]> git.saurik.com Git - apple/xnu.git/blob - bsd/netinet6/in6_ifattach.c
xnu-2782.30.5.tar.gz
[apple/xnu.git] / bsd / netinet6 / in6_ifattach.c
1 /*
2 * Copyright (c) 2003-2014 Apple Inc. All rights reserved.
3 *
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
14 *
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
17 *
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
25 *
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
27 */
28
29 /*
30 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
31 * All rights reserved.
32 *
33 * Redistribution and use in source and binary forms, with or without
34 * modification, are permitted provided that the following conditions
35 * are met:
36 * 1. Redistributions of source code must retain the above copyright
37 * notice, this list of conditions and the following disclaimer.
38 * 2. Redistributions in binary form must reproduce the above copyright
39 * notice, this list of conditions and the following disclaimer in the
40 * documentation and/or other materials provided with the distribution.
41 * 3. Neither the name of the project nor the names of its contributors
42 * may be used to endorse or promote products derived from this software
43 * without specific prior written permission.
44 *
45 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
46 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
47 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
48 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
49 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
50 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
51 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
52 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
53 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
54 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
55 * SUCH DAMAGE.
56 */
57
58 #include <sys/param.h>
59 #include <sys/systm.h>
60 #include <sys/malloc.h>
61 #include <sys/socket.h>
62 #include <sys/socketvar.h>
63 #include <sys/sockio.h>
64 #include <sys/kernel.h>
65 #include <sys/syslog.h>
66 #include <libkern/crypto/sha1.h>
67 #include <libkern/OSAtomic.h>
68 #include <kern/locks.h>
69
70 #include <net/if.h>
71 #include <net/if_dl.h>
72 #include <net/if_types.h>
73 #include <net/route.h>
74 #include <net/kpi_protocol.h>
75
76 #include <netinet/in.h>
77 #include <netinet/in_var.h>
78 #include <netinet/if_ether.h>
79 #include <netinet/in_pcb.h>
80 #include <netinet/icmp6.h>
81
82 #include <netinet/ip6.h>
83 #include <netinet6/ip6_var.h>
84 #include <netinet6/in6_var.h>
85 #include <netinet6/in6_pcb.h>
86 #include <netinet6/in6_ifattach.h>
87 #include <netinet6/ip6_var.h>
88 #include <netinet6/nd6.h>
89 #include <netinet6/scope6_var.h>
90
91 #include <net/net_osdep.h>
92 #include <dev/random/randomdev.h>
93
94 u_int32_t in6_maxmtu = 0;
95 extern lck_mtx_t *nd6_mutex;
96
97 #if IP6_AUTO_LINKLOCAL
98 int ip6_auto_linklocal = IP6_AUTO_LINKLOCAL;
99 #else
100 int ip6_auto_linklocal = 1; /* enable by default */
101 #endif
102
103 extern struct inpcbinfo udbinfo;
104 extern struct inpcbinfo ripcbinfo;
105
106 static const unsigned int in6_extra_size = sizeof(struct in6_ifextra);
107 static const unsigned int in6_extra_bufsize = in6_extra_size +
108 sizeof(void *) + sizeof(uint64_t);
109
110 static int get_rand_iid(struct ifnet *, struct in6_addr *);
111 static int in6_generate_tmp_iid(u_int8_t *, const u_int8_t *, u_int8_t *);
112 static int in6_select_iid_from_all_hw(struct ifnet *, struct ifnet *,
113 struct in6_addr *);
114 static int in6_ifattach_linklocal(struct ifnet *, struct in6_aliasreq *);
115 static int in6_ifattach_loopback(struct ifnet *);
116
117 /*
118 * Generate a last-resort interface identifier, when the machine has no
119 * IEEE802/EUI64 address sources.
120 * The goal here is to get an interface identifier that is
121 * (1) random enough and (2) does not change across reboot.
122 * We currently use SHA1(hostname) for it.
123 *
124 * in6 - upper 64bits are preserved
125 */
126 static int
127 get_rand_iid(
128 __unused struct ifnet *ifp,
129 struct in6_addr *in6) /* upper 64bits are preserved */
130 {
131 SHA1_CTX ctxt;
132 u_int8_t digest[SHA1_RESULTLEN];
133 int hostnlen = strlen(hostname);
134
135 /* generate 8 bytes of pseudo-random value. */
136 bzero(&ctxt, sizeof (ctxt));
137 SHA1Init(&ctxt);
138 SHA1Update(&ctxt, hostname, hostnlen);
139 SHA1Final(digest, &ctxt);
140
141 /* assumes sizeof (digest) > sizeof (iid) */
142 bcopy(digest, &in6->s6_addr[8], 8);
143
144 /* make sure to set "u" bit to local, and "g" bit to individual. */
145 in6->s6_addr[8] &= ~ND6_EUI64_GBIT; /* g bit to "individual" */
146 in6->s6_addr[8] |= ND6_EUI64_UBIT; /* u bit to "local" */
147
148 /* convert EUI64 into IPv6 interface identifier */
149 ND6_EUI64_TO_IFID(in6);
150
151 return (0);
152 }
153
154 static int
155 in6_generate_tmp_iid(
156 u_int8_t *seed0,
157 const u_int8_t *seed1,
158 u_int8_t *ret)
159 {
160 SHA1_CTX ctxt;
161 u_int8_t seed[16], nullbuf[8], digest[SHA1_RESULTLEN];
162 u_int32_t val32;
163 struct timeval tv;
164
165 /* If there's no history, start with a random seed. */
166 bzero(nullbuf, sizeof (nullbuf));
167 if (bcmp(nullbuf, seed0, sizeof (nullbuf)) == 0) {
168 int i;
169
170 for (i = 0; i < 2; i++) {
171 getmicrotime(&tv);
172 val32 = RandomULong() ^ tv.tv_usec;
173 bcopy(&val32, seed + sizeof (val32) * i,
174 sizeof (val32));
175 }
176 } else {
177 bcopy(seed0, seed, 8);
178 }
179
180 /* copy the right-most 64-bits of the given address */
181 /* XXX assumption on the size of IFID */
182 bcopy(seed1, &seed[8], 8);
183
184 if ((0)) { /* for debugging purposes only */
185 int i;
186
187 printf("%s: new randomized ID from: ", __func__);
188 for (i = 0; i < 16; i++)
189 printf("%02x", seed[i]);
190 printf(" ");
191 }
192
193 /* generate 16 bytes of pseudo-random value. */
194 bzero(&ctxt, sizeof (ctxt));
195 SHA1Init(&ctxt);
196 SHA1Update(&ctxt, seed, sizeof (seed));
197 SHA1Final(digest, &ctxt);
198
199 /*
200 * RFC 4941 3.2.1. (3)
201 * Take the left-most 64-bits of the SHA1 digest and set bit 6 (the
202 * left-most bit is numbered 0) to zero.
