2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* IPv6 Address [auto]configuration
|
|
|
|
* Linux INET6 implementation
|
|
|
|
*
|
|
|
|
* Authors:
|
2007-02-09 22:24:49 +08:00
|
|
|
* Pedro Roque <roque@di.fc.ul.pt>
|
2005-04-17 06:20:36 +08:00
|
|
|
* Alexey Kuznetsov <kuznet@ms2.inr.ac.ru>
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU General Public License
|
|
|
|
* as published by the Free Software Foundation; either version
|
|
|
|
* 2 of the License, or (at your option) any later version.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Changes:
|
|
|
|
*
|
|
|
|
* Janos Farkas : delete timer on ifdown
|
|
|
|
* <chexum@bankinf.banki.hu>
|
|
|
|
* Andi Kleen : kill double kfree on module
|
|
|
|
* unload.
|
|
|
|
* Maciej W. Rozycki : FDDI support
|
|
|
|
* sekiya@USAGI : Don't send too many RS
|
|
|
|
* packets.
|
|
|
|
* yoshfuji@USAGI : Fixed interval between DAD
|
|
|
|
* packets.
|
|
|
|
* YOSHIFUJI Hideaki @USAGI : improved accuracy of
|
|
|
|
* address validation timer.
|
|
|
|
* YOSHIFUJI Hideaki @USAGI : Privacy Extensions (RFC3041)
|
|
|
|
* support.
|
|
|
|
* Yuji SEKIYA @USAGI : Don't assign a same IPv6
|
|
|
|
* address on a same interface.
|
|
|
|
* YOSHIFUJI Hideaki @USAGI : ARCnet support
|
|
|
|
* YOSHIFUJI Hideaki @USAGI : convert /proc/net/if_inet6 to
|
|
|
|
* seq_file.
|
2005-11-09 01:38:12 +08:00
|
|
|
* YOSHIFUJI Hideaki @USAGI : improved source address
|
|
|
|
* selection; consider scope,
|
|
|
|
* status etc.
|
2005-04-17 06:20:36 +08:00
|
|
|
*/
|
|
|
|
|
2012-05-15 22:11:53 +08:00
|
|
|
#define pr_fmt(fmt) "IPv6: " fmt
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
#include <linux/errno.h>
|
|
|
|
#include <linux/types.h>
|
2009-03-22 04:36:17 +08:00
|
|
|
#include <linux/kernel.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
#include <linux/socket.h>
|
|
|
|
#include <linux/sockios.h>
|
|
|
|
#include <linux/net.h>
|
2015-03-24 06:36:00 +08:00
|
|
|
#include <linux/inet.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
#include <linux/in6.h>
|
|
|
|
#include <linux/netdevice.h>
|
2006-08-05 14:04:54 +08:00
|
|
|
#include <linux/if_addr.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
#include <linux/if_arp.h>
|
|
|
|
#include <linux/if_arcnet.h>
|
|
|
|
#include <linux/if_infiniband.h>
|
|
|
|
#include <linux/route.h>
|
|
|
|
#include <linux/inetdevice.h>
|
|
|
|
#include <linux/init.h>
|
include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h
percpu.h is included by sched.h and module.h and thus ends up being
included when building most .c files. percpu.h includes slab.h which
in turn includes gfp.h making everything defined by the two files
universally available and complicating inclusion dependencies.
percpu.h -> slab.h dependency is about to be removed. Prepare for
this change by updating users of gfp and slab facilities include those
headers directly instead of assuming availability. As this conversion
needs to touch large number of source files, the following script is
used as the basis of conversion.
http://userweb.kernel.org/~tj/misc/slabh-sweep.py
The script does the followings.
* Scan files for gfp and slab usages and update includes such that
only the necessary includes are there. ie. if only gfp is used,
gfp.h, if slab is used, slab.h.
* When the script inserts a new include, it looks at the include
blocks and try to put the new include such that its order conforms
to its surrounding. It's put in the include block which contains
core kernel includes, in the same order that the rest are ordered -
alphabetical, Christmas tree, rev-Xmas-tree or at the end if there
doesn't seem to be any matching order.
* If the script can't find a place to put a new include (mostly
because the file doesn't have fitting include block), it prints out
an error message indicating which .h file needs to be added to the
file.
The conversion was done in the following steps.
1. The initial automatic conversion of all .c files updated slightly
over 4000 files, deleting around 700 includes and adding ~480 gfp.h
and ~3000 slab.h inclusions. The script emitted errors for ~400
files.
2. Each error was manually checked. Some didn't need the inclusion,
some needed manual addition while adding it to implementation .h or
embedding .c file was more appropriate for others. This step added
inclusions to around 150 files.
3. The script was run again and the output was compared to the edits
from #2 to make sure no file was left behind.
4. Several build tests were done and a couple of problems were fixed.
e.g. lib/decompress_*.c used malloc/free() wrappers around slab
APIs requiring slab.h to be added manually.
5. The script was run on all .h files but without automatically
editing them as sprinkling gfp.h and slab.h inclusions around .h
files could easily lead to inclusion dependency hell. Most gfp.h
inclusion directives were ignored as stuff from gfp.h was usually
wildly available and often used in preprocessor macros. Each
slab.h inclusion directive was examined and added manually as
necessary.
6. percpu.h was updated not to include slab.h.
7. Build test were done on the following configurations and failures
were fixed. CONFIG_GCOV_KERNEL was turned off for all tests (as my
distributed build env didn't work with gcov compiles) and a few
more options had to be turned off depending on archs to make things
build (like ipr on powerpc/64 which failed due to missing writeq).
* x86 and x86_64 UP and SMP allmodconfig and a custom test config.
* powerpc and powerpc64 SMP allmodconfig
* sparc and sparc64 SMP allmodconfig
* ia64 SMP allmodconfig
* s390 SMP allmodconfig
* alpha SMP allmodconfig
* um on x86_64 SMP allmodconfig
8. percpu.h modifications were reverted so that it could be applied as
a separate patch and serve as bisection point.
Given the fact that I had only a couple of failures from tests on step
6, I'm fairly confident about the coverage of this conversion patch.
If there is a breakage, it's likely to be something in one of the arch
headers which should be easily discoverable easily on most builds of
the specific arch.
Signed-off-by: Tejun Heo <tj@kernel.org>
Guess-its-ok-by: Christoph Lameter <cl@linux-foundation.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Lee Schermerhorn <Lee.Schermerhorn@hp.com>
2010-03-24 16:04:11 +08:00
|
|
|
#include <linux/slab.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
#ifdef CONFIG_SYSCTL
|
|
|
|
#include <linux/sysctl.h>
|
|
|
|
#endif
|
2006-01-12 04:17:47 +08:00
|
|
|
#include <linux/capability.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
#include <linux/delay.h>
|
|
|
|
#include <linux/notifier.h>
|
2005-06-23 15:09:02 +08:00
|
|
|
#include <linux/string.h>
|
2012-07-18 16:11:12 +08:00
|
|
|
#include <linux/hash.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2007-09-12 18:01:34 +08:00
|
|
|
#include <net/net_namespace.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
#include <net/sock.h>
|
|
|
|
#include <net/snmp.h>
|
|
|
|
|
2015-12-15 03:55:22 +08:00
|
|
|
#include <net/6lowpan.h>
|
2013-03-25 16:26:24 +08:00
|
|
|
#include <net/firewire.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
#include <net/ipv6.h>
|
|
|
|
#include <net/protocol.h>
|
|
|
|
#include <net/ndisc.h>
|
|
|
|
#include <net/ip6_route.h>
|
|
|
|
#include <net/addrconf.h>
|
|
|
|
#include <net/tcp.h>
|
|
|
|
#include <net/ip.h>
|
2006-08-15 15:35:02 +08:00
|
|
|
#include <net/netlink.h>
|
2007-10-10 17:53:43 +08:00
|
|
|
#include <net/pkt_sched.h>
|
2015-10-13 02:47:10 +08:00
|
|
|
#include <net/l3mdev.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
#include <linux/if_tunnel.h>
|
|
|
|
#include <linux/rtnetlink.h>
|
2012-10-26 06:28:50 +08:00
|
|
|
#include <linux/netconf.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
#include <linux/random.h>
|
2010-03-21 07:09:01 +08:00
|
|
|
#include <linux/uaccess.h>
|
2007-04-25 12:54:09 +08:00
|
|
|
#include <asm/unaligned.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
#include <linux/proc_fs.h>
|
|
|
|
#include <linux/seq_file.h>
|
2011-07-15 23:47:34 +08:00
|
|
|
#include <linux/export.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
/* Set to 3 to get tracing... */
|
|
|
|
#define ACONF_DEBUG 2
|
|
|
|
|
|
|
|
#if ACONF_DEBUG >= 3
|
2013-08-17 10:27:04 +08:00
|
|
|
#define ADBG(fmt, ...) printk(fmt, ##__VA_ARGS__)
|
2005-04-17 06:20:36 +08:00
|
|
|
#else
|
2013-08-17 10:27:04 +08:00
|
|
|
#define ADBG(fmt, ...) do { if (0) printk(fmt, ##__VA_ARGS__); } while (0)
|
2005-04-17 06:20:36 +08:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#define INFINITY_LIFE_TIME 0xFFFFFFFF
|
2010-11-17 12:12:02 +08:00
|
|
|
|
2015-03-24 06:36:00 +08:00
|
|
|
#define IPV6_MAX_STRLEN \
|
|
|
|
sizeof("ffff:ffff:ffff:ffff:ffff:ffff:255.255.255.255")
|
|
|
|
|
2010-11-17 12:12:02 +08:00
|
|
|
static inline u32 cstamp_delta(unsigned long cstamp)
|
|
|
|
{
|
|
|
|
return (cstamp - INITIAL_JIFFIES) * 100UL / HZ;
|
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2016-09-28 14:57:58 +08:00
|
|
|
static inline s32 rfc3315_s14_backoff_init(s32 irt)
|
|
|
|
{
|
|
|
|
/* multiply 'initial retransmission time' by 0.9 .. 1.1 */
|
|
|
|
u64 tmp = (900000 + prandom_u32() % 200001) * (u64)irt;
|
|
|
|
do_div(tmp, 1000000);
|
|
|
|
return (s32)tmp;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline s32 rfc3315_s14_backoff_update(s32 rt, s32 mrt)
|
|
|
|
{
|
|
|
|
/* multiply 'retransmission timeout' by 1.9 .. 2.1 */
|
|
|
|
u64 tmp = (1900000 + prandom_u32() % 200001) * (u64)rt;
|
|
|
|
do_div(tmp, 1000000);
|
|
|
|
if ((s32)tmp > mrt) {
|
|
|
|
/* multiply 'maximum retransmission time' by 0.9 .. 1.1 */
|
|
|
|
tmp = (900000 + prandom_u32() % 200001) * (u64)mrt;
|
|
|
|
do_div(tmp, 1000000);
|
|
|
|
}
|
|
|
|
return (s32)tmp;
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
#ifdef CONFIG_SYSCTL
|
2014-07-26 06:25:09 +08:00
|
|
|
static int addrconf_sysctl_register(struct inet6_dev *idev);
|
2008-01-11 09:41:21 +08:00
|
|
|
static void addrconf_sysctl_unregister(struct inet6_dev *idev);
|
|
|
|
#else
|
2014-07-26 06:25:09 +08:00
|
|
|
static inline int addrconf_sysctl_register(struct inet6_dev *idev)
|
2008-01-11 09:41:21 +08:00
|
|
|
{
|
2014-07-26 06:25:09 +08:00
|
|
|
return 0;
|
2008-01-11 09:41:21 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline void addrconf_sysctl_unregister(struct inet6_dev *idev)
|
|
|
|
{
|
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
#endif
|
|
|
|
|
2016-10-14 00:50:02 +08:00
|
|
|
static void ipv6_regen_rndid(struct inet6_dev *idev);
|
|
|
|
static void ipv6_try_regen_rndid(struct inet6_dev *idev, struct in6_addr *tmpaddr);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2008-06-28 13:18:38 +08:00
|
|
|
static int ipv6_generate_eui64(u8 *eui, struct net_device *dev);
|
2005-04-17 06:20:36 +08:00
|
|
|
static int ipv6_count_addresses(struct inet6_dev *idev);
|
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 06:36:01 +08:00
|
|
|
static int ipv6_generate_stable_address(struct in6_addr *addr,
|
|
|
|
u8 dad_count,
|
|
|
|
const struct inet6_dev *idev);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Configured unicast address hash table
|
|
|
|
*/
|
2010-03-18 04:31:10 +08:00
|
|
|
static struct hlist_head inet6_addr_lst[IN6_ADDR_HSIZE];
|
2010-03-18 04:31:11 +08:00
|
|
|
static DEFINE_SPINLOCK(addrconf_hash_lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2014-03-28 01:28:07 +08:00
|
|
|
static void addrconf_verify(void);
|
|
|
|
static void addrconf_verify_rtnl(void);
|
|
|
|
static void addrconf_verify_work(struct work_struct *);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2014-03-28 01:28:07 +08:00
|
|
|
static struct workqueue_struct *addrconf_wq;
|
|
|
|
static DECLARE_DELAYED_WORK(addr_chk_work, addrconf_verify_work);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
static void addrconf_join_anycast(struct inet6_ifaddr *ifp);
|
|
|
|
static void addrconf_leave_anycast(struct inet6_ifaddr *ifp);
|
|
|
|
|
2010-03-10 18:28:56 +08:00
|
|
|
static void addrconf_type_change(struct net_device *dev,
|
|
|
|
unsigned long event);
|
2005-04-17 06:20:36 +08:00
|
|
|
static int addrconf_ifdown(struct net_device *dev, int how);
|
|
|
|
|
2013-01-10 05:06:03 +08:00
|
|
|
static struct rt6_info *addrconf_get_prefix_route(const struct in6_addr *pfx,
|
|
|
|
int plen,
|
|
|
|
const struct net_device *dev,
|
|
|
|
u32 flags, u32 noflags);
|
|
|
|
|
2012-04-15 09:37:40 +08:00
|
|
|
static void addrconf_dad_start(struct inet6_ifaddr *ifp);
|
2014-03-28 01:28:07 +08:00
|
|
|
static void addrconf_dad_work(struct work_struct *w);
|
2016-11-22 23:57:40 +08:00
|
|
|
static void addrconf_dad_completed(struct inet6_ifaddr *ifp, bool bump_id);
|
2005-12-21 21:57:44 +08:00
|
|
|
static void addrconf_dad_run(struct inet6_dev *idev);
|
2005-04-17 06:20:36 +08:00
|
|
|
static void addrconf_rs_timer(unsigned long data);
|
|
|
|
static void __ipv6_ifa_notify(int event, struct inet6_ifaddr *ifa);
|
|
|
|
static void ipv6_ifa_notify(int event, struct inet6_ifaddr *ifa);
|
|
|
|
|
2007-02-09 22:24:49 +08:00
|
|
|
static void inet6_prefix_notify(int event, struct inet6_dev *idev,
|
2005-04-17 06:20:36 +08:00
|
|
|
struct prefix_info *pinfo);
|
2010-03-21 07:18:00 +08:00
|
|
|
static bool ipv6_chk_same_addr(struct net *net, const struct in6_addr *addr,
|
|
|
|
struct net_device *dev);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2008-07-23 05:21:58 +08:00
|
|
|
static struct ipv6_devconf ipv6_devconf __read_mostly = {
|
2005-04-17 06:20:36 +08:00
|
|
|
.forwarding = 0,
|
|
|
|
.hop_limit = IPV6_DEFAULT_HOPLIMIT,
|
|
|
|
.mtu6 = IPV6_MIN_MTU,
|
|
|
|
.accept_ra = 1,
|
|
|
|
.accept_redirects = 1,
|
|
|
|
.autoconf = 1,
|
|
|
|
.force_mld_version = 0,
|
2013-08-14 07:03:46 +08:00
|
|
|
.mldv1_unsolicited_report_interval = 10 * HZ,
|
|
|
|
.mldv2_unsolicited_report_interval = HZ,
|
2005-04-17 06:20:36 +08:00
|
|
|
.dad_transmits = 1,
|
|
|
|
.rtr_solicits = MAX_RTR_SOLICITATIONS,
|
|
|
|
.rtr_solicit_interval = RTR_SOLICITATION_INTERVAL,
|
2016-09-28 14:57:58 +08:00
|
|
|
.rtr_solicit_max_interval = RTR_SOLICITATION_MAX_INTERVAL,
|
2005-04-17 06:20:36 +08:00
|
|
|
.rtr_solicit_delay = MAX_RTR_SOLICITATION_DELAY,
|
2014-08-25 04:53:10 +08:00
|
|
|
.use_tempaddr = 0,
|
2005-04-17 06:20:36 +08:00
|
|
|
.temp_valid_lft = TEMP_VALID_LIFETIME,
|
|
|
|
.temp_prefered_lft = TEMP_PREFERRED_LIFETIME,
|
|
|
|
.regen_max_retry = REGEN_MAX_RETRY,
|
|
|
|
.max_desync_factor = MAX_DESYNC_FACTOR,
|
|
|
|
.max_addresses = IPV6_MAX_ADDRESSES,
|
2006-03-21 08:55:08 +08:00
|
|
|
.accept_ra_defrtr = 1,
|
2014-06-26 05:44:53 +08:00
|
|
|
.accept_ra_from_local = 0,
|
2015-07-30 14:28:42 +08:00
|
|
|
.accept_ra_min_hop_limit= 1,
|
2006-03-21 08:55:26 +08:00
|
|
|
.accept_ra_pinfo = 1,
|
2006-03-21 09:05:30 +08:00
|
|
|
#ifdef CONFIG_IPV6_ROUTER_PREF
|
|
|
|
.accept_ra_rtr_pref = 1,
|
2006-03-21 09:05:47 +08:00
|
|
|
.rtr_probe_interval = 60 * HZ,
|
2006-03-21 09:07:03 +08:00
|
|
|
#ifdef CONFIG_IPV6_ROUTE_INFO
|
|
|
|
.accept_ra_rt_info_max_plen = 0,
|
|
|
|
#endif
|
2006-03-21 09:05:30 +08:00
|
|
|
#endif
|
2006-09-23 05:43:49 +08:00
|
|
|
.proxy_ndp = 0,
|
2007-04-25 05:58:30 +08:00
|
|
|
.accept_source_route = 0, /* we do not accept RH0 by default. */
|
2008-06-28 13:17:11 +08:00
|
|
|
.disable_ipv6 = 0,
|
2008-06-28 13:18:38 +08:00
|
|
|
.accept_dad = 1,
|
2013-08-27 07:36:51 +08:00
|
|
|
.suppress_frag_ndisc = 1,
|
2015-01-21 01:06:05 +08:00
|
|
|
.accept_ra_mtu = 1,
|
2015-03-24 06:36:00 +08:00
|
|
|
.stable_secret = {
|
|
|
|
.initialized = false,
|
2015-07-22 15:38:25 +08:00
|
|
|
},
|
|
|
|
.use_oif_addrs_only = 0,
|
2015-08-13 22:39:01 +08:00
|
|
|
.ignore_routes_with_linkdown = 0,
|
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-25 01:25:37 +08:00
|
|
|
.keep_addr_on_down = 0,
|
2016-11-08 21:57:39 +08:00
|
|
|
.seg6_enabled = 0,
|
2016-11-08 21:57:42 +08:00
|
|
|
#ifdef CONFIG_IPV6_SEG6_HMAC
|
|
|
|
.seg6_require_hmac = 0,
|
|
|
|
#endif
|
2016-12-03 06:00:08 +08:00
|
|
|
.enhanced_dad = 1,
|
2017-01-26 11:59:17 +08:00
|
|
|
.addr_gen_mode = IN6_ADDR_GEN_MODE_EUI64,
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
|
|
|
|
2006-09-23 05:15:41 +08:00
|
|
|
static struct ipv6_devconf ipv6_devconf_dflt __read_mostly = {
|
2005-04-17 06:20:36 +08:00
|
|
|
.forwarding = 0,
|
|
|
|
.hop_limit = IPV6_DEFAULT_HOPLIMIT,
|
|
|
|
.mtu6 = IPV6_MIN_MTU,
|
|
|
|
.accept_ra = 1,
|
|
|
|
.accept_redirects = 1,
|
|
|
|
.autoconf = 1,
|
2013-08-14 07:03:46 +08:00
|
|
|
.force_mld_version = 0,
|
|
|
|
.mldv1_unsolicited_report_interval = 10 * HZ,
|
|
|
|
.mldv2_unsolicited_report_interval = HZ,
|
2005-04-17 06:20:36 +08:00
|
|
|
.dad_transmits = 1,
|
|
|
|
.rtr_solicits = MAX_RTR_SOLICITATIONS,
|
|
|
|
.rtr_solicit_interval = RTR_SOLICITATION_INTERVAL,
|
2016-09-28 14:57:58 +08:00
|
|
|
.rtr_solicit_max_interval = RTR_SOLICITATION_MAX_INTERVAL,
|
2005-04-17 06:20:36 +08:00
|
|
|
.rtr_solicit_delay = MAX_RTR_SOLICITATION_DELAY,
|
|
|
|
.use_tempaddr = 0,
|
|
|
|
.temp_valid_lft = TEMP_VALID_LIFETIME,
|
|
|
|
.temp_prefered_lft = TEMP_PREFERRED_LIFETIME,
|
|
|
|
.regen_max_retry = REGEN_MAX_RETRY,
|
|
|
|
.max_desync_factor = MAX_DESYNC_FACTOR,
|
|
|
|
.max_addresses = IPV6_MAX_ADDRESSES,
|
2006-03-21 08:55:08 +08:00
|
|
|
.accept_ra_defrtr = 1,
|
2014-06-26 05:44:53 +08:00
|
|
|
.accept_ra_from_local = 0,
|
2015-07-30 14:28:42 +08:00
|
|
|
.accept_ra_min_hop_limit= 1,
|
2006-03-21 08:55:26 +08:00
|
|
|
.accept_ra_pinfo = 1,
|
2006-03-21 09:05:30 +08:00
|
|
|
#ifdef CONFIG_IPV6_ROUTER_PREF
|
|
|
|
.accept_ra_rtr_pref = 1,
|
2006-03-21 09:05:47 +08:00
|
|
|
.rtr_probe_interval = 60 * HZ,
|
2006-03-21 09:07:03 +08:00
|
|
|
#ifdef CONFIG_IPV6_ROUTE_INFO
|
|
|
|
.accept_ra_rt_info_max_plen = 0,
|
|
|
|
#endif
|
2006-03-21 09:05:30 +08:00
|
|
|
#endif
|
2006-09-23 05:43:49 +08:00
|
|
|
.proxy_ndp = 0,
|
2007-04-25 05:58:30 +08:00
|
|
|
.accept_source_route = 0, /* we do not accept RH0 by default. */
|
2008-06-28 13:17:11 +08:00
|
|
|
.disable_ipv6 = 0,
|
2008-06-28 13:18:38 +08:00
|
|
|
.accept_dad = 1,
|
2013-08-27 07:36:51 +08:00
|
|
|
.suppress_frag_ndisc = 1,
|
2015-01-21 01:06:05 +08:00
|
|
|
.accept_ra_mtu = 1,
|
2015-03-24 06:36:00 +08:00
|
|
|
.stable_secret = {
|
|
|
|
.initialized = false,
|
|
|
|
},
|
2015-07-22 15:38:25 +08:00
|
|
|
.use_oif_addrs_only = 0,
|
2015-08-13 22:39:01 +08:00
|
|
|
.ignore_routes_with_linkdown = 0,
|
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-25 01:25:37 +08:00
|
|
|
.keep_addr_on_down = 0,
|
2016-11-08 21:57:39 +08:00
|
|
|
.seg6_enabled = 0,
|
2016-11-08 21:57:42 +08:00
|
|
|
#ifdef CONFIG_IPV6_SEG6_HMAC
|
|
|
|
.seg6_require_hmac = 0,
|
|
|
|
#endif
|
2016-12-03 06:00:08 +08:00
|
|
|
.enhanced_dad = 1,
|
2017-01-26 11:59:17 +08:00
|
|
|
.addr_gen_mode = IN6_ADDR_GEN_MODE_EUI64,
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
|
|
|
|
2007-10-10 17:53:43 +08:00
|
|
|
/* Check if a valid qdisc is available */
|
2008-07-09 14:01:27 +08:00
|
|
|
static inline bool addrconf_qdisc_ok(const struct net_device *dev)
|
2007-10-10 17:53:43 +08:00
|
|
|
{
|
2008-07-09 14:01:27 +08:00
|
|
|
return !qdisc_tx_is_noop(dev);
|
2007-10-10 17:53:43 +08:00
|
|
|
}
|
|
|
|
|
2013-06-24 00:39:01 +08:00
|
|
|
static void addrconf_del_rs_timer(struct inet6_dev *idev)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2013-06-24 00:39:01 +08:00
|
|
|
if (del_timer(&idev->rs_timer))
|
|
|
|
__in6_dev_put(idev);
|
|
|
|
}
|
|
|
|
|
2014-03-28 01:28:07 +08:00
|
|
|
static void addrconf_del_dad_work(struct inet6_ifaddr *ifp)
|
2013-06-24 00:39:01 +08:00
|
|
|
{
|
2014-03-28 01:28:07 +08:00
|
|
|
if (cancel_delayed_work(&ifp->dad_work))
|
2005-04-17 06:20:36 +08:00
|
|
|
__in6_ifa_put(ifp);
|
|
|
|
}
|
|
|
|
|
2013-06-24 00:39:01 +08:00
|
|
|
static void addrconf_mod_rs_timer(struct inet6_dev *idev,
|
|
|
|
unsigned long when)
|
|
|
|
{
|
|
|
|
if (!timer_pending(&idev->rs_timer))
|
|
|
|
in6_dev_hold(idev);
|
|
|
|
mod_timer(&idev->rs_timer, jiffies + when);
|
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2014-03-28 01:28:07 +08:00
|
|
|
static void addrconf_mod_dad_work(struct inet6_ifaddr *ifp,
|
|
|
|
unsigned long delay)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2014-03-28 01:28:07 +08:00
|
|
|
if (!delayed_work_pending(&ifp->dad_work))
|
2005-04-17 06:20:36 +08:00
|
|
|
in6_ifa_hold(ifp);
|
2014-03-28 01:28:07 +08:00
|
|
|
mod_delayed_work(addrconf_wq, &ifp->dad_work, delay);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2007-04-25 12:54:09 +08:00
|
|
|
static int snmp6_alloc_dev(struct inet6_dev *idev)
|
|
|
|
{
|
2013-10-08 06:51:58 +08:00
|
|
|
int i;
|
|
|
|
|
2014-05-06 06:55:55 +08:00
|
|
|
idev->stats.ipv6 = alloc_percpu(struct ipstats_mib);
|
|
|
|
if (!idev->stats.ipv6)
|
2007-04-25 12:54:09 +08:00
|
|
|
goto err_ip;
|
2013-10-08 06:51:58 +08:00
|
|
|
|
|
|
|
for_each_possible_cpu(i) {
|
|
|
|
struct ipstats_mib *addrconf_stats;
|
2014-05-06 06:55:55 +08:00
|
|
|
addrconf_stats = per_cpu_ptr(idev->stats.ipv6, i);
|
2013-10-08 06:51:58 +08:00
|
|
|
u64_stats_init(&addrconf_stats->syncp);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-05-19 09:14:23 +08:00
|
|
|
idev->stats.icmpv6dev = kzalloc(sizeof(struct icmpv6_mib_device),
|
|
|
|
GFP_KERNEL);
|
|
|
|
if (!idev->stats.icmpv6dev)
|
2007-04-25 12:54:09 +08:00
|
|
|
goto err_icmp;
|
2011-05-19 09:14:23 +08:00
|
|
|
idev->stats.icmpv6msgdev = kzalloc(sizeof(struct icmpv6msg_mib_device),
|
|
|
|
GFP_KERNEL);
|
|
|
|
if (!idev->stats.icmpv6msgdev)
|
2007-09-17 07:52:35 +08:00
|
|
|
goto err_icmpmsg;
|
2007-04-25 12:54:09 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
2007-09-17 07:52:35 +08:00
|
|
|
err_icmpmsg:
|
2011-05-19 09:14:23 +08:00
|
|
|
kfree(idev->stats.icmpv6dev);
|
2007-04-25 12:54:09 +08:00
|
|
|
err_icmp:
|
2014-05-06 06:55:55 +08:00
|
|
|
free_percpu(idev->stats.ipv6);
|
2007-04-25 12:54:09 +08:00
|
|
|
err_ip:
|
2007-10-18 12:25:32 +08:00
|
|
|
return -ENOMEM;
|
2007-04-25 12:54:09 +08:00
|
|
|
}
|
|
|
|
|
2012-04-01 15:49:08 +08:00
|
|
|
static struct inet6_dev *ipv6_add_dev(struct net_device *dev)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct inet6_dev *ndev;
|
2014-07-26 06:25:09 +08:00
|
|
|
int err = -ENOMEM;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
ASSERT_RTNL();
|
|
|
|
|
|
|
|
if (dev->mtu < IPV6_MIN_MTU)
|
2014-07-26 06:25:09 +08:00
|
|
|
return ERR_PTR(-EINVAL);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2007-02-09 22:24:49 +08:00
|
|
|
ndev = kzalloc(sizeof(struct inet6_dev), GFP_KERNEL);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!ndev)
|
2014-07-26 06:25:09 +08:00
|
|
|
return ERR_PTR(err);
|
2006-03-21 15:01:47 +08:00
|
|
|
|
|
|
|
rwlock_init(&ndev->lock);
|
|
|
|
ndev->dev = dev;
|
2010-03-18 04:31:13 +08:00
|
|
|
INIT_LIST_HEAD(&ndev->addr_list);
|
2013-06-24 00:39:01 +08:00
|
|
|
setup_timer(&ndev->rs_timer, addrconf_rs_timer,
|
|
|
|
(unsigned long)ndev);
|
2008-03-25 20:47:49 +08:00
|
|
|
memcpy(&ndev->cnf, dev_net(dev)->ipv6.devconf_dflt, sizeof(ndev->cnf));
|
2015-12-16 05:59:12 +08:00
|
|
|
|
|
|
|
if (ndev->cnf.stable_secret.initialized)
|
2017-01-26 11:59:17 +08:00
|
|
|
ndev->cnf.addr_gen_mode = IN6_ADDR_GEN_MODE_STABLE_PRIVACY;
|
2015-12-16 05:59:12 +08:00
|
|
|
else
|
2017-01-26 11:59:17 +08:00
|
|
|
ndev->cnf.addr_gen_mode = ipv6_devconf_dflt.addr_gen_mode;
|
2015-12-16 05:59:12 +08:00
|
|
|
|
2006-03-21 15:01:47 +08:00
|
|
|
ndev->cnf.mtu6 = dev->mtu;
|
|
|
|
ndev->nd_parms = neigh_parms_alloc(dev, &nd_tbl);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!ndev->nd_parms) {
|
2006-03-21 15:01:47 +08:00
|
|
|
kfree(ndev);
|
2014-07-26 06:25:09 +08:00
|
|
|
return ERR_PTR(err);
|
2006-03-21 15:01:47 +08:00
|
|
|
}
|
2008-06-20 07:15:47 +08:00
|
|
|
if (ndev->cnf.forwarding)
|
|
|
|
dev_disable_lro(dev);
|
2006-03-21 15:01:47 +08:00
|
|
|
/* We refer to the device */
|
|
|
|
dev_hold(dev);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2006-03-21 15:01:47 +08:00
|
|
|
if (snmp6_alloc_dev(ndev) < 0) {
|
2013-08-17 10:27:04 +08:00
|
|
|
ADBG(KERN_WARNING
|
2012-05-15 22:11:53 +08:00
|
|
|
"%s: cannot allocate memory for statistics; dev=%s.\n",
|
2013-08-17 10:27:04 +08:00
|
|
|
__func__, dev->name);
|
2006-03-21 15:01:47 +08:00
|
|
|
neigh_parms_release(&nd_tbl, ndev->nd_parms);
|
2011-09-21 03:10:16 +08:00
|
|
|
dev_put(dev);
|
|
|
|
kfree(ndev);
|
2014-07-26 06:25:09 +08:00
|
|
|
return ERR_PTR(err);
|
2006-03-21 15:01:47 +08:00
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2006-03-21 15:01:47 +08:00
|
|
|
if (snmp6_register_dev(ndev) < 0) {
|
2013-08-17 10:27:04 +08:00
|
|
|
ADBG(KERN_WARNING
|
2012-05-15 22:11:53 +08:00
|
|
|
"%s: cannot create /proc/net/dev_snmp6/%s\n",
|
2013-08-17 10:27:04 +08:00
|
|
|
__func__, dev->name);
|
2014-07-26 06:25:09 +08:00
|
|
|
goto err_release;
|
2006-03-21 15:01:47 +08:00
|
|
|
}
|
|
|
|
|
2016-10-14 00:50:02 +08:00
|
|
|
/* One reference from device. */
|
2006-03-21 15:01:47 +08:00
|
|
|
in6_dev_hold(ndev);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2008-06-28 13:18:38 +08:00
|
|
|
if (dev->flags & (IFF_NOARP | IFF_LOOPBACK))
|
|
|
|
ndev->cnf.accept_dad = -1;
|
|
|
|
|
2012-10-30 00:23:10 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6_SIT)
|
2008-04-14 14:42:18 +08:00
|
|
|
if (dev->type == ARPHRD_SIT && (dev->priv_flags & IFF_ISATAP)) {
|
2012-05-15 22:11:53 +08:00
|
|
|
pr_info("%s: Disabled Multicast RS\n", dev->name);
|
2008-04-14 14:42:18 +08:00
|
|
|
ndev->cnf.rtr_solicits = 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2010-03-18 04:31:09 +08:00
|
|
|
INIT_LIST_HEAD(&ndev->tempaddr_list);
|
2016-10-14 00:52:15 +08:00
|
|
|
ndev->desync_factor = U32_MAX;
|
2006-03-21 15:01:47 +08:00
|
|
|
if ((dev->flags&IFF_LOOPBACK) ||
|
|
|
|
dev->type == ARPHRD_TUNNEL ||
|
2008-04-14 14:47:11 +08:00
|
|
|
dev->type == ARPHRD_TUNNEL6 ||
|
2006-10-11 05:49:53 +08:00
|
|
|
dev->type == ARPHRD_SIT ||
|
|
|
|
dev->type == ARPHRD_NONE) {
|
2006-03-21 15:01:47 +08:00
|
|
|
ndev->cnf.use_tempaddr = -1;
|
2016-10-14 00:50:02 +08:00
|
|
|
} else
|
|
|
|
ipv6_regen_rndid(ndev);
|
2013-10-29 08:07:50 +08:00
|
|
|
|
2013-04-09 11:47:14 +08:00
|
|
|
ndev->token = in6addr_any;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2007-10-10 17:53:43 +08:00
|
|
|
if (netif_running(dev) && addrconf_qdisc_ok(dev))
|
2007-03-28 05:31:52 +08:00
|
|
|
ndev->if_flags |= IF_READY;
|
|
|
|
|
2006-03-21 15:01:47 +08:00
|
|
|
ipv6_mc_init_dev(ndev);
|
|
|
|
ndev->tstamp = jiffies;
|
2014-07-26 06:25:09 +08:00
|
|
|
err = addrconf_sysctl_register(ndev);
|
|
|
|
if (err) {
|
|
|
|
ipv6_mc_destroy_dev(ndev);
|
2015-11-04 21:47:53 +08:00
|
|
|
snmp6_unregister_dev(ndev);
|
2014-07-26 06:25:09 +08:00
|
|
|
goto err_release;
|
|
|
|
}
|
2007-01-05 04:31:14 +08:00
|
|
|
/* protected by rtnl_lock */
|
2012-01-12 12:41:32 +08:00
|
|
|
rcu_assign_pointer(dev->ip6_ptr, ndev);
|
2007-01-15 13:48:40 +08:00
|
|
|
|
2013-02-10 11:50:18 +08:00
|
|
|
/* Join interface-local all-node multicast group */
|
|
|
|
ipv6_dev_mc_inc(dev, &in6addr_interfacelocal_allnodes);
|
|
|
|
|
2007-01-15 13:48:40 +08:00
|
|
|
/* Join all-node multicast group */
|
2008-04-10 14:42:11 +08:00
|
|
|
ipv6_dev_mc_inc(dev, &in6addr_linklocal_allnodes);
|
2007-01-15 13:48:40 +08:00
|
|
|
|
2012-03-05 22:45:17 +08:00
|
|
|
/* Join all-router multicast group if forwarding is set */
|
2012-03-07 22:58:07 +08:00
|
|
|
if (ndev->cnf.forwarding && (dev->flags & IFF_MULTICAST))
|
2012-03-05 22:45:17 +08:00
|
|
|
ipv6_dev_mc_inc(dev, &in6addr_linklocal_allrouters);
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
return ndev;
|
2014-07-26 06:25:09 +08:00
|
|
|
|
|
|
|
err_release:
|
|
|
|
neigh_parms_release(&nd_tbl, ndev->nd_parms);
|
|
|
|
ndev->dead = 1;
|
|
|
|
in6_dev_finish_destroy(ndev);
|
|
|
|
return ERR_PTR(err);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2012-04-01 15:49:08 +08:00
|
|
|
static struct inet6_dev *ipv6_find_idev(struct net_device *dev)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct inet6_dev *idev;
|
|
|
|
|
|
|
|
ASSERT_RTNL();
|
|
|
|
|
2010-03-21 07:09:01 +08:00
|
|
|
idev = __in6_dev_get(dev);
|
|
|
|
if (!idev) {
|
|
|
|
idev = ipv6_add_dev(dev);
|
2014-07-26 06:25:09 +08:00
|
|
|
if (IS_ERR(idev))
|
2005-04-17 06:20:36 +08:00
|
|
|
return NULL;
|
|
|
|
}
|
2005-12-21 21:57:44 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
if (dev->flags&IFF_UP)
|
|
|
|
ipv6_mc_up(idev);
|
|
|
|
return idev;
|
|
|
|
}
|
|
|
|
|
2012-10-26 06:28:50 +08:00
|
|
|
static int inet6_netconf_msgsize_devconf(int type)
|
|
|
|
{
|
|
|
|
int size = NLMSG_ALIGN(sizeof(struct netconfmsg))
|
|
|
|
+ nla_total_size(4); /* NETCONFA_IFINDEX */
|
2016-03-10 16:55:50 +08:00
|
|
|
bool all = false;
|
2012-10-26 06:28:50 +08:00
|
|
|
|
2016-03-10 16:55:50 +08:00
|
|
|
if (type == NETCONFA_ALL)
|
|
|
|
all = true;
|
|
|
|
|
|
|
|
if (all || type == NETCONFA_FORWARDING)
|
2012-10-26 06:28:50 +08:00
|
|
|
size += nla_total_size(4);
|
2012-12-05 03:46:34 +08:00
|
|
|
#ifdef CONFIG_IPV6_MROUTE
|
2016-03-10 16:55:50 +08:00
|
|
|
if (all || type == NETCONFA_MC_FORWARDING)
|
2012-12-04 09:13:35 +08:00
|
|
|
size += nla_total_size(4);
|
2012-12-05 03:46:34 +08:00
|
|
|
#endif
|
2016-03-10 16:55:50 +08:00
|
|
|
if (all || type == NETCONFA_PROXY_NEIGH)
|
2013-12-18 14:37:14 +08:00
|
|
|
size += nla_total_size(4);
|
2012-10-26 06:28:50 +08:00
|
|
|
|
2016-03-10 16:55:50 +08:00
|
|
|
if (all || type == NETCONFA_IGNORE_ROUTES_WITH_LINKDOWN)
|
2015-08-13 22:39:01 +08:00
|
|
|
size += nla_total_size(4);
|
|
|
|
|
2012-10-26 06:28:50 +08:00
|
|
|
return size;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int inet6_netconf_fill_devconf(struct sk_buff *skb, int ifindex,
|
|
|
|
struct ipv6_devconf *devconf, u32 portid,
|
|
|
|
u32 seq, int event, unsigned int flags,
|
|
|
|
int type)
|
|
|
|
{
|
|
|
|
struct nlmsghdr *nlh;
|
|
|
|
struct netconfmsg *ncm;
|
2016-03-10 16:55:50 +08:00
|
|
|
bool all = false;
|
2012-10-26 06:28:50 +08:00
|
|
|
|
|
|
|
nlh = nlmsg_put(skb, portid, seq, event, sizeof(struct netconfmsg),
|
|
|
|
flags);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!nlh)
|
2012-10-26 06:28:50 +08:00
|
|
|
return -EMSGSIZE;
|
|
|
|
|
2016-03-10 16:55:50 +08:00
|
|
|
if (type == NETCONFA_ALL)
|
|
|
|
all = true;
|
|
|
|
|
2012-10-26 06:28:50 +08:00
|
|
|
ncm = nlmsg_data(nlh);
|
|
|
|
ncm->ncm_family = AF_INET6;
|
|
|
|
|
|
|
|
if (nla_put_s32(skb, NETCONFA_IFINDEX, ifindex) < 0)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
2016-03-10 16:55:50 +08:00
|
|
|
if ((all || type == NETCONFA_FORWARDING) &&
|
2012-10-26 06:28:50 +08:00
|
|
|
nla_put_s32(skb, NETCONFA_FORWARDING, devconf->forwarding) < 0)
|
|
|
|
goto nla_put_failure;
|
2012-12-05 03:46:34 +08:00
|
|
|
#ifdef CONFIG_IPV6_MROUTE
|
2016-03-10 16:55:50 +08:00
|
|
|
if ((all || type == NETCONFA_MC_FORWARDING) &&
|
2012-12-04 09:13:35 +08:00
|
|
|
nla_put_s32(skb, NETCONFA_MC_FORWARDING,
|
|
|
|
devconf->mc_forwarding) < 0)
|
|
|
|
goto nla_put_failure;
|
2012-12-05 03:46:34 +08:00
|
|
|
#endif
|
2016-03-10 16:55:50 +08:00
|
|
|
if ((all || type == NETCONFA_PROXY_NEIGH) &&
|
2013-12-18 14:37:14 +08:00
|
|
|
nla_put_s32(skb, NETCONFA_PROXY_NEIGH, devconf->proxy_ndp) < 0)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
2016-03-10 16:55:50 +08:00
|
|
|
if ((all || type == NETCONFA_IGNORE_ROUTES_WITH_LINKDOWN) &&
|
2015-08-13 22:39:01 +08:00
|
|
|
nla_put_s32(skb, NETCONFA_IGNORE_ROUTES_WITH_LINKDOWN,
|
|
|
|
devconf->ignore_routes_with_linkdown) < 0)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
2015-01-17 05:09:00 +08:00
|
|
|
nlmsg_end(skb, nlh);
|
|
|
|
return 0;
|
2012-10-26 06:28:50 +08:00
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_cancel(skb, nlh);
|
|
|
|
return -EMSGSIZE;
|
|
|
|
}
|
|
|
|
|
2012-12-04 09:13:35 +08:00
|
|
|
void inet6_netconf_notify_devconf(struct net *net, int type, int ifindex,
|
|
|
|
struct ipv6_devconf *devconf)
|
2012-10-26 06:28:50 +08:00
|
|
|
{
|
|
|
|
struct sk_buff *skb;
|
|
|
|
int err = -ENOBUFS;
|
|
|
|
|
2016-07-08 11:46:04 +08:00
|
|
|
skb = nlmsg_new(inet6_netconf_msgsize_devconf(type), GFP_KERNEL);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!skb)
|
2012-10-26 06:28:50 +08:00
|
|
|
goto errout;
|
|
|
|
|
|
|
|
err = inet6_netconf_fill_devconf(skb, ifindex, devconf, 0, 0,
|
|
|
|
RTM_NEWNETCONF, 0, type);
|
|
|
|
if (err < 0) {
|
|
|
|
/* -EMSGSIZE implies BUG in inet6_netconf_msgsize_devconf() */
|
|
|
|
WARN_ON(err == -EMSGSIZE);
|
|
|
|
kfree_skb(skb);
|
|
|
|
goto errout;
|
|
|
|
}
|
2016-07-08 11:46:04 +08:00
|
|
|
rtnl_notify(skb, net, 0, RTNLGRP_IPV6_NETCONF, NULL, GFP_KERNEL);
|
2012-10-26 06:28:50 +08:00
|
|
|
return;
|
|
|
|
errout:
|
2012-12-18 20:08:56 +08:00
|
|
|
rtnl_set_sk_err(net, RTNLGRP_IPV6_NETCONF, err);
|
2012-10-26 06:28:50 +08:00
|
|
|
}
|
|
|
|
|
2012-10-26 06:28:51 +08:00
|
|
|
static const struct nla_policy devconf_ipv6_policy[NETCONFA_MAX+1] = {
|
|
|
|
[NETCONFA_IFINDEX] = { .len = sizeof(int) },
|
|
|
|
[NETCONFA_FORWARDING] = { .len = sizeof(int) },
|
2013-12-18 14:37:14 +08:00
|
|
|
[NETCONFA_PROXY_NEIGH] = { .len = sizeof(int) },
|
2015-08-13 22:39:01 +08:00
|
|
|
[NETCONFA_IGNORE_ROUTES_WITH_LINKDOWN] = { .len = sizeof(int) },
|
2012-10-26 06:28:51 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
static int inet6_netconf_get_devconf(struct sk_buff *in_skb,
|
2013-03-21 15:45:29 +08:00
|
|
|
struct nlmsghdr *nlh)
|
2012-10-26 06:28:51 +08:00
|
|
|
{
|
|
|
|
struct net *net = sock_net(in_skb->sk);
|
|
|
|
struct nlattr *tb[NETCONFA_MAX+1];
|
|
|
|
struct netconfmsg *ncm;
|
|
|
|
struct sk_buff *skb;
|
|
|
|
struct ipv6_devconf *devconf;
|
|
|
|
struct inet6_dev *in6_dev;
|
|
|
|
struct net_device *dev;
|
|
|
|
int ifindex;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
err = nlmsg_parse(nlh, sizeof(*ncm), tb, NETCONFA_MAX,
|
|
|
|
devconf_ipv6_policy);
|
|
|
|
if (err < 0)
|
|
|
|
goto errout;
|
|
|
|
|
2016-02-17 10:43:16 +08:00
|
|
|
err = -EINVAL;
|
2012-10-26 06:28:51 +08:00
|
|
|
if (!tb[NETCONFA_IFINDEX])
|
|
|
|
goto errout;
|
|
|
|
|
|
|
|
ifindex = nla_get_s32(tb[NETCONFA_IFINDEX]);
|
|
|
|
switch (ifindex) {
|
|
|
|
case NETCONFA_IFINDEX_ALL:
|
|
|
|
devconf = net->ipv6.devconf_all;
|
|
|
|
break;
|
|
|
|
case NETCONFA_IFINDEX_DEFAULT:
|
|
|
|
devconf = net->ipv6.devconf_dflt;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
dev = __dev_get_by_index(net, ifindex);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!dev)
|
2012-10-26 06:28:51 +08:00
|
|
|
goto errout;
|
|
|
|
in6_dev = __in6_dev_get(dev);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!in6_dev)
|
2012-10-26 06:28:51 +08:00
|
|
|
goto errout;
|
|
|
|
devconf = &in6_dev->cnf;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
err = -ENOBUFS;
|
2016-03-10 16:55:50 +08:00
|
|
|
skb = nlmsg_new(inet6_netconf_msgsize_devconf(NETCONFA_ALL), GFP_ATOMIC);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!skb)
|
2012-10-26 06:28:51 +08:00
|
|
|
goto errout;
|
|
|
|
|
|
|
|
err = inet6_netconf_fill_devconf(skb, ifindex, devconf,
|
|
|
|
NETLINK_CB(in_skb).portid,
|
|
|
|
nlh->nlmsg_seq, RTM_NEWNETCONF, 0,
|
2016-03-10 16:55:50 +08:00
|
|
|
NETCONFA_ALL);
|
2012-10-26 06:28:51 +08:00
|
|
|
if (err < 0) {
|
|
|
|
/* -EMSGSIZE implies BUG in inet6_netconf_msgsize_devconf() */
|
|
|
|
WARN_ON(err == -EMSGSIZE);
|
|
|
|
kfree_skb(skb);
|
|
|
|
goto errout;
|
|
|
|
}
|
|
|
|
err = rtnl_unicast(skb, net, NETLINK_CB(in_skb).portid);
|
|
|
|
errout:
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2013-03-06 07:42:06 +08:00
|
|
|
static int inet6_netconf_dump_devconf(struct sk_buff *skb,
|
|
|
|
struct netlink_callback *cb)
|
|
|
|
{
|
|
|
|
struct net *net = sock_net(skb->sk);
|
|
|
|
int h, s_h;
|
|
|
|
int idx, s_idx;
|
|
|
|
struct net_device *dev;
|
|
|
|
struct inet6_dev *idev;
|
|
|
|
struct hlist_head *head;
|
|
|
|
|
|
|
|
s_h = cb->args[0];
|
|
|
|
s_idx = idx = cb->args[1];
|
|
|
|
|
|
|
|
for (h = s_h; h < NETDEV_HASHENTRIES; h++, s_idx = 0) {
|
|
|
|
idx = 0;
|
|
|
|
head = &net->dev_index_head[h];
|
|
|
|
rcu_read_lock();
|
2013-03-22 14:28:43 +08:00
|
|
|
cb->seq = atomic_read(&net->ipv6.dev_addr_genid) ^
|
|
|
|
net->dev_base_seq;
|
2013-03-06 07:42:06 +08:00
|
|
|
hlist_for_each_entry_rcu(dev, head, index_hlist) {
|
|
|
|
if (idx < s_idx)
|
|
|
|
goto cont;
|
|
|
|
idev = __in6_dev_get(dev);
|
|
|
|
if (!idev)
|
|
|
|
goto cont;
|
|
|
|
|
|
|
|
if (inet6_netconf_fill_devconf(skb, dev->ifindex,
|
|
|
|
&idev->cnf,
|
|
|
|
NETLINK_CB(cb->skb).portid,
|
|
|
|
cb->nlh->nlmsg_seq,
|
|
|
|
RTM_NEWNETCONF,
|
|
|
|
NLM_F_MULTI,
|
2016-03-10 16:55:50 +08:00
|
|
|
NETCONFA_ALL) < 0) {
|
2013-03-06 07:42:06 +08:00
|
|
|
rcu_read_unlock();
|
|
|
|
goto done;
|
|
|
|
}
|
2013-03-22 14:28:43 +08:00
|
|
|
nl_dump_check_consistent(cb, nlmsg_hdr(skb));
|
2013-03-06 07:42:06 +08:00
|
|
|
cont:
|
|
|
|
idx++;
|
|
|
|
}
|
|
|
|
rcu_read_unlock();
|
|
|
|
}
|
|
|
|
if (h == NETDEV_HASHENTRIES) {
|
|
|
|
if (inet6_netconf_fill_devconf(skb, NETCONFA_IFINDEX_ALL,
|
|
|
|
net->ipv6.devconf_all,
|
|
|
|
NETLINK_CB(cb->skb).portid,
|
|
|
|
cb->nlh->nlmsg_seq,
|
|
|
|
RTM_NEWNETCONF, NLM_F_MULTI,
|
2016-03-10 16:55:50 +08:00
|
|
|
NETCONFA_ALL) < 0)
|
2013-03-06 07:42:06 +08:00
|
|
|
goto done;
|
|
|
|
else
|
|
|
|
h++;
|
|
|
|
}
|
|
|
|
if (h == NETDEV_HASHENTRIES + 1) {
|
|
|
|
if (inet6_netconf_fill_devconf(skb, NETCONFA_IFINDEX_DEFAULT,
|
|
|
|
net->ipv6.devconf_dflt,
|
|
|
|
NETLINK_CB(cb->skb).portid,
|
|
|
|
cb->nlh->nlmsg_seq,
|
|
|
|
RTM_NEWNETCONF, NLM_F_MULTI,
|
2016-03-10 16:55:50 +08:00
|
|
|
NETCONFA_ALL) < 0)
|
2013-03-06 07:42:06 +08:00
|
|
|
goto done;
|
|
|
|
else
|
|
|
|
h++;
|
|
|
|
}
|
|
|
|
done:
|
|
|
|
cb->args[0] = h;
|
|
|
|
cb->args[1] = idx;
|
|
|
|
|
|
|
|
return skb->len;
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
#ifdef CONFIG_SYSCTL
|
|
|
|
static void dev_forward_change(struct inet6_dev *idev)
|
|
|
|
{
|
|
|
|
struct net_device *dev;
|
|
|
|
struct inet6_ifaddr *ifa;
|
|
|
|
|
|
|
|
if (!idev)
|
|
|
|
return;
|
|
|
|
dev = idev->dev;
|
2008-06-20 07:15:47 +08:00
|
|
|
if (idev->cnf.forwarding)
|
|
|
|
dev_disable_lro(dev);
|
2012-10-29 01:43:53 +08:00
|
|
|
if (dev->flags & IFF_MULTICAST) {
|
2013-02-10 11:50:18 +08:00
|
|
|
if (idev->cnf.forwarding) {
|
2008-04-10 14:42:11 +08:00
|
|
|
ipv6_dev_mc_inc(dev, &in6addr_linklocal_allrouters);
|
2013-02-10 11:50:18 +08:00
|
|
|
ipv6_dev_mc_inc(dev, &in6addr_interfacelocal_allrouters);
|
|
|
|
ipv6_dev_mc_inc(dev, &in6addr_sitelocal_allrouters);
|
|
|
|
} else {
|
2008-04-10 14:42:11 +08:00
|
|
|
ipv6_dev_mc_dec(dev, &in6addr_linklocal_allrouters);
|
2013-02-10 11:50:18 +08:00
|
|
|
ipv6_dev_mc_dec(dev, &in6addr_interfacelocal_allrouters);
|
|
|
|
ipv6_dev_mc_dec(dev, &in6addr_sitelocal_allrouters);
|
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2010-03-18 04:31:13 +08:00
|
|
|
|
|
|
|
list_for_each_entry(ifa, &idev->addr_list, if_list) {
|
2007-02-27 07:36:10 +08:00
|
|
|
if (ifa->flags&IFA_F_TENTATIVE)
|
|
|
|
continue;
|
2005-04-17 06:20:36 +08:00
|
|
|
if (idev->cnf.forwarding)
|
|
|
|
addrconf_join_anycast(ifa);
|
|
|
|
else
|
|
|
|
addrconf_leave_anycast(ifa);
|
|
|
|
}
|
2012-10-26 06:28:50 +08:00
|
|
|
inet6_netconf_notify_devconf(dev_net(dev), NETCONFA_FORWARDING,
|
|
|
|
dev->ifindex, &idev->cnf);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-01-11 09:43:50 +08:00
|
|
|
static void addrconf_forward_change(struct net *net, __s32 newf)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct net_device *dev;
|
|
|
|
struct inet6_dev *idev;
|
|
|
|
|
2012-08-14 16:54:51 +08:00
|
|
|
for_each_netdev(net, dev) {
|
2005-04-17 06:20:36 +08:00
|
|
|
idev = __in6_dev_get(dev);
|
|
|
|
if (idev) {
|
2008-01-11 09:43:50 +08:00
|
|
|
int changed = (!idev->cnf.forwarding) ^ (!newf);
|
|
|
|
idev->cnf.forwarding = newf;
|
2005-04-17 06:20:36 +08:00
|
|
|
if (changed)
|
|
|
|
dev_forward_change(idev);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2007-12-05 17:50:24 +08:00
|
|
|
|
2012-01-16 18:40:10 +08:00
|
|
|
static int addrconf_fixup_forwarding(struct ctl_table *table, int *p, int newf)
|
2007-12-05 17:50:24 +08:00
|
|
|
{
|
2008-01-11 09:42:13 +08:00
|
|
|
struct net *net;
|
2012-01-16 18:40:10 +08:00
|
|
|
int old;
|
|
|
|
|
|
|
|
if (!rtnl_trylock())
|
|
|
|
return restart_syscall();
|
2008-01-11 09:42:13 +08:00
|
|
|
|
|
|
|
net = (struct net *)table->extra2;
|
2012-01-16 18:40:10 +08:00
|
|
|
old = *p;
|
|
|
|
*p = newf;
|
2009-02-26 14:55:31 +08:00
|
|
|
|
2012-01-16 18:40:10 +08:00
|
|
|
if (p == &net->ipv6.devconf_dflt->forwarding) {
|
2012-10-26 06:28:50 +08:00
|
|
|
if ((!newf) ^ (!old))
|
|
|
|
inet6_netconf_notify_devconf(net, NETCONFA_FORWARDING,
|
|
|
|
NETCONFA_IFINDEX_DEFAULT,
|
|
|
|
net->ipv6.devconf_dflt);
|
2012-01-16 18:40:10 +08:00
|
|
|
rtnl_unlock();
|
|
|
|
return 0;
|
2010-02-19 21:22:59 +08:00
|
|
|
}
|
2007-12-05 17:50:24 +08:00
|
|
|
|
2008-01-11 09:43:50 +08:00
|
|
|
if (p == &net->ipv6.devconf_all->forwarding) {
|
2016-08-30 16:09:21 +08:00
|
|
|
int old_dflt = net->ipv6.devconf_dflt->forwarding;
|
|
|
|
|
2008-01-11 09:43:50 +08:00
|
|
|
net->ipv6.devconf_dflt->forwarding = newf;
|
2016-08-30 16:09:21 +08:00
|
|
|
if ((!newf) ^ (!old_dflt))
|
|
|
|
inet6_netconf_notify_devconf(net, NETCONFA_FORWARDING,
|
|
|
|
NETCONFA_IFINDEX_DEFAULT,
|
|
|
|
net->ipv6.devconf_dflt);
|
|
|
|
|
2008-01-11 09:43:50 +08:00
|
|
|
addrconf_forward_change(net, newf);
|
2012-10-26 06:28:50 +08:00
|
|
|
if ((!newf) ^ (!old))
|
|
|
|
inet6_netconf_notify_devconf(net, NETCONFA_FORWARDING,
|
|
|
|
NETCONFA_IFINDEX_ALL,
|
|
|
|
net->ipv6.devconf_all);
|
2012-01-16 18:40:10 +08:00
|
|
|
} else if ((!newf) ^ (!old))
|
2007-12-05 17:50:24 +08:00
|
|
|
dev_forward_change((struct inet6_dev *)table->extra1);
|
2008-06-20 07:15:47 +08:00
|
|
|
rtnl_unlock();
|
2007-12-05 17:50:24 +08:00
|
|
|
|
2012-01-16 18:40:10 +08:00
|
|
|
if (newf)
|
2008-03-05 05:47:14 +08:00
|
|
|
rt6_purge_dflt_routers(net);
|
2009-02-26 14:55:31 +08:00
|
|
|
return 1;
|
2007-12-05 17:50:24 +08:00
|
|
|
}
|
2015-08-13 22:39:01 +08:00
|
|
|
|
|
|
|
static void addrconf_linkdown_change(struct net *net, __s32 newf)
|
|
|
|
{
|
|
|
|
struct net_device *dev;
|
|
|
|
struct inet6_dev *idev;
|
|
|
|
|
|
|
|
for_each_netdev(net, dev) {
|
|
|
|
idev = __in6_dev_get(dev);
|
|
|
|
if (idev) {
|
|
|
|
int changed = (!idev->cnf.ignore_routes_with_linkdown) ^ (!newf);
|
|
|
|
|
|
|
|
idev->cnf.ignore_routes_with_linkdown = newf;
|
|
|
|
if (changed)
|
|
|
|
inet6_netconf_notify_devconf(dev_net(dev),
|
|
|
|
NETCONFA_IGNORE_ROUTES_WITH_LINKDOWN,
|
|
|
|
dev->ifindex,
|
|
|
|
&idev->cnf);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int addrconf_fixup_linkdown(struct ctl_table *table, int *p, int newf)
|
|
|
|
{
|
|
|
|
struct net *net;
|
|
|
|
int old;
|
|
|
|
|
|
|
|
if (!rtnl_trylock())
|
|
|
|
return restart_syscall();
|
|
|
|
|
|
|
|
net = (struct net *)table->extra2;
|
|
|
|
old = *p;
|
|
|
|
*p = newf;
|
|
|
|
|
|
|
|
if (p == &net->ipv6.devconf_dflt->ignore_routes_with_linkdown) {
|
|
|
|
if ((!newf) ^ (!old))
|
|
|
|
inet6_netconf_notify_devconf(net,
|
|
|
|
NETCONFA_IGNORE_ROUTES_WITH_LINKDOWN,
|
|
|
|
NETCONFA_IFINDEX_DEFAULT,
|
|
|
|
net->ipv6.devconf_dflt);
|
|
|
|
rtnl_unlock();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (p == &net->ipv6.devconf_all->ignore_routes_with_linkdown) {
|
|
|
|
net->ipv6.devconf_dflt->ignore_routes_with_linkdown = newf;
|
|
|
|
addrconf_linkdown_change(net, newf);
|
|
|
|
if ((!newf) ^ (!old))
|
|
|
|
inet6_netconf_notify_devconf(net,
|
|
|
|
NETCONFA_IGNORE_ROUTES_WITH_LINKDOWN,
|
|
|
|
NETCONFA_IFINDEX_ALL,
|
|
|
|
net->ipv6.devconf_all);
|
|
|
|
}
|
|
|
|
rtnl_unlock();
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
#endif
|
|
|
|
|
2010-03-18 04:31:11 +08:00
|
|
|
/* Nobody refers to this ifaddr, destroy it */
|
2005-04-17 06:20:36 +08:00
|
|
|
void inet6_ifa_finish_destroy(struct inet6_ifaddr *ifp)
|
|
|
|
{
|
2010-03-18 04:31:10 +08:00
|
|
|
WARN_ON(!hlist_unhashed(&ifp->addr_lst));
|
2008-07-26 12:43:18 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
#ifdef NET_REFCNT_DEBUG
|
2012-05-15 22:11:54 +08:00
|
|
|
pr_debug("%s\n", __func__);
|
2005-04-17 06:20:36 +08:00
|
|
|
#endif
|
|
|
|
|
|
|
|
in6_dev_put(ifp->idev);
|
|
|
|
|
2014-03-28 01:28:07 +08:00
|
|
|
if (cancel_delayed_work(&ifp->dad_work))
|
|
|
|
pr_notice("delayed DAD work was pending while freeing ifa=%p\n",
|
|
|
|
ifp);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2010-05-19 06:36:06 +08:00
|
|
|
if (ifp->state != INET6_IFADDR_STATE_DEAD) {
|
2012-05-15 22:11:53 +08:00
|
|
|
pr_warn("Freeing alive inet6 address %p\n", ifp);
|
2005-04-17 06:20:36 +08:00
|
|
|
return;
|
|
|
|
}
|
2012-10-29 08:13:19 +08:00
|
|
|
ip6_rt_put(ifp->rt);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2011-03-15 18:00:14 +08:00
|
|
|
kfree_rcu(ifp, rcu);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2006-07-11 06:25:51 +08:00
|
|
|
static void
|
|
|
|
ipv6_link_dev_addr(struct inet6_dev *idev, struct inet6_ifaddr *ifp)
|
|
|
|
{
|
2010-03-18 04:31:13 +08:00
|
|
|
struct list_head *p;
|
2006-07-12 04:05:30 +08:00
|
|
|
int ifp_scope = ipv6_addr_src_scope(&ifp->addr);
|
2006-07-11 06:25:51 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Each device address list is sorted in order of scope -
|
|
|
|
* global before linklocal.
