472 lines
11 KiB
C
472 lines
11 KiB
C
/*
|
|
ip_ioctl.c
|
|
|
|
Copyright 1995 Philip Homburg
|
|
*/
|
|
|
|
#include "inet.h"
|
|
#include "buf.h"
|
|
#include "event.h"
|
|
#include "type.h"
|
|
|
|
#include "arp.h"
|
|
#include "assert.h"
|
|
#include "clock.h"
|
|
#include "icmp_lib.h"
|
|
#include "ip.h"
|
|
#include "ip_int.h"
|
|
#include "ipr.h"
|
|
|
|
THIS_FILE
|
|
|
|
FORWARD int ip_checkopt ARGS(( ip_fd_t *ip_fd ));
|
|
FORWARD void reply_thr_get ARGS(( ip_fd_t *ip_fd, size_t
|
|
reply, int for_ioctl ));
|
|
|
|
PUBLIC int ip_ioctl (fd, req)
|
|
int fd;
|
|
ioreq_t req;
|
|
{
|
|
ip_fd_t *ip_fd;
|
|
ip_port_t *ip_port;
|
|
nwio_ipopt_t *ipopt;
|
|
nwio_ipopt_t oldopt, newopt;
|
|
nwio_ipconf_t *ipconf;
|
|
nwio_route_t *route_ent;
|
|
acc_t *data;
|
|
int result;
|
|
unsigned int new_en_flags, new_di_flags,
|
|
old_en_flags, old_di_flags;
|
|
unsigned long new_flags;
|
|
int old_ip_flags;
|
|
int ent_no;
|
|
|
|
assert (fd>=0 && fd<=IP_FD_NR);
|
|
ip_fd= &ip_fd_table[fd];
|
|
|
|
assert (ip_fd->if_flags & IFF_INUSE);
|
|
|
|
switch (req)
|
|
{
|
|
case NWIOSIPOPT:
|
|
data= (*ip_fd->if_get_userdata)(ip_fd->if_srfd, 0,
|
|
sizeof(nwio_ipopt_t), TRUE);
|
|
|
|
data= bf_packIffLess (data, sizeof(nwio_ipopt_t));
|
|
assert (data->acc_length == sizeof(nwio_ipopt_t));
|
|
|
|
ipopt= (nwio_ipopt_t *)ptr2acc_data(data);
|
|
oldopt= ip_fd->if_ipopt;
|
|
newopt= *ipopt;
|
|
|
|
old_en_flags= oldopt.nwio_flags & 0xffff;
|
|
old_di_flags= (oldopt.nwio_flags >> 16) & 0xffff;
|
|
new_en_flags= newopt.nwio_flags & 0xffff;
|
|
new_di_flags= (newopt.nwio_flags >> 16) & 0xffff;
|
|
if (new_en_flags & new_di_flags)
|
|
{
|
|
bf_afree(data);
|
|
reply_thr_get (ip_fd, EBADMODE, TRUE);
|
|
return NW_OK;
|
|
}
|
|
|
|
/* NWIO_ACC_MASK */
|
|
if (new_di_flags & NWIO_ACC_MASK)
|
|
{
|
|
bf_afree(data);
|
|
reply_thr_get (ip_fd, EBADMODE, TRUE);
|
|
return NW_OK;
|
|
/* access modes can't be disable */
|
|
}
|
|
|
|
if (!(new_en_flags & NWIO_ACC_MASK))
|
|
new_en_flags |= (old_en_flags & NWIO_ACC_MASK);
|
|
|
|
/* NWIO_LOC_MASK */
|
|
if (!((new_en_flags|new_di_flags) & NWIO_LOC_MASK))
|
|
{
|
|
new_en_flags |= (old_en_flags & NWIO_LOC_MASK);
|
|
new_di_flags |= (old_di_flags & NWIO_LOC_MASK);
|
|
}
|
|
|
|
/* NWIO_BROAD_MASK */
|
|
if (!((new_en_flags|new_di_flags) & NWIO_BROAD_MASK))
|
|
{
|
|
new_en_flags |= (old_en_flags & NWIO_BROAD_MASK);
|
|
new_di_flags |= (old_di_flags & NWIO_BROAD_MASK);
|
|
}
|
|
|
|
/* NWIO_REM_MASK */
|
|
if (!((new_en_flags|new_di_flags) & NWIO_REM_MASK))
