa1->ifa_flags & IFA_F_SECONDARY) &&
439 ifa->ifa_scope <= ifa1->ifa_scope)
440 last_primary = &ifa1->ifa_next;
441 if (ifa1->ifa_mask == ifa->ifa_mask &&
442 inet_ifa_match(ifa1->ifa_address, ifa)) {
443 if (ifa1->ifa_local == ifa->ifa_local) {
444 inet_free_ifa(ifa);
445 return -EEXIST;
446 }
447 if (ifa1->ifa_scope != ifa->ifa_scope) {
448 inet_free_ifa(ifa);
449 return -EINVAL;
450 }
451 ifa->ifa_flags |= IFA_F_SECONDARY;
452 }
453 }
454
455 if (!(ifa->ifa_flags & IFA_F_SECONDARY)) {
456 net_srandom(ifa->ifa_local);
457 ifap = last_primary;
458 }
459
460 ifa->ifa_next = *ifap;
461 *ifap = ifa;
462
463 inet_hash_insert(dev_net(in_dev->dev), ifa);
464
465 /* Send message first, then call notifier.
466 Notifier will trigger FIB update, so that
467 listeners of netlink will know about new ifaddr */
468 rtmsg_ifa(RTM_NEWADDR, ifa, nlh, portid);
469 blocking_notifier_call_chain(&inetaddr_chain, NETDEV_UP, ifa);
470
471 return 0;
472 }
473
474 static int inet_insert_ifa(struct in_ifaddr *ifa)
475 {
476 return __inet_insert_ifa(ifa, NULL, 0);
477 }
478
479 static int inet_set_ifa(struct net_device *dev, struct in_ifaddr *ifa)
480 {
481 struct in_device *in_dev = __in_dev_get_rtnl(dev);
482
483 ASSERT_RTNL();
484
485 if (!in_dev) {
486 inet_free_ifa(ifa);
487 return -ENOBUFS;
488 }
489 ipv4_devconf_setall(in_dev);
490 if (ifa->ifa_dev != in_dev) {
491 WARN_ON(ifa->ifa_dev);
492 in_dev_hold(in_dev);
493 ifa->ifa_dev = in_dev;
494 }
495 if (ipv4_is_loopback(ifa->ifa_local))
496 ifa->ifa_scope = RT_SCOPE_HOST;
497 return inet_insert_ifa(ifa);
498 }
499
500 /* Caller must hold RCU or RTNL :
501 * We dont take a reference on found in_device
502 */
503 struct in_device *inetdev_by_index(struct net *net, int ifindex)
504 {
505 struct net_device *dev;
506 struct in_device *in_dev = NULL;
507
508 rcu_read_lock();
509 dev = dev_get_by_index_rcu(net, ifindex);
510 if (dev)
511 in_dev = rcu_dereference_rtnl(dev->ip_ptr);
512 rcu_read_unlock();
513 return in_dev;
514 }
515 EXPORT_SYMBOL(inetdev_by_index);
516
517 /* Called only from RTNL semaphored context. No locks. */
518
519 struct in_ifaddr *inet_ifa_byprefix(struct in_device *in_dev, __be32 prefix,
520 __be32 mask)
521 {
522 ASSERT_RTNL();
523
524 for_primary_ifa(in_dev) {
525 if (ifa->ifa_mask == mask && inet_ifa_match(prefix, ifa))
526 return ifa;
527 } endfor_ifa(in_dev);
528 return NULL;
529 }
530
531 static int inet_rtm_deladdr(struct sk_buff *skb, struct nlmsghdr *nlh, void *arg)
532 {
533 struct net *net = sock_net(skb->sk);
534 struct nlattr *tb[IFA_MAX+1];
535 struct in_device *in_dev;
536 struct ifaddrmsg *ifm;
537 struct in_ifaddr *ifa, **ifap;
538 int err = -EINVAL;
539
540 ASSERT_RTNL();
541
542 err = nlmsg_parse(nlh, sizeof(*ifm), tb, IFA_MAX, ifa_ipv4_policy);
543 if (err < 0)
544 goto errout;
545
546 ifm = nlmsg_data(nlh);
547 in_dev = inetdev_by_index(net, ifm->ifa_index);
548 if (in_dev == NULL) {
549 err = -ENODEV;
550 goto errout;
551 }
552
553 for (ifap = &in_dev->ifa_list; (ifa = *ifap) != NULL;
554 ifap = &ifa->ifa_next) {
555 if (tb[IFA_LOCAL] &&
556 ifa->ifa_local != nla_get_be32(tb[IFA_LOCAL]))
557 continue;
558
559 if (tb[IFA_LABEL] && nla_strcmp(tb[IFA_LABEL], ifa->ifa_label))
560 continue;
561
562 if (tb[IFA_ADDRESS] &&
563 (ifm->ifa_prefixlen != ifa->ifa_prefixlen ||
564 !inet_ifa_match(nla_get_be32(tb[IFA_ADDRESS]), ifa)))
565 continue;
566
567 __inet_del_ifa(in_dev, ifap, 1, nlh, NETLINK_CB(skb).portid);
568 return 0;
569 }
570
571 err = -EADDRNOTAVAIL;
572 errout:
573 return err;
574 }
575
576 static struct in_ifaddr *rtm_to_ifaddr(struct net *net, struct nlmsghdr *nlh)
577 {
578 struct nlattr *tb[IFA_MAX+1];
579 struct in_ifaddr *ifa;
580 struct ifaddrmsg *ifm;
581 struct net_device *dev;
582 struct in_device *in_dev;
583 int err;
584
585 err = nlmsg_parse(nlh, sizeof(*ifm), tb, IFA_MAX, ifa_ipv4_policy);
586 if (err < 0)
587 goto errout;
588
589 ifm = nlmsg_data(nlh);
590 err = -EINVAL;
591 if (ifm->ifa_prefixlen > 32 || tb[IFA_LOCAL] == NULL)
592 goto errout;
593
594 dev = __dev_get_by_index(net, ifm->ifa_index);
595 err = -ENODEV;
596 if (dev == NULL)
597 goto errout;
598
599 in_dev = __in_dev_get_rtnl(dev);
600 err = -ENOBUFS;
601 if (in_dev == NULL)
602 goto errout;
603
604 ifa = inet_alloc_ifa();
605 if (ifa == NULL)
606 /*
607 * A potential indev allocation can be left alive, it stays
608 * assigned to its device and is destroy with it.
609 */
610 goto errout;
611
612 ipv4_devconf_setall(in_dev);
613 in_dev_hold(in_dev);
614
615 if (tb[IFA_ADDRESS] == NULL)
616 tb[IFA_ADDRESS] = tb[IFA_LOCAL];
617
618 INIT_HLIST_NODE(&ifa->hash);
619 ifa->ifa_prefixlen = ifm->ifa_prefixlen;
620 ifa->ifa_mask = inet_make_mask(ifm->ifa_prefixlen);
621 ifa->ifa_flags = ifm->ifa_flags;
622 ifa->ifa_scope = ifm->ifa_scope;
623 ifa->ifa_dev = in_dev;
624
625 ifa->ifa_local = nla_get_be32(tb[IFA_LOCAL]);
626 ifa->ifa_address = nla_get_be32(tb[IFA_ADDRESS]);
627
628 if (tb[IFA_BROADCAST])
629 ifa->ifa_broadcast = nla_get_be32(tb[IFA_BROADCAST]);
630
631 if (tb[IFA_LABEL])
632 nla_strlcpy(ifa->ifa_label, tb[IFA_LABEL], IFNAMSIZ);
633 else
634 memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
635
636 return ifa;
637
638 errout:
639 return ERR_PTR(err);
640 }
641
642 static int inet_rtm_newaddr(struct sk_buff *skb, struct nlmsghdr *nlh, void *arg)
643 {
644 struct net *net = sock_net(skb->sk);
645 struct in_ifaddr *ifa;
646
647 ASSERT_RTNL();
648
649 ifa = rtm_to_ifaddr(net, nlh);
650 if (IS_ERR(ifa))
651 return PTR_ERR(ifa);
652
653 return __inet_insert_ifa(ifa, nlh, NETLINK_CB(skb).portid);
654 }
655
656 /*
657 * Determine a default network mask, based on the IP address.
