in.c revision 1.129 1 /* $NetBSD: in.c,v 1.129 2008/12/17 20:51:37 cegger Exp $ */
2
3 /*
4 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the project nor the names of its contributors
16 * may be used to endorse or promote products derived from this software
17 * without specific prior written permission.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32 /*-
33 * Copyright (c) 1998 The NetBSD Foundation, Inc.
34 * All rights reserved.
35 *
36 * This code is derived from software contributed to The NetBSD Foundation
37 * by Public Access Networks Corporation ("Panix"). It was developed under
38 * contract to Panix by Eric Haszlakiewicz and Thor Lancelot Simon.
39 *
40 * Redistribution and use in source and binary forms, with or without
41 * modification, are permitted provided that the following conditions
42 * are met:
43 * 1. Redistributions of source code must retain the above copyright
44 * notice, this list of conditions and the following disclaimer.
45 * 2. Redistributions in binary form must reproduce the above copyright
46 * notice, this list of conditions and the following disclaimer in the
47 * documentation and/or other materials provided with the distribution.
48 *
49 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
50 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
51 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
52 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
53 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
54 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
55 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
56 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
57 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
58 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
59 * POSSIBILITY OF SUCH DAMAGE.
60 */
61
62 /*
63 * Copyright (c) 1982, 1986, 1991, 1993
64 * The Regents of the University of California. All rights reserved.
65 *
66 * Redistribution and use in source and binary forms, with or without
67 * modification, are permitted provided that the following conditions
68 * are met:
69 * 1. Redistributions of source code must retain the above copyright
70 * notice, this list of conditions and the following disclaimer.
71 * 2. Redistributions in binary form must reproduce the above copyright
72 * notice, this list of conditions and the following disclaimer in the
73 * documentation and/or other materials provided with the distribution.
74 * 3. Neither the name of the University nor the names of its contributors
75 * may be used to endorse or promote products derived from this software
76 * without specific prior written permission.
77 *
78 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
79 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
80 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
81 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
82 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
83 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
84 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
85 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
86 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
87 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
88 * SUCH DAMAGE.
89 *
90 * @(#)in.c 8.4 (Berkeley) 1/9/95
91 */
92
93 #include <sys/cdefs.h>
94 __KERNEL_RCSID(0, "$NetBSD: in.c,v 1.129 2008/12/17 20:51:37 cegger Exp $");
95
96 #include "opt_inet.h"
97 #include "opt_inet_conf.h"
98 #include "opt_mrouting.h"
99 #include "opt_pfil_hooks.h"
100
101 #include <sys/param.h>
102 #include <sys/ioctl.h>
103 #include <sys/errno.h>
104 #include <sys/malloc.h>
105 #include <sys/socket.h>
106 #include <sys/socketvar.h>
107 #include <sys/sysctl.h>
108 #include <sys/systm.h>
109 #include <sys/proc.h>
110 #include <sys/syslog.h>
111 #include <sys/kauth.h>
112
113 #include <net/if.h>
114 #include <net/route.h>
115
116 #include <net/if_ether.h>
117
118 #include <netinet/in_systm.h>
119 #include <netinet/in.h>
120 #include <netinet/in_var.h>
121 #include <netinet/ip.h>
122 #include <netinet/ip_var.h>
123 #include <netinet/in_ifattach.h>
124 #include <netinet/in_pcb.h>
125 #include <netinet/if_inarp.h>
126 #include <netinet/ip_mroute.h>
127 #include <netinet/igmp_var.h>
128
129 #ifdef IPSELSRC
130 #include <netinet/in_selsrc.h>
131 #endif
132
133 #ifdef PFIL_HOOKS
134 #include <net/pfil.h>
135 #endif
136
137 static u_int in_mask2len(struct in_addr *);
138 static void in_len2mask(struct in_addr *, u_int);
139 static int in_lifaddr_ioctl(struct socket *, u_long, void *,
140 struct ifnet *, struct lwp *);
141
142 static int in_ifaddrpref_ioctl(struct socket *, u_long, void *,
143 struct ifnet *);
144 static int in_addprefix(struct in_ifaddr *, int);
145 static int in_scrubprefix(struct in_ifaddr *);
146
147 #ifndef SUBNETSARELOCAL
148 #define SUBNETSARELOCAL 1
149 #endif
150
151 #ifndef HOSTZEROBROADCAST
152 #define HOSTZEROBROADCAST 1
153 #endif
154
155 int subnetsarelocal = SUBNETSARELOCAL;
156 int hostzeroisbroadcast = HOSTZEROBROADCAST;
157
158 /*
159 * This list is used to keep track of in_multi chains which belong to
160 * deleted interface addresses. We use in_ifaddr so that a chain head
161 * won't be deallocated until all multicast address record are deleted.
162 */
163 static TAILQ_HEAD(, in_ifaddr) in_mk = TAILQ_HEAD_INITIALIZER(in_mk);
164
165 /*
166 * Return 1 if an internet address is for a ``local'' host
167 * (one to which we have a connection). If subnetsarelocal
168 * is true, this includes other subnets of the local net.
169 * Otherwise, it includes only the directly-connected (sub)nets.
170 */
171 int
172 in_localaddr(struct in_addr in)
173 {
174 struct in_ifaddr *ia;
175
176 if (subnetsarelocal) {
177 TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list)
178 if ((in.s_addr & ia->ia_netmask) == ia->ia_net)
179 return (1);
180 } else {
181 TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list)
182 if ((in.s_addr & ia->ia_subnetmask) == ia->ia_subnet)
183 return (1);
184 }
185 return (0);
186 }
187
188 /*
189 * Determine whether an IP address is in a reserved set of addresses
190 * that may not be forwarded, or whether datagrams to that destination
191 * may be forwarded.