203 */
204 bcopy(digest, ret, 8);
205 ret[0] &= ~ND6_EUI64_UBIT;
206
207 /*
208 * XXX: we'd like to ensure that the generated value is not zero
209 * for simplicity. If the caclculated digest happens to be zero,
210 * use a random non-zero value as the last resort.
211 */
212 if (bcmp(nullbuf, ret, sizeof (nullbuf)) == 0) {
213 nd6log((LOG_INFO,
214 "%s: computed SHA1 value is zero.\n", __func__));
215
216 getmicrotime(&tv);
217 val32 = random() ^ tv.tv_usec;
218 val32 = 1 + (val32 % (0xffffffff - 1));
219 }
220
221 /*
222 * RFC 4941 3.2.1. (4)
223 * Take the next 64-bits of the SHA1 digest and save them in
224 * stable storage as the history value to be used in the next
225 * iteration of the algorithm.
226 */
227 bcopy(&digest[8], seed0, 8);
228
229 if ((0)) { /* for debugging purposes only */
230 int i;
231
232 printf("to: ");
233 for (i = 0; i < 16; i++)
234 printf("%02x", digest[i]);
235 printf("\n");
236 }
237
238 return (0);
239 }
240
241 /*
242 * Get interface identifier for the specified interface using the method in
243 * Appendix A of RFC 4291.
244 *
245 * XXX assumes single sockaddr_dl (AF_LINK address) per an interface
246 *
247 * in6 - upper 64bits are preserved
248 */
249 int
250 in6_iid_from_hw(struct ifnet *ifp, struct in6_addr *in6)
251 {
252 struct ifaddr *ifa = NULL;
253 struct sockaddr_dl *sdl;
254 u_int8_t *addr;
255 size_t addrlen;
256 static u_int8_t allzero[8] = { 0, 0, 0, 0, 0, 0, 0, 0 };
257 static u_int8_t allone[8] =
258 { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff };
259 int err = -1;
260
261 /* Why doesn't this code use ifnet_addrs? */
262 ifnet_lock_shared(ifp);
263 ifa = ifp->if_lladdr;
264 sdl = (struct sockaddr_dl *)(void *)ifa->ifa_addr;
265 if (sdl->sdl_alen == 0) {
266 ifnet_lock_done(ifp);
267 return (-1);
268 }
269 IFA_ADDREF(ifa); /* for this routine */
270 ifnet_lock_done(ifp);
271
272 IFA_LOCK(ifa);
273 addr = (u_int8_t *) LLADDR(sdl);
274 addrlen = sdl->sdl_alen;
275
276 /* get EUI64 */
277 switch (ifp->if_type) {
278 case IFT_ETHER:
279 case IFT_FDDI:
280 case IFT_ISO88025:
281 case IFT_ATM:
282 case IFT_IEEE1394:
283 case IFT_L2VLAN:
284 case IFT_IEEE8023ADLAG:
285 #if IFT_IEEE80211
286 case IFT_IEEE80211:
287 #endif
288 case IFT_BRIDGE:
289 /* IEEE802/EUI64 cases - what others? */
290 /* IEEE1394 uses 16byte length address starting with EUI64 */
291 if (addrlen > 8)
292 addrlen = 8;
293
294 /* look at IEEE802/EUI64 only */
295 if (addrlen != 8 && addrlen != 6)
296 goto done;
297
298 /*
299 * check for invalid MAC address - on bsdi, we see it a lot
300 * since wildboar configures all-zero MAC on pccard before
301 * card insertion.
302 */
303 if (bcmp(addr, allzero, addrlen) == 0)
304 goto done;
305 if (bcmp(addr, allone, addrlen) == 0)
306 goto done;
307
308 /* make EUI64 address */
309 if (addrlen == 8)
310 bcopy(addr, &in6->s6_addr[8], 8);
311 else if (addrlen == 6) {
312 in6->s6_addr[8] = addr[0];
313 in6->s6_addr[9] = addr[1];
314 in6->s6_addr[10] = addr[2];
315 in6->s6_addr[11] = 0xff;
316 in6->s6_addr[12] = 0xfe;
317 in6->s6_addr[13] = addr[3];
318 in6->s6_addr[14] = addr[4];
319 in6->s6_addr[15] = addr[5];
320 }
321 break;
322
323 case IFT_ARCNET:
324 if (addrlen != 1)
325 goto done;
326 if (!addr[0])
327 goto done;
328
329 bzero(&in6->s6_addr[8], 8);
330 in6->s6_addr[15] = addr[0];
331
332 /*
333 * due to insufficient bitwidth, we mark it local.
