]> git.saurik.com Git - apple/xnu.git/blob - bsd/netinet6/in6_ifattach.c
xnu-3247.1.106.tar.gz
[apple/xnu.git] / bsd / netinet6 / in6_ifattach.c
1 /*
2 * Copyright (c) 2003-2015 Apple Inc. All rights reserved.
3 *
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
14 *
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
17 *
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
25 *
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
27 */
28
29 /*
30 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
31 * All rights reserved.
32 *
33 * Redistribution and use in source and binary forms, with or without
34 * modification, are permitted provided that the following conditions
35 * are met:
36 * 1. Redistributions of source code must retain the above copyright
37 * notice, this list of conditions and the following disclaimer.
38 * 2. Redistributions in binary form must reproduce the above copyright
39 * notice, this list of conditions and the following disclaimer in the
40 * documentation and/or other materials provided with the distribution.
41 * 3. Neither the name of the project nor the names of its contributors
42 * may be used to endorse or promote products derived from this software
43 * without specific prior written permission.
44 *
45 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
46 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
47 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
48 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
49 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
50 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
51 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
52 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
53 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
54 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
55 * SUCH DAMAGE.
56 */
57
58 #include <sys/param.h>
59 #include <sys/systm.h>
60 #include <sys/malloc.h>
61 #include <sys/socket.h>
62 #include <sys/socketvar.h>
63 #include <sys/sockio.h>
64 #include <sys/kernel.h>
65 #include <sys/syslog.h>
66 #include <libkern/crypto/sha1.h>
67 #include <libkern/OSAtomic.h>
68 #include <kern/locks.h>
69
70 #include <net/if.h>
71 #include <net/if_dl.h>
72 #include <net/if_types.h>
73 #include <net/route.h>
74 #include <net/kpi_protocol.h>
75
76 #include <netinet/in.h>
77 #include <netinet/in_var.h>
78 #include <netinet/if_ether.h>
79 #include <netinet/in_pcb.h>
80 #include <netinet/icmp6.h>
81
82 #include <netinet/ip6.h>
83 #include <netinet6/ip6_var.h>
84 #include <netinet6/in6_var.h>
85 #include <netinet6/in6_pcb.h>
86 #include <netinet6/in6_ifattach.h>
87 #include <netinet6/ip6_var.h>
88 #include <netinet6/nd6.h>
89 #include <netinet6/scope6_var.h>
90
91 #include <net/net_osdep.h>
92 #include <dev/random/randomdev.h>
93
94 u_int32_t in6_maxmtu = 0;
95 extern lck_mtx_t *nd6_mutex;
96
97 #if IP6_AUTO_LINKLOCAL
98 int ip6_auto_linklocal = IP6_AUTO_LINKLOCAL;
99 #else
100 int ip6_auto_linklocal = 1; /* enable by default */
101 #endif
102
103 extern struct inpcbinfo udbinfo;
104 extern struct inpcbinfo ripcbinfo;
105
106 static const unsigned int in6_extra_size = sizeof(struct in6_ifextra);
107 static const unsigned int in6_extra_bufsize = in6_extra_size +
108 sizeof(void *) + sizeof(uint64_t);
109
110 static int get_rand_iid(struct ifnet *, struct in6_addr *);
111 static int in6_generate_tmp_iid(u_int8_t *, const u_int8_t *, u_int8_t *);
112 static int in6_select_iid_from_all_hw(struct ifnet *, struct ifnet *,
113 struct in6_addr *);
114 static int in6_ifattach_linklocal(struct ifnet *, struct in6_aliasreq *);
115 static int in6_ifattach_loopback(struct ifnet *);
116
117 /*
118 * Generate a last-resort interface identifier, when the machine has no
119 * IEEE802/EUI64 address sources.
120 * The goal here is to get an interface identifier that is
121 * (1) random enough and (2) does not change across reboot.
122 * We currently use SHA1(hostname) for it.
123 *
124 * in6 - upper 64bits are preserved
125 */
126 static int
127 get_rand_iid(
128 __unused struct ifnet *ifp,
129 struct in6_addr *in6) /* upper 64bits are preserved */
130 {
131 SHA1_CTX ctxt;
132 u_int8_t digest[SHA1_RESULTLEN];
133 int hostnlen = strlen(hostname);
134
135 /* generate 8 bytes of pseudo-random value. */
136 bzero(&ctxt, sizeof (ctxt));
137 SHA1Init(&ctxt);
138 SHA1Update(&ctxt, hostname, hostnlen);
139 SHA1Final(digest, &ctxt);
140
141 /* assumes sizeof (digest) > sizeof (iid) */
142 bcopy(digest, &in6->s6_addr[8], 8);
143
144 /* make sure to set "u" bit to local, and "g" bit to individual. */
145 in6->s6_addr[8] &= ~ND6_EUI64_GBIT; /* g bit to "individual" */
146 in6->s6_addr[8] |= ND6_EUI64_UBIT; /* u bit to "local" */
147
148 /* convert EUI64 into IPv6 interface identifier */
149 ND6_EUI64_TO_IFID(in6);
150
151 return (0);
152 }
153
154 static int
155 in6_generate_tmp_iid(
156 u_int8_t *seed0,
157 const u_int8_t *seed1,
158 u_int8_t *ret)
159 {
160 SHA1_CTX ctxt;
161 u_int8_t seed[16], nullbuf[8], digest[SHA1_RESULTLEN];
162 u_int32_t val32;
163 struct timeval tv;
164
165 /* If there's no history, start with a random seed. */
166 bzero(nullbuf, sizeof (nullbuf));
167 if (bcmp(nullbuf, seed0, sizeof (nullbuf)) == 0) {
168 int i;
169
170 for (i = 0; i < 2; i++) {
171 getmicrotime(&tv);
172 val32 = RandomULong() ^ tv.tv_usec;
173 bcopy(&val32, seed + sizeof (val32) * i,
174 sizeof (val32));
175 }
176 } else {
177 bcopy(seed0, seed, 8);
178 }
179
180 /* copy the right-most 64-bits of the given address */
181 /* XXX assumption on the size of IFID */
182 bcopy(seed1, &seed[8], 8);
183
184 if ((0)) { /* for debugging purposes only */
185 int i;
186
187 printf("%s: new randomized ID from: ", __func__);
188 for (i = 0; i < 16; i++)
189 printf("%02x", seed[i]);
190 printf(" ");
191 }
192
193 /* generate 16 bytes of pseudo-random value. */
194 bzero(&ctxt, sizeof (ctxt));
195 SHA1Init(&ctxt);
196 SHA1Update(&ctxt, seed, sizeof (seed));
197 SHA1Final(digest, &ctxt);
198
199 /*
200 * RFC 4941 3.2.1. (3)
201 * Take the left-most 64-bits of the SHA1 digest and set bit 6 (the
202 * left-most bit is numbered 0) to zero.
