2015-05-16 15:12:46 +03:00
|
|
|
/* $NetBSD: in.c,v 1.156 2015/05/16 12:12:46 roy Exp $ */
|
1999-07-01 12:12:45 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
|
|
|
|
* All rights reserved.
|
2002-06-09 20:33:36 +04:00
|
|
|
*
|
1999-07-01 12:12:45 +04:00
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. Neither the name of the project nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
2002-06-09 20:33:36 +04:00
|
|
|
*
|
1999-07-01 12:12:45 +04:00
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
1998-12-19 05:46:12 +03:00
|
|
|
|
|
|
|
/*-
|
|
|
|
* Copyright (c) 1998 The NetBSD Foundation, Inc.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* This code is derived from software contributed to The NetBSD Foundation
|
|
|
|
* by Public Access Networks Corporation ("Panix"). It was developed under
|
|
|
|
* contract to Panix by Eric Haszlakiewicz and Thor Lancelot Simon.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
|
|
|
|
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
|
|
|
|
* TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
|
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
|
|
|
|
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
|
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
|
|
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
1994-06-29 10:29:24 +04:00
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
1994-05-13 10:02:48 +04:00
|
|
|
* Copyright (c) 1982, 1986, 1991, 1993
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
1993-03-21 12:45:37 +03:00
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
2003-08-07 20:26:28 +04:00
|
|
|
* 3. Neither the name of the University nor the names of its contributors
|
1993-03-21 12:45:37 +03:00
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
1998-01-05 13:31:44 +03:00
|
|
|
* @(#)in.c 8.4 (Berkeley) 1/9/95
|
1993-03-21 12:45:37 +03:00
|
|
|
*/
|
|
|
|
|
2001-11-13 03:32:34 +03:00
|
|
|
#include <sys/cdefs.h>
|
2015-05-16 15:12:46 +03:00
|
|
|
__KERNEL_RCSID(0, "$NetBSD: in.c,v 1.156 2015/05/16 12:12:46 roy Exp $");
|
2001-11-13 03:32:34 +03:00
|
|
|
|
2015-05-02 23:22:12 +03:00
|
|
|
#include "arp.h"
|
1998-07-05 04:51:04 +04:00
|
|
|
#include "opt_inet.h"
|
1999-06-26 10:16:47 +04:00
|
|
|
#include "opt_inet_conf.h"
|
1998-01-12 06:02:48 +03:00
|
|
|
#include "opt_mrouting.h"
|
|
|
|
|
1993-12-18 03:40:47 +03:00
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/ioctl.h>
|
1994-05-13 10:02:48 +04:00
|
|
|
#include <sys/errno.h>
|
2015-05-02 17:41:32 +03:00
|
|
|
#include <sys/kernel.h>
|
1994-05-13 10:02:48 +04:00
|
|
|
#include <sys/malloc.h>
|
1993-12-18 03:40:47 +03:00
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/socketvar.h>
|
2006-11-13 08:13:38 +03:00
|
|
|
#include <sys/sysctl.h>
|
1996-02-14 02:40:59 +03:00
|
|
|
#include <sys/systm.h>
|
1996-05-22 17:54:55 +04:00
|
|
|
#include <sys/proc.h>
|
2002-02-22 00:59:16 +03:00
|
|
|
#include <sys/syslog.h>
|
2006-05-15 01:19:33 +04:00
|
|
|
#include <sys/kauth.h>
|
1993-12-18 03:40:47 +03:00
|
|
|
|
First step of random number subsystem rework described in
<20111022023242.BA26F14A158@mail.netbsd.org>. This change includes
the following:
An initial cleanup and minor reorganization of the entropy pool
code in sys/dev/rnd.c and sys/dev/rndpool.c. Several bugs are
fixed. Some effort is made to accumulate entropy more quickly at
boot time.
A generic interface, "rndsink", is added, for stream generators to
request that they be re-keyed with good quality entropy from the pool
as soon as it is available.
The arc4random()/arc4randbytes() implementation in libkern is
adjusted to use the rndsink interface for rekeying, which helps
address the problem of low-quality keys at boot time.
An implementation of the FIPS 140-2 statistical tests for random
number generator quality is provided (libkern/rngtest.c). This
is based on Greg Rose's implementation from Qualcomm.
A new random stream generator, nist_ctr_drbg, is provided. It is
based on an implementation of the NIST SP800-90 CTR_DRBG by
Henric Jungheim. This generator users AES in a modified counter
mode to generate a backtracking-resistant random stream.
An abstraction layer, "cprng", is provided for in-kernel consumers
of randomness. The arc4random/arc4randbytes API is deprecated for
in-kernel use. It is replaced by "cprng_strong". The current
cprng_fast implementation wraps the existing arc4random
implementation. The current cprng_strong implementation wraps the
new CTR_DRBG implementation. Both interfaces are rekeyed from
the entropy pool automatically at intervals justifiable from best
current cryptographic practice.
In some quick tests, cprng_fast() is about the same speed as
the old arc4randbytes(), and cprng_strong() is about 20% faster
than rnd_extract_data(). Performance is expected to improve.
The AES code in src/crypto/rijndael is no longer an optional
kernel component, as it is required by cprng_strong, which is
not an optional kernel component.
The entropy pool output is subjected to the rngtest tests at
startup time; if it fails, the system will reboot. There is
approximately a 3/10000 chance of a false positive from these
tests. Entropy pool _input_ from hardware random numbers is
subjected to the rngtest tests at attach time, as well as the
FIPS continuous-output test, to detect bad or stuck hardware
RNGs; if any are detected, they are detached, but the system
continues to run.
A problem with rndctl(8) is fixed -- datastructures with
pointers in arrays are no longer passed to userspace (this
was not a security problem, but rather a major issue for
compat32). A new kernel will require a new rndctl.
The sysctl kern.arandom() and kern.urandom() nodes are hooked
up to the new generators, but the /dev/*random pseudodevices
are not, yet.
Manual pages for the new kernel interfaces are forthcoming.
2011-11-20 02:51:18 +04:00
|
|
|
#include <sys/cprng.h>
|
|
|
|
|
1993-12-18 03:40:47 +03:00
|
|
|
#include <net/if.h>
|
|
|
|
#include <net/route.h>
|
2013-06-30 01:06:57 +04:00
|
|
|
#include <net/pfil.h>
|
1993-12-18 03:40:47 +03:00
|
|
|
|
1997-03-15 21:09:08 +03:00
|
|
|
#include <net/if_ether.h>
|
|
|
|
|
1994-05-13 10:02:48 +04:00
|
|
|
#include <netinet/in_systm.h>
|
1993-12-18 03:40:47 +03:00
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <netinet/in_var.h>
|
2003-06-15 06:49:32 +04:00
|
|
|
#include <netinet/ip.h>
|
|
|
|
#include <netinet/ip_var.h>
|
2006-11-13 08:13:38 +03:00
|
|
|
#include <netinet/in_ifattach.h>
|
2003-06-15 06:49:32 +04:00
|
|
|
#include <netinet/in_pcb.h>
|
1997-03-15 21:09:08 +03:00
|
|
|
#include <netinet/if_inarp.h>
|
1995-06-01 01:50:34 +04:00
|
|
|
#include <netinet/ip_mroute.h>
|
1996-02-14 02:40:59 +03:00
|
|
|
#include <netinet/igmp_var.h>
|
1994-01-09 04:06:02 +03:00
|
|
|
|
2006-11-13 08:13:38 +03:00
|
|
|
#ifdef IPSELSRC
|
|
|
|
#include <netinet/in_selsrc.h>
|
|
|
|
#endif
|
|
|
|
|
2014-05-23 02:01:12 +04:00
|
|
|
static u_int in_mask2len(struct in_addr *);
|
|
|
|
static void in_len2mask(struct in_addr *, u_int);
|
|
|
|
static int in_lifaddr_ioctl(struct socket *, u_long, void *,
|
2014-07-01 09:49:18 +04:00
|
|
|
struct ifnet *);
|
1999-07-01 12:12:45 +04:00
|
|
|
|
2014-05-23 02:01:12 +04:00
|
|
|
static int in_addprefix(struct in_ifaddr *, int);
|
|
|
|
static int in_scrubprefix(struct in_ifaddr *);
|
|
|
|
static void in_sysctl_init(struct sysctllog **);
|
2001-07-22 20:18:31 +04:00
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
#ifndef SUBNETSARELOCAL
|
|
|
|
#define SUBNETSARELOCAL 1
|
|
|
|
#endif
|
1999-06-26 10:16:47 +04:00
|
|
|
|
|
|
|
#ifndef HOSTZEROBROADCAST
|
|
|
|
#define HOSTZEROBROADCAST 1
|
|
|
|
#endif
|
|
|
|
|
2014-05-30 03:02:48 +04:00
|
|
|
/* Note: 61, 127, 251, 509, 1021, 2039 are good. */
|
|
|
|
#ifndef IN_MULTI_HASH_SIZE
|
|
|
|
#define IN_MULTI_HASH_SIZE 509
|
|
|
|
#endif
|
|
|
|
|
2014-05-23 02:01:12 +04:00
|
|
|
static int subnetsarelocal = SUBNETSARELOCAL;
|
|
|
|
static int hostzeroisbroadcast = HOSTZEROBROADCAST;
|
1996-09-06 09:07:43 +04:00
|
|
|
|
2000-10-08 06:05:47 +04:00
|
|
|
/*
|
2000-10-08 13:15:28 +04:00
|
|
|
* This list is used to keep track of in_multi chains which belong to
|
|
|
|
* deleted interface addresses. We use in_ifaddr so that a chain head
|
|
|
|
* won't be deallocated until all multicast address record are deleted.
|
2000-10-08 06:05:47 +04:00
|
|
|
*/
|
2014-05-30 03:02:48 +04:00
|
|
|
|
|
|
|
LIST_HEAD(in_multihashhead, in_multi); /* Type of the hash head */
|
2014-05-23 02:01:12 +04:00
|
|
|
|
|
|
|
static struct pool inmulti_pool;
|
|
|
|
static u_int in_multientries;
|
2014-05-30 03:02:48 +04:00
|
|
|
static struct in_multihashhead *in_multihashtbl;
|
|
|
|
static u_long in_multihash;
|
|
|
|
static krwlock_t in_multilock;
|
|
|
|
|
|
|
|
#define IN_MULTI_HASH(x, ifp) \
|
|
|
|
(in_multihashtbl[(u_long)((x) ^ (ifp->if_index)) % IN_MULTI_HASH_SIZE])
|
2014-05-23 02:01:12 +04:00
|
|
|
|
|
|
|
struct in_ifaddrhashhead * in_ifaddrhashtbl;
|
|
|
|
u_long in_ifaddrhash;
|
|
|
|
struct in_ifaddrhead in_ifaddrhead;
|
|
|
|
|
|
|
|
void
|
|
|
|
in_init(void)
|
|
|
|
{
|
|
|
|
pool_init(&inmulti_pool, sizeof(struct in_multi), 0, 0, 0, "inmltpl",
|
|
|
|
NULL, IPL_SOFTNET);
|
|
|
|
TAILQ_INIT(&in_ifaddrhead);
|
|
|
|
|
|
|
|
in_ifaddrhashtbl = hashinit(IN_IFADDR_HASH_SIZE, HASH_LIST, true,
|
|
|
|
&in_ifaddrhash);
|
|
|
|
in_multihashtbl = hashinit(IN_IFADDR_HASH_SIZE, HASH_LIST, true,
|
|
|
|
&in_multihash);
|
2014-05-30 03:02:48 +04:00
|
|
|
rw_init(&in_multilock);
|
2014-05-23 02:01:12 +04:00
|
|
|
|
|
|
|
in_sysctl_init(NULL);
|
|
|
|
}
|
2000-10-08 06:05:47 +04:00
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* Return 1 if an internet address is for a ``local'' host
|
|
|
|
* (one to which we have a connection). If subnetsarelocal
|
|
|
|
* is true, this includes other subnets of the local net.
|
|
|
|
* Otherwise, it includes only the directly-connected (sub)nets.
|
|
|
|
*/
|
1994-01-09 04:06:02 +03:00
|
|
|
int
|
2005-02-03 06:49:01 +03:00
|
|
|
in_localaddr(struct in_addr in)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
2000-03-30 16:51:13 +04:00
|
|
|
struct in_ifaddr *ia;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
if (subnetsarelocal) {
|
2003-11-11 23:25:26 +03:00
|
|
|
TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list)
|
1995-06-02 01:35:34 +04:00
|
|
|
if ((in.s_addr & ia->ia_netmask) == ia->ia_net)
|
1993-03-21 12:45:37 +03:00
|
|
|
return (1);
|
|
|
|
} else {
|
2003-11-11 23:25:26 +03:00
|
|
|
TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list)
|
1995-06-02 01:35:34 +04:00
|
|
|
if ((in.s_addr & ia->ia_subnetmask) == ia->ia_subnet)
|
1993-03-21 12:45:37 +03:00
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Determine whether an IP address is in a reserved set of addresses
|
|
|
|
* that may not be forwarded, or whether datagrams to that destination
|
|
|
|
* may be forwarded.
