2005-01-07 02:30:35 +00:00
/*-
2017-11-20 19:43:44 +00:00
* SPDX - License - Identifier : BSD - 3 - Clause
*
2000-07-04 16:35:15 +00:00
* Copyright ( C ) 1995 , 1996 , 1997 , and 1998 WIDE Project .
* All rights reserved .
*
* Redistribution and use in source and binary forms , with or without
* modification , are permitted provided that the following conditions
* are met :
* 1. Redistributions of source code must retain the above copyright
* notice , this list of conditions and the following disclaimer .
* 2. Redistributions in binary form must reproduce the above copyright
* notice , this list of conditions and the following disclaimer in the
* documentation and / or other materials provided with the distribution .
* 3. Neither the name of the project nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission .
*
* THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ` ` AS IS ' ' AND
* ANY EXPRESS OR IMPLIED WARRANTIES , INCLUDING , BUT NOT LIMITED TO , THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED . IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT , INDIRECT , INCIDENTAL , SPECIAL , EXEMPLARY , OR CONSEQUENTIAL
* DAMAGES ( INCLUDING , BUT NOT LIMITED TO , PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES ; LOSS OF USE , DATA , OR PROFITS ; OR BUSINESS INTERRUPTION )
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY , WHETHER IN CONTRACT , STRICT
* LIABILITY , OR TORT ( INCLUDING NEGLIGENCE OR OTHERWISE ) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE , EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE .
2007-12-10 16:03:40 +00:00
*
* $ KAME : in6_src . c , v 1.132 2003 / 08 / 26 04 : 42 : 27 keiichi Exp $
2000-07-04 16:35:15 +00:00
*/
2005-01-07 02:30:35 +00:00
/*-
2000-07-04 16:35:15 +00:00
* Copyright ( c ) 1982 , 1986 , 1991 , 1993
* The Regents of the University of California . All rights reserved .
*
* Redistribution and use in source and binary forms , with or without
* modification , are permitted provided that the following conditions
* are met :
* 1. Redistributions of source code must retain the above copyright
* notice , this list of conditions and the following disclaimer .
* 2. Redistributions in binary form must reproduce the above copyright
* notice , this list of conditions and the following disclaimer in the
* documentation and / or other materials provided with the distribution .
2017-02-28 23:42:47 +00:00
* 3. Neither the name of the University nor the names of its contributors
2000-07-04 16:35:15 +00:00
* may be used to endorse or promote products derived from this software
* without specific prior written permission .
*
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ` ` AS IS ' ' AND
* ANY EXPRESS OR IMPLIED WARRANTIES , INCLUDING , BUT NOT LIMITED TO , THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED . IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT , INDIRECT , INCIDENTAL , SPECIAL , EXEMPLARY , OR CONSEQUENTIAL
* DAMAGES ( INCLUDING , BUT NOT LIMITED TO , PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES ; LOSS OF USE , DATA , OR PROFITS ; OR BUSINESS INTERRUPTION )
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY , WHETHER IN CONTRACT , STRICT
* LIABILITY , OR TORT ( INCLUDING NEGLIGENCE OR OTHERWISE ) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE , EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE .
*
* @ ( # ) in_pcb . c 8.2 ( Berkeley ) 1 / 4 / 94
*/
2007-12-10 16:03:40 +00:00
# include <sys/cdefs.h>
__FBSDID ( " $FreeBSD$ " ) ;
2000-07-04 16:35:15 +00:00
# include "opt_inet.h"
# include "opt_inet6.h"
# include <sys/param.h>
# include <sys/systm.h>
2007-03-31 23:23:42 +00:00
# include <sys/lock.h>
2001-06-11 12:39:29 +00:00
# include <sys/malloc.h>
2000-07-04 16:35:15 +00:00
# include <sys/mbuf.h>
2006-11-06 13:42:10 +00:00
# include <sys/priv.h>
2000-07-04 16:35:15 +00:00
# include <sys/protosw.h>
# include <sys/socket.h>
# include <sys/socketvar.h>
2003-10-30 15:29:17 +00:00
# include <sys/sockio.h>
# include <sys/sysctl.h>
2000-07-04 16:35:15 +00:00
# include <sys/errno.h>
# include <sys/time.h>
MFp4:
Bring in updated jail support from bz_jail branch.
This enhances the current jail implementation to permit multiple
addresses per jail. In addtion to IPv4, IPv6 is supported as well.
Due to updated checks it is even possible to have jails without
an IP address at all, which basically gives one a chroot with
restricted process view, no networking,..
SCTP support was updated and supports IPv6 in jails as well.
Cpuset support permits jails to be bound to specific processor
sets after creation.
Jails can have an unrestricted (no duplicate protection, etc.) name
in addition to the hostname. The jail name cannot be changed from
within a jail and is considered to be used for management purposes
or as audit-token in the future.
DDB 'show jails' command was added to aid debugging.
Proper compat support permits 32bit jail binaries to be used on 64bit
systems to manage jails. Also backward compatibility was preserved where
possible: for jail v1 syscalls, as well as with user space management
utilities.
Both jail as well as prison version were updated for the new features.
A gap was intentionally left as the intermediate versions had been
used by various patches floating around the last years.
Bump __FreeBSD_version for the afore mentioned and in kernel changes.
Special thanks to:
- Pawel Jakub Dawidek (pjd) for his multi-IPv4 patches
and Olivier Houchard (cognet) for initial single-IPv6 patches.
- Jeff Roberson (jeff) and Randall Stewart (rrs) for their
help, ideas and review on cpuset and SCTP support.
- Robert Watson (rwatson) for lots and lots of help, discussions,
suggestions and review of most of the patch at various stages.
- John Baldwin (jhb) for his help.
- Simon L. Nielsen (simon) as early adopter testing changes
on cluster machines as well as all the testers and people
who provided feedback the last months on freebsd-jail and
other channels.
- My employer, CK Software GmbH, for the support so I could work on this.
Reviewed by: (see above)
MFC after: 3 months (this is just so that I get the mail)
X-MFC Before: 7.2-RELEASE if possible
2008-11-29 14:32:14 +00:00
# include <sys/jail.h>
2003-11-04 14:08:31 +00:00
# include <sys/kernel.h>
2015-07-29 08:12:05 +00:00
# include <sys/rmlock.h>
2005-08-17 16:46:55 +00:00
# include <sys/sx.h>
2000-07-04 16:35:15 +00:00
# include <net/if.h>
2013-10-26 17:58:36 +00:00
# include <net/if_var.h>
2009-09-05 16:43:16 +00:00
# include <net/if_dl.h>
2000-07-04 16:35:15 +00:00
# include <net/route.h>
2020-04-25 09:06:11 +00:00
# include <net/route/nhop.h>
This main goals of this project are:
1. separating L2 tables (ARP, NDP) from the L3 routing tables
2. removing as much locking dependencies among these layers as
possible to allow for some parallelism in the search operations
3. simplify the logic in the routing code,
The most notable end result is the obsolescent of the route
cloning (RTF_CLONING) concept, which translated into code reduction
in both IPv4 ARP and IPv6 NDP related modules, and size reduction in
struct rtentry{}. The change in design obsoletes the semantics of
RTF_CLONING, RTF_WASCLONE and RTF_LLINFO routing flags. The userland
applications such as "arp" and "ndp" have been modified to reflect
those changes. The output from "netstat -r" shows only the routing
entries.
Quite a few developers have contributed to this project in the
past: Glebius Smirnoff, Luigi Rizzo, Alessandro Cerri, and
Andre Oppermann. And most recently:
- Kip Macy revised the locking code completely, thus completing
the last piece of the puzzle, Kip has also been conducting
active functional testing
- Sam Leffler has helped me improving/refactoring the code, and
provided valuable reviews
- Julian Elischer setup the perforce tree for me and has helped
me maintaining that branch before the svn conversion
2008-12-15 06:10:57 +00:00
# include <net/if_llatbl.h>
2000-07-04 16:35:15 +00:00
# include <netinet/in.h>
# include <netinet/in_var.h>
# include <netinet/in_systm.h>
# include <netinet/ip.h>
# include <netinet/in_pcb.h>
2008-10-20 18:43:59 +00:00
# include <netinet/ip_var.h>
# include <netinet/udp.h>
# include <netinet/udp_var.h>
2008-12-02 21:37:28 +00:00
2000-07-04 16:35:15 +00:00
# include <netinet6/in6_var.h>
# include <netinet/ip6.h>
2015-12-09 11:14:27 +00:00
# include <netinet6/in6_fib.h>
2000-07-04 16:35:15 +00:00
# include <netinet6/in6_pcb.h>
# include <netinet6/ip6_var.h>
2005-07-25 12:31:43 +00:00
# include <netinet6/scope6_var.h>
2000-07-04 16:35:15 +00:00
# include <netinet6/nd6.h>
2003-10-30 15:29:17 +00:00
static struct mtx addrsel_lock ;
# define ADDRSEL_LOCK_INIT() mtx_init(&addrsel_lock, "addrsel_lock", NULL, MTX_DEF)
# define ADDRSEL_LOCK() mtx_lock(&addrsel_lock)
# define ADDRSEL_UNLOCK() mtx_unlock(&addrsel_lock)
# define ADDRSEL_LOCK_ASSERT() mtx_assert(&addrsel_lock, MA_OWNED)
2005-08-17 16:46:55 +00:00
static struct sx addrsel_sxlock ;
# define ADDRSEL_SXLOCK_INIT() sx_init(&addrsel_sxlock, "addrsel_sxlock")
# define ADDRSEL_SLOCK() sx_slock(&addrsel_sxlock)
# define ADDRSEL_SUNLOCK() sx_sunlock(&addrsel_sxlock)
# define ADDRSEL_XLOCK() sx_xlock(&addrsel_sxlock)
# define ADDRSEL_XUNLOCK() sx_xunlock(&addrsel_sxlock)
2003-10-30 15:29:17 +00:00
# define ADDR_LABEL_NOTAPP (-1)
2018-07-24 16:35:52 +00:00
VNET_DEFINE_STATIC ( struct in6_addrpolicy , defaultaddrpolicy ) ;
2009-07-16 21:13:04 +00:00
# define V_defaultaddrpolicy VNET(defaultaddrpolicy)
2003-11-04 20:22:33 +00:00
2010-04-29 11:52:42 +00:00
VNET_DEFINE ( int , ip6_prefer_tempaddr ) = 0 ;
2012-10-22 21:49:56 +00:00
static int selectroute ( struct sockaddr_in6 * , struct ip6_pktopts * ,
2005-07-25 12:31:43 +00:00
struct ip6_moptions * , struct route_in6 * , struct ifnet * * ,
2020-04-25 09:06:11 +00:00
struct nhop_object * * , int , u_int , uint32_t ) ;
2012-10-22 21:49:56 +00:00
static int in6_selectif ( struct sockaddr_in6 * , struct ip6_pktopts * ,
2016-01-03 10:43:23 +00:00
struct ip6_moptions * , struct ifnet * * ,
2012-10-22 21:49:56 +00:00
struct ifnet * , u_int ) ;
2016-01-10 13:40:29 +00:00
static int in6_selectsrc ( uint32_t , struct sockaddr_in6 * ,
struct ip6_pktopts * , struct inpcb * , struct ucred * ,
struct ifnet * * , struct in6_addr * ) ;
2003-11-04 20:22:33 +00:00
2008-01-08 19:08:58 +00:00
static struct in6_addrpolicy * lookup_addrsel_policy ( struct sockaddr_in6 * ) ;
2003-11-04 20:22:33 +00:00
2008-01-08 19:08:58 +00:00
static void init_policy_queue ( void ) ;
static int add_addrsel_policyent ( struct in6_addrpolicy * ) ;
static int delete_addrsel_policyent ( struct in6_addrpolicy * ) ;
2012-10-22 21:49:56 +00:00
static int walk_addrsel_policy ( int ( * ) ( struct in6_addrpolicy * , void * ) ,
2012-11-13 01:48:00 +00:00
void * ) ;
2008-01-08 19:08:58 +00:00
static int dump_addrsel_policyent ( struct in6_addrpolicy * , void * ) ;
static struct in6_addrpolicy * match_addrsel_policy ( struct sockaddr_in6 * ) ;
2003-10-30 15:29:17 +00:00
2000-07-04 16:35:15 +00:00
/*
2001-06-11 12:39:29 +00:00
* Return an IPv6 address , which is the most appropriate for a given
2000-07-04 16:35:15 +00:00
* destination and user specified options .
