NetBSD/sys/netinet/in.c

1561 lines
40 KiB
C
Raw Normal View History

/* $NetBSD: in.c,v 1.156 2015/05/16 12:12:46 roy Exp $ */
/*
* Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
* All rights reserved.
2002-06-09 20:33:36 +04:00
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. Neither the name of the project nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
2002-06-09 20:33:36 +04:00
*
* THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
/*-
* Copyright (c) 1998 The NetBSD Foundation, Inc.
* All rights reserved.
*
* This code is derived from software contributed to The NetBSD Foundation
* by Public Access Networks Corporation ("Panix"). It was developed under
* contract to Panix by Eric Haszlakiewicz and Thor Lancelot Simon.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
* TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*/
1993-03-21 12:45:37 +03:00
/*
* Copyright (c) 1982, 1986, 1991, 1993
* The Regents of the University of California. All rights reserved.
1993-03-21 12:45:37 +03:00
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. Neither the name of the University nor the names of its contributors
1993-03-21 12:45:37 +03:00
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* @(#)in.c 8.4 (Berkeley) 1/9/95
1993-03-21 12:45:37 +03:00
*/
2001-11-13 03:32:34 +03:00
#include <sys/cdefs.h>
__KERNEL_RCSID(0, "$NetBSD: in.c,v 1.156 2015/05/16 12:12:46 roy Exp $");
2001-11-13 03:32:34 +03:00
2015-05-02 23:22:12 +03:00
#include "arp.h"
1998-07-05 04:51:04 +04:00
#include "opt_inet.h"
#include "opt_inet_conf.h"
1998-01-12 06:02:48 +03:00
#include "opt_mrouting.h"
1993-12-18 03:40:47 +03:00
#include <sys/param.h>
#include <sys/ioctl.h>
#include <sys/errno.h>
#include <sys/kernel.h>
#include <sys/malloc.h>
1993-12-18 03:40:47 +03:00
#include <sys/socket.h>
#include <sys/socketvar.h>
#include <sys/sysctl.h>
1996-02-14 02:40:59 +03:00
#include <sys/systm.h>
#include <sys/proc.h>
#include <sys/syslog.h>
2006-05-15 01:19:33 +04:00
#include <sys/kauth.h>
1993-12-18 03:40:47 +03:00
First step of random number subsystem rework described in <20111022023242.BA26F14A158@mail.netbsd.org>. This change includes the following: An initial cleanup and minor reorganization of the entropy pool code in sys/dev/rnd.c and sys/dev/rndpool.c. Several bugs are fixed. Some effort is made to accumulate entropy more quickly at boot time. A generic interface, "rndsink", is added, for stream generators to request that they be re-keyed with good quality entropy from the pool as soon as it is available. The arc4random()/arc4randbytes() implementation in libkern is adjusted to use the rndsink interface for rekeying, which helps address the problem of low-quality keys at boot time. An implementation of the FIPS 140-2 statistical tests for random number generator quality is provided (libkern/rngtest.c). This is based on Greg Rose's implementation from Qualcomm. A new random stream generator, nist_ctr_drbg, is provided. It is based on an implementation of the NIST SP800-90 CTR_DRBG by Henric Jungheim. This generator users AES in a modified counter mode to generate a backtracking-resistant random stream. An abstraction layer, "cprng", is provided for in-kernel consumers of randomness. The arc4random/arc4randbytes API is deprecated for in-kernel use. It is replaced by "cprng_strong". The current cprng_fast implementation wraps the existing arc4random implementation. The current cprng_strong implementation wraps the new CTR_DRBG implementation. Both interfaces are rekeyed from the entropy pool automatically at intervals justifiable from best current cryptographic practice. In some quick tests, cprng_fast() is about the same speed as the old arc4randbytes(), and cprng_strong() is about 20% faster than rnd_extract_data(). Performance is expected to improve. The AES code in src/crypto/rijndael is no longer an optional kernel component, as it is required by cprng_strong, which is not an optional kernel component. The entropy pool output is subjected to the rngtest tests at startup time; if it fails, the system will reboot. There is approximately a 3/10000 chance of a false positive from these tests. Entropy pool _input_ from hardware random numbers is subjected to the rngtest tests at attach time, as well as the FIPS continuous-output test, to detect bad or stuck hardware RNGs; if any are detected, they are detached, but the system continues to run. A problem with rndctl(8) is fixed -- datastructures with pointers in arrays are no longer passed to userspace (this was not a security problem, but rather a major issue for compat32). A new kernel will require a new rndctl. The sysctl kern.arandom() and kern.urandom() nodes are hooked up to the new generators, but the /dev/*random pseudodevices are not, yet. Manual pages for the new kernel interfaces are forthcoming.
2011-11-20 02:51:18 +04:00
#include <sys/cprng.h>
1993-12-18 03:40:47 +03:00
#include <net/if.h>
#include <net/route.h>
#include <net/pfil.h>
1993-12-18 03:40:47 +03:00
#include <net/if_ether.h>
#include <netinet/in_systm.h>
1993-12-18 03:40:47 +03:00
#include <netinet/in.h>
#include <netinet/in_var.h>
#include <netinet/ip.h>
#include <netinet/ip_var.h>
#include <netinet/in_ifattach.h>
#include <netinet/in_pcb.h>
#include <netinet/if_inarp.h>
#include <netinet/ip_mroute.h>
1996-02-14 02:40:59 +03:00
#include <netinet/igmp_var.h>
1994-01-09 04:06:02 +03:00
#ifdef IPSELSRC
#include <netinet/in_selsrc.h>
#endif
static u_int in_mask2len(struct in_addr *);
static void in_len2mask(struct in_addr *, u_int);
static int in_lifaddr_ioctl(struct socket *, u_long, void *,
struct ifnet *);
static int in_addprefix(struct in_ifaddr *, int);
static int in_scrubprefix(struct in_ifaddr *);
static void in_sysctl_init(struct sysctllog **);
1993-03-21 12:45:37 +03:00
#ifndef SUBNETSARELOCAL
#define SUBNETSARELOCAL 1
#endif
#ifndef HOSTZEROBROADCAST
#define HOSTZEROBROADCAST 1
#endif
/* Note: 61, 127, 251, 509, 1021, 2039 are good. */
#ifndef IN_MULTI_HASH_SIZE
#define IN_MULTI_HASH_SIZE 509
#endif
static int subnetsarelocal = SUBNETSARELOCAL;
static int hostzeroisbroadcast = HOSTZEROBROADCAST;
/*
* This list is used to keep track of in_multi chains which belong to
* deleted interface addresses. We use in_ifaddr so that a chain head
* won't be deallocated until all multicast address record are deleted.
*/
LIST_HEAD(in_multihashhead, in_multi); /* Type of the hash head */
static struct pool inmulti_pool;
static u_int in_multientries;
static struct in_multihashhead *in_multihashtbl;
static u_long in_multihash;
static krwlock_t in_multilock;
#define IN_MULTI_HASH(x, ifp) \
(in_multihashtbl[(u_long)((x) ^ (ifp->if_index)) % IN_MULTI_HASH_SIZE])
struct in_ifaddrhashhead * in_ifaddrhashtbl;
u_long in_ifaddrhash;
struct in_ifaddrhead in_ifaddrhead;
void
in_init(void)
{
pool_init(&inmulti_pool, sizeof(struct in_multi), 0, 0, 0, "inmltpl",
NULL, IPL_SOFTNET);
TAILQ_INIT(&in_ifaddrhead);
in_ifaddrhashtbl = hashinit(IN_IFADDR_HASH_SIZE, HASH_LIST, true,
&in_ifaddrhash);
in_multihashtbl = hashinit(IN_IFADDR_HASH_SIZE, HASH_LIST, true,
&in_multihash);
rw_init(&in_multilock);
in_sysctl_init(NULL);
}
1993-03-21 12:45:37 +03:00
/*
* Return 1 if an internet address is for a ``local'' host
* (one to which we have a connection). If subnetsarelocal
* is true, this includes other subnets of the local net.
