net: use net_eq to compare nets
[linux-2.6/libata-dev.git] / net / ipv4 / devinet.c
blobc100709d6ddfccd033141a9ee2c7b2f19dd562ae
1 /*
2 * NET3 IP device support routines.
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
9 * Derived from the IP parts of dev.c 1.0.19
10 * Authors: Ross Biro
11 * Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
12 * Mark Evans, <evansmp@uhura.aston.ac.uk>
14 * Additional Authors:
15 * Alan Cox, <gw4pts@gw4pts.ampr.org>
16 * Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
18 * Changes:
19 * Alexey Kuznetsov: pa_* fields are replaced with ifaddr
20 * lists.
21 * Cyrus Durgin: updated for kmod
22 * Matthias Andree: in devinet_ioctl, compare label and
23 * address (4.4BSD alias style support),
24 * fall back to comparing just the label
25 * if no match found.
29 #include <asm/uaccess.h>
30 #include <asm/system.h>
31 #include <linux/bitops.h>
32 #include <linux/capability.h>
33 #include <linux/module.h>
34 #include <linux/types.h>
35 #include <linux/kernel.h>
36 #include <linux/string.h>
37 #include <linux/mm.h>
38 #include <linux/socket.h>
39 #include <linux/sockios.h>
40 #include <linux/in.h>
41 #include <linux/errno.h>
42 #include <linux/interrupt.h>
43 #include <linux/if_addr.h>
44 #include <linux/if_ether.h>
45 #include <linux/inet.h>
46 #include <linux/netdevice.h>
47 #include <linux/etherdevice.h>
48 #include <linux/skbuff.h>
49 #include <linux/init.h>
50 #include <linux/notifier.h>
51 #include <linux/inetdevice.h>
52 #include <linux/igmp.h>
53 #ifdef CONFIG_SYSCTL
54 #include <linux/sysctl.h>
55 #endif
56 #include <linux/kmod.h>
58 #include <net/arp.h>
59 #include <net/ip.h>
60 #include <net/route.h>
61 #include <net/ip_fib.h>
62 #include <net/rtnetlink.h>
63 #include <net/net_namespace.h>
65 static struct ipv4_devconf ipv4_devconf = {
66 .data = {
67 [NET_IPV4_CONF_ACCEPT_REDIRECTS - 1] = 1,
68 [NET_IPV4_CONF_SEND_REDIRECTS - 1] = 1,
69 [NET_IPV4_CONF_SECURE_REDIRECTS - 1] = 1,
70 [NET_IPV4_CONF_SHARED_MEDIA - 1] = 1,
74 static struct ipv4_devconf ipv4_devconf_dflt = {
75 .data = {
76 [NET_IPV4_CONF_ACCEPT_REDIRECTS - 1] = 1,
77 [NET_IPV4_CONF_SEND_REDIRECTS - 1] = 1,
78 [NET_IPV4_CONF_SECURE_REDIRECTS - 1] = 1,
79 [NET_IPV4_CONF_SHARED_MEDIA - 1] = 1,
80 [NET_IPV4_CONF_ACCEPT_SOURCE_ROUTE - 1] = 1,
84 #define IPV4_DEVCONF_DFLT(net, attr) \
85 IPV4_DEVCONF((*net->ipv4.devconf_dflt), attr)
87 static const struct nla_policy ifa_ipv4_policy[IFA_MAX+1] = {
88 [IFA_LOCAL] = { .type = NLA_U32 },
89 [IFA_ADDRESS] = { .type = NLA_U32 },
90 [IFA_BROADCAST] = { .type = NLA_U32 },
91 [IFA_LABEL] = { .type = NLA_STRING, .len = IFNAMSIZ - 1 },
94 static void rtmsg_ifa(int event, struct in_ifaddr *, struct nlmsghdr *, u32);
96 static BLOCKING_NOTIFIER_HEAD(inetaddr_chain);
97 static void inet_del_ifa(struct in_device *in_dev, struct in_ifaddr **ifap,
98 int destroy);
99 #ifdef CONFIG_SYSCTL
100 static void devinet_sysctl_register(struct in_device *idev);
101 static void devinet_sysctl_unregister(struct in_device *idev);
102 #else
103 static inline void devinet_sysctl_register(struct in_device *idev)
106 static inline void devinet_sysctl_unregister(struct in_device *idev)
109 #endif
111 /* Locks all the inet devices. */
113 static struct in_ifaddr *inet_alloc_ifa(void)
115 return kzalloc(sizeof(struct in_ifaddr), GFP_KERNEL);
118 static void inet_rcu_free_ifa(struct rcu_head *head)
120 struct in_ifaddr *ifa = container_of(head, struct in_ifaddr, rcu_head);
121 if (ifa->ifa_dev)
122 in_dev_put(ifa->ifa_dev);
123 kfree(ifa);
126 static inline void inet_free_ifa(struct in_ifaddr *ifa)
128 call_rcu(&ifa->rcu_head, inet_rcu_free_ifa);
131 void in_dev_finish_destroy(struct in_device *idev)
133 struct net_device *dev = idev->dev;
135 WARN_ON(idev->ifa_list);
136 WARN_ON(idev->mc_list);
137 #ifdef NET_REFCNT_DEBUG
138 printk(KERN_DEBUG "in_dev_finish_destroy: %p=%s\n",
139 idev, dev ? dev->name : "NIL");
140 #endif
141 dev_put(dev);
142 if (!idev->dead)
143 pr_err("Freeing alive in_device %p\n", idev);
144 else
145 kfree(idev);
147 EXPORT_SYMBOL(in_dev_finish_destroy);
149 static struct in_device *inetdev_init(struct net_device *dev)
151 struct in_device *in_dev;
153 ASSERT_RTNL();
155 in_dev = kzalloc(sizeof(*in_dev), GFP_KERNEL);
156 if (!in_dev)
157 goto out;
158 memcpy(&in_dev->cnf, dev_net(dev)->ipv4.devconf_dflt,
159 sizeof(in_dev->cnf));
160 in_dev->cnf.sysctl = NULL;
161 in_dev->dev = dev;
162 in_dev->arp_parms = neigh_parms_alloc(dev, &arp_tbl);
163 if (!in_dev->arp_parms)
164 goto out_kfree;
165 if (IPV4_DEVCONF(in_dev->cnf, FORWARDING))
166 dev_disable_lro(dev);
167 /* Reference in_dev->dev */
168 dev_hold(dev);
169 /* Account for reference dev->ip_ptr (below) */
170 in_dev_hold(in_dev);
172 devinet_sysctl_register(in_dev);