|
|
|
|
*/
|
1994-01-09 04:06:02 +03:00
|
|
|
int
|
2005-02-03 06:49:01 +03:00
|
|
|
in_canforward(struct in_addr in)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
2000-03-30 16:51:13 +04:00
|
|
|
u_int32_t net;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
1995-06-02 01:35:34 +04:00
|
|
|
if (IN_EXPERIMENTAL(in.s_addr) || IN_MULTICAST(in.s_addr))
|
1993-03-21 12:45:37 +03:00
|
|
|
return (0);
|
1995-06-02 01:35:34 +04:00
|
|
|
if (IN_CLASSA(in.s_addr)) {
|
|
|
|
net = in.s_addr & IN_CLASSA_NET;
|
|
|
|
if (net == 0 || net == htonl(IN_LOOPBACKNET << IN_CLASSA_NSHIFT))
|
1993-03-21 12:45:37 +03:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
|
1994-05-13 10:02:48 +04:00
|
|
|
/*
|
|
|
|
* Trim a mask in a sockaddr
|
|
|
|
*/
|
|
|
|
void
|
2005-02-03 06:49:01 +03:00
|
|
|
in_socktrim(struct sockaddr_in *ap)
|
1994-05-13 10:02:48 +04:00
|
|
|
{
|
2000-03-30 16:51:13 +04:00
|
|
|
char *cplim = (char *) &ap->sin_addr;
|
|
|
|
char *cp = (char *) (&ap->sin_addr + 1);
|
1994-05-13 10:02:48 +04:00
|
|
|
|
|
|
|
ap->sin_len = 0;
|
1994-11-03 17:57:35 +03:00
|
|
|
while (--cp >= cplim)
|
1994-05-13 10:02:48 +04:00
|
|
|
if (*cp) {
|
|
|
|
(ap)->sin_len = cp - (char *) (ap) + 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
1998-05-29 19:34:24 +04:00
|
|
|
/*
|
|
|
|
* Routine to take an Internet address and convert into a
|
|
|
|
* "dotted quad" representation for printing.
|
|
|
|
*/
|
|
|
|
const char *
|
2005-02-03 06:49:01 +03:00
|
|
|
in_fmtaddr(struct in_addr addr)
|
1998-05-29 19:34:24 +04:00
|
|
|
{
|
|
|
|
static char buf[sizeof("123.456.789.123")];
|
|
|
|
|
|
|
|
addr.s_addr = ntohl(addr.s_addr);
|
|
|
|
|
2004-04-21 22:40:37 +04:00
|
|
|
snprintf(buf, sizeof(buf), "%d.%d.%d.%d",
|
1998-05-29 19:34:24 +04:00
|
|
|
(addr.s_addr >> 24) & 0xFF,
|
|
|
|
(addr.s_addr >> 16) & 0xFF,
|
|
|
|
(addr.s_addr >> 8) & 0xFF,
|
|
|
|
(addr.s_addr >> 0) & 0xFF);
|
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
1997-07-24 01:26:40 +04:00
|
|
|
/*
|
|
|
|
* Maintain the "in_maxmtu" variable, which is the largest
|
|
|
|
* mtu for non-local interfaces with AF_INET addresses assigned
|
|
|
|
* to them that are up.
|
|
|
|
*/
|
|
|
|
unsigned long in_maxmtu;
|
|
|
|
|
|
|
|
void
|
2005-02-03 06:49:01 +03:00
|
|
|
in_setmaxmtu(void)
|
1997-07-24 01:26:40 +04:00
|
|
|
{
|
2000-03-30 16:51:13 +04:00
|
|
|
struct in_ifaddr *ia;
|
|
|
|
struct ifnet *ifp;
|
1997-07-24 01:26:40 +04:00
|
|
|
unsigned long maxmtu = 0;
|
|
|
|
|
2003-11-11 23:25:26 +03:00
|
|
|
TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list) {
|
1997-07-24 01:26:40 +04:00
|
|
|
if ((ifp = ia->ia_ifp) == 0)
|
|
|
|
continue;
|
|
|
|
if ((ifp->if_flags & (IFF_UP|IFF_LOOPBACK)) != IFF_UP)
|
|
|
|
continue;
|
|
|
|
if (ifp->if_mtu > maxmtu)
|
1998-02-13 21:21:38 +03:00
|
|
|
maxmtu = ifp->if_mtu;
|
1997-07-24 01:26:40 +04:00
|
|
|
}
|
|
|
|
if (maxmtu)
|
|
|
|
in_maxmtu = maxmtu;
|
|
|
|
}
|
|
|
|
|
2002-11-07 10:15:19 +03:00
|
|
|
static u_int
|
2005-02-03 06:49:01 +03:00
|
|
|
in_mask2len(struct in_addr *mask)
|
1999-07-01 12:12:45 +04:00
|
|
|
{
|
2002-11-07 10:15:19 +03:00
|
|
|
u_int x, y;
|
1999-07-01 12:12:45 +04:00
|
|
|
u_char *p;
|
|
|
|
|
|
|
|
p = (u_char *)mask;
|
|
|
|
for (x = 0; x < sizeof(*mask); x++) {
|
|
|
|
if (p[x] != 0xff)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
y = 0;
|
|
|
|
if (x < sizeof(*mask)) {
|
2008-04-10 22:09:14 +04:00
|
|
|
for (y = 0; y < NBBY; y++) {
|
1999-07-01 12:12:45 +04:00
|
|
|
if ((p[x] & (0x80 >> y)) == 0)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2008-04-10 22:09:14 +04:00
|
|
|
return x * NBBY + y;
|
1999-07-01 12:12:45 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2005-02-03 06:49:01 +03:00
|
|
|
in_len2mask(struct in_addr *mask, u_int len)
|
1999-07-01 12:12:45 +04:00
|
|
|
{
|
2002-11-07 10:15:19 +03:00
|
|
|
u_int i;
|
1999-07-01 12:12:45 +04:00
|
|
|
u_char *p;
|
|
|
|
|
|
|
|
p = (u_char *)mask;
|
2009-03-18 19:00:08 +03:00
|
|
|
memset(mask, 0, sizeof(*mask));
|
2008-04-10 22:09:14 +04:00
|
|
|
for (i = 0; i < len / NBBY; i++)
|
1999-07-01 12:12:45 +04:00
|
|
|
p[i] = 0xff;
|
2008-04-10 22:09:14 +04:00
|
|
|
if (len % NBBY)
|
|
|
|
p[i] = (0xff00 >> (len % NBBY)) & 0xff;
|
1999-07-01 12:12:45 +04:00
|
|
|
}
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* Generic internet control operations (ioctl's).
|
|
|
|
* Ifp is 0 if not an interface-specific ioctl.
|
|
|
|
*/
|
|
|
|
/* ARGSUSED */
|
1994-01-09 04:06:02 +03:00
|
|
|
int
|
2014-07-01 09:49:18 +04:00
|
|
|
in_control(struct socket *so, u_long cmd, void *data, struct ifnet *ifp)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
2000-03-30 16:51:13 +04:00
|
|
|
struct ifreq *ifr = (struct ifreq *)data;
|
2009-12-07 21:38:55 +03:00
|
|
|
struct in_ifaddr *ia = NULL;
|
1993-03-21 12:45:37 +03:00
|
|
|
struct in_aliasreq *ifra = (struct in_aliasreq *)data;
|
|
|
|
struct sockaddr_in oldaddr;
|
|
|
|
int error, hostIsNew, maskIsNew;
|
2004-08-08 13:52:41 +04:00
|
|
|
int newifaddr = 0;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
1999-07-01 12:12:45 +04:00
|
|
|
switch (cmd) {
|
|
|
|
case SIOCALIFADDR:
|
|
|
|
case SIOCDLIFADDR:
|
|
|
|
case SIOCGLIFADDR:
|
2007-04-15 10:15:58 +04:00
|
|
|
if (ifp == NULL)
|
1999-07-01 12:12:45 +04:00
|
|
|
return EINVAL;
|
2014-07-01 09:49:18 +04:00
|
|
|
return in_lifaddr_ioctl(so, cmd, data, ifp);
|
Make ifconfig(8) set and display preference numbers for IPv6
addresses. Make the kernel support SIOC[SG]IFADDRPREF for IPv6
interface addresses.
In in6ifa_ifpforlinklocal(), consult preference numbers before
making an otherwise arbitrary choice of in6_ifaddr. Otherwise,
preference numbers are *not* consulted by the kernel, but that will
be rather easy for somebody with a little bit of free time to fix.
Please note that setting the preference number for a link-local
IPv6 address does not work right, yet, but that ought to be fixed
soon.
In support of the changes above,
1 Add a method to struct domain for "externalizing" a sockaddr, and
provide an implementation for IPv6. Expect more work in this area: it
may be more proper to say that the IPv6 implementation "internalizes"
a sockaddr. Add sockaddr_externalize().
2 Add a subroutine, sofamily(), that returns a struct socket's address
family or AF_UNSPEC.
3 Make a lot of IPv4-specific code generic, and move it from
sys/netinet/ to sys/net/ for re-use by IPv6 parts of the kernel and
ifconfig(8).
2009-09-12 02:06:29 +04:00
|
|
|
case SIOCGIFADDRPREF:
|
|
|
|
case SIOCSIFADDRPREF:
|
|
|
|
if (ifp == NULL)
|
|
|
|
return EINVAL;
|
2014-07-01 09:49:18 +04:00
|
|
|
return ifaddrpref_ioctl(so, cmd, data, ifp);
|
1999-07-01 12:12:45 +04:00
|
|
|
}
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* Find address for this interface, if it exists.
