jbd: positively dispose the unmapped data buffers in journal_commit_transaction()
[linux-2.6/sactl.git] / net / ipv4 / devinet.c
blob2e667e2f90df2e3c97845e7eee59cabd180c55de
1 /*
2 * NET3 IP device support routines.
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
9 * Derived from the IP parts of dev.c 1.0.19
10 * Authors: Ross Biro
11 * Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
12 * Mark Evans, <evansmp@uhura.aston.ac.uk>
14 * Additional Authors:
15 * Alan Cox, <gw4pts@gw4pts.ampr.org>
16 * Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
18 * Changes:
19 * Alexey Kuznetsov: pa_* fields are replaced with ifaddr
20 * lists.
21 * Cyrus Durgin: updated for kmod
22 * Matthias Andree: in devinet_ioctl, compare label and
23 * address (4.4BSD alias style support),
24 * fall back to comparing just the label
25 * if no match found.
29 #include <asm/uaccess.h>
30 #include <asm/system.h>
31 #include <linux/bitops.h>
32 #include <linux/capability.h>
33 #include <linux/module.h>
34 #include <linux/types.h>
35 #include <linux/kernel.h>
36 #include <linux/string.h>
37 #include <linux/mm.h>
38 #include <linux/socket.h>
39 #include <linux/sockios.h>
40 #include <linux/in.h>
41 #include <linux/errno.h>
42 #include <linux/interrupt.h>
43 #include <linux/if_addr.h>
44 #include <linux/if_ether.h>
45 #include <linux/inet.h>
46 #include <linux/netdevice.h>
47 #include <linux/etherdevice.h>
48 #include <linux/skbuff.h>
49 #include <linux/init.h>
50 #include <linux/notifier.h>
51 #include <linux/inetdevice.h>
52 #include <linux/igmp.h>
53 #ifdef CONFIG_SYSCTL
54 #include <linux/sysctl.h>
55 #endif
56 #include <linux/kmod.h>
58 #include <net/arp.h>
59 #include <net/ip.h>
60 #include <net/route.h>
61 #include <net/ip_fib.h>
62 #include <net/rtnetlink.h>
63 #include <net/net_namespace.h>
65 static struct ipv4_devconf ipv4_devconf = {
66 .data = {
67 [NET_IPV4_CONF_ACCEPT_REDIRECTS - 1] = 1,
68 [NET_IPV4_CONF_SEND_REDIRECTS - 1] = 1,
69 [NET_IPV4_CONF_SECURE_REDIRECTS - 1] = 1,
70 [NET_IPV4_CONF_SHARED_MEDIA - 1] = 1,
74 static struct ipv4_devconf ipv4_devconf_dflt = {
75 .data = {
76 [NET_IPV4_CONF_ACCEPT_REDIRECTS - 1] = 1,
77 [NET_IPV4_CONF_SEND_REDIRECTS - 1] = 1,
78 [NET_IPV4_CONF_SECURE_REDIRECTS - 1] = 1,
79 [NET_IPV4_CONF_SHARED_MEDIA - 1] = 1,
80 [NET_IPV4_CONF_ACCEPT_SOURCE_ROUTE - 1] = 1,
84 #define IPV4_DEVCONF_DFLT(net, attr) \
85 IPV4_DEVCONF((*net->ipv4.devconf_dflt), attr)
87 static const struct nla_policy ifa_ipv4_policy[IFA_MAX+1] = {
88 [IFA_LOCAL] = { .type = NLA_U32 },
89 [IFA_ADDRESS] = { .type = NLA_U32 },
90 [IFA_BROADCAST] = { .type = NLA_U32 },
91 [IFA_LABEL] = { .type = NLA_STRING, .len = IFNAMSIZ - 1 },
94 static void rtmsg_ifa(int event, struct in_ifaddr *, struct nlmsghdr *, u32);
96 static BLOCKING_NOTIFIER_HEAD(inetaddr_chain);
97 static void inet_del_ifa(struct in_device *in_dev, struct in_ifaddr **ifap,
98 int destroy);
99 #ifdef CONFIG_SYSCTL
100 static void devinet_sysctl_register(struct in_device *idev);
101 static void devinet_sysctl_unregister(struct in_device *idev);
102 #else
103 static inline void devinet_sysctl_register(struct in_device *idev)
106 static inline void devinet_sysctl_unregister(struct in_device *idev)
109 #endif
111 /* Locks all the inet devices. */
113 static struct in_ifaddr *inet_alloc_ifa(void)
115 struct in_ifaddr *ifa = kzalloc(sizeof(*ifa), GFP_KERNEL);
117 if (ifa) {
118 INIT_RCU_HEAD(&ifa->rcu_head);
121 return ifa;
124 static void inet_rcu_free_ifa(struct rcu_head *head)
126 struct in_ifaddr *ifa = container_of(head, struct in_ifaddr, rcu_head);
127 if (ifa->ifa_dev)
128 in_dev_put(ifa->ifa_dev);
129 kfree(ifa);
132 static inline void inet_free_ifa(struct in_ifaddr *ifa)
134 call_rcu(&ifa->rcu_head, inet_rcu_free_ifa);
137 void in_dev_finish_destroy(struct in_device *idev)
139 struct net_device *dev = idev->dev;
141 BUG_TRAP(!idev->ifa_list);
142 BUG_TRAP(!idev->mc_list);
143 #ifdef NET_REFCNT_DEBUG
144 printk(KERN_DEBUG "in_dev_finish_destroy: %p=%s\n",
145 idev, dev ? dev->name : "NIL");
146 #endif
147 dev_put(dev);
148 if (!idev->dead)
149 printk("Freeing alive in_device %p\n", idev);
150 else {
151 kfree(idev);
155 static struct in_device *inetdev_init(struct net_device *dev)
157 struct in_device *in_dev;
159 ASSERT_RTNL();
161 in_dev = kzalloc(sizeof(*in_dev), GFP_KERNEL);
162 if (!in_dev)
163 goto out;
164 INIT_RCU_HEAD(&in_dev->rcu_head);
165 memcpy(&in_dev->cnf, dev_net(dev)->ipv4.devconf_dflt,
166 sizeof(in_dev->cnf));
167 in_dev->cnf.sysctl = NULL;
168 in_dev->dev = dev;
169 if ((in_dev->arp_parms = neigh_parms_alloc(dev, &arp_tbl)) == NULL)
170 goto out_kfree;
171 if (IPV4_DEVCONF(in_dev->cnf, FORWARDING))
172 dev_disable_lro(dev);
173 /* Reference in_dev->dev */
174 dev_hold(dev);
175 /* Account for reference dev->ip_ptr (below) */