173 ip_mc_init_dev(in_dev);
174 if (dev->flags & IFF_UP)
175 ip_mc_up(in_dev);
177 /* we can receive as soon as ip_ptr is set -- do this last */
178 rcu_assign_pointer(dev->ip_ptr, in_dev);
179 out:
180 return in_dev;
181 out_kfree:
182 kfree(in_dev);
183 in_dev = NULL;
184 goto out;
187 static void in_dev_rcu_put(struct rcu_head *head)
189 struct in_device *idev = container_of(head, struct in_device, rcu_head);
190 in_dev_put(idev);
193 static void inetdev_destroy(struct in_device *in_dev)
195 struct in_ifaddr *ifa;
196 struct net_device *dev;
198 ASSERT_RTNL();
200 dev = in_dev->dev;
202 in_dev->dead = 1;
204 ip_mc_destroy_dev(in_dev);
206 while ((ifa = in_dev->ifa_list) != NULL) {
207 inet_del_ifa(in_dev, &in_dev->ifa_list, 0);
208 inet_free_ifa(ifa);
211 dev->ip_ptr = NULL;
213 devinet_sysctl_unregister(in_dev);
214 neigh_parms_release(&arp_tbl, in_dev->arp_parms);
215 arp_ifdown(dev);
217 call_rcu(&in_dev->rcu_head, in_dev_rcu_put);
220 int inet_addr_onlink(struct in_device *in_dev, __be32 a, __be32 b)
222 rcu_read_lock();
223 for_primary_ifa(in_dev) {
224 if (inet_ifa_match(a, ifa)) {
225 if (!b || inet_ifa_match(b, ifa)) {
226 rcu_read_unlock();
227 return 1;
230 } endfor_ifa(in_dev);
231 rcu_read_unlock();
232 return 0;
235 static void __inet_del_ifa(struct in_device *in_dev, struct in_ifaddr **ifap,
236 int destroy, struct nlmsghdr *nlh, u32 pid)
238 struct in_ifaddr *promote = NULL;
239 struct in_ifaddr *ifa, *ifa1 = *ifap;
240 struct in_ifaddr *last_prim = in_dev->ifa_list;
241 struct in_ifaddr *prev_prom = NULL;
242 int do_promote = IN_DEV_PROMOTE_SECONDARIES(in_dev);
244 ASSERT_RTNL();
246 /* 1. Deleting primary ifaddr forces deletion all secondaries
247 * unless alias promotion is set
250 if (!(ifa1->ifa_flags & IFA_F_SECONDARY)) {
251 struct in_ifaddr **ifap1 = &ifa1->ifa_next;
253 while ((ifa = *ifap1) != NULL) {
254 if (!(ifa->ifa_flags & IFA_F_SECONDARY) &&
255 ifa1->ifa_scope <= ifa->ifa_scope)
256 last_prim = ifa;
258 if (!(ifa->ifa_flags & IFA_F_SECONDARY) ||
259 ifa1->ifa_mask != ifa->ifa_mask ||
260 !inet_ifa_match(ifa1->ifa_address, ifa)) {
261 ifap1 = &ifa->ifa_next;
262 prev_prom = ifa;
263 continue;
266 if (!do_promote) {
267 *ifap1 = ifa->ifa_next;
269 rtmsg_ifa(RTM_DELADDR, ifa, nlh, pid);
270 blocking_notifier_call_chain(&inetaddr_chain,
271 NETDEV_DOWN, ifa);
272 inet_free_ifa(ifa);
273 } else {
274 promote = ifa;
275 break;
280 /* 2. Unlink it */
282 *ifap = ifa1->ifa_next;
284 /* 3. Announce address deletion */
286 /* Send message first, then call notifier.
287 At first sight, FIB update triggered by notifier
288 will refer to already deleted ifaddr, that could confuse
289 netlink listeners. It is not true: look, gated sees
290 that route deleted and if it still thinks that ifaddr
291 is valid, it will try to restore deleted routes... Grr.
292 So that, this order is correct.
294 rtmsg_ifa(RTM_DELADDR, ifa1, nlh, pid);
295 blocking_notifier_call_chain(&inetaddr_chain, NETDEV_DOWN, ifa1);
297 if (promote) {
299 if (prev_prom) {
300 prev_prom->ifa_next = promote->ifa_next;
301 promote->ifa_next = last_prim->ifa_next;
302 last_prim->ifa_next = promote;
305 promote->ifa_flags &= ~IFA_F_SECONDARY;
306 rtmsg_ifa(RTM_NEWADDR, promote, nlh, pid);
307 blocking_notifier_call_chain(&inetaddr_chain,
308 NETDEV_UP, promote);
309 for (ifa = promote->ifa_next; ifa; ifa = ifa->ifa_next) {
310 if (ifa1->ifa_mask != ifa->ifa_mask ||
311 !inet_ifa_match(ifa1->ifa_address, ifa))
312 continue;
313 fib_add_ifaddr(ifa);
317 if (destroy)
318 inet_free_ifa(ifa1);
321 static void inet_del_ifa(struct in_device *in_dev, struct in_ifaddr **ifap,
322 int destroy)
324 __inet_del_ifa(in_dev, ifap, destroy, NULL, 0);
327 static int __inet_insert_ifa(struct in_ifaddr *ifa, struct nlmsghdr *nlh,
328 u32 pid)
330 struct in_device *in_dev = ifa->ifa_dev;
331 struct in_ifaddr *ifa1, **ifap, **last_primary;
333 ASSERT_RTNL();
335 if (!ifa->ifa_local) {
336 inet_free_ifa(ifa);
337 return 0;
340 ifa->ifa_flags &= ~IFA_F_SECONDARY;
341 last_primary = &in_dev->ifa_list;
343 for (ifap = &in_dev->ifa_list; (ifa1 = *ifap) != NULL;
344 ifap = &ifa1->ifa_next) {
345 if (!(ifa1->ifa_flags & IFA_F_SECONDARY) &&
346 ifa->ifa_scope <= ifa1->ifa_scope)
347 last_primary = &ifa1->ifa_next;
348 if (ifa1->ifa_mask == ifa->ifa_mask &&
349 inet_ifa_match(ifa1->ifa_address, ifa)) {
350 if (ifa1->ifa_local == ifa->ifa_local) {
351 inet_free_ifa(ifa);
352 return -EEXIST;
354 if (ifa1->ifa_scope != ifa->ifa_scope) {
355 inet_free_ifa(ifa);
356 return -EINVAL;
358 ifa->ifa_flags |= IFA_F_SECONDARY;
362 if (!(ifa->ifa_flags & IFA_F_SECONDARY)) {
363 net_srandom(ifa->ifa_local);
364 ifap = last_primary;
367 ifa->ifa_next = *ifap;
368 *ifap = ifa;
370 /* Send message first, then call notifier.