2001-06-11 12:39:29 +00:00
* If necessary , this function lookups the routing table and returns
2000-07-04 16:35:15 +00:00
* an entry to the caller for later use .
*/
2003-11-04 20:22:33 +00:00
# define REPLACE(r) do {\
2013-04-16 11:31:26 +00:00
IP6STAT_INC ( ip6s_sources_rule [ ( r ) ] ) ; \
2008-01-20 10:08:15 +00:00
/* { \
char ip6buf [ INET6_ADDRSTRLEN ] , ip6b [ INET6_ADDRSTRLEN ] ; \
printf ( " in6_selectsrc: replace %s with %s by %d \n " , ia_best ? ip6_sprintf ( ip6buf , & ia_best - > ia_addr . sin6_addr ) : " none " , ip6_sprintf ( ip6b , & ia - > ia_addr . sin6_addr ) , ( r ) ) ; \
} */ \
2003-11-04 20:22:33 +00:00
goto replace ; \
} while ( 0 )
# define NEXT(r) do {\
2008-01-20 10:08:15 +00:00
/* { \
char ip6buf [ INET6_ADDRSTRLEN ] , ip6b [ INET6_ADDRSTRLEN ] ; \
printf ( " in6_selectsrc: keep %s against %s by %d \n " , ia_best ? ip6_sprintf ( ip6buf , & ia_best - > ia_addr . sin6_addr ) : " none " , ip6_sprintf ( ip6b , & ia - > ia_addr . sin6_addr ) , ( r ) ) ; \
} */ \
2007-07-05 16:29:40 +00:00
goto next ; /* XXX: we can't use 'continue' here */ \
2003-11-04 20:22:33 +00:00
} while ( 0 )
# define BREAK(r) do { \
2013-04-16 11:31:26 +00:00
IP6STAT_INC ( ip6s_sources_rule [ ( r ) ] ) ; \
2007-07-05 16:29:40 +00:00
goto out ; /* XXX: we can't use 'break' here */ \
2003-11-04 20:22:33 +00:00
} while ( 0 )
2016-01-10 13:40:29 +00:00
static int
in6_selectsrc ( uint32_t fibnum , struct sockaddr_in6 * dstsock ,
struct ip6_pktopts * opts , struct inpcb * inp , struct ucred * cred ,
2009-06-23 22:08:55 +00:00
struct ifnet * * ifpp , struct in6_addr * srcp )
2000-07-04 16:35:15 +00:00
{
2015-07-29 08:12:05 +00:00
struct rm_priotracker in6_ifa_tracker ;
2010-04-27 15:05:03 +00:00
struct in6_addr dst , tmp ;
2012-02-14 11:51:32 +00:00
struct ifnet * ifp = NULL , * oifp = NULL ;
2003-11-04 20:22:33 +00:00
struct in6_ifaddr * ia = NULL , * ia_best = NULL ;
2000-07-04 16:35:15 +00:00
struct in6_pktinfo * pi = NULL ;
2003-11-04 20:22:33 +00:00
int dst_scope = - 1 , best_scope = - 1 , best_matchlen = - 1 ;
struct in6_addrpolicy * dst_policy = NULL , * best_policy = NULL ;
u_int32_t odstzone ;
int prefer_tempaddr ;
2017-12-25 04:48:39 +00:00
int error ;
2008-07-08 18:41:36 +00:00
struct ip6_moptions * mopts ;
2003-11-05 16:09:21 +00:00
2021-02-13 14:32:10 +00:00
NET_EPOCH_ASSERT ( ) ;
2009-06-23 22:08:55 +00:00
KASSERT ( srcp ! = NULL , ( " %s: srcp is NULL " , __func__ ) ) ;
2005-07-25 12:31:43 +00:00
dst = dstsock - > sin6_addr ; /* make a copy for local operation */
2012-02-14 11:51:32 +00:00
if ( ifpp ) {
/*
* Save a possibly passed in ifp for in6_selectsrc . Only
* neighbor discovery code should use this feature , where
* we may know the interface but not the FIB number holding
* the connected subnet in case someone deleted it from the
* default FIB and we need to check the interface .
*/
if ( * ifpp ! = NULL )
oifp = * ifpp ;
2005-07-25 12:31:43 +00:00
* ifpp = NULL ;
2012-02-14 11:51:32 +00:00
}
2000-07-04 16:35:15 +00:00
2008-07-09 16:33:21 +00:00
if ( inp ! = NULL ) {
INP_LOCK_ASSERT ( inp ) ;
2008-07-08 18:41:36 +00:00
mopts = inp - > in6p_moptions ;
2008-07-09 16:33:21 +00:00
} else {
2008-07-08 18:41:36 +00:00
mopts = NULL ;
2008-07-09 16:33:21 +00:00
}
2008-07-08 18:41:36 +00:00
2000-07-04 16:35:15 +00:00
/*
* If the source address is explicitly specified by the caller ,
2003-11-04 20:22:33 +00:00
* check if the requested source address is indeed a unicast address
* assigned to the node , and can be used as the packet ' s source
* address . If everything is okay , use the address as source .
2000-07-04 16:35:15 +00:00
*/
if ( opts & & ( pi = opts - > ip6po_pktinfo ) & &
2003-11-04 20:22:33 +00:00
! IN6_IS_ADDR_UNSPECIFIED ( & pi - > ipi6_addr ) ) {
/* get the outgoing interface */
2016-01-03 10:43:23 +00:00
if ( ( error = in6_selectif ( dstsock , opts , mopts , & ifp , oifp ,
2016-01-10 13:40:29 +00:00
fibnum ) )
2012-02-03 13:08:44 +00:00
! = 0 )
2009-06-23 22:08:55 +00:00
return ( error ) ;
2004-02-04 12:55:45 +00:00
2003-11-04 20:22:33 +00:00
/*
* determine the appropriate zone id of the source based on
* the zone of the destination and the outgoing interface .
2005-07-25 12:31:43 +00:00
* If the specified address is ambiguous wrt the scope zone ,
* the interface must be specified ; otherwise , ifa_ifwithaddr ( )
* will fail matching the address .
2003-11-04 20:22:33 +00:00
*/
2016-03-17 11:10:44 +00:00
tmp = pi - > ipi6_addr ;
2003-11-04 20:22:33 +00:00
if ( ifp ) {
2016-03-17 11:10:44 +00:00
error = in6_setscope ( & tmp , ifp , & odstzone ) ;
2009-06-23 22:08:55 +00:00
if ( error )
return ( error ) ;
2003-11-04 20:22:33 +00:00
}
2009-06-23 22:08:55 +00:00
if ( cred ! = NULL & & ( error = prison_local_ip6 ( cred ,
2016-03-17 11:10:44 +00:00
& tmp , ( inp - > inp_flags & IN6P_IPV6_V6ONLY ) ! = 0 ) ) ! = 0 )
2009-06-23 22:08:55 +00:00
return ( error ) ;
2005-07-25 12:31:43 +00:00
2016-03-17 10:59:30 +00:00
/*
* If IPV6_BINDANY socket option is set , we allow to specify
* non local addresses as source address in IPV6_PKTINFO
* ancillary data .