|
|
|
|
*/
|
2007-04-15 10:15:58 +04:00
|
|
|
if (ifp != NULL)
|
1998-02-13 21:21:38 +03:00
|
|
|
IFP_TO_IA(ifp, ia);
|
1993-03-21 12:45:37 +03:00
|
|
|
|
2015-05-02 18:22:03 +03:00
|
|
|
hostIsNew = 1; /* moved here to appease gcc */
|
1993-03-21 12:45:37 +03:00
|
|
|
switch (cmd) {
|
|
|
|
case SIOCAIFADDR:
|
|
|
|
case SIOCDIFADDR:
|
1998-09-06 21:52:01 +04:00
|
|
|
case SIOCGIFALIAS:
|
2015-05-02 17:41:32 +03:00
|
|
|
case SIOCGIFAFLAG_IN:
|
1993-03-21 12:45:37 +03:00
|
|
|
if (ifra->ifra_addr.sin_family == AF_INET)
|
2001-11-04 23:55:25 +03:00
|
|
|
LIST_FOREACH(ia,
|
|
|
|
&IN_IFADDR_HASH(ifra->ifra_addr.sin_addr.s_addr),
|
|
|
|
ia_hash) {
|
2007-04-15 10:15:58 +04:00
|
|
|
if (ia->ia_ifp == ifp &&
|
1998-02-13 21:21:38 +03:00
|
|
|
in_hosteq(ia->ia_addr.sin_addr,
|
|
|
|
ifra->ifra_addr.sin_addr))
|
1996-05-22 18:42:27 +04:00
|
|
|
break;
|
|
|
|
}
|
2015-05-02 17:41:32 +03:00
|
|
|
if ((cmd == SIOCDIFADDR ||
|
|
|
|
cmd == SIOCGIFALIAS ||
|
|
|
|
cmd == SIOCGIFAFLAG_IN) &&
|
|
|
|
ia == NULL)
|
2005-09-28 21:56:27 +04:00
|
|
|
return (EADDRNOTAVAIL);
|
|
|
|
|
|
|
|
if (cmd == SIOCDIFADDR &&
|
|
|
|
ifra->ifra_addr.sin_family == AF_UNSPEC) {
|
|
|
|
ifra->ifra_addr.sin_family = AF_INET;
|
2000-02-25 11:51:35 +03:00
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
/* FALLTHROUGH */
|
|
|
|
case SIOCSIFADDR:
|
2015-05-02 17:41:32 +03:00
|
|
|
if (ia == NULL || ia->ia_addr.sin_family != AF_INET)
|
|
|
|
;
|
|
|
|
else if (ifra->ifra_addr.sin_len == 0) {
|
|
|
|
ifra->ifra_addr = ia->ia_addr;
|
|
|
|
hostIsNew = 0;
|
|
|
|
} else if (in_hosteq(ia->ia_addr.sin_addr,
|
|
|
|
ifra->ifra_addr.sin_addr))
|
|
|
|
hostIsNew = 0;
|
|
|
|
/* FALLTHROUGH */
|
1993-03-21 12:45:37 +03:00
|
|
|
case SIOCSIFDSTADDR:
|
2000-02-25 11:51:35 +03:00
|
|
|
if (ifra->ifra_addr.sin_family != AF_INET)
|
|
|
|
return (EAFNOSUPPORT);
|
|
|
|
/* FALLTHROUGH */
|
2000-02-25 10:11:38 +03:00
|
|
|
case SIOCSIFNETMASK:
|
2007-04-15 10:15:58 +04:00
|
|
|
if (ifp == NULL)
|
1998-09-28 16:32:43 +04:00
|
|
|
panic("in_control");
|
|
|
|
|
2015-05-02 17:41:32 +03:00
|
|
|
if (cmd == SIOCGIFALIAS || cmd == SIOCGIFAFLAG_IN)
|
1998-09-28 16:32:43 +04:00
|
|
|
break;
|
|
|
|
|
2004-08-08 13:52:41 +04:00
|
|
|
if (ia == NULL &&
|
|
|
|
(cmd == SIOCSIFNETMASK || cmd == SIOCSIFDSTADDR))
|
|
|
|
return (EADDRNOTAVAIL);
|
|
|
|
|
2014-07-01 09:49:18 +04:00
|
|
|
if (kauth_authorize_network(curlwp->l_cred, KAUTH_NETWORK_INTERFACE,
|
2006-10-25 16:48:44 +04:00
|
|
|
KAUTH_REQ_NETWORK_INTERFACE_SETPRIV, ifp, (void *)cmd,
|
|
|
|
NULL) != 0)
|
1993-03-21 12:45:37 +03:00
|
|
|
return (EPERM);
|
|
|
|
|
2009-12-07 21:38:55 +03:00
|
|
|
if (ia == NULL) {
|
2008-12-17 23:51:31 +03:00
|
|
|
ia = malloc(sizeof(*ia), M_IFADDR, M_WAITOK|M_ZERO);
|
2009-12-07 21:38:55 +03:00
|
|
|
if (ia == NULL)
|
1993-03-21 12:45:37 +03:00
|
|
|
return (ENOBUFS);
|
2003-11-11 23:25:26 +03:00
|
|
|
TAILQ_INSERT_TAIL(&in_ifaddrhead, ia, ia_list);
|
2014-09-10 00:16:12 +04:00
|
|
|
ifaref(&ia->ia_ifa);
|
2007-12-06 03:28:36 +03:00
|
|
|
ifa_insert(ifp, &ia->ia_ifa);
|
1995-06-04 08:35:29 +04:00
|
|
|
ia->ia_ifa.ifa_addr = sintosa(&ia->ia_addr);
|
|
|
|
ia->ia_ifa.ifa_dstaddr = sintosa(&ia->ia_dstaddr);
|
|
|
|
ia->ia_ifa.ifa_netmask = sintosa(&ia->ia_sockmask);
|
2006-11-13 08:13:38 +03:00
|
|
|
#ifdef IPSELSRC
|
|
|
|
ia->ia_ifa.ifa_getifa = in_getifa;
|
|
|
|
#else /* IPSELSRC */
|
|
|
|
ia->ia_ifa.ifa_getifa = NULL;
|
|
|
|
#endif /* IPSELSRC */
|
1993-03-21 12:45:37 +03:00
|
|
|
ia->ia_sockmask.sin_len = 8;
|
2014-12-01 20:07:43 +03:00
|
|
|
ia->ia_sockmask.sin_family = AF_INET;
|
1993-03-21 12:45:37 +03:00
|
|
|
if (ifp->if_flags & IFF_BROADCAST) {
|
|
|
|
ia->ia_broadaddr.sin_len = sizeof(ia->ia_addr);
|
|
|
|
ia->ia_broadaddr.sin_family = AF_INET;
|
|
|
|
}
|
|
|
|
ia->ia_ifp = ifp;
|
First step of random number subsystem rework described in
<20111022023242.BA26F14A158@mail.netbsd.org>. This change includes
the following:
An initial cleanup and minor reorganization of the entropy pool
code in sys/dev/rnd.c and sys/dev/rndpool.c. Several bugs are
fixed. Some effort is made to accumulate entropy more quickly at
boot time.
A generic interface, "rndsink", is added, for stream generators to
request that they be re-keyed with good quality entropy from the pool
as soon as it is available.
The arc4random()/arc4randbytes() implementation in libkern is
adjusted to use the rndsink interface for rekeying, which helps
address the problem of low-quality keys at boot time.
An implementation of the FIPS 140-2 statistical tests for random
number generator quality is provided (libkern/rngtest.c). This
is based on Greg Rose's implementation from Qualcomm.
A new random stream generator, nist_ctr_drbg, is provided. It is
based on an implementation of the NIST SP800-90 CTR_DRBG by
Henric Jungheim. This generator users AES in a modified counter
mode to generate a backtracking-resistant random stream.
An abstraction layer, "cprng", is provided for in-kernel consumers
of randomness. The arc4random/arc4randbytes API is deprecated for
in-kernel use. It is replaced by "cprng_strong". The current
cprng_fast implementation wraps the existing arc4random
implementation. The current cprng_strong implementation wraps the
new CTR_DRBG implementation. Both interfaces are rekeyed from
the entropy pool automatically at intervals justifiable from best
current cryptographic practice.
In some quick tests, cprng_fast() is about the same speed as
the old arc4randbytes(), and cprng_strong() is about 20% faster
than rnd_extract_data(). Performance is expected to improve.
The AES code in src/crypto/rijndael is no longer an optional
kernel component, as it is required by cprng_strong, which is
not an optional kernel component.
The entropy pool output is subjected to the rngtest tests at
startup time; if it fails, the system will reboot. There is
approximately a 3/10000 chance of a false positive from these
tests. Entropy pool _input_ from hardware random numbers is
subjected to the rngtest tests at attach time, as well as the
FIPS continuous-output test, to detect bad or stuck hardware
RNGs; if any are detected, they are detached, but the system
continues to run.
A problem with rndctl(8) is fixed -- datastructures with
pointers in arrays are no longer passed to userspace (this
was not a security problem, but rather a major issue for
compat32). A new kernel will require a new rndctl.
The sysctl kern.arandom() and kern.urandom() nodes are hooked
up to the new generators, but the /dev/*random pseudodevices
are not, yet.
Manual pages for the new kernel interfaces are forthcoming.
2011-11-20 02:51:18 +04:00
|
|
|
ia->ia_idsalt = cprng_fast32() % 65535;
|
1995-06-12 04:46:47 +04:00
|
|
|
LIST_INIT(&ia->ia_multiaddrs);
|
2004-08-08 13:52:41 +04:00
|
|
|
newifaddr = 1;
|
2002-10-22 06:28:47 +04:00
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
case SIOCSIFBRDADDR:
|
2014-07-01 09:49:18 +04:00
|
|
|
if (kauth_authorize_network(curlwp->l_cred, KAUTH_NETWORK_INTERFACE,
|
2006-10-25 16:48:44 +04:00
|
|
|
KAUTH_REQ_NETWORK_INTERFACE_SETPRIV, ifp, (void *)cmd,
|
|
|
|
NULL) != 0)
|
1993-03-21 12:45:37 +03:00
|
|
|
return (EPERM);
|
|
|
|
/* FALLTHROUGH */
|
|
|
|
|
|
|
|
case SIOCGIFADDR:
|
|
|
|
case SIOCGIFNETMASK:
|
|
|
|
case SIOCGIFDSTADDR:
|
|
|
|
case SIOCGIFBRDADDR:
|
2009-12-07 21:38:55 +03:00
|
|
|
if (ia == NULL)
|
1993-03-21 12:45:37 +03:00
|
|
|
return (EADDRNOTAVAIL);
|
|
|
|
break;
|
|
|
|
}
|
2004-08-08 13:52:41 +04:00
|
|
|
error = 0;
|
1993-03-21 12:45:37 +03:00
|
|
|
switch (cmd) {
|
|
|
|
|
|
|
|
case SIOCGIFADDR:
|
2007-09-01 08:32:50 +04:00
|
|
|
ifreq_setaddr(cmd, ifr, sintocsa(&ia->ia_addr));
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
case SIOCGIFBRDADDR:
|
|
|
|
if ((ifp->if_flags & IFF_BROADCAST) == 0)
|
|
|
|
return (EINVAL);
|
2007-09-01 08:32:50 +04:00
|
|
|
ifreq_setdstaddr(cmd, ifr, sintocsa(&ia->ia_broadaddr));
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
case SIOCGIFDSTADDR:
|
|
|
|
if ((ifp->if_flags & IFF_POINTOPOINT) == 0)
|
|
|
|
return (EINVAL);
|
2007-09-01 08:32:50 +04:00
|
|
|
ifreq_setdstaddr(cmd, ifr, sintocsa(&ia->ia_dstaddr));
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
case SIOCGIFNETMASK:
|
2014-12-01 20:07:43 +03:00
|
|
|
/*
|
|
|
|
* We keep the number of trailing zero bytes the sin_len field
|
|
|
|
* of ia_sockmask, so we fix this before we pass it back to
|
|
|
|
* userland.