|
|
|
|
*/
|
2010-03-18 04:31:13 +08:00
|
|
|
list_for_each(p, &idev->addr_list) {
|
|
|
|
struct inet6_ifaddr *ifa
|
|
|
|
= list_entry(p, struct inet6_ifaddr, if_list);
|
2006-07-12 04:05:30 +08:00
|
|
|
if (ifp_scope >= ipv6_addr_src_scope(&ifa->addr))
|
2006-07-11 06:25:51 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2010-03-26 12:25:30 +08:00
|
|
|
list_add_tail(&ifp->if_list, p);
|
2006-07-11 06:25:51 +08:00
|
|
|
}
|
|
|
|
|
2012-07-18 16:11:12 +08:00
|
|
|
static u32 inet6_addr_hash(const struct in6_addr *addr)
|
2008-04-10 14:42:08 +08:00
|
|
|
{
|
2012-07-18 16:11:12 +08:00
|
|
|
return hash_32(ipv6_addr_hash(addr), IN6_ADDR_HSIZE_SHIFT);
|
2008-04-10 14:42:08 +08:00
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/* On success it returns ifp with increased reference count */
|
|
|
|
|
|
|
|
static struct inet6_ifaddr *
|
2013-08-01 16:41:27 +08:00
|
|
|
ipv6_add_addr(struct inet6_dev *idev, const struct in6_addr *addr,
|
|
|
|
const struct in6_addr *peer_addr, int pfxlen,
|
2013-08-01 16:41:28 +08:00
|
|
|
int scope, u32 flags, u32 valid_lft, u32 prefered_lft)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct inet6_ifaddr *ifa = NULL;
|
|
|
|
struct rt6_info *rt;
|
2010-03-18 04:31:12 +08:00
|
|
|
unsigned int hash;
|
2005-04-17 06:20:36 +08:00
|
|
|
int err = 0;
|
2008-06-25 15:26:47 +08:00
|
|
|
int addr_type = ipv6_addr_type(addr);
|
|
|
|
|
|
|
|
if (addr_type == IPV6_ADDR_ANY ||
|
|
|
|
addr_type & IPV6_ADDR_MULTICAST ||
|
|
|
|
(!(idev->dev->flags & IFF_LOOPBACK) &&
|
|
|
|
addr_type & IPV6_ADDR_LOOPBACK))
|
|
|
|
return ERR_PTR(-EADDRNOTAVAIL);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2006-09-23 05:44:24 +08:00
|
|
|
rcu_read_lock_bh();
|
2005-04-17 06:20:36 +08:00
|
|
|
if (idev->dead) {
|
|
|
|
err = -ENODEV; /*XXX*/
|
|
|
|
goto out2;
|
|
|
|
}
|
|
|
|
|
2009-06-01 18:07:33 +08:00
|
|
|
if (idev->cnf.disable_ipv6) {
|
2009-03-19 09:22:48 +08:00
|
|
|
err = -EACCES;
|
|
|
|
goto out2;
|
|
|
|
}
|
|
|
|
|
2010-03-18 04:31:11 +08:00
|
|
|
spin_lock(&addrconf_hash_lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
/* Ignore adding duplicate addresses on an interface */
|
2008-03-25 20:47:49 +08:00
|
|
|
if (ipv6_chk_same_addr(dev_net(idev->dev), addr, idev->dev)) {
|
2013-08-17 10:27:04 +08:00
|
|
|
ADBG("ipv6_add_addr: already assigned\n");
|
2005-04-17 06:20:36 +08:00
|
|
|
err = -EEXIST;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2006-03-21 15:01:47 +08:00
|
|
|
ifa = kzalloc(sizeof(struct inet6_ifaddr), GFP_ATOMIC);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!ifa) {
|
2013-08-17 10:27:04 +08:00
|
|
|
ADBG("ipv6_add_addr: malloc failed\n");
|
2005-04-17 06:20:36 +08:00
|
|
|
err = -ENOBUFS;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2011-12-07 05:48:14 +08:00
|
|
|
rt = addrconf_dst_alloc(idev, addr, false);
|
2005-04-17 06:20:36 +08:00
|
|
|
if (IS_ERR(rt)) {
|
|
|
|
err = PTR_ERR(rt);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2013-12-08 02:26:57 +08:00
|
|
|
neigh_parms_data_state_setall(idev->nd_parms);
|
|
|
|
|
2011-11-21 11:39:03 +08:00
|
|
|
ifa->addr = *addr;
|
2013-08-01 16:41:27 +08:00
|
|
|
if (peer_addr)
|
|
|
|
ifa->peer_addr = *peer_addr;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
spin_lock_init(&ifa->lock);
|
2014-03-28 01:28:07 +08:00
|
|
|
INIT_DELAYED_WORK(&ifa->dad_work, addrconf_dad_work);
|
2010-03-18 04:31:10 +08:00
|
|
|
INIT_HLIST_NODE(&ifa->addr_lst);
|
2005-04-17 06:20:36 +08:00
|
|
|
ifa->scope = scope;
|
|
|
|
ifa->prefix_len = pfxlen;
|
|
|
|
ifa->flags = flags | IFA_F_TENTATIVE;
|
2013-08-01 16:41:28 +08:00
|
|
|
ifa->valid_lft = valid_lft;
|
|
|
|
ifa->prefered_lft = prefered_lft;
|
2005-04-17 06:20:36 +08:00
|
|
|
ifa->cstamp = ifa->tstamp = jiffies;
|
2013-04-09 11:47:16 +08:00
|
|
|
ifa->tokenized = false;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2006-08-29 17:43:49 +08:00
|
|
|
ifa->rt = rt;
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
ifa->idev = idev;
|
|
|
|
in6_dev_hold(idev);
|
|
|
|
/* For caller */
|
|
|
|
in6_ifa_hold(ifa);
|
|
|
|
|
|
|
|
/* Add to big hash table */
|
2012-07-18 16:11:12 +08:00
|
|
|
hash = inet6_addr_hash(addr);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2010-03-18 04:31:11 +08:00
|
|
|
hlist_add_head_rcu(&ifa->addr_lst, &inet6_addr_lst[hash]);
|
|
|
|
spin_unlock(&addrconf_hash_lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
write_lock(&idev->lock);
|
|
|
|
/* Add to inet6_dev unicast addr list. */
|
2006-07-11 06:25:51 +08:00
|
|
|
ipv6_link_dev_addr(idev, ifa);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
if (ifa->flags&IFA_F_TEMPORARY) {
|
2010-03-18 04:31:09 +08:00
|
|
|
list_add(&ifa->tmp_list, &idev->tempaddr_list);
|
2005-04-17 06:20:36 +08:00
|
|
|
in6_ifa_hold(ifa);
|
|
|
|
}
|
|
|
|
|
|
|
|
in6_ifa_hold(ifa);
|
|
|
|
write_unlock(&idev->lock);
|
|
|
|
out2:
|
2006-09-23 05:44:24 +08:00
|
|
|
rcu_read_unlock_bh();
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2005-04-20 13:27:09 +08:00
|
|
|
if (likely(err == 0))
|
2013-04-14 23:18:43 +08:00
|
|
|
inet6addr_notifier_call_chain(NETDEV_UP, ifa);
|
2005-04-17 06:20:36 +08:00
|
|
|
else {
|
|
|
|
kfree(ifa);
|
|
|
|
ifa = ERR_PTR(err);
|
|
|
|
}
|
|
|
|
|
|
|
|
return ifa;
|
|
|
|
out:
|
2010-03-18 04:31:11 +08:00
|
|
|
spin_unlock(&addrconf_hash_lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
goto out2;
|
|
|
|
}
|
|
|
|
|
2014-01-15 22:36:59 +08:00
|
|
|
enum cleanup_prefix_rt_t {
|
|
|
|
CLEANUP_PREFIX_RT_NOP, /* no cleanup action for prefix route */
|
|
|
|
CLEANUP_PREFIX_RT_DEL, /* delete the prefix route */
|
|
|
|
CLEANUP_PREFIX_RT_EXPIRE, /* update the lifetime of the prefix route */
|
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check, whether the prefix for ifp would still need a prefix route
|
|
|
|
* after deleting ifp. The function returns one of the CLEANUP_PREFIX_RT_*
|
|
|
|
* constants.
|
|
|
|
*
|
|
|
|
* 1) we don't purge prefix if address was not permanent.
|
|
|
|
* prefix is managed by its own lifetime.
|
|
|
|
* 2) we also don't purge, if the address was IFA_F_NOPREFIXROUTE.
|
|
|
|
* 3) if there are no addresses, delete prefix.
|
|
|
|
* 4) if there are still other permanent address(es),
|
|
|
|
* corresponding prefix is still permanent.
|
|
|
|
* 5) if there are still other addresses with IFA_F_NOPREFIXROUTE,
|
|
|
|
* don't purge the prefix, assume user space is managing it.
|
|
|
|
* 6) otherwise, update prefix lifetime to the
|
|
|
|
* longest valid lifetime among the corresponding
|
|
|
|
* addresses on the device.
|
|
|
|
* Note: subsequent RA will update lifetime.
|
|
|
|
**/
|
|
|
|
static enum cleanup_prefix_rt_t
|
|
|
|
check_cleanup_prefix_route(struct inet6_ifaddr *ifp, unsigned long *expires)
|
|
|
|
{
|
|
|
|
struct inet6_ifaddr *ifa;
|
|
|
|
struct inet6_dev *idev = ifp->idev;
|
|
|
|
unsigned long lifetime;
|
|
|
|
enum cleanup_prefix_rt_t action = CLEANUP_PREFIX_RT_DEL;
|
|
|
|
|
|
|
|
*expires = jiffies;
|
|
|
|
|
|
|
|
list_for_each_entry(ifa, &idev->addr_list, if_list) {
|
|
|
|
if (ifa == ifp)
|
|
|
|
continue;
|
|
|
|
if (!ipv6_prefix_equal(&ifa->addr, &ifp->addr,
|
|
|
|
ifp->prefix_len))
|
|
|
|
continue;
|
|
|
|
if (ifa->flags & (IFA_F_PERMANENT | IFA_F_NOPREFIXROUTE))
|
|
|
|
return CLEANUP_PREFIX_RT_NOP;
|
|
|
|
|
|
|
|
action = CLEANUP_PREFIX_RT_EXPIRE;
|
|
|
|
|
|
|
|
spin_lock(&ifa->lock);
|
|
|
|
|
|
|
|
lifetime = addrconf_timeout_fixup(ifa->valid_lft, HZ);
|
|
|
|
/*
|
|
|
|
* Note: Because this address is
|
|
|
|
* not permanent, lifetime <
|
|
|
|
* LONG_MAX / HZ here.
|
|
|
|
*/
|
|
|
|
if (time_before(*expires, ifa->tstamp + lifetime * HZ))
|
|
|
|
*expires = ifa->tstamp + lifetime * HZ;
|
|
|
|
spin_unlock(&ifa->lock);
|
|
|
|
}
|
|
|
|
|
|
|
|
return action;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
cleanup_prefix_route(struct inet6_ifaddr *ifp, unsigned long expires, bool del_rt)
|
|
|
|
{
|
|
|
|
struct rt6_info *rt;
|
|
|
|
|
|
|
|
rt = addrconf_get_prefix_route(&ifp->addr,
|
|
|
|
ifp->prefix_len,
|
|
|
|
ifp->idev->dev,
|
|
|
|
0, RTF_GATEWAY | RTF_DEFAULT);
|
|
|
|
if (rt) {
|
|
|
|
if (del_rt)
|
|
|
|
ip6_del_rt(rt);
|
|
|
|
else {
|
|
|
|
if (!(rt->rt6i_flags & RTF_EXPIRES))
|
|
|
|
rt6_set_expires(rt, expires);
|
|
|
|
ip6_rt_put(rt);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/* This function wants to get referenced ifp and releases it before return */
|
|
|
|
|
|
|
|
static void ipv6_del_addr(struct inet6_ifaddr *ifp)
|
|
|
|
{
|
2010-05-19 06:54:18 +08:00
|
|
|
int state;
|
2014-01-15 22:36:59 +08:00
|
|
|
enum cleanup_prefix_rt_t action = CLEANUP_PREFIX_RT_NOP;
|
|
|
|
unsigned long expires;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2014-03-28 01:28:07 +08:00
|
|
|
ASSERT_RTNL();
|
|
|
|
|
2015-03-24 06:36:03 +08:00
|
|
|
spin_lock_bh(&ifp->lock);
|
2010-05-19 06:54:18 +08:00
|
|
|
state = ifp->state;
|
2010-05-19 06:36:06 +08:00
|
|
|
ifp->state = INET6_IFADDR_STATE_DEAD;
|
2015-03-24 06:36:03 +08:00
|
|
|
spin_unlock_bh(&ifp->lock);
|
2010-05-19 06:54:18 +08:00
|
|
|
|
|
|
|
if (state == INET6_IFADDR_STATE_DEAD)
|
|
|
|
goto out;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2010-03-18 04:31:11 +08:00
|
|
|
spin_lock_bh(&addrconf_hash_lock);
|
|
|
|
hlist_del_init_rcu(&ifp->addr_lst);
|
|
|
|
spin_unlock_bh(&addrconf_hash_lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2014-01-15 22:36:59 +08:00
|
|
|
write_lock_bh(&ifp->idev->lock);
|
2013-10-29 08:07:50 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
if (ifp->flags&IFA_F_TEMPORARY) {
|
2010-03-18 04:31:09 +08:00
|
|
|
list_del(&ifp->tmp_list);
|
|
|
|
if (ifp->ifpub) {
|
|
|
|
in6_ifa_put(ifp->ifpub);
|
|
|
|
ifp->ifpub = NULL;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2010-03-18 04:31:09 +08:00
|
|
|
__in6_ifa_put(ifp);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2014-01-15 22:36:59 +08:00
|
|
|
if (ifp->flags & IFA_F_PERMANENT && !(ifp->flags & IFA_F_NOPREFIXROUTE))
|
|
|
|
action = check_cleanup_prefix_route(ifp, &expires);
|
2010-03-18 04:31:13 +08:00
|
|
|
|
2014-01-15 22:36:59 +08:00
|
|
|
list_del_init(&ifp->if_list);
|
|
|
|
__in6_ifa_put(ifp);
|
|
|
|
|
|
|
|
write_unlock_bh(&ifp->idev->lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2014-03-28 01:28:07 +08:00
|
|
|
addrconf_del_dad_work(ifp);
|
2008-07-09 06:13:31 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
ipv6_ifa_notify(RTM_DELADDR, ifp);
|
|
|
|
|
2013-04-14 23:18:43 +08:00
|
|
|
inet6addr_notifier_call_chain(NETDEV_DOWN, ifp);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2014-01-15 22:36:59 +08:00
|
|
|
if (action != CLEANUP_PREFIX_RT_NOP) {
|
|
|
|
cleanup_prefix_route(ifp, expires,
|
|
|
|
action == CLEANUP_PREFIX_RT_DEL);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2011-04-14 05:10:57 +08:00
|
|
|
/* clean up prefsrc entries */
|
|
|
|
rt6_remove_prefsrc(ifp);
|
2010-05-19 06:54:18 +08:00
|
|
|
out:
|
2005-04-17 06:20:36 +08:00
|
|
|
in6_ifa_put(ifp);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ipv6_create_tempaddr(struct inet6_ifaddr *ifp, struct inet6_ifaddr *ift)
|
|
|
|
{
|
|
|
|
struct inet6_dev *idev = ifp->idev;
|
|
|
|
struct in6_addr addr, *tmpaddr;
|
2011-07-26 21:50:49 +08:00
|
|
|
unsigned long tmp_prefered_lft, tmp_valid_lft, tmp_tstamp, age;
|
2008-04-02 15:01:35 +08:00
|
|
|
unsigned long regen_advance;
|
2005-04-17 06:20:36 +08:00
|
|
|
int tmp_plen;
|
|
|
|
int ret = 0;
|
2007-04-26 08:08:10 +08:00
|
|
|
u32 addr_flags;
|
2011-07-26 21:50:49 +08:00
|
|
|
unsigned long now = jiffies;
|
2016-10-14 00:52:15 +08:00
|
|
|
long max_desync_factor;
|
2016-10-20 18:29:26 +08:00
|
|
|
s32 cnf_temp_preferred_lft;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2013-12-06 16:45:22 +08:00
|
|
|
write_lock_bh(&idev->lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
if (ift) {
|
|
|
|
spin_lock_bh(&ift->lock);
|
|
|
|
memcpy(&addr.s6_addr[8], &ift->addr.s6_addr[8], 8);
|
|
|
|
spin_unlock_bh(&ift->lock);
|
|
|
|
tmpaddr = &addr;
|
|
|
|
} else {
|
|
|
|
tmpaddr = NULL;
|
|
|
|
}
|
|
|
|
retry:
|
|
|
|
in6_dev_hold(idev);
|
|
|
|
if (idev->cnf.use_tempaddr <= 0) {
|
2013-12-06 16:45:22 +08:00
|
|
|
write_unlock_bh(&idev->lock);
|
2012-05-15 22:11:53 +08:00
|
|
|
pr_info("%s: use_tempaddr is disabled\n", __func__);
|
2005-04-17 06:20:36 +08:00
|
|
|
in6_dev_put(idev);
|
|
|
|
ret = -1;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
spin_lock_bh(&ifp->lock);
|
|
|
|
if (ifp->regen_count++ >= idev->cnf.regen_max_retry) {
|
|
|
|
idev->cnf.use_tempaddr = -1; /*XXX*/
|
|
|
|
spin_unlock_bh(&ifp->lock);
|
2013-12-06 16:45:22 +08:00
|
|
|
write_unlock_bh(&idev->lock);
|
2012-05-15 22:11:53 +08:00
|
|
|
pr_warn("%s: regeneration time exceeded - disabled temporary address support\n",
|
|
|
|
__func__);
|
2005-04-17 06:20:36 +08:00
|
|
|
in6_dev_put(idev);
|
|
|
|
ret = -1;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
in6_ifa_hold(ifp);
|
|
|
|
memcpy(addr.s6_addr, ifp->addr.s6_addr, 8);
|
2016-10-14 00:50:02 +08:00
|
|
|
ipv6_try_regen_rndid(idev, tmpaddr);
|
2005-04-17 06:20:36 +08:00
|
|
|
memcpy(&addr.s6_addr[8], idev->rndid, 8);
|
2011-07-26 21:50:49 +08:00
|
|
|
age = (now - ifp->tstamp) / HZ;
|
2016-10-14 00:52:15 +08:00
|
|
|
|
|
|
|
regen_advance = idev->cnf.regen_max_retry *
|
|
|
|
idev->cnf.dad_transmits *
|
|
|
|
NEIGH_VAR(idev->nd_parms, RETRANS_TIME) / HZ;
|
|
|
|
|
|
|
|
/* recalculate max_desync_factor each time and update
|
|
|
|
* idev->desync_factor if it's larger
|
|
|
|
*/
|
2016-10-20 18:29:26 +08:00
|
|
|
cnf_temp_preferred_lft = READ_ONCE(idev->cnf.temp_prefered_lft);
|
2016-10-14 00:52:15 +08:00
|
|
|
max_desync_factor = min_t(__u32,
|
|
|
|
idev->cnf.max_desync_factor,
|
2016-10-20 18:29:26 +08:00
|
|
|
cnf_temp_preferred_lft - regen_advance);
|
2016-10-14 00:52:15 +08:00
|
|
|
|
|
|
|
if (unlikely(idev->desync_factor > max_desync_factor)) {
|
|
|
|
if (max_desync_factor > 0) {
|
|
|
|
get_random_bytes(&idev->desync_factor,
|
|
|
|
sizeof(idev->desync_factor));
|
|
|
|
idev->desync_factor %= max_desync_factor;
|
|
|
|
} else {
|
|
|
|
idev->desync_factor = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
tmp_valid_lft = min_t(__u32,
|
|
|
|
ifp->valid_lft,
|
2010-09-27 15:10:10 +08:00
|
|
|
idev->cnf.temp_valid_lft + age);
|
2016-10-20 18:29:26 +08:00
|
|
|
tmp_prefered_lft = cnf_temp_preferred_lft + age -
|
2016-10-14 00:52:15 +08:00
|
|
|
idev->desync_factor;
|
|
|
|
tmp_prefered_lft = min_t(__u32, ifp->prefered_lft, tmp_prefered_lft);
|
2005-04-17 06:20:36 +08:00
|
|
|
tmp_plen = ifp->prefix_len;
|
|
|
|
tmp_tstamp = ifp->tstamp;
|
|
|
|
spin_unlock_bh(&ifp->lock);
|
|
|
|
|
2013-12-06 16:45:22 +08:00
|
|
|
write_unlock_bh(&idev->lock);
|
2007-04-26 08:08:10 +08:00
|
|
|
|
2008-04-02 15:01:35 +08:00
|
|
|
/* A temporary address is created only if this calculated Preferred
|
|
|
|
* Lifetime is greater than REGEN_ADVANCE time units. In particular,
|
|
|
|
* an implementation must not create a temporary address with a zero
|
|
|
|
* Preferred Lifetime.
|
2014-03-13 05:13:19 +08:00
|
|
|
* Use age calculation as in addrconf_verify to avoid unnecessary
|
|
|
|
* temporary addresses being generated.
|
2008-04-02 15:01:35 +08:00
|
|
|
*/
|
2014-03-13 05:13:19 +08:00
|
|
|
age = (now - tmp_tstamp + ADDRCONF_TIMER_FUZZ_MINUS) / HZ;
|
|
|
|
if (tmp_prefered_lft <= regen_advance + age) {
|
2008-04-02 15:01:35 +08:00
|
|
|
in6_ifa_put(ifp);
|
|
|
|
in6_dev_put(idev);
|
|
|
|
ret = -1;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2007-04-26 08:08:10 +08:00
|
|
|
addr_flags = IFA_F_TEMPORARY;
|
|
|
|
/* set in addrconf_prefix_rcv() */
|
|
|
|
if (ifp->flags & IFA_F_OPTIMISTIC)
|
|
|
|
addr_flags |= IFA_F_OPTIMISTIC;
|
|
|
|
|
2013-08-16 19:02:27 +08:00
|
|
|
ift = ipv6_add_addr(idev, &addr, NULL, tmp_plen,
|
|
|
|
ipv6_addr_scope(&addr), addr_flags,
|
|
|
|
tmp_valid_lft, tmp_prefered_lft);
|
|
|
|
if (IS_ERR(ift)) {
|
2005-04-17 06:20:36 +08:00
|
|
|
in6_ifa_put(ifp);
|
|
|
|
in6_dev_put(idev);
|
2012-05-15 22:11:53 +08:00
|
|
|
pr_info("%s: retry temporary address regeneration\n", __func__);
|
2005-04-17 06:20:36 +08:00
|
|
|
tmpaddr = &addr;
|
2013-12-06 16:45:22 +08:00
|
|
|
write_lock_bh(&idev->lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
goto retry;
|
|
|
|
}
|
|
|
|
|
|
|
|
spin_lock_bh(&ift->lock);
|
|
|
|
ift->ifpub = ifp;
|
2011-07-26 21:50:49 +08:00
|
|
|
ift->cstamp = now;
|
2005-04-17 06:20:36 +08:00
|
|
|
ift->tstamp = tmp_tstamp;
|
|
|
|
spin_unlock_bh(&ift->lock);
|
|
|
|
|
2012-04-15 09:37:40 +08:00
|
|
|
addrconf_dad_start(ift);
|
2005-04-17 06:20:36 +08:00
|
|
|
in6_ifa_put(ift);
|
|
|
|
in6_dev_put(idev);
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2005-11-09 01:38:30 +08:00
|
|
|
* Choose an appropriate source address (RFC3484)
|
2005-04-17 06:20:36 +08:00
|
|
|
*/
|
2008-03-02 09:48:21 +08:00
|
|
|
enum {
|
|
|
|
IPV6_SADDR_RULE_INIT = 0,
|
|
|
|
IPV6_SADDR_RULE_LOCAL,
|
|
|
|
IPV6_SADDR_RULE_SCOPE,
|
|
|
|
IPV6_SADDR_RULE_PREFERRED,
|
|
|
|
#ifdef CONFIG_IPV6_MIP6
|
|
|
|
IPV6_SADDR_RULE_HOA,
|
|
|
|
#endif
|
|
|
|
IPV6_SADDR_RULE_OIF,
|
|
|
|
IPV6_SADDR_RULE_LABEL,
|
|
|
|
IPV6_SADDR_RULE_PRIVACY,
|
|
|
|
IPV6_SADDR_RULE_ORCHID,
|
|
|
|
IPV6_SADDR_RULE_PREFIX,
|
net: ipv6: Add a sysctl to make optimistic addresses useful candidates
Add a sysctl that causes an interface's optimistic addresses
to be considered equivalent to other non-deprecated addresses
for source address selection purposes. Preferred addresses
will still take precedence over optimistic addresses, subject
to other ranking in the source address selection algorithm.
This is useful where different interfaces are connected to
different networks from different ISPs (e.g., a cell network
and a home wifi network).
The current behaviour complies with RFC 3484/6724, and it
makes sense if the host has only one interface, or has
multiple interfaces on the same network (same or cooperating
administrative domain(s), but not in the multiple distinct
networks case.
For example, if a mobile device has an IPv6 address on an LTE
network and then connects to IPv6-enabled wifi, while the wifi
IPv6 address is undergoing DAD, IPv6 connections will try use
the wifi default route with the LTE IPv6 address, and will get
stuck until they time out.
Also, because optimistic nodes can receive frames, issue
an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
flag appropriately set). A second RTM_NEWADDR is sent if DAD
completes (the address flags have changed), otherwise an
RTM_DELADDR is sent.
Also: add an entry in ip-sysctl.txt for optimistic_dad.
Signed-off-by: Erik Kline <ek@google.com>
Acked-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-28 17:11:14 +08:00
|
|
|
#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
|
|
|
|
IPV6_SADDR_RULE_NOT_OPTIMISTIC,
|
|
|
|
#endif
|
2008-03-02 09:48:21 +08:00
|
|
|
IPV6_SADDR_RULE_MAX
|
|
|
|
};
|
|
|
|
|
2005-11-09 01:38:30 +08:00
|
|
|
struct ipv6_saddr_score {
|
2008-03-02 09:48:21 +08:00
|
|
|
int rule;
|
|
|
|
int addr_type;
|
|
|
|
struct inet6_ifaddr *ifa;
|
|
|
|
DECLARE_BITMAP(scorebits, IPV6_SADDR_RULE_MAX);
|
|
|
|
int scopedist;
|
|
|
|
int matchlen;
|
2005-11-09 01:38:30 +08:00
|
|
|
};
|
|
|
|
|
2008-03-02 09:48:21 +08:00
|
|
|
struct ipv6_saddr_dst {
|
[IPV6]: Make address arguments const.
- net/ipv6/addrconf.c:
ipv6_get_ifaddr(), ipv6_dev_get_saddr()
- net/ipv6/mcast.c:
ipv6_sock_mc_join(), ipv6_sock_mc_drop(),
inet6_mc_check(),
ipv6_dev_mc_inc(), __ipv6_dev_mc_dec(), ipv6_dev_mc_dec(),
ipv6_chk_mcast_addr()
- net/ipv6/route.c:
rt6_lookup(), icmp6_dst_alloc()
- net/ipv6/ip6_output.c:
ip6_nd_hdr()
- net/ipv6/ndisc.c:
ndisc_send_ns(), ndisc_send_rs(), ndisc_send_redirect(),
ndisc_get_neigh(), __ndisc_send()
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
2008-04-10 14:42:10 +08:00
|
|
|
const struct in6_addr *addr;
|
2008-03-02 09:48:21 +08:00
|
|
|
int ifindex;
|
|
|
|
int scope;
|
|
|
|
int label;
|
2008-03-25 08:37:42 +08:00
|
|
|
unsigned int prefs;
|
2008-03-02 09:48:21 +08:00
|
|
|
};
|
2005-11-09 01:38:30 +08:00
|
|
|
|
2007-03-23 03:27:49 +08:00
|
|
|
static inline int ipv6_saddr_preferred(int type)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2010-02-26 07:28:58 +08:00
|
|
|
if (type & (IPV6_ADDR_MAPPED|IPV6_ADDR_COMPATv4|IPV6_ADDR_LOOPBACK))
|
2005-11-09 01:38:30 +08:00
|
|
|
return 1;
|
|
|
|
return 0;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
net: ipv6: Add a sysctl to make optimistic addresses useful candidates
Add a sysctl that causes an interface's optimistic addresses
to be considered equivalent to other non-deprecated addresses
for source address selection purposes. Preferred addresses
will still take precedence over optimistic addresses, subject
to other ranking in the source address selection algorithm.
This is useful where different interfaces are connected to
different networks from different ISPs (e.g., a cell network
and a home wifi network).
The current behaviour complies with RFC 3484/6724, and it
makes sense if the host has only one interface, or has
multiple interfaces on the same network (same or cooperating
administrative domain(s), but not in the multiple distinct
networks case.
For example, if a mobile device has an IPv6 address on an LTE
network and then connects to IPv6-enabled wifi, while the wifi
IPv6 address is undergoing DAD, IPv6 connections will try use
the wifi default route with the LTE IPv6 address, and will get
stuck until they time out.
Also, because optimistic nodes can receive frames, issue
an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
flag appropriately set). A second RTM_NEWADDR is sent if DAD
completes (the address flags have changed), otherwise an
RTM_DELADDR is sent.
Also: add an entry in ip-sysctl.txt for optimistic_dad.
Signed-off-by: Erik Kline <ek@google.com>
Acked-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-28 17:11:14 +08:00
|
|
|
static inline bool ipv6_use_optimistic_addr(struct inet6_dev *idev)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
|
|
|
|
return idev && idev->cnf.optimistic_dad && idev->cnf.use_optimistic;
|
|
|
|
#else
|
|
|
|
return false;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2008-05-28 20:51:24 +08:00
|
|
|
static int ipv6_get_saddr_eval(struct net *net,
|
|
|
|
struct ipv6_saddr_score *score,
|
2008-03-02 09:48:21 +08:00
|
|
|
struct ipv6_saddr_dst *dst,
|
|
|
|
int i)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (i <= score->rule) {
|
|
|
|
switch (i) {
|
|
|
|
case IPV6_SADDR_RULE_SCOPE:
|
|
|
|
ret = score->scopedist;
|
|
|
|
break;
|
|
|
|
case IPV6_SADDR_RULE_PREFIX:
|
|
|
|
ret = score->matchlen;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ret = !!test_bit(i, score->scorebits);
|
|
|
|
}
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (i) {
|
|
|
|
case IPV6_SADDR_RULE_INIT:
|
|
|
|
/* Rule 0: remember if hiscore is not ready yet */
|
|
|
|
ret = !!score->ifa;
|
|
|
|
break;
|
|
|
|
case IPV6_SADDR_RULE_LOCAL:
|
|
|
|
/* Rule 1: Prefer same address */
|
|
|
|
ret = ipv6_addr_equal(&score->ifa->addr, dst->addr);
|
|
|
|
break;
|
|
|
|
case IPV6_SADDR_RULE_SCOPE:
|
|
|
|
/* Rule 2: Prefer appropriate scope
|
|
|
|
*
|
|
|
|
* ret
|
|
|
|
* ^
|
|
|
|
* -1 | d 15
|
|
|
|
* ---+--+-+---> scope
|
|
|
|
* |
|
|
|
|
* | d is scope of the destination.
|
|
|
|
* B-d | \
|
|
|
|
* | \ <- smaller scope is better if
|
2014-01-13 03:26:32 +08:00
|
|
|
* B-15 | \ if scope is enough for destination.
|
2008-03-02 09:48:21 +08:00
|
|
|
* | ret = B - scope (-1 <= scope >= d <= 15).
|
|
|
|
* d-C-1 | /
|
|
|
|
* |/ <- greater is better
|
|
|
|
* -C / if scope is not enough for destination.
|
|
|
|
* /| ret = scope - C (-1 <= d < scope <= 15).
|
|
|
|
*
|
|
|
|
* d - C - 1 < B -15 (for all -1 <= d <= 15).
|
|
|
|
* C > d + 14 - B >= 15 + 14 - B = 29 - B.
|
|
|
|
* Assume B = 0 and we get C > 29.
|
|
|
|
*/
|
|
|
|
ret = __ipv6_addr_src_scope(score->addr_type);
|
|
|
|
if (ret >= dst->scope)
|
|
|
|
ret = -ret;
|
|
|
|
else
|
|
|
|
ret -= 128; /* 30 is enough */
|
|
|
|
score->scopedist = ret;
|
|
|
|
break;
|
|
|
|
case IPV6_SADDR_RULE_PREFERRED:
|
net: ipv6: Add a sysctl to make optimistic addresses useful candidates
Add a sysctl that causes an interface's optimistic addresses
to be considered equivalent to other non-deprecated addresses
for source address selection purposes. Preferred addresses
will still take precedence over optimistic addresses, subject
to other ranking in the source address selection algorithm.
This is useful where different interfaces are connected to
different networks from different ISPs (e.g., a cell network
and a home wifi network).
The current behaviour complies with RFC 3484/6724, and it
makes sense if the host has only one interface, or has
multiple interfaces on the same network (same or cooperating
administrative domain(s), but not in the multiple distinct
networks case.
For example, if a mobile device has an IPv6 address on an LTE
network and then connects to IPv6-enabled wifi, while the wifi
IPv6 address is undergoing DAD, IPv6 connections will try use
the wifi default route with the LTE IPv6 address, and will get
stuck until they time out.
Also, because optimistic nodes can receive frames, issue
an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
flag appropriately set). A second RTM_NEWADDR is sent if DAD
completes (the address flags have changed), otherwise an
RTM_DELADDR is sent.
Also: add an entry in ip-sysctl.txt for optimistic_dad.
Signed-off-by: Erik Kline <ek@google.com>
Acked-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-28 17:11:14 +08:00
|
|
|
{
|
2008-03-02 09:48:21 +08:00
|
|
|
/* Rule 3: Avoid deprecated and optimistic addresses */
|
net: ipv6: Add a sysctl to make optimistic addresses useful candidates
Add a sysctl that causes an interface's optimistic addresses
to be considered equivalent to other non-deprecated addresses
for source address selection purposes. Preferred addresses
will still take precedence over optimistic addresses, subject
to other ranking in the source address selection algorithm.
This is useful where different interfaces are connected to
different networks from different ISPs (e.g., a cell network
and a home wifi network).
The current behaviour complies with RFC 3484/6724, and it
makes sense if the host has only one interface, or has
multiple interfaces on the same network (same or cooperating
administrative domain(s), but not in the multiple distinct
networks case.
For example, if a mobile device has an IPv6 address on an LTE
network and then connects to IPv6-enabled wifi, while the wifi
IPv6 address is undergoing DAD, IPv6 connections will try use
the wifi default route with the LTE IPv6 address, and will get
stuck until they time out.
Also, because optimistic nodes can receive frames, issue
an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
flag appropriately set). A second RTM_NEWADDR is sent if DAD
completes (the address flags have changed), otherwise an
RTM_DELADDR is sent.
Also: add an entry in ip-sysctl.txt for optimistic_dad.
Signed-off-by: Erik Kline <ek@google.com>
Acked-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-28 17:11:14 +08:00
|
|
|
u8 avoid = IFA_F_DEPRECATED;
|
|
|
|
|
|
|
|
if (!ipv6_use_optimistic_addr(score->ifa->idev))
|
|
|
|
avoid |= IFA_F_OPTIMISTIC;
|
2008-03-02 09:48:21 +08:00
|
|
|
ret = ipv6_saddr_preferred(score->addr_type) ||
|
net: ipv6: Add a sysctl to make optimistic addresses useful candidates
Add a sysctl that causes an interface's optimistic addresses
to be considered equivalent to other non-deprecated addresses
for source address selection purposes. Preferred addresses
will still take precedence over optimistic addresses, subject
to other ranking in the source address selection algorithm.
This is useful where different interfaces are connected to
different networks from different ISPs (e.g., a cell network
and a home wifi network).
The current behaviour complies with RFC 3484/6724, and it
makes sense if the host has only one interface, or has
multiple interfaces on the same network (same or cooperating
administrative domain(s), but not in the multiple distinct
networks case.
For example, if a mobile device has an IPv6 address on an LTE
network and then connects to IPv6-enabled wifi, while the wifi
IPv6 address is undergoing DAD, IPv6 connections will try use
the wifi default route with the LTE IPv6 address, and will get
stuck until they time out.
Also, because optimistic nodes can receive frames, issue
an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
flag appropriately set). A second RTM_NEWADDR is sent if DAD
completes (the address flags have changed), otherwise an
RTM_DELADDR is sent.
Also: add an entry in ip-sysctl.txt for optimistic_dad.
Signed-off-by: Erik Kline <ek@google.com>
Acked-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-28 17:11:14 +08:00
|
|
|
!(score->ifa->flags & avoid);
|
2008-03-02 09:48:21 +08:00
|
|
|
break;
|
net: ipv6: Add a sysctl to make optimistic addresses useful candidates
Add a sysctl that causes an interface's optimistic addresses
to be considered equivalent to other non-deprecated addresses
for source address selection purposes. Preferred addresses
will still take precedence over optimistic addresses, subject
to other ranking in the source address selection algorithm.
This is useful where different interfaces are connected to
different networks from different ISPs (e.g., a cell network
and a home wifi network).
The current behaviour complies with RFC 3484/6724, and it
makes sense if the host has only one interface, or has
multiple interfaces on the same network (same or cooperating
administrative domain(s), but not in the multiple distinct
networks case.
For example, if a mobile device has an IPv6 address on an LTE
network and then connects to IPv6-enabled wifi, while the wifi
IPv6 address is undergoing DAD, IPv6 connections will try use
the wifi default route with the LTE IPv6 address, and will get
stuck until they time out.
Also, because optimistic nodes can receive frames, issue
an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
flag appropriately set). A second RTM_NEWADDR is sent if DAD
completes (the address flags have changed), otherwise an
RTM_DELADDR is sent.
Also: add an entry in ip-sysctl.txt for optimistic_dad.
Signed-off-by: Erik Kline <ek@google.com>
Acked-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-28 17:11:14 +08:00
|
|
|
}
|
2008-03-02 09:48:21 +08:00
|
|
|
#ifdef CONFIG_IPV6_MIP6
|
|
|
|
case IPV6_SADDR_RULE_HOA:
|
2008-03-25 08:37:42 +08:00
|
|
|
{
|
2008-03-02 09:48:21 +08:00
|
|
|
/* Rule 4: Prefer home address */
|
2008-03-25 08:37:42 +08:00
|
|
|
int prefhome = !(dst->prefs & IPV6_PREFER_SRC_COA);
|
|
|
|
ret = !(score->ifa->flags & IFA_F_HOMEADDRESS) ^ prefhome;
|
2008-03-02 09:48:21 +08:00
|
|
|
break;
|
2008-03-25 08:37:42 +08:00
|
|
|
}
|
2008-03-02 09:48:21 +08:00
|
|
|
#endif
|
|
|
|
case IPV6_SADDR_RULE_OIF:
|
|
|
|
/* Rule 5: Prefer outgoing interface */
|
|
|
|
ret = (!dst->ifindex ||
|
|
|
|
dst->ifindex == score->ifa->idev->dev->ifindex);
|
|
|
|
break;
|
|
|
|
case IPV6_SADDR_RULE_LABEL:
|
|
|
|
/* Rule 6: Prefer matching label */
|
2008-05-28 20:51:24 +08:00
|
|
|
ret = ipv6_addr_label(net,
|
|
|
|
&score->ifa->addr, score->addr_type,
|
2008-03-02 09:48:21 +08:00
|
|
|
score->ifa->idev->dev->ifindex) == dst->label;
|
|
|
|
break;
|
|
|
|
case IPV6_SADDR_RULE_PRIVACY:
|
2008-03-25 08:37:42 +08:00
|
|
|
{
|
2008-03-02 09:48:21 +08:00
|
|
|
/* Rule 7: Prefer public address
|
2011-03-31 09:57:33 +08:00
|
|
|
* Note: prefer temporary address if use_tempaddr >= 2
|
2008-03-02 09:48:21 +08:00
|
|
|
*/
|
2008-03-25 08:37:42 +08:00
|
|
|
int preftmp = dst->prefs & (IPV6_PREFER_SRC_PUBLIC|IPV6_PREFER_SRC_TMP) ?
|
|
|
|
!!(dst->prefs & IPV6_PREFER_SRC_TMP) :
|
|
|
|
score->ifa->idev->cnf.use_tempaddr >= 2;
|
|
|
|
ret = (!(score->ifa->flags & IFA_F_TEMPORARY)) ^ preftmp;
|
2008-03-02 09:48:21 +08:00
|
|
|
break;
|
2008-03-25 08:37:42 +08:00
|
|
|
}
|
2008-03-02 09:48:21 +08:00
|
|
|
case IPV6_SADDR_RULE_ORCHID:
|
|
|
|
/* Rule 8-: Prefer ORCHID vs ORCHID or
|
|
|
|
* non-ORCHID vs non-ORCHID
|
|
|
|
*/
|
|
|
|
ret = !(ipv6_addr_orchid(&score->ifa->addr) ^
|
|
|
|
ipv6_addr_orchid(dst->addr));
|
|
|
|
break;
|
|
|
|
case IPV6_SADDR_RULE_PREFIX:
|
|
|
|
/* Rule 8: Use longest matching prefix */
|
2012-09-11 02:41:07 +08:00
|
|
|
ret = ipv6_addr_diff(&score->ifa->addr, dst->addr);
|
|
|
|
if (ret > score->ifa->prefix_len)
|
|
|
|
ret = score->ifa->prefix_len;
|
|
|
|
score->matchlen = ret;
|
2008-03-02 09:48:21 +08:00
|
|
|
break;
|
net: ipv6: Add a sysctl to make optimistic addresses useful candidates
Add a sysctl that causes an interface's optimistic addresses
to be considered equivalent to other non-deprecated addresses
for source address selection purposes. Preferred addresses
will still take precedence over optimistic addresses, subject
to other ranking in the source address selection algorithm.