192 */
193 int
194 in_canforward(struct in_addr in)
195 {
196 u_int32_t net;
197
198 if (IN_EXPERIMENTAL(in.s_addr) || IN_MULTICAST(in.s_addr))
199 return (0);
200 if (IN_CLASSA(in.s_addr)) {
201 net = in.s_addr & IN_CLASSA_NET;
202 if (net == 0 || net == htonl(IN_LOOPBACKNET << IN_CLASSA_NSHIFT))
203 return (0);
204 }
205 return (1);
206 }
207
208 /*
209 * Trim a mask in a sockaddr
210 */
211 void
212 in_socktrim(struct sockaddr_in *ap)
213 {
214 char *cplim = (char *) &ap->sin_addr;
215 char *cp = (char *) (&ap->sin_addr + 1);
216
217 ap->sin_len = 0;
218 while (--cp >= cplim)
219 if (*cp) {
220 (ap)->sin_len = cp - (char *) (ap) + 1;
221 break;
222 }
223 }
224
225 /*
226 * Routine to take an Internet address and convert into a
227 * "dotted quad" representation for printing.
228 */
229 const char *
230 in_fmtaddr(struct in_addr addr)
231 {
232 static char buf[sizeof("123.456.789.123")];
233
234 addr.s_addr = ntohl(addr.s_addr);
235
236 snprintf(buf, sizeof(buf), "%d.%d.%d.%d",
237 (addr.s_addr >> 24) & 0xFF,
238 (addr.s_addr >> 16) & 0xFF,
239 (addr.s_addr >> 8) & 0xFF,
240 (addr.s_addr >> 0) & 0xFF);
241 return buf;
242 }
243
244 /*
245 * Maintain the "in_maxmtu" variable, which is the largest
246 * mtu for non-local interfaces with AF_INET addresses assigned
247 * to them that are up.
248 */
249 unsigned long in_maxmtu;
250
251 void
252 in_setmaxmtu(void)
253 {
254 struct in_ifaddr *ia;
255 struct ifnet *ifp;
256 unsigned long maxmtu = 0;
257
258 TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list) {
259 if ((ifp = ia->ia_ifp) == 0)
260 continue;
261 if ((ifp->if_flags & (IFF_UP|IFF_LOOPBACK)) != IFF_UP)
262 continue;
263 if (ifp->if_mtu > maxmtu)
264 maxmtu = ifp->if_mtu;
265 }
266 if (maxmtu)
267 in_maxmtu = maxmtu;
268 }
269
270 static u_int
271 in_mask2len(struct in_addr *mask)
272 {
273 u_int x, y;
274 u_char *p;
275
276 p = (u_char *)mask;
277 for (x = 0; x < sizeof(*mask); x++) {
278 if (p[x] != 0xff)
279 break;
280 }
281 y = 0;
282 if (x < sizeof(*mask)) {
283 for (y = 0; y < NBBY; y++) {
284 if ((p[x] & (0x80 >> y)) == 0)
285 break;
286 }
287 }
288 return x * NBBY + y;
289 }
290
291 static void
292 in_len2mask(struct in_addr *mask, u_int len)
293 {
294 u_int i;
295 u_char *p;
296
297 p = (u_char *)mask;
298 bzero(mask, sizeof(*mask));
299 for (i = 0; i < len / NBBY; i++)
300 p[i] = 0xff;
301 if (len % NBBY)
302 p[i] = (0xff00 >> (len % NBBY)) & 0xff;
303 }
304
305 /*
306 * Generic internet control operations (ioctl's).
307 * Ifp is 0 if not an interface-specific ioctl.
308 */
309 /* ARGSUSED */
310 int
311 in_control(struct socket *so, u_long cmd, void *data, struct ifnet *ifp,
312 struct lwp *l)
313 {
314 struct ifreq *ifr = (struct ifreq *)data;
315 struct in_ifaddr *ia = 0;
316 struct in_aliasreq *ifra = (struct in_aliasreq *)data;
317 struct sockaddr_in oldaddr;
318 int error, hostIsNew, maskIsNew;
319 int newifaddr = 0;
320
321 switch (cmd) {
322 case SIOCALIFADDR:
323 case SIOCDLIFADDR:
324 case SIOCSIFADDRPREF:
325 if (l == NULL)
326 return (EPERM);
327 if (kauth_authorize_network(l->l_cred, KAUTH_NETWORK_INTERFACE,
328 KAUTH_REQ_NETWORK_INTERFACE_SETPRIV, ifp, (void *)cmd,
329 NULL) != 0)
330 return (EPERM);
331 /*FALLTHROUGH*/
332 case SIOCGIFADDRPREF:
333 case SIOCGLIFADDR:
334 if (ifp == NULL)
335 return EINVAL;
336 if (cmd == SIOCGIFADDRPREF || cmd == SIOCSIFADDRPREF)
337 return in_ifaddrpref_ioctl(so, cmd, data, ifp);
338 else
339 return in_lifaddr_ioctl(so, cmd, data, ifp, l);
340 }
341
342 /*
343 * Find address for this interface, if it exists.
