2005-01-07 01:45:51 +00:00
|
|
|
/*-
|
1994-05-24 10:09:53 +00:00
|
|
|
* Copyright (c) 1982, 1986, 1991, 1993
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
2004-11-13 17:05:40 +00:00
|
|
|
* Copyright (C) 2001 WIDE Project. All rights reserved.
|
1994-05-24 10:09:53 +00:00
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
1995-09-21 17:50:45 +00:00
|
|
|
* @(#)in.c 8.4 (Berkeley) 1/9/95
|
1999-08-28 01:08:13 +00:00
|
|
|
* $FreeBSD$
|
1994-05-24 10:09:53 +00:00
|
|
|
*/
|
|
|
|
|
2005-03-20 10:27:17 +00:00
|
|
|
#include "opt_carp.h"
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/param.h>
|
1994-05-25 09:21:21 +00:00
|
|
|
#include <sys/systm.h>
|
1997-03-24 11:33:46 +00:00
|
|
|
#include <sys/sockio.h>
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/malloc.h>
|
|
|
|
#include <sys/socket.h>
|
1995-12-09 20:43:53 +00:00
|
|
|
#include <sys/kernel.h>
|
|
|
|
#include <sys/sysctl.h>
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
#include <net/if.h>
|
1999-12-22 19:13:38 +00:00
|
|
|
#include <net/if_types.h>
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <net/route.h>
|
|
|
|
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <netinet/in_var.h>
|
2001-08-04 17:10:14 +00:00
|
|
|
#include <netinet/in_pcb.h>
|
1994-05-24 10:09:53 +00:00
|
|
|
|
1995-02-14 06:28:25 +00:00
|
|
|
#include <netinet/igmp_var.h>
|
|
|
|
|
1997-10-12 20:26:33 +00:00
|
|
|
static MALLOC_DEFINE(M_IPMADDR, "in_multi", "internet multicast address");
|
1997-10-11 18:31:40 +00:00
|
|
|
|
2002-03-19 21:25:46 +00:00
|
|
|
static int in_mask2len(struct in_addr *);
|
|
|
|
static void in_len2mask(struct in_addr *, int);
|
|
|
|
static int in_lifaddr_ioctl(struct socket *, u_long, caddr_t,
|
|
|
|
struct ifnet *, struct thread *);
|
1999-12-22 19:13:38 +00:00
|
|
|
|
2004-11-12 20:53:51 +00:00
|
|
|
static int in_addprefix(struct in_ifaddr *, int);
|
|
|
|
static int in_scrubprefix(struct in_ifaddr *);
|
2002-03-19 21:25:46 +00:00
|
|
|
static void in_socktrim(struct sockaddr_in *);
|
|
|
|
static int in_ifinit(struct ifnet *,
|
|
|
|
struct in_ifaddr *, struct sockaddr_in *, int);
|
1994-05-24 10:09:53 +00:00
|
|
|
|
1996-09-09 20:17:24 +00:00
|
|
|
static int subnetsarelocal = 0;
|
2004-08-16 18:32:07 +00:00
|
|
|
SYSCTL_INT(_net_inet_ip, OID_AUTO, subnets_are_local, CTLFLAG_RW,
|
2003-12-30 16:05:03 +00:00
|
|
|
&subnetsarelocal, 0, "Treat all subnets as directly connected");
|
2005-08-18 10:34:30 +00:00
|
|
|
static int sameprefixcarponly = 0;
|
|
|
|
SYSCTL_INT(_net_inet_ip, OID_AUTO, same_prefix_carp_only, CTLFLAG_RW,
|
|
|
|
&sameprefixcarponly, 0,
|
|
|
|
"Refuse to create same prefixes on different interfaces");
|
1997-01-13 21:26:53 +00:00
|
|
|
|
Introduce in_multi_mtx, which will protect IPv4-layer multicast address
lists, as well as accessor macros. For now, this is a recursive mutex
due code sequences where IPv4 multicast calls into IGMP calls into
ip_output(), which then tests for a multicast forwarding case.
For support macros in in_var.h to check multicast address lists, assert
that in_multi_mtx is held.
Acquire in_multi_mtx around iteration over the IPv4 multicast address
lists, such as in ip_input() and ip_output().
Acquire in_multi_mtx when manipulating the IPv4 layer multicast addresses,
as well as over the manipulation of ifnet multicast address lists in order
to keep the two layers in sync.
Lock down accesses to IPv4 multicast addresses in IGMP, or assert the
lock when performing IGMP join/leave events.
Eliminate spl's associated with IPv4 multicast addresses, portions of
IGMP that weren't previously expunged by IGMP locking.
Add in_multi_mtx, igmp_mtx, and if_addr_mtx lock order to hard-coded
lock order in WITNESS, in that order.
Problem reported by: Ed Maste <emaste at phaedrus dot sandvine dot ca>
MFC after: 10 days
2005-08-03 19:29:47 +00:00
|
|
|
/*
|
|
|
|
* The IPv4 multicast list (in_multihead and associated structures) are
|
|
|
|
* protected by the global in_multi_mtx. See in_var.h for more details. For
|
|
|
|
* now, in_multi_mtx is marked as recursible due to IGMP's calling back into
|
|
|
|
* ip_output() to send IGMP packets while holding the lock; this probably is
|
|
|
|
* not quite desirable.
|
|
|
|
*/
|
1997-01-13 21:26:53 +00:00
|
|
|
struct in_multihead in_multihead; /* XXX BSS initialization */
|
Introduce in_multi_mtx, which will protect IPv4-layer multicast address
lists, as well as accessor macros. For now, this is a recursive mutex
due code sequences where IPv4 multicast calls into IGMP calls into
ip_output(), which then tests for a multicast forwarding case.
For support macros in in_var.h to check multicast address lists, assert
that in_multi_mtx is held.
Acquire in_multi_mtx around iteration over the IPv4 multicast address
lists, such as in ip_input() and ip_output().
Acquire in_multi_mtx when manipulating the IPv4 layer multicast addresses,
as well as over the manipulation of ifnet multicast address lists in order
to keep the two layers in sync.
Lock down accesses to IPv4 multicast addresses in IGMP, or assert the
lock when performing IGMP join/leave events.
Eliminate spl's associated with IPv4 multicast addresses, portions of
IGMP that weren't previously expunged by IGMP locking.
Add in_multi_mtx, igmp_mtx, and if_addr_mtx lock order to hard-coded
lock order in WITNESS, in that order.
Problem reported by: Ed Maste <emaste at phaedrus dot sandvine dot ca>
MFC after: 10 days
2005-08-03 19:29:47 +00:00
|
|
|
struct mtx in_multi_mtx;
|
|
|
|
MTX_SYSINIT(in_multi_mtx, &in_multi_mtx, "in_multi_mtx", MTX_DEF | MTX_RECURSE);
|
1997-01-13 21:26:53 +00:00
|
|
|
|
2001-08-04 17:10:14 +00:00
|
|
|
extern struct inpcbinfo ripcbinfo;
|
|
|
|
extern struct inpcbinfo udbinfo;
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
/*
|
|
|
|
* Return 1 if an internet address is for a ``local'' host
|
|
|
|
* (one to which we have a connection). If subnetsarelocal
|
|
|
|
* is true, this includes other subnets of the local net.
|
|
|
|
* Otherwise, it includes only the directly-connected (sub)nets.
|
|
|
|
*/
|
1994-05-25 09:21:21 +00:00
|
|
|
int
|
1994-05-24 10:09:53 +00:00
|
|
|
in_localaddr(in)
|
|
|
|
struct in_addr in;
|
|
|
|
{
|
|
|
|
register u_long i = ntohl(in.s_addr);
|
|
|
|
register struct in_ifaddr *ia;
|
|
|
|
|
|
|
|
if (subnetsarelocal) {
|
2001-03-16 20:00:53 +00:00
|
|
|
TAILQ_FOREACH(ia, &in_ifaddrhead, ia_link)
|
1994-05-24 10:09:53 +00:00
|
|
|
if ((i & ia->ia_netmask) == ia->ia_net)
|
|
|
|
return (1);
|
|
|
|
} else {
|
2001-02-04 16:08:18 +00:00
|
|
|
TAILQ_FOREACH(ia, &in_ifaddrhead, ia_link)
|
1994-05-24 10:09:53 +00:00
|
|
|
if ((i & ia->ia_subnetmask) == ia->ia_subnet)
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2004-08-11 11:49:48 +00:00
|
|
|
/*
|
|
|
|
* Return 1 if an internet address is for the local host and configured
|
|
|
|
* on one of its interfaces.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
in_localip(in)
|
|
|
|
struct in_addr in;
|
|
|
|
{
|
|
|
|
struct in_ifaddr *ia;
|
|
|
|
|
|
|
|
LIST_FOREACH(ia, INADDR_HASH(in.s_addr), ia_hash) {
|
|
|
|
if (IA_SIN(ia)->sin_addr.s_addr == in.s_addr)
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
/*
|
|
|
|
* Determine whether an IP address is in a reserved set of addresses
|
|
|
|
* that may not be forwarded, or whether datagrams to that destination
|
|
|
|
* may be forwarded.