*/
if ( ( inp - > inp_flags & INP_BINDANY ) = = 0 ) {
2021-02-15 21:59:21 +00:00
ia = in6ifa_ifwithaddr ( & tmp , 0 /* XXX */ , false ) ;
2016-03-17 11:10:44 +00:00
if ( ia = = NULL | | ( ia - > ia6_flags & ( IN6_IFF_ANYCAST |
2021-02-15 21:59:21 +00:00
IN6_IFF_NOTREADY ) ) )
2016-03-17 10:59:30 +00:00
return ( EADDRNOTAVAIL ) ;
2016-03-17 11:10:44 +00:00
bcopy ( & ia - > ia_addr . sin6_addr , srcp , sizeof ( * srcp ) ) ;
2016-03-17 10:59:30 +00:00
} else
2016-03-17 11:10:44 +00:00
bcopy ( & tmp , srcp , sizeof ( * srcp ) ) ;
pi - > ipi6_addr = tmp ; /* XXX: this overrides pi */
2005-07-25 12:31:43 +00:00
if ( ifpp )
* ifpp = ifp ;
2009-06-23 22:08:55 +00:00
return ( 0 ) ;
2003-11-04 20:22:33 +00:00
}
2000-07-04 16:35:15 +00:00
/*
2003-11-04 20:22:33 +00:00
* Otherwise , if the socket has already bound the source , just use it .
2000-07-04 16:35:15 +00:00
*/
2008-07-08 18:41:36 +00:00
if ( inp ! = NULL & & ! IN6_IS_ADDR_UNSPECIFIED ( & inp - > in6p_laddr ) ) {
2009-02-05 14:06:09 +00:00
if ( cred ! = NULL & &
2009-06-23 22:08:55 +00:00
( error = prison_local_ip6 ( cred , & inp - > in6p_laddr ,
2009-02-05 14:06:09 +00:00
( ( inp - > inp_flags & IN6P_IPV6_V6ONLY ) ! = 0 ) ) ) ! = 0 )
2009-06-23 22:08:55 +00:00
return ( error ) ;
bcopy ( & inp - > in6p_laddr , srcp , sizeof ( * srcp ) ) ;
return ( 0 ) ;
2008-07-08 18:41:36 +00:00
}
2000-07-04 16:35:15 +00:00
2010-01-17 12:57:11 +00:00
/*
* Bypass source address selection and use the primary jail IP
* if requested .
*/
if ( cred ! = NULL & & ! prison_saddrsel_ip6 ( cred , srcp ) )
return ( 0 ) ;
2000-07-04 16:35:15 +00:00
/*
2003-11-04 20:22:33 +00:00
* If the address is not specified , choose the best one based on
* the outgoing interface and the destination address .
2000-07-04 16:35:15 +00:00
*/
2003-11-04 20:22:33 +00:00
/* get the outgoing interface */
2016-01-03 10:43:23 +00:00
if ( ( error = in6_selectif ( dstsock , opts , mopts , & ifp , oifp ,
Constrain IPv6 routes to single FIBs when net.add_addr_allfibs=0
sys/netinet6/icmp6.c
Use the interface's FIB for source address selection in ICMPv6 error
responses.
sys/netinet6/in6.c
In in6_newaddrmsg, announce arrival of local addresses on the
interface's FIB only. In in6_lltable_rtcheck, use a per-fib ND6
cache instead of a single cache.
sys/netinet6/in6_src.c
In in6_selectsrc, use the caller's fib instead of the default fib.
In in6_selectsrc_socket, remove a superfluous check.
sys/netinet6/nd6.c
In nd6_lle_event, use the interface's fib for routing socket
messages. In nd6_is_new_addr_neighbor, check all FIBs when trying
to determine whether an address is a neighbor. Also, simplify the
code for point to point interfaces.
sys/netinet6/nd6.h
sys/netinet6/nd6.c
sys/netinet6/nd6_rtr.c
Make defrouter_select fib-aware, and make all of its callers pass in
the interface fib.
sys/netinet6/nd6_nbr.c
When inputting a Neighbor Solicitation packet, consider the
interface fib instead of the default fib for DAD. Output NS and
Neighbor Advertisement packets on the correct fib.
sys/netinet6/nd6_rtr.c
Allow installing the same host route on different interfaces in
different FIBs. If rt_add_addr_allfibs=0, only install or delete
the prefix route on the interface fib.
tests/sys/netinet/fibs_test.sh
Clear some expected failures, but add a skip for the newly revealed
BUG217871.
PR: 196361
Submitted by: Erick Turnquist <jhujhiti@adjectivism.org>
Reported by: Jason Healy <jhealy@logn.net>
Reviewed by: asomers
MFC after: 3 weeks
Sponsored by: Spectra Logic Corp
Differential Revision: https://reviews.freebsd.org/D9451
2017-03-17 16:50:37 +00:00
( inp ! = NULL ) ? inp - > inp_inc . inc_fibnum : fibnum ) ) ! = 0 )
2009-06-23 22:08:55 +00:00
return ( error ) ;
2003-11-04 20:22:33 +00:00
# ifdef DIAGNOSTIC
if ( ifp = = NULL ) /* this should not happen */
panic ( " in6_selectsrc: NULL ifp " ) ;
# endif
2009-06-23 22:08:55 +00:00
error = in6_setscope ( & dst , ifp , & odstzone ) ;
if ( error )
return ( error ) ;
2005-07-25 12:31:43 +00:00
2015-07-29 08:12:05 +00:00
IN6_IFADDR_RLOCK ( & in6_ifa_tracker ) ;
2018-05-18 20:13:34 +00:00
CK_STAILQ_FOREACH ( ia , & V_in6_ifaddrhead , ia_link ) {
2003-11-04 20:22:33 +00:00
int new_scope = - 1 , new_matchlen = - 1 ;
struct in6_addrpolicy * new_policy = NULL ;
u_int32_t srczone , osrczone , dstzone ;
2005-07-25 12:31:43 +00:00
struct in6_addr src ;
2003-11-04 20:22:33 +00:00
struct ifnet * ifp1 = ia - > ia_ifp ;
/*
* We ' ll never take an address that breaks the scope zone
* of the destination . We also skip an address if its zone
* does not contain the outgoing interface .
* XXX : we should probably use sin6_scope_id here .
*/
2005-07-25 12:31:43 +00:00
if ( in6_setscope ( & dst , ifp1 , & dstzone ) | |
2003-11-04 20:22:33 +00:00
odstzone ! = dstzone ) {
continue ;
}
2005-07-25 12:31:43 +00:00
src = ia - > ia_addr . sin6_addr ;
if ( in6_setscope ( & src , ifp , & osrczone ) | |
in6_setscope ( & src , ifp1 , & srczone ) | |
2003-11-04 20:22:33 +00:00
osrczone ! = srczone ) {
continue ;
}
2000-07-04 16:35:15 +00:00
2003-11-04 20:22:33 +00:00
/* avoid unusable addresses */
if ( ( ia - > ia6_flags &
( IN6_IFF_NOTREADY | IN6_IFF_ANYCAST | IN6_IFF_DETACHED ) ) ) {
continue ;
2000-07-04 16:35:15 +00:00
}
Commit step 1 of the vimage project, (network stack)
virtualization work done by Marko Zec (zec@).
This is the first in a series of commits over the course
of the next few weeks.
Mark all uses of global variables to be virtualized
with a V_ prefix.
Use macros to map them back to their global names for
now, so this is a NOP change only.
We hope to have caught at least 85-90% of what is needed
so we do not invalidate a lot of outstanding patches again.
Obtained from: //depot/projects/vimage-commit2/...
Reviewed by: brooks, des, ed, mav, julian,
jamie, kris, rwatson, zec, ...
(various people I forgot, different versions)
md5 (with a bit of help)
Sponsored by: NLnet Foundation, The FreeBSD Foundation
X-MFC after: never
V_Commit_Message_Reviewed_By: more people than the patch
2008-08-17 23:27:27 +00:00
if ( ! V_ip6_use_deprecated & & IFA6_IS_DEPRECATED ( ia ) )
2003-11-04 20:22:33 +00:00
continue ;
2000-07-04 16:35:15 +00:00
2010-04-27 15:05:03 +00:00
/* If jailed only take addresses of the jail into account. */
MFp4:
Bring in updated jail support from bz_jail branch.
This enhances the current jail implementation to permit multiple
addresses per jail. In addtion to IPv4, IPv6 is supported as well.
Due to updated checks it is even possible to have jails without
an IP address at all, which basically gives one a chroot with
restricted process view, no networking,..
SCTP support was updated and supports IPv6 in jails as well.
Cpuset support permits jails to be bound to specific processor
sets after creation.
Jails can have an unrestricted (no duplicate protection, etc.) name
in addition to the hostname. The jail name cannot be changed from
within a jail and is considered to be used for management purposes
or as audit-token in the future.
DDB 'show jails' command was added to aid debugging.
Proper compat support permits 32bit jail binaries to be used on 64bit
systems to manage jails. Also backward compatibility was preserved where
possible: for jail v1 syscalls, as well as with user space management
utilities.
Both jail as well as prison version were updated for the new features.
A gap was intentionally left as the intermediate versions had been
used by various patches floating around the last years.
Bump __FreeBSD_version for the afore mentioned and in kernel changes.
Special thanks to:
- Pawel Jakub Dawidek (pjd) for his multi-IPv4 patches
and Olivier Houchard (cognet) for initial single-IPv6 patches.
- Jeff Roberson (jeff) and Randall Stewart (rrs) for their
help, ideas and review on cpuset and SCTP support.
- Robert Watson (rwatson) for lots and lots of help, discussions,
suggestions and review of most of the patch at various stages.
- John Baldwin (jhb) for his help.
- Simon L. Nielsen (simon) as early adopter testing changes
on cluster machines as well as all the testers and people
who provided feedback the last months on freebsd-jail and
other channels.
- My employer, CK Software GmbH, for the support so I could work on this.
Reviewed by: (see above)
MFC after: 3 months (this is just so that I get the mail)
X-MFC Before: 7.2-RELEASE if possible
2008-11-29 14:32:14 +00:00
if ( cred ! = NULL & &
2010-04-27 15:05:03 +00:00
prison_check_ip6 ( cred , & ia - > ia_addr . sin6_addr ) ! = 0 )
MFp4:
Bring in updated jail support from bz_jail branch.
This enhances the current jail implementation to permit multiple
addresses per jail. In addtion to IPv4, IPv6 is supported as well.
Due to updated checks it is even possible to have jails without
an IP address at all, which basically gives one a chroot with
restricted process view, no networking,..
SCTP support was updated and supports IPv6 in jails as well.
Cpuset support permits jails to be bound to specific processor
sets after creation.
