2005-04-17 02:20:36 +04:00
/*
* IPv6 Address [ auto ] configuration
* Linux INET6 implementation
*
* Authors :
2007-02-09 17:24:49 +03:00
* Pedro Roque < roque @ di . fc . ul . pt >
2005-04-17 02:20:36 +04:00
* Alexey Kuznetsov < kuznet @ ms2 . inr . ac . ru >
*
* This program is free software ; you can redistribute it and / or
* modify it under the terms of the GNU General Public License
* as published by the Free Software Foundation ; either version
* 2 of the License , or ( at your option ) any later version .
*/
/*
* Changes :
*
* Janos Farkas : delete timer on ifdown
* < chexum @ bankinf . banki . hu >
* Andi Kleen : kill double kfree on module
* unload .
* Maciej W . Rozycki : FDDI support
* sekiya @ USAGI : Don ' t send too many RS
* packets .
* yoshfuji @ USAGI : Fixed interval between DAD
* packets .
* YOSHIFUJI Hideaki @ USAGI : improved accuracy of
* address validation timer .
* YOSHIFUJI Hideaki @ USAGI : Privacy Extensions ( RFC3041 )
* support .
* Yuji SEKIYA @ USAGI : Don ' t assign a same IPv6
* address on a same interface .
* YOSHIFUJI Hideaki @ USAGI : ARCnet support
* YOSHIFUJI Hideaki @ USAGI : convert / proc / net / if_inet6 to
* seq_file .
2005-11-08 20:38:12 +03:00
* YOSHIFUJI Hideaki @ USAGI : improved source address
* selection ; consider scope ,
* status etc .
2005-04-17 02:20:36 +04:00
*/
2012-05-15 18:11:53 +04:00
# define pr_fmt(fmt) "IPv6: " fmt
2005-04-17 02:20:36 +04:00
# include <linux/errno.h>
# include <linux/types.h>
2009-03-21 23:36:17 +03:00
# include <linux/kernel.h>
2017-02-02 21:15:33 +03:00
# include <linux/sched/signal.h>
2005-04-17 02:20:36 +04:00
# include <linux/socket.h>
# include <linux/sockios.h>
# include <linux/net.h>
2015-03-24 01:36:00 +03:00
# include <linux/inet.h>
2005-04-17 02:20:36 +04:00
# include <linux/in6.h>
# include <linux/netdevice.h>
2006-08-05 10:04:54 +04:00
# include <linux/if_addr.h>
2005-04-17 02:20:36 +04:00
# include <linux/if_arp.h>
# include <linux/if_arcnet.h>
# include <linux/if_infiniband.h>
# include <linux/route.h>
# include <linux/inetdevice.h>
# include <linux/init.h>
include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h
percpu.h is included by sched.h and module.h and thus ends up being
included when building most .c files. percpu.h includes slab.h which
in turn includes gfp.h making everything defined by the two files
universally available and complicating inclusion dependencies.
percpu.h -> slab.h dependency is about to be removed. Prepare for
this change by updating users of gfp and slab facilities include those
headers directly instead of assuming availability. As this conversion
needs to touch large number of source files, the following script is
used as the basis of conversion.
http://userweb.kernel.org/~tj/misc/slabh-sweep.py
The script does the followings.
* Scan files for gfp and slab usages and update includes such that
only the necessary includes are there. ie. if only gfp is used,
gfp.h, if slab is used, slab.h.
* When the script inserts a new include, it looks at the include
blocks and try to put the new include such that its order conforms
to its surrounding. It's put in the include block which contains
core kernel includes, in the same order that the rest are ordered -
alphabetical, Christmas tree, rev-Xmas-tree or at the end if there
doesn't seem to be any matching order.
* If the script can't find a place to put a new include (mostly
because the file doesn't have fitting include block), it prints out
an error message indicating which .h file needs to be added to the
file.
The conversion was done in the following steps.
1. The initial automatic conversion of all .c files updated slightly
over 4000 files, deleting around 700 includes and adding ~480 gfp.h
and ~3000 slab.h inclusions. The script emitted errors for ~400
files.
2. Each error was manually checked. Some didn't need the inclusion,
some needed manual addition while adding it to implementation .h or
embedding .c file was more appropriate for others. This step added
inclusions to around 150 files.
3. The script was run again and the output was compared to the edits
from #2 to make sure no file was left behind.
4. Several build tests were done and a couple of problems were fixed.
e.g. lib/decompress_*.c used malloc/free() wrappers around slab
APIs requiring slab.h to be added manually.
5. The script was run on all .h files but without automatically
editing them as sprinkling gfp.h and slab.h inclusions around .h
files could easily lead to inclusion dependency hell. Most gfp.h
inclusion directives were ignored as stuff from gfp.h was usually
wildly available and often used in preprocessor macros. Each
slab.h inclusion directive was examined and added manually as
necessary.
6. percpu.h was updated not to include slab.h.
7. Build test were done on the following configurations and failures
were fixed. CONFIG_GCOV_KERNEL was turned off for all tests (as my
distributed build env didn't work with gcov compiles) and a few
more options had to be turned off depending on archs to make things
build (like ipr on powerpc/64 which failed due to missing writeq).
* x86 and x86_64 UP and SMP allmodconfig and a custom test config.
* powerpc and powerpc64 SMP allmodconfig
* sparc and sparc64 SMP allmodconfig
* ia64 SMP allmodconfig
* s390 SMP allmodconfig
* alpha SMP allmodconfig
* um on x86_64 SMP allmodconfig
8. percpu.h modifications were reverted so that it could be applied as
a separate patch and serve as bisection point.
Given the fact that I had only a couple of failures from tests on step
6, I'm fairly confident about the coverage of this conversion patch.
If there is a breakage, it's likely to be something in one of the arch
headers which should be easily discoverable easily on most builds of
the specific arch.
Signed-off-by: Tejun Heo <tj@kernel.org>
Guess-its-ok-by: Christoph Lameter <cl@linux-foundation.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Lee Schermerhorn <Lee.Schermerhorn@hp.com>
2010-03-24 11:04:11 +03:00
# include <linux/slab.h>
2005-04-17 02:20:36 +04:00
# ifdef CONFIG_SYSCTL
# include <linux/sysctl.h>
# endif
2006-01-11 23:17:47 +03:00
# include <linux/capability.h>
2005-04-17 02:20:36 +04:00
# include <linux/delay.h>
# include <linux/notifier.h>
2005-06-23 11:09:02 +04:00
# include <linux/string.h>
2012-07-18 12:11:12 +04:00
# include <linux/hash.h>
2005-04-17 02:20:36 +04:00
2007-09-12 14:01:34 +04:00
# include <net/net_namespace.h>
2005-04-17 02:20:36 +04:00
# include <net/sock.h>
# include <net/snmp.h>
2015-12-14 22:55:22 +03:00
# include <net/6lowpan.h>
2013-03-25 12:26:24 +04:00
# include <net/firewire.h>
2005-04-17 02:20:36 +04:00
# include <net/ipv6.h>
# include <net/protocol.h>
# include <net/ndisc.h>
# include <net/ip6_route.h>
# include <net/addrconf.h>
# include <net/tcp.h>
# include <net/ip.h>
2006-08-15 11:35:02 +04:00
# include <net/netlink.h>
2007-10-10 13:53:43 +04:00
# include <net/pkt_sched.h>
2015-10-12 21:47:10 +03:00
# include <net/l3mdev.h>
2005-04-17 02:20:36 +04:00
# include <linux/if_tunnel.h>
# include <linux/rtnetlink.h>
2012-10-26 02:28:50 +04:00
# include <linux/netconf.h>
2005-04-17 02:20:36 +04:00
# include <linux/random.h>
2010-03-21 02:09:01 +03:00
# include <linux/uaccess.h>
2007-04-25 08:54:09 +04:00
# include <asm/unaligned.h>
2005-04-17 02:20:36 +04:00
# include <linux/proc_fs.h>
# include <linux/seq_file.h>
2011-07-15 19:47:34 +04:00
# include <linux/export.h>
2005-04-17 02:20:36 +04:00
# define INFINITY_LIFE_TIME 0xFFFFFFFF
2010-11-17 07:12:02 +03:00
2015-03-24 01:36:00 +03:00
# define IPV6_MAX_STRLEN \
sizeof ( " ffff:ffff:ffff:ffff:ffff:ffff:255.255.255.255 " )
2010-11-17 07:12:02 +03:00
static inline u32 cstamp_delta ( unsigned long cstamp )
{
return ( cstamp - INITIAL_JIFFIES ) * 100UL / HZ ;
}
2005-04-17 02:20:36 +04:00
2016-09-28 09:57:58 +03:00
static inline s32 rfc3315_s14_backoff_init ( s32 irt )
{
/* multiply 'initial retransmission time' by 0.9 .. 1.1 */
u64 tmp = ( 900000 + prandom_u32 ( ) % 200001 ) * ( u64 ) irt ;
do_div ( tmp , 1000000 ) ;
return ( s32 ) tmp ;
}
static inline s32 rfc3315_s14_backoff_update ( s32 rt , s32 mrt )
{
/* multiply 'retransmission timeout' by 1.9 .. 2.1 */
u64 tmp = ( 1900000 + prandom_u32 ( ) % 200001 ) * ( u64 ) rt ;
do_div ( tmp , 1000000 ) ;
if ( ( s32 ) tmp > mrt ) {
/* multiply 'maximum retransmission time' by 0.9 .. 1.1 */
tmp = ( 900000 + prandom_u32 ( ) % 200001 ) * ( u64 ) mrt ;
do_div ( tmp , 1000000 ) ;
}
return ( s32 ) tmp ;
}
2005-04-17 02:20:36 +04:00
# ifdef CONFIG_SYSCTL
2014-07-26 02:25:09 +04:00
static int addrconf_sysctl_register ( struct inet6_dev * idev ) ;
2008-01-11 04:41:21 +03:00
static void addrconf_sysctl_unregister ( struct inet6_dev * idev ) ;
# else
2014-07-26 02:25:09 +04:00
static inline int addrconf_sysctl_register ( struct inet6_dev * idev )
2008-01-11 04:41:21 +03:00
{
2014-07-26 02:25:09 +04:00
return 0 ;
2008-01-11 04:41:21 +03:00
}
static inline void addrconf_sysctl_unregister ( struct inet6_dev * idev )
{
}
2005-04-17 02:20:36 +04:00
# endif
2016-10-13 19:50:02 +03:00
static void ipv6_regen_rndid ( struct inet6_dev * idev ) ;
static void ipv6_try_regen_rndid ( struct inet6_dev * idev , struct in6_addr * tmpaddr ) ;
2005-04-17 02:20:36 +04:00
2008-06-28 09:18:38 +04:00
static int ipv6_generate_eui64 ( u8 * eui , struct net_device * dev ) ;
2017-10-08 05:30:24 +03:00
static int ipv6_count_addresses ( const struct inet6_dev * idev ) ;
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 01:36:01 +03:00
static int ipv6_generate_stable_address ( struct in6_addr * addr ,
u8 dad_count ,
const struct inet6_dev * idev ) ;
2005-04-17 02:20:36 +04:00
2017-11-04 18:53:27 +03:00
# define IN6_ADDR_HSIZE_SHIFT 8
# define IN6_ADDR_HSIZE (1 << IN6_ADDR_HSIZE_SHIFT)
2005-04-17 02:20:36 +04:00
/*
* Configured unicast address hash table
*/
2010-03-17 23:31:10 +03:00
static struct hlist_head inet6_addr_lst [ IN6_ADDR_HSIZE ] ;
2010-03-17 23:31:11 +03:00
static DEFINE_SPINLOCK ( addrconf_hash_lock ) ;
2005-04-17 02:20:36 +04:00
2014-03-27 21:28:07 +04:00
static void addrconf_verify ( void ) ;
static void addrconf_verify_rtnl ( void ) ;
static void addrconf_verify_work ( struct work_struct * ) ;
2005-04-17 02:20:36 +04:00
2014-03-27 21:28:07 +04:00
static struct workqueue_struct * addrconf_wq ;
static DECLARE_DELAYED_WORK ( addr_chk_work , addrconf_verify_work ) ;
2005-04-17 02:20:36 +04:00
static void addrconf_join_anycast ( struct inet6_ifaddr * ifp ) ;
static void addrconf_leave_anycast ( struct inet6_ifaddr * ifp ) ;
2010-03-10 13:28:56 +03:00
static void addrconf_type_change ( struct net_device * dev ,
unsigned long event ) ;
2005-04-17 02:20:36 +04:00
static int addrconf_ifdown ( struct net_device * dev , int how ) ;
2018-04-18 03:33:26 +03:00
static struct fib6_info * addrconf_get_prefix_route ( const struct in6_addr * pfx ,
2013-01-10 01:06:03 +04:00
int plen ,
const struct net_device * dev ,
u32 flags , u32 noflags ) ;
2012-04-15 05:37:40 +04:00
static void addrconf_dad_start ( struct inet6_ifaddr * ifp ) ;
2014-03-27 21:28:07 +04:00
static void addrconf_dad_work ( struct work_struct * w ) ;
2018-01-26 07:16:29 +03:00
static void addrconf_dad_completed ( struct inet6_ifaddr * ifp , bool bump_id ,
bool send_na ) ;
2018-11-21 16:52:33 +03:00
static void addrconf_dad_run ( struct inet6_dev * idev , bool restart ) ;
treewide: setup_timer() -> timer_setup()
This converts all remaining cases of the old setup_timer() API into using
timer_setup(), where the callback argument is the structure already
holding the struct timer_list. These should have no behavioral changes,
since they just change which pointer is passed into the callback with
the same available pointers after conversion. It handles the following
examples, in addition to some other variations.
Casting from unsigned long:
void my_callback(unsigned long data)
{
struct something *ptr = (struct something *)data;
...
}
...
setup_timer(&ptr->my_timer, my_callback, ptr);
and forced object casts:
void my_callback(struct something *ptr)
{
...
}
...
setup_timer(&ptr->my_timer, my_callback, (unsigned long)ptr);
become:
void my_callback(struct timer_list *t)
{
struct something *ptr = from_timer(ptr, t, my_timer);
...
}
...
timer_setup(&ptr->my_timer, my_callback, 0);
Direct function assignments:
void my_callback(unsigned long data)
{
struct something *ptr = (struct something *)data;
...
}
...
ptr->my_timer.function = my_callback;
have a temporary cast added, along with converting the args:
void my_callback(struct timer_list *t)
{
struct something *ptr = from_timer(ptr, t, my_timer);
...
}
...
ptr->my_timer.function = (TIMER_FUNC_TYPE)my_callback;
And finally, callbacks without a data assignment:
void my_callback(unsigned long data)
{
...
}
...
setup_timer(&ptr->my_timer, my_callback, 0);
have their argument renamed to verify they're unused during conversion:
void my_callback(struct timer_list *unused)
{
...
}
...
timer_setup(&ptr->my_timer, my_callback, 0);
The conversion is done with the following Coccinelle script:
spatch --very-quiet --all-includes --include-headers \
-I ./arch/x86/include -I ./arch/x86/include/generated \
-I ./include -I ./arch/x86/include/uapi \
-I ./arch/x86/include/generated/uapi -I ./include/uapi \
-I ./include/generated/uapi --include ./include/linux/kconfig.h \
--dir . \
--cocci-file ~/src/data/timer_setup.cocci
@fix_address_of@
expression e;
@@
setup_timer(
-&(e)
+&e
, ...)
// Update any raw setup_timer() usages that have a NULL callback, but
// would otherwise match change_timer_function_usage, since the latter
// will update all function assignments done in the face of a NULL
// function initialization in setup_timer().
@change_timer_function_usage_NULL@
expression _E;
identifier _timer;
type _cast_data;
@@
(
-setup_timer(&_E->_timer, NULL, _E);
+timer_setup(&_E->_timer, NULL, 0);
|
-setup_timer(&_E->_timer, NULL, (_cast_data)_E);
+timer_setup(&_E->_timer, NULL, 0);
|
-setup_timer(&_E._timer, NULL, &_E);
+timer_setup(&_E._timer, NULL, 0);
|
-setup_timer(&_E._timer, NULL, (_cast_data)&_E);
+timer_setup(&_E._timer, NULL, 0);
)
@change_timer_function_usage@
expression _E;
identifier _timer;
struct timer_list _stl;
identifier _callback;
type _cast_func, _cast_data;
@@
(
-setup_timer(&_E->_timer, _callback, _E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, &_callback, _E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, _callback, (_cast_data)_E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, &_callback, (_cast_data)_E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, (_cast_func)_callback, _E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, (_cast_func)&_callback, _E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, (_cast_func)_callback, (_cast_data)_E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, (_cast_func)&_callback, (_cast_data)_E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E._timer, _callback, (_cast_data)_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, _callback, (_cast_data)&_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, &_callback, (_cast_data)_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, &_callback, (_cast_data)&_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, (_cast_func)_callback, (_cast_data)_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, (_cast_func)_callback, (_cast_data)&_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, (_cast_func)&_callback, (_cast_data)_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, (_cast_func)&_callback, (_cast_data)&_E);
+timer_setup(&_E._timer, _callback, 0);
|
_E->_timer@_stl.function = _callback;
|
_E->_timer@_stl.function = &_callback;
|
_E->_timer@_stl.function = (_cast_func)_callback;
|
_E->_timer@_stl.function = (_cast_func)&_callback;
|
_E._timer@_stl.function = _callback;
|
_E._timer@_stl.function = &_callback;
|
_E._timer@_stl.function = (_cast_func)_callback;
|
_E._timer@_stl.function = (_cast_func)&_callback;
)
// callback(unsigned long arg)
@change_callback_handle_cast
depends on change_timer_function_usage@
identifier change_timer_function_usage._callback;
identifier change_timer_function_usage._timer;
type _origtype;
identifier _origarg;
type _handletype;
identifier _handle;
@@
void _callback(
-_origtype _origarg
+struct timer_list *t
)
{
(
... when != _origarg
_handletype *_handle =
-(_handletype *)_origarg;
+from_timer(_handle, t, _timer);
... when != _origarg
|
... when != _origarg
_handletype *_handle =
-(void *)_origarg;
+from_timer(_handle, t, _timer);
... when != _origarg
|
... when != _origarg
_handletype *_handle;
... when != _handle
_handle =
-(_handletype *)_origarg;
+from_timer(_handle, t, _timer);
... when != _origarg
|
... when != _origarg
_handletype *_handle;
... when != _handle
_handle =
-(void *)_origarg;
+from_timer(_handle, t, _timer);
... when != _origarg
)
}
// callback(unsigned long arg) without existing variable
@change_callback_handle_cast_no_arg
depends on change_timer_function_usage &&
!change_callback_handle_cast@
identifier change_timer_function_usage._callback;
identifier change_timer_function_usage._timer;
type _origtype;
identifier _origarg;
type _handletype;
@@
void _callback(
-_origtype _origarg
+struct timer_list *t
)
{
+ _handletype *_origarg = from_timer(_origarg, t, _timer);
+
... when != _origarg
- (_handletype *)_origarg
+ _origarg
... when != _origarg
}
// Avoid already converted callbacks.
@match_callback_converted
depends on change_timer_function_usage &&
!change_callback_handle_cast &&
!change_callback_handle_cast_no_arg@
identifier change_timer_function_usage._callback;
identifier t;
@@
void _callback(struct timer_list *t)
{ ... }
// callback(struct something *handle)
@change_callback_handle_arg
depends on change_timer_function_usage &&
!match_callback_converted &&
!change_callback_handle_cast &&
!change_callback_handle_cast_no_arg@
identifier change_timer_function_usage._callback;
identifier change_timer_function_usage._timer;
type _handletype;
identifier _handle;
@@
void _callback(
-_handletype *_handle
+struct timer_list *t
)
{
+ _handletype *_handle = from_timer(_handle, t, _timer);
...
}
// If change_callback_handle_arg ran on an empty function, remove
// the added handler.
@unchange_callback_handle_arg
depends on change_timer_function_usage &&
change_callback_handle_arg@
identifier change_timer_function_usage._callback;
identifier change_timer_function_usage._timer;
type _handletype;
identifier _handle;
identifier t;
@@
void _callback(struct timer_list *t)
{
- _handletype *_handle = from_timer(_handle, t, _timer);
}
// We only want to refactor the setup_timer() data argument if we've found
// the matching callback. This undoes changes in change_timer_function_usage.
@unchange_timer_function_usage
depends on change_timer_function_usage &&
!change_callback_handle_cast &&
!change_callback_handle_cast_no_arg &&
!change_callback_handle_arg@
expression change_timer_function_usage._E;
identifier change_timer_function_usage._timer;
identifier change_timer_function_usage._callback;
type change_timer_function_usage._cast_data;
@@
(
-timer_setup(&_E->_timer, _callback, 0);
+setup_timer(&_E->_timer, _callback, (_cast_data)_E);
|
-timer_setup(&_E._timer, _callback, 0);
+setup_timer(&_E._timer, _callback, (_cast_data)&_E);
)
// If we fixed a callback from a .function assignment, fix the
// assignment cast now.
@change_timer_function_assignment
depends on change_timer_function_usage &&
(change_callback_handle_cast ||
change_callback_handle_cast_no_arg ||
change_callback_handle_arg)@
expression change_timer_function_usage._E;
identifier change_timer_function_usage._timer;
identifier change_timer_function_usage._callback;
type _cast_func;
typedef TIMER_FUNC_TYPE;
@@
(
_E->_timer.function =
-_callback
+(TIMER_FUNC_TYPE)_callback
;
|
_E->_timer.function =
-&_callback
+(TIMER_FUNC_TYPE)_callback
;
|
_E->_timer.function =
-(_cast_func)_callback;
+(TIMER_FUNC_TYPE)_callback
;
|
_E->_timer.function =
-(_cast_func)&_callback
+(TIMER_FUNC_TYPE)_callback
;
|
_E._timer.function =
-_callback
+(TIMER_FUNC_TYPE)_callback
;
|
_E._timer.function =
-&_callback;
+(TIMER_FUNC_TYPE)_callback
;
|
_E._timer.function =
-(_cast_func)_callback
+(TIMER_FUNC_TYPE)_callback
;
|
_E._timer.function =
-(_cast_func)&_callback
+(TIMER_FUNC_TYPE)_callback
;
)
// Sometimes timer functions are called directly. Replace matched args.
@change_timer_function_calls
depends on change_timer_function_usage &&
(change_callback_handle_cast ||
change_callback_handle_cast_no_arg ||
change_callback_handle_arg)@
expression _E;
identifier change_timer_function_usage._timer;
identifier change_timer_function_usage._callback;
type _cast_data;
@@
_callback(
(
-(_cast_data)_E
+&_E->_timer
|
-(_cast_data)&_E
+&_E._timer
|
-_E
+&_E->_timer
)
)
// If a timer has been configured without a data argument, it can be
// converted without regard to the callback argument, since it is unused.
@match_timer_function_unused_data@
expression _E;
identifier _timer;
identifier _callback;
@@
(
-setup_timer(&_E->_timer, _callback, 0);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, _callback, 0L);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, _callback, 0UL);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E._timer, _callback, 0);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, _callback, 0L);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, _callback, 0UL);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_timer, _callback, 0);
+timer_setup(&_timer, _callback, 0);
|
-setup_timer(&_timer, _callback, 0L);
+timer_setup(&_timer, _callback, 0);
|
-setup_timer(&_timer, _callback, 0UL);
+timer_setup(&_timer, _callback, 0);
|
-setup_timer(_timer, _callback, 0);
+timer_setup(_timer, _callback, 0);
|
-setup_timer(_timer, _callback, 0L);
+timer_setup(_timer, _callback, 0);
|
-setup_timer(_timer, _callback, 0UL);
+timer_setup(_timer, _callback, 0);
)
@change_callback_unused_data
depends on match_timer_function_unused_data@
identifier match_timer_function_unused_data._callback;
type _origtype;
identifier _origarg;
@@
void _callback(
-_origtype _origarg
+struct timer_list *unused
)
{
... when != _origarg
}
Signed-off-by: Kees Cook <keescook@chromium.org>
2017-10-17 00:43:17 +03:00
static void addrconf_rs_timer ( struct timer_list * t ) ;
2005-04-17 02:20:36 +04:00
static void __ipv6_ifa_notify ( int event , struct inet6_ifaddr * ifa ) ;
static void ipv6_ifa_notify ( int event , struct inet6_ifaddr * ifa ) ;
2007-02-09 17:24:49 +03:00
static void inet6_prefix_notify ( int event , struct inet6_dev * idev ,
2005-04-17 02:20:36 +04:00
struct prefix_info * pinfo ) ;
2008-07-23 01:21:58 +04:00
static struct ipv6_devconf ipv6_devconf __read_mostly = {
2005-04-17 02:20:36 +04:00
. forwarding = 0 ,
. hop_limit = IPV6_DEFAULT_HOPLIMIT ,
. mtu6 = IPV6_MIN_MTU ,
. accept_ra = 1 ,
. accept_redirects = 1 ,
. autoconf = 1 ,
. force_mld_version = 0 ,
2013-08-14 03:03:46 +04:00
. mldv1_unsolicited_report_interval = 10 * HZ ,
. mldv2_unsolicited_report_interval = HZ ,
2005-04-17 02:20:36 +04:00
. dad_transmits = 1 ,
. rtr_solicits = MAX_RTR_SOLICITATIONS ,
. rtr_solicit_interval = RTR_SOLICITATION_INTERVAL ,
2016-09-28 09:57:58 +03:00
. rtr_solicit_max_interval = RTR_SOLICITATION_MAX_INTERVAL ,
2005-04-17 02:20:36 +04:00
. rtr_solicit_delay = MAX_RTR_SOLICITATION_DELAY ,
2014-08-25 00:53:10 +04:00
. use_tempaddr = 0 ,
2005-04-17 02:20:36 +04:00
. temp_valid_lft = TEMP_VALID_LIFETIME ,
. temp_prefered_lft = TEMP_PREFERRED_LIFETIME ,
. regen_max_retry = REGEN_MAX_RETRY ,
. max_desync_factor = MAX_DESYNC_FACTOR ,
. max_addresses = IPV6_MAX_ADDRESSES ,
2006-03-21 03:55:08 +03:00
. accept_ra_defrtr = 1 ,
2014-06-26 01:44:53 +04:00
. accept_ra_from_local = 0 ,
2015-07-30 09:28:42 +03:00
. accept_ra_min_hop_limit = 1 ,
2006-03-21 03:55:26 +03:00
. accept_ra_pinfo = 1 ,
2006-03-21 04:05:30 +03:00
# ifdef CONFIG_IPV6_ROUTER_PREF
. accept_ra_rtr_pref = 1 ,
2006-03-21 04:05:47 +03:00
. rtr_probe_interval = 60 * HZ ,
2006-03-21 04:07:03 +03:00
# ifdef CONFIG_IPV6_ROUTE_INFO
2017-03-22 12:19:04 +03:00
. accept_ra_rt_info_min_plen = 0 ,
2006-03-21 04:07:03 +03:00
. accept_ra_rt_info_max_plen = 0 ,
# endif
2006-03-21 04:05:30 +03:00
# endif
2006-09-23 01:43:49 +04:00
. proxy_ndp = 0 ,
2007-04-25 01:58:30 +04:00
. accept_source_route = 0 , /* we do not accept RH0 by default. */
2008-06-28 09:17:11 +04:00
. disable_ipv6 = 0 ,
2017-11-14 16:21:32 +03:00
. accept_dad = 0 ,
2013-08-27 03:36:51 +04:00
. suppress_frag_ndisc = 1 ,
2015-01-20 20:06:05 +03:00
. accept_ra_mtu = 1 ,
2015-03-24 01:36:00 +03:00
. stable_secret = {
. initialized = false ,
2015-07-22 10:38:25 +03:00
} ,
. use_oif_addrs_only = 0 ,
2015-08-13 17:39:01 +03:00
. ignore_routes_with_linkdown = 0 ,
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-24 20:25:37 +03:00
. keep_addr_on_down = 0 ,
2016-11-08 16:57:39 +03:00
. seg6_enabled = 0 ,
2016-11-08 16:57:42 +03:00
# ifdef CONFIG_IPV6_SEG6_HMAC
. seg6_require_hmac = 0 ,
# endif
2016-12-03 01:00:08 +03:00
. enhanced_dad = 1 ,
2017-01-26 06:59:17 +03:00
. addr_gen_mode = IN6_ADDR_GEN_MODE_EUI64 ,
2017-02-23 19:27:18 +03:00
. disable_policy = 0 ,
2005-04-17 02:20:36 +04:00
} ;
2006-09-23 01:15:41 +04:00
static struct ipv6_devconf ipv6_devconf_dflt __read_mostly = {
2005-04-17 02:20:36 +04:00
. forwarding = 0 ,
. hop_limit = IPV6_DEFAULT_HOPLIMIT ,
. mtu6 = IPV6_MIN_MTU ,
. accept_ra = 1 ,
. accept_redirects = 1 ,
. autoconf = 1 ,
2013-08-14 03:03:46 +04:00
. force_mld_version = 0 ,
. mldv1_unsolicited_report_interval = 10 * HZ ,
. mldv2_unsolicited_report_interval = HZ ,
2005-04-17 02:20:36 +04:00
. dad_transmits = 1 ,
. rtr_solicits = MAX_RTR_SOLICITATIONS ,
. rtr_solicit_interval = RTR_SOLICITATION_INTERVAL ,
2016-09-28 09:57:58 +03:00
. rtr_solicit_max_interval = RTR_SOLICITATION_MAX_INTERVAL ,
2005-04-17 02:20:36 +04:00
. rtr_solicit_delay = MAX_RTR_SOLICITATION_DELAY ,
. use_tempaddr = 0 ,
. temp_valid_lft = TEMP_VALID_LIFETIME ,
. temp_prefered_lft = TEMP_PREFERRED_LIFETIME ,
. regen_max_retry = REGEN_MAX_RETRY ,
. max_desync_factor = MAX_DESYNC_FACTOR ,
. max_addresses = IPV6_MAX_ADDRESSES ,
2006-03-21 03:55:08 +03:00
. accept_ra_defrtr = 1 ,
2014-06-26 01:44:53 +04:00
. accept_ra_from_local = 0 ,
2015-07-30 09:28:42 +03:00
. accept_ra_min_hop_limit = 1 ,
2006-03-21 03:55:26 +03:00
. accept_ra_pinfo = 1 ,
2006-03-21 04:05:30 +03:00
# ifdef CONFIG_IPV6_ROUTER_PREF
. accept_ra_rtr_pref = 1 ,
2006-03-21 04:05:47 +03:00
. rtr_probe_interval = 60 * HZ ,
2006-03-21 04:07:03 +03:00
# ifdef CONFIG_IPV6_ROUTE_INFO
2017-03-22 12:19:04 +03:00
. accept_ra_rt_info_min_plen = 0 ,
2006-03-21 04:07:03 +03:00
. accept_ra_rt_info_max_plen = 0 ,
# endif
2006-03-21 04:05:30 +03:00
# endif
2006-09-23 01:43:49 +04:00
. proxy_ndp = 0 ,
2007-04-25 01:58:30 +04:00
. accept_source_route = 0 , /* we do not accept RH0 by default. */
2008-06-28 09:17:11 +04:00
. disable_ipv6 = 0 ,
2008-06-28 09:18:38 +04:00
. accept_dad = 1 ,
2013-08-27 03:36:51 +04:00
. suppress_frag_ndisc = 1 ,
2015-01-20 20:06:05 +03:00
. accept_ra_mtu = 1 ,
2015-03-24 01:36:00 +03:00
. stable_secret = {
. initialized = false ,
} ,
2015-07-22 10:38:25 +03:00
. use_oif_addrs_only = 0 ,
2015-08-13 17:39:01 +03:00
. ignore_routes_with_linkdown = 0 ,
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-24 20:25:37 +03:00
. keep_addr_on_down = 0 ,
2016-11-08 16:57:39 +03:00
. seg6_enabled = 0 ,
2016-11-08 16:57:42 +03:00
# ifdef CONFIG_IPV6_SEG6_HMAC
. seg6_require_hmac = 0 ,
# endif
2016-12-03 01:00:08 +03:00
. enhanced_dad = 1 ,
2017-01-26 06:59:17 +03:00
. addr_gen_mode = IN6_ADDR_GEN_MODE_EUI64 ,
2017-02-23 19:27:18 +03:00
. disable_policy = 0 ,
2005-04-17 02:20:36 +04:00
} ;
2017-09-26 00:01:36 +03:00
/* Check if link is ready: is it up and is a valid qdisc available */
static inline bool addrconf_link_ready ( const struct net_device * dev )
2007-10-10 13:53:43 +04:00
{
2017-09-26 00:01:36 +03:00
return netif_oper_up ( dev ) & & ! qdisc_tx_is_noop ( dev ) ;
2007-10-10 13:53:43 +04:00
}
2013-06-23 20:39:01 +04:00
static void addrconf_del_rs_timer ( struct inet6_dev * idev )
2005-04-17 02:20:36 +04:00
{
2013-06-23 20:39:01 +04:00
if ( del_timer ( & idev - > rs_timer ) )
__in6_dev_put ( idev ) ;
}
2014-03-27 21:28:07 +04:00
static void addrconf_del_dad_work ( struct inet6_ifaddr * ifp )
2013-06-23 20:39:01 +04:00
{
2014-03-27 21:28:07 +04:00
if ( cancel_delayed_work ( & ifp - > dad_work ) )
2005-04-17 02:20:36 +04:00
__in6_ifa_put ( ifp ) ;
}
2013-06-23 20:39:01 +04:00
static void addrconf_mod_rs_timer ( struct inet6_dev * idev ,
unsigned long when )
{
if ( ! timer_pending ( & idev - > rs_timer ) )
in6_dev_hold ( idev ) ;
mod_timer ( & idev - > rs_timer , jiffies + when ) ;
}
2005-04-17 02:20:36 +04:00
2014-03-27 21:28:07 +04:00
static void addrconf_mod_dad_work ( struct inet6_ifaddr * ifp ,
unsigned long delay )
2005-04-17 02:20:36 +04:00
{
ipv6: fix calling in6_ifa_hold incorrectly for dad work
Now when starting the dad work in addrconf_mod_dad_work, if the dad work
is idle and queued, it needs to hold ifa.
The problem is there's one gap in [1], during which if the pending dad work
is removed elsewhere. It will miss to hold ifa, but the dad word is still
idea and queue.
if (!delayed_work_pending(&ifp->dad_work))
in6_ifa_hold(ifp);
<--------------[1]
mod_delayed_work(addrconf_wq, &ifp->dad_work, delay);
An use-after-free issue can be caused by this.
Chen Wei found this issue when WARN_ON(!hlist_unhashed(&ifp->addr_lst)) in
net6_ifa_finish_destroy was hit because of it.
As Hannes' suggestion, this patch is to fix it by holding ifa first in
addrconf_mod_dad_work, then calling mod_delayed_work and putting ifa if
the dad_work is already in queue.
Note that this patch did not choose to fix it with:
if (!mod_delayed_work(delay))
in6_ifa_hold(ifp);
As with it, when delay == 0, dad_work would be scheduled immediately, all
addrconf_mod_dad_work(0) callings had to be moved under ifp->lock.
Reported-by: Wei Chen <weichen@redhat.com>
Suggested-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: Xin Long <lucien.xin@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-15 11:33:58 +03:00
in6_ifa_hold ( ifp ) ;
if ( mod_delayed_work ( addrconf_wq , & ifp - > dad_work , delay ) )
in6_ifa_put ( ifp ) ;
2005-04-17 02:20:36 +04:00
}
2007-04-25 08:54:09 +04:00
static int snmp6_alloc_dev ( struct inet6_dev * idev )
{
2013-10-08 02:51:58 +04:00
int i ;
2014-05-06 02:55:55 +04:00
idev - > stats . ipv6 = alloc_percpu ( struct ipstats_mib ) ;
if ( ! idev - > stats . ipv6 )
2007-04-25 08:54:09 +04:00
goto err_ip ;
2013-10-08 02:51:58 +04:00
for_each_possible_cpu ( i ) {
struct ipstats_mib * addrconf_stats ;
2014-05-06 02:55:55 +04:00
addrconf_stats = per_cpu_ptr ( idev - > stats . ipv6 , i ) ;
2013-10-08 02:51:58 +04:00
u64_stats_init ( & addrconf_stats - > syncp ) ;
}
2011-05-19 05:14:23 +04:00
idev - > stats . icmpv6dev = kzalloc ( sizeof ( struct icmpv6_mib_device ) ,
GFP_KERNEL ) ;
if ( ! idev - > stats . icmpv6dev )
2007-04-25 08:54:09 +04:00
goto err_icmp ;
2011-05-19 05:14:23 +04:00
idev - > stats . icmpv6msgdev = kzalloc ( sizeof ( struct icmpv6msg_mib_device ) ,
GFP_KERNEL ) ;
if ( ! idev - > stats . icmpv6msgdev )
2007-09-17 03:52:35 +04:00
goto err_icmpmsg ;
2007-04-25 08:54:09 +04:00
return 0 ;
2007-09-17 03:52:35 +04:00
err_icmpmsg :
2011-05-19 05:14:23 +04:00
kfree ( idev - > stats . icmpv6dev ) ;
2007-04-25 08:54:09 +04:00
err_icmp :
2014-05-06 02:55:55 +04:00
free_percpu ( idev - > stats . ipv6 ) ;
2007-04-25 08:54:09 +04:00
err_ip :
2007-10-18 08:25:32 +04:00
return - ENOMEM ;
2007-04-25 08:54:09 +04:00
}
2012-04-01 11:49:08 +04:00
static struct inet6_dev * ipv6_add_dev ( struct net_device * dev )
2005-04-17 02:20:36 +04:00
{
struct inet6_dev * ndev ;
2014-07-26 02:25:09 +04:00
int err = - ENOMEM ;
2005-04-17 02:20:36 +04:00
ASSERT_RTNL ( ) ;
if ( dev - > mtu < IPV6_MIN_MTU )
2014-07-26 02:25:09 +04:00
return ERR_PTR ( - EINVAL ) ;
2005-04-17 02:20:36 +04:00
2007-02-09 17:24:49 +03:00
ndev = kzalloc ( sizeof ( struct inet6_dev ) , GFP_KERNEL ) ;
2015-03-29 16:00:04 +03:00
if ( ! ndev )
2014-07-26 02:25:09 +04:00
return ERR_PTR ( err ) ;
2006-03-21 10:01:47 +03:00
rwlock_init ( & ndev - > lock ) ;
ndev - > dev = dev ;
2010-03-17 23:31:13 +03:00
INIT_LIST_HEAD ( & ndev - > addr_list ) ;
treewide: setup_timer() -> timer_setup()
This converts all remaining cases of the old setup_timer() API into using
timer_setup(), where the callback argument is the structure already
holding the struct timer_list. These should have no behavioral changes,
since they just change which pointer is passed into the callback with
the same available pointers after conversion. It handles the following
examples, in addition to some other variations.
Casting from unsigned long:
void my_callback(unsigned long data)
{
struct something *ptr = (struct something *)data;
...
}
...
setup_timer(&ptr->my_timer, my_callback, ptr);
and forced object casts:
void my_callback(struct something *ptr)
{
...
}
...
setup_timer(&ptr->my_timer, my_callback, (unsigned long)ptr);
become:
void my_callback(struct timer_list *t)
{
struct something *ptr = from_timer(ptr, t, my_timer);
...
}
...
timer_setup(&ptr->my_timer, my_callback, 0);
Direct function assignments:
void my_callback(unsigned long data)
{
struct something *ptr = (struct something *)data;
...
}
...
ptr->my_timer.function = my_callback;
have a temporary cast added, along with converting the args:
void my_callback(struct timer_list *t)
{
struct something *ptr = from_timer(ptr, t, my_timer);
...
}
...
ptr->my_timer.function = (TIMER_FUNC_TYPE)my_callback;
And finally, callbacks without a data assignment:
void my_callback(unsigned long data)
{
...
}
...
setup_timer(&ptr->my_timer, my_callback, 0);
have their argument renamed to verify they're unused during conversion:
void my_callback(struct timer_list *unused)
{
...
}
...
timer_setup(&ptr->my_timer, my_callback, 0);
The conversion is done with the following Coccinelle script:
spatch --very-quiet --all-includes --include-headers \
-I ./arch/x86/include -I ./arch/x86/include/generated \
-I ./include -I ./arch/x86/include/uapi \
-I ./arch/x86/include/generated/uapi -I ./include/uapi \
-I ./include/generated/uapi --include ./include/linux/kconfig.h \
--dir . \
--cocci-file ~/src/data/timer_setup.cocci
@fix_address_of@
expression e;
@@
setup_timer(
-&(e)
+&e
, ...)
// Update any raw setup_timer() usages that have a NULL callback, but
// would otherwise match change_timer_function_usage, since the latter
// will update all function assignments done in the face of a NULL
// function initialization in setup_timer().
@change_timer_function_usage_NULL@
expression _E;
identifier _timer;
type _cast_data;
@@
(
-setup_timer(&_E->_timer, NULL, _E);
+timer_setup(&_E->_timer, NULL, 0);
|
-setup_timer(&_E->_timer, NULL, (_cast_data)_E);
+timer_setup(&_E->_timer, NULL, 0);
|
-setup_timer(&_E._timer, NULL, &_E);
+timer_setup(&_E._timer, NULL, 0);
|
-setup_timer(&_E._timer, NULL, (_cast_data)&_E);
+timer_setup(&_E._timer, NULL, 0);
)
@change_timer_function_usage@
expression _E;
identifier _timer;
struct timer_list _stl;
identifier _callback;
type _cast_func, _cast_data;
@@
(
-setup_timer(&_E->_timer, _callback, _E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, &_callback, _E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, _callback, (_cast_data)_E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, &_callback, (_cast_data)_E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, (_cast_func)_callback, _E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, (_cast_func)&_callback, _E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, (_cast_func)_callback, (_cast_data)_E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, (_cast_func)&_callback, (_cast_data)_E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E._timer, _callback, (_cast_data)_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, _callback, (_cast_data)&_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, &_callback, (_cast_data)_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, &_callback, (_cast_data)&_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, (_cast_func)_callback, (_cast_data)_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, (_cast_func)_callback, (_cast_data)&_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, (_cast_func)&_callback, (_cast_data)_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, (_cast_func)&_callback, (_cast_data)&_E);
+timer_setup(&_E._timer, _callback, 0);
|
_E->_timer@_stl.function = _callback;
|
_E->_timer@_stl.function = &_callback;
|
_E->_timer@_stl.function = (_cast_func)_callback;
|
_E->_timer@_stl.function = (_cast_func)&_callback;
|
_E._timer@_stl.function = _callback;
|
_E._timer@_stl.function = &_callback;
|
_E._timer@_stl.function = (_cast_func)_callback;
|
_E._timer@_stl.function = (_cast_func)&_callback;
)
// callback(unsigned long arg)
@change_callback_handle_cast
depends on change_timer_function_usage@
identifier change_timer_function_usage._callback;
identifier change_timer_function_usage._timer;
type _origtype;
identifier _origarg;
type _handletype;
identifier _handle;
@@
void _callback(
-_origtype _origarg
+struct timer_list *t
)
{
(
... when != _origarg
_handletype *_handle =
-(_handletype *)_origarg;
+from_timer(_handle, t, _timer);
... when != _origarg
|
... when != _origarg
_handletype *_handle =
-(void *)_origarg;
+from_timer(_handle, t, _timer);
... when != _origarg
|
... when != _origarg
_handletype *_handle;
... when != _handle
_handle =
-(_handletype *)_origarg;
+from_timer(_handle, t, _timer);
... when != _origarg
|
... when != _origarg
_handletype *_handle;
... when != _handle
_handle =
-(void *)_origarg;
+from_timer(_handle, t, _timer);
... when != _origarg
)
}
// callback(unsigned long arg) without existing variable
@change_callback_handle_cast_no_arg
depends on change_timer_function_usage &&
!change_callback_handle_cast@
identifier change_timer_function_usage._callback;
identifier change_timer_function_usage._timer;
type _origtype;
identifier _origarg;
type _handletype;
@@
void _callback(
-_origtype _origarg
+struct timer_list *t
)
{
+ _handletype *_origarg = from_timer(_origarg, t, _timer);
+
... when != _origarg
- (_handletype *)_origarg
+ _origarg
... when != _origarg
}
// Avoid already converted callbacks.
@match_callback_converted
depends on change_timer_function_usage &&
!change_callback_handle_cast &&
!change_callback_handle_cast_no_arg@
identifier change_timer_function_usage._callback;
identifier t;
@@
void _callback(struct timer_list *t)
{ ... }
// callback(struct something *handle)
@change_callback_handle_arg
depends on change_timer_function_usage &&
!match_callback_converted &&
!change_callback_handle_cast &&
!change_callback_handle_cast_no_arg@
identifier change_timer_function_usage._callback;
identifier change_timer_function_usage._timer;
type _handletype;
identifier _handle;
@@
void _callback(
-_handletype *_handle
+struct timer_list *t
)
{
+ _handletype *_handle = from_timer(_handle, t, _timer);
...
}
// If change_callback_handle_arg ran on an empty function, remove
// the added handler.
@unchange_callback_handle_arg
depends on change_timer_function_usage &&
change_callback_handle_arg@
identifier change_timer_function_usage._callback;
identifier change_timer_function_usage._timer;
type _handletype;
identifier _handle;
identifier t;
@@
void _callback(struct timer_list *t)
{
- _handletype *_handle = from_timer(_handle, t, _timer);
}
// We only want to refactor the setup_timer() data argument if we've found
// the matching callback. This undoes changes in change_timer_function_usage.
@unchange_timer_function_usage
depends on change_timer_function_usage &&
!change_callback_handle_cast &&
!change_callback_handle_cast_no_arg &&
!change_callback_handle_arg@
expression change_timer_function_usage._E;
identifier change_timer_function_usage._timer;
identifier change_timer_function_usage._callback;
type change_timer_function_usage._cast_data;
@@
(
-timer_setup(&_E->_timer, _callback, 0);
+setup_timer(&_E->_timer, _callback, (_cast_data)_E);
|
-timer_setup(&_E._timer, _callback, 0);
+setup_timer(&_E._timer, _callback, (_cast_data)&_E);
)
// If we fixed a callback from a .function assignment, fix the
// assignment cast now.
@change_timer_function_assignment
depends on change_timer_function_usage &&
(change_callback_handle_cast ||
change_callback_handle_cast_no_arg ||
change_callback_handle_arg)@
expression change_timer_function_usage._E;
identifier change_timer_function_usage._timer;
identifier change_timer_function_usage._callback;
type _cast_func;
typedef TIMER_FUNC_TYPE;
@@
(
_E->_timer.function =
-_callback
+(TIMER_FUNC_TYPE)_callback
;
|
_E->_timer.function =
-&_callback
+(TIMER_FUNC_TYPE)_callback
;
|
_E->_timer.function =
-(_cast_func)_callback;
+(TIMER_FUNC_TYPE)_callback
;
|
_E->_timer.function =
-(_cast_func)&_callback
+(TIMER_FUNC_TYPE)_callback
;
|
_E._timer.function =
-_callback
+(TIMER_FUNC_TYPE)_callback
;
|
_E._timer.function =
-&_callback;
+(TIMER_FUNC_TYPE)_callback
;
|
_E._timer.function =
-(_cast_func)_callback
+(TIMER_FUNC_TYPE)_callback
;
|
_E._timer.function =
-(_cast_func)&_callback
+(TIMER_FUNC_TYPE)_callback
;
)
// Sometimes timer functions are called directly. Replace matched args.
@change_timer_function_calls
depends on change_timer_function_usage &&
(change_callback_handle_cast ||
change_callback_handle_cast_no_arg ||
change_callback_handle_arg)@
expression _E;
identifier change_timer_function_usage._timer;
identifier change_timer_function_usage._callback;
type _cast_data;
@@
_callback(
(
-(_cast_data)_E
+&_E->_timer
|
-(_cast_data)&_E
+&_E._timer
|
-_E
+&_E->_timer
)
)
// If a timer has been configured without a data argument, it can be
// converted without regard to the callback argument, since it is unused.
@match_timer_function_unused_data@
expression _E;
identifier _timer;
identifier _callback;
@@
(
-setup_timer(&_E->_timer, _callback, 0);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, _callback, 0L);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, _callback, 0UL);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E._timer, _callback, 0);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, _callback, 0L);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, _callback, 0UL);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_timer, _callback, 0);
+timer_setup(&_timer, _callback, 0);
|
-setup_timer(&_timer, _callback, 0L);
+timer_setup(&_timer, _callback, 0);
|
-setup_timer(&_timer, _callback, 0UL);
+timer_setup(&_timer, _callback, 0);
|
-setup_timer(_timer, _callback, 0);
+timer_setup(_timer, _callback, 0);
|
-setup_timer(_timer, _callback, 0L);
+timer_setup(_timer, _callback, 0);
|
-setup_timer(_timer, _callback, 0UL);
+timer_setup(_timer, _callback, 0);
)
@change_callback_unused_data
depends on match_timer_function_unused_data@
identifier match_timer_function_unused_data._callback;
type _origtype;
identifier _origarg;
@@
void _callback(
-_origtype _origarg
+struct timer_list *unused
)
{
... when != _origarg
}
Signed-off-by: Kees Cook <keescook@chromium.org>
2017-10-17 00:43:17 +03:00
timer_setup ( & ndev - > rs_timer , addrconf_rs_timer , 0 ) ;
2008-03-25 15:47:49 +03:00
memcpy ( & ndev - > cnf , dev_net ( dev ) - > ipv6 . devconf_dflt , sizeof ( ndev - > cnf ) ) ;
2015-12-16 00:59:12 +03:00
if ( ndev - > cnf . stable_secret . initialized )
2017-01-26 06:59:17 +03:00
ndev - > cnf . addr_gen_mode = IN6_ADDR_GEN_MODE_STABLE_PRIVACY ;
2015-12-16 00:59:12 +03:00
2006-03-21 10:01:47 +03:00
ndev - > cnf . mtu6 = dev - > mtu ;
ndev - > nd_parms = neigh_parms_alloc ( dev , & nd_tbl ) ;
2015-03-29 16:00:04 +03:00
if ( ! ndev - > nd_parms ) {
2006-03-21 10:01:47 +03:00
kfree ( ndev ) ;
2014-07-26 02:25:09 +04:00
return ERR_PTR ( err ) ;
2006-03-21 10:01:47 +03:00
}
2008-06-20 03:15:47 +04:00
if ( ndev - > cnf . forwarding )
dev_disable_lro ( dev ) ;
2006-03-21 10:01:47 +03:00
/* We refer to the device */
dev_hold ( dev ) ;
2005-04-17 02:20:36 +04:00
2006-03-21 10:01:47 +03:00
if ( snmp6_alloc_dev ( ndev ) < 0 ) {
2018-03-26 18:35:01 +03:00
netdev_dbg ( dev , " %s: cannot allocate memory for statistics \n " ,
__func__ ) ;
2006-03-21 10:01:47 +03:00
neigh_parms_release ( & nd_tbl , ndev - > nd_parms ) ;
2011-09-20 23:10:16 +04:00
dev_put ( dev ) ;
kfree ( ndev ) ;
2014-07-26 02:25:09 +04:00
return ERR_PTR ( err ) ;
2006-03-21 10:01:47 +03:00
}
2005-04-17 02:20:36 +04:00
2006-03-21 10:01:47 +03:00
if ( snmp6_register_dev ( ndev ) < 0 ) {
2018-03-26 18:35:01 +03:00
netdev_dbg ( dev , " %s: cannot create /proc/net/dev_snmp6/%s \n " ,
__func__ , dev - > name ) ;
2014-07-26 02:25:09 +04:00
goto err_release ;
2006-03-21 10:01:47 +03:00
}
2016-10-13 19:50:02 +03:00
/* One reference from device. */
2017-07-04 09:34:55 +03:00
refcount_set ( & ndev - > refcnt , 1 ) ;
2005-04-17 02:20:36 +04:00
2008-06-28 09:18:38 +04:00
if ( dev - > flags & ( IFF_NOARP | IFF_LOOPBACK ) )
ndev - > cnf . accept_dad = - 1 ;
2012-10-29 20:23:10 +04:00
# if IS_ENABLED(CONFIG_IPV6_SIT)
2008-04-14 10:42:18 +04:00
if ( dev - > type = = ARPHRD_SIT & & ( dev - > priv_flags & IFF_ISATAP ) ) {
2012-05-15 18:11:53 +04:00
pr_info ( " %s: Disabled Multicast RS \n " , dev - > name ) ;
2008-04-14 10:42:18 +04:00
ndev - > cnf . rtr_solicits = 0 ;
}
# endif
2010-03-17 23:31:09 +03:00
INIT_LIST_HEAD ( & ndev - > tempaddr_list ) ;
2016-10-13 19:52:15 +03:00
ndev - > desync_factor = U32_MAX ;
2006-03-21 10:01:47 +03:00
if ( ( dev - > flags & IFF_LOOPBACK ) | |
dev - > type = = ARPHRD_TUNNEL | |
2008-04-14 10:47:11 +04:00
dev - > type = = ARPHRD_TUNNEL6 | |
2006-10-11 01:49:53 +04:00
dev - > type = = ARPHRD_SIT | |
dev - > type = = ARPHRD_NONE ) {
2006-03-21 10:01:47 +03:00
ndev - > cnf . use_tempaddr = - 1 ;
2016-10-13 19:50:02 +03:00
} else
ipv6_regen_rndid ( ndev ) ;
2013-10-29 04:07:50 +04:00
2013-04-09 07:47:14 +04:00
ndev - > token = in6addr_any ;
2005-04-17 02:20:36 +04:00
2017-09-26 00:01:36 +03:00
if ( netif_running ( dev ) & & addrconf_link_ready ( dev ) )
2007-03-28 01:31:52 +04:00
ndev - > if_flags | = IF_READY ;
2006-03-21 10:01:47 +03:00
ipv6_mc_init_dev ( ndev ) ;
ndev - > tstamp = jiffies ;
2014-07-26 02:25:09 +04:00
err = addrconf_sysctl_register ( ndev ) ;
if ( err ) {
ipv6_mc_destroy_dev ( ndev ) ;
2015-11-04 16:47:53 +03:00
snmp6_unregister_dev ( ndev ) ;
2014-07-26 02:25:09 +04:00
goto err_release ;
}
2007-01-04 23:31:14 +03:00
/* protected by rtnl_lock */
2012-01-12 08:41:32 +04:00
rcu_assign_pointer ( dev - > ip6_ptr , ndev ) ;
2007-01-15 08:48:40 +03:00
2013-02-10 07:50:18 +04:00
/* Join interface-local all-node multicast group */
ipv6_dev_mc_inc ( dev , & in6addr_interfacelocal_allnodes ) ;
2007-01-15 08:48:40 +03:00
/* Join all-node multicast group */
2008-04-10 10:42:11 +04:00
ipv6_dev_mc_inc ( dev , & in6addr_linklocal_allnodes ) ;
2007-01-15 08:48:40 +03:00
2012-03-05 18:45:17 +04:00
/* Join all-router multicast group if forwarding is set */
2012-03-07 18:58:07 +04:00
if ( ndev - > cnf . forwarding & & ( dev - > flags & IFF_MULTICAST ) )
2012-03-05 18:45:17 +04:00
ipv6_dev_mc_inc ( dev , & in6addr_linklocal_allrouters ) ;
2005-04-17 02:20:36 +04:00
return ndev ;
2014-07-26 02:25:09 +04:00
err_release :
neigh_parms_release ( & nd_tbl , ndev - > nd_parms ) ;
ndev - > dead = 1 ;
in6_dev_finish_destroy ( ndev ) ;
return ERR_PTR ( err ) ;
2005-04-17 02:20:36 +04:00
}
2012-04-01 11:49:08 +04:00
static struct inet6_dev * ipv6_find_idev ( struct net_device * dev )
2005-04-17 02:20:36 +04:00
{
struct inet6_dev * idev ;
ASSERT_RTNL ( ) ;
2010-03-21 02:09:01 +03:00
idev = __in6_dev_get ( dev ) ;
if ( ! idev ) {
idev = ipv6_add_dev ( dev ) ;
2014-07-26 02:25:09 +04:00
if ( IS_ERR ( idev ) )
2005-04-17 02:20:36 +04:00
return NULL ;
}
2005-12-21 16:57:44 +03:00
2005-04-17 02:20:36 +04:00
if ( dev - > flags & IFF_UP )
ipv6_mc_up ( idev ) ;
return idev ;
}
2012-10-26 02:28:50 +04:00
static int inet6_netconf_msgsize_devconf ( int type )
{
int size = NLMSG_ALIGN ( sizeof ( struct netconfmsg ) )
+ nla_total_size ( 4 ) ; /* NETCONFA_IFINDEX */
2016-03-10 11:55:50 +03:00
bool all = false ;
2012-10-26 02:28:50 +04:00
2016-03-10 11:55:50 +03:00
if ( type = = NETCONFA_ALL )
all = true ;
if ( all | | type = = NETCONFA_FORWARDING )
2012-10-26 02:28:50 +04:00
size + = nla_total_size ( 4 ) ;
2012-12-04 23:46:34 +04:00
# ifdef CONFIG_IPV6_MROUTE
2016-03-10 11:55:50 +03:00
if ( all | | type = = NETCONFA_MC_FORWARDING )
2012-12-04 05:13:35 +04:00
size + = nla_total_size ( 4 ) ;
2012-12-04 23:46:34 +04:00
# endif
2016-03-10 11:55:50 +03:00
if ( all | | type = = NETCONFA_PROXY_NEIGH )
2013-12-18 10:37:14 +04:00
size + = nla_total_size ( 4 ) ;
2012-10-26 02:28:50 +04:00
2016-03-10 11:55:50 +03:00
if ( all | | type = = NETCONFA_IGNORE_ROUTES_WITH_LINKDOWN )
2015-08-13 17:39:01 +03:00
size + = nla_total_size ( 4 ) ;
2012-10-26 02:28:50 +04:00
return size ;
}
static int inet6_netconf_fill_devconf ( struct sk_buff * skb , int ifindex ,
struct ipv6_devconf * devconf , u32 portid ,
u32 seq , int event , unsigned int flags ,
int type )
{
struct nlmsghdr * nlh ;
struct netconfmsg * ncm ;
2016-03-10 11:55:50 +03:00
bool all = false ;
2012-10-26 02:28:50 +04:00
nlh = nlmsg_put ( skb , portid , seq , event , sizeof ( struct netconfmsg ) ,
flags ) ;
2015-03-29 16:00:04 +03:00
if ( ! nlh )
2012-10-26 02:28:50 +04:00
return - EMSGSIZE ;
2016-03-10 11:55:50 +03:00
if ( type = = NETCONFA_ALL )
all = true ;
2012-10-26 02:28:50 +04:00
ncm = nlmsg_data ( nlh ) ;
ncm - > ncm_family = AF_INET6 ;
if ( nla_put_s32 ( skb , NETCONFA_IFINDEX , ifindex ) < 0 )
goto nla_put_failure ;
2017-03-29 00:28:05 +03:00
if ( ! devconf )
goto out ;
2016-03-10 11:55:50 +03:00
if ( ( all | | type = = NETCONFA_FORWARDING ) & &
2012-10-26 02:28:50 +04:00
nla_put_s32 ( skb , NETCONFA_FORWARDING , devconf - > forwarding ) < 0 )
goto nla_put_failure ;
2012-12-04 23:46:34 +04:00
# ifdef CONFIG_IPV6_MROUTE
2016-03-10 11:55:50 +03:00
if ( ( all | | type = = NETCONFA_MC_FORWARDING ) & &
2012-12-04 05:13:35 +04:00
nla_put_s32 ( skb , NETCONFA_MC_FORWARDING ,
devconf - > mc_forwarding ) < 0 )
goto nla_put_failure ;
2012-12-04 23:46:34 +04:00
# endif
2016-03-10 11:55:50 +03:00
if ( ( all | | type = = NETCONFA_PROXY_NEIGH ) & &
2013-12-18 10:37:14 +04:00
nla_put_s32 ( skb , NETCONFA_PROXY_NEIGH , devconf - > proxy_ndp ) < 0 )
goto nla_put_failure ;
2016-03-10 11:55:50 +03:00
if ( ( all | | type = = NETCONFA_IGNORE_ROUTES_WITH_LINKDOWN ) & &
2015-08-13 17:39:01 +03:00
nla_put_s32 ( skb , NETCONFA_IGNORE_ROUTES_WITH_LINKDOWN ,
devconf - > ignore_routes_with_linkdown ) < 0 )
goto nla_put_failure ;
2017-03-29 00:28:05 +03:00
out :
2015-01-17 00:09:00 +03:00
nlmsg_end ( skb , nlh ) ;
return 0 ;
2012-10-26 02:28:50 +04:00
nla_put_failure :
nlmsg_cancel ( skb , nlh ) ;
return - EMSGSIZE ;
}
2017-03-29 00:28:04 +03:00
void inet6_netconf_notify_devconf ( struct net * net , int event , int type ,
int ifindex , struct ipv6_devconf * devconf )
2012-10-26 02:28:50 +04:00
{
struct sk_buff * skb ;
int err = - ENOBUFS ;
2016-07-08 06:46:04 +03:00
skb = nlmsg_new ( inet6_netconf_msgsize_devconf ( type ) , GFP_KERNEL ) ;
2015-03-29 16:00:04 +03:00
if ( ! skb )
2012-10-26 02:28:50 +04:00
goto errout ;
err = inet6_netconf_fill_devconf ( skb , ifindex , devconf , 0 , 0 ,
2017-03-29 00:28:04 +03:00
event , 0 , type ) ;
2012-10-26 02:28:50 +04:00
if ( err < 0 ) {
/* -EMSGSIZE implies BUG in inet6_netconf_msgsize_devconf() */
WARN_ON ( err = = - EMSGSIZE ) ;
kfree_skb ( skb ) ;
goto errout ;
}
2016-07-08 06:46:04 +03:00
rtnl_notify ( skb , net , 0 , RTNLGRP_IPV6_NETCONF , NULL , GFP_KERNEL ) ;
2012-10-26 02:28:50 +04:00
return ;
errout :
2012-12-18 16:08:56 +04:00
rtnl_set_sk_err ( net , RTNLGRP_IPV6_NETCONF , err ) ;
2012-10-26 02:28:50 +04:00
}
2012-10-26 02:28:51 +04:00
static const struct nla_policy devconf_ipv6_policy [ NETCONFA_MAX + 1 ] = {
[ NETCONFA_IFINDEX ] = { . len = sizeof ( int ) } ,
[ NETCONFA_FORWARDING ] = { . len = sizeof ( int ) } ,
2013-12-18 10:37:14 +04:00
[ NETCONFA_PROXY_NEIGH ] = { . len = sizeof ( int ) } ,
2015-08-13 17:39:01 +03:00
[ NETCONFA_IGNORE_ROUTES_WITH_LINKDOWN ] = { . len = sizeof ( int ) } ,
2012-10-26 02:28:51 +04:00
} ;
2019-01-18 21:46:22 +03:00
static int inet6_netconf_valid_get_req ( struct sk_buff * skb ,
const struct nlmsghdr * nlh ,
struct nlattr * * tb ,
struct netlink_ext_ack * extack )
{
int i , err ;
if ( nlh - > nlmsg_len < nlmsg_msg_size ( sizeof ( struct netconfmsg ) ) ) {
NL_SET_ERR_MSG_MOD ( extack , " Invalid header for netconf get request " ) ;
return - EINVAL ;
}
if ( ! netlink_strict_get_check ( skb ) )
return nlmsg_parse ( nlh , sizeof ( struct netconfmsg ) , tb ,
NETCONFA_MAX , devconf_ipv6_policy , extack ) ;
err = nlmsg_parse_strict ( nlh , sizeof ( struct netconfmsg ) , tb ,
NETCONFA_MAX , devconf_ipv6_policy , extack ) ;
if ( err )
return err ;
for ( i = 0 ; i < = NETCONFA_MAX ; i + + ) {
if ( ! tb [ i ] )
continue ;
switch ( i ) {
case NETCONFA_IFINDEX :
break ;
default :
NL_SET_ERR_MSG_MOD ( extack , " Unsupported attribute in netconf get request " ) ;
return - EINVAL ;
}
}
return 0 ;
}
2012-10-26 02:28:51 +04:00
static int inet6_netconf_get_devconf ( struct sk_buff * in_skb ,
2017-04-16 19:48:24 +03:00
struct nlmsghdr * nlh ,
struct netlink_ext_ack * extack )
2012-10-26 02:28:51 +04:00
{
struct net * net = sock_net ( in_skb - > sk ) ;
struct nlattr * tb [ NETCONFA_MAX + 1 ] ;
2017-10-11 11:28:00 +03:00
struct inet6_dev * in6_dev = NULL ;
struct net_device * dev = NULL ;
2012-10-26 02:28:51 +04:00
struct sk_buff * skb ;
struct ipv6_devconf * devconf ;
int ifindex ;
int err ;
2019-01-18 21:46:22 +03:00
err = inet6_netconf_valid_get_req ( in_skb , nlh , tb , extack ) ;
2012-10-26 02:28:51 +04:00
if ( err < 0 )
2017-10-11 11:28:00 +03:00
return err ;
2012-10-26 02:28:51 +04:00
if ( ! tb [ NETCONFA_IFINDEX ] )
2017-10-11 11:28:00 +03:00
return - EINVAL ;
2012-10-26 02:28:51 +04:00
2017-10-11 11:28:00 +03:00
err = - EINVAL ;
2012-10-26 02:28:51 +04:00
ifindex = nla_get_s32 ( tb [ NETCONFA_IFINDEX ] ) ;
switch ( ifindex ) {
case NETCONFA_IFINDEX_ALL :
devconf = net - > ipv6 . devconf_all ;
break ;
case NETCONFA_IFINDEX_DEFAULT :
devconf = net - > ipv6 . devconf_dflt ;
break ;
default :
2017-10-11 11:28:00 +03:00
dev = dev_get_by_index ( net , ifindex ) ;
2015-03-29 16:00:04 +03:00
if ( ! dev )
2017-10-11 11:28:00 +03:00
return - EINVAL ;
in6_dev = in6_dev_get ( dev ) ;
2015-03-29 16:00:04 +03:00
if ( ! in6_dev )
2012-10-26 02:28:51 +04:00
goto errout ;
devconf = & in6_dev - > cnf ;
break ;
}
err = - ENOBUFS ;
2017-10-11 11:28:00 +03:00
skb = nlmsg_new ( inet6_netconf_msgsize_devconf ( NETCONFA_ALL ) , GFP_KERNEL ) ;
2015-03-29 16:00:04 +03:00
if ( ! skb )
2012-10-26 02:28:51 +04:00
goto errout ;
err = inet6_netconf_fill_devconf ( skb , ifindex , devconf ,
NETLINK_CB ( in_skb ) . portid ,
nlh - > nlmsg_seq , RTM_NEWNETCONF , 0 ,
2016-03-10 11:55:50 +03:00
NETCONFA_ALL ) ;
2012-10-26 02:28:51 +04:00
if ( err < 0 ) {
/* -EMSGSIZE implies BUG in inet6_netconf_msgsize_devconf() */
WARN_ON ( err = = - EMSGSIZE ) ;
kfree_skb ( skb ) ;
goto errout ;
}
err = rtnl_unicast ( skb , net , NETLINK_CB ( in_skb ) . portid ) ;
errout :
2017-10-11 11:28:00 +03:00
if ( in6_dev )
in6_dev_put ( in6_dev ) ;
if ( dev )
dev_put ( dev ) ;
2012-10-26 02:28:51 +04:00
return err ;
}
2013-03-06 03:42:06 +04:00
static int inet6_netconf_dump_devconf ( struct sk_buff * skb ,
struct netlink_callback * cb )
{
2018-10-08 06:16:41 +03:00
const struct nlmsghdr * nlh = cb - > nlh ;
2013-03-06 03:42:06 +04:00
struct net * net = sock_net ( skb - > sk ) ;
int h , s_h ;
int idx , s_idx ;
struct net_device * dev ;
struct inet6_dev * idev ;
struct hlist_head * head ;
2018-10-08 06:16:41 +03:00
if ( cb - > strict_check ) {
struct netlink_ext_ack * extack = cb - > extack ;
struct netconfmsg * ncm ;
if ( nlh - > nlmsg_len < nlmsg_msg_size ( sizeof ( * ncm ) ) ) {
NL_SET_ERR_MSG_MOD ( extack , " Invalid header for netconf dump request " ) ;
return - EINVAL ;
}
if ( nlmsg_attrlen ( nlh , sizeof ( * ncm ) ) ) {
NL_SET_ERR_MSG_MOD ( extack , " Invalid data after header in netconf dump request " ) ;
return - EINVAL ;
}
}
2013-03-06 03:42:06 +04:00
s_h = cb - > args [ 0 ] ;
s_idx = idx = cb - > args [ 1 ] ;
for ( h = s_h ; h < NETDEV_HASHENTRIES ; h + + , s_idx = 0 ) {
idx = 0 ;
head = & net - > dev_index_head [ h ] ;
rcu_read_lock ( ) ;
2013-03-22 10:28:43 +04:00
cb - > seq = atomic_read ( & net - > ipv6 . dev_addr_genid ) ^
net - > dev_base_seq ;
2013-03-06 03:42:06 +04:00
hlist_for_each_entry_rcu ( dev , head , index_hlist ) {
if ( idx < s_idx )
goto cont ;
idev = __in6_dev_get ( dev ) ;
if ( ! idev )
goto cont ;
if ( inet6_netconf_fill_devconf ( skb , dev - > ifindex ,
& idev - > cnf ,
NETLINK_CB ( cb - > skb ) . portid ,
2018-10-08 06:16:41 +03:00
nlh - > nlmsg_seq ,
2013-03-06 03:42:06 +04:00
RTM_NEWNETCONF ,
NLM_F_MULTI ,
2016-03-10 11:55:50 +03:00
NETCONFA_ALL ) < 0 ) {
2013-03-06 03:42:06 +04:00
rcu_read_unlock ( ) ;
goto done ;
}
2013-03-22 10:28:43 +04:00
nl_dump_check_consistent ( cb , nlmsg_hdr ( skb ) ) ;
2013-03-06 03:42:06 +04:00
cont :
idx + + ;
}
rcu_read_unlock ( ) ;
}
if ( h = = NETDEV_HASHENTRIES ) {
if ( inet6_netconf_fill_devconf ( skb , NETCONFA_IFINDEX_ALL ,
net - > ipv6 . devconf_all ,
NETLINK_CB ( cb - > skb ) . portid ,
2018-10-08 06:16:41 +03:00
nlh - > nlmsg_seq ,
2013-03-06 03:42:06 +04:00
RTM_NEWNETCONF , NLM_F_MULTI ,
2016-03-10 11:55:50 +03:00
NETCONFA_ALL ) < 0 )
2013-03-06 03:42:06 +04:00
goto done ;
else
h + + ;
}
if ( h = = NETDEV_HASHENTRIES + 1 ) {
if ( inet6_netconf_fill_devconf ( skb , NETCONFA_IFINDEX_DEFAULT ,
net - > ipv6 . devconf_dflt ,
NETLINK_CB ( cb - > skb ) . portid ,
2018-10-08 06:16:41 +03:00
nlh - > nlmsg_seq ,
2013-03-06 03:42:06 +04:00
RTM_NEWNETCONF , NLM_F_MULTI ,
2016-03-10 11:55:50 +03:00
NETCONFA_ALL ) < 0 )
2013-03-06 03:42:06 +04:00
goto done ;
else
h + + ;
}
done :
cb - > args [ 0 ] = h ;
cb - > args [ 1 ] = idx ;
return skb - > len ;
}
2005-04-17 02:20:36 +04:00
# ifdef CONFIG_SYSCTL
static void dev_forward_change ( struct inet6_dev * idev )
{
struct net_device * dev ;
struct inet6_ifaddr * ifa ;
if ( ! idev )
return ;
dev = idev - > dev ;
2008-06-20 03:15:47 +04:00
if ( idev - > cnf . forwarding )
dev_disable_lro ( dev ) ;
2012-10-28 21:43:53 +04:00
if ( dev - > flags & IFF_MULTICAST ) {
2013-02-10 07:50:18 +04:00
if ( idev - > cnf . forwarding ) {
2008-04-10 10:42:11 +04:00
ipv6_dev_mc_inc ( dev , & in6addr_linklocal_allrouters ) ;
2013-02-10 07:50:18 +04:00
ipv6_dev_mc_inc ( dev , & in6addr_interfacelocal_allrouters ) ;
ipv6_dev_mc_inc ( dev , & in6addr_sitelocal_allrouters ) ;
} else {
2008-04-10 10:42:11 +04:00
ipv6_dev_mc_dec ( dev , & in6addr_linklocal_allrouters ) ;
2013-02-10 07:50:18 +04:00
ipv6_dev_mc_dec ( dev , & in6addr_interfacelocal_allrouters ) ;
ipv6_dev_mc_dec ( dev , & in6addr_sitelocal_allrouters ) ;
}
2005-04-17 02:20:36 +04:00
}
2010-03-17 23:31:13 +03:00
list_for_each_entry ( ifa , & idev - > addr_list , if_list ) {
2007-02-27 02:36:10 +03:00
if ( ifa - > flags & IFA_F_TENTATIVE )
continue ;
2005-04-17 02:20:36 +04:00
if ( idev - > cnf . forwarding )
addrconf_join_anycast ( ifa ) ;
else
addrconf_leave_anycast ( ifa ) ;
}
2017-03-29 00:28:04 +03:00
inet6_netconf_notify_devconf ( dev_net ( dev ) , RTM_NEWNETCONF ,
NETCONFA_FORWARDING ,
2012-10-26 02:28:50 +04:00
dev - > ifindex , & idev - > cnf ) ;
2005-04-17 02:20:36 +04:00
}
2008-01-11 04:43:50 +03:00
static void addrconf_forward_change ( struct net * net , __s32 newf )
2005-04-17 02:20:36 +04:00
{
struct net_device * dev ;
struct inet6_dev * idev ;
2012-08-14 12:54:51 +04:00
for_each_netdev ( net , dev ) {
2005-04-17 02:20:36 +04:00
idev = __in6_dev_get ( dev ) ;
if ( idev ) {
2008-01-11 04:43:50 +03:00
int changed = ( ! idev - > cnf . forwarding ) ^ ( ! newf ) ;
idev - > cnf . forwarding = newf ;
2005-04-17 02:20:36 +04:00
if ( changed )
dev_forward_change ( idev ) ;
}
}
}
2007-12-05 12:50:24 +03:00
2012-01-16 14:40:10 +04:00
static int addrconf_fixup_forwarding ( struct ctl_table * table , int * p , int newf )
2007-12-05 12:50:24 +03:00
{
2008-01-11 04:42:13 +03:00
struct net * net ;
2012-01-16 14:40:10 +04:00
int old ;
if ( ! rtnl_trylock ( ) )
return restart_syscall ( ) ;
2008-01-11 04:42:13 +03:00
net = ( struct net * ) table - > extra2 ;
2012-01-16 14:40:10 +04:00
old = * p ;
* p = newf ;
2009-02-26 09:55:31 +03:00
2012-01-16 14:40:10 +04:00
if ( p = = & net - > ipv6 . devconf_dflt - > forwarding ) {
2012-10-26 02:28:50 +04:00
if ( ( ! newf ) ^ ( ! old ) )
2017-03-29 00:28:04 +03:00
inet6_netconf_notify_devconf ( net , RTM_NEWNETCONF ,
NETCONFA_FORWARDING ,
2012-10-26 02:28:50 +04:00
NETCONFA_IFINDEX_DEFAULT ,
net - > ipv6 . devconf_dflt ) ;
2012-01-16 14:40:10 +04:00
rtnl_unlock ( ) ;
return 0 ;
2010-02-19 16:22:59 +03:00
}
2007-12-05 12:50:24 +03:00
2008-01-11 04:43:50 +03:00
if ( p = = & net - > ipv6 . devconf_all - > forwarding ) {
2016-08-30 11:09:21 +03:00
int old_dflt = net - > ipv6 . devconf_dflt - > forwarding ;
2008-01-11 04:43:50 +03:00
net - > ipv6 . devconf_dflt - > forwarding = newf ;
2016-08-30 11:09:21 +03:00
if ( ( ! newf ) ^ ( ! old_dflt ) )
2017-03-29 00:28:04 +03:00
inet6_netconf_notify_devconf ( net , RTM_NEWNETCONF ,
NETCONFA_FORWARDING ,
2016-08-30 11:09:21 +03:00
NETCONFA_IFINDEX_DEFAULT ,
net - > ipv6 . devconf_dflt ) ;
2008-01-11 04:43:50 +03:00
addrconf_forward_change ( net , newf ) ;
2012-10-26 02:28:50 +04:00
if ( ( ! newf ) ^ ( ! old ) )
2017-03-29 00:28:04 +03:00
inet6_netconf_notify_devconf ( net , RTM_NEWNETCONF ,
NETCONFA_FORWARDING ,
2012-10-26 02:28:50 +04:00
NETCONFA_IFINDEX_ALL ,
net - > ipv6 . devconf_all ) ;
2012-01-16 14:40:10 +04:00
} else if ( ( ! newf ) ^ ( ! old ) )
2007-12-05 12:50:24 +03:00
dev_forward_change ( ( struct inet6_dev * ) table - > extra1 ) ;
2008-06-20 03:15:47 +04:00
rtnl_unlock ( ) ;
2007-12-05 12:50:24 +03:00
2012-01-16 14:40:10 +04:00
if ( newf )
2008-03-05 00:47:14 +03:00
rt6_purge_dflt_routers ( net ) ;
2009-02-26 09:55:31 +03:00
return 1 ;
2007-12-05 12:50:24 +03:00
}
2015-08-13 17:39:01 +03:00
static void addrconf_linkdown_change ( struct net * net , __s32 newf )
{
struct net_device * dev ;
struct inet6_dev * idev ;
for_each_netdev ( net , dev ) {
idev = __in6_dev_get ( dev ) ;
if ( idev ) {
int changed = ( ! idev - > cnf . ignore_routes_with_linkdown ) ^ ( ! newf ) ;
idev - > cnf . ignore_routes_with_linkdown = newf ;
if ( changed )
inet6_netconf_notify_devconf ( dev_net ( dev ) ,
2017-03-29 00:28:04 +03:00
RTM_NEWNETCONF ,
2015-08-13 17:39:01 +03:00
NETCONFA_IGNORE_ROUTES_WITH_LINKDOWN ,
dev - > ifindex ,
& idev - > cnf ) ;
}
}
}
static int addrconf_fixup_linkdown ( struct ctl_table * table , int * p , int newf )
{
struct net * net ;
int old ;
if ( ! rtnl_trylock ( ) )
return restart_syscall ( ) ;
net = ( struct net * ) table - > extra2 ;
old = * p ;
* p = newf ;
if ( p = = & net - > ipv6 . devconf_dflt - > ignore_routes_with_linkdown ) {
if ( ( ! newf ) ^ ( ! old ) )
inet6_netconf_notify_devconf ( net ,
2017-03-29 00:28:04 +03:00
RTM_NEWNETCONF ,
2015-08-13 17:39:01 +03:00
NETCONFA_IGNORE_ROUTES_WITH_LINKDOWN ,
NETCONFA_IFINDEX_DEFAULT ,
net - > ipv6 . devconf_dflt ) ;
rtnl_unlock ( ) ;
return 0 ;
}
if ( p = = & net - > ipv6 . devconf_all - > ignore_routes_with_linkdown ) {
net - > ipv6 . devconf_dflt - > ignore_routes_with_linkdown = newf ;
addrconf_linkdown_change ( net , newf ) ;
if ( ( ! newf ) ^ ( ! old ) )
inet6_netconf_notify_devconf ( net ,
2017-03-29 00:28:04 +03:00
RTM_NEWNETCONF ,
2015-08-13 17:39:01 +03:00
NETCONFA_IGNORE_ROUTES_WITH_LINKDOWN ,
NETCONFA_IFINDEX_ALL ,
net - > ipv6 . devconf_all ) ;
}
rtnl_unlock ( ) ;
return 1 ;
}
2005-04-17 02:20:36 +04:00
# endif
2010-03-17 23:31:11 +03:00
/* Nobody refers to this ifaddr, destroy it */
2005-04-17 02:20:36 +04:00
void inet6_ifa_finish_destroy ( struct inet6_ifaddr * ifp )
{
2010-03-17 23:31:10 +03:00
WARN_ON ( ! hlist_unhashed ( & ifp - > addr_lst ) ) ;
2008-07-26 08:43:18 +04:00
2005-04-17 02:20:36 +04:00
# ifdef NET_REFCNT_DEBUG
2012-05-15 18:11:54 +04:00
pr_debug ( " %s \n " , __func__ ) ;
2005-04-17 02:20:36 +04:00
# endif
in6_dev_put ( ifp - > idev ) ;
2014-03-27 21:28:07 +04:00
if ( cancel_delayed_work ( & ifp - > dad_work ) )
pr_notice ( " delayed DAD work was pending while freeing ifa=%p \n " ,
ifp ) ;
2005-04-17 02:20:36 +04:00
2010-05-19 02:36:06 +04:00
if ( ifp - > state ! = INET6_IFADDR_STATE_DEAD ) {
2012-05-15 18:11:53 +04:00
pr_warn ( " Freeing alive inet6 address %p \n " , ifp ) ;
2005-04-17 02:20:36 +04:00
return ;
}
2011-03-15 13:00:14 +03:00
kfree_rcu ( ifp , rcu ) ;
2005-04-17 02:20:36 +04:00
}
2006-07-11 02:25:51 +04:00
static void
ipv6_link_dev_addr ( struct inet6_dev * idev , struct inet6_ifaddr * ifp )
{
2010-03-17 23:31:13 +03:00
struct list_head * p ;
2006-07-12 00:05:30 +04:00
int ifp_scope = ipv6_addr_src_scope ( & ifp - > addr ) ;
2006-07-11 02:25:51 +04:00
/*
* Each device address list is sorted in order of scope -
* global before linklocal .