344 */
345 if (ifp != NULL)
346 IFP_TO_IA(ifp, ia);
347
348 switch (cmd) {
349
350 case SIOCAIFADDR:
351 case SIOCDIFADDR:
352 case SIOCGIFALIAS:
353 if (ifra->ifra_addr.sin_family == AF_INET)
354 LIST_FOREACH(ia,
355 &IN_IFADDR_HASH(ifra->ifra_addr.sin_addr.s_addr),
356 ia_hash) {
357 if (ia->ia_ifp == ifp &&
358 in_hosteq(ia->ia_addr.sin_addr,
359 ifra->ifra_addr.sin_addr))
360 break;
361 }
362 if ((cmd == SIOCDIFADDR || cmd == SIOCGIFALIAS) && ia == NULL)
363 return (EADDRNOTAVAIL);
364
365 #if 1 /*def COMPAT_43*/
366 if (cmd == SIOCDIFADDR &&
367 ifra->ifra_addr.sin_family == AF_UNSPEC) {
368 ifra->ifra_addr.sin_family = AF_INET;
369 }
370 #endif
371 /* FALLTHROUGH */
372 case SIOCSIFADDR:
373 case SIOCSIFDSTADDR:
374 if (ifra->ifra_addr.sin_family != AF_INET)
375 return (EAFNOSUPPORT);
376 /* FALLTHROUGH */
377 case SIOCSIFNETMASK:
378 if (ifp == NULL)
379 panic("in_control");
380
381 if (cmd == SIOCGIFALIAS)
382 break;
383
384 if (ia == NULL &&
385 (cmd == SIOCSIFNETMASK || cmd == SIOCSIFDSTADDR))
386 return (EADDRNOTAVAIL);
387
388 if (l == NULL)
389 return (EPERM);
390 if (kauth_authorize_network(l->l_cred, KAUTH_NETWORK_INTERFACE,
391 KAUTH_REQ_NETWORK_INTERFACE_SETPRIV, ifp, (void *)cmd,
392 NULL) != 0)
393 return (EPERM);
394
395 if (ia == 0) {
396 ia = malloc(sizeof(*ia), M_IFADDR, M_WAITOK|M_ZERO);
397 if (ia == 0)
398 return (ENOBUFS);
399 TAILQ_INSERT_TAIL(&in_ifaddrhead, ia, ia_list);
400 IFAREF(&ia->ia_ifa);
401 ifa_insert(ifp, &ia->ia_ifa);
402 ia->ia_ifa.ifa_addr = sintosa(&ia->ia_addr);
403 ia->ia_ifa.ifa_dstaddr = sintosa(&ia->ia_dstaddr);
404 ia->ia_ifa.ifa_netmask = sintosa(&ia->ia_sockmask);
405 #ifdef IPSELSRC
406 ia->ia_ifa.ifa_getifa = in_getifa;
407 #else /* IPSELSRC */
408 ia->ia_ifa.ifa_getifa = NULL;
409 #endif /* IPSELSRC */
410 ia->ia_sockmask.sin_len = 8;
411 if (ifp->if_flags & IFF_BROADCAST) {
412 ia->ia_broadaddr.sin_len = sizeof(ia->ia_addr);
413 ia->ia_broadaddr.sin_family = AF_INET;
414 }
415 ia->ia_ifp = ifp;
416 ia->ia_idsalt = arc4random() % 65535;
417 LIST_INIT(&ia->ia_multiaddrs);
418 newifaddr = 1;
419 }
420 break;
421
422 case SIOCSIFBRDADDR:
423 if (l == NULL)
424 return (EPERM);
425 if (kauth_authorize_network(l->l_cred, KAUTH_NETWORK_INTERFACE,
426 KAUTH_REQ_NETWORK_INTERFACE_SETPRIV, ifp, (void *)cmd,
427 NULL) != 0)
428 return (EPERM);
429 /* FALLTHROUGH */
430
431 case SIOCGIFADDR:
432 case SIOCGIFNETMASK:
433 case SIOCGIFDSTADDR:
434 case SIOCGIFBRDADDR:
435 if (ia == 0)
436 return (EADDRNOTAVAIL);
437 break;
438 }
439 error = 0;
440 switch (cmd) {
441
442 case SIOCGIFADDR:
443 ifreq_setaddr(cmd, ifr, sintocsa(&ia->ia_addr));
444 break;
445
446 case SIOCGIFBRDADDR:
447 if ((ifp->if_flags & IFF_BROADCAST) == 0)
448 return (EINVAL);
449 ifreq_setdstaddr(cmd, ifr, sintocsa(&ia->ia_broadaddr));
450 break;
451
452 case SIOCGIFDSTADDR:
453 if ((ifp->if_flags & IFF_POINTOPOINT) == 0)
454 return (EINVAL);
455 ifreq_setdstaddr(cmd, ifr, sintocsa(&ia->ia_dstaddr));
456 break;
457
458 case SIOCGIFNETMASK:
459 ifreq_setaddr(cmd, ifr, sintocsa(&ia->ia_sockmask));
460 break;
461
462 case SIOCSIFDSTADDR:
463 if ((ifp->if_flags & IFF_POINTOPOINT) == 0)
464 return (EINVAL);
465 oldaddr = ia->ia_dstaddr;
466 ia->ia_dstaddr = *satocsin(ifreq_getdstaddr(cmd, ifr));
467 if ((error = (*ifp->if_ioctl)(ifp, SIOCSIFDSTADDR, ia)) != 0) {
468 ia->ia_dstaddr = oldaddr;
469 return error;
470 }
471 if (ia->ia_flags & IFA_ROUTE) {
472 ia->ia_ifa.ifa_dstaddr = sintosa(&oldaddr);
473 rtinit(&ia->ia_ifa, RTM_DELETE, RTF_HOST);
