1 /* $FreeBSD: src/sys/netinet6/in6.c,v 1.7.2.9 2002/04/28 05:40:26 suz Exp $ */ 2 /* $KAME: in6.c,v 1.259 2002/01/21 11:37:50 keiichi Exp $ */ 3 4 /* 5 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. 6 * All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 3. Neither the name of the project nor the names of its contributors 17 * may be used to endorse or promote products derived from this software 18 * without specific prior written permission. 19 * 20 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND 21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE 24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30 * SUCH DAMAGE. 31 */ 32 33 /* 34 * Copyright (c) 1982, 1986, 1991, 1993 35 * The Regents of the University of California. All rights reserved. 36 * 37 * Redistribution and use in source and binary forms, with or without 38 * modification, are permitted provided that the following conditions 39 * are met: 40 * 1. Redistributions of source code must retain the above copyright 41 * notice, this list of conditions and the following disclaimer. 42 * 2. Redistributions in binary form must reproduce the above copyright 43 * notice, this list of conditions and the following disclaimer in the 44 * documentation and/or other materials provided with the distribution. 45 * 3. Neither the name of the University nor the names of its contributors 46 * may be used to endorse or promote products derived from this software 47 * without specific prior written permission. 48 * 49 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 50 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 51 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 52 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 53 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 54 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 55 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 56 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 57 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 58 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 59 * SUCH DAMAGE. 60 * 61 * @(#)in.c 8.2 (Berkeley) 11/15/93 62 */ 63 64 #include "opt_inet.h" 65 #include "opt_inet6.h" 66 67 #include <sys/param.h> 68 #include <sys/errno.h> 69 #include <sys/malloc.h> 70 #include <sys/socket.h> 71 #include <sys/socketvar.h> 72 #include <sys/sockio.h> 73 #include <sys/systm.h> 74 #include <sys/proc.h> 75 #include <sys/priv.h> 76 #include <sys/time.h> 77 #include <sys/kernel.h> 78 #include <sys/syslog.h> 79 #include <sys/jail.h> 80 81 #include <sys/thread2.h> 82 #include <sys/msgport2.h> 83 84 #include <net/if.h> 85 #include <net/if_types.h> 86 #include <net/route.h> 87 #include <net/if_dl.h> 88 #include <net/netmsg2.h> 89 #include <net/netisr2.h> 90 91 #include <netinet/in.h> 92 #include <netinet/in_var.h> 93 #include <netinet/if_ether.h> 94 #include <netinet/in_systm.h> 95 #include <netinet/ip.h> 96 #include <netinet/in_pcb.h> 97 98 #include <netinet/ip6.h> 99 #include <netinet6/ip6_var.h> 100 #include <netinet6/nd6.h> 101 #include <netinet6/mld6_var.h> 102 #include <netinet6/ip6_mroute.h> 103 #include <netinet6/in6_ifattach.h> 104 #include <netinet6/scope6_var.h> 105 #include <netinet6/in6_pcb.h> 106 #include <netinet6/in6_var.h> 107 108 #include <net/net_osdep.h> 109 110 /* 111 * Definitions of some costant IP6 addresses. 112 */ 113 const struct in6_addr kin6addr_any = IN6ADDR_ANY_INIT; 114 const struct in6_addr kin6addr_loopback = IN6ADDR_LOOPBACK_INIT; 115 const struct in6_addr kin6addr_nodelocal_allnodes = 116 IN6ADDR_NODELOCAL_ALLNODES_INIT; 117 const struct in6_addr kin6addr_linklocal_allnodes = 118 IN6ADDR_LINKLOCAL_ALLNODES_INIT; 119 const struct in6_addr kin6addr_linklocal_allrouters = 120 IN6ADDR_LINKLOCAL_ALLROUTERS_INIT; 121 122 const struct in6_addr in6mask0 = IN6MASK0; 123 const struct in6_addr in6mask32 = IN6MASK32; 124 const struct in6_addr in6mask64 = IN6MASK64; 125 const struct in6_addr in6mask96 = IN6MASK96; 126 const struct in6_addr in6mask128 = IN6MASK128; 127 128 const struct sockaddr_in6 sa6_any = {sizeof(sa6_any), AF_INET6, 129 0, 0, IN6ADDR_ANY_INIT, 0}; 130 131 static int in6_lifaddr_ioctl (u_long, caddr_t, struct ifnet *, 132 struct thread *); 133 static int in6_ifinit (struct ifnet *, struct in6_ifaddr *, 134 struct sockaddr_in6 *, int); 135 static void in6_unlink_ifa (struct in6_ifaddr *, struct ifnet *); 136 static void in6_ifloop_request_callback(int, int, struct rt_addrinfo *, struct rtentry *, void *); 137 138 static void in6_control_internal_dispatch(netmsg_t); 139 static int in6_control_internal(u_long, caddr_t, struct ifnet *, 140 struct thread *); 141 142 struct in6_multihead in6_multihead; /* XXX BSS initialization */ 143 144 int (*faithprefix_p)(struct in6_addr *); 145 146 /* 147 * Subroutine for in6_ifaddloop() and in6_ifremloop(). 148 * This routine does actual work. 149 */ 150 static void 151 in6_ifloop_request(int cmd, struct ifaddr *ifa) 152 { 153 struct sockaddr_in6 all1_sa; 154 struct rt_addrinfo rtinfo; 155 int error; 156 157 bzero(&all1_sa, sizeof(all1_sa)); 158 all1_sa.sin6_family = AF_INET6; 159 all1_sa.sin6_len = sizeof(struct sockaddr_in6); 160 all1_sa.sin6_addr = in6mask128; 161 162 /* 163 * We specify the address itself as the gateway, and set the 164 * RTF_LLINFO flag, so that the corresponding host route would have 165 * the flag, and thus applications that assume traditional behavior 166 * would be happy. Note that we assume the caller of the function 167 * (probably implicitly) set nd6_rtrequest() to ifa->ifa_rtrequest, 168 * which changes the outgoing interface to the loopback interface. 169 */ 170 bzero(&rtinfo, sizeof(struct rt_addrinfo)); 171 rtinfo.rti_info[RTAX_DST] = ifa->ifa_addr; 172 rtinfo.rti_info[RTAX_GATEWAY] = ifa->ifa_addr; 173 rtinfo.rti_info[RTAX_NETMASK] = (struct sockaddr *)&all1_sa; 174 rtinfo.rti_flags = RTF_UP|RTF_HOST|RTF_LLINFO; 175 176 error = rtrequest1_global(cmd, &rtinfo, 177 in6_ifloop_request_callback, ifa, RTREQ_PRIO_NORM); 178 if (error != 0) { 179 log(LOG_ERR, "in6_ifloop_request: " 180 "%s operation failed for %s (errno=%d)\n", 181 cmd == RTM_ADD ? "ADD" : "DELETE", 182 ip6_sprintf(&((struct in6_ifaddr *)ifa)->ia_addr.sin6_addr), 183 error); 184 } 185 } 186 187 static void 188 in6_ifloop_request_callback(int cmd, int error, struct rt_addrinfo *rtinfo, 189 struct rtentry *rt, void *arg) 190 { 191 struct ifaddr *ifa = arg; 192 193 if (error) 194 goto done; 195 196 /* 197 * Make sure rt_ifa be equal to IFA, the second argument of the 198 * function. 199 * We need this because when we refer to rt_ifa->ia6_flags in 200 * ip6_input, we assume that the rt_ifa points to the address instead 201 * of the loopback address. 202 */ 203 if (cmd == RTM_ADD && rt && ifa != rt->rt_ifa) { 204 ++rt->rt_refcnt; 205 IFAFREE(rt->rt_ifa); 206 IFAREF(ifa); 207 rt->rt_ifa = ifa; 208 --rt->rt_refcnt; 209 } 210 211 /* 212 * Report the addition/removal of the address to the routing socket. 213 * XXX: since we called rtinit for a p2p interface with a destination, 214 * we end up reporting twice in such a case. Should we rather 215 * omit the second report? 216 */ 217 if (rt) { 218 if (mycpuid == 0) 219 rt_newaddrmsg(cmd, ifa, error, rt); 220 if (cmd == RTM_DELETE) { 221 if (rt->rt_refcnt == 0) { 222 ++rt->rt_refcnt; 223 rtfree(rt); 224 } 225 } 226 } 227 done: 228 /* no way to return any new error */ 229 ; 230 } 231 232 /* 233 * Add ownaddr as loopback rtentry. We previously add the route only if 234 * necessary (ex. on a p2p link). However, since we now manage addresses 235 * separately from prefixes, we should always add the route. We can't 236 * rely on the cloning mechanism from the corresponding interface route 237 * any more. 238 */ 239 void 240 in6_ifaddloop(struct ifaddr *ifa) 241 { 242 struct rtentry *rt; 243 244 /* If there is no loopback entry, allocate one. */ 245 rt = rtpurelookup(ifa->ifa_addr); 246 if (rt == NULL || !(rt->rt_flags & RTF_HOST) || 247 !(rt->rt_ifp->if_flags & IFF_LOOPBACK)) 248 in6_ifloop_request(RTM_ADD, ifa); 249 if (rt != NULL) 250 rt->rt_refcnt--; 251 } 252 253 /* 254 * Remove loopback rtentry of ownaddr generated by in6_ifaddloop(), 255 * if it exists. 256 */ 257 void 258 in6_ifremloop(struct ifaddr *ifa) 259 { 260 struct in6_ifaddr *ia; 261 struct rtentry *rt; 262 int ia_count = 0; 263 264 /* 265 * Some of BSD variants do not remove cloned routes 266 * from an interface direct route, when removing the direct route 267 * (see comments in net/net_osdep.h). Even for variants that do remove 268 * cloned routes, they could fail to remove the cloned routes when 269 * we handle multple addresses that share a common prefix. 270 * So, we should remove the route corresponding to the deleted address 271 * regardless of the result of in6_is_ifloop_auto(). 272 */ 273 274 /* 275 * Delete the entry only if exact one ifa exists. More than one ifa 276 * can exist if we assign a same single address to multiple 277 * (probably p2p) interfaces. 278 * XXX: we should avoid such a configuration in IPv6... 