2007-12-11 15:29:11 +03:00
|
|
|
/* $NetBSD: scope6.c,v 1.6 2007/12/11 12:30:20 lukem Exp $ */
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
/* $KAME$ */
|
|
|
|
|
|
|
|
/*-
|
|
|
|
* Copyright (C) 2000 WIDE Project.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. Neither the name of the project nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
2007-12-11 15:29:11 +03:00
|
|
|
#include <sys/cdefs.h>
|
|
|
|
__KERNEL_RCSID(0, "$NetBSD: scope6.c,v 1.6 2007/12/11 12:30:20 lukem Exp $");
|
|
|
|
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/malloc.h>
|
|
|
|
#include <sys/mbuf.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/systm.h>
|
|
|
|
#include <sys/queue.h>
|
|
|
|
#include <sys/syslog.h>
|
|
|
|
|
|
|
|
#include <net/route.h>
|
|
|
|
#include <net/if.h>
|
|
|
|
|
|
|
|
#include <netinet/in.h>
|
|
|
|
|
|
|
|
#include <netinet6/in6_var.h>
|
|
|
|
#include <netinet6/scope6_var.h>
|
|
|
|
|
|
|
|
#ifdef ENABLE_DEFAULT_SCOPE
|
|
|
|
int ip6_use_defzone = 1;
|
|
|
|
#else
|
|
|
|
int ip6_use_defzone = 0;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
static struct scope6_id sid_default;
|
|
|
|
#define SID(ifp) \
|
|
|
|
(((struct in6_ifextra *)(ifp)->if_afdata[AF_INET6])->scope6_id)
|
|
|
|
|
|
|
|
void
|
|
|
|
scope6_init()
|
|
|
|
{
|
|
|
|
|
2006-03-05 04:28:51 +03:00
|
|
|
memset(&sid_default, 0, sizeof(sid_default));
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
struct scope6_id *
|
|
|
|
scope6_ifattach(struct ifnet *ifp)
|
|
|
|
{
|
|
|
|
struct scope6_id *sid;
|
|
|
|
|
|
|
|
sid = (struct scope6_id *)malloc(sizeof(*sid), M_IFADDR, M_WAITOK);
|
2006-03-05 04:28:51 +03:00
|
|
|
memset(sid, 0, sizeof(*sid));
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* XXX: IPV6_ADDR_SCOPE_xxx macros are not standard.
|
|
|
|
* Should we rather hardcode here?
|
|
|
|
*/
|
|
|
|
sid->s6id_list[IPV6_ADDR_SCOPE_INTFACELOCAL] = ifp->if_index;
|
|
|
|
sid->s6id_list[IPV6_ADDR_SCOPE_LINKLOCAL] = ifp->if_index;
|
|
|
|
#ifdef MULTI_SCOPE
|
|
|
|
/* by default, we don't care about scope boundary for these scopes. */
|
|
|
|
sid->s6id_list[IPV6_ADDR_SCOPE_SITELOCAL] = 1;
|
|
|
|
sid->s6id_list[IPV6_ADDR_SCOPE_ORGLOCAL] = 1;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return sid;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
scope6_ifdetach(struct scope6_id *sid)
|
|
|
|
{
|
|
|
|
|
|
|
|
free(sid, M_IFADDR);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2007-10-24 10:37:20 +04:00
|
|
|
scope6_set(struct ifnet *ifp, const struct scope6_id *idlist)
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
int error = 0;
|
|
|
|
struct scope6_id *sid = NULL;
|
|
|
|
|
|
|
|
sid = SID(ifp);
|
|
|
|
|
|
|
|
if (!sid) /* paranoid? */
|
|
|
|
return (EINVAL);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* XXX: We need more consistency checks of the relationship among
|
|
|
|
* scopes (e.g. an organization should be larger than a site).
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* TODO(XXX): after setting, we should reflect the changes to
|
|
|
|
* interface addresses, routing table entries, PCB entries...
|
|
|
|
*/
|
|
|
|
|
|
|
|
for (i = 0; i < 16; i++) {
|
|
|
|
if (idlist->s6id_list[i] &&
|
|
|
|
idlist->s6id_list[i] != sid->s6id_list[i]) {
|
|
|
|
/*
|
|
|
|
* An interface zone ID must be the corresponding
|
|
|
|
* interface index by definition.