* Otherwise, it includes only the directly-connected (sub)nets.
*/
1994-01-09 04:06:02 +03:00
int
in_localaddr(struct in_addr in)
1993-03-21 12:45:37 +03:00
{
2000-03-30 16:51:13 +04:00
struct in_ifaddr *ia;
1993-03-21 12:45:37 +03:00
if (subnetsarelocal) {
TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list)
if ((in.s_addr & ia->ia_netmask) == ia->ia_net)
1993-03-21 12:45:37 +03:00
return (1);
} else {
TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list)
if ((in.s_addr & ia->ia_subnetmask) == ia->ia_subnet)
1993-03-21 12:45:37 +03:00
return (1);
}
return (0);
}
/*
* Determine whether an IP address is in a reserved set of addresses
* that may not be forwarded, or whether datagrams to that destination
* may be forwarded.
*/
1994-01-09 04:06:02 +03:00
int
in_canforward(struct in_addr in)
1993-03-21 12:45:37 +03:00
{
2000-03-30 16:51:13 +04:00
u_int32_t net;
1993-03-21 12:45:37 +03:00
if (IN_EXPERIMENTAL(in.s_addr) || IN_MULTICAST(in.s_addr))
1993-03-21 12:45:37 +03:00
return (0);
if (IN_CLASSA(in.s_addr)) {
net = in.s_addr & IN_CLASSA_NET;
if (net == 0 || net == htonl(IN_LOOPBACKNET << IN_CLASSA_NSHIFT))
1993-03-21 12:45:37 +03:00
return (0);
}
return (1);
}
/*
* Trim a mask in a sockaddr
*/
void
in_socktrim(struct sockaddr_in *ap)
{
2000-03-30 16:51:13 +04:00
char *cplim = (char *) &ap->sin_addr;
char *cp = (char *) (&ap->sin_addr + 1);
ap->sin_len = 0;
while (--cp >= cplim)
if (*cp) {
(ap)->sin_len = cp - (char *) (ap) + 1;
break;
}
}
/*
* Routine to take an Internet address and convert into a
* "dotted quad" representation for printing.
*/
const char *
in_fmtaddr(struct in_addr addr)
{
static char buf[sizeof("123.456.789.123")];
addr.s_addr = ntohl(addr.s_addr);
2004-04-21 22:40:37 +04:00
snprintf(buf, sizeof(buf), "%d.%d.%d.%d",
(addr.s_addr >> 24) & 0xFF,
(addr.s_addr >> 16) & 0xFF,
(addr.s_addr >> 8) & 0xFF,
(addr.s_addr >> 0) & 0xFF);
return buf;
}
/*
* Maintain the "in_maxmtu" variable, which is the largest
* mtu for non-local interfaces with AF_INET addresses assigned
* to them that are up.
*/
unsigned long in_maxmtu;
void
in_setmaxmtu(void)
{
2000-03-30 16:51:13 +04:00
struct in_ifaddr *ia;
struct ifnet *ifp;
unsigned long maxmtu = 0;
TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list) {
if ((ifp = ia->ia_ifp) == 0)
continue;
if ((ifp->if_flags & (IFF_UP|IFF_LOOPBACK)) != IFF_UP)
continue;
if (ifp->if_mtu > maxmtu)
maxmtu = ifp->if_mtu;
}
if (maxmtu)
in_maxmtu = maxmtu;
}
static u_int
in_mask2len(struct in_addr *mask)
{
u_int x, y;
u_char *p;
p = (u_char *)mask;
for (x = 0; x < sizeof(*mask); x++) {
if (p[x] != 0xff)
break;
}
y = 0;
if (x < sizeof(*mask)) {
2008-04-10 22:09:14 +04:00
for (y = 0; y < NBBY; y++) {
if ((p[x] & (0x80 >> y)) == 0)
break;
}
}
2008-04-10 22:09:14 +04:00
return x * NBBY + y;
}
static void
in_len2mask(struct in_addr *mask, u_int len)
{
u_int i;
u_char *p;
p = (u_char *)mask;
2009-03-18 19:00:08 +03:00
memset(mask, 0, sizeof(*mask));
2008-04-10 22:09:14 +04:00
for (i = 0; i < len / NBBY; i++)
p[i] = 0xff;
2008-04-10 22:09:14 +04:00
if (len % NBBY)
p[i] = (0xff00 >> (len % NBBY)) & 0xff;
}
1993-03-21 12:45:37 +03:00
/*
* Generic internet control operations (ioctl's).
* Ifp is 0 if not an interface-specific ioctl.
*/
/* ARGSUSED */
1994-01-09 04:06:02 +03:00
int
in_control(struct socket *so, u_long cmd, void *data, struct ifnet *ifp)
1993-03-21 12:45:37 +03:00
{
2000-03-30 16:51:13 +04:00
struct ifreq *ifr = (struct ifreq *)data;
struct in_ifaddr *ia = NULL;
1993-03-21 12:45:37 +03:00
struct in_aliasreq *ifra = (struct in_aliasreq *)data;
struct sockaddr_in oldaddr;
int error, hostIsNew, maskIsNew;
int newifaddr = 0;
1993-03-21 12:45:37 +03:00
switch (cmd) {
case SIOCALIFADDR:
case SIOCDLIFADDR:
case SIOCGLIFADDR:
if (ifp == NULL)
return EINVAL;
return in_lifaddr_ioctl(so, cmd, data, ifp);
case SIOCGIFADDRPREF:
case SIOCSIFADDRPREF:
if (ifp == NULL)
return EINVAL;
return ifaddrpref_ioctl(so, cmd, data, ifp);
}
1993-03-21 12:45:37 +03:00
/*
* Find address for this interface, if it exists.