|
|
|
|
*/
|
1994-05-25 09:21:21 +00:00
|
|
|
int
|
1994-05-24 10:09:53 +00:00
|
|
|
in_canforward(in)
|
|
|
|
struct in_addr in;
|
|
|
|
{
|
|
|
|
register u_long i = ntohl(in.s_addr);
|
|
|
|
register u_long net;
|
|
|
|
|
|
|
|
if (IN_EXPERIMENTAL(i) || IN_MULTICAST(i))
|
|
|
|
return (0);
|
|
|
|
if (IN_CLASSA(i)) {
|
|
|
|
net = i & IN_CLASSA_NET;
|
|
|
|
if (net == 0 || net == (IN_LOOPBACKNET << IN_CLASSA_NSHIFT))
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Trim a mask in a sockaddr
|
|
|
|
*/
|
1995-11-14 20:34:56 +00:00
|
|
|
static void
|
1994-05-24 10:09:53 +00:00
|
|
|
in_socktrim(ap)
|
|
|
|
struct sockaddr_in *ap;
|
|
|
|
{
|
|
|
|
register char *cplim = (char *) &ap->sin_addr;
|
|
|
|
register char *cp = (char *) (&ap->sin_addr + 1);
|
|
|
|
|
|
|
|
ap->sin_len = 0;
|
1994-11-03 21:04:21 +00:00
|
|
|
while (--cp >= cplim)
|
2004-08-16 18:32:07 +00:00
|
|
|
if (*cp) {
|
1994-05-24 10:09:53 +00:00
|
|
|
(ap)->sin_len = cp - (char *) (ap) + 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
1999-12-22 19:13:38 +00:00
|
|
|
static int
|
|
|
|
in_mask2len(mask)
|
|
|
|
struct in_addr *mask;
|
|
|
|
{
|
|
|
|
int x, y;
|
|
|
|
u_char *p;
|
|
|
|
|
|
|
|
p = (u_char *)mask;
|
|
|
|
for (x = 0; x < sizeof(*mask); x++) {
|
|
|
|
if (p[x] != 0xff)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
y = 0;
|
|
|
|
if (x < sizeof(*mask)) {
|
|
|
|
for (y = 0; y < 8; y++) {
|
|
|
|
if ((p[x] & (0x80 >> y)) == 0)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return x * 8 + y;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
in_len2mask(mask, len)
|
|
|
|
struct in_addr *mask;
|
|
|
|
int len;
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
u_char *p;
|
|
|
|
|
|
|
|
p = (u_char *)mask;
|
|
|
|
bzero(mask, sizeof(*mask));
|
|
|
|
for (i = 0; i < len / 8; i++)
|
|
|
|
p[i] = 0xff;
|
|
|
|
if (len % 8)
|
|
|
|
p[i] = (0xff00 >> (len % 8)) & 0xff;
|
|
|
|
}
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
/*
|
|
|
|
* Generic internet control operations (ioctl's).
|
|
|
|
* Ifp is 0 if not an interface-specific ioctl.
|
|
|
|
*/
|
|
|
|
/* ARGSUSED */
|
1994-05-25 09:21:21 +00:00
|
|
|
int
|
2001-09-12 08:38:13 +00:00
|
|
|
in_control(so, cmd, data, ifp, td)
|
1994-05-24 10:09:53 +00:00
|
|
|
struct socket *so;
|
1998-06-07 17:13:14 +00:00
|
|
|
u_long cmd;
|
1994-05-24 10:09:53 +00:00
|
|
|
caddr_t data;
|
|
|
|
register struct ifnet *ifp;
|
2001-09-12 08:38:13 +00:00
|
|
|
struct thread *td;
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
|
|
|
register struct ifreq *ifr = (struct ifreq *)data;
|
1996-03-15 17:08:07 +00:00
|
|
|
register struct in_ifaddr *ia = 0, *iap;
|
1994-05-24 10:09:53 +00:00
|
|
|
register struct ifaddr *ifa;
|
2001-09-29 04:34:11 +00:00
|
|
|
struct in_addr dst;
|
1994-05-24 10:09:53 +00:00
|
|
|
struct in_ifaddr *oia;
|
|
|
|
struct in_aliasreq *ifra = (struct in_aliasreq *)data;
|
|
|
|
struct sockaddr_in oldaddr;
|
2001-11-30 14:00:55 +00:00
|
|
|
int error, hostIsNew, iaIsNew, maskIsNew, s;
|
|
|
|
|
|
|
|
iaIsNew = 0;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
1999-12-22 19:13:38 +00:00
|
|
|
switch (cmd) {
|
|
|
|
case SIOCALIFADDR:
|
|
|
|
case SIOCDLIFADDR:
|
2002-04-01 21:31:13 +00:00
|
|
|
if (td && (error = suser(td)) != 0)
|
1999-12-22 19:13:38 +00:00
|
|
|
return error;
|
|
|
|
/*fall through*/
|
|
|
|
case SIOCGLIFADDR:
|
|
|
|
if (!ifp)
|
|
|
|
return EINVAL;
|
2001-09-12 08:38:13 +00:00
|
|
|
return in_lifaddr_ioctl(so, cmd, data, ifp, td);
|
1999-12-22 19:13:38 +00:00
|
|
|
}
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
/*
|
|
|
|
* Find address for this interface, if it exists.
|
1996-03-15 17:08:07 +00:00
|
|
|
*
|
|
|
|
* If an alias address was specified, find that one instead of
|
2001-09-29 04:34:11 +00:00
|
|
|
* the first one on the interface, if possible.
|
1994-05-24 10:09:53 +00:00
|
|
|
*/
|
2001-09-29 04:34:11 +00:00
|
|
|
if (ifp) {
|
|
|
|
dst = ((struct sockaddr_in *)&ifr->ifr_addr)->sin_addr;
|
|
|
|
LIST_FOREACH(iap, INADDR_HASH(dst.s_addr), ia_hash)
|
|
|
|
if (iap->ia_ifp == ifp &&
|
|
|
|
iap->ia_addr.sin_addr.s_addr == dst.s_addr) {
|
|
|
|
ia = iap;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (ia == NULL)
|
|
|
|
TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
|
|
|
|
iap = ifatoia(ifa);
|
|
|
|
if (iap->ia_addr.sin_family == AF_INET) {
|
1996-03-15 17:08:07 +00:00
|
|
|
ia = iap;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2001-09-29 04:34:11 +00:00
|
|
|
}
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
switch (cmd) {
|
|
|
|
|
|
|
|
case SIOCAIFADDR:
|
|
|
|
case SIOCDIFADDR:
|
1998-12-07 05:41:10 +00:00
|
|
|
if (ifp == 0)
|
|
|
|
return (EADDRNOTAVAIL);
|
1995-04-25 19:50:20 +00:00
|
|
|
if (ifra->ifra_addr.sin_family == AF_INET) {
|
2001-02-04 13:13:25 +00:00
|
|
|
for (oia = ia; ia; ia = TAILQ_NEXT(ia, ia_link)) {
|
1995-04-25 19:50:20 +00:00
|
|
|
if (ia->ia_ifp == ifp &&
|
|
|
|
ia->ia_addr.sin_addr.s_addr ==
|
|
|
|
ifra->ifra_addr.sin_addr.s_addr)
|
|
|
|
break;
|
|
|
|
}
|
1995-05-30 08:16:23 +00:00
|
|
|
if ((ifp->if_flags & IFF_POINTOPOINT)
|
1995-04-25 19:50:20 +00:00
|
|
|
&& (cmd == SIOCAIFADDR)
|
|
|
|
&& (ifra->ifra_dstaddr.sin_addr.s_addr
|
|
|
|
== INADDR_ANY)) {
|
1995-07-17 15:15:15 +00:00
|
|
|
return EDESTADDRREQ;
|
1995-04-25 19:50:20 +00:00
|
|
|
}
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
if (cmd == SIOCDIFADDR && ia == 0)
|
|
|
|
return (EADDRNOTAVAIL);
|
|
|
|
/* FALLTHROUGH */
|
|
|
|
case SIOCSIFADDR:
|
|
|
|
case SIOCSIFNETMASK:
|
|
|
|
case SIOCSIFDSTADDR:
|
2002-04-01 21:31:13 +00:00
|
|
|
if (td && (error = suser(td)) != 0)
|
1997-04-27 20:01:29 +00:00
|
|
|
return error;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
if (ifp == 0)
|
1998-12-07 05:41:10 +00:00
|
|
|
return (EADDRNOTAVAIL);
|
1994-05-24 10:09:53 +00:00
|
|
|
if (ia == (struct in_ifaddr *)0) {
|
1996-12-13 21:29:07 +00:00
|
|
|
ia = (struct in_ifaddr *)
|
2003-02-19 05:47:46 +00:00
|
|
|
malloc(sizeof *ia, M_IFADDR, M_WAITOK | M_ZERO);
|
1996-12-13 21:29:07 +00:00
|
|
|
if (ia == (struct in_ifaddr *)NULL)
|
1994-05-24 10:09:53 +00:00
|
|
|
return (ENOBUFS);
|
1996-04-07 06:59:52 +00:00
|
|
|
/*
|
|
|
|
* Protect from ipintr() traversing address list
|
|
|
|
* while we're modifying it.