|
|
{
|
|
new_en_flags |= (old_en_flags & NWIO_REM_MASK);
|
|
new_di_flags |= (old_di_flags & NWIO_REM_MASK);
|
|
newopt.nwio_rem= oldopt.nwio_rem;
|
|
}
|
|
|
|
/* NWIO_PROTO_MASK */
|
|
if (!((new_en_flags|new_di_flags) & NWIO_PROTO_MASK))
|
|
{
|
|
new_en_flags |= (old_en_flags & NWIO_PROTO_MASK);
|
|
new_di_flags |= (old_di_flags & NWIO_PROTO_MASK);
|
|
newopt.nwio_proto= oldopt.nwio_proto;
|
|
}
|
|
|
|
/* NWIO_HDR_O_MASK */
|
|
if (!((new_en_flags|new_di_flags) & NWIO_HDR_O_MASK))
|
|
{
|
|
new_en_flags |= (old_en_flags & NWIO_HDR_O_MASK);
|
|
new_di_flags |= (old_di_flags & NWIO_HDR_O_MASK);
|
|
newopt.nwio_tos= oldopt.nwio_tos;
|
|
newopt.nwio_ttl= oldopt.nwio_ttl;
|
|
newopt.nwio_df= oldopt.nwio_df;
|
|
newopt.nwio_hdropt= oldopt.nwio_hdropt;
|
|
}
|
|
|
|
/* NWIO_RW_MASK */
|
|
if (!((new_en_flags|new_di_flags) & NWIO_RW_MASK))
|
|
{
|
|
new_en_flags |= (old_en_flags & NWIO_RW_MASK);
|
|
new_di_flags |= (old_di_flags & NWIO_RW_MASK);
|
|
}
|
|
|
|
new_flags= ((unsigned long)new_di_flags << 16) | new_en_flags;
|
|
|
|
if ((new_flags & NWIO_RWDATONLY) && (new_flags &
|
|
(NWIO_REMANY|NWIO_PROTOANY|NWIO_HDR_O_ANY)))
|
|
{
|
|
bf_afree(data);
|
|
reply_thr_get(ip_fd, EBADMODE, TRUE);
|
|
return NW_OK;
|
|
}
|
|
|
|
if (ip_fd->if_flags & IFF_OPTSET)
|
|
ip_unhash_proto(ip_fd);
|
|
|
|
newopt.nwio_flags= new_flags;
|
|
ip_fd->if_ipopt= newopt;
|
|
|
|
result= ip_checkopt(ip_fd);
|
|
|
|
if (result<0)
|
|
ip_fd->if_ipopt= oldopt;
|
|
|
|
bf_afree(data);
|
|
reply_thr_get (ip_fd, result, TRUE);
|
|
return NW_OK;
|
|
|
|
case NWIOGIPOPT:
|
|
data= bf_memreq(sizeof(nwio_ipopt_t));
|
|
|
|
ipopt= (nwio_ipopt_t *)ptr2acc_data(data);
|
|
|
|
*ipopt= ip_fd->if_ipopt;
|
|
|
|
result= (*ip_fd->if_put_userdata)(ip_fd->if_srfd, 0, data,
|
|
TRUE);
|
|
return (*ip_fd->if_put_userdata)(ip_fd->if_srfd, result,
|
|
(acc_t *)0, TRUE);
|
|
|
|
case NWIOSIPCONF:
|
|
ip_port= ip_fd->if_port;
|
|
|
|
data= (*ip_fd->if_get_userdata)(ip_fd->if_srfd, 0,
|
|
sizeof(nwio_ipconf_t), TRUE);
|
|
|
|
data= bf_packIffLess (data, sizeof(nwio_ipconf_t));
|
|
assert (data->acc_length == sizeof(nwio_ipconf_t));
|
|
|
|
old_ip_flags= ip_port->ip_flags;
|
|
|
|
ipconf= (nwio_ipconf_t *)ptr2acc_data(data);
|
|
|
|
if (ipconf->nwic_flags & ~NWIC_FLAGS)
|
|
{
|
|
bf_afree(data);
|
|
return (*ip_fd->if_put_userdata)(ip_fd-> if_srfd,
|
|
EBADMODE, (acc_t *)0, TRUE);
|
|
}
|
|
|
|
if (ipconf->nwic_flags & NWIC_IPADDR_SET)
|
|
{
|
|
ip_port->ip_ipaddr= ipconf->nwic_ipaddr;
|
|