*/
if (ifp != NULL)
IFP_TO_IA(ifp, ia);
1993-03-21 12:45:37 +03:00
2015-05-02 18:22:03 +03:00
hostIsNew = 1; /* moved here to appease gcc */
1993-03-21 12:45:37 +03:00
switch (cmd) {
case SIOCAIFADDR:
case SIOCDIFADDR:
1998-09-06 21:52:01 +04:00
case SIOCGIFALIAS:
case SIOCGIFAFLAG_IN:
1993-03-21 12:45:37 +03:00
if (ifra->ifra_addr.sin_family == AF_INET)
LIST_FOREACH(ia,
&IN_IFADDR_HASH(ifra->ifra_addr.sin_addr.s_addr),
ia_hash) {
if (ia->ia_ifp == ifp &&
in_hosteq(ia->ia_addr.sin_addr,
ifra->ifra_addr.sin_addr))
break;
}
if ((cmd == SIOCDIFADDR ||
cmd == SIOCGIFALIAS ||
cmd == SIOCGIFAFLAG_IN) &&
ia == NULL)
return (EADDRNOTAVAIL);
if (cmd == SIOCDIFADDR &&
ifra->ifra_addr.sin_family == AF_UNSPEC) {
ifra->ifra_addr.sin_family = AF_INET;
}
1993-03-21 12:45:37 +03:00
/* FALLTHROUGH */
case SIOCSIFADDR:
if (ia == NULL || ia->ia_addr.sin_family != AF_INET)
;
else if (ifra->ifra_addr.sin_len == 0) {
ifra->ifra_addr = ia->ia_addr;
hostIsNew = 0;
} else if (in_hosteq(ia->ia_addr.sin_addr,
ifra->ifra_addr.sin_addr))
hostIsNew = 0;
/* FALLTHROUGH */
1993-03-21 12:45:37 +03:00
case SIOCSIFDSTADDR:
if (ifra->ifra_addr.sin_family != AF_INET)
return (EAFNOSUPPORT);
/* FALLTHROUGH */
case SIOCSIFNETMASK:
if (ifp == NULL)
panic("in_control");
if (cmd == SIOCGIFALIAS || cmd == SIOCGIFAFLAG_IN)
break;
if (ia == NULL &&
(cmd == SIOCSIFNETMASK || cmd == SIOCSIFDSTADDR))
return (EADDRNOTAVAIL);
if (kauth_authorize_network(curlwp->l_cred, KAUTH_NETWORK_INTERFACE,
2006-10-25 16:48:44 +04:00
KAUTH_REQ_NETWORK_INTERFACE_SETPRIV, ifp, (void *)cmd,
NULL) != 0)
1993-03-21 12:45:37 +03:00
return (EPERM);
if (ia == NULL) {
2008-12-17 23:51:31 +03:00
ia = malloc(sizeof(*ia), M_IFADDR, M_WAITOK|M_ZERO);
if (ia == NULL)
1993-03-21 12:45:37 +03:00
return (ENOBUFS);
TAILQ_INSERT_TAIL(&in_ifaddrhead, ia, ia_list);
ifaref(&ia->ia_ifa);
2007-12-06 03:28:36 +03:00
ifa_insert(ifp, &ia->ia_ifa);
1995-06-04 08:35:29 +04:00
ia->ia_ifa.ifa_addr = sintosa(&ia->ia_addr);
ia->ia_ifa.ifa_dstaddr = sintosa(&ia->ia_dstaddr);
ia->ia_ifa.ifa_netmask = sintosa(&ia->ia_sockmask);
#ifdef IPSELSRC
ia->ia_ifa.ifa_getifa = in_getifa;
#else /* IPSELSRC */
ia->ia_ifa.ifa_getifa = NULL;
#endif /* IPSELSRC */
1993-03-21 12:45:37 +03:00
ia->ia_sockmask.sin_len = 8;
ia->ia_sockmask.sin_family = AF_INET;
1993-03-21 12:45:37 +03:00
if (ifp->if_flags & IFF_BROADCAST) {
ia->ia_broadaddr.sin_len = sizeof(ia->ia_addr);
ia->ia_broadaddr.sin_family = AF_INET;
}
ia->ia_ifp = ifp;
First step of random number subsystem rework described in <20111022023242.BA26F14A158@mail.netbsd.org>. This change includes the following: An initial cleanup and minor reorganization of the entropy pool code in sys/dev/rnd.c and sys/dev/rndpool.c. Several bugs are fixed. Some effort is made to accumulate entropy more quickly at boot time. A generic interface, "rndsink", is added, for stream generators to request that they be re-keyed with good quality entropy from the pool as soon as it is available. The arc4random()/arc4randbytes() implementation in libkern is adjusted to use the rndsink interface for rekeying, which helps address the problem of low-quality keys at boot time. An implementation of the FIPS 140-2 statistical tests for random number generator quality is provided (libkern/rngtest.c). This is based on Greg Rose's implementation from Qualcomm. A new random stream generator, nist_ctr_drbg, is provided. It is based on an implementation of the NIST SP800-90 CTR_DRBG by Henric Jungheim. This generator users AES in a modified counter mode to generate a backtracking-resistant random stream. An abstraction layer, "cprng", is provided for in-kernel consumers of randomness. The arc4random/arc4randbytes API is deprecated for in-kernel use. It is replaced by "cprng_strong". The current cprng_fast implementation wraps the existing arc4random implementation. The current cprng_strong implementation wraps the new CTR_DRBG implementation. Both interfaces are rekeyed from the entropy pool automatically at intervals justifiable from best current cryptographic practice. In some quick tests, cprng_fast() is about the same speed as the old arc4randbytes(), and cprng_strong() is about 20% faster than rnd_extract_data(). Performance is expected to improve. The AES code in src/crypto/rijndael is no longer an optional kernel component, as it is required by cprng_strong, which is not an optional kernel component. The entropy pool output is subjected to the rngtest tests at startup time; if it fails, the system will reboot. There is approximately a 3/10000 chance of a false positive from these tests. Entropy pool _input_ from hardware random numbers is subjected to the rngtest tests at attach time, as well as the FIPS continuous-output test, to detect bad or stuck hardware RNGs; if any are detected, they are detached, but the system continues to run. A problem with rndctl(8) is fixed -- datastructures with pointers in arrays are no longer passed to userspace (this was not a security problem, but rather a major issue for compat32). A new kernel will require a new rndctl. The sysctl kern.arandom() and kern.urandom() nodes are hooked up to the new generators, but the /dev/*random pseudodevices are not, yet. Manual pages for the new kernel interfaces are forthcoming.
2011-11-20 02:51:18 +04:00
ia->ia_idsalt = cprng_fast32() % 65535;
LIST_INIT(&ia->ia_multiaddrs);
newifaddr = 1;
}
1993-03-21 12:45:37 +03:00
break;
case SIOCSIFBRDADDR:
if (kauth_authorize_network(curlwp->l_cred, KAUTH_NETWORK_INTERFACE,
2006-10-25 16:48:44 +04:00
KAUTH_REQ_NETWORK_INTERFACE_SETPRIV, ifp, (void *)cmd,
NULL) != 0)
1993-03-21 12:45:37 +03:00
return (EPERM);
/* FALLTHROUGH */
case SIOCGIFADDR:
case SIOCGIFNETMASK:
case SIOCGIFDSTADDR:
case SIOCGIFBRDADDR:
if (ia == NULL)
1993-03-21 12:45:37 +03:00
return (EADDRNOTAVAIL);
break;
}
error = 0;
1993-03-21 12:45:37 +03:00
switch (cmd) {
case SIOCGIFADDR:
ifreq_setaddr(cmd, ifr, sintocsa(&ia->ia_addr));
1993-03-21 12:45:37 +03:00
break;
case SIOCGIFBRDADDR:
if ((ifp->if_flags & IFF_BROADCAST) == 0)
return (EINVAL);
ifreq_setdstaddr(cmd, ifr, sintocsa(&ia->ia_broadaddr));
1993-03-21 12:45:37 +03:00
break;
case SIOCGIFDSTADDR:
if ((ifp->if_flags & IFF_POINTOPOINT) == 0)
return (EINVAL);
ifreq_setdstaddr(cmd, ifr, sintocsa(&ia->ia_dstaddr));
1993-03-21 12:45:37 +03:00
break;
case SIOCGIFNETMASK:
/*
* We keep the number of trailing zero bytes the sin_len field
* of ia_sockmask, so we fix this before we pass it back to
* userland.
