2005-01-07 01:45:51 +00:00
|
|
|
/*-
|
1994-05-24 10:09:53 +00:00
|
|
|
* Copyright (c) 1982, 1986, 1991, 1993
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
2004-11-13 17:05:40 +00:00
|
|
|
* Copyright (C) 2001 WIDE Project. All rights reserved.
|
1994-05-24 10:09:53 +00:00
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
1995-09-21 17:50:45 +00:00
|
|
|
* @(#)in.c 8.4 (Berkeley) 1/9/95
|
1999-08-28 01:08:13 +00:00
|
|
|
* $FreeBSD$
|
1994-05-24 10:09:53 +00:00
|
|
|
*/
|
|
|
|
|
2005-03-20 10:27:17 +00:00
|
|
|
#include "opt_carp.h"
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/param.h>
|
1994-05-25 09:21:21 +00:00
|
|
|
#include <sys/systm.h>
|
1997-03-24 11:33:46 +00:00
|
|
|
#include <sys/sockio.h>
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/malloc.h>
|
2006-11-06 13:42:10 +00:00
|
|
|
#include <sys/priv.h>
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/socket.h>
|
1995-12-09 20:43:53 +00:00
|
|
|
#include <sys/kernel.h>
|
|
|
|
#include <sys/sysctl.h>
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
#include <net/if.h>
|
1999-12-22 19:13:38 +00:00
|
|
|
#include <net/if_types.h>
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <net/route.h>
|
|
|
|
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <netinet/in_var.h>
|
2001-08-04 17:10:14 +00:00
|
|
|
#include <netinet/in_pcb.h>
|
Import rewrite of IPv4 socket multicast layer to support source-specific
and protocol-independent host mode multicast. The code is written to
accomodate IPv6, IGMPv3 and MLDv2 with only a little additional work.
This change only pertains to FreeBSD's use as a multicast end-station and
does not concern multicast routing; for an IGMPv3/MLDv2 router
implementation, consider the XORP project.
The work is based on Wilbert de Graaf's IGMPv3 code drop for FreeBSD 4.6,
which is available at: http://www.kloosterhof.com/wilbert/igmpv3.html
Summary
* IPv4 multicast socket processing is now moved out of ip_output.c
into a new module, in_mcast.c.
* The in_mcast.c module implements the IPv4 legacy any-source API in
terms of the protocol-independent source-specific API.
* Source filters are lazy allocated as the common case does not use them.
They are part of per inpcb state and are covered by the inpcb lock.
* struct ip_mreqn is now supported to allow applications to specify
multicast joins by interface index in the legacy IPv4 any-source API.
* In UDP, an incoming multicast datagram only requires that the source
port matches the 4-tuple if the socket was already bound by source port.
An unbound socket SHOULD be able to receive multicasts sent from an
ephemeral source port.
* The UDP socket multicast filter mode defaults to exclusive, that is,
sources present in the per-socket list will be blocked from delivery.
* The RFC 3678 userland functions have been added to libc: setsourcefilter,
getsourcefilter, setipv4sourcefilter, getipv4sourcefilter.
* Definitions for IGMPv3 are merged but not yet used.
* struct sockaddr_storage is now referenced from <netinet/in.h>. It
is therefore defined there if not already declared in the same way
as for the C99 types.
* The RFC 1724 hack (specify 0.0.0.0/8 addresses to IP_MULTICAST_IF
which are then interpreted as interface indexes) is now deprecated.
* A patch for the Rhyolite.com routed in the FreeBSD base system
is available in the -net archives. This only affects individuals
running RIPv1 or RIPv2 via point-to-point and/or unnumbered interfaces.
* Make IPv6 detach path similar to IPv4's in code flow; functionally same.
* Bump __FreeBSD_version to 700048; see UPDATING.
This work was financially supported by another FreeBSD committer.
Obtained from: p4://bms_netdev
Submitted by: Wilbert de Graaf (original work)
Reviewed by: rwatson (locking), silence from fenner,
net@ (but with encouragement)
2007-06-12 16:24:56 +00:00
|
|
|
#include <netinet/ip_var.h>
|
1997-10-11 18:31:40 +00:00
|
|
|
|
2002-03-19 21:25:46 +00:00
|
|
|
static int in_mask2len(struct in_addr *);
|
|
|
|
static void in_len2mask(struct in_addr *, int);
|
|
|
|
static int in_lifaddr_ioctl(struct socket *, u_long, caddr_t,
|
|
|
|
struct ifnet *, struct thread *);
|
1999-12-22 19:13:38 +00:00
|
|
|
|
2004-11-12 20:53:51 +00:00
|
|
|
static int in_addprefix(struct in_ifaddr *, int);
|
|
|
|
static int in_scrubprefix(struct in_ifaddr *);
|
2002-03-19 21:25:46 +00:00
|
|
|
static void in_socktrim(struct sockaddr_in *);
|
|
|
|
static int in_ifinit(struct ifnet *,
|
|
|
|
struct in_ifaddr *, struct sockaddr_in *, int);
|
2007-03-20 00:36:10 +00:00
|
|
|
static void in_purgemaddrs(struct ifnet *);
|
1994-05-24 10:09:53 +00:00
|
|
|
|
1996-09-09 20:17:24 +00:00
|
|
|
static int subnetsarelocal = 0;
|
2004-08-16 18:32:07 +00:00
|
|
|
SYSCTL_INT(_net_inet_ip, OID_AUTO, subnets_are_local, CTLFLAG_RW,
|
2003-12-30 16:05:03 +00:00
|
|
|
&subnetsarelocal, 0, "Treat all subnets as directly connected");
|
2005-08-18 10:34:30 +00:00
|
|
|
static int sameprefixcarponly = 0;
|
|
|
|
SYSCTL_INT(_net_inet_ip, OID_AUTO, same_prefix_carp_only, CTLFLAG_RW,
|
|
|
|
&sameprefixcarponly, 0,
|
|
|
|
"Refuse to create same prefixes on different interfaces");
|
1997-01-13 21:26:53 +00:00
|
|
|
|
2001-08-04 17:10:14 +00:00
|
|
|
extern struct inpcbinfo ripcbinfo;
|
|
|
|
extern struct inpcbinfo udbinfo;
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
/*
|
|
|
|
* Return 1 if an internet address is for a ``local'' host
|
|
|
|
* (one to which we have a connection). If subnetsarelocal
|
|
|
|
* is true, this includes other subnets of the local net.
|
|
|
|
* Otherwise, it includes only the directly-connected (sub)nets.
|
|
|
|
*/
|
1994-05-25 09:21:21 +00:00
|
|
|
int
|
2007-05-10 15:58:48 +00:00
|
|
|
in_localaddr(struct in_addr in)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
|
|
|
register u_long i = ntohl(in.s_addr);
|
|
|
|
register struct in_ifaddr *ia;
|
|
|
|
|
|
|
|
if (subnetsarelocal) {
|
2001-03-16 20:00:53 +00:00
|
|
|
TAILQ_FOREACH(ia, &in_ifaddrhead, ia_link)
|
1994-05-24 10:09:53 +00:00
|
|
|
if ((i & ia->ia_netmask) == ia->ia_net)
|
|
|
|
return (1);
|
|
|
|
} else {
|
2001-02-04 16:08:18 +00:00
|
|
|
TAILQ_FOREACH(ia, &in_ifaddrhead, ia_link)
|
1994-05-24 10:09:53 +00:00
|
|
|
if ((i & ia->ia_subnetmask) == ia->ia_subnet)
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2004-08-11 11:49:48 +00:00
|
|
|
/*
|
|
|
|
* Return 1 if an internet address is for the local host and configured
|
|
|
|
* on one of its interfaces.