279 */ 280 for (ia = in6_ifaddr; ia; ia = ia->ia_next) { 281 if (IN6_ARE_ADDR_EQUAL(IFA_IN6(ifa), &ia->ia_addr.sin6_addr)) { 282 ia_count++; 283 if (ia_count > 1) 284 break; 285 } 286 } 287 288 if (ia_count == 1) { 289 /* 290 * Before deleting, check if a corresponding loopbacked host 291 * route surely exists. With this check, we can avoid to 292 * delete an interface direct route whose destination is same 293 * as the address being removed. This can happen when remofing 294 * a subnet-router anycast address on an interface attahced 295 * to a shared medium. 296 */ 297 rt = rtpurelookup(ifa->ifa_addr); 298 if (rt != NULL && (rt->rt_flags & RTF_HOST) && 299 (rt->rt_ifp->if_flags & IFF_LOOPBACK)) { 300 rt->rt_refcnt--; 301 in6_ifloop_request(RTM_DELETE, ifa); 302 } 303 } 304 } 305 306 int 307 in6_mask2len(const struct in6_addr *mask, const u_char *lim0) 308 { 309 int x = 0, y; 310 const u_char *lim = lim0, *p; 311 312 if (lim0 == NULL || 313 lim0 - (const u_char *)mask > sizeof(*mask)) { 314 /* Ignore the scope_id part */ 315 lim = (const u_char *)mask + sizeof(*mask); 316 } 317 for (p = (const u_char *)mask; p < lim; x++, p++) { 318 if (*p != 0xff) 319 break; 320 } 321 y = 0; 322 if (p < lim) { 323 for (y = 0; y < 8; y++) { 324 if ((*p & (0x80 >> y)) == 0) 325 break; 326 } 327 } 328 329 /* 330 * When the limit pointer is given, do a stricter check on the 331 * remaining bits. 332 */ 333 if (p < lim) { 334 if (y != 0 && (*p & (0x00ff >> y)) != 0) 335 return (-1); 336 for (p = p + 1; p < lim; p++) 337 if (*p != 0) 338 return (-1); 339 } 340 341 return x * 8 + y; 342 } 343 344 #define ifa2ia6(ifa) ((struct in6_ifaddr *)(ifa)) 345 #define ia62ifa(ia6) (&((ia6)->ia_ifa)) 346 347 void 348 in6_control_dispatch(netmsg_t msg) 349 { 350 int error; 351 352 error = in6_control(msg->control.nm_cmd, 353 msg->control.nm_data, 354 msg->control.nm_ifp, 355 msg->control.nm_td); 356 lwkt_replymsg(&msg->control.base.lmsg, error); 357 } 358 359 int 360 in6_control(u_long cmd, caddr_t data, struct ifnet *ifp, struct thread *td) 361 { 362 struct netmsg_pru_control msg; 363 364 switch (cmd) { 365 case SIOCSIFPREFIX_IN6: 366 case SIOCDIFPREFIX_IN6: 367 case SIOCAIFPREFIX_IN6: 368 case SIOCCIFPREFIX_IN6: 369 case SIOCSGIFPREFIX_IN6: 370 case SIOCGIFPREFIX_IN6: 371 log(LOG_NOTICE, "prefix ioctls are now invalidated. " 372 "please use ifconfig.\n"); 373 return (EOPNOTSUPP); 374 375 case SIOCSIFADDR_IN6: 376 case SIOCSIFDSTADDR_IN6: 377 case SIOCSIFNETMASK_IN6: 378 /* 379 * Since IPv6 allows a node to assign multiple addresses 380 * on a single interface, SIOCSIFxxx ioctls are not suitable 381 * and should be unused. 382 */ 383 /* We decided to obsolete this command (20000704) */ 384 return (EINVAL); 385 386 case SIOCSIFADDR: 387 case SIOCSIFDSTADDR: 388 case SIOCSIFBRDADDR: 389 case SIOCSIFNETMASK: 390 /* 391 * Do not pass those ioctl to driver handler since they are not 392 * properly setup. Instead just error out. 393 */ 394 return (EOPNOTSUPP); 395 396 /* mroute */ 397 case SIOCGETSGCNT_IN6: 398 case SIOCGETMIFCNT_IN6: 399 /* srcsel policy */ 400 case SIOCAADDRCTL_POLICY: 401 case SIOCDADDRCTL_POLICY: 402 /* nd6 */ 403 case SIOCSNDFLUSH_IN6: 404 case SIOCSPFXFLUSH_IN6: 405 case SIOCSRTRFLUSH_IN6: 406 case SIOCSDEFIFACE_IN6: 407 case SIOCSIFINFO_FLAGS: 408 case OSIOCGIFINFO_IN6: 409 case SIOCGIFINFO_IN6: 410 case SIOCGDRLST_IN6: 411 case SIOCGPRLST_IN6: 412 case SIOCGNBRINFO_IN6: 413 case SIOCGDEFIFACE_IN6: 414 /* scope6 */ 415 case SIOCSSCOPE6: 416 case SIOCGSCOPE6: 417 case SIOCGSCOPE6DEF: 418 /* change address */ 419 case SIOCALIFADDR: 420 case SIOCDLIFADDR: 421 case SIOCSIFALIFETIME_IN6: 422 case SIOCAIFADDR_IN6: 423 case SIOCDIFADDR_IN6: 424 /* 425 * Dispatch these SIOCs to netisr0. 426 */ 427 netmsg_init(&msg.base, NULL, &curthread->td_msgport, 0, 428 in6_control_internal_dispatch); 429 msg.nm_cmd = cmd; 430 msg.nm_data = data; 431 msg.nm_ifp = ifp; 432 msg.nm_td = td; 433 lwkt_domsg(netisr_cpuport(0), &msg.base.lmsg, 0); 434 return msg.base.lmsg.ms_error; 435 436 default: 437 return in6_control_internal(cmd, data, ifp, td); 438 } 439 } 440 441 static void 442 in6_control_internal_dispatch(netmsg_t msg) 443 { 444 int error; 445 446 error = in6_control_internal(msg->control.nm_cmd, msg->control.nm_data, 447 msg->control.nm_ifp, msg->control.nm_td); 448 lwkt_replymsg(&msg->lmsg, error); 449 } 450 451 static int 452 in6_control_internal(u_long cmd, caddr_t data, struct ifnet *ifp, 453 struct thread *td) 454 { 455 struct in6_ifreq *ifr = (struct in6_ifreq *)data; 456 struct in6_ifaddr *ia = NULL; 457 struct in6_aliasreq *ifra = (struct in6_aliasreq *)data; 458 struct in6_ifextra *xtra; 459 boolean_t privileged; 460 int error; 461 462 privileged = FALSE; 463 if (priv_check(td, PRIV_ROOT) == 0) 464 privileged = TRUE; 465 466 switch (cmd) { 467 case SIOCALIFADDR: 468 case SIOCDLIFADDR: 469 if (!privileged) 470 return (EPERM); 471 /* FALLTHROUGH */ 472 case SIOCGLIFADDR: 473 if (ifp == NULL) 474 return (EOPNOTSUPP); 475 return in6_lifaddr_ioctl(cmd, data, ifp, td); 476 } 477 478 switch (cmd) { 479 case SIOCGETSGCNT_IN6: 480 case SIOCGETMIFCNT_IN6: 481 return (mrt6_ioctl(cmd, data)); 482 } 483 484 switch(cmd) { 485 case SIOCAADDRCTL_POLICY: 486 case SIOCDADDRCTL_POLICY: 487 if (!privileged) 488 return (EPERM); 489 return (in6_src_ioctl(cmd, data)); 490 } 491 492 if (ifp == NULL) 493 return (EOPNOTSUPP); 494 495 switch (cmd) { 496 case SIOCSNDFLUSH_IN6: 497 case SIOCSPFXFLUSH_IN6: 498 case SIOCSRTRFLUSH_IN6: 499 case SIOCSDEFIFACE_IN6: 500 case SIOCSIFINFO_FLAGS: 501 if (!privileged) 502 return (EPERM); 503 /* FALLTHROUGH */ 504 case OSIOCGIFINFO_IN6: 505 case SIOCGIFINFO_IN6: 506 case SIOCGDRLST_IN6: 507 case SIOCGPRLST_IN6: 508 case SIOCGNBRINFO_IN6: 509 case SIOCGDEFIFACE_IN6: 510 return (nd6_ioctl(cmd, data, ifp)); 511 } 512 513 switch (cmd) { 514 case SIOCSSCOPE6: 515 if (!privileged) 516 return (EPERM); 517 return (scope6_set(ifp, 518 (struct scope6_id *)ifr->ifr_ifru.ifru_scope_id)); 519 520 case SIOCGSCOPE6: 521 return (scope6_get(ifp, 522 (struct scope6_id *)ifr->ifr_ifru.ifru_scope_id)); 523 524 case SIOCGSCOPE6DEF: 525 return (scope6_get_default((struct scope6_id *) 526 ifr->ifr_ifru.ifru_scope_id)); 527 } 528 529 /* 530 * Find address for this interface, if it exists. 531 */ 532 if (ifra->ifra_addr.sin6_family == AF_INET6) { /* XXX */ 533 struct sockaddr_in6 *sa6 = 534 (struct sockaddr_in6 *)&ifra->ifra_addr; 535 536 if (IN6_IS_ADDR_LINKLOCAL(&sa6->sin6_addr)) { 537 if (sa6->sin6_addr.s6_addr16[1] == 0) { 538 /* Link ID is not embedded by the user */ 539 sa6->sin6_addr.s6_addr16[1] = 540 htons(ifp->if_index); 541 } else if (sa6->sin6_addr.s6_addr16[1] != 542 htons(ifp->if_index)) { 543 /* Link ID contradicts */ 544 return (EINVAL); 545 } 546 if (sa6->sin6_scope_id) { 547 if (sa6->sin6_scope_id != 548 (u_int32_t)ifp->if_index) 549 return (EINVAL); 550 sa6->sin6_scope_id = 0; /* XXX: good way? */ 551 } 552 } 553 ia = in6ifa_ifpwithaddr(ifp, &ifra->ifra_addr.sin6_addr); 554 } 555 556 switch (cmd) { 557 case SIOCDIFADDR_IN6: 558 /* 559 * For IPv4, we look for existing in_ifaddr here to allow 560 * "ifconfig if0 delete" to remove first IPv4 address on the 561 * interface. For IPv6, as the spec allow multiple interface 562 * address from the day one, we consider "remove the first one" 563 * semantics to be not preferable. 564 */ 565 if (ia == NULL) 566 return (EADDRNOTAVAIL); 567 /* FALLTHROUGH */ 568 case SIOCAIFADDR_IN6: 569 /* 570 * We always require users to specify a valid IPv6 address for 571 * the corresponding operation. 572 */ 573 if (ifra->ifra_addr.sin6_family != AF_INET6 || 574 ifra->ifra_addr.sin6_len != sizeof(struct sockaddr_in6)) 575 return (EAFNOSUPPORT); 576 if (!privileged) 577 return (EPERM); 578 break; 579 580 case SIOCGIFADDR_IN6: 581 /* This interface is basically deprecated. Use SIOCGIFCONF. */ 582 /* FALLTHROUGH */ 583 case SIOCGIFAFLAG_IN6: 584 case SIOCGIFNETMASK_IN6: 585 case SIOCGIFDSTADDR_IN6: 586 case SIOCGIFALIFETIME_IN6: 587 /* Must think again about its semantics */ 588 if (ia == NULL) 589 return (EADDRNOTAVAIL); 590 break; 591 592 case SIOCSIFALIFETIME_IN6: 593 { 594 const struct in6_addrlifetime *lt; 595 596 if (!privileged) 597 return (EPERM); 598 if (ia == NULL) 599 return (EADDRNOTAVAIL); 600 /* Sanity for overflow - beware unsigned */ 601 lt = &ifr->ifr_ifru.ifru_lifetime; 602 if (lt->ia6t_vltime != ND6_INFINITE_LIFETIME && 603 lt->ia6t_vltime + time_uptime < time_uptime) 604 return EINVAL; 605 if (lt->ia6t_pltime != ND6_INFINITE_LIFETIME && 606 lt->ia6t_pltime + time_uptime < time_uptime) 607 return EINVAL; 608 break; 609 } 610 } 611 612 switch (cmd) { 613 case SIOCGIFADDR_IN6: 614 ifr->ifr_addr = ia->ia_addr; 615 break; 616 617 case SIOCGIFDSTADDR_IN6: 618 if (!(ifp->if_flags & IFF_POINTOPOINT)) 619 return (EINVAL); 620 /* 621 * XXX: Should we check if ifa_dstaddr is NULL and return 622 * an error? 