*/
2010-03-17 23:31:13 +03:00
list_for_each ( p , & idev - > addr_list ) {
struct inet6_ifaddr * ifa
= list_entry ( p , struct inet6_ifaddr , if_list ) ;
2006-07-12 00:05:30 +04:00
if ( ifp_scope > = ipv6_addr_src_scope ( & ifa - > addr ) )
2006-07-11 02:25:51 +04:00
break ;
}
2017-10-08 05:30:23 +03:00
list_add_tail_rcu ( & ifp - > if_list , p ) ;
2006-07-11 02:25:51 +04:00
}
2017-10-24 02:17:47 +03:00
static u32 inet6_addr_hash ( const struct net * net , const struct in6_addr * addr )
2008-04-10 10:42:08 +04:00
{
2017-10-24 02:17:47 +03:00
u32 val = ipv6_addr_hash ( addr ) ^ net_hash_mix ( net ) ;
return hash_32 ( val , IN6_ADDR_HSIZE_SHIFT ) ;
2008-04-10 10:42:08 +04:00
}
2017-10-24 02:17:45 +03:00
static bool ipv6_chk_same_addr ( struct net * net , const struct in6_addr * addr ,
2017-10-24 02:17:46 +03:00
struct net_device * dev , unsigned int hash )
2017-10-24 02:17:45 +03:00
{
struct inet6_ifaddr * ifp ;
hlist_for_each_entry ( ifp , & inet6_addr_lst [ hash ] , addr_lst ) {
if ( ! net_eq ( dev_net ( ifp - > idev - > dev ) , net ) )
continue ;
if ( ipv6_addr_equal ( & ifp - > addr , addr ) ) {
if ( ! dev | | ifp - > idev - > dev = = dev )
return true ;
}
}
return false ;
}
2017-10-18 19:56:52 +03:00
static int ipv6_add_addr_hash ( struct net_device * dev , struct inet6_ifaddr * ifa )
{
2017-10-24 02:17:47 +03:00
unsigned int hash = inet6_addr_hash ( dev_net ( dev ) , & ifa - > addr ) ;
2017-10-18 19:56:52 +03:00
int err = 0 ;
spin_lock ( & addrconf_hash_lock ) ;
/* Ignore adding duplicate addresses on an interface */
2017-10-24 02:17:46 +03:00
if ( ipv6_chk_same_addr ( dev_net ( dev ) , & ifa - > addr , dev , hash ) ) {
2018-03-26 18:35:01 +03:00
netdev_dbg ( dev , " ipv6_add_addr: already assigned \n " ) ;
2017-10-18 19:56:52 +03:00
err = - EEXIST ;
2017-10-24 02:17:46 +03:00
} else {
hlist_add_head_rcu ( & ifa - > addr_lst , & inet6_addr_lst [ hash ] ) ;
2017-10-18 19:56:52 +03:00
}
spin_unlock ( & addrconf_hash_lock ) ;
return err ;
}
2005-04-17 02:20:36 +04:00
/* On success it returns ifp with increased reference count */
static struct inet6_ifaddr *
2018-05-27 18:09:53 +03:00
ipv6_add_addr ( struct inet6_dev * idev , struct ifa6_config * cfg ,
2017-10-18 19:56:54 +03:00
bool can_block , struct netlink_ext_ack * extack )
2005-04-17 02:20:36 +04:00
{
2017-10-18 19:56:52 +03:00
gfp_t gfp_flags = can_block ? GFP_KERNEL : GFP_ATOMIC ;
2018-05-27 18:09:53 +03:00
int addr_type = ipv6_addr_type ( cfg - > pfx ) ;
2017-02-23 19:27:18 +03:00
struct net * net = dev_net ( idev - > dev ) ;
2005-04-17 02:20:36 +04:00
struct inet6_ifaddr * ifa = NULL ;
2018-04-19 01:39:00 +03:00
struct fib6_info * f6i = NULL ;
2005-04-17 02:20:36 +04:00
int err = 0 ;
2008-06-25 11:26:47 +04:00
if ( addr_type = = IPV6_ADDR_ANY | |
addr_type & IPV6_ADDR_MULTICAST | |
( ! ( idev - > dev - > flags & IFF_LOOPBACK ) & &
2018-09-19 15:56:53 +03:00
! netif_is_l3_master ( idev - > dev ) & &
2008-06-25 11:26:47 +04:00
addr_type & IPV6_ADDR_LOOPBACK ) )
return ERR_PTR ( - EADDRNOTAVAIL ) ;
2005-04-17 02:20:36 +04:00
if ( idev - > dead ) {
err = - ENODEV ; /*XXX*/
2017-10-18 19:56:52 +03:00
goto out ;
2005-04-17 02:20:36 +04:00
}
2009-06-01 14:07:33 +04:00
if ( idev - > cnf . disable_ipv6 ) {
2009-03-19 04:22:48 +03:00
err = - EACCES ;
2017-10-18 19:56:52 +03:00
goto out ;
2009-03-19 04:22:48 +03:00
}
2017-10-18 19:56:53 +03:00
/* validator notifier needs to be blocking;
* do not call in atomic context
*/
if ( can_block ) {
struct in6_validator_info i6vi = {
2018-05-27 18:09:53 +03:00
. i6vi_addr = * cfg - > pfx ,
2017-10-18 19:56:53 +03:00
. i6vi_dev = idev ,
2017-10-18 19:56:54 +03:00
. extack = extack ,
2017-10-18 19:56:53 +03:00
} ;
err = inet6addr_validator_notifier_call_chain ( NETDEV_UP , & i6vi ) ;
err = notifier_to_errno ( err ) ;
if ( err < 0 )
goto out ;
}
2005-04-17 02:20:36 +04:00
2017-10-18 19:56:52 +03:00
ifa = kzalloc ( sizeof ( * ifa ) , gfp_flags ) ;
2015-03-29 16:00:04 +03:00
if ( ! ifa ) {
2005-04-17 02:20:36 +04:00
err = - ENOBUFS ;
goto out ;
}
2018-05-27 18:09:53 +03:00
f6i = addrconf_f6i_alloc ( net , idev , cfg - > pfx , false , gfp_flags ) ;
2018-04-19 01:39:00 +03:00
if ( IS_ERR ( f6i ) ) {
err = PTR_ERR ( f6i ) ;
f6i = NULL ;
2005-04-17 02:20:36 +04:00
goto out ;
}
2017-02-23 19:27:18 +03:00
if ( net - > ipv6 . devconf_all - > disable_policy | |
idev - > cnf . disable_policy )
2018-04-19 01:39:00 +03:00
f6i - > dst_nopolicy = true ;
2017-02-23 19:27:18 +03:00
2013-12-07 22:26:57 +04:00
neigh_parms_data_state_setall ( idev - > nd_parms ) ;
2018-05-27 18:09:53 +03:00
ifa - > addr = * cfg - > pfx ;
if ( cfg - > peer_pfx )
ifa - > peer_addr = * cfg - > peer_pfx ;
2005-04-17 02:20:36 +04:00
spin_lock_init ( & ifa - > lock ) ;
2014-03-27 21:28:07 +04:00
INIT_DELAYED_WORK ( & ifa - > dad_work , addrconf_dad_work ) ;
2010-03-17 23:31:10 +03:00
INIT_HLIST_NODE ( & ifa - > addr_lst ) ;
2018-05-27 18:09:53 +03:00
ifa - > scope = cfg - > scope ;
ifa - > prefix_len = cfg - > plen ;
2018-05-27 18:09:58 +03:00
ifa - > rt_priority = cfg - > rt_priority ;
2018-05-27 18:09:53 +03:00
ifa - > flags = cfg - > ifa_flags ;
2017-05-13 03:03:39 +03:00
/* No need to add the TENTATIVE flag for addresses with NODAD */
2018-05-27 18:09:53 +03:00
if ( ! ( cfg - > ifa_flags & IFA_F_NODAD ) )
2017-05-13 03:03:39 +03:00
ifa - > flags | = IFA_F_TENTATIVE ;
2018-05-27 18:09:53 +03:00
ifa - > valid_lft = cfg - > valid_lft ;
ifa - > prefered_lft = cfg - > preferred_lft ;
2005-04-17 02:20:36 +04:00
ifa - > cstamp = ifa - > tstamp = jiffies ;
2013-04-09 07:47:16 +04:00
ifa - > tokenized = false ;
2005-04-17 02:20:36 +04:00
2018-04-19 01:39:00 +03:00
ifa - > rt = f6i ;
2006-08-29 13:43:49 +04:00
2005-04-17 02:20:36 +04:00
ifa - > idev = idev ;
2017-10-18 19:56:52 +03:00
in6_dev_hold ( idev ) ;
2005-04-17 02:20:36 +04:00
/* For caller */
2017-07-04 09:34:56 +03:00
refcount_set ( & ifa - > refcnt , 1 ) ;
2005-04-17 02:20:36 +04:00
2017-10-18 19:56:52 +03:00
rcu_read_lock_bh ( ) ;
2005-04-17 02:20:36 +04:00
2017-10-18 19:56:52 +03:00
err = ipv6_add_addr_hash ( idev - > dev , ifa ) ;
if ( err < 0 ) {
rcu_read_unlock_bh ( ) ;
goto out ;
}
2005-04-17 02:20:36 +04:00
write_lock ( & idev - > lock ) ;
2017-10-18 19:56:52 +03:00
2005-04-17 02:20:36 +04:00
/* Add to inet6_dev unicast addr list. */
2006-07-11 02:25:51 +04:00
ipv6_link_dev_addr ( idev , ifa ) ;
2005-04-17 02:20:36 +04:00
if ( ifa - > flags & IFA_F_TEMPORARY ) {
2010-03-17 23:31:09 +03:00
list_add ( & ifa - > tmp_list , & idev - > tempaddr_list ) ;
2005-04-17 02:20:36 +04:00
in6_ifa_hold ( ifa ) ;
}
in6_ifa_hold ( ifa ) ;
write_unlock ( & idev - > lock ) ;
2017-10-18 19:56:52 +03:00
2006-09-23 01:44:24 +04:00
rcu_read_unlock_bh ( ) ;
2005-04-17 02:20:36 +04:00
2017-10-18 19:56:52 +03:00
inet6addr_notifier_call_chain ( NETDEV_UP , ifa ) ;
out :
if ( unlikely ( err < 0 ) ) {
2018-04-19 01:39:00 +03:00
fib6_info_release ( f6i ) ;
2018-04-18 03:33:25 +03:00
2017-10-18 19:56:52 +03:00
if ( ifa ) {
if ( ifa - > idev )
in6_dev_put ( ifa - > idev ) ;
kfree ( ifa ) ;
}
2005-04-17 02:20:36 +04:00
ifa = ERR_PTR ( err ) ;
}
return ifa ;
}
2014-01-15 18:36:59 +04:00
enum cleanup_prefix_rt_t {
CLEANUP_PREFIX_RT_NOP , /* no cleanup action for prefix route */
CLEANUP_PREFIX_RT_DEL , /* delete the prefix route */
CLEANUP_PREFIX_RT_EXPIRE , /* update the lifetime of the prefix route */
} ;
/*
* Check , whether the prefix for ifp would still need a prefix route
* after deleting ifp . The function returns one of the CLEANUP_PREFIX_RT_ *
* constants .
*
* 1 ) we don ' t purge prefix if address was not permanent .
* prefix is managed by its own lifetime .
* 2 ) we also don ' t purge , if the address was IFA_F_NOPREFIXROUTE .
* 3 ) if there are no addresses , delete prefix .
* 4 ) if there are still other permanent address ( es ) ,
* corresponding prefix is still permanent .
* 5 ) if there are still other addresses with IFA_F_NOPREFIXROUTE ,
* don ' t purge the prefix , assume user space is managing it .
* 6 ) otherwise , update prefix lifetime to the
* longest valid lifetime among the corresponding
* addresses on the device .
* Note : subsequent RA will update lifetime .
* */
static enum cleanup_prefix_rt_t
check_cleanup_prefix_route ( struct inet6_ifaddr * ifp , unsigned long * expires )
{
struct inet6_ifaddr * ifa ;
struct inet6_dev * idev = ifp - > idev ;
unsigned long lifetime ;
enum cleanup_prefix_rt_t action = CLEANUP_PREFIX_RT_DEL ;
* expires = jiffies ;
list_for_each_entry ( ifa , & idev - > addr_list , if_list ) {
if ( ifa = = ifp )
continue ;
2019-02-11 05:57:46 +03:00
if ( ifa - > prefix_len ! = ifp - > prefix_len | |
! ipv6_prefix_equal ( & ifa - > addr , & ifp - > addr ,
2014-01-15 18:36:59 +04:00
ifp - > prefix_len ) )
continue ;
if ( ifa - > flags & ( IFA_F_PERMANENT | IFA_F_NOPREFIXROUTE ) )
return CLEANUP_PREFIX_RT_NOP ;
action = CLEANUP_PREFIX_RT_EXPIRE ;
spin_lock ( & ifa - > lock ) ;
lifetime = addrconf_timeout_fixup ( ifa - > valid_lft , HZ ) ;
/*
* Note : Because this address is
* not permanent , lifetime <
* LONG_MAX / HZ here .
*/
if ( time_before ( * expires , ifa - > tstamp + lifetime * HZ ) )
* expires = ifa - > tstamp + lifetime * HZ ;
spin_unlock ( & ifa - > lock ) ;
}
return action ;
}
static void
cleanup_prefix_route ( struct inet6_ifaddr * ifp , unsigned long expires , bool del_rt )
{
2018-04-19 01:38:59 +03:00
struct fib6_info * f6i ;
2014-01-15 18:36:59 +04:00
2018-04-19 01:38:59 +03:00
f6i = addrconf_get_prefix_route ( & ifp - > addr ,
2014-01-15 18:36:59 +04:00
ifp - > prefix_len ,
ifp - > idev - > dev ,
0 , RTF_GATEWAY | RTF_DEFAULT ) ;
2018-04-19 01:38:59 +03:00
if ( f6i ) {
2014-01-15 18:36:59 +04:00
if ( del_rt )
2018-04-19 01:38:59 +03:00
ip6_del_rt ( dev_net ( ifp - > idev - > dev ) , f6i ) ;
2014-01-15 18:36:59 +04:00
else {
2018-04-19 01:38:59 +03:00
if ( ! ( f6i - > fib6_flags & RTF_EXPIRES ) )
fib6_set_expires ( f6i , expires ) ;
fib6_info_release ( f6i ) ;
2014-01-15 18:36:59 +04:00
}
}
}
2005-04-17 02:20:36 +04:00
/* This function wants to get referenced ifp and releases it before return */
static void ipv6_del_addr ( struct inet6_ifaddr * ifp )
{
2010-05-19 02:54:18 +04:00
int state ;
2014-01-15 18:36:59 +04:00
enum cleanup_prefix_rt_t action = CLEANUP_PREFIX_RT_NOP ;
unsigned long expires ;
2005-04-17 02:20:36 +04:00
2014-03-27 21:28:07 +04:00
ASSERT_RTNL ( ) ;
2015-03-24 01:36:03 +03:00
spin_lock_bh ( & ifp - > lock ) ;
2010-05-19 02:54:18 +04:00
state = ifp - > state ;
2010-05-19 02:36:06 +04:00
ifp - > state = INET6_IFADDR_STATE_DEAD ;
2015-03-24 01:36:03 +03:00
spin_unlock_bh ( & ifp - > lock ) ;
2010-05-19 02:54:18 +04:00
if ( state = = INET6_IFADDR_STATE_DEAD )
goto out ;
2005-04-17 02:20:36 +04:00
2010-03-17 23:31:11 +03:00
spin_lock_bh ( & addrconf_hash_lock ) ;
hlist_del_init_rcu ( & ifp - > addr_lst ) ;
spin_unlock_bh ( & addrconf_hash_lock ) ;
2005-04-17 02:20:36 +04:00
2014-01-15 18:36:59 +04:00
write_lock_bh ( & ifp - > idev - > lock ) ;
2013-10-29 04:07:50 +04:00
2005-04-17 02:20:36 +04:00
if ( ifp - > flags & IFA_F_TEMPORARY ) {
2010-03-17 23:31:09 +03:00
list_del ( & ifp - > tmp_list ) ;
if ( ifp - > ifpub ) {
in6_ifa_put ( ifp - > ifpub ) ;
ifp - > ifpub = NULL ;
2005-04-17 02:20:36 +04:00
}
2010-03-17 23:31:09 +03:00
__in6_ifa_put ( ifp ) ;
2005-04-17 02:20:36 +04:00
}
2014-01-15 18:36:59 +04:00
if ( ifp - > flags & IFA_F_PERMANENT & & ! ( ifp - > flags & IFA_F_NOPREFIXROUTE ) )
action = check_cleanup_prefix_route ( ifp , & expires ) ;
2010-03-17 23:31:13 +03:00
2017-10-08 05:30:23 +03:00
list_del_rcu ( & ifp - > if_list ) ;
2014-01-15 18:36:59 +04:00
__in6_ifa_put ( ifp ) ;
write_unlock_bh ( & ifp - > idev - > lock ) ;
2005-04-17 02:20:36 +04:00
2014-03-27 21:28:07 +04:00
addrconf_del_dad_work ( ifp ) ;
2008-07-09 02:13:31 +04:00
2005-04-17 02:20:36 +04:00
ipv6_ifa_notify ( RTM_DELADDR , ifp ) ;
2013-04-14 19:18:43 +04:00
inet6addr_notifier_call_chain ( NETDEV_DOWN , ifp ) ;
2005-04-17 02:20:36 +04:00
2014-01-15 18:36:59 +04:00
if ( action ! = CLEANUP_PREFIX_RT_NOP ) {
cleanup_prefix_route ( ifp , expires ,
action = = CLEANUP_PREFIX_RT_DEL ) ;
2005-04-17 02:20:36 +04:00
}
2011-04-14 01:10:57 +04:00
/* clean up prefsrc entries */
rt6_remove_prefsrc ( ifp ) ;
2010-05-19 02:54:18 +04:00
out :
2005-04-17 02:20:36 +04:00
in6_ifa_put ( ifp ) ;
}
2017-11-07 01:13:29 +03:00
static int ipv6_create_tempaddr ( struct inet6_ifaddr * ifp ,
struct inet6_ifaddr * ift ,
bool block )
2005-04-17 02:20:36 +04:00
{
struct inet6_dev * idev = ifp - > idev ;
struct in6_addr addr , * tmpaddr ;
2018-05-27 18:09:53 +03:00
unsigned long tmp_tstamp , age ;
2008-04-02 11:01:35 +04:00
unsigned long regen_advance ;
2018-05-27 18:09:53 +03:00
struct ifa6_config cfg ;
2005-04-17 02:20:36 +04:00
int ret = 0 ;
2011-07-26 17:50:49 +04:00
unsigned long now = jiffies ;
2016-10-13 19:52:15 +03:00
long max_desync_factor ;
2016-10-20 13:29:26 +03:00
s32 cnf_temp_preferred_lft ;
2005-04-17 02:20:36 +04:00
2013-12-06 12:45:22 +04:00
write_lock_bh ( & idev - > lock ) ;
2005-04-17 02:20:36 +04:00
if ( ift ) {
spin_lock_bh ( & ift - > lock ) ;
memcpy ( & addr . s6_addr [ 8 ] , & ift - > addr . s6_addr [ 8 ] , 8 ) ;
spin_unlock_bh ( & ift - > lock ) ;
tmpaddr = & addr ;
} else {
tmpaddr = NULL ;
}
retry :
in6_dev_hold ( idev ) ;
if ( idev - > cnf . use_tempaddr < = 0 ) {
2013-12-06 12:45:22 +04:00
write_unlock_bh ( & idev - > lock ) ;
2012-05-15 18:11:53 +04:00
pr_info ( " %s: use_tempaddr is disabled \n " , __func__ ) ;
2005-04-17 02:20:36 +04:00
in6_dev_put ( idev ) ;
ret = - 1 ;
goto out ;
}
spin_lock_bh ( & ifp - > lock ) ;
if ( ifp - > regen_count + + > = idev - > cnf . regen_max_retry ) {
idev - > cnf . use_tempaddr = - 1 ; /*XXX*/
spin_unlock_bh ( & ifp - > lock ) ;
2013-12-06 12:45:22 +04:00
write_unlock_bh ( & idev - > lock ) ;
2012-05-15 18:11:53 +04:00
pr_warn ( " %s: regeneration time exceeded - disabled temporary address support \n " ,
__func__ ) ;
2005-04-17 02:20:36 +04:00
in6_dev_put ( idev ) ;
ret = - 1 ;
goto out ;
}
in6_ifa_hold ( ifp ) ;
memcpy ( addr . s6_addr , ifp - > addr . s6_addr , 8 ) ;
2016-10-13 19:50:02 +03:00
ipv6_try_regen_rndid ( idev , tmpaddr ) ;
2005-04-17 02:20:36 +04:00
memcpy ( & addr . s6_addr [ 8 ] , idev - > rndid , 8 ) ;
2011-07-26 17:50:49 +04:00
age = ( now - ifp - > tstamp ) / HZ ;
2016-10-13 19:52:15 +03:00
regen_advance = idev - > cnf . regen_max_retry *
idev - > cnf . dad_transmits *
NEIGH_VAR ( idev - > nd_parms , RETRANS_TIME ) / HZ ;
/* recalculate max_desync_factor each time and update
* idev - > desync_factor if it ' s larger
*/
2016-10-20 13:29:26 +03:00
cnf_temp_preferred_lft = READ_ONCE ( idev - > cnf . temp_prefered_lft ) ;
2016-10-13 19:52:15 +03:00
max_desync_factor = min_t ( __u32 ,
idev - > cnf . max_desync_factor ,
2016-10-20 13:29:26 +03:00
cnf_temp_preferred_lft - regen_advance ) ;
2016-10-13 19:52:15 +03:00
if ( unlikely ( idev - > desync_factor > max_desync_factor ) ) {
if ( max_desync_factor > 0 ) {
get_random_bytes ( & idev - > desync_factor ,
sizeof ( idev - > desync_factor ) ) ;
idev - > desync_factor % = max_desync_factor ;
} else {
idev - > desync_factor = 0 ;
}
}
2018-06-11 17:12:12 +03:00
memset ( & cfg , 0 , sizeof ( cfg ) ) ;
2018-05-27 18:09:53 +03:00
cfg . valid_lft = min_t ( __u32 , ifp - > valid_lft ,
2010-09-27 11:10:10 +04:00
idev - > cnf . temp_valid_lft + age ) ;
2018-05-27 18:09:53 +03:00
cfg . preferred_lft = cnf_temp_preferred_lft + age - idev - > desync_factor ;
cfg . preferred_lft = min_t ( __u32 , ifp - > prefered_lft , cfg . preferred_lft ) ;
cfg . plen = ifp - > prefix_len ;
2005-04-17 02:20:36 +04:00
tmp_tstamp = ifp - > tstamp ;
spin_unlock_bh ( & ifp - > lock ) ;
2013-12-06 12:45:22 +04:00
write_unlock_bh ( & idev - > lock ) ;
2007-04-26 04:08:10 +04:00
2008-04-02 11:01:35 +04:00
/* A temporary address is created only if this calculated Preferred
* Lifetime is greater than REGEN_ADVANCE time units . In particular ,
* an implementation must not create a temporary address with a zero
* Preferred Lifetime .
2014-03-13 01:13:19 +04:00
* Use age calculation as in addrconf_verify to avoid unnecessary
* temporary addresses being generated .
2008-04-02 11:01:35 +04:00
*/
2014-03-13 01:13:19 +04:00
age = ( now - tmp_tstamp + ADDRCONF_TIMER_FUZZ_MINUS ) / HZ ;
2018-05-27 18:09:53 +03:00
if ( cfg . preferred_lft < = regen_advance + age ) {
2008-04-02 11:01:35 +04:00
in6_ifa_put ( ifp ) ;
in6_dev_put ( idev ) ;
ret = - 1 ;
goto out ;
}
2018-05-27 18:09:53 +03:00
cfg . ifa_flags = IFA_F_TEMPORARY ;
2007-04-26 04:08:10 +04:00
/* set in addrconf_prefix_rcv() */
if ( ifp - > flags & IFA_F_OPTIMISTIC )
2018-05-27 18:09:53 +03:00
cfg . ifa_flags | = IFA_F_OPTIMISTIC ;
2007-04-26 04:08:10 +04:00
2018-05-27 18:09:53 +03:00
cfg . pfx = & addr ;
cfg . scope = ipv6_addr_scope ( cfg . pfx ) ;
2007-04-26 04:08:10 +04:00
2018-05-27 18:09:53 +03:00
ift = ipv6_add_addr ( idev , & cfg , block , NULL ) ;
2013-08-16 15:02:27 +04:00
if ( IS_ERR ( ift ) ) {
2005-04-17 02:20:36 +04:00
in6_ifa_put ( ifp ) ;
in6_dev_put ( idev ) ;
2012-05-15 18:11:53 +04:00
pr_info ( " %s: retry temporary address regeneration \n " , __func__ ) ;
2005-04-17 02:20:36 +04:00
tmpaddr = & addr ;
2013-12-06 12:45:22 +04:00
write_lock_bh ( & idev - > lock ) ;
2005-04-17 02:20:36 +04:00
goto retry ;
}
spin_lock_bh ( & ift - > lock ) ;
ift - > ifpub = ifp ;
2011-07-26 17:50:49 +04:00
ift - > cstamp = now ;
2005-04-17 02:20:36 +04:00
ift - > tstamp = tmp_tstamp ;
spin_unlock_bh ( & ift - > lock ) ;
2012-04-15 05:37:40 +04:00
addrconf_dad_start ( ift ) ;
2005-04-17 02:20:36 +04:00
in6_ifa_put ( ift ) ;
in6_dev_put ( idev ) ;
out :
return ret ;
}
/*
2005-11-08 20:38:30 +03:00
* Choose an appropriate source address ( RFC3484 )
2005-04-17 02:20:36 +04:00
*/
2008-03-02 04:48:21 +03:00
enum {
IPV6_SADDR_RULE_INIT = 0 ,
IPV6_SADDR_RULE_LOCAL ,
IPV6_SADDR_RULE_SCOPE ,
IPV6_SADDR_RULE_PREFERRED ,
# ifdef CONFIG_IPV6_MIP6
IPV6_SADDR_RULE_HOA ,
# endif
IPV6_SADDR_RULE_OIF ,
IPV6_SADDR_RULE_LABEL ,
IPV6_SADDR_RULE_PRIVACY ,
IPV6_SADDR_RULE_ORCHID ,
IPV6_SADDR_RULE_PREFIX ,
net: ipv6: Add a sysctl to make optimistic addresses useful candidates
Add a sysctl that causes an interface's optimistic addresses
to be considered equivalent to other non-deprecated addresses
for source address selection purposes. Preferred addresses
will still take precedence over optimistic addresses, subject
to other ranking in the source address selection algorithm.
This is useful where different interfaces are connected to
different networks from different ISPs (e.g., a cell network
and a home wifi network).
The current behaviour complies with RFC 3484/6724, and it
makes sense if the host has only one interface, or has
multiple interfaces on the same network (same or cooperating
administrative domain(s), but not in the multiple distinct
networks case.
For example, if a mobile device has an IPv6 address on an LTE
network and then connects to IPv6-enabled wifi, while the wifi
IPv6 address is undergoing DAD, IPv6 connections will try use
the wifi default route with the LTE IPv6 address, and will get
stuck until they time out.
Also, because optimistic nodes can receive frames, issue
an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
flag appropriately set). A second RTM_NEWADDR is sent if DAD
completes (the address flags have changed), otherwise an
RTM_DELADDR is sent.
Also: add an entry in ip-sysctl.txt for optimistic_dad.
Signed-off-by: Erik Kline <ek@google.com>
Acked-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-28 12:11:14 +03:00
# ifdef CONFIG_IPV6_OPTIMISTIC_DAD
IPV6_SADDR_RULE_NOT_OPTIMISTIC ,
# endif
2008-03-02 04:48:21 +03:00
IPV6_SADDR_RULE_MAX
} ;
2005-11-08 20:38:30 +03:00
struct ipv6_saddr_score {
2008-03-02 04:48:21 +03:00
int rule ;
int addr_type ;
struct inet6_ifaddr * ifa ;
DECLARE_BITMAP ( scorebits , IPV6_SADDR_RULE_MAX ) ;
int scopedist ;
int matchlen ;
2005-11-08 20:38:30 +03:00
} ;
2008-03-02 04:48:21 +03:00
struct ipv6_saddr_dst {
[IPV6]: Make address arguments const.
- net/ipv6/addrconf.c:
ipv6_get_ifaddr(), ipv6_dev_get_saddr()
- net/ipv6/mcast.c:
ipv6_sock_mc_join(), ipv6_sock_mc_drop(),
inet6_mc_check(),
ipv6_dev_mc_inc(), __ipv6_dev_mc_dec(), ipv6_dev_mc_dec(),
ipv6_chk_mcast_addr()
- net/ipv6/route.c:
rt6_lookup(), icmp6_dst_alloc()
- net/ipv6/ip6_output.c:
ip6_nd_hdr()
- net/ipv6/ndisc.c:
ndisc_send_ns(), ndisc_send_rs(), ndisc_send_redirect(),
ndisc_get_neigh(), __ndisc_send()
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
2008-04-10 10:42:10 +04:00
const struct in6_addr * addr ;
2008-03-02 04:48:21 +03:00
int ifindex ;
int scope ;
int label ;
2008-03-25 03:37:42 +03:00
unsigned int prefs ;
2008-03-02 04:48:21 +03:00
} ;
2005-11-08 20:38:30 +03:00
2007-03-22 22:27:49 +03:00
static inline int ipv6_saddr_preferred ( int type )
2005-04-17 02:20:36 +04:00
{
2010-02-26 02:28:58 +03:00
if ( type & ( IPV6_ADDR_MAPPED | IPV6_ADDR_COMPATv4 | IPV6_ADDR_LOOPBACK ) )
2005-11-08 20:38:30 +03:00
return 1 ;
return 0 ;
2005-04-17 02:20:36 +04:00
}
ipv6: fix net.ipv6.conf.all interface DAD handlers
Currently, writing into
net.ipv6.conf.all.{accept_dad,use_optimistic,optimistic_dad} has no effect.
Fix handling of these flags by:
- using the maximum of global and per-interface values for the
accept_dad flag. That is, if at least one of the two values is
non-zero, enable DAD on the interface. If at least one value is
set to 2, enable DAD and disable IPv6 operation on the interface if
MAC-based link-local address was found
- using the logical OR of global and per-interface values for the
optimistic_dad flag. If at least one of them is set to one, optimistic
duplicate address detection (RFC 4429) is enabled on the interface
- using the logical OR of global and per-interface values for the
use_optimistic flag. If at least one of them is set to one,
optimistic addresses won't be marked as deprecated during source address
selection on the interface.
While at it, as we're modifying the prototype for ipv6_use_optimistic_addr(),
drop inline, and let the compiler decide.
Fixes: 7fd2561e4ebd ("net: ipv6: Add a sysctl to make optimistic addresses useful candidates")
Signed-off-by: Matteo Croce <mcroce@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-09-12 18:46:37 +03:00
static bool ipv6_use_optimistic_addr ( struct net * net ,
struct inet6_dev * idev )
net: ipv6: Add a sysctl to make optimistic addresses useful candidates
Add a sysctl that causes an interface's optimistic addresses
to be considered equivalent to other non-deprecated addresses
for source address selection purposes. Preferred addresses
will still take precedence over optimistic addresses, subject
to other ranking in the source address selection algorithm.
This is useful where different interfaces are connected to
different networks from different ISPs (e.g., a cell network
and a home wifi network).
The current behaviour complies with RFC 3484/6724, and it
makes sense if the host has only one interface, or has
multiple interfaces on the same network (same or cooperating
administrative domain(s), but not in the multiple distinct
networks case.
For example, if a mobile device has an IPv6 address on an LTE
network and then connects to IPv6-enabled wifi, while the wifi
IPv6 address is undergoing DAD, IPv6 connections will try use
the wifi default route with the LTE IPv6 address, and will get
stuck until they time out.
Also, because optimistic nodes can receive frames, issue
an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
flag appropriately set). A second RTM_NEWADDR is sent if DAD
completes (the address flags have changed), otherwise an
RTM_DELADDR is sent.
Also: add an entry in ip-sysctl.txt for optimistic_dad.
Signed-off-by: Erik Kline <ek@google.com>
Acked-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-28 12:11:14 +03:00
{
# ifdef CONFIG_IPV6_OPTIMISTIC_DAD
ipv6: fix net.ipv6.conf.all interface DAD handlers
Currently, writing into
net.ipv6.conf.all.{accept_dad,use_optimistic,optimistic_dad} has no effect.
Fix handling of these flags by:
- using the maximum of global and per-interface values for the
accept_dad flag. That is, if at least one of the two values is
non-zero, enable DAD on the interface. If at least one value is
set to 2, enable DAD and disable IPv6 operation on the interface if
MAC-based link-local address was found
- using the logical OR of global and per-interface values for the
optimistic_dad flag. If at least one of them is set to one, optimistic
duplicate address detection (RFC 4429) is enabled on the interface
- using the logical OR of global and per-interface values for the
use_optimistic flag. If at least one of them is set to one,
optimistic addresses won't be marked as deprecated during source address
selection on the interface.
While at it, as we're modifying the prototype for ipv6_use_optimistic_addr(),
drop inline, and let the compiler decide.
Fixes: 7fd2561e4ebd ("net: ipv6: Add a sysctl to make optimistic addresses useful candidates")
Signed-off-by: Matteo Croce <mcroce@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-09-12 18:46:37 +03:00
if ( ! idev )
return false ;
if ( ! net - > ipv6 . devconf_all - > optimistic_dad & & ! idev - > cnf . optimistic_dad )
return false ;
if ( ! net - > ipv6 . devconf_all - > use_optimistic & & ! idev - > cnf . use_optimistic )
return false ;
return true ;
net: ipv6: Add a sysctl to make optimistic addresses useful candidates
Add a sysctl that causes an interface's optimistic addresses
to be considered equivalent to other non-deprecated addresses
for source address selection purposes. Preferred addresses
will still take precedence over optimistic addresses, subject
to other ranking in the source address selection algorithm.
This is useful where different interfaces are connected to
different networks from different ISPs (e.g., a cell network
and a home wifi network).
The current behaviour complies with RFC 3484/6724, and it
makes sense if the host has only one interface, or has
multiple interfaces on the same network (same or cooperating
administrative domain(s), but not in the multiple distinct
networks case.
For example, if a mobile device has an IPv6 address on an LTE
network and then connects to IPv6-enabled wifi, while the wifi
IPv6 address is undergoing DAD, IPv6 connections will try use
the wifi default route with the LTE IPv6 address, and will get
stuck until they time out.
Also, because optimistic nodes can receive frames, issue
an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
flag appropriately set). A second RTM_NEWADDR is sent if DAD
completes (the address flags have changed), otherwise an
RTM_DELADDR is sent.
Also: add an entry in ip-sysctl.txt for optimistic_dad.
Signed-off-by: Erik Kline <ek@google.com>
Acked-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-28 12:11:14 +03:00
# else
return false ;
# endif
}
ipv6: allow userspace to add IFA_F_OPTIMISTIC addresses
According to RFC 4429 (section 3.1), adding new IPv6 addresses as
optimistic addresses is acceptable, as long as the implementation
follows some rules:
* Optimistic DAD SHOULD only be used when the implementation is aware
that the address is based on a most likely unique interface
identifier (such as in [RFC2464]), generated randomly [RFC3041],
or by a well-distributed hash function [RFC3972] or assigned by
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) [RFC3315].
Optimistic DAD SHOULD NOT be used for manually entered
addresses.
Thus, it seems reasonable to allow userspace to set the optimistic flag
when adding new addresses.
We must not let userspace set NODAD + OPTIMISTIC, since if the kernel is
not performing DAD we would never clear the optimistic flag. We must
also ignore userspace's request to add OPTIMISTIC flag to addresses that
have already completed DAD (addresses that don't have the TENTATIVE
flag, or that have the DADFAILED flag).
Then we also need to clear the OPTIMISTIC flag on permanent addresses
when DAD fails. Otherwise, IFA_F_OPTIMISTIC addresses added by userspace
can still be used after DAD has failed, because in
ipv6_chk_addr_and_flags(), IFA_F_OPTIMISTIC overrides IFA_F_TENTATIVE.
Setting IFA_F_OPTIMISTIC from userspace is conditional on
CONFIG_IPV6_OPTIMISTIC_DAD and the optimistic_dad sysctl.
Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
Reviewed-by: Stefano Brivio <sbrivio@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-02-28 18:40:08 +03:00
static bool ipv6_allow_optimistic_dad ( struct net * net ,
struct inet6_dev * idev )
{
# ifdef CONFIG_IPV6_OPTIMISTIC_DAD
if ( ! idev )
return false ;
if ( ! net - > ipv6 . devconf_all - > optimistic_dad & & ! idev - > cnf . optimistic_dad )
return false ;
return true ;
# else
return false ;
# endif
}
2008-05-28 16:51:24 +04:00
static int ipv6_get_saddr_eval ( struct net * net ,
struct ipv6_saddr_score * score ,
2008-03-02 04:48:21 +03:00
struct ipv6_saddr_dst * dst ,
int i )
{
int ret ;
if ( i < = score - > rule ) {
switch ( i ) {
case IPV6_SADDR_RULE_SCOPE :
ret = score - > scopedist ;
break ;
case IPV6_SADDR_RULE_PREFIX :
ret = score - > matchlen ;
break ;
default :
ret = ! ! test_bit ( i , score - > scorebits ) ;
}
goto out ;
}
switch ( i ) {
case IPV6_SADDR_RULE_INIT :
/* Rule 0: remember if hiscore is not ready yet */
ret = ! ! score - > ifa ;
break ;
case IPV6_SADDR_RULE_LOCAL :
/* Rule 1: Prefer same address */
ret = ipv6_addr_equal ( & score - > ifa - > addr , dst - > addr ) ;
break ;
case IPV6_SADDR_RULE_SCOPE :
/* Rule 2: Prefer appropriate scope
*
* ret
* ^
* - 1 | d 15
* - - - + - - + - + - - - > scope
* |
* | d is scope of the destination .
* B - d | \
* | \ < - smaller scope is better if
2014-01-12 23:26:32 +04:00
* B - 15 | \ if scope is enough for destination .
2008-03-02 04:48:21 +03:00
* | ret = B - scope ( - 1 < = scope > = d < = 15 ) .
* d - C - 1 | /
* | / < - greater is better
* - C / if scope is not enough for destination .
* / | ret = scope - C ( - 1 < = d < scope < = 15 ) .
*
* d - C - 1 < B - 15 ( for all - 1 < = d < = 15 ) .
* C > d + 14 - B > = 15 + 14 - B = 29 - B .
* Assume B = 0 and we get C > 29.
*/
ret = __ipv6_addr_src_scope ( score - > addr_type ) ;
if ( ret > = dst - > scope )
ret = - ret ;
else
ret - = 128 ; /* 30 is enough */
score - > scopedist = ret ;
break ;
case IPV6_SADDR_RULE_PREFERRED :
net: ipv6: Add a sysctl to make optimistic addresses useful candidates
Add a sysctl that causes an interface's optimistic addresses
to be considered equivalent to other non-deprecated addresses
for source address selection purposes. Preferred addresses
will still take precedence over optimistic addresses, subject
to other ranking in the source address selection algorithm.
This is useful where different interfaces are connected to
different networks from different ISPs (e.g., a cell network
and a home wifi network).
The current behaviour complies with RFC 3484/6724, and it
makes sense if the host has only one interface, or has
multiple interfaces on the same network (same or cooperating
administrative domain(s), but not in the multiple distinct
networks case.
For example, if a mobile device has an IPv6 address on an LTE
network and then connects to IPv6-enabled wifi, while the wifi
IPv6 address is undergoing DAD, IPv6 connections will try use
the wifi default route with the LTE IPv6 address, and will get
stuck until they time out.
Also, because optimistic nodes can receive frames, issue
an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
flag appropriately set). A second RTM_NEWADDR is sent if DAD
completes (the address flags have changed), otherwise an
RTM_DELADDR is sent.
Also: add an entry in ip-sysctl.txt for optimistic_dad.
Signed-off-by: Erik Kline <ek@google.com>
Acked-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-28 12:11:14 +03:00
{
2008-03-02 04:48:21 +03:00
/* Rule 3: Avoid deprecated and optimistic addresses */
net: ipv6: Add a sysctl to make optimistic addresses useful candidates
Add a sysctl that causes an interface's optimistic addresses
to be considered equivalent to other non-deprecated addresses
for source address selection purposes. Preferred addresses
will still take precedence over optimistic addresses, subject
to other ranking in the source address selection algorithm.
This is useful where different interfaces are connected to
different networks from different ISPs (e.g., a cell network
and a home wifi network).
The current behaviour complies with RFC 3484/6724, and it
makes sense if the host has only one interface, or has
multiple interfaces on the same network (same or cooperating
administrative domain(s), but not in the multiple distinct
networks case.
For example, if a mobile device has an IPv6 address on an LTE
network and then connects to IPv6-enabled wifi, while the wifi
IPv6 address is undergoing DAD, IPv6 connections will try use
the wifi default route with the LTE IPv6 address, and will get
stuck until they time out.
Also, because optimistic nodes can receive frames, issue
an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
flag appropriately set). A second RTM_NEWADDR is sent if DAD
completes (the address flags have changed), otherwise an
RTM_DELADDR is sent.
Also: add an entry in ip-sysctl.txt for optimistic_dad.
Signed-off-by: Erik Kline <ek@google.com>
Acked-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-28 12:11:14 +03:00
u8 avoid = IFA_F_DEPRECATED ;
ipv6: fix net.ipv6.conf.all interface DAD handlers
Currently, writing into
net.ipv6.conf.all.{accept_dad,use_optimistic,optimistic_dad} has no effect.
Fix handling of these flags by:
- using the maximum of global and per-interface values for the
accept_dad flag. That is, if at least one of the two values is
non-zero, enable DAD on the interface. If at least one value is
set to 2, enable DAD and disable IPv6 operation on the interface if
MAC-based link-local address was found
- using the logical OR of global and per-interface values for the
optimistic_dad flag. If at least one of them is set to one, optimistic
duplicate address detection (RFC 4429) is enabled on the interface
- using the logical OR of global and per-interface values for the
use_optimistic flag. If at least one of them is set to one,
optimistic addresses won't be marked as deprecated during source address
selection on the interface.
While at it, as we're modifying the prototype for ipv6_use_optimistic_addr(),
drop inline, and let the compiler decide.
Fixes: 7fd2561e4ebd ("net: ipv6: Add a sysctl to make optimistic addresses useful candidates")
Signed-off-by: Matteo Croce <mcroce@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-09-12 18:46:37 +03:00
if ( ! ipv6_use_optimistic_addr ( net , score - > ifa - > idev ) )
net: ipv6: Add a sysctl to make optimistic addresses useful candidates
Add a sysctl that causes an interface's optimistic addresses
to be considered equivalent to other non-deprecated addresses
for source address selection purposes. Preferred addresses
will still take precedence over optimistic addresses, subject
to other ranking in the source address selection algorithm.
This is useful where different interfaces are connected to
different networks from different ISPs (e.g., a cell network
and a home wifi network).
The current behaviour complies with RFC 3484/6724, and it
makes sense if the host has only one interface, or has
multiple interfaces on the same network (same or cooperating
administrative domain(s), but not in the multiple distinct
networks case.
For example, if a mobile device has an IPv6 address on an LTE
network and then connects to IPv6-enabled wifi, while the wifi
IPv6 address is undergoing DAD, IPv6 connections will try use
the wifi default route with the LTE IPv6 address, and will get
stuck until they time out.
Also, because optimistic nodes can receive frames, issue
an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
flag appropriately set). A second RTM_NEWADDR is sent if DAD
completes (the address flags have changed), otherwise an
RTM_DELADDR is sent.
Also: add an entry in ip-sysctl.txt for optimistic_dad.
Signed-off-by: Erik Kline <ek@google.com>
Acked-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-28 12:11:14 +03:00
avoid | = IFA_F_OPTIMISTIC ;
2008-03-02 04:48:21 +03:00
ret = ipv6_saddr_preferred ( score - > addr_type ) | |
net: ipv6: Add a sysctl to make optimistic addresses useful candidates
Add a sysctl that causes an interface's optimistic addresses
to be considered equivalent to other non-deprecated addresses
for source address selection purposes. Preferred addresses
will still take precedence over optimistic addresses, subject
to other ranking in the source address selection algorithm.
This is useful where different interfaces are connected to
different networks from different ISPs (e.g., a cell network
and a home wifi network).
The current behaviour complies with RFC 3484/6724, and it
makes sense if the host has only one interface, or has
multiple interfaces on the same network (same or cooperating
administrative domain(s), but not in the multiple distinct
networks case.
For example, if a mobile device has an IPv6 address on an LTE
network and then connects to IPv6-enabled wifi, while the wifi
IPv6 address is undergoing DAD, IPv6 connections will try use
the wifi default route with the LTE IPv6 address, and will get
stuck until they time out.
Also, because optimistic nodes can receive frames, issue
an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
flag appropriately set). A second RTM_NEWADDR is sent if DAD
completes (the address flags have changed), otherwise an
RTM_DELADDR is sent.
Also: add an entry in ip-sysctl.txt for optimistic_dad.
Signed-off-by: Erik Kline <ek@google.com>
Acked-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-28 12:11:14 +03:00
! ( score - > ifa - > flags & avoid ) ;
2008-03-02 04:48:21 +03:00
break ;
net: ipv6: Add a sysctl to make optimistic addresses useful candidates
Add a sysctl that causes an interface's optimistic addresses
to be considered equivalent to other non-deprecated addresses
for source address selection purposes. Preferred addresses
will still take precedence over optimistic addresses, subject
to other ranking in the source address selection algorithm.
This is useful where different interfaces are connected to
different networks from different ISPs (e.g., a cell network
and a home wifi network).
The current behaviour complies with RFC 3484/6724, and it
makes sense if the host has only one interface, or has
multiple interfaces on the same network (same or cooperating
administrative domain(s), but not in the multiple distinct
networks case.
For example, if a mobile device has an IPv6 address on an LTE
network and then connects to IPv6-enabled wifi, while the wifi
IPv6 address is undergoing DAD, IPv6 connections will try use
the wifi default route with the LTE IPv6 address, and will get
stuck until they time out.
Also, because optimistic nodes can receive frames, issue
an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
flag appropriately set). A second RTM_NEWADDR is sent if DAD
completes (the address flags have changed), otherwise an
RTM_DELADDR is sent.
Also: add an entry in ip-sysctl.txt for optimistic_dad.
Signed-off-by: Erik Kline <ek@google.com>
Acked-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-28 12:11:14 +03:00
}
2008-03-02 04:48:21 +03:00
# ifdef CONFIG_IPV6_MIP6
case IPV6_SADDR_RULE_HOA :
2008-03-25 03:37:42 +03:00
{
2008-03-02 04:48:21 +03:00
/* Rule 4: Prefer home address */
2008-03-25 03:37:42 +03:00
int prefhome = ! ( dst - > prefs & IPV6_PREFER_SRC_COA ) ;
ret = ! ( score - > ifa - > flags & IFA_F_HOMEADDRESS ) ^ prefhome ;
2008-03-02 04:48:21 +03:00
break ;
2008-03-25 03:37:42 +03:00
}
2008-03-02 04:48:21 +03:00
# endif
case IPV6_SADDR_RULE_OIF :
/* Rule 5: Prefer outgoing interface */
ret = ( ! dst - > ifindex | |
dst - > ifindex = = score - > ifa - > idev - > dev - > ifindex ) ;
break ;
case IPV6_SADDR_RULE_LABEL :
/* Rule 6: Prefer matching label */
2008-05-28 16:51:24 +04:00
ret = ipv6_addr_label ( net ,
& score - > ifa - > addr , score - > addr_type ,
2008-03-02 04:48:21 +03:00
score - > ifa - > idev - > dev - > ifindex ) = = dst - > label ;
break ;
case IPV6_SADDR_RULE_PRIVACY :
2008-03-25 03:37:42 +03:00
{
2008-03-02 04:48:21 +03:00
/* Rule 7: Prefer public address
2011-03-31 05:57:33 +04:00
* Note : prefer temporary address if use_tempaddr > = 2
2008-03-02 04:48:21 +03:00
*/
2008-03-25 03:37:42 +03:00
int preftmp = dst - > prefs & ( IPV6_PREFER_SRC_PUBLIC | IPV6_PREFER_SRC_TMP ) ?