*/
oldaddr = ia->ia_sockmask;
oldaddr.sin_len = sizeof(struct sockaddr_in);
ifreq_setaddr(cmd, ifr, (const void *)&oldaddr);
1993-03-21 12:45:37 +03:00
break;
case SIOCSIFDSTADDR:
if ((ifp->if_flags & IFF_POINTOPOINT) == 0)
return (EINVAL);
oldaddr = ia->ia_dstaddr;
ia->ia_dstaddr = *satocsin(ifreq_getdstaddr(cmd, ifr));
if ((error = if_addr_init(ifp, &ia->ia_ifa, false)) != 0) {
1993-03-21 12:45:37 +03:00
ia->ia_dstaddr = oldaddr;
return error;
1993-03-21 12:45:37 +03:00
}
if (ia->ia_flags & IFA_ROUTE) {
1995-06-04 08:35:29 +04:00
ia->ia_ifa.ifa_dstaddr = sintosa(&oldaddr);
rtinit(&ia->ia_ifa, RTM_DELETE, RTF_HOST);
1995-06-04 08:35:29 +04:00
ia->ia_ifa.ifa_dstaddr = sintosa(&ia->ia_dstaddr);
rtinit(&ia->ia_ifa, RTM_ADD, RTF_HOST|RTF_UP);
1993-03-21 12:45:37 +03:00
}
break;
case SIOCSIFBRDADDR:
if ((ifp->if_flags & IFF_BROADCAST) == 0)
return EINVAL;
ia->ia_broadaddr = *satocsin(ifreq_getbroadaddr(cmd, ifr));
1993-03-21 12:45:37 +03:00
break;
case SIOCSIFADDR:
error = in_ifinit(ifp, ia, satocsin(ifreq_getaddr(cmd, ifr)),
1, hostIsNew);
if (error == 0) {
(void)pfil_run_hooks(if_pfil,
(struct mbuf **)SIOCSIFADDR, ifp, PFIL_IFADDR);
}
break;
1993-03-21 12:45:37 +03:00
case SIOCSIFNETMASK:
in_ifscrub(ifp, ia);
ia->ia_sockmask = *satocsin(ifreq_getaddr(cmd, ifr));
ia->ia_subnetmask = ia->ia_sockmask.sin_addr.s_addr;
error = in_ifinit(ifp, ia, NULL, 0, 0);
break;
1993-03-21 12:45:37 +03:00
case SIOCAIFADDR:
maskIsNew = 0;
if (ifra->ifra_mask.sin_len) {
/* Only scrub if we control the prefix route,
* otherwise userland gets a bogus message */
if ((ia->ia_flags & IFA_ROUTE))
in_ifscrub(ifp, ia);
1993-03-21 12:45:37 +03:00
ia->ia_sockmask = ifra->ifra_mask;
ia->ia_subnetmask = ia->ia_sockmask.sin_addr.s_addr;
1993-03-21 12:45:37 +03:00
maskIsNew = 1;
}
if ((ifp->if_flags & IFF_POINTOPOINT) &&
(ifra->ifra_dstaddr.sin_family == AF_INET)) {
/* Only scrub if we control the prefix route,
* otherwise userland gets a bogus message */
if ((ia->ia_flags & IFA_ROUTE))
in_ifscrub(ifp, ia);
1993-03-21 12:45:37 +03:00
ia->ia_dstaddr = ifra->ifra_dstaddr;
maskIsNew = 1; /* We lie; but the effect's the same */
}
if (ifra->ifra_addr.sin_family == AF_INET &&
(hostIsNew || maskIsNew)) {
error = in_ifinit(ifp, ia, &ifra->ifra_addr, 0,
hostIsNew);
}
1993-03-21 12:45:37 +03:00
if ((ifp->if_flags & IFF_BROADCAST) &&
(ifra->ifra_broadaddr.sin_family == AF_INET))
ia->ia_broadaddr = ifra->ifra_broadaddr;
if (error == 0)
(void)pfil_run_hooks(if_pfil,
(struct mbuf **)SIOCAIFADDR, ifp, PFIL_IFADDR);
break;
1993-03-21 12:45:37 +03:00
1998-09-06 21:52:01 +04:00
case SIOCGIFALIAS:
ifra->ifra_mask = ia->ia_sockmask;
if ((ifp->if_flags & IFF_POINTOPOINT) &&
(ia->ia_dstaddr.sin_family == AF_INET))
ifra->ifra_dstaddr = ia->ia_dstaddr;
else if ((ifp->if_flags & IFF_BROADCAST) &&
(ia->ia_broadaddr.sin_family == AF_INET))
ifra->ifra_broadaddr = ia->ia_broadaddr;
else
memset(&ifra->ifra_broadaddr, 0,
sizeof(ifra->ifra_broadaddr));
break;
1998-09-06 21:52:01 +04:00
case SIOCGIFAFLAG_IN:
ifr->ifr_addrflags = ia->ia4_flags;
break;
1993-03-21 12:45:37 +03:00
case SIOCDIFADDR:
in_purgeaddr(&ia->ia_ifa);
(void)pfil_run_hooks(if_pfil, (struct mbuf **)SIOCDIFADDR,
ifp, PFIL_IFADDR);
1993-03-21 12:45:37 +03:00
break;
#ifdef MROUTING
case SIOCGETVIFCNT:
case SIOCGETSGCNT:
error = mrt_ioctl(so, cmd, data);
break;
#endif /* MROUTING */
1993-03-21 12:45:37 +03:00
default:
*** Summary *** When a link-layer address changes (e.g., ifconfig ex0 link 02:de:ad:be:ef:02 active), send a gratuitous ARP and/or a Neighbor Advertisement to update the network-/link-layer address bindings on our LAN peers. Refuse a change of ethernet address to the address 00:00:00:00:00:00 or to any multicast/broadcast address. (Thanks matt@.) Reorder ifnet ioctl operations so that driver ioctls may inherit the functions of their "class"---ether_ioctl(), fddi_ioctl(), et cetera---and the class ioctls may inherit from the generic ioctl, ifioctl_common(), but both driver- and class-ioctls may override the generic behavior. Make network drivers share more code. Distinguish a "factory" link-layer address from others for the purposes of both protecting that address from deletion and computing EUI64. Return consistent, appropriate error codes from network drivers. Improve readability. KNF. *** Details *** In if_attach(), always initialize the interface ioctl routine, ifnet->if_ioctl, if the driver has not already initialized it. Delete if_ioctl == NULL tests everywhere else, because it cannot happen. In the ioctl routines of network interfaces, inherit common ioctl behaviors by calling either ifioctl_common() or whichever ioctl routine is appropriate for the class of interface---e.g., ether_ioctl() for ethernets. Stop (ab)using SIOCSIFADDR and start to use SIOCINITIFADDR. In the user->kernel interface, SIOCSIFADDR's argument was an ifreq, but on the protocol->ifnet interface, SIOCSIFADDR's argument was an ifaddr. That was confusing, and it would work against me as I make it possible for a network interface to overload most ioctls. On the protocol->ifnet interface, replace SIOCSIFADDR with SIOCINITIFADDR. In ifioctl(), return EPERM if userland tries to invoke SIOCINITIFADDR. In ifioctl(), give the interface the first shot at handling most interface ioctls, and give the protocol the second shot, instead of the other way around. Finally, let compatibility code (COMPAT_OSOCK) take a shot. Pull device initialization out of switch statements under SIOCINITIFADDR. For example, pull ..._init() out of any switch statement that looks like this: switch (...->sa_family) { case ...: ..._init(); ... break; ... default: ..._init(); ... break; } Rewrite many if-else clauses that handle all permutations of IFF_UP and IFF_RUNNING to use a switch statement, switch (x & (IFF_UP|IFF_RUNNING)) { case 0: ... break; case IFF_RUNNING: ... break; case IFF_UP: ... break; case IFF_UP|IFF_RUNNING: ... break; } unifdef lots of code containing #ifdef FreeBSD, #ifdef NetBSD, and #ifdef SIOCSIFMTU, especially in fwip(4) and in ndis(4). In ipw(4), remove an if_set_sadl() call that is out of place. In nfe(4), reuse the jumbo MTU logic in ether_ioctl(). Let ethernets register a callback for setting h/w state such as promiscuous mode and the multicast filter in accord with a change in the if_flags: ether_set_ifflags_cb() registers a callback that returns ENETRESET if the caller should reset the ethernet by calling if_init(), 0 on success, != 0 on failure. Pull common code from ex(4), gem(4), nfe(4), sip(4), tlp(4), vge(4) into ether_ioctl(), and register if_flags callbacks for those drivers. Return ENOTTY instead of EINVAL for inappropriate ioctls. In zyd(4), use ENXIO instead of ENOTTY to indicate that the device is not any longer attached. Add to if_set_sadl() a boolean 'factory' argument that indicates whether a link-layer address was assigned by the factory or some other source. In a comment, recommend using the factory address for generating an EUI64, and update in6_get_hw_ifid() to prefer a factory address to any other link-layer address. Add a routing message, RTM_LLINFO_UPD, that tells protocols to update the binding of network-layer addresses to link-layer addresses. Implement this message in IPv4 and IPv6 by sending a gratuitous ARP or a neighbor advertisement, respectively. Generate RTM_LLINFO_UPD messages on a change of an interface's link-layer address. In ether_ioctl(), do not let SIOCALIFADDR set a link-layer address that is broadcast/multicast or equal to 00:00:00:00:00:00. Make ether_ioctl() call ifioctl_common() to handle ioctls that it does not understand. In gif(4), initialize if_softc and use it, instead of assuming that the gif_softc and ifp overlap. Let ifioctl_common() handle SIOCGIFADDR. Sprinkle rtcache_invariants(), which checks on DIAGNOSTIC kernels that certain invariants on a struct route are satisfied. In agr(4), rewrite agr_ioctl_filter() to be a bit more explicit about the ioctls that we do not allow on an agr(4) member interface. bzero -> memset. Delete unnecessary casts to void *. Use sockaddr_in_init() and sockaddr_in6_init(). Compare pointers with NULL instead of "testing truth". Replace some instances of (type *)0 with NULL. Change some K&R prototypes to ANSI C, and join lines.