|
|
|
|
*/
|
|
|
|
s = splnet();
|
2002-12-18 11:46:59 +00:00
|
|
|
ifa = &ia->ia_ifa;
|
|
|
|
IFA_LOCK_INIT(ifa);
|
1996-12-13 21:29:07 +00:00
|
|
|
ifa->ifa_addr = (struct sockaddr *)&ia->ia_addr;
|
|
|
|
ifa->ifa_dstaddr = (struct sockaddr *)&ia->ia_dstaddr;
|
|
|
|
ifa->ifa_netmask = (struct sockaddr *)&ia->ia_sockmask;
|
2002-12-18 11:46:59 +00:00
|
|
|
ifa->ifa_refcnt = 1;
|
|
|
|
TAILQ_INSERT_TAIL(&ifp->if_addrhead, ifa, ifa_link);
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
ia->ia_sockmask.sin_len = 8;
|
2001-10-30 15:57:20 +00:00
|
|
|
ia->ia_sockmask.sin_family = AF_INET;
|
1994-05-24 10:09:53 +00:00
|
|
|
if (ifp->if_flags & IFF_BROADCAST) {
|
|
|
|
ia->ia_broadaddr.sin_len = sizeof(ia->ia_addr);
|
|
|
|
ia->ia_broadaddr.sin_family = AF_INET;
|
|
|
|
}
|
|
|
|
ia->ia_ifp = ifp;
|
2005-10-28 20:29:42 +00:00
|
|
|
|
|
|
|
TAILQ_INSERT_TAIL(&in_ifaddrhead, ia, ia_link);
|
1996-04-07 06:59:52 +00:00
|
|
|
splx(s);
|
2001-11-30 14:00:55 +00:00
|
|
|
iaIsNew = 1;
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SIOCSIFBRDADDR:
|
2002-04-01 21:31:13 +00:00
|
|
|
if (td && (error = suser(td)) != 0)
|
1997-04-27 20:01:29 +00:00
|
|
|
return error;
|
1994-05-24 10:09:53 +00:00
|
|
|
/* FALLTHROUGH */
|
|
|
|
|
|
|
|
case SIOCGIFADDR:
|
|
|
|
case SIOCGIFNETMASK:
|
|
|
|
case SIOCGIFDSTADDR:
|
|
|
|
case SIOCGIFBRDADDR:
|
|
|
|
if (ia == (struct in_ifaddr *)0)
|
|
|
|
return (EADDRNOTAVAIL);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
switch (cmd) {
|
|
|
|
|
|
|
|
case SIOCGIFADDR:
|
|
|
|
*((struct sockaddr_in *)&ifr->ifr_addr) = ia->ia_addr;
|
2001-11-30 14:00:55 +00:00
|
|
|
return (0);
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
case SIOCGIFBRDADDR:
|
|
|
|
if ((ifp->if_flags & IFF_BROADCAST) == 0)
|
|
|
|
return (EINVAL);
|
|
|
|
*((struct sockaddr_in *)&ifr->ifr_dstaddr) = ia->ia_broadaddr;
|
2001-11-30 14:00:55 +00:00
|
|
|
return (0);
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
case SIOCGIFDSTADDR:
|
|
|
|
if ((ifp->if_flags & IFF_POINTOPOINT) == 0)
|
|
|
|
return (EINVAL);
|
|
|
|
*((struct sockaddr_in *)&ifr->ifr_dstaddr) = ia->ia_dstaddr;
|
2001-11-30 14:00:55 +00:00
|
|
|
return (0);
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
case SIOCGIFNETMASK:
|
|
|
|
*((struct sockaddr_in *)&ifr->ifr_addr) = ia->ia_sockmask;
|
2001-11-30 14:00:55 +00:00
|
|
|
return (0);
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
case SIOCSIFDSTADDR:
|
|
|
|
if ((ifp->if_flags & IFF_POINTOPOINT) == 0)
|
|
|
|
return (EINVAL);
|
|
|
|
oldaddr = ia->ia_dstaddr;
|
|
|
|
ia->ia_dstaddr = *(struct sockaddr_in *)&ifr->ifr_dstaddr;
|
2005-06-02 00:04:08 +00:00
|
|
|
if (ifp->if_ioctl) {
|
|
|
|
IFF_LOCKGIANT(ifp);
|
|
|
|
error = (*ifp->if_ioctl)(ifp, SIOCSIFDSTADDR,
|
|
|
|
(caddr_t)ia);
|
|
|
|
IFF_UNLOCKGIANT(ifp);
|
|
|
|
if (error) {
|
|
|
|
ia->ia_dstaddr = oldaddr;
|
|
|
|
return (error);
|
|
|
|
}
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
if (ia->ia_flags & IFA_ROUTE) {
|
|
|
|
ia->ia_ifa.ifa_dstaddr = (struct sockaddr *)&oldaddr;
|
|
|
|
rtinit(&(ia->ia_ifa), (int)RTM_DELETE, RTF_HOST);
|
|
|
|
ia->ia_ifa.ifa_dstaddr =
|
|
|
|
(struct sockaddr *)&ia->ia_dstaddr;
|
|
|
|
rtinit(&(ia->ia_ifa), (int)RTM_ADD, RTF_HOST|RTF_UP);
|
|
|
|
}
|
2001-11-30 14:00:55 +00:00
|
|
|
return (0);
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
case SIOCSIFBRDADDR:
|
|
|
|
if ((ifp->if_flags & IFF_BROADCAST) == 0)
|
|
|
|
return (EINVAL);
|
|
|
|
ia->ia_broadaddr = *(struct sockaddr_in *)&ifr->ifr_broadaddr;
|
2001-11-30 14:00:55 +00:00
|
|
|
return (0);
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
case SIOCSIFADDR:
|
2001-11-30 14:00:55 +00:00
|
|
|
error = in_ifinit(ifp, ia,
|
|
|
|
(struct sockaddr_in *) &ifr->ifr_addr, 1);
|
|
|
|
if (error != 0 && iaIsNew)
|
|
|
|
break;
|
2004-02-26 04:27:55 +00:00
|
|
|
if (error == 0)
|
|
|
|
EVENTHANDLER_INVOKE(ifaddr_event, ifp);
|
2001-11-30 14:00:55 +00:00
|
|
|
return (0);
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
case SIOCSIFNETMASK:
|
2001-10-30 15:57:20 +00:00
|
|
|
ia->ia_sockmask.sin_addr = ifra->ifra_addr.sin_addr;
|
|
|
|
ia->ia_subnetmask = ntohl(ia->ia_sockmask.sin_addr.s_addr);
|
2001-11-30 14:00:55 +00:00
|
|
|
return (0);
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
case SIOCAIFADDR:
|
|
|
|
maskIsNew = 0;
|
|
|
|
hostIsNew = 1;
|
|
|
|
error = 0;
|
|
|
|
if (ia->ia_addr.sin_family == AF_INET) {
|
|
|
|
if (ifra->ifra_addr.sin_len == 0) {
|
|
|
|
ifra->ifra_addr = ia->ia_addr;
|
|
|
|
hostIsNew = 0;
|
|
|
|
} else if (ifra->ifra_addr.sin_addr.s_addr ==
|
|
|
|
ia->ia_addr.sin_addr.s_addr)
|
|
|
|
hostIsNew = 0;
|
|
|
|
}
|
|
|
|
if (ifra->ifra_mask.sin_len) {
|
|
|
|
in_ifscrub(ifp, ia);
|
|
|
|
ia->ia_sockmask = ifra->ifra_mask;
|
2001-10-30 15:57:20 +00:00
|
|
|
ia->ia_sockmask.sin_family = AF_INET;
|
1994-05-24 10:09:53 +00:00
|
|
|
ia->ia_subnetmask =
|
|
|
|
ntohl(ia->ia_sockmask.sin_addr.s_addr);
|
|
|
|
maskIsNew = 1;
|
|
|
|
}
|
|
|
|
if ((ifp->if_flags & IFF_POINTOPOINT) &&
|
|
|
|
(ifra->ifra_dstaddr.sin_family == AF_INET)) {
|
|
|
|
in_ifscrub(ifp, ia);
|
|
|
|
ia->ia_dstaddr = ifra->ifra_dstaddr;
|
|
|
|
maskIsNew = 1; /* We lie; but the effect's the same */
|
|
|
|
}
|
|
|
|
if (ifra->ifra_addr.sin_family == AF_INET &&
|
|
|
|
(hostIsNew || maskIsNew))
|
|
|
|
error = in_ifinit(ifp, ia, &ifra->ifra_addr, 0);
|
2001-11-30 14:00:55 +00:00
|
|
|
if (error != 0 && iaIsNew)
|
|
|
|
break;
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
if ((ifp->if_flags & IFF_BROADCAST) &&
|
|
|
|
(ifra->ifra_broadaddr.sin_family == AF_INET))
|
|
|
|
ia->ia_broadaddr = ifra->ifra_broadaddr;
|
2004-02-26 04:27:55 +00:00
|
|
|
if (error == 0)
|
|
|
|
EVENTHANDLER_INVOKE(ifaddr_event, ifp);
|
1994-05-24 10:09:53 +00:00
|
|
|
return (error);
|
|
|
|
|
|
|
|
case SIOCDIFADDR:
|
net/route.c:
A route generated from an RTF_CLONING route had the RTF_WASCLONED flag
set but did not have a reference to the parent route, as documented in
the rtentry(9) manpage. This prevented such routes from being deleted
when their parent route is deleted.