371 Notifier will trigger FIB update, so that
372 listeners of netlink will know about new ifaddr */
373 rtmsg_ifa(RTM_NEWADDR, ifa, nlh, pid);
374 blocking_notifier_call_chain(&inetaddr_chain, NETDEV_UP, ifa);
376 return 0;
379 static int inet_insert_ifa(struct in_ifaddr *ifa)
381 return __inet_insert_ifa(ifa, NULL, 0);
384 static int inet_set_ifa(struct net_device *dev, struct in_ifaddr *ifa)
386 struct in_device *in_dev = __in_dev_get_rtnl(dev);
388 ASSERT_RTNL();
390 if (!in_dev) {
391 inet_free_ifa(ifa);
392 return -ENOBUFS;
394 ipv4_devconf_setall(in_dev);
395 if (ifa->ifa_dev != in_dev) {
396 WARN_ON(ifa->ifa_dev);
397 in_dev_hold(in_dev);
398 ifa->ifa_dev = in_dev;
400 if (ipv4_is_loopback(ifa->ifa_local))
401 ifa->ifa_scope = RT_SCOPE_HOST;
402 return inet_insert_ifa(ifa);
405 struct in_device *inetdev_by_index(struct net *net, int ifindex)
407 struct net_device *dev;
408 struct in_device *in_dev = NULL;
410 rcu_read_lock();
411 dev = dev_get_by_index_rcu(net, ifindex);
412 if (dev)
413 in_dev = in_dev_get(dev);
414 rcu_read_unlock();
415 return in_dev;
417 EXPORT_SYMBOL(inetdev_by_index);
419 /* Called only from RTNL semaphored context. No locks. */
421 struct in_ifaddr *inet_ifa_byprefix(struct in_device *in_dev, __be32 prefix,
422 __be32 mask)
424 ASSERT_RTNL();
426 for_primary_ifa(in_dev) {
427 if (ifa->ifa_mask == mask && inet_ifa_match(prefix, ifa))
428 return ifa;
429 } endfor_ifa(in_dev);
430 return NULL;
433 static int inet_rtm_deladdr(struct sk_buff *skb, struct nlmsghdr *nlh, void *arg)
435 struct net *net = sock_net(skb->sk);
436 struct nlattr *tb[IFA_MAX+1];
437 struct in_device *in_dev;
438 struct ifaddrmsg *ifm;
439 struct in_ifaddr *ifa, **ifap;
440 int err = -EINVAL;
442 ASSERT_RTNL();
444 err = nlmsg_parse(nlh, sizeof(*ifm), tb, IFA_MAX, ifa_ipv4_policy);
445 if (err < 0)
446 goto errout;
448 ifm = nlmsg_data(nlh);
449 in_dev = inetdev_by_index(net, ifm->ifa_index);
450 if (in_dev == NULL) {
451 err = -ENODEV;
452 goto errout;
455 __in_dev_put(in_dev);
457 for (ifap = &in_dev->ifa_list; (ifa = *ifap) != NULL;
458 ifap = &ifa->ifa_next) {
459 if (tb[IFA_LOCAL] &&
460 ifa->ifa_local != nla_get_be32(tb[IFA_LOCAL]))
461 continue;
463 if (tb[IFA_LABEL] && nla_strcmp(tb[IFA_LABEL], ifa->ifa_label))
464 continue;
466 if (tb[IFA_ADDRESS] &&
467 (ifm->ifa_prefixlen != ifa->ifa_prefixlen ||
468 !inet_ifa_match(nla_get_be32(tb[IFA_ADDRESS]), ifa)))
469 continue;
471 __inet_del_ifa(in_dev, ifap, 1, nlh, NETLINK_CB(skb).pid);
472 return 0;
475 err = -EADDRNOTAVAIL;
476 errout:
477 return err;
480 static struct in_ifaddr *rtm_to_ifaddr(struct net *net, struct nlmsghdr *nlh)
482 struct nlattr *tb[IFA_MAX+1];
483 struct in_ifaddr *ifa;
484 struct ifaddrmsg *ifm;
485 struct net_device *dev;
486 struct in_device *in_dev;
487 int err;
489 err = nlmsg_parse(nlh, sizeof(*ifm), tb, IFA_MAX, ifa_ipv4_policy);
490 if (err < 0)
491 goto errout;
493 ifm = nlmsg_data(nlh);
494 err = -EINVAL;
495 if (ifm->ifa_prefixlen > 32 || tb[IFA_LOCAL] == NULL)
496 goto errout;
498 dev = __dev_get_by_index(net, ifm->ifa_index);
499 err = -ENODEV;
500 if (dev == NULL)
501 goto errout;
503 in_dev = __in_dev_get_rtnl(dev);
504 err = -ENOBUFS;
505 if (in_dev == NULL)
506 goto errout;
508 ifa = inet_alloc_ifa();
509 if (ifa == NULL)
511 * A potential indev allocation can be left alive, it stays
512 * assigned to its device and is destroy with it.
514 goto errout;
516 ipv4_devconf_setall(in_dev);
517 in_dev_hold(in_dev);
519 if (tb[IFA_ADDRESS] == NULL)
520 tb[IFA_ADDRESS] = tb[IFA_LOCAL];
522 ifa->ifa_prefixlen = ifm->ifa_prefixlen;
523 ifa->ifa_mask = inet_make_mask(ifm->ifa_prefixlen);
524 ifa->ifa_flags = ifm->ifa_flags;
525 ifa->ifa_scope = ifm->ifa_scope;
526 ifa->ifa_dev = in_dev;
528 ifa->ifa_local = nla_get_be32(tb[IFA_LOCAL]);
529 ifa->ifa_address = nla_get_be32(tb[IFA_ADDRESS]);
531 if (tb[IFA_BROADCAST])
532 ifa->ifa_broadcast = nla_get_be32(tb[IFA_BROADCAST]);
534 if (tb[IFA_LABEL])
535 nla_strlcpy(ifa->ifa_label, tb[IFA_LABEL], IFNAMSIZ);
536 else
537 memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
539 return ifa;
541 errout:
542 return ERR_PTR(err);
545 static int inet_rtm_newaddr(struct sk_buff *skb, struct nlmsghdr *nlh, void *arg)
547 struct net *net = sock_net(skb->sk);
548 struct in_ifaddr *ifa;
550 ASSERT_RTNL();
552 ifa = rtm_to_ifaddr(net, nlh);
553 if (IS_ERR(ifa))
554 return PTR_ERR(ifa);
556 return __inet_insert_ifa(ifa, nlh, NETLINK_CB(skb).pid);
560 * Determine a default network mask, based on the IP address.
563 static inline int inet_abc_len(__be32 addr)
565 int rc = -1; /* Something else, probably a multicast. */
567 if (ipv4_is_zeronet(addr))
568 rc = 0;
569 else {
570 __u32 haddr = ntohl(addr);
572 if (IN_CLASSA(haddr))
573 rc = 8;
574 else if (IN_CLASSB(haddr))
575 rc = 16;
576 else if (IN_CLASSC(haddr))
577 rc = 24;
580 return rc;
584 int devinet_ioctl(struct net *net, unsigned int cmd, void __user *arg)
586 struct ifreq ifr;
587 struct sockaddr_in sin_orig;
588 struct sockaddr_in *sin = (struct sockaddr_in *)&ifr.ifr_addr;
589 struct in_device *in_dev;
590 struct in_ifaddr **ifap = NULL;
591 struct in_ifaddr *ifa = NULL;
592 struct net_device *dev;
593 char *colon;
594 int ret = -EFAULT;
595 int tryaddrmatch = 0;
598 * Fetch the caller's info block into kernel space
601 if (copy_from_user(&ifr, arg, sizeof(struct ifreq)))
602 goto out;
603 ifr.ifr_name[IFNAMSIZ - 1] = 0;
605 /* save original address for comparison */
606 memcpy(&sin_orig, sin, sizeof(*sin));
608 colon = strchr(ifr.ifr_name, ':');
609 if (colon)
610 *colon = 0;
612 dev_load(net, ifr.ifr_name);
614 switch (cmd) {
615 case SIOCGIFADDR: /* Get interface address */
616 case SIOCGIFBRDADDR: /* Get the broadcast address */
617 case SIOCGIFDSTADDR: /* Get the destination address */
618 case SIOCGIFNETMASK: /* Get the netmask for the interface */
619 /* Note that these ioctls will not sleep,
620 so that we do not impose a lock.
621 One day we will be forced to put shlock here (I mean SMP)
623 tryaddrmatch = (sin_orig.sin_family == AF_INET);
624 memset(sin, 0, sizeof(*sin));
625 sin->sin_family = AF_INET;
626 break;
628 case SIOCSIFFLAGS:
629 ret = -EACCES;
630 if (!capable(CAP_NET_ADMIN))
631 goto out;
632 break;
633 case SIOCSIFADDR: /* Set interface address (and family) */
634 case SIOCSIFBRDADDR: /* Set the broadcast address */
635 case SIOCSIFDSTADDR: /* Set the destination address */
636 case SIOCSIFNETMASK: /* Set the netmask for the interface */
637 ret = -EACCES;
638 if (!capable(CAP_NET_ADMIN))
639 goto out;
640 ret = -EINVAL;
641 if (sin->sin_family != AF_INET)
642 goto out;
643 break;
644 default:
645 ret = -EINVAL;
646 goto out;
649 rtnl_lock();
651 ret = -ENODEV;
652 dev = __dev_get_by_name(net, ifr.ifr_name);
653 if (!dev)
654 goto done;
656 if (colon)
657 *colon = ':';
659 in_dev = __in_dev_get_rtnl(dev);
660 if (in_dev) {
661 if (tryaddrmatch) {
662 /* Matthias Andree */
663 /* compare label and address (4.4BSD style) */
664 /* note: we only do this for a limited set of ioctls
665 and only if the original address family was AF_INET.