2008-11-07 03:20:01 +03:00
return ENOTTY;
1993-03-21 12:45:37 +03:00
}
if (error != 0 && newifaddr) {
KASSERT(ia != NULL);
in_purgeaddr(&ia->ia_ifa);
}
return error;
1993-03-21 12:45:37 +03:00
}
/* Add ownaddr as loopback rtentry. */
static void
in_ifaddlocal(struct ifaddr *ifa)
{
struct in_ifaddr *ia;
ia = (struct in_ifaddr *)ifa;
if (ia->ia_addr.sin_addr.s_addr == INADDR_ANY ||
(ia->ia_ifp->if_flags & IFF_POINTOPOINT &&
in_hosteq(ia->ia_dstaddr.sin_addr, ia->ia_addr.sin_addr)))
{
rt_newaddrmsg(RTM_NEWADDR, ifa, 0, NULL);
return;
}
rt_ifa_addlocal(ifa);
}
/* Rempve loopback entry of ownaddr */
static void
in_ifremlocal(struct ifaddr *ifa)
{
struct in_ifaddr *ia, *p;
struct ifaddr *alt_ifa = NULL;
int ia_count = 0;
ia = (struct in_ifaddr *)ifa;
/* Delete the entry if exactly one ifaddr matches the
* address, ifa->ifa_addr. */
TAILQ_FOREACH(p, &in_ifaddrhead, ia_list) {
if (!in_hosteq(p->ia_addr.sin_addr, ia->ia_addr.sin_addr))
continue;
if (p->ia_ifp != ia->ia_ifp)
alt_ifa = &p->ia_ifa;
if (++ia_count > 1 && alt_ifa != NULL)
break;
}
if (ia_count == 0)
return;
rt_ifa_remlocal(ifa, ia_count == 1 ? NULL : alt_ifa);
}
void
in_purgeaddr(struct ifaddr *ifa)
{
struct ifnet *ifp = ifa->ifa_ifp;
struct in_ifaddr *ia = (void *) ifa;
2015-05-02 23:22:12 +03:00
/* stop DAD processing */
if (ia->ia_dad_stop != NULL)
ia->ia_dad_stop(ifa);
in_ifscrub(ifp, ia);
in_ifremlocal(ifa);
LIST_REMOVE(ia, ia_hash);
2007-12-06 03:28:36 +03:00
ifa_remove(ifp, &ia->ia_ifa);
TAILQ_REMOVE(&in_ifaddrhead, ia, ia_list);
if (ia->ia_allhosts != NULL)
in_delmulti(ia->ia_allhosts);
ifafree(&ia->ia_ifa);
in_setmaxmtu();
}
void
in_purgeif(struct ifnet *ifp) /* MUST be called at splsoftnet() */
{
if_purgeaddrs(ifp, AF_INET, in_purgeaddr);
igmp_purgeif(ifp); /* manipulates pools */
#ifdef MROUTING
ip_mrouter_detach(ifp);
#endif
}
/*
* SIOC[GAD]LIFADDR.
* SIOCGLIFADDR: get first address. (???)
* SIOCGLIFADDR with IFLR_PREFIX:
* get first address that matches the specified prefix.
* SIOCALIFADDR: add the specified address.
* SIOCALIFADDR with IFLR_PREFIX:
* EINVAL since we can't deduce hostid part of the address.
* SIOCDLIFADDR: delete the specified address.
* SIOCDLIFADDR with IFLR_PREFIX:
* delete the first address that matches the specified prefix.
* return values:
* EINVAL on invalid parameters
* EADDRNOTAVAIL on prefix match failed/specified address not found
* other values may be returned from in_ioctl()
*/
static int
in_lifaddr_ioctl(struct socket *so, u_long cmd, void *data,
struct ifnet *ifp)
{
struct if_laddrreq *iflr = (struct if_laddrreq *)data;
struct ifaddr *ifa;
struct sockaddr *sa;
/* sanity checks */
if (data == NULL || ifp == NULL) {
panic("invalid argument to in_lifaddr_ioctl");
/*NOTRECHED*/
}
switch (cmd) {
case SIOCGLIFADDR:
/* address must be specified on GET with IFLR_PREFIX */
if ((iflr->flags & IFLR_PREFIX) == 0)
break;
/*FALLTHROUGH*/
case SIOCALIFADDR:
case SIOCDLIFADDR:
/* address must be specified on ADD and DELETE */
sa = (struct sockaddr *)&iflr->addr;
if (sa->sa_family != AF_INET)
return EINVAL;
if (sa->sa_len != sizeof(struct sockaddr_in))
return EINVAL;
/* XXX need improvement */
sa = (struct sockaddr *)&iflr->dstaddr;
if (sa->sa_family != AF_UNSPEC && sa->sa_family != AF_INET)
return EINVAL;
if (sa->sa_len != 0 && sa->sa_len != sizeof(struct sockaddr_in))
return EINVAL;
break;
default: /*shouldn't happen*/
#if 0
panic("invalid cmd to in_lifaddr_ioctl");
/*NOTREACHED*/
#else
return EOPNOTSUPP;
#endif
}
2008-04-10 22:09:14 +04:00
if (sizeof(struct in_addr) * NBBY < iflr->prefixlen)
return EINVAL;
switch (cmd) {
case SIOCALIFADDR:
{
struct in_aliasreq ifra;
if (iflr->flags & IFLR_PREFIX)
return EINVAL;
/* copy args to in_aliasreq, perform ioctl(SIOCAIFADDR). */
2009-03-18 19:00:08 +03:00
memset(&ifra, 0, sizeof(ifra));
memcpy(ifra.ifra_name, iflr->iflr_name,
sizeof(ifra.ifra_name));
memcpy(&ifra.ifra_addr, &iflr->addr,
((struct sockaddr *)&iflr->addr)->sa_len);
if (((struct sockaddr *)&iflr->dstaddr)->sa_family) { /*XXX*/
memcpy(&ifra.ifra_dstaddr, &iflr->dstaddr,
((struct sockaddr *)&iflr->dstaddr)->sa_len);
}
ifra.ifra_mask.sin_family = AF_INET;
ifra.ifra_mask.sin_len = sizeof(struct sockaddr_in);
in_len2mask(&ifra.ifra_mask.sin_addr, iflr->prefixlen);
return in_control(so, SIOCAIFADDR, &ifra, ifp);
}
case SIOCGLIFADDR:
case SIOCDLIFADDR:
{
struct in_ifaddr *ia;
struct in_addr mask, candidate, match;
struct sockaddr_in *sin;
int cmp;
2009-03-18 19:00:08 +03:00
memset(&mask, 0, sizeof(mask));
memset(&match, 0, sizeof(match)); /* XXX gcc */
if (iflr->flags & IFLR_PREFIX) {
/* lookup a prefix rather than address. */
in_len2mask(&mask, iflr->prefixlen);
sin = (struct sockaddr_in *)&iflr->addr;
match.s_addr = sin->sin_addr.s_addr;
match.s_addr &= mask.s_addr;
/* if you set extra bits, that's wrong */
if (match.s_addr != sin->sin_addr.s_addr)
return EINVAL;
cmp = 1;
} else {
if (cmd == SIOCGLIFADDR) {
/* on getting an address, take the 1st match */
cmp = 0; /*XXX*/
} else {
/* on deleting an address, do exact match */
in_len2mask(&mask, 32);
sin = (struct sockaddr_in *)&iflr->addr;
match.s_addr = sin->sin_addr.s_addr;
cmp = 1;
}
}
IFADDR_FOREACH(ifa, ifp) {
if (ifa->ifa_addr->sa_family != AF_INET)
continue;
if (cmp == 0)
break;
candidate.s_addr = ((struct sockaddr_in *)ifa->ifa_addr)->sin_addr.s_addr;
candidate.s_addr &= mask.s_addr;
if (candidate.s_addr == match.s_addr)
break;
}
if (ifa == NULL)
return EADDRNOTAVAIL;
ia = (struct in_ifaddr *)ifa;
if (cmd == SIOCGLIFADDR) {
/* fill in the if_laddrreq structure */
memcpy(&iflr->addr, &ia->ia_addr, ia->ia_addr.sin_len);
if ((ifp->if_flags & IFF_POINTOPOINT) != 0) {
memcpy(&iflr->dstaddr, &ia->ia_dstaddr,
ia->ia_dstaddr.sin_len);
} else
2009-03-18 19:00:08 +03:00
memset(&iflr->dstaddr, 0, sizeof(iflr->dstaddr));
iflr->prefixlen =
in_mask2len(&ia->ia_sockmask.sin_addr);
iflr->flags = 0; /*XXX*/
return 0;
} else {
struct in_aliasreq ifra;
/* fill in_aliasreq and do ioctl(SIOCDIFADDR) */
2009-03-18 19:00:08 +03:00
memset(&ifra, 0, sizeof(ifra));
memcpy(ifra.ifra_name, iflr->iflr_name,
sizeof(ifra.ifra_name));
memcpy(&ifra.ifra_addr, &ia->ia_addr,
ia->ia_addr.sin_len);
if ((ifp->if_flags & IFF_POINTOPOINT) != 0) {
memcpy(&ifra.ifra_dstaddr, &ia->ia_dstaddr,
ia->ia_dstaddr.sin_len);
}
memcpy(&ifra.ifra_dstaddr, &ia->ia_sockmask,
ia->ia_sockmask.sin_len);
return in_control(so, SIOCDIFADDR, &ifra, ifp);
}
}
}
return EOPNOTSUPP; /*just for safety*/
}
1993-03-21 12:45:37 +03:00
/*
* Delete any existing route for an interface.