Now, for example, if you delete an IP address from a network interface,
all ARP entries that were cloned from this interface route are flushed.
This also has an impact on netstat(1) output. Previously, dynamically
created ARP cache entries (RTF_STATIC flag is unset) were displayed as
part of the routing table display (-r). Now, they are only printed if
the -a option is given.
netinet/in.c, netinet/in_rmx.c:
When address is removed from an interface, also delete all routes that
point to this interface and address. Previously, for example, if you
changed the address on an interface, outgoing IP datagrams might still
use the old address. The only solution was to delete and re-add some
routes. (The problem is easily observed with the route(8) command.)
Note, that if the socket was already bound to the local address before
this address is removed, new datagrams generated from this socket will
still be sent from the old address.
PR: kern/20785, kern/21914
Reviewed by: wollman (the idea)
2001-03-15 14:52:12 +00:00
|
|
|
/*
|
|
|
|
* in_ifscrub kills the interface route.
|
|
|
|
*/
|
1994-05-24 10:09:53 +00:00
|
|
|
in_ifscrub(ifp, ia);
|
net/route.c:
A route generated from an RTF_CLONING route had the RTF_WASCLONED flag
set but did not have a reference to the parent route, as documented in
the rtentry(9) manpage. This prevented such routes from being deleted
when their parent route is deleted.
Now, for example, if you delete an IP address from a network interface,
all ARP entries that were cloned from this interface route are flushed.
This also has an impact on netstat(1) output. Previously, dynamically
created ARP cache entries (RTF_STATIC flag is unset) were displayed as
part of the routing table display (-r). Now, they are only printed if
the -a option is given.
netinet/in.c, netinet/in_rmx.c:
When address is removed from an interface, also delete all routes that
point to this interface and address. Previously, for example, if you
changed the address on an interface, outgoing IP datagrams might still
use the old address. The only solution was to delete and re-add some
routes. (The problem is easily observed with the route(8) command.)
Note, that if the socket was already bound to the local address before
this address is removed, new datagrams generated from this socket will
still be sent from the old address.
PR: kern/20785, kern/21914
Reviewed by: wollman (the idea)
2001-03-15 14:52:12 +00:00
|
|
|
/*
|
|
|
|
* in_ifadown gets rid of all the rest of
|
|
|
|
* the routes. This is not quite the right
|
|
|
|
* thing to do, but at least if we are running
|
|
|
|
* a routing process they will come back.
|
|
|
|
*/
|
2001-05-11 14:37:34 +00:00
|
|
|
in_ifadown(&ia->ia_ifa, 1);
|
2004-02-26 04:27:55 +00:00
|
|
|
EVENTHANDLER_INVOKE(ifaddr_event, ifp);
|
2001-11-30 14:00:55 +00:00
|
|
|
error = 0;
|
1994-05-24 10:09:53 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
if (ifp == 0 || ifp->if_ioctl == 0)
|
|
|
|
return (EOPNOTSUPP);
|
2005-06-02 00:04:08 +00:00
|
|
|
IFF_LOCKGIANT(ifp);
|
|
|
|
error = (*ifp->if_ioctl)(ifp, cmd, data);
|
|
|
|
IFF_UNLOCKGIANT(ifp);
|
|
|
|
return (error);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
2001-11-30 14:00:55 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Protect from ipintr() traversing address list while we're modifying
|
|
|
|
* it.
|
|
|
|
*/
|
|
|
|
s = splnet();
|
|
|
|
TAILQ_REMOVE(&ifp->if_addrhead, &ia->ia_ifa, ifa_link);
|
|
|
|
TAILQ_REMOVE(&in_ifaddrhead, ia, ia_link);
|
2006-01-24 16:19:31 +00:00
|
|
|
if (ia->ia_addr.sin_family == AF_INET)
|
|
|
|
LIST_REMOVE(ia, ia_hash);
|
2001-11-30 14:00:55 +00:00
|
|
|
IFAFREE(&ia->ia_ifa);
|
|
|
|
splx(s);
|
|
|
|
|
|
|
|
return (error);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
|
1999-12-22 19:13:38 +00:00
|
|
|
/*
|
|
|
|
* SIOC[GAD]LIFADDR.
|
|
|
|
* SIOCGLIFADDR: get first address. (?!?)
|
|
|
|
* SIOCGLIFADDR with IFLR_PREFIX:
|
|
|
|
* get first address that matches the specified prefix.
|
|
|
|
* SIOCALIFADDR: add the specified address.
|
|
|
|
* SIOCALIFADDR with IFLR_PREFIX:
|
|
|
|
* EINVAL since we can't deduce hostid part of the address.
|
|
|
|
* SIOCDLIFADDR: delete the specified address.
|
|
|
|
* SIOCDLIFADDR with IFLR_PREFIX:
|
|
|
|
* delete the first address that matches the specified prefix.
|
|
|
|
* return values:
|
|
|
|
* EINVAL on invalid parameters
|
|
|
|
* EADDRNOTAVAIL on prefix match failed/specified address not found
|
|
|
|
* other values may be returned from in_ioctl()
|
|
|
|
*/
|
|
|
|
static int
|
2001-09-12 08:38:13 +00:00
|
|
|
in_lifaddr_ioctl(so, cmd, data, ifp, td)
|
1999-12-22 19:13:38 +00:00
|
|
|
struct socket *so;
|
|
|
|
u_long cmd;
|
|
|
|
caddr_t data;
|
|
|
|
struct ifnet *ifp;
|
2001-09-12 08:38:13 +00:00
|
|
|
struct thread *td;
|
1999-12-22 19:13:38 +00:00
|
|
|
{
|
|
|
|
struct if_laddrreq *iflr = (struct if_laddrreq *)data;
|
|
|
|
struct ifaddr *ifa;
|
|
|
|
|
|
|
|
/* sanity checks */
|
|
|
|
if (!data || !ifp) {
|
|
|
|
panic("invalid argument to in_lifaddr_ioctl");
|
|
|
|
/*NOTRECHED*/
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (cmd) {
|
|
|
|
case SIOCGLIFADDR:
|
|
|
|
/* address must be specified on GET with IFLR_PREFIX */
|
|
|
|
if ((iflr->flags & IFLR_PREFIX) == 0)
|
|
|
|
break;
|
|
|
|
/*FALLTHROUGH*/
|
|
|
|
case SIOCALIFADDR:
|
|
|
|
case SIOCDLIFADDR:
|
|
|
|
/* address must be specified on ADD and DELETE */
|
2000-01-13 14:52:53 +00:00
|
|
|
if (iflr->addr.ss_family != AF_INET)
|
1999-12-22 19:13:38 +00:00
|
|
|
return EINVAL;
|
2000-01-13 14:52:53 +00:00
|
|
|
if (iflr->addr.ss_len != sizeof(struct sockaddr_in))
|
1999-12-22 19:13:38 +00:00
|
|
|
return EINVAL;
|
|
|
|
/* XXX need improvement */
|
2000-01-13 14:52:53 +00:00
|
|
|
if (iflr->dstaddr.ss_family
|
|
|
|
&& iflr->dstaddr.ss_family != AF_INET)
|
1999-12-22 19:13:38 +00:00
|
|
|
return EINVAL;
|
2000-01-13 14:52:53 +00:00
|
|
|
if (iflr->dstaddr.ss_family
|
|
|
|
&& iflr->dstaddr.ss_len != sizeof(struct sockaddr_in))
|
1999-12-22 19:13:38 +00:00
|
|
|
return EINVAL;
|
|
|
|
break;
|
|
|
|
default: /*shouldn't happen*/
|
|
|
|
return EOPNOTSUPP;
|
|
|
|
}
|
|
|
|
if (sizeof(struct in_addr) * 8 < iflr->prefixlen)
|
|
|
|
return EINVAL;
|
|
|
|
|
|
|
|
switch (cmd) {
|
|
|
|
case SIOCALIFADDR:
|
|
|
|
{
|
|
|
|
struct in_aliasreq ifra;
|
|
|
|
|
|
|
|
