]> git.ipfire.org Git - thirdparty/kernel/stable.git/blame - net/ipv6/addrconf.c
ipv6: addrconf_disable_policy() optimization
[thirdparty/kernel/stable.git] / net / ipv6 / addrconf.c
CommitLineData
2874c5fd 1// SPDX-License-Identifier: GPL-2.0-or-later
1da177e4
LT
2/*
3 * IPv6 Address [auto]configuration
4 * Linux INET6 implementation
5 *
6 * Authors:
1ab1457c 7 * Pedro Roque <roque@di.fc.ul.pt>
1da177e4 8 * Alexey Kuznetsov <kuznet@ms2.inr.ac.ru>
1da177e4
LT
9 */
10
11/*
12 * Changes:
13 *
14 * Janos Farkas : delete timer on ifdown
15 * <chexum@bankinf.banki.hu>
16 * Andi Kleen : kill double kfree on module
17 * unload.
18 * Maciej W. Rozycki : FDDI support
19 * sekiya@USAGI : Don't send too many RS
20 * packets.
21 * yoshfuji@USAGI : Fixed interval between DAD
22 * packets.
23 * YOSHIFUJI Hideaki @USAGI : improved accuracy of
24 * address validation timer.
25 * YOSHIFUJI Hideaki @USAGI : Privacy Extensions (RFC3041)
26 * support.
27 * Yuji SEKIYA @USAGI : Don't assign a same IPv6
28 * address on a same interface.
29 * YOSHIFUJI Hideaki @USAGI : ARCnet support
30 * YOSHIFUJI Hideaki @USAGI : convert /proc/net/if_inet6 to
31 * seq_file.
b1cacb68
YH
32 * YOSHIFUJI Hideaki @USAGI : improved source address
33 * selection; consider scope,
34 * status etc.
1da177e4
LT
35 */
36
f3213831
JP
37#define pr_fmt(fmt) "IPv6: " fmt
38
1da177e4
LT
39#include <linux/errno.h>
40#include <linux/types.h>
a0bffffc 41#include <linux/kernel.h>
174cd4b1 42#include <linux/sched/signal.h>
1da177e4
LT
43#include <linux/socket.h>
44#include <linux/sockios.h>
1da177e4 45#include <linux/net.h>
3d1bec99 46#include <linux/inet.h>
1da177e4
LT
47#include <linux/in6.h>
48#include <linux/netdevice.h>
1823730f 49#include <linux/if_addr.h>
1da177e4
LT
50#include <linux/if_arp.h>
51#include <linux/if_arcnet.h>
52#include <linux/if_infiniband.h>
53#include <linux/route.h>
54#include <linux/inetdevice.h>
55#include <linux/init.h>
5a0e3ad6 56#include <linux/slab.h>
1da177e4
LT
57#ifdef CONFIG_SYSCTL
58#include <linux/sysctl.h>
59#endif
4fc268d2 60#include <linux/capability.h>
1da177e4
LT
61#include <linux/delay.h>
62#include <linux/notifier.h>
543537bd 63#include <linux/string.h>
ddbe5032 64#include <linux/hash.h>
1da177e4 65
457c4cbc 66#include <net/net_namespace.h>
1da177e4
LT
67#include <net/sock.h>
68#include <net/snmp.h>
69
5241c2d7 70#include <net/6lowpan.h>
cb6bf355 71#include <net/firewire.h>
1da177e4
LT
72#include <net/ipv6.h>
73#include <net/protocol.h>
74#include <net/ndisc.h>
75#include <net/ip6_route.h>
76#include <net/addrconf.h>
77#include <net/tcp.h>
78#include <net/ip.h>
5d620266 79#include <net/netlink.h>
f24e3d65 80#include <net/pkt_sched.h>
ca254490 81#include <net/l3mdev.h>
1da177e4
LT
82#include <linux/if_tunnel.h>
83#include <linux/rtnetlink.h>
f3a1bfb1 84#include <linux/netconf.h>
1da177e4 85#include <linux/random.h>
e21e8467 86#include <linux/uaccess.h>
7f7d9a6b 87#include <asm/unaligned.h>
1da177e4
LT
88
89#include <linux/proc_fs.h>
90#include <linux/seq_file.h>
bc3b2d7f 91#include <linux/export.h>
9ee11f0f 92#include <linux/ioam6.h>
1da177e4 93
1da177e4 94#define INFINITY_LIFE_TIME 0xFFFFFFFF
18a31e1e 95
3d1bec99
HFS
96#define IPV6_MAX_STRLEN \
97 sizeof("ffff:ffff:ffff:ffff:ffff:ffff:255.255.255.255")
98
18a31e1e
TG
99static inline u32 cstamp_delta(unsigned long cstamp)
100{
101 return (cstamp - INITIAL_JIFFIES) * 100UL / HZ;
102}
1da177e4 103
bd11f074
104static inline s32 rfc3315_s14_backoff_init(s32 irt)
105{
106 /* multiply 'initial retransmission time' by 0.9 .. 1.1 */
e8a533cb 107 u64 tmp = get_random_u32_inclusive(900000, 1100000) * (u64)irt;
bd11f074
108 do_div(tmp, 1000000);
109 return (s32)tmp;
110}
111
112static inline s32 rfc3315_s14_backoff_update(s32 rt, s32 mrt)
113{
114 /* multiply 'retransmission timeout' by 1.9 .. 2.1 */
e8a533cb 115 u64 tmp = get_random_u32_inclusive(1900000, 2100000) * (u64)rt;
bd11f074
116 do_div(tmp, 1000000);
117 if ((s32)tmp > mrt) {
118 /* multiply 'maximum retransmission time' by 0.9 .. 1.1 */
e8a533cb 119 tmp = get_random_u32_inclusive(900000, 1100000) * (u64)mrt;
bd11f074
120 do_div(tmp, 1000000);
121 }
122 return (s32)tmp;
123}
124
1da177e4 125#ifdef CONFIG_SYSCTL
a317a2f1 126static int addrconf_sysctl_register(struct inet6_dev *idev);
408c4768
PE
127static void addrconf_sysctl_unregister(struct inet6_dev *idev);
128#else
a317a2f1 129static inline int addrconf_sysctl_register(struct inet6_dev *idev)
408c4768 130{
a317a2f1 131 return 0;
408c4768
PE
132}
133
134static inline void addrconf_sysctl_unregister(struct inet6_dev *idev)
135{
136}
1da177e4
LT
137#endif
138
969c5464 139static void ipv6_gen_rnd_iid(struct in6_addr *addr);
1da177e4 140
1b34be74 141static int ipv6_generate_eui64(u8 *eui, struct net_device *dev);
d9bf82c2 142static int ipv6_count_addresses(const struct inet6_dev *idev);
622c81d5
HFS
143static int ipv6_generate_stable_address(struct in6_addr *addr,
144 u8 dad_count,
145 const struct inet6_dev *idev);
1da177e4 146
27c565ae
ED
147#define IN6_ADDR_HSIZE_SHIFT 8
148#define IN6_ADDR_HSIZE (1 << IN6_ADDR_HSIZE_SHIFT)
1da177e4 149
8805d13f
ED
150static void addrconf_verify(struct net *net);
151static void addrconf_verify_rtnl(struct net *net);
1da177e4 152
c15b1cca 153static struct workqueue_struct *addrconf_wq;
1da177e4
LT
154
155static void addrconf_join_anycast(struct inet6_ifaddr *ifp);
156static void addrconf_leave_anycast(struct inet6_ifaddr *ifp);
157
93d9b7d7
JP
158static void addrconf_type_change(struct net_device *dev,
159 unsigned long event);
ae79dbf6 160static int addrconf_ifdown(struct net_device *dev, bool unregister);
1da177e4 161
8d1c802b 162static struct fib6_info *addrconf_get_prefix_route(const struct in6_addr *pfx,
21caa662
RK
163 int plen,
164 const struct net_device *dev,
2b2450ca
DA
165 u32 flags, u32 noflags,
166 bool no_gw);
21caa662 167
cf22f9a2 168static void addrconf_dad_start(struct inet6_ifaddr *ifp);
c15b1cca 169static void addrconf_dad_work(struct work_struct *w);
c76fe2d9
DA
170static void addrconf_dad_completed(struct inet6_ifaddr *ifp, bool bump_id,
171 bool send_na);
896585d4 172static void addrconf_dad_run(struct inet6_dev *idev, bool restart);
e99e88a9 173static void addrconf_rs_timer(struct timer_list *t);
1da177e4
LT
174static void __ipv6_ifa_notify(int event, struct inet6_ifaddr *ifa);
175static void ipv6_ifa_notify(int event, struct inet6_ifaddr *ifa);
176
1ab1457c 177static void inet6_prefix_notify(int event, struct inet6_dev *idev,
1da177e4 178 struct prefix_info *pinfo);
1da177e4 179
888c848e 180static struct ipv6_devconf ipv6_devconf __read_mostly = {
1da177e4
LT
181 .forwarding = 0,
182 .hop_limit = IPV6_DEFAULT_HOPLIMIT,
183 .mtu6 = IPV6_MIN_MTU,
184 .accept_ra = 1,
185 .accept_redirects = 1,
186 .autoconf = 1,
187 .force_mld_version = 0,
fc4eba58
HFS
188 .mldv1_unsolicited_report_interval = 10 * HZ,
189 .mldv2_unsolicited_report_interval = HZ,
1da177e4
LT
190 .dad_transmits = 1,
191 .rtr_solicits = MAX_RTR_SOLICITATIONS,
192 .rtr_solicit_interval = RTR_SOLICITATION_INTERVAL,
bd11f074 193 .rtr_solicit_max_interval = RTR_SOLICITATION_MAX_INTERVAL,
1da177e4 194 .rtr_solicit_delay = MAX_RTR_SOLICITATION_DELAY,
67ba4152 195 .use_tempaddr = 0,
1da177e4
LT
196 .temp_valid_lft = TEMP_VALID_LIFETIME,
197 .temp_prefered_lft = TEMP_PREFERRED_LIFETIME,
a5fcea2d 198 .regen_min_advance = REGEN_MIN_ADVANCE,
1da177e4
LT
199 .regen_max_retry = REGEN_MAX_RETRY,
200 .max_desync_factor = MAX_DESYNC_FACTOR,
1da177e4 201 .max_addresses = IPV6_MAX_ADDRESSES,
65f5c7c1 202 .accept_ra_defrtr = 1,
6b2e04bc 203 .ra_defrtr_metric = IP6_RT_PRIO_USER,
d9333196 204 .accept_ra_from_local = 0,
8013d1d7 205 .accept_ra_min_hop_limit= 1,
5027d54a 206 .accept_ra_min_lft = 0,
c4fd30eb 207 .accept_ra_pinfo = 1,
930d6ff2
YH
208#ifdef CONFIG_IPV6_ROUTER_PREF
209 .accept_ra_rtr_pref = 1,
52e16356 210 .rtr_probe_interval = 60 * HZ,
09c884d4 211#ifdef CONFIG_IPV6_ROUTE_INFO
bbea124b 212 .accept_ra_rt_info_min_plen = 0,
09c884d4
YH
213 .accept_ra_rt_info_max_plen = 0,
214#endif
930d6ff2 215#endif
fbea49e1 216 .proxy_ndp = 0,
0bcbc926 217 .accept_source_route = 0, /* we do not accept RH0 by default. */
778d80be 218 .disable_ipv6 = 0,
09400953 219 .accept_dad = 0,
b800c3b9 220 .suppress_frag_ndisc = 1,
c2943f14 221 .accept_ra_mtu = 1,
3d1bec99
HFS
222 .stable_secret = {
223 .initialized = false,
3985e8a3
EK
224 },
225 .use_oif_addrs_only = 0,
35103d11 226 .ignore_routes_with_linkdown = 0,
f1705ec1 227 .keep_addr_on_down = 0,
1ababeba 228 .seg6_enabled = 0,
bf355b8d
DL
229#ifdef CONFIG_IPV6_SEG6_HMAC
230 .seg6_require_hmac = 0,
231#endif
adc176c5 232 .enhanced_dad = 1,
d35a00b8 233 .addr_gen_mode = IN6_ADDR_GEN_MODE_EUI64,
df789fe7 234 .disable_policy = 0,
8610c7c6 235 .rpl_seg_enabled = 0,
9ee11f0f
JI
236 .ioam6_enabled = 0,
237 .ioam6_id = IOAM6_DEFAULT_IF_ID,
238 .ioam6_id_wide = IOAM6_DEFAULT_IF_ID_WIDE,
18ac597a 239 .ndisc_evict_nocarrier = 1,
473267a4 240 .ra_honor_pio_life = 0,
1da177e4
LT
241};
242
ab32ea5d 243static struct ipv6_devconf ipv6_devconf_dflt __read_mostly = {
1da177e4
LT
244 .forwarding = 0,
245 .hop_limit = IPV6_DEFAULT_HOPLIMIT,
246 .mtu6 = IPV6_MIN_MTU,
247 .accept_ra = 1,
248 .accept_redirects = 1,
249 .autoconf = 1,
fc4eba58
HFS
250 .force_mld_version = 0,
251 .mldv1_unsolicited_report_interval = 10 * HZ,
252 .mldv2_unsolicited_report_interval = HZ,
1da177e4
LT
253 .dad_transmits = 1,
254 .rtr_solicits = MAX_RTR_SOLICITATIONS,
255 .rtr_solicit_interval = RTR_SOLICITATION_INTERVAL,
bd11f074 256 .rtr_solicit_max_interval = RTR_SOLICITATION_MAX_INTERVAL,
1da177e4 257 .rtr_solicit_delay = MAX_RTR_SOLICITATION_DELAY,
1da177e4
LT
258 .use_tempaddr = 0,
259 .temp_valid_lft = TEMP_VALID_LIFETIME,
260 .temp_prefered_lft = TEMP_PREFERRED_LIFETIME,
a5fcea2d 261 .regen_min_advance = REGEN_MIN_ADVANCE,
1da177e4
LT
262 .regen_max_retry = REGEN_MAX_RETRY,
263 .max_desync_factor = MAX_DESYNC_FACTOR,
1da177e4 264 .max_addresses = IPV6_MAX_ADDRESSES,
65f5c7c1 265 .accept_ra_defrtr = 1,
6b2e04bc 266 .ra_defrtr_metric = IP6_RT_PRIO_USER,
d9333196 267 .accept_ra_from_local = 0,
8013d1d7 268 .accept_ra_min_hop_limit= 1,
5027d54a 269 .accept_ra_min_lft = 0,
c4fd30eb 270 .accept_ra_pinfo = 1,
930d6ff2
YH
271#ifdef CONFIG_IPV6_ROUTER_PREF
272 .accept_ra_rtr_pref = 1,
52e16356 273 .rtr_probe_interval = 60 * HZ,
09c884d4 274#ifdef CONFIG_IPV6_ROUTE_INFO
bbea124b 275 .accept_ra_rt_info_min_plen = 0,
09c884d4
YH
276 .accept_ra_rt_info_max_plen = 0,
277#endif
930d6ff2 278#endif
fbea49e1 279 .proxy_ndp = 0,
0bcbc926 280 .accept_source_route = 0, /* we do not accept RH0 by default. */
778d80be 281 .disable_ipv6 = 0,
1b34be74 282 .accept_dad = 1,
b800c3b9 283 .suppress_frag_ndisc = 1,
c2943f14 284 .accept_ra_mtu = 1,
3d1bec99
HFS
285 .stable_secret = {
286 .initialized = false,
287 },
3985e8a3 288 .use_oif_addrs_only = 0,
35103d11 289 .ignore_routes_with_linkdown = 0,
f1705ec1 290 .keep_addr_on_down = 0,
1ababeba 291 .seg6_enabled = 0,
bf355b8d
DL
292#ifdef CONFIG_IPV6_SEG6_HMAC
293 .seg6_require_hmac = 0,
294#endif
adc176c5 295 .enhanced_dad = 1,
d35a00b8 296 .addr_gen_mode = IN6_ADDR_GEN_MODE_EUI64,
df789fe7 297 .disable_policy = 0,
8610c7c6 298 .rpl_seg_enabled = 0,
9ee11f0f
JI
299 .ioam6_enabled = 0,
300 .ioam6_id = IOAM6_DEFAULT_IF_ID,
301 .ioam6_id_wide = IOAM6_DEFAULT_IF_ID_WIDE,
18ac597a 302 .ndisc_evict_nocarrier = 1,
473267a4 303 .ra_honor_pio_life = 0,
1da177e4
LT
304};
305
1f372c7b
MM
306/* Check if link is ready: is it up and is a valid qdisc available */
307static inline bool addrconf_link_ready(const struct net_device *dev)
f24e3d65 308{
1f372c7b 309 return netif_oper_up(dev) && !qdisc_tx_is_noop(dev);
f24e3d65
MC
310}
311
b7b1bfce 312static void addrconf_del_rs_timer(struct inet6_dev *idev)
1da177e4 313{
b7b1bfce
HFS
314 if (del_timer(&idev->rs_timer))
315 __in6_dev_put(idev);
316}
317
c15b1cca 318static void addrconf_del_dad_work(struct inet6_ifaddr *ifp)
b7b1bfce 319{
c15b1cca 320 if (cancel_delayed_work(&ifp->dad_work))
1da177e4
LT
321 __in6_ifa_put(ifp);
322}
323
b7b1bfce
HFS
324static void addrconf_mod_rs_timer(struct inet6_dev *idev,
325 unsigned long when)
326{
06a07169 327 if (!mod_timer(&idev->rs_timer, jiffies + when))
b7b1bfce 328 in6_dev_hold(idev);
b7b1bfce 329}
1da177e4 330
c15b1cca
HFS
331static void addrconf_mod_dad_work(struct inet6_ifaddr *ifp,
332 unsigned long delay)
1da177e4 333{
f8a894b2
XL
334 in6_ifa_hold(ifp);
335 if (mod_delayed_work(addrconf_wq, &ifp->dad_work, delay))
336 in6_ifa_put(ifp);
1da177e4
LT
337}
338
7f7d9a6b
HX
339static int snmp6_alloc_dev(struct inet6_dev *idev)
340{
827da44c
JS
341 int i;
342
425b9c7f 343 idev->stats.ipv6 = alloc_percpu_gfp(struct ipstats_mib, GFP_KERNEL_ACCOUNT);
698365fa 344 if (!idev->stats.ipv6)
7f7d9a6b 345 goto err_ip;
827da44c
JS
346
347 for_each_possible_cpu(i) {
348 struct ipstats_mib *addrconf_stats;
698365fa 349 addrconf_stats = per_cpu_ptr(idev->stats.ipv6, i);
827da44c 350 u64_stats_init(&addrconf_stats->syncp);
827da44c
JS
351 }
352
353
be281e55
ED
354 idev->stats.icmpv6dev = kzalloc(sizeof(struct icmpv6_mib_device),
355 GFP_KERNEL);
356 if (!idev->stats.icmpv6dev)
7f7d9a6b 357 goto err_icmp;
be281e55 358 idev->stats.icmpv6msgdev = kzalloc(sizeof(struct icmpv6msg_mib_device),
425b9c7f 359 GFP_KERNEL_ACCOUNT);
be281e55 360 if (!idev->stats.icmpv6msgdev)
14878f75 361 goto err_icmpmsg;
7f7d9a6b
HX
362
363 return 0;
364
14878f75 365err_icmpmsg:
be281e55 366 kfree(idev->stats.icmpv6dev);
7f7d9a6b 367err_icmp:
698365fa 368 free_percpu(idev->stats.ipv6);
7f7d9a6b 369err_ip:
aaf70ec7 370 return -ENOMEM;
7f7d9a6b
HX
371}
372
8e5e8f30 373static struct inet6_dev *ipv6_add_dev(struct net_device *dev)
1da177e4
LT
374{
375 struct inet6_dev *ndev;
a317a2f1 376 int err = -ENOMEM;
1da177e4
LT
377
378 ASSERT_RTNL();
379
e5f80fcf 380 if (dev->mtu < IPV6_MIN_MTU && dev != blackhole_netdev)
a317a2f1 381 return ERR_PTR(-EINVAL);
1da177e4 382
425b9c7f 383 ndev = kzalloc(sizeof(*ndev), GFP_KERNEL_ACCOUNT);
63159f29 384 if (!ndev)
a317a2f1 385 return ERR_PTR(err);
322f74a4
IO
386
387 rwlock_init(&ndev->lock);
388 ndev->dev = dev;
502a2ffd 389 INIT_LIST_HEAD(&ndev->addr_list);
e99e88a9 390 timer_setup(&ndev->rs_timer, addrconf_rs_timer, 0);
c346dca1 391 memcpy(&ndev->cnf, dev_net(dev)->ipv6.devconf_dflt, sizeof(ndev->cnf));
9b29c696
HFS
392
393 if (ndev->cnf.stable_secret.initialized)
d35a00b8 394 ndev->cnf.addr_gen_mode = IN6_ADDR_GEN_MODE_STABLE_PRIVACY;
9b29c696 395
322f74a4 396 ndev->cnf.mtu6 = dev->mtu;
49b99da2 397 ndev->ra_mtu = 0;
322f74a4 398 ndev->nd_parms = neigh_parms_alloc(dev, &nd_tbl);
63159f29 399 if (!ndev->nd_parms) {
322f74a4 400 kfree(ndev);
a317a2f1 401 return ERR_PTR(err);
322f74a4 402 }
0187bdfb
BH
403 if (ndev->cnf.forwarding)
404 dev_disable_lro(dev);
322f74a4 405 /* We refer to the device */
d62607c3 406 netdev_hold(dev, &ndev->dev_tracker, GFP_KERNEL);
1da177e4 407
dd263a8c
IS
408 if (snmp6_alloc_dev(ndev) < 0) {
409 netdev_dbg(dev, "%s: cannot allocate memory for statistics\n",
410 __func__);
411 neigh_parms_release(&nd_tbl, ndev->nd_parms);
d62607c3 412 netdev_put(dev, &ndev->dev_tracker);
dd263a8c
IS
413 kfree(ndev);
414 return ERR_PTR(err);
415 }
1da177e4 416
dd263a8c 417 if (dev != blackhole_netdev) {
e5f80fcf
ED
418 if (snmp6_register_dev(ndev) < 0) {
419 netdev_dbg(dev, "%s: cannot create /proc/net/dev_snmp6/%s\n",
420 __func__, dev->name);
421 goto err_release;
422 }
322f74a4 423 }
9d6280da 424 /* One reference from device. */
1be92460 425 refcount_set(&ndev->refcnt, 1);
1da177e4 426
1b34be74
YH
427 if (dev->flags & (IFF_NOARP | IFF_LOOPBACK))
428 ndev->cnf.accept_dad = -1;
429
07a93626 430#if IS_ENABLED(CONFIG_IPV6_SIT)
b077d7ab 431 if (dev->type == ARPHRD_SIT && (dev->priv_flags & IFF_ISATAP)) {
f3213831 432 pr_info("%s: Disabled Multicast RS\n", dev->name);
b077d7ab
YH
433 ndev->cnf.rtr_solicits = 0;
434 }
435#endif
436
372e6c8f 437 INIT_LIST_HEAD(&ndev->tempaddr_list);
76506a98 438 ndev->desync_factor = U32_MAX;
322f74a4
IO
439 if ((dev->flags&IFF_LOOPBACK) ||
440 dev->type == ARPHRD_TUNNEL ||
9625ed72 441 dev->type == ARPHRD_TUNNEL6 ||
0be669bb 442 dev->type == ARPHRD_SIT ||
0be669bb 443 dev->type == ARPHRD_NONE) {
322f74a4 444 ndev->cnf.use_tempaddr = -1;
969c5464 445 }
5d9efa7e 446
914faa14 447 ndev->token = in6addr_any;
1da177e4 448
1f372c7b 449 if (netif_running(dev) && addrconf_link_ready(dev))
53aadcc9
HX
450 ndev->if_flags |= IF_READY;
451
322f74a4
IO
452 ipv6_mc_init_dev(ndev);
453 ndev->tstamp = jiffies;
e5f80fcf
ED
454 if (dev != blackhole_netdev) {
455 err = addrconf_sysctl_register(ndev);
456 if (err) {
457 ipv6_mc_destroy_dev(ndev);
458 snmp6_unregister_dev(ndev);
459 goto err_release;
460 }
a317a2f1 461 }
30c4cf57 462 /* protected by rtnl_lock */
cf778b00 463 rcu_assign_pointer(dev->ip6_ptr, ndev);
d88ae4cc 464
e5f80fcf
ED
465 if (dev != blackhole_netdev) {
466 /* Join interface-local all-node multicast group */
467 ipv6_dev_mc_inc(dev, &in6addr_interfacelocal_allnodes);
2c5e8933 468
e5f80fcf
ED
469 /* Join all-node multicast group */
470 ipv6_dev_mc_inc(dev, &in6addr_linklocal_allnodes);
d6ddef9e 471
e5f80fcf
ED
472 /* Join all-router multicast group if forwarding is set */
473 if (ndev->cnf.forwarding && (dev->flags & IFF_MULTICAST))
474 ipv6_dev_mc_inc(dev, &in6addr_linklocal_allrouters);
475 }
1da177e4 476 return ndev;
a317a2f1
WC
477
478err_release:
479 neigh_parms_release(&nd_tbl, ndev->nd_parms);
480 ndev->dead = 1;
481 in6_dev_finish_destroy(ndev);
482 return ERR_PTR(err);
1da177e4
LT
483}
484
8e5e8f30 485static struct inet6_dev *ipv6_find_idev(struct net_device *dev)
1da177e4
LT
486{
487 struct inet6_dev *idev;
488
489 ASSERT_RTNL();
490
e21e8467
SH
491 idev = __in6_dev_get(dev);
492 if (!idev) {
493 idev = ipv6_add_dev(dev);
a317a2f1 494 if (IS_ERR(idev))
db0b99f5 495 return idev;
1da177e4 496 }
c5e33bdd 497
1da177e4
LT
498 if (dev->flags&IFF_UP)
499 ipv6_mc_up(idev);
500 return idev;
501}
502
f3a1bfb1
ND
503static int inet6_netconf_msgsize_devconf(int type)
504{
505 int size = NLMSG_ALIGN(sizeof(struct netconfmsg))
506 + nla_total_size(4); /* NETCONFA_IFINDEX */
136ba622 507 bool all = false;
f3a1bfb1 508
136ba622
ZS
509 if (type == NETCONFA_ALL)
510 all = true;
511
512 if (all || type == NETCONFA_FORWARDING)
f3a1bfb1 513 size += nla_total_size(4);
b1afce95 514#ifdef CONFIG_IPV6_MROUTE
136ba622 515 if (all || type == NETCONFA_MC_FORWARDING)
d67b8c61 516 size += nla_total_size(4);
b1afce95 517#endif
136ba622 518 if (all || type == NETCONFA_PROXY_NEIGH)
c92d5491 519 size += nla_total_size(4);
f3a1bfb1 520
136ba622 521 if (all || type == NETCONFA_IGNORE_ROUTES_WITH_LINKDOWN)
35103d11
AG
522 size += nla_total_size(4);
523
f3a1bfb1
ND
524 return size;
525}
526
527static int inet6_netconf_fill_devconf(struct sk_buff *skb, int ifindex,
528 struct ipv6_devconf *devconf, u32 portid,
529 u32 seq, int event, unsigned int flags,
530 int type)
531{
532 struct nlmsghdr *nlh;
533 struct netconfmsg *ncm;
136ba622 534 bool all = false;
f3a1bfb1
ND
535
536 nlh = nlmsg_put(skb, portid, seq, event, sizeof(struct netconfmsg),
537 flags);
63159f29 538 if (!nlh)
f3a1bfb1
ND
539 return -EMSGSIZE;
540
136ba622
ZS
541 if (type == NETCONFA_ALL)
542 all = true;
543
f3a1bfb1
ND
544 ncm = nlmsg_data(nlh);
545 ncm->ncm_family = AF_INET6;
546
547 if (nla_put_s32(skb, NETCONFA_IFINDEX, ifindex) < 0)
548 goto nla_put_failure;
549
23452170
DA
550 if (!devconf)
551 goto out;
552
136ba622 553 if ((all || type == NETCONFA_FORWARDING) &&
32f75417
ED
554 nla_put_s32(skb, NETCONFA_FORWARDING,
555 READ_ONCE(devconf->forwarding)) < 0)
f3a1bfb1 556 goto nla_put_failure;
b1afce95 557#ifdef CONFIG_IPV6_MROUTE
136ba622 558 if ((all || type == NETCONFA_MC_FORWARDING) &&
d67b8c61 559 nla_put_s32(skb, NETCONFA_MC_FORWARDING,
145c7a79 560 atomic_read(&devconf->mc_forwarding)) < 0)
d67b8c61 561 goto nla_put_failure;
b1afce95 562#endif
136ba622 563 if ((all || type == NETCONFA_PROXY_NEIGH) &&
a8fbd4d9
ED
564 nla_put_s32(skb, NETCONFA_PROXY_NEIGH,
565 READ_ONCE(devconf->proxy_ndp)) < 0)
c92d5491 566 goto nla_put_failure;
567
136ba622 568 if ((all || type == NETCONFA_IGNORE_ROUTES_WITH_LINKDOWN) &&
35103d11 569 nla_put_s32(skb, NETCONFA_IGNORE_ROUTES_WITH_LINKDOWN,
fca34cc0 570 READ_ONCE(devconf->ignore_routes_with_linkdown)) < 0)
35103d11
AG
571 goto nla_put_failure;
572
23452170 573out:
053c095a
JB
574 nlmsg_end(skb, nlh);
575 return 0;
f3a1bfb1
ND
576
577nla_put_failure:
578 nlmsg_cancel(skb, nlh);
579 return -EMSGSIZE;
580}
581
85b3daad
DA
582void inet6_netconf_notify_devconf(struct net *net, int event, int type,
583 int ifindex, struct ipv6_devconf *devconf)
f3a1bfb1
ND
584{
585 struct sk_buff *skb;
586 int err = -ENOBUFS;
587
927265bc 588 skb = nlmsg_new(inet6_netconf_msgsize_devconf(type), GFP_KERNEL);
63159f29 589 if (!skb)
f3a1bfb1
ND
590 goto errout;
591
592 err = inet6_netconf_fill_devconf(skb, ifindex, devconf, 0, 0,
85b3daad 593 event, 0, type);
f3a1bfb1
ND
594 if (err < 0) {
595 /* -EMSGSIZE implies BUG in inet6_netconf_msgsize_devconf() */
596 WARN_ON(err == -EMSGSIZE);
597 kfree_skb(skb);
598 goto errout;
599 }
927265bc 600 rtnl_notify(skb, net, 0, RTNLGRP_IPV6_NETCONF, NULL, GFP_KERNEL);
f3a1bfb1
ND
601 return;
602errout:
bd779028 603 rtnl_set_sk_err(net, RTNLGRP_IPV6_NETCONF, err);
f3a1bfb1
ND
604}
605
76f8f6cb
ND
606static const struct nla_policy devconf_ipv6_policy[NETCONFA_MAX+1] = {
607 [NETCONFA_IFINDEX] = { .len = sizeof(int) },
608 [NETCONFA_FORWARDING] = { .len = sizeof(int) },
c92d5491 609 [NETCONFA_PROXY_NEIGH] = { .len = sizeof(int) },
35103d11 610 [NETCONFA_IGNORE_ROUTES_WITH_LINKDOWN] = { .len = sizeof(int) },
76f8f6cb
ND
611};
612
38d51810
JK
613static int inet6_netconf_valid_get_req(struct sk_buff *skb,
614 const struct nlmsghdr *nlh,
615 struct nlattr **tb,
616 struct netlink_ext_ack *extack)
617{
618 int i, err;
619
620 if (nlh->nlmsg_len < nlmsg_msg_size(sizeof(struct netconfmsg))) {
621 NL_SET_ERR_MSG_MOD(extack, "Invalid header for netconf get request");
622 return -EINVAL;
623 }
624
625 if (!netlink_strict_get_check(skb))
8cb08174
JB
626 return nlmsg_parse_deprecated(nlh, sizeof(struct netconfmsg),
627 tb, NETCONFA_MAX,
628 devconf_ipv6_policy, extack);
38d51810 629
8cb08174
JB
630 err = nlmsg_parse_deprecated_strict(nlh, sizeof(struct netconfmsg),
631 tb, NETCONFA_MAX,
632 devconf_ipv6_policy, extack);
38d51810
JK
633 if (err)
634 return err;
635
636 for (i = 0; i <= NETCONFA_MAX; i++) {
637 if (!tb[i])
638 continue;
639
640 switch (i) {
641 case NETCONFA_IFINDEX:
642 break;
643 default:
644 NL_SET_ERR_MSG_MOD(extack, "Unsupported attribute in netconf get request");
645 return -EINVAL;
646 }
647 }
648
649 return 0;
650}
651
76f8f6cb 652static int inet6_netconf_get_devconf(struct sk_buff *in_skb,
c21ef3e3
DA
653 struct nlmsghdr *nlh,
654 struct netlink_ext_ack *extack)
76f8f6cb
ND
655{
656 struct net *net = sock_net(in_skb->sk);
657 struct nlattr *tb[NETCONFA_MAX+1];
4ea2607f
FW
658 struct inet6_dev *in6_dev = NULL;
659 struct net_device *dev = NULL;
76f8f6cb
ND
660 struct sk_buff *skb;
661 struct ipv6_devconf *devconf;
76f8f6cb
ND
662 int ifindex;
663 int err;
664
38d51810 665 err = inet6_netconf_valid_get_req(in_skb, nlh, tb, extack);
76f8f6cb 666 if (err < 0)
4ea2607f 667 return err;
76f8f6cb 668
76f8f6cb 669 if (!tb[NETCONFA_IFINDEX])
4ea2607f 670 return -EINVAL;
76f8f6cb 671
4ea2607f 672 err = -EINVAL;
76f8f6cb
ND
673 ifindex = nla_get_s32(tb[NETCONFA_IFINDEX]);
674 switch (ifindex) {
675 case NETCONFA_IFINDEX_ALL:
676 devconf = net->ipv6.devconf_all;
677 break;
678 case NETCONFA_IFINDEX_DEFAULT:
679 devconf = net->ipv6.devconf_dflt;
680 break;
681 default:
4ea2607f 682 dev = dev_get_by_index(net, ifindex);
63159f29 683 if (!dev)
4ea2607f
FW
684 return -EINVAL;
685 in6_dev = in6_dev_get(dev);
63159f29 686 if (!in6_dev)
76f8f6cb
ND
687 goto errout;
688 devconf = &in6_dev->cnf;
689 break;
690 }
691
692 err = -ENOBUFS;
4ea2607f 693 skb = nlmsg_new(inet6_netconf_msgsize_devconf(NETCONFA_ALL), GFP_KERNEL);
63159f29 694 if (!skb)
76f8f6cb
ND
695 goto errout;
696
697 err = inet6_netconf_fill_devconf(skb, ifindex, devconf,
698 NETLINK_CB(in_skb).portid,
699 nlh->nlmsg_seq, RTM_NEWNETCONF, 0,
136ba622 700 NETCONFA_ALL);
76f8f6cb
ND
701 if (err < 0) {
702 /* -EMSGSIZE implies BUG in inet6_netconf_msgsize_devconf() */
703 WARN_ON(err == -EMSGSIZE);
704 kfree_skb(skb);
705 goto errout;
706 }
707 err = rtnl_unicast(skb, net, NETLINK_CB(in_skb).portid);
708errout:
4ea2607f
FW
709 if (in6_dev)
710 in6_dev_put(in6_dev);
1160dfa1 711 dev_put(dev);
76f8f6cb
ND
712 return err;
713}
714
e898e4cd
ED
715/* Combine dev_addr_genid and dev_base_seq to detect changes.
716 */
717static u32 inet6_base_seq(const struct net *net)
718{
719 u32 res = atomic_read(&net->ipv6.dev_addr_genid) +
720 net->dev_base_seq;
721
722 /* Must not return 0 (see nl_dump_check_consistent()).
723 * Chose a value far away from 0.
724 */
725 if (!res)
726 res = 0x80000000;
727 return res;
728}
729
730
7a674200
ND
731static int inet6_netconf_dump_devconf(struct sk_buff *skb,
732 struct netlink_callback *cb)
733{
addd383f 734 const struct nlmsghdr *nlh = cb->nlh;
7a674200
ND
735 struct net *net = sock_net(skb->sk);
736 int h, s_h;
737 int idx, s_idx;
738 struct net_device *dev;
739 struct inet6_dev *idev;
740 struct hlist_head *head;
741
addd383f
DA
742 if (cb->strict_check) {
743 struct netlink_ext_ack *extack = cb->extack;
744 struct netconfmsg *ncm;
745
746 if (nlh->nlmsg_len < nlmsg_msg_size(sizeof(*ncm))) {
747 NL_SET_ERR_MSG_MOD(extack, "Invalid header for netconf dump request");
748 return -EINVAL;
749 }
750
751 if (nlmsg_attrlen(nlh, sizeof(*ncm))) {
752 NL_SET_ERR_MSG_MOD(extack, "Invalid data after header in netconf dump request");
753 return -EINVAL;
754 }
755 }
756
7a674200
ND
757 s_h = cb->args[0];
758 s_idx = idx = cb->args[1];
759
760 for (h = s_h; h < NETDEV_HASHENTRIES; h++, s_idx = 0) {
761 idx = 0;
762 head = &net->dev_index_head[h];
763 rcu_read_lock();
e898e4cd 764 cb->seq = inet6_base_seq(net);
7a674200
ND
765 hlist_for_each_entry_rcu(dev, head, index_hlist) {
766 if (idx < s_idx)
767 goto cont;
768 idev = __in6_dev_get(dev);
769 if (!idev)
770 goto cont;
771
772 if (inet6_netconf_fill_devconf(skb, dev->ifindex,
773 &idev->cnf,
774 NETLINK_CB(cb->skb).portid,
addd383f 775 nlh->nlmsg_seq,
7a674200
ND
776 RTM_NEWNETCONF,
777 NLM_F_MULTI,
136ba622 778 NETCONFA_ALL) < 0) {
7a674200
ND
779 rcu_read_unlock();
780 goto done;
781 }
63998ac2 782 nl_dump_check_consistent(cb, nlmsg_hdr(skb));
7a674200
ND
783cont:
784 idx++;
785 }
786 rcu_read_unlock();
787 }
788 if (h == NETDEV_HASHENTRIES) {
789 if (inet6_netconf_fill_devconf(skb, NETCONFA_IFINDEX_ALL,
790 net->ipv6.devconf_all,
791 NETLINK_CB(cb->skb).portid,
addd383f 792 nlh->nlmsg_seq,
7a674200 793 RTM_NEWNETCONF, NLM_F_MULTI,
136ba622 794 NETCONFA_ALL) < 0)
7a674200
ND
795 goto done;
796 else
797 h++;
798 }
799 if (h == NETDEV_HASHENTRIES + 1) {
800 if (inet6_netconf_fill_devconf(skb, NETCONFA_IFINDEX_DEFAULT,
801 net->ipv6.devconf_dflt,
802 NETLINK_CB(cb->skb).portid,
addd383f 803 nlh->nlmsg_seq,
7a674200 804 RTM_NEWNETCONF, NLM_F_MULTI,
136ba622 805 NETCONFA_ALL) < 0)
7a674200
ND
806 goto done;
807 else
808 h++;
809 }
810done:
811 cb->args[0] = h;
812 cb->args[1] = idx;
813
814 return skb->len;
815}
816
1da177e4
LT
817#ifdef CONFIG_SYSCTL
818static void dev_forward_change(struct inet6_dev *idev)
819{
820 struct net_device *dev;
821 struct inet6_ifaddr *ifa;
51454ea4 822 LIST_HEAD(tmp_addr_list);
1da177e4
LT
823
824 if (!idev)
825 return;
826 dev = idev->dev;
0187bdfb
BH
827 if (idev->cnf.forwarding)
828 dev_disable_lro(dev);
1a940835 829 if (dev->flags & IFF_MULTICAST) {
2c5e8933 830 if (idev->cnf.forwarding) {
f3ee4010 831 ipv6_dev_mc_inc(dev, &in6addr_linklocal_allrouters);
2c5e8933
HFS
832 ipv6_dev_mc_inc(dev, &in6addr_interfacelocal_allrouters);
833 ipv6_dev_mc_inc(dev, &in6addr_sitelocal_allrouters);
834 } else {
f3ee4010 835 ipv6_dev_mc_dec(dev, &in6addr_linklocal_allrouters);
2c5e8933
HFS
836 ipv6_dev_mc_dec(dev, &in6addr_interfacelocal_allrouters);
837 ipv6_dev_mc_dec(dev, &in6addr_sitelocal_allrouters);
838 }
1da177e4 839 }
502a2ffd 840
51454ea4 841 read_lock_bh(&idev->lock);
502a2ffd 842 list_for_each_entry(ifa, &idev->addr_list, if_list) {
2c12a74c
MW
843 if (ifa->flags&IFA_F_TENTATIVE)
844 continue;
51454ea4
ND
845 list_add_tail(&ifa->if_list_aux, &tmp_addr_list);
846 }
847 read_unlock_bh(&idev->lock);
848
849 while (!list_empty(&tmp_addr_list)) {
850 ifa = list_first_entry(&tmp_addr_list,
851 struct inet6_ifaddr, if_list_aux);
852 list_del(&ifa->if_list_aux);
1da177e4
LT
853 if (idev->cnf.forwarding)
854 addrconf_join_anycast(ifa);
855 else
856 addrconf_leave_anycast(ifa);
857 }
51454ea4 858
85b3daad
DA
859 inet6_netconf_notify_devconf(dev_net(dev), RTM_NEWNETCONF,
860 NETCONFA_FORWARDING,
f3a1bfb1 861 dev->ifindex, &idev->cnf);
1da177e4
LT
862}
863
864
e186932b 865static void addrconf_forward_change(struct net *net, __s32 newf)
1da177e4
LT
866{
867 struct net_device *dev;
868 struct inet6_dev *idev;
869
4acd4945 870 for_each_netdev(net, dev) {
1da177e4
LT
871 idev = __in6_dev_get(dev);
872 if (idev) {
e186932b 873 int changed = (!idev->cnf.forwarding) ^ (!newf);
32f75417
ED
874
875 WRITE_ONCE(idev->cnf.forwarding, newf);
1da177e4
LT
876 if (changed)
877 dev_forward_change(idev);
878 }
1da177e4 879 }
1da177e4 880}
c8fecf22 881
013d97e9 882static int addrconf_fixup_forwarding(struct ctl_table *table, int *p, int newf)
c8fecf22 883{
bff16c2f 884 struct net *net;
013d97e9
FR
885 int old;
886
887 if (!rtnl_trylock())
888 return restart_syscall();
bff16c2f
PE
889
890 net = (struct net *)table->extra2;
013d97e9 891 old = *p;
32f75417 892 WRITE_ONCE(*p, newf);
b325fddb 893
013d97e9 894 if (p == &net->ipv6.devconf_dflt->forwarding) {
f3a1bfb1 895 if ((!newf) ^ (!old))
85b3daad
DA
896 inet6_netconf_notify_devconf(net, RTM_NEWNETCONF,
897 NETCONFA_FORWARDING,
f3a1bfb1
ND
898 NETCONFA_IFINDEX_DEFAULT,
899 net->ipv6.devconf_dflt);
013d97e9
FR
900 rtnl_unlock();
901 return 0;
88af182e 902 }
c8fecf22 903
e186932b 904 if (p == &net->ipv6.devconf_all->forwarding) {
d26c638c
ND
905 int old_dflt = net->ipv6.devconf_dflt->forwarding;
906
32f75417 907 WRITE_ONCE(net->ipv6.devconf_dflt->forwarding, newf);
d26c638c 908 if ((!newf) ^ (!old_dflt))
85b3daad
DA
909 inet6_netconf_notify_devconf(net, RTM_NEWNETCONF,
910 NETCONFA_FORWARDING,
d26c638c
ND
911 NETCONFA_IFINDEX_DEFAULT,
912 net->ipv6.devconf_dflt);
913
e186932b 914 addrconf_forward_change(net, newf);
f3a1bfb1 915 if ((!newf) ^ (!old))
85b3daad
DA
916 inet6_netconf_notify_devconf(net, RTM_NEWNETCONF,
917 NETCONFA_FORWARDING,
f3a1bfb1
ND
918 NETCONFA_IFINDEX_ALL,
919 net->ipv6.devconf_all);
013d97e9 920 } else if ((!newf) ^ (!old))
c8fecf22 921 dev_forward_change((struct inet6_dev *)table->extra1);
0187bdfb 922 rtnl_unlock();
c8fecf22 923
013d97e9 924 if (newf)
7b4da532 925 rt6_purge_dflt_routers(net);
b325fddb 926 return 1;
c8fecf22 927}
35103d11
AG
928
929static void addrconf_linkdown_change(struct net *net, __s32 newf)
930{
931 struct net_device *dev;
932 struct inet6_dev *idev;
933
934 for_each_netdev(net, dev) {
935 idev = __in6_dev_get(dev);
936 if (idev) {
937 int changed = (!idev->cnf.ignore_routes_with_linkdown) ^ (!newf);
938
fca34cc0 939 WRITE_ONCE(idev->cnf.ignore_routes_with_linkdown, newf);
35103d11
AG
940 if (changed)
941 inet6_netconf_notify_devconf(dev_net(dev),
85b3daad 942 RTM_NEWNETCONF,
35103d11
AG
943 NETCONFA_IGNORE_ROUTES_WITH_LINKDOWN,
944 dev->ifindex,
945 &idev->cnf);
946 }
947 }
948}
949
950static int addrconf_fixup_linkdown(struct ctl_table *table, int *p, int newf)
951{
952 struct net *net;
953 int old;
954
955 if (!rtnl_trylock())
956 return restart_syscall();
957
958 net = (struct net *)table->extra2;
959 old = *p;
fca34cc0 960 WRITE_ONCE(*p, newf);
35103d11
AG
961
962 if (p == &net->ipv6.devconf_dflt->ignore_routes_with_linkdown) {
963 if ((!newf) ^ (!old))
964 inet6_netconf_notify_devconf(net,
85b3daad 965 RTM_NEWNETCONF,
35103d11
AG
966 NETCONFA_IGNORE_ROUTES_WITH_LINKDOWN,
967 NETCONFA_IFINDEX_DEFAULT,
968 net->ipv6.devconf_dflt);
969 rtnl_unlock();
970 return 0;
971 }
972
973 if (p == &net->ipv6.devconf_all->ignore_routes_with_linkdown) {
fca34cc0 974 WRITE_ONCE(net->ipv6.devconf_dflt->ignore_routes_with_linkdown, newf);
35103d11
AG
975 addrconf_linkdown_change(net, newf);
976 if ((!newf) ^ (!old))
977 inet6_netconf_notify_devconf(net,
85b3daad 978 RTM_NEWNETCONF,
35103d11
AG
979 NETCONFA_IGNORE_ROUTES_WITH_LINKDOWN,
980 NETCONFA_IFINDEX_ALL,
981 net->ipv6.devconf_all);
982 }
983 rtnl_unlock();
984
985 return 1;
986}
987
1da177e4
LT
988#endif
989
5c578aed 990/* Nobody refers to this ifaddr, destroy it */
1da177e4
LT
991void inet6_ifa_finish_destroy(struct inet6_ifaddr *ifp)
992{
c2e21293 993 WARN_ON(!hlist_unhashed(&ifp->addr_lst));
547b792c 994
1da177e4 995#ifdef NET_REFCNT_DEBUG
91df42be 996 pr_debug("%s\n", __func__);
1da177e4
LT
997#endif
998
999 in6_dev_put(ifp->idev);
1000
c15b1cca
HFS
1001 if (cancel_delayed_work(&ifp->dad_work))
1002 pr_notice("delayed DAD work was pending while freeing ifa=%p\n",
1003 ifp);
1da177e4 1004
e9d3e084 1005 if (ifp->state != INET6_IFADDR_STATE_DEAD) {
f3213831 1006 pr_warn("Freeing alive inet6 address %p\n", ifp);
1da177e4
LT
1007 return;
1008 }
1da177e4 1009
e5785985 1010 kfree_rcu(ifp, rcu);
1da177e4
LT
1011}
1012
e55ffac6
BH
1013static void
1014ipv6_link_dev_addr(struct inet6_dev *idev, struct inet6_ifaddr *ifp)
1015{
502a2ffd 1016 struct list_head *p;
8a6ce0c0 1017 int ifp_scope = ipv6_addr_src_scope(&ifp->addr);
e55ffac6
BH
1018
1019 /*
1020 * Each device address list is sorted in order of scope -
1021 * global before linklocal.