This is useful where different interfaces are connected to
different networks from different ISPs (e.g., a cell network
and a home wifi network).
The current behaviour complies with RFC 3484/6724, and it
makes sense if the host has only one interface, or has
multiple interfaces on the same network (same or cooperating
administrative domain(s), but not in the multiple distinct
networks case.
For example, if a mobile device has an IPv6 address on an LTE
network and then connects to IPv6-enabled wifi, while the wifi
IPv6 address is undergoing DAD, IPv6 connections will try use
the wifi default route with the LTE IPv6 address, and will get
stuck until they time out.
Also, because optimistic nodes can receive frames, issue
an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
flag appropriately set). A second RTM_NEWADDR is sent if DAD
completes (the address flags have changed), otherwise an
RTM_DELADDR is sent.
Also: add an entry in ip-sysctl.txt for optimistic_dad.
Signed-off-by: Erik Kline <ek@google.com>
Acked-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-28 17:11:14 +08:00
|
|
|
#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
|
|
|
|
case IPV6_SADDR_RULE_NOT_OPTIMISTIC:
|
|
|
|
/* Optimistic addresses still have lower precedence than other
|
|
|
|
* preferred addresses.
|
|
|
|
*/
|
|
|
|
ret = !(score->ifa->flags & IFA_F_OPTIMISTIC);
|
|
|
|
break;
|
|
|
|
#endif
|
2008-03-02 09:48:21 +08:00
|
|
|
default:
|
|
|
|
ret = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ret)
|
|
|
|
__set_bit(i, score->scorebits);
|
|
|
|
score->rule = i;
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2015-07-13 22:28:10 +08:00
|
|
|
static int __ipv6_dev_get_saddr(struct net *net,
|
|
|
|
struct ipv6_saddr_dst *dst,
|
|
|
|
struct inet6_dev *idev,
|
|
|
|
struct ipv6_saddr_score *scores,
|
|
|
|
int hiscore_idx)
|
2015-07-10 15:58:31 +08:00
|
|
|
{
|
2015-07-13 22:28:10 +08:00
|
|
|
struct ipv6_saddr_score *score = &scores[1 - hiscore_idx], *hiscore = &scores[hiscore_idx];
|
2015-07-10 15:58:31 +08:00
|
|
|
|
|
|
|
read_lock_bh(&idev->lock);
|
|
|
|
list_for_each_entry(score->ifa, &idev->addr_list, if_list) {
|
|
|
|
int i;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* - Tentative Address (RFC2462 section 5.4)
|
|
|
|
* - A tentative address is not considered
|
|
|
|
* "assigned to an interface" in the traditional
|
|
|
|
* sense, unless it is also flagged as optimistic.
|
|
|
|
* - Candidate Source Address (section 4)
|
|
|
|
* - In any case, anycast addresses, multicast
|
|
|
|
* addresses, and the unspecified address MUST
|
|
|
|
* NOT be included in a candidate set.
|
|
|
|
*/
|
|
|
|
if ((score->ifa->flags & IFA_F_TENTATIVE) &&
|
|
|
|
(!(score->ifa->flags & IFA_F_OPTIMISTIC)))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
score->addr_type = __ipv6_addr_type(&score->ifa->addr);
|
|
|
|
|
|
|
|
if (unlikely(score->addr_type == IPV6_ADDR_ANY ||
|
|
|
|
score->addr_type & IPV6_ADDR_MULTICAST)) {
|
|
|
|
net_dbg_ratelimited("ADDRCONF: unspecified / multicast address assigned as unicast address on %s",
|
|
|
|
idev->dev->name);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
score->rule = -1;
|
|
|
|
bitmap_zero(score->scorebits, IPV6_SADDR_RULE_MAX);
|
|
|
|
|
|
|
|
for (i = 0; i < IPV6_SADDR_RULE_MAX; i++) {
|
|
|
|
int minihiscore, miniscore;
|
|
|
|
|
|
|
|
minihiscore = ipv6_get_saddr_eval(net, hiscore, dst, i);
|
|
|
|
miniscore = ipv6_get_saddr_eval(net, score, dst, i);
|
|
|
|
|
|
|
|
if (minihiscore > miniscore) {
|
|
|
|
if (i == IPV6_SADDR_RULE_SCOPE &&
|
|
|
|
score->scopedist > 0) {
|
|
|
|
/*
|
|
|
|
* special case:
|
|
|
|
* each remaining entry
|
|
|
|
* has too small (not enough)
|
|
|
|
* scope, because ifa entries
|
|
|
|
* are sorted by their scope
|
|
|
|
* values.
|
|
|
|
*/
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
} else if (minihiscore < miniscore) {
|
|
|
|
if (hiscore->ifa)
|
|
|
|
in6_ifa_put(hiscore->ifa);
|
|
|
|
|
|
|
|
in6_ifa_hold(score->ifa);
|
|
|
|
|
|
|
|
swap(hiscore, score);
|
2015-07-13 22:28:10 +08:00
|
|
|
hiscore_idx = 1 - hiscore_idx;
|
2015-07-10 15:58:31 +08:00
|
|
|
|
|
|
|
/* restore our iterator */
|
|
|
|
score->ifa = hiscore->ifa;
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
out:
|
|
|
|
read_unlock_bh(&idev->lock);
|
2015-07-13 22:28:10 +08:00
|
|
|
return hiscore_idx;
|
2015-07-10 15:58:31 +08:00
|
|
|
}
|
|
|
|
|
2016-06-17 07:24:26 +08:00
|
|
|
static int ipv6_get_saddr_master(struct net *net,
|
|
|
|
const struct net_device *dst_dev,
|
|
|
|
const struct net_device *master,
|
|
|
|
struct ipv6_saddr_dst *dst,
|
|
|
|
struct ipv6_saddr_score *scores,
|
|
|
|
int hiscore_idx)
|
|
|
|
{
|
|
|
|
struct inet6_dev *idev;
|
|
|
|
|
|
|
|
idev = __in6_dev_get(dst_dev);
|
|
|
|
if (idev)
|
|
|
|
hiscore_idx = __ipv6_dev_get_saddr(net, dst, idev,
|
|
|
|
scores, hiscore_idx);
|
|
|
|
|
|
|
|
idev = __in6_dev_get(master);
|
|
|
|
if (idev)
|
|
|
|
hiscore_idx = __ipv6_dev_get_saddr(net, dst, idev,
|
|
|
|
scores, hiscore_idx);
|
|
|
|
|
|
|
|
return hiscore_idx;
|
|
|
|
}
|
|
|
|
|
2012-08-27 01:14:14 +08:00
|
|
|
int ipv6_dev_get_saddr(struct net *net, const struct net_device *dst_dev,
|
[IPV6]: Make address arguments const.
- net/ipv6/addrconf.c:
ipv6_get_ifaddr(), ipv6_dev_get_saddr()
- net/ipv6/mcast.c:
ipv6_sock_mc_join(), ipv6_sock_mc_drop(),
inet6_mc_check(),
ipv6_dev_mc_inc(), __ipv6_dev_mc_dec(), ipv6_dev_mc_dec(),
ipv6_chk_mcast_addr()
- net/ipv6/route.c:
rt6_lookup(), icmp6_dst_alloc()
- net/ipv6/ip6_output.c:
ip6_nd_hdr()
- net/ipv6/ndisc.c:
ndisc_send_ns(), ndisc_send_rs(), ndisc_send_redirect(),
ndisc_get_neigh(), __ndisc_send()
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
2008-04-10 14:42:10 +08:00
|
|
|
const struct in6_addr *daddr, unsigned int prefs,
|
2008-03-25 08:37:42 +08:00
|
|
|
struct in6_addr *saddr)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2015-07-13 22:28:10 +08:00
|
|
|
struct ipv6_saddr_score scores[2], *hiscore;
|
2008-03-02 09:48:21 +08:00
|
|
|
struct ipv6_saddr_dst dst;
|
2015-07-10 15:58:31 +08:00
|
|
|
struct inet6_dev *idev;
|
2005-11-09 01:38:30 +08:00
|
|
|
struct net_device *dev;
|
2008-03-02 09:48:21 +08:00
|
|
|
int dst_type;
|
2015-07-10 15:58:31 +08:00
|
|
|
bool use_oif_addr = false;
|
2015-07-13 22:28:10 +08:00
|
|
|
int hiscore_idx = 0;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2008-03-02 09:48:21 +08:00
|
|
|
dst_type = __ipv6_addr_type(daddr);
|
|
|
|
dst.addr = daddr;
|
|
|
|
dst.ifindex = dst_dev ? dst_dev->ifindex : 0;
|
|
|
|
dst.scope = __ipv6_addr_src_scope(dst_type);
|
2008-05-28 20:51:24 +08:00
|
|
|
dst.label = ipv6_addr_label(net, daddr, dst_type, dst.ifindex);
|
2008-03-25 08:37:42 +08:00
|
|
|
dst.prefs = prefs;
|
2008-03-02 09:48:21 +08:00
|
|
|
|
2015-07-13 22:28:10 +08:00
|
|
|
scores[hiscore_idx].rule = -1;
|
|
|
|
scores[hiscore_idx].ifa = NULL;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2006-09-23 05:44:24 +08:00
|
|
|
rcu_read_lock();
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2015-07-10 15:58:31 +08:00
|
|
|
/* Candidate Source Address (section 4)
|
|
|
|
* - multicast and link-local destination address,
|
|
|
|
* the set of candidate source address MUST only
|
|
|
|
* include addresses assigned to interfaces
|
|
|
|
* belonging to the same link as the outgoing
|
|
|
|
* interface.
|
|
|
|
* (- For site-local destination addresses, the
|
|
|
|
* set of candidate source addresses MUST only
|
|
|
|
* include addresses assigned to interfaces
|
|
|
|
* belonging to the same site as the outgoing
|
|
|
|
* interface.)
|
2015-07-22 15:38:25 +08:00
|
|
|
* - "It is RECOMMENDED that the candidate source addresses
|
|
|
|
* be the set of unicast addresses assigned to the
|
|
|
|
* interface that will be used to send to the destination
|
|
|
|
* (the 'outgoing' interface)." (RFC 6724)
|
2015-07-10 15:58:31 +08:00
|
|
|
*/
|
|
|
|
if (dst_dev) {
|
2015-07-22 15:38:25 +08:00
|
|
|
idev = __in6_dev_get(dst_dev);
|
2015-07-10 15:58:31 +08:00
|
|
|
if ((dst_type & IPV6_ADDR_MULTICAST) ||
|
2015-07-22 15:38:25 +08:00
|
|
|
dst.scope <= IPV6_ADDR_SCOPE_LINKLOCAL ||
|
|
|
|
(idev && idev->cnf.use_oif_addrs_only)) {
|
2015-07-10 15:58:31 +08:00
|
|
|
use_oif_addr = true;
|
|
|
|
}
|
|
|
|
}
|
2008-03-02 09:48:21 +08:00
|
|
|
|
2015-07-10 15:58:31 +08:00
|
|
|
if (use_oif_addr) {
|
2015-07-13 22:28:10 +08:00
|
|
|
if (idev)
|
2015-07-16 15:51:30 +08:00
|
|
|
hiscore_idx = __ipv6_dev_get_saddr(net, &dst, idev, scores, hiscore_idx);
|
2015-07-10 15:58:31 +08:00
|
|
|
} else {
|
2016-06-17 07:24:26 +08:00
|
|
|
const struct net_device *master;
|
|
|
|
int master_idx = 0;
|
|
|
|
|
|
|
|
/* if dst_dev exists and is enslaved to an L3 device, then
|
|
|
|
* prefer addresses from dst_dev and then the master over
|
|
|
|
* any other enslaved devices in the L3 domain.
|
|
|
|
*/
|
|
|
|
master = l3mdev_master_dev_rcu(dst_dev);
|
|
|
|
if (master) {
|
|
|
|
master_idx = master->ifindex;
|
|
|
|
|
|
|
|
hiscore_idx = ipv6_get_saddr_master(net, dst_dev,
|
|
|
|
master, &dst,
|
|
|
|
scores, hiscore_idx);
|
|
|
|
|
|
|
|
if (scores[hiscore_idx].ifa)
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2015-07-10 15:58:31 +08:00
|
|
|
for_each_netdev_rcu(net, dev) {
|
2016-06-17 07:24:26 +08:00
|
|
|
/* only consider addresses on devices in the
|
|
|
|
* same L3 domain
|
|
|
|
*/
|
|
|
|
if (l3mdev_master_ifindex_rcu(dev) != master_idx)
|
|
|
|
continue;
|
2015-07-10 15:58:31 +08:00
|
|
|
idev = __in6_dev_get(dev);
|
|
|
|
if (!idev)
|
2005-11-09 01:38:30 +08:00
|
|
|
continue;
|
2015-07-16 15:51:30 +08:00
|
|
|
hiscore_idx = __ipv6_dev_get_saddr(net, &dst, idev, scores, hiscore_idx);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
}
|
2016-06-17 07:24:26 +08:00
|
|
|
|
|
|
|
out:
|
2006-09-23 05:44:24 +08:00
|
|
|
rcu_read_unlock();
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2015-07-13 22:28:10 +08:00
|
|
|
hiscore = &scores[hiscore_idx];
|
2008-03-02 09:48:21 +08:00
|
|
|
if (!hiscore->ifa)
|
2005-11-09 01:38:30 +08:00
|
|
|
return -EADDRNOTAVAIL;
|
2007-02-09 22:24:49 +08:00
|
|
|
|
2011-11-21 11:39:03 +08:00
|
|
|
*saddr = hiscore->ifa->addr;
|
2008-03-02 09:48:21 +08:00
|
|
|
in6_ifa_put(hiscore->ifa);
|
2005-11-09 01:38:30 +08:00
|
|
|
return 0;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2008-03-03 20:44:34 +08:00
|
|
|
EXPORT_SYMBOL(ipv6_dev_get_saddr);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2013-06-29 21:30:49 +08:00
|
|
|
int __ipv6_get_lladdr(struct inet6_dev *idev, struct in6_addr *addr,
|
2013-12-06 16:45:21 +08:00
|
|
|
u32 banned_flags)
|
2013-06-24 00:39:01 +08:00
|
|
|
{
|
|
|
|
struct inet6_ifaddr *ifp;
|
|
|
|
int err = -EADDRNOTAVAIL;
|
|
|
|
|
2014-01-20 04:58:19 +08:00
|
|
|
list_for_each_entry_reverse(ifp, &idev->addr_list, if_list) {
|
|
|
|
if (ifp->scope > IFA_LINK)
|
|
|
|
break;
|
2013-06-24 00:39:01 +08:00
|
|
|
if (ifp->scope == IFA_LINK &&
|
|
|
|
!(ifp->flags & banned_flags)) {
|
|
|
|
*addr = ifp->addr;
|
|
|
|
err = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2007-04-26 08:08:10 +08:00
|
|
|
int ipv6_get_lladdr(struct net_device *dev, struct in6_addr *addr,
|
2013-12-06 16:45:21 +08:00
|
|
|
u32 banned_flags)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct inet6_dev *idev;
|
|
|
|
int err = -EADDRNOTAVAIL;
|
|
|
|
|
2006-09-23 05:44:24 +08:00
|
|
|
rcu_read_lock();
|
2010-03-21 07:09:01 +08:00
|
|
|
idev = __in6_dev_get(dev);
|
|
|
|
if (idev) {
|
2005-04-17 06:20:36 +08:00
|
|
|
read_lock_bh(&idev->lock);
|
2013-06-24 00:39:01 +08:00
|
|
|
err = __ipv6_get_lladdr(idev, addr, banned_flags);
|
2005-04-17 06:20:36 +08:00
|
|
|
read_unlock_bh(&idev->lock);
|
|
|
|
}
|
2006-09-23 05:44:24 +08:00
|
|
|
rcu_read_unlock();
|
2005-04-17 06:20:36 +08:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ipv6_count_addresses(struct inet6_dev *idev)
|
|
|
|
{
|
|
|
|
int cnt = 0;
|
|
|
|
struct inet6_ifaddr *ifp;
|
|
|
|
|
|
|
|
read_lock_bh(&idev->lock);
|
2010-03-18 04:31:13 +08:00
|
|
|
list_for_each_entry(ifp, &idev->addr_list, if_list)
|
2005-04-17 06:20:36 +08:00
|
|
|
cnt++;
|
|
|
|
read_unlock_bh(&idev->lock);
|
|
|
|
return cnt;
|
|
|
|
}
|
|
|
|
|
2011-04-22 12:53:02 +08:00
|
|
|
int ipv6_chk_addr(struct net *net, const struct in6_addr *addr,
|
2013-05-17 11:56:10 +08:00
|
|
|
const struct net_device *dev, int strict)
|
2015-02-04 19:01:23 +08:00
|
|
|
{
|
|
|
|
return ipv6_chk_addr_and_flags(net, addr, dev, strict, IFA_F_TENTATIVE);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(ipv6_chk_addr);
|
|
|
|
|
|
|
|
int ipv6_chk_addr_and_flags(struct net *net, const struct in6_addr *addr,
|
|
|
|
const struct net_device *dev, int strict,
|
|
|
|
u32 banned_flags)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2010-05-18 13:27:12 +08:00
|
|
|
struct inet6_ifaddr *ifp;
|
2012-07-18 16:11:12 +08:00
|
|
|
unsigned int hash = inet6_addr_hash(addr);
|
2015-02-04 19:01:23 +08:00
|
|
|
u32 ifp_flags;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2010-03-18 04:31:11 +08:00
|
|
|
rcu_read_lock_bh();
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_rcu(ifp, &inet6_addr_lst[hash], addr_lst) {
|
2008-03-26 02:57:35 +08:00
|
|
|
if (!net_eq(dev_net(ifp->idev->dev), net))
|
2008-01-11 14:43:18 +08:00
|
|
|
continue;
|
2015-02-04 19:01:23 +08:00
|
|
|
/* Decouple optimistic from tentative for evaluation here.
|
|
|
|
* Ban optimistic addresses explicitly, when required.
|
|
|
|
*/
|
|
|
|
ifp_flags = (ifp->flags&IFA_F_OPTIMISTIC)
|
|
|
|
? (ifp->flags&~IFA_F_TENTATIVE)
|
|
|
|
: ifp->flags;
|
2005-04-17 06:20:36 +08:00
|
|
|
if (ipv6_addr_equal(&ifp->addr, addr) &&
|
2015-02-04 19:01:23 +08:00
|
|
|
!(ifp_flags&banned_flags) &&
|
2015-03-29 21:00:04 +08:00
|
|
|
(!dev || ifp->idev->dev == dev ||
|
2010-05-18 13:27:12 +08:00
|
|
|
!(ifp->scope&(IFA_LINK|IFA_HOST) || strict))) {
|
|
|
|
rcu_read_unlock_bh();
|
|
|
|
return 1;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
}
|
2010-03-18 04:31:11 +08:00
|
|
|
|
2010-05-18 13:27:12 +08:00
|
|
|
rcu_read_unlock_bh();
|
|
|
|
return 0;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2015-02-04 19:01:23 +08:00
|
|
|
EXPORT_SYMBOL(ipv6_chk_addr_and_flags);
|
2007-02-22 21:05:40 +08:00
|
|
|
|
2010-03-21 07:18:00 +08:00
|
|
|
static bool ipv6_chk_same_addr(struct net *net, const struct in6_addr *addr,
|
|
|
|
struct net_device *dev)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2012-07-18 16:11:12 +08:00
|
|
|
unsigned int hash = inet6_addr_hash(addr);
|
2010-03-18 04:31:10 +08:00
|
|
|
struct inet6_ifaddr *ifp;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry(ifp, &inet6_addr_lst[hash], addr_lst) {
|
2008-03-26 02:57:35 +08:00
|
|
|
if (!net_eq(dev_net(ifp->idev->dev), net))
|
2008-01-11 14:43:42 +08:00
|
|
|
continue;
|
2005-04-17 06:20:36 +08:00
|
|
|
if (ipv6_addr_equal(&ifp->addr, addr)) {
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!dev || ifp->idev->dev == dev)
|
2010-03-21 07:18:00 +08:00
|
|
|
return true;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
}
|
2010-03-21 07:18:00 +08:00
|
|
|
return false;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2013-09-24 04:04:19 +08:00
|
|
|
/* Compares an address/prefix_len with addresses on device @dev.
|
|
|
|
* If one is found it returns true.
|
|
|
|
*/
|
|
|
|
bool ipv6_chk_custom_prefix(const struct in6_addr *addr,
|
|
|
|
const unsigned int prefix_len, struct net_device *dev)
|
|
|
|
{
|
|
|
|
struct inet6_dev *idev;
|
|
|
|
struct inet6_ifaddr *ifa;
|
|
|
|
bool ret = false;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
idev = __in6_dev_get(dev);
|
|
|
|
if (idev) {
|
|
|
|
read_lock_bh(&idev->lock);
|
|
|
|
list_for_each_entry(ifa, &idev->addr_list, if_list) {
|
|
|
|
ret = ipv6_prefix_equal(addr, &ifa->addr, prefix_len);
|
|
|
|
if (ret)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
read_unlock_bh(&idev->lock);
|
|
|
|
}
|
|
|
|
rcu_read_unlock();
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(ipv6_chk_custom_prefix);
|
|
|
|
|
2011-04-22 12:53:02 +08:00
|
|
|
int ipv6_chk_prefix(const struct in6_addr *addr, struct net_device *dev)
|
2008-03-16 10:54:23 +08:00
|
|
|
{
|
|
|
|
struct inet6_dev *idev;
|
|
|
|
struct inet6_ifaddr *ifa;
|
|
|
|
int onlink;
|
|
|
|
|
|
|
|
onlink = 0;
|
|
|
|
rcu_read_lock();
|
|
|
|
idev = __in6_dev_get(dev);
|
|
|
|
if (idev) {
|
|
|
|
read_lock_bh(&idev->lock);
|
2010-03-18 04:31:13 +08:00
|
|
|
list_for_each_entry(ifa, &idev->addr_list, if_list) {
|
2008-03-16 10:54:23 +08:00
|
|
|
onlink = ipv6_prefix_equal(addr, &ifa->addr,
|
|
|
|
ifa->prefix_len);
|
|
|
|
if (onlink)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
read_unlock_bh(&idev->lock);
|
|
|
|
}
|
|
|
|
rcu_read_unlock();
|
|
|
|
return onlink;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(ipv6_chk_prefix);
|
|
|
|
|
[IPV6]: Make address arguments const.
- net/ipv6/addrconf.c:
ipv6_get_ifaddr(), ipv6_dev_get_saddr()
- net/ipv6/mcast.c:
ipv6_sock_mc_join(), ipv6_sock_mc_drop(),
inet6_mc_check(),
ipv6_dev_mc_inc(), __ipv6_dev_mc_dec(), ipv6_dev_mc_dec(),
ipv6_chk_mcast_addr()
- net/ipv6/route.c:
rt6_lookup(), icmp6_dst_alloc()
- net/ipv6/ip6_output.c:
ip6_nd_hdr()
- net/ipv6/ndisc.c:
ndisc_send_ns(), ndisc_send_rs(), ndisc_send_redirect(),
ndisc_get_neigh(), __ndisc_send()
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
2008-04-10 14:42:10 +08:00
|
|
|
struct inet6_ifaddr *ipv6_get_ifaddr(struct net *net, const struct in6_addr *addr,
|
2008-01-11 14:44:09 +08:00
|
|
|
struct net_device *dev, int strict)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2010-03-26 12:39:21 +08:00
|
|
|
struct inet6_ifaddr *ifp, *result = NULL;
|
2012-07-18 16:11:12 +08:00
|
|
|
unsigned int hash = inet6_addr_hash(addr);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2010-03-18 04:31:11 +08:00
|
|
|
rcu_read_lock_bh();
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_rcu_bh(ifp, &inet6_addr_lst[hash], addr_lst) {
|
2008-03-26 02:57:35 +08:00
|
|
|
if (!net_eq(dev_net(ifp->idev->dev), net))
|
2008-01-11 14:44:09 +08:00
|
|
|
continue;
|
2005-04-17 06:20:36 +08:00
|
|
|
if (ipv6_addr_equal(&ifp->addr, addr)) {
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!dev || ifp->idev->dev == dev ||
|
2005-04-17 06:20:36 +08:00
|
|
|
!(ifp->scope&(IFA_LINK|IFA_HOST) || strict)) {
|
2010-03-26 12:39:21 +08:00
|
|
|
result = ifp;
|
2005-04-17 06:20:36 +08:00
|
|
|
in6_ifa_hold(ifp);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2010-03-18 04:31:11 +08:00
|
|
|
rcu_read_unlock_bh();
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2010-03-26 12:39:21 +08:00
|
|
|
return result;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Gets referenced address, destroys ifaddr */
|
|
|
|
|
2009-09-09 22:41:32 +08:00
|
|
|
static void addrconf_dad_stop(struct inet6_ifaddr *ifp, int dad_failed)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2016-01-08 20:47:23 +08:00
|
|
|
if (dad_failed)
|
|
|
|
ifp->flags |= IFA_F_DADFAILED;
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
if (ifp->flags&IFA_F_PERMANENT) {
|
|
|
|
spin_lock_bh(&ifp->lock);
|
2014-03-28 01:28:07 +08:00
|
|
|
addrconf_del_dad_work(ifp);
|
2005-04-17 06:20:36 +08:00
|
|
|
ifp->flags |= IFA_F_TENTATIVE;
|
|
|
|
spin_unlock_bh(&ifp->lock);
|
2010-03-14 04:23:29 +08:00
|
|
|
if (dad_failed)
|
|
|
|
ipv6_ifa_notify(0, ifp);
|
2005-04-17 06:20:36 +08:00
|
|
|
in6_ifa_put(ifp);
|
|
|
|
} else if (ifp->flags&IFA_F_TEMPORARY) {
|
|
|
|
struct inet6_ifaddr *ifpub;
|
|
|
|
spin_lock_bh(&ifp->lock);
|
|
|
|
ifpub = ifp->ifpub;
|
|
|
|
if (ifpub) {
|
|
|
|
in6_ifa_hold(ifpub);
|
|
|
|
spin_unlock_bh(&ifp->lock);
|
|
|
|
ipv6_create_tempaddr(ifpub, ifp);
|
|
|
|
in6_ifa_put(ifpub);
|
|
|
|
} else {
|
|
|
|
spin_unlock_bh(&ifp->lock);
|
|
|
|
}
|
|
|
|
ipv6_del_addr(ifp);
|
2014-03-28 01:28:07 +08:00
|
|
|
} else {
|
2005-04-17 06:20:36 +08:00
|
|
|
ipv6_del_addr(ifp);
|
2014-03-28 01:28:07 +08:00
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2010-05-19 06:55:27 +08:00
|
|
|
static int addrconf_dad_end(struct inet6_ifaddr *ifp)
|
|
|
|
{
|
|
|
|
int err = -ENOENT;
|
|
|
|
|
2015-03-24 06:36:03 +08:00
|
|
|
spin_lock_bh(&ifp->lock);
|
2010-05-19 06:55:27 +08:00
|
|
|
if (ifp->state == INET6_IFADDR_STATE_DAD) {
|
|
|
|
ifp->state = INET6_IFADDR_STATE_POSTDAD;
|
|
|
|
err = 0;
|
|
|
|
}
|
2015-03-24 06:36:03 +08:00
|
|
|
spin_unlock_bh(&ifp->lock);
|
2010-05-19 06:55:27 +08:00
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2005-12-21 21:57:24 +08:00
|
|
|
void addrconf_dad_failure(struct inet6_ifaddr *ifp)
|
|
|
|
{
|
2008-06-28 13:18:38 +08:00
|
|
|
struct inet6_dev *idev = ifp->idev;
|
2015-03-24 06:36:05 +08:00
|
|
|
struct net *net = dev_net(ifp->idev->dev);
|
2009-03-19 09:22:48 +08:00
|
|
|
|
2010-10-25 07:06:43 +08:00
|
|
|
if (addrconf_dad_end(ifp)) {
|
|
|
|
in6_ifa_put(ifp);
|
2010-05-19 06:55:27 +08:00
|
|
|
return;
|
2010-10-25 07:06:43 +08:00
|
|
|
}
|
2010-05-19 06:55:27 +08:00
|
|
|
|
2012-05-14 05:56:26 +08:00
|
|
|
net_info_ratelimited("%s: IPv6 duplicate address %pI6c detected!\n",
|
|
|
|
ifp->idev->dev->name, &ifp->addr);
|
2009-03-19 09:22:48 +08:00
|
|
|
|
2015-03-24 06:36:04 +08:00
|
|
|
spin_lock_bh(&ifp->lock);
|
|
|
|
|
|
|
|
if (ifp->flags & IFA_F_STABLE_PRIVACY) {
|
|
|
|
int scope = ifp->scope;
|
|
|
|
u32 flags = ifp->flags;
|
|
|
|
struct in6_addr new_addr;
|
|
|
|
struct inet6_ifaddr *ifp2;
|
|
|
|
u32 valid_lft, preferred_lft;
|
|
|
|
int pfxlen = ifp->prefix_len;
|
|
|
|
int retries = ifp->stable_privacy_retry + 1;
|
|
|
|
|
2015-03-24 06:36:05 +08:00
|
|
|
if (retries > net->ipv6.sysctl.idgen_retries) {
|
2015-03-24 06:36:04 +08:00
|
|
|
net_info_ratelimited("%s: privacy stable address generation failed because of DAD conflicts!\n",
|
|
|
|
ifp->idev->dev->name);
|
|
|
|
goto errdad;
|
|
|
|
}
|
|
|
|
|
|
|
|
new_addr = ifp->addr;
|
|
|
|
if (ipv6_generate_stable_address(&new_addr, retries,
|
|
|
|
idev))
|
|
|
|
goto errdad;
|
|
|
|
|
|
|
|
valid_lft = ifp->valid_lft;
|
|
|
|
preferred_lft = ifp->prefered_lft;
|
|
|
|
|
|
|
|
spin_unlock_bh(&ifp->lock);
|
2008-06-28 13:18:38 +08:00
|
|
|
|
2015-03-24 06:36:04 +08:00
|
|
|
if (idev->cnf.max_addresses &&
|
|
|
|
ipv6_count_addresses(idev) >=
|
|
|
|
idev->cnf.max_addresses)
|
|
|
|
goto lock_errdad;
|
|
|
|
|
|
|
|
net_info_ratelimited("%s: generating new stable privacy address because of DAD conflict\n",
|
|
|
|
ifp->idev->dev->name);
|
|
|
|
|
|
|
|
ifp2 = ipv6_add_addr(idev, &new_addr, NULL, pfxlen,
|
|
|
|
scope, flags, valid_lft,
|
|
|
|
preferred_lft);
|
|
|
|
if (IS_ERR(ifp2))
|
|
|
|
goto lock_errdad;
|
|
|
|
|
|
|
|
spin_lock_bh(&ifp2->lock);
|
|
|
|
ifp2->stable_privacy_retry = retries;
|
|
|
|
ifp2->state = INET6_IFADDR_STATE_PREDAD;
|
|
|
|
spin_unlock_bh(&ifp2->lock);
|
|
|
|
|
2015-03-24 06:36:05 +08:00
|
|
|
addrconf_mod_dad_work(ifp2, net->ipv6.sysctl.idgen_delay);
|
2015-03-24 06:36:04 +08:00
|
|
|
in6_ifa_put(ifp2);
|
|
|
|
lock_errdad:
|
|
|
|
spin_lock_bh(&ifp->lock);
|
2008-06-28 13:18:38 +08:00
|
|
|
}
|
|
|
|
|
2015-03-24 06:36:04 +08:00
|
|
|
errdad:
|
2014-03-28 01:28:07 +08:00
|
|
|
/* transition from _POSTDAD to _ERRDAD */
|
|
|
|
ifp->state = INET6_IFADDR_STATE_ERRDAD;
|
2015-03-24 06:36:03 +08:00
|
|
|
spin_unlock_bh(&ifp->lock);
|
2014-03-28 01:28:07 +08:00
|
|
|
|
|
|
|
addrconf_mod_dad_work(ifp, 0);
|
2016-09-05 16:06:31 +08:00
|
|
|
in6_ifa_put(ifp);
|
2005-12-21 21:57:24 +08:00
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2014-09-02 16:29:29 +08:00
|
|
|
/* Join to solicited addr multicast group.
|
|
|
|
* caller must hold RTNL */
|
2011-04-22 12:53:02 +08:00
|
|
|
void addrconf_join_solict(struct net_device *dev, const struct in6_addr *addr)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct in6_addr maddr;
|
|
|
|
|
|
|
|
if (dev->flags&(IFF_LOOPBACK|IFF_NOARP))
|
|
|
|
return;
|
|
|
|
|
|
|
|
addrconf_addr_solict_mult(addr, &maddr);
|
|
|
|
ipv6_dev_mc_inc(dev, &maddr);
|
|
|
|
}
|
|
|
|
|
2014-09-02 16:29:29 +08:00
|
|
|
/* caller must hold RTNL */
|
2011-04-22 12:53:02 +08:00
|
|
|
void addrconf_leave_solict(struct inet6_dev *idev, const struct in6_addr *addr)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct in6_addr maddr;
|
|
|
|
|
|
|
|
if (idev->dev->flags&(IFF_LOOPBACK|IFF_NOARP))
|
|
|
|
return;
|
|
|
|
|
|
|
|
addrconf_addr_solict_mult(addr, &maddr);
|
|
|
|
__ipv6_dev_mc_dec(idev, &maddr);
|
|
|
|
}
|
|
|
|
|
2014-09-02 16:29:29 +08:00
|
|
|
/* caller must hold RTNL */
|
2005-08-16 13:18:02 +08:00
|
|
|
static void addrconf_join_anycast(struct inet6_ifaddr *ifp)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct in6_addr addr;
|
2014-03-28 01:28:07 +08:00
|
|
|
|
2014-01-07 00:53:14 +08:00
|
|
|
if (ifp->prefix_len >= 127) /* RFC 6164 */
|
2011-07-06 07:04:13 +08:00
|
|
|
return;
|
2005-04-17 06:20:36 +08:00
|
|
|
ipv6_addr_prefix(&addr, &ifp->addr, ifp->prefix_len);
|
|
|
|
if (ipv6_addr_any(&addr))
|
|
|
|
return;
|
2014-09-12 06:35:11 +08:00
|
|
|
__ipv6_dev_ac_inc(ifp->idev, &addr);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2014-09-02 16:29:29 +08:00
|
|
|
/* caller must hold RTNL */
|
2005-08-16 13:18:02 +08:00
|
|
|
static void addrconf_leave_anycast(struct inet6_ifaddr *ifp)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct in6_addr addr;
|
2014-03-28 01:28:07 +08:00
|
|
|
|
2014-01-07 00:53:14 +08:00
|
|
|
if (ifp->prefix_len >= 127) /* RFC 6164 */
|
2011-07-24 19:44:34 +08:00
|
|
|
return;
|
2005-04-17 06:20:36 +08:00
|
|
|
ipv6_addr_prefix(&addr, &ifp->addr, ifp->prefix_len);
|
|
|
|
if (ipv6_addr_any(&addr))
|
|
|
|
return;
|
|
|
|
__ipv6_dev_ac_dec(ifp->idev, &addr);
|
|
|
|
}
|
|
|
|
|
2012-05-10 11:25:52 +08:00
|
|
|
static int addrconf_ifid_eui64(u8 *eui, struct net_device *dev)
|
|
|
|
{
|
2015-12-15 03:55:22 +08:00
|
|
|
if (dev->addr_len != EUI64_ADDR_LEN)
|
2012-05-10 11:25:52 +08:00
|
|
|
return -1;
|
2015-12-15 03:55:22 +08:00
|
|
|
memcpy(eui, dev->dev_addr, EUI64_ADDR_LEN);
|
2013-01-28 18:44:29 +08:00
|
|
|
eui[0] ^= 2;
|
2012-05-10 11:25:52 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-03-25 16:26:24 +08:00
|
|
|
static int addrconf_ifid_ieee1394(u8 *eui, struct net_device *dev)
|
|
|
|
{
|
|
|
|
union fwnet_hwaddr *ha;
|
|
|
|
|
|
|
|
if (dev->addr_len != FWNET_ALEN)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
ha = (union fwnet_hwaddr *)dev->dev_addr;
|
|
|
|
|
|
|
|
memcpy(eui, &ha->uc.uniq_id, sizeof(ha->uc.uniq_id));
|
|
|
|
eui[0] ^= 2;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2006-03-21 08:54:49 +08:00
|
|
|
static int addrconf_ifid_arcnet(u8 *eui, struct net_device *dev)
|
|
|
|
{
|
|
|
|
/* XXX: inherit EUI-64 from other interface -- yoshfuji */
|
|
|
|
if (dev->addr_len != ARCNET_ALEN)
|
|
|
|
return -1;
|
|
|
|
memset(eui, 0, 7);
|
2012-04-01 15:49:08 +08:00
|
|
|
eui[7] = *(u8 *)dev->dev_addr;
|
2006-03-21 08:54:49 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int addrconf_ifid_infiniband(u8 *eui, struct net_device *dev)
|
|
|
|
{
|
|
|
|
if (dev->addr_len != INFINIBAND_ALEN)
|
|
|
|
return -1;
|
|
|
|
memcpy(eui, dev->dev_addr + 12, 8);
|
|
|
|
eui[0] |= 2;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-10-05 04:17:53 +08:00
|
|
|
static int __ipv6_isatap_ifid(u8 *eui, __be32 addr)
|
2008-04-10 14:42:09 +08:00
|
|
|
{
|
2009-05-19 20:56:51 +08:00
|
|
|
if (addr == 0)
|
|
|
|
return -1;
|
2008-04-10 14:42:09 +08:00
|
|
|
eui[0] = (ipv4_is_zeronet(addr) || ipv4_is_private_10(addr) ||
|
|
|
|
ipv4_is_loopback(addr) || ipv4_is_linklocal_169(addr) ||
|
|
|
|
ipv4_is_private_172(addr) || ipv4_is_test_192(addr) ||
|
|
|
|
ipv4_is_anycast_6to4(addr) || ipv4_is_private_192(addr) ||
|
|
|
|
ipv4_is_test_198(addr) || ipv4_is_multicast(addr) ||
|
|
|
|
ipv4_is_lbcast(addr)) ? 0x00 : 0x02;
|
|
|
|
eui[1] = 0;
|
|
|
|
eui[2] = 0x5E;
|
|
|
|
eui[3] = 0xFE;
|
|
|
|
memcpy(eui + 4, &addr, 4);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int addrconf_ifid_sit(u8 *eui, struct net_device *dev)
|
|
|
|
{
|
|
|
|
if (dev->priv_flags & IFF_ISATAP)
|
|
|
|
return __ipv6_isatap_ifid(eui, *(__be32 *)dev->dev_addr);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2011-06-08 18:44:30 +08:00
|
|
|
static int addrconf_ifid_gre(u8 *eui, struct net_device *dev)
|
|
|
|
{
|
|
|
|
return __ipv6_isatap_ifid(eui, *(__be32 *)dev->dev_addr);
|
|
|
|
}
|
|
|
|
|
2013-08-20 18:16:06 +08:00
|
|
|
static int addrconf_ifid_ip6tnl(u8 *eui, struct net_device *dev)
|
|
|
|
{
|
|
|
|
memcpy(eui, dev->perm_addr, 3);
|
|
|
|
memcpy(eui + 5, dev->perm_addr + 3, 3);
|
|
|
|
eui[3] = 0xFF;
|
|
|
|
eui[4] = 0xFE;
|
|
|
|
eui[0] ^= 2;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
static int ipv6_generate_eui64(u8 *eui, struct net_device *dev)
|
|
|
|
{
|
|
|
|
switch (dev->type) {
|
|
|
|
case ARPHRD_ETHER:
|
|
|
|
case ARPHRD_FDDI:
|
2006-03-21 08:54:49 +08:00
|
|
|
return addrconf_ifid_eui48(eui, dev);
|
2005-04-17 06:20:36 +08:00
|
|
|
case ARPHRD_ARCNET:
|
2006-03-21 08:54:49 +08:00
|
|
|
return addrconf_ifid_arcnet(eui, dev);
|
2005-04-17 06:20:36 +08:00
|
|
|
case ARPHRD_INFINIBAND:
|
2006-03-21 08:54:49 +08:00
|
|
|
return addrconf_ifid_infiniband(eui, dev);
|
2007-11-29 19:11:40 +08:00
|
|
|
case ARPHRD_SIT:
|
2008-04-10 14:42:09 +08:00
|
|
|
return addrconf_ifid_sit(eui, dev);
|
2011-06-08 18:44:30 +08:00
|
|
|
case ARPHRD_IPGRE:
|
|
|
|
return addrconf_ifid_gre(eui, dev);
|
2013-12-11 23:05:36 +08:00
|
|
|
case ARPHRD_6LOWPAN:
|
2012-05-10 11:25:52 +08:00
|
|
|
return addrconf_ifid_eui64(eui, dev);
|
2013-03-25 16:26:24 +08:00
|
|
|
case ARPHRD_IEEE1394:
|
|
|
|
return addrconf_ifid_ieee1394(eui, dev);
|
2013-08-20 18:16:06 +08:00
|
|
|
case ARPHRD_TUNNEL6:
|
|
|
|
return addrconf_ifid_ip6tnl(eui, dev);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ipv6_inherit_eui64(u8 *eui, struct inet6_dev *idev)
|
|
|
|
{
|
|
|
|
int err = -1;
|
|
|
|
struct inet6_ifaddr *ifp;
|
|
|
|
|
|
|
|
read_lock_bh(&idev->lock);
|
2014-01-20 04:58:19 +08:00
|
|
|
list_for_each_entry_reverse(ifp, &idev->addr_list, if_list) {
|
|
|
|
if (ifp->scope > IFA_LINK)
|
|
|
|
break;
|
2005-04-17 06:20:36 +08:00
|
|
|
if (ifp->scope == IFA_LINK && !(ifp->flags&IFA_F_TENTATIVE)) {
|
|
|
|
memcpy(eui, ifp->addr.s6_addr+8, 8);
|
|
|
|
err = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
read_unlock_bh(&idev->lock);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* (re)generation of randomized interface identifier (RFC 3041 3.2, 3.5) */
|
2016-10-14 00:50:02 +08:00
|
|
|
static void ipv6_regen_rndid(struct inet6_dev *idev)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
regen:
|
2006-03-21 08:54:09 +08:00
|
|
|
get_random_bytes(idev->rndid, sizeof(idev->rndid));
|
2005-04-17 06:20:36 +08:00
|
|
|
idev->rndid[0] &= ~0x02;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* <draft-ietf-ipngwg-temp-addresses-v2-00.txt>:
|
|
|
|
* check if generated address is not inappropriate
|
|
|
|
*
|
|
|
|
* - Reserved subnet anycast (RFC 2526)
|
|
|
|
* 11111101 11....11 1xxxxxxx
|
2007-11-29 19:11:40 +08:00
|
|
|
* - ISATAP (RFC4214) 6.1
|
2005-04-17 06:20:36 +08:00
|
|
|
* 00-00-5E-FE-xx-xx-xx-xx
|
|
|
|
* - value 0
|
|
|
|
* - XXX: already assigned to an address on the device
|
|
|
|
*/
|
2007-02-09 22:24:49 +08:00
|
|
|
if (idev->rndid[0] == 0xfd &&
|
2005-04-17 06:20:36 +08:00
|
|
|
(idev->rndid[1]&idev->rndid[2]&idev->rndid[3]&idev->rndid[4]&idev->rndid[5]&idev->rndid[6]) == 0xff &&
|
|
|
|
(idev->rndid[7]&0x80))
|
|
|
|
goto regen;
|
|
|
|
if ((idev->rndid[0]|idev->rndid[1]) == 0) {
|
|
|
|
if (idev->rndid[2] == 0x5e && idev->rndid[3] == 0xfe)
|
|
|
|
goto regen;
|
|
|
|
if ((idev->rndid[2]|idev->rndid[3]|idev->rndid[4]|idev->rndid[5]|idev->rndid[6]|idev->rndid[7]) == 0x00)
|
|
|
|
goto regen;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-14 00:50:02 +08:00
|
|
|
static void ipv6_try_regen_rndid(struct inet6_dev *idev, struct in6_addr *tmpaddr)
|
2012-04-01 15:49:08 +08:00
|
|
|
{
|
2005-04-17 06:20:36 +08:00
|
|
|
if (tmpaddr && memcmp(idev->rndid, &tmpaddr->s6_addr[8], 8) == 0)
|
2016-10-14 00:50:02 +08:00
|
|
|
ipv6_regen_rndid(idev);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Add prefix route.
|
|
|
|
*/
|
|
|
|
|
|
|
|
static void
|
|
|
|
addrconf_prefix_route(struct in6_addr *pfx, int plen, struct net_device *dev,
|
2005-06-19 13:55:31 +08:00
|
|
|
unsigned long expires, u32 flags)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2006-08-22 15:01:08 +08:00
|
|
|
struct fib6_config cfg = {
|
2015-10-13 02:47:10 +08:00
|
|
|
.fc_table = l3mdev_fib_table(dev) ? : RT6_TABLE_PREFIX,
|
2006-08-22 15:01:08 +08:00
|
|
|
.fc_metric = IP6_RT_PRIO_ADDRCONF,
|
|
|
|
.fc_ifindex = dev->ifindex,
|
|
|
|
.fc_expires = expires,
|
|
|
|
.fc_dst_len = plen,
|
|
|
|
.fc_flags = RTF_UP | flags,
|
2008-03-25 20:47:49 +08:00
|
|
|
.fc_nlinfo.nl_net = dev_net(dev),
|
2008-08-23 20:16:46 +08:00
|
|
|
.fc_protocol = RTPROT_KERNEL,
|
2006-08-22 15:01:08 +08:00
|
|
|
};
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2011-11-21 11:39:03 +08:00
|
|
|
cfg.fc_dst = *pfx;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
/* Prevent useless cloning on PtP SIT.
|
|
|
|
This thing is done here expecting that the whole
|
|
|
|
class of non-broadcast devices need not cloning.
|
|
|
|
*/
|
2012-10-30 00:23:10 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6_SIT)
|
2006-08-22 15:01:08 +08:00
|
|
|
if (dev->type == ARPHRD_SIT && (dev->flags & IFF_POINTOPOINT))
|
|
|
|
cfg.fc_flags |= RTF_NONEXTHOP;
|
2006-10-11 05:49:53 +08:00
|
|
|
#endif
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2006-08-22 15:01:08 +08:00
|
|
|
ip6_route_add(&cfg);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2011-10-26 11:24:29 +08:00
|
|
|
|
|
|
|
static struct rt6_info *addrconf_get_prefix_route(const struct in6_addr *pfx,
|
|
|
|
int plen,
|
|
|
|
const struct net_device *dev,
|
|
|
|
u32 flags, u32 noflags)
|
|
|
|
{
|
|
|
|
struct fib6_node *fn;
|
|
|
|
struct rt6_info *rt = NULL;
|
|
|
|
struct fib6_table *table;
|
2015-10-13 02:47:10 +08:00
|
|
|
u32 tb_id = l3mdev_fib_table(dev) ? : RT6_TABLE_PREFIX;
|
2011-10-26 11:24:29 +08:00
|
|
|
|
2015-10-13 02:47:10 +08:00
|
|
|
table = fib6_get_table(dev_net(dev), tb_id);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!table)
|
2011-10-26 11:24:29 +08:00
|
|
|
return NULL;
|
|
|
|
|
2012-09-12 05:59:01 +08:00
|
|
|
read_lock_bh(&table->tb6_lock);
|
2011-10-26 11:24:29 +08:00
|
|
|
fn = fib6_locate(&table->tb6_root, pfx, plen, NULL, 0);
|
|
|
|
if (!fn)
|
|
|
|
goto out;
|
2015-04-29 04:03:03 +08:00
|
|
|
|
|
|
|
noflags |= RTF_CACHE;
|
2011-10-26 11:24:29 +08:00
|
|
|
for (rt = fn->leaf; rt; rt = rt->dst.rt6_next) {
|
2011-12-29 09:19:20 +08:00
|
|
|
if (rt->dst.dev->ifindex != dev->ifindex)
|
2011-10-26 11:24:29 +08:00
|
|
|
continue;
|
|
|
|
if ((rt->rt6i_flags & flags) != flags)
|
|
|
|
continue;
|
2013-01-09 22:02:26 +08:00
|
|
|
if ((rt->rt6i_flags & noflags) != 0)
|
2011-10-26 11:24:29 +08:00
|
|
|
continue;
|
|
|
|
dst_hold(&rt->dst);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
out:
|
2012-09-12 05:59:01 +08:00
|
|
|
read_unlock_bh(&table->tb6_lock);
|
2011-10-26 11:24:29 +08:00
|
|
|
return rt;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/* Create "default" multicast route to the interface */
|
|
|
|
|
|
|
|
static void addrconf_add_mroute(struct net_device *dev)
|
|
|
|
{
|
2006-08-22 15:01:08 +08:00
|
|
|
struct fib6_config cfg = {
|
2015-10-13 02:47:10 +08:00
|
|
|
.fc_table = l3mdev_fib_table(dev) ? : RT6_TABLE_LOCAL,
|
2006-08-22 15:01:08 +08:00
|
|
|
.fc_metric = IP6_RT_PRIO_ADDRCONF,
|
|
|
|
.fc_ifindex = dev->ifindex,
|
|
|
|
.fc_dst_len = 8,
|
|
|
|
.fc_flags = RTF_UP,
|
2008-03-25 20:47:49 +08:00
|
|
|
.fc_nlinfo.nl_net = dev_net(dev),
|
2006-08-22 15:01:08 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
ipv6_addr_set(&cfg.fc_dst, htonl(0xFF000000), 0, 0, 0);
|
|
|
|
|
|
|
|
ip6_route_add(&cfg);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct inet6_dev *addrconf_add_dev(struct net_device *dev)
|
|
|
|
{
|
|
|
|
struct inet6_dev *idev;
|
|
|
|
|
|
|
|
ASSERT_RTNL();
|
|
|
|
|
2010-03-21 07:09:01 +08:00
|
|
|
idev = ipv6_find_idev(dev);
|
|
|
|
if (!idev)
|
2010-07-20 18:34:30 +08:00
|
|
|
return ERR_PTR(-ENOBUFS);
|
|
|
|
|
|
|
|
if (idev->cnf.disable_ipv6)
|
|
|
|
return ERR_PTR(-EACCES);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
/* Add default multicast route */
|
2016-06-14 04:44:18 +08:00
|
|
|
if (!(dev->flags & IFF_LOOPBACK) && !netif_is_l3_master(dev))
|
2011-12-07 05:23:45 +08:00
|
|
|
addrconf_add_mroute(dev);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
return idev;
|
|
|
|
}
|
|
|
|
|
2013-12-06 16:45:22 +08:00
|
|
|
static void manage_tempaddrs(struct inet6_dev *idev,
|
|
|
|
struct inet6_ifaddr *ifp,
|
|
|
|
__u32 valid_lft, __u32 prefered_lft,
|
|
|
|
bool create, unsigned long now)
|
|
|
|
{
|
|
|
|
u32 flags;
|
|
|
|
struct inet6_ifaddr *ift;
|
|
|
|
|
|
|
|
read_lock_bh(&idev->lock);
|
|
|
|
/* update all temporary addresses in the list */
|
|
|
|
list_for_each_entry(ift, &idev->tempaddr_list, tmp_list) {
|
|
|
|
int age, max_valid, max_prefered;
|
|
|
|
|
|
|
|
if (ifp != ift->ifpub)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
/* RFC 4941 section 3.3:
|
|
|
|
* If a received option will extend the lifetime of a public
|
|
|
|
* address, the lifetimes of temporary addresses should
|
|
|
|
* be extended, subject to the overall constraint that no
|
|
|
|
* temporary addresses should ever remain "valid" or "preferred"
|
|
|
|
* for a time longer than (TEMP_VALID_LIFETIME) or
|
|
|
|
* (TEMP_PREFERRED_LIFETIME - DESYNC_FACTOR), respectively.
