gems-kernel/source/THIRDPARTY/xnu/bsd/netinet/in.c

2425 lines
63 KiB
C
Raw Normal View History

2024-06-03 11:29:39 -05:00
/*
* Copyright (c) 2000-2021 Apple Inc. All rights reserved.
*
* @APPLE_OSREFERENCE_LICENSE_HEADER_START@
*
* This file contains Original Code and/or Modifications of Original Code
* as defined in and that are subject to the Apple Public Source License
* Version 2.0 (the 'License'). You may not use this file except in
* compliance with the License. The rights granted to you under the License
* may not be used to create, or enable the creation or redistribution of,
* unlawful or unlicensed copies of an Apple operating system, or to
* circumvent, violate, or enable the circumvention or violation of, any
* terms of an Apple operating system software license agreement.
*
* Please obtain a copy of the License at
* http://www.opensource.apple.com/apsl/ and read it before using this file.
*
* The Original Code and all software distributed under the License are
* distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
* EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
* INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
* Please see the License for the specific language governing rights and
* limitations under the License.
*
* @APPLE_OSREFERENCE_LICENSE_HEADER_END@
*/
/*
* Copyright (c) 1982, 1986, 1991, 1993
* The Regents of the University of California. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* This product includes software developed by the University of
* California, Berkeley and its contributors.
* 4. Neither the name of the University nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* @(#)in.c 8.4 (Berkeley) 1/9/95
*/
#include <sys/param.h>
#include <sys/systm.h>
#include <sys/sockio.h>
#include <sys/socketvar.h>
#include <sys/malloc.h>
#include <sys/proc.h>
#include <sys/socket.h>
#include <sys/kernel.h>
#include <sys/sysctl.h>
#include <sys/kern_event.h>
#include <sys/syslog.h>
#include <sys/mcache.h>
#include <sys/protosw.h>
#include <sys/file.h>
#include <kern/zalloc.h>
#include <pexpert/pexpert.h>
#include <os/log.h>
#include <net/if.h>
#include <net/if_types.h>
#include <net/route.h>
#include <net/kpi_protocol.h>
#include <net/dlil.h>
#if PF
#include <net/pfvar.h>
#endif /* PF */
#include <netinet/in.h>
#include <netinet/in_var.h>
#include <netinet/in_pcb.h>
#include <netinet/igmp_var.h>
#include <netinet/ip_var.h>
#include <netinet/tcp.h>
#include <netinet/tcp_timer.h>
#include <netinet/tcp_var.h>
#include <net/sockaddr_utils.h>
static int inctl_associd(struct socket *, u_long, caddr_t);
static int inctl_connid(struct socket *, u_long, caddr_t);
static int inctl_conninfo(struct socket *, u_long, caddr_t);
static int inctl_autoaddr(struct ifnet *, struct ifreq *);
static int inctl_arpipll(struct ifnet *, struct ifreq *);
static int inctl_setrouter(struct ifnet *, struct ifreq *);
static int inctl_ifaddr(struct ifnet *, struct in_ifaddr *, u_long,
struct ifreq *);
static int inctl_ifdstaddr(struct ifnet *, struct in_ifaddr *, u_long,
struct ifreq *);
static int inctl_ifbrdaddr(struct ifnet *, struct in_ifaddr *, u_long,
struct ifreq *);
static int inctl_ifnetmask(struct ifnet *, struct in_ifaddr *, u_long,
struct ifreq *);
static void in_socktrim(struct sockaddr_in *);
static int in_ifinit(struct ifnet *, struct in_ifaddr *,
struct sockaddr_in *, int);
#define IA_HASH_INIT(ia) { \
(ia)->ia_hash.tqe_next = (void *)(uintptr_t)-1; \
(ia)->ia_hash.tqe_prev = (void *)(uintptr_t)-1; \
}
#define IA_IS_HASHED(ia) \
(!((ia)->ia_hash.tqe_next == (void *)(uintptr_t)-1 || \
(ia)->ia_hash.tqe_prev == (void *)(uintptr_t)-1))
static void in_iahash_remove(struct in_ifaddr *);
static void in_iahash_insert(struct in_ifaddr *);
static void in_iahash_insert_ptp(struct in_ifaddr *);
static struct in_ifaddr *in_ifaddr_alloc(void);
static void in_ifaddr_free(struct ifaddr *);
static int in_getassocids(struct socket *, uint32_t *, user_addr_t);
static int in_getconnids(struct socket *, sae_associd_t, uint32_t *, user_addr_t);
static int subnetsarelocal = 0;
SYSCTL_INT(_net_inet_ip, OID_AUTO, subnets_are_local,
CTLFLAG_RW | CTLFLAG_LOCKED, &subnetsarelocal, 0, "");
/* Track whether or not the SIOCARPIPLL ioctl has been called */
u_int32_t ipv4_ll_arp_aware = 0;
/*
* Return 1 if the address is
* - loopback
* - unicast or multicast link local
* - routed via a link level gateway
* - belongs to a directly connected (sub)net
*/
int
inaddr_local(struct in_addr in)
{
struct rtentry *rt;
struct sockaddr_in sin;
int local = 0;
if (ntohl(in.s_addr) == INADDR_LOOPBACK ||
IN_LINKLOCAL(ntohl(in.s_addr))) {
local = 1;
} else if (ntohl(in.s_addr) >= INADDR_UNSPEC_GROUP &&
ntohl(in.s_addr) <= INADDR_MAX_LOCAL_GROUP) {
local = 1;
} else {
sin.sin_family = AF_INET;
sin.sin_len = sizeof(sin);
sin.sin_addr = in;
rt = rtalloc1(SA(&sin), 0, 0);
if (rt != NULL) {
RT_LOCK_SPIN(rt);
if (rt->rt_gateway->sa_family == AF_LINK ||
(rt->rt_ifp->if_flags & IFF_LOOPBACK)) {
local = 1;
}
RT_UNLOCK(rt);
rtfree(rt);
} else {
local = in_localaddr(in);
}
}
return local;
}
/*
* Return 1 if an internet address is for a ``local'' host
* (one to which we have a connection). If subnetsarelocal
* is true, this includes other subnets of the local net,
* otherwise, it includes the directly-connected (sub)nets.
* The IPv4 link local prefix 169.254/16 is also included.
*/
int
in_localaddr(struct in_addr in)
{
u_int32_t i = ntohl(in.s_addr);
struct in_ifaddr *ia;
if (IN_LINKLOCAL(i)) {
return 1;
}
if (subnetsarelocal) {
lck_rw_lock_shared(&in_ifaddr_rwlock);
for (ia = in_ifaddrhead.tqh_first; ia != NULL;
ia = ia->ia_link.tqe_next) {
IFA_LOCK(&ia->ia_ifa);
if ((i & ia->ia_netmask) == ia->ia_net) {
IFA_UNLOCK(&ia->ia_ifa);
lck_rw_done(&in_ifaddr_rwlock);
return 1;
}
IFA_UNLOCK(&ia->ia_ifa);
}
lck_rw_done(&in_ifaddr_rwlock);
} else {
lck_rw_lock_shared(&in_ifaddr_rwlock);
for (ia = in_ifaddrhead.tqh_first; ia != NULL;
ia = ia->ia_link.tqe_next) {
IFA_LOCK(&ia->ia_ifa);
if ((i & ia->ia_subnetmask) == ia->ia_subnet) {
IFA_UNLOCK(&ia->ia_ifa);
lck_rw_done(&in_ifaddr_rwlock);
return 1;
}
IFA_UNLOCK(&ia->ia_ifa);
}
lck_rw_done(&in_ifaddr_rwlock);
}
return 0;
}
/*
* Determine whether an IP address is in a reserved set of addresses
* that may not be forwarded, or whether datagrams to that destination
* may be forwarded.
*/
boolean_t
in_canforward(struct in_addr in)
{
u_int32_t i = ntohl(in.s_addr);
u_int32_t net;
if (IN_EXPERIMENTAL(i) || IN_MULTICAST(i)) {
return FALSE;
}
if (IN_CLASSA(i)) {
net = i & IN_CLASSA_NET;
if (net == 0 || net == (IN_LOOPBACKNET << IN_CLASSA_NSHIFT)) {
return FALSE;
}
}
return TRUE;
}
/*
* Trim a mask in a sockaddr
*/
static void
in_socktrim(struct sockaddr_in *ap)
{
char *cplim = (char *)&ap->sin_addr;
char *cp = (char *)(&ap->sin_addr + 1);
ap->sin_len = 0;
while (--cp >= cplim) {
if (*cp) {
(ap)->sin_len = (uint8_t)(cp - (char *)(ap) + 1);
break;
}
}
}
static int in_interfaces; /* number of external internet interfaces */
static int
in_domifattach(struct ifnet *ifp)
{
int error = 0;
VERIFY(ifp != NULL);
if ((error = proto_plumb(PF_INET, ifp)) && error != EEXIST) {
log(LOG_ERR, "%s: proto_plumb returned %d if=%s\n",
__func__, error, if_name(ifp));
return error;
}
if (ifp->if_inetdata == NULL) {
ifp->if_inetdata = zalloc_permanent_type(struct in_ifextra);
error = 0;
} else if (error != EEXIST) {
/*
* Since the structure is never freed, we need to
* zero out its contents to avoid reusing stale data.
* A little redundant with allocation above, but it
* keeps the code simpler for all cases.