623 */ 624 ifr->ifr_dstaddr = ia->ia_dstaddr; 625 break; 626 627 case SIOCGIFNETMASK_IN6: 628 ifr->ifr_addr = ia->ia_prefixmask; 629 break; 630 631 case SIOCGIFAFLAG_IN6: 632 ifr->ifr_ifru.ifru_flags6 = ia->ia6_flags; 633 break; 634 635 case SIOCGIFSTAT_IN6: 636 if ((xtra = ifp->if_afdata[AF_INET6]) == NULL) 637 return EINVAL; 638 bzero(&ifr->ifr_ifru.ifru_stat, 639 sizeof(ifr->ifr_ifru.ifru_stat)); 640 ifr->ifr_ifru.ifru_stat = *xtra->in6_ifstat; 641 break; 642 643 case SIOCGIFSTAT_ICMP6: 644 if ((xtra = ifp->if_afdata[AF_INET6]) == NULL) 645 return EINVAL; 646 bzero(&ifr->ifr_ifru.ifru_stat, 647 sizeof(ifr->ifr_ifru.ifru_icmp6stat)); 648 ifr->ifr_ifru.ifru_icmp6stat = *xtra->icmp6_ifstat; 649 break; 650 651 case SIOCGIFALIFETIME_IN6: 652 ifr->ifr_ifru.ifru_lifetime = ia->ia6_lifetime; 653 break; 654 655 case SIOCSIFALIFETIME_IN6: 656 ia->ia6_lifetime = ifr->ifr_ifru.ifru_lifetime; 657 if (ia->ia6_lifetime.ia6t_vltime != ND6_INFINITE_LIFETIME) { 658 ia->ia6_lifetime.ia6t_expire = 659 time_uptime + ia->ia6_lifetime.ia6t_vltime; 660 } else { 661 ia->ia6_lifetime.ia6t_expire = 0; 662 } 663 if (ia->ia6_lifetime.ia6t_pltime != ND6_INFINITE_LIFETIME) { 664 ia->ia6_lifetime.ia6t_preferred = 665 time_uptime + ia->ia6_lifetime.ia6t_pltime; 666 } else { 667 ia->ia6_lifetime.ia6t_preferred = 0; 668 } 669 break; 670 671 case SIOCAIFADDR_IN6: 672 { 673 int i, error = 0, iaIsNew; 674 struct nd_prefix pr0, *pr; 675 676 if (ia != NULL) 677 iaIsNew = 0; 678 else 679 iaIsNew = 1; 680 681 /* 682 * First, make or update the interface address structure, 683 * and link it to the list. 684 */ 685 if ((error = in6_update_ifa(ifp, ifra, ia)) != 0) 686 return (error); 687 688 /* 689 * Then, make the prefix on-link on the interface. 690 * XXX: We'd rather create the prefix before the address, but 691 * we need at least one address to install the corresponding 692 * interface route, so we configure the address first. 693 */ 694 695 /* 696 * Convert mask to prefix length (prefixmask has already 697 * been validated in in6_update_ifa(). 698 */ 699 bzero(&pr0, sizeof(pr0)); 700 pr0.ndpr_ifp = ifp; 701 pr0.ndpr_plen = in6_mask2len(&ifra->ifra_prefixmask.sin6_addr, 702 NULL); 703 if (pr0.ndpr_plen == 128) 704 break; /* no need to install a host route. */ 705 pr0.ndpr_prefix = ifra->ifra_addr; 706 pr0.ndpr_mask = ifra->ifra_prefixmask.sin6_addr; 707 /* Apply the mask for safety. */ 708 for (i = 0; i < 4; i++) { 709 pr0.ndpr_prefix.sin6_addr.s6_addr32[i] &= 710 ifra->ifra_prefixmask.sin6_addr.s6_addr32[i]; 711 } 712 /* 713 * XXX: Since we don't have an API to set prefix (not address) 714 * lifetimes, we just use the same lifetimes as addresses. 715 * The (temporarily) installed lifetimes can be overridden by 716 * later advertised RAs (when accept_rtadv is non 0), which is 717 * an intended behavior. 718 */ 719 pr0.ndpr_raf_onlink = 1; /* should be configurable? */ 720 pr0.ndpr_raf_auto = 721 ((ifra->ifra_flags & IN6_IFF_AUTOCONF) != 0); 722 pr0.ndpr_vltime = ifra->ifra_lifetime.ia6t_vltime; 723 pr0.ndpr_pltime = ifra->ifra_lifetime.ia6t_pltime; 724 725 /* Add the prefix if there's one. */ 726 if ((pr = nd6_prefix_lookup(&pr0)) == NULL) { 727 /* 728 * nd6_prelist_add will install the corresponding 729 * interface route. 730 */ 731 if ((error = nd6_prelist_add(&pr0, NULL, &pr)) != 0) 732 return (error); 733 if (pr == NULL) { 734 log(LOG_ERR, "nd6_prelist_add succeeded but " 735 "no prefix\n"); 736 return (EINVAL); /* XXX panic here? */ 737 } 738 } 739 740 ia = in6ifa_ifpwithaddr(ifp, &ifra->ifra_addr.sin6_addr); 741 if (ia == NULL) { 742 /* XXX: This should not happen! */ 743 log(LOG_ERR, "in6_control: addition succeeded, but" 744 " no ifaddr\n"); 745 } else { 746 if ((ia->ia6_flags & IN6_IFF_AUTOCONF) && 747 ia->ia6_ndpr == NULL) { 748 /* 749 * New autoconf address 750 */ 751 ia->ia6_ndpr = pr; 752 pr->ndpr_refcnt++; 753 754 /* 755 * If this is the first autoconf address from 756 * the prefix, create a temporary address 757 * as well (when specified). 758 */ 759 if (ip6_use_tempaddr && pr->ndpr_refcnt == 1) { 760 int e; 761 762 if ((e = in6_tmpifadd(ia, 1)) != 0) { 763 log(LOG_NOTICE, "in6_control: " 764 "failed to create a " 765 "temporary address, " 766 "errno=%d\n", e); 767 } 768 } 769 } 770 771 /* 772 * This might affect the status of autoconfigured 773 * addresses, that is, this address might make 774 * other addresses detached. 775 */ 776 pfxlist_onlink_check(); 777 } 778 if (error == 0 && ia) { 779 EVENTHANDLER_INVOKE(ifaddr_event, ifp, 780 iaIsNew ? IFADDR_EVENT_ADD : IFADDR_EVENT_CHANGE, 781 &ia->ia_ifa); 782 } 783 break; 784 } 785 786 case SIOCDIFADDR_IN6: 787 { 788 int i = 0; 789 struct nd_prefix pr0, *pr; 790 791 /* 792 * If the address being deleted is the only one that owns 793 * the corresponding prefix, expire the prefix as well. 794 * XXX: Theoretically, we don't have to warry about such 795 * relationship, since we separate the address management 796 * and the prefix management. We do this, however, to provide 797 * as much backward compatibility as possible in terms of 798 * the ioctl operation. 799 */ 800 bzero(&pr0, sizeof(pr0)); 801 pr0.ndpr_ifp = ifp; 802 pr0.ndpr_plen = in6_mask2len(&ia->ia_prefixmask.sin6_addr, 803 NULL); 804 if (pr0.ndpr_plen == 128) 805 goto purgeaddr; 806 pr0.ndpr_prefix = ia->ia_addr; 807 pr0.ndpr_mask = ia->ia_prefixmask.sin6_addr; 808 for (i = 0; i < 4; i++) { 809 pr0.ndpr_prefix.sin6_addr.s6_addr32[i] &= 810 ia->ia_prefixmask.sin6_addr.s6_addr32[i]; 811 } 812 /* 813 * The logic of the following condition is a bit complicated. 814 * We expire the prefix when 815 * 1. The address obeys autoconfiguration and it is the 816 * only owner of the associated prefix, or 817 * 2. The address does not obey autoconf and there is no 818 * other owner of the prefix. 819 */ 820 if ((pr = nd6_prefix_lookup(&pr0)) != NULL && 821 (((ia->ia6_flags & IN6_IFF_AUTOCONF) && 822 pr->ndpr_refcnt == 1) || 823 (!(ia->ia6_flags & IN6_IFF_AUTOCONF) && 824 pr->ndpr_refcnt == 0))) 825 pr->ndpr_expire = 1; /* XXX: just for expiration */ 826 827 purgeaddr: 828 EVENTHANDLER_INVOKE(ifaddr_event, ifp, IFADDR_EVENT_DELETE, 829 &ia->ia_ifa); 830 in6_purgeaddr(&ia->ia_ifa); 831 break; 832 } 833 834 default: 835 if (ifp->if_ioctl == NULL) 836 return (EOPNOTSUPP); 837 ifnet_serialize_all(ifp); 838 error = ifp->if_ioctl(ifp, cmd, data, td->td_proc->p_ucred); 839 ifnet_deserialize_all(ifp); 840 return (error); 841 } 842 843 return (0); 844 } 845 846 /* 847 * Update parameters of an IPv6 interface address. 848 * If necessary, a new entry is created and linked into address chains. 849 * This function is separated from in6_control(). 850 * XXX: should this be performed under splnet()? 851 */ 852 int 853 in6_update_ifa(struct ifnet *ifp, struct in6_aliasreq *ifra, 854 struct in6_ifaddr *ia) 855 { 856 int error = 0, hostIsNew = 0, plen = -1; 857 struct in6_ifaddr *oia; 858 struct sockaddr_in6 dst6; 859 struct in6_addrlifetime *lt; 860 861 /* Validate parameters */ 862 if (ifp == NULL || ifra == NULL) /* this maybe redundant */ 863 return (EINVAL); 864 865 /* 866 * The destination address for a p2p link must have a family 867 * of AF_UNSPEC or AF_INET6. 868 */ 869 if ((ifp->if_flags & IFF_POINTOPOINT) && 870 ifra->ifra_dstaddr.sin6_family != AF_INET6 && 871 ifra->ifra_dstaddr.sin6_family != AF_UNSPEC) 872 return (EAFNOSUPPORT); 873 /* 874 * validate ifra_prefixmask. don't check sin6_family, netmask 875 * does not carry fields other than sin6_len. 876 */ 877 if (ifra->ifra_prefixmask.sin6_len > sizeof(struct sockaddr_in6)) 878 return (EINVAL); 879 /* 880 * Because the IPv6 address architecture is classless, we require 881 * users to specify a (non 0) prefix length (mask) for a new address. 882 * We also require the prefix (when specified) mask is valid, and thus 883 * reject a non-consecutive mask. 884 */ 885 if (ia == NULL && ifra->ifra_prefixmask.sin6_len == 0) 886 return (EINVAL); 887 if (ifra->ifra_prefixmask.sin6_len != 0) { 888 plen = in6_mask2len(&ifra->ifra_prefixmask.sin6_addr, 889 (u_char *)&ifra->ifra_prefixmask + 890 ifra->ifra_prefixmask.sin6_len); 891 if (plen <= 0) 892 return (EINVAL); 893 } 894 else { 895 /* 896 * In this case, ia must not be NULL. We just use its prefix 897 * length. 898 */ 899 plen = in6_mask2len(&ia->ia_prefixmask.sin6_addr, NULL); 900 } 901 /* 902 * If the destination address on a p2p interface is specified, 903 * and the address is a scoped one, validate/set the scope 904 * zone identifier. 905 */ 906 dst6 = ifra->ifra_dstaddr; 907 if ((ifp->if_flags & (IFF_POINTOPOINT|IFF_LOOPBACK)) && 908 (dst6.sin6_family == AF_INET6)) { 909 int scopeid; 910 911 if ((error = in6_recoverscope(&dst6, 912 &ifra->ifra_dstaddr.sin6_addr, 913 ifp)) != 0) 914 return (error); 915 scopeid = in6_addr2scopeid(ifp, &dst6.sin6_addr); 916 if (dst6.sin6_scope_id == 0) /* user omit to specify the ID. */ 917 dst6.sin6_scope_id = scopeid; 918 else if (dst6.sin6_scope_id != scopeid) 919 return (EINVAL); /* scope ID mismatch. */ 920 if ((error = in6_embedscope(&dst6.sin6_addr, &dst6, NULL, NULL)) 921 != 0) 922 return (error); 923 dst6.sin6_scope_id = 0; /* XXX */ 924 } 925 /* 926 * The destination address can be specified only for a p2p or a 927 * loopback interface. If specified, the corresponding prefix length 928 * must be 128. 929 */ 930 if (ifra->ifra_dstaddr.sin6_family == AF_INET6) { 931 if ((ifp->if_flags & (IFF_POINTOPOINT | IFF_LOOPBACK)) == 0) { 932 /* XXX: noisy message */ 933 log(LOG_INFO, "in6_update_ifa: a destination can be " 934 "specified for a p2p or a loopback IF only\n"); 935 return (EINVAL); 936 } 937 if (plen != 128) { 938 /* 939 * The following message seems noisy, but we dare to 940 * add it for diagnosis. 