658 */
659
660 static int inet_abc_len(__be32 addr)
661 {
662 int rc = -1; /* Something else, probably a multicast. */
663
664 if (ipv4_is_zeronet(addr))
665 rc = 0;
666 else {
667 __u32 haddr = ntohl(addr);
668
669 if (IN_CLASSA(haddr))
670 rc = 8;
671 else if (IN_CLASSB(haddr))
672 rc = 16;
673 else if (IN_CLASSC(haddr))
674 rc = 24;
675 }
676
677 return rc;
678 }
679
680
681 int devinet_ioctl(struct net *net, unsigned int cmd, void __user *arg)
682 {
683 struct ifreq ifr;
684 struct sockaddr_in sin_orig;
685 struct sockaddr_in *sin = (struct sockaddr_in *)&ifr.ifr_addr;
686 struct in_device *in_dev;
687 struct in_ifaddr **ifap = NULL;
688 struct in_ifaddr *ifa = NULL;
689 struct net_device *dev;
690 char *colon;
691 int ret = -EFAULT;
692 int tryaddrmatch = 0;
693
694 /*
695 * Fetch the caller's info block into kernel space
696 */
697
698 if (copy_from_user(&ifr, arg, sizeof(struct ifreq)))
699 goto out;
700 ifr.ifr_name[IFNAMSIZ - 1] = 0;
701
702 /* save original address for comparison */
703 memcpy(&sin_orig, sin, sizeof(*sin));
704
705 colon = strchr(ifr.ifr_name, ':');
706 if (colon)
707 *colon = 0;
708
709 dev_load(net, ifr.ifr_name);
710
711 switch (cmd) {
712 case SIOCGIFADDR: /* Get interface address */
713 case SIOCGIFBRDADDR: /* Get the broadcast address */
714 case SIOCGIFDSTADDR: /* Get the destination address */
715 case SIOCGIFNETMASK: /* Get the netmask for the interface */
716 /* Note that these ioctls will not sleep,
717 so that we do not impose a lock.
718 One day we will be forced to put shlock here (I mean SMP)
719 */
720 tryaddrmatch = (sin_orig.sin_family == AF_INET);
721 memset(sin, 0, sizeof(*sin));
722 sin->sin_family = AF_INET;
723 break;
724
725 case SIOCSIFFLAGS:
726 ret = -EPERM;
727 if (!capable(CAP_NET_ADMIN))
728 goto out;
729 break;
730 case SIOCSIFADDR: /* Set interface address (and family) */
731 case SIOCSIFBRDADDR: /* Set the broadcast address */
732 case SIOCSIFDSTADDR: /* Set the destination address */
733 case SIOCSIFNETMASK: /* Set the netmask for the interface */
734 ret = -EPERM;
735 if (!capable(CAP_NET_ADMIN))
736 goto out;
737 ret = -EINVAL;
738 if (sin->sin_family != AF_INET)
739 goto out;
740 break;
741 default:
742 ret = -EINVAL;
743 goto out;
744 }
745
746 rtnl_lock();
747
748 ret = -ENODEV;
749 dev = __dev_get_by_name(net, ifr.ifr_name);
750 if (!dev)
751 goto done;
752
753 if (colon)
754 *colon = ':';
755
756 in_dev = __in_dev_get_rtnl(dev);
757 if (in_dev) {
758 if (tryaddrmatch) {
759 /* Matthias Andree */
760 /* compare label and address (4.4BSD style) */
761 /* note: we only do this for a limited set of ioctls
762 and only if the original address family was AF_INET.
763 This is checked above. */
764 for (ifap = &in_dev->ifa_list; (ifa = *ifap) != NULL;
765 ifap = &ifa->ifa_next) {
766 if (!strcmp(ifr.ifr_name, ifa->ifa_label) &&
767 sin_orig.sin_addr.s_addr ==
768 ifa->ifa_local) {
769 break; /* found */
770 }
771 }
772 }
773 /* we didn't get a match, maybe the application is
774 4.3BSD-style and passed in junk so we fall back to
775 comparing just the label */
776 if (!ifa) {
777 for (ifap = &in_dev->ifa_list; (ifa = *ifap) != NULL;
778 ifap = &ifa->ifa_next)
779 if (!strcmp(ifr.ifr_name, ifa->ifa_label))
780 break;
781 }
782 }
783
784 ret = -EADDRNOTAVAIL;
785 if (!ifa && cmd != SIOCSIFADDR && cmd != SIOCSIFFLAGS)
786 goto done;
787
788 switch (cmd) {
789 case SIOCGIFADDR: /* Get interface address */
790 sin->sin_addr.s_addr = ifa->ifa_local;
791 goto rarok;
792
793 case SIOCGIFBRDADDR: /* Get the broadcast address */
794 sin->sin_addr.s_addr = ifa->ifa_broadcast;
795 goto rarok;
796
797 case SIOCGIFDSTADDR: /* Get the destination address */
798 sin->sin_addr.s_addr = ifa->ifa_address;
799 goto rarok;
800
801 case SIOCGIFNETMASK: /* Get the netmask for the interface */
802 sin->sin_addr.s_addr = ifa->ifa_mask;
803 goto rarok;
804
805 case SIOCSIFFLAGS:
806 if (colon) {
807 ret = -EADDRNOTAVAIL;
808 if (!ifa)
809 break;
810 ret = 0;
811 if (!(ifr.ifr_flags & IFF_UP))
812 inet_del_ifa(in_dev, ifap, 1);
813 break;
814 }
815 ret = dev_change_flags(dev, ifr.ifr_flags);
816 break;
817
818 case SIOCSIFADDR: /* Set interface address (and family) */
819 ret = -EINVAL;
820 if (inet_abc_len(sin->sin_addr.s_addr) < 0)
821 break;
822
823 if (!ifa) {
824 ret = -ENOBUFS;
825 ifa = inet_alloc_ifa();
826 INIT_HLIST_NODE(&ifa->hash);
827 if (!ifa)
828 break;
829 if (colon)
830 memcpy(ifa->ifa_label, ifr.ifr_name, IFNAMSIZ);
831 else
832 memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
833 } else {
834 ret = 0;
835 if (ifa->ifa_local == sin->sin_addr.s_addr)
836 break;
837 inet_del_ifa(in_dev, ifap, 0);
838 ifa->ifa_broadcast = 0;
839 ifa->ifa_scope = 0;
840 }
841
842 ifa->ifa_address = ifa->ifa_local = sin->sin_addr.s_addr;
843
844 if (!(dev->flags & IFF_POINTOPOINT)) {
845 ifa->ifa_prefixlen = inet_abc_len(ifa->ifa_address);
846 ifa->ifa_mask = inet_make_mask(ifa->ifa_prefixlen);
847 if ((dev->flags & IFF_BROADCAST) &&
848 ifa->ifa_prefixlen < 31)
849 ifa->ifa_broadcast = ifa->ifa_address |
850 ~ifa->ifa_mask;
851 } else {
852 ifa->ifa_prefixlen = 32;
853 ifa->ifa_mask = inet_make_mask(32);
854 }
855 ret = inet_set_ifa(dev, ifa);
856 break;
857
858 case SIOCSIFBRDADDR: /* Set the broadcast address */
859 ret = 0;
860 if (ifa->ifa_broadcast != sin->sin_addr.s_addr) {
861 inet_del_ifa(in_dev, ifap, 0);
862 ifa->ifa_broadcast = sin->sin_addr.s_addr;
863 inet_insert_ifa(ifa);
864 }
865 break;
866
867 case SIOCSIFDSTADDR: /* Set the destination address */
868 ret = 0;
869 if (ifa->ifa_address == sin->sin_addr.s_addr)
870 break;
871 ret = -EINVAL;
872 if (inet_abc_len(sin->sin_addr.s_addr) < 0)
873 break;
874 ret = 0;
875 inet_del_ifa(in_dev, ifap, 0);
876 ifa->ifa_address = sin->sin_addr.s_addr;
877 inet_insert_ifa(ifa);
878 break;
879
880 case SIOCSIFNETMASK: /* Set the netmask for the interface */
881
882 /*
883 * The mask we set must be legal.