! ! ( dst - > prefs & IPV6_PREFER_SRC_TMP ) :
score - > ifa - > idev - > cnf . use_tempaddr > = 2 ;
ret = ( ! ( score - > ifa - > flags & IFA_F_TEMPORARY ) ) ^ preftmp ;
2008-03-02 04:48:21 +03:00
break ;
2008-03-25 03:37:42 +03:00
}
2008-03-02 04:48:21 +03:00
case IPV6_SADDR_RULE_ORCHID :
/* Rule 8-: Prefer ORCHID vs ORCHID or
* non - ORCHID vs non - ORCHID
*/
ret = ! ( ipv6_addr_orchid ( & score - > ifa - > addr ) ^
ipv6_addr_orchid ( dst - > addr ) ) ;
break ;
case IPV6_SADDR_RULE_PREFIX :
/* Rule 8: Use longest matching prefix */
2012-09-10 22:41:07 +04:00
ret = ipv6_addr_diff ( & score - > ifa - > addr , dst - > addr ) ;
if ( ret > score - > ifa - > prefix_len )
ret = score - > ifa - > prefix_len ;
score - > matchlen = ret ;
2008-03-02 04:48:21 +03:00
break ;
net: ipv6: Add a sysctl to make optimistic addresses useful candidates
Add a sysctl that causes an interface's optimistic addresses
to be considered equivalent to other non-deprecated addresses
for source address selection purposes. Preferred addresses
will still take precedence over optimistic addresses, subject
to other ranking in the source address selection algorithm.
This is useful where different interfaces are connected to
different networks from different ISPs (e.g., a cell network
and a home wifi network).
The current behaviour complies with RFC 3484/6724, and it
makes sense if the host has only one interface, or has
multiple interfaces on the same network (same or cooperating
administrative domain(s), but not in the multiple distinct
networks case.
For example, if a mobile device has an IPv6 address on an LTE
network and then connects to IPv6-enabled wifi, while the wifi
IPv6 address is undergoing DAD, IPv6 connections will try use
the wifi default route with the LTE IPv6 address, and will get
stuck until they time out.
Also, because optimistic nodes can receive frames, issue
an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
flag appropriately set). A second RTM_NEWADDR is sent if DAD
completes (the address flags have changed), otherwise an
RTM_DELADDR is sent.
Also: add an entry in ip-sysctl.txt for optimistic_dad.
Signed-off-by: Erik Kline <ek@google.com>
Acked-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-28 12:11:14 +03:00
# ifdef CONFIG_IPV6_OPTIMISTIC_DAD
case IPV6_SADDR_RULE_NOT_OPTIMISTIC :
/* Optimistic addresses still have lower precedence than other
* preferred addresses .
*/
ret = ! ( score - > ifa - > flags & IFA_F_OPTIMISTIC ) ;
break ;
# endif
2008-03-02 04:48:21 +03:00
default :
ret = 0 ;
}
if ( ret )
__set_bit ( i , score - > scorebits ) ;
score - > rule = i ;
out :
return ret ;
}
2015-07-13 17:28:10 +03:00
static int __ipv6_dev_get_saddr ( struct net * net ,
struct ipv6_saddr_dst * dst ,
struct inet6_dev * idev ,
struct ipv6_saddr_score * scores ,
int hiscore_idx )
2015-07-10 10:58:31 +03:00
{
2015-07-13 17:28:10 +03:00
struct ipv6_saddr_score * score = & scores [ 1 - hiscore_idx ] , * hiscore = & scores [ hiscore_idx ] ;
2015-07-10 10:58:31 +03:00
2017-10-08 05:30:27 +03:00
list_for_each_entry_rcu ( score - > ifa , & idev - > addr_list , if_list ) {
2015-07-10 10:58:31 +03:00
int i ;
/*
* - Tentative Address ( RFC2462 section 5.4 )
* - A tentative address is not considered
* " assigned to an interface " in the traditional
* sense , unless it is also flagged as optimistic .
* - Candidate Source Address ( section 4 )
* - In any case , anycast addresses , multicast
* addresses , and the unspecified address MUST
* NOT be included in a candidate set .
*/
if ( ( score - > ifa - > flags & IFA_F_TENTATIVE ) & &
( ! ( score - > ifa - > flags & IFA_F_OPTIMISTIC ) ) )
continue ;
score - > addr_type = __ipv6_addr_type ( & score - > ifa - > addr ) ;
if ( unlikely ( score - > addr_type = = IPV6_ADDR_ANY | |
score - > addr_type & IPV6_ADDR_MULTICAST ) ) {
net_dbg_ratelimited ( " ADDRCONF: unspecified / multicast address assigned as unicast address on %s " ,
idev - > dev - > name ) ;
continue ;
}
score - > rule = - 1 ;
bitmap_zero ( score - > scorebits , IPV6_SADDR_RULE_MAX ) ;
for ( i = 0 ; i < IPV6_SADDR_RULE_MAX ; i + + ) {
int minihiscore , miniscore ;
minihiscore = ipv6_get_saddr_eval ( net , hiscore , dst , i ) ;
miniscore = ipv6_get_saddr_eval ( net , score , dst , i ) ;
if ( minihiscore > miniscore ) {
if ( i = = IPV6_SADDR_RULE_SCOPE & &
score - > scopedist > 0 ) {
/*
* special case :
* each remaining entry
* has too small ( not enough )
* scope , because ifa entries
* are sorted by their scope
* values .
*/
goto out ;
}
break ;
} else if ( minihiscore < miniscore ) {
swap ( hiscore , score ) ;
2015-07-13 17:28:10 +03:00
hiscore_idx = 1 - hiscore_idx ;
2015-07-10 10:58:31 +03:00
/* restore our iterator */
score - > ifa = hiscore - > ifa ;
break ;
}
}
}
out :
2015-07-13 17:28:10 +03:00
return hiscore_idx ;
2015-07-10 10:58:31 +03:00
}
2016-06-17 02:24:26 +03:00
static int ipv6_get_saddr_master ( struct net * net ,
const struct net_device * dst_dev ,
const struct net_device * master ,
struct ipv6_saddr_dst * dst ,
struct ipv6_saddr_score * scores ,
int hiscore_idx )
{
struct inet6_dev * idev ;
idev = __in6_dev_get ( dst_dev ) ;
if ( idev )
hiscore_idx = __ipv6_dev_get_saddr ( net , dst , idev ,
scores , hiscore_idx ) ;
idev = __in6_dev_get ( master ) ;
if ( idev )
hiscore_idx = __ipv6_dev_get_saddr ( net , dst , idev ,
scores , hiscore_idx ) ;
return hiscore_idx ;
}
2012-08-26 21:14:14 +04:00
int ipv6_dev_get_saddr ( struct net * net , const struct net_device * dst_dev ,
[IPV6]: Make address arguments const.
- net/ipv6/addrconf.c:
ipv6_get_ifaddr(), ipv6_dev_get_saddr()
- net/ipv6/mcast.c:
ipv6_sock_mc_join(), ipv6_sock_mc_drop(),
inet6_mc_check(),
ipv6_dev_mc_inc(), __ipv6_dev_mc_dec(), ipv6_dev_mc_dec(),
ipv6_chk_mcast_addr()
- net/ipv6/route.c:
rt6_lookup(), icmp6_dst_alloc()
- net/ipv6/ip6_output.c:
ip6_nd_hdr()
- net/ipv6/ndisc.c:
ndisc_send_ns(), ndisc_send_rs(), ndisc_send_redirect(),
ndisc_get_neigh(), __ndisc_send()
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
2008-04-10 10:42:10 +04:00
const struct in6_addr * daddr , unsigned int prefs ,
2008-03-25 03:37:42 +03:00
struct in6_addr * saddr )
2005-04-17 02:20:36 +04:00
{
2015-07-13 17:28:10 +03:00
struct ipv6_saddr_score scores [ 2 ] , * hiscore ;
2008-03-02 04:48:21 +03:00
struct ipv6_saddr_dst dst ;
2015-07-10 10:58:31 +03:00
struct inet6_dev * idev ;
2005-11-08 20:38:30 +03:00
struct net_device * dev ;
2008-03-02 04:48:21 +03:00
int dst_type ;
2015-07-10 10:58:31 +03:00
bool use_oif_addr = false ;
2015-07-13 17:28:10 +03:00
int hiscore_idx = 0 ;
2017-10-08 05:30:28 +03:00
int ret = 0 ;
2005-04-17 02:20:36 +04:00
2008-03-02 04:48:21 +03:00
dst_type = __ipv6_addr_type ( daddr ) ;
dst . addr = daddr ;
dst . ifindex = dst_dev ? dst_dev - > ifindex : 0 ;
dst . scope = __ipv6_addr_src_scope ( dst_type ) ;
2008-05-28 16:51:24 +04:00
dst . label = ipv6_addr_label ( net , daddr , dst_type , dst . ifindex ) ;
2008-03-25 03:37:42 +03:00
dst . prefs = prefs ;
2008-03-02 04:48:21 +03:00
2015-07-13 17:28:10 +03:00
scores [ hiscore_idx ] . rule = - 1 ;
scores [ hiscore_idx ] . ifa = NULL ;
2005-04-17 02:20:36 +04:00
2006-09-23 01:44:24 +04:00
rcu_read_lock ( ) ;
2005-04-17 02:20:36 +04:00
2015-07-10 10:58:31 +03:00
/* Candidate Source Address (section 4)
* - multicast and link - local destination address ,
* the set of candidate source address MUST only
* include addresses assigned to interfaces
* belonging to the same link as the outgoing
* interface .
* ( - For site - local destination addresses , the
* set of candidate source addresses MUST only
* include addresses assigned to interfaces
* belonging to the same site as the outgoing
* interface . )
2015-07-22 10:38:25 +03:00
* - " It is RECOMMENDED that the candidate source addresses
* be the set of unicast addresses assigned to the
* interface that will be used to send to the destination
* ( the ' outgoing ' interface ) . " (RFC 6724)
2015-07-10 10:58:31 +03:00
*/
if ( dst_dev ) {
2015-07-22 10:38:25 +03:00
idev = __in6_dev_get ( dst_dev ) ;
2015-07-10 10:58:31 +03:00
if ( ( dst_type & IPV6_ADDR_MULTICAST ) | |
2015-07-22 10:38:25 +03:00
dst . scope < = IPV6_ADDR_SCOPE_LINKLOCAL | |
( idev & & idev - > cnf . use_oif_addrs_only ) ) {
2015-07-10 10:58:31 +03:00
use_oif_addr = true ;
}
}
2008-03-02 04:48:21 +03:00
2015-07-10 10:58:31 +03:00
if ( use_oif_addr ) {
2015-07-13 17:28:10 +03:00
if ( idev )
2015-07-16 10:51:30 +03:00
hiscore_idx = __ipv6_dev_get_saddr ( net , & dst , idev , scores , hiscore_idx ) ;
2015-07-10 10:58:31 +03:00
} else {
2016-06-17 02:24:26 +03:00
const struct net_device * master ;
int master_idx = 0 ;
/* if dst_dev exists and is enslaved to an L3 device, then
* prefer addresses from dst_dev and then the master over
* any other enslaved devices in the L3 domain .
*/
master = l3mdev_master_dev_rcu ( dst_dev ) ;
if ( master ) {
master_idx = master - > ifindex ;
hiscore_idx = ipv6_get_saddr_master ( net , dst_dev ,
master , & dst ,
scores , hiscore_idx ) ;
if ( scores [ hiscore_idx ] . ifa )
goto out ;
}
2015-07-10 10:58:31 +03:00
for_each_netdev_rcu ( net , dev ) {
2016-06-17 02:24:26 +03:00
/* only consider addresses on devices in the
* same L3 domain
*/
if ( l3mdev_master_ifindex_rcu ( dev ) ! = master_idx )
continue ;
2015-07-10 10:58:31 +03:00
idev = __in6_dev_get ( dev ) ;
if ( ! idev )
2005-11-08 20:38:30 +03:00
continue ;
2015-07-16 10:51:30 +03:00
hiscore_idx = __ipv6_dev_get_saddr ( net , & dst , idev , scores , hiscore_idx ) ;
2005-04-17 02:20:36 +04:00
}
}
2016-06-17 02:24:26 +03:00
out :
2015-07-13 17:28:10 +03:00
hiscore = & scores [ hiscore_idx ] ;
2008-03-02 04:48:21 +03:00
if ( ! hiscore - > ifa )
2017-10-08 05:30:28 +03:00
ret = - EADDRNOTAVAIL ;
else
* saddr = hiscore - > ifa - > addr ;
2007-02-09 17:24:49 +03:00
2017-10-08 05:30:28 +03:00
rcu_read_unlock ( ) ;
return ret ;
2005-04-17 02:20:36 +04:00
}
2008-03-03 15:44:34 +03:00
EXPORT_SYMBOL ( ipv6_dev_get_saddr ) ;
2005-04-17 02:20:36 +04:00
2013-06-29 17:30:49 +04:00
int __ipv6_get_lladdr ( struct inet6_dev * idev , struct in6_addr * addr ,
2013-12-06 12:45:21 +04:00
u32 banned_flags )
2013-06-23 20:39:01 +04:00
{
struct inet6_ifaddr * ifp ;
int err = - EADDRNOTAVAIL ;
2014-01-20 00:58:19 +04:00
list_for_each_entry_reverse ( ifp , & idev - > addr_list , if_list ) {
if ( ifp - > scope > IFA_LINK )
break ;
2013-06-23 20:39:01 +04:00
if ( ifp - > scope = = IFA_LINK & &
! ( ifp - > flags & banned_flags ) ) {
* addr = ifp - > addr ;
err = 0 ;
break ;
}
}
return err ;
}
2007-04-26 04:08:10 +04:00
int ipv6_get_lladdr ( struct net_device * dev , struct in6_addr * addr ,
2013-12-06 12:45:21 +04:00
u32 banned_flags )
2005-04-17 02:20:36 +04:00
{
struct inet6_dev * idev ;
int err = - EADDRNOTAVAIL ;
2006-09-23 01:44:24 +04:00
rcu_read_lock ( ) ;
2010-03-21 02:09:01 +03:00
idev = __in6_dev_get ( dev ) ;
if ( idev ) {
2005-04-17 02:20:36 +04:00
read_lock_bh ( & idev - > lock ) ;
2013-06-23 20:39:01 +04:00
err = __ipv6_get_lladdr ( idev , addr , banned_flags ) ;
2005-04-17 02:20:36 +04:00
read_unlock_bh ( & idev - > lock ) ;
}
2006-09-23 01:44:24 +04:00
rcu_read_unlock ( ) ;
2005-04-17 02:20:36 +04:00
return err ;
}
2017-10-08 05:30:24 +03:00
static int ipv6_count_addresses ( const struct inet6_dev * idev )
2005-04-17 02:20:36 +04:00
{
2017-10-08 05:30:24 +03:00
const struct inet6_ifaddr * ifp ;
2005-04-17 02:20:36 +04:00
int cnt = 0 ;
2017-10-08 05:30:24 +03:00
rcu_read_lock ( ) ;
list_for_each_entry_rcu ( ifp , & idev - > addr_list , if_list )
2005-04-17 02:20:36 +04:00
cnt + + ;
2017-10-08 05:30:24 +03:00
rcu_read_unlock ( ) ;
2005-04-17 02:20:36 +04:00
return cnt ;
}
2011-04-22 08:53:02 +04:00
int ipv6_chk_addr ( struct net * net , const struct in6_addr * addr ,
2013-05-17 07:56:10 +04:00
const struct net_device * dev , int strict )
2015-02-04 14:01:23 +03:00
{
2018-03-13 18:29:37 +03:00
return ipv6_chk_addr_and_flags ( net , addr , dev , ! dev ,
strict , IFA_F_TENTATIVE ) ;
2015-02-04 14:01:23 +03:00
}
EXPORT_SYMBOL ( ipv6_chk_addr ) ;
2018-03-13 18:29:38 +03:00
/* device argument is used to find the L3 domain of interest. If
* skip_dev_check is set , then the ifp device is not checked against
* the passed in dev argument . So the 2 cases for addresses checks are :
* 1. does the address exist in the L3 domain that dev is part of
* ( skip_dev_check = true ) , or
*
* 2. does the address exist on the specific device
* ( skip_dev_check = false )
*/
2015-02-04 14:01:23 +03:00
int ipv6_chk_addr_and_flags ( struct net * net , const struct in6_addr * addr ,
2018-03-13 18:29:37 +03:00
const struct net_device * dev , bool skip_dev_check ,
int strict , u32 banned_flags )
2005-04-17 02:20:36 +04:00
{
2017-10-24 02:17:47 +03:00
unsigned int hash = inet6_addr_hash ( net , addr ) ;
2018-03-13 18:29:38 +03:00
const struct net_device * l3mdev ;
2010-05-18 09:27:12 +04:00
struct inet6_ifaddr * ifp ;
2015-02-04 14:01:23 +03:00
u32 ifp_flags ;
2005-04-17 02:20:36 +04:00
2017-10-24 02:17:48 +03:00
rcu_read_lock ( ) ;
2018-03-13 18:29:37 +03:00
2018-03-13 18:29:38 +03:00
l3mdev = l3mdev_master_dev_rcu ( dev ) ;
2018-03-13 18:29:37 +03:00
if ( skip_dev_check )
dev = NULL ;
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 05:06:00 +04:00
hlist_for_each_entry_rcu ( ifp , & inet6_addr_lst [ hash ] , addr_lst ) {
2008-03-25 21:57:35 +03:00
if ( ! net_eq ( dev_net ( ifp - > idev - > dev ) , net ) )
2008-01-11 09:43:18 +03:00
continue ;
2018-03-13 18:29:38 +03:00
if ( l3mdev_master_dev_rcu ( ifp - > idev - > dev ) ! = l3mdev )
continue ;
2015-02-04 14:01:23 +03:00
/* Decouple optimistic from tentative for evaluation here.
* Ban optimistic addresses explicitly , when required .
*/
ifp_flags = ( ifp - > flags & IFA_F_OPTIMISTIC )
? ( ifp - > flags & ~ IFA_F_TENTATIVE )
: ifp - > flags ;
2005-04-17 02:20:36 +04:00
if ( ipv6_addr_equal ( & ifp - > addr , addr ) & &
2015-02-04 14:01:23 +03:00
! ( ifp_flags & banned_flags ) & &
2015-03-29 16:00:04 +03:00
( ! dev | | ifp - > idev - > dev = = dev | |
2010-05-18 09:27:12 +04:00
! ( ifp - > scope & ( IFA_LINK | IFA_HOST ) | | strict ) ) ) {
2017-10-24 02:17:48 +03:00
rcu_read_unlock ( ) ;
2010-05-18 09:27:12 +04:00
return 1 ;
2005-04-17 02:20:36 +04:00
}
}
2010-03-17 23:31:11 +03:00
2017-10-24 02:17:48 +03:00
rcu_read_unlock ( ) ;
2010-05-18 09:27:12 +04:00
return 0 ;
2005-04-17 02:20:36 +04:00
}
2015-02-04 14:01:23 +03:00
EXPORT_SYMBOL ( ipv6_chk_addr_and_flags ) ;
2007-02-22 16:05:40 +03:00
2005-04-17 02:20:36 +04:00
2013-09-24 00:04:19 +04:00
/* Compares an address/prefix_len with addresses on device @dev.
* If one is found it returns true .
*/
bool ipv6_chk_custom_prefix ( const struct in6_addr * addr ,
const unsigned int prefix_len , struct net_device * dev )
{
2017-10-08 05:30:25 +03:00
const struct inet6_ifaddr * ifa ;
const struct inet6_dev * idev ;
2013-09-24 00:04:19 +04:00
bool ret = false ;
rcu_read_lock ( ) ;
idev = __in6_dev_get ( dev ) ;
if ( idev ) {
2017-10-08 05:30:25 +03:00
list_for_each_entry_rcu ( ifa , & idev - > addr_list , if_list ) {
2013-09-24 00:04:19 +04:00
ret = ipv6_prefix_equal ( addr , & ifa - > addr , prefix_len ) ;
if ( ret )
break ;
}
}
rcu_read_unlock ( ) ;
return ret ;
}
EXPORT_SYMBOL ( ipv6_chk_custom_prefix ) ;
2011-04-22 08:53:02 +04:00
int ipv6_chk_prefix ( const struct in6_addr * addr , struct net_device * dev )
2008-03-16 05:54:23 +03:00
{
2017-10-08 05:30:26 +03:00
const struct inet6_ifaddr * ifa ;
const struct inet6_dev * idev ;
2008-03-16 05:54:23 +03:00
int onlink ;
onlink = 0 ;
rcu_read_lock ( ) ;
idev = __in6_dev_get ( dev ) ;
if ( idev ) {
2017-10-08 05:30:26 +03:00
list_for_each_entry_rcu ( ifa , & idev - > addr_list , if_list ) {
2008-03-16 05:54:23 +03:00
onlink = ipv6_prefix_equal ( addr , & ifa - > addr ,
ifa - > prefix_len ) ;
if ( onlink )
break ;
}
}
rcu_read_unlock ( ) ;
return onlink ;
}
EXPORT_SYMBOL ( ipv6_chk_prefix ) ;
[IPV6]: Make address arguments const.
- net/ipv6/addrconf.c:
ipv6_get_ifaddr(), ipv6_dev_get_saddr()
- net/ipv6/mcast.c:
ipv6_sock_mc_join(), ipv6_sock_mc_drop(),
inet6_mc_check(),
ipv6_dev_mc_inc(), __ipv6_dev_mc_dec(), ipv6_dev_mc_dec(),
ipv6_chk_mcast_addr()
- net/ipv6/route.c:
rt6_lookup(), icmp6_dst_alloc()
- net/ipv6/ip6_output.c:
ip6_nd_hdr()
- net/ipv6/ndisc.c:
ndisc_send_ns(), ndisc_send_rs(), ndisc_send_redirect(),
ndisc_get_neigh(), __ndisc_send()
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
2008-04-10 10:42:10 +04:00
struct inet6_ifaddr * ipv6_get_ifaddr ( struct net * net , const struct in6_addr * addr ,
2008-01-11 09:44:09 +03:00
struct net_device * dev , int strict )
2005-04-17 02:20:36 +04:00
{
2017-10-24 02:17:47 +03:00
unsigned int hash = inet6_addr_hash ( net , addr ) ;
2010-03-26 07:39:21 +03:00
struct inet6_ifaddr * ifp , * result = NULL ;
2005-04-17 02:20:36 +04:00
2017-10-24 02:17:49 +03:00
rcu_read_lock ( ) ;
hlist_for_each_entry_rcu ( ifp , & inet6_addr_lst [ hash ] , addr_lst ) {
2008-03-25 21:57:35 +03:00
if ( ! net_eq ( dev_net ( ifp - > idev - > dev ) , net ) )
2008-01-11 09:44:09 +03:00
continue ;
2005-04-17 02:20:36 +04:00
if ( ipv6_addr_equal ( & ifp - > addr , addr ) ) {
2015-03-29 16:00:04 +03:00
if ( ! dev | | ifp - > idev - > dev = = dev | |
2005-04-17 02:20:36 +04:00
! ( ifp - > scope & ( IFA_LINK | IFA_HOST ) | | strict ) ) {
2010-03-26 07:39:21 +03:00
result = ifp ;
2005-04-17 02:20:36 +04:00
in6_ifa_hold ( ifp ) ;
break ;
}
}
}
2017-10-24 02:17:49 +03:00
rcu_read_unlock ( ) ;
2005-04-17 02:20:36 +04:00
2010-03-26 07:39:21 +03:00
return result ;
2005-04-17 02:20:36 +04:00
}
/* Gets referenced address, destroys ifaddr */
2009-09-09 18:41:32 +04:00
static void addrconf_dad_stop ( struct inet6_ifaddr * ifp , int dad_failed )
2005-04-17 02:20:36 +04:00
{
2016-01-08 15:47:23 +03:00
if ( dad_failed )
ifp - > flags | = IFA_F_DADFAILED ;
2017-06-29 17:56:54 +03:00
if ( ifp - > flags & IFA_F_TEMPORARY ) {
2005-04-17 02:20:36 +04:00
struct inet6_ifaddr * ifpub ;
spin_lock_bh ( & ifp - > lock ) ;
ifpub = ifp - > ifpub ;
if ( ifpub ) {
in6_ifa_hold ( ifpub ) ;
spin_unlock_bh ( & ifp - > lock ) ;
2017-11-07 01:13:29 +03:00
ipv6_create_tempaddr ( ifpub , ifp , true ) ;
2005-04-17 02:20:36 +04:00
in6_ifa_put ( ifpub ) ;
} else {
spin_unlock_bh ( & ifp - > lock ) ;
}
ipv6_del_addr ( ifp ) ;
2017-06-29 17:56:54 +03:00
} else if ( ifp - > flags & IFA_F_PERMANENT | | ! dad_failed ) {
spin_lock_bh ( & ifp - > lock ) ;
addrconf_del_dad_work ( ifp ) ;
ifp - > flags | = IFA_F_TENTATIVE ;
ipv6: allow userspace to add IFA_F_OPTIMISTIC addresses
According to RFC 4429 (section 3.1), adding new IPv6 addresses as
optimistic addresses is acceptable, as long as the implementation
follows some rules:
* Optimistic DAD SHOULD only be used when the implementation is aware
that the address is based on a most likely unique interface
identifier (such as in [RFC2464]), generated randomly [RFC3041],
or by a well-distributed hash function [RFC3972] or assigned by
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) [RFC3315].
Optimistic DAD SHOULD NOT be used for manually entered
addresses.
Thus, it seems reasonable to allow userspace to set the optimistic flag
when adding new addresses.
We must not let userspace set NODAD + OPTIMISTIC, since if the kernel is
not performing DAD we would never clear the optimistic flag. We must
also ignore userspace's request to add OPTIMISTIC flag to addresses that
have already completed DAD (addresses that don't have the TENTATIVE
flag, or that have the DADFAILED flag).
Then we also need to clear the OPTIMISTIC flag on permanent addresses
when DAD fails. Otherwise, IFA_F_OPTIMISTIC addresses added by userspace
can still be used after DAD has failed, because in
ipv6_chk_addr_and_flags(), IFA_F_OPTIMISTIC overrides IFA_F_TENTATIVE.
Setting IFA_F_OPTIMISTIC from userspace is conditional on
CONFIG_IPV6_OPTIMISTIC_DAD and the optimistic_dad sysctl.
Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
Reviewed-by: Stefano Brivio <sbrivio@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-02-28 18:40:08 +03:00
if ( dad_failed )
ifp - > flags & = ~ IFA_F_OPTIMISTIC ;
2017-06-29 17:56:54 +03:00
spin_unlock_bh ( & ifp - > lock ) ;
if ( dad_failed )
ipv6_ifa_notify ( 0 , ifp ) ;
in6_ifa_put ( ifp ) ;
2014-03-27 21:28:07 +04:00
} else {
2005-04-17 02:20:36 +04:00
ipv6_del_addr ( ifp ) ;
2014-03-27 21:28:07 +04:00
}
2005-04-17 02:20:36 +04:00
}
2010-05-19 02:55:27 +04:00
static int addrconf_dad_end ( struct inet6_ifaddr * ifp )
{
int err = - ENOENT ;
2015-03-24 01:36:03 +03:00
spin_lock_bh ( & ifp - > lock ) ;
2010-05-19 02:55:27 +04:00
if ( ifp - > state = = INET6_IFADDR_STATE_DAD ) {
ifp - > state = INET6_IFADDR_STATE_POSTDAD ;
err = 0 ;
}
2015-03-24 01:36:03 +03:00
spin_unlock_bh ( & ifp - > lock ) ;
2010-05-19 02:55:27 +04:00
return err ;
}
2017-10-31 02:38:52 +03:00
void addrconf_dad_failure ( struct sk_buff * skb , struct inet6_ifaddr * ifp )
2005-12-21 16:57:24 +03:00
{
2008-06-28 09:18:38 +04:00
struct inet6_dev * idev = ifp - > idev ;
2015-03-24 01:36:05 +03:00
struct net * net = dev_net ( ifp - > idev - > dev ) ;
2009-03-19 04:22:48 +03:00
2010-10-25 03:06:43 +04:00
if ( addrconf_dad_end ( ifp ) ) {
in6_ifa_put ( ifp ) ;
2010-05-19 02:55:27 +04:00
return ;
2010-10-25 03:06:43 +04:00
}
2010-05-19 02:55:27 +04:00
2017-10-31 02:38:52 +03:00
net_info_ratelimited ( " %s: IPv6 duplicate address %pI6c used by %pM detected! \n " ,
ifp - > idev - > dev - > name , & ifp - > addr , eth_hdr ( skb ) - > h_source ) ;
2009-03-19 04:22:48 +03:00
2015-03-24 01:36:04 +03:00
spin_lock_bh ( & ifp - > lock ) ;
if ( ifp - > flags & IFA_F_STABLE_PRIVACY ) {
struct in6_addr new_addr ;
struct inet6_ifaddr * ifp2 ;
int retries = ifp - > stable_privacy_retry + 1 ;
2018-05-27 18:09:53 +03:00
struct ifa6_config cfg = {
. pfx = & new_addr ,
. plen = ifp - > prefix_len ,
. ifa_flags = ifp - > flags ,
. valid_lft = ifp - > valid_lft ,
. preferred_lft = ifp - > prefered_lft ,
. scope = ifp - > scope ,
} ;
2015-03-24 01:36:04 +03:00
2015-03-24 01:36:05 +03:00
if ( retries > net - > ipv6 . sysctl . idgen_retries ) {
2015-03-24 01:36:04 +03:00
net_info_ratelimited ( " %s: privacy stable address generation failed because of DAD conflicts! \n " ,
ifp - > idev - > dev - > name ) ;
goto errdad ;
}
new_addr = ifp - > addr ;
if ( ipv6_generate_stable_address ( & new_addr , retries ,
idev ) )
goto errdad ;
spin_unlock_bh ( & ifp - > lock ) ;
2008-06-28 09:18:38 +04:00
2015-03-24 01:36:04 +03:00
if ( idev - > cnf . max_addresses & &
ipv6_count_addresses ( idev ) > =
idev - > cnf . max_addresses )
goto lock_errdad ;
net_info_ratelimited ( " %s: generating new stable privacy address because of DAD conflict \n " ,
ifp - > idev - > dev - > name ) ;
2018-05-27 18:09:53 +03:00
ifp2 = ipv6_add_addr ( idev , & cfg , false , NULL ) ;
2015-03-24 01:36:04 +03:00
if ( IS_ERR ( ifp2 ) )
goto lock_errdad ;
spin_lock_bh ( & ifp2 - > lock ) ;
ifp2 - > stable_privacy_retry = retries ;
ifp2 - > state = INET6_IFADDR_STATE_PREDAD ;
spin_unlock_bh ( & ifp2 - > lock ) ;
2015-03-24 01:36:05 +03:00
addrconf_mod_dad_work ( ifp2 , net - > ipv6 . sysctl . idgen_delay ) ;
2015-03-24 01:36:04 +03:00
in6_ifa_put ( ifp2 ) ;
lock_errdad :
spin_lock_bh ( & ifp - > lock ) ;
2008-06-28 09:18:38 +04:00
}
2015-03-24 01:36:04 +03:00
errdad :
2014-03-27 21:28:07 +04:00
/* transition from _POSTDAD to _ERRDAD */
ifp - > state = INET6_IFADDR_STATE_ERRDAD ;
2015-03-24 01:36:03 +03:00
spin_unlock_bh ( & ifp - > lock ) ;
2014-03-27 21:28:07 +04:00
addrconf_mod_dad_work ( ifp , 0 ) ;
2016-09-05 11:06:31 +03:00
in6_ifa_put ( ifp ) ;
2005-12-21 16:57:24 +03:00
}
2005-04-17 02:20:36 +04:00
2014-09-02 12:29:29 +04:00
/* Join to solicited addr multicast group.
* caller must hold RTNL */
2011-04-22 08:53:02 +04:00
void addrconf_join_solict ( struct net_device * dev , const struct in6_addr * addr )
2005-04-17 02:20:36 +04:00
{
struct in6_addr maddr ;
if ( dev - > flags & ( IFF_LOOPBACK | IFF_NOARP ) )
return ;
addrconf_addr_solict_mult ( addr , & maddr ) ;
ipv6_dev_mc_inc ( dev , & maddr ) ;
}
2014-09-02 12:29:29 +04:00
/* caller must hold RTNL */
2011-04-22 08:53:02 +04:00
void addrconf_leave_solict ( struct inet6_dev * idev , const struct in6_addr * addr )
2005-04-17 02:20:36 +04:00
{
struct in6_addr maddr ;
if ( idev - > dev - > flags & ( IFF_LOOPBACK | IFF_NOARP ) )
return ;
addrconf_addr_solict_mult ( addr , & maddr ) ;
__ipv6_dev_mc_dec ( idev , & maddr ) ;
}
2014-09-02 12:29:29 +04:00
/* caller must hold RTNL */
2005-08-16 09:18:02 +04:00
static void addrconf_join_anycast ( struct inet6_ifaddr * ifp )
2005-04-17 02:20:36 +04:00
{
struct in6_addr addr ;
2014-03-27 21:28:07 +04:00
2014-01-06 20:53:14 +04:00
if ( ifp - > prefix_len > = 127 ) /* RFC 6164 */
2011-07-06 03:04:13 +04:00
return ;
2005-04-17 02:20:36 +04:00
ipv6_addr_prefix ( & addr , & ifp - > addr , ifp - > prefix_len ) ;
if ( ipv6_addr_any ( & addr ) )
return ;
2014-09-12 02:35:11 +04:00
__ipv6_dev_ac_inc ( ifp - > idev , & addr ) ;
2005-04-17 02:20:36 +04:00
}
2014-09-02 12:29:29 +04:00
/* caller must hold RTNL */
2005-08-16 09:18:02 +04:00
static void addrconf_leave_anycast ( struct inet6_ifaddr * ifp )
2005-04-17 02:20:36 +04:00
{
struct in6_addr addr ;
2014-03-27 21:28:07 +04:00
2014-01-06 20:53:14 +04:00
if ( ifp - > prefix_len > = 127 ) /* RFC 6164 */
2011-07-24 15:44:34 +04:00
return ;
2005-04-17 02:20:36 +04:00
ipv6_addr_prefix ( & addr , & ifp - > addr , ifp - > prefix_len ) ;
if ( ipv6_addr_any ( & addr ) )
return ;
__ipv6_dev_ac_dec ( ifp - > idev , & addr ) ;
}
2017-03-12 11:19:36 +03:00
static int addrconf_ifid_6lowpan ( u8 * eui , struct net_device * dev )
2012-05-10 07:25:52 +04:00
{
2017-03-12 11:19:36 +03:00
switch ( dev - > addr_len ) {
case ETH_ALEN :
2017-03-12 11:19:38 +03:00
memcpy ( eui , dev - > dev_addr , 3 ) ;
eui [ 3 ] = 0xFF ;
eui [ 4 ] = 0xFE ;
memcpy ( eui + 5 , dev - > dev_addr + 3 , 3 ) ;
break ;
2017-03-12 11:19:36 +03:00
case EUI64_ADDR_LEN :
memcpy ( eui , dev - > dev_addr , EUI64_ADDR_LEN ) ;
eui [ 0 ] ^ = 2 ;
break ;
default :
2012-05-10 07:25:52 +04:00
return - 1 ;
2017-03-12 11:19:36 +03:00
}
2012-05-10 07:25:52 +04:00
return 0 ;
}
2013-03-25 12:26:24 +04:00
static int addrconf_ifid_ieee1394 ( u8 * eui , struct net_device * dev )
{
union fwnet_hwaddr * ha ;
if ( dev - > addr_len ! = FWNET_ALEN )
return - 1 ;
ha = ( union fwnet_hwaddr * ) dev - > dev_addr ;
memcpy ( eui , & ha - > uc . uniq_id , sizeof ( ha - > uc . uniq_id ) ) ;
eui [ 0 ] ^ = 2 ;
return 0 ;
}
2006-03-21 03:54:49 +03:00
static int addrconf_ifid_arcnet ( u8 * eui , struct net_device * dev )
{
/* XXX: inherit EUI-64 from other interface -- yoshfuji */
if ( dev - > addr_len ! = ARCNET_ALEN )
return - 1 ;
memset ( eui , 0 , 7 ) ;
2012-04-01 11:49:08 +04:00
eui [ 7 ] = * ( u8 * ) dev - > dev_addr ;
2006-03-21 03:54:49 +03:00
return 0 ;
}
static int addrconf_ifid_infiniband ( u8 * eui , struct net_device * dev )
{
if ( dev - > addr_len ! = INFINIBAND_ALEN )
return - 1 ;
memcpy ( eui , dev - > dev_addr + 12 , 8 ) ;
eui [ 0 ] | = 2 ;
return 0 ;
}
2010-10-05 00:17:53 +04:00
static int __ipv6_isatap_ifid ( u8 * eui , __be32 addr )
2008-04-10 10:42:09 +04:00
{
2009-05-19 16:56:51 +04:00
if ( addr = = 0 )
return - 1 ;
2008-04-10 10:42:09 +04:00
eui [ 0 ] = ( ipv4_is_zeronet ( addr ) | | ipv4_is_private_10 ( addr ) | |
ipv4_is_loopback ( addr ) | | ipv4_is_linklocal_169 ( addr ) | |
ipv4_is_private_172 ( addr ) | | ipv4_is_test_192 ( addr ) | |
ipv4_is_anycast_6to4 ( addr ) | | ipv4_is_private_192 ( addr ) | |
ipv4_is_test_198 ( addr ) | | ipv4_is_multicast ( addr ) | |
ipv4_is_lbcast ( addr ) ) ? 0x00 : 0x02 ;
eui [ 1 ] = 0 ;
eui [ 2 ] = 0x5E ;
eui [ 3 ] = 0xFE ;
memcpy ( eui + 4 , & addr , 4 ) ;
return 0 ;
}
static int addrconf_ifid_sit ( u8 * eui , struct net_device * dev )
{
if ( dev - > priv_flags & IFF_ISATAP )
return __ipv6_isatap_ifid ( eui , * ( __be32 * ) dev - > dev_addr ) ;
return - 1 ;
}
2011-06-08 14:44:30 +04:00
static int addrconf_ifid_gre ( u8 * eui , struct net_device * dev )
{
return __ipv6_isatap_ifid ( eui , * ( __be32 * ) dev - > dev_addr ) ;
}
2013-08-20 14:16:06 +04:00
static int addrconf_ifid_ip6tnl ( u8 * eui , struct net_device * dev )
{
memcpy ( eui , dev - > perm_addr , 3 ) ;
memcpy ( eui + 5 , dev - > perm_addr + 3 , 3 ) ;
eui [ 3 ] = 0xFF ;
eui [ 4 ] = 0xFE ;
eui [ 0 ] ^ = 2 ;
return 0 ;
}
2005-04-17 02:20:36 +04:00
static int ipv6_generate_eui64 ( u8 * eui , struct net_device * dev )
{
switch ( dev - > type ) {
case ARPHRD_ETHER :
case ARPHRD_FDDI :
2006-03-21 03:54:49 +03:00
return addrconf_ifid_eui48 ( eui , dev ) ;
2005-04-17 02:20:36 +04:00
case ARPHRD_ARCNET :
2006-03-21 03:54:49 +03:00
return addrconf_ifid_arcnet ( eui , dev ) ;
2005-04-17 02:20:36 +04:00
case ARPHRD_INFINIBAND :
2006-03-21 03:54:49 +03:00
return addrconf_ifid_infiniband ( eui , dev ) ;
2007-11-29 14:11:40 +03:00
case ARPHRD_SIT :
2008-04-10 10:42:09 +04:00
return addrconf_ifid_sit ( eui , dev ) ;
2011-06-08 14:44:30 +04:00
case ARPHRD_IPGRE :
2017-01-26 06:59:18 +03:00
case ARPHRD_TUNNEL :
2011-06-08 14:44:30 +04:00
return addrconf_ifid_gre ( eui , dev ) ;
2013-12-11 19:05:36 +04:00
case ARPHRD_6LOWPAN :
2017-03-12 11:19:36 +03:00
return addrconf_ifid_6lowpan ( eui , dev ) ;
2013-03-25 12:26:24 +04:00
case ARPHRD_IEEE1394 :
return addrconf_ifid_ieee1394 ( eui , dev ) ;
2013-08-20 14:16:06 +04:00
case ARPHRD_TUNNEL6 :
2017-01-26 06:59:18 +03:00
case ARPHRD_IP6GRE :
2018-06-05 04:26:07 +03:00
case ARPHRD_RAWIP :
2013-08-20 14:16:06 +04:00
return addrconf_ifid_ip6tnl ( eui , dev ) ;
2005-04-17 02:20:36 +04:00
}
return - 1 ;
}
static int ipv6_inherit_eui64 ( u8 * eui , struct inet6_dev * idev )
{
int err = - 1 ;
struct inet6_ifaddr * ifp ;
read_lock_bh ( & idev - > lock ) ;
2014-01-20 00:58:19 +04:00
list_for_each_entry_reverse ( ifp , & idev - > addr_list , if_list ) {
if ( ifp - > scope > IFA_LINK )
break ;
2005-04-17 02:20:36 +04:00
if ( ifp - > scope = = IFA_LINK & & ! ( ifp - > flags & IFA_F_TENTATIVE ) ) {
memcpy ( eui , ifp - > addr . s6_addr + 8 , 8 ) ;
err = 0 ;
break ;
}
}
read_unlock_bh ( & idev - > lock ) ;
return err ;
}
/* (re)generation of randomized interface identifier (RFC 3041 3.2, 3.5) */
2016-10-13 19:50:02 +03:00
static void ipv6_regen_rndid ( struct inet6_dev * idev )
2005-04-17 02:20:36 +04:00
{
regen :
2006-03-21 03:54:09 +03:00
get_random_bytes ( idev - > rndid , sizeof ( idev - > rndid ) ) ;
2005-04-17 02:20:36 +04:00
idev - > rndid [ 0 ] & = ~ 0x02 ;
/*
* < draft - ietf - ipngwg - temp - addresses - v2 - 00. txt > :
* check if generated address is not inappropriate
*
* - Reserved subnet anycast ( RFC 2526 )
* 11111101 11. . . .11 1 xxxxxxx
2007-11-29 14:11:40 +03:00
* - ISATAP ( RFC4214 ) 6.1
2005-04-17 02:20:36 +04:00
* 00 - 00 - 5 E - FE - xx - xx - xx - xx
* - value 0
* - XXX : already assigned to an address on the device
*/
2007-02-09 17:24:49 +03:00
if ( idev - > rndid [ 0 ] = = 0xfd & &
2005-04-17 02:20:36 +04:00
( idev - > rndid [ 1 ] & idev - > rndid [ 2 ] & idev - > rndid [ 3 ] & idev - > rndid [ 4 ] & idev - > rndid [ 5 ] & idev - > rndid [ 6 ] ) = = 0xff & &
( idev - > rndid [ 7 ] & 0x80 ) )
goto regen ;
if ( ( idev - > rndid [ 0 ] | idev - > rndid [ 1 ] ) = = 0 ) {
if ( idev - > rndid [ 2 ] = = 0x5e & & idev - > rndid [ 3 ] = = 0xfe )
goto regen ;
if ( ( idev - > rndid [ 2 ] | idev - > rndid [ 3 ] | idev - > rndid [ 4 ] | idev - > rndid [ 5 ] | idev - > rndid [ 6 ] | idev - > rndid [ 7 ] ) = = 0x00 )
goto regen ;
}
}
2016-10-13 19:50:02 +03:00
static void ipv6_try_regen_rndid ( struct inet6_dev * idev , struct in6_addr * tmpaddr )
2012-04-01 11:49:08 +04:00
{
2005-04-17 02:20:36 +04:00
if ( tmpaddr & & memcmp ( idev - > rndid , & tmpaddr - > s6_addr [ 8 ] , 8 ) = = 0 )
2016-10-13 19:50:02 +03:00
ipv6_regen_rndid ( idev ) ;
2005-04-17 02:20:36 +04:00
}
/*
* Add prefix route .
*/
static void
2018-05-27 18:09:58 +03:00
addrconf_prefix_route ( struct in6_addr * pfx , int plen , u32 metric ,
struct net_device * dev , unsigned long expires ,
u32 flags , gfp_t gfp_flags )
2005-04-17 02:20:36 +04:00
{
2006-08-22 11:01:08 +04:00
struct fib6_config cfg = {
2015-10-12 21:47:10 +03:00
. fc_table = l3mdev_fib_table ( dev ) ? : RT6_TABLE_PREFIX ,
2018-05-27 18:09:58 +03:00
. fc_metric = metric ? : IP6_RT_PRIO_ADDRCONF ,
2006-08-22 11:01:08 +04:00
. fc_ifindex = dev - > ifindex ,
. fc_expires = expires ,
. fc_dst_len = plen ,
. fc_flags = RTF_UP | flags ,
2008-03-25 15:47:49 +03:00
. fc_nlinfo . nl_net = dev_net ( dev ) ,
2008-08-23 16:16:46 +04:00
. fc_protocol = RTPROT_KERNEL ,
2018-04-18 03:33:13 +03:00
. fc_type = RTN_UNICAST ,
2006-08-22 11:01:08 +04:00
} ;
2005-04-17 02:20:36 +04:00
2011-11-21 07:39:03 +04:00
cfg . fc_dst = * pfx ;
2005-04-17 02:20:36 +04:00
/* Prevent useless cloning on PtP SIT.
This thing is done here expecting that the whole
class of non - broadcast devices need not cloning .
*/
2012-10-29 20:23:10 +04:00
# if IS_ENABLED(CONFIG_IPV6_SIT)
2006-08-22 11:01:08 +04:00
if ( dev - > type = = ARPHRD_SIT & & ( dev - > flags & IFF_POINTOPOINT ) )
cfg . fc_flags | = RTF_NONEXTHOP ;
2006-10-11 01:49:53 +04:00
# endif
2005-04-17 02:20:36 +04:00
2018-04-18 03:33:22 +03:00
ip6_route_add ( & cfg , gfp_flags , NULL ) ;
2005-04-17 02:20:36 +04:00
}
2011-10-26 07:24:29 +04:00
2018-04-18 03:33:26 +03:00
static struct fib6_info * addrconf_get_prefix_route ( const struct in6_addr * pfx ,
2011-10-26 07:24:29 +04:00
int plen ,
const struct net_device * dev ,
u32 flags , u32 noflags )
{
struct fib6_node * fn ;
2018-04-18 03:33:26 +03:00
struct fib6_info * rt = NULL ;
2011-10-26 07:24:29 +04:00
struct fib6_table * table ;
2015-10-12 21:47:10 +03:00
u32 tb_id = l3mdev_fib_table ( dev ) ? : RT6_TABLE_PREFIX ;
2011-10-26 07:24:29 +04:00
2015-10-12 21:47:10 +03:00
table = fib6_get_table ( dev_net ( dev ) , tb_id ) ;
2015-03-29 16:00:04 +03:00
if ( ! table )
2011-10-26 07:24:29 +04:00
return NULL ;
ipv6: replace rwlock with rcu and spinlock in fib6_table
With all the preparation work before, we are now ready to replace rwlock
with rcu and spinlock in fib6_table.
That means now all fib6_node in fib6_table are protected by rcu. And
when freeing fib6_node, call_rcu() is used to wait for the rcu grace
period before releasing the memory.
When accessing fib6_node, corresponding rcu APIs need to be used.
And all previous sessions protected by the write lock will now be
protected by the spin lock per table.
All previous sessions protected by read lock will now be protected by
rcu_read_lock().
A couple of things to note here:
1. As part of the work of replacing rwlock with rcu, the linked list of
fn->leaf now has to be rcu protected as well. So both fn->leaf and
rt->dst.rt6_next are now __rcu tagged and corresponding rcu APIs are
used when manipulating them.
2. For fn->rr_ptr, first of all, it also needs to be rcu protected now
and is tagged with __rcu and rcu APIs are used in corresponding places.
Secondly, fn->rr_ptr is changed in rt6_select() which is a reader
thread. This makes the issue a bit complicated. We think a valid
solution for it is to let rt6_select() grab the tb6_lock if it decides
to change it. As it is not in the normal operation and only happens when
there is no valid neighbor cache for the route, we think the performance
impact should be low.
3. fib6_walk_continue() has to be called with tb6_lock held even in the
route dumping related functions, e.g. inet6_dump_fib(),
fib6_tables_dump() and ipv6_route_seq_ops. It is because
fib6_walk_continue() makes modifications to the walker structure, and so
are fib6_repair_tree() and fib6_del_route(). In order to do proper
syncing between them, we need to let fib6_walk_continue() hold the lock.
We may be able to do further improvement on the way we do the tree walk
to get rid of the need for holding the spin lock. But not for now.
4. When fib6_del_route() removes a route from the tree, we no longer
mark rt->dst.rt6_next to NULL to make simultaneous reader be able to
further traverse the list with rcu. However, rt->dst.rt6_next is only
valid within this same rcu period. No one should access it later.
5. All the operation of atomic_inc(rt->rt6i_ref) is changed to be
performed before we publish this route (either by linking it to fn->leaf
or insert it in the list pointed by fn->leaf) just to be safe because as
soon as we publish the route, some read thread will be able to access it.
Signed-off-by: Wei Wang <weiwan@google.com>
Signed-off-by: Martin KaFai Lau <kafai@fb.com>
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-10-06 22:06:10 +03:00
rcu_read_lock ( ) ;
2017-10-06 22:06:02 +03:00
fn = fib6_locate ( & table - > tb6_root , pfx , plen , NULL , 0 , true ) ;
2011-10-26 07:24:29 +04:00
if ( ! fn )
goto out ;
2015-04-28 23:03:03 +03:00
ipv6: replace rwlock with rcu and spinlock in fib6_table
With all the preparation work before, we are now ready to replace rwlock
with rcu and spinlock in fib6_table.
That means now all fib6_node in fib6_table are protected by rcu. And
when freeing fib6_node, call_rcu() is used to wait for the rcu grace
period before releasing the memory.
When accessing fib6_node, corresponding rcu APIs need to be used.
And all previous sessions protected by the write lock will now be
protected by the spin lock per table.
All previous sessions protected by read lock will now be protected by
rcu_read_lock().
A couple of things to note here:
1. As part of the work of replacing rwlock with rcu, the linked list of
fn->leaf now has to be rcu protected as well. So both fn->leaf and
rt->dst.rt6_next are now __rcu tagged and corresponding rcu APIs are
used when manipulating them.
2. For fn->rr_ptr, first of all, it also needs to be rcu protected now
and is tagged with __rcu and rcu APIs are used in corresponding places.
Secondly, fn->rr_ptr is changed in rt6_select() which is a reader
thread. This makes the issue a bit complicated. We think a valid
solution for it is to let rt6_select() grab the tb6_lock if it decides
to change it. As it is not in the normal operation and only happens when
there is no valid neighbor cache for the route, we think the performance
impact should be low.
3. fib6_walk_continue() has to be called with tb6_lock held even in the
route dumping related functions, e.g. inet6_dump_fib(),
fib6_tables_dump() and ipv6_route_seq_ops. It is because
fib6_walk_continue() makes modifications to the walker structure, and so
are fib6_repair_tree() and fib6_del_route(). In order to do proper
syncing between them, we need to let fib6_walk_continue() hold the lock.
We may be able to do further improvement on the way we do the tree walk
to get rid of the need for holding the spin lock. But not for now.
4. When fib6_del_route() removes a route from the tree, we no longer
mark rt->dst.rt6_next to NULL to make simultaneous reader be able to
further traverse the list with rcu. However, rt->dst.rt6_next is only
valid within this same rcu period. No one should access it later.
5. All the operation of atomic_inc(rt->rt6i_ref) is changed to be
performed before we publish this route (either by linking it to fn->leaf
or insert it in the list pointed by fn->leaf) just to be safe because as
soon as we publish the route, some read thread will be able to access it.
Signed-off-by: Wei Wang <weiwan@google.com>
Signed-off-by: Martin KaFai Lau <kafai@fb.com>
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-10-06 22:06:10 +03:00
for_each_fib6_node_rt_rcu ( fn ) {
2018-04-18 03:33:14 +03:00
if ( rt - > fib6_nh . nh_dev - > ifindex ! = dev - > ifindex )
2011-10-26 07:24:29 +04:00
continue ;
2018-04-19 01:38:59 +03:00
if ( ( rt - > fib6_flags & flags ) ! = flags )
2011-10-26 07:24:29 +04:00
continue ;
2018-04-19 01:38:59 +03:00
if ( ( rt - > fib6_flags & noflags ) ! = 0 )
2011-10-26 07:24:29 +04:00
continue ;
2018-07-22 06:56:32 +03:00
if ( ! fib6_info_hold_safe ( rt ) )
continue ;
2011-10-26 07:24:29 +04:00
break ;
}
out :
ipv6: replace rwlock with rcu and spinlock in fib6_table
With all the preparation work before, we are now ready to replace rwlock
with rcu and spinlock in fib6_table.
That means now all fib6_node in fib6_table are protected by rcu. And
when freeing fib6_node, call_rcu() is used to wait for the rcu grace
period before releasing the memory.
When accessing fib6_node, corresponding rcu APIs need to be used.
And all previous sessions protected by the write lock will now be
protected by the spin lock per table.
All previous sessions protected by read lock will now be protected by
rcu_read_lock().
A couple of things to note here:
1. As part of the work of replacing rwlock with rcu, the linked list of
fn->leaf now has to be rcu protected as well. So both fn->leaf and
rt->dst.rt6_next are now __rcu tagged and corresponding rcu APIs are
used when manipulating them.
2. For fn->rr_ptr, first of all, it also needs to be rcu protected now
and is tagged with __rcu and rcu APIs are used in corresponding places.
Secondly, fn->rr_ptr is changed in rt6_select() which is a reader
thread. This makes the issue a bit complicated. We think a valid
solution for it is to let rt6_select() grab the tb6_lock if it decides
to change it. As it is not in the normal operation and only happens when
there is no valid neighbor cache for the route, we think the performance
impact should be low.
3. fib6_walk_continue() has to be called with tb6_lock held even in the
route dumping related functions, e.g. inet6_dump_fib(),
fib6_tables_dump() and ipv6_route_seq_ops. It is because
fib6_walk_continue() makes modifications to the walker structure, and so
are fib6_repair_tree() and fib6_del_route(). In order to do proper
syncing between them, we need to let fib6_walk_continue() hold the lock.
We may be able to do further improvement on the way we do the tree walk
to get rid of the need for holding the spin lock. But not for now.
4. When fib6_del_route() removes a route from the tree, we no longer
mark rt->dst.rt6_next to NULL to make simultaneous reader be able to
further traverse the list with rcu. However, rt->dst.rt6_next is only
valid within this same rcu period. No one should access it later.
5. All the operation of atomic_inc(rt->rt6i_ref) is changed to be
performed before we publish this route (either by linking it to fn->leaf
or insert it in the list pointed by fn->leaf) just to be safe because as
soon as we publish the route, some read thread will be able to access it.
Signed-off-by: Wei Wang <weiwan@google.com>
Signed-off-by: Martin KaFai Lau <kafai@fb.com>
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-10-06 22:06:10 +03:00
rcu_read_unlock ( ) ;
2011-10-26 07:24:29 +04:00
return rt ;
}
2005-04-17 02:20:36 +04:00
/* Create "default" multicast route to the interface */
static void addrconf_add_mroute ( struct net_device * dev )
{
2006-08-22 11:01:08 +04:00
struct fib6_config cfg = {
2015-10-12 21:47:10 +03:00
. fc_table = l3mdev_fib_table ( dev ) ? : RT6_TABLE_LOCAL ,
2006-08-22 11:01:08 +04:00
. fc_metric = IP6_RT_PRIO_ADDRCONF ,
. fc_ifindex = dev - > ifindex ,
. fc_dst_len = 8 ,
. fc_flags = RTF_UP ,
2018-04-18 03:33:13 +03:00
. fc_type = RTN_UNICAST ,
2008-03-25 15:47:49 +03:00
. fc_nlinfo . nl_net = dev_net ( dev ) ,
2006-08-22 11:01:08 +04:00
} ;
ipv6_addr_set ( & cfg . fc_dst , htonl ( 0xFF000000 ) , 0 , 0 , 0 ) ;
2018-08-22 22:58:34 +03:00
ip6_route_add ( & cfg , GFP_KERNEL , NULL ) ;
2005-04-17 02:20:36 +04:00
}
static struct inet6_dev * addrconf_add_dev ( struct net_device * dev )
{
struct inet6_dev * idev ;
ASSERT_RTNL ( ) ;
2010-03-21 02:09:01 +03:00
idev = ipv6_find_idev ( dev ) ;
if ( ! idev )
2010-07-20 14:34:30 +04:00
return ERR_PTR ( - ENOBUFS ) ;
if ( idev - > cnf . disable_ipv6 )
return ERR_PTR ( - EACCES ) ;
2005-04-17 02:20:36 +04:00
/* Add default multicast route */
2016-06-13 23:44:18 +03:00
if ( ! ( dev - > flags & IFF_LOOPBACK ) & & ! netif_is_l3_master ( dev ) )
2011-12-07 01:23:45 +04:00
addrconf_add_mroute ( dev ) ;
2005-04-17 02:20:36 +04:00
return idev ;
}
2013-12-06 12:45:22 +04:00
static void manage_tempaddrs ( struct inet6_dev * idev ,
struct inet6_ifaddr * ifp ,
__u32 valid_lft , __u32 prefered_lft ,
bool create , unsigned long now )
{
u32 flags ;
struct inet6_ifaddr * ift ;
read_lock_bh ( & idev - > lock ) ;
/* update all temporary addresses in the list */
list_for_each_entry ( ift , & idev - > tempaddr_list , tmp_list ) {
int age , max_valid , max_prefered ;
if ( ifp ! = ift - > ifpub )
continue ;
/* RFC 4941 section 3.3:
* If a received option will extend the lifetime of a public
* address , the lifetimes of temporary addresses should
* be extended , subject to the overall constraint that no
* temporary addresses should ever remain " valid " or " preferred "
* for a time longer than ( TEMP_VALID_LIFETIME ) or
* ( TEMP_PREFERRED_LIFETIME - DESYNC_FACTOR ) , respectively .
*/
age = ( now - ift - > cstamp ) / HZ ;
max_valid = idev - > cnf . temp_valid_lft - age ;
if ( max_valid < 0 )
max_valid = 0 ;
max_prefered = idev - > cnf . temp_prefered_lft -
2016-10-13 19:52:15 +03:00
idev - > desync_factor - age ;
2013-12-06 12:45:22 +04:00
if ( max_prefered < 0 )
max_prefered = 0 ;
if ( valid_lft > max_valid )
valid_lft = max_valid ;
if ( prefered_lft > max_prefered )
prefered_lft = max_prefered ;
spin_lock ( & ift - > lock ) ;
flags = ift - > flags ;
ift - > valid_lft = valid_lft ;
ift - > prefered_lft = prefered_lft ;
ift - > tstamp = now ;
if ( prefered_lft > 0 )
ift - > flags & = ~ IFA_F_DEPRECATED ;
spin_unlock ( & ift - > lock ) ;
if ( ! ( flags & IFA_F_TENTATIVE ) )
ipv6_ifa_notify ( 0 , ift ) ;
}
if ( ( create | | list_empty ( & idev - > tempaddr_list ) ) & &
idev - > cnf . use_tempaddr > 0 ) {
/* When a new public address is created as described
* in [ ADDRCONF ] , also create a new temporary address .
* Also create a temporary address if it ' s enabled but
* no temporary address currently exists .
*/
read_unlock_bh ( & idev - > lock ) ;
2017-11-07 01:13:29 +03:00
ipv6_create_tempaddr ( ifp , NULL , false ) ;
2013-12-06 12:45:22 +04:00
} else {
read_unlock_bh ( & idev - > lock ) ;
}
}
2015-12-16 18:44:38 +03:00
static bool is_addr_mode_generate_stable ( struct inet6_dev * idev )
{
2017-01-26 06:59:17 +03:00
return idev - > cnf . addr_gen_mode = = IN6_ADDR_GEN_MODE_STABLE_PRIVACY | |
idev - > cnf . addr_gen_mode = = IN6_ADDR_GEN_MODE_RANDOM ;
2015-12-16 18:44:38 +03:00
}
2016-06-15 22:20:24 +03:00
int addrconf_prefix_rcv_add_addr ( struct net * net , struct net_device * dev ,
const struct prefix_info * pinfo ,
struct inet6_dev * in6_dev ,
const struct in6_addr * addr , int addr_type ,
u32 addr_flags , bool sllao , bool tokenized ,
__u32 valid_lft , u32 prefered_lft )
2016-06-15 22:20:22 +03:00
{
struct inet6_ifaddr * ifp = ipv6_get_ifaddr ( net , addr , dev , 1 ) ;
int create = 0 , update_lft = 0 ;
if ( ! ifp & & valid_lft ) {
int max_addresses = in6_dev - > cnf . max_addresses ;
2018-05-27 18:09:53 +03:00
struct ifa6_config cfg = {
. pfx = addr ,
. plen = pinfo - > prefix_len ,
. ifa_flags = addr_flags ,
. valid_lft = valid_lft ,
. preferred_lft = prefered_lft ,
. scope = addr_type & IPV6_ADDR_SCOPE_MASK ,
} ;
2016-06-15 22:20:22 +03:00
# ifdef CONFIG_IPV6_OPTIMISTIC_DAD
ipv6: fix net.ipv6.conf.all interface DAD handlers
Currently, writing into
net.ipv6.conf.all.{accept_dad,use_optimistic,optimistic_dad} has no effect.
Fix handling of these flags by:
- using the maximum of global and per-interface values for the
accept_dad flag. That is, if at least one of the two values is
non-zero, enable DAD on the interface. If at least one value is
set to 2, enable DAD and disable IPv6 operation on the interface if
MAC-based link-local address was found
- using the logical OR of global and per-interface values for the
optimistic_dad flag. If at least one of them is set to one, optimistic
duplicate address detection (RFC 4429) is enabled on the interface
- using the logical OR of global and per-interface values for the
use_optimistic flag. If at least one of them is set to one,
optimistic addresses won't be marked as deprecated during source address
selection on the interface.
While at it, as we're modifying the prototype for ipv6_use_optimistic_addr(),
drop inline, and let the compiler decide.
Fixes: 7fd2561e4ebd ("net: ipv6: Add a sysctl to make optimistic addresses useful candidates")
Signed-off-by: Matteo Croce <mcroce@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-09-12 18:46:37 +03:00
if ( ( net - > ipv6 . devconf_all - > optimistic_dad | |
in6_dev - > cnf . optimistic_dad ) & &
2016-06-15 22:20:22 +03:00
! net - > ipv6 . devconf_all - > forwarding & & sllao )
2018-05-27 18:09:53 +03:00
cfg . ifa_flags | = IFA_F_OPTIMISTIC ;
2016-06-15 22:20:22 +03:00
# endif
/* Do not allow to create too much of autoconfigured
* addresses ; this would be too easy way to crash kernel .
*/
if ( ! max_addresses | |
ipv6_count_addresses ( in6_dev ) < max_addresses )
2018-05-27 18:09:53 +03:00
ifp = ipv6_add_addr ( in6_dev , & cfg , false , NULL ) ;
2016-06-15 22:20:22 +03:00
if ( IS_ERR_OR_NULL ( ifp ) )
return - 1 ;
create = 1 ;
spin_lock_bh ( & ifp - > lock ) ;
ifp - > flags | = IFA_F_MANAGETEMPADDR ;
ifp - > cstamp = jiffies ;
ifp - > tokenized = tokenized ;
spin_unlock_bh ( & ifp - > lock ) ;
addrconf_dad_start ( ifp ) ;
}
if ( ifp ) {
u32 flags ;
unsigned long now ;
u32 stored_lft ;
/* update lifetime (RFC2462 5.5.3 e) */
spin_lock_bh ( & ifp - > lock ) ;
now = jiffies ;
if ( ifp - > valid_lft > ( now - ifp - > tstamp ) / HZ )
stored_lft = ifp - > valid_lft - ( now - ifp - > tstamp ) / HZ ;
else
stored_lft = 0 ;
2018-04-16 18:52:59 +03:00
if ( ! create & & stored_lft ) {
2016-06-15 22:20:22 +03:00
const u32 minimum_lft = min_t ( u32 ,
stored_lft , MIN_VALID_LIFETIME ) ;
valid_lft = max ( valid_lft , minimum_lft ) ;
/* RFC4862 Section 5.5.3e:
* " Note that the preferred lifetime of the
* corresponding address is always reset to
* the Preferred Lifetime in the received
* Prefix Information option , regardless of
* whether the valid lifetime is also reset or
* ignored . "
*
* So we should always update prefered_lft here .