666 This is checked above. */
667 for (ifap = &in_dev->ifa_list; (ifa = *ifap) != NULL;
668 ifap = &ifa->ifa_next) {
669 if (!strcmp(ifr.ifr_name, ifa->ifa_label) &&
670 sin_orig.sin_addr.s_addr ==
671 ifa->ifa_address) {
672 break; /* found */
676 /* we didn't get a match, maybe the application is
677 4.3BSD-style and passed in junk so we fall back to
678 comparing just the label */
679 if (!ifa) {
680 for (ifap = &in_dev->ifa_list; (ifa = *ifap) != NULL;
681 ifap = &ifa->ifa_next)
682 if (!strcmp(ifr.ifr_name, ifa->ifa_label))
683 break;
687 ret = -EADDRNOTAVAIL;
688 if (!ifa && cmd != SIOCSIFADDR && cmd != SIOCSIFFLAGS)
689 goto done;
691 switch (cmd) {
692 case SIOCGIFADDR: /* Get interface address */
693 sin->sin_addr.s_addr = ifa->ifa_local;
694 goto rarok;
696 case SIOCGIFBRDADDR: /* Get the broadcast address */
697 sin->sin_addr.s_addr = ifa->ifa_broadcast;
698 goto rarok;
700 case SIOCGIFDSTADDR: /* Get the destination address */
701 sin->sin_addr.s_addr = ifa->ifa_address;
702 goto rarok;
704 case SIOCGIFNETMASK: /* Get the netmask for the interface */
705 sin->sin_addr.s_addr = ifa->ifa_mask;
706 goto rarok;
708 case SIOCSIFFLAGS:
709 if (colon) {
710 ret = -EADDRNOTAVAIL;
711 if (!ifa)
712 break;
713 ret = 0;
714 if (!(ifr.ifr_flags & IFF_UP))
715 inet_del_ifa(in_dev, ifap, 1);
716 break;
718 ret = dev_change_flags(dev, ifr.ifr_flags);
719 break;
721 case SIOCSIFADDR: /* Set interface address (and family) */
722 ret = -EINVAL;
723 if (inet_abc_len(sin->sin_addr.s_addr) < 0)
724 break;
726 if (!ifa) {
727 ret = -ENOBUFS;
728 ifa = inet_alloc_ifa();
729 if (!ifa)
730 break;
731 if (colon)
732 memcpy(ifa->ifa_label, ifr.ifr_name, IFNAMSIZ);
733 else
734 memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
735 } else {
736 ret = 0;
737 if (ifa->ifa_local == sin->sin_addr.s_addr)
738 break;
739 inet_del_ifa(in_dev, ifap, 0);
740 ifa->ifa_broadcast = 0;
741 ifa->ifa_scope = 0;
744 ifa->ifa_address = ifa->ifa_local = sin->sin_addr.s_addr;
746 if (!(dev->flags & IFF_POINTOPOINT)) {
747 ifa->ifa_prefixlen = inet_abc_len(ifa->ifa_address);
748 ifa->ifa_mask = inet_make_mask(ifa->ifa_prefixlen);
749 if ((dev->flags & IFF_BROADCAST) &&
750 ifa->ifa_prefixlen < 31)
751 ifa->ifa_broadcast = ifa->ifa_address |
752 ~ifa->ifa_mask;
753 } else {
754 ifa->ifa_prefixlen = 32;
755 ifa->ifa_mask = inet_make_mask(32);
757 ret = inet_set_ifa(dev, ifa);
758 break;
760 case SIOCSIFBRDADDR: /* Set the broadcast address */
761 ret = 0;
762 if (ifa->ifa_broadcast != sin->sin_addr.s_addr) {
763 inet_del_ifa(in_dev, ifap, 0);
764 ifa->ifa_broadcast = sin->sin_addr.s_addr;
765 inet_insert_ifa(ifa);
767 break;
769 case SIOCSIFDSTADDR: /* Set the destination address */
770 ret = 0;
771 if (ifa->ifa_address == sin->sin_addr.s_addr)
772 break;
773 ret = -EINVAL;
774 if (inet_abc_len(sin->sin_addr.s_addr) < 0)
775 break;
776 ret = 0;
777 inet_del_ifa(in_dev, ifap, 0);
778 ifa->ifa_address = sin->sin_addr.s_addr;
779 inet_insert_ifa(ifa);
780 break;
782 case SIOCSIFNETMASK: /* Set the netmask for the interface */
785 * The mask we set must be legal.
787 ret = -EINVAL;
788 if (bad_mask(sin->sin_addr.s_addr, 0))
789 break;
790 ret = 0;
791 if (ifa->ifa_mask != sin->sin_addr.s_addr) {
792 __be32 old_mask = ifa->ifa_mask;
793 inet_del_ifa(in_dev, ifap, 0);
794 ifa->ifa_mask = sin->sin_addr.s_addr;
795 ifa->ifa_prefixlen = inet_mask_len(ifa->ifa_mask);
797 /* See if current broadcast address matches
798 * with current netmask, then recalculate
799 * the broadcast address. Otherwise it's a
800 * funny address, so don't touch it since
801 * the user seems to know what (s)he's doing...
803 if ((dev->flags & IFF_BROADCAST) &&
804 (ifa->ifa_prefixlen < 31) &&
805 (ifa->ifa_broadcast ==
806 (ifa->ifa_local|~old_mask))) {
807 ifa->ifa_broadcast = (ifa->ifa_local |
808 ~sin->sin_addr.s_addr);
810 inet_insert_ifa(ifa);
812 break;
814 done:
815 rtnl_unlock();
816 out:
817 return ret;
818 rarok:
819 rtnl_unlock();
820 ret = copy_to_user(arg, &ifr, sizeof(struct ifreq)) ? -EFAULT : 0;
821 goto out;
824 static int inet_gifconf(struct net_device *dev, char __user *buf, int len)
826 struct in_device *in_dev = __in_dev_get_rtnl(dev);
827 struct in_ifaddr *ifa;
828 struct ifreq ifr;
829 int done = 0;
831 if (!in_dev)
832 goto out;
834 for (ifa = in_dev->ifa_list; ifa; ifa = ifa->ifa_next) {
835 if (!buf) {
836 done += sizeof(ifr);
837 continue;
839 if (len < (int) sizeof(ifr))
840 break;
841 memset(&ifr, 0, sizeof(struct ifreq));
842 if (ifa->ifa_label)
843 strcpy(ifr.ifr_name, ifa->ifa_label);
844 else
845 strcpy(ifr.ifr_name, dev->name);
847 (*(struct sockaddr_in *)&ifr.ifr_addr).sin_family = AF_INET;
848 (*(struct sockaddr_in *)&ifr.ifr_addr).sin_addr.s_addr =
849 ifa->ifa_local;
851 if (copy_to_user(buf, &ifr, sizeof(struct ifreq))) {
852 done = -EFAULT;
853 break;
855 buf += sizeof(struct ifreq);
856 len -= sizeof(struct ifreq);
857 done += sizeof(struct ifreq);
859 out:
860 return done;
863 __be32 inet_select_addr(const struct net_device *dev, __be32 dst, int scope)
865 __be32 addr = 0;
866 struct in_device *in_dev;
867 struct net *net = dev_net(dev);
869 rcu_read_lock();
870 in_dev = __in_dev_get_rcu(dev);
871 if (!in_dev)
872 goto no_in_dev;
874 for_primary_ifa(in_dev) {
875 if (ifa->ifa_scope > scope)
876 continue;
877 if (!dst || inet_ifa_match(dst, ifa)) {
878 addr = ifa->ifa_local;
879 break;
881 if (!addr)
882 addr = ifa->ifa_local;
883 } endfor_ifa(in_dev);
885 if (addr)
886 goto out_unlock;
887 no_in_dev:
889 /* Not loopback addresses on loopback should be preferred
890 in this case. It is importnat that lo is the first interface
891 in dev_base list.
