1 // SPDX-License-Identifier: GPL-2.0
3 * IPv6 Address Label subsystem
4 * for the IPv6 "Default" Source Address Selection
6 * Copyright (C)2007 USAGI/WIDE Project
10 * YOSHIFUJI Hideaki @ USAGI/WIDE Project <yoshfuji@linux-ipv6.org>
13 #include <linux/kernel.h>
14 #include <linux/list.h>
15 #include <linux/rcupdate.h>
16 #include <linux/in6.h>
17 #include <linux/slab.h>
18 #include <net/addrconf.h>
19 #include <linux/if_addrlabel.h>
20 #include <linux/netlink.h>
21 #include <linux/rtnetlink.h>
24 #define ADDRLABEL(x...) printk(x)
26 #define ADDRLABEL(x...) do { ; } while (0)
32 struct ip6addrlbl_entry
{
33 struct in6_addr prefix
;
38 struct hlist_node list
;
43 * Default policy table (RFC6724 + extensions)
45 * prefix addr_type label
46 * -------------------------------------------------------------------------
51 * ::ffff:0:0/96 V4MAPPED 4
52 * fc00::/7 N/A 5 ULA (RFC 4193)
53 * 2001::/32 N/A 6 Teredo (RFC 4380)
54 * 2001:10::/28 N/A 7 ORCHID (RFC 4843)
55 * fec0::/10 N/A 11 Site-local
56 * (deprecated by RFC3879)
57 * 3ffe::/16 N/A 12 6bone
59 * Note: 0xffffffff is used if we do not have any policies.
60 * Note: Labels for ULA and 6to4 are different from labels listed in RFC6724.
63 #define IPV6_ADDR_LABEL_DEFAULT 0xffffffffUL
65 static const __net_initconst
struct ip6addrlbl_init_table
67 const struct in6_addr
*prefix
;
70 } ip6addrlbl_init_table
[] = {
72 .prefix
= &in6addr_any
,
75 .prefix
= &(struct in6_addr
){ { { 0xfc } } } ,
79 .prefix
= &(struct in6_addr
){ { { 0xfe, 0xc0 } } },
83 .prefix
= &(struct in6_addr
){ { { 0x20, 0x02 } } },
87 .prefix
= &(struct in6_addr
){ { { 0x3f, 0xfe } } },
91 .prefix
= &(struct in6_addr
){ { { 0x20, 0x01 } } },
94 }, { /* 2001:10::/28 */
95 .prefix
= &(struct in6_addr
){ { { 0x20, 0x01, 0x00, 0x10 } } },
99 .prefix
= &(struct in6_addr
){ { { [10] = 0xff, [11] = 0xff } } },
103 .prefix
= &in6addr_any
,
107 .prefix
= &in6addr_loopback
,
114 static bool __ip6addrlbl_match(const struct ip6addrlbl_entry
*p
,
115 const struct in6_addr
*addr
,
116 int addrtype
, int ifindex
)
118 if (p
->ifindex
&& p
->ifindex
!= ifindex
)
120 if (p
->addrtype
&& p
->addrtype
!= addrtype
)
122 if (!ipv6_prefix_equal(addr
, &p
->prefix
, p
->prefixlen
))
127 static struct ip6addrlbl_entry
*__ipv6_addr_label(struct net
*net
,
128 const struct in6_addr
*addr
,
129 int type
, int ifindex
)
131 struct ip6addrlbl_entry
*p
;
133 hlist_for_each_entry_rcu(p
, &net
->ipv6
.ip6addrlbl_table
.head
, list
) {
134 if (__ip6addrlbl_match(p
, addr
, type
, ifindex
))
140 u32
ipv6_addr_label(struct net
*net
,
141 const struct in6_addr
*addr
, int type
, int ifindex
)
144 struct ip6addrlbl_entry
*p
;
146 type