*/
update_lft = 1 ;
}
if ( update_lft ) {
ifp - > valid_lft = valid_lft ;
ifp - > prefered_lft = prefered_lft ;
ifp - > tstamp = now ;
flags = ifp - > flags ;
ifp - > flags & = ~ IFA_F_DEPRECATED ;
spin_unlock_bh ( & ifp - > lock ) ;
if ( ! ( flags & IFA_F_TENTATIVE ) )
ipv6_ifa_notify ( 0 , ifp ) ;
} else
spin_unlock_bh ( & ifp - > lock ) ;
manage_tempaddrs ( in6_dev , ifp , valid_lft , prefered_lft ,
create , now ) ;
in6_ifa_put ( ifp ) ;
addrconf_verify ( ) ;
}
return 0 ;
}
2016-06-15 22:20:24 +03:00
EXPORT_SYMBOL_GPL ( addrconf_prefix_rcv_add_addr ) ;
2016-06-15 22:20:22 +03:00
2012-01-04 14:49:15 +04:00
void addrconf_prefix_rcv ( struct net_device * dev , u8 * opt , int len , bool sllao )
2005-04-17 02:20:36 +04:00
{
struct prefix_info * pinfo ;
__u32 valid_lft ;
__u32 prefered_lft ;
2016-06-15 22:20:22 +03:00
int addr_type , err ;
2015-03-24 01:36:02 +03:00
u32 addr_flags = 0 ;
2005-04-17 02:20:36 +04:00
struct inet6_dev * in6_dev ;
2009-06-01 14:07:33 +04:00
struct net * net = dev_net ( dev ) ;
2005-04-17 02:20:36 +04:00
pinfo = ( struct prefix_info * ) opt ;
2007-02-09 17:24:49 +03:00
2005-04-17 02:20:36 +04:00
if ( len < sizeof ( struct prefix_info ) ) {
2018-03-26 18:35:01 +03:00
netdev_dbg ( dev , " addrconf: prefix option too short \n " ) ;
2005-04-17 02:20:36 +04:00
return ;
}
2007-02-09 17:24:49 +03:00
2005-04-17 02:20:36 +04:00
/*
* Validation checks ( [ ADDRCONF ] , page 19 )
*/
addr_type = ipv6_addr_type ( & pinfo - > prefix ) ;
if ( addr_type & ( IPV6_ADDR_MULTICAST | IPV6_ADDR_LINKLOCAL ) )
return ;
valid_lft = ntohl ( pinfo - > valid ) ;
prefered_lft = ntohl ( pinfo - > prefered ) ;
if ( prefered_lft > valid_lft ) {
2012-05-14 01:56:26 +04:00
net_warn_ratelimited ( " addrconf: prefix option has invalid lifetime \n " ) ;
2005-04-17 02:20:36 +04:00
return ;
}
in6_dev = in6_dev_get ( dev ) ;
2015-03-29 16:00:04 +03:00
if ( ! in6_dev ) {
2012-05-14 01:56:26 +04:00
net_dbg_ratelimited ( " addrconf: device %s not configured \n " ,
dev - > name ) ;
2005-04-17 02:20:36 +04:00
return ;
}
/*
* Two things going on here :
* 1 ) Add routes for on - link prefixes
* 2 ) Configure prefixes with the auto flag set
*/
2008-05-27 12:37:49 +04:00
if ( pinfo - > onlink ) {
2018-04-18 03:33:26 +03:00
struct fib6_info * rt ;
2008-05-27 12:37:49 +04:00
unsigned long rt_expires ;
2008-05-20 03:56:11 +04:00
/* Avoid arithmetic overflow. Really, we could
* save rt_expires in seconds , likely valid_lft ,
* but it would require division in fib gc , that it
* not good .
*/
2008-05-27 12:37:49 +04:00
if ( HZ > USER_HZ )
rt_expires = addrconf_timeout_fixup ( valid_lft , HZ ) ;
else
rt_expires = addrconf_timeout_fixup ( valid_lft , USER_HZ ) ;
2005-12-20 01:02:45 +03:00
2008-05-27 12:37:49 +04:00
if ( addrconf_finite_timeout ( rt_expires ) )
rt_expires * = HZ ;
2005-04-17 02:20:36 +04:00
2011-10-26 07:24:29 +04:00
rt = addrconf_get_prefix_route ( & pinfo - > prefix ,
pinfo - > prefix_len ,
dev ,
RTF_ADDRCONF | RTF_PREFIX_RT ,
RTF_GATEWAY | RTF_DEFAULT ) ;
2005-04-17 02:20:36 +04:00
2011-10-26 07:24:29 +04:00
if ( rt ) {
2008-05-20 03:56:11 +04:00
/* Autoconf prefix route */
if ( valid_lft = = 0 ) {
2018-04-18 03:33:11 +03:00
ip6_del_rt ( net , rt ) ;
2008-05-20 03:56:11 +04:00
rt = NULL ;
2008-05-27 12:37:49 +04:00
} else if ( addrconf_finite_timeout ( rt_expires ) ) {
2008-05-20 03:56:11 +04:00
/* not infinity */
2018-04-18 03:33:17 +03:00
fib6_set_expires ( rt , jiffies + rt_expires ) ;
2008-05-20 03:56:11 +04:00
} else {
2018-04-18 03:33:17 +03:00
fib6_clean_expires ( rt ) ;
2005-04-17 02:20:36 +04:00
}
} else if ( valid_lft ) {
2008-05-20 03:56:11 +04:00
clock_t expires = 0 ;
2008-05-27 12:37:49 +04:00
int flags = RTF_ADDRCONF | RTF_PREFIX_RT ;
if ( addrconf_finite_timeout ( rt_expires ) ) {
2008-05-20 03:56:11 +04:00
/* not infinity */
flags | = RTF_EXPIRES ;
expires = jiffies_to_clock_t ( rt_expires ) ;
}
2005-04-17 02:20:36 +04:00
addrconf_prefix_route ( & pinfo - > prefix , pinfo - > prefix_len ,
2018-05-27 18:09:58 +03:00
0 , dev , expires , flags ,
GFP_ATOMIC ) ;
2005-04-17 02:20:36 +04:00
}
2018-04-18 03:33:25 +03:00
fib6_info_release ( rt ) ;
2005-04-17 02:20:36 +04:00
}
/* Try to figure out our local address for this prefix */
if ( pinfo - > autoconf & & in6_dev - > cnf . autoconf ) {
struct in6_addr addr ;
2016-06-15 22:20:23 +03:00
bool tokenized = false , dev_addr_generated = false ;
2005-04-17 02:20:36 +04:00
if ( pinfo - > prefix_len = = 64 ) {
memcpy ( & addr , & pinfo - > prefix , 8 ) ;
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 08:01:30 +04:00
if ( ! ipv6_addr_any ( & in6_dev - > token ) ) {
read_lock_bh ( & in6_dev - > lock ) ;
memcpy ( addr . s6_addr + 8 ,
in6_dev - > token . s6_addr + 8 , 8 ) ;
read_unlock_bh ( & in6_dev - > lock ) ;
2013-04-09 07:47:16 +04:00
tokenized = true ;
2015-12-16 18:44:38 +03:00
} else if ( is_addr_mode_generate_stable ( in6_dev ) & &
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 01:36:01 +03:00
! ipv6_generate_stable_address ( & addr , 0 ,
in6_dev ) ) {
2015-03-24 01:36:02 +03:00
addr_flags | = IFA_F_STABLE_PRIVACY ;
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 01:36:01 +03:00
goto ok ;
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 08:01:30 +04:00
} else if ( ipv6_generate_eui64 ( addr . s6_addr + 8 , dev ) & &
ipv6_inherit_eui64 ( addr . s6_addr + 8 , in6_dev ) ) {
2016-06-15 22:20:22 +03:00
goto put ;
2016-06-15 22:20:23 +03:00
} else {
dev_addr_generated = true ;
2005-04-17 02:20:36 +04:00
}
goto ok ;
}
2012-05-14 01:56:26 +04:00
net_dbg_ratelimited ( " IPv6 addrconf: prefix with wrong length %d \n " ,
pinfo - > prefix_len ) ;
2016-06-15 22:20:22 +03:00
goto put ;
2005-04-17 02:20:36 +04:00
ok :
2016-06-15 22:20:22 +03:00
err = addrconf_prefix_rcv_add_addr ( net , dev , pinfo , in6_dev ,
& addr , addr_type ,
addr_flags , sllao ,
tokenized , valid_lft ,
prefered_lft ) ;
if ( err )
goto put ;
2016-06-15 22:20:23 +03:00
/* Ignore error case here because previous prefix add addr was
* successful which will be notified .
*/
ndisc_ops_prefix_rcv_add_addr ( net , dev , pinfo , in6_dev , & addr ,
addr_type , addr_flags , sllao ,
tokenized , valid_lft ,
prefered_lft ,
dev_addr_generated ) ;
2005-04-17 02:20:36 +04:00
}
inet6_prefix_notify ( RTM_NEWPREFIX , in6_dev , pinfo ) ;
2016-06-15 22:20:22 +03:00
put :
2005-04-17 02:20:36 +04:00
in6_dev_put ( in6_dev ) ;
}
/*
* Set destination address .
* Special case for SIT interfaces where we create a new " virtual "
* device .
*/
2008-03-05 21:46:57 +03:00
int addrconf_set_dstaddr ( struct net * net , void __user * arg )
2005-04-17 02:20:36 +04:00
{
struct in6_ifreq ireq ;
struct net_device * dev ;
int err = - EINVAL ;
rtnl_lock ( ) ;
err = - EFAULT ;
if ( copy_from_user ( & ireq , arg , sizeof ( struct in6_ifreq ) ) )
goto err_exit ;
2008-03-05 21:46:57 +03:00
dev = __dev_get_by_index ( net , ireq . ifr6_ifindex ) ;
2005-04-17 02:20:36 +04:00
err = - ENODEV ;
2015-03-29 16:00:04 +03:00
if ( ! dev )
2005-04-17 02:20:36 +04:00
goto err_exit ;
2012-10-29 20:23:10 +04:00
# if IS_ENABLED(CONFIG_IPV6_SIT)
2005-04-17 02:20:36 +04:00
if ( dev - > type = = ARPHRD_SIT ) {
2008-11-20 08:52:05 +03:00
const struct net_device_ops * ops = dev - > netdev_ops ;
2005-04-17 02:20:36 +04:00
struct ifreq ifr ;
struct ip_tunnel_parm p ;
err = - EADDRNOTAVAIL ;
if ( ! ( ipv6_addr_type ( & ireq . ifr6_addr ) & IPV6_ADDR_COMPATv4 ) )
goto err_exit ;
memset ( & p , 0 , sizeof ( p ) ) ;
p . iph . daddr = ireq . ifr6_addr . s6_addr32 [ 3 ] ;
p . iph . saddr = 0 ;
p . iph . version = 4 ;
p . iph . ihl = 5 ;
p . iph . protocol = IPPROTO_IPV6 ;
p . iph . ttl = 64 ;
2008-01-21 11:48:43 +03:00
ifr . ifr_ifru . ifru_data = ( __force void __user * ) & p ;
2005-04-17 02:20:36 +04:00
2008-11-20 08:52:05 +03:00
if ( ops - > ndo_do_ioctl ) {
mm_segment_t oldfs = get_fs ( ) ;
set_fs ( KERNEL_DS ) ;
err = ops - > ndo_do_ioctl ( dev , & ifr , SIOCADDTUNNEL ) ;
set_fs ( oldfs ) ;
} else
err = - EOPNOTSUPP ;
2005-04-17 02:20:36 +04:00
if ( err = = 0 ) {
err = - ENOBUFS ;
2008-03-05 21:46:57 +03:00
dev = __dev_get_by_name ( net , p . name ) ;
if ( ! dev )
2005-04-17 02:20:36 +04:00
goto err_exit ;
2018-12-06 20:05:36 +03:00
err = dev_open ( dev , NULL ) ;
2005-04-17 02:20:36 +04:00
}
}
2006-10-11 01:49:53 +04:00
# endif
2005-04-17 02:20:36 +04:00
err_exit :
rtnl_unlock ( ) ;
return err ;
}
2015-02-25 20:58:35 +03:00
static int ipv6_mc_config ( struct sock * sk , bool join ,
const struct in6_addr * addr , int ifindex )
{
int ret ;
ASSERT_RTNL ( ) ;
lock_sock ( sk ) ;
if ( join )
ipv4, ipv6: kill ip_mc_{join, leave}_group and ipv6_sock_mc_{join, drop}
in favor of their inner __ ones, which doesn't grab rtnl.
As these functions need to operate on a locked socket, we can't be
grabbing rtnl by then. It's too late and doing so causes reversed
locking.
So this patch:
- move rtnl handling to callers instead while already fixing some
reversed locking situations, like on vxlan and ipvs code.
- renames __ ones to not have the __ mark:
__ip_mc_{join,leave}_group -> ip_mc_{join,leave}_group
__ipv6_sock_mc_{join,drop} -> ipv6_sock_mc_{join,drop}
Signed-off-by: Marcelo Ricardo Leitner <marcelo.leitner@gmail.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-18 20:50:43 +03:00
ret = ipv6_sock_mc_join ( sk , ifindex , addr ) ;
2015-02-25 20:58:35 +03:00
else
ipv4, ipv6: kill ip_mc_{join, leave}_group and ipv6_sock_mc_{join, drop}
in favor of their inner __ ones, which doesn't grab rtnl.
As these functions need to operate on a locked socket, we can't be
grabbing rtnl by then. It's too late and doing so causes reversed
locking.
So this patch:
- move rtnl handling to callers instead while already fixing some
reversed locking situations, like on vxlan and ipvs code.
- renames __ ones to not have the __ mark:
__ip_mc_{join,leave}_group -> ip_mc_{join,leave}_group
__ipv6_sock_mc_{join,drop} -> ipv6_sock_mc_{join,drop}
Signed-off-by: Marcelo Ricardo Leitner <marcelo.leitner@gmail.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-18 20:50:43 +03:00
ret = ipv6_sock_mc_drop ( sk , ifindex , addr ) ;
2015-02-25 20:58:35 +03:00
release_sock ( sk ) ;
return ret ;
}
2005-04-17 02:20:36 +04:00
/*
* Manual configuration of address on an interface
*/
2013-12-06 12:45:21 +04:00
static int inet6_addr_add ( struct net * net , int ifindex ,
2018-05-27 18:09:54 +03:00
struct ifa6_config * cfg ,
2017-10-18 19:56:54 +03:00
struct netlink_ext_ack * extack )
2005-04-17 02:20:36 +04:00
{
struct inet6_ifaddr * ifp ;
struct inet6_dev * idev ;
struct net_device * dev ;
2015-02-25 20:58:35 +03:00
unsigned long timeout ;
clock_t expires ;
2008-05-20 03:56:11 +04:00
u32 flags ;
2005-04-17 02:20:36 +04:00
ASSERT_RTNL ( ) ;
2007-02-09 17:24:49 +03:00
2018-05-27 18:09:54 +03:00
if ( cfg - > plen > 128 )
2008-05-28 18:54:22 +04:00
return - EINVAL ;
2006-07-28 13:12:10 +04:00
/* check the lifetime */
2018-05-27 18:09:54 +03:00
if ( ! cfg - > valid_lft | | cfg - > preferred_lft > cfg - > valid_lft )
2006-07-28 13:12:10 +04:00
return - EINVAL ;
2018-05-27 18:09:54 +03:00
if ( cfg - > ifa_flags & IFA_F_MANAGETEMPADDR & & cfg - > plen ! = 64 )
2013-12-06 12:45:22 +04:00
return - EINVAL ;
2008-03-05 21:46:57 +03:00
dev = __dev_get_by_index ( net , ifindex ) ;
if ( ! dev )
2005-04-17 02:20:36 +04:00
return - ENODEV ;
2007-02-09 17:24:49 +03:00
2010-07-20 14:34:30 +04:00
idev = addrconf_add_dev ( dev ) ;
if ( IS_ERR ( idev ) )
return PTR_ERR ( idev ) ;
2005-04-17 02:20:36 +04:00
2018-05-27 18:09:54 +03:00
if ( cfg - > ifa_flags & IFA_F_MCAUTOJOIN ) {
2015-02-25 20:58:35 +03:00
int ret = ipv6_mc_config ( net - > ipv6 . mc_autojoin_sk ,
2018-05-27 18:09:54 +03:00
true , cfg - > pfx , ifindex ) ;
2015-02-25 20:58:35 +03:00
if ( ret < 0 )
return ret ;
}
2018-05-27 18:09:54 +03:00
cfg - > scope = ipv6_addr_scope ( cfg - > pfx ) ;
2005-04-17 02:20:36 +04:00
2018-05-27 18:09:54 +03:00
timeout = addrconf_timeout_fixup ( cfg - > valid_lft , HZ ) ;
2008-05-27 12:37:49 +04:00
if ( addrconf_finite_timeout ( timeout ) ) {
expires = jiffies_to_clock_t ( timeout * HZ ) ;
2018-05-27 18:09:54 +03:00
cfg - > valid_lft = timeout ;
2008-05-20 03:56:11 +04:00
flags = RTF_EXPIRES ;
2008-05-27 12:37:49 +04:00
} else {
expires = 0 ;
flags = 0 ;
2018-05-27 18:09:54 +03:00
cfg - > ifa_flags | = IFA_F_PERMANENT ;
2008-05-20 03:56:11 +04:00
}
2006-07-28 13:12:10 +04:00
2018-05-27 18:09:54 +03:00
timeout = addrconf_timeout_fixup ( cfg - > preferred_lft , HZ ) ;
2008-05-27 12:37:49 +04:00
if ( addrconf_finite_timeout ( timeout ) ) {
if ( timeout = = 0 )
2018-05-27 18:09:54 +03:00
cfg - > ifa_flags | = IFA_F_DEPRECATED ;
cfg - > preferred_lft = timeout ;
2008-05-27 12:37:49 +04:00
}
2006-07-28 13:12:10 +04:00
2018-05-27 18:09:54 +03:00
ifp = ipv6_add_addr ( idev , cfg , true , extack ) ;
2005-04-17 02:20:36 +04:00
if ( ! IS_ERR ( ifp ) ) {
2018-05-27 18:09:54 +03:00
if ( ! ( cfg - > ifa_flags & IFA_F_NOPREFIXROUTE ) ) {
2018-05-27 18:09:58 +03:00
addrconf_prefix_route ( & ifp - > addr , ifp - > prefix_len ,
ifp - > rt_priority , dev , expires ,
flags , GFP_KERNEL ) ;
2014-01-15 18:36:58 +04:00
}
2018-04-17 12:54:39 +03:00
/* Send a netlink notification if DAD is enabled and
* optimistic flag is not set
*/
if ( ! ( ifp - > flags & ( IFA_F_OPTIMISTIC | IFA_F_NODAD ) ) )
ipv6_ifa_notify ( 0 , ifp ) ;
2007-04-26 04:08:10 +04:00
/*
* Note that section 3.1 of RFC 4429 indicates
* that the Optimistic flag should not be set for
* manually configured addresses
*/
2012-04-15 05:37:40 +04:00
addrconf_dad_start ( ifp ) ;
2018-05-27 18:09:54 +03:00
if ( cfg - > ifa_flags & IFA_F_MANAGETEMPADDR )
manage_tempaddrs ( idev , ifp , cfg - > valid_lft ,
cfg - > preferred_lft , true , jiffies ) ;
2005-04-17 02:20:36 +04:00
in6_ifa_put ( ifp ) ;
2014-03-27 21:28:07 +04:00
addrconf_verify_rtnl ( ) ;
2005-04-17 02:20:36 +04:00
return 0 ;
2018-05-27 18:09:54 +03:00
} else if ( cfg - > ifa_flags & IFA_F_MCAUTOJOIN ) {
ipv6_mc_config ( net - > ipv6 . mc_autojoin_sk , false ,
cfg - > pfx , ifindex ) ;
2005-04-17 02:20:36 +04:00
}
return PTR_ERR ( ifp ) ;
}
2014-04-20 23:29:36 +04:00
static int inet6_addr_del ( struct net * net , int ifindex , u32 ifa_flags ,
const struct in6_addr * pfx , unsigned int plen )
2005-04-17 02:20:36 +04:00
{
struct inet6_ifaddr * ifp ;
struct inet6_dev * idev ;
struct net_device * dev ;
2007-02-09 17:24:49 +03:00
2008-05-28 18:54:22 +04:00
if ( plen > 128 )
return - EINVAL ;
2008-03-05 21:46:57 +03:00
dev = __dev_get_by_index ( net , ifindex ) ;
if ( ! dev )
2005-04-17 02:20:36 +04:00
return - ENODEV ;
2014-11-24 00:28:43 +03:00
idev = __in6_dev_get ( dev ) ;
2015-03-29 16:00:04 +03:00
if ( ! idev )
2005-04-17 02:20:36 +04:00
return - ENXIO ;
read_lock_bh ( & idev - > lock ) ;
2010-03-17 23:31:13 +03:00
list_for_each_entry ( ifp , & idev - > addr_list , if_list ) {
2005-04-17 02:20:36 +04:00
if ( ifp - > prefix_len = = plen & &
ipv6_addr_equal ( pfx , & ifp - > addr ) ) {
in6_ifa_hold ( ifp ) ;
read_unlock_bh ( & idev - > lock ) ;
2007-02-09 17:24:49 +03:00
2014-04-20 23:29:36 +04:00
if ( ! ( ifp - > flags & IFA_F_TEMPORARY ) & &
( ifa_flags & IFA_F_MANAGETEMPADDR ) )
manage_tempaddrs ( idev , ifp , 0 , 0 , false ,
jiffies ) ;
2005-04-17 02:20:36 +04:00
ipv6_del_addr ( ifp ) ;
2014-04-20 23:29:36 +04:00
addrconf_verify_rtnl ( ) ;
2015-02-25 20:58:35 +03:00
if ( ipv6_addr_is_multicast ( pfx ) ) {
ipv6_mc_config ( net - > ipv6 . mc_autojoin_sk ,
false , pfx , dev - > ifindex ) ;
}
2005-04-17 02:20:36 +04:00
return 0 ;
}
}
read_unlock_bh ( & idev - > lock ) ;
return - EADDRNOTAVAIL ;
}
2008-03-05 21:46:57 +03:00
int addrconf_add_ifaddr ( struct net * net , void __user * arg )
2005-04-17 02:20:36 +04:00
{
2018-05-27 18:09:54 +03:00
struct ifa6_config cfg = {
. ifa_flags = IFA_F_PERMANENT ,
. preferred_lft = INFINITY_LIFE_TIME ,
. valid_lft = INFINITY_LIFE_TIME ,
} ;
2005-04-17 02:20:36 +04:00
struct in6_ifreq ireq ;
int err ;
2007-02-09 17:24:49 +03:00
net: Allow userns root to control ipv6
Allow an unpriviled user who has created a user namespace, and then
created a network namespace to effectively use the new network
namespace, by reducing capable(CAP_NET_ADMIN) and
capable(CAP_NET_RAW) calls to be ns_capable(net->user_ns,
CAP_NET_ADMIN), or capable(net->user_ns, CAP_NET_RAW) calls.
Settings that merely control a single network device are allowed.
Either the network device is a logical network device where
restrictions make no difference or the network device is hardware NIC
that has been explicity moved from the initial network namespace.
In general policy and network stack state changes are allowed while
resource control is left unchanged.
Allow the SIOCSIFADDR ioctl to add ipv6 addresses.
Allow the SIOCDIFADDR ioctl to delete ipv6 addresses.
Allow the SIOCADDRT ioctl to add ipv6 routes.
Allow the SIOCDELRT ioctl to delete ipv6 routes.
Allow creation of ipv6 raw sockets.
Allow setting the IPV6_JOIN_ANYCAST socket option.
Allow setting the IPV6_FL_A_RENEW parameter of the IPV6_FLOWLABEL_MGR
socket option.
Allow setting the IPV6_TRANSPARENT socket option.
Allow setting the IPV6_HOPOPTS socket option.
Allow setting the IPV6_RTHDRDSTOPTS socket option.
Allow setting the IPV6_DSTOPTS socket option.
Allow setting the IPV6_IPSEC_POLICY socket option.
Allow setting the IPV6_XFRM_POLICY socket option.
Allow sending packets with the IPV6_2292HOPOPTS control message.
Allow sending packets with the IPV6_2292DSTOPTS control message.
Allow sending packets with the IPV6_RTHDRDSTOPTS control message.
Allow setting the multicast routing socket options on non multicast
routing sockets.
Allow the SIOCADDTUNNEL, SIOCCHGTUNNEL, and SIOCDELTUNNEL ioctls for
setting up, changing and deleting tunnels over ipv6.
Allow the SIOCADDTUNNEL, SIOCCHGTUNNEL, SIOCDELTUNNEL ioctls for
setting up, changing and deleting ipv6 over ipv4 tunnels.
Allow the SIOCADDPRL, SIOCDELPRL, SIOCCHGPRL ioctls for adding,
deleting, and changing the potential router list for ISATAP tunnels.
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2012-11-16 07:03:06 +04:00
if ( ! ns_capable ( net - > user_ns , CAP_NET_ADMIN ) )
2005-04-17 02:20:36 +04:00
return - EPERM ;
2007-02-09 17:24:49 +03:00
2005-04-17 02:20:36 +04:00
if ( copy_from_user ( & ireq , arg , sizeof ( struct in6_ifreq ) ) )
return - EFAULT ;
2018-05-27 18:09:54 +03:00
cfg . pfx = & ireq . ifr6_addr ;
cfg . plen = ireq . ifr6_prefixlen ;
2005-04-17 02:20:36 +04:00
rtnl_lock ( ) ;
2018-05-27 18:09:54 +03:00
err = inet6_addr_add ( net , ireq . ifr6_ifindex , & cfg , NULL ) ;
2005-04-17 02:20:36 +04:00
rtnl_unlock ( ) ;
return err ;
}
2008-03-05 21:46:57 +03:00
int addrconf_del_ifaddr ( struct net * net , void __user * arg )
2005-04-17 02:20:36 +04:00
{
struct in6_ifreq ireq ;
int err ;
2007-02-09 17:24:49 +03:00
net: Allow userns root to control ipv6
Allow an unpriviled user who has created a user namespace, and then
created a network namespace to effectively use the new network
namespace, by reducing capable(CAP_NET_ADMIN) and
capable(CAP_NET_RAW) calls to be ns_capable(net->user_ns,
CAP_NET_ADMIN), or capable(net->user_ns, CAP_NET_RAW) calls.
Settings that merely control a single network device are allowed.
Either the network device is a logical network device where
restrictions make no difference or the network device is hardware NIC
that has been explicity moved from the initial network namespace.
In general policy and network stack state changes are allowed while
resource control is left unchanged.
Allow the SIOCSIFADDR ioctl to add ipv6 addresses.
Allow the SIOCDIFADDR ioctl to delete ipv6 addresses.
Allow the SIOCADDRT ioctl to add ipv6 routes.
Allow the SIOCDELRT ioctl to delete ipv6 routes.
Allow creation of ipv6 raw sockets.
Allow setting the IPV6_JOIN_ANYCAST socket option.
Allow setting the IPV6_FL_A_RENEW parameter of the IPV6_FLOWLABEL_MGR
socket option.
Allow setting the IPV6_TRANSPARENT socket option.
Allow setting the IPV6_HOPOPTS socket option.
Allow setting the IPV6_RTHDRDSTOPTS socket option.
Allow setting the IPV6_DSTOPTS socket option.
Allow setting the IPV6_IPSEC_POLICY socket option.
Allow setting the IPV6_XFRM_POLICY socket option.
Allow sending packets with the IPV6_2292HOPOPTS control message.
Allow sending packets with the IPV6_2292DSTOPTS control message.
Allow sending packets with the IPV6_RTHDRDSTOPTS control message.
Allow setting the multicast routing socket options on non multicast
routing sockets.
Allow the SIOCADDTUNNEL, SIOCCHGTUNNEL, and SIOCDELTUNNEL ioctls for
setting up, changing and deleting tunnels over ipv6.
Allow the SIOCADDTUNNEL, SIOCCHGTUNNEL, SIOCDELTUNNEL ioctls for
setting up, changing and deleting ipv6 over ipv4 tunnels.
Allow the SIOCADDPRL, SIOCDELPRL, SIOCCHGPRL ioctls for adding,
deleting, and changing the potential router list for ISATAP tunnels.
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2012-11-16 07:03:06 +04:00
if ( ! ns_capable ( net - > user_ns , CAP_NET_ADMIN ) )
2005-04-17 02:20:36 +04:00
return - EPERM ;
if ( copy_from_user ( & ireq , arg , sizeof ( struct in6_ifreq ) ) )
return - EFAULT ;
rtnl_lock ( ) ;
2014-04-20 23:29:36 +04:00
err = inet6_addr_del ( net , ireq . ifr6_ifindex , 0 , & ireq . ifr6_addr ,
2008-03-05 21:46:57 +03:00
ireq . ifr6_prefixlen ) ;
2005-04-17 02:20:36 +04:00
rtnl_unlock ( ) ;
return err ;
}
2009-02-07 10:48:01 +03:00
static void add_addr ( struct inet6_dev * idev , const struct in6_addr * addr ,
int plen , int scope )
{
struct inet6_ifaddr * ifp ;
2018-05-27 18:09:53 +03:00
struct ifa6_config cfg = {
. pfx = addr ,
. plen = plen ,
. ifa_flags = IFA_F_PERMANENT ,
. valid_lft = INFINITY_LIFE_TIME ,
. preferred_lft = INFINITY_LIFE_TIME ,
. scope = scope
} ;
2009-02-07 10:48:01 +03:00
2018-05-27 18:09:53 +03:00
ifp = ipv6_add_addr ( idev , & cfg , true , NULL ) ;
2009-02-07 10:48:01 +03:00
if ( ! IS_ERR ( ifp ) ) {
spin_lock_bh ( & ifp - > lock ) ;
ifp - > flags & = ~ IFA_F_TENTATIVE ;
spin_unlock_bh ( & ifp - > lock ) ;
2016-11-22 18:57:40 +03:00
rt_genid_bump_ipv6 ( dev_net ( idev - > dev ) ) ;
2009-02-07 10:48:01 +03:00
ipv6_ifa_notify ( RTM_NEWADDR , ifp ) ;
in6_ifa_put ( ifp ) ;
}
}
2012-10-29 20:23:10 +04:00
# if IS_ENABLED(CONFIG_IPV6_SIT)
2005-04-17 02:20:36 +04:00
static void sit_add_v4_addrs ( struct inet6_dev * idev )
{
struct in6_addr addr ;
struct net_device * dev ;
2008-03-25 15:47:49 +03:00
struct net * net = dev_net ( idev - > dev ) ;
2013-11-14 16:51:05 +04:00
int scope , plen ;
2013-11-14 16:51:06 +04:00
u32 pflags = 0 ;
2005-04-17 02:20:36 +04:00
ASSERT_RTNL ( ) ;
memset ( & addr , 0 , sizeof ( struct in6_addr ) ) ;
memcpy ( & addr . s6_addr32 [ 3 ] , idev - > dev - > dev_addr , 4 ) ;
if ( idev - > dev - > flags & IFF_POINTOPOINT ) {
addr . s6_addr32 [ 0 ] = htonl ( 0xfe800000 ) ;
scope = IFA_LINK ;
2013-11-14 16:51:05 +04:00
plen = 64 ;
2005-04-17 02:20:36 +04:00
} else {
scope = IPV6_ADDR_COMPATv4 ;
2013-11-14 16:51:05 +04:00
plen = 96 ;
2013-11-14 16:51:06 +04:00
pflags | = RTF_NONEXTHOP ;
2005-04-17 02:20:36 +04:00
}
if ( addr . s6_addr32 [ 3 ] ) {
2013-11-14 16:51:05 +04:00
add_addr ( idev , & addr , plen , scope ) ;
2018-05-27 18:09:58 +03:00
addrconf_prefix_route ( & addr , plen , 0 , idev - > dev , 0 , pflags ,
2018-08-22 22:58:34 +03:00
GFP_KERNEL ) ;
2005-04-17 02:20:36 +04:00
return ;
}
2008-03-05 21:47:47 +03:00
for_each_netdev ( net , dev ) {
2012-04-01 11:49:08 +04:00
struct in_device * in_dev = __in_dev_get_rtnl ( dev ) ;
2005-04-17 02:20:36 +04:00
if ( in_dev & & ( dev - > flags & IFF_UP ) ) {
2012-04-01 11:49:08 +04:00
struct in_ifaddr * ifa ;
2005-04-17 02:20:36 +04:00
int flag = scope ;
for ( ifa = in_dev - > ifa_list ; ifa ; ifa = ifa - > ifa_next ) {
addr . s6_addr32 [ 3 ] = ifa - > ifa_local ;
if ( ifa - > ifa_scope = = RT_SCOPE_LINK )
continue ;
if ( ifa - > ifa_scope > = RT_SCOPE_HOST ) {
if ( idev - > dev - > flags & IFF_POINTOPOINT )
continue ;
flag | = IFA_HOST ;
}
2009-02-07 10:48:01 +03:00
add_addr ( idev , & addr , plen , flag ) ;
2018-05-27 18:09:58 +03:00
addrconf_prefix_route ( & addr , plen , 0 , idev - > dev ,
2018-08-22 22:58:34 +03:00
0 , pflags , GFP_KERNEL ) ;
2005-04-17 02:20:36 +04:00
}
}
2007-02-09 17:24:49 +03:00
}
2005-04-17 02:20:36 +04:00
}
2006-10-11 01:49:53 +04:00
# endif
2005-04-17 02:20:36 +04:00
static void init_loopback ( struct net_device * dev )
{
struct inet6_dev * idev ;
/* ::1 */
ASSERT_RTNL ( ) ;
2014-11-24 00:28:43 +03:00
idev = ipv6_find_idev ( dev ) ;
2015-03-29 16:00:04 +03:00
if ( ! idev ) {
2012-05-15 18:11:54 +04:00
pr_debug ( " %s: add_dev failed \n " , __func__ ) ;
2005-04-17 02:20:36 +04:00
return ;
}
2009-02-07 10:48:01 +03:00
add_addr ( idev , & in6addr_loopback , 128 , IFA_HOST ) ;
2005-04-17 02:20:36 +04:00
}
2016-06-15 22:20:17 +03:00
void addrconf_add_linklocal ( struct inet6_dev * idev ,
const struct in6_addr * addr , u32 flags )
2005-04-17 02:20:36 +04:00
{
2018-05-27 18:09:53 +03:00
struct ifa6_config cfg = {
. pfx = addr ,
. plen = 64 ,
. ifa_flags = flags | IFA_F_PERMANENT ,
. valid_lft = INFINITY_LIFE_TIME ,
. preferred_lft = INFINITY_LIFE_TIME ,
. scope = IFA_LINK
} ;
2012-04-01 11:49:08 +04:00
struct inet6_ifaddr * ifp ;
2007-04-26 04:08:10 +04:00
# ifdef CONFIG_IPV6_OPTIMISTIC_DAD
ipv6: fix net.ipv6.conf.all interface DAD handlers
Currently, writing into
net.ipv6.conf.all.{accept_dad,use_optimistic,optimistic_dad} has no effect.
Fix handling of these flags by:
- using the maximum of global and per-interface values for the
accept_dad flag. That is, if at least one of the two values is
non-zero, enable DAD on the interface. If at least one value is
set to 2, enable DAD and disable IPv6 operation on the interface if
MAC-based link-local address was found
- using the logical OR of global and per-interface values for the
optimistic_dad flag. If at least one of them is set to one, optimistic
duplicate address detection (RFC 4429) is enabled on the interface
- using the logical OR of global and per-interface values for the
use_optimistic flag. If at least one of them is set to one,
optimistic addresses won't be marked as deprecated during source address
selection on the interface.
While at it, as we're modifying the prototype for ipv6_use_optimistic_addr(),
drop inline, and let the compiler decide.
Fixes: 7fd2561e4ebd ("net: ipv6: Add a sysctl to make optimistic addresses useful candidates")
Signed-off-by: Matteo Croce <mcroce@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-09-12 18:46:37 +03:00
if ( ( dev_net ( idev - > dev ) - > ipv6 . devconf_all - > optimistic_dad | |
idev - > cnf . optimistic_dad ) & &
2008-07-21 05:17:02 +04:00
! dev_net ( idev - > dev ) - > ipv6 . devconf_all - > forwarding )
2018-05-27 18:09:53 +03:00
cfg . ifa_flags | = IFA_F_OPTIMISTIC ;
2007-04-26 04:08:10 +04:00
# endif
2005-04-17 02:20:36 +04:00
2018-05-27 18:09:53 +03:00
ifp = ipv6_add_addr ( idev , & cfg , true , NULL ) ;
2005-04-17 02:20:36 +04:00
if ( ! IS_ERR ( ifp ) ) {
2018-05-27 18:09:58 +03:00
addrconf_prefix_route ( & ifp - > addr , ifp - > prefix_len , 0 , idev - > dev ,
2018-04-18 03:33:22 +03:00
0 , 0 , GFP_ATOMIC ) ;
2012-04-15 05:37:40 +04:00
addrconf_dad_start ( ifp ) ;
2005-04-17 02:20:36 +04:00
in6_ifa_put ( ifp ) ;
}
}
2016-06-15 22:20:17 +03:00
EXPORT_SYMBOL_GPL ( addrconf_add_linklocal ) ;
2005-04-17 02:20:36 +04:00
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 01:36:01 +03:00
static bool ipv6_reserved_interfaceid ( struct in6_addr address )
{
if ( ( address . s6_addr32 [ 2 ] | address . s6_addr32 [ 3 ] ) = = 0 )
return true ;
if ( address . s6_addr32 [ 2 ] = = htonl ( 0x02005eff ) & &
( ( address . s6_addr32 [ 3 ] & htonl ( 0xfe000000 ) ) = = htonl ( 0xfe000000 ) ) )
return true ;
if ( address . s6_addr32 [ 2 ] = = htonl ( 0xfdffffff ) & &
( ( address . s6_addr32 [ 3 ] & htonl ( 0xffffff80 ) ) = = htonl ( 0xffffff80 ) ) )
return true ;
return false ;
}
static int ipv6_generate_stable_address ( struct in6_addr * address ,
u8 dad_count ,
const struct inet6_dev * idev )
{
static DEFINE_SPINLOCK ( lock ) ;
static __u32 digest [ SHA_DIGEST_WORDS ] ;
static __u32 workspace [ SHA_WORKSPACE_WORDS ] ;
static union {
char __data [ SHA_MESSAGE_BYTES ] ;
struct {
struct in6_addr secret ;
2015-03-24 13:05:28 +03:00
__be32 prefix [ 2 ] ;
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 01:36:01 +03:00
unsigned char hwaddr [ MAX_ADDR_LEN ] ;
u8 dad_count ;
} __packed ;
} data ;
struct in6_addr secret ;
struct in6_addr temp ;
struct net * net = dev_net ( idev - > dev ) ;
BUILD_BUG_ON ( sizeof ( data . __data ) ! = sizeof ( data ) ) ;
if ( idev - > cnf . stable_secret . initialized )
secret = idev - > cnf . stable_secret . secret ;
else if ( net - > ipv6 . devconf_dflt - > stable_secret . initialized )
secret = net - > ipv6 . devconf_dflt - > stable_secret . secret ;
else
return - 1 ;
retry :
spin_lock_bh ( & lock ) ;
sha_init ( digest ) ;
memset ( & data , 0 , sizeof ( data ) ) ;
memset ( workspace , 0 , sizeof ( workspace ) ) ;
memcpy ( data . hwaddr , idev - > dev - > perm_addr , idev - > dev - > addr_len ) ;
2015-03-24 13:05:28 +03:00
data . prefix [ 0 ] = address - > s6_addr32 [ 0 ] ;
data . prefix [ 1 ] = address - > s6_addr32 [ 1 ] ;
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 01:36:01 +03:00
data . secret = secret ;
data . dad_count = dad_count ;
sha_transform ( digest , data . __data , workspace ) ;
temp = * address ;
2015-03-24 13:05:28 +03:00
temp . s6_addr32 [ 2 ] = ( __force __be32 ) digest [ 0 ] ;
temp . s6_addr32 [ 3 ] = ( __force __be32 ) digest [ 1 ] ;
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 01:36:01 +03:00
spin_unlock_bh ( & lock ) ;
if ( ipv6_reserved_interfaceid ( temp ) ) {
dad_count + + ;
2015-03-24 01:36:05 +03:00
if ( dad_count > dev_net ( idev - > dev ) - > ipv6 . sysctl . idgen_retries )
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 01:36:01 +03:00
return - 1 ;
goto retry ;
}
* address = temp ;
return 0 ;
}
2015-12-16 18:44:38 +03:00
static void ipv6_gen_mode_random_init ( struct inet6_dev * idev )
{
struct ipv6_stable_secret * s = & idev - > cnf . stable_secret ;
if ( s - > initialized )
return ;
s = & idev - > cnf . stable_secret ;
get_random_bytes ( & s - > secret , sizeof ( s - > secret ) ) ;
s - > initialized = true ;
}
2014-07-11 23:10:18 +04:00
static void addrconf_addr_gen ( struct inet6_dev * idev , bool prefix_route )
{
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 01:36:01 +03:00
struct in6_addr addr ;
2015-10-12 21:47:10 +03:00
/* no link local addresses on L3 master devices */
if ( netif_is_l3_master ( idev - > dev ) )
return ;
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 01:36:01 +03:00
ipv6_addr_set ( & addr , htonl ( 0xFE800000 ) , 0 , 0 , 0 ) ;
2014-07-11 23:10:18 +04:00
2017-01-26 06:59:17 +03:00
switch ( idev - > cnf . addr_gen_mode ) {
2015-12-16 18:44:38 +03:00
case IN6_ADDR_GEN_MODE_RANDOM :
ipv6_gen_mode_random_init ( idev ) ;
/* fallthrough */
case IN6_ADDR_GEN_MODE_STABLE_PRIVACY :
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 01:36:01 +03:00
if ( ! ipv6_generate_stable_address ( & addr , 0 , idev ) )
2015-03-24 01:36:02 +03:00
addrconf_add_linklocal ( idev , & addr ,
IFA_F_STABLE_PRIVACY ) ;
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 01:36:01 +03:00
else if ( prefix_route )
2018-05-27 18:09:58 +03:00
addrconf_prefix_route ( & addr , 64 , 0 , idev - > dev ,
2018-04-18 03:33:22 +03:00
0 , 0 , GFP_KERNEL ) ;
2015-12-16 18:44:38 +03:00
break ;
case IN6_ADDR_GEN_MODE_EUI64 :
2014-07-11 23:10:18 +04:00
/* addrconf_add_linklocal also adds a prefix_route and we
* only need to care about prefix routes if ipv6_generate_eui64
* couldn ' t generate one .
*/
if ( ipv6_generate_eui64 ( addr . s6_addr + 8 , idev - > dev ) = = 0 )
2015-03-24 01:36:02 +03:00
addrconf_add_linklocal ( idev , & addr , 0 ) ;
2014-07-11 23:10:18 +04:00
else if ( prefix_route )
2018-05-27 18:09:58 +03:00
addrconf_prefix_route ( & addr , 64 , 0 , idev - > dev ,
2018-04-19 01:39:06 +03:00
0 , 0 , GFP_KERNEL ) ;
2015-12-16 18:44:38 +03:00
break ;
case IN6_ADDR_GEN_MODE_NONE :
default :
/* will not add any link local address */
break ;
2014-07-11 23:10:18 +04:00
}
}
2005-04-17 02:20:36 +04:00
static void addrconf_dev_config ( struct net_device * dev )
{
2012-04-01 11:49:08 +04:00
struct inet6_dev * idev ;
2005-04-17 02:20:36 +04:00
ASSERT_RTNL ( ) ;
2007-06-15 00:02:55 +04:00
if ( ( dev - > type ! = ARPHRD_ETHER ) & &
( dev - > type ! = ARPHRD_FDDI ) & &
( dev - > type ! = ARPHRD_ARCNET ) & &
2012-05-10 07:25:52 +04:00
( dev - > type ! = ARPHRD_INFINIBAND ) & &
2013-08-20 14:16:06 +04:00
( dev - > type ! = ARPHRD_IEEE1394 ) & &
2013-12-11 19:05:36 +04:00
( dev - > type ! = ARPHRD_TUNNEL6 ) & &
2015-12-16 18:44:38 +03:00
( dev - > type ! = ARPHRD_6LOWPAN ) & &
2017-01-26 06:59:18 +03:00
( dev - > type ! = ARPHRD_IP6GRE ) & &
( dev - > type ! = ARPHRD_IPGRE ) & &
( dev - > type ! = ARPHRD_TUNNEL ) & &
2018-06-05 04:26:07 +03:00
( dev - > type ! = ARPHRD_NONE ) & &
( dev - > type ! = ARPHRD_RAWIP ) ) {
2007-06-15 00:02:55 +04:00
/* Alas, we support only Ethernet autoconfiguration. */
return ;
}
2005-04-17 02:20:36 +04:00
idev = addrconf_add_dev ( dev ) ;
2010-07-20 14:34:30 +04:00
if ( IS_ERR ( idev ) )
2005-04-17 02:20:36 +04:00
return ;
2015-12-16 18:44:38 +03:00
/* this device type has no EUI support */
if ( dev - > type = = ARPHRD_NONE & &
2017-01-26 06:59:17 +03:00
idev - > cnf . addr_gen_mode = = IN6_ADDR_GEN_MODE_EUI64 )
idev - > cnf . addr_gen_mode = IN6_ADDR_GEN_MODE_RANDOM ;
2015-12-16 18:44:38 +03:00
2014-07-11 23:10:18 +04:00
addrconf_addr_gen ( idev , false ) ;
2005-04-17 02:20:36 +04:00
}
2012-10-29 20:23:10 +04:00
# if IS_ENABLED(CONFIG_IPV6_SIT)
2005-04-17 02:20:36 +04:00
static void addrconf_sit_config ( struct net_device * dev )
{
struct inet6_dev * idev ;
ASSERT_RTNL ( ) ;
2007-02-09 17:24:49 +03:00
/*
* Configure the tunnel with one of our IPv4
* addresses . . . we should configure all of
2005-04-17 02:20:36 +04:00
* our v4 addrs in the tunnel
*/
2014-11-24 00:28:43 +03:00
idev = ipv6_find_idev ( dev ) ;
2015-03-29 16:00:04 +03:00
if ( ! idev ) {
2012-05-15 18:11:54 +04:00
pr_debug ( " %s: add_dev failed \n " , __func__ ) ;
2005-04-17 02:20:36 +04:00
return ;
}
2007-11-29 14:11:40 +03:00
if ( dev - > priv_flags & IFF_ISATAP ) {
2014-07-11 23:10:18 +04:00
addrconf_addr_gen ( idev , false ) ;
2007-11-29 14:11:40 +03:00
return ;
}
2005-04-17 02:20:36 +04:00
sit_add_v4_addrs ( idev ) ;
2012-10-02 03:19:14 +04:00
if ( dev - > flags & IFF_POINTOPOINT )
2005-04-17 02:20:36 +04:00
addrconf_add_mroute ( dev ) ;
}
2006-10-11 01:49:53 +04:00
# endif
2005-04-17 02:20:36 +04:00
2012-10-29 20:23:10 +04:00
# if IS_ENABLED(CONFIG_NET_IPGRE)
2011-06-08 14:44:30 +04:00
static void addrconf_gre_config ( struct net_device * dev )
{
struct inet6_dev * idev ;
ASSERT_RTNL ( ) ;
2014-11-24 00:28:43 +03:00
idev = ipv6_find_idev ( dev ) ;
2015-03-29 16:00:04 +03:00
if ( ! idev ) {
2012-05-15 18:11:54 +04:00
pr_debug ( " %s: add_dev failed \n " , __func__ ) ;
2011-06-08 14:44:30 +04:00
return ;
}
2014-07-11 23:10:18 +04:00
addrconf_addr_gen ( idev , true ) ;
2015-10-08 19:19:39 +03:00
if ( dev - > flags & IFF_POINTOPOINT )
addrconf_add_mroute ( dev ) ;
2011-06-08 14:44:30 +04:00
}
# endif
2018-04-18 03:33:11 +03:00
static int fixup_permanent_addr ( struct net * net ,
struct inet6_dev * idev ,
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-24 20:25:37 +03:00
struct inet6_ifaddr * ifp )
{
2018-04-19 01:38:59 +03:00
/* !fib6_node means the host route was removed from the
2017-04-25 19:17:29 +03:00
* FIB , for example , if ' lo ' device is taken down . In that
* case regenerate the host route .
*/
2018-04-19 01:38:59 +03:00
if ( ! ifp - > rt | | ! ifp - > rt - > fib6_node ) {
2018-04-19 01:39:00 +03:00
struct fib6_info * f6i , * prev ;
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-24 20:25:37 +03:00
2018-04-19 01:39:00 +03:00
f6i = addrconf_f6i_alloc ( net , idev , & ifp - > addr , false ,
GFP_ATOMIC ) ;
if ( IS_ERR ( f6i ) )
return PTR_ERR ( f6i ) ;
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-24 20:25:37 +03:00
2017-04-25 19:17:29 +03:00
/* ifp->rt can be accessed outside of rtnl */
spin_lock ( & ifp - > lock ) ;
prev = ifp - > rt ;
2018-04-19 01:39:00 +03:00
ifp - > rt = f6i ;
2017-04-25 19:17:29 +03:00
spin_unlock ( & ifp - > lock ) ;
2018-04-18 03:33:25 +03:00
fib6_info_release ( prev ) ;
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-24 20:25:37 +03:00
}
if ( ! ( ifp - > flags & IFA_F_NOPREFIXROUTE ) ) {
addrconf_prefix_route ( & ifp - > addr , ifp - > prefix_len ,
2018-05-27 18:09:58 +03:00
ifp - > rt_priority , idev - > dev , 0 , 0 ,
GFP_ATOMIC ) ;
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-24 20:25:37 +03:00
}
2017-05-03 00:43:44 +03:00
if ( ifp - > state = = INET6_IFADDR_STATE_PREDAD )
addrconf_dad_start ( ifp ) ;
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-24 20:25:37 +03:00
return 0 ;
}
2018-04-18 03:33:11 +03:00
static void addrconf_permanent_addr ( struct net * net , struct net_device * dev )
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-24 20:25:37 +03:00
{
struct inet6_ifaddr * ifp , * tmp ;
struct inet6_dev * idev ;
idev = __in6_dev_get ( dev ) ;
if ( ! idev )
return ;
write_lock_bh ( & idev - > lock ) ;
list_for_each_entry_safe ( ifp , tmp , & idev - > addr_list , if_list ) {
if ( ( ifp - > flags & IFA_F_PERMANENT ) & &
2018-04-18 03:33:11 +03:00
fixup_permanent_addr ( net , idev , ifp ) < 0 ) {
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-24 20:25:37 +03:00
write_unlock_bh ( & idev - > lock ) ;
2017-10-31 08:47:09 +03:00
in6_ifa_hold ( ifp ) ;
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-24 20:25:37 +03:00
ipv6_del_addr ( ifp ) ;
write_lock_bh ( & idev - > lock ) ;
net_info_ratelimited ( " %s: Failed to add prefix route for address %pI6c; dropping \n " ,
idev - > dev - > name , & ifp - > addr ) ;
}
}
write_unlock_bh ( & idev - > lock ) ;
}
2007-02-09 17:24:49 +03:00
static int addrconf_notify ( struct notifier_block * this , unsigned long event ,
2013-05-28 05:30:21 +04:00
void * ptr )
2005-04-17 02:20:36 +04:00
{
2013-05-28 05:30:21 +04:00
struct net_device * dev = netdev_notifier_info_to_dev ( ptr ) ;
2018-11-21 16:52:33 +03:00
struct netdev_notifier_change_info * change_info ;
2016-04-07 21:10:41 +03:00
struct netdev_notifier_changeupper_info * info ;
2012-08-23 01:50:59 +04:00
struct inet6_dev * idev = __in6_dev_get ( dev ) ;
2017-06-22 00:34:58 +03:00
struct net * net = dev_net ( dev ) ;
2005-12-21 16:57:44 +03:00
int run_pending = 0 ;
2007-07-31 04:04:52 +04:00
int err ;
2005-04-17 02:20:36 +04:00
2010-03-21 02:09:01 +03:00
switch ( event ) {
2007-02-14 20:07:27 +03:00
case NETDEV_REGISTER :
2007-06-15 00:02:55 +04:00
if ( ! idev & & dev - > mtu > = IPV6_MIN_MTU ) {
2007-02-14 20:07:27 +03:00
idev = ipv6_add_dev ( dev ) ;
2014-07-26 02:25:09 +04:00
if ( IS_ERR ( idev ) )
return notifier_from_errno ( PTR_ERR ( idev ) ) ;
2007-02-14 20:07:27 +03:00
}
break ;
2010-03-21 02:08:18 +03:00
2015-10-26 21:06:33 +03:00
case NETDEV_CHANGEMTU :
/* if MTU under IPV6_MIN_MTU stop IPv6 on this interface. */
if ( dev - > mtu < IPV6_MIN_MTU ) {
2017-06-22 00:34:58 +03:00
addrconf_ifdown ( dev , dev ! = net - > loopback_dev ) ;
2015-10-26 21:06:33 +03:00
break ;
}
if ( idev ) {
rt6_mtu_change ( dev , dev - > mtu ) ;
idev - > cnf . mtu6 = dev - > mtu ;
break ;
}
/* allocate new idev */
idev = ipv6_add_dev ( dev ) ;
if ( IS_ERR ( idev ) )
break ;
/* device is still not ready */
if ( ! ( idev - > if_flags & IF_READY ) )
break ;
run_pending = 1 ;
/* fall through */
2005-04-17 02:20:36 +04:00
case NETDEV_UP :
2005-12-21 16:57:24 +03:00
case NETDEV_CHANGE :
bonding / ipv6: no addrconf for slaves separately from master
At present, when a device is enslaved to bonding, if ipv6 is
active then addrconf will be initated on the slave (because it is closed
then opened during the enslavement processing). This causes DAD and RS
packets to be sent from the slave. These packets in turn can confuse
switches that perform ipv6 snooping, causing them to incorrectly update
their forwarding tables (if, e.g., the slave being added is an inactve
backup that won't be used right away) and direct traffic away from the
active slave to a backup slave (where the incoming packets will be
dropped).
This patch alters the behavior so that addrconf will only run on
the master device itself. I believe this is logically correct, as it
prevents slaves from having an IPv6 identity independent from the
master. This is consistent with the IPv4 behavior for bonding.
This is accomplished by (a) having bonding set IFF_SLAVE sooner
in the enslavement processing than currently occurs (before open, not
after), and (b) having ipv6 addrconf ignore UP and CHANGE events on
slave devices.
The eql driver also uses the IFF_SLAVE flag. I inspected eql,
and I believe this change is reasonable for its usage of IFF_SLAVE, but
I did not test it.
Signed-off-by: Jay Vosburgh <fubar@us.ibm.com>
Signed-off-by: Jeff Garzik <jeff@garzik.org>
2007-07-09 21:42:47 +04:00
if ( dev - > flags & IFF_SLAVE )
break ;
2014-09-12 02:07:16 +04:00
if ( idev & & idev - > cnf . disable_ipv6 )
break ;
2005-12-21 16:57:24 +03:00
if ( event = = NETDEV_UP ) {
2016-04-22 06:56:12 +03:00
/* restore routes for permanent addresses */
2018-04-18 03:33:11 +03:00
addrconf_permanent_addr ( net , dev ) ;
2016-04-22 06:56:12 +03:00
2017-09-26 00:01:36 +03:00
if ( ! addrconf_link_ready ( dev ) ) {
2005-12-21 16:57:24 +03:00
/* device is not ready yet. */
2019-01-21 16:54:20 +03:00
pr_debug ( " ADDRCONF(NETDEV_UP): %s: link is not ready \n " ,
dev - > name ) ;
2005-12-21 16:57:24 +03:00
break ;
}
2006-02-09 03:10:53 +03:00
2007-11-30 15:36:08 +03:00
if ( ! idev & & dev - > mtu > = IPV6_MIN_MTU )
idev = ipv6_add_dev ( dev ) ;
2014-07-26 02:25:09 +04:00
if ( ! IS_ERR_OR_NULL ( idev ) ) {
2006-02-09 03:10:53 +03:00
idev - > if_flags | = IF_READY ;
ipv6: fix run pending DAD when interface becomes ready
With some net devices types, an IPv6 address configured while the
interface was down can stay 'tentative' forever, even after the interface
is set up. In some case, pending IPv6 DADs are not executed when the
device becomes ready.
I observed this while doing some tests with kvm. If I assign an IPv6
address to my interface eth0 (kvm driver rtl8139) when it is still down
then the address is flagged tentative (IFA_F_TENTATIVE). Then, I set
eth0 up, and to my surprise, the address stays 'tentative', no DAD is
executed and the address can't be pinged.
I also observed the same behaviour, without kvm, with virtual interfaces
types macvlan and veth.
Some easy steps to reproduce the issue with macvlan:
1. ip link add link eth0 type macvlan
2. ip -6 addr add 2003::ab32/64 dev macvlan0
3. ip addr show dev macvlan0
...
inet6 2003::ab32/64 scope global tentative
...
4. ip link set macvlan0 up
5. ip addr show dev macvlan0
...
inet6 2003::ab32/64 scope global tentative
...
Address is still tentative
I think there's a bug in net/ipv6/addrconf.c, addrconf_notify():
addrconf_dad_run() is not always run when the interface is flagged IF_READY.
Currently it is only run when receiving NETDEV_CHANGE event. Looks like
some (virtual) devices doesn't send this event when becoming up.
For both NETDEV_UP and NETDEV_CHANGE events, when the interface becomes
ready, run_pending should be set to 1. Patch below.
'run_pending = 1' could be moved below the if/else block but it makes
the code less readable.
Signed-off-by: Benjamin Thery <benjamin.thery@bull.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
2008-11-05 12:43:57 +03:00
run_pending = 1 ;
}
2015-10-26 21:06:33 +03:00
} else if ( event = = NETDEV_CHANGE ) {
2017-09-26 00:01:36 +03:00
if ( ! addrconf_link_ready ( dev ) ) {
2005-12-21 16:57:24 +03:00
/* device is still not ready. */
2018-01-07 13:45:05 +03:00
rt6_sync_down_dev ( dev , event ) ;
2005-12-21 16:57:24 +03:00
break ;
}
2018-11-21 16:52:33 +03:00
if ( ! IS_ERR_OR_NULL ( idev ) ) {
2017-02-03 10:11:03 +03:00
if ( idev - > if_flags & IF_READY ) {
/* device is already configured -
* but resend MLD reports , we might
* have roamed and need to update
* multicast snooping switches
*/
ipv6_mc_up ( idev ) ;
2018-11-21 16:52:33 +03:00
change_info = ptr ;
if ( change_info - > flags_changed & IFF_NOARP )
addrconf_dad_run ( idev , true ) ;
2018-01-07 13:45:05 +03:00
rt6_sync_up ( dev , RTNH_F_LINKDOWN ) ;
2005-12-21 16:57:24 +03:00
break ;
2017-02-03 10:11:03 +03:00
}
2005-12-21 16:57:24 +03:00
idev - > if_flags | = IF_READY ;
}
2012-05-15 18:11:53 +04:00
pr_info ( " ADDRCONF(NETDEV_CHANGE): %s: link becomes ready \n " ,
dev - > name ) ;
2005-12-21 16:57:24 +03:00
2005-12-21 16:57:44 +03:00
run_pending = 1 ;
2005-12-21 16:57:24 +03:00
}
2010-03-21 02:09:01 +03:00
switch ( dev - > type ) {
2012-10-29 20:23:10 +04:00
# if IS_ENABLED(CONFIG_IPV6_SIT)
2005-04-17 02:20:36 +04:00
case ARPHRD_SIT :
addrconf_sit_config ( dev ) ;
break ;
2011-06-08 14:44:30 +04:00
# endif
2012-10-29 20:23:10 +04:00
# if IS_ENABLED(CONFIG_NET_IPGRE)
2011-06-08 14:44:30 +04:00
case ARPHRD_IPGRE :
addrconf_gre_config ( dev ) ;
break ;
2006-10-11 01:49:53 +04:00
# endif
2005-04-17 02:20:36 +04:00
case ARPHRD_LOOPBACK :
init_loopback ( dev ) ;
break ;
default :
addrconf_dev_config ( dev ) ;
break ;
2007-04-21 04:09:22 +04:00
}
2010-03-21 02:08:18 +03:00
2014-07-26 02:25:09 +04:00
if ( ! IS_ERR_OR_NULL ( idev ) ) {
2005-12-21 16:57:44 +03:00
if ( run_pending )
2018-11-21 16:52:33 +03:00
addrconf_dad_run ( idev , false ) ;
2005-12-21 16:57:44 +03:00
2018-01-07 13:45:03 +03:00
/* Device has an address by now */
rt6_sync_up ( dev , RTNH_F_DEAD ) ;
2010-03-21 02:08:18 +03:00
/*
* If the MTU changed during the interface down ,
* when the interface up , the changed MTU must be
* reflected in the idev as well as routers .
2005-04-17 02:20:36 +04:00
*/
2010-03-21 02:08:18 +03:00
if ( idev - > cnf . mtu6 ! = dev - > mtu & &
dev - > mtu > = IPV6_MIN_MTU ) {
2005-04-17 02:20:36 +04:00
rt6_mtu_change ( dev , dev - > mtu ) ;
idev - > cnf . mtu6 = dev - > mtu ;
}
idev - > tstamp = jiffies ;
inet6_ifinfo_notify ( RTM_NEWLINK , idev ) ;
2010-03-21 02:08:18 +03:00
/*
* If the changed mtu during down is lower than
* IPV6_MIN_MTU stop IPv6 on this interface .
2005-04-17 02:20:36 +04:00
*/
if ( dev - > mtu < IPV6_MIN_MTU )
2017-06-22 00:34:58 +03:00
addrconf_ifdown ( dev , dev ! = net - > loopback_dev ) ;
2005-04-17 02:20:36 +04:00
}
break ;
case NETDEV_DOWN :
case NETDEV_UNREGISTER :
/*
* Remove all addresses from this interface .
*/
addrconf_ifdown ( dev , event ! = NETDEV_DOWN ) ;
break ;
2005-12-21 16:57:24 +03:00
2005-04-17 02:20:36 +04:00
case NETDEV_CHANGENAME :
if ( idev ) {
2007-04-29 08:16:39 +04:00
snmp6_unregister_dev ( idev ) ;
2008-01-11 04:41:21 +03:00
addrconf_sysctl_unregister ( idev ) ;
2014-07-26 02:25:09 +04:00
err = addrconf_sysctl_register ( idev ) ;
2007-07-31 04:04:52 +04:00
if ( err )
return notifier_from_errno ( err ) ;
2014-07-26 02:25:09 +04:00
err = snmp6_register_dev ( idev ) ;
if ( err ) {
addrconf_sysctl_unregister ( idev ) ;
return notifier_from_errno ( err ) ;
}
2007-04-29 08:16:39 +04:00
}
2005-04-17 02:20:36 +04:00
break ;
2010-03-21 02:08:18 +03:00
2010-03-10 13:28:56 +03:00
case NETDEV_PRE_TYPE_CHANGE :
case NETDEV_POST_TYPE_CHANGE :
2015-12-03 23:12:32 +03:00
if ( idev )
addrconf_type_change ( dev , event ) ;
2009-09-15 13:37:40 +04:00
break ;
2016-04-07 21:10:41 +03:00
case NETDEV_CHANGEUPPER :
info = ptr ;
/* flush all routes if dev is linked to or unlinked from
* an L3 master device ( e . g . , VRF )
*/
if ( info - > upper_dev & & netif_is_l3_master ( info - > upper_dev ) )
addrconf_ifdown ( dev , 0 ) ;
2007-04-21 04:09:22 +04:00
}
2005-04-17 02:20:36 +04:00
return NOTIFY_OK ;
}
/*
* addrconf module should be notified of a device going up
*/
static struct notifier_block ipv6_dev_notf = {
. notifier_call = addrconf_notify ,
2017-05-08 20:12:13 +03:00
. priority = ADDRCONF_NOTIFY_PRIORITY ,
2005-04-17 02:20:36 +04:00
} ;
2010-03-10 13:28:56 +03:00
static void addrconf_type_change ( struct net_device * dev , unsigned long event )
2009-09-15 13:37:40 +04:00
{
struct inet6_dev * idev ;
ASSERT_RTNL ( ) ;
idev = __in6_dev_get ( dev ) ;
2010-03-10 13:28:56 +03:00
if ( event = = NETDEV_POST_TYPE_CHANGE )
2009-09-15 13:37:40 +04:00
ipv6_mc_remap ( idev ) ;
2010-03-10 13:28:56 +03:00
else if ( event = = NETDEV_PRE_TYPE_CHANGE )
2009-09-15 13:37:40 +04:00
ipv6_mc_unmap ( idev ) ;
}
2016-04-08 22:01:21 +03:00
static bool addr_is_local ( const struct in6_addr * addr )
{
return ipv6_addr_type ( addr ) &
( IPV6_ADDR_LINKLOCAL | IPV6_ADDR_LOOPBACK ) ;
}
2005-04-17 02:20:36 +04:00
static int addrconf_ifdown ( struct net_device * dev , int how )
{
2018-01-07 13:45:04 +03:00
unsigned long event = how ? NETDEV_UNREGISTER : NETDEV_DOWN ;
2008-03-25 15:47:49 +03:00
struct net * net = dev_net ( dev ) ;
2010-03-17 23:31:13 +03:00
struct inet6_dev * idev ;
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-24 20:25:37 +03:00
struct inet6_ifaddr * ifa , * tmp ;
2018-04-24 20:51:29 +03:00
bool keep_addr = false ;
2011-01-24 10:27:15 +03:00
int state , i ;
2005-04-17 02:20:36 +04:00
ASSERT_RTNL ( ) ;
2018-01-07 13:45:04 +03:00
rt6_disable_ip ( dev , event ) ;
2005-04-17 02:20:36 +04:00
idev = __in6_dev_get ( dev ) ;
2015-03-29 16:00:04 +03:00
if ( ! idev )
2005-04-17 02:20:36 +04:00
return - ENODEV ;
2010-03-21 02:08:18 +03:00
/*
* Step 1 : remove reference to ipv6 device from parent device .
