1 /* $NetBSD: in.c,v 1.96 2004/06/22 12:50:41 itojun Exp $ */ 2 3 /* 4 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. 5 * All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 3. Neither the name of the project nor the names of its contributors 16 * may be used to endorse or promote products derived from this software 17 * without specific prior written permission. 18 * 19 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND 20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 22 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE 23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 29 * SUCH DAMAGE. 30 */ 31 32 /*- 33 * Copyright (c) 1998 The NetBSD Foundation, Inc. 34 * All rights reserved. 35 * 36 * This code is derived from software contributed to The NetBSD Foundation 37 * by Public Access Networks Corporation ("Panix"). It was developed under 38 * contract to Panix by Eric Haszlakiewicz and Thor Lancelot Simon. 39 * 40 * Redistribution and use in source and binary forms, with or without 41 * modification, are permitted provided that the following conditions 42 * are met: 43 * 1. Redistributions of source code must retain the above copyright 44 * notice, this list of conditions and the following disclaimer. 45 * 2. Redistributions in binary form must reproduce the above copyright 46 * notice, this list of conditions and the following disclaimer in the 47 * documentation and/or other materials provided with the distribution. 48 * 3. All advertising materials mentioning features or use of this software 49 * must display the following acknowledgement: 50 * This product includes software developed by the NetBSD 51 * Foundation, Inc. and its contributors. 52 * 4. Neither the name of The NetBSD Foundation nor the names of its 53 * contributors may be used to endorse or promote products derived 54 * from this software without specific prior written permission. 55 * 56 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 57 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 58 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 59 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 60 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 61 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 62 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 63 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 64 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 65 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 66 * POSSIBILITY OF SUCH DAMAGE. 67 */ 68 69 /* 70 * Copyright (c) 1982, 1986, 1991, 1993 71 * The Regents of the University of California. All rights reserved. 72 * 73 * Redistribution and use in source and binary forms, with or without 74 * modification, are permitted provided that the following conditions 75 * are met: 76 * 1. Redistributions of source code must retain the above copyright 77 * notice, this list of conditions and the following disclaimer. 78 * 2. Redistributions in binary form must reproduce the above copyright 79 * notice, this list of conditions and the following disclaimer in the 80 * documentation and/or other materials provided with the distribution. 81 * 3. Neither the name of the University nor the names of its contributors 82 * may be used to endorse or promote products derived from this software 83 * without specific prior written permission. 84 * 85 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 86 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 87 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 88 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 89 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 90 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 91 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 92 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 93 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 94 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 95 * SUCH DAMAGE. 