203 */
204 bcopy(digest, ret, 8);
205 ret[0] &= ~ND6_EUI64_UBIT;
206
207 /*
208 * XXX: we'd like to ensure that the generated value is not zero
209 * for simplicity. If the caclculated digest happens to be zero,
210 * use a random non-zero value as the last resort.
211 */
212 if (bcmp(nullbuf, ret, sizeof (nullbuf)) == 0) {
213 nd6log((LOG_INFO,
214 "%s: computed SHA1 value is zero.\n", __func__));
215
216 getmicrotime(&tv);
217 val32 = random() ^ tv.tv_usec;
218 val32 = 1 + (val32 % (0xffffffff - 1));
219 }
220
221 /*
222 * RFC 4941 3.2.1. (4)
223 * Take the next 64-bits of the SHA1 digest and save them in
224 * stable storage as the history value to be used in the next
225 * iteration of the algorithm.
226 */
227 bcopy(&digest[8], seed0, 8);
228
229 if ((0)) { /* for debugging purposes only */
230 int i;
231
232 printf("to: ");
233 for (i = 0; i < 16; i++)
234 printf("%02x", digest[i]);
235 printf("\n");
236 }
237
238 return (0);
239 }
240
241 /*
242 * Get interface identifier for the specified interface using the method in
243 * Appendix A of RFC 4291.
244 *
245 * XXX assumes single sockaddr_dl (AF_LINK address) per an interface
246 *
247 * in6 - upper 64bits are preserved
248 */
249 int
250 in6_iid_from_hw(struct ifnet *ifp, struct in6_addr *in6)
251 {
252 struct ifaddr *ifa = NULL;
253 struct sockaddr_dl *sdl;
254 u_int8_t *addr;
255 size_t addrlen;
256 static u_int8_t allzero[8] = { 0, 0, 0, 0, 0, 0, 0, 0 };
257 static u_int8_t allone[8] =
258 { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff };
259 int err = -1;
260
261 /* Why doesn't this code use ifnet_addrs? */
262 ifnet_lock_shared(ifp);
263 ifa = ifp->if_lladdr;
264 sdl = (struct sockaddr_dl *)(void *)ifa->ifa_addr;
265 if (sdl->sdl_alen == 0) {
266 ifnet_lock_done(ifp);
267 return (-1);
268 }
269 IFA_ADDREF(ifa); /* for this routine */
270 ifnet_lock_done(ifp);
271
272 IFA_LOCK(ifa);
273 addr = (u_int8_t *) LLADDR(sdl);
274 addrlen = sdl->sdl_alen;
275
276 /* get EUI64 */
277 switch (ifp->if_type) {
278 case IFT_ETHER:
279 case IFT_FDDI:
280 case IFT_ISO88025:
281 case IFT_ATM:
282 case IFT_IEEE1394:
283 case IFT_L2VLAN:
284 case IFT_IEEE8023ADLAG:
285 #if IFT_IEEE80211
286 case IFT_IEEE80211:
287 #endif
288 case IFT_BRIDGE:
289 /* IEEE802/EUI64 cases - what others? */
290 /* IEEE1394 uses 16byte length address starting with EUI64 */
291 if (addrlen > 8)
292 addrlen = 8;
293
294 /* look at IEEE802/EUI64 only */
295 if (addrlen != 8 && addrlen != 6)
296 goto done;
297
298 /*
299 * check for invalid MAC address - on bsdi, we see it a lot
300 * since wildboar configures all-zero MAC on pccard before
301 * card insertion.
302 */
303 if (bcmp(addr, allzero, addrlen) == 0)
304 goto done;
305 if (bcmp(addr, allone, addrlen) == 0)
306 goto done;
307
308 /* make EUI64 address */
309 if (addrlen == 8)
310 bcopy(addr, &in6->s6_addr[8], 8);
311 else if (addrlen == 6) {
312 in6->s6_addr[8] = addr[0];
313 in6->s6_addr[9] = addr[1];
314 in6->s6_addr[10] = addr[2];
315 in6->s6_addr[11] = 0xff;
316 in6->s6_addr[12] = 0xfe;
317 in6->s6_addr[13] = addr[3];
318 in6->s6_addr[14] = addr[4];
319 in6->s6_addr[15] = addr[5];
320 }
321 break;
322
323 case IFT_ARCNET:
324 if (addrlen != 1)
325 goto done;
326 if (!addr[0])
327 goto done;
328
329 bzero(&in6->s6_addr[8], 8);
330 in6->s6_addr[15] = addr[0];
331
332 /*
333 * due to insufficient bitwidth, we mark it local.
334 */
335 in6->s6_addr[8] &= ~ND6_EUI64_GBIT; /* g to "individual" */
336 in6->s6_addr[8] |= ND6_EUI64_UBIT; /* u to "local" */
337 break;
338
339 case IFT_GIF:
340 #if IFT_STF
341 case IFT_STF:
342 #endif
343 /*
344 * RFC2893 says: "SHOULD use IPv4 address as IID source".