334 */
335 in6->s6_addr[8] &= ~ND6_EUI64_GBIT; /* g to "individual" */
336 in6->s6_addr[8] |= ND6_EUI64_UBIT; /* u to "local" */
337 break;
338
339 case IFT_GIF:
340 #if IFT_STF
341 case IFT_STF:
342 #endif
343 /*
344 * RFC2893 says: "SHOULD use IPv4 address as IID source".
345 * however, IPv4 address is not very suitable as unique
346 * identifier source (can be renumbered).
347 * we don't do this.
348 */
349 goto done;
350
351 case IFT_CELLULAR:
352 goto done;
353
354 default:
355 goto done;
356 }
357
358 /* sanity check: g bit must not indicate "group" */
359 if (ND6_EUI64_GROUP(in6))
360 goto done;
361
362 /* convert EUI64 into IPv6 interface identifier */
363 ND6_EUI64_TO_IFID(in6);
364
365 /*
366 * sanity check: iid must not be all zero, avoid conflict with
367 * subnet router anycast
368 */
369 if ((in6->s6_addr[8] & ~(ND6_EUI64_GBIT | ND6_EUI64_UBIT)) == 0x00 &&
370 bcmp(&in6->s6_addr[9], allzero, 7) == 0) {
371 goto done;
372 }
373
374 err = 0; /* found */
375
376 done:
377 /* This must not be the last reference to the lladdr */
378 if (IFA_REMREF_LOCKED(ifa) == NULL) {
379 panic("%s: unexpected (missing) refcnt ifa=%p", __func__, ifa);
380 /* NOTREACHED */
381 }
382 IFA_UNLOCK(ifa);
383 return (err);
384 }
385
386 /*
387 * Get interface identifier for the specified interface using the method in
388 * Appendix A of RFC 4291. If it is not available on ifp0, borrow interface
389 * identifier from other information sources.
390 *
391 * ifp - primary EUI64 source
392 * altifp - secondary EUI64 source
393 * in6 - IPv6 address to output IID
394 */
395 static int
396 in6_select_iid_from_all_hw(
397 struct ifnet *ifp0,
398 struct ifnet *altifp, /* secondary EUI64 source */
399 struct in6_addr *in6)
400 {
401 struct ifnet *ifp;
402
403 /* first, try to get it from the interface itself */
404 if (in6_iid_from_hw(ifp0, in6) == 0) {
405 nd6log((LOG_DEBUG, "%s: IID derived from HW interface.\n",
406 if_name(ifp0)));
407 goto success;
408 }
409
410 /* try secondary EUI64 source. this basically is for ATM PVC */
411 if (altifp && in6_iid_from_hw(altifp, in6) == 0) {
412 nd6log((LOG_DEBUG, "%s: IID from alterate HW interface %s.\n",
413 if_name(ifp0), if_name(altifp)));
414 goto success;
415 }
416
417 /* next, try to get it from some other hardware interface */
418 ifnet_head_lock_shared();
419 TAILQ_FOREACH(ifp, &ifnet_head, if_list) {
420 if (ifp == ifp0)
421 continue;
422 if (in6_iid_from_hw(ifp, in6) != 0)
423 continue;
424
425 /*
426 * to borrow IID from other interface, IID needs to be
427 * globally unique
428 */
429 if (ND6_IFID_UNIVERSAL(in6)) {
430 nd6log((LOG_DEBUG, "%s: borrowed IID from %s\n",
431 if_name(ifp0), if_name(ifp)));
432 ifnet_head_done();
433 goto success;
434 }
435 }
436 ifnet_head_done();
437
438 /* last resort: get from random number source */
439 if (get_rand_iid(ifp, in6) == 0) {
440 nd6log((LOG_DEBUG, "%s: IID from PRNG.\n", if_name(ifp0)));
441 goto success;
442 }
443
444 printf("%s: failed to get interface identifier\n", if_name(ifp0));
445 return (-1);
446
447 success:
448 nd6log((LOG_INFO, "%s: IID: "
449 "%02x:%02x:%02x:%02x:%02x:%02x:%02x:%02x\n",
450 if_name(ifp0),
451 in6->s6_addr[8], in6->s6_addr[9],
452 in6->s6_addr[10], in6->s6_addr[11],
453 in6->s6_addr[12], in6->s6_addr[13],
454 in6->s6_addr[14], in6->s6_addr[15]));
455 return (0);
456 }
457
458 static int
459 in6_ifattach_linklocal(struct ifnet *ifp, struct in6_aliasreq *ifra)
460 {
461 struct in6_ifaddr *ia;
462 struct nd_prefix pr0, *pr;
463 int i, error;
464
465 VERIFY(ifra != NULL);
466
467 proto_plumb(PF_INET6, ifp);
468
469 error = in6_update_ifa(ifp, ifra, IN6_IFAUPDATE_DADDELAY, &ia);
470 if (error != 0) {
471 /*
472 * XXX: When the interface does not support IPv6, this call
473 * would fail in the SIOCSIFADDR ioctl. I believe the
474 * notification is rather confusing in this case, so just
475 * suppress it. (jinmei@kame.net 20010130)
476 */
477 if (error != EAFNOSUPPORT)
478 nd6log((LOG_NOTICE, "%s: failed to "
479 "configure a link-local address on %s "
480 "(errno=%d)\n",
481 __func__, if_name(ifp), error));
482 return (EADDRNOTAVAIL);
483 }
484 VERIFY(ia != NULL);
485
486 /*
487 * Make the link-local prefix (fe80::%link/64) as on-link.
488 * Since we'd like to manage prefixes separately from addresses,
489 * we make an ND6 prefix structure for the link-local prefix,
490 * and add it to the prefix list as a never-expire prefix.
491 * XXX: this change might affect some existing code base...