|
|
|
|
*/
|
|
|
|
int
|
2007-05-10 15:58:48 +00:00
|
|
|
in_localip(struct in_addr in)
|
2004-08-11 11:49:48 +00:00
|
|
|
{
|
|
|
|
struct in_ifaddr *ia;
|
|
|
|
|
|
|
|
LIST_FOREACH(ia, INADDR_HASH(in.s_addr), ia_hash) {
|
|
|
|
if (IA_SIN(ia)->sin_addr.s_addr == in.s_addr)
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
/*
|
|
|
|
* Determine whether an IP address is in a reserved set of addresses
|
|
|
|
* that may not be forwarded, or whether datagrams to that destination
|
|
|
|
* may be forwarded.
|
|
|
|
*/
|
1994-05-25 09:21:21 +00:00
|
|
|
int
|
2007-05-10 15:58:48 +00:00
|
|
|
in_canforward(struct in_addr in)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
|
|
|
register u_long i = ntohl(in.s_addr);
|
|
|
|
register u_long net;
|
|
|
|
|
2007-02-03 06:45:51 +00:00
|
|
|
if (IN_EXPERIMENTAL(i) || IN_MULTICAST(i) || IN_LINKLOCAL(i))
|
1994-05-24 10:09:53 +00:00
|
|
|
return (0);
|
|
|
|
if (IN_CLASSA(i)) {
|
|
|
|
net = i & IN_CLASSA_NET;
|
|
|
|
if (net == 0 || net == (IN_LOOPBACKNET << IN_CLASSA_NSHIFT))
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Trim a mask in a sockaddr
|
|
|
|
*/
|
1995-11-14 20:34:56 +00:00
|
|
|
static void
|
2007-05-10 15:58:48 +00:00
|
|
|
in_socktrim(struct sockaddr_in *ap)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
|
|
|
register char *cplim = (char *) &ap->sin_addr;
|
|
|
|
register char *cp = (char *) (&ap->sin_addr + 1);
|
|
|
|
|
|
|
|
ap->sin_len = 0;
|
1994-11-03 21:04:21 +00:00
|
|
|
while (--cp >= cplim)
|
2004-08-16 18:32:07 +00:00
|
|
|
if (*cp) {
|
1994-05-24 10:09:53 +00:00
|
|
|
(ap)->sin_len = cp - (char *) (ap) + 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
1999-12-22 19:13:38 +00:00
|
|
|
static int
|
|
|
|
in_mask2len(mask)
|
|
|
|
struct in_addr *mask;
|
|
|
|
{
|
|
|
|
int x, y;
|
|
|
|
u_char *p;
|
|
|
|
|
|
|
|
p = (u_char *)mask;
|
|
|
|
for (x = 0; x < sizeof(*mask); x++) {
|
|
|
|
if (p[x] != 0xff)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
y = 0;
|
|
|
|
if (x < sizeof(*mask)) {
|
|
|
|
for (y = 0; y < 8; y++) {
|
|
|
|
if ((p[x] & (0x80 >> y)) == 0)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return x * 8 + y;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2007-05-10 15:58:48 +00:00
|
|
|
in_len2mask(struct in_addr *mask, int len)
|
1999-12-22 19:13:38 +00:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
u_char *p;
|
|
|
|
|
|
|
|
p = (u_char *)mask;
|
|
|
|
bzero(mask, sizeof(*mask));
|
|
|
|
for (i = 0; i < len / 8; i++)
|
|
|
|
p[i] = 0xff;
|
|
|
|
if (len % 8)
|
|
|
|
p[i] = (0xff00 >> (len % 8)) & 0xff;
|
|
|
|
}
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
/*
|
|
|
|
* Generic internet control operations (ioctl's).
|
|
|
|
* Ifp is 0 if not an interface-specific ioctl.
|
|
|
|
*/
|
|
|
|
/* ARGSUSED */
|
1994-05-25 09:21:21 +00:00
|
|
|
int
|
2007-05-10 15:58:48 +00:00
|
|
|
in_control(struct socket *so, u_long cmd, caddr_t data, struct ifnet *ifp,
|
|
|
|
struct thread *td)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
|
|
|
register struct ifreq *ifr = (struct ifreq *)data;
|
1996-03-15 17:08:07 +00:00
|
|
|
register struct in_ifaddr *ia = 0, *iap;
|
1994-05-24 10:09:53 +00:00
|
|
|
register struct ifaddr *ifa;
|
2007-03-29 21:39:22 +00:00
|
|
|
struct in_addr allhosts_addr;
|
2001-09-29 04:34:11 +00:00
|
|
|
struct in_addr dst;
|
1994-05-24 10:09:53 +00:00
|
|
|
struct in_ifaddr *oia;
|
|
|
|
struct in_aliasreq *ifra = (struct in_aliasreq *)data;
|
|
|
|
struct sockaddr_in oldaddr;
|
2001-11-30 14:00:55 +00:00
|
|
|
int error, hostIsNew, iaIsNew, maskIsNew, s;
|
2007-03-29 21:39:22 +00:00
|
|
|
int iaIsFirst;
|
2001-11-30 14:00:55 +00:00
|
|
|
|
2007-03-29 21:39:22 +00:00
|
|
|
iaIsFirst = 0;
|
2001-11-30 14:00:55 +00:00
|
|
|
iaIsNew = 0;
|
2007-03-29 21:39:22 +00:00
|
|
|
allhosts_addr.s_addr = htonl(INADDR_ALLHOSTS_GROUP);
|
1994-05-24 10:09:53 +00:00
|
|
|
|
1999-12-22 19:13:38 +00:00
|
|
|
switch (cmd) {
|
|
|
|
case SIOCALIFADDR:
|
2006-11-06 13:42:10 +00:00
|
|
|
if (td != NULL) {
|
|
|
|
error = priv_check(td, PRIV_NET_ADDIFADDR);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
if (!ifp)
|
|
|
|
return EINVAL;
|
|
|
|
return in_lifaddr_ioctl(so, cmd, data, ifp, td);
|
|
|
|
|
1999-12-22 19:13:38 +00:00
|
|
|
case SIOCDLIFADDR:
|
2006-11-06 13:42:10 +00:00
|
|
|
if (td != NULL) {
|
|
|
|
error = priv_check(td, PRIV_NET_DELIFADDR);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
if (!ifp)
|
|
|
|
return EINVAL;
|
|
|
|
return in_lifaddr_ioctl(so, cmd, data, ifp, td);
|
|
|
|
|
1999-12-22 19:13:38 +00:00
|
|
|
case SIOCGLIFADDR:
|
|
|
|
if (!ifp)
|
|
|
|
return EINVAL;
|
2001-09-12 08:38:13 +00:00
|
|
|
return in_lifaddr_ioctl(so, cmd, data, ifp, td);
|
1999-12-22 19:13:38 +00:00
|
|
|
}
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
/*
|
|
|
|
* Find address for this interface, if it exists.
|
1996-03-15 17:08:07 +00:00
|
|
|
*
|
|
|
|
* If an alias address was specified, find that one instead of
|
2001-09-29 04:34:11 +00:00
|
|
|
* the first one on the interface, if possible.