Jails can have an unrestricted (no duplicate protection, etc.) name
in addition to the hostname. The jail name cannot be changed from
within a jail and is considered to be used for management purposes
or as audit-token in the future.
DDB 'show jails' command was added to aid debugging.
Proper compat support permits 32bit jail binaries to be used on 64bit
systems to manage jails. Also backward compatibility was preserved where
possible: for jail v1 syscalls, as well as with user space management
utilities.
Both jail as well as prison version were updated for the new features.
A gap was intentionally left as the intermediate versions had been
used by various patches floating around the last years.
Bump __FreeBSD_version for the afore mentioned and in kernel changes.
Special thanks to:
- Pawel Jakub Dawidek (pjd) for his multi-IPv4 patches
and Olivier Houchard (cognet) for initial single-IPv6 patches.
- Jeff Roberson (jeff) and Randall Stewart (rrs) for their
help, ideas and review on cpuset and SCTP support.
- Robert Watson (rwatson) for lots and lots of help, discussions,
suggestions and review of most of the patch at various stages.
- John Baldwin (jhb) for his help.
- Simon L. Nielsen (simon) as early adopter testing changes
on cluster machines as well as all the testers and people
who provided feedback the last months on freebsd-jail and
other channels.
- My employer, CK Software GmbH, for the support so I could work on this.
Reviewed by: (see above)
MFC after: 3 months (this is just so that I get the mail)
X-MFC Before: 7.2-RELEASE if possible
2008-11-29 14:32:14 +00:00
continue ;
2003-11-04 20:22:33 +00:00
/* Rule 1: Prefer same address */
2005-07-25 12:31:43 +00:00
if ( IN6_ARE_ADDR_EQUAL ( & dst , & ia - > ia_addr . sin6_addr ) ) {
2003-11-04 20:22:33 +00:00
ia_best = ia ;
BREAK ( 1 ) ; /* there should be no better candidate */
}
if ( ia_best = = NULL )
REPLACE ( 0 ) ;
/* Rule 2: Prefer appropriate scope */
if ( dst_scope < 0 )
2005-07-25 12:31:43 +00:00
dst_scope = in6_addrscope ( & dst ) ;
2003-11-04 20:22:33 +00:00
new_scope = in6_addrscope ( & ia - > ia_addr . sin6_addr ) ;
if ( IN6_ARE_SCOPE_CMP ( best_scope , new_scope ) < 0 ) {
if ( IN6_ARE_SCOPE_CMP ( best_scope , dst_scope ) < 0 )
REPLACE ( 2 ) ;
NEXT ( 2 ) ;
} else if ( IN6_ARE_SCOPE_CMP ( new_scope , best_scope ) < 0 ) {
if ( IN6_ARE_SCOPE_CMP ( new_scope , dst_scope ) < 0 )
NEXT ( 2 ) ;
REPLACE ( 2 ) ;
}
/*
* Rule 3 : Avoid deprecated addresses . Note that the case of
* ! ip6_use_deprecated is already rejected above .
*/
if ( ! IFA6_IS_DEPRECATED ( ia_best ) & & IFA6_IS_DEPRECATED ( ia ) )
NEXT ( 3 ) ;
if ( IFA6_IS_DEPRECATED ( ia_best ) & & ! IFA6_IS_DEPRECATED ( ia ) )
REPLACE ( 3 ) ;
/* Rule 4: Prefer home addresses */
/*
* XXX : This is a TODO . We should probably merge the MIP6
* case above .
*/
/* Rule 5: Prefer outgoing interface */
2013-01-09 18:18:08 +00:00
if ( ! ( ND_IFINFO ( ifp ) - > flags & ND6_IFF_NO_PREFER_IFACE ) ) {
if ( ia_best - > ia_ifp = = ifp & & ia - > ia_ifp ! = ifp )
NEXT ( 5 ) ;
if ( ia_best - > ia_ifp ! = ifp & & ia - > ia_ifp = = ifp )
REPLACE ( 5 ) ;
}
2003-11-04 20:22:33 +00:00
/*
* Rule 6 : Prefer matching label
* Note that best_policy should be non - NULL here .
*/
if ( dst_policy = = NULL )
dst_policy = lookup_addrsel_policy ( dstsock ) ;
if ( dst_policy - > label ! = ADDR_LABEL_NOTAPP ) {
new_policy = lookup_addrsel_policy ( & ia - > ia_addr ) ;
if ( dst_policy - > label = = best_policy - > label & &
dst_policy - > label ! = new_policy - > label )
NEXT ( 6 ) ;
if ( dst_policy - > label ! = best_policy - > label & &
dst_policy - > label = = new_policy - > label )
REPLACE ( 6 ) ;
}
/*
* Rule 7 : Prefer public addresses .
* We allow users to reverse the logic by configuring
* a sysctl variable , so that privacy conscious users can
* always prefer temporary addresses .
*/
if ( opts = = NULL | |
opts - > ip6po_prefer_tempaddr = = IP6PO_TEMPADDR_SYSTEM ) {
Commit step 1 of the vimage project, (network stack)
virtualization work done by Marko Zec (zec@).
This is the first in a series of commits over the course
of the next few weeks.
Mark all uses of global variables to be virtualized
with a V_ prefix.
Use macros to map them back to their global names for
now, so this is a NOP change only.
We hope to have caught at least 85-90% of what is needed
so we do not invalidate a lot of outstanding patches again.
Obtained from: //depot/projects/vimage-commit2/...
Reviewed by: brooks, des, ed, mav, julian,
jamie, kris, rwatson, zec, ...
(various people I forgot, different versions)
md5 (with a bit of help)
Sponsored by: NLnet Foundation, The FreeBSD Foundation
X-MFC after: never
V_Commit_Message_Reviewed_By: more people than the patch
2008-08-17 23:27:27 +00:00
prefer_tempaddr = V_ip6_prefer_tempaddr ;
2003-11-04 20:22:33 +00:00
} else if ( opts - > ip6po_prefer_tempaddr = =
IP6PO_TEMPADDR_NOTPREFER ) {
prefer_tempaddr = 0 ;
} else
prefer_tempaddr = 1 ;
if ( ! ( ia_best - > ia6_flags & IN6_IFF_TEMPORARY ) & &
( ia - > ia6_flags & IN6_IFF_TEMPORARY ) ) {
if ( prefer_tempaddr )
REPLACE ( 7 ) ;
else
NEXT ( 7 ) ;
}
if ( ( ia_best - > ia6_flags & IN6_IFF_TEMPORARY ) & &
! ( ia - > ia6_flags & IN6_IFF_TEMPORARY ) ) {
if ( prefer_tempaddr )
NEXT ( 7 ) ;
else
REPLACE ( 7 ) ;
2000-07-04 16:35:15 +00:00
}
2003-11-04 20:22:33 +00:00
/*
* Rule 8 : prefer addresses on alive interfaces .
* This is a KAME specific rule .
*/
if ( ( ia_best - > ia_ifp - > if_flags & IFF_UP ) & &
! ( ia - > ia_ifp - > if_flags & IFF_UP ) )
NEXT ( 8 ) ;
if ( ! ( ia_best - > ia_ifp - > if_flags & IFF_UP ) & &
( ia - > ia_ifp - > if_flags & IFF_UP ) )
REPLACE ( 8 ) ;
2014-07-30 15:08:12 +00:00
/*
* Rule 9 : prefer address with better virtual status .
*/
if ( ifa_preferred ( & ia_best - > ia_ifa , & ia - > ia_ifa ) )
REPLACE ( 9 ) ;
2014-09-01 09:30:34 +00:00
if ( ifa_preferred ( & ia - > ia_ifa , & ia_best - > ia_ifa ) )
NEXT ( 9 ) ;
2014-07-30 15:08:12 +00:00
2014-09-09 10:52:50 +00:00
/*
* Rule 10 : prefer address with ` prefer_source ' flag .
*/
if ( ( ia_best - > ia6_flags & IN6_IFF_PREFER_SOURCE ) = = 0 & &
( ia - > ia6_flags & IN6_IFF_PREFER_SOURCE ) ! = 0 )
REPLACE ( 10 ) ;
if ( ( ia_best - > ia6_flags & IN6_IFF_PREFER_SOURCE ) ! = 0 & &
( ia - > ia6_flags & IN6_IFF_PREFER_SOURCE ) = = 0 )
NEXT ( 10 ) ;
2003-11-04 20:22:33 +00:00
/*
* Rule 14 : Use longest matching prefix .
* Note : in the address selection draft , this rule is
* documented as " Rule 8 " . However , since it is also
* documented that this rule can be overridden , we assign
* a large number so that it is easy to assign smaller numbers
* to more preferred rules .
*/
2005-07-25 12:31:43 +00:00
new_matchlen = in6_matchlen ( & ia - > ia_addr . sin6_addr , & dst ) ;
2003-11-04 20:22:33 +00:00
if ( best_matchlen < new_matchlen )
REPLACE ( 14 ) ;
if ( new_matchlen < best_matchlen )
NEXT ( 14 ) ;
/* Rule 15 is reserved. */
/*
* Last resort : just keep the current candidate .
* Or , do we need more rules ?
*/
continue ;
replace :
ia_best = ia ;
best_scope = ( new_scope > = 0 ? new_scope :
in6_addrscope ( & ia_best - > ia_addr . sin6_addr ) ) ;
best_policy = ( new_policy ? new_policy :
lookup_addrsel_policy ( & ia_best - > ia_addr ) ) ;
best_matchlen = ( new_matchlen > = 0 ? new_matchlen :
in6_matchlen ( & ia_best - > ia_addr . sin6_addr ,
2005-07-25 12:31:43 +00:00
& dst ) ) ;
2003-11-04 20:22:33 +00:00
next :
continue ;
out :
break ;
}
2009-06-25 16:35:28 +00:00
if ( ( ia = ia_best ) = = NULL ) {
2015-07-29 08:12:05 +00:00
IN6_IFADDR_RUNLOCK ( & in6_ifa_tracker ) ;
2013-04-15 21:02:40 +00:00
IP6STAT_INC ( ip6s_sources_none ) ;
2009-06-23 22:08:55 +00:00
return ( EADDRNOTAVAIL ) ;
2009-06-25 16:35:28 +00:00
}
2003-11-04 20:22:33 +00:00
2010-04-27 15:05:03 +00:00
/*
* At this point at least one of the addresses belonged to the jail
* but it could still be , that we want to further restrict it , e . g .