ip_port->ip_flags |= IPF_IPADDRSET;
|
|
ip_port->ip_netmask=
|
|
ip_netmask(ip_nettype(ipconf->nwic_ipaddr));
|
|
if (!(ip_port->ip_flags & IPF_NETMASKSET)) {
|
|
ip_port->ip_subnetmask= ip_port->ip_netmask;
|
|
}
|
|
(*ip_port->ip_dev_set_ipaddr)(ip_port);
|
|
}
|
|
if (ipconf->nwic_flags & NWIC_NETMASK_SET)
|
|
{
|
|
ip_port->ip_subnetmask= ipconf->nwic_netmask;
|
|
ip_port->ip_flags |= IPF_NETMASKSET;
|
|
}
|
|
|
|
bf_afree(data);
|
|
return (*ip_fd->if_put_userdata)(ip_fd-> if_srfd, NW_OK,
|
|
(acc_t *)0, TRUE);
|
|
|
|
case NWIOGIPCONF:
|
|
ip_port= ip_fd->if_port;
|
|
|
|
if (!(ip_port->ip_flags & IPF_IPADDRSET))
|
|
{
|
|
ip_fd->if_flags |= IFF_GIPCONF_IP;
|
|
return NW_SUSPEND;
|
|
}
|
|
ip_fd->if_flags &= ~IFF_GIPCONF_IP;
|
|
data= bf_memreq(sizeof(nwio_ipconf_t));
|
|
ipconf= (nwio_ipconf_t *)ptr2acc_data(data);
|
|
ipconf->nwic_flags= NWIC_IPADDR_SET;
|
|
ipconf->nwic_ipaddr= ip_port->ip_ipaddr;
|
|
ipconf->nwic_netmask= ip_port->ip_subnetmask;
|
|
if (ip_port->ip_flags & IPF_NETMASKSET)
|
|
ipconf->nwic_flags |= NWIC_NETMASK_SET;
|
|
|
|
result= (*ip_fd->if_put_userdata)(ip_fd->if_srfd, 0, data,
|
|
TRUE);
|
|
return (*ip_fd->if_put_userdata)(ip_fd->if_srfd, result,
|
|
(acc_t *)0, TRUE);
|
|
|
|
case NWIOGIPIROUTE:
|
|
data= (*ip_fd->if_get_userdata)(ip_fd->if_srfd,
|
|
0, sizeof(nwio_route_t), TRUE);
|
|
if (data == NULL)
|
|
{
|
|
return (*ip_fd->if_put_userdata)(ip_fd->if_srfd,
|
|
EFAULT, NULL, TRUE);
|
|
}
|
|
|
|
data= bf_packIffLess (data, sizeof(nwio_route_t) );
|
|
route_ent= (nwio_route_t *)ptr2acc_data(data);
|
|
ent_no= route_ent->nwr_ent_no;
|
|
bf_afree(data);
|
|
|
|
data= bf_memreq(sizeof(nwio_route_t));
|
|
route_ent= (nwio_route_t *)ptr2acc_data(data);
|
|
result= ipr_get_iroute(ent_no, route_ent);
|
|
if (result < 0)
|
|
bf_afree(data);
|
|
else
|
|
{
|
|
assert(result == NW_OK);
|
|
result= (*ip_fd->if_put_userdata)(ip_fd->if_srfd, 0,
|
|
data, TRUE);
|
|
}
|
|
return (*ip_fd->if_put_userdata)(ip_fd->if_srfd,
|
|
result, (acc_t *)0, TRUE);
|
|
|
|
case NWIOSIPIROUTE:
|
|
data= (*ip_fd->if_get_userdata)(ip_fd->if_srfd,
|
|
0, sizeof(nwio_route_t), TRUE);
|
|
if (data == NULL)
|
|
{
|
|
return (*ip_fd->if_put_userdata)(ip_fd->if_srfd,
|
|
EFAULT, NULL, TRUE);
|
|
}
|
|
|
|
data= bf_packIffLess (data, sizeof(nwio_route_t) );
|
|
route_ent= (nwio_route_t *)ptr2acc_data(data);
|
|
result= ipr_add_iroute(ip_fd->if_port->ip_port,
|
|
route_ent->nwr_dest, route_ent->nwr_netmask,
|
|
route_ent->nwr_gateway,
|
|
(route_ent->nwr_flags & NWRF_UNREACHABLE) ?
