2 * Copyright (c) 2000-2013 Apple Inc. All rights reserved.
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
29 * Copyright (c) 1982, 1989, 1993
30 * The Regents of the University of California. All rights reserved.
32 * Redistribution and use in source and binary forms, with or without
33 * modification, are permitted provided that the following conditions
35 * 1. Redistributions of source code must retain the above copyright
36 * notice, this list of conditions and the following disclaimer.
37 * 2. Redistributions in binary form must reproduce the above copyright
38 * notice, this list of conditions and the following disclaimer in the
39 * documentation and/or other materials provided with the distribution.
40 * 3. All advertising materials mentioning features or use of this software
41 * must display the following acknowledgement:
42 * This product includes software developed by the University of
43 * California, Berkeley and its contributors.
44 * 4. Neither the name of the University nor the names of its contributors
45 * may be used to endorse or promote products derived from this software
46 * without specific prior written permission.
48 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
49 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
50 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
51 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
52 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
53 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
54 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
55 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
56 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
57 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
62 * NOTICE: This file was modified by SPARTA, Inc. in 2006 to introduce
63 * support for mandatory and extensible security protections. This notice
64 * is included in support of clause 2.2 (b) of the Apple Public License,
69 #include <sys/param.h>
70 #include <sys/systm.h>
71 #include <sys/kernel.h>
72 #include <sys/malloc.h>
74 #include <sys/socket.h>
75 #include <sys/sockio.h>
76 #include <sys/sysctl.h>
80 #include <net/route.h>
81 #include <net/if_llc.h>
82 #include <net/if_dl.h>
83 #include <net/if_types.h>
84 #include <net/kpi_protocol.h>
85 #include <netinet/in.h>
86 #include <netinet/in_var.h>
87 #include <netinet/if_ether.h>
88 #include <netinet/in_systm.h>
89 #include <netinet/ip.h>
90 #include <netinet/in_arp.h>
92 #include <sys/socketvar.h>
96 /* #include "vlan.h" */
98 #include <net/if_vlan_var.h>
99 #endif /* NVLAN > 0 */
100 #include <net/ether_if_module.h>
102 #include <security/mac_framework.h>
105 /* Local function declarations */
106 extern void *kdp_get_interface(void);
107 extern void kdp_set_ip_and_mac_addresses(struct in_addr
*ipaddr
,
108 struct ether_addr
*macaddr
);
110 #define _ip_copy(dst, src) \
111 bcopy(src, dst, sizeof (struct in_addr))
114 ether_inet_arp_input(struct ifnet
*ifp
, struct mbuf
*m
)
116 struct ether_arp
*ea
;
117 struct sockaddr_dl sender_hw
;
118 struct sockaddr_in sender_ip
;
119 struct sockaddr_in target_ip
;
121 if (mbuf_len(m
) < sizeof (*ea
) && mbuf_pullup(&m
, sizeof (*ea
)) != 0)
126 /* Verify this is an ethernet/ip arp and address lengths are correct */
127 if (ntohs(ea
->arp_hrd
) != ARPHRD_ETHER
||
128 ntohs(ea
->arp_pro
) != ETHERTYPE_IP
||
129 ea
->arp_pln
!= sizeof (struct in_addr
) ||
130 ea
->arp_hln
!= ETHER_ADDR_LEN
) {
135 /* Verify the sender is not broadcast */
136 if (bcmp(ea
->arp_sha
, etherbroadcastaddr
, ETHER_ADDR_LEN
) == 0) {
141 bzero(&sender_ip
, sizeof (sender_ip
));
142 sender_ip
.sin_len
= sizeof (sender_ip
);
143 sender_ip
.sin_family
= AF_INET
;
144 _ip_copy(&sender_ip
.sin_addr
, ea
->arp_spa
);
145 target_ip
= sender_ip
;
146 _ip_copy(&target_ip
.sin_addr
, ea
->arp_tpa
);
148 bzero(&sender_hw
, sizeof (sender_hw
));
149 sender_hw
.sdl_len
= sizeof (sender_hw
);
150 sender_hw
.sdl_family
= AF_LINK
;
151 sender_hw
.sdl_type
= IFT_ETHER
;
152 sender_hw
.sdl_alen
= ETHER_ADDR_LEN
;
153 bcopy(ea
->arp_sha
, LLADDR(&sender_hw
), ETHER_ADDR_LEN
);
155 /* update L2 reachability record, if present */
156 arp_llreach_set_reachable(ifp
, LLADDR(&sender_hw
), ETHER_ADDR_LEN
);
158 arp_ip_handle_input(ifp
, ntohs(ea
->arp_op
), &sender_hw
, &sender_ip
,
164 * Process a received Ethernet packet;
165 * the packet is in the mbuf chain m without
166 * the ether header, which is provided separately.
169 ether_inet_input(ifnet_t ifp
, protocol_family_t protocol_family
,
172 #pragma unused(ifp, protocol_family)
174 mbuf_t
*tailptr
= &m_list
;
177 /* Strip ARP and non-IP packets out of the list */
178 for (m
= m_list
; m
; m
= nextpkt
) {
179 struct ether_header
*eh
= mbuf_pkthdr_header(m
);
183 * Trust the ifp in the mbuf, rather than ifproto's
184 * since the packet could have been injected via
185 * a dlil_input_packet_list() using an ifp that is
186 * different than the one where the packet really
189 mifp
= mbuf_pkthdr_rcvif(m
);
191 nextpkt
= m
->m_nextpkt
;
193 if (eh
->ether_type
== htons(ETHERTYPE_IP
)) {
195 * Update L2 reachability record, if present
196 * (and if not a broadcast sender).
198 if (bcmp(eh
->ether_shost
, etherbroadcastaddr
,
199 ETHER_ADDR_LEN
) != 0) {
200 arp_llreach_set_reachable(mifp
, eh
->ether_shost
,
203 /* put this packet in the list */
205 tailptr
= &m
->m_nextpkt
;
207 /* Pass ARP packets to arp input */
209 if (eh
->ether_type
== htons(ETHERTYPE_ARP
))
210 ether_inet_arp_input(mifp
, m
);
218 /* Pass IP list to ip input */
219 if (m_list
!= NULL
&& proto_input(PF_INET
, m_list
) != 0) {
220 mbuf_freem_list(m_list
);
223 return (EJUSTRETURN
);
227 ether_inet_pre_output(ifnet_t ifp
, protocol_family_t protocol_family
,
228 mbuf_t
*m0
, const struct sockaddr
*dst_netaddr
,
229 void *route
, char *type
, char *edst
)
231 #pragma unused(protocol_family)
232 struct mbuf
*m
= *m0
;
233 const struct ether_header
*eh
;
236 if ((ifp
->if_flags
& (IFF_UP
|IFF_RUNNING
)) != (IFF_UP
|IFF_RUNNING
))
240 * Tell ether_frameout it's ok to loop packet unless negated below.
242 m
->m_flags
|= M_LOOP
;
244 switch (dst_netaddr
->sa_family
) {
246 struct sockaddr_dl ll_dest
;
248 result
= arp_lookup_ip(ifp
,
249 (const struct sockaddr_in
*)(uintptr_t)(size_t)dst_netaddr
,
250 &ll_dest
, sizeof (ll_dest
), (route_t
)route
, *m0
);
252 u_int16_t ethertype_ip
= htons(ETHERTYPE_IP
);
254 bcopy(LLADDR(&ll_dest
), edst
, ETHER_ADDR_LEN
);
255 bcopy(ðertype_ip
, type
, sizeof (ethertype_ip
));
260 case pseudo_AF_HDRCMPLT
:
262 m
->m_flags
&= ~M_LOOP
;
263 eh
= (const struct ether_header
*)(uintptr_t)(size_t)
264 dst_netaddr
->sa_data
;
265 (void) memcpy(edst
, eh
->ether_dhost
, 6);
266 bcopy(&eh
->ether_type
, type
, sizeof (u_short
));
270 printf("%s: can't handle af%d\n", if_name(ifp
),
271 dst_netaddr
->sa_family
);
273 result
= EAFNOSUPPORT
;
281 ether_inet_resolve_multi(ifnet_t ifp
, const struct sockaddr
*proto_addr
,
282 struct sockaddr_dl
*out_ll
, size_t ll_len
)
284 static const size_t minsize
=
285 offsetof(struct sockaddr_dl
, sdl_data
[0]) + ETHER_ADDR_LEN
;
286 const struct sockaddr_in
*sin
=
287 (const struct sockaddr_in
*)(uintptr_t)(size_t)proto_addr
;
289 if (proto_addr
->sa_family
!= AF_INET
)
290 return (EAFNOSUPPORT
);
292 if (proto_addr
->sa_len
< sizeof (struct sockaddr_in
))
295 if (ll_len
< minsize
)
298 bzero(out_ll
, minsize
);
299 out_ll
->sdl_len
= minsize
;
300 out_ll
->sdl_family
= AF_LINK
;
301 out_ll
->sdl_index
= ifp
->if_index
;
302 out_ll
->sdl_type
= IFT_ETHER
;
303 out_ll
->sdl_nlen
= 0;
304 out_ll
->sdl_alen
= ETHER_ADDR_LEN
;
305 out_ll
->sdl_slen
= 0;
306 ETHER_MAP_IP_MULTICAST(&sin
->sin_addr
, LLADDR(out_ll
));
312 ether_inet_prmod_ioctl(ifnet_t ifp
, protocol_family_t protocol_family
,
313 u_long command
, void *data
)
315 #pragma unused(protocol_family)
319 case SIOCSIFADDR
: /* struct ifaddr pointer */
320 case SIOCAIFADDR
: { /* struct ifaddr pointer */
322 * Note: caller of ifnet_ioctl() passes in pointer to
323 * struct ifaddr as parameter to SIOC{A,S}IFADDR, for
326 struct ifaddr
*ifa
= data
;
328 if (!(ifnet_flags(ifp
) & IFF_RUNNING
)) {
329 ifnet_set_flags(ifp
, IFF_UP
, IFF_UP
);
330 ifnet_ioctl(ifp
, 0, SIOCSIFFLAGS
, NULL
);
333 if (ifaddr_address_family(ifa
) != AF_INET
)
336 inet_arp_init_ifaddr(ifp
, ifa
);
338 if (command
!= SIOCSIFADDR
)
342 * Register new IP and MAC addresses with the kernel
343 * debugger if the interface is the same as was registered
344 * by IOKernelDebugger. If no interface was registered,
345 * fall back and just match against en0 interface.
346 * Do this only for the first address of the interface
347 * and not for aliases.
349 if ((kdp_get_interface() != 0 &&
350 kdp_get_interface() == ifp
->if_softc
) ||
351 (kdp_get_interface() == 0 && ifp
->if_unit
== 0))
352 kdp_set_ip_and_mac_addresses(&(IA_SIN(ifa
)->sin_addr
),
353 (struct ether_addr
*)IF_LLADDR(ifp
));
357 case SIOCGIFADDR
: { /* struct ifreq */
358 struct ifreq
*ifr
= data
;
359 ifnet_guarded_lladdr_copy_bytes(ifp
, ifr
->ifr_addr
.sa_data
,
373 ether_inet_event(ifnet_t ifp
, protocol_family_t protocol
,
374 const struct kev_msg
*event
)
376 #pragma unused(protocol)
379 if (event
->vendor_code
!= KEV_VENDOR_APPLE
||
380 event
->kev_class
!= KEV_NETWORK_CLASS
||
381 event
->kev_subclass
!= KEV_DL_SUBCLASS
||
382 event
->event_code
!= KEV_DL_LINK_ADDRESS_CHANGED
) {
386 if (ifnet_get_address_list_family(ifp
, &addresses
, AF_INET
) == 0) {
389 for (i
= 0; addresses
[i
] != NULL
; i
++) {
390 inet_arp_init_ifaddr(ifp
, addresses
[i
]);
393 ifnet_free_address_list(addresses
);
398 ether_inet_arp(ifnet_t ifp
, u_short arpop
, const struct sockaddr_dl
*sender_hw
,
399 const struct sockaddr
*sender_proto
, const struct sockaddr_dl
*target_hw
,
400 const struct sockaddr
*target_proto
)
404 struct ether_header
*eh
;
405 struct ether_arp
*ea
;
406 const struct sockaddr_in
*sender_ip
=
407 (const struct sockaddr_in
*)(uintptr_t)(size_t)sender_proto
;
408 const struct sockaddr_inarp
*target_ip
=
409 (const struct sockaddr_inarp
*)(uintptr_t)(size_t)target_proto
;
412 if (target_ip
== NULL
)
415 if ((sender_ip
&& sender_ip
->sin_family
!= AF_INET
) ||
416 target_ip
->sin_family
!= AF_INET
)
417 return (EAFNOSUPPORT
);
419 result
= mbuf_gethdr(MBUF_DONTWAIT
, MBUF_TYPE_DATA
, &m
);
423 mbuf_setlen(m
, sizeof (*ea
));
424 mbuf_pkthdr_setlen(m
, sizeof (*ea
));
426 /* Move the data pointer in the mbuf to the end, aligned to 4 bytes */
427 datap
= mbuf_datastart(m
);
428 datap
+= mbuf_trailingspace(m
);
429 datap
-= (((uintptr_t)datap
) & 0x3);
430 mbuf_setdata(m
, datap
, sizeof (*ea
));
434 * Prepend the ethernet header, we will send the raw frame;
435 * callee frees the original mbuf when allocation fails.
437 result
= mbuf_prepend(&m
, sizeof (*eh
), MBUF_DONTWAIT
);
442 eh
->ether_type
= htons(ETHERTYPE_ARP
);
445 mac_mbuf_label_associate_linklayer(ifp
, m
);
448 /* Fill out the arp header */
449 ea
->arp_pro
= htons(ETHERTYPE_IP
);
450 ea
->arp_hln
= sizeof (ea
->arp_sha
);
451 ea
->arp_pln
= sizeof (ea
->arp_spa
);
452 ea
->arp_hrd
= htons(ARPHRD_ETHER
);
453 ea
->arp_op
= htons(arpop
);
455 /* Sender Hardware */
456 if (sender_hw
!= NULL
) {
457 bcopy(CONST_LLADDR(sender_hw
), ea
->arp_sha
,
458 sizeof (ea
->arp_sha
));
460 ifnet_lladdr_copy_bytes(ifp
, ea
->arp_sha
, ETHER_ADDR_LEN
);
462 ifnet_lladdr_copy_bytes(ifp
, eh
->ether_shost
, sizeof (eh
->ether_shost
));
465 if (sender_ip
!= NULL
) {
466 bcopy(&sender_ip
->sin_addr
, ea
->arp_spa
, sizeof (ea
->arp_spa
));
470 /* Look for an IP address to use as our source */
471 ifnet_lock_shared(ifp
);
472 TAILQ_FOREACH(ifa
, &ifp
->if_addrhead
, ifa_link
) {
474 if (ifa
->ifa_addr
!= NULL
&&
475 ifa
->ifa_addr
->sa_family
== AF_INET
) {
476 bcopy(&((struct sockaddr_in
*)(void *)
477 ifa
->ifa_addr
)->sin_addr
, ea
->arp_spa
,
478 sizeof (ea
->arp_spa
));
484 ifnet_lock_done(ifp
);
492 /* Target Hardware */
493 if (target_hw
== NULL
) {
494 bzero(ea
->arp_tha
, sizeof (ea
->arp_tha
));
495 bcopy(etherbroadcastaddr
, eh
->ether_dhost
,
496 sizeof (eh
->ether_dhost
));
497 m
->m_flags
|= M_BCAST
;
499 bcopy(CONST_LLADDR(target_hw
), ea
->arp_tha
,
500 sizeof (ea
->arp_tha
));
501 bcopy(CONST_LLADDR(target_hw
), eh
->ether_dhost
,
502 sizeof (eh
->ether_dhost
));
504 if (bcmp(eh
->ether_dhost
, etherbroadcastaddr
,
505 ETHER_ADDR_LEN
) == 0)
506 m
->m_flags
|= M_BCAST
;
510 bcopy(&target_ip
->sin_addr
, ea
->arp_tpa
, sizeof (ea
->arp_tpa
));
513 * PKTF_{INET,INET6}_RESOLVE_RTR are mutually exclusive, so make
514 * sure only one of them is set (just in case.)
516 m
->m_pkthdr
.pkt_flags
&= ~(PKTF_INET6_RESOLVE
| PKTF_RESOLVE_RTR
);
517 m
->m_pkthdr
.pkt_flags
|= PKTF_INET_RESOLVE
;
519 * If this is an ARP request for a (default) router, mark
520 * the packet accordingly so that the driver can find out,
521 * in case it needs to perform driver-specific action(s).
523 if (arpop
== ARPOP_REQUEST
&& (target_ip
->sin_other
& SIN_ROUTER
))
524 m
->m_pkthdr
.pkt_flags
|= PKTF_RESOLVE_RTR
;
526 if (ifp
->if_eflags
& IFEF_TXSTART
) {
528 * Use control service class if the interface
529 * supports transmit-start model
531 (void) m_set_service_class(m
, MBUF_SC_CTL
);
534 ifnet_output_raw(ifp
, PF_INET
, m
);
540 ether_attach_inet(struct ifnet
*ifp
, protocol_family_t proto_family
)
542 #pragma unused(proto_family)
543 struct ifnet_attach_proto_param_v2 proto
;
544 struct ifnet_demux_desc demux
[2];
545 u_short en_native
= htons(ETHERTYPE_IP
);
546 u_short arp_native
= htons(ETHERTYPE_ARP
);
549 bzero(&demux
[0], sizeof (demux
));
550 demux
[0].type
= DLIL_DESC_ETYPE2
;
551 demux
[0].data
= &en_native
;
552 demux
[0].datalen
= sizeof (en_native
);
553 demux
[1].type
= DLIL_DESC_ETYPE2
;
554 demux
[1].data
= &arp_native
;
555 demux
[1].datalen
= sizeof (arp_native
);
557 bzero(&proto
, sizeof (proto
));
558 proto
.demux_list
= demux
;
559 proto
.demux_count
= sizeof (demux
) / sizeof (demux
[0]);
560 proto
.input
= ether_inet_input
;
561 proto
.pre_output
= ether_inet_pre_output
;
562 proto
.ioctl
= ether_inet_prmod_ioctl
;
563 proto
.event
= ether_inet_event
;
564 proto
.resolve
= ether_inet_resolve_multi
;
565 proto
.send_arp
= ether_inet_arp
;
567 error
= ifnet_attach_protocol_v2(ifp
, proto_family
, &proto
);
568 if (error
&& error
!= EEXIST
) {
569 printf("WARNING: %s can't attach ip to %s\n", __func__
,
576 ether_detach_inet(struct ifnet
*ifp
, protocol_family_t proto_family
)
578 (void) ifnet_detach_protocol(ifp
, proto_family
);