* theoratically IN6_IS_ADDR_LOOPBACK .
* It must not be IN6_IS_ADDR_UNSPECIFIED anymore .
* prison_local_ip6 ( ) will fix an IN6_IS_ADDR_LOOPBACK but should
* let all others previously selected pass .
* Use tmp to not change : : 1 on lo0 to the primary jail address .
*/
tmp = ia - > ia_addr . sin6_addr ;
if ( cred ! = NULL & & prison_local_ip6 ( cred , & tmp , ( inp ! = NULL & &
( inp - > inp_flags & IN6P_IPV6_V6ONLY ) ! = 0 ) ) ! = 0 ) {
2015-07-29 08:12:05 +00:00
IN6_IFADDR_RUNLOCK ( & in6_ifa_tracker ) ;
2013-04-15 21:02:40 +00:00
IP6STAT_INC ( ip6s_sources_none ) ;
2010-04-27 15:05:03 +00:00
return ( EADDRNOTAVAIL ) ;
}
2005-07-25 12:31:43 +00:00
if ( ifpp )
* ifpp = ifp ;
2010-04-27 15:05:03 +00:00
bcopy ( & tmp , srcp , sizeof ( * srcp ) ) ;
2013-04-16 11:31:26 +00:00
if ( ia - > ia_ifp = = ifp )
IP6STAT_INC ( ip6s_sources_sameif [ best_scope ] ) ;
else
IP6STAT_INC ( ip6s_sources_otherif [ best_scope ] ) ;
if ( dst_scope = = best_scope )
IP6STAT_INC ( ip6s_sources_samescope [ best_scope ] ) ;
else
IP6STAT_INC ( ip6s_sources_otherscope [ best_scope ] ) ;
if ( IFA6_IS_DEPRECATED ( ia ) )
IP6STAT_INC ( ip6s_sources_deprecated [ best_scope ] ) ;
2015-07-29 08:12:05 +00:00
IN6_IFADDR_RUNLOCK ( & in6_ifa_tracker ) ;
2009-06-23 22:08:55 +00:00
return ( 0 ) ;
2003-11-04 20:22:33 +00:00
}
2016-01-10 13:40:29 +00:00
/*
* Select source address based on @ inp , @ dstsock and @ opts .
* Stores selected address to @ srcp . If @ scope_ambiguous is set ,
* embed scope from selected outgoing interface . If @ hlim pointer
* is provided , stores calculated hop limit there .
* Returns 0 on success .
*/
int
in6_selectsrc_socket ( struct sockaddr_in6 * dstsock , struct ip6_pktopts * opts ,
struct inpcb * inp , struct ucred * cred , int scope_ambiguous ,
struct in6_addr * srcp , int * hlim )
{
struct ifnet * retifp ;
uint32_t fibnum ;
int error ;
Constrain IPv6 routes to single FIBs when net.add_addr_allfibs=0
sys/netinet6/icmp6.c
Use the interface's FIB for source address selection in ICMPv6 error
responses.
sys/netinet6/in6.c
In in6_newaddrmsg, announce arrival of local addresses on the
interface's FIB only. In in6_lltable_rtcheck, use a per-fib ND6
cache instead of a single cache.
sys/netinet6/in6_src.c
In in6_selectsrc, use the caller's fib instead of the default fib.
In in6_selectsrc_socket, remove a superfluous check.
sys/netinet6/nd6.c
In nd6_lle_event, use the interface's fib for routing socket
messages. In nd6_is_new_addr_neighbor, check all FIBs when trying
to determine whether an address is a neighbor. Also, simplify the
code for point to point interfaces.
sys/netinet6/nd6.h
sys/netinet6/nd6.c
sys/netinet6/nd6_rtr.c
Make defrouter_select fib-aware, and make all of its callers pass in
the interface fib.
sys/netinet6/nd6_nbr.c
When inputting a Neighbor Solicitation packet, consider the
interface fib instead of the default fib for DAD. Output NS and
Neighbor Advertisement packets on the correct fib.
sys/netinet6/nd6_rtr.c
Allow installing the same host route on different interfaces in
different FIBs. If rt_add_addr_allfibs=0, only install or delete
the prefix route on the interface fib.
tests/sys/netinet/fibs_test.sh
Clear some expected failures, but add a skip for the newly revealed
BUG217871.
PR: 196361
Submitted by: Erick Turnquist <jhujhiti@adjectivism.org>
Reported by: Jason Healy <jhealy@logn.net>
Reviewed by: asomers
MFC after: 3 weeks
Sponsored by: Spectra Logic Corp
Differential Revision: https://reviews.freebsd.org/D9451
2017-03-17 16:50:37 +00:00
fibnum = inp - > inp_inc . inc_fibnum ;
2016-01-10 13:40:29 +00:00
retifp = NULL ;
error = in6_selectsrc ( fibnum , dstsock , opts , inp , cred , & retifp , srcp ) ;
if ( error ! = 0 )
return ( error ) ;
if ( hlim ! = NULL )
* hlim = in6_selecthlim ( inp , retifp ) ;
if ( retifp = = NULL | | scope_ambiguous = = 0 )
return ( 0 ) ;
/*
* Application should provide a proper zone ID or the use of
* default zone IDs should be enabled . Unfortunately , some
* applications do not behave as it should , so we need a
* workaround . Even if an appropriate ID is not determined
* ( when it ' s required ) , if we can determine the outgoing
* interface . determine the zone ID based on the interface .
*/
error = in6_setscope ( & dstsock - > sin6_addr , retifp , NULL ) ;
return ( error ) ;
}
/*
* Select source address based on @ fibnum , @ dst and @ scopeid .
* Stores selected address to @ srcp .
* Returns 0 on success .
*
* Used by non - socket based consumers ( ND code mostly )
*/
int
in6_selectsrc_addr ( uint32_t fibnum , const struct in6_addr * dst ,
uint32_t scopeid , struct ifnet * ifp , struct in6_addr * srcp ,
int * hlim )
{
struct ifnet * retifp ;
struct sockaddr_in6 dst_sa ;
int error ;
retifp = ifp ;
bzero ( & dst_sa , sizeof ( dst_sa ) ) ;
dst_sa . sin6_family = AF_INET6 ;
dst_sa . sin6_len = sizeof ( dst_sa ) ;
dst_sa . sin6_addr = * dst ;
dst_sa . sin6_scope_id = scopeid ;
sa6_embedscope ( & dst_sa , 0 ) ;
error = in6_selectsrc ( fibnum , & dst_sa , NULL , NULL , NULL , & retifp , srcp ) ;
if ( hlim ! = NULL )
* hlim = in6_selecthlim ( NULL , retifp ) ;
return ( error ) ;
}
2022-07-04 15:56:56 +00:00
static struct nhop_object *
cache_route ( uint32_t fibnum , const struct sockaddr_in6 * dst , struct route_in6 * ro ,
uint32_t flowid )
{
/*
* Use a cached route if it exists and is valid , else try to allocate
* a new one . Note that we should check the address family of the
* cached destination , in case of sharing the cache with IPv4 .
* Assumes that ' struct route_in6 ' is exclusively locked .
*/
if ( ro - > ro_nh ! = NULL & & (
! NH_IS_VALID ( ro - > ro_nh ) | | ro - > ro_dst . sin6_family ! = AF_INET6 | |
! IN6_ARE_ADDR_EQUAL ( & ro - > ro_dst . sin6_addr , & dst - > sin6_addr ) ) )
RO_NHFREE ( ro ) ;
if ( ro - > ro_nh = = NULL ) {
ro - > ro_dst = * dst ;
const struct in6_addr * paddr ;
struct in6_addr unscoped_addr ;
uint32_t scopeid = 0 ;
if ( IN6_IS_SCOPE_LINKLOCAL ( & dst - > sin6_addr ) ) {
in6_splitscope ( & dst - > sin6_addr , & unscoped_addr , & scopeid ) ;
paddr = & unscoped_addr ;
} else
paddr = & dst - > sin6_addr ;
ro - > ro_nh = fib6_lookup ( fibnum , paddr , scopeid , NHR_REF , flowid ) ;
}
return ( ro - > ro_nh ) ;
}
2022-07-04 18:05:38 +00:00
static struct nhop_object *
lookup_route ( uint32_t fibnum , struct sockaddr_in6 * dst , struct route_in6 * ro ,
struct ip6_pktopts * opts , uint32_t flowid )
{
struct nhop_object * nh = NULL ;
/*
* If the next hop address for the packet is specified by the caller ,
* use it as the gateway .
*/
if ( opts & & opts - > ip6po_nexthop ) {
struct route_in6 * ron = & opts - > ip6po_nextroute ;
struct sockaddr_in6 * sin6_next = satosin6 ( opts - > ip6po_nexthop ) ;
nh = cache_route ( fibnum , sin6_next , ron , flowid ) ;
/*
* The node identified by that address must be a
* neighbor of the sending host .
*/
if ( nh ! = NULL & & ( nh - > nh_flags & NHF_GATEWAY ) ! = 0 )
nh = NULL ;
} else if ( ro ! = NULL ) {
nh = cache_route ( fibnum , dst , ro , flowid ) ;
if ( nh = = NULL )
return ( NULL ) ;
/*
* Check if the outgoing interface conflicts with
* the interface specified by ipi6_ifindex ( if specified ) .
*/
struct in6_pktinfo * pi ;
if ( opts & & ( pi = opts - > ip6po_pktinfo ) ! = NULL & & pi - > ipi6_ifindex ) {
if ( nh - > nh_aifp - > if_index ! = pi - > ipi6_ifindex )
nh = NULL ;
}
}
return ( nh ) ;
}
2007-07-05 16:23:49 +00:00
/*
2022-07-04 15:56:56 +00:00
* Finds outgoing nexthop or the outgoing interface for the
* @ dstsock .