|
|
|
|
*/
|
|
|
|
age = (now - ift->cstamp) / HZ;
|
|
|
|
max_valid = idev->cnf.temp_valid_lft - age;
|
|
|
|
if (max_valid < 0)
|
|
|
|
max_valid = 0;
|
|
|
|
|
|
|
|
max_prefered = idev->cnf.temp_prefered_lft -
|
2016-10-14 00:52:15 +08:00
|
|
|
idev->desync_factor - age;
|
2013-12-06 16:45:22 +08:00
|
|
|
if (max_prefered < 0)
|
|
|
|
max_prefered = 0;
|
|
|
|
|
|
|
|
if (valid_lft > max_valid)
|
|
|
|
valid_lft = max_valid;
|
|
|
|
|
|
|
|
if (prefered_lft > max_prefered)
|
|
|
|
prefered_lft = max_prefered;
|
|
|
|
|
|
|
|
spin_lock(&ift->lock);
|
|
|
|
flags = ift->flags;
|
|
|
|
ift->valid_lft = valid_lft;
|
|
|
|
ift->prefered_lft = prefered_lft;
|
|
|
|
ift->tstamp = now;
|
|
|
|
if (prefered_lft > 0)
|
|
|
|
ift->flags &= ~IFA_F_DEPRECATED;
|
|
|
|
|
|
|
|
spin_unlock(&ift->lock);
|
|
|
|
if (!(flags&IFA_F_TENTATIVE))
|
|
|
|
ipv6_ifa_notify(0, ift);
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((create || list_empty(&idev->tempaddr_list)) &&
|
|
|
|
idev->cnf.use_tempaddr > 0) {
|
|
|
|
/* When a new public address is created as described
|
|
|
|
* in [ADDRCONF], also create a new temporary address.
|
|
|
|
* Also create a temporary address if it's enabled but
|
|
|
|
* no temporary address currently exists.
|
|
|
|
*/
|
|
|
|
read_unlock_bh(&idev->lock);
|
|
|
|
ipv6_create_tempaddr(ifp, NULL);
|
|
|
|
} else {
|
|
|
|
read_unlock_bh(&idev->lock);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-12-16 23:44:38 +08:00
|
|
|
static bool is_addr_mode_generate_stable(struct inet6_dev *idev)
|
|
|
|
{
|
2017-01-26 11:59:17 +08:00
|
|
|
return idev->cnf.addr_gen_mode == IN6_ADDR_GEN_MODE_STABLE_PRIVACY ||
|
|
|
|
idev->cnf.addr_gen_mode == IN6_ADDR_GEN_MODE_RANDOM;
|
2015-12-16 23:44:38 +08:00
|
|
|
}
|
|
|
|
|
2016-06-16 03:20:24 +08:00
|
|
|
int addrconf_prefix_rcv_add_addr(struct net *net, struct net_device *dev,
|
|
|
|
const struct prefix_info *pinfo,
|
|
|
|
struct inet6_dev *in6_dev,
|
|
|
|
const struct in6_addr *addr, int addr_type,
|
|
|
|
u32 addr_flags, bool sllao, bool tokenized,
|
|
|
|
__u32 valid_lft, u32 prefered_lft)
|
2016-06-16 03:20:22 +08:00
|
|
|
{
|
|
|
|
struct inet6_ifaddr *ifp = ipv6_get_ifaddr(net, addr, dev, 1);
|
|
|
|
int create = 0, update_lft = 0;
|
|
|
|
|
|
|
|
if (!ifp && valid_lft) {
|
|
|
|
int max_addresses = in6_dev->cnf.max_addresses;
|
|
|
|
|
|
|
|
#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
|
|
|
|
if (in6_dev->cnf.optimistic_dad &&
|
|
|
|
!net->ipv6.devconf_all->forwarding && sllao)
|
|
|
|
addr_flags |= IFA_F_OPTIMISTIC;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Do not allow to create too much of autoconfigured
|
|
|
|
* addresses; this would be too easy way to crash kernel.
|
|
|
|
*/
|
|
|
|
if (!max_addresses ||
|
|
|
|
ipv6_count_addresses(in6_dev) < max_addresses)
|
|
|
|
ifp = ipv6_add_addr(in6_dev, addr, NULL,
|
|
|
|
pinfo->prefix_len,
|
|
|
|
addr_type&IPV6_ADDR_SCOPE_MASK,
|
|
|
|
addr_flags, valid_lft,
|
|
|
|
prefered_lft);
|
|
|
|
|
|
|
|
if (IS_ERR_OR_NULL(ifp))
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
update_lft = 0;
|
|
|
|
create = 1;
|
|
|
|
spin_lock_bh(&ifp->lock);
|
|
|
|
ifp->flags |= IFA_F_MANAGETEMPADDR;
|
|
|
|
ifp->cstamp = jiffies;
|
|
|
|
ifp->tokenized = tokenized;
|
|
|
|
spin_unlock_bh(&ifp->lock);
|
|
|
|
addrconf_dad_start(ifp);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ifp) {
|
|
|
|
u32 flags;
|
|
|
|
unsigned long now;
|
|
|
|
u32 stored_lft;
|
|
|
|
|
|
|
|
/* update lifetime (RFC2462 5.5.3 e) */
|
|
|
|
spin_lock_bh(&ifp->lock);
|
|
|
|
now = jiffies;
|
|
|
|
if (ifp->valid_lft > (now - ifp->tstamp) / HZ)
|
|
|
|
stored_lft = ifp->valid_lft - (now - ifp->tstamp) / HZ;
|
|
|
|
else
|
|
|
|
stored_lft = 0;
|
|
|
|
if (!update_lft && !create && stored_lft) {
|
|
|
|
const u32 minimum_lft = min_t(u32,
|
|
|
|
stored_lft, MIN_VALID_LIFETIME);
|
|
|
|
valid_lft = max(valid_lft, minimum_lft);
|
|
|
|
|
|
|
|
/* RFC4862 Section 5.5.3e:
|
|
|
|
* "Note that the preferred lifetime of the
|
|
|
|
* corresponding address is always reset to
|
|
|
|
* the Preferred Lifetime in the received
|
|
|
|
* Prefix Information option, regardless of
|
|
|
|
* whether the valid lifetime is also reset or
|
|
|
|
* ignored."
|
|
|
|
*
|
|
|
|
* So we should always update prefered_lft here.
|
|
|
|
*/
|
|
|
|
update_lft = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (update_lft) {
|
|
|
|
ifp->valid_lft = valid_lft;
|
|
|
|
ifp->prefered_lft = prefered_lft;
|
|
|
|
ifp->tstamp = now;
|
|
|
|
flags = ifp->flags;
|
|
|
|
ifp->flags &= ~IFA_F_DEPRECATED;
|
|
|
|
spin_unlock_bh(&ifp->lock);
|
|
|
|
|
|
|
|
if (!(flags&IFA_F_TENTATIVE))
|
|
|
|
ipv6_ifa_notify(0, ifp);
|
|
|
|
} else
|
|
|
|
spin_unlock_bh(&ifp->lock);
|
|
|
|
|
|
|
|
manage_tempaddrs(in6_dev, ifp, valid_lft, prefered_lft,
|
|
|
|
create, now);
|
|
|
|
|
|
|
|
in6_ifa_put(ifp);
|
|
|
|
addrconf_verify();
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2016-06-16 03:20:24 +08:00
|
|
|
EXPORT_SYMBOL_GPL(addrconf_prefix_rcv_add_addr);
|
2016-06-16 03:20:22 +08:00
|
|
|
|
2012-01-04 18:49:15 +08:00
|
|
|
void addrconf_prefix_rcv(struct net_device *dev, u8 *opt, int len, bool sllao)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct prefix_info *pinfo;
|
|
|
|
__u32 valid_lft;
|
|
|
|
__u32 prefered_lft;
|
2016-06-16 03:20:22 +08:00
|
|
|
int addr_type, err;
|
2015-03-24 06:36:02 +08:00
|
|
|
u32 addr_flags = 0;
|
2005-04-17 06:20:36 +08:00
|
|
|
struct inet6_dev *in6_dev;
|
2009-06-01 18:07:33 +08:00
|
|
|
struct net *net = dev_net(dev);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
pinfo = (struct prefix_info *) opt;
|
2007-02-09 22:24:49 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
if (len < sizeof(struct prefix_info)) {
|
2013-08-17 10:27:04 +08:00
|
|
|
ADBG("addrconf: prefix option too short\n");
|
2005-04-17 06:20:36 +08:00
|
|
|
return;
|
|
|
|
}
|
2007-02-09 22:24:49 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* Validation checks ([ADDRCONF], page 19)
|
|
|
|
*/
|
|
|
|
|
|
|
|
addr_type = ipv6_addr_type(&pinfo->prefix);
|
|
|
|
|
|
|
|
if (addr_type & (IPV6_ADDR_MULTICAST|IPV6_ADDR_LINKLOCAL))
|
|
|
|
return;
|
|
|
|
|
|
|
|
valid_lft = ntohl(pinfo->valid);
|
|
|
|
prefered_lft = ntohl(pinfo->prefered);
|
|
|
|
|
|
|
|
if (prefered_lft > valid_lft) {
|
2012-05-14 05:56:26 +08:00
|
|
|
net_warn_ratelimited("addrconf: prefix option has invalid lifetime\n");
|
2005-04-17 06:20:36 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
in6_dev = in6_dev_get(dev);
|
|
|
|
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!in6_dev) {
|
2012-05-14 05:56:26 +08:00
|
|
|
net_dbg_ratelimited("addrconf: device %s not configured\n",
|
|
|
|
dev->name);
|
2005-04-17 06:20:36 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Two things going on here:
|
|
|
|
* 1) Add routes for on-link prefixes
|
|
|
|
* 2) Configure prefixes with the auto flag set
|
|
|
|
*/
|
|
|
|
|
2008-05-27 16:37:49 +08:00
|
|
|
if (pinfo->onlink) {
|
|
|
|
struct rt6_info *rt;
|
|
|
|
unsigned long rt_expires;
|
|
|
|
|
2008-05-20 07:56:11 +08:00
|
|
|
/* Avoid arithmetic overflow. Really, we could
|
|
|
|
* save rt_expires in seconds, likely valid_lft,
|
|
|
|
* but it would require division in fib gc, that it
|
|
|
|
* not good.
|
|
|
|
*/
|
2008-05-27 16:37:49 +08:00
|
|
|
if (HZ > USER_HZ)
|
|
|
|
rt_expires = addrconf_timeout_fixup(valid_lft, HZ);
|
|
|
|
else
|
|
|
|
rt_expires = addrconf_timeout_fixup(valid_lft, USER_HZ);
|
2005-12-20 06:02:45 +08:00
|
|
|
|
2008-05-27 16:37:49 +08:00
|
|
|
if (addrconf_finite_timeout(rt_expires))
|
|
|
|
rt_expires *= HZ;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2011-10-26 11:24:29 +08:00
|
|
|
rt = addrconf_get_prefix_route(&pinfo->prefix,
|
|
|
|
pinfo->prefix_len,
|
|
|
|
dev,
|
|
|
|
RTF_ADDRCONF | RTF_PREFIX_RT,
|
|
|
|
RTF_GATEWAY | RTF_DEFAULT);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2011-10-26 11:24:29 +08:00
|
|
|
if (rt) {
|
2008-05-20 07:56:11 +08:00
|
|
|
/* Autoconf prefix route */
|
|
|
|
if (valid_lft == 0) {
|
|
|
|
ip6_del_rt(rt);
|
|
|
|
rt = NULL;
|
2008-05-27 16:37:49 +08:00
|
|
|
} else if (addrconf_finite_timeout(rt_expires)) {
|
2008-05-20 07:56:11 +08:00
|
|
|
/* not infinity */
|
2012-04-06 08:13:10 +08:00
|
|
|
rt6_set_expires(rt, jiffies + rt_expires);
|
2008-05-20 07:56:11 +08:00
|
|
|
} else {
|
2012-04-06 08:13:10 +08:00
|
|
|
rt6_clean_expires(rt);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
} else if (valid_lft) {
|
2008-05-20 07:56:11 +08:00
|
|
|
clock_t expires = 0;
|
2008-05-27 16:37:49 +08:00
|
|
|
int flags = RTF_ADDRCONF | RTF_PREFIX_RT;
|
|
|
|
if (addrconf_finite_timeout(rt_expires)) {
|
2008-05-20 07:56:11 +08:00
|
|
|
/* not infinity */
|
|
|
|
flags |= RTF_EXPIRES;
|
|
|
|
expires = jiffies_to_clock_t(rt_expires);
|
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
addrconf_prefix_route(&pinfo->prefix, pinfo->prefix_len,
|
2008-05-20 07:56:11 +08:00
|
|
|
dev, expires, flags);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2012-10-29 08:13:19 +08:00
|
|
|
ip6_rt_put(rt);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Try to figure out our local address for this prefix */
|
|
|
|
|
|
|
|
if (pinfo->autoconf && in6_dev->cnf.autoconf) {
|
|
|
|
struct in6_addr addr;
|
2016-06-16 03:20:23 +08:00
|
|
|
bool tokenized = false, dev_addr_generated = false;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
if (pinfo->prefix_len == 64) {
|
|
|
|
memcpy(&addr, &pinfo->prefix, 8);
|
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 12:01:30 +08:00
|
|
|
|
|
|
|
if (!ipv6_addr_any(&in6_dev->token)) {
|
|
|
|
read_lock_bh(&in6_dev->lock);
|
|
|
|
memcpy(addr.s6_addr + 8,
|
|
|
|
in6_dev->token.s6_addr + 8, 8);
|
|
|
|
read_unlock_bh(&in6_dev->lock);
|
2013-04-09 11:47:16 +08:00
|
|
|
tokenized = true;
|
2015-12-16 23:44:38 +08:00
|
|
|
} else if (is_addr_mode_generate_stable(in6_dev) &&
|
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 06:36:01 +08:00
|
|
|
!ipv6_generate_stable_address(&addr, 0,
|
|
|
|
in6_dev)) {
|
2015-03-24 06:36:02 +08:00
|
|
|
addr_flags |= IFA_F_STABLE_PRIVACY;
|
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 06:36:01 +08:00
|
|
|
goto ok;
|
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 12:01:30 +08:00
|
|
|
} else if (ipv6_generate_eui64(addr.s6_addr + 8, dev) &&
|
|
|
|
ipv6_inherit_eui64(addr.s6_addr + 8, in6_dev)) {
|
2016-06-16 03:20:22 +08:00
|
|
|
goto put;
|
2016-06-16 03:20:23 +08:00
|
|
|
} else {
|
|
|
|
dev_addr_generated = true;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
goto ok;
|
|
|
|
}
|
2012-05-14 05:56:26 +08:00
|
|
|
net_dbg_ratelimited("IPv6 addrconf: prefix with wrong length %d\n",
|
|
|
|
pinfo->prefix_len);
|
2016-06-16 03:20:22 +08:00
|
|
|
goto put;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
ok:
|
2016-06-16 03:20:22 +08:00
|
|
|
err = addrconf_prefix_rcv_add_addr(net, dev, pinfo, in6_dev,
|
|
|
|
&addr, addr_type,
|
|
|
|
addr_flags, sllao,
|
|
|
|
tokenized, valid_lft,
|
|
|
|
prefered_lft);
|
|
|
|
if (err)
|
|
|
|
goto put;
|
2016-06-16 03:20:23 +08:00
|
|
|
|
|
|
|
/* Ignore error case here because previous prefix add addr was
|
|
|
|
* successful which will be notified.
|
|
|
|
*/
|
|
|
|
ndisc_ops_prefix_rcv_add_addr(net, dev, pinfo, in6_dev, &addr,
|
|
|
|
addr_type, addr_flags, sllao,
|
|
|
|
tokenized, valid_lft,
|
|
|
|
prefered_lft,
|
|
|
|
dev_addr_generated);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
inet6_prefix_notify(RTM_NEWPREFIX, in6_dev, pinfo);
|
2016-06-16 03:20:22 +08:00
|
|
|
put:
|
2005-04-17 06:20:36 +08:00
|
|
|
in6_dev_put(in6_dev);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Set destination address.
|
|
|
|
* Special case for SIT interfaces where we create a new "virtual"
|
|
|
|
* device.
|
|
|
|
*/
|
2008-03-06 02:46:57 +08:00
|
|
|
int addrconf_set_dstaddr(struct net *net, void __user *arg)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct in6_ifreq ireq;
|
|
|
|
struct net_device *dev;
|
|
|
|
int err = -EINVAL;
|
|
|
|
|
|
|
|
rtnl_lock();
|
|
|
|
|
|
|
|
err = -EFAULT;
|
|
|
|
if (copy_from_user(&ireq, arg, sizeof(struct in6_ifreq)))
|
|
|
|
goto err_exit;
|
|
|
|
|
2008-03-06 02:46:57 +08:00
|
|
|
dev = __dev_get_by_index(net, ireq.ifr6_ifindex);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
err = -ENODEV;
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!dev)
|
2005-04-17 06:20:36 +08:00
|
|
|
goto err_exit;
|
|
|
|
|
2012-10-30 00:23:10 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6_SIT)
|
2005-04-17 06:20:36 +08:00
|
|
|
if (dev->type == ARPHRD_SIT) {
|
2008-11-20 13:52:05 +08:00
|
|
|
const struct net_device_ops *ops = dev->netdev_ops;
|
2005-04-17 06:20:36 +08:00
|
|
|
struct ifreq ifr;
|
|
|
|
struct ip_tunnel_parm p;
|
|
|
|
|
|
|
|
err = -EADDRNOTAVAIL;
|
|
|
|
if (!(ipv6_addr_type(&ireq.ifr6_addr) & IPV6_ADDR_COMPATv4))
|
|
|
|
goto err_exit;
|
|
|
|
|
|
|
|
memset(&p, 0, sizeof(p));
|
|
|
|
p.iph.daddr = ireq.ifr6_addr.s6_addr32[3];
|
|
|
|
p.iph.saddr = 0;
|
|
|
|
p.iph.version = 4;
|
|
|
|
p.iph.ihl = 5;
|
|
|
|
p.iph.protocol = IPPROTO_IPV6;
|
|
|
|
p.iph.ttl = 64;
|
2008-01-21 16:48:43 +08:00
|
|
|
ifr.ifr_ifru.ifru_data = (__force void __user *)&p;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2008-11-20 13:52:05 +08:00
|
|
|
if (ops->ndo_do_ioctl) {
|
|
|
|
mm_segment_t oldfs = get_fs();
|
|
|
|
|
|
|
|
set_fs(KERNEL_DS);
|
|
|
|
err = ops->ndo_do_ioctl(dev, &ifr, SIOCADDTUNNEL);
|
|
|
|
set_fs(oldfs);
|
|
|
|
} else
|
|
|
|
err = -EOPNOTSUPP;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
if (err == 0) {
|
|
|
|
err = -ENOBUFS;
|
2008-03-06 02:46:57 +08:00
|
|
|
dev = __dev_get_by_name(net, p.name);
|
|
|
|
if (!dev)
|
2005-04-17 06:20:36 +08:00
|
|
|
goto err_exit;
|
|
|
|
err = dev_open(dev);
|
|
|
|
}
|
|
|
|
}
|
2006-10-11 05:49:53 +08:00
|
|
|
#endif
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
err_exit:
|
|
|
|
rtnl_unlock();
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2015-02-26 01:58:35 +08:00
|
|
|
static int ipv6_mc_config(struct sock *sk, bool join,
|
|
|
|
const struct in6_addr *addr, int ifindex)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ASSERT_RTNL();
|
|
|
|
|
|
|
|
lock_sock(sk);
|
|
|
|
if (join)
|
ipv4, ipv6: kill ip_mc_{join, leave}_group and ipv6_sock_mc_{join, drop}
in favor of their inner __ ones, which doesn't grab rtnl.
As these functions need to operate on a locked socket, we can't be
grabbing rtnl by then. It's too late and doing so causes reversed
locking.
So this patch:
- move rtnl handling to callers instead while already fixing some
reversed locking situations, like on vxlan and ipvs code.
- renames __ ones to not have the __ mark:
__ip_mc_{join,leave}_group -> ip_mc_{join,leave}_group
__ipv6_sock_mc_{join,drop} -> ipv6_sock_mc_{join,drop}
Signed-off-by: Marcelo Ricardo Leitner <marcelo.leitner@gmail.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-19 01:50:43 +08:00
|
|
|
ret = ipv6_sock_mc_join(sk, ifindex, addr);
|
2015-02-26 01:58:35 +08:00
|
|
|
else
|
ipv4, ipv6: kill ip_mc_{join, leave}_group and ipv6_sock_mc_{join, drop}
in favor of their inner __ ones, which doesn't grab rtnl.
As these functions need to operate on a locked socket, we can't be
grabbing rtnl by then. It's too late and doing so causes reversed
locking.
So this patch:
- move rtnl handling to callers instead while already fixing some
reversed locking situations, like on vxlan and ipvs code.
- renames __ ones to not have the __ mark:
__ip_mc_{join,leave}_group -> ip_mc_{join,leave}_group
__ipv6_sock_mc_{join,drop} -> ipv6_sock_mc_{join,drop}
Signed-off-by: Marcelo Ricardo Leitner <marcelo.leitner@gmail.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-19 01:50:43 +08:00
|
|
|
ret = ipv6_sock_mc_drop(sk, ifindex, addr);
|
2015-02-26 01:58:35 +08:00
|
|
|
release_sock(sk);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* Manual configuration of address on an interface
|
|
|
|
*/
|
2013-12-06 16:45:21 +08:00
|
|
|
static int inet6_addr_add(struct net *net, int ifindex,
|
|
|
|
const struct in6_addr *pfx,
|
2013-05-17 06:32:00 +08:00
|
|
|
const struct in6_addr *peer_pfx,
|
2013-12-06 16:45:21 +08:00
|
|
|
unsigned int plen, __u32 ifa_flags,
|
|
|
|
__u32 prefered_lft, __u32 valid_lft)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct inet6_ifaddr *ifp;
|
|
|
|
struct inet6_dev *idev;
|
|
|
|
struct net_device *dev;
|
2015-02-26 01:58:35 +08:00
|
|
|
unsigned long timeout;
|
|
|
|
clock_t expires;
|
2005-04-17 06:20:36 +08:00
|
|
|
int scope;
|
2008-05-20 07:56:11 +08:00
|
|
|
u32 flags;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
ASSERT_RTNL();
|
2007-02-09 22:24:49 +08:00
|
|
|
|
2008-05-28 22:54:22 +08:00
|
|
|
if (plen > 128)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2006-07-28 17:12:10 +08:00
|
|
|
/* check the lifetime */
|
|
|
|
if (!valid_lft || prefered_lft > valid_lft)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2013-12-06 16:45:22 +08:00
|
|
|
if (ifa_flags & IFA_F_MANAGETEMPADDR && plen != 64)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2008-03-06 02:46:57 +08:00
|
|
|
dev = __dev_get_by_index(net, ifindex);
|
|
|
|
if (!dev)
|
2005-04-17 06:20:36 +08:00
|
|
|
return -ENODEV;
|
2007-02-09 22:24:49 +08:00
|
|
|
|
2010-07-20 18:34:30 +08:00
|
|
|
idev = addrconf_add_dev(dev);
|
|
|
|
if (IS_ERR(idev))
|
|
|
|
return PTR_ERR(idev);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2015-02-26 01:58:35 +08:00
|
|
|
if (ifa_flags & IFA_F_MCAUTOJOIN) {
|
|
|
|
int ret = ipv6_mc_config(net->ipv6.mc_autojoin_sk,
|
|
|
|
true, pfx, ifindex);
|
|
|
|
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
scope = ipv6_addr_scope(pfx);
|
|
|
|
|
2008-05-27 16:37:49 +08:00
|
|
|
timeout = addrconf_timeout_fixup(valid_lft, HZ);
|
|
|
|
if (addrconf_finite_timeout(timeout)) {
|
|
|
|
expires = jiffies_to_clock_t(timeout * HZ);
|
|
|
|
valid_lft = timeout;
|
2008-05-20 07:56:11 +08:00
|
|
|
flags = RTF_EXPIRES;
|
2008-05-27 16:37:49 +08:00
|
|
|
} else {
|
|
|
|
expires = 0;
|
|
|
|
flags = 0;
|
|
|
|
ifa_flags |= IFA_F_PERMANENT;
|
2008-05-20 07:56:11 +08:00
|
|
|
}
|
2006-07-28 17:12:10 +08:00
|
|
|
|
2008-05-27 16:37:49 +08:00
|
|
|
timeout = addrconf_timeout_fixup(prefered_lft, HZ);
|
|
|
|
if (addrconf_finite_timeout(timeout)) {
|
|
|
|
if (timeout == 0)
|
|
|
|
ifa_flags |= IFA_F_DEPRECATED;
|
|
|
|
prefered_lft = timeout;
|
|
|
|
}
|
2006-07-28 17:12:10 +08:00
|
|
|
|
2013-08-01 16:41:28 +08:00
|
|
|
ifp = ipv6_add_addr(idev, pfx, peer_pfx, plen, scope, ifa_flags,
|
|
|
|
valid_lft, prefered_lft);
|
2006-07-28 17:12:10 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
if (!IS_ERR(ifp)) {
|
2014-01-15 22:36:58 +08:00
|
|
|
if (!(ifa_flags & IFA_F_NOPREFIXROUTE)) {
|
|
|
|
addrconf_prefix_route(&ifp->addr, ifp->prefix_len, dev,
|
|
|
|
expires, flags);
|
|
|
|
}
|
|
|
|
|
2007-04-26 08:08:10 +08:00
|
|
|
/*
|
|
|
|
* Note that section 3.1 of RFC 4429 indicates
|
|
|
|
* that the Optimistic flag should not be set for
|
|
|
|
* manually configured addresses
|
|
|
|
*/
|
2012-04-15 09:37:40 +08:00
|
|
|
addrconf_dad_start(ifp);
|
2013-12-06 16:45:22 +08:00
|
|
|
if (ifa_flags & IFA_F_MANAGETEMPADDR)
|
|
|
|
manage_tempaddrs(idev, ifp, valid_lft, prefered_lft,
|
|
|
|
true, jiffies);
|
2005-04-17 06:20:36 +08:00
|
|
|
in6_ifa_put(ifp);
|
2014-03-28 01:28:07 +08:00
|
|
|
addrconf_verify_rtnl();
|
2005-04-17 06:20:36 +08:00
|
|
|
return 0;
|
2015-02-26 01:58:35 +08:00
|
|
|
} else if (ifa_flags & IFA_F_MCAUTOJOIN) {
|
|
|
|
ipv6_mc_config(net->ipv6.mc_autojoin_sk,
|
|
|
|
false, pfx, ifindex);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return PTR_ERR(ifp);
|
|
|
|
}
|
|
|
|
|
2014-04-21 03:29:36 +08:00
|
|
|
static int inet6_addr_del(struct net *net, int ifindex, u32 ifa_flags,
|
|
|
|
const struct in6_addr *pfx, unsigned int plen)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct inet6_ifaddr *ifp;
|
|
|
|
struct inet6_dev *idev;
|
|
|
|
struct net_device *dev;
|
2007-02-09 22:24:49 +08:00
|
|
|
|
2008-05-28 22:54:22 +08:00
|
|
|
if (plen > 128)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2008-03-06 02:46:57 +08:00
|
|
|
dev = __dev_get_by_index(net, ifindex);
|
|
|
|
if (!dev)
|
2005-04-17 06:20:36 +08:00
|
|
|
return -ENODEV;
|
|
|
|
|
2014-11-24 05:28:43 +08:00
|
|
|
idev = __in6_dev_get(dev);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!idev)
|
2005-04-17 06:20:36 +08:00
|
|
|
return -ENXIO;
|
|
|
|
|
|
|
|
read_lock_bh(&idev->lock);
|
2010-03-18 04:31:13 +08:00
|
|
|
list_for_each_entry(ifp, &idev->addr_list, if_list) {
|
2005-04-17 06:20:36 +08:00
|
|
|
if (ifp->prefix_len == plen &&
|
|
|
|
ipv6_addr_equal(pfx, &ifp->addr)) {
|
|
|
|
in6_ifa_hold(ifp);
|
|
|
|
read_unlock_bh(&idev->lock);
|
2007-02-09 22:24:49 +08:00
|
|
|
|
2014-04-21 03:29:36 +08:00
|
|
|
if (!(ifp->flags & IFA_F_TEMPORARY) &&
|
|
|
|
(ifa_flags & IFA_F_MANAGETEMPADDR))
|
|
|
|
manage_tempaddrs(idev, ifp, 0, 0, false,
|
|
|
|
jiffies);
|
2005-04-17 06:20:36 +08:00
|
|
|
ipv6_del_addr(ifp);
|
2014-04-21 03:29:36 +08:00
|
|
|
addrconf_verify_rtnl();
|
2015-02-26 01:58:35 +08:00
|
|
|
if (ipv6_addr_is_multicast(pfx)) {
|
|
|
|
ipv6_mc_config(net->ipv6.mc_autojoin_sk,
|
|
|
|
false, pfx, dev->ifindex);
|
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
read_unlock_bh(&idev->lock);
|
|
|
|
return -EADDRNOTAVAIL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-03-06 02:46:57 +08:00
|
|
|
int addrconf_add_ifaddr(struct net *net, void __user *arg)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct in6_ifreq ireq;
|
|
|
|
int err;
|
2007-02-09 22:24:49 +08:00
|
|
|
|
net: Allow userns root to control ipv6
Allow an unpriviled user who has created a user namespace, and then
created a network namespace to effectively use the new network
namespace, by reducing capable(CAP_NET_ADMIN) and
capable(CAP_NET_RAW) calls to be ns_capable(net->user_ns,
CAP_NET_ADMIN), or capable(net->user_ns, CAP_NET_RAW) calls.
Settings that merely control a single network device are allowed.
Either the network device is a logical network device where
restrictions make no difference or the network device is hardware NIC
that has been explicity moved from the initial network namespace.
In general policy and network stack state changes are allowed while
resource control is left unchanged.
Allow the SIOCSIFADDR ioctl to add ipv6 addresses.
Allow the SIOCDIFADDR ioctl to delete ipv6 addresses.
Allow the SIOCADDRT ioctl to add ipv6 routes.
Allow the SIOCDELRT ioctl to delete ipv6 routes.
Allow creation of ipv6 raw sockets.
Allow setting the IPV6_JOIN_ANYCAST socket option.
Allow setting the IPV6_FL_A_RENEW parameter of the IPV6_FLOWLABEL_MGR
socket option.
Allow setting the IPV6_TRANSPARENT socket option.
Allow setting the IPV6_HOPOPTS socket option.
Allow setting the IPV6_RTHDRDSTOPTS socket option.
Allow setting the IPV6_DSTOPTS socket option.
Allow setting the IPV6_IPSEC_POLICY socket option.
Allow setting the IPV6_XFRM_POLICY socket option.
Allow sending packets with the IPV6_2292HOPOPTS control message.
Allow sending packets with the IPV6_2292DSTOPTS control message.
Allow sending packets with the IPV6_RTHDRDSTOPTS control message.
Allow setting the multicast routing socket options on non multicast
routing sockets.
Allow the SIOCADDTUNNEL, SIOCCHGTUNNEL, and SIOCDELTUNNEL ioctls for
setting up, changing and deleting tunnels over ipv6.
Allow the SIOCADDTUNNEL, SIOCCHGTUNNEL, SIOCDELTUNNEL ioctls for
setting up, changing and deleting ipv6 over ipv4 tunnels.
Allow the SIOCADDPRL, SIOCDELPRL, SIOCCHGPRL ioctls for adding,
deleting, and changing the potential router list for ISATAP tunnels.
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2012-11-16 11:03:06 +08:00
|
|
|
if (!ns_capable(net->user_ns, CAP_NET_ADMIN))
|
2005-04-17 06:20:36 +08:00
|
|
|
return -EPERM;
|
2007-02-09 22:24:49 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
if (copy_from_user(&ireq, arg, sizeof(struct in6_ifreq)))
|
|
|
|
return -EFAULT;
|
|
|
|
|
|
|
|
rtnl_lock();
|
2013-05-17 06:32:00 +08:00
|
|
|
err = inet6_addr_add(net, ireq.ifr6_ifindex, &ireq.ifr6_addr, NULL,
|
2008-03-06 02:46:57 +08:00
|
|
|
ireq.ifr6_prefixlen, IFA_F_PERMANENT,
|
|
|
|
INFINITY_LIFE_TIME, INFINITY_LIFE_TIME);
|
2005-04-17 06:20:36 +08:00
|
|
|
rtnl_unlock();
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2008-03-06 02:46:57 +08:00
|
|
|
int addrconf_del_ifaddr(struct net *net, void __user *arg)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct in6_ifreq ireq;
|
|
|
|
int err;
|
2007-02-09 22:24:49 +08:00
|
|
|
|
net: Allow userns root to control ipv6
Allow an unpriviled user who has created a user namespace, and then
created a network namespace to effectively use the new network
namespace, by reducing capable(CAP_NET_ADMIN) and
capable(CAP_NET_RAW) calls to be ns_capable(net->user_ns,
CAP_NET_ADMIN), or capable(net->user_ns, CAP_NET_RAW) calls.
Settings that merely control a single network device are allowed.
Either the network device is a logical network device where
restrictions make no difference or the network device is hardware NIC
that has been explicity moved from the initial network namespace.
In general policy and network stack state changes are allowed while
resource control is left unchanged.
Allow the SIOCSIFADDR ioctl to add ipv6 addresses.
Allow the SIOCDIFADDR ioctl to delete ipv6 addresses.
Allow the SIOCADDRT ioctl to add ipv6 routes.
Allow the SIOCDELRT ioctl to delete ipv6 routes.
Allow creation of ipv6 raw sockets.
Allow setting the IPV6_JOIN_ANYCAST socket option.
Allow setting the IPV6_FL_A_RENEW parameter of the IPV6_FLOWLABEL_MGR
socket option.
Allow setting the IPV6_TRANSPARENT socket option.
Allow setting the IPV6_HOPOPTS socket option.
Allow setting the IPV6_RTHDRDSTOPTS socket option.
Allow setting the IPV6_DSTOPTS socket option.
Allow setting the IPV6_IPSEC_POLICY socket option.
Allow setting the IPV6_XFRM_POLICY socket option.
Allow sending packets with the IPV6_2292HOPOPTS control message.
Allow sending packets with the IPV6_2292DSTOPTS control message.
Allow sending packets with the IPV6_RTHDRDSTOPTS control message.
Allow setting the multicast routing socket options on non multicast
routing sockets.
Allow the SIOCADDTUNNEL, SIOCCHGTUNNEL, and SIOCDELTUNNEL ioctls for
setting up, changing and deleting tunnels over ipv6.
Allow the SIOCADDTUNNEL, SIOCCHGTUNNEL, SIOCDELTUNNEL ioctls for
setting up, changing and deleting ipv6 over ipv4 tunnels.
Allow the SIOCADDPRL, SIOCDELPRL, SIOCCHGPRL ioctls for adding,
deleting, and changing the potential router list for ISATAP tunnels.
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2012-11-16 11:03:06 +08:00
|
|
|
if (!ns_capable(net->user_ns, CAP_NET_ADMIN))
|
2005-04-17 06:20:36 +08:00
|
|
|
return -EPERM;
|
|
|
|
|
|
|
|
if (copy_from_user(&ireq, arg, sizeof(struct in6_ifreq)))
|
|
|
|
return -EFAULT;
|
|
|
|
|
|
|
|
rtnl_lock();
|
2014-04-21 03:29:36 +08:00
|
|
|
err = inet6_addr_del(net, ireq.ifr6_ifindex, 0, &ireq.ifr6_addr,
|
2008-03-06 02:46:57 +08:00
|
|
|
ireq.ifr6_prefixlen);
|
2005-04-17 06:20:36 +08:00
|
|
|
rtnl_unlock();
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2009-02-07 15:48:01 +08:00
|
|
|
static void add_addr(struct inet6_dev *idev, const struct in6_addr *addr,
|
|
|
|
int plen, int scope)
|
|
|
|
{
|
|
|
|
struct inet6_ifaddr *ifp;
|
|
|
|
|
2013-08-01 16:41:28 +08:00
|
|
|
ifp = ipv6_add_addr(idev, addr, NULL, plen,
|
2014-01-08 22:43:22 +08:00
|
|
|
scope, IFA_F_PERMANENT,
|
|
|
|
INFINITY_LIFE_TIME, INFINITY_LIFE_TIME);
|
2009-02-07 15:48:01 +08:00
|
|
|
if (!IS_ERR(ifp)) {
|
|
|
|
spin_lock_bh(&ifp->lock);
|
|
|
|
ifp->flags &= ~IFA_F_TENTATIVE;
|
|
|
|
spin_unlock_bh(&ifp->lock);
|
2016-11-22 23:57:40 +08:00
|
|
|
rt_genid_bump_ipv6(dev_net(idev->dev));
|
2009-02-07 15:48:01 +08:00
|
|
|
ipv6_ifa_notify(RTM_NEWADDR, ifp);
|
|
|
|
in6_ifa_put(ifp);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-10-30 00:23:10 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6_SIT)
|
2005-04-17 06:20:36 +08:00
|
|
|
static void sit_add_v4_addrs(struct inet6_dev *idev)
|
|
|
|
{
|
|
|
|
struct in6_addr addr;
|
|
|
|
struct net_device *dev;
|
2008-03-25 20:47:49 +08:00
|
|
|
struct net *net = dev_net(idev->dev);
|
2013-11-14 20:51:05 +08:00
|
|
|
int scope, plen;
|
2013-11-14 20:51:06 +08:00
|
|
|
u32 pflags = 0;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
ASSERT_RTNL();
|
|
|
|
|
|
|
|
memset(&addr, 0, sizeof(struct in6_addr));
|
|
|
|
memcpy(&addr.s6_addr32[3], idev->dev->dev_addr, 4);
|
|
|
|
|
|
|
|
if (idev->dev->flags&IFF_POINTOPOINT) {
|
|
|
|
addr.s6_addr32[0] = htonl(0xfe800000);
|
|
|
|
scope = IFA_LINK;
|
2013-11-14 20:51:05 +08:00
|
|
|
plen = 64;
|
2005-04-17 06:20:36 +08:00
|
|
|
} else {
|
|
|
|
scope = IPV6_ADDR_COMPATv4;
|
2013-11-14 20:51:05 +08:00
|
|
|
plen = 96;
|
2013-11-14 20:51:06 +08:00
|
|
|
pflags |= RTF_NONEXTHOP;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (addr.s6_addr32[3]) {
|
2013-11-14 20:51:05 +08:00
|
|
|
add_addr(idev, &addr, plen, scope);
|
2013-11-14 20:51:06 +08:00
|
|
|
addrconf_prefix_route(&addr, plen, idev->dev, 0, pflags);
|
2005-04-17 06:20:36 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2008-03-06 02:47:47 +08:00
|
|
|
for_each_netdev(net, dev) {
|
2012-04-01 15:49:08 +08:00
|
|
|
struct in_device *in_dev = __in_dev_get_rtnl(dev);
|
2005-04-17 06:20:36 +08:00
|
|
|
if (in_dev && (dev->flags & IFF_UP)) {
|
2012-04-01 15:49:08 +08:00
|
|
|
struct in_ifaddr *ifa;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
int flag = scope;
|
|
|
|
|
|
|
|
for (ifa = in_dev->ifa_list; ifa; ifa = ifa->ifa_next) {
|
|
|
|
|
|
|
|
addr.s6_addr32[3] = ifa->ifa_local;
|
|
|
|
|
|
|
|
if (ifa->ifa_scope == RT_SCOPE_LINK)
|
|
|
|
continue;
|
|
|
|
if (ifa->ifa_scope >= RT_SCOPE_HOST) {
|
|
|
|
if (idev->dev->flags&IFF_POINTOPOINT)
|
|
|
|
continue;
|
|
|
|
flag |= IFA_HOST;
|
|
|
|
}
|
|
|
|
|
2009-02-07 15:48:01 +08:00
|
|
|
add_addr(idev, &addr, plen, flag);
|
2013-11-14 20:51:06 +08:00
|
|
|
addrconf_prefix_route(&addr, plen, idev->dev, 0,
|
|
|
|
pflags);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
}
|
2007-02-09 22:24:49 +08:00
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2006-10-11 05:49:53 +08:00
|
|
|
#endif
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
static void init_loopback(struct net_device *dev)
|
|
|
|
{
|
|
|
|
struct inet6_dev *idev;
|
2013-04-02 18:45:05 +08:00
|
|
|
struct net_device *sp_dev;
|
|
|
|
struct inet6_ifaddr *sp_ifa;
|
|
|
|
struct rt6_info *sp_rt;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
/* ::1 */
|
|
|
|
|
|
|
|
ASSERT_RTNL();
|
|
|
|
|
2014-11-24 05:28:43 +08:00
|
|
|
idev = ipv6_find_idev(dev);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!idev) {
|
2012-05-15 22:11:54 +08:00
|
|
|
pr_debug("%s: add_dev failed\n", __func__);
|
2005-04-17 06:20:36 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2009-02-07 15:48:01 +08:00
|
|
|
add_addr(idev, &in6addr_loopback, 128, IFA_HOST);
|
2013-04-02 18:45:05 +08:00
|
|
|
|
|
|
|
/* Add routes to other interface's IPv6 addresses */
|
|
|
|
for_each_netdev(dev_net(dev), sp_dev) {
|
|
|
|
if (!strcmp(sp_dev->name, dev->name))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
idev = __in6_dev_get(sp_dev);
|
|
|
|
if (!idev)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
read_lock_bh(&idev->lock);
|
|
|
|
list_for_each_entry(sp_ifa, &idev->addr_list, if_list) {
|
|
|
|
|
|
|
|
if (sp_ifa->flags & (IFA_F_DADFAILED | IFA_F_TENTATIVE))
|
|
|
|
continue;
|
|
|
|
|
2014-01-24 16:29:11 +08:00
|
|
|
if (sp_ifa->rt) {
|
|
|
|
/* This dst has been added to garbage list when
|
|
|
|
* lo device down, release this obsolete dst and
|
|
|
|
* reallocate a new router for ifa.
|
|
|
|
*/
|
ipv6: correctly add local routes when lo goes up
The goal of the patch is to fix this scenario:
ip link add dummy1 type dummy
ip link set dummy1 up
ip link set lo down ; ip link set lo up
After that sequence, the local route to the link layer address of dummy1 is
not there anymore.
When the loopback is set down, all local routes are deleted by
addrconf_ifdown()/rt6_ifdown(). At this time, the rt6_info entry still
exists, because the corresponding idev has a reference on it. After the rcu
grace period, dst_rcu_free() is called, and thus ___dst_free(), which will
set obsolete to DST_OBSOLETE_DEAD.
In this case, init_loopback() is called before dst_rcu_free(), thus
obsolete is still sets to something <= 0. So, the function doesn't add the
route again. To avoid that race, let's check the rt6 refcnt instead.
Fixes: 25fb6ca4ed9c ("net IPv6 : Fix broken IPv6 routing table after loopback down-up")
Fixes: a881ae1f625c ("ipv6: don't call addrconf_dst_alloc again when enable lo")
Fixes: 33d99113b110 ("ipv6: reallocate addrconf router for ipv6 address when lo device up")
Reported-by: Francesco Santoro <francesco.santoro@6wind.com>
Reported-by: Samuel Gauthier <samuel.gauthier@6wind.com>
CC: Balakumaran Kannan <Balakumaran.Kannan@ap.sony.com>
CC: Maruthi Thotad <Maruthi.Thotad@ap.sony.com>
CC: Sabrina Dubroca <sd@queasysnail.net>
CC: Hannes Frederic Sowa <hannes@stressinduktion.org>
CC: Weilong Chen <chenweilong@huawei.com>
CC: Gao feng <gaofeng@cn.fujitsu.com>
Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-10-12 16:10:40 +08:00
|
|
|
if (!atomic_read(&sp_ifa->rt->rt6i_ref)) {
|
2014-01-24 16:29:11 +08:00
|
|
|
ip6_rt_put(sp_ifa->rt);
|
|
|
|
sp_ifa->rt = NULL;
|
|
|
|
} else {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
2013-06-16 11:14:30 +08:00
|
|
|
|
2013-12-02 18:28:49 +08:00
|
|
|
sp_rt = addrconf_dst_alloc(idev, &sp_ifa->addr, false);
|
2013-04-02 18:45:05 +08:00
|
|
|
|
|
|
|
/* Failure cases are ignored */
|
2013-06-03 06:16:21 +08:00
|
|
|
if (!IS_ERR(sp_rt)) {
|
|
|
|
sp_ifa->rt = sp_rt;
|
2013-04-02 18:45:05 +08:00
|
|
|
ip6_ins_rt(sp_rt);
|
2013-06-03 06:16:21 +08:00
|
|
|
}
|
2013-04-02 18:45:05 +08:00
|
|
|
}
|
|
|
|
read_unlock_bh(&idev->lock);
|
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2016-06-16 03:20:17 +08:00
|
|
|
void addrconf_add_linklocal(struct inet6_dev *idev,
|
|
|
|
const struct in6_addr *addr, u32 flags)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2012-04-01 15:49:08 +08:00
|
|
|
struct inet6_ifaddr *ifp;
|
2015-03-24 06:36:02 +08:00
|
|
|
u32 addr_flags = flags | IFA_F_PERMANENT;
|
2007-04-26 08:08:10 +08:00
|
|
|
|
|
|
|
#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
|
|
|
|
if (idev->cnf.optimistic_dad &&
|
2008-07-21 09:17:02 +08:00
|
|
|
!dev_net(idev->dev)->ipv6.devconf_all->forwarding)
|
2007-04-26 08:08:10 +08:00
|
|
|
addr_flags |= IFA_F_OPTIMISTIC;
|
|
|
|
#endif
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2014-01-08 22:43:22 +08:00
|
|
|
ifp = ipv6_add_addr(idev, addr, NULL, 64, IFA_LINK, addr_flags,
|
|
|
|
INFINITY_LIFE_TIME, INFINITY_LIFE_TIME);
|
2005-04-17 06:20:36 +08:00
|
|
|
if (!IS_ERR(ifp)) {
|
2007-02-07 19:36:26 +08:00
|
|
|
addrconf_prefix_route(&ifp->addr, ifp->prefix_len, idev->dev, 0, 0);
|
2012-04-15 09:37:40 +08:00
|
|
|
addrconf_dad_start(ifp);
|
2005-04-17 06:20:36 +08:00
|
|
|
in6_ifa_put(ifp);
|
|
|
|
}
|
|
|
|
}
|
2016-06-16 03:20:17 +08:00
|
|
|
EXPORT_SYMBOL_GPL(addrconf_add_linklocal);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 06:36:01 +08:00
|
|
|
static bool ipv6_reserved_interfaceid(struct in6_addr address)
|
|
|
|
{
|
|
|
|
if ((address.s6_addr32[2] | address.s6_addr32[3]) == 0)
|
|
|
|
return true;
|
|
|
|
|
|
|
|
if (address.s6_addr32[2] == htonl(0x02005eff) &&
|
|
|
|
((address.s6_addr32[3] & htonl(0xfe000000)) == htonl(0xfe000000)))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
if (address.s6_addr32[2] == htonl(0xfdffffff) &&
|
|
|
|
((address.s6_addr32[3] & htonl(0xffffff80)) == htonl(0xffffff80)))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ipv6_generate_stable_address(struct in6_addr *address,
|
|
|
|
u8 dad_count,
|
|
|
|
const struct inet6_dev *idev)
|
|
|
|
{
|
|
|
|
static DEFINE_SPINLOCK(lock);
|
|
|
|
static __u32 digest[SHA_DIGEST_WORDS];
|
|
|
|
static __u32 workspace[SHA_WORKSPACE_WORDS];
|
|
|
|
|
|
|
|
static union {
|
|
|
|
char __data[SHA_MESSAGE_BYTES];
|
|
|
|
struct {
|
|
|
|
struct in6_addr secret;
|
2015-03-24 18:05:28 +08:00
|
|
|
__be32 prefix[2];
|
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 06:36:01 +08:00
|
|
|
unsigned char hwaddr[MAX_ADDR_LEN];
|
|
|
|
u8 dad_count;
|
|
|
|
} __packed;
|
|
|
|
} data;
|
|
|
|
|
|
|
|
struct in6_addr secret;
|
|
|
|
struct in6_addr temp;
|
|
|
|
struct net *net = dev_net(idev->dev);
|
|
|
|
|
|
|
|
BUILD_BUG_ON(sizeof(data.__data) != sizeof(data));
|
|
|
|
|
|
|
|
if (idev->cnf.stable_secret.initialized)
|
|
|
|
secret = idev->cnf.stable_secret.secret;
|
|
|
|
else if (net->ipv6.devconf_dflt->stable_secret.initialized)
|
|
|
|
secret = net->ipv6.devconf_dflt->stable_secret.secret;
|
|
|
|
else
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
retry:
|
|
|
|
spin_lock_bh(&lock);
|
|
|
|
|
|
|
|
sha_init(digest);
|
|
|
|
memset(&data, 0, sizeof(data));
|
|
|
|
memset(workspace, 0, sizeof(workspace));
|
|
|
|
memcpy(data.hwaddr, idev->dev->perm_addr, idev->dev->addr_len);
|
2015-03-24 18:05:28 +08:00
|
|
|
data.prefix[0] = address->s6_addr32[0];
|
|
|
|
data.prefix[1] = address->s6_addr32[1];
|
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 06:36:01 +08:00
|
|
|
data.secret = secret;
|
|
|
|
data.dad_count = dad_count;
|
|
|
|
|
|
|
|
sha_transform(digest, data.__data, workspace);
|
|
|
|
|
|
|
|
temp = *address;
|
2015-03-24 18:05:28 +08:00
|
|
|
temp.s6_addr32[2] = (__force __be32)digest[0];
|
|
|
|
temp.s6_addr32[3] = (__force __be32)digest[1];
|
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 06:36:01 +08:00
|
|
|
|
|
|
|
spin_unlock_bh(&lock);
|
|
|
|
|
|
|
|
if (ipv6_reserved_interfaceid(temp)) {
|
|
|
|
dad_count++;
|
2015-03-24 06:36:05 +08:00
|
|
|
if (dad_count > dev_net(idev->dev)->ipv6.sysctl.idgen_retries)
|
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 06:36:01 +08:00
|
|
|
return -1;
|
|
|
|
goto retry;
|
|
|
|
}
|
|
|
|
|
|
|
|
*address = temp;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-12-16 23:44:38 +08:00
|
|
|
static void ipv6_gen_mode_random_init(struct inet6_dev *idev)
|
|
|
|
{
|
|
|
|
struct ipv6_stable_secret *s = &idev->cnf.stable_secret;
|
|
|
|
|
|
|
|
if (s->initialized)
|
|
|
|
return;
|
|
|
|
s = &idev->cnf.stable_secret;
|
|
|
|
get_random_bytes(&s->secret, sizeof(s->secret));
|
|
|
|
s->initialized = true;
|
|
|
|
}
|
|
|
|
|
2014-07-12 03:10:18 +08:00
|
|
|
static void addrconf_addr_gen(struct inet6_dev *idev, bool prefix_route)
|
|
|
|
{
|
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 06:36:01 +08:00
|
|
|
struct in6_addr addr;
|
|
|
|
|
2015-10-13 02:47:10 +08:00
|
|
|
/* no link local addresses on L3 master devices */
|
|
|
|
if (netif_is_l3_master(idev->dev))
|
|
|
|
return;
|
|
|
|
|
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 06:36:01 +08:00
|
|
|
ipv6_addr_set(&addr, htonl(0xFE800000), 0, 0, 0);
|
2014-07-12 03:10:18 +08:00
|
|
|
|
2017-01-26 11:59:17 +08:00
|
|
|
switch (idev->cnf.addr_gen_mode) {
|
2015-12-16 23:44:38 +08:00
|
|
|
case IN6_ADDR_GEN_MODE_RANDOM:
|
|
|
|
ipv6_gen_mode_random_init(idev);
|
|
|
|
/* fallthrough */
|
|
|
|
case IN6_ADDR_GEN_MODE_STABLE_PRIVACY:
|
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 06:36:01 +08:00
|
|
|
if (!ipv6_generate_stable_address(&addr, 0, idev))
|
2015-03-24 06:36:02 +08:00
|
|
|
addrconf_add_linklocal(idev, &addr,
|
|
|
|
IFA_F_STABLE_PRIVACY);
|
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 06:36:01 +08:00
|
|
|
else if (prefix_route)
|
|
|
|
addrconf_prefix_route(&addr, 64, idev->dev, 0, 0);
|
2015-12-16 23:44:38 +08:00
|
|
|
break;
|
|
|
|
case IN6_ADDR_GEN_MODE_EUI64:
|
2014-07-12 03:10:18 +08:00
|
|
|
/* addrconf_add_linklocal also adds a prefix_route and we
|
|
|
|
* only need to care about prefix routes if ipv6_generate_eui64
|
|
|
|
* couldn't generate one.