176 in_dev_hold(in_dev);
178 devinet_sysctl_register(in_dev);
179 ip_mc_init_dev(in_dev);
180 if (dev->flags & IFF_UP)
181 ip_mc_up(in_dev);
183 /* we can receive as soon as ip_ptr is set -- do this last */
184 rcu_assign_pointer(dev->ip_ptr, in_dev);
185 out:
186 return in_dev;
187 out_kfree:
188 kfree(in_dev);
189 in_dev = NULL;
190 goto out;
193 static void in_dev_rcu_put(struct rcu_head *head)
195 struct in_device *idev = container_of(head, struct in_device, rcu_head);
196 in_dev_put(idev);
199 static void inetdev_destroy(struct in_device *in_dev)
201 struct in_ifaddr *ifa;
202 struct net_device *dev;
204 ASSERT_RTNL();
206 dev = in_dev->dev;
208 in_dev->dead = 1;
210 ip_mc_destroy_dev(in_dev);
212 while ((ifa = in_dev->ifa_list) != NULL) {
213 inet_del_ifa(in_dev, &in_dev->ifa_list, 0);
214 inet_free_ifa(ifa);
217 dev->ip_ptr = NULL;
219 devinet_sysctl_unregister(in_dev);
220 neigh_parms_release(&arp_tbl, in_dev->arp_parms);
221 arp_ifdown(dev);
223 call_rcu(&in_dev->rcu_head, in_dev_rcu_put);
226 int inet_addr_onlink(struct in_device *in_dev, __be32 a, __be32 b)
228 rcu_read_lock();
229 for_primary_ifa(in_dev) {
230 if (inet_ifa_match(a, ifa)) {
231 if (!b || inet_ifa_match(b, ifa)) {
232 rcu_read_unlock();
233 return 1;
236 } endfor_ifa(in_dev);
237 rcu_read_unlock();
238 return 0;
241 static void __inet_del_ifa(struct in_device *in_dev, struct in_ifaddr **ifap,
242 int destroy, struct nlmsghdr *nlh, u32 pid)
244 struct in_ifaddr *promote = NULL;
245 struct in_ifaddr *ifa, *ifa1 = *ifap;
246 struct in_ifaddr *last_prim = in_dev->ifa_list;
247 struct in_ifaddr *prev_prom = NULL;
248 int do_promote = IN_DEV_PROMOTE_SECONDARIES(in_dev);
250 ASSERT_RTNL();
252 /* 1. Deleting primary ifaddr forces deletion all secondaries
253 * unless alias promotion is set
256 if (!(ifa1->ifa_flags & IFA_F_SECONDARY)) {
257 struct in_ifaddr **ifap1 = &ifa1->ifa_next;
259 while ((ifa = *ifap1) != NULL) {
260 if (!(ifa->ifa_flags & IFA_F_SECONDARY) &&
261 ifa1->ifa_scope <= ifa->ifa_scope)
262 last_prim = ifa;
264 if (!(ifa->ifa_flags & IFA_F_SECONDARY) ||
265 ifa1->ifa_mask != ifa->ifa_mask ||
266 !inet_ifa_match(ifa1->ifa_address, ifa)) {
267 ifap1 = &ifa->ifa_next;
268 prev_prom = ifa;
269 continue;
272 if (!do_promote) {
273 *ifap1 = ifa->ifa_next;
275 rtmsg_ifa(RTM_DELADDR, ifa, nlh, pid);
276 blocking_notifier_call_chain(&inetaddr_chain,
277 NETDEV_DOWN, ifa);
278 inet_free_ifa(ifa);
279 } else {
280 promote = ifa;
281 break;
286 /* 2. Unlink it */
288 *ifap = ifa1->ifa_next;
290 /* 3. Announce address deletion */
292 /* Send message first, then call notifier.
293 At first sight, FIB update triggered by notifier
294 will refer to already deleted ifaddr, that could confuse
295 netlink listeners. It is not true: look, gated sees
296 that route deleted and if it still thinks that ifaddr
297 is valid, it will try to restore deleted routes... Grr.
298 So that, this order is correct.
300 rtmsg_ifa(RTM_DELADDR, ifa1, nlh, pid);
301 blocking_notifier_call_chain(&inetaddr_chain, NETDEV_DOWN, ifa1);
303 if (promote) {
305 if (prev_prom) {
306 prev_prom->ifa_next = promote->ifa_next;
307 promote->ifa_next = last_prim->ifa_next;
308 last_prim->ifa_next = promote;
311 promote->ifa_flags &= ~IFA_F_SECONDARY;
312 rtmsg_ifa(RTM_NEWADDR, promote, nlh, pid);
313 blocking_notifier_call_chain(&inetaddr_chain,
314 NETDEV_UP, promote);
315 for (ifa = promote->ifa_next; ifa; ifa = ifa->ifa_next) {
316 if (ifa1->ifa_mask != ifa->ifa_mask ||
317 !inet_ifa_match(ifa1->ifa_address, ifa))
318 continue;
319 fib_add_ifaddr(ifa);
323 if (destroy)
324 inet_free_ifa(ifa1);
327 static void inet_del_ifa(struct in_device *in_dev, struct in_ifaddr **ifap,
328 int destroy)
330 __inet_del_ifa(in_dev, ifap, destroy, NULL, 0);
333 static int __inet_insert_ifa(struct in_ifaddr *ifa, struct nlmsghdr *nlh,
334 u32 pid)
336 struct in_device *in_dev = ifa->ifa_dev;
337 struct in_ifaddr *ifa1, **ifap, **last_primary;
339 ASSERT_RTNL();
341 if (!ifa->ifa_local) {
342 inet_free_ifa(ifa);
343 return 0;
346 ifa->ifa_flags &= ~IFA_F_SECONDARY;
347 last_primary = &in_dev->ifa_list;
349 for (ifap = &in_dev->ifa_list; (ifa1 = *ifap) != NULL;
350 ifap = &ifa1->ifa_next) {
351 if (!(ifa1->ifa_flags & IFA_F_SECONDARY) &&
352 ifa->ifa_scope <= ifa1->ifa_scope)
353 last_primary = &ifa1->ifa_next;
354 if (ifa1->ifa_mask == ifa->ifa_mask &&
355 inet_ifa_match(ifa1->ifa_address, ifa)) {
356 if (ifa1->ifa_local == ifa->ifa_local) {
357 inet_free_ifa(ifa);
358 return -EEXIST;
360 if (ifa1->ifa_scope != ifa->ifa_scope) {
361 inet_free_ifa(ifa);
362 return -EINVAL;
364 ifa->ifa_flags |= IFA_F_SECONDARY;
368 if (!(ifa->ifa_flags & IFA_F_SECONDARY)) {
369 net_srandom(ifa->ifa_local);
370 ifap = last_primary;
373 ifa->ifa_next = *ifap;
374 *ifap = ifa;
376 /* Send message first, then call notifier.