884 */
885 ret = -EINVAL;
886 if (bad_mask(sin->sin_addr.s_addr, 0))
887 break;
888 ret = 0;
889 if (ifa->ifa_mask != sin->sin_addr.s_addr) {
890 __be32 old_mask = ifa->ifa_mask;
891 inet_del_ifa(in_dev, ifap, 0);
892 ifa->ifa_mask = sin->sin_addr.s_addr;
893 ifa->ifa_prefixlen = inet_mask_len(ifa->ifa_mask);
894
895 /* See if current broadcast address matches
896 * with current netmask, then recalculate
897 * the broadcast address. Otherwise it's a
898 * funny address, so don't touch it since
899 * the user seems to know what (s)he's doing...
900 */
901 if ((dev->flags & IFF_BROADCAST) &&
902 (ifa->ifa_prefixlen < 31) &&
903 (ifa->ifa_broadcast ==
904 (ifa->ifa_local|~old_mask))) {
905 ifa->ifa_broadcast = (ifa->ifa_local |
906 ~sin->sin_addr.s_addr);
907 }
908 inet_insert_ifa(ifa);
909 }
910 break;
911 }
912 done:
913 rtnl_unlock();
914 out:
915 return ret;
916 rarok:
917 rtnl_unlock();
918 ret = copy_to_user(arg, &ifr, sizeof(struct ifreq)) ? -EFAULT : 0;
919 goto out;
920 }
921
922 static int inet_gifconf(struct net_device *dev, char __user *buf, int len)
923 {
924 struct in_device *in_dev = __in_dev_get_rtnl(dev);
925 struct in_ifaddr *ifa;
926 struct ifreq ifr;
927 int done = 0;
928
929 if (!in_dev)
930 goto out;
931
932 for (ifa = in_dev->ifa_list; ifa; ifa = ifa->ifa_next) {
933 if (!buf) {
934 done += sizeof(ifr);
935 continue;
936 }
937 if (len < (int) sizeof(ifr))
938 break;
939 memset(&ifr, 0, sizeof(struct ifreq));
940 if (ifa->ifa_label)
941 strcpy(ifr.ifr_name, ifa->ifa_label);
942 else
943 strcpy(ifr.ifr_name, dev->name);
944
945 (*(struct sockaddr_in *)&ifr.ifr_addr).sin_family = AF_INET;
946 (*(struct sockaddr_in *)&ifr.ifr_addr).sin_addr.s_addr =
947 ifa->ifa_local;
948
949 if (copy_to_user(buf, &ifr, sizeof(struct ifreq))) {
950 done = -EFAULT;
951 break;
952 }
953 buf += sizeof(struct ifreq);
954 len -= sizeof(struct ifreq);
955 done += sizeof(struct ifreq);
956 }
957 out:
958 return done;
959 }
960
961 __be32 inet_select_addr(const struct net_device *dev, __be32 dst, int scope)
962 {
963 __be32 addr = 0;
964 struct in_device *in_dev;
965 struct net *net = dev_net(dev);
966
967 rcu_read_lock();
968 in_dev = __in_dev_get_rcu(dev);
969 if (!in_dev)
970 goto no_in_dev;
971
972 for_primary_ifa(in_dev) {
973 if (ifa->ifa_scope > scope)
974 continue;
975 if (!dst || inet_ifa_match(dst, ifa)) {
976 addr = ifa->ifa_local;
977 break;
978 }
979 if (!addr)
980 addr = ifa->ifa_local;
981 } endfor_ifa(in_dev);
982
983 if (addr)
984 goto out_unlock;
985 no_in_dev:
986
987 /* Not loopback addresses on loopback should be preferred
988 in this case. It is importnat that lo is the first interface
989 in dev_base list.
990 */
991 for_each_netdev_rcu(net, dev) {
992 in_dev = __in_dev_get_rcu(dev);
993 if (!in_dev)
994 continue;
995
996 for_primary_ifa(in_dev) {
997 if (ifa->ifa_scope != RT_SCOPE_LINK &&
998 ifa->ifa_scope <= scope) {
999 addr = ifa->ifa_local;
1000 goto out_unlock;
1001 }
1002 } endfor_ifa(in_dev);
1003 }
1004 out_unlock:
1005 rcu_read_unlock();
1006 return addr;
1007 }
1008 EXPORT_SYMBOL(inet_select_addr);
1009
1010 static __be32 confirm_addr_indev(struct in_device *in_dev, __be32 dst,
1011 __be32 local, int scope)
1012 {
1013 int same = 0;
1014 __be32 addr = 0;
1015
1016 for_ifa(in_dev) {
1017 if (!addr &&
1018 (local == ifa->ifa_local || !local) &&
1019 ifa->ifa_scope <= scope) {
1020 addr = ifa->ifa_local;
1021 if (same)
1022 break;
1023 }
1024 if (!same) {
1025 same = (!local || inet_ifa_match(local, ifa)) &&
1026 (!dst || inet_ifa_match(dst, ifa));
1027 if (same && addr) {
1028 if (local || !dst)
1029 break;
1030 /* Is the selected addr into dst subnet? */
1031 if (inet_ifa_match(addr, ifa))
1032 break;
1033 /* No, then can we use new local src? */
1034 if (ifa->ifa_scope <= scope) {
1035 addr = ifa->ifa_local;
1036 break;
1037 }
1038 /* search for large dst subnet for addr */
1039 same = 0;
1040 }
1041 }
1042 } endfor_ifa(in_dev);
1043
1044 return same ? addr : 0;
1045 }
1046
1047 /*
1048 * Confirm that local IP address exists using wildcards:
1049 * - in_dev: only on this interface, 0=any interface
1050 * - dst: only in the same subnet as dst, 0=any dst
1051 * - local: address, 0=autoselect the local address
1052 * - scope: maximum allowed scope value for the local address
1053 */
1054 __be32 inet_confirm_addr(struct in_device *in_dev,
1055 __be32 dst, __be32 local, int scope)
1056 {
1057 __be32 addr = 0;
1058 struct net_device *dev;
1059 struct net *net;
1060
1061 if (scope != RT_SCOPE_LINK)
1062 return confirm_addr_indev(in_dev, dst, local, scope);
1063
1064 net = dev_net(in_dev->dev);
1065 rcu_read_lock();
1066 for_each_netdev_rcu(net, dev) {
1067 in_dev = __in_dev_get_rcu(dev);
1068 if (in_dev) {
1069 addr = confirm_addr_indev(in_dev, dst, local, scope);
1070 if (addr)
1071 break;
1072 }
1073 }
1074 rcu_read_unlock();
1075
1076 return addr;
1077 }
1078 EXPORT_SYMBOL(inet_confirm_addr);
1079
1080 /*
1081 * Device notifier
1082 */
1083
1084 int register_inetaddr_notifier(struct notifier_block *nb)
1085 {
1086 return blocking_notifier_chain_register(&inetaddr_chain, nb);
1087 }
1088 EXPORT_SYMBOL(register_inetaddr_notifier);
1089
1090 int unregister_inetaddr_notifier(struct notifier_block *nb)
1091 {
1092 return blocking_notifier_chain_unregister(&inetaddr_chain, nb);
1093 }
1094 EXPORT_SYMBOL(unregister_inetaddr_notifier);
1095
1096 /* Rename ifa_labels for a device name change. Make some effort to preserve
1097 * existing alias numbering and to create unique labels if possible.