345 * however, IPv4 address is not very suitable as unique
346 * identifier source (can be renumbered).
347 * we don't do this.
348 */
349 goto done;
350
351 case IFT_CELLULAR:
352 goto done;
353
354 default:
355 goto done;
356 }
357
358 /* sanity check: g bit must not indicate "group" */
359 if (ND6_EUI64_GROUP(in6))
360 goto done;
361
362 /* convert EUI64 into IPv6 interface identifier */
363 ND6_EUI64_TO_IFID(in6);
364
365 /*
366 * sanity check: iid must not be all zero, avoid conflict with
367 * subnet router anycast
368 */
369 if ((in6->s6_addr[8] & ~(ND6_EUI64_GBIT | ND6_EUI64_UBIT)) == 0x00 &&
370 bcmp(&in6->s6_addr[9], allzero, 7) == 0) {
371 goto done;
372 }
373
374 err = 0; /* found */
375
376 done:
377 /* This must not be the last reference to the lladdr */
378 if (IFA_REMREF_LOCKED(ifa) == NULL) {
379 panic("%s: unexpected (missing) refcnt ifa=%p", __func__, ifa);
380 /* NOTREACHED */
381 }
382 IFA_UNLOCK(ifa);
383 return (err);
384 }
385
386 /*
387 * Get interface identifier for the specified interface using the method in
388 * Appendix A of RFC 4291. If it is not available on ifp0, borrow interface
389 * identifier from other information sources.
390 *
391 * ifp - primary EUI64 source
392 * altifp - secondary EUI64 source
393 * in6 - IPv6 address to output IID
394 */
395 static int
396 in6_select_iid_from_all_hw(
397 struct ifnet *ifp0,
398 struct ifnet *altifp, /* secondary EUI64 source */
399 struct in6_addr *in6)
400 {
401 struct ifnet *ifp;
402
403 /* first, try to get it from the interface itself */
404 if (in6_iid_from_hw(ifp0, in6) == 0) {
405 nd6log((LOG_DEBUG, "%s: IID derived from HW interface.\n",
406 if_name(ifp0)));
407 goto success;
408 }
409
410 /* try secondary EUI64 source. this basically is for ATM PVC */
411 if (altifp && in6_iid_from_hw(altifp, in6) == 0) {
412 nd6log((LOG_DEBUG, "%s: IID from alterate HW interface %s.\n",
413 if_name(ifp0), if_name(altifp)));
414 goto success;
415 }
416
417 /* next, try to get it from some other hardware interface */
418 ifnet_head_lock_shared();
419 TAILQ_FOREACH(ifp, &ifnet_head, if_list) {
420 if (ifp == ifp0)
421 continue;
422 if (in6_iid_from_hw(ifp, in6) != 0)
423 continue;
424
425 /*
426 * to borrow IID from other interface, IID needs to be
427 * globally unique
428 */
429 if (ND6_IFID_UNIVERSAL(in6)) {
430 nd6log((LOG_DEBUG, "%s: borrowed IID from %s\n",
431 if_name(ifp0), if_name(ifp)));
432 ifnet_head_done();
433 goto success;
434 }
435 }
436 ifnet_head_done();
437
438 /* last resort: get from random number source */
439 if (get_rand_iid(ifp, in6) == 0) {
440 nd6log((LOG_DEBUG, "%s: IID from PRNG.\n", if_name(ifp0)));
441 goto success;
442 }
443
444 printf("%s: failed to get interface identifier\n", if_name(ifp0));
445 return (-1);
446
447 success:
448 nd6log((LOG_INFO, "%s: IID: "
449 "%02x:%02x:%02x:%02x:%02x:%02x:%02x:%02x\n",
450 if_name(ifp0),
451 in6->s6_addr[8], in6->s6_addr[9],
452 in6->s6_addr[10], in6->s6_addr[11],
453 in6->s6_addr[12], in6->s6_addr[13],
454 in6->s6_addr[14], in6->s6_addr[15]));
455 return (0);
456 }
457
458 static int
459 in6_ifattach_linklocal(struct ifnet *ifp, struct in6_aliasreq *ifra)
460 {
461 struct in6_ifaddr *ia;
462 struct nd_prefix pr0, *pr;
463 int i, error;
464
465 VERIFY(ifra != NULL);
466
467 proto_plumb(PF_INET6, ifp);
468
469 error = in6_update_ifa(ifp, ifra, IN6_IFAUPDATE_DADDELAY, &ia);
470 if (error != 0) {
471 /*
472 * XXX: When the interface does not support IPv6, this call
473 * would fail in the SIOCSIFADDR ioctl. I believe the
474 * notification is rather confusing in this case, so just
475 * suppress it. (jinmei@kame.net 20010130)
476 */
477 if (error != EAFNOSUPPORT)
478 nd6log((LOG_NOTICE, "%s: failed to "
479 "configure a link-local address on %s "
480 "(errno=%d)\n",
481 __func__, if_name(ifp), error));
482 return (EADDRNOTAVAIL);
483 }
484 VERIFY(ia != NULL);
485
486 /*
487 * Make the link-local prefix (fe80::%link/64) as on-link.
488 * Since we'd like to manage prefixes separately from addresses,
489 * we make an ND6 prefix structure for the link-local prefix,
490 * and add it to the prefix list as a never-expire prefix.
491 * XXX: this change might affect some existing code base...
492 */
493 bzero(&pr0, sizeof (pr0));
494 lck_mtx_init(&pr0.ndpr_lock, ifa_mtx_grp, ifa_mtx_attr);
495 pr0.ndpr_ifp = ifp;
496 /* this should be 64 at this moment. */
497 pr0.ndpr_plen = in6_mask2len(&ifra->ifra_prefixmask.sin6_addr, NULL);
498 pr0.ndpr_mask = ifra->ifra_prefixmask.sin6_addr;
499 pr0.ndpr_prefix = ifra->ifra_addr;
500 /* apply the mask for safety. (nd6_prelist_add will apply it again) */
501 for (i = 0; i < 4; i++) {
502 pr0.ndpr_prefix.sin6_addr.s6_addr32[i] &=
503 in6mask64.s6_addr32[i];
504 }
505 /*
506 * Initialize parameters. The link-local prefix must always be
507 * on-link, and its lifetimes never expire.
508 */
509 pr0.ndpr_raf_onlink = 1;
510 pr0.ndpr_raf_auto = 1; /* probably meaningless */
511 pr0.ndpr_vltime = ND6_INFINITE_LIFETIME;
512 pr0.ndpr_pltime = ND6_INFINITE_LIFETIME;
513 pr0.ndpr_stateflags |= NDPRF_STATIC;
514 /*
515 * Since there is no other link-local addresses, nd6_prefix_lookup()
516 * probably returns NULL. However, we cannot always expect the result.
517 * For example, if we first remove the (only) existing link-local
518 * address, and then reconfigure another one, the prefix is still
519 * valid with referring to the old link-local address.
520 */
521 if ((pr = nd6_prefix_lookup(&pr0, ND6_PREFIX_EXPIRY_UNSPEC)) == NULL) {
522 if ((error = nd6_prelist_add(&pr0, NULL, &pr, TRUE)) != 0) {
523 IFA_REMREF(&ia->ia_ifa);
524 lck_mtx_destroy(&pr0.ndpr_lock, ifa_mtx_grp);
525 return (error);
526 }
527 }
528
529 in6_post_msg(ifp, KEV_INET6_NEW_LL_ADDR, ia, NULL);
530 IFA_REMREF(&ia->ia_ifa);
531
532 /* Drop use count held above during lookup/add */
533 if (pr != NULL)
534 NDPR_REMREF(pr);
535
536 lck_mtx_destroy(&pr0.ndpr_lock, ifa_mtx_grp);
537 return (0);
538 }
539
540 static int
541 in6_ifattach_loopback(
542 struct ifnet *ifp) /* must be IFT_LOOP */
543 {
544 struct in6_aliasreq ifra;
545 struct in6_ifaddr *ia;
546 int error;
547
548 bzero(&ifra, sizeof (ifra));
549
550 /*
551 * in6_update_ifa() does not use ifra_name, but we accurately set it
552 * for safety.
553 */
554 strlcpy(ifra.ifra_name, if_name(ifp), sizeof (ifra.ifra_name));
555
556 ifra.ifra_prefixmask.sin6_len = sizeof (struct sockaddr_in6);
557 ifra.ifra_prefixmask.sin6_family = AF_INET6;
558 ifra.ifra_prefixmask.sin6_addr = in6mask128;
559
560 /*
561 * Always initialize ia_dstaddr (= broadcast address) to loopback
562 * address. Follows IPv4 practice - see in_ifinit().
563 */
564 ifra.ifra_dstaddr.sin6_len = sizeof (struct sockaddr_in6);
565 ifra.ifra_dstaddr.sin6_family = AF_INET6;
566 ifra.ifra_dstaddr.sin6_addr = in6addr_loopback;
567
568 ifra.ifra_addr.sin6_len = sizeof (struct sockaddr_in6);
569 ifra.ifra_addr.sin6_family = AF_INET6;
570 ifra.ifra_addr.sin6_addr = in6addr_loopback;
571
572 /* the loopback address should NEVER expire. */
573 ifra.ifra_lifetime.ia6t_vltime = ND6_INFINITE_LIFETIME;
574 ifra.ifra_lifetime.ia6t_pltime = ND6_INFINITE_LIFETIME;
575
576 /* we don't need to perform DAD on loopback interfaces. */
577 ifra.ifra_flags |= IN6_IFF_NODAD;
578
579 /* add the new interface address */
580 error = in6_update_ifa(ifp, &ifra, 0, &ia);
581 if (error != 0) {
582 nd6log((LOG_ERR,
583 "%s: failed to configure loopback address %s (error=%d)\n",
584 __func__, if_name(ifp), error));
585 VERIFY(ia == NULL);
586 return (EADDRNOTAVAIL);
587 }
588
589 VERIFY(ia != NULL);
590 IFA_REMREF(&ia->ia_ifa);
591 return (0);
592 }
593
594 /*
595 * compute NI group address, based on the current hostname setting.
596 * see RFC 4620.
597 *
598 * when ifp == NULL, the caller is responsible for filling scopeid.
599 */
600 int
601 in6_nigroup(
602 struct ifnet *ifp,
603 const char *name,
604 int namelen,
605 struct in6_addr *in6)
606 {
607 const char *p;
608 u_char *q;
609 SHA1_CTX ctxt;
610 u_int8_t digest[SHA1_RESULTLEN];
611 char l;
612 char n[64]; /* a single label must not exceed 63 chars */
613
614 if (!namelen || !name)
615 return (-1);
616
617 p = name;
618 while (p && *p && *p != '.' && p - name < namelen)
619 p++;
620 if (p - name > sizeof (n) - 1)
621 return (-1); /* label too long */
622 l = p - name;
623 strlcpy(n, name, l);
624 n[(int)l] = '\0';
625 for (q = (u_char *) n; *q; q++) {
626 if ('A' <= *q && *q <= 'Z')
627 *q = *q - 'A' + 'a';
628 }
629
630 /* generate 16 bytes of pseudo-random value. */
631 bzero(&ctxt, sizeof (ctxt));
632 SHA1Init(&ctxt);
633 SHA1Update(&ctxt, &l, sizeof (l));
634 SHA1Update(&ctxt, n, l);
635 SHA1Final(digest, &ctxt);
636
637 bzero(in6, sizeof (*in6));
638 in6->s6_addr16[0] = IPV6_ADDR_INT16_MLL;
639 in6->s6_addr8[11] = 2;
640 in6->s6_addr8[12] = 0xff;
641 /* copy first 3 bytes of prefix into address */
642 bcopy(digest, &in6->s6_addr8[13], 3);
643 if (in6_setscope(in6, ifp, NULL))
644 return (-1); /* XXX: should not fail */
645
646 return (0);
647 }
648
649 int
650 in6_domifattach(struct ifnet *ifp)
651 {
652 int error;
653
654 VERIFY(ifp != NULL);
655
656 error = proto_plumb(PF_INET6, ifp);
657 if (error != 0) {
658 if (error != EEXIST)
659 log(LOG_ERR, "%s: proto_plumb returned %d if=%s\n",
660 __func__, error, if_name(ifp));
661 } else {
662 error = in6_ifattach_prelim(ifp);
663 if (error != 0) {
664 int errorx;
665
666 log(LOG_ERR,
667 "%s: in6_ifattach_prelim returned %d if=%s%d\n",
668 __func__, error, ifp->if_name, ifp->if_unit);
669
670 errorx = proto_unplumb(PF_INET6, ifp);
671 if (errorx != 0) /* XXX should not fail */
672 log(LOG_ERR,
673 "%s: proto_unplumb returned %d if=%s%d\n",
674 __func__, errorx, ifp->if_name,
675 ifp->if_unit);
676 }
677 }
678
679 return (error);
680 }
681
682 int
683 in6_ifattach_prelim(struct ifnet *ifp)
684 {
685 struct in6_ifextra *ext;
686 void **pbuf, *base;
687 int error = 0;
688 struct in6_ifaddr *ia6 = NULL;
689
690 VERIFY(ifp != NULL);
691
692 /* quirks based on interface type */
693 switch (ifp->if_type) {
694 #if IFT_STF
695 case IFT_STF:
696 /*
697 * 6to4 interface is a very special kind of beast.
698 * no multicast, no linklocal. RFC2529 specifies how to make
699 * linklocals for 6to4 interface, but there's no use and
700 * it is rather harmful to have one.
701 */
702 goto skipmcast;
703 #endif
704 default:
705 break;
706 }
707
708 /*
709 * IPv6 requires multicast capability at the interface.
710 * (previously, this was a silent error.)
711 */
712 if ((ifp->if_flags & IFF_MULTICAST) == 0) {
713 nd6log((LOG_INFO, "in6_ifattach: ",
714 "%s is not multicast capable, IPv6 not enabled\n",
715 if_name(ifp)));
716 return (EINVAL);
717 }
718
719 #if IFT_STF
720 skipmcast:
721 #endif
722
723 if (ifp->if_inet6data == NULL) {
724 ext = (struct in6_ifextra *)_MALLOC(in6_extra_bufsize, M_IFADDR,
725 M_WAITOK|M_ZERO);
726 if (!ext)
727 return (ENOMEM);
728 base = (void *)P2ROUNDUP((intptr_t)ext + sizeof(uint64_t),
729 sizeof(uint64_t));
730 VERIFY(((intptr_t)base + in6_extra_size) <=
731 ((intptr_t)ext + in6_extra_bufsize));
732 pbuf = (void **)((intptr_t)base - sizeof(void *));
733 *pbuf = ext;
734 ifp->if_inet6data = base;
735 VERIFY(IS_P2ALIGNED(ifp->if_inet6data, sizeof(uint64_t)));
736 } else {
737 /*
738 * Since the structure is never freed, we need to zero out
739 * some of its members. We avoid zeroing out the scope6
740 * structure on purpose because other threads might be
741 * using its contents.
742 */
743 bzero(&IN6_IFEXTRA(ifp)->icmp6_ifstat,
744 sizeof(IN6_IFEXTRA(ifp)->icmp6_ifstat));
745 bzero(&IN6_IFEXTRA(ifp)->in6_ifstat,
746 sizeof(IN6_IFEXTRA(ifp)->in6_ifstat));
747 /*
748 * XXX When recycling, nd_ifinfo gets initialized, other
749 * than the lock, inside nd6_ifattach
750 */
751 }
752
753 /*
754 * XXX Only initialize NDP ifinfo for the interface
755 * if interface has not yet been configured with
756 * link local IPv6 address.
757 * Could possibly be optimized with an interface flag if need
758 * be. For now using in6ifa_ifpforlinklocal.
759 */
760 ia6 = in6ifa_ifpforlinklocal(ifp, 0);
761 if (ia6 == NULL) {
762 /* initialize NDP variables */
763 nd6_ifattach(ifp);
764 } else {
765 VERIFY(ND_IFINFO(ifp)->initialized);
766 IFA_REMREF(&ia6->ia_ifa);
767 ia6 = NULL;
768 }
769 scope6_ifattach(ifp);
770
771 /* initialize loopback interface address */
772 if ((ifp->if_flags & IFF_LOOPBACK) != 0) {
773 error = in6_ifattach_loopback(ifp);
774 if (error != 0) {
775 log(LOG_ERR, "%s: in6_ifattach_loopback returned %d\n",
776 __func__, error, ifp->if_name,
777 ifp->if_unit);
778 return (error);
779 }
780 }
781
782 /* update dynamically. */
783 if (in6_maxmtu < ifp->if_mtu)
784 in6_maxmtu = ifp->if_mtu;
785
786 VERIFY(error == 0);
787 return (0);
788 }
789
790 int
791 in6_ifattach_aliasreq(struct ifnet *ifp, struct ifnet *altifp,
792 struct in6_aliasreq *ifra0)
793 {
794 int error;
795 struct in6_ifaddr *ia6;
796 struct in6_aliasreq ifra;
797
798 error = in6_ifattach_prelim(ifp);
799 if (error != 0)
800 return (error);
801
802 if (!ip6_auto_linklocal)
803 return (0);
804
805 /* assign a link-local address, only if there isn't one here already. */
806 ia6 = in6ifa_ifpforlinklocal(ifp, 0);
807 if (ia6 != NULL) {
808 IFA_REMREF(&ia6->ia_ifa);
809 return (0);
810 }
811
812 bzero(&ifra, sizeof (ifra));
813
814 /*
815 * in6_update_ifa() does not use ifra_name, but we accurately set it
816 * for safety.
817 */
818 strlcpy(ifra.ifra_name, if_name(ifp), sizeof (ifra.ifra_name));
819
820 /* Initialize the IPv6 interface address in our in6_aliasreq block */
821 if ((ifp->if_eflags & IFEF_NOAUTOIPV6LL) != 0 && ifra0 != NULL) {
822 /* interface provided both addresses for us */
823 struct sockaddr_in6 *sin6 = &ifra.ifra_addr;
824 struct in6_addr *in6 = &sin6->sin6_addr;
825 boolean_t ok = TRUE;
826
827 bcopy(&ifra0->ifra_addr, sin6, sizeof (struct sockaddr_in6));
828
829 if (sin6->sin6_family != AF_INET6 || sin6->sin6_port != 0)
830 ok = FALSE;
831 if (ok && (in6->s6_addr16[0] != htons(0xfe80)))
832 ok = FALSE;
833 if (ok) {
834 if (sin6->sin6_scope_id == 0 && in6->s6_addr16[1] == 0)
835 in6->s6_addr16[1] = htons(ifp->if_index);
836 else if (sin6->sin6_scope_id != 0 &&
837 sin6->sin6_scope_id != ifp->if_index)
838 ok = FALSE;
839 else if (in6->s6_addr16[1] != 0 &&
840 ntohs(in6->s6_addr16[1]) != ifp->if_index)
841 ok = FALSE;
842 }
843 if (ok && (in6->s6_addr32[1] != 0))
844 ok = FALSE;
845 if (!ok)
846 return (EINVAL);
847 } else {
848 ifra.ifra_addr.sin6_family = AF_INET6;
849 ifra.ifra_addr.sin6_len = sizeof (struct sockaddr_in6);
850 ifra.ifra_addr.sin6_addr.s6_addr16[0] = htons(0xfe80);
851 ifra.ifra_addr.sin6_addr.s6_addr16[1] = htons(ifp->if_index);
852 ifra.ifra_addr.sin6_addr.s6_addr32[1] = 0;
853 if ((ifp->if_flags & IFF_LOOPBACK) != 0) {
854 ifra.ifra_addr.sin6_addr.s6_addr32[2] = 0;
855 ifra.ifra_addr.sin6_addr.s6_addr32[3] = htonl(1);
856 } else {
857 if (in6_select_iid_from_all_hw(ifp, altifp,
858 &ifra.ifra_addr.sin6_addr) != 0) {
859 nd6log((LOG_ERR, "%s: no IID available\n",
860 if_name(ifp)));
861 return (EADDRNOTAVAIL);
862 }
863 }
864 }
865
866 if (in6_setscope(&ifra.ifra_addr.sin6_addr, ifp, NULL))
867 return (EADDRNOTAVAIL);
868
869 /* Set the prefix mask */
870 ifra.ifra_prefixmask.sin6_len = sizeof (struct sockaddr_in6);
871 ifra.ifra_prefixmask.sin6_family = AF_INET6;
872 ifra.ifra_prefixmask.sin6_addr = in6mask64;
873
874 /* link-local addresses should NEVER expire. */
875 ifra.ifra_lifetime.ia6t_vltime = ND6_INFINITE_LIFETIME;
876 ifra.ifra_lifetime.ia6t_pltime = ND6_INFINITE_LIFETIME;
877
878 /* Attach the link-local address */
879 if (in6_ifattach_linklocal(ifp, &ifra) != 0) {
880 nd6log((LOG_INFO,
881 "%s: %s could not attach link-local address.\n",
882 __func__, if_name(ifp)));
883 /* NB: not an error */
884 }
885
886 return (0);
887 }
888
889 int
890 in6_ifattach_llstartreq(struct ifnet *ifp, struct in6_llstartreq *llsr)
891 {
892 struct in6_aliasreq ifra;
893 struct in6_ifaddr *ia6 = NULL;
894 struct nd_ifinfo *ndi = NULL;
895 int error;
896
897 VERIFY(llsr != NULL);
898
899 error = in6_ifattach_prelim(ifp);
900 if (error != 0)
901 return (error);
902
903 if (!ip6_auto_linklocal || (ifp->if_eflags & IFEF_NOAUTOIPV6LL) != 0)
904 return (0);
905
906 if (nd6_send_opstate == ND6_SEND_OPMODE_DISABLED)
907 return (ENXIO);
908
909 ndi = ND_IFINFO(ifp);
910 VERIFY(ndi != NULL && ndi->initialized);
911 if ((ndi->flags & ND6_IFF_INSECURE) != 0) {
912 return (ENXIO);
913 }
914
915 /* assign a link-local address, only if there isn't one here already. */
916 ia6 = in6ifa_ifpforlinklocal(ifp, 0);
917 if (ia6 != NULL) {
918 IFA_REMREF(&ia6->ia_ifa);
919 return (0);
920 }
921
922 bzero(&ifra, sizeof (ifra));
923 strlcpy(ifra.ifra_name, if_name(ifp), sizeof (ifra.ifra_name));
924
925 ifra.ifra_addr.sin6_family = AF_INET6;
926 ifra.ifra_addr.sin6_len = sizeof (struct sockaddr_in6);
927 ifra.ifra_addr.sin6_addr.s6_addr16[0] = htons(0xfe80);
928 ifra.ifra_addr.sin6_addr.s6_addr16[1] = htons(ifp->if_index);
929 ifra.ifra_addr.sin6_addr.s6_addr32[1] = 0;
930 ifra.ifra_flags = IN6_IFF_SECURED;
931
932 in6_cga_node_lock();
933 if (in6_cga_generate(&llsr->llsr_cgaprep, 0,
934 &ifra.ifra_addr.sin6_addr)) {
935 in6_cga_node_unlock();
936 return (EADDRNOTAVAIL);
937 }
938 in6_cga_node_unlock();
939
940 if (in6_setscope(&ifra.ifra_addr.sin6_addr, ifp, NULL))
941 return (EADDRNOTAVAIL);
942
943 /* Set the prefix mask */
944 ifra.ifra_prefixmask.sin6_len = sizeof (struct sockaddr_in6);
945 ifra.ifra_prefixmask.sin6_family = AF_INET6;
946 ifra.ifra_prefixmask.sin6_addr = in6mask64;
947
948 /*
949 * link-local addresses should NEVER expire, but cryptographic
950 * ones may have finite preferred lifetime [if it's important to
951 * keep them from being used by applications as persistent device
952 * identifiers].
953 */
954 ifra.ifra_lifetime.ia6t_vltime = ND6_INFINITE_LIFETIME;
955 ifra.ifra_lifetime.ia6t_pltime = llsr->llsr_lifetime.ia6t_pltime;
956
957 /* Attach the link-local address */
958 if (in6_ifattach_linklocal(ifp, &ifra) != 0) {
959 /* NB: not an error */
960 nd6log((LOG_INFO,
961 "%s: %s could not attach link-local address.\n",
962 __func__, if_name(ifp)));
963 }
964
965 VERIFY(error == 0);
966 return (error);
967 }
968
969 /*
970 * NOTE: in6_ifdetach() does not support loopback if at this moment.
971 */
972 void
973 in6_ifdetach(struct ifnet *ifp)
974 {
975 struct in6_ifaddr *ia, *oia;
976 struct ifaddr *ifa;
977 struct rtentry *rt;
978 struct sockaddr_in6 sin6;
979 struct in6_multi_mship *imm;
980 int unlinked;
981
982 lck_mtx_assert(nd6_mutex, LCK_MTX_ASSERT_NOTOWNED);
983
984 /* remove neighbor management table */
985 nd6_purge(ifp);
986
987 /* nuke any of IPv6 addresses we have */
988 lck_rw_lock_exclusive(&in6_ifaddr_rwlock);
989 ia = in6_ifaddrs;
990 while (ia != NULL) {
991 if (ia->ia_ifa.ifa_ifp != ifp) {
992 ia = ia->ia_next;
993 continue;
994 }
995 IFA_ADDREF(&ia->ia_ifa); /* for us */
996 lck_rw_done(&in6_ifaddr_rwlock);
997 in6_purgeaddr(&ia->ia_ifa);
998 IFA_REMREF(&ia->ia_ifa); /* for us */
999 lck_rw_lock_exclusive(&in6_ifaddr_rwlock);
1000 /*
1001 * Purging the address caused in6_ifaddr_rwlock
1002 * to be dropped and reacquired;
1003 * therefore search again from the beginning
1004 * of in6_ifaddrs list.
1005 */
1006 ia = in6_ifaddrs;
1007 }
1008 lck_rw_done(&in6_ifaddr_rwlock);
1009
1010 ifnet_lock_exclusive(ifp);
1011
1012 /* undo everything done by in6_ifattach(), just in case */
1013 ifa = TAILQ_FIRST(&ifp->if_addrlist);
1014 while (ifa != NULL) {
1015 IFA_LOCK(ifa);
1016 if (ifa->ifa_addr->sa_family != AF_INET6 ||
1017 !IN6_IS_ADDR_LINKLOCAL(&satosin6(&ifa->ifa_addr)->
1018 sin6_addr)) {
1019 IFA_UNLOCK(ifa);
1020 ifa = TAILQ_NEXT(ifa, ifa_list);
1021 continue;
1022 }
1023
1024 ia = (struct in6_ifaddr *)ifa;
1025
1026 /* hold a reference for this routine */
1027 IFA_ADDREF_LOCKED(ifa);
1028 /* remove from the linked list */
1029 if_detach_ifa(ifp, ifa);
1030 IFA_UNLOCK(ifa);
1031
1032 /*
1033 * Leaving the multicast group(s) may involve freeing the
1034 * link address multicast structure(s) for the interface,
1035 * which is protected by ifnet lock. To avoid violating
1036 * lock ordering, we must drop ifnet lock before doing so.
1037 * The ifa won't go away since we held a refcnt above.
1038 */
1039 ifnet_lock_done(ifp);
1040
1041 /*
1042 * We have to do this work manually here instead of calling
1043 * in6_purgeaddr() since in6_purgeaddr() uses the RTM_HOST flag.
1044 */
1045
1046 /*
1047 * leave from multicast groups we have joined for the interface
1048 */
1049 IFA_LOCK(ifa);
1050 while ((imm = ia->ia6_memberships.lh_first) != NULL) {
1051 LIST_REMOVE(imm, i6mm_chain);
1052 IFA_UNLOCK(ifa);
1053 in6_leavegroup(imm);
1054 IFA_LOCK(ifa);
1055 }
1056
1057 /* remove from the routing table */
1058 if (ia->ia_flags & IFA_ROUTE) {
1059 IFA_UNLOCK(ifa);
1060 rt = rtalloc1((struct sockaddr *)&ia->ia_addr, 0, 0);
1061 if (rt != NULL) {
1062 (void) rtrequest(RTM_DELETE,
1063 (struct sockaddr *)&ia->ia_addr,
1064 (struct sockaddr *)&ia->ia_addr,
1065 (struct sockaddr *)&ia->ia_prefixmask,
1066 rt->rt_flags, (struct rtentry **)0);
1067 rtfree(rt);
1068 }
1069 } else {
1070 IFA_UNLOCK(ifa);
1071 }
1072
1073 /* also remove from the IPv6 address chain(itojun&jinmei) */
1074 unlinked = 1;
1075 oia = ia;
1076 lck_rw_lock_exclusive(&in6_ifaddr_rwlock);
1077 if (oia == (ia = in6_ifaddrs)) {
1078 in6_ifaddrs = ia->ia_next;
1079 } else {
1080 while (ia->ia_next && (ia->ia_next != oia))
1081 ia = ia->ia_next;
1082 if (ia->ia_next) {
1083 ia->ia_next = oia->ia_next;
1084 } else {
1085 nd6log((LOG_ERR,
1086 "%s: didn't unlink in6ifaddr from "
1087 "list\n", if_name(ifp)));
1088 unlinked = 0;
1089 }
1090 }
1091 lck_rw_done(&in6_ifaddr_rwlock);
1092
1093 ifa = &oia->ia_ifa;
1094 /*
1095 * release another refcnt for the link from in6_ifaddrs.
1096 * Do this only if it's not already unlinked in the event
1097 * that we lost the race, since in6_ifaddr_rwlock was
1098 * momentarily dropped above.
1099 */
1100 if (unlinked)
1101 IFA_REMREF(ifa);
1102 /* release reference held for this routine */
1103 IFA_REMREF(ifa);
1104
1105 /*
1106 * This is suboptimal, but since we dropped ifnet lock above
1107 * the list might have changed. Repeat the search from the
1108 * beginning until we find the first eligible IPv6 address.
1109 */
1110 ifnet_lock_exclusive(ifp);
1111 ifa = TAILQ_FIRST(&ifp->if_addrlist);
1112 }
1113 ifnet_lock_done(ifp);
1114
1115 /* invalidate route caches */
1116 routegenid_inet6_update();
1117
1118 /*
1119 * remove neighbor management table. we call it twice just to make
1120 * sure we nuke everything. maybe we need just one call.
1121 * XXX: since the first call did not release addresses, some prefixes
1122 * might remain. We should call nd6_purge() again to release the
1123 * prefixes after removing all addresses above.
1124 * (Or can we just delay calling nd6_purge until at this point?)
1125 */
1126 nd6_purge(ifp);
1127
1128 /* remove route to link-local allnodes multicast (ff02::1) */
1129 bzero(&sin6, sizeof (sin6));
1130 sin6.sin6_len = sizeof (struct sockaddr_in6);
1131 sin6.sin6_family = AF_INET6;
1132 sin6.sin6_addr = in6addr_linklocal_allnodes;
1133 sin6.sin6_addr.s6_addr16[1] = htons(ifp->if_index);
1134 rt = rtalloc1((struct sockaddr *)&sin6, 0, 0);
1135 if (rt != NULL) {
1136 RT_LOCK(rt);
1137 if (rt->rt_ifp == ifp) {
1138 /*
1139 * Prevent another thread from modifying rt_key,
1140 * rt_gateway via rt_setgate() after the rt_lock
1141 * is dropped by marking the route as defunct.
1142 */
1143 rt->rt_flags |= RTF_CONDEMNED;
1144 RT_UNLOCK(rt);
1145 (void) rtrequest(RTM_DELETE, rt_key(rt), rt->rt_gateway,
1146 rt_mask(rt), rt->rt_flags, 0);
1147 } else {
1148 RT_UNLOCK(rt);
1149 }
1150 rtfree(rt);
1151 }
1152 }
1153
1154 void
1155 in6_iid_mktmp(struct ifnet *ifp, u_int8_t *retbuf, const u_int8_t *baseid,
1156 int generate)
1157 {
1158 u_int8_t nullbuf[8];
1159 struct nd_ifinfo *ndi = ND_IFINFO(ifp);
1160
1161 VERIFY(ndi != NULL && ndi->initialized);
1162 lck_mtx_lock(&ndi->lock);
1163 bzero(nullbuf, sizeof (nullbuf));
1164 if (bcmp(ndi->randomid, nullbuf, sizeof (nullbuf)) == 0) {
1165 /* we've never created a random ID. Create a new one. */
1166 generate = 1;
1167 }
1168
1169 if (generate) {
1170 bcopy(baseid, ndi->randomseed1, sizeof (ndi->randomseed1));
1171
1172 /* in6_generate_tmp_iid will update seedn and buf */
1173 (void) in6_generate_tmp_iid(ndi->randomseed0, ndi->randomseed1,
1174 ndi->randomid);
1175 }
1176
1177 bcopy(ndi->randomid, retbuf, 8);
1178 lck_mtx_unlock(&ndi->lock);
1179 }
1180
1181 void
1182 in6_tmpaddrtimer(void *arg)
1183 {
1184 #pragma unused(arg)
1185 struct ifnet *ifp = NULL;
1186 struct nd_ifinfo *ndi = NULL;
1187 u_int8_t nullbuf[8];
1188
1189 timeout(in6_tmpaddrtimer, (caddr_t)0, (ip6_temp_preferred_lifetime -
1190 ip6_desync_factor - ip6_temp_regen_advance) * hz);
1191
1192 bzero(nullbuf, sizeof (nullbuf));
1193 ifnet_head_lock_shared();
1194 for (ifp = ifnet_head.tqh_first; ifp;
1195 ifp = ifp->if_link.tqe_next) {
1196 ndi = ND_IFINFO(ifp);
1197 if ((NULL == ndi) || (FALSE == ndi->initialized)) {
1198 continue;
1199 }
1200 lck_mtx_lock(&ndi->lock);
1201 if (bcmp(ndi->randomid, nullbuf, sizeof (nullbuf)) != 0) {
1202 /*
1203 * We've been generating a random ID on this interface.
1204 * Create a new one.
1205 */
1206 (void) in6_generate_tmp_iid(ndi->randomseed0,
1207 ndi->randomseed1, ndi->randomid);
1208 }
1209 lck_mtx_unlock(&ndi->lock);
1210 }
1211 ifnet_head_done();
1212 }