96 * 97 * @(#)in.c 8.4 (Berkeley) 1/9/95 98 */ 99 100 #include <sys/cdefs.h> 101 __KERNEL_RCSID(0, "$NetBSD: in.c,v 1.96 2004/06/22 12:50:41 itojun Exp $"); 102 103 #include "opt_inet.h" 104 #include "opt_inet_conf.h" 105 #include "opt_mrouting.h" 106 #include "opt_pfil_hooks.h" 107 108 #include <sys/param.h> 109 #include <sys/ioctl.h> 110 #include <sys/errno.h> 111 #include <sys/malloc.h> 112 #include <sys/socket.h> 113 #include <sys/socketvar.h> 114 #include <sys/systm.h> 115 #include <sys/proc.h> 116 #include <sys/syslog.h> 117 118 #include <net/if.h> 119 #include <net/route.h> 120 121 #include <net/if_ether.h> 122 123 #include <netinet/in_systm.h> 124 #include <netinet/in.h> 125 #include <netinet/in_var.h> 126 #include <netinet/ip.h> 127 #include <netinet/ip_var.h> 128 #include <netinet/in_pcb.h> 129 #include <netinet/if_inarp.h> 130 #include <netinet/ip_mroute.h> 131 #include <netinet/igmp_var.h> 132 133 #ifdef PFIL_HOOKS 134 #include <net/pfil.h> 135 #endif 136 137 #ifdef INET 138 static u_int in_mask2len __P((struct in_addr *)); 139 static void in_len2mask __P((struct in_addr *, u_int)); 140 static int in_lifaddr_ioctl __P((struct socket *, u_long, caddr_t, 141 struct ifnet *, struct proc *)); 142 143 static int in_addprefix __P((struct in_ifaddr *, int)); 144 static int in_scrubprefix __P((struct in_ifaddr *)); 145 146 #ifndef SUBNETSARELOCAL 147 #define SUBNETSARELOCAL 1 148 #endif 149 150 #ifndef HOSTZEROBROADCAST 151 #define HOSTZEROBROADCAST 1 152 #endif 153 154 int subnetsarelocal = SUBNETSARELOCAL; 155 int hostzeroisbroadcast = HOSTZEROBROADCAST; 156 157 /* 158 * This list is used to keep track of in_multi chains which belong to 159 * deleted interface addresses. We use in_ifaddr so that a chain head 160 * won't be deallocated until all multicast address record are deleted. 161 */ 162 static TAILQ_HEAD(, in_ifaddr) in_mk = TAILQ_HEAD_INITIALIZER(in_mk); 163 164 /* 165 * Return 1 if an internet address is for a ``local'' host 166 * (one to which we have a connection). If subnetsarelocal 167 * is true, this includes other subnets of the local net. 168 * Otherwise, it includes only the directly-connected (sub)nets. 169 */ 170 int 171 in_localaddr(in) 172 struct in_addr in; 173 { 174 struct in_ifaddr *ia; 175 176 if (subnetsarelocal) { 177 TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list) 178 if ((in.s_addr & ia->ia_netmask) == ia->ia_net) 179 return (1); 180 } else { 181 TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list) 182 if ((in.s_addr & ia->ia_subnetmask) == ia->ia_subnet) 183 return (1); 184 } 185 return (0); 186 } 187 188 /* 189 * Determine whether an IP address is in a reserved set of addresses 190 * that may not be forwarded, or whether datagrams to that destination 191 * may be forwarded. 192 */ 193 int 194 in_canforward(in) 195 struct in_addr in; 196 { 197 u_int32_t net; 198 199 if (IN_EXPERIMENTAL(in.s_addr) || IN_MULTICAST(in.s_addr)) 200 return (0); 201 if (IN_CLASSA(in.s_addr)) { 202 net = in.s_addr & IN_CLASSA_NET; 203 if (net == 0 || net == htonl(IN_LOOPBACKNET << IN_CLASSA_NSHIFT)) 204 return (0); 205 } 206 return (1); 207 } 208 209 /* 210 * Trim a mask in a sockaddr 211 */ 212 void 213 in_socktrim(ap) 214 struct sockaddr_in *ap; 215 { 216 char *cplim = (char *) &ap->sin_addr; 217 char *cp = (char *) (&ap->sin_addr + 1); 218 219 ap->sin_len = 0; 220 while (--cp >= cplim) 221 if (*cp) { 222 (ap)->sin_len = cp - (char *) (ap) + 1; 223 break; 224 } 225 } 226 227 /* 228 * Routine to take an Internet address and convert into a 229 * "dotted quad" representation for printing. 230 */ 231 const char * 232 in_fmtaddr(addr) 233 struct in_addr addr; 234 { 235 static char buf[sizeof("123.456.789.123")]; 236 237 addr.s_addr = ntohl(addr.s_addr); 238 239 snprintf(buf, sizeof(buf), "%d.%d.%d.