377 Notifier will trigger FIB update, so that
378 listeners of netlink will know about new ifaddr */
379 rtmsg_ifa(RTM_NEWADDR, ifa, nlh, pid);
380 blocking_notifier_call_chain(&inetaddr_chain, NETDEV_UP, ifa);
382 return 0;
385 static int inet_insert_ifa(struct in_ifaddr *ifa)
387 return __inet_insert_ifa(ifa, NULL, 0);
390 static int inet_set_ifa(struct net_device *dev, struct in_ifaddr *ifa)
392 struct in_device *in_dev = __in_dev_get_rtnl(dev);
394 ASSERT_RTNL();
396 if (!in_dev) {
397 inet_free_ifa(ifa);
398 return -ENOBUFS;
400 ipv4_devconf_setall(in_dev);
401 if (ifa->ifa_dev != in_dev) {
402 BUG_TRAP(!ifa->ifa_dev);
403 in_dev_hold(in_dev);
404 ifa->ifa_dev = in_dev;
406 if (ipv4_is_loopback(ifa->ifa_local))
407 ifa->ifa_scope = RT_SCOPE_HOST;
408 return inet_insert_ifa(ifa);
411 struct in_device *inetdev_by_index(struct net *net, int ifindex)
413 struct net_device *dev;
414 struct in_device *in_dev = NULL;
415 read_lock(&dev_base_lock);
416 dev = __dev_get_by_index(net, ifindex);
417 if (dev)
418 in_dev = in_dev_get(dev);
419 read_unlock(&dev_base_lock);
420 return in_dev;
423 /* Called only from RTNL semaphored context. No locks. */
425 struct in_ifaddr *inet_ifa_byprefix(struct in_device *in_dev, __be32 prefix,
426 __be32 mask)
428 ASSERT_RTNL();
430 for_primary_ifa(in_dev) {
431 if (ifa->ifa_mask == mask && inet_ifa_match(prefix, ifa))
432 return ifa;
433 } endfor_ifa(in_dev);
434 return NULL;
437 static int inet_rtm_deladdr(struct sk_buff *skb, struct nlmsghdr *nlh, void *arg)
439 struct net *net = sock_net(skb->sk);
440 struct nlattr *tb[IFA_MAX+1];
441 struct in_device *in_dev;
442 struct ifaddrmsg *ifm;
443 struct in_ifaddr *ifa, **ifap;
444 int err = -EINVAL;
446 ASSERT_RTNL();
448 err = nlmsg_parse(nlh, sizeof(*ifm), tb, IFA_MAX, ifa_ipv4_policy);
449 if (err < 0)
450 goto errout;
452 ifm = nlmsg_data(nlh);
453 in_dev = inetdev_by_index(net, ifm->ifa_index);
454 if (in_dev == NULL) {
455 err = -ENODEV;
456 goto errout;
459 __in_dev_put(in_dev);
461 for (ifap = &in_dev->ifa_list; (ifa = *ifap) != NULL;
462 ifap = &ifa->ifa_next) {
463 if (tb[IFA_LOCAL] &&
464 ifa->ifa_local != nla_get_be32(tb[IFA_LOCAL]))
465 continue;
467 if (tb[IFA_LABEL] && nla_strcmp(tb[IFA_LABEL], ifa->ifa_label))
468 continue;
470 if (tb[IFA_ADDRESS] &&
471 (ifm->ifa_prefixlen != ifa->ifa_prefixlen ||
472 !inet_ifa_match(nla_get_be32(tb[IFA_ADDRESS]), ifa)))
473 continue;
475 __inet_del_ifa(in_dev, ifap, 1, nlh, NETLINK_CB(skb).pid);
476 return 0;
479 err = -EADDRNOTAVAIL;
480 errout:
481 return err;
484 static struct in_ifaddr *rtm_to_ifaddr(struct net *net, struct nlmsghdr *nlh)
486 struct nlattr *tb[IFA_MAX+1];
487 struct in_ifaddr *ifa;
488 struct ifaddrmsg *ifm;
489 struct net_device *dev;
490 struct in_device *in_dev;
491 int err;
493 err = nlmsg_parse(nlh, sizeof(*ifm), tb, IFA_MAX, ifa_ipv4_policy);
494 if (err < 0)
495 goto errout;
497 ifm = nlmsg_data(nlh);
498 err = -EINVAL;
499 if (ifm->ifa_prefixlen > 32 || tb[IFA_LOCAL] == NULL)
500 goto errout;
502 dev = __dev_get_by_index(net, ifm->ifa_index);
503 err = -ENODEV;
504 if (dev == NULL)
505 goto errout;
507 in_dev = __in_dev_get_rtnl(dev);
508 err = -ENOBUFS;
509 if (in_dev == NULL)
510 goto errout;
512 ifa = inet_alloc_ifa();
513 if (ifa == NULL)
515 * A potential indev allocation can be left alive, it stays
516 * assigned to its device and is destroy with it.
518 goto errout;
520 ipv4_devconf_setall(in_dev);
521 in_dev_hold(in_dev);
523 if (tb[IFA_ADDRESS] == NULL)
524 tb[IFA_ADDRESS] = tb[IFA_LOCAL];
526 ifa->ifa_prefixlen = ifm->ifa_prefixlen;
527 ifa->ifa_mask = inet_make_mask(ifm->ifa_prefixlen);
528 ifa->ifa_flags = ifm->ifa_flags;
529 ifa->ifa_scope = ifm->ifa_scope;
530 ifa->ifa_dev = in_dev;
532 ifa->ifa_local = nla_get_be32(tb[IFA_LOCAL]);
533 ifa->ifa_address = nla_get_be32(tb[IFA_ADDRESS]);
535 if (tb[IFA_BROADCAST])
536 ifa->ifa_broadcast = nla_get_be32(tb[IFA_BROADCAST]);
538 if (tb[IFA_LABEL])
539 nla_strlcpy(ifa->ifa_label, tb[IFA_LABEL], IFNAMSIZ);
540 else
541 memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
543 return ifa;
545 errout:
546 return ERR_PTR(err);
549 static int inet_rtm_newaddr(struct sk_buff *skb, struct nlmsghdr *nlh, void *arg)
551 struct net *net = sock_net(skb->sk);
552 struct in_ifaddr *ifa;
554 ASSERT_RTNL();
556 ifa = rtm_to_ifaddr(net, nlh);
557 if (IS_ERR(ifa))
558 return PTR_ERR(ifa);
560 return __inet_insert_ifa(ifa, nlh, NETLINK_CB(skb).pid);
564 * Determine a default network mask, based on the IP address.
567 static __inline__ int inet_abc_len(__be32 addr)
569 int rc = -1; /* Something else, probably a multicast. */
571 if (ipv4_is_zeronet(addr))
572 rc = 0;
573 else {
574 __u32 haddr = ntohl(addr);
576 if (IN_CLASSA(haddr))
577 rc = 8;
578 else if (IN_CLASSB(haddr))
579 rc = 16;
580 else if (IN_CLASSC(haddr))
581 rc = 24;
584 return rc;
588 int devinet_ioctl(struct net *net, unsigned int cmd, void __user *arg)
590 struct ifreq ifr;
591 struct sockaddr_in sin_orig;
592 struct sockaddr_in *sin = (struct sockaddr_in *)&ifr.ifr_addr;
593 struct in_device *in_dev;
594 struct in_ifaddr **ifap = NULL;
595 struct in_ifaddr *ifa = NULL;
596 struct net_device *dev;
597 char *colon;
598 int ret = -EFAULT;
599 int tryaddrmatch = 0;
602 * Fetch the caller's info block into kernel space
605 if (copy_from_user(&ifr, arg, sizeof(struct ifreq)))
606 goto out;
607 ifr.ifr_name[IFNAMSIZ - 1] = 0;
609 /* save original address for comparison */
610 memcpy(&sin_orig, sin, sizeof(*sin));
612 colon = strchr(ifr.ifr_name, ':');
613 if (colon)
614 *colon = 0;
616 #ifdef CONFIG_KMOD
617 dev_load(net, ifr.ifr_name);
618 #endif
620 switch (cmd) {
621 case SIOCGIFADDR: /* Get interface address */
622 case SIOCGIFBRDADDR: /* Get the broadcast address */
623 case SIOCGIFDSTADDR: /* Get the destination address */
624 case SIOCGIFNETMASK: /* Get the netmask for the interface */
625 /* Note that these ioctls will not sleep,
626 so that we do not impose a lock.