&= IPV6_ADDR_MAPPED
| IPV6_ADDR_COMPATv4
| IPV6_ADDR_LOOPBACK
;
149 p
= __ipv6_addr_label(net
, addr
, type
, ifindex
);
150 label
= p
? p
->label
: IPV6_ADDR_LABEL_DEFAULT
;
153 ADDRLABEL(KERN_DEBUG
"%s(addr=%pI6, type=%d, ifindex=%d) => %08x\n",
154 __func__
, addr
, type
, ifindex
, label
);
159 /* allocate one entry */
160 static struct ip6addrlbl_entry
*ip6addrlbl_alloc(const struct in6_addr
*prefix
,
161 int prefixlen
, int ifindex
,
164 struct ip6addrlbl_entry
*newp
;
167 ADDRLABEL(KERN_DEBUG
"%s(prefix=%pI6, prefixlen=%d, ifindex=%d, label=%u)\n",
168 __func__
, prefix
, prefixlen
, ifindex
, (unsigned int)label
);
170 addrtype
= ipv6_addr_type(prefix
) & (IPV6_ADDR_MAPPED
| IPV6_ADDR_COMPATv4
| IPV6_ADDR_LOOPBACK
);
173 case IPV6_ADDR_MAPPED
:
175 return ERR_PTR(-EINVAL
);
179 case IPV6_ADDR_COMPATv4
:
183 case IPV6_ADDR_LOOPBACK
:
184 if (prefixlen
!= 128)
189 newp
= kmalloc(sizeof(*newp
), GFP_KERNEL
);
191 return ERR_PTR(-ENOMEM
);
193 ipv6_addr_prefix(&newp
->prefix
, prefix
, prefixlen
);
194 newp
->prefixlen
= prefixlen
;
195 newp
->ifindex
= ifindex
;
196 newp
->addrtype
= addrtype
;
198 INIT_HLIST_NODE(&newp
->list
);
203 static int __ip6addrlbl_add(struct net
*net
, struct ip6addrlbl_entry
*newp
,
206 struct ip6addrlbl_entry
*last
= NULL
, *p
= NULL
;
207 struct hlist_node
*n
;
210 ADDRLABEL(KERN_DEBUG
"%s(newp=%p, replace=%d)\n", __func__
, newp
,
213 hlist_for_each_entry_safe(p
, n
, &net
->ipv6
.ip6addrlbl_table
.head
, list
) {
214 if (p
->prefixlen
== newp
->prefixlen
&&
215 p
->ifindex
== newp
->ifindex
&&
216 ipv6_addr_equal(&p
->prefix
, &newp
->prefix
)) {
221 hlist_replace_rcu(&p
->list
, &newp
->list
);
224 } else if ((p
->prefixlen
== newp
->prefixlen
&& !p
->ifindex
) ||
225 (p
->prefixlen
< newp
->prefixlen
)) {
226 hlist_add_before_rcu(&newp
->list
, &p
->list
);
232 hlist_add_behind_rcu(&newp
->list
, &last
->list
);
234 hlist_add_head_rcu(&newp
->list
, &net
->ipv6
.ip6addrlbl_table
.head
);
237 net
->ipv6
.ip6addrlbl_table
.seq
++;
242 static int ip6addrlbl_add(struct net
*net
,
243 const struct in6_addr
*prefix
, int prefixlen
,
244 int ifindex
, u32 label
, int replace
)
246 struct ip6addrlbl_entry
*newp
;
249 ADDRLABEL(KERN_DEBUG
"%s(prefix=%pI6, prefixlen=%d, ifindex=%d, label=%u, replace=%d)\n",
250 __func__
, prefix
, prefixlen
, ifindex
, (unsigned int)label
,
253 newp
= ip6addrlbl_alloc(prefix
, prefixlen
, ifindex
, label
);
255 return PTR_ERR(newp
);
256 spin_lock(&net
->ipv6
.ip6addrlbl_table
.lock
);
257 ret
= __ip6addrlbl_add(net
, newp
, replace
);
258 spin_unlock(&net
->ipv6
.ip6addrlbl_table
.lock
);
265 static int __ip6addrlbl_del(struct net
*net
,