%d", 240 (addr.s_addr >> 24) & 0xFF, 241 (addr.s_addr >> 16) & 0xFF, 242 (addr.s_addr >> 8) & 0xFF, 243 (addr.s_addr >> 0) & 0xFF); 244 return buf; 245 } 246 247 /* 248 * Maintain the "in_maxmtu" variable, which is the largest 249 * mtu for non-local interfaces with AF_INET addresses assigned 250 * to them that are up. 251 */ 252 unsigned long in_maxmtu; 253 254 void 255 in_setmaxmtu() 256 { 257 struct in_ifaddr *ia; 258 struct ifnet *ifp; 259 unsigned long maxmtu = 0; 260 261 TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list) { 262 if ((ifp = ia->ia_ifp) == 0) 263 continue; 264 if ((ifp->if_flags & (IFF_UP|IFF_LOOPBACK)) != IFF_UP) 265 continue; 266 if (ifp->if_mtu > maxmtu) 267 maxmtu = ifp->if_mtu; 268 } 269 if (maxmtu) 270 in_maxmtu = maxmtu; 271 } 272 273 static u_int 274 in_mask2len(mask) 275 struct in_addr *mask; 276 { 277 u_int x, y; 278 u_char *p; 279 280 p = (u_char *)mask; 281 for (x = 0; x < sizeof(*mask); x++) { 282 if (p[x] != 0xff) 283 break; 284 } 285 y = 0; 286 if (x < sizeof(*mask)) { 287 for (y = 0; y < 8; y++) { 288 if ((p[x] & (0x80 >> y)) == 0) 289 break; 290 } 291 } 292 return x * 8 + y; 293 } 294 295 static void 296 in_len2mask(mask, len) 297 struct in_addr *mask; 298 u_int len; 299 { 300 u_int i; 301 u_char *p; 302 303 p = (u_char *)mask; 304 bzero(mask, sizeof(*mask)); 305 for (i = 0; i < len / 8; i++) 306 p[i] = 0xff; 307 if (len % 8) 308 p[i] = (0xff00 >> (len % 8)) & 0xff; 309 } 310 311 /* 312 * Generic internet control operations (ioctl's). 313 * Ifp is 0 if not an interface-specific ioctl. 314 */ 315 /* ARGSUSED */ 316 int 317 in_control(so, cmd, data, ifp, p) 318 struct socket *so; 319 u_long cmd; 320 caddr_t data; 321 struct ifnet *ifp; 322 struct proc *p; 323 { 324 struct ifreq *ifr = (struct ifreq *)data; 325 struct in_ifaddr *ia = 0; 326 struct in_aliasreq *ifra = (struct in_aliasreq *)data; 327 struct sockaddr_in oldaddr; 328 int error, hostIsNew, maskIsNew; 329 330 switch (cmd) { 331 case SIOCALIFADDR: 332 case SIOCDLIFADDR: 333 if (p == 0 || (error = suser(p->p_ucred, &p->p_acflag))) 334 return (EPERM); 335 /*fall through*/ 336 case SIOCGLIFADDR: 337 if (!ifp) 338 return EINVAL; 339 return in_lifaddr_ioctl(so, cmd, data, ifp, p); 340 } 341 342 /* 343 * Find address for this interface, if it exists. 344 */ 345 if (ifp) 346 IFP_TO_IA(ifp, ia); 347 348 switch (cmd) { 349 350 case SIOCAIFADDR: 351 case SIOCDIFADDR: 352 case SIOCGIFALIAS: 353 if (ifra->ifra_addr.sin_family == AF_INET) 354 LIST_FOREACH(ia, 355 &IN_IFADDR_HASH(ifra->ifra_addr.sin_addr.s_addr), 356 ia_hash) { 357 if (ia->ia_ifp == ifp && 358 in_hosteq(ia->ia_addr.sin_addr, 359 ifra->ifra_addr.sin_addr)) 360 break; 361 } 362 if (cmd == SIOCDIFADDR) { 363 if (ia == 0) 364 return (EADDRNOTAVAIL); 365 #if 1 /*def COMPAT_43*/ 366 if (ifra->ifra_addr.sin_family == AF_UNSPEC) 367 ifra->ifra_addr.sin_family = AF_INET; 368 #endif 369 } 370 /* FALLTHROUGH */ 371 case SIOCSIFADDR: 372 case SIOCSIFDSTADDR: 373 if (ifra->ifra_addr.sin_family != AF_INET) 374 return (EAFNOSUPPORT); 375 /* FALLTHROUGH */ 376 case SIOCSIFNETMASK: 377 if (ifp == 0) 378 panic("in_control"); 379 380 if (cmd == SIOCGIFALIAS) 381 break; 382 383 if (p == 0 || (error = suser(p->p_ucred, &p->p_acflag))) 384 return (EPERM); 385 386 if (ia == 0) { 387 MALLOC(ia, struct in_ifaddr *, sizeof(*ia), 388 M_IFADDR, M_WAITOK); 389 if (ia == 0) 390 return (ENOBUFS); 391 bzero((caddr_t)ia, sizeof *ia); 392 TAILQ_INSERT_TAIL(&in_ifaddrhead, ia, ia_list); 393 IFAREF(&ia->ia_ifa); 394 TAILQ_INSERT_TAIL(&ifp->if_addrlist, &ia->ia_ifa, 395 ifa_list); 396 IFAREF(&ia->ia_ifa); 397 ia->ia_ifa.ifa_addr = sintosa(&ia->ia_addr); 398 ia->ia_ifa.ifa_dstaddr = sintosa(&ia->ia_dstaddr); 399 ia->ia_ifa.ifa_netmask = sintosa(&ia->ia_sockmask); 400 ia->ia_sockmask.sin_len = 8; 401 if (ifp->if_flags & IFF_BROADCAST) { 402 ia->ia_broadaddr.sin_len = sizeof(ia->ia_addr); 403 ia->ia_broadaddr.sin_family = AF_INET; 404 } 405 ia->ia_ifp = ifp; 