1022 */
502a2ffd 1023 list_for_each(p, &idev->addr_list) {
1024 struct inet6_ifaddr *ifa
1025 = list_entry(p, struct inet6_ifaddr, if_list);
8a6ce0c0 1026 if (ifp_scope >= ipv6_addr_src_scope(&ifa->addr))
e55ffac6
BH
1027 break;
1028 }
1029
8ef802aa 1030 list_add_tail_rcu(&ifp->if_list, p);
e55ffac6
BH
1031}
1032
3f27fb23 1033static u32 inet6_addr_hash(const struct net *net, const struct in6_addr *addr)
3eb84f49 1034{
3f27fb23
ED
1035 u32 val = ipv6_addr_hash(addr) ^ net_hash_mix(net);
1036
1037 return hash_32(val, IN6_ADDR_HSIZE_SHIFT);
3eb84f49
YH
1038}
1039
56fc709b 1040static bool ipv6_chk_same_addr(struct net *net, const struct in6_addr *addr,
752a9292 1041 struct net_device *dev, unsigned int hash)
56fc709b 1042{
56fc709b
ED
1043 struct inet6_ifaddr *ifp;
1044
e66d1172 1045 hlist_for_each_entry(ifp, &net->ipv6.inet6_addr_lst[hash], addr_lst) {
56fc709b
ED
1046 if (ipv6_addr_equal(&ifp->addr, addr)) {
1047 if (!dev || ifp->idev->dev == dev)
1048 return true;
1049 }
1050 }
1051 return false;
1052}
1053
f3d9832e
DA
1054static int ipv6_add_addr_hash(struct net_device *dev, struct inet6_ifaddr *ifa)
1055{
e66d1172
ED
1056 struct net *net = dev_net(dev);
1057 unsigned int hash = inet6_addr_hash(net, &ifa->addr);
f3d9832e
DA
1058 int err = 0;
1059
09eed119 1060 spin_lock_bh(&net->ipv6.addrconf_hash_lock);
f3d9832e
DA
1061
1062 /* Ignore adding duplicate addresses on an interface */
e66d1172 1063 if (ipv6_chk_same_addr(net, &ifa->addr, dev, hash)) {
e32ac250 1064 netdev_dbg(dev, "ipv6_add_addr: already assigned\n");
f3d9832e 1065 err = -EEXIST;
752a9292 1066 } else {
e66d1172 1067 hlist_add_head_rcu(&ifa->addr_lst, &net->ipv6.inet6_addr_lst[hash]);
f3d9832e
DA
1068 }
1069
09eed119 1070 spin_unlock_bh(&net->ipv6.addrconf_hash_lock);
f3d9832e
DA
1071
1072 return err;
1073}
1074
1da177e4
LT
1075/* On success it returns ifp with increased reference count */
1076
1077static struct inet6_ifaddr *
e6464b8c 1078ipv6_add_addr(struct inet6_dev *idev, struct ifa6_config *cfg,
de95e047 1079 bool can_block, struct netlink_ext_ack *extack)
1da177e4 1080{
f3d9832e 1081 gfp_t gfp_flags = can_block ? GFP_KERNEL : GFP_ATOMIC;
e6464b8c 1082 int addr_type = ipv6_addr_type(cfg->pfx);
df789fe7 1083 struct net *net = dev_net(idev->dev);
1da177e4 1084 struct inet6_ifaddr *ifa = NULL;
360a9887 1085 struct fib6_info *f6i = NULL;
1da177e4 1086 int err = 0;
d68b8270 1087
7f6c4039
HL
1088 if (addr_type == IPV6_ADDR_ANY) {
1089 NL_SET_ERR_MSG_MOD(extack, "Invalid address");
d68b8270 1090 return ERR_PTR(-EADDRNOTAVAIL);
7f6c4039
HL
1091 } else if (addr_type & IPV6_ADDR_MULTICAST &&
1092 !(cfg->ifa_flags & IFA_F_MCAUTOJOIN)) {
1093 NL_SET_ERR_MSG_MOD(extack, "Cannot assign multicast address without \"IFA_F_MCAUTOJOIN\" flag");
1094 return ERR_PTR(-EADDRNOTAVAIL);
1095 } else if (!(idev->dev->flags & IFF_LOOPBACK) &&
1096 !netif_is_l3_master(idev->dev) &&
1097 addr_type & IPV6_ADDR_LOOPBACK) {
1098 NL_SET_ERR_MSG_MOD(extack, "Cannot assign loopback address on this device");
1099 return ERR_PTR(-EADDRNOTAVAIL);
1100 }
1da177e4 1101
1da177e4 1102 if (idev->dead) {
7f6c4039
HL
1103 NL_SET_ERR_MSG_MOD(extack, "device is going away");
1104 err = -ENODEV;
f3d9832e 1105 goto out;
1da177e4
LT
1106 }
1107
56d417b1 1108 if (idev->cnf.disable_ipv6) {
7f6c4039 1109 NL_SET_ERR_MSG_MOD(extack, "IPv6 is disabled on this device");
9bdd8d40 1110 err = -EACCES;
f3d9832e 1111 goto out;
9bdd8d40
BH
1112 }
1113
ff7883ea
DA
1114 /* validator notifier needs to be blocking;
1115 * do not call in atomic context
1116 */
1117 if (can_block) {
1118 struct in6_validator_info i6vi = {
e6464b8c 1119 .i6vi_addr = *cfg->pfx,
ff7883ea 1120 .i6vi_dev = idev,
de95e047 1121 .extack = extack,
ff7883ea
DA
1122 };
1123
1124 err = inet6addr_validator_notifier_call_chain(NETDEV_UP, &i6vi);
1125 err = notifier_to_errno(err);
1126 if (err < 0)
1127 goto out;
1128 }
1da177e4 1129
6126891c 1130 ifa = kzalloc(sizeof(*ifa), gfp_flags | __GFP_ACCOUNT);
63159f29 1131 if (!ifa) {
1da177e4
LT
1132 err = -ENOBUFS;
1133 goto out;
1134 }
1135
7f6c4039 1136 f6i = addrconf_f6i_alloc(net, idev, cfg->pfx, false, gfp_flags, extack);
360a9887
DA
1137 if (IS_ERR(f6i)) {
1138 err = PTR_ERR(f6i);
1139 f6i = NULL;
1da177e4
LT
1140 goto out;
1141 }
1142
bba24896
JP
1143 neigh_parms_data_state_setall(idev->nd_parms);
1144
e6464b8c
DA
1145 ifa->addr = *cfg->pfx;
1146 if (cfg->peer_pfx)
1147 ifa->peer_addr = *cfg->peer_pfx;
1da177e4
LT
1148
1149 spin_lock_init(&ifa->lock);
c15b1cca 1150 INIT_DELAYED_WORK(&ifa->dad_work, addrconf_dad_work);
c2e21293 1151 INIT_HLIST_NODE(&ifa->addr_lst);
e6464b8c
DA
1152 ifa->scope = cfg->scope;
1153 ifa->prefix_len = cfg->plen;
8308f3ff 1154 ifa->rt_priority = cfg->rt_priority;
e6464b8c 1155 ifa->flags = cfg->ifa_flags;
47f0bd50 1156 ifa->ifa_proto = cfg->ifa_proto;
66eb9f86 1157 /* No need to add the TENTATIVE flag for addresses with NODAD */
e6464b8c 1158 if (!(cfg->ifa_flags & IFA_F_NODAD))
66eb9f86 1159 ifa->flags |= IFA_F_TENTATIVE;
e6464b8c
DA
1160 ifa->valid_lft = cfg->valid_lft;
1161 ifa->prefered_lft = cfg->preferred_lft;
1da177e4 1162 ifa->cstamp = ifa->tstamp = jiffies;
617fe29d 1163 ifa->tokenized = false;
1da177e4 1164
360a9887 1165 ifa->rt = f6i;
57f5f544 1166
1da177e4 1167 ifa->idev = idev;
f3d9832e
DA
1168 in6_dev_hold(idev);
1169
1da177e4 1170 /* For caller */
271201c0 1171 refcount_set(&ifa->refcnt, 1);
1da177e4 1172
09eed119 1173 rcu_read_lock();
1da177e4 1174
f3d9832e
DA
1175 err = ipv6_add_addr_hash(idev->dev, ifa);
1176 if (err < 0) {
09eed119 1177 rcu_read_unlock();
f3d9832e
DA
1178 goto out;
1179 }
1da177e4 1180
09eed119 1181 write_lock_bh(&idev->lock);
f3d9832e 1182
1da177e4 1183 /* Add to inet6_dev unicast addr list. */
e55ffac6 1184 ipv6_link_dev_addr(idev, ifa);
1da177e4 1185
1da177e4 1186 if (ifa->flags&IFA_F_TEMPORARY) {
372e6c8f 1187 list_add(&ifa->tmp_list, &idev->tempaddr_list);
1da177e4
LT
1188 in6_ifa_hold(ifa);
1189 }
1da177e4 1190
1da177e4 1191 in6_ifa_hold(ifa);
09eed119 1192 write_unlock_bh(&idev->lock);
f3d9832e 1193
09eed119 1194 rcu_read_unlock();
1da177e4 1195
f3d9832e
DA
1196 inet6addr_notifier_call_chain(NETDEV_UP, ifa);
1197out:
1198 if (unlikely(err < 0)) {
360a9887 1199 fib6_info_release(f6i);
93531c67 1200
f3d9832e
DA
1201 if (ifa) {
1202 if (ifa->idev)
1203 in6_dev_put(ifa->idev);
1204 kfree(ifa);
1205 }
1da177e4
LT
1206 ifa = ERR_PTR(err);
1207 }
1208
1209 return ifa;
1da177e4
LT
1210}
1211
5b84efec
TH
1212enum cleanup_prefix_rt_t {
1213 CLEANUP_PREFIX_RT_NOP, /* no cleanup action for prefix route */
1214 CLEANUP_PREFIX_RT_DEL, /* delete the prefix route */
1215 CLEANUP_PREFIX_RT_EXPIRE, /* update the lifetime of the prefix route */
1216};
1217
1218/*
1219 * Check, whether the prefix for ifp would still need a prefix route
1220 * after deleting ifp. The function returns one of the CLEANUP_PREFIX_RT_*
1221 * constants.
1222 *
1223 * 1) we don't purge prefix if address was not permanent.
1224 * prefix is managed by its own lifetime.
1225 * 2) we also don't purge, if the address was IFA_F_NOPREFIXROUTE.
1226 * 3) if there are no addresses, delete prefix.
1227 * 4) if there are still other permanent address(es),
1228 * corresponding prefix is still permanent.
1229 * 5) if there are still other addresses with IFA_F_NOPREFIXROUTE,
1230 * don't purge the prefix, assume user space is managing it.
1231 * 6) otherwise, update prefix lifetime to the
1232 * longest valid lifetime among the corresponding
1233 * addresses on the device.
1234 * Note: subsequent RA will update lifetime.
1235 **/
1236static enum cleanup_prefix_rt_t
1237check_cleanup_prefix_route(struct inet6_ifaddr *ifp, unsigned long *expires)
1238{
1239 struct inet6_ifaddr *ifa;
1240 struct inet6_dev *idev = ifp->idev;
1241 unsigned long lifetime;
1242 enum cleanup_prefix_rt_t action = CLEANUP_PREFIX_RT_DEL;
1243
1244 *expires = jiffies;
1245
1246 list_for_each_entry(ifa, &idev->addr_list, if_list) {
1247 if (ifa == ifp)
1248 continue;
e75913c9
ZL
1249 if (ifa->prefix_len != ifp->prefix_len ||
1250 !ipv6_prefix_equal(&ifa->addr, &ifp->addr,
5b84efec
TH
1251 ifp->prefix_len))
1252 continue;
1253 if (ifa->flags & (IFA_F_PERMANENT | IFA_F_NOPREFIXROUTE))
1254 return CLEANUP_PREFIX_RT_NOP;
1255
1256 action = CLEANUP_PREFIX_RT_EXPIRE;
1257
1258 spin_lock(&ifa->lock);
1259
1260 lifetime = addrconf_timeout_fixup(ifa->valid_lft, HZ);
1261 /*
1262 * Note: Because this address is
1263 * not permanent, lifetime <
1264 * LONG_MAX / HZ here.
1265 */
1266 if (time_before(*expires, ifa->tstamp + lifetime * HZ))
1267 *expires = ifa->tstamp + lifetime * HZ;
1268 spin_unlock(&ifa->lock);
1269 }
1270
1271 return action;
1272}
1273
1274static void
d0098e4c
HL
1275cleanup_prefix_route(struct inet6_ifaddr *ifp, unsigned long expires,
1276 bool del_rt, bool del_peer)
5b84efec 1277{
5eb902b8 1278 struct fib6_table *table;
93c2fb25 1279 struct fib6_info *f6i;
5b84efec 1280
d0098e4c
HL
1281 f6i = addrconf_get_prefix_route(del_peer ? &ifp->peer_addr : &ifp->addr,
1282 ifp->prefix_len,
2b2450ca 1283 ifp->idev->dev, 0, RTF_DEFAULT, true);
93c2fb25 1284 if (f6i) {
5b84efec 1285 if (del_rt)
11dd74b3 1286 ip6_del_rt(dev_net(ifp->idev->dev), f6i, false);
5b84efec 1287 else {
5eb902b8
KFL
1288 if (!(f6i->fib6_flags & RTF_EXPIRES)) {
1289 table = f6i->fib6_table;
1290 spin_lock_bh(&table->tb6_lock);
1291
93c2fb25 1292 fib6_set_expires(f6i, expires);
5eb902b8
KFL
1293 fib6_add_gc_list(f6i);
1294
1295 spin_unlock_bh(&table->tb6_lock);
1296 }
93c2fb25 1297 fib6_info_release(f6i);
5b84efec
TH
1298 }
1299 }
1300}
1301
1302
1da177e4
LT
1303/* This function wants to get referenced ifp and releases it before return */
1304
1305static void ipv6_del_addr(struct inet6_ifaddr *ifp)
1306{
5b84efec 1307 enum cleanup_prefix_rt_t action = CLEANUP_PREFIX_RT_NOP;
e66d1172 1308 struct net *net = dev_net(ifp->idev->dev);
5b84efec 1309 unsigned long expires;
e66d1172 1310 int state;
1da177e4 1311
c15b1cca
HFS
1312 ASSERT_RTNL();
1313
8e8e676d 1314 spin_lock_bh(&ifp->lock);
4c5ff6a6 1315 state = ifp->state;
e9d3e084 1316 ifp->state = INET6_IFADDR_STATE_DEAD;
8e8e676d 1317 spin_unlock_bh(&ifp->lock);
4c5ff6a6
HX
1318
1319 if (state == INET6_IFADDR_STATE_DEAD)
1320 goto out;
1da177e4 1321
e66d1172 1322 spin_lock_bh(&net->ipv6.addrconf_hash_lock);
5c578aed 1323 hlist_del_init_rcu(&ifp->addr_lst);
e66d1172 1324 spin_unlock_bh(&net->ipv6.addrconf_hash_lock);
1da177e4 1325
5b84efec 1326 write_lock_bh(&ifp->idev->lock);
5d9efa7e 1327
1da177e4 1328 if (ifp->flags&IFA_F_TEMPORARY) {
372e6c8f 1329 list_del(&ifp->tmp_list);
1330 if (ifp->ifpub) {
1331 in6_ifa_put(ifp->ifpub);
1332 ifp->ifpub = NULL;
1da177e4 1333 }
372e6c8f 1334 __in6_ifa_put(ifp);
1da177e4 1335 }
1da177e4 1336
5b84efec
TH
1337 if (ifp->flags & IFA_F_PERMANENT && !(ifp->flags & IFA_F_NOPREFIXROUTE))
1338 action = check_cleanup_prefix_route(ifp, &expires);
502a2ffd 1339
8ef802aa 1340 list_del_rcu(&ifp->if_list);
5b84efec
TH
1341 __in6_ifa_put(ifp);
1342
1343 write_unlock_bh(&ifp->idev->lock);
1da177e4 1344
c15b1cca 1345 addrconf_del_dad_work(ifp);
b2238566 1346
1da177e4
LT
1347 ipv6_ifa_notify(RTM_DELADDR, ifp);
1348
f88c91dd 1349 inet6addr_notifier_call_chain(NETDEV_DOWN, ifp);
1da177e4 1350
5b84efec
TH
1351 if (action != CLEANUP_PREFIX_RT_NOP) {
1352 cleanup_prefix_route(ifp, expires,
d0098e4c 1353 action == CLEANUP_PREFIX_RT_DEL, false);
1da177e4
LT
1354 }
1355
c3968a85
DW
1356 /* clean up prefsrc entries */
1357 rt6_remove_prefsrc(ifp);
4c5ff6a6 1358out:
1da177e4
LT
1359 in6_ifa_put(ifp);
1360}
1361
2aa8f155
AH
1362static unsigned long ipv6_get_regen_advance(struct inet6_dev *idev)
1363{
a5fcea2d 1364 return idev->cnf.regen_min_advance + idev->cnf.regen_max_retry *
2aa8f155
AH
1365 idev->cnf.dad_transmits *
1366 max(NEIGH_VAR(idev->nd_parms, RETRANS_TIME), HZ/100) / HZ;
1367}
1368
969c5464 1369static int ipv6_create_tempaddr(struct inet6_ifaddr *ifp, bool block)
1da177e4
LT
1370{
1371 struct inet6_dev *idev = ifp->idev;
e6464b8c 1372 unsigned long tmp_tstamp, age;
eac55bf9 1373 unsigned long regen_advance;
76f793e3 1374 unsigned long now = jiffies;
f4bcbf36 1375 u32 if_public_preferred_lft;
7aa8e63f 1376 s32 cnf_temp_preferred_lft;
969c5464
FG
1377 struct inet6_ifaddr *ift;
1378 struct ifa6_config cfg;
1379 long max_desync_factor;
1380 struct in6_addr addr;
1381 int ret = 0;
1da177e4 1382
53bd6749 1383 write_lock_bh(&idev->lock);
969c5464 1384
1da177e4
LT
1385retry:
1386 in6_dev_hold(idev);
1387 if (idev->cnf.use_tempaddr <= 0) {
53bd6749 1388 write_unlock_bh(&idev->lock);
f3213831 1389 pr_info("%s: use_tempaddr is disabled\n", __func__);
1da177e4
LT
1390 in6_dev_put(idev);
1391 ret = -1;
1392 goto out;
1393 }
1394 spin_lock_bh(&ifp->lock);
1395 if (ifp->regen_count++ >= idev->cnf.regen_max_retry) {
1396 idev->cnf.use_tempaddr = -1; /*XXX*/
1397 spin_unlock_bh(&ifp->lock);
53bd6749 1398 write_unlock_bh(&idev->lock);
f3213831
JP
1399 pr_warn("%s: regeneration time exceeded - disabled temporary address support\n",
1400 __func__);
1da177e4
LT
1401 in6_dev_put(idev);
1402 ret = -1;
1403 goto out;
1404 }
1405 in6_ifa_hold(ifp);
1406 memcpy(addr.s6_addr, ifp->addr.s6_addr, 8);
969c5464
FG
1407 ipv6_gen_rnd_iid(&addr);
1408
76f793e3 1409 age = (now - ifp->tstamp) / HZ;
76506a98 1410
2aa8f155 1411 regen_advance = ipv6_get_regen_advance(idev);
76506a98
JB
1412
1413 /* recalculate max_desync_factor each time and update
1414 * idev->desync_factor if it's larger
1415 */
7aa8e63f 1416 cnf_temp_preferred_lft = READ_ONCE(idev->cnf.temp_prefered_lft);
f31867d0 1417 max_desync_factor = min_t(long,
76506a98 1418 idev->cnf.max_desync_factor,
7aa8e63f 1419 cnf_temp_preferred_lft - regen_advance);
76506a98
JB
1420
1421 if (unlikely(idev->desync_factor > max_desync_factor)) {
1422 if (max_desync_factor > 0) {
1423 get_random_bytes(&idev->desync_factor,
1424 sizeof(idev->desync_factor));
1425 idev->desync_factor %= max_desync_factor;
1426 } else {
1427 idev->desync_factor = 0;
1428 }
1429 }
1430
f4bcbf36
AH
1431 if_public_preferred_lft = ifp->prefered_lft;
1432
3f2d67b6 1433 memset(&cfg, 0, sizeof(cfg));
e6464b8c 1434 cfg.valid_lft = min_t(__u32, ifp->valid_lft,
7a876b0e 1435 idev->cnf.temp_valid_lft + age);
e6464b8c 1436 cfg.preferred_lft = cnf_temp_preferred_lft + age - idev->desync_factor;
f4bcbf36 1437 cfg.preferred_lft = min_t(__u32, if_public_preferred_lft, cfg.preferred_lft);
bfbf81b3 1438 cfg.preferred_lft = min_t(__u32, cfg.valid_lft, cfg.preferred_lft);
e6464b8c
DA
1439
1440 cfg.plen = ifp->prefix_len;
1da177e4
LT
1441 tmp_tstamp = ifp->tstamp;
1442 spin_unlock_bh(&ifp->lock);
1443
53bd6749 1444 write_unlock_bh(&idev->lock);
95c385b4 1445
f4bcbf36
AH
1446 /* From RFC 4941:
1447 *
1448 * A temporary address is created only if this calculated Preferred
1449 * Lifetime is greater than REGEN_ADVANCE time units. In
1450 * particular, an implementation must not create a temporary address
1451 * with a zero Preferred Lifetime.
1452 *
1453 * ...
1454 *
1455 * When creating a temporary address, the lifetime values MUST be
1456 * derived from the corresponding prefix as follows:
1457 *
1458 * ...
1459 *
1460 * * Its Preferred Lifetime is the lower of the Preferred Lifetime
1461 * of the public address or TEMP_PREFERRED_LIFETIME -
1462 * DESYNC_FACTOR.
1463 *
1464 * To comply with the RFC's requirements, clamp the preferred lifetime
1465 * to a minimum of regen_advance, unless that would exceed valid_lft or
1466 * ifp->prefered_lft.
1467 *
ecab6701
HK
1468 * Use age calculation as in addrconf_verify to avoid unnecessary
1469 * temporary addresses being generated.
eac55bf9 1470 */
ecab6701 1471 age = (now - tmp_tstamp + ADDRCONF_TIMER_FUZZ_MINUS) / HZ;
8cdafdd9 1472 if (cfg.preferred_lft <= regen_advance + age) {
f4bcbf36
AH
1473 cfg.preferred_lft = regen_advance + age + 1;
1474 if (cfg.preferred_lft > cfg.valid_lft ||
1475 cfg.preferred_lft > if_public_preferred_lft) {
1476 in6_ifa_put(ifp);
1477 in6_dev_put(idev);
1478 ret = -1;
1479 goto out;
1480 }
eac55bf9
BB
1481 }
1482
e6464b8c 1483 cfg.ifa_flags = IFA_F_TEMPORARY;
95c385b4
NH
1484 /* set in addrconf_prefix_rcv() */
1485 if (ifp->flags & IFA_F_OPTIMISTIC)
e6464b8c 1486 cfg.ifa_flags |= IFA_F_OPTIMISTIC;
95c385b4 1487
e6464b8c
DA
1488 cfg.pfx = &addr;
1489 cfg.scope = ipv6_addr_scope(cfg.pfx);
95c385b4 1490
e6464b8c 1491 ift = ipv6_add_addr(idev, &cfg, block, NULL);
4b08a8f1 1492 if (IS_ERR(ift)) {
1da177e4
LT
1493 in6_ifa_put(ifp);
1494 in6_dev_put(idev);
f3213831 1495 pr_info("%s: retry temporary address regeneration\n", __func__);
53bd6749 1496 write_lock_bh(&idev->lock);
1da177e4
LT
1497 goto retry;
1498 }
1499
1500 spin_lock_bh(&ift->lock);
1501 ift->ifpub = ifp;
76f793e3 1502 ift->cstamp = now;
1da177e4
LT
1503 ift->tstamp = tmp_tstamp;
1504 spin_unlock_bh(&ift->lock);
1505
cf22f9a2 1506 addrconf_dad_start(ift);
1da177e4
LT
1507 in6_ifa_put(ift);
1508 in6_dev_put(idev);
1509out:
1510 return ret;
1511}
1da177e4
LT
1512
1513/*
072047e4 1514 * Choose an appropriate source address (RFC3484)
1da177e4 1515 */
a9b05723
YH
1516enum {
1517 IPV6_SADDR_RULE_INIT = 0,
1518 IPV6_SADDR_RULE_LOCAL,
1519 IPV6_SADDR_RULE_SCOPE,
1520 IPV6_SADDR_RULE_PREFERRED,
1521#ifdef CONFIG_IPV6_MIP6
1522 IPV6_SADDR_RULE_HOA,
1523#endif
1524 IPV6_SADDR_RULE_OIF,
1525 IPV6_SADDR_RULE_LABEL,
a9b05723 1526 IPV6_SADDR_RULE_PRIVACY,
a9b05723
YH
1527 IPV6_SADDR_RULE_ORCHID,
1528 IPV6_SADDR_RULE_PREFIX,
7fd2561e
EK
1529#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
1530 IPV6_SADDR_RULE_NOT_OPTIMISTIC,
1531#endif
a9b05723
YH
1532 IPV6_SADDR_RULE_MAX
1533};
1534
072047e4 1535struct ipv6_saddr_score {
a9b05723
YH
1536 int rule;
1537 int addr_type;
1538 struct inet6_ifaddr *ifa;
1539 DECLARE_BITMAP(scorebits, IPV6_SADDR_RULE_MAX);
1540 int scopedist;
1541 int matchlen;
072047e4
YH
1542};
1543
a9b05723 1544struct ipv6_saddr_dst {
9acd9f3a 1545 const struct in6_addr *addr;
a9b05723
YH
1546 int ifindex;
1547 int scope;
1548 int label;
7cbca67c 1549 unsigned int prefs;
a9b05723 1550};
072047e4 1551
b6f99a21 1552static inline int ipv6_saddr_preferred(int type)
1da177e4 1553{
45bb0060 1554 if (type & (IPV6_ADDR_MAPPED|IPV6_ADDR_COMPATv4|IPV6_ADDR_LOOPBACK))
072047e4
YH
1555 return 1;
1556 return 0;
1da177e4
LT
1557}
1558
35e015e1
MC
1559static bool ipv6_use_optimistic_addr(struct net *net,
1560 struct inet6_dev *idev)
7fd2561e
EK
1561{
1562#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
35e015e1
MC
1563 if (!idev)
1564 return false;
1565 if (!net->ipv6.devconf_all->optimistic_dad && !idev->cnf.optimistic_dad)
1566 return false;
1567 if (!net->ipv6.devconf_all->use_optimistic && !idev->cnf.use_optimistic)
1568 return false;
1569
1570 return true;
7fd2561e
EK
1571#else
1572 return false;
1573#endif
1574}
1575
f1c02cfb
SD
1576static bool ipv6_allow_optimistic_dad(struct net *net,
1577 struct inet6_dev *idev)
1578{
1579#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
1580 if (!idev)
1581 return false;
1582 if (!net->ipv6.devconf_all->optimistic_dad && !idev->cnf.optimistic_dad)
1583 return false;
1584
1585 return true;
1586#else
1587 return false;
1588#endif
1589}
1590
3de23255
BT
1591static int ipv6_get_saddr_eval(struct net *net,
1592 struct ipv6_saddr_score *score,
a9b05723
YH
1593 struct ipv6_saddr_dst *dst,
1594 int i)
1595{
1596 int ret;
1597
1598 if (i <= score->rule) {
1599 switch (i) {
1600 case IPV6_SADDR_RULE_SCOPE:
1601 ret = score->scopedist;
1602 break;
1603 case IPV6_SADDR_RULE_PREFIX:
1604 ret = score->matchlen;
1605 break;
1606 default:
1607 ret = !!test_bit(i, score->scorebits);
1608 }
1609 goto out;
1610 }
1611
1612 switch (i) {
1613 case IPV6_SADDR_RULE_INIT:
1614 /* Rule 0: remember if hiscore is not ready yet */
1615 ret = !!score->ifa;
1616 break;
1617 case IPV6_SADDR_RULE_LOCAL:
1618 /* Rule 1: Prefer same address */
1619 ret = ipv6_addr_equal(&score->ifa->addr, dst->addr);
1620 break;
1621 case IPV6_SADDR_RULE_SCOPE:
1622 /* Rule 2: Prefer appropriate scope
1623 *
1624 * ret
1625 * ^
1626 * -1 | d 15
1627 * ---+--+-+---> scope
1628 * |
1629 * | d is scope of the destination.
1630 * B-d | \
1631 * | \ <- smaller scope is better if
db9c7c39 1632 * B-15 | \ if scope is enough for destination.
a9b05723
YH
1633 * | ret = B - scope (-1 <= scope >= d <= 15).
1634 * d-C-1 | /
1635 * |/ <- greater is better
1636 * -C / if scope is not enough for destination.
1637 * /| ret = scope - C (-1 <= d < scope <= 15).
1638 *
1639 * d - C - 1 < B -15 (for all -1 <= d <= 15).
1640 * C > d + 14 - B >= 15 + 14 - B = 29 - B.
1641 * Assume B = 0 and we get C > 29.
1642 */
1643 ret = __ipv6_addr_src_scope(score->addr_type);
1644 if (ret >= dst->scope)
1645 ret = -ret;
1646 else
1647 ret -= 128; /* 30 is enough */
1648 score->scopedist = ret;
1649 break;
1650 case IPV6_SADDR_RULE_PREFERRED:
7fd2561e 1651 {
a9b05723 1652 /* Rule 3: Avoid deprecated and optimistic addresses */
7fd2561e
EK
1653 u8 avoid = IFA_F_DEPRECATED;
1654
35e015e1 1655 if (!ipv6_use_optimistic_addr(net, score->ifa->idev))
7fd2561e 1656 avoid |= IFA_F_OPTIMISTIC;
a9b05723 1657 ret = ipv6_saddr_preferred(score->addr_type) ||
7fd2561e 1658 !(score->ifa->flags & avoid);
a9b05723 1659 break;
7fd2561e 1660 }
a9b05723
YH
1661#ifdef CONFIG_IPV6_MIP6
1662 case IPV6_SADDR_RULE_HOA:
7cbca67c 1663 {
a9b05723 1664 /* Rule 4: Prefer home address */
7cbca67c
YH
1665 int prefhome = !(dst->prefs & IPV6_PREFER_SRC_COA);
1666 ret = !(score->ifa->flags & IFA_F_HOMEADDRESS) ^ prefhome;
a9b05723 1667 break;
7cbca67c 1668 }
a9b05723
YH
1669#endif
1670 case IPV6_SADDR_RULE_OIF:
1671 /* Rule 5: Prefer outgoing interface */
1672 ret = (!dst->ifindex ||
1673 dst->ifindex == score->ifa->idev->dev->ifindex);
1674 break;
1675 case IPV6_SADDR_RULE_LABEL:
1676 /* Rule 6: Prefer matching label */
3de23255
BT
1677 ret = ipv6_addr_label(net,
1678 &score->ifa->addr, score->addr_type,
a9b05723
YH
1679 score->ifa->idev->dev->ifindex) == dst->label;
1680 break;
a9b05723 1681 case IPV6_SADDR_RULE_PRIVACY:
7cbca67c 1682 {
a9b05723 1683 /* Rule 7: Prefer public address
25985edc 1684 * Note: prefer temporary address if use_tempaddr >= 2
a9b05723 1685 */
7cbca67c
YH
1686 int preftmp = dst->prefs & (IPV6_PREFER_SRC_PUBLIC|IPV6_PREFER_SRC_TMP) ?
1687 !!(dst->prefs & IPV6_PREFER_SRC_TMP) :
1688 score->ifa->idev->cnf.use_tempaddr >= 2;
1689 ret = (!(score->ifa->flags & IFA_F_TEMPORARY)) ^ preftmp;
a9b05723 1690 break;
7cbca67c 1691 }
a9b05723
YH
1692 case IPV6_SADDR_RULE_ORCHID:
1693 /* Rule 8-: Prefer ORCHID vs ORCHID or
1694 * non-ORCHID vs non-ORCHID
1695 */
1696 ret = !(ipv6_addr_orchid(&score->ifa->addr) ^
1697 ipv6_addr_orchid(dst->addr));
1698 break;
1699 case IPV6_SADDR_RULE_PREFIX:
1700 /* Rule 8: Use longest matching prefix */
91b4b04f
YH
1701 ret = ipv6_addr_diff(&score->ifa->addr, dst->addr);
1702 if (ret > score->ifa->prefix_len)
1703 ret = score->ifa->prefix_len;
1704 score->matchlen = ret;
a9b05723 1705 break;
7fd2561e
EK
1706#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
1707 case IPV6_SADDR_RULE_NOT_OPTIMISTIC:
1708 /* Optimistic addresses still have lower precedence than other
1709 * preferred addresses.
1710 */
1711 ret = !(score->ifa->flags & IFA_F_OPTIMISTIC);
1712 break;
1713#endif
a9b05723
YH
1714 default:
1715 ret = 0;
1716 }
1717
1718 if (ret)
1719 __set_bit(i, score->scorebits);
1720 score->rule = i;
1721out:
1722 return ret;
1723}
1724
c0b8da1e
YH
1725static int __ipv6_dev_get_saddr(struct net *net,
1726 struct ipv6_saddr_dst *dst,
c0b8da1e
YH
1727 struct inet6_dev *idev,
1728 struct ipv6_saddr_score *scores,
1729 int hiscore_idx)
9131f3de 1730{
c0b8da1e 1731 struct ipv6_saddr_score *score = &scores[1 - hiscore_idx], *hiscore = &scores[hiscore_idx];
9131f3de 1732
f59c031e 1733 list_for_each_entry_rcu(score->ifa, &idev->addr_list, if_list) {
9131f3de
YH
1734 int i;
1735
1736 /*
1737 * - Tentative Address (RFC2462 section 5.4)
1738 * - A tentative address is not considered
1739 * "assigned to an interface" in the traditional
1740 * sense, unless it is also flagged as optimistic.
1741 * - Candidate Source Address (section 4)
1742 * - In any case, anycast addresses, multicast
1743 * addresses, and the unspecified address MUST
1744 * NOT be included in a candidate set.
1745 */
1746 if ((score->ifa->flags & IFA_F_TENTATIVE) &&
1747 (!(score->ifa->flags & IFA_F_OPTIMISTIC)))
1748 continue;
1749
1750 score->addr_type = __ipv6_addr_type(&score->ifa->addr);
1751
1752 if (unlikely(score->addr_type == IPV6_ADDR_ANY ||
1753 score->addr_type & IPV6_ADDR_MULTICAST)) {
1754 net_dbg_ratelimited("ADDRCONF: unspecified / multicast address assigned as unicast address on %s",
1755 idev->dev->name);
1756 continue;
1757 }
1758
1759 score->rule = -1;
1760 bitmap_zero(score->scorebits, IPV6_SADDR_RULE_MAX);
1761
1762 for (i = 0; i < IPV6_SADDR_RULE_MAX; i++) {
1763 int minihiscore, miniscore;
1764
1765 minihiscore = ipv6_get_saddr_eval(net, hiscore, dst, i);
1766 miniscore = ipv6_get_saddr_eval(net, score, dst, i);
1767
1768 if (minihiscore > miniscore) {
1769 if (i == IPV6_SADDR_RULE_SCOPE &&
1770 score->scopedist > 0) {
1771 /*
1772 * special case:
1773 * each remaining entry
1774 * has too small (not enough)
1775 * scope, because ifa entries
1776 * are sorted by their scope
1777 * values.
1778 */
1779 goto out;
1780 }
1781 break;
1782 } else if (minihiscore < miniscore) {
9131f3de 1783 swap(hiscore, score);
c0b8da1e 1784 hiscore_idx = 1 - hiscore_idx;
9131f3de
YH
1785
1786 /* restore our iterator */
1787 score->ifa = hiscore->ifa;
1788
1789 break;
1790 }
1791 }
1792 }
1793out:
c0b8da1e 1794 return hiscore_idx;
9131f3de
YH
1795}
1796
afbac601
DA
1797static int ipv6_get_saddr_master(struct net *net,
1798 const struct net_device *dst_dev,
1799 const struct net_device *master,
1800 struct ipv6_saddr_dst *dst,
1801 struct ipv6_saddr_score *scores,
1802 int hiscore_idx)
1803{
1804 struct inet6_dev *idev;
1805
1806 idev = __in6_dev_get(dst_dev);
1807 if (idev)
1808 hiscore_idx = __ipv6_dev_get_saddr(net, dst, idev,
1809 scores, hiscore_idx);
1810
1811 idev = __in6_dev_get(master);
1812 if (idev)
1813 hiscore_idx = __ipv6_dev_get_saddr(net, dst, idev,
1814 scores, hiscore_idx);
1815
1816 return hiscore_idx;
1817}
1818
b3f644fc 1819int ipv6_dev_get_saddr(struct net *net, const struct net_device *dst_dev,
9acd9f3a 1820 const struct in6_addr *daddr, unsigned int prefs,
7cbca67c 1821 struct in6_addr *saddr)
1da177e4 1822{
c0b8da1e 1823 struct ipv6_saddr_score scores[2], *hiscore;
a9b05723 1824 struct ipv6_saddr_dst dst;
9131f3de 1825 struct inet6_dev *idev;
072047e4 1826 struct net_device *dev;
a9b05723 1827 int dst_type;
9131f3de 1828 bool use_oif_addr = false;
c0b8da1e 1829 int hiscore_idx = 0;
cc429c8f 1830 int ret = 0;
1da177e4 1831
a9b05723
YH
1832 dst_type = __ipv6_addr_type(daddr);
1833 dst.addr = daddr;
1834 dst.ifindex = dst_dev ? dst_dev->ifindex : 0;
1835 dst.scope = __ipv6_addr_src_scope(dst_type);
3de23255 1836 dst.label = ipv6_addr_label(net, daddr, dst_type, dst.ifindex);
7cbca67c 1837 dst.prefs = prefs;
a9b05723 1838
c0b8da1e
YH
1839 scores[hiscore_idx].rule = -1;
1840 scores[hiscore_idx].ifa = NULL;
1da177e4 1841
8814c4b5 1842 rcu_read_lock();
1da177e4 1843
9131f3de
YH
1844 /* Candidate Source Address (section 4)
1845 * - multicast and link-local destination address,
1846 * the set of candidate source address MUST only
1847 * include addresses assigned to interfaces
1848 * belonging to the same link as the outgoing
1849 * interface.
1850 * (- For site-local destination addresses, the
1851 * set of candidate source addresses MUST only
1852 * include addresses assigned to interfaces
1853 * belonging to the same site as the outgoing
1854 * interface.)
3985e8a3
EK
1855 * - "It is RECOMMENDED that the candidate source addresses
1856 * be the set of unicast addresses assigned to the
1857 * interface that will be used to send to the destination
1858 * (the 'outgoing' interface)." (RFC 6724)
9131f3de
YH
1859 */
1860 if (dst_dev) {
3985e8a3 1861 idev = __in6_dev_get(dst_dev);
9131f3de 1862 if ((dst_type & IPV6_ADDR_MULTICAST) ||
3985e8a3
EK
1863 dst.scope <= IPV6_ADDR_SCOPE_LINKLOCAL ||
1864 (idev && idev->cnf.use_oif_addrs_only)) {
9131f3de
YH
1865 use_oif_addr = true;
1866 }
1867 }
a9b05723 1868
9131f3de 1869 if (use_oif_addr) {
c0b8da1e 1870 if (idev)
c15df306 1871 hiscore_idx = __ipv6_dev_get_saddr(net, &dst, idev, scores, hiscore_idx);
9131f3de 1872 } else {
afbac601
DA
1873 const struct net_device *master;
1874 int master_idx = 0;
1875
1876 /* if dst_dev exists and is enslaved to an L3 device, then
1877 * prefer addresses from dst_dev and then the master over
1878 * any other enslaved devices in the L3 domain.