*/
IN_IFEXTRA(ifp)->netsig_len = 0;
bzero(IN_IFEXTRA(ifp)->netsig, sizeof(IN_IFEXTRA(ifp)->netsig));
}
return error;
}
static __attribute__((noinline)) int
inctl_associd(struct socket *so, u_long cmd, caddr_t data)
{
int error = 0;
union {
struct so_aidreq32 a32;
struct so_aidreq64 a64;
} u;
VERIFY(so != NULL);
switch (cmd) {
case SIOCGASSOCIDS32: /* struct so_aidreq32 */
bcopy(data, &u.a32, sizeof(u.a32));
error = in_getassocids(so, &u.a32.sar_cnt, u.a32.sar_aidp);
if (error == 0) {
bcopy(&u.a32, data, sizeof(u.a32));
}
break;
case SIOCGASSOCIDS64: /* struct so_aidreq64 */
bcopy(data, &u.a64, sizeof(u.a64));
error = in_getassocids(so, &u.a64.sar_cnt, (user_addr_t)u.a64.sar_aidp);
if (error == 0) {
bcopy(&u.a64, data, sizeof(u.a64));
}
break;
default:
VERIFY(0);
/* NOTREACHED */
}
return error;
}
static __attribute__((noinline)) int
inctl_connid(struct socket *so, u_long cmd, caddr_t data)
{
int error = 0;
union {
struct so_cidreq32 c32;
struct so_cidreq64 c64;
} u;
VERIFY(so != NULL);
switch (cmd) {
case SIOCGCONNIDS32: /* struct so_cidreq32 */
bcopy(data, &u.c32, sizeof(u.c32));
error = in_getconnids(so, u.c32.scr_aid, &u.c32.scr_cnt,
u.c32.scr_cidp);
if (error == 0) {
bcopy(&u.c32, data, sizeof(u.c32));
}
break;
case SIOCGCONNIDS64: /* struct so_cidreq64 */
bcopy(data, &u.c64, sizeof(u.c64));
error = in_getconnids(so, u.c64.scr_aid, &u.c64.scr_cnt,
(user_addr_t)u.c64.scr_cidp);
if (error == 0) {
bcopy(&u.c64, data, sizeof(u.c64));
}
break;
default:
VERIFY(0);
/* NOTREACHED */
}
return error;
}
static __attribute__((noinline)) int
inctl_conninfo(struct socket *so, u_long cmd, caddr_t data)
{
int error = 0;
union {
struct so_cinforeq32 ci32;
struct so_cinforeq64 ci64;
} u;
VERIFY(so != NULL);
switch (cmd) {
case SIOCGCONNINFO32: /* struct so_cinforeq32 */
bcopy(data, &u.ci32, sizeof(u.ci32));
error = in_getconninfo(so, u.ci32.scir_cid, &u.ci32.scir_flags,
&u.ci32.scir_ifindex, &u.ci32.scir_error, u.ci32.scir_src,
&u.ci32.scir_src_len, u.ci32.scir_dst, &u.ci32.scir_dst_len,
&u.ci32.scir_aux_type, u.ci32.scir_aux_data,
&u.ci32.scir_aux_len);
if (error == 0) {
bcopy(&u.ci32, data, sizeof(u.ci32));
}
break;
case SIOCGCONNINFO64: /* struct so_cinforeq64 */
bcopy(data, &u.ci64, sizeof(u.ci64));
error = in_getconninfo(so, u.ci64.scir_cid, &u.ci64.scir_flags,
&u.ci64.scir_ifindex, &u.ci64.scir_error, (user_addr_t)u.ci64.scir_src,
&u.ci64.scir_src_len, (user_addr_t)u.ci64.scir_dst, &u.ci64.scir_dst_len,
&u.ci64.scir_aux_type, (user_addr_t)u.ci64.scir_aux_data,
&u.ci64.scir_aux_len);
if (error == 0) {
bcopy(&u.ci64, data, sizeof(u.ci64));
}
break;
default:
VERIFY(0);
/* NOTREACHED */
}
return error;
}
/*
* Caller passes in the ioctl data pointer directly via "ifr", with the
* expectation that this routine always uses bcopy() or other byte-aligned
* memory accesses.
*/
static __attribute__((noinline)) int
inctl_autoaddr(struct ifnet *ifp, struct ifreq *ifr)
{
int error = 0, intval;
VERIFY(ifp != NULL);
bcopy(&ifr->ifr_intval, &intval, sizeof(intval));
ifnet_lock_exclusive(ifp);
if (intval) {
/*
* An interface in IPv4 router mode implies that it
* is configured with a static IP address and should
* not act as a DHCP client; prevent SIOCAUTOADDR from
* being set in that mode.
*/
if (ifp->if_eflags & IFEF_IPV4_ROUTER) {
intval = 0; /* be safe; clear flag if set */
error = EBUSY;
} else {
if_set_eflags(ifp, IFEF_AUTOCONFIGURING);
}
}
if (!intval) {
if_clear_eflags(ifp, IFEF_AUTOCONFIGURING);
}
ifnet_lock_done(ifp);
return error;
}
/*
* Caller passes in the ioctl data pointer directly via "ifr", with the
* expectation that this routine always uses bcopy() or other byte-aligned
* memory accesses.
*/
static __attribute__((noinline)) int
inctl_arpipll(struct ifnet *ifp, struct ifreq *ifr)
{
int error = 0, intval;
VERIFY(ifp != NULL);
bcopy(&ifr->ifr_intval, &intval, sizeof(intval));
ipv4_ll_arp_aware = 1;
ifnet_lock_exclusive(ifp);
if (intval) {
/*
* An interface in IPv4 router mode implies that it
* is configured with a static IP address and should
* not have to deal with IPv4 Link-Local Address;
* prevent SIOCARPIPLL from being set in that mode.
*/
if (ifp->if_eflags & IFEF_IPV4_ROUTER) {
intval = 0; /* be safe; clear flag if set */
error = EBUSY;
} else {
if_set_eflags(ifp, IFEF_ARPLL);
}
}
if (!intval) {
if_clear_eflags(ifp, IFEF_ARPLL);
}
ifnet_lock_done(ifp);
return error;
}
/*
* Handle SIOCSETROUTERMODE to set or clear the IPv4 router mode flag on
* the interface. When in this mode, IPv4 Link-Local Address support is
* disabled in ARP, and DHCP client support is disabled in IP input; turning
* any of them on would cause an error to be returned. Entering or exiting
* this mode will result in the removal of IPv4 addresses currently configured
* on the interface.
*
* Caller passes in the ioctl data pointer directly via "ifr", with the
* expectation that this routine always uses bcopy() or other byte-aligned
* memory accesses.
*/
static __attribute__((noinline)) int
inctl_setrouter(struct ifnet *ifp, struct ifreq *ifr)
{
int error = 0, intval;
VERIFY(ifp != NULL);
/* Router mode isn't valid for loopback */
if (ifp->if_flags & IFF_LOOPBACK) {
return ENODEV;
}
bcopy(&ifr->ifr_intval, &intval, sizeof(intval));
switch (intval) {
case 0:
case 1:
break;
default:
return EINVAL;
}
ifnet_lock_exclusive(ifp);
if (intval != 0) {
if_set_eflags(ifp, IFEF_IPV4_ROUTER);
if_clear_eflags(ifp, (IFEF_ARPLL | IFEF_AUTOCONFIGURING));
} else {
if_clear_eflags(ifp, IFEF_IPV4_ROUTER);
}
ifnet_lock_done(ifp);
/* purge all IPv4 addresses configured on this interface */
in_purgeaddrs(ifp);
return error;
}
/*
* Caller passes in the ioctl data pointer directly via "ifr", with the
* expectation that this routine always uses bcopy() or other byte-aligned
* memory accesses.
*/
static __attribute__((noinline)) int
inctl_ifaddr(struct ifnet *ifp, struct in_ifaddr *ia, u_long cmd,
struct ifreq *ifr)
{
struct kev_in_data in_event_data;
struct kev_msg ev_msg;
struct sockaddr_in addr;
struct ifaddr *ifa;
int error = 0;
VERIFY(ifp != NULL);
bzero(&in_event_data, sizeof(struct kev_in_data));
bzero(&ev_msg, sizeof(struct kev_msg));
switch (cmd) {
case SIOCGIFADDR: /* struct ifreq */
if (ia == NULL) {
error = EADDRNOTAVAIL;
break;
}
IFA_LOCK(&ia->ia_ifa);
SOCKADDR_COPY(&ia->ia_addr, &ifr->ifr_addr, sizeof(addr));
IFA_UNLOCK(&ia->ia_ifa);
break;
case SIOCSIFADDR: /* struct ifreq */
VERIFY(ia != NULL);
SOCKADDR_COPY(&ifr->ifr_addr, &addr, sizeof(addr));
/*
* If this is a new address, the reference count for the
* hash table has been taken at creation time above.
*/
error = in_ifinit(ifp, ia, &addr, 1);
if (error == 0) {
(void) ifnet_notify_address(ifp, AF_INET);
}
break;
case SIOCAIFADDR: { /* struct {if,in_}aliasreq */
struct in_aliasreq *ifra = (struct in_aliasreq *)ifr;
struct sockaddr_in broadaddr, mask;
int hostIsNew, maskIsNew;
VERIFY(ia != NULL);
SOCKADDR_COPY(&ifra->ifra_addr, &addr, sizeof(addr));
SOCKADDR_COPY(&ifra->ifra_broadaddr, &broadaddr, sizeof(broadaddr));
SOCKADDR_COPY(&ifra->ifra_mask, &mask, sizeof(mask));
maskIsNew = 0;
hostIsNew = 1;
error = 0;
IFA_LOCK(&ia->ia_ifa);
if (ia->ia_addr.sin_family == AF_INET) {
if (addr.sin_len == 0) {
addr = ia->ia_addr;
hostIsNew = 0;
} else if (addr.sin_addr.s_addr ==
ia->ia_addr.sin_addr.s_addr) {
hostIsNew = 0;
}
}
if (mask.sin_len != 0) {
IFA_UNLOCK(&ia->ia_ifa);
in_ifscrub(ifp, ia, 0);
IFA_LOCK(&ia->ia_ifa);
ia->ia_sockmask.sin_len = sizeof(struct sockaddr_in);
ia->ia_sockmask.sin_family = AF_INET;
ia->ia_sockmask.sin_port = 0;
ia->ia_sockmask.sin_addr = mask.sin_addr;
bzero(&ia->ia_sockmask.sin_zero, sizeof(ia->ia_dstaddr.sin_zero));
ia->ia_subnetmask =
ntohl(ia->ia_sockmask.sin_addr.s_addr);
maskIsNew = 1;
}
if ((ifp->if_flags & IFF_POINTOPOINT) &&
(broadaddr.sin_family == AF_INET)) {
IFA_UNLOCK(&ia->ia_ifa);
in_ifscrub(ifp, ia, 0);
IFA_LOCK(&ia->ia_ifa);
ia->ia_dstaddr.sin_family = AF_INET;
ia->ia_dstaddr.sin_len = sizeof(struct sockaddr_in);
ia->ia_dstaddr.sin_port = 0;
ia->ia_dstaddr.sin_addr = broadaddr.sin_addr;
bzero(&ia->ia_dstaddr.sin_zero, sizeof(ia->ia_dstaddr.sin_zero));
maskIsNew = 1; /* We lie; but the effect's the same */
}
if (addr.sin_family == AF_INET && (hostIsNew || maskIsNew)) {
IFA_UNLOCK(&ia->ia_ifa);
error = in_ifinit(ifp, ia, &addr, 0);
} else {
IFA_UNLOCK(&ia->ia_ifa);
}
if (error == 0) {
(void) ifnet_notify_address(ifp, AF_INET);
}
IFA_LOCK(&ia->ia_ifa);
if ((ifp->if_flags & IFF_BROADCAST) &&
(broadaddr.sin_family == AF_INET)) {
ia->ia_broadaddr.sin_family = AF_INET;
ia->ia_broadaddr.sin_len = sizeof(struct sockaddr_in);
ia->ia_broadaddr.sin_port = 0;
ia->ia_broadaddr.sin_addr = broadaddr.sin_addr;
bzero(&ia->ia_broadaddr.sin_zero, sizeof(ia->ia_broadaddr.sin_zero));
}
/*
* Report event.
