Commit | Line | Data |
---|---|---|
b2441318 | 1 | // SPDX-License-Identifier: GPL-2.0 |
2a8cc6c8 YH |
2 | /* |
3 | * IPv6 Address Label subsystem | |
4 | * for the IPv6 "Default" Source Address Selection | |
5 | * | |
6 | * Copyright (C)2007 USAGI/WIDE Project | |
7 | */ | |
8 | /* | |
9 | * Author: | |
1c8669e0 | 10 | * YOSHIFUJI Hideaki @ USAGI/WIDE Project <yoshfuji@linux-ipv6.org> |
2a8cc6c8 YH |
11 | */ |
12 | ||
13 | #include <linux/kernel.h> | |
14 | #include <linux/list.h> | |
15 | #include <linux/rcupdate.h> | |
16 | #include <linux/in6.h> | |
5a0e3ad6 | 17 | #include <linux/slab.h> |
2a8cc6c8 YH |
18 | #include <net/addrconf.h> |
19 | #include <linux/if_addrlabel.h> | |
20 | #include <linux/netlink.h> | |
21 | #include <linux/rtnetlink.h> | |
22 | ||
23 | #if 0 | |
24 | #define ADDRLABEL(x...) printk(x) | |
25 | #else | |
1c8669e0 | 26 | #define ADDRLABEL(x...) do { ; } while (0) |
2a8cc6c8 YH |
27 | #endif |
28 | ||
29 | /* | |
30 | * Policy Table | |
31 | */ | |
22b285d6 | 32 | struct ip6addrlbl_entry { |
2a8cc6c8 YH |
33 | struct in6_addr prefix; |
34 | int prefixlen; | |
35 | int ifindex; | |
36 | int addrtype; | |
37 | u32 label; | |
38 | struct hlist_node list; | |
2a8cc6c8 YH |
39 | struct rcu_head rcu; |
40 | }; | |
41 | ||
2a8cc6c8 | 42 | /* |
417962a0 | 43 | * Default policy table (RFC6724 + extensions) |
2a8cc6c8 YH |
44 | * |
45 | * prefix addr_type label | |
46 | * ------------------------------------------------------------------------- | |
47 | * ::1/128 LOOPBACK 0 | |
48 | * ::/0 N/A 1 | |
49 | * 2002::/16 N/A 2 | |
50 | * ::/96 COMPATv4 3 | |
51 | * ::ffff:0:0/96 V4MAPPED 4 | |
52 | * fc00::/7 N/A 5 ULA (RFC 4193) | |
53 | * 2001::/32 N/A 6 Teredo (RFC 4380) | |
5fe47b8a | 54 | * 2001:10::/28 N/A 7 ORCHID (RFC 4843) |
417962a0 YH |
55 | * fec0::/10 N/A 11 Site-local |
56 | * (deprecated by RFC3879) | |
57 | * 3ffe::/16 N/A 12 6bone | |
2a8cc6c8 YH |
58 | * |
59 | * Note: 0xffffffff is used if we do not have any policies. | |
417962a0 | 60 | * Note: Labels for ULA and 6to4 are different from labels listed in RFC6724. |
2a8cc6c8 YH |
61 | */ |
62 | ||
63 | #define IPV6_ADDR_LABEL_DEFAULT 0xffffffffUL | |
64 | ||
04a6f82c | 65 | static const __net_initconst struct ip6addrlbl_init_table |
2a8cc6c8 YH |
66 | { |
67 | const struct in6_addr *prefix; | |
68 | int prefixlen; | |
69 | u32 label; | |
70 | } ip6addrlbl_init_table[] = { | |
71 | { /* ::/0 */ | |
72 | .prefix = &in6addr_any, | |
73 | .label = 1, | |
1c8669e0 WY |
74 | }, { /* fc00::/7 */ |
75 | .prefix = &(struct in6_addr){ { { 0xfc } } } , | |