492 */
493 bzero(&pr0, sizeof (pr0));
494 lck_mtx_init(&pr0.ndpr_lock, ifa_mtx_grp, ifa_mtx_attr);
495 pr0.ndpr_ifp = ifp;
496 /* this should be 64 at this moment. */
497 pr0.ndpr_plen = in6_mask2len(&ifra->ifra_prefixmask.sin6_addr, NULL);
498 pr0.ndpr_mask = ifra->ifra_prefixmask.sin6_addr;
499 pr0.ndpr_prefix = ifra->ifra_addr;
500 /* apply the mask for safety. (nd6_prelist_add will apply it again) */
501 for (i = 0; i < 4; i++) {
502 pr0.ndpr_prefix.sin6_addr.s6_addr32[i] &=
503 in6mask64.s6_addr32[i];
504 }
505 /*
506 * Initialize parameters. The link-local prefix must always be
507 * on-link, and its lifetimes never expire.
508 */
509 pr0.ndpr_raf_onlink = 1;
510 pr0.ndpr_raf_auto = 1; /* probably meaningless */
511 pr0.ndpr_vltime = ND6_INFINITE_LIFETIME;
512 pr0.ndpr_pltime = ND6_INFINITE_LIFETIME;
513 pr0.ndpr_stateflags |= NDPRF_STATIC;
514 /*
515 * Since there is no other link-local addresses, nd6_prefix_lookup()
516 * probably returns NULL. However, we cannot always expect the result.
517 * For example, if we first remove the (only) existing link-local
518 * address, and then reconfigure another one, the prefix is still
519 * valid with referring to the old link-local address.
520 */
521 if ((pr = nd6_prefix_lookup(&pr0)) == NULL) {
522 if ((error = nd6_prelist_add(&pr0, NULL, &pr, TRUE)) != 0) {
523 IFA_REMREF(&ia->ia_ifa);
524 lck_mtx_destroy(&pr0.ndpr_lock, ifa_mtx_grp);
525 return (error);
526 }
527 }
528
529 in6_post_msg(ifp, KEV_INET6_NEW_LL_ADDR, ia, NULL);
530 IFA_REMREF(&ia->ia_ifa);
531
532 /* Drop use count held above during lookup/add */
533 if (pr != NULL)
534 NDPR_REMREF(pr);
535
536 lck_mtx_destroy(&pr0.ndpr_lock, ifa_mtx_grp);
537 return (0);
538 }
539
540 static int
541 in6_ifattach_loopback(
542 struct ifnet *ifp) /* must be IFT_LOOP */
543 {
544 struct in6_aliasreq ifra;
545 struct in6_ifaddr *ia;
546 int error;
547
548 bzero(&ifra, sizeof (ifra));
549
550 /*
551 * in6_update_ifa() does not use ifra_name, but we accurately set it
552 * for safety.
553 */
554 strlcpy(ifra.ifra_name, if_name(ifp), sizeof (ifra.ifra_name));
555
556 ifra.ifra_prefixmask.sin6_len = sizeof (struct sockaddr_in6);
557 ifra.ifra_prefixmask.sin6_family = AF_INET6;
558 ifra.ifra_prefixmask.sin6_addr = in6mask128;
559
560 /*
561 * Always initialize ia_dstaddr (= broadcast address) to loopback
562 * address. Follows IPv4 practice - see in_ifinit().
563 */
564 ifra.ifra_dstaddr.sin6_len = sizeof (struct sockaddr_in6);
565 ifra.ifra_dstaddr.sin6_family = AF_INET6;
566 ifra.ifra_dstaddr.sin6_addr = in6addr_loopback;
567
568 ifra.ifra_addr.sin6_len = sizeof (struct sockaddr_in6);
569 ifra.ifra_addr.sin6_family = AF_INET6;
570 ifra.ifra_addr.sin6_addr = in6addr_loopback;
571
572 /* the loopback address should NEVER expire. */
573 ifra.ifra_lifetime.ia6t_vltime = ND6_INFINITE_LIFETIME;
574 ifra.ifra_lifetime.ia6t_pltime = ND6_INFINITE_LIFETIME;
575
576 /* we don't need to perform DAD on loopback interfaces. */
577 ifra.ifra_flags |= IN6_IFF_NODAD;
578
579 /* add the new interface address */
580 error = in6_update_ifa(ifp, &ifra, 0, &ia);
581 if (error != 0) {
582 nd6log((LOG_ERR,
583 "%s: failed to configure loopback address %s (error=%d)\n",
584 __func__, if_name(ifp), error));
585 VERIFY(ia == NULL);
586 return (EADDRNOTAVAIL);
587 }
588
589 VERIFY(ia != NULL);
590 IFA_REMREF(&ia->ia_ifa);
591 return (0);
592 }
593
594 /*
595 * compute NI group address, based on the current hostname setting.
596 * see RFC 4620.
597 *
598 * when ifp == NULL, the caller is responsible for filling scopeid.