* Do not dev_put !
2005-04-17 02:20:36 +04:00
*/
2008-04-04 00:30:17 +04:00
if ( how ) {
2005-04-17 02:20:36 +04:00
idev - > dead = 1 ;
2006-09-23 01:44:24 +04:00
/* protected by rtnl_lock */
2011-08-01 20:19:00 +04:00
RCU_INIT_POINTER ( dev - > ip6_ptr , NULL ) ;
2005-04-17 02:20:36 +04:00
/* Step 1.5: remove snmp6 entry */
snmp6_unregister_dev ( idev ) ;
}
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-24 20:25:37 +03:00
/* combine the user config with event to determine if permanent
* addresses are to be removed from address hash table
*/
2018-04-24 20:51:29 +03:00
if ( ! how & & ! idev - > cnf . disable_ipv6 ) {
/* aggregate the system setting and interface setting */
int _keep_addr = net - > ipv6 . devconf_all - > keep_addr_on_down ;
if ( ! _keep_addr )
_keep_addr = idev - > cnf . keep_addr_on_down ;
keep_addr = ( _keep_addr > 0 ) ;
}
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-24 20:25:37 +03:00
2011-01-24 10:27:15 +03:00
/* Step 2: clear hash table */
for ( i = 0 ; i < IN6_ADDR_HSIZE ; i + + ) {
struct hlist_head * h = & inet6_addr_lst [ i ] ;
spin_lock_bh ( & addrconf_hash_lock ) ;
2014-08-25 00:53:10 +04:00
restart :
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 05:06:00 +04:00
hlist_for_each_entry_rcu ( ifa , h , addr_lst ) {
2011-01-24 10:27:15 +03:00
if ( ifa - > idev = = idev ) {
2014-03-27 21:28:07 +04:00
addrconf_del_dad_work ( ifa ) ;
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-24 20:25:37 +03:00
/* combined flag + permanent flag decide if
* address is retained on a down event
*/
if ( ! keep_addr | |
2016-04-08 22:01:21 +03:00
! ( ifa - > flags & IFA_F_PERMANENT ) | |
addr_is_local ( & ifa - > addr ) ) {
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-24 20:25:37 +03:00
hlist_del_init_rcu ( & ifa - > addr_lst ) ;
goto restart ;
}
2011-01-24 10:27:15 +03:00
}
}
spin_unlock_bh ( & addrconf_hash_lock ) ;
}
2005-04-17 02:20:36 +04:00
write_lock_bh ( & idev - > lock ) ;
2013-06-23 20:39:01 +04:00
addrconf_del_rs_timer ( idev ) ;
2010-03-21 02:08:18 +03:00
/* Step 2: clear flags for stateless addrconf */
2008-04-04 00:30:17 +04:00
if ( ! how )
2005-12-21 16:57:24 +03:00
idev - > if_flags & = ~ ( IF_RS_SENT | IF_RA_RCVD | IF_READY ) ;
2005-04-17 02:20:36 +04:00
2010-03-21 02:08:18 +03:00
/* Step 3: clear tempaddr list */
2010-03-17 23:31:09 +03:00
while ( ! list_empty ( & idev - > tempaddr_list ) ) {
ifa = list_first_entry ( & idev - > tempaddr_list ,
struct inet6_ifaddr , tmp_list ) ;
list_del ( & ifa - > tmp_list ) ;
2005-04-17 02:20:36 +04:00
write_unlock_bh ( & idev - > lock ) ;
spin_lock_bh ( & ifa - > lock ) ;
if ( ifa - > ifpub ) {
in6_ifa_put ( ifa - > ifpub ) ;
ifa - > ifpub = NULL ;
}
spin_unlock_bh ( & ifa - > lock ) ;
in6_ifa_put ( ifa ) ;
write_lock_bh ( & idev - > lock ) ;
}
2010-03-03 11:19:59 +03:00
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-24 20:25:37 +03:00
list_for_each_entry_safe ( ifa , tmp , & idev - > addr_list , if_list ) {
2018-04-18 03:33:26 +03:00
struct fib6_info * rt = NULL ;
2017-04-10 09:36:39 +03:00
bool keep ;
2016-04-22 06:56:12 +03:00
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-24 20:25:37 +03:00
addrconf_del_dad_work ( ifa ) ;
2010-03-02 16:32:46 +03:00
2017-04-10 09:36:39 +03:00
keep = keep_addr & & ( ifa - > flags & IFA_F_PERMANENT ) & &
! addr_is_local ( & ifa - > addr ) ;
2011-01-24 10:27:15 +03:00
write_unlock_bh ( & idev - > lock ) ;
2015-03-24 01:36:03 +03:00
spin_lock_bh ( & ifa - > lock ) ;
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-24 20:25:37 +03:00
2017-04-10 09:36:39 +03:00
if ( keep ) {
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-24 20:25:37 +03:00
/* set state to skip the notifier below */
state = INET6_IFADDR_STATE_DEAD ;
2017-05-03 00:43:44 +03:00
ifa - > state = INET6_IFADDR_STATE_PREDAD ;
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-24 20:25:37 +03:00
if ( ! ( ifa - > flags & IFA_F_NODAD ) )
ifa - > flags | = IFA_F_TENTATIVE ;
2016-04-22 06:56:12 +03:00
rt = ifa - > rt ;
ifa - > rt = NULL ;
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-24 20:25:37 +03:00
} else {
state = ifa - > state ;
ifa - > state = INET6_IFADDR_STATE_DEAD ;
}
2015-03-24 01:36:03 +03:00
spin_unlock_bh ( & ifa - > lock ) ;
2010-11-15 23:29:21 +03:00
2016-04-22 06:56:12 +03:00
if ( rt )
2018-04-18 03:33:11 +03:00
ip6_del_rt ( net , rt ) ;
2016-04-22 06:56:12 +03:00
2011-01-24 10:27:15 +03:00
if ( state ! = INET6_IFADDR_STATE_DEAD ) {
__ipv6_ifa_notify ( RTM_DELADDR , ifa ) ;
2013-04-14 19:18:43 +04:00
inet6addr_notifier_call_chain ( NETDEV_DOWN , ifa ) ;
2016-07-22 20:32:11 +03:00
} else {
if ( idev - > cnf . forwarding )
addrconf_leave_anycast ( ifa ) ;
addrconf_leave_solict ( ifa - > idev , & ifa - > addr ) ;
2010-04-12 09:41:32 +04:00
}
2010-03-03 11:19:59 +03:00
2011-01-24 10:27:15 +03:00
write_lock_bh ( & idev - > lock ) ;
2017-10-08 05:30:23 +03:00
if ( ! keep ) {
list_del_rcu ( & ifa - > if_list ) ;
in6_ifa_put ( ifa ) ;
}
2011-01-24 10:27:15 +03:00
}
2010-03-03 11:19:59 +03:00
2005-04-17 02:20:36 +04:00
write_unlock_bh ( & idev - > lock ) ;
2014-09-11 01:23:02 +04:00
/* Step 5: Discard anycast and multicast list */
if ( how ) {
ipv6_ac_destroy_dev ( idev ) ;
2005-04-17 02:20:36 +04:00
ipv6_mc_destroy_dev ( idev ) ;
2014-09-11 01:23:02 +04:00
} else {
2005-04-17 02:20:36 +04:00
ipv6_mc_down ( idev ) ;
2014-09-11 01:23:02 +04:00
}
2005-04-17 02:20:36 +04:00
idev - > tstamp = jiffies ;
2007-02-09 17:24:49 +03:00
2010-03-21 02:08:18 +03:00
/* Last: Shot the device (if unregistered) */
2008-04-04 00:30:17 +04:00
if ( how ) {
2008-01-11 04:41:21 +03:00
addrconf_sysctl_unregister ( idev ) ;
2005-04-17 02:20:36 +04:00
neigh_parms_release ( & nd_tbl , idev - > nd_parms ) ;
neigh_ifdown ( & nd_tbl , dev ) ;
in6_dev_put ( idev ) ;
}
return 0 ;
}
treewide: setup_timer() -> timer_setup()
This converts all remaining cases of the old setup_timer() API into using
timer_setup(), where the callback argument is the structure already
holding the struct timer_list. These should have no behavioral changes,
since they just change which pointer is passed into the callback with
the same available pointers after conversion. It handles the following
examples, in addition to some other variations.
Casting from unsigned long:
void my_callback(unsigned long data)
{
struct something *ptr = (struct something *)data;
...
}
...
setup_timer(&ptr->my_timer, my_callback, ptr);
and forced object casts:
void my_callback(struct something *ptr)
{
...
}
...
setup_timer(&ptr->my_timer, my_callback, (unsigned long)ptr);
become:
void my_callback(struct timer_list *t)
{
struct something *ptr = from_timer(ptr, t, my_timer);
...
}
...
timer_setup(&ptr->my_timer, my_callback, 0);
Direct function assignments:
void my_callback(unsigned long data)
{
struct something *ptr = (struct something *)data;
...
}
...
ptr->my_timer.function = my_callback;
have a temporary cast added, along with converting the args:
void my_callback(struct timer_list *t)
{
struct something *ptr = from_timer(ptr, t, my_timer);
...
}
...
ptr->my_timer.function = (TIMER_FUNC_TYPE)my_callback;
And finally, callbacks without a data assignment:
void my_callback(unsigned long data)
{
...
}
...
setup_timer(&ptr->my_timer, my_callback, 0);
have their argument renamed to verify they're unused during conversion:
void my_callback(struct timer_list *unused)
{
...
}
...
timer_setup(&ptr->my_timer, my_callback, 0);
The conversion is done with the following Coccinelle script:
spatch --very-quiet --all-includes --include-headers \
-I ./arch/x86/include -I ./arch/x86/include/generated \
-I ./include -I ./arch/x86/include/uapi \
-I ./arch/x86/include/generated/uapi -I ./include/uapi \
-I ./include/generated/uapi --include ./include/linux/kconfig.h \
--dir . \
--cocci-file ~/src/data/timer_setup.cocci
@fix_address_of@
expression e;
@@
setup_timer(
-&(e)
+&e
, ...)
// Update any raw setup_timer() usages that have a NULL callback, but
// would otherwise match change_timer_function_usage, since the latter
// will update all function assignments done in the face of a NULL
// function initialization in setup_timer().
@change_timer_function_usage_NULL@
expression _E;
identifier _timer;
type _cast_data;
@@
(
-setup_timer(&_E->_timer, NULL, _E);
+timer_setup(&_E->_timer, NULL, 0);
|
-setup_timer(&_E->_timer, NULL, (_cast_data)_E);
+timer_setup(&_E->_timer, NULL, 0);
|
-setup_timer(&_E._timer, NULL, &_E);
+timer_setup(&_E._timer, NULL, 0);
|
-setup_timer(&_E._timer, NULL, (_cast_data)&_E);
+timer_setup(&_E._timer, NULL, 0);
)
@change_timer_function_usage@
expression _E;
identifier _timer;
struct timer_list _stl;
identifier _callback;
type _cast_func, _cast_data;
@@
(
-setup_timer(&_E->_timer, _callback, _E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, &_callback, _E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, _callback, (_cast_data)_E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, &_callback, (_cast_data)_E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, (_cast_func)_callback, _E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, (_cast_func)&_callback, _E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, (_cast_func)_callback, (_cast_data)_E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, (_cast_func)&_callback, (_cast_data)_E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E._timer, _callback, (_cast_data)_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, _callback, (_cast_data)&_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, &_callback, (_cast_data)_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, &_callback, (_cast_data)&_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, (_cast_func)_callback, (_cast_data)_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, (_cast_func)_callback, (_cast_data)&_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, (_cast_func)&_callback, (_cast_data)_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, (_cast_func)&_callback, (_cast_data)&_E);
+timer_setup(&_E._timer, _callback, 0);
|
_E->_timer@_stl.function = _callback;
|
_E->_timer@_stl.function = &_callback;
|
_E->_timer@_stl.function = (_cast_func)_callback;
|
_E->_timer@_stl.function = (_cast_func)&_callback;
|
_E._timer@_stl.function = _callback;
|
_E._timer@_stl.function = &_callback;
|
_E._timer@_stl.function = (_cast_func)_callback;
|
_E._timer@_stl.function = (_cast_func)&_callback;
)
// callback(unsigned long arg)
@change_callback_handle_cast
depends on change_timer_function_usage@
identifier change_timer_function_usage._callback;
identifier change_timer_function_usage._timer;
type _origtype;
identifier _origarg;
type _handletype;
identifier _handle;
@@
void _callback(
-_origtype _origarg
+struct timer_list *t
)
{
(
... when != _origarg
_handletype *_handle =
-(_handletype *)_origarg;
+from_timer(_handle, t, _timer);
... when != _origarg
|
... when != _origarg
_handletype *_handle =
-(void *)_origarg;
+from_timer(_handle, t, _timer);
... when != _origarg
|
... when != _origarg
_handletype *_handle;
... when != _handle
_handle =
-(_handletype *)_origarg;
+from_timer(_handle, t, _timer);
... when != _origarg
|
... when != _origarg
_handletype *_handle;
... when != _handle
_handle =
-(void *)_origarg;
+from_timer(_handle, t, _timer);
... when != _origarg
)
}
// callback(unsigned long arg) without existing variable
@change_callback_handle_cast_no_arg
depends on change_timer_function_usage &&
!change_callback_handle_cast@
identifier change_timer_function_usage._callback;
identifier change_timer_function_usage._timer;
type _origtype;
identifier _origarg;
type _handletype;
@@
void _callback(
-_origtype _origarg
+struct timer_list *t
)
{
+ _handletype *_origarg = from_timer(_origarg, t, _timer);
+
... when != _origarg
- (_handletype *)_origarg
+ _origarg
... when != _origarg
}
// Avoid already converted callbacks.
@match_callback_converted
depends on change_timer_function_usage &&
!change_callback_handle_cast &&
!change_callback_handle_cast_no_arg@
identifier change_timer_function_usage._callback;
identifier t;
@@
void _callback(struct timer_list *t)
{ ... }
// callback(struct something *handle)
@change_callback_handle_arg
depends on change_timer_function_usage &&
!match_callback_converted &&
!change_callback_handle_cast &&
!change_callback_handle_cast_no_arg@
identifier change_timer_function_usage._callback;
identifier change_timer_function_usage._timer;
type _handletype;
identifier _handle;
@@
void _callback(
-_handletype *_handle
+struct timer_list *t
)
{
+ _handletype *_handle = from_timer(_handle, t, _timer);
...
}
// If change_callback_handle_arg ran on an empty function, remove
// the added handler.
@unchange_callback_handle_arg
depends on change_timer_function_usage &&
change_callback_handle_arg@
identifier change_timer_function_usage._callback;
identifier change_timer_function_usage._timer;
type _handletype;
identifier _handle;
identifier t;
@@
void _callback(struct timer_list *t)
{
- _handletype *_handle = from_timer(_handle, t, _timer);
}
// We only want to refactor the setup_timer() data argument if we've found
// the matching callback. This undoes changes in change_timer_function_usage.
@unchange_timer_function_usage
depends on change_timer_function_usage &&
!change_callback_handle_cast &&
!change_callback_handle_cast_no_arg &&
!change_callback_handle_arg@
expression change_timer_function_usage._E;
identifier change_timer_function_usage._timer;
identifier change_timer_function_usage._callback;
type change_timer_function_usage._cast_data;
@@
(
-timer_setup(&_E->_timer, _callback, 0);
+setup_timer(&_E->_timer, _callback, (_cast_data)_E);
|
-timer_setup(&_E._timer, _callback, 0);
+setup_timer(&_E._timer, _callback, (_cast_data)&_E);
)
// If we fixed a callback from a .function assignment, fix the
// assignment cast now.
@change_timer_function_assignment
depends on change_timer_function_usage &&
(change_callback_handle_cast ||
change_callback_handle_cast_no_arg ||
change_callback_handle_arg)@
expression change_timer_function_usage._E;
identifier change_timer_function_usage._timer;
identifier change_timer_function_usage._callback;
type _cast_func;
typedef TIMER_FUNC_TYPE;
@@
(
_E->_timer.function =
-_callback
+(TIMER_FUNC_TYPE)_callback
;
|
_E->_timer.function =
-&_callback
+(TIMER_FUNC_TYPE)_callback
;
|
_E->_timer.function =
-(_cast_func)_callback;
+(TIMER_FUNC_TYPE)_callback
;
|
_E->_timer.function =
-(_cast_func)&_callback
+(TIMER_FUNC_TYPE)_callback
;
|
_E._timer.function =
-_callback
+(TIMER_FUNC_TYPE)_callback
;
|
_E._timer.function =
-&_callback;
+(TIMER_FUNC_TYPE)_callback
;
|
_E._timer.function =
-(_cast_func)_callback
+(TIMER_FUNC_TYPE)_callback
;
|
_E._timer.function =
-(_cast_func)&_callback
+(TIMER_FUNC_TYPE)_callback
;
)
// Sometimes timer functions are called directly. Replace matched args.
@change_timer_function_calls
depends on change_timer_function_usage &&
(change_callback_handle_cast ||
change_callback_handle_cast_no_arg ||
change_callback_handle_arg)@
expression _E;
identifier change_timer_function_usage._timer;
identifier change_timer_function_usage._callback;
type _cast_data;
@@
_callback(
(
-(_cast_data)_E
+&_E->_timer
|
-(_cast_data)&_E
+&_E._timer
|
-_E
+&_E->_timer
)
)
// If a timer has been configured without a data argument, it can be
// converted without regard to the callback argument, since it is unused.
@match_timer_function_unused_data@
expression _E;
identifier _timer;
identifier _callback;
@@
(
-setup_timer(&_E->_timer, _callback, 0);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, _callback, 0L);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, _callback, 0UL);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E._timer, _callback, 0);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, _callback, 0L);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, _callback, 0UL);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_timer, _callback, 0);
+timer_setup(&_timer, _callback, 0);
|
-setup_timer(&_timer, _callback, 0L);
+timer_setup(&_timer, _callback, 0);
|
-setup_timer(&_timer, _callback, 0UL);
+timer_setup(&_timer, _callback, 0);
|
-setup_timer(_timer, _callback, 0);
+timer_setup(_timer, _callback, 0);
|
-setup_timer(_timer, _callback, 0L);
+timer_setup(_timer, _callback, 0);
|
-setup_timer(_timer, _callback, 0UL);
+timer_setup(_timer, _callback, 0);
)
@change_callback_unused_data
depends on match_timer_function_unused_data@
identifier match_timer_function_unused_data._callback;
type _origtype;
identifier _origarg;
@@
void _callback(
-_origtype _origarg
+struct timer_list *unused
)
{
... when != _origarg
}
Signed-off-by: Kees Cook <keescook@chromium.org>
2017-10-17 00:43:17 +03:00
static void addrconf_rs_timer ( struct timer_list * t )
2005-04-17 02:20:36 +04:00
{
treewide: setup_timer() -> timer_setup()
This converts all remaining cases of the old setup_timer() API into using
timer_setup(), where the callback argument is the structure already
holding the struct timer_list. These should have no behavioral changes,
since they just change which pointer is passed into the callback with
the same available pointers after conversion. It handles the following
examples, in addition to some other variations.
Casting from unsigned long:
void my_callback(unsigned long data)
{
struct something *ptr = (struct something *)data;
...
}
...
setup_timer(&ptr->my_timer, my_callback, ptr);
and forced object casts:
void my_callback(struct something *ptr)
{
...
}
...
setup_timer(&ptr->my_timer, my_callback, (unsigned long)ptr);
become:
void my_callback(struct timer_list *t)
{
struct something *ptr = from_timer(ptr, t, my_timer);
...
}
...
timer_setup(&ptr->my_timer, my_callback, 0);
Direct function assignments:
void my_callback(unsigned long data)
{
struct something *ptr = (struct something *)data;
...
}
...
ptr->my_timer.function = my_callback;
have a temporary cast added, along with converting the args:
void my_callback(struct timer_list *t)
{
struct something *ptr = from_timer(ptr, t, my_timer);
...
}
...
ptr->my_timer.function = (TIMER_FUNC_TYPE)my_callback;
And finally, callbacks without a data assignment:
void my_callback(unsigned long data)
{
...
}
...
setup_timer(&ptr->my_timer, my_callback, 0);
have their argument renamed to verify they're unused during conversion:
void my_callback(struct timer_list *unused)
{
...
}
...
timer_setup(&ptr->my_timer, my_callback, 0);
The conversion is done with the following Coccinelle script:
spatch --very-quiet --all-includes --include-headers \
-I ./arch/x86/include -I ./arch/x86/include/generated \
-I ./include -I ./arch/x86/include/uapi \
-I ./arch/x86/include/generated/uapi -I ./include/uapi \
-I ./include/generated/uapi --include ./include/linux/kconfig.h \
--dir . \
--cocci-file ~/src/data/timer_setup.cocci
@fix_address_of@
expression e;
@@
setup_timer(
-&(e)
+&e
, ...)
// Update any raw setup_timer() usages that have a NULL callback, but
// would otherwise match change_timer_function_usage, since the latter
// will update all function assignments done in the face of a NULL
// function initialization in setup_timer().
@change_timer_function_usage_NULL@
expression _E;
identifier _timer;
type _cast_data;
@@
(
-setup_timer(&_E->_timer, NULL, _E);
+timer_setup(&_E->_timer, NULL, 0);
|
-setup_timer(&_E->_timer, NULL, (_cast_data)_E);
+timer_setup(&_E->_timer, NULL, 0);
|
-setup_timer(&_E._timer, NULL, &_E);
+timer_setup(&_E._timer, NULL, 0);
|
-setup_timer(&_E._timer, NULL, (_cast_data)&_E);
+timer_setup(&_E._timer, NULL, 0);
)
@change_timer_function_usage@
expression _E;
identifier _timer;
struct timer_list _stl;
identifier _callback;
type _cast_func, _cast_data;
@@
(
-setup_timer(&_E->_timer, _callback, _E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, &_callback, _E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, _callback, (_cast_data)_E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, &_callback, (_cast_data)_E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, (_cast_func)_callback, _E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, (_cast_func)&_callback, _E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, (_cast_func)_callback, (_cast_data)_E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, (_cast_func)&_callback, (_cast_data)_E);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E._timer, _callback, (_cast_data)_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, _callback, (_cast_data)&_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, &_callback, (_cast_data)_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, &_callback, (_cast_data)&_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, (_cast_func)_callback, (_cast_data)_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, (_cast_func)_callback, (_cast_data)&_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, (_cast_func)&_callback, (_cast_data)_E);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, (_cast_func)&_callback, (_cast_data)&_E);
+timer_setup(&_E._timer, _callback, 0);
|
_E->_timer@_stl.function = _callback;
|
_E->_timer@_stl.function = &_callback;
|
_E->_timer@_stl.function = (_cast_func)_callback;
|
_E->_timer@_stl.function = (_cast_func)&_callback;
|
_E._timer@_stl.function = _callback;
|
_E._timer@_stl.function = &_callback;
|
_E._timer@_stl.function = (_cast_func)_callback;
|
_E._timer@_stl.function = (_cast_func)&_callback;
)
// callback(unsigned long arg)
@change_callback_handle_cast
depends on change_timer_function_usage@
identifier change_timer_function_usage._callback;
identifier change_timer_function_usage._timer;
type _origtype;
identifier _origarg;
type _handletype;
identifier _handle;
@@
void _callback(
-_origtype _origarg
+struct timer_list *t
)
{
(
... when != _origarg
_handletype *_handle =
-(_handletype *)_origarg;
+from_timer(_handle, t, _timer);
... when != _origarg
|
... when != _origarg
_handletype *_handle =
-(void *)_origarg;
+from_timer(_handle, t, _timer);
... when != _origarg
|
... when != _origarg
_handletype *_handle;
... when != _handle
_handle =
-(_handletype *)_origarg;
+from_timer(_handle, t, _timer);
... when != _origarg
|
... when != _origarg
_handletype *_handle;
... when != _handle
_handle =
-(void *)_origarg;
+from_timer(_handle, t, _timer);
... when != _origarg
)
}
// callback(unsigned long arg) without existing variable
@change_callback_handle_cast_no_arg
depends on change_timer_function_usage &&
!change_callback_handle_cast@
identifier change_timer_function_usage._callback;
identifier change_timer_function_usage._timer;
type _origtype;
identifier _origarg;
type _handletype;
@@
void _callback(
-_origtype _origarg
+struct timer_list *t
)
{
+ _handletype *_origarg = from_timer(_origarg, t, _timer);
+
... when != _origarg
- (_handletype *)_origarg
+ _origarg
... when != _origarg
}
// Avoid already converted callbacks.
@match_callback_converted
depends on change_timer_function_usage &&
!change_callback_handle_cast &&
!change_callback_handle_cast_no_arg@
identifier change_timer_function_usage._callback;
identifier t;
@@
void _callback(struct timer_list *t)
{ ... }
// callback(struct something *handle)
@change_callback_handle_arg
depends on change_timer_function_usage &&
!match_callback_converted &&
!change_callback_handle_cast &&
!change_callback_handle_cast_no_arg@
identifier change_timer_function_usage._callback;
identifier change_timer_function_usage._timer;
type _handletype;
identifier _handle;
@@
void _callback(
-_handletype *_handle
+struct timer_list *t
)
{
+ _handletype *_handle = from_timer(_handle, t, _timer);
...
}
// If change_callback_handle_arg ran on an empty function, remove
// the added handler.
@unchange_callback_handle_arg
depends on change_timer_function_usage &&
change_callback_handle_arg@
identifier change_timer_function_usage._callback;
identifier change_timer_function_usage._timer;
type _handletype;
identifier _handle;
identifier t;
@@
void _callback(struct timer_list *t)
{
- _handletype *_handle = from_timer(_handle, t, _timer);
}
// We only want to refactor the setup_timer() data argument if we've found
// the matching callback. This undoes changes in change_timer_function_usage.
@unchange_timer_function_usage
depends on change_timer_function_usage &&
!change_callback_handle_cast &&
!change_callback_handle_cast_no_arg &&
!change_callback_handle_arg@
expression change_timer_function_usage._E;
identifier change_timer_function_usage._timer;
identifier change_timer_function_usage._callback;
type change_timer_function_usage._cast_data;
@@
(
-timer_setup(&_E->_timer, _callback, 0);
+setup_timer(&_E->_timer, _callback, (_cast_data)_E);
|
-timer_setup(&_E._timer, _callback, 0);
+setup_timer(&_E._timer, _callback, (_cast_data)&_E);
)
// If we fixed a callback from a .function assignment, fix the
// assignment cast now.
@change_timer_function_assignment
depends on change_timer_function_usage &&
(change_callback_handle_cast ||
change_callback_handle_cast_no_arg ||
change_callback_handle_arg)@
expression change_timer_function_usage._E;
identifier change_timer_function_usage._timer;
identifier change_timer_function_usage._callback;
type _cast_func;
typedef TIMER_FUNC_TYPE;
@@
(
_E->_timer.function =
-_callback
+(TIMER_FUNC_TYPE)_callback
;
|
_E->_timer.function =
-&_callback
+(TIMER_FUNC_TYPE)_callback
;
|
_E->_timer.function =
-(_cast_func)_callback;
+(TIMER_FUNC_TYPE)_callback
;
|
_E->_timer.function =
-(_cast_func)&_callback
+(TIMER_FUNC_TYPE)_callback
;
|
_E._timer.function =
-_callback
+(TIMER_FUNC_TYPE)_callback
;
|
_E._timer.function =
-&_callback;
+(TIMER_FUNC_TYPE)_callback
;
|
_E._timer.function =
-(_cast_func)_callback
+(TIMER_FUNC_TYPE)_callback
;
|
_E._timer.function =
-(_cast_func)&_callback
+(TIMER_FUNC_TYPE)_callback
;
)
// Sometimes timer functions are called directly. Replace matched args.
@change_timer_function_calls
depends on change_timer_function_usage &&
(change_callback_handle_cast ||
change_callback_handle_cast_no_arg ||
change_callback_handle_arg)@
expression _E;
identifier change_timer_function_usage._timer;
identifier change_timer_function_usage._callback;
type _cast_data;
@@
_callback(
(
-(_cast_data)_E
+&_E->_timer
|
-(_cast_data)&_E
+&_E._timer
|
-_E
+&_E->_timer
)
)
// If a timer has been configured without a data argument, it can be
// converted without regard to the callback argument, since it is unused.
@match_timer_function_unused_data@
expression _E;
identifier _timer;
identifier _callback;
@@
(
-setup_timer(&_E->_timer, _callback, 0);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, _callback, 0L);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E->_timer, _callback, 0UL);
+timer_setup(&_E->_timer, _callback, 0);
|
-setup_timer(&_E._timer, _callback, 0);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, _callback, 0L);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_E._timer, _callback, 0UL);
+timer_setup(&_E._timer, _callback, 0);
|
-setup_timer(&_timer, _callback, 0);
+timer_setup(&_timer, _callback, 0);
|
-setup_timer(&_timer, _callback, 0L);
+timer_setup(&_timer, _callback, 0);
|
-setup_timer(&_timer, _callback, 0UL);
+timer_setup(&_timer, _callback, 0);
|
-setup_timer(_timer, _callback, 0);
+timer_setup(_timer, _callback, 0);
|
-setup_timer(_timer, _callback, 0L);
+timer_setup(_timer, _callback, 0);
|
-setup_timer(_timer, _callback, 0UL);
+timer_setup(_timer, _callback, 0);
)
@change_callback_unused_data
depends on match_timer_function_unused_data@
identifier match_timer_function_unused_data._callback;
type _origtype;
identifier _origarg;
@@
void _callback(
-_origtype _origarg
+struct timer_list *unused
)
{
... when != _origarg
}
Signed-off-by: Kees Cook <keescook@chromium.org>
2017-10-17 00:43:17 +03:00
struct inet6_dev * idev = from_timer ( idev , t , rs_timer ) ;
2013-08-31 09:44:32 +04:00
struct net_device * dev = idev - > dev ;
2013-06-23 20:39:01 +04:00
struct in6_addr lladdr ;
2005-04-17 02:20:36 +04:00
2013-06-23 20:39:01 +04:00
write_lock ( & idev - > lock ) ;
2010-03-02 16:32:45 +03:00
if ( idev - > dead | | ! ( idev - > if_flags & IF_READY ) )
2005-04-17 02:20:36 +04:00
goto out ;
2012-12-02 05:44:53 +04:00
if ( ! ipv6_accept_ra ( idev ) )
2010-03-02 16:32:45 +03:00
goto out ;
/* Announcement received after solicitation was sent */
if ( idev - > if_flags & IF_RA_RCVD )
2005-04-17 02:20:36 +04:00
goto out ;
2016-09-28 09:57:58 +03:00
if ( idev - > rs_probes + + < idev - > cnf . rtr_solicits | | idev - > cnf . rtr_solicits < 0 ) {
2013-08-31 09:44:32 +04:00
write_unlock ( & idev - > lock ) ;
if ( ! ipv6_get_lladdr ( dev , & lladdr , IFA_F_TENTATIVE ) )
ndisc_send_rs ( dev , & lladdr ,
2013-06-23 20:39:01 +04:00
& in6addr_linklocal_allrouters ) ;
else
2013-08-31 09:44:32 +04:00
goto put ;
2005-04-17 02:20:36 +04:00
2013-08-31 09:44:32 +04:00
write_lock ( & idev - > lock ) ;
2016-09-28 09:57:58 +03:00
idev - > rs_interval = rfc3315_s14_backoff_update (
idev - > rs_interval , idev - > cnf . rtr_solicit_max_interval ) ;
2013-06-23 20:39:01 +04:00
/* The wait after the last probe can be shorter */
addrconf_mod_rs_timer ( idev , ( idev - > rs_probes = =
idev - > cnf . rtr_solicits ) ?
idev - > cnf . rtr_solicit_delay :
2016-09-28 09:57:58 +03:00
idev - > rs_interval ) ;
2005-04-17 02:20:36 +04:00
} else {
/*
* Note : we do not support deprecated " all on-link "
* assumption any longer .
*/
2012-05-15 18:11:54 +04:00
pr_debug ( " %s: no IPv6 routers present \n " , idev - > dev - > name ) ;
2005-04-17 02:20:36 +04:00
}
out :
2013-06-23 20:39:01 +04:00
write_unlock ( & idev - > lock ) ;
2013-08-31 09:44:32 +04:00
put :
2013-06-23 20:39:01 +04:00
in6_dev_put ( idev ) ;
2005-04-17 02:20:36 +04:00
}
/*
* Duplicate Address Detection
*/
2005-12-21 16:57:24 +03:00
static void addrconf_dad_kick ( struct inet6_ifaddr * ifp )
{
unsigned long rand_num ;
struct inet6_dev * idev = ifp - > idev ;
2016-12-03 01:00:08 +03:00
u64 nonce ;
2005-12-21 16:57:24 +03:00
2007-04-26 04:08:10 +04:00
if ( ifp - > flags & IFA_F_OPTIMISTIC )
rand_num = 0 ;
else
2014-01-11 16:15:59 +04:00
rand_num = prandom_u32 ( ) % ( idev - > cnf . rtr_solicit_delay ? : 1 ) ;
2007-04-26 04:08:10 +04:00
2016-12-03 01:00:08 +03:00
nonce = 0 ;
if ( idev - > cnf . enhanced_dad | |
dev_net ( idev - > dev ) - > ipv6 . devconf_all - > enhanced_dad ) {
do
get_random_bytes ( & nonce , 6 ) ;
while ( nonce = = 0 ) ;
}
ifp - > dad_nonce = nonce ;
2013-06-23 20:39:01 +04:00
ifp - > dad_probes = idev - > cnf . dad_transmits ;
2014-03-27 21:28:07 +04:00
addrconf_mod_dad_work ( ifp , rand_num ) ;
2005-12-21 16:57:24 +03:00
}
2014-03-27 21:28:07 +04:00
static void addrconf_dad_begin ( struct inet6_ifaddr * ifp )
2005-04-17 02:20:36 +04:00
{
struct inet6_dev * idev = ifp - > idev ;
struct net_device * dev = idev - > dev ;
2016-11-22 18:57:40 +03:00
bool bump_id , notify = false ;
2018-04-18 03:33:11 +03:00
struct net * net ;
2005-04-17 02:20:36 +04:00
addrconf_join_solict ( dev , & ifp - > addr ) ;
2014-01-11 16:15:59 +04:00
prandom_seed ( ( __force u32 ) ifp - > addr . s6_addr32 [ 3 ] ) ;
2005-04-17 02:20:36 +04:00
read_lock_bh ( & idev - > lock ) ;
2010-05-19 02:56:06 +04:00
spin_lock ( & ifp - > lock ) ;
2010-05-19 02:36:06 +04:00
if ( ifp - > state = = INET6_IFADDR_STATE_DEAD )
2005-04-17 02:20:36 +04:00
goto out ;
2018-04-18 03:33:11 +03:00
net = dev_net ( dev ) ;
2005-04-17 02:20:36 +04:00
if ( dev - > flags & ( IFF_NOARP | IFF_LOOPBACK ) | |
2018-04-18 03:33:11 +03:00
( net - > ipv6 . devconf_all - > accept_dad < 1 & &
2017-10-05 20:03:05 +03:00
idev - > cnf . accept_dad < 1 ) | |
2006-09-23 01:45:27 +04:00
! ( ifp - > flags & IFA_F_TENTATIVE ) | |
ifp - > flags & IFA_F_NODAD ) {
2018-01-26 07:16:29 +03:00
bool send_na = false ;
if ( ifp - > flags & IFA_F_TENTATIVE & &
! ( ifp - > flags & IFA_F_OPTIMISTIC ) )
send_na = true ;
2016-11-22 18:57:40 +03:00
bump_id = ifp - > flags & IFA_F_TENTATIVE ;
2009-09-09 18:41:32 +04:00
ifp - > flags & = ~ ( IFA_F_TENTATIVE | IFA_F_OPTIMISTIC | IFA_F_DADFAILED ) ;
2010-02-08 22:48:52 +03:00
spin_unlock ( & ifp - > lock ) ;
2005-04-17 02:20:36 +04:00
read_unlock_bh ( & idev - > lock ) ;
2018-01-26 07:16:29 +03:00
addrconf_dad_completed ( ifp , bump_id , send_na ) ;
2005-04-17 02:20:36 +04:00
return ;
}
2005-12-28 00:35:15 +03:00
if ( ! ( idev - > if_flags & IF_READY ) ) {
2010-02-08 22:48:52 +03:00
spin_unlock ( & ifp - > lock ) ;
2005-12-28 00:35:15 +03:00
read_unlock_bh ( & idev - > lock ) ;
2005-12-21 16:57:24 +03:00
/*
2009-06-09 05:41:12 +04:00
* If the device is not ready :
2005-12-21 16:57:24 +03:00
* - keep it tentative if it is a permanent address .
* - otherwise , kill it .
*/
in6_ifa_hold ( ifp ) ;
2009-09-09 18:41:32 +04:00
addrconf_dad_stop ( ifp , 0 ) ;
2005-12-28 00:35:15 +03:00
return ;
2005-12-21 16:57:24 +03:00
}
2007-04-26 04:08:10 +04:00
/*
* Optimistic nodes can start receiving
* Frames right away
*/
net: ipv6: Add a sysctl to make optimistic addresses useful candidates
Add a sysctl that causes an interface's optimistic addresses
to be considered equivalent to other non-deprecated addresses
for source address selection purposes. Preferred addresses
will still take precedence over optimistic addresses, subject
to other ranking in the source address selection algorithm.
This is useful where different interfaces are connected to
different networks from different ISPs (e.g., a cell network
and a home wifi network).
The current behaviour complies with RFC 3484/6724, and it
makes sense if the host has only one interface, or has
multiple interfaces on the same network (same or cooperating
administrative domain(s), but not in the multiple distinct
networks case.
For example, if a mobile device has an IPv6 address on an LTE
network and then connects to IPv6-enabled wifi, while the wifi
IPv6 address is undergoing DAD, IPv6 connections will try use
the wifi default route with the LTE IPv6 address, and will get
stuck until they time out.
Also, because optimistic nodes can receive frames, issue
an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
flag appropriately set). A second RTM_NEWADDR is sent if DAD
completes (the address flags have changed), otherwise an
RTM_DELADDR is sent.
Also: add an entry in ip-sysctl.txt for optimistic_dad.
Signed-off-by: Erik Kline <ek@google.com>
Acked-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-28 12:11:14 +03:00
if ( ifp - > flags & IFA_F_OPTIMISTIC ) {
2018-04-18 03:33:11 +03:00
ip6_ins_rt ( net , ifp - > rt ) ;
if ( ipv6_use_optimistic_addr ( net , idev ) ) {
net: ipv6: Add a sysctl to make optimistic addresses useful candidates
Add a sysctl that causes an interface's optimistic addresses
to be considered equivalent to other non-deprecated addresses
for source address selection purposes. Preferred addresses
will still take precedence over optimistic addresses, subject
to other ranking in the source address selection algorithm.
This is useful where different interfaces are connected to
different networks from different ISPs (e.g., a cell network
and a home wifi network).
The current behaviour complies with RFC 3484/6724, and it
makes sense if the host has only one interface, or has
multiple interfaces on the same network (same or cooperating
administrative domain(s), but not in the multiple distinct
networks case.
For example, if a mobile device has an IPv6 address on an LTE
network and then connects to IPv6-enabled wifi, while the wifi
IPv6 address is undergoing DAD, IPv6 connections will try use
the wifi default route with the LTE IPv6 address, and will get
stuck until they time out.
Also, because optimistic nodes can receive frames, issue
an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
flag appropriately set). A second RTM_NEWADDR is sent if DAD
completes (the address flags have changed), otherwise an
RTM_DELADDR is sent.
Also: add an entry in ip-sysctl.txt for optimistic_dad.
Signed-off-by: Erik Kline <ek@google.com>
Acked-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-28 12:11:14 +03:00
/* Because optimistic nodes can use this address,
* notify listeners . If DAD fails , RTM_DELADDR is sent .
*/
2016-02-02 05:11:10 +03:00
notify = true ;
net: ipv6: Add a sysctl to make optimistic addresses useful candidates
Add a sysctl that causes an interface's optimistic addresses
to be considered equivalent to other non-deprecated addresses
for source address selection purposes. Preferred addresses
will still take precedence over optimistic addresses, subject
to other ranking in the source address selection algorithm.
This is useful where different interfaces are connected to
different networks from different ISPs (e.g., a cell network
and a home wifi network).
The current behaviour complies with RFC 3484/6724, and it
makes sense if the host has only one interface, or has
multiple interfaces on the same network (same or cooperating
administrative domain(s), but not in the multiple distinct
networks case.
For example, if a mobile device has an IPv6 address on an LTE
network and then connects to IPv6-enabled wifi, while the wifi
IPv6 address is undergoing DAD, IPv6 connections will try use
the wifi default route with the LTE IPv6 address, and will get
stuck until they time out.
Also, because optimistic nodes can receive frames, issue
an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
flag appropriately set). A second RTM_NEWADDR is sent if DAD
completes (the address flags have changed), otherwise an
RTM_DELADDR is sent.
Also: add an entry in ip-sysctl.txt for optimistic_dad.
Signed-off-by: Erik Kline <ek@google.com>
Acked-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-28 12:11:14 +03:00
}
}
2007-04-26 04:08:10 +04:00
2005-12-28 00:35:15 +03:00
addrconf_dad_kick ( ifp ) ;
2005-04-17 02:20:36 +04:00
out :
2010-05-19 02:56:06 +04:00
spin_unlock ( & ifp - > lock ) ;
2005-04-17 02:20:36 +04:00
read_unlock_bh ( & idev - > lock ) ;
2016-02-02 05:11:10 +03:00
if ( notify )
ipv6_ifa_notify ( RTM_NEWADDR , ifp ) ;
2005-04-17 02:20:36 +04:00
}
2014-03-27 21:28:07 +04:00
static void addrconf_dad_start ( struct inet6_ifaddr * ifp )
2005-04-17 02:20:36 +04:00
{
2014-03-27 21:28:07 +04:00
bool begin_dad = false ;
2015-03-24 01:36:03 +03:00
spin_lock_bh ( & ifp - > lock ) ;
2014-03-27 21:28:07 +04:00
if ( ifp - > state ! = INET6_IFADDR_STATE_DEAD ) {
ifp - > state = INET6_IFADDR_STATE_PREDAD ;
begin_dad = true ;
}
2015-03-24 01:36:03 +03:00
spin_unlock_bh ( & ifp - > lock ) ;
2014-03-27 21:28:07 +04:00
if ( begin_dad )
addrconf_mod_dad_work ( ifp , 0 ) ;
}
static void addrconf_dad_work ( struct work_struct * w )
{
struct inet6_ifaddr * ifp = container_of ( to_delayed_work ( w ) ,
struct inet6_ifaddr ,
dad_work ) ;
2005-04-17 02:20:36 +04:00
struct inet6_dev * idev = ifp - > idev ;
2016-11-22 18:57:40 +03:00
bool bump_id , disable_ipv6 = false ;
2005-04-17 02:20:36 +04:00
struct in6_addr mcaddr ;
2014-03-27 21:28:07 +04:00
enum {
DAD_PROCESS ,
DAD_BEGIN ,
DAD_ABORT ,
} action = DAD_PROCESS ;
rtnl_lock ( ) ;
2015-03-24 01:36:03 +03:00
spin_lock_bh ( & ifp - > lock ) ;
2014-03-27 21:28:07 +04:00
if ( ifp - > state = = INET6_IFADDR_STATE_PREDAD ) {
action = DAD_BEGIN ;
ifp - > state = INET6_IFADDR_STATE_DAD ;
} else if ( ifp - > state = = INET6_IFADDR_STATE_ERRDAD ) {
action = DAD_ABORT ;
ifp - > state = INET6_IFADDR_STATE_POSTDAD ;
net: ipv6: Remove addresses for failures with strict DAD
If DAD fails with accept_dad set to 2, global addresses and host routes
are incorrectly left in place. Even though disable_ipv6 is set,
contrary to documentation, the addresses are not dynamically deleted
from the interface. It is only on a subsequent link down/up that these
are removed. The fix is not only to set the disable_ipv6 flag, but
also to call addrconf_ifdown(), which is the action to carry out when
disabling IPv6. This results in the addresses and routes being deleted
immediately. The DAD failure for the LL addr is determined as before
via netlink, or by the absence of the LL addr (which also previously
would have had to be checked for in case of an intervening link down
and up). As the call to addrconf_ifdown() requires an rtnl lock, the
logic to disable IPv6 when DAD fails is moved to addrconf_dad_work().
Previous behavior:
root@vm1:/# sysctl net.ipv6.conf.eth3.accept_dad=2
net.ipv6.conf.eth3.accept_dad = 2
root@vm1:/# ip -6 addr add 2000::10/64 dev eth3
root@vm1:/# ip link set up eth3
root@vm1:/# ip -6 addr show dev eth3
5: eth3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qlen 1000
inet6 2000::10/64 scope global
valid_lft forever preferred_lft forever
inet6 fe80::5054:ff:fe43:dd5a/64 scope link tentative dadfailed
valid_lft forever preferred_lft forever
root@vm1:/# ip -6 route show dev eth3
2000::/64 proto kernel metric 256
fe80::/64 proto kernel metric 256
root@vm1:/# ip link set down eth3
root@vm1:/# ip link set up eth3
root@vm1:/# ip -6 addr show dev eth3
root@vm1:/# ip -6 route show dev eth3
root@vm1:/#
New behavior:
root@vm1:/# sysctl net.ipv6.conf.eth3.accept_dad=2
net.ipv6.conf.eth3.accept_dad = 2
root@vm1:/# ip -6 addr add 2000::10/64 dev eth3
root@vm1:/# ip link set up eth3
root@vm1:/# ip -6 addr show dev eth3
root@vm1:/# ip -6 route show dev eth3
root@vm1:/#
Signed-off-by: Mike Manning <mmanning@brocade.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-08-18 16:39:40 +03:00
ipv6: fix net.ipv6.conf.all interface DAD handlers
Currently, writing into
net.ipv6.conf.all.{accept_dad,use_optimistic,optimistic_dad} has no effect.
Fix handling of these flags by:
- using the maximum of global and per-interface values for the
accept_dad flag. That is, if at least one of the two values is
non-zero, enable DAD on the interface. If at least one value is
set to 2, enable DAD and disable IPv6 operation on the interface if
MAC-based link-local address was found
- using the logical OR of global and per-interface values for the
optimistic_dad flag. If at least one of them is set to one, optimistic
duplicate address detection (RFC 4429) is enabled on the interface
- using the logical OR of global and per-interface values for the
use_optimistic flag. If at least one of them is set to one,
optimistic addresses won't be marked as deprecated during source address
selection on the interface.
While at it, as we're modifying the prototype for ipv6_use_optimistic_addr(),
drop inline, and let the compiler decide.
Fixes: 7fd2561e4ebd ("net: ipv6: Add a sysctl to make optimistic addresses useful candidates")
Signed-off-by: Matteo Croce <mcroce@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-09-12 18:46:37 +03:00
if ( ( dev_net ( idev - > dev ) - > ipv6 . devconf_all - > accept_dad > 1 | |
idev - > cnf . accept_dad > 1 ) & &
! idev - > cnf . disable_ipv6 & &
net: ipv6: Remove addresses for failures with strict DAD
If DAD fails with accept_dad set to 2, global addresses and host routes
are incorrectly left in place. Even though disable_ipv6 is set,
contrary to documentation, the addresses are not dynamically deleted
from the interface. It is only on a subsequent link down/up that these
are removed. The fix is not only to set the disable_ipv6 flag, but
also to call addrconf_ifdown(), which is the action to carry out when
disabling IPv6. This results in the addresses and routes being deleted
immediately. The DAD failure for the LL addr is determined as before
via netlink, or by the absence of the LL addr (which also previously
would have had to be checked for in case of an intervening link down
and up). As the call to addrconf_ifdown() requires an rtnl lock, the
logic to disable IPv6 when DAD fails is moved to addrconf_dad_work().
Previous behavior:
root@vm1:/# sysctl net.ipv6.conf.eth3.accept_dad=2
net.ipv6.conf.eth3.accept_dad = 2
root@vm1:/# ip -6 addr add 2000::10/64 dev eth3
root@vm1:/# ip link set up eth3
root@vm1:/# ip -6 addr show dev eth3
5: eth3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qlen 1000
inet6 2000::10/64 scope global
valid_lft forever preferred_lft forever
inet6 fe80::5054:ff:fe43:dd5a/64 scope link tentative dadfailed
valid_lft forever preferred_lft forever
root@vm1:/# ip -6 route show dev eth3
2000::/64 proto kernel metric 256
fe80::/64 proto kernel metric 256
root@vm1:/# ip link set down eth3
root@vm1:/# ip link set up eth3
root@vm1:/# ip -6 addr show dev eth3
root@vm1:/# ip -6 route show dev eth3
root@vm1:/#
New behavior:
root@vm1:/# sysctl net.ipv6.conf.eth3.accept_dad=2
net.ipv6.conf.eth3.accept_dad = 2
root@vm1:/# ip -6 addr add 2000::10/64 dev eth3
root@vm1:/# ip link set up eth3
root@vm1:/# ip -6 addr show dev eth3
root@vm1:/# ip -6 route show dev eth3
root@vm1:/#
Signed-off-by: Mike Manning <mmanning@brocade.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-08-18 16:39:40 +03:00
! ( ifp - > flags & IFA_F_STABLE_PRIVACY ) ) {
struct in6_addr addr ;
addr . s6_addr32 [ 0 ] = htonl ( 0xfe800000 ) ;
addr . s6_addr32 [ 1 ] = 0 ;
if ( ! ipv6_generate_eui64 ( addr . s6_addr + 8 , idev - > dev ) & &
ipv6_addr_equal ( & ifp - > addr , & addr ) ) {
/* DAD failed for link-local based on MAC */
idev - > cnf . disable_ipv6 = 1 ;
pr_info ( " %s: IPv6 being disabled! \n " ,
ifp - > idev - > dev - > name ) ;
disable_ipv6 = true ;
}
}
2014-03-27 21:28:07 +04:00
}
2015-03-24 01:36:03 +03:00
spin_unlock_bh ( & ifp - > lock ) ;
2014-03-27 21:28:07 +04:00
if ( action = = DAD_BEGIN ) {
addrconf_dad_begin ( ifp ) ;
goto out ;
} else if ( action = = DAD_ABORT ) {
2016-09-05 11:06:31 +03:00
in6_ifa_hold ( ifp ) ;
2014-03-27 21:28:07 +04:00
addrconf_dad_stop ( ifp , 1 ) ;
net: ipv6: Remove addresses for failures with strict DAD
If DAD fails with accept_dad set to 2, global addresses and host routes
are incorrectly left in place. Even though disable_ipv6 is set,
contrary to documentation, the addresses are not dynamically deleted
from the interface. It is only on a subsequent link down/up that these
are removed. The fix is not only to set the disable_ipv6 flag, but
also to call addrconf_ifdown(), which is the action to carry out when
disabling IPv6. This results in the addresses and routes being deleted
immediately. The DAD failure for the LL addr is determined as before
via netlink, or by the absence of the LL addr (which also previously
would have had to be checked for in case of an intervening link down
and up). As the call to addrconf_ifdown() requires an rtnl lock, the
logic to disable IPv6 when DAD fails is moved to addrconf_dad_work().
Previous behavior:
root@vm1:/# sysctl net.ipv6.conf.eth3.accept_dad=2
net.ipv6.conf.eth3.accept_dad = 2
root@vm1:/# ip -6 addr add 2000::10/64 dev eth3
root@vm1:/# ip link set up eth3
root@vm1:/# ip -6 addr show dev eth3
5: eth3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qlen 1000
inet6 2000::10/64 scope global
valid_lft forever preferred_lft forever
inet6 fe80::5054:ff:fe43:dd5a/64 scope link tentative dadfailed
valid_lft forever preferred_lft forever
root@vm1:/# ip -6 route show dev eth3
2000::/64 proto kernel metric 256
fe80::/64 proto kernel metric 256
root@vm1:/# ip link set down eth3
root@vm1:/# ip link set up eth3
root@vm1:/# ip -6 addr show dev eth3
root@vm1:/# ip -6 route show dev eth3
root@vm1:/#
New behavior:
root@vm1:/# sysctl net.ipv6.conf.eth3.accept_dad=2
net.ipv6.conf.eth3.accept_dad = 2
root@vm1:/# ip -6 addr add 2000::10/64 dev eth3
root@vm1:/# ip link set up eth3
root@vm1:/# ip -6 addr show dev eth3
root@vm1:/# ip -6 route show dev eth3
root@vm1:/#
Signed-off-by: Mike Manning <mmanning@brocade.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-08-18 16:39:40 +03:00
if ( disable_ipv6 )
addrconf_ifdown ( idev - > dev , 0 ) ;
2014-03-27 21:28:07 +04:00
goto out ;
}
2013-06-23 20:39:01 +04:00
if ( ! ifp - > dad_probes & & addrconf_dad_end ( ifp ) )
2010-05-19 02:55:27 +04:00
goto out ;
2014-03-27 21:28:07 +04:00
write_lock_bh ( & idev - > lock ) ;
2010-03-02 16:32:44 +03:00
if ( idev - > dead | | ! ( idev - > if_flags & IF_READY ) ) {
2014-03-27 21:28:07 +04:00
write_unlock_bh ( & idev - > lock ) ;
2005-04-17 02:20:36 +04:00
goto out ;
}
2010-02-08 22:48:52 +03:00
spin_lock ( & ifp - > lock ) ;
2010-05-19 02:56:06 +04:00
if ( ifp - > state = = INET6_IFADDR_STATE_DEAD ) {
spin_unlock ( & ifp - > lock ) ;
2014-03-27 21:28:07 +04:00
write_unlock_bh ( & idev - > lock ) ;
2010-05-19 02:56:06 +04:00
goto out ;
}
2013-06-23 20:39:01 +04:00
if ( ifp - > dad_probes = = 0 ) {
2018-01-26 07:16:29 +03:00
bool send_na = false ;
2005-04-17 02:20:36 +04:00
/*
* DAD was successful
*/
2018-01-26 07:16:29 +03:00
if ( ifp - > flags & IFA_F_TENTATIVE & &
! ( ifp - > flags & IFA_F_OPTIMISTIC ) )
send_na = true ;
2016-11-22 18:57:40 +03:00
bump_id = ifp - > flags & IFA_F_TENTATIVE ;
2009-09-09 18:41:32 +04:00
ifp - > flags & = ~ ( IFA_F_TENTATIVE | IFA_F_OPTIMISTIC | IFA_F_DADFAILED ) ;
2010-02-08 22:48:52 +03:00
spin_unlock ( & ifp - > lock ) ;
2014-03-27 21:28:07 +04:00
write_unlock_bh ( & idev - > lock ) ;
2005-04-17 02:20:36 +04:00
2018-01-26 07:16:29 +03:00
addrconf_dad_completed ( ifp , bump_id , send_na ) ;
2005-04-17 02:20:36 +04:00
goto out ;
}
2013-06-23 20:39:01 +04:00
ifp - > dad_probes - - ;
2014-03-27 21:28:07 +04:00
addrconf_mod_dad_work ( ifp ,
NEIGH_VAR ( ifp - > idev - > nd_parms , RETRANS_TIME ) ) ;
2010-02-08 22:48:52 +03:00
spin_unlock ( & ifp - > lock ) ;
2014-03-27 21:28:07 +04:00
write_unlock_bh ( & idev - > lock ) ;
2005-04-17 02:20:36 +04:00
/* send a neighbour solicitation for our addr */
addrconf_addr_solict_mult ( & ifp - > addr , & mcaddr ) ;
2016-12-03 01:00:08 +03:00
ndisc_send_ns ( ifp - > idev - > dev , & ifp - > addr , & mcaddr , & in6addr_any ,
ifp - > dad_nonce ) ;
2005-04-17 02:20:36 +04:00
out :
in6_ifa_put ( ifp ) ;
2014-03-27 21:28:07 +04:00
rtnl_unlock ( ) ;
2005-04-17 02:20:36 +04:00
}
2014-01-16 23:13:04 +04:00
/* ifp->idev must be at least read locked */
static bool ipv6_lonely_lladdr ( struct inet6_ifaddr * ifp )
{
struct inet6_ifaddr * ifpiter ;
struct inet6_dev * idev = ifp - > idev ;
2014-01-20 00:58:19 +04:00
list_for_each_entry_reverse ( ifpiter , & idev - > addr_list , if_list ) {
if ( ifpiter - > scope > IFA_LINK )
break ;
2014-01-16 23:13:04 +04:00
if ( ifp ! = ifpiter & & ifpiter - > scope = = IFA_LINK & &
( ifpiter - > flags & ( IFA_F_PERMANENT | IFA_F_TENTATIVE |
IFA_F_OPTIMISTIC | IFA_F_DADFAILED ) ) = =
IFA_F_PERMANENT )
return false ;
}
return true ;
}
2018-01-26 07:16:29 +03:00
static void addrconf_dad_completed ( struct inet6_ifaddr * ifp , bool bump_id ,
bool send_na )
2005-04-17 02:20:36 +04:00
{
2010-03-21 02:09:01 +03:00
struct net_device * dev = ifp - > idev - > dev ;
2013-06-23 20:39:01 +04:00
struct in6_addr lladdr ;
2013-06-27 02:07:01 +04:00
bool send_rs , send_mld ;
2013-06-23 20:39:01 +04:00
2014-03-27 21:28:07 +04:00
addrconf_del_dad_work ( ifp ) ;
2005-04-17 02:20:36 +04:00
/*
* Configure the address for reception . Now it is valid .
*/
ipv6_ifa_notify ( RTM_NEWADDR , ifp ) ;
ipv6: Send ICMPv6 RSes only when RAs are accepted
This patch improves the logic determining when to send ICMPv6 Router
Solicitations, so that they are 1) always sent when the kernel is
accepting Router Advertisements, and 2) never sent when the kernel is
not accepting RAs. In other words, the operational setting of the
"accept_ra" sysctl is used.
The change also makes the special "Hybrid Router" forwarding mode
("forwarding" sysctl set to 2) operate exactly the same as the standard
Router mode (forwarding=1). The only difference between the two was
that RSes was being sent in the Hybrid Router mode only. The sysctl
documentation describing the special Hybrid Router mode has therefore
been removed.
Rationale for the change:
Currently, the value of forwarding sysctl is the only thing determining
whether or not to send RSes. If it has the value 0 or 2, they are sent,
otherwise they are not. This leads to inconsistent behaviour in the
following cases:
* accept_ra=0, forwarding=0
* accept_ra=0, forwarding=2
* accept_ra=1, forwarding=2
* accept_ra=2, forwarding=1
In the first three cases, the kernel will send RSes, even though it will
not accept any RAs received in reply. In the last case, it will not send
any RSes, even though it will accept and process any RAs received. (Most
routers will send unsolicited RAs periodically, so suppressing RSes in
the last case will merely delay auto-configuration, not prevent it.)
Also, it is my opinion that having the forwarding sysctl control RS
sending behaviour (completely independent of whether RAs are being
accepted or not) is simply not what most users would intuitively expect
to be the case.
Signed-off-by: Tore Anderson <tore@fud.no>
Signed-off-by: David S. Miller <davem@davemloft.net>
2011-08-29 03:47:33 +04:00
/* If added prefix is link local and we are prepared to process
router advertisements , start sending router solicitations .
2005-04-17 02:20:36 +04:00
*/
2013-06-27 02:06:56 +04:00
read_lock_bh ( & ifp - > idev - > lock ) ;
2014-01-16 23:13:04 +04:00
send_mld = ifp - > scope = = IFA_LINK & & ipv6_lonely_lladdr ( ifp ) ;
2013-06-27 02:07:01 +04:00
send_rs = send_mld & &
ipv6_accept_ra ( ifp - > idev ) & &
2016-09-28 09:57:58 +03:00
ifp - > idev - > cnf . rtr_solicits ! = 0 & &
2013-06-27 02:07:01 +04:00
( dev - > flags & IFF_LOOPBACK ) = = 0 ;
2013-06-27 02:06:56 +04:00
read_unlock_bh ( & ifp - > idev - > lock ) ;
2013-06-27 02:07:01 +04:00
/* While dad is in progress mld report's source address is in6_addrany.
* Resend with proper ll now .
*/
if ( send_mld )
ipv6_mc_dad_complete ( ifp - > idev ) ;
2018-01-26 07:16:29 +03:00
/* send unsolicited NA if enabled */
if ( send_na & &
( ifp - > idev - > cnf . ndisc_notify | |
dev_net ( dev ) - > ipv6 . devconf_all - > ndisc_notify ) ) {
ndisc_send_na ( dev , & in6addr_linklocal_allnodes , & ifp - > addr ,
/*router=*/ ! ! ifp - > idev - > cnf . forwarding ,
/*solicited=*/ false , /*override=*/ true ,
/*inc_opt=*/ true ) ;
}
2013-06-27 02:06:56 +04:00
if ( send_rs ) {
2005-04-17 02:20:36 +04:00
/*
* If a host as already performed a random delay
* [ . . . ] as part of DAD [ . . . ] there is no need
* to delay again before sending the first RS
*/
2013-06-27 02:06:56 +04:00
if ( ipv6_get_lladdr ( dev , & lladdr , IFA_F_TENTATIVE ) )
2013-06-23 20:39:01 +04:00
return ;
2013-06-27 02:06:56 +04:00
ndisc_send_rs ( dev , & lladdr , & in6addr_linklocal_allrouters ) ;
2005-04-17 02:20:36 +04:00
2013-06-23 20:39:01 +04:00
write_lock_bh ( & ifp - > idev - > lock ) ;
spin_lock ( & ifp - > lock ) ;
2016-09-28 09:57:58 +03:00
ifp - > idev - > rs_interval = rfc3315_s14_backoff_init (
ifp - > idev - > cnf . rtr_solicit_interval ) ;
2013-06-23 20:39:01 +04:00
ifp - > idev - > rs_probes = 1 ;
2005-04-17 02:20:36 +04:00
ifp - > idev - > if_flags | = IF_RS_SENT ;
2016-09-28 09:57:58 +03:00
addrconf_mod_rs_timer ( ifp - > idev , ifp - > idev - > rs_interval ) ;
2013-06-23 20:39:01 +04:00
spin_unlock ( & ifp - > lock ) ;
write_unlock_bh ( & ifp - > idev - > lock ) ;
2005-04-17 02:20:36 +04:00
}
2016-11-22 18:57:40 +03:00
if ( bump_id )
rt_genid_bump_ipv6 ( dev_net ( dev ) ) ;
ipv6: addrconf: fix generation of new temporary addresses
Under some circumstances it is possible that no new temporary addresses
will be generated.
For instance, addrconf_prefix_rcv_add_addr() indirectly calls
ipv6_create_tempaddr(), which creates a tentative temporary address and
starts dad. Next, addrconf_prefix_rcv_add_addr() indirectly calls
addrconf_verify_rtnl(). Now, assume that the previously created temporary
address has the least preferred lifetime among all existing addresses and
is still tentative (that is, dad is still running). Hence, the next run of
addrconf_verify_rtnl() is performed when the preferred lifetime of the
temporary address ends. If dad succeeds before the next run, the temporary
address becomes deprecated during the next run, but no new temporary
address is generated.
In order to fix this, schedule the next addrconf_verify_rtnl() run slightly
before the temporary address becomes deprecated, if dad succeeded.
Signed-off-by: Marcus Huewe <suse-tux@gmx.de>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-02-06 20:34:56 +03:00
/* Make sure that a new temporary address will be created
* before this temporary address becomes deprecated .