* Return 0 on success and stores the lookup result in @ retnh and @ retifp
2007-07-05 16:23:49 +00:00
*/
2003-11-04 20:22:33 +00:00
static int
2007-07-05 16:23:49 +00:00
selectroute ( struct sockaddr_in6 * dstsock , struct ip6_pktopts * opts ,
struct ip6_moptions * mopts , struct route_in6 * ro ,
2020-04-25 09:06:11 +00:00
struct ifnet * * retifp , struct nhop_object * * retnh , int norouteok ,
u_int fibnum , uint32_t flowid )
2003-11-04 20:22:33 +00:00
{
int error = 0 ;
struct ifnet * ifp = NULL ;
struct in6_pktinfo * pi = NULL ;
struct in6_addr * dst = & dstsock - > sin6_addr ;
/* If the caller specify the outgoing interface explicitly, use it. */
if ( opts & & ( pi = opts - > ip6po_pktinfo ) ! = NULL & & pi - > ipi6_ifindex ) {
/* XXX boundary check is assumed to be already done. */
ifp = ifnet_byindex ( pi - > ipi6_ifindex ) ;
2022-07-04 15:56:56 +00:00
if ( ifp ! = NULL & & ( norouteok | | IN6_IS_ADDR_MULTICAST ( dst ) ) ) {
2003-11-04 20:22:33 +00:00
/*
2005-08-12 15:27:25 +00:00
* we do not have to check or get the route for
2003-11-04 20:22:33 +00:00
* multicast .
*/
goto done ;
} else
goto getroute ;
}
2014-11-10 10:59:08 +00:00
/*
* If the destination address is a multicast address and the outgoing
* interface for the address is specified by the caller , use it .
*/
if ( IN6_IS_ADDR_MULTICAST ( dst ) & &
mopts ! = NULL & & ( ifp = mopts - > im6o_multicast_ifp ) ! = NULL ) {
goto done ; /* we do not need a route for multicast. */
}
2014-11-09 22:54:40 +00:00
/*
* If destination address is LLA or link - or node - local multicast ,
* use it ' s embedded scope zone id to determine outgoing interface .
*/
2014-11-10 10:59:08 +00:00
if ( IN6_IS_ADDR_MC_LINKLOCAL ( dst ) | |
2014-11-09 22:54:40 +00:00
IN6_IS_ADDR_MC_NODELOCAL ( dst ) ) {
2022-07-04 18:05:38 +00:00
uint32_t zoneid = ntohs ( in6_getscope ( dst ) ) ;
2014-11-09 22:54:40 +00:00
if ( zoneid > 0 ) {
ifp = in6_getlinkifnet ( zoneid ) ;
goto done ;
}
}
2003-11-04 20:22:33 +00:00
2022-07-04 18:05:38 +00:00
getroute : ;
struct nhop_object * nh = lookup_route ( fibnum , dstsock , ro , opts , flowid ) ;
if ( nh ! = NULL ) {
* retifp = nh - > nh_aifp ;
error = 0 ;
} else {
* retifp = NULL ;
IP6STAT_INC ( ip6s_noroute ) ;
error = EHOSTUNREACH ;
2000-07-04 16:35:15 +00:00
}
2022-07-04 18:05:38 +00:00
* retnh = nh ;
return ( error ) ;
2000-07-04 16:35:15 +00:00
2003-11-04 20:22:33 +00:00
done :
2022-07-04 18:05:38 +00:00
if ( ifp = = NULL ) {
2003-11-04 20:22:33 +00:00
/*
* This can happen if the caller did not pass a cached route
* nor any other hints . We treat this case an error .
*/
error = EHOSTUNREACH ;
}
if ( error = = EHOSTUNREACH )
2013-04-09 07:11:22 +00:00
IP6STAT_INC ( ip6s_noroute ) ;
2003-11-04 20:22:33 +00:00
2022-07-04 18:05:38 +00:00
* retifp = ifp ;
* retnh = NULL ;
2003-11-04 20:22:33 +00:00
return ( error ) ;
2000-07-04 16:35:15 +00:00
}
2005-07-25 12:31:43 +00:00
static int
2007-07-05 16:23:49 +00:00
in6_selectif ( struct sockaddr_in6 * dstsock , struct ip6_pktopts * opts ,
2016-01-03 10:43:23 +00:00
struct ip6_moptions * mopts , struct ifnet * * retifp ,
2012-02-24 20:06:04 +00:00
struct ifnet * oifp , u_int fibnum )
2005-07-25 12:31:43 +00:00
{
int error ;
struct route_in6 sro ;
2020-04-25 09:06:11 +00:00
struct nhop_object * nh = NULL ;
uint16_t nh_flags ;
2005-07-25 12:31:43 +00:00
2012-02-14 11:51:32 +00:00
KASSERT ( retifp ! = NULL , ( " %s: retifp is NULL " , __func__ ) ) ;
2016-01-03 10:43:23 +00:00
bzero ( & sro , sizeof ( sro ) ) ;
2020-04-25 09:06:11 +00:00
nh_flags = 0 ;
2016-01-03 10:43:23 +00:00
2020-04-25 09:06:11 +00:00
error = selectroute ( dstsock , opts , mopts , & sro , retifp , & nh , 1 , fibnum , 0 ) ;
2016-01-03 10:43:23 +00:00
2020-04-25 09:06:11 +00:00
if ( nh ! = NULL )
nh_flags = nh - > nh_flags ;
if ( nh ! = NULL & & nh = = sro . ro_nh )
NH_FREE ( nh ) ;
2005-07-25 12:31:43 +00:00
2016-01-03 10:43:23 +00:00
if ( error ! = 0 ) {
2012-02-14 11:51:32 +00:00
/* Help ND. See oifp comment in in6_selectsrc(). */
if ( oifp ! = NULL & & fibnum = = RT_DEFAULT_FIB ) {
* retifp = oifp ;
error = 0 ;
}
2005-07-25 12:31:43 +00:00
return ( error ) ;
}
/*
* do not use a rejected or black hole route .
* XXX : this check should be done in the L2 output routine .
* However , if we skipped this check here , we ' d see the following
* scenario :
* - install a rejected route for a scoped address prefix
* ( like fe80 : : / 10 )
* - send a packet to a destination that matches the scoped prefix ,
* with ambiguity about the scope zone .
* - pick the outgoing interface from the route , and disambiguate the
* scope zone with the interface .
* - ip6_output ( ) would try to get another route with the " new "
* destination , which may be valid .
* - we ' d see no error on output .
* Although this may not be very harmful , it should still be confusing .
* We thus reject the case here .
*/
2020-04-25 09:06:11 +00:00
if ( nh_flags & ( NHF_REJECT | NHF_BLACKHOLE ) ) {
error = ( nh_flags & NHF_HOST ? EHOSTUNREACH : ENETUNREACH ) ;
2016-01-03 10:43:23 +00:00
return ( error ) ;
2005-07-25 12:31:43 +00:00
}
return ( 0 ) ;
}
2020-03-03 13:48:12 +00:00
/* Public wrapper function to selectroute(). */
2005-07-25 12:31:43 +00:00
int
2007-07-05 16:23:49 +00:00
in6_selectroute ( struct sockaddr_in6 * dstsock , struct ip6_pktopts * opts ,
2012-02-03 13:08:44 +00:00
struct ip6_moptions * mopts , struct route_in6 * ro ,
2020-04-25 09:06:11 +00:00
struct ifnet * * retifp , struct nhop_object * * retnh , u_int fibnum , uint32_t flowid )
2012-02-03 13:08:44 +00:00
{
2022-07-04 15:56:56 +00:00
MPASS ( retifp ! = NULL ) ;
MPASS ( retnh ! = NULL ) ;
2012-02-03 13:08:44 +00:00
return ( selectroute ( dstsock , opts , mopts , ro , retifp ,
2020-04-25 09:06:11 +00:00
retnh , 0 , fibnum , flowid ) ) ;
2005-07-25 12:31:43 +00:00
}
2000-07-04 16:35:15 +00:00
/*
* Default hop limit selection . The precedence is as follows :
* 1. Hoplimit value specified via ioctl .
* 2. ( If the outgoing interface is detected ) the current
* hop limit of the interface specified by router advertisement .
* 3. The system default hoplimit .
2003-11-20 20:07:39 +00:00
*/
2000-07-04 16:35:15 +00:00
int
2019-08-02 07:41:36 +00:00
in6_selecthlim ( struct inpcb * inp , struct ifnet * ifp )
2000-07-04 16:35:15 +00:00
{
2007-07-05 16:23:49 +00:00
2019-08-02 07:41:36 +00:00
if ( inp & & inp - > in6p_hops > = 0 )
return ( inp - > in6p_hops ) ;
2000-07-04 16:35:15 +00:00
else if ( ifp )
2003-10-17 15:46:31 +00:00
return ( ND_IFINFO ( ifp ) - > chlim ) ;
2019-08-02 07:41:36 +00:00
else if ( inp & & ! IN6_IS_ADDR_UNSPECIFIED ( & inp - > in6p_faddr ) ) {
2020-07-02 21:04:08 +00:00
struct nhop_object * nh ;
2015-12-09 11:14:27 +00:00
struct in6_addr dst ;
uint32_t fibnum , scopeid ;
int hlim ;
2019-08-02 07:41:36 +00:00
fibnum = inp - > inp_inc . inc_fibnum ;
in6_splitscope ( & inp - > in6p_faddr , & dst , & scopeid ) ;
2020-07-02 21:04:08 +00:00
nh = fib6_lookup ( fibnum , & dst , scopeid , 0 , 0 ) ;
if ( nh ! = NULL ) {
hlim = ND_IFINFO ( nh - > nh_ifp ) - > chlim ;
2015-12-09 11:14:27 +00:00
return ( hlim ) ;
2012-05-25 01:45:05 +00:00
}
2003-11-20 20:07:39 +00:00
}
Commit step 1 of the vimage project, (network stack)
virtualization work done by Marko Zec (zec@).
This is the first in a series of commits over the course
of the next few weeks.
Mark all uses of global variables to be virtualized
with a V_ prefix.
Use macros to map them back to their global names for
now, so this is a NOP change only.
We hope to have caught at least 85-90% of what is needed
so we do not invalidate a lot of outstanding patches again.