2a8cc6c8 YH |
76 | .prefixlen = 7, |
77 | .label = 5, | |
1c8669e0 WY |
78 | }, { /* fec0::/10 */ |
79 | .prefix = &(struct in6_addr){ { { 0xfe, 0xc0 } } }, | |
417962a0 YH |
80 | .prefixlen = 10, |
81 | .label = 11, | |
1c8669e0 WY |
82 | }, { /* 2002::/16 */ |
83 | .prefix = &(struct in6_addr){ { { 0x20, 0x02 } } }, | |
2a8cc6c8 YH |
84 | .prefixlen = 16, |
85 | .label = 2, | |
1c8669e0 WY |
86 | }, { /* 3ffe::/16 */ |
87 | .prefix = &(struct in6_addr){ { { 0x3f, 0xfe } } }, | |
417962a0 YH |
88 | .prefixlen = 16, |
89 | .label = 12, | |
1c8669e0 WY |
90 | }, { /* 2001::/32 */ |
91 | .prefix = &(struct in6_addr){ { { 0x20, 0x01 } } }, | |
2a8cc6c8 YH |
92 | .prefixlen = 32, |
93 | .label = 6, | |
1c8669e0 WY |
94 | }, { /* 2001:10::/28 */ |
95 | .prefix = &(struct in6_addr){ { { 0x20, 0x01, 0x00, 0x10 } } }, | |
5fe47b8a JMT |
96 | .prefixlen = 28, |
97 | .label = 7, | |
1c8669e0 WY |
98 | }, { /* ::ffff:0:0 */ |
99 | .prefix = &(struct in6_addr){ { { [10] = 0xff, [11] = 0xff } } }, | |
2a8cc6c8 YH |
100 | .prefixlen = 96, |
101 | .label = 4, | |
1c8669e0 | 102 | }, { /* ::/96 */ |
2a8cc6c8 YH |
103 | .prefix = &in6addr_any, |
104 | .prefixlen = 96, | |
105 | .label = 3, | |
1c8669e0 | 106 | }, { /* ::1/128 */ |
2a8cc6c8 YH |
107 | .prefix = &in6addr_loopback, |
108 | .prefixlen = 128, | |
109 | .label = 0, | |
110 | } | |
111 | }; | |
112 | ||
2a8cc6c8 | 113 | /* Find label */ |
a90c9347 | 114 | static bool __ip6addrlbl_match(const struct ip6addrlbl_entry *p, |
a50feda5 ED |
115 | const struct in6_addr *addr, |
116 | int addrtype, int ifindex) | |
2a8cc6c8 YH |
117 | { |
118 | if (p->ifindex && p->ifindex != ifindex) | |
a50feda5 | 119 | return false; |
2a8cc6c8 | 120 | if (p->addrtype && p->addrtype != addrtype) |
a50feda5 | 121 | return false; |
2a8cc6c8 | 122 | if (!ipv6_prefix_equal(addr, &p->prefix, p->prefixlen)) |
a50feda5 ED |
123 | return false; |
124 | return true; | |
2a8cc6c8 YH |
125 | } |
126 | ||
3de23255 BT |
127 | static struct ip6addrlbl_entry *__ipv6_addr_label(struct net *net, |
128 | const struct in6_addr *addr, | |
2a8cc6c8 YH |
129 | int type, int ifindex) |
130 | { | |
2a8cc6c8 | 131 | struct ip6addrlbl_entry *p; |
a90c9347 ED |
132 | |
133 | hlist_for_each_entry_rcu(p, &net->ipv6.ip6addrlbl_table.head, list) { | |
134 | if (__ip6addrlbl_match(p, addr, type, ifindex)) | |
2a8cc6c8 YH |
135 | return p; |
136 | } | |
137 | return NULL; | |
138 | } | |
139 | ||
3de23255 BT |
140 | u32 ipv6_addr_label(struct net *net, |
141 | const struct in6_addr *addr, int type, int ifindex) | |