|
|
|
|
*/
|
|
|
|
if (i == IPV6_ADDR_SCOPE_INTFACELOCAL &&
|
|
|
|
idlist->s6id_list[i] != ifp->if_index)
|
|
|
|
return (EINVAL);
|
|
|
|
|
|
|
|
if (i == IPV6_ADDR_SCOPE_LINKLOCAL &&
|
|
|
|
idlist->s6id_list[i] >= if_indexlim) {
|
|
|
|
/*
|
|
|
|
* XXX: theoretically, there should be no
|
|
|
|
* relationship between link IDs and interface
|
|
|
|
* IDs, but we check the consistency for
|
|
|
|
* safety in later use.
|
|
|
|
*/
|
|
|
|
return (EINVAL);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* XXX: we must need lots of work in this case,
|
|
|
|
* but we simply set the new value in this initial
|
|
|
|
* implementation.
|
|
|
|
*/
|
|
|
|
sid->s6id_list[i] = idlist->s6id_list[i];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2007-10-24 10:37:20 +04:00
|
|
|
scope6_get(const struct ifnet *ifp, struct scope6_id *idlist)
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
{
|
|
|
|
/* We only need to lock the interface's afdata for SID() to work. */
|
2007-10-24 10:37:20 +04:00
|
|
|
const struct scope6_id *sid = SID(ifp);
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
|
|
|
|
if (sid == NULL) /* paranoid? */
|
2007-10-24 10:37:20 +04:00
|
|
|
return EINVAL;
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
|
|
|
|
*idlist = *sid;
|
|
|
|
|
2007-10-24 10:37:20 +04:00
|
|
|
return 0;
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Get a scope of the address. Interface-local, link-local, site-local
|
|
|
|
* or global.
|
|
|
|
*/
|
|
|
|
int
|
2007-10-24 10:37:20 +04:00
|
|
|
in6_addrscope(const struct in6_addr *addr)
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
{
|
|
|
|
int scope;
|
|
|
|
|
|
|
|
if (addr->s6_addr[0] == 0xfe) {
|
|
|
|
scope = addr->s6_addr[1] & 0xc0;
|
|
|
|
|
|
|
|
switch (scope) {
|
|
|
|
case 0x80:
|
|
|
|
return IPV6_ADDR_SCOPE_LINKLOCAL;
|
|
|
|
break;
|
|
|
|
case 0xc0:
|
|
|
|
return IPV6_ADDR_SCOPE_SITELOCAL;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return IPV6_ADDR_SCOPE_GLOBAL; /* just in case */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
if (addr->s6_addr[0] == 0xff) {
|
|
|
|
scope = addr->s6_addr[1] & 0x0f;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* due to other scope such as reserved,
|
|
|
|
* return scope doesn't work.
|
|
|
|
*/
|
|
|
|
switch (scope) {
|
|
|
|
case IPV6_ADDR_SCOPE_INTFACELOCAL:
|
|
|
|
return IPV6_ADDR_SCOPE_INTFACELOCAL;
|
|
|
|
break;
|
|
|
|
case IPV6_ADDR_SCOPE_LINKLOCAL:
|
|
|
|
return IPV6_ADDR_SCOPE_LINKLOCAL;
|
|
|
|
break;
|
|
|
|
case IPV6_ADDR_SCOPE_SITELOCAL:
|
|
|
|
return IPV6_ADDR_SCOPE_SITELOCAL;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return IPV6_ADDR_SCOPE_GLOBAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2007-10-24 10:37:20 +04:00
|
|
|
if (memcmp(&in6addr_loopback, addr, sizeof(*addr) - 1) == 0) {
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
if (addr->s6_addr[15] == 1) /* loopback */
|
|
|
|
return IPV6_ADDR_SCOPE_LINKLOCAL;
|
|
|
|
if (addr->s6_addr[15] == 0) {
|
|
|
|
/*
|
|
|
|
* Regard the unspecified addresses as global,
|
|
|
|
* since it has no ambiguity.
|
|
|
|
* XXX: not sure if it's correct...
|
|
|
|
*/
|
|
|
|
return IPV6_ADDR_SCOPE_GLOBAL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return IPV6_ADDR_SCOPE_GLOBAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* note that ifp argument might be NULL */
|
|
|
|
void
|
|
|
|
scope6_setdefault(struct ifnet *ifp)
|
|
|
|
{
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Currently, this function just sets the default "interfaces"
|
|
|
|
* and "links" according to the given interface.
|
|
|
|
* We might eventually have to separate the notion of "link" from
|
|
|
|
* "interface" and provide a user interface to set the default.