|
|
|
|
*/
|
|
|
|
if (ipv6_generate_eui64(addr.s6_addr + 8, idev->dev) == 0)
|
2015-03-24 06:36:02 +08:00
|
|
|
addrconf_add_linklocal(idev, &addr, 0);
|
2014-07-12 03:10:18 +08:00
|
|
|
else if (prefix_route)
|
|
|
|
addrconf_prefix_route(&addr, 64, idev->dev, 0, 0);
|
2015-12-16 23:44:38 +08:00
|
|
|
break;
|
|
|
|
case IN6_ADDR_GEN_MODE_NONE:
|
|
|
|
default:
|
|
|
|
/* will not add any link local address */
|
|
|
|
break;
|
2014-07-12 03:10:18 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
static void addrconf_dev_config(struct net_device *dev)
|
|
|
|
{
|
2012-04-01 15:49:08 +08:00
|
|
|
struct inet6_dev *idev;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
ASSERT_RTNL();
|
|
|
|
|
2007-06-15 04:02:55 +08:00
|
|
|
if ((dev->type != ARPHRD_ETHER) &&
|
|
|
|
(dev->type != ARPHRD_FDDI) &&
|
|
|
|
(dev->type != ARPHRD_ARCNET) &&
|
2012-05-10 11:25:52 +08:00
|
|
|
(dev->type != ARPHRD_INFINIBAND) &&
|
2013-08-20 18:16:06 +08:00
|
|
|
(dev->type != ARPHRD_IEEE1394) &&
|
2013-12-11 23:05:36 +08:00
|
|
|
(dev->type != ARPHRD_TUNNEL6) &&
|
2015-12-16 23:44:38 +08:00
|
|
|
(dev->type != ARPHRD_6LOWPAN) &&
|
|
|
|
(dev->type != ARPHRD_NONE)) {
|
2007-06-15 04:02:55 +08:00
|
|
|
/* Alas, we support only Ethernet autoconfiguration. */
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
idev = addrconf_add_dev(dev);
|
2010-07-20 18:34:30 +08:00
|
|
|
if (IS_ERR(idev))
|
2005-04-17 06:20:36 +08:00
|
|
|
return;
|
|
|
|
|
2015-12-16 23:44:38 +08:00
|
|
|
/* this device type has no EUI support */
|
|
|
|
if (dev->type == ARPHRD_NONE &&
|
2017-01-26 11:59:17 +08:00
|
|
|
idev->cnf.addr_gen_mode == IN6_ADDR_GEN_MODE_EUI64)
|
|
|
|
idev->cnf.addr_gen_mode = IN6_ADDR_GEN_MODE_RANDOM;
|
2015-12-16 23:44:38 +08:00
|
|
|
|
2014-07-12 03:10:18 +08:00
|
|
|
addrconf_addr_gen(idev, false);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2012-10-30 00:23:10 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6_SIT)
|
2005-04-17 06:20:36 +08:00
|
|
|
static void addrconf_sit_config(struct net_device *dev)
|
|
|
|
{
|
|
|
|
struct inet6_dev *idev;
|
|
|
|
|
|
|
|
ASSERT_RTNL();
|
|
|
|
|
2007-02-09 22:24:49 +08:00
|
|
|
/*
|
|
|
|
* Configure the tunnel with one of our IPv4
|
|
|
|
* addresses... we should configure all of
|
2005-04-17 06:20:36 +08:00
|
|
|
* our v4 addrs in the tunnel
|
|
|
|
*/
|
|
|
|
|
2014-11-24 05:28:43 +08:00
|
|
|
idev = ipv6_find_idev(dev);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!idev) {
|
2012-05-15 22:11:54 +08:00
|
|
|
pr_debug("%s: add_dev failed\n", __func__);
|
2005-04-17 06:20:36 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2007-11-29 19:11:40 +08:00
|
|
|
if (dev->priv_flags & IFF_ISATAP) {
|
2014-07-12 03:10:18 +08:00
|
|
|
addrconf_addr_gen(idev, false);
|
2007-11-29 19:11:40 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
sit_add_v4_addrs(idev);
|
|
|
|
|
2012-10-02 07:19:14 +08:00
|
|
|
if (dev->flags&IFF_POINTOPOINT)
|
2005-04-17 06:20:36 +08:00
|
|
|
addrconf_add_mroute(dev);
|
|
|
|
}
|
2006-10-11 05:49:53 +08:00
|
|
|
#endif
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2012-10-30 00:23:10 +08:00
|
|
|
#if IS_ENABLED(CONFIG_NET_IPGRE)
|
2011-06-08 18:44:30 +08:00
|
|
|
static void addrconf_gre_config(struct net_device *dev)
|
|
|
|
{
|
|
|
|
struct inet6_dev *idev;
|
|
|
|
|
|
|
|
ASSERT_RTNL();
|
|
|
|
|
2014-11-24 05:28:43 +08:00
|
|
|
idev = ipv6_find_idev(dev);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!idev) {
|
2012-05-15 22:11:54 +08:00
|
|
|
pr_debug("%s: add_dev failed\n", __func__);
|
2011-06-08 18:44:30 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-07-12 03:10:18 +08:00
|
|
|
addrconf_addr_gen(idev, true);
|
2015-10-09 00:19:39 +08:00
|
|
|
if (dev->flags & IFF_POINTOPOINT)
|
|
|
|
addrconf_add_mroute(dev);
|
2011-06-08 18:44:30 +08:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-25 01:25:37 +08:00
|
|
|
static int fixup_permanent_addr(struct inet6_dev *idev,
|
|
|
|
struct inet6_ifaddr *ifp)
|
|
|
|
{
|
|
|
|
if (!ifp->rt) {
|
|
|
|
struct rt6_info *rt;
|
|
|
|
|
|
|
|
rt = addrconf_dst_alloc(idev, &ifp->addr, false);
|
|
|
|
if (unlikely(IS_ERR(rt)))
|
|
|
|
return PTR_ERR(rt);
|
|
|
|
|
|
|
|
ifp->rt = rt;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!(ifp->flags & IFA_F_NOPREFIXROUTE)) {
|
|
|
|
addrconf_prefix_route(&ifp->addr, ifp->prefix_len,
|
|
|
|
idev->dev, 0, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
addrconf_dad_start(ifp);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void addrconf_permanent_addr(struct net_device *dev)
|
|
|
|
{
|
|
|
|
struct inet6_ifaddr *ifp, *tmp;
|
|
|
|
struct inet6_dev *idev;
|
|
|
|
|
|
|
|
idev = __in6_dev_get(dev);
|
|
|
|
if (!idev)
|
|
|
|
return;
|
|
|
|
|
|
|
|
write_lock_bh(&idev->lock);
|
|
|
|
|
|
|
|
list_for_each_entry_safe(ifp, tmp, &idev->addr_list, if_list) {
|
|
|
|
if ((ifp->flags & IFA_F_PERMANENT) &&
|
|
|
|
fixup_permanent_addr(idev, ifp) < 0) {
|
|
|
|
write_unlock_bh(&idev->lock);
|
|
|
|
ipv6_del_addr(ifp);
|
|
|
|
write_lock_bh(&idev->lock);
|
|
|
|
|
|
|
|
net_info_ratelimited("%s: Failed to add prefix route for address %pI6c; dropping\n",
|
|
|
|
idev->dev->name, &ifp->addr);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
write_unlock_bh(&idev->lock);
|
|
|
|
}
|
|
|
|
|
2007-02-09 22:24:49 +08:00
|
|
|
static int addrconf_notify(struct notifier_block *this, unsigned long event,
|
2013-05-28 09:30:21 +08:00
|
|
|
void *ptr)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2013-05-28 09:30:21 +08:00
|
|
|
struct net_device *dev = netdev_notifier_info_to_dev(ptr);
|
2016-04-08 02:10:41 +08:00
|
|
|
struct netdev_notifier_changeupper_info *info;
|
2012-08-23 05:50:59 +08:00
|
|
|
struct inet6_dev *idev = __in6_dev_get(dev);
|
2005-12-21 21:57:44 +08:00
|
|
|
int run_pending = 0;
|
2007-07-31 08:04:52 +08:00
|
|
|
int err;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2010-03-21 07:09:01 +08:00
|
|
|
switch (event) {
|
2007-02-15 01:07:27 +08:00
|
|
|
case NETDEV_REGISTER:
|
2007-06-15 04:02:55 +08:00
|
|
|
if (!idev && dev->mtu >= IPV6_MIN_MTU) {
|
2007-02-15 01:07:27 +08:00
|
|
|
idev = ipv6_add_dev(dev);
|
2014-07-26 06:25:09 +08:00
|
|
|
if (IS_ERR(idev))
|
|
|
|
return notifier_from_errno(PTR_ERR(idev));
|
2007-02-15 01:07:27 +08:00
|
|
|
}
|
|
|
|
break;
|
2010-03-21 07:08:18 +08:00
|
|
|
|
2015-10-27 02:06:33 +08:00
|
|
|
case NETDEV_CHANGEMTU:
|
|
|
|
/* if MTU under IPV6_MIN_MTU stop IPv6 on this interface. */
|
|
|
|
if (dev->mtu < IPV6_MIN_MTU) {
|
|
|
|
addrconf_ifdown(dev, 1);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (idev) {
|
|
|
|
rt6_mtu_change(dev, dev->mtu);
|
|
|
|
idev->cnf.mtu6 = dev->mtu;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* allocate new idev */
|
|
|
|
idev = ipv6_add_dev(dev);
|
|
|
|
if (IS_ERR(idev))
|
|
|
|
break;
|
|
|
|
|
|
|
|
/* device is still not ready */
|
|
|
|
if (!(idev->if_flags & IF_READY))
|
|
|
|
break;
|
|
|
|
|
|
|
|
run_pending = 1;
|
|
|
|
|
|
|
|
/* fall through */
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
case NETDEV_UP:
|
2005-12-21 21:57:24 +08:00
|
|
|
case NETDEV_CHANGE:
|
bonding / ipv6: no addrconf for slaves separately from master
At present, when a device is enslaved to bonding, if ipv6 is
active then addrconf will be initated on the slave (because it is closed
then opened during the enslavement processing). This causes DAD and RS
packets to be sent from the slave. These packets in turn can confuse
switches that perform ipv6 snooping, causing them to incorrectly update
their forwarding tables (if, e.g., the slave being added is an inactve
backup that won't be used right away) and direct traffic away from the
active slave to a backup slave (where the incoming packets will be
dropped).
This patch alters the behavior so that addrconf will only run on
the master device itself. I believe this is logically correct, as it
prevents slaves from having an IPv6 identity independent from the
master. This is consistent with the IPv4 behavior for bonding.
This is accomplished by (a) having bonding set IFF_SLAVE sooner
in the enslavement processing than currently occurs (before open, not
after), and (b) having ipv6 addrconf ignore UP and CHANGE events on
slave devices.
The eql driver also uses the IFF_SLAVE flag. I inspected eql,
and I believe this change is reasonable for its usage of IFF_SLAVE, but
I did not test it.
Signed-off-by: Jay Vosburgh <fubar@us.ibm.com>
Signed-off-by: Jeff Garzik <jeff@garzik.org>
2007-07-10 01:42:47 +08:00
|
|
|
if (dev->flags & IFF_SLAVE)
|
|
|
|
break;
|
|
|
|
|
2014-09-12 06:07:16 +08:00
|
|
|
if (idev && idev->cnf.disable_ipv6)
|
|
|
|
break;
|
|
|
|
|
2005-12-21 21:57:24 +08:00
|
|
|
if (event == NETDEV_UP) {
|
2016-04-22 11:56:12 +08:00
|
|
|
/* restore routes for permanent addresses */
|
|
|
|
addrconf_permanent_addr(dev);
|
|
|
|
|
2007-10-10 17:53:43 +08:00
|
|
|
if (!addrconf_qdisc_ok(dev)) {
|
2005-12-21 21:57:24 +08:00
|
|
|
/* device is not ready yet. */
|
2012-05-15 22:11:53 +08:00
|
|
|
pr_info("ADDRCONF(NETDEV_UP): %s: link is not ready\n",
|
2005-12-21 21:57:24 +08:00
|
|
|
dev->name);
|
|
|
|
break;
|
|
|
|
}
|
2006-02-09 08:10:53 +08:00
|
|
|
|
2007-11-30 20:36:08 +08:00
|
|
|
if (!idev && dev->mtu >= IPV6_MIN_MTU)
|
|
|
|
idev = ipv6_add_dev(dev);
|
|
|
|
|
2014-07-26 06:25:09 +08:00
|
|
|
if (!IS_ERR_OR_NULL(idev)) {
|
2006-02-09 08:10:53 +08:00
|
|
|
idev->if_flags |= IF_READY;
|
ipv6: fix run pending DAD when interface becomes ready
With some net devices types, an IPv6 address configured while the
interface was down can stay 'tentative' forever, even after the interface
is set up. In some case, pending IPv6 DADs are not executed when the
device becomes ready.
I observed this while doing some tests with kvm. If I assign an IPv6
address to my interface eth0 (kvm driver rtl8139) when it is still down
then the address is flagged tentative (IFA_F_TENTATIVE). Then, I set
eth0 up, and to my surprise, the address stays 'tentative', no DAD is
executed and the address can't be pinged.
I also observed the same behaviour, without kvm, with virtual interfaces
types macvlan and veth.
Some easy steps to reproduce the issue with macvlan:
1. ip link add link eth0 type macvlan
2. ip -6 addr add 2003::ab32/64 dev macvlan0
3. ip addr show dev macvlan0
...
inet6 2003::ab32/64 scope global tentative
...
4. ip link set macvlan0 up
5. ip addr show dev macvlan0
...
inet6 2003::ab32/64 scope global tentative
...
Address is still tentative
I think there's a bug in net/ipv6/addrconf.c, addrconf_notify():
addrconf_dad_run() is not always run when the interface is flagged IF_READY.
Currently it is only run when receiving NETDEV_CHANGE event. Looks like
some (virtual) devices doesn't send this event when becoming up.
For both NETDEV_UP and NETDEV_CHANGE events, when the interface becomes
ready, run_pending should be set to 1. Patch below.
'run_pending = 1' could be moved below the if/else block but it makes
the code less readable.
Signed-off-by: Benjamin Thery <benjamin.thery@bull.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
2008-11-05 17:43:57 +08:00
|
|
|
run_pending = 1;
|
|
|
|
}
|
2015-10-27 02:06:33 +08:00
|
|
|
} else if (event == NETDEV_CHANGE) {
|
2007-10-10 17:53:43 +08:00
|
|
|
if (!addrconf_qdisc_ok(dev)) {
|
2005-12-21 21:57:24 +08:00
|
|
|
/* device is still not ready. */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (idev) {
|
2010-03-21 07:08:18 +08:00
|
|
|
if (idev->if_flags & IF_READY)
|
2005-12-21 21:57:24 +08:00
|
|
|
/* device is already configured. */
|
|
|
|
break;
|
|
|
|
idev->if_flags |= IF_READY;
|
|
|
|
}
|
|
|
|
|
2012-05-15 22:11:53 +08:00
|
|
|
pr_info("ADDRCONF(NETDEV_CHANGE): %s: link becomes ready\n",
|
|
|
|
dev->name);
|
2005-12-21 21:57:24 +08:00
|
|
|
|
2005-12-21 21:57:44 +08:00
|
|
|
run_pending = 1;
|
2005-12-21 21:57:24 +08:00
|
|
|
}
|
|
|
|
|
2010-03-21 07:09:01 +08:00
|
|
|
switch (dev->type) {
|
2012-10-30 00:23:10 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6_SIT)
|
2005-04-17 06:20:36 +08:00
|
|
|
case ARPHRD_SIT:
|
|
|
|
addrconf_sit_config(dev);
|
|
|
|
break;
|
2011-06-08 18:44:30 +08:00
|
|
|
#endif
|
2012-10-30 00:23:10 +08:00
|
|
|
#if IS_ENABLED(CONFIG_NET_IPGRE)
|
2011-06-08 18:44:30 +08:00
|
|
|
case ARPHRD_IPGRE:
|
|
|
|
addrconf_gre_config(dev);
|
|
|
|
break;
|
2006-10-11 05:49:53 +08:00
|
|
|
#endif
|
2005-04-17 06:20:36 +08:00
|
|
|
case ARPHRD_LOOPBACK:
|
|
|
|
init_loopback(dev);
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
addrconf_dev_config(dev);
|
|
|
|
break;
|
2007-04-21 08:09:22 +08:00
|
|
|
}
|
2010-03-21 07:08:18 +08:00
|
|
|
|
2014-07-26 06:25:09 +08:00
|
|
|
if (!IS_ERR_OR_NULL(idev)) {
|
2005-12-21 21:57:44 +08:00
|
|
|
if (run_pending)
|
|
|
|
addrconf_dad_run(idev);
|
|
|
|
|
2010-03-21 07:08:18 +08:00
|
|
|
/*
|
|
|
|
* If the MTU changed during the interface down,
|
|
|
|
* when the interface up, the changed MTU must be
|
|
|
|
* reflected in the idev as well as routers.
|
2005-04-17 06:20:36 +08:00
|
|
|
*/
|
2010-03-21 07:08:18 +08:00
|
|
|
if (idev->cnf.mtu6 != dev->mtu &&
|
|
|
|
dev->mtu >= IPV6_MIN_MTU) {
|
2005-04-17 06:20:36 +08:00
|
|
|
rt6_mtu_change(dev, dev->mtu);
|
|
|
|
idev->cnf.mtu6 = dev->mtu;
|
|
|
|
}
|
|
|
|
idev->tstamp = jiffies;
|
|
|
|
inet6_ifinfo_notify(RTM_NEWLINK, idev);
|
2010-03-21 07:08:18 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If the changed mtu during down is lower than
|
|
|
|
* IPV6_MIN_MTU stop IPv6 on this interface.
|
2005-04-17 06:20:36 +08:00
|
|
|
*/
|
|
|
|
if (dev->mtu < IPV6_MIN_MTU)
|
2010-03-21 07:08:18 +08:00
|
|
|
addrconf_ifdown(dev, 1);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case NETDEV_DOWN:
|
|
|
|
case NETDEV_UNREGISTER:
|
|
|
|
/*
|
|
|
|
* Remove all addresses from this interface.
|
|
|
|
*/
|
|
|
|
addrconf_ifdown(dev, event != NETDEV_DOWN);
|
|
|
|
break;
|
2005-12-21 21:57:24 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
case NETDEV_CHANGENAME:
|
|
|
|
if (idev) {
|
2007-04-29 12:16:39 +08:00
|
|
|
snmp6_unregister_dev(idev);
|
2008-01-11 09:41:21 +08:00
|
|
|
addrconf_sysctl_unregister(idev);
|
2014-07-26 06:25:09 +08:00
|
|
|
err = addrconf_sysctl_register(idev);
|
2007-07-31 08:04:52 +08:00
|
|
|
if (err)
|
|
|
|
return notifier_from_errno(err);
|
2014-07-26 06:25:09 +08:00
|
|
|
err = snmp6_register_dev(idev);
|
|
|
|
if (err) {
|
|
|
|
addrconf_sysctl_unregister(idev);
|
|
|
|
return notifier_from_errno(err);
|
|
|
|
}
|
2007-04-29 12:16:39 +08:00
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
break;
|
2010-03-21 07:08:18 +08:00
|
|
|
|
2010-03-10 18:28:56 +08:00
|
|
|
case NETDEV_PRE_TYPE_CHANGE:
|
|
|
|
case NETDEV_POST_TYPE_CHANGE:
|
2015-12-04 04:12:32 +08:00
|
|
|
if (idev)
|
|
|
|
addrconf_type_change(dev, event);
|
2009-09-15 17:37:40 +08:00
|
|
|
break;
|
2016-04-08 02:10:41 +08:00
|
|
|
|
|
|
|
case NETDEV_CHANGEUPPER:
|
|
|
|
info = ptr;
|
|
|
|
|
|
|
|
/* flush all routes if dev is linked to or unlinked from
|
|
|
|
* an L3 master device (e.g., VRF)
|
|
|
|
*/
|
|
|
|
if (info->upper_dev && netif_is_l3_master(info->upper_dev))
|
|
|
|
addrconf_ifdown(dev, 0);
|
2007-04-21 08:09:22 +08:00
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
return NOTIFY_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* addrconf module should be notified of a device going up
|
|
|
|
*/
|
|
|
|
static struct notifier_block ipv6_dev_notf = {
|
|
|
|
.notifier_call = addrconf_notify,
|
|
|
|
};
|
|
|
|
|
2010-03-10 18:28:56 +08:00
|
|
|
static void addrconf_type_change(struct net_device *dev, unsigned long event)
|
2009-09-15 17:37:40 +08:00
|
|
|
{
|
|
|
|
struct inet6_dev *idev;
|
|
|
|
ASSERT_RTNL();
|
|
|
|
|
|
|
|
idev = __in6_dev_get(dev);
|
|
|
|
|
2010-03-10 18:28:56 +08:00
|
|
|
if (event == NETDEV_POST_TYPE_CHANGE)
|
2009-09-15 17:37:40 +08:00
|
|
|
ipv6_mc_remap(idev);
|
2010-03-10 18:28:56 +08:00
|
|
|
else if (event == NETDEV_PRE_TYPE_CHANGE)
|
2009-09-15 17:37:40 +08:00
|
|
|
ipv6_mc_unmap(idev);
|
|
|
|
}
|
|
|
|
|
2016-04-09 03:01:21 +08:00
|
|
|
static bool addr_is_local(const struct in6_addr *addr)
|
|
|
|
{
|
|
|
|
return ipv6_addr_type(addr) &
|
|
|
|
(IPV6_ADDR_LINKLOCAL | IPV6_ADDR_LOOPBACK);
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
static int addrconf_ifdown(struct net_device *dev, int how)
|
|
|
|
{
|
2008-03-25 20:47:49 +08:00
|
|
|
struct net *net = dev_net(dev);
|
2010-03-18 04:31:13 +08:00
|
|
|
struct inet6_dev *idev;
|
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-25 01:25:37 +08:00
|
|
|
struct inet6_ifaddr *ifa, *tmp;
|
|
|
|
struct list_head del_list;
|
|
|
|
int _keep_addr;
|
|
|
|
bool keep_addr;
|
2011-01-24 15:27:15 +08:00
|
|
|
int state, i;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
ASSERT_RTNL();
|
|
|
|
|
2011-01-24 15:27:15 +08:00
|
|
|
rt6_ifdown(net, dev);
|
|
|
|
neigh_ifdown(&nd_tbl, dev);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
idev = __in6_dev_get(dev);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!idev)
|
2005-04-17 06:20:36 +08:00
|
|
|
return -ENODEV;
|
|
|
|
|
2010-03-21 07:08:18 +08:00
|
|
|
/*
|
|
|
|
* Step 1: remove reference to ipv6 device from parent device.
|
|
|
|
* Do not dev_put!
|
2005-04-17 06:20:36 +08:00
|
|
|
*/
|
2008-04-04 04:30:17 +08:00
|
|
|
if (how) {
|
2005-04-17 06:20:36 +08:00
|
|
|
idev->dead = 1;
|
2006-09-23 05:44:24 +08:00
|
|
|
|
|
|
|
/* protected by rtnl_lock */
|
2011-08-02 00:19:00 +08:00
|
|
|
RCU_INIT_POINTER(dev->ip6_ptr, NULL);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
/* Step 1.5: remove snmp6 entry */
|
|
|
|
snmp6_unregister_dev(idev);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-25 01:25:37 +08:00
|
|
|
/* aggregate the system setting and interface setting */
|
|
|
|
_keep_addr = net->ipv6.devconf_all->keep_addr_on_down;
|
|
|
|
if (!_keep_addr)
|
|
|
|
_keep_addr = idev->cnf.keep_addr_on_down;
|
|
|
|
|
|
|
|
/* combine the user config with event to determine if permanent
|
|
|
|
* addresses are to be removed from address hash table
|
|
|
|
*/
|
2016-08-12 19:02:38 +08:00
|
|
|
keep_addr = !(how || _keep_addr <= 0 || idev->cnf.disable_ipv6);
|
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-25 01:25:37 +08:00
|
|
|
|
2011-01-24 15:27:15 +08:00
|
|
|
/* Step 2: clear hash table */
|
|
|
|
for (i = 0; i < IN6_ADDR_HSIZE; i++) {
|
|
|
|
struct hlist_head *h = &inet6_addr_lst[i];
|
|
|
|
|
|
|
|
spin_lock_bh(&addrconf_hash_lock);
|
2014-08-25 04:53:10 +08:00
|
|
|
restart:
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_rcu(ifa, h, addr_lst) {
|
2011-01-24 15:27:15 +08:00
|
|
|
if (ifa->idev == idev) {
|
2014-03-28 01:28:07 +08:00
|
|
|
addrconf_del_dad_work(ifa);
|
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-25 01:25:37 +08:00
|
|
|
/* combined flag + permanent flag decide if
|
|
|
|
* address is retained on a down event
|
|
|
|
*/
|
|
|
|
if (!keep_addr ||
|
2016-04-09 03:01:21 +08:00
|
|
|
!(ifa->flags & IFA_F_PERMANENT) ||
|
|
|
|
addr_is_local(&ifa->addr)) {
|
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-25 01:25:37 +08:00
|
|
|
hlist_del_init_rcu(&ifa->addr_lst);
|
|
|
|
goto restart;
|
|
|
|
}
|
2011-01-24 15:27:15 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
spin_unlock_bh(&addrconf_hash_lock);
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
write_lock_bh(&idev->lock);
|
|
|
|
|
2013-06-24 00:39:01 +08:00
|
|
|
addrconf_del_rs_timer(idev);
|
|
|
|
|
2010-03-21 07:08:18 +08:00
|
|
|
/* Step 2: clear flags for stateless addrconf */
|
2008-04-04 04:30:17 +08:00
|
|
|
if (!how)
|
2005-12-21 21:57:24 +08:00
|
|
|
idev->if_flags &= ~(IF_RS_SENT|IF_RA_RCVD|IF_READY);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2010-03-21 07:08:18 +08:00
|
|
|
/* Step 3: clear tempaddr list */
|
2010-03-18 04:31:09 +08:00
|
|
|
while (!list_empty(&idev->tempaddr_list)) {
|
|
|
|
ifa = list_first_entry(&idev->tempaddr_list,
|
|
|
|
struct inet6_ifaddr, tmp_list);
|
|
|
|
list_del(&ifa->tmp_list);
|
2005-04-17 06:20:36 +08:00
|
|
|
write_unlock_bh(&idev->lock);
|
|
|
|
spin_lock_bh(&ifa->lock);
|
|
|
|
|
|
|
|
if (ifa->ifpub) {
|
|
|
|
in6_ifa_put(ifa->ifpub);
|
|
|
|
ifa->ifpub = NULL;
|
|
|
|
}
|
|
|
|
spin_unlock_bh(&ifa->lock);
|
|
|
|
in6_ifa_put(ifa);
|
|
|
|
write_lock_bh(&idev->lock);
|
|
|
|
}
|
2010-03-03 16:19:59 +08:00
|
|
|
|
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-25 01:25:37 +08:00
|
|
|
/* re-combine the user config with event to determine if permanent
|
|
|
|
* addresses are to be removed from the interface list
|
|
|
|
*/
|
2016-08-12 19:02:38 +08:00
|
|
|
keep_addr = (!how && _keep_addr > 0 && !idev->cnf.disable_ipv6);
|
2010-03-02 21:32:46 +08:00
|
|
|
|
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-25 01:25:37 +08:00
|
|
|
INIT_LIST_HEAD(&del_list);
|
|
|
|
list_for_each_entry_safe(ifa, tmp, &idev->addr_list, if_list) {
|
2016-04-22 11:56:12 +08:00
|
|
|
struct rt6_info *rt = NULL;
|
|
|
|
|
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-25 01:25:37 +08:00
|
|
|
addrconf_del_dad_work(ifa);
|
2010-03-02 21:32:46 +08:00
|
|
|
|
2011-01-24 15:27:15 +08:00
|
|
|
write_unlock_bh(&idev->lock);
|
2015-03-24 06:36:03 +08:00
|
|
|
spin_lock_bh(&ifa->lock);
|
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-25 01:25:37 +08:00
|
|
|
|
2016-04-09 03:01:21 +08:00
|
|
|
if (keep_addr && (ifa->flags & IFA_F_PERMANENT) &&
|
|
|
|
!addr_is_local(&ifa->addr)) {
|
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-25 01:25:37 +08:00
|
|
|
/* set state to skip the notifier below */
|
|
|
|
state = INET6_IFADDR_STATE_DEAD;
|
|
|
|
ifa->state = 0;
|
|
|
|
if (!(ifa->flags & IFA_F_NODAD))
|
|
|
|
ifa->flags |= IFA_F_TENTATIVE;
|
2016-04-22 11:56:12 +08:00
|
|
|
|
|
|
|
rt = ifa->rt;
|
|
|
|
ifa->rt = NULL;
|
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-25 01:25:37 +08:00
|
|
|
} else {
|
|
|
|
state = ifa->state;
|
|
|
|
ifa->state = INET6_IFADDR_STATE_DEAD;
|
|
|
|
|
2016-07-29 00:19:03 +08:00
|
|
|
list_move(&ifa->if_list, &del_list);
|
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-25 01:25:37 +08:00
|
|
|
}
|
|
|
|
|
2015-03-24 06:36:03 +08:00
|
|
|
spin_unlock_bh(&ifa->lock);
|
2010-11-16 04:29:21 +08:00
|
|
|
|
2016-04-22 11:56:12 +08:00
|
|
|
if (rt)
|
|
|
|
ip6_del_rt(rt);
|
|
|
|
|
2011-01-24 15:27:15 +08:00
|
|
|
if (state != INET6_IFADDR_STATE_DEAD) {
|
|
|
|
__ipv6_ifa_notify(RTM_DELADDR, ifa);
|
2013-04-14 23:18:43 +08:00
|
|
|
inet6addr_notifier_call_chain(NETDEV_DOWN, ifa);
|
2016-07-23 01:32:11 +08:00
|
|
|
} else {
|
|
|
|
if (idev->cnf.forwarding)
|
|
|
|
addrconf_leave_anycast(ifa);
|
|
|
|
addrconf_leave_solict(ifa->idev, &ifa->addr);
|
2010-04-12 13:41:32 +08:00
|
|
|
}
|
2010-03-03 16:19:59 +08:00
|
|
|
|
2011-01-24 15:27:15 +08:00
|
|
|
write_lock_bh(&idev->lock);
|
|
|
|
}
|
2010-03-03 16:19:59 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
write_unlock_bh(&idev->lock);
|
|
|
|
|
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-25 01:25:37 +08:00
|
|
|
/* now clean up addresses to be removed */
|
|
|
|
while (!list_empty(&del_list)) {
|
|
|
|
ifa = list_first_entry(&del_list,
|
|
|
|
struct inet6_ifaddr, if_list);
|
|
|
|
list_del(&ifa->if_list);
|
|
|
|
|
|
|
|
in6_ifa_put(ifa);
|
|
|
|
}
|
|
|
|
|
2014-09-11 05:23:02 +08:00
|
|
|
/* Step 5: Discard anycast and multicast list */
|
|
|
|
if (how) {
|
|
|
|
ipv6_ac_destroy_dev(idev);
|
2005-04-17 06:20:36 +08:00
|
|
|
ipv6_mc_destroy_dev(idev);
|
2014-09-11 05:23:02 +08:00
|
|
|
} else {
|
2005-04-17 06:20:36 +08:00
|
|
|
ipv6_mc_down(idev);
|
2014-09-11 05:23:02 +08:00
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
idev->tstamp = jiffies;
|
2007-02-09 22:24:49 +08:00
|
|
|
|
2010-03-21 07:08:18 +08:00
|
|
|
/* Last: Shot the device (if unregistered) */
|
2008-04-04 04:30:17 +08:00
|
|
|
if (how) {
|
2008-01-11 09:41:21 +08:00
|
|
|
addrconf_sysctl_unregister(idev);
|
2005-04-17 06:20:36 +08:00
|
|
|
neigh_parms_release(&nd_tbl, idev->nd_parms);
|
|
|
|
neigh_ifdown(&nd_tbl, dev);
|
|
|
|
in6_dev_put(idev);
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void addrconf_rs_timer(unsigned long data)
|
|
|
|
{
|
2013-06-24 00:39:01 +08:00
|
|
|
struct inet6_dev *idev = (struct inet6_dev *)data;
|
2013-08-31 13:44:32 +08:00
|
|
|
struct net_device *dev = idev->dev;
|
2013-06-24 00:39:01 +08:00
|
|
|
struct in6_addr lladdr;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2013-06-24 00:39:01 +08:00
|
|
|
write_lock(&idev->lock);
|
2010-03-02 21:32:45 +08:00
|
|
|
if (idev->dead || !(idev->if_flags & IF_READY))
|
2005-04-17 06:20:36 +08:00
|
|
|
goto out;
|
|
|
|
|
2012-12-02 09:44:53 +08:00
|
|
|
if (!ipv6_accept_ra(idev))
|
2010-03-02 21:32:45 +08:00
|
|
|
goto out;
|
|
|
|
|
|
|
|
/* Announcement received after solicitation was sent */
|
|
|
|
if (idev->if_flags & IF_RA_RCVD)
|
2005-04-17 06:20:36 +08:00
|
|
|
goto out;
|
|
|
|
|
2016-09-28 14:57:58 +08:00
|
|
|
if (idev->rs_probes++ < idev->cnf.rtr_solicits || idev->cnf.rtr_solicits < 0) {
|
2013-08-31 13:44:32 +08:00
|
|
|
write_unlock(&idev->lock);
|
|
|
|
if (!ipv6_get_lladdr(dev, &lladdr, IFA_F_TENTATIVE))
|
|
|
|
ndisc_send_rs(dev, &lladdr,
|
2013-06-24 00:39:01 +08:00
|
|
|
&in6addr_linklocal_allrouters);
|
|
|
|
else
|
2013-08-31 13:44:32 +08:00
|
|
|
goto put;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2013-08-31 13:44:32 +08:00
|
|
|
write_lock(&idev->lock);
|
2016-09-28 14:57:58 +08:00
|
|
|
idev->rs_interval = rfc3315_s14_backoff_update(
|
|
|
|
idev->rs_interval, idev->cnf.rtr_solicit_max_interval);
|
2013-06-24 00:39:01 +08:00
|
|
|
/* The wait after the last probe can be shorter */
|
|
|
|
addrconf_mod_rs_timer(idev, (idev->rs_probes ==
|
|
|
|
idev->cnf.rtr_solicits) ?
|
|
|
|
idev->cnf.rtr_solicit_delay :
|
2016-09-28 14:57:58 +08:00
|
|
|
idev->rs_interval);
|
2005-04-17 06:20:36 +08:00
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* Note: we do not support deprecated "all on-link"
|
|
|
|
* assumption any longer.
|
|
|
|
*/
|
2012-05-15 22:11:54 +08:00
|
|
|
pr_debug("%s: no IPv6 routers present\n", idev->dev->name);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
2013-06-24 00:39:01 +08:00
|
|
|
write_unlock(&idev->lock);
|
2013-08-31 13:44:32 +08:00
|
|
|
put:
|
2013-06-24 00:39:01 +08:00
|
|
|
in6_dev_put(idev);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Duplicate Address Detection
|
|
|
|
*/
|
2005-12-21 21:57:24 +08:00
|
|
|
static void addrconf_dad_kick(struct inet6_ifaddr *ifp)
|
|
|
|
{
|
|
|
|
unsigned long rand_num;
|
|
|
|
struct inet6_dev *idev = ifp->idev;
|
2016-12-03 06:00:08 +08:00
|
|
|
u64 nonce;
|
2005-12-21 21:57:24 +08:00
|
|
|
|
2007-04-26 08:08:10 +08:00
|
|
|
if (ifp->flags & IFA_F_OPTIMISTIC)
|
|
|
|
rand_num = 0;
|
|
|
|
else
|
2014-01-11 20:15:59 +08:00
|
|
|
rand_num = prandom_u32() % (idev->cnf.rtr_solicit_delay ? : 1);
|
2007-04-26 08:08:10 +08:00
|
|
|
|
2016-12-03 06:00:08 +08:00
|
|
|
nonce = 0;
|
|
|
|
if (idev->cnf.enhanced_dad ||
|
|
|
|
dev_net(idev->dev)->ipv6.devconf_all->enhanced_dad) {
|
|
|
|
do
|
|
|
|
get_random_bytes(&nonce, 6);
|
|
|
|
while (nonce == 0);
|
|
|
|
}
|
|
|
|
ifp->dad_nonce = nonce;
|
2013-06-24 00:39:01 +08:00
|
|
|
ifp->dad_probes = idev->cnf.dad_transmits;
|
2014-03-28 01:28:07 +08:00
|
|
|
addrconf_mod_dad_work(ifp, rand_num);
|
2005-12-21 21:57:24 +08:00
|
|
|
}
|
|
|
|
|
2014-03-28 01:28:07 +08:00
|
|
|
static void addrconf_dad_begin(struct inet6_ifaddr *ifp)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct inet6_dev *idev = ifp->idev;
|
|
|
|
struct net_device *dev = idev->dev;
|
2016-11-22 23:57:40 +08:00
|
|
|
bool bump_id, notify = false;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
addrconf_join_solict(dev, &ifp->addr);
|
|
|
|
|
2014-01-11 20:15:59 +08:00
|
|
|
prandom_seed((__force u32) ifp->addr.s6_addr32[3]);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
read_lock_bh(&idev->lock);
|
2010-05-19 06:56:06 +08:00
|
|
|
spin_lock(&ifp->lock);
|
2010-05-19 06:36:06 +08:00
|
|
|
if (ifp->state == INET6_IFADDR_STATE_DEAD)
|
2005-04-17 06:20:36 +08:00
|
|
|
goto out;
|
|
|
|
|
|
|
|
if (dev->flags&(IFF_NOARP|IFF_LOOPBACK) ||
|
2008-06-28 13:18:38 +08:00
|
|
|
idev->cnf.accept_dad < 1 ||
|
2006-09-23 05:45:27 +08:00
|
|
|
!(ifp->flags&IFA_F_TENTATIVE) ||
|
|
|
|
ifp->flags & IFA_F_NODAD) {
|
2016-11-22 23:57:40 +08:00
|
|
|
bump_id = ifp->flags & IFA_F_TENTATIVE;
|
2009-09-09 22:41:32 +08:00
|
|
|
ifp->flags &= ~(IFA_F_TENTATIVE|IFA_F_OPTIMISTIC|IFA_F_DADFAILED);
|
2010-02-09 03:48:52 +08:00
|
|
|
spin_unlock(&ifp->lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
read_unlock_bh(&idev->lock);
|
|
|
|
|
2016-11-22 23:57:40 +08:00
|
|
|
addrconf_dad_completed(ifp, bump_id);
|
2005-04-17 06:20:36 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2005-12-28 05:35:15 +08:00
|
|
|
if (!(idev->if_flags & IF_READY)) {
|
2010-02-09 03:48:52 +08:00
|
|
|
spin_unlock(&ifp->lock);
|
2005-12-28 05:35:15 +08:00
|
|
|
read_unlock_bh(&idev->lock);
|
2005-12-21 21:57:24 +08:00
|
|
|
/*
|
2009-06-09 09:41:12 +08:00
|
|
|
* If the device is not ready:
|
2005-12-21 21:57:24 +08:00
|
|
|
* - keep it tentative if it is a permanent address.
|
|
|
|
* - otherwise, kill it.
|
|
|
|
*/
|
|
|
|
in6_ifa_hold(ifp);
|
2009-09-09 22:41:32 +08:00
|
|
|
addrconf_dad_stop(ifp, 0);
|
2005-12-28 05:35:15 +08:00
|
|
|
return;
|
2005-12-21 21:57:24 +08:00
|
|
|
}
|
2007-04-26 08:08:10 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Optimistic nodes can start receiving
|
|
|
|
* Frames right away
|
|
|
|
*/
|
net: ipv6: Add a sysctl to make optimistic addresses useful candidates
Add a sysctl that causes an interface's optimistic addresses
to be considered equivalent to other non-deprecated addresses
for source address selection purposes. Preferred addresses
will still take precedence over optimistic addresses, subject
to other ranking in the source address selection algorithm.
This is useful where different interfaces are connected to
different networks from different ISPs (e.g., a cell network
and a home wifi network).
The current behaviour complies with RFC 3484/6724, and it
makes sense if the host has only one interface, or has
multiple interfaces on the same network (same or cooperating
administrative domain(s), but not in the multiple distinct
networks case.
For example, if a mobile device has an IPv6 address on an LTE
network and then connects to IPv6-enabled wifi, while the wifi
IPv6 address is undergoing DAD, IPv6 connections will try use
the wifi default route with the LTE IPv6 address, and will get
stuck until they time out.
Also, because optimistic nodes can receive frames, issue
an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
flag appropriately set). A second RTM_NEWADDR is sent if DAD
completes (the address flags have changed), otherwise an
RTM_DELADDR is sent.
Also: add an entry in ip-sysctl.txt for optimistic_dad.
Signed-off-by: Erik Kline <ek@google.com>
Acked-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-28 17:11:14 +08:00
|
|
|
if (ifp->flags & IFA_F_OPTIMISTIC) {
|
2007-04-26 08:08:10 +08:00
|
|
|
ip6_ins_rt(ifp->rt);
|
net: ipv6: Add a sysctl to make optimistic addresses useful candidates
Add a sysctl that causes an interface's optimistic addresses
to be considered equivalent to other non-deprecated addresses
for source address selection purposes. Preferred addresses
will still take precedence over optimistic addresses, subject
to other ranking in the source address selection algorithm.
This is useful where different interfaces are connected to
different networks from different ISPs (e.g., a cell network
and a home wifi network).
The current behaviour complies with RFC 3484/6724, and it
makes sense if the host has only one interface, or has
multiple interfaces on the same network (same or cooperating
administrative domain(s), but not in the multiple distinct
networks case.
For example, if a mobile device has an IPv6 address on an LTE
network and then connects to IPv6-enabled wifi, while the wifi
IPv6 address is undergoing DAD, IPv6 connections will try use
the wifi default route with the LTE IPv6 address, and will get
stuck until they time out.
Also, because optimistic nodes can receive frames, issue
an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
flag appropriately set). A second RTM_NEWADDR is sent if DAD
completes (the address flags have changed), otherwise an
RTM_DELADDR is sent.
Also: add an entry in ip-sysctl.txt for optimistic_dad.
Signed-off-by: Erik Kline <ek@google.com>
Acked-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-28 17:11:14 +08:00
|
|
|
if (ipv6_use_optimistic_addr(idev)) {
|
|
|
|
/* Because optimistic nodes can use this address,
|
|
|
|
* notify listeners. If DAD fails, RTM_DELADDR is sent.
|
|
|
|
*/
|
2016-02-02 10:11:10 +08:00
|
|
|
notify = true;
|
net: ipv6: Add a sysctl to make optimistic addresses useful candidates
Add a sysctl that causes an interface's optimistic addresses
to be considered equivalent to other non-deprecated addresses
for source address selection purposes. Preferred addresses
will still take precedence over optimistic addresses, subject
to other ranking in the source address selection algorithm.
This is useful where different interfaces are connected to
different networks from different ISPs (e.g., a cell network
and a home wifi network).
The current behaviour complies with RFC 3484/6724, and it
makes sense if the host has only one interface, or has
multiple interfaces on the same network (same or cooperating
administrative domain(s), but not in the multiple distinct
networks case.
For example, if a mobile device has an IPv6 address on an LTE
network and then connects to IPv6-enabled wifi, while the wifi
IPv6 address is undergoing DAD, IPv6 connections will try use
the wifi default route with the LTE IPv6 address, and will get
stuck until they time out.
Also, because optimistic nodes can receive frames, issue
an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
flag appropriately set). A second RTM_NEWADDR is sent if DAD
completes (the address flags have changed), otherwise an
RTM_DELADDR is sent.
Also: add an entry in ip-sysctl.txt for optimistic_dad.
Signed-off-by: Erik Kline <ek@google.com>
Acked-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-28 17:11:14 +08:00
|
|
|
}
|
|
|
|
}
|
2007-04-26 08:08:10 +08:00
|
|
|
|
2005-12-28 05:35:15 +08:00
|
|
|
addrconf_dad_kick(ifp);
|
2005-04-17 06:20:36 +08:00
|
|
|
out:
|
2010-05-19 06:56:06 +08:00
|
|
|
spin_unlock(&ifp->lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
read_unlock_bh(&idev->lock);
|
2016-02-02 10:11:10 +08:00
|
|
|
if (notify)
|
|
|
|
ipv6_ifa_notify(RTM_NEWADDR, ifp);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2014-03-28 01:28:07 +08:00
|
|
|
static void addrconf_dad_start(struct inet6_ifaddr *ifp)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2014-03-28 01:28:07 +08:00
|
|
|
bool begin_dad = false;
|
|
|
|
|
2015-03-24 06:36:03 +08:00
|
|
|
spin_lock_bh(&ifp->lock);
|
2014-03-28 01:28:07 +08:00
|
|
|
if (ifp->state != INET6_IFADDR_STATE_DEAD) {
|
|
|
|
ifp->state = INET6_IFADDR_STATE_PREDAD;
|
|
|
|
begin_dad = true;
|
|
|
|
}
|
2015-03-24 06:36:03 +08:00
|
|
|
spin_unlock_bh(&ifp->lock);
|
2014-03-28 01:28:07 +08:00
|
|
|
|
|
|
|
if (begin_dad)
|
|
|
|
addrconf_mod_dad_work(ifp, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void addrconf_dad_work(struct work_struct *w)
|
|
|
|
{
|
|
|
|
struct inet6_ifaddr *ifp = container_of(to_delayed_work(w),
|
|
|
|
struct inet6_ifaddr,
|
|
|
|
dad_work);
|
2005-04-17 06:20:36 +08:00
|
|
|
struct inet6_dev *idev = ifp->idev;
|
2016-11-22 23:57:40 +08:00
|
|
|
bool bump_id, disable_ipv6 = false;
|
2005-04-17 06:20:36 +08:00
|
|
|
struct in6_addr mcaddr;
|
|
|
|
|
2014-03-28 01:28:07 +08:00
|
|
|
enum {
|
|
|
|
DAD_PROCESS,
|
|
|
|
DAD_BEGIN,
|
|
|
|
DAD_ABORT,
|
|
|
|
} action = DAD_PROCESS;
|
|
|
|
|
|
|
|
rtnl_lock();
|
|
|
|
|
2015-03-24 06:36:03 +08:00
|
|
|
spin_lock_bh(&ifp->lock);
|
2014-03-28 01:28:07 +08:00
|
|
|
if (ifp->state == INET6_IFADDR_STATE_PREDAD) {
|
|
|
|
action = DAD_BEGIN;
|
|
|
|
ifp->state = INET6_IFADDR_STATE_DAD;
|
|
|
|
} else if (ifp->state == INET6_IFADDR_STATE_ERRDAD) {
|
|
|
|
action = DAD_ABORT;
|
|
|
|
ifp->state = INET6_IFADDR_STATE_POSTDAD;
|
net: ipv6: Remove addresses for failures with strict DAD
If DAD fails with accept_dad set to 2, global addresses and host routes
are incorrectly left in place. Even though disable_ipv6 is set,
contrary to documentation, the addresses are not dynamically deleted
from the interface. It is only on a subsequent link down/up that these
are removed. The fix is not only to set the disable_ipv6 flag, but
also to call addrconf_ifdown(), which is the action to carry out when
disabling IPv6. This results in the addresses and routes being deleted
immediately. The DAD failure for the LL addr is determined as before
via netlink, or by the absence of the LL addr (which also previously
would have had to be checked for in case of an intervening link down
and up). As the call to addrconf_ifdown() requires an rtnl lock, the
logic to disable IPv6 when DAD fails is moved to addrconf_dad_work().
Previous behavior:
root@vm1:/# sysctl net.ipv6.conf.eth3.accept_dad=2
net.ipv6.conf.eth3.accept_dad = 2
root@vm1:/# ip -6 addr add 2000::10/64 dev eth3
root@vm1:/# ip link set up eth3
root@vm1:/# ip -6 addr show dev eth3
5: eth3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qlen 1000
inet6 2000::10/64 scope global
valid_lft forever preferred_lft forever
inet6 fe80::5054:ff:fe43:dd5a/64 scope link tentative dadfailed
valid_lft forever preferred_lft forever
root@vm1:/# ip -6 route show dev eth3
2000::/64 proto kernel metric 256
fe80::/64 proto kernel metric 256
root@vm1:/# ip link set down eth3
root@vm1:/# ip link set up eth3
root@vm1:/# ip -6 addr show dev eth3
root@vm1:/# ip -6 route show dev eth3
root@vm1:/#
New behavior:
root@vm1:/# sysctl net.ipv6.conf.eth3.accept_dad=2
net.ipv6.conf.eth3.accept_dad = 2
root@vm1:/# ip -6 addr add 2000::10/64 dev eth3
root@vm1:/# ip link set up eth3
root@vm1:/# ip -6 addr show dev eth3
root@vm1:/# ip -6 route show dev eth3
root@vm1:/#
Signed-off-by: Mike Manning <mmanning@brocade.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-08-18 21:39:40 +08:00
|
|
|
|
|
|
|
if (idev->cnf.accept_dad > 1 && !idev->cnf.disable_ipv6 &&
|
|
|
|
!(ifp->flags & IFA_F_STABLE_PRIVACY)) {
|
|
|
|
struct in6_addr addr;
|
|
|
|
|
|
|
|
addr.s6_addr32[0] = htonl(0xfe800000);
|
|
|
|
addr.s6_addr32[1] = 0;
|
|
|
|
|
|
|
|
if (!ipv6_generate_eui64(addr.s6_addr + 8, idev->dev) &&
|
|
|
|
ipv6_addr_equal(&ifp->addr, &addr)) {
|
|
|
|
/* DAD failed for link-local based on MAC */
|
|
|
|
idev->cnf.disable_ipv6 = 1;
|
|
|
|
|
|
|
|
pr_info("%s: IPv6 being disabled!\n",
|
|
|
|
ifp->idev->dev->name);
|
|
|
|
disable_ipv6 = true;
|
|
|
|
}
|
|
|
|
}
|
2014-03-28 01:28:07 +08:00
|
|
|
}
|
2015-03-24 06:36:03 +08:00
|
|
|
spin_unlock_bh(&ifp->lock);
|
2014-03-28 01:28:07 +08:00
|
|
|
|
|
|
|
if (action == DAD_BEGIN) {
|
|
|
|
addrconf_dad_begin(ifp);
|
|
|
|
goto out;
|
|
|
|
} else if (action == DAD_ABORT) {
|
2016-09-05 16:06:31 +08:00
|
|
|
in6_ifa_hold(ifp);
|
2014-03-28 01:28:07 +08:00
|
|
|
addrconf_dad_stop(ifp, 1);
|
net: ipv6: Remove addresses for failures with strict DAD
If DAD fails with accept_dad set to 2, global addresses and host routes
are incorrectly left in place. Even though disable_ipv6 is set,
contrary to documentation, the addresses are not dynamically deleted
from the interface. It is only on a subsequent link down/up that these
are removed. The fix is not only to set the disable_ipv6 flag, but
also to call addrconf_ifdown(), which is the action to carry out when
disabling IPv6. This results in the addresses and routes being deleted
immediately. The DAD failure for the LL addr is determined as before
via netlink, or by the absence of the LL addr (which also previously
would have had to be checked for in case of an intervening link down
and up). As the call to addrconf_ifdown() requires an rtnl lock, the
logic to disable IPv6 when DAD fails is moved to addrconf_dad_work().