2a8cc6c8 YH |
142 | { |
143 | u32 label; | |
144 | struct ip6addrlbl_entry *p; | |
145 | ||
146 | type &= IPV6_ADDR_MAPPED | IPV6_ADDR_COMPATv4 | IPV6_ADDR_LOOPBACK; | |
147 | ||
148 | rcu_read_lock(); | |
3de23255 | 149 | p = __ipv6_addr_label(net, addr, type, ifindex); |
2a8cc6c8 YH |
150 | label = p ? p->label : IPV6_ADDR_LABEL_DEFAULT; |
151 | rcu_read_unlock(); | |
152 | ||
5b095d98 | 153 | ADDRLABEL(KERN_DEBUG "%s(addr=%pI6, type=%d, ifindex=%d) => %08x\n", |
0c6ce78a | 154 | __func__, addr, type, ifindex, label); |
2a8cc6c8 YH |
155 | |
156 | return label; | |
157 | } | |
158 | ||
159 | /* allocate one entry */ | |
a90c9347 | 160 | static struct ip6addrlbl_entry *ip6addrlbl_alloc(const struct in6_addr *prefix, |
40fee36e YH |
161 | int prefixlen, int ifindex, |
162 | u32 label) | |
2a8cc6c8 YH |
163 | { |
164 | struct ip6addrlbl_entry *newp; | |
165 | int addrtype; | |
166 | ||
5b095d98 | 167 | ADDRLABEL(KERN_DEBUG "%s(prefix=%pI6, prefixlen=%d, ifindex=%d, label=%u)\n", |
0c6ce78a | 168 | __func__, prefix, prefixlen, ifindex, (unsigned int)label); |
2a8cc6c8 YH |
169 | |
170 | addrtype = ipv6_addr_type(prefix) & (IPV6_ADDR_MAPPED | IPV6_ADDR_COMPATv4 | IPV6_ADDR_LOOPBACK); | |
171 | ||
172 | switch (addrtype) { | |
173 | case IPV6_ADDR_MAPPED: | |
174 | if (prefixlen > 96) | |
175 | return ERR_PTR(-EINVAL); | |
176 | if (prefixlen < 96) | |
177 | addrtype = 0; | |
178 | break; | |
179 | case IPV6_ADDR_COMPATv4: | |
180 | if (prefixlen != 96) | |
181 | addrtype = 0; | |
182 | break; | |
183 | case IPV6_ADDR_LOOPBACK: | |
184 | if (prefixlen != 128) | |
185 | addrtype = 0; | |
186 | break; | |
187 | } | |
188 | ||
189 | newp = kmalloc(sizeof(*newp), GFP_KERNEL); | |
190 | if (!newp) | |
191 | return ERR_PTR(-ENOMEM); | |
192 | ||
193 | ipv6_addr_prefix(&newp->prefix, prefix, prefixlen); | |
194 | newp->prefixlen = prefixlen; | |
195 | newp->ifindex = ifindex; | |
196 | newp->addrtype = addrtype; | |
197 | newp->label = label; | |
198 | INIT_HLIST_NODE(&newp->list); | |
2a8cc6c8 YH |
199 | return newp; |
200 | } | |
201 | ||
202 | /* add a label */ | |
a90c9347 ED |
203 | static int __ip6addrlbl_add(struct net *net, struct ip6addrlbl_entry *newp, |
204 | int replace) | |
2a8cc6c8 | 205 | { |
639739b5 | 206 | struct ip6addrlbl_entry *last = NULL, *p = NULL; |
a90c9347 | 207 | struct hlist_node *n; |
2a8cc6c8 YH |
208 | int ret = 0; |
209 | ||
639739b5 HFS |
210 | ADDRLABEL(KERN_DEBUG "%s(newp=%p, replace=%d)\n", __func__, newp, |
211 | replace); | |
2a8cc6c8 | 212 | |