406 LIST_INIT(&ia->ia_multiaddrs); 407 } 408 break; 409 410 case SIOCSIFBRDADDR: 411 if (p == 0 || (error = suser(p->p_ucred, &p->p_acflag))) 412 return (EPERM); 413 /* FALLTHROUGH */ 414 415 case SIOCGIFADDR: 416 case SIOCGIFNETMASK: 417 case SIOCGIFDSTADDR: 418 case SIOCGIFBRDADDR: 419 if (ia == 0) 420 return (EADDRNOTAVAIL); 421 break; 422 } 423 switch (cmd) { 424 425 case SIOCGIFADDR: 426 *satosin(&ifr->ifr_addr) = ia->ia_addr; 427 break; 428 429 case SIOCGIFBRDADDR: 430 if ((ifp->if_flags & IFF_BROADCAST) == 0) 431 return (EINVAL); 432 *satosin(&ifr->ifr_dstaddr) = ia->ia_broadaddr; 433 break; 434 435 case SIOCGIFDSTADDR: 436 if ((ifp->if_flags & IFF_POINTOPOINT) == 0) 437 return (EINVAL); 438 *satosin(&ifr->ifr_dstaddr) = ia->ia_dstaddr; 439 break; 440 441 case SIOCGIFNETMASK: 442 *satosin(&ifr->ifr_addr) = ia->ia_sockmask; 443 break; 444 445 case SIOCSIFDSTADDR: 446 if ((ifp->if_flags & IFF_POINTOPOINT) == 0) 447 return (EINVAL); 448 oldaddr = ia->ia_dstaddr; 449 ia->ia_dstaddr = *satosin(&ifr->ifr_dstaddr); 450 if (ifp->if_ioctl && (error = (*ifp->if_ioctl) 451 (ifp, SIOCSIFDSTADDR, (caddr_t)ia))) { 452 ia->ia_dstaddr = oldaddr; 453 return (error); 454 } 455 if (ia->ia_flags & IFA_ROUTE) { 456 ia->ia_ifa.ifa_dstaddr = sintosa(&oldaddr); 457 rtinit(&(ia->ia_ifa), (int)RTM_DELETE, RTF_HOST); 458 ia->ia_ifa.ifa_dstaddr = sintosa(&ia->ia_dstaddr); 459 rtinit(&(ia->ia_ifa), (int)RTM_ADD, RTF_HOST|RTF_UP); 460 } 461 break; 462 463 case SIOCSIFBRDADDR: 464 if ((ifp->if_flags & IFF_BROADCAST) == 0) 465 return (EINVAL); 466 ia->ia_broadaddr = *satosin(&ifr->ifr_broadaddr); 467 break; 468 469 case SIOCSIFADDR: 470 error = in_ifinit(ifp, ia, satosin(&ifr->ifr_addr), 1); 471 #ifdef PFIL_HOOK 472 if (!error) 473 (void)pfil_run_hooks(&if_pfil, 474 (struct mbuf **)SIOCSIFADDR, ifp, PFIL_IFADDR); 475 #endif 476 return error; 477 478 case SIOCSIFNETMASK: 479 ia->ia_subnetmask = ia->ia_sockmask.sin_addr.s_addr = 480 ifra->ifra_addr.sin_addr.s_addr; 481 break; 482 483 case SIOCAIFADDR: 484 maskIsNew = 0; 485 hostIsNew = 1; 486 error = 0; 487 if (ia->ia_addr.sin_family == AF_INET) { 488 if (ifra->ifra_addr.sin_len == 0) { 489 ifra->ifra_addr = ia->ia_addr; 490 hostIsNew = 0; 491 } else if (in_hosteq(ia->ia_addr.sin_addr, ifra->ifra_addr.sin_addr)) 492 hostIsNew = 0; 493 } 494 if (ifra->ifra_mask.sin_len) { 495 in_ifscrub(ifp, ia); 496 ia->ia_sockmask = ifra->ifra_mask; 497 ia->ia_subnetmask = ia->ia_sockmask.sin_addr.s_addr; 498 maskIsNew = 1; 499 } 500 if ((ifp->if_flags & IFF_POINTOPOINT) && 501 (ifra->ifra_dstaddr.sin_family == AF_INET)) { 502 in_ifscrub(ifp, ia); 503 ia->ia_dstaddr = ifra->ifra_dstaddr; 504 maskIsNew = 1; /* We lie; but the effect's the same */ 505 } 506 if (ifra->ifra_addr.sin_family == AF_INET && 507 (hostIsNew || maskIsNew)) { 508 error = in_ifinit(ifp, ia, &ifra->ifra_addr, 0); 509 } 510 if ((ifp->if_flags & IFF_BROADCAST) && 511 (ifra->ifra_broadaddr.sin_family == AF_INET)) 512 ia->ia_broadaddr = ifra->ifra_broadaddr; 513 return (error); 514 515 case SIOCGIFALIAS: 516 ifra->ifra_mask = ia->ia_sockmask; 517 if ((ifp->if_flags & IFF_POINTOPOINT) && 518 (ia->ia_dstaddr.sin_family == AF_INET)) 519 ifra->ifra_dstaddr = ia->ia_dstaddr; 520 else if ((ifp->if_flags & IFF_BROADCAST) && 521 (ia->ia_broadaddr.sin_family == AF_INET)) 522 ifra->ifra_broadaddr = ia->ia_broadaddr; 523 else 524 bzero(&ifra->ifra_broadaddr, 525 sizeof(ifra->ifra_broadaddr)); 526 #ifdef PFIL_HOOK 527 (void)pfil_run_hooks(&if_pfil, 528 (struct mbuf **)SIOCGIFALIAS, ifp, PFIL_IFADDR); 529 #endif 530 return 0; 531 532 case SIOCDIFADDR: 533 in_purgeaddr(&ia->ia_ifa, ifp); 534 #ifdef PFIL_HOOK 535 (void)pfil_run_hooks(&if_pfil, (struct mbuf **)SIOCDIFADDR, 536 ifp, PFIL_IFADDR); 537 #endif 538 break; 539 540 #ifdef MROUTING 541 case SIOCGETVIFCNT: 542 case SIOCGETSGCNT: 543 return (mrt_ioctl(so, cmd, data)); 544 #endif /* MROUTING */ 545 546 default: 