893 for_each_netdev_rcu(net, dev) {
894 in_dev = __in_dev_get_rcu(dev);
895 if (!in_dev)
896 continue;
898 for_primary_ifa(in_dev) {
899 if (ifa->ifa_scope != RT_SCOPE_LINK &&
900 ifa->ifa_scope <= scope) {
901 addr = ifa->ifa_local;
902 goto out_unlock;
904 } endfor_ifa(in_dev);
906 out_unlock:
907 rcu_read_unlock();
908 return addr;
910 EXPORT_SYMBOL(inet_select_addr);
912 static __be32 confirm_addr_indev(struct in_device *in_dev, __be32 dst,
913 __be32 local, int scope)
915 int same = 0;
916 __be32 addr = 0;
918 for_ifa(in_dev) {
919 if (!addr &&
920 (local == ifa->ifa_local || !local) &&
921 ifa->ifa_scope <= scope) {
922 addr = ifa->ifa_local;
923 if (same)
924 break;
926 if (!same) {
927 same = (!local || inet_ifa_match(local, ifa)) &&
928 (!dst || inet_ifa_match(dst, ifa));
929 if (same && addr) {
930 if (local || !dst)
931 break;
932 /* Is the selected addr into dst subnet? */
933 if (inet_ifa_match(addr, ifa))
934 break;
935 /* No, then can we use new local src? */
936 if (ifa->ifa_scope <= scope) {
937 addr = ifa->ifa_local;
938 break;
940 /* search for large dst subnet for addr */
941 same = 0;
944 } endfor_ifa(in_dev);
946 return same ? addr : 0;
950 * Confirm that local IP address exists using wildcards:
951 * - in_dev: only on this interface, 0=any interface
952 * - dst: only in the same subnet as dst, 0=any dst
953 * - local: address, 0=autoselect the local address
954 * - scope: maximum allowed scope value for the local address
956 __be32 inet_confirm_addr(struct in_device *in_dev,
957 __be32 dst, __be32 local, int scope)
959 __be32 addr = 0;
960 struct net_device *dev;
961 struct net *net;
963 if (scope != RT_SCOPE_LINK)
964 return confirm_addr_indev(in_dev, dst, local, scope);
966 net = dev_net(in_dev->dev);
967 rcu_read_lock();
968 for_each_netdev_rcu(net, dev) {
969 in_dev = __in_dev_get_rcu(dev);
970 if (in_dev) {
971 addr = confirm_addr_indev(in_dev, dst, local, scope);
972 if (addr)
973 break;
976 rcu_read_unlock();
978 return addr;
982 * Device notifier
985 int register_inetaddr_notifier(struct notifier_block *nb)
987 return blocking_notifier_chain_register(&inetaddr_chain, nb);
989 EXPORT_SYMBOL(register_inetaddr_notifier);
991 int unregister_inetaddr_notifier(struct notifier_block *nb)
993 return blocking_notifier_chain_unregister(&inetaddr_chain, nb);
995 EXPORT_SYMBOL(unregister_inetaddr_notifier);
997 /* Rename ifa_labels for a device name change. Make some effort to preserve
998 * existing alias numbering and to create unique labels if possible.
1000 static void inetdev_changename(struct net_device *dev, struct in_device *in_dev)
1002 struct in_ifaddr *ifa;
1003 int named = 0;
1005 for (ifa = in_dev->ifa_list; ifa; ifa = ifa->ifa_next) {
1006 char old[IFNAMSIZ], *dot;
1008 memcpy(old, ifa->ifa_label, IFNAMSIZ);
1009 memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
1010 if (named++ == 0)
1011 goto skip;
1012 dot = strchr(old, ':');
1013 if (dot == NULL) {
1014 sprintf(old, ":%d", named);
1015 dot = old;
1017 if (strlen(dot) + strlen(dev->name) < IFNAMSIZ)
1018 strcat(ifa->ifa_label, dot);
1019 else
1020 strcpy(ifa->ifa_label + (IFNAMSIZ - strlen(dot) - 1), dot);
1021 skip:
1022 rtmsg_ifa(RTM_NEWADDR, ifa, NULL, 0);
1026 static inline bool inetdev_valid_mtu(unsigned mtu)
1028 return mtu >= 68;
1031 /* Called only under RTNL semaphore */
1033 static int inetdev_event(struct notifier_block *this, unsigned long event,
1034 void *ptr)
1036 struct net_device *dev = ptr;
1037 struct in_device *in_dev = __in_dev_get_rtnl(dev);
1039 ASSERT_RTNL();
1041 if (!in_dev) {
1042 if (event == NETDEV_REGISTER) {
1043 in_dev = inetdev_init(dev);
1044 if (!in_dev)
1045 return notifier_from_errno(-ENOMEM);
1046 if (dev->flags & IFF_LOOPBACK) {
1047 IN_DEV_CONF_SET(in_dev, NOXFRM, 1);
1048 IN_DEV_CONF_SET(in_dev, NOPOLICY, 1);
1050 } else if (event == NETDEV_CHANGEMTU) {
1051 /* Re-enabling IP */
1052 if (inetdev_valid_mtu(dev->mtu))
1053 in_dev = inetdev_init(dev);
1055 goto out;
1058 switch (event) {
1059 case NETDEV_REGISTER:
1060 printk(KERN_DEBUG "inetdev_event: bug\n");
1061 dev->ip_ptr = NULL;
1062 break;
1063 case NETDEV_UP:
1064 if (!inetdev_valid_mtu(dev->mtu))
1065 break;
1066 if (dev->flags & IFF_LOOPBACK) {
1067 struct in_ifaddr *ifa = inet_alloc_ifa();
1069 if (ifa) {
1070 ifa->ifa_local =
1071 ifa->ifa_address = htonl(INADDR_LOOPBACK);
1072 ifa->ifa_prefixlen = 8;
1073 ifa->ifa_mask = inet_make_mask(8);
1074 in_dev_hold(in_dev);
1075 ifa->ifa_dev = in_dev;
1076 ifa->ifa_scope = RT_SCOPE_HOST;
1077 memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
1078 inet_insert_ifa(ifa);
1081 ip_mc_up(in_dev);
1082 /* fall through */
1083 case NETDEV_CHANGEADDR:
1084 /* Send gratuitous ARP to notify of link change */
1085 if (IN_DEV_ARP_NOTIFY(in_dev)) {
1086 struct in_ifaddr *ifa = in_dev->ifa_list;
1088 if (ifa)
1089 arp_send(ARPOP_REQUEST, ETH_P_ARP,
1090 ifa->ifa_address, dev,
1091 ifa->ifa_address, NULL,
1092 dev->dev_addr, NULL);
1094 break;
1095 case NETDEV_DOWN:
1096 ip_mc_down(in_dev);
1097 break;
1098 case NETDEV_BONDING_OLDTYPE:
1099 ip_mc_unmap(in_dev);
1100 break;
1101 case NETDEV_BONDING_NEWTYPE:
1102 ip_mc_remap(in_dev);
1103 break;
1104 case NETDEV_CHANGEMTU:
1105 if (inetdev_valid_mtu(dev->mtu))
1106 break;
1107 /* disable IP when MTU is not enough */
1108 case NETDEV_UNREGISTER:
1109 inetdev_destroy(in_dev);
1110 break;
1111 case NETDEV_CHANGENAME:
1112 /* Do not notify about label change, this event is
1113 * not interesting to applications using netlink.