a90c9347 | 213 | hlist_for_each_entry_safe(p, n, &net->ipv6.ip6addrlbl_table.head, list) { |
639739b5 | 214 | if (p->prefixlen == newp->prefixlen && |
639739b5 HFS |
215 | p->ifindex == newp->ifindex && |
216 | ipv6_addr_equal(&p->prefix, &newp->prefix)) { | |
217 | if (!replace) { | |
218 | ret = -EEXIST; | |
2a8cc6c8 YH |
219 | goto out; |
220 | } | |
639739b5 | 221 | hlist_replace_rcu(&p->list, &newp->list); |
2809c095 | 222 | kfree_rcu(p, rcu); |
639739b5 HFS |
223 | goto out; |
224 | } else if ((p->prefixlen == newp->prefixlen && !p->ifindex) || | |
225 | (p->prefixlen < newp->prefixlen)) { | |
226 | hlist_add_before_rcu(&newp->list, &p->list); | |
227 | goto out; | |
2a8cc6c8 | 228 | } |
639739b5 | 229 | last = p; |
2a8cc6c8 | 230 | } |
639739b5 | 231 | if (last) |
1d023284 | 232 | hlist_add_behind_rcu(&newp->list, &last->list); |
639739b5 | 233 | else |
a90c9347 | 234 | hlist_add_head_rcu(&newp->list, &net->ipv6.ip6addrlbl_table.head); |
2a8cc6c8 YH |
235 | out: |
236 | if (!ret) | |
a90c9347 | 237 | net->ipv6.ip6addrlbl_table.seq++; |
2a8cc6c8 YH |
238 | return ret; |
239 | } | |
240 | ||
241 | /* add a label */ | |
3de23255 BT |
242 | static int ip6addrlbl_add(struct net *net, |
243 | const struct in6_addr *prefix, int prefixlen, | |
40fee36e | 244 | int ifindex, u32 label, int replace) |
2a8cc6c8 YH |
245 | { |
246 | struct ip6addrlbl_entry *newp; | |
247 | int ret = 0; | |
248 | ||
5b095d98 | 249 | ADDRLABEL(KERN_DEBUG "%s(prefix=%pI6, prefixlen=%d, ifindex=%d, label=%u, replace=%d)\n", |
0c6ce78a HH |
250 | __func__, prefix, prefixlen, ifindex, (unsigned int)label, |
251 | replace); | |
2a8cc6c8 | 252 | |
a90c9347 | 253 | newp = ip6addrlbl_alloc(prefix, prefixlen, ifindex, label); |
2a8cc6c8 YH |
254 | if (IS_ERR(newp)) |
255 | return PTR_ERR(newp); | |
a90c9347 ED |
256 | spin_lock(&net->ipv6.ip6addrlbl_table.lock); |
257 | ret = __ip6addrlbl_add(net, newp, replace); | |
258 | spin_unlock(&net->ipv6.ip6addrlbl_table.lock); | |
2a8cc6c8 | 259 | if (ret) |
2809c095 | 260 | kfree(newp); |
2a8cc6c8 YH |
261 | return ret; |
262 | } | |
263 | ||
264 | /* remove a label */ | |
3de23255 BT |
265 | static int __ip6addrlbl_del(struct net *net, |
266 | const struct in6_addr *prefix, int prefixlen, | |
40fee36e | 267 | int ifindex) |
2a8cc6c8 YH |
268 | { |
269 | struct ip6addrlbl_entry *p = NULL; | |
b67bfe0d | 270 | struct hlist_node *n; |
2a8cc6c8 YH |
271 | int ret = -ESRCH; |
272 | ||
5b095d98 | 273 | ADDRLABEL(KERN_DEBUG "%s(prefix=%pI6, prefixlen=%d, ifindex=%d)\n", |
0c6ce78a | 274 | __func__, prefix, prefixlen, ifindex); |
2a8cc6c8 | 275 | |