627 One day we will be forced to put shlock here (I mean SMP)
629 tryaddrmatch = (sin_orig.sin_family == AF_INET);
630 memset(sin, 0, sizeof(*sin));
631 sin->sin_family = AF_INET;
632 break;
634 case SIOCSIFFLAGS:
635 ret = -EACCES;
636 if (!capable(CAP_NET_ADMIN))
637 goto out;
638 break;
639 case SIOCSIFADDR: /* Set interface address (and family) */
640 case SIOCSIFBRDADDR: /* Set the broadcast address */
641 case SIOCSIFDSTADDR: /* Set the destination address */
642 case SIOCSIFNETMASK: /* Set the netmask for the interface */
643 ret = -EACCES;
644 if (!capable(CAP_NET_ADMIN))
645 goto out;
646 ret = -EINVAL;
647 if (sin->sin_family != AF_INET)
648 goto out;
649 break;
650 default:
651 ret = -EINVAL;
652 goto out;
655 rtnl_lock();
657 ret = -ENODEV;
658 if ((dev = __dev_get_by_name(net, ifr.ifr_name)) == NULL)
659 goto done;
661 if (colon)
662 *colon = ':';
664 if ((in_dev = __in_dev_get_rtnl(dev)) != NULL) {
665 if (tryaddrmatch) {
666 /* Matthias Andree */
667 /* compare label and address (4.4BSD style) */
668 /* note: we only do this for a limited set of ioctls
669 and only if the original address family was AF_INET.
670 This is checked above. */
671 for (ifap = &in_dev->ifa_list; (ifa = *ifap) != NULL;
672 ifap = &ifa->ifa_next) {
673 if (!strcmp(ifr.ifr_name, ifa->ifa_label) &&
674 sin_orig.sin_addr.s_addr ==
675 ifa->ifa_address) {
676 break; /* found */
680 /* we didn't get a match, maybe the application is
681 4.3BSD-style and passed in junk so we fall back to
682 comparing just the label */
683 if (!ifa) {
684 for (ifap = &in_dev->ifa_list; (ifa = *ifap) != NULL;
685 ifap = &ifa->ifa_next)
686 if (!strcmp(ifr.ifr_name, ifa->ifa_label))
687 break;
691 ret = -EADDRNOTAVAIL;
692 if (!ifa && cmd != SIOCSIFADDR && cmd != SIOCSIFFLAGS)
693 goto done;
695 switch (cmd) {
696 case SIOCGIFADDR: /* Get interface address */
697 sin->sin_addr.s_addr = ifa->ifa_local;
698 goto rarok;
700 case SIOCGIFBRDADDR: /* Get the broadcast address */
701 sin->sin_addr.s_addr = ifa->ifa_broadcast;
702 goto rarok;
704 case SIOCGIFDSTADDR: /* Get the destination address */
705 sin->sin_addr.s_addr = ifa->ifa_address;
706 goto rarok;
708 case SIOCGIFNETMASK: /* Get the netmask for the interface */
709 sin->sin_addr.s_addr = ifa->ifa_mask;
710 goto rarok;
712 case SIOCSIFFLAGS:
713 if (colon) {
714 ret = -EADDRNOTAVAIL;
715 if (!ifa)
716 break;
717 ret = 0;
718 if (!(ifr.ifr_flags & IFF_UP))
719 inet_del_ifa(in_dev, ifap, 1);
720 break;
722 ret = dev_change_flags(dev, ifr.ifr_flags);
723 break;
725 case SIOCSIFADDR: /* Set interface address (and family) */
726 ret = -EINVAL;
727 if (inet_abc_len(sin->sin_addr.s_addr) < 0)
728 break;
730 if (!ifa) {
731 ret = -ENOBUFS;
732 if ((ifa = inet_alloc_ifa()) == NULL)
733 break;
734 if (colon)
735 memcpy(ifa->ifa_label, ifr.ifr_name, IFNAMSIZ);
736 else
737 memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
738 } else {
739 ret = 0;
740 if (ifa->ifa_local == sin->sin_addr.s_addr)
741 break;
742 inet_del_ifa(in_dev, ifap, 0);
743 ifa->ifa_broadcast = 0;
744 ifa->ifa_scope = 0;
747 ifa->ifa_address = ifa->ifa_local = sin->sin_addr.s_addr;
749 if (!(dev->flags & IFF_POINTOPOINT)) {
750 ifa->ifa_prefixlen = inet_abc_len(ifa->ifa_address);
751 ifa->ifa_mask = inet_make_mask(ifa->ifa_prefixlen);
752 if ((dev->flags & IFF_BROADCAST) &&
753 ifa->ifa_prefixlen < 31)
754 ifa->ifa_broadcast = ifa->ifa_address |
755 ~ifa->ifa_mask;
756 } else {
757 ifa->ifa_prefixlen = 32;
758 ifa->ifa_mask = inet_make_mask(32);
760 ret = inet_set_ifa(dev, ifa);
761 break;
763 case SIOCSIFBRDADDR: /* Set the broadcast address */
764 ret = 0;
765 if (ifa->ifa_broadcast != sin->sin_addr.s_addr) {
766 inet_del_ifa(in_dev, ifap, 0);
767 ifa->ifa_broadcast = sin->sin_addr.s_addr;
768 inet_insert_ifa(ifa);
770 break;
772 case SIOCSIFDSTADDR: /* Set the destination address */
773 ret = 0;
774 if (ifa->ifa_address == sin->sin_addr.s_addr)
775 break;
776 ret = -EINVAL;
777 if (inet_abc_len(sin->sin_addr.s_addr) < 0)
778 break;
779 ret = 0;
780 inet_del_ifa(in_dev, ifap, 0);
781 ifa->ifa_address = sin->sin_addr.s_addr;
782 inet_insert_ifa(ifa);
783 break;
785 case SIOCSIFNETMASK: /* Set the netmask for the interface */
788 * The mask we set must be legal.
790 ret = -EINVAL;
791 if (bad_mask(sin->sin_addr.s_addr, 0))
792 break;
793 ret = 0;
794 if (ifa->ifa_mask != sin->sin_addr.s_addr) {
795 __be32 old_mask = ifa->ifa_mask;
796 inet_del_ifa(in_dev, ifap, 0);
797 ifa->ifa_mask = sin->sin_addr.s_addr;
798 ifa->ifa_prefixlen = inet_mask_len(ifa->ifa_mask);
800 /* See if current broadcast address matches
801 * with current netmask, then recalculate
802 * the broadcast address. Otherwise it's a
803 * funny address, so don't touch it since
804 * the user seems to know what (s)he's doing...
806 if ((dev->flags & IFF_BROADCAST) &&
807 (ifa->ifa_prefixlen < 31) &&
808 (ifa->ifa_broadcast ==
809 (ifa->ifa_local|~old_mask))) {
810 ifa->ifa_broadcast = (ifa->ifa_local |
811 ~sin->sin_addr.s_addr);
813 inet_insert_ifa(ifa);
815 break;
817 done:
818 rtnl_unlock();
819 out:
820 return ret;
821 rarok:
822 rtnl_unlock();
823 ret = copy_to_user(arg, &ifr, sizeof(struct ifreq)) ? -EFAULT : 0;
824 goto out;
827 static int inet_gifconf(struct net_device *dev, char __user *buf, int len)
829 struct in_device *in_dev = __in_dev_get_rtnl(dev);
830 struct in_ifaddr *ifa;
831 struct ifreq ifr;
832 int done = 0;
834 if (!in_dev || (ifa = in_dev->ifa_list) == NULL)
835 goto out;
837 for (; ifa; ifa = ifa->ifa_next) {
838 if (!buf) {
839 done += sizeof(ifr);
840 continue;
842 if (len < (int) sizeof(ifr))
843 break;
844 memset(&ifr, 0, sizeof(struct ifreq));
845 if (ifa->ifa_label)
846 strcpy(ifr.ifr_name, ifa->ifa_label);
847 else
848 strcpy(ifr.ifr_name, dev->name);
850 (*(struct sockaddr_in *)&ifr.ifr_addr).sin_family = AF_INET;
851 (*(struct sockaddr_in *)&ifr.ifr_addr).sin_addr.s_addr =
852 ifa->ifa_local;
854 if (copy_to_user(buf, &ifr, sizeof(struct ifreq))) {
855 done = -EFAULT;
856 break;
858 buf += sizeof(struct ifreq);
859 len -= sizeof(struct ifreq);
860 done += sizeof(struct ifreq);
862 out:
863 return done;
866 __be32 inet_select_addr(const struct net_device *dev, __be32 dst, int scope)
868 __be32 addr = 0;
869 struct in_device *in_dev;
870 struct net *net = dev_net(dev);
872 rcu_read_lock();
873 in_dev = __in_dev_get_rcu(dev);
874 if (!in_dev)
875 goto no_in_dev;
877 for_primary_ifa(in_dev) {
878 if (ifa->ifa_scope > scope)
879 continue;
880 if (!dst || inet_ifa_match(dst, ifa)) {
881 addr = ifa->ifa_local;
882 break;
884 if (!addr)
885 addr = ifa->ifa_local;
886 } endfor_ifa(in_dev);
887 no_in_dev:
888 rcu_read_unlock();
890 if (addr)
891 goto out;
893 /* Not loopback addresses on loopback should be preferred
894 in this case. It is importnat that lo is the first interface
895 in dev_base list.