*/
if ( ifp - > flags & IFA_F_TEMPORARY )
addrconf_verify_rtnl ( ) ;
2005-04-17 02:20:36 +04:00
}
2018-11-21 16:52:33 +03:00
static void addrconf_dad_run ( struct inet6_dev * idev , bool restart )
2010-03-21 02:09:01 +03:00
{
2005-12-21 16:57:44 +03:00
struct inet6_ifaddr * ifp ;
read_lock_bh ( & idev - > lock ) ;
2010-03-17 23:31:13 +03:00
list_for_each_entry ( ifp , & idev - > addr_list , if_list ) {
2010-02-08 22:48:52 +03:00
spin_lock ( & ifp - > lock ) ;
2018-11-21 16:52:33 +03:00
if ( ( ifp - > flags & IFA_F_TENTATIVE & &
ifp - > state = = INET6_IFADDR_STATE_DAD ) | | restart ) {
if ( restart )
ifp - > state = INET6_IFADDR_STATE_PREDAD ;
2010-05-19 02:55:27 +04:00
addrconf_dad_kick ( ifp ) ;
2018-11-21 16:52:33 +03:00
}
2010-02-08 22:48:52 +03:00
spin_unlock ( & ifp - > lock ) ;
2005-12-21 16:57:44 +03:00
}
read_unlock_bh ( & idev - > lock ) ;
}
2005-04-17 02:20:36 +04:00
# ifdef CONFIG_PROC_FS
struct if6_iter_state {
2008-01-11 09:42:49 +03:00
struct seq_net_private p ;
2005-04-17 02:20:36 +04:00
int bucket ;
2012-01-04 03:31:35 +04:00
int offset ;
2005-04-17 02:20:36 +04:00
} ;
2012-01-04 03:31:35 +04:00
static struct inet6_ifaddr * if6_get_first ( struct seq_file * seq , loff_t pos )
2005-04-17 02:20:36 +04:00
{
struct if6_iter_state * state = seq - > private ;
2008-03-25 20:36:06 +03:00
struct net * net = seq_file_net ( seq ) ;
2017-10-24 02:17:50 +03:00
struct inet6_ifaddr * ifa = NULL ;
2012-01-04 03:31:35 +04:00
int p = 0 ;
2005-04-17 02:20:36 +04:00
2012-01-04 03:31:35 +04:00
/* initial bucket if pos is 0 */
if ( pos = = 0 ) {
state - > bucket = 0 ;
state - > offset = 0 ;
}
for ( ; state - > bucket < IN6_ADDR_HSIZE ; + + state - > bucket ) {
2017-10-24 02:17:50 +03:00
hlist_for_each_entry_rcu ( ifa , & inet6_addr_lst [ state - > bucket ] ,
2012-01-04 03:31:35 +04:00
addr_lst ) {
2012-10-16 11:37:27 +04:00
if ( ! net_eq ( dev_net ( ifa - > idev - > dev ) , net ) )
continue ;
2012-01-04 03:31:35 +04:00
/* sync with offset */
if ( p < state - > offset ) {
p + + ;
continue ;
}
2012-10-16 11:37:27 +04:00
return ifa ;
2012-01-04 03:31:35 +04:00
}
/* prepare for next bucket */
state - > offset = 0 ;
p = 0 ;
2005-04-17 02:20:36 +04:00
}
2010-03-17 23:31:10 +03:00
return NULL ;
2005-04-17 02:20:36 +04:00
}
2010-03-17 23:31:10 +03:00
static struct inet6_ifaddr * if6_get_next ( struct seq_file * seq ,
struct inet6_ifaddr * ifa )
2005-04-17 02:20:36 +04:00
{
struct if6_iter_state * state = seq - > private ;
2008-03-25 20:36:06 +03:00
struct net * net = seq_file_net ( seq ) ;
2005-04-17 02:20:36 +04:00
2017-10-24 02:17:50 +03:00
hlist_for_each_entry_continue_rcu ( ifa , addr_lst ) {
2012-10-16 11:37:27 +04:00
if ( ! net_eq ( dev_net ( ifa - > idev - > dev ) , net ) )
continue ;
2012-01-04 03:31:35 +04:00
state - > offset + + ;
2012-10-16 11:37:27 +04:00
return ifa ;
2012-01-04 03:31:35 +04:00
}
2008-01-11 09:42:49 +03:00
net/ipv6: Display all addresses in output of /proc/net/if_inet6
The backend handling for /proc/net/if_inet6 in addrconf.c doesn't properly
handle starting/stopping the iteration. The problem is that at some point
during the iteration, an overflow is detected and the process is
subsequently stopped. The item being shown via seq_printf() when the
overflow occurs is not actually shown, though. When start() is
subsequently called to resume iterating, it returns the next item, and
thus the item that was being processed when the overflow occurred never
gets printed.
Alter the meaning of the private data member "offset". Currently, when it
is not 0 (which only happens at the very beginning), "offset" represents
the next hlist item to be printed. After this change, "offset" always
represents the current item.
This is also consistent with the private data member "bucket", which
represents the current bucket, and also the use of "pos" as defined in
seq_file.txt:
The pos passed to start() will always be either zero, or the most
recent pos used in the previous session.
Signed-off-by: Jeff Barnhill <0xeffeff@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-09-21 03:45:27 +03:00
state - > offset = 0 ;
2010-03-17 23:31:10 +03:00
while ( + + state - > bucket < IN6_ADDR_HSIZE ) {
2017-10-24 02:17:50 +03:00
hlist_for_each_entry_rcu ( ifa ,
2010-03-17 23:31:10 +03:00
& inet6_addr_lst [ state - > bucket ] , addr_lst ) {
2012-10-16 11:37:27 +04:00
if ( ! net_eq ( dev_net ( ifa - > idev - > dev ) , net ) )
continue ;
return ifa ;
2010-03-17 23:31:10 +03:00
}
2005-04-17 02:20:36 +04:00
}
2008-01-11 09:42:49 +03:00
2010-03-17 23:31:10 +03:00
return NULL ;
2005-04-17 02:20:36 +04:00
}
static void * if6_seq_start ( struct seq_file * seq , loff_t * pos )
2017-10-24 02:17:50 +03:00
__acquires ( rcu )
2005-04-17 02:20:36 +04:00
{
2017-10-24 02:17:50 +03:00
rcu_read_lock ( ) ;
2012-01-04 03:31:35 +04:00
return if6_get_first ( seq , * pos ) ;
2005-04-17 02:20:36 +04:00
}
static void * if6_seq_next ( struct seq_file * seq , void * v , loff_t * pos )
{
struct inet6_ifaddr * ifa ;
ifa = if6_get_next ( seq , v ) ;
+ + * pos ;
return ifa ;
}
static void if6_seq_stop ( struct seq_file * seq , void * v )
2017-10-24 02:17:50 +03:00
__releases ( rcu )
2005-04-17 02:20:36 +04:00
{
2017-10-24 02:17:50 +03:00
rcu_read_unlock ( ) ;
2005-04-17 02:20:36 +04:00
}
static int if6_seq_show ( struct seq_file * seq , void * v )
{
struct inet6_ifaddr * ifp = ( struct inet6_ifaddr * ) v ;
2013-12-10 16:56:29 +04:00
seq_printf ( seq , " %pi6 %02x %02x %02x %02x %8s \n " ,
2008-10-29 02:05:40 +03:00
& ifp - > addr ,
2005-04-17 02:20:36 +04:00
ifp - > idev - > dev - > ifindex ,
ifp - > prefix_len ,
ifp - > scope ,
2013-12-10 16:56:29 +04:00
( u8 ) ifp - > flags ,
2005-04-17 02:20:36 +04:00
ifp - > idev - > dev - > name ) ;
return 0 ;
}
2007-07-11 10:07:31 +04:00
static const struct seq_operations if6_seq_ops = {
2005-04-17 02:20:36 +04:00
. start = if6_seq_start ,
. next = if6_seq_next ,
. show = if6_seq_show ,
. stop = if6_seq_stop ,
} ;
2010-01-17 06:35:32 +03:00
static int __net_init if6_proc_net_init ( struct net * net )
2005-04-17 02:20:36 +04:00
{
2018-04-10 20:42:55 +03:00
if ( ! proc_create_net ( " if_inet6 " , 0444 , net - > proc_net , & if6_seq_ops ,
sizeof ( struct if6_iter_state ) ) )
2005-04-17 02:20:36 +04:00
return - ENOMEM ;
return 0 ;
}
2010-01-17 06:35:32 +03:00
static void __net_exit if6_proc_net_exit ( struct net * net )
2008-01-11 09:42:49 +03:00
{
2013-02-18 05:34:56 +04:00
remove_proc_entry ( " if_inet6 " , net - > proc_net ) ;
2008-01-11 09:42:49 +03:00
}
static struct pernet_operations if6_proc_net_ops = {
2014-08-25 00:53:10 +04:00
. init = if6_proc_net_init ,
. exit = if6_proc_net_exit ,
2008-01-11 09:42:49 +03:00
} ;
int __init if6_proc_init ( void )
{
return register_pernet_subsys ( & if6_proc_net_ops ) ;
}
2005-04-17 02:20:36 +04:00
void if6_proc_exit ( void )
{
2008-01-11 09:42:49 +03:00
unregister_pernet_subsys ( & if6_proc_net_ops ) ;
2005-04-17 02:20:36 +04:00
}
# endif /* CONFIG_PROC_FS */
2012-10-29 20:23:10 +04:00
# if IS_ENABLED(CONFIG_IPV6_MIP6)
2006-09-23 01:45:56 +04:00
/* Check if address is a home address configured on any interface. */
2011-04-22 08:53:02 +04:00
int ipv6_chk_home_addr ( struct net * net , const struct in6_addr * addr )
2006-09-23 01:45:56 +04:00
{
2017-10-24 02:17:47 +03:00
unsigned int hash = inet6_addr_hash ( net , addr ) ;
2010-03-17 23:31:10 +03:00
struct inet6_ifaddr * ifp = NULL ;
2017-10-24 02:17:47 +03:00
int ret = 0 ;
2010-03-17 23:31:10 +03:00
2017-10-24 02:17:51 +03:00
rcu_read_lock ( ) ;
hlist_for_each_entry_rcu ( ifp , & inet6_addr_lst [ hash ] , addr_lst ) {
2008-03-25 21:57:35 +03:00
if ( ! net_eq ( dev_net ( ifp - > idev - > dev ) , net ) )
2008-01-11 09:44:40 +03:00
continue ;
2008-04-10 10:42:07 +04:00
if ( ipv6_addr_equal ( & ifp - > addr , addr ) & &
2006-09-23 01:45:56 +04:00
( ifp - > flags & IFA_F_HOMEADDRESS ) ) {
ret = 1 ;
break ;
}
}
2017-10-24 02:17:51 +03:00
rcu_read_unlock ( ) ;
2006-09-23 01:45:56 +04:00
return ret ;
}
# endif
2005-04-17 02:20:36 +04:00
/*
* Periodic address status verification
*/
2014-03-27 21:28:07 +04:00
static void addrconf_verify_rtnl ( void )
2005-04-17 02:20:36 +04:00
{
ipv6: Reduce timer events for addrconf_verify().
This patch reduces timer events while keeping accuracy by rounding
our timer and/or batching several address validations in addrconf_verify().
addrconf_verify() is called at earliest timeout among interface addresses'
timeouts, but at maximum ADDR_CHECK_FREQUENCY (120 secs).
In most cases, all of timeouts of interface addresses are long enough
(e.g. several hours or days vs 2 minutes), this timer is usually called
every ADDR_CHECK_FREQUENCY, and it is okay to be lazy.
(Note this timer could be eliminated if all code paths which modifies
variables related to timeouts call us manually, but it is another story.)
However, in other least but important cases, we try keeping accuracy.
When the real interface address timeout is coming, and the timeout
is just before the rounded timeout, we accept some error.
When a timeout has been reached, we also try batching other several
events in very near future.
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2010-03-21 02:11:12 +03:00
unsigned long now , next , next_sec , next_sched ;
2005-04-17 02:20:36 +04:00
struct inet6_ifaddr * ifp ;
int i ;
2014-03-27 21:28:07 +04:00
ASSERT_RTNL ( ) ;
2010-03-17 23:31:11 +03:00
rcu_read_lock_bh ( ) ;
2005-04-17 02:20:36 +04:00
now = jiffies ;
ipv6: Reduce timer events for addrconf_verify().
This patch reduces timer events while keeping accuracy by rounding
our timer and/or batching several address validations in addrconf_verify().
addrconf_verify() is called at earliest timeout among interface addresses'
timeouts, but at maximum ADDR_CHECK_FREQUENCY (120 secs).
In most cases, all of timeouts of interface addresses are long enough
(e.g. several hours or days vs 2 minutes), this timer is usually called
every ADDR_CHECK_FREQUENCY, and it is okay to be lazy.
(Note this timer could be eliminated if all code paths which modifies
variables related to timeouts call us manually, but it is another story.)
However, in other least but important cases, we try keeping accuracy.
When the real interface address timeout is coming, and the timeout
is just before the rounded timeout, we accept some error.
When a timeout has been reached, we also try batching other several
events in very near future.
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2010-03-21 02:11:12 +03:00
next = round_jiffies_up ( now + ADDR_CHECK_FREQUENCY ) ;
2005-04-17 02:20:36 +04:00
2014-03-27 21:28:07 +04:00
cancel_delayed_work ( & addr_chk_work ) ;
2005-04-17 02:20:36 +04:00
2010-03-21 02:08:18 +03:00
for ( i = 0 ; i < IN6_ADDR_HSIZE ; i + + ) {
2005-04-17 02:20:36 +04:00
restart :
2014-03-27 21:28:07 +04:00
hlist_for_each_entry_rcu_bh ( ifp , & inet6_addr_lst [ i ] , addr_lst ) {
2005-04-17 02:20:36 +04:00
unsigned long age ;
2013-12-31 07:04:19 +04:00
/* When setting preferred_lft to a value not zero or
* infinity , while valid_lft is infinity
* IFA_F_PERMANENT has a non - infinity life time .
*/
if ( ( ifp - > flags & IFA_F_PERMANENT ) & &
( ifp - > prefered_lft = = INFINITY_LIFE_TIME ) )
2005-04-17 02:20:36 +04:00
continue ;
spin_lock ( & ifp - > lock ) ;
ipv6: Reduce timer events for addrconf_verify().
This patch reduces timer events while keeping accuracy by rounding
our timer and/or batching several address validations in addrconf_verify().
addrconf_verify() is called at earliest timeout among interface addresses'
timeouts, but at maximum ADDR_CHECK_FREQUENCY (120 secs).
In most cases, all of timeouts of interface addresses are long enough
(e.g. several hours or days vs 2 minutes), this timer is usually called
every ADDR_CHECK_FREQUENCY, and it is okay to be lazy.
(Note this timer could be eliminated if all code paths which modifies
variables related to timeouts call us manually, but it is another story.)
However, in other least but important cases, we try keeping accuracy.
When the real interface address timeout is coming, and the timeout
is just before the rounded timeout, we accept some error.
When a timeout has been reached, we also try batching other several
events in very near future.
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2010-03-21 02:11:12 +03:00
/* We try to batch several events at once. */
age = ( now - ifp - > tstamp + ADDRCONF_TIMER_FUZZ_MINUS ) / HZ ;
2005-04-17 02:20:36 +04:00
2006-07-28 13:12:11 +04:00
if ( ifp - > valid_lft ! = INFINITY_LIFE_TIME & &
age > = ifp - > valid_lft ) {
2005-04-17 02:20:36 +04:00
spin_unlock ( & ifp - > lock ) ;
in6_ifa_hold ( ifp ) ;
ipv6_del_addr ( ifp ) ;
goto restart ;
2006-07-28 13:12:11 +04:00
} else if ( ifp - > prefered_lft = = INFINITY_LIFE_TIME ) {
spin_unlock ( & ifp - > lock ) ;
continue ;
2005-04-17 02:20:36 +04:00
} else if ( age > = ifp - > prefered_lft ) {
IPv6: preferred lifetime of address not getting updated
There's a bug in addrconf_prefix_rcv() where it won't update the
preferred lifetime of an IPv6 address if the current valid lifetime
of the address is less than 2 hours (the minimum value in the RA).
For example, If I send a router advertisement with a prefix that
has valid lifetime = preferred lifetime = 2 hours we'll build
this address:
3: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qlen 1000
inet6 2001:1890:1109:a20:217:8ff:fe7d:4718/64 scope global dynamic
valid_lft 7175sec preferred_lft 7175sec
If I then send the same prefix with valid lifetime = preferred
lifetime = 0 it will be ignored since the minimum valid lifetime
is 2 hours:
3: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qlen 1000
inet6 2001:1890:1109:a20:217:8ff:fe7d:4718/64 scope global dynamic
valid_lft 7161sec preferred_lft 7161sec
But according to RFC 4862 we should always reset the preferred lifetime
even if the valid lifetime is invalid, which would cause the address
to immediately get deprecated. So with this patch we'd see this:
5: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qlen 1000
inet6 2001:1890:1109:a20:21f:29ff:fe5a:ef04/64 scope global deprecated dynamic
valid_lft 7163sec preferred_lft 0sec
The comment winds-up being 5x the size of the code to fix the problem.
Update the preferred lifetime of IPv6 addresses derived from a prefix
info option in a router advertisement even if the valid lifetime in
the option is invalid, as specified in RFC 4862 Section 5.5.3e. Fixes
an issue where an address will not immediately become deprecated.
Reported by Jens Rosenboom.
Signed-off-by: Brian Haley <brian.haley@hp.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2009-07-02 11:10:52 +04:00
/* jiffies - ifp->tstamp > age >= ifp->prefered_lft */
2005-04-17 02:20:36 +04:00
int deprecate = 0 ;
if ( ! ( ifp - > flags & IFA_F_DEPRECATED ) ) {
deprecate = 1 ;
ifp - > flags | = IFA_F_DEPRECATED ;
}
2013-12-31 07:04:19 +04:00
if ( ( ifp - > valid_lft ! = INFINITY_LIFE_TIME ) & &
( time_before ( ifp - > tstamp + ifp - > valid_lft * HZ , next ) ) )
2005-04-17 02:20:36 +04:00
next = ifp - > tstamp + ifp - > valid_lft * HZ ;
spin_unlock ( & ifp - > lock ) ;
if ( deprecate ) {
in6_ifa_hold ( ifp ) ;
ipv6_ifa_notify ( 0 , ifp ) ;
in6_ifa_put ( ifp ) ;
goto restart ;
}
} else if ( ( ifp - > flags & IFA_F_TEMPORARY ) & &
! ( ifp - > flags & IFA_F_TENTATIVE ) ) {
2010-03-17 23:31:17 +03:00
unsigned long regen_advance = ifp - > idev - > cnf . regen_max_retry *
ifp - > idev - > cnf . dad_transmits *
2013-12-07 22:26:53 +04:00
NEIGH_VAR ( ifp - > idev - > nd_parms , RETRANS_TIME ) / HZ ;
2010-03-17 23:31:17 +03:00
2005-04-17 02:20:36 +04:00
if ( age > = ifp - > prefered_lft - regen_advance ) {
struct inet6_ifaddr * ifpub = ifp - > ifpub ;
if ( time_before ( ifp - > tstamp + ifp - > prefered_lft * HZ , next ) )
next = ifp - > tstamp + ifp - > prefered_lft * HZ ;
if ( ! ifp - > regen_count & & ifpub ) {
ifp - > regen_count + + ;
in6_ifa_hold ( ifp ) ;
in6_ifa_hold ( ifpub ) ;
spin_unlock ( & ifp - > lock ) ;
2010-03-17 23:31:11 +03:00
2005-12-23 22:24:05 +03:00
spin_lock ( & ifpub - > lock ) ;
ifpub - > regen_count = 0 ;
spin_unlock ( & ifpub - > lock ) ;
ipv6: addrconf: break critical section in addrconf_verify_rtnl()
Heiner reported a lockdep splat [1]
This is caused by attempting GFP_KERNEL allocation while RCU lock is
held and BH blocked.
We believe that addrconf_verify_rtnl() could run for a long period,
so instead of using GFP_ATOMIC here as Ido suggested, we should break
the critical section and restart it after the allocation.
[1]
[86220.125562] =============================
[86220.125586] WARNING: suspicious RCU usage
[86220.125612] 4.15.0-rc7-next-20180110+ #7 Not tainted
[86220.125641] -----------------------------
[86220.125666] kernel/sched/core.c:6026 Illegal context switch in RCU-bh read-side critical section!
[86220.125711]
other info that might help us debug this:
[86220.125755]
rcu_scheduler_active = 2, debug_locks = 1
[86220.125792] 4 locks held by kworker/0:2/1003:
[86220.125817] #0: ((wq_completion)"%s"("ipv6_addrconf")){+.+.}, at: [<00000000da8e9b73>] process_one_work+0x1de/0x680
[86220.125895] #1: ((addr_chk_work).work){+.+.}, at: [<00000000da8e9b73>] process_one_work+0x1de/0x680
[86220.125959] #2: (rtnl_mutex){+.+.}, at: [<00000000b06d9510>] rtnl_lock+0x12/0x20
[86220.126017] #3: (rcu_read_lock_bh){....}, at: [<00000000aef52299>] addrconf_verify_rtnl+0x1e/0x510 [ipv6]
[86220.126111]
stack backtrace:
[86220.126142] CPU: 0 PID: 1003 Comm: kworker/0:2 Not tainted 4.15.0-rc7-next-20180110+ #7
[86220.126185] Hardware name: ZOTAC ZBOX-CI321NANO/ZBOX-CI321NANO, BIOS B246P105 06/01/2015
[86220.126250] Workqueue: ipv6_addrconf addrconf_verify_work [ipv6]
[86220.126288] Call Trace:
[86220.126312] dump_stack+0x70/0x9e
[86220.126337] lockdep_rcu_suspicious+0xce/0xf0
[86220.126365] ___might_sleep+0x1d3/0x240
[86220.126390] __might_sleep+0x45/0x80
[86220.126416] kmem_cache_alloc_trace+0x53/0x250
[86220.126458] ? ipv6_add_addr+0xfe/0x6e0 [ipv6]
[86220.126498] ipv6_add_addr+0xfe/0x6e0 [ipv6]
[86220.126538] ipv6_create_tempaddr+0x24d/0x430 [ipv6]
[86220.126580] ? ipv6_create_tempaddr+0x24d/0x430 [ipv6]
[86220.126623] addrconf_verify_rtnl+0x339/0x510 [ipv6]
[86220.126664] ? addrconf_verify_rtnl+0x339/0x510 [ipv6]
[86220.126708] addrconf_verify_work+0xe/0x20 [ipv6]
[86220.126738] process_one_work+0x258/0x680
[86220.126765] worker_thread+0x35/0x3f0
[86220.126790] kthread+0x124/0x140
[86220.126813] ? process_one_work+0x680/0x680
[86220.126839] ? kthread_create_worker_on_cpu+0x40/0x40
[86220.126869] ? umh_complete+0x40/0x40
[86220.126893] ? call_usermodehelper_exec_async+0x12a/0x160
[86220.126926] ret_from_fork+0x4b/0x60
[86220.126999] BUG: sleeping function called from invalid context at mm/slab.h:420
[86220.127041] in_atomic(): 1, irqs_disabled(): 0, pid: 1003, name: kworker/0:2
[86220.127082] 4 locks held by kworker/0:2/1003:
[86220.127107] #0: ((wq_completion)"%s"("ipv6_addrconf")){+.+.}, at: [<00000000da8e9b73>] process_one_work+0x1de/0x680
[86220.127179] #1: ((addr_chk_work).work){+.+.}, at: [<00000000da8e9b73>] process_one_work+0x1de/0x680
[86220.127242] #2: (rtnl_mutex){+.+.}, at: [<00000000b06d9510>] rtnl_lock+0x12/0x20
[86220.127300] #3: (rcu_read_lock_bh){....}, at: [<00000000aef52299>] addrconf_verify_rtnl+0x1e/0x510 [ipv6]
[86220.127414] CPU: 0 PID: 1003 Comm: kworker/0:2 Not tainted 4.15.0-rc7-next-20180110+ #7
[86220.127463] Hardware name: ZOTAC ZBOX-CI321NANO/ZBOX-CI321NANO, BIOS B246P105 06/01/2015
[86220.127528] Workqueue: ipv6_addrconf addrconf_verify_work [ipv6]
[86220.127568] Call Trace:
[86220.127591] dump_stack+0x70/0x9e
[86220.127616] ___might_sleep+0x14d/0x240
[86220.127644] __might_sleep+0x45/0x80
[86220.127672] kmem_cache_alloc_trace+0x53/0x250
[86220.127717] ? ipv6_add_addr+0xfe/0x6e0 [ipv6]
[86220.127762] ipv6_add_addr+0xfe/0x6e0 [ipv6]
[86220.127807] ipv6_create_tempaddr+0x24d/0x430 [ipv6]
[86220.127854] ? ipv6_create_tempaddr+0x24d/0x430 [ipv6]
[86220.127903] addrconf_verify_rtnl+0x339/0x510 [ipv6]
[86220.127950] ? addrconf_verify_rtnl+0x339/0x510 [ipv6]
[86220.127998] addrconf_verify_work+0xe/0x20 [ipv6]
[86220.128032] process_one_work+0x258/0x680
[86220.128063] worker_thread+0x35/0x3f0
[86220.128091] kthread+0x124/0x140
[86220.128117] ? process_one_work+0x680/0x680
[86220.128146] ? kthread_create_worker_on_cpu+0x40/0x40
[86220.128180] ? umh_complete+0x40/0x40
[86220.128207] ? call_usermodehelper_exec_async+0x12a/0x160
[86220.128243] ret_from_fork+0x4b/0x60
Fixes: f3d9832e56c4 ("ipv6: addrconf: cleanup locking in ipv6_add_addr")
Signed-off-by: Eric Dumazet <edumazet@google.com>
Reported-by: Heiner Kallweit <hkallweit1@gmail.com>
Reviewed-by: Ido Schimmel <idosch@mellanox.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-01-27 03:10:43 +03:00
rcu_read_unlock_bh ( ) ;
2017-11-07 01:13:29 +03:00
ipv6_create_tempaddr ( ifpub , ifp , true ) ;
2005-04-17 02:20:36 +04:00
in6_ifa_put ( ifpub ) ;
in6_ifa_put ( ifp ) ;
ipv6: addrconf: break critical section in addrconf_verify_rtnl()
Heiner reported a lockdep splat [1]
This is caused by attempting GFP_KERNEL allocation while RCU lock is
held and BH blocked.
We believe that addrconf_verify_rtnl() could run for a long period,
so instead of using GFP_ATOMIC here as Ido suggested, we should break
the critical section and restart it after the allocation.
[1]
[86220.125562] =============================
[86220.125586] WARNING: suspicious RCU usage
[86220.125612] 4.15.0-rc7-next-20180110+ #7 Not tainted
[86220.125641] -----------------------------
[86220.125666] kernel/sched/core.c:6026 Illegal context switch in RCU-bh read-side critical section!
[86220.125711]
other info that might help us debug this:
[86220.125755]
rcu_scheduler_active = 2, debug_locks = 1
[86220.125792] 4 locks held by kworker/0:2/1003:
[86220.125817] #0: ((wq_completion)"%s"("ipv6_addrconf")){+.+.}, at: [<00000000da8e9b73>] process_one_work+0x1de/0x680
[86220.125895] #1: ((addr_chk_work).work){+.+.}, at: [<00000000da8e9b73>] process_one_work+0x1de/0x680
[86220.125959] #2: (rtnl_mutex){+.+.}, at: [<00000000b06d9510>] rtnl_lock+0x12/0x20
[86220.126017] #3: (rcu_read_lock_bh){....}, at: [<00000000aef52299>] addrconf_verify_rtnl+0x1e/0x510 [ipv6]
[86220.126111]
stack backtrace:
[86220.126142] CPU: 0 PID: 1003 Comm: kworker/0:2 Not tainted 4.15.0-rc7-next-20180110+ #7
[86220.126185] Hardware name: ZOTAC ZBOX-CI321NANO/ZBOX-CI321NANO, BIOS B246P105 06/01/2015
[86220.126250] Workqueue: ipv6_addrconf addrconf_verify_work [ipv6]
[86220.126288] Call Trace:
[86220.126312] dump_stack+0x70/0x9e
[86220.126337] lockdep_rcu_suspicious+0xce/0xf0
[86220.126365] ___might_sleep+0x1d3/0x240
[86220.126390] __might_sleep+0x45/0x80
[86220.126416] kmem_cache_alloc_trace+0x53/0x250
[86220.126458] ? ipv6_add_addr+0xfe/0x6e0 [ipv6]
[86220.126498] ipv6_add_addr+0xfe/0x6e0 [ipv6]
[86220.126538] ipv6_create_tempaddr+0x24d/0x430 [ipv6]
[86220.126580] ? ipv6_create_tempaddr+0x24d/0x430 [ipv6]
[86220.126623] addrconf_verify_rtnl+0x339/0x510 [ipv6]
[86220.126664] ? addrconf_verify_rtnl+0x339/0x510 [ipv6]
[86220.126708] addrconf_verify_work+0xe/0x20 [ipv6]
[86220.126738] process_one_work+0x258/0x680
[86220.126765] worker_thread+0x35/0x3f0
[86220.126790] kthread+0x124/0x140
[86220.126813] ? process_one_work+0x680/0x680
[86220.126839] ? kthread_create_worker_on_cpu+0x40/0x40
[86220.126869] ? umh_complete+0x40/0x40
[86220.126893] ? call_usermodehelper_exec_async+0x12a/0x160
[86220.126926] ret_from_fork+0x4b/0x60
[86220.126999] BUG: sleeping function called from invalid context at mm/slab.h:420
[86220.127041] in_atomic(): 1, irqs_disabled(): 0, pid: 1003, name: kworker/0:2
[86220.127082] 4 locks held by kworker/0:2/1003:
[86220.127107] #0: ((wq_completion)"%s"("ipv6_addrconf")){+.+.}, at: [<00000000da8e9b73>] process_one_work+0x1de/0x680
[86220.127179] #1: ((addr_chk_work).work){+.+.}, at: [<00000000da8e9b73>] process_one_work+0x1de/0x680
[86220.127242] #2: (rtnl_mutex){+.+.}, at: [<00000000b06d9510>] rtnl_lock+0x12/0x20
[86220.127300] #3: (rcu_read_lock_bh){....}, at: [<00000000aef52299>] addrconf_verify_rtnl+0x1e/0x510 [ipv6]
[86220.127414] CPU: 0 PID: 1003 Comm: kworker/0:2 Not tainted 4.15.0-rc7-next-20180110+ #7
[86220.127463] Hardware name: ZOTAC ZBOX-CI321NANO/ZBOX-CI321NANO, BIOS B246P105 06/01/2015
[86220.127528] Workqueue: ipv6_addrconf addrconf_verify_work [ipv6]
[86220.127568] Call Trace:
[86220.127591] dump_stack+0x70/0x9e
[86220.127616] ___might_sleep+0x14d/0x240
[86220.127644] __might_sleep+0x45/0x80
[86220.127672] kmem_cache_alloc_trace+0x53/0x250
[86220.127717] ? ipv6_add_addr+0xfe/0x6e0 [ipv6]
[86220.127762] ipv6_add_addr+0xfe/0x6e0 [ipv6]
[86220.127807] ipv6_create_tempaddr+0x24d/0x430 [ipv6]
[86220.127854] ? ipv6_create_tempaddr+0x24d/0x430 [ipv6]
[86220.127903] addrconf_verify_rtnl+0x339/0x510 [ipv6]
[86220.127950] ? addrconf_verify_rtnl+0x339/0x510 [ipv6]
[86220.127998] addrconf_verify_work+0xe/0x20 [ipv6]
[86220.128032] process_one_work+0x258/0x680
[86220.128063] worker_thread+0x35/0x3f0
[86220.128091] kthread+0x124/0x140
[86220.128117] ? process_one_work+0x680/0x680
[86220.128146] ? kthread_create_worker_on_cpu+0x40/0x40
[86220.128180] ? umh_complete+0x40/0x40
[86220.128207] ? call_usermodehelper_exec_async+0x12a/0x160
[86220.128243] ret_from_fork+0x4b/0x60
Fixes: f3d9832e56c4 ("ipv6: addrconf: cleanup locking in ipv6_add_addr")
Signed-off-by: Eric Dumazet <edumazet@google.com>
Reported-by: Heiner Kallweit <hkallweit1@gmail.com>
Reviewed-by: Ido Schimmel <idosch@mellanox.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-01-27 03:10:43 +03:00
rcu_read_lock_bh ( ) ;
2005-04-17 02:20:36 +04:00
goto restart ;
}
} else if ( time_before ( ifp - > tstamp + ifp - > prefered_lft * HZ - regen_advance * HZ , next ) )
next = ifp - > tstamp + ifp - > prefered_lft * HZ - regen_advance * HZ ;
spin_unlock ( & ifp - > lock ) ;
} else {
/* ifp->prefered_lft <= ifp->valid_lft */
if ( time_before ( ifp - > tstamp + ifp - > prefered_lft * HZ , next ) )
next = ifp - > tstamp + ifp - > prefered_lft * HZ ;
spin_unlock ( & ifp - > lock ) ;
}
}
}
ipv6: Reduce timer events for addrconf_verify().
This patch reduces timer events while keeping accuracy by rounding
our timer and/or batching several address validations in addrconf_verify().
addrconf_verify() is called at earliest timeout among interface addresses'
timeouts, but at maximum ADDR_CHECK_FREQUENCY (120 secs).
In most cases, all of timeouts of interface addresses are long enough
(e.g. several hours or days vs 2 minutes), this timer is usually called
every ADDR_CHECK_FREQUENCY, and it is okay to be lazy.
(Note this timer could be eliminated if all code paths which modifies
variables related to timeouts call us manually, but it is another story.)
However, in other least but important cases, we try keeping accuracy.
When the real interface address timeout is coming, and the timeout
is just before the rounded timeout, we accept some error.
When a timeout has been reached, we also try batching other several
events in very near future.
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2010-03-21 02:11:12 +03:00
next_sec = round_jiffies_up ( next ) ;
next_sched = next ;
/* If rounded timeout is accurate enough, accept it. */
if ( time_before ( next_sec , next + ADDRCONF_TIMER_FUZZ ) )
next_sched = next_sec ;
/* And minimum interval is ADDRCONF_TIMER_FUZZ_MAX. */
if ( time_before ( next_sched , jiffies + ADDRCONF_TIMER_FUZZ_MAX ) )
next_sched = jiffies + ADDRCONF_TIMER_FUZZ_MAX ;
2018-03-26 18:35:01 +03:00
pr_debug ( " now = %lu, schedule = %lu, rounded schedule = %lu => %lu \n " ,
now , next , next_sec , next_sched ) ;
2014-03-27 21:28:07 +04:00
mod_delayed_work ( addrconf_wq , & addr_chk_work , next_sched - now ) ;
2010-03-17 23:31:11 +03:00
rcu_read_unlock_bh ( ) ;
2005-04-17 02:20:36 +04:00
}
2014-03-27 21:28:07 +04:00
static void addrconf_verify_work ( struct work_struct * w )
{
rtnl_lock ( ) ;
addrconf_verify_rtnl ( ) ;
rtnl_unlock ( ) ;
}
static void addrconf_verify ( void )
{
mod_delayed_work ( addrconf_wq , & addr_chk_work , 0 ) ;
}
2013-05-17 02:32:00 +04:00
static struct in6_addr * extract_addr ( struct nlattr * addr , struct nlattr * local ,
struct in6_addr * * peer_pfx )
2006-09-18 11:09:49 +04:00
{
struct in6_addr * pfx = NULL ;
2013-05-17 02:32:00 +04:00
* peer_pfx = NULL ;
2006-09-18 11:09:49 +04:00
if ( addr )
pfx = nla_data ( addr ) ;
if ( local ) {
if ( pfx & & nla_memcmp ( local , pfx , sizeof ( * pfx ) ) )
2013-05-17 02:32:00 +04:00
* peer_pfx = pfx ;
pfx = nla_data ( local ) ;
2006-09-18 11:09:49 +04:00
}
return pfx ;
}
2007-06-05 23:38:30 +04:00
static const struct nla_policy ifa_ipv6_policy [ IFA_MAX + 1 ] = {
2006-09-18 11:09:49 +04:00
[ IFA_ADDRESS ] = { . len = sizeof ( struct in6_addr ) } ,
[ IFA_LOCAL ] = { . len = sizeof ( struct in6_addr ) } ,
[ IFA_CACHEINFO ] = { . len = sizeof ( struct ifa_cacheinfo ) } ,
2013-12-06 12:45:21 +04:00
[ IFA_FLAGS ] = { . len = sizeof ( u32 ) } ,
2018-05-27 18:09:58 +03:00
[ IFA_RT_PRIORITY ] = { . len = sizeof ( u32 ) } ,
2018-09-04 22:53:50 +03:00
[ IFA_TARGET_NETNSID ] = { . type = NLA_S32 } ,
2006-09-18 11:09:49 +04:00
} ;
2005-04-17 02:20:36 +04:00
static int
2017-04-16 19:48:24 +03:00
inet6_rtm_deladdr ( struct sk_buff * skb , struct nlmsghdr * nlh ,
struct netlink_ext_ack * extack )
2005-04-17 02:20:36 +04:00
{
2008-03-25 20:26:21 +03:00
struct net * net = sock_net ( skb - > sk ) ;
2006-09-18 11:10:19 +04:00
struct ifaddrmsg * ifm ;
struct nlattr * tb [ IFA_MAX + 1 ] ;
2013-05-17 02:32:00 +04:00
struct in6_addr * pfx , * peer_pfx ;
2014-04-20 23:29:36 +04:00
u32 ifa_flags ;
2006-09-18 11:10:19 +04:00
int err ;
2005-04-17 02:20:36 +04:00
2017-04-12 15:34:07 +03:00
err = nlmsg_parse ( nlh , sizeof ( * ifm ) , tb , IFA_MAX , ifa_ipv6_policy ,
2017-04-16 19:48:24 +03:00
extack ) ;
2006-09-18 11:10:19 +04:00
if ( err < 0 )
return err ;
ifm = nlmsg_data ( nlh ) ;
2013-05-17 02:32:00 +04:00
pfx = extract_addr ( tb [ IFA_ADDRESS ] , tb [ IFA_LOCAL ] , & peer_pfx ) ;
2015-03-29 16:00:04 +03:00
if ( ! pfx )
2005-04-17 02:20:36 +04:00
return - EINVAL ;
2014-04-20 23:29:36 +04:00
ifa_flags = tb [ IFA_FLAGS ] ? nla_get_u32 ( tb [ IFA_FLAGS ] ) : ifm - > ifa_flags ;
/* We ignore other flags so far. */
ifa_flags & = IFA_F_MANAGETEMPADDR ;
return inet6_addr_del ( net , ifm - > ifa_index , ifa_flags , pfx ,
ifm - > ifa_prefixlen ) ;
2005-04-17 02:20:36 +04:00
}
2018-05-27 18:09:58 +03:00
static int modify_prefix_route ( struct inet6_ifaddr * ifp ,
unsigned long expires , u32 flags )
{
struct fib6_info * f6i ;
2018-06-28 23:36:55 +03:00
u32 prio ;
2018-05-27 18:09:58 +03:00
f6i = addrconf_get_prefix_route ( & ifp - > addr ,
ifp - > prefix_len ,
ifp - > idev - > dev ,
0 , RTF_GATEWAY | RTF_DEFAULT ) ;
if ( ! f6i )
return - ENOENT ;
2018-06-28 23:36:55 +03:00
prio = ifp - > rt_priority ? : IP6_RT_PRIO_ADDRCONF ;
if ( f6i - > fib6_metric ! = prio ) {
/* delete old one */
ip6_del_rt ( dev_net ( ifp - > idev - > dev ) , f6i ) ;
2018-05-27 18:09:58 +03:00
/* add new one */
addrconf_prefix_route ( & ifp - > addr , ifp - > prefix_len ,
ifp - > rt_priority , ifp - > idev - > dev ,
expires , flags , GFP_KERNEL ) ;
} else {
if ( ! expires )
fib6_clean_expires ( f6i ) ;
else
fib6_set_expires ( f6i , expires ) ;
fib6_info_release ( f6i ) ;
}
return 0 ;
}
2018-05-27 18:09:55 +03:00
static int inet6_addr_modify ( struct inet6_ifaddr * ifp , struct ifa6_config * cfg )
2006-07-28 13:12:13 +04:00
{
2008-05-20 03:56:11 +04:00
u32 flags ;
clock_t expires ;
2008-05-27 12:37:49 +04:00
unsigned long timeout ;
2013-12-06 12:45:22 +04:00
bool was_managetempaddr ;
2014-01-15 18:36:59 +04:00
bool had_prefixroute ;
2007-02-07 14:36:26 +03:00
2014-03-27 21:28:07 +04:00
ASSERT_RTNL ( ) ;
2018-05-27 18:09:55 +03:00
if ( ! cfg - > valid_lft | | cfg - > preferred_lft > cfg - > valid_lft )
2006-07-28 13:12:13 +04:00
return - EINVAL ;
2018-05-27 18:09:55 +03:00
if ( cfg - > ifa_flags & IFA_F_MANAGETEMPADDR & &
2013-12-06 12:45:22 +04:00
( ifp - > flags & IFA_F_TEMPORARY | | ifp - > prefix_len ! = 64 ) )
return - EINVAL ;
ipv6: allow userspace to add IFA_F_OPTIMISTIC addresses
According to RFC 4429 (section 3.1), adding new IPv6 addresses as
optimistic addresses is acceptable, as long as the implementation
follows some rules:
* Optimistic DAD SHOULD only be used when the implementation is aware
that the address is based on a most likely unique interface
identifier (such as in [RFC2464]), generated randomly [RFC3041],
or by a well-distributed hash function [RFC3972] or assigned by
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) [RFC3315].
Optimistic DAD SHOULD NOT be used for manually entered
addresses.
Thus, it seems reasonable to allow userspace to set the optimistic flag
when adding new addresses.
We must not let userspace set NODAD + OPTIMISTIC, since if the kernel is
not performing DAD we would never clear the optimistic flag. We must
also ignore userspace's request to add OPTIMISTIC flag to addresses that
have already completed DAD (addresses that don't have the TENTATIVE
flag, or that have the DADFAILED flag).
Then we also need to clear the OPTIMISTIC flag on permanent addresses
when DAD fails. Otherwise, IFA_F_OPTIMISTIC addresses added by userspace
can still be used after DAD has failed, because in
ipv6_chk_addr_and_flags(), IFA_F_OPTIMISTIC overrides IFA_F_TENTATIVE.
Setting IFA_F_OPTIMISTIC from userspace is conditional on
CONFIG_IPV6_OPTIMISTIC_DAD and the optimistic_dad sysctl.
Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
Reviewed-by: Stefano Brivio <sbrivio@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-02-28 18:40:08 +03:00
if ( ! ( ifp - > flags & IFA_F_TENTATIVE ) | | ifp - > flags & IFA_F_DADFAILED )
2018-05-27 18:09:55 +03:00
cfg - > ifa_flags & = ~ IFA_F_OPTIMISTIC ;
ipv6: allow userspace to add IFA_F_OPTIMISTIC addresses
According to RFC 4429 (section 3.1), adding new IPv6 addresses as
optimistic addresses is acceptable, as long as the implementation
follows some rules:
* Optimistic DAD SHOULD only be used when the implementation is aware
that the address is based on a most likely unique interface
identifier (such as in [RFC2464]), generated randomly [RFC3041],
or by a well-distributed hash function [RFC3972] or assigned by
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) [RFC3315].
Optimistic DAD SHOULD NOT be used for manually entered
addresses.
Thus, it seems reasonable to allow userspace to set the optimistic flag
when adding new addresses.
We must not let userspace set NODAD + OPTIMISTIC, since if the kernel is
not performing DAD we would never clear the optimistic flag. We must
also ignore userspace's request to add OPTIMISTIC flag to addresses that
have already completed DAD (addresses that don't have the TENTATIVE
flag, or that have the DADFAILED flag).
Then we also need to clear the OPTIMISTIC flag on permanent addresses
when DAD fails. Otherwise, IFA_F_OPTIMISTIC addresses added by userspace
can still be used after DAD has failed, because in
ipv6_chk_addr_and_flags(), IFA_F_OPTIMISTIC overrides IFA_F_TENTATIVE.
Setting IFA_F_OPTIMISTIC from userspace is conditional on
CONFIG_IPV6_OPTIMISTIC_DAD and the optimistic_dad sysctl.
Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
Reviewed-by: Stefano Brivio <sbrivio@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-02-28 18:40:08 +03:00
2018-05-27 18:09:55 +03:00
timeout = addrconf_timeout_fixup ( cfg - > valid_lft , HZ ) ;
2008-05-27 12:37:49 +04:00
if ( addrconf_finite_timeout ( timeout ) ) {
expires = jiffies_to_clock_t ( timeout * HZ ) ;
2018-05-27 18:09:55 +03:00
cfg - > valid_lft = timeout ;
2008-05-20 03:56:11 +04:00
flags = RTF_EXPIRES ;
2008-05-27 12:37:49 +04:00
} else {
expires = 0 ;
flags = 0 ;
2018-05-27 18:09:55 +03:00
cfg - > ifa_flags | = IFA_F_PERMANENT ;
2008-05-20 03:56:11 +04:00
}
2006-07-28 13:12:13 +04:00
2018-05-27 18:09:55 +03:00
timeout = addrconf_timeout_fixup ( cfg - > preferred_lft , HZ ) ;
2008-05-27 12:37:49 +04:00
if ( addrconf_finite_timeout ( timeout ) ) {
if ( timeout = = 0 )
2018-05-27 18:09:55 +03:00
cfg - > ifa_flags | = IFA_F_DEPRECATED ;
cfg - > preferred_lft = timeout ;
2008-05-27 12:37:49 +04:00
}
2006-07-28 13:12:13 +04:00
spin_lock_bh ( & ifp - > lock ) ;
2013-12-06 12:45:22 +04:00
was_managetempaddr = ifp - > flags & IFA_F_MANAGETEMPADDR ;
2014-01-15 18:36:59 +04:00
had_prefixroute = ifp - > flags & IFA_F_PERMANENT & &
! ( ifp - > flags & IFA_F_NOPREFIXROUTE ) ;
2013-12-06 12:45:22 +04:00
ifp - > flags & = ~ ( IFA_F_DEPRECATED | IFA_F_PERMANENT | IFA_F_NODAD |
2014-01-15 18:36:58 +04:00
IFA_F_HOMEADDRESS | IFA_F_MANAGETEMPADDR |
IFA_F_NOPREFIXROUTE ) ;
2018-05-27 18:09:55 +03:00
ifp - > flags | = cfg - > ifa_flags ;
2006-07-28 13:12:13 +04:00
ifp - > tstamp = jiffies ;
2018-05-27 18:09:55 +03:00
ifp - > valid_lft = cfg - > valid_lft ;
ifp - > prefered_lft = cfg - > preferred_lft ;
2006-07-28 13:12:13 +04:00
2018-05-27 18:09:58 +03:00
if ( cfg - > rt_priority & & cfg - > rt_priority ! = ifp - > rt_priority )
ifp - > rt_priority = cfg - > rt_priority ;
2006-07-28 13:12:13 +04:00
spin_unlock_bh ( & ifp - > lock ) ;
if ( ! ( ifp - > flags & IFA_F_TENTATIVE ) )
ipv6_ifa_notify ( 0 , ifp ) ;
2018-05-27 18:09:55 +03:00
if ( ! ( cfg - > ifa_flags & IFA_F_NOPREFIXROUTE ) ) {
2018-05-27 18:09:58 +03:00
int rc = - ENOENT ;
if ( had_prefixroute )
rc = modify_prefix_route ( ifp , expires , flags ) ;
/* prefix route could have been deleted; if so restore it */
if ( rc = = - ENOENT ) {
addrconf_prefix_route ( & ifp - > addr , ifp - > prefix_len ,
ifp - > rt_priority , ifp - > idev - > dev ,
expires , flags , GFP_KERNEL ) ;
}
2014-01-15 18:36:59 +04:00
} else if ( had_prefixroute ) {
enum cleanup_prefix_rt_t action ;
unsigned long rt_expires ;
write_lock_bh ( & ifp - > idev - > lock ) ;
action = check_cleanup_prefix_route ( ifp , & rt_expires ) ;
write_unlock_bh ( & ifp - > idev - > lock ) ;
if ( action ! = CLEANUP_PREFIX_RT_NOP ) {
cleanup_prefix_route ( ifp , rt_expires ,
action = = CLEANUP_PREFIX_RT_DEL ) ;
}
2014-01-15 18:36:58 +04:00
}
2013-12-06 12:45:22 +04:00
if ( was_managetempaddr | | ifp - > flags & IFA_F_MANAGETEMPADDR ) {
2018-05-27 18:09:55 +03:00
if ( was_managetempaddr & &
! ( ifp - > flags & IFA_F_MANAGETEMPADDR ) ) {
cfg - > valid_lft = 0 ;
cfg - > preferred_lft = 0 ;
}
manage_tempaddrs ( ifp - > idev , ifp , cfg - > valid_lft ,
cfg - > preferred_lft , ! was_managetempaddr ,
jiffies ) ;
2013-12-06 12:45:22 +04:00
}
2014-03-27 21:28:07 +04:00
addrconf_verify_rtnl ( ) ;
2006-07-28 13:12:13 +04:00
return 0 ;
}
2005-04-17 02:20:36 +04:00
static int
2017-04-16 19:48:24 +03:00
inet6_rtm_newaddr ( struct sk_buff * skb , struct nlmsghdr * nlh ,
struct netlink_ext_ack * extack )
2005-04-17 02:20:36 +04:00
{
2008-03-25 20:26:21 +03:00
struct net * net = sock_net ( skb - > sk ) ;
2006-09-18 11:09:49 +04:00
struct ifaddrmsg * ifm ;
struct nlattr * tb [ IFA_MAX + 1 ] ;
2018-05-27 18:09:54 +03:00
struct in6_addr * peer_pfx ;
2006-09-18 11:13:46 +04:00
struct inet6_ifaddr * ifa ;
struct net_device * dev ;
ipv6: allow userspace to add IFA_F_OPTIMISTIC addresses
According to RFC 4429 (section 3.1), adding new IPv6 addresses as
optimistic addresses is acceptable, as long as the implementation
follows some rules:
* Optimistic DAD SHOULD only be used when the implementation is aware
that the address is based on a most likely unique interface
identifier (such as in [RFC2464]), generated randomly [RFC3041],
or by a well-distributed hash function [RFC3972] or assigned by
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) [RFC3315].
Optimistic DAD SHOULD NOT be used for manually entered
addresses.
Thus, it seems reasonable to allow userspace to set the optimistic flag
when adding new addresses.
We must not let userspace set NODAD + OPTIMISTIC, since if the kernel is
not performing DAD we would never clear the optimistic flag. We must
also ignore userspace's request to add OPTIMISTIC flag to addresses that
have already completed DAD (addresses that don't have the TENTATIVE
flag, or that have the DADFAILED flag).
Then we also need to clear the OPTIMISTIC flag on permanent addresses
when DAD fails. Otherwise, IFA_F_OPTIMISTIC addresses added by userspace
can still be used after DAD has failed, because in
ipv6_chk_addr_and_flags(), IFA_F_OPTIMISTIC overrides IFA_F_TENTATIVE.
Setting IFA_F_OPTIMISTIC from userspace is conditional on
CONFIG_IPV6_OPTIMISTIC_DAD and the optimistic_dad sysctl.
Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
Reviewed-by: Stefano Brivio <sbrivio@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-02-28 18:40:08 +03:00
struct inet6_dev * idev ;
2018-05-27 18:09:54 +03:00
struct ifa6_config cfg ;
2006-09-18 11:09:49 +04:00
int err ;
2005-04-17 02:20:36 +04:00
2017-04-12 15:34:07 +03:00
err = nlmsg_parse ( nlh , sizeof ( * ifm ) , tb , IFA_MAX , ifa_ipv6_policy ,
2017-04-16 19:48:24 +03:00
extack ) ;
2006-09-18 11:09:49 +04:00
if ( err < 0 )
return err ;
2018-05-27 18:09:54 +03:00
memset ( & cfg , 0 , sizeof ( cfg ) ) ;
2006-09-18 11:09:49 +04:00
ifm = nlmsg_data ( nlh ) ;
2018-05-27 18:09:54 +03:00
cfg . pfx = extract_addr ( tb [ IFA_ADDRESS ] , tb [ IFA_LOCAL ] , & peer_pfx ) ;
if ( ! cfg . pfx )
2005-04-17 02:20:36 +04:00
return - EINVAL ;
2018-05-27 18:09:54 +03:00
cfg . peer_pfx = peer_pfx ;
cfg . plen = ifm - > ifa_prefixlen ;
2018-05-27 18:09:58 +03:00
if ( tb [ IFA_RT_PRIORITY ] )
cfg . rt_priority = nla_get_u32 ( tb [ IFA_RT_PRIORITY ] ) ;
2018-05-27 18:09:54 +03:00
cfg . valid_lft = INFINITY_LIFE_TIME ;
cfg . preferred_lft = INFINITY_LIFE_TIME ;
2006-09-18 11:09:49 +04:00
if ( tb [ IFA_CACHEINFO ] ) {
2006-07-28 13:12:10 +04:00
struct ifa_cacheinfo * ci ;
2006-09-18 11:09:49 +04:00
ci = nla_data ( tb [ IFA_CACHEINFO ] ) ;
2018-05-27 18:09:54 +03:00
cfg . valid_lft = ci - > ifa_valid ;
cfg . preferred_lft = ci - > ifa_prefered ;
2006-07-28 13:12:10 +04:00
}
2008-03-05 21:46:57 +03:00
dev = __dev_get_by_index ( net , ifm - > ifa_index ) ;
2015-03-29 16:00:04 +03:00
if ( ! dev )
2006-09-18 11:13:46 +04:00
return - ENODEV ;
2018-05-27 18:09:54 +03:00
if ( tb [ IFA_FLAGS ] )
cfg . ifa_flags = nla_get_u32 ( tb [ IFA_FLAGS ] ) ;
else
cfg . ifa_flags = ifm - > ifa_flags ;
2013-12-06 12:45:21 +04:00
2006-09-23 01:45:27 +04:00
/* We ignore other flags so far. */
2018-05-27 18:09:54 +03:00
cfg . ifa_flags & = IFA_F_NODAD | IFA_F_HOMEADDRESS |
IFA_F_MANAGETEMPADDR | IFA_F_NOPREFIXROUTE |
IFA_F_MCAUTOJOIN | IFA_F_OPTIMISTIC ;
ipv6: allow userspace to add IFA_F_OPTIMISTIC addresses
According to RFC 4429 (section 3.1), adding new IPv6 addresses as
optimistic addresses is acceptable, as long as the implementation
follows some rules:
* Optimistic DAD SHOULD only be used when the implementation is aware
that the address is based on a most likely unique interface
identifier (such as in [RFC2464]), generated randomly [RFC3041],
or by a well-distributed hash function [RFC3972] or assigned by
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) [RFC3315].
Optimistic DAD SHOULD NOT be used for manually entered
addresses.
Thus, it seems reasonable to allow userspace to set the optimistic flag
when adding new addresses.
We must not let userspace set NODAD + OPTIMISTIC, since if the kernel is
not performing DAD we would never clear the optimistic flag. We must
also ignore userspace's request to add OPTIMISTIC flag to addresses that
have already completed DAD (addresses that don't have the TENTATIVE
flag, or that have the DADFAILED flag).
Then we also need to clear the OPTIMISTIC flag on permanent addresses
when DAD fails. Otherwise, IFA_F_OPTIMISTIC addresses added by userspace
can still be used after DAD has failed, because in
ipv6_chk_addr_and_flags(), IFA_F_OPTIMISTIC overrides IFA_F_TENTATIVE.
Setting IFA_F_OPTIMISTIC from userspace is conditional on
CONFIG_IPV6_OPTIMISTIC_DAD and the optimistic_dad sysctl.
Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
Reviewed-by: Stefano Brivio <sbrivio@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-02-28 18:40:08 +03:00
idev = ipv6_find_idev ( dev ) ;
2018-12-29 01:28:21 +03:00
if ( ! idev )
return - ENOBUFS ;
ipv6: allow userspace to add IFA_F_OPTIMISTIC addresses
According to RFC 4429 (section 3.1), adding new IPv6 addresses as
optimistic addresses is acceptable, as long as the implementation
follows some rules:
* Optimistic DAD SHOULD only be used when the implementation is aware
that the address is based on a most likely unique interface
identifier (such as in [RFC2464]), generated randomly [RFC3041],
or by a well-distributed hash function [RFC3972] or assigned by
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) [RFC3315].
Optimistic DAD SHOULD NOT be used for manually entered
addresses.
Thus, it seems reasonable to allow userspace to set the optimistic flag
when adding new addresses.
We must not let userspace set NODAD + OPTIMISTIC, since if the kernel is
not performing DAD we would never clear the optimistic flag. We must
also ignore userspace's request to add OPTIMISTIC flag to addresses that
have already completed DAD (addresses that don't have the TENTATIVE
flag, or that have the DADFAILED flag).
Then we also need to clear the OPTIMISTIC flag on permanent addresses
when DAD fails. Otherwise, IFA_F_OPTIMISTIC addresses added by userspace
can still be used after DAD has failed, because in
ipv6_chk_addr_and_flags(), IFA_F_OPTIMISTIC overrides IFA_F_TENTATIVE.
Setting IFA_F_OPTIMISTIC from userspace is conditional on
CONFIG_IPV6_OPTIMISTIC_DAD and the optimistic_dad sysctl.
Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
Reviewed-by: Stefano Brivio <sbrivio@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-02-28 18:40:08 +03:00
if ( ! ipv6_allow_optimistic_dad ( net , idev ) )
2018-05-27 18:09:54 +03:00
cfg . ifa_flags & = ~ IFA_F_OPTIMISTIC ;
ipv6: allow userspace to add IFA_F_OPTIMISTIC addresses
According to RFC 4429 (section 3.1), adding new IPv6 addresses as
optimistic addresses is acceptable, as long as the implementation
follows some rules:
* Optimistic DAD SHOULD only be used when the implementation is aware
that the address is based on a most likely unique interface
identifier (such as in [RFC2464]), generated randomly [RFC3041],
or by a well-distributed hash function [RFC3972] or assigned by
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) [RFC3315].
Optimistic DAD SHOULD NOT be used for manually entered
addresses.
Thus, it seems reasonable to allow userspace to set the optimistic flag
when adding new addresses.
We must not let userspace set NODAD + OPTIMISTIC, since if the kernel is
not performing DAD we would never clear the optimistic flag. We must
also ignore userspace's request to add OPTIMISTIC flag to addresses that
have already completed DAD (addresses that don't have the TENTATIVE
flag, or that have the DADFAILED flag).
Then we also need to clear the OPTIMISTIC flag on permanent addresses
when DAD fails. Otherwise, IFA_F_OPTIMISTIC addresses added by userspace
can still be used after DAD has failed, because in
ipv6_chk_addr_and_flags(), IFA_F_OPTIMISTIC overrides IFA_F_TENTATIVE.
Setting IFA_F_OPTIMISTIC from userspace is conditional on
CONFIG_IPV6_OPTIMISTIC_DAD and the optimistic_dad sysctl.
Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
Reviewed-by: Stefano Brivio <sbrivio@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-02-28 18:40:08 +03:00
2018-05-27 18:09:54 +03:00
if ( cfg . ifa_flags & IFA_F_NODAD & &
cfg . ifa_flags & IFA_F_OPTIMISTIC ) {
ipv6: allow userspace to add IFA_F_OPTIMISTIC addresses
According to RFC 4429 (section 3.1), adding new IPv6 addresses as
optimistic addresses is acceptable, as long as the implementation
follows some rules:
* Optimistic DAD SHOULD only be used when the implementation is aware
that the address is based on a most likely unique interface
identifier (such as in [RFC2464]), generated randomly [RFC3041],
or by a well-distributed hash function [RFC3972] or assigned by
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) [RFC3315].
Optimistic DAD SHOULD NOT be used for manually entered
addresses.
Thus, it seems reasonable to allow userspace to set the optimistic flag
when adding new addresses.
We must not let userspace set NODAD + OPTIMISTIC, since if the kernel is
not performing DAD we would never clear the optimistic flag. We must
also ignore userspace's request to add OPTIMISTIC flag to addresses that
have already completed DAD (addresses that don't have the TENTATIVE
flag, or that have the DADFAILED flag).
Then we also need to clear the OPTIMISTIC flag on permanent addresses
when DAD fails. Otherwise, IFA_F_OPTIMISTIC addresses added by userspace
can still be used after DAD has failed, because in
ipv6_chk_addr_and_flags(), IFA_F_OPTIMISTIC overrides IFA_F_TENTATIVE.
Setting IFA_F_OPTIMISTIC from userspace is conditional on
CONFIG_IPV6_OPTIMISTIC_DAD and the optimistic_dad sysctl.
Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
Reviewed-by: Stefano Brivio <sbrivio@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-02-28 18:40:08 +03:00
NL_SET_ERR_MSG ( extack , " IFA_F_NODAD and IFA_F_OPTIMISTIC are mutually exclusive " ) ;
return - EINVAL ;
}
2006-09-23 01:45:27 +04:00
2018-05-27 18:09:54 +03:00
ifa = ipv6_get_ifaddr ( net , cfg . pfx , dev , 1 ) ;
2015-03-29 16:00:04 +03:00
if ( ! ifa ) {
2006-09-18 11:13:46 +04:00
/*
* It would be best to check for ! NLM_F_CREATE here but
2014-01-12 23:26:32 +04:00
* userspace already relies on not having to provide this .