a90c9347 | 276 | hlist_for_each_entry_safe(p, n, &net->ipv6.ip6addrlbl_table.head, list) { |
2a8cc6c8 YH |
277 | if (p->prefixlen == prefixlen && |
278 | p->ifindex == ifindex && | |
279 | ipv6_addr_equal(&p->prefix, prefix)) { | |
280 | hlist_del_rcu(&p->list); | |
2809c095 | 281 | kfree_rcu(p, rcu); |
2a8cc6c8 YH |
282 | ret = 0; |
283 | break; | |
284 | } | |
285 | } | |
286 | return ret; | |
287 | } | |
288 | ||
3de23255 BT |
289 | static int ip6addrlbl_del(struct net *net, |
290 | const struct in6_addr *prefix, int prefixlen, | |
40fee36e | 291 | int ifindex) |
2a8cc6c8 YH |
292 | { |
293 | struct in6_addr prefix_buf; | |
294 | int ret; | |
295 | ||
5b095d98 | 296 | ADDRLABEL(KERN_DEBUG "%s(prefix=%pI6, prefixlen=%d, ifindex=%d)\n", |
0c6ce78a | 297 | __func__, prefix, prefixlen, ifindex); |
2a8cc6c8 YH |
298 | |
299 | ipv6_addr_prefix(&prefix_buf, prefix, prefixlen); | |
a90c9347 | 300 | spin_lock(&net->ipv6.ip6addrlbl_table.lock); |
3de23255 | 301 | ret = __ip6addrlbl_del(net, &prefix_buf, prefixlen, ifindex); |
a90c9347 | 302 | spin_unlock(&net->ipv6.ip6addrlbl_table.lock); |
2a8cc6c8 YH |
303 | return ret; |
304 | } | |
305 | ||
306 | /* add default label */ | |
3de23255 | 307 | static int __net_init ip6addrlbl_net_init(struct net *net) |
2a8cc6c8 YH |
308 | { |
309 | int err = 0; | |
310 | int i; | |
311 | ||
f3213831 | 312 | ADDRLABEL(KERN_DEBUG "%s\n", __func__); |
2a8cc6c8 | 313 | |
a90c9347 ED |
314 | spin_lock_init(&net->ipv6.ip6addrlbl_table.lock); |
315 | INIT_HLIST_HEAD(&net->ipv6.ip6addrlbl_table.head); | |
316 | ||
2a8cc6c8 | 317 | for (i = 0; i < ARRAY_SIZE(ip6addrlbl_init_table); i++) { |
3de23255 BT |
318 | int ret = ip6addrlbl_add(net, |
319 | ip6addrlbl_init_table[i].prefix, | |
2a8cc6c8 YH |
320 | ip6addrlbl_init_table[i].prefixlen, |
321 | 0, | |
322 | ip6addrlbl_init_table[i].label, 0); | |
323 | /* XXX: should we free all rules when we catch an error? */ | |
324 | if (ret && (!err || err != -ENOMEM)) | |
325 | err = ret; | |
326 | } | |
327 | return err; | |
328 | } | |
329 | ||
3de23255 BT |
330 | static void __net_exit ip6addrlbl_net_exit(struct net *net) |
331 | { | |
332 | struct ip6addrlbl_entry *p = NULL; | |
b67bfe0d | 333 | struct hlist_node *n; |
3de23255 BT |
334 | |
335 | /* Remove all labels belonging to the exiting net */ | |
a90c9347 ED |
336 | spin_lock(&net->ipv6.ip6addrlbl_table.lock); |
337 | hlist_for_each_entry_safe(p, n, &net->ipv6.ip6addrlbl_table.head, list) { | |
338 | hlist_del_rcu(&p->list); | |
2809c095 | 339 | kfree_rcu(p, rcu); |
3de23255 | 340 | } |