897 read_lock(&dev_base_lock);
898 rcu_read_lock();
899 for_each_netdev(net, dev) {
900 if ((in_dev = __in_dev_get_rcu(dev)) == NULL)
901 continue;
903 for_primary_ifa(in_dev) {
904 if (ifa->ifa_scope != RT_SCOPE_LINK &&
905 ifa->ifa_scope <= scope) {
906 addr = ifa->ifa_local;
907 goto out_unlock_both;
909 } endfor_ifa(in_dev);
911 out_unlock_both:
912 read_unlock(&dev_base_lock);
913 rcu_read_unlock();
914 out:
915 return addr;
918 static __be32 confirm_addr_indev(struct in_device *in_dev, __be32 dst,
919 __be32 local, int scope)
921 int same = 0;
922 __be32 addr = 0;
924 for_ifa(in_dev) {
925 if (!addr &&
926 (local == ifa->ifa_local || !local) &&
927 ifa->ifa_scope <= scope) {
928 addr = ifa->ifa_local;
929 if (same)
930 break;
932 if (!same) {
933 same = (!local || inet_ifa_match(local, ifa)) &&
934 (!dst || inet_ifa_match(dst, ifa));
935 if (same && addr) {
936 if (local || !dst)
937 break;
938 /* Is the selected addr into dst subnet? */
939 if (inet_ifa_match(addr, ifa))
940 break;
941 /* No, then can we use new local src? */
942 if (ifa->ifa_scope <= scope) {
943 addr = ifa->ifa_local;
944 break;
946 /* search for large dst subnet for addr */
947 same = 0;
950 } endfor_ifa(in_dev);
952 return same? addr : 0;
956 * Confirm that local IP address exists using wildcards:
957 * - in_dev: only on this interface, 0=any interface
958 * - dst: only in the same subnet as dst, 0=any dst
959 * - local: address, 0=autoselect the local address
960 * - scope: maximum allowed scope value for the local address
962 __be32 inet_confirm_addr(struct in_device *in_dev,
963 __be32 dst, __be32 local, int scope)
965 __be32 addr = 0;
966 struct net_device *dev;
967 struct net *net;
969 if (scope != RT_SCOPE_LINK)
970 return confirm_addr_indev(in_dev, dst, local, scope);
972 net = dev_net(in_dev->dev);
973 read_lock(&dev_base_lock);
974 rcu_read_lock();
975 for_each_netdev(net, dev) {
976 if ((in_dev = __in_dev_get_rcu(dev))) {
977 addr = confirm_addr_indev(in_dev, dst, local, scope);
978 if (addr)
979 break;
982 rcu_read_unlock();
983 read_unlock(&dev_base_lock);
985 return addr;
989 * Device notifier
992 int register_inetaddr_notifier(struct notifier_block *nb)
994 return blocking_notifier_chain_register(&inetaddr_chain, nb);
997 int unregister_inetaddr_notifier(struct notifier_block *nb)
999 return blocking_notifier_chain_unregister(&inetaddr_chain, nb);
1002 /* Rename ifa_labels for a device name change. Make some effort to preserve existing
1003 * alias numbering and to create unique labels if possible.
1005 static void inetdev_changename(struct net_device *dev, struct in_device *in_dev)
1007 struct in_ifaddr *ifa;
1008 int named = 0;
1010 for (ifa = in_dev->ifa_list; ifa; ifa = ifa->ifa_next) {
1011 char old[IFNAMSIZ], *dot;
1013 memcpy(old, ifa->ifa_label, IFNAMSIZ);
1014 memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
1015 if (named++ == 0)
1016 goto skip;
1017 dot = strchr(old, ':');
1018 if (dot == NULL) {
1019 sprintf(old, ":%d", named);
1020 dot = old;
1022 if (strlen(dot) + strlen(dev->name) < IFNAMSIZ) {
1023 strcat(ifa->ifa_label, dot);
1024 } else {
1025 strcpy(ifa->ifa_label + (IFNAMSIZ - strlen(dot) - 1), dot);
1027 skip:
1028 rtmsg_ifa(RTM_NEWADDR, ifa, NULL, 0);
1032 /* Called only under RTNL semaphore */
1034 static int inetdev_event(struct notifier_block *this, unsigned long event,
1035 void *ptr)
1037 struct net_device *dev = ptr;
1038 struct in_device *in_dev = __in_dev_get_rtnl(dev);
1040 ASSERT_RTNL();
1042 if (!in_dev) {
1043 if (event == NETDEV_REGISTER) {
1044 in_dev = inetdev_init(dev);
1045 if (!in_dev)
1046 return notifier_from_errno(-ENOMEM);
1047 if (dev->flags & IFF_LOOPBACK) {
1048 IN_DEV_CONF_SET(in_dev, NOXFRM, 1);
1049 IN_DEV_CONF_SET(in_dev, NOPOLICY, 1);
1052 goto out;
1055 switch (event) {
1056 case NETDEV_REGISTER:
1057 printk(KERN_DEBUG "inetdev_event: bug\n");
1058 dev->ip_ptr = NULL;
1059 break;
1060 case NETDEV_UP:
1061 if (dev->mtu < 68)
1062 break;
1063 if (dev->flags & IFF_LOOPBACK) {
1064 struct in_ifaddr *ifa;
1065 if ((ifa = inet_alloc_ifa()) != NULL) {
1066 ifa->ifa_local =
1067 ifa->ifa_address = htonl(INADDR_LOOPBACK);
1068 ifa->ifa_prefixlen = 8;
1069 ifa->ifa_mask = inet_make_mask(8);
1070 in_dev_hold(in_dev);
1071 ifa->ifa_dev = in_dev;
1072 ifa->ifa_scope = RT_SCOPE_HOST;
1073 memcpy(ifa->ifa_label, dev->name, IFNAMSIZ);
1074 inet_insert_ifa(ifa);
1077 ip_mc_up(in_dev);
1078 break;
1079 case NETDEV_DOWN:
1080 ip_mc_down(in_dev);
1081 break;
1082 case NETDEV_CHANGEMTU:
1083 if (dev->mtu >= 68)
1084 break;
1085 /* MTU falled under 68, disable IP */
1086 case NETDEV_UNREGISTER:
1087 inetdev_destroy(in_dev);
1088 break;
1089 case NETDEV_CHANGENAME:
1090 /* Do not notify about label change, this event is
1091 * not interesting to applications using netlink.