1879 */
1880 master = l3mdev_master_dev_rcu(dst_dev);
1881 if (master) {
1882 master_idx = master->ifindex;
1883
1884 hiscore_idx = ipv6_get_saddr_master(net, dst_dev,
1885 master, &dst,
1886 scores, hiscore_idx);
1887
1888 if (scores[hiscore_idx].ifa)
1889 goto out;
1890 }
1891
9131f3de 1892 for_each_netdev_rcu(net, dev) {
afbac601
DA
1893 /* only consider addresses on devices in the
1894 * same L3 domain
1895 */
1896 if (l3mdev_master_ifindex_rcu(dev) != master_idx)
1897 continue;
9131f3de
YH
1898 idev = __in6_dev_get(dev);
1899 if (!idev)
072047e4 1900 continue;
c15df306 1901 hiscore_idx = __ipv6_dev_get_saddr(net, &dst, idev, scores, hiscore_idx);
1da177e4
LT
1902 }
1903 }
afbac601
DA
1904
1905out:
c0b8da1e 1906 hiscore = &scores[hiscore_idx];
a9b05723 1907 if (!hiscore->ifa)
cc429c8f
ED
1908 ret = -EADDRNOTAVAIL;
1909 else
1910 *saddr = hiscore->ifa->addr;
1ab1457c 1911
cc429c8f
ED
1912 rcu_read_unlock();
1913 return ret;
1da177e4 1914}
5e5f3f0f 1915EXPORT_SYMBOL(ipv6_dev_get_saddr);
1da177e4 1916
26394fc1
IK
1917static int __ipv6_get_lladdr(struct inet6_dev *idev, struct in6_addr *addr,
1918 u32 banned_flags)
b7b1bfce
HFS
1919{
1920 struct inet6_ifaddr *ifp;
1921 int err = -EADDRNOTAVAIL;
1922
602582ca
HFS
1923 list_for_each_entry_reverse(ifp, &idev->addr_list, if_list) {
1924 if (ifp->scope > IFA_LINK)
1925 break;
b7b1bfce
HFS
1926 if (ifp->scope == IFA_LINK &&
1927 !(ifp->flags & banned_flags)) {
1928 *addr = ifp->addr;
1929 err = 0;
1930 break;
1931 }
1932 }
1933 return err;
1934}
1935
95c385b4 1936int ipv6_get_lladdr(struct net_device *dev, struct in6_addr *addr,
479840ff 1937 u32 banned_flags)
1da177e4
LT
1938{
1939 struct inet6_dev *idev;
1940 int err = -EADDRNOTAVAIL;
1941
8814c4b5 1942 rcu_read_lock();
e21e8467
SH
1943 idev = __in6_dev_get(dev);
1944 if (idev) {
1da177e4 1945 read_lock_bh(&idev->lock);
b7b1bfce 1946 err = __ipv6_get_lladdr(idev, addr, banned_flags);
1da177e4
LT
1947 read_unlock_bh(&idev->lock);
1948 }
8814c4b5 1949 rcu_read_unlock();
1da177e4
LT
1950 return err;
1951}
1952
d9bf82c2 1953static int ipv6_count_addresses(const struct inet6_dev *idev)
1da177e4 1954{
d9bf82c2 1955 const struct inet6_ifaddr *ifp;
1da177e4 1956 int cnt = 0;
1da177e4 1957
d9bf82c2
ED
1958 rcu_read_lock();
1959 list_for_each_entry_rcu(ifp, &idev->addr_list, if_list)
1da177e4 1960 cnt++;
d9bf82c2 1961 rcu_read_unlock();
1da177e4
LT
1962 return cnt;
1963}
1964
b71d1d42 1965int ipv6_chk_addr(struct net *net, const struct in6_addr *addr,
2a7851bf 1966 const struct net_device *dev, int strict)
c58da4c6 1967{
232378e8
DA
1968 return ipv6_chk_addr_and_flags(net, addr, dev, !dev,
1969 strict, IFA_F_TENTATIVE);
c58da4c6
EK
1970}
1971EXPORT_SYMBOL(ipv6_chk_addr);
1972
1893ff20
DA
1973/* device argument is used to find the L3 domain of interest. If
1974 * skip_dev_check is set, then the ifp device is not checked against
1975 * the passed in dev argument. So the 2 cases for addresses checks are:
1976 * 1. does the address exist in the L3 domain that dev is part of
1977 * (skip_dev_check = true), or
1978 *
1979 * 2. does the address exist on the specific device
1980 * (skip_dev_check = false)
1981 */
4ef1a7cb
XL
1982static struct net_device *
1983__ipv6_chk_addr_and_flags(struct net *net, const struct in6_addr *addr,
1984 const struct net_device *dev, bool skip_dev_check,
1985 int strict, u32 banned_flags)
1da177e4 1986{
3f27fb23 1987 unsigned int hash = inet6_addr_hash(net, addr);
4ef1a7cb 1988 struct net_device *l3mdev, *ndev;
eedf042a 1989 struct inet6_ifaddr *ifp;
c58da4c6 1990 u32 ifp_flags;
1da177e4 1991
480318a0 1992 rcu_read_lock();
232378e8 1993
1893ff20 1994 l3mdev = l3mdev_master_dev_rcu(dev);
232378e8
DA
1995 if (skip_dev_check)
1996 dev = NULL;
1997
e66d1172 1998 hlist_for_each_entry_rcu(ifp, &net->ipv6.inet6_addr_lst[hash], addr_lst) {
4ef1a7cb 1999 ndev = ifp->idev->dev;
1893ff20 2000
4ef1a7cb 2001 if (l3mdev_master_dev_rcu(ndev) != l3mdev)
1893ff20
DA
2002 continue;
2003
c58da4c6
EK
2004 /* Decouple optimistic from tentative for evaluation here.
2005 * Ban optimistic addresses explicitly, when required.
2006 */
2007 ifp_flags = (ifp->flags&IFA_F_OPTIMISTIC)
2008 ? (ifp->flags&~IFA_F_TENTATIVE)
2009 : ifp->flags;
1da177e4 2010 if (ipv6_addr_equal(&ifp->addr, addr) &&
c58da4c6 2011 !(ifp_flags&banned_flags) &&
4ef1a7cb 2012 (!dev || ndev == dev ||
eedf042a 2013 !(ifp->scope&(IFA_LINK|IFA_HOST) || strict))) {
480318a0 2014 rcu_read_unlock();
4ef1a7cb 2015 return ndev;
1da177e4
LT
2016 }
2017 }
5c578aed 2018
480318a0 2019 rcu_read_unlock();
4ef1a7cb
XL
2020 return NULL;
2021}
2022
2023int ipv6_chk_addr_and_flags(struct net *net, const struct in6_addr *addr,
2024 const struct net_device *dev, bool skip_dev_check,
2025 int strict, u32 banned_flags)
2026{
2027 return __ipv6_chk_addr_and_flags(net, addr, dev, skip_dev_check,
2028 strict, banned_flags) ? 1 : 0;
1da177e4 2029}
c58da4c6 2030EXPORT_SYMBOL(ipv6_chk_addr_and_flags);
7159039a 2031
1da177e4 2032
7df37ff3
CB
2033/* Compares an address/prefix_len with addresses on device @dev.
2034 * If one is found it returns true.
2035 */
2036bool ipv6_chk_custom_prefix(const struct in6_addr *addr,
2037 const unsigned int prefix_len, struct net_device *dev)
2038{
47e26941
ED
2039 const struct inet6_ifaddr *ifa;
2040 const struct inet6_dev *idev;
7df37ff3
CB
2041 bool ret = false;
2042
2043 rcu_read_lock();
2044 idev = __in6_dev_get(dev);
2045 if (idev) {
47e26941 2046 list_for_each_entry_rcu(ifa, &idev->addr_list, if_list) {
7df37ff3
CB
2047 ret = ipv6_prefix_equal(addr, &ifa->addr, prefix_len);
2048 if (ret)
2049 break;
2050 }
7df37ff3
CB
2051 }
2052 rcu_read_unlock();
2053
2054 return ret;
2055}
2056EXPORT_SYMBOL(ipv6_chk_custom_prefix);
2057
b71d1d42 2058int ipv6_chk_prefix(const struct in6_addr *addr, struct net_device *dev)
52eeeb84 2059{
24ba333b
ED
2060 const struct inet6_ifaddr *ifa;
2061 const struct inet6_dev *idev;
52eeeb84
YH
2062 int onlink;
2063
2064 onlink = 0;
2065 rcu_read_lock();
2066 idev = __in6_dev_get(dev);
2067 if (idev) {
24ba333b 2068 list_for_each_entry_rcu(ifa, &idev->addr_list, if_list) {
52eeeb84
YH
2069 onlink = ipv6_prefix_equal(addr, &ifa->addr,
2070 ifa->prefix_len);
2071 if (onlink)
2072 break;
2073 }
52eeeb84
YH
2074 }
2075 rcu_read_unlock();
2076 return onlink;
2077}
52eeeb84
YH
2078EXPORT_SYMBOL(ipv6_chk_prefix);
2079
81f6cb31
XL
2080/**
2081 * ipv6_dev_find - find the first device with a given source address.
2082 * @net: the net namespace
2083 * @addr: the source address
2c4de211 2084 * @dev: used to find the L3 domain of interest
81f6cb31
XL
2085 *
2086 * The caller should be protected by RCU, or RTNL.
2087 */
4ef1a7cb
XL
2088struct net_device *ipv6_dev_find(struct net *net, const struct in6_addr *addr,
2089 struct net_device *dev)
81f6cb31 2090{
4ef1a7cb
XL
2091 return __ipv6_chk_addr_and_flags(net, addr, dev, !dev, 1,
2092 IFA_F_TENTATIVE);
81f6cb31
XL
2093}
2094EXPORT_SYMBOL(ipv6_dev_find);
2095
9acd9f3a 2096struct inet6_ifaddr *ipv6_get_ifaddr(struct net *net, const struct in6_addr *addr,
1cab3da6 2097 struct net_device *dev, int strict)
1da177e4 2098{
3f27fb23 2099 unsigned int hash = inet6_addr_hash(net, addr);
b79d1d54 2100 struct inet6_ifaddr *ifp, *result = NULL;
1da177e4 2101
24f226da 2102 rcu_read_lock();
e66d1172 2103 hlist_for_each_entry_rcu(ifp, &net->ipv6.inet6_addr_lst[hash], addr_lst) {
1da177e4 2104 if (ipv6_addr_equal(&ifp->addr, addr)) {
63159f29 2105 if (!dev || ifp->idev->dev == dev ||
1da177e4 2106 !(ifp->scope&(IFA_LINK|IFA_HOST) || strict)) {
b79d1d54 2107 result = ifp;
1da177e4
LT
2108 in6_ifa_hold(ifp);
2109 break;
2110 }
2111 }
2112 }
24f226da 2113 rcu_read_unlock();
1da177e4 2114
b79d1d54 2115 return result;
1da177e4
LT
2116}
2117
1da177e4
LT
2118/* Gets referenced address, destroys ifaddr */
2119
cc411d0b 2120static void addrconf_dad_stop(struct inet6_ifaddr *ifp, int dad_failed)
1da177e4 2121{
3d171f39
LR
2122 if (dad_failed)
2123 ifp->flags |= IFA_F_DADFAILED;
2124
ec8add2a 2125 if (ifp->flags&IFA_F_TEMPORARY) {
1da177e4
LT
2126 struct inet6_ifaddr *ifpub;
2127 spin_lock_bh(&ifp->lock);
2128 ifpub = ifp->ifpub;
2129 if (ifpub) {
2130 in6_ifa_hold(ifpub);
2131 spin_unlock_bh(&ifp->lock);
969c5464 2132 ipv6_create_tempaddr(ifpub, true);
1da177e4
LT
2133 in6_ifa_put(ifpub);
2134 } else {
2135 spin_unlock_bh(&ifp->lock);
2136 }
2137 ipv6_del_addr(ifp);
ec8add2a
SD
2138 } else if (ifp->flags&IFA_F_PERMANENT || !dad_failed) {
2139 spin_lock_bh(&ifp->lock);
2140 addrconf_del_dad_work(ifp);
2141 ifp->flags |= IFA_F_TENTATIVE;
f1c02cfb
SD
2142 if (dad_failed)
2143 ifp->flags &= ~IFA_F_OPTIMISTIC;
ec8add2a
SD
2144 spin_unlock_bh(&ifp->lock);
2145 if (dad_failed)
2146 ipv6_ifa_notify(0, ifp);
2147 in6_ifa_put(ifp);
c15b1cca 2148 } else {
1da177e4 2149 ipv6_del_addr(ifp);
c15b1cca 2150 }
1da177e4
LT
2151}
2152
f2344a13
HX
2153static int addrconf_dad_end(struct inet6_ifaddr *ifp)
2154{
2155 int err = -ENOENT;
2156
8e8e676d 2157 spin_lock_bh(&ifp->lock);
f2344a13
HX
2158 if (ifp->state == INET6_IFADDR_STATE_DAD) {
2159 ifp->state = INET6_IFADDR_STATE_POSTDAD;
2160 err = 0;
2161 }
8e8e676d 2162 spin_unlock_bh(&ifp->lock);
f2344a13
HX
2163
2164 return err;
2165}
2166
da13c59b 2167void addrconf_dad_failure(struct sk_buff *skb, struct inet6_ifaddr *ifp)
3c21edbd 2168{
1b34be74 2169 struct inet6_dev *idev = ifp->idev;
e66d1172 2170 struct net *net = dev_net(idev->dev);
9bdd8d40 2171
853dc2e0
UB
2172 if (addrconf_dad_end(ifp)) {
2173 in6_ifa_put(ifp);
f2344a13 2174 return;
853dc2e0 2175 }
f2344a13 2176
da13c59b
VP
2177 net_info_ratelimited("%s: IPv6 duplicate address %pI6c used by %pM detected!\n",
2178 ifp->idev->dev->name, &ifp->addr, eth_hdr(skb)->h_source);
9bdd8d40 2179
5f40ef77
HFS
2180 spin_lock_bh(&ifp->lock);
2181
2182 if (ifp->flags & IFA_F_STABLE_PRIVACY) {
5f40ef77
HFS
2183 struct in6_addr new_addr;
2184 struct inet6_ifaddr *ifp2;
5f40ef77 2185 int retries = ifp->stable_privacy_retry + 1;
e6464b8c
DA
2186 struct ifa6_config cfg = {
2187 .pfx = &new_addr,
2188 .plen = ifp->prefix_len,
2189 .ifa_flags = ifp->flags,
2190 .valid_lft = ifp->valid_lft,
2191 .preferred_lft = ifp->prefered_lft,
2192 .scope = ifp->scope,
2193 };
5f40ef77 2194
1855b7c3 2195 if (retries > net->ipv6.sysctl.idgen_retries) {
5f40ef77
HFS
2196 net_info_ratelimited("%s: privacy stable address generation failed because of DAD conflicts!\n",
2197 ifp->idev->dev->name);
2198 goto errdad;
2199 }
2200
2201 new_addr = ifp->addr;
2202 if (ipv6_generate_stable_address(&new_addr, retries,
2203 idev))
2204 goto errdad;
2205
5f40ef77 2206 spin_unlock_bh(&ifp->lock);
1b34be74 2207
5f40ef77
HFS
2208 if (idev->cnf.max_addresses &&
2209 ipv6_count_addresses(idev) >=
2210 idev->cnf.max_addresses)
2211 goto lock_errdad;
2212
2213 net_info_ratelimited("%s: generating new stable privacy address because of DAD conflict\n",
2214 ifp->idev->dev->name);
2215
e6464b8c 2216 ifp2 = ipv6_add_addr(idev, &cfg, false, NULL);
5f40ef77
HFS
2217 if (IS_ERR(ifp2))
2218 goto lock_errdad;
2219
2220 spin_lock_bh(&ifp2->lock);
2221 ifp2->stable_privacy_retry = retries;
2222 ifp2->state = INET6_IFADDR_STATE_PREDAD;
2223 spin_unlock_bh(&ifp2->lock);
2224
1855b7c3 2225 addrconf_mod_dad_work(ifp2, net->ipv6.sysctl.idgen_delay);
5f40ef77
HFS
2226 in6_ifa_put(ifp2);
2227lock_errdad:
2228 spin_lock_bh(&ifp->lock);
1b34be74
YH
2229 }
2230
5f40ef77 2231errdad:
c15b1cca
HFS
2232 /* transition from _POSTDAD to _ERRDAD */
2233 ifp->state = INET6_IFADDR_STATE_ERRDAD;
8e8e676d 2234 spin_unlock_bh(&ifp->lock);
c15b1cca
HFS
2235
2236 addrconf_mod_dad_work(ifp, 0);
751eb6b6 2237 in6_ifa_put(ifp);
3c21edbd 2238}
1da177e4 2239
a9ed4a29
SD
2240/* Join to solicited addr multicast group.
2241 * caller must hold RTNL */
b71d1d42 2242void addrconf_join_solict(struct net_device *dev, const struct in6_addr *addr)
1da177e4
LT
2243{
2244 struct in6_addr maddr;
2245
2246 if (dev->flags&(IFF_LOOPBACK|IFF_NOARP))
2247 return;
2248
2249 addrconf_addr_solict_mult(addr, &maddr);
2250 ipv6_dev_mc_inc(dev, &maddr);
2251}
2252
a9ed4a29 2253/* caller must hold RTNL */
b71d1d42 2254void addrconf_leave_solict(struct inet6_dev *idev, const struct in6_addr *addr)
1da177e4
LT
2255{
2256 struct in6_addr maddr;
2257
2258 if (idev->dev->flags&(IFF_LOOPBACK|IFF_NOARP))
2259 return;
2260
2261 addrconf_addr_solict_mult(addr, &maddr);
2262 __ipv6_dev_mc_dec(idev, &maddr);
2263}
2264
a9ed4a29 2265/* caller must hold RTNL */
20380731 2266static void addrconf_join_anycast(struct inet6_ifaddr *ifp)
1da177e4
LT
2267{
2268 struct in6_addr addr;
c15b1cca 2269
88ad3149 2270 if (ifp->prefix_len >= 127) /* RFC 6164 */
2bda8a0c 2271 return;
1da177e4
LT
2272 ipv6_addr_prefix(&addr, &ifp->addr, ifp->prefix_len);
2273 if (ipv6_addr_any(&addr))
2274 return;
013b4d90 2275 __ipv6_dev_ac_inc(ifp->idev, &addr);
1da177e4
LT
2276}
2277
a9ed4a29 2278/* caller must hold RTNL */
20380731 2279static void addrconf_leave_anycast(struct inet6_ifaddr *ifp)
1da177e4
LT
2280{
2281 struct in6_addr addr;
c15b1cca 2282
88ad3149 2283 if (ifp->prefix_len >= 127) /* RFC 6164 */
32019e65 2284 return;
1da177e4
LT
2285 ipv6_addr_prefix(&addr, &ifp->addr, ifp->prefix_len);
2286 if (ipv6_addr_any(&addr))
2287 return;
2288 __ipv6_dev_ac_dec(ifp->idev, &addr);
2289}
2290
8a7a4b47 2291static int addrconf_ifid_6lowpan(u8 *eui, struct net_device *dev)
06a4c1c5 2292{
8a7a4b47
AA
2293 switch (dev->addr_len) {
2294 case ETH_ALEN:
9dae2e03
LAD
2295 memcpy(eui, dev->dev_addr, 3);
2296 eui[3] = 0xFF;
2297 eui[4] = 0xFE;
2298 memcpy(eui + 5, dev->dev_addr + 3, 3);
2299 break;
8a7a4b47
AA
2300 case EUI64_ADDR_LEN:
2301 memcpy(eui, dev->dev_addr, EUI64_ADDR_LEN);
2302 eui[0] ^= 2;
2303 break;
2304 default:
06a4c1c5 2305 return -1;
8a7a4b47
AA
2306 }
2307
06a4c1c5 2308 return 0;
2309}
2310
cb6bf355
YH
2311static int addrconf_ifid_ieee1394(u8 *eui, struct net_device *dev)
2312{
1a8a23d2 2313 const union fwnet_hwaddr *ha;
cb6bf355
YH
2314
2315 if (dev->addr_len != FWNET_ALEN)
2316 return -1;
2317
1a8a23d2 2318 ha = (const union fwnet_hwaddr *)dev->dev_addr;
cb6bf355
YH
2319
2320 memcpy(eui, &ha->uc.uniq_id, sizeof(ha->uc.uniq_id));
2321 eui[0] ^= 2;
2322 return 0;
2323}
2324
073a8e0e
YH
2325static int addrconf_ifid_arcnet(u8 *eui, struct net_device *dev)
2326{
2327 /* XXX: inherit EUI-64 from other interface -- yoshfuji */
2328 if (dev->addr_len != ARCNET_ALEN)
2329 return -1;
2330 memset(eui, 0, 7);
8e5e8f30 2331 eui[7] = *(u8 *)dev->dev_addr;
073a8e0e
YH
2332 return 0;
2333}
2334
2335static int addrconf_ifid_infiniband(u8 *eui, struct net_device *dev)
2336{
2337 if (dev->addr_len != INFINIBAND_ALEN)
2338 return -1;
2339 memcpy(eui, dev->dev_addr + 12, 8);
2340 eui[0] |= 2;
2341 return 0;
2342}
2343
c61393ea 2344static int __ipv6_isatap_ifid(u8 *eui, __be32 addr)
dfd982ba 2345{
9af28511
SH
2346 if (addr == 0)
2347 return -1;
dfd982ba
YH
2348 eui[0] = (ipv4_is_zeronet(addr) || ipv4_is_private_10(addr) ||
2349 ipv4_is_loopback(addr) || ipv4_is_linklocal_169(addr) ||
2350 ipv4_is_private_172(addr) || ipv4_is_test_192(addr) ||
2351 ipv4_is_anycast_6to4(addr) || ipv4_is_private_192(addr) ||
2352 ipv4_is_test_198(addr) || ipv4_is_multicast(addr) ||
2353 ipv4_is_lbcast(addr)) ? 0x00 : 0x02;
2354 eui[1] = 0;
2355 eui[2] = 0x5E;
2356 eui[3] = 0xFE;
2357 memcpy(eui + 4, &addr, 4);
2358 return 0;
2359}
dfd982ba
YH
2360
2361static int addrconf_ifid_sit(u8 *eui, struct net_device *dev)
2362{
2363 if (dev->priv_flags & IFF_ISATAP)
2364 return __ipv6_isatap_ifid(eui, *(__be32 *)dev->dev_addr);
2365 return -1;
2366}
2367
aee80b54 2368static int addrconf_ifid_gre(u8 *eui, struct net_device *dev)
2369{
2370 return __ipv6_isatap_ifid(eui, *(__be32 *)dev->dev_addr);
2371}
2372
e837735e
ND
2373static int addrconf_ifid_ip6tnl(u8 *eui, struct net_device *dev)
2374{
2375 memcpy(eui, dev->perm_addr, 3);
2376 memcpy(eui + 5, dev->perm_addr + 3, 3);
2377 eui[3] = 0xFF;
2378 eui[4] = 0xFE;
2379 eui[0] ^= 2;
2380 return 0;
2381}
2382
1da177e4
LT
2383static int ipv6_generate_eui64(u8 *eui, struct net_device *dev)
2384{
2385 switch (dev->type) {
2386 case ARPHRD_ETHER:
2387 case ARPHRD_FDDI:
073a8e0e 2388 return addrconf_ifid_eui48(eui, dev);
1da177e4 2389 case ARPHRD_ARCNET:
073a8e0e 2390 return addrconf_ifid_arcnet(eui, dev);
1da177e4 2391 case ARPHRD_INFINIBAND:
073a8e0e 2392 return addrconf_ifid_infiniband(eui, dev);
c7dc89c0 2393 case ARPHRD_SIT:
dfd982ba 2394 return addrconf_ifid_sit(eui, dev);
aee80b54 2395 case ARPHRD_IPGRE:
45ce0fd1 2396 case ARPHRD_TUNNEL:
aee80b54 2397 return addrconf_ifid_gre(eui, dev);
e74bccb8 2398 case ARPHRD_6LOWPAN:
8a7a4b47 2399 return addrconf_ifid_6lowpan(eui, dev);
cb6bf355
YH
2400 case ARPHRD_IEEE1394:
2401 return addrconf_ifid_ieee1394(eui, dev);
e837735e 2402 case ARPHRD_TUNNEL6:
45ce0fd1 2403 case ARPHRD_IP6GRE:
9deb441c 2404 case ARPHRD_RAWIP:
e837735e 2405 return addrconf_ifid_ip6tnl(eui, dev);
1da177e4
LT
2406 }
2407 return -1;
2408}
2409
2410static int ipv6_inherit_eui64(u8 *eui, struct inet6_dev *idev)
2411{
2412 int err = -1;
2413 struct inet6_ifaddr *ifp;
2414
2415 read_lock_bh(&idev->lock);
602582ca
HFS
2416 list_for_each_entry_reverse(ifp, &idev->addr_list, if_list) {
2417 if (ifp->scope > IFA_LINK)
2418 break;
1da177e4
LT
2419 if (ifp->scope == IFA_LINK && !(ifp->flags&IFA_F_TENTATIVE)) {
2420 memcpy(eui, ifp->addr.s6_addr+8, 8);
2421 err = 0;
2422 break;
2423 }
2424 }
2425 read_unlock_bh(&idev->lock);
2426 return err;
2427}
2428
969c5464
FG
2429/* Generation of a randomized Interface Identifier
2430 * draft-ietf-6man-rfc4941bis, Section 3.3.1
2431 */
2432
2433static void ipv6_gen_rnd_iid(struct in6_addr *addr)
1da177e4 2434{
1da177e4 2435regen:
969c5464 2436 get_random_bytes(&addr->s6_addr[8], 8);
1da177e4 2437
969c5464
FG
2438 /* <draft-ietf-6man-rfc4941bis-08.txt>, Section 3.3.1:
2439 * check if generated address is not inappropriate:
1da177e4 2440 *
912b519a 2441 * - Reserved IPv6 Interface Identifiers
969c5464 2442 * - XXX: already assigned to an address on the device
1da177e4 2443 */
969c5464
FG
2444
2445 /* Subnet-router anycast: 0000:0000:0000:0000 */
2446 if (!(addr->s6_addr32[2] | addr->s6_addr32[3]))
1da177e4 2447 goto regen;
1da177e4 2448
969c5464
FG
2449 /* IANA Ethernet block: 0200:5EFF:FE00:0000-0200:5EFF:FE00:5212
2450 * Proxy Mobile IPv6: 0200:5EFF:FE00:5213
2451 * IANA Ethernet block: 0200:5EFF:FE00:5214-0200:5EFF:FEFF:FFFF
2452 */
2453 if (ntohl(addr->s6_addr32[2]) == 0x02005eff &&
2454 (ntohl(addr->s6_addr32[3]) & 0Xff000000) == 0xfe000000)
2455 goto regen;
2456
2457 /* Reserved subnet anycast addresses */
2458 if (ntohl(addr->s6_addr32[2]) == 0xfdffffff &&
2459 ntohl(addr->s6_addr32[3]) >= 0Xffffff80)
2460 goto regen;
1da177e4 2461}
1da177e4
LT
2462
2463/*
2464 * Add prefix route.
2465 */
2466
2467static void
8308f3ff
DA
2468addrconf_prefix_route(struct in6_addr *pfx, int plen, u32 metric,
2469 struct net_device *dev, unsigned long expires,
2470 u32 flags, gfp_t gfp_flags)
1da177e4 2471{
86872cb5 2472 struct fib6_config cfg = {
ca254490 2473 .fc_table = l3mdev_fib_table(dev) ? : RT6_TABLE_PREFIX,
8308f3ff 2474 .fc_metric = metric ? : IP6_RT_PRIO_ADDRCONF,
86872cb5
TG
2475 .fc_ifindex = dev->ifindex,
2476 .fc_expires = expires,
2477 .fc_dst_len = plen,
2478 .fc_flags = RTF_UP | flags,
c346dca1 2479 .fc_nlinfo.nl_net = dev_net(dev),
f410a1fb 2480 .fc_protocol = RTPROT_KERNEL,
e8478e80 2481 .fc_type = RTN_UNICAST,
86872cb5 2482 };
1da177e4 2483
4e3fd7a0 2484 cfg.fc_dst = *pfx;
1da177e4
LT
2485
2486 /* Prevent useless cloning on PtP SIT.
2487 This thing is done here expecting that the whole
2488 class of non-broadcast devices need not cloning.
2489 */
07a93626 2490#if IS_ENABLED(CONFIG_IPV6_SIT)
86872cb5
TG
2491 if (dev->type == ARPHRD_SIT && (dev->flags & IFF_POINTOPOINT))
2492 cfg.fc_flags |= RTF_NONEXTHOP;
0be669bb 2493#endif
1da177e4 2494
acb54e3c 2495 ip6_route_add(&cfg, gfp_flags, NULL);
1da177e4
LT
2496}
2497
14ef37b6 2498
8d1c802b 2499static struct fib6_info *addrconf_get_prefix_route(const struct in6_addr *pfx,
14ef37b6
AH
2500 int plen,
2501 const struct net_device *dev,
2b2450ca
DA
2502 u32 flags, u32 noflags,
2503 bool no_gw)
14ef37b6
AH
2504{
2505 struct fib6_node *fn;
8d1c802b 2506 struct fib6_info *rt = NULL;
14ef37b6 2507 struct fib6_table *table;
ca254490 2508 u32 tb_id = l3mdev_fib_table(dev) ? : RT6_TABLE_PREFIX;
14ef37b6 2509
ca254490 2510 table = fib6_get_table(dev_net(dev), tb_id);
63159f29 2511 if (!table)
14ef37b6
AH
2512 return NULL;
2513
66f5d6ce 2514 rcu_read_lock();
38fbeeee 2515 fn = fib6_locate(&table->tb6_root, pfx, plen, NULL, 0, true);
14ef37b6
AH
2516 if (!fn)
2517 goto out;
1f56a01f 2518
66f5d6ce 2519 for_each_fib6_node_rt_rcu(fn) {
f88d8ea6
DA
2520 /* prefix routes only use builtin fib6_nh */
2521 if (rt->nh)
2522 continue;
2523
1cf844c7 2524 if (rt->fib6_nh->fib_nh_dev->ifindex != dev->ifindex)
14ef37b6 2525 continue;
1cf844c7 2526 if (no_gw && rt->fib6_nh->fib_nh_gw_family)
2b2450ca 2527 continue;
93c2fb25 2528 if ((rt->fib6_flags & flags) != flags)
14ef37b6 2529 continue;
93c2fb25 2530 if ((rt->fib6_flags & noflags) != 0)
14ef37b6 2531 continue;
e873e4b9
WW
2532 if (!fib6_info_hold_safe(rt))
2533 continue;
14ef37b6
AH
2534 break;
2535 }
2536out:
66f5d6ce 2537 rcu_read_unlock();
14ef37b6
AH
2538 return rt;
2539}
2540
2541
1da177e4
LT
2542/* Create "default" multicast route to the interface */
2543
2544static void addrconf_add_mroute(struct net_device *dev)
2545{
86872cb5 2546 struct fib6_config cfg = {
ca254490 2547 .fc_table = l3mdev_fib_table(dev) ? : RT6_TABLE_LOCAL,
86872cb5
TG
2548 .fc_metric = IP6_RT_PRIO_ADDRCONF,
2549 .fc_ifindex = dev->ifindex,
2550 .fc_dst_len = 8,
2551 .fc_flags = RTF_UP,
ceed9038 2552 .fc_type = RTN_MULTICAST,
c346dca1 2553 .fc_nlinfo.nl_net = dev_net(dev),
a826b043 2554 .fc_protocol = RTPROT_KERNEL,
86872cb5
TG
2555 };
2556
2557 ipv6_addr_set(&cfg.fc_dst, htonl(0xFF000000), 0, 0, 0);
2558
e500c6d3 2559 ip6_route_add(&cfg, GFP_KERNEL, NULL);
1da177e4
LT
2560}
2561
1da177e4
LT
2562static struct inet6_dev *addrconf_add_dev(struct net_device *dev)
2563{
2564 struct inet6_dev *idev;
2565
2566 ASSERT_RTNL();
2567
e21e8467 2568 idev = ipv6_find_idev(dev);
db0b99f5
SD
2569 if (IS_ERR(idev))
2570 return idev;
64e724f6
BH
2571
2572 if (idev->cnf.disable_ipv6)
2573 return ERR_PTR(-EACCES);
1da177e4
LT
2574
2575 /* Add default multicast route */
ba46ee4c 2576 if (!(dev->flags & IFF_LOOPBACK) && !netif_is_l3_master(dev))
4af04aba 2577 addrconf_add_mroute(dev);
1da177e4 2578
1da177e4
LT
2579 return idev;
2580}
2581
53bd6749
JP
2582static void manage_tempaddrs(struct inet6_dev *idev,
2583 struct inet6_ifaddr *ifp,
2584 __u32 valid_lft, __u32 prefered_lft,
2585 bool create, unsigned long now)
2586{
2587 u32 flags;
2588 struct inet6_ifaddr *ift;
2589
2590 read_lock_bh(&idev->lock);
2591 /* update all temporary addresses in the list */
2592 list_for_each_entry(ift, &idev->tempaddr_list, tmp_list) {
2593 int age, max_valid, max_prefered;
2594
2595 if (ifp != ift->ifpub)
2596 continue;
2597
2598 /* RFC 4941 section 3.3:
2599 * If a received option will extend the lifetime of a public
2600 * address, the lifetimes of temporary addresses should
2601 * be extended, subject to the overall constraint that no
2602 * temporary addresses should ever remain "valid" or "preferred"
2603 * for a time longer than (TEMP_VALID_LIFETIME) or
2604 * (TEMP_PREFERRED_LIFETIME - DESYNC_FACTOR), respectively.
2605 */
2606 age = (now - ift->cstamp) / HZ;
2607 max_valid = idev->cnf.temp_valid_lft - age;
2608 if (max_valid < 0)
2609 max_valid = 0;
2610
2611 max_prefered = idev->cnf.temp_prefered_lft -
76506a98 2612 idev->desync_factor - age;
53bd6749
JP
2613 if (max_prefered < 0)
2614 max_prefered = 0;
2615
2616 if (valid_lft > max_valid)
2617 valid_lft = max_valid;
2618
2619 if (prefered_lft > max_prefered)
2620 prefered_lft = max_prefered;
2621
2622 spin_lock(&ift->lock);
2623 flags = ift->flags;
2624 ift->valid_lft = valid_lft;
2625 ift->prefered_lft = prefered_lft;
2626 ift->tstamp = now;
2627 if (prefered_lft > 0)
2628 ift->flags &= ~IFA_F_DEPRECATED;
2629
2630 spin_unlock(&ift->lock);
2631 if (!(flags&IFA_F_TENTATIVE))
2632 ipv6_ifa_notify(0, ift);
2633 }
2634
69172f0b
2635 /* Also create a temporary address if it's enabled but no temporary
2636 * address currently exists.
2637 * However, we get called with valid_lft == 0, prefered_lft == 0, create == false
2638 * as part of cleanup (ie. deleting the mngtmpaddr).
2639 * We don't want that to result in creating a new temporary ip address.
2640 */
2641 if (list_empty(&idev->tempaddr_list) && (valid_lft || prefered_lft))
2642 create = true;
2643
2644 if (create && idev->cnf.use_tempaddr > 0) {
53bd6749
JP
2645 /* When a new public address is created as described
2646 * in [ADDRCONF], also create a new temporary address.
53bd6749
JP
2647 */
2648 read_unlock_bh(&idev->lock);
969c5464 2649 ipv6_create_tempaddr(ifp, false);
53bd6749
JP
2650 } else {
2651 read_unlock_bh(&idev->lock);
2652 }
2653}
2654
cc9da6cc
BM
2655static bool is_addr_mode_generate_stable(struct inet6_dev *idev)
2656{
d35a00b8
FJ
2657 return idev->cnf.addr_gen_mode == IN6_ADDR_GEN_MODE_STABLE_PRIVACY ||
2658 idev->cnf.addr_gen_mode == IN6_ADDR_GEN_MODE_RANDOM;
cc9da6cc
BM
2659}
2660
cc84b3c6
AA
2661int addrconf_prefix_rcv_add_addr(struct net *net, struct net_device *dev,
2662 const struct prefix_info *pinfo,
2663 struct inet6_dev *in6_dev,
2664 const struct in6_addr *addr, int addr_type,
2665 u32 addr_flags, bool sllao, bool tokenized,
2666 __u32 valid_lft, u32 prefered_lft)
4f672235
AA
2667{
2668 struct inet6_ifaddr *ifp = ipv6_get_ifaddr(net, addr, dev, 1);
36268983 2669 int create = 0, update_lft = 0;
4f672235
AA
2670
2671 if (!ifp && valid_lft) {
2672 int max_addresses = in6_dev->cnf.max_addresses;
e6464b8c
DA
2673 struct ifa6_config cfg = {
2674 .pfx = addr,
2675 .plen = pinfo->prefix_len,
2676 .ifa_flags = addr_flags,
2677 .valid_lft = valid_lft,
2678 .preferred_lft = prefered_lft,
2679 .scope = addr_type & IPV6_ADDR_SCOPE_MASK,
47f0bd50 2680 .ifa_proto = IFAPROT_KERNEL_RA
e6464b8c 2681 };
4f672235
AA
2682
2683#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
35e015e1
MC
2684 if ((net->ipv6.devconf_all->optimistic_dad ||
2685 in6_dev->cnf.optimistic_dad) &&
4f672235 2686 !net->ipv6.devconf_all->forwarding && sllao)
e6464b8c 2687 cfg.ifa_flags |= IFA_F_OPTIMISTIC;
4f672235
AA
2688#endif
2689
2690 /* Do not allow to create too much of autoconfigured
2691 * addresses; this would be too easy way to crash kernel.
2692 */
2693 if (!max_addresses ||
2694 ipv6_count_addresses(in6_dev) < max_addresses)
e6464b8c 2695 ifp = ipv6_add_addr(in6_dev, &cfg, false, NULL);
4f672235
AA
2696
2697 if (IS_ERR_OR_NULL(ifp))
2698 return -1;
2699
4f672235
AA
2700 create = 1;
2701 spin_lock_bh(&ifp->lock);
2702 ifp->flags |= IFA_F_MANAGETEMPADDR;
2703 ifp->cstamp = jiffies;
2704 ifp->tokenized = tokenized;
2705 spin_unlock_bh(&ifp->lock);
2706 addrconf_dad_start(ifp);
2707 }
2708
2709 if (ifp) {
2710 u32 flags;
2711 unsigned long now;
2712 u32 stored_lft;
2713
36268983 2714 /* update lifetime (RFC2462 5.5.3 e) */
4f672235
AA
2715 spin_lock_bh(&ifp->lock);
2716 now = jiffies;
2717 if (ifp->valid_lft > (now - ifp->tstamp) / HZ)
2718 stored_lft = ifp->valid_lft - (now - ifp->tstamp) / HZ;
2719 else
2720 stored_lft = 0;
473267a4
PR
2721
2722 /* RFC4862 Section 5.5.3e:
2723 * "Note that the preferred lifetime of the
2724 * corresponding address is always reset to
2725 * the Preferred Lifetime in the received
2726 * Prefix Information option, regardless of
2727 * whether the valid lifetime is also reset or
2728 * ignored."
2729 *
2730 * So we should always update prefered_lft here.
2731 */
2732 update_lft = !create && stored_lft;
2733
2734 if (update_lft && !in6_dev->cnf.ra_honor_pio_life) {
36268983
GN
2735 const u32 minimum_lft = min_t(u32,
2736 stored_lft, MIN_VALID_LIFETIME);
2737 valid_lft = max(valid_lft, minimum_lft);
36268983
GN
2738 }
2739
2740 if (update_lft) {
4f672235
AA
2741 ifp->valid_lft = valid_lft;
2742 ifp->prefered_lft = prefered_lft;
2743 ifp->tstamp = now;
2744 flags = ifp->flags;
2745 ifp->flags &= ~IFA_F_DEPRECATED;
2746 spin_unlock_bh(&ifp->lock);
2747
2748 if (!(flags&IFA_F_TENTATIVE))
2749 ipv6_ifa_notify(0, ifp);
2750 } else
2751 spin_unlock_bh(&ifp->lock);
2752
2753 manage_tempaddrs(in6_dev, ifp, valid_lft, prefered_lft,
2754 create, now);
2755
2756 in6_ifa_put(ifp);
8805d13f 2757 addrconf_verify(net);
4f672235
AA
2758 }
2759
2760 return 0;
2761}
cc84b3c6 2762EXPORT_SYMBOL_GPL(addrconf_prefix_rcv_add_addr);
4f672235 2763
e6bff995 2764void addrconf_prefix_rcv(struct net_device *dev, u8 *opt, int len, bool sllao)
1da177e4
LT
2765{
2766 struct prefix_info *pinfo;
5eb902b8 2767 struct fib6_table *table;
1da177e4
LT
2768 __u32 valid_lft;
2769 __u32 prefered_lft;
4f672235 2770 int addr_type, err;
64236f3f 2771 u32 addr_flags = 0;
1da177e4 2772 struct inet6_dev *in6_dev;
56d417b1 2773 struct net *net = dev_net(dev);
1da177e4
LT
2774
2775 pinfo = (struct prefix_info *) opt;
1ab1457c 2776
1da177e4 2777 if (len < sizeof(struct prefix_info)) {
e32ac250 2778 netdev_dbg(dev, "addrconf: prefix option too short\n");
1da177e4
LT
2779 return;
2780 }
1ab1457c 2781
1da177e4
LT
2782 /*
2783 * Validation checks ([ADDRCONF], page 19)
2784 */
2785
2786 addr_type = ipv6_addr_type(&pinfo->prefix);
2787
2788 if (addr_type & (IPV6_ADDR_MULTICAST|IPV6_ADDR_LINKLOCAL))
2789 return;
2790
2791 valid_lft = ntohl(pinfo->valid);
2792 prefered_lft = ntohl(pinfo->prefered);
2793
2794 if (prefered_lft > valid_lft) {
e87cc472 2795 net_warn_ratelimited("addrconf: prefix option has invalid lifetime\n");
1da177e4
LT
2796 return;
2797 }
2798
2799 in6_dev = in6_dev_get(dev);
2800
63159f29 2801 if (!in6_dev) {
e87cc472
JP
2802 net_dbg_ratelimited("addrconf: device %s not configured\n",
2803 dev->name);
1da177e4
LT
2804 return;
2805 }
2806
5027d54a 2807 if (valid_lft != 0 && valid_lft < in6_dev->cnf.accept_ra_min_lft)
5cb24968 2808 goto put;
5027d54a 2809
1da177e4
LT
2810 /*
2811 * Two things going on here:
2812 * 1) Add routes for on-link prefixes
2813 * 2) Configure prefixes with the auto flag set
2814 */
2815
4bed72e4 2816 if (pinfo->onlink) {
8d1c802b 2817 struct fib6_info *rt;
4bed72e4
YH
2818 unsigned long rt_expires;
2819
6f704992
YH
2820 /* Avoid arithmetic overflow. Really, we could
2821 * save rt_expires in seconds, likely valid_lft,
2822 * but it would require division in fib gc, that it
2823 * not good.