if (iflr->flags & IFLR_PREFIX)
|
|
|
|
return EINVAL;
|
|
|
|
|
|
|
|
/* copy args to in_aliasreq, perform ioctl(SIOCAIFADDR_IN6). */
|
|
|
|
bzero(&ifra, sizeof(ifra));
|
|
|
|
bcopy(iflr->iflr_name, ifra.ifra_name,
|
|
|
|
sizeof(ifra.ifra_name));
|
|
|
|
|
2000-01-13 14:52:53 +00:00
|
|
|
bcopy(&iflr->addr, &ifra.ifra_addr, iflr->addr.ss_len);
|
1999-12-22 19:13:38 +00:00
|
|
|
|
2000-01-13 14:52:53 +00:00
|
|
|
if (iflr->dstaddr.ss_family) { /*XXX*/
|
1999-12-22 19:13:38 +00:00
|
|
|
bcopy(&iflr->dstaddr, &ifra.ifra_dstaddr,
|
2000-01-13 14:52:53 +00:00
|
|
|
iflr->dstaddr.ss_len);
|
1999-12-22 19:13:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
ifra.ifra_mask.sin_family = AF_INET;
|
|
|
|
ifra.ifra_mask.sin_len = sizeof(struct sockaddr_in);
|
|
|
|
in_len2mask(&ifra.ifra_mask.sin_addr, iflr->prefixlen);
|
|
|
|
|
2001-09-12 08:38:13 +00:00
|
|
|
return in_control(so, SIOCAIFADDR, (caddr_t)&ifra, ifp, td);
|
1999-12-22 19:13:38 +00:00
|
|
|
}
|
|
|
|
case SIOCGLIFADDR:
|
|
|
|
case SIOCDLIFADDR:
|
|
|
|
{
|
|
|
|
struct in_ifaddr *ia;
|
|
|
|
struct in_addr mask, candidate, match;
|
|
|
|
struct sockaddr_in *sin;
|
|
|
|
int cmp;
|
|
|
|
|
|
|
|
bzero(&mask, sizeof(mask));
|
|
|
|
if (iflr->flags & IFLR_PREFIX) {
|
|
|
|
/* lookup a prefix rather than address. */
|
|
|
|
in_len2mask(&mask, iflr->prefixlen);
|
|
|
|
|
|
|
|
sin = (struct sockaddr_in *)&iflr->addr;
|
|
|
|
match.s_addr = sin->sin_addr.s_addr;
|
|
|
|
match.s_addr &= mask.s_addr;
|
|
|
|
|
|
|
|
/* if you set extra bits, that's wrong */
|
|
|
|
if (match.s_addr != sin->sin_addr.s_addr)
|
|
|
|
return EINVAL;
|
|
|
|
|
|
|
|
cmp = 1;
|
|
|
|
} else {
|
|
|
|
if (cmd == SIOCGLIFADDR) {
|
|
|
|
/* on getting an address, take the 1st match */
|
|
|
|
cmp = 0; /*XXX*/
|
|
|
|
} else {
|
|
|
|
/* on deleting an address, do exact match */
|
|
|
|
in_len2mask(&mask, 32);
|
|
|
|
sin = (struct sockaddr_in *)&iflr->addr;
|
|
|
|
match.s_addr = sin->sin_addr.s_addr;
|
|
|
|
|
|
|
|
cmp = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
|
|
|
|
if (ifa->ifa_addr->sa_family != AF_INET6)
|
|
|
|
continue;
|
|
|
|
if (!cmp)
|
|
|
|
break;
|
|
|
|
candidate.s_addr = ((struct sockaddr_in *)&ifa->ifa_addr)->sin_addr.s_addr;
|
|
|
|
candidate.s_addr &= mask.s_addr;
|
|
|
|
if (candidate.s_addr == match.s_addr)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (!ifa)
|
|
|
|
return EADDRNOTAVAIL;
|
|
|
|
ia = (struct in_ifaddr *)ifa;
|
|
|
|
|
|
|
|
if (cmd == SIOCGLIFADDR) {
|
|
|
|
/* fill in the if_laddrreq structure */
|
|
|
|
bcopy(&ia->ia_addr, &iflr->addr, ia->ia_addr.sin_len);
|
|
|
|
|
|
|
|
if ((ifp->if_flags & IFF_POINTOPOINT) != 0) {
|
|
|
|
bcopy(&ia->ia_dstaddr, &iflr->dstaddr,
|
|
|
|
ia->ia_dstaddr.sin_len);
|
|
|
|
} else
|
|
|
|
bzero(&iflr->dstaddr, sizeof(iflr->dstaddr));
|
|
|
|
|
|
|
|
iflr->prefixlen =
|
|
|
|
in_mask2len(&ia->ia_sockmask.sin_addr);
|
|
|
|
|
|
|
|
iflr->flags = 0; /*XXX*/
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
} else {
|
|
|
|
struct in_aliasreq ifra;
|
|
|
|
|
|
|
|
/* fill in_aliasreq and do ioctl(SIOCDIFADDR_IN6) */
|
|
|
|
bzero(&ifra, sizeof(ifra));
|
|
|
|
bcopy(iflr->iflr_name, ifra.ifra_name,
|
|
|
|
sizeof(ifra.ifra_name));
|
|
|
|
|
|
|
|
bcopy(&ia->ia_addr, &ifra.ifra_addr,
|
|
|
|
ia->ia_addr.sin_len);
|
|
|
|
if ((ifp->if_flags & IFF_POINTOPOINT) != 0) {
|
|
|
|
bcopy(&ia->ia_dstaddr, &ifra.ifra_dstaddr,
|
|
|
|
ia->ia_dstaddr.sin_len);
|
|
|
|
}
|
|
|
|
bcopy(&ia->ia_sockmask, &ifra.ifra_dstaddr,
|
|
|
|
ia->ia_sockmask.sin_len);
|
|
|
|
|
|
|
|
return in_control(so, SIOCDIFADDR, (caddr_t)&ifra,
|
2001-09-12 08:38:13 +00:00
|
|
|
ifp, td);
|
1999-12-22 19:13:38 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return EOPNOTSUPP; /*just for safety*/
|
|
|
|
}
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
/*
|
|
|
|
* Delete any existing route for an interface.
|
|
|
|
*/
|
1997-02-13 19:46:45 +00:00
|
|
|
void
|
1994-05-24 10:09:53 +00:00
|
|
|
in_ifscrub(ifp, ia)
|
|
|
|
register struct ifnet *ifp;
|
|
|
|
register struct in_ifaddr *ia;
|
|
|
|
{
|
2004-11-12 20:53:51 +00:00
|
|
|
in_scrubprefix(ia);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Initialize an interface's internet address
|
|
|
|
* and routing table entry.
|
|
|
|
*/
|
1995-11-14 20:34:56 +00:00
|
|
|
static int
|
1994-05-24 10:09:53 +00:00
|
|
|
in_ifinit(ifp, ia, sin, scrub)
|
|
|
|
register struct ifnet *ifp;
|
|
|
|
register struct in_ifaddr *ia;
|
|
|
|
struct sockaddr_in *sin;
|
|
|
|
int scrub;
|
|
|
|
{
|
|
|
|
register u_long i = ntohl(sin->sin_addr.s_addr);
|
|
|
|
struct sockaddr_in oldaddr;
|
2002-04-10 01:42:32 +00:00
|
|
|
int s = splimp(), flags = RTF_UP, error = 0;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
oldaddr = ia->ia_addr;
|
2002-10-22 22:50:38 +00:00
|
|
|
if (oldaddr.sin_family == AF_INET)
|
|
|
|
LIST_REMOVE(ia, ia_hash);
|
1994-05-24 10:09:53 +00:00
|
|
|
ia->ia_addr = *sin;
|
2002-10-22 22:50:38 +00:00
|
|
|
if (ia->ia_addr.sin_family == AF_INET)
|
|
|
|
LIST_INSERT_HEAD(INADDR_HASH(ia->ia_addr.sin_addr.s_addr),
|
|
|
|
ia, ia_hash);
|
1994-05-24 10:09:53 +00:00
|
|
|
/*
|
|
|
|
* Give the interface a chance to initialize
|
|
|
|
* if this is its first address,
|
|
|
|
* and to validate the address if necessary.
|
|
|
|
*/
|
2005-06-02 00:04:08 +00:00
|
|
|
if (ifp->if_ioctl) {
|
|
|
|
IFF_LOCKGIANT(ifp);
|
|
|
|
error = (*ifp->if_ioctl)(ifp, SIOCSIFADDR, (caddr_t)ia);
|
|
|
|
IFF_UNLOCKGIANT(ifp);
|
|
|
|
if (error) {
|
|
|
|
splx(s);
|
|
|
|
/* LIST_REMOVE(ia, ia_hash) is done in in_control */
|
|
|
|
ia->ia_addr = oldaddr;
|
|
|
|
if (ia->ia_addr.sin_family == AF_INET)
|
|
|
|
LIST_INSERT_HEAD(INADDR_HASH(
|
|
|
|
ia->ia_addr.sin_addr.s_addr), ia, ia_hash);
|
|
|
|
return (error);
|
|
|
|
}
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
splx(s);
|
|
|
|
if (scrub) {
|
|
|
|
ia->ia_ifa.ifa_addr = (struct sockaddr *)&oldaddr;
|
|
|
|
in_ifscrub(ifp, ia);
|
|
|
|
ia->ia_ifa.ifa_addr = (struct sockaddr *)&ia->ia_addr;
|
|
|
|
}
|
|
|
|
if (IN_CLASSA(i))
|
|
|
|
ia->ia_netmask = IN_CLASSA_NET;
|
|
|
|
else if (IN_CLASSB(i))
|
|
|
|
ia->ia_netmask = IN_CLASSB_NET;
|
|
|
|
else
|
|
|
|
ia->ia_netmask = IN_CLASSC_NET;
|
|
|
|
/*
|
|
|
|
* The subnet mask usually includes at least the standard network part,
|
|
|
|
* but may may be smaller in the case of supernetting.