|
|
|
|
*/
|
|
|
|
oldaddr = ia->ia_sockmask;
|
|
|
|
oldaddr.sin_len = sizeof(struct sockaddr_in);
|
|
|
|
ifreq_setaddr(cmd, ifr, (const void *)&oldaddr);
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
case SIOCSIFDSTADDR:
|
|
|
|
if ((ifp->if_flags & IFF_POINTOPOINT) == 0)
|
|
|
|
return (EINVAL);
|
|
|
|
oldaddr = ia->ia_dstaddr;
|
2007-09-01 08:32:50 +04:00
|
|
|
ia->ia_dstaddr = *satocsin(ifreq_getdstaddr(cmd, ifr));
|
2011-10-19 05:52:22 +04:00
|
|
|
if ((error = if_addr_init(ifp, &ia->ia_ifa, false)) != 0) {
|
1993-03-21 12:45:37 +03:00
|
|
|
ia->ia_dstaddr = oldaddr;
|
2007-04-15 10:15:58 +04:00
|
|
|
return error;
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
if (ia->ia_flags & IFA_ROUTE) {
|
1995-06-04 08:35:29 +04:00
|
|
|
ia->ia_ifa.ifa_dstaddr = sintosa(&oldaddr);
|
2007-04-15 10:15:58 +04:00
|
|
|
rtinit(&ia->ia_ifa, RTM_DELETE, RTF_HOST);
|
1995-06-04 08:35:29 +04:00
|
|
|
ia->ia_ifa.ifa_dstaddr = sintosa(&ia->ia_dstaddr);
|
2007-04-15 10:15:58 +04:00
|
|
|
rtinit(&ia->ia_ifa, RTM_ADD, RTF_HOST|RTF_UP);
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SIOCSIFBRDADDR:
|
|
|
|
if ((ifp->if_flags & IFF_BROADCAST) == 0)
|
2007-04-15 10:15:58 +04:00
|
|
|
return EINVAL;
|
2007-09-01 08:32:50 +04:00
|
|
|
ia->ia_broadaddr = *satocsin(ifreq_getbroadaddr(cmd, ifr));
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
case SIOCSIFADDR:
|
2007-09-01 08:32:50 +04:00
|
|
|
error = in_ifinit(ifp, ia, satocsin(ifreq_getaddr(cmd, ifr)),
|
2015-05-02 17:41:32 +03:00
|
|
|
1, hostIsNew);
|
2013-06-30 01:06:57 +04:00
|
|
|
if (error == 0) {
|
|
|
|
(void)pfil_run_hooks(if_pfil,
|
2004-06-22 16:50:41 +04:00
|
|
|
(struct mbuf **)SIOCSIFADDR, ifp, PFIL_IFADDR);
|
2013-06-30 01:06:57 +04:00
|
|
|
}
|
2004-08-08 13:52:41 +04:00
|
|
|
break;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
case SIOCSIFNETMASK:
|
2004-07-07 05:39:00 +04:00
|
|
|
in_ifscrub(ifp, ia);
|
2007-09-01 08:32:50 +04:00
|
|
|
ia->ia_sockmask = *satocsin(ifreq_getaddr(cmd, ifr));
|
2004-07-07 05:39:00 +04:00
|
|
|
ia->ia_subnetmask = ia->ia_sockmask.sin_addr.s_addr;
|
2015-05-02 17:41:32 +03:00
|
|
|
error = in_ifinit(ifp, ia, NULL, 0, 0);
|
2004-08-08 13:52:41 +04:00
|
|
|
break;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
case SIOCAIFADDR:
|
|
|
|
maskIsNew = 0;
|
|
|
|
if (ifra->ifra_mask.sin_len) {
|
2011-12-12 04:06:39 +04:00
|
|
|
/* Only scrub if we control the prefix route,
|
|
|
|
* otherwise userland gets a bogus message */
|
|
|
|
if ((ia->ia_flags & IFA_ROUTE))
|
|
|
|
in_ifscrub(ifp, ia);
|
1993-03-21 12:45:37 +03:00
|
|
|
ia->ia_sockmask = ifra->ifra_mask;
|
1995-06-02 01:35:34 +04:00
|
|
|
ia->ia_subnetmask = ia->ia_sockmask.sin_addr.s_addr;
|
1993-03-21 12:45:37 +03:00
|
|
|
maskIsNew = 1;
|
|
|
|
}
|
|
|
|
if ((ifp->if_flags & IFF_POINTOPOINT) &&
|
|
|
|
(ifra->ifra_dstaddr.sin_family == AF_INET)) {
|
2011-12-12 04:06:39 +04:00
|
|
|
/* Only scrub if we control the prefix route,
|
|
|
|
* otherwise userland gets a bogus message */
|
|
|
|
if ((ia->ia_flags & IFA_ROUTE))
|
|
|
|
in_ifscrub(ifp, ia);
|
1993-03-21 12:45:37 +03:00
|
|
|
ia->ia_dstaddr = ifra->ifra_dstaddr;
|
|
|
|
maskIsNew = 1; /* We lie; but the effect's the same */
|
|
|
|
}
|
|
|
|
if (ifra->ifra_addr.sin_family == AF_INET &&
|
2000-03-12 08:01:16 +03:00
|
|
|
(hostIsNew || maskIsNew)) {
|
2015-05-02 17:41:32 +03:00
|
|
|
error = in_ifinit(ifp, ia, &ifra->ifra_addr, 0,
|
|
|
|
hostIsNew);
|
2000-03-12 08:01:16 +03:00
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
if ((ifp->if_flags & IFF_BROADCAST) &&
|
|
|
|
(ifra->ifra_broadaddr.sin_family == AF_INET))
|
|
|
|
ia->ia_broadaddr = ifra->ifra_broadaddr;
|
2007-04-15 10:15:58 +04:00
|
|
|
if (error == 0)
|
2013-06-30 01:06:57 +04:00
|
|
|
(void)pfil_run_hooks(if_pfil,
|
2004-07-26 17:43:14 +04:00
|
|
|
(struct mbuf **)SIOCAIFADDR, ifp, PFIL_IFADDR);
|
2004-08-08 13:52:41 +04:00
|
|
|
break;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
1998-09-06 21:52:01 +04:00
|
|
|
case SIOCGIFALIAS:
|
|
|
|
ifra->ifra_mask = ia->ia_sockmask;
|
|
|
|
if ((ifp->if_flags & IFF_POINTOPOINT) &&
|
|
|
|
(ia->ia_dstaddr.sin_family == AF_INET))
|
|
|
|
ifra->ifra_dstaddr = ia->ia_dstaddr;
|
|
|
|
else if ((ifp->if_flags & IFF_BROADCAST) &&
|
|
|
|
(ia->ia_broadaddr.sin_family == AF_INET))
|
|
|
|
ifra->ifra_broadaddr = ia->ia_broadaddr;
|
|
|
|
else
|
2007-04-15 10:15:58 +04:00
|
|
|
memset(&ifra->ifra_broadaddr, 0,
|
1999-07-01 12:12:45 +04:00
|
|
|
sizeof(ifra->ifra_broadaddr));
|
2004-08-08 13:52:41 +04:00
|
|
|
break;
|
1998-09-06 21:52:01 +04:00
|
|
|
|
2015-05-02 17:41:32 +03:00
|
|
|
case SIOCGIFAFLAG_IN:
|
|
|
|
ifr->ifr_addrflags = ia->ia4_flags;
|
|
|
|
break;
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
case SIOCDIFADDR:
|
2007-12-06 02:47:17 +03:00
|
|
|
in_purgeaddr(&ia->ia_ifa);
|
2013-06-30 01:06:57 +04:00
|
|
|
(void)pfil_run_hooks(if_pfil, (struct mbuf **)SIOCDIFADDR,
|
2004-06-22 16:50:41 +04:00
|
|
|
ifp, PFIL_IFADDR);
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
|
1995-06-01 01:50:34 +04:00
|
|
|
#ifdef MROUTING
|
|
|
|
case SIOCGETVIFCNT:
|
|
|
|
case SIOCGETSGCNT:
|
2004-08-08 13:52:41 +04:00
|
|
|
error = mrt_ioctl(so, cmd, data);
|
|
|
|
break;
|
1995-06-01 01:50:34 +04:00
|
|
|
#endif /* MROUTING */
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
default:
|
*** Summary ***
When a link-layer address changes (e.g., ifconfig ex0 link
02:de:ad:be:ef:02 active), send a gratuitous ARP and/or a Neighbor
Advertisement to update the network-/link-layer address bindings
on our LAN peers.
Refuse a change of ethernet address to the address 00:00:00:00:00:00
or to any multicast/broadcast address. (Thanks matt@.)
Reorder ifnet ioctl operations so that driver ioctls may inherit
the functions of their "class"---ether_ioctl(), fddi_ioctl(), et
cetera---and the class ioctls may inherit from the generic ioctl,
ifioctl_common(), but both driver- and class-ioctls may override
the generic behavior. Make network drivers share more code.
Distinguish a "factory" link-layer address from others for the
purposes of both protecting that address from deletion and computing
EUI64.
Return consistent, appropriate error codes from network drivers.
Improve readability. KNF.
*** Details ***
In if_attach(), always initialize the interface ioctl routine,
ifnet->if_ioctl, if the driver has not already initialized it.
Delete if_ioctl == NULL tests everywhere else, because it cannot
happen.
In the ioctl routines of network interfaces, inherit common ioctl
behaviors by calling either ifioctl_common() or whichever ioctl
routine is appropriate for the class of interface---e.g., ether_ioctl()
for ethernets.
Stop (ab)using SIOCSIFADDR and start to use SIOCINITIFADDR. In
the user->kernel interface, SIOCSIFADDR's argument was an ifreq,
but on the protocol->ifnet interface, SIOCSIFADDR's argument was
an ifaddr. That was confusing, and it would work against me as I
make it possible for a network interface to overload most ioctls.
On the protocol->ifnet interface, replace SIOCSIFADDR with
SIOCINITIFADDR. In ifioctl(), return EPERM if userland tries to
invoke SIOCINITIFADDR.
In ifioctl(), give the interface the first shot at handling most
interface ioctls, and give the protocol the second shot, instead
of the other way around. Finally, let compatibility code (COMPAT_OSOCK)
take a shot.
Pull device initialization out of switch statements under
SIOCINITIFADDR. For example, pull ..._init() out of any switch
statement that looks like this:
switch (...->sa_family) {
case ...:
..._init();
...
break;
...
default:
..._init();
...
break;
}
Rewrite many if-else clauses that handle all permutations of IFF_UP
and IFF_RUNNING to use a switch statement,
switch (x & (IFF_UP|IFF_RUNNING)) {
case 0:
...
break;
case IFF_RUNNING:
...
break;
case IFF_UP:
...
break;
case IFF_UP|IFF_RUNNING:
...
break;
}
unifdef lots of code containing #ifdef FreeBSD, #ifdef NetBSD, and
#ifdef SIOCSIFMTU, especially in fwip(4) and in ndis(4).
In ipw(4), remove an if_set_sadl() call that is out of place.
In nfe(4), reuse the jumbo MTU logic in ether_ioctl().
Let ethernets register a callback for setting h/w state such as
promiscuous mode and the multicast filter in accord with a change
in the if_flags: ether_set_ifflags_cb() registers a callback that
returns ENETRESET if the caller should reset the ethernet by calling
if_init(), 0 on success, != 0 on failure. Pull common code from
ex(4), gem(4), nfe(4), sip(4), tlp(4), vge(4) into ether_ioctl(),
and register if_flags callbacks for those drivers.
Return ENOTTY instead of EINVAL for inappropriate ioctls. In
zyd(4), use ENXIO instead of ENOTTY to indicate that the device is
not any longer attached.
Add to if_set_sadl() a boolean 'factory' argument that indicates
whether a link-layer address was assigned by the factory or some
other source. In a comment, recommend using the factory address
for generating an EUI64, and update in6_get_hw_ifid() to prefer a
factory address to any other link-layer address.
Add a routing message, RTM_LLINFO_UPD, that tells protocols to
update the binding of network-layer addresses to link-layer addresses.
Implement this message in IPv4 and IPv6 by sending a gratuitous
ARP or a neighbor advertisement, respectively. Generate RTM_LLINFO_UPD
messages on a change of an interface's link-layer address.
In ether_ioctl(), do not let SIOCALIFADDR set a link-layer address
that is broadcast/multicast or equal to 00:00:00:00:00:00.
Make ether_ioctl() call ifioctl_common() to handle ioctls that it
does not understand.
In gif(4), initialize if_softc and use it, instead of assuming that
the gif_softc and ifp overlap.
Let ifioctl_common() handle SIOCGIFADDR.
Sprinkle rtcache_invariants(), which checks on DIAGNOSTIC kernels
that certain invariants on a struct route are satisfied.
In agr(4), rewrite agr_ioctl_filter() to be a bit more explicit
about the ioctls that we do not allow on an agr(4) member interface.
bzero -> memset. Delete unnecessary casts to void *. Use
sockaddr_in_init() and sockaddr_in6_init(). Compare pointers with
NULL instead of "testing truth". Replace some instances of (type
*)0 with NULL. Change some K&R prototypes to ANSI C, and join
lines.
2008-11-07 03:20:01 +03:00
|
|
|
return ENOTTY;
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
2004-08-08 13:52:41 +04:00
|
|
|
|
2007-04-15 10:15:58 +04:00
|
|
|
if (error != 0 && newifaddr) {
|
2004-08-08 13:52:41 +04:00
|
|
|
KASSERT(ia != NULL);
|
2007-12-06 02:47:17 +03:00
|
|
|
in_purgeaddr(&ia->ia_ifa);
|
2004-08-08 13:52:41 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return error;
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
2015-02-26 12:54:46 +03:00
|
|
|
/* Add ownaddr as loopback rtentry. */
|
|
|
|
static void
|
|
|
|
in_ifaddlocal(struct ifaddr *ifa)
|
|
|
|
{
|
2015-02-26 15:58:36 +03:00
|
|
|
struct in_ifaddr *ia;
|
|
|
|
|
|
|
|
ia = (struct in_ifaddr *)ifa;
|
|
|
|
if (ia->ia_addr.sin_addr.s_addr == INADDR_ANY ||
|
|
|
|
(ia->ia_ifp->if_flags & IFF_POINTOPOINT &&
|
|
|
|
in_hosteq(ia->ia_dstaddr.sin_addr, ia->ia_addr.sin_addr)))
|
|
|
|
{
|
|
|
|
rt_newaddrmsg(RTM_NEWADDR, ifa, 0, NULL);
|
|
|
|
return;
|
|
|
|
}
|
2015-02-26 12:54:46 +03:00
|
|
|
|
|
|
|
rt_ifa_addlocal(ifa);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Rempve loopback entry of ownaddr */
|
|
|
|
static void
|
|
|
|
in_ifremlocal(struct ifaddr *ifa)
|
|
|
|
{
|
|
|
|
struct in_ifaddr *ia, *p;
|
|
|
|
struct ifaddr *alt_ifa = NULL;
|
|
|
|
int ia_count = 0;
|
|
|
|
|
|
|
|
ia = (struct in_ifaddr *)ifa;
|
|
|
|
/* Delete the entry if exactly one ifaddr matches the
|
|
|
|
* address, ifa->ifa_addr. */
|
|
|
|
TAILQ_FOREACH(p, &in_ifaddrhead, ia_list) {
|
|
|
|
if (!in_hosteq(p->ia_addr.sin_addr, ia->ia_addr.sin_addr))
|
|
|
|
continue;
|
|
|
|
if (p->ia_ifp != ia->ia_ifp)
|
|
|
|
alt_ifa = &p->ia_ifa;
|
|
|
|
if (++ia_count > 1 && alt_ifa != NULL)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ia_count == 0)
|
|
|
|
return;
|
|
|
|
|
|
|
|
rt_ifa_remlocal(ifa, ia_count == 1 ? NULL : alt_ifa);
|
|
|
|
}
|
|
|
|
|
2000-02-02 01:52:04 +03:00
|
|
|
void
|
2007-12-06 02:47:17 +03:00
|
|
|
in_purgeaddr(struct ifaddr *ifa)
|
2000-02-02 01:52:04 +03:00
|
|
|
{
|
2007-12-06 02:47:17 +03:00
|
|
|
struct ifnet *ifp = ifa->ifa_ifp;
|
2000-02-02 01:52:04 +03:00
|
|
|
struct in_ifaddr *ia = (void *) ifa;
|
|
|
|
|
2015-05-02 23:22:12 +03:00
|
|
|
/* stop DAD processing */
|
2015-05-16 15:12:46 +03:00
|
|
|
if (ia->ia_dad_stop != NULL)
|
|
|
|
ia->ia_dad_stop(ifa);
|
2015-05-02 17:41:32 +03:00
|
|
|
|
2000-02-02 01:52:04 +03:00
|
|
|
in_ifscrub(ifp, ia);
|
2015-02-26 12:54:46 +03:00
|
|
|
in_ifremlocal(ifa);
|
2000-02-02 01:52:04 +03:00
|
|
|
LIST_REMOVE(ia, ia_hash);
|
2007-12-06 03:28:36 +03:00
|
|
|
ifa_remove(ifp, &ia->ia_ifa);
|
2003-11-11 23:25:26 +03:00
|
|
|
TAILQ_REMOVE(&in_ifaddrhead, ia, ia_list);
|
2000-10-08 13:15:28 +04:00
|
|
|
if (ia->ia_allhosts != NULL)
|
|
|
|
in_delmulti(ia->ia_allhosts);
|
2014-09-10 00:16:12 +04:00
|
|
|
ifafree(&ia->ia_ifa);
|
2000-02-02 01:52:04 +03:00
|
|
|
in_setmaxmtu();
|
|
|
|
}
|
|
|
|
|
2000-02-03 02:28:08 +03:00
|
|
|
void
|
2006-10-05 21:35:19 +04:00
|
|
|
in_purgeif(struct ifnet *ifp) /* MUST be called at splsoftnet() */
|
2000-02-03 02:28:08 +03:00
|
|
|
{
|
2007-12-06 02:47:17 +03:00
|
|
|
if_purgeaddrs(ifp, AF_INET, in_purgeaddr);
|
2006-10-05 21:35:19 +04:00
|
|
|
igmp_purgeif(ifp); /* manipulates pools */
|
2003-06-26 07:35:00 +04:00
|
|
|
#ifdef MROUTING
|
|
|
|
ip_mrouter_detach(ifp);
|
|
|
|
#endif
|
2000-02-03 02:28:08 +03:00
|
|
|
}
|
|
|
|
|
1999-07-01 12:12:45 +04:00
|
|
|
/*
|
|
|
|
* SIOC[GAD]LIFADDR.