599 */
600 int
601 in6_nigroup(
602 struct ifnet *ifp,
603 const char *name,
604 int namelen,
605 struct in6_addr *in6)
606 {
607 const char *p;
608 u_char *q;
609 SHA1_CTX ctxt;
610 u_int8_t digest[SHA1_RESULTLEN];
611 char l;
612 char n[64]; /* a single label must not exceed 63 chars */
613
614 if (!namelen || !name)
615 return (-1);
616
617 p = name;
618 while (p && *p && *p != '.' && p - name < namelen)
619 p++;
620 if (p - name > sizeof (n) - 1)
621 return (-1); /* label too long */
622 l = p - name;
623 strlcpy(n, name, l);
624 n[(int)l] = '\0';
625 for (q = (u_char *) n; *q; q++) {
626 if ('A' <= *q && *q <= 'Z')
627 *q = *q - 'A' + 'a';
628 }
629
630 /* generate 16 bytes of pseudo-random value. */
631 bzero(&ctxt, sizeof (ctxt));
632 SHA1Init(&ctxt);
633 SHA1Update(&ctxt, &l, sizeof (l));
634 SHA1Update(&ctxt, n, l);
635 SHA1Final(digest, &ctxt);
636
637 bzero(in6, sizeof (*in6));
638 in6->s6_addr16[0] = IPV6_ADDR_INT16_MLL;
639 in6->s6_addr8[11] = 2;
640 in6->s6_addr8[12] = 0xff;
641 /* copy first 3 bytes of prefix into address */
642 bcopy(digest, &in6->s6_addr8[13], 3);
643 if (in6_setscope(in6, ifp, NULL))
644 return (-1); /* XXX: should not fail */
645
646 return (0);
647 }
648
649 int
650 in6_domifattach(struct ifnet *ifp)
651 {
652 int error;
653
654 VERIFY(ifp != NULL);
655
656 error = proto_plumb(PF_INET6, ifp);
657 if (error != 0) {
658 if (error != EEXIST)
659 log(LOG_ERR, "%s: proto_plumb returned %d if=%s\n",
660 __func__, error, if_name(ifp));
661 } else {
662 error = in6_ifattach_prelim(ifp);
663 if (error != 0) {
664 int errorx;
665
666 log(LOG_ERR,
667 "%s: in6_ifattach_prelim returned %d if=%s%d\n",
668 __func__, error, ifp->if_name, ifp->if_unit);
669
670 errorx = proto_unplumb(PF_INET6, ifp);
671 if (errorx != 0) /* XXX should not fail */
672 log(LOG_ERR,
673 "%s: proto_unplumb returned %d if=%s%d\n",
674 __func__, errorx, ifp->if_name,
675 ifp->if_unit);
676 }
677 }
678
679 return (error);
680 }
681
682 int
683 in6_ifattach_prelim(struct ifnet *ifp)
684 {
685 struct in6_ifextra *ext;
686 void **pbuf, *base;
687 int error = 0;
688
689 VERIFY(ifp != NULL);
690
691 /* quirks based on interface type */
692 switch (ifp->if_type) {
693 #if IFT_STF
694 case IFT_STF:
695 /*
696 * 6to4 interface is a very special kind of beast.
697 * no multicast, no linklocal. RFC2529 specifies how to make
698 * linklocals for 6to4 interface, but there's no use and
699 * it is rather harmful to have one.
700 */
701 goto skipmcast;
702 #endif
703 default:
704 break;
705 }
706
707 /*
708 * IPv6 requires multicast capability at the interface.
709 * (previously, this was a silent error.)
710 */
711 if ((ifp->if_flags & IFF_MULTICAST) == 0) {
712 nd6log((LOG_INFO, "in6_ifattach: ",
713 "%s is not multicast capable, IPv6 not enabled\n",
714 if_name(ifp)));
715 return (EINVAL);
716 }
717
718 #if IFT_STF
719 skipmcast:
720 #endif
721
722 if (ifp->if_inet6data == NULL) {
723 ext = (struct in6_ifextra *)_MALLOC(in6_extra_size, M_IFADDR,
724 M_WAITOK|M_ZERO);
725 if (!ext)
726 return (ENOMEM);
727 base = (void *)P2ROUNDUP((intptr_t)ext + sizeof(uint64_t),
728 sizeof(uint64_t));
729 VERIFY(((intptr_t)base + in6_extra_size) <=
730 ((intptr_t)ext + in6_extra_bufsize));
731 pbuf = (void **)((intptr_t)base - sizeof(void *));
732 *pbuf = ext;
733 ifp->if_inet6data = base;
734 VERIFY(IS_P2ALIGNED(ifp->if_inet6data, sizeof(uint64_t)));
735 } else {
736 /*
737 * Since the structure is never freed, we need to zero out
738 * some of its members. We avoid zeroing out the scope6
739 * structure on purpose because other threads might be
740 * using its contents.
741 */
742 bzero(&IN6_IFEXTRA(ifp)->icmp6_ifstat,
743 sizeof(IN6_IFEXTRA(ifp)->icmp6_ifstat));
744 bzero(&IN6_IFEXTRA(ifp)->in6_ifstat,
745 sizeof(IN6_IFEXTRA(ifp)->in6_ifstat));
746 }
747
748 /* initialize NDP variables */
749 if ((error = nd6_ifattach(ifp)) != 0)
750 return (error);
751
752 scope6_ifattach(ifp);
753
754 /* initialize loopback interface address */
755 if ((ifp->if_flags & IFF_LOOPBACK) != 0) {
756 error = in6_ifattach_loopback(ifp);
757 if (error != 0) {
758 log(LOG_ERR, "%s: in6_ifattach_loopback returned %d\n",
759 __func__, error, ifp->if_name,
760 ifp->if_unit);
761 return (error);
762 }
763 }
764
765 /* update dynamically. */
766 if (in6_maxmtu < ifp->if_mtu)
767 in6_maxmtu = ifp->if_mtu;
768
769 VERIFY(error == 0);
770 return (0);
771 }
772
773 int
774 in6_ifattach_aliasreq(struct ifnet *ifp, struct ifnet *altifp,
775 struct in6_aliasreq *ifra0)
776 {
777 int error;
778 struct in6_ifaddr *ia6;
779 struct in6_aliasreq ifra;
780
781 error = in6_ifattach_prelim(ifp);
782 if (error != 0)
783 return (error);
784
785 if (!ip6_auto_linklocal)
786 return (0);
787
788 /* assign a link-local address, only if there isn't one here already. */
789 ia6 = in6ifa_ifpforlinklocal(ifp, 0);
790 if (ia6 != NULL) {
791 IFA_REMREF(&ia6->ia_ifa);
792 return (0);
793 }
794
795 bzero(&ifra, sizeof (ifra));
796
797 /*
798 * in6_update_ifa() does not use ifra_name, but we accurately set it
799 * for safety.