|
|
|
|
* If it is set, we believe it.
|
|
|
|
*/
|
|
|
|
if (ia->ia_subnetmask == 0) {
|
|
|
|
ia->ia_subnetmask = ia->ia_netmask;
|
|
|
|
ia->ia_sockmask.sin_addr.s_addr = htonl(ia->ia_subnetmask);
|
|
|
|
} else
|
|
|
|
ia->ia_netmask &= ia->ia_subnetmask;
|
|
|
|
ia->ia_net = i & ia->ia_netmask;
|
|
|
|
ia->ia_subnet = i & ia->ia_subnetmask;
|
|
|
|
in_socktrim(&ia->ia_sockmask);
|
2005-03-20 10:27:17 +00:00
|
|
|
#ifdef DEV_CARP
|
|
|
|
/*
|
|
|
|
* XXX: carp(4) does not have interface route
|
|
|
|
*/
|
|
|
|
if (ifp->if_type == IFT_CARP)
|
|
|
|
return (0);
|
|
|
|
#endif
|
1994-05-24 10:09:53 +00:00
|
|
|
/*
|
|
|
|
* Add route for the network.
|
|
|
|
*/
|
|
|
|
ia->ia_ifa.ifa_metric = ifp->if_metric;
|
|
|
|
if (ifp->if_flags & IFF_BROADCAST) {
|
|
|
|
ia->ia_broadaddr.sin_addr.s_addr =
|
|
|
|
htonl(ia->ia_subnet | ~ia->ia_subnetmask);
|
|
|
|
ia->ia_netbroadcast.s_addr =
|
|
|
|
htonl(ia->ia_net | ~ ia->ia_netmask);
|
|
|
|
} else if (ifp->if_flags & IFF_LOOPBACK) {
|
2004-11-17 23:14:03 +00:00
|
|
|
ia->ia_dstaddr = ia->ia_addr;
|
1994-05-24 10:09:53 +00:00
|
|
|
flags |= RTF_HOST;
|
|
|
|
} else if (ifp->if_flags & IFF_POINTOPOINT) {
|
|
|
|
if (ia->ia_dstaddr.sin_family != AF_INET)
|
|
|
|
return (0);
|
|
|
|
flags |= RTF_HOST;
|
|
|
|
}
|
2004-11-12 20:53:51 +00:00
|
|
|
if ((error = in_addprefix(ia, flags)) != 0)
|
|
|
|
return (error);
|
2001-11-30 14:00:55 +00:00
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
/*
|
|
|
|
* If the interface supports multicast, join the "all hosts"
|
|
|
|
* multicast group on that interface.
|
|
|
|
*/
|
|
|
|
if (ifp->if_flags & IFF_MULTICAST) {
|
|
|
|
struct in_addr addr;
|
|
|
|
|
|
|
|
addr.s_addr = htonl(INADDR_ALLHOSTS_GROUP);
|
|
|
|
in_addmulti(&addr, ifp);
|
|
|
|
}
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2004-11-12 20:53:51 +00:00
|
|
|
#define rtinitflags(x) \
|
|
|
|
((((x)->ia_ifp->if_flags & (IFF_LOOPBACK | IFF_POINTOPOINT)) != 0) \
|
|
|
|
? RTF_HOST : 0)
|
|
|
|
/*
|
|
|
|
* Check if we have a route for the given prefix already or add a one
|
|
|
|
* accordingly.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
in_addprefix(target, flags)
|
|
|
|
struct in_ifaddr *target;
|
|
|
|
int flags;
|
|
|
|
{
|
|
|
|
struct in_ifaddr *ia;
|
2005-10-22 14:50:27 +00:00
|
|
|
struct in_addr prefix, mask, p, m;
|
2004-11-12 20:53:51 +00:00
|
|
|
int error;
|
|
|
|
|
|
|
|
if ((flags & RTF_HOST) != 0)
|
|
|
|
prefix = target->ia_dstaddr.sin_addr;
|
|
|
|
else {
|
|
|
|
prefix = target->ia_addr.sin_addr;
|
|
|
|
mask = target->ia_sockmask.sin_addr;
|
|
|
|
prefix.s_addr &= mask.s_addr;
|
|
|
|
}
|
|
|
|
|
|
|
|
TAILQ_FOREACH(ia, &in_ifaddrhead, ia_link) {
|
2005-10-22 14:50:27 +00:00
|
|
|
if (rtinitflags(ia)) {
|
2004-11-12 20:53:51 +00:00
|
|
|
p = ia->ia_addr.sin_addr;
|
|
|
|
|
2005-10-22 14:50:27 +00:00
|
|
|
if (prefix.s_addr != p.s_addr)
|
|
|
|
continue;
|
|
|
|
} else {
|
|
|
|
p = ia->ia_addr.sin_addr;
|
|
|
|
m = ia->ia_sockmask.sin_addr;
|
|
|
|
p.s_addr &= m.s_addr;
|
|
|
|
|
|
|
|
if (prefix.s_addr != p.s_addr ||
|
|
|
|
mask.s_addr != m.s_addr)
|
|
|
|
continue;
|
|
|
|
}
|
2004-11-12 20:53:51 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If we got a matching prefix route inserted by other
|
|
|
|
* interface address, we are done here.
|
|
|
|
*/
|
2005-08-18 10:34:30 +00:00
|
|
|
if (ia->ia_flags & IFA_ROUTE) {
|
|
|
|
if (sameprefixcarponly &&
|
|
|
|
target->ia_ifp->if_type != IFT_CARP &&
|
|
|
|
ia->ia_ifp->if_type != IFT_CARP)
|
|
|
|
return (EEXIST);
|
|
|
|
else
|
|
|
|
return (0);
|
|
|
|
}
|
2004-11-12 20:53:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* No-one seem to have this prefix route, so we try to insert it.
|
|
|
|
*/
|
|
|
|
error = rtinit(&target->ia_ifa, (int)RTM_ADD, flags);
|
|
|
|
if (!error)
|
|
|
|
target->ia_flags |= IFA_ROUTE;
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If there is no other address in the system that can serve a route to the
|
|
|
|
* same prefix, remove the route. Hand over the route to the new address
|
|
|
|
* otherwise.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
in_scrubprefix(target)
|
|
|
|
struct in_ifaddr *target;
|
|
|
|
{
|
|
|
|
struct in_ifaddr *ia;
|
|
|
|
struct in_addr prefix, mask, p;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
if ((target->ia_flags & IFA_ROUTE) == 0)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (rtinitflags(target))
|
|
|
|
prefix = target->ia_dstaddr.sin_addr;
|
|
|
|
else {
|
|
|
|
prefix = target->ia_addr.sin_addr;
|
|
|
|
mask = target->ia_sockmask.sin_addr;
|
|
|
|
prefix.s_addr &= mask.s_addr;
|
|
|
|
}
|
|
|
|
|
|
|
|
TAILQ_FOREACH(ia, &in_ifaddrhead, ia_link) {
|
|
|
|
if (rtinitflags(ia))
|
|
|
|
p = ia->ia_dstaddr.sin_addr;
|
|
|
|
else {
|
|
|
|
p = ia->ia_addr.sin_addr;
|
|
|
|
p.s_addr &= ia->ia_sockmask.sin_addr.s_addr;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (prefix.s_addr != p.s_addr)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If we got a matching prefix address, move IFA_ROUTE and
|
|
|
|
* the route itself to it. Make sure that routing daemons
|
|
|
|
* get a heads-up.
|
2005-03-20 10:27:17 +00:00
|
|
|
*
|
|
|
|
* XXX: a special case for carp(4) interface
|
2004-11-12 20:53:51 +00:00
|
|
|
*/
|
2005-03-20 10:27:17 +00:00
|
|
|
if ((ia->ia_flags & IFA_ROUTE) == 0
|
|
|
|
#ifdef DEV_CARP
|
|
|
|
&& (ia->ia_ifp->if_type != IFT_CARP)
|
|
|
|
#endif
|
|
|
|
) {
|
2004-11-12 20:53:51 +00:00
|
|
|
rtinit(&(target->ia_ifa), (int)RTM_DELETE,
|
|
|
|
rtinitflags(target));
|
|
|
|
target->ia_flags &= ~IFA_ROUTE;
|
|
|
|
|
|
|
|
error = rtinit(&ia->ia_ifa, (int)RTM_ADD,
|
|
|
|
rtinitflags(ia) | RTF_UP);
|
|
|
|
if (error == 0)
|
|
|
|
ia->ia_flags |= IFA_ROUTE;
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* As no-one seem to have this prefix, we can remove the route.