|
|
|
|
*/
|
|
|
|
if (ifp) {
|
|
|
|
sid_default.s6id_list[IPV6_ADDR_SCOPE_INTFACELOCAL] =
|
|
|
|
ifp->if_index;
|
|
|
|
sid_default.s6id_list[IPV6_ADDR_SCOPE_LINKLOCAL] =
|
|
|
|
ifp->if_index;
|
|
|
|
} else {
|
|
|
|
sid_default.s6id_list[IPV6_ADDR_SCOPE_INTFACELOCAL] = 0;
|
|
|
|
sid_default.s6id_list[IPV6_ADDR_SCOPE_LINKLOCAL] = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
scope6_get_default(struct scope6_id *idlist)
|
|
|
|
{
|
|
|
|
|
|
|
|
*idlist = sid_default;
|
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t
|
2007-10-24 10:37:20 +04:00
|
|
|
scope6_addr2default(const struct in6_addr *addr)
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
{
|
|
|
|
uint32_t id;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* special case: The loopback address should be considered as
|
|
|
|
* link-local, but there's no ambiguity in the syntax.
|
|
|
|
*/
|
|
|
|
if (IN6_IS_ADDR_LOOPBACK(addr))
|
|
|
|
return (0);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* XXX: 32-bit read is atomic on all our platforms, is it OK
|
|
|
|
* not to lock here?
|
|
|
|
*/
|
|
|
|
id = sid_default.s6id_list[in6_addrscope(addr)];
|
|
|
|
|
|
|
|
return (id);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Validate the specified scope zone ID in the sin6_scope_id field. If the ID
|
|
|
|
* is unspecified (=0), needs to be specified, and the default zone ID can be
|
|
|
|
* used, the default value will be used.
|
|
|
|
* This routine then generates the kernel-internal form: if the address scope
|
|
|
|
* of is interface-local or link-local, embed the interface index in the
|
|
|
|
* address.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
sa6_embedscope(struct sockaddr_in6 *sin6, int defaultok)
|
|
|
|
{
|
|
|
|
struct ifnet *ifp;
|
|
|
|
uint32_t zoneid;
|
|
|
|
|
|
|
|
if ((zoneid = sin6->sin6_scope_id) == 0 && defaultok)
|
|
|
|
zoneid = scope6_addr2default(&sin6->sin6_addr);
|
|
|
|
|
|
|
|
if (zoneid != 0 &&
|
|
|
|
(IN6_IS_SCOPE_LINKLOCAL(&sin6->sin6_addr) ||
|
|
|
|
IN6_IS_ADDR_MC_INTFACELOCAL(&sin6->sin6_addr))) {
|
|
|
|
/*
|
|
|
|
* At this moment, we only check interface-local and
|
|
|
|
* link-local scope IDs, and use interface indices as the
|
|
|
|
* zone IDs assuming a one-to-one mapping between interfaces
|
|
|
|
* and links.
|
|
|
|
*/
|
|
|
|
if (if_indexlim <= zoneid)
|
|
|
|
return (ENXIO);
|
|
|
|
#ifdef __FreeBSD__
|
|
|
|
ifp = ifnet_byindex(zoneid);
|
|
|
|
#else
|
|
|
|
ifp = ifindex2ifnet[zoneid];
|
|
|
|
#endif
|
|
|
|
if (ifp == NULL) /* XXX: this can happen for some OS */
|
|
|
|
return (ENXIO);
|
|
|
|
|
|
|
|
/* XXX assignment to 16bit from 32bit variable */
|
|
|
|
sin6->sin6_addr.s6_addr16[1] = htons(zoneid & 0xffff);
|
|
|
|
|
|
|
|
sin6->sin6_scope_id = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* generate standard sockaddr_in6 from embedded form.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
sa6_recoverscope(struct sockaddr_in6 *sin6)
|
|
|
|
{
|
|
|
|
uint32_t zoneid;
|
|
|
|
|
|
|
|
if (sin6->sin6_scope_id != 0) {
|
|
|
|
log(LOG_NOTICE,
|
|
|
|
"sa6_recoverscope: assumption failure (non 0 ID): %s%%%d\n",
|
|
|
|
ip6_sprintf(&sin6->sin6_addr), sin6->sin6_scope_id);
|
|
|
|
/* XXX: proceed anyway... */
|
|
|
|
}
|
|
|
|
if (IN6_IS_SCOPE_LINKLOCAL(&sin6->sin6_addr) ||
|
|
|
|
IN6_IS_ADDR_MC_INTFACELOCAL(&sin6->sin6_addr)) {
|
|
|
|
/*
|
|
|
|
* KAME assumption: link id == interface id
|
|
|
|
*/
|
|
|
|