*/
if ((error == 0) || (error == EEXIST)) {
ev_msg.vendor_code = KEV_VENDOR_APPLE;
ev_msg.kev_class = KEV_NETWORK_CLASS;
ev_msg.kev_subclass = KEV_INET_SUBCLASS;
if (hostIsNew) {
ev_msg.event_code = KEV_INET_NEW_ADDR;
} else {
ev_msg.event_code = KEV_INET_CHANGED_ADDR;
}
if (ia->ia_ifa.ifa_dstaddr) {
in_event_data.ia_dstaddr = SIN(ia->ia_ifa.ifa_dstaddr)->sin_addr;
} else {
in_event_data.ia_dstaddr.s_addr = INADDR_ANY;
}
in_event_data.ia_addr = ia->ia_addr.sin_addr;
in_event_data.ia_net = ia->ia_net;
in_event_data.ia_netmask = ia->ia_netmask;
in_event_data.ia_subnet = ia->ia_subnet;
in_event_data.ia_subnetmask = ia->ia_subnetmask;
in_event_data.ia_netbroadcast = ia->ia_netbroadcast;
IFA_UNLOCK(&ia->ia_ifa);
(void) strlcpy(&in_event_data.link_data.if_name[0],
ifp->if_name, IFNAMSIZ);
in_event_data.link_data.if_family = ifp->if_family;
in_event_data.link_data.if_unit = ifp->if_unit;
ev_msg.dv[0].data_ptr = &in_event_data;
ev_msg.dv[0].data_length = sizeof(struct kev_in_data);
ev_msg.dv[1].data_length = 0;
dlil_post_complete_msg(ifp, &ev_msg);
} else {
IFA_UNLOCK(&ia->ia_ifa);
}
break;
}
case SIOCDIFADDR: /* struct ifreq */
VERIFY(ia != NULL);
error = ifnet_ioctl(ifp, PF_INET, SIOCDIFADDR, ia);
if (error == EOPNOTSUPP) {
error = 0;
}
if (error != 0) {
break;
}
/* Fill out the kernel event information */
ev_msg.vendor_code = KEV_VENDOR_APPLE;
ev_msg.kev_class = KEV_NETWORK_CLASS;
ev_msg.kev_subclass = KEV_INET_SUBCLASS;
ev_msg.event_code = KEV_INET_ADDR_DELETED;
IFA_LOCK(&ia->ia_ifa);
if (ia->ia_ifa.ifa_dstaddr) {
in_event_data.ia_dstaddr = SIN(ia->ia_ifa.ifa_dstaddr)->sin_addr;
} else {
in_event_data.ia_dstaddr.s_addr = INADDR_ANY;
}
in_event_data.ia_addr = ia->ia_addr.sin_addr;
in_event_data.ia_net = ia->ia_net;
in_event_data.ia_netmask = ia->ia_netmask;
in_event_data.ia_subnet = ia->ia_subnet;
in_event_data.ia_subnetmask = ia->ia_subnetmask;
in_event_data.ia_netbroadcast = ia->ia_netbroadcast;
IFA_UNLOCK(&ia->ia_ifa);
(void) strlcpy(&in_event_data.link_data.if_name[0],
ifp->if_name, IFNAMSIZ);
in_event_data.link_data.if_family = ifp->if_family;
in_event_data.link_data.if_unit = (u_int32_t)ifp->if_unit;
ev_msg.dv[0].data_ptr = &in_event_data;
ev_msg.dv[0].data_length = sizeof(struct kev_in_data);
ev_msg.dv[1].data_length = 0;
ifa = &ia->ia_ifa;
lck_rw_lock_exclusive(&in_ifaddr_rwlock);
/* Release ia_link reference */
ifa_remref(ifa);
TAILQ_REMOVE(&in_ifaddrhead, ia, ia_link);
IFA_LOCK(ifa);
if (IA_IS_HASHED(ia)) {
in_iahash_remove(ia);
}
IFA_UNLOCK(ifa);
lck_rw_done(&in_ifaddr_rwlock);
/*
* in_ifscrub kills the interface route.
*/
in_ifscrub(ifp, ia, 0);
ifnet_lock_exclusive(ifp);
IFA_LOCK(ifa);
/* if_detach_ifa() releases ifa_link reference */
if_detach_ifa(ifp, ifa);
/* Our reference to this address is dropped at the bottom */
IFA_UNLOCK(ifa);
/* invalidate route caches */
routegenid_inet_update();
/*
* If the interface supports multicast, and no address is left,
* remove the "all hosts" multicast group from that interface.
*/
if ((ifp->if_flags & IFF_MULTICAST) ||
ifp->if_allhostsinm != NULL) {
TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
IFA_LOCK(ifa);
if (ifa->ifa_addr->sa_family == AF_INET) {
IFA_UNLOCK(ifa);
break;
}
IFA_UNLOCK(ifa);
}
ifnet_lock_done(ifp);
lck_mtx_lock(&ifp->if_addrconfig_lock);
if (ifa == NULL && ifp->if_allhostsinm != NULL) {
struct in_multi *inm = ifp->if_allhostsinm;
ifp->if_allhostsinm = NULL;
in_delmulti(inm);
/* release the reference for allhostsinm */
INM_REMREF(inm);
}
lck_mtx_unlock(&ifp->if_addrconfig_lock);
} else {
ifnet_lock_done(ifp);
}
/* Post the kernel event */
dlil_post_complete_msg(ifp, &ev_msg);
/*
* See if there is any IPV4 address left and if so,
* reconfigure KDP to use current primary address.
*/
ifa = ifa_ifpgetprimary(ifp, AF_INET);
if (ifa != NULL) {
/*
* NOTE: SIOCSIFADDR is defined with struct ifreq
* as parameter, but here we are sending it down
* to the interface with a pointer to struct ifaddr,
* for legacy reasons.
*/
error = ifnet_ioctl(ifp, PF_INET, SIOCSIFADDR, ifa);
if (error == EOPNOTSUPP) {
error = 0;
}
/* Release reference from ifa_ifpgetprimary() */
ifa_remref(ifa);
}
(void) ifnet_notify_address(ifp, AF_INET);
break;
default:
VERIFY(0);
/* NOTREACHED */
}
return error;
}
/*
* Caller passes in the ioctl data pointer directly via "ifr", with the
* expectation that this routine always uses bcopy() or other byte-aligned
* memory accesses.
*/
static __attribute__((noinline)) int
inctl_ifdstaddr(struct ifnet *ifp, struct in_ifaddr *ia, u_long cmd,
struct ifreq *ifr)
{
struct kev_in_data in_event_data;
struct kev_msg ev_msg;
struct sockaddr_in dstaddr;
int error = 0;
VERIFY(ifp != NULL);
if (!(ifp->if_flags & IFF_POINTOPOINT)) {
return EINVAL;
}
bzero(&in_event_data, sizeof(struct kev_in_data));
bzero(&ev_msg, sizeof(struct kev_msg));
switch (cmd) {
case SIOCGIFDSTADDR: /* struct ifreq */
if (ia == NULL) {
error = EADDRNOTAVAIL;
break;
}
IFA_LOCK(&ia->ia_ifa);
SOCKADDR_COPY(&ia->ia_dstaddr, &ifr->ifr_dstaddr, sizeof(dstaddr));
IFA_UNLOCK(&ia->ia_ifa);
break;
case SIOCSIFDSTADDR: /* struct ifreq */
VERIFY(ia != NULL);
IFA_LOCK(&ia->ia_ifa);
dstaddr = ia->ia_dstaddr;
ia->ia_dstaddr.sin_family = AF_INET;
ia->ia_dstaddr.sin_len = sizeof(struct sockaddr_in);
ia->ia_dstaddr.sin_port = 0;
bcopy(&SIN(&ifr->ifr_dstaddr)->sin_addr,
&ia->ia_dstaddr.sin_addr, sizeof(ia->ia_dstaddr.sin_addr));
bzero(&ia->ia_dstaddr.sin_zero, sizeof(ia->ia_dstaddr.sin_zero));
IFA_UNLOCK(&ia->ia_ifa);
/*
* NOTE: SIOCSIFDSTADDR is defined with struct ifreq
* as parameter, but here we are sending it down
* to the interface with a pointer to struct ifaddr,
* for legacy reasons.
*/
error = ifnet_ioctl(ifp, PF_INET, SIOCSIFDSTADDR, ia);
IFA_LOCK(&ia->ia_ifa);
if (error == EOPNOTSUPP) {
error = 0;
}
if (error != 0) {
ia->ia_dstaddr = dstaddr;
IFA_UNLOCK(&ia->ia_ifa);
break;
}
IFA_LOCK_ASSERT_HELD(&ia->ia_ifa);
ev_msg.vendor_code = KEV_VENDOR_APPLE;
ev_msg.kev_class = KEV_NETWORK_CLASS;
ev_msg.kev_subclass = KEV_INET_SUBCLASS;
ev_msg.event_code = KEV_INET_SIFDSTADDR;
if (ia->ia_ifa.ifa_dstaddr) {
in_event_data.ia_dstaddr = SIN(ia->ia_ifa.ifa_dstaddr)->sin_addr;
} else {
in_event_data.ia_dstaddr.s_addr = INADDR_ANY;
}
in_event_data.ia_addr = ia->ia_addr.sin_addr;
in_event_data.ia_net = ia->ia_net;
in_event_data.ia_netmask = ia->ia_netmask;
in_event_data.ia_subnet = ia->ia_subnet;
in_event_data.ia_subnetmask = ia->ia_subnetmask;
in_event_data.ia_netbroadcast = ia->ia_netbroadcast;
IFA_UNLOCK(&ia->ia_ifa);
(void) strlcpy(&in_event_data.link_data.if_name[0],
ifp->if_name, IFNAMSIZ);
in_event_data.link_data.if_family = ifp->if_family;
in_event_data.link_data.if_unit = (u_int32_t)ifp->if_unit;
ev_msg.dv[0].data_ptr = &in_event_data;
ev_msg.dv[0].data_length = sizeof(struct kev_in_data);
ev_msg.dv[1].data_length = 0;
dlil_post_complete_msg(ifp, &ev_msg);
lck_mtx_lock(rnh_lock);
IFA_LOCK(&ia->ia_ifa);
if (ia->ia_flags & IFA_ROUTE) {
ia->ia_ifa.ifa_dstaddr = SA(&dstaddr);
IFA_UNLOCK(&ia->ia_ifa);
rtinit_locked(&(ia->ia_ifa), RTM_DELETE, RTF_HOST);
IFA_LOCK(&ia->ia_ifa);
ia->ia_ifa.ifa_dstaddr =
SA(&ia->ia_dstaddr);
IFA_UNLOCK(&ia->ia_ifa);
rtinit_locked(&(ia->ia_ifa), RTM_ADD,
RTF_HOST | RTF_UP);
} else {
IFA_UNLOCK(&ia->ia_ifa);
}
lck_mtx_unlock(rnh_lock);
break;
default:
VERIFY(0);
/* NOTREACHED */
}
return error;
}
/*
* Caller passes in the ioctl data pointer directly via "ifr", with the
* expectation that this routine always uses bcopy() or other byte-aligned
* memory accesses.
*/
static __attribute__((noinline)) int
inctl_ifbrdaddr(struct ifnet *ifp, struct in_ifaddr *ia, u_long cmd,
struct ifreq *ifr)
{
struct kev_in_data in_event_data;
struct kev_msg ev_msg;
int error = 0;
VERIFY(ifp != NULL);
if (ia == NULL) {
return EADDRNOTAVAIL;
}
if (!(ifp->if_flags & IFF_BROADCAST)) {
return EINVAL;
}
bzero(&in_event_data, sizeof(struct kev_in_data));
bzero(&ev_msg, sizeof(struct kev_msg));
switch (cmd) {
case SIOCGIFBRDADDR: /* struct ifreq */
IFA_LOCK(&ia->ia_ifa);
SOCKADDR_COPY(&ia->ia_broadaddr, &ifr->ifr_broadaddr,
sizeof(struct sockaddr_in));
IFA_UNLOCK(&ia->ia_ifa);
break;
case SIOCSIFBRDADDR: /* struct ifreq */
IFA_LOCK(&ia->ia_ifa);
ia->ia_broadaddr.sin_family = AF_INET;
ia->ia_broadaddr.sin_len = sizeof(struct sockaddr_in);
ia->ia_broadaddr.sin_port = 0;
bcopy(&SIN(&ifr->ifr_broadaddr)->sin_addr,
&ia->ia_broadaddr.sin_addr, sizeof(ia->ia_broadaddr.sin_addr));
bzero(&ia->ia_broadaddr.sin_zero, sizeof(ia->ia_broadaddr.sin_zero));
ev_msg.vendor_code = KEV_VENDOR_APPLE;
ev_msg.kev_class = KEV_NETWORK_CLASS;
ev_msg.kev_subclass = KEV_INET_SUBCLASS;
ev_msg.event_code = KEV_INET_SIFBRDADDR;
if (ia->ia_ifa.ifa_dstaddr) {
in_event_data.ia_dstaddr = SIN(ia->ia_ifa.ifa_dstaddr)->sin_addr;
} else {
in_event_data.ia_dstaddr.s_addr = INADDR_ANY;
}
in_event_data.ia_addr = ia->ia_addr.sin_addr;
in_event_data.ia_net = ia->ia_net;
in_event_data.ia_netmask = ia->ia_netmask;
in_event_data.ia_subnet = ia->ia_subnet;
in_event_data.ia_subnetmask = ia->ia_subnetmask;
in_event_data.ia_netbroadcast = ia->ia_netbroadcast;
IFA_UNLOCK(&ia->ia_ifa);
(void) strlcpy(&in_event_data.link_data.if_name[0],
ifp->if_name, IFNAMSIZ);
in_event_data.link_data.if_family = ifp->if_family;
in_event_data.link_data.if_unit = (u_int32_t)ifp->if_unit;
ev_msg.dv[0].data_ptr = &in_event_data;
ev_msg.dv[0].data_length = sizeof(struct kev_in_data);
ev_msg.dv[1].data_length = 0;
dlil_post_complete_msg(ifp, &ev_msg);
break;
default:
VERIFY(0);
/* NOTREACHED */
}
return error;
}
/*
* Caller passes in the ioctl data pointer directly via "ifr", with the
* expectation that this routine always uses bcopy() or other byte-aligned
* memory accesses.
*/
static __attribute__((noinline)) int
inctl_ifnetmask(struct ifnet *ifp, struct in_ifaddr *ia, u_long cmd,
struct ifreq *ifr)
{
struct kev_in_data in_event_data;
struct kev_msg ev_msg;
struct sockaddr_in mask;
int error = 0;
VERIFY(ifp != NULL);
bzero(&in_event_data, sizeof(struct kev_in_data));
bzero(&ev_msg, sizeof(struct kev_msg));
switch (cmd) {
case SIOCGIFNETMASK: /* struct ifreq */
if (ia == NULL) {
error = EADDRNOTAVAIL;
break;
}
IFA_LOCK(&ia->ia_ifa);
SOCKADDR_COPY(&ia->ia_sockmask, &ifr->ifr_addr, sizeof(mask));
IFA_UNLOCK(&ia->ia_ifa);
break;
case SIOCSIFNETMASK: { /* struct ifreq */
in_addr_t i;
SOCKADDR_COPY(&ifr->ifr_addr, &mask, sizeof(mask));
i = mask.sin_addr.s_addr;
VERIFY(ia != NULL);
IFA_LOCK(&ia->ia_ifa);
ia->ia_subnetmask = ntohl(ia->ia_sockmask.sin_addr.s_addr = i);
ev_msg.vendor_code = KEV_VENDOR_APPLE;
ev_msg.kev_class = KEV_NETWORK_CLASS;
ev_msg.kev_subclass = KEV_INET_SUBCLASS;
ev_msg.event_code = KEV_INET_SIFNETMASK;
if (ia->ia_ifa.ifa_dstaddr) {
in_event_data.ia_dstaddr = SIN(ia->ia_ifa.ifa_dstaddr)->sin_addr;
} else {
in_event_data.ia_dstaddr.s_addr = INADDR_ANY;
}
in_event_data.ia_addr = ia->ia_addr.sin_addr;
in_event_data.ia_net = ia->ia_net;
in_event_data.ia_netmask = ia->ia_netmask;
in_event_data.ia_subnet = ia->ia_subnet;
in_event_data.ia_subnetmask = ia->ia_subnetmask;
in_event_data.ia_netbroadcast = ia->ia_netbroadcast;
IFA_UNLOCK(&ia->ia_ifa);
(void) strlcpy(&in_event_data.link_data.if_name[0],
ifp->if_name, IFNAMSIZ);
in_event_data.link_data.if_family = ifp->if_family;
in_event_data.link_data.if_unit = (u_int32_t)ifp->if_unit;
ev_msg.dv[0].data_ptr = &in_event_data;
ev_msg.dv[0].data_length = sizeof(struct kev_in_data);
ev_msg.dv[1].data_length = 0;
dlil_post_complete_msg(ifp, &ev_msg);
break;
}
default:
VERIFY(0);
/* NOTREACHED */
}
return error;
}
/*
* Generic INET control operations (ioctl's).
*
* ifp is NULL if not an interface-specific ioctl.
*
* Most of the routines called to handle the ioctls would end up being
* tail-call optimized, which unfortunately causes this routine to
* consume too much stack space; this is the reason for the "noinline"
* attribute used on those routines.
*
* If called directly from within the networking stack (as opposed to via
* pru_control), the socket parameter may be NULL.
*/
int
in_control(struct socket *so, u_long cmd, caddr_t data, struct ifnet *ifp,
struct proc *p)
{
struct ifreq *ifr = (struct ifreq *)(void *)data;
struct sockaddr_in addr, dstaddr;
struct sockaddr_in sin, *sa = NULL;
boolean_t privileged = (proc_suser(p) == 0);
boolean_t so_unlocked = FALSE;
struct in_ifaddr *ia = NULL;
struct ifaddr *ifa;
int error = 0;
int intval;
/* In case it's NULL, make sure it came from the kernel */
VERIFY(so != NULL || p == kernproc);
/*
* ioctls which don't require ifp, but require socket.
*/
switch (cmd) {
case SIOCGASSOCIDS32: /* struct so_aidreq32 */
case SIOCGASSOCIDS64: /* struct so_aidreq64 */
return inctl_associd(so, cmd, data);
/* NOTREACHED */
case SIOCGCONNIDS32: /* struct so_cidreq32 */
case SIOCGCONNIDS64: /* struct so_cidreq64 */
return inctl_connid(so, cmd, data);
/* NOTREACHED */
case SIOCGCONNINFO32: /* struct so_cinforeq32 */
case SIOCGCONNINFO64: /* struct so_cinforeq64 */
return inctl_conninfo(so, cmd, data);
/* NOTREACHED */
}
/*
* The rest of ioctls require ifp; reject if we don't have one;
* return ENXIO to be consistent with ifioctl().
*/
if (ifp == NULL) {
return ENXIO;
}
/*
* ioctls which require ifp but not interface address.
*/
switch (cmd) {
case SIOCAUTOADDR: /* struct ifreq */
if (!privileged) {
return EPERM;
}
return inctl_autoaddr(ifp, ifr);
/* NOTREACHED */
case SIOCARPIPLL: /* struct ifreq */
if (!privileged) {
return EPERM;
}
return inctl_arpipll(ifp, ifr);
/* NOTREACHED */
case SIOCGETROUTERMODE: /* struct ifreq */
intval = (ifp->if_eflags & IFEF_IPV4_ROUTER) != 0 ? 1 : 0;
bcopy(&intval, &ifr->ifr_intval, sizeof(intval));
return 0;
/* NOTREACHED */
case SIOCSETROUTERMODE: /* struct ifreq */
if (!privileged) {
return EPERM;
}
return inctl_setrouter(ifp, ifr);
/* NOTREACHED */
case SIOCPROTOATTACH: /* struct ifreq */
if (!privileged) {
return EPERM;
}
return in_domifattach(ifp);
/* NOTREACHED */
case SIOCPROTODETACH: /* struct ifreq */
if (!privileged) {
return EPERM;
}
/*
* If an IPv4 address is still present, refuse to detach.
*/
ifnet_lock_shared(ifp);
TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
IFA_LOCK(ifa);
if (ifa->ifa_addr->sa_family == AF_INET) {
IFA_UNLOCK(ifa);
break;
}
IFA_UNLOCK(ifa);
}
ifnet_lock_done(ifp);
return (ifa == NULL) ? proto_unplumb(PF_INET, ifp) : EBUSY;
/* NOTREACHED */
}
/*
* ioctls which require interface address; obtain sockaddr_in.
*/
switch (cmd) {
case SIOCAIFADDR: /* struct {if,in_}aliasreq */
if (!privileged) {
return EPERM;
}
SOCKADDR_COPY(&((struct in_aliasreq *)(void *)data)->ifra_addr,
&sin, sizeof(sin));
sa = &sin;
break;
case SIOCDIFADDR: /* struct ifreq */
case SIOCSIFADDR: /* struct ifreq */
case SIOCSIFDSTADDR: /* struct ifreq */
case SIOCSIFNETMASK: /* struct ifreq */
case SIOCSIFBRDADDR: /* struct ifreq */
if (!privileged) {
return EPERM;
}
OS_FALLTHROUGH;
case SIOCGIFADDR: /* struct ifreq */
case SIOCGIFDSTADDR: /* struct ifreq */
case SIOCGIFNETMASK: /* struct ifreq */
case SIOCGIFBRDADDR: /* struct ifreq */
SOCKADDR_COPY(&ifr->ifr_addr, &sin, sizeof(sin));
sa = &sin;
break;
}
/*
* Find address for this interface, if it exists.
*
* If an alias address was specified, find that one instead of
* the first one on the interface, if possible.
*/
VERIFY(ia == NULL);
if (sa != NULL) {
struct in_ifaddr *iap;
/*
* Any failures from this point on must take into account
* a non-NULL "ia" with an outstanding reference count, and
* therefore requires ifa_remref. Jump to "done" label
* instead of calling return if "ia" is valid.
*/
lck_rw_lock_shared(&in_ifaddr_rwlock);
TAILQ_FOREACH(iap, INADDR_HASH(sa->sin_addr.s_addr), ia_hash) {
IFA_LOCK(&iap->ia_ifa);
if (iap->ia_ifp == ifp &&
iap->ia_addr.sin_addr.s_addr ==
sa->sin_addr.s_addr) {
ia = iap;
ifa_addref(&iap->ia_ifa);
IFA_UNLOCK(&iap->ia_ifa);
break;
}
IFA_UNLOCK(&iap->ia_ifa);
}
lck_rw_done(&in_ifaddr_rwlock);
if (ia == NULL) {
ifnet_lock_shared(ifp);
TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
iap = ifatoia(ifa);
IFA_LOCK(&iap->ia_ifa);
if (iap->ia_addr.sin_family == AF_INET) {
ia = iap;
ifa_addref(&iap->ia_ifa);
IFA_UNLOCK(&iap->ia_ifa);
break;
}
IFA_UNLOCK(&iap->ia_ifa);
}
ifnet_lock_done(ifp);
}
}
/*
* Unlock the socket since ifnet_ioctl() may be invoked by
* one of the ioctl handlers below. Socket will be re-locked
* prior to returning.
*/
if (so != NULL) {
socket_unlock(so, 0);
so_unlocked = TRUE;
}
switch (cmd) {
case SIOCAIFADDR: /* struct {if,in_}aliasreq */
case SIOCDIFADDR: /* struct ifreq */
if (cmd == SIOCAIFADDR) {
SOCKADDR_COPY(&((struct in_aliasreq *)(void *)data)->
ifra_addr, &addr, sizeof(addr));
SOCKADDR_COPY(&((struct in_aliasreq *)(void *)data)->
ifra_dstaddr, &dstaddr, sizeof(dstaddr));
} else {
VERIFY(cmd == SIOCDIFADDR);
SOCKADDR_COPY(&((struct ifreq *)(void *)data)->ifr_addr,
&addr, sizeof(addr));
SOCKADDR_ZERO(&dstaddr, sizeof(dstaddr));
}
if (addr.sin_family == AF_INET) {
struct in_ifaddr *oia;
lck_rw_lock_shared(&in_ifaddr_rwlock);
for (oia = ia; ia; ia = ia->ia_link.tqe_next) {
IFA_LOCK(&ia->ia_ifa);
if (ia->ia_ifp == ifp &&
ia->ia_addr.sin_addr.s_addr ==
addr.sin_addr.s_addr) {
ifa_addref(&ia->ia_ifa);
IFA_UNLOCK(&ia->ia_ifa);
break;
}
IFA_UNLOCK(&ia->ia_ifa);
}
lck_rw_done(&in_ifaddr_rwlock);
if (oia != NULL) {
ifa_remref(&oia->ia_ifa);
}
if ((ifp->if_flags & IFF_POINTOPOINT) &&
(cmd == SIOCAIFADDR) &&
(dstaddr.sin_addr.s_addr == INADDR_ANY)) {
error = EDESTADDRREQ;
goto done;
}
} else if (cmd == SIOCAIFADDR) {
error = EINVAL;
goto done;
}
if (cmd == SIOCDIFADDR) {
if (ia == NULL) {
error = EADDRNOTAVAIL;
goto done;
}
IFA_LOCK(&ia->ia_ifa);
/*
* Avoid the race condition seen when two
* threads process SIOCDIFADDR command
* at the same time.
*/
while (ia->ia_ifa.ifa_debug & IFD_DETACHING) {
os_log(OS_LOG_DEFAULT,
"Another thread is already attempting to "
"delete IPv4 address: %s on interface %s. "
"Go to sleep and check again after the operation is done",
inet_ntoa(sa->sin_addr), ia->ia_ifp->if_xname);
ia->ia_ifa.ifa_del_waiters++;
(void) msleep(ia->ia_ifa.ifa_del_wc, &ia->ia_ifa.ifa_lock, (PZERO - 1),
__func__, NULL);
IFA_LOCK_ASSERT_HELD(&ia->ia_ifa);
}
if ((ia->ia_ifa.ifa_debug & IFD_ATTACHED) == 0) {
error = EADDRNOTAVAIL;
IFA_UNLOCK(&ia->ia_ifa);
goto done;
}
ia->ia_ifa.ifa_debug |= IFD_DETACHING;
IFA_UNLOCK(&ia->ia_ifa);
}
OS_FALLTHROUGH;
case SIOCSIFADDR: /* struct ifreq */
case SIOCSIFDSTADDR: /* struct ifreq */
case SIOCSIFNETMASK: /* struct ifreq */
if (cmd == SIOCAIFADDR) {
/* fell thru from above; just repeat it */
SOCKADDR_COPY(&((struct in_aliasreq *)(void *)data)->
ifra_addr, &addr, sizeof(addr));
} else {
VERIFY(cmd == SIOCDIFADDR || cmd == SIOCSIFADDR ||
cmd == SIOCSIFNETMASK || cmd == SIOCSIFDSTADDR);
SOCKADDR_COPY(&((struct ifreq *)(void *)data)->ifr_addr,
&addr, sizeof(addr));
}
if (addr.sin_family != AF_INET && cmd == SIOCSIFADDR) {
error = EINVAL;
goto done;
}
if ((cmd == SIOCAIFADDR || cmd == SIOCSIFADDR) &&
(IN_MULTICAST(ntohl(addr.sin_addr.s_addr)) ||
addr.sin_addr.s_addr == INADDR_BROADCAST ||
addr.sin_addr.s_addr == INADDR_ANY)) {
error = EINVAL;
goto done;
}
if (ia == NULL) {
ia = in_ifaddr_alloc();
if (ia == NULL) {
error = ENOBUFS;
goto done;
}
ifnet_lock_exclusive(ifp);
ifa = &ia->ia_ifa;
IFA_LOCK(ifa);
IA_HASH_INIT(ia);
ifa->ifa_addr = SA(&ia->ia_addr);
ifa->ifa_dstaddr = SA(&ia->ia_dstaddr);
ifa->ifa_netmask = SA(&ia->ia_sockmask);
ia->ia_sockmask.sin_len = offsetof(struct sockaddr_in, sin_zero);
if (ifp->if_flags & IFF_BROADCAST) {
ia->ia_broadaddr.sin_len = sizeof(ia->ia_addr);
ia->ia_broadaddr.sin_family = AF_INET;
}
ia->ia_ifp = ifp;
if (!(ifp->if_flags & IFF_LOOPBACK)) {
in_interfaces++;
}
/* if_attach_ifa() holds a reference for ifa_link */
if_attach_ifa(ifp, ifa);
/*
* If we have to go through in_ifinit(), make sure
* to avoid installing route(s) based on this address
* via PFC_IFUP event, before the link resolver (ARP)
* initializes it.
*/
if (cmd == SIOCAIFADDR || cmd == SIOCSIFADDR) {
ifa->ifa_debug |= IFD_NOTREADY;
}
IFA_UNLOCK(ifa);
ifnet_lock_done(ifp);
lck_rw_lock_exclusive(&in_ifaddr_rwlock);
/* Hold a reference for ia_link */
ifa_addref(ifa);
TAILQ_INSERT_TAIL(&in_ifaddrhead, ia, ia_link);
lck_rw_done(&in_ifaddr_rwlock);
/* discard error */
(void) in_domifattach(ifp);
error = 0;
}
break;
}
switch (cmd) {
case SIOCGIFDSTADDR: /* struct ifreq */
case SIOCSIFDSTADDR: /* struct ifreq */
error = inctl_ifdstaddr(ifp, ia, cmd, ifr);
break;
case SIOCGIFBRDADDR: /* struct ifreq */
case SIOCSIFBRDADDR: /* struct ifreq */
error = inctl_ifbrdaddr(ifp, ia, cmd, ifr);
break;
case SIOCGIFNETMASK: /* struct ifreq */
case SIOCSIFNETMASK: /* struct ifreq */
error = inctl_ifnetmask(ifp, ia, cmd, ifr);
break;
case SIOCGIFADDR: /* struct ifreq */
case SIOCSIFADDR: /* struct ifreq */
case SIOCAIFADDR: /* struct {if,in_}aliasreq */
case SIOCDIFADDR: /* struct ifreq */
error = inctl_ifaddr(ifp, ia, cmd, ifr);
break;
default:
error = EOPNOTSUPP;
break;
}
done:
if (ia != NULL) {
if (cmd == SIOCDIFADDR) {
IFA_LOCK(&ia->ia_ifa);
ia->ia_ifa.ifa_debug &= ~IFD_DETACHING;
if (ia->ia_ifa.ifa_del_waiters > 0) {
ia->ia_ifa.ifa_del_waiters = 0;
wakeup(ia->ia_ifa.ifa_del_wc);
}
IFA_UNLOCK(&ia->ia_ifa);
}
ifa_remref(&ia->ia_ifa);
}
if (so_unlocked) {
socket_lock(so, 0);
}
return error;
}
/*
* Delete any existing route for an interface.