2824 */
4bed72e4
YH
2825 if (HZ > USER_HZ)
2826 rt_expires = addrconf_timeout_fixup(valid_lft, HZ);
2827 else
2828 rt_expires = addrconf_timeout_fixup(valid_lft, USER_HZ);
3dd4bc68 2829
4bed72e4
YH
2830 if (addrconf_finite_timeout(rt_expires))
2831 rt_expires *= HZ;
1da177e4 2832
14ef37b6
AH
2833 rt = addrconf_get_prefix_route(&pinfo->prefix,
2834 pinfo->prefix_len,
2835 dev,
2836 RTF_ADDRCONF | RTF_PREFIX_RT,
2b2450ca 2837 RTF_DEFAULT, true);
1da177e4 2838
14ef37b6 2839 if (rt) {
6f704992
YH
2840 /* Autoconf prefix route */
2841 if (valid_lft == 0) {
11dd74b3 2842 ip6_del_rt(net, rt, false);
6f704992 2843 rt = NULL;
6f704992 2844 } else {
5eb902b8
KFL
2845 table = rt->fib6_table;
2846 spin_lock_bh(&table->tb6_lock);
2847
2848 if (addrconf_finite_timeout(rt_expires)) {
2849 /* not infinity */
2850 fib6_set_expires(rt, jiffies + rt_expires);
2851 fib6_add_gc_list(rt);
2852 } else {
2853 fib6_clean_expires(rt);
2854 fib6_remove_gc_list(rt);
2855 }
2856
2857 spin_unlock_bh(&table->tb6_lock);
1da177e4
LT
2858 }
2859 } else if (valid_lft) {
6f704992 2860 clock_t expires = 0;
4bed72e4
YH
2861 int flags = RTF_ADDRCONF | RTF_PREFIX_RT;
2862 if (addrconf_finite_timeout(rt_expires)) {
6f704992
YH
2863 /* not infinity */
2864 flags |= RTF_EXPIRES;
2865 expires = jiffies_to_clock_t(rt_expires);
2866 }
1da177e4 2867 addrconf_prefix_route(&pinfo->prefix, pinfo->prefix_len,
8308f3ff
DA
2868 0, dev, expires, flags,
2869 GFP_ATOMIC);
1da177e4 2870 }
93531c67 2871 fib6_info_release(rt);
1da177e4
LT
2872 }
2873
2874 /* Try to figure out our local address for this prefix */
2875
2876 if (pinfo->autoconf && in6_dev->cnf.autoconf) {
1da177e4 2877 struct in6_addr addr;
f997c55c 2878 bool tokenized = false, dev_addr_generated = false;
1da177e4
LT
2879
2880 if (pinfo->prefix_len == 64) {
2881 memcpy(&addr, &pinfo->prefix, 8);
f53adae4
DB
2882
2883 if (!ipv6_addr_any(&in6_dev->token)) {
2884 read_lock_bh(&in6_dev->lock);
2885 memcpy(addr.s6_addr + 8,
2886 in6_dev->token.s6_addr + 8, 8);
2887 read_unlock_bh(&in6_dev->lock);
617fe29d 2888 tokenized = true;
cc9da6cc 2889 } else if (is_addr_mode_generate_stable(in6_dev) &&
622c81d5
HFS
2890 !ipv6_generate_stable_address(&addr, 0,
2891 in6_dev)) {
64236f3f 2892 addr_flags |= IFA_F_STABLE_PRIVACY;
622c81d5 2893 goto ok;
f53adae4
DB
2894 } else if (ipv6_generate_eui64(addr.s6_addr + 8, dev) &&
2895 ipv6_inherit_eui64(addr.s6_addr + 8, in6_dev)) {
4f672235 2896 goto put;
f997c55c
AA
2897 } else {
2898 dev_addr_generated = true;
1da177e4
LT
2899 }
2900 goto ok;
2901 }
e87cc472
JP
2902 net_dbg_ratelimited("IPv6 addrconf: prefix with wrong length %d\n",
2903 pinfo->prefix_len);
4f672235 2904 goto put;
1da177e4
LT
2905
2906ok:
4f672235
AA
2907 err = addrconf_prefix_rcv_add_addr(net, dev, pinfo, in6_dev,
2908 &addr, addr_type,
2909 addr_flags, sllao,
2910 tokenized, valid_lft,
2911 prefered_lft);
2912 if (err)
2913 goto put;
f997c55c
AA
2914
2915 /* Ignore error case here because previous prefix add addr was
2916 * successful which will be notified.
2917 */
2918 ndisc_ops_prefix_rcv_add_addr(net, dev, pinfo, in6_dev, &addr,
2919 addr_type, addr_flags, sllao,
2920 tokenized, valid_lft,
2921 prefered_lft,
2922 dev_addr_generated);
1da177e4
LT
2923 }
2924 inet6_prefix_notify(RTM_NEWPREFIX, in6_dev, pinfo);
4f672235 2925put:
1da177e4
LT
2926 in6_dev_put(in6_dev);
2927}
2928
68ad6886
CH
2929static int addrconf_set_sit_dstaddr(struct net *net, struct net_device *dev,
2930 struct in6_ifreq *ireq)
2931{
2932 struct ip_tunnel_parm p = { };
68ad6886
CH
2933 int err;
2934
2935 if (!(ipv6_addr_type(&ireq->ifr6_addr) & IPV6_ADDR_COMPATv4))
2936 return -EADDRNOTAVAIL;
2937
2938 p.iph.daddr = ireq->ifr6_addr.s6_addr32[3];
2939 p.iph.version = 4;
2940 p.iph.ihl = 5;
2941 p.iph.protocol = IPPROTO_IPV6;
2942 p.iph.ttl = 64;
68ad6886 2943
8e3db0bb 2944 if (!dev->netdev_ops->ndo_tunnel_ctl)
68ad6886 2945 return -EOPNOTSUPP;
8e3db0bb 2946 err = dev->netdev_ops->ndo_tunnel_ctl(dev, &p, SIOCADDTUNNEL);
68ad6886
CH
2947 if (err)
2948 return err;
2949
2950 dev = __dev_get_by_name(net, p.name);
2951 if (!dev)
2952 return -ENOBUFS;
2953 return dev_open(dev, NULL);
2954}
2955
1da177e4
LT
2956/*
2957 * Set destination address.
2958 * Special case for SIT interfaces where we create a new "virtual"
2959 * device.
2960 */
af284937 2961int addrconf_set_dstaddr(struct net *net, void __user *arg)
1da177e4 2962{
1da177e4 2963 struct net_device *dev;
68ad6886
CH
2964 struct in6_ifreq ireq;
2965 int err = -ENODEV;
1da177e4 2966
f0988460
CH
2967 if (!IS_ENABLED(CONFIG_IPV6_SIT))
2968 return -ENODEV;
1da177e4 2969 if (copy_from_user(&ireq, arg, sizeof(struct in6_ifreq)))
68ad6886 2970 return -EFAULT;
1da177e4 2971
68ad6886 2972 rtnl_lock();
af284937 2973 dev = __dev_get_by_index(net, ireq.ifr6_ifindex);
68ad6886
CH
2974 if (dev && dev->type == ARPHRD_SIT)
2975 err = addrconf_set_sit_dstaddr(net, dev, &ireq);
1da177e4
LT
2976 rtnl_unlock();
2977 return err;
2978}
2979
93a714d6
MC
2980static int ipv6_mc_config(struct sock *sk, bool join,
2981 const struct in6_addr *addr, int ifindex)
2982{
2983 int ret;
2984
2985 ASSERT_RTNL();
2986
2987 lock_sock(sk);
2988 if (join)
54ff9ef3 2989 ret = ipv6_sock_mc_join(sk, ifindex, addr);
93a714d6 2990 else
54ff9ef3 2991 ret = ipv6_sock_mc_drop(sk, ifindex, addr);
93a714d6
MC
2992 release_sock(sk);
2993
2994 return ret;
2995}
2996
1da177e4
LT
2997/*
2998 * Manual configuration of address on an interface
2999 */
479840ff 3000static int inet6_addr_add(struct net *net, int ifindex,
19b1518c 3001 struct ifa6_config *cfg,
de95e047 3002 struct netlink_ext_ack *extack)
1da177e4
LT
3003{
3004 struct inet6_ifaddr *ifp;
3005 struct inet6_dev *idev;
3006 struct net_device *dev;
93a714d6
MC
3007 unsigned long timeout;
3008 clock_t expires;
6f704992 3009 u32 flags;
1da177e4
LT
3010
3011 ASSERT_RTNL();
1ab1457c 3012
7f6c4039
HL
3013 if (cfg->plen > 128) {
3014 NL_SET_ERR_MSG_MOD(extack, "Invalid prefix length");
24ef0da7 3015 return -EINVAL;
7f6c4039 3016 }
24ef0da7 3017
0778769d 3018 /* check the lifetime */
7f6c4039
HL
3019 if (!cfg->valid_lft || cfg->preferred_lft > cfg->valid_lft) {
3020 NL_SET_ERR_MSG_MOD(extack, "address lifetime invalid");
0778769d 3021 return -EINVAL;
7f6c4039 3022 }
0778769d 3023
7f6c4039
HL
3024 if (cfg->ifa_flags & IFA_F_MANAGETEMPADDR && cfg->plen != 64) {
3025 NL_SET_ERR_MSG_MOD(extack, "address with \"mngtmpaddr\" flag must have a prefix length of 64");
53bd6749 3026 return -EINVAL;
7f6c4039 3027 }
53bd6749 3028
af284937
DL
3029 dev = __dev_get_by_index(net, ifindex);
3030 if (!dev)
1da177e4 3031 return -ENODEV;
1ab1457c 3032
64e724f6 3033 idev = addrconf_add_dev(dev);
7f6c4039
HL
3034 if (IS_ERR(idev)) {
3035 NL_SET_ERR_MSG_MOD(extack, "IPv6 is disabled on this device");
64e724f6 3036 return PTR_ERR(idev);
7f6c4039 3037 }
1da177e4 3038
19b1518c 3039 if (cfg->ifa_flags & IFA_F_MCAUTOJOIN) {
93a714d6 3040 int ret = ipv6_mc_config(net->ipv6.mc_autojoin_sk,
19b1518c 3041 true, cfg->pfx, ifindex);
93a714d6 3042
7f6c4039
HL
3043 if (ret < 0) {
3044 NL_SET_ERR_MSG_MOD(extack, "Multicast auto join failed");
93a714d6 3045 return ret;
7f6c4039 3046 }
93a714d6
MC
3047 }
3048
19b1518c 3049 cfg->scope = ipv6_addr_scope(cfg->pfx);
1da177e4 3050
19b1518c 3051 timeout = addrconf_timeout_fixup(cfg->valid_lft, HZ);
4bed72e4
YH
3052 if (addrconf_finite_timeout(timeout)) {
3053 expires = jiffies_to_clock_t(timeout * HZ);
19b1518c 3054 cfg->valid_lft = timeout;
6f704992 3055 flags = RTF_EXPIRES;
4bed72e4
YH
3056 } else {
3057 expires = 0;
3058 flags = 0;
19b1518c 3059 cfg->ifa_flags |= IFA_F_PERMANENT;
6f704992 3060 }
0778769d 3061
19b1518c 3062 timeout = addrconf_timeout_fixup(cfg->preferred_lft, HZ);
4bed72e4
YH
3063 if (addrconf_finite_timeout(timeout)) {
3064 if (timeout == 0)
19b1518c
DA
3065 cfg->ifa_flags |= IFA_F_DEPRECATED;
3066 cfg->preferred_lft = timeout;
4bed72e4 3067 }
0778769d 3068
19b1518c 3069 ifp = ipv6_add_addr(idev, cfg, true, extack);
1da177e4 3070 if (!IS_ERR(ifp)) {
19b1518c 3071 if (!(cfg->ifa_flags & IFA_F_NOPREFIXROUTE)) {
8308f3ff
DA
3072 addrconf_prefix_route(&ifp->addr, ifp->prefix_len,
3073 ifp->rt_priority, dev, expires,
3074 flags, GFP_KERNEL);
761aac73
TH
3075 }
3076
a2d481b3
LB
3077 /* Send a netlink notification if DAD is enabled and
3078 * optimistic flag is not set
3079 */
3080 if (!(ifp->flags & (IFA_F_OPTIMISTIC | IFA_F_NODAD)))
3081 ipv6_ifa_notify(0, ifp);
95c385b4
NH
3082 /*
3083 * Note that section 3.1 of RFC 4429 indicates
3084 * that the Optimistic flag should not be set for
3085 * manually configured addresses
3086 */
cf22f9a2 3087 addrconf_dad_start(ifp);
19b1518c
DA
3088 if (cfg->ifa_flags & IFA_F_MANAGETEMPADDR)
3089 manage_tempaddrs(idev, ifp, cfg->valid_lft,
3090 cfg->preferred_lft, true, jiffies);
1da177e4 3091 in6_ifa_put(ifp);
8805d13f 3092 addrconf_verify_rtnl(net);
1da177e4 3093 return 0;
19b1518c
DA
3094 } else if (cfg->ifa_flags & IFA_F_MCAUTOJOIN) {
3095 ipv6_mc_config(net->ipv6.mc_autojoin_sk, false,
3096 cfg->pfx, ifindex);
1da177e4
LT
3097 }
3098
3099 return PTR_ERR(ifp);
3100}
3101
6046d5b4 3102static int inet6_addr_del(struct net *net, int ifindex, u32 ifa_flags,
7f6c4039
HL
3103 const struct in6_addr *pfx, unsigned int plen,
3104 struct netlink_ext_ack *extack)
1da177e4
LT
3105{
3106 struct inet6_ifaddr *ifp;
3107 struct inet6_dev *idev;
3108 struct net_device *dev;
1ab1457c 3109
7f6c4039
HL
3110 if (plen > 128) {
3111 NL_SET_ERR_MSG_MOD(extack, "Invalid prefix length");
24ef0da7 3112 return -EINVAL;
7f6c4039 3113 }
24ef0da7 3114
af284937 3115 dev = __dev_get_by_index(net, ifindex);
7f6c4039
HL
3116 if (!dev) {
3117 NL_SET_ERR_MSG_MOD(extack, "Unable to find the interface");
1da177e4 3118 return -ENODEV;
7f6c4039 3119 }
1da177e4 3120
e5d08d71 3121 idev = __in6_dev_get(dev);
7f6c4039
HL
3122 if (!idev) {
3123 NL_SET_ERR_MSG_MOD(extack, "IPv6 is disabled on this device");
1da177e4 3124 return -ENXIO;
7f6c4039 3125 }
1da177e4
LT
3126
3127 read_lock_bh(&idev->lock);
502a2ffd 3128 list_for_each_entry(ifp, &idev->addr_list, if_list) {
1da177e4
LT
3129 if (ifp->prefix_len == plen &&
3130 ipv6_addr_equal(pfx, &ifp->addr)) {
3131 in6_ifa_hold(ifp);
3132 read_unlock_bh(&idev->lock);
1ab1457c 3133
6046d5b4
HK
3134 if (!(ifp->flags & IFA_F_TEMPORARY) &&
3135 (ifa_flags & IFA_F_MANAGETEMPADDR))
3136 manage_tempaddrs(idev, ifp, 0, 0, false,
3137 jiffies);
1da177e4 3138 ipv6_del_addr(ifp);
8805d13f 3139 addrconf_verify_rtnl(net);
93a714d6
MC
3140 if (ipv6_addr_is_multicast(pfx)) {
3141 ipv6_mc_config(net->ipv6.mc_autojoin_sk,
3142 false, pfx, dev->ifindex);
3143 }
1da177e4
LT
3144 return 0;
3145 }
3146 }
3147 read_unlock_bh(&idev->lock);
7f6c4039
HL
3148
3149 NL_SET_ERR_MSG_MOD(extack, "address not found");
1da177e4
LT
3150 return -EADDRNOTAVAIL;
3151}
3152
3153
af284937 3154int addrconf_add_ifaddr(struct net *net, void __user *arg)
1da177e4 3155{
19b1518c
DA
3156 struct ifa6_config cfg = {
3157 .ifa_flags = IFA_F_PERMANENT,
3158 .preferred_lft = INFINITY_LIFE_TIME,
3159 .valid_lft = INFINITY_LIFE_TIME,
3160 };
1da177e4
LT
3161 struct in6_ifreq ireq;
3162 int err;
1ab1457c 3163
af31f412 3164 if (!ns_capable(net->user_ns, CAP_NET_ADMIN))
1da177e4 3165 return -EPERM;
1ab1457c 3166
1da177e4
LT
3167 if (copy_from_user(&ireq, arg, sizeof(struct in6_ifreq)))
3168 return -EFAULT;
3169
19b1518c
DA
3170 cfg.pfx = &ireq.ifr6_addr;
3171 cfg.plen = ireq.ifr6_prefixlen;
3172
1da177e4 3173 rtnl_lock();
19b1518c 3174 err = inet6_addr_add(net, ireq.ifr6_ifindex, &cfg, NULL);
1da177e4
LT
3175 rtnl_unlock();
3176 return err;
3177}
3178
af284937 3179int addrconf_del_ifaddr(struct net *net, void __user *arg)
1da177e4
LT
3180{
3181 struct in6_ifreq ireq;
3182 int err;
1ab1457c 3183
af31f412 3184 if (!ns_capable(net->user_ns, CAP_NET_ADMIN))
1da177e4
LT
3185 return -EPERM;
3186
3187 if (copy_from_user(&ireq, arg, sizeof(struct in6_ifreq)))
3188 return -EFAULT;
3189
3190 rtnl_lock();
6046d5b4 3191 err = inet6_addr_del(net, ireq.ifr6_ifindex, 0, &ireq.ifr6_addr,
7f6c4039 3192 ireq.ifr6_prefixlen, NULL);
1da177e4
LT
3193 rtnl_unlock();
3194 return err;
3195}
3196
b5f348e5 3197static void add_addr(struct inet6_dev *idev, const struct in6_addr *addr,
47f0bd50 3198 int plen, int scope, u8 proto)
b5f348e5
IJ
3199{
3200 struct inet6_ifaddr *ifp;
e6464b8c
DA
3201 struct ifa6_config cfg = {
3202 .pfx = addr,
3203 .plen = plen,
3204 .ifa_flags = IFA_F_PERMANENT,
3205 .valid_lft = INFINITY_LIFE_TIME,
3206 .preferred_lft = INFINITY_LIFE_TIME,
47f0bd50
JL
3207 .scope = scope,
3208 .ifa_proto = proto
e6464b8c 3209 };
b5f348e5 3210
e6464b8c 3211 ifp = ipv6_add_addr(idev, &cfg, true, NULL);
b5f348e5
IJ
3212 if (!IS_ERR(ifp)) {
3213 spin_lock_bh(&ifp->lock);
3214 ifp->flags &= ~IFA_F_TENTATIVE;
3215 spin_unlock_bh(&ifp->lock);
764d3be6 3216 rt_genid_bump_ipv6(dev_net(idev->dev));
b5f348e5
IJ
3217 ipv6_ifa_notify(RTM_NEWADDR, ifp);
3218 in6_ifa_put(ifp);
3219 }
3220}
3221
e5dd7294
AQ
3222#if IS_ENABLED(CONFIG_IPV6_SIT) || IS_ENABLED(CONFIG_NET_IPGRE) || IS_ENABLED(CONFIG_IPV6_GRE)
3223static void add_v4_addrs(struct inet6_dev *idev)
1da177e4 3224{
1da177e4
LT
3225 struct in6_addr addr;
3226 struct net_device *dev;
c346dca1 3227 struct net *net = dev_net(idev->dev);
e5dd7294 3228 int scope, plen, offset = 0;
f0e2acfa 3229 u32 pflags = 0;
1da177e4
LT
3230
3231 ASSERT_RTNL();
3232
3233 memset(&addr, 0, sizeof(struct in6_addr));
e5dd7294
AQ
3234 /* in case of IP6GRE the dev_addr is an IPv6 and therefore we use only the last 4 bytes */
3235 if (idev->dev->addr_len == sizeof(struct in6_addr))
3236 offset = sizeof(struct in6_addr) - 4;
3237 memcpy(&addr.s6_addr32[3], idev->dev->dev_addr + offset, 4);
1da177e4 3238
30e2291f
TW
3239 if (!(idev->dev->flags & IFF_POINTOPOINT) && idev->dev->type == ARPHRD_SIT) {
3240 scope = IPV6_ADDR_COMPATv4;
3241 plen = 96;
3242 pflags |= RTF_NONEXTHOP;
3243 } else {
61e18ce7
SS
3244 if (idev->cnf.addr_gen_mode == IN6_ADDR_GEN_MODE_NONE)
3245 return;
3246
1da177e4
LT
3247 addr.s6_addr32[0] = htonl(0xfe800000);
3248 scope = IFA_LINK;
929c9cf3 3249 plen = 64;
1da177e4
LT
3250 }
3251
3252 if (addr.s6_addr32[3]) {
47f0bd50 3253 add_addr(idev, &addr, plen, scope, IFAPROT_UNSPEC);
8308f3ff 3254 addrconf_prefix_route(&addr, plen, 0, idev->dev, 0, pflags,
e500c6d3 3255 GFP_KERNEL);
1da177e4
LT
3256 return;
3257 }
3258
6fda7350 3259 for_each_netdev(net, dev) {
8e5e8f30 3260 struct in_device *in_dev = __in_dev_get_rtnl(dev);
1da177e4 3261 if (in_dev && (dev->flags & IFF_UP)) {
8e5e8f30 3262 struct in_ifaddr *ifa;
1da177e4
LT
3263 int flag = scope;
3264
cd5a411d 3265 in_dev_for_each_ifa_rtnl(ifa, in_dev) {
1da177e4
LT
3266 addr.s6_addr32[3] = ifa->ifa_local;
3267
3268 if (ifa->ifa_scope == RT_SCOPE_LINK)
3269 continue;
3270 if (ifa->ifa_scope >= RT_SCOPE_HOST) {
3271 if (idev->dev->flags&IFF_POINTOPOINT)
3272 continue;
3273 flag |= IFA_HOST;
3274 }
1da177e4 3275
47f0bd50
JL
3276 add_addr(idev, &addr, plen, flag,
3277 IFAPROT_UNSPEC);
8308f3ff 3278 addrconf_prefix_route(&addr, plen, 0, idev->dev,
e500c6d3 3279 0, pflags, GFP_KERNEL);
1da177e4
LT
3280 }
3281 }
1ab1457c 3282 }
1da177e4 3283}
0be669bb 3284#endif
1da177e4
LT
3285
3286static void init_loopback(struct net_device *dev)
3287{
3288 struct inet6_dev *idev;
1da177e4
LT
3289
3290 /* ::1 */
3291
3292 ASSERT_RTNL();
3293
e5d08d71 3294 idev = ipv6_find_idev(dev);
db0b99f5 3295 if (IS_ERR(idev)) {
91df42be 3296 pr_debug("%s: add_dev failed\n", __func__);
1da177e4
LT
3297 return;
3298 }
3299
47f0bd50 3300 add_addr(idev, &in6addr_loopback, 128, IFA_HOST, IFAPROT_KERNEL_LO);
1da177e4
LT
3301}
3302
2ad3ed59
AA
3303void addrconf_add_linklocal(struct inet6_dev *idev,
3304 const struct in6_addr *addr, u32 flags)
1da177e4 3305{
e6464b8c
DA
3306 struct ifa6_config cfg = {
3307 .pfx = addr,
3308 .plen = 64,
3309 .ifa_flags = flags | IFA_F_PERMANENT,
3310 .valid_lft = INFINITY_LIFE_TIME,
3311 .preferred_lft = INFINITY_LIFE_TIME,
47f0bd50
JL
3312 .scope = IFA_LINK,
3313 .ifa_proto = IFAPROT_KERNEL_LL
e6464b8c 3314 };
8e5e8f30 3315 struct inet6_ifaddr *ifp;
95c385b4
NH
3316
3317#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
35e015e1
MC
3318 if ((dev_net(idev->dev)->ipv6.devconf_all->optimistic_dad ||
3319 idev->cnf.optimistic_dad) &&
702beb87 3320 !dev_net(idev->dev)->ipv6.devconf_all->forwarding)
e6464b8c 3321 cfg.ifa_flags |= IFA_F_OPTIMISTIC;
95c385b4 3322#endif
1da177e4 3323
e6464b8c 3324 ifp = ipv6_add_addr(idev, &cfg, true, NULL);
1da177e4 3325 if (!IS_ERR(ifp)) {
8308f3ff 3326 addrconf_prefix_route(&ifp->addr, ifp->prefix_len, 0, idev->dev,
acb54e3c 3327 0, 0, GFP_ATOMIC);
cf22f9a2 3328 addrconf_dad_start(ifp);
1da177e4
LT
3329 in6_ifa_put(ifp);
3330 }
3331}
2ad3ed59 3332EXPORT_SYMBOL_GPL(addrconf_add_linklocal);
1da177e4 3333
622c81d5
HFS
3334static bool ipv6_reserved_interfaceid(struct in6_addr address)
3335{
3336 if ((address.s6_addr32[2] | address.s6_addr32[3]) == 0)
3337 return true;
3338
3339 if (address.s6_addr32[2] == htonl(0x02005eff) &&
3340 ((address.s6_addr32[3] & htonl(0xfe000000)) == htonl(0xfe000000)))
3341 return true;
3342
3343 if (address.s6_addr32[2] == htonl(0xfdffffff) &&
3344 ((address.s6_addr32[3] & htonl(0xffffff80)) == htonl(0xffffff80)))
3345 return true;
3346
3347 return false;
3348}
3349
3350static int ipv6_generate_stable_address(struct in6_addr *address,
3351 u8 dad_count,
3352 const struct inet6_dev *idev)
3353{
622c81d5 3354 static DEFINE_SPINLOCK(lock);
6b0b0fa2
EB
3355 static __u32 digest[SHA1_DIGEST_WORDS];
3356 static __u32 workspace[SHA1_WORKSPACE_WORDS];
622c81d5
HFS
3357
3358 static union {
6b0b0fa2 3359 char __data[SHA1_BLOCK_SIZE];
622c81d5
HFS
3360 struct {
3361 struct in6_addr secret;
ff40217e 3362 __be32 prefix[2];
622c81d5
HFS
3363 unsigned char hwaddr[MAX_ADDR_LEN];
3364 u8 dad_count;
3365 } __packed;
3366 } data;
3367
3368 struct in6_addr secret;
3369 struct in6_addr temp;
3370 struct net *net = dev_net(idev->dev);
3371
3372 BUILD_BUG_ON(sizeof(data.__data) != sizeof(data));
3373
3374 if (idev->cnf.stable_secret.initialized)
3375 secret = idev->cnf.stable_secret.secret;
3376 else if (net->ipv6.devconf_dflt->stable_secret.initialized)
3377 secret = net->ipv6.devconf_dflt->stable_secret.secret;
3378 else
3379 return -1;
3380
3381retry:
3382 spin_lock_bh(&lock);
3383
6b0b0fa2 3384 sha1_init(digest);
622c81d5
HFS
3385 memset(&data, 0, sizeof(data));
3386 memset(workspace, 0, sizeof(workspace));
3387 memcpy(data.hwaddr, idev->dev->perm_addr, idev->dev->addr_len);
ff40217e
HFS
3388 data.prefix[0] = address->s6_addr32[0];
3389 data.prefix[1] = address->s6_addr32[1];
622c81d5
HFS
3390 data.secret = secret;
3391 data.dad_count = dad_count;
3392
6b0b0fa2 3393 sha1_transform(digest, data.__data, workspace);
622c81d5
HFS
3394
3395 temp = *address;
ff40217e
HFS
3396 temp.s6_addr32[2] = (__force __be32)digest[0];
3397 temp.s6_addr32[3] = (__force __be32)digest[1];
622c81d5
HFS
3398
3399 spin_unlock_bh(&lock);
3400
3401 if (ipv6_reserved_interfaceid(temp)) {
3402 dad_count++;
1855b7c3 3403 if (dad_count > dev_net(idev->dev)->ipv6.sysctl.idgen_retries)
622c81d5
HFS
3404 return -1;
3405 goto retry;
3406 }
3407
3408 *address = temp;
3409 return 0;
3410}
3411
cc9da6cc
BM
3412static void ipv6_gen_mode_random_init(struct inet6_dev *idev)
3413{
3414 struct ipv6_stable_secret *s = &idev->cnf.stable_secret;
3415
3416 if (s->initialized)
3417 return;
3418 s = &idev->cnf.stable_secret;
3419 get_random_bytes(&s->secret, sizeof(s->secret));
3420 s->initialized = true;
3421}
3422
bc91b0f0
JP
3423static void addrconf_addr_gen(struct inet6_dev *idev, bool prefix_route)
3424{
622c81d5
HFS
3425 struct in6_addr addr;
3426
ca254490
DA
3427 /* no link local addresses on L3 master devices */
3428 if (netif_is_l3_master(idev->dev))
3429 return;
3430
744fdc82 3431 /* no link local addresses on devices flagged as slaves */
8a321cf7 3432 if (idev->dev->priv_flags & IFF_NO_ADDRCONF)
744fdc82
JW
3433 return;
3434
622c81d5 3435 ipv6_addr_set(&addr, htonl(0xFE800000), 0, 0, 0);
bc91b0f0 3436
d35a00b8 3437 switch (idev->cnf.addr_gen_mode) {
cc9da6cc
BM
3438 case IN6_ADDR_GEN_MODE_RANDOM:
3439 ipv6_gen_mode_random_init(idev);
a8eceea8 3440 fallthrough;
cc9da6cc 3441 case IN6_ADDR_GEN_MODE_STABLE_PRIVACY:
622c81d5 3442 if (!ipv6_generate_stable_address(&addr, 0, idev))
64236f3f
HFS
3443 addrconf_add_linklocal(idev, &addr,
3444 IFA_F_STABLE_PRIVACY);
622c81d5 3445 else if (prefix_route)
8308f3ff 3446 addrconf_prefix_route(&addr, 64, 0, idev->dev,
acb54e3c 3447 0, 0, GFP_KERNEL);
cc9da6cc
BM
3448 break;
3449 case IN6_ADDR_GEN_MODE_EUI64:
bc91b0f0
JP
3450 /* addrconf_add_linklocal also adds a prefix_route and we
3451 * only need to care about prefix routes if ipv6_generate_eui64
3452 * couldn't generate one.
3453 */
3454 if (ipv6_generate_eui64(addr.s6_addr + 8, idev->dev) == 0)
64236f3f 3455 addrconf_add_linklocal(idev, &addr, 0);
bc91b0f0 3456 else if (prefix_route)
8308f3ff 3457 addrconf_prefix_route(&addr, 64, 0, idev->dev,
27b10608 3458 0, 0, GFP_KERNEL);
cc9da6cc
BM
3459 break;
3460 case IN6_ADDR_GEN_MODE_NONE:
3461 default:
3462 /* will not add any link local address */
3463 break;
bc91b0f0
JP
3464 }
3465}
3466
1da177e4
LT
3467static void addrconf_dev_config(struct net_device *dev)
3468{
8e5e8f30 3469 struct inet6_dev *idev;
1da177e4
LT
3470
3471 ASSERT_RTNL();
3472
74235a25
HX
3473 if ((dev->type != ARPHRD_ETHER) &&
3474 (dev->type != ARPHRD_FDDI) &&
74235a25 3475 (dev->type != ARPHRD_ARCNET) &&
06a4c1c5 3476 (dev->type != ARPHRD_INFINIBAND) &&
e837735e 3477 (dev->type != ARPHRD_IEEE1394) &&
e74bccb8 3478 (dev->type != ARPHRD_TUNNEL6) &&
cc9da6cc 3479 (dev->type != ARPHRD_6LOWPAN) &&
45ce0fd1 3480 (dev->type != ARPHRD_TUNNEL) &&
9deb441c
SAK
3481 (dev->type != ARPHRD_NONE) &&
3482 (dev->type != ARPHRD_RAWIP)) {
74235a25 3483 /* Alas, we support only Ethernet autoconfiguration. */
60380488
HL
3484 idev = __in6_dev_get(dev);
3485 if (!IS_ERR_OR_NULL(idev) && dev->flags & IFF_UP &&
3486 dev->flags & IFF_MULTICAST)
3487 ipv6_mc_up(idev);
74235a25
HX
3488 return;
3489 }
3490
1da177e4 3491 idev = addrconf_add_dev(dev);
64e724f6 3492 if (IS_ERR(idev))
1da177e4
LT
3493 return;
3494
cc9da6cc
BM
3495 /* this device type has no EUI support */
3496 if (dev->type == ARPHRD_NONE &&
d35a00b8 3497 idev->cnf.addr_gen_mode == IN6_ADDR_GEN_MODE_EUI64)
4ad26813
ED
3498 WRITE_ONCE(idev->cnf.addr_gen_mode,
3499 IN6_ADDR_GEN_MODE_RANDOM);
cc9da6cc 3500
bc91b0f0 3501 addrconf_addr_gen(idev, false);
1da177e4
LT
3502}
3503
07a93626 3504#if IS_ENABLED(CONFIG_IPV6_SIT)
1da177e4
LT
3505static void addrconf_sit_config(struct net_device *dev)
3506{
3507 struct inet6_dev *idev;
3508
3509 ASSERT_RTNL();
3510
1ab1457c
YH
3511 /*
3512 * Configure the tunnel with one of our IPv4
3513 * addresses... we should configure all of
1da177e4
LT
3514 * our v4 addrs in the tunnel
3515 */
3516
e5d08d71 3517 idev = ipv6_find_idev(dev);
db0b99f5 3518 if (IS_ERR(idev)) {
91df42be 3519 pr_debug("%s: add_dev failed\n", __func__);
1da177e4
LT
3520 return;
3521 }
3522
c7dc89c0 3523 if (dev->priv_flags & IFF_ISATAP) {
bc91b0f0 3524 addrconf_addr_gen(idev, false);
c7dc89c0
FT
3525 return;
3526 }
3527
e5dd7294 3528 add_v4_addrs(idev);
1da177e4 3529
62b54dd9 3530 if (dev->flags&IFF_POINTOPOINT)
1da177e4 3531 addrconf_add_mroute(dev);
1da177e4 3532}
0be669bb 3533#endif
1da177e4 3534
e5dd7294 3535#if IS_ENABLED(CONFIG_NET_IPGRE) || IS_ENABLED(CONFIG_IPV6_GRE)
aee80b54 3536static void addrconf_gre_config(struct net_device *dev)
3537{
3538 struct inet6_dev *idev;
aee80b54 3539
aee80b54 3540 ASSERT_RTNL();
3541
e5d08d71 3542 idev = ipv6_find_idev(dev);
db0b99f5 3543 if (IS_ERR(idev)) {
91df42be 3544 pr_debug("%s: add_dev failed\n", __func__);
aee80b54 3545 return;
3546 }
3547
e5dd7294
AQ
3548 if (dev->type == ARPHRD_ETHER) {
3549 addrconf_addr_gen(idev, true);
3550 return;
3551 }
3552
3553 add_v4_addrs(idev);
3554
d9e4ce65
HFS
3555 if (dev->flags & IFF_POINTOPOINT)
3556 addrconf_add_mroute(dev);
aee80b54 3557}
3558#endif
3559
23ca0c2c
TW
3560static void addrconf_init_auto_addrs(struct net_device *dev)
3561{
3562 switch (dev->type) {
3563#if IS_ENABLED(CONFIG_IPV6_SIT)
3564 case ARPHRD_SIT:
3565 addrconf_sit_config(dev);
3566 break;
3567#endif
3568#if IS_ENABLED(CONFIG_NET_IPGRE) || IS_ENABLED(CONFIG_IPV6_GRE)
3569 case ARPHRD_IP6GRE:
3570 case ARPHRD_IPGRE:
3571 addrconf_gre_config(dev);
3572 break;
3573#endif
3574 case ARPHRD_LOOPBACK:
3575 init_loopback(dev);
3576 break;
3577
3578 default:
3579 addrconf_dev_config(dev);
3580 break;
3581 }
3582}
3583
afb1d4b5
DA
3584static int fixup_permanent_addr(struct net *net,
3585 struct inet6_dev *idev,
f1705ec1
DA
3586 struct inet6_ifaddr *ifp)
3587{
93c2fb25 3588 /* !fib6_node means the host route was removed from the
8048ced9
DA
3589 * FIB, for example, if 'lo' device is taken down. In that
3590 * case regenerate the host route.
3591 */
93c2fb25 3592 if (!ifp->rt || !ifp->rt->fib6_node) {
360a9887 3593 struct fib6_info *f6i, *prev;
f1705ec1 3594
360a9887 3595 f6i = addrconf_f6i_alloc(net, idev, &ifp->addr, false,
7f6c4039 3596 GFP_ATOMIC, NULL);
360a9887
DA
3597 if (IS_ERR(f6i))
3598 return PTR_ERR(f6i);
f1705ec1 3599
8048ced9
DA
3600 /* ifp->rt can be accessed outside of rtnl */
3601 spin_lock(&ifp->lock);
3602 prev = ifp->rt;
360a9887 3603 ifp->rt = f6i;
8048ced9
DA
3604 spin_unlock(&ifp->lock);
3605
93531c67 3606 fib6_info_release(prev);
f1705ec1
DA
3607 }
3608
3609 if (!(ifp->flags & IFA_F_NOPREFIXROUTE)) {
3610 addrconf_prefix_route(&ifp->addr, ifp->prefix_len,
8308f3ff
DA
3611 ifp->rt_priority, idev->dev, 0, 0,
3612 GFP_ATOMIC);
f1705ec1
DA
3613 }
3614
6d717134
DA
3615 if (ifp->state == INET6_IFADDR_STATE_PREDAD)
3616 addrconf_dad_start(ifp);
f1705ec1
DA
3617
3618 return 0;
3619}
3620
afb1d4b5 3621static void addrconf_permanent_addr(struct net *net, struct net_device *dev)
f1705ec1
DA
3622{
3623 struct inet6_ifaddr *ifp, *tmp;
3624 struct inet6_dev *idev;
3625
3626 idev = __in6_dev_get(dev);
3627 if (!idev)
3628 return;
3629
3630 write_lock_bh(&idev->lock);
3631
3632 list_for_each_entry_safe(ifp, tmp, &idev->addr_list, if_list) {
3633 if ((ifp->flags & IFA_F_PERMANENT) &&
afb1d4b5 3634 fixup_permanent_addr(net, idev, ifp) < 0) {
f1705ec1 3635 write_unlock_bh(&idev->lock);
e669b869 3636 in6_ifa_hold(ifp);
f1705ec1
DA
3637 ipv6_del_addr(ifp);
3638 write_lock_bh(&idev->lock);
3639
3640 net_info_ratelimited("%s: Failed to add prefix route for address %pI6c; dropping\n",
3641 idev->dev->name, &ifp->addr);
3642 }
3643 }
3644
3645 write_unlock_bh(&idev->lock);
3646}
3647
1ab1457c 3648static int addrconf_notify(struct notifier_block *this, unsigned long event,
351638e7 3649 void *ptr)
1da177e4 3650{
351638e7 3651 struct net_device *dev = netdev_notifier_info_to_dev(ptr);
896585d4 3652 struct netdev_notifier_change_info *change_info;
4f7f34ea 3653 struct netdev_notifier_changeupper_info *info;
748e2d93 3654 struct inet6_dev *idev = __in6_dev_get(dev);
60abc0be 3655 struct net *net = dev_net(dev);
c5e33bdd 3656 int run_pending = 0;
b217d616 3657 int err;
1da177e4 3658
e21e8467 3659 switch (event) {
45ba9dd2 3660 case NETDEV_REGISTER:
74235a25 3661 if (!idev && dev->mtu >= IPV6_MIN_MTU) {
45ba9dd2 3662 idev = ipv6_add_dev(dev);
a317a2f1
WC
3663 if (IS_ERR(idev))
3664 return notifier_from_errno(PTR_ERR(idev));
45ba9dd2
YH
3665 }
3666 break;
bcdd553f 3667
b7b0b1d2
AD
3668 case NETDEV_CHANGEMTU:
3669 /* if MTU under IPV6_MIN_MTU stop IPv6 on this interface. */
3670 if (dev->mtu < IPV6_MIN_MTU) {
60abc0be 3671 addrconf_ifdown(dev, dev != net->loopback_dev);
b7b0b1d2
AD
3672 break;
3673 }
3674
3675 if (idev) {
3676 rt6_mtu_change(dev, dev->mtu);
e7135f48 3677 WRITE_ONCE(idev->cnf.mtu6, dev->mtu);
b7b0b1d2
AD
3678 break;
3679 }
3680
3681 /* allocate new idev */
3682 idev = ipv6_add_dev(dev);
3683 if (IS_ERR(idev))
3684 break;
3685
3686 /* device is still not ready */
3687 if (!(idev->if_flags & IF_READY))
3688 break;
3689
3690 run_pending = 1;
a8eceea8 3691 fallthrough;
1da177e4 3692 case NETDEV_UP:
3c21edbd 3693 case NETDEV_CHANGE:
fd16eb94 3694 if (idev && idev->cnf.disable_ipv6)
c2edacf8
JV
3695 break;
3696
8a321cf7 3697 if (dev->priv_flags & IFF_NO_ADDRCONF) {
fd16eb94
HL
3698 if (event == NETDEV_UP && !IS_ERR_OR_NULL(idev) &&
3699 dev->flags & IFF_UP && dev->flags & IFF_MULTICAST)
3700 ipv6_mc_up(idev);
3ce62a84 3701 break;
fd16eb94 3702 }
3ce62a84 3703
3c21edbd 3704 if (event == NETDEV_UP) {
38bd10c4 3705 /* restore routes for permanent addresses */
afb1d4b5 3706 addrconf_permanent_addr(net, dev);
38bd10c4 3707
1f372c7b 3708 if (!addrconf_link_ready(dev)) {
3c21edbd 3709 /* device is not ready yet. */
7c62b8dd
LR
3710 pr_debug("ADDRCONF(NETDEV_UP): %s: link is not ready\n",
3711 dev->name);
3c21edbd
YH
3712 break;
3713 }
99081049 3714
d31c7b8f
EP
3715 if (!idev && dev->mtu >= IPV6_MIN_MTU)
3716 idev = ipv6_add_dev(dev);
3717
a317a2f1 3718 if (!IS_ERR_OR_NULL(idev)) {
99081049 3719 idev->if_flags |= IF_READY;
e3ec6cfc
BT
3720 run_pending = 1;
3721 }
b7b0b1d2 3722 } else if (event == NETDEV_CHANGE) {
1f372c7b 3723 if (!addrconf_link_ready(dev)) {
3c21edbd 3724 /* device is still not ready. */
27c6fa73 3725 rt6_sync_down_dev(dev, event);
3c21edbd
YH
3726 break;
3727 }
3728
896585d4 3729 if (!IS_ERR_OR_NULL(idev)) {
a088d1d7
LL
3730 if (idev->if_flags & IF_READY) {
3731 /* device is already configured -
3732 * but resend MLD reports, we might
3733 * have roamed and need to update
3734 * multicast snooping switches
3735 */
3736 ipv6_mc_up(idev);
896585d4
HL
3737 change_info = ptr;
3738 if (change_info->flags_changed & IFF_NOARP)
3739 addrconf_dad_run(idev, true);
27c6fa73 3740 rt6_sync_up(dev, RTNH_F_LINKDOWN);
3c21edbd 3741 break;
a088d1d7 3742 }
3c21edbd
YH
3743 idev->if_flags |= IF_READY;
3744 }
3745
f69de8aa
MB
3746 pr_debug("ADDRCONF(NETDEV_CHANGE): %s: link becomes ready\n",
3747 dev->name);
3c21edbd 3748
c5e33bdd 3749 run_pending = 1;
3c21edbd
YH
3750 }
3751
23ca0c2c 3752 addrconf_init_auto_addrs(dev);
bcdd553f 3753
a317a2f1 3754 if (!IS_ERR_OR_NULL(idev)) {
c5e33bdd 3755 if (run_pending)
896585d4 3756 addrconf_dad_run(idev, false);
c5e33bdd 3757
2127d95a
IS
3758 /* Device has an address by now */
3759 rt6_sync_up(dev, RTNH_F_DEAD);
3760
bcdd553f
SH
3761 /*
3762 * If the MTU changed during the interface down,
3763 * when the interface up, the changed MTU must be
3764 * reflected in the idev as well as routers.
1da177e4 3765 */
bcdd553f
SH
3766 if (idev->cnf.mtu6 != dev->mtu &&
3767 dev->mtu >= IPV6_MIN_MTU) {
1da177e4 3768 rt6_mtu_change(dev, dev->mtu);
e7135f48 3769 WRITE_ONCE(idev->cnf.mtu6, dev->mtu);
1da177e4 3770 }
4ad26813 3771 WRITE_ONCE(idev->tstamp, jiffies);
1da177e4 3772 inet6_ifinfo_notify(RTM_NEWLINK, idev);
bcdd553f
SH
3773
3774 /*
3775 * If the changed mtu during down is lower than
3776 * IPV6_MIN_MTU stop IPv6 on this interface.
1da177e4
LT
3777 */
3778 if (dev->mtu < IPV6_MIN_MTU)
60abc0be 3779 addrconf_ifdown(dev, dev != net->loopback_dev);
1da177e4
LT
3780 }
3781 break;
3782
1da177e4
LT
3783 case NETDEV_DOWN:
3784 case NETDEV_UNREGISTER:
3785 /*
3786 * Remove all addresses from this interface.