547 if (ifp == 0 || ifp->if_ioctl == 0) 548 return (EOPNOTSUPP); 549 error = (*ifp->if_ioctl)(ifp, cmd, data); 550 in_setmaxmtu(); 551 return (error); 552 } 553 return (0); 554 } 555 556 void 557 in_purgeaddr(ifa, ifp) 558 struct ifaddr *ifa; 559 struct ifnet *ifp; 560 { 561 struct in_ifaddr *ia = (void *) ifa; 562 563 in_ifscrub(ifp, ia); 564 LIST_REMOVE(ia, ia_hash); 565 TAILQ_REMOVE(&ifp->if_addrlist, &ia->ia_ifa, ifa_list); 566 IFAFREE(&ia->ia_ifa); 567 TAILQ_REMOVE(&in_ifaddrhead, ia, ia_list); 568 if (ia->ia_allhosts != NULL) 569 in_delmulti(ia->ia_allhosts); 570 IFAFREE(&ia->ia_ifa); 571 in_setmaxmtu(); 572 } 573 574 void 575 in_purgeif(ifp) 576 struct ifnet *ifp; 577 { 578 struct ifaddr *ifa, *nifa; 579 580 for (ifa = TAILQ_FIRST(&ifp->if_addrlist); ifa != NULL; ifa = nifa) { 581 nifa = TAILQ_NEXT(ifa, ifa_list); 582 if (ifa->ifa_addr->sa_family != AF_INET) 583 continue; 584 in_purgeaddr(ifa, ifp); 585 } 586 587 igmp_purgeif(ifp); 588 #ifdef MROUTING 589 ip_mrouter_detach(ifp); 590 #endif 591 } 592 593 /* 594 * SIOC[GAD]LIFADDR. 595 * SIOCGLIFADDR: get first address. (???) 596 * SIOCGLIFADDR with IFLR_PREFIX: 597 * get first address that matches the specified prefix. 598 * SIOCALIFADDR: add the specified address. 599 * SIOCALIFADDR with IFLR_PREFIX: 600 * EINVAL since we can't deduce hostid part of the address. 601 * SIOCDLIFADDR: delete the specified address. 602 * SIOCDLIFADDR with IFLR_PREFIX: 603 * delete the first address that matches the specified prefix. 604 * return values: 605 * EINVAL on invalid parameters 606 * EADDRNOTAVAIL on prefix match failed/specified address not found 607 * other values may be returned from in_ioctl() 608 */ 609 static int 610 in_lifaddr_ioctl(so, cmd, data, ifp, p) 611 struct socket *so; 612 u_long cmd; 613 caddr_t data; 614 struct ifnet *ifp; 615 struct proc *p; 616 { 617 struct if_laddrreq *iflr = (struct if_laddrreq *)data; 618 struct ifaddr *ifa; 619 struct sockaddr *sa; 620 621 /* sanity checks */ 622 if (!data || !ifp) { 623 panic("invalid argument to in_lifaddr_ioctl"); 624 /*NOTRECHED*/ 625 } 626 627 switch (cmd) { 628 case SIOCGLIFADDR: 629 /* address must be specified on GET with IFLR_PREFIX */ 630 if ((iflr->flags & IFLR_PREFIX) == 0) 631 break; 632 /*FALLTHROUGH*/ 633 case SIOCALIFADDR: 634 case SIOCDLIFADDR: 635 /* address must be specified on ADD and DELETE */ 636 sa = (struct sockaddr *)&iflr->addr; 637 if (sa->sa_family != AF_INET) 638 return EINVAL; 639 if (sa->sa_len != sizeof(struct sockaddr_in)) 640 return EINVAL; 641 /* XXX need improvement */ 642 sa = (struct sockaddr *)&iflr->dstaddr; 643 if (sa->sa_family 644 && sa->sa_family != AF_INET) 645 return EINVAL; 646 if (sa->sa_len && sa->sa_len != sizeof(struct sockaddr_in)) 647 return EINVAL; 648 break; 649 default: /*shouldn't happen*/ 650 #if 0 651 panic("invalid cmd to in_lifaddr_ioctl"); 652 /*NOTREACHED*/ 653 #else 654 return EOPNOTSUPP; 655 #endif 656 } 657 if (sizeof(struct in_addr) * 8 < iflr->prefixlen) 658 return EINVAL; 659 660 switch (cmd) { 661 case SIOCALIFADDR: 662 { 663 struct in_aliasreq ifra; 664 665 if (iflr->flags & IFLR_PREFIX) 666 return EINVAL; 667 668 /* copy args to in_aliasreq, perform ioctl(SIOCAIFADDR_IN). */ 669 bzero(&ifra, sizeof(ifra)); 670 bcopy(iflr->iflr_name, ifra.ifra_name, 671 sizeof(ifra.ifra_name)); 672 673 bcopy(&iflr->addr, &ifra.ifra_addr, 674 ((struct sockaddr *)&iflr->addr)->sa_len); 675 676 if (((struct sockaddr *)&iflr->dstaddr)->sa_family) { /*XXX*/ 677 bcopy(&iflr->dstaddr, &ifra.ifra_dstaddr, 678 ((struct sockaddr *)&iflr->dstaddr)->sa_len); 679 } 680 681 ifra.ifra_mask.sin_family = AF_INET; 682 ifra.ifra_mask.sin_len = sizeof(struct sockaddr_in); 683 in_len2mask(&ifra.ifra_mask.sin_addr, iflr->prefixlen); 684 685 return in_control(so, SIOCAIFADDR, (caddr_t)&ifra, ifp, p); 686 } 687 case SIOCGLIFADDR: 688 case SIOCDLIFADDR: 689 { 690 struct in_ifaddr *ia; 691 struct in_addr mask, candidate, match; 692 struct sockaddr_in *sin; 693 int cmp; 694 695 bzero(&mask, sizeof(mask)); 696 if (iflr->flags & IFLR_PREFIX) { 697 /* lookup a prefix rather than address. */ 698 in_len2mask(&mask, iflr->prefixlen); 699 700 sin = (struct sockaddr_in *)&iflr->addr; 701 match.s_addr = sin->sin_addr.s_addr; 702 match.s_addr &= mask.s_addr; 703 704 /* if you set extra bits, that's wrong */ 705 if (match.s_addr != sin->sin_addr.s_addr) 706 return EINVAL; 707 708 cmp = 1; 709 } else { 710 if (cmd == SIOCGLIFADDR) { 711 /* on getting an address, take the 1st match */ 712 cmp = 0; /*XXX*/ 713 } else { 714 /* on deleting an address, do exact match */ 715 in_len2mask(&mask, 32); 716 sin = (struct sockaddr_in *)&iflr->addr; 717 match.s_addr = sin->sin_addr.s_addr; 718 719 cmp = 1; 720 } 721 } 722 723 TAILQ_FOREACH(ifa, &ifp->if_addrlist, ifa_list) { 724 if (ifa->ifa_addr->sa_family != AF_INET) 725 continue; 726 if (!cmp) 727 break; 728 candidate.s_addr = ((struct sockaddr_in *)&ifa->ifa_addr)->sin_addr.s_addr; 729 candidate.s_addr &= mask.s_addr; 730 if (candidate.s_addr == match.s_addr) 731 break; 732 } 733 if (!ifa) 734 return EADDRNOTAVAIL; 735 ia = (struct in_ifaddr *)ifa; 736 737 if (cmd == SIOCGLIFADDR) { 738 /* fill in the if_laddrreq structure */ 739 bcopy(&ia->ia_addr, &iflr->addr, ia->ia_addr.sin_len); 740 741 if ((ifp->if_flags & IFF_POINTOPOINT) != 0) { 742 bcopy(&ia->ia_dstaddr, &iflr->dstaddr, 743 ia->ia_dstaddr.sin_len); 744 } else 745 bzero(&iflr->dstaddr, sizeof(iflr->dstaddr)); 746 747 iflr->prefixlen = 748 in_mask2len(&ia->ia_sockmask.sin_addr); 749 750 iflr->flags = 0; /*XXX*/ 751 752 return 0; 753 } else { 754 struct in_aliasreq ifra; 755 756 /* fill in_aliasreq and do ioctl(SIOCDIFADDR_IN) */ 757 bzero(&ifra, sizeof(ifra)); 758 bcopy(iflr->iflr_name, ifra.ifra_name, 759 sizeof(ifra.ifra_name)); 760 761 bcopy(&ia->ia_addr, &ifra.ifra_addr, 762 ia->ia_addr.sin_len); 763 if ((ifp->if_flags & IFF_POINTOPOINT) != 0) { 764 bcopy(&ia->ia_dstaddr, &ifra.ifra_dstaddr, 765 ia->ia_dstaddr.sin_len); 766 } 767 bcopy(&ia->ia_sockmask, &ifra.ifra_dstaddr, 768 ia->ia_sockmask.sin_len); 769 770 return in_control(so, SIOCDIFADDR, (caddr_t)&ifra, 771 ifp, p); 772 } 773 } 774 } 775 776 return EOPNOTSUPP; /*just for safety*/ 777 } 778 779 /* 780 * Delete any existing route for an interface. 781 */ 782 void 783 in_ifscrub(ifp, ia) 784 struct ifnet *ifp; 785 struct in_ifaddr *ia; 786 { 787 788 in_scrubprefix(ia); 789 } 790 791 /* 792 * Initialize an interface's internet address 793 * and routing table entry. 794 */ 795 int 796 in_ifinit(ifp, ia, sin, scrub) 797 struct ifnet *ifp; 798 struct in_ifaddr *ia; 799 struct sockaddr_in *sin; 800 int scrub; 801 { 802 u_int32_t i = sin->sin_addr.s_addr; 803 struct sockaddr_in oldaddr; 804 int s = splnet(), flags = RTF_UP, error; 805 806 /* 807 * Set up new addresses. 808 */ 809 oldaddr = ia->ia_addr; 810 if (ia->ia_addr.sin_family == AF_INET) 811 LIST_REMOVE(ia, ia_hash); 812 ia->ia_addr = *sin; 813 LIST_INSERT_HEAD(&IN_IFADDR_HASH(ia->ia_addr.sin_addr.s_addr), ia, ia_hash); 814 815 /* 816 * Give the interface a chance to initialize 817 * if this is its first address, 818 * and to validate the address if necessary. 819 */ 820 if (ifp->if_ioctl && 821 (error = (*ifp->if_ioctl)(ifp, SIOCSIFADDR, (caddr_t)ia))) 822 goto bad; 823 splx(s); 824 if (scrub) { 825 ia->ia_ifa.ifa_addr = sintosa(&oldaddr); 826 in_ifscrub(ifp, ia); 827 ia->ia_ifa.ifa_addr = sintosa(&ia->ia_addr); 828 } 829 830 if (IN_CLASSA(i)) 831 ia->ia_netmask = IN_CLASSA_NET; 832 else if (IN_CLASSB(i)) 833 ia->ia_netmask = IN_CLASSB_NET; 834 else 835 ia->ia_netmask = IN_CLASSC_NET; 836 /* 837 * The subnet mask usually includes at least the standard network part, 838 * but may may be smaller in the case of supernetting. 839 * If it is set, we believe it. 840 */ 841 if (ia->ia_subnetmask == 0) { 842 ia->ia_subnetmask = ia->ia_netmask; 843 ia->ia_sockmask.sin_addr.s_addr = ia->ia_subnetmask; 844 } else 845 ia->ia_netmask &= ia->ia_subnetmask; 846 847 ia->ia_net = i & ia->ia_netmask; 848 ia->ia_subnet = i & ia->ia_subnetmask; 849 in_socktrim(&ia->ia_sockmask); 850 /* re-calculate the "in_maxmtu" value */ 851 in_setmaxmtu(); 852 /* 853 * Add route for the network. 854 */ 855 ia->ia_ifa.ifa_metric = ifp->if_metric; 856 if (ifp->if_flags & IFF_BROADCAST) { 857 ia->ia_broadaddr.sin_addr.s_addr = 858 ia->ia_subnet | ~ia->ia_subnetmask; 859 ia->ia_netbroadcast.s_addr = 860 ia->ia_net | ~ia->ia_netmask; 861 } else if (ifp->if_flags & IFF_LOOPBACK) { 862 ia->ia_dstaddr = ia->ia_addr; 863 flags |= RTF_HOST; 864 } else if (ifp->if_flags & IFF_POINTOPOINT) { 865 if (ia->ia_dstaddr.sin_family != AF_INET) 866 return (0); 867 flags |= RTF_HOST; 868 } 869 error = in_addprefix(ia, flags); 870 /* 871 * If the interface supports multicast, join the "all hosts" 872 * multicast group on that interface. 873 */ 874 if ((ifp->if_flags & IFF_MULTICAST) != 0 && ia->ia_allhosts == NULL) { 875 struct in_addr addr; 876 877 addr.s_addr = INADDR_ALLHOSTS_GROUP; 878 ia->ia_allhosts = in_addmulti(&addr, ifp); 879 } 880 return (error); 881 bad: 882 splx(s); 883 LIST_REMOVE(ia, ia_hash); 884 ia->ia_addr = oldaddr; 885 if (ia->ia_addr.sin_family == AF_INET) 886 LIST_INSERT_HEAD(&IN_IFADDR_HASH(ia->ia_addr.sin_addr.s_addr), 887 ia, ia_hash); 888 return (error); 889 } 890 891 #define rtinitflags(x) \ 892 ((((x)->ia_ifp->if_flags & (IFF_LOOPBACK | IFF_POINTOPOINT)) != 0) \ 893 ? RTF_HOST : 0) 894 895 /* 896 * add a route to prefix ("connected route" in cisco terminology). 897 * does nothing if there's some interface address with the same prefix already. 898 */ 899 static int 900 in_addprefix(target, flags) 901 struct in_ifaddr *target; 902 int flags; 903 { 904 struct in_ifaddr *ia; 905 struct in_addr prefix, mask, p; 906 int error; 907 908 if ((flags & RTF_HOST) != 0) 909 prefix = target->ia_dstaddr.sin_addr; 910 else { 911 prefix = target->ia_addr.sin_addr; 912 mask = target->ia_sockmask.sin_addr; 913 prefix.s_addr &= mask.s_addr; 914 } 915 916 TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list) { 917 if (rtinitflags(ia)) 918 p = ia->ia_dstaddr.sin_addr; 919 else { 920 p = ia->ia_addr.sin_addr; 921 p.s_addr &= ia->ia_sockmask.sin_addr.s_addr; 922 } 923 924 if (prefix.s_addr != p.s_addr) 925 continue; 926 927 /* 928 * if we got a matching prefix route inserted by other 929 * interface address, we don't need to bother 930 */ 931 if (ia->ia_flags & IFA_ROUTE) 932 return 0; 933 } 934 935 /* 936 * noone seem to have prefix route. insert it. 937 */ 938 error = rtinit(&target->ia_ifa, (int)RTM_ADD, flags); 939 if (!error) 940 target->ia_flags |= IFA_ROUTE; 941 return error; 942 } 943 944 /* 945 * remove a route to prefix ("connected route" in cisco terminology). 946 * re-installs the route by using another interface address, if there's one 947 * with the same prefix (otherwise we lose the route mistakenly). 948 */ 949 static int 950 in_scrubprefix(target) 951 struct in_ifaddr *target; 952 { 953 struct in_ifaddr *ia; 954 struct in_addr prefix, mask, p; 955 int error; 956 957 if ((target->ia_flags & IFA_ROUTE) == 0) 958 return 0; 959 960 if (rtinitflags(target)) 961 prefix = target->ia_dstaddr.sin_addr; 962 else { 963 prefix = target->ia_addr.sin_addr; 964 mask = target->ia_sockmask.sin_addr; 965 prefix.s_addr &= mask.s_addr; 966 } 967 968 TAILQ_FOREACH(ia, &in_ifaddrhead, ia_list) { 969 if (rtinitflags(ia)) 970 p = ia->ia_dstaddr.sin_addr; 971 else { 972 p = ia->ia_addr.sin_addr; 973 p.s_addr &= ia->ia_sockmask.sin_addr.s_addr; 974 } 975 976 if (prefix.s_addr != p.s_addr) 977 continue; 978 979 /* 980 * if we got a matching prefix route, move IFA_ROUTE to him 981 */ 982 if ((ia->ia_flags & IFA_ROUTE) == 0) { 983 rtinit(&(target->ia_ifa), (int)RTM_DELETE, 984 rtinitflags(target)); 985 target->ia_flags &= ~IFA_ROUTE; 986 987 error = rtinit(&ia->ia_ifa, (int)RTM_ADD, 988 rtinitflags(ia) | RTF_UP); 989 if (error == 0) 990 ia->ia_flags |= IFA_ROUTE; 991 return error; 992 } 993 } 994 995 /* 996 * noone seem to have prefix route. remove it. 997 */ 998 rtinit(&(target->ia_ifa), (int)RTM_DELETE, rtinitflags(target)); 999 target->ia_flags &= ~IFA_ROUTE; 1000 return 0; 1001 } 1002 1003 #undef rtinitflags 1004 1005 /* 1006 * Return 1 if the address might be a local broadcast address. 1007 */ 1008 int 1009 in_broadcast(in, ifp) 1010 struct in_addr in; 1011 struct ifnet *ifp; 1012 { 1013 struct ifaddr *ifa; 1014 1015 if (in.s_addr == INADDR_BROADCAST || 1016 in_nullhost(in)) 1017 return 1; 1018 if ((ifp->if_flags & IFF_BROADCAST) == 0) 1019 return 0; 1020 /* 1021 * Look through the list of addresses for a match 1022 * with a broadcast address. 1023 */ 1024 #define ia (ifatoia(ifa)) 1025 TAILQ_FOREACH(ifa, &ifp->if_addrlist, ifa_list) 1026 if (ifa->ifa_addr->sa_family == AF_INET && 1027 !in_hosteq(in, ia->ia_addr.sin_addr) && 1028 (in_hosteq(in, ia->ia_broadaddr.sin_addr) || 1029 in_hosteq(in, ia->ia_netbroadcast) || 1030 (hostzeroisbroadcast && 1031 /* 1032 * Check for old-style (host 0) broadcast. 1033 */ 1034 (in.s_addr == ia->ia_subnet || 1035 in.s_addr == ia->ia_net)))) 1036 return 1; 1037 return (0); 1038 #undef ia 1039 } 1040 1041 /* 1042 * Add an address to the list of IP multicast addresses for a given interface. 1043 */ 1044 struct in_multi * 1045 in_addmulti(ap, ifp) 1046 struct in_addr *ap; 1047 struct ifnet *ifp; 1048 { 1049 struct in_multi *inm; 1050 struct ifreq ifr; 1051 int s = splsoftnet(); 1052 1053 /* 1054 * See if address already in list. 1055 */ 1056 IN_LOOKUP_MULTI(*ap, ifp, inm); 1057 if (inm != NULL) { 1058 /* 1059 * Found it; just increment the reference count. 1060 */ 1061 ++inm->inm_refcount; 1062 } else { 1063 /* 1064 * New address; allocate a new multicast record 1065 * and link it into the interface's multicast list. 1066 */ 1067 inm = pool_get(&inmulti_pool, PR_NOWAIT); 1068 if (inm == NULL) { 1069 splx(s); 1070 return (NULL); 1071 } 1072 inm->inm_addr = *ap; 1073 inm->inm_ifp = ifp; 1074 inm->inm_refcount = 1; 1075 LIST_INSERT_HEAD( 1076 &IN_MULTI_HASH(inm->inm_addr.s_addr, ifp), 1077 inm, inm_list); 1078 /* 1079 * Ask the network driver to update its multicast reception 1080 * filter appropriately for the new address. 1081 */ 1082 satosin(&ifr.ifr_addr)->sin_len = sizeof(struct sockaddr_in); 1083 satosin(&ifr.ifr_addr)->sin_family = AF_INET; 1084 satosin(&ifr.ifr_addr)->sin_addr = *ap; 1085 if ((ifp->if_ioctl == NULL) || 1086 (*ifp->if_ioctl)(ifp, SIOCADDMULTI,(caddr_t)&ifr) != 0) { 1087 LIST_REMOVE(inm, inm_list); 1088 pool_put(&inmulti_pool, inm); 1089 splx(s); 1090 return (NULL); 1091 } 1092 /* 1093 * Let IGMP know that we have joined a new IP multicast group. 1094 */ 1095 if (igmp_joingroup(inm) != 0) { 1096 LIST_REMOVE(inm, inm_list); 1097 pool_put(&inmulti_pool, inm); 1098 splx(s); 1099 return (NULL); 1100 } 1101 in_multientries++; 1102 } 1103 splx(s); 1104 return (inm); 1105 } 1106 1107 /* 1108 * Delete a multicast address record. 1109 */ 1110 void 1111 in_delmulti(inm) 1112 struct in_multi *inm; 1113 { 1114 struct ifreq ifr; 1115 int s = splsoftnet(); 1116 1117 if (--inm->inm_refcount == 0) { 1118 /* 1119 * No remaining claims to this record; let IGMP know that 1120 * we are leaving the multicast group. 1121 */ 1122 igmp_leavegroup(inm); 1123 /* 1124 * Unlink from list. 1125 */ 1126 LIST_REMOVE(inm, inm_list); 1127 in_multientries--; 1128 /* 1129 * Notify the network driver to update its multicast reception 1130 * filter. 1131 */ 1132 satosin(&ifr.ifr_addr)->sin_family = AF_INET; 1133 satosin(&ifr.ifr_addr)->sin_addr = inm->inm_addr; 1134 (*inm->inm_ifp->if_ioctl)(inm->inm_ifp, SIOCDELMULTI, 1135 (caddr_t)&ifr); 1136 pool_put(&inmulti_pool, inm); 1137 } 1138 splx(s); 1139 } 1140 #endif 1141