Obtained from: //depot/projects/vimage-commit2/...
Reviewed by: brooks, des, ed, mav, julian,
jamie, kris, rwatson, zec, ...
(various people I forgot, different versions)
md5 (with a bit of help)
Sponsored by: NLnet Foundation, The FreeBSD Foundation
X-MFC after: never
V_Commit_Message_Reviewed_By: more people than the patch
2008-08-17 23:27:27 +00:00
return ( V_ip6_defhlim ) ;
2000-07-04 16:35:15 +00:00
}
2003-10-30 15:29:17 +00:00
void
2007-07-05 16:23:49 +00:00
addrsel_policy_init ( void )
2003-10-30 15:29:17 +00:00
{
init_policy_queue ( ) ;
/* initialize the "last resort" policy */
Commit step 1 of the vimage project, (network stack)
virtualization work done by Marko Zec (zec@).
This is the first in a series of commits over the course
of the next few weeks.
Mark all uses of global variables to be virtualized
with a V_ prefix.
Use macros to map them back to their global names for
now, so this is a NOP change only.
We hope to have caught at least 85-90% of what is needed
so we do not invalidate a lot of outstanding patches again.
Obtained from: //depot/projects/vimage-commit2/...
Reviewed by: brooks, des, ed, mav, julian,
jamie, kris, rwatson, zec, ...
(various people I forgot, different versions)
md5 (with a bit of help)
Sponsored by: NLnet Foundation, The FreeBSD Foundation
X-MFC after: never
V_Commit_Message_Reviewed_By: more people than the patch
2008-08-17 23:27:27 +00:00
bzero ( & V_defaultaddrpolicy , sizeof ( V_defaultaddrpolicy ) ) ;
V_defaultaddrpolicy . label = ADDR_LABEL_NOTAPP ;
First pass at separating per-vnet initializer functions
from existing functions for initializing global state.
At this stage, the new per-vnet initializer functions are
directly called from the existing global initialization code,
which should in most cases result in compiler inlining those
new functions, hence yielding a near-zero functional change.
Modify the existing initializer functions which are invoked via
protosw, like ip_init() et. al., to allow them to be invoked
multiple times, i.e. per each vnet. Global state, if any,
is initialized only if such functions are called within the
context of vnet0, which will be determined via the
IS_DEFAULT_VNET(curvnet) check (currently always true).
While here, V_irtualize a few remaining global UMA zones
used by net/netinet/netipsec networking code. While it is
not yet clear to me or anybody else whether this is the right
thing to do, at this stage this makes the code more readable,
and makes it easier to track uncollected UMA-zone-backed
objects on vnet removal. In the long run, it's quite possible
that some form of shared use of UMA zone pools among multiple
vnets should be considered.
Bump __FreeBSD_version due to changes in layout of structs
vnet_ipfw, vnet_inet and vnet_net.
Approved by: julian (mentor)
2009-04-06 22:29:41 +00:00
if ( ! IS_DEFAULT_VNET ( curvnet ) )
return ;
ADDRSEL_LOCK_INIT ( ) ;
ADDRSEL_SXLOCK_INIT ( ) ;
2003-10-30 15:29:17 +00:00
}
2003-11-04 20:22:33 +00:00
static struct in6_addrpolicy *
2007-07-05 16:23:49 +00:00
lookup_addrsel_policy ( struct sockaddr_in6 * key )
2003-11-04 20:22:33 +00:00
{
struct in6_addrpolicy * match = NULL ;
ADDRSEL_LOCK ( ) ;
match = match_addrsel_policy ( key ) ;
if ( match = = NULL )
Commit step 1 of the vimage project, (network stack)
virtualization work done by Marko Zec (zec@).
This is the first in a series of commits over the course
of the next few weeks.
Mark all uses of global variables to be virtualized
with a V_ prefix.
Use macros to map them back to their global names for
now, so this is a NOP change only.
We hope to have caught at least 85-90% of what is needed
so we do not invalidate a lot of outstanding patches again.
Obtained from: //depot/projects/vimage-commit2/...
Reviewed by: brooks, des, ed, mav, julian,
jamie, kris, rwatson, zec, ...
(various people I forgot, different versions)
md5 (with a bit of help)
Sponsored by: NLnet Foundation, The FreeBSD Foundation
X-MFC after: never
V_Commit_Message_Reviewed_By: more people than the patch
2008-08-17 23:27:27 +00:00
match = & V_defaultaddrpolicy ;
2003-11-04 20:22:33 +00:00
else
match - > use + + ;
ADDRSEL_UNLOCK ( ) ;
return ( match ) ;
}
2003-10-30 15:29:17 +00:00
/*
* Subroutines to manage the address selection policy table via sysctl .
*/
struct walkarg {
struct sysctl_req * w_req ;
} ;
static int in6_src_sysctl ( SYSCTL_HANDLER_ARGS ) ;
SYSCTL_DECL ( _net_inet6_ip6 ) ;
2011-11-07 15:43:11 +00:00
static SYSCTL_NODE ( _net_inet6_ip6 , IPV6CTL_ADDRCTLPOLICY , addrctlpolicy ,
2020-02-26 14:26:36 +00:00
CTLFLAG_RD | CTLFLAG_MPSAFE , in6_src_sysctl ,
" " ) ;
2003-10-30 15:29:17 +00:00
static int
in6_src_sysctl ( SYSCTL_HANDLER_ARGS )
{
struct walkarg w ;
if ( req - > newptr )
return EPERM ;
bzero ( & w , sizeof ( w ) ) ;
w . w_req = req ;
return ( walk_addrsel_policy ( dump_addrsel_policyent , & w ) ) ;
}
int
2007-07-05 16:23:49 +00:00
in6_src_ioctl ( u_long cmd , caddr_t data )
2003-10-30 15:29:17 +00:00
{
struct in6_addrpolicy ent0 ;
if ( cmd ! = SIOCAADDRCTL_POLICY & & cmd ! = SIOCDADDRCTL_POLICY )
return ( EOPNOTSUPP ) ; /* check for safety */
ent0 = * ( struct in6_addrpolicy * ) data ;
if ( ent0 . label = = ADDR_LABEL_NOTAPP )
return ( EINVAL ) ;
/* check if the prefix mask is consecutive. */
if ( in6_mask2len ( & ent0 . addrmask . sin6_addr , NULL ) < 0 )
return ( EINVAL ) ;
/* clear trailing garbages (if any) of the prefix address. */
2014-01-08 22:13:32 +00:00
IN6_MASK_ADDR ( & ent0 . addr . sin6_addr , & ent0 . addrmask . sin6_addr ) ;
2003-10-30 15:29:17 +00:00
ent0 . use = 0 ;
switch ( cmd ) {
case SIOCAADDRCTL_POLICY :
return ( add_addrsel_policyent ( & ent0 ) ) ;
case SIOCDADDRCTL_POLICY :
return ( delete_addrsel_policyent ( & ent0 ) ) ;
}
return ( 0 ) ; /* XXX: compromise compilers */
}
/*
* The followings are implementation of the policy table using a
* simple tail queue .
* XXX such details should be hidden .
* XXX implementation using binary tree should be more efficient .
*/
struct addrsel_policyent {
TAILQ_ENTRY ( addrsel_policyent ) ape_entry ;
struct in6_addrpolicy ape_policy ;
} ;
TAILQ_HEAD ( addrsel_policyhead , addrsel_policyent ) ;
2018-07-24 16:35:52 +00:00
VNET_DEFINE_STATIC ( struct addrsel_policyhead , addrsel_policytab ) ;
2009-07-16 21:13:04 +00:00
# define V_addrsel_policytab VNET(addrsel_policytab)
2003-10-30 15:29:17 +00:00
static void
2007-07-05 16:23:49 +00:00
init_policy_queue ( void )
2003-10-30 15:29:17 +00:00
{
2007-07-05 16:23:49 +00:00
Commit step 1 of the vimage project, (network stack)
virtualization work done by Marko Zec (zec@).
This is the first in a series of commits over the course
of the next few weeks.
Mark all uses of global variables to be virtualized
with a V_ prefix.
Use macros to map them back to their global names for
now, so this is a NOP change only.
We hope to have caught at least 85-90% of what is needed
so we do not invalidate a lot of outstanding patches again.
Obtained from: //depot/projects/vimage-commit2/...
Reviewed by: brooks, des, ed, mav, julian,
jamie, kris, rwatson, zec, ...
(various people I forgot, different versions)
md5 (with a bit of help)
Sponsored by: NLnet Foundation, The FreeBSD Foundation
X-MFC after: never
V_Commit_Message_Reviewed_By: more people than the patch
2008-08-17 23:27:27 +00:00
TAILQ_INIT ( & V_addrsel_policytab ) ;
2003-10-30 15:29:17 +00:00
}
static int
2007-07-05 16:23:49 +00:00
add_addrsel_policyent ( struct in6_addrpolicy * newpolicy )
2003-10-30 15:29:17 +00:00
{
struct addrsel_policyent * new , * pol ;
2008-10-23 15:53:51 +00:00
new = malloc ( sizeof ( * new ) , M_IFADDR ,
2003-10-30 18:42:25 +00:00
M_WAITOK ) ;
2005-08-17 16:46:55 +00:00
ADDRSEL_XLOCK ( ) ;
2003-10-30 15:29:17 +00:00
ADDRSEL_LOCK ( ) ;
/* duplication check */
Commit step 1 of the vimage project, (network stack)
virtualization work done by Marko Zec (zec@).
This is the first in a series of commits over the course
of the next few weeks.
Mark all uses of global variables to be virtualized
with a V_ prefix.
Use macros to map them back to their global names for
now, so this is a NOP change only.
We hope to have caught at least 85-90% of what is needed
so we do not invalidate a lot of outstanding patches again.
Obtained from: //depot/projects/vimage-commit2/...
Reviewed by: brooks, des, ed, mav, julian,
jamie, kris, rwatson, zec, ...