|
|
|
|
*/
|
|
|
|
rtinit(&(target->ia_ifa), (int)RTM_DELETE, rtinitflags(target));
|
|
|
|
target->ia_flags &= ~IFA_ROUTE;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#undef rtinitflags
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Return 1 if the address might be a local broadcast address.
|
|
|
|
*/
|
1994-05-25 09:21:21 +00:00
|
|
|
int
|
1994-05-24 10:09:53 +00:00
|
|
|
in_broadcast(in, ifp)
|
|
|
|
struct in_addr in;
|
2004-08-16 18:32:07 +00:00
|
|
|
struct ifnet *ifp;
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
|
|
|
register struct ifaddr *ifa;
|
|
|
|
u_long t;
|
|
|
|
|
|
|
|
if (in.s_addr == INADDR_BROADCAST ||
|
|
|
|
in.s_addr == INADDR_ANY)
|
|
|
|
return 1;
|
|
|
|
if ((ifp->if_flags & IFF_BROADCAST) == 0)
|
|
|
|
return 0;
|
|
|
|
t = ntohl(in.s_addr);
|
|
|
|
/*
|
|
|
|
* Look through the list of addresses for a match
|
|
|
|
* with a broadcast address.
|
|
|
|
*/
|
|
|
|
#define ia ((struct in_ifaddr *)ifa)
|
2001-03-16 20:00:53 +00:00
|
|
|
TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link)
|
1994-05-24 10:09:53 +00:00
|
|
|
if (ifa->ifa_addr->sa_family == AF_INET &&
|
|
|
|
(in.s_addr == ia->ia_broadaddr.sin_addr.s_addr ||
|
|
|
|
in.s_addr == ia->ia_netbroadcast.s_addr ||
|
|
|
|
/*
|
|
|
|
* Check for old-style (host 0) broadcast.
|
|
|
|
*/
|
1996-01-08 20:59:06 +00:00
|
|
|
t == ia->ia_subnet || t == ia->ia_net) &&
|
|
|
|
/*
|
|
|
|
* Check for an all one subnetmask. These
|
|
|
|
* only exist when an interface gets a secondary
|
|
|
|
* address.
|
|
|
|
*/
|
|
|
|
ia->ia_subnetmask != (u_long)0xffffffff)
|
1994-05-24 10:09:53 +00:00
|
|
|
return 1;
|
|
|
|
return (0);
|
|
|
|
#undef ia
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Add an address to the list of IP multicast addresses for a given interface.
|
|
|
|
*/
|
|
|
|
struct in_multi *
|
|
|
|
in_addmulti(ap, ifp)
|
|
|
|
register struct in_addr *ap;
|
|
|
|
register struct ifnet *ifp;
|
|
|
|
{
|
|
|
|
register struct in_multi *inm;
|
1997-01-13 21:26:53 +00:00
|
|
|
int error;
|
|
|
|
struct sockaddr_in sin;
|
|
|
|
struct ifmultiaddr *ifma;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
2005-10-03 11:09:39 +00:00
|
|
|
IFF_LOCKGIANT(ifp);
|
Introduce in_multi_mtx, which will protect IPv4-layer multicast address
lists, as well as accessor macros. For now, this is a recursive mutex
due code sequences where IPv4 multicast calls into IGMP calls into
ip_output(), which then tests for a multicast forwarding case.
For support macros in in_var.h to check multicast address lists, assert
that in_multi_mtx is held.
Acquire in_multi_mtx around iteration over the IPv4 multicast address
lists, such as in ip_input() and ip_output().
Acquire in_multi_mtx when manipulating the IPv4 layer multicast addresses,
as well as over the manipulation of ifnet multicast address lists in order
to keep the two layers in sync.
Lock down accesses to IPv4 multicast addresses in IGMP, or assert the
lock when performing IGMP join/leave events.
Eliminate spl's associated with IPv4 multicast addresses, portions of
IGMP that weren't previously expunged by IGMP locking.
Add in_multi_mtx, igmp_mtx, and if_addr_mtx lock order to hard-coded
lock order in WITNESS, in that order.
Problem reported by: Ed Maste <emaste at phaedrus dot sandvine dot ca>
MFC after: 10 days
2005-08-03 19:29:47 +00:00
|
|
|
IN_MULTI_LOCK();
|
1994-05-24 10:09:53 +00:00
|
|
|
/*
|
1997-01-13 21:26:53 +00:00
|
|
|
* Call generic routine to add membership or increment
|
|
|
|
* refcount. It wants addresses in the form of a sockaddr,
|
|
|
|
* so we build one here (being careful to zero the unused bytes).
|
1994-05-24 10:09:53 +00:00
|
|
|
*/
|
1997-01-13 21:26:53 +00:00
|
|
|
bzero(&sin, sizeof sin);
|
|
|
|
sin.sin_family = AF_INET;
|
|
|
|
sin.sin_len = sizeof sin;
|
|
|
|
sin.sin_addr = *ap;
|
|
|
|
error = if_addmulti(ifp, (struct sockaddr *)&sin, &ifma);
|
|
|
|
if (error) {
|
Introduce in_multi_mtx, which will protect IPv4-layer multicast address
lists, as well as accessor macros. For now, this is a recursive mutex
due code sequences where IPv4 multicast calls into IGMP calls into
ip_output(), which then tests for a multicast forwarding case.
For support macros in in_var.h to check multicast address lists, assert
that in_multi_mtx is held.
Acquire in_multi_mtx around iteration over the IPv4 multicast address
lists, such as in ip_input() and ip_output().
Acquire in_multi_mtx when manipulating the IPv4 layer multicast addresses,
as well as over the manipulation of ifnet multicast address lists in order
to keep the two layers in sync.
Lock down accesses to IPv4 multicast addresses in IGMP, or assert the
lock when performing IGMP join/leave events.
Eliminate spl's associated with IPv4 multicast addresses, portions of
IGMP that weren't previously expunged by IGMP locking.
Add in_multi_mtx, igmp_mtx, and if_addr_mtx lock order to hard-coded
lock order in WITNESS, in that order.
Problem reported by: Ed Maste <emaste at phaedrus dot sandvine dot ca>
MFC after: 10 days
2005-08-03 19:29:47 +00:00
|
|
|
IN_MULTI_UNLOCK();
|
2005-10-03 11:09:39 +00:00
|
|
|
IFF_UNLOCKGIANT(ifp);
|
1997-01-13 21:26:53 +00:00
|
|
|
return 0;
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
1995-03-23 18:14:41 +00:00
|
|
|
|
1997-01-13 21:26:53 +00:00
|
|
|
/*
|
|
|
|
* If ifma->ifma_protospec is null, then if_addmulti() created
|
|
|
|
* a new record. Otherwise, we are done.
|
|
|
|
*/
|
2005-03-20 14:31:45 +00:00
|
|
|
if (ifma->ifma_protospec != NULL) {
|
Introduce in_multi_mtx, which will protect IPv4-layer multicast address
lists, as well as accessor macros. For now, this is a recursive mutex
due code sequences where IPv4 multicast calls into IGMP calls into
ip_output(), which then tests for a multicast forwarding case.
For support macros in in_var.h to check multicast address lists, assert
that in_multi_mtx is held.
Acquire in_multi_mtx around iteration over the IPv4 multicast address
lists, such as in ip_input() and ip_output().
Acquire in_multi_mtx when manipulating the IPv4 layer multicast addresses,
as well as over the manipulation of ifnet multicast address lists in order
to keep the two layers in sync.
Lock down accesses to IPv4 multicast addresses in IGMP, or assert the
lock when performing IGMP join/leave events.
Eliminate spl's associated with IPv4 multicast addresses, portions of
IGMP that weren't previously expunged by IGMP locking.
Add in_multi_mtx, igmp_mtx, and if_addr_mtx lock order to hard-coded
lock order in WITNESS, in that order.
Problem reported by: Ed Maste <emaste at phaedrus dot sandvine dot ca>
MFC after: 10 days
2005-08-03 19:29:47 +00:00
|
|
|
IN_MULTI_UNLOCK();
|
2005-10-03 11:09:39 +00:00
|
|
|
IFF_UNLOCKGIANT(ifp);
|
1997-01-13 21:26:53 +00:00
|
|
|
return ifma->ifma_protospec;
|
2000-08-19 22:10:10 +00:00
|
|
|
}
|
1997-01-13 21:26:53 +00:00
|
|
|
|
2000-12-08 21:51:06 +00:00
|
|
|
inm = (struct in_multi *)malloc(sizeof(*inm), M_IPMADDR,
|
|
|
|
M_NOWAIT | M_ZERO);
|
1997-01-13 21:26:53 +00:00
|
|
|
if (inm == NULL) {
|
Introduce in_multi_mtx, which will protect IPv4-layer multicast address
lists, as well as accessor macros. For now, this is a recursive mutex
due code sequences where IPv4 multicast calls into IGMP calls into
ip_output(), which then tests for a multicast forwarding case.
For support macros in in_var.h to check multicast address lists, assert
that in_multi_mtx is held.
Acquire in_multi_mtx around iteration over the IPv4 multicast address
lists, such as in ip_input() and ip_output().
Acquire in_multi_mtx when manipulating the IPv4 layer multicast addresses,
as well as over the manipulation of ifnet multicast address lists in order
to keep the two layers in sync.