474 ia->ia_ifa.ifa_dstaddr = sintosa(&ia->ia_dstaddr);
475 rtinit(&ia->ia_ifa, RTM_ADD, RTF_HOST|RTF_UP);
476 }
477 break;
478
479 case SIOCSIFBRDADDR:
480 if ((ifp->if_flags & IFF_BROADCAST) == 0)
481 return EINVAL;
482 ia->ia_broadaddr = *satocsin(ifreq_getbroadaddr(cmd, ifr));
483 break;
484
485 case SIOCSIFADDR:
486 error = in_ifinit(ifp, ia, satocsin(ifreq_getaddr(cmd, ifr)),
487 1);
488 #ifdef PFIL_HOOKS
489 if (error == 0)
490 (void)pfil_run_hooks(&if_pfil,
491 (struct mbuf **)SIOCSIFADDR, ifp, PFIL_IFADDR);
492 #endif
493 break;
494
495 case SIOCSIFNETMASK:
496 in_ifscrub(ifp, ia);
497 ia->ia_sockmask = *satocsin(ifreq_getaddr(cmd, ifr));
498 ia->ia_subnetmask = ia->ia_sockmask.sin_addr.s_addr;
499 error = in_ifinit(ifp, ia, NULL, 0);
500 break;
501
502 case SIOCAIFADDR:
503 maskIsNew = 0;
504 hostIsNew = 1;
505 if (ia->ia_addr.sin_family != AF_INET)
506 ;
507 else if (ifra->ifra_addr.sin_len == 0) {
508 ifra->ifra_addr = ia->ia_addr;
509 hostIsNew = 0;
510 } else if (in_hosteq(ia->ia_addr.sin_addr,
511 ifra->ifra_addr.sin_addr))
512 hostIsNew = 0;
513 if (ifra->ifra_mask.sin_len) {
514 in_ifscrub(ifp, ia);
515 ia->ia_sockmask = ifra->ifra_mask;
516 ia->ia_subnetmask = ia->ia_sockmask.sin_addr.s_addr;
517 maskIsNew = 1;
518 }
519 if ((ifp->if_flags & IFF_POINTOPOINT) &&
520 (ifra->ifra_dstaddr.sin_family == AF_INET)) {
521 in_ifscrub(ifp, ia);
522 ia->ia_dstaddr = ifra->ifra_dstaddr;
523 maskIsNew = 1; /* We lie; but the effect's the same */
524 }
525 if (ifra->ifra_addr.sin_family == AF_INET &&
526 (hostIsNew || maskIsNew)) {
527 error = in_ifinit(ifp, ia, &ifra->ifra_addr, 0);
528 }
529 if ((ifp->if_flags & IFF_BROADCAST) &&
530 (ifra->ifra_broadaddr.sin_family == AF_INET))
531 ia->ia_broadaddr = ifra->ifra_broadaddr;
532 #ifdef PFIL_HOOKS
533 if (error == 0)
534 (void)pfil_run_hooks(&if_pfil,
535 (struct mbuf **)SIOCAIFADDR, ifp, PFIL_IFADDR);
536 #endif
537 break;
538
539 case SIOCGIFALIAS:
540 ifra->ifra_mask = ia->ia_sockmask;
541 if ((ifp->if_flags & IFF_POINTOPOINT) &&
542 (ia->ia_dstaddr.sin_family == AF_INET))
543 ifra->ifra_dstaddr = ia->ia_dstaddr;
544 else if ((ifp->if_flags & IFF_BROADCAST) &&
545 (ia->ia_broadaddr.sin_family == AF_INET))
546 ifra->ifra_broadaddr = ia->ia_broadaddr;
547 else
548 memset(&ifra->ifra_broadaddr, 0,
549 sizeof(ifra->ifra_broadaddr));
550 break;
551
552 case SIOCDIFADDR:
553 in_purgeaddr(&ia->ia_ifa);
554 #ifdef PFIL_HOOKS
555 (void)pfil_run_hooks(&if_pfil, (struct mbuf **)SIOCDIFADDR,
556 ifp, PFIL_IFADDR);
557 #endif
558 break;
559
560 #ifdef MROUTING
561 case SIOCGETVIFCNT:
562 case SIOCGETSGCNT:
563 error = mrt_ioctl(so, cmd, data);
564 break;
565 #endif /* MROUTING */
566
567 default:
568 return ENOTTY;
569 }
570
571 if (error != 0 && newifaddr) {
572 KASSERT(ia != NULL);
573 in_purgeaddr(&ia->ia_ifa);
574 }
575
576 return error;
577 }
578
579 void
580 in_purgeaddr(struct ifaddr *ifa)
581 {
582 struct ifnet *ifp = ifa->ifa_ifp;
583 struct in_ifaddr *ia = (void *) ifa;
584
585 in_ifscrub(ifp, ia);
586 LIST_REMOVE(ia, ia_hash);
587 ifa_remove(ifp, &ia->ia_ifa);
588 TAILQ_REMOVE(&in_ifaddrhead, ia, ia_list);
589 if (ia->ia_allhosts != NULL)
590 in_delmulti(ia->ia_allhosts);
591 IFAFREE(&ia->ia_ifa);
592 in_setmaxmtu();
593 }
594
595 void
596 in_purgeif(struct ifnet *ifp) /* MUST be called at splsoftnet() */
597 {
598 if_purgeaddrs(ifp, AF_INET, in_purgeaddr);
599 igmp_purgeif(ifp); /* manipulates pools */
600 #ifdef MROUTING
601 ip_mrouter_detach(ifp);
602 #endif
603 }
604
605 /*
606 * SIOC[GAD]LIFADDR.
607 * SIOCGLIFADDR: get first address. (???)