2006-09-18 11:13:46 +04:00
*/
2018-05-27 18:09:54 +03:00
return inet6_addr_add ( net , ifm - > ifa_index , & cfg , extack ) ;
2006-07-28 13:12:13 +04:00
}
2006-09-18 11:13:46 +04:00
if ( nlh - > nlmsg_flags & NLM_F_EXCL | |
! ( nlh - > nlmsg_flags & NLM_F_REPLACE ) )
err = - EEXIST ;
else
2018-05-27 18:09:55 +03:00
err = inet6_addr_modify ( ifa , & cfg ) ;
2006-09-18 11:13:46 +04:00
in6_ifa_put ( ifa ) ;
return err ;
2005-04-17 02:20:36 +04:00
}
2013-12-06 12:45:21 +04:00
static void put_ifaddrmsg ( struct nlmsghdr * nlh , u8 prefixlen , u32 flags ,
2006-09-18 11:11:52 +04:00
u8 scope , int ifindex )
{
struct ifaddrmsg * ifm ;
ifm = nlmsg_data ( nlh ) ;
ifm - > ifa_family = AF_INET6 ;
ifm - > ifa_prefixlen = prefixlen ;
ifm - > ifa_flags = flags ;
ifm - > ifa_scope = scope ;
ifm - > ifa_index = ifindex ;
}
2006-09-18 11:11:24 +04:00
static int put_cacheinfo ( struct sk_buff * skb , unsigned long cstamp ,
unsigned long tstamp , u32 preferred , u32 valid )
{
struct ifa_cacheinfo ci ;
2010-11-17 07:12:02 +03:00
ci . cstamp = cstamp_delta ( cstamp ) ;
ci . tstamp = cstamp_delta ( tstamp ) ;
2006-09-18 11:11:24 +04:00
ci . ifa_prefered = preferred ;
ci . ifa_valid = valid ;
return nla_put ( skb , IFA_CACHEINFO , sizeof ( ci ) , & ci ) ;
}
2006-09-18 11:11:52 +04:00
static inline int rt_scope ( int ifa_scope )
{
if ( ifa_scope & IFA_HOST )
return RT_SCOPE_HOST ;
else if ( ifa_scope & IFA_LINK )
return RT_SCOPE_LINK ;
else if ( ifa_scope & IFA_SITE )
return RT_SCOPE_SITE ;
else
return RT_SCOPE_UNIVERSE ;
}
2006-09-18 11:12:35 +04:00
static inline int inet6_ifaddr_msgsize ( void )
{
2006-11-11 01:10:15 +03:00
return NLMSG_ALIGN ( sizeof ( struct ifaddrmsg ) )
2013-05-17 02:32:00 +04:00
+ nla_total_size ( 16 ) /* IFA_LOCAL */
2006-11-11 01:10:15 +03:00
+ nla_total_size ( 16 ) /* IFA_ADDRESS */
2013-12-06 12:45:21 +04:00
+ nla_total_size ( sizeof ( struct ifa_cacheinfo ) )
2018-05-27 18:09:58 +03:00
+ nla_total_size ( 4 ) /* IFA_FLAGS */
+ nla_total_size ( 4 ) /* IFA_RT_PRIORITY */ ;
2006-09-18 11:12:35 +04:00
}
2006-06-18 09:48:48 +04:00
2018-10-08 06:16:26 +03:00
enum addr_type_t {
UNICAST_ADDR ,
MULTICAST_ADDR ,
ANYCAST_ADDR ,
} ;
2018-09-04 22:53:55 +03:00
struct inet6_fill_args {
u32 portid ;
u32 seq ;
int event ;
unsigned int flags ;
int netnsid ;
2018-10-19 22:45:30 +03:00
int ifindex ;
2018-10-08 06:16:26 +03:00
enum addr_type_t type ;
2018-09-04 22:53:55 +03:00
} ;
2005-04-17 02:20:36 +04:00
static int inet6_fill_ifaddr ( struct sk_buff * skb , struct inet6_ifaddr * ifa ,
2018-09-04 22:53:55 +03:00
struct inet6_fill_args * args )
2005-04-17 02:20:36 +04:00
{
struct nlmsghdr * nlh ;
2006-09-18 11:11:24 +04:00
u32 preferred , valid ;
2005-04-17 02:20:36 +04:00
2018-09-04 22:53:55 +03:00
nlh = nlmsg_put ( skb , args - > portid , args - > seq , args - > event ,
sizeof ( struct ifaddrmsg ) , args - > flags ) ;
2015-03-29 16:00:04 +03:00
if ( ! nlh )
2007-02-01 10:16:40 +03:00
return - EMSGSIZE ;
2006-09-18 11:12:35 +04:00
2006-09-18 11:11:52 +04:00
put_ifaddrmsg ( nlh , ifa - > prefix_len , ifa - > flags , rt_scope ( ifa - > scope ) ,
ifa - > idev - > dev - > ifindex ) ;
2018-09-04 22:53:55 +03:00
if ( args - > netnsid > = 0 & &
nla_put_s32 ( skb , IFA_TARGET_NETNSID , args - > netnsid ) )
2018-09-04 22:53:50 +03:00
goto error ;
2013-12-31 07:04:19 +04:00
if ( ! ( ( ifa - > flags & IFA_F_PERMANENT ) & &
( ifa - > prefered_lft = = INFINITY_LIFE_TIME ) ) ) {
2006-09-18 11:11:24 +04:00
preferred = ifa - > prefered_lft ;
valid = ifa - > valid_lft ;
if ( preferred ! = INFINITY_LIFE_TIME ) {
2005-04-17 02:20:36 +04:00
long tval = ( jiffies - ifa - > tstamp ) / HZ ;
2009-06-25 08:55:50 +04:00
if ( preferred > tval )
preferred - = tval ;
else
preferred = 0 ;
2010-06-26 15:37:47 +04:00
if ( valid ! = INFINITY_LIFE_TIME ) {
if ( valid > tval )
valid - = tval ;
else
valid = 0 ;
}
2005-04-17 02:20:36 +04:00
}
} else {
2006-09-18 11:11:24 +04:00
preferred = INFINITY_LIFE_TIME ;
valid = INFINITY_LIFE_TIME ;
}
2013-05-22 09:41:06 +04:00
if ( ! ipv6_addr_any ( & ifa - > peer_addr ) ) {
2015-03-29 17:59:25 +03:00
if ( nla_put_in6_addr ( skb , IFA_LOCAL , & ifa - > addr ) < 0 | |
nla_put_in6_addr ( skb , IFA_ADDRESS , & ifa - > peer_addr ) < 0 )
2013-05-17 02:32:00 +04:00
goto error ;
} else
2015-03-29 17:59:25 +03:00
if ( nla_put_in6_addr ( skb , IFA_ADDRESS , & ifa - > addr ) < 0 )
2013-05-17 02:32:00 +04:00
goto error ;
2018-05-27 18:09:58 +03:00
if ( ifa - > rt_priority & &
nla_put_u32 ( skb , IFA_RT_PRIORITY , ifa - > rt_priority ) )
goto error ;
2013-05-17 02:32:00 +04:00
if ( put_cacheinfo ( skb , ifa - > cstamp , ifa - > tstamp , preferred , valid ) < 0 )
goto error ;
2005-04-17 02:20:36 +04:00
2013-12-06 12:45:21 +04:00
if ( nla_put_u32 ( skb , IFA_FLAGS , ifa - > flags ) < 0 )
goto error ;
2015-01-17 00:09:00 +03:00
nlmsg_end ( skb , nlh ) ;
return 0 ;
2013-05-17 02:32:00 +04:00
error :
nlmsg_cancel ( skb , nlh ) ;
return - EMSGSIZE ;
2005-04-17 02:20:36 +04:00
}
static int inet6_fill_ifmcaddr ( struct sk_buff * skb , struct ifmcaddr6 * ifmca ,
2018-09-04 22:53:55 +03:00
struct inet6_fill_args * args )
2005-04-17 02:20:36 +04:00
{
struct nlmsghdr * nlh ;
2006-09-18 11:11:52 +04:00
u8 scope = RT_SCOPE_UNIVERSE ;
int ifindex = ifmca - > idev - > dev - > ifindex ;
if ( ipv6_addr_scope ( & ifmca - > mca_addr ) & IFA_SITE )
scope = RT_SCOPE_SITE ;
2005-04-17 02:20:36 +04:00
2018-09-04 22:53:55 +03:00
nlh = nlmsg_put ( skb , args - > portid , args - > seq , args - > event ,
sizeof ( struct ifaddrmsg ) , args - > flags ) ;
2015-03-29 16:00:04 +03:00
if ( ! nlh )
2007-02-01 10:16:40 +03:00
return - EMSGSIZE ;
2006-09-18 11:11:24 +04:00
2018-09-04 22:53:55 +03:00
if ( args - > netnsid > = 0 & &
nla_put_s32 ( skb , IFA_TARGET_NETNSID , args - > netnsid ) )
2018-09-04 22:53:50 +03:00
return - EMSGSIZE ;
2006-09-18 11:12:35 +04:00
put_ifaddrmsg ( nlh , 128 , IFA_F_PERMANENT , scope , ifindex ) ;
2015-03-29 17:59:25 +03:00
if ( nla_put_in6_addr ( skb , IFA_MULTICAST , & ifmca - > mca_addr ) < 0 | |
2006-09-18 11:12:35 +04:00
put_cacheinfo ( skb , ifmca - > mca_cstamp , ifmca - > mca_tstamp ,
2007-02-01 10:16:40 +03:00
INFINITY_LIFE_TIME , INFINITY_LIFE_TIME ) < 0 ) {
nlmsg_cancel ( skb , nlh ) ;
return - EMSGSIZE ;
}
2006-09-18 11:11:24 +04:00
2015-01-17 00:09:00 +03:00
nlmsg_end ( skb , nlh ) ;
return 0 ;
2005-04-17 02:20:36 +04:00
}
static int inet6_fill_ifacaddr ( struct sk_buff * skb , struct ifacaddr6 * ifaca ,
2018-09-04 22:53:55 +03:00
struct inet6_fill_args * args )
2005-04-17 02:20:36 +04:00
{
2018-04-19 01:39:01 +03:00
struct net_device * dev = fib6_info_nh_dev ( ifaca - > aca_rt ) ;
int ifindex = dev ? dev - > ifindex : 1 ;
2005-04-17 02:20:36 +04:00
struct nlmsghdr * nlh ;
2006-09-18 11:11:52 +04:00
u8 scope = RT_SCOPE_UNIVERSE ;
if ( ipv6_addr_scope ( & ifaca - > aca_addr ) & IFA_SITE )
scope = RT_SCOPE_SITE ;
2005-04-17 02:20:36 +04:00
2018-09-04 22:53:55 +03:00
nlh = nlmsg_put ( skb , args - > portid , args - > seq , args - > event ,
sizeof ( struct ifaddrmsg ) , args - > flags ) ;
2015-03-29 16:00:04 +03:00
if ( ! nlh )
2007-02-01 10:16:40 +03:00
return - EMSGSIZE ;
2006-09-18 11:11:24 +04:00
2018-09-04 22:53:55 +03:00
if ( args - > netnsid > = 0 & &
nla_put_s32 ( skb , IFA_TARGET_NETNSID , args - > netnsid ) )
2018-09-04 22:53:50 +03:00
return - EMSGSIZE ;
2006-09-18 11:12:35 +04:00
put_ifaddrmsg ( nlh , 128 , IFA_F_PERMANENT , scope , ifindex ) ;
2015-03-29 17:59:25 +03:00
if ( nla_put_in6_addr ( skb , IFA_ANYCAST , & ifaca - > aca_addr ) < 0 | |
2006-09-18 11:12:35 +04:00
put_cacheinfo ( skb , ifaca - > aca_cstamp , ifaca - > aca_tstamp ,
2007-02-01 10:16:40 +03:00
INFINITY_LIFE_TIME , INFINITY_LIFE_TIME ) < 0 ) {
nlmsg_cancel ( skb , nlh ) ;
return - EMSGSIZE ;
}
2005-04-17 02:20:36 +04:00
2015-01-17 00:09:00 +03:00
nlmsg_end ( skb , nlh ) ;
return 0 ;
2005-04-17 02:20:36 +04:00
}
2009-11-12 07:11:50 +03:00
/* called with rcu_read_lock() */
static int in6_dump_addrs ( struct inet6_dev * idev , struct sk_buff * skb ,
2018-10-19 22:45:28 +03:00
struct netlink_callback * cb , int s_ip_idx ,
2018-10-08 06:16:26 +03:00
struct inet6_fill_args * fillargs )
2009-11-12 07:11:50 +03:00
{
struct ifmcaddr6 * ifmca ;
struct ifacaddr6 * ifaca ;
2018-10-19 22:45:28 +03:00
int ip_idx = 0 ;
2009-11-12 07:11:50 +03:00
int err = 1 ;
read_lock_bh ( & idev - > lock ) ;
2018-10-08 06:16:26 +03:00
switch ( fillargs - > type ) {
2010-03-17 23:31:13 +03:00
case UNICAST_ADDR : {
struct inet6_ifaddr * ifa ;
2018-10-08 06:16:26 +03:00
fillargs - > event = RTM_NEWADDR ;
2010-03-17 23:31:13 +03:00
2009-11-12 07:11:50 +03:00
/* unicast address incl. temp addr */
2010-03-17 23:31:13 +03:00
list_for_each_entry ( ifa , & idev - > addr_list , if_list ) {
2018-10-19 20:00:19 +03:00
if ( ip_idx < s_ip_idx )
goto next ;
2018-10-08 06:16:26 +03:00
err = inet6_fill_ifaddr ( skb , ifa , fillargs ) ;
2015-01-17 00:09:00 +03:00
if ( err < 0 )
2009-11-12 07:11:50 +03:00
break ;
2013-03-22 10:28:43 +04:00
nl_dump_check_consistent ( cb , nlmsg_hdr ( skb ) ) ;
2018-10-19 20:00:19 +03:00
next :
ip_idx + + ;
2009-11-12 07:11:50 +03:00
}
break ;
2010-03-17 23:31:13 +03:00
}
2009-11-12 07:11:50 +03:00
case MULTICAST_ADDR :
2018-10-08 06:16:26 +03:00
fillargs - > event = RTM_GETMULTICAST ;
2018-09-04 22:53:55 +03:00
2009-11-12 07:11:50 +03:00
/* multicast address */
for ( ifmca = idev - > mc_list ; ifmca ;
ifmca = ifmca - > next , ip_idx + + ) {
if ( ip_idx < s_ip_idx )
continue ;
2018-10-08 06:16:26 +03:00
err = inet6_fill_ifmcaddr ( skb , ifmca , fillargs ) ;
2015-01-17 00:09:00 +03:00
if ( err < 0 )
2009-11-12 07:11:50 +03:00
break ;
}
break ;
case ANYCAST_ADDR :
2018-10-08 06:16:26 +03:00
fillargs - > event = RTM_GETANYCAST ;
2009-11-12 07:11:50 +03:00
/* anycast address */
for ( ifaca = idev - > ac_list ; ifaca ;
ifaca = ifaca - > aca_next , ip_idx + + ) {
if ( ip_idx < s_ip_idx )
continue ;
2018-10-08 06:16:26 +03:00
err = inet6_fill_ifacaddr ( skb , ifaca , fillargs ) ;
2015-01-17 00:09:00 +03:00
if ( err < 0 )
2009-11-12 07:11:50 +03:00
break ;
}
break ;
default :
break ;
}
read_unlock_bh ( & idev - > lock ) ;
2018-10-19 22:45:28 +03:00
cb - > args [ 2 ] = ip_idx ;
2009-11-12 07:11:50 +03:00
return err ;
}
2018-10-08 06:16:29 +03:00
static int inet6_valid_dump_ifaddr_req ( const struct nlmsghdr * nlh ,
struct inet6_fill_args * fillargs ,
struct net * * tgt_net , struct sock * sk ,
2018-10-19 22:45:30 +03:00
struct netlink_callback * cb )
2018-10-08 06:16:29 +03:00
{
2018-10-19 22:45:30 +03:00
struct netlink_ext_ack * extack = cb - > extack ;
2018-10-08 06:16:29 +03:00
struct nlattr * tb [ IFA_MAX + 1 ] ;
struct ifaddrmsg * ifm ;
int err , i ;
if ( nlh - > nlmsg_len < nlmsg_msg_size ( sizeof ( * ifm ) ) ) {
NL_SET_ERR_MSG_MOD ( extack , " Invalid header for address dump request " ) ;
return - EINVAL ;
}
ifm = nlmsg_data ( nlh ) ;
if ( ifm - > ifa_prefixlen | | ifm - > ifa_flags | | ifm - > ifa_scope ) {
NL_SET_ERR_MSG_MOD ( extack , " Invalid values in header for address dump request " ) ;
return - EINVAL ;
}
2018-10-19 22:45:30 +03:00
fillargs - > ifindex = ifm - > ifa_index ;
if ( fillargs - > ifindex ) {
cb - > answer_flags | = NLM_F_DUMP_FILTERED ;
fillargs - > flags | = NLM_F_DUMP_FILTERED ;
2018-10-08 06:16:29 +03:00
}
err = nlmsg_parse_strict ( nlh , sizeof ( * ifm ) , tb , IFA_MAX ,
ifa_ipv6_policy , extack ) ;
if ( err < 0 )
return err ;
for ( i = 0 ; i < = IFA_MAX ; + + i ) {
if ( ! tb [ i ] )
continue ;
if ( i = = IFA_TARGET_NETNSID ) {
struct net * net ;
fillargs - > netnsid = nla_get_s32 ( tb [ i ] ) ;
net = rtnl_get_net_ns_capable ( sk , fillargs - > netnsid ) ;
if ( IS_ERR ( net ) ) {
2018-10-25 22:18:25 +03:00
fillargs - > netnsid = - 1 ;
2018-10-08 06:16:29 +03:00
NL_SET_ERR_MSG_MOD ( extack , " Invalid target network namespace id " ) ;
return PTR_ERR ( net ) ;
}
* tgt_net = net ;
} else {
NL_SET_ERR_MSG_MOD ( extack , " Unsupported attribute in dump request " ) ;
return - EINVAL ;
}
}
return 0 ;
}
2005-04-17 02:20:36 +04:00
static int inet6_dump_addr ( struct sk_buff * skb , struct netlink_callback * cb ,
enum addr_type_t type )
{
2018-10-08 06:16:29 +03:00
const struct nlmsghdr * nlh = cb - > nlh ;
2018-10-08 06:16:26 +03:00
struct inet6_fill_args fillargs = {
. portid = NETLINK_CB ( cb - > skb ) . portid ,
. seq = cb - > nlh - > nlmsg_seq ,
. flags = NLM_F_MULTI ,
. netnsid = - 1 ,
. type = type ,
} ;
2009-11-12 07:11:50 +03:00
struct net * net = sock_net ( skb - > sk ) ;
2018-09-04 22:53:50 +03:00
struct net * tgt_net = net ;
2018-10-19 22:45:28 +03:00
int idx , s_idx , s_ip_idx ;
2009-11-12 07:11:50 +03:00
int h , s_h ;
2005-04-17 02:20:36 +04:00
struct net_device * dev ;
2009-11-12 07:11:50 +03:00
struct inet6_dev * idev ;
struct hlist_head * head ;
2018-10-24 22:59:00 +03:00
int err = 0 ;
2007-02-09 17:24:49 +03:00
2009-11-12 07:11:50 +03:00
s_h = cb - > args [ 0 ] ;
s_idx = idx = cb - > args [ 1 ] ;
2018-10-19 22:45:28 +03:00
s_ip_idx = cb - > args [ 2 ] ;
2008-01-22 11:29:40 +03:00
2018-10-08 06:16:29 +03:00
if ( cb - > strict_check ) {
err = inet6_valid_dump_ifaddr_req ( nlh , & fillargs , & tgt_net ,
2018-10-19 22:45:30 +03:00
skb - > sk , cb ) ;
2018-10-08 06:16:29 +03:00
if ( err < 0 )
2018-10-24 22:59:00 +03:00
goto put_tgt_net ;
2018-10-19 22:45:30 +03:00
2018-10-24 22:59:00 +03:00
err = 0 ;
2018-10-19 22:45:30 +03:00
if ( fillargs . ifindex ) {
dev = __dev_get_by_index ( tgt_net , fillargs . ifindex ) ;
2018-10-24 22:59:00 +03:00
if ( ! dev ) {
err = - ENODEV ;
goto put_tgt_net ;
}
2018-10-19 22:45:30 +03:00
idev = __in6_dev_get ( dev ) ;
if ( idev ) {
err = in6_dump_addrs ( idev , skb , cb , s_ip_idx ,
& fillargs ) ;
2019-01-23 01:47:19 +03:00
if ( err > 0 )
err = 0 ;
2018-10-19 22:45:30 +03:00
}
goto put_tgt_net ;
}
2018-09-04 22:53:50 +03:00
}
2009-11-12 07:11:50 +03:00
rcu_read_lock ( ) ;
2018-09-04 22:53:50 +03:00
cb - > seq = atomic_read ( & tgt_net - > ipv6 . dev_addr_genid ) ^ tgt_net - > dev_base_seq ;
2009-11-12 07:11:50 +03:00
for ( h = s_h ; h < NETDEV_HASHENTRIES ; h + + , s_idx = 0 ) {
idx = 0 ;
2018-09-04 22:53:50 +03:00
head = & tgt_net - > dev_index_head [ h ] ;
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 05:06:00 +04:00
hlist_for_each_entry_rcu ( dev , head , index_hlist ) {
2009-11-12 07:11:50 +03:00
if ( idx < s_idx )
goto cont ;
2010-03-27 06:27:49 +03:00
if ( h > s_h | | idx > s_idx )
2009-11-12 07:11:50 +03:00
s_ip_idx = 0 ;
2010-03-21 02:09:01 +03:00
idev = __in6_dev_get ( dev ) ;
if ( ! idev )
2009-11-12 07:11:50 +03:00
goto cont ;
2018-10-19 22:45:28 +03:00
if ( in6_dump_addrs ( idev , skb , cb , s_ip_idx ,
2018-10-08 06:16:26 +03:00
& fillargs ) < 0 )
2009-11-12 07:11:50 +03:00
goto done ;
2007-05-04 02:13:45 +04:00
cont :
2009-11-12 07:11:50 +03:00
idx + + ;
}
2005-04-17 02:20:36 +04:00
}
2009-11-12 07:11:50 +03:00
done :
rcu_read_unlock ( ) ;
cb - > args [ 0 ] = h ;
cb - > args [ 1 ] = idx ;
2018-10-19 22:45:30 +03:00
put_tgt_net :
2018-10-08 06:16:26 +03:00
if ( fillargs . netnsid > = 0 )
2018-09-04 22:53:50 +03:00
put_net ( tgt_net ) ;
2009-11-12 07:11:50 +03:00
2018-12-31 05:10:58 +03:00
return skb - > len ? : err ;
2005-04-17 02:20:36 +04:00
}
static int inet6_dump_ifaddr ( struct sk_buff * skb , struct netlink_callback * cb )
{
enum addr_type_t type = UNICAST_ADDR ;
2007-11-30 16:21:31 +03:00
2005-04-17 02:20:36 +04:00
return inet6_dump_addr ( skb , cb , type ) ;
}
static int inet6_dump_ifmcaddr ( struct sk_buff * skb , struct netlink_callback * cb )
{
enum addr_type_t type = MULTICAST_ADDR ;
2007-11-30 16:21:31 +03:00
2005-04-17 02:20:36 +04:00
return inet6_dump_addr ( skb , cb , type ) ;
}
static int inet6_dump_ifacaddr ( struct sk_buff * skb , struct netlink_callback * cb )
{
enum addr_type_t type = ANYCAST_ADDR ;
2007-11-30 16:21:31 +03:00
2005-04-17 02:20:36 +04:00
return inet6_dump_addr ( skb , cb , type ) ;
}
2019-01-18 21:46:21 +03:00
static int inet6_rtm_valid_getaddr_req ( struct sk_buff * skb ,
const struct nlmsghdr * nlh ,
struct nlattr * * tb ,
struct netlink_ext_ack * extack )
{
struct ifaddrmsg * ifm ;
int i , err ;
if ( nlh - > nlmsg_len < nlmsg_msg_size ( sizeof ( * ifm ) ) ) {
NL_SET_ERR_MSG_MOD ( extack , " Invalid header for get address request " ) ;
return - EINVAL ;
}
ifm = nlmsg_data ( nlh ) ;
if ( ifm - > ifa_prefixlen | | ifm - > ifa_flags | | ifm - > ifa_scope ) {
NL_SET_ERR_MSG_MOD ( extack , " Invalid values in header for get address request " ) ;
return - EINVAL ;
}
if ( ! netlink_strict_get_check ( skb ) )
return nlmsg_parse ( nlh , sizeof ( * ifm ) , tb , IFA_MAX ,
ifa_ipv6_policy , extack ) ;
err = nlmsg_parse_strict ( nlh , sizeof ( * ifm ) , tb , IFA_MAX ,
ifa_ipv6_policy , extack ) ;
if ( err )
return err ;
for ( i = 0 ; i < = IFA_MAX ; i + + ) {
if ( ! tb [ i ] )
continue ;
switch ( i ) {
case IFA_TARGET_NETNSID :
case IFA_ADDRESS :
case IFA_LOCAL :
break ;
default :
NL_SET_ERR_MSG_MOD ( extack , " Unsupported attribute in get address request " ) ;
return - EINVAL ;
}
}
return 0 ;
}
2017-04-16 19:48:24 +03:00
static int inet6_rtm_getaddr ( struct sk_buff * in_skb , struct nlmsghdr * nlh ,
struct netlink_ext_ack * extack )
2006-07-28 13:12:12 +04:00
{
2008-03-25 20:26:21 +03:00
struct net * net = sock_net ( in_skb - > sk ) ;
2018-09-04 22:53:55 +03:00
struct inet6_fill_args fillargs = {
. portid = NETLINK_CB ( in_skb ) . portid ,
. seq = nlh - > nlmsg_seq ,
. event = RTM_NEWADDR ,
. flags = 0 ,
. netnsid = - 1 ,
} ;
2018-09-04 22:53:50 +03:00
struct net * tgt_net = net ;
2006-09-18 11:10:50 +04:00
struct ifaddrmsg * ifm ;
struct nlattr * tb [ IFA_MAX + 1 ] ;
2013-05-17 02:32:00 +04:00
struct in6_addr * addr = NULL , * peer ;
2006-07-28 13:12:12 +04:00
struct net_device * dev = NULL ;
struct inet6_ifaddr * ifa ;
struct sk_buff * skb ;
int err ;
2019-01-18 21:46:21 +03:00
err = inet6_rtm_valid_getaddr_req ( in_skb , nlh , tb , extack ) ;
2006-09-18 11:10:50 +04:00
if ( err < 0 )
2017-10-11 11:28:01 +03:00
return err ;
2006-09-18 11:10:50 +04:00
2018-09-04 22:53:50 +03:00
if ( tb [ IFA_TARGET_NETNSID ] ) {
2018-09-04 22:53:55 +03:00
fillargs . netnsid = nla_get_s32 ( tb [ IFA_TARGET_NETNSID ] ) ;
2018-09-04 22:53:50 +03:00
tgt_net = rtnl_get_net_ns_capable ( NETLINK_CB ( in_skb ) . sk ,
2018-09-04 22:53:55 +03:00
fillargs . netnsid ) ;
2018-09-04 22:53:50 +03:00
if ( IS_ERR ( tgt_net ) )
return PTR_ERR ( tgt_net ) ;
}
2013-05-17 02:32:00 +04:00
addr = extract_addr ( tb [ IFA_ADDRESS ] , tb [ IFA_LOCAL ] , & peer ) ;
2017-10-11 11:28:01 +03:00
if ( ! addr )
return - EINVAL ;
2006-07-28 13:12:12 +04:00
2006-09-18 11:10:50 +04:00
ifm = nlmsg_data ( nlh ) ;
2006-07-28 13:12:12 +04:00
if ( ifm - > ifa_index )
2018-09-04 22:53:50 +03:00
dev = dev_get_by_index ( tgt_net , ifm - > ifa_index ) ;
2006-07-28 13:12:12 +04:00
2018-09-04 22:53:50 +03:00
ifa = ipv6_get_ifaddr ( tgt_net , addr , dev , 1 ) ;
2010-03-21 02:09:01 +03:00
if ( ! ifa ) {
2006-09-18 11:10:50 +04:00
err = - EADDRNOTAVAIL ;
goto errout ;
}
2006-07-28 13:12:12 +04:00
2010-03-21 02:09:01 +03:00
skb = nlmsg_new ( inet6_ifaddr_msgsize ( ) , GFP_KERNEL ) ;
if ( ! skb ) {
2006-07-28 13:12:12 +04:00
err = - ENOBUFS ;
2006-09-18 11:10:50 +04:00
goto errout_ifa ;
2006-07-28 13:12:12 +04:00
}
2018-09-04 22:53:55 +03:00
err = inet6_fill_ifaddr ( skb , ifa , & fillargs ) ;
2007-02-01 10:16:40 +03:00
if ( err < 0 ) {
/* -EMSGSIZE implies BUG in inet6_ifaddr_msgsize() */
WARN_ON ( err = = - EMSGSIZE ) ;
kfree_skb ( skb ) ;
goto errout_ifa ;
}
2018-09-04 22:53:50 +03:00
err = rtnl_unicast ( skb , tgt_net , NETLINK_CB ( in_skb ) . portid ) ;
2006-09-18 11:10:50 +04:00
errout_ifa :
2006-07-28 13:12:12 +04:00
in6_ifa_put ( ifa ) ;
2006-09-18 11:10:50 +04:00
errout :
2017-10-11 11:28:01 +03:00
if ( dev )
dev_put ( dev ) ;
2018-09-04 22:53:55 +03:00
if ( fillargs . netnsid > = 0 )
2018-09-04 22:53:50 +03:00
put_net ( tgt_net ) ;
2006-07-28 13:12:12 +04:00
return err ;
}
2005-04-17 02:20:36 +04:00
static void inet6_ifa_notify ( int event , struct inet6_ifaddr * ifa )
{
struct sk_buff * skb ;
2008-03-25 15:47:49 +03:00
struct net * net = dev_net ( ifa - > idev - > dev ) ;
2018-09-04 22:53:55 +03:00
struct inet6_fill_args fillargs = {
. portid = 0 ,
. seq = 0 ,
. event = event ,
. flags = 0 ,
. netnsid = - 1 ,
} ;
2006-08-15 11:35:02 +04:00
int err = - ENOBUFS ;
2005-04-17 02:20:36 +04:00
2006-09-18 11:12:35 +04:00
skb = nlmsg_new ( inet6_ifaddr_msgsize ( ) , GFP_ATOMIC ) ;
2015-03-29 16:00:04 +03:00
if ( ! skb )
2006-08-15 11:35:02 +04:00
goto errout ;
2018-09-04 22:53:55 +03:00
err = inet6_fill_ifaddr ( skb , ifa , & fillargs ) ;
2007-02-01 10:16:40 +03:00
if ( err < 0 ) {
/* -EMSGSIZE implies BUG in inet6_ifaddr_msgsize() */
WARN_ON ( err = = - EMSGSIZE ) ;
kfree_skb ( skb ) ;
goto errout ;
}
2009-02-25 10:18:28 +03:00
rtnl_notify ( skb , net , 0 , RTNLGRP_IPV6_IFADDR , NULL , GFP_ATOMIC ) ;
return ;
2006-08-15 11:35:02 +04:00
errout :
if ( err < 0 )
2008-03-05 21:47:47 +03:00
rtnl_set_sk_err ( net , RTNLGRP_IPV6_IFADDR , err ) ;
2005-04-17 02:20:36 +04:00
}
2007-03-22 22:27:49 +03:00
static inline void ipv6_store_devconf ( struct ipv6_devconf * cnf ,
2005-04-17 02:20:36 +04:00
__s32 * array , int bytes )
{
2006-11-15 06:53:58 +03:00
BUG_ON ( bytes < ( DEVCONF_MAX * 4 ) ) ;
2005-04-17 02:20:36 +04:00
memset ( array , 0 , bytes ) ;
array [ DEVCONF_FORWARDING ] = cnf - > forwarding ;
array [ DEVCONF_HOPLIMIT ] = cnf - > hop_limit ;
array [ DEVCONF_MTU6 ] = cnf - > mtu6 ;
array [ DEVCONF_ACCEPT_RA ] = cnf - > accept_ra ;
array [ DEVCONF_ACCEPT_REDIRECTS ] = cnf - > accept_redirects ;
array [ DEVCONF_AUTOCONF ] = cnf - > autoconf ;
array [ DEVCONF_DAD_TRANSMITS ] = cnf - > dad_transmits ;
array [ DEVCONF_RTR_SOLICITS ] = cnf - > rtr_solicits ;
2010-11-17 04:44:24 +03:00
array [ DEVCONF_RTR_SOLICIT_INTERVAL ] =
jiffies_to_msecs ( cnf - > rtr_solicit_interval ) ;
2016-09-28 09:57:58 +03:00
array [ DEVCONF_RTR_SOLICIT_MAX_INTERVAL ] =
jiffies_to_msecs ( cnf - > rtr_solicit_max_interval ) ;
2010-11-17 04:44:24 +03:00
array [ DEVCONF_RTR_SOLICIT_DELAY ] =
jiffies_to_msecs ( cnf - > rtr_solicit_delay ) ;
2005-04-17 02:20:36 +04:00
array [ DEVCONF_FORCE_MLD_VERSION ] = cnf - > force_mld_version ;
2013-08-14 03:03:46 +04:00
array [ DEVCONF_MLDV1_UNSOLICITED_REPORT_INTERVAL ] =
jiffies_to_msecs ( cnf - > mldv1_unsolicited_report_interval ) ;
array [ DEVCONF_MLDV2_UNSOLICITED_REPORT_INTERVAL ] =
jiffies_to_msecs ( cnf - > mldv2_unsolicited_report_interval ) ;
2005-04-17 02:20:36 +04:00
array [ DEVCONF_USE_TEMPADDR ] = cnf - > use_tempaddr ;
array [ DEVCONF_TEMP_VALID_LFT ] = cnf - > temp_valid_lft ;
array [ DEVCONF_TEMP_PREFERED_LFT ] = cnf - > temp_prefered_lft ;
array [ DEVCONF_REGEN_MAX_RETRY ] = cnf - > regen_max_retry ;
array [ DEVCONF_MAX_DESYNC_FACTOR ] = cnf - > max_desync_factor ;
array [ DEVCONF_MAX_ADDRESSES ] = cnf - > max_addresses ;
2006-03-21 03:55:08 +03:00
array [ DEVCONF_ACCEPT_RA_DEFRTR ] = cnf - > accept_ra_defrtr ;
2015-07-30 09:28:42 +03:00
array [ DEVCONF_ACCEPT_RA_MIN_HOP_LIMIT ] = cnf - > accept_ra_min_hop_limit ;
2006-03-21 03:55:26 +03:00
array [ DEVCONF_ACCEPT_RA_PINFO ] = cnf - > accept_ra_pinfo ;
2006-03-21 04:05:30 +03:00
# ifdef CONFIG_IPV6_ROUTER_PREF
array [ DEVCONF_ACCEPT_RA_RTR_PREF ] = cnf - > accept_ra_rtr_pref ;
2010-11-17 04:44:24 +03:00
array [ DEVCONF_RTR_PROBE_INTERVAL ] =
jiffies_to_msecs ( cnf - > rtr_probe_interval ) ;
2007-01-31 01:30:10 +03:00
# ifdef CONFIG_IPV6_ROUTE_INFO
2017-03-22 12:19:04 +03:00
array [ DEVCONF_ACCEPT_RA_RT_INFO_MIN_PLEN ] = cnf - > accept_ra_rt_info_min_plen ;
2006-03-21 04:07:03 +03:00
array [ DEVCONF_ACCEPT_RA_RT_INFO_MAX_PLEN ] = cnf - > accept_ra_rt_info_max_plen ;
# endif
2006-03-21 04:05:30 +03:00
# endif
2006-09-23 01:43:49 +04:00
array [ DEVCONF_PROXY_NDP ] = cnf - > proxy_ndp ;
2007-04-25 01:58:30 +04:00
array [ DEVCONF_ACCEPT_SOURCE_ROUTE ] = cnf - > accept_source_route ;
2007-04-26 04:08:10 +04:00
# ifdef CONFIG_IPV6_OPTIMISTIC_DAD
array [ DEVCONF_OPTIMISTIC_DAD ] = cnf - > optimistic_dad ;
net: ipv6: Add a sysctl to make optimistic addresses useful candidates
Add a sysctl that causes an interface's optimistic addresses
to be considered equivalent to other non-deprecated addresses
for source address selection purposes. Preferred addresses
will still take precedence over optimistic addresses, subject
to other ranking in the source address selection algorithm.
This is useful where different interfaces are connected to
different networks from different ISPs (e.g., a cell network
and a home wifi network).
The current behaviour complies with RFC 3484/6724, and it
makes sense if the host has only one interface, or has
multiple interfaces on the same network (same or cooperating
administrative domain(s), but not in the multiple distinct
networks case.
For example, if a mobile device has an IPv6 address on an LTE
network and then connects to IPv6-enabled wifi, while the wifi
IPv6 address is undergoing DAD, IPv6 connections will try use
the wifi default route with the LTE IPv6 address, and will get
stuck until they time out.
Also, because optimistic nodes can receive frames, issue
an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
flag appropriately set). A second RTM_NEWADDR is sent if DAD
completes (the address flags have changed), otherwise an
RTM_DELADDR is sent.
Also: add an entry in ip-sysctl.txt for optimistic_dad.
Signed-off-by: Erik Kline <ek@google.com>
Acked-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-28 12:11:14 +03:00
array [ DEVCONF_USE_OPTIMISTIC ] = cnf - > use_optimistic ;
2007-04-26 04:08:10 +04:00
# endif
2008-04-03 04:22:53 +04:00
# ifdef CONFIG_IPV6_MROUTE
array [ DEVCONF_MC_FORWARDING ] = cnf - > mc_forwarding ;
# endif
2008-06-28 09:17:11 +04:00
array [ DEVCONF_DISABLE_IPV6 ] = cnf - > disable_ipv6 ;
2008-06-28 09:18:38 +04:00
array [ DEVCONF_ACCEPT_DAD ] = cnf - > accept_dad ;
2009-10-09 07:11:14 +04:00
array [ DEVCONF_FORCE_TLLAO ] = cnf - > force_tllao ;
2012-11-06 20:46:20 +04:00
array [ DEVCONF_NDISC_NOTIFY ] = cnf - > ndisc_notify ;
2013-08-27 03:36:51 +04:00
array [ DEVCONF_SUPPRESS_FRAG_NDISC ] = cnf - > suppress_frag_ndisc ;
2014-06-26 01:44:53 +04:00
array [ DEVCONF_ACCEPT_RA_FROM_LOCAL ] = cnf - > accept_ra_from_local ;
2015-01-20 20:06:05 +03:00
array [ DEVCONF_ACCEPT_RA_MTU ] = cnf - > accept_ra_mtu ;
2015-08-13 17:39:01 +03:00
array [ DEVCONF_IGNORE_ROUTES_WITH_LINKDOWN ] = cnf - > ignore_routes_with_linkdown ;
2015-03-24 01:36:00 +03:00
/* we omit DEVCONF_STABLE_SECRET for now */
2015-07-22 10:38:25 +03:00
array [ DEVCONF_USE_OIF_ADDRS_ONLY ] = cnf - > use_oif_addrs_only ;
2016-02-04 15:31:19 +03:00
array [ DEVCONF_DROP_UNICAST_IN_L2_MULTICAST ] = cnf - > drop_unicast_in_l2_multicast ;
2016-02-04 15:31:20 +03:00
array [ DEVCONF_DROP_UNSOLICITED_NA ] = cnf - > drop_unsolicited_na ;
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-24 20:25:37 +03:00
array [ DEVCONF_KEEP_ADDR_ON_DOWN ] = cnf - > keep_addr_on_down ;
2016-11-08 16:57:39 +03:00
array [ DEVCONF_SEG6_ENABLED ] = cnf - > seg6_enabled ;
2016-11-08 16:57:42 +03:00
# ifdef CONFIG_IPV6_SEG6_HMAC
array [ DEVCONF_SEG6_REQUIRE_HMAC ] = cnf - > seg6_require_hmac ;
# endif
2016-12-03 01:00:08 +03:00
array [ DEVCONF_ENHANCED_DAD ] = cnf - > enhanced_dad ;
2017-01-26 06:59:17 +03:00
array [ DEVCONF_ADDR_GEN_MODE ] = cnf - > addr_gen_mode ;
2017-02-23 19:27:18 +03:00
array [ DEVCONF_DISABLE_POLICY ] = cnf - > disable_policy ;
net: ipv6: sysctl to specify IPv6 ND traffic class
Add a per-device sysctl to specify the default traffic class to use for
kernel originated IPv6 Neighbour Discovery packets.
Currently this includes:
- Router Solicitation (ICMPv6 type 133)
ndisc_send_rs() -> ndisc_send_skb() -> ip6_nd_hdr()
- Neighbour Solicitation (ICMPv6 type 135)
ndisc_send_ns() -> ndisc_send_skb() -> ip6_nd_hdr()
- Neighbour Advertisement (ICMPv6 type 136)
ndisc_send_na() -> ndisc_send_skb() -> ip6_nd_hdr()
- Redirect (ICMPv6 type 137)
ndisc_send_redirect() -> ndisc_send_skb() -> ip6_nd_hdr()
and if the kernel ever gets around to generating RA's,
it would presumably also include:
- Router Advertisement (ICMPv6 type 134)
(radvd daemon could pick up on the kernel setting and use it)
Interface drivers may examine the Traffic Class value and translate
the DiffServ Code Point into a link-layer appropriate traffic
prioritization scheme. An example of mapping IETF DSCP values to
IEEE 802.11 User Priority values can be found here:
https://tools.ietf.org/html/draft-ietf-tsvwg-ieee-802-11
The expected primary use case is to properly prioritize ND over wifi.
Testing:
jzem22:~# cat /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
0
jzem22:~# echo -1 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
-bash: echo: write error: Invalid argument
jzem22:~# echo 256 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
-bash: echo: write error: Invalid argument
jzem22:~# echo 0 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
jzem22:~# echo 255 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
jzem22:~# cat /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
255
jzem22:~# echo 34 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
jzem22:~# cat /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
34
jzem22:~# echo $[0xDC] > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
jzem22:~# tcpdump -v -i eth0 icmp6 and src host jzem22.pgc and dst host fe80::1
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
IP6 (class 0xdc, hlim 255, next-header ICMPv6 (58) payload length: 24)
jzem22.pgc > fe80::1: [icmp6 sum ok] ICMP6, neighbor advertisement,
length 24, tgt is jzem22.pgc, Flags [solicited]
(based on original change written by Erik Kline, with minor changes)
v2: fix 'suspicious rcu_dereference_check() usage'
by explicitly grabbing the rcu_read_lock.
Cc: Lorenzo Colitti <lorenzo@google.com>
Signed-off-by: Erik Kline <ek@google.com>
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-11-08 08:52:09 +03:00
array [ DEVCONF_NDISC_TCLASS ] = cnf - > ndisc_tclass ;
2005-04-17 02:20:36 +04:00
}
2010-11-16 07:33:57 +03:00
static inline size_t inet6_ifla6_size ( void )
{
return nla_total_size ( 4 ) /* IFLA_INET6_FLAGS */
+ nla_total_size ( sizeof ( struct ifla_cacheinfo ) )
+ nla_total_size ( DEVCONF_MAX * 4 ) /* IFLA_INET6_CONF */
+ nla_total_size ( IPSTATS_MIB_MAX * 8 ) /* IFLA_INET6_STATS */
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 08:01:30 +04:00
+ nla_total_size ( ICMP6_MIB_MAX * 8 ) /* IFLA_INET6_ICMP6STATS */
2018-07-09 13:25:16 +03:00
+ nla_total_size ( sizeof ( struct in6_addr ) ) /* IFLA_INET6_TOKEN */
+ nla_total_size ( 1 ) /* IFLA_INET6_ADDR_GEN_MODE */
+ 0 ;
2010-11-16 07:33:57 +03:00
}
2006-11-11 01:10:15 +03:00
static inline size_t inet6_if_nlmsg_size ( void )
{
return NLMSG_ALIGN ( sizeof ( struct ifinfomsg ) )
+ nla_total_size ( IFNAMSIZ ) /* IFLA_IFNAME */
+ nla_total_size ( MAX_ADDR_LEN ) /* IFLA_ADDRESS */
+ nla_total_size ( 4 ) /* IFLA_MTU */
+ nla_total_size ( 4 ) /* IFLA_LINK */
2015-08-13 22:26:35 +03:00
+ nla_total_size ( 1 ) /* IFLA_OPERSTATE */
2010-11-16 07:33:57 +03:00
+ nla_total_size ( inet6_ifla6_size ( ) ) ; /* IFLA_PROTINFO */
2006-11-11 01:10:15 +03:00
}
2006-06-18 09:48:48 +04:00
2011-05-19 05:14:23 +04:00
static inline void __snmp6_fill_statsdev ( u64 * stats , atomic_long_t * mib ,
2016-09-30 06:29:03 +03:00
int bytes )
2007-04-25 08:54:09 +04:00
{
int i ;
2016-09-30 06:29:03 +03:00
int pad = bytes - sizeof ( u64 ) * ICMP6_MIB_MAX ;
2007-04-25 08:54:09 +04:00
BUG_ON ( pad < 0 ) ;
/* Use put_unaligned() because stats may not be aligned for u64. */
2016-09-30 06:29:03 +03:00
put_unaligned ( ICMP6_MIB_MAX , & stats [ 0 ] ) ;
for ( i = 1 ; i < ICMP6_MIB_MAX ; i + + )
2011-05-19 05:14:23 +04:00
put_unaligned ( atomic_long_read ( & mib [ i ] ) , & stats [ i ] ) ;
2007-04-25 08:54:09 +04:00
2016-09-30 06:29:03 +03:00
memset ( & stats [ ICMP6_MIB_MAX ] , 0 , pad ) ;
2007-04-25 08:54:09 +04:00
}
2014-05-06 02:55:55 +04:00
static inline void __snmp6_fill_stats64 ( u64 * stats , void __percpu * mib ,
2015-08-30 08:59:42 +03:00
int bytes , size_t syncpoff )
2010-07-01 00:31:19 +04:00
{
2015-08-30 08:59:42 +03:00
int i , c ;
u64 buff [ IPSTATS_MIB_MAX ] ;
int pad = bytes - sizeof ( u64 ) * IPSTATS_MIB_MAX ;
2010-07-01 00:31:19 +04:00
BUG_ON ( pad < 0 ) ;
2015-08-30 08:59:42 +03:00
memset ( buff , 0 , sizeof ( buff ) ) ;
buff [ 0 ] = IPSTATS_MIB_MAX ;
2010-07-01 00:31:19 +04:00
2015-08-30 08:59:42 +03:00
for_each_possible_cpu ( c ) {
for ( i = 1 ; i < IPSTATS_MIB_MAX ; i + + )
buff [ i ] + = snmp_get_cpu_field64 ( mib , c , i , syncpoff ) ;
}
memcpy ( stats , buff , IPSTATS_MIB_MAX * sizeof ( u64 ) ) ;
memset ( & stats [ IPSTATS_MIB_MAX ] , 0 , pad ) ;
2010-07-01 00:31:19 +04:00
}
2007-04-25 08:54:09 +04:00
static void snmp6_fill_stats ( u64 * stats , struct inet6_dev * idev , int attrtype ,
int bytes )
{
2010-03-21 02:09:01 +03:00
switch ( attrtype ) {
2007-04-25 08:54:09 +04:00
case IFLA_INET6_STATS :
2015-08-30 08:59:42 +03:00
__snmp6_fill_stats64 ( stats , idev - > stats . ipv6 , bytes ,
offsetof ( struct ipstats_mib , syncp ) ) ;
2007-04-25 08:54:09 +04:00
break ;
case IFLA_INET6_ICMP6STATS :
2016-09-30 06:29:03 +03:00
__snmp6_fill_statsdev ( stats , idev - > stats . icmpv6dev - > mibs , bytes ) ;
2007-04-25 08:54:09 +04:00
break ;
}
}
2015-09-11 23:48:48 +03:00
static int inet6_fill_ifla6_attrs ( struct sk_buff * skb , struct inet6_dev * idev ,
u32 ext_filter_mask )
2010-11-16 07:33:57 +03:00
{
struct nlattr * nla ;
struct ifla_cacheinfo ci ;
2012-04-02 04:27:33 +04:00
if ( nla_put_u32 ( skb , IFLA_INET6_FLAGS , idev - > if_flags ) )
goto nla_put_failure ;
2010-11-16 07:33:57 +03:00
ci . max_reasm_len = IPV6_MAXPLEN ;
2010-11-20 00:13:47 +03:00
ci . tstamp = cstamp_delta ( idev - > tstamp ) ;
ci . reachable_time = jiffies_to_msecs ( idev - > nd_parms - > reachable_time ) ;
2013-12-07 22:26:53 +04:00
ci . retrans_time = jiffies_to_msecs ( NEIGH_VAR ( idev - > nd_parms , RETRANS_TIME ) ) ;
2012-04-02 04:27:33 +04:00
if ( nla_put ( skb , IFLA_INET6_CACHEINFO , sizeof ( ci ) , & ci ) )
goto nla_put_failure ;
2010-11-16 07:33:57 +03:00
nla = nla_reserve ( skb , IFLA_INET6_CONF , DEVCONF_MAX * sizeof ( s32 ) ) ;
2015-03-29 16:00:04 +03:00
if ( ! nla )
2010-11-16 07:33:57 +03:00
goto nla_put_failure ;
ipv6_store_devconf ( & idev - > cnf , nla_data ( nla ) , nla_len ( nla ) ) ;
/* XXX - MC not implemented */
2015-09-11 23:48:48 +03:00
if ( ext_filter_mask & RTEXT_FILTER_SKIP_STATS )
return 0 ;
2010-11-16 07:33:57 +03:00
nla = nla_reserve ( skb , IFLA_INET6_STATS , IPSTATS_MIB_MAX * sizeof ( u64 ) ) ;
2015-03-29 16:00:04 +03:00
if ( ! nla )
2010-11-16 07:33:57 +03:00
goto nla_put_failure ;
snmp6_fill_stats ( nla_data ( nla ) , idev , IFLA_INET6_STATS , nla_len ( nla ) ) ;
nla = nla_reserve ( skb , IFLA_INET6_ICMP6STATS , ICMP6_MIB_MAX * sizeof ( u64 ) ) ;
2015-03-29 16:00:04 +03:00
if ( ! nla )
2010-11-16 07:33:57 +03:00
goto nla_put_failure ;
snmp6_fill_stats ( nla_data ( nla ) , idev , IFLA_INET6_ICMP6STATS , nla_len ( nla ) ) ;
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 08:01:30 +04:00
nla = nla_reserve ( skb , IFLA_INET6_TOKEN , sizeof ( struct in6_addr ) ) ;
2015-03-29 16:00:04 +03:00
if ( ! nla )
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 08:01:30 +04:00
goto nla_put_failure ;
2014-07-11 23:10:18 +04:00
2017-01-26 06:59:17 +03:00
if ( nla_put_u8 ( skb , IFLA_INET6_ADDR_GEN_MODE , idev - > cnf . addr_gen_mode ) )
2014-07-11 23:10:18 +04:00
goto nla_put_failure ;
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 08:01:30 +04:00
read_lock_bh ( & idev - > lock ) ;
memcpy ( nla_data ( nla ) , idev - > token . s6_addr , nla_len ( nla ) ) ;
read_unlock_bh ( & idev - > lock ) ;
2010-11-16 07:33:57 +03:00
return 0 ;
nla_put_failure :
return - EMSGSIZE ;
}
2015-10-19 19:23:28 +03:00
static size_t inet6_get_link_af_size ( const struct net_device * dev ,
u32 ext_filter_mask )
2010-11-16 07:33:57 +03:00
{
if ( ! __in6_dev_get ( dev ) )
return 0 ;
return inet6_ifla6_size ( ) ;
}
2015-09-11 23:48:48 +03:00
static int inet6_fill_link_af ( struct sk_buff * skb , const struct net_device * dev ,
u32 ext_filter_mask )
2010-11-16 07:33:57 +03:00
{
struct inet6_dev * idev = __in6_dev_get ( dev ) ;
if ( ! idev )
return - ENODATA ;
2015-09-11 23:48:48 +03:00
if ( inet6_fill_ifla6_attrs ( skb , idev , ext_filter_mask ) < 0 )
2010-11-16 07:33:57 +03:00
return - EMSGSIZE ;
return 0 ;
}
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 08:01:30 +04:00
static int inet6_set_iftoken ( struct inet6_dev * idev , struct in6_addr * token )
{
struct inet6_ifaddr * ifp ;
struct net_device * dev = idev - > dev ;
2016-04-08 16:55:00 +03:00
bool clear_token , update_rs = false ;
2013-06-24 23:42:40 +04:00
struct in6_addr ll_addr ;
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 08:01:30 +04:00
2014-03-27 21:28:07 +04:00
ASSERT_RTNL ( ) ;
2015-03-29 16:00:04 +03:00
if ( ! token )
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 08:01:30 +04:00
return - EINVAL ;
if ( dev - > flags & ( IFF_LOOPBACK | IFF_NOARP ) )
return - EINVAL ;
if ( ! ipv6_accept_ra ( idev ) )
return - EINVAL ;
2016-09-28 09:57:58 +03:00
if ( idev - > cnf . rtr_solicits = = 0 )
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 08:01:30 +04:00
return - EINVAL ;
write_lock_bh ( & idev - > lock ) ;
BUILD_BUG_ON ( sizeof ( token - > s6_addr ) ! = 16 ) ;
memcpy ( idev - > token . s6_addr + 8 , token - > s6_addr + 8 , 8 ) ;
write_unlock_bh ( & idev - > lock ) ;
2016-04-08 16:55:00 +03:00
clear_token = ipv6_addr_any ( token ) ;
if ( clear_token )
goto update_lft ;
2013-06-24 23:42:40 +04:00
if ( ! idev - > dead & & ( idev - > if_flags & IF_READY ) & &
! ipv6_get_lladdr ( dev , & ll_addr , IFA_F_TENTATIVE |
IFA_F_OPTIMISTIC ) ) {
2013-04-09 07:47:15 +04:00
/* If we're not ready, then normal ifup will take care
* of this . Otherwise , we need to request our rs here .
*/
ndisc_send_rs ( dev , & ll_addr , & in6addr_linklocal_allrouters ) ;
update_rs = true ;
}
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 08:01:30 +04:00
2016-04-08 16:55:00 +03:00
update_lft :
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 08:01:30 +04:00
write_lock_bh ( & idev - > lock ) ;
2013-04-09 07:47:15 +04:00
2013-06-26 05:41:49 +04:00
if ( update_rs ) {
2013-04-09 07:47:15 +04:00
idev - > if_flags | = IF_RS_SENT ;
2016-09-28 09:57:58 +03:00
idev - > rs_interval = rfc3315_s14_backoff_init (
idev - > cnf . rtr_solicit_interval ) ;
2013-06-26 05:41:49 +04:00
idev - > rs_probes = 1 ;
2016-09-28 09:57:58 +03:00
addrconf_mod_rs_timer ( idev , idev - > rs_interval ) ;
2013-06-26 05:41:49 +04:00
}
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 08:01:30 +04:00
/* Well, that's kinda nasty ... */
list_for_each_entry ( ifp , & idev - > addr_list , if_list ) {
spin_lock ( & ifp - > lock ) ;
2013-04-09 07:47:16 +04:00
if ( ifp - > tokenized ) {
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 08:01:30 +04:00
ifp - > valid_lft = 0 ;
ifp - > prefered_lft = 0 ;
}
spin_unlock ( & ifp - > lock ) ;
}
write_unlock_bh ( & idev - > lock ) ;
2014-10-27 19:39:16 +03:00
inet6_ifinfo_notify ( RTM_NEWLINK , idev ) ;
2014-03-27 21:28:07 +04:00
addrconf_verify_rtnl ( ) ;
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 08:01:30 +04:00
return 0 ;
}
2015-02-05 16:39:11 +03:00
static const struct nla_policy inet6_af_policy [ IFLA_INET6_MAX + 1 ] = {
[ IFLA_INET6_ADDR_GEN_MODE ] = { . type = NLA_U8 } ,
[ IFLA_INET6_TOKEN ] = { . len = sizeof ( struct in6_addr ) } ,
} ;
static int inet6_validate_link_af ( const struct net_device * dev ,
const struct nlattr * nla )
{
struct nlattr * tb [ IFLA_INET6_MAX + 1 ] ;
if ( dev & & ! __in6_dev_get ( dev ) )
return - EAFNOSUPPORT ;
2017-04-12 15:34:07 +03:00
return nla_parse_nested ( tb , IFLA_INET6_MAX , nla , inet6_af_policy ,
NULL ) ;
2015-02-05 16:39:11 +03:00
}
2017-01-26 06:59:17 +03:00
static int check_addr_gen_mode ( int mode )
{
if ( mode ! = IN6_ADDR_GEN_MODE_EUI64 & &
mode ! = IN6_ADDR_GEN_MODE_NONE & &
mode ! = IN6_ADDR_GEN_MODE_STABLE_PRIVACY & &
mode ! = IN6_ADDR_GEN_MODE_RANDOM )
return - EINVAL ;
return 1 ;
}
static int check_stable_privacy ( struct inet6_dev * idev , struct net * net ,
int mode )
{
if ( mode = = IN6_ADDR_GEN_MODE_STABLE_PRIVACY & &
! idev - > cnf . stable_secret . initialized & &
! net - > ipv6 . devconf_dflt - > stable_secret . initialized )
return - EINVAL ;
return 1 ;
}
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 08:01:30 +04:00
static int inet6_set_link_af ( struct net_device * dev , const struct nlattr * nla )
{
int err = - EINVAL ;
struct inet6_dev * idev = __in6_dev_get ( dev ) ;
struct nlattr * tb [ IFLA_INET6_MAX + 1 ] ;
if ( ! idev )
return - EAFNOSUPPORT ;
2017-04-12 15:34:07 +03:00
if ( nla_parse_nested ( tb , IFLA_INET6_MAX , nla , NULL , NULL ) < 0 )
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 08:01:30 +04:00
BUG ( ) ;
2014-07-11 23:10:18 +04:00
if ( tb [ IFLA_INET6_TOKEN ] ) {
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 08:01:30 +04:00
err = inet6_set_iftoken ( idev , nla_data ( tb [ IFLA_INET6_TOKEN ] ) ) ;
2014-07-11 23:10:18 +04:00
if ( err )
return err ;
}
if ( tb [ IFLA_INET6_ADDR_GEN_MODE ] ) {
u8 mode = nla_get_u8 ( tb [ IFLA_INET6_ADDR_GEN_MODE ] ) ;
2017-01-26 06:59:17 +03:00
if ( check_addr_gen_mode ( mode ) < 0 | |
check_stable_privacy ( idev , dev_net ( dev ) , mode ) < 0 )
2014-07-11 23:10:18 +04:00
return - EINVAL ;
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 01:36:01 +03:00
2017-01-26 06:59:17 +03:00
idev - > cnf . addr_gen_mode = mode ;
2014-07-11 23:10:18 +04:00
err = 0 ;
}
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 08:01:30 +04:00
return err ;
}
2007-02-09 17:24:49 +03:00
static int inet6_fill_ifinfo ( struct sk_buff * skb , struct inet6_dev * idev ,
2012-09-08 00:12:54 +04:00
u32 portid , u32 seq , int event , unsigned int flags )
2005-04-17 02:20:36 +04:00
{
2006-11-15 06:53:58 +03:00
struct net_device * dev = idev - > dev ;
struct ifinfomsg * hdr ;
struct nlmsghdr * nlh ;
void * protoinfo ;
2012-09-08 00:12:54 +04:00
nlh = nlmsg_put ( skb , portid , seq , event , sizeof ( * hdr ) , flags ) ;
2015-03-29 16:00:04 +03:00
if ( ! nlh )
2007-02-01 10:16:40 +03:00
return - EMSGSIZE ;
2006-11-15 06:53:58 +03:00
hdr = nlmsg_data ( nlh ) ;
hdr - > ifi_family = AF_INET6 ;
hdr - > __ifi_pad = 0 ;
hdr - > ifi_type = dev - > type ;
hdr - > ifi_index = dev - > ifindex ;
hdr - > ifi_flags = dev_get_flags ( dev ) ;
hdr - > ifi_change = 0 ;
2012-04-02 04:27:33 +04:00
if ( nla_put_string ( skb , IFLA_IFNAME , dev - > name ) | |
( dev - > addr_len & &
nla_put ( skb , IFLA_ADDRESS , dev - > addr_len , dev - > dev_addr ) ) | |
nla_put_u32 ( skb , IFLA_MTU , dev - > mtu ) | |
2015-04-02 18:07:00 +03:00
( dev - > ifindex ! = dev_get_iflink ( dev ) & &
2015-08-13 22:26:35 +03:00
nla_put_u32 ( skb , IFLA_LINK , dev_get_iflink ( dev ) ) ) | |
nla_put_u8 ( skb , IFLA_OPERSTATE ,
netif_running ( dev ) ? dev - > operstate : IF_OPER_DOWN ) )
2012-04-02 04:27:33 +04:00
goto nla_put_failure ;
2006-11-15 06:53:58 +03:00
protoinfo = nla_nest_start ( skb , IFLA_PROTINFO ) ;
2015-03-29 16:00:04 +03:00
if ( ! protoinfo )
2006-11-15 06:53:58 +03:00
goto nla_put_failure ;
2005-04-17 02:20:36 +04:00
2015-09-11 23:48:48 +03:00
if ( inet6_fill_ifla6_attrs ( skb , idev , 0 ) < 0 )
2007-04-21 02:56:20 +04:00
goto nla_put_failure ;
2005-04-17 02:20:36 +04:00
2006-11-15 06:53:58 +03:00
nla_nest_end ( skb , protoinfo ) ;
2015-01-17 00:09:00 +03:00
nlmsg_end ( skb , nlh ) ;
return 0 ;
2005-04-17 02:20:36 +04:00
2006-11-15 06:53:58 +03:00
nla_put_failure :
2007-02-01 10:16:40 +03:00
nlmsg_cancel ( skb , nlh ) ;
return - EMSGSIZE ;
2005-04-17 02:20:36 +04:00
}
2018-10-08 06:16:33 +03:00
static int inet6_valid_dump_ifinfo ( const struct nlmsghdr * nlh ,
struct netlink_ext_ack * extack )
{
struct ifinfomsg * ifm ;
if ( nlh - > nlmsg_len < nlmsg_msg_size ( sizeof ( * ifm ) ) ) {
NL_SET_ERR_MSG_MOD ( extack , " Invalid header for link dump request " ) ;
return - EINVAL ;
}
if ( nlmsg_attrlen ( nlh , sizeof ( * ifm ) ) ) {
NL_SET_ERR_MSG_MOD ( extack , " Invalid data after header " ) ;
return - EINVAL ;
}
ifm = nlmsg_data ( nlh ) ;
if ( ifm - > __ifi_pad | | ifm - > ifi_type | | ifm - > ifi_flags | |
ifm - > ifi_change | | ifm - > ifi_index ) {
NL_SET_ERR_MSG_MOD ( extack , " Invalid values in header for dump request " ) ;
return - EINVAL ;
}
return 0 ;
}
2005-04-17 02:20:36 +04:00
static int inet6_dump_ifinfo ( struct sk_buff * skb , struct netlink_callback * cb )
{
2008-03-25 20:26:21 +03:00
struct net * net = sock_net ( skb - > sk ) ;
2009-11-09 15:11:28 +03:00
int h , s_h ;
2009-11-12 05:53:00 +03:00
int idx = 0 , s_idx ;
2005-04-17 02:20:36 +04:00
struct net_device * dev ;
struct inet6_dev * idev ;
2009-11-09 15:11:28 +03:00
struct hlist_head * head ;
2005-04-17 02:20:36 +04:00
2018-10-08 06:16:33 +03:00
/* only requests using strict checking can pass data to
* influence the dump
*/
if ( cb - > strict_check ) {
int err = inet6_valid_dump_ifinfo ( cb - > nlh , cb - > extack ) ;
if ( err < 0 )
return err ;
}
2009-11-09 15:11:28 +03:00
s_h = cb - > args [ 0 ] ;
s_idx = cb - > args [ 1 ] ;
rcu_read_lock ( ) ;
for ( h = s_h ; h < NETDEV_HASHENTRIES ; h + + , s_idx = 0 ) {
idx = 0 ;
head = & net - > dev_index_head [ h ] ;
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 05:06:00 +04:00
hlist_for_each_entry_rcu ( dev , head , index_hlist ) {
2009-11-09 15:11:28 +03:00
if ( idx < s_idx )
goto cont ;
idev = __in6_dev_get ( dev ) ;
if ( ! idev )
goto cont ;
if ( inet6_fill_ifinfo ( skb , idev ,
2012-09-08 00:12:54 +04:00
NETLINK_CB ( cb - > skb ) . portid ,
2009-11-09 15:11:28 +03:00
cb - > nlh - > nlmsg_seq ,
2015-01-17 00:09:00 +03:00
RTM_NEWLINK , NLM_F_MULTI ) < 0 )
2009-11-09 15:11:28 +03:00
goto out ;
2007-05-04 02:13:45 +04:00
cont :
2009-11-09 15:11:28 +03:00
idx + + ;
}
2005-04-17 02:20:36 +04:00
}
2009-11-09 15:11:28 +03:00
out :
rcu_read_unlock ( ) ;
cb - > args [ 1 ] = idx ;
cb - > args [ 0 ] = h ;
2005-04-17 02:20:36 +04:00
return skb - > len ;
}
void inet6_ifinfo_notify ( int event , struct inet6_dev * idev )
{
struct sk_buff * skb ;
2008-03-25 15:47:49 +03:00
struct net * net = dev_net ( idev - > dev ) ;
2006-08-15 11:35:47 +04:00
int err = - ENOBUFS ;
2007-02-09 17:24:49 +03:00
2006-11-11 01:10:15 +03:00
skb = nlmsg_new ( inet6_if_nlmsg_size ( ) , GFP_ATOMIC ) ;
2015-03-29 16:00:04 +03:00
if ( ! skb )
2006-08-15 11:35:47 +04:00
goto errout ;
err = inet6_fill_ifinfo ( skb , idev , 0 , 0 , event , 0 ) ;
2007-02-01 10:16:40 +03:00
if ( err < 0 ) {
/* -EMSGSIZE implies BUG in inet6_if_nlmsg_size() */
WARN_ON ( err = = - EMSGSIZE ) ;
kfree_skb ( skb ) ;
goto errout ;
}
2010-12-08 02:38:31 +03:00
rtnl_notify ( skb , net , 0 , RTNLGRP_IPV6_IFINFO , NULL , GFP_ATOMIC ) ;
2009-02-25 10:18:28 +03:00
return ;
2006-08-15 11:35:47 +04:00
errout :
if ( err < 0 )
2010-12-08 02:38:31 +03:00
rtnl_set_sk_err ( net , RTNLGRP_IPV6_IFINFO , err ) ;
2005-04-17 02:20:36 +04:00
}
2006-11-11 01:10:15 +03:00
static inline size_t inet6_prefix_nlmsg_size ( void )
{
return NLMSG_ALIGN ( sizeof ( struct prefixmsg ) )
+ nla_total_size ( sizeof ( struct in6_addr ) )
+ nla_total_size ( sizeof ( struct prefix_cacheinfo ) ) ;
}
2006-06-18 09:48:48 +04:00
2005-04-17 02:20:36 +04:00
static int inet6_fill_prefix ( struct sk_buff * skb , struct inet6_dev * idev ,
2012-09-08 00:12:54 +04:00
struct prefix_info * pinfo , u32 portid , u32 seq ,
2006-11-15 06:54:19 +03:00
int event , unsigned int flags )
2005-04-17 02:20:36 +04:00
{
2006-11-15 06:54:19 +03:00
struct prefixmsg * pmsg ;
struct nlmsghdr * nlh ;
2005-04-17 02:20:36 +04:00
struct prefix_cacheinfo ci ;
2012-09-08 00:12:54 +04:00
nlh = nlmsg_put ( skb , portid , seq , event , sizeof ( * pmsg ) , flags ) ;
2015-03-29 16:00:04 +03:00
if ( ! nlh )
2007-02-01 10:16:40 +03:00
return - EMSGSIZE ;
2006-11-15 06:54:19 +03:00
pmsg = nlmsg_data ( nlh ) ;
2005-04-17 02:20:36 +04:00
pmsg - > prefix_family = AF_INET6 ;
2005-06-28 23:56:45 +04:00
pmsg - > prefix_pad1 = 0 ;
pmsg - > prefix_pad2 = 0 ;
2005-04-17 02:20:36 +04:00
pmsg - > prefix_ifindex = idev - > dev - > ifindex ;
pmsg - > prefix_len = pinfo - > prefix_len ;
pmsg - > prefix_type = pinfo - > type ;
2005-06-28 23:56:45 +04:00
pmsg - > prefix_pad3 = 0 ;
2005-04-17 02:20:36 +04:00
pmsg - > prefix_flags = 0 ;
if ( pinfo - > onlink )
pmsg - > prefix_flags | = IF_PREFIX_ONLINK ;
if ( pinfo - > autoconf )
pmsg - > prefix_flags | = IF_PREFIX_AUTOCONF ;
2012-04-02 04:27:33 +04:00
if ( nla_put ( skb , PREFIX_ADDRESS , sizeof ( pinfo - > prefix ) , & pinfo - > prefix ) )
goto nla_put_failure ;
2005-04-17 02:20:36 +04:00
ci . preferred_time = ntohl ( pinfo - > prefered ) ;
ci . valid_time = ntohl ( pinfo - > valid ) ;
2012-04-02 04:27:33 +04:00
if ( nla_put ( skb , PREFIX_CACHEINFO , sizeof ( ci ) , & ci ) )
goto nla_put_failure ;
2015-01-17 00:09:00 +03:00
nlmsg_end ( skb , nlh ) ;
return 0 ;
2005-04-17 02:20:36 +04:00
2006-11-15 06:54:19 +03:00
nla_put_failure :
2007-02-01 10:16:40 +03:00
nlmsg_cancel ( skb , nlh ) ;
return - EMSGSIZE ;
2005-04-17 02:20:36 +04:00
}
2007-02-09 17:24:49 +03:00
static void inet6_prefix_notify ( int event , struct inet6_dev * idev ,
2005-04-17 02:20:36 +04:00
struct prefix_info * pinfo )
{
struct sk_buff * skb ;
2008-03-25 15:47:49 +03:00
struct net * net = dev_net ( idev - > dev ) ;
2006-08-15 11:36:07 +04:00
int err = - ENOBUFS ;
2005-04-17 02:20:36 +04:00
2006-11-11 01:10:15 +03:00
skb = nlmsg_new ( inet6_prefix_nlmsg_size ( ) , GFP_ATOMIC ) ;
2015-03-29 16:00:04 +03:00
if ( ! skb )
2006-08-15 11:36:07 +04:00
goto errout ;
err = inet6_fill_prefix ( skb , idev , pinfo , 0 , 0 , event , 0 ) ;
2007-02-01 10:16:40 +03:00
if ( err < 0 ) {
/* -EMSGSIZE implies BUG in inet6_prefix_nlmsg_size() */
WARN_ON ( err = = - EMSGSIZE ) ;
kfree_skb ( skb ) ;
goto errout ;
}
2009-02-25 10:18:28 +03:00
rtnl_notify ( skb , net , 0 , RTNLGRP_IPV6_PREFIX , NULL , GFP_ATOMIC ) ;
return ;
2006-08-15 11:36:07 +04:00
errout :
if ( err < 0 )
2008-03-05 21:47:47 +03:00
rtnl_set_sk_err ( net , RTNLGRP_IPV6_PREFIX , err ) ;
2005-04-17 02:20:36 +04:00
}
static void __ipv6_ifa_notify ( int event , struct inet6_ifaddr * ifp )
{
2013-03-22 10:28:43 +04:00
struct net * net = dev_net ( ifp - > idev - > dev ) ;
2014-03-27 21:28:07 +04:00
if ( event )
ASSERT_RTNL ( ) ;
2005-04-17 02:20:36 +04:00
inet6_ifa_notify ( event ? : RTM_NEWADDR , ifp ) ;
switch ( event ) {
case RTM_NEWADDR :
2007-04-26 04:08:10 +04:00
/*
* If the address was optimistic
* we inserted the route at the start of
* our DAD process , so we don ' t need
* to do it again
*/
2018-04-19 01:38:59 +03:00
if ( ! rcu_access_pointer ( ifp - > rt - > fib6_node ) )
2018-04-18 03:33:11 +03:00
ip6_ins_rt ( net , ifp - > rt ) ;
2005-04-17 02:20:36 +04:00
if ( ifp - > idev - > cnf . forwarding )
addrconf_join_anycast ( ifp ) ;
2013-05-22 09:41:06 +04:00
if ( ! ipv6_addr_any ( & ifp - > peer_addr ) )
2018-05-27 18:09:58 +03:00
addrconf_prefix_route ( & ifp - > peer_addr , 128 , 0 ,
2018-04-18 03:33:22 +03:00
ifp - > idev - > dev , 0 , 0 ,
2018-04-19 01:39:06 +03:00
GFP_ATOMIC ) ;
2005-04-17 02:20:36 +04:00
break ;
case RTM_DELADDR :
if ( ifp - > idev - > cnf . forwarding )
addrconf_leave_anycast ( ifp ) ;
addrconf_leave_solict ( ifp - > idev , & ifp - > addr ) ;
2013-05-22 09:41:06 +04:00
if ( ! ipv6_addr_any ( & ifp - > peer_addr ) ) {
2018-04-18 03:33:26 +03:00
struct fib6_info * rt ;
2013-05-17 02:32:00 +04:00
2014-09-04 01:59:22 +04:00
rt = addrconf_get_prefix_route ( & ifp - > peer_addr , 128 ,
ifp - > idev - > dev , 0 , 0 ) ;
2015-09-16 00:30:08 +03:00
if ( rt )
2018-04-18 03:33:11 +03:00
ip6_del_rt ( net , rt ) ;
2013-05-17 02:32:00 +04:00
}
2016-04-22 06:56:12 +03:00
if ( ifp - > rt ) {
2018-04-18 03:33:25 +03:00
ip6_del_rt ( net , ifp - > rt ) ;
ifp - > rt = NULL ;
2016-04-22 06:56:12 +03:00
}
2014-09-28 02:46:06 +04:00
rt_genid_bump_ipv6 ( net ) ;
2005-04-17 02:20:36 +04:00
break ;
}
2013-03-22 10:28:43 +04:00
atomic_inc ( & net - > ipv6 . dev_addr_genid ) ;
2005-04-17 02:20:36 +04:00
}
static void ipv6_ifa_notify ( int event , struct inet6_ifaddr * ifp )
{
2006-09-23 01:44:24 +04:00
rcu_read_lock_bh ( ) ;
2005-04-17 02:20:36 +04:00
if ( likely ( ifp - > idev - > dead = = 0 ) )
__ipv6_ifa_notify ( event , ifp ) ;
2006-09-23 01:44:24 +04:00
rcu_read_unlock_bh ( ) ;
2005-04-17 02:20:36 +04:00
}
# ifdef CONFIG_SYSCTL
static
2013-06-12 10:04:25 +04:00
int addrconf_sysctl_forward ( struct ctl_table * ctl , int write ,
2005-04-17 02:20:36 +04:00
void __user * buffer , size_t * lenp , loff_t * ppos )
{
int * valp = ctl - > data ;
int val = * valp ;
2010-02-19 16:22:59 +03:00
loff_t pos = * ppos ;
2013-06-12 10:04:25 +04:00
struct ctl_table lctl ;
2005-04-17 02:20:36 +04:00
int ret ;
2012-01-16 14:40:10 +04:00
/*
* ctl - > data points to idev - > cnf . forwarding , we should
* not modify it until we get the rtnl lock .