941 */ 942 log(LOG_INFO, "in6_update_ifa: prefixlen must be 128 " 943 "when dstaddr is specified\n"); 944 return (EINVAL); 945 } 946 } 947 /* lifetime consistency check */ 948 lt = &ifra->ifra_lifetime; 949 if (lt->ia6t_vltime != ND6_INFINITE_LIFETIME 950 && lt->ia6t_vltime + time_uptime < time_uptime) { 951 return EINVAL; 952 } 953 if (lt->ia6t_vltime == 0) { 954 /* 955 * the following log might be noisy, but this is a typical 956 * configuration mistake or a tool's bug. 957 */ 958 log(LOG_INFO, 959 "in6_update_ifa: valid lifetime is 0 for %s\n", 960 ip6_sprintf(&ifra->ifra_addr.sin6_addr)); 961 } 962 if (lt->ia6t_pltime != ND6_INFINITE_LIFETIME 963 && lt->ia6t_pltime + time_uptime < time_uptime) { 964 return EINVAL; 965 } 966 967 /* 968 * If this is a new address, allocate a new ifaddr and link it 969 * into chains. 970 */ 971 if (ia == NULL) { 972 hostIsNew = 1; 973 ia = ifa_create(sizeof(*ia)); 974 975 /* Initialize the address and masks */ 976 ia->ia_ifa.ifa_addr = (struct sockaddr *)&ia->ia_addr; 977 ia->ia_addr.sin6_family = AF_INET6; 978 ia->ia_addr.sin6_len = sizeof(ia->ia_addr); 979 if ((ifp->if_flags & (IFF_POINTOPOINT | IFF_LOOPBACK)) != 0) { 980 /* 981 * XXX: some functions expect that ifa_dstaddr is not 982 * NULL for p2p interfaces. 983 */ 984 ia->ia_ifa.ifa_dstaddr 985 = (struct sockaddr *)&ia->ia_dstaddr; 986 } else { 987 ia->ia_ifa.ifa_dstaddr = NULL; 988 } 989 ia->ia_ifa.ifa_netmask 990 = (struct sockaddr *)&ia->ia_prefixmask; 991 992 ia->ia_ifp = ifp; 993 if ((oia = in6_ifaddr) != NULL) { 994 for ( ; oia->ia_next; oia = oia->ia_next) 995 continue; 996 oia->ia_next = ia; 997 } else 998 in6_ifaddr = ia; 999 1000 ifa_iflink(&ia->ia_ifa, ifp, 1); 1001 } 1002 1003 /* set prefix mask */ 1004 if (ifra->ifra_prefixmask.sin6_len) { 1005 /* 1006 * We prohibit changing the prefix length of an existing 1007 * address, because 1008 * + such an operation should be rare in IPv6, and 1009 * + the operation would confuse prefix management. 1010 */ 1011 if (ia->ia_prefixmask.sin6_len && 1012 in6_mask2len(&ia->ia_prefixmask.sin6_addr, NULL) != plen) { 1013 log(LOG_INFO, "in6_update_ifa: the prefix length of an" 1014 " existing (%s) address should not be changed\n", 1015 ip6_sprintf(&ia->ia_addr.sin6_addr)); 1016 error = EINVAL; 1017 goto unlink; 1018 } 1019 ia->ia_prefixmask = ifra->ifra_prefixmask; 1020 } 1021 1022 /* 1023 * If a new destination address is specified, scrub the old one and 1024 * install the new destination. Note that the interface must be 1025 * p2p or loopback (see the check above.) 1026 */ 1027 if (dst6.sin6_family == AF_INET6 && 1028 !IN6_ARE_ADDR_EQUAL(&dst6.sin6_addr, 1029 &ia->ia_dstaddr.sin6_addr)) { 1030 int e; 1031 1032 if ((ia->ia_flags & IFA_ROUTE) && 1033 (e = rtinit(&(ia->ia_ifa), (int)RTM_DELETE, RTF_HOST)) 1034 != 0) { 1035 log(LOG_ERR, "in6_update_ifa: failed to remove " 1036 "a route to the old destination: %s\n", 1037 ip6_sprintf(&ia->ia_addr.sin6_addr)); 1038 /* proceed anyway... */ 1039 } 1040 else 1041 ia->ia_flags &= ~IFA_ROUTE; 1042 ia->ia_dstaddr = dst6; 1043 } 1044 1045 /* reset the interface and routing table appropriately. */ 1046 if ((error = in6_ifinit(ifp, ia, &ifra->ifra_addr, hostIsNew)) != 0) 1047 goto unlink; 1048 1049 /* 1050 * Beyond this point, we should call in6_purgeaddr upon an error, 1051 * not just go to unlink. 1052 */ 1053 1054 if (ifp->if_flags & IFF_MULTICAST) { 1055 struct sockaddr_in6 mltaddr, mltmask; 1056 struct in6_multi *in6m; 1057 1058 if (hostIsNew) { 1059 /* 1060 * join solicited multicast addr for new host id 1061 */ 1062 struct in6_addr llsol; 1063 bzero(&llsol, sizeof(struct in6_addr)); 1064 llsol.s6_addr16[0] = htons(0xff02); 1065 llsol.s6_addr16[1] = htons(ifp->if_index); 1066 llsol.s6_addr32[1] = 0; 1067 llsol.s6_addr32[2] = htonl(1); 1068 llsol.s6_addr32[3] = 1069 ifra->ifra_addr.sin6_addr.s6_addr32[3]; 1070 llsol.s6_addr8[12] = 0xff; 1071 in6_addmulti(&llsol, ifp, &error); 1072 if (error != 0) { 1073 log(LOG_WARNING, 1074 "in6_update_ifa: addmulti failed for " 1075 "%s on %s (errno=%d)\n", 1076 ip6_sprintf(&llsol), if_name(ifp), 1077 error); 1078 in6_purgeaddr((struct ifaddr *)ia); 1079 return (error); 1080 } 1081 } 1082 1083 bzero(&mltmask, sizeof(mltmask)); 1084 mltmask.sin6_len = sizeof(struct sockaddr_in6); 1085 mltmask.sin6_family = AF_INET6; 1086 mltmask.sin6_addr = in6mask32; 1087 1088 /* 1089 * join link-local all-nodes address 1090 */ 1091 bzero(&mltaddr, sizeof(mltaddr)); 1092 mltaddr.sin6_len = sizeof(struct sockaddr_in6); 1093 mltaddr.sin6_family = AF_INET6; 1094 mltaddr.sin6_addr = kin6addr_linklocal_allnodes; 1095 mltaddr.sin6_addr.s6_addr16[1] = htons(ifp->if_index); 1096 1097 in6m = IN6_LOOKUP_MULTI(&mltaddr.sin6_addr, ifp); 1098 if (in6m == NULL) { 1099 rtrequest_global(RTM_ADD, 1100 (struct sockaddr *)&mltaddr, 1101 (struct sockaddr *)&ia->ia_addr, 1102 (struct sockaddr *)&mltmask, 1103 RTF_UP|RTF_CLONING); /* xxx */ 1104 in6_addmulti(&mltaddr.sin6_addr, ifp, &error); 1105 if (error != 0) { 1106 log(LOG_WARNING, 1107 "in6_update_ifa: addmulti failed for " 1108 "%s on %s (errno=%d)\n", 1109 ip6_sprintf(&mltaddr.sin6_addr), 1110 if_name(ifp), error); 1111 } 1112 } 1113 1114 /* 1115 * join node information group address 1116 */ 1117 #define hostnamelen strlen(hostname) 1118 if (in6_nigroup(ifp, hostname, hostnamelen, &mltaddr.sin6_addr) 1119 == 0) { 1120 in6m = IN6_LOOKUP_MULTI(&mltaddr.sin6_addr, ifp); 1121 if (in6m == NULL && ia != NULL) { 1122 in6_addmulti(&mltaddr.sin6_addr, ifp, &error); 1123 if (error != 0) { 1124 log(LOG_WARNING, "in6_update_ifa: " 1125 "addmulti failed for " 1126 "%s on %s (errno=%d)\n", 1127 ip6_sprintf(&mltaddr.sin6_addr), 1128 if_name(ifp), error); 1129 } 1130 } 1131 } 1132 #undef hostnamelen 1133 1134 /* 1135 * join node-local all-nodes address, on loopback. 1136 * XXX: since "node-local" is obsoleted by interface-local, 1137 * we have to join the group on every interface with 1138 * some interface-boundary restriction. 1139 */ 1140 if (ifp->if_flags & IFF_LOOPBACK) { 1141 struct in6_ifaddr *ia_loop; 1142 1143 struct in6_addr loop6 = kin6addr_loopback; 1144 ia_loop = in6ifa_ifpwithaddr(ifp, &loop6); 1145 1146 mltaddr.sin6_addr = kin6addr_nodelocal_allnodes; 1147 1148 in6m = IN6_LOOKUP_MULTI(&mltaddr.sin6_addr, ifp); 1149 if (in6m == NULL && ia_loop != NULL) { 1150 rtrequest_global(RTM_ADD, 1151 (struct sockaddr *)&mltaddr, 1152 (struct sockaddr *)&ia_loop->ia_addr, 1153 (struct sockaddr *)&mltmask, 1154 RTF_UP); 1155 in6_addmulti(&mltaddr.sin6_addr, ifp, &error); 1156 if (error != 0) { 1157 log(LOG_WARNING, "in6_update_ifa: " 1158 "addmulti failed for %s on %s " 1159 "(errno=%d)\n", 1160 ip6_sprintf(&mltaddr.sin6_addr), 1161 if_name(ifp), error); 1162 } 1163 } 1164 } 1165 } 1166 1167 ia->ia6_flags = ifra->ifra_flags; 1168 ia->ia6_flags &= ~IN6_IFF_DUPLICATED; /*safety*/ 1169 ia->ia6_flags &= ~IN6_IFF_NODAD; /* Mobile IPv6 */ 1170 1171 ia->ia6_lifetime = ifra->ifra_lifetime; 1172 /* for sanity */ 1173 if (ia->ia6_lifetime.ia6t_vltime != ND6_INFINITE_LIFETIME) { 1174 ia->ia6_lifetime.ia6t_expire = 1175 time_uptime + ia->ia6_lifetime.ia6t_vltime; 1176 } else 1177 ia->ia6_lifetime.ia6t_expire = 0; 1178 if (ia->ia6_lifetime.ia6t_pltime != ND6_INFINITE_LIFETIME) { 1179 ia->ia6_lifetime.ia6t_preferred = 1180 time_uptime + ia->ia6_lifetime.ia6t_pltime; 1181 } else 1182 ia->ia6_lifetime.ia6t_preferred = 0; 1183 1184 /* 1185 * Perform DAD, if needed. 1186 * XXX It may be of use, if we can administratively 1187 * disable DAD. 1188 */ 1189 if (in6if_do_dad(ifp) && !(ifra->ifra_flags & IN6_IFF_NODAD)) { 1190 ia->ia6_flags |= IN6_IFF_TENTATIVE; 1191 nd6_dad_start((struct ifaddr *)ia, NULL); 1192 } 1193 1194 return (error); 1195 1196 unlink: 1197 /* 1198 * XXX: if a change of an existing address failed, keep the entry 1199 * anyway. 1200 */ 1201 if (hostIsNew) 1202 in6_unlink_ifa(ia, ifp); 1203 return (error); 1204 } 1205 1206 void 1207 in6_purgeaddr(struct ifaddr *ifa) 1208 { 1209 struct ifnet *ifp = ifa->ifa_ifp; 1210 struct in6_ifaddr *ia = (struct in6_ifaddr *) ifa; 1211 1212 /* stop DAD processing */ 1213 nd6_dad_stop(ifa); 1214 1215 /* 1216 * delete route to the destination of the address being purged. 