608 * SIOCGLIFADDR with IFLR_PREFIX:
609 * get first address that matches the specified prefix.
610 * SIOCALIFADDR: add the specified address.
611 * SIOCALIFADDR with IFLR_PREFIX:
612 * EINVAL since we can't deduce hostid part of the address.
613 * SIOCDLIFADDR: delete the specified address.
614 * SIOCDLIFADDR with IFLR_PREFIX:
615 * delete the first address that matches the specified prefix.
616 * return values:
617 * EINVAL on invalid parameters
618 * EADDRNOTAVAIL on prefix match failed/specified address not found
619 * other values may be returned from in_ioctl()
620 */
621 static int
622 in_lifaddr_ioctl(struct socket *so, u_long cmd, void *data,
623 struct ifnet *ifp, struct lwp *l)
624 {
625 struct if_laddrreq *iflr = (struct if_laddrreq *)data;
626 struct ifaddr *ifa;
627 struct sockaddr *sa;
628
629 /* sanity checks */
630 if (data == NULL || ifp == NULL) {
631 panic("invalid argument to in_lifaddr_ioctl");
632 /*NOTRECHED*/
633 }
634
635 switch (cmd) {
636 case SIOCGLIFADDR:
637 /* address must be specified on GET with IFLR_PREFIX */
638 if ((iflr->flags & IFLR_PREFIX) == 0)
639 break;
640 /*FALLTHROUGH*/
641 case SIOCALIFADDR:
642 case SIOCDLIFADDR:
643 /* address must be specified on ADD and DELETE */
644 sa = (struct sockaddr *)&iflr->addr;
645 if (sa->sa_family != AF_INET)
646 return EINVAL;
647 if (sa->sa_len != sizeof(struct sockaddr_in))
648 return EINVAL;
649 /* XXX need improvement */
650 sa = (struct sockaddr *)&iflr->dstaddr;
651 if (sa->sa_family != AF_UNSPEC && sa->sa_family != AF_INET)
652 return EINVAL;
653 if (sa->sa_len != 0 && sa->sa_len != sizeof(struct sockaddr_in))
654 return EINVAL;
655 break;
656 default: /*shouldn't happen*/
657 #if 0
658 panic("invalid cmd to in_lifaddr_ioctl");
659 /*NOTREACHED*/
660 #else
661 return EOPNOTSUPP;
662 #endif
663 }
664 if (sizeof(struct in_addr) * NBBY < iflr->prefixlen)
665 return EINVAL;
666
667 switch (cmd) {
668 case SIOCALIFADDR:
669 {
670 struct in_aliasreq ifra;
671
672 if (iflr->flags & IFLR_PREFIX)
673 return EINVAL;
674
675 /* copy args to in_aliasreq, perform ioctl(SIOCAIFADDR). */
676 bzero(&ifra, sizeof(ifra));
677 bcopy(iflr->iflr_name, ifra.ifra_name,
678 sizeof(ifra.ifra_name));
679
680 bcopy(&iflr->addr, &ifra.ifra_addr,
681 ((struct sockaddr *)&iflr->addr)->sa_len);
682
683 if (((struct sockaddr *)&iflr->dstaddr)->sa_family) { /*XXX*/
684 bcopy(&iflr->dstaddr, &ifra.ifra_dstaddr,
685 ((struct sockaddr *)&iflr->dstaddr)->sa_len);
686 }
687
688 ifra.ifra_mask.sin_family = AF_INET;
689 ifra.ifra_mask.sin_len = sizeof(struct sockaddr_in);
690 in_len2mask(&ifra.ifra_mask.sin_addr, iflr->prefixlen);
691
692 return in_control(so, SIOCAIFADDR, (void *)&ifra, ifp, l);
693 }
694 case SIOCGLIFADDR:
695 case SIOCDLIFADDR:
696 {
697 struct in_ifaddr *ia;
698 struct in_addr mask, candidate, match;
699 struct sockaddr_in *sin;
700 int cmp;
701
702 bzero(&mask, sizeof(mask));
703 bzero(&match, sizeof(match)); /* XXX gcc */
704 if (iflr->flags & IFLR_PREFIX) {
705 /* lookup a prefix rather than address. */
706 in_len2mask(&mask, iflr->prefixlen);
707
708 sin = (struct sockaddr_in *)&iflr->addr;
709 match.s_addr = sin->sin_addr.s_addr;
710 match.s_addr &= mask.s_addr;
711
712 /* if you set extra bits, that's wrong */
713 if (match.s_addr != sin->sin_addr.s_addr)
714 return EINVAL;
715
716 cmp = 1;
717 } else {
718 if (cmd == SIOCGLIFADDR) {
719 /* on getting an address, take the 1st match */
720 cmp = 0; /*XXX*/
721 } else {
722 /* on deleting an address, do exact match */
723 in_len2mask(&mask, 32);
724 sin = (struct sockaddr_in *)&iflr->addr;
725 match.s_addr = sin->sin_addr.s_addr;
726
727 cmp = 1;
728 }
729 }
730
731 IFADDR_FOREACH(ifa, ifp) {
732 if (ifa->ifa_addr->sa_family != AF_INET)
733 continue;
734 if (cmp == 0)
735 break;
736 candidate.s_addr = ((struct sockaddr_in *)&ifa->ifa_addr)->sin_addr.s_addr;
737 candidate.s_addr &= mask.s_addr;
738 if (candidate.s_addr == match.s_addr)
739 break;
740 }
741 if (ifa == NULL)
742 return EADDRNOTAVAIL;
743 ia = (struct in_ifaddr *)ifa;
744
745 if (cmd == SIOCGLIFADDR) {