|
1994-05-24 10:09:53 +00:00
|
|
|
*/
|
2001-09-29 04:34:11 +00:00
|
|
|
if (ifp) {
|
|
|
|
dst = ((struct sockaddr_in *)&ifr->ifr_addr)->sin_addr;
|
|
|
|
LIST_FOREACH(iap, INADDR_HASH(dst.s_addr), ia_hash)
|
|
|
|
if (iap->ia_ifp == ifp &&
|
|
|
|
iap->ia_addr.sin_addr.s_addr == dst.s_addr) {
|
|
|
|
ia = iap;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (ia == NULL)
|
|
|
|
TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
|
|
|
|
iap = ifatoia(ifa);
|
|
|
|
if (iap->ia_addr.sin_family == AF_INET) {
|
1996-03-15 17:08:07 +00:00
|
|
|
ia = iap;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2007-03-29 21:39:22 +00:00
|
|
|
if (ia == NULL)
|
|
|
|
iaIsFirst = 1;
|
2001-09-29 04:34:11 +00:00
|
|
|
}
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
switch (cmd) {
|
|
|
|
|
|
|
|
case SIOCAIFADDR:
|
|
|
|
case SIOCDIFADDR:
|
1998-12-07 05:41:10 +00:00
|
|
|
if (ifp == 0)
|
|
|
|
return (EADDRNOTAVAIL);
|
1995-04-25 19:50:20 +00:00
|
|
|
if (ifra->ifra_addr.sin_family == AF_INET) {
|
2001-02-04 13:13:25 +00:00
|
|
|
for (oia = ia; ia; ia = TAILQ_NEXT(ia, ia_link)) {
|
1995-04-25 19:50:20 +00:00
|
|
|
if (ia->ia_ifp == ifp &&
|
|
|
|
ia->ia_addr.sin_addr.s_addr ==
|
|
|
|
ifra->ifra_addr.sin_addr.s_addr)
|
|
|
|
break;
|
|
|
|
}
|
1995-05-30 08:16:23 +00:00
|
|
|
if ((ifp->if_flags & IFF_POINTOPOINT)
|
1995-04-25 19:50:20 +00:00
|
|
|
&& (cmd == SIOCAIFADDR)
|
|
|
|
&& (ifra->ifra_dstaddr.sin_addr.s_addr
|
|
|
|
== INADDR_ANY)) {
|
1995-07-17 15:15:15 +00:00
|
|
|
return EDESTADDRREQ;
|
1995-04-25 19:50:20 +00:00
|
|
|
}
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
if (cmd == SIOCDIFADDR && ia == 0)
|
|
|
|
return (EADDRNOTAVAIL);
|
|
|
|
/* FALLTHROUGH */
|
|
|
|
case SIOCSIFADDR:
|
|
|
|
case SIOCSIFNETMASK:
|
|
|
|
case SIOCSIFDSTADDR:
|
2006-11-06 13:42:10 +00:00
|
|
|
if (td != NULL) {
|
|
|
|
error = priv_check(td, PRIV_NET_ADDIFADDR);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
}
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
if (ifp == 0)
|
1998-12-07 05:41:10 +00:00
|
|
|
return (EADDRNOTAVAIL);
|
1994-05-24 10:09:53 +00:00
|
|
|
if (ia == (struct in_ifaddr *)0) {
|
1996-12-13 21:29:07 +00:00
|
|
|
ia = (struct in_ifaddr *)
|
2003-02-19 05:47:46 +00:00
|
|
|
malloc(sizeof *ia, M_IFADDR, M_WAITOK | M_ZERO);
|
1996-12-13 21:29:07 +00:00
|
|
|
if (ia == (struct in_ifaddr *)NULL)
|
1994-05-24 10:09:53 +00:00
|
|
|
return (ENOBUFS);
|
1996-04-07 06:59:52 +00:00
|
|
|
/*
|
|
|
|
* Protect from ipintr() traversing address list
|
|
|
|
* while we're modifying it.
|
|
|
|
*/
|
|
|
|
s = splnet();
|
2002-12-18 11:46:59 +00:00
|
|
|
ifa = &ia->ia_ifa;
|
|
|
|
IFA_LOCK_INIT(ifa);
|
1996-12-13 21:29:07 +00:00
|
|
|
ifa->ifa_addr = (struct sockaddr *)&ia->ia_addr;
|
|
|
|
ifa->ifa_dstaddr = (struct sockaddr *)&ia->ia_dstaddr;
|
|
|
|
ifa->ifa_netmask = (struct sockaddr *)&ia->ia_sockmask;
|
2002-12-18 11:46:59 +00:00
|
|
|
ifa->ifa_refcnt = 1;
|
|
|
|
TAILQ_INSERT_TAIL(&ifp->if_addrhead, ifa, ifa_link);
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
ia->ia_sockmask.sin_len = 8;
|
2001-10-30 15:57:20 +00:00
|
|
|
ia->ia_sockmask.sin_family = AF_INET;
|
1994-05-24 10:09:53 +00:00
|
|
|
if (ifp->if_flags & IFF_BROADCAST) {
|
|
|
|
ia->ia_broadaddr.sin_len = sizeof(ia->ia_addr);
|
|
|
|
ia->ia_broadaddr.sin_family = AF_INET;
|
|
|
|
}
|
|
|
|
ia->ia_ifp = ifp;
|
2005-10-28 20:29:42 +00:00
|
|
|
|
|
|
|
TAILQ_INSERT_TAIL(&in_ifaddrhead, ia, ia_link);
|
1996-04-07 06:59:52 +00:00
|
|
|
splx(s);
|
2001-11-30 14:00:55 +00:00
|
|
|
iaIsNew = 1;
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SIOCSIFBRDADDR:
|
2006-11-06 13:42:10 +00:00
|
|
|
if (td != NULL) {
|
|
|
|
error = priv_check(td, PRIV_NET_ADDIFADDR);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
}
|
1994-05-24 10:09:53 +00:00
|
|
|
/* FALLTHROUGH */
|
|
|
|
|
|
|
|
case SIOCGIFADDR:
|
|
|
|
case SIOCGIFNETMASK:
|
|
|
|
case SIOCGIFDSTADDR:
|
|
|
|
case SIOCGIFBRDADDR:
|
|
|
|
if (ia == (struct in_ifaddr *)0)
|
|
|
|
return (EADDRNOTAVAIL);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
switch (cmd) {
|
|
|
|
|
|
|
|
case SIOCGIFADDR:
|
|
|
|
*((struct sockaddr_in *)&ifr->ifr_addr) = ia->ia_addr;
|
2001-11-30 14:00:55 +00:00
|
|
|
return (0);
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
case SIOCGIFBRDADDR:
|
|
|
|
if ((ifp->if_flags & IFF_BROADCAST) == 0)
|
|
|
|
return (EINVAL);
|
|
|
|
*((struct sockaddr_in *)&ifr->ifr_dstaddr) = ia->ia_broadaddr;
|
2001-11-30 14:00:55 +00:00
|
|
|
return (0);
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
case SIOCGIFDSTADDR:
|
|
|
|
if ((ifp->if_flags & IFF_POINTOPOINT) == 0)
|
|
|
|
return (EINVAL);
|
|
|
|
*((struct sockaddr_in *)&ifr->ifr_dstaddr) = ia->ia_dstaddr;
|
2001-11-30 14:00:55 +00:00
|
|
|
return (0);
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
case SIOCGIFNETMASK:
|
|
|
|
*((struct sockaddr_in *)&ifr->ifr_addr) = ia->ia_sockmask;
|
2001-11-30 14:00:55 +00:00
|
|
|
return (0);
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
case SIOCSIFDSTADDR:
|
|
|
|
if ((ifp->if_flags & IFF_POINTOPOINT) == 0)
|
|
|
|
return (EINVAL);
|
|
|
|
oldaddr = ia->ia_dstaddr;
|
|
|
|
ia->ia_dstaddr = *(struct sockaddr_in *)&ifr->ifr_dstaddr;
|
2005-06-02 00:04:08 +00:00
|
|
|
if (ifp->if_ioctl) {
|
|
|
|
IFF_LOCKGIANT(ifp);
|
|
|
|
error = (*ifp->if_ioctl)(ifp, SIOCSIFDSTADDR,
|
|
|
|
(caddr_t)ia);
|
|
|
|
IFF_UNLOCKGIANT(ifp);
|
|
|
|
if (error) {
|
|
|
|
ia->ia_dstaddr = oldaddr;
|
|
|
|
return (error);
|
|
|
|
}
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
if (ia->ia_flags & IFA_ROUTE) {
|
|
|
|
ia->ia_ifa.ifa_dstaddr = (struct sockaddr *)&oldaddr;
|
|
|
|
rtinit(&(ia->ia_ifa), (int)RTM_DELETE, RTF_HOST);