a90c9347 | 341 | spin_unlock(&net->ipv6.ip6addrlbl_table.lock); |
3de23255 BT |
342 | } |
343 | ||
344 | static struct pernet_operations ipv6_addr_label_ops = { | |
345 | .init = ip6addrlbl_net_init, | |
346 | .exit = ip6addrlbl_net_exit, | |
347 | }; | |
348 | ||
2a8cc6c8 YH |
349 | int __init ipv6_addr_label_init(void) |
350 | { | |
3de23255 | 351 | return register_pernet_subsys(&ipv6_addr_label_ops); |
2a8cc6c8 YH |
352 | } |
353 | ||
2cc6d2bf NH |
354 | void ipv6_addr_label_cleanup(void) |
355 | { | |
356 | unregister_pernet_subsys(&ipv6_addr_label_ops); | |
357 | } | |
358 | ||
2a8cc6c8 YH |
359 | static const struct nla_policy ifal_policy[IFAL_MAX+1] = { |
360 | [IFAL_ADDRESS] = { .len = sizeof(struct in6_addr), }, | |
361 | [IFAL_LABEL] = { .len = sizeof(u32), }, | |
362 | }; | |
363 | ||
a6f57028 FW |
364 | static bool addrlbl_ifindex_exists(struct net *net, int ifindex) |
365 | { | |
366 | ||
367 | struct net_device *dev; | |
368 | ||
369 | rcu_read_lock(); | |
370 | dev = dev_get_by_index_rcu(net, ifindex); | |
371 | rcu_read_unlock(); | |
372 | ||
373 | return dev != NULL; | |
374 | } | |
375 | ||
c21ef3e3 DA |
376 | static int ip6addrlbl_newdel(struct sk_buff *skb, struct nlmsghdr *nlh, |
377 | struct netlink_ext_ack *extack) | |
2a8cc6c8 | 378 | { |
3b1e0a65 | 379 | struct net *net = sock_net(skb->sk); |
2a8cc6c8 YH |
380 | struct ifaddrlblmsg *ifal; |
381 | struct nlattr *tb[IFAL_MAX+1]; | |
382 | struct in6_addr *pfx; | |
383 | u32 label; | |
384 | int err = 0; | |
385 | ||
c21ef3e3 DA |
386 | err = nlmsg_parse(nlh, sizeof(*ifal), tb, IFAL_MAX, ifal_policy, |
387 | extack); | |
2a8cc6c8 YH |
388 | if (err < 0) |
389 | return err; | |
390 | ||
391 | ifal = nlmsg_data(nlh); | |
392 | ||
393 | if (ifal->ifal_family != AF_INET6 || | |
394 | ifal->ifal_prefixlen > 128) | |
395 | return -EINVAL; | |
396 | ||
2a8cc6c8 YH |
397 | if (!tb[IFAL_ADDRESS]) |
398 | return -EINVAL; | |
2a8cc6c8 | 399 | pfx = nla_data(tb[IFAL_ADDRESS]); |
2a8cc6c8 YH |
400 | |
401 | if (!tb[IFAL_LABEL]) | |
402 | return -EINVAL; | |
403 | label = nla_get_u32(tb[IFAL_LABEL]); | |
404 | if (label == IPV6_ADDR_LABEL_DEFAULT) | |
405 | return -EINVAL; | |
406 | ||
1c8669e0 | 407 | switch (nlh->nlmsg_type) { |
2a8cc6c8 | 408 | case RTM_NEWADDRLABEL: |
0771275b | 409 | if (ifal->ifal_index && |
a6f57028 | 410 | !addrlbl_ifindex_exists(net, ifal->ifal_index)) |
0771275b FW |
411 | return -EINVAL; |
412 | ||
3de23255 | 413 | err = ip6addrlbl_add(net, pfx, ifal->ifal_prefixlen, |
2a8cc6c8 YH |
414 | ifal->ifal_index, label, |