zoneid = ntohs(sin6->sin6_addr.s6_addr16[1]);
|
|
|
|
if (zoneid) {
|
|
|
|
/* sanity check */
|
2006-09-03 09:16:59 +04:00
|
|
|
if (/* zoneid < 0 || */ if_indexlim <= zoneid)
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
return (ENXIO);
|
|
|
|
#ifdef __FreeBSD__
|
|
|
|
if (!ifnet_byindex(zoneid))
|
|
|
|
#else
|
|
|
|
if (!ifindex2ifnet[zoneid])
|
|
|
|
#endif
|
|
|
|
return (ENXIO);
|
|
|
|
sin6->sin6_addr.s6_addr16[1] = 0;
|
|
|
|
sin6->sin6_scope_id = zoneid;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2007-10-24 10:37:20 +04:00
|
|
|
int
|
|
|
|
in6_setzoneid(struct in6_addr *in6, uint32_t zoneid)
|
|
|
|
{
|
|
|
|
if (IN6_IS_SCOPE_EMBEDDABLE(in6))
|
|
|
|
in6->s6_addr16[1] = htons(zoneid & 0xffff); /* XXX */
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
/*
|
|
|
|
* Determine the appropriate scope zone ID for in6 and ifp. If ret_id is
|
|
|
|
* non NULL, it is set to the zone ID. If the zone ID needs to be embedded
|
|
|
|
* in the in6_addr structure, in6 will be modified.
|
|
|
|
*/
|
|
|
|
int
|
2007-10-24 10:37:20 +04:00
|
|
|
in6_setscope(struct in6_addr *in6, const struct ifnet *ifp, uint32_t *ret_id)
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
{
|
|
|
|
int scope;
|
|
|
|
uint32_t zoneid = 0;
|
2007-10-24 10:37:20 +04:00
|
|
|
const struct scope6_id *sid = SID(ifp);
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
|
|
|
|
#ifdef DIAGNOSTIC
|
|
|
|
if (sid == NULL) { /* should not happen */
|
|
|
|
panic("in6_setscope: scope array is NULL");
|
|
|
|
/* NOTREACHED */
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* special case: the loopback address can only belong to a loopback
|
|
|
|
* interface.
|
|
|
|
*/
|
|
|
|
if (IN6_IS_ADDR_LOOPBACK(in6)) {
|
|
|
|
if (!(ifp->if_flags & IFF_LOOPBACK))
|
|
|
|
return (EINVAL);
|
|
|
|
else {
|
|
|
|
if (ret_id != NULL)
|
|
|
|
*ret_id = 0; /* there's no ambiguity */
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
scope = in6_addrscope(in6);
|
|
|
|
|
|
|
|
if (!sid->s6id_list)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
switch (scope) {
|
|
|
|
case IPV6_ADDR_SCOPE_INTFACELOCAL: /* should be interface index */
|
|
|
|
zoneid = sid->s6id_list[IPV6_ADDR_SCOPE_INTFACELOCAL];
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPV6_ADDR_SCOPE_LINKLOCAL:
|
|
|
|
zoneid = sid->s6id_list[IPV6_ADDR_SCOPE_LINKLOCAL];
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPV6_ADDR_SCOPE_SITELOCAL:
|
|
|
|
zoneid = sid->s6id_list[IPV6_ADDR_SCOPE_SITELOCAL];
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPV6_ADDR_SCOPE_ORGLOCAL:
|
|
|
|
zoneid = sid->s6id_list[IPV6_ADDR_SCOPE_ORGLOCAL];
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
zoneid = 0; /* XXX: treat as global. */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ret_id != NULL)
|
|
|
|
*ret_id = zoneid;
|
|
|
|
|
2007-10-24 10:37:20 +04:00
|
|
|
return in6_setzoneid(in6, zoneid);
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Just clear the embedded scope identifier. Return 0 if the original address
|
|
|
|
* is intact; return non 0 if the address is modified.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
in6_clearscope(struct in6_addr *in6)
|
|
|
|
{
|
|
|
|
int modified = 0;
|
|
|
|
|
|
|
|
if (IN6_IS_SCOPE_LINKLOCAL(in6) || IN6_IS_ADDR_MC_INTFACELOCAL(in6)) {
|
|
|
|
if (in6->s6_addr16[1] != 0)
|
|
|
|
modified = 1;
|
|
|
|
in6->s6_addr16[1] = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return (modified);
|
|
|
|
}
|