800 */
801 strlcpy(ifra.ifra_name, if_name(ifp), sizeof (ifra.ifra_name));
802
803 /* Initialize the IPv6 interface address in our in6_aliasreq block */
804 if ((ifp->if_eflags & IFEF_NOAUTOIPV6LL) != 0 && ifra0 != NULL) {
805 /* interface provided both addresses for us */
806 struct sockaddr_in6 *sin6 = &ifra.ifra_addr;
807 struct in6_addr *in6 = &sin6->sin6_addr;
808 boolean_t ok = TRUE;
809
810 bcopy(&ifra0->ifra_addr, sin6, sizeof (struct sockaddr_in6));
811
812 if (sin6->sin6_family != AF_INET6 || sin6->sin6_port != 0)
813 ok = FALSE;
814 if (ok && (in6->s6_addr16[0] != htons(0xfe80)))
815 ok = FALSE;
816 if (ok) {
817 if (sin6->sin6_scope_id == 0 && in6->s6_addr16[1] == 0)
818 in6->s6_addr16[1] = htons(ifp->if_index);
819 else if (sin6->sin6_scope_id != 0 &&
820 sin6->sin6_scope_id != ifp->if_index)
821 ok = FALSE;
822 else if (in6->s6_addr16[1] != 0 &&
823 ntohs(in6->s6_addr16[1]) != ifp->if_index)
824 ok = FALSE;
825 }
826 if (ok && (in6->s6_addr32[1] != 0))
827 ok = FALSE;
828 if (!ok)
829 return (EINVAL);
830 } else {
831 ifra.ifra_addr.sin6_family = AF_INET6;
832 ifra.ifra_addr.sin6_len = sizeof (struct sockaddr_in6);
833 ifra.ifra_addr.sin6_addr.s6_addr16[0] = htons(0xfe80);
834 ifra.ifra_addr.sin6_addr.s6_addr16[1] = htons(ifp->if_index);
835 ifra.ifra_addr.sin6_addr.s6_addr32[1] = 0;
836 if ((ifp->if_flags & IFF_LOOPBACK) != 0) {
837 ifra.ifra_addr.sin6_addr.s6_addr32[2] = 0;
838 ifra.ifra_addr.sin6_addr.s6_addr32[3] = htonl(1);
839 } else {
840 if (in6_select_iid_from_all_hw(ifp, altifp,
841 &ifra.ifra_addr.sin6_addr) != 0) {
842 nd6log((LOG_ERR, "%s: no IID available\n",
843 if_name(ifp)));
844 return (EADDRNOTAVAIL);
845 }
846 }
847 }
848
849 if (in6_setscope(&ifra.ifra_addr.sin6_addr, ifp, NULL))
850 return (EADDRNOTAVAIL);
851
852 /* Set the prefix mask */
853 ifra.ifra_prefixmask.sin6_len = sizeof (struct sockaddr_in6);
854 ifra.ifra_prefixmask.sin6_family = AF_INET6;
855 ifra.ifra_prefixmask.sin6_addr = in6mask64;
856
857 /* link-local addresses should NEVER expire. */
858 ifra.ifra_lifetime.ia6t_vltime = ND6_INFINITE_LIFETIME;
859 ifra.ifra_lifetime.ia6t_pltime = ND6_INFINITE_LIFETIME;
860
861 /* Attach the link-local address */
862 if (in6_ifattach_linklocal(ifp, &ifra) != 0) {
863 nd6log((LOG_INFO,
864 "%s: %s could not attach link-local address.\n",
865 __func__, if_name(ifp)));
866 /* NB: not an error */
867 }
868
869 return (0);
870 }
871
872 int
873 in6_ifattach_llstartreq(struct ifnet *ifp, struct in6_llstartreq *llsr)
874 {
875 struct in6_aliasreq ifra;
876 struct in6_ifaddr *ia6;
877 struct nd_ifinfo *ndi;
878 int error;
879
880 VERIFY(llsr != NULL);
881
882 error = in6_ifattach_prelim(ifp);
883 if (error != 0)
884 return (error);
885
886 if (!ip6_auto_linklocal || (ifp->if_eflags & IFEF_NOAUTOIPV6LL) != 0)
887 return (0);
888
889 if (nd6_send_opstate == ND6_SEND_OPMODE_DISABLED)
890 return (ENXIO);
891
892 lck_rw_lock_shared(nd_if_rwlock);
893 ndi = ND_IFINFO(ifp);
894 VERIFY(ndi != NULL && ndi->initialized);
895 if ((ndi->flags & ND6_IFF_INSECURE) != 0) {
896 lck_rw_done(nd_if_rwlock);
897 return (ENXIO);
898 }
899 lck_rw_done(nd_if_rwlock);
900
901 /* assign a link-local address, only if there isn't one here already. */
902 ia6 = in6ifa_ifpforlinklocal(ifp, 0);
903 if (ia6 != NULL) {
904 IFA_REMREF(&ia6->ia_ifa);
905 return (0);
906 }
907
908 bzero(&ifra, sizeof (ifra));
909 strlcpy(ifra.ifra_name, if_name(ifp), sizeof (ifra.ifra_name));
910
911 ifra.ifra_addr.sin6_family = AF_INET6;
912 ifra.ifra_addr.sin6_len = sizeof (struct sockaddr_in6);
913 ifra.ifra_addr.sin6_addr.s6_addr16[0] = htons(0xfe80);
914 ifra.ifra_addr.sin6_addr.s6_addr16[1] = htons(ifp->if_index);
915 ifra.ifra_addr.sin6_addr.s6_addr32[1] = 0;
916 ifra.ifra_flags = IN6_IFF_SECURED;
917
918 in6_cga_node_lock();
919 if (in6_cga_generate(&llsr->llsr_cgaprep, 0,
920 &ifra.ifra_addr.sin6_addr)) {
921 in6_cga_node_unlock();
922 return (EADDRNOTAVAIL);
923 }
924 in6_cga_node_unlock();
925
926 if (in6_setscope(&ifra.ifra_addr.sin6_addr, ifp, NULL))
927 return (EADDRNOTAVAIL);
928
929 /* Set the prefix mask */
930 ifra.ifra_prefixmask.sin6_len = sizeof (struct sockaddr_in6);
931 ifra.ifra_prefixmask.sin6_family = AF_INET6;
932 ifra.ifra_prefixmask.sin6_addr = in6mask64;
933
934 /*
935 * link-local addresses should NEVER expire, but cryptographic
936 * ones may have finite preferred lifetime [if it's important to
937 * keep them from being used by applications as persistent device
938 * identifiers].