1217 * The interface must be p2p or loopback in this case. 1218 */ 1219 if ((ia->ia_flags & IFA_ROUTE) && ia->ia_dstaddr.sin6_len != 0) { 1220 int e; 1221 1222 if ((e = rtinit(&(ia->ia_ifa), (int)RTM_DELETE, RTF_HOST)) 1223 != 0) { 1224 log(LOG_ERR, "in6_purgeaddr: failed to remove " 1225 "a route to the p2p destination: %s on %s, " 1226 "errno=%d\n", 1227 ip6_sprintf(&ia->ia_addr.sin6_addr), if_name(ifp), 1228 e); 1229 /* proceed anyway... */ 1230 } 1231 else 1232 ia->ia_flags &= ~IFA_ROUTE; 1233 } 1234 1235 /* Remove ownaddr's loopback rtentry, if it exists. */ 1236 in6_ifremloop(&(ia->ia_ifa)); 1237 1238 if (ifp->if_flags & IFF_MULTICAST) { 1239 /* 1240 * delete solicited multicast addr for deleting host id 1241 */ 1242 struct in6_multi *in6m; 1243 struct in6_addr llsol; 1244 bzero(&llsol, sizeof(struct in6_addr)); 1245 llsol.s6_addr16[0] = htons(0xff02); 1246 llsol.s6_addr16[1] = htons(ifp->if_index); 1247 llsol.s6_addr32[1] = 0; 1248 llsol.s6_addr32[2] = htonl(1); 1249 llsol.s6_addr32[3] = 1250 ia->ia_addr.sin6_addr.s6_addr32[3]; 1251 llsol.s6_addr8[12] = 0xff; 1252 1253 in6m = IN6_LOOKUP_MULTI(&llsol, ifp); 1254 if (in6m) 1255 in6_delmulti(in6m); 1256 } 1257 1258 in6_unlink_ifa(ia, ifp); 1259 } 1260 1261 static void 1262 in6_unlink_ifa(struct in6_ifaddr *ia, struct ifnet *ifp) 1263 { 1264 struct in6_ifaddr *oia; 1265 1266 crit_enter(); 1267 1268 ifa_ifunlink(&ia->ia_ifa, ifp); 1269 1270 oia = ia; 1271 if (oia == (ia = in6_ifaddr)) 1272 in6_ifaddr = ia->ia_next; 1273 else { 1274 while (ia->ia_next && (ia->ia_next != oia)) 1275 ia = ia->ia_next; 1276 if (ia->ia_next) 1277 ia->ia_next = oia->ia_next; 1278 else { 1279 /* search failed */ 1280 kprintf("Couldn't unlink in6_ifaddr from in6_ifaddr\n"); 1281 } 1282 } 1283 1284 /* 1285 * When an autoconfigured address is being removed, release the 1286 * reference to the base prefix. Also, since the release might 1287 * affect the status of other (detached) addresses, call 1288 * pfxlist_onlink_check(). 1289 */ 1290 if (oia->ia6_flags & IN6_IFF_AUTOCONF) { 1291 if (oia->ia6_ndpr == NULL) { 1292 log(LOG_NOTICE, "in6_unlink_ifa: autoconf'ed address " 1293 "%p has no prefix\n", oia); 1294 } else { 1295 oia->ia6_ndpr->ndpr_refcnt--; 1296 oia->ia6_flags &= ~IN6_IFF_AUTOCONF; 1297 oia->ia6_ndpr = NULL; 1298 } 1299 1300 pfxlist_onlink_check(); 1301 } 1302 1303 /* 1304 * release another refcnt for the link from in6_ifaddr. 1305 * Note that we should decrement the refcnt at least once for all *BSD. 1306 */ 1307 ifa_destroy(&oia->ia_ifa); 1308 1309 crit_exit(); 1310 } 1311 1312 void 1313 in6_purgeif(struct ifnet *ifp) 1314 { 1315 struct ifaddr_container *ifac, *next; 1316 1317 TAILQ_FOREACH_MUTABLE(ifac, &ifp->if_addrheads[mycpuid], 1318 ifa_link, next) { 1319 if (ifac->ifa->ifa_addr->sa_family != AF_INET6) 1320 continue; 1321 in6_purgeaddr(ifac->ifa); 1322 } 1323 1324 in6_ifdetach(ifp); 1325 } 1326 1327 /* 1328 * SIOC[GAD]LIFADDR. 1329 * SIOCGLIFADDR: get first address. (?) 1330 * SIOCGLIFADDR with IFLR_PREFIX: 1331 * get first address that matches the specified prefix. 1332 * SIOCALIFADDR: add the specified address. 1333 * SIOCALIFADDR with IFLR_PREFIX: 1334 * add the specified prefix, filling hostid part from 1335 * the first link-local address. prefixlen must be <= 64. 1336 * SIOCDLIFADDR: delete the specified address. 1337 * SIOCDLIFADDR with IFLR_PREFIX: 1338 * delete the first address that matches the specified prefix. 1339 * return values: 1340 * EINVAL on invalid parameters 1341 * EADDRNOTAVAIL on prefix match failed/specified address not found 1342 * other values may be returned from in6_ioctl() 1343 * 1344 * NOTE: SIOCALIFADDR(with IFLR_PREFIX set) allows prefixlen less than 64. 1345 * this is to accomodate address naming scheme other than RFC2374, 1346 * in the future. 1347 * RFC2373 defines interface id to be 64bit, but it allows non-RFC2374 1348 * address encoding scheme. (see figure on page 8) 1349 */ 1350 static int 1351 in6_lifaddr_ioctl(u_long cmd, caddr_t data, struct ifnet *ifp, 1352 struct thread *td) 1353 { 1354 struct if_laddrreq *iflr = (struct if_laddrreq *)data; 1355 struct sockaddr *sa; 1356 1357 /* sanity checks */ 1358 if (!data || !ifp) { 1359 panic("invalid argument to in6_lifaddr_ioctl"); 1360 /*NOTRECHED*/ 1361 } 1362 1363 switch (cmd) { 1364 case SIOCGLIFADDR: 1365 /* address must be specified on GET with IFLR_PREFIX */ 1366 if (!(iflr->flags & IFLR_PREFIX)) 1367 break; 1368 /* FALLTHROUGH */ 1369 case SIOCALIFADDR: 1370 case SIOCDLIFADDR: 1371 /* address must be specified on ADD and DELETE */ 1372 sa = (struct sockaddr *)&iflr->addr; 1373 if (sa->sa_family != AF_INET6) 1374 return EINVAL; 1375 if (sa->sa_len != sizeof(struct sockaddr_in6)) 1376 return EINVAL; 1377 /* XXX need improvement */ 1378 sa = (struct sockaddr *)&iflr->dstaddr; 1379 if (sa->sa_family && sa->sa_family != AF_INET6) 1380 return EINVAL; 1381 if (sa->sa_len && sa->sa_len != sizeof(struct sockaddr_in6)) 1382 return EINVAL; 1383 break; 1384 default: /* shouldn't happen */ 1385 #if 0 1386 panic("invalid cmd to in6_lifaddr_ioctl"); 1387 /* NOTREACHED */ 1388 #else 1389 return EOPNOTSUPP; 1390 #endif 1391 } 1392 if (sizeof(struct in6_addr) * 8 < iflr->prefixlen) 1393 return EINVAL; 1394 1395 switch (cmd) { 1396 case SIOCALIFADDR: 1397 { 1398 struct in6_aliasreq ifra; 1399 struct in6_addr *hostid = NULL; 1400 int prefixlen; 1401 1402 if (iflr->flags & IFLR_PREFIX) { 1403 struct ifaddr *ifa; 1404 struct sockaddr_in6 *sin6; 1405 1406 /* 1407 * hostid is to fill in the hostid part of the 1408 * address. hostid points to the first link-local 1409 * address attached to the interface. 1410 */ 1411 ifa = (struct ifaddr *)in6ifa_ifpforlinklocal(ifp, 0); 1412 if (!ifa) 1413 return EADDRNOTAVAIL; 1414 hostid = IFA_IN6(ifa); 1415 1416 /* prefixlen must be <= 64. */ 1417 if (64 < iflr->prefixlen) 1418 return EINVAL; 1419 prefixlen = iflr->prefixlen; 1420 1421 /* hostid part must be zero. */ 1422 sin6 = (struct sockaddr_in6 *)&iflr->addr; 1423 if (sin6->sin6_addr.s6_addr32[2] != 0 1424 || sin6->sin6_addr.s6_addr32[3] != 0) { 1425 return EINVAL; 1426 } 1427 } else 1428 prefixlen = iflr->prefixlen; 1429 1430 /* copy args to in6_aliasreq, perform ioctl(SIOCAIFADDR_IN6). */ 1431 bzero(&ifra, sizeof(ifra)); 1432 bcopy(iflr->iflr_name, ifra.ifra_name, 1433 sizeof(ifra.ifra_name)); 1434 1435 bcopy(&iflr->addr, &ifra.ifra_addr, 1436 ((struct sockaddr *)&iflr->addr)->sa_len); 1437 if (hostid) { 1438 /* fill in hostid part */ 1439 ifra.ifra_addr.sin6_addr.s6_addr32[2] = 1440 hostid->s6_addr32[2]; 1441 ifra.ifra_addr.sin6_addr.s6_addr32[3] = 1442 hostid->s6_addr32[3]; 1443 } 1444 1445 if (((struct sockaddr *)&iflr->dstaddr)->sa_family) { /*XXX*/ 1446 bcopy(&iflr->dstaddr, &ifra.ifra_dstaddr, 1447 ((struct sockaddr *)&iflr->dstaddr)->sa_len); 1448 if (hostid) { 1449 ifra.ifra_dstaddr.sin6_addr.s6_addr32[2] = 1450 hostid->s6_addr32[2]; 1451 ifra.ifra_dstaddr.sin6_addr.s6_addr32[3] = 1452 hostid->s6_addr32[3]; 1453 } 1454 } 1455 1456 ifra.ifra_prefixmask.sin6_len = sizeof(struct sockaddr_in6); 1457 in6_prefixlen2mask(&ifra.ifra_prefixmask.sin6_addr, prefixlen); 1458 1459 ifra.ifra_flags = iflr->flags & ~IFLR_PREFIX; 1460 return in6_control_internal(SIOCAIFADDR_IN6, (caddr_t)&ifra, 1461 ifp, td); 1462 } 1463 case SIOCGLIFADDR: 1464 case SIOCDLIFADDR: 1465 { 1466 struct ifaddr_container *ifac; 1467 struct in6_ifaddr *ia; 1468 struct in6_addr mask, candidate, match; 1469 struct sockaddr_in6 *sin6; 1470 int cmp; 1471 1472 bzero(&mask, sizeof(mask)); 1473 if (iflr->flags & IFLR_PREFIX) { 1474 /* lookup a prefix rather than address. */ 1475 in6_prefixlen2mask(&mask, iflr->prefixlen); 1476 1477 sin6 = (struct sockaddr_in6 *)&iflr->addr; 1478 bcopy(&sin6->sin6_addr, &match, sizeof(match)); 1479 match.s6_addr32[0] &= mask.s6_addr32[0]; 1480 match.s6_addr32[1] &= mask.s6_addr32[1]; 1481 match.s6_addr32[2] &= mask.s6_addr32[2]; 1482 match.s6_addr32[3] &= mask.s6_addr32[3]; 1483 1484 /* if you set extra bits, that's wrong */ 1485 if (bcmp(&match, &sin6->sin6_addr, sizeof(match))) 1486 return EINVAL; 1487 1488 cmp = 1; 1489 } else { 1490 if (cmd == SIOCGLIFADDR) { 1491 /* on getting an address, take the 1st match */ 1492 cmp = 0; /* XXX */ 1493 } else { 1494 /* on deleting an address, do exact match */ 1495 in6_prefixlen2mask(&mask, 128); 1496 sin6 = (struct sockaddr_in6 *)&iflr->addr; 1497 bcopy(&sin6->sin6_addr, &match, sizeof(match)); 1498 1499 cmp = 1; 1500 } 1501 } 1502 1503 TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) { 1504 struct ifaddr *ifa = ifac->ifa; 1505 1506 if (ifa->ifa_addr->sa_family != AF_INET6) 1507 continue; 1508 if (!cmp) 1509 break; 1510 1511 bcopy(IFA_IN6(ifa), &candidate, sizeof(candidate)); 1512 /* 1513 * XXX: this is adhoc, but is necessary to allow 1514 * a user to specify fe80::/64 (not /10) for a 1515 * link-local address. 1516 */ 1517 if (IN6_IS_ADDR_LINKLOCAL(&candidate)) 1518 candidate.s6_addr16[1] = 0; 1519 candidate.s6_addr32[0] &= mask.s6_addr32[0]; 1520 candidate.s6_addr32[1] &= mask.s6_addr32[1]; 1521 candidate.s6_addr32[2] &= mask.s6_addr32[2]; 1522 candidate.s6_addr32[3] &= mask.s6_addr32[3]; 1523 if (IN6_ARE_ADDR_EQUAL(&candidate, &match)) 1524 break; 1525 } 1526 if (ifac == NULL) 1527 return EADDRNOTAVAIL; 1528 ia = ifa2ia6(ifac->ifa); 1529 1530 if (cmd == SIOCGLIFADDR) { 1531 struct sockaddr_in6 *s6; 1532 1533 /* fill in the if_laddrreq structure */ 1534 bcopy(&ia->ia_addr, &iflr->addr, ia->ia_addr.sin6_len); 1535 s6 = (struct sockaddr_in6 *)&iflr->addr; 1536 if (IN6_IS_ADDR_LINKLOCAL(&s6->sin6_addr)) { 1537 s6->sin6_addr.s6_addr16[1] = 0; 1538 s6->sin6_scope_id = 1539 in6_addr2scopeid(ifp, &s6->sin6_addr); 1540 } 1541 if (ifp->if_flags & IFF_POINTOPOINT) { 1542 bcopy(&ia->ia_dstaddr, &iflr->dstaddr, 1543 ia->ia_dstaddr.sin6_len); 1544 s6 = (struct sockaddr_in6 *)&iflr->dstaddr; 1545 if (IN6_IS_ADDR_LINKLOCAL(&s6->sin6_addr)) { 1546 s6->sin6_addr.s6_addr16[1] = 0; 1547 s6->sin6_scope_id = 1548 in6_addr2scopeid(ifp, 1549 &s6->sin6_addr); 1550 } 1551 } else 1552 bzero(&iflr->dstaddr, sizeof(iflr->dstaddr)); 1553 1554 iflr->prefixlen = 1555 in6_mask2len(&ia->ia_prefixmask.sin6_addr, 1556 NULL); 1557 1558 iflr->flags = ia->ia6_flags; /* XXX */ 1559 1560 return 0; 1561 } else { 1562 struct in6_aliasreq ifra; 1563 1564 /* fill in6_aliasreq and do ioctl(SIOCDIFADDR_IN6) */ 1565 bzero(&ifra, sizeof(ifra)); 1566 bcopy(iflr->iflr_name, ifra.ifra_name, 1567 sizeof(ifra.ifra_name)); 1568 1569 bcopy(&ia->ia_addr, &ifra.ifra_addr, 1570 ia->ia_addr.sin6_len); 1571 if (ifp->if_flags & IFF_POINTOPOINT) 1572 bcopy(&ia->ia_dstaddr, &ifra.ifra_dstaddr, 1573 ia->ia_dstaddr.sin6_len); 1574 else 1575 bzero(&ifra.ifra_dstaddr, 1576 sizeof(ifra.ifra_dstaddr)); 1577 bcopy(&ia->ia_prefixmask, &ifra.ifra_dstaddr, 1578 ia->ia_prefixmask.sin6_len); 1579 1580 ifra.ifra_flags = ia->ia6_flags; 1581 return in6_control_internal(SIOCDIFADDR_IN6, 1582 (caddr_t)&ifra, ifp, td); 1583 } 1584 } 1585 } 1586 1587 return EOPNOTSUPP; /* just for safety */ 1588 } 1589 1590 /* 1591 * Initialize an interface's intetnet6 address 1592 * and routing table entry. 