*/
void
in_ifscrub(struct ifnet *ifp, struct in_ifaddr *ia)
1993-03-21 12:45:37 +03:00
{
in_scrubprefix(ia);
1993-03-21 12:45:37 +03:00
}
/*
* Initialize an interface's internet address
* and routing table entry.
*/
int
in_ifinit(struct ifnet *ifp, struct in_ifaddr *ia,
const struct sockaddr_in *sin, int scrub, int hostIsNew)
1993-03-21 12:45:37 +03:00
{
u_int32_t i;
1993-03-21 12:45:37 +03:00
struct sockaddr_in oldaddr;
int s = splnet(), flags = RTF_UP, error;
1993-03-21 12:45:37 +03:00
if (sin == NULL)
sin = &ia->ia_addr;
/*
* Set up new addresses.
*/
1993-03-21 12:45:37 +03:00
oldaddr = ia->ia_addr;
if (ia->ia_addr.sin_family == AF_INET)
LIST_REMOVE(ia, ia_hash);
1993-03-21 12:45:37 +03:00
ia->ia_addr = *sin;
LIST_INSERT_HEAD(&IN_IFADDR_HASH(ia->ia_addr.sin_addr.s_addr), ia, ia_hash);
/* Set IN_IFF flags early for if_addr_init() */
if (hostIsNew && if_do_dad(ifp) && !in_nullhost(ia->ia_addr.sin_addr)) {
if (ifp->if_link_state == LINK_STATE_DOWN)
ia->ia4_flags |= IN_IFF_DETACHED;
else
/* State the intent to try DAD if possible */
ia->ia4_flags |= IN_IFF_TRYTENTATIVE;
}
1993-03-21 12:45:37 +03:00
/*
* Give the interface a chance to initialize
* if this is its first address,
* and to validate the address if necessary.
*/
if ((error = if_addr_init(ifp, &ia->ia_ifa, true)) != 0)
goto bad;
/* Now clear the try tentative flag, it's job is done. */
ia->ia4_flags &= ~IN_IFF_TRYTENTATIVE;
1993-03-21 12:45:37 +03:00
splx(s);
1993-03-21 12:45:37 +03:00
if (scrub) {
1995-06-04 08:35:29 +04:00
ia->ia_ifa.ifa_addr = sintosa(&oldaddr);
1993-03-21 12:45:37 +03:00
in_ifscrub(ifp, ia);
1995-06-04 08:35:29 +04:00
ia->ia_ifa.ifa_addr = sintosa(&ia->ia_addr);
1993-03-21 12:45:37 +03:00
}
/* Add the local route to the address */
in_ifaddlocal(&ia->ia_ifa);
i = ia->ia_addr.sin_addr.s_addr;
1993-03-21 12:45:37 +03:00
if (IN_CLASSA(i))
ia->ia_netmask = IN_CLASSA_NET;
else if (IN_CLASSB(i))
ia->ia_netmask = IN_CLASSB_NET;
else
ia->ia_netmask = IN_CLASSC_NET;
/*
* The subnet mask usually includes at least the standard network part,
* but may may be smaller in the case of supernetting.
* If it is set, we believe it.
1993-03-21 12:45:37 +03:00
*/
if (ia->ia_subnetmask == 0) {
ia->ia_subnetmask = ia->ia_netmask;
ia->ia_sockmask.sin_addr.s_addr = ia->ia_subnetmask;
} else
ia->ia_netmask &= ia->ia_subnetmask;
ia->ia_net = i & ia->ia_netmask;
1993-03-21 12:45:37 +03:00
ia->ia_subnet = i & ia->ia_subnetmask;
in_socktrim(&ia->ia_sockmask);
/* re-calculate the "in_maxmtu" value */
in_setmaxmtu();
1993-03-21 12:45:37 +03:00
/*
* Add route for the network.
*/
ia->ia_ifa.ifa_metric = ifp->if_metric;
1993-03-21 12:45:37 +03:00
if (ifp->if_flags & IFF_BROADCAST) {
ia->ia_broadaddr.sin_addr.s_addr =
ia->ia_subnet | ~ia->ia_subnetmask;
1993-03-21 12:45:37 +03:00
ia->ia_netbroadcast.s_addr =
ia->ia_net | ~ia->ia_netmask;
1993-03-21 12:45:37 +03:00
} else if (ifp->if_flags & IFF_LOOPBACK) {
ia->ia_dstaddr = ia->ia_addr;
1993-03-21 12:45:37 +03:00
flags |= RTF_HOST;
} else if (ifp->if_flags & IFF_POINTOPOINT) {
if (ia->ia_dstaddr.sin_family != AF_INET)
return (0);
flags |= RTF_HOST;
}
error = in_addprefix(ia, flags);
/*
* If the interface supports multicast, join the "all hosts"
* multicast group on that interface.
*/
if ((ifp->if_flags & IFF_MULTICAST) != 0 && ia->ia_allhosts == NULL) {
struct in_addr addr;
addr.s_addr = INADDR_ALLHOSTS_GROUP;
ia->ia_allhosts = in_addmulti(&addr, ifp);
}
if (hostIsNew && if_do_dad(ifp) &&
!in_nullhost(ia->ia_addr.sin_addr) &&
ia->ia4_flags & IN_IFF_TENTATIVE)
ia->ia_dad_start((struct ifaddr *)ia);
1993-03-21 12:45:37 +03:00
return (error);
bad:
splx(s);
LIST_REMOVE(ia, ia_hash);
ia->ia_addr = oldaddr;
if (ia->ia_addr.sin_family == AF_INET)
LIST_INSERT_HEAD(&IN_IFADDR_HASH(ia->ia_addr.sin_addr.s_addr),
ia, ia_hash);
return (error);
1993-03-21 12:45:37 +03:00
}
#define rtinitflags(x) \
((((x)->ia_ifp->if_flags & (IFF_LOOPBACK | IFF_POINTOPOINT)) != 0) \
? RTF_HOST : 0)
/*
* add a route to prefix ("connected route" in cisco terminology).
* does nothing if there's some interface address with the same prefix already.