Previous behavior:
root@vm1:/# sysctl net.ipv6.conf.eth3.accept_dad=2
net.ipv6.conf.eth3.accept_dad = 2
root@vm1:/# ip -6 addr add 2000::10/64 dev eth3
root@vm1:/# ip link set up eth3
root@vm1:/# ip -6 addr show dev eth3
5: eth3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qlen 1000
inet6 2000::10/64 scope global
valid_lft forever preferred_lft forever
inet6 fe80::5054:ff:fe43:dd5a/64 scope link tentative dadfailed
valid_lft forever preferred_lft forever
root@vm1:/# ip -6 route show dev eth3
2000::/64 proto kernel metric 256
fe80::/64 proto kernel metric 256
root@vm1:/# ip link set down eth3
root@vm1:/# ip link set up eth3
root@vm1:/# ip -6 addr show dev eth3
root@vm1:/# ip -6 route show dev eth3
root@vm1:/#
New behavior:
root@vm1:/# sysctl net.ipv6.conf.eth3.accept_dad=2
net.ipv6.conf.eth3.accept_dad = 2
root@vm1:/# ip -6 addr add 2000::10/64 dev eth3
root@vm1:/# ip link set up eth3
root@vm1:/# ip -6 addr show dev eth3
root@vm1:/# ip -6 route show dev eth3
root@vm1:/#
Signed-off-by: Mike Manning <mmanning@brocade.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-08-18 21:39:40 +08:00
|
|
|
if (disable_ipv6)
|
|
|
|
addrconf_ifdown(idev->dev, 0);
|
2014-03-28 01:28:07 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2013-06-24 00:39:01 +08:00
|
|
|
if (!ifp->dad_probes && addrconf_dad_end(ifp))
|
2010-05-19 06:55:27 +08:00
|
|
|
goto out;
|
|
|
|
|
2014-03-28 01:28:07 +08:00
|
|
|
write_lock_bh(&idev->lock);
|
2010-03-02 21:32:44 +08:00
|
|
|
if (idev->dead || !(idev->if_flags & IF_READY)) {
|
2014-03-28 01:28:07 +08:00
|
|
|
write_unlock_bh(&idev->lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2010-02-09 03:48:52 +08:00
|
|
|
|
|
|
|
spin_lock(&ifp->lock);
|
2010-05-19 06:56:06 +08:00
|
|
|
if (ifp->state == INET6_IFADDR_STATE_DEAD) {
|
|
|
|
spin_unlock(&ifp->lock);
|
2014-03-28 01:28:07 +08:00
|
|
|
write_unlock_bh(&idev->lock);
|
2010-05-19 06:56:06 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2013-06-24 00:39:01 +08:00
|
|
|
if (ifp->dad_probes == 0) {
|
2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* DAD was successful
|
|
|
|
*/
|
|
|
|
|
2016-11-22 23:57:40 +08:00
|
|
|
bump_id = ifp->flags & IFA_F_TENTATIVE;
|
2009-09-09 22:41:32 +08:00
|
|
|
ifp->flags &= ~(IFA_F_TENTATIVE|IFA_F_OPTIMISTIC|IFA_F_DADFAILED);
|
2010-02-09 03:48:52 +08:00
|
|
|
spin_unlock(&ifp->lock);
|
2014-03-28 01:28:07 +08:00
|
|
|
write_unlock_bh(&idev->lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2016-11-22 23:57:40 +08:00
|
|
|
addrconf_dad_completed(ifp, bump_id);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2013-06-24 00:39:01 +08:00
|
|
|
ifp->dad_probes--;
|
2014-03-28 01:28:07 +08:00
|
|
|
addrconf_mod_dad_work(ifp,
|
|
|
|
NEIGH_VAR(ifp->idev->nd_parms, RETRANS_TIME));
|
2010-02-09 03:48:52 +08:00
|
|
|
spin_unlock(&ifp->lock);
|
2014-03-28 01:28:07 +08:00
|
|
|
write_unlock_bh(&idev->lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
/* send a neighbour solicitation for our addr */
|
|
|
|
addrconf_addr_solict_mult(&ifp->addr, &mcaddr);
|
2016-12-03 06:00:08 +08:00
|
|
|
ndisc_send_ns(ifp->idev->dev, &ifp->addr, &mcaddr, &in6addr_any,
|
|
|
|
ifp->dad_nonce);
|
2005-04-17 06:20:36 +08:00
|
|
|
out:
|
|
|
|
in6_ifa_put(ifp);
|
2014-03-28 01:28:07 +08:00
|
|
|
rtnl_unlock();
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2014-01-17 03:13:04 +08:00
|
|
|
/* ifp->idev must be at least read locked */
|
|
|
|
static bool ipv6_lonely_lladdr(struct inet6_ifaddr *ifp)
|
|
|
|
{
|
|
|
|
struct inet6_ifaddr *ifpiter;
|
|
|
|
struct inet6_dev *idev = ifp->idev;
|
|
|
|
|
2014-01-20 04:58:19 +08:00
|
|
|
list_for_each_entry_reverse(ifpiter, &idev->addr_list, if_list) {
|
|
|
|
if (ifpiter->scope > IFA_LINK)
|
|
|
|
break;
|
2014-01-17 03:13:04 +08:00
|
|
|
if (ifp != ifpiter && ifpiter->scope == IFA_LINK &&
|
|
|
|
(ifpiter->flags & (IFA_F_PERMANENT|IFA_F_TENTATIVE|
|
|
|
|
IFA_F_OPTIMISTIC|IFA_F_DADFAILED)) ==
|
|
|
|
IFA_F_PERMANENT)
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2016-11-22 23:57:40 +08:00
|
|
|
static void addrconf_dad_completed(struct inet6_ifaddr *ifp, bool bump_id)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2010-03-21 07:09:01 +08:00
|
|
|
struct net_device *dev = ifp->idev->dev;
|
2013-06-24 00:39:01 +08:00
|
|
|
struct in6_addr lladdr;
|
2013-06-27 06:07:01 +08:00
|
|
|
bool send_rs, send_mld;
|
2013-06-24 00:39:01 +08:00
|
|
|
|
2014-03-28 01:28:07 +08:00
|
|
|
addrconf_del_dad_work(ifp);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Configure the address for reception. Now it is valid.
|
|
|
|
*/
|
|
|
|
|
|
|
|
ipv6_ifa_notify(RTM_NEWADDR, ifp);
|
|
|
|
|
ipv6: Send ICMPv6 RSes only when RAs are accepted
This patch improves the logic determining when to send ICMPv6 Router
Solicitations, so that they are 1) always sent when the kernel is
accepting Router Advertisements, and 2) never sent when the kernel is
not accepting RAs. In other words, the operational setting of the
"accept_ra" sysctl is used.
The change also makes the special "Hybrid Router" forwarding mode
("forwarding" sysctl set to 2) operate exactly the same as the standard
Router mode (forwarding=1). The only difference between the two was
that RSes was being sent in the Hybrid Router mode only. The sysctl
documentation describing the special Hybrid Router mode has therefore
been removed.
Rationale for the change:
Currently, the value of forwarding sysctl is the only thing determining
whether or not to send RSes. If it has the value 0 or 2, they are sent,
otherwise they are not. This leads to inconsistent behaviour in the
following cases:
* accept_ra=0, forwarding=0
* accept_ra=0, forwarding=2
* accept_ra=1, forwarding=2
* accept_ra=2, forwarding=1
In the first three cases, the kernel will send RSes, even though it will
not accept any RAs received in reply. In the last case, it will not send
any RSes, even though it will accept and process any RAs received. (Most
routers will send unsolicited RAs periodically, so suppressing RSes in
the last case will merely delay auto-configuration, not prevent it.)
Also, it is my opinion that having the forwarding sysctl control RS
sending behaviour (completely independent of whether RAs are being
accepted or not) is simply not what most users would intuitively expect
to be the case.
Signed-off-by: Tore Anderson <tore@fud.no>
Signed-off-by: David S. Miller <davem@davemloft.net>
2011-08-29 07:47:33 +08:00
|
|
|
/* If added prefix is link local and we are prepared to process
|
|
|
|
router advertisements, start sending router solicitations.
|
2005-04-17 06:20:36 +08:00
|
|
|
*/
|
|
|
|
|
2013-06-27 06:06:56 +08:00
|
|
|
read_lock_bh(&ifp->idev->lock);
|
2014-01-17 03:13:04 +08:00
|
|
|
send_mld = ifp->scope == IFA_LINK && ipv6_lonely_lladdr(ifp);
|
2013-06-27 06:07:01 +08:00
|
|
|
send_rs = send_mld &&
|
|
|
|
ipv6_accept_ra(ifp->idev) &&
|
2016-09-28 14:57:58 +08:00
|
|
|
ifp->idev->cnf.rtr_solicits != 0 &&
|
2013-06-27 06:07:01 +08:00
|
|
|
(dev->flags&IFF_LOOPBACK) == 0;
|
2013-06-27 06:06:56 +08:00
|
|
|
read_unlock_bh(&ifp->idev->lock);
|
|
|
|
|
2013-06-27 06:07:01 +08:00
|
|
|
/* While dad is in progress mld report's source address is in6_addrany.
|
|
|
|
* Resend with proper ll now.
|
|
|
|
*/
|
|
|
|
if (send_mld)
|
|
|
|
ipv6_mc_dad_complete(ifp->idev);
|
|
|
|
|
2013-06-27 06:06:56 +08:00
|
|
|
if (send_rs) {
|
2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* If a host as already performed a random delay
|
|
|
|
* [...] as part of DAD [...] there is no need
|
|
|
|
* to delay again before sending the first RS
|
|
|
|
*/
|
2013-06-27 06:06:56 +08:00
|
|
|
if (ipv6_get_lladdr(dev, &lladdr, IFA_F_TENTATIVE))
|
2013-06-24 00:39:01 +08:00
|
|
|
return;
|
2013-06-27 06:06:56 +08:00
|
|
|
ndisc_send_rs(dev, &lladdr, &in6addr_linklocal_allrouters);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2013-06-24 00:39:01 +08:00
|
|
|
write_lock_bh(&ifp->idev->lock);
|
|
|
|
spin_lock(&ifp->lock);
|
2016-09-28 14:57:58 +08:00
|
|
|
ifp->idev->rs_interval = rfc3315_s14_backoff_init(
|
|
|
|
ifp->idev->cnf.rtr_solicit_interval);
|
2013-06-24 00:39:01 +08:00
|
|
|
ifp->idev->rs_probes = 1;
|
2005-04-17 06:20:36 +08:00
|
|
|
ifp->idev->if_flags |= IF_RS_SENT;
|
2016-09-28 14:57:58 +08:00
|
|
|
addrconf_mod_rs_timer(ifp->idev, ifp->idev->rs_interval);
|
2013-06-24 00:39:01 +08:00
|
|
|
spin_unlock(&ifp->lock);
|
|
|
|
write_unlock_bh(&ifp->idev->lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2016-11-22 23:57:40 +08:00
|
|
|
|
|
|
|
if (bump_id)
|
|
|
|
rt_genid_bump_ipv6(dev_net(dev));
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2010-03-21 07:09:01 +08:00
|
|
|
static void addrconf_dad_run(struct inet6_dev *idev)
|
|
|
|
{
|
2005-12-21 21:57:44 +08:00
|
|
|
struct inet6_ifaddr *ifp;
|
|
|
|
|
|
|
|
read_lock_bh(&idev->lock);
|
2010-03-18 04:31:13 +08:00
|
|
|
list_for_each_entry(ifp, &idev->addr_list, if_list) {
|
2010-02-09 03:48:52 +08:00
|
|
|
spin_lock(&ifp->lock);
|
2010-05-19 06:55:27 +08:00
|
|
|
if (ifp->flags & IFA_F_TENTATIVE &&
|
|
|
|
ifp->state == INET6_IFADDR_STATE_DAD)
|
|
|
|
addrconf_dad_kick(ifp);
|
2010-02-09 03:48:52 +08:00
|
|
|
spin_unlock(&ifp->lock);
|
2005-12-21 21:57:44 +08:00
|
|
|
}
|
|
|
|
read_unlock_bh(&idev->lock);
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
#ifdef CONFIG_PROC_FS
|
|
|
|
struct if6_iter_state {
|
2008-01-11 14:42:49 +08:00
|
|
|
struct seq_net_private p;
|
2005-04-17 06:20:36 +08:00
|
|
|
int bucket;
|
2012-01-04 07:31:35 +08:00
|
|
|
int offset;
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
|
|
|
|
2012-01-04 07:31:35 +08:00
|
|
|
static struct inet6_ifaddr *if6_get_first(struct seq_file *seq, loff_t pos)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct inet6_ifaddr *ifa = NULL;
|
|
|
|
struct if6_iter_state *state = seq->private;
|
2008-03-26 01:36:06 +08:00
|
|
|
struct net *net = seq_file_net(seq);
|
2012-01-04 07:31:35 +08:00
|
|
|
int p = 0;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2012-01-04 07:31:35 +08:00
|
|
|
/* initial bucket if pos is 0 */
|
|
|
|
if (pos == 0) {
|
|
|
|
state->bucket = 0;
|
|
|
|
state->offset = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (; state->bucket < IN6_ADDR_HSIZE; ++state->bucket) {
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_rcu_bh(ifa, &inet6_addr_lst[state->bucket],
|
2012-01-04 07:31:35 +08:00
|
|
|
addr_lst) {
|
2012-10-16 15:37:27 +08:00
|
|
|
if (!net_eq(dev_net(ifa->idev->dev), net))
|
|
|
|
continue;
|
2012-01-04 07:31:35 +08:00
|
|
|
/* sync with offset */
|
|
|
|
if (p < state->offset) {
|
|
|
|
p++;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
state->offset++;
|
2012-10-16 15:37:27 +08:00
|
|
|
return ifa;
|
2012-01-04 07:31:35 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* prepare for next bucket */
|
|
|
|
state->offset = 0;
|
|
|
|
p = 0;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2010-03-18 04:31:10 +08:00
|
|
|
return NULL;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2010-03-18 04:31:10 +08:00
|
|
|
static struct inet6_ifaddr *if6_get_next(struct seq_file *seq,
|
|
|
|
struct inet6_ifaddr *ifa)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct if6_iter_state *state = seq->private;
|
2008-03-26 01:36:06 +08:00
|
|
|
struct net *net = seq_file_net(seq);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_continue_rcu_bh(ifa, addr_lst) {
|
2012-10-16 15:37:27 +08:00
|
|
|
if (!net_eq(dev_net(ifa->idev->dev), net))
|
|
|
|
continue;
|
2012-01-04 07:31:35 +08:00
|
|
|
state->offset++;
|
2012-10-16 15:37:27 +08:00
|
|
|
return ifa;
|
2012-01-04 07:31:35 +08:00
|
|
|
}
|
2008-01-11 14:42:49 +08:00
|
|
|
|
2010-03-18 04:31:10 +08:00
|
|
|
while (++state->bucket < IN6_ADDR_HSIZE) {
|
2012-01-04 07:31:35 +08:00
|
|
|
state->offset = 0;
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_rcu_bh(ifa,
|
2010-03-18 04:31:10 +08:00
|
|
|
&inet6_addr_lst[state->bucket], addr_lst) {
|
2012-10-16 15:37:27 +08:00
|
|
|
if (!net_eq(dev_net(ifa->idev->dev), net))
|
|
|
|
continue;
|
2012-01-04 07:31:35 +08:00
|
|
|
state->offset++;
|
2012-10-16 15:37:27 +08:00
|
|
|
return ifa;
|
2010-03-18 04:31:10 +08:00
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2008-01-11 14:42:49 +08:00
|
|
|
|
2010-03-18 04:31:10 +08:00
|
|
|
return NULL;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void *if6_seq_start(struct seq_file *seq, loff_t *pos)
|
2010-05-03 18:50:14 +08:00
|
|
|
__acquires(rcu_bh)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2010-03-18 04:31:11 +08:00
|
|
|
rcu_read_lock_bh();
|
2012-01-04 07:31:35 +08:00
|
|
|
return if6_get_first(seq, *pos);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void *if6_seq_next(struct seq_file *seq, void *v, loff_t *pos)
|
|
|
|
{
|
|
|
|
struct inet6_ifaddr *ifa;
|
|
|
|
|
|
|
|
ifa = if6_get_next(seq, v);
|
|
|
|
++*pos;
|
|
|
|
return ifa;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void if6_seq_stop(struct seq_file *seq, void *v)
|
2010-05-03 18:50:14 +08:00
|
|
|
__releases(rcu_bh)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2010-03-18 04:31:11 +08:00
|
|
|
rcu_read_unlock_bh();
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int if6_seq_show(struct seq_file *seq, void *v)
|
|
|
|
{
|
|
|
|
struct inet6_ifaddr *ifp = (struct inet6_ifaddr *)v;
|
2013-12-10 20:56:29 +08:00
|
|
|
seq_printf(seq, "%pi6 %02x %02x %02x %02x %8s\n",
|
2008-10-29 07:05:40 +08:00
|
|
|
&ifp->addr,
|
2005-04-17 06:20:36 +08:00
|
|
|
ifp->idev->dev->ifindex,
|
|
|
|
ifp->prefix_len,
|
|
|
|
ifp->scope,
|
2013-12-10 20:56:29 +08:00
|
|
|
(u8) ifp->flags,
|
2005-04-17 06:20:36 +08:00
|
|
|
ifp->idev->dev->name);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2007-07-11 14:07:31 +08:00
|
|
|
static const struct seq_operations if6_seq_ops = {
|
2005-04-17 06:20:36 +08:00
|
|
|
.start = if6_seq_start,
|
|
|
|
.next = if6_seq_next,
|
|
|
|
.show = if6_seq_show,
|
|
|
|
.stop = if6_seq_stop,
|
|
|
|
};
|
|
|
|
|
|
|
|
static int if6_seq_open(struct inode *inode, struct file *file)
|
|
|
|
{
|
2008-01-11 14:42:49 +08:00
|
|
|
return seq_open_net(inode, file, &if6_seq_ops,
|
|
|
|
sizeof(struct if6_iter_state));
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2007-02-12 16:55:35 +08:00
|
|
|
static const struct file_operations if6_fops = {
|
2005-04-17 06:20:36 +08:00
|
|
|
.owner = THIS_MODULE,
|
|
|
|
.open = if6_seq_open,
|
|
|
|
.read = seq_read,
|
|
|
|
.llseek = seq_lseek,
|
2008-01-11 14:42:49 +08:00
|
|
|
.release = seq_release_net,
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
|
|
|
|
2010-01-17 11:35:32 +08:00
|
|
|
static int __net_init if6_proc_net_init(struct net *net)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2013-02-18 09:34:54 +08:00
|
|
|
if (!proc_create("if_inet6", S_IRUGO, net->proc_net, &if6_fops))
|
2005-04-17 06:20:36 +08:00
|
|
|
return -ENOMEM;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-01-17 11:35:32 +08:00
|
|
|
static void __net_exit if6_proc_net_exit(struct net *net)
|
2008-01-11 14:42:49 +08:00
|
|
|
{
|
2013-02-18 09:34:56 +08:00
|
|
|
remove_proc_entry("if_inet6", net->proc_net);
|
2008-01-11 14:42:49 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct pernet_operations if6_proc_net_ops = {
|
2014-08-25 04:53:10 +08:00
|
|
|
.init = if6_proc_net_init,
|
|
|
|
.exit = if6_proc_net_exit,
|
2008-01-11 14:42:49 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
int __init if6_proc_init(void)
|
|
|
|
{
|
|
|
|
return register_pernet_subsys(&if6_proc_net_ops);
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
void if6_proc_exit(void)
|
|
|
|
{
|
2008-01-11 14:42:49 +08:00
|
|
|
unregister_pernet_subsys(&if6_proc_net_ops);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
#endif /* CONFIG_PROC_FS */
|
|
|
|
|
2012-10-30 00:23:10 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6_MIP6)
|
2006-09-23 05:45:56 +08:00
|
|
|
/* Check if address is a home address configured on any interface. */
|
2011-04-22 12:53:02 +08:00
|
|
|
int ipv6_chk_home_addr(struct net *net, const struct in6_addr *addr)
|
2006-09-23 05:45:56 +08:00
|
|
|
{
|
|
|
|
int ret = 0;
|
2010-03-18 04:31:10 +08:00
|
|
|
struct inet6_ifaddr *ifp = NULL;
|
2012-07-18 16:11:12 +08:00
|
|
|
unsigned int hash = inet6_addr_hash(addr);
|
2010-03-18 04:31:10 +08:00
|
|
|
|
2010-03-18 04:31:11 +08:00
|
|
|
rcu_read_lock_bh();
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_rcu_bh(ifp, &inet6_addr_lst[hash], addr_lst) {
|
2008-03-26 02:57:35 +08:00
|
|
|
if (!net_eq(dev_net(ifp->idev->dev), net))
|
2008-01-11 14:44:40 +08:00
|
|
|
continue;
|
2008-04-10 14:42:07 +08:00
|
|
|
if (ipv6_addr_equal(&ifp->addr, addr) &&
|
2006-09-23 05:45:56 +08:00
|
|
|
(ifp->flags & IFA_F_HOMEADDRESS)) {
|
|
|
|
ret = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2010-03-18 04:31:11 +08:00
|
|
|
rcu_read_unlock_bh();
|
2006-09-23 05:45:56 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* Periodic address status verification
|
|
|
|
*/
|
|
|
|
|
2014-03-28 01:28:07 +08:00
|
|
|
static void addrconf_verify_rtnl(void)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
ipv6: Reduce timer events for addrconf_verify().
This patch reduces timer events while keeping accuracy by rounding
our timer and/or batching several address validations in addrconf_verify().
addrconf_verify() is called at earliest timeout among interface addresses'
timeouts, but at maximum ADDR_CHECK_FREQUENCY (120 secs).
In most cases, all of timeouts of interface addresses are long enough
(e.g. several hours or days vs 2 minutes), this timer is usually called
every ADDR_CHECK_FREQUENCY, and it is okay to be lazy.
(Note this timer could be eliminated if all code paths which modifies
variables related to timeouts call us manually, but it is another story.)
However, in other least but important cases, we try keeping accuracy.
When the real interface address timeout is coming, and the timeout
is just before the rounded timeout, we accept some error.
When a timeout has been reached, we also try batching other several
events in very near future.
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2010-03-21 07:11:12 +08:00
|
|
|
unsigned long now, next, next_sec, next_sched;
|
2005-04-17 06:20:36 +08:00
|
|
|
struct inet6_ifaddr *ifp;
|
|
|
|
int i;
|
|
|
|
|
2014-03-28 01:28:07 +08:00
|
|
|
ASSERT_RTNL();
|
|
|
|
|
2010-03-18 04:31:11 +08:00
|
|
|
rcu_read_lock_bh();
|
2005-04-17 06:20:36 +08:00
|
|
|
now = jiffies;
|
ipv6: Reduce timer events for addrconf_verify().
This patch reduces timer events while keeping accuracy by rounding
our timer and/or batching several address validations in addrconf_verify().
addrconf_verify() is called at earliest timeout among interface addresses'
timeouts, but at maximum ADDR_CHECK_FREQUENCY (120 secs).
In most cases, all of timeouts of interface addresses are long enough
(e.g. several hours or days vs 2 minutes), this timer is usually called
every ADDR_CHECK_FREQUENCY, and it is okay to be lazy.
(Note this timer could be eliminated if all code paths which modifies
variables related to timeouts call us manually, but it is another story.)
However, in other least but important cases, we try keeping accuracy.
When the real interface address timeout is coming, and the timeout
is just before the rounded timeout, we accept some error.
When a timeout has been reached, we also try batching other several
events in very near future.
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2010-03-21 07:11:12 +08:00
|
|
|
next = round_jiffies_up(now + ADDR_CHECK_FREQUENCY);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2014-03-28 01:28:07 +08:00
|
|
|
cancel_delayed_work(&addr_chk_work);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2010-03-21 07:08:18 +08:00
|
|
|
for (i = 0; i < IN6_ADDR_HSIZE; i++) {
|
2005-04-17 06:20:36 +08:00
|
|
|
restart:
|
2014-03-28 01:28:07 +08:00
|
|
|
hlist_for_each_entry_rcu_bh(ifp, &inet6_addr_lst[i], addr_lst) {
|
2005-04-17 06:20:36 +08:00
|
|
|
unsigned long age;
|
|
|
|
|
2013-12-31 11:04:19 +08:00
|
|
|
/* When setting preferred_lft to a value not zero or
|
|
|
|
* infinity, while valid_lft is infinity
|
|
|
|
* IFA_F_PERMANENT has a non-infinity life time.
|
|
|
|
*/
|
|
|
|
if ((ifp->flags & IFA_F_PERMANENT) &&
|
|
|
|
(ifp->prefered_lft == INFINITY_LIFE_TIME))
|
2005-04-17 06:20:36 +08:00
|
|
|
continue;
|
|
|
|
|
|
|
|
spin_lock(&ifp->lock);
|
ipv6: Reduce timer events for addrconf_verify().
This patch reduces timer events while keeping accuracy by rounding
our timer and/or batching several address validations in addrconf_verify().
addrconf_verify() is called at earliest timeout among interface addresses'
timeouts, but at maximum ADDR_CHECK_FREQUENCY (120 secs).
In most cases, all of timeouts of interface addresses are long enough
(e.g. several hours or days vs 2 minutes), this timer is usually called
every ADDR_CHECK_FREQUENCY, and it is okay to be lazy.
(Note this timer could be eliminated if all code paths which modifies
variables related to timeouts call us manually, but it is another story.)
However, in other least but important cases, we try keeping accuracy.
When the real interface address timeout is coming, and the timeout
is just before the rounded timeout, we accept some error.
When a timeout has been reached, we also try batching other several
events in very near future.
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2010-03-21 07:11:12 +08:00
|
|
|
/* We try to batch several events at once. */
|
|
|
|
age = (now - ifp->tstamp + ADDRCONF_TIMER_FUZZ_MINUS) / HZ;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2006-07-28 17:12:11 +08:00
|
|
|
if (ifp->valid_lft != INFINITY_LIFE_TIME &&
|
|
|
|
age >= ifp->valid_lft) {
|
2005-04-17 06:20:36 +08:00
|
|
|
spin_unlock(&ifp->lock);
|
|
|
|
in6_ifa_hold(ifp);
|
|
|
|
ipv6_del_addr(ifp);
|
|
|
|
goto restart;
|
2006-07-28 17:12:11 +08:00
|
|
|
} else if (ifp->prefered_lft == INFINITY_LIFE_TIME) {
|
|
|
|
spin_unlock(&ifp->lock);
|
|
|
|
continue;
|
2005-04-17 06:20:36 +08:00
|
|
|
} else if (age >= ifp->prefered_lft) {
|
IPv6: preferred lifetime of address not getting updated
There's a bug in addrconf_prefix_rcv() where it won't update the
preferred lifetime of an IPv6 address if the current valid lifetime
of the address is less than 2 hours (the minimum value in the RA).
For example, If I send a router advertisement with a prefix that
has valid lifetime = preferred lifetime = 2 hours we'll build
this address:
3: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qlen 1000
inet6 2001:1890:1109:a20:217:8ff:fe7d:4718/64 scope global dynamic
valid_lft 7175sec preferred_lft 7175sec
If I then send the same prefix with valid lifetime = preferred
lifetime = 0 it will be ignored since the minimum valid lifetime
is 2 hours:
3: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qlen 1000
inet6 2001:1890:1109:a20:217:8ff:fe7d:4718/64 scope global dynamic
valid_lft 7161sec preferred_lft 7161sec
But according to RFC 4862 we should always reset the preferred lifetime
even if the valid lifetime is invalid, which would cause the address
to immediately get deprecated. So with this patch we'd see this:
5: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qlen 1000
inet6 2001:1890:1109:a20:21f:29ff:fe5a:ef04/64 scope global deprecated dynamic
valid_lft 7163sec preferred_lft 0sec
The comment winds-up being 5x the size of the code to fix the problem.
Update the preferred lifetime of IPv6 addresses derived from a prefix
info option in a router advertisement even if the valid lifetime in
the option is invalid, as specified in RFC 4862 Section 5.5.3e. Fixes
an issue where an address will not immediately become deprecated.
Reported by Jens Rosenboom.
Signed-off-by: Brian Haley <brian.haley@hp.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2009-07-02 15:10:52 +08:00
|
|
|
/* jiffies - ifp->tstamp > age >= ifp->prefered_lft */
|
2005-04-17 06:20:36 +08:00
|
|
|
int deprecate = 0;
|
|
|
|
|
|
|
|
if (!(ifp->flags&IFA_F_DEPRECATED)) {
|
|
|
|
deprecate = 1;
|
|
|
|
ifp->flags |= IFA_F_DEPRECATED;
|
|
|
|
}
|
|
|
|
|
2013-12-31 11:04:19 +08:00
|
|
|
if ((ifp->valid_lft != INFINITY_LIFE_TIME) &&
|
|
|
|
(time_before(ifp->tstamp + ifp->valid_lft * HZ, next)))
|
2005-04-17 06:20:36 +08:00
|
|
|
next = ifp->tstamp + ifp->valid_lft * HZ;
|
|
|
|
|
|
|
|
spin_unlock(&ifp->lock);
|
|
|
|
|
|
|
|
if (deprecate) {
|
|
|
|
in6_ifa_hold(ifp);
|
|
|
|
|
|
|
|
ipv6_ifa_notify(0, ifp);
|
|
|
|
in6_ifa_put(ifp);
|
|
|
|
goto restart;
|
|
|
|
}
|
|
|
|
} else if ((ifp->flags&IFA_F_TEMPORARY) &&
|
|
|
|
!(ifp->flags&IFA_F_TENTATIVE)) {
|
2010-03-18 04:31:17 +08:00
|
|
|
unsigned long regen_advance = ifp->idev->cnf.regen_max_retry *
|
|
|
|
ifp->idev->cnf.dad_transmits *
|
2013-12-08 02:26:53 +08:00
|
|
|
NEIGH_VAR(ifp->idev->nd_parms, RETRANS_TIME) / HZ;
|
2010-03-18 04:31:17 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
if (age >= ifp->prefered_lft - regen_advance) {
|
|
|
|
struct inet6_ifaddr *ifpub = ifp->ifpub;
|
|
|
|
if (time_before(ifp->tstamp + ifp->prefered_lft * HZ, next))
|
|
|
|
next = ifp->tstamp + ifp->prefered_lft * HZ;
|
|
|
|
if (!ifp->regen_count && ifpub) {
|
|
|
|
ifp->regen_count++;
|
|
|
|
in6_ifa_hold(ifp);
|
|
|
|
in6_ifa_hold(ifpub);
|
|
|
|
spin_unlock(&ifp->lock);
|
2010-03-18 04:31:11 +08:00
|
|
|
|
2005-12-24 03:24:05 +08:00
|
|
|
spin_lock(&ifpub->lock);
|
|
|
|
ifpub->regen_count = 0;
|
|
|
|
spin_unlock(&ifpub->lock);
|
2005-04-17 06:20:36 +08:00
|
|
|
ipv6_create_tempaddr(ifpub, ifp);
|
|
|
|
in6_ifa_put(ifpub);
|
|
|
|
in6_ifa_put(ifp);
|
|
|
|
goto restart;
|
|
|
|
}
|
|
|
|
} else if (time_before(ifp->tstamp + ifp->prefered_lft * HZ - regen_advance * HZ, next))
|
|
|
|
next = ifp->tstamp + ifp->prefered_lft * HZ - regen_advance * HZ;
|
|
|
|
spin_unlock(&ifp->lock);
|
|
|
|
} else {
|
|
|
|
/* ifp->prefered_lft <= ifp->valid_lft */
|
|
|
|
if (time_before(ifp->tstamp + ifp->prefered_lft * HZ, next))
|
|
|
|
next = ifp->tstamp + ifp->prefered_lft * HZ;
|
|
|
|
spin_unlock(&ifp->lock);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
ipv6: Reduce timer events for addrconf_verify().
This patch reduces timer events while keeping accuracy by rounding
our timer and/or batching several address validations in addrconf_verify().
addrconf_verify() is called at earliest timeout among interface addresses'
timeouts, but at maximum ADDR_CHECK_FREQUENCY (120 secs).
In most cases, all of timeouts of interface addresses are long enough
(e.g. several hours or days vs 2 minutes), this timer is usually called
every ADDR_CHECK_FREQUENCY, and it is okay to be lazy.
(Note this timer could be eliminated if all code paths which modifies
variables related to timeouts call us manually, but it is another story.)
However, in other least but important cases, we try keeping accuracy.
When the real interface address timeout is coming, and the timeout
is just before the rounded timeout, we accept some error.
When a timeout has been reached, we also try batching other several
events in very near future.
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2010-03-21 07:11:12 +08:00
|
|
|
next_sec = round_jiffies_up(next);
|
|
|
|
next_sched = next;
|
|
|
|
|
|
|
|
/* If rounded timeout is accurate enough, accept it. */
|
|
|
|
if (time_before(next_sec, next + ADDRCONF_TIMER_FUZZ))
|
|
|
|
next_sched = next_sec;
|
|
|
|
|
|
|
|
/* And minimum interval is ADDRCONF_TIMER_FUZZ_MAX. */
|
|
|
|
if (time_before(next_sched, jiffies + ADDRCONF_TIMER_FUZZ_MAX))
|
|
|
|
next_sched = jiffies + ADDRCONF_TIMER_FUZZ_MAX;
|
|
|
|
|
2013-08-17 10:27:04 +08:00
|
|
|
ADBG(KERN_DEBUG "now = %lu, schedule = %lu, rounded schedule = %lu => %lu\n",
|
|
|
|
now, next, next_sec, next_sched);
|
2014-03-28 01:28:07 +08:00
|
|
|
mod_delayed_work(addrconf_wq, &addr_chk_work, next_sched - now);
|
2010-03-18 04:31:11 +08:00
|
|
|
rcu_read_unlock_bh();
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2014-03-28 01:28:07 +08:00
|
|
|
static void addrconf_verify_work(struct work_struct *w)
|
|
|
|
{
|
|
|
|
rtnl_lock();
|
|
|
|
addrconf_verify_rtnl();
|
|
|
|
rtnl_unlock();
|
|
|
|
}
|
|
|
|
|
|
|
|
static void addrconf_verify(void)
|
|
|
|
{
|
|
|
|
mod_delayed_work(addrconf_wq, &addr_chk_work, 0);
|
|
|
|
}
|
|
|
|
|
2013-05-17 06:32:00 +08:00
|
|
|
static struct in6_addr *extract_addr(struct nlattr *addr, struct nlattr *local,
|
|
|
|
struct in6_addr **peer_pfx)
|
2006-09-18 15:09:49 +08:00
|
|
|
{
|
|
|
|
struct in6_addr *pfx = NULL;
|
|
|
|
|
2013-05-17 06:32:00 +08:00
|
|
|
*peer_pfx = NULL;
|
|
|
|
|
2006-09-18 15:09:49 +08:00
|
|
|
if (addr)
|
|
|
|
pfx = nla_data(addr);
|
|
|
|
|
|
|
|
if (local) {
|
|
|
|
if (pfx && nla_memcmp(local, pfx, sizeof(*pfx)))
|
2013-05-17 06:32:00 +08:00
|
|
|
*peer_pfx = pfx;
|
|
|
|
pfx = nla_data(local);
|
2006-09-18 15:09:49 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return pfx;
|
|
|
|
}
|
|
|
|
|
2007-06-06 03:38:30 +08:00
|
|
|
static const struct nla_policy ifa_ipv6_policy[IFA_MAX+1] = {
|
2006-09-18 15:09:49 +08:00
|
|
|
[IFA_ADDRESS] = { .len = sizeof(struct in6_addr) },
|
|
|
|
[IFA_LOCAL] = { .len = sizeof(struct in6_addr) },
|
|
|
|
[IFA_CACHEINFO] = { .len = sizeof(struct ifa_cacheinfo) },
|
2013-12-06 16:45:21 +08:00
|
|
|
[IFA_FLAGS] = { .len = sizeof(u32) },
|
2006-09-18 15:09:49 +08:00
|
|
|
};
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
static int
|
2013-03-21 15:45:29 +08:00
|
|
|
inet6_rtm_deladdr(struct sk_buff *skb, struct nlmsghdr *nlh)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2008-03-26 01:26:21 +08:00
|
|
|
struct net *net = sock_net(skb->sk);
|
2006-09-18 15:10:19 +08:00
|
|
|
struct ifaddrmsg *ifm;
|
|
|
|
struct nlattr *tb[IFA_MAX+1];
|
2013-05-17 06:32:00 +08:00
|
|
|
struct in6_addr *pfx, *peer_pfx;
|
2014-04-21 03:29:36 +08:00
|
|
|
u32 ifa_flags;
|
2006-09-18 15:10:19 +08:00
|
|
|
int err;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2006-09-18 15:10:19 +08:00
|
|
|
err = nlmsg_parse(nlh, sizeof(*ifm), tb, IFA_MAX, ifa_ipv6_policy);
|
|
|
|
if (err < 0)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
ifm = nlmsg_data(nlh);
|
2013-05-17 06:32:00 +08:00
|
|
|
pfx = extract_addr(tb[IFA_ADDRESS], tb[IFA_LOCAL], &peer_pfx);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!pfx)
|
2005-04-17 06:20:36 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
2014-04-21 03:29:36 +08:00
|
|
|
ifa_flags = tb[IFA_FLAGS] ? nla_get_u32(tb[IFA_FLAGS]) : ifm->ifa_flags;
|
|
|
|
|
|
|
|
/* We ignore other flags so far. */
|
|
|
|
ifa_flags &= IFA_F_MANAGETEMPADDR;
|
|
|
|
|
|
|
|
return inet6_addr_del(net, ifm->ifa_index, ifa_flags, pfx,
|
|
|
|
ifm->ifa_prefixlen);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2013-12-06 16:45:21 +08:00
|
|
|
static int inet6_addr_modify(struct inet6_ifaddr *ifp, u32 ifa_flags,
|
2006-09-23 05:45:27 +08:00
|
|
|
u32 prefered_lft, u32 valid_lft)
|
2006-07-28 17:12:13 +08:00
|
|
|
{
|
2008-05-20 07:56:11 +08:00
|
|
|
u32 flags;
|
|
|
|
clock_t expires;
|
2008-05-27 16:37:49 +08:00
|
|
|
unsigned long timeout;
|
2013-12-06 16:45:22 +08:00
|
|
|
bool was_managetempaddr;
|
2014-01-15 22:36:59 +08:00
|
|
|
bool had_prefixroute;
|
2007-02-07 19:36:26 +08:00
|
|
|
|
2014-03-28 01:28:07 +08:00
|
|
|
ASSERT_RTNL();
|
|
|
|
|
2006-07-28 17:12:13 +08:00
|
|
|
if (!valid_lft || (prefered_lft > valid_lft))
|
|
|
|
return -EINVAL;
|
|
|
|
|
2013-12-06 16:45:22 +08:00
|
|
|
if (ifa_flags & IFA_F_MANAGETEMPADDR &&
|
|
|
|
(ifp->flags & IFA_F_TEMPORARY || ifp->prefix_len != 64))
|
|
|
|
return -EINVAL;
|
|
|
|
|
2008-05-27 16:37:49 +08:00
|
|
|
timeout = addrconf_timeout_fixup(valid_lft, HZ);
|
|
|
|
if (addrconf_finite_timeout(timeout)) {
|
|
|
|
expires = jiffies_to_clock_t(timeout * HZ);
|
|
|
|
valid_lft = timeout;
|
2008-05-20 07:56:11 +08:00
|
|
|
flags = RTF_EXPIRES;
|
2008-05-27 16:37:49 +08:00
|
|
|
} else {
|
|
|
|
expires = 0;
|
|
|
|
flags = 0;
|
|
|
|
ifa_flags |= IFA_F_PERMANENT;
|
2008-05-20 07:56:11 +08:00
|
|
|
}
|
2006-07-28 17:12:13 +08:00
|
|
|
|
2008-05-27 16:37:49 +08:00
|
|
|
timeout = addrconf_timeout_fixup(prefered_lft, HZ);
|
|
|
|
if (addrconf_finite_timeout(timeout)) {
|
|
|
|
if (timeout == 0)
|
|
|
|
ifa_flags |= IFA_F_DEPRECATED;
|
|
|
|
prefered_lft = timeout;
|
|
|
|
}
|
2006-07-28 17:12:13 +08:00
|
|
|
|
|
|
|
spin_lock_bh(&ifp->lock);
|
2013-12-06 16:45:22 +08:00
|
|
|
was_managetempaddr = ifp->flags & IFA_F_MANAGETEMPADDR;
|
2014-01-15 22:36:59 +08:00
|
|
|
had_prefixroute = ifp->flags & IFA_F_PERMANENT &&
|
|
|
|
!(ifp->flags & IFA_F_NOPREFIXROUTE);
|
2013-12-06 16:45:22 +08:00
|
|
|
ifp->flags &= ~(IFA_F_DEPRECATED | IFA_F_PERMANENT | IFA_F_NODAD |
|
2014-01-15 22:36:58 +08:00
|
|
|
IFA_F_HOMEADDRESS | IFA_F_MANAGETEMPADDR |
|
|
|
|
IFA_F_NOPREFIXROUTE);
|
2013-12-06 16:45:22 +08:00
|
|
|
ifp->flags |= ifa_flags;
|
2006-07-28 17:12:13 +08:00
|
|
|
ifp->tstamp = jiffies;
|
|
|
|
ifp->valid_lft = valid_lft;
|
|
|
|
ifp->prefered_lft = prefered_lft;
|
|
|
|
|
|
|
|
spin_unlock_bh(&ifp->lock);
|
|
|
|
if (!(ifp->flags&IFA_F_TENTATIVE))
|
|
|
|
ipv6_ifa_notify(0, ifp);
|
|
|
|
|
2014-01-15 22:36:58 +08:00
|
|
|
if (!(ifa_flags & IFA_F_NOPREFIXROUTE)) {
|
|
|
|
addrconf_prefix_route(&ifp->addr, ifp->prefix_len, ifp->idev->dev,
|
|
|
|
expires, flags);
|
2014-01-15 22:36:59 +08:00
|
|
|
} else if (had_prefixroute) {
|
|
|
|
enum cleanup_prefix_rt_t action;
|
|
|
|
unsigned long rt_expires;
|
|
|
|
|
|
|
|
write_lock_bh(&ifp->idev->lock);
|
|
|
|
action = check_cleanup_prefix_route(ifp, &rt_expires);
|
|
|
|
write_unlock_bh(&ifp->idev->lock);
|
|
|
|
|
|
|
|
if (action != CLEANUP_PREFIX_RT_NOP) {
|
|
|
|
cleanup_prefix_route(ifp, rt_expires,
|
|
|
|
action == CLEANUP_PREFIX_RT_DEL);
|
|
|
|
}
|
2014-01-15 22:36:58 +08:00
|
|
|
}
|
2013-12-06 16:45:22 +08:00
|
|
|
|
|
|
|
if (was_managetempaddr || ifp->flags & IFA_F_MANAGETEMPADDR) {
|
|
|
|
if (was_managetempaddr && !(ifp->flags & IFA_F_MANAGETEMPADDR))
|
|
|
|
valid_lft = prefered_lft = 0;
|
|
|
|
manage_tempaddrs(ifp->idev, ifp, valid_lft, prefered_lft,
|
|
|
|
!was_managetempaddr, jiffies);
|
|
|
|
}
|
|
|
|
|
2014-03-28 01:28:07 +08:00
|
|
|
addrconf_verify_rtnl();
|
2006-07-28 17:12:13 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
static int
|
2013-03-21 15:45:29 +08:00
|
|
|
inet6_rtm_newaddr(struct sk_buff *skb, struct nlmsghdr *nlh)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2008-03-26 01:26:21 +08:00
|
|
|
struct net *net = sock_net(skb->sk);
|
2006-09-18 15:09:49 +08:00
|
|
|
struct ifaddrmsg *ifm;
|
|
|
|
struct nlattr *tb[IFA_MAX+1];
|
2013-05-17 06:32:00 +08:00
|
|
|
struct in6_addr *pfx, *peer_pfx;
|
2006-09-18 15:13:46 +08:00
|
|
|
struct inet6_ifaddr *ifa;
|
|
|
|
struct net_device *dev;
|
2006-09-23 05:45:27 +08:00
|
|
|
u32 valid_lft = INFINITY_LIFE_TIME, preferred_lft = INFINITY_LIFE_TIME;
|
2013-12-06 16:45:21 +08:00
|
|
|
u32 ifa_flags;
|
2006-09-18 15:09:49 +08:00
|
|
|
int err;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2006-09-18 15:09:49 +08:00
|
|
|
err = nlmsg_parse(nlh, sizeof(*ifm), tb, IFA_MAX, ifa_ipv6_policy);
|
|
|
|
if (err < 0)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
ifm = nlmsg_data(nlh);
|
2013-05-17 06:32:00 +08:00
|
|
|
pfx = extract_addr(tb[IFA_ADDRESS], tb[IFA_LOCAL], &peer_pfx);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!pfx)
|
2005-04-17 06:20:36 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
2006-09-18 15:09:49 +08:00
|
|
|
if (tb[IFA_CACHEINFO]) {
|
2006-07-28 17:12:10 +08:00
|
|
|
struct ifa_cacheinfo *ci;
|
2006-09-18 15:09:49 +08:00
|
|
|
|
|
|
|
ci = nla_data(tb[IFA_CACHEINFO]);
|
2006-07-28 17:12:10 +08:00
|
|
|
valid_lft = ci->ifa_valid;
|
2006-09-18 15:09:49 +08:00
|
|
|
preferred_lft = ci->ifa_prefered;
|
|
|
|
} else {
|
|
|
|
preferred_lft = INFINITY_LIFE_TIME;
|
|
|
|
valid_lft = INFINITY_LIFE_TIME;
|
2006-07-28 17:12:10 +08:00
|
|
|
}
|
|
|
|
|
2008-03-06 02:46:57 +08:00
|
|
|
dev = __dev_get_by_index(net, ifm->ifa_index);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!dev)
|
2006-09-18 15:13:46 +08:00
|
|
|
return -ENODEV;
|
|
|
|
|
2013-12-06 16:45:21 +08:00
|
|
|
ifa_flags = tb[IFA_FLAGS] ? nla_get_u32(tb[IFA_FLAGS]) : ifm->ifa_flags;
|
|
|
|
|
2006-09-23 05:45:27 +08:00
|
|
|
/* We ignore other flags so far. */
|
2014-01-15 22:36:58 +08:00
|
|
|
ifa_flags &= IFA_F_NODAD | IFA_F_HOMEADDRESS | IFA_F_MANAGETEMPADDR |
|
2015-02-26 01:58:35 +08:00
|
|
|
IFA_F_NOPREFIXROUTE | IFA_F_MCAUTOJOIN;
|
2006-09-23 05:45:27 +08:00
|
|
|
|
2008-01-11 14:44:09 +08:00
|
|
|
ifa = ipv6_get_ifaddr(net, pfx, dev, 1);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!ifa) {
|
2006-09-18 15:13:46 +08:00
|
|
|
/*
|
|
|
|
* It would be best to check for !NLM_F_CREATE here but
|
2014-01-13 03:26:32 +08:00
|
|
|
* userspace already relies on not having to provide this.