415 | nlh->nlmsg_flags & NLM_F_REPLACE); | |
416 | break; | |
417 | case RTM_DELADDRLABEL: | |
3de23255 | 418 | err = ip6addrlbl_del(net, pfx, ifal->ifal_prefixlen, |
2a8cc6c8 YH |
419 | ifal->ifal_index); |
420 | break; | |
421 | default: | |
422 | err = -EOPNOTSUPP; | |
423 | } | |
424 | return err; | |
425 | } | |
426 | ||
a50feda5 ED |
427 | static void ip6addrlbl_putmsg(struct nlmsghdr *nlh, |
428 | int prefixlen, int ifindex, u32 lseq) | |
2a8cc6c8 YH |
429 | { |
430 | struct ifaddrlblmsg *ifal = nlmsg_data(nlh); | |
431 | ifal->ifal_family = AF_INET6; | |
432 | ifal->ifal_prefixlen = prefixlen; | |
433 | ifal->ifal_flags = 0; | |
434 | ifal->ifal_index = ifindex; | |
435 | ifal->ifal_seq = lseq; | |
436 | }; | |
437 | ||
438 | static int ip6addrlbl_fill(struct sk_buff *skb, | |
439 | struct ip6addrlbl_entry *p, | |
440 | u32 lseq, | |
15e47304 | 441 | u32 portid, u32 seq, int event, |
2a8cc6c8 YH |
442 | unsigned int flags) |
443 | { | |
15e47304 | 444 | struct nlmsghdr *nlh = nlmsg_put(skb, portid, seq, event, |
2a8cc6c8 YH |
445 | sizeof(struct ifaddrlblmsg), flags); |
446 | if (!nlh) | |
447 | return -EMSGSIZE; | |
448 | ||
449 | ip6addrlbl_putmsg(nlh, p->prefixlen, p->ifindex, lseq); | |
450 | ||
930345ea | 451 | if (nla_put_in6_addr(skb, IFAL_ADDRESS, &p->prefix) < 0 || |
2a8cc6c8 YH |
452 | nla_put_u32(skb, IFAL_LABEL, p->label) < 0) { |
453 | nlmsg_cancel(skb, nlh); | |
454 | return -EMSGSIZE; | |
455 | } | |
456 | ||
053c095a JB |
457 | nlmsg_end(skb, nlh); |
458 | return 0; | |
2a8cc6c8 YH |
459 | } |
460 | ||
461 | static int ip6addrlbl_dump(struct sk_buff *skb, struct netlink_callback *cb) | |
462 | { | |
3b1e0a65 | 463 | struct net *net = sock_net(skb->sk); |
2a8cc6c8 | 464 | struct ip6addrlbl_entry *p; |
2a8cc6c8 YH |
465 | int idx = 0, s_idx = cb->args[0]; |
466 | int err; | |
467 | ||
468 | rcu_read_lock(); | |
a90c9347 ED |
469 | hlist_for_each_entry_rcu(p, &net->ipv6.ip6addrlbl_table.head, list) { |
470 | if (idx >= s_idx) { | |
cb6e926e | 471 | err = ip6addrlbl_fill(skb, p, |
a90c9347 | 472 | net->ipv6.ip6addrlbl_table.seq, |
cb6e926e WY |
473 | NETLINK_CB(cb->skb).portid, |
474 | cb->nlh->nlmsg_seq, | |
475 | RTM_NEWADDRLABEL, | |
476 | NLM_F_MULTI); | |
053c095a | 477 | if (err < 0) |
2a8cc6c8 YH |
478 | break; |
479 | } | |
480 | idx++; | |
481 | } | |
482 | rcu_read_unlock(); | |
483 | cb->args[0] = idx; | |
484 | return skb->len; | |
485 | } | |
486 | ||
487 | static inline int ip6addrlbl_msgsize(void) | |
488 | { | |
a02cec21 | 489 | return NLMSG_ALIGN(sizeof(struct ifaddrlblmsg)) |