1593 */ 1594 static int 1595 in6_ifinit(struct ifnet *ifp, struct in6_ifaddr *ia, struct sockaddr_in6 *sin6, 1596 int newhost) 1597 { 1598 int error = 0, plen; 1599 1600 ia->ia_addr = *sin6; 1601 1602 if (ifp->if_ioctl != NULL) { 1603 ifnet_serialize_all(ifp); 1604 error = ifp->if_ioctl(ifp, SIOCSIFADDR, (caddr_t)ia, NULL); 1605 ifnet_deserialize_all(ifp); 1606 if (error) 1607 return (error); 1608 } 1609 1610 ia->ia_ifa.ifa_metric = ifp->if_metric; 1611 1612 /* we could do in(6)_socktrim here, but just omit it at this moment. */ 1613 1614 /* 1615 * Special case: 1616 * If the destination address is specified for a point-to-point 1617 * interface, install a route to the destination as an interface 1618 * direct route. 1619 */ 1620 plen = in6_mask2len(&ia->ia_prefixmask.sin6_addr, NULL); /* XXX */ 1621 if (plen == 128 && ia->ia_dstaddr.sin6_family == AF_INET6) { 1622 if ((error = rtinit(&(ia->ia_ifa), (int)RTM_ADD, 1623 RTF_UP | RTF_HOST)) != 0) 1624 return (error); 1625 ia->ia_flags |= IFA_ROUTE; 1626 } 1627 if (plen < 128) { 1628 /* 1629 * The RTF_CLONING flag is necessary for in6_is_ifloop_auto(). 1630 */ 1631 ia->ia_ifa.ifa_flags |= RTF_CLONING; 1632 } 1633 1634 /* Add ownaddr as loopback rtentry, if necessary (ex. on p2p link). */ 1635 if (newhost) { 1636 /* set the rtrequest function to create llinfo */ 1637 ia->ia_ifa.ifa_rtrequest = nd6_rtrequest; 1638 in6_ifaddloop(&(ia->ia_ifa)); 1639 } 1640 1641 return (error); 1642 } 1643 1644 struct in6_multi_mship * 1645 in6_joingroup(struct ifnet *ifp, struct in6_addr *addr, int *errorp) 1646 { 1647 struct in6_multi_mship *imm; 1648 1649 imm = kmalloc(sizeof(*imm), M_IPMADDR, M_NOWAIT); 1650 if (!imm) { 1651 *errorp = ENOBUFS; 1652 return NULL; 1653 } 1654 imm->i6mm_maddr = in6_addmulti(addr, ifp, errorp); 1655 if (!imm->i6mm_maddr) { 1656 /* *errorp is alrady set */ 1657 kfree(imm, M_IPMADDR); 1658 return NULL; 1659 } 1660 return imm; 1661 } 1662 1663 int 1664 in6_leavegroup(struct in6_multi_mship *imm) 1665 { 1666 1667 if (imm->i6mm_maddr) 1668 in6_delmulti(imm->i6mm_maddr); 1669 kfree(imm, M_IPMADDR); 1670 return 0; 1671 } 1672 1673 /* 1674 * Add an address to the list of IP6 multicast addresses for a 1675 * given interface. 1676 */ 1677 struct in6_multi * 1678 in6_addmulti(struct in6_addr *maddr6, struct ifnet *ifp, int *errorp) 1679 { 1680 struct in6_multi *in6m; 1681 struct sockaddr_in6 sin6; 1682 struct ifmultiaddr *ifma; 1683 1684 *errorp = 0; 1685 1686 crit_enter(); 1687 1688 /* 1689 * Call generic routine to add membership or increment 1690 * refcount. It wants addresses in the form of a sockaddr, 1691 * so we build one here (being careful to zero the unused bytes). 1692 */ 1693 bzero(&sin6, sizeof sin6); 1694 sin6.sin6_family = AF_INET6; 1695 sin6.sin6_len = sizeof sin6; 1696 sin6.sin6_addr = *maddr6; 1697 *errorp = if_addmulti(ifp, (struct sockaddr *)&sin6, &ifma); 1698 if (*errorp) { 1699 crit_exit(); 1700 return 0; 1701 } 1702 1703 /* 1704 * If ifma->ifma_protospec is null, then if_addmulti() created 1705 * a new record. Otherwise, we are done. 1706 */ 1707 if (ifma->ifma_protospec != NULL) { 1708 crit_exit(); 1709 return ifma->ifma_protospec; 1710 } 1711 1712 in6m = kmalloc(sizeof(*in6m), M_IPMADDR, M_INTWAIT | M_ZERO); 1713 in6m->in6m_addr = *maddr6; 1714 in6m->in6m_ifp = ifp; 1715 in6m->in6m_ifma = ifma; 1716 ifma->ifma_protospec = in6m; 1717 LIST_INSERT_HEAD(&in6_multihead, in6m, in6m_entry); 1718 1719 /* 1720 * Let MLD6 know that we have joined a new IP6 multicast 1721 * group. 1722 */ 1723 mld6_start_listening(in6m); 1724 crit_exit(); 1725 return (in6m); 1726 } 1727 1728 /* 1729 * Delete a multicast address record. 1730 */ 1731 void 1732 in6_delmulti(struct in6_multi *in6m) 1733 { 1734 struct ifmultiaddr *ifma = in6m->in6m_ifma; 1735 1736 crit_enter(); 1737 1738 if (ifma->ifma_refcount == 1) { 1739 /* 1740 * No remaining claims to this record; let MLD6 know 1741 * that we are leaving the multicast group. 1742 */ 1743 mld6_stop_listening(in6m); 1744 ifma->ifma_protospec = NULL; 1745 LIST_REMOVE(in6m, in6m_entry); 1746 kfree(in6m, M_IPMADDR); 1747 } 1748 /* XXX - should be separate API for when we have an ifma? */ 1749 if_delmulti(ifma->ifma_ifp, ifma->ifma_addr); 1750 crit_exit(); 1751 } 1752 1753 /* 1754 * Find an IPv6 interface link-local address specific to an interface. 1755 */ 1756 struct in6_ifaddr * 1757 in6ifa_ifpforlinklocal(struct ifnet *ifp, int ignoreflags) 1758 { 1759 const struct ifaddr_container *ifac; 1760 1761 TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) { 1762 struct ifaddr *ifa = ifac->ifa; 1763 1764 if (ifa->ifa_addr == NULL) 1765 continue; /* just for safety */ 1766 if (ifa->ifa_addr->sa_family != AF_INET6) 1767 continue; 1768 if (IN6_IS_ADDR_LINKLOCAL(IFA_IN6(ifa))) { 1769 if ((((struct in6_ifaddr *)ifa)->ia6_flags & 1770 ignoreflags) != 0) 1771 continue; 1772 return (struct in6_ifaddr *)ifa; 1773 } 1774 } 1775 return NULL; 1776 } 1777 1778 1779 /* 1780 * find the internet address corresponding to a given interface and address. 1781 */ 1782 struct in6_ifaddr * 1783 in6ifa_ifpwithaddr(struct ifnet *ifp, struct in6_addr *addr) 1784 { 1785 const struct ifaddr_container *ifac; 1786 1787 TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) { 1788 struct ifaddr *ifa = ifac->ifa; 1789 1790 if (ifa->ifa_addr == NULL) 1791 continue; /* just for safety */ 1792 if (ifa->ifa_addr->sa_family != AF_INET6) 1793 continue; 1794 if (IN6_ARE_ADDR_EQUAL(addr, IFA_IN6(ifa))) 1795 return (struct in6_ifaddr *)ifa; 1796 } 1797 return NULL; 1798 } 1799 1800 /* 1801 * Find a link-local scoped address on ifp and return it if any. 1802 */ 1803 struct in6_ifaddr * 1804 in6ifa_llaonifp(struct ifnet *ifp) 1805 { 1806 const struct ifaddr_container *ifac; 1807 1808 TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) { 1809 const struct sockaddr_in6 *sin6; 1810 struct ifaddr *ifa = ifac->ifa; 1811 1812 if (ifa->ifa_addr->sa_family != AF_INET6) 1813 continue; 1814 sin6 = (const struct sockaddr_in6 *)ifa->ifa_addr; 1815 if (IN6_IS_SCOPE_LINKLOCAL(&sin6->sin6_addr) || 1816 /* XXX why are mcast addresses ifp address list? */ 1817 IN6_IS_ADDR_MC_INTFACELOCAL(&sin6->sin6_addr) || 1818 IN6_IS_ADDR_MC_NODELOCAL(&sin6->sin6_addr)) 1819 return (struct in6_ifaddr *)ifa; 1820 } 1821 return NULL; 1822 } 1823 1824 /* 1825 * find the internet address on a given interface corresponding to a neighbor's 1826 * address. 1827 */ 1828 struct in6_ifaddr * 1829 in6ifa_ifplocaladdr(const struct ifnet *ifp, const struct in6_addr *addr) 1830 { 1831 struct ifaddr *ifa; 1832 struct in6_ifaddr *ia; 1833 struct ifaddr_container *ifac; 1834 1835 TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) { 1836 ifa = ifac->ifa; 1837 1838 if (ifa->ifa_addr == NULL) 1839 continue; /* just for safety */ 1840 if (ifa->ifa_addr->sa_family != AF_INET6) 1841 continue; 1842 ia = (struct in6_ifaddr *)ifa; 1843 if (IN6_ARE_MASKED_ADDR_EQUAL(addr, 1844 &ia->ia_addr.sin6_addr, 1845 &ia->ia_prefixmask.sin6_addr)) 1846 return ia; 1847 } 1848 1849 return NULL; 1850 } 1851 1852 /* 1853 * Convert IP6 address to printable (loggable) representation. 