|
|
|
|
* SIOCGLIFADDR: get first address. (???)
|
|
|
|
* SIOCGLIFADDR with IFLR_PREFIX:
|
|
|
|
* get first address that matches the specified prefix.
|
|
|
|
* SIOCALIFADDR: add the specified address.
|
|
|
|
* SIOCALIFADDR with IFLR_PREFIX:
|
|
|
|
* EINVAL since we can't deduce hostid part of the address.
|
|
|
|
* SIOCDLIFADDR: delete the specified address.
|
|
|
|
* SIOCDLIFADDR with IFLR_PREFIX:
|
|
|
|
* delete the first address that matches the specified prefix.
|
|
|
|
* return values:
|
|
|
|
* EINVAL on invalid parameters
|
|
|
|
* EADDRNOTAVAIL on prefix match failed/specified address not found
|
|
|
|
* other values may be returned from in_ioctl()
|
|
|
|
*/
|
|
|
|
static int
|
2007-03-04 08:59:00 +03:00
|
|
|
in_lifaddr_ioctl(struct socket *so, u_long cmd, void *data,
|
2014-07-01 09:49:18 +04:00
|
|
|
struct ifnet *ifp)
|
1999-07-01 12:12:45 +04:00
|
|
|
{
|
|
|
|
struct if_laddrreq *iflr = (struct if_laddrreq *)data;
|
|
|
|
struct ifaddr *ifa;
|
1999-12-12 18:57:07 +03:00
|
|
|
struct sockaddr *sa;
|
1999-07-01 12:12:45 +04:00
|
|
|
|
|
|
|
/* sanity checks */
|
2007-11-10 02:53:13 +03:00
|
|
|
if (data == NULL || ifp == NULL) {
|
1999-07-01 12:12:45 +04:00
|
|
|
panic("invalid argument to in_lifaddr_ioctl");
|
|
|
|
/*NOTRECHED*/
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (cmd) {
|
|
|
|
case SIOCGLIFADDR:
|
|
|
|
/* address must be specified on GET with IFLR_PREFIX */
|
|
|
|
if ((iflr->flags & IFLR_PREFIX) == 0)
|
|
|
|
break;
|
|
|
|
/*FALLTHROUGH*/
|
|
|
|
case SIOCALIFADDR:
|
|
|
|
case SIOCDLIFADDR:
|
|
|
|
/* address must be specified on ADD and DELETE */
|
1999-12-12 18:57:07 +03:00
|
|
|
sa = (struct sockaddr *)&iflr->addr;
|
|
|
|
if (sa->sa_family != AF_INET)
|
1999-07-01 12:12:45 +04:00
|
|
|
return EINVAL;
|
1999-12-12 18:57:07 +03:00
|
|
|
if (sa->sa_len != sizeof(struct sockaddr_in))
|
1999-07-01 12:12:45 +04:00
|
|
|
return EINVAL;
|
|
|
|
/* XXX need improvement */
|
1999-12-12 18:57:07 +03:00
|
|
|
sa = (struct sockaddr *)&iflr->dstaddr;
|
2008-05-12 00:17:59 +04:00
|
|
|
if (sa->sa_family != AF_UNSPEC && sa->sa_family != AF_INET)
|
1999-07-01 12:12:45 +04:00
|
|
|
return EINVAL;
|
2008-05-12 00:17:59 +04:00
|
|
|
if (sa->sa_len != 0 && sa->sa_len != sizeof(struct sockaddr_in))
|
1999-07-01 12:12:45 +04:00
|
|
|
return EINVAL;
|
|
|
|
break;
|
|
|
|
default: /*shouldn't happen*/
|
|
|
|
#if 0
|
|
|
|
panic("invalid cmd to in_lifaddr_ioctl");
|
|
|
|
/*NOTREACHED*/
|
|
|
|
#else
|
|
|
|
return EOPNOTSUPP;
|
|
|
|
#endif
|
|
|
|
}
|
2008-04-10 22:09:14 +04:00
|
|
|
if (sizeof(struct in_addr) * NBBY < iflr->prefixlen)
|
1999-07-01 12:12:45 +04:00
|
|
|
return EINVAL;
|
|
|
|
|
|
|
|
switch (cmd) {
|
|
|
|
case SIOCALIFADDR:
|
|
|
|
{
|
|
|
|
struct in_aliasreq ifra;
|
|
|
|
|
|
|
|
if (iflr->flags & IFLR_PREFIX)
|
|
|
|
return EINVAL;
|
|
|
|
|
2006-09-24 00:54:07 +04:00
|
|
|
/* copy args to in_aliasreq, perform ioctl(SIOCAIFADDR). */
|
2009-03-18 19:00:08 +03:00
|
|
|
memset(&ifra, 0, sizeof(ifra));
|
2009-04-18 18:58:02 +04:00
|
|
|
memcpy(ifra.ifra_name, iflr->iflr_name,
|
1999-07-01 12:12:45 +04:00
|
|
|
sizeof(ifra.ifra_name));
|
|
|
|
|
2009-04-18 18:58:02 +04:00
|
|
|
memcpy(&ifra.ifra_addr, &iflr->addr,
|
1999-12-12 18:57:07 +03:00
|
|
|
((struct sockaddr *)&iflr->addr)->sa_len);
|
1999-07-01 12:12:45 +04:00
|
|
|
|
1999-12-12 18:57:07 +03:00
|
|
|
if (((struct sockaddr *)&iflr->dstaddr)->sa_family) { /*XXX*/
|
2009-04-18 18:58:02 +04:00
|
|
|
memcpy(&ifra.ifra_dstaddr, &iflr->dstaddr,
|
1999-12-12 18:57:07 +03:00
|
|
|
((struct sockaddr *)&iflr->dstaddr)->sa_len);
|
1999-07-01 12:12:45 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
ifra.ifra_mask.sin_family = AF_INET;
|
|
|
|
ifra.ifra_mask.sin_len = sizeof(struct sockaddr_in);
|
|
|
|
in_len2mask(&ifra.ifra_mask.sin_addr, iflr->prefixlen);
|
|
|
|
|
2014-07-01 09:49:18 +04:00
|
|
|
return in_control(so, SIOCAIFADDR, &ifra, ifp);
|
1999-07-01 12:12:45 +04:00
|
|
|
}
|
|
|
|
case SIOCGLIFADDR:
|
|
|
|
case SIOCDLIFADDR:
|
|
|
|
{
|
|
|
|
struct in_ifaddr *ia;
|
|
|
|
struct in_addr mask, candidate, match;
|
|
|
|
struct sockaddr_in *sin;
|
|
|
|
int cmp;
|
|
|
|
|
2009-03-18 19:00:08 +03:00
|
|
|
memset(&mask, 0, sizeof(mask));
|
|
|
|
memset(&match, 0, sizeof(match)); /* XXX gcc */
|
1999-07-01 12:12:45 +04:00
|
|
|
if (iflr->flags & IFLR_PREFIX) {
|
|
|
|
/* lookup a prefix rather than address. */
|
|
|
|
in_len2mask(&mask, iflr->prefixlen);
|
|
|
|
|
|
|
|
sin = (struct sockaddr_in *)&iflr->addr;
|
|
|
|
match.s_addr = sin->sin_addr.s_addr;
|
|
|
|
match.s_addr &= mask.s_addr;
|
|
|
|
|
|
|
|
/* if you set extra bits, that's wrong */
|
|
|
|
if (match.s_addr != sin->sin_addr.s_addr)
|
|
|
|
return EINVAL;
|
|
|
|
|
|
|
|
cmp = 1;
|
|
|
|
} else {
|
|
|
|
if (cmd == SIOCGLIFADDR) {
|
|
|
|
/* on getting an address, take the 1st match */
|
|
|
|
cmp = 0; /*XXX*/
|
|
|
|
} else {
|
|
|
|
/* on deleting an address, do exact match */
|
|
|
|
in_len2mask(&mask, 32);
|
|
|
|
sin = (struct sockaddr_in *)&iflr->addr;
|
|
|
|
match.s_addr = sin->sin_addr.s_addr;
|
|
|
|
|
|
|
|
cmp = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2005-01-25 00:25:09 +03:00
|
|
|
IFADDR_FOREACH(ifa, ifp) {
|
2004-05-30 10:37:07 +04:00
|
|
|
if (ifa->ifa_addr->sa_family != AF_INET)
|
1999-07-01 12:12:45 +04:00
|
|
|
continue;
|
2007-11-10 02:53:13 +03:00
|
|
|
if (cmp == 0)
|
1999-07-01 12:12:45 +04:00
|
|
|
break;
|
2012-06-08 19:01:51 +04:00
|
|
|
candidate.s_addr = ((struct sockaddr_in *)ifa->ifa_addr)->sin_addr.s_addr;
|
1999-07-01 12:12:45 +04:00
|
|
|
candidate.s_addr &= mask.s_addr;
|
|
|
|
if (candidate.s_addr == match.s_addr)
|
|
|
|
break;
|
|
|
|
}
|
2007-11-10 02:53:13 +03:00
|
|
|
if (ifa == NULL)
|
1999-07-01 12:12:45 +04:00
|
|
|
return EADDRNOTAVAIL;
|
|
|
|
ia = (struct in_ifaddr *)ifa;
|
|
|
|
|
|
|
|
if (cmd == SIOCGLIFADDR) {
|
|
|
|
/* fill in the if_laddrreq structure */
|
2009-04-18 18:58:02 +04:00
|
|
|
memcpy(&iflr->addr, &ia->ia_addr, ia->ia_addr.sin_len);
|
1999-07-01 12:12:45 +04:00
|
|
|
|
|
|
|
if ((ifp->if_flags & IFF_POINTOPOINT) != 0) {
|
2009-04-18 18:58:02 +04:00
|
|
|
memcpy(&iflr->dstaddr, &ia->ia_dstaddr,
|
1999-07-01 12:12:45 +04:00
|
|
|
ia->ia_dstaddr.sin_len);
|
|
|
|
} else
|
2009-03-18 19:00:08 +03:00
|
|
|
memset(&iflr->dstaddr, 0, sizeof(iflr->dstaddr));
|
1999-07-01 12:12:45 +04:00
|
|
|
|
|
|
|
iflr->prefixlen =
|
|
|
|
in_mask2len(&ia->ia_sockmask.sin_addr);
|
|
|
|
|
|
|
|
iflr->flags = 0; /*XXX*/
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
} else {
|
|
|
|
struct in_aliasreq ifra;
|
|
|
|
|
2006-09-24 00:54:07 +04:00
|
|
|
/* fill in_aliasreq and do ioctl(SIOCDIFADDR) */
|
2009-03-18 19:00:08 +03:00
|
|
|
memset(&ifra, 0, sizeof(ifra));
|
2009-04-18 18:58:02 +04:00
|
|
|
memcpy(ifra.ifra_name, iflr->iflr_name,
|
1999-07-01 12:12:45 +04:00
|
|
|
sizeof(ifra.ifra_name));
|
|
|
|
|
2009-04-18 18:58:02 +04:00
|
|
|
memcpy(&ifra.ifra_addr, &ia->ia_addr,
|
1999-07-01 12:12:45 +04:00
|
|
|
ia->ia_addr.sin_len);
|
|
|
|
if ((ifp->if_flags & IFF_POINTOPOINT) != 0) {
|
2009-04-18 18:58:02 +04:00
|
|
|
memcpy(&ifra.ifra_dstaddr, &ia->ia_dstaddr,
|
1999-07-01 12:12:45 +04:00
|
|
|
ia->ia_dstaddr.sin_len);
|
|
|
|
}
|
2009-04-18 18:58:02 +04:00
|
|
|
memcpy(&ifra.ifra_dstaddr, &ia->ia_sockmask,
|
1999-07-01 12:12:45 +04:00
|
|
|
ia->ia_sockmask.sin_len);
|
|
|
|
|
2014-07-01 09:49:18 +04:00
|
|
|
return in_control(so, SIOCDIFADDR, &ifra, ifp);
|
1999-07-01 12:12:45 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return EOPNOTSUPP; /*just for safety*/
|
|
|
|
}
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* Delete any existing route for an interface.