3787 */
3788 addrconf_ifdown(dev, event != NETDEV_DOWN);
3789 break;
3c21edbd 3790
1da177e4 3791 case NETDEV_CHANGENAME:
1da177e4 3792 if (idev) {
5632c515 3793 snmp6_unregister_dev(idev);
408c4768 3794 addrconf_sysctl_unregister(idev);
a317a2f1 3795 err = addrconf_sysctl_register(idev);
b217d616
HX
3796 if (err)
3797 return notifier_from_errno(err);
a317a2f1
WC
3798 err = snmp6_register_dev(idev);
3799 if (err) {
3800 addrconf_sysctl_unregister(idev);
3801 return notifier_from_errno(err);
3802 }
5632c515 3803 }
1da177e4 3804 break;
bcdd553f 3805
93d9b7d7
JP
3806 case NETDEV_PRE_TYPE_CHANGE:
3807 case NETDEV_POST_TYPE_CHANGE:
3ef0952c
AL
3808 if (idev)
3809 addrconf_type_change(dev, event);
75c78500 3810 break;
4f7f34ea
DA
3811
3812 case NETDEV_CHANGEUPPER:
3813 info = ptr;
3814
3815 /* flush all routes if dev is linked to or unlinked from
3816 * an L3 master device (e.g., VRF)
3817 */
3818 if (info->upper_dev && netif_is_l3_master(info->upper_dev))
ae79dbf6 3819 addrconf_ifdown(dev, false);
3ff50b79 3820 }
1da177e4
LT
3821
3822 return NOTIFY_OK;
3823}
3824
3825/*
3826 * addrconf module should be notified of a device going up
3827 */
3828static struct notifier_block ipv6_dev_notf = {
3829 .notifier_call = addrconf_notify,
242d3a49 3830 .priority = ADDRCONF_NOTIFY_PRIORITY,
1da177e4
LT
3831};
3832
93d9b7d7 3833static void addrconf_type_change(struct net_device *dev, unsigned long event)
75c78500
MS
3834{
3835 struct inet6_dev *idev;
3836 ASSERT_RTNL();
3837
3838 idev = __in6_dev_get(dev);
3839
93d9b7d7 3840 if (event == NETDEV_POST_TYPE_CHANGE)
75c78500 3841 ipv6_mc_remap(idev);
93d9b7d7 3842 else if (event == NETDEV_PRE_TYPE_CHANGE)
75c78500
MS
3843 ipv6_mc_unmap(idev);
3844}
3845
70af921d
DA
3846static bool addr_is_local(const struct in6_addr *addr)
3847{
3848 return ipv6_addr_type(addr) &
3849 (IPV6_ADDR_LINKLOCAL | IPV6_ADDR_LOOPBACK);
3850}
3851
ae79dbf6 3852static int addrconf_ifdown(struct net_device *dev, bool unregister)
1da177e4 3853{
ae79dbf6 3854 unsigned long event = unregister ? NETDEV_UNREGISTER : NETDEV_DOWN;
c346dca1 3855 struct net *net = dev_net(dev);
502a2ffd 3856 struct inet6_dev *idev;
51454ea4
ND
3857 struct inet6_ifaddr *ifa;
3858 LIST_HEAD(tmp_addr_list);
0aef78aa 3859 bool keep_addr = false;
9995b408 3860 bool was_ready;
73a8bd74 3861 int state, i;
1da177e4
LT
3862
3863 ASSERT_RTNL();
3864
4c981e28 3865 rt6_disable_ip(dev, event);
1da177e4
LT
3866
3867 idev = __in6_dev_get(dev);
63159f29 3868 if (!idev)
1da177e4
LT
3869 return -ENODEV;
3870
bcdd553f
SH
3871 /*
3872 * Step 1: remove reference to ipv6 device from parent device.
3873 * Do not dev_put!
1da177e4 3874 */
ae79dbf6 3875 if (unregister) {
1da177e4 3876 idev->dead = 1;
8814c4b5
YH
3877
3878 /* protected by rtnl_lock */
a9b3cd7f 3879 RCU_INIT_POINTER(dev->ip6_ptr, NULL);
1da177e4
LT
3880
3881 /* Step 1.5: remove snmp6 entry */
3882 snmp6_unregister_dev(idev);
3883
3884 }
3885
f1705ec1
DA
3886 /* combine the user config with event to determine if permanent
3887 * addresses are to be removed from address hash table
3888 */
ae79dbf6 3889 if (!unregister && !idev->cnf.disable_ipv6) {
0aef78aa
IV
3890 /* aggregate the system setting and interface setting */
3891 int _keep_addr = net->ipv6.devconf_all->keep_addr_on_down;
3892
3893 if (!_keep_addr)
3894 _keep_addr = idev->cnf.keep_addr_on_down;
3895
3896 keep_addr = (_keep_addr > 0);
3897 }
f1705ec1 3898
73a8bd74
DM
3899 /* Step 2: clear hash table */
3900 for (i = 0; i < IN6_ADDR_HSIZE; i++) {
e66d1172 3901 struct hlist_head *h = &net->ipv6.inet6_addr_lst[i];
73a8bd74 3902
e66d1172 3903 spin_lock_bh(&net->ipv6.addrconf_hash_lock);
67ba4152 3904restart:
b67bfe0d 3905 hlist_for_each_entry_rcu(ifa, h, addr_lst) {
73a8bd74 3906 if (ifa->idev == idev) {
c15b1cca 3907 addrconf_del_dad_work(ifa);
f1705ec1
DA
3908 /* combined flag + permanent flag decide if
3909 * address is retained on a down event
3910 */
3911 if (!keep_addr ||
70af921d
DA
3912 !(ifa->flags & IFA_F_PERMANENT) ||
3913 addr_is_local(&ifa->addr)) {
f1705ec1
DA
3914 hlist_del_init_rcu(&ifa->addr_lst);
3915 goto restart;
3916 }
73a8bd74
DM
3917 }
3918 }
e66d1172 3919 spin_unlock_bh(&net->ipv6.addrconf_hash_lock);
73a8bd74
DM
3920 }
3921
1da177e4
LT
3922 write_lock_bh(&idev->lock);
3923
b7b1bfce
HFS
3924 addrconf_del_rs_timer(idev);
3925
9995b408 3926 /* Step 2: clear flags for stateless addrconf, repeated down
3927 * detection
3928 */
3929 was_ready = idev->if_flags & IF_READY;
ae79dbf6 3930 if (!unregister)
3c21edbd 3931 idev->if_flags &= ~(IF_RS_SENT|IF_RA_RCVD|IF_READY);
1da177e4 3932
bcdd553f 3933 /* Step 3: clear tempaddr list */
372e6c8f 3934 while (!list_empty(&idev->tempaddr_list)) {
3935 ifa = list_first_entry(&idev->tempaddr_list,
3936 struct inet6_ifaddr, tmp_list);
3937 list_del(&ifa->tmp_list);
1da177e4
LT
3938 write_unlock_bh(&idev->lock);
3939 spin_lock_bh(&ifa->lock);
3940
3941 if (ifa->ifpub) {
3942 in6_ifa_put(ifa->ifpub);
3943 ifa->ifpub = NULL;
3944 }
3945 spin_unlock_bh(&ifa->lock);
3946 in6_ifa_put(ifa);
3947 write_lock_bh(&idev->lock);
3948 }
8f37ada5 3949
51454ea4
ND
3950 list_for_each_entry(ifa, &idev->addr_list, if_list)
3951 list_add_tail(&ifa->if_list_aux, &tmp_addr_list);
3952 write_unlock_bh(&idev->lock);
3953
3954 while (!list_empty(&tmp_addr_list)) {
8d1c802b 3955 struct fib6_info *rt = NULL;
a2d6cbb0 3956 bool keep;
38bd10c4 3957
51454ea4
ND
3958 ifa = list_first_entry(&tmp_addr_list,
3959 struct inet6_ifaddr, if_list_aux);
3960 list_del(&ifa->if_list_aux);
3961
f1705ec1 3962 addrconf_del_dad_work(ifa);
84e8b803 3963
a2d6cbb0
RV
3964 keep = keep_addr && (ifa->flags & IFA_F_PERMANENT) &&
3965 !addr_is_local(&ifa->addr);
a2d6cbb0 3966
8e8e676d 3967 spin_lock_bh(&ifa->lock);
f1705ec1 3968
a2d6cbb0 3969 if (keep) {
f1705ec1
DA
3970 /* set state to skip the notifier below */
3971 state = INET6_IFADDR_STATE_DEAD;
6d717134 3972 ifa->state = INET6_IFADDR_STATE_PREDAD;
f1705ec1
DA
3973 if (!(ifa->flags & IFA_F_NODAD))
3974 ifa->flags |= IFA_F_TENTATIVE;
38bd10c4
DA
3975
3976 rt = ifa->rt;
3977 ifa->rt = NULL;
f1705ec1
DA
3978 } else {
3979 state = ifa->state;
3980 ifa->state = INET6_IFADDR_STATE_DEAD;
f1705ec1
DA
3981 }
3982
8e8e676d 3983 spin_unlock_bh(&ifa->lock);
9d82ca98 3984
38bd10c4 3985 if (rt)
11dd74b3 3986 ip6_del_rt(net, rt, false);
38bd10c4 3987
73a8bd74
DM
3988 if (state != INET6_IFADDR_STATE_DEAD) {
3989 __ipv6_ifa_notify(RTM_DELADDR, ifa);
f88c91dd 3990 inet6addr_notifier_call_chain(NETDEV_DOWN, ifa);
ea06f717
MM
3991 } else {
3992 if (idev->cnf.forwarding)
3993 addrconf_leave_anycast(ifa);
3994 addrconf_leave_solict(ifa->idev, &ifa->addr);
27bdb2ab 3995 }
8f37ada5 3996
8ef802aa 3997 if (!keep) {
51454ea4 3998 write_lock_bh(&idev->lock);
8ef802aa 3999 list_del_rcu(&ifa->if_list);
51454ea4 4000 write_unlock_bh(&idev->lock);
8ef802aa
ED
4001 in6_ifa_put(ifa);
4002 }
73a8bd74 4003 }
8f37ada5 4004
381f4dca 4005 /* Step 5: Discard anycast and multicast list */
ae79dbf6 4006 if (unregister) {
381f4dca 4007 ipv6_ac_destroy_dev(idev);
1da177e4 4008 ipv6_mc_destroy_dev(idev);
9995b408 4009 } else if (was_ready) {
1da177e4 4010 ipv6_mc_down(idev);
381f4dca 4011 }
1da177e4 4012
4ad26813 4013 WRITE_ONCE(idev->tstamp, jiffies);
49b99da2 4014 idev->ra_mtu = 0;
1ab1457c 4015
bcdd553f 4016 /* Last: Shot the device (if unregistered) */
ae79dbf6 4017 if (unregister) {
408c4768 4018 addrconf_sysctl_unregister(idev);
1da177e4
LT
4019 neigh_parms_release(&nd_tbl, idev->nd_parms);
4020 neigh_ifdown(&nd_tbl, dev);
4021 in6_dev_put(idev);
4022 }
4023 return 0;
4024}
4025
e99e88a9 4026static void addrconf_rs_timer(struct timer_list *t)
1da177e4 4027{
e99e88a9 4028 struct inet6_dev *idev = from_timer(idev, t, rs_timer);
caf92bc4 4029 struct net_device *dev = idev->dev;
b7b1bfce 4030 struct in6_addr lladdr;
1da177e4 4031
b7b1bfce 4032 write_lock(&idev->lock);
5b2a1953 4033 if (idev->dead || !(idev->if_flags & IF_READY))
1da177e4
LT
4034 goto out;
4035
9ba2add3 4036 if (!ipv6_accept_ra(idev))
5b2a1953 4037 goto out;
4038
4039 /* Announcement received after solicitation was sent */
4040 if (idev->if_flags & IF_RA_RCVD)
1da177e4 4041 goto out;
1da177e4 4042
bd11f074 4043 if (idev->rs_probes++ < idev->cnf.rtr_solicits || idev->cnf.rtr_solicits < 0) {
caf92bc4
CW
4044 write_unlock(&idev->lock);
4045 if (!ipv6_get_lladdr(dev, &lladdr, IFA_F_TENTATIVE))
4046 ndisc_send_rs(dev, &lladdr,
b7b1bfce
HFS
4047 &in6addr_linklocal_allrouters);
4048 else
caf92bc4 4049 goto put;
1da177e4 4050
caf92bc4 4051 write_lock(&idev->lock);
bd11f074
4052 idev->rs_interval = rfc3315_s14_backoff_update(
4053 idev->rs_interval, idev->cnf.rtr_solicit_max_interval);
b7b1bfce
HFS
4054 /* The wait after the last probe can be shorter */
4055 addrconf_mod_rs_timer(idev, (idev->rs_probes ==
4056 idev->cnf.rtr_solicits) ?
4057 idev->cnf.rtr_solicit_delay :
bd11f074 4058 idev->rs_interval);
1da177e4 4059 } else {
1da177e4
LT
4060 /*
4061 * Note: we do not support deprecated "all on-link"
4062 * assumption any longer.
4063 */
91df42be 4064 pr_debug("%s: no IPv6 routers present\n", idev->dev->name);
1da177e4
LT
4065 }
4066
4067out:
b7b1bfce 4068 write_unlock(&idev->lock);
caf92bc4 4069put:
b7b1bfce 4070 in6_dev_put(idev);
1da177e4
LT
4071}
4072
4073/*
4074 * Duplicate Address Detection
4075 */
3c21edbd
YH
4076static void addrconf_dad_kick(struct inet6_ifaddr *ifp)
4077{
4078 unsigned long rand_num;
4079 struct inet6_dev *idev = ifp->idev;
adc176c5 4080 u64 nonce;
3c21edbd 4081
95c385b4
NH
4082 if (ifp->flags & IFA_F_OPTIMISTIC)
4083 rand_num = 0;
4084 else
8032bf12 4085 rand_num = get_random_u32_below(idev->cnf.rtr_solicit_delay ? : 1);
95c385b4 4086
adc176c5
EN
4087 nonce = 0;
4088 if (idev->cnf.enhanced_dad ||
4089 dev_net(idev->dev)->ipv6.devconf_all->enhanced_dad) {
4090 do
4091 get_random_bytes(&nonce, 6);
4092 while (nonce == 0);
4093 }
4094 ifp->dad_nonce = nonce;
b7b1bfce 4095 ifp->dad_probes = idev->cnf.dad_transmits;
c15b1cca 4096 addrconf_mod_dad_work(ifp, rand_num);
3c21edbd
YH
4097}
4098
c15b1cca 4099static void addrconf_dad_begin(struct inet6_ifaddr *ifp)
1da177e4
LT
4100{
4101 struct inet6_dev *idev = ifp->idev;
4102 struct net_device *dev = idev->dev;
764d3be6 4103 bool bump_id, notify = false;
afb1d4b5 4104 struct net *net;
1da177e4
LT
4105
4106 addrconf_join_solict(dev, &ifp->addr);
4107
1da177e4 4108 read_lock_bh(&idev->lock);
622ccdf1 4109 spin_lock(&ifp->lock);
e9d3e084 4110 if (ifp->state == INET6_IFADDR_STATE_DEAD)
1da177e4 4111 goto out;
1da177e4 4112
afb1d4b5 4113 net = dev_net(dev);
1da177e4 4114 if (dev->flags&(IFF_NOARP|IFF_LOOPBACK) ||
afb1d4b5 4115 (net->ipv6.devconf_all->accept_dad < 1 &&
a2d3f3e3 4116 idev->cnf.accept_dad < 1) ||
55ebaef1
NT
4117 !(ifp->flags&IFA_F_TENTATIVE) ||
4118 ifp->flags & IFA_F_NODAD) {
c76fe2d9
DA
4119 bool send_na = false;
4120
4121 if (ifp->flags & IFA_F_TENTATIVE &&
4122 !(ifp->flags & IFA_F_OPTIMISTIC))
4123 send_na = true;
764d3be6 4124 bump_id = ifp->flags & IFA_F_TENTATIVE;
cc411d0b 4125 ifp->flags &= ~(IFA_F_TENTATIVE|IFA_F_OPTIMISTIC|IFA_F_DADFAILED);
21809faf 4126 spin_unlock(&ifp->lock);
1da177e4
LT
4127 read_unlock_bh(&idev->lock);
4128
c76fe2d9 4129 addrconf_dad_completed(ifp, bump_id, send_na);
1da177e4
LT
4130 return;
4131 }
4132
6732bade 4133 if (!(idev->if_flags & IF_READY)) {
21809faf 4134 spin_unlock(&ifp->lock);
6732bade 4135 read_unlock_bh(&idev->lock);
3c21edbd 4136 /*
590a9887 4137 * If the device is not ready:
3c21edbd
YH
4138 * - keep it tentative if it is a permanent address.
4139 * - otherwise, kill it.
4140 */
4141 in6_ifa_hold(ifp);
cc411d0b 4142 addrconf_dad_stop(ifp, 0);
6732bade 4143 return;
3c21edbd 4144 }
95c385b4
NH
4145
4146 /*
4147 * Optimistic nodes can start receiving
4148 * Frames right away
4149 */
7fd2561e 4150 if (ifp->flags & IFA_F_OPTIMISTIC) {
afb1d4b5
DA
4151 ip6_ins_rt(net, ifp->rt);
4152 if (ipv6_use_optimistic_addr(net, idev)) {
7fd2561e
EK
4153 /* Because optimistic nodes can use this address,
4154 * notify listeners. If DAD fails, RTM_DELADDR is sent.
4155 */
16186a82 4156 notify = true;
7fd2561e
EK
4157 }
4158 }
95c385b4 4159
6732bade 4160 addrconf_dad_kick(ifp);
1da177e4 4161out:
622ccdf1 4162 spin_unlock(&ifp->lock);
1da177e4 4163 read_unlock_bh(&idev->lock);
16186a82
SAK
4164 if (notify)
4165 ipv6_ifa_notify(RTM_NEWADDR, ifp);
1da177e4
LT
4166}
4167
c15b1cca 4168static void addrconf_dad_start(struct inet6_ifaddr *ifp)
1da177e4 4169{
c15b1cca
HFS
4170 bool begin_dad = false;
4171
8e8e676d 4172 spin_lock_bh(&ifp->lock);
c15b1cca
HFS
4173 if (ifp->state != INET6_IFADDR_STATE_DEAD) {
4174 ifp->state = INET6_IFADDR_STATE_PREDAD;
4175 begin_dad = true;
4176 }
8e8e676d 4177 spin_unlock_bh(&ifp->lock);
c15b1cca
HFS
4178
4179 if (begin_dad)
4180 addrconf_mod_dad_work(ifp, 0);
4181}
4182
4183static void addrconf_dad_work(struct work_struct *w)
4184{
4185 struct inet6_ifaddr *ifp = container_of(to_delayed_work(w),
4186 struct inet6_ifaddr,
4187 dad_work);
1da177e4 4188 struct inet6_dev *idev = ifp->idev;
764d3be6 4189 bool bump_id, disable_ipv6 = false;
1da177e4
LT
4190 struct in6_addr mcaddr;
4191
c15b1cca
HFS
4192 enum {
4193 DAD_PROCESS,
4194 DAD_BEGIN,
4195 DAD_ABORT,
4196 } action = DAD_PROCESS;
4197
4198 rtnl_lock();
4199
8e8e676d 4200 spin_lock_bh(&ifp->lock);
c15b1cca
HFS
4201 if (ifp->state == INET6_IFADDR_STATE_PREDAD) {
4202 action = DAD_BEGIN;
4203 ifp->state = INET6_IFADDR_STATE_DAD;
4204 } else if (ifp->state == INET6_IFADDR_STATE_ERRDAD) {
4205 action = DAD_ABORT;
4206 ifp->state = INET6_IFADDR_STATE_POSTDAD;
85b51b12 4207
35e015e1
MC
4208 if ((dev_net(idev->dev)->ipv6.devconf_all->accept_dad > 1 ||
4209 idev->cnf.accept_dad > 1) &&
4210 !idev->cnf.disable_ipv6 &&
85b51b12
MM
4211 !(ifp->flags & IFA_F_STABLE_PRIVACY)) {
4212 struct in6_addr addr;
4213
4214 addr.s6_addr32[0] = htonl(0xfe800000);
4215 addr.s6_addr32[1] = 0;
4216
4217 if (!ipv6_generate_eui64(addr.s6_addr + 8, idev->dev) &&
4218 ipv6_addr_equal(&ifp->addr, &addr)) {
4219 /* DAD failed for link-local based on MAC */
d289ab65 4220 WRITE_ONCE(idev->cnf.disable_ipv6, 1);
85b51b12
MM
4221
4222 pr_info("%s: IPv6 being disabled!\n",
4223 ifp->idev->dev->name);
4224 disable_ipv6 = true;
4225 }
4226 }
c15b1cca 4227 }
8e8e676d 4228 spin_unlock_bh(&ifp->lock);
c15b1cca
HFS
4229
4230 if (action == DAD_BEGIN) {
4231 addrconf_dad_begin(ifp);
4232 goto out;
4233 } else if (action == DAD_ABORT) {
751eb6b6 4234 in6_ifa_hold(ifp);
c15b1cca 4235 addrconf_dad_stop(ifp, 1);
85b51b12 4236 if (disable_ipv6)
ae79dbf6 4237 addrconf_ifdown(idev->dev, false);
c15b1cca
HFS
4238 goto out;
4239 }
4240
b7b1bfce 4241 if (!ifp->dad_probes && addrconf_dad_end(ifp))
f2344a13
HX
4242 goto out;
4243
c15b1cca 4244 write_lock_bh(&idev->lock);
122e4519 4245 if (idev->dead || !(idev->if_flags & IF_READY)) {
c15b1cca 4246 write_unlock_bh(&idev->lock);
1da177e4
LT
4247 goto out;
4248 }
21809faf 4249
4250 spin_lock(&ifp->lock);
622ccdf1
HX
4251 if (ifp->state == INET6_IFADDR_STATE_DEAD) {
4252 spin_unlock(&ifp->lock);
c15b1cca 4253 write_unlock_bh(&idev->lock);
622ccdf1
HX
4254 goto out;
4255 }
4256
b7b1bfce 4257 if (ifp->dad_probes == 0) {
c76fe2d9
DA
4258 bool send_na = false;
4259
1da177e4
LT
4260 /*
4261 * DAD was successful
4262 */
4263
c76fe2d9
DA
4264 if (ifp->flags & IFA_F_TENTATIVE &&
4265 !(ifp->flags & IFA_F_OPTIMISTIC))
4266 send_na = true;
764d3be6 4267 bump_id = ifp->flags & IFA_F_TENTATIVE;
cc411d0b 4268 ifp->flags &= ~(IFA_F_TENTATIVE|IFA_F_OPTIMISTIC|IFA_F_DADFAILED);
21809faf 4269 spin_unlock(&ifp->lock);
c15b1cca 4270 write_unlock_bh(&idev->lock);
1da177e4 4271
c76fe2d9 4272 addrconf_dad_completed(ifp, bump_id, send_na);
1da177e4
LT
4273
4274 goto out;
4275 }
4276
b7b1bfce 4277 ifp->dad_probes--;
c15b1cca 4278 addrconf_mod_dad_work(ifp,
19e16d22
HL
4279 max(NEIGH_VAR(ifp->idev->nd_parms, RETRANS_TIME),
4280 HZ/100));
21809faf 4281 spin_unlock(&ifp->lock);
c15b1cca 4282 write_unlock_bh(&idev->lock);
1da177e4
LT
4283
4284 /* send a neighbour solicitation for our addr */
1da177e4 4285 addrconf_addr_solict_mult(&ifp->addr, &mcaddr);
adc176c5
EN
4286 ndisc_send_ns(ifp->idev->dev, &ifp->addr, &mcaddr, &in6addr_any,
4287 ifp->dad_nonce);
1da177e4
LT
4288out:
4289 in6_ifa_put(ifp);
c15b1cca 4290 rtnl_unlock();
1da177e4
LT
4291}
4292
11ffff75
HFS
4293/* ifp->idev must be at least read locked */
4294static bool ipv6_lonely_lladdr(struct inet6_ifaddr *ifp)
4295{
4296 struct inet6_ifaddr *ifpiter;
4297 struct inet6_dev *idev = ifp->idev;
4298
602582ca
HFS
4299 list_for_each_entry_reverse(ifpiter, &idev->addr_list, if_list) {
4300 if (ifpiter->scope > IFA_LINK)
4301 break;
11ffff75
HFS
4302 if (ifp != ifpiter && ifpiter->scope == IFA_LINK &&
4303 (ifpiter->flags & (IFA_F_PERMANENT|IFA_F_TENTATIVE|
4304 IFA_F_OPTIMISTIC|IFA_F_DADFAILED)) ==
4305 IFA_F_PERMANENT)
4306 return false;
4307 }
4308 return true;
4309}
4310
c76fe2d9
DA
4311static void addrconf_dad_completed(struct inet6_ifaddr *ifp, bool bump_id,
4312 bool send_na)
1da177e4 4313{
e21e8467 4314 struct net_device *dev = ifp->idev->dev;
b7b1bfce 4315 struct in6_addr lladdr;
b173ee48 4316 bool send_rs, send_mld;
b7b1bfce 4317
c15b1cca 4318 addrconf_del_dad_work(ifp);
1da177e4
LT
4319
4320 /*
4321 * Configure the address for reception. Now it is valid.
4322 */
4323
4324 ipv6_ifa_notify(RTM_NEWADDR, ifp);
4325
026359bc
TA
4326 /* If added prefix is link local and we are prepared to process
4327 router advertisements, start sending router solicitations.
1da177e4
LT
4328 */
4329
1ec047eb 4330 read_lock_bh(&ifp->idev->lock);
11ffff75 4331 send_mld = ifp->scope == IFA_LINK && ipv6_lonely_lladdr(ifp);
b173ee48
HFS
4332 send_rs = send_mld &&
4333 ipv6_accept_ra(ifp->idev) &&
bd11f074 4334 ifp->idev->cnf.rtr_solicits != 0 &&
b52e1cce 4335 (dev->flags & IFF_LOOPBACK) == 0 &&
2df9bf4d
XL
4336 (dev->type != ARPHRD_TUNNEL) &&
4337 !netif_is_team_port(dev);
1ec047eb
HFS
4338 read_unlock_bh(&ifp->idev->lock);
4339
b173ee48
HFS
4340 /* While dad is in progress mld report's source address is in6_addrany.
4341 * Resend with proper ll now.
4342 */
4343 if (send_mld)
4344 ipv6_mc_dad_complete(ifp->idev);
4345
c76fe2d9
DA
4346 /* send unsolicited NA if enabled */
4347 if (send_na &&
4348 (ifp->idev->cnf.ndisc_notify ||
4349 dev_net(dev)->ipv6.devconf_all->ndisc_notify)) {
4350 ndisc_send_na(dev, &in6addr_linklocal_allnodes, &ifp->addr,
4351 /*router=*/ !!ifp->idev->cnf.forwarding,
4352 /*solicited=*/ false, /*override=*/ true,
4353 /*inc_opt=*/ true);
4354 }
4355
1ec047eb 4356 if (send_rs) {
1da177e4
LT
4357 /*
4358 * If a host as already performed a random delay
4359 * [...] as part of DAD [...] there is no need
4360 * to delay again before sending the first RS
4361 */
1ec047eb 4362 if (ipv6_get_lladdr(dev, &lladdr, IFA_F_TENTATIVE))
b7b1bfce 4363 return;
1ec047eb 4364 ndisc_send_rs(dev, &lladdr, &in6addr_linklocal_allrouters);
1da177e4 4365
b7b1bfce
HFS
4366 write_lock_bh(&ifp->idev->lock);
4367 spin_lock(&ifp->lock);
bd11f074
4368 ifp->idev->rs_interval = rfc3315_s14_backoff_init(
4369 ifp->idev->cnf.rtr_solicit_interval);
b7b1bfce 4370 ifp->idev->rs_probes = 1;
1da177e4 4371 ifp->idev->if_flags |= IF_RS_SENT;
bd11f074 4372 addrconf_mod_rs_timer(ifp->idev, ifp->idev->rs_interval);
b7b1bfce
HFS
4373 spin_unlock(&ifp->lock);
4374 write_unlock_bh(&ifp->idev->lock);
1da177e4 4375 }
764d3be6
PA
4376
4377 if (bump_id)
4378 rt_genid_bump_ipv6(dev_net(dev));
a11a7f71
MH
4379
4380 /* Make sure that a new temporary address will be created
4381 * before this temporary address becomes deprecated.
4382 */
4383 if (ifp->flags & IFA_F_TEMPORARY)
8805d13f 4384 addrconf_verify_rtnl(dev_net(dev));
1da177e4
LT
4385}
4386
896585d4 4387static void addrconf_dad_run(struct inet6_dev *idev, bool restart)
e21e8467 4388{
c5e33bdd
YH
4389 struct inet6_ifaddr *ifp;
4390
4391 read_lock_bh(&idev->lock);
502a2ffd 4392 list_for_each_entry(ifp, &idev->addr_list, if_list) {
21809faf 4393 spin_lock(&ifp->lock);
896585d4
HL
4394 if ((ifp->flags & IFA_F_TENTATIVE &&
4395 ifp->state == INET6_IFADDR_STATE_DAD) || restart) {
4396 if (restart)
4397 ifp->state = INET6_IFADDR_STATE_PREDAD;
f2344a13 4398 addrconf_dad_kick(ifp);
896585d4 4399 }
21809faf 4400 spin_unlock(&ifp->lock);
c5e33bdd
YH
4401 }
4402 read_unlock_bh(&idev->lock);
4403}
4404
1da177e4
LT
4405#ifdef CONFIG_PROC_FS
4406struct if6_iter_state {
3c40090a 4407 struct seq_net_private p;
1da177e4 4408 int bucket;
1d578303 4409 int offset;
1da177e4
LT
4410};
4411
1d578303 4412static struct inet6_ifaddr *if6_get_first(struct seq_file *seq, loff_t pos)
1da177e4 4413{
1da177e4 4414 struct if6_iter_state *state = seq->private;
1218854a 4415 struct net *net = seq_file_net(seq);
a5c1d98f 4416 struct inet6_ifaddr *ifa = NULL;
1d578303 4417 int p = 0;
1da177e4 4418
1d578303
MM
4419 /* initial bucket if pos is 0 */
4420 if (pos == 0) {
4421 state->bucket = 0;
4422 state->offset = 0;
4423 }
4424
4425 for (; state->bucket < IN6_ADDR_HSIZE; ++state->bucket) {
e66d1172 4426 hlist_for_each_entry_rcu(ifa, &net->ipv6.inet6_addr_lst[state->bucket],
1d578303
MM
4427 addr_lst) {
4428 /* sync with offset */
4429 if (p < state->offset) {
4430 p++;
4431 continue;
4432 }
9f0d3c27 4433 return ifa;
1d578303
MM
4434 }
4435
4436 /* prepare for next bucket */
4437 state->offset = 0;
4438 p = 0;
1da177e4 4439 }
c2e21293 4440 return NULL;
1da177e4
LT
4441}
4442
c2e21293 4443static struct inet6_ifaddr *if6_get_next(struct seq_file *seq,
4444 struct inet6_ifaddr *ifa)
1da177e4
LT
4445{
4446 struct if6_iter_state *state = seq->private;
1218854a 4447 struct net *net = seq_file_net(seq);
1da177e4 4448
a5c1d98f 4449 hlist_for_each_entry_continue_rcu(ifa, addr_lst) {
1d578303 4450 state->offset++;
9f0d3c27 4451 return ifa;
1d578303 4452 }
3c40090a 4453
86f9bd1f 4454 state->offset = 0;
c2e21293 4455 while (++state->bucket < IN6_ADDR_HSIZE) {
a5c1d98f 4456 hlist_for_each_entry_rcu(ifa,
e66d1172 4457 &net->ipv6.inet6_addr_lst[state->bucket], addr_lst) {
9f0d3c27 4458 return ifa;
c2e21293 4459 }
1da177e4 4460 }
3c40090a 4461
c2e21293 4462 return NULL;
1da177e4
LT
4463}
4464
1da177e4 4465static void *if6_seq_start(struct seq_file *seq, loff_t *pos)
a5c1d98f 4466 __acquires(rcu)
1da177e4 4467{
a5c1d98f 4468 rcu_read_lock();
1d578303 4469 return if6_get_first(seq, *pos);
1da177e4
LT
4470}
4471
4472static void *if6_seq_next(struct seq_file *seq, void *v, loff_t *pos)
4473{
4474 struct inet6_ifaddr *ifa;
4475
4476 ifa = if6_get_next(seq, v);
4477 ++*pos;
4478 return ifa;
4479}
4480
4481static void if6_seq_stop(struct seq_file *seq, void *v)
a5c1d98f 4482 __releases(rcu)
1da177e4 4483{
a5c1d98f 4484 rcu_read_unlock();
1da177e4
LT
4485}
4486
4487static int if6_seq_show(struct seq_file *seq, void *v)
4488{
4489 struct inet6_ifaddr *ifp = (struct inet6_ifaddr *)v;
971a351c 4490 seq_printf(seq, "%pi6 %02x %02x %02x %02x %8s\n",
b071195d 4491 &ifp->addr,
1da177e4
LT
4492 ifp->idev->dev->ifindex,
4493 ifp->prefix_len,
4494 ifp->scope,
971a351c 4495 (u8) ifp->flags,
1da177e4
LT
4496 ifp->idev->dev->name);
4497 return 0;
4498}
4499
56b3d975 4500static const struct seq_operations if6_seq_ops = {
1da177e4
LT
4501 .start = if6_seq_start,
4502 .next = if6_seq_next,
4503 .show = if6_seq_show,
4504 .stop = if6_seq_stop,
4505};
4506
2c8c1e72 4507static int __net_init if6_proc_net_init(struct net *net)
1da177e4 4508{
c3506372
CH
4509 if (!proc_create_net("if_inet6", 0444, net->proc_net, &if6_seq_ops,
4510 sizeof(struct if6_iter_state)))
1da177e4
LT
4511 return -ENOMEM;
4512 return 0;
4513}
4514
2c8c1e72 4515static void __net_exit if6_proc_net_exit(struct net *net)
3c40090a 4516{
ece31ffd 4517 remove_proc_entry("if_inet6", net->proc_net);
3c40090a
DL
4518}
4519
4520static struct pernet_operations if6_proc_net_ops = {
67ba4152
IM
4521 .init = if6_proc_net_init,
4522 .exit = if6_proc_net_exit,
3c40090a
DL
4523};
4524
4525int __init if6_proc_init(void)
4526{
4527 return register_pernet_subsys(&if6_proc_net_ops);
4528}
4529
1da177e4
LT
4530void if6_proc_exit(void)
4531{
3c40090a 4532 unregister_pernet_subsys(&if6_proc_net_ops);
1da177e4
LT
4533}
4534#endif /* CONFIG_PROC_FS */
4535
07a93626 4536#if IS_ENABLED(CONFIG_IPV6_MIP6)
3b9f9a1c 4537/* Check if address is a home address configured on any interface. */
b71d1d42 4538int ipv6_chk_home_addr(struct net *net, const struct in6_addr *addr)
3b9f9a1c 4539{
3f27fb23 4540 unsigned int hash = inet6_addr_hash(net, addr);
c2e21293 4541 struct inet6_ifaddr *ifp = NULL;
3f27fb23 4542 int ret = 0;
c2e21293 4543
4e5f47ab 4544 rcu_read_lock();
e66d1172 4545 hlist_for_each_entry_rcu(ifp, &net->ipv6.inet6_addr_lst[hash], addr_lst) {
caad295f 4546 if (ipv6_addr_equal(&ifp->addr, addr) &&
3b9f9a1c
NT
4547 (ifp->flags & IFA_F_HOMEADDRESS)) {
4548 ret = 1;
4549 break;
4550 }
4551 }
4e5f47ab 4552 rcu_read_unlock();
3b9f9a1c
NT
4553 return ret;
4554}
4555#endif
4556
f37c6059
AA
4557/* RFC6554 has some algorithm to avoid loops in segment routing by
4558 * checking if the segments contains any of a local interface address.
4559 *
4560 * Quote:
4561 *
4562 * To detect loops in the SRH, a router MUST determine if the SRH
4563 * includes multiple addresses assigned to any interface on that router.
4564 * If such addresses appear more than once and are separated by at least
4565 * one address not assigned to that router.
4566 */
4567int ipv6_chk_rpl_srh_loop(struct net *net, const struct in6_addr *segs,
4568 unsigned char nsegs)
4569{
4570 const struct in6_addr *addr;
4571 int i, ret = 0, found = 0;
4572 struct inet6_ifaddr *ifp;
4573 bool separated = false;
4574 unsigned int hash;
4575 bool hash_found;
4576
4577 rcu_read_lock();
4578 for (i = 0; i < nsegs; i++) {
4579 addr = &segs[i];
4580 hash = inet6_addr_hash(net, addr);
4581
4582 hash_found = false;
e66d1172 4583 hlist_for_each_entry_rcu(ifp, &net->ipv6.inet6_addr_lst[hash], addr_lst) {
f37c6059
AA
4584
4585 if (ipv6_addr_equal(&ifp->addr, addr)) {
4586 hash_found = true;
4587 break;
4588 }
4589 }
4590
4591 if (hash_found) {
4592 if (found > 1 && separated) {
4593 ret = 1;
4594 break;
4595 }
4596
4597 separated = false;
4598 found++;
4599 } else {
4600 separated = true;
4601 }
4602 }
4603 rcu_read_unlock();
4604
4605 return ret;
4606}
4607
1da177e4
LT
4608/*
4609 * Periodic address status verification
4610 */
4611
8805d13f 4612static void addrconf_verify_rtnl(struct net *net)
1da177e4 4613{
b2db7564 4614 unsigned long now, next, next_sec, next_sched;
1da177e4 4615 struct inet6_ifaddr *ifp;
1da177e4
LT
4616 int i;
4617
c15b1cca
HFS
4618 ASSERT_RTNL();
4619
5c578aed 4620 rcu_read_lock_bh();
1da177e4 4621 now = jiffies;
b2db7564 4622 next = round_jiffies_up(now + ADDR_CHECK_FREQUENCY);
1da177e4 4623
8805d13f 4624 cancel_delayed_work(&net->ipv6.addr_chk_work);
1da177e4 4625
bcdd553f 4626 for (i = 0; i < IN6_ADDR_HSIZE; i++) {
1da177e4 4627restart:
e66d1172 4628 hlist_for_each_entry_rcu_bh(ifp, &net->ipv6.inet6_addr_lst[i], addr_lst) {
1da177e4 4629 unsigned long age;
1da177e4 4630
fad8da3e
YA
4631 /* When setting preferred_lft to a value not zero or
4632 * infinity, while valid_lft is infinity
4633 * IFA_F_PERMANENT has a non-infinity life time.