1854 */ 1855 static char digits[] = "0123456789abcdef"; 1856 static int ip6round = 0; 1857 char * 1858 ip6_sprintf(const struct in6_addr *addr) 1859 { 1860 static char ip6buf[8][48]; 1861 int i; 1862 char *cp; 1863 const u_short *a = (const u_short *)addr; 1864 const u_char *d; 1865 int dcolon = 0; 1866 1867 ip6round = (ip6round + 1) & 7; 1868 cp = ip6buf[ip6round]; 1869 1870 for (i = 0; i < 8; i++) { 1871 if (dcolon == 1) { 1872 if (*a == 0) { 1873 if (i == 7) 1874 *cp++ = ':'; 1875 a++; 1876 continue; 1877 } else 1878 dcolon = 2; 1879 } 1880 if (*a == 0) { 1881 if (dcolon == 0 && *(a + 1) == 0) { 1882 if (i == 0) 1883 *cp++ = ':'; 1884 *cp++ = ':'; 1885 dcolon = 1; 1886 } else { 1887 *cp++ = '0'; 1888 *cp++ = ':'; 1889 } 1890 a++; 1891 continue; 1892 } 1893 d = (const u_char *)a; 1894 *cp++ = digits[*d >> 4]; 1895 *cp++ = digits[*d++ & 0xf]; 1896 *cp++ = digits[*d >> 4]; 1897 *cp++ = digits[*d & 0xf]; 1898 *cp++ = ':'; 1899 a++; 1900 } 1901 *--cp = 0; 1902 return (ip6buf[ip6round]); 1903 } 1904 1905 int 1906 in6_localaddr(struct in6_addr *in6) 1907 { 1908 struct in6_ifaddr *ia; 1909 1910 if (IN6_IS_ADDR_LOOPBACK(in6) || IN6_IS_ADDR_LINKLOCAL(in6)) 1911 return 1; 1912 1913 for (ia = in6_ifaddr; ia; ia = ia->ia_next) 1914 if (IN6_ARE_MASKED_ADDR_EQUAL(in6, &ia->ia_addr.sin6_addr, 1915 &ia->ia_prefixmask.sin6_addr)) 1916 return 1; 1917 1918 return (0); 1919 } 1920 1921 int 1922 in6_is_addr_deprecated(struct sockaddr_in6 *sa6) 1923 { 1924 struct in6_ifaddr *ia; 1925 1926 for (ia = in6_ifaddr; ia; ia = ia->ia_next) { 1927 if (IN6_ARE_ADDR_EQUAL(&ia->ia_addr.sin6_addr, 1928 &sa6->sin6_addr) && 1929 (ia->ia6_flags & IN6_IFF_DEPRECATED)) 1930 return (1); /* true */ 1931 1932 /* XXX: do we still have to go thru the rest of the list? */ 1933 } 1934 1935 return (0); /* false */ 1936 } 1937 1938 /* 1939 * return length of part which dst and src are equal 1940 * hard coding... 1941 */ 1942 int 1943 in6_matchlen(struct in6_addr *src, struct in6_addr *dst) 1944 { 1945 int match = 0; 1946 u_char *s = (u_char *)src, *d = (u_char *)dst; 1947 u_char *lim = s + 16, r; 1948 1949 while (s < lim) 1950 if ((r = (*d++ ^ *s++)) != 0) { 1951 while (r < 128) { 1952 match++; 1953 r <<= 1; 1954 } 1955 break; 1956 } else 1957 match += 8; 1958 return match; 1959 } 1960 1961 /* XXX: to be scope conscious */ 1962 int 1963 in6_are_prefix_equal(struct in6_addr *p1, struct in6_addr *p2, int len) 1964 { 1965 int bytelen, bitlen; 1966 1967 /* sanity check */ 1968 if (0 > len || len > 128) { 1969 log(LOG_ERR, "in6_are_prefix_equal: invalid prefix length(%d)\n", 1970 len); 1971 return (0); 1972 } 1973 1974 bytelen = len / 8; 1975 bitlen = len % 8; 1976 1977 if (bcmp(&p1->s6_addr, &p2->s6_addr, bytelen)) 1978 return (0); 1979 if (p1->s6_addr[bytelen] >> (8 - bitlen) != 1980 p2->s6_addr[bytelen] >> (8 - bitlen)) 1981 return (0); 1982 1983 return (1); 1984 } 1985 1986 void 1987 in6_prefixlen2mask(struct in6_addr *maskp, int len) 1988 { 1989 u_char maskarray[8] = {0x80, 0xc0, 0xe0, 0xf0, 0xf8, 0xfc, 0xfe, 0xff}; 1990 int bytelen, bitlen, i; 1991 1992 /* sanity check */ 1993 if (0 > len || len > 128) { 1994 log(LOG_ERR, "in6_prefixlen2mask: invalid prefix length(%d)\n", 1995 len); 1996 return; 1997 } 1998 1999 bzero(maskp, sizeof(*maskp)); 2000 bytelen = len / 8; 2001 bitlen = len % 8; 2002 for (i = 0; i < bytelen; i++) 2003 maskp->s6_addr[i] = 0xff; 2004 if (bitlen) 2005 maskp->s6_addr[bytelen] = maskarray[bitlen - 1]; 2006 } 2007 2008 /* 2009 * return the best address out of the same scope 2010 */ 2011 struct in6_ifaddr * 2012 in6_ifawithscope(struct ifnet *oifp, struct in6_addr *dst, struct ucred *cred) 2013 { 2014 int dst_scope = in6_addrscope(dst), src_scope, best_scope = 0; 2015 int blen = -1; 2016 struct in6_ifaddr *ifa_best = NULL; 2017 int jailed = 0; 2018 const struct ifnet_array *arr; 2019 int i; 2020 2021 if(cred && cred->cr_prison) 2022 jailed = 1; 2023 2024 if (oifp == NULL) { 2025 #if 0 2026 kprintf("in6_ifawithscope: output interface is not specified\n"); 2027 #endif 2028 return (NULL); 2029 } 2030 2031 /* 2032 * We search for all addresses on all interfaces from the beginning. 2033 * Comparing an interface with the outgoing interface will be done 2034 * only at the final stage of tiebreaking. 2035 */ 2036 arr = ifnet_array_get(); 2037 for (i = 0; i < arr->ifnet_count; ++i) { 2038 struct ifnet *ifp = arr->ifnet_arr[i]; 2039 struct ifaddr_container *ifac; 2040 2041 /* 2042 * We can never take an address that breaks the scope zone 2043 * of the destination. 2044 */ 2045 if (ifp->if_afdata[AF_INET6] == NULL) 2046 continue; 2047 if (in6_addr2scopeid(ifp, dst) != in6_addr2scopeid(oifp, dst)) 2048 continue; 2049 2050 TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) { 2051 int tlen = -1, dscopecmp, bscopecmp, matchcmp; 2052 struct ifaddr *ifa = ifac->ifa; 2053 2054 if (ifa->ifa_addr->sa_family != AF_INET6) 2055 continue; 2056 2057 src_scope = in6_addrscope(IFA_IN6(ifa)); 2058 2059 /* 2060 * Don't use an address before completing DAD 2061 * nor a duplicated address. 2062 */ 2063 if (((struct in6_ifaddr *)ifa)->ia6_flags & 2064 IN6_IFF_NOTREADY) 2065 continue; 2066 2067 /* XXX: is there any case to allow anycasts? */ 2068 if (((struct in6_ifaddr *)ifa)->ia6_flags & 2069 IN6_IFF_ANYCAST) 2070 continue; 2071 2072 if (((struct in6_ifaddr *)ifa)->ia6_flags & 2073 IN6_IFF_DETACHED) 2074 continue; 2075 2076 /* Skip adresses not valid for current jail */ 2077 if (jailed && 2078 !(jailed_ip(cred->cr_prison, (struct sockaddr *)(ifa->ifa_addr)) != 0)) 2079 continue; 2080 2081 /* 2082 * If this is the first address we find, 2083 * keep it anyway. 2084 */ 2085 if (ifa_best == NULL) 2086 goto replace; 2087 2088 /* 2089 * ifa_best is never NULL beyond this line except 2090 * within the block labeled "replace". 2091 */ 2092 2093 /* 2094 * If ifa_best has a smaller scope than dst and 2095 * the current address has a larger one than 2096 * (or equal to) dst, always replace ifa_best. 2097 * Also, if the current address has a smaller scope 2098 * than dst, ignore it unless ifa_best also has a 2099 * smaller scope. 2100 * Consequently, after the two if-clause below, 2101 * the followings must be satisfied: 2102 * (scope(src) < scope(dst) && 2103 * scope(best) < scope(dst)) 2104 * OR 2105 * (scope(best) >= scope(dst) && 2106 * scope(src) >= scope(dst)) 2107 */ 2108 if (IN6_ARE_SCOPE_CMP(best_scope, dst_scope) < 0 && 2109 IN6_ARE_SCOPE_CMP(src_scope, dst_scope) >= 0) 2110 goto replace; /* (A) */ 2111 if (IN6_ARE_SCOPE_CMP(src_scope, dst_scope) < 0 && 2112 IN6_ARE_SCOPE_CMP(best_scope, dst_scope) >= 0) 2113 continue; /* (B) */ 2114 2115 /* 2116 * A deprecated address SHOULD NOT be used in new 2117 * communications if an alternate (non-deprecated) 2118 * address is available and has sufficient scope. 2119 * RFC 2462, Section 5.5.4. 2120 */ 2121 if (((struct in6_ifaddr *)ifa)->ia6_flags & 2122 IN6_IFF_DEPRECATED) { 2123 /* 2124 * Ignore any deprecated addresses if 2125 * specified by configuration. 2126 */ 2127 if (!ip6_use_deprecated) 2128 continue; 2129 2130 /* 2131 * If we have already found a non-deprecated 2132 * candidate, just ignore deprecated addresses. 2133 */ 2134 if (!(ifa_best->ia6_flags & IN6_IFF_DEPRECATED)) 2135 continue; 2136 } 2137 2138 /* 2139 * A non-deprecated address is always preferred 2140 * to a deprecated one regardless of scopes and 2141 * address matching (Note invariants ensured by the 2142 * conditions (A) and (B) above.) 2143 */ 2144 if ((ifa_best->ia6_flags & IN6_IFF_DEPRECATED) && 2145 !(((struct in6_ifaddr *)ifa)->ia6_flags & 2146 IN6_IFF_DEPRECATED)) 2147 goto replace; 2148 2149 /* 2150 * When we use temporary addresses described in 2151 * RFC 3041, we prefer temporary addresses to 2152 * public autoconf addresses. Again, note the 2153 * invariants from (A) and (B). Also note that we 2154 * don't have any preference between static addresses 2155 * and autoconf addresses (despite of whether or not 2156 * the latter is temporary or public.) 2157 */ 2158 if (ip6_use_tempaddr) { 2159 struct in6_ifaddr *ifat; 2160 2161 ifat = (struct in6_ifaddr *)ifa; 2162 if ((ifa_best->ia6_flags & 2163 (IN6_IFF_AUTOCONF|IN6_IFF_TEMPORARY)) 2164 == IN6_IFF_AUTOCONF && 2165 (ifat->ia6_flags & 2166 (IN6_IFF_AUTOCONF|IN6_IFF_TEMPORARY)) 2167 == (IN6_IFF_AUTOCONF|IN6_IFF_TEMPORARY)) { 2168 goto replace; 2169 } 2170 if ((ifa_best->ia6_flags & 2171 (IN6_IFF_AUTOCONF|IN6_IFF_TEMPORARY)) 2172 == (IN6_IFF_AUTOCONF|IN6_IFF_TEMPORARY) && 2173 (ifat->ia6_flags & 2174 (IN6_IFF_AUTOCONF|IN6_IFF_TEMPORARY)) 2175 == IN6_IFF_AUTOCONF) { 2176 continue; 2177 } 2178 } 2179 2180 /* 2181 * At this point, we have two cases: 2182 * 1. we are looking at a non-deprecated address, 2183 * and ifa_best is also non-deprecated. 2184 * 2. we are looking at a deprecated address, 2185 * and ifa_best is also deprecated. 2186 * Also, we do not have to consider a case where 2187 * the scope of if_best is larger(smaller) than dst and 2188 * the scope of the current address is smaller(larger) 2189 * than dst. Such a case has already been covered. 2190 * Tiebreaking is done according to the following 2191 * items: 2192 * - the scope comparison between the address and 2193 * dst (dscopecmp) 2194 * - the scope comparison between the address and 2195 * ifa_best (bscopecmp) 2196 * - if the address match dst longer than ifa_best 2197 * (matchcmp) 2198 * - if the address is on the outgoing I/F (outI/F) 2199 * 2200 * Roughly speaking, the selection policy is 2201 * - the most important item is scope. The same scope 2202 * is best. Then search for a larger scope. 2203 * Smaller scopes are the last resort. 2204 * - A deprecated address is chosen only when we have 2205 * no address that has an enough scope, but is 2206 * prefered to any addresses of smaller scopes 2207 * (this must be already done above.) 2208 * - addresses on the outgoing I/F are preferred to 2209 * ones on other interfaces if none of above 2210 * tiebreaks. In the table below, the column "bI" 2211 * means if the best_ifa is on the outgoing 2212 * interface, and the column "sI" means if the ifa 2213 * is on the outgoing interface. 