1098 */
1099 static void inetdev_changename(struct net_device *dev, struct in_device *in_dev)
1100 {
1101 struct in_ifaddr *ifa;
1102 int named = 0;
1103
1104 for (ifa = in_dev->ifa_list; ifa; ifa = ifa->ifa_next) {
1105 char old[IFNAMSIZ], *dot;
1106
1107 memcpy(old, ifa->ifa_label, IFNAMSIZ);
1108 memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
1109 if (named++ == 0)
1110 goto skip;
1111 dot = strchr(old, ':');
1112 if (dot == NULL) {
1113 sprintf(old, ":%d", named);
1114 dot = old;
1115 }
1116 if (strlen(dot) + strlen(dev->name) < IFNAMSIZ)
1117 strcat(ifa->ifa_label, dot);
1118 else
1119 strcpy(ifa->ifa_label + (IFNAMSIZ - strlen(dot) - 1), dot);
1120 skip:
1121 rtmsg_ifa(RTM_NEWADDR, ifa, NULL, 0);
1122 }
1123 }
1124
1125 static bool inetdev_valid_mtu(unsigned int mtu)
1126 {
1127 return mtu >= 68;
1128 }
1129
1130 static void inetdev_send_gratuitous_arp(struct net_device *dev,
1131 struct in_device *in_dev)
1132
1133 {
1134 struct in_ifaddr *ifa;
1135
1136 for (ifa = in_dev->ifa_list; ifa;
1137 ifa = ifa->ifa_next) {
1138 arp_send(ARPOP_REQUEST, ETH_P_ARP,
1139 ifa->ifa_local, dev,
1140 ifa->ifa_local, NULL,
1141 dev->dev_addr, NULL);
1142 }
1143 }
1144
1145 /* Called only under RTNL semaphore */
1146
1147 static int inetdev_event(struct notifier_block *this, unsigned long event,
1148 void *ptr)
1149 {
1150 struct net_device *dev = ptr;
1151 struct in_device *in_dev = __in_dev_get_rtnl(dev);
1152
1153 ASSERT_RTNL();
1154
1155 if (!in_dev) {
1156 if (event == NETDEV_REGISTER) {
1157 in_dev = inetdev_init(dev);
1158 if (!in_dev)
1159 return notifier_from_errno(-ENOMEM);
1160 if (dev->flags & IFF_LOOPBACK) {
1161 IN_DEV_CONF_SET(in_dev, NOXFRM, 1);
1162 IN_DEV_CONF_SET(in_dev, NOPOLICY, 1);
1163 }
1164 } else if (event == NETDEV_CHANGEMTU) {
1165 /* Re-enabling IP */
1166 if (inetdev_valid_mtu(dev->mtu))
1167 in_dev = inetdev_init(dev);
1168 }
1169 goto out;
1170 }
1171
1172 switch (event) {
1173 case NETDEV_REGISTER:
1174 pr_debug("%s: bug\n", __func__);
1175 RCU_INIT_POINTER(dev->ip_ptr, NULL);
1176 break;
1177 case NETDEV_UP:
1178 if (!inetdev_valid_mtu(dev->mtu))
1179 break;
1180 if (dev->flags & IFF_LOOPBACK) {
1181 struct in_ifaddr *ifa = inet_alloc_ifa();
1182
1183 if (ifa) {
1184 INIT_HLIST_NODE(&ifa->hash);
1185 ifa->ifa_local =
1186 ifa->ifa_address = htonl(INADDR_LOOPBACK);
1187 ifa->ifa_prefixlen = 8;
1188 ifa->ifa_mask = inet_make_mask(8);
1189 in_dev_hold(in_dev);
1190 ifa->ifa_dev = in_dev;
1191 ifa->ifa_scope = RT_SCOPE_HOST;
1192 memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
1193 inet_insert_ifa(ifa);
1194 }
1195 }
1196 ip_mc_up(in_dev);
1197 /* fall through */
1198 case NETDEV_CHANGEADDR:
1199 if (!IN_DEV_ARP_NOTIFY(in_dev))
1200 break;
1201 /* fall through */
1202 case NETDEV_NOTIFY_PEERS:
1203 /* Send gratuitous ARP to notify of link change */
1204 inetdev_send_gratuitous_arp(dev, in_dev);
1205 break;
1206 case NETDEV_DOWN:
1207 ip_mc_down(in_dev);
1208 break;
1209 case NETDEV_PRE_TYPE_CHANGE:
1210 ip_mc_unmap(in_dev);
1211 break;
1212 case NETDEV_POST_TYPE_CHANGE:
1213 ip_mc_remap(in_dev);
1214 break;
1215 case NETDEV_CHANGEMTU:
1216 if (inetdev_valid_mtu(dev->mtu))
1217 break;
1218 /* disable IP when MTU is not enough */
1219 case NETDEV_UNREGISTER:
1220 inetdev_destroy(in_dev);
1221 break;
1222 case NETDEV_CHANGENAME:
1223 /* Do not notify about label change, this event is
1224 * not interesting to applications using netlink.