*/
static int
in_addprefix(struct in_ifaddr *target, int flags)
{
struct in_ifaddr *ia;
struct in_addr prefix, mask, p;
int error;
if ((flags & RTF_HOST) != 0)
prefix = target->ia_dstaddr.sin_addr;
else {
prefix = target->ia_addr.sin_addr;
mask = target->ia_sockmask.sin_addr;
prefix.s_addr &= mask.s_addr;
}
TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list) {
if (rtinitflags(ia))
p = ia->ia_dstaddr.sin_addr;
else {
p = ia->ia_addr.sin_addr;
p.s_addr &= ia->ia_sockmask.sin_addr.s_addr;
}
if (prefix.s_addr != p.s_addr)
continue;
/*
* if we got a matching prefix route inserted by other
2001-09-16 12:49:50 +04:00
* interface address, we don't need to bother
*
* XXX RADIX_MPATH implications here? -dyoung
*/
if (ia->ia_flags & IFA_ROUTE)
return 0;
}
/*
* noone seem to have prefix route. insert it.
*/
error = rtinit(&target->ia_ifa, RTM_ADD, flags);
if (error == 0)
target->ia_flags |= IFA_ROUTE;
else if (error == EEXIST) {
/*
* the fact the route already exists is not an error.
*/
error = 0;
}
return error;
}
/*
* remove a route to prefix ("connected route" in cisco terminology).
* re-installs the route by using another interface address, if there's one
* with the same prefix (otherwise we lose the route mistakenly).
*/
static int
in_scrubprefix(struct in_ifaddr *target)
{
struct in_ifaddr *ia;
struct in_addr prefix, mask, p;
int error;
/* If we don't have IFA_ROUTE we should still inform userland */
if ((target->ia_flags & IFA_ROUTE) == 0)
return 0;
if (rtinitflags(target))
prefix = target->ia_dstaddr.sin_addr;
else {
prefix = target->ia_addr.sin_addr;
mask = target->ia_sockmask.sin_addr;
prefix.s_addr &= mask.s_addr;
}
TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list) {
if (rtinitflags(ia))
p = ia->ia_dstaddr.sin_addr;
else {
p = ia->ia_addr.sin_addr;
p.s_addr &= ia->ia_sockmask.sin_addr.s_addr;
}
if (prefix.s_addr != p.s_addr)
continue;
/*
* if we got a matching prefix route, move IFA_ROUTE to him
*/
if ((ia->ia_flags & IFA_ROUTE) == 0) {
rtinit(&target->ia_ifa, RTM_DELETE,
rtinitflags(target));
target->ia_flags &= ~IFA_ROUTE;
error = rtinit(&ia->ia_ifa, RTM_ADD,
rtinitflags(ia) | RTF_UP);
if (error == 0)
ia->ia_flags |= IFA_ROUTE;
return error;
}
}
/*
* noone seem to have prefix route. remove it.
*/
rtinit(&target->ia_ifa, RTM_DELETE, rtinitflags(target));
target->ia_flags &= ~IFA_ROUTE;
return 0;
}
#undef rtinitflags
1993-03-21 12:45:37 +03:00
/*
* Return 1 if the address might be a local broadcast address.
*/
1994-01-09 04:06:02 +03:00
int
in_broadcast(struct in_addr in, struct ifnet *ifp)
1993-03-21 12:45:37 +03:00
{
2000-03-30 16:51:13 +04:00
struct ifaddr *ifa;
1993-03-21 12:45:37 +03:00
if (in.s_addr == INADDR_BROADCAST ||
in_nullhost(in))
return 1;
if ((ifp->if_flags & IFF_BROADCAST) == 0)
return 0;
1993-03-21 12:45:37 +03:00
/*
* Look through the list of addresses for a match
* with a broadcast address.
*/
1995-06-04 09:06:49 +04:00
#define ia (ifatoia(ifa))
IFADDR_FOREACH(ifa, ifp)
if (ifa->ifa_addr->sa_family == AF_INET &&
!in_hosteq(in, ia->ia_addr.sin_addr) &&
(in_hosteq(in, ia->ia_broadaddr.sin_addr) ||
in_hosteq(in, ia->ia_netbroadcast) ||
2002-06-09 20:33:36 +04:00
(hostzeroisbroadcast &&
/*
* Check for old-style (host 0) broadcast.
*/
(in.s_addr == ia->ia_subnet ||
in.s_addr == ia->ia_net))))
return 1;
1993-03-21 12:45:37 +03:00
return (0);
#undef ia
1993-03-21 12:45:37 +03:00
}
/*
* perform DAD when interface becomes IFF_UP.
*/
void
in_if_link_up(struct ifnet *ifp)
{
struct ifaddr *ifa;
struct in_ifaddr *ia;
/* Ensure it's sane to run DAD */
if (ifp->if_link_state == LINK_STATE_DOWN)
return;
if ((ifp->if_flags & (IFF_UP|IFF_RUNNING)) != (IFF_UP|IFF_RUNNING))
return;
IFADDR_FOREACH(ifa, ifp) {
if (ifa->ifa_addr->sa_family != AF_INET)
continue;
ia = (struct in_ifaddr *)ifa;
/* If detached then mark as tentative */
if (ia->ia4_flags & IN_IFF_DETACHED) {
ia->ia4_flags &= ~IN_IFF_DETACHED;
if (if_do_dad(ifp) && ia->ia_dad_start != NULL)
ia->ia4_flags |= IN_IFF_TENTATIVE;
else if ((ia->ia4_flags & IN_IFF_TENTATIVE) == 0)
rt_newaddrmsg(RTM_NEWADDR, ifa, 0, NULL);
}
if (ia->ia4_flags & IN_IFF_TENTATIVE) {
/* Clear the duplicated flag as we're starting DAD. */
ia->ia4_flags &= ~IN_IFF_DUPLICATED;
ia->ia_dad_start(ifa);
}
}
}
void
in_if_up(struct ifnet *ifp)
{
/* interface may not support link state, so bring it up also */
in_if_link_up(ifp);
}
/*
* Mark all addresses as detached.
*/
void
in_if_link_down(struct ifnet *ifp)
{
struct ifaddr *ifa;
struct in_ifaddr *ia;
IFADDR_FOREACH(ifa, ifp) {
if (ifa->ifa_addr->sa_family != AF_INET)
continue;
ia = (struct in_ifaddr *)ifa;
/* Stop DAD processing */
if (ia->ia_dad_stop != NULL)
ia->ia_dad_stop(ifa);
/*
* Mark the address as detached.
*/
if (!(ia->ia4_flags & IN_IFF_DETACHED)) {
ia->ia4_flags |= IN_IFF_DETACHED;
ia->ia4_flags &=
~(IN_IFF_TENTATIVE | IN_IFF_DUPLICATED);
rt_newaddrmsg(RTM_NEWADDR, ifa, 0, NULL);
}
}
}
void
in_if_down(struct ifnet *ifp)
{
in_if_link_down(ifp);
}
void
in_if_link_state_change(struct ifnet *ifp, int link_state)
{
switch (link_state) {
case LINK_STATE_DOWN:
in_if_link_down(ifp);
break;
case LINK_STATE_UP:
in_if_link_up(ifp);
break;
}
}
/*
* in_lookup_multi: look up the in_multi record for a given IP
* multicast address on a given interface. If no matching record is
* found, return NULL.
*/
struct in_multi *
in_lookup_multi(struct in_addr addr, ifnet_t *ifp)
{
struct in_multi *inm;
KASSERT(rw_lock_held(&in_multilock));
LIST_FOREACH(inm, &IN_MULTI_HASH(addr.s_addr, ifp), inm_list) {
if (in_hosteq(inm->inm_addr, addr) && inm->inm_ifp == ifp)
break;
}
return inm;
}
/*
* in_multi_group: check whether the address belongs to an IP multicast
* group we are joined on this interface. Returns true or false.