1115 inetdev_changename(dev, in_dev);
1117 devinet_sysctl_unregister(in_dev);
1118 devinet_sysctl_register(in_dev);
1119 break;
1121 out:
1122 return NOTIFY_DONE;
1125 static struct notifier_block ip_netdev_notifier = {
1126 .notifier_call = inetdev_event,
1129 static inline size_t inet_nlmsg_size(void)
1131 return NLMSG_ALIGN(sizeof(struct ifaddrmsg))
1132 + nla_total_size(4) /* IFA_ADDRESS */
1133 + nla_total_size(4) /* IFA_LOCAL */
1134 + nla_total_size(4) /* IFA_BROADCAST */
1135 + nla_total_size(IFNAMSIZ); /* IFA_LABEL */
1138 static int inet_fill_ifaddr(struct sk_buff *skb, struct in_ifaddr *ifa,
1139 u32 pid, u32 seq, int event, unsigned int flags)
1141 struct ifaddrmsg *ifm;
1142 struct nlmsghdr *nlh;
1144 nlh = nlmsg_put(skb, pid, seq, event, sizeof(*ifm), flags);
1145 if (nlh == NULL)
1146 return -EMSGSIZE;
1148 ifm = nlmsg_data(nlh);
1149 ifm->ifa_family = AF_INET;
1150 ifm->ifa_prefixlen = ifa->ifa_prefixlen;
1151 ifm->ifa_flags = ifa->ifa_flags|IFA_F_PERMANENT;
1152 ifm->ifa_scope = ifa->ifa_scope;
1153 ifm->ifa_index = ifa->ifa_dev->dev->ifindex;
1155 if (ifa->ifa_address)
1156 NLA_PUT_BE32(skb, IFA_ADDRESS, ifa->ifa_address);
1158 if (ifa->ifa_local)
1159 NLA_PUT_BE32(skb, IFA_LOCAL, ifa->ifa_local);
1161 if (ifa->ifa_broadcast)
1162 NLA_PUT_BE32(skb, IFA_BROADCAST, ifa->ifa_broadcast);
1164 if (ifa->ifa_label[0])
1165 NLA_PUT_STRING(skb, IFA_LABEL, ifa->ifa_label);
1167 return nlmsg_end(skb, nlh);
1169 nla_put_failure:
1170 nlmsg_cancel(skb, nlh);
1171 return -EMSGSIZE;
1174 static int inet_dump_ifaddr(struct sk_buff *skb, struct netlink_callback *cb)
1176 struct net *net = sock_net(skb->sk);
1177 int h, s_h;
1178 int idx, s_idx;
1179 int ip_idx, s_ip_idx;
1180 struct net_device *dev;
1181 struct in_device *in_dev;
1182 struct in_ifaddr *ifa;
1183 struct hlist_head *head;
1184 struct hlist_node *node;
1186 s_h = cb->args[0];
1187 s_idx = idx = cb->args[1];
1188 s_ip_idx = ip_idx = cb->args[2];
1190 for (h = s_h; h < NETDEV_HASHENTRIES; h++, s_idx = 0) {
1191 idx = 0;
1192 head = &net->dev_index_head[h];
1193 rcu_read_lock();
1194 hlist_for_each_entry_rcu(dev, node, head, index_hlist) {
1195 if (idx < s_idx)
1196 goto cont;
1197 if (idx > s_idx)
1198 s_ip_idx = 0;
1199 in_dev = __in_dev_get_rcu(dev);
1200 if (!in_dev)
1201 goto cont;
1203 for (ifa = in_dev->ifa_list, ip_idx = 0; ifa;
1204 ifa = ifa->ifa_next, ip_idx++) {
1205 if (ip_idx < s_ip_idx)
1206 continue;
1207 if (inet_fill_ifaddr(skb, ifa,
1208 NETLINK_CB(cb->skb).pid,
1209 cb->nlh->nlmsg_seq,
1210 RTM_NEWADDR, NLM_F_MULTI) <= 0) {
1211 rcu_read_unlock();
1212 goto done;
1215 cont:
1216 idx++;
1218 rcu_read_unlock();
1221 done:
1222 cb->args[0] = h;
1223 cb->args[1] = idx;
1224 cb->args[2] = ip_idx;
1226 return skb->len;
1229 static void rtmsg_ifa(int event, struct in_ifaddr *ifa, struct nlmsghdr *nlh,
1230 u32 pid)
1232 struct sk_buff *skb;
1233 u32 seq = nlh ? nlh->nlmsg_seq : 0;
1234 int err = -ENOBUFS;
1235 struct net *net;
1237 net = dev_net(ifa->ifa_dev->dev);
1238 skb = nlmsg_new(inet_nlmsg_size(), GFP_KERNEL);
1239 if (skb == NULL)
1240 goto errout;
1242 err = inet_fill_ifaddr(skb, ifa, pid, seq, event, 0);
1243 if (err < 0) {
1244 /* -EMSGSIZE implies BUG in inet_nlmsg_size() */
1245 WARN_ON(err == -EMSGSIZE);
1246 kfree_skb(skb);
1247 goto errout;
1249 rtnl_notify(skb, net, pid, RTNLGRP_IPV4_IFADDR, nlh, GFP_KERNEL);
1250 return;
1251 errout:
1252 if (err < 0)
1253 rtnl_set_sk_err(net, RTNLGRP_IPV4_IFADDR, err);
1256 #ifdef CONFIG_SYSCTL
1258 static void devinet_copy_dflt_conf(struct net *net, int i)
1260 struct net_device *dev;
1262 rcu_read_lock();
1263 for_each_netdev_rcu(net, dev) {
1264 struct in_device *in_dev;
1266 in_dev = __in_dev_get_rcu(dev);
1267 if (in_dev && !test_bit(i, in_dev->cnf.state))
1268 in_dev->cnf.data[i] = net->ipv4.devconf_dflt->data[i];
1270 rcu_read_unlock();
1273 /* called with RTNL locked */
1274 static void inet_forward_change(struct net *net)
1276 struct net_device *dev;
1277 int on = IPV4_DEVCONF_ALL(net, FORWARDING);
1279 IPV4_DEVCONF_ALL(net, ACCEPT_REDIRECTS) = !on;
1280 IPV4_DEVCONF_DFLT(net, FORWARDING) = on;
1282 for_each_netdev(net, dev) {
1283 struct in_device *in_dev;
1284 if (on)
1285 dev_disable_lro(dev);
1286 rcu_read_lock();
1287 in_dev = __in_dev_get_rcu(dev);
1288 if (in_dev)
1289 IN_DEV_CONF_SET(in_dev, FORWARDING, on);
1290 rcu_read_unlock();
1294 static int devinet_conf_proc(ctl_table *ctl, int write,
1295 void __user *buffer,
1296 size_t *lenp, loff_t *ppos)
1298 int ret = proc_dointvec(ctl, write, buffer, lenp, ppos);
1300 if (write) {
1301 struct ipv4_devconf *cnf = ctl->extra1;
1302 struct net *net = ctl->extra2;
1303 int i = (int *)ctl->data - cnf->data;
1305 set_bit(i, cnf->state);
1307 if (cnf == net->ipv4.devconf_dflt)
1308 devinet_copy_dflt_conf(net, i);
1311 return ret;
1314 static int devinet_conf_sysctl(ctl_table *table,
1315 void __user *oldval, size_t __user *oldlenp,
1316 void __user *newval, size_t newlen)
1318 struct ipv4_devconf *cnf;
1319 struct net *net;
1320 int *valp = table->data;
1321 int new;
1322 int i;
1324 if (!newval || !newlen)
1325 return 0;
1327 if (newlen != sizeof(int))
1328 return -EINVAL;
1330 if (get_user(new, (int __user *)newval))
1331 return -EFAULT;
1333 if (new == *valp)
1334 return 0;
1336 if (oldval && oldlenp) {
1337 size_t len;
1339 if (get_user(len, oldlenp))