2a8cc6c8 | 490 | + nla_total_size(16) /* IFAL_ADDRESS */ |
a02cec21 | 491 | + nla_total_size(4); /* IFAL_LABEL */ |
2a8cc6c8 YH |
492 | } |
493 | ||
c21ef3e3 DA |
494 | static int ip6addrlbl_get(struct sk_buff *in_skb, struct nlmsghdr *nlh, |
495 | struct netlink_ext_ack *extack) | |
2a8cc6c8 | 496 | { |
3b1e0a65 | 497 | struct net *net = sock_net(in_skb->sk); |
2a8cc6c8 YH |
498 | struct ifaddrlblmsg *ifal; |
499 | struct nlattr *tb[IFAL_MAX+1]; | |
500 | struct in6_addr *addr; | |
501 | u32 lseq; | |
502 | int err = 0; | |
503 | struct ip6addrlbl_entry *p; | |
504 | struct sk_buff *skb; | |
505 | ||
c21ef3e3 DA |
506 | err = nlmsg_parse(nlh, sizeof(*ifal), tb, IFAL_MAX, ifal_policy, |
507 | extack); | |
2a8cc6c8 YH |
508 | if (err < 0) |
509 | return err; | |
510 | ||
511 | ifal = nlmsg_data(nlh); | |
512 | ||
513 | if (ifal->ifal_family != AF_INET6 || | |
514 | ifal->ifal_prefixlen != 128) | |
515 | return -EINVAL; | |
516 | ||
517 | if (ifal->ifal_index && | |
a6f57028 | 518 | !addrlbl_ifindex_exists(net, ifal->ifal_index)) |
2a8cc6c8 YH |
519 | return -EINVAL; |
520 | ||
521 | if (!tb[IFAL_ADDRESS]) | |
522 | return -EINVAL; | |
2a8cc6c8 | 523 | addr = nla_data(tb[IFAL_ADDRESS]); |
2a8cc6c8 | 524 | |
cb6e926e | 525 | skb = nlmsg_new(ip6addrlbl_msgsize(), GFP_KERNEL); |
66c77ff3 | 526 | if (!skb) |
2a8cc6c8 | 527 | return -ENOBUFS; |
2a8cc6c8 | 528 | |
66c77ff3 | 529 | err = -ESRCH; |
2a8cc6c8 | 530 | |
66c77ff3 ED |
531 | rcu_read_lock(); |
532 | p = __ipv6_addr_label(net, addr, ipv6_addr_type(addr), ifal->ifal_index); | |
533 | lseq = net->ipv6.ip6addrlbl_table.seq; | |
534 | if (p) | |
535 | err = ip6addrlbl_fill(skb, p, lseq, | |
536 | NETLINK_CB(in_skb).portid, | |
537 | nlh->nlmsg_seq, | |
538 | RTM_NEWADDRLABEL, 0); | |
539 | rcu_read_unlock(); | |
2a8cc6c8 YH |
540 | |
541 | if (err < 0) { | |
542 | WARN_ON(err == -EMSGSIZE); | |
543 | kfree_skb(skb); | |
66c77ff3 ED |
544 | } else { |
545 | err = rtnl_unicast(skb, net, NETLINK_CB(in_skb).portid); | |
2a8cc6c8 | 546 | } |
2a8cc6c8 YH |
547 | return err; |
548 | } | |
549 | ||
550 | void __init ipv6_addr_label_rtnl_register(void) | |
551 | { | |
c7ac8679 | 552 | __rtnl_register(PF_INET6, RTM_NEWADDRLABEL, ip6addrlbl_newdel, |
a6f57028 | 553 | NULL, RTNL_FLAG_DOIT_UNLOCKED); |
c7ac8679 | 554 | __rtnl_register(PF_INET6, RTM_DELADDRLABEL, ip6addrlbl_newdel, |
a6f57028 | 555 | NULL, RTNL_FLAG_DOIT_UNLOCKED); |
c7ac8679 | 556 | __rtnl_register(PF_INET6, RTM_GETADDRLABEL, ip6addrlbl_get, |
a6f57028 | 557 | ip6addrlbl_dump, RTNL_FLAG_DOIT_UNLOCKED); |
2a8cc6c8 YH |
558 | } |
559 |