266 const struct in6_addr
*prefix
, int prefixlen
,
269 struct ip6addrlbl_entry
*p
= NULL
;
270 struct hlist_node
*n
;
273 ADDRLABEL(KERN_DEBUG
"%s(prefix=%pI6, prefixlen=%d, ifindex=%d)\n",
274 __func__
, prefix
, prefixlen
, ifindex
);
276 hlist_for_each_entry_safe(p
, n
, &net
->ipv6
.ip6addrlbl_table
.head
, list
) {
277 if (p
->prefixlen
== prefixlen
&&
278 p
->ifindex
== ifindex
&&
279 ipv6_addr_equal(&p
->prefix
, prefix
)) {
280 hlist_del_rcu(&p
->list
);
289 static int ip6addrlbl_del(struct net
*net
,
290 const struct in6_addr
*prefix
, int prefixlen
,
293 struct in6_addr prefix_buf
;
296 ADDRLABEL(KERN_DEBUG
"%s(prefix=%pI6, prefixlen=%d, ifindex=%d)\n",
297 __func__
, prefix
, prefixlen
, ifindex
);
299 ipv6_addr_prefix(&prefix_buf
, prefix
, prefixlen
);
300 spin_lock(&net
->ipv6
.ip6addrlbl_table
.lock
);
301 ret
= __ip6addrlbl_del(net
, &prefix_buf
, prefixlen
, ifindex
);
302 spin_unlock(&net
->ipv6
.ip6addrlbl_table
.lock
);
306 /* add default label */
307 static int __net_init
ip6addrlbl_net_init(struct net
*net
)
312 ADDRLABEL(KERN_DEBUG
"%s\n", __func__
);
314 spin_lock_init(&net
->ipv6
.ip6addrlbl_table
.lock
);
315 INIT_HLIST_HEAD(&net
->ipv6
.ip6addrlbl_table
.head
);
317 for (i
= 0; i
< ARRAY_SIZE(ip6addrlbl_init_table
); i
++) {
318 int ret
= ip6addrlbl_add(net
,
319 ip6addrlbl_init_table
[i
].prefix
,
320 ip6addrlbl_init_table
[i
].prefixlen
,
322 ip6addrlbl_init_table
[i
].label
, 0);
323 /* XXX: should we free all rules when we catch an error? */
324 if (ret
&& (!err
|| err
!= -ENOMEM
))
330 static void __net_exit
ip6addrlbl_net_exit(struct net
*net
)
332 struct ip6addrlbl_entry
*p
= NULL
;
333 struct hlist_node
*n
;
335 /* Remove all labels belonging to the exiting net */
336 spin_lock(&net
->ipv6
.ip6addrlbl_table
.lock
);
337 hlist_for_each_entry_safe(p
, n
, &net
->ipv6
.ip6addrlbl_table
.head
, list
) {
338 hlist_del_rcu(&p
->list
);
341 spin_unlock(&net
->ipv6
.ip6addrlbl_table
.lock
);
344 static struct pernet_operations ipv6_addr_label_ops
= {
345 .init
= ip6addrlbl_net_init
,
346 .exit
= ip6addrlbl_net_exit
,
349 int __init
ipv6_addr_label_init(void)
351 return register_pernet_subsys(&ipv6_addr_label_ops
);
354 void ipv6_addr_label_cleanup(void)
356 unregister_pernet_subsys(&ipv6_addr_label_ops
);
359 static const struct nla_policy ifal_policy
[IFAL_MAX
+1] = {
360 [IFAL_ADDRESS
] = { .len
= sizeof(struct in6_addr
), },
361 [IFAL_LABEL
] = { .len
= sizeof(u32
), },
364 static bool addrlbl_ifindex_exists(struct net
*net
, int ifindex
)
367 struct net_device
*dev
;
370 dev
= dev_get_by_index_rcu(net
, ifindex
);
376 static int ip6addrlbl_newdel(struct sk_buff
*skb
, struct nlmsghdr