|
|
|
|
*/
|
1994-05-13 10:02:48 +04:00
|
|
|
void
|
2006-11-16 04:32:37 +03:00
|
|
|
in_ifscrub(struct ifnet *ifp, struct in_ifaddr *ia)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
|
|
|
|
2001-07-22 20:18:31 +04:00
|
|
|
in_scrubprefix(ia);
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Initialize an interface's internet address
|
|
|
|
* and routing table entry.
|
|
|
|
*/
|
1994-05-13 10:02:48 +04:00
|
|
|
int
|
2005-02-03 06:49:01 +03:00
|
|
|
in_ifinit(struct ifnet *ifp, struct in_ifaddr *ia,
|
2015-05-02 17:41:32 +03:00
|
|
|
const struct sockaddr_in *sin, int scrub, int hostIsNew)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
2004-07-07 05:39:00 +04:00
|
|
|
u_int32_t i;
|
1993-03-21 12:45:37 +03:00
|
|
|
struct sockaddr_in oldaddr;
|
2001-04-14 03:29:55 +04:00
|
|
|
int s = splnet(), flags = RTF_UP, error;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
2007-09-01 08:32:50 +04:00
|
|
|
if (sin == NULL)
|
2004-07-07 05:39:00 +04:00
|
|
|
sin = &ia->ia_addr;
|
|
|
|
|
1996-09-09 18:51:07 +04:00
|
|
|
/*
|
|
|
|
* Set up new addresses.
|
|
|
|
*/
|
1993-03-21 12:45:37 +03:00
|
|
|
oldaddr = ia->ia_addr;
|
1998-02-13 21:21:38 +03:00
|
|
|
if (ia->ia_addr.sin_family == AF_INET)
|
|
|
|
LIST_REMOVE(ia, ia_hash);
|
1993-03-21 12:45:37 +03:00
|
|
|
ia->ia_addr = *sin;
|
1998-02-13 21:21:38 +03:00
|
|
|
LIST_INSERT_HEAD(&IN_IFADDR_HASH(ia->ia_addr.sin_addr.s_addr), ia, ia_hash);
|
|
|
|
|
2015-05-16 15:12:46 +03:00
|
|
|
/* Set IN_IFF flags early for if_addr_init() */
|
2015-05-02 17:41:32 +03:00
|
|
|
if (hostIsNew && if_do_dad(ifp) && !in_nullhost(ia->ia_addr.sin_addr)) {
|
|
|
|
if (ifp->if_link_state == LINK_STATE_DOWN)
|
|
|
|
ia->ia4_flags |= IN_IFF_DETACHED;
|
|
|
|
else
|
2015-05-16 15:12:46 +03:00
|
|
|
/* State the intent to try DAD if possible */
|
|
|
|
ia->ia4_flags |= IN_IFF_TRYTENTATIVE;
|
2015-05-02 17:41:32 +03:00
|
|
|
}
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* Give the interface a chance to initialize
|
|
|
|
* if this is its first address,
|
|
|
|
* and to validate the address if necessary.
|
|
|
|
*/
|
2011-10-19 05:52:22 +04:00
|
|
|
if ((error = if_addr_init(ifp, &ia->ia_ifa, true)) != 0)
|
1996-09-09 18:51:07 +04:00
|
|
|
goto bad;
|
2015-05-16 15:12:46 +03:00
|
|
|
/* Now clear the try tentative flag, it's job is done. */
|
|
|
|
ia->ia4_flags &= ~IN_IFF_TRYTENTATIVE;
|
1993-03-21 12:45:37 +03:00
|
|
|
splx(s);
|
2015-05-16 15:12:46 +03:00
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
if (scrub) {
|
1995-06-04 08:35:29 +04:00
|
|
|
ia->ia_ifa.ifa_addr = sintosa(&oldaddr);
|
1993-03-21 12:45:37 +03:00
|
|
|
in_ifscrub(ifp, ia);
|
1995-06-04 08:35:29 +04:00
|
|
|
ia->ia_ifa.ifa_addr = sintosa(&ia->ia_addr);
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
1997-07-24 01:26:40 +04:00
|
|
|
|
2015-02-26 12:54:46 +03:00
|
|
|
/* Add the local route to the address */
|
|
|
|
in_ifaddlocal(&ia->ia_ifa);
|
|
|
|
|
2004-07-07 05:39:00 +04:00
|
|
|
i = ia->ia_addr.sin_addr.s_addr;
|
1993-03-21 12:45:37 +03:00
|
|
|
if (IN_CLASSA(i))
|
|
|
|
ia->ia_netmask = IN_CLASSA_NET;
|
|
|
|
else if (IN_CLASSB(i))
|
|
|
|
ia->ia_netmask = IN_CLASSB_NET;
|
|
|
|
else
|
|
|
|
ia->ia_netmask = IN_CLASSC_NET;
|
|
|
|
/*
|
1994-05-13 10:02:48 +04:00
|
|
|
* The subnet mask usually includes at least the standard network part,
|
|
|
|
* but may may be smaller in the case of supernetting.
|
|
|
|
* If it is set, we believe it.
|
1993-03-21 12:45:37 +03:00
|
|
|
*/
|
1994-05-13 10:02:48 +04:00
|
|
|
if (ia->ia_subnetmask == 0) {
|
|
|
|
ia->ia_subnetmask = ia->ia_netmask;
|
1995-06-02 01:35:34 +04:00
|
|
|
ia->ia_sockmask.sin_addr.s_addr = ia->ia_subnetmask;
|
1994-05-13 10:02:48 +04:00
|
|
|
} else
|
|
|
|
ia->ia_netmask &= ia->ia_subnetmask;
|
1997-07-24 01:26:40 +04:00
|
|
|
|
1994-05-13 10:02:48 +04:00
|
|
|
ia->ia_net = i & ia->ia_netmask;
|
1993-03-21 12:45:37 +03:00
|
|
|
ia->ia_subnet = i & ia->ia_subnetmask;
|
1994-05-13 10:02:48 +04:00
|
|
|
in_socktrim(&ia->ia_sockmask);
|
1997-07-24 01:26:40 +04:00
|
|
|
/* re-calculate the "in_maxmtu" value */
|
|
|
|
in_setmaxmtu();
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* Add route for the network.
|
|
|
|
*/
|
1994-05-13 10:02:48 +04:00
|
|
|
ia->ia_ifa.ifa_metric = ifp->if_metric;
|
1993-03-21 12:45:37 +03:00
|
|
|
if (ifp->if_flags & IFF_BROADCAST) {
|
1994-05-13 10:02:48 +04:00
|
|
|
ia->ia_broadaddr.sin_addr.s_addr =
|
1995-06-02 01:35:34 +04:00
|
|
|
ia->ia_subnet | ~ia->ia_subnetmask;
|
1993-03-21 12:45:37 +03:00
|
|
|
ia->ia_netbroadcast.s_addr =
|
1995-06-02 01:35:34 +04:00
|
|
|
ia->ia_net | ~ia->ia_netmask;
|
1993-03-21 12:45:37 +03:00
|
|
|
} else if (ifp->if_flags & IFF_LOOPBACK) {
|
2003-06-13 11:59:57 +04:00
|
|
|
ia->ia_dstaddr = ia->ia_addr;
|
1993-03-21 12:45:37 +03:00
|
|
|
flags |= RTF_HOST;
|
|
|
|
} else if (ifp->if_flags & IFF_POINTOPOINT) {
|
|
|
|
if (ia->ia_dstaddr.sin_family != AF_INET)
|
|
|
|
return (0);
|
|
|
|
flags |= RTF_HOST;
|
|
|
|
}
|
2001-07-22 20:18:31 +04:00
|
|
|
error = in_addprefix(ia, flags);
|
1993-12-06 07:50:19 +03:00
|
|
|
/*
|
|
|
|
* If the interface supports multicast, join the "all hosts"
|
|
|
|
* multicast group on that interface.
|
|
|
|
*/
|
2000-10-08 13:15:28 +04:00
|
|
|
if ((ifp->if_flags & IFF_MULTICAST) != 0 && ia->ia_allhosts == NULL) {
|
1993-12-06 07:50:19 +03:00
|
|
|
struct in_addr addr;
|
|
|
|
|
1995-06-02 01:35:34 +04:00
|
|
|
addr.s_addr = INADDR_ALLHOSTS_GROUP;
|
2000-10-08 13:15:28 +04:00
|
|
|
ia->ia_allhosts = in_addmulti(&addr, ifp);
|
1993-12-06 07:50:19 +03:00
|
|
|
}
|
2015-05-02 17:41:32 +03:00
|
|
|
|
|
|
|
if (hostIsNew && if_do_dad(ifp) &&
|
|
|
|
!in_nullhost(ia->ia_addr.sin_addr) &&
|
|
|
|
ia->ia4_flags & IN_IFF_TENTATIVE)
|
2015-05-16 15:12:46 +03:00
|
|
|
ia->ia_dad_start((struct ifaddr *)ia);
|
2015-05-02 17:41:32 +03:00
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
return (error);
|
1996-09-09 18:51:07 +04:00
|
|
|
bad:
|
|
|
|
splx(s);
|
1998-02-13 21:21:38 +03:00
|
|
|
LIST_REMOVE(ia, ia_hash);
|
1996-09-09 18:51:07 +04:00
|
|
|
ia->ia_addr = oldaddr;
|
1998-02-13 21:21:38 +03:00
|
|
|
if (ia->ia_addr.sin_family == AF_INET)
|
|
|
|
LIST_INSERT_HEAD(&IN_IFADDR_HASH(ia->ia_addr.sin_addr.s_addr),
|
|
|
|
ia, ia_hash);
|
1996-09-09 18:51:07 +04:00
|
|
|
return (error);
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
2001-07-22 20:18:31 +04:00
|
|
|
#define rtinitflags(x) \
|
2001-07-27 06:04:08 +04:00
|
|
|
((((x)->ia_ifp->if_flags & (IFF_LOOPBACK | IFF_POINTOPOINT)) != 0) \
|
|
|
|
? RTF_HOST : 0)
|
2001-07-22 20:18:31 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* add a route to prefix ("connected route" in cisco terminology).
|
|
|
|
* does nothing if there's some interface address with the same prefix already.