*/
void
in_ifscrub(struct ifnet *ifp, struct in_ifaddr *ia, int locked)
{
IFA_LOCK(&ia->ia_ifa);
if ((ia->ia_flags & IFA_ROUTE) == 0) {
IFA_UNLOCK(&ia->ia_ifa);
return;
}
IFA_UNLOCK(&ia->ia_ifa);
if (!locked) {
lck_mtx_lock(rnh_lock);
}
if (ifp->if_flags & (IFF_LOOPBACK | IFF_POINTOPOINT)) {
rtinit_locked(&(ia->ia_ifa), RTM_DELETE, RTF_HOST);
} else {
rtinit_locked(&(ia->ia_ifa), RTM_DELETE, 0);
}
IFA_LOCK(&ia->ia_ifa);
ia->ia_flags &= ~IFA_ROUTE;
IFA_UNLOCK(&ia->ia_ifa);
if (!locked) {
lck_mtx_unlock(rnh_lock);
}
}
/*
* Caller must hold in_ifaddr_rwlock as writer.
*/
static void
in_iahash_remove(struct in_ifaddr *ia)
{
LCK_RW_ASSERT(&in_ifaddr_rwlock, LCK_RW_ASSERT_EXCLUSIVE);
IFA_LOCK_ASSERT_HELD(&ia->ia_ifa);
if (!IA_IS_HASHED(ia)) {
panic("attempt to remove wrong ia %p from hash table", ia);
/* NOTREACHED */
}
TAILQ_REMOVE(INADDR_HASH(ia->ia_addr.sin_addr.s_addr), ia, ia_hash);
IA_HASH_INIT(ia);
ifa_remref(&ia->ia_ifa);
}
/*
* Caller must hold in_ifaddr_rwlock as writer.
*/
static void
in_iahash_insert(struct in_ifaddr *ia)
{
LCK_RW_ASSERT(&in_ifaddr_rwlock, LCK_RW_ASSERT_EXCLUSIVE);
IFA_LOCK_ASSERT_HELD(&ia->ia_ifa);
if (ia->ia_addr.sin_family != AF_INET) {
panic("attempt to insert wrong ia %p into hash table", ia);
/* NOTREACHED */
} else if (IA_IS_HASHED(ia)) {
panic("attempt to double-insert ia %p into hash table", ia);
/* NOTREACHED */
}
TAILQ_INSERT_HEAD(INADDR_HASH(ia->ia_addr.sin_addr.s_addr),
ia, ia_hash);
ifa_addref(&ia->ia_ifa);
}
/*
* Some point to point interfaces that are tunnels borrow the address from
* an underlying interface (e.g. VPN server). In order for source address
* selection logic to find the underlying interface first, we add the address
* of borrowing point to point interfaces at the end of the list.
* (see rdar://6733789)
*
* Caller must hold in_ifaddr_rwlock as writer.
*/
static void
in_iahash_insert_ptp(struct in_ifaddr *ia)
{
struct in_ifaddr *tmp_ifa;
struct ifnet *tmp_ifp;
LCK_RW_ASSERT(&in_ifaddr_rwlock, LCK_RW_ASSERT_EXCLUSIVE);
IFA_LOCK_ASSERT_HELD(&ia->ia_ifa);
if (ia->ia_addr.sin_family != AF_INET) {
panic("attempt to insert wrong ia %p into hash table", ia);
/* NOTREACHED */
} else if (IA_IS_HASHED(ia)) {
panic("attempt to double-insert ia %p into hash table", ia);
/* NOTREACHED */
}
IFA_UNLOCK(&ia->ia_ifa);
TAILQ_FOREACH(tmp_ifa, INADDR_HASH(ia->ia_addr.sin_addr.s_addr),
ia_hash) {
IFA_LOCK(&tmp_ifa->ia_ifa);
/* ia->ia_addr won't change, so check without lock */
if (IA_SIN(tmp_ifa)->sin_addr.s_addr ==
ia->ia_addr.sin_addr.s_addr) {
IFA_UNLOCK(&tmp_ifa->ia_ifa);
break;
}
IFA_UNLOCK(&tmp_ifa->ia_ifa);
}
tmp_ifp = (tmp_ifa == NULL) ? NULL : tmp_ifa->ia_ifp;
IFA_LOCK(&ia->ia_ifa);
if (tmp_ifp == NULL) {
TAILQ_INSERT_HEAD(INADDR_HASH(ia->ia_addr.sin_addr.s_addr),
ia, ia_hash);
} else {
TAILQ_INSERT_TAIL(INADDR_HASH(ia->ia_addr.sin_addr.s_addr),
ia, ia_hash);
}
ifa_addref(&ia->ia_ifa);
}
/*
* Initialize an interface's internet address
* and routing table entry.
*/
static int
in_ifinit(struct ifnet *ifp, struct in_ifaddr *ia, struct sockaddr_in *sin,
int scrub)
{
u_int32_t i = ntohl(sin->sin_addr.s_addr);
struct sockaddr_in oldaddr;
int flags = RTF_UP, error;
struct ifaddr *ifa0;
unsigned int cmd;
int oldremoved = 0;
/* Take an extra reference for this routine */
ifa_addref(&ia->ia_ifa);
lck_rw_lock_exclusive(&in_ifaddr_rwlock);
IFA_LOCK(&ia->ia_ifa);
oldaddr = ia->ia_addr;
if (IA_IS_HASHED(ia)) {
oldremoved = 1;
in_iahash_remove(ia);
}
ia->ia_addr = *sin;
/*
* Interface addresses should not contain port or sin_zero information.
*/
SIN(&ia->ia_addr)->sin_family = AF_INET;
SIN(&ia->ia_addr)->sin_len = sizeof(struct sockaddr_in);
SIN(&ia->ia_addr)->sin_port = 0;
bzero(&SIN(&ia->ia_addr)->sin_zero, sizeof(sin->sin_zero));
if ((ifp->if_flags & IFF_POINTOPOINT)) {
in_iahash_insert_ptp(ia);
} else {
in_iahash_insert(ia);
}
IFA_UNLOCK(&ia->ia_ifa);
lck_rw_done(&in_ifaddr_rwlock);
/*
* Give the interface a chance to initialize if this is its first
* address, and to validate the address if necessary. Send down
* SIOCSIFADDR for first address, and SIOCAIFADDR for alias(es).
* We find the first IPV4 address assigned to it and check if this
* is the same as the one passed into this routine.
*/
ifa0 = ifa_ifpgetprimary(ifp, AF_INET);
cmd = (&ia->ia_ifa == ifa0) ? SIOCSIFADDR : SIOCAIFADDR;
error = ifnet_ioctl(ifp, PF_INET, cmd, ia);
if (error == EOPNOTSUPP) {
error = 0;
}
/*
* If we've just sent down SIOCAIFADDR, send another ioctl down
* for SIOCSIFADDR for the first IPV4 address of the interface,
* because an address change on one of the addresses will result
* in the removal of the previous first IPV4 address. KDP needs
* be reconfigured with the current primary IPV4 address.
*/
if (error == 0 && cmd == SIOCAIFADDR) {
/*
* NOTE: SIOCSIFADDR is defined with struct ifreq
* as parameter, but here we are sending it down
* to the interface with a pointer to struct ifaddr,
* for legacy reasons.
*/
error = ifnet_ioctl(ifp, PF_INET, SIOCSIFADDR, ifa0);
if (error == EOPNOTSUPP) {
error = 0;
}
}
/* Release reference from ifa_ifpgetprimary() */
ifa_remref(ifa0);
if (error) {
lck_rw_lock_exclusive(&in_ifaddr_rwlock);
IFA_LOCK(&ia->ia_ifa);
if (IA_IS_HASHED(ia)) {
in_iahash_remove(ia);
}
ia->ia_addr = oldaddr;
if (oldremoved) {
if ((ifp->if_flags & IFF_POINTOPOINT)) {
in_iahash_insert_ptp(ia);
} else {
in_iahash_insert(ia);
}
}
IFA_UNLOCK(&ia->ia_ifa);
lck_rw_done(&in_ifaddr_rwlock);
/* Release extra reference taken above */
ifa_remref(&ia->ia_ifa);
return error;
}
lck_mtx_lock(rnh_lock);
IFA_LOCK(&ia->ia_ifa);
/*
* Address has been initialized by the link resolver (ARP)
* via ifnet_ioctl() above; it may now generate route(s).
*/
ia->ia_ifa.ifa_debug &= ~IFD_NOTREADY;
if (scrub) {
ia->ia_ifa.ifa_addr = SA(&oldaddr);
IFA_UNLOCK(&ia->ia_ifa);
in_ifscrub(ifp, ia, 1);
IFA_LOCK(&ia->ia_ifa);
ia->ia_ifa.ifa_addr = SA(&ia->ia_addr);
}
IFA_LOCK_ASSERT_HELD(&ia->ia_ifa);
if (IN_CLASSA(i)) {
ia->ia_netmask = IN_CLASSA_NET;
} else if (IN_CLASSB(i)) {
ia->ia_netmask = IN_CLASSB_NET;
} else {
ia->ia_netmask = IN_CLASSC_NET;
}
/*
* The subnet mask usually includes at least the standard network part,
* but may may be smaller in the case of supernetting.
* If it is set, we believe it.
*/
if (ia->ia_subnetmask == 0) {
ia->ia_subnetmask = ia->ia_netmask;
ia->ia_sockmask.sin_addr.s_addr = htonl(ia->ia_subnetmask);
} else {
ia->ia_netmask &= ia->ia_subnetmask;
}
ia->ia_net = i & ia->ia_netmask;
ia->ia_subnet = i & ia->ia_subnetmask;
in_socktrim(&ia->ia_sockmask);
/*
* Add route for the network.