1225 */
1226 inetdev_changename(dev, in_dev);
1227
1228 devinet_sysctl_unregister(in_dev);
1229 devinet_sysctl_register(in_dev);
1230 break;
1231 }
1232 out:
1233 return NOTIFY_DONE;
1234 }
1235
1236 static struct notifier_block ip_netdev_notifier = {
1237 .notifier_call = inetdev_event,
1238 };
1239
1240 static size_t inet_nlmsg_size(void)
1241 {
1242 return NLMSG_ALIGN(sizeof(struct ifaddrmsg))
1243 + nla_total_size(4) /* IFA_ADDRESS */
1244 + nla_total_size(4) /* IFA_LOCAL */
1245 + nla_total_size(4) /* IFA_BROADCAST */
1246 + nla_total_size(IFNAMSIZ); /* IFA_LABEL */
1247 }
1248
1249 static int inet_fill_ifaddr(struct sk_buff *skb, struct in_ifaddr *ifa,
1250 u32 portid, u32 seq, int event, unsigned int flags)
1251 {
1252 struct ifaddrmsg *ifm;
1253 struct nlmsghdr *nlh;
1254
1255 nlh = nlmsg_put(skb, portid, seq, event, sizeof(*ifm), flags);
1256 if (nlh == NULL)
1257 return -EMSGSIZE;
1258
1259 ifm = nlmsg_data(nlh);
1260 ifm->ifa_family = AF_INET;
1261 ifm->ifa_prefixlen = ifa->ifa_prefixlen;
1262 ifm->ifa_flags = ifa->ifa_flags|IFA_F_PERMANENT;
1263 ifm->ifa_scope = ifa->ifa_scope;
1264 ifm->ifa_index = ifa->ifa_dev->dev->ifindex;
1265
1266 if ((ifa->ifa_address &&
1267 nla_put_be32(skb, IFA_ADDRESS, ifa->ifa_address)) ||
1268 (ifa->ifa_local &&
1269 nla_put_be32(skb, IFA_LOCAL, ifa->ifa_local)) ||
1270 (ifa->ifa_broadcast &&
1271 nla_put_be32(skb, IFA_BROADCAST, ifa->ifa_broadcast)) ||
1272 (ifa->ifa_label[0] &&
1273 nla_put_string(skb, IFA_LABEL, ifa->ifa_label)))
1274 goto nla_put_failure;
1275
1276 return nlmsg_end(skb, nlh);
1277
1278 nla_put_failure:
1279 nlmsg_cancel(skb, nlh);
1280 return -EMSGSIZE;
1281 }
1282
1283 static int inet_dump_ifaddr(struct sk_buff *skb, struct netlink_callback *cb)
1284 {
1285 struct net *net = sock_net(skb->sk);
1286 int h, s_h;
1287 int idx, s_idx;
1288 int ip_idx, s_ip_idx;
1289 struct net_device *dev;
1290 struct in_device *in_dev;
1291 struct in_ifaddr *ifa;
1292 struct hlist_head *head;
1293 struct hlist_node *node;
1294
1295 s_h = cb->args[0];
1296 s_idx = idx = cb->args[1];
1297 s_ip_idx = ip_idx = cb->args[2];
1298
1299 for (h = s_h; h < NETDEV_HASHENTRIES; h++, s_idx = 0) {
1300 idx = 0;
1301 head = &net->dev_index_head[h];
1302 rcu_read_lock();
1303 hlist_for_each_entry_rcu(dev, node, head, index_hlist) {
1304 if (idx < s_idx)
1305 goto cont;
1306 if (h > s_h || idx > s_idx)
1307 s_ip_idx = 0;
1308 in_dev = __in_dev_get_rcu(dev);
1309 if (!in_dev)
1310 goto cont;
1311
1312 for (ifa = in_dev->ifa_list, ip_idx = 0; ifa;
1313 ifa = ifa->ifa_next, ip_idx++) {
1314 if (ip_idx < s_ip_idx)
1315 continue;
1316 if (inet_fill_ifaddr(skb, ifa,
1317 NETLINK_CB(cb->skb).portid,
1318 cb->nlh->nlmsg_seq,
1319 RTM_NEWADDR, NLM_F_MULTI) <= 0) {
1320 rcu_read_unlock();
1321 goto done;
1322 }
1323 }
1324 cont:
1325 idx++;
1326 }
1327 rcu_read_unlock();
1328 }
1329
1330 done:
1331 cb->args[0] = h;
1332 cb->args[1] = idx;
1333 cb->args[2] = ip_idx;
1334
1335 return skb->len;
1336 }
1337
1338 static void rtmsg_ifa(int event, struct in_ifaddr *ifa, struct nlmsghdr *nlh,
1339 u32 portid)
1340 {
1341 struct sk_buff *skb;
1342 u32 seq = nlh ? nlh->nlmsg_seq : 0;
1343 int err = -ENOBUFS;
1344 struct net *net;
1345
1346 net = dev_net(ifa->ifa_dev->dev);
1347 skb = nlmsg_new(inet_nlmsg_size(), GFP_KERNEL);
1348 if (skb == NULL)
1349 goto errout;
1350
1351 err = inet_fill_ifaddr(skb, ifa, portid, seq, event, 0);
1352 if (err < 0) {
1353 /* -EMSGSIZE implies BUG in inet_nlmsg_size() */
1354 WARN_ON(err == -EMSGSIZE);
1355 kfree_skb(skb);
1356 goto errout;
1357 }
1358 rtnl_notify(skb, net, portid, RTNLGRP_IPV4_IFADDR, nlh, GFP_KERNEL);
1359 return;
1360 errout:
1361 if (err < 0)
1362 rtnl_set_sk_err(net, RTNLGRP_IPV4_IFADDR, err);
1363 }
1364
1365 static size_t inet_get_link_af_size(const struct net_device *dev)
1366 {
1367 struct in_device *in_dev = rcu_dereference_rtnl(dev->ip_ptr);
1368
1369 if (!in_dev)
1370 return 0;
1371
1372 return nla_total_size(IPV4_DEVCONF_MAX * 4); /* IFLA_INET_CONF */
1373 }
1374
1375 static int inet_fill_link_af(struct sk_buff *skb, const struct net_device *dev)
1376 {
1377 struct in_device *in_dev = rcu_dereference_rtnl(dev->ip_ptr);
1378 struct nlattr *nla;
1379 int i;
1380
1381 if (!in_dev)
1382 return -ENODATA;
1383
1384 nla = nla_reserve(skb, IFLA_INET_CONF, IPV4_DEVCONF_MAX * 4);
1385 if (nla == NULL)
1386 return -EMSGSIZE;
1387
1388 for (i = 0; i < IPV4_DEVCONF_MAX; i++)
1389 ((u32 *) nla_data(nla))[i] = in_dev->cnf.data[i];
1390
1391 return 0;
1392 }
1393
1394 static const struct nla_policy inet_af_policy[IFLA_INET_MAX+1] = {
1395 [IFLA_INET_CONF] = { .type = NLA_NESTED },
1396 };
1397
1398 static int inet_validate_link_af(const struct net_device *dev,
1399 const struct nlattr *nla)
1400 {
1401 struct nlattr *a, *tb[IFLA_INET_MAX+1];
1402 int err, rem;
1403
1404 if (dev && !__in_dev_get_rtnl(dev))
1405 return -EAFNOSUPPORT;
1406
1407 err = nla_parse_nested(tb, IFLA_INET_MAX, nla, inet_af_policy);
1408 if (err < 0)
1409 return err;
1410
1411 if (tb[IFLA_INET_CONF]) {
1412 nla_for_each_nested(a, tb[IFLA_INET_CONF], rem) {
1413 int cfgid = nla_type(a);
1414
1415 if (nla_len(a) < 4)
1416 return -EINVAL;
1417
1418 if (cfgid <= 0 || cfgid > IPV4_DEVCONF_MAX)
1419 return -EINVAL;
1420 }
1421 }
1422