746 /* fill in the if_laddrreq structure */
747 bcopy(&ia->ia_addr, &iflr->addr, ia->ia_addr.sin_len);
748
749 if ((ifp->if_flags & IFF_POINTOPOINT) != 0) {
750 bcopy(&ia->ia_dstaddr, &iflr->dstaddr,
751 ia->ia_dstaddr.sin_len);
752 } else
753 bzero(&iflr->dstaddr, sizeof(iflr->dstaddr));
754
755 iflr->prefixlen =
756 in_mask2len(&ia->ia_sockmask.sin_addr);
757
758 iflr->flags = 0; /*XXX*/
759
760 return 0;
761 } else {
762 struct in_aliasreq ifra;
763
764 /* fill in_aliasreq and do ioctl(SIOCDIFADDR) */
765 bzero(&ifra, sizeof(ifra));
766 bcopy(iflr->iflr_name, ifra.ifra_name,
767 sizeof(ifra.ifra_name));
768
769 bcopy(&ia->ia_addr, &ifra.ifra_addr,
770 ia->ia_addr.sin_len);
771 if ((ifp->if_flags & IFF_POINTOPOINT) != 0) {
772 bcopy(&ia->ia_dstaddr, &ifra.ifra_dstaddr,
773 ia->ia_dstaddr.sin_len);
774 }
775 bcopy(&ia->ia_sockmask, &ifra.ifra_dstaddr,
776 ia->ia_sockmask.sin_len);
777
778 return in_control(so, SIOCDIFADDR, (void *)&ifra,
779 ifp, l);
780 }
781 }
782 }
783
784 return EOPNOTSUPP; /*just for safety*/
785 }
786
787 static int
788 in_ifaddrpref_ioctl(struct socket *so, u_long cmd, void *data,
789 struct ifnet *ifp)
790 {
791 struct if_addrprefreq *ifap = (struct if_addrprefreq *)data;
792 struct ifaddr *ifa;
793 struct sockaddr *sa;
794 struct in_ifaddr *ia = NULL; /* appease gcc -Wuninitialized */
795 struct in_addr match;
796 struct sockaddr_in *sin;
797
798 /* sanity checks */
799 if (data == NULL || ifp == NULL) {
800 panic("invalid argument to %s", __func__);
801 /*NOTREACHED*/
802 }
803
804 /* address must be specified on ADD and DELETE */
805 sa = (struct sockaddr *)&ifap->ifap_addr;
806 if (sa->sa_family != AF_INET)
807 return EINVAL;
808 if (sa->sa_len != sizeof(struct sockaddr_in))
809 return EINVAL;
810
811 switch (cmd) {
812 case SIOCSIFADDRPREF:
813 case SIOCGIFADDRPREF:
814 break;
815 default:
816 return EOPNOTSUPP;
817 }
818
819 sin = (struct sockaddr_in *)&ifap->ifap_addr;
820 match.s_addr = sin->sin_addr.s_addr;
821
822 IFADDR_FOREACH(ifa, ifp) {
823 ia = (struct in_ifaddr *)ifa;
824 if (ia->ia_addr.sin_family != AF_INET)
825 continue;
826 if (ia->ia_addr.sin_addr.s_addr == match.s_addr)
827 break;
828 }
829 if (ifa == NULL)
830 return EADDRNOTAVAIL;
831
832 switch (cmd) {
833 case SIOCSIFADDRPREF:
834 ifa->ifa_preference = ifap->ifap_preference;
835 return 0;
836 case SIOCGIFADDRPREF:
837 /* fill in the if_laddrreq structure */
838 (void)memcpy(&ifap->ifap_addr, &ia->ia_addr,
839 ia->ia_addr.sin_len);
840 ifap->ifap_preference = ifa->ifa_preference;
841 return 0;
842 default:
843 return EOPNOTSUPP;
844 }
845 }
846
847 /*
848 * Delete any existing route for an interface.
849 */
850 void
851 in_ifscrub(struct ifnet *ifp, struct in_ifaddr *ia)
852 {
853
854 in_scrubprefix(ia);
855 }
856
857 /*
858 * Initialize an interface's internet address
859 * and routing table entry.
860 */
861 int
862 in_ifinit(struct ifnet *ifp, struct in_ifaddr *ia,
863 const struct sockaddr_in *sin, int scrub)
864 {
865 u_int32_t i;
866 struct sockaddr_in oldaddr;
867 int s = splnet(), flags = RTF_UP, error;
868
869 if (sin == NULL)
870 sin = &ia->ia_addr;
871
872 /*
873 * Set up new addresses.
874 */
875 oldaddr = ia->ia_addr;
876 if (ia->ia_addr.sin_family == AF_INET)
877 LIST_REMOVE(ia, ia_hash);
878 ia->ia_addr = *sin;
879 LIST_INSERT_HEAD(&IN_IFADDR_HASH(ia->ia_addr.sin_addr.s_addr), ia, ia_hash);
880
881 /*
882 * Give the interface a chance to initialize
883 * if this is its first address,
884 * and to validate the address if necessary.
885 */
886 if ((error = (*ifp->if_ioctl)(ifp, SIOCINITIFADDR, ia)) != 0)
887 goto bad;
888 splx(s);
889 if (scrub) {
890 ia->ia_ifa.ifa_addr = sintosa(&oldaddr);
891 in_ifscrub(ifp, ia);
892 ia->ia_ifa.ifa_addr = sintosa(&ia->ia_addr);
893 }
894
895 i = ia->ia_addr.sin_addr.s_addr;
896 if (IN_CLASSA(i))
897 ia->ia_netmask = IN_CLASSA_NET;
898 else if (IN_CLASSB(i))
899 ia->ia_netmask = IN_CLASSB_NET;
900 else
901 ia->ia_netmask = IN_CLASSC_NET;
902 /*
903 * The subnet mask usually includes at least the standard network part,
904 * but may may be smaller in the case of supernetting.