1340 return -EFAULT;
1342 if (len) {
1343 if (len > table->maxlen)
1344 len = table->maxlen;
1345 if (copy_to_user(oldval, valp, len))
1346 return -EFAULT;
1347 if (put_user(len, oldlenp))
1348 return -EFAULT;
1352 *valp = new;
1354 cnf = table->extra1;
1355 net = table->extra2;
1356 i = (int *)table->data - cnf->data;
1358 set_bit(i, cnf->state);
1360 if (cnf == net->ipv4.devconf_dflt)
1361 devinet_copy_dflt_conf(net, i);
1363 return 1;
1366 static int devinet_sysctl_forward(ctl_table *ctl, int write,
1367 void __user *buffer,
1368 size_t *lenp, loff_t *ppos)
1370 int *valp = ctl->data;
1371 int val = *valp;
1372 int ret = proc_dointvec(ctl, write, buffer, lenp, ppos);
1374 if (write && *valp != val) {
1375 struct net *net = ctl->extra2;
1377 if (valp != &IPV4_DEVCONF_DFLT(net, FORWARDING)) {
1378 if (!rtnl_trylock())
1379 return restart_syscall();
1380 if (valp == &IPV4_DEVCONF_ALL(net, FORWARDING)) {
1381 inet_forward_change(net);
1382 } else if (*valp) {
1383 struct ipv4_devconf *cnf = ctl->extra1;
1384 struct in_device *idev =
1385 container_of(cnf, struct in_device, cnf);
1386 dev_disable_lro(idev->dev);
1388 rtnl_unlock();
1389 rt_cache_flush(net, 0);
1393 return ret;
1396 int ipv4_doint_and_flush(ctl_table *ctl, int write,
1397 void __user *buffer,
1398 size_t *lenp, loff_t *ppos)
1400 int *valp = ctl->data;
1401 int val = *valp;
1402 int ret = proc_dointvec(ctl, write, buffer, lenp, ppos);
1403 struct net *net = ctl->extra2;
1405 if (write && *valp != val)
1406 rt_cache_flush(net, 0);
1408 return ret;
1411 int ipv4_doint_and_flush_strategy(ctl_table *table,
1412 void __user *oldval, size_t __user *oldlenp,
1413 void __user *newval, size_t newlen)
1415 int ret = devinet_conf_sysctl(table, oldval, oldlenp, newval, newlen);
1416 struct net *net = table->extra2;
1418 if (ret == 1)
1419 rt_cache_flush(net, 0);
1421 return ret;
1425 #define DEVINET_SYSCTL_ENTRY(attr, name, mval, proc, sysctl) \
1427 .ctl_name = NET_IPV4_CONF_ ## attr, \
1428 .procname = name, \
1429 .data = ipv4_devconf.data + \
1430 NET_IPV4_CONF_ ## attr - 1, \
1431 .maxlen = sizeof(int), \
1432 .mode = mval, \
1433 .proc_handler = proc, \
1434 .strategy = sysctl, \
1435 .extra1 = &ipv4_devconf, \
1438 #define DEVINET_SYSCTL_RW_ENTRY(attr, name) \
1439 DEVINET_SYSCTL_ENTRY(attr, name, 0644, devinet_conf_proc, \
1440 devinet_conf_sysctl)
1442 #define DEVINET_SYSCTL_RO_ENTRY(attr, name) \
1443 DEVINET_SYSCTL_ENTRY(attr, name, 0444, devinet_conf_proc, \
1444 devinet_conf_sysctl)
1446 #define DEVINET_SYSCTL_COMPLEX_ENTRY(attr, name, proc, sysctl) \
1447 DEVINET_SYSCTL_ENTRY(attr, name, 0644, proc, sysctl)
1449 #define DEVINET_SYSCTL_FLUSHING_ENTRY(attr, name) \
1450 DEVINET_SYSCTL_COMPLEX_ENTRY(attr, name, ipv4_doint_and_flush, \
1451 ipv4_doint_and_flush_strategy)
1453 static struct devinet_sysctl_table {
1454 struct ctl_table_header *sysctl_header;
1455 struct ctl_table devinet_vars[__NET_IPV4_CONF_MAX];
1456 char *dev_name;
1457 } devinet_sysctl = {
1458 .devinet_vars = {
1459 DEVINET_SYSCTL_COMPLEX_ENTRY(FORWARDING, "forwarding",
1460 devinet_sysctl_forward,
1461 devinet_conf_sysctl),
1462 DEVINET_SYSCTL_RO_ENTRY(MC_FORWARDING, "mc_forwarding"),
1464 DEVINET_SYSCTL_RW_ENTRY(ACCEPT_REDIRECTS, "accept_redirects"),
1465 DEVINET_SYSCTL_RW_ENTRY(SECURE_REDIRECTS, "secure_redirects"),
1466 DEVINET_SYSCTL_RW_ENTRY(SHARED_MEDIA, "shared_media"),
1467 DEVINET_SYSCTL_RW_ENTRY(RP_FILTER, "rp_filter"),
1468 DEVINET_SYSCTL_RW_ENTRY(SEND_REDIRECTS, "send_redirects"),
1469 DEVINET_SYSCTL_RW_ENTRY(ACCEPT_SOURCE_ROUTE,
1470 "accept_source_route"),
1471 DEVINET_SYSCTL_RW_ENTRY(PROXY_ARP, "proxy_arp"),
1472 DEVINET_SYSCTL_RW_ENTRY(MEDIUM_ID, "medium_id"),
1473 DEVINET_SYSCTL_RW_ENTRY(BOOTP_RELAY, "bootp_relay"),
1474 DEVINET_SYSCTL_RW_ENTRY(LOG_MARTIANS, "log_martians"),
1475 DEVINET_SYSCTL_RW_ENTRY(TAG, "tag"),
1476 DEVINET_SYSCTL_RW_ENTRY(ARPFILTER, "arp_filter"),
1477 DEVINET_SYSCTL_RW_ENTRY(ARP_ANNOUNCE, "arp_announce"),
1478 DEVINET_SYSCTL_RW_ENTRY(ARP_IGNORE, "arp_ignore"),
1479 DEVINET_SYSCTL_RW_ENTRY(ARP_ACCEPT, "arp_accept"),
1480 DEVINET_SYSCTL_RW_ENTRY(ARP_NOTIFY, "arp_notify"),
1482 DEVINET_SYSCTL_FLUSHING_ENTRY(NOXFRM, "disable_xfrm"),
1483 DEVINET_SYSCTL_FLUSHING_ENTRY(NOPOLICY, "disable_policy"),
1484 DEVINET_SYSCTL_FLUSHING_ENTRY(FORCE_IGMP_VERSION,
1485 "force_igmp_version"),
1486 DEVINET_SYSCTL_FLUSHING_ENTRY(PROMOTE_SECONDARIES,
1487 "promote_secondaries"),
1491 static int __devinet_sysctl_register(struct net *net, char *dev_name,
1492 int ctl_name, struct ipv4_devconf *p)
1494 int i;
1495 struct devinet_sysctl_table *t;
1497 #define DEVINET_CTL_PATH_DEV 3
1499 struct ctl_path devinet_ctl_path[] = {
1500 { .procname = "net", .ctl_name = CTL_NET, },
1501 { .procname = "ipv4", .ctl_name = NET_IPV4, },
1502 { .procname = "conf", .ctl_name = NET_IPV4_CONF, },
1503 { /* to be set */ },
1504 { },
1507 t = kmemdup(&devinet_sysctl, sizeof(*t), GFP_KERNEL);
1508 if (!t)
1509 goto out;
1511 for (i = 0; i < ARRAY_SIZE(t->devinet_vars) - 1; i++) {
1512 t->devinet_vars[i].data += (char *)p - (char *)&ipv4_devconf;
1513 t->devinet_vars[i].extra1 = p;
1514 t->devinet_vars[i].extra2 = net;
1518 * Make a copy of dev_name, because '.procname' is regarded as const
1519 * by sysctl and we wouldn't want anyone to change it under our feet
1520 * (see SIOCSIFNAME).