939 */
940 ifra.ifra_lifetime.ia6t_vltime = ND6_INFINITE_LIFETIME;
941 ifra.ifra_lifetime.ia6t_pltime = llsr->llsr_lifetime.ia6t_pltime;
942
943 /* Attach the link-local address */
944 if (in6_ifattach_linklocal(ifp, &ifra) != 0) {
945 /* NB: not an error */
946 nd6log((LOG_INFO,
947 "%s: %s could not attach link-local address.\n",
948 __func__, if_name(ifp)));
949 }
950
951 VERIFY(error == 0);
952 return (error);
953 }
954
955 /*
956 * NOTE: in6_ifdetach() does not support loopback if at this moment.
957 */
958 void
959 in6_ifdetach(struct ifnet *ifp)
960 {
961 struct in6_ifaddr *ia, *oia;
962 struct ifaddr *ifa;
963 struct rtentry *rt;
964 struct sockaddr_in6 sin6;
965 struct in6_multi_mship *imm;
966 int unlinked;
967
968 lck_mtx_assert(nd6_mutex, LCK_MTX_ASSERT_NOTOWNED);
969
970 /* remove neighbor management table */
971 nd6_purge(ifp);
972
973 /* nuke any of IPv6 addresses we have */
974 lck_rw_lock_exclusive(&in6_ifaddr_rwlock);
975 ia = in6_ifaddrs;
976 while (ia != NULL) {
977 if (ia->ia_ifa.ifa_ifp != ifp) {
978 ia = ia->ia_next;
979 continue;
980 }
981 IFA_ADDREF(&ia->ia_ifa); /* for us */
982 lck_rw_done(&in6_ifaddr_rwlock);
983 in6_purgeaddr(&ia->ia_ifa);
984 IFA_REMREF(&ia->ia_ifa); /* for us */
985 lck_rw_lock_exclusive(&in6_ifaddr_rwlock);
986 /*
987 * Purging the address caused in6_ifaddr_rwlock
988 * to be dropped and reacquired;
989 * therefore search again from the beginning
990 * of in6_ifaddrs list.
991 */
992 ia = in6_ifaddrs;
993 }
994 lck_rw_done(&in6_ifaddr_rwlock);
995
996 ifnet_lock_exclusive(ifp);
997
998 /* undo everything done by in6_ifattach(), just in case */
999 ifa = TAILQ_FIRST(&ifp->if_addrlist);
1000 while (ifa != NULL) {
1001 IFA_LOCK(ifa);
1002 if (ifa->ifa_addr->sa_family != AF_INET6 ||
1003 !IN6_IS_ADDR_LINKLOCAL(&satosin6(&ifa->ifa_addr)->
1004 sin6_addr)) {
1005 IFA_UNLOCK(ifa);
1006 ifa = TAILQ_NEXT(ifa, ifa_list);
1007 continue;
1008 }
1009
1010 ia = (struct in6_ifaddr *)ifa;
1011
1012 /* hold a reference for this routine */
1013 IFA_ADDREF_LOCKED(ifa);
1014 /* remove from the linked list */
1015 if_detach_ifa(ifp, ifa);
1016 IFA_UNLOCK(ifa);
1017
1018 /*
1019 * Leaving the multicast group(s) may involve freeing the
1020 * link address multicast structure(s) for the interface,
1021 * which is protected by ifnet lock. To avoid violating
1022 * lock ordering, we must drop ifnet lock before doing so.
1023 * The ifa won't go away since we held a refcnt above.
1024 */
1025 ifnet_lock_done(ifp);
1026
1027 /*
1028 * We have to do this work manually here instead of calling
1029 * in6_purgeaddr() since in6_purgeaddr() uses the RTM_HOST flag.
1030 */
1031
1032 /*
1033 * leave from multicast groups we have joined for the interface
1034 */
1035 IFA_LOCK(ifa);
1036 while ((imm = ia->ia6_memberships.lh_first) != NULL) {
1037 LIST_REMOVE(imm, i6mm_chain);
1038 IFA_UNLOCK(ifa);
1039 in6_leavegroup(imm);
1040 IFA_LOCK(ifa);
1041 }
1042
1043 /* remove from the routing table */
1044 if (ia->ia_flags & IFA_ROUTE) {
1045 IFA_UNLOCK(ifa);
1046 rt = rtalloc1((struct sockaddr *)&ia->ia_addr, 0, 0);
1047 if (rt != NULL) {
1048 (void) rtrequest(RTM_DELETE,
1049 (struct sockaddr *)&ia->ia_addr,
1050 (struct sockaddr *)&ia->ia_addr,
1051 (struct sockaddr *)&ia->ia_prefixmask,
1052 rt->rt_flags, (struct rtentry **)0);
1053 rtfree(rt);
1054 }
1055 } else {
1056 IFA_UNLOCK(ifa);
1057 }
1058
1059 /* also remove from the IPv6 address chain(itojun&jinmei) */
1060 unlinked = 1;
1061 oia = ia;
1062 lck_rw_lock_exclusive(&in6_ifaddr_rwlock);
1063 if (oia == (ia = in6_ifaddrs)) {
1064 in6_ifaddrs = ia->ia_next;
1065 } else {
1066 while (ia->ia_next && (ia->ia_next != oia))
1067 ia = ia->ia_next;
1068 if (ia->ia_next) {
1069 ia->ia_next = oia->ia_next;
1070 } else {
1071 nd6log((LOG_ERR,
1072 "%s: didn't unlink in6ifaddr from "
1073 "list\n", if_name(ifp)));
1074 unlinked = 0;
1075 }
1076 }
1077 lck_rw_done(&in6_ifaddr_rwlock);
1078
1079 ifa = &oia->ia_ifa;
1080 /*
1081 * release another refcnt for the link from in6_ifaddrs.