|
|
|
|
*/
|
|
|
|
static int
|
2005-02-03 06:49:01 +03:00
|
|
|
in_addprefix(struct in_ifaddr *target, int flags)
|
2001-07-22 20:18:31 +04:00
|
|
|
{
|
|
|
|
struct in_ifaddr *ia;
|
|
|
|
struct in_addr prefix, mask, p;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
if ((flags & RTF_HOST) != 0)
|
|
|
|
prefix = target->ia_dstaddr.sin_addr;
|
2003-06-18 10:42:34 +04:00
|
|
|
else {
|
2001-07-22 20:18:31 +04:00
|
|
|
prefix = target->ia_addr.sin_addr;
|
2003-06-18 10:42:34 +04:00
|
|
|
mask = target->ia_sockmask.sin_addr;
|
|
|
|
prefix.s_addr &= mask.s_addr;
|
|
|
|
}
|
2001-07-22 20:18:31 +04:00
|
|
|
|
2003-11-11 23:25:26 +03:00
|
|
|
TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list) {
|
2001-07-22 20:18:31 +04:00
|
|
|
if (rtinitflags(ia))
|
|
|
|
p = ia->ia_dstaddr.sin_addr;
|
2003-06-18 10:42:34 +04:00
|
|
|
else {
|
2001-07-22 20:18:31 +04:00
|
|
|
p = ia->ia_addr.sin_addr;
|
2003-06-18 10:42:34 +04:00
|
|
|
p.s_addr &= ia->ia_sockmask.sin_addr.s_addr;
|
|
|
|
}
|
|
|
|
|
2001-07-22 20:18:31 +04:00
|
|
|
if (prefix.s_addr != p.s_addr)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* if we got a matching prefix route inserted by other
|
2001-09-16 12:49:50 +04:00
|
|
|
* interface address, we don't need to bother
|
2006-11-13 08:13:38 +03:00
|
|
|
*
|
|
|
|
* XXX RADIX_MPATH implications here? -dyoung
|
2001-07-22 20:18:31 +04:00
|
|
|
*/
|
2015-02-26 12:54:46 +03:00
|
|
|
if (ia->ia_flags & IFA_ROUTE)
|
2001-07-22 20:18:31 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* noone seem to have prefix route. insert it.
|
|
|
|
*/
|
2007-11-10 02:53:13 +03:00
|
|
|
error = rtinit(&target->ia_ifa, RTM_ADD, flags);
|
|
|
|
if (error == 0)
|
2001-07-22 20:18:31 +04:00
|
|
|
target->ia_flags |= IFA_ROUTE;
|
2008-12-21 22:07:35 +03:00
|
|
|
else if (error == EEXIST) {
|
2015-02-26 12:54:46 +03:00
|
|
|
/*
|
2008-12-21 22:07:35 +03:00
|
|
|
* the fact the route already exists is not an error.
|
2015-02-26 12:54:46 +03:00
|
|
|
*/
|
2008-12-21 22:07:35 +03:00
|
|
|
error = 0;
|
|
|
|
}
|
2001-07-22 20:18:31 +04:00
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* remove a route to prefix ("connected route" in cisco terminology).
|
|
|
|
* re-installs the route by using another interface address, if there's one
|
|
|
|
* with the same prefix (otherwise we lose the route mistakenly).
|
|
|
|
*/
|
|
|
|
static int
|
2005-02-03 06:49:01 +03:00
|
|
|
in_scrubprefix(struct in_ifaddr *target)
|
2001-07-22 20:18:31 +04:00
|
|
|
{
|
|
|
|
struct in_ifaddr *ia;
|
|
|
|
struct in_addr prefix, mask, p;
|
|
|
|
int error;
|
|
|
|
|
2011-12-12 04:06:39 +04:00
|
|
|
/* If we don't have IFA_ROUTE we should still inform userland */
|
2015-02-26 12:54:46 +03:00
|
|
|
if ((target->ia_flags & IFA_ROUTE) == 0)
|
2001-07-22 20:18:31 +04:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (rtinitflags(target))
|
|
|
|
prefix = target->ia_dstaddr.sin_addr;
|
2003-06-18 10:42:34 +04:00
|
|
|
else {
|
2001-07-22 20:18:31 +04:00
|
|
|
prefix = target->ia_addr.sin_addr;
|
2003-06-18 10:42:34 +04:00
|
|
|
mask = target->ia_sockmask.sin_addr;
|
|
|
|
prefix.s_addr &= mask.s_addr;
|
|
|
|
}
|
2001-07-22 20:18:31 +04:00
|
|
|
|
2003-11-11 23:25:26 +03:00
|
|
|
TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list) {
|
2001-07-22 20:18:31 +04:00
|
|
|
if (rtinitflags(ia))
|
|
|
|
p = ia->ia_dstaddr.sin_addr;
|
2003-06-18 10:42:34 +04:00
|
|
|
else {
|
2001-07-22 20:18:31 +04:00
|
|
|
p = ia->ia_addr.sin_addr;
|
2003-06-18 10:42:34 +04:00
|
|
|
p.s_addr &= ia->ia_sockmask.sin_addr.s_addr;
|
|
|
|
}
|
|
|
|
|
2001-07-22 20:18:31 +04:00
|
|
|
if (prefix.s_addr != p.s_addr)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* if we got a matching prefix route, move IFA_ROUTE to him
|
|
|
|
*/
|
|
|
|
if ((ia->ia_flags & IFA_ROUTE) == 0) {
|
2007-11-10 02:53:13 +03:00
|
|
|
rtinit(&target->ia_ifa, RTM_DELETE,
|
2001-07-22 20:18:31 +04:00
|
|
|
rtinitflags(target));
|
|
|
|
target->ia_flags &= ~IFA_ROUTE;
|
|
|
|
|
2007-11-10 02:53:13 +03:00
|
|
|
error = rtinit(&ia->ia_ifa, RTM_ADD,
|
2001-07-22 20:18:31 +04:00
|
|
|
rtinitflags(ia) | RTF_UP);
|
|
|
|
if (error == 0)
|
|
|
|
ia->ia_flags |= IFA_ROUTE;
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* noone seem to have prefix route. remove it.
|
|
|
|
*/
|
2007-11-10 02:53:13 +03:00
|
|
|
rtinit(&target->ia_ifa, RTM_DELETE, rtinitflags(target));
|
2001-07-22 20:18:31 +04:00
|
|
|
target->ia_flags &= ~IFA_ROUTE;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#undef rtinitflags
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* Return 1 if the address might be a local broadcast address.
|
|
|
|
*/
|
1994-01-09 04:06:02 +03:00
|
|
|
int
|
2005-02-03 06:49:01 +03:00
|
|
|
in_broadcast(struct in_addr in, struct ifnet *ifp)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
2000-03-30 16:51:13 +04:00
|
|
|
struct ifaddr *ifa;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
1994-05-13 10:02:48 +04:00
|
|
|
if (in.s_addr == INADDR_BROADCAST ||
|
1996-09-09 18:51:07 +04:00
|
|
|
in_nullhost(in))
|
1994-05-13 10:02:48 +04:00
|
|
|
return 1;
|
|
|
|
if ((ifp->if_flags & IFF_BROADCAST) == 0)
|
|
|
|
return 0;
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* Look through the list of addresses for a match
|
|
|
|
* with a broadcast address.
|
|
|
|
*/
|
1995-06-04 09:06:49 +04:00
|
|
|
#define ia (ifatoia(ifa))
|
2005-01-25 00:25:09 +03:00
|
|
|
IFADDR_FOREACH(ifa, ifp)
|
1994-05-13 10:02:48 +04:00
|
|
|
if (ifa->ifa_addr->sa_family == AF_INET &&
|
2002-03-30 03:40:32 +03:00
|
|
|
!in_hosteq(in, ia->ia_addr.sin_addr) &&
|
1996-09-09 18:51:07 +04:00
|
|
|
(in_hosteq(in, ia->ia_broadaddr.sin_addr) ||
|
|
|
|
in_hosteq(in, ia->ia_netbroadcast) ||
|
2002-06-09 20:33:36 +04:00
|
|
|
(hostzeroisbroadcast &&
|
1999-06-26 10:16:47 +04:00
|
|
|
/*
|
|
|
|
* Check for old-style (host 0) broadcast.
|
|
|
|
*/
|
|
|
|
(in.s_addr == ia->ia_subnet ||
|
|
|
|
in.s_addr == ia->ia_net))))
|
|
|
|
return 1;
|
1993-03-21 12:45:37 +03:00
|
|
|
return (0);
|
1994-05-13 10:02:48 +04:00
|
|
|
#undef ia
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
1993-12-06 07:50:19 +03:00
|
|
|
|
2015-05-02 17:41:32 +03:00
|
|
|
/*
|
|
|
|
* perform DAD when interface becomes IFF_UP.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
in_if_link_up(struct ifnet *ifp)
|
|
|
|
{
|
|
|
|
struct ifaddr *ifa;
|
|
|
|
struct in_ifaddr *ia;
|
|
|
|
|
|
|
|
/* Ensure it's sane to run DAD */
|
|
|
|
if (ifp->if_link_state == LINK_STATE_DOWN)
|
|
|
|
return;
|
|
|
|
if ((ifp->if_flags & (IFF_UP|IFF_RUNNING)) != (IFF_UP|IFF_RUNNING))
|
|
|
|
return;
|
|
|
|
|
|
|
|
IFADDR_FOREACH(ifa, ifp) {
|
|
|
|
if (ifa->ifa_addr->sa_family != AF_INET)
|
|
|
|
continue;
|
|
|
|
ia = (struct in_ifaddr *)ifa;
|
|
|
|
|
|
|
|
/* If detached then mark as tentative */
|
|
|
|
if (ia->ia4_flags & IN_IFF_DETACHED) {
|
|
|
|
ia->ia4_flags &= ~IN_IFF_DETACHED;
|
2015-05-16 15:12:46 +03:00
|
|
|
if (if_do_dad(ifp) && ia->ia_dad_start != NULL)
|
2015-05-02 17:41:32 +03:00
|
|
|
ia->ia4_flags |= IN_IFF_TENTATIVE;
|
2015-05-16 15:12:46 +03:00
|
|
|
else if ((ia->ia4_flags & IN_IFF_TENTATIVE) == 0)
|
2015-05-02 17:41:32 +03:00
|
|
|
rt_newaddrmsg(RTM_NEWADDR, ifa, 0, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ia->ia4_flags & IN_IFF_TENTATIVE) {
|
|
|
|
/* Clear the duplicated flag as we're starting DAD. */
|
|
|
|
ia->ia4_flags &= ~IN_IFF_DUPLICATED;
|
2015-05-16 15:12:46 +03:00
|
|
|
ia->ia_dad_start(ifa);
|
2015-05-02 17:41:32 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
in_if_up(struct ifnet *ifp)
|
|
|
|
{
|
|
|
|
|
|
|
|
/* interface may not support link state, so bring it up also */
|
|
|
|
in_if_link_up(ifp);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Mark all addresses as detached.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
in_if_link_down(struct ifnet *ifp)
|
|
|
|
{
|
|
|
|
struct ifaddr *ifa;
|
|
|
|
struct in_ifaddr *ia;
|
|
|
|
|
|
|
|
IFADDR_FOREACH(ifa, ifp) {
|
|
|
|
if (ifa->ifa_addr->sa_family != AF_INET)
|
|
|
|
continue;
|
|
|
|
ia = (struct in_ifaddr *)ifa;
|
|
|
|
|
|
|
|
/* Stop DAD processing */
|
2015-05-16 15:12:46 +03:00
|
|
|
if (ia->ia_dad_stop != NULL)
|
|
|
|
ia->ia_dad_stop(ifa);
|
2015-05-02 17:41:32 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Mark the address as detached.
|
|
|
|
*/
|
|
|
|
if (!(ia->ia4_flags & IN_IFF_DETACHED)) {
|
|
|
|
ia->ia4_flags |= IN_IFF_DETACHED;
|
|
|
|
ia->ia4_flags &=
|
|
|
|
~(IN_IFF_TENTATIVE | IN_IFF_DUPLICATED);
|
|
|
|
rt_newaddrmsg(RTM_NEWADDR, ifa, 0, NULL);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
in_if_down(struct ifnet *ifp)
|
|
|
|
{
|
|
|
|
|
|
|
|
in_if_link_down(ifp);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
in_if_link_state_change(struct ifnet *ifp, int link_state)
|
|
|
|
{
|
|
|
|
|
|
|
|
switch (link_state) {
|
|
|
|
case LINK_STATE_DOWN:
|
|
|
|
in_if_link_down(ifp);
|
|
|
|
break;
|
|
|
|
case LINK_STATE_UP:
|
|
|
|
in_if_link_up(ifp);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-05-30 03:02:48 +04:00
|
|
|
/*
|
|
|
|
* in_lookup_multi: look up the in_multi record for a given IP
|
|
|
|
* multicast address on a given interface. If no matching record is
|
|
|
|
* found, return NULL.
|
|
|
|
*/
|
|
|
|
struct in_multi *
|
|
|
|
in_lookup_multi(struct in_addr addr, ifnet_t *ifp)
|
|
|
|
{
|
|
|
|
struct in_multi *inm;
|
|
|
|
|
|
|
|
KASSERT(rw_lock_held(&in_multilock));
|
|
|
|
|
|
|
|
LIST_FOREACH(inm, &IN_MULTI_HASH(addr.s_addr, ifp), inm_list) {
|
|
|
|
if (in_hosteq(inm->inm_addr, addr) && inm->inm_ifp == ifp)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return inm;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* in_multi_group: check whether the address belongs to an IP multicast
|
|
|
|
* group we are joined on this interface. Returns true or false.