4634 */
4635 if ((ifp->flags & IFA_F_PERMANENT) &&
4636 (ifp->prefered_lft == INFINITY_LIFE_TIME))
1da177e4
LT
4637 continue;
4638
4639 spin_lock(&ifp->lock);
b2db7564
YH
4640 /* We try to batch several events at once. */
4641 age = (now - ifp->tstamp + ADDRCONF_TIMER_FUZZ_MINUS) / HZ;
1da177e4 4642
778964f2
SE
4643 if ((ifp->flags&IFA_F_TEMPORARY) &&
4644 !(ifp->flags&IFA_F_TENTATIVE) &&
4645 ifp->prefered_lft != INFINITY_LIFE_TIME &&
4646 !ifp->regen_count && ifp->ifpub) {
4647 /* This is a non-regenerated temporary addr. */
4648
2aa8f155 4649 unsigned long regen_advance = ipv6_get_regen_advance(ifp->idev);
778964f2
SE
4650
4651 if (age + regen_advance >= ifp->prefered_lft) {
4652 struct inet6_ifaddr *ifpub = ifp->ifpub;
4653 if (time_before(ifp->tstamp + ifp->prefered_lft * HZ, next))
4654 next = ifp->tstamp + ifp->prefered_lft * HZ;
4655
4656 ifp->regen_count++;
4657 in6_ifa_hold(ifp);
4658 in6_ifa_hold(ifpub);
4659 spin_unlock(&ifp->lock);
4660
4661 spin_lock(&ifpub->lock);
4662 ifpub->regen_count = 0;
4663 spin_unlock(&ifpub->lock);
4664 rcu_read_unlock_bh();
4665 ipv6_create_tempaddr(ifpub, true);
4666 in6_ifa_put(ifpub);
4667 in6_ifa_put(ifp);
4668 rcu_read_lock_bh();
4669 goto restart;
4670 } else if (time_before(ifp->tstamp + ifp->prefered_lft * HZ - regen_advance * HZ, next))
4671 next = ifp->tstamp + ifp->prefered_lft * HZ - regen_advance * HZ;
4672 }
4673
8f27ebb9
YH
4674 if (ifp->valid_lft != INFINITY_LIFE_TIME &&
4675 age >= ifp->valid_lft) {
1da177e4
LT
4676 spin_unlock(&ifp->lock);
4677 in6_ifa_hold(ifp);
aa8caa76 4678 rcu_read_unlock_bh();
1da177e4 4679 ipv6_del_addr(ifp);
aa8caa76 4680 rcu_read_lock_bh();
1da177e4 4681 goto restart;
8f27ebb9
YH
4682 } else if (ifp->prefered_lft == INFINITY_LIFE_TIME) {
4683 spin_unlock(&ifp->lock);
4684 continue;
1da177e4 4685 } else if (age >= ifp->prefered_lft) {
a1ed0526 4686 /* jiffies - ifp->tstamp > age >= ifp->prefered_lft */
1da177e4
LT
4687 int deprecate = 0;
4688
4689 if (!(ifp->flags&IFA_F_DEPRECATED)) {
4690 deprecate = 1;
4691 ifp->flags |= IFA_F_DEPRECATED;
4692 }
4693
fad8da3e
YA
4694 if ((ifp->valid_lft != INFINITY_LIFE_TIME) &&
4695 (time_before(ifp->tstamp + ifp->valid_lft * HZ, next)))
1da177e4
LT
4696 next = ifp->tstamp + ifp->valid_lft * HZ;
4697
4698 spin_unlock(&ifp->lock);
4699
4700 if (deprecate) {
4701 in6_ifa_hold(ifp);
1da177e4
LT
4702
4703 ipv6_ifa_notify(0, ifp);
4704 in6_ifa_put(ifp);
4705 goto restart;
4706 }
1da177e4
LT
4707 } else {
4708 /* ifp->prefered_lft <= ifp->valid_lft */
4709 if (time_before(ifp->tstamp + ifp->prefered_lft * HZ, next))
4710 next = ifp->tstamp + ifp->prefered_lft * HZ;
4711 spin_unlock(&ifp->lock);
4712 }
4713 }
1da177e4
LT
4714 }
4715
b2db7564
YH
4716 next_sec = round_jiffies_up(next);
4717 next_sched = next;
4718
4719 /* If rounded timeout is accurate enough, accept it. */
4720 if (time_before(next_sec, next + ADDRCONF_TIMER_FUZZ))
4721 next_sched = next_sec;
4722
4723 /* And minimum interval is ADDRCONF_TIMER_FUZZ_MAX. */
4724 if (time_before(next_sched, jiffies + ADDRCONF_TIMER_FUZZ_MAX))
4725 next_sched = jiffies + ADDRCONF_TIMER_FUZZ_MAX;
4726
e32ac250
JP
4727 pr_debug("now = %lu, schedule = %lu, rounded schedule = %lu => %lu\n",
4728 now, next, next_sec, next_sched);
8805d13f 4729 mod_delayed_work(addrconf_wq, &net->ipv6.addr_chk_work, next_sched - now);
5c578aed 4730 rcu_read_unlock_bh();
1da177e4
LT
4731}
4732
c15b1cca
HFS
4733static void addrconf_verify_work(struct work_struct *w)
4734{
8805d13f
ED
4735 struct net *net = container_of(to_delayed_work(w), struct net,
4736 ipv6.addr_chk_work);
4737
c15b1cca 4738 rtnl_lock();
8805d13f 4739 addrconf_verify_rtnl(net);
c15b1cca
HFS
4740 rtnl_unlock();
4741}
4742
8805d13f 4743static void addrconf_verify(struct net *net)
c15b1cca 4744{
8805d13f 4745 mod_delayed_work(addrconf_wq, &net->ipv6.addr_chk_work, 0);
c15b1cca
HFS
4746}
4747
caeaba79
ND
4748static struct in6_addr *extract_addr(struct nlattr *addr, struct nlattr *local,
4749 struct in6_addr **peer_pfx)
461d8837
TG
4750{
4751 struct in6_addr *pfx = NULL;
4752
caeaba79
ND
4753 *peer_pfx = NULL;
4754
461d8837
TG
4755 if (addr)
4756 pfx = nla_data(addr);
4757
4758 if (local) {
4759 if (pfx && nla_memcmp(local, pfx, sizeof(*pfx)))
caeaba79
ND
4760 *peer_pfx = pfx;
4761 pfx = nla_data(local);
461d8837
TG
4762 }
4763
4764 return pfx;
4765}
4766
ef7c79ed 4767static const struct nla_policy ifa_ipv6_policy[IFA_MAX+1] = {
461d8837
TG
4768 [IFA_ADDRESS] = { .len = sizeof(struct in6_addr) },
4769 [IFA_LOCAL] = { .len = sizeof(struct in6_addr) },
4770 [IFA_CACHEINFO] = { .len = sizeof(struct ifa_cacheinfo) },
479840ff 4771 [IFA_FLAGS] = { .len = sizeof(u32) },
8308f3ff 4772 [IFA_RT_PRIORITY] = { .len = sizeof(u32) },
6ecf4c37 4773 [IFA_TARGET_NETNSID] = { .type = NLA_S32 },
47f0bd50 4774 [IFA_PROTO] = { .type = NLA_U8 },
461d8837
TG
4775};
4776
1da177e4 4777static int
c21ef3e3
DA
4778inet6_rtm_deladdr(struct sk_buff *skb, struct nlmsghdr *nlh,
4779 struct netlink_ext_ack *extack)
1da177e4 4780{
3b1e0a65 4781 struct net *net = sock_net(skb->sk);
b933f716
TG
4782 struct ifaddrmsg *ifm;
4783 struct nlattr *tb[IFA_MAX+1];
caeaba79 4784 struct in6_addr *pfx, *peer_pfx;
6046d5b4 4785 u32 ifa_flags;
b933f716 4786 int err;
1da177e4 4787
8cb08174
JB
4788 err = nlmsg_parse_deprecated(nlh, sizeof(*ifm), tb, IFA_MAX,
4789 ifa_ipv6_policy, extack);
b933f716
TG
4790 if (err < 0)
4791 return err;
4792
4793 ifm = nlmsg_data(nlh);
caeaba79 4794 pfx = extract_addr(tb[IFA_ADDRESS], tb[IFA_LOCAL], &peer_pfx);
63159f29 4795 if (!pfx)
1da177e4
LT
4796 return -EINVAL;
4797
6046d5b4
HK
4798 ifa_flags = tb[IFA_FLAGS] ? nla_get_u32(tb[IFA_FLAGS]) : ifm->ifa_flags;
4799
4800 /* We ignore other flags so far. */
4801 ifa_flags &= IFA_F_MANAGETEMPADDR;
4802
4803 return inet6_addr_del(net, ifm->ifa_index, ifa_flags, pfx,
7f6c4039 4804 ifm->ifa_prefixlen, extack);
1da177e4
LT
4805}
4806
8308f3ff 4807static int modify_prefix_route(struct inet6_ifaddr *ifp,
61794012
HL
4808 unsigned long expires, u32 flags,
4809 bool modify_peer)
8308f3ff 4810{
5eb902b8 4811 struct fib6_table *table;
8308f3ff 4812 struct fib6_info *f6i;
e7c7faa9 4813 u32 prio;
8308f3ff 4814
61794012
HL
4815 f6i = addrconf_get_prefix_route(modify_peer ? &ifp->peer_addr : &ifp->addr,
4816 ifp->prefix_len,
2b2450ca 4817 ifp->idev->dev, 0, RTF_DEFAULT, true);
8308f3ff
DA
4818 if (!f6i)
4819 return -ENOENT;
4820
e7c7faa9
DA
4821 prio = ifp->rt_priority ? : IP6_RT_PRIO_ADDRCONF;
4822 if (f6i->fib6_metric != prio) {
4823 /* delete old one */
11dd74b3 4824 ip6_del_rt(dev_net(ifp->idev->dev), f6i, false);
e7c7faa9 4825
8308f3ff 4826 /* add new one */
61794012
HL
4827 addrconf_prefix_route(modify_peer ? &ifp->peer_addr : &ifp->addr,
4828 ifp->prefix_len,
8308f3ff
DA
4829 ifp->rt_priority, ifp->idev->dev,
4830 expires, flags, GFP_KERNEL);
8308f3ff 4831 } else {
5eb902b8
KFL
4832 table = f6i->fib6_table;
4833 spin_lock_bh(&table->tb6_lock);
4834
768e06a8 4835 if (!(flags & RTF_EXPIRES)) {
8308f3ff 4836 fib6_clean_expires(f6i);
5eb902b8
KFL
4837 fib6_remove_gc_list(f6i);
4838 } else {
8308f3ff 4839 fib6_set_expires(f6i, expires);
5eb902b8
KFL
4840 fib6_add_gc_list(f6i);
4841 }
4842
4843 spin_unlock_bh(&table->tb6_lock);
8308f3ff
DA
4844
4845 fib6_info_release(f6i);
4846 }
4847
4848 return 0;
4849}
4850
8805d13f
ED
4851static int inet6_addr_modify(struct net *net, struct inet6_ifaddr *ifp,
4852 struct ifa6_config *cfg)
081bba5b 4853{
6f704992
YH
4854 u32 flags;
4855 clock_t expires;
4bed72e4 4856 unsigned long timeout;
53bd6749 4857 bool was_managetempaddr;
5b84efec 4858 bool had_prefixroute;
d0098e4c 4859 bool new_peer = false;
46d48046 4860
c15b1cca
HFS
4861 ASSERT_RTNL();
4862
d169a1f8 4863 if (!cfg->valid_lft || cfg->preferred_lft > cfg->valid_lft)
081bba5b
NT
4864 return -EINVAL;
4865
d169a1f8 4866 if (cfg->ifa_flags & IFA_F_MANAGETEMPADDR &&
53bd6749
JP
4867 (ifp->flags & IFA_F_TEMPORARY || ifp->prefix_len != 64))
4868 return -EINVAL;
4869
f1c02cfb 4870 if (!(ifp->flags & IFA_F_TENTATIVE) || ifp->flags & IFA_F_DADFAILED)
d169a1f8 4871 cfg->ifa_flags &= ~IFA_F_OPTIMISTIC;
f1c02cfb 4872
d169a1f8 4873 timeout = addrconf_timeout_fixup(cfg->valid_lft, HZ);
4bed72e4
YH
4874 if (addrconf_finite_timeout(timeout)) {
4875 expires = jiffies_to_clock_t(timeout * HZ);
d169a1f8 4876 cfg->valid_lft = timeout;
6f704992 4877 flags = RTF_EXPIRES;
4bed72e4
YH
4878 } else {
4879 expires = 0;
4880 flags = 0;
d169a1f8 4881 cfg->ifa_flags |= IFA_F_PERMANENT;
6f704992 4882 }
081bba5b 4883
d169a1f8 4884 timeout = addrconf_timeout_fixup(cfg->preferred_lft, HZ);
4bed72e4
YH
4885 if (addrconf_finite_timeout(timeout)) {
4886 if (timeout == 0)
d169a1f8
DA
4887 cfg->ifa_flags |= IFA_F_DEPRECATED;
4888 cfg->preferred_lft = timeout;
4bed72e4 4889 }
081bba5b 4890
d0098e4c
HL
4891 if (cfg->peer_pfx &&
4892 memcmp(&ifp->peer_addr, cfg->peer_pfx, sizeof(struct in6_addr))) {
4893 if (!ipv6_addr_any(&ifp->peer_addr))
4894 cleanup_prefix_route(ifp, expires, true, true);
4895 new_peer = true;
4896 }
4897
081bba5b 4898 spin_lock_bh(&ifp->lock);
53bd6749 4899 was_managetempaddr = ifp->flags & IFA_F_MANAGETEMPADDR;
5b84efec
TH
4900 had_prefixroute = ifp->flags & IFA_F_PERMANENT &&
4901 !(ifp->flags & IFA_F_NOPREFIXROUTE);
53bd6749 4902 ifp->flags &= ~(IFA_F_DEPRECATED | IFA_F_PERMANENT | IFA_F_NODAD |
761aac73
TH
4903 IFA_F_HOMEADDRESS | IFA_F_MANAGETEMPADDR |
4904 IFA_F_NOPREFIXROUTE);
d169a1f8 4905 ifp->flags |= cfg->ifa_flags;
081bba5b 4906 ifp->tstamp = jiffies;
d169a1f8
DA
4907 ifp->valid_lft = cfg->valid_lft;
4908 ifp->prefered_lft = cfg->preferred_lft;
47f0bd50 4909 ifp->ifa_proto = cfg->ifa_proto;
081bba5b 4910
8308f3ff
DA
4911 if (cfg->rt_priority && cfg->rt_priority != ifp->rt_priority)
4912 ifp->rt_priority = cfg->rt_priority;
081bba5b 4913
d0098e4c
HL
4914 if (new_peer)
4915 ifp->peer_addr = *cfg->peer_pfx;
4916
081bba5b
NT
4917 spin_unlock_bh(&ifp->lock);
4918 if (!(ifp->flags&IFA_F_TENTATIVE))
4919 ipv6_ifa_notify(0, ifp);
081bba5b 4920
d169a1f8 4921 if (!(cfg->ifa_flags & IFA_F_NOPREFIXROUTE)) {
8308f3ff
DA
4922 int rc = -ENOENT;
4923
4924 if (had_prefixroute)
61794012 4925 rc = modify_prefix_route(ifp, expires, flags, false);
8308f3ff
DA
4926
4927 /* prefix route could have been deleted; if so restore it */
4928 if (rc == -ENOENT) {
4929 addrconf_prefix_route(&ifp->addr, ifp->prefix_len,
4930 ifp->rt_priority, ifp->idev->dev,
4931 expires, flags, GFP_KERNEL);
4932 }
61794012
HL
4933
4934 if (had_prefixroute && !ipv6_addr_any(&ifp->peer_addr))
4935 rc = modify_prefix_route(ifp, expires, flags, true);
4936
4937 if (rc == -ENOENT && !ipv6_addr_any(&ifp->peer_addr)) {
4938 addrconf_prefix_route(&ifp->peer_addr, ifp->prefix_len,
4939 ifp->rt_priority, ifp->idev->dev,
4940 expires, flags, GFP_KERNEL);
4941 }
5b84efec
TH
4942 } else if (had_prefixroute) {
4943 enum cleanup_prefix_rt_t action;
4944 unsigned long rt_expires;
4945
4946 write_lock_bh(&ifp->idev->lock);
4947 action = check_cleanup_prefix_route(ifp, &rt_expires);
4948 write_unlock_bh(&ifp->idev->lock);
4949
4950 if (action != CLEANUP_PREFIX_RT_NOP) {
4951 cleanup_prefix_route(ifp, rt_expires,
d0098e4c 4952 action == CLEANUP_PREFIX_RT_DEL, false);
5b84efec 4953 }
761aac73 4954 }
53bd6749
JP
4955
4956 if (was_managetempaddr || ifp->flags & IFA_F_MANAGETEMPADDR) {
d169a1f8
DA
4957 if (was_managetempaddr &&
4958 !(ifp->flags & IFA_F_MANAGETEMPADDR)) {
4959 cfg->valid_lft = 0;
4960 cfg->preferred_lft = 0;
4961 }
4962 manage_tempaddrs(ifp->idev, ifp, cfg->valid_lft,
4963 cfg->preferred_lft, !was_managetempaddr,
4964 jiffies);
53bd6749
JP
4965 }
4966
8805d13f 4967 addrconf_verify_rtnl(net);
081bba5b
NT
4968
4969 return 0;
4970}
4971
1da177e4 4972static int
c21ef3e3
DA
4973inet6_rtm_newaddr(struct sk_buff *skb, struct nlmsghdr *nlh,
4974 struct netlink_ext_ack *extack)
1da177e4 4975{
3b1e0a65 4976 struct net *net = sock_net(skb->sk);
461d8837
TG
4977 struct ifaddrmsg *ifm;
4978 struct nlattr *tb[IFA_MAX+1];
19b1518c 4979 struct in6_addr *peer_pfx;
7198f8ce
TG
4980 struct inet6_ifaddr *ifa;
4981 struct net_device *dev;
f1c02cfb 4982 struct inet6_dev *idev;
19b1518c 4983 struct ifa6_config cfg;
461d8837 4984 int err;
1da177e4 4985
8cb08174
JB
4986 err = nlmsg_parse_deprecated(nlh, sizeof(*ifm), tb, IFA_MAX,
4987 ifa_ipv6_policy, extack);
461d8837
TG
4988 if (err < 0)
4989 return err;
4990
19b1518c
DA
4991 memset(&cfg, 0, sizeof(cfg));
4992
461d8837 4993 ifm = nlmsg_data(nlh);
19b1518c
DA
4994 cfg.pfx = extract_addr(tb[IFA_ADDRESS], tb[IFA_LOCAL], &peer_pfx);
4995 if (!cfg.pfx)
1da177e4
LT
4996 return -EINVAL;
4997
19b1518c
DA
4998 cfg.peer_pfx = peer_pfx;
4999 cfg.plen = ifm->ifa_prefixlen;
8308f3ff
DA
5000 if (tb[IFA_RT_PRIORITY])
5001 cfg.rt_priority = nla_get_u32(tb[IFA_RT_PRIORITY]);
5002
47f0bd50
JL
5003 if (tb[IFA_PROTO])
5004 cfg.ifa_proto = nla_get_u8(tb[IFA_PROTO]);
5005
19b1518c
DA
5006 cfg.valid_lft = INFINITY_LIFE_TIME;
5007 cfg.preferred_lft = INFINITY_LIFE_TIME;
5008
461d8837 5009 if (tb[IFA_CACHEINFO]) {
0778769d 5010 struct ifa_cacheinfo *ci;
461d8837
TG
5011
5012 ci = nla_data(tb[IFA_CACHEINFO]);
19b1518c
DA
5013 cfg.valid_lft = ci->ifa_valid;
5014 cfg.preferred_lft = ci->ifa_prefered;
0778769d
NT
5015 }
5016
af284937 5017 dev = __dev_get_by_index(net, ifm->ifa_index);
7f6c4039
HL
5018 if (!dev) {
5019 NL_SET_ERR_MSG_MOD(extack, "Unable to find the interface");
7198f8ce 5020 return -ENODEV;
7f6c4039 5021 }
7198f8ce 5022
19b1518c
DA
5023 if (tb[IFA_FLAGS])
5024 cfg.ifa_flags = nla_get_u32(tb[IFA_FLAGS]);
5025 else
5026 cfg.ifa_flags = ifm->ifa_flags;
479840ff 5027
55ebaef1 5028 /* We ignore other flags so far. */
19b1518c
DA
5029 cfg.ifa_flags &= IFA_F_NODAD | IFA_F_HOMEADDRESS |
5030 IFA_F_MANAGETEMPADDR | IFA_F_NOPREFIXROUTE |
5031 IFA_F_MCAUTOJOIN | IFA_F_OPTIMISTIC;
f1c02cfb
SD
5032
5033 idev = ipv6_find_idev(dev);
db0b99f5
SD
5034 if (IS_ERR(idev))
5035 return PTR_ERR(idev);
f1c02cfb
SD
5036
5037 if (!ipv6_allow_optimistic_dad(net, idev))
19b1518c 5038 cfg.ifa_flags &= ~IFA_F_OPTIMISTIC;
f1c02cfb 5039
19b1518c
DA
5040 if (cfg.ifa_flags & IFA_F_NODAD &&
5041 cfg.ifa_flags & IFA_F_OPTIMISTIC) {
f1c02cfb
SD
5042 NL_SET_ERR_MSG(extack, "IFA_F_NODAD and IFA_F_OPTIMISTIC are mutually exclusive");
5043 return -EINVAL;
5044 }
55ebaef1 5045
19b1518c 5046 ifa = ipv6_get_ifaddr(net, cfg.pfx, dev, 1);
63159f29 5047 if (!ifa) {
7198f8ce
TG
5048 /*
5049 * It would be best to check for !NLM_F_CREATE here but
db9c7c39 5050 * userspace already relies on not having to provide this.
7198f8ce 5051 */
19b1518c 5052 return inet6_addr_add(net, ifm->ifa_index, &cfg, extack);
081bba5b
NT
5053 }
5054
7198f8ce 5055 if (nlh->nlmsg_flags & NLM_F_EXCL ||
7f6c4039
HL
5056 !(nlh->nlmsg_flags & NLM_F_REPLACE)) {
5057 NL_SET_ERR_MSG_MOD(extack, "address already assigned");
7198f8ce 5058 err = -EEXIST;
7f6c4039 5059 } else {
8805d13f 5060 err = inet6_addr_modify(net, ifa, &cfg);
7f6c4039 5061 }
7198f8ce
TG
5062
5063 in6_ifa_put(ifa);
5064
5065 return err;
1da177e4
LT
5066}
5067
479840ff 5068static void put_ifaddrmsg(struct nlmsghdr *nlh, u8 prefixlen, u32 flags,
101bb229
TG
5069 u8 scope, int ifindex)
5070{
5071 struct ifaddrmsg *ifm;
5072
5073 ifm = nlmsg_data(nlh);
5074 ifm->ifa_family = AF_INET6;
5075 ifm->ifa_prefixlen = prefixlen;
5076 ifm->ifa_flags = flags;
5077 ifm->ifa_scope = scope;
5078 ifm->ifa_index = ifindex;
5079}
5080
85486af0
TG
5081static int put_cacheinfo(struct sk_buff *skb, unsigned long cstamp,
5082 unsigned long tstamp, u32 preferred, u32 valid)
5083{
5084 struct ifa_cacheinfo ci;
5085
18a31e1e
TG
5086 ci.cstamp = cstamp_delta(cstamp);
5087 ci.tstamp = cstamp_delta(tstamp);
85486af0
TG
5088 ci.ifa_prefered = preferred;
5089 ci.ifa_valid = valid;
5090
5091 return nla_put(skb, IFA_CACHEINFO, sizeof(ci), &ci);
5092}
5093
101bb229
TG
5094static inline int rt_scope(int ifa_scope)
5095{
5096 if (ifa_scope & IFA_HOST)
5097 return RT_SCOPE_HOST;
5098 else if (ifa_scope & IFA_LINK)
5099 return RT_SCOPE_LINK;
5100 else if (ifa_scope & IFA_SITE)
5101 return RT_SCOPE_SITE;
5102 else
5103 return RT_SCOPE_UNIVERSE;
5104}
5105
0ab6803b
TG
5106static inline int inet6_ifaddr_msgsize(void)
5107{
339bf98f 5108 return NLMSG_ALIGN(sizeof(struct ifaddrmsg))
caeaba79 5109 + nla_total_size(16) /* IFA_LOCAL */
339bf98f 5110 + nla_total_size(16) /* IFA_ADDRESS */
479840ff 5111 + nla_total_size(sizeof(struct ifa_cacheinfo))
8308f3ff 5112 + nla_total_size(4) /* IFA_FLAGS */
47f0bd50 5113 + nla_total_size(1) /* IFA_PROTO */
8308f3ff 5114 + nla_total_size(4) /* IFA_RT_PRIORITY */;
0ab6803b 5115}
c5396a31 5116
6ba1e6e8
DA
5117enum addr_type_t {
5118 UNICAST_ADDR,
5119 MULTICAST_ADDR,
5120 ANYCAST_ADDR,
5121};
5122
203651b6
CB
5123struct inet6_fill_args {
5124 u32 portid;
5125 u32 seq;
5126 int event;
5127 unsigned int flags;
5128 int netnsid;
6371a71f 5129 int ifindex;
6ba1e6e8 5130 enum addr_type_t type;
203651b6
CB
5131};
5132
1da177e4 5133static int inet6_fill_ifaddr(struct sk_buff *skb, struct inet6_ifaddr *ifa,
203651b6 5134 struct inet6_fill_args *args)
1da177e4 5135{
1da177e4 5136 struct nlmsghdr *nlh;
85486af0 5137 u32 preferred, valid;
1da177e4 5138
203651b6
CB
5139 nlh = nlmsg_put(skb, args->portid, args->seq, args->event,
5140 sizeof(struct ifaddrmsg), args->flags);
63159f29 5141 if (!nlh)
26932566 5142 return -EMSGSIZE;
0ab6803b 5143
101bb229
TG
5144 put_ifaddrmsg(nlh, ifa->prefix_len, ifa->flags, rt_scope(ifa->scope),
5145 ifa->idev->dev->ifindex);
5146
203651b6
CB
5147 if (args->netnsid >= 0 &&
5148 nla_put_s32(skb, IFA_TARGET_NETNSID, args->netnsid))
6ecf4c37
CB
5149 goto error;
5150
6c0d8833 5151 spin_lock_bh(&ifa->lock);
fad8da3e
YA
5152 if (!((ifa->flags&IFA_F_PERMANENT) &&
5153 (ifa->prefered_lft == INFINITY_LIFE_TIME))) {
85486af0
TG
5154 preferred = ifa->prefered_lft;
5155 valid = ifa->valid_lft;
5156 if (preferred != INFINITY_LIFE_TIME) {
1da177e4 5157 long tval = (jiffies - ifa->tstamp)/HZ;
a1faa698
JR
5158 if (preferred > tval)
5159 preferred -= tval;
5160 else
5161 preferred = 0;
f56619fc
BH
5162 if (valid != INFINITY_LIFE_TIME) {
5163 if (valid > tval)
5164 valid -= tval;
5165 else
5166 valid = 0;
5167 }
1da177e4
LT
5168 }
5169 } else {
85486af0
TG
5170 preferred = INFINITY_LIFE_TIME;
5171 valid = INFINITY_LIFE_TIME;
5172 }
6c0d8833 5173 spin_unlock_bh(&ifa->lock);
85486af0 5174
7996c799 5175 if (!ipv6_addr_any(&ifa->peer_addr)) {
930345ea
JB
5176 if (nla_put_in6_addr(skb, IFA_LOCAL, &ifa->addr) < 0 ||
5177 nla_put_in6_addr(skb, IFA_ADDRESS, &ifa->peer_addr) < 0)
caeaba79
ND
5178 goto error;
5179 } else
930345ea 5180 if (nla_put_in6_addr(skb, IFA_ADDRESS, &ifa->addr) < 0)
caeaba79
ND
5181 goto error;
5182
8308f3ff
DA
5183 if (ifa->rt_priority &&
5184 nla_put_u32(skb, IFA_RT_PRIORITY, ifa->rt_priority))
5185 goto error;
5186
caeaba79
ND
5187 if (put_cacheinfo(skb, ifa->cstamp, ifa->tstamp, preferred, valid) < 0)
5188 goto error;
1da177e4 5189
479840ff
JP
5190 if (nla_put_u32(skb, IFA_FLAGS, ifa->flags) < 0)
5191 goto error;
5192
47f0bd50
JL
5193 if (ifa->ifa_proto &&
5194 nla_put_u8(skb, IFA_PROTO, ifa->ifa_proto))
5195 goto error;
5196
053c095a
JB
5197 nlmsg_end(skb, nlh);
5198 return 0;
caeaba79
ND
5199
5200error:
5201 nlmsg_cancel(skb, nlh);
5202 return -EMSGSIZE;
1da177e4
LT
5203}
5204
5205static int inet6_fill_ifmcaddr(struct sk_buff *skb, struct ifmcaddr6 *ifmca,
203651b6 5206 struct inet6_fill_args *args)
1da177e4 5207{
1da177e4 5208 struct nlmsghdr *nlh;
101bb229
TG
5209 u8 scope = RT_SCOPE_UNIVERSE;
5210 int ifindex = ifmca->idev->dev->ifindex;
5211
5212 if (ipv6_addr_scope(&ifmca->mca_addr) & IFA_SITE)
5213 scope = RT_SCOPE_SITE;
1da177e4 5214
203651b6
CB
5215 nlh = nlmsg_put(skb, args->portid, args->seq, args->event,
5216 sizeof(struct ifaddrmsg), args->flags);
63159f29 5217 if (!nlh)
26932566 5218 return -EMSGSIZE;
85486af0 5219
203651b6 5220 if (args->netnsid >= 0 &&
ceb736e1
ZQ
5221 nla_put_s32(skb, IFA_TARGET_NETNSID, args->netnsid)) {
5222 nlmsg_cancel(skb, nlh);
6ecf4c37 5223 return -EMSGSIZE;
ceb736e1 5224 }
6ecf4c37 5225
0ab6803b 5226 put_ifaddrmsg(nlh, 128, IFA_F_PERMANENT, scope, ifindex);
930345ea 5227 if (nla_put_in6_addr(skb, IFA_MULTICAST, &ifmca->mca_addr) < 0 ||
0ab6803b 5228 put_cacheinfo(skb, ifmca->mca_cstamp, ifmca->mca_tstamp,
26932566
PM
5229 INFINITY_LIFE_TIME, INFINITY_LIFE_TIME) < 0) {
5230 nlmsg_cancel(skb, nlh);
5231 return -EMSGSIZE;
5232 }
85486af0 5233
053c095a
JB
5234 nlmsg_end(skb, nlh);
5235 return 0;
1da177e4
LT
5236}
5237
5238static int inet6_fill_ifacaddr(struct sk_buff *skb, struct ifacaddr6 *ifaca,
203651b6 5239 struct inet6_fill_args *args)
1da177e4 5240{
9ee8cbb2
DA
5241 struct net_device *dev = fib6_info_nh_dev(ifaca->aca_rt);
5242 int ifindex = dev ? dev->ifindex : 1;
1da177e4 5243 struct nlmsghdr *nlh;
101bb229 5244 u8 scope = RT_SCOPE_UNIVERSE;
101bb229
TG
5245
5246 if (ipv6_addr_scope(&ifaca->aca_addr) & IFA_SITE)
5247 scope = RT_SCOPE_SITE;
1da177e4 5248
203651b6
CB
5249 nlh = nlmsg_put(skb, args->portid, args->seq, args->event,
5250 sizeof(struct ifaddrmsg), args->flags);
63159f29 5251 if (!nlh)
26932566 5252 return -EMSGSIZE;
85486af0 5253
203651b6 5254 if (args->netnsid >= 0 &&
ceb736e1
ZQ
5255 nla_put_s32(skb, IFA_TARGET_NETNSID, args->netnsid)) {
5256 nlmsg_cancel(skb, nlh);
6ecf4c37 5257 return -EMSGSIZE;
ceb736e1 5258 }
6ecf4c37 5259
0ab6803b 5260 put_ifaddrmsg(nlh, 128, IFA_F_PERMANENT, scope, ifindex);
930345ea 5261 if (nla_put_in6_addr(skb, IFA_ANYCAST, &ifaca->aca_addr) < 0 ||
0ab6803b 5262 put_cacheinfo(skb, ifaca->aca_cstamp, ifaca->aca_tstamp,
26932566
PM
5263 INFINITY_LIFE_TIME, INFINITY_LIFE_TIME) < 0) {
5264 nlmsg_cancel(skb, nlh);
5265 return -EMSGSIZE;
5266 }
1da177e4 5267
053c095a
JB
5268 nlmsg_end(skb, nlh);
5269 return 0;
1da177e4
LT
5270}
5271
234b27c3
ED
5272/* called with rcu_read_lock() */
5273static int in6_dump_addrs(struct inet6_dev *idev, struct sk_buff *skb,
fe884c2b 5274 struct netlink_callback *cb, int s_ip_idx,
6ba1e6e8 5275 struct inet6_fill_args *fillargs)
234b27c3 5276{
234b27c3
ED
5277 struct ifmcaddr6 *ifmca;
5278 struct ifacaddr6 *ifaca;
fe884c2b 5279 int ip_idx = 0;
234b27c3 5280 int err = 1;
234b27c3
ED
5281
5282 read_lock_bh(&idev->lock);
6ba1e6e8 5283 switch (fillargs->type) {
502a2ffd 5284 case UNICAST_ADDR: {
5285 struct inet6_ifaddr *ifa;
6ba1e6e8 5286 fillargs->event = RTM_NEWADDR;
502a2ffd 5287
234b27c3 5288 /* unicast address incl. temp addr */
502a2ffd 5289 list_for_each_entry(ifa, &idev->addr_list, if_list) {
4ba4c566
DA
5290 if (ip_idx < s_ip_idx)
5291 goto next;
6ba1e6e8 5292 err = inet6_fill_ifaddr(skb, ifa, fillargs);
053c095a 5293 if (err < 0)
234b27c3 5294 break;
63998ac2 5295 nl_dump_check_consistent(cb, nlmsg_hdr(skb));
4ba4c566
DA
5296next:
5297 ip_idx++;
234b27c3
ED
5298 }
5299 break;
502a2ffd 5300 }
234b27c3 5301 case MULTICAST_ADDR:
88e2ca30 5302 read_unlock_bh(&idev->lock);
6ba1e6e8 5303 fillargs->event = RTM_GETMULTICAST;
203651b6 5304
234b27c3 5305 /* multicast address */
67ea41d1 5306 for (ifmca = rcu_dereference(idev->mc_list);
88e2ca30 5307 ifmca;
67ea41d1 5308 ifmca = rcu_dereference(ifmca->next), ip_idx++) {
234b27c3
ED
5309 if (ip_idx < s_ip_idx)
5310 continue;
6ba1e6e8 5311 err = inet6_fill_ifmcaddr(skb, ifmca, fillargs);
053c095a 5312 if (err < 0)
234b27c3
ED
5313 break;
5314 }
88e2ca30 5315 read_lock_bh(&idev->lock);
234b27c3
ED
5316 break;
5317 case ANYCAST_ADDR:
6ba1e6e8 5318 fillargs->event = RTM_GETANYCAST;
234b27c3 5319 /* anycast address */
c3718936
ED
5320 for (ifaca = rcu_dereference(idev->ac_list); ifaca;
5321 ifaca = rcu_dereference(ifaca->aca_next), ip_idx++) {
234b27c3
ED
5322 if (ip_idx < s_ip_idx)
5323 continue;
6ba1e6e8 5324 err = inet6_fill_ifacaddr(skb, ifaca, fillargs);
053c095a 5325 if (err < 0)
234b27c3
ED
5326 break;
5327 }
5328 break;
5329 default:
5330 break;
5331 }
5332 read_unlock_bh(&idev->lock);
fe884c2b 5333 cb->args[2] = ip_idx;
234b27c3
ED
5334 return err;
5335}
5336
ed6eff11
DA
5337static int inet6_valid_dump_ifaddr_req(const struct nlmsghdr *nlh,
5338 struct inet6_fill_args *fillargs,
5339 struct net **tgt_net, struct sock *sk,
6371a71f 5340 struct netlink_callback *cb)
ed6eff11 5341{
6371a71f 5342 struct netlink_ext_ack *extack = cb->extack;
ed6eff11
DA
5343 struct nlattr *tb[IFA_MAX+1];
5344 struct ifaddrmsg *ifm;
5345 int err, i;
5346
5347 if (nlh->nlmsg_len < nlmsg_msg_size(sizeof(*ifm))) {
5348 NL_SET_ERR_MSG_MOD(extack, "Invalid header for address dump request");
5349 return -EINVAL;
5350 }
5351
5352 ifm = nlmsg_data(nlh);
5353 if (ifm->ifa_prefixlen || ifm->ifa_flags || ifm->ifa_scope) {
5354 NL_SET_ERR_MSG_MOD(extack, "Invalid values in header for address dump request");
5355 return -EINVAL;
5356 }
6371a71f
DA
5357
5358 fillargs->ifindex = ifm->ifa_index;
5359 if (fillargs->ifindex) {
5360 cb->answer_flags |= NLM_F_DUMP_FILTERED;
5361 fillargs->flags |= NLM_F_DUMP_FILTERED;
ed6eff11
DA
5362 }
5363
8cb08174
JB
5364 err = nlmsg_parse_deprecated_strict(nlh, sizeof(*ifm), tb, IFA_MAX,
5365 ifa_ipv6_policy, extack);
ed6eff11
DA
5366 if (err < 0)
5367 return err;
5368
5369 for (i = 0; i <= IFA_MAX; ++i) {
5370 if (!tb[i])
5371 continue;
5372
5373 if (i == IFA_TARGET_NETNSID) {
5374 struct net *net;
5375
5376 fillargs->netnsid = nla_get_s32(tb[i]);
5377 net = rtnl_get_net_ns_capable(sk, fillargs->netnsid);
5378 if (IS_ERR(net)) {
bf4cc40e 5379 fillargs->netnsid = -1;
ed6eff11
DA
5380 NL_SET_ERR_MSG_MOD(extack, "Invalid target network namespace id");
5381 return PTR_ERR(net);
5382 }
5383 *tgt_net = net;
5384 } else {
5385 NL_SET_ERR_MSG_MOD(extack, "Unsupported attribute in dump request");
5386 return -EINVAL;
5387 }
5388 }
5389
5390 return 0;
5391}
5392
1da177e4
LT
5393static int inet6_dump_addr(struct sk_buff *skb, struct netlink_callback *cb,
5394 enum addr_type_t type)
5395{
ed6eff11 5396 const struct nlmsghdr *nlh = cb->nlh;
6ba1e6e8
DA
5397 struct inet6_fill_args fillargs = {
5398 .portid = NETLINK_CB(cb->skb).portid,
5399 .seq = cb->nlh->nlmsg_seq,
5400 .flags = NLM_F_MULTI,
5401 .netnsid = -1,
5402 .type = type,
5403 };
87117baf 5404 struct net *tgt_net = sock_net(skb->sk);
fe884c2b 5405 int idx, s_idx, s_ip_idx;
234b27c3 5406 int h, s_h;
1da177e4 5407 struct net_device *dev;
234b27c3
ED
5408 struct inet6_dev *idev;
5409 struct hlist_head *head;
242afaa6 5410 int err = 0;
1ab1457c 5411
234b27c3
ED
5412 s_h = cb->args[0];
5413 s_idx = idx = cb->args[1];
fe884c2b 5414 s_ip_idx = cb->args[2];
5d5619b4 5415
67ea41d1 5416 rcu_read_lock();
ed6eff11 5417 if (cb->strict_check) {
ed6eff11 5418 err = inet6_valid_dump_ifaddr_req(nlh, &fillargs, &tgt_net,
6371a71f 5419 skb->sk, cb);
ed6eff11 5420 if (err < 0)
242afaa6 5421 goto put_tgt_net;
6371a71f 5422
242afaa6 5423 err = 0;
6371a71f
DA
5424 if (fillargs.ifindex) {
5425 dev = __dev_get_by_index(tgt_net, fillargs.ifindex);
242afaa6
DA
5426 if (!dev) {
5427 err = -ENODEV;
5428 goto put_tgt_net;
5429 }
6371a71f
DA
5430 idev = __in6_dev_get(dev);
5431 if (idev) {
5432 err = in6_dump_addrs(idev, skb, cb, s_ip_idx,
5433 &fillargs);
1518039f
JK
5434 if (err > 0)
5435 err = 0;
6371a71f
DA
5436 }
5437 goto put_tgt_net;
5438 }
6ecf4c37
CB
5439 }
5440
e898e4cd 5441 cb->seq = inet6_base_seq(tgt_net);
234b27c3
ED
5442 for (h = s_h; h < NETDEV_HASHENTRIES; h++, s_idx = 0) {
5443 idx = 0;
6ecf4c37 5444 head = &tgt_net->dev_index_head[h];
b67bfe0d 5445 hlist_for_each_entry_rcu(dev, head, index_hlist) {
234b27c3
ED
5446 if (idx < s_idx)
5447 goto cont;
4b97efdf 5448 if (h > s_h || idx > s_idx)
234b27c3 5449 s_ip_idx = 0;
e21e8467
SH
5450 idev = __in6_dev_get(dev);
5451 if (!idev)
234b27c3
ED
5452 goto cont;
5453
fe884c2b 5454 if (in6_dump_addrs(idev, skb, cb, s_ip_idx,
6ba1e6e8 5455 &fillargs) < 0)
234b27c3 5456 goto done;
7562f876 5457cont:
234b27c3
ED
5458 idx++;
5459 }
1da177e4 5460 }
234b27c3 5461done:
234b27c3
ED
5462 cb->args[0] = h;
5463 cb->args[1] = idx;
6371a71f 5464put_tgt_net:
67ea41d1 5465 rcu_read_unlock();
6ba1e6e8 5466 if (fillargs.netnsid >= 0)
6ecf4c37 5467 put_net(tgt_net);
234b27c3 5468
7c1e8a38 5469 return skb->len ? : err;
1da177e4
LT
5470}
5471
5472static int inet6_dump_ifaddr(struct sk_buff *skb, struct netlink_callback *cb)
5473{
5474 enum addr_type_t type = UNICAST_ADDR;
b854272b 5475
1da177e4
LT
5476 return inet6_dump_addr(skb, cb, type);
5477}
5478
5479static int inet6_dump_ifmcaddr(struct sk_buff *skb, struct netlink_callback *cb)
5480{
5481 enum addr_type_t type = MULTICAST_ADDR;
b854272b 5482
1da177e4
LT
5483 return inet6_dump_addr(skb, cb, type);
5484}
5485
5486
5487static int inet6_dump_ifacaddr(struct sk_buff *skb, struct netlink_callback *cb)
5488{
5489 enum addr_type_t type = ANYCAST_ADDR;
b854272b 5490
1da177e4
LT
5491 return inet6_dump_addr(skb, cb, type);
5492}
5493
4b1373de
JK
5494static int inet6_rtm_valid_getaddr_req(struct sk_buff *skb,
5495 const struct nlmsghdr *nlh,
5496 struct nlattr **tb,
5497 struct netlink_ext_ack *extack)
5498{
5499 struct ifaddrmsg *ifm;
5500 int i, err;
5501
5502 if (nlh->nlmsg_len < nlmsg_msg_size(sizeof(*ifm))) {
5503 NL_SET_ERR_MSG_MOD(extack, "Invalid header for get address request");
5504 return -EINVAL;
5505 }
5506
2beb6d29
HL
5507 if (!netlink_strict_get_check(skb))
5508 return nlmsg_parse_deprecated(nlh, sizeof(*ifm), tb, IFA_MAX,
5509 ifa_ipv6_policy, extack);
5510
4b1373de
JK
5511 ifm = nlmsg_data(nlh);
5512 if (ifm->ifa_prefixlen || ifm->ifa_flags || ifm->ifa_scope) {
5513 NL_SET_ERR_MSG_MOD(extack, "Invalid values in header for get address request");
5514 return -EINVAL;
5515 }
5516
8cb08174
JB
5517 err = nlmsg_parse_deprecated_strict(nlh, sizeof(*ifm), tb, IFA_MAX,
5518 ifa_ipv6_policy, extack);
4b1373de
JK
5519 if (err)
5520 return err;
5521
5522 for (i = 0; i <= IFA_MAX; i++) {
5523 if (!tb[i])
5524 continue;
5525
5526 switch (i) {
5527 case IFA_TARGET_NETNSID:
5528 case IFA_ADDRESS:
5529 case IFA_LOCAL:
5530 break;
5531 default:
5532 NL_SET_ERR_MSG_MOD(extack, "Unsupported attribute in get address request");
5533 return -EINVAL;
5534 }
5535 }
5536
5537 return 0;
5538}
5539
c21ef3e3
DA
5540static int inet6_rtm_getaddr(struct sk_buff *in_skb, struct nlmsghdr *nlh,
5541 struct netlink_ext_ack *extack)
6c223828 5542{
87117baf 5543 struct net *tgt_net = sock_net(in_skb->sk);
203651b6
CB
5544 struct inet6_fill_args fillargs = {
5545 .portid = NETLINK_CB(in_skb).portid,
5546 .seq = nlh->nlmsg_seq,
5547 .event = RTM_NEWADDR,
5548 .flags = 0,
5549 .netnsid = -1,
5550 };
1b29fc2c
TG
5551 struct ifaddrmsg *ifm;
5552 struct nlattr *tb[IFA_MAX+1];
caeaba79 5553 struct in6_addr *addr = NULL, *peer;
6c223828
NT
5554 struct net_device *dev = NULL;
5555 struct inet6_ifaddr *ifa;
5556 struct sk_buff *skb;
6c223828
NT
5557 int err;
5558
4b1373de 5559 err = inet6_rtm_valid_getaddr_req(in_skb, nlh, tb, extack);
1b29fc2c 5560 if (err < 0)
c24675f8 5561 return err;
1b29fc2c 5562
6ecf4c37 5563 if (tb[IFA_TARGET_NETNSID]) {
203651b6 5564 fillargs.netnsid = nla_get_s32(tb[IFA_TARGET_NETNSID]);
6ecf4c37
CB
5565
5566 tgt_net = rtnl_get_net_ns_capable(NETLINK_CB(in_skb).sk,
203651b6 5567 fillargs.netnsid);
6ecf4c37
CB
5568 if (IS_ERR(tgt_net))
5569 return PTR_ERR(tgt_net);
5570 }
5571