(various people I forgot, different versions)
md5 (with a bit of help)
Sponsored by: NLnet Foundation, The FreeBSD Foundation
X-MFC after: never
V_Commit_Message_Reviewed_By: more people than the patch
2008-08-17 23:27:27 +00:00
TAILQ_FOREACH ( pol , & V_addrsel_policytab , ape_entry ) {
2005-10-19 16:53:24 +00:00
if ( IN6_ARE_ADDR_EQUAL ( & newpolicy - > addr . sin6_addr ,
& pol - > ape_policy . addr . sin6_addr ) & &
IN6_ARE_ADDR_EQUAL ( & newpolicy - > addrmask . sin6_addr ,
& pol - > ape_policy . addrmask . sin6_addr ) ) {
2003-10-30 18:42:25 +00:00
ADDRSEL_UNLOCK ( ) ;
2005-08-17 16:46:55 +00:00
ADDRSEL_XUNLOCK ( ) ;
2008-10-23 15:53:51 +00:00
free ( new , M_IFADDR ) ;
2003-10-30 15:29:17 +00:00
return ( EEXIST ) ; /* or override it? */
}
}
bzero ( new , sizeof ( * new ) ) ;
/* XXX: should validate entry */
new - > ape_policy = * newpolicy ;
Commit step 1 of the vimage project, (network stack)
virtualization work done by Marko Zec (zec@).
This is the first in a series of commits over the course
of the next few weeks.
Mark all uses of global variables to be virtualized
with a V_ prefix.
Use macros to map them back to their global names for
now, so this is a NOP change only.
We hope to have caught at least 85-90% of what is needed
so we do not invalidate a lot of outstanding patches again.
Obtained from: //depot/projects/vimage-commit2/...
Reviewed by: brooks, des, ed, mav, julian,
jamie, kris, rwatson, zec, ...
(various people I forgot, different versions)
md5 (with a bit of help)
Sponsored by: NLnet Foundation, The FreeBSD Foundation
X-MFC after: never
V_Commit_Message_Reviewed_By: more people than the patch
2008-08-17 23:27:27 +00:00
TAILQ_INSERT_TAIL ( & V_addrsel_policytab , new , ape_entry ) ;
2003-10-30 15:29:17 +00:00
ADDRSEL_UNLOCK ( ) ;
2005-08-17 16:46:55 +00:00
ADDRSEL_XUNLOCK ( ) ;
2003-10-30 15:29:17 +00:00
return ( 0 ) ;
}
static int
2007-07-05 16:23:49 +00:00
delete_addrsel_policyent ( struct in6_addrpolicy * key )
2003-10-30 15:29:17 +00:00
{
struct addrsel_policyent * pol ;
2005-08-17 16:46:55 +00:00
ADDRSEL_XLOCK ( ) ;
2003-10-30 15:29:17 +00:00
ADDRSEL_LOCK ( ) ;
/* search for the entry in the table */
Commit step 1 of the vimage project, (network stack)
virtualization work done by Marko Zec (zec@).
This is the first in a series of commits over the course
of the next few weeks.
Mark all uses of global variables to be virtualized
with a V_ prefix.
Use macros to map them back to their global names for
now, so this is a NOP change only.
We hope to have caught at least 85-90% of what is needed
so we do not invalidate a lot of outstanding patches again.
Obtained from: //depot/projects/vimage-commit2/...
Reviewed by: brooks, des, ed, mav, julian,
jamie, kris, rwatson, zec, ...
(various people I forgot, different versions)
md5 (with a bit of help)
Sponsored by: NLnet Foundation, The FreeBSD Foundation
X-MFC after: never
V_Commit_Message_Reviewed_By: more people than the patch
2008-08-17 23:27:27 +00:00
TAILQ_FOREACH ( pol , & V_addrsel_policytab , ape_entry ) {
2005-10-19 16:53:24 +00:00
if ( IN6_ARE_ADDR_EQUAL ( & key - > addr . sin6_addr ,
& pol - > ape_policy . addr . sin6_addr ) & &
IN6_ARE_ADDR_EQUAL ( & key - > addrmask . sin6_addr ,
& pol - > ape_policy . addrmask . sin6_addr ) ) {
2003-10-30 15:29:17 +00:00
break ;
}
}
2003-10-30 18:42:25 +00:00
if ( pol = = NULL ) {
ADDRSEL_UNLOCK ( ) ;
2005-08-17 16:46:55 +00:00
ADDRSEL_XUNLOCK ( ) ;
2003-10-30 15:29:17 +00:00
return ( ESRCH ) ;
2003-10-30 18:42:25 +00:00
}
2003-10-30 15:29:17 +00:00
Commit step 1 of the vimage project, (network stack)
virtualization work done by Marko Zec (zec@).
This is the first in a series of commits over the course
of the next few weeks.
Mark all uses of global variables to be virtualized
with a V_ prefix.
Use macros to map them back to their global names for
now, so this is a NOP change only.
We hope to have caught at least 85-90% of what is needed
so we do not invalidate a lot of outstanding patches again.
Obtained from: //depot/projects/vimage-commit2/...
Reviewed by: brooks, des, ed, mav, julian,
jamie, kris, rwatson, zec, ...
(various people I forgot, different versions)
md5 (with a bit of help)
Sponsored by: NLnet Foundation, The FreeBSD Foundation
X-MFC after: never
V_Commit_Message_Reviewed_By: more people than the patch
2008-08-17 23:27:27 +00:00
TAILQ_REMOVE ( & V_addrsel_policytab , pol , ape_entry ) ;
2003-10-30 15:29:17 +00:00
ADDRSEL_UNLOCK ( ) ;
2005-08-17 16:46:55 +00:00
ADDRSEL_XUNLOCK ( ) ;
2013-04-12 07:59:54 +00:00
free ( pol , M_IFADDR ) ;
2003-10-30 15:29:17 +00:00
return ( 0 ) ;
}
static int
2012-11-13 01:48:00 +00:00
walk_addrsel_policy ( int ( * callback ) ( struct in6_addrpolicy * , void * ) , void * w )
2003-10-30 15:29:17 +00:00
{
struct addrsel_policyent * pol ;
int error = 0 ;
2005-08-17 16:46:55 +00:00
ADDRSEL_SLOCK ( ) ;
Commit step 1 of the vimage project, (network stack)
virtualization work done by Marko Zec (zec@).
This is the first in a series of commits over the course
of the next few weeks.
Mark all uses of global variables to be virtualized
with a V_ prefix.
Use macros to map them back to their global names for
now, so this is a NOP change only.
We hope to have caught at least 85-90% of what is needed
so we do not invalidate a lot of outstanding patches again.
Obtained from: //depot/projects/vimage-commit2/...
Reviewed by: brooks, des, ed, mav, julian,
jamie, kris, rwatson, zec, ...
(various people I forgot, different versions)
md5 (with a bit of help)
Sponsored by: NLnet Foundation, The FreeBSD Foundation
X-MFC after: never
V_Commit_Message_Reviewed_By: more people than the patch
2008-08-17 23:27:27 +00:00
TAILQ_FOREACH ( pol , & V_addrsel_policytab , ape_entry ) {
2005-08-17 16:46:55 +00:00
if ( ( error = ( * callback ) ( & pol - > ape_policy , w ) ) ! = 0 ) {
ADDRSEL_SUNLOCK ( ) ;
2003-10-30 15:29:17 +00:00
return ( error ) ;
2005-08-17 16:46:55 +00:00
}
2003-10-30 15:29:17 +00:00
}
2005-08-17 16:46:55 +00:00
ADDRSEL_SUNLOCK ( ) ;
2003-10-30 15:29:17 +00:00
return ( error ) ;
}
static int
2007-07-05 16:23:49 +00:00
dump_addrsel_policyent ( struct in6_addrpolicy * pol , void * arg )
2003-10-30 15:29:17 +00:00
{
int error = 0 ;
struct walkarg * w = arg ;
error = SYSCTL_OUT ( w - > w_req , pol , sizeof ( * pol ) ) ;
return ( error ) ;
}
2003-11-04 20:22:33 +00:00
static struct in6_addrpolicy *
2007-07-05 16:23:49 +00:00
match_addrsel_policy ( struct sockaddr_in6 * key )
2003-11-04 20:22:33 +00:00
{
struct addrsel_policyent * pent ;
struct in6_addrpolicy * bestpol = NULL , * pol ;
int matchlen , bestmatchlen = - 1 ;
u_char * mp , * ep , * k , * p , m ;
Commit step 1 of the vimage project, (network stack)
virtualization work done by Marko Zec (zec@).
This is the first in a series of commits over the course
of the next few weeks.
Mark all uses of global variables to be virtualized
with a V_ prefix.
Use macros to map them back to their global names for
now, so this is a NOP change only.
We hope to have caught at least 85-90% of what is needed
so we do not invalidate a lot of outstanding patches again.
Obtained from: //depot/projects/vimage-commit2/...
Reviewed by: brooks, des, ed, mav, julian,
jamie, kris, rwatson, zec, ...
(various people I forgot, different versions)
md5 (with a bit of help)
Sponsored by: NLnet Foundation, The FreeBSD Foundation
X-MFC after: never
V_Commit_Message_Reviewed_By: more people than the patch
2008-08-17 23:27:27 +00:00
TAILQ_FOREACH ( pent , & V_addrsel_policytab , ape_entry ) {
2003-11-04 20:22:33 +00:00
matchlen = 0 ;
pol = & pent - > ape_policy ;
mp = ( u_char * ) & pol - > addrmask . sin6_addr ;
ep = mp + 16 ; /* XXX: scope field? */
k = ( u_char * ) & key - > sin6_addr ;
p = ( u_char * ) & pol - > addr . sin6_addr ;
for ( ; mp < ep & & * mp ; mp + + , k + + , p + + ) {
m = * mp ;
if ( ( * k & m ) ! = * p )
goto next ; /* not match */
if ( m = = 0xff ) /* short cut for a typical case */
matchlen + = 8 ;
else {
while ( m > = 0x80 ) {
matchlen + + ;
m < < = 1 ;
}
}
}
/* matched. check if this is better than the current best. */
if ( bestpol = = NULL | |
matchlen > bestmatchlen ) {
bestpol = pol ;
bestmatchlen = matchlen ;
}
next :
continue ;
}
return ( bestpol ) ;
}