1522 t->dev_name = kstrdup(dev_name, GFP_KERNEL);
1523 if (!t->dev_name)
1524 goto free;
1526 devinet_ctl_path[DEVINET_CTL_PATH_DEV].procname = t->dev_name;
1527 devinet_ctl_path[DEVINET_CTL_PATH_DEV].ctl_name = ctl_name;
1529 t->sysctl_header = register_net_sysctl_table(net, devinet_ctl_path,
1530 t->devinet_vars);
1531 if (!t->sysctl_header)
1532 goto free_procname;
1534 p->sysctl = t;
1535 return 0;
1537 free_procname:
1538 kfree(t->dev_name);
1539 free:
1540 kfree(t);
1541 out:
1542 return -ENOBUFS;
1545 static void __devinet_sysctl_unregister(struct ipv4_devconf *cnf)
1547 struct devinet_sysctl_table *t = cnf->sysctl;
1549 if (t == NULL)
1550 return;
1552 cnf->sysctl = NULL;
1553 unregister_sysctl_table(t->sysctl_header);
1554 kfree(t->dev_name);
1555 kfree(t);
1558 static void devinet_sysctl_register(struct in_device *idev)
1560 neigh_sysctl_register(idev->dev, idev->arp_parms, NET_IPV4,
1561 NET_IPV4_NEIGH, "ipv4", NULL, NULL);
1562 __devinet_sysctl_register(dev_net(idev->dev), idev->dev->name,
1563 idev->dev->ifindex, &idev->cnf);
1566 static void devinet_sysctl_unregister(struct in_device *idev)
1568 __devinet_sysctl_unregister(&idev->cnf);
1569 neigh_sysctl_unregister(idev->arp_parms);
1572 static struct ctl_table ctl_forward_entry[] = {
1574 .ctl_name = NET_IPV4_FORWARD,
1575 .procname = "ip_forward",
1576 .data = &ipv4_devconf.data[
1577 NET_IPV4_CONF_FORWARDING - 1],
1578 .maxlen = sizeof(int),
1579 .mode = 0644,
1580 .proc_handler = devinet_sysctl_forward,
1581 .strategy = devinet_conf_sysctl,
1582 .extra1 = &ipv4_devconf,
1583 .extra2 = &init_net,
1585 { },
1588 static __net_initdata struct ctl_path net_ipv4_path[] = {
1589 { .procname = "net", .ctl_name = CTL_NET, },
1590 { .procname = "ipv4", .ctl_name = NET_IPV4, },
1591 { },
1593 #endif
1595 static __net_init int devinet_init_net(struct net *net)
1597 int err;
1598 struct ipv4_devconf *all, *dflt;
1599 #ifdef CONFIG_SYSCTL
1600 struct ctl_table *tbl = ctl_forward_entry;
1601 struct ctl_table_header *forw_hdr;
1602 #endif
1604 err = -ENOMEM;
1605 all = &ipv4_devconf;
1606 dflt = &ipv4_devconf_dflt;
1608 if (!net_eq(net, &init_net)) {
1609 all = kmemdup(all, sizeof(ipv4_devconf), GFP_KERNEL);
1610 if (all == NULL)
1611 goto err_alloc_all;
1613 dflt = kmemdup(dflt, sizeof(ipv4_devconf_dflt), GFP_KERNEL);
1614 if (dflt == NULL)
1615 goto err_alloc_dflt;
1617 #ifdef CONFIG_SYSCTL
1618 tbl = kmemdup(tbl, sizeof(ctl_forward_entry), GFP_KERNEL);
1619 if (tbl == NULL)
1620 goto err_alloc_ctl;
1622 tbl[0].data = &all->data[NET_IPV4_CONF_FORWARDING - 1];
1623 tbl[0].extra1 = all;
1624 tbl[0].extra2 = net;
1625 #endif
1628 #ifdef CONFIG_SYSCTL
1629 err = __devinet_sysctl_register(net, "all",
1630 NET_PROTO_CONF_ALL, all);
1631 if (err < 0)
1632 goto err_reg_all;
1634 err = __devinet_sysctl_register(net, "default",
1635 NET_PROTO_CONF_DEFAULT, dflt);
1636 if (err < 0)
1637 goto err_reg_dflt;
1639 err = -ENOMEM;
1640 forw_hdr = register_net_sysctl_table(net, net_ipv4_path, tbl);
1641 if (forw_hdr == NULL)
1642 goto err_reg_ctl;
1643 net->ipv4.forw_hdr = forw_hdr;
1644 #endif
1646 net->ipv4.devconf_all = all;
1647 net->ipv4.devconf_dflt = dflt;
1648 return 0;
1650 #ifdef CONFIG_SYSCTL
1651 err_reg_ctl:
1652 __devinet_sysctl_unregister(dflt);
1653 err_reg_dflt:
1654 __devinet_sysctl_unregister(all);
1655 err_reg_all:
1656 if (tbl != ctl_forward_entry)
1657 kfree(tbl);
1658 err_alloc_ctl:
1659 #endif
1660 if (dflt != &ipv4_devconf_dflt)
1661 kfree(dflt);
1662 err_alloc_dflt:
1663 if (all != &ipv4_devconf)
1664 kfree(all);
1665 err_alloc_all:
1666 return err;
1669 static __net_exit void devinet_exit_net(struct net *net)
1671 #ifdef CONFIG_SYSCTL
1672 struct ctl_table *tbl;
1674 tbl = net->ipv4.forw_hdr->ctl_table_arg;
1675 unregister_net_sysctl_table(net->ipv4.forw_hdr);
1676 __devinet_sysctl_unregister(net->ipv4.devconf_dflt);
1677 __devinet_sysctl_unregister(net->ipv4.devconf_all);
1678 kfree(tbl);
1679 #endif
1680 kfree(net->ipv4.devconf_dflt);
1681 kfree(net->ipv4.devconf_all);
1684 static __net_initdata struct pernet_operations devinet_ops = {
1685 .init = devinet_init_net,
1686 .exit = devinet_exit_net,
1689 void __init devinet_init(void)
1691 register_pernet_subsys(&devinet_ops);
1693 register_gifconf(PF_INET, inet_gifconf);
1694 register_netdevice_notifier(&ip_netdev_notifier);
1696 rtnl_register(PF_INET, RTM_NEWADDR, inet_rtm_newaddr, NULL);
1697 rtnl_register(PF_INET, RTM_DELADDR, inet_rtm_deladdr, NULL);
1698 rtnl_register(PF_INET, RTM_GETADDR, NULL, inet_dump_ifaddr);