1c398230bSWarner Losh /*-
251369649SPedro F. Giffuni * SPDX-License-Identifier: BSD-3-Clause
351369649SPedro F. Giffuni *
4df8bae1dSRodney W. Grimes * Copyright (c) 1982, 1986, 1991, 1993
5df8bae1dSRodney W. Grimes * The Regents of the University of California. All rights reserved.
681d96ce8SMax Laier * Copyright (C) 2001 WIDE Project. All rights reserved.
7df8bae1dSRodney W. Grimes *
8df8bae1dSRodney W. Grimes * Redistribution and use in source and binary forms, with or without
9df8bae1dSRodney W. Grimes * modification, are permitted provided that the following conditions
10df8bae1dSRodney W. Grimes * are met:
11df8bae1dSRodney W. Grimes * 1. Redistributions of source code must retain the above copyright
12df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer.
13df8bae1dSRodney W. Grimes * 2. Redistributions in binary form must reproduce the above copyright
14df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer in the
15df8bae1dSRodney W. Grimes * documentation and/or other materials provided with the distribution.
16fbbd9655SWarner Losh * 3. Neither the name of the University nor the names of its contributors
17df8bae1dSRodney W. Grimes * may be used to endorse or promote products derived from this software
18df8bae1dSRodney W. Grimes * without specific prior written permission.
19df8bae1dSRodney W. Grimes *
20df8bae1dSRodney W. Grimes * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21df8bae1dSRodney W. Grimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22df8bae1dSRodney W. Grimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23df8bae1dSRodney W. Grimes * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24df8bae1dSRodney W. Grimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25df8bae1dSRodney W. Grimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26df8bae1dSRodney W. Grimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27df8bae1dSRodney W. Grimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28df8bae1dSRodney W. Grimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29df8bae1dSRodney W. Grimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30df8bae1dSRodney W. Grimes * SUCH DAMAGE.
31df8bae1dSRodney W. Grimes */
32df8bae1dSRodney W. Grimes
334b421e2dSMike Silbersack #include <sys/cdefs.h>
34eb8dcdeaSGleb Smirnoff #include "opt_inet.h"
35eb8dcdeaSGleb Smirnoff
362f35e7d9SMike Karels #define IN_HISTORICAL_NETS /* include class masks */
372f35e7d9SMike Karels
38df8bae1dSRodney W. Grimes #include <sys/param.h>
39c3322cb9SGleb Smirnoff #include <sys/eventhandler.h>
4026f9a767SRodney W. Grimes #include <sys/systm.h>
4151a53488SBruce Evans #include <sys/sockio.h>
42df8bae1dSRodney W. Grimes #include <sys/malloc.h>
43acd3428bSRobert Watson #include <sys/priv.h>
44df8bae1dSRodney W. Grimes #include <sys/socket.h>
455ce0eb7fSBjoern A. Zeeb #include <sys/jail.h>
46f6d24a78SPoul-Henning Kamp #include <sys/kernel.h>
47cc0a3c8cSAndrey V. Elsukov #include <sys/lock.h>
485ce0eb7fSBjoern A. Zeeb #include <sys/proc.h>
49f6d24a78SPoul-Henning Kamp #include <sys/sysctl.h>
50ebc90701SQing Li #include <sys/syslog.h>
51f7a39160SGleb Smirnoff #include <sys/sx.h>
52df8bae1dSRodney W. Grimes
53df8bae1dSRodney W. Grimes #include <net/if.h>
54df813b7eSQing Li #include <net/if_var.h>
55e162ea60SGeorge V. Neville-Neil #include <net/if_arp.h>
56ebc90701SQing Li #include <net/if_dl.h>
576e6b3f7cSQing Li #include <net/if_llatbl.h>
583d0d5b21SJustin Hibbits #include <net/if_private.h>
596a800098SYoshinobu Inoue #include <net/if_types.h>
60df8bae1dSRodney W. Grimes #include <net/route.h>
6181728a53SAlexander V. Chernikov #include <net/route/nhop.h>
6281728a53SAlexander V. Chernikov #include <net/route/route_ctl.h>
63ebc90701SQing Li #include <net/vnet.h>
64df8bae1dSRodney W. Grimes
6508b68b0eSGleb Smirnoff #include <netinet/if_ether.h>
66df8bae1dSRodney W. Grimes #include <netinet/in.h>
67936f4a42SAlexander V. Chernikov #include <netinet/in_fib.h>
68df8bae1dSRodney W. Grimes #include <netinet/in_var.h>
69e43cc4aeSHajimu UMEMOTO #include <netinet/in_pcb.h>
7071498f30SBruce M Simpson #include <netinet/ip_var.h>
7108b68b0eSGleb Smirnoff #include <netinet/ip_carp.h>
72d10910e6SBruce M Simpson #include <netinet/igmp_var.h>
73eddfbb76SRobert Watson #include <netinet/udp.h>
74eddfbb76SRobert Watson #include <netinet/udp_var.h>
7555166637SPoul-Henning Kamp
76215bab79SShivank Garg #ifdef MAC
77215bab79SShivank Garg #include <security/mac/mac_framework.h>
78215bab79SShivank Garg #endif
79215bab79SShivank Garg
80f375bf0eSAlexander V. Chernikov static int in_aifaddr_ioctl(u_long, caddr_t, struct ifnet *, struct ucred *);
81f375bf0eSAlexander V. Chernikov static int in_difaddr_ioctl(u_long, caddr_t, struct ifnet *, struct ucred *);
82f375bf0eSAlexander V. Chernikov static int in_gifaddr_ioctl(u_long, caddr_t, struct ifnet *, struct ucred *);
836a800098SYoshinobu Inoue
844d77a549SAlfred Perlstein static void in_socktrim(struct sockaddr_in *);
85ec002feeSBruce M Simpson static void in_purgemaddrs(struct ifnet *);
86df8bae1dSRodney W. Grimes
87130aebbaSAlexander V. Chernikov static bool ia_need_loopback_route(const struct in_ifaddr *);
88130aebbaSAlexander V. Chernikov
895f901c92SAndrew Turner VNET_DEFINE_STATIC(int, nosameprefix);
9008b68b0eSGleb Smirnoff #define V_nosameprefix VNET(nosameprefix)
916df8a710SGleb Smirnoff SYSCTL_INT(_net_inet_ip, OID_AUTO, no_same_prefix, CTLFLAG_VNET | CTLFLAG_RW,
9208b68b0eSGleb Smirnoff &VNET_NAME(nosameprefix), 0,
931ae95409SGleb Smirnoff "Refuse to create same prefixes on different interfaces");
94477180fbSGarrett Wollman
95fd076593SMike Karels VNET_DEFINE_STATIC(bool, broadcast_lowest);
96fd076593SMike Karels #define V_broadcast_lowest VNET(broadcast_lowest)
97fd076593SMike Karels SYSCTL_BOOL(_net_inet_ip, OID_AUTO, broadcast_lowest, CTLFLAG_VNET | CTLFLAG_RW,
98fd076593SMike Karels &VNET_NAME(broadcast_lowest), 0,
99fd076593SMike Karels "Treat lowest address on a subnet (host 0) as broadcast");
100fd076593SMike Karels
101efe58855SMike Karels VNET_DEFINE(bool, ip_allow_net240) = false;
102efe58855SMike Karels #define V_ip_allow_net240 VNET(ip_allow_net240)
103efe58855SMike Karels SYSCTL_BOOL(_net_inet_ip, OID_AUTO, allow_net240,
104efe58855SMike Karels CTLFLAG_VNET | CTLFLAG_RW, &VNET_NAME(ip_allow_net240), 0,
10548ef7ed7SEd Maste "Allow forwarding of and ICMP response to Experimental addresses, aka Class E (240/4)");
106efe58855SMike Karels /* see https://datatracker.ietf.org/doc/draft-schoen-intarea-unicast-240 */
107efe58855SMike Karels
108efe58855SMike Karels VNET_DEFINE(bool, ip_allow_net0) = false;
109efe58855SMike Karels SYSCTL_BOOL(_net_inet_ip, OID_AUTO, allow_net0,
110efe58855SMike Karels CTLFLAG_VNET | CTLFLAG_RW, &VNET_NAME(ip_allow_net0), 0,
11148ef7ed7SEd Maste "Allow forwarding of and ICMP response to addresses in network 0/8");
112efe58855SMike Karels /* see https://datatracker.ietf.org/doc/draft-schoen-intarea-unicast-0 */
113efe58855SMike Karels
114efe58855SMike Karels VNET_DEFINE(uint32_t, in_loopback_mask) = IN_LOOPBACK_MASK_DFLT;
115efe58855SMike Karels #define V_in_loopback_mask VNET(in_loopback_mask)
116efe58855SMike Karels static int sysctl_loopback_prefixlen(SYSCTL_HANDLER_ARGS);
117efe58855SMike Karels SYSCTL_PROC(_net_inet_ip, OID_AUTO, loopback_prefixlen,
118efe58855SMike Karels CTLFLAG_VNET | CTLTYPE_INT | CTLFLAG_RW,
119efe58855SMike Karels NULL, 0, sysctl_loopback_prefixlen, "I",
120efe58855SMike Karels "Prefix length of address space reserved for loopback");
121efe58855SMike Karels /* see https://datatracker.ietf.org/doc/draft-schoen-intarea-unicast-127 */
122efe58855SMike Karels
12382cea7e6SBjoern A. Zeeb VNET_DECLARE(struct inpcbinfo, ripcbinfo);
12482cea7e6SBjoern A. Zeeb #define V_ripcbinfo VNET(ripcbinfo)
12582cea7e6SBjoern A. Zeeb
126f7a39160SGleb Smirnoff static struct sx in_control_sx;
127f7a39160SGleb Smirnoff SX_SYSINIT(in_control_sx, &in_control_sx, "in_control");
128f7a39160SGleb Smirnoff
129df8bae1dSRodney W. Grimes /*
13069beb162SZhenlei Huang * Return true if an internet address is for a ``local'' host
131b365d954SGleb Smirnoff * (one to which we have a connection).
132df8bae1dSRodney W. Grimes */
13369beb162SZhenlei Huang bool
in_localaddr(struct in_addr in)134f2565d68SRobert Watson in_localaddr(struct in_addr in)
135df8bae1dSRodney W. Grimes {
1363e85b721SEd Maste u_long i = ntohl(in.s_addr);
1373e85b721SEd Maste struct in_ifaddr *ia;
138df8bae1dSRodney W. Grimes
1392144431cSGleb Smirnoff NET_EPOCH_ASSERT();
1402144431cSGleb Smirnoff
141d7c5a620SMatt Macy CK_STAILQ_FOREACH(ia, &V_in_ifaddrhead, ia_link) {
1422144431cSGleb Smirnoff if ((i & ia->ia_subnetmask) == ia->ia_subnet)
14369beb162SZhenlei Huang return (true);
1442d9cfabaSRobert Watson }
1452144431cSGleb Smirnoff
14669beb162SZhenlei Huang return (false);
147df8bae1dSRodney W. Grimes }
148df8bae1dSRodney W. Grimes
149df8bae1dSRodney W. Grimes /*
150a5e380e5SZhenlei Huang * Return true if an internet address is for the local host and configured
1512eccc90bSAndre Oppermann * on one of its interfaces.
1522eccc90bSAndre Oppermann */
153c8ee75f2SGleb Smirnoff bool
in_localip(struct in_addr in)154f2565d68SRobert Watson in_localip(struct in_addr in)
1552eccc90bSAndre Oppermann {
1562eccc90bSAndre Oppermann struct in_ifaddr *ia;
1572eccc90bSAndre Oppermann
158c8ee75f2SGleb Smirnoff NET_EPOCH_ASSERT();
159c8ee75f2SGleb Smirnoff
160c8ee75f2SGleb Smirnoff CK_LIST_FOREACH(ia, INADDR_HASH(in.s_addr), ia_hash)
161c8ee75f2SGleb Smirnoff if (IA_SIN(ia)->sin_addr.s_addr == in.s_addr)
162c8ee75f2SGleb Smirnoff return (true);
163c8ee75f2SGleb Smirnoff
164c8ee75f2SGleb Smirnoff return (false);
1652eccc90bSAndre Oppermann }
1662eccc90bSAndre Oppermann
1672eccc90bSAndre Oppermann /*
16856f78600SGleb Smirnoff * Like in_localip(), but FIB-aware and carp(4)-aware.
1699c89392fSGleb Smirnoff */
1709c89392fSGleb Smirnoff bool
in_localip_fib(struct in_addr in,uint16_t fib)1719c89392fSGleb Smirnoff in_localip_fib(struct in_addr in, uint16_t fib)
1729c89392fSGleb Smirnoff {
1739c89392fSGleb Smirnoff struct in_ifaddr *ia;
1749c89392fSGleb Smirnoff
1759c89392fSGleb Smirnoff NET_EPOCH_ASSERT();
1769c89392fSGleb Smirnoff
1779c89392fSGleb Smirnoff CK_LIST_FOREACH(ia, INADDR_HASH(in.s_addr), ia_hash)
1789c89392fSGleb Smirnoff if (IA_SIN(ia)->sin_addr.s_addr == in.s_addr &&
17956f78600SGleb Smirnoff (ia->ia_ifa.ifa_carp == NULL ||
18056f78600SGleb Smirnoff carp_master_p(&ia->ia_ifa)) &&
1819c89392fSGleb Smirnoff ia->ia_ifa.ifa_ifp->if_fib == fib)
1829c89392fSGleb Smirnoff return (true);
1839c89392fSGleb Smirnoff
1849c89392fSGleb Smirnoff return (false);
1859c89392fSGleb Smirnoff }
1869c89392fSGleb Smirnoff
1879c89392fSGleb Smirnoff /*
18897309cecSZhenlei Huang * Return true if an internet address is configured on an interface.
18928ebe80cSGleb Smirnoff */
19097309cecSZhenlei Huang bool
in_ifhasaddr(struct ifnet * ifp,struct in_addr in)19128ebe80cSGleb Smirnoff in_ifhasaddr(struct ifnet *ifp, struct in_addr in)
19228ebe80cSGleb Smirnoff {
19328ebe80cSGleb Smirnoff struct ifaddr *ifa;
19428ebe80cSGleb Smirnoff struct in_ifaddr *ia;
19528ebe80cSGleb Smirnoff
196b8a6e03fSGleb Smirnoff NET_EPOCH_ASSERT();
197b8a6e03fSGleb Smirnoff
198d7c5a620SMatt Macy CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
19928ebe80cSGleb Smirnoff if (ifa->ifa_addr->sa_family != AF_INET)
20028ebe80cSGleb Smirnoff continue;
20128ebe80cSGleb Smirnoff ia = (struct in_ifaddr *)ifa;
202b8a6e03fSGleb Smirnoff if (ia->ia_addr.sin_addr.s_addr == in.s_addr)
20397309cecSZhenlei Huang return (true);
20428ebe80cSGleb Smirnoff }
20528ebe80cSGleb Smirnoff
20697309cecSZhenlei Huang return (false);
20728ebe80cSGleb Smirnoff }
20828ebe80cSGleb Smirnoff
20928ebe80cSGleb Smirnoff /*
210f7a39160SGleb Smirnoff * Return a reference to the interface address which is different to
211f7a39160SGleb Smirnoff * the supplied one but with same IP address value.
212f7a39160SGleb Smirnoff */
213f7a39160SGleb Smirnoff static struct in_ifaddr *
in_localip_more(struct in_ifaddr * original_ia)2149fdbf7eeSAlexander V. Chernikov in_localip_more(struct in_ifaddr *original_ia)
215f7a39160SGleb Smirnoff {
216c8ee75f2SGleb Smirnoff struct epoch_tracker et;
2179fdbf7eeSAlexander V. Chernikov in_addr_t original_addr = IA_SIN(original_ia)->sin_addr.s_addr;
2189fdbf7eeSAlexander V. Chernikov uint32_t original_fib = original_ia->ia_ifa.ifa_ifp->if_fib;
2199fdbf7eeSAlexander V. Chernikov struct in_ifaddr *ia;
220f7a39160SGleb Smirnoff
221c8ee75f2SGleb Smirnoff NET_EPOCH_ENTER(et);
222c8ee75f2SGleb Smirnoff CK_LIST_FOREACH(ia, INADDR_HASH(original_addr), ia_hash) {
2239fdbf7eeSAlexander V. Chernikov in_addr_t addr = IA_SIN(ia)->sin_addr.s_addr;
2249fdbf7eeSAlexander V. Chernikov uint32_t fib = ia->ia_ifa.ifa_ifp->if_fib;
2259fdbf7eeSAlexander V. Chernikov if (!V_rt_add_addr_allfibs && (original_fib != fib))
2269fdbf7eeSAlexander V. Chernikov continue;
2279fdbf7eeSAlexander V. Chernikov if ((original_ia != ia) && (original_addr == addr)) {
2289fdbf7eeSAlexander V. Chernikov ifa_ref(&ia->ia_ifa);
229c8ee75f2SGleb Smirnoff NET_EPOCH_EXIT(et);
2309fdbf7eeSAlexander V. Chernikov return (ia);
231f7a39160SGleb Smirnoff }
232f7a39160SGleb Smirnoff }
233c8ee75f2SGleb Smirnoff NET_EPOCH_EXIT(et);
234f7a39160SGleb Smirnoff
235f7a39160SGleb Smirnoff return (NULL);
236f7a39160SGleb Smirnoff }
237f7a39160SGleb Smirnoff
238f7a39160SGleb Smirnoff /*
2394b631fc8SAlexander V. Chernikov * Tries to find first IPv4 address in the provided fib.
2404b631fc8SAlexander V. Chernikov * Prefers non-loopback addresses and return loopback IFF
2414b631fc8SAlexander V. Chernikov * @loopback_ok is set.
2424b631fc8SAlexander V. Chernikov *
2434b631fc8SAlexander V. Chernikov * Returns ifa or NULL.
2444b631fc8SAlexander V. Chernikov */
2454b631fc8SAlexander V. Chernikov struct in_ifaddr *
in_findlocal(uint32_t fibnum,bool loopback_ok)2464b631fc8SAlexander V. Chernikov in_findlocal(uint32_t fibnum, bool loopback_ok)
2474b631fc8SAlexander V. Chernikov {
2484b631fc8SAlexander V. Chernikov struct in_ifaddr *ia = NULL, *ia_lo = NULL;
2494b631fc8SAlexander V. Chernikov
2504b631fc8SAlexander V. Chernikov NET_EPOCH_ASSERT();
2514b631fc8SAlexander V. Chernikov
2524b631fc8SAlexander V. Chernikov CK_STAILQ_FOREACH(ia, &V_in_ifaddrhead, ia_link) {
2534b631fc8SAlexander V. Chernikov uint32_t ia_fib = ia->ia_ifa.ifa_ifp->if_fib;
2544b631fc8SAlexander V. Chernikov if (!V_rt_add_addr_allfibs && (fibnum != ia_fib))
2554b631fc8SAlexander V. Chernikov continue;
2564b631fc8SAlexander V. Chernikov
2574b631fc8SAlexander V. Chernikov if (!IN_LOOPBACK(ntohl(IA_SIN(ia)->sin_addr.s_addr)))
2584b631fc8SAlexander V. Chernikov break;
2594b631fc8SAlexander V. Chernikov if (loopback_ok)
2604b631fc8SAlexander V. Chernikov ia_lo = ia;
2614b631fc8SAlexander V. Chernikov }
2624b631fc8SAlexander V. Chernikov
2634b631fc8SAlexander V. Chernikov if (ia == NULL)
2644b631fc8SAlexander V. Chernikov ia = ia_lo;
2654b631fc8SAlexander V. Chernikov
2664b631fc8SAlexander V. Chernikov return (ia);
2674b631fc8SAlexander V. Chernikov }
2684b631fc8SAlexander V. Chernikov
2694b631fc8SAlexander V. Chernikov /*
270df8bae1dSRodney W. Grimes * Determine whether an IP address is in a reserved set of addresses
271df8bae1dSRodney W. Grimes * that may not be forwarded, or whether datagrams to that destination
272df8bae1dSRodney W. Grimes * may be forwarded.
273df8bae1dSRodney W. Grimes */
274*3ae7c763SZhenlei Huang bool
in_canforward(struct in_addr in)275f2565d68SRobert Watson in_canforward(struct in_addr in)
276df8bae1dSRodney W. Grimes {
2773e85b721SEd Maste u_long i = ntohl(in.s_addr);
278df8bae1dSRodney W. Grimes
279f7174eb2SZhenlei Huang if (IN_MULTICAST(i) || IN_LINKLOCAL(i) || IN_LOOPBACK(i) ||
280f7174eb2SZhenlei Huang in_nullhost(in))
281*3ae7c763SZhenlei Huang return (false);
282efe58855SMike Karels if (IN_EXPERIMENTAL(i) && !V_ip_allow_net240)
283*3ae7c763SZhenlei Huang return (false);
284efe58855SMike Karels if (IN_ZERONET(i) && !V_ip_allow_net0)
285*3ae7c763SZhenlei Huang return (false);
286*3ae7c763SZhenlei Huang return (true);
287df8bae1dSRodney W. Grimes }
288df8bae1dSRodney W. Grimes
289df8bae1dSRodney W. Grimes /*
290efe58855SMike Karels * Sysctl to manage prefix of reserved loopback network; translate
291efe58855SMike Karels * to/from mask. The mask is always contiguous high-order 1 bits
292efe58855SMike Karels * followed by all 0 bits.
293efe58855SMike Karels */
294efe58855SMike Karels static int
sysctl_loopback_prefixlen(SYSCTL_HANDLER_ARGS)295efe58855SMike Karels sysctl_loopback_prefixlen(SYSCTL_HANDLER_ARGS)
296efe58855SMike Karels {
297efe58855SMike Karels int error, preflen;
298efe58855SMike Karels
299efe58855SMike Karels /* ffs is 1-based; compensate. */
300efe58855SMike Karels preflen = 33 - ffs(V_in_loopback_mask);
301efe58855SMike Karels error = sysctl_handle_int(oidp, &preflen, 0, req);
302efe58855SMike Karels if (error || !req->newptr)
303efe58855SMike Karels return (error);
304fb8ef16bSMike Karels if (preflen < 8 || preflen > 31)
305efe58855SMike Karels return (EINVAL);
306efe58855SMike Karels V_in_loopback_mask = 0xffffffff << (32 - preflen);
307efe58855SMike Karels return (0);
308efe58855SMike Karels }
309efe58855SMike Karels
310efe58855SMike Karels /*
311df8bae1dSRodney W. Grimes * Trim a mask in a sockaddr
312df8bae1dSRodney W. Grimes */
3130312fbe9SPoul-Henning Kamp static void
in_socktrim(struct sockaddr_in * ap)314f2565d68SRobert Watson in_socktrim(struct sockaddr_in *ap)
315df8bae1dSRodney W. Grimes {
3163e85b721SEd Maste char *cplim = (char *) &ap->sin_addr;
3173e85b721SEd Maste char *cp = (char *) (&ap->sin_addr + 1);
318df8bae1dSRodney W. Grimes
319df8bae1dSRodney W. Grimes ap->sin_len = 0;
320df00058dSGarrett Wollman while (--cp >= cplim)
321df8bae1dSRodney W. Grimes if (*cp) {
322df8bae1dSRodney W. Grimes (ap)->sin_len = cp - (char *) (ap) + 1;
323df8bae1dSRodney W. Grimes break;
324df8bae1dSRodney W. Grimes }
325df8bae1dSRodney W. Grimes }
326df8bae1dSRodney W. Grimes
327df8bae1dSRodney W. Grimes /*
328df8bae1dSRodney W. Grimes * Generic internet control operations (ioctl's).
329df8bae1dSRodney W. Grimes */
33026f9a767SRodney W. Grimes int
in_control_ioctl(u_long cmd,void * data,struct ifnet * ifp,struct ucred * cred)331bb06a80cSAlexander V. Chernikov in_control_ioctl(u_long cmd, void *data, struct ifnet *ifp,
332bb06a80cSAlexander V. Chernikov struct ucred *cred)
333df8bae1dSRodney W. Grimes {
334f7a39160SGleb Smirnoff struct ifreq *ifr = (struct ifreq *)data;
335f7a39160SGleb Smirnoff struct sockaddr_in *addr = (struct sockaddr_in *)&ifr->ifr_addr;
336a68cc388SGleb Smirnoff struct epoch_tracker et;
337821b5cafSGleb Smirnoff struct ifaddr *ifa;
338f7a39160SGleb Smirnoff struct in_ifaddr *ia;
339f7a39160SGleb Smirnoff int error;
340f7a39160SGleb Smirnoff
341f7a39160SGleb Smirnoff if (ifp == NULL)
342f7a39160SGleb Smirnoff return (EADDRNOTAVAIL);
34371212473SGleb Smirnoff
34471212473SGleb Smirnoff /*
345f7a39160SGleb Smirnoff * Filter out 4 ioctls we implement directly. Forward the rest
346f7a39160SGleb Smirnoff * to specific functions and ifp->if_ioctl().
347bbb3fb61SRobert Watson */
3486a800098SYoshinobu Inoue switch (cmd) {
349bbb3fb61SRobert Watson case SIOCGIFADDR:
350bbb3fb61SRobert Watson case SIOCGIFBRDADDR:
351bbb3fb61SRobert Watson case SIOCGIFDSTADDR:
352bbb3fb61SRobert Watson case SIOCGIFNETMASK:
353f7a39160SGleb Smirnoff break;
3546952c3e1SAndrey V. Elsukov case SIOCGIFALIAS:
3556952c3e1SAndrey V. Elsukov sx_xlock(&in_control_sx);
356f375bf0eSAlexander V. Chernikov error = in_gifaddr_ioctl(cmd, data, ifp, cred);
3576952c3e1SAndrey V. Elsukov sx_xunlock(&in_control_sx);
3586952c3e1SAndrey V. Elsukov return (error);
3596d00fd9cSGleb Smirnoff case SIOCDIFADDR:
360f7a39160SGleb Smirnoff sx_xlock(&in_control_sx);
361f375bf0eSAlexander V. Chernikov error = in_difaddr_ioctl(cmd, data, ifp, cred);
362f7a39160SGleb Smirnoff sx_xunlock(&in_control_sx);
363f7a39160SGleb Smirnoff return (error);
36477b89ad8SGleb Smirnoff case OSIOCAIFADDR: /* 9.x compat */
3656d00fd9cSGleb Smirnoff case SIOCAIFADDR:
366f7a39160SGleb Smirnoff sx_xlock(&in_control_sx);
367f375bf0eSAlexander V. Chernikov error = in_aifaddr_ioctl(cmd, data, ifp, cred);
368f7a39160SGleb Smirnoff sx_xunlock(&in_control_sx);
369f7a39160SGleb Smirnoff return (error);
370bbb3fb61SRobert Watson case SIOCSIFADDR:
371bbb3fb61SRobert Watson case SIOCSIFBRDADDR:
372bbb3fb61SRobert Watson case SIOCSIFDSTADDR:
373bbb3fb61SRobert Watson case SIOCSIFNETMASK:
37456cf9dc1SGleb Smirnoff /* We no longer support that old commands. */
3756d00fd9cSGleb Smirnoff return (EINVAL);
376bbb3fb61SRobert Watson default:
377f7a39160SGleb Smirnoff if (ifp->if_ioctl == NULL)
378bbb3fb61SRobert Watson return (EOPNOTSUPP);
379bbb3fb61SRobert Watson return ((*ifp->if_ioctl)(ifp, cmd, data));
3806a800098SYoshinobu Inoue }
3816a800098SYoshinobu Inoue
382821b5cafSGleb Smirnoff if (addr->sin_addr.s_addr != INADDR_ANY &&
383f375bf0eSAlexander V. Chernikov prison_check_ip4(cred, &addr->sin_addr) != 0)
384821b5cafSGleb Smirnoff return (EADDRNOTAVAIL);
385821b5cafSGleb Smirnoff
386cf7b18f1SRobert Watson /*
387a7f77a39SXin LI * Find address for this interface, if it exists. If an
388a7f77a39SXin LI * address was specified, find that one instead of the
389a7f77a39SXin LI * first one on the interface, if possible.
390df8bae1dSRodney W. Grimes */
391a68cc388SGleb Smirnoff NET_EPOCH_ENTER(et);
392d7c5a620SMatt Macy CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
3939706c950SGleb Smirnoff if (ifa->ifa_addr->sa_family != AF_INET)
3949706c950SGleb Smirnoff continue;
395821b5cafSGleb Smirnoff ia = (struct in_ifaddr *)ifa;
396821b5cafSGleb Smirnoff if (ia->ia_addr.sin_addr.s_addr == addr->sin_addr.s_addr)
397df8bae1dSRodney W. Grimes break;
398ca925d9cSJonathan Lemon }
399a7f77a39SXin LI if (ifa == NULL)
400d7c5a620SMatt Macy CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link)
401a7f77a39SXin LI if (ifa->ifa_addr->sa_family == AF_INET) {
402a7f77a39SXin LI ia = (struct in_ifaddr *)ifa;
403f375bf0eSAlexander V. Chernikov if (prison_check_ip4(cred,
404a7f77a39SXin LI &ia->ia_addr.sin_addr) == 0)
405a7f77a39SXin LI break;
406a7f77a39SXin LI }
407f7a39160SGleb Smirnoff
408821b5cafSGleb Smirnoff if (ifa == NULL) {
409a68cc388SGleb Smirnoff NET_EPOCH_EXIT(et);
410f7a39160SGleb Smirnoff return (EADDRNOTAVAIL);
411ac0aa473SBill Fenner }
412df8bae1dSRodney W. Grimes
413588885f2SRobert Watson error = 0;
414df8bae1dSRodney W. Grimes switch (cmd) {
415f7a39160SGleb Smirnoff case SIOCGIFADDR:
416f7a39160SGleb Smirnoff *addr = ia->ia_addr;
417f7a39160SGleb Smirnoff break;
4188c0fec80SRobert Watson
419f7a39160SGleb Smirnoff case SIOCGIFBRDADDR:
420f7a39160SGleb Smirnoff if ((ifp->if_flags & IFF_BROADCAST) == 0) {
421f7a39160SGleb Smirnoff error = EINVAL;
422df8bae1dSRodney W. Grimes break;
423df8bae1dSRodney W. Grimes }
424f7a39160SGleb Smirnoff *addr = ia->ia_broadaddr;
425f7a39160SGleb Smirnoff break;
426f7a39160SGleb Smirnoff
427f7a39160SGleb Smirnoff case SIOCGIFDSTADDR:
428f7a39160SGleb Smirnoff if ((ifp->if_flags & IFF_POINTOPOINT) == 0) {
429f7a39160SGleb Smirnoff error = EINVAL;
430f7a39160SGleb Smirnoff break;
431f7a39160SGleb Smirnoff }
432f7a39160SGleb Smirnoff *addr = ia->ia_dstaddr;
433f7a39160SGleb Smirnoff break;
434f7a39160SGleb Smirnoff
435f7a39160SGleb Smirnoff case SIOCGIFNETMASK:
436f7a39160SGleb Smirnoff *addr = ia->ia_sockmask;
437f7a39160SGleb Smirnoff break;
438f7a39160SGleb Smirnoff }
439f7a39160SGleb Smirnoff
440a68cc388SGleb Smirnoff NET_EPOCH_EXIT(et);
441f7a39160SGleb Smirnoff
442f7a39160SGleb Smirnoff return (error);
4431067217dSGarrett Wollman }
444f7a39160SGleb Smirnoff
445bb06a80cSAlexander V. Chernikov int
in_mask2len(struct in_addr * mask)446e4e0f497SKristof Provost in_mask2len(struct in_addr *mask)
447e4e0f497SKristof Provost {
448e4e0f497SKristof Provost int x, y;
449e4e0f497SKristof Provost u_char *p;
450e4e0f497SKristof Provost
451e4e0f497SKristof Provost p = (u_char *)mask;
452e4e0f497SKristof Provost for (x = 0; x < sizeof(*mask); x++) {
453e4e0f497SKristof Provost if (p[x] != 0xff)
454e4e0f497SKristof Provost break;
455e4e0f497SKristof Provost }
456e4e0f497SKristof Provost y = 0;
457e4e0f497SKristof Provost if (x < sizeof(*mask)) {
458e4e0f497SKristof Provost for (y = 0; y < 8; y++) {
459e4e0f497SKristof Provost if ((p[x] & (0x80 >> y)) == 0)
460e4e0f497SKristof Provost break;
461e4e0f497SKristof Provost }
462e4e0f497SKristof Provost }
463e4e0f497SKristof Provost return (x * 8 + y);
464e4e0f497SKristof Provost }
465e4e0f497SKristof Provost
466e4e0f497SKristof Provost int
in_control(struct socket * so,u_long cmd,void * data,struct ifnet * ifp,struct thread * td)467bb06a80cSAlexander V. Chernikov in_control(struct socket *so, u_long cmd, void *data, struct ifnet *ifp,
468bb06a80cSAlexander V. Chernikov struct thread *td)
469bb06a80cSAlexander V. Chernikov {
470bb06a80cSAlexander V. Chernikov return (in_control_ioctl(cmd, data, ifp, td ? td->td_ucred : NULL));
471bb06a80cSAlexander V. Chernikov }
472bb06a80cSAlexander V. Chernikov
473f7a39160SGleb Smirnoff static int
in_aifaddr_ioctl(u_long cmd,caddr_t data,struct ifnet * ifp,struct ucred * cred)474f375bf0eSAlexander V. Chernikov in_aifaddr_ioctl(u_long cmd, caddr_t data, struct ifnet *ifp, struct ucred *cred)
475f7a39160SGleb Smirnoff {
476f7a39160SGleb Smirnoff const struct in_aliasreq *ifra = (struct in_aliasreq *)data;
477f7a39160SGleb Smirnoff const struct sockaddr_in *addr = &ifra->ifra_addr;
478f7a39160SGleb Smirnoff const struct sockaddr_in *broadaddr = &ifra->ifra_broadaddr;
479f7a39160SGleb Smirnoff const struct sockaddr_in *mask = &ifra->ifra_mask;
480f7a39160SGleb Smirnoff const struct sockaddr_in *dstaddr = &ifra->ifra_dstaddr;
48177b89ad8SGleb Smirnoff const int vhid = (cmd == SIOCAIFADDR) ? ifra->ifra_vhid : 0;
482a68cc388SGleb Smirnoff struct epoch_tracker et;
483f7a39160SGleb Smirnoff struct ifaddr *ifa;
484f7a39160SGleb Smirnoff struct in_ifaddr *ia;
485f7a39160SGleb Smirnoff bool iaIsFirst;
486f7a39160SGleb Smirnoff int error = 0;
487f7a39160SGleb Smirnoff
488f375bf0eSAlexander V. Chernikov error = priv_check_cred(cred, PRIV_NET_ADDIFADDR);
489f7a39160SGleb Smirnoff if (error)
490f7a39160SGleb Smirnoff return (error);
491f7a39160SGleb Smirnoff
492f7a39160SGleb Smirnoff /*
493f7a39160SGleb Smirnoff * ifra_addr must be present and be of INET family.
494f7a39160SGleb Smirnoff * ifra_broadaddr/ifra_dstaddr and ifra_mask are optional.
495f7a39160SGleb Smirnoff */
496f7a39160SGleb Smirnoff if (addr->sin_len != sizeof(struct sockaddr_in) ||
497f7a39160SGleb Smirnoff addr->sin_family != AF_INET)
498f7a39160SGleb Smirnoff return (EINVAL);
499f7a39160SGleb Smirnoff if (broadaddr->sin_len != 0 &&
500f7a39160SGleb Smirnoff (broadaddr->sin_len != sizeof(struct sockaddr_in) ||
501f7a39160SGleb Smirnoff broadaddr->sin_family != AF_INET))
502f7a39160SGleb Smirnoff return (EINVAL);
503f7a39160SGleb Smirnoff if (mask->sin_len != 0 &&
504f7a39160SGleb Smirnoff (mask->sin_len != sizeof(struct sockaddr_in) ||
505f7a39160SGleb Smirnoff mask->sin_family != AF_INET))
506f7a39160SGleb Smirnoff return (EINVAL);
507f7a39160SGleb Smirnoff if ((ifp->if_flags & IFF_POINTOPOINT) &&
508f7a39160SGleb Smirnoff (dstaddr->sin_len != sizeof(struct sockaddr_in) ||
509f7a39160SGleb Smirnoff dstaddr->sin_addr.s_addr == INADDR_ANY))
510f7a39160SGleb Smirnoff return (EDESTADDRREQ);
511620cf65cSArtem Khramov if (vhid != 0 && carp_attach_p == NULL)
512f7a39160SGleb Smirnoff return (EPROTONOSUPPORT);
513f7a39160SGleb Smirnoff
514215bab79SShivank Garg #ifdef MAC
515215bab79SShivank Garg /* Check if a MAC policy disallows setting the IPv4 address. */
516215bab79SShivank Garg error = mac_inet_check_add_addr(cred, &addr->sin_addr, ifp);
517215bab79SShivank Garg if (error != 0)
518215bab79SShivank Garg return (error);
519215bab79SShivank Garg #endif
520215bab79SShivank Garg
521f7a39160SGleb Smirnoff /*
522f7a39160SGleb Smirnoff * See whether address already exist.
523f7a39160SGleb Smirnoff */
524f7a39160SGleb Smirnoff iaIsFirst = true;
525f7a39160SGleb Smirnoff ia = NULL;
526a68cc388SGleb Smirnoff NET_EPOCH_ENTER(et);
527d7c5a620SMatt Macy CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
5289706c950SGleb Smirnoff struct in_ifaddr *it;
529f7a39160SGleb Smirnoff
5309706c950SGleb Smirnoff if (ifa->ifa_addr->sa_family != AF_INET)
531f7a39160SGleb Smirnoff continue;
532f7a39160SGleb Smirnoff
5339706c950SGleb Smirnoff it = (struct in_ifaddr *)ifa;
534f7a39160SGleb Smirnoff if (it->ia_addr.sin_addr.s_addr == addr->sin_addr.s_addr &&
535f375bf0eSAlexander V. Chernikov prison_check_ip4(cred, &addr->sin_addr) == 0)
536f7a39160SGleb Smirnoff ia = it;
5373f740d43SAndrey V. Elsukov else
5383f740d43SAndrey V. Elsukov iaIsFirst = false;
5391067217dSGarrett Wollman }
540a68cc388SGleb Smirnoff NET_EPOCH_EXIT(et);
541f7a39160SGleb Smirnoff
542f7a39160SGleb Smirnoff if (ia != NULL)
543f375bf0eSAlexander V. Chernikov (void )in_difaddr_ioctl(cmd, data, ifp, cred);
544f7a39160SGleb Smirnoff
54546758960SGleb Smirnoff ifa = ifa_alloc(sizeof(struct in_ifaddr), M_WAITOK);
54646758960SGleb Smirnoff ia = (struct in_ifaddr *)ifa;
54759562606SGarrett Wollman ifa->ifa_addr = (struct sockaddr *)&ia->ia_addr;
54859562606SGarrett Wollman ifa->ifa_dstaddr = (struct sockaddr *)&ia->ia_dstaddr;
54959562606SGarrett Wollman ifa->ifa_netmask = (struct sockaddr *)&ia->ia_sockmask;
5502d9db0bcSEric van Gyzen callout_init_rw(&ia->ia_garp_timer, &ifp->if_addr_lock,
5512d9db0bcSEric van Gyzen CALLOUT_RETURNUNLOCKED);
55219fc74fbSJeffrey Hsu
553f7a39160SGleb Smirnoff ia->ia_ifp = ifp;
554f7a39160SGleb Smirnoff ia->ia_addr = *addr;
555f7a39160SGleb Smirnoff if (mask->sin_len != 0) {
556f7a39160SGleb Smirnoff ia->ia_sockmask = *mask;
557f7a39160SGleb Smirnoff ia->ia_subnetmask = ntohl(ia->ia_sockmask.sin_addr.s_addr);
558f7a39160SGleb Smirnoff } else {
5592f35e7d9SMike Karels in_addr_t i = ntohl(addr->sin_addr.s_addr);
5602f35e7d9SMike Karels
561f7a39160SGleb Smirnoff /*
5622f35e7d9SMike Karels * If netmask isn't supplied, use historical default.
56320d59403SMike Karels * This is deprecated for interfaces other than loopback
56420d59403SMike Karels * or point-to-point; warn in other cases. In the future
56520d59403SMike Karels * we should return an error rather than warning.
566f7a39160SGleb Smirnoff */
56720d59403SMike Karels if ((ifp->if_flags & (IFF_POINTOPOINT | IFF_LOOPBACK)) == 0)
56820d59403SMike Karels printf("%s: set address: WARNING: network mask "
5692f35e7d9SMike Karels "should be specified; using historical default\n",
57020d59403SMike Karels ifp->if_xname);
5712f35e7d9SMike Karels if (IN_CLASSA(i))
5722f35e7d9SMike Karels ia->ia_subnetmask = IN_CLASSA_NET;
5732f35e7d9SMike Karels else if (IN_CLASSB(i))
5742f35e7d9SMike Karels ia->ia_subnetmask = IN_CLASSB_NET;
5752f35e7d9SMike Karels else
5762f35e7d9SMike Karels ia->ia_subnetmask = IN_CLASSC_NET;
577f7a39160SGleb Smirnoff ia->ia_sockmask.sin_addr.s_addr = htonl(ia->ia_subnetmask);
578f7a39160SGleb Smirnoff }
579f7a39160SGleb Smirnoff ia->ia_subnet = ntohl(addr->sin_addr.s_addr) & ia->ia_subnetmask;
580f7a39160SGleb Smirnoff in_socktrim(&ia->ia_sockmask);
581f7a39160SGleb Smirnoff
582df8bae1dSRodney W. Grimes if (ifp->if_flags & IFF_BROADCAST) {
583f7a39160SGleb Smirnoff if (broadaddr->sin_len != 0) {
584f7a39160SGleb Smirnoff ia->ia_broadaddr = *broadaddr;
585f7a39160SGleb Smirnoff } else if (ia->ia_subnetmask == IN_RFC3021_MASK) {
586f7a39160SGleb Smirnoff ia->ia_broadaddr.sin_addr.s_addr = INADDR_BROADCAST;
587f7a39160SGleb Smirnoff ia->ia_broadaddr.sin_len = sizeof(struct sockaddr_in);
588f7a39160SGleb Smirnoff ia->ia_broadaddr.sin_family = AF_INET;
589f7a39160SGleb Smirnoff } else {
590f7a39160SGleb Smirnoff ia->ia_broadaddr.sin_addr.s_addr =
591f7a39160SGleb Smirnoff htonl(ia->ia_subnet | ~ia->ia_subnetmask);
592f7a39160SGleb Smirnoff ia->ia_broadaddr.sin_len = sizeof(struct sockaddr_in);
593df8bae1dSRodney W. Grimes ia->ia_broadaddr.sin_family = AF_INET;
594df8bae1dSRodney W. Grimes }
595f7a39160SGleb Smirnoff }
596f7a39160SGleb Smirnoff
597f7a39160SGleb Smirnoff if (ifp->if_flags & IFF_POINTOPOINT)
598f7a39160SGleb Smirnoff ia->ia_dstaddr = *dstaddr;
599f7a39160SGleb Smirnoff
6005af464bbSSteven Hartland if (vhid != 0) {
6015af464bbSSteven Hartland error = (*carp_attach_p)(&ia->ia_ifa, vhid);
6025af464bbSSteven Hartland if (error)
6035af464bbSSteven Hartland return (error);
6045af464bbSSteven Hartland }
6055af464bbSSteven Hartland
606a49b317cSAlexander V. Chernikov /* if_addrhead is already referenced by ifa_alloc() */
607137f91e8SJohn Baldwin IF_ADDR_WLOCK(ifp);
608d7c5a620SMatt Macy CK_STAILQ_INSERT_TAIL(&ifp->if_addrhead, ifa, ifa_link);
609137f91e8SJohn Baldwin IF_ADDR_WUNLOCK(ifp);
610f7a39160SGleb Smirnoff
6118c0fec80SRobert Watson ifa_ref(ifa); /* in_ifaddrhead */
612c8ee75f2SGleb Smirnoff sx_assert(&in_control_sx, SA_XLOCKED);
613d7c5a620SMatt Macy CK_STAILQ_INSERT_TAIL(&V_in_ifaddrhead, ia, ia_link);
614c8ee75f2SGleb Smirnoff CK_LIST_INSERT_HEAD(INADDR_HASH(ia->ia_addr.sin_addr.s_addr), ia,
615c8ee75f2SGleb Smirnoff ia_hash);
616df8bae1dSRodney W. Grimes
617f7a39160SGleb Smirnoff /*
618f7a39160SGleb Smirnoff * Give the interface a chance to initialize
619f7a39160SGleb Smirnoff * if this is its first address,
620f7a39160SGleb Smirnoff * and to validate the address if necessary.
621f7a39160SGleb Smirnoff */
622d34165f7SSteven Hartland if (ifp->if_ioctl != NULL) {
623f7a39160SGleb Smirnoff error = (*ifp->if_ioctl)(ifp, SIOCSIFADDR, (caddr_t)ia);
624f7a39160SGleb Smirnoff if (error)
6255af464bbSSteven Hartland goto fail1;
626d34165f7SSteven Hartland }
627f7a39160SGleb Smirnoff
628f7a39160SGleb Smirnoff /*
629f7a39160SGleb Smirnoff * Add route for the network.
630f7a39160SGleb Smirnoff */
631f7a39160SGleb Smirnoff if (vhid == 0) {
632130aebbaSAlexander V. Chernikov error = in_addprefix(ia);
633f7a39160SGleb Smirnoff if (error)
6345af464bbSSteven Hartland goto fail1;
635df8bae1dSRodney W. Grimes }
636df8bae1dSRodney W. Grimes
637588885f2SRobert Watson /*
638f7a39160SGleb Smirnoff * Add a loopback route to self.
639588885f2SRobert Watson */
640130aebbaSAlexander V. Chernikov if (vhid == 0 && ia_need_loopback_route(ia)) {
641f7a39160SGleb Smirnoff struct in_ifaddr *eia;
642df8bae1dSRodney W. Grimes
643f7a39160SGleb Smirnoff eia = in_localip_more(ia);
644f7a39160SGleb Smirnoff
645f7a39160SGleb Smirnoff if (eia == NULL) {
646f7a39160SGleb Smirnoff error = ifa_add_loopback_route((struct ifaddr *)ia,
647f7a39160SGleb Smirnoff (struct sockaddr *)&ia->ia_addr);
648f7a39160SGleb Smirnoff if (error)
6495af464bbSSteven Hartland goto fail2;
650f7a39160SGleb Smirnoff } else
651f7a39160SGleb Smirnoff ifa_free(&eia->ia_ifa);
652588885f2SRobert Watson }
653df8bae1dSRodney W. Grimes
654f7a39160SGleb Smirnoff if (iaIsFirst && (ifp->if_flags & IFF_MULTICAST)) {
655f7a39160SGleb Smirnoff struct in_addr allhosts_addr;
656f7a39160SGleb Smirnoff struct in_ifinfo *ii;
657df8bae1dSRodney W. Grimes
658c75aa354SBruce M Simpson ii = ((struct in_ifinfo *)ifp->if_afdata[AF_INET]);
659f7a39160SGleb Smirnoff allhosts_addr.s_addr = htonl(INADDR_ALLHOSTS_GROUP);
660df8bae1dSRodney W. Grimes
661f7a39160SGleb Smirnoff error = in_joingroup(ifp, &allhosts_addr, NULL,
662f7a39160SGleb Smirnoff &ii->ii_allhosts);
663f7a39160SGleb Smirnoff }
664f7a39160SGleb Smirnoff
66564d63b1eSAndrey V. Elsukov /*
66664d63b1eSAndrey V. Elsukov * Note: we don't need extra reference for ifa, since we called
66764d63b1eSAndrey V. Elsukov * with sx lock held, and ifaddr can not be deleted in concurrent
66864d63b1eSAndrey V. Elsukov * thread.
66964d63b1eSAndrey V. Elsukov */
67064d63b1eSAndrey V. Elsukov EVENTHANDLER_INVOKE(ifaddr_event_ext, ifp, ifa, IFADDR_EVENT_ADD);
671f7a39160SGleb Smirnoff
672f7a39160SGleb Smirnoff return (error);
673f7a39160SGleb Smirnoff
6745af464bbSSteven Hartland fail2:
675f7a39160SGleb Smirnoff if (vhid == 0)
676f7a39160SGleb Smirnoff (void )in_scrubprefix(ia, LLE_STATIC);
677f7a39160SGleb Smirnoff
6785af464bbSSteven Hartland fail1:
679f7a39160SGleb Smirnoff if (ia->ia_ifa.ifa_carp)
680338e227aSLuiz Otavio O Souza (*carp_detach_p)(&ia->ia_ifa, false);
681f7a39160SGleb Smirnoff
682f7a39160SGleb Smirnoff IF_ADDR_WLOCK(ifp);
683d7c5a620SMatt Macy CK_STAILQ_REMOVE(&ifp->if_addrhead, &ia->ia_ifa, ifaddr, ifa_link);
684f7a39160SGleb Smirnoff IF_ADDR_WUNLOCK(ifp);
685a49b317cSAlexander V. Chernikov ifa_free(&ia->ia_ifa); /* if_addrhead */
686f7a39160SGleb Smirnoff
687c8ee75f2SGleb Smirnoff sx_assert(&in_control_sx, SA_XLOCKED);
688d7c5a620SMatt Macy CK_STAILQ_REMOVE(&V_in_ifaddrhead, ia, in_ifaddr, ia_link);
689c8ee75f2SGleb Smirnoff CK_LIST_REMOVE(ia, ia_hash);
690a49b317cSAlexander V. Chernikov ifa_free(&ia->ia_ifa); /* in_ifaddrhead */
691f7a39160SGleb Smirnoff
692f7a39160SGleb Smirnoff return (error);
693f7a39160SGleb Smirnoff }
694f7a39160SGleb Smirnoff
695f7a39160SGleb Smirnoff static int
in_difaddr_ioctl(u_long cmd,caddr_t data,struct ifnet * ifp,struct ucred * cred)696f375bf0eSAlexander V. Chernikov in_difaddr_ioctl(u_long cmd, caddr_t data, struct ifnet *ifp, struct ucred *cred)
697f7a39160SGleb Smirnoff {
698f7a39160SGleb Smirnoff const struct ifreq *ifr = (struct ifreq *)data;
6996224cd89SNathan Whitehorn const struct sockaddr_in *addr = (const struct sockaddr_in *)
7006224cd89SNathan Whitehorn &ifr->ifr_addr;
701f7a39160SGleb Smirnoff struct ifaddr *ifa;
702f7a39160SGleb Smirnoff struct in_ifaddr *ia;
703f7a39160SGleb Smirnoff bool deleteAny, iaIsLast;
704f7a39160SGleb Smirnoff int error;
705f7a39160SGleb Smirnoff
706f375bf0eSAlexander V. Chernikov if (cred != NULL) {
707f375bf0eSAlexander V. Chernikov error = priv_check_cred(cred, PRIV_NET_DELIFADDR);
708f7a39160SGleb Smirnoff if (error)
709f7a39160SGleb Smirnoff return (error);
710f7a39160SGleb Smirnoff }
711f7a39160SGleb Smirnoff
712f7a39160SGleb Smirnoff if (addr->sin_len != sizeof(struct sockaddr_in) ||
713f7a39160SGleb Smirnoff addr->sin_family != AF_INET)
714f7a39160SGleb Smirnoff deleteAny = true;
715f7a39160SGleb Smirnoff else
716f7a39160SGleb Smirnoff deleteAny = false;
717f7a39160SGleb Smirnoff
718f7a39160SGleb Smirnoff iaIsLast = true;
719f7a39160SGleb Smirnoff ia = NULL;
720f7a39160SGleb Smirnoff IF_ADDR_WLOCK(ifp);
721d7c5a620SMatt Macy CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
7229706c950SGleb Smirnoff struct in_ifaddr *it;
723f7a39160SGleb Smirnoff
7249706c950SGleb Smirnoff if (ifa->ifa_addr->sa_family != AF_INET)
725f7a39160SGleb Smirnoff continue;
726f7a39160SGleb Smirnoff
7279706c950SGleb Smirnoff it = (struct in_ifaddr *)ifa;
728f375bf0eSAlexander V. Chernikov if (deleteAny && ia == NULL && (cred == NULL ||
729f375bf0eSAlexander V. Chernikov prison_check_ip4(cred, &it->ia_addr.sin_addr) == 0))
730f7a39160SGleb Smirnoff ia = it;
731f7a39160SGleb Smirnoff
732f7a39160SGleb Smirnoff if (it->ia_addr.sin_addr.s_addr == addr->sin_addr.s_addr &&
733f375bf0eSAlexander V. Chernikov (cred == NULL || prison_check_ip4(cred,
734f7a39160SGleb Smirnoff &addr->sin_addr) == 0))
735f7a39160SGleb Smirnoff ia = it;
736f7a39160SGleb Smirnoff
737f7a39160SGleb Smirnoff if (it != ia)
738f7a39160SGleb Smirnoff iaIsLast = false;
739f7a39160SGleb Smirnoff }
740f7a39160SGleb Smirnoff
741f7a39160SGleb Smirnoff if (ia == NULL) {
742f7a39160SGleb Smirnoff IF_ADDR_WUNLOCK(ifp);
743f7a39160SGleb Smirnoff return (EADDRNOTAVAIL);
744f7a39160SGleb Smirnoff }
745f7a39160SGleb Smirnoff
746d7c5a620SMatt Macy CK_STAILQ_REMOVE(&ifp->if_addrhead, &ia->ia_ifa, ifaddr, ifa_link);
747f7a39160SGleb Smirnoff IF_ADDR_WUNLOCK(ifp);
748f7a39160SGleb Smirnoff ifa_free(&ia->ia_ifa); /* if_addrhead */
749f7a39160SGleb Smirnoff
750c8ee75f2SGleb Smirnoff sx_assert(&in_control_sx, SA_XLOCKED);
751d7c5a620SMatt Macy CK_STAILQ_REMOVE(&V_in_ifaddrhead, ia, in_ifaddr, ia_link);
752c8ee75f2SGleb Smirnoff CK_LIST_REMOVE(ia, ia_hash);
753f7a39160SGleb Smirnoff
754089cdfadSRuslan Ermilov /*
755237bf7f7SGleb Smirnoff * in_scrubprefix() kills the interface route.
756089cdfadSRuslan Ermilov */
757237bf7f7SGleb Smirnoff in_scrubprefix(ia, LLE_STATIC);
758588885f2SRobert Watson
759c655b7c4SDavid Greenman /*
760089cdfadSRuslan Ermilov * in_ifadown gets rid of all the rest of
761089cdfadSRuslan Ermilov * the routes. This is not quite the right
762089cdfadSRuslan Ermilov * thing to do, but at least if we are running
763089cdfadSRuslan Ermilov * a routing process they will come back.
764089cdfadSRuslan Ermilov */
76591854268SRuslan Ermilov in_ifadown(&ia->ia_ifa, 1);
7660f02fdacSBrian Somers
76708b68b0eSGleb Smirnoff if (ia->ia_ifa.ifa_carp)
76859b2022fSLuiz Otavio O Souza (*carp_detach_p)(&ia->ia_ifa, cmd == SIOCAIFADDR);
76908b68b0eSGleb Smirnoff
770f7e083afSBruce M Simpson /*
771f7e083afSBruce M Simpson * If this is the last IPv4 address configured on this
772f7e083afSBruce M Simpson * interface, leave the all-hosts group.
773d10910e6SBruce M Simpson * No state-change report need be transmitted.
774f7e083afSBruce M Simpson */
775f7a39160SGleb Smirnoff if (iaIsLast && (ifp->if_flags & IFF_MULTICAST)) {
776f7a39160SGleb Smirnoff struct in_ifinfo *ii;
777f7a39160SGleb Smirnoff
778c75aa354SBruce M Simpson ii = ((struct in_ifinfo *)ifp->if_afdata[AF_INET]);
779d10910e6SBruce M Simpson if (ii->ii_allhosts) {
780f3e1324bSStephen Hurd (void)in_leavegroup(ii->ii_allhosts, NULL);
781d10910e6SBruce M Simpson ii->ii_allhosts = NULL;
782d10910e6SBruce M Simpson }
783f7a39160SGleb Smirnoff }
7846d00fd9cSGleb Smirnoff
7852d9db0bcSEric van Gyzen IF_ADDR_WLOCK(ifp);
7862d9db0bcSEric van Gyzen if (callout_stop(&ia->ia_garp_timer) == 1) {
7872d9db0bcSEric van Gyzen ifa_free(&ia->ia_ifa);
7882d9db0bcSEric van Gyzen }
7892d9db0bcSEric van Gyzen IF_ADDR_WUNLOCK(ifp);
7902d9db0bcSEric van Gyzen
79164d63b1eSAndrey V. Elsukov EVENTHANDLER_INVOKE(ifaddr_event_ext, ifp, &ia->ia_ifa,
79264d63b1eSAndrey V. Elsukov IFADDR_EVENT_DEL);
793a49b317cSAlexander V. Chernikov ifa_free(&ia->ia_ifa); /* in_ifaddrhead */
794f7a39160SGleb Smirnoff
795f7a39160SGleb Smirnoff return (0);
796df8bae1dSRodney W. Grimes }
797df8bae1dSRodney W. Grimes
7986952c3e1SAndrey V. Elsukov static int
in_gifaddr_ioctl(u_long cmd,caddr_t data,struct ifnet * ifp,struct ucred * cred)799f375bf0eSAlexander V. Chernikov in_gifaddr_ioctl(u_long cmd, caddr_t data, struct ifnet *ifp, struct ucred *cred)
8006952c3e1SAndrey V. Elsukov {
8016952c3e1SAndrey V. Elsukov struct in_aliasreq *ifra = (struct in_aliasreq *)data;
8026952c3e1SAndrey V. Elsukov const struct sockaddr_in *addr = &ifra->ifra_addr;
8036952c3e1SAndrey V. Elsukov struct epoch_tracker et;
8046952c3e1SAndrey V. Elsukov struct ifaddr *ifa;
8056952c3e1SAndrey V. Elsukov struct in_ifaddr *ia;
8066952c3e1SAndrey V. Elsukov
8076952c3e1SAndrey V. Elsukov /*
8086952c3e1SAndrey V. Elsukov * ifra_addr must be present and be of INET family.
8096952c3e1SAndrey V. Elsukov */
8106952c3e1SAndrey V. Elsukov if (addr->sin_len != sizeof(struct sockaddr_in) ||
8116952c3e1SAndrey V. Elsukov addr->sin_family != AF_INET)
8126952c3e1SAndrey V. Elsukov return (EINVAL);
8136952c3e1SAndrey V. Elsukov
8146952c3e1SAndrey V. Elsukov /*
8156952c3e1SAndrey V. Elsukov * See whether address exist.
8166952c3e1SAndrey V. Elsukov */
8176952c3e1SAndrey V. Elsukov ia = NULL;
8186952c3e1SAndrey V. Elsukov NET_EPOCH_ENTER(et);
8196952c3e1SAndrey V. Elsukov CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
8206952c3e1SAndrey V. Elsukov struct in_ifaddr *it;
8216952c3e1SAndrey V. Elsukov
8226952c3e1SAndrey V. Elsukov if (ifa->ifa_addr->sa_family != AF_INET)
8236952c3e1SAndrey V. Elsukov continue;
8246952c3e1SAndrey V. Elsukov
8256952c3e1SAndrey V. Elsukov it = (struct in_ifaddr *)ifa;
8266952c3e1SAndrey V. Elsukov if (it->ia_addr.sin_addr.s_addr == addr->sin_addr.s_addr &&
827f375bf0eSAlexander V. Chernikov prison_check_ip4(cred, &addr->sin_addr) == 0) {
8286952c3e1SAndrey V. Elsukov ia = it;
8296952c3e1SAndrey V. Elsukov break;
8306952c3e1SAndrey V. Elsukov }
8316952c3e1SAndrey V. Elsukov }
8326952c3e1SAndrey V. Elsukov if (ia == NULL) {
8336952c3e1SAndrey V. Elsukov NET_EPOCH_EXIT(et);
8346952c3e1SAndrey V. Elsukov return (EADDRNOTAVAIL);
8356952c3e1SAndrey V. Elsukov }
8366952c3e1SAndrey V. Elsukov
8376952c3e1SAndrey V. Elsukov ifra->ifra_mask = ia->ia_sockmask;
8386952c3e1SAndrey V. Elsukov if ((ifp->if_flags & IFF_POINTOPOINT) &&
8396952c3e1SAndrey V. Elsukov ia->ia_dstaddr.sin_family == AF_INET)
8406952c3e1SAndrey V. Elsukov ifra->ifra_dstaddr = ia->ia_dstaddr;
8416952c3e1SAndrey V. Elsukov else if ((ifp->if_flags & IFF_BROADCAST) &&
8426952c3e1SAndrey V. Elsukov ia->ia_broadaddr.sin_family == AF_INET)
8436952c3e1SAndrey V. Elsukov ifra->ifra_broadaddr = ia->ia_broadaddr;
8446952c3e1SAndrey V. Elsukov else
8456952c3e1SAndrey V. Elsukov memset(&ifra->ifra_broadaddr, 0,
8466952c3e1SAndrey V. Elsukov sizeof(ifra->ifra_broadaddr));
8476952c3e1SAndrey V. Elsukov
8486952c3e1SAndrey V. Elsukov NET_EPOCH_EXIT(et);
8496952c3e1SAndrey V. Elsukov return (0);
8506952c3e1SAndrey V. Elsukov }
8516952c3e1SAndrey V. Elsukov
85281728a53SAlexander V. Chernikov static int
in_match_ifaddr(const struct rtentry * rt,const struct nhop_object * nh,void * arg)85381728a53SAlexander V. Chernikov in_match_ifaddr(const struct rtentry *rt, const struct nhop_object *nh, void *arg)
85481728a53SAlexander V. Chernikov {
85581728a53SAlexander V. Chernikov
85681728a53SAlexander V. Chernikov if (nh->nh_ifa == (struct ifaddr *)arg)
85781728a53SAlexander V. Chernikov return (1);
85881728a53SAlexander V. Chernikov
85981728a53SAlexander V. Chernikov return (0);
86081728a53SAlexander V. Chernikov }
86181728a53SAlexander V. Chernikov
86281728a53SAlexander V. Chernikov static int
in_handle_prefix_route(uint32_t fibnum,int cmd,struct sockaddr_in * dst,struct sockaddr_in * netmask,struct ifaddr * ifa,struct ifnet * ifp)8637b3440fcSAlexander V. Chernikov in_handle_prefix_route(uint32_t fibnum, int cmd,
8647b3440fcSAlexander V. Chernikov struct sockaddr_in *dst, struct sockaddr_in *netmask, struct ifaddr *ifa,
8657b3440fcSAlexander V. Chernikov struct ifnet *ifp)
86681728a53SAlexander V. Chernikov {
86781728a53SAlexander V. Chernikov
86881728a53SAlexander V. Chernikov NET_EPOCH_ASSERT();
86981728a53SAlexander V. Chernikov
8707b3440fcSAlexander V. Chernikov /* Prepare gateway */
8717b3440fcSAlexander V. Chernikov struct sockaddr_dl_short sdl = {
8727b3440fcSAlexander V. Chernikov .sdl_family = AF_LINK,
8737b3440fcSAlexander V. Chernikov .sdl_len = sizeof(struct sockaddr_dl_short),
8747b3440fcSAlexander V. Chernikov .sdl_type = ifa->ifa_ifp->if_type,
8757b3440fcSAlexander V. Chernikov .sdl_index = ifa->ifa_ifp->if_index,
8767b3440fcSAlexander V. Chernikov };
87781728a53SAlexander V. Chernikov
8787b3440fcSAlexander V. Chernikov struct rt_addrinfo info = {
8797b3440fcSAlexander V. Chernikov .rti_ifa = ifa,
8807b3440fcSAlexander V. Chernikov .rti_ifp = ifp,
8817b3440fcSAlexander V. Chernikov .rti_flags = RTF_PINNED | ((netmask != NULL) ? 0 : RTF_HOST),
8827b3440fcSAlexander V. Chernikov .rti_info = {
8837b3440fcSAlexander V. Chernikov [RTAX_DST] = (struct sockaddr *)dst,
8847b3440fcSAlexander V. Chernikov [RTAX_NETMASK] = (struct sockaddr *)netmask,
8857b3440fcSAlexander V. Chernikov [RTAX_GATEWAY] = (struct sockaddr *)&sdl,
8867b3440fcSAlexander V. Chernikov },
8877b3440fcSAlexander V. Chernikov /* Ensure we delete the prefix IFF prefix ifa matches */
8887b3440fcSAlexander V. Chernikov .rti_filter = in_match_ifaddr,
8897b3440fcSAlexander V. Chernikov .rti_filterdata = ifa,
8907b3440fcSAlexander V. Chernikov };
8917b3440fcSAlexander V. Chernikov
8927b3440fcSAlexander V. Chernikov return (rib_handle_ifaddr_info(fibnum, cmd, &info));
89381728a53SAlexander V. Chernikov }
89481728a53SAlexander V. Chernikov
89581728a53SAlexander V. Chernikov /*
896130aebbaSAlexander V. Chernikov * Routing table interaction with interface addresses.
897130aebbaSAlexander V. Chernikov *
898130aebbaSAlexander V. Chernikov * In general, two types of routes needs to be installed:
899130aebbaSAlexander V. Chernikov * a) "interface" or "prefix" route, telling user that the addresses
900130aebbaSAlexander V. Chernikov * behind the ifa prefix are reached directly.
901130aebbaSAlexander V. Chernikov * b) "loopback" route installed for the ifa address, telling user that
902130aebbaSAlexander V. Chernikov * the address belongs to local system.
903130aebbaSAlexander V. Chernikov *
904130aebbaSAlexander V. Chernikov * Handling for (a) and (b) differs in multi-fib aspects, hence they
905130aebbaSAlexander V. Chernikov * are implemented in different functions below.
906130aebbaSAlexander V. Chernikov *
907130aebbaSAlexander V. Chernikov * The cases above may intersect - /32 interface aliases results in
908130aebbaSAlexander V. Chernikov * the same prefix produced by (a) and (b). This blurs the definition
909130aebbaSAlexander V. Chernikov * of the "loopback" route and complicate interactions. The interaction
910130aebbaSAlexander V. Chernikov * table is defined below. The case numbers are used in the multiple
911130aebbaSAlexander V. Chernikov * functions below to refer to the particular test case.
912130aebbaSAlexander V. Chernikov *
91381728a53SAlexander V. Chernikov * There can be multiple options:
914130aebbaSAlexander V. Chernikov * 1) Adding address with prefix on non-p2p/non-loopback interface.
915130aebbaSAlexander V. Chernikov * Example: 192.0.2.1/24. Action:
916130aebbaSAlexander V. Chernikov * * add "prefix" route towards 192.0.2.0/24 via @ia interface,
917130aebbaSAlexander V. Chernikov * using @ia as an address source.
918130aebbaSAlexander V. Chernikov * * add "loopback" route towards 192.0.2.1 via V_loif, saving
919130aebbaSAlexander V. Chernikov * @ia ifp in the gateway and using @ia as an address source.
920130aebbaSAlexander V. Chernikov *
921130aebbaSAlexander V. Chernikov * 2) Adding address with /32 mask to non-p2p/non-loopback interface.
922130aebbaSAlexander V. Chernikov * Example: 192.0.2.2/32. Action:
923130aebbaSAlexander V. Chernikov * * add "prefix" host route via V_loif, using @ia as an address source.
924130aebbaSAlexander V. Chernikov *
92581728a53SAlexander V. Chernikov * 3) Adding address with or without prefix to p2p interface.
926130aebbaSAlexander V. Chernikov * Example: 10.0.0.1/24->10.0.0.2. Action:
927130aebbaSAlexander V. Chernikov * * add "prefix" host route towards 10.0.0.2 via this interface, using @ia
928130aebbaSAlexander V. Chernikov * as an address source. Note: no sense in installing full /24 as the interface
929130aebbaSAlexander V. Chernikov * is point-to-point.
930130aebbaSAlexander V. Chernikov * * add "loopback" route towards 10.0.9.1 via V_loif, saving
931130aebbaSAlexander V. Chernikov * @ia ifp in the gateway and using @ia as an address source.
932130aebbaSAlexander V. Chernikov *
93381728a53SAlexander V. Chernikov * 4) Adding address with or without prefix to loopback interface.
934130aebbaSAlexander V. Chernikov * Example: 192.0.2.1/24. Action:
935130aebbaSAlexander V. Chernikov * * add "prefix" host route via @ia interface, using @ia as an address source.
936130aebbaSAlexander V. Chernikov * Note: Skip installing /24 prefix as it would introduce TTL loop
937130aebbaSAlexander V. Chernikov * for the traffic destined to these addresses.
938130aebbaSAlexander V. Chernikov */
939130aebbaSAlexander V. Chernikov
940130aebbaSAlexander V. Chernikov /*
941130aebbaSAlexander V. Chernikov * Checks if @ia needs to install loopback route to @ia address via
942130aebbaSAlexander V. Chernikov * ifa_maintain_loopback_route().
943130aebbaSAlexander V. Chernikov *
944130aebbaSAlexander V. Chernikov * Return true on success.
945130aebbaSAlexander V. Chernikov */
946130aebbaSAlexander V. Chernikov static bool
ia_need_loopback_route(const struct in_ifaddr * ia)947130aebbaSAlexander V. Chernikov ia_need_loopback_route(const struct in_ifaddr *ia)
948130aebbaSAlexander V. Chernikov {
949130aebbaSAlexander V. Chernikov struct ifnet *ifp = ia->ia_ifp;
950130aebbaSAlexander V. Chernikov
951130aebbaSAlexander V. Chernikov /* Case 4: Skip loopback interfaces */
952130aebbaSAlexander V. Chernikov if ((ifp->if_flags & IFF_LOOPBACK) ||
953130aebbaSAlexander V. Chernikov (ia->ia_addr.sin_addr.s_addr == INADDR_ANY))
954130aebbaSAlexander V. Chernikov return (false);
955130aebbaSAlexander V. Chernikov
956130aebbaSAlexander V. Chernikov /* Clash avoidance: Skip p2p interfaces with both addresses are equal */
957130aebbaSAlexander V. Chernikov if ((ifp->if_flags & IFF_POINTOPOINT) &&
958130aebbaSAlexander V. Chernikov ia->ia_dstaddr.sin_addr.s_addr == ia->ia_addr.sin_addr.s_addr)
959130aebbaSAlexander V. Chernikov return (false);
960130aebbaSAlexander V. Chernikov
961130aebbaSAlexander V. Chernikov /* Case 2: skip /32 prefixes */
962130aebbaSAlexander V. Chernikov if (!(ifp->if_flags & IFF_POINTOPOINT) &&
963130aebbaSAlexander V. Chernikov (ia->ia_sockmask.sin_addr.s_addr == INADDR_BROADCAST))
964130aebbaSAlexander V. Chernikov return (false);
965130aebbaSAlexander V. Chernikov
966130aebbaSAlexander V. Chernikov return (true);
967130aebbaSAlexander V. Chernikov }
968130aebbaSAlexander V. Chernikov
969130aebbaSAlexander V. Chernikov /*
970130aebbaSAlexander V. Chernikov * Calculate "prefix" route corresponding to @ia.
971130aebbaSAlexander V. Chernikov */
972130aebbaSAlexander V. Chernikov static void
ia_getrtprefix(const struct in_ifaddr * ia,struct in_addr * prefix,struct in_addr * mask)973130aebbaSAlexander V. Chernikov ia_getrtprefix(const struct in_ifaddr *ia, struct in_addr *prefix, struct in_addr *mask)
974130aebbaSAlexander V. Chernikov {
975130aebbaSAlexander V. Chernikov
976130aebbaSAlexander V. Chernikov if (ia->ia_ifp->if_flags & IFF_POINTOPOINT) {
977130aebbaSAlexander V. Chernikov /* Case 3: return host route for dstaddr */
978130aebbaSAlexander V. Chernikov *prefix = ia->ia_dstaddr.sin_addr;
979130aebbaSAlexander V. Chernikov mask->s_addr = INADDR_BROADCAST;
980130aebbaSAlexander V. Chernikov } else if (ia->ia_ifp->if_flags & IFF_LOOPBACK) {
981130aebbaSAlexander V. Chernikov /* Case 4: return host route for ifaddr */
982130aebbaSAlexander V. Chernikov *prefix = ia->ia_addr.sin_addr;
983130aebbaSAlexander V. Chernikov mask->s_addr = INADDR_BROADCAST;
984130aebbaSAlexander V. Chernikov } else {
985130aebbaSAlexander V. Chernikov /* Cases 1,2: return actual ia prefix */
986130aebbaSAlexander V. Chernikov *prefix = ia->ia_addr.sin_addr;
987130aebbaSAlexander V. Chernikov *mask = ia->ia_sockmask.sin_addr;
988130aebbaSAlexander V. Chernikov prefix->s_addr &= mask->s_addr;
989130aebbaSAlexander V. Chernikov }
990130aebbaSAlexander V. Chernikov }
991130aebbaSAlexander V. Chernikov
992130aebbaSAlexander V. Chernikov /*
993130aebbaSAlexander V. Chernikov * Adds or delete interface "prefix" route corresponding to @ifa.
994130aebbaSAlexander V. Chernikov * Returns 0 on success or errno.
99581728a53SAlexander V. Chernikov */
996b8103ca7SGleb Smirnoff static int
in_handle_ifaddr_route(int cmd,struct in_ifaddr * ia)99781728a53SAlexander V. Chernikov in_handle_ifaddr_route(int cmd, struct in_ifaddr *ia)
99881728a53SAlexander V. Chernikov {
99981728a53SAlexander V. Chernikov struct ifaddr *ifa = &ia->ia_ifa;
100081728a53SAlexander V. Chernikov struct in_addr daddr, maddr;
10017b3440fcSAlexander V. Chernikov struct sockaddr_in *pmask;
100281728a53SAlexander V. Chernikov struct epoch_tracker et;
100381728a53SAlexander V. Chernikov int error;
100481728a53SAlexander V. Chernikov
1005130aebbaSAlexander V. Chernikov ia_getrtprefix(ia, &daddr, &maddr);
100681728a53SAlexander V. Chernikov
10077b3440fcSAlexander V. Chernikov struct sockaddr_in mask = {
10087b3440fcSAlexander V. Chernikov .sin_family = AF_INET,
10097b3440fcSAlexander V. Chernikov .sin_len = sizeof(struct sockaddr_in),
10107b3440fcSAlexander V. Chernikov .sin_addr = maddr,
10117b3440fcSAlexander V. Chernikov };
10127b3440fcSAlexander V. Chernikov
10137b3440fcSAlexander V. Chernikov pmask = (maddr.s_addr != INADDR_BROADCAST) ? &mask : NULL;
101481728a53SAlexander V. Chernikov
101581728a53SAlexander V. Chernikov struct sockaddr_in dst = {
101681728a53SAlexander V. Chernikov .sin_family = AF_INET,
101781728a53SAlexander V. Chernikov .sin_len = sizeof(struct sockaddr_in),
101881728a53SAlexander V. Chernikov .sin_addr.s_addr = daddr.s_addr & maddr.s_addr,
101981728a53SAlexander V. Chernikov };
102081728a53SAlexander V. Chernikov
1021130aebbaSAlexander V. Chernikov struct ifnet *ifp = ia->ia_ifp;
1022130aebbaSAlexander V. Chernikov
1023130aebbaSAlexander V. Chernikov if ((maddr.s_addr == INADDR_BROADCAST) &&
1024130aebbaSAlexander V. Chernikov (!(ia->ia_ifp->if_flags & (IFF_POINTOPOINT|IFF_LOOPBACK)))) {
1025130aebbaSAlexander V. Chernikov /* Case 2: host route on broadcast interface */
1026130aebbaSAlexander V. Chernikov ifp = V_loif;
1027130aebbaSAlexander V. Chernikov }
1028130aebbaSAlexander V. Chernikov
102981728a53SAlexander V. Chernikov uint32_t fibnum = ifa->ifa_ifp->if_fib;
103081728a53SAlexander V. Chernikov NET_EPOCH_ENTER(et);
10317b3440fcSAlexander V. Chernikov error = in_handle_prefix_route(fibnum, cmd, &dst, pmask, ifa, ifp);
103281728a53SAlexander V. Chernikov NET_EPOCH_EXIT(et);
103381728a53SAlexander V. Chernikov
103481728a53SAlexander V. Chernikov return (error);
103581728a53SAlexander V. Chernikov }
103681728a53SAlexander V. Chernikov
1037ccbb9c35SQing Li /*
1038d68cf57bSAlexander V. Chernikov * Check if we have a route for the given prefix already.
103948321abeSMax Laier */
1040d68cf57bSAlexander V. Chernikov static bool
in_hasrtprefix(struct in_ifaddr * target)1041130aebbaSAlexander V. Chernikov in_hasrtprefix(struct in_ifaddr *target)
104248321abeSMax Laier {
10432144431cSGleb Smirnoff struct epoch_tracker et;
104448321abeSMax Laier struct in_ifaddr *ia;
1045bfb26eecSGleb Smirnoff struct in_addr prefix, mask, p, m;
1046d68cf57bSAlexander V. Chernikov bool result = false;
104748321abeSMax Laier
1048130aebbaSAlexander V. Chernikov ia_getrtprefix(target, &prefix, &mask);
104948321abeSMax Laier
10500cfee0c2SAlan Somers /* Look for an existing address with the same prefix, mask, and fib */
10512144431cSGleb Smirnoff NET_EPOCH_ENTER(et);
1052d7c5a620SMatt Macy CK_STAILQ_FOREACH(ia, &V_in_ifaddrhead, ia_link) {
1053130aebbaSAlexander V. Chernikov ia_getrtprefix(ia, &p, &m);
1054bfb26eecSGleb Smirnoff
1055bfb26eecSGleb Smirnoff if (prefix.s_addr != p.s_addr ||
1056bfb26eecSGleb Smirnoff mask.s_addr != m.s_addr)
1057bfb26eecSGleb Smirnoff continue;
1058130aebbaSAlexander V. Chernikov
10590cfee0c2SAlan Somers if (target->ia_ifp->if_fib != ia->ia_ifp->if_fib)
10600cfee0c2SAlan Somers continue;
106148321abeSMax Laier
106248321abeSMax Laier /*
106348321abeSMax Laier * If we got a matching prefix route inserted by other
106448321abeSMax Laier * interface address, we are done here.
106548321abeSMax Laier */
10661ae95409SGleb Smirnoff if (ia->ia_flags & IFA_ROUTE) {
1067d68cf57bSAlexander V. Chernikov result = true;
1068d68cf57bSAlexander V. Chernikov break;
1069d68cf57bSAlexander V. Chernikov }
1070d68cf57bSAlexander V. Chernikov }
10712144431cSGleb Smirnoff NET_EPOCH_EXIT(et);
10720cfee0c2SAlan Somers
1073d68cf57bSAlexander V. Chernikov return (result);
1074d68cf57bSAlexander V. Chernikov }
1075d68cf57bSAlexander V. Chernikov
1076d68cf57bSAlexander V. Chernikov int
in_addprefix(struct in_ifaddr * target)1077130aebbaSAlexander V. Chernikov in_addprefix(struct in_ifaddr *target)
1078d68cf57bSAlexander V. Chernikov {
1079d68cf57bSAlexander V. Chernikov int error;
1080d68cf57bSAlexander V. Chernikov
1081130aebbaSAlexander V. Chernikov if (in_hasrtprefix(target)) {
1082d68cf57bSAlexander V. Chernikov if (V_nosameprefix)
1083d68cf57bSAlexander V. Chernikov return (EEXIST);
1084d68cf57bSAlexander V. Chernikov else {
1085d68cf57bSAlexander V. Chernikov rt_addrmsg(RTM_ADD, &target->ia_ifa,
1086d68cf57bSAlexander V. Chernikov target->ia_ifp->if_fib);
10871ae95409SGleb Smirnoff return (0);
10881ae95409SGleb Smirnoff }
108948321abeSMax Laier }
109048321abeSMax Laier
109148321abeSMax Laier /*
109248321abeSMax Laier * No-one seem to have this prefix route, so we try to insert it.
109348321abeSMax Laier */
109481728a53SAlexander V. Chernikov rt_addrmsg(RTM_ADD, &target->ia_ifa, target->ia_ifp->if_fib);
109581728a53SAlexander V. Chernikov error = in_handle_ifaddr_route(RTM_ADD, target);
109648321abeSMax Laier if (!error)
109748321abeSMax Laier target->ia_flags |= IFA_ROUTE;
1098460473a0SBjoern A. Zeeb return (error);
109948321abeSMax Laier }
110048321abeSMax Laier
110148321abeSMax Laier /*
11023e7a2321SAlexander V. Chernikov * Removes either all lle entries for given @ia, or lle
11033e7a2321SAlexander V. Chernikov * corresponding to @ia address.
11043e7a2321SAlexander V. Chernikov */
11053e7a2321SAlexander V. Chernikov static void
in_scrubprefixlle(struct in_ifaddr * ia,int all,u_int flags)11063e7a2321SAlexander V. Chernikov in_scrubprefixlle(struct in_ifaddr *ia, int all, u_int flags)
11073e7a2321SAlexander V. Chernikov {
11083e7a2321SAlexander V. Chernikov struct sockaddr_in addr, mask;
11093e7a2321SAlexander V. Chernikov struct sockaddr *saddr, *smask;
11103e7a2321SAlexander V. Chernikov struct ifnet *ifp;
11113e7a2321SAlexander V. Chernikov
11123e7a2321SAlexander V. Chernikov saddr = (struct sockaddr *)&addr;
11133e7a2321SAlexander V. Chernikov bzero(&addr, sizeof(addr));
11143e7a2321SAlexander V. Chernikov addr.sin_len = sizeof(addr);
11153e7a2321SAlexander V. Chernikov addr.sin_family = AF_INET;
11163e7a2321SAlexander V. Chernikov smask = (struct sockaddr *)&mask;
11173e7a2321SAlexander V. Chernikov bzero(&mask, sizeof(mask));
11183e7a2321SAlexander V. Chernikov mask.sin_len = sizeof(mask);
11193e7a2321SAlexander V. Chernikov mask.sin_family = AF_INET;
11203e7a2321SAlexander V. Chernikov mask.sin_addr.s_addr = ia->ia_subnetmask;
11213e7a2321SAlexander V. Chernikov ifp = ia->ia_ifp;
11223e7a2321SAlexander V. Chernikov
112326a60575SAlexander V. Chernikov if (all) {
112426a60575SAlexander V. Chernikov /*
112526a60575SAlexander V. Chernikov * Remove all L2 entries matching given prefix.
112626a60575SAlexander V. Chernikov * Convert address to host representation to avoid
112726a60575SAlexander V. Chernikov * doing this on every callback. ia_subnetmask is already
112826a60575SAlexander V. Chernikov * stored in host representation.
112926a60575SAlexander V. Chernikov */
113026a60575SAlexander V. Chernikov addr.sin_addr.s_addr = ntohl(ia->ia_addr.sin_addr.s_addr);
11313e7a2321SAlexander V. Chernikov lltable_prefix_free(AF_INET, saddr, smask, flags);
113226a60575SAlexander V. Chernikov } else {
113326a60575SAlexander V. Chernikov /* Remove interface address only */
113426a60575SAlexander V. Chernikov addr.sin_addr.s_addr = ia->ia_addr.sin_addr.s_addr;
11353e7a2321SAlexander V. Chernikov lltable_delete_addr(LLTABLE(ifp), LLE_IFADDR, saddr);
11363e7a2321SAlexander V. Chernikov }
113726a60575SAlexander V. Chernikov }
11383e7a2321SAlexander V. Chernikov
11393e7a2321SAlexander V. Chernikov /*
114048321abeSMax Laier * If there is no other address in the system that can serve a route to the
114148321abeSMax Laier * same prefix, remove the route. Hand over the route to the new address
114248321abeSMax Laier * otherwise.
114348321abeSMax Laier */
114408b68b0eSGleb Smirnoff int
in_scrubprefix(struct in_ifaddr * target,u_int flags)11455b84dc78SQing Li in_scrubprefix(struct in_ifaddr *target, u_int flags)
114648321abeSMax Laier {
11472144431cSGleb Smirnoff struct epoch_tracker et;
114848321abeSMax Laier struct in_ifaddr *ia;
114955174c34SGleb Smirnoff struct in_addr prefix, mask, p, m;
11507278b62aSAlan Somers int error = 0;
115148321abeSMax Laier
1152df813b7eSQing Li /*
1153df813b7eSQing Li * Remove the loopback route to the interface address.
1154df813b7eSQing Li */
1155130aebbaSAlexander V. Chernikov if (ia_need_loopback_route(target) && (flags & LLE_STATIC)) {
1156f7a39160SGleb Smirnoff struct in_ifaddr *eia;
1157c7ab6602SQing Li
1158f7a39160SGleb Smirnoff eia = in_localip_more(target);
1159f7a39160SGleb Smirnoff
1160f7a39160SGleb Smirnoff if (eia != NULL) {
1161f7a39160SGleb Smirnoff error = ifa_switch_loopback_route((struct ifaddr *)eia,
116259c180c3SAlexander V. Chernikov (struct sockaddr *)&target->ia_addr);
1163f7a39160SGleb Smirnoff ifa_free(&eia->ia_ifa);
1164f7a39160SGleb Smirnoff } else {
11659bb7d0f4SQing Li error = ifa_del_loopback_route((struct ifaddr *)target,
11669bb7d0f4SQing Li (struct sockaddr *)&target->ia_addr);
11675b84dc78SQing Li }
1168ebc90701SQing Li }
1169ebc90701SQing Li
1170130aebbaSAlexander V. Chernikov ia_getrtprefix(target, &prefix, &mask);
117148321abeSMax Laier
1172ccbb9c35SQing Li if ((target->ia_flags & IFA_ROUTE) == 0) {
1173d68cf57bSAlexander V. Chernikov rt_addrmsg(RTM_DELETE, &target->ia_ifa, target->ia_ifp->if_fib);
117426a60575SAlexander V. Chernikov
117526a60575SAlexander V. Chernikov /*
117626a60575SAlexander V. Chernikov * Removing address from !IFF_UP interface or
117726a60575SAlexander V. Chernikov * prefix which exists on other interface (along with route).
117826a60575SAlexander V. Chernikov * No entries should exist here except target addr.
117926a60575SAlexander V. Chernikov * Given that, delete this entry only.
118026a60575SAlexander V. Chernikov */
118126a60575SAlexander V. Chernikov in_scrubprefixlle(target, 0, flags);
1182ccbb9c35SQing Li return (0);
1183ccbb9c35SQing Li }
1184ccbb9c35SQing Li
11852144431cSGleb Smirnoff NET_EPOCH_ENTER(et);
1186d7c5a620SMatt Macy CK_STAILQ_FOREACH(ia, &V_in_ifaddrhead, ia_link) {
1187130aebbaSAlexander V. Chernikov ia_getrtprefix(ia, &p, &m);
118855174c34SGleb Smirnoff
118955174c34SGleb Smirnoff if (prefix.s_addr != p.s_addr ||
119055174c34SGleb Smirnoff mask.s_addr != m.s_addr)
119155174c34SGleb Smirnoff continue;
119248321abeSMax Laier
119355174c34SGleb Smirnoff if ((ia->ia_ifp->if_flags & IFF_UP) == 0)
119448321abeSMax Laier continue;
119548321abeSMax Laier
119648321abeSMax Laier /*
119748321abeSMax Laier * If we got a matching prefix address, move IFA_ROUTE and
119848321abeSMax Laier * the route itself to it. Make sure that routing daemons
119948321abeSMax Laier * get a heads-up.
120048321abeSMax Laier */
120108b68b0eSGleb Smirnoff if ((ia->ia_flags & IFA_ROUTE) == 0) {
120279d51435SSergey Kandaurov ifa_ref(&ia->ia_ifa);
12032144431cSGleb Smirnoff NET_EPOCH_EXIT(et);
120481728a53SAlexander V. Chernikov error = in_handle_ifaddr_route(RTM_DELETE, target);
120592322284SQing Li if (error == 0)
120648321abeSMax Laier target->ia_flags &= ~IFA_ROUTE;
120792322284SQing Li else
120892322284SQing Li log(LOG_INFO, "in_scrubprefix: err=%d, old prefix delete failed\n",
120992322284SQing Li error);
12103e7a2321SAlexander V. Chernikov /* Scrub all entries IFF interface is different */
12113e7a2321SAlexander V. Chernikov in_scrubprefixlle(target, target->ia_ifp != ia->ia_ifp,
12123e7a2321SAlexander V. Chernikov flags);
121381728a53SAlexander V. Chernikov error = in_handle_ifaddr_route(RTM_ADD, ia);
121448321abeSMax Laier if (error == 0)
121548321abeSMax Laier ia->ia_flags |= IFA_ROUTE;
121692322284SQing Li else
121792322284SQing Li log(LOG_INFO, "in_scrubprefix: err=%d, new prefix add failed\n",
121892322284SQing Li error);
121979d51435SSergey Kandaurov ifa_free(&ia->ia_ifa);
1220460473a0SBjoern A. Zeeb return (error);
122148321abeSMax Laier }
122248321abeSMax Laier }
12232144431cSGleb Smirnoff NET_EPOCH_EXIT(et);
122448321abeSMax Laier
122548321abeSMax Laier /*
1226c9d763bfSQing Li * remove all L2 entries on the given prefix
1227c9d763bfSQing Li */
12283e7a2321SAlexander V. Chernikov in_scrubprefixlle(target, 1, flags);
1229c9d763bfSQing Li
1230c9d763bfSQing Li /*
123148321abeSMax Laier * As no-one seem to have this prefix, we can remove the route.
123248321abeSMax Laier */
123381728a53SAlexander V. Chernikov rt_addrmsg(RTM_DELETE, &target->ia_ifa, target->ia_ifp->if_fib);
123481728a53SAlexander V. Chernikov error = in_handle_ifaddr_route(RTM_DELETE, target);
123592322284SQing Li if (error == 0)
123648321abeSMax Laier target->ia_flags &= ~IFA_ROUTE;
123792322284SQing Li else
123892322284SQing Li log(LOG_INFO, "in_scrubprefix: err=%d, prefix delete failed\n", error);
123992322284SQing Li return (error);
124048321abeSMax Laier }
124148321abeSMax Laier
124289856f7eSBjoern A. Zeeb void
in_ifscrub_all(void)124389856f7eSBjoern A. Zeeb in_ifscrub_all(void)
124489856f7eSBjoern A. Zeeb {
124589856f7eSBjoern A. Zeeb struct ifnet *ifp;
124689856f7eSBjoern A. Zeeb struct ifaddr *ifa, *nifa;
1247bc06c514SKonrad Witaszczyk struct ifreq ifr;
124889856f7eSBjoern A. Zeeb
124989856f7eSBjoern A. Zeeb IFNET_RLOCK();
12504f6c66ccSMatt Macy CK_STAILQ_FOREACH(ifp, &V_ifnet, if_link) {
125189856f7eSBjoern A. Zeeb /* Cannot lock here - lock recursion. */
1252a68cc388SGleb Smirnoff /* NET_EPOCH_ENTER(et); */
1253d7c5a620SMatt Macy CK_STAILQ_FOREACH_SAFE(ifa, &ifp->if_addrhead, ifa_link, nifa) {
125489856f7eSBjoern A. Zeeb if (ifa->ifa_addr->sa_family != AF_INET)
125589856f7eSBjoern A. Zeeb continue;
125689856f7eSBjoern A. Zeeb
125789856f7eSBjoern A. Zeeb /*
125889856f7eSBjoern A. Zeeb * This is ugly but the only way for legacy IP to
125989856f7eSBjoern A. Zeeb * cleanly remove addresses and everything attached.
126089856f7eSBjoern A. Zeeb */
126189856f7eSBjoern A. Zeeb bzero(&ifr, sizeof(ifr));
1262bc06c514SKonrad Witaszczyk ifr.ifr_addr = *ifa->ifa_addr;
126389856f7eSBjoern A. Zeeb (void)in_control(NULL, SIOCDIFADDR, (caddr_t)&ifr,
126489856f7eSBjoern A. Zeeb ifp, NULL);
126589856f7eSBjoern A. Zeeb }
1266a68cc388SGleb Smirnoff /* NET_EPOCH_EXIT(et); */
126789856f7eSBjoern A. Zeeb in_purgemaddrs(ifp);
126889856f7eSBjoern A. Zeeb igmp_domifdetach(ifp);
126989856f7eSBjoern A. Zeeb }
127089856f7eSBjoern A. Zeeb IFNET_RUNLOCK();
127189856f7eSBjoern A. Zeeb }
127289856f7eSBjoern A. Zeeb
1273dc9db1f6SGleb Smirnoff bool
in_ifaddr_broadcast(struct in_addr in,struct in_ifaddr * ia)127490cc51a1SRyan Stone in_ifaddr_broadcast(struct in_addr in, struct in_ifaddr *ia)
127590cc51a1SRyan Stone {
127690cc51a1SRyan Stone
127790cc51a1SRyan Stone return ((in.s_addr == ia->ia_broadaddr.sin_addr.s_addr ||
127890cc51a1SRyan Stone /*
1279fd076593SMike Karels * Optionally check for old-style (host 0) broadcast, but
128090cc51a1SRyan Stone * taking into account that RFC 3021 obsoletes it.
128190cc51a1SRyan Stone */
1282dc9db1f6SGleb Smirnoff __predict_false(V_broadcast_lowest &&
1283dc9db1f6SGleb Smirnoff ia->ia_subnetmask != IN_RFC3021_MASK &&
128490cc51a1SRyan Stone ntohl(in.s_addr) == ia->ia_subnet)) &&
128590cc51a1SRyan Stone /*
128690cc51a1SRyan Stone * Check for an all one subnetmask. These
128790cc51a1SRyan Stone * only exist when an interface gets a secondary
128890cc51a1SRyan Stone * address.
128990cc51a1SRyan Stone */
129090cc51a1SRyan Stone ia->ia_subnetmask != (u_long)0xffffffff);
129190cc51a1SRyan Stone }
129290cc51a1SRyan Stone
1293df8bae1dSRodney W. Grimes /*
1294dc9db1f6SGleb Smirnoff * Return true if the address might be a local broadcast address.
1295df8bae1dSRodney W. Grimes */
1296dc9db1f6SGleb Smirnoff bool
in_ifnet_broadcast(struct in_addr in,struct ifnet * ifp)1297197fc4caSGleb Smirnoff in_ifnet_broadcast(struct in_addr in, struct ifnet *ifp)
1298df8bae1dSRodney W. Grimes {
12993e85b721SEd Maste struct ifaddr *ifa;
1300df8bae1dSRodney W. Grimes
1301b8a6e03fSGleb Smirnoff NET_EPOCH_ASSERT();
1302b8a6e03fSGleb Smirnoff
1303532106f7SGleb Smirnoff if (in_broadcast(in))
1304dc9db1f6SGleb Smirnoff return (true);
1305df8bae1dSRodney W. Grimes if ((ifp->if_flags & IFF_BROADCAST) == 0)
1306dc9db1f6SGleb Smirnoff return (false);
1307df8bae1dSRodney W. Grimes /*
1308df8bae1dSRodney W. Grimes * Look through the list of addresses for a match
1309df8bae1dSRodney W. Grimes * with a broadcast address.
1310df8bae1dSRodney W. Grimes */
1311d7c5a620SMatt Macy CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link)
1312df8bae1dSRodney W. Grimes if (ifa->ifa_addr->sa_family == AF_INET &&
1313dc9db1f6SGleb Smirnoff in_ifaddr_broadcast(in, (struct in_ifaddr *)ifa))
1314dc9db1f6SGleb Smirnoff return (true);
1315dc9db1f6SGleb Smirnoff return (false);
1316df8bae1dSRodney W. Grimes }
1317ec002feeSBruce M Simpson
1318df8bae1dSRodney W. Grimes /*
1319b1c53bc9SRobert Watson * On interface removal, clean up IPv4 data structures hung off of the ifnet.
1320b1c53bc9SRobert Watson */
1321b1c53bc9SRobert Watson void
in_ifdetach(struct ifnet * ifp)1322f2565d68SRobert Watson in_ifdetach(struct ifnet *ifp)
1323b1c53bc9SRobert Watson {
1324f3e1324bSStephen Hurd IN_MULTI_LOCK();
1325603724d3SBjoern A. Zeeb in_pcbpurgeif0(&V_ripcbinfo, ifp);
1326603724d3SBjoern A. Zeeb in_pcbpurgeif0(&V_udbinfo, ifp);
1327e06e816fSKevin Lo in_pcbpurgeif0(&V_ulitecbinfo, ifp);
1328ec002feeSBruce M Simpson in_purgemaddrs(ifp);
1329f3e1324bSStephen Hurd IN_MULTI_UNLOCK();
13303689652cSHans Petter Selasky
13313689652cSHans Petter Selasky /*
13323689652cSHans Petter Selasky * Make sure all multicast deletions invoking if_ioctl() are
13333689652cSHans Petter Selasky * completed before returning. Else we risk accessing a freed
13343689652cSHans Petter Selasky * ifnet structure pointer.
13353689652cSHans Petter Selasky */
13363689652cSHans Petter Selasky inm_release_wait(NULL);
1337b1c53bc9SRobert Watson }
13386e6b3f7cSQing Li
1339b8103ca7SGleb Smirnoff static void
in_ifnet_event(void * arg __unused,struct ifnet * ifp,int event)1340b8103ca7SGleb Smirnoff in_ifnet_event(void *arg __unused, struct ifnet *ifp, int event)
1341b8103ca7SGleb Smirnoff {
1342b8103ca7SGleb Smirnoff struct epoch_tracker et;
1343b8103ca7SGleb Smirnoff struct ifaddr *ifa;
1344b8103ca7SGleb Smirnoff struct in_ifaddr *ia;
1345b8103ca7SGleb Smirnoff int error;
1346b8103ca7SGleb Smirnoff
1347b8103ca7SGleb Smirnoff NET_EPOCH_ENTER(et);
1348b8103ca7SGleb Smirnoff switch (event) {
1349b8103ca7SGleb Smirnoff case IFNET_EVENT_DOWN:
1350b8103ca7SGleb Smirnoff CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
1351b8103ca7SGleb Smirnoff if (ifa->ifa_addr->sa_family != AF_INET)
1352b8103ca7SGleb Smirnoff continue;
1353b8103ca7SGleb Smirnoff ia = (struct in_ifaddr *)ifa;
1354b8103ca7SGleb Smirnoff if ((ia->ia_flags & IFA_ROUTE) == 0)
1355b8103ca7SGleb Smirnoff continue;
1356b8103ca7SGleb Smirnoff ifa_ref(ifa);
1357b8103ca7SGleb Smirnoff /*
1358b8103ca7SGleb Smirnoff * in_scrubprefix() kills the interface route.
1359b8103ca7SGleb Smirnoff */
1360b8103ca7SGleb Smirnoff in_scrubprefix(ia, 0);
1361b8103ca7SGleb Smirnoff /*
1362b8103ca7SGleb Smirnoff * in_ifadown gets rid of all the rest of the
1363b8103ca7SGleb Smirnoff * routes. This is not quite the right thing
1364b8103ca7SGleb Smirnoff * to do, but at least if we are running a
1365b8103ca7SGleb Smirnoff * routing process they will come back.
1366b8103ca7SGleb Smirnoff */
1367b8103ca7SGleb Smirnoff in_ifadown(ifa, 0);
1368b8103ca7SGleb Smirnoff ifa_free(ifa);
1369b8103ca7SGleb Smirnoff }
1370b8103ca7SGleb Smirnoff break;
1371b8103ca7SGleb Smirnoff
1372b8103ca7SGleb Smirnoff case IFNET_EVENT_UP:
1373b8103ca7SGleb Smirnoff CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
1374b8103ca7SGleb Smirnoff if (ifa->ifa_addr->sa_family != AF_INET)
1375b8103ca7SGleb Smirnoff continue;
1376b8103ca7SGleb Smirnoff ia = (struct in_ifaddr *)ifa;
1377b8103ca7SGleb Smirnoff if (ia->ia_flags & IFA_ROUTE)
1378b8103ca7SGleb Smirnoff continue;
1379b8103ca7SGleb Smirnoff ifa_ref(ifa);
1380b8103ca7SGleb Smirnoff error = ifa_del_loopback_route(ifa, ifa->ifa_addr);
1381b8103ca7SGleb Smirnoff rt_addrmsg(RTM_ADD, ifa, ifa->ifa_ifp->if_fib);
1382b8103ca7SGleb Smirnoff error = in_handle_ifaddr_route(RTM_ADD, ia);
1383b8103ca7SGleb Smirnoff if (error == 0)
1384b8103ca7SGleb Smirnoff ia->ia_flags |= IFA_ROUTE;
1385b8103ca7SGleb Smirnoff error = ifa_add_loopback_route(ifa, ifa->ifa_addr);
1386b8103ca7SGleb Smirnoff ifa_free(ifa);
1387b8103ca7SGleb Smirnoff }
1388b8103ca7SGleb Smirnoff break;
1389b8103ca7SGleb Smirnoff }
1390b8103ca7SGleb Smirnoff NET_EPOCH_EXIT(et);
1391b8103ca7SGleb Smirnoff }
1392b8103ca7SGleb Smirnoff EVENTHANDLER_DEFINE(ifnet_event, in_ifnet_event, NULL, EVENTHANDLER_PRI_ANY);
1393b8103ca7SGleb Smirnoff
1394d10910e6SBruce M Simpson /*
1395d10910e6SBruce M Simpson * Delete all IPv4 multicast address records, and associated link-layer
1396d10910e6SBruce M Simpson * multicast address records, associated with ifp.
1397d10910e6SBruce M Simpson * XXX It looks like domifdetach runs AFTER the link layer cleanup.
139856663a40SBruce M Simpson * XXX This should not race with ifma_protospec being set during
139956663a40SBruce M Simpson * a new allocation, if it does, we have bigger problems.
1400d10910e6SBruce M Simpson */
1401d10910e6SBruce M Simpson static void
in_purgemaddrs(struct ifnet * ifp)1402d10910e6SBruce M Simpson in_purgemaddrs(struct ifnet *ifp)
1403d10910e6SBruce M Simpson {
14041e9482f4SAlexander Motin struct epoch_tracker et;
1405f3e1324bSStephen Hurd struct in_multi_head purgeinms;
1406f3e1324bSStephen Hurd struct in_multi *inm;
14071e9482f4SAlexander Motin struct ifmultiaddr *ifma;
1408d10910e6SBruce M Simpson
1409f3e1324bSStephen Hurd SLIST_INIT(&purgeinms);
1410f3e1324bSStephen Hurd IN_MULTI_LIST_LOCK();
1411d10910e6SBruce M Simpson
1412d10910e6SBruce M Simpson /*
1413d10910e6SBruce M Simpson * Extract list of in_multi associated with the detaching ifp
1414d10910e6SBruce M Simpson * which the PF_INET layer is about to release.
1415d10910e6SBruce M Simpson * We need to do this as IF_ADDR_LOCK() may be re-acquired
1416d10910e6SBruce M Simpson * by code further down.
1417d10910e6SBruce M Simpson */
1418b6f6f880SMatt Macy IF_ADDR_WLOCK(ifp);
14191e9482f4SAlexander Motin NET_EPOCH_ENTER(et);
14201e9482f4SAlexander Motin CK_STAILQ_FOREACH(ifma, &ifp->if_multiaddrs, ifma_link) {
14211e9482f4SAlexander Motin inm = inm_ifmultiaddr_get_inm(ifma);
14221e9482f4SAlexander Motin if (inm == NULL)
1423d10910e6SBruce M Simpson continue;
1424f3e1324bSStephen Hurd inm_rele_locked(&purgeinms, inm);
1425d10910e6SBruce M Simpson }
14261e9482f4SAlexander Motin NET_EPOCH_EXIT(et);
1427b6f6f880SMatt Macy IF_ADDR_WUNLOCK(ifp);
1428d10910e6SBruce M Simpson
1429f3e1324bSStephen Hurd inm_release_list_deferred(&purgeinms);
1430d10910e6SBruce M Simpson igmp_ifdetach(ifp);
1431f3e1324bSStephen Hurd IN_MULTI_LIST_UNLOCK();
1432d10910e6SBruce M Simpson }
1433d10910e6SBruce M Simpson
14346e6b3f7cSQing Li struct in_llentry {
14356e6b3f7cSQing Li struct llentry base;
14366e6b3f7cSQing Li };
14376e6b3f7cSQing Li
143811cdad98SAlexander V. Chernikov #define IN_LLTBL_DEFAULT_HSIZE 32
143911cdad98SAlexander V. Chernikov #define IN_LLTBL_HASH(k, h) \
144011cdad98SAlexander V. Chernikov (((((((k >> 8) ^ k) >> 8) ^ k) >> 8) ^ k) & ((h) - 1))
144111cdad98SAlexander V. Chernikov
1442a93cda78SKip Macy /*
144311cdad98SAlexander V. Chernikov * Do actual deallocation of @lle.
14442769d062SConrad Meyer */
14452769d062SConrad Meyer static void
in_lltable_destroy_lle_unlocked(epoch_context_t ctx)14464f6c66ccSMatt Macy in_lltable_destroy_lle_unlocked(epoch_context_t ctx)
14472769d062SConrad Meyer {
14484f6c66ccSMatt Macy struct llentry *lle;
14492769d062SConrad Meyer
14504f6c66ccSMatt Macy lle = __containerof(ctx, struct llentry, lle_epoch_ctx);
14512769d062SConrad Meyer LLE_LOCK_DESTROY(lle);
14522769d062SConrad Meyer LLE_REQ_DESTROY(lle);
14532769d062SConrad Meyer free(lle, M_LLTABLE);
14542769d062SConrad Meyer }
14552769d062SConrad Meyer
14562769d062SConrad Meyer /*
145711cdad98SAlexander V. Chernikov * Called by LLE_FREE_LOCKED when number of references
145811cdad98SAlexander V. Chernikov * drops to zero.
1459a93cda78SKip Macy */
1460a93cda78SKip Macy static void
in_lltable_destroy_lle(struct llentry * lle)146111cdad98SAlexander V. Chernikov in_lltable_destroy_lle(struct llentry *lle)
1462a93cda78SKip Macy {
146311cdad98SAlexander V. Chernikov
1464a93cda78SKip Macy LLE_WUNLOCK(lle);
14652a4bd982SGleb Smirnoff NET_EPOCH_CALL(in_lltable_destroy_lle_unlocked, &lle->lle_epoch_ctx);
1466a93cda78SKip Macy }
1467a93cda78SKip Macy
14686e6b3f7cSQing Li static struct llentry *
in_lltable_new(struct in_addr addr4,u_int flags)1469314294deSAlexander V. Chernikov in_lltable_new(struct in_addr addr4, u_int flags)
14706e6b3f7cSQing Li {
14716e6b3f7cSQing Li struct in_llentry *lle;
14726e6b3f7cSQing Li
147390b357f6SGleb Smirnoff lle = malloc(sizeof(struct in_llentry), M_LLTABLE, M_NOWAIT | M_ZERO);
14746e6b3f7cSQing Li if (lle == NULL) /* NB: caller generates msg */
14756e6b3f7cSQing Li return NULL;
14766e6b3f7cSQing Li
14776e6b3f7cSQing Li /*
14786e6b3f7cSQing Li * For IPv4 this will trigger "arpresolve" to generate
14796e6b3f7cSQing Li * an ARP request.
14806e6b3f7cSQing Li */
1481a98c06f1SGleb Smirnoff lle->base.la_expire = time_uptime; /* mark expired */
1482314294deSAlexander V. Chernikov lle->base.r_l3addr.addr4 = addr4;
14836e6b3f7cSQing Li lle->base.lle_refcnt = 1;
148411cdad98SAlexander V. Chernikov lle->base.lle_free = in_lltable_destroy_lle;
14856e6b3f7cSQing Li LLE_LOCK_INIT(&lle->base);
1486f8aee88fSAlexander V. Chernikov LLE_REQ_INIT(&lle->base);
14870447c136SAlexander V. Chernikov callout_init(&lle->base.lle_timer, 1);
1488ea537929SGleb Smirnoff
1489ea537929SGleb Smirnoff return (&lle->base);
14906e6b3f7cSQing Li }
14916e6b3f7cSQing Li
149211cdad98SAlexander V. Chernikov static int
in_lltable_match_prefix(const struct sockaddr * saddr,const struct sockaddr * smask,u_int flags,struct llentry * lle)14933e7a2321SAlexander V. Chernikov in_lltable_match_prefix(const struct sockaddr *saddr,
14943e7a2321SAlexander V. Chernikov const struct sockaddr *smask, u_int flags, struct llentry *lle)
1495c9d763bfSQing Li {
14963e7a2321SAlexander V. Chernikov struct in_addr addr, mask, lle_addr;
14973e7a2321SAlexander V. Chernikov
14983e7a2321SAlexander V. Chernikov addr = ((const struct sockaddr_in *)saddr)->sin_addr;
14993e7a2321SAlexander V. Chernikov mask = ((const struct sockaddr_in *)smask)->sin_addr;
15003e7a2321SAlexander V. Chernikov lle_addr.s_addr = ntohl(lle->r_l3addr.addr4.s_addr);
15013e7a2321SAlexander V. Chernikov
15023e7a2321SAlexander V. Chernikov if (IN_ARE_MASKED_ADDR_EQUAL(lle_addr, addr, mask) == 0)
15033e7a2321SAlexander V. Chernikov return (0);
15043e7a2321SAlexander V. Chernikov
15053e7a2321SAlexander V. Chernikov if (lle->la_flags & LLE_IFADDR) {
15065b84dc78SQing Li /*
15073e7a2321SAlexander V. Chernikov * Delete LLE_IFADDR records IFF address & flag matches.
15083e7a2321SAlexander V. Chernikov * Note that addr is the interface address within prefix
15093e7a2321SAlexander V. Chernikov * being matched.
15103e7a2321SAlexander V. Chernikov * Note also we should handle 'ifdown' cases without removing
15113e7a2321SAlexander V. Chernikov * ifaddr macs.
15125b84dc78SQing Li */
15133e7a2321SAlexander V. Chernikov if (addr.s_addr == lle_addr.s_addr && (flags & LLE_STATIC) != 0)
15143e7a2321SAlexander V. Chernikov return (1);
15153e7a2321SAlexander V. Chernikov return (0);
15163e7a2321SAlexander V. Chernikov }
15173e7a2321SAlexander V. Chernikov
15183e7a2321SAlexander V. Chernikov /* flags & LLE_STATIC means deleting both dynamic and static entries */
15193e7a2321SAlexander V. Chernikov if ((flags & LLE_STATIC) || !(lle->la_flags & LLE_STATIC))
152011cdad98SAlexander V. Chernikov return (1);
152111cdad98SAlexander V. Chernikov
152211cdad98SAlexander V. Chernikov return (0);
152311cdad98SAlexander V. Chernikov }
152411cdad98SAlexander V. Chernikov
152511cdad98SAlexander V. Chernikov static void
in_lltable_free_entry(struct lltable * llt,struct llentry * lle)152611cdad98SAlexander V. Chernikov in_lltable_free_entry(struct lltable *llt, struct llentry *lle)
152711cdad98SAlexander V. Chernikov {
152811cdad98SAlexander V. Chernikov size_t pkts_dropped;
152911cdad98SAlexander V. Chernikov
153011cdad98SAlexander V. Chernikov LLE_WLOCK_ASSERT(lle);
153111cdad98SAlexander V. Chernikov KASSERT(llt != NULL, ("lltable is NULL"));
153211cdad98SAlexander V. Chernikov
153311cdad98SAlexander V. Chernikov /* Unlink entry from table if not already */
153411cdad98SAlexander V. Chernikov if ((lle->la_flags & LLE_LINKED) != 0) {
1535f6960e20SMatt Macy IF_AFDATA_WLOCK_ASSERT(llt->llt_ifp);
153611cdad98SAlexander V. Chernikov lltable_unlink_entry(llt, lle);
153711cdad98SAlexander V. Chernikov }
153811cdad98SAlexander V. Chernikov
153911cdad98SAlexander V. Chernikov /* Drop hold queue */
1540e162ea60SGeorge V. Neville-Neil pkts_dropped = llentry_free(lle);
1541e162ea60SGeorge V. Neville-Neil ARPSTAT_ADD(dropped, pkts_dropped);
1542c9d763bfSQing Li }
1543c9d763bfSQing Li
15446e6b3f7cSQing Li static int
in_lltable_rtcheck(struct ifnet * ifp,u_int flags,const struct sockaddr * l3addr)1545c7ab6602SQing Li in_lltable_rtcheck(struct ifnet *ifp, u_int flags, const struct sockaddr *l3addr)
15466e6b3f7cSQing Li {
1547936f4a42SAlexander V. Chernikov struct nhop_object *nh;
1548936f4a42SAlexander V. Chernikov struct in_addr addr;
15496e6b3f7cSQing Li
15506e6b3f7cSQing Li KASSERT(l3addr->sa_family == AF_INET,
15516e6b3f7cSQing Li ("sin_family %d", l3addr->sa_family));
15526e6b3f7cSQing Li
1553936f4a42SAlexander V. Chernikov addr = ((const struct sockaddr_in *)l3addr)->sin_addr;
155413e255faSMarko Zec
1555936f4a42SAlexander V. Chernikov nh = fib4_lookup(ifp->if_fib, addr, 0, NHR_NONE, 0);
1556936f4a42SAlexander V. Chernikov if (nh == NULL)
15576cf8e330SQing Li return (EINVAL);
15586cf8e330SQing Li
155913e255faSMarko Zec /*
156013e255faSMarko Zec * If the gateway for an existing host route matches the target L3
15616cf8e330SQing Li * address, which is a special route inserted by some implementation
15626cf8e330SQing Li * such as MANET, and the interface is of the correct type, then
15636cf8e330SQing Li * allow for ARP to proceed.
156413e255faSMarko Zec */
1565936f4a42SAlexander V. Chernikov if (nh->nh_flags & NHF_GATEWAY) {
1566936f4a42SAlexander V. Chernikov if (!(nh->nh_flags & NHF_HOST) || nh->nh_ifp->if_type != IFT_ETHER ||
1567936f4a42SAlexander V. Chernikov (nh->nh_ifp->if_flags & (IFF_NOARP | IFF_STATICARP)) != 0 ||
1568936f4a42SAlexander V. Chernikov memcmp(nh->gw_sa.sa_data, l3addr->sa_data,
156915d25219SQing Li sizeof(in_addr_t)) != 0) {
1570db92413eSQing Li return (EINVAL);
1571db92413eSQing Li }
157215d25219SQing Li }
1573db92413eSQing Li
1574db92413eSQing Li /*
1575db92413eSQing Li * Make sure that at least the destination address is covered
1576db92413eSQing Li * by the route. This is for handling the case where 2 or more
1577db92413eSQing Li * interfaces have the same prefix. An incoming packet arrives
1578db92413eSQing Li * on one interface and the corresponding outgoing packet leaves
1579db92413eSQing Li * another interface.
1580db92413eSQing Li */
1581936f4a42SAlexander V. Chernikov if ((nh->nh_ifp != ifp) && (nh->nh_flags & NHF_HOST) == 0) {
1582936f4a42SAlexander V. Chernikov struct in_ifaddr *ia = (struct in_ifaddr *)ifaof_ifpforaddr(l3addr, ifp);
1583936f4a42SAlexander V. Chernikov struct in_addr dst_addr, mask_addr;
1584db92413eSQing Li
1585936f4a42SAlexander V. Chernikov if (ia == NULL)
1586936f4a42SAlexander V. Chernikov return (EINVAL);
1587936f4a42SAlexander V. Chernikov
1588b3664a14SQing Li /*
1589936f4a42SAlexander V. Chernikov * ifaof_ifpforaddr() returns _best matching_ IFA.
1590936f4a42SAlexander V. Chernikov * It is possible that ifa prefix does not cover our address.
1591936f4a42SAlexander V. Chernikov * Explicitly verify and fail if that's the case.
1592b3664a14SQing Li */
1593936f4a42SAlexander V. Chernikov dst_addr = IA_SIN(ia)->sin_addr;
1594936f4a42SAlexander V. Chernikov mask_addr.s_addr = htonl(ia->ia_subnetmask);
1595936f4a42SAlexander V. Chernikov
1596936f4a42SAlexander V. Chernikov if (!IN_ARE_MASKED_ADDR_EQUAL(dst_addr, addr, mask_addr))
1597b3664a14SQing Li return (EINVAL);
1598db92413eSQing Li }
1599db92413eSQing Li
160015d25219SQing Li return (0);
16016e6b3f7cSQing Li }
16026e6b3f7cSQing Li
160311cdad98SAlexander V. Chernikov static inline uint32_t
in_lltable_hash_dst(const struct in_addr dst,uint32_t hsize)160411cdad98SAlexander V. Chernikov in_lltable_hash_dst(const struct in_addr dst, uint32_t hsize)
160511cdad98SAlexander V. Chernikov {
160611cdad98SAlexander V. Chernikov
160711cdad98SAlexander V. Chernikov return (IN_LLTBL_HASH(dst.s_addr, hsize));
160811cdad98SAlexander V. Chernikov }
160911cdad98SAlexander V. Chernikov
161011cdad98SAlexander V. Chernikov static uint32_t
in_lltable_hash(const struct llentry * lle,uint32_t hsize)161111cdad98SAlexander V. Chernikov in_lltable_hash(const struct llentry *lle, uint32_t hsize)
161211cdad98SAlexander V. Chernikov {
161311cdad98SAlexander V. Chernikov
1614314294deSAlexander V. Chernikov return (in_lltable_hash_dst(lle->r_l3addr.addr4, hsize));
161511cdad98SAlexander V. Chernikov }
161611cdad98SAlexander V. Chernikov
161711cdad98SAlexander V. Chernikov static void
in_lltable_fill_sa_entry(const struct llentry * lle,struct sockaddr * sa)161811cdad98SAlexander V. Chernikov in_lltable_fill_sa_entry(const struct llentry *lle, struct sockaddr *sa)
161911cdad98SAlexander V. Chernikov {
162011cdad98SAlexander V. Chernikov struct sockaddr_in *sin;
162111cdad98SAlexander V. Chernikov
162211cdad98SAlexander V. Chernikov sin = (struct sockaddr_in *)sa;
162311cdad98SAlexander V. Chernikov bzero(sin, sizeof(*sin));
162411cdad98SAlexander V. Chernikov sin->sin_family = AF_INET;
162511cdad98SAlexander V. Chernikov sin->sin_len = sizeof(*sin);
1626314294deSAlexander V. Chernikov sin->sin_addr = lle->r_l3addr.addr4;
162711cdad98SAlexander V. Chernikov }
162811cdad98SAlexander V. Chernikov
1629b4b1367aSAlexander V. Chernikov static inline struct llentry *
in_lltable_find_dst(struct lltable * llt,struct in_addr dst)1630b4b1367aSAlexander V. Chernikov in_lltable_find_dst(struct lltable *llt, struct in_addr dst)
1631b4b1367aSAlexander V. Chernikov {
1632b4b1367aSAlexander V. Chernikov struct llentry *lle;
1633b4b1367aSAlexander V. Chernikov struct llentries *lleh;
163411cdad98SAlexander V. Chernikov u_int hashidx;
1635b4b1367aSAlexander V. Chernikov
16363a749863SAlexander V. Chernikov hashidx = in_lltable_hash_dst(dst, llt->llt_hsize);
163711cdad98SAlexander V. Chernikov lleh = &llt->lle_head[hashidx];
16384f6c66ccSMatt Macy CK_LIST_FOREACH(lle, lleh, lle_next) {
1639b4b1367aSAlexander V. Chernikov if (lle->la_flags & LLE_DELETED)
1640b4b1367aSAlexander V. Chernikov continue;
1641314294deSAlexander V. Chernikov if (lle->r_l3addr.addr4.s_addr == dst.s_addr)
1642b4b1367aSAlexander V. Chernikov break;
1643b4b1367aSAlexander V. Chernikov }
1644b4b1367aSAlexander V. Chernikov
1645b4b1367aSAlexander V. Chernikov return (lle);
1646b4b1367aSAlexander V. Chernikov }
1647b4b1367aSAlexander V. Chernikov
16483e7a2321SAlexander V. Chernikov static void
in_lltable_delete_entry(struct lltable * llt,struct llentry * lle)16493e7a2321SAlexander V. Chernikov in_lltable_delete_entry(struct lltable *llt, struct llentry *lle)
1650b4b1367aSAlexander V. Chernikov {
1651b4b1367aSAlexander V. Chernikov
1652b4b1367aSAlexander V. Chernikov lle->la_flags |= LLE_DELETED;
1653b4b1367aSAlexander V. Chernikov EVENTHANDLER_INVOKE(lle_event, lle, LLENTRY_DELETED);
1654b4b1367aSAlexander V. Chernikov #ifdef DIAGNOSTIC
1655b4b1367aSAlexander V. Chernikov log(LOG_INFO, "ifaddr cache = %p is deleted\n", lle);
1656b4b1367aSAlexander V. Chernikov #endif
1657b4b1367aSAlexander V. Chernikov llentry_free(lle);
1658b4b1367aSAlexander V. Chernikov }
1659b4b1367aSAlexander V. Chernikov
1660b4b1367aSAlexander V. Chernikov static struct llentry *
in_lltable_alloc(struct lltable * llt,u_int flags,const struct sockaddr * l3addr)16615a255516SAlexander V. Chernikov in_lltable_alloc(struct lltable *llt, u_int flags, const struct sockaddr *l3addr)
1662b4b1367aSAlexander V. Chernikov {
1663b4b1367aSAlexander V. Chernikov const struct sockaddr_in *sin = (const struct sockaddr_in *)l3addr;
1664b4b1367aSAlexander V. Chernikov struct ifnet *ifp = llt->llt_ifp;
1665b4b1367aSAlexander V. Chernikov struct llentry *lle;
16664fb3a820SAlexander V. Chernikov char linkhdr[LLE_MAX_LINKHDR];
16674fb3a820SAlexander V. Chernikov size_t linkhdrsize;
16684fb3a820SAlexander V. Chernikov int lladdr_off;
1669b4b1367aSAlexander V. Chernikov
1670b4b1367aSAlexander V. Chernikov KASSERT(l3addr->sa_family == AF_INET,
1671b4b1367aSAlexander V. Chernikov ("sin_family %d", l3addr->sa_family));
1672b4b1367aSAlexander V. Chernikov
1673b4b1367aSAlexander V. Chernikov /*
1674b4b1367aSAlexander V. Chernikov * A route that covers the given address must have
1675b4b1367aSAlexander V. Chernikov * been installed 1st because we are doing a resolution,
1676b4b1367aSAlexander V. Chernikov * verify this.
1677b4b1367aSAlexander V. Chernikov */
1678b4b1367aSAlexander V. Chernikov if (!(flags & LLE_IFADDR) &&
1679b4b1367aSAlexander V. Chernikov in_lltable_rtcheck(ifp, flags, l3addr) != 0)
1680b4b1367aSAlexander V. Chernikov return (NULL);
1681b4b1367aSAlexander V. Chernikov
1682314294deSAlexander V. Chernikov lle = in_lltable_new(sin->sin_addr, flags);
1683b4b1367aSAlexander V. Chernikov if (lle == NULL) {
1684b4b1367aSAlexander V. Chernikov log(LOG_INFO, "lla_lookup: new lle malloc failed\n");
1685b4b1367aSAlexander V. Chernikov return (NULL);
1686b4b1367aSAlexander V. Chernikov }
1687b4b1367aSAlexander V. Chernikov lle->la_flags = flags;
1688f8aee88fSAlexander V. Chernikov if (flags & LLE_STATIC)
1689f8aee88fSAlexander V. Chernikov lle->r_flags |= RLLE_VALID;
1690b4b1367aSAlexander V. Chernikov if ((flags & LLE_IFADDR) == LLE_IFADDR) {
16914fb3a820SAlexander V. Chernikov linkhdrsize = LLE_MAX_LINKHDR;
16924fb3a820SAlexander V. Chernikov if (lltable_calc_llheader(ifp, AF_INET, IF_LLADDR(ifp),
16932769d062SConrad Meyer linkhdr, &linkhdrsize, &lladdr_off) != 0) {
1694990a6d18SMark Johnston in_lltable_free_entry(llt, lle);
16954fb3a820SAlexander V. Chernikov return (NULL);
16962769d062SConrad Meyer }
16974fb3a820SAlexander V. Chernikov lltable_set_entry_addr(ifp, lle, linkhdr, linkhdrsize,
16984fb3a820SAlexander V. Chernikov lladdr_off);
1699ddd208f7SAlexander V. Chernikov lle->la_flags |= LLE_STATIC;
1700f8aee88fSAlexander V. Chernikov lle->r_flags |= (RLLE_VALID | RLLE_IFADDR);
1701ca185047SAlexander V. Chernikov lle->la_expire = 0;
1702b4b1367aSAlexander V. Chernikov }
1703b4b1367aSAlexander V. Chernikov
1704b4b1367aSAlexander V. Chernikov return (lle);
1705b4b1367aSAlexander V. Chernikov }
1706b4b1367aSAlexander V. Chernikov
17076e6b3f7cSQing Li /*
17086e6b3f7cSQing Li * Return NULL if not found or marked for deletion.
17096e6b3f7cSQing Li * If found return lle read locked.
17106e6b3f7cSQing Li */
17116e6b3f7cSQing Li static struct llentry *
in_lltable_lookup(struct lltable * llt,u_int flags,const struct sockaddr * l3addr)17126e6b3f7cSQing Li in_lltable_lookup(struct lltable *llt, u_int flags, const struct sockaddr *l3addr)
17136e6b3f7cSQing Li {
17146e6b3f7cSQing Li const struct sockaddr_in *sin = (const struct sockaddr_in *)l3addr;
17156e6b3f7cSQing Li struct llentry *lle;
17166e6b3f7cSQing Li
17176e4cd746SMarius Strobl IF_AFDATA_LOCK_ASSERT(llt->llt_ifp);
17186e6b3f7cSQing Li KASSERT(l3addr->sa_family == AF_INET,
17196e6b3f7cSQing Li ("sin_family %d", l3addr->sa_family));
172049cf58e5SMark Johnston KASSERT((flags & (LLE_UNLOCKED | LLE_EXCLUSIVE)) !=
172149cf58e5SMark Johnston (LLE_UNLOCKED | LLE_EXCLUSIVE),
172249cf58e5SMark Johnston ("wrong lle request flags: %#x", flags));
1723b4b1367aSAlexander V. Chernikov
172449cf58e5SMark Johnston lle = in_lltable_find_dst(llt, sin->sin_addr);
1725b4b1367aSAlexander V. Chernikov if (lle == NULL)
17266e6b3f7cSQing Li return (NULL);
1727f8aee88fSAlexander V. Chernikov if (flags & LLE_UNLOCKED)
1728f8aee88fSAlexander V. Chernikov return (lle);
1729f8aee88fSAlexander V. Chernikov
17306e6b3f7cSQing Li if (flags & LLE_EXCLUSIVE)
17316e6b3f7cSQing Li LLE_WLOCK(lle);
17326e6b3f7cSQing Li else
17336e6b3f7cSQing Li LLE_RLOCK(lle);
1734b4b1367aSAlexander V. Chernikov
1735c06cc56eSMark Johnston /*
1736c06cc56eSMark Johnston * If the afdata lock is not held, the LLE may have been unlinked while
1737c06cc56eSMark Johnston * we were blocked on the LLE lock. Check for this case.
1738c06cc56eSMark Johnston */
1739c06cc56eSMark Johnston if (__predict_false((lle->la_flags & LLE_LINKED) == 0)) {
1740c06cc56eSMark Johnston if (flags & LLE_EXCLUSIVE)
1741c06cc56eSMark Johnston LLE_WUNLOCK(lle);
1742c06cc56eSMark Johnston else
1743c06cc56eSMark Johnston LLE_RUNLOCK(lle);
1744c06cc56eSMark Johnston return (NULL);
1745c06cc56eSMark Johnston }
17466e6b3f7cSQing Li return (lle);
17476e6b3f7cSQing Li }
17486e6b3f7cSQing Li
17496e6b3f7cSQing Li static int
in_lltable_dump_entry(struct lltable * llt,struct llentry * lle,struct sysctl_req * wr)175011cdad98SAlexander V. Chernikov in_lltable_dump_entry(struct lltable *llt, struct llentry *lle,
175111cdad98SAlexander V. Chernikov struct sysctl_req *wr)
17526e6b3f7cSQing Li {
17536e6b3f7cSQing Li struct ifnet *ifp = llt->llt_ifp;
17546e6b3f7cSQing Li /* XXX stack use */
17556e6b3f7cSQing Li struct {
17566e6b3f7cSQing Li struct rt_msghdr rtm;
17579711a168SGleb Smirnoff struct sockaddr_in sin;
17586e6b3f7cSQing Li struct sockaddr_dl sdl;
17596e6b3f7cSQing Li } arpc;
17606e6b3f7cSQing Li struct sockaddr_dl *sdl;
176111cdad98SAlexander V. Chernikov int error;
17626e6b3f7cSQing Li
176311cdad98SAlexander V. Chernikov bzero(&arpc, sizeof(arpc));
17646e6b3f7cSQing Li /* skip deleted entries */
176593704ac5SQing Li if ((lle->la_flags & LLE_DELETED) == LLE_DELETED)
176611cdad98SAlexander V. Chernikov return (0);
1767813dd6aeSBjoern A. Zeeb /* Skip if jailed and not a valid IP of the prison. */
176811cdad98SAlexander V. Chernikov lltable_fill_sa_entry(lle,(struct sockaddr *)&arpc.sin);
1769514ef08cSBrooks Davis if (prison_if(wr->td->td_ucred, (struct sockaddr *)&arpc.sin) != 0)
177011cdad98SAlexander V. Chernikov return (0);
17716e6b3f7cSQing Li /*
17726e6b3f7cSQing Li * produce a msg made of:
17736e6b3f7cSQing Li * struct rt_msghdr;
17749711a168SGleb Smirnoff * struct sockaddr_in; (IPv4)
17756e6b3f7cSQing Li * struct sockaddr_dl;
17766e6b3f7cSQing Li */
17776e6b3f7cSQing Li arpc.rtm.rtm_msglen = sizeof(arpc);
1778c0e9a8a1SHartmut Brandt arpc.rtm.rtm_version = RTM_VERSION;
1779c0e9a8a1SHartmut Brandt arpc.rtm.rtm_type = RTM_GET;
1780c0e9a8a1SHartmut Brandt arpc.rtm.rtm_flags = RTF_UP;
1781c0e9a8a1SHartmut Brandt arpc.rtm.rtm_addrs = RTA_DST | RTA_GATEWAY;
17826e6b3f7cSQing Li
17836e6b3f7cSQing Li /* publish */
17849711a168SGleb Smirnoff if (lle->la_flags & LLE_PUB)
17856e6b3f7cSQing Li arpc.rtm.rtm_flags |= RTF_ANNOUNCE;
17866e6b3f7cSQing Li
17876e6b3f7cSQing Li sdl = &arpc.sdl;
17886e6b3f7cSQing Li sdl->sdl_family = AF_LINK;
17896e6b3f7cSQing Li sdl->sdl_len = sizeof(*sdl);
17906e6b3f7cSQing Li sdl->sdl_index = ifp->if_index;
17916e6b3f7cSQing Li sdl->sdl_type = ifp->if_type;
179293704ac5SQing Li if ((lle->la_flags & LLE_VALID) == LLE_VALID) {
179393704ac5SQing Li sdl->sdl_alen = ifp->if_addrlen;
17944fb3a820SAlexander V. Chernikov bcopy(lle->ll_addr, LLADDR(sdl), ifp->if_addrlen);
179593704ac5SQing Li } else {
179693704ac5SQing Li sdl->sdl_alen = 0;
179793704ac5SQing Li bzero(LLADDR(sdl), ifp->if_addrlen);
179893704ac5SQing Li }
17996e6b3f7cSQing Li
18006e6b3f7cSQing Li arpc.rtm.rtm_rmx.rmx_expire =
18016e6b3f7cSQing Li lle->la_flags & LLE_STATIC ? 0 : lle->la_expire;
18028eca593cSQing Li arpc.rtm.rtm_flags |= (RTF_HOST | RTF_LLDATA);
18036e6b3f7cSQing Li if (lle->la_flags & LLE_STATIC)
18046e6b3f7cSQing Li arpc.rtm.rtm_flags |= RTF_STATIC;
18054a336ef4SAlexander V. Chernikov if (lle->la_flags & LLE_IFADDR)
18064a336ef4SAlexander V. Chernikov arpc.rtm.rtm_flags |= RTF_PINNED;
18076e6b3f7cSQing Li arpc.rtm.rtm_index = ifp->if_index;
18086e6b3f7cSQing Li error = SYSCTL_OUT(wr, &arpc, sizeof(arpc));
180911cdad98SAlexander V. Chernikov
181011cdad98SAlexander V. Chernikov return (error);
18116e6b3f7cSQing Li }
18126e6b3f7cSQing Li
181377001f9bSKUROSAWA Takahiro static void
in_lltable_post_resolved(struct lltable * llt,struct llentry * lle)181477001f9bSKUROSAWA Takahiro in_lltable_post_resolved(struct lltable *llt, struct llentry *lle)
181577001f9bSKUROSAWA Takahiro {
181677001f9bSKUROSAWA Takahiro struct ifnet *ifp = llt->llt_ifp;
181777001f9bSKUROSAWA Takahiro
181877001f9bSKUROSAWA Takahiro /* gratuitous ARP */
181977001f9bSKUROSAWA Takahiro if ((lle->la_flags & LLE_PUB) != 0)
182077001f9bSKUROSAWA Takahiro arprequest(ifp, &lle->r_l3addr.addr4, &lle->r_l3addr.addr4,
182177001f9bSKUROSAWA Takahiro lle->ll_addr);
182277001f9bSKUROSAWA Takahiro }
182377001f9bSKUROSAWA Takahiro
18243a749863SAlexander V. Chernikov static struct lltable *
in_lltattach(struct ifnet * ifp)18253a749863SAlexander V. Chernikov in_lltattach(struct ifnet *ifp)
18266e6b3f7cSQing Li {
1827d10910e6SBruce M Simpson struct lltable *llt;
18286e6b3f7cSQing Li
18293a749863SAlexander V. Chernikov llt = lltable_allocate_htbl(IN_LLTBL_DEFAULT_HSIZE);
1830721cd2e0SAlexander V. Chernikov llt->llt_af = AF_INET;
1831721cd2e0SAlexander V. Chernikov llt->llt_ifp = ifp;
1832d10910e6SBruce M Simpson
18336e6b3f7cSQing Li llt->llt_lookup = in_lltable_lookup;
18345a255516SAlexander V. Chernikov llt->llt_alloc_entry = in_lltable_alloc;
18353e7a2321SAlexander V. Chernikov llt->llt_delete_entry = in_lltable_delete_entry;
183611cdad98SAlexander V. Chernikov llt->llt_dump_entry = in_lltable_dump_entry;
183711cdad98SAlexander V. Chernikov llt->llt_hash = in_lltable_hash;
183811cdad98SAlexander V. Chernikov llt->llt_fill_sa_entry = in_lltable_fill_sa_entry;
183911cdad98SAlexander V. Chernikov llt->llt_free_entry = in_lltable_free_entry;
184011cdad98SAlexander V. Chernikov llt->llt_match_prefix = in_lltable_match_prefix;
1841f3a3b061SAlexander V. Chernikov llt->llt_mark_used = llentry_mark_used;
184277001f9bSKUROSAWA Takahiro llt->llt_post_resolved = in_lltable_post_resolved;
1843721cd2e0SAlexander V. Chernikov lltable_link(llt);
1844d10910e6SBruce M Simpson
18453a749863SAlexander V. Chernikov return (llt);
18463a749863SAlexander V. Chernikov }
18473a749863SAlexander V. Chernikov
1848ff3a85d3SAlexander V. Chernikov struct lltable *
in_lltable_get(struct ifnet * ifp)1849ff3a85d3SAlexander V. Chernikov in_lltable_get(struct ifnet *ifp)
1850ff3a85d3SAlexander V. Chernikov {
1851ff3a85d3SAlexander V. Chernikov struct lltable *llt = NULL;
1852ff3a85d3SAlexander V. Chernikov
1853ff3a85d3SAlexander V. Chernikov void *afdata_ptr = ifp->if_afdata[AF_INET];
1854ff3a85d3SAlexander V. Chernikov if (afdata_ptr != NULL)
1855ff3a85d3SAlexander V. Chernikov llt = ((struct in_ifinfo *)afdata_ptr)->ii_llt;
1856ff3a85d3SAlexander V. Chernikov return (llt);
1857ff3a85d3SAlexander V. Chernikov }
1858ff3a85d3SAlexander V. Chernikov
18593a749863SAlexander V. Chernikov void *
in_domifattach(struct ifnet * ifp)18603a749863SAlexander V. Chernikov in_domifattach(struct ifnet *ifp)
18613a749863SAlexander V. Chernikov {
18623a749863SAlexander V. Chernikov struct in_ifinfo *ii;
18633a749863SAlexander V. Chernikov
1864721cd2e0SAlexander V. Chernikov ii = malloc(sizeof(struct in_ifinfo), M_IFADDR, M_WAITOK|M_ZERO);
186541cb42a6SAlexander V. Chernikov
18663a749863SAlexander V. Chernikov ii->ii_llt = in_lltattach(ifp);
1867d10910e6SBruce M Simpson ii->ii_igmp = igmp_domifattach(ifp);
1868d10910e6SBruce M Simpson
186941cb42a6SAlexander V. Chernikov return (ii);
18706e6b3f7cSQing Li }
18716e6b3f7cSQing Li
18726e6b3f7cSQing Li void
in_domifdetach(struct ifnet * ifp,void * aux)1873d10910e6SBruce M Simpson in_domifdetach(struct ifnet *ifp, void *aux)
18746e6b3f7cSQing Li {
1875d10910e6SBruce M Simpson struct in_ifinfo *ii = (struct in_ifinfo *)aux;
18766e6b3f7cSQing Li
1877d10910e6SBruce M Simpson igmp_domifdetach(ifp);
1878d10910e6SBruce M Simpson lltable_free(ii->ii_llt);
1879d10910e6SBruce M Simpson free(ii, M_IFADDR);
18806e6b3f7cSQing Li }
1881