|
|
IRTD_UNREACHABLE : route_ent->nwr_dist,
|
|
!!(route_ent->nwr_flags & NWRF_STATIC), NULL);
|
|
bf_afree(data);
|
|
|
|
return (*ip_fd->if_put_userdata)(ip_fd->if_srfd,
|
|
result, (acc_t *)0, TRUE);
|
|
|
|
case NWIOGIPOROUTE:
|
|
data= (*ip_fd->if_get_userdata)(ip_fd->if_srfd,
|
|
0, sizeof(nwio_route_t), TRUE);
|
|
if (data == NULL)
|
|
{
|
|
return (*ip_fd->if_put_userdata)(ip_fd->if_srfd,
|
|
EFAULT, NULL, TRUE);
|
|
}
|
|
|
|
data= bf_packIffLess (data, sizeof(nwio_route_t) );
|
|
route_ent= (nwio_route_t *)ptr2acc_data(data);
|
|
ent_no= route_ent->nwr_ent_no;
|
|
bf_afree(data);
|
|
|
|
data= bf_memreq(sizeof(nwio_route_t));
|
|
route_ent= (nwio_route_t *)ptr2acc_data(data);
|
|
result= ipr_get_oroute(ent_no, route_ent);
|
|
if (result < 0)
|
|
bf_afree(data);
|
|
else
|
|
{
|
|
assert(result == NW_OK);
|
|
result= (*ip_fd->if_put_userdata)(ip_fd->if_srfd, 0,
|
|
data, TRUE);
|
|
}
|
|
return (*ip_fd->if_put_userdata)(ip_fd->if_srfd,
|
|
result, (acc_t *)0, TRUE);
|
|
|
|
case NWIODIPIROUTE:
|
|
data= (*ip_fd->if_get_userdata)(ip_fd->if_srfd,
|
|
0, sizeof(nwio_route_t), TRUE);
|
|
if (data == NULL)
|
|
{
|
|
return (*ip_fd->if_put_userdata)(ip_fd->if_srfd,
|
|
EFAULT, NULL, TRUE);
|
|
}
|
|
|
|
data= bf_packIffLess (data, sizeof(nwio_route_t) );
|
|
route_ent= (nwio_route_t *)ptr2acc_data(data);
|
|
result= ipr_del_iroute(ip_fd->if_port->ip_port,
|
|
route_ent->nwr_dest, route_ent->nwr_netmask,
|
|
route_ent->nwr_gateway,
|
|
(route_ent->nwr_flags & NWRF_UNREACHABLE) ?