|
|
|
|
ia->ia_ifa.ifa_dstaddr =
|
|
|
|
(struct sockaddr *)&ia->ia_dstaddr;
|
|
|
|
rtinit(&(ia->ia_ifa), (int)RTM_ADD, RTF_HOST|RTF_UP);
|
|
|
|
}
|
2001-11-30 14:00:55 +00:00
|
|
|
return (0);
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
case SIOCSIFBRDADDR:
|
|
|
|
if ((ifp->if_flags & IFF_BROADCAST) == 0)
|
|
|
|
return (EINVAL);
|
|
|
|
ia->ia_broadaddr = *(struct sockaddr_in *)&ifr->ifr_broadaddr;
|
2001-11-30 14:00:55 +00:00
|
|
|
return (0);
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
case SIOCSIFADDR:
|
2001-11-30 14:00:55 +00:00
|
|
|
error = in_ifinit(ifp, ia,
|
|
|
|
(struct sockaddr_in *) &ifr->ifr_addr, 1);
|
|
|
|
if (error != 0 && iaIsNew)
|
|
|
|
break;
|
2007-03-29 21:39:22 +00:00
|
|
|
if (error == 0) {
|
|
|
|
if (iaIsFirst && (ifp->if_flags & IFF_MULTICAST) != 0)
|
|
|
|
in_addmulti(&allhosts_addr, ifp);
|
2004-02-26 04:27:55 +00:00
|
|
|
EVENTHANDLER_INVOKE(ifaddr_event, ifp);
|
2007-03-29 21:39:22 +00:00
|
|
|
}
|
2001-11-30 14:00:55 +00:00
|
|
|
return (0);
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
case SIOCSIFNETMASK:
|
2001-10-30 15:57:20 +00:00
|
|
|
ia->ia_sockmask.sin_addr = ifra->ifra_addr.sin_addr;
|
|
|
|
ia->ia_subnetmask = ntohl(ia->ia_sockmask.sin_addr.s_addr);
|
2001-11-30 14:00:55 +00:00
|
|
|
return (0);
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
case SIOCAIFADDR:
|
|
|
|
maskIsNew = 0;
|
|
|
|
hostIsNew = 1;
|
|
|
|
error = 0;
|
|
|
|
if (ia->ia_addr.sin_family == AF_INET) {
|
|
|
|
if (ifra->ifra_addr.sin_len == 0) {
|
|
|
|
ifra->ifra_addr = ia->ia_addr;
|
|
|
|
hostIsNew = 0;
|
|
|
|
} else if (ifra->ifra_addr.sin_addr.s_addr ==
|
|
|
|
ia->ia_addr.sin_addr.s_addr)
|
|
|
|
hostIsNew = 0;
|
|
|
|
}
|
|
|
|
if (ifra->ifra_mask.sin_len) {
|
|
|
|
in_ifscrub(ifp, ia);
|
|
|
|
ia->ia_sockmask = ifra->ifra_mask;
|
2001-10-30 15:57:20 +00:00
|
|
|
ia->ia_sockmask.sin_family = AF_INET;
|
1994-05-24 10:09:53 +00:00
|
|
|
ia->ia_subnetmask =
|
|
|
|
ntohl(ia->ia_sockmask.sin_addr.s_addr);
|
|
|
|
maskIsNew = 1;
|
|
|
|
}
|
|
|
|
if ((ifp->if_flags & IFF_POINTOPOINT) &&
|
|
|
|
(ifra->ifra_dstaddr.sin_family == AF_INET)) {
|
|
|
|
in_ifscrub(ifp, ia);
|
|
|
|
ia->ia_dstaddr = ifra->ifra_dstaddr;
|
|
|
|
maskIsNew = 1; /* We lie; but the effect's the same */
|
|
|
|
}
|
|
|
|
if (ifra->ifra_addr.sin_family == AF_INET &&
|
|
|
|
(hostIsNew || maskIsNew))
|
|
|
|
error = in_ifinit(ifp, ia, &ifra->ifra_addr, 0);
|
2001-11-30 14:00:55 +00:00
|
|
|
if (error != 0 && iaIsNew)
|
|
|
|
break;
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
if ((ifp->if_flags & IFF_BROADCAST) &&
|
|
|
|
(ifra->ifra_broadaddr.sin_family == AF_INET))
|
|
|
|
ia->ia_broadaddr = ifra->ifra_broadaddr;
|
2007-03-29 21:39:22 +00:00
|
|
|
if (error == 0) {
|
|
|
|
if (iaIsFirst && (ifp->if_flags & IFF_MULTICAST) != 0)
|
|
|
|
in_addmulti(&allhosts_addr, ifp);
|
2004-02-26 04:27:55 +00:00
|
|
|
EVENTHANDLER_INVOKE(ifaddr_event, ifp);
|
2007-03-29 21:39:22 +00:00
|
|
|
}
|
1994-05-24 10:09:53 +00:00
|
|
|
return (error);
|
|
|
|
|
|
|
|
case SIOCDIFADDR:
|
net/route.c:
A route generated from an RTF_CLONING route had the RTF_WASCLONED flag
set but did not have a reference to the parent route, as documented in
the rtentry(9) manpage. This prevented such routes from being deleted
when their parent route is deleted.
Now, for example, if you delete an IP address from a network interface,
all ARP entries that were cloned from this interface route are flushed.
This also has an impact on netstat(1) output. Previously, dynamically
created ARP cache entries (RTF_STATIC flag is unset) were displayed as
part of the routing table display (-r). Now, they are only printed if
the -a option is given.
netinet/in.c, netinet/in_rmx.c:
When address is removed from an interface, also delete all routes that
point to this interface and address. Previously, for example, if you
changed the address on an interface, outgoing IP datagrams might still
use the old address. The only solution was to delete and re-add some
routes. (The problem is easily observed with the route(8) command.)
Note, that if the socket was already bound to the local address before
this address is removed, new datagrams generated from this socket will
still be sent from the old address.
PR: kern/20785, kern/21914
Reviewed by: wollman (the idea)
2001-03-15 14:52:12 +00:00
|
|
|
/*
|
|
|
|
* in_ifscrub kills the interface route.
|
|
|
|
*/
|
1994-05-24 10:09:53 +00:00
|
|
|
in_ifscrub(ifp, ia);
|
net/route.c:
A route generated from an RTF_CLONING route had the RTF_WASCLONED flag
set but did not have a reference to the parent route, as documented in
the rtentry(9) manpage. This prevented such routes from being deleted
when their parent route is deleted.
Now, for example, if you delete an IP address from a network interface,
all ARP entries that were cloned from this interface route are flushed.
This also has an impact on netstat(1) output. Previously, dynamically
created ARP cache entries (RTF_STATIC flag is unset) were displayed as
part of the routing table display (-r). Now, they are only printed if
the -a option is given.
netinet/in.c, netinet/in_rmx.c:
When address is removed from an interface, also delete all routes that
point to this interface and address. Previously, for example, if you
changed the address on an interface, outgoing IP datagrams might still
use the old address. The only solution was to delete and re-add some
routes. (The problem is easily observed with the route(8) command.)
Note, that if the socket was already bound to the local address before
this address is removed, new datagrams generated from this socket will
still be sent from the old address.