1423 return 0;
1424 }
1425
1426 static int inet_set_link_af(struct net_device *dev, const struct nlattr *nla)
1427 {
1428 struct in_device *in_dev = __in_dev_get_rtnl(dev);
1429 struct nlattr *a, *tb[IFLA_INET_MAX+1];
1430 int rem;
1431
1432 if (!in_dev)
1433 return -EAFNOSUPPORT;
1434
1435 if (nla_parse_nested(tb, IFLA_INET_MAX, nla, NULL) < 0)
1436 BUG();
1437
1438 if (tb[IFLA_INET_CONF]) {
1439 nla_for_each_nested(a, tb[IFLA_INET_CONF], rem)
1440 ipv4_devconf_set(in_dev, nla_type(a), nla_get_u32(a));
1441 }
1442
1443 return 0;
1444 }
1445
1446 static int inet_netconf_msgsize_devconf(int type)
1447 {
1448 int size = NLMSG_ALIGN(sizeof(struct netconfmsg))
1449 + nla_total_size(4); /* NETCONFA_IFINDEX */
1450
1451 /* type -1 is used for ALL */
1452 if (type == -1 || type == NETCONFA_FORWARDING)
1453 size += nla_total_size(4);
1454
1455 return size;
1456 }
1457
1458 static int inet_netconf_fill_devconf(struct sk_buff *skb, int ifindex,
1459 struct ipv4_devconf *devconf, u32 portid,
1460 u32 seq, int event, unsigned int flags,
1461 int type)
1462 {
1463 struct nlmsghdr *nlh;
1464 struct netconfmsg *ncm;
1465
1466 nlh = nlmsg_put(skb, portid, seq, event, sizeof(struct netconfmsg),
1467 flags);
1468 if (nlh == NULL)
1469 return -EMSGSIZE;
1470
1471 ncm = nlmsg_data(nlh);
1472 ncm->ncm_family = AF_INET;
1473
1474 if (nla_put_s32(skb, NETCONFA_IFINDEX, ifindex) < 0)
1475 goto nla_put_failure;
1476
1477 /* type -1 is used for ALL */
1478 if ((type == -1 || type == NETCONFA_FORWARDING) &&
1479 nla_put_s32(skb, NETCONFA_FORWARDING,
1480 IPV4_DEVCONF(*devconf, FORWARDING)) < 0)
1481 goto nla_put_failure;
1482
1483 return nlmsg_end(skb, nlh);
1484
1485 nla_put_failure:
1486 nlmsg_cancel(skb, nlh);
1487 return -EMSGSIZE;
1488 }
1489
1490 static void inet_netconf_notify_devconf(struct net *net, int type, int ifindex,
1491 struct ipv4_devconf *devconf)
1492 {
1493 struct sk_buff *skb;
1494 int err = -ENOBUFS;
1495
1496 skb = nlmsg_new(inet_netconf_msgsize_devconf(type), GFP_ATOMIC);
1497 if (skb == NULL)
1498 goto errout;
1499
1500 err = inet_netconf_fill_devconf(skb, ifindex, devconf, 0, 0,
1501 RTM_NEWNETCONF, 0, type);
1502 if (err < 0) {
1503 /* -EMSGSIZE implies BUG in inet_netconf_msgsize_devconf() */
1504 WARN_ON(err == -EMSGSIZE);
1505 kfree_skb(skb);
1506 goto errout;
1507 }
1508 rtnl_notify(skb, net, 0, RTNLGRP_IPV4_NETCONF, NULL, GFP_ATOMIC);
1509 return;
1510 errout:
1511 if (err < 0)
1512 rtnl_set_sk_err(net, RTNLGRP_IPV4_NETCONF, err);
1513 }
1514
1515 static const struct nla_policy devconf_ipv4_policy[NETCONFA_MAX+1] = {
1516 [NETCONFA_IFINDEX] = { .len = sizeof(int) },
1517 [NETCONFA_FORWARDING] = { .len = sizeof(int) },
1518 };
1519
1520 static int inet_netconf_get_devconf(struct sk_buff *in_skb,
1521 struct nlmsghdr *nlh,
1522 void *arg)
1523 {
1524 struct net *net = sock_net(in_skb->sk);
1525 struct nlattr *tb[NETCONFA_MAX+1];
1526 struct netconfmsg *ncm;
1527 struct sk_buff *skb;
1528 struct ipv4_devconf *devconf;
1529 struct in_device *in_dev;
1530 struct net_device *dev;
1531 int ifindex;
1532 int err;
1533
1534 err = nlmsg_parse(nlh, sizeof(*ncm), tb, NETCONFA_MAX,
1535 devconf_ipv4_policy);
1536 if (err < 0)
1537 goto errout;
1538
1539 err = EINVAL;
1540 if (!tb[NETCONFA_IFINDEX])
1541 goto errout;
1542
1543 ifindex = nla_get_s32(tb[NETCONFA_IFINDEX]);
1544 switch (ifindex) {
1545 case NETCONFA_IFINDEX_ALL:
1546 devconf = net->ipv4.devconf_all;
1547 break;
1548 case NETCONFA_IFINDEX_DEFAULT:
1549 devconf = net->ipv4.devconf_dflt;
1550 break;
1551 default:
1552 dev = __dev_get_by_index(net, ifindex);
1553 if (dev == NULL)
1554 goto errout;
1555 in_dev = __in_dev_get_rtnl(dev);
1556 if (in_dev == NULL)
1557 goto errout;
1558 devconf = &in_dev->cnf;
1559 break;
1560 }
1561
1562 err = -ENOBUFS;
1563 skb = nlmsg_new(inet_netconf_msgsize_devconf(-1), GFP_ATOMIC);
1564 if (skb == NULL)
1565 goto errout;
1566
1567 err = inet_netconf_fill_devconf(skb, ifindex, devconf,
1568 NETLINK_CB(in_skb).portid,
1569 nlh->nlmsg_seq, RTM_NEWNETCONF, 0,
1570 -1);
1571 if (err < 0) {
1572 /* -EMSGSIZE implies BUG in inet_netconf_msgsize_devconf() */
1573 WARN_ON(err == -EMSGSIZE);
1574 kfree_skb(skb);
1575 goto errout;
1576 }
1577 err = rtnl_unicast(skb, net, NETLINK_CB(in_skb).portid);
1578 errout:
1579 return err;
1580 }
1581
1582 #ifdef CONFIG_SYSCTL
1583
1584 static void devinet_copy_dflt_conf(struct net *net, int i)
1585 {
1586 struct net_device *dev;
1587
1588 rcu_read_lock();
1589 for_each_netdev_rcu(net, dev) {
1590 struct in_device *in_dev;
1591
1592 in_dev = __in_dev_get_rcu(dev);
1593 if (in_dev && !test_bit(i, in_dev->cnf.state))
1594 in_dev->cnf.data[i] = net->ipv4.devconf_dflt->data[i];
1595 }
1596 rcu_read_unlock();
1597 }
1598
1599 /* called with RTNL locked */
1600 static void inet_forward_change(struct net *net)
1601 {
1602 struct net_device *dev;
1603 int on = IPV4_DEVCONF_ALL(net, FORWARDING);
1604
1605 IPV4_DEVCONF_ALL(net, ACCEPT_REDIRECTS) = !on;
1606 IPV4_DEVCONF_DFLT(net, FORWARDING) = on;
1607 inet_netconf_notify_devconf(net, NETCONFA_FORWARDING,
1608 NETCONFA_IFINDEX_ALL,
1609 net->ipv4.devconf_all);
1610 inet_netconf_notify_devconf(net, NETCONFA_FORWARDING,
1611 NETCONFA_IFINDEX_DEFAULT,
1612 net->ipv4.devconf_dflt);
1613
1614 for_each_netdev(net, dev) {