1093 inetdev_changename(dev, in_dev);
1095 devinet_sysctl_unregister(in_dev);
1096 devinet_sysctl_register(in_dev);
1097 break;
1099 out:
1100 return NOTIFY_DONE;
1103 static struct notifier_block ip_netdev_notifier = {
1104 .notifier_call =inetdev_event,
1107 static inline size_t inet_nlmsg_size(void)
1109 return NLMSG_ALIGN(sizeof(struct ifaddrmsg))
1110 + nla_total_size(4) /* IFA_ADDRESS */
1111 + nla_total_size(4) /* IFA_LOCAL */
1112 + nla_total_size(4) /* IFA_BROADCAST */
1113 + nla_total_size(IFNAMSIZ); /* IFA_LABEL */
1116 static int inet_fill_ifaddr(struct sk_buff *skb, struct in_ifaddr *ifa,
1117 u32 pid, u32 seq, int event, unsigned int flags)
1119 struct ifaddrmsg *ifm;
1120 struct nlmsghdr *nlh;
1122 nlh = nlmsg_put(skb, pid, seq, event, sizeof(*ifm), flags);
1123 if (nlh == NULL)
1124 return -EMSGSIZE;
1126 ifm = nlmsg_data(nlh);
1127 ifm->ifa_family = AF_INET;
1128 ifm->ifa_prefixlen = ifa->ifa_prefixlen;
1129 ifm->ifa_flags = ifa->ifa_flags|IFA_F_PERMANENT;
1130 ifm->ifa_scope = ifa->ifa_scope;
1131 ifm->ifa_index = ifa->ifa_dev->dev->ifindex;
1133 if (ifa->ifa_address)
1134 NLA_PUT_BE32(skb, IFA_ADDRESS, ifa->ifa_address);
1136 if (ifa->ifa_local)
1137 NLA_PUT_BE32(skb, IFA_LOCAL, ifa->ifa_local);
1139 if (ifa->ifa_broadcast)
1140 NLA_PUT_BE32(skb, IFA_BROADCAST, ifa->ifa_broadcast);
1142 if (ifa->ifa_label[0])
1143 NLA_PUT_STRING(skb, IFA_LABEL, ifa->ifa_label);
1145 return nlmsg_end(skb, nlh);
1147 nla_put_failure:
1148 nlmsg_cancel(skb, nlh);
1149 return -EMSGSIZE;
1152 static int inet_dump_ifaddr(struct sk_buff *skb, struct netlink_callback *cb)
1154 struct net *net = sock_net(skb->sk);
1155 int idx, ip_idx;
1156 struct net_device *dev;
1157 struct in_device *in_dev;
1158 struct in_ifaddr *ifa;
1159 int s_ip_idx, s_idx = cb->args[0];
1161 s_ip_idx = ip_idx = cb->args[1];
1162 idx = 0;
1163 for_each_netdev(net, dev) {
1164 if (idx < s_idx)
1165 goto cont;
1166 if (idx > s_idx)
1167 s_ip_idx = 0;
1168 if ((in_dev = __in_dev_get_rtnl(dev)) == NULL)
1169 goto cont;
1171 for (ifa = in_dev->ifa_list, ip_idx = 0; ifa;
1172 ifa = ifa->ifa_next, ip_idx++) {
1173 if (ip_idx < s_ip_idx)
1174 continue;
1175 if (inet_fill_ifaddr(skb, ifa, NETLINK_CB(cb->skb).pid,
1176 cb->nlh->nlmsg_seq,
1177 RTM_NEWADDR, NLM_F_MULTI) <= 0)
1178 goto done;
1180 cont:
1181 idx++;
1184 done:
1185 cb->args[0] = idx;
1186 cb->args[1] = ip_idx;
1188 return skb->len;
1191 static void rtmsg_ifa(int event, struct in_ifaddr* ifa, struct nlmsghdr *nlh,
1192 u32 pid)
1194 struct sk_buff *skb;
1195 u32 seq = nlh ? nlh->nlmsg_seq : 0;
1196 int err = -ENOBUFS;
1197 struct net *net;
1199 net = dev_net(ifa->ifa_dev->dev);
1200 skb = nlmsg_new(inet_nlmsg_size(), GFP_KERNEL);
1201 if (skb == NULL)
1202 goto errout;
1204 err = inet_fill_ifaddr(skb, ifa, pid, seq, event, 0);
1205 if (err < 0) {
1206 /* -EMSGSIZE implies BUG in inet_nlmsg_size() */
1207 WARN_ON(err == -EMSGSIZE);
1208 kfree_skb(skb);
1209 goto errout;
1211 err = rtnl_notify(skb, net, pid, RTNLGRP_IPV4_IFADDR, nlh, GFP_KERNEL);
1212 errout:
1213 if (err < 0)
1214 rtnl_set_sk_err(net, RTNLGRP_IPV4_IFADDR, err);
1217 #ifdef CONFIG_SYSCTL
1219 static void devinet_copy_dflt_conf(struct net *net, int i)
1221 struct net_device *dev;
1223 read_lock(&dev_base_lock);
1224 for_each_netdev(net, dev) {
1225 struct in_device *in_dev;
1226 rcu_read_lock();
1227 in_dev = __in_dev_get_rcu(dev);
1228 if (in_dev && !test_bit(i, in_dev->cnf.state))
1229 in_dev->cnf.data[i] = net->ipv4.devconf_dflt->data[i];
1230 rcu_read_unlock();
1232 read_unlock(&dev_base_lock);
1235 static void inet_forward_change(struct net *net)
1237 struct net_device *dev;
1238 int on = IPV4_DEVCONF_ALL(net, FORWARDING);
1240 IPV4_DEVCONF_ALL(net, ACCEPT_REDIRECTS) = !on;
1241 IPV4_DEVCONF_DFLT(net, FORWARDING) = on;
1243 read_lock(&dev_base_lock);
1244 for_each_netdev(net, dev) {
1245 struct in_device *in_dev;
1246 if (on)
1247 dev_disable_lro(dev);
1248 rcu_read_lock();
1249 in_dev = __in_dev_get_rcu(dev);
1250 if (in_dev)
1251 IN_DEV_CONF_SET(in_dev, FORWARDING, on);
1252 rcu_read_unlock();
1254 read_unlock(&dev_base_lock);
1257 static int devinet_conf_proc(ctl_table *ctl, int write,
1258 struct file* filp, void __user *buffer,
1259 size_t *lenp, loff_t *ppos)
1261 int ret = proc_dointvec(ctl, write, filp, buffer, lenp, ppos);
1263 if (write) {
1264 struct ipv4_devconf *cnf = ctl->extra1;
1265 struct net *net = ctl->extra2;
1266 int i = (int *)ctl->data - cnf->data;
1268 set_bit(i, cnf->state);
1270 if (cnf == net->ipv4.devconf_dflt)
1271 devinet_copy_dflt_conf(net, i);
1274 return ret;
1277 static int devinet_conf_sysctl(ctl_table *table, int __user *name, int nlen,
1278 void __user *oldval, size_t __user *oldlenp,
1279 void __user *newval, size_t newlen)
1281 struct ipv4_devconf *cnf;
1282 struct net *net;
1283 int *valp = table->data;
1284 int new;
1285 int i;
1287 if (!newval || !newlen)
1288 return 0;
1290 if (newlen != sizeof(int))
1291 return -EINVAL;
1293 if (get_user(new, (int __user *)newval))
1294 return -EFAULT;
1296 if (new == *valp)
1297 return 0;
1299 if (oldval && oldlenp) {
1300 size_t len;
1302 if (get_user(len, oldlenp))
1303 return -EFAULT;
1305 if (len) {
1306 if (len > table->maxlen)
1307 len = table->maxlen;