*/
ia->ia_ifa.ifa_metric = ifp->if_metric;
if (ifp->if_flags & IFF_BROADCAST) {
ia->ia_broadaddr.sin_addr.s_addr =
htonl(ia->ia_subnet | ~ia->ia_subnetmask);
ia->ia_netbroadcast.s_addr =
htonl(ia->ia_net | ~ia->ia_netmask);
} else if (ifp->if_flags & IFF_LOOPBACK) {
ia->ia_ifa.ifa_dstaddr = ia->ia_ifa.ifa_addr;
flags |= RTF_HOST;
} else if (ifp->if_flags & IFF_POINTOPOINT) {
if (ia->ia_dstaddr.sin_family != AF_INET) {
IFA_UNLOCK(&ia->ia_ifa);
lck_mtx_unlock(rnh_lock);
/* Release extra reference taken above */
ifa_remref(&ia->ia_ifa);
return 0;
}
ia->ia_dstaddr.sin_len = sizeof(struct sockaddr_in);
flags |= RTF_HOST;
}
IFA_UNLOCK(&ia->ia_ifa);
if ((error = rtinit_locked(&(ia->ia_ifa), RTM_ADD, flags)) == 0) {
IFA_LOCK(&ia->ia_ifa);
ia->ia_flags |= IFA_ROUTE;
IFA_UNLOCK(&ia->ia_ifa);
}
lck_mtx_unlock(rnh_lock);
/* XXX check if the subnet route points to the same interface */
if (error == EEXIST) {
error = 0;
}
/*
* If the interface supports multicast, join the "all hosts"
* multicast group on that interface.
*/
if (ifp->if_flags & IFF_MULTICAST) {
struct in_addr addr;
lck_mtx_lock(&ifp->if_addrconfig_lock);
addr.s_addr = htonl(INADDR_ALLHOSTS_GROUP);
if (ifp->if_allhostsinm == NULL) {
struct in_multi *inm;
inm = in_addmulti(&addr, ifp);
if (inm != NULL) {
/*
* Keep the reference on inm added by
* in_addmulti above for storing the
* pointer in allhostsinm.
*/
ifp->if_allhostsinm = inm;
} else {
printf("%s: failed to add membership to "
"all-hosts multicast address on %s\n",
__func__, if_name(ifp));
}
}
lck_mtx_unlock(&ifp->if_addrconfig_lock);
}
/* Release extra reference taken above */
ifa_remref(&ia->ia_ifa);
if (error == 0) {
/* invalidate route caches */
routegenid_inet_update();
}
return error;
}
/*
* Return TRUE if the address might be a local broadcast address.
*/
boolean_t
in_broadcast(struct in_addr in, struct ifnet *ifp)
{
struct ifaddr *ifa;
u_int32_t t;
if (in.s_addr == INADDR_BROADCAST || in.s_addr == INADDR_ANY) {
return TRUE;
}
if (!(ifp->if_flags & IFF_BROADCAST)) {
return FALSE;
}
t = ntohl(in.s_addr);
/*
* Look through the list of addresses for a match
* with a broadcast address.
*/
#define ia ((struct in_ifaddr *)ifa)
ifnet_lock_shared(ifp);
TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
IFA_LOCK(ifa);
if (ifa->ifa_addr->sa_family == AF_INET &&
(in.s_addr == ia->ia_broadaddr.sin_addr.s_addr ||
in.s_addr == ia->ia_netbroadcast.s_addr ||
/*
* Check for old-style (host 0) broadcast.
*/
t == ia->ia_subnet || t == ia->ia_net) &&
/*
* Check for an all one subnetmask. These
* only exist when an interface gets a secondary
* address.
*/
ia->ia_subnetmask != (u_int32_t)0xffffffff) {
IFA_UNLOCK(ifa);
ifnet_lock_done(ifp);
return TRUE;
}
IFA_UNLOCK(ifa);
}
ifnet_lock_done(ifp);
return FALSE;
#undef ia
}
void
in_purgeaddrs(struct ifnet *ifp)
{
struct ifaddr **ifap;
int err, i;
VERIFY(ifp != NULL);
/*
* Be nice, and try the civilized way first. If we can't get
* rid of them this way, then do it the rough way. We must
* only get here during detach time, after the ifnet has been
* removed from the global list and arrays.
*/
err = ifnet_get_address_list_family_internal(ifp, &ifap, AF_INET, 1,
M_WAITOK, 0);
if (err == 0 && ifap != NULL) {
struct ifreq ifr;
bzero(&ifr, sizeof(ifr));
(void) snprintf(ifr.ifr_name, sizeof(ifr.ifr_name),
"%s", if_name(ifp));
for (i = 0; ifap[i] != NULL; i++) {
struct ifaddr *ifa;
ifa = ifap[i];
IFA_LOCK(ifa);
SOCKADDR_COPY(ifa->ifa_addr, &ifr.ifr_addr,
sizeof(struct sockaddr_in));
IFA_UNLOCK(ifa);
err = in_control(NULL, SIOCDIFADDR, (caddr_t)&ifr, ifp,
kernproc);
/* if we lost the race, ignore it */
if (err == EADDRNOTAVAIL) {
err = 0;
}
if (err != 0) {
char s_addr[MAX_IPv4_STR_LEN];
char s_dstaddr[MAX_IPv4_STR_LEN];
struct in_addr *s, *d;
IFA_LOCK(ifa);
s = &SIN(ifa->ifa_addr)->sin_addr;
d = &SIN(ifa->ifa_dstaddr)->sin_addr;
(void) inet_ntop(AF_INET, &s->s_addr, s_addr,
sizeof(s_addr));
(void) inet_ntop(AF_INET, &d->s_addr, s_dstaddr,
sizeof(s_dstaddr));
IFA_UNLOCK(ifa);
printf("%s: SIOCDIFADDR ifp=%s ifa_addr=%s "
"ifa_dstaddr=%s (err=%d)\n", __func__,
ifp->if_xname, s_addr, s_dstaddr, err);
}
}
ifnet_free_address_list(ifap);
} else if (err != 0 && err != ENXIO) {
printf("%s: error retrieving list of AF_INET addresses for "
"ifp=%s (err=%d)\n", __func__, ifp->if_xname, err);
}
}
static struct in_ifaddr *
in_ifaddr_alloc(void)
{
struct in_ifaddr *inifa;
inifa = kalloc_type(struct in_ifaddr, Z_ZERO | Z_WAITOK);
if (inifa == NULL) {
return NULL;
}
inifa->ia_ifa.ifa_free = in_ifaddr_free;
inifa->ia_ifa.ifa_debug |= IFD_ALLOC;
inifa->ia_ifa.ifa_del_wc = &inifa->ia_ifa.ifa_debug;
inifa->ia_ifa.ifa_del_waiters = 0;
ifa_lock_init(&inifa->ia_ifa);
ifa_initref(&inifa->ia_ifa);
return inifa;
}
static void
in_ifaddr_free(struct ifaddr *ifa)
{
struct in_ifaddr *inifa = (struct in_ifaddr *)ifa;
IFA_LOCK_ASSERT_HELD(ifa);
if (__improbable(!(ifa->ifa_debug & IFD_ALLOC))) {
panic("%s: ifa %p cannot be freed", __func__, ifa);
/* NOTREACHED */
}
IFA_UNLOCK(ifa);
ifa_lock_destroy(ifa);
kfree_type(struct in_ifaddr, inifa);
}
/*
* Handle SIOCGASSOCIDS ioctl for PF_INET domain.
*/
static int
in_getassocids(struct socket *so, uint32_t *cnt, user_addr_t aidp)
{
struct inpcb *inp = sotoinpcb(so);
sae_associd_t aid;
if (inp == NULL || inp->inp_state == INPCB_STATE_DEAD) {
return EINVAL;
}
/* INPCB has no concept of association */
aid = SAE_ASSOCID_ANY;
*cnt = 0;
/* just asking how many there are? */
if (aidp == USER_ADDR_NULL) {
return 0;
}
return copyout(&aid, aidp, sizeof(aid));
}
/*
* Handle SIOCGCONNIDS ioctl for PF_INET domain.
*/
static int
in_getconnids(struct socket *so, sae_associd_t aid, uint32_t *cnt,
user_addr_t cidp)
{
struct inpcb *inp = sotoinpcb(so);
sae_connid_t cid;
if (inp == NULL || inp->inp_state == INPCB_STATE_DEAD) {
return EINVAL;
}
if (aid != SAE_ASSOCID_ANY && aid != SAE_ASSOCID_ALL) {
return EINVAL;
}
/* if connected, return 1 connection count */
*cnt = ((so->so_state & SS_ISCONNECTED) ? 1 : 0);
/* just asking how many there are? */
if (cidp == USER_ADDR_NULL) {
return 0;
}
/* if INPCB is connected, assign it connid 1 */
cid = ((*cnt != 0) ? 1 : SAE_CONNID_ANY);
return copyout(&cid, cidp, sizeof(cid));
}
/*
* Handle SIOCGCONNINFO ioctl for PF_INET domain.
*/
int
in_getconninfo(struct socket *so, sae_connid_t cid, uint32_t *flags,
uint32_t *ifindex, int32_t *soerror, user_addr_t src, socklen_t *src_len,
user_addr_t dst, socklen_t *dst_len, uint32_t *aux_type,
user_addr_t aux_data, uint32_t *aux_len)
{
struct inpcb *inp = sotoinpcb(so);
struct sockaddr_in sin;
struct ifnet *ifp = NULL;
int error = 0;
u_int32_t copy_len = 0;
/*
* Don't test for INPCB_STATE_DEAD since this may be called
* after SOF_PCBCLEARING is set, e.g. after tcp_close().
*/
if (inp == NULL) {
error = EINVAL;
goto out;
}
if (cid != SAE_CONNID_ANY && cid != SAE_CONNID_ALL && cid != 1) {
error = EINVAL;
goto out;
}
ifp = inp->inp_last_outifp;
*ifindex = ((ifp != NULL) ? ifp->if_index : 0);
*soerror = so->so_error;
*flags = 0;
if (so->so_state & SS_ISCONNECTED) {
*flags |= (CIF_CONNECTED | CIF_PREFERRED);
}
if (inp->inp_flags & INP_BOUND_IF) {
*flags |= CIF_BOUND_IF;
}
if (!(inp->inp_flags & INP_INADDR_ANY)) {
*flags |= CIF_BOUND_IP;
}
if (!(inp->inp_flags & INP_ANONPORT)) {
*flags |= CIF_BOUND_PORT;
}
SOCKADDR_ZERO(&sin, sizeof(sin));
sin.sin_len = sizeof(sin);
sin.sin_family = AF_INET;
/* source address and port */
sin.sin_port = inp->inp_lport;
sin.sin_addr.s_addr = inp->inp_laddr.s_addr;
if (*src_len == 0) {
*src_len = sin.sin_len;
} else {
if (src != USER_ADDR_NULL) {
copy_len = min(*src_len, sizeof(sin));
error = copyout(&sin, src, copy_len);
if (error != 0) {
goto out;
}
*src_len = copy_len;
}
}
/* destination address and port */
sin.sin_port = inp->inp_fport;
sin.sin_addr.s_addr = inp->inp_faddr.s_addr;
if (*dst_len == 0) {
*dst_len = sin.sin_len;
} else {
if (dst != USER_ADDR_NULL) {
copy_len = min(*dst_len, sizeof(sin));
error = copyout(&sin, dst, copy_len);
if (error != 0) {
goto out;
}
*dst_len = copy_len;
}
}
if (SOCK_PROTO(so) == IPPROTO_TCP) {
struct conninfo_tcp tcp_ci;
*aux_type = CIAUX_TCP;
if (*aux_len == 0) {
*aux_len = sizeof(tcp_ci);
} else {
if (aux_data != USER_ADDR_NULL) {
copy_len = min(*aux_len, sizeof(tcp_ci));
bzero(&tcp_ci, sizeof(tcp_ci));
tcp_getconninfo(so, &tcp_ci);
error = copyout(&tcp_ci, aux_data, copy_len);
if (error != 0) {
goto out;
}
*aux_len = copy_len;
}
}
} else {
*aux_type = 0;
*aux_len = 0;
}
out:
return error;
}
struct in_ifaddr*
inifa_ifpwithflag(struct ifnet * ifp, uint32_t flag)
{
struct ifaddr *ifa;
ifnet_lock_shared(ifp);
TAILQ_FOREACH(ifa, &ifp->if_addrlist, ifa_link)
{
IFA_LOCK_SPIN(ifa);
if (ifa->ifa_addr->sa_family != AF_INET) {
IFA_UNLOCK(ifa);
continue;
}
if ((((struct in_ifaddr *)ifa)->ia_flags & flag) == flag) {
ifa_addref(ifa);
IFA_UNLOCK(ifa);
break;
}
IFA_UNLOCK(ifa);
}
ifnet_lock_done(ifp);
return (struct in_ifaddr *)ifa;
}
struct in_ifaddr *
inifa_ifpclatv4(struct ifnet * ifp)
{
struct ifaddr *ifa;
ifnet_lock_shared(ifp);
TAILQ_FOREACH(ifa, &ifp->if_addrlist, ifa_link)
{
uint32_t addr = 0;
IFA_LOCK_SPIN(ifa);
if (ifa->ifa_addr->sa_family != AF_INET) {
IFA_UNLOCK(ifa);
continue;
}
addr = ntohl(SIN(ifa->ifa_addr)->sin_addr.s_addr);
if (!IN_LINKLOCAL(addr) &&
!IN_LOOPBACK(addr)) {
ifa_addref(ifa);
IFA_UNLOCK(ifa);
break;
}
IFA_UNLOCK(ifa);
}
ifnet_lock_done(ifp);
return (struct in_ifaddr *)ifa;
}
/*
* IPPROTO_xxx.
*
* The switch statement below does nothing at runtime, as it serves as a
* compile time check to ensure that all of the IPPROTO_xxx constants are
* unique. This works as long as this routine gets updated each time a
* new IPPROTO_xxx constant gets added.
*
* Any failures at compile time indicates duplicated IPPROTO_xxx values.
*/
static __attribute__((unused)) void
ipproto_cassert(void)
{
/*
* This is equivalent to _CASSERT() and the compiler wouldn't
* generate any instructions, thus for compile time only.
*/
switch ((u_int16_t)0) {
/* bsd/netinet/in.h */
case IPPROTO_IP:
// case IPPROTO_HOPOPTS: // same value as IPPROTO_IP
case IPPROTO_ICMP:
case IPPROTO_IGMP:
case IPPROTO_GGP:
case IPPROTO_IPV4:
// #define IPPROTO_IPIP IPPROTO_IPV4
case IPPROTO_TCP:
case IPPROTO_ST:
case IPPROTO_EGP:
case IPPROTO_PIGP:
case IPPROTO_RCCMON:
case IPPROTO_NVPII:
case IPPROTO_PUP:
case IPPROTO_ARGUS:
case IPPROTO_EMCON:
case IPPROTO_XNET:
case IPPROTO_CHAOS:
case IPPROTO_UDP:
case IPPROTO_MUX:
case IPPROTO_MEAS:
case IPPROTO_HMP:
case IPPROTO_PRM:
case IPPROTO_IDP:
case IPPROTO_TRUNK1:
case IPPROTO_TRUNK2:
case IPPROTO_LEAF1:
case IPPROTO_LEAF2:
case IPPROTO_RDP:
case IPPROTO_IRTP:
case IPPROTO_TP:
case IPPROTO_BLT:
case IPPROTO_NSP:
case IPPROTO_INP:
case IPPROTO_SEP:
case IPPROTO_3PC:
case IPPROTO_IDPR:
case IPPROTO_XTP:
case IPPROTO_DDP:
case IPPROTO_CMTP:
case IPPROTO_TPXX:
case IPPROTO_IL:
case IPPROTO_IPV6:
case IPPROTO_SDRP:
case IPPROTO_ROUTING:
case IPPROTO_FRAGMENT:
case IPPROTO_IDRP:
case IPPROTO_RSVP:
case IPPROTO_GRE:
case IPPROTO_MHRP:
case IPPROTO_BHA:
case IPPROTO_ESP:
case IPPROTO_AH:
case IPPROTO_INLSP:
case IPPROTO_SWIPE:
case IPPROTO_NHRP:
case IPPROTO_ICMPV6:
case IPPROTO_NONE:
case IPPROTO_DSTOPTS:
case IPPROTO_AHIP:
case IPPROTO_CFTP:
case IPPROTO_HELLO:
case IPPROTO_SATEXPAK:
case IPPROTO_KRYPTOLAN:
case IPPROTO_RVD:
case IPPROTO_IPPC:
case IPPROTO_ADFS:
case IPPROTO_SATMON:
case IPPROTO_VISA:
case IPPROTO_IPCV:
case IPPROTO_CPNX:
case IPPROTO_CPHB:
case IPPROTO_WSN:
case IPPROTO_PVP:
case IPPROTO_BRSATMON:
case IPPROTO_ND:
case IPPROTO_WBMON:
case IPPROTO_WBEXPAK:
case IPPROTO_EON:
case IPPROTO_VMTP:
case IPPROTO_SVMTP:
case IPPROTO_VINES:
case IPPROTO_TTP:
case IPPROTO_IGP:
case IPPROTO_DGP:
case IPPROTO_TCF:
case IPPROTO_IGRP:
case IPPROTO_OSPFIGP:
case IPPROTO_SRPC:
case IPPROTO_LARP:
case IPPROTO_MTP:
case IPPROTO_AX25:
case IPPROTO_IPEIP:
case IPPROTO_MICP:
case IPPROTO_SCCSP:
case IPPROTO_ETHERIP:
case IPPROTO_ENCAP:
case IPPROTO_APES:
case IPPROTO_GMTP:
case IPPROTO_PIM:
case IPPROTO_IPCOMP:
case IPPROTO_PGM:
case IPPROTO_SCTP:
case IPPROTO_DIVERT:
case IPPROTO_RAW:
case IPPROTO_MAX:
case IPPROTO_DONE:
/* bsd/netinet/in_private.h */
case IPPROTO_QUIC:
;
}
}
static __attribute__((unused)) void
ipsockopt_cassert(void)
{
switch ((int)0) {
case 0:
/* bsd/netinet/in.h */
case IP_OPTIONS:
case IP_HDRINCL:
case IP_TOS:
case IP_TTL:
case IP_RECVOPTS:
case IP_RECVRETOPTS:
case IP_RECVDSTADDR:
case IP_RETOPTS:
case IP_MULTICAST_IF:
case IP_MULTICAST_TTL:
case IP_MULTICAST_LOOP:
case IP_ADD_MEMBERSHIP:
case IP_DROP_MEMBERSHIP:
case IP_MULTICAST_VIF:
case IP_RSVP_ON:
case IP_RSVP_OFF:
case IP_RSVP_VIF_ON:
case IP_RSVP_VIF_OFF:
case IP_PORTRANGE:
case IP_RECVIF:
case IP_IPSEC_POLICY:
case IP_FAITH:
#ifdef __APPLE__
case IP_STRIPHDR:
#endif
case IP_RECVTTL:
case IP_BOUND_IF:
case IP_PKTINFO:
// #define IP_RECVPKTINFO IP_PKTINFO
case IP_RECVTOS:
case IP_DONTFRAG:
case IP_FW_ADD:
case IP_FW_DEL:
case IP_FW_FLUSH:
case IP_FW_ZERO:
case IP_FW_GET:
case IP_FW_RESETLOG:
case IP_OLD_FW_ADD:
case IP_OLD_FW_DEL:
case IP_OLD_FW_FLUSH:
case IP_OLD_FW_ZERO:
case IP_OLD_FW_GET:
case IP_NAT__XXX:
case IP_OLD_FW_RESETLOG:
case IP_DUMMYNET_CONFIGURE:
case IP_DUMMYNET_DEL:
case IP_DUMMYNET_FLUSH:
case IP_DUMMYNET_GET:
case IP_TRAFFIC_MGT_BACKGROUND:
case IP_MULTICAST_IFINDEX:
case IP_ADD_SOURCE_MEMBERSHIP:
case IP_DROP_SOURCE_MEMBERSHIP:
case IP_BLOCK_SOURCE:
case IP_UNBLOCK_SOURCE:
case IP_MSFILTER:
case MCAST_JOIN_GROUP:
case MCAST_LEAVE_GROUP:
case MCAST_JOIN_SOURCE_GROUP:
case MCAST_LEAVE_SOURCE_GROUP:
case MCAST_BLOCK_SOURCE:
case MCAST_UNBLOCK_SOURCE:
/* bsd/netinet/in_private.h */
case IP_NO_IFT_CELLULAR:
// #define IP_NO_IFT_PDP IP_NO_IFT_CELLULAR /* deprecated */
case IP_OUT_IF:
;
}
}