*/
lctl = * ctl ;
lctl . data = & val ;
ret = proc_dointvec ( & lctl , write , buffer , lenp , ppos ) ;
2005-04-17 02:20:36 +04:00
2007-12-05 12:50:24 +03:00
if ( write )
2009-02-26 09:55:31 +03:00
ret = addrconf_fixup_forwarding ( ctl , valp , val ) ;
2010-02-19 16:22:59 +03:00
if ( ret )
* ppos = pos ;
2007-02-09 17:24:49 +03:00
return ret ;
2005-04-17 02:20:36 +04:00
}
2015-02-23 17:17:13 +03:00
static
int addrconf_sysctl_mtu ( struct ctl_table * ctl , int write ,
void __user * buffer , size_t * lenp , loff_t * ppos )
{
struct inet6_dev * idev = ctl - > extra1 ;
int min_mtu = IPV6_MIN_MTU ;
struct ctl_table lctl ;
lctl = * ctl ;
lctl . extra1 = & min_mtu ;
lctl . extra2 = idev ? & idev - > dev - > mtu : NULL ;
return proc_dointvec_minmax ( & lctl , write , buffer , lenp , ppos ) ;
}
2009-06-01 14:07:33 +04:00
static void dev_disable_change ( struct inet6_dev * idev )
{
2013-05-29 07:30:50 +04:00
struct netdev_notifier_info info ;
2009-06-01 14:07:33 +04:00
if ( ! idev | | ! idev - > dev )
return ;
2013-05-29 07:30:50 +04:00
netdev_notifier_info_init ( & info , idev - > dev ) ;
2009-06-01 14:07:33 +04:00
if ( idev - > cnf . disable_ipv6 )
2013-05-29 07:30:50 +04:00
addrconf_notify ( NULL , NETDEV_DOWN , & info ) ;
2009-06-01 14:07:33 +04:00
else
2013-05-29 07:30:50 +04:00
addrconf_notify ( NULL , NETDEV_UP , & info ) ;
2009-06-01 14:07:33 +04:00
}
static void addrconf_disable_change ( struct net * net , __s32 newf )
{
struct net_device * dev ;
struct inet6_dev * idev ;
2017-01-19 11:26:21 +03:00
for_each_netdev ( net , dev ) {
2009-06-01 14:07:33 +04:00
idev = __in6_dev_get ( dev ) ;
if ( idev ) {
int changed = ( ! idev - > cnf . disable_ipv6 ) ^ ( ! newf ) ;
idev - > cnf . disable_ipv6 = newf ;
if ( changed )
dev_disable_change ( idev ) ;
}
}
}
2012-01-16 14:40:10 +04:00
static int addrconf_disable_ipv6 ( struct ctl_table * table , int * p , int newf )
2009-06-01 14:07:33 +04:00
{
struct net * net ;
2012-01-16 14:40:10 +04:00
int old ;
if ( ! rtnl_trylock ( ) )
return restart_syscall ( ) ;
2009-06-01 14:07:33 +04:00
net = ( struct net * ) table - > extra2 ;
2012-01-16 14:40:10 +04:00
old = * p ;
* p = newf ;
2009-06-01 14:07:33 +04:00
2012-01-16 14:40:10 +04:00
if ( p = = & net - > ipv6 . devconf_dflt - > disable_ipv6 ) {
rtnl_unlock ( ) ;
2009-06-01 14:07:33 +04:00
return 0 ;
2010-02-19 16:22:59 +03:00
}
2009-06-01 14:07:33 +04:00
if ( p = = & net - > ipv6 . devconf_all - > disable_ipv6 ) {
net - > ipv6 . devconf_dflt - > disable_ipv6 = newf ;
addrconf_disable_change ( net , newf ) ;
2012-01-16 14:40:10 +04:00
} else if ( ( ! newf ) ^ ( ! old ) )
2009-06-01 14:07:33 +04:00
dev_disable_change ( ( struct inet6_dev * ) table - > extra1 ) ;
rtnl_unlock ( ) ;
return 0 ;
}
static
2013-06-12 10:04:25 +04:00
int addrconf_sysctl_disable ( struct ctl_table * ctl , int write ,
2009-06-01 14:07:33 +04:00
void __user * buffer , size_t * lenp , loff_t * ppos )
{
int * valp = ctl - > data ;
int val = * valp ;
2010-02-19 16:22:59 +03:00
loff_t pos = * ppos ;
2013-06-12 10:04:25 +04:00
struct ctl_table lctl ;
2009-06-01 14:07:33 +04:00
int ret ;
2012-01-16 14:40:10 +04:00
/*
* ctl - > data points to idev - > cnf . disable_ipv6 , we should
* not modify it until we get the rtnl lock .
*/
lctl = * ctl ;
lctl . data = & val ;
ret = proc_dointvec ( & lctl , write , buffer , lenp , ppos ) ;
2009-06-01 14:07:33 +04:00
if ( write )
ret = addrconf_disable_ipv6 ( ctl , valp , val ) ;
2010-02-19 16:22:59 +03:00
if ( ret )
* ppos = pos ;
2009-06-01 14:07:33 +04:00
return ret ;
}
2013-12-18 10:37:14 +04:00
static
int addrconf_sysctl_proxy_ndp ( struct ctl_table * ctl , int write ,
void __user * buffer , size_t * lenp , loff_t * ppos )
{
int * valp = ctl - > data ;
int ret ;
int old , new ;
old = * valp ;
ret = proc_dointvec ( ctl , write , buffer , lenp , ppos ) ;
new = * valp ;
if ( write & & old ! = new ) {
struct net * net = ctl - > extra2 ;
if ( ! rtnl_trylock ( ) )
return restart_syscall ( ) ;
if ( valp = = & net - > ipv6 . devconf_dflt - > proxy_ndp )
2017-03-29 00:28:04 +03:00
inet6_netconf_notify_devconf ( net , RTM_NEWNETCONF ,
NETCONFA_PROXY_NEIGH ,
2013-12-18 10:37:14 +04:00
NETCONFA_IFINDEX_DEFAULT ,
net - > ipv6 . devconf_dflt ) ;
else if ( valp = = & net - > ipv6 . devconf_all - > proxy_ndp )
2017-03-29 00:28:04 +03:00
inet6_netconf_notify_devconf ( net , RTM_NEWNETCONF ,
NETCONFA_PROXY_NEIGH ,
2013-12-18 10:37:14 +04:00
NETCONFA_IFINDEX_ALL ,
net - > ipv6 . devconf_all ) ;
else {
struct inet6_dev * idev = ctl - > extra1 ;
2017-03-29 00:28:04 +03:00
inet6_netconf_notify_devconf ( net , RTM_NEWNETCONF ,
NETCONFA_PROXY_NEIGH ,
2013-12-18 10:37:14 +04:00
idev - > dev - > ifindex ,
& idev - > cnf ) ;
}
rtnl_unlock ( ) ;
}
return ret ;
}
2017-01-26 06:59:17 +03:00
static int addrconf_sysctl_addr_gen_mode ( struct ctl_table * ctl , int write ,
void __user * buffer , size_t * lenp ,
loff_t * ppos )
{
int ret = 0 ;
net/ipv6: fix addrconf_sysctl_addr_gen_mode
addrconf_sysctl_addr_gen_mode() has multiple problems. First, it ignores
the errors returned by proc_dointvec().
addrconf_sysctl_addr_gen_mode() calls proc_dointvec() directly, which
writes the value to memory, and then checks if it's valid and may return
EINVAL. If a bad value is given, the value displayed when reading
net.ipv6.conf.foo.addr_gen_mode next time will be invalid. In case the
value provided by the user was valid, addrconf_dev_config() won't be
called since idev->cnf.addr_gen_mode has already been updated.
Fix this in the usual way we deal with values that need to be checked
after the proc_do*() helper has returned: define a local ctl_table and
storage, call proc_dointvec() on that temporary area, then check and
store.
addrconf_sysctl_addr_gen_mode() also writes the new value to the global
ipv6_devconf_dflt, when we're writing to some netns's default, so that
new netns will inherit the value that was set by the change occuring in
any netns. That doesn't make any sense, so let's drop this assignment.
Finally, since addr_gen_mode is a __u32, switch to proc_douintvec().
Fixes: d35a00b8e33d ("net/ipv6: allow sysctl to change link-local address generation mode")
Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
Reviewed-by: David Ahern <dsahern@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-07-09 13:25:14 +03:00
u32 new_val ;
2017-01-26 06:59:17 +03:00
struct inet6_dev * idev = ( struct inet6_dev * ) ctl - > extra1 ;
struct net * net = ( struct net * ) ctl - > extra2 ;
net/ipv6: fix addrconf_sysctl_addr_gen_mode
addrconf_sysctl_addr_gen_mode() has multiple problems. First, it ignores
the errors returned by proc_dointvec().
addrconf_sysctl_addr_gen_mode() calls proc_dointvec() directly, which
writes the value to memory, and then checks if it's valid and may return
EINVAL. If a bad value is given, the value displayed when reading
net.ipv6.conf.foo.addr_gen_mode next time will be invalid. In case the
value provided by the user was valid, addrconf_dev_config() won't be
called since idev->cnf.addr_gen_mode has already been updated.
Fix this in the usual way we deal with values that need to be checked
after the proc_do*() helper has returned: define a local ctl_table and
storage, call proc_dointvec() on that temporary area, then check and
store.
addrconf_sysctl_addr_gen_mode() also writes the new value to the global
ipv6_devconf_dflt, when we're writing to some netns's default, so that
new netns will inherit the value that was set by the change occuring in
any netns. That doesn't make any sense, so let's drop this assignment.
Finally, since addr_gen_mode is a __u32, switch to proc_douintvec().
Fixes: d35a00b8e33d ("net/ipv6: allow sysctl to change link-local address generation mode")
Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
Reviewed-by: David Ahern <dsahern@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-07-09 13:25:14 +03:00
struct ctl_table tmp = {
. data = & new_val ,
. maxlen = sizeof ( new_val ) ,
. mode = ctl - > mode ,
} ;
2017-01-26 06:59:17 +03:00
2017-02-27 02:41:23 +03:00
if ( ! rtnl_trylock ( ) )
return restart_syscall ( ) ;
net/ipv6: fix addrconf_sysctl_addr_gen_mode
addrconf_sysctl_addr_gen_mode() has multiple problems. First, it ignores
the errors returned by proc_dointvec().
addrconf_sysctl_addr_gen_mode() calls proc_dointvec() directly, which
writes the value to memory, and then checks if it's valid and may return
EINVAL. If a bad value is given, the value displayed when reading
net.ipv6.conf.foo.addr_gen_mode next time will be invalid. In case the
value provided by the user was valid, addrconf_dev_config() won't be
called since idev->cnf.addr_gen_mode has already been updated.
Fix this in the usual way we deal with values that need to be checked
after the proc_do*() helper has returned: define a local ctl_table and
storage, call proc_dointvec() on that temporary area, then check and
store.
addrconf_sysctl_addr_gen_mode() also writes the new value to the global
ipv6_devconf_dflt, when we're writing to some netns's default, so that
new netns will inherit the value that was set by the change occuring in
any netns. That doesn't make any sense, so let's drop this assignment.
Finally, since addr_gen_mode is a __u32, switch to proc_douintvec().
Fixes: d35a00b8e33d ("net/ipv6: allow sysctl to change link-local address generation mode")
Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
Reviewed-by: David Ahern <dsahern@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-07-09 13:25:14 +03:00
new_val = * ( ( u32 * ) ctl - > data ) ;
2017-01-26 06:59:17 +03:00
net/ipv6: fix addrconf_sysctl_addr_gen_mode
addrconf_sysctl_addr_gen_mode() has multiple problems. First, it ignores
the errors returned by proc_dointvec().
addrconf_sysctl_addr_gen_mode() calls proc_dointvec() directly, which
writes the value to memory, and then checks if it's valid and may return
EINVAL. If a bad value is given, the value displayed when reading
net.ipv6.conf.foo.addr_gen_mode next time will be invalid. In case the
value provided by the user was valid, addrconf_dev_config() won't be
called since idev->cnf.addr_gen_mode has already been updated.
Fix this in the usual way we deal with values that need to be checked
after the proc_do*() helper has returned: define a local ctl_table and
storage, call proc_dointvec() on that temporary area, then check and
store.
addrconf_sysctl_addr_gen_mode() also writes the new value to the global
ipv6_devconf_dflt, when we're writing to some netns's default, so that
new netns will inherit the value that was set by the change occuring in
any netns. That doesn't make any sense, so let's drop this assignment.
Finally, since addr_gen_mode is a __u32, switch to proc_douintvec().
Fixes: d35a00b8e33d ("net/ipv6: allow sysctl to change link-local address generation mode")
Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
Reviewed-by: David Ahern <dsahern@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-07-09 13:25:14 +03:00
ret = proc_douintvec ( & tmp , write , buffer , lenp , ppos ) ;
if ( ret ! = 0 )
goto out ;
2017-01-26 06:59:17 +03:00
net/ipv6: fix addrconf_sysctl_addr_gen_mode
addrconf_sysctl_addr_gen_mode() has multiple problems. First, it ignores
the errors returned by proc_dointvec().
addrconf_sysctl_addr_gen_mode() calls proc_dointvec() directly, which
writes the value to memory, and then checks if it's valid and may return
EINVAL. If a bad value is given, the value displayed when reading
net.ipv6.conf.foo.addr_gen_mode next time will be invalid. In case the
value provided by the user was valid, addrconf_dev_config() won't be
called since idev->cnf.addr_gen_mode has already been updated.
Fix this in the usual way we deal with values that need to be checked
after the proc_do*() helper has returned: define a local ctl_table and
storage, call proc_dointvec() on that temporary area, then check and
store.
addrconf_sysctl_addr_gen_mode() also writes the new value to the global
ipv6_devconf_dflt, when we're writing to some netns's default, so that
new netns will inherit the value that was set by the change occuring in
any netns. That doesn't make any sense, so let's drop this assignment.
Finally, since addr_gen_mode is a __u32, switch to proc_douintvec().
Fixes: d35a00b8e33d ("net/ipv6: allow sysctl to change link-local address generation mode")
Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
Reviewed-by: David Ahern <dsahern@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-07-09 13:25:14 +03:00
if ( write ) {
2017-02-27 02:41:23 +03:00
if ( check_addr_gen_mode ( new_val ) < 0 ) {
ret = - EINVAL ;
goto out ;
}
2017-01-26 06:59:17 +03:00
net/ipv6: fix addrconf_sysctl_addr_gen_mode
addrconf_sysctl_addr_gen_mode() has multiple problems. First, it ignores
the errors returned by proc_dointvec().
addrconf_sysctl_addr_gen_mode() calls proc_dointvec() directly, which
writes the value to memory, and then checks if it's valid and may return
EINVAL. If a bad value is given, the value displayed when reading
net.ipv6.conf.foo.addr_gen_mode next time will be invalid. In case the
value provided by the user was valid, addrconf_dev_config() won't be
called since idev->cnf.addr_gen_mode has already been updated.
Fix this in the usual way we deal with values that need to be checked
after the proc_do*() helper has returned: define a local ctl_table and
storage, call proc_dointvec() on that temporary area, then check and
store.
addrconf_sysctl_addr_gen_mode() also writes the new value to the global
ipv6_devconf_dflt, when we're writing to some netns's default, so that
new netns will inherit the value that was set by the change occuring in
any netns. That doesn't make any sense, so let's drop this assignment.
Finally, since addr_gen_mode is a __u32, switch to proc_douintvec().
Fixes: d35a00b8e33d ("net/ipv6: allow sysctl to change link-local address generation mode")
Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
Reviewed-by: David Ahern <dsahern@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-07-09 13:25:14 +03:00
if ( idev ) {
2017-02-27 02:41:23 +03:00
if ( check_stable_privacy ( idev , net , new_val ) < 0 ) {
ret = - EINVAL ;
goto out ;
}
2017-01-26 06:59:17 +03:00
if ( idev - > cnf . addr_gen_mode ! = new_val ) {
idev - > cnf . addr_gen_mode = new_val ;
addrconf_dev_config ( idev - > dev ) ;
}
2018-07-09 13:25:17 +03:00
} else if ( & net - > ipv6 . devconf_all - > addr_gen_mode = = ctl - > data ) {
struct net_device * dev ;
net - > ipv6 . devconf_dflt - > addr_gen_mode = new_val ;
for_each_netdev ( net , dev ) {
idev = __in6_dev_get ( dev ) ;
if ( idev & &
idev - > cnf . addr_gen_mode ! = new_val ) {
idev - > cnf . addr_gen_mode = new_val ;
addrconf_dev_config ( idev - > dev ) ;
}
}
2017-01-26 06:59:17 +03:00
}
net/ipv6: fix addrconf_sysctl_addr_gen_mode
addrconf_sysctl_addr_gen_mode() has multiple problems. First, it ignores
the errors returned by proc_dointvec().
addrconf_sysctl_addr_gen_mode() calls proc_dointvec() directly, which
writes the value to memory, and then checks if it's valid and may return
EINVAL. If a bad value is given, the value displayed when reading
net.ipv6.conf.foo.addr_gen_mode next time will be invalid. In case the
value provided by the user was valid, addrconf_dev_config() won't be
called since idev->cnf.addr_gen_mode has already been updated.
Fix this in the usual way we deal with values that need to be checked
after the proc_do*() helper has returned: define a local ctl_table and
storage, call proc_dointvec() on that temporary area, then check and
store.
addrconf_sysctl_addr_gen_mode() also writes the new value to the global
ipv6_devconf_dflt, when we're writing to some netns's default, so that
new netns will inherit the value that was set by the change occuring in
any netns. That doesn't make any sense, so let's drop this assignment.
Finally, since addr_gen_mode is a __u32, switch to proc_douintvec().
Fixes: d35a00b8e33d ("net/ipv6: allow sysctl to change link-local address generation mode")
Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
Reviewed-by: David Ahern <dsahern@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-07-09 13:25:14 +03:00
* ( ( u32 * ) ctl - > data ) = new_val ;
2017-01-26 06:59:17 +03:00
}
2017-02-27 02:41:23 +03:00
out :
rtnl_unlock ( ) ;
2017-01-26 06:59:17 +03:00
return ret ;
}
2015-03-24 01:36:00 +03:00
static int addrconf_sysctl_stable_secret ( struct ctl_table * ctl , int write ,
void __user * buffer , size_t * lenp ,
loff_t * ppos )
{
int err ;
struct in6_addr addr ;
char str [ IPV6_MAX_STRLEN ] ;
struct ctl_table lctl = * ctl ;
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 01:36:01 +03:00
struct net * net = ctl - > extra2 ;
2015-03-24 01:36:00 +03:00
struct ipv6_stable_secret * secret = ctl - > data ;
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 01:36:01 +03:00
if ( & net - > ipv6 . devconf_all - > stable_secret = = ctl - > data )
return - EIO ;
2015-03-24 01:36:00 +03:00
lctl . maxlen = IPV6_MAX_STRLEN ;
lctl . data = str ;
if ( ! rtnl_trylock ( ) )
return restart_syscall ( ) ;
if ( ! write & & ! secret - > initialized ) {
err = - EIO ;
goto out ;
}
2015-12-21 21:55:45 +03:00
err = snprintf ( str , sizeof ( str ) , " %pI6 " , & secret - > secret ) ;
if ( err > = sizeof ( str ) ) {
err = - EIO ;
goto out ;
2015-03-24 01:36:00 +03:00
}
err = proc_dostring ( & lctl , write , buffer , lenp , ppos ) ;
if ( err | | ! write )
goto out ;
if ( in6_pton ( str , - 1 , addr . in6_u . u6_addr8 , - 1 , NULL ) ! = 1 ) {
err = - EIO ;
goto out ;
}
secret - > initialized = true ;
secret - > secret = addr ;
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 01:36:01 +03:00
if ( & net - > ipv6 . devconf_dflt - > stable_secret = = ctl - > data ) {
struct net_device * dev ;
for_each_netdev ( net , dev ) {
struct inet6_dev * idev = __in6_dev_get ( dev ) ;
if ( idev ) {
2017-01-26 06:59:17 +03:00
idev - > cnf . addr_gen_mode =
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 01:36:01 +03:00
IN6_ADDR_GEN_MODE_STABLE_PRIVACY ;
}
}
} else {
struct inet6_dev * idev = ctl - > extra1 ;
2017-01-26 06:59:17 +03:00
idev - > cnf . addr_gen_mode = IN6_ADDR_GEN_MODE_STABLE_PRIVACY ;
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 01:36:01 +03:00
}
2015-03-24 01:36:00 +03:00
out :
rtnl_unlock ( ) ;
return err ;
}
2013-12-18 10:37:14 +04:00
2015-08-13 17:39:01 +03:00
static
int addrconf_sysctl_ignore_routes_with_linkdown ( struct ctl_table * ctl ,
int write ,
void __user * buffer ,
size_t * lenp ,
loff_t * ppos )
{
int * valp = ctl - > data ;
int val = * valp ;
loff_t pos = * ppos ;
struct ctl_table lctl ;
int ret ;
/* ctl->data points to idev->cnf.ignore_routes_when_linkdown
* we should not modify it until we get the rtnl lock .
*/
lctl = * ctl ;
lctl . data = & val ;
ret = proc_dointvec ( & lctl , write , buffer , lenp , ppos ) ;
if ( write )
ret = addrconf_fixup_linkdown ( ctl , valp , val ) ;
if ( ret )
* ppos = pos ;
return ret ;
}
2017-02-23 19:27:18 +03:00
static
void addrconf_set_nopolicy ( struct rt6_info * rt , int action )
{
if ( rt ) {
if ( action )
rt - > dst . flags | = DST_NOPOLICY ;
else
rt - > dst . flags & = ~ DST_NOPOLICY ;
}
}
static
void addrconf_disable_policy_idev ( struct inet6_dev * idev , int val )
{
struct inet6_ifaddr * ifa ;
read_lock_bh ( & idev - > lock ) ;
list_for_each_entry ( ifa , & idev - > addr_list , if_list ) {
spin_lock ( & ifa - > lock ) ;
if ( ifa - > rt ) {
2018-04-18 03:33:26 +03:00
struct fib6_info * rt = ifa - > rt ;
2017-02-23 19:27:18 +03:00
int cpu ;
ipv6: replace rwlock with rcu and spinlock in fib6_table
With all the preparation work before, we are now ready to replace rwlock
with rcu and spinlock in fib6_table.
That means now all fib6_node in fib6_table are protected by rcu. And
when freeing fib6_node, call_rcu() is used to wait for the rcu grace
period before releasing the memory.
When accessing fib6_node, corresponding rcu APIs need to be used.
And all previous sessions protected by the write lock will now be
protected by the spin lock per table.
All previous sessions protected by read lock will now be protected by
rcu_read_lock().
A couple of things to note here:
1. As part of the work of replacing rwlock with rcu, the linked list of
fn->leaf now has to be rcu protected as well. So both fn->leaf and
rt->dst.rt6_next are now __rcu tagged and corresponding rcu APIs are
used when manipulating them.
2. For fn->rr_ptr, first of all, it also needs to be rcu protected now
and is tagged with __rcu and rcu APIs are used in corresponding places.
Secondly, fn->rr_ptr is changed in rt6_select() which is a reader
thread. This makes the issue a bit complicated. We think a valid
solution for it is to let rt6_select() grab the tb6_lock if it decides
to change it. As it is not in the normal operation and only happens when
there is no valid neighbor cache for the route, we think the performance
impact should be low.
3. fib6_walk_continue() has to be called with tb6_lock held even in the
route dumping related functions, e.g. inet6_dump_fib(),
fib6_tables_dump() and ipv6_route_seq_ops. It is because
fib6_walk_continue() makes modifications to the walker structure, and so
are fib6_repair_tree() and fib6_del_route(). In order to do proper
syncing between them, we need to let fib6_walk_continue() hold the lock.
We may be able to do further improvement on the way we do the tree walk
to get rid of the need for holding the spin lock. But not for now.
4. When fib6_del_route() removes a route from the tree, we no longer
mark rt->dst.rt6_next to NULL to make simultaneous reader be able to
further traverse the list with rcu. However, rt->dst.rt6_next is only
valid within this same rcu period. No one should access it later.
5. All the operation of atomic_inc(rt->rt6i_ref) is changed to be
performed before we publish this route (either by linking it to fn->leaf
or insert it in the list pointed by fn->leaf) just to be safe because as
soon as we publish the route, some read thread will be able to access it.
Signed-off-by: Wei Wang <weiwan@google.com>
Signed-off-by: Martin KaFai Lau <kafai@fb.com>
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-10-06 22:06:10 +03:00
rcu_read_lock ( ) ;
2018-04-18 03:33:20 +03:00
ifa - > rt - > dst_nopolicy = val ? true : false ;
2017-02-23 19:27:18 +03:00
if ( rt - > rt6i_pcpu ) {
for_each_possible_cpu ( cpu ) {
struct rt6_info * * rtp ;
rtp = per_cpu_ptr ( rt - > rt6i_pcpu , cpu ) ;
addrconf_set_nopolicy ( * rtp , val ) ;
}
}
ipv6: replace rwlock with rcu and spinlock in fib6_table
With all the preparation work before, we are now ready to replace rwlock
with rcu and spinlock in fib6_table.
That means now all fib6_node in fib6_table are protected by rcu. And
when freeing fib6_node, call_rcu() is used to wait for the rcu grace
period before releasing the memory.
When accessing fib6_node, corresponding rcu APIs need to be used.
And all previous sessions protected by the write lock will now be
protected by the spin lock per table.
All previous sessions protected by read lock will now be protected by
rcu_read_lock().
A couple of things to note here:
1. As part of the work of replacing rwlock with rcu, the linked list of
fn->leaf now has to be rcu protected as well. So both fn->leaf and
rt->dst.rt6_next are now __rcu tagged and corresponding rcu APIs are
used when manipulating them.
2. For fn->rr_ptr, first of all, it also needs to be rcu protected now
and is tagged with __rcu and rcu APIs are used in corresponding places.
Secondly, fn->rr_ptr is changed in rt6_select() which is a reader
thread. This makes the issue a bit complicated. We think a valid
solution for it is to let rt6_select() grab the tb6_lock if it decides
to change it. As it is not in the normal operation and only happens when
there is no valid neighbor cache for the route, we think the performance
impact should be low.
3. fib6_walk_continue() has to be called with tb6_lock held even in the
route dumping related functions, e.g. inet6_dump_fib(),
fib6_tables_dump() and ipv6_route_seq_ops. It is because
fib6_walk_continue() makes modifications to the walker structure, and so
are fib6_repair_tree() and fib6_del_route(). In order to do proper
syncing between them, we need to let fib6_walk_continue() hold the lock.
We may be able to do further improvement on the way we do the tree walk
to get rid of the need for holding the spin lock. But not for now.
4. When fib6_del_route() removes a route from the tree, we no longer
mark rt->dst.rt6_next to NULL to make simultaneous reader be able to
further traverse the list with rcu. However, rt->dst.rt6_next is only
valid within this same rcu period. No one should access it later.
5. All the operation of atomic_inc(rt->rt6i_ref) is changed to be
performed before we publish this route (either by linking it to fn->leaf
or insert it in the list pointed by fn->leaf) just to be safe because as
soon as we publish the route, some read thread will be able to access it.
Signed-off-by: Wei Wang <weiwan@google.com>
Signed-off-by: Martin KaFai Lau <kafai@fb.com>
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-10-06 22:06:10 +03:00
rcu_read_unlock ( ) ;
2017-02-23 19:27:18 +03:00
}
spin_unlock ( & ifa - > lock ) ;
}
read_unlock_bh ( & idev - > lock ) ;
}
static
int addrconf_disable_policy ( struct ctl_table * ctl , int * valp , int val )
{
struct inet6_dev * idev ;
struct net * net ;
if ( ! rtnl_trylock ( ) )
return restart_syscall ( ) ;
* valp = val ;
net = ( struct net * ) ctl - > extra2 ;
if ( valp = = & net - > ipv6 . devconf_dflt - > disable_policy ) {
rtnl_unlock ( ) ;
return 0 ;
}
if ( valp = = & net - > ipv6 . devconf_all - > disable_policy ) {
struct net_device * dev ;
for_each_netdev ( net , dev ) {
idev = __in6_dev_get ( dev ) ;
if ( idev )
addrconf_disable_policy_idev ( idev , val ) ;
}
} else {
idev = ( struct inet6_dev * ) ctl - > extra1 ;
addrconf_disable_policy_idev ( idev , val ) ;
}
rtnl_unlock ( ) ;
return 0 ;
}
static
int addrconf_sysctl_disable_policy ( struct ctl_table * ctl , int write ,
void __user * buffer , size_t * lenp ,
loff_t * ppos )
{
int * valp = ctl - > data ;
int val = * valp ;
loff_t pos = * ppos ;
struct ctl_table lctl ;
int ret ;
lctl = * ctl ;
lctl . data = & val ;
ret = proc_dointvec ( & lctl , write , buffer , lenp , ppos ) ;
if ( write & & ( * valp ! = val ) )
ret = addrconf_disable_policy ( ctl , valp , val ) ;
if ( ret )
* ppos = pos ;
return ret ;
}
2016-10-07 11:00:49 +03:00
static int minus_one = - 1 ;
net: ipv6: sysctl to specify IPv6 ND traffic class
Add a per-device sysctl to specify the default traffic class to use for
kernel originated IPv6 Neighbour Discovery packets.
Currently this includes:
- Router Solicitation (ICMPv6 type 133)
ndisc_send_rs() -> ndisc_send_skb() -> ip6_nd_hdr()
- Neighbour Solicitation (ICMPv6 type 135)
ndisc_send_ns() -> ndisc_send_skb() -> ip6_nd_hdr()
- Neighbour Advertisement (ICMPv6 type 136)
ndisc_send_na() -> ndisc_send_skb() -> ip6_nd_hdr()
- Redirect (ICMPv6 type 137)
ndisc_send_redirect() -> ndisc_send_skb() -> ip6_nd_hdr()
and if the kernel ever gets around to generating RA's,
it would presumably also include:
- Router Advertisement (ICMPv6 type 134)
(radvd daemon could pick up on the kernel setting and use it)
Interface drivers may examine the Traffic Class value and translate
the DiffServ Code Point into a link-layer appropriate traffic
prioritization scheme. An example of mapping IETF DSCP values to
IEEE 802.11 User Priority values can be found here:
https://tools.ietf.org/html/draft-ietf-tsvwg-ieee-802-11
The expected primary use case is to properly prioritize ND over wifi.
Testing:
jzem22:~# cat /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
0
jzem22:~# echo -1 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
-bash: echo: write error: Invalid argument
jzem22:~# echo 256 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
-bash: echo: write error: Invalid argument
jzem22:~# echo 0 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
jzem22:~# echo 255 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
jzem22:~# cat /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
255
jzem22:~# echo 34 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
jzem22:~# cat /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
34
jzem22:~# echo $[0xDC] > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
jzem22:~# tcpdump -v -i eth0 icmp6 and src host jzem22.pgc and dst host fe80::1
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
IP6 (class 0xdc, hlim 255, next-header ICMPv6 (58) payload length: 24)
jzem22.pgc > fe80::1: [icmp6 sum ok] ICMP6, neighbor advertisement,
length 24, tgt is jzem22.pgc, Flags [solicited]
(based on original change written by Erik Kline, with minor changes)
v2: fix 'suspicious rcu_dereference_check() usage'
by explicitly grabbing the rcu_read_lock.
Cc: Lorenzo Colitti <lorenzo@google.com>
Signed-off-by: Erik Kline <ek@google.com>
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-11-08 08:52:09 +03:00
static const int zero = 0 ;
2016-09-29 10:33:43 +03:00
static const int one = 1 ;
static const int two_five_five = 255 ;
2016-04-18 14:41:10 +03:00
static const struct ctl_table addrconf_sysctl [ ] = {
2016-04-18 14:41:17 +03:00
{
. procname = " forwarding " ,
. data = & ipv6_devconf . forwarding ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = addrconf_sysctl_forward ,
} ,
{
. procname = " hop_limit " ,
. data = & ipv6_devconf . hop_limit ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
2016-09-29 10:33:43 +03:00
. proc_handler = proc_dointvec_minmax ,
. extra1 = ( void * ) & one ,
. extra2 = ( void * ) & two_five_five ,
2016-04-18 14:41:17 +03:00
} ,
{
. procname = " mtu " ,
. data = & ipv6_devconf . mtu6 ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = addrconf_sysctl_mtu ,
} ,
{
. procname = " accept_ra " ,
. data = & ipv6_devconf . accept_ra ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
{
. procname = " accept_redirects " ,
. data = & ipv6_devconf . accept_redirects ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
{
. procname = " autoconf " ,
. data = & ipv6_devconf . autoconf ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
{
. procname = " dad_transmits " ,
. data = & ipv6_devconf . dad_transmits ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
{
. procname = " router_solicitations " ,
. data = & ipv6_devconf . rtr_solicits ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
2016-10-07 11:00:49 +03:00
. proc_handler = proc_dointvec_minmax ,
. extra1 = & minus_one ,
2016-04-18 14:41:17 +03:00
} ,
{
. procname = " router_solicitation_interval " ,
. data = & ipv6_devconf . rtr_solicit_interval ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec_jiffies ,
} ,
2016-09-28 09:57:58 +03:00
{
. procname = " router_solicitation_max_interval " ,
. data = & ipv6_devconf . rtr_solicit_max_interval ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec_jiffies ,
} ,
2016-04-18 14:41:17 +03:00
{
. procname = " router_solicitation_delay " ,
. data = & ipv6_devconf . rtr_solicit_delay ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec_jiffies ,
} ,
{
. procname = " force_mld_version " ,
. data = & ipv6_devconf . force_mld_version ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
{
. procname = " mldv1_unsolicited_report_interval " ,
. data =
& ipv6_devconf . mldv1_unsolicited_report_interval ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec_ms_jiffies ,
} ,
{
. procname = " mldv2_unsolicited_report_interval " ,
. data =
& ipv6_devconf . mldv2_unsolicited_report_interval ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec_ms_jiffies ,
} ,
{
. procname = " use_tempaddr " ,
. data = & ipv6_devconf . use_tempaddr ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
{
. procname = " temp_valid_lft " ,
. data = & ipv6_devconf . temp_valid_lft ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
{
. procname = " temp_prefered_lft " ,
. data = & ipv6_devconf . temp_prefered_lft ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
{
. procname = " regen_max_retry " ,
. data = & ipv6_devconf . regen_max_retry ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
{
. procname = " max_desync_factor " ,
. data = & ipv6_devconf . max_desync_factor ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
{
. procname = " max_addresses " ,
. data = & ipv6_devconf . max_addresses ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
{
. procname = " accept_ra_defrtr " ,
. data = & ipv6_devconf . accept_ra_defrtr ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
{
. procname = " accept_ra_min_hop_limit " ,
. data = & ipv6_devconf . accept_ra_min_hop_limit ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
{
. procname = " accept_ra_pinfo " ,
. data = & ipv6_devconf . accept_ra_pinfo ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
2006-03-21 04:05:30 +03:00
# ifdef CONFIG_IPV6_ROUTER_PREF
2016-04-18 14:41:17 +03:00
{
. procname = " accept_ra_rtr_pref " ,
. data = & ipv6_devconf . accept_ra_rtr_pref ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
{
. procname = " router_probe_interval " ,
. data = & ipv6_devconf . rtr_probe_interval ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec_jiffies ,
} ,
2007-01-31 01:30:10 +03:00
# ifdef CONFIG_IPV6_ROUTE_INFO
2017-03-22 12:19:04 +03:00
{
. procname = " accept_ra_rt_info_min_plen " ,
. data = & ipv6_devconf . accept_ra_rt_info_min_plen ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
2016-04-18 14:41:17 +03:00
{
. procname = " accept_ra_rt_info_max_plen " ,
. data = & ipv6_devconf . accept_ra_rt_info_max_plen ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
2006-03-21 04:07:03 +03:00
# endif
2006-03-21 04:05:30 +03:00
# endif
2016-04-18 14:41:17 +03:00
{
. procname = " proxy_ndp " ,
. data = & ipv6_devconf . proxy_ndp ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = addrconf_sysctl_proxy_ndp ,
} ,
{
. procname = " accept_source_route " ,
. data = & ipv6_devconf . accept_source_route ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
2007-04-26 04:08:10 +04:00
# ifdef CONFIG_IPV6_OPTIMISTIC_DAD
2016-04-18 14:41:17 +03:00
{
. procname = " optimistic_dad " ,
. data = & ipv6_devconf . optimistic_dad ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
{
. procname = " use_optimistic " ,
. data = & ipv6_devconf . use_optimistic ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
2008-04-03 04:22:53 +04:00
# endif
# ifdef CONFIG_IPV6_MROUTE
2016-04-18 14:41:17 +03:00
{
. procname = " mc_forwarding " ,
. data = & ipv6_devconf . mc_forwarding ,
. maxlen = sizeof ( int ) ,
. mode = 0444 ,
. proc_handler = proc_dointvec ,
} ,
2007-04-26 04:08:10 +04:00
# endif
2016-04-18 14:41:17 +03:00
{
. procname = " disable_ipv6 " ,
. data = & ipv6_devconf . disable_ipv6 ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = addrconf_sysctl_disable ,
} ,
{
. procname = " accept_dad " ,
. data = & ipv6_devconf . accept_dad ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
{
. procname = " force_tllao " ,
. data = & ipv6_devconf . force_tllao ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec
} ,
{
. procname = " ndisc_notify " ,
. data = & ipv6_devconf . ndisc_notify ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec
} ,
{
. procname = " suppress_frag_ndisc " ,
. data = & ipv6_devconf . suppress_frag_ndisc ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec
} ,
{
. procname = " accept_ra_from_local " ,
. data = & ipv6_devconf . accept_ra_from_local ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
{
. procname = " accept_ra_mtu " ,
. data = & ipv6_devconf . accept_ra_mtu ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
{
. procname = " stable_secret " ,
. data = & ipv6_devconf . stable_secret ,
. maxlen = IPV6_MAX_STRLEN ,
. mode = 0600 ,
. proc_handler = addrconf_sysctl_stable_secret ,
} ,
{
. procname = " use_oif_addrs_only " ,
. data = & ipv6_devconf . use_oif_addrs_only ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
{
. procname = " ignore_routes_with_linkdown " ,
. data = & ipv6_devconf . ignore_routes_with_linkdown ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = addrconf_sysctl_ignore_routes_with_linkdown ,
} ,
{
. procname = " drop_unicast_in_l2_multicast " ,
. data = & ipv6_devconf . drop_unicast_in_l2_multicast ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
{
. procname = " drop_unsolicited_na " ,
. data = & ipv6_devconf . drop_unsolicited_na ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
{
. procname = " keep_addr_on_down " ,
. data = & ipv6_devconf . keep_addr_on_down ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
2016-11-08 16:57:39 +03:00
{
. procname = " seg6_enabled " ,
. data = & ipv6_devconf . seg6_enabled ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
2016-11-08 16:57:42 +03:00
# ifdef CONFIG_IPV6_SEG6_HMAC
{
. procname = " seg6_require_hmac " ,
. data = & ipv6_devconf . seg6_require_hmac ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
# endif
2016-12-03 01:00:08 +03:00
{
. procname = " enhanced_dad " ,
. data = & ipv6_devconf . enhanced_dad ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
2017-01-26 06:59:17 +03:00
{
. procname = " addr_gen_mode " ,
. data = & ipv6_devconf . addr_gen_mode ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = addrconf_sysctl_addr_gen_mode ,
} ,
2017-02-23 19:27:18 +03:00
{
. procname = " disable_policy " ,
. data = & ipv6_devconf . disable_policy ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = addrconf_sysctl_disable_policy ,
} ,
net: ipv6: sysctl to specify IPv6 ND traffic class
Add a per-device sysctl to specify the default traffic class to use for
kernel originated IPv6 Neighbour Discovery packets.
Currently this includes:
- Router Solicitation (ICMPv6 type 133)
ndisc_send_rs() -> ndisc_send_skb() -> ip6_nd_hdr()
- Neighbour Solicitation (ICMPv6 type 135)
ndisc_send_ns() -> ndisc_send_skb() -> ip6_nd_hdr()
- Neighbour Advertisement (ICMPv6 type 136)
ndisc_send_na() -> ndisc_send_skb() -> ip6_nd_hdr()
- Redirect (ICMPv6 type 137)
ndisc_send_redirect() -> ndisc_send_skb() -> ip6_nd_hdr()
and if the kernel ever gets around to generating RA's,
it would presumably also include:
- Router Advertisement (ICMPv6 type 134)
(radvd daemon could pick up on the kernel setting and use it)
Interface drivers may examine the Traffic Class value and translate
the DiffServ Code Point into a link-layer appropriate traffic
prioritization scheme. An example of mapping IETF DSCP values to
IEEE 802.11 User Priority values can be found here:
https://tools.ietf.org/html/draft-ietf-tsvwg-ieee-802-11
The expected primary use case is to properly prioritize ND over wifi.
Testing:
jzem22:~# cat /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
0
jzem22:~# echo -1 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
-bash: echo: write error: Invalid argument
jzem22:~# echo 256 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
-bash: echo: write error: Invalid argument
jzem22:~# echo 0 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
jzem22:~# echo 255 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
jzem22:~# cat /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
255
jzem22:~# echo 34 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
jzem22:~# cat /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
34
jzem22:~# echo $[0xDC] > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
jzem22:~# tcpdump -v -i eth0 icmp6 and src host jzem22.pgc and dst host fe80::1
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
IP6 (class 0xdc, hlim 255, next-header ICMPv6 (58) payload length: 24)
jzem22.pgc > fe80::1: [icmp6 sum ok] ICMP6, neighbor advertisement,
length 24, tgt is jzem22.pgc, Flags [solicited]
(based on original change written by Erik Kline, with minor changes)
v2: fix 'suspicious rcu_dereference_check() usage'
by explicitly grabbing the rcu_read_lock.
Cc: Lorenzo Colitti <lorenzo@google.com>
Signed-off-by: Erik Kline <ek@google.com>
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-11-08 08:52:09 +03:00
{
. procname = " ndisc_tclass " ,
. data = & ipv6_devconf . ndisc_tclass ,
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec_minmax ,
. extra1 = ( void * ) & zero ,
. extra2 = ( void * ) & two_five_five ,
} ,
2016-04-18 14:41:17 +03:00
{
/* sentinel */
}
2005-04-17 02:20:36 +04:00
} ;
2008-01-11 04:42:13 +03:00
static int __addrconf_sysctl_register ( struct net * net , char * dev_name ,
2009-11-06 00:32:03 +03:00
struct inet6_dev * idev , struct ipv6_devconf * p )
2005-04-17 02:20:36 +04:00
{
2016-08-30 11:09:22 +03:00
int i , ifindex ;
2016-04-18 14:41:10 +03:00
struct ctl_table * table ;
2012-04-19 17:41:24 +04:00
char path [ sizeof ( " net/ipv6/conf/ " ) + IFNAMSIZ ] ;
2007-12-01 16:59:38 +03:00
2016-04-18 14:41:10 +03:00
table = kmemdup ( addrconf_sysctl , sizeof ( addrconf_sysctl ) , GFP_KERNEL ) ;
if ( ! table )
2007-12-01 16:21:52 +03:00
goto out ;
2016-04-18 14:41:10 +03:00
for ( i = 0 ; table [ i ] . data ; i + + ) {
table [ i ] . data + = ( char * ) p - ( char * ) & ipv6_devconf ;
2016-09-29 10:33:43 +03:00
/* If one of these is already set, then it is not safe to
* overwrite either of them : this makes proc_dointvec_minmax
* usable .
*/
if ( ! table [ i ] . extra1 & & ! table [ i ] . extra2 ) {
table [ i ] . extra1 = idev ; /* embedded; no ref */
table [ i ] . extra2 = net ;
}
2005-04-17 02:20:36 +04:00
}
2012-04-19 17:41:24 +04:00
snprintf ( path , sizeof ( path ) , " net/ipv6/conf/%s " , dev_name ) ;
2005-04-17 02:20:36 +04:00
2016-04-18 14:41:10 +03:00
p - > sysctl_header = register_net_sysctl ( net , path , table ) ;
if ( ! p - > sysctl_header )
2012-04-19 17:41:24 +04:00
goto free ;
2007-12-01 16:21:52 +03:00
2016-08-30 11:09:22 +03:00
if ( ! strcmp ( dev_name , " all " ) )
ifindex = NETCONFA_IFINDEX_ALL ;
else if ( ! strcmp ( dev_name , " default " ) )
ifindex = NETCONFA_IFINDEX_DEFAULT ;
else
ifindex = idev - > dev - > ifindex ;
2017-03-29 00:28:04 +03:00
inet6_netconf_notify_devconf ( net , RTM_NEWNETCONF , NETCONFA_ALL ,
ifindex , p ) ;
2008-01-11 04:41:45 +03:00
return 0 ;
2005-04-17 02:20:36 +04:00
2007-12-01 16:21:52 +03:00
free :
2016-04-18 14:41:10 +03:00
kfree ( table ) ;
2007-12-01 16:21:52 +03:00
out :
2008-01-11 04:41:45 +03:00
return - ENOBUFS ;
2005-04-17 02:20:36 +04:00
}
2017-03-29 00:28:05 +03:00
static void __addrconf_sysctl_unregister ( struct net * net ,
struct ipv6_devconf * p , int ifindex )
2008-01-11 04:41:21 +03:00
{
2016-04-18 14:41:10 +03:00
struct ctl_table * table ;
2008-01-11 04:41:21 +03:00
2016-04-18 14:41:10 +03:00
if ( ! p - > sysctl_header )
2008-01-11 04:41:21 +03:00
return ;
2016-04-18 14:41:10 +03:00
table = p - > sysctl_header - > ctl_table_arg ;
unregister_net_sysctl_table ( p - > sysctl_header ) ;
p - > sysctl_header = NULL ;
kfree ( table ) ;
2017-03-29 00:28:05 +03:00
inet6_netconf_notify_devconf ( net , RTM_DELNETCONF , 0 , ifindex , NULL ) ;
2008-01-11 04:41:21 +03:00
}
2014-07-26 02:25:09 +04:00
static int addrconf_sysctl_register ( struct inet6_dev * idev )
2007-12-01 16:58:37 +03:00
{
2014-07-26 02:25:09 +04:00
int err ;
if ( ! sysctl_dev_name_is_allowed ( idev - > dev - > name ) )
return - EINVAL ;
err = neigh_sysctl_register ( idev - > dev , idev - > nd_parms ,
& ndisc_ifinfo_sysctl_change ) ;
if ( err )
return err ;
err = __addrconf_sysctl_register ( dev_net ( idev - > dev ) , idev - > dev - > name ,
idev , & idev - > cnf ) ;
if ( err )
neigh_sysctl_unregister ( idev - > nd_parms ) ;
return err ;
2007-12-01 16:58:37 +03:00
}
2008-01-11 04:41:21 +03:00
static void addrconf_sysctl_unregister ( struct inet6_dev * idev )
2005-04-17 02:20:36 +04:00
{
2017-03-29 00:28:05 +03:00
__addrconf_sysctl_unregister ( dev_net ( idev - > dev ) , & idev - > cnf ,
idev - > dev - > ifindex ) ;
2008-01-11 04:41:21 +03:00
neigh_sysctl_unregister ( idev - > nd_parms ) ;
2005-04-17 02:20:36 +04:00
}
# endif
2010-01-17 06:35:32 +03:00
static int __net_init addrconf_init_net ( struct net * net )
2008-01-11 04:42:55 +03:00
{
2013-03-25 21:52:45 +04:00
int err = - ENOMEM ;
2008-01-11 04:42:55 +03:00
struct ipv6_devconf * all , * dflt ;
2013-03-25 21:52:45 +04:00
all = kmemdup ( & ipv6_devconf , sizeof ( ipv6_devconf ) , GFP_KERNEL ) ;
2015-03-29 16:00:04 +03:00
if ( ! all )
2013-03-25 21:52:45 +04:00
goto err_alloc_all ;
2008-01-11 04:42:55 +03:00
2013-03-25 21:52:45 +04:00
dflt = kmemdup ( & ipv6_devconf_dflt , sizeof ( ipv6_devconf_dflt ) , GFP_KERNEL ) ;
2015-03-29 16:00:04 +03:00
if ( ! dflt )
2013-03-25 21:52:45 +04:00
goto err_alloc_dflt ;
2008-01-11 04:42:55 +03:00
2019-03-04 23:38:03 +03:00
if ( IS_ENABLED ( CONFIG_SYSCTL ) & &
sysctl_devconf_inherit_init_net = = 1 & & ! net_eq ( net , & init_net ) ) {
2019-01-18 10:27:11 +03:00
memcpy ( all , init_net . ipv6 . devconf_all , sizeof ( ipv6_devconf ) ) ;
memcpy ( dflt , init_net . ipv6 . devconf_dflt , sizeof ( ipv6_devconf_dflt ) ) ;
}
2013-03-25 21:52:45 +04:00
/* these will be inherited by all namespaces */
dflt - > autoconf = ipv6_defaults . autoconf ;
dflt - > disable_ipv6 = ipv6_defaults . disable_ipv6 ;
2008-01-11 04:42:55 +03:00
2015-03-24 01:36:00 +03:00
dflt - > stable_secret . initialized = false ;
all - > stable_secret . initialized = false ;
2008-01-11 04:42:55 +03:00
net - > ipv6 . devconf_all = all ;
net - > ipv6 . devconf_dflt = dflt ;
# ifdef CONFIG_SYSCTL
2009-11-06 00:32:03 +03:00
err = __addrconf_sysctl_register ( net , " all " , NULL , all ) ;
2008-01-11 04:42:55 +03:00
if ( err < 0 )
goto err_reg_all ;
2009-11-06 00:32:03 +03:00
err = __addrconf_sysctl_register ( net , " default " , NULL , dflt ) ;
2008-01-11 04:42:55 +03:00
if ( err < 0 )
goto err_reg_dflt ;
# endif
return 0 ;
# ifdef CONFIG_SYSCTL
err_reg_dflt :
2017-03-29 00:28:05 +03:00
__addrconf_sysctl_unregister ( net , all , NETCONFA_IFINDEX_ALL ) ;
2008-01-11 04:42:55 +03:00
err_reg_all :
kfree ( dflt ) ;
# endif
err_alloc_dflt :
kfree ( all ) ;
err_alloc_all :
return err ;
}
2010-01-17 06:35:32 +03:00
static void __net_exit addrconf_exit_net ( struct net * net )
2008-01-11 04:42:55 +03:00
{
# ifdef CONFIG_SYSCTL
2017-03-29 00:28:05 +03:00
__addrconf_sysctl_unregister ( net , net - > ipv6 . devconf_dflt ,
NETCONFA_IFINDEX_DEFAULT ) ;
__addrconf_sysctl_unregister ( net , net - > ipv6 . devconf_all ,
NETCONFA_IFINDEX_ALL ) ;
2008-01-11 04:42:55 +03:00
# endif
2014-11-26 05:25:58 +03:00
kfree ( net - > ipv6 . devconf_dflt ) ;
kfree ( net - > ipv6 . devconf_all ) ;
2008-01-11 04:42:55 +03:00
}
static struct pernet_operations addrconf_ops = {
. init = addrconf_init_net ,
. exit = addrconf_exit_net ,
} ;
2015-01-29 14:15:03 +03:00
static struct rtnl_af_ops inet6_ops __read_mostly = {
2010-11-16 07:33:57 +03:00
. family = AF_INET6 ,
. fill_link_af = inet6_fill_link_af ,
. get_link_af_size = inet6_get_link_af_size ,
2015-02-05 16:39:11 +03:00
. validate_link_af = inet6_validate_link_af ,
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 08:01:30 +04:00
. set_link_af = inet6_set_link_af ,
2010-11-16 07:33:57 +03:00
} ;
2005-04-17 02:20:36 +04:00
/*
* Init / cleanup code
*/
int __init addrconf_init ( void )
{
2014-07-26 02:25:09 +04:00
struct inet6_dev * idev ;
2010-03-17 23:31:10 +03:00
int i , err ;
2007-11-14 09:56:23 +03:00
2010-03-21 02:09:01 +03:00
err = ipv6_addr_label_init ( ) ;
if ( err < 0 ) {
2012-05-15 18:11:53 +04:00
pr_crit ( " %s: cannot initialize default policy table: %d \n " ,
__func__ , err ) ;
2010-09-24 13:55:52 +04:00
goto out ;
2007-11-14 09:56:23 +03:00
}
2005-04-17 02:20:36 +04:00
2010-09-24 13:55:52 +04:00
err = register_pernet_subsys ( & addrconf_ops ) ;
if ( err < 0 )
goto out_addrlabel ;
2008-01-11 04:42:55 +03:00
2014-03-27 21:28:07 +04:00
addrconf_wq = create_workqueue ( " ipv6_addrconf " ) ;
if ( ! addrconf_wq ) {
err = - ENOMEM ;
goto out_nowq ;
}
2005-04-17 02:20:36 +04:00
/* The addrconf netdev notifier requires that loopback_dev
* has it ' s ipv6 private information allocated and setup
* before it can bring up and give link - local addresses
* to other devices which are up .
*
* Unfortunately , loopback_dev is not necessarily the first
* entry in the global dev_base list of net devices . In fact ,
* it is likely to be the very last entry on that list .
* So this causes the notifier registry below to try and
* give link - local addresses to all devices besides loopback_dev
* first , then loopback_dev , which cases all the non - loopback_dev
* devices to fail to get a link - local address .
*
* So , as a temporary fix , allocate the ipv6 structure for
* loopback_dev first by hand .
* Longer term , all of the dependencies ipv6 has upon the loopback
* device and it being up should be removed .
*/
rtnl_lock ( ) ;
2014-07-26 02:25:09 +04:00
idev = ipv6_add_dev ( init_net . loopback_dev ) ;
2005-04-17 02:20:36 +04:00
rtnl_unlock ( ) ;
2014-07-26 02:25:09 +04:00
if ( IS_ERR ( idev ) ) {
err = PTR_ERR ( idev ) ;
2008-01-11 04:42:55 +03:00
goto errlo ;
2014-07-26 02:25:09 +04:00
}
2005-04-17 02:20:36 +04:00
2017-05-04 08:07:31 +03:00
ip6_route_init_special_entries ( ) ;
2010-03-17 23:31:10 +03:00
for ( i = 0 ; i < IN6_ADDR_HSIZE ; i + + )
INIT_HLIST_HEAD ( & inet6_addr_lst [ i ] ) ;
2005-04-17 02:20:36 +04:00
register_netdevice_notifier ( & ipv6_dev_notf ) ;
2014-03-27 21:28:07 +04:00
addrconf_verify ( ) ;
2007-03-22 21:58:32 +03:00
2013-12-30 22:41:32 +04:00
rtnl_af_register ( & inet6_ops ) ;
2010-11-16 07:33:57 +03:00
2017-12-02 23:44:08 +03:00
err = rtnl_register_module ( THIS_MODULE , PF_INET6 , RTM_GETLINK ,
NULL , inet6_dump_ifinfo , 0 ) ;
2007-03-22 21:58:32 +03:00
if ( err < 0 )
goto errout ;
2017-12-02 23:44:08 +03:00
err = rtnl_register_module ( THIS_MODULE , PF_INET6 , RTM_NEWADDR ,
inet6_rtm_newaddr , NULL , 0 ) ;
if ( err < 0 )
goto errout ;
err = rtnl_register_module ( THIS_MODULE , PF_INET6 , RTM_DELADDR ,
inet6_rtm_deladdr , NULL , 0 ) ;
if ( err < 0 )
goto errout ;
err = rtnl_register_module ( THIS_MODULE , PF_INET6 , RTM_GETADDR ,
inet6_rtm_getaddr , inet6_dump_ifaddr ,
RTNL_FLAG_DOIT_UNLOCKED ) ;
if ( err < 0 )
goto errout ;
err = rtnl_register_module ( THIS_MODULE , PF_INET6 , RTM_GETMULTICAST ,
NULL , inet6_dump_ifmcaddr , 0 ) ;
if ( err < 0 )
goto errout ;
err = rtnl_register_module ( THIS_MODULE , PF_INET6 , RTM_GETANYCAST ,
NULL , inet6_dump_ifacaddr , 0 ) ;
if ( err < 0 )
goto errout ;
err = rtnl_register_module ( THIS_MODULE , PF_INET6 , RTM_GETNETCONF ,
inet6_netconf_get_devconf ,
inet6_netconf_dump_devconf ,
RTNL_FLAG_DOIT_UNLOCKED ) ;
if ( err < 0 )
goto errout ;
2017-12-04 21:19:18 +03:00
err = ipv6_addr_label_rtnl_register ( ) ;
if ( err < 0 )
goto errout ;
2007-11-14 09:56:23 +03:00
2005-04-17 02:20:36 +04:00
return 0 ;
2007-03-22 21:58:32 +03:00
errout :
2017-12-02 23:44:08 +03:00
rtnl_unregister_all ( PF_INET6 ) ;
2010-11-16 07:33:57 +03:00
rtnl_af_unregister ( & inet6_ops ) ;
2007-03-22 21:58:32 +03:00
unregister_netdevice_notifier ( & ipv6_dev_notf ) ;
2008-01-11 04:42:55 +03:00
errlo :
2014-03-27 21:28:07 +04:00
destroy_workqueue ( addrconf_wq ) ;
out_nowq :
2008-01-11 04:42:55 +03:00
unregister_pernet_subsys ( & addrconf_ops ) ;
2010-09-24 13:55:52 +04:00
out_addrlabel :
ipv6_addr_label_cleanup ( ) ;
out :
2007-03-22 21:58:32 +03:00
return err ;
2005-04-17 02:20:36 +04:00
}
2007-12-13 16:34:58 +03:00
void addrconf_cleanup ( void )
2005-04-17 02:20:36 +04:00
{
2009-03-03 12:06:45 +03:00
struct net_device * dev ;
2005-04-17 02:20:36 +04:00
int i ;
unregister_netdevice_notifier ( & ipv6_dev_notf ) ;
2008-01-11 04:42:55 +03:00
unregister_pernet_subsys ( & addrconf_ops ) ;
2010-09-24 13:55:52 +04:00
ipv6_addr_label_cleanup ( ) ;
2005-04-17 02:20:36 +04:00
2017-10-04 16:58:49 +03:00
rtnl_af_unregister ( & inet6_ops ) ;
2005-04-17 02:20:36 +04:00
2017-10-04 16:58:49 +03:00
rtnl_lock ( ) ;
2010-11-16 07:33:57 +03:00
2009-03-03 12:06:45 +03:00
/* clean dev list */
for_each_netdev ( & init_net , dev ) {
if ( __in6_dev_get ( dev ) = = NULL )
continue ;
addrconf_ifdown ( dev , 1 ) ;
}
addrconf_ifdown ( init_net . loopback_dev , 2 ) ;
2005-04-17 02:20:36 +04:00
/*
* Check hash table .
*/
2010-03-17 23:31:11 +03:00
spin_lock_bh ( & addrconf_hash_lock ) ;
2010-03-17 23:31:10 +03:00
for ( i = 0 ; i < IN6_ADDR_HSIZE ; i + + )
WARN_ON ( ! hlist_empty ( & inet6_addr_lst [ i ] ) ) ;
2010-03-17 23:31:11 +03:00
spin_unlock_bh ( & addrconf_hash_lock ) ;
2014-03-27 21:28:07 +04:00
cancel_delayed_work ( & addr_chk_work ) ;
2005-04-17 02:20:36 +04:00
rtnl_unlock ( ) ;
2014-03-27 21:28:07 +04:00
destroy_workqueue ( addrconf_wq ) ;
2005-04-17 02:20:36 +04:00
}