Lock down accesses to IPv4 multicast addresses in IGMP, or assert the
lock when performing IGMP join/leave events.
Eliminate spl's associated with IPv4 multicast addresses, portions of
IGMP that weren't previously expunged by IGMP locking.
Add in_multi_mtx, igmp_mtx, and if_addr_mtx lock order to hard-coded
lock order in WITNESS, in that order.
Problem reported by: Ed Maste <emaste at phaedrus dot sandvine dot ca>
MFC after: 10 days
2005-08-03 19:29:47 +00:00
|
|
|
IN_MULTI_UNLOCK();
|
2005-10-03 11:09:39 +00:00
|
|
|
IFF_UNLOCKGIANT(ifp);
|
1997-01-13 21:26:53 +00:00
|
|
|
return (NULL);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
1997-01-13 21:26:53 +00:00
|
|
|
|
|
|
|
inm->inm_addr = *ap;
|
|
|
|
inm->inm_ifp = ifp;
|
|
|
|
inm->inm_ifma = ifma;
|
|
|
|
ifma->ifma_protospec = inm;
|
|
|
|
LIST_INSERT_HEAD(&in_multihead, inm, inm_link);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Let IGMP know that we have joined a new IP multicast group.
|
|
|
|
*/
|
|
|
|
igmp_joingroup(inm);
|
Introduce in_multi_mtx, which will protect IPv4-layer multicast address
lists, as well as accessor macros. For now, this is a recursive mutex
due code sequences where IPv4 multicast calls into IGMP calls into
ip_output(), which then tests for a multicast forwarding case.
For support macros in in_var.h to check multicast address lists, assert
that in_multi_mtx is held.
Acquire in_multi_mtx around iteration over the IPv4 multicast address
lists, such as in ip_input() and ip_output().
Acquire in_multi_mtx when manipulating the IPv4 layer multicast addresses,
as well as over the manipulation of ifnet multicast address lists in order
to keep the two layers in sync.
Lock down accesses to IPv4 multicast addresses in IGMP, or assert the
lock when performing IGMP join/leave events.
Eliminate spl's associated with IPv4 multicast addresses, portions of
IGMP that weren't previously expunged by IGMP locking.
Add in_multi_mtx, igmp_mtx, and if_addr_mtx lock order to hard-coded
lock order in WITNESS, in that order.
Problem reported by: Ed Maste <emaste at phaedrus dot sandvine dot ca>
MFC after: 10 days
2005-08-03 19:29:47 +00:00
|
|
|
IN_MULTI_UNLOCK();
|
2005-10-03 11:09:39 +00:00
|
|
|
IFF_UNLOCKGIANT(ifp);
|
1994-05-24 10:09:53 +00:00
|
|
|
return (inm);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Delete a multicast address record.
|
|
|
|
*/
|
1994-05-25 09:21:21 +00:00
|
|
|
void
|
1994-05-24 10:09:53 +00:00
|
|
|
in_delmulti(inm)
|
|
|
|
register struct in_multi *inm;
|
|
|
|
{
|
Introduce in_multi_mtx, which will protect IPv4-layer multicast address
lists, as well as accessor macros. For now, this is a recursive mutex
due code sequences where IPv4 multicast calls into IGMP calls into
ip_output(), which then tests for a multicast forwarding case.
For support macros in in_var.h to check multicast address lists, assert
that in_multi_mtx is held.
Acquire in_multi_mtx around iteration over the IPv4 multicast address
lists, such as in ip_input() and ip_output().
Acquire in_multi_mtx when manipulating the IPv4 layer multicast addresses,
as well as over the manipulation of ifnet multicast address lists in order
to keep the two layers in sync.
Lock down accesses to IPv4 multicast addresses in IGMP, or assert the
lock when performing IGMP join/leave events.
Eliminate spl's associated with IPv4 multicast addresses, portions of
IGMP that weren't previously expunged by IGMP locking.
Add in_multi_mtx, igmp_mtx, and if_addr_mtx lock order to hard-coded
lock order in WITNESS, in that order.
Problem reported by: Ed Maste <emaste at phaedrus dot sandvine dot ca>
MFC after: 10 days
2005-08-03 19:29:47 +00:00
|
|
|
struct ifmultiaddr *ifma;
|
1999-04-24 12:28:51 +00:00
|
|
|
struct in_multi my_inm;
|
2005-10-03 11:09:39 +00:00
|
|
|
struct ifnet *ifp;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
2005-10-03 11:09:39 +00:00
|
|
|
ifp = inm->inm_ifp;
|
|
|
|
IFF_LOCKGIANT(ifp);
|
Introduce in_multi_mtx, which will protect IPv4-layer multicast address
lists, as well as accessor macros. For now, this is a recursive mutex
due code sequences where IPv4 multicast calls into IGMP calls into
ip_output(), which then tests for a multicast forwarding case.
For support macros in in_var.h to check multicast address lists, assert
that in_multi_mtx is held.
Acquire in_multi_mtx around iteration over the IPv4 multicast address
lists, such as in ip_input() and ip_output().
Acquire in_multi_mtx when manipulating the IPv4 layer multicast addresses,
as well as over the manipulation of ifnet multicast address lists in order
to keep the two layers in sync.
Lock down accesses to IPv4 multicast addresses in IGMP, or assert the
lock when performing IGMP join/leave events.
Eliminate spl's associated with IPv4 multicast addresses, portions of
IGMP that weren't previously expunged by IGMP locking.
Add in_multi_mtx, igmp_mtx, and if_addr_mtx lock order to hard-coded
lock order in WITNESS, in that order.
Problem reported by: Ed Maste <emaste at phaedrus dot sandvine dot ca>
MFC after: 10 days
2005-08-03 19:29:47 +00:00
|
|
|
IN_MULTI_LOCK();
|
|
|
|
ifma = inm->inm_ifma;
|
1999-04-24 12:28:51 +00:00
|
|
|
my_inm.inm_ifp = NULL ; /* don't send the leave msg */
|
1997-01-13 21:26:53 +00:00
|
|
|
if (ifma->ifma_refcount == 1) {
|
1994-05-24 10:09:53 +00:00
|
|
|
/*
|
|
|
|
* No remaining claims to this record; let IGMP know that
|
|
|
|
* we are leaving the multicast group.
|
1999-04-24 12:28:51 +00:00
|
|
|
* But do it after the if_delmulti() which might reset
|
|
|
|
* the interface and nuke the packet.
|
1994-05-24 10:09:53 +00:00
|
|
|
*/
|
1999-04-24 12:28:51 +00:00
|
|
|
my_inm = *inm ;
|
2005-03-20 14:31:45 +00:00
|
|
|
ifma->ifma_protospec = NULL;
|
1997-01-13 21:26:53 +00:00
|
|
|
LIST_REMOVE(inm, inm_link);
|
1994-05-24 10:09:53 +00:00
|
|
|
free(inm, M_IPMADDR);
|
|
|
|
}
|
1997-01-13 21:26:53 +00:00
|
|
|
/* XXX - should be separate API for when we have an ifma? */
|
|
|
|
if_delmulti(ifma->ifma_ifp, ifma->ifma_addr);
|
1999-04-24 12:28:51 +00:00
|
|
|
if (my_inm.inm_ifp != NULL)
|
|
|
|
igmp_leavegroup(&my_inm);
|
Introduce in_multi_mtx, which will protect IPv4-layer multicast address
lists, as well as accessor macros. For now, this is a recursive mutex
due code sequences where IPv4 multicast calls into IGMP calls into
ip_output(), which then tests for a multicast forwarding case.
For support macros in in_var.h to check multicast address lists, assert
that in_multi_mtx is held.
Acquire in_multi_mtx around iteration over the IPv4 multicast address
lists, such as in ip_input() and ip_output().
Acquire in_multi_mtx when manipulating the IPv4 layer multicast addresses,
as well as over the manipulation of ifnet multicast address lists in order
to keep the two layers in sync.
Lock down accesses to IPv4 multicast addresses in IGMP, or assert the
lock when performing IGMP join/leave events.
Eliminate spl's associated with IPv4 multicast addresses, portions of
IGMP that weren't previously expunged by IGMP locking.
Add in_multi_mtx, igmp_mtx, and if_addr_mtx lock order to hard-coded
lock order in WITNESS, in that order.
Problem reported by: Ed Maste <emaste at phaedrus dot sandvine dot ca>
MFC after: 10 days
2005-08-03 19:29:47 +00:00
|
|
|
IN_MULTI_UNLOCK();
|
2005-10-03 11:34:29 +00:00
|
|
|
IFF_UNLOCKGIANT(ifp);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
2005-09-18 17:36:28 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* On interface removal, clean up IPv4 data structures hung off of the ifnet.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
in_ifdetach(ifp)
|
|
|
|
struct ifnet *ifp;
|
|
|
|
{
|
|
|
|
|
|
|
|
in_pcbpurgeif0(&ripcbinfo, ifp);
|
|
|
|
in_pcbpurgeif0(&udbinfo, ifp);
|
|
|
|
}
|