|
|
|
|
*/
|
|
|
|
bool
|
|
|
|
in_multi_group(struct in_addr addr, ifnet_t *ifp, int flags)
|
|
|
|
{
|
|
|
|
bool ingroup;
|
|
|
|
|
|
|
|
if (__predict_true(flags & IP_IGMP_MCAST) == 0) {
|
|
|
|
rw_enter(&in_multilock, RW_READER);
|
|
|
|
ingroup = in_lookup_multi(addr, ifp) != NULL;
|
|
|
|
rw_exit(&in_multilock);
|
|
|
|
} else {
|
|
|
|
/* XXX Recursive call from ip_output(). */
|
|
|
|
KASSERT(rw_lock_held(&in_multilock));
|
|
|
|
ingroup = in_lookup_multi(addr, ifp) != NULL;
|
|
|
|
}
|
|
|
|
return ingroup;
|
|
|
|
}
|
|
|
|
|
1993-12-06 07:50:19 +03:00
|
|
|
/*
|
|
|
|
* Add an address to the list of IP multicast addresses for a given interface.
|
|
|
|
*/
|
|
|
|
struct in_multi *
|
2014-05-30 03:02:48 +04:00
|
|
|
in_addmulti(struct in_addr *ap, ifnet_t *ifp)
|
1993-12-06 07:50:19 +03:00
|
|
|
{
|
2007-09-01 08:32:50 +04:00
|
|
|
struct sockaddr_in sin;
|
2000-03-30 16:51:13 +04:00
|
|
|
struct in_multi *inm;
|
1993-12-06 07:50:19 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* See if address already in list.
|
|
|
|
*/
|
2014-05-30 03:02:48 +04:00
|
|
|
rw_enter(&in_multilock, RW_WRITER);
|
|
|
|
inm = in_lookup_multi(*ap, ifp);
|
1993-12-06 07:50:19 +03:00
|
|
|
if (inm != NULL) {
|
|
|
|
/*
|
|
|
|
* Found it; just increment the reference count.
|
|
|
|
*/
|
2014-05-30 03:02:48 +04:00
|
|
|
inm->inm_refcount++;
|
|
|
|
rw_exit(&in_multilock);
|
|
|
|
return inm;
|
1993-12-06 07:50:19 +03:00
|
|
|
}
|
2014-05-30 03:02:48 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* New address; allocate a new multicast record.
|
|
|
|
*/
|
|
|
|
inm = pool_get(&inmulti_pool, PR_NOWAIT);
|
|
|
|
if (inm == NULL) {
|
|
|
|
rw_exit(&in_multilock);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
inm->inm_addr = *ap;
|
|
|
|
inm->inm_ifp = ifp;
|
|
|
|
inm->inm_refcount = 1;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Ask the network driver to update its multicast reception
|
|
|
|
* filter appropriately for the new address.
|
|
|
|
*/
|
|
|
|
sockaddr_in_init(&sin, ap, 0);
|
|
|
|
if (if_mcast_op(ifp, SIOCADDMULTI, sintosa(&sin)) != 0) {
|
|
|
|
rw_exit(&in_multilock);
|
|
|
|
pool_put(&inmulti_pool, inm);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Let IGMP know that we have joined a new IP multicast group.
|
|
|
|
*/
|
|
|
|
if (igmp_joingroup(inm) != 0) {
|
|
|
|
rw_exit(&in_multilock);
|
|
|
|
pool_put(&inmulti_pool, inm);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
LIST_INSERT_HEAD(
|
|
|
|
&IN_MULTI_HASH(inm->inm_addr.s_addr, ifp),
|
|
|
|
inm, inm_list);
|
|
|
|
in_multientries++;
|
|
|
|
rw_exit(&in_multilock);
|
|
|
|
|
|
|
|
return inm;
|
1993-12-06 07:50:19 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Delete a multicast address record.
|
|
|
|
*/
|
1996-02-14 02:40:59 +03:00
|
|
|
void
|
2005-02-03 06:49:01 +03:00
|
|
|
in_delmulti(struct in_multi *inm)
|
1993-12-06 07:50:19 +03:00
|
|
|
{
|
2007-09-01 08:32:50 +04:00
|
|
|
struct sockaddr_in sin;
|
1993-12-06 07:50:19 +03:00
|
|
|
|
2014-05-30 03:02:48 +04:00
|
|
|
rw_enter(&in_multilock, RW_WRITER);
|
|
|
|
if (--inm->inm_refcount > 0) {
|
|
|
|
rw_exit(&in_multilock);
|
|
|
|
return;
|
1993-12-06 07:50:19 +03:00
|
|
|
}
|
2014-05-30 03:02:48 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* No remaining claims to this record; let IGMP know that
|
|
|
|
* we are leaving the multicast group.
|
|
|
|
*/
|
|
|
|
igmp_leavegroup(inm);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Notify the network driver to update its multicast reception
|
|
|
|
* filter.
|
|
|
|
*/
|
|
|
|
sockaddr_in_init(&sin, &inm->inm_addr, 0);
|
|
|
|
if_mcast_op(inm->inm_ifp, SIOCDELMULTI, sintosa(&sin));
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Unlink from list.
|
|
|
|
*/
|
|
|
|
LIST_REMOVE(inm, inm_list);
|
|
|
|
in_multientries--;
|
|
|
|
rw_exit(&in_multilock);
|
|
|
|
|
|
|
|
pool_put(&inmulti_pool, inm);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* in_next_multi: step through all of the in_multi records, one at a time.
|
|
|
|
* The current position is remembered in "step", which the caller must
|
|
|
|
* provide. in_first_multi(), below, must be called to initialize "step"
|
|
|
|
* and get the first record. Both macros return a NULL "inm" when there
|
|
|
|
* are no remaining records.
|
|
|
|
*/
|
|
|
|
struct in_multi *
|
|
|
|
in_next_multi(struct in_multistep *step)
|
|
|
|
{
|
|
|
|
struct in_multi *inm;
|
|
|
|
|
|
|
|
KASSERT(rw_lock_held(&in_multilock));
|
|
|
|
|
|
|
|
while (step->i_inm == NULL && step->i_n < IN_MULTI_HASH_SIZE) {
|
|
|
|
step->i_inm = LIST_FIRST(&in_multihashtbl[++step->i_n]);
|
|
|
|
}
|
|
|
|
if ((inm = step->i_inm) != NULL) {
|
|
|
|
step->i_inm = LIST_NEXT(inm, inm_list);
|
|
|
|
}
|
|
|
|
return inm;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct in_multi *
|
|
|
|
in_first_multi(struct in_multistep *step)
|
|
|
|
{
|
|
|
|
KASSERT(rw_lock_held(&in_multilock));
|
|
|
|
|
|
|
|
step->i_n = 0;
|
|
|
|
step->i_inm = LIST_FIRST(&in_multihashtbl[0]);
|
|
|
|
return in_next_multi(step);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
in_multi_lock(int op)
|
|
|
|
{
|
|
|
|
rw_enter(&in_multilock, op);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
in_multi_unlock(void)
|
|
|
|
{
|
|
|
|
rw_exit(&in_multilock);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
in_multi_lock_held(void)
|
|
|
|
{
|
|
|
|
return rw_lock_held(&in_multilock);
|
1993-12-06 07:50:19 +03:00
|
|
|
}
|
2014-05-23 02:01:12 +04:00
|
|
|
|
|
|
|
struct sockaddr_in *
|
|
|
|
in_selectsrc(struct sockaddr_in *sin, struct route *ro,
|
|
|
|
int soopts, struct ip_moptions *mopts, int *errorp)
|
|
|
|
{
|
|
|
|
struct rtentry *rt = NULL;
|
|
|
|
struct in_ifaddr *ia = NULL;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If route is known or can be allocated now, take the
|
|
|
|
* source address from the interface. Otherwise, punt.
|
|
|
|
*/
|
|
|
|
if ((soopts & SO_DONTROUTE) != 0)
|
|
|
|
rtcache_free(ro);
|
|
|
|
else {
|
|
|
|
union {
|
|
|
|
struct sockaddr dst;
|
|
|
|
struct sockaddr_in dst4;
|
|
|
|
} u;
|
|
|
|
|
|
|
|
sockaddr_in_init(&u.dst4, &sin->sin_addr, 0);
|
|
|
|
rt = rtcache_lookup(ro, &u.dst);
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* If we found a route, use the address
|
|
|
|
* corresponding to the outgoing interface
|
|
|
|
* unless it is the loopback (in case a route
|
|
|
|
* to our address on another net goes to loopback).
|
|
|
|
*
|
|
|
|
* XXX Is this still true? Do we care?
|
|
|
|
*/
|
|
|
|
if (rt != NULL && (rt->rt_ifp->if_flags & IFF_LOOPBACK) == 0)
|
|
|
|
ia = ifatoia(rt->rt_ifa);
|
|
|
|
if (ia == NULL) {
|
|
|
|
u_int16_t fport = sin->sin_port;
|
|
|
|
|
|
|
|
sin->sin_port = 0;
|
|
|
|
ia = ifatoia(ifa_ifwithladdr(sintosa(sin)));
|
|
|
|
sin->sin_port = fport;
|
|
|
|
if (ia == NULL) {
|
|
|
|
/* Find 1st non-loopback AF_INET address */
|
|
|
|
TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list) {
|
|
|
|
if (!(ia->ia_ifp->if_flags & IFF_LOOPBACK))
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (ia == NULL) {
|
|
|
|
*errorp = EADDRNOTAVAIL;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* If the destination address is multicast and an outgoing
|
|
|
|
* interface has been set as a multicast option, use the
|
|
|
|
* address of that interface as our source address.
|
|
|
|
*/
|
|
|
|
if (IN_MULTICAST(sin->sin_addr.s_addr) && mopts != NULL) {
|
|
|
|
struct ip_moptions *imo;
|
|
|
|
struct ifnet *ifp;
|
|
|
|
|
|
|
|
imo = mopts;
|
|
|
|
if (imo->imo_multicast_ifp != NULL) {
|
|
|
|
ifp = imo->imo_multicast_ifp;
|
|
|
|
IFP_TO_IA(ifp, ia); /* XXX */
|
2015-05-02 17:41:32 +03:00
|
|
|
if (ia == 0 || ia->ia4_flags & IN_IFF_NOTREADY) {
|
2014-05-23 02:01:12 +04:00
|
|
|
*errorp = EADDRNOTAVAIL;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (ia->ia_ifa.ifa_getifa != NULL) {
|
|
|
|
ia = ifatoia((*ia->ia_ifa.ifa_getifa)(&ia->ia_ifa,
|
|
|
|
sintosa(sin)));
|
2015-05-02 17:41:32 +03:00
|
|
|
if (ia == NULL) {
|
|
|
|
*errorp = EADDRNOTAVAIL;
|
|
|
|
return NULL;
|
|
|
|
}
|
2014-05-23 02:01:12 +04:00
|
|
|
}
|
|
|
|
#ifdef GETIFA_DEBUG
|
|
|
|
else
|
|
|
|
printf("%s: missing ifa_getifa\n", __func__);
|
|
|
|
#endif
|
|
|
|
return satosin(&ia->ia_addr);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
in_sysctl_init(struct sysctllog **clog)
|
|
|
|
{
|
|
|
|
sysctl_createv(clog, 0, NULL, NULL,
|
|
|
|
CTLFLAG_PERMANENT,
|
|
|
|
CTLTYPE_NODE, "inet",
|
|
|
|
SYSCTL_DESCR("PF_INET related settings"),
|
|
|
|
NULL, 0, NULL, 0,
|
|
|
|
CTL_NET, PF_INET, CTL_EOL);
|
|
|
|
sysctl_createv(clog, 0, NULL, NULL,
|
|
|
|
CTLFLAG_PERMANENT,
|
|
|
|
CTLTYPE_NODE, "ip",
|
|
|
|
SYSCTL_DESCR("IPv4 related settings"),
|
|
|
|
NULL, 0, NULL, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_IP, CTL_EOL);
|
|
|
|
|
|
|
|
sysctl_createv(clog, 0, NULL, NULL,
|
|
|
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
|
|
|
|
CTLTYPE_INT, "subnetsarelocal",
|
|
|
|
SYSCTL_DESCR("Whether logical subnets are considered "
|
|
|
|
"local"),
|
|
|
|
NULL, 0, &subnetsarelocal, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_IP,
|
|
|
|
IPCTL_SUBNETSARELOCAL, CTL_EOL);
|
|
|
|
sysctl_createv(clog, 0, NULL, NULL,
|
|
|
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
|
|
|
|
CTLTYPE_INT, "hostzerobroadcast",
|
|
|
|
SYSCTL_DESCR("All zeroes address is broadcast address"),
|
|
|
|
NULL, 0, &hostzeroisbroadcast, 0,
|
|
|
|
CTL_NET, PF_INET, IPPROTO_IP,
|
|
|
|
IPCTL_HOSTZEROBROADCAST, CTL_EOL);
|
|
|
|
}
|