2214 * - If there is no other reasons to choose one, 2215 * longest address match against dst is considered. 2216 * 2217 * The precise decision table is as follows: 2218 * dscopecmp bscopecmp match bI oI | replace? 2219 * N/A equal N/A Y N | No (1) 2220 * N/A equal N/A N Y | Yes (2) 2221 * N/A equal larger N/A | Yes (3) 2222 * N/A equal !larger N/A | No (4) 2223 * larger larger N/A N/A | No (5) 2224 * larger smaller N/A N/A | Yes (6) 2225 * smaller larger N/A N/A | Yes (7) 2226 * smaller smaller N/A N/A | No (8) 2227 * equal smaller N/A N/A | Yes (9) 2228 * equal larger (already done at A above) 2229 */ 2230 dscopecmp = IN6_ARE_SCOPE_CMP(src_scope, dst_scope); 2231 bscopecmp = IN6_ARE_SCOPE_CMP(src_scope, best_scope); 2232 2233 if (bscopecmp == 0) { 2234 struct ifnet *bifp = ifa_best->ia_ifp; 2235 2236 if (bifp == oifp && ifp != oifp) /* (1) */ 2237 continue; 2238 if (bifp != oifp && ifp == oifp) /* (2) */ 2239 goto replace; 2240 2241 /* 2242 * Both bifp and ifp are on the outgoing 2243 * interface, or both two are on a different 2244 * interface from the outgoing I/F. 2245 * now we need address matching against dst 2246 * for tiebreaking. 2247 */ 2248 tlen = in6_matchlen(IFA_IN6(ifa), dst); 2249 matchcmp = tlen - blen; 2250 if (matchcmp > 0) /* (3) */ 2251 goto replace; 2252 continue; /* (4) */ 2253 } 2254 if (dscopecmp > 0) { 2255 if (bscopecmp > 0) /* (5) */ 2256 continue; 2257 goto replace; /* (6) */ 2258 } 2259 if (dscopecmp < 0) { 2260 if (bscopecmp > 0) /* (7) */ 2261 goto replace; 2262 continue; /* (8) */ 2263 } 2264 2265 /* now dscopecmp must be 0 */ 2266 if (bscopecmp < 0) 2267 goto replace; /* (9) */ 2268 2269 replace: 2270 ifa_best = (struct in6_ifaddr *)ifa; 2271 blen = tlen >= 0 ? tlen : 2272 in6_matchlen(IFA_IN6(ifa), dst); 2273 best_scope = in6_addrscope(&ifa_best->ia_addr.sin6_addr); 2274 } 2275 } 2276 2277 /* count statistics for future improvements */ 2278 if (ifa_best == NULL) 2279 ip6stat.ip6s_sources_none++; 2280 else { 2281 if (oifp == ifa_best->ia_ifp) 2282 ip6stat.ip6s_sources_sameif[best_scope]++; 2283 else 2284 ip6stat.ip6s_sources_otherif[best_scope]++; 2285 2286 if (best_scope == dst_scope) 2287 ip6stat.ip6s_sources_samescope[best_scope]++; 2288 else 2289 ip6stat.ip6s_sources_otherscope[best_scope]++; 2290 2291 if (ifa_best->ia6_flags & IN6_IFF_DEPRECATED) 2292 ip6stat.ip6s_sources_deprecated[best_scope]++; 2293 } 2294 2295 return (ifa_best); 2296 } 2297 2298 /* 2299 * return the best address out of the same scope. if no address was 2300 * found, return the first valid address from designated IF. 2301 */ 2302 struct in6_ifaddr * 2303 in6_ifawithifp(struct ifnet *ifp, struct in6_addr *dst) 2304 { 2305 int dst_scope = in6_addrscope(dst), blen = -1, tlen; 2306 struct ifaddr_container *ifac; 2307 struct in6_ifaddr *besta = NULL; 2308 struct in6_ifaddr *dep[2]; /* last-resort: deprecated */ 2309 2310 dep[0] = dep[1] = NULL; 2311 2312 /* 2313 * We first look for addresses in the same scope. 2314 * If there is one, return it. 2315 * If two or more, return one which matches the dst longest. 2316 * If none, return one of global addresses assigned other ifs. 2317 */ 2318 TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) { 2319 struct ifaddr *ifa = ifac->ifa; 2320 2321 if (ifa->ifa_addr->sa_family != AF_INET6) 2322 continue; 2323 if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_ANYCAST) 2324 continue; /* XXX: is there any case to allow anycast? */ 2325 if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_NOTREADY) 2326 continue; /* don't use this interface */ 2327 if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_DETACHED) 2328 continue; 2329 if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_DEPRECATED) { 2330 if (ip6_use_deprecated) 2331 dep[0] = (struct in6_ifaddr *)ifa; 2332 continue; 2333 } 2334 2335 if (dst_scope == in6_addrscope(IFA_IN6(ifa))) { 2336 /* 2337 * call in6_matchlen() as few as possible 2338 */ 2339 if (besta) { 2340 if (blen == -1) 2341 blen = in6_matchlen(&besta->ia_addr.sin6_addr, dst); 2342 tlen = in6_matchlen(IFA_IN6(ifa), dst); 2343 if (tlen > blen) { 2344 blen = tlen; 2345 besta = (struct in6_ifaddr *)ifa; 2346 } 2347 } else 2348 besta = (struct in6_ifaddr *)ifa; 2349 } 2350 } 2351 if (besta) 2352 return (besta); 2353 2354 TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) { 2355 struct ifaddr *ifa = ifac->ifa; 2356 2357 if (ifa->ifa_addr->sa_family != AF_INET6) 2358 continue; 2359 if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_ANYCAST) 2360 continue; /* XXX: is there any case to allow anycast? */ 2361 if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_NOTREADY) 2362 continue; /* don't use this interface */ 2363 if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_DETACHED) 2364 continue; 2365 if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_DEPRECATED) { 2366 if (ip6_use_deprecated) 2367 dep[1] = (struct in6_ifaddr *)ifa; 2368 continue; 2369 } 2370 2371 return (struct in6_ifaddr *)ifa; 2372 } 2373 2374 /* use the last-resort values, that are, deprecated addresses */ 2375 if (dep[0]) 2376 return dep[0]; 2377 if (dep[1]) 2378 return dep[1]; 2379 2380 return NULL; 2381 } 2382 2383 /* 2384 * perform DAD when interface becomes IFF_UP. 2385 */ 2386 static void 2387 in6_if_up_dispatch(netmsg_t nmsg) 2388 { 2389 struct lwkt_msg *lmsg = &nmsg->lmsg; 2390 struct ifnet *ifp = lmsg->u.ms_resultp; 2391 struct ifaddr_container *ifac; 2392 struct in6_ifaddr *ia; 2393 int dad_delay; /* delay ticks before DAD output */ 2394 2395 ASSERT_IN_NETISR(0); 2396 2397 /* 2398 * special cases, like 6to4, are handled in in6_ifattach 2399 */ 2400 in6_ifattach(ifp, NULL); 2401 2402 dad_delay = 0; 2403 TAILQ_FOREACH(ifac, &ifp->if_addrheads[mycpuid], ifa_link) { 2404 struct ifaddr *ifa = ifac->ifa; 2405 2406 if (ifa->ifa_addr->sa_family != AF_INET6) 2407 continue; 2408 ia = (struct in6_ifaddr *)ifa; 2409 if (ia->ia6_flags & IN6_IFF_TENTATIVE) 2410 nd6_dad_start(ifa, &dad_delay); 2411 } 2412 2413 lwkt_replymsg(lmsg, 0); 2414 } 2415 2416 void 2417 in6_if_up(struct ifnet *ifp) 2418 { 2419 struct netmsg_base nmsg; 2420 struct lwkt_msg *lmsg = &nmsg.lmsg; 2421 2422 ASSERT_CANDOMSG_NETISR0(curthread); 2423 2424 netmsg_init(&nmsg, NULL, &curthread->td_msgport, 0, in6_if_up_dispatch); 2425 lmsg->u.ms_resultp = ifp; 2426 lwkt_domsg(netisr_cpuport(0), lmsg, 0); 2427 } 2428 2429 int 2430 in6if_do_dad(struct ifnet *ifp) 2431 { 2432 if (ifp->if_flags & IFF_LOOPBACK) 2433 return (0); 2434 2435 switch (ifp->if_type) { 2436 #ifdef IFT_DUMMY 2437 case IFT_DUMMY: 2438 #endif 2439 case IFT_FAITH: 2440 /* 2441 * These interfaces do not have the IFF_LOOPBACK flag, 2442 * but loop packets back. We do not have to do DAD on such 2443 * interfaces. We should even omit it, because loop-backed 2444 * NS would confuse the DAD procedure. 2445 */ 2446 return (0); 2447 default: 2448 /* 2449 * Our DAD routine requires the interface up and running. 2450 * However, some interfaces can be up before the RUNNING 2451 * status. Additionaly, users may try to assign addresses 2452 * before the interface becomes up (or running). 2453 * We simply skip DAD in such a case as a work around. 2454 * XXX: we should rather mark "tentative" on such addresses, 2455 * and do DAD after the interface becomes ready. 2456 */ 2457 if ((ifp->if_flags & (IFF_UP|IFF_RUNNING)) != 2458 (IFF_UP|IFF_RUNNING)) 2459 return (0); 2460 2461 return (1); 2462 } 2463 } 2464 2465 /* 2466 * Calculate max IPv6 MTU through all the interfaces and store it 2467 * to in6_maxmtu. 2468 */ 2469 void 2470 in6_setmaxmtu(void) 2471 { 2472 unsigned long maxmtu = 0; 2473 const struct ifnet_array *arr; 2474 int i; 2475 2476 ASSERT_IN_NETISR(0); 2477 2478 arr = ifnet_array_get(); 2479 for (i = 0; i < arr->ifnet_count; ++i) { 2480 struct ifnet *ifp = arr->ifnet_arr[i]; 2481 2482 /* this function can be called during ifnet initialization */ 2483 if (ifp->if_afdata[AF_INET6] == NULL) 2484 continue; 2485 if ((ifp->if_flags & IFF_LOOPBACK) == 0 && 2486 IN6_LINKMTU(ifp) > maxmtu) 2487 maxmtu = IN6_LINKMTU(ifp); 2488 } 2489 if (maxmtu) /* update only when maxmtu is positive */ 2490 in6_maxmtu = maxmtu; 2491 } 2492 2493 void * 2494 in6_domifattach(struct ifnet *ifp) 2495 { 2496 struct in6_ifextra *ext; 2497 2498 ext = (struct in6_ifextra *)kmalloc(sizeof(*ext), M_IFADDR, M_WAITOK); 2499 bzero(ext, sizeof(*ext)); 2500 2501 ext->in6_ifstat = (struct in6_ifstat *)kmalloc(sizeof(struct in6_ifstat), 2502 M_IFADDR, M_WAITOK); 2503 bzero(ext->in6_ifstat, sizeof(*ext->in6_ifstat)); 2504 2505 ext->icmp6_ifstat = 2506 (struct icmp6_ifstat *)kmalloc(sizeof(struct icmp6_ifstat), 2507 M_IFADDR, M_WAITOK); 2508 bzero(ext->icmp6_ifstat, sizeof(*ext->icmp6_ifstat)); 2509 2510 ext->nd_ifinfo = nd6_ifattach(ifp); 2511 ext->scope6_id = scope6_ifattach(ifp); 2512 return ext; 2513 } 2514 2515 void 2516 in6_domifdetach(struct ifnet *ifp, void *aux) 2517 { 2518 struct in6_ifextra *ext = (struct in6_ifextra *)aux; 2519 scope6_ifdetach(ext->scope6_id); 2520 nd6_ifdetach(ext->nd_ifinfo); 2521 kfree(ext->in6_ifstat, M_IFADDR); 2522 kfree(ext->icmp6_ifstat, M_IFADDR); 2523 kfree(ext, M_IFADDR); 2524 } 2525