*nlh
,
377 struct netlink_ext_ack
*extack
)
379 struct net
*net
= sock_net(skb
->sk
);
380 struct ifaddrlblmsg
*ifal
;
381 struct nlattr
*tb
[IFAL_MAX
+1];
382 struct in6_addr
*pfx
;
386 err
= nlmsg_parse_deprecated(nlh
, sizeof(*ifal
), tb
, IFAL_MAX
,
387 ifal_policy
, extack
);
391 ifal
= nlmsg_data(nlh
);
393 if (ifal
->ifal_family
!= AF_INET6
||
394 ifal
->ifal_prefixlen
> 128)
397 if (!tb
[IFAL_ADDRESS
])
399 pfx
= nla_data(tb
[IFAL_ADDRESS
]);
403 label
= nla_get_u32(tb
[IFAL_LABEL
]);
404 if (label
== IPV6_ADDR_LABEL_DEFAULT
)
407 switch (nlh
->nlmsg_type
) {
408 case RTM_NEWADDRLABEL
:
409 if (ifal
->ifal_index
&&
410 !addrlbl_ifindex_exists(net
, ifal
->ifal_index
))
413 err
= ip6addrlbl_add(net
, pfx
, ifal
->ifal_prefixlen
,
414 ifal
->ifal_index
, label
,
415 nlh
->nlmsg_flags
& NLM_F_REPLACE
);
417 case RTM_DELADDRLABEL
:
418 err
= ip6addrlbl_del(net
, pfx
, ifal
->ifal_prefixlen
,
427 static void ip6addrlbl_putmsg(struct nlmsghdr
*nlh
,
428 int prefixlen
, int ifindex
, u32 lseq
)
430 struct ifaddrlblmsg
*ifal
= nlmsg_data(nlh
);
431 ifal
->ifal_family
= AF_INET6
;
432 ifal
->ifal_prefixlen
= prefixlen
;
433 ifal
->ifal_flags
= 0;
434 ifal
->ifal_index
= ifindex
;
435 ifal
->ifal_seq
= lseq
;
438 static int ip6addrlbl_fill(struct sk_buff
*skb
,
439 struct ip6addrlbl_entry
*p
,
441 u32 portid
, u32 seq
, int event
,
444 struct nlmsghdr
*nlh
= nlmsg_put(skb
, portid
, seq
, event
,
445 sizeof(struct ifaddrlblmsg
), flags
);
449 ip6addrlbl_putmsg(nlh
, p
->prefixlen
, p
->ifindex
, lseq
);
451 if (nla_put_in6_addr(skb
, IFAL_ADDRESS
, &p
->prefix
) < 0 ||
452 nla_put_u32(skb
, IFAL_LABEL
, p
->label
) < 0) {
453 nlmsg_cancel(skb
, nlh
);
461 static int ip6addrlbl_valid_dump_req(const struct nlmsghdr
*nlh
,
462 struct netlink_ext_ack
*extack
)
464 struct ifaddrlblmsg
*ifal
;
466 if (nlh
->nlmsg_len
< nlmsg_msg_size(sizeof(*ifal
))) {
467 NL_SET_ERR_MSG_MOD(extack
, "Invalid header for address label dump request");
471 ifal
= nlmsg_data(nlh
);
472 if (ifal
->__ifal_reserved
|| ifal
->ifal_prefixlen
||
473 ifal
->ifal_flags
|| ifal
->ifal_index
|| ifal
->ifal_seq
) {
474 NL_SET_ERR_MSG_MOD(extack
, "Invalid values in header for address label dump request");
478 if (nlmsg_attrlen(nlh
, sizeof(*ifal
))) {
479 NL_SET_ERR_MSG_MOD(extack
, "Invalid data after header for address label dump request");
486 static int ip6addrlbl_dump(struct sk_buff
*skb
, struct netlink_callback
*cb
)
488 const struct nlmsghdr
*nlh
= cb
->nlh
;
489 struct net
*net
= sock_net(skb
->sk
);
490 struct ip6addrlbl_entry
*p
;
491 int idx
= 0, s_idx
= cb
->args
[0];
494 if (cb
->strict_check
) {
495 err
= ip6addrlbl_valid_dump_req(nlh