*/
bool
in_multi_group(struct in_addr addr, ifnet_t *ifp, int flags)
{
bool ingroup;
if (__predict_true(flags & IP_IGMP_MCAST) == 0) {
rw_enter(&in_multilock, RW_READER);
ingroup = in_lookup_multi(addr, ifp) != NULL;
rw_exit(&in_multilock);
} else {
/* XXX Recursive call from ip_output(). */
KASSERT(rw_lock_held(&in_multilock));
ingroup = in_lookup_multi(addr, ifp) != NULL;
}
return ingroup;
}
/*
* Add an address to the list of IP multicast addresses for a given interface.
*/
struct in_multi *
in_addmulti(struct in_addr *ap, ifnet_t *ifp)
{
struct sockaddr_in sin;
2000-03-30 16:51:13 +04:00
struct in_multi *inm;
/*
* See if address already in list.
*/
rw_enter(&in_multilock, RW_WRITER);
inm = in_lookup_multi(*ap, ifp);
if (inm != NULL) {
/*
* Found it; just increment the reference count.
*/
inm->inm_refcount++;
rw_exit(&in_multilock);
return inm;
}
/*
* New address; allocate a new multicast record.
*/
inm = pool_get(&inmulti_pool, PR_NOWAIT);
if (inm == NULL) {
rw_exit(&in_multilock);
return NULL;
}
inm->inm_addr = *ap;
inm->inm_ifp = ifp;
inm->inm_refcount = 1;
/*
* Ask the network driver to update its multicast reception
* filter appropriately for the new address.
*/
sockaddr_in_init(&sin, ap, 0);
if (if_mcast_op(ifp, SIOCADDMULTI, sintosa(&sin)) != 0) {
rw_exit(&in_multilock);
pool_put(&inmulti_pool, inm);
return NULL;
}
/*
* Let IGMP know that we have joined a new IP multicast group.
*/
if (igmp_joingroup(inm) != 0) {
rw_exit(&in_multilock);
pool_put(&inmulti_pool, inm);
return NULL;
}
LIST_INSERT_HEAD(
&IN_MULTI_HASH(inm->inm_addr.s_addr, ifp),
inm, inm_list);
in_multientries++;
rw_exit(&in_multilock);
return inm;
}
/*
* Delete a multicast address record.
*/
1996-02-14 02:40:59 +03:00
void
in_delmulti(struct in_multi *inm)
{
struct sockaddr_in sin;
rw_enter(&in_multilock, RW_WRITER);
if (--inm->inm_refcount > 0) {
rw_exit(&in_multilock);
return;
}
/*
* No remaining claims to this record; let IGMP know that
* we are leaving the multicast group.
*/
igmp_leavegroup(inm);
/*
* Notify the network driver to update its multicast reception
* filter.
*/
sockaddr_in_init(&sin, &inm->inm_addr, 0);
if_mcast_op(inm->inm_ifp, SIOCDELMULTI, sintosa(&sin));
/*
* Unlink from list.
*/
LIST_REMOVE(inm, inm_list);
in_multientries--;
rw_exit(&in_multilock);
pool_put(&inmulti_pool, inm);
}
/*
* in_next_multi: step through all of the in_multi records, one at a time.
* The current position is remembered in "step", which the caller must
* provide. in_first_multi(), below, must be called to initialize "step"
* and get the first record. Both macros return a NULL "inm" when there
* are no remaining records.
*/
struct in_multi *
in_next_multi(struct in_multistep *step)
{
struct in_multi *inm;
KASSERT(rw_lock_held(&in_multilock));
while (step->i_inm == NULL && step->i_n < IN_MULTI_HASH_SIZE) {
step->i_inm = LIST_FIRST(&in_multihashtbl[++step->i_n]);
}
if ((inm = step->i_inm) != NULL) {
step->i_inm = LIST_NEXT(inm, inm_list);
}
return inm;
}
struct in_multi *
in_first_multi(struct in_multistep *step)
{
KASSERT(rw_lock_held(&in_multilock));
step->i_n = 0;
step->i_inm = LIST_FIRST(&in_multihashtbl[0]);
return in_next_multi(step);
}
void
in_multi_lock(int op)
{
rw_enter(&in_multilock, op);
}
void
in_multi_unlock(void)
{
rw_exit(&in_multilock);
}
int
in_multi_lock_held(void)
{
return rw_lock_held(&in_multilock);
}
struct sockaddr_in *
in_selectsrc(struct sockaddr_in *sin, struct route *ro,
int soopts, struct ip_moptions *mopts, int *errorp)
{
struct rtentry *rt = NULL;
struct in_ifaddr *ia = NULL;
/*
* If route is known or can be allocated now, take the
* source address from the interface. Otherwise, punt.
*/
if ((soopts & SO_DONTROUTE) != 0)
rtcache_free(ro);
else {
union {
struct sockaddr dst;
struct sockaddr_in dst4;
} u;
sockaddr_in_init(&u.dst4, &sin->sin_addr, 0);
rt = rtcache_lookup(ro, &u.dst);
}
/*
* If we found a route, use the address
* corresponding to the outgoing interface
* unless it is the loopback (in case a route
* to our address on another net goes to loopback).
*
* XXX Is this still true? Do we care?
*/
if (rt != NULL && (rt->rt_ifp->if_flags & IFF_LOOPBACK) == 0)
ia = ifatoia(rt->rt_ifa);
if (ia == NULL) {
u_int16_t fport = sin->sin_port;
sin->sin_port = 0;
ia = ifatoia(ifa_ifwithladdr(sintosa(sin)));
sin->sin_port = fport;
if (ia == NULL) {
/* Find 1st non-loopback AF_INET address */
TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list) {
if (!(ia->ia_ifp->if_flags & IFF_LOOPBACK))
break;
}
}
if (ia == NULL) {
*errorp = EADDRNOTAVAIL;
return NULL;
}
}
/*
* If the destination address is multicast and an outgoing
* interface has been set as a multicast option, use the
* address of that interface as our source address.
*/
if (IN_MULTICAST(sin->sin_addr.s_addr) && mopts != NULL) {
struct ip_moptions *imo;
struct ifnet *ifp;
imo = mopts;
if (imo->imo_multicast_ifp != NULL) {
ifp = imo->imo_multicast_ifp;
IFP_TO_IA(ifp, ia); /* XXX */
if (ia == 0 || ia->ia4_flags & IN_IFF_NOTREADY) {
*errorp = EADDRNOTAVAIL;
return NULL;
}
}
}
if (ia->ia_ifa.ifa_getifa != NULL) {
ia = ifatoia((*ia->ia_ifa.ifa_getifa)(&ia->ia_ifa,
sintosa(sin)));
if (ia == NULL) {
*errorp = EADDRNOTAVAIL;
return NULL;
}
}
#ifdef GETIFA_DEBUG
else
printf("%s: missing ifa_getifa\n", __func__);
#endif
return satosin(&ia->ia_addr);
}
static void
in_sysctl_init(struct sysctllog **clog)
{
sysctl_createv(clog, 0, NULL, NULL,
CTLFLAG_PERMANENT,
CTLTYPE_NODE, "inet",
SYSCTL_DESCR("PF_INET related settings"),
NULL, 0, NULL, 0,
CTL_NET, PF_INET, CTL_EOL);
sysctl_createv(clog, 0, NULL, NULL,
CTLFLAG_PERMANENT,
CTLTYPE_NODE, "ip",
SYSCTL_DESCR("IPv4 related settings"),
NULL, 0, NULL, 0,
CTL_NET, PF_INET, IPPROTO_IP, CTL_EOL);
sysctl_createv(clog, 0, NULL, NULL,
CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
CTLTYPE_INT, "subnetsarelocal",
SYSCTL_DESCR("Whether logical subnets are considered "
"local"),
NULL, 0, &subnetsarelocal, 0,
CTL_NET, PF_INET, IPPROTO_IP,
IPCTL_SUBNETSARELOCAL, CTL_EOL);
sysctl_createv(clog, 0, NULL, NULL,
CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
CTLTYPE_INT, "hostzerobroadcast",
SYSCTL_DESCR("All zeroes address is broadcast address"),
NULL, 0, &hostzeroisbroadcast, 0,
CTL_NET, PF_INET, IPPROTO_IP,
IPCTL_HOSTZEROBROADCAST, CTL_EOL);
}