|
2006-09-18 15:13:46 +08:00
|
|
|
*/
|
2013-05-17 06:32:00 +08:00
|
|
|
return inet6_addr_add(net, ifm->ifa_index, pfx, peer_pfx,
|
2008-03-06 02:46:57 +08:00
|
|
|
ifm->ifa_prefixlen, ifa_flags,
|
|
|
|
preferred_lft, valid_lft);
|
2006-07-28 17:12:13 +08:00
|
|
|
}
|
|
|
|
|
2006-09-18 15:13:46 +08:00
|
|
|
if (nlh->nlmsg_flags & NLM_F_EXCL ||
|
|
|
|
!(nlh->nlmsg_flags & NLM_F_REPLACE))
|
|
|
|
err = -EEXIST;
|
|
|
|
else
|
2006-09-23 05:45:27 +08:00
|
|
|
err = inet6_addr_modify(ifa, ifa_flags, preferred_lft, valid_lft);
|
2006-09-18 15:13:46 +08:00
|
|
|
|
|
|
|
in6_ifa_put(ifa);
|
|
|
|
|
|
|
|
return err;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2013-12-06 16:45:21 +08:00
|
|
|
static void put_ifaddrmsg(struct nlmsghdr *nlh, u8 prefixlen, u32 flags,
|
2006-09-18 15:11:52 +08:00
|
|
|
u8 scope, int ifindex)
|
|
|
|
{
|
|
|
|
struct ifaddrmsg *ifm;
|
|
|
|
|
|
|
|
ifm = nlmsg_data(nlh);
|
|
|
|
ifm->ifa_family = AF_INET6;
|
|
|
|
ifm->ifa_prefixlen = prefixlen;
|
|
|
|
ifm->ifa_flags = flags;
|
|
|
|
ifm->ifa_scope = scope;
|
|
|
|
ifm->ifa_index = ifindex;
|
|
|
|
}
|
|
|
|
|
2006-09-18 15:11:24 +08:00
|
|
|
static int put_cacheinfo(struct sk_buff *skb, unsigned long cstamp,
|
|
|
|
unsigned long tstamp, u32 preferred, u32 valid)
|
|
|
|
{
|
|
|
|
struct ifa_cacheinfo ci;
|
|
|
|
|
2010-11-17 12:12:02 +08:00
|
|
|
ci.cstamp = cstamp_delta(cstamp);
|
|
|
|
ci.tstamp = cstamp_delta(tstamp);
|
2006-09-18 15:11:24 +08:00
|
|
|
ci.ifa_prefered = preferred;
|
|
|
|
ci.ifa_valid = valid;
|
|
|
|
|
|
|
|
return nla_put(skb, IFA_CACHEINFO, sizeof(ci), &ci);
|
|
|
|
}
|
|
|
|
|
2006-09-18 15:11:52 +08:00
|
|
|
static inline int rt_scope(int ifa_scope)
|
|
|
|
{
|
|
|
|
if (ifa_scope & IFA_HOST)
|
|
|
|
return RT_SCOPE_HOST;
|
|
|
|
else if (ifa_scope & IFA_LINK)
|
|
|
|
return RT_SCOPE_LINK;
|
|
|
|
else if (ifa_scope & IFA_SITE)
|
|
|
|
return RT_SCOPE_SITE;
|
|
|
|
else
|
|
|
|
return RT_SCOPE_UNIVERSE;
|
|
|
|
}
|
|
|
|
|
2006-09-18 15:12:35 +08:00
|
|
|
static inline int inet6_ifaddr_msgsize(void)
|
|
|
|
{
|
2006-11-11 06:10:15 +08:00
|
|
|
return NLMSG_ALIGN(sizeof(struct ifaddrmsg))
|
2013-05-17 06:32:00 +08:00
|
|
|
+ nla_total_size(16) /* IFA_LOCAL */
|
2006-11-11 06:10:15 +08:00
|
|
|
+ nla_total_size(16) /* IFA_ADDRESS */
|
2013-12-06 16:45:21 +08:00
|
|
|
+ nla_total_size(sizeof(struct ifa_cacheinfo))
|
|
|
|
+ nla_total_size(4) /* IFA_FLAGS */;
|
2006-09-18 15:12:35 +08:00
|
|
|
}
|
2006-06-18 13:48:48 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
static int inet6_fill_ifaddr(struct sk_buff *skb, struct inet6_ifaddr *ifa,
|
2012-09-08 04:12:54 +08:00
|
|
|
u32 portid, u32 seq, int event, unsigned int flags)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct nlmsghdr *nlh;
|
2006-09-18 15:11:24 +08:00
|
|
|
u32 preferred, valid;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2012-09-08 04:12:54 +08:00
|
|
|
nlh = nlmsg_put(skb, portid, seq, event, sizeof(struct ifaddrmsg), flags);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!nlh)
|
2007-02-01 15:16:40 +08:00
|
|
|
return -EMSGSIZE;
|
2006-09-18 15:12:35 +08:00
|
|
|
|
2006-09-18 15:11:52 +08:00
|
|
|
put_ifaddrmsg(nlh, ifa->prefix_len, ifa->flags, rt_scope(ifa->scope),
|
|
|
|
ifa->idev->dev->ifindex);
|
|
|
|
|
2013-12-31 11:04:19 +08:00
|
|
|
if (!((ifa->flags&IFA_F_PERMANENT) &&
|
|
|
|
(ifa->prefered_lft == INFINITY_LIFE_TIME))) {
|
2006-09-18 15:11:24 +08:00
|
|
|
preferred = ifa->prefered_lft;
|
|
|
|
valid = ifa->valid_lft;
|
|
|
|
if (preferred != INFINITY_LIFE_TIME) {
|
2005-04-17 06:20:36 +08:00
|
|
|
long tval = (jiffies - ifa->tstamp)/HZ;
|
2009-06-25 12:55:50 +08:00
|
|
|
if (preferred > tval)
|
|
|
|
preferred -= tval;
|
|
|
|
else
|
|
|
|
preferred = 0;
|
2010-06-26 19:37:47 +08:00
|
|
|
if (valid != INFINITY_LIFE_TIME) {
|
|
|
|
if (valid > tval)
|
|
|
|
valid -= tval;
|
|
|
|
else
|
|
|
|
valid = 0;
|
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
} else {
|
2006-09-18 15:11:24 +08:00
|
|
|
preferred = INFINITY_LIFE_TIME;
|
|
|
|
valid = INFINITY_LIFE_TIME;
|
|
|
|
}
|
|
|
|
|
2013-05-22 13:41:06 +08:00
|
|
|
if (!ipv6_addr_any(&ifa->peer_addr)) {
|
2015-03-29 22:59:25 +08:00
|
|
|
if (nla_put_in6_addr(skb, IFA_LOCAL, &ifa->addr) < 0 ||
|
|
|
|
nla_put_in6_addr(skb, IFA_ADDRESS, &ifa->peer_addr) < 0)
|
2013-05-17 06:32:00 +08:00
|
|
|
goto error;
|
|
|
|
} else
|
2015-03-29 22:59:25 +08:00
|
|
|
if (nla_put_in6_addr(skb, IFA_ADDRESS, &ifa->addr) < 0)
|
2013-05-17 06:32:00 +08:00
|
|
|
goto error;
|
|
|
|
|
|
|
|
if (put_cacheinfo(skb, ifa->cstamp, ifa->tstamp, preferred, valid) < 0)
|
|
|
|
goto error;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2013-12-06 16:45:21 +08:00
|
|
|
if (nla_put_u32(skb, IFA_FLAGS, ifa->flags) < 0)
|
|
|
|
goto error;
|
|
|
|
|
2015-01-17 05:09:00 +08:00
|
|
|
nlmsg_end(skb, nlh);
|
|
|
|
return 0;
|
2013-05-17 06:32:00 +08:00
|
|
|
|
|
|
|
error:
|
|
|
|
nlmsg_cancel(skb, nlh);
|
|
|
|
return -EMSGSIZE;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int inet6_fill_ifmcaddr(struct sk_buff *skb, struct ifmcaddr6 *ifmca,
|
2012-09-08 04:12:54 +08:00
|
|
|
u32 portid, u32 seq, int event, u16 flags)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct nlmsghdr *nlh;
|
2006-09-18 15:11:52 +08:00
|
|
|
u8 scope = RT_SCOPE_UNIVERSE;
|
|
|
|
int ifindex = ifmca->idev->dev->ifindex;
|
|
|
|
|
|
|
|
if (ipv6_addr_scope(&ifmca->mca_addr) & IFA_SITE)
|
|
|
|
scope = RT_SCOPE_SITE;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2012-09-08 04:12:54 +08:00
|
|
|
nlh = nlmsg_put(skb, portid, seq, event, sizeof(struct ifaddrmsg), flags);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!nlh)
|
2007-02-01 15:16:40 +08:00
|
|
|
return -EMSGSIZE;
|
2006-09-18 15:11:24 +08:00
|
|
|
|
2006-09-18 15:12:35 +08:00
|
|
|
put_ifaddrmsg(nlh, 128, IFA_F_PERMANENT, scope, ifindex);
|
2015-03-29 22:59:25 +08:00
|
|
|
if (nla_put_in6_addr(skb, IFA_MULTICAST, &ifmca->mca_addr) < 0 ||
|
2006-09-18 15:12:35 +08:00
|
|
|
put_cacheinfo(skb, ifmca->mca_cstamp, ifmca->mca_tstamp,
|
2007-02-01 15:16:40 +08:00
|
|
|
INFINITY_LIFE_TIME, INFINITY_LIFE_TIME) < 0) {
|
|
|
|
nlmsg_cancel(skb, nlh);
|
|
|
|
return -EMSGSIZE;
|
|
|
|
}
|
2006-09-18 15:11:24 +08:00
|
|
|
|
2015-01-17 05:09:00 +08:00
|
|
|
nlmsg_end(skb, nlh);
|
|
|
|
return 0;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int inet6_fill_ifacaddr(struct sk_buff *skb, struct ifacaddr6 *ifaca,
|
2012-09-08 04:12:54 +08:00
|
|
|
u32 portid, u32 seq, int event, unsigned int flags)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct nlmsghdr *nlh;
|
2006-09-18 15:11:52 +08:00
|
|
|
u8 scope = RT_SCOPE_UNIVERSE;
|
|
|
|
int ifindex = ifaca->aca_idev->dev->ifindex;
|
|
|
|
|
|
|
|
if (ipv6_addr_scope(&ifaca->aca_addr) & IFA_SITE)
|
|
|
|
scope = RT_SCOPE_SITE;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2012-09-08 04:12:54 +08:00
|
|
|
nlh = nlmsg_put(skb, portid, seq, event, sizeof(struct ifaddrmsg), flags);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!nlh)
|
2007-02-01 15:16:40 +08:00
|
|
|
return -EMSGSIZE;
|
2006-09-18 15:11:24 +08:00
|
|
|
|
2006-09-18 15:12:35 +08:00
|
|
|
put_ifaddrmsg(nlh, 128, IFA_F_PERMANENT, scope, ifindex);
|
2015-03-29 22:59:25 +08:00
|
|
|
if (nla_put_in6_addr(skb, IFA_ANYCAST, &ifaca->aca_addr) < 0 ||
|
2006-09-18 15:12:35 +08:00
|
|
|
put_cacheinfo(skb, ifaca->aca_cstamp, ifaca->aca_tstamp,
|
2007-02-01 15:16:40 +08:00
|
|
|
INFINITY_LIFE_TIME, INFINITY_LIFE_TIME) < 0) {
|
|
|
|
nlmsg_cancel(skb, nlh);
|
|
|
|
return -EMSGSIZE;
|
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2015-01-17 05:09:00 +08:00
|
|
|
nlmsg_end(skb, nlh);
|
|
|
|
return 0;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2010-03-21 07:09:01 +08:00
|
|
|
enum addr_type_t {
|
2005-04-17 06:20:36 +08:00
|
|
|
UNICAST_ADDR,
|
|
|
|
MULTICAST_ADDR,
|
|
|
|
ANYCAST_ADDR,
|
|
|
|
};
|
|
|
|
|
2009-11-12 12:11:50 +08:00
|
|
|
/* called with rcu_read_lock() */
|
|
|
|
static int in6_dump_addrs(struct inet6_dev *idev, struct sk_buff *skb,
|
|
|
|
struct netlink_callback *cb, enum addr_type_t type,
|
|
|
|
int s_ip_idx, int *p_ip_idx)
|
|
|
|
{
|
|
|
|
struct ifmcaddr6 *ifmca;
|
|
|
|
struct ifacaddr6 *ifaca;
|
|
|
|
int err = 1;
|
|
|
|
int ip_idx = *p_ip_idx;
|
|
|
|
|
|
|
|
read_lock_bh(&idev->lock);
|
|
|
|
switch (type) {
|
2010-03-18 04:31:13 +08:00
|
|
|
case UNICAST_ADDR: {
|
|
|
|
struct inet6_ifaddr *ifa;
|
|
|
|
|
2009-11-12 12:11:50 +08:00
|
|
|
/* unicast address incl. temp addr */
|
2010-03-18 04:31:13 +08:00
|
|
|
list_for_each_entry(ifa, &idev->addr_list, if_list) {
|
|
|
|
if (++ip_idx < s_ip_idx)
|
2009-11-12 12:11:50 +08:00
|
|
|
continue;
|
|
|
|
err = inet6_fill_ifaddr(skb, ifa,
|
2012-09-08 04:12:54 +08:00
|
|
|
NETLINK_CB(cb->skb).portid,
|
2009-11-12 12:11:50 +08:00
|
|
|
cb->nlh->nlmsg_seq,
|
|
|
|
RTM_NEWADDR,
|
|
|
|
NLM_F_MULTI);
|
2015-01-17 05:09:00 +08:00
|
|
|
if (err < 0)
|
2009-11-12 12:11:50 +08:00
|
|
|
break;
|
2013-03-22 14:28:43 +08:00
|
|
|
nl_dump_check_consistent(cb, nlmsg_hdr(skb));
|
2009-11-12 12:11:50 +08:00
|
|
|
}
|
|
|
|
break;
|
2010-03-18 04:31:13 +08:00
|
|
|
}
|
2009-11-12 12:11:50 +08:00
|
|
|
case MULTICAST_ADDR:
|
|
|
|
/* multicast address */
|
|
|
|
for (ifmca = idev->mc_list; ifmca;
|
|
|
|
ifmca = ifmca->next, ip_idx++) {
|
|
|
|
if (ip_idx < s_ip_idx)
|
|
|
|
continue;
|
|
|
|
err = inet6_fill_ifmcaddr(skb, ifmca,
|
2012-09-08 04:12:54 +08:00
|
|
|
NETLINK_CB(cb->skb).portid,
|
2009-11-12 12:11:50 +08:00
|
|
|
cb->nlh->nlmsg_seq,
|
|
|
|
RTM_GETMULTICAST,
|
|
|
|
NLM_F_MULTI);
|
2015-01-17 05:09:00 +08:00
|
|
|
if (err < 0)
|
2009-11-12 12:11:50 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case ANYCAST_ADDR:
|
|
|
|
/* anycast address */
|
|
|
|
for (ifaca = idev->ac_list; ifaca;
|
|
|
|
ifaca = ifaca->aca_next, ip_idx++) {
|
|
|
|
if (ip_idx < s_ip_idx)
|
|
|
|
continue;
|
|
|
|
err = inet6_fill_ifacaddr(skb, ifaca,
|
2012-09-08 04:12:54 +08:00
|
|
|
NETLINK_CB(cb->skb).portid,
|
2009-11-12 12:11:50 +08:00
|
|
|
cb->nlh->nlmsg_seq,
|
|
|
|
RTM_GETANYCAST,
|
|
|
|
NLM_F_MULTI);
|
2015-01-17 05:09:00 +08:00
|
|
|
if (err < 0)
|
2009-11-12 12:11:50 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
read_unlock_bh(&idev->lock);
|
|
|
|
*p_ip_idx = ip_idx;
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
static int inet6_dump_addr(struct sk_buff *skb, struct netlink_callback *cb,
|
|
|
|
enum addr_type_t type)
|
|
|
|
{
|
2009-11-12 12:11:50 +08:00
|
|
|
struct net *net = sock_net(skb->sk);
|
|
|
|
int h, s_h;
|
2005-04-17 06:20:36 +08:00
|
|
|
int idx, ip_idx;
|
|
|
|
int s_idx, s_ip_idx;
|
|
|
|
struct net_device *dev;
|
2009-11-12 12:11:50 +08:00
|
|
|
struct inet6_dev *idev;
|
|
|
|
struct hlist_head *head;
|
2007-02-09 22:24:49 +08:00
|
|
|
|
2009-11-12 12:11:50 +08:00
|
|
|
s_h = cb->args[0];
|
|
|
|
s_idx = idx = cb->args[1];
|
|
|
|
s_ip_idx = ip_idx = cb->args[2];
|
2008-01-22 16:29:40 +08:00
|
|
|
|
2009-11-12 12:11:50 +08:00
|
|
|
rcu_read_lock();
|
2013-03-22 14:28:43 +08:00
|
|
|
cb->seq = atomic_read(&net->ipv6.dev_addr_genid) ^ net->dev_base_seq;
|
2009-11-12 12:11:50 +08:00
|
|
|
for (h = s_h; h < NETDEV_HASHENTRIES; h++, s_idx = 0) {
|
|
|
|
idx = 0;
|
|
|
|
head = &net->dev_index_head[h];
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_rcu(dev, head, index_hlist) {
|
2009-11-12 12:11:50 +08:00
|
|
|
if (idx < s_idx)
|
|
|
|
goto cont;
|
2010-03-27 11:27:49 +08:00
|
|
|
if (h > s_h || idx > s_idx)
|
2009-11-12 12:11:50 +08:00
|
|
|
s_ip_idx = 0;
|
|
|
|
ip_idx = 0;
|
2010-03-21 07:09:01 +08:00
|
|
|
idev = __in6_dev_get(dev);
|
|
|
|
if (!idev)
|
2009-11-12 12:11:50 +08:00
|
|
|
goto cont;
|
|
|
|
|
|
|
|
if (in6_dump_addrs(idev, skb, cb, type,
|
2015-01-19 12:36:08 +08:00
|
|
|
s_ip_idx, &ip_idx) < 0)
|
2009-11-12 12:11:50 +08:00
|
|
|
goto done;
|
2007-05-04 06:13:45 +08:00
|
|
|
cont:
|
2009-11-12 12:11:50 +08:00
|
|
|
idx++;
|
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2009-11-12 12:11:50 +08:00
|
|
|
done:
|
|
|
|
rcu_read_unlock();
|
|
|
|
cb->args[0] = h;
|
|
|
|
cb->args[1] = idx;
|
|
|
|
cb->args[2] = ip_idx;
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
return skb->len;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int inet6_dump_ifaddr(struct sk_buff *skb, struct netlink_callback *cb)
|
|
|
|
{
|
|
|
|
enum addr_type_t type = UNICAST_ADDR;
|
2007-11-30 21:21:31 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
return inet6_dump_addr(skb, cb, type);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int inet6_dump_ifmcaddr(struct sk_buff *skb, struct netlink_callback *cb)
|
|
|
|
{
|
|
|
|
enum addr_type_t type = MULTICAST_ADDR;
|
2007-11-30 21:21:31 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
return inet6_dump_addr(skb, cb, type);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int inet6_dump_ifacaddr(struct sk_buff *skb, struct netlink_callback *cb)
|
|
|
|
{
|
|
|
|
enum addr_type_t type = ANYCAST_ADDR;
|
2007-11-30 21:21:31 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
return inet6_dump_addr(skb, cb, type);
|
|
|
|
}
|
|
|
|
|
2013-03-21 15:45:29 +08:00
|
|
|
static int inet6_rtm_getaddr(struct sk_buff *in_skb, struct nlmsghdr *nlh)
|
2006-07-28 17:12:12 +08:00
|
|
|
{
|
2008-03-26 01:26:21 +08:00
|
|
|
struct net *net = sock_net(in_skb->sk);
|
2006-09-18 15:10:50 +08:00
|
|
|
struct ifaddrmsg *ifm;
|
|
|
|
struct nlattr *tb[IFA_MAX+1];
|
2013-05-17 06:32:00 +08:00
|
|
|
struct in6_addr *addr = NULL, *peer;
|
2006-07-28 17:12:12 +08:00
|
|
|
struct net_device *dev = NULL;
|
|
|
|
struct inet6_ifaddr *ifa;
|
|
|
|
struct sk_buff *skb;
|
|
|
|
int err;
|
|
|
|
|
2006-09-18 15:10:50 +08:00
|
|
|
err = nlmsg_parse(nlh, sizeof(*ifm), tb, IFA_MAX, ifa_ipv6_policy);
|
|
|
|
if (err < 0)
|
|
|
|
goto errout;
|
|
|
|
|
2013-05-17 06:32:00 +08:00
|
|
|
addr = extract_addr(tb[IFA_ADDRESS], tb[IFA_LOCAL], &peer);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!addr) {
|
2006-09-18 15:10:50 +08:00
|
|
|
err = -EINVAL;
|
|
|
|
goto errout;
|
2006-07-28 17:12:12 +08:00
|
|
|
}
|
|
|
|
|
2006-09-18 15:10:50 +08:00
|
|
|
ifm = nlmsg_data(nlh);
|
2006-07-28 17:12:12 +08:00
|
|
|
if (ifm->ifa_index)
|
2008-03-06 02:47:47 +08:00
|
|
|
dev = __dev_get_by_index(net, ifm->ifa_index);
|
2006-07-28 17:12:12 +08:00
|
|
|
|
2010-03-21 07:09:01 +08:00
|
|
|
ifa = ipv6_get_ifaddr(net, addr, dev, 1);
|
|
|
|
if (!ifa) {
|
2006-09-18 15:10:50 +08:00
|
|
|
err = -EADDRNOTAVAIL;
|
|
|
|
goto errout;
|
|
|
|
}
|
2006-07-28 17:12:12 +08:00
|
|
|
|
2010-03-21 07:09:01 +08:00
|
|
|
skb = nlmsg_new(inet6_ifaddr_msgsize(), GFP_KERNEL);
|
|
|
|
if (!skb) {
|
2006-07-28 17:12:12 +08:00
|
|
|
err = -ENOBUFS;
|
2006-09-18 15:10:50 +08:00
|
|
|
goto errout_ifa;
|
2006-07-28 17:12:12 +08:00
|
|
|
}
|
|
|
|
|
2012-09-08 04:12:54 +08:00
|
|
|
err = inet6_fill_ifaddr(skb, ifa, NETLINK_CB(in_skb).portid,
|
2006-07-28 17:12:12 +08:00
|
|
|
nlh->nlmsg_seq, RTM_NEWADDR, 0);
|
2007-02-01 15:16:40 +08:00
|
|
|
if (err < 0) {
|
|
|
|
/* -EMSGSIZE implies BUG in inet6_ifaddr_msgsize() */
|
|
|
|
WARN_ON(err == -EMSGSIZE);
|
|
|
|
kfree_skb(skb);
|
|
|
|
goto errout_ifa;
|
|
|
|
}
|
2012-09-08 04:12:54 +08:00
|
|
|
err = rtnl_unicast(skb, net, NETLINK_CB(in_skb).portid);
|
2006-09-18 15:10:50 +08:00
|
|
|
errout_ifa:
|
2006-07-28 17:12:12 +08:00
|
|
|
in6_ifa_put(ifa);
|
2006-09-18 15:10:50 +08:00
|
|
|
errout:
|
2006-07-28 17:12:12 +08:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
static void inet6_ifa_notify(int event, struct inet6_ifaddr *ifa)
|
|
|
|
{
|
|
|
|
struct sk_buff *skb;
|
2008-03-25 20:47:49 +08:00
|
|
|
struct net *net = dev_net(ifa->idev->dev);
|
2006-08-15 15:35:02 +08:00
|
|
|
int err = -ENOBUFS;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2017-01-05 07:01:01 +08:00
|
|
|
/* Don't send DELADDR notification for TENTATIVE address,
|
|
|
|
* since NEWADDR notification is sent only after removing
|
|
|
|
* TENTATIVE flag.
|
|
|
|
*/
|
|
|
|
if (ifa->flags & IFA_F_TENTATIVE && event == RTM_DELADDR)
|
|
|
|
return;
|
|
|
|
|
2006-09-18 15:12:35 +08:00
|
|
|
skb = nlmsg_new(inet6_ifaddr_msgsize(), GFP_ATOMIC);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!skb)
|
2006-08-15 15:35:02 +08:00
|
|
|
goto errout;
|
|
|
|
|
|
|
|
err = inet6_fill_ifaddr(skb, ifa, 0, 0, event, 0);
|
2007-02-01 15:16:40 +08:00
|
|
|
if (err < 0) {
|
|
|
|
/* -EMSGSIZE implies BUG in inet6_ifaddr_msgsize() */
|
|
|
|
WARN_ON(err == -EMSGSIZE);
|
|
|
|
kfree_skb(skb);
|
|
|
|
goto errout;
|
|
|
|
}
|
2009-02-25 15:18:28 +08:00
|
|
|
rtnl_notify(skb, net, 0, RTNLGRP_IPV6_IFADDR, NULL, GFP_ATOMIC);
|
|
|
|
return;
|
2006-08-15 15:35:02 +08:00
|
|
|
errout:
|
|
|
|
if (err < 0)
|
2008-03-06 02:47:47 +08:00
|
|
|
rtnl_set_sk_err(net, RTNLGRP_IPV6_IFADDR, err);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2007-03-23 03:27:49 +08:00
|
|
|
static inline void ipv6_store_devconf(struct ipv6_devconf *cnf,
|
2005-04-17 06:20:36 +08:00
|
|
|
__s32 *array, int bytes)
|
|
|
|
{
|
2006-11-15 11:53:58 +08:00
|
|
|
BUG_ON(bytes < (DEVCONF_MAX * 4));
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
memset(array, 0, bytes);
|
|
|
|
array[DEVCONF_FORWARDING] = cnf->forwarding;
|
|
|
|
array[DEVCONF_HOPLIMIT] = cnf->hop_limit;
|
|
|
|
array[DEVCONF_MTU6] = cnf->mtu6;
|
|
|
|
array[DEVCONF_ACCEPT_RA] = cnf->accept_ra;
|
|
|
|
array[DEVCONF_ACCEPT_REDIRECTS] = cnf->accept_redirects;
|
|
|
|
array[DEVCONF_AUTOCONF] = cnf->autoconf;
|
|
|
|
array[DEVCONF_DAD_TRANSMITS] = cnf->dad_transmits;
|
|
|
|
array[DEVCONF_RTR_SOLICITS] = cnf->rtr_solicits;
|
2010-11-17 09:44:24 +08:00
|
|
|
array[DEVCONF_RTR_SOLICIT_INTERVAL] =
|
|
|
|
jiffies_to_msecs(cnf->rtr_solicit_interval);
|
2016-09-28 14:57:58 +08:00
|
|
|
array[DEVCONF_RTR_SOLICIT_MAX_INTERVAL] =
|
|
|
|
jiffies_to_msecs(cnf->rtr_solicit_max_interval);
|
2010-11-17 09:44:24 +08:00
|
|
|
array[DEVCONF_RTR_SOLICIT_DELAY] =
|
|
|
|
jiffies_to_msecs(cnf->rtr_solicit_delay);
|
2005-04-17 06:20:36 +08:00
|
|
|
array[DEVCONF_FORCE_MLD_VERSION] = cnf->force_mld_version;
|
2013-08-14 07:03:46 +08:00
|
|
|
array[DEVCONF_MLDV1_UNSOLICITED_REPORT_INTERVAL] =
|
|
|
|
jiffies_to_msecs(cnf->mldv1_unsolicited_report_interval);
|
|
|
|
array[DEVCONF_MLDV2_UNSOLICITED_REPORT_INTERVAL] =
|
|
|
|
jiffies_to_msecs(cnf->mldv2_unsolicited_report_interval);
|
2005-04-17 06:20:36 +08:00
|
|
|
array[DEVCONF_USE_TEMPADDR] = cnf->use_tempaddr;
|
|
|
|
array[DEVCONF_TEMP_VALID_LFT] = cnf->temp_valid_lft;
|
|
|
|
array[DEVCONF_TEMP_PREFERED_LFT] = cnf->temp_prefered_lft;
|
|
|
|
array[DEVCONF_REGEN_MAX_RETRY] = cnf->regen_max_retry;
|
|
|
|
array[DEVCONF_MAX_DESYNC_FACTOR] = cnf->max_desync_factor;
|
|
|
|
array[DEVCONF_MAX_ADDRESSES] = cnf->max_addresses;
|
2006-03-21 08:55:08 +08:00
|
|
|
array[DEVCONF_ACCEPT_RA_DEFRTR] = cnf->accept_ra_defrtr;
|
2015-07-30 14:28:42 +08:00
|
|
|
array[DEVCONF_ACCEPT_RA_MIN_HOP_LIMIT] = cnf->accept_ra_min_hop_limit;
|
2006-03-21 08:55:26 +08:00
|
|
|
array[DEVCONF_ACCEPT_RA_PINFO] = cnf->accept_ra_pinfo;
|
2006-03-21 09:05:30 +08:00
|
|
|
#ifdef CONFIG_IPV6_ROUTER_PREF
|
|
|
|
array[DEVCONF_ACCEPT_RA_RTR_PREF] = cnf->accept_ra_rtr_pref;
|
2010-11-17 09:44:24 +08:00
|
|
|
array[DEVCONF_RTR_PROBE_INTERVAL] =
|
|
|
|
jiffies_to_msecs(cnf->rtr_probe_interval);
|
2007-01-31 06:30:10 +08:00
|
|
|
#ifdef CONFIG_IPV6_ROUTE_INFO
|
2006-03-21 09:07:03 +08:00
|
|
|
array[DEVCONF_ACCEPT_RA_RT_INFO_MAX_PLEN] = cnf->accept_ra_rt_info_max_plen;
|
|
|
|
#endif
|
2006-03-21 09:05:30 +08:00
|
|
|
#endif
|
2006-09-23 05:43:49 +08:00
|
|
|
array[DEVCONF_PROXY_NDP] = cnf->proxy_ndp;
|
2007-04-25 05:58:30 +08:00
|
|
|
array[DEVCONF_ACCEPT_SOURCE_ROUTE] = cnf->accept_source_route;
|
2007-04-26 08:08:10 +08:00
|
|
|
#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
|
|
|
|
array[DEVCONF_OPTIMISTIC_DAD] = cnf->optimistic_dad;
|
net: ipv6: Add a sysctl to make optimistic addresses useful candidates
Add a sysctl that causes an interface's optimistic addresses
to be considered equivalent to other non-deprecated addresses
for source address selection purposes. Preferred addresses
will still take precedence over optimistic addresses, subject
to other ranking in the source address selection algorithm.
This is useful where different interfaces are connected to
different networks from different ISPs (e.g., a cell network
and a home wifi network).
The current behaviour complies with RFC 3484/6724, and it
makes sense if the host has only one interface, or has
multiple interfaces on the same network (same or cooperating
administrative domain(s), but not in the multiple distinct
networks case.
For example, if a mobile device has an IPv6 address on an LTE
network and then connects to IPv6-enabled wifi, while the wifi
IPv6 address is undergoing DAD, IPv6 connections will try use
the wifi default route with the LTE IPv6 address, and will get
stuck until they time out.
Also, because optimistic nodes can receive frames, issue
an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
flag appropriately set). A second RTM_NEWADDR is sent if DAD
completes (the address flags have changed), otherwise an
RTM_DELADDR is sent.
Also: add an entry in ip-sysctl.txt for optimistic_dad.
Signed-off-by: Erik Kline <ek@google.com>
Acked-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-28 17:11:14 +08:00
|
|
|
array[DEVCONF_USE_OPTIMISTIC] = cnf->use_optimistic;
|
2007-04-26 08:08:10 +08:00
|
|
|
#endif
|
2008-04-03 08:22:53 +08:00
|
|
|
#ifdef CONFIG_IPV6_MROUTE
|
|
|
|
array[DEVCONF_MC_FORWARDING] = cnf->mc_forwarding;
|
|
|
|
#endif
|
2008-06-28 13:17:11 +08:00
|
|
|
array[DEVCONF_DISABLE_IPV6] = cnf->disable_ipv6;
|
2008-06-28 13:18:38 +08:00
|
|
|
array[DEVCONF_ACCEPT_DAD] = cnf->accept_dad;
|
2009-10-09 11:11:14 +08:00
|
|
|
array[DEVCONF_FORCE_TLLAO] = cnf->force_tllao;
|
2012-11-07 00:46:20 +08:00
|
|
|
array[DEVCONF_NDISC_NOTIFY] = cnf->ndisc_notify;
|
2013-08-27 07:36:51 +08:00
|
|
|
array[DEVCONF_SUPPRESS_FRAG_NDISC] = cnf->suppress_frag_ndisc;
|
2014-06-26 05:44:53 +08:00
|
|
|
array[DEVCONF_ACCEPT_RA_FROM_LOCAL] = cnf->accept_ra_from_local;
|
2015-01-21 01:06:05 +08:00
|
|
|
array[DEVCONF_ACCEPT_RA_MTU] = cnf->accept_ra_mtu;
|
2015-08-13 22:39:01 +08:00
|
|
|
array[DEVCONF_IGNORE_ROUTES_WITH_LINKDOWN] = cnf->ignore_routes_with_linkdown;
|
2015-03-24 06:36:00 +08:00
|
|
|
/* we omit DEVCONF_STABLE_SECRET for now */
|
2015-07-22 15:38:25 +08:00
|
|
|
array[DEVCONF_USE_OIF_ADDRS_ONLY] = cnf->use_oif_addrs_only;
|
2016-02-04 20:31:19 +08:00
|
|
|
array[DEVCONF_DROP_UNICAST_IN_L2_MULTICAST] = cnf->drop_unicast_in_l2_multicast;
|
2016-02-04 20:31:20 +08:00
|
|
|
array[DEVCONF_DROP_UNSOLICITED_NA] = cnf->drop_unsolicited_na;
|
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-25 01:25:37 +08:00
|
|
|
array[DEVCONF_KEEP_ADDR_ON_DOWN] = cnf->keep_addr_on_down;
|
2016-11-08 21:57:39 +08:00
|
|
|
array[DEVCONF_SEG6_ENABLED] = cnf->seg6_enabled;
|
2016-11-08 21:57:42 +08:00
|
|
|
#ifdef CONFIG_IPV6_SEG6_HMAC
|
|
|
|
array[DEVCONF_SEG6_REQUIRE_HMAC] = cnf->seg6_require_hmac;
|
|
|
|
#endif
|
2016-12-03 06:00:08 +08:00
|
|
|
array[DEVCONF_ENHANCED_DAD] = cnf->enhanced_dad;
|
2017-01-26 11:59:17 +08:00
|
|
|
array[DEVCONF_ADDR_GEN_MODE] = cnf->addr_gen_mode;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2010-11-16 12:33:57 +08:00
|
|
|
static inline size_t inet6_ifla6_size(void)
|
|
|
|
{
|
|
|
|
return nla_total_size(4) /* IFLA_INET6_FLAGS */
|
|
|
|
+ nla_total_size(sizeof(struct ifla_cacheinfo))
|
|
|
|
+ nla_total_size(DEVCONF_MAX * 4) /* IFLA_INET6_CONF */
|
|
|
|
+ nla_total_size(IPSTATS_MIB_MAX * 8) /* IFLA_INET6_STATS */
|
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 12:01:30 +08:00
|
|
|
+ nla_total_size(ICMP6_MIB_MAX * 8) /* IFLA_INET6_ICMP6STATS */
|
|
|
|
+ nla_total_size(sizeof(struct in6_addr)); /* IFLA_INET6_TOKEN */
|
2010-11-16 12:33:57 +08:00
|
|
|
}
|
|
|
|
|
2006-11-11 06:10:15 +08:00
|
|
|
static inline size_t inet6_if_nlmsg_size(void)
|
|
|
|
{
|
|
|
|
return NLMSG_ALIGN(sizeof(struct ifinfomsg))
|
|
|
|
+ nla_total_size(IFNAMSIZ) /* IFLA_IFNAME */
|
|
|
|
+ nla_total_size(MAX_ADDR_LEN) /* IFLA_ADDRESS */
|
|
|
|
+ nla_total_size(4) /* IFLA_MTU */
|
|
|
|
+ nla_total_size(4) /* IFLA_LINK */
|
2015-08-14 03:26:35 +08:00
|
|
|
+ nla_total_size(1) /* IFLA_OPERSTATE */
|
2010-11-16 12:33:57 +08:00
|
|
|
+ nla_total_size(inet6_ifla6_size()); /* IFLA_PROTINFO */
|
2006-11-11 06:10:15 +08:00
|
|
|
}
|
2006-06-18 13:48:48 +08:00
|
|
|
|
2011-05-19 09:14:23 +08:00
|
|
|
static inline void __snmp6_fill_statsdev(u64 *stats, atomic_long_t *mib,
|
2016-09-30 11:29:03 +08:00
|
|
|
int bytes)
|
2007-04-25 12:54:09 +08:00
|
|
|
{
|
|
|
|
int i;
|
2016-09-30 11:29:03 +08:00
|
|
|
int pad = bytes - sizeof(u64) * ICMP6_MIB_MAX;
|
2007-04-25 12:54:09 +08:00
|
|
|
BUG_ON(pad < 0);
|
|
|
|
|
|
|
|
/* Use put_unaligned() because stats may not be aligned for u64. */
|
2016-09-30 11:29:03 +08:00
|
|
|
put_unaligned(ICMP6_MIB_MAX, &stats[0]);
|
|
|
|
for (i = 1; i < ICMP6_MIB_MAX; i++)
|
2011-05-19 09:14:23 +08:00
|
|
|
put_unaligned(atomic_long_read(&mib[i]), &stats[i]);
|
2007-04-25 12:54:09 +08:00
|
|
|
|
2016-09-30 11:29:03 +08:00
|
|
|
memset(&stats[ICMP6_MIB_MAX], 0, pad);
|
2007-04-25 12:54:09 +08:00
|
|
|
}
|
|
|
|
|
2014-05-06 06:55:55 +08:00
|
|
|
static inline void __snmp6_fill_stats64(u64 *stats, void __percpu *mib,
|
2015-08-30 13:59:42 +08:00
|
|
|
int bytes, size_t syncpoff)
|
2010-07-01 04:31:19 +08:00
|
|
|
{
|
2015-08-30 13:59:42 +08:00
|
|
|
int i, c;
|
|
|
|
u64 buff[IPSTATS_MIB_MAX];
|
|
|
|
int pad = bytes - sizeof(u64) * IPSTATS_MIB_MAX;
|
|
|
|
|
2010-07-01 04:31:19 +08:00
|
|
|
BUG_ON(pad < 0);
|
|
|
|
|
2015-08-30 13:59:42 +08:00
|
|
|
memset(buff, 0, sizeof(buff));
|
|
|
|
buff[0] = IPSTATS_MIB_MAX;
|
2010-07-01 04:31:19 +08:00
|
|
|
|
2015-08-30 13:59:42 +08:00
|
|
|
for_each_possible_cpu(c) {
|
|
|
|
for (i = 1; i < IPSTATS_MIB_MAX; i++)
|
|
|
|
buff[i] += snmp_get_cpu_field64(mib, c, i, syncpoff);
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(stats, buff, IPSTATS_MIB_MAX * sizeof(u64));
|
|
|
|
memset(&stats[IPSTATS_MIB_MAX], 0, pad);
|
2010-07-01 04:31:19 +08:00
|
|
|
}
|
|
|
|
|
2007-04-25 12:54:09 +08:00
|
|
|
static void snmp6_fill_stats(u64 *stats, struct inet6_dev *idev, int attrtype,
|
|
|
|
int bytes)
|
|
|
|
{
|
2010-03-21 07:09:01 +08:00
|
|
|
switch (attrtype) {
|
2007-04-25 12:54:09 +08:00
|
|
|
case IFLA_INET6_STATS:
|
2015-08-30 13:59:42 +08:00
|
|
|
__snmp6_fill_stats64(stats, idev->stats.ipv6, bytes,
|
|
|
|
offsetof(struct ipstats_mib, syncp));
|
2007-04-25 12:54:09 +08:00
|
|
|
break;
|
|
|
|
case IFLA_INET6_ICMP6STATS:
|
2016-09-30 11:29:03 +08:00
|
|
|
__snmp6_fill_statsdev(stats, idev->stats.icmpv6dev->mibs, bytes);
|
2007-04-25 12:54:09 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-12 04:48:48 +08:00
|
|
|
static int inet6_fill_ifla6_attrs(struct sk_buff *skb, struct inet6_dev *idev,
|
|
|
|
u32 ext_filter_mask)
|
2010-11-16 12:33:57 +08:00
|
|
|
{
|
|
|
|
struct nlattr *nla;
|
|
|
|
struct ifla_cacheinfo ci;
|
|
|
|
|
2012-04-02 08:27:33 +08:00
|
|
|
if (nla_put_u32(skb, IFLA_INET6_FLAGS, idev->if_flags))
|
|
|
|
goto nla_put_failure;
|
2010-11-16 12:33:57 +08:00
|
|
|
ci.max_reasm_len = IPV6_MAXPLEN;
|
2010-11-20 05:13:47 +08:00
|
|
|
ci.tstamp = cstamp_delta(idev->tstamp);
|
|
|
|
ci.reachable_time = jiffies_to_msecs(idev->nd_parms->reachable_time);
|
2013-12-08 02:26:53 +08:00
|
|
|
ci.retrans_time = jiffies_to_msecs(NEIGH_VAR(idev->nd_parms, RETRANS_TIME));
|
2012-04-02 08:27:33 +08:00
|
|
|
if (nla_put(skb, IFLA_INET6_CACHEINFO, sizeof(ci), &ci))
|
|
|
|
goto nla_put_failure;
|
2010-11-16 12:33:57 +08:00
|
|
|
nla = nla_reserve(skb, IFLA_INET6_CONF, DEVCONF_MAX * sizeof(s32));
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!nla)
|
2010-11-16 12:33:57 +08:00
|
|
|
goto nla_put_failure;
|
|
|
|
ipv6_store_devconf(&idev->cnf, nla_data(nla), nla_len(nla));
|
|
|
|
|
|
|
|
/* XXX - MC not implemented */
|
|
|
|
|
2015-09-12 04:48:48 +08:00
|
|
|
if (ext_filter_mask & RTEXT_FILTER_SKIP_STATS)
|
|
|
|
return 0;
|
|
|
|
|
2010-11-16 12:33:57 +08:00
|
|
|
nla = nla_reserve(skb, IFLA_INET6_STATS, IPSTATS_MIB_MAX * sizeof(u64));
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!nla)
|
2010-11-16 12:33:57 +08:00
|
|
|
goto nla_put_failure;
|
|
|
|
snmp6_fill_stats(nla_data(nla), idev, IFLA_INET6_STATS, nla_len(nla));
|
|
|
|
|
|
|
|
nla = nla_reserve(skb, IFLA_INET6_ICMP6STATS, ICMP6_MIB_MAX * sizeof(u64));
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!nla)
|
2010-11-16 12:33:57 +08:00
|
|
|
goto nla_put_failure;
|
|
|
|
snmp6_fill_stats(nla_data(nla), idev, IFLA_INET6_ICMP6STATS, nla_len(nla));
|
|
|
|
|
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 12:01:30 +08:00
|
|
|
nla = nla_reserve(skb, IFLA_INET6_TOKEN, sizeof(struct in6_addr));
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!nla)
|
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 12:01:30 +08:00
|
|
|
goto nla_put_failure;
|
2014-07-12 03:10:18 +08:00
|
|
|
|
2017-01-26 11:59:17 +08:00
|
|
|
if (nla_put_u8(skb, IFLA_INET6_ADDR_GEN_MODE, idev->cnf.addr_gen_mode))
|
2014-07-12 03:10:18 +08:00
|
|
|
goto nla_put_failure;
|
|
|
|
|
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 12:01:30 +08:00
|
|
|
read_lock_bh(&idev->lock);
|
|
|
|
memcpy(nla_data(nla), idev->token.s6_addr, nla_len(nla));
|
|
|
|
read_unlock_bh(&idev->lock);
|
|
|
|
|
2010-11-16 12:33:57 +08:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
return -EMSGSIZE;
|
|
|
|
}
|
|
|
|
|
2015-10-20 00:23:28 +08:00
|
|
|
static size_t inet6_get_link_af_size(const struct net_device *dev,
|
|
|
|
u32 ext_filter_mask)
|
2010-11-16 12:33:57 +08:00
|
|
|
{
|
|
|
|
if (!__in6_dev_get(dev))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return inet6_ifla6_size();
|
|
|
|
}
|
|
|
|
|
2015-09-12 04:48:48 +08:00
|
|
|
static int inet6_fill_link_af(struct sk_buff *skb, const struct net_device *dev,
|
|
|
|
u32 ext_filter_mask)
|
2010-11-16 12:33:57 +08:00
|
|
|
{
|
|
|
|
struct inet6_dev *idev = __in6_dev_get(dev);
|
|
|
|
|
|
|
|
if (!idev)
|
|
|
|
return -ENODATA;
|
|
|
|
|
2015-09-12 04:48:48 +08:00
|
|
|
if (inet6_fill_ifla6_attrs(skb, idev, ext_filter_mask) < 0)
|
2010-11-16 12:33:57 +08:00
|
|
|
return -EMSGSIZE;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 12:01:30 +08:00
|
|
|
static int inet6_set_iftoken(struct inet6_dev *idev, struct in6_addr *token)
|
|
|
|
{
|
|
|
|
struct inet6_ifaddr *ifp;
|
|
|
|
struct net_device *dev = idev->dev;
|
2016-04-08 21:55:00 +08:00
|
|
|
bool clear_token, update_rs = false;
|
2013-06-25 03:42:40 +08:00
|
|
|
struct in6_addr ll_addr;
|
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 12:01:30 +08:00
|
|
|
|
2014-03-28 01:28:07 +08:00
|
|
|
ASSERT_RTNL();
|
|
|
|
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!token)
|
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 12:01:30 +08:00
|
|
|
return -EINVAL;
|
|
|
|
if (dev->flags & (IFF_LOOPBACK | IFF_NOARP))
|
|
|
|
return -EINVAL;
|
|
|
|
if (!ipv6_accept_ra(idev))
|
|
|
|
return -EINVAL;
|
2016-09-28 14:57:58 +08:00
|
|
|
if (idev->cnf.rtr_solicits == 0)
|
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 12:01:30 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
write_lock_bh(&idev->lock);
|
|
|
|
|
|
|
|
BUILD_BUG_ON(sizeof(token->s6_addr) != 16);
|
|
|
|
memcpy(idev->token.s6_addr + 8, token->s6_addr + 8, 8);
|
|
|
|
|
|
|
|
write_unlock_bh(&idev->lock);
|
|
|
|
|
2016-04-08 21:55:00 +08:00
|
|
|
clear_token = ipv6_addr_any(token);
|
|
|
|
if (clear_token)
|
|
|
|
goto update_lft;
|
|
|
|
|
2013-06-25 03:42:40 +08:00
|
|
|
if (!idev->dead && (idev->if_flags & IF_READY) &&
|
|
|
|
!ipv6_get_lladdr(dev, &ll_addr, IFA_F_TENTATIVE |
|
|
|
|
IFA_F_OPTIMISTIC)) {
|
2013-04-09 11:47:15 +08:00
|
|
|
/* If we're not ready, then normal ifup will take care
|
|
|
|
* of this. Otherwise, we need to request our rs here.
|
|
|
|
*/
|
|
|
|
ndisc_send_rs(dev, &ll_addr, &in6addr_linklocal_allrouters);
|
|
|
|
update_rs = true;
|
|
|
|
}
|
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 12:01:30 +08:00
|
|
|
|
2016-04-08 21:55:00 +08:00
|
|
|
update_lft:
|
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 12:01:30 +08:00
|
|
|
write_lock_bh(&idev->lock);
|
2013-04-09 11:47:15 +08:00
|
|
|
|
2013-06-26 09:41:49 +08:00
|
|
|
if (update_rs) {
|
2013-04-09 11:47:15 +08:00
|
|
|
idev->if_flags |= IF_RS_SENT;
|
2016-09-28 14:57:58 +08:00
|
|
|
idev->rs_interval = rfc3315_s14_backoff_init(
|
|
|
|
idev->cnf.rtr_solicit_interval);
|
2013-06-26 09:41:49 +08:00
|
|
|
idev->rs_probes = 1;
|
2016-09-28 14:57:58 +08:00
|
|
|
addrconf_mod_rs_timer(idev, idev->rs_interval);
|
2013-06-26 09:41:49 +08:00
|
|
|
}
|
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 12:01:30 +08:00
|
|
|
|
|
|
|
/* Well, that's kinda nasty ... */
|
|
|
|
list_for_each_entry(ifp, &idev->addr_list, if_list) {
|
|
|
|
spin_lock(&ifp->lock);
|
2013-04-09 11:47:16 +08:00
|
|
|
if (ifp->tokenized) {
|
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 12:01:30 +08:00
|
|
|
ifp->valid_lft = 0;
|
|
|
|
ifp->prefered_lft = 0;
|
|
|
|
}
|
|
|
|
spin_unlock(&ifp->lock);
|
|
|
|
}
|
|
|
|
|
|
|
|
write_unlock_bh(&idev->lock);
|
2014-10-28 00:39:16 +08:00
|
|
|
inet6_ifinfo_notify(RTM_NEWLINK, idev);
|
2014-03-28 01:28:07 +08:00
|
|
|
addrconf_verify_rtnl();
|
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 12:01:30 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-02-05 21:39:11 +08:00
|
|
|
static const struct nla_policy inet6_af_policy[IFLA_INET6_MAX + 1] = {
|
|
|
|
[IFLA_INET6_ADDR_GEN_MODE] = { .type = NLA_U8 },
|
|
|
|
[IFLA_INET6_TOKEN] = { .len = sizeof(struct in6_addr) },
|
|
|
|
};
|
|
|
|
|
|
|
|
static int inet6_validate_link_af(const struct net_device *dev,
|
|
|
|
const struct nlattr *nla)
|
|
|
|
{
|
|
|
|
struct nlattr *tb[IFLA_INET6_MAX + 1];
|
|
|
|
|
|
|
|
if (dev && !__in6_dev_get(dev))
|
|
|
|
return -EAFNOSUPPORT;
|
|
|
|
|
|
|
|
return nla_parse_nested(tb, IFLA_INET6_MAX, nla, inet6_af_policy);
|
|
|
|
}
|
|
|
|
|
2017-01-26 11:59:17 +08:00
|
|
|
static int check_addr_gen_mode(int mode)
|
|
|
|
{
|
|
|
|
if (mode != IN6_ADDR_GEN_MODE_EUI64 &&
|
|
|
|
mode != IN6_ADDR_GEN_MODE_NONE &&
|
|
|
|
mode != IN6_ADDR_GEN_MODE_STABLE_PRIVACY &&
|
|
|
|
mode != IN6_ADDR_GEN_MODE_RANDOM)
|
|
|
|
return -EINVAL;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int check_stable_privacy(struct inet6_dev *idev, struct net *net,
|
|
|
|
int mode)
|
|
|
|
{
|
|
|
|
if (mode == IN6_ADDR_GEN_MODE_STABLE_PRIVACY &&
|
|
|
|
!idev->cnf.stable_secret.initialized &&
|
|
|
|
!net->ipv6.devconf_dflt->stable_secret.initialized)
|
|
|
|
return -EINVAL;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 12:01:30 +08:00
|
|
|
static int inet6_set_link_af(struct net_device *dev, const struct nlattr *nla)
|
|
|
|
{
|
|
|
|
int err = -EINVAL;
|
|
|
|
struct inet6_dev *idev = __in6_dev_get(dev);
|
|
|
|
struct nlattr *tb[IFLA_INET6_MAX + 1];
|
|
|
|
|
|
|
|
if (!idev)
|
|
|
|
return -EAFNOSUPPORT;
|
|
|
|
|
|
|
|
if (nla_parse_nested(tb, IFLA_INET6_MAX, nla, NULL) < 0)
|
|
|
|
BUG();
|
|
|
|
|
2014-07-12 03:10:18 +08:00
|
|
|
if (tb[IFLA_INET6_TOKEN]) {
|
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 12:01:30 +08:00
|
|
|
err = inet6_set_iftoken(idev, nla_data(tb[IFLA_INET6_TOKEN]));
|
2014-07-12 03:10:18 +08:00
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (tb[IFLA_INET6_ADDR_GEN_MODE]) {
|
|
|
|
u8 mode = nla_get_u8(tb[IFLA_INET6_ADDR_GEN_MODE]);
|
|
|
|
|
2017-01-26 11:59:17 +08:00
|
|
|
if (check_addr_gen_mode(mode) < 0 ||
|
|
|
|
check_stable_privacy(idev, dev_net(dev), mode) < 0)
|
2014-07-12 03:10:18 +08:00
|
|
|
return -EINVAL;
|
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 06:36:01 +08:00
|
|
|
|
2017-01-26 11:59:17 +08:00
|
|
|
idev->cnf.addr_gen_mode = mode;
|
2014-07-12 03:10:18 +08:00
|
|
|
err = 0;
|
|
|
|
}
|
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 12:01:30 +08:00
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2007-02-09 22:24:49 +08:00
|
|
|
static int inet6_fill_ifinfo(struct sk_buff *skb, struct inet6_dev *idev,
|
2012-09-08 04:12:54 +08:00
|
|
|
u32 portid, u32 seq, int event, unsigned int flags)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2006-11-15 11:53:58 +08:00
|
|
|
struct net_device *dev = idev->dev;
|
|
|
|
struct ifinfomsg *hdr;
|
|
|
|
struct nlmsghdr *nlh;
|
|
|
|
void *protoinfo;
|
|
|
|
|
2012-09-08 04:12:54 +08:00
|
|
|
nlh = nlmsg_put(skb, portid, seq, event, sizeof(*hdr), flags);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!nlh)
|
2007-02-01 15:16:40 +08:00
|
|
|
return -EMSGSIZE;
|
2006-11-15 11:53:58 +08:00
|
|
|
|
|
|
|
hdr = nlmsg_data(nlh);
|
|
|
|
hdr->ifi_family = AF_INET6;
|
|
|
|
hdr->__ifi_pad = 0;
|
|
|
|
hdr->ifi_type = dev->type;
|
|
|
|
hdr->ifi_index = dev->ifindex;
|
|
|
|
hdr->ifi_flags = dev_get_flags(dev);
|
|
|
|
hdr->ifi_change = 0;
|
|
|
|
|
2012-04-02 08:27:33 +08:00
|
|
|
if (nla_put_string(skb, IFLA_IFNAME, dev->name) ||
|
|
|
|
(dev->addr_len &&
|
|
|
|
nla_put(skb, IFLA_ADDRESS, dev->addr_len, dev->dev_addr)) ||
|
|
|
|
nla_put_u32(skb, IFLA_MTU, dev->mtu) ||
|
2015-04-02 23:07:00 +08:00
|
|
|
(dev->ifindex != dev_get_iflink(dev) &&
|
2015-08-14 03:26:35 +08:00
|
|
|
nla_put_u32(skb, IFLA_LINK, dev_get_iflink(dev))) ||
|
|
|
|
nla_put_u8(skb, IFLA_OPERSTATE,
|
|
|
|
netif_running(dev) ? dev->operstate : IF_OPER_DOWN))
|
2012-04-02 08:27:33 +08:00
|
|
|
goto nla_put_failure;
|
2006-11-15 11:53:58 +08:00
|
|
|
protoinfo = nla_nest_start(skb, IFLA_PROTINFO);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!protoinfo)
|
2006-11-15 11:53:58 +08:00
|
|
|
goto nla_put_failure;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2015-09-12 04:48:48 +08:00
|
|
|
if (inet6_fill_ifla6_attrs(skb, idev, 0) < 0)
|
2007-04-21 06:56:20 +08:00
|
|
|
goto nla_put_failure;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2006-11-15 11:53:58 +08:00
|
|
|
nla_nest_end(skb, protoinfo);
|
2015-01-17 05:09:00 +08:00
|
|
|
nlmsg_end(skb, nlh);
|
|
|
|
return 0;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2006-11-15 11:53:58 +08:00
|
|
|
nla_put_failure:
|
2007-02-01 15:16:40 +08:00
|
|
|
nlmsg_cancel(skb, nlh);
|
|
|
|
return -EMSGSIZE;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int inet6_dump_ifinfo(struct sk_buff *skb, struct netlink_callback *cb)
|
|
|
|
{
|
2008-03-26 01:26:21 +08:00
|
|
|
struct net *net = sock_net(skb->sk);
|
2009-11-09 20:11:28 +08:00
|
|
|
int h, s_h;
|
2009-11-12 10:53:00 +08:00
|
|
|
int idx = 0, s_idx;
|
2005-04-17 06:20:36 +08:00
|
|
|
struct net_device *dev;
|
|
|
|
struct inet6_dev *idev;
|
2009-11-09 20:11:28 +08:00
|
|
|
struct hlist_head *head;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2009-11-09 20:11:28 +08:00
|
|
|
s_h = cb->args[0];
|
|
|
|
s_idx = cb->args[1];
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
for (h = s_h; h < NETDEV_HASHENTRIES; h++, s_idx = 0) {
|
|
|
|
idx = 0;
|
|
|
|
head = &net->dev_index_head[h];
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_rcu(dev, head, index_hlist) {
|
2009-11-09 20:11:28 +08:00
|
|
|
if (idx < s_idx)
|
|
|
|
goto cont;
|
|
|
|
idev = __in6_dev_get(dev);
|
|
|
|
if (!idev)
|
|
|
|
goto cont;
|
|
|
|
if (inet6_fill_ifinfo(skb, idev,
|
2012-09-08 04:12:54 +08:00
|
|
|
NETLINK_CB(cb->skb).portid,
|
2009-11-09 20:11:28 +08:00
|
|
|
cb->nlh->nlmsg_seq,
|
2015-01-17 05:09:00 +08:00
|
|
|
RTM_NEWLINK, NLM_F_MULTI) < 0)
|
2009-11-09 20:11:28 +08:00
|
|
|
goto out;
|
2007-05-04 06:13:45 +08:00
|
|
|
cont:
|
2009-11-09 20:11:28 +08:00
|
|
|
idx++;
|
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2009-11-09 20:11:28 +08:00
|
|
|
out:
|
|
|
|
rcu_read_unlock();
|
|
|
|
cb->args[1] = idx;
|
|
|
|
cb->args[0] = h;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
return skb->len;
|
|
|
|
}
|
|
|
|
|
|
|
|
void inet6_ifinfo_notify(int event, struct inet6_dev *idev)
|
|
|
|
{
|
|
|
|
struct sk_buff *skb;
|
2008-03-25 20:47:49 +08:00
|
|
|
struct net *net = dev_net(idev->dev);
|
2006-08-15 15:35:47 +08:00
|
|
|
int err = -ENOBUFS;
|
2007-02-09 22:24:49 +08:00
|
|
|
|
2006-11-11 06:10:15 +08:00
|
|
|
skb = nlmsg_new(inet6_if_nlmsg_size(), GFP_ATOMIC);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!skb)
|
2006-08-15 15:35:47 +08:00
|
|
|
goto errout;
|
|
|
|
|
|
|
|
err = inet6_fill_ifinfo(skb, idev, 0, 0, event, 0);
|
2007-02-01 15:16:40 +08:00
|
|
|
if (err < 0) {
|
|
|
|
/* -EMSGSIZE implies BUG in inet6_if_nlmsg_size() */
|
|
|
|
WARN_ON(err == -EMSGSIZE);
|
|
|
|
kfree_skb(skb);
|
|
|
|
goto errout;
|
|
|
|
}
|
2010-12-08 07:38:31 +08:00
|
|
|
rtnl_notify(skb, net, 0, RTNLGRP_IPV6_IFINFO, NULL, GFP_ATOMIC);
|
2009-02-25 15:18:28 +08:00
|
|
|
return;
|
2006-08-15 15:35:47 +08:00
|
|
|
errout:
|
|
|
|
if (err < 0)
|
2010-12-08 07:38:31 +08:00
|
|
|
rtnl_set_sk_err(net, RTNLGRP_IPV6_IFINFO, err);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2006-11-11 06:10:15 +08:00
|
|
|
static inline size_t inet6_prefix_nlmsg_size(void)
|
|
|
|
{
|
|
|
|
return NLMSG_ALIGN(sizeof(struct prefixmsg))
|
|
|
|
+ nla_total_size(sizeof(struct in6_addr))
|
|
|
|
+ nla_total_size(sizeof(struct prefix_cacheinfo));
|
|
|
|
}
|
2006-06-18 13:48:48 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
static int inet6_fill_prefix(struct sk_buff *skb, struct inet6_dev *idev,
|
2012-09-08 04:12:54 +08:00
|
|
|
struct prefix_info *pinfo, u32 portid, u32 seq,
|
2006-11-15 11:54:19 +08:00
|
|
|
int event, unsigned int flags)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2006-11-15 11:54:19 +08:00
|
|
|
struct prefixmsg *pmsg;
|
|
|
|
struct nlmsghdr *nlh;
|
2005-04-17 06:20:36 +08:00
|
|
|
struct prefix_cacheinfo ci;
|
|
|
|
|
2012-09-08 04:12:54 +08:00
|
|
|
nlh = nlmsg_put(skb, portid, seq, event, sizeof(*pmsg), flags);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!nlh)
|
2007-02-01 15:16:40 +08:00
|
|
|
return -EMSGSIZE;
|
2006-11-15 11:54:19 +08:00
|
|
|
|
|
|
|
pmsg = nlmsg_data(nlh);
|
2005-04-17 06:20:36 +08:00
|
|
|
pmsg->prefix_family = AF_INET6;
|
2005-06-29 03:56:45 +08:00
|
|
|
pmsg->prefix_pad1 = 0;
|
|
|
|
pmsg->prefix_pad2 = 0;
|
2005-04-17 06:20:36 +08:00
|
|
|
pmsg->prefix_ifindex = idev->dev->ifindex;
|
|
|
|
pmsg->prefix_len = pinfo->prefix_len;
|
|
|
|
pmsg->prefix_type = pinfo->type;
|
2005-06-29 03:56:45 +08:00
|
|
|
pmsg->prefix_pad3 = 0;
|
2005-04-17 06:20:36 +08:00
|
|
|
pmsg->prefix_flags = 0;
|
|
|
|
if (pinfo->onlink)
|
|
|
|
pmsg->prefix_flags |= IF_PREFIX_ONLINK;
|
|
|
|
if (pinfo->autoconf)
|
|
|
|
pmsg->prefix_flags |= IF_PREFIX_AUTOCONF;
|
|
|
|
|
2012-04-02 08:27:33 +08:00
|
|
|
if (nla_put(skb, PREFIX_ADDRESS, sizeof(pinfo->prefix), &pinfo->prefix))
|
|
|
|
goto nla_put_failure;
|
2005-04-17 06:20:36 +08:00
|
|
|
ci.preferred_time = ntohl(pinfo->prefered);
|
|
|
|
ci.valid_time = ntohl(pinfo->valid);
|
2012-04-02 08:27:33 +08:00
|
|
|
if (nla_put(skb, PREFIX_CACHEINFO, sizeof(ci), &ci))
|
|
|
|
goto nla_put_failure;
|
2015-01-17 05:09:00 +08:00
|
|
|
nlmsg_end(skb, nlh);
|
|
|
|
return 0;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2006-11-15 11:54:19 +08:00
|
|
|
nla_put_failure:
|
2007-02-01 15:16:40 +08:00
|
|
|
nlmsg_cancel(skb, nlh);
|
|
|
|
return -EMSGSIZE;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2007-02-09 22:24:49 +08:00
|
|
|
static void inet6_prefix_notify(int event, struct inet6_dev *idev,
|
2005-04-17 06:20:36 +08:00
|
|
|
struct prefix_info *pinfo)
|
|
|
|
{
|
|
|
|
struct sk_buff *skb;
|
2008-03-25 20:47:49 +08:00
|
|
|
struct net *net = dev_net(idev->dev);
|
2006-08-15 15:36:07 +08:00
|
|
|
int err = -ENOBUFS;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2006-11-11 06:10:15 +08:00
|
|
|
skb = nlmsg_new(inet6_prefix_nlmsg_size(), GFP_ATOMIC);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!skb)
|
2006-08-15 15:36:07 +08:00
|
|
|
goto errout;
|
|
|
|
|
|
|
|
err = inet6_fill_prefix(skb, idev, pinfo, 0, 0, event, 0);
|
2007-02-01 15:16:40 +08:00
|
|
|
if (err < 0) {
|
|
|
|
/* -EMSGSIZE implies BUG in inet6_prefix_nlmsg_size() */
|
|
|
|
WARN_ON(err == -EMSGSIZE);
|
|
|
|
kfree_skb(skb);
|
|
|
|
goto errout;
|
|
|
|
}
|
2009-02-25 15:18:28 +08:00
|
|
|
rtnl_notify(skb, net, 0, RTNLGRP_IPV6_PREFIX, NULL, GFP_ATOMIC);
|
|
|
|
return;
|
2006-08-15 15:36:07 +08:00
|
|
|
errout:
|
|
|
|
if (err < 0)
|
2008-03-06 02:47:47 +08:00
|
|
|
rtnl_set_sk_err(net, RTNLGRP_IPV6_PREFIX, err);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void __ipv6_ifa_notify(int event, struct inet6_ifaddr *ifp)
|
|
|
|
{
|
2013-03-22 14:28:43 +08:00
|
|
|
struct net *net = dev_net(ifp->idev->dev);
|
|
|
|
|
2014-03-28 01:28:07 +08:00
|
|
|
if (event)
|
|
|
|
ASSERT_RTNL();
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
inet6_ifa_notify(event ? : RTM_NEWADDR, ifp);
|
|
|
|
|
|
|
|
switch (event) {
|
|
|
|
case RTM_NEWADDR:
|
2007-04-26 08:08:10 +08:00
|
|
|
/*
|
|
|
|
* If the address was optimistic
|
|
|
|
* we inserted the route at the start of
|
|
|
|
* our DAD process, so we don't need
|
|
|
|
* to do it again
|
|
|
|
*/
|
|
|
|
if (!(ifp->rt->rt6i_node))
|
|
|
|
ip6_ins_rt(ifp->rt);
|
2005-04-17 06:20:36 +08:00
|
|
|
if (ifp->idev->cnf.forwarding)
|
|
|
|
addrconf_join_anycast(ifp);
|
2013-05-22 13:41:06 +08:00
|
|
|
if (!ipv6_addr_any(&ifp->peer_addr))
|
2013-05-17 06:32:00 +08:00
|
|
|
addrconf_prefix_route(&ifp->peer_addr, 128,
|
|
|
|
ifp->idev->dev, 0, 0);
|
2005-04-17 06:20:36 +08:00
|
|
|
break;
|
|
|
|
case RTM_DELADDR:
|
|
|
|
if (ifp->idev->cnf.forwarding)
|
|
|
|
addrconf_leave_anycast(ifp);
|
|
|
|
addrconf_leave_solict(ifp->idev, &ifp->addr);
|
2013-05-22 13:41:06 +08:00
|
|
|
if (!ipv6_addr_any(&ifp->peer_addr)) {
|
2013-05-17 06:32:00 +08:00
|
|
|
struct rt6_info *rt;
|
|
|
|
|
2014-09-04 05:59:22 +08:00
|
|
|
rt = addrconf_get_prefix_route(&ifp->peer_addr, 128,
|
|
|
|
ifp->idev->dev, 0, 0);
|
2015-09-16 05:30:08 +08:00
|
|
|
if (rt)
|
|
|
|
ip6_del_rt(rt);
|
2013-05-17 06:32:00 +08:00
|
|
|
}
|
2016-04-22 11:56:12 +08:00
|
|
|
if (ifp->rt) {
|
|
|
|
dst_hold(&ifp->rt->dst);
|
|
|
|
ip6_del_rt(ifp->rt);
|
|
|
|
}
|
2014-09-28 06:46:06 +08:00
|
|
|
rt_genid_bump_ipv6(net);
|
2005-04-17 06:20:36 +08:00
|
|
|
break;
|
|
|
|
}
|
2013-03-22 14:28:43 +08:00
|
|
|
atomic_inc(&net->ipv6.dev_addr_genid);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void ipv6_ifa_notify(int event, struct inet6_ifaddr *ifp)
|
|
|
|
{
|
2006-09-23 05:44:24 +08:00
|
|
|
rcu_read_lock_bh();
|
2005-04-17 06:20:36 +08:00
|
|
|
if (likely(ifp->idev->dead == 0))
|
|
|
|
__ipv6_ifa_notify(event, ifp);
|
2006-09-23 05:44:24 +08:00
|
|
|
rcu_read_unlock_bh();
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef CONFIG_SYSCTL
|
|
|
|
|
|
|
|
static
|
2013-06-12 14:04:25 +08:00
|
|
|
int addrconf_sysctl_forward(struct ctl_table *ctl, int write,
|
2005-04-17 06:20:36 +08:00
|
|
|
void __user *buffer, size_t *lenp, loff_t *ppos)
|
|
|
|
{
|
|
|
|
int *valp = ctl->data;
|
|
|
|
int val = *valp;
|
2010-02-19 21:22:59 +08:00
|
|
|
loff_t pos = *ppos;
|
2013-06-12 14:04:25 +08:00
|
|
|
struct ctl_table lctl;
|
2005-04-17 06:20:36 +08:00
|
|
|
int ret;
|
|
|
|
|
2012-01-16 18:40:10 +08:00
|
|
|
/*
|
|
|
|
* ctl->data points to idev->cnf.forwarding, we should
|
|
|
|
* not modify it until we get the rtnl lock.