|
|
IRTD_UNREACHABLE : route_ent->nwr_dist,
|
|
!!(route_ent->nwr_flags & NWRF_STATIC));
|
|
bf_afree(data);
|
|
|
|
return (*ip_fd->if_put_userdata)(ip_fd->if_srfd,
|
|
result, (acc_t *)0, TRUE);
|
|
|
|
case NWIOSIPOROUTE:
|
|
data= (*ip_fd->if_get_userdata)(ip_fd->if_srfd,
|
|
0, sizeof(nwio_route_t), TRUE);
|
|
if (data == NULL)
|
|
{
|
|
return (*ip_fd->if_put_userdata)(ip_fd->if_srfd,
|
|
EFAULT, NULL, TRUE);
|
|
}
|
|
|
|
data= bf_packIffLess (data, sizeof(nwio_route_t) );
|
|
route_ent= (nwio_route_t *)ptr2acc_data(data);
|
|
result= ipr_add_oroute(ip_fd->if_port->ip_port,
|
|
route_ent->nwr_dest, route_ent->nwr_netmask,
|
|
route_ent->nwr_gateway, (time_t)0,
|
|
route_ent->nwr_dist,
|
|
!!(route_ent->nwr_flags & NWRF_STATIC),
|
|
route_ent->nwr_pref, NULL);
|
|
bf_afree(data);
|
|
|
|
return (*ip_fd->if_put_userdata)(ip_fd->if_srfd,
|
|
result, (acc_t *)0, TRUE);
|
|
|
|
default:
|
|
break;
|
|
}
|
|
DBLOCK(1, printf("replying EBADIOCTL\n"));
|
|
return (*ip_fd->if_put_userdata)(ip_fd-> if_srfd, EBADIOCTL,
|
|
(acc_t *)0, TRUE);
|
|
}
|
|
|
|
PUBLIC void ip_hash_proto(ip_fd)
|
|
ip_fd_t *ip_fd;
|
|
{
|
|
ip_port_t *ip_port;
|
|
int hash;
|
|
|
|
ip_port= ip_fd->if_port;
|
|
if (ip_fd->if_ipopt.nwio_flags & NWIO_PROTOANY)
|
|
{
|
|
ip_fd->if_proto_next= ip_port->ip_proto_any;
|
|
ip_port->ip_proto_any= ip_fd;
|
|
}
|
|
else
|
|
{
|
|
hash= ip_fd->if_ipopt.nwio_proto & (IP_PROTO_HASH_NR-1);
|
|
ip_fd->if_proto_next= ip_port->ip_proto[hash];
|
|
ip_port->ip_proto[hash]= ip_fd;
|
|
}
|
|
}
|
|
|
|
PUBLIC void ip_unhash_proto(ip_fd)
|
|
ip_fd_t *ip_fd;
|
|
{
|
|
ip_port_t *ip_port;
|
|
ip_fd_t *prev, *curr, **ip_fd_p;
|
|
int hash;
|
|
|
|
ip_port= ip_fd->if_port;
|
|
if (ip_fd->if_ipopt.nwio_flags & NWIO_PROTOANY)
|
|
{
|
|
ip_fd_p= &ip_port->ip_proto_any;
|
|
}
|
|
else
|
|
{
|
|
hash= ip_fd->if_ipopt.nwio_proto & (IP_PROTO_HASH_NR-1);
|
|
ip_fd_p= &ip_port->ip_proto[hash];
|
|
}
|
|
for (prev= NULL, curr= *ip_fd_p; curr;
|
|
prev= curr, curr= curr->if_proto_next)
|
|
{
|
|
if (curr == ip_fd)
|
|
break;
|
|
}
|
|
assert(curr);
|
|
if (prev)
|
|
prev->if_proto_next= curr->if_proto_next;
|
|
else
|
|
*ip_fd_p= curr->if_proto_next;
|
|
}
|
|
|
|
PRIVATE int ip_checkopt (ip_fd)
|
|
ip_fd_t *ip_fd;
|
|
{
|
|
/* bug: we don't check access modes yet */
|
|
|
|
unsigned long flags;
|
|
unsigned int en_di_flags;
|
|
ip_port_t *port;
|
|
acc_t *pack;
|
|
int result;
|
|
|
|
flags= ip_fd->if_ipopt.nwio_flags;
|
|
en_di_flags= (flags >>16) | (flags & 0xffff);
|
|
|
|
if (flags & NWIO_HDR_O_SPEC)
|
|
{
|
|
result= ip_chk_hdropt (ip_fd->if_ipopt.nwio_hdropt.iho_data,
|
|
ip_fd->if_ipopt.nwio_hdropt.iho_opt_siz);
|
|
if (result<0)
|
|
return result;
|
|
}
|
|
if ((en_di_flags & NWIO_ACC_MASK) &&
|
|
(en_di_flags & NWIO_LOC_MASK) &&
|
|
(en_di_flags & NWIO_BROAD_MASK) &&
|
|
(en_di_flags & NWIO_REM_MASK) &&
|
|
(en_di_flags & NWIO_PROTO_MASK) &&
|
|
(en_di_flags & NWIO_HDR_O_MASK) &&
|
|
(en_di_flags & NWIO_RW_MASