1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause-FreeBSD 3 * 4 * Copyright (c) 2002 Michael Shalayeff. 5 * Copyright (c) 2003 Ryan McBride. 6 * Copyright (c) 2011 Gleb Smirnoff <glebius@FreeBSD.org> 7 * All rights reserved. 8 * 9 * Redistribution and use in source and binary forms, with or without 10 * modification, are permitted provided that the following conditions 11 * are met: 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 2. Redistributions in binary form must reproduce the above copyright 15 * notice, this list of conditions and the following disclaimer in the 16 * documentation and/or other materials provided with the distribution. 17 * 18 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 19 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 20 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 21 * IN NO EVENT SHALL THE AUTHOR OR HIS RELATIVES BE LIABLE FOR ANY DIRECT, 22 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES 23 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR 24 * SERVICES; LOSS OF MIND, USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 25 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 26 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING 27 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF 28 * THE POSSIBILITY OF SUCH DAMAGE. 29 */ 30 31 #include <sys/cdefs.h> 32 __FBSDID("$FreeBSD$"); 33 34 #include "opt_bpf.h" 35 #include "opt_inet.h" 36 #include "opt_inet6.h" 37 38 #include <sys/param.h> 39 #include <sys/systm.h> 40 #include <sys/bus.h> 41 #include <sys/jail.h> 42 #include <sys/kernel.h> 43 #include <sys/limits.h> 44 #include <sys/malloc.h> 45 #include <sys/mbuf.h> 46 #include <sys/module.h> 47 #include <sys/priv.h> 48 #include <sys/proc.h> 49 #include <sys/protosw.h> 50 #include <sys/socket.h> 51 #include <sys/sockio.h> 52 #include <sys/sysctl.h> 53 #include <sys/syslog.h> 54 #include <sys/taskqueue.h> 55 #include <sys/counter.h> 56 57 #include <net/ethernet.h> 58 #include <net/if.h> 59 #include <net/if_var.h> 60 #include <net/if_dl.h> 61 #include <net/if_llatbl.h> 62 #include <net/if_types.h> 63 #include <net/route.h> 64 #include <net/vnet.h> 65 66 #if defined(INET) || defined(INET6) 67 #include <netinet/in.h> 68 #include <netinet/in_var.h> 69 #include <netinet/ip_carp.h> 70 #include <netinet/ip.h> 71 #include <machine/in_cksum.h> 72 #endif 73 #ifdef INET 74 #include <netinet/ip_var.h> 75 #include <netinet/if_ether.h> 76 #endif 77 78 #ifdef INET6 79 #include <netinet/icmp6.h> 80 #include <netinet/ip6.h> 81 #include <netinet6/in6_var.h> 82 #include <netinet6/ip6_var.h> 83 #include <netinet6/scope6_var.h> 84 #include <netinet6/nd6.h> 85 #endif 86 87 #include <crypto/sha1.h> 88 89 static MALLOC_DEFINE(M_CARP, "CARP", "CARP addresses"); 90 91 struct carp_softc { 92 struct ifnet *sc_carpdev; /* Pointer to parent ifnet. */ 93 struct ifaddr **sc_ifas; /* Our ifaddrs. */ 94 struct sockaddr_dl sc_addr; /* Our link level address. */ 95 struct callout sc_ad_tmo; /* Advertising timeout. */ 96 #ifdef INET 97 struct callout sc_md_tmo; /* Master down timeout. */ 98 #endif 99 #ifdef INET6 100 struct callout sc_md6_tmo; /* XXX: Master down timeout. */ 101 #endif 102 struct mtx sc_mtx; 103 104 int sc_vhid; 105 int sc_advskew; 106 int sc_advbase; 107 108 int sc_naddrs; 109 int sc_naddrs6; 110 int sc_ifasiz; 111 enum { INIT = 0, BACKUP, MASTER } sc_state; 112 int sc_suppress; 113 int sc_sendad_errors; 114 #define CARP_SENDAD_MAX_ERRORS 3 115 int sc_sendad_success; 116 #define CARP_SENDAD_MIN_SUCCESS 3 117 118 int sc_init_counter; 119 uint64_t sc_counter; 120 121 /* authentication */ 122 #define CARP_HMAC_PAD 64 123 unsigned char sc_key[CARP_KEY_LEN]; 124 unsigned char sc_pad[CARP_HMAC_PAD]; 125 SHA1_CTX sc_sha1; 126 127 TAILQ_ENTRY(carp_softc) sc_list; /* On the carp_if list. */ 128 LIST_ENTRY(carp_softc) sc_next; /* On the global list. */ 129 }; 130 131 struct carp_if { 132 #ifdef INET 133 int cif_naddrs; 134 #endif 135 #ifdef INET6 136 int cif_naddrs6; 137 #endif 138 TAILQ_HEAD(, carp_softc) cif_vrs; 139 #ifdef INET 140 struct ip_moptions cif_imo; 141 #endif 142 #ifdef INET6 143 struct ip6_moptions cif_im6o; 144 #endif 145 struct ifnet *cif_ifp; 146 struct mtx cif_mtx; 147 uint32_t cif_flags; 148 #define CIF_PROMISC 0x00000001 149 }; 150 151 #define CARP_INET 0 152 #define CARP_INET6 1 153 static int proto_reg[] = {-1, -1}; 154 155 /* 156 * Brief design of carp(4). 157 * 158 * Any carp-capable ifnet may have a list of carp softcs hanging off 159 * its ifp->if_carp pointer. Each softc represents one unique virtual 160 * host id, or vhid. The softc has a back pointer to the ifnet. All 161 * softcs are joined in a global list, which has quite limited use. 162 * 163 * Any interface address that takes part in CARP negotiation has a 164 * pointer to the softc of its vhid, ifa->ifa_carp. That could be either 165 * AF_INET or AF_INET6 address. 166 * 167 * Although, one can get the softc's backpointer to ifnet and traverse 168 * through its ifp->if_addrhead queue to find all interface addresses 169 * involved in CARP, we keep a growable array of ifaddr pointers. This 170 * allows us to avoid grabbing the IF_ADDR_LOCK() in many traversals that 171 * do calls into the network stack, thus avoiding LORs. 172 * 173 * Locking: 174 * 175 * Each softc has a lock sc_mtx. It is used to synchronise carp_input_c(), 176 * callout-driven events and ioctl()s. 177 * 178 * To traverse the list of softcs on an ifnet we use CIF_LOCK() or carp_sx. 179 * To traverse the global list we use the mutex carp_mtx. 180 * 181 * Known issues with locking: 182 * 183 * - Sending ad, we put the pointer to the softc in an mtag, and no reference 184 * counting is done on the softc. 185 * - On module unload we may race (?) with packet processing thread 186 * dereferencing our function pointers. 187 */ 188 189 /* Accept incoming CARP packets. */ 190 VNET_DEFINE_STATIC(int, carp_allow) = 1; 191 #define V_carp_allow VNET(carp_allow) 192 193 /* Set DSCP in outgoing CARP packets. */ 194 VNET_DEFINE_STATIC(int, carp_dscp) = 56; 195 #define V_carp_dscp VNET(carp_dscp) 196 197 /* Preempt slower nodes. */ 198 VNET_DEFINE_STATIC(int, carp_preempt) = 0; 199 #define V_carp_preempt VNET(carp_preempt) 200 201 /* Log level. */ 202 VNET_DEFINE_STATIC(int, carp_log) = 1; 203 #define V_carp_log VNET(carp_log) 204 205 /* Global advskew demotion. */ 206 VNET_DEFINE_STATIC(int, carp_demotion) = 0; 207 #define V_carp_demotion VNET(carp_demotion) 208 209 /* Send error demotion factor. */ 210 VNET_DEFINE_STATIC(int, carp_senderr_adj) = CARP_MAXSKEW; 211 #define V_carp_senderr_adj VNET(carp_senderr_adj) 212 213 /* Iface down demotion factor. */ 214 VNET_DEFINE_STATIC(int, carp_ifdown_adj) = CARP_MAXSKEW; 215 #define V_carp_ifdown_adj VNET(carp_ifdown_adj) 216 217 static int carp_allow_sysctl(SYSCTL_HANDLER_ARGS); 218 static int carp_dscp_sysctl(SYSCTL_HANDLER_ARGS); 219 static int carp_demote_adj_sysctl(SYSCTL_HANDLER_ARGS); 220 221 SYSCTL_NODE(_net_inet, IPPROTO_CARP, carp, CTLFLAG_RW, 0, "CARP"); 222 SYSCTL_PROC(_net_inet_carp, OID_AUTO, allow, 223 CTLFLAG_VNET | CTLTYPE_INT | CTLFLAG_RW, 0, 0, carp_allow_sysctl, "I", 224 "Accept incoming CARP packets"); 225 SYSCTL_PROC(_net_inet_carp, OID_AUTO, dscp, 226 CTLFLAG_VNET | CTLTYPE_INT | CTLFLAG_RW, 0, 0, carp_dscp_sysctl, "I", 227 "DSCP value for carp packets"); 228 SYSCTL_INT(_net_inet_carp, OID_AUTO, preempt, CTLFLAG_VNET | CTLFLAG_RW, 229 &VNET_NAME(carp_preempt), 0, "High-priority backup preemption mode"); 230 SYSCTL_INT(_net_inet_carp, OID_AUTO, log, CTLFLAG_VNET | CTLFLAG_RW, 231 &VNET_NAME(carp_log), 0, "CARP log level"); 232 SYSCTL_PROC(_net_inet_carp, OID_AUTO, demotion, 233 CTLFLAG_VNET | CTLTYPE_INT | CTLFLAG_RW, 234 0, 0, carp_demote_adj_sysctl, "I", 235 "Adjust demotion factor (skew of advskew)"); 236 SYSCTL_INT(_net_inet_carp, OID_AUTO, senderr_demotion_factor, 237 CTLFLAG_VNET | CTLFLAG_RW, 238 &VNET_NAME(carp_senderr_adj), 0, "Send error demotion factor adjustment"); 239 SYSCTL_INT(_net_inet_carp, OID_AUTO, ifdown_demotion_factor, 240 CTLFLAG_VNET | CTLFLAG_RW, 241 &VNET_NAME(carp_ifdown_adj), 0, 242 "Interface down demotion factor adjustment"); 243 244 VNET_PCPUSTAT_DEFINE(struct carpstats, carpstats); 245 VNET_PCPUSTAT_SYSINIT(carpstats); 246 VNET_PCPUSTAT_SYSUNINIT(carpstats); 247 248 #define CARPSTATS_ADD(name, val) \ 249 counter_u64_add(VNET(carpstats)[offsetof(struct carpstats, name) / \ 250 sizeof(uint64_t)], (val)) 251 #define CARPSTATS_INC(name) CARPSTATS_ADD(name, 1) 252 253 SYSCTL_VNET_PCPUSTAT(_net_inet_carp, OID_AUTO, stats, struct carpstats, 254 carpstats, "CARP statistics (struct carpstats, netinet/ip_carp.h)"); 255 256 #define CARP_LOCK_INIT(sc) mtx_init(&(sc)->sc_mtx, "carp_softc", \ 257 NULL, MTX_DEF) 258 #define CARP_LOCK_DESTROY(sc) mtx_destroy(&(sc)->sc_mtx) 259 #define CARP_LOCK_ASSERT(sc) mtx_assert(&(sc)->sc_mtx, MA_OWNED) 260 #define CARP_LOCK(sc) mtx_lock(&(sc)->sc_mtx) 261 #define CARP_UNLOCK(sc) mtx_unlock(&(sc)->sc_mtx) 262 #define CIF_LOCK_INIT(cif) mtx_init(&(cif)->cif_mtx, "carp_if", \ 263 NULL, MTX_DEF) 264 #define CIF_LOCK_DESTROY(cif) mtx_destroy(&(cif)->cif_mtx) 265 #define CIF_LOCK_ASSERT(cif) mtx_assert(&(cif)->cif_mtx, MA_OWNED) 266 #define CIF_LOCK(cif) mtx_lock(&(cif)->cif_mtx) 267 #define CIF_UNLOCK(cif) mtx_unlock(&(cif)->cif_mtx) 268 #define CIF_FREE(cif) do { \ 269 CIF_LOCK(cif); \ 270 if (TAILQ_EMPTY(&(cif)->cif_vrs)) \ 271 carp_free_if(cif); \ 272 else \ 273 CIF_UNLOCK(cif); \ 274 } while (0) 275 276 #define CARP_LOG(...) do { \ 277 if (V_carp_log > 0) \ 278 log(LOG_INFO, "carp: " __VA_ARGS__); \ 279 } while (0) 280 281 #define CARP_DEBUG(...) do { \ 282 if (V_carp_log > 1) \ 283 log(LOG_DEBUG, __VA_ARGS__); \ 284 } while (0) 285 286 #define IFNET_FOREACH_IFA(ifp, ifa) \ 287 CK_STAILQ_FOREACH((ifa), &(ifp)->if_addrhead, ifa_link) \ 288 if ((ifa)->ifa_carp != NULL) 289 290 #define CARP_FOREACH_IFA(sc, ifa) \ 291 CARP_LOCK_ASSERT(sc); \ 292 for (int _i = 0; \ 293 _i < (sc)->sc_naddrs + (sc)->sc_naddrs6 && \ 294 ((ifa) = sc->sc_ifas[_i]) != NULL; \ 295 ++_i) 296 297 #define IFNET_FOREACH_CARP(ifp, sc) \ 298 KASSERT(mtx_owned(&ifp->if_carp->cif_mtx) || \ 299 sx_xlocked(&carp_sx), ("cif_vrs not locked")); \ 300 TAILQ_FOREACH((sc), &(ifp)->if_carp->cif_vrs, sc_list) 301 302 #define DEMOTE_ADVSKEW(sc) \ 303 (((sc)->sc_advskew + V_carp_demotion > CARP_MAXSKEW) ? \ 304 CARP_MAXSKEW : ((sc)->sc_advskew + V_carp_demotion)) 305 306 static void carp_input_c(struct mbuf *, struct carp_header *, sa_family_t); 307 static struct carp_softc 308 *carp_alloc(struct ifnet *); 309 static void carp_destroy(struct carp_softc *); 310 static struct carp_if 311 *carp_alloc_if(struct ifnet *); 312 static void carp_free_if(struct carp_if *); 313 static void carp_set_state(struct carp_softc *, int, const char* reason); 314 static void carp_sc_state(struct carp_softc *); 315 static void carp_setrun(struct carp_softc *, sa_family_t); 316 static void carp_master_down(void *); 317 static void carp_master_down_locked(struct carp_softc *, 318 const char* reason); 319 static void carp_send_ad(void *); 320 static void carp_send_ad_locked(struct carp_softc *); 321 static void carp_addroute(struct carp_softc *); 322 static void carp_ifa_addroute(struct ifaddr *); 323 static void carp_delroute(struct carp_softc *); 324 static void carp_ifa_delroute(struct ifaddr *); 325 static void carp_send_ad_all(void *, int); 326 static void carp_demote_adj(int, char *); 327 328 static LIST_HEAD(, carp_softc) carp_list; 329 static struct mtx carp_mtx; 330 static struct sx carp_sx; 331 static struct task carp_sendall_task = 332 TASK_INITIALIZER(0, carp_send_ad_all, NULL); 333 334 static void 335 carp_hmac_prepare(struct carp_softc *sc) 336 { 337 uint8_t version = CARP_VERSION, type = CARP_ADVERTISEMENT; 338 uint8_t vhid = sc->sc_vhid & 0xff; 339 struct ifaddr *ifa; 340 int i, found; 341 #ifdef INET 342 struct in_addr last, cur, in; 343 #endif 344 #ifdef INET6 345 struct in6_addr last6, cur6, in6; 346 #endif 347 348 CARP_LOCK_ASSERT(sc); 349 350 /* Compute ipad from key. */ 351 bzero(sc->sc_pad, sizeof(sc->sc_pad)); 352 bcopy(sc->sc_key, sc->sc_pad, sizeof(sc->sc_key)); 353 for (i = 0; i < sizeof(sc->sc_pad); i++) 354 sc->sc_pad[i] ^= 0x36; 355 356 /* Precompute first part of inner hash. */ 357 SHA1Init(&sc->sc_sha1); 358 SHA1Update(&sc->sc_sha1, sc->sc_pad, sizeof(sc->sc_pad)); 359 SHA1Update(&sc->sc_sha1, (void *)&version, sizeof(version)); 360 SHA1Update(&sc->sc_sha1, (void *)&type, sizeof(type)); 361 SHA1Update(&sc->sc_sha1, (void *)&vhid, sizeof(vhid)); 362 #ifdef INET 363 cur.s_addr = 0; 364 do { 365 found = 0; 366 last = cur; 367 cur.s_addr = 0xffffffff; 368 CARP_FOREACH_IFA(sc, ifa) { 369 in.s_addr = ifatoia(ifa)->ia_addr.sin_addr.s_addr; 370 if (ifa->ifa_addr->sa_family == AF_INET && 371 ntohl(in.s_addr) > ntohl(last.s_addr) && 372 ntohl(in.s_addr) < ntohl(cur.s_addr)) { 373 cur.s_addr = in.s_addr; 374 found++; 375 } 376 } 377 if (found) 378 SHA1Update(&sc->sc_sha1, (void *)&cur, sizeof(cur)); 379 } while (found); 380 #endif /* INET */ 381 #ifdef INET6 382 memset(&cur6, 0, sizeof(cur6)); 383 do { 384 found = 0; 385 last6 = cur6; 386 memset(&cur6, 0xff, sizeof(cur6)); 387 CARP_FOREACH_IFA(sc, ifa) { 388 in6 = ifatoia6(ifa)->ia_addr.sin6_addr; 389 if (IN6_IS_SCOPE_EMBED(&in6)) 390 in6.s6_addr16[1] = 0; 391 if (ifa->ifa_addr->sa_family == AF_INET6 && 392 memcmp(&in6, &last6, sizeof(in6)) > 0 && 393 memcmp(&in6, &cur6, sizeof(in6)) < 0) { 394 cur6 = in6; 395 found++; 396 } 397 } 398 if (found) 399 SHA1Update(&sc->sc_sha1, (void *)&cur6, sizeof(cur6)); 400 } while (found); 401 #endif /* INET6 */ 402 403 /* convert ipad to opad */ 404 for (i = 0; i < sizeof(sc->sc_pad); i++) 405 sc->sc_pad[i] ^= 0x36 ^ 0x5c; 406 } 407 408 static void 409 carp_hmac_generate(struct carp_softc *sc, uint32_t counter[2], 410 unsigned char md[20]) 411 { 412 SHA1_CTX sha1ctx; 413 414 CARP_LOCK_ASSERT(sc); 415 416 /* fetch first half of inner hash */ 417 bcopy(&sc->sc_sha1, &sha1ctx, sizeof(sha1ctx)); 418 419 SHA1Update(&sha1ctx, (void *)counter, sizeof(sc->sc_counter)); 420 SHA1Final(md, &sha1ctx); 421 422 /* outer hash */ 423 SHA1Init(&sha1ctx); 424 SHA1Update(&sha1ctx, sc->sc_pad, sizeof(sc->sc_pad)); 425 SHA1Update(&sha1ctx, md, 20); 426 SHA1Final(md, &sha1ctx); 427 } 428 429 static int 430 carp_hmac_verify(struct carp_softc *sc, uint32_t counter[2], 431 unsigned char md[20]) 432 { 433 unsigned char md2[20]; 434 435 CARP_LOCK_ASSERT(sc); 436 437 carp_hmac_generate(sc, counter, md2); 438 439 return (bcmp(md, md2, sizeof(md2))); 440 } 441 442 /* 443 * process input packet. 444 * we have rearranged checks order compared to the rfc, 445 * but it seems more efficient this way or not possible otherwise. 446 */ 447 #ifdef INET 448 int 449 carp_input(struct mbuf **mp, int *offp, int proto) 450 { 451 struct mbuf *m = *mp; 452 struct ip *ip = mtod(m, struct ip *); 453 struct carp_header *ch; 454 int iplen, len; 455 456 iplen = *offp; 457 *mp = NULL; 458 459 CARPSTATS_INC(carps_ipackets); 460 461 if (!V_carp_allow) { 462 m_freem(m); 463 return (IPPROTO_DONE); 464 } 465 466 /* verify that the IP TTL is 255. */ 467 if (ip->ip_ttl != CARP_DFLTTL) { 468 CARPSTATS_INC(carps_badttl); 469 CARP_DEBUG("%s: received ttl %d != 255 on %s\n", __func__, 470 ip->ip_ttl, 471 m->m_pkthdr.rcvif->if_xname); 472 m_freem(m); 473 return (IPPROTO_DONE); 474 } 475 476 iplen = ip->ip_hl << 2; 477 478 if (m->m_pkthdr.len < iplen + sizeof(*ch)) { 479 CARPSTATS_INC(carps_badlen); 480 CARP_DEBUG("%s: received len %zd < sizeof(struct carp_header) " 481 "on %s\n", __func__, m->m_len - sizeof(struct ip), 482 m->m_pkthdr.rcvif->if_xname); 483 m_freem(m); 484 return (IPPROTO_DONE); 485 } 486 487 if (iplen + sizeof(*ch) < m->m_len) { 488 if ((m = m_pullup(m, iplen + sizeof(*ch))) == NULL) { 489 CARPSTATS_INC(carps_hdrops); 490 CARP_DEBUG("%s: pullup failed\n", __func__); 491 return (IPPROTO_DONE); 492 } 493 ip = mtod(m, struct ip *); 494 } 495 ch = (struct carp_header *)((char *)ip + iplen); 496 497 /* 498 * verify that the received packet length is 499 * equal to the CARP header 500 */ 501 len = iplen + sizeof(*ch); 502 if (len > m->m_pkthdr.len) { 503 CARPSTATS_INC(carps_badlen); 504 CARP_DEBUG("%s: packet too short %d on %s\n", __func__, 505 m->m_pkthdr.len, 506 m->m_pkthdr.rcvif->if_xname); 507 m_freem(m); 508 return (IPPROTO_DONE); 509 } 510 511 if ((m = m_pullup(m, len)) == NULL) { 512 CARPSTATS_INC(carps_hdrops); 513 return (IPPROTO_DONE); 514 } 515 ip = mtod(m, struct ip *); 516 ch = (struct carp_header *)((char *)ip + iplen); 517 518 /* verify the CARP checksum */ 519 m->m_data += iplen; 520 if (in_cksum(m, len - iplen)) { 521 CARPSTATS_INC(carps_badsum); 522 CARP_DEBUG("%s: checksum failed on %s\n", __func__, 523 m->m_pkthdr.rcvif->if_xname); 524 m_freem(m); 525 return (IPPROTO_DONE); 526 } 527 m->m_data -= iplen; 528 529 carp_input_c(m, ch, AF_INET); 530 return (IPPROTO_DONE); 531 } 532 #endif 533 534 #ifdef INET6 535 int 536 carp6_input(struct mbuf **mp, int *offp, int proto) 537 { 538 struct mbuf *m = *mp; 539 struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *); 540 struct carp_header *ch; 541 u_int len; 542 543 CARPSTATS_INC(carps_ipackets6); 544 545 if (!V_carp_allow) { 546 m_freem(m); 547 return (IPPROTO_DONE); 548 } 549 550 /* check if received on a valid carp interface */ 551 if (m->m_pkthdr.rcvif->if_carp == NULL) { 552 CARPSTATS_INC(carps_badif); 553 CARP_DEBUG("%s: packet received on non-carp interface: %s\n", 554 __func__, m->m_pkthdr.rcvif->if_xname); 555 m_freem(m); 556 return (IPPROTO_DONE); 557 } 558 559 /* verify that the IP TTL is 255 */ 560 if (ip6->ip6_hlim != CARP_DFLTTL) { 561 CARPSTATS_INC(carps_badttl); 562 CARP_DEBUG("%s: received ttl %d != 255 on %s\n", __func__, 563 ip6->ip6_hlim, m->m_pkthdr.rcvif->if_xname); 564 m_freem(m); 565 return (IPPROTO_DONE); 566 } 567 568 /* verify that we have a complete carp packet */ 569 if (m->m_len < *offp + sizeof(*ch)) { 570 len = m->m_len; 571 m = m_pullup(m, *offp + sizeof(*ch)); 572 if (m == NULL) { 573 CARPSTATS_INC(carps_badlen); 574 CARP_DEBUG("%s: packet size %u too small\n", __func__, len); 575 return (IPPROTO_DONE); 576 } 577 } 578 ch = (struct carp_header *)(mtod(m, char *) + *offp); 579 580 581 /* verify the CARP checksum */ 582 m->m_data += *offp; 583 if (in_cksum(m, sizeof(*ch))) { 584 CARPSTATS_INC(carps_badsum); 585 CARP_DEBUG("%s: checksum failed, on %s\n", __func__, 586 m->m_pkthdr.rcvif->if_xname); 587 m_freem(m); 588 return (IPPROTO_DONE); 589 } 590 m->m_data -= *offp; 591 592 carp_input_c(m, ch, AF_INET6); 593 return (IPPROTO_DONE); 594 } 595 #endif /* INET6 */ 596 597 /* 598 * This routine should not be necessary at all, but some switches 599 * (VMWare ESX vswitches) can echo our own packets back at us, 600 * and we must ignore them or they will cause us to drop out of 601 * MASTER mode. 602 * 603 * We cannot catch all cases of network loops. Instead, what we 604 * do here is catch any packet that arrives with a carp header 605 * with a VHID of 0, that comes from an address that is our own. 606 * These packets are by definition "from us" (even if they are from 607 * a misconfigured host that is pretending to be us). 608 * 609 * The VHID test is outside this mini-function. 610 */ 611 static int 612 carp_source_is_self(struct mbuf *m, struct ifaddr *ifa, sa_family_t af) 613 { 614 #ifdef INET 615 struct ip *ip4; 616 struct in_addr in4; 617 #endif 618 #ifdef INET6 619 struct ip6_hdr *ip6; 620 struct in6_addr in6; 621 #endif 622 623 switch (af) { 624 #ifdef INET 625 case AF_INET: 626 ip4 = mtod(m, struct ip *); 627 in4 = ifatoia(ifa)->ia_addr.sin_addr; 628 return (in4.s_addr == ip4->ip_src.s_addr); 629 #endif 630 #ifdef INET6 631 case AF_INET6: 632 ip6 = mtod(m, struct ip6_hdr *); 633 in6 = ifatoia6(ifa)->ia_addr.sin6_addr; 634 return (memcmp(&in6, &ip6->ip6_src, sizeof(in6)) == 0); 635 #endif 636 default: 637 break; 638 } 639 return (0); 640 } 641 642 static void 643 carp_input_c(struct mbuf *m, struct carp_header *ch, sa_family_t af) 644 { 645 struct ifnet *ifp = m->m_pkthdr.rcvif; 646 struct ifaddr *ifa, *match; 647 struct carp_softc *sc; 648 uint64_t tmp_counter; 649 struct timeval sc_tv, ch_tv; 650 int error; 651 652 NET_EPOCH_ASSERT(); 653 654 /* 655 * Verify that the VHID is valid on the receiving interface. 656 * 657 * There should be just one match. If there are none 658 * the VHID is not valid and we drop the packet. If 659 * there are multiple VHID matches, take just the first 660 * one, for compatibility with previous code. While we're 661 * scanning, check for obvious loops in the network topology 662 * (these should never happen, and as noted above, we may 663 * miss real loops; this is just a double-check). 664 */ 665 error = 0; 666 match = NULL; 667 IFNET_FOREACH_IFA(ifp, ifa) { 668 if (match == NULL && ifa->ifa_carp != NULL && 669 ifa->ifa_addr->sa_family == af && 670 ifa->ifa_carp->sc_vhid == ch->carp_vhid) 671 match = ifa; 672 if (ch->carp_vhid == 0 && carp_source_is_self(m, ifa, af)) 673 error = ELOOP; 674 } 675 ifa = error ? NULL : match; 676 if (ifa != NULL) 677 ifa_ref(ifa); 678 679 if (ifa == NULL) { 680 if (error == ELOOP) { 681 CARP_DEBUG("dropping looped packet on interface %s\n", 682 ifp->if_xname); 683 CARPSTATS_INC(carps_badif); /* ??? */ 684 } else { 685 CARPSTATS_INC(carps_badvhid); 686 } 687 m_freem(m); 688 return; 689 } 690 691 /* verify the CARP version. */ 692 if (ch->carp_version != CARP_VERSION) { 693 CARPSTATS_INC(carps_badver); 694 CARP_DEBUG("%s: invalid version %d\n", ifp->if_xname, 695 ch->carp_version); 696 ifa_free(ifa); 697 m_freem(m); 698 return; 699 } 700 701 sc = ifa->ifa_carp; 702 CARP_LOCK(sc); 703 ifa_free(ifa); 704 705 if (carp_hmac_verify(sc, ch->carp_counter, ch->carp_md)) { 706 CARPSTATS_INC(carps_badauth); 707 CARP_DEBUG("%s: incorrect hash for VHID %u@%s\n", __func__, 708 sc->sc_vhid, ifp->if_xname); 709 goto out; 710 } 711 712 tmp_counter = ntohl(ch->carp_counter[0]); 713 tmp_counter = tmp_counter<<32; 714 tmp_counter += ntohl(ch->carp_counter[1]); 715 716 /* XXX Replay protection goes here */ 717 718 sc->sc_init_counter = 0; 719 sc->sc_counter = tmp_counter; 720 721 sc_tv.tv_sec = sc->sc_advbase; 722 sc_tv.tv_usec = DEMOTE_ADVSKEW(sc) * 1000000 / 256; 723 ch_tv.tv_sec = ch->carp_advbase; 724 ch_tv.tv_usec = ch->carp_advskew * 1000000 / 256; 725 726 switch (sc->sc_state) { 727 case INIT: 728 break; 729 case MASTER: 730 /* 731 * If we receive an advertisement from a master who's going to 732 * be more frequent than us, go into BACKUP state. 733 */ 734 if (timevalcmp(&sc_tv, &ch_tv, >) || 735 timevalcmp(&sc_tv, &ch_tv, ==)) { 736 callout_stop(&sc->sc_ad_tmo); 737 carp_set_state(sc, BACKUP, 738 "more frequent advertisement received"); 739 carp_setrun(sc, 0); 740 carp_delroute(sc); 741 } 742 break; 743 case BACKUP: 744 /* 745 * If we're pre-empting masters who advertise slower than us, 746 * and this one claims to be slower, treat him as down. 747 */ 748 if (V_carp_preempt && timevalcmp(&sc_tv, &ch_tv, <)) { 749 carp_master_down_locked(sc, 750 "preempting a slower master"); 751 break; 752 } 753 754 /* 755 * If the master is going to advertise at such a low frequency 756 * that he's guaranteed to time out, we'd might as well just 757 * treat him as timed out now. 758 */ 759 sc_tv.tv_sec = sc->sc_advbase * 3; 760 if (timevalcmp(&sc_tv, &ch_tv, <)) { 761 carp_master_down_locked(sc, "master will time out"); 762 break; 763 } 764 765 /* 766 * Otherwise, we reset the counter and wait for the next 767 * advertisement. 768 */ 769 carp_setrun(sc, af); 770 break; 771 } 772 773 out: 774 CARP_UNLOCK(sc); 775 m_freem(m); 776 } 777 778 static int 779 carp_prepare_ad(struct mbuf *m, struct carp_softc *sc, struct carp_header *ch) 780 { 781 struct m_tag *mtag; 782 783 if (sc->sc_init_counter) { 784 /* this could also be seconds since unix epoch */ 785 sc->sc_counter = arc4random(); 786 sc->sc_counter = sc->sc_counter << 32; 787 sc->sc_counter += arc4random(); 788 } else 789 sc->sc_counter++; 790 791 ch->carp_counter[0] = htonl((sc->sc_counter>>32)&0xffffffff); 792 ch->carp_counter[1] = htonl(sc->sc_counter&0xffffffff); 793 794 carp_hmac_generate(sc, ch->carp_counter, ch->carp_md); 795 796 /* Tag packet for carp_output */ 797 if ((mtag = m_tag_get(PACKET_TAG_CARP, sizeof(struct carp_softc *), 798 M_NOWAIT)) == NULL) { 799 m_freem(m); 800 CARPSTATS_INC(carps_onomem); 801 return (ENOMEM); 802 } 803 bcopy(&sc, mtag + 1, sizeof(sc)); 804 m_tag_prepend(m, mtag); 805 806 return (0); 807 } 808 809 /* 810 * To avoid LORs and possible recursions this function shouldn't 811 * be called directly, but scheduled via taskqueue. 812 */ 813 static void 814 carp_send_ad_all(void *ctx __unused, int pending __unused) 815 { 816 struct carp_softc *sc; 817 818 mtx_lock(&carp_mtx); 819 LIST_FOREACH(sc, &carp_list, sc_next) 820 if (sc->sc_state == MASTER) { 821 CARP_LOCK(sc); 822 CURVNET_SET(sc->sc_carpdev->if_vnet); 823 carp_send_ad_locked(sc); 824 CURVNET_RESTORE(); 825 CARP_UNLOCK(sc); 826 } 827 mtx_unlock(&carp_mtx); 828 } 829 830 /* Send a periodic advertisement, executed in callout context. */ 831 static void 832 carp_send_ad(void *v) 833 { 834 struct carp_softc *sc = v; 835 836 CARP_LOCK_ASSERT(sc); 837 CURVNET_SET(sc->sc_carpdev->if_vnet); 838 carp_send_ad_locked(sc); 839 CURVNET_RESTORE(); 840 CARP_UNLOCK(sc); 841 } 842 843 static void 844 carp_send_ad_error(struct carp_softc *sc, int error) 845 { 846 847 if (error) { 848 if (sc->sc_sendad_errors < INT_MAX) 849 sc->sc_sendad_errors++; 850 if (sc->sc_sendad_errors == CARP_SENDAD_MAX_ERRORS) { 851 static const char fmt[] = "send error %d on %s"; 852 char msg[sizeof(fmt) + IFNAMSIZ]; 853 854 sprintf(msg, fmt, error, sc->sc_carpdev->if_xname); 855 carp_demote_adj(V_carp_senderr_adj, msg); 856 } 857 sc->sc_sendad_success = 0; 858 } else { 859 if (sc->sc_sendad_errors >= CARP_SENDAD_MAX_ERRORS && 860 ++sc->sc_sendad_success >= CARP_SENDAD_MIN_SUCCESS) { 861 static const char fmt[] = "send ok on %s"; 862 char msg[sizeof(fmt) + IFNAMSIZ]; 863 864 sprintf(msg, fmt, sc->sc_carpdev->if_xname); 865 carp_demote_adj(-V_carp_senderr_adj, msg); 866 sc->sc_sendad_errors = 0; 867 } else 868 sc->sc_sendad_errors = 0; 869 } 870 } 871 872 /* 873 * Pick the best ifaddr on the given ifp for sending CARP 874 * advertisements. 875 * 876 * "Best" here is defined by ifa_preferred(). This function is much 877 * much like ifaof_ifpforaddr() except that we just use ifa_preferred(). 878 * 879 * (This could be simplified to return the actual address, except that 880 * it has a different format in AF_INET and AF_INET6.) 881 */ 882 static struct ifaddr * 883 carp_best_ifa(int af, struct ifnet *ifp) 884 { 885 struct ifaddr *ifa, *best; 886 887 NET_EPOCH_ASSERT(); 888 889 if (af >= AF_MAX) 890 return (NULL); 891 best = NULL; 892 CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) { 893 if (ifa->ifa_addr->sa_family == af && 894 (best == NULL || ifa_preferred(best, ifa))) 895 best = ifa; 896 } 897 if (best != NULL) 898 ifa_ref(best); 899 return (best); 900 } 901 902 static void 903 carp_send_ad_locked(struct carp_softc *sc) 904 { 905 struct carp_header ch; 906 struct timeval tv; 907 struct epoch_tracker et; 908 struct ifaddr *ifa; 909 struct carp_header *ch_ptr; 910 struct mbuf *m; 911 int len, advskew; 912 913 CARP_LOCK_ASSERT(sc); 914 915 advskew = DEMOTE_ADVSKEW(sc); 916 tv.tv_sec = sc->sc_advbase; 917 tv.tv_usec = advskew * 1000000 / 256; 918 919 ch.carp_version = CARP_VERSION; 920 ch.carp_type = CARP_ADVERTISEMENT; 921 ch.carp_vhid = sc->sc_vhid; 922 ch.carp_advbase = sc->sc_advbase; 923 ch.carp_advskew = advskew; 924 ch.carp_authlen = 7; /* XXX DEFINE */ 925 ch.carp_pad1 = 0; /* must be zero */ 926 ch.carp_cksum = 0; 927 928 /* XXXGL: OpenBSD picks first ifaddr with needed family. */ 929 930 #ifdef INET 931 if (sc->sc_naddrs) { 932 struct ip *ip; 933 934 m = m_gethdr(M_NOWAIT, MT_DATA); 935 if (m == NULL) { 936 CARPSTATS_INC(carps_onomem); 937 goto resched; 938 } 939 len = sizeof(*ip) + sizeof(ch); 940 m->m_pkthdr.len = len; 941 m->m_pkthdr.rcvif = NULL; 942 m->m_len = len; 943 M_ALIGN(m, m->m_len); 944 m->m_flags |= M_MCAST; 945 ip = mtod(m, struct ip *); 946 ip->ip_v = IPVERSION; 947 ip->ip_hl = sizeof(*ip) >> 2; 948 ip->ip_tos = V_carp_dscp << IPTOS_DSCP_OFFSET; 949 ip->ip_len = htons(len); 950 ip->ip_off = htons(IP_DF); 951 ip->ip_ttl = CARP_DFLTTL; 952 ip->ip_p = IPPROTO_CARP; 953 ip->ip_sum = 0; 954 ip_fillid(ip); 955 956 ifa = carp_best_ifa(AF_INET, sc->sc_carpdev); 957 if (ifa != NULL) { 958 ip->ip_src.s_addr = 959 ifatoia(ifa)->ia_addr.sin_addr.s_addr; 960 ifa_free(ifa); 961 } else 962 ip->ip_src.s_addr = 0; 963 ip->ip_dst.s_addr = htonl(INADDR_CARP_GROUP); 964 965 ch_ptr = (struct carp_header *)(&ip[1]); 966 bcopy(&ch, ch_ptr, sizeof(ch)); 967 if (carp_prepare_ad(m, sc, ch_ptr)) 968 goto resched; 969 970 m->m_data += sizeof(*ip); 971 ch_ptr->carp_cksum = in_cksum(m, len - sizeof(*ip)); 972 m->m_data -= sizeof(*ip); 973 974 CARPSTATS_INC(carps_opackets); 975 976 NET_EPOCH_ENTER(et); 977 carp_send_ad_error(sc, ip_output(m, NULL, NULL, IP_RAWOUTPUT, 978 &sc->sc_carpdev->if_carp->cif_imo, NULL)); 979 NET_EPOCH_EXIT(et); 980 } 981 #endif /* INET */ 982 #ifdef INET6 983 if (sc->sc_naddrs6) { 984 struct ip6_hdr *ip6; 985 986 m = m_gethdr(M_NOWAIT, MT_DATA); 987 if (m == NULL) { 988 CARPSTATS_INC(carps_onomem); 989 goto resched; 990 } 991 len = sizeof(*ip6) + sizeof(ch); 992 m->m_pkthdr.len = len; 993 m->m_pkthdr.rcvif = NULL; 994 m->m_len = len; 995 M_ALIGN(m, m->m_len); 996 m->m_flags |= M_MCAST; 997 ip6 = mtod(m, struct ip6_hdr *); 998 bzero(ip6, sizeof(*ip6)); 999 ip6->ip6_vfc |= IPV6_VERSION; 1000 /* Traffic class isn't defined in ip6 struct instead 1001 * it gets offset into flowid field */ 1002 ip6->ip6_flow |= htonl(V_carp_dscp << (IPV6_FLOWLABEL_LEN + 1003 IPTOS_DSCP_OFFSET)); 1004 ip6->ip6_hlim = CARP_DFLTTL; 1005 ip6->ip6_nxt = IPPROTO_CARP; 1006 1007 /* set the source address */ 1008 ifa = carp_best_ifa(AF_INET6, sc->sc_carpdev); 1009 if (ifa != NULL) { 1010 bcopy(IFA_IN6(ifa), &ip6->ip6_src, 1011 sizeof(struct in6_addr)); 1012 ifa_free(ifa); 1013 } else 1014 /* This should never happen with IPv6. */ 1015 bzero(&ip6->ip6_src, sizeof(struct in6_addr)); 1016 1017 /* Set the multicast destination. */ 1018 ip6->ip6_dst.s6_addr16[0] = htons(0xff02); 1019 ip6->ip6_dst.s6_addr8[15] = 0x12; 1020 if (in6_setscope(&ip6->ip6_dst, sc->sc_carpdev, NULL) != 0) { 1021 m_freem(m); 1022 CARP_DEBUG("%s: in6_setscope failed\n", __func__); 1023 goto resched; 1024 } 1025 1026 ch_ptr = (struct carp_header *)(&ip6[1]); 1027 bcopy(&ch, ch_ptr, sizeof(ch)); 1028 if (carp_prepare_ad(m, sc, ch_ptr)) 1029 goto resched; 1030 1031 m->m_data += sizeof(*ip6); 1032 ch_ptr->carp_cksum = in_cksum(m, len - sizeof(*ip6)); 1033 m->m_data -= sizeof(*ip6); 1034 1035 CARPSTATS_INC(carps_opackets6); 1036 1037 NET_EPOCH_ENTER(et); 1038 carp_send_ad_error(sc, ip6_output(m, NULL, NULL, 0, 1039 &sc->sc_carpdev->if_carp->cif_im6o, NULL, NULL)); 1040 NET_EPOCH_EXIT(et); 1041 } 1042 #endif /* INET6 */ 1043 1044 resched: 1045 callout_reset(&sc->sc_ad_tmo, tvtohz(&tv), carp_send_ad, sc); 1046 } 1047 1048 static void 1049 carp_addroute(struct carp_softc *sc) 1050 { 1051 struct ifaddr *ifa; 1052 1053 CARP_FOREACH_IFA(sc, ifa) 1054 carp_ifa_addroute(ifa); 1055 } 1056 1057 static void 1058 carp_ifa_addroute(struct ifaddr *ifa) 1059 { 1060 1061 switch (ifa->ifa_addr->sa_family) { 1062 #ifdef INET 1063 case AF_INET: 1064 in_addprefix(ifatoia(ifa), RTF_UP); 1065 ifa_add_loopback_route(ifa, 1066 (struct sockaddr *)&ifatoia(ifa)->ia_addr); 1067 break; 1068 #endif 1069 #ifdef INET6 1070 case AF_INET6: 1071 ifa_add_loopback_route(ifa, 1072 (struct sockaddr *)&ifatoia6(ifa)->ia_addr); 1073 nd6_add_ifa_lle(ifatoia6(ifa)); 1074 break; 1075 #endif 1076 } 1077 } 1078 1079 static void 1080 carp_delroute(struct carp_softc *sc) 1081 { 1082 struct ifaddr *ifa; 1083 1084 CARP_FOREACH_IFA(sc, ifa) 1085 carp_ifa_delroute(ifa); 1086 } 1087 1088 static void 1089 carp_ifa_delroute(struct ifaddr *ifa) 1090 { 1091 1092 switch (ifa->ifa_addr->sa_family) { 1093 #ifdef INET 1094 case AF_INET: 1095 ifa_del_loopback_route(ifa, 1096 (struct sockaddr *)&ifatoia(ifa)->ia_addr); 1097 in_scrubprefix(ifatoia(ifa), LLE_STATIC); 1098 break; 1099 #endif 1100 #ifdef INET6 1101 case AF_INET6: 1102 ifa_del_loopback_route(ifa, 1103 (struct sockaddr *)&ifatoia6(ifa)->ia_addr); 1104 nd6_rem_ifa_lle(ifatoia6(ifa), 1); 1105 break; 1106 #endif 1107 } 1108 } 1109 1110 int 1111 carp_master(struct ifaddr *ifa) 1112 { 1113 struct carp_softc *sc = ifa->ifa_carp; 1114 1115 return (sc->sc_state == MASTER); 1116 } 1117 1118 #ifdef INET 1119 /* 1120 * Broadcast a gratuitous ARP request containing 1121 * the virtual router MAC address for each IP address 1122 * associated with the virtual router. 1123 */ 1124 static void 1125 carp_send_arp(struct carp_softc *sc) 1126 { 1127 struct ifaddr *ifa; 1128 struct in_addr addr; 1129 1130 CARP_FOREACH_IFA(sc, ifa) { 1131 if (ifa->ifa_addr->sa_family != AF_INET) 1132 continue; 1133 addr = ((struct sockaddr_in *)ifa->ifa_addr)->sin_addr; 1134 arp_announce_ifaddr(sc->sc_carpdev, addr, LLADDR(&sc->sc_addr)); 1135 } 1136 } 1137 1138 int 1139 carp_iamatch(struct ifaddr *ifa, uint8_t **enaddr) 1140 { 1141 struct carp_softc *sc = ifa->ifa_carp; 1142 1143 if (sc->sc_state == MASTER) { 1144 *enaddr = LLADDR(&sc->sc_addr); 1145 return (1); 1146 } 1147 1148 return (0); 1149 } 1150 #endif 1151 1152 #ifdef INET6 1153 static void 1154 carp_send_na(struct carp_softc *sc) 1155 { 1156 static struct in6_addr mcast = IN6ADDR_LINKLOCAL_ALLNODES_INIT; 1157 struct ifaddr *ifa; 1158 struct in6_addr *in6; 1159 1160 CARP_FOREACH_IFA(sc, ifa) { 1161 if (ifa->ifa_addr->sa_family != AF_INET6) 1162 continue; 1163 1164 in6 = IFA_IN6(ifa); 1165 nd6_na_output(sc->sc_carpdev, &mcast, in6, 1166 ND_NA_FLAG_OVERRIDE, 1, NULL); 1167 DELAY(1000); /* XXX */ 1168 } 1169 } 1170 1171 /* 1172 * Returns ifa in case it's a carp address and it is MASTER, or if the address 1173 * matches and is not a carp address. Returns NULL otherwise. 1174 */ 1175 struct ifaddr * 1176 carp_iamatch6(struct ifnet *ifp, struct in6_addr *taddr) 1177 { 1178 struct ifaddr *ifa; 1179 1180 NET_EPOCH_ASSERT(); 1181 1182 ifa = NULL; 1183 CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) { 1184 if (ifa->ifa_addr->sa_family != AF_INET6) 1185 continue; 1186 if (!IN6_ARE_ADDR_EQUAL(taddr, IFA_IN6(ifa))) 1187 continue; 1188 if (ifa->ifa_carp && ifa->ifa_carp->sc_state != MASTER) 1189 ifa = NULL; 1190 else 1191 ifa_ref(ifa); 1192 break; 1193 } 1194 1195 return (ifa); 1196 } 1197 1198 char * 1199 carp_macmatch6(struct ifnet *ifp, struct mbuf *m, const struct in6_addr *taddr) 1200 { 1201 struct ifaddr *ifa; 1202 1203 NET_EPOCH_ASSERT(); 1204 1205 IFNET_FOREACH_IFA(ifp, ifa) 1206 if (ifa->ifa_addr->sa_family == AF_INET6 && 1207 IN6_ARE_ADDR_EQUAL(taddr, IFA_IN6(ifa))) { 1208 struct carp_softc *sc = ifa->ifa_carp; 1209 struct m_tag *mtag; 1210 1211 mtag = m_tag_get(PACKET_TAG_CARP, 1212 sizeof(struct carp_softc *), M_NOWAIT); 1213 if (mtag == NULL) 1214 /* Better a bit than nothing. */ 1215 return (LLADDR(&sc->sc_addr)); 1216 1217 bcopy(&sc, mtag + 1, sizeof(sc)); 1218 m_tag_prepend(m, mtag); 1219 1220 return (LLADDR(&sc->sc_addr)); 1221 } 1222 1223 return (NULL); 1224 } 1225 #endif /* INET6 */ 1226 1227 int 1228 carp_forus(struct ifnet *ifp, u_char *dhost) 1229 { 1230 struct carp_softc *sc; 1231 uint8_t *ena = dhost; 1232 1233 if (ena[0] || ena[1] || ena[2] != 0x5e || ena[3] || ena[4] != 1) 1234 return (0); 1235 1236 CIF_LOCK(ifp->if_carp); 1237 IFNET_FOREACH_CARP(ifp, sc) { 1238 /* 1239 * CARP_LOCK() is not here, since would protect nothing, but 1240 * cause deadlock with if_bridge, calling this under its lock. 1241 */ 1242 if (sc->sc_state == MASTER && !bcmp(dhost, LLADDR(&sc->sc_addr), 1243 ETHER_ADDR_LEN)) { 1244 CIF_UNLOCK(ifp->if_carp); 1245 return (1); 1246 } 1247 } 1248 CIF_UNLOCK(ifp->if_carp); 1249 1250 return (0); 1251 } 1252 1253 /* Master down timeout event, executed in callout context. */ 1254 static void 1255 carp_master_down(void *v) 1256 { 1257 struct carp_softc *sc = v; 1258 1259 CARP_LOCK_ASSERT(sc); 1260 1261 CURVNET_SET(sc->sc_carpdev->if_vnet); 1262 if (sc->sc_state == BACKUP) { 1263 carp_master_down_locked(sc, "master timed out"); 1264 } 1265 CURVNET_RESTORE(); 1266 1267 CARP_UNLOCK(sc); 1268 } 1269 1270 static void 1271 carp_master_down_locked(struct carp_softc *sc, const char *reason) 1272 { 1273 1274 CARP_LOCK_ASSERT(sc); 1275 1276 switch (sc->sc_state) { 1277 case BACKUP: 1278 carp_set_state(sc, MASTER, reason); 1279 carp_send_ad_locked(sc); 1280 #ifdef INET 1281 carp_send_arp(sc); 1282 #endif 1283 #ifdef INET6 1284 carp_send_na(sc); 1285 #endif 1286 carp_setrun(sc, 0); 1287 carp_addroute(sc); 1288 break; 1289 case INIT: 1290 case MASTER: 1291 #ifdef INVARIANTS 1292 panic("carp: VHID %u@%s: master_down event in %s state\n", 1293 sc->sc_vhid, 1294 sc->sc_carpdev->if_xname, 1295 sc->sc_state ? "MASTER" : "INIT"); 1296 #endif 1297 break; 1298 } 1299 } 1300 1301 /* 1302 * When in backup state, af indicates whether to reset the master down timer 1303 * for v4 or v6. If it's set to zero, reset the ones which are already pending. 1304 */ 1305 static void 1306 carp_setrun(struct carp_softc *sc, sa_family_t af) 1307 { 1308 struct timeval tv; 1309 1310 CARP_LOCK_ASSERT(sc); 1311 1312 if ((sc->sc_carpdev->if_flags & IFF_UP) == 0 || 1313 sc->sc_carpdev->if_link_state != LINK_STATE_UP || 1314 (sc->sc_naddrs == 0 && sc->sc_naddrs6 == 0) || 1315 !V_carp_allow) 1316 return; 1317 1318 switch (sc->sc_state) { 1319 case INIT: 1320 carp_set_state(sc, BACKUP, "initialization complete"); 1321 carp_setrun(sc, 0); 1322 break; 1323 case BACKUP: 1324 callout_stop(&sc->sc_ad_tmo); 1325 tv.tv_sec = 3 * sc->sc_advbase; 1326 tv.tv_usec = sc->sc_advskew * 1000000 / 256; 1327 switch (af) { 1328 #ifdef INET 1329 case AF_INET: 1330 callout_reset(&sc->sc_md_tmo, tvtohz(&tv), 1331 carp_master_down, sc); 1332 break; 1333 #endif 1334 #ifdef INET6 1335 case AF_INET6: 1336 callout_reset(&sc->sc_md6_tmo, tvtohz(&tv), 1337 carp_master_down, sc); 1338 break; 1339 #endif 1340 default: 1341 #ifdef INET 1342 if (sc->sc_naddrs) 1343 callout_reset(&sc->sc_md_tmo, tvtohz(&tv), 1344 carp_master_down, sc); 1345 #endif 1346 #ifdef INET6 1347 if (sc->sc_naddrs6) 1348 callout_reset(&sc->sc_md6_tmo, tvtohz(&tv), 1349 carp_master_down, sc); 1350 #endif 1351 break; 1352 } 1353 break; 1354 case MASTER: 1355 tv.tv_sec = sc->sc_advbase; 1356 tv.tv_usec = sc->sc_advskew * 1000000 / 256; 1357 callout_reset(&sc->sc_ad_tmo, tvtohz(&tv), 1358 carp_send_ad, sc); 1359 break; 1360 } 1361 } 1362 1363 /* 1364 * Setup multicast structures. 1365 */ 1366 static int 1367 carp_multicast_setup(struct carp_if *cif, sa_family_t sa) 1368 { 1369 struct ifnet *ifp = cif->cif_ifp; 1370 int error = 0; 1371 1372 switch (sa) { 1373 #ifdef INET 1374 case AF_INET: 1375 { 1376 struct ip_moptions *imo = &cif->cif_imo; 1377 struct in_mfilter *imf; 1378 struct in_addr addr; 1379 1380 if (ip_mfilter_first(&imo->imo_head) != NULL) 1381 return (0); 1382 1383 imf = ip_mfilter_alloc(M_WAITOK, 0, 0); 1384 ip_mfilter_init(&imo->imo_head); 1385 imo->imo_multicast_vif = -1; 1386 1387 addr.s_addr = htonl(INADDR_CARP_GROUP); 1388 if ((error = in_joingroup(ifp, &addr, NULL, 1389 &imf->imf_inm)) != 0) { 1390 ip_mfilter_free(imf); 1391 break; 1392 } 1393 1394 ip_mfilter_insert(&imo->imo_head, imf); 1395 imo->imo_multicast_ifp = ifp; 1396 imo->imo_multicast_ttl = CARP_DFLTTL; 1397 imo->imo_multicast_loop = 0; 1398 break; 1399 } 1400 #endif 1401 #ifdef INET6 1402 case AF_INET6: 1403 { 1404 struct ip6_moptions *im6o = &cif->cif_im6o; 1405 struct in6_mfilter *im6f[2]; 1406 struct in6_addr in6; 1407 1408 if (ip6_mfilter_first(&im6o->im6o_head)) 1409 return (0); 1410 1411 im6f[0] = ip6_mfilter_alloc(M_WAITOK, 0, 0); 1412 im6f[1] = ip6_mfilter_alloc(M_WAITOK, 0, 0); 1413 1414 ip6_mfilter_init(&im6o->im6o_head); 1415 im6o->im6o_multicast_hlim = CARP_DFLTTL; 1416 im6o->im6o_multicast_ifp = ifp; 1417 1418 /* Join IPv6 CARP multicast group. */ 1419 bzero(&in6, sizeof(in6)); 1420 in6.s6_addr16[0] = htons(0xff02); 1421 in6.s6_addr8[15] = 0x12; 1422 if ((error = in6_setscope(&in6, ifp, NULL)) != 0) { 1423 ip6_mfilter_free(im6f[0]); 1424 ip6_mfilter_free(im6f[1]); 1425 break; 1426 } 1427 if ((error = in6_joingroup(ifp, &in6, NULL, &im6f[0]->im6f_in6m, 0)) != 0) { 1428 ip6_mfilter_free(im6f[0]); 1429 ip6_mfilter_free(im6f[1]); 1430 break; 1431 } 1432 1433 /* Join solicited multicast address. */ 1434 bzero(&in6, sizeof(in6)); 1435 in6.s6_addr16[0] = htons(0xff02); 1436 in6.s6_addr32[1] = 0; 1437 in6.s6_addr32[2] = htonl(1); 1438 in6.s6_addr32[3] = 0; 1439 in6.s6_addr8[12] = 0xff; 1440 1441 if ((error = in6_setscope(&in6, ifp, NULL)) != 0) { 1442 ip6_mfilter_free(im6f[0]); 1443 ip6_mfilter_free(im6f[1]); 1444 break; 1445 } 1446 1447 if ((error = in6_joingroup(ifp, &in6, NULL, &im6f[1]->im6f_in6m, 0)) != 0) { 1448 in6_leavegroup(im6f[0]->im6f_in6m, NULL); 1449 ip6_mfilter_free(im6f[0]); 1450 ip6_mfilter_free(im6f[1]); 1451 break; 1452 } 1453 ip6_mfilter_insert(&im6o->im6o_head, im6f[0]); 1454 ip6_mfilter_insert(&im6o->im6o_head, im6f[1]); 1455 break; 1456 } 1457 #endif 1458 } 1459 1460 return (error); 1461 } 1462 1463 /* 1464 * Free multicast structures. 1465 */ 1466 static void 1467 carp_multicast_cleanup(struct carp_if *cif, sa_family_t sa) 1468 { 1469 #ifdef INET 1470 struct ip_moptions *imo = &cif->cif_imo; 1471 struct in_mfilter *imf; 1472 #endif 1473 #ifdef INET6 1474 struct ip6_moptions *im6o = &cif->cif_im6o; 1475 struct in6_mfilter *im6f; 1476 #endif 1477 sx_assert(&carp_sx, SA_XLOCKED); 1478 1479 switch (sa) { 1480 #ifdef INET 1481 case AF_INET: 1482 if (cif->cif_naddrs != 0) 1483 break; 1484 1485 while ((imf = ip_mfilter_first(&imo->imo_head)) != NULL) { 1486 ip_mfilter_remove(&imo->imo_head, imf); 1487 in_leavegroup(imf->imf_inm, NULL); 1488 ip_mfilter_free(imf); 1489 } 1490 break; 1491 #endif 1492 #ifdef INET6 1493 case AF_INET6: 1494 if (cif->cif_naddrs6 != 0) 1495 break; 1496 1497 while ((im6f = ip6_mfilter_first(&im6o->im6o_head)) != NULL) { 1498 ip6_mfilter_remove(&im6o->im6o_head, im6f); 1499 in6_leavegroup(im6f->im6f_in6m, NULL); 1500 ip6_mfilter_free(im6f); 1501 } 1502 break; 1503 #endif 1504 } 1505 } 1506 1507 int 1508 carp_output(struct ifnet *ifp, struct mbuf *m, const struct sockaddr *sa) 1509 { 1510 struct m_tag *mtag; 1511 struct carp_softc *sc; 1512 1513 if (!sa) 1514 return (0); 1515 1516 switch (sa->sa_family) { 1517 #ifdef INET 1518 case AF_INET: 1519 break; 1520 #endif 1521 #ifdef INET6 1522 case AF_INET6: 1523 break; 1524 #endif 1525 default: 1526 return (0); 1527 } 1528 1529 mtag = m_tag_find(m, PACKET_TAG_CARP, NULL); 1530 if (mtag == NULL) 1531 return (0); 1532 1533 bcopy(mtag + 1, &sc, sizeof(sc)); 1534 1535 /* Set the source MAC address to the Virtual Router MAC Address. */ 1536 switch (ifp->if_type) { 1537 case IFT_ETHER: 1538 case IFT_BRIDGE: 1539 case IFT_L2VLAN: { 1540 struct ether_header *eh; 1541 1542 eh = mtod(m, struct ether_header *); 1543 eh->ether_shost[0] = 0; 1544 eh->ether_shost[1] = 0; 1545 eh->ether_shost[2] = 0x5e; 1546 eh->ether_shost[3] = 0; 1547 eh->ether_shost[4] = 1; 1548 eh->ether_shost[5] = sc->sc_vhid; 1549 } 1550 break; 1551 default: 1552 printf("%s: carp is not supported for the %d interface type\n", 1553 ifp->if_xname, ifp->if_type); 1554 return (EOPNOTSUPP); 1555 } 1556 1557 return (0); 1558 } 1559 1560 static struct carp_softc* 1561 carp_alloc(struct ifnet *ifp) 1562 { 1563 struct carp_softc *sc; 1564 struct carp_if *cif; 1565 1566 sx_assert(&carp_sx, SA_XLOCKED); 1567 1568 if ((cif = ifp->if_carp) == NULL) 1569 cif = carp_alloc_if(ifp); 1570 1571 sc = malloc(sizeof(*sc), M_CARP, M_WAITOK|M_ZERO); 1572 1573 sc->sc_advbase = CARP_DFLTINTV; 1574 sc->sc_vhid = -1; /* required setting */ 1575 sc->sc_init_counter = 1; 1576 sc->sc_state = INIT; 1577 1578 sc->sc_ifasiz = sizeof(struct ifaddr *); 1579 sc->sc_ifas = malloc(sc->sc_ifasiz, M_CARP, M_WAITOK|M_ZERO); 1580 sc->sc_carpdev = ifp; 1581 1582 CARP_LOCK_INIT(sc); 1583 #ifdef INET 1584 callout_init_mtx(&sc->sc_md_tmo, &sc->sc_mtx, CALLOUT_RETURNUNLOCKED); 1585 #endif 1586 #ifdef INET6 1587 callout_init_mtx(&sc->sc_md6_tmo, &sc->sc_mtx, CALLOUT_RETURNUNLOCKED); 1588 #endif 1589 callout_init_mtx(&sc->sc_ad_tmo, &sc->sc_mtx, CALLOUT_RETURNUNLOCKED); 1590 1591 CIF_LOCK(cif); 1592 TAILQ_INSERT_TAIL(&cif->cif_vrs, sc, sc_list); 1593 CIF_UNLOCK(cif); 1594 1595 mtx_lock(&carp_mtx); 1596 LIST_INSERT_HEAD(&carp_list, sc, sc_next); 1597 mtx_unlock(&carp_mtx); 1598 1599 return (sc); 1600 } 1601 1602 static void 1603 carp_grow_ifas(struct carp_softc *sc) 1604 { 1605 struct ifaddr **new; 1606 1607 new = malloc(sc->sc_ifasiz * 2, M_CARP, M_WAITOK | M_ZERO); 1608 CARP_LOCK(sc); 1609 bcopy(sc->sc_ifas, new, sc->sc_ifasiz); 1610 free(sc->sc_ifas, M_CARP); 1611 sc->sc_ifas = new; 1612 sc->sc_ifasiz *= 2; 1613 CARP_UNLOCK(sc); 1614 } 1615 1616 static void 1617 carp_destroy(struct carp_softc *sc) 1618 { 1619 struct ifnet *ifp = sc->sc_carpdev; 1620 struct carp_if *cif = ifp->if_carp; 1621 1622 sx_assert(&carp_sx, SA_XLOCKED); 1623 1624 if (sc->sc_suppress) 1625 carp_demote_adj(-V_carp_ifdown_adj, "vhid removed"); 1626 CARP_UNLOCK(sc); 1627 1628 CIF_LOCK(cif); 1629 TAILQ_REMOVE(&cif->cif_vrs, sc, sc_list); 1630 CIF_UNLOCK(cif); 1631 1632 mtx_lock(&carp_mtx); 1633 LIST_REMOVE(sc, sc_next); 1634 mtx_unlock(&carp_mtx); 1635 1636 callout_drain(&sc->sc_ad_tmo); 1637 #ifdef INET 1638 callout_drain(&sc->sc_md_tmo); 1639 #endif 1640 #ifdef INET6 1641 callout_drain(&sc->sc_md6_tmo); 1642 #endif 1643 CARP_LOCK_DESTROY(sc); 1644 1645 free(sc->sc_ifas, M_CARP); 1646 free(sc, M_CARP); 1647 } 1648 1649 static struct carp_if* 1650 carp_alloc_if(struct ifnet *ifp) 1651 { 1652 struct carp_if *cif; 1653 int error; 1654 1655 cif = malloc(sizeof(*cif), M_CARP, M_WAITOK|M_ZERO); 1656 1657 if ((error = ifpromisc(ifp, 1)) != 0) 1658 printf("%s: ifpromisc(%s) failed: %d\n", 1659 __func__, ifp->if_xname, error); 1660 else 1661 cif->cif_flags |= CIF_PROMISC; 1662 1663 CIF_LOCK_INIT(cif); 1664 cif->cif_ifp = ifp; 1665 TAILQ_INIT(&cif->cif_vrs); 1666 1667 IF_ADDR_WLOCK(ifp); 1668 ifp->if_carp = cif; 1669 if_ref(ifp); 1670 IF_ADDR_WUNLOCK(ifp); 1671 1672 return (cif); 1673 } 1674 1675 static void 1676 carp_free_if(struct carp_if *cif) 1677 { 1678 struct ifnet *ifp = cif->cif_ifp; 1679 1680 CIF_LOCK_ASSERT(cif); 1681 KASSERT(TAILQ_EMPTY(&cif->cif_vrs), ("%s: softc list not empty", 1682 __func__)); 1683 1684 IF_ADDR_WLOCK(ifp); 1685 ifp->if_carp = NULL; 1686 IF_ADDR_WUNLOCK(ifp); 1687 1688 CIF_LOCK_DESTROY(cif); 1689 1690 if (cif->cif_flags & CIF_PROMISC) 1691 ifpromisc(ifp, 0); 1692 if_rele(ifp); 1693 1694 free(cif, M_CARP); 1695 } 1696 1697 static void 1698 carp_carprcp(struct carpreq *carpr, struct carp_softc *sc, int priv) 1699 { 1700 1701 CARP_LOCK(sc); 1702 carpr->carpr_state = sc->sc_state; 1703 carpr->carpr_vhid = sc->sc_vhid; 1704 carpr->carpr_advbase = sc->sc_advbase; 1705 carpr->carpr_advskew = sc->sc_advskew; 1706 if (priv) 1707 bcopy(sc->sc_key, carpr->carpr_key, sizeof(carpr->carpr_key)); 1708 else 1709 bzero(carpr->carpr_key, sizeof(carpr->carpr_key)); 1710 CARP_UNLOCK(sc); 1711 } 1712 1713 int 1714 carp_ioctl(struct ifreq *ifr, u_long cmd, struct thread *td) 1715 { 1716 struct carpreq carpr; 1717 struct ifnet *ifp; 1718 struct carp_softc *sc = NULL; 1719 int error = 0, locked = 0; 1720 1721 if ((error = copyin(ifr_data_get_ptr(ifr), &carpr, sizeof carpr))) 1722 return (error); 1723 1724 ifp = ifunit_ref(ifr->ifr_name); 1725 if (ifp == NULL) 1726 return (ENXIO); 1727 1728 switch (ifp->if_type) { 1729 case IFT_ETHER: 1730 case IFT_L2VLAN: 1731 case IFT_BRIDGE: 1732 break; 1733 default: 1734 error = EOPNOTSUPP; 1735 goto out; 1736 } 1737 1738 if ((ifp->if_flags & IFF_MULTICAST) == 0) { 1739 error = EADDRNOTAVAIL; 1740 goto out; 1741 } 1742 1743 sx_xlock(&carp_sx); 1744 switch (cmd) { 1745 case SIOCSVH: 1746 if ((error = priv_check(td, PRIV_NETINET_CARP))) 1747 break; 1748 if (carpr.carpr_vhid <= 0 || carpr.carpr_vhid > CARP_MAXVHID || 1749 carpr.carpr_advbase < 0 || carpr.carpr_advskew < 0) { 1750 error = EINVAL; 1751 break; 1752 } 1753 1754 if (ifp->if_carp) { 1755 IFNET_FOREACH_CARP(ifp, sc) 1756 if (sc->sc_vhid == carpr.carpr_vhid) 1757 break; 1758 } 1759 if (sc == NULL) { 1760 sc = carp_alloc(ifp); 1761 CARP_LOCK(sc); 1762 sc->sc_vhid = carpr.carpr_vhid; 1763 LLADDR(&sc->sc_addr)[0] = 0; 1764 LLADDR(&sc->sc_addr)[1] = 0; 1765 LLADDR(&sc->sc_addr)[2] = 0x5e; 1766 LLADDR(&sc->sc_addr)[3] = 0; 1767 LLADDR(&sc->sc_addr)[4] = 1; 1768 LLADDR(&sc->sc_addr)[5] = sc->sc_vhid; 1769 } else 1770 CARP_LOCK(sc); 1771 locked = 1; 1772 if (carpr.carpr_advbase > 0) { 1773 if (carpr.carpr_advbase > 255 || 1774 carpr.carpr_advbase < CARP_DFLTINTV) { 1775 error = EINVAL; 1776 break; 1777 } 1778 sc->sc_advbase = carpr.carpr_advbase; 1779 } 1780 if (carpr.carpr_advskew >= 255) { 1781 error = EINVAL; 1782 break; 1783 } 1784 sc->sc_advskew = carpr.carpr_advskew; 1785 if (carpr.carpr_key[0] != '\0') { 1786 bcopy(carpr.carpr_key, sc->sc_key, sizeof(sc->sc_key)); 1787 carp_hmac_prepare(sc); 1788 } 1789 if (sc->sc_state != INIT && 1790 carpr.carpr_state != sc->sc_state) { 1791 switch (carpr.carpr_state) { 1792 case BACKUP: 1793 callout_stop(&sc->sc_ad_tmo); 1794 carp_set_state(sc, BACKUP, 1795 "user requested via ifconfig"); 1796 carp_setrun(sc, 0); 1797 carp_delroute(sc); 1798 break; 1799 case MASTER: 1800 carp_master_down_locked(sc, 1801 "user requested via ifconfig"); 1802 break; 1803 default: 1804 break; 1805 } 1806 } 1807 break; 1808 1809 case SIOCGVH: 1810 { 1811 int priveleged; 1812 1813 if (carpr.carpr_vhid < 0 || carpr.carpr_vhid > CARP_MAXVHID) { 1814 error = EINVAL; 1815 break; 1816 } 1817 if (carpr.carpr_count < 1) { 1818 error = EMSGSIZE; 1819 break; 1820 } 1821 if (ifp->if_carp == NULL) { 1822 error = ENOENT; 1823 break; 1824 } 1825 1826 priveleged = (priv_check(td, PRIV_NETINET_CARP) == 0); 1827 if (carpr.carpr_vhid != 0) { 1828 IFNET_FOREACH_CARP(ifp, sc) 1829 if (sc->sc_vhid == carpr.carpr_vhid) 1830 break; 1831 if (sc == NULL) { 1832 error = ENOENT; 1833 break; 1834 } 1835 carp_carprcp(&carpr, sc, priveleged); 1836 error = copyout(&carpr, ifr_data_get_ptr(ifr), 1837 sizeof(carpr)); 1838 } else { 1839 int i, count; 1840 1841 count = 0; 1842 IFNET_FOREACH_CARP(ifp, sc) 1843 count++; 1844 1845 if (count > carpr.carpr_count) { 1846 CIF_UNLOCK(ifp->if_carp); 1847 error = EMSGSIZE; 1848 break; 1849 } 1850 1851 i = 0; 1852 IFNET_FOREACH_CARP(ifp, sc) { 1853 carp_carprcp(&carpr, sc, priveleged); 1854 carpr.carpr_count = count; 1855 error = copyout(&carpr, 1856 (char *)ifr_data_get_ptr(ifr) + 1857 (i * sizeof(carpr)), sizeof(carpr)); 1858 if (error) { 1859 CIF_UNLOCK(ifp->if_carp); 1860 break; 1861 } 1862 i++; 1863 } 1864 } 1865 break; 1866 } 1867 default: 1868 error = EINVAL; 1869 } 1870 sx_xunlock(&carp_sx); 1871 1872 out: 1873 if (locked) 1874 CARP_UNLOCK(sc); 1875 if_rele(ifp); 1876 1877 return (error); 1878 } 1879 1880 static int 1881 carp_get_vhid(struct ifaddr *ifa) 1882 { 1883 1884 if (ifa == NULL || ifa->ifa_carp == NULL) 1885 return (0); 1886 1887 return (ifa->ifa_carp->sc_vhid); 1888 } 1889 1890 int 1891 carp_attach(struct ifaddr *ifa, int vhid) 1892 { 1893 struct ifnet *ifp = ifa->ifa_ifp; 1894 struct carp_if *cif = ifp->if_carp; 1895 struct carp_softc *sc; 1896 int index, error; 1897 1898 KASSERT(ifa->ifa_carp == NULL, ("%s: ifa %p attached", __func__, ifa)); 1899 1900 switch (ifa->ifa_addr->sa_family) { 1901 #ifdef INET 1902 case AF_INET: 1903 #endif 1904 #ifdef INET6 1905 case AF_INET6: 1906 #endif 1907 break; 1908 default: 1909 return (EPROTOTYPE); 1910 } 1911 1912 sx_xlock(&carp_sx); 1913 if (ifp->if_carp == NULL) { 1914 sx_xunlock(&carp_sx); 1915 return (ENOPROTOOPT); 1916 } 1917 1918 IFNET_FOREACH_CARP(ifp, sc) 1919 if (sc->sc_vhid == vhid) 1920 break; 1921 if (sc == NULL) { 1922 sx_xunlock(&carp_sx); 1923 return (ENOENT); 1924 } 1925 1926 error = carp_multicast_setup(cif, ifa->ifa_addr->sa_family); 1927 if (error) { 1928 CIF_FREE(cif); 1929 sx_xunlock(&carp_sx); 1930 return (error); 1931 } 1932 1933 index = sc->sc_naddrs + sc->sc_naddrs6 + 1; 1934 if (index > sc->sc_ifasiz / sizeof(struct ifaddr *)) 1935 carp_grow_ifas(sc); 1936 1937 switch (ifa->ifa_addr->sa_family) { 1938 #ifdef INET 1939 case AF_INET: 1940 cif->cif_naddrs++; 1941 sc->sc_naddrs++; 1942 break; 1943 #endif 1944 #ifdef INET6 1945 case AF_INET6: 1946 cif->cif_naddrs6++; 1947 sc->sc_naddrs6++; 1948 break; 1949 #endif 1950 } 1951 1952 ifa_ref(ifa); 1953 1954 CARP_LOCK(sc); 1955 sc->sc_ifas[index - 1] = ifa; 1956 ifa->ifa_carp = sc; 1957 carp_hmac_prepare(sc); 1958 carp_sc_state(sc); 1959 CARP_UNLOCK(sc); 1960 1961 sx_xunlock(&carp_sx); 1962 1963 return (0); 1964 } 1965 1966 void 1967 carp_detach(struct ifaddr *ifa, bool keep_cif) 1968 { 1969 struct ifnet *ifp = ifa->ifa_ifp; 1970 struct carp_if *cif = ifp->if_carp; 1971 struct carp_softc *sc = ifa->ifa_carp; 1972 int i, index; 1973 1974 KASSERT(sc != NULL, ("%s: %p not attached", __func__, ifa)); 1975 1976 sx_xlock(&carp_sx); 1977 1978 CARP_LOCK(sc); 1979 /* Shift array. */ 1980 index = sc->sc_naddrs + sc->sc_naddrs6; 1981 for (i = 0; i < index; i++) 1982 if (sc->sc_ifas[i] == ifa) 1983 break; 1984 KASSERT(i < index, ("%s: %p no backref", __func__, ifa)); 1985 for (; i < index - 1; i++) 1986 sc->sc_ifas[i] = sc->sc_ifas[i+1]; 1987 sc->sc_ifas[index - 1] = NULL; 1988 1989 switch (ifa->ifa_addr->sa_family) { 1990 #ifdef INET 1991 case AF_INET: 1992 cif->cif_naddrs--; 1993 sc->sc_naddrs--; 1994 break; 1995 #endif 1996 #ifdef INET6 1997 case AF_INET6: 1998 cif->cif_naddrs6--; 1999 sc->sc_naddrs6--; 2000 break; 2001 #endif 2002 } 2003 2004 carp_ifa_delroute(ifa); 2005 carp_multicast_cleanup(cif, ifa->ifa_addr->sa_family); 2006 2007 ifa->ifa_carp = NULL; 2008 ifa_free(ifa); 2009 2010 carp_hmac_prepare(sc); 2011 carp_sc_state(sc); 2012 2013 if (!keep_cif && sc->sc_naddrs == 0 && sc->sc_naddrs6 == 0) 2014 carp_destroy(sc); 2015 else 2016 CARP_UNLOCK(sc); 2017 2018 if (!keep_cif) 2019 CIF_FREE(cif); 2020 2021 sx_xunlock(&carp_sx); 2022 } 2023 2024 static void 2025 carp_set_state(struct carp_softc *sc, int state, const char *reason) 2026 { 2027 2028 CARP_LOCK_ASSERT(sc); 2029 2030 if (sc->sc_state != state) { 2031 const char *carp_states[] = { CARP_STATES }; 2032 char subsys[IFNAMSIZ+5]; 2033 2034 snprintf(subsys, IFNAMSIZ+5, "%u@%s", sc->sc_vhid, 2035 sc->sc_carpdev->if_xname); 2036 2037 CARP_LOG("%s: %s -> %s (%s)\n", subsys, 2038 carp_states[sc->sc_state], carp_states[state], reason); 2039 2040 sc->sc_state = state; 2041 2042 devctl_notify("CARP", subsys, carp_states[state], NULL); 2043 } 2044 } 2045 2046 static void 2047 carp_linkstate(struct ifnet *ifp) 2048 { 2049 struct carp_softc *sc; 2050 2051 CIF_LOCK(ifp->if_carp); 2052 IFNET_FOREACH_CARP(ifp, sc) { 2053 CARP_LOCK(sc); 2054 carp_sc_state(sc); 2055 CARP_UNLOCK(sc); 2056 } 2057 CIF_UNLOCK(ifp->if_carp); 2058 } 2059 2060 static void 2061 carp_sc_state(struct carp_softc *sc) 2062 { 2063 2064 CARP_LOCK_ASSERT(sc); 2065 2066 if (sc->sc_carpdev->if_link_state != LINK_STATE_UP || 2067 !(sc->sc_carpdev->if_flags & IFF_UP) || 2068 !V_carp_allow) { 2069 callout_stop(&sc->sc_ad_tmo); 2070 #ifdef INET 2071 callout_stop(&sc->sc_md_tmo); 2072 #endif 2073 #ifdef INET6 2074 callout_stop(&sc->sc_md6_tmo); 2075 #endif 2076 carp_set_state(sc, INIT, "hardware interface down"); 2077 carp_setrun(sc, 0); 2078 if (!sc->sc_suppress) 2079 carp_demote_adj(V_carp_ifdown_adj, "interface down"); 2080 sc->sc_suppress = 1; 2081 } else { 2082 carp_set_state(sc, INIT, "hardware interface up"); 2083 carp_setrun(sc, 0); 2084 if (sc->sc_suppress) 2085 carp_demote_adj(-V_carp_ifdown_adj, "interface up"); 2086 sc->sc_suppress = 0; 2087 } 2088 } 2089 2090 static void 2091 carp_demote_adj(int adj, char *reason) 2092 { 2093 atomic_add_int(&V_carp_demotion, adj); 2094 CARP_LOG("demoted by %d to %d (%s)\n", adj, V_carp_demotion, reason); 2095 taskqueue_enqueue(taskqueue_swi, &carp_sendall_task); 2096 } 2097 2098 static int 2099 carp_allow_sysctl(SYSCTL_HANDLER_ARGS) 2100 { 2101 int new, error; 2102 struct carp_softc *sc; 2103 2104 new = V_carp_allow; 2105 error = sysctl_handle_int(oidp, &new, 0, req); 2106 if (error || !req->newptr) 2107 return (error); 2108 2109 if (V_carp_allow != new) { 2110 V_carp_allow = new; 2111 2112 mtx_lock(&carp_mtx); 2113 LIST_FOREACH(sc, &carp_list, sc_next) { 2114 CARP_LOCK(sc); 2115 if (curvnet == sc->sc_carpdev->if_vnet) 2116 carp_sc_state(sc); 2117 CARP_UNLOCK(sc); 2118 } 2119 mtx_unlock(&carp_mtx); 2120 } 2121 2122 return (0); 2123 } 2124 2125 static int 2126 carp_dscp_sysctl(SYSCTL_HANDLER_ARGS) 2127 { 2128 int new, error; 2129 2130 new = V_carp_dscp; 2131 error = sysctl_handle_int(oidp, &new, 0, req); 2132 if (error || !req->newptr) 2133 return (error); 2134 2135 if (new < 0 || new > 63) 2136 return (EINVAL); 2137 2138 V_carp_dscp = new; 2139 2140 return (0); 2141 } 2142 2143 static int 2144 carp_demote_adj_sysctl(SYSCTL_HANDLER_ARGS) 2145 { 2146 int new, error; 2147 2148 new = V_carp_demotion; 2149 error = sysctl_handle_int(oidp, &new, 0, req); 2150 if (error || !req->newptr) 2151 return (error); 2152 2153 carp_demote_adj(new, "sysctl"); 2154 2155 return (0); 2156 } 2157 2158 #ifdef INET 2159 extern struct domain inetdomain; 2160 static struct protosw in_carp_protosw = { 2161 .pr_type = SOCK_RAW, 2162 .pr_domain = &inetdomain, 2163 .pr_protocol = IPPROTO_CARP, 2164 .pr_flags = PR_ATOMIC|PR_ADDR, 2165 .pr_input = carp_input, 2166 .pr_output = rip_output, 2167 .pr_ctloutput = rip_ctloutput, 2168 .pr_usrreqs = &rip_usrreqs 2169 }; 2170 #endif 2171 2172 #ifdef INET6 2173 extern struct domain inet6domain; 2174 static struct protosw in6_carp_protosw = { 2175 .pr_type = SOCK_RAW, 2176 .pr_domain = &inet6domain, 2177 .pr_protocol = IPPROTO_CARP, 2178 .pr_flags = PR_ATOMIC|PR_ADDR, 2179 .pr_input = carp6_input, 2180 .pr_output = rip6_output, 2181 .pr_ctloutput = rip6_ctloutput, 2182 .pr_usrreqs = &rip6_usrreqs 2183 }; 2184 #endif 2185 2186 static void 2187 carp_mod_cleanup(void) 2188 { 2189 2190 #ifdef INET 2191 if (proto_reg[CARP_INET] == 0) { 2192 (void)ipproto_unregister(IPPROTO_CARP); 2193 pf_proto_unregister(PF_INET, IPPROTO_CARP, SOCK_RAW); 2194 proto_reg[CARP_INET] = -1; 2195 } 2196 carp_iamatch_p = NULL; 2197 #endif 2198 #ifdef INET6 2199 if (proto_reg[CARP_INET6] == 0) { 2200 (void)ip6proto_unregister(IPPROTO_CARP); 2201 pf_proto_unregister(PF_INET6, IPPROTO_CARP, SOCK_RAW); 2202 proto_reg[CARP_INET6] = -1; 2203 } 2204 carp_iamatch6_p = NULL; 2205 carp_macmatch6_p = NULL; 2206 #endif 2207 carp_ioctl_p = NULL; 2208 carp_attach_p = NULL; 2209 carp_detach_p = NULL; 2210 carp_get_vhid_p = NULL; 2211 carp_linkstate_p = NULL; 2212 carp_forus_p = NULL; 2213 carp_output_p = NULL; 2214 carp_demote_adj_p = NULL; 2215 carp_master_p = NULL; 2216 mtx_unlock(&carp_mtx); 2217 taskqueue_drain(taskqueue_swi, &carp_sendall_task); 2218 mtx_destroy(&carp_mtx); 2219 sx_destroy(&carp_sx); 2220 } 2221 2222 static int 2223 carp_mod_load(void) 2224 { 2225 int err; 2226 2227 mtx_init(&carp_mtx, "carp_mtx", NULL, MTX_DEF); 2228 sx_init(&carp_sx, "carp_sx"); 2229 LIST_INIT(&carp_list); 2230 carp_get_vhid_p = carp_get_vhid; 2231 carp_forus_p = carp_forus; 2232 carp_output_p = carp_output; 2233 carp_linkstate_p = carp_linkstate; 2234 carp_ioctl_p = carp_ioctl; 2235 carp_attach_p = carp_attach; 2236 carp_detach_p = carp_detach; 2237 carp_demote_adj_p = carp_demote_adj; 2238 carp_master_p = carp_master; 2239 #ifdef INET6 2240 carp_iamatch6_p = carp_iamatch6; 2241 carp_macmatch6_p = carp_macmatch6; 2242 proto_reg[CARP_INET6] = pf_proto_register(PF_INET6, 2243 (struct protosw *)&in6_carp_protosw); 2244 if (proto_reg[CARP_INET6]) { 2245 printf("carp: error %d attaching to PF_INET6\n", 2246 proto_reg[CARP_INET6]); 2247 carp_mod_cleanup(); 2248 return (proto_reg[CARP_INET6]); 2249 } 2250 err = ip6proto_register(IPPROTO_CARP); 2251 if (err) { 2252 printf("carp: error %d registering with INET6\n", err); 2253 carp_mod_cleanup(); 2254 return (err); 2255 } 2256 #endif 2257 #ifdef INET 2258 carp_iamatch_p = carp_iamatch; 2259 proto_reg[CARP_INET] = pf_proto_register(PF_INET, &in_carp_protosw); 2260 if (proto_reg[CARP_INET]) { 2261 printf("carp: error %d attaching to PF_INET\n", 2262 proto_reg[CARP_INET]); 2263 carp_mod_cleanup(); 2264 return (proto_reg[CARP_INET]); 2265 } 2266 err = ipproto_register(IPPROTO_CARP); 2267 if (err) { 2268 printf("carp: error %d registering with INET\n", err); 2269 carp_mod_cleanup(); 2270 return (err); 2271 } 2272 #endif 2273 return (0); 2274 } 2275 2276 static int 2277 carp_modevent(module_t mod, int type, void *data) 2278 { 2279 switch (type) { 2280 case MOD_LOAD: 2281 return carp_mod_load(); 2282 /* NOTREACHED */ 2283 case MOD_UNLOAD: 2284 mtx_lock(&carp_mtx); 2285 if (LIST_EMPTY(&carp_list)) 2286 carp_mod_cleanup(); 2287 else { 2288 mtx_unlock(&carp_mtx); 2289 return (EBUSY); 2290 } 2291 break; 2292 2293 default: 2294 return (EINVAL); 2295 } 2296 2297 return (0); 2298 } 2299 2300 static moduledata_t carp_mod = { 2301 "carp", 2302 carp_modevent, 2303 0 2304 }; 2305 2306 DECLARE_MODULE(carp, carp_mod, SI_SUB_PROTO_DOMAIN, SI_ORDER_ANY); 2307