|
|
|
|
*/
|
|
|
|
lctl = *ctl;
|
|
|
|
lctl.data = &val;
|
|
|
|
|
|
|
|
ret = proc_dointvec(&lctl, write, buffer, lenp, ppos);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2007-12-05 17:50:24 +08:00
|
|
|
if (write)
|
2009-02-26 14:55:31 +08:00
|
|
|
ret = addrconf_fixup_forwarding(ctl, valp, val);
|
2010-02-19 21:22:59 +08:00
|
|
|
if (ret)
|
|
|
|
*ppos = pos;
|
2007-02-09 22:24:49 +08:00
|
|
|
return ret;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2015-02-23 22:17:13 +08:00
|
|
|
static
|
|
|
|
int addrconf_sysctl_mtu(struct ctl_table *ctl, int write,
|
|
|
|
void __user *buffer, size_t *lenp, loff_t *ppos)
|
|
|
|
{
|
|
|
|
struct inet6_dev *idev = ctl->extra1;
|
|
|
|
int min_mtu = IPV6_MIN_MTU;
|
|
|
|
struct ctl_table lctl;
|
|
|
|
|
|
|
|
lctl = *ctl;
|
|
|
|
lctl.extra1 = &min_mtu;
|
|
|
|
lctl.extra2 = idev ? &idev->dev->mtu : NULL;
|
|
|
|
|
|
|
|
return proc_dointvec_minmax(&lctl, write, buffer, lenp, ppos);
|
|
|
|
}
|
|
|
|
|
2009-06-01 18:07:33 +08:00
|
|
|
static void dev_disable_change(struct inet6_dev *idev)
|
|
|
|
{
|
2013-05-29 11:30:50 +08:00
|
|
|
struct netdev_notifier_info info;
|
|
|
|
|
2009-06-01 18:07:33 +08:00
|
|
|
if (!idev || !idev->dev)
|
|
|
|
return;
|
|
|
|
|
2013-05-29 11:30:50 +08:00
|
|
|
netdev_notifier_info_init(&info, idev->dev);
|
2009-06-01 18:07:33 +08:00
|
|
|
if (idev->cnf.disable_ipv6)
|
2013-05-29 11:30:50 +08:00
|
|
|
addrconf_notify(NULL, NETDEV_DOWN, &info);
|
2009-06-01 18:07:33 +08:00
|
|
|
else
|
2013-05-29 11:30:50 +08:00
|
|
|
addrconf_notify(NULL, NETDEV_UP, &info);
|
2009-06-01 18:07:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void addrconf_disable_change(struct net *net, __s32 newf)
|
|
|
|
{
|
|
|
|
struct net_device *dev;
|
|
|
|
struct inet6_dev *idev;
|
|
|
|
|
2009-11-04 21:43:23 +08:00
|
|
|
rcu_read_lock();
|
|
|
|
for_each_netdev_rcu(net, dev) {
|
2009-06-01 18:07:33 +08:00
|
|
|
idev = __in6_dev_get(dev);
|
|
|
|
if (idev) {
|
|
|
|
int changed = (!idev->cnf.disable_ipv6) ^ (!newf);
|
|
|
|
idev->cnf.disable_ipv6 = newf;
|
|
|
|
if (changed)
|
|
|
|
dev_disable_change(idev);
|
|
|
|
}
|
|
|
|
}
|
2009-11-04 21:43:23 +08:00
|
|
|
rcu_read_unlock();
|
2009-06-01 18:07:33 +08:00
|
|
|
}
|
|
|
|
|
2012-01-16 18:40:10 +08:00
|
|
|
static int addrconf_disable_ipv6(struct ctl_table *table, int *p, int newf)
|
2009-06-01 18:07:33 +08:00
|
|
|
{
|
|
|
|
struct net *net;
|
2012-01-16 18:40:10 +08:00
|
|
|
int old;
|
|
|
|
|
|
|
|
if (!rtnl_trylock())
|
|
|
|
return restart_syscall();
|
2009-06-01 18:07:33 +08:00
|
|
|
|
|
|
|
net = (struct net *)table->extra2;
|
2012-01-16 18:40:10 +08:00
|
|
|
old = *p;
|
|
|
|
*p = newf;
|
2009-06-01 18:07:33 +08:00
|
|
|
|
2012-01-16 18:40:10 +08:00
|
|
|
if (p == &net->ipv6.devconf_dflt->disable_ipv6) {
|
|
|
|
rtnl_unlock();
|
2009-06-01 18:07:33 +08:00
|
|
|
return 0;
|
2010-02-19 21:22:59 +08:00
|
|
|
}
|
2009-06-01 18:07:33 +08:00
|
|
|
|
|
|
|
if (p == &net->ipv6.devconf_all->disable_ipv6) {
|
|
|
|
net->ipv6.devconf_dflt->disable_ipv6 = newf;
|
|
|
|
addrconf_disable_change(net, newf);
|
2012-01-16 18:40:10 +08:00
|
|
|
} else if ((!newf) ^ (!old))
|
2009-06-01 18:07:33 +08:00
|
|
|
dev_disable_change((struct inet6_dev *)table->extra1);
|
|
|
|
|
|
|
|
rtnl_unlock();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static
|
2013-06-12 14:04:25 +08:00
|
|
|
int addrconf_sysctl_disable(struct ctl_table *ctl, int write,
|
2009-06-01 18:07:33 +08:00
|
|
|
void __user *buffer, size_t *lenp, loff_t *ppos)
|
|
|
|
{
|
|
|
|
int *valp = ctl->data;
|
|
|
|
int val = *valp;
|
2010-02-19 21:22:59 +08:00
|
|
|
loff_t pos = *ppos;
|
2013-06-12 14:04:25 +08:00
|
|
|
struct ctl_table lctl;
|
2009-06-01 18:07:33 +08:00
|
|
|
int ret;
|
|
|
|
|
2012-01-16 18:40:10 +08:00
|
|
|
/*
|
|
|
|
* ctl->data points to idev->cnf.disable_ipv6, we should
|
|
|
|
* not modify it until we get the rtnl lock.
|
|
|
|
*/
|
|
|
|
lctl = *ctl;
|
|
|
|
lctl.data = &val;
|
|
|
|
|
|
|
|
ret = proc_dointvec(&lctl, write, buffer, lenp, ppos);
|
2009-06-01 18:07:33 +08:00
|
|
|
|
|
|
|
if (write)
|
|
|
|
ret = addrconf_disable_ipv6(ctl, valp, val);
|
2010-02-19 21:22:59 +08:00
|
|
|
if (ret)
|
|
|
|
*ppos = pos;
|
2009-06-01 18:07:33 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2013-12-18 14:37:14 +08:00
|
|
|
static
|
|
|
|
int addrconf_sysctl_proxy_ndp(struct ctl_table *ctl, int write,
|
|
|
|
void __user *buffer, size_t *lenp, loff_t *ppos)
|
|
|
|
{
|
|
|
|
int *valp = ctl->data;
|
|
|
|
int ret;
|
|
|
|
int old, new;
|
|
|
|
|
|
|
|
old = *valp;
|
|
|
|
ret = proc_dointvec(ctl, write, buffer, lenp, ppos);
|
|
|
|
new = *valp;
|
|
|
|
|
|
|
|
if (write && old != new) {
|
|
|
|
struct net *net = ctl->extra2;
|
|
|
|
|
|
|
|
if (!rtnl_trylock())
|
|
|
|
return restart_syscall();
|
|
|
|
|
|
|
|
if (valp == &net->ipv6.devconf_dflt->proxy_ndp)
|
|
|
|
inet6_netconf_notify_devconf(net, NETCONFA_PROXY_NEIGH,
|
|
|
|
NETCONFA_IFINDEX_DEFAULT,
|
|
|
|
net->ipv6.devconf_dflt);
|
|
|
|
else if (valp == &net->ipv6.devconf_all->proxy_ndp)
|
|
|
|
inet6_netconf_notify_devconf(net, NETCONFA_PROXY_NEIGH,
|
|
|
|
NETCONFA_IFINDEX_ALL,
|
|
|
|
net->ipv6.devconf_all);
|
|
|
|
else {
|
|
|
|
struct inet6_dev *idev = ctl->extra1;
|
|
|
|
|
|
|
|
inet6_netconf_notify_devconf(net, NETCONFA_PROXY_NEIGH,
|
|
|
|
idev->dev->ifindex,
|
|
|
|
&idev->cnf);
|
|
|
|
}
|
|
|
|
rtnl_unlock();
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2017-01-26 11:59:17 +08:00
|
|
|
static int addrconf_sysctl_addr_gen_mode(struct ctl_table *ctl, int write,
|
|
|
|
void __user *buffer, size_t *lenp,
|
|
|
|
loff_t *ppos)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
int new_val;
|
|
|
|
struct inet6_dev *idev = (struct inet6_dev *)ctl->extra1;
|
|
|
|
struct net *net = (struct net *)ctl->extra2;
|
|
|
|
|
|
|
|
ret = proc_dointvec(ctl, write, buffer, lenp, ppos);
|
|
|
|
|
|
|
|
if (write) {
|
|
|
|
new_val = *((int *)ctl->data);
|
|
|
|
|
|
|
|
if (check_addr_gen_mode(new_val) < 0)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
/* request for default */
|
|
|
|
if (&net->ipv6.devconf_dflt->addr_gen_mode == ctl->data) {
|
|
|
|
ipv6_devconf_dflt.addr_gen_mode = new_val;
|
|
|
|
|
|
|
|
/* request for individual net device */
|
|
|
|
} else {
|
|
|
|
if (!idev)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
if (check_stable_privacy(idev, net, new_val) < 0)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (idev->cnf.addr_gen_mode != new_val) {
|
|
|
|
idev->cnf.addr_gen_mode = new_val;
|
|
|
|
rtnl_lock();
|
|
|
|
addrconf_dev_config(idev->dev);
|
|
|
|
rtnl_unlock();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2015-03-24 06:36:00 +08:00
|
|
|
static int addrconf_sysctl_stable_secret(struct ctl_table *ctl, int write,
|
|
|
|
void __user *buffer, size_t *lenp,
|
|
|
|
loff_t *ppos)
|
|
|
|
{
|
|
|
|
int err;
|
|
|
|
struct in6_addr addr;
|
|
|
|
char str[IPV6_MAX_STRLEN];
|
|
|
|
struct ctl_table lctl = *ctl;
|
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 06:36:01 +08:00
|
|
|
struct net *net = ctl->extra2;
|
2015-03-24 06:36:00 +08:00
|
|
|
struct ipv6_stable_secret *secret = ctl->data;
|
|
|
|
|
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 06:36:01 +08:00
|
|
|
if (&net->ipv6.devconf_all->stable_secret == ctl->data)
|
|
|
|
return -EIO;
|
|
|
|
|
2015-03-24 06:36:00 +08:00
|
|
|
lctl.maxlen = IPV6_MAX_STRLEN;
|
|
|
|
lctl.data = str;
|
|
|
|
|
|
|
|
if (!rtnl_trylock())
|
|
|
|
return restart_syscall();
|
|
|
|
|
|
|
|
if (!write && !secret->initialized) {
|
|
|
|
err = -EIO;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2015-12-22 02:55:45 +08:00
|
|
|
err = snprintf(str, sizeof(str), "%pI6", &secret->secret);
|
|
|
|
if (err >= sizeof(str)) {
|
|
|
|
err = -EIO;
|
|
|
|
goto out;
|
2015-03-24 06:36:00 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
err = proc_dostring(&lctl, write, buffer, lenp, ppos);
|
|
|
|
if (err || !write)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
if (in6_pton(str, -1, addr.in6_u.u6_addr8, -1, NULL) != 1) {
|
|
|
|
err = -EIO;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
secret->initialized = true;
|
|
|
|
secret->secret = addr;
|
|
|
|
|
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 06:36:01 +08:00
|
|
|
if (&net->ipv6.devconf_dflt->stable_secret == ctl->data) {
|
|
|
|
struct net_device *dev;
|
|
|
|
|
|
|
|
for_each_netdev(net, dev) {
|
|
|
|
struct inet6_dev *idev = __in6_dev_get(dev);
|
|
|
|
|
|
|
|
if (idev) {
|
2017-01-26 11:59:17 +08:00
|
|
|
idev->cnf.addr_gen_mode =
|
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 06:36:01 +08:00
|
|
|
IN6_ADDR_GEN_MODE_STABLE_PRIVACY;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
struct inet6_dev *idev = ctl->extra1;
|
|
|
|
|
2017-01-26 11:59:17 +08:00
|
|
|
idev->cnf.addr_gen_mode = IN6_ADDR_GEN_MODE_STABLE_PRIVACY;
|
ipv6: generation of stable privacy addresses for link-local and autoconf
This patch implements the stable privacy address generation for
link-local and autoconf addresses as specified in RFC7217.
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)
is the RID (random identifier). As the hash function F we chose one
round of sha1. Prefix will be either the link-local prefix or the
router advertised one. As Net_Iface we use the MAC address of the
device. DAD_Counter and secret_key are implemented as specified.
We don't use Network_ID, as it couples the code too closely to other
subsystems. It is specified as optional in the RFC.
As Net_Iface we only use the MAC address: we simply have no stable
identifier in the kernel we could possibly use: because this code might
run very early, we cannot depend on names, as they might be changed by
user space early on during the boot process.
A new address generation mode is introduced,
IN6_ADDR_GEN_MODE_STABLE_PRIVACY. With iproute2 one can switch back to
none or eui64 address configuration mode although the stable_secret is
already set.
We refuse writes to ipv6/conf/all/stable_secret but only allow
ipv6/conf/default/stable_secret and the interface specific file to be
written to. The default stable_secret is used as the parameter for the
namespace, the interface specific can overwrite the secret, e.g. when
switching a network configuration from one system to another while
inheriting the secret.
Cc: Erik Kline <ek@google.com>
Cc: Fernando Gont <fgont@si6networks.com>
Cc: Lorenzo Colitti <lorenzo@google.com>
Cc: YOSHIFUJI Hideaki/吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-24 06:36:01 +08:00
|
|
|
}
|
|
|
|
|
2015-03-24 06:36:00 +08:00
|
|
|
out:
|
|
|
|
rtnl_unlock();
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
2013-12-18 14:37:14 +08:00
|
|
|
|
2015-08-13 22:39:01 +08:00
|
|
|
static
|
|
|
|
int addrconf_sysctl_ignore_routes_with_linkdown(struct ctl_table *ctl,
|
|
|
|
int write,
|
|
|
|
void __user *buffer,
|
|
|
|
size_t *lenp,
|
|
|
|
loff_t *ppos)
|
|
|
|
{
|
|
|
|
int *valp = ctl->data;
|
|
|
|
int val = *valp;
|
|
|
|
loff_t pos = *ppos;
|
|
|
|
struct ctl_table lctl;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
/* ctl->data points to idev->cnf.ignore_routes_when_linkdown
|
|
|
|
* we should not modify it until we get the rtnl lock.
|
|
|
|
*/
|
|
|
|
lctl = *ctl;
|
|
|
|
lctl.data = &val;
|
|
|
|
|
|
|
|
ret = proc_dointvec(&lctl, write, buffer, lenp, ppos);
|
|
|
|
|
|
|
|
if (write)
|
|
|
|
ret = addrconf_fixup_linkdown(ctl, valp, val);
|
|
|
|
if (ret)
|
|
|
|
*ppos = pos;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2016-10-07 16:00:49 +08:00
|
|
|
static int minus_one = -1;
|
2016-09-29 15:33:43 +08:00
|
|
|
static const int one = 1;
|
|
|
|
static const int two_five_five = 255;
|
|
|
|
|
2016-04-18 19:41:10 +08:00
|
|
|
static const struct ctl_table addrconf_sysctl[] = {
|
2016-04-18 19:41:17 +08:00
|
|
|
{
|
|
|
|
.procname = "forwarding",
|
|
|
|
.data = &ipv6_devconf.forwarding,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = addrconf_sysctl_forward,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "hop_limit",
|
|
|
|
.data = &ipv6_devconf.hop_limit,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
2016-09-29 15:33:43 +08:00
|
|
|
.proc_handler = proc_dointvec_minmax,
|
|
|
|
.extra1 = (void *)&one,
|
|
|
|
.extra2 = (void *)&two_five_five,
|
2016-04-18 19:41:17 +08:00
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "mtu",
|
|
|
|
.data = &ipv6_devconf.mtu6,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = addrconf_sysctl_mtu,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "accept_ra",
|
|
|
|
.data = &ipv6_devconf.accept_ra,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "accept_redirects",
|
|
|
|
.data = &ipv6_devconf.accept_redirects,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "autoconf",
|
|
|
|
.data = &ipv6_devconf.autoconf,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "dad_transmits",
|
|
|
|
.data = &ipv6_devconf.dad_transmits,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "router_solicitations",
|
|
|
|
.data = &ipv6_devconf.rtr_solicits,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
2016-10-07 16:00:49 +08:00
|
|
|
.proc_handler = proc_dointvec_minmax,
|
|
|
|
.extra1 = &minus_one,
|
2016-04-18 19:41:17 +08:00
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "router_solicitation_interval",
|
|
|
|
.data = &ipv6_devconf.rtr_solicit_interval,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec_jiffies,
|
|
|
|
},
|
2016-09-28 14:57:58 +08:00
|
|
|
{
|
|
|
|
.procname = "router_solicitation_max_interval",
|
|
|
|
.data = &ipv6_devconf.rtr_solicit_max_interval,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec_jiffies,
|
|
|
|
},
|
2016-04-18 19:41:17 +08:00
|
|
|
{
|
|
|
|
.procname = "router_solicitation_delay",
|
|
|
|
.data = &ipv6_devconf.rtr_solicit_delay,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec_jiffies,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "force_mld_version",
|
|
|
|
.data = &ipv6_devconf.force_mld_version,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "mldv1_unsolicited_report_interval",
|
|
|
|
.data =
|
|
|
|
&ipv6_devconf.mldv1_unsolicited_report_interval,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec_ms_jiffies,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "mldv2_unsolicited_report_interval",
|
|
|
|
.data =
|
|
|
|
&ipv6_devconf.mldv2_unsolicited_report_interval,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec_ms_jiffies,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "use_tempaddr",
|
|
|
|
.data = &ipv6_devconf.use_tempaddr,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "temp_valid_lft",
|
|
|
|
.data = &ipv6_devconf.temp_valid_lft,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "temp_prefered_lft",
|
|
|
|
.data = &ipv6_devconf.temp_prefered_lft,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "regen_max_retry",
|
|
|
|
.data = &ipv6_devconf.regen_max_retry,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "max_desync_factor",
|
|
|
|
.data = &ipv6_devconf.max_desync_factor,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "max_addresses",
|
|
|
|
.data = &ipv6_devconf.max_addresses,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "accept_ra_defrtr",
|
|
|
|
.data = &ipv6_devconf.accept_ra_defrtr,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "accept_ra_min_hop_limit",
|
|
|
|
.data = &ipv6_devconf.accept_ra_min_hop_limit,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "accept_ra_pinfo",
|
|
|
|
.data = &ipv6_devconf.accept_ra_pinfo,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
2006-03-21 09:05:30 +08:00
|
|
|
#ifdef CONFIG_IPV6_ROUTER_PREF
|
2016-04-18 19:41:17 +08:00
|
|
|
{
|
|
|
|
.procname = "accept_ra_rtr_pref",
|
|
|
|
.data = &ipv6_devconf.accept_ra_rtr_pref,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "router_probe_interval",
|
|
|
|
.data = &ipv6_devconf.rtr_probe_interval,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec_jiffies,
|
|
|
|
},
|
2007-01-31 06:30:10 +08:00
|
|
|
#ifdef CONFIG_IPV6_ROUTE_INFO
|
2016-04-18 19:41:17 +08:00
|
|
|
{
|
|
|
|
.procname = "accept_ra_rt_info_max_plen",
|
|
|
|
.data = &ipv6_devconf.accept_ra_rt_info_max_plen,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
2006-03-21 09:07:03 +08:00
|
|
|
#endif
|
2006-03-21 09:05:30 +08:00
|
|
|
#endif
|
2016-04-18 19:41:17 +08:00
|
|
|
{
|
|
|
|
.procname = "proxy_ndp",
|
|
|
|
.data = &ipv6_devconf.proxy_ndp,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = addrconf_sysctl_proxy_ndp,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "accept_source_route",
|
|
|
|
.data = &ipv6_devconf.accept_source_route,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
2007-04-26 08:08:10 +08:00
|
|
|
#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
|
2016-04-18 19:41:17 +08:00
|
|
|
{
|
|
|
|
.procname = "optimistic_dad",
|
|
|
|
.data = &ipv6_devconf.optimistic_dad,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "use_optimistic",
|
|
|
|
.data = &ipv6_devconf.use_optimistic,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
2008-04-03 08:22:53 +08:00
|
|
|
#endif
|
|
|
|
#ifdef CONFIG_IPV6_MROUTE
|
2016-04-18 19:41:17 +08:00
|
|
|
{
|
|
|
|
.procname = "mc_forwarding",
|
|
|
|
.data = &ipv6_devconf.mc_forwarding,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0444,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
2007-04-26 08:08:10 +08:00
|
|
|
#endif
|
2016-04-18 19:41:17 +08:00
|
|
|
{
|
|
|
|
.procname = "disable_ipv6",
|
|
|
|
.data = &ipv6_devconf.disable_ipv6,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = addrconf_sysctl_disable,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "accept_dad",
|
|
|
|
.data = &ipv6_devconf.accept_dad,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "force_tllao",
|
|
|
|
.data = &ipv6_devconf.force_tllao,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "ndisc_notify",
|
|
|
|
.data = &ipv6_devconf.ndisc_notify,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "suppress_frag_ndisc",
|
|
|
|
.data = &ipv6_devconf.suppress_frag_ndisc,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "accept_ra_from_local",
|
|
|
|
.data = &ipv6_devconf.accept_ra_from_local,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "accept_ra_mtu",
|
|
|
|
.data = &ipv6_devconf.accept_ra_mtu,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "stable_secret",
|
|
|
|
.data = &ipv6_devconf.stable_secret,
|
|
|
|
.maxlen = IPV6_MAX_STRLEN,
|
|
|
|
.mode = 0600,
|
|
|
|
.proc_handler = addrconf_sysctl_stable_secret,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "use_oif_addrs_only",
|
|
|
|
.data = &ipv6_devconf.use_oif_addrs_only,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "ignore_routes_with_linkdown",
|
|
|
|
.data = &ipv6_devconf.ignore_routes_with_linkdown,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = addrconf_sysctl_ignore_routes_with_linkdown,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "drop_unicast_in_l2_multicast",
|
|
|
|
.data = &ipv6_devconf.drop_unicast_in_l2_multicast,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "drop_unsolicited_na",
|
|
|
|
.data = &ipv6_devconf.drop_unsolicited_na,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "keep_addr_on_down",
|
|
|
|
.data = &ipv6_devconf.keep_addr_on_down,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
|
|
|
|
},
|
2016-11-08 21:57:39 +08:00
|
|
|
{
|
|
|
|
.procname = "seg6_enabled",
|
|
|
|
.data = &ipv6_devconf.seg6_enabled,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
2016-11-08 21:57:42 +08:00
|
|
|
#ifdef CONFIG_IPV6_SEG6_HMAC
|
|
|
|
{
|
|
|
|
.procname = "seg6_require_hmac",
|
|
|
|
.data = &ipv6_devconf.seg6_require_hmac,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
|
|
|
#endif
|
2016-12-03 06:00:08 +08:00
|
|
|
{
|
|
|
|
.procname = "enhanced_dad",
|
|
|
|
.data = &ipv6_devconf.enhanced_dad,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = proc_dointvec,
|
|
|
|
},
|
2017-01-26 11:59:17 +08:00
|
|
|
{
|
|
|
|
.procname = "addr_gen_mode",
|
|
|
|
.data = &ipv6_devconf.addr_gen_mode,
|
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
|
|
|
.proc_handler = addrconf_sysctl_addr_gen_mode,
|
|
|
|
},
|
2016-04-18 19:41:17 +08:00
|
|
|
{
|
|
|
|
/* sentinel */
|
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
|
|
|
|
2008-01-11 09:42:13 +08:00
|
|
|
static int __addrconf_sysctl_register(struct net *net, char *dev_name,
|
2009-11-06 05:32:03 +08:00
|
|
|
struct inet6_dev *idev, struct ipv6_devconf *p)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2016-08-30 16:09:22 +08:00
|
|
|
int i, ifindex;
|
2016-04-18 19:41:10 +08:00
|
|
|
struct ctl_table *table;
|
2012-04-19 21:41:24 +08:00
|
|
|
char path[sizeof("net/ipv6/conf/") + IFNAMSIZ];
|
2007-12-01 21:59:38 +08:00
|
|
|
|
2016-04-18 19:41:10 +08:00
|
|
|
table = kmemdup(addrconf_sysctl, sizeof(addrconf_sysctl), GFP_KERNEL);
|
|
|
|
if (!table)
|
2007-12-01 21:21:52 +08:00
|
|
|
goto out;
|
|
|
|
|
2016-04-18 19:41:10 +08:00
|
|
|
for (i = 0; table[i].data; i++) {
|
|
|
|
table[i].data += (char *)p - (char *)&ipv6_devconf;
|
2016-09-29 15:33:43 +08:00
|
|
|
/* If one of these is already set, then it is not safe to
|
|
|
|
* overwrite either of them: this makes proc_dointvec_minmax
|
|
|
|
* usable.
|
|
|
|
*/
|
|
|
|
if (!table[i].extra1 && !table[i].extra2) {
|
|
|
|
table[i].extra1 = idev; /* embedded; no ref */
|
|
|
|
table[i].extra2 = net;
|
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2012-04-19 21:41:24 +08:00
|
|
|
snprintf(path, sizeof(path), "net/ipv6/conf/%s", dev_name);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2016-04-18 19:41:10 +08:00
|
|
|
p->sysctl_header = register_net_sysctl(net, path, table);
|
|
|
|
if (!p->sysctl_header)
|
2012-04-19 21:41:24 +08:00
|
|
|
goto free;
|
2007-12-01 21:21:52 +08:00
|
|
|
|
2016-08-30 16:09:22 +08:00
|
|
|
if (!strcmp(dev_name, "all"))
|
|
|
|
ifindex = NETCONFA_IFINDEX_ALL;
|
|
|
|
else if (!strcmp(dev_name, "default"))
|
|
|
|
ifindex = NETCONFA_IFINDEX_DEFAULT;
|
|
|
|
else
|
|
|
|
ifindex = idev->dev->ifindex;
|
|
|
|
inet6_netconf_notify_devconf(net, NETCONFA_ALL, ifindex, p);
|
2008-01-11 09:41:45 +08:00
|
|
|
return 0;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2007-12-01 21:21:52 +08:00
|
|
|
free:
|
2016-04-18 19:41:10 +08:00
|
|
|
kfree(table);
|
2007-12-01 21:21:52 +08:00
|
|
|
out:
|
2008-01-11 09:41:45 +08:00
|
|
|
return -ENOBUFS;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2008-01-11 09:41:21 +08:00
|
|
|
static void __addrconf_sysctl_unregister(struct ipv6_devconf *p)
|
|
|
|
{
|
2016-04-18 19:41:10 +08:00
|
|
|
struct ctl_table *table;
|
2008-01-11 09:41:21 +08:00
|
|
|
|
2016-04-18 19:41:10 +08:00
|
|
|
if (!p->sysctl_header)
|
2008-01-11 09:41:21 +08:00
|
|
|
return;
|
|
|
|
|
2016-04-18 19:41:10 +08:00
|
|
|
table = p->sysctl_header->ctl_table_arg;
|
|
|
|
unregister_net_sysctl_table(p->sysctl_header);
|
|
|
|
p->sysctl_header = NULL;
|
|
|
|
kfree(table);
|
2008-01-11 09:41:21 +08:00
|
|
|
}
|
|
|
|
|
2014-07-26 06:25:09 +08:00
|
|
|
static int addrconf_sysctl_register(struct inet6_dev *idev)
|
2007-12-01 21:58:37 +08:00
|
|
|
{
|
2014-07-26 06:25:09 +08:00
|
|
|
int err;
|
|
|
|
|
|
|
|
if (!sysctl_dev_name_is_allowed(idev->dev->name))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
err = neigh_sysctl_register(idev->dev, idev->nd_parms,
|
|
|
|
&ndisc_ifinfo_sysctl_change);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
err = __addrconf_sysctl_register(dev_net(idev->dev), idev->dev->name,
|
|
|
|
idev, &idev->cnf);
|
|
|
|
if (err)
|
|
|
|
neigh_sysctl_unregister(idev->nd_parms);
|
|
|
|
|
|
|
|
return err;
|
2007-12-01 21:58:37 +08:00
|
|
|
}
|
|
|
|
|
2008-01-11 09:41:21 +08:00
|
|
|
static void addrconf_sysctl_unregister(struct inet6_dev *idev)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2008-01-11 09:41:21 +08:00
|
|
|
__addrconf_sysctl_unregister(&idev->cnf);
|
|
|
|
neigh_sysctl_unregister(idev->nd_parms);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
2010-01-17 11:35:32 +08:00
|
|
|
static int __net_init addrconf_init_net(struct net *net)
|
2008-01-11 09:42:55 +08:00
|
|
|
{
|
2013-03-26 01:52:45 +08:00
|
|
|
int err = -ENOMEM;
|
2008-01-11 09:42:55 +08:00
|
|
|
struct ipv6_devconf *all, *dflt;
|
|
|
|
|
2013-03-26 01:52:45 +08:00
|
|
|
all = kmemdup(&ipv6_devconf, sizeof(ipv6_devconf), GFP_KERNEL);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!all)
|
2013-03-26 01:52:45 +08:00
|
|
|
goto err_alloc_all;
|
2008-01-11 09:42:55 +08:00
|
|
|
|
2013-03-26 01:52:45 +08:00
|
|
|
dflt = kmemdup(&ipv6_devconf_dflt, sizeof(ipv6_devconf_dflt), GFP_KERNEL);
|
2015-03-29 21:00:04 +08:00
|
|
|
if (!dflt)
|
2013-03-26 01:52:45 +08:00
|
|
|
goto err_alloc_dflt;
|
2008-01-11 09:42:55 +08:00
|
|
|
|
2013-03-26 01:52:45 +08:00
|
|
|
/* these will be inherited by all namespaces */
|
|
|
|
dflt->autoconf = ipv6_defaults.autoconf;
|
|
|
|
dflt->disable_ipv6 = ipv6_defaults.disable_ipv6;
|
2008-01-11 09:42:55 +08:00
|
|
|
|
2015-03-24 06:36:00 +08:00
|
|
|
dflt->stable_secret.initialized = false;
|
|
|
|
all->stable_secret.initialized = false;
|
|
|
|
|
2008-01-11 09:42:55 +08:00
|
|
|
net->ipv6.devconf_all = all;
|
|
|
|
net->ipv6.devconf_dflt = dflt;
|
|
|
|
|
|
|
|
#ifdef CONFIG_SYSCTL
|
2009-11-06 05:32:03 +08:00
|
|
|
err = __addrconf_sysctl_register(net, "all", NULL, all);
|
2008-01-11 09:42:55 +08:00
|
|
|
if (err < 0)
|
|
|
|
goto err_reg_all;
|
|
|
|
|
2009-11-06 05:32:03 +08:00
|
|
|
err = __addrconf_sysctl_register(net, "default", NULL, dflt);
|
2008-01-11 09:42:55 +08:00
|
|
|
if (err < 0)
|
|
|
|
goto err_reg_dflt;
|
|
|
|
#endif
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
#ifdef CONFIG_SYSCTL
|
|
|
|
err_reg_dflt:
|
|
|
|
__addrconf_sysctl_unregister(all);
|
|
|
|
err_reg_all:
|
|
|
|
kfree(dflt);
|
|
|
|
#endif
|
|
|
|
err_alloc_dflt:
|
|
|
|
kfree(all);
|
|
|
|
err_alloc_all:
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2010-01-17 11:35:32 +08:00
|
|
|
static void __net_exit addrconf_exit_net(struct net *net)
|
2008-01-11 09:42:55 +08:00
|
|
|
{
|
|
|
|
#ifdef CONFIG_SYSCTL
|
|
|
|
__addrconf_sysctl_unregister(net->ipv6.devconf_dflt);
|
|
|
|
__addrconf_sysctl_unregister(net->ipv6.devconf_all);
|
|
|
|
#endif
|
2014-11-26 10:25:58 +08:00
|
|
|
kfree(net->ipv6.devconf_dflt);
|
|
|
|
kfree(net->ipv6.devconf_all);
|
2008-01-11 09:42:55 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct pernet_operations addrconf_ops = {
|
|
|
|
.init = addrconf_init_net,
|
|
|
|
.exit = addrconf_exit_net,
|
|
|
|
};
|
|
|
|
|
2015-01-29 19:15:03 +08:00
|
|
|
static struct rtnl_af_ops inet6_ops __read_mostly = {
|
2010-11-16 12:33:57 +08:00
|
|
|
.family = AF_INET6,
|
|
|
|
.fill_link_af = inet6_fill_link_af,
|
|
|
|
.get_link_af_size = inet6_get_link_af_size,
|
2015-02-05 21:39:11 +08:00
|
|
|
.validate_link_af = inet6_validate_link_af,
|
net: ipv6: add tokenized interface identifier support
This patch adds support for IPv6 tokenized IIDs, that allow
for administrators to assign well-known host-part addresses
to nodes whilst still obtaining global network prefix from
Router Advertisements. It is currently in draft status.
The primary target for such support is server platforms
where addresses are usually manually configured, rather
than using DHCPv6 or SLAAC. By using tokenised identifiers,
hosts can still determine their network prefix by use of
SLAAC, but more readily be automatically renumbered should
their network prefix change. [...]
The disadvantage with static addresses is that they are
likely to require manual editing should the network prefix
in use change. If instead there were a method to only
manually configure the static identifier part of the IPv6
address, then the address could be automatically updated
when a new prefix was introduced, as described in [RFC4192]
for example. In such cases a DNS server might be
configured with such a tokenised interface identifier of
::53, and SLAAC would use the token in constructing the
interface address, using the advertised prefix. [...]
http://tools.ietf.org/html/draft-chown-6man-tokenised-ipv6-identifiers-02
The implementation is partially based on top of Mark K.
Thompson's proof of concept. However, it uses the Netlink
interface for configuration resp. data retrival, so that
it can be easily extended in future. Successfully tested
by myself.
Cc: Hannes Frederic Sowa <hannes@stressinduktion.org>
Cc: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Cc: Thomas Graf <tgraf@suug.ch>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-04-08 12:01:30 +08:00
|
|
|
.set_link_af = inet6_set_link_af,
|
2010-11-16 12:33:57 +08:00
|
|
|
};
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* Init / cleanup code
|
|
|
|
*/
|
|
|
|
|
|
|
|
int __init addrconf_init(void)
|
|
|
|
{
|
2014-07-26 06:25:09 +08:00
|
|
|
struct inet6_dev *idev;
|
2010-03-18 04:31:10 +08:00
|
|
|
int i, err;
|
2007-11-14 14:56:23 +08:00
|
|
|
|
2010-03-21 07:09:01 +08:00
|
|
|
err = ipv6_addr_label_init();
|
|
|
|
if (err < 0) {
|
2012-05-15 22:11:53 +08:00
|
|
|
pr_crit("%s: cannot initialize default policy table: %d\n",
|
|
|
|
__func__, err);
|
2010-09-24 17:55:52 +08:00
|
|
|
goto out;
|
2007-11-14 14:56:23 +08:00
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2010-09-24 17:55:52 +08:00
|
|
|
err = register_pernet_subsys(&addrconf_ops);
|
|
|
|
if (err < 0)
|
|
|
|
goto out_addrlabel;
|
2008-01-11 09:42:55 +08:00
|
|
|
|
2014-03-28 01:28:07 +08:00
|
|
|
addrconf_wq = create_workqueue("ipv6_addrconf");
|
|
|
|
if (!addrconf_wq) {
|
|
|
|
err = -ENOMEM;
|
|
|
|
goto out_nowq;
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/* The addrconf netdev notifier requires that loopback_dev
|
|
|
|
* has it's ipv6 private information allocated and setup
|
|
|
|
* before it can bring up and give link-local addresses
|
|
|
|
* to other devices which are up.
|
|
|
|
*
|
|
|
|
* Unfortunately, loopback_dev is not necessarily the first
|
|
|
|
* entry in the global dev_base list of net devices. In fact,
|
|
|
|
* it is likely to be the very last entry on that list.
|
|
|
|
* So this causes the notifier registry below to try and
|
|
|
|
* give link-local addresses to all devices besides loopback_dev
|
|
|
|
* first, then loopback_dev, which cases all the non-loopback_dev
|
|
|
|
* devices to fail to get a link-local address.
|
|
|
|
*
|
|
|
|
* So, as a temporary fix, allocate the ipv6 structure for
|
|
|
|
* loopback_dev first by hand.
|
|
|
|
* Longer term, all of the dependencies ipv6 has upon the loopback
|
|
|
|
* device and it being up should be removed.
|
|
|
|
*/
|
|
|
|
rtnl_lock();
|
2014-07-26 06:25:09 +08:00
|
|
|
idev = ipv6_add_dev(init_net.loopback_dev);
|
2005-04-17 06:20:36 +08:00
|
|
|
rtnl_unlock();
|
2014-07-26 06:25:09 +08:00
|
|
|
if (IS_ERR(idev)) {
|
|
|
|
err = PTR_ERR(idev);
|
2008-01-11 09:42:55 +08:00
|
|
|
goto errlo;
|
2014-07-26 06:25:09 +08:00
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2010-03-18 04:31:10 +08:00
|
|
|
for (i = 0; i < IN6_ADDR_HSIZE; i++)
|
|
|
|
INIT_HLIST_HEAD(&inet6_addr_lst[i]);
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
register_netdevice_notifier(&ipv6_dev_notf);
|
|
|
|
|
2014-03-28 01:28:07 +08:00
|
|
|
addrconf_verify();
|
2007-03-23 02:58:32 +08:00
|
|
|
|
2013-12-31 02:41:32 +08:00
|
|
|
rtnl_af_register(&inet6_ops);
|
2010-11-16 12:33:57 +08:00
|
|
|
|
2011-06-10 09:27:09 +08:00
|
|
|
err = __rtnl_register(PF_INET6, RTM_GETLINK, NULL, inet6_dump_ifinfo,
|
|
|
|
NULL);
|
2007-03-23 02:58:32 +08:00
|
|
|
if (err < 0)
|
|
|
|
goto errout;
|
|
|
|
|
|
|
|
/* Only the first call to __rtnl_register can fail */
|
2011-06-10 09:27:09 +08:00
|
|
|
__rtnl_register(PF_INET6, RTM_NEWADDR, inet6_rtm_newaddr, NULL, NULL);
|
|
|
|
__rtnl_register(PF_INET6, RTM_DELADDR, inet6_rtm_deladdr, NULL, NULL);
|
|
|
|
__rtnl_register(PF_INET6, RTM_GETADDR, inet6_rtm_getaddr,
|
|
|
|
inet6_dump_ifaddr, NULL);
|
|
|
|
__rtnl_register(PF_INET6, RTM_GETMULTICAST, NULL,
|
|
|
|
inet6_dump_ifmcaddr, NULL);
|
|
|
|
__rtnl_register(PF_INET6, RTM_GETANYCAST, NULL,
|
|
|
|
inet6_dump_ifacaddr, NULL);
|
2012-10-26 06:28:51 +08:00
|
|
|
__rtnl_register(PF_INET6, RTM_GETNETCONF, inet6_netconf_get_devconf,
|
2013-03-06 07:42:06 +08:00
|
|
|
inet6_netconf_dump_devconf, NULL);
|
2007-03-23 02:58:32 +08:00
|
|
|
|
2007-11-14 14:56:23 +08:00
|
|
|
ipv6_addr_label_rtnl_register();
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
return 0;
|
2007-03-23 02:58:32 +08:00
|
|
|
errout:
|
2010-11-16 12:33:57 +08:00
|
|
|
rtnl_af_unregister(&inet6_ops);
|
2007-03-23 02:58:32 +08:00
|
|
|
unregister_netdevice_notifier(&ipv6_dev_notf);
|
2008-01-11 09:42:55 +08:00
|
|
|
errlo:
|
2014-03-28 01:28:07 +08:00
|
|
|
destroy_workqueue(addrconf_wq);
|
|
|
|
out_nowq:
|
2008-01-11 09:42:55 +08:00
|
|
|
unregister_pernet_subsys(&addrconf_ops);
|
2010-09-24 17:55:52 +08:00
|
|
|
out_addrlabel:
|
|
|
|
ipv6_addr_label_cleanup();
|
|
|
|
out:
|
2007-03-23 02:58:32 +08:00
|
|
|
return err;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2007-12-13 21:34:58 +08:00
|
|
|
void addrconf_cleanup(void)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2009-03-03 17:06:45 +08:00
|
|
|
struct net_device *dev;
|
2005-04-17 06:20:36 +08:00
|
|
|
int i;
|
|
|
|
|
|
|
|
unregister_netdevice_notifier(&ipv6_dev_notf);
|
2008-01-11 09:42:55 +08:00
|
|
|
unregister_pernet_subsys(&addrconf_ops);
|
2010-09-24 17:55:52 +08:00
|
|
|
ipv6_addr_label_cleanup();
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
rtnl_lock();
|
|
|
|
|
2010-11-16 12:33:57 +08:00
|
|
|
__rtnl_af_unregister(&inet6_ops);
|
|
|
|
|
2009-03-03 17:06:45 +08:00
|
|
|
/* clean dev list */
|
|
|
|
for_each_netdev(&init_net, dev) {
|
|
|
|
if (__in6_dev_get(dev) == NULL)
|
|
|
|
continue;
|
|
|
|
addrconf_ifdown(dev, 1);
|
|
|
|
}
|
|
|
|
addrconf_ifdown(init_net.loopback_dev, 2);
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* Check hash table.
|
|
|
|
*/
|
2010-03-18 04:31:11 +08:00
|
|
|
spin_lock_bh(&addrconf_hash_lock);
|
2010-03-18 04:31:10 +08:00
|
|
|
for (i = 0; i < IN6_ADDR_HSIZE; i++)
|
|
|
|
WARN_ON(!hlist_empty(&inet6_addr_lst[i]));
|
2010-03-18 04:31:11 +08:00
|
|
|
spin_unlock_bh(&addrconf_hash_lock);
|
2014-03-28 01:28:07 +08:00
|
|
|
cancel_delayed_work(&addr_chk_work);
|
2005-04-17 06:20:36 +08:00
|
|
|
rtnl_unlock();
|
2014-03-28 01:28:07 +08:00
|
|
|
|
|
|
|
destroy_workqueue(addrconf_wq);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|