905 * If it is set, we believe it.
906 */
907 if (ia->ia_subnetmask == 0) {
908 ia->ia_subnetmask = ia->ia_netmask;
909 ia->ia_sockmask.sin_addr.s_addr = ia->ia_subnetmask;
910 } else
911 ia->ia_netmask &= ia->ia_subnetmask;
912
913 ia->ia_net = i & ia->ia_netmask;
914 ia->ia_subnet = i & ia->ia_subnetmask;
915 in_socktrim(&ia->ia_sockmask);
916 /* re-calculate the "in_maxmtu" value */
917 in_setmaxmtu();
918 /*
919 * Add route for the network.
920 */
921 ia->ia_ifa.ifa_metric = ifp->if_metric;
922 if (ifp->if_flags & IFF_BROADCAST) {
923 ia->ia_broadaddr.sin_addr.s_addr =
924 ia->ia_subnet | ~ia->ia_subnetmask;
925 ia->ia_netbroadcast.s_addr =
926 ia->ia_net | ~ia->ia_netmask;
927 } else if (ifp->if_flags & IFF_LOOPBACK) {
928 ia->ia_dstaddr = ia->ia_addr;
929 flags |= RTF_HOST;
930 } else if (ifp->if_flags & IFF_POINTOPOINT) {
931 if (ia->ia_dstaddr.sin_family != AF_INET)
932 return (0);
933 flags |= RTF_HOST;
934 }
935 error = in_addprefix(ia, flags);
936 /*
937 * If the interface supports multicast, join the "all hosts"
938 * multicast group on that interface.
939 */
940 if ((ifp->if_flags & IFF_MULTICAST) != 0 && ia->ia_allhosts == NULL) {
941 struct in_addr addr;
942
943 addr.s_addr = INADDR_ALLHOSTS_GROUP;
944 ia->ia_allhosts = in_addmulti(&addr, ifp);
945 }
946 return (error);
947 bad:
948 splx(s);
949 LIST_REMOVE(ia, ia_hash);
950 ia->ia_addr = oldaddr;
951 if (ia->ia_addr.sin_family == AF_INET)
952 LIST_INSERT_HEAD(&IN_IFADDR_HASH(ia->ia_addr.sin_addr.s_addr),
953 ia, ia_hash);
954 return (error);
955 }
956
957 #define rtinitflags(x) \
958 ((((x)->ia_ifp->if_flags & (IFF_LOOPBACK | IFF_POINTOPOINT)) != 0) \
959 ? RTF_HOST : 0)
960
961 /*
962 * add a route to prefix ("connected route" in cisco terminology).
963 * does nothing if there's some interface address with the same prefix already.
964 */
965 static int
966 in_addprefix(struct in_ifaddr *target, int flags)
967 {
968 struct in_ifaddr *ia;
969 struct in_addr prefix, mask, p;
970 int error;
971
972 if ((flags & RTF_HOST) != 0)
973 prefix = target->ia_dstaddr.sin_addr;
974 else {
975 prefix = target->ia_addr.sin_addr;
976 mask = target->ia_sockmask.sin_addr;
977 prefix.s_addr &= mask.s_addr;
978 }
979
980 TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list) {
981 if (rtinitflags(ia))
982 p = ia->ia_dstaddr.sin_addr;
983 else {
984 p = ia->ia_addr.sin_addr;
985 p.s_addr &= ia->ia_sockmask.sin_addr.s_addr;
986 }
987
988 if (prefix.s_addr != p.s_addr)
989 continue;
990
991 /*
992 * if we got a matching prefix route inserted by other
993 * interface address, we don't need to bother
994 *
995 * XXX RADIX_MPATH implications here? -dyoung
996 */
997 if (ia->ia_flags & IFA_ROUTE)
998 return 0;
999 }
1000
1001 /*
1002 * noone seem to have prefix route. insert it.
1003 */
1004 error = rtinit(&target->ia_ifa, RTM_ADD, flags);
1005 if (error == 0)
1006 target->ia_flags |= IFA_ROUTE;
1007 return error;
1008 }
1009
1010 /*
1011 * remove a route to prefix ("connected route" in cisco terminology).
1012 * re-installs the route by using another interface address, if there's one
1013 * with the same prefix (otherwise we lose the route mistakenly).
1014 */
1015 static int
1016 in_scrubprefix(struct in_ifaddr *target)
1017 {
1018 struct in_ifaddr *ia;
1019 struct in_addr prefix, mask, p;
1020 int error;
1021
1022 if ((target->ia_flags & IFA_ROUTE) == 0)
1023 return 0;
1024
1025 if (rtinitflags(target))
1026 prefix = target->ia_dstaddr.sin_addr;
1027 else {
1028 prefix = target->ia_addr.sin_addr;
1029 mask = target->ia_sockmask.sin_addr;
1030 prefix.s_addr &= mask.s_addr;
1031 }
1032
1033 TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list) {
1034 if (rtinitflags(ia))
1035 p = ia->ia_dstaddr.sin_addr;
1036 else {
1037 p = ia->ia_addr.sin_addr;
1038 p.s_addr &= ia->ia_sockmask.sin_addr.s_addr;
1039 }
1040
1041 if (prefix.s_addr != p.s_addr)
1042 continue;
1043
1044 /*
1045 * if we got a matching prefix route, move IFA_ROUTE to him
1046 */
1047 if ((ia->ia_flags & IFA_ROUTE) == 0) {
1048 rtinit(&target->ia_ifa, RTM_DELETE,
1049 rtinitflags(target));
1050 target->ia_flags &= ~IFA_ROUTE;
1051
1052 error = rtinit(&ia->ia_ifa, RTM_ADD,
1053 rtinitflags(ia) | RTF_UP);
1054 if (error == 0)
1055 ia->ia_flags |= IFA_ROUTE;
1056 return error;
1057 }
1058 }
1059
1060 /*
1061 * noone seem to have prefix route. remove it.