1308 if (copy_to_user(oldval, valp, len))
1309 return -EFAULT;
1310 if (put_user(len, oldlenp))
1311 return -EFAULT;
1315 *valp = new;
1317 cnf = table->extra1;
1318 net = table->extra2;
1319 i = (int *)table->data - cnf->data;
1321 set_bit(i, cnf->state);
1323 if (cnf == net->ipv4.devconf_dflt)
1324 devinet_copy_dflt_conf(net, i);
1326 return 1;
1329 static int devinet_sysctl_forward(ctl_table *ctl, int write,
1330 struct file* filp, void __user *buffer,
1331 size_t *lenp, loff_t *ppos)
1333 int *valp = ctl->data;
1334 int val = *valp;
1335 int ret = proc_dointvec(ctl, write, filp, buffer, lenp, ppos);
1337 if (write && *valp != val) {
1338 struct net *net = ctl->extra2;
1340 if (valp != &IPV4_DEVCONF_DFLT(net, FORWARDING)) {
1341 rtnl_lock();
1342 if (valp == &IPV4_DEVCONF_ALL(net, FORWARDING)) {
1343 inet_forward_change(net);
1344 } else if (*valp) {
1345 struct ipv4_devconf *cnf = ctl->extra1;
1346 struct in_device *idev =
1347 container_of(cnf, struct in_device, cnf);
1348 dev_disable_lro(idev->dev);
1350 rtnl_unlock();
1351 rt_cache_flush(net, 0);
1355 return ret;
1358 int ipv4_doint_and_flush(ctl_table *ctl, int write,
1359 struct file* filp, void __user *buffer,
1360 size_t *lenp, loff_t *ppos)
1362 int *valp = ctl->data;
1363 int val = *valp;
1364 int ret = proc_dointvec(ctl, write, filp, buffer, lenp, ppos);
1365 struct net *net = ctl->extra2;
1367 if (write && *valp != val)
1368 rt_cache_flush(net, 0);
1370 return ret;
1373 int ipv4_doint_and_flush_strategy(ctl_table *table, int __user *name, int nlen,
1374 void __user *oldval, size_t __user *oldlenp,
1375 void __user *newval, size_t newlen)
1377 int ret = devinet_conf_sysctl(table, name, nlen, oldval, oldlenp,
1378 newval, newlen);
1379 struct net *net = table->extra2;
1381 if (ret == 1)
1382 rt_cache_flush(net, 0);
1384 return ret;
1388 #define DEVINET_SYSCTL_ENTRY(attr, name, mval, proc, sysctl) \
1390 .ctl_name = NET_IPV4_CONF_ ## attr, \
1391 .procname = name, \
1392 .data = ipv4_devconf.data + \
1393 NET_IPV4_CONF_ ## attr - 1, \
1394 .maxlen = sizeof(int), \
1395 .mode = mval, \
1396 .proc_handler = proc, \
1397 .strategy = sysctl, \
1398 .extra1 = &ipv4_devconf, \
1401 #define DEVINET_SYSCTL_RW_ENTRY(attr, name) \
1402 DEVINET_SYSCTL_ENTRY(attr, name, 0644, devinet_conf_proc, \
1403 devinet_conf_sysctl)
1405 #define DEVINET_SYSCTL_RO_ENTRY(attr, name) \
1406 DEVINET_SYSCTL_ENTRY(attr, name, 0444, devinet_conf_proc, \
1407 devinet_conf_sysctl)
1409 #define DEVINET_SYSCTL_COMPLEX_ENTRY(attr, name, proc, sysctl) \
1410 DEVINET_SYSCTL_ENTRY(attr, name, 0644, proc, sysctl)
1412 #define DEVINET_SYSCTL_FLUSHING_ENTRY(attr, name) \
1413 DEVINET_SYSCTL_COMPLEX_ENTRY(attr, name, ipv4_doint_and_flush, \
1414 ipv4_doint_and_flush_strategy)
1416 static struct devinet_sysctl_table {
1417 struct ctl_table_header *sysctl_header;
1418 struct ctl_table devinet_vars[__NET_IPV4_CONF_MAX];
1419 char *dev_name;
1420 } devinet_sysctl = {
1421 .devinet_vars = {
1422 DEVINET_SYSCTL_COMPLEX_ENTRY(FORWARDING, "forwarding",
1423 devinet_sysctl_forward,
1424 devinet_conf_sysctl),
1425 DEVINET_SYSCTL_RO_ENTRY(MC_FORWARDING, "mc_forwarding"),
1427 DEVINET_SYSCTL_RW_ENTRY(ACCEPT_REDIRECTS, "accept_redirects"),
1428 DEVINET_SYSCTL_RW_ENTRY(SECURE_REDIRECTS, "secure_redirects"),
1429 DEVINET_SYSCTL_RW_ENTRY(SHARED_MEDIA, "shared_media"),
1430 DEVINET_SYSCTL_RW_ENTRY(RP_FILTER, "rp_filter"),
1431 DEVINET_SYSCTL_RW_ENTRY(SEND_REDIRECTS, "send_redirects"),
1432 DEVINET_SYSCTL_RW_ENTRY(ACCEPT_SOURCE_ROUTE,
1433 "accept_source_route"),
1434 DEVINET_SYSCTL_RW_ENTRY(PROXY_ARP, "proxy_arp"),
1435 DEVINET_SYSCTL_RW_ENTRY(MEDIUM_ID, "medium_id"),
1436 DEVINET_SYSCTL_RW_ENTRY(BOOTP_RELAY, "bootp_relay"),
1437 DEVINET_SYSCTL_RW_ENTRY(LOG_MARTIANS, "log_martians"),
1438 DEVINET_SYSCTL_RW_ENTRY(TAG, "tag"),
1439 DEVINET_SYSCTL_RW_ENTRY(ARPFILTER, "arp_filter"),
1440 DEVINET_SYSCTL_RW_ENTRY(ARP_ANNOUNCE, "arp_announce"),
1441 DEVINET_SYSCTL_RW_ENTRY(ARP_IGNORE, "arp_ignore"),
1442 DEVINET_SYSCTL_RW_ENTRY(ARP_ACCEPT, "arp_accept"),
1444 DEVINET_SYSCTL_FLUSHING_ENTRY(NOXFRM, "disable_xfrm"),
1445 DEVINET_SYSCTL_FLUSHING_ENTRY(NOPOLICY, "disable_policy"),
1446 DEVINET_SYSCTL_FLUSHING_ENTRY(FORCE_IGMP_VERSION,
1447 "force_igmp_version"),
1448 DEVINET_SYSCTL_FLUSHING_ENTRY(PROMOTE_SECONDARIES,
1449 "promote_secondaries"),
1453 static int __devinet_sysctl_register(struct net *net, char *dev_name,
1454 int ctl_name, struct ipv4_devconf *p)
1456 int i;
1457 struct devinet_sysctl_table *t;
1459 #define DEVINET_CTL_PATH_DEV 3
1461 struct ctl_path devinet_ctl_path[] = {
1462 { .procname = "net", .ctl_name = CTL_NET, },
1463 { .procname = "ipv4", .ctl_name = NET_IPV4, },
1464 { .procname = "conf", .ctl_name = NET_IPV4_CONF, },
1465 { /* to be set */ },
1466 { },
1469 t = kmemdup(&devinet_sysctl, sizeof(*t), GFP_KERNEL);
1470 if (!t)
1471 goto out;
1473 for (i = 0; i < ARRAY_SIZE(t->devinet_vars) - 1; i++) {
1474 t->devinet_vars[i].data += (char *)p - (char *)&ipv4_devconf;
1475 t->devinet_vars[i].extra1 = p;
1476 t->devinet_vars[i].extra2 = net;
1480 * Make a copy of dev_name, because '.procname' is regarded as const
1481 * by sysctl and we wouldn't want anyone to change it under our feet
1482 * (see SIOCSIFNAME).