1082 * Do this only if it's not already unlinked in the event
1083 * that we lost the race, since in6_ifaddr_rwlock was
1084 * momentarily dropped above.
1085 */
1086 if (unlinked)
1087 IFA_REMREF(ifa);
1088 /* release reference held for this routine */
1089 IFA_REMREF(ifa);
1090
1091 /*
1092 * This is suboptimal, but since we dropped ifnet lock above
1093 * the list might have changed. Repeat the search from the
1094 * beginning until we find the first eligible IPv6 address.
1095 */
1096 ifnet_lock_exclusive(ifp);
1097 ifa = TAILQ_FIRST(&ifp->if_addrlist);
1098 }
1099 ifnet_lock_done(ifp);
1100
1101 /* invalidate route caches */
1102 routegenid_inet6_update();
1103
1104 /*
1105 * remove neighbor management table. we call it twice just to make
1106 * sure we nuke everything. maybe we need just one call.
1107 * XXX: since the first call did not release addresses, some prefixes
1108 * might remain. We should call nd6_purge() again to release the
1109 * prefixes after removing all addresses above.
1110 * (Or can we just delay calling nd6_purge until at this point?)
1111 */
1112 nd6_purge(ifp);
1113
1114 /* remove route to link-local allnodes multicast (ff02::1) */
1115 bzero(&sin6, sizeof (sin6));
1116 sin6.sin6_len = sizeof (struct sockaddr_in6);
1117 sin6.sin6_family = AF_INET6;
1118 sin6.sin6_addr = in6addr_linklocal_allnodes;
1119 sin6.sin6_addr.s6_addr16[1] = htons(ifp->if_index);
1120 rt = rtalloc1((struct sockaddr *)&sin6, 0, 0);
1121 if (rt != NULL) {
1122 RT_LOCK(rt);
1123 if (rt->rt_ifp == ifp) {
1124 /*
1125 * Prevent another thread from modifying rt_key,
1126 * rt_gateway via rt_setgate() after the rt_lock
1127 * is dropped by marking the route as defunct.
1128 */
1129 rt->rt_flags |= RTF_CONDEMNED;
1130 RT_UNLOCK(rt);
1131 (void) rtrequest(RTM_DELETE, rt_key(rt), rt->rt_gateway,
1132 rt_mask(rt), rt->rt_flags, 0);
1133 } else {
1134 RT_UNLOCK(rt);
1135 }
1136 rtfree(rt);
1137 }
1138 }
1139
1140 void
1141 in6_iid_mktmp(struct ifnet *ifp, u_int8_t *retbuf, const u_int8_t *baseid,
1142 int generate)
1143 {
1144 u_int8_t nullbuf[8];
1145 struct nd_ifinfo *ndi;
1146
1147 lck_rw_lock_shared(nd_if_rwlock);
1148 ndi = ND_IFINFO(ifp);
1149 VERIFY(ndi != NULL && ndi->initialized);
1150 lck_mtx_lock(&ndi->lock);
1151 bzero(nullbuf, sizeof (nullbuf));
1152 if (bcmp(ndi->randomid, nullbuf, sizeof (nullbuf)) == 0) {
1153 /* we've never created a random ID. Create a new one. */
1154 generate = 1;
1155 }
1156
1157 if (generate) {
1158 bcopy(baseid, ndi->randomseed1, sizeof (ndi->randomseed1));
1159
1160 /* in6_generate_tmp_iid will update seedn and buf */
1161 (void) in6_generate_tmp_iid(ndi->randomseed0, ndi->randomseed1,
1162 ndi->randomid);
1163 }
1164
1165 bcopy(ndi->randomid, retbuf, 8);
1166 lck_mtx_unlock(&ndi->lock);
1167 lck_rw_done(nd_if_rwlock);
1168 }
1169
1170 void
1171 in6_tmpaddrtimer(void *arg)
1172 {
1173 #pragma unused(arg)
1174 int i;
1175 struct nd_ifinfo *ndi;
1176 u_int8_t nullbuf[8];
1177
1178 timeout(in6_tmpaddrtimer, (caddr_t)0, (ip6_temp_preferred_lifetime -
1179 ip6_desync_factor - ip6_temp_regen_advance) * hz);
1180
1181 lck_rw_lock_shared(nd_if_rwlock);
1182 bzero(nullbuf, sizeof (nullbuf));
1183 for (i = 1; i < if_index + 1; i++) {
1184 if (!nd_ifinfo || i >= nd_ifinfo_indexlim)
1185 break;
1186 ndi = &nd_ifinfo[i];
1187 if (!ndi->initialized)
1188 continue;
1189 lck_mtx_lock(&ndi->lock);
1190 if (bcmp(ndi->randomid, nullbuf, sizeof (nullbuf)) != 0) {
1191 /*
1192 * We've been generating a random ID on this interface.
1193 * Create a new one.
1194 */
1195 (void) in6_generate_tmp_iid(ndi->randomseed0,
1196 ndi->randomseed1, ndi->randomid);
1197 }
1198 lck_mtx_unlock(&ndi->lock);
1199 }
1200 lck_rw_done(nd_if_rwlock);
1201 }