1062 */
1063 rtinit(&target->ia_ifa, RTM_DELETE, rtinitflags(target));
1064 target->ia_flags &= ~IFA_ROUTE;
1065 return 0;
1066 }
1067
1068 #undef rtinitflags
1069
1070 /*
1071 * Return 1 if the address might be a local broadcast address.
1072 */
1073 int
1074 in_broadcast(struct in_addr in, struct ifnet *ifp)
1075 {
1076 struct ifaddr *ifa;
1077
1078 if (in.s_addr == INADDR_BROADCAST ||
1079 in_nullhost(in))
1080 return 1;
1081 if ((ifp->if_flags & IFF_BROADCAST) == 0)
1082 return 0;
1083 /*
1084 * Look through the list of addresses for a match
1085 * with a broadcast address.
1086 */
1087 #define ia (ifatoia(ifa))
1088 IFADDR_FOREACH(ifa, ifp)
1089 if (ifa->ifa_addr->sa_family == AF_INET &&
1090 !in_hosteq(in, ia->ia_addr.sin_addr) &&
1091 (in_hosteq(in, ia->ia_broadaddr.sin_addr) ||
1092 in_hosteq(in, ia->ia_netbroadcast) ||
1093 (hostzeroisbroadcast &&
1094 /*
1095 * Check for old-style (host 0) broadcast.
1096 */
1097 (in.s_addr == ia->ia_subnet ||
1098 in.s_addr == ia->ia_net))))
1099 return 1;
1100 return (0);
1101 #undef ia
1102 }
1103
1104 /*
1105 * Add an address to the list of IP multicast addresses for a given interface.
1106 */
1107 struct in_multi *
1108 in_addmulti(struct in_addr *ap, struct ifnet *ifp)
1109 {
1110 struct sockaddr_in sin;
1111 struct in_multi *inm;
1112 struct ifreq ifr;
1113 int s = splsoftnet();
1114
1115 /*
1116 * See if address already in list.
1117 */
1118 IN_LOOKUP_MULTI(*ap, ifp, inm);
1119 if (inm != NULL) {
1120 /*
1121 * Found it; just increment the reference count.
1122 */
1123 ++inm->inm_refcount;
1124 } else {
1125 /*
1126 * New address; allocate a new multicast record
1127 * and link it into the interface's multicast list.
1128 */
1129 inm = pool_get(&inmulti_pool, PR_NOWAIT);
1130 if (inm == NULL) {
1131 splx(s);
1132 return (NULL);
1133 }
1134 inm->inm_addr = *ap;
1135 inm->inm_ifp = ifp;
1136 inm->inm_refcount = 1;
1137 LIST_INSERT_HEAD(
1138 &IN_MULTI_HASH(inm->inm_addr.s_addr, ifp),
1139 inm, inm_list);
1140 /*
1141 * Ask the network driver to update its multicast reception
1142 * filter appropriately for the new address.
1143 */
1144 sockaddr_in_init(&sin, ap, 0);
1145 ifreq_setaddr(SIOCADDMULTI, &ifr, sintosa(&sin));
1146 if ((*ifp->if_ioctl)(ifp, SIOCADDMULTI, &ifr) != 0) {
1147 LIST_REMOVE(inm, inm_list);
1148 pool_put(&inmulti_pool, inm);
1149 splx(s);
1150 return (NULL);
1151 }
1152 /*
1153 * Let IGMP know that we have joined a new IP multicast group.
1154 */
1155 if (igmp_joingroup(inm) != 0) {
1156 LIST_REMOVE(inm, inm_list);
1157 pool_put(&inmulti_pool, inm);
1158 splx(s);
1159 return (NULL);
1160 }
1161 in_multientries++;
1162 }
1163 splx(s);
1164 return (inm);
1165 }
1166
1167 /*
1168 * Delete a multicast address record.
1169 */
1170 void
1171 in_delmulti(struct in_multi *inm)
1172 {
1173 struct sockaddr_in sin;
1174 struct ifreq ifr;
1175 int s = splsoftnet();
1176
1177 if (--inm->inm_refcount == 0) {
1178 /*
1179 * No remaining claims to this record; let IGMP know that
1180 * we are leaving the multicast group.
1181 */
1182 igmp_leavegroup(inm);
1183 /*
1184 * Unlink from list.
1185 */
1186 LIST_REMOVE(inm, inm_list);
1187 in_multientries--;
1188 /*
1189 * Notify the network driver to update its multicast reception
1190 * filter.
1191 */
1192 sockaddr_in_init(&sin, &inm->inm_addr, 0);
1193 ifreq_setaddr(SIOCDELMULTI, &ifr, sintosa(&sin));
1194 (*inm->inm_ifp->if_ioctl)(inm->inm_ifp, SIOCDELMULTI, &ifr);
1195 pool_put(&inmulti_pool, inm);
1196 }
1197 splx(s);
1198 }
1199