1484 t->dev_name = kstrdup(dev_name, GFP_KERNEL);
1485 if (!t->dev_name)
1486 goto free;
1488 devinet_ctl_path[DEVINET_CTL_PATH_DEV].procname = t->dev_name;
1489 devinet_ctl_path[DEVINET_CTL_PATH_DEV].ctl_name = ctl_name;
1491 t->sysctl_header = register_net_sysctl_table(net, devinet_ctl_path,
1492 t->devinet_vars);
1493 if (!t->sysctl_header)
1494 goto free_procname;
1496 p->sysctl = t;
1497 return 0;
1499 free_procname:
1500 kfree(t->dev_name);
1501 free:
1502 kfree(t);
1503 out:
1504 return -ENOBUFS;
1507 static void __devinet_sysctl_unregister(struct ipv4_devconf *cnf)
1509 struct devinet_sysctl_table *t = cnf->sysctl;
1511 if (t == NULL)
1512 return;
1514 cnf->sysctl = NULL;
1515 unregister_sysctl_table(t->sysctl_header);
1516 kfree(t->dev_name);
1517 kfree(t);
1520 static void devinet_sysctl_register(struct in_device *idev)
1522 neigh_sysctl_register(idev->dev, idev->arp_parms, NET_IPV4,
1523 NET_IPV4_NEIGH, "ipv4", NULL, NULL);
1524 __devinet_sysctl_register(dev_net(idev->dev), idev->dev->name,
1525 idev->dev->ifindex, &idev->cnf);
1528 static void devinet_sysctl_unregister(struct in_device *idev)
1530 __devinet_sysctl_unregister(&idev->cnf);
1531 neigh_sysctl_unregister(idev->arp_parms);
1534 static struct ctl_table ctl_forward_entry[] = {
1536 .ctl_name = NET_IPV4_FORWARD,
1537 .procname = "ip_forward",
1538 .data = &ipv4_devconf.data[
1539 NET_IPV4_CONF_FORWARDING - 1],
1540 .maxlen = sizeof(int),
1541 .mode = 0644,
1542 .proc_handler = devinet_sysctl_forward,
1543 .strategy = devinet_conf_sysctl,
1544 .extra1 = &ipv4_devconf,
1545 .extra2 = &init_net,
1547 { },
1550 static __net_initdata struct ctl_path net_ipv4_path[] = {
1551 { .procname = "net", .ctl_name = CTL_NET, },
1552 { .procname = "ipv4", .ctl_name = NET_IPV4, },
1553 { },
1555 #endif
1557 static __net_init int devinet_init_net(struct net *net)
1559 int err;
1560 struct ipv4_devconf *all, *dflt;
1561 #ifdef CONFIG_SYSCTL
1562 struct ctl_table *tbl = ctl_forward_entry;
1563 struct ctl_table_header *forw_hdr;
1564 #endif
1566 err = -ENOMEM;
1567 all = &ipv4_devconf;
1568 dflt = &ipv4_devconf_dflt;
1570 if (net != &init_net) {
1571 all = kmemdup(all, sizeof(ipv4_devconf), GFP_KERNEL);
1572 if (all == NULL)
1573 goto err_alloc_all;
1575 dflt = kmemdup(dflt, sizeof(ipv4_devconf_dflt), GFP_KERNEL);
1576 if (dflt == NULL)
1577 goto err_alloc_dflt;
1579 #ifdef CONFIG_SYSCTL
1580 tbl = kmemdup(tbl, sizeof(ctl_forward_entry), GFP_KERNEL);
1581 if (tbl == NULL)
1582 goto err_alloc_ctl;
1584 tbl[0].data = &all->data[NET_IPV4_CONF_FORWARDING - 1];
1585 tbl[0].extra1 = all;
1586 tbl[0].extra2 = net;
1587 #endif
1590 #ifdef CONFIG_SYSCTL
1591 err = __devinet_sysctl_register(net, "all",
1592 NET_PROTO_CONF_ALL, all);
1593 if (err < 0)
1594 goto err_reg_all;
1596 err = __devinet_sysctl_register(net, "default",
1597 NET_PROTO_CONF_DEFAULT, dflt);
1598 if (err < 0)
1599 goto err_reg_dflt;
1601 err = -ENOMEM;
1602 forw_hdr = register_net_sysctl_table(net, net_ipv4_path, tbl);
1603 if (forw_hdr == NULL)
1604 goto err_reg_ctl;
1605 net->ipv4.forw_hdr = forw_hdr;
1606 #endif
1608 net->ipv4.devconf_all = all;
1609 net->ipv4.devconf_dflt = dflt;
1610 return 0;
1612 #ifdef CONFIG_SYSCTL
1613 err_reg_ctl:
1614 __devinet_sysctl_unregister(dflt);
1615 err_reg_dflt:
1616 __devinet_sysctl_unregister(all);
1617 err_reg_all:
1618 if (tbl != ctl_forward_entry)
1619 kfree(tbl);
1620 err_alloc_ctl:
1621 #endif
1622 if (dflt != &ipv4_devconf_dflt)
1623 kfree(dflt);
1624 err_alloc_dflt:
1625 if (all != &ipv4_devconf)
1626 kfree(all);
1627 err_alloc_all:
1628 return err;
1631 static __net_exit void devinet_exit_net(struct net *net)
1633 #ifdef CONFIG_SYSCTL
1634 struct ctl_table *tbl;
1636 tbl = net->ipv4.forw_hdr->ctl_table_arg;
1637 unregister_net_sysctl_table(net->ipv4.forw_hdr);
1638 __devinet_sysctl_unregister(net->ipv4.devconf_dflt);
1639 __devinet_sysctl_unregister(net->ipv4.devconf_all);
1640 kfree(tbl);
1641 #endif
1642 kfree(net->ipv4.devconf_dflt);
1643 kfree(net->ipv4.devconf_all);
1646 static __net_initdata struct pernet_operations devinet_ops = {
1647 .init = devinet_init_net,
1648 .exit = devinet_exit_net,
1651 void __init devinet_init(void)
1653 register_pernet_subsys(&devinet_ops);
1655 register_gifconf(PF_INET, inet_gifconf);
1656 register_netdevice_notifier(&ip_netdev_notifier);
1658 rtnl_register(PF_INET, RTM_NEWADDR, inet_rtm_newaddr, NULL);
1659 rtnl_register(PF_INET, RTM_DELADDR, inet_rtm_deladdr, NULL);
1660 rtnl_register(PF_INET, RTM_GETADDR, NULL, inet_dump_ifaddr);
1663 EXPORT_SYMBOL(in_dev_finish_destroy);
1664 EXPORT_SYMBOL(inet_select_addr);
1665 EXPORT_SYMBOL(inetdev_by_index);
1666 EXPORT_SYMBOL(register_inetaddr_notifier);
1667 EXPORT_SYMBOL(unregister_inetaddr_notifier);