PR: kern/20785, kern/21914
Reviewed by: wollman (the idea)
2001-03-15 14:52:12 +00:00
|
|
|
/*
|
|
|
|
* in_ifadown gets rid of all the rest of
|
|
|
|
* the routes. This is not quite the right
|
|
|
|
* thing to do, but at least if we are running
|
|
|
|
* a routing process they will come back.
|
|
|
|
*/
|
2001-05-11 14:37:34 +00:00
|
|
|
in_ifadown(&ia->ia_ifa, 1);
|
2004-02-26 04:27:55 +00:00
|
|
|
EVENTHANDLER_INVOKE(ifaddr_event, ifp);
|
2001-11-30 14:00:55 +00:00
|
|
|
error = 0;
|
1994-05-24 10:09:53 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
if (ifp == 0 || ifp->if_ioctl == 0)
|
|
|
|
return (EOPNOTSUPP);
|
2005-06-02 00:04:08 +00:00
|
|
|
IFF_LOCKGIANT(ifp);
|
|
|
|
error = (*ifp->if_ioctl)(ifp, cmd, data);
|
|
|
|
IFF_UNLOCKGIANT(ifp);
|
|
|
|
return (error);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
2001-11-30 14:00:55 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Protect from ipintr() traversing address list while we're modifying
|
|
|
|
* it.
|
|
|
|
*/
|
|
|
|
s = splnet();
|
|
|
|
TAILQ_REMOVE(&ifp->if_addrhead, &ia->ia_ifa, ifa_link);
|
|
|
|
TAILQ_REMOVE(&in_ifaddrhead, ia, ia_link);
|
2007-03-29 21:39:22 +00:00
|
|
|
if (ia->ia_addr.sin_family == AF_INET) {
|
2006-01-24 16:19:31 +00:00
|
|
|
LIST_REMOVE(ia, ia_hash);
|
2007-03-29 21:39:22 +00:00
|
|
|
/*
|
|
|
|
* If this is the last IPv4 address configured on this
|
|
|
|
* interface, leave the all-hosts group.
|
|
|
|
* XXX: This is quite ugly because of locking and structure.
|
|
|
|
*/
|
|
|
|
oia = NULL;
|
|
|
|
IFP_TO_IA(ifp, oia);
|
|
|
|
if (oia == NULL) {
|
|
|
|
struct in_multi *inm;
|
|
|
|
|
|
|
|
IFF_LOCKGIANT(ifp);
|
|
|
|
IN_MULTI_LOCK();
|
|
|
|
IN_LOOKUP_MULTI(allhosts_addr, ifp, inm);
|
|
|
|
if (inm != NULL)
|
|
|
|
in_delmulti_locked(inm);
|
|
|
|
IN_MULTI_UNLOCK();
|
|
|
|
IFF_UNLOCKGIANT(ifp);
|
|
|
|
}
|
|
|
|
}
|
2001-11-30 14:00:55 +00:00
|
|
|
IFAFREE(&ia->ia_ifa);
|
|
|
|
splx(s);
|
|
|
|
|
|
|
|
return (error);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
|
1999-12-22 19:13:38 +00:00
|
|
|
/*
|
|
|
|
* SIOC[GAD]LIFADDR.
|
|
|
|
* SIOCGLIFADDR: get first address. (?!?)
|
|
|
|
* SIOCGLIFADDR with IFLR_PREFIX:
|
|
|
|
* get first address that matches the specified prefix.
|
|
|
|
* SIOCALIFADDR: add the specified address.
|
|
|
|
* SIOCALIFADDR with IFLR_PREFIX:
|
|
|
|
* EINVAL since we can't deduce hostid part of the address.
|
|
|
|
* SIOCDLIFADDR: delete the specified address.
|
|
|
|
* SIOCDLIFADDR with IFLR_PREFIX:
|
|
|
|
* delete the first address that matches the specified prefix.
|
|
|
|
* return values:
|
|
|
|
* EINVAL on invalid parameters
|
|
|
|
* EADDRNOTAVAIL on prefix match failed/specified address not found
|
|
|
|
* other values may be returned from in_ioctl()
|
|
|
|
*/
|
|
|
|
static int
|
2007-05-10 15:58:48 +00:00
|
|
|
in_lifaddr_ioctl(struct socket *so, u_long cmd, caddr_t data,
|
|
|
|
struct ifnet *ifp, struct thread *td)
|
1999-12-22 19:13:38 +00:00
|
|
|
{
|
|
|
|
struct if_laddrreq *iflr = (struct if_laddrreq *)data;
|
|
|
|
struct ifaddr *ifa;
|
|
|
|
|
|
|
|
/* sanity checks */
|
|
|
|
if (!data || !ifp) {
|
|
|
|
panic("invalid argument to in_lifaddr_ioctl");
|
|
|
|
/*NOTRECHED*/
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (cmd) {
|
|
|
|
case SIOCGLIFADDR:
|
|
|
|
/* address must be specified on GET with IFLR_PREFIX */
|
|
|
|
if ((iflr->flags & IFLR_PREFIX) == 0)
|
|
|
|
break;
|
|
|
|
/*FALLTHROUGH*/
|
|
|
|
case SIOCALIFADDR:
|
|
|
|
case SIOCDLIFADDR:
|
|
|
|
/* address must be specified on ADD and DELETE */
|
2000-01-13 14:52:53 +00:00
|
|
|
if (iflr->addr.ss_family != AF_INET)
|
1999-12-22 19:13:38 +00:00
|
|
|
return EINVAL;
|
2000-01-13 14:52:53 +00:00
|
|
|
if (iflr->addr.ss_len != sizeof(struct sockaddr_in))
|
1999-12-22 19:13:38 +00:00
|
|
|
return EINVAL;
|
|
|
|
/* XXX need improvement */
|
2000-01-13 14:52:53 +00:00
|
|
|
if (iflr->dstaddr.ss_family
|
|
|
|
&& iflr->dstaddr.ss_family != AF_INET)
|
1999-12-22 19:13:38 +00:00
|
|
|
return EINVAL;
|
2000-01-13 14:52:53 +00:00
|
|
|
if (iflr->dstaddr.ss_family
|
|
|
|
&& iflr->dstaddr.ss_len != sizeof(struct sockaddr_in))
|
1999-12-22 19:13:38 +00:00
|
|
|
return EINVAL;
|
|
|
|
break;
|
|
|
|
default: /*shouldn't happen*/
|
|
|
|
return EOPNOTSUPP;
|
|
|
|
}
|
|
|
|
if (sizeof(struct in_addr) * 8 < iflr->prefixlen)
|
|
|
|
return EINVAL;
|
|
|
|
|
|
|
|
switch (cmd) {
|
|
|
|
case SIOCALIFADDR:
|
|
|
|
{
|
|
|
|
struct in_aliasreq ifra;
|
|
|
|
|
|
|
|
if (iflr->flags & IFLR_PREFIX)
|
|
|
|
return EINVAL;
|
|
|
|
|
|
|
|
/* copy args to in_aliasreq, perform ioctl(SIOCAIFADDR_IN6). */
|
|
|
|
bzero(&ifra, sizeof(ifra));
|
|
|
|
bcopy(iflr->iflr_name, ifra.ifra_name,
|
|
|
|
sizeof(ifra.ifra_name));
|
|
|
|
|
2000-01-13 14:52:53 +00:00
|
|
|
bcopy(&iflr->addr, &ifra.ifra_addr, iflr->addr.ss_len);
|
1999-12-22 19:13:38 +00:00
|
|
|
|
2000-01-13 14:52:53 +00:00