caeaba79 5572 addr = extract_addr(tb[IFA_ADDRESS], tb[IFA_LOCAL], &peer);
10bfd453
ED
5573 if (!addr) {
5574 err = -EINVAL;
5575 goto errout;
5576 }
1b29fc2c 5577 ifm = nlmsg_data(nlh);
6c223828 5578 if (ifm->ifa_index)
6ecf4c37 5579 dev = dev_get_by_index(tgt_net, ifm->ifa_index);
6c223828 5580
6ecf4c37 5581 ifa = ipv6_get_ifaddr(tgt_net, addr, dev, 1);
e21e8467 5582 if (!ifa) {
1b29fc2c
TG
5583 err = -EADDRNOTAVAIL;
5584 goto errout;
5585 }
6c223828 5586
e21e8467
SH
5587 skb = nlmsg_new(inet6_ifaddr_msgsize(), GFP_KERNEL);
5588 if (!skb) {
6c223828 5589 err = -ENOBUFS;
1b29fc2c 5590 goto errout_ifa;
6c223828
NT
5591 }
5592
203651b6 5593 err = inet6_fill_ifaddr(skb, ifa, &fillargs);
26932566
PM
5594 if (err < 0) {
5595 /* -EMSGSIZE implies BUG in inet6_ifaddr_msgsize() */
5596 WARN_ON(err == -EMSGSIZE);
5597 kfree_skb(skb);
5598 goto errout_ifa;
5599 }
6ecf4c37 5600 err = rtnl_unicast(skb, tgt_net, NETLINK_CB(in_skb).portid);
1b29fc2c 5601errout_ifa:
6c223828 5602 in6_ifa_put(ifa);
1b29fc2c 5603errout:
1160dfa1 5604 dev_put(dev);
203651b6 5605 if (fillargs.netnsid >= 0)
6ecf4c37
CB
5606 put_net(tgt_net);
5607
6c223828 5608 return err;
6c223828
NT
5609}
5610
1da177e4
LT
5611static void inet6_ifa_notify(int event, struct inet6_ifaddr *ifa)
5612{
5613 struct sk_buff *skb;
c346dca1 5614 struct net *net = dev_net(ifa->idev->dev);
203651b6
CB
5615 struct inet6_fill_args fillargs = {
5616 .portid = 0,
5617 .seq = 0,
5618 .event = event,
5619 .flags = 0,
5620 .netnsid = -1,
5621 };
5d620266 5622 int err = -ENOBUFS;
1da177e4 5623
0ab6803b 5624 skb = nlmsg_new(inet6_ifaddr_msgsize(), GFP_ATOMIC);
63159f29 5625 if (!skb)
5d620266
TG
5626 goto errout;
5627
203651b6 5628 err = inet6_fill_ifaddr(skb, ifa, &fillargs);
26932566
PM
5629 if (err < 0) {
5630 /* -EMSGSIZE implies BUG in inet6_ifaddr_msgsize() */
5631 WARN_ON(err == -EMSGSIZE);
5632 kfree_skb(skb);
5633 goto errout;
5634 }
1ce85fe4
PNA
5635 rtnl_notify(skb, net, 0, RTNLGRP_IPV6_IFADDR, NULL, GFP_ATOMIC);
5636 return;
5d620266
TG
5637errout:
5638 if (err < 0)
6fda7350 5639 rtnl_set_sk_err(net, RTNLGRP_IPV6_IFADDR, err);
1da177e4
LT
5640}
5641
4ad26813
ED
5642static void ipv6_store_devconf(const struct ipv6_devconf *cnf,
5643 __s32 *array, int bytes)
1da177e4 5644{
04561c1f
TG
5645 BUG_ON(bytes < (DEVCONF_MAX * 4));
5646
1da177e4 5647 memset(array, 0, bytes);
4ad26813
ED
5648 array[DEVCONF_FORWARDING] = READ_ONCE(cnf->forwarding);
5649 array[DEVCONF_HOPLIMIT] = READ_ONCE(cnf->hop_limit);
5650 array[DEVCONF_MTU6] = READ_ONCE(cnf->mtu6);
5651 array[DEVCONF_ACCEPT_RA] = READ_ONCE(cnf->accept_ra);
5652 array[DEVCONF_ACCEPT_REDIRECTS] = READ_ONCE(cnf->accept_redirects);
5653 array[DEVCONF_AUTOCONF] = READ_ONCE(cnf->autoconf);
5654 array[DEVCONF_DAD_TRANSMITS] = READ_ONCE(cnf->dad_transmits);
5655 array[DEVCONF_RTR_SOLICITS] = READ_ONCE(cnf->rtr_solicits);
93908d19 5656 array[DEVCONF_RTR_SOLICIT_INTERVAL] =
4ad26813 5657 jiffies_to_msecs(READ_ONCE(cnf->rtr_solicit_interval));
bd11f074 5658 array[DEVCONF_RTR_SOLICIT_MAX_INTERVAL] =
4ad26813 5659 jiffies_to_msecs(READ_ONCE(cnf->rtr_solicit_max_interval));
93908d19 5660 array[DEVCONF_RTR_SOLICIT_DELAY] =
4ad26813
ED
5661 jiffies_to_msecs(READ_ONCE(cnf->rtr_solicit_delay));
5662 array[DEVCONF_FORCE_MLD_VERSION] = READ_ONCE(cnf->force_mld_version);
fc4eba58 5663 array[DEVCONF_MLDV1_UNSOLICITED_REPORT_INTERVAL] =
4ad26813 5664 jiffies_to_msecs(READ_ONCE(cnf->mldv1_unsolicited_report_interval));
fc4eba58 5665 array[DEVCONF_MLDV2_UNSOLICITED_REPORT_INTERVAL] =
4ad26813
ED
5666 jiffies_to_msecs(READ_ONCE(cnf->mldv2_unsolicited_report_interval));
5667 array[DEVCONF_USE_TEMPADDR] = READ_ONCE(cnf->use_tempaddr);
5668 array[DEVCONF_TEMP_VALID_LFT] = READ_ONCE(cnf->temp_valid_lft);
5669 array[DEVCONF_TEMP_PREFERED_LFT] = READ_ONCE(cnf->temp_prefered_lft);
5670 array[DEVCONF_REGEN_MAX_RETRY] = READ_ONCE(cnf->regen_max_retry);
5671 array[DEVCONF_MAX_DESYNC_FACTOR] = READ_ONCE(cnf->max_desync_factor);
5672 array[DEVCONF_MAX_ADDRESSES] = READ_ONCE(cnf->max_addresses);
5673 array[DEVCONF_ACCEPT_RA_DEFRTR] = READ_ONCE(cnf->accept_ra_defrtr);
5674 array[DEVCONF_RA_DEFRTR_METRIC] = READ_ONCE(cnf->ra_defrtr_metric);
5675 array[DEVCONF_ACCEPT_RA_MIN_HOP_LIMIT] =
5676 READ_ONCE(cnf->accept_ra_min_hop_limit);
5677 array[DEVCONF_ACCEPT_RA_PINFO] = READ_ONCE(cnf->accept_ra_pinfo);
930d6ff2 5678#ifdef CONFIG_IPV6_ROUTER_PREF
4ad26813 5679 array[DEVCONF_ACCEPT_RA_RTR_PREF] = READ_ONCE(cnf->accept_ra_rtr_pref);
93908d19 5680 array[DEVCONF_RTR_PROBE_INTERVAL] =
4ad26813 5681 jiffies_to_msecs(READ_ONCE(cnf->rtr_probe_interval));
fa03ef38 5682#ifdef CONFIG_IPV6_ROUTE_INFO
4ad26813
ED
5683 array[DEVCONF_ACCEPT_RA_RT_INFO_MIN_PLEN] =
5684 READ_ONCE(cnf->accept_ra_rt_info_min_plen);
5685 array[DEVCONF_ACCEPT_RA_RT_INFO_MAX_PLEN] =
5686 READ_ONCE(cnf->accept_ra_rt_info_max_plen);
09c884d4 5687#endif
930d6ff2 5688#endif
4ad26813
ED
5689 array[DEVCONF_PROXY_NDP] = READ_ONCE(cnf->proxy_ndp);
5690 array[DEVCONF_ACCEPT_SOURCE_ROUTE] =
5691 READ_ONCE(cnf->accept_source_route);
95c385b4 5692#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
4ad26813
ED
5693 array[DEVCONF_OPTIMISTIC_DAD] = READ_ONCE(cnf->optimistic_dad);
5694 array[DEVCONF_USE_OPTIMISTIC] = READ_ONCE(cnf->use_optimistic);
95c385b4 5695#endif
7bc570c8 5696#ifdef CONFIG_IPV6_MROUTE
145c7a79 5697 array[DEVCONF_MC_FORWARDING] = atomic_read(&cnf->mc_forwarding);
7bc570c8 5698#endif
4ad26813
ED
5699 array[DEVCONF_DISABLE_IPV6] = READ_ONCE(cnf->disable_ipv6);
5700 array[DEVCONF_ACCEPT_DAD] = READ_ONCE(cnf->accept_dad);
5701 array[DEVCONF_FORCE_TLLAO] = READ_ONCE(cnf->force_tllao);
5702 array[DEVCONF_NDISC_NOTIFY] = READ_ONCE(cnf->ndisc_notify);
5703 array[DEVCONF_SUPPRESS_FRAG_NDISC] =
5704 READ_ONCE(cnf->suppress_frag_ndisc);
5705 array[DEVCONF_ACCEPT_RA_FROM_LOCAL] =
5706 READ_ONCE(cnf->accept_ra_from_local);
5707 array[DEVCONF_ACCEPT_RA_MTU] = READ_ONCE(cnf->accept_ra_mtu);
5708 array[DEVCONF_IGNORE_ROUTES_WITH_LINKDOWN] =
5709 READ_ONCE(cnf->ignore_routes_with_linkdown);
3d1bec99 5710 /* we omit DEVCONF_STABLE_SECRET for now */
4ad26813
ED
5711 array[DEVCONF_USE_OIF_ADDRS_ONLY] = READ_ONCE(cnf->use_oif_addrs_only);
5712 array[DEVCONF_DROP_UNICAST_IN_L2_MULTICAST] =
5713 READ_ONCE(cnf->drop_unicast_in_l2_multicast);
5714 array[DEVCONF_DROP_UNSOLICITED_NA] = READ_ONCE(cnf->drop_unsolicited_na);
5715 array[DEVCONF_KEEP_ADDR_ON_DOWN] = READ_ONCE(cnf->keep_addr_on_down);
5716 array[DEVCONF_SEG6_ENABLED] = READ_ONCE(cnf->seg6_enabled);
bf355b8d 5717#ifdef CONFIG_IPV6_SEG6_HMAC
4ad26813 5718 array[DEVCONF_SEG6_REQUIRE_HMAC] = READ_ONCE(cnf->seg6_require_hmac);
bf355b8d 5719#endif
4ad26813
ED
5720 array[DEVCONF_ENHANCED_DAD] = READ_ONCE(cnf->enhanced_dad);
5721 array[DEVCONF_ADDR_GEN_MODE] = READ_ONCE(cnf->addr_gen_mode);
5722 array[DEVCONF_DISABLE_POLICY] = READ_ONCE(cnf->disable_policy);
5723 array[DEVCONF_NDISC_TCLASS] = READ_ONCE(cnf->ndisc_tclass);
5724 array[DEVCONF_RPL_SEG_ENABLED] = READ_ONCE(cnf->rpl_seg_enabled);
5725 array[DEVCONF_IOAM6_ENABLED] = READ_ONCE(cnf->ioam6_enabled);
5726 array[DEVCONF_IOAM6_ID] = READ_ONCE(cnf->ioam6_id);
5727 array[DEVCONF_IOAM6_ID_WIDE] = READ_ONCE(cnf->ioam6_id_wide);
5728 array[DEVCONF_NDISC_EVICT_NOCARRIER] =
5729 READ_ONCE(cnf->ndisc_evict_nocarrier);
5730 array[DEVCONF_ACCEPT_UNTRACKED_NA] =
5731 READ_ONCE(cnf->accept_untracked_na);
5732 array[DEVCONF_ACCEPT_RA_MIN_LFT] = READ_ONCE(cnf->accept_ra_min_lft);
1da177e4
LT
5733}
5734
b382b191
TG
5735static inline size_t inet6_ifla6_size(void)
5736{
5737 return nla_total_size(4) /* IFLA_INET6_FLAGS */
5738 + nla_total_size(sizeof(struct ifla_cacheinfo))
5739 + nla_total_size(DEVCONF_MAX * 4) /* IFLA_INET6_CONF */
5740 + nla_total_size(IPSTATS_MIB_MAX * 8) /* IFLA_INET6_STATS */
f53adae4 5741 + nla_total_size(ICMP6_MIB_MAX * 8) /* IFLA_INET6_ICMP6STATS */
bdd72f41
SD
5742 + nla_total_size(sizeof(struct in6_addr)) /* IFLA_INET6_TOKEN */
5743 + nla_total_size(1) /* IFLA_INET6_ADDR_GEN_MODE */
49b99da2 5744 + nla_total_size(4) /* IFLA_INET6_RA_MTU */
bdd72f41 5745 + 0;
b382b191
TG
5746}
5747
339bf98f
TG
5748static inline size_t inet6_if_nlmsg_size(void)
5749{
5750 return NLMSG_ALIGN(sizeof(struct ifinfomsg))
5751 + nla_total_size(IFNAMSIZ) /* IFLA_IFNAME */
5752 + nla_total_size(MAX_ADDR_LEN) /* IFLA_ADDRESS */
5753 + nla_total_size(4) /* IFLA_MTU */
5754 + nla_total_size(4) /* IFLA_LINK */
0344338b 5755 + nla_total_size(1) /* IFLA_OPERSTATE */
b382b191 5756 + nla_total_size(inet6_ifla6_size()); /* IFLA_PROTINFO */
339bf98f 5757}
c5396a31 5758
be281e55 5759static inline void __snmp6_fill_statsdev(u64 *stats, atomic_long_t *mib,
aca05671 5760 int bytes)
7f7d9a6b
HX
5761{
5762 int i;
aca05671 5763 int pad = bytes - sizeof(u64) * ICMP6_MIB_MAX;
7f7d9a6b
HX
5764 BUG_ON(pad < 0);
5765
5766 /* Use put_unaligned() because stats may not be aligned for u64. */
aca05671
JH
5767 put_unaligned(ICMP6_MIB_MAX, &stats[0]);
5768 for (i = 1; i < ICMP6_MIB_MAX; i++)
be281e55 5769 put_unaligned(atomic_long_read(&mib[i]), &stats[i]);
7f7d9a6b 5770
aca05671 5771 memset(&stats[ICMP6_MIB_MAX], 0, pad);
7f7d9a6b
HX
5772}
5773
698365fa 5774static inline void __snmp6_fill_stats64(u64 *stats, void __percpu *mib,
a3a77372 5775 int bytes, size_t syncpoff)
4ce3c183 5776{
a3a77372
R
5777 int i, c;
5778 u64 buff[IPSTATS_MIB_MAX];
5779 int pad = bytes - sizeof(u64) * IPSTATS_MIB_MAX;
5780
4ce3c183
ED
5781 BUG_ON(pad < 0);
5782
a3a77372
R
5783 memset(buff, 0, sizeof(buff));
5784 buff[0] = IPSTATS_MIB_MAX;
4ce3c183 5785
a3a77372
R
5786 for_each_possible_cpu(c) {
5787 for (i = 1; i < IPSTATS_MIB_MAX; i++)
5788 buff[i] += snmp_get_cpu_field64(mib, c, i, syncpoff);
5789 }
5790
5791 memcpy(stats, buff, IPSTATS_MIB_MAX * sizeof(u64));
5792 memset(&stats[IPSTATS_MIB_MAX], 0, pad);
4ce3c183
ED
5793}
5794
7f7d9a6b
HX
5795static void snmp6_fill_stats(u64 *stats, struct inet6_dev *idev, int attrtype,
5796 int bytes)
5797{
e21e8467 5798 switch (attrtype) {
7f7d9a6b 5799 case IFLA_INET6_STATS:
a3a77372
R
5800 __snmp6_fill_stats64(stats, idev->stats.ipv6, bytes,
5801 offsetof(struct ipstats_mib, syncp));
7f7d9a6b
HX
5802 break;
5803 case IFLA_INET6_ICMP6STATS:
aca05671 5804 __snmp6_fill_statsdev(stats, idev->stats.icmpv6dev->mibs, bytes);
7f7d9a6b
HX
5805 break;
5806 }
5807}
5808
d5566fd7
SV
5809static int inet6_fill_ifla6_attrs(struct sk_buff *skb, struct inet6_dev *idev,
5810 u32 ext_filter_mask)
b382b191 5811{
b382b191 5812 struct ifla_cacheinfo ci;
4ad26813
ED
5813 struct nlattr *nla;
5814 u32 ra_mtu;
b382b191 5815
4ad26813 5816 if (nla_put_u32(skb, IFLA_INET6_FLAGS, READ_ONCE(idev->if_flags)))
c78679e8 5817 goto nla_put_failure;
b382b191 5818 ci.max_reasm_len = IPV6_MAXPLEN;
4ad26813 5819 ci.tstamp = cstamp_delta(READ_ONCE(idev->tstamp));
24912420 5820 ci.reachable_time = jiffies_to_msecs(idev->nd_parms->reachable_time);
1f9248e5 5821 ci.retrans_time = jiffies_to_msecs(NEIGH_VAR(idev->nd_parms, RETRANS_TIME));
c78679e8
DM
5822 if (nla_put(skb, IFLA_INET6_CACHEINFO, sizeof(ci), &ci))
5823 goto nla_put_failure;
b382b191 5824 nla = nla_reserve(skb, IFLA_INET6_CONF, DEVCONF_MAX * sizeof(s32));
63159f29 5825 if (!nla)
b382b191
TG
5826 goto nla_put_failure;
5827 ipv6_store_devconf(&idev->cnf, nla_data(nla), nla_len(nla));
5828
5829 /* XXX - MC not implemented */
5830
d5566fd7
SV
5831 if (ext_filter_mask & RTEXT_FILTER_SKIP_STATS)
5832 return 0;
5833
b382b191 5834 nla = nla_reserve(skb, IFLA_INET6_STATS, IPSTATS_MIB_MAX * sizeof(u64));
63159f29 5835 if (!nla)
b382b191
TG
5836 goto nla_put_failure;
5837 snmp6_fill_stats(nla_data(nla), idev, IFLA_INET6_STATS, nla_len(nla));
5838
5839 nla = nla_reserve(skb, IFLA_INET6_ICMP6STATS, ICMP6_MIB_MAX * sizeof(u64));
63159f29 5840 if (!nla)
b382b191
TG
5841 goto nla_put_failure;
5842 snmp6_fill_stats(nla_data(nla), idev, IFLA_INET6_ICMP6STATS, nla_len(nla));
5843
f53adae4 5844 nla = nla_reserve(skb, IFLA_INET6_TOKEN, sizeof(struct in6_addr));
63159f29 5845 if (!nla)
f53adae4
DB
5846 goto nla_put_failure;
5847 read_lock_bh(&idev->lock);
5848 memcpy(nla_data(nla), idev->token.s6_addr, nla_len(nla));
5849 read_unlock_bh(&idev->lock);
5850
4ad26813
ED
5851 if (nla_put_u8(skb, IFLA_INET6_ADDR_GEN_MODE,
5852 READ_ONCE(idev->cnf.addr_gen_mode)))
0d7982ce
ND
5853 goto nla_put_failure;
5854
4ad26813
ED
5855 ra_mtu = READ_ONCE(idev->ra_mtu);
5856 if (ra_mtu && nla_put_u32(skb, IFLA_INET6_RA_MTU, ra_mtu))
49b99da2
RY
5857 goto nla_put_failure;
5858
b382b191
TG
5859 return 0;
5860
5861nla_put_failure:
5862 return -EMSGSIZE;
5863}
5864
b1974ed0
AR
5865static size_t inet6_get_link_af_size(const struct net_device *dev,
5866 u32 ext_filter_mask)
b382b191
TG
5867{
5868 if (!__in6_dev_get(dev))
5869 return 0;
5870
5871 return inet6_ifla6_size();
5872}
5873
d5566fd7
SV
5874static int inet6_fill_link_af(struct sk_buff *skb, const struct net_device *dev,
5875 u32 ext_filter_mask)
b382b191
TG
5876{
5877 struct inet6_dev *idev = __in6_dev_get(dev);
5878
5879 if (!idev)
5880 return -ENODATA;
5881
d5566fd7 5882 if (inet6_fill_ifla6_attrs(skb, idev, ext_filter_mask) < 0)
b382b191
TG
5883 return -EMSGSIZE;
5884
5885 return 0;
5886}
5887
3583a4e8
SH
5888static int inet6_set_iftoken(struct inet6_dev *idev, struct in6_addr *token,
5889 struct netlink_ext_ack *extack)
f53adae4 5890{
f53adae4
DB
5891 struct inet6_ifaddr *ifp;
5892 struct net_device *dev = idev->dev;
47e27d5e 5893 bool clear_token, update_rs = false;
dc848292 5894 struct in6_addr ll_addr;
f53adae4 5895
c15b1cca
HFS
5896 ASSERT_RTNL();
5897
63159f29 5898 if (!token)
f53adae4 5899 return -EINVAL;
3583a4e8
SH
5900
5901 if (dev->flags & IFF_LOOPBACK) {
5902 NL_SET_ERR_MSG_MOD(extack, "Device is loopback");
f53adae4 5903 return -EINVAL;
3583a4e8
SH
5904 }
5905
5906 if (dev->flags & IFF_NOARP) {
5907 NL_SET_ERR_MSG_MOD(extack,
5908 "Device does not do neighbour discovery");
5909 return -EINVAL;
5910 }
5911
5912 if (!ipv6_accept_ra(idev)) {
5913 NL_SET_ERR_MSG_MOD(extack,
5914 "Router advertisement is disabled on device");
f53adae4 5915 return -EINVAL;
3583a4e8
SH
5916 }
5917
5918 if (idev->cnf.rtr_solicits == 0) {
5919 NL_SET_ERR_MSG(extack,
5920 "Router solicitation is disabled on device");
f53adae4 5921 return -EINVAL;
3583a4e8 5922 }
f53adae4
DB
5923
5924 write_lock_bh(&idev->lock);
5925
5926 BUILD_BUG_ON(sizeof(token->s6_addr) != 16);
5927 memcpy(idev->token.s6_addr + 8, token->s6_addr + 8, 8);
5928
5929 write_unlock_bh(&idev->lock);
5930
47e27d5e
DB
5931 clear_token = ipv6_addr_any(token);
5932 if (clear_token)
5933 goto update_lft;
5934
dc848292
HFS
5935 if (!idev->dead && (idev->if_flags & IF_READY) &&
5936 !ipv6_get_lladdr(dev, &ll_addr, IFA_F_TENTATIVE |
5937 IFA_F_OPTIMISTIC)) {
fc403832
DB
5938 /* If we're not ready, then normal ifup will take care
5939 * of this. Otherwise, we need to request our rs here.
5940 */
5941 ndisc_send_rs(dev, &ll_addr, &in6addr_linklocal_allrouters);
5942 update_rs = true;
5943 }
f53adae4 5944
47e27d5e 5945update_lft:
f53adae4 5946 write_lock_bh(&idev->lock);
fc403832 5947
77ecaace 5948 if (update_rs) {
fc403832 5949 idev->if_flags |= IF_RS_SENT;
bd11f074
5950 idev->rs_interval = rfc3315_s14_backoff_init(
5951 idev->cnf.rtr_solicit_interval);
77ecaace 5952 idev->rs_probes = 1;
bd11f074 5953 addrconf_mod_rs_timer(idev, idev->rs_interval);
77ecaace 5954 }
f53adae4
DB
5955
5956 /* Well, that's kinda nasty ... */
5957 list_for_each_entry(ifp, &idev->addr_list, if_list) {
5958 spin_lock(&ifp->lock);
617fe29d 5959 if (ifp->tokenized) {
f53adae4
DB
5960 ifp->valid_lft = 0;
5961 ifp->prefered_lft = 0;
5962 }
5963 spin_unlock(&ifp->lock);
5964 }
5965
5966 write_unlock_bh(&idev->lock);
b2ed64a9 5967 inet6_ifinfo_notify(RTM_NEWLINK, idev);
8805d13f 5968 addrconf_verify_rtnl(dev_net(dev));
f53adae4
DB
5969 return 0;
5970}
5971
11b1f828
DB
5972static const struct nla_policy inet6_af_policy[IFLA_INET6_MAX + 1] = {
5973 [IFLA_INET6_ADDR_GEN_MODE] = { .type = NLA_U8 },
5974 [IFLA_INET6_TOKEN] = { .len = sizeof(struct in6_addr) },
49b99da2
RY
5975 [IFLA_INET6_RA_MTU] = { .type = NLA_REJECT,
5976 .reject_message =
5977 "IFLA_INET6_RA_MTU can not be set" },
11b1f828
DB
5978};
5979
d35a00b8
FJ
5980static int check_addr_gen_mode(int mode)
5981{
5982 if (mode != IN6_ADDR_GEN_MODE_EUI64 &&
5983 mode != IN6_ADDR_GEN_MODE_NONE &&
5984 mode != IN6_ADDR_GEN_MODE_STABLE_PRIVACY &&
5985 mode != IN6_ADDR_GEN_MODE_RANDOM)
5986 return -EINVAL;
5987 return 1;
5988}
5989
5990static int check_stable_privacy(struct inet6_dev *idev, struct net *net,
5991 int mode)
5992{
5993 if (mode == IN6_ADDR_GEN_MODE_STABLE_PRIVACY &&
5994 !idev->cnf.stable_secret.initialized &&
5995 !net->ipv6.devconf_dflt->stable_secret.initialized)
5996 return -EINVAL;
5997 return 1;
5998}
5999
7dc2bcca 6000static int inet6_validate_link_af(const struct net_device *dev,
8679c31e
RY
6001 const struct nlattr *nla,
6002 struct netlink_ext_ack *extack)
7dc2bcca
MM
6003{
6004 struct nlattr *tb[IFLA_INET6_MAX + 1];
6005 struct inet6_dev *idev = NULL;
6006 int err;
6007
6008 if (dev) {
6009 idev = __in6_dev_get(dev);
6010 if (!idev)
6011 return -EAFNOSUPPORT;
6012 }
6013
6014 err = nla_parse_nested_deprecated(tb, IFLA_INET6_MAX, nla,
8679c31e 6015 inet6_af_policy, extack);
7dc2bcca
MM
6016 if (err)
6017 return err;
6018
6019 if (!tb[IFLA_INET6_TOKEN] && !tb[IFLA_INET6_ADDR_GEN_MODE])
6020 return -EINVAL;
6021
6022 if (tb[IFLA_INET6_ADDR_GEN_MODE]) {
6023 u8 mode = nla_get_u8(tb[IFLA_INET6_ADDR_GEN_MODE]);
6024
6025 if (check_addr_gen_mode(mode) < 0)
6026 return -EINVAL;
6027 if (dev && check_stable_privacy(idev, dev_net(dev), mode) < 0)
6028 return -EINVAL;
6029 }
6030
6031 return 0;
6032}
6033
3583a4e8
SH
6034static int inet6_set_link_af(struct net_device *dev, const struct nlattr *nla,
6035 struct netlink_ext_ack *extack)
f53adae4 6036{
f53adae4
DB
6037 struct inet6_dev *idev = __in6_dev_get(dev);
6038 struct nlattr *tb[IFLA_INET6_MAX + 1];
7dc2bcca 6039 int err;
f53adae4 6040
db3fa271
ED
6041 if (!idev)
6042 return -EAFNOSUPPORT;
6043
8cb08174 6044 if (nla_parse_nested_deprecated(tb, IFLA_INET6_MAX, nla, NULL, NULL) < 0)
5ac6b198 6045 return -EINVAL;
f53adae4 6046
bc91b0f0 6047 if (tb[IFLA_INET6_TOKEN]) {
3583a4e8
SH
6048 err = inet6_set_iftoken(idev, nla_data(tb[IFLA_INET6_TOKEN]),
6049 extack);
bc91b0f0
JP
6050 if (err)
6051 return err;
6052 }
6053
6054 if (tb[IFLA_INET6_ADDR_GEN_MODE]) {
6055 u8 mode = nla_get_u8(tb[IFLA_INET6_ADDR_GEN_MODE]);
6056
4ad26813 6057 WRITE_ONCE(idev->cnf.addr_gen_mode, mode);
bc91b0f0 6058 }
f53adae4 6059
7dc2bcca 6060 return 0;
f53adae4
DB
6061}
6062
1ab1457c 6063static int inet6_fill_ifinfo(struct sk_buff *skb, struct inet6_dev *idev,
15e47304 6064 u32 portid, u32 seq, int event, unsigned int flags)
1da177e4 6065{
04561c1f 6066 struct net_device *dev = idev->dev;
04561c1f
TG
6067 struct ifinfomsg *hdr;
6068 struct nlmsghdr *nlh;
8afc7a78 6069 int ifindex, iflink;
04561c1f 6070 void *protoinfo;
04561c1f 6071
15e47304 6072 nlh = nlmsg_put(skb, portid, seq, event, sizeof(*hdr), flags);
63159f29 6073 if (!nlh)
26932566 6074 return -EMSGSIZE;
04561c1f
TG
6075
6076 hdr = nlmsg_data(nlh);
6077 hdr->ifi_family = AF_INET6;
6078 hdr->__ifi_pad = 0;
6079 hdr->ifi_type = dev->type;
8afc7a78
ED
6080 ifindex = READ_ONCE(dev->ifindex);
6081 hdr->ifi_index = ifindex;
04561c1f
TG
6082 hdr->ifi_flags = dev_get_flags(dev);
6083 hdr->ifi_change = 0;
6084
8afc7a78 6085 iflink = dev_get_iflink(dev);
c78679e8
DM
6086 if (nla_put_string(skb, IFLA_IFNAME, dev->name) ||
6087 (dev->addr_len &&
6088 nla_put(skb, IFLA_ADDRESS, dev->addr_len, dev->dev_addr)) ||
8afc7a78
ED
6089 nla_put_u32(skb, IFLA_MTU, READ_ONCE(dev->mtu)) ||
6090 (ifindex != iflink &&
6091 nla_put_u32(skb, IFLA_LINK, iflink)) ||
0344338b 6092 nla_put_u8(skb, IFLA_OPERSTATE,
004d1383 6093 netif_running(dev) ? READ_ONCE(dev->operstate) : IF_OPER_DOWN))
c78679e8 6094 goto nla_put_failure;
ae0be8de 6095 protoinfo = nla_nest_start_noflag(skb, IFLA_PROTINFO);
63159f29 6096 if (!protoinfo)
04561c1f 6097 goto nla_put_failure;
1da177e4 6098
d5566fd7 6099 if (inet6_fill_ifla6_attrs(skb, idev, 0) < 0)
bf99f1bd 6100 goto nla_put_failure;
1da177e4 6101
04561c1f 6102 nla_nest_end(skb, protoinfo);
053c095a
JB
6103 nlmsg_end(skb, nlh);
6104 return 0;
1da177e4 6105
04561c1f 6106nla_put_failure:
26932566
PM
6107 nlmsg_cancel(skb, nlh);
6108 return -EMSGSIZE;
1da177e4
LT
6109}
6110
786e0007
DA
6111static int inet6_valid_dump_ifinfo(const struct nlmsghdr *nlh,
6112 struct netlink_ext_ack *extack)
6113{
6114 struct ifinfomsg *ifm;
6115
6116 if (nlh->nlmsg_len < nlmsg_msg_size(sizeof(*ifm))) {
6117 NL_SET_ERR_MSG_MOD(extack, "Invalid header for link dump request");
6118 return -EINVAL;
6119 }
6120
6121 if (nlmsg_attrlen(nlh, sizeof(*ifm))) {
6122 NL_SET_ERR_MSG_MOD(extack, "Invalid data after header");
6123 return -EINVAL;
6124 }
6125
6126 ifm = nlmsg_data(nlh);
6127 if (ifm->__ifi_pad || ifm->ifi_type || ifm->ifi_flags ||
6128 ifm->ifi_change || ifm->ifi_index) {
6129 NL_SET_ERR_MSG_MOD(extack, "Invalid values in header for dump request");
6130 return -EINVAL;
6131 }
6132
6133 return 0;
6134}
6135
1da177e4
LT
6136static int inet6_dump_ifinfo(struct sk_buff *skb, struct netlink_callback *cb)
6137{
3b1e0a65 6138 struct net *net = sock_net(skb->sk);
ac14ad97
ED
6139 struct {
6140 unsigned long ifindex;
6141 } *ctx = (void *)cb->ctx;
1da177e4
LT
6142 struct net_device *dev;
6143 struct inet6_dev *idev;
ac14ad97 6144 int err;
1da177e4 6145
786e0007
DA
6146 /* only requests using strict checking can pass data to
6147 * influence the dump
6148 */
6149 if (cb->strict_check) {
ac14ad97 6150 err = inet6_valid_dump_ifinfo(cb->nlh, cb->extack);
786e0007
DA
6151
6152 if (err < 0)
6153 return err;
6154 }
6155
ac14ad97 6156 err = 0;
84d2697d 6157 rcu_read_lock();
ac14ad97
ED
6158 for_each_netdev_dump(net, dev, ctx->ifindex) {
6159 idev = __in6_dev_get(dev);
6160 if (!idev)
6161 continue;
6162 err = inet6_fill_ifinfo(skb, idev,
6163 NETLINK_CB(cb->skb).portid,
6164 cb->nlh->nlmsg_seq,
6165 RTM_NEWLINK, NLM_F_MULTI);
6166 if (err < 0) {
6167 if (likely(skb->len))
6168 err = skb->len;
6169 break;
84d2697d 6170 }
1da177e4 6171 }
84d2697d 6172 rcu_read_unlock();
1da177e4 6173
ac14ad97 6174 return err;
1da177e4
LT
6175}
6176
6177void inet6_ifinfo_notify(int event, struct inet6_dev *idev)
6178{
6179 struct sk_buff *skb;
c346dca1 6180 struct net *net = dev_net(idev->dev);
8d7a76c9 6181 int err = -ENOBUFS;
1ab1457c 6182
339bf98f 6183 skb = nlmsg_new(inet6_if_nlmsg_size(), GFP_ATOMIC);
63159f29 6184 if (!skb)
8d7a76c9
TG
6185 goto errout;
6186
6187 err = inet6_fill_ifinfo(skb, idev, 0, 0, event, 0);
26932566
PM
6188 if (err < 0) {
6189 /* -EMSGSIZE implies BUG in inet6_if_nlmsg_size() */
6190 WARN_ON(err == -EMSGSIZE);
6191 kfree_skb(skb);
6192 goto errout;
6193 }
5f75a104 6194 rtnl_notify(skb, net, 0, RTNLGRP_IPV6_IFINFO, NULL, GFP_ATOMIC);
1ce85fe4 6195 return;
8d7a76c9
TG
6196errout:
6197 if (err < 0)
5f75a104 6198 rtnl_set_sk_err(net, RTNLGRP_IPV6_IFINFO, err);
1da177e4
LT
6199}
6200
339bf98f
TG
6201static inline size_t inet6_prefix_nlmsg_size(void)
6202{
6203 return NLMSG_ALIGN(sizeof(struct prefixmsg))
6204 + nla_total_size(sizeof(struct in6_addr))
6205 + nla_total_size(sizeof(struct prefix_cacheinfo));
6206}
c5396a31 6207
1da177e4 6208static int inet6_fill_prefix(struct sk_buff *skb, struct inet6_dev *idev,
15e47304 6209 struct prefix_info *pinfo, u32 portid, u32 seq,
6051e2f4 6210 int event, unsigned int flags)
1da177e4 6211{
6051e2f4
TG
6212 struct prefixmsg *pmsg;
6213 struct nlmsghdr *nlh;
1da177e4
LT
6214 struct prefix_cacheinfo ci;
6215
15e47304 6216 nlh = nlmsg_put(skb, portid, seq, event, sizeof(*pmsg), flags);
63159f29 6217 if (!nlh)
26932566 6218 return -EMSGSIZE;
6051e2f4
TG
6219
6220 pmsg = nlmsg_data(nlh);
1da177e4 6221 pmsg->prefix_family = AF_INET6;
8a47077a
PM
6222 pmsg->prefix_pad1 = 0;
6223 pmsg->prefix_pad2 = 0;
1da177e4
LT
6224 pmsg->prefix_ifindex = idev->dev->ifindex;
6225 pmsg->prefix_len = pinfo->prefix_len;
6226 pmsg->prefix_type = pinfo->type;
8a47077a 6227 pmsg->prefix_pad3 = 0;
bd4a8167 6228 pmsg->prefix_flags = pinfo->flags;
1da177e4 6229
c78679e8
DM
6230 if (nla_put(skb, PREFIX_ADDRESS, sizeof(pinfo->prefix), &pinfo->prefix))
6231 goto nla_put_failure;
1da177e4
LT
6232 ci.preferred_time = ntohl(pinfo->prefered);
6233 ci.valid_time = ntohl(pinfo->valid);
c78679e8
DM
6234 if (nla_put(skb, PREFIX_CACHEINFO, sizeof(ci), &ci))
6235 goto nla_put_failure;
053c095a
JB
6236 nlmsg_end(skb, nlh);
6237 return 0;
1da177e4 6238
6051e2f4 6239nla_put_failure:
26932566
PM
6240 nlmsg_cancel(skb, nlh);
6241 return -EMSGSIZE;
1da177e4
LT
6242}
6243
1ab1457c 6244static void inet6_prefix_notify(int event, struct inet6_dev *idev,
1da177e4
LT
6245 struct prefix_info *pinfo)
6246{
6247 struct sk_buff *skb;
c346dca1 6248 struct net *net = dev_net(idev->dev);
8c384bfa 6249 int err = -ENOBUFS;
1da177e4 6250
339bf98f 6251 skb = nlmsg_new(inet6_prefix_nlmsg_size(), GFP_ATOMIC);
63159f29 6252 if (!skb)
8c384bfa
TG
6253 goto errout;
6254
6255 err = inet6_fill_prefix(skb, idev, pinfo, 0, 0, event, 0);
26932566
PM
6256 if (err < 0) {
6257 /* -EMSGSIZE implies BUG in inet6_prefix_nlmsg_size() */
6258 WARN_ON(err == -EMSGSIZE);
6259 kfree_skb(skb);
6260 goto errout;
6261 }
1ce85fe4
PNA
6262 rtnl_notify(skb, net, 0, RTNLGRP_IPV6_PREFIX, NULL, GFP_ATOMIC);
6263 return;
8c384bfa
TG
6264errout:
6265 if (err < 0)
6fda7350 6266 rtnl_set_sk_err(net, RTNLGRP_IPV6_PREFIX, err);
1da177e4
LT
6267}
6268
1da177e4
LT
6269static void __ipv6_ifa_notify(int event, struct inet6_ifaddr *ifp)
6270{
63998ac2
ND
6271 struct net *net = dev_net(ifp->idev->dev);
6272
c15b1cca
HFS
6273 if (event)
6274 ASSERT_RTNL();
6275
1da177e4
LT
6276 inet6_ifa_notify(event ? : RTM_NEWADDR, ifp);
6277
6278 switch (event) {
6279 case RTM_NEWADDR:
95c385b4 6280 /*
2d819d25
DA
6281 * If the address was optimistic we inserted the route at the
6282 * start of our DAD process, so we don't need to do it again.
6283 * If the device was taken down in the middle of the DAD
6284 * cycle there is a race where we could get here without a
6285 * host route, so nothing to insert. That will be fixed when
6286 * the device is brought up.
95c385b4 6287 */
2d819d25 6288 if (ifp->rt && !rcu_access_pointer(ifp->rt->fib6_node)) {
afb1d4b5 6289 ip6_ins_rt(net, ifp->rt);
2d819d25
DA
6290 } else if (!ifp->rt && (ifp->idev->dev->flags & IFF_UP)) {
6291 pr_warn("BUG: Address %pI6c on device %s is missing its host route.\n",
6292 &ifp->addr, ifp->idev->dev->name);
6293 }
6294
1da177e4
LT
6295 if (ifp->idev->cnf.forwarding)
6296 addrconf_join_anycast(ifp);
7996c799 6297 if (!ipv6_addr_any(&ifp->peer_addr))
07758eb9
HL
6298 addrconf_prefix_route(&ifp->peer_addr, 128,
6299 ifp->rt_priority, ifp->idev->dev,
6300 0, 0, GFP_ATOMIC);
1da177e4
LT
6301 break;
6302 case RTM_DELADDR:
6303 if (ifp->idev->cnf.forwarding)
6304 addrconf_leave_anycast(ifp);
6305 addrconf_leave_solict(ifp->idev, &ifp->addr);
7996c799 6306 if (!ipv6_addr_any(&ifp->peer_addr)) {
8d1c802b 6307 struct fib6_info *rt;
caeaba79 6308
e7478dfc 6309 rt = addrconf_get_prefix_route(&ifp->peer_addr, 128,
2b2450ca
DA
6310 ifp->idev->dev, 0, 0,
6311 false);
8e3d5be7 6312 if (rt)
11dd74b3 6313 ip6_del_rt(net, rt, false);
caeaba79 6314 }
38bd10c4 6315 if (ifp->rt) {
11dd74b3 6316 ip6_del_rt(net, ifp->rt, false);
93531c67 6317 ifp->rt = NULL;
38bd10c4 6318 }
705f1c86 6319 rt_genid_bump_ipv6(net);
1da177e4
LT
6320 break;
6321 }
63998ac2 6322 atomic_inc(&net->ipv6.dev_addr_genid);
1da177e4
LT
6323}
6324
6325static void ipv6_ifa_notify(int event, struct inet6_ifaddr *ifp)
6326{
1da177e4
LT
6327 if (likely(ifp->idev->dead == 0))
6328 __ipv6_ifa_notify(event, ifp);
1da177e4
LT
6329}
6330
6331#ifdef CONFIG_SYSCTL
6332
32927393
CH
6333static int addrconf_sysctl_forward(struct ctl_table *ctl, int write,
6334 void *buffer, size_t *lenp, loff_t *ppos)
1da177e4
LT
6335{
6336 int *valp = ctl->data;
6337 int val = *valp;
88af182e 6338 loff_t pos = *ppos;
fe2c6338 6339 struct ctl_table lctl;
1da177e4
LT
6340 int ret;
6341
013d97e9
FR
6342 /*
6343 * ctl->data points to idev->cnf.forwarding, we should
6344 * not modify it until we get the rtnl lock.
6345 */
6346 lctl = *ctl;
6347 lctl.data = &val;
6348
6349 ret = proc_dointvec(&lctl, write, buffer, lenp, ppos);
1da177e4 6350
c8fecf22 6351 if (write)
b325fddb 6352 ret = addrconf_fixup_forwarding(ctl, valp, val);
88af182e
EB
6353 if (ret)
6354 *ppos = pos;
1ab1457c 6355 return ret;
1da177e4
LT
6356}
6357
32927393
CH
6358static int addrconf_sysctl_mtu(struct ctl_table *ctl, int write,
6359 void *buffer, size_t *lenp, loff_t *ppos)
77751427
ML
6360{
6361 struct inet6_dev *idev = ctl->extra1;
6362 int min_mtu = IPV6_MIN_MTU;
6363 struct ctl_table lctl;
6364
6365 lctl = *ctl;
6366 lctl.extra1 = &min_mtu;
6367 lctl.extra2 = idev ? &idev->dev->mtu : NULL;
6368
6369 return proc_dointvec_minmax(&lctl, write, buffer, lenp, ppos);
6370}
6371
56d417b1
BH
6372static void dev_disable_change(struct inet6_dev *idev)
6373{
75538c2b
CW
6374 struct netdev_notifier_info info;
6375
56d417b1
BH
6376 if (!idev || !idev->dev)
6377 return;
6378
75538c2b 6379 netdev_notifier_info_init(&info, idev->dev);
56d417b1 6380 if (idev->cnf.disable_ipv6)
75538c2b 6381 addrconf_notify(NULL, NETDEV_DOWN, &info);
56d417b1 6382 else
75538c2b 6383 addrconf_notify(NULL, NETDEV_UP, &info);
56d417b1
BH
6384}
6385
6386static void addrconf_disable_change(struct net *net, __s32 newf)
6387{
6388 struct net_device *dev;
6389 struct inet6_dev *idev;
6390
03e4deff 6391 for_each_netdev(net, dev) {
56d417b1
BH
6392 idev = __in6_dev_get(dev);
6393 if (idev) {
6394 int changed = (!idev->cnf.disable_ipv6) ^ (!newf);
d289ab65
ED
6395
6396 WRITE_ONCE(idev->cnf.disable_ipv6, newf);
56d417b1
BH
6397 if (changed)
6398 dev_disable_change(idev);
6399 }
56d417b1 6400 }
56d417b1
BH
6401}
6402
013d97e9 6403static int addrconf_disable_ipv6(struct ctl_table *table, int *p, int newf)
56d417b1 6404{
553ced03 6405 struct net *net = (struct net *)table->extra2;
013d97e9
FR
6406 int old;
6407
553ced03
ED
6408 if (p == &net->ipv6.devconf_dflt->disable_ipv6) {
6409 WRITE_ONCE(*p, newf);
6410 return 0;
6411 }
6412
013d97e9
FR
6413 if (!rtnl_trylock())
6414 return restart_syscall();
56d417b1 6415
013d97e9 6416 old = *p;
d289ab65 6417 WRITE_ONCE(*p, newf);
56d417b1 6418
56d417b1 6419 if (p == &net->ipv6.devconf_all->disable_ipv6) {
d289ab65 6420 WRITE_ONCE(net->ipv6.devconf_dflt->disable_ipv6, newf);
56d417b1 6421 addrconf_disable_change(net, newf);
013d97e9 6422 } else if ((!newf) ^ (!old))
56d417b1
BH
6423 dev_disable_change((struct inet6_dev *)table->extra1);
6424
6425 rtnl_unlock();
6426 return 0;
6427}
6428
32927393
CH
6429static int addrconf_sysctl_disable(struct ctl_table *ctl, int write,
6430 void *buffer, size_t *lenp, loff_t *ppos)
56d417b1
BH
6431{
6432 int *valp = ctl->data;
6433 int val = *valp;
88af182e 6434 loff_t pos = *ppos;
fe2c6338 6435 struct ctl_table lctl;
56d417b1
BH
6436 int ret;
6437
013d97e9
FR
6438 /*
6439 * ctl->data points to idev->cnf.disable_ipv6, we should
6440 * not modify it until we get the rtnl lock.