1615 struct in_device *in_dev;
1616 if (on)
1617 dev_disable_lro(dev);
1618 rcu_read_lock();
1619 in_dev = __in_dev_get_rcu(dev);
1620 if (in_dev) {
1621 IN_DEV_CONF_SET(in_dev, FORWARDING, on);
1622 inet_netconf_notify_devconf(net, NETCONFA_FORWARDING,
1623 dev->ifindex, &in_dev->cnf);
1624 }
1625 rcu_read_unlock();
1626 }
1627 }
1628
1629 static int devinet_conf_proc(ctl_table *ctl, int write,
1630 void __user *buffer,
1631 size_t *lenp, loff_t *ppos)
1632 {
1633 int old_value = *(int *)ctl->data;
1634 int ret = proc_dointvec(ctl, write, buffer, lenp, ppos);
1635 int new_value = *(int *)ctl->data;
1636
1637 if (write) {
1638 struct ipv4_devconf *cnf = ctl->extra1;
1639 struct net *net = ctl->extra2;
1640 int i = (int *)ctl->data - cnf->data;
1641
1642 set_bit(i, cnf->state);
1643
1644 if (cnf == net->ipv4.devconf_dflt)
1645 devinet_copy_dflt_conf(net, i);
1646 if (i == IPV4_DEVCONF_ACCEPT_LOCAL - 1 ||
1647 i == IPV4_DEVCONF_ROUTE_LOCALNET - 1)
1648 if ((new_value == 0) && (old_value != 0))
1649 rt_cache_flush(net);
1650 }
1651
1652 return ret;
1653 }
1654
1655 static int devinet_sysctl_forward(ctl_table *ctl, int write,
1656 void __user *buffer,
1657 size_t *lenp, loff_t *ppos)
1658 {
1659 int *valp = ctl->data;
1660 int val = *valp;
1661 loff_t pos = *ppos;
1662 int ret = proc_dointvec(ctl, write, buffer, lenp, ppos);
1663
1664 if (write && *valp != val) {
1665 struct net *net = ctl->extra2;
1666
1667 if (valp != &IPV4_DEVCONF_DFLT(net, FORWARDING)) {
1668 if (!rtnl_trylock()) {
1669 /* Restore the original values before restarting */
1670 *valp = val;
1671 *ppos = pos;
1672 return restart_syscall();
1673 }
1674 if (valp == &IPV4_DEVCONF_ALL(net, FORWARDING)) {
1675 inet_forward_change(net);
1676 } else {
1677 struct ipv4_devconf *cnf = ctl->extra1;
1678 struct in_device *idev =
1679 container_of(cnf, struct in_device, cnf);
1680 if (*valp)
1681 dev_disable_lro(idev->dev);
1682 inet_netconf_notify_devconf(net,
1683 NETCONFA_FORWARDING,
1684 idev->dev->ifindex,
1685 cnf);
1686 }
1687 rtnl_unlock();
1688 rt_cache_flush(net);
1689 } else
1690 inet_netconf_notify_devconf(net, NETCONFA_FORWARDING,
1691 NETCONFA_IFINDEX_DEFAULT,
1692 net->ipv4.devconf_dflt);
1693 }
1694
1695 return ret;
1696 }
1697
1698 static int ipv4_doint_and_flush(ctl_table *ctl, int write,
1699 void __user *buffer,
1700 size_t *lenp, loff_t *ppos)
1701 {
1702 int *valp = ctl->data;
1703 int val = *valp;
1704 int ret = proc_dointvec(ctl, write, buffer, lenp, ppos);
1705 struct net *net = ctl->extra2;
1706
1707 if (write && *valp != val)
1708 rt_cache_flush(net);
1709
1710 return ret;
1711 }
1712
1713 #define DEVINET_SYSCTL_ENTRY(attr, name, mval, proc) \
1714 { \
1715 .procname = name, \
1716 .data = ipv4_devconf.data + \
1717 IPV4_DEVCONF_ ## attr - 1, \
1718 .maxlen = sizeof(int), \
1719 .mode = mval, \
1720 .proc_handler = proc, \
1721 .extra1 = &ipv4_devconf, \
1722 }
1723
1724 #define DEVINET_SYSCTL_RW_ENTRY(attr, name) \
1725 DEVINET_SYSCTL_ENTRY(attr, name, 0644, devinet_conf_proc)
1726
1727 #define DEVINET_SYSCTL_RO_ENTRY(attr, name) \
1728 DEVINET_SYSCTL_ENTRY(attr, name, 0444, devinet_conf_proc)
1729
1730 #define DEVINET_SYSCTL_COMPLEX_ENTRY(attr, name, proc) \
1731 DEVINET_SYSCTL_ENTRY(attr, name, 0644, proc)
1732
1733 #define DEVINET_SYSCTL_FLUSHING_ENTRY(attr, name) \
1734 DEVINET_SYSCTL_COMPLEX_ENTRY(attr, name, ipv4_doint_and_flush)
1735
1736 static struct devinet_sysctl_table {
1737 struct ctl_table_header *sysctl_header;
1738 struct ctl_table devinet_vars[__IPV4_DEVCONF_MAX];
1739 } devinet_sysctl = {
1740 .devinet_vars = {
1741 DEVINET_SYSCTL_COMPLEX_ENTRY(FORWARDING, "forwarding",
1742 devinet_sysctl_forward),
1743 DEVINET_SYSCTL_RO_ENTRY(MC_FORWARDING, "mc_forwarding"),
1744
1745 DEVINET_SYSCTL_RW_ENTRY(ACCEPT_REDIRECTS, "accept_redirects"),
1746 DEVINET_SYSCTL_RW_ENTRY(SECURE_REDIRECTS, "secure_redirects"),
1747 DEVINET_SYSCTL_RW_ENTRY(SHARED_MEDIA, "shared_media"),
1748 DEVINET_SYSCTL_RW_ENTRY(RP_FILTER, "rp_filter"),
1749 DEVINET_SYSCTL_RW_ENTRY(SEND_REDIRECTS, "send_redirects"),
1750 DEVINET_SYSCTL_RW_ENTRY(ACCEPT_SOURCE_ROUTE,
1751 "accept_source_route"),
1752 DEVINET_SYSCTL_RW_ENTRY(ACCEPT_LOCAL, "accept_local"),
1753 DEVINET_SYSCTL_RW_ENTRY(SRC_VMARK, "src_valid_mark"),
1754 DEVINET_SYSCTL_RW_ENTRY(PROXY_ARP, "proxy_arp"),
1755 DEVINET_SYSCTL_RW_ENTRY(MEDIUM_ID, "medium_id"),
1756 DEVINET_SYSCTL_RW_ENTRY(BOOTP_RELAY, "bootp_relay"),
1757 DEVINET_SYSCTL_RW_ENTRY(LOG_MARTIANS, "log_martians"),
1758 DEVINET_SYSCTL_RW_ENTRY(TAG, "tag"),
1759 DEVINET_SYSCTL_RW_ENTRY(ARPFILTER, "arp_filter"),
1760 DEVINET_SYSCTL_RW_ENTRY(ARP_ANNOUNCE, "arp_announce"),
1761 DEVINET_SYSCTL_RW_ENTRY(ARP_IGNORE, "arp_ignore"),
1762 DEVINET_SYSCTL_RW_ENTRY(ARP_ACCEPT, "arp_accept"),
1763 DEVINET_SYSCTL_RW_ENTRY(ARP_NOTIFY, "arp_notify"),
1764 DEVINET_SYSCTL_RW_ENTRY(PROXY_ARP_PVLAN, "proxy_arp_pvlan"),
1765
1766 DEVINET_SYSCTL_FLUSHING_ENTRY(NOXFRM, "disable_xfrm"),
1767 DEVINET_SYSCTL_FLUSHING_ENTRY(NOPOLICY, "disable_policy"),
1768 DEVINET_SYSCTL_FLUSHING_ENTRY(FORCE_IGMP_VERSION,
1769 "force_igmp_version"),
1770 DEVINET_SYSCTL_FLUSHING_ENTRY(PROMOTE_SECONDARIES,
1771 "promote_secondaries"),
1772 DEVINET_SYSCTL_FLUSHING_ENTRY(ROUTE_LOCALNET,
1773 "route_localnet"),
1774 },
1775 };