, cb
->extack
);
501 hlist_for_each_entry_rcu(p
, &net
->ipv6
.ip6addrlbl_table
.head
, list
) {
503 err
= ip6addrlbl_fill(skb
, p
,
504 net
->ipv6
.ip6addrlbl_table
.seq
,
505 NETLINK_CB(cb
->skb
).portid
,
519 static inline int ip6addrlbl_msgsize(void)
521 return NLMSG_ALIGN(sizeof(struct ifaddrlblmsg
))
522 + nla_total_size(16) /* IFAL_ADDRESS */
523 + nla_total_size(4); /* IFAL_LABEL */
526 static int ip6addrlbl_valid_get_req(struct sk_buff
*skb
,
527 const struct nlmsghdr
*nlh
,
529 struct netlink_ext_ack
*extack
)
531 struct ifaddrlblmsg
*ifal
;
534 if (nlh
->nlmsg_len
< nlmsg_msg_size(sizeof(*ifal
))) {
535 NL_SET_ERR_MSG_MOD(extack
, "Invalid header for addrlabel get request");
539 if (!netlink_strict_get_check(skb
))
540 return nlmsg_parse_deprecated(nlh
, sizeof(*ifal
), tb
,
541 IFAL_MAX
, ifal_policy
, extack
);
543 ifal
= nlmsg_data(nlh
);
544 if (ifal
->__ifal_reserved
|| ifal
->ifal_flags
|| ifal
->ifal_seq
) {
545 NL_SET_ERR_MSG_MOD(extack
, "Invalid values in header for addrlabel get request");
549 err
= nlmsg_parse_deprecated_strict(nlh
, sizeof(*ifal
), tb
, IFAL_MAX
,
550 ifal_policy
, extack
);
554 for (i
= 0; i
<= IFAL_MAX
; i
++) {
562 NL_SET_ERR_MSG_MOD(extack
, "Unsupported attribute in addrlabel get request");
570 static int ip6addrlbl_get(struct sk_buff
*in_skb
, struct nlmsghdr
*nlh
,
571 struct netlink_ext_ack
*extack
)
573 struct net
*net
= sock_net(in_skb
->sk
);
574 struct ifaddrlblmsg
*ifal
;
575 struct nlattr
*tb
[IFAL_MAX
+1];
576 struct in6_addr
*addr
;
579 struct ip6addrlbl_entry
*p
;
582 err
= ip6addrlbl_valid_get_req(in_skb
, nlh
, tb
, extack
);
586 ifal
= nlmsg_data(nlh
);
588 if (ifal
->ifal_family
!= AF_INET6
||
589 ifal
->ifal_prefixlen
!= 128)
592 if (ifal
->ifal_index
&&
593 !addrlbl_ifindex_exists(net
, ifal
->ifal_index
))
596 if (!tb
[IFAL_ADDRESS
])
598 addr
= nla_data(tb
[IFAL_ADDRESS
]);
600 skb
= nlmsg_new(ip6addrlbl_msgsize(), GFP_KERNEL
);
607 p
= __ipv6_addr_label(net
, addr
, ipv6_addr_type(addr
), ifal
->ifal_index
);
608 lseq
= net
->ipv6
.ip6addrlbl_table
.seq
;
610 err
= ip6addrlbl_fill(skb
, p
, lseq
,
611 NETLINK_CB(in_skb
).portid
,
613 RTM_NEWADDRLABEL
, 0);
617 WARN_ON(err
== -EMSGSIZE
);
620 err
= rtnl_unicast(skb
, net
, NETLINK_CB(in_skb
).portid
);
625 int __init
ipv6_addr_label_rtnl_register(void)
629 ret
= rtnl_register_module(THIS_MODULE
, PF_INET6
, RTM_NEWADDRLABEL
,
631 NULL
, RTNL_FLAG_DOIT_UNLOCKED
);
634 ret
= rtnl_register_module(THIS_MODULE
, PF_INET6
, RTM_DELADDRLABEL
,
636 NULL
, RTNL_FLAG_DOIT_UNLOCKED
);
639 ret
= rtnl_register_module(THIS_MODULE
, PF_INET6
, RTM_GETADDRLABEL
,
641 ip6addrlbl_dump
, RTNL_FLAG_DOIT_UNLOCKED
);