6441 */
6442 lctl = *ctl;
6443 lctl.data = &val;
6444
6445 ret = proc_dointvec(&lctl, write, buffer, lenp, ppos);
56d417b1
BH
6446
6447 if (write)
6448 ret = addrconf_disable_ipv6(ctl, valp, val);
88af182e
EB
6449 if (ret)
6450 *ppos = pos;
56d417b1
BH
6451 return ret;
6452}
6453
32927393
CH
6454static int addrconf_sysctl_proxy_ndp(struct ctl_table *ctl, int write,
6455 void *buffer, size_t *lenp, loff_t *ppos)
c92d5491 6456{
6457 int *valp = ctl->data;
6458 int ret;
6459 int old, new;
6460
6461 old = *valp;
6462 ret = proc_dointvec(ctl, write, buffer, lenp, ppos);
6463 new = *valp;
6464
6465 if (write && old != new) {
6466 struct net *net = ctl->extra2;
6467
6468 if (!rtnl_trylock())
6469 return restart_syscall();
6470
6471 if (valp == &net->ipv6.devconf_dflt->proxy_ndp)
85b3daad
DA
6472 inet6_netconf_notify_devconf(net, RTM_NEWNETCONF,
6473 NETCONFA_PROXY_NEIGH,
c92d5491 6474 NETCONFA_IFINDEX_DEFAULT,
6475 net->ipv6.devconf_dflt);
6476 else if (valp == &net->ipv6.devconf_all->proxy_ndp)
85b3daad
DA
6477 inet6_netconf_notify_devconf(net, RTM_NEWNETCONF,
6478 NETCONFA_PROXY_NEIGH,
c92d5491 6479 NETCONFA_IFINDEX_ALL,
6480 net->ipv6.devconf_all);
6481 else {
6482 struct inet6_dev *idev = ctl->extra1;
6483
85b3daad
DA
6484 inet6_netconf_notify_devconf(net, RTM_NEWNETCONF,
6485 NETCONFA_PROXY_NEIGH,
c92d5491 6486 idev->dev->ifindex,
6487 &idev->cnf);
6488 }
6489 rtnl_unlock();
6490 }
6491
6492 return ret;
6493}
6494
d35a00b8 6495static int addrconf_sysctl_addr_gen_mode(struct ctl_table *ctl, int write,
32927393 6496 void *buffer, size_t *lenp,
d35a00b8
FJ
6497 loff_t *ppos)
6498{
6499 int ret = 0;
c6dbf7aa 6500 u32 new_val;
d35a00b8
FJ
6501 struct inet6_dev *idev = (struct inet6_dev *)ctl->extra1;
6502 struct net *net = (struct net *)ctl->extra2;
c6dbf7aa
SD
6503 struct ctl_table tmp = {
6504 .data = &new_val,
6505 .maxlen = sizeof(new_val),
6506 .mode = ctl->mode,
6507 };
d35a00b8 6508
8c171d6c
FJ
6509 if (!rtnl_trylock())
6510 return restart_syscall();
6511
c6dbf7aa 6512 new_val = *((u32 *)ctl->data);
d35a00b8 6513
c6dbf7aa
SD
6514 ret = proc_douintvec(&tmp, write, buffer, lenp, ppos);
6515 if (ret != 0)
6516 goto out;
d35a00b8 6517
c6dbf7aa 6518 if (write) {
8c171d6c
FJ
6519 if (check_addr_gen_mode(new_val) < 0) {
6520 ret = -EINVAL;
6521 goto out;
6522 }
d35a00b8 6523
c6dbf7aa 6524 if (idev) {
8c171d6c
FJ
6525 if (check_stable_privacy(idev, net, new_val) < 0) {
6526 ret = -EINVAL;
6527 goto out;
6528 }
d35a00b8
FJ
6529
6530 if (idev->cnf.addr_gen_mode != new_val) {
4ad26813 6531 WRITE_ONCE(idev->cnf.addr_gen_mode, new_val);
23ca0c2c 6532 addrconf_init_auto_addrs(idev->dev);
d35a00b8 6533 }
f24c5987
SD
6534 } else if (&net->ipv6.devconf_all->addr_gen_mode == ctl->data) {
6535 struct net_device *dev;
6536
6537 net->ipv6.devconf_dflt->addr_gen_mode = new_val;
6538 for_each_netdev(net, dev) {
6539 idev = __in6_dev_get(dev);
6540 if (idev &&
6541 idev->cnf.addr_gen_mode != new_val) {
4ad26813
ED
6542 WRITE_ONCE(idev->cnf.addr_gen_mode,
6543 new_val);
23ca0c2c 6544 addrconf_init_auto_addrs(idev->dev);
f24c5987
SD
6545 }
6546 }
d35a00b8 6547 }
c6dbf7aa
SD
6548
6549 *((u32 *)ctl->data) = new_val;
d35a00b8
FJ
6550 }
6551
8c171d6c
FJ
6552out:
6553 rtnl_unlock();
6554
d35a00b8
FJ
6555 return ret;
6556}
6557
3d1bec99 6558static int addrconf_sysctl_stable_secret(struct ctl_table *ctl, int write,
32927393 6559 void *buffer, size_t *lenp,
3d1bec99
HFS
6560 loff_t *ppos)
6561{
6562 int err;
6563 struct in6_addr addr;
6564 char str[IPV6_MAX_STRLEN];
6565 struct ctl_table lctl = *ctl;
622c81d5 6566 struct net *net = ctl->extra2;
3d1bec99
HFS
6567 struct ipv6_stable_secret *secret = ctl->data;
6568
622c81d5
HFS
6569 if (&net->ipv6.devconf_all->stable_secret == ctl->data)
6570 return -EIO;
6571
3d1bec99
HFS
6572 lctl.maxlen = IPV6_MAX_STRLEN;
6573 lctl.data = str;
6574
6575 if (!rtnl_trylock())
6576 return restart_syscall();
6577
6578 if (!write && !secret->initialized) {
6579 err = -EIO;
6580 goto out;
6581 }
6582
5449a5ca
WC
6583 err = snprintf(str, sizeof(str), "%pI6", &secret->secret);
6584 if (err >= sizeof(str)) {
6585 err = -EIO;
6586 goto out;
3d1bec99
HFS
6587 }
6588
6589 err = proc_dostring(&lctl, write, buffer, lenp, ppos);
6590 if (err || !write)
6591 goto out;
6592
6593 if (in6_pton(str, -1, addr.in6_u.u6_addr8, -1, NULL) != 1) {
6594 err = -EIO;
6595 goto out;
6596 }
6597
6598 secret->initialized = true;
6599 secret->secret = addr;
6600
622c81d5
HFS
6601 if (&net->ipv6.devconf_dflt->stable_secret == ctl->data) {
6602 struct net_device *dev;
6603
6604 for_each_netdev(net, dev) {
6605 struct inet6_dev *idev = __in6_dev_get(dev);
6606
6607 if (idev) {
4ad26813
ED
6608 WRITE_ONCE(idev->cnf.addr_gen_mode,
6609 IN6_ADDR_GEN_MODE_STABLE_PRIVACY);
622c81d5
HFS
6610 }
6611 }
6612 } else {
6613 struct inet6_dev *idev = ctl->extra1;
6614
4ad26813
ED
6615 WRITE_ONCE(idev->cnf.addr_gen_mode,
6616 IN6_ADDR_GEN_MODE_STABLE_PRIVACY);
622c81d5
HFS
6617 }
6618
3d1bec99
HFS
6619out:
6620 rtnl_unlock();
6621
6622 return err;
6623}
c92d5491 6624
35103d11
AG
6625static
6626int addrconf_sysctl_ignore_routes_with_linkdown(struct ctl_table *ctl,
32927393 6627 int write, void *buffer,
35103d11
AG
6628 size_t *lenp,
6629 loff_t *ppos)
6630{
6631 int *valp = ctl->data;
6632 int val = *valp;
6633 loff_t pos = *ppos;
6634 struct ctl_table lctl;
6635 int ret;
6636
6637 /* ctl->data points to idev->cnf.ignore_routes_when_linkdown
6638 * we should not modify it until we get the rtnl lock.
6639 */
6640 lctl = *ctl;
6641 lctl.data = &val;
6642
6643 ret = proc_dointvec(&lctl, write, buffer, lenp, ppos);
6644
6645 if (write)
6646 ret = addrconf_fixup_linkdown(ctl, valp, val);
6647 if (ret)
6648 *ppos = pos;
6649 return ret;
6650}
6651
df789fe7
DF
6652static
6653void addrconf_set_nopolicy(struct rt6_info *rt, int action)
6654{
6655 if (rt) {
6656 if (action)
6657 rt->dst.flags |= DST_NOPOLICY;
6658 else
6659 rt->dst.flags &= ~DST_NOPOLICY;
6660 }
6661}
6662
6663static
6664void addrconf_disable_policy_idev(struct inet6_dev *idev, int val)
6665{
6666 struct inet6_ifaddr *ifa;
6667
6668 read_lock_bh(&idev->lock);
6669 list_for_each_entry(ifa, &idev->addr_list, if_list) {
6670 spin_lock(&ifa->lock);
6671 if (ifa->rt) {
f88d8ea6 6672 /* host routes only use builtin fib6_nh */
1cf844c7 6673 struct fib6_nh *nh = ifa->rt->fib6_nh;
df789fe7
DF
6674 int cpu;
6675
66f5d6ce 6676 rcu_read_lock();
3b6761d1 6677 ifa->rt->dst_nopolicy = val ? true : false;
f40b6ae2 6678 if (nh->rt6i_pcpu) {
df789fe7
DF
6679 for_each_possible_cpu(cpu) {
6680 struct rt6_info **rtp;
6681
f40b6ae2 6682 rtp = per_cpu_ptr(nh->rt6i_pcpu, cpu);
df789fe7
DF
6683 addrconf_set_nopolicy(*rtp, val);
6684 }
6685 }
66f5d6ce 6686 rcu_read_unlock();
df789fe7
DF
6687 }
6688 spin_unlock(&ifa->lock);
6689 }
6690 read_unlock_bh(&idev->lock);
6691}
6692
6693static
6694int addrconf_disable_policy(struct ctl_table *ctl, int *valp, int val)
6695{
45b90ec9 6696 struct net *net = (struct net *)ctl->extra2;
df789fe7 6697 struct inet6_dev *idev;
45b90ec9
ED
6698
6699 if (valp == &net->ipv6.devconf_dflt->disable_policy) {
6700 WRITE_ONCE(*valp, val);
6701 return 0;
6702 }
df789fe7
DF
6703
6704 if (!rtnl_trylock())
6705 return restart_syscall();
6706
624d5aec 6707 WRITE_ONCE(*valp, val);
df789fe7 6708
df789fe7
DF
6709 if (valp == &net->ipv6.devconf_all->disable_policy) {
6710 struct net_device *dev;
6711
6712 for_each_netdev(net, dev) {
6713 idev = __in6_dev_get(dev);
6714 if (idev)
6715 addrconf_disable_policy_idev(idev, val);
6716 }
6717 } else {
6718 idev = (struct inet6_dev *)ctl->extra1;
6719 addrconf_disable_policy_idev(idev, val);
6720 }
6721
6722 rtnl_unlock();
6723 return 0;
6724}
6725
32927393
CH
6726static int addrconf_sysctl_disable_policy(struct ctl_table *ctl, int write,
6727 void *buffer, size_t *lenp, loff_t *ppos)
df789fe7
DF
6728{
6729 int *valp = ctl->data;
6730 int val = *valp;
6731 loff_t pos = *ppos;
6732 struct ctl_table lctl;
6733 int ret;
6734
6735 lctl = *ctl;
6736 lctl.data = &val;
6737 ret = proc_dointvec(&lctl, write, buffer, lenp, ppos);
6738
6739 if (write && (*valp != val))
6740 ret = addrconf_disable_policy(ctl, valp, val);
6741
6742 if (ret)
6743 *ppos = pos;
6744
6745 return ret;
6746}
6747
cb4a4c69 6748static int minus_one = -1;
cb9e684e 6749static const int two_five_five = 255;
176f716c 6750static u32 ioam6_if_id_max = U16_MAX;
cb9e684e 6751
607ea7cd 6752static const struct ctl_table addrconf_sysctl[] = {
5df1f77f
KK
6753 {
6754 .procname = "forwarding",
6755 .data = &ipv6_devconf.forwarding,
6756 .maxlen = sizeof(int),
6757 .mode = 0644,
6758 .proc_handler = addrconf_sysctl_forward,
6759 },
6760 {
6761 .procname = "hop_limit",
6762 .data = &ipv6_devconf.hop_limit,
6763 .maxlen = sizeof(int),
6764 .mode = 0644,
cb9e684e 6765 .proc_handler = proc_dointvec_minmax,
eec4844f 6766 .extra1 = (void *)SYSCTL_ONE,
cb9e684e 6767 .extra2 = (void *)&two_five_five,
5df1f77f
KK
6768 },
6769 {
6770 .procname = "mtu",
6771 .data = &ipv6_devconf.mtu6,
6772 .maxlen = sizeof(int),
6773 .mode = 0644,
6774 .proc_handler = addrconf_sysctl_mtu,
6775 },
6776 {
6777 .procname = "accept_ra",
6778 .data = &ipv6_devconf.accept_ra,
6779 .maxlen = sizeof(int),
6780 .mode = 0644,
6781 .proc_handler = proc_dointvec,
6782 },
6783 {
6784 .procname = "accept_redirects",
6785 .data = &ipv6_devconf.accept_redirects,
6786 .maxlen = sizeof(int),
6787 .mode = 0644,
6788 .proc_handler = proc_dointvec,
6789 },
6790 {
6791 .procname = "autoconf",
6792 .data = &ipv6_devconf.autoconf,
6793 .maxlen = sizeof(int),
6794 .mode = 0644,
6795 .proc_handler = proc_dointvec,
6796 },
6797 {
6798 .procname = "dad_transmits",
6799 .data = &ipv6_devconf.dad_transmits,
6800 .maxlen = sizeof(int),
6801 .mode = 0644,
6802 .proc_handler = proc_dointvec,
6803 },
6804 {
6805 .procname = "router_solicitations",
6806 .data = &ipv6_devconf.rtr_solicits,
6807 .maxlen = sizeof(int),
6808 .mode = 0644,
cb4a4c69
6809 .proc_handler = proc_dointvec_minmax,
6810 .extra1 = &minus_one,
5df1f77f
KK
6811 },
6812 {
6813 .procname = "router_solicitation_interval",
6814 .data = &ipv6_devconf.rtr_solicit_interval,
6815 .maxlen = sizeof(int),
6816 .mode = 0644,
6817 .proc_handler = proc_dointvec_jiffies,
6818 },
bd11f074
6819 {
6820 .procname = "router_solicitation_max_interval",
6821 .data = &ipv6_devconf.rtr_solicit_max_interval,
6822 .maxlen = sizeof(int),
6823 .mode = 0644,
6824 .proc_handler = proc_dointvec_jiffies,
6825 },
5df1f77f
KK
6826 {
6827 .procname = "router_solicitation_delay",
6828 .data = &ipv6_devconf.rtr_solicit_delay,
6829 .maxlen = sizeof(int),
6830 .mode = 0644,
6831 .proc_handler = proc_dointvec_jiffies,
6832 },
6833 {
6834 .procname = "force_mld_version",
6835 .data = &ipv6_devconf.force_mld_version,
6836 .maxlen = sizeof(int),
6837 .mode = 0644,
6838 .proc_handler = proc_dointvec,
6839 },
6840 {
6841 .procname = "mldv1_unsolicited_report_interval",
6842 .data =
6843 &ipv6_devconf.mldv1_unsolicited_report_interval,
6844 .maxlen = sizeof(int),
6845 .mode = 0644,
6846 .proc_handler = proc_dointvec_ms_jiffies,
6847 },
6848 {
6849 .procname = "mldv2_unsolicited_report_interval",
6850 .data =
6851 &ipv6_devconf.mldv2_unsolicited_report_interval,
6852 .maxlen = sizeof(int),
6853 .mode = 0644,
6854 .proc_handler = proc_dointvec_ms_jiffies,
6855 },
6856 {
6857 .procname = "use_tempaddr",
6858 .data = &ipv6_devconf.use_tempaddr,
6859 .maxlen = sizeof(int),
6860 .mode = 0644,
6861 .proc_handler = proc_dointvec,
6862 },
6863 {
6864 .procname = "temp_valid_lft",
6865 .data = &ipv6_devconf.temp_valid_lft,
6866 .maxlen = sizeof(int),
6867 .mode = 0644,
6868 .proc_handler = proc_dointvec,
6869 },
6870 {
6871 .procname = "temp_prefered_lft",
6872 .data = &ipv6_devconf.temp_prefered_lft,
6873 .maxlen = sizeof(int),
6874 .mode = 0644,
6875 .proc_handler = proc_dointvec,
6876 },
a5fcea2d
AH
6877 {
6878 .procname = "regen_min_advance",
6879 .data = &ipv6_devconf.regen_min_advance,
6880 .maxlen = sizeof(int),
6881 .mode = 0644,
6882 .proc_handler = proc_dointvec,
6883 },
5df1f77f
KK
6884 {
6885 .procname = "regen_max_retry",
6886 .data = &ipv6_devconf.regen_max_retry,
6887 .maxlen = sizeof(int),
6888 .mode = 0644,
6889 .proc_handler = proc_dointvec,
6890 },
6891 {
6892 .procname = "max_desync_factor",
6893 .data = &ipv6_devconf.max_desync_factor,
6894 .maxlen = sizeof(int),
6895 .mode = 0644,
6896 .proc_handler = proc_dointvec,
6897 },
6898 {
6899 .procname = "max_addresses",
6900 .data = &ipv6_devconf.max_addresses,
6901 .maxlen = sizeof(int),
6902 .mode = 0644,
6903 .proc_handler = proc_dointvec,
6904 },
6905 {
6906 .procname = "accept_ra_defrtr",
6907 .data = &ipv6_devconf.accept_ra_defrtr,
6908 .maxlen = sizeof(int),
6909 .mode = 0644,
6910 .proc_handler = proc_dointvec,
6911 },
6b2e04bc
PC
6912 {
6913 .procname = "ra_defrtr_metric",
6914 .data = &ipv6_devconf.ra_defrtr_metric,
6915 .maxlen = sizeof(u32),
6916 .mode = 0644,
6917 .proc_handler = proc_douintvec_minmax,
6918 .extra1 = (void *)SYSCTL_ONE,
6919 },
5df1f77f
KK
6920 {
6921 .procname = "accept_ra_min_hop_limit",
6922 .data = &ipv6_devconf.accept_ra_min_hop_limit,
6923 .maxlen = sizeof(int),
6924 .mode = 0644,
6925 .proc_handler = proc_dointvec,
6926 },
1671bcfd 6927 {
5027d54a
PR
6928 .procname = "accept_ra_min_lft",
6929 .data = &ipv6_devconf.accept_ra_min_lft,
1671bcfd
PR
6930 .maxlen = sizeof(int),
6931 .mode = 0644,
6932 .proc_handler = proc_dointvec,
6933 },
5df1f77f
KK
6934 {
6935 .procname = "accept_ra_pinfo",
6936 .data = &ipv6_devconf.accept_ra_pinfo,
6937 .maxlen = sizeof(int),
6938 .mode = 0644,
6939 .proc_handler = proc_dointvec,
6940 },
473267a4
PR
6941 {
6942 .procname = "ra_honor_pio_life",
6943 .data = &ipv6_devconf.ra_honor_pio_life,
6944 .maxlen = sizeof(u8),
6945 .mode = 0644,
6946 .proc_handler = proc_dou8vec_minmax,
6947 .extra1 = SYSCTL_ZERO,
6948 .extra2 = SYSCTL_ONE,
6949 },
930d6ff2 6950#ifdef CONFIG_IPV6_ROUTER_PREF
5df1f77f
KK
6951 {
6952 .procname = "accept_ra_rtr_pref",
6953 .data = &ipv6_devconf.accept_ra_rtr_pref,
6954 .maxlen = sizeof(int),
6955 .mode = 0644,
6956 .proc_handler = proc_dointvec,
6957 },
6958 {
6959 .procname = "router_probe_interval",
6960 .data = &ipv6_devconf.rtr_probe_interval,
6961 .maxlen = sizeof(int),
6962 .mode = 0644,
6963 .proc_handler = proc_dointvec_jiffies,
6964 },
fa03ef38 6965#ifdef CONFIG_IPV6_ROUTE_INFO
bbea124b
JS
6966 {
6967 .procname = "accept_ra_rt_info_min_plen",
6968 .data = &ipv6_devconf.accept_ra_rt_info_min_plen,
6969 .maxlen = sizeof(int),
6970 .mode = 0644,
6971 .proc_handler = proc_dointvec,
6972 },
5df1f77f
KK
6973 {
6974 .procname = "accept_ra_rt_info_max_plen",
6975 .data = &ipv6_devconf.accept_ra_rt_info_max_plen,
6976 .maxlen = sizeof(int),
6977 .mode = 0644,
6978 .proc_handler = proc_dointvec,
6979 },
09c884d4 6980#endif
930d6ff2 6981#endif
5df1f77f
KK
6982 {
6983 .procname = "proxy_ndp",
6984 .data = &ipv6_devconf.proxy_ndp,
6985 .maxlen = sizeof(int),
6986 .mode = 0644,
6987 .proc_handler = addrconf_sysctl_proxy_ndp,
6988 },
6989 {
6990 .procname = "accept_source_route",
6991 .data = &ipv6_devconf.accept_source_route,
6992 .maxlen = sizeof(int),
6993 .mode = 0644,
6994 .proc_handler = proc_dointvec,
6995 },
95c385b4 6996#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
5df1f77f
KK
6997 {
6998 .procname = "optimistic_dad",
6999 .data = &ipv6_devconf.optimistic_dad,
7000 .maxlen = sizeof(int),
7001 .mode = 0644,
7002 .proc_handler = proc_dointvec,
7003 },
7004 {
7005 .procname = "use_optimistic",
7006 .data = &ipv6_devconf.use_optimistic,
7007 .maxlen = sizeof(int),
7008 .mode = 0644,
7009 .proc_handler = proc_dointvec,
7010 },
7bc570c8
YH
7011#endif
7012#ifdef CONFIG_IPV6_MROUTE
5df1f77f
KK
7013 {
7014 .procname = "mc_forwarding",
7015 .data = &ipv6_devconf.mc_forwarding,
7016 .maxlen = sizeof(int),
7017 .mode = 0444,
7018 .proc_handler = proc_dointvec,
7019 },
95c385b4 7020#endif
5df1f77f
KK
7021 {
7022 .procname = "disable_ipv6",
7023 .data = &ipv6_devconf.disable_ipv6,
7024 .maxlen = sizeof(int),
7025 .mode = 0644,
7026 .proc_handler = addrconf_sysctl_disable,
7027 },
7028 {
7029 .procname = "accept_dad",
7030 .data = &ipv6_devconf.accept_dad,
7031 .maxlen = sizeof(int),
7032 .mode = 0644,
7033 .proc_handler = proc_dointvec,
7034 },
7035 {
7036 .procname = "force_tllao",
7037 .data = &ipv6_devconf.force_tllao,
7038 .maxlen = sizeof(int),
7039 .mode = 0644,
7040 .proc_handler = proc_dointvec
7041 },
7042 {
7043 .procname = "ndisc_notify",
7044 .data = &ipv6_devconf.ndisc_notify,
7045 .maxlen = sizeof(int),
7046 .mode = 0644,
7047 .proc_handler = proc_dointvec
7048 },
7049 {
7050 .procname = "suppress_frag_ndisc",
7051 .data = &ipv6_devconf.suppress_frag_ndisc,
7052 .maxlen = sizeof(int),
7053 .mode = 0644,
7054 .proc_handler = proc_dointvec
7055 },
7056 {
7057 .procname = "accept_ra_from_local",
7058 .data = &ipv6_devconf.accept_ra_from_local,
7059 .maxlen = sizeof(int),
7060 .mode = 0644,
7061 .proc_handler = proc_dointvec,
7062 },
7063 {
7064 .procname = "accept_ra_mtu",
7065 .data = &ipv6_devconf.accept_ra_mtu,
7066 .maxlen = sizeof(int),
7067 .mode = 0644,
7068 .proc_handler = proc_dointvec,
7069 },
7070 {
7071 .procname = "stable_secret",
7072 .data = &ipv6_devconf.stable_secret,
7073 .maxlen = IPV6_MAX_STRLEN,
7074 .mode = 0600,
7075 .proc_handler = addrconf_sysctl_stable_secret,
7076 },
7077 {
7078 .procname = "use_oif_addrs_only",
7079 .data = &ipv6_devconf.use_oif_addrs_only,
7080 .maxlen = sizeof(int),
7081 .mode = 0644,
7082 .proc_handler = proc_dointvec,
7083 },
7084 {
7085 .procname = "ignore_routes_with_linkdown",
7086 .data = &ipv6_devconf.ignore_routes_with_linkdown,
7087 .maxlen = sizeof(int),
7088 .mode = 0644,
7089 .proc_handler = addrconf_sysctl_ignore_routes_with_linkdown,
7090 },
7091 {
7092 .procname = "drop_unicast_in_l2_multicast",
7093 .data = &ipv6_devconf.drop_unicast_in_l2_multicast,
7094 .maxlen = sizeof(int),
7095 .mode = 0644,
7096 .proc_handler = proc_dointvec,
7097 },
7098 {
7099 .procname = "drop_unsolicited_na",
7100 .data = &ipv6_devconf.drop_unsolicited_na,
7101 .maxlen = sizeof(int),
7102 .mode = 0644,
7103 .proc_handler = proc_dointvec,
7104 },
7105 {
7106 .procname = "keep_addr_on_down",
7107 .data = &ipv6_devconf.keep_addr_on_down,
7108 .maxlen = sizeof(int),
7109 .mode = 0644,
7110 .proc_handler = proc_dointvec,
7111
7112 },
1ababeba
DL
7113 {
7114 .procname = "seg6_enabled",
7115 .data = &ipv6_devconf.seg6_enabled,
7116 .maxlen = sizeof(int),
7117 .mode = 0644,
7118 .proc_handler = proc_dointvec,
7119 },
bf355b8d
DL
7120#ifdef CONFIG_IPV6_SEG6_HMAC
7121 {
7122 .procname = "seg6_require_hmac",
7123 .data = &ipv6_devconf.seg6_require_hmac,
7124 .maxlen = sizeof(int),
7125 .mode = 0644,
7126 .proc_handler = proc_dointvec,
7127 },
7128#endif
adc176c5
EN
7129 {
7130 .procname = "enhanced_dad",
7131 .data = &ipv6_devconf.enhanced_dad,
7132 .maxlen = sizeof(int),
7133 .mode = 0644,
7134 .proc_handler = proc_dointvec,
7135 },
d35a00b8 7136 {
12e64b3b
RY
7137 .procname = "addr_gen_mode",
7138 .data = &ipv6_devconf.addr_gen_mode,
7139 .maxlen = sizeof(int),
7140 .mode = 0644,
d35a00b8
FJ
7141 .proc_handler = addrconf_sysctl_addr_gen_mode,
7142 },
df789fe7
DF
7143 {
7144 .procname = "disable_policy",
7145 .data = &ipv6_devconf.disable_policy,
7146 .maxlen = sizeof(int),
7147 .mode = 0644,
7148 .proc_handler = addrconf_sysctl_disable_policy,
7149 },
2210d6b2
7150 {
7151 .procname = "ndisc_tclass",
7152 .data = &ipv6_devconf.ndisc_tclass,
7153 .maxlen = sizeof(int),
7154 .mode = 0644,
7155 .proc_handler = proc_dointvec_minmax,
eec4844f 7156 .extra1 = (void *)SYSCTL_ZERO,
2210d6b2
7157 .extra2 = (void *)&two_five_five,
7158 },
8610c7c6
AA
7159 {
7160 .procname = "rpl_seg_enabled",
7161 .data = &ipv6_devconf.rpl_seg_enabled,
7162 .maxlen = sizeof(int),
7163 .mode = 0644,
7164 .proc_handler = proc_dointvec,
7165 },
9ee11f0f
JI
7166 {
7167 .procname = "ioam6_enabled",
7168 .data = &ipv6_devconf.ioam6_enabled,
7169 .maxlen = sizeof(u8),
7170 .mode = 0644,
7171 .proc_handler = proc_dou8vec_minmax,
7172 .extra1 = (void *)SYSCTL_ZERO,
7173 .extra2 = (void *)SYSCTL_ONE,
7174 },
7175 {
7176 .procname = "ioam6_id",
7177 .data = &ipv6_devconf.ioam6_id,
7178 .maxlen = sizeof(u32),
7179 .mode = 0644,
7180 .proc_handler = proc_douintvec_minmax,
7181 .extra1 = (void *)SYSCTL_ZERO,
7182 .extra2 = (void *)&ioam6_if_id_max,
7183 },
7184 {
7185 .procname = "ioam6_id_wide",
7186 .data = &ipv6_devconf.ioam6_id_wide,
7187 .maxlen = sizeof(u32),
7188 .mode = 0644,
7189 .proc_handler = proc_douintvec,
7190 },
18ac597a
JP
7191 {
7192 .procname = "ndisc_evict_nocarrier",
7193 .data = &ipv6_devconf.ndisc_evict_nocarrier,
7194 .maxlen = sizeof(u8),
7195 .mode = 0644,
7196 .proc_handler = proc_dou8vec_minmax,
7197 .extra1 = (void *)SYSCTL_ZERO,
7198 .extra2 = (void *)SYSCTL_ONE,
7199 },
f9a2fb73 7200 {
3e0b8f52
AA
7201 .procname = "accept_untracked_na",
7202 .data = &ipv6_devconf.accept_untracked_na,
f9a2fb73
AA
7203 .maxlen = sizeof(int),
7204 .mode = 0644,
b66eb3a6
JP
7205 .proc_handler = proc_dointvec_minmax,
7206 .extra1 = SYSCTL_ZERO,
7207 .extra2 = SYSCTL_TWO,
f9a2fb73 7208 },
5df1f77f
KK
7209 {
7210 /* sentinel */
7211 }
1da177e4
LT
7212};
7213
bff16c2f 7214static int __addrconf_sysctl_register(struct net *net, char *dev_name,
f8572d8f 7215 struct inet6_dev *idev, struct ipv6_devconf *p)
1da177e4 7216{
29c994e3 7217 int i, ifindex;
607ea7cd 7218 struct ctl_table *table;
6105e293 7219 char path[sizeof("net/ipv6/conf/") + IFNAMSIZ];
1dab6222 7220
425b9c7f 7221 table = kmemdup(addrconf_sysctl, sizeof(addrconf_sysctl), GFP_KERNEL_ACCOUNT);
607ea7cd 7222 if (!table)
f68635e6
PE
7223 goto out;
7224
607ea7cd
KK
7225 for (i = 0; table[i].data; i++) {
7226 table[i].data += (char *)p - (char *)&ipv6_devconf;
cb9e684e
7227 /* If one of these is already set, then it is not safe to
7228 * overwrite either of them: this makes proc_dointvec_minmax
7229 * usable.
7230 */
7231 if (!table[i].extra1 && !table[i].extra2) {
7232 table[i].extra1 = idev; /* embedded; no ref */
7233 table[i].extra2 = net;
7234 }
1da177e4 7235 }
1da177e4 7236
6105e293 7237 snprintf(path, sizeof(path), "net/ipv6/conf/%s", dev_name);
1da177e4 7238
c899710f
JG
7239 p->sysctl_header = register_net_sysctl_sz(net, path, table,
7240 ARRAY_SIZE(addrconf_sysctl));
607ea7cd 7241 if (!p->sysctl_header)
6105e293 7242 goto free;
f68635e6 7243
29c994e3
ND
7244 if (!strcmp(dev_name, "all"))
7245 ifindex = NETCONFA_IFINDEX_ALL;
7246 else if (!strcmp(dev_name, "default"))
7247 ifindex = NETCONFA_IFINDEX_DEFAULT;
7248 else
7249 ifindex = idev->dev->ifindex;
85b3daad
DA
7250 inet6_netconf_notify_devconf(net, RTM_NEWNETCONF, NETCONFA_ALL,
7251 ifindex, p);
95897312 7252 return 0;
1da177e4 7253
f68635e6 7254free:
607ea7cd 7255 kfree(table);
f68635e6 7256out:
95897312 7257 return -ENOBUFS;
1da177e4
LT
7258}
7259
23452170
DA
7260static void __addrconf_sysctl_unregister(struct net *net,
7261 struct ipv6_devconf *p, int ifindex)
408c4768 7262{
607ea7cd 7263 struct ctl_table *table;
408c4768 7264
607ea7cd 7265 if (!p->sysctl_header)
408c4768
PE
7266 return;
7267
607ea7cd
KK
7268 table = p->sysctl_header->ctl_table_arg;
7269 unregister_net_sysctl_table(p->sysctl_header);
7270 p->sysctl_header = NULL;
7271 kfree(table);
23452170
DA
7272
7273 inet6_netconf_notify_devconf(net, RTM_DELNETCONF, 0, ifindex, NULL);
408c4768
PE
7274}
7275
a317a2f1 7276static int addrconf_sysctl_register(struct inet6_dev *idev)
f52295a9 7277{
a317a2f1
WC
7278 int err;
7279
7280 if (!sysctl_dev_name_is_allowed(idev->dev->name))
7281 return -EINVAL;
7282
7283 err = neigh_sysctl_register(idev->dev, idev->nd_parms,
7284 &ndisc_ifinfo_sysctl_change);
7285 if (err)
7286 return err;
7287 err = __addrconf_sysctl_register(dev_net(idev->dev), idev->dev->name,
7288 idev, &idev->cnf);
7289 if (err)
7290 neigh_sysctl_unregister(idev->nd_parms);
7291
7292 return err;
f52295a9
PE
7293}
7294
408c4768 7295static void addrconf_sysctl_unregister(struct inet6_dev *idev)
1da177e4 7296{
23452170
DA
7297 __addrconf_sysctl_unregister(dev_net(idev->dev), &idev->cnf,
7298 idev->dev->ifindex);
408c4768 7299 neigh_sysctl_unregister(idev->nd_parms);
1da177e4
LT
7300}
7301
7302
7303#endif
7304
2c8c1e72 7305static int __net_init addrconf_init_net(struct net *net)
e0da5a48 7306{
a79ca223 7307 int err = -ENOMEM;
e0da5a48
PE
7308 struct ipv6_devconf *all, *dflt;
7309
21a216a8 7310 spin_lock_init(&net->ipv6.addrconf_hash_lock);
8805d13f 7311 INIT_DEFERRABLE_WORK(&net->ipv6.addr_chk_work, addrconf_verify_work);
21a216a8
ED
7312 net->ipv6.inet6_addr_lst = kcalloc(IN6_ADDR_HSIZE,
7313 sizeof(struct hlist_head),
7314 GFP_KERNEL);
7315 if (!net->ipv6.inet6_addr_lst)
7316 goto err_alloc_addr;
7317
a79ca223 7318 all = kmemdup(&ipv6_devconf, sizeof(ipv6_devconf), GFP_KERNEL);
63159f29 7319 if (!all)
a79ca223 7320 goto err_alloc_all;
e0da5a48 7321
a79ca223 7322 dflt = kmemdup(&ipv6_devconf_dflt, sizeof(ipv6_devconf_dflt), GFP_KERNEL);
63159f29 7323 if (!dflt)
a79ca223 7324 goto err_alloc_dflt;
e0da5a48 7325
a5612ca1
KI
7326 if (!net_eq(net, &init_net)) {
7327 switch (net_inherit_devconf()) {
9efd6a3c
ND
7328 case 1: /* copy from init_net */
7329 memcpy(all, init_net.ipv6.devconf_all,
7330 sizeof(ipv6_devconf));
7331 memcpy(dflt, init_net.ipv6.devconf_dflt,
7332 sizeof(ipv6_devconf_dflt));
7333 break;
7334 case 3: /* copy from the current netns */
7335 memcpy(all, current->nsproxy->net_ns->ipv6.devconf_all,
7336 sizeof(ipv6_devconf));
7337 memcpy(dflt,
7338 current->nsproxy->net_ns->ipv6.devconf_dflt,
7339 sizeof(ipv6_devconf_dflt));
7340 break;
7341 case 0:
7342 case 2:
7343 /* use compiled values */
7344 break;
7345 }
856c395c
CW
7346 }
7347
a79ca223
HZ
7348 /* these will be inherited by all namespaces */
7349 dflt->autoconf = ipv6_defaults.autoconf;
7350 dflt->disable_ipv6 = ipv6_defaults.disable_ipv6;
e0da5a48 7351
3d1bec99
HFS
7352 dflt->stable_secret.initialized = false;
7353 all->stable_secret.initialized = false;
7354
e0da5a48
PE
7355 net->ipv6.devconf_all = all;
7356 net->ipv6.devconf_dflt = dflt;
7357
7358#ifdef CONFIG_SYSCTL
f8572d8f 7359 err = __addrconf_sysctl_register(net, "all", NULL, all);
e0da5a48
PE
7360 if (err < 0)
7361 goto err_reg_all;
7362
f8572d8f 7363 err = __addrconf_sysctl_register(net, "default", NULL, dflt);
e0da5a48
PE
7364 if (err < 0)
7365 goto err_reg_dflt;
7366#endif
7367 return 0;
7368
7369#ifdef CONFIG_SYSCTL
7370err_reg_dflt:
23452170 7371 __addrconf_sysctl_unregister(net, all, NETCONFA_IFINDEX_ALL);
e0da5a48
PE
7372err_reg_all:
7373 kfree(dflt);
1ca69520 7374 net->ipv6.devconf_dflt = NULL;
e0da5a48
PE
7375#endif
7376err_alloc_dflt:
7377 kfree(all);
1ca69520 7378 net->ipv6.devconf_all = NULL;
e0da5a48 7379err_alloc_all:
21a216a8
ED
7380 kfree(net->ipv6.inet6_addr_lst);
7381err_alloc_addr:
e0da5a48
PE
7382 return err;
7383}
7384
2c8c1e72 7385static void __net_exit addrconf_exit_net(struct net *net)
e0da5a48 7386{
21a216a8
ED
7387 int i;
7388
e0da5a48 7389#ifdef CONFIG_SYSCTL
23452170
DA
7390 __addrconf_sysctl_unregister(net, net->ipv6.devconf_dflt,
7391 NETCONFA_IFINDEX_DEFAULT);
7392 __addrconf_sysctl_unregister(net, net->ipv6.devconf_all,
7393 NETCONFA_IFINDEX_ALL);
e0da5a48 7394#endif
73cf0e92 7395 kfree(net->ipv6.devconf_dflt);
7d9b1b57 7396 net->ipv6.devconf_dflt = NULL;
73cf0e92 7397 kfree(net->ipv6.devconf_all);
7d9b1b57 7398 net->ipv6.devconf_all = NULL;
21a216a8 7399
be6b41c1 7400 cancel_delayed_work_sync(&net->ipv6.addr_chk_work);
21a216a8
ED
7401 /*
7402 * Check hash table, then free it.
7403 */
7404 for (i = 0; i < IN6_ADDR_HSIZE; i++)
7405 WARN_ON_ONCE(!hlist_empty(&net->ipv6.inet6_addr_lst[i]));
7406
7407 kfree(net->ipv6.inet6_addr_lst);
7408 net->ipv6.inet6_addr_lst = NULL;
e0da5a48
PE
7409}
7410
7411static struct pernet_operations addrconf_ops = {
7412 .init = addrconf_init_net,
7413 .exit = addrconf_exit_net,
7414};
7415
207895fd 7416static struct rtnl_af_ops inet6_ops __read_mostly = {
b382b191
TG
7417 .family = AF_INET6,
7418 .fill_link_af = inet6_fill_link_af,
7419 .get_link_af_size = inet6_get_link_af_size,
11b1f828 7420 .validate_link_af = inet6_validate_link_af,
f53adae4 7421 .set_link_af = inet6_set_link_af,
b382b191
TG
7422};
7423
1da177e4
LT
7424/*
7425 * Init / cleanup code
7426 */
7427
7428int __init addrconf_init(void)
7429{
a317a2f1 7430 struct inet6_dev *idev;
e66d1172 7431 int err;
2a8cc6c8 7432
e21e8467
SH
7433 err = ipv6_addr_label_init();
7434 if (err < 0) {
f3213831
JP
7435 pr_crit("%s: cannot initialize default policy table: %d\n",
7436 __func__, err);
2cc6d2bf 7437 goto out;
2a8cc6c8 7438 }
1da177e4 7439
2cc6d2bf
NH
7440 err = register_pernet_subsys(&addrconf_ops);
7441 if (err < 0)
7442 goto out_addrlabel;
e0da5a48 7443
dfd2ee08
ED
7444 /* All works using addrconf_wq need to lock rtnl. */
7445 addrconf_wq = create_singlethread_workqueue("ipv6_addrconf");
c15b1cca
HFS
7446 if (!addrconf_wq) {
7447 err = -ENOMEM;
7448 goto out_nowq;
7449 }
7450
1da177e4 7451 rtnl_lock();
e5f80fcf 7452 idev = ipv6_add_dev(blackhole_netdev);
1da177e4 7453 rtnl_unlock();
a317a2f1
WC
7454 if (IS_ERR(idev)) {
7455 err = PTR_ERR(idev);
e0da5a48 7456 goto errlo;
a317a2f1 7457 }
1da177e4 7458
2f460933
WC
7459 ip6_route_init_special_entries();
7460
1da177e4
LT
7461 register_netdevice_notifier(&ipv6_dev_notf);
7462
8805d13f 7463 addrconf_verify(&init_net);
c127ea2c 7464
3678a9d8 7465 rtnl_af_register(&inet6_ops);
b382b191 7466
16feebcf 7467 err = rtnl_register_module(THIS_MODULE, PF_INET6, RTM_GETLINK,
69fdb7e4 7468 NULL, inet6_dump_ifinfo, RTNL_FLAG_DUMP_UNLOCKED);
c127ea2c
TG
7469 if (err < 0)
7470 goto errout;
7471
16feebcf
FW
7472 err = rtnl_register_module(THIS_MODULE, PF_INET6, RTM_NEWADDR,
7473 inet6_rtm_newaddr, NULL, 0);
7474 if (err < 0)
7475 goto errout;
7476 err = rtnl_register_module(THIS_MODULE, PF_INET6, RTM_DELADDR,
7477 inet6_rtm_deladdr, NULL, 0);
7478 if (err < 0)
7479 goto errout;
7480 err = rtnl_register_module(THIS_MODULE, PF_INET6, RTM_GETADDR,
7481 inet6_rtm_getaddr, inet6_dump_ifaddr,
7482 RTNL_FLAG_DOIT_UNLOCKED);
7483 if (err < 0)
7484 goto errout;
7485 err = rtnl_register_module(THIS_MODULE, PF_INET6, RTM_GETMULTICAST,
7486 NULL, inet6_dump_ifmcaddr, 0);
7487 if (err < 0)
7488 goto errout;
7489 err = rtnl_register_module(THIS_MODULE, PF_INET6, RTM_GETANYCAST,
7490 NULL, inet6_dump_ifacaddr, 0);
7491 if (err < 0)
7492 goto errout;
7493 err = rtnl_register_module(THIS_MODULE, PF_INET6, RTM_GETNETCONF,
7494 inet6_netconf_get_devconf,
7495 inet6_netconf_dump_devconf,
7496 RTNL_FLAG_DOIT_UNLOCKED);
7497 if (err < 0)
7498 goto errout;
a3fde2ad
FW
7499 err = ipv6_addr_label_rtnl_register();
7500 if (err < 0)
7501 goto errout;
2a8cc6c8 7502
1da177e4 7503 return 0;
c127ea2c 7504errout:
16feebcf 7505 rtnl_unregister_all(PF_INET6);
b382b191 7506 rtnl_af_unregister(&inet6_ops);
c127ea2c 7507 unregister_netdevice_notifier(&ipv6_dev_notf);
e0da5a48 7508errlo:
c15b1cca
HFS
7509 destroy_workqueue(addrconf_wq);
7510out_nowq:
e0da5a48 7511 unregister_pernet_subsys(&addrconf_ops);
2cc6d2bf
NH
7512out_addrlabel:
7513 ipv6_addr_label_cleanup();
7514out:
c127ea2c 7515 return err;
1da177e4
LT
7516}
7517
09f7709f 7518void addrconf_cleanup(void)
1da177e4 7519{
176c39af 7520 struct net_device *dev;
1da177e4
LT
7521
7522 unregister_netdevice_notifier(&ipv6_dev_notf);
e0da5a48 7523 unregister_pernet_subsys(&addrconf_ops);
2cc6d2bf 7524 ipv6_addr_label_cleanup();
1da177e4 7525
5c45121d 7526 rtnl_af_unregister(&inet6_ops);
1da177e4 7527
5c45121d 7528 rtnl_lock();
b382b191 7529
176c39af
DL
7530 /* clean dev list */
7531 for_each_netdev(&init_net, dev) {
7532 if (__in6_dev_get(dev) == NULL)
7533 continue;
ae79dbf6 7534 addrconf_ifdown(dev, true);
176c39af 7535 }
ae79dbf6 7536 addrconf_ifdown(init_net.loopback_dev, true);
176c39af 7537
1da177e4 7538 rtnl_unlock();
c15b1cca
HFS
7539
7540 destroy_workqueue(addrconf_wq);
1da177e4 7541}