1776
1777 static int __devinet_sysctl_register(struct net *net, char *dev_name,
1778 struct ipv4_devconf *p)
1779 {
1780 int i;
1781 struct devinet_sysctl_table *t;
1782 char path[sizeof("net/ipv4/conf/") + IFNAMSIZ];
1783
1784 t = kmemdup(&devinet_sysctl, sizeof(*t), GFP_KERNEL);
1785 if (!t)
1786 goto out;
1787
1788 for (i = 0; i < ARRAY_SIZE(t->devinet_vars) - 1; i++) {
1789 t->devinet_vars[i].data += (char *)p - (char *)&ipv4_devconf;
1790 t->devinet_vars[i].extra1 = p;
1791 t->devinet_vars[i].extra2 = net;
1792 }
1793
1794 snprintf(path, sizeof(path), "net/ipv4/conf/%s", dev_name);
1795
1796 t->sysctl_header = register_net_sysctl(net, path, t->devinet_vars);
1797 if (!t->sysctl_header)
1798 goto free;
1799
1800 p->sysctl = t;
1801 return 0;
1802
1803 free:
1804 kfree(t);
1805 out:
1806 return -ENOBUFS;
1807 }
1808
1809 static void __devinet_sysctl_unregister(struct ipv4_devconf *cnf)
1810 {
1811 struct devinet_sysctl_table *t = cnf->sysctl;
1812
1813 if (t == NULL)
1814 return;
1815
1816 cnf->sysctl = NULL;
1817 unregister_net_sysctl_table(t->sysctl_header);
1818 kfree(t);
1819 }
1820
1821 static void devinet_sysctl_register(struct in_device *idev)
1822 {
1823 neigh_sysctl_register(idev->dev, idev->arp_parms, "ipv4", NULL);
1824 __devinet_sysctl_register(dev_net(idev->dev), idev->dev->name,
1825 &idev->cnf);
1826 }
1827
1828 static void devinet_sysctl_unregister(struct in_device *idev)
1829 {
1830 __devinet_sysctl_unregister(&idev->cnf);
1831 neigh_sysctl_unregister(idev->arp_parms);
1832 }
1833
1834 static struct ctl_table ctl_forward_entry[] = {
1835 {
1836 .procname = "ip_forward",
1837 .data = &ipv4_devconf.data[
1838 IPV4_DEVCONF_FORWARDING - 1],
1839 .maxlen = sizeof(int),
1840 .mode = 0644,
1841 .proc_handler = devinet_sysctl_forward,
1842 .extra1 = &ipv4_devconf,
1843 .extra2 = &init_net,
1844 },
1845 { },
1846 };
1847 #endif
1848
1849 static __net_init int devinet_init_net(struct net *net)
1850 {
1851 int err;
1852 struct ipv4_devconf *all, *dflt;
1853 #ifdef CONFIG_SYSCTL
1854 struct ctl_table *tbl = ctl_forward_entry;
1855 struct ctl_table_header *forw_hdr;
1856 #endif
1857
1858 err = -ENOMEM;
1859 all = &ipv4_devconf;
1860 dflt = &ipv4_devconf_dflt;
1861
1862 if (!net_eq(net, &init_net)) {
1863 all = kmemdup(all, sizeof(ipv4_devconf), GFP_KERNEL);
1864 if (all == NULL)
1865 goto err_alloc_all;
1866
1867 dflt = kmemdup(dflt, sizeof(ipv4_devconf_dflt), GFP_KERNEL);
1868 if (dflt == NULL)
1869 goto err_alloc_dflt;
1870
1871 #ifdef CONFIG_SYSCTL
1872 tbl = kmemdup(tbl, sizeof(ctl_forward_entry), GFP_KERNEL);
1873 if (tbl == NULL)
1874 goto err_alloc_ctl;
1875
1876 tbl[0].data = &all->data[IPV4_DEVCONF_FORWARDING - 1];
1877 tbl[0].extra1 = all;
1878 tbl[0].extra2 = net;
1879 #endif
1880 }
1881
1882 #ifdef CONFIG_SYSCTL
1883 err = __devinet_sysctl_register(net, "all", all);
1884 if (err < 0)
1885 goto err_reg_all;
1886
1887 err = __devinet_sysctl_register(net, "default", dflt);
1888 if (err < 0)
1889 goto err_reg_dflt;
1890
1891 err = -ENOMEM;
1892 forw_hdr = register_net_sysctl(net, "net/ipv4", tbl);
1893 if (forw_hdr == NULL)
1894 goto err_reg_ctl;
1895 net->ipv4.forw_hdr = forw_hdr;
1896 #endif
1897
1898 net->ipv4.devconf_all = all;
1899 net->ipv4.devconf_dflt = dflt;
1900 return 0;
1901
1902 #ifdef CONFIG_SYSCTL
1903 err_reg_ctl:
1904 __devinet_sysctl_unregister(dflt);
1905 err_reg_dflt:
1906 __devinet_sysctl_unregister(all);
1907 err_reg_all:
1908 if (tbl != ctl_forward_entry)
1909 kfree(tbl);
1910 err_alloc_ctl:
1911 #endif
1912 if (dflt != &ipv4_devconf_dflt)
1913 kfree(dflt);
1914 err_alloc_dflt:
1915 if (all != &ipv4_devconf)
1916 kfree(all);
1917 err_alloc_all:
1918 return err;
1919 }
1920
1921 static __net_exit void devinet_exit_net(struct net *net)
1922 {
1923 #ifdef CONFIG_SYSCTL
1924 struct ctl_table *tbl;
1925
1926 tbl = net->ipv4.forw_hdr->ctl_table_arg;
1927 unregister_net_sysctl_table(net->ipv4.forw_hdr);
1928 __devinet_sysctl_unregister(net->ipv4.devconf_dflt);
1929 __devinet_sysctl_unregister(net->ipv4.devconf_all);
1930 kfree(tbl);
1931 #endif
1932 kfree(net->ipv4.devconf_dflt);
1933 kfree(net->ipv4.devconf_all);
1934 }
1935
1936 static __net_initdata struct pernet_operations devinet_ops = {
1937 .init = devinet_init_net,
1938 .exit = devinet_exit_net,
1939 };
1940
1941 static struct rtnl_af_ops inet_af_ops = {
1942 .family = AF_INET,
1943 .fill_link_af = inet_fill_link_af,
1944 .get_link_af_size = inet_get_link_af_size,
1945 .validate_link_af = inet_validate_link_af,
1946 .set_link_af = inet_set_link_af,
1947 };
1948
1949 void __init devinet_init(void)
1950 {
1951 int i;
1952
1953 for (i = 0; i < IN4_ADDR_HSIZE; i++)
1954 INIT_HLIST_HEAD(&inet_addr_lst[i]);
1955
1956 register_pernet_subsys(&devinet_ops);
1957
1958 register_gifconf(PF_INET, inet_gifconf);
1959 register_netdevice_notifier(&ip_netdev_notifier);
1960
1961 rtnl_af_register(&inet_af_ops);
1962
1963 rtnl_register(PF_INET, RTM_NEWADDR, inet_rtm_newaddr, NULL, NULL);
1964 rtnl_register(PF_INET, RTM_DELADDR, inet_rtm_deladdr, NULL, NULL);
1965 rtnl_register(PF_INET, RTM_GETADDR, NULL, inet_dump_ifaddr, NULL);
1966 rtnl_register(PF_INET, RTM_GETNETCONF, inet_netconf_get_devconf,
1967 NULL, NULL);
1968 }
1969
This page took 0.09818 seconds and 4 git commands to generate.