|
|
|
if (iflr->dstaddr.ss_family) { /*XXX*/
|
1999-12-22 19:13:38 +00:00
|
|
|
bcopy(&iflr->dstaddr, &ifra.ifra_dstaddr,
|
2000-01-13 14:52:53 +00:00
|
|
|
iflr->dstaddr.ss_len);
|
1999-12-22 19:13:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
ifra.ifra_mask.sin_family = AF_INET;
|
|
|
|
ifra.ifra_mask.sin_len = sizeof(struct sockaddr_in);
|
|
|
|
in_len2mask(&ifra.ifra_mask.sin_addr, iflr->prefixlen);
|
|
|
|
|
2001-09-12 08:38:13 +00:00
|
|
|
return in_control(so, SIOCAIFADDR, (caddr_t)&ifra, ifp, td);
|
1999-12-22 19:13:38 +00:00
|
|
|
}
|
|
|
|
case SIOCGLIFADDR:
|
|
|
|
case SIOCDLIFADDR:
|
|
|
|
{
|
|
|
|
struct in_ifaddr *ia;
|
|
|
|
struct in_addr mask, candidate, match;
|
|
|
|
struct sockaddr_in *sin;
|
|
|
|
int cmp;
|
|
|
|
|
|
|
|
bzero(&mask, sizeof(mask));
|
|
|
|
if (iflr->flags & IFLR_PREFIX) {
|
|
|
|
/* lookup a prefix rather than address. */
|
|
|
|
in_len2mask(&mask, iflr->prefixlen);
|
|
|
|
|
|
|
|
sin = (struct sockaddr_in *)&iflr->addr;
|
|
|
|
match.s_addr = sin->sin_addr.s_addr;
|
|
|
|
match.s_addr &= mask.s_addr;
|
|
|
|
|
|
|
|
/* if you set extra bits, that's wrong */
|
|
|
|
if (match.s_addr != sin->sin_addr.s_addr)
|
|
|
|
return EINVAL;
|
|
|
|
|
|
|
|
cmp = 1;
|
|
|
|
} else {
|
|
|
|
if (cmd == SIOCGLIFADDR) {
|
|
|
|
/* on getting an address, take the 1st match */
|
|
|
|
cmp = 0; /*XXX*/
|
|
|
|
} else {
|
|
|
|
/* on deleting an address, do exact match */
|
|
|
|
in_len2mask(&mask, 32);
|
|
|
|
sin = (struct sockaddr_in *)&iflr->addr;
|
|
|
|
match.s_addr = sin->sin_addr.s_addr;
|
|
|
|
|
|
|
|
cmp = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
|
|
|
|
if (ifa->ifa_addr->sa_family != AF_INET6)
|
|
|
|
continue;
|
|
|
|
if (!cmp)
|
|
|
|
break;
|
|
|
|
candidate.s_addr = ((struct sockaddr_in *)&ifa->ifa_addr)->sin_addr.s_addr;
|
|
|
|
candidate.s_addr &= mask.s_addr;
|
|
|
|
if (candidate.s_addr == match.s_addr)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (!ifa)
|
|
|
|
return EADDRNOTAVAIL;
|
|
|
|
ia = (struct in_ifaddr *)ifa;
|
|
|
|
|
|
|
|
if (cmd == SIOCGLIFADDR) {
|
|
|
|
/* fill in the if_laddrreq structure */
|
|
|
|
bcopy(&ia->ia_addr, &iflr->addr, ia->ia_addr.sin_len);
|
|
|
|
|
|
|
|
if ((ifp->if_flags & IFF_POINTOPOINT) != 0) {
|
|
|
|
bcopy(&ia->ia_dstaddr, &iflr->dstaddr,
|
|
|
|
ia->ia_dstaddr.sin_len);
|
|
|
|
} else
|
|
|
|
bzero(&iflr->dstaddr, sizeof(iflr->dstaddr));
|
|
|
|
|
|
|
|
iflr->prefixlen =
|
|
|
|
in_mask2len(&ia->ia_sockmask.sin_addr);
|
|
|
|
|
|
|
|
iflr->flags = 0; /*XXX*/
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
} else {
|
|
|
|
struct in_aliasreq ifra;
|
|
|
|
|
|
|
|
/* fill in_aliasreq and do ioctl(SIOCDIFADDR_IN6) */
|
|
|
|
bzero(&ifra, sizeof(ifra));
|
|
|
|
bcopy(iflr->iflr_name, ifra.ifra_name,
|
|
|
|
sizeof(ifra.ifra_name));
|
|
|
|
|
|
|
|
bcopy(&ia->ia_addr, &ifra.ifra_addr,
|
|
|
|
ia->ia_addr.sin_len);
|
|
|
|
if ((ifp->if_flags & IFF_POINTOPOINT) != 0) {
|
|
|
|
bcopy(&ia->ia_dstaddr, &ifra.ifra_dstaddr,
|
|
|
|
ia->ia_dstaddr.sin_len);
|
|
|
|
}
|
|
|
|
bcopy(&ia->ia_sockmask, &ifra.ifra_dstaddr,
|
|
|
|
ia->ia_sockmask.sin_len);
|
|
|
|
|
|
|
|
return in_control(so, SIOCDIFADDR, (caddr_t)&ifra,
|
2001-09-12 08:38:13 +00:00
|
|
|
ifp, td);
|
1999-12-22 19:13:38 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return EOPNOTSUPP; /*just for safety*/
|
|
|
|
}
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
/*
|
|
|
|
* Delete any existing route for an interface.
|
|
|
|
*/
|
1997-02-13 19:46:45 +00:00
|
|
|
void
|
2007-05-10 15:58:48 +00:00
|
|
|
in_ifscrub(struct ifnet *ifp, struct in_ifaddr *ia)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
2007-05-10 15:58:48 +00:00
|
|
|
|
2004-11-12 20:53:51 +00:00
|
|
|
in_scrubprefix(ia);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Initialize an interface's internet address
|
|
|
|
* and routing table entry.
|
|
|
|
*/
|
1995-11-14 20:34:56 +00:00
|
|
|
static int
|
2007-05-10 15:58:48 +00:00
|
|
|
in_ifinit(struct ifnet *ifp, struct in_ifaddr *ia, struct sockaddr_in *sin,
|
|
|
|
int scrub)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
|
|
|
register u_long i = ntohl(sin->sin_addr.s_addr);
|
|
|
|
struct sockaddr_in oldaddr;
|
2002-04-10 01:42:32 +00:00
|
|
|
int s = splimp(), flags = RTF_UP, error = 0;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
oldaddr = ia->ia_addr;
|
2002-10-22 22:50:38 +00:00
|
|
|
if (oldaddr.sin_family == AF_INET)
|
|
|
|
LIST_REMOVE(ia, ia_hash);
|
1994-05-24 10:09:53 +00:00
|
|
|
ia->ia_addr = *sin;
|
2002-10-22 22:50:38 +00:00
|
|
|
if (ia->ia_addr.sin_family == AF_INET)
|
|
|
|
LIST_INSERT_HEAD(INADDR_HASH(ia->ia_addr.sin_addr.s_addr),
|
|
|
|
ia, ia_hash);
|
1994-05-24 10:09:53 +00:00
|
|
|
/*
|
|
|
|
* Give the interface a chance to initialize
|
|
|
|
* if this is its first address,
|
|
|
|
* and to validate the address if necessary.
|
|
|
|
*/
|
2005-06-02 00:04:08 +00:00
|
|
|
if (ifp->if_ioctl) {
|
|
|
|
IFF_LOCKGIANT(ifp);
|
|
|
|
error = (*ifp->if_ioctl)(ifp, SIOCSIFADDR, (caddr_t)ia);
|
|
|
|
IFF_UNLOCKGIANT(ifp);
|
|
|
|
if (error) {
|
|
|
|
splx(s);
|
|
|
|
/* LIST_REMOVE(ia, ia_hash) is done in in_control */
|
|
|
|
ia->ia_addr = oldaddr;
|
|
|
|
if (ia->ia_addr.sin_family == AF_INET)
|
|
|
|
LIST_INSERT_HEAD(INADDR_HASH(
|
|
|
|
ia->ia_addr.sin_addr.s_addr), ia, ia_hash);
|
|
|
|
return (error);
|
|
|
|
}
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
splx(s);
|
|
|
|
if (scrub) {
|
|
|
|
ia->ia_ifa.ifa_addr = (struct sockaddr *)&oldaddr;
|
|
|
|
in_ifscrub(ifp, ia);
|
|
|
|
ia->ia_ifa.ifa_addr = (struct sockaddr *)&ia->ia_addr;
|
|
|
|
}
|
|
|
|
if (IN_CLASSA(i))
|
|
|
|
ia->ia_netmask = IN_CLASSA_NET;
|
|
|
|
else if (IN_CLASSB(i))
|
|
|
|
ia->ia_netmask = IN_CLASSB_NET;
|
|
|
|
else
|
|
|
|
ia->ia_netmask = IN_CLASSC_NET;
|
|
|
|
/*
|
|
|
|
* The subnet mask usually includes at least the standard network part,
|
|
|
|
* but may may be smaller in the case of supernetting.
|
|
|
|
* If it is set, we believe it.
|
|
|
|
*/
|
|
|
|
if (ia->ia_subnetmask == 0) {
|
|
|
|
ia->ia_subnetmask = ia->ia_netmask;
|
|
|
|
ia->ia_sockmask.sin_addr.s_addr = htonl(ia->ia_subnetmask);
|
|
|
|
} else
|
|
|
|
ia->ia_netmask &= ia->ia_subnetmask;
|
|
|
|
ia->ia_net = i & ia->ia_netmask;
|
|
|
|
ia->ia_subnet = i & ia->ia_subnetmask;
|
|
|
|
in_socktrim(&ia->ia_sockmask);
|
2005-03-20 10:27:17 +00:00
|
|
|
#ifdef DEV_CARP
|
|
|
|
/*
|
|
|
|
* XXX: carp(4) does not have interface route
|
|
|
|
*/
|
|
|
|
if (ifp->if_type == IFT_CARP)
|
|
|
|
return (0);
|
|
|
|
#endif
|
1994-05-24 10:09:53 +00:00
|
|
|
/*
|
|
|
|
* Add route for the network.
|
|
|
|
*/
|
|
|
|
ia->ia_ifa.ifa_metric = ifp->if_metric;
|
|
|
|
if (ifp->if_flags & IFF_BROADCAST) {
|
|
|
|
ia->ia_broadaddr.sin_addr.s_addr =
|
|
|
|
htonl(ia->ia_subnet | ~ia->ia_subnetmask);
|
|
|
|
ia->ia_netbroadcast.s_addr =
|
|
|
|
htonl(ia->ia_net | ~ ia->ia_netmask);
|
|
|
|
} else if (ifp->if_flags & IFF_LOOPBACK) {
|
2004-11-17 23:14:03 +00:00
|
|
|
ia->ia_dstaddr = ia->ia_addr;
|
1994-05-24 10:09:53 +00:00
|
|
|
flags |= RTF_HOST;
|
|
|
|
} else if (ifp->if_flags & IFF_POINTOPOINT) {
|
|
|
|
if (ia->ia_dstaddr.sin_family != AF_INET)
|
|
|
|
return (0);
|
|
|
|
flags |= RTF_HOST;
|
|
|
|
}
|
2004-11-12 20:53:51 +00:00
|
|
|
if ((error = in_addprefix(ia, flags)) != 0)
|
|
|
|
return (error);
|
2001-11-30 14:00:55 +00:00
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2004-11-12 20:53:51 +00:00
|
|
|
#define rtinitflags(x) \
|
|
|
|
((((x)->ia_ifp->if_flags & (IFF_LOOPBACK | IFF_POINTOPOINT)) != 0) \
|
|
|
|
? RTF_HOST : 0)
|
|
|
|
/*
|
|
|
|
* Check if we have a route for the given prefix already or add a one
|
|
|
|
* accordingly.
|
|
|
|
*/
|
|
|
|
static int
|
2007-05-10 15:58:48 +00:00
|
|
|
in_addprefix(struct in_ifaddr *target, int flags)
|
2004-11-12 20:53:51 +00:00
|
|
|
{
|
|
|
|
struct in_ifaddr *ia;
|
2005-10-22 14:50:27 +00:00
|
|
|
struct in_addr prefix, mask, p, m;
|
2004-11-12 20:53:51 +00:00
|
|
|
int error;
|
|
|
|
|
|
|
|
if ((flags & RTF_HOST) != 0)
|
|
|
|
prefix = target->ia_dstaddr.sin_addr;
|
|
|
|
else {
|
|
|
|
prefix = target->ia_addr.sin_addr;
|
|
|
|
mask = target->ia_sockmask.sin_addr;
|
|
|
|
prefix.s_addr &= mask.s_addr;
|
|
|
|
}
|
|
|
|
|
|
|
|
TAILQ_FOREACH(ia, &in_ifaddrhead, ia_link) {
|
2005-10-22 14:50:27 +00:00
|
|
|
if (rtinitflags(ia)) {
|
2004-11-12 20:53:51 +00:00
|
|
|
p = ia->ia_addr.sin_addr;
|
|
|
|
|
2005-10-22 14:50:27 +00:00
|
|
|
if (prefix.s_addr != p.s_addr)
|
|
|
|
continue;
|
|
|
|
} else {
|
|
|
|
p = ia->ia_addr.sin_addr;
|
|
|
|
m = ia->ia_sockmask.sin_addr;
|
|
|
|
p.s_addr &= m.s_addr;
|
|
|
|
|
|
|
|
if (prefix.s_addr != p.s_addr ||
|
|
|
|
mask.s_addr != m.s_addr)
|
|
|
|
continue;
|
|
|
|
}
|
2004-11-12 20:53:51 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If we got a matching prefix route inserted by other
|
|
|
|
* interface address, we are done here.
|
|
|
|
*/
|
2005-08-18 10:34:30 +00:00
|
|
|
if (ia->ia_flags & IFA_ROUTE) {
|
|
|
|
if (sameprefixcarponly &&
|
|
|
|
target->ia_ifp->if_type != IFT_CARP &&
|
|
|
|
ia->ia_ifp->if_type != IFT_CARP)
|
|
|
|
return (EEXIST);
|
|
|
|
else
|
|
|
|
return (0);
|
|
|
|
}
|
2004-11-12 20:53:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* No-one seem to have this prefix route, so we try to insert it.
|
|
|
|
*/
|
|
|
|
error = rtinit(&target->ia_ifa, (int)RTM_ADD, flags);
|
|
|
|
if (!error)
|
|
|
|
target->ia_flags |= IFA_ROUTE;
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If there is no other address in the system that can serve a route to the
|
|
|
|
* same prefix, remove the route. Hand over the route to the new address
|
|
|
|
* otherwise.
|
|
|
|
*/
|
|
|
|
static int
|
2007-05-10 15:58:48 +00:00
|
|
|
in_scrubprefix(struct in_ifaddr *target)
|
2004-11-12 20:53:51 +00:00
|
|
|
{
|
|
|
|
struct in_ifaddr *ia;
|
|
|
|
struct in_addr prefix, mask, p;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
if ((target->ia_flags & IFA_ROUTE) == 0)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (rtinitflags(target))
|
|
|
|
prefix = target->ia_dstaddr.sin_addr;
|
|
|
|
else {
|
|
|
|
prefix = target->ia_addr.sin_addr;
|
|
|
|
mask = target->ia_sockmask.sin_addr;
|
|
|
|
prefix.s_addr &= mask.s_addr;
|
|
|
|
}
|
|
|
|
|
|
|
|
TAILQ_FOREACH(ia, &in_ifaddrhead, ia_link) {
|
|
|
|
if (rtinitflags(ia))
|
|
|
|
p = ia->ia_dstaddr.sin_addr;
|
|
|
|
else {
|
|
|
|
p = ia->ia_addr.sin_addr;
|
|
|
|
p.s_addr &= ia->ia_sockmask.sin_addr.s_addr;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (prefix.s_addr != p.s_addr)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If we got a matching prefix address, move IFA_ROUTE and
|
|
|
|
* the route itself to it. Make sure that routing daemons
|
|
|
|
* get a heads-up.
|
2005-03-20 10:27:17 +00:00
|
|
|
*
|
|
|
|
* XXX: a special case for carp(4) interface
|
2004-11-12 20:53:51 +00:00
|
|
|
*/
|
2005-03-20 10:27:17 +00:00
|
|
|
if ((ia->ia_flags & IFA_ROUTE) == 0
|
|
|
|
#ifdef DEV_CARP
|
|
|
|
&& (ia->ia_ifp->if_type != IFT_CARP)
|
|
|
|
#endif
|
|
|
|
) {
|
2004-11-12 20:53:51 +00:00
|
|
|
rtinit(&(target->ia_ifa), (int)RTM_DELETE,
|
|
|
|
rtinitflags(target));
|
|
|
|
target->ia_flags &= ~IFA_ROUTE;
|
|
|
|
|
|
|
|
error = rtinit(&ia->ia_ifa, (int)RTM_ADD,
|
|
|
|
rtinitflags(ia) | RTF_UP);
|
|
|
|
if (error == 0)
|
|
|
|
ia->ia_flags |= IFA_ROUTE;
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* As no-one seem to have this prefix, we can remove the route.
|
|
|
|
*/
|
|
|
|
rtinit(&(target->ia_ifa), (int)RTM_DELETE, rtinitflags(target));
|
|
|
|
target->ia_flags &= ~IFA_ROUTE;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#undef rtinitflags
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Return 1 if the address might be a local broadcast address.
|
|
|
|
*/
|
1994-05-25 09:21:21 +00:00
|
|
|
int
|
2007-05-10 15:58:48 +00:00
|
|
|
in_broadcast(struct in_addr in, struct ifnet *ifp)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
|
|
|
register struct ifaddr *ifa;
|
|
|
|
u_long t;
|
|
|
|
|
|
|
|
if (in.s_addr == INADDR_BROADCAST ||
|
|
|
|
in.s_addr == INADDR_ANY)
|
|
|
|
return 1;
|
|
|
|
if ((ifp->if_flags & IFF_BROADCAST) == 0)
|
|
|
|
return 0;
|
|
|
|
t = ntohl(in.s_addr);
|
|
|
|
/*
|
|
|
|
* Look through the list of addresses for a match
|
|
|
|
* with a broadcast address.
|
|
|
|
*/
|
|
|
|
#define ia ((struct in_ifaddr *)ifa)
|
2001-03-16 20:00:53 +00:00
|
|
|
TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link)
|
1994-05-24 10:09:53 +00:00
|
|
|
if (ifa->ifa_addr->sa_family == AF_INET &&
|
|
|
|
(in.s_addr == ia->ia_broadaddr.sin_addr.s_addr ||
|
|
|
|
in.s_addr == ia->ia_netbroadcast.s_addr ||
|
|
|
|
/*
|
|
|
|
* Check for old-style (host 0) broadcast.
|
|
|
|
*/
|
1996-01-08 20:59:06 +00:00
|
|
|
t == ia->ia_subnet || t == ia->ia_net) &&
|
|
|
|
/*
|
|
|
|
* Check for an all one subnetmask. These
|
|
|
|
* only exist when an interface gets a secondary
|
|
|
|
* address.
|
|
|
|
*/
|
|
|
|
ia->ia_subnetmask != (u_long)0xffffffff)
|
1994-05-24 10:09:53 +00:00
|
|
|
return 1;
|
|
|
|
return (0);
|
|
|
|
#undef ia
|
|
|
|
}
|
2007-03-20 00:36:10 +00:00
|
|
|
|
2006-09-28 10:04:07 +00:00
|
|
|
/*
|
2007-03-20 00:36:10 +00:00
|
|
|
* Delete all IPv4 multicast address records, and associated link-layer
|
|
|
|
* multicast address records, associated with ifp.
|
2006-09-28 10:04:07 +00:00
|
|
|
*/
|
2007-03-20 00:36:10 +00:00
|
|
|
static void
|
|
|
|
in_purgemaddrs(struct ifnet *ifp)
|
2006-09-28 10:04:07 +00:00
|
|
|
{
|
|
|
|
struct in_multi *inm;
|
|
|
|
struct in_multi *oinm;
|
|
|
|
|
2007-03-29 21:39:22 +00:00
|
|
|
#ifdef DIAGNOSTIC
|
|
|
|
printf("%s: purging ifp %p\n", __func__, ifp);
|
|
|
|
#endif
|
2006-09-28 10:04:07 +00:00
|
|
|
IFF_LOCKGIANT(ifp);
|
|
|
|
IN_MULTI_LOCK();
|
|
|
|
LIST_FOREACH_SAFE(inm, &in_multihead, inm_link, oinm) {
|
|
|
|
if (inm->inm_ifp == ifp)
|
|
|
|
in_delmulti_locked(inm);
|
|
|
|
}
|
Introduce in_multi_mtx, which will protect IPv4-layer multicast address
lists, as well as accessor macros. For now, this is a recursive mutex
due code sequences where IPv4 multicast calls into IGMP calls into
ip_output(), which then tests for a multicast forwarding case.
For support macros in in_var.h to check multicast address lists, assert
that in_multi_mtx is held.
Acquire in_multi_mtx around iteration over the IPv4 multicast address
lists, such as in ip_input() and ip_output().
Acquire in_multi_mtx when manipulating the IPv4 layer multicast addresses,
as well as over the manipulation of ifnet multicast address lists in order
to keep the two layers in sync.
Lock down accesses to IPv4 multicast addresses in IGMP, or assert the
lock when performing IGMP join/leave events.
Eliminate spl's associated with IPv4 multicast addresses, portions of
IGMP that weren't previously expunged by IGMP locking.
Add in_multi_mtx, igmp_mtx, and if_addr_mtx lock order to hard-coded
lock order in WITNESS, in that order.
Problem reported by: Ed Maste <emaste at phaedrus dot sandvine dot ca>
MFC after: 10 days
2005-08-03 19:29:47 +00:00
|
|
|
IN_MULTI_UNLOCK();
|
2005-10-03 11:34:29 +00:00
|
|
|
IFF_UNLOCKGIANT(ifp);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
2005-09-18 17:36:28 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* On interface removal, clean up IPv4 data structures hung off of the ifnet.
|
|
|
|
*/
|
|
|
|
void
|
2007-05-10 15:58:48 +00:00
|
|
|
in_ifdetach(struct ifnet *ifp)
|
2005-09-18 17:36:28 +00:00
|
|
|
{
|
|
|
|
|
|
|
|
in_pcbpurgeif0(&ripcbinfo, ifp);
|
|
|
|
in_pcbpurgeif0(&udbinfo, ifp);
|
2007-03-20 00:36:10 +00:00
|
|
|
in_purgemaddrs(ifp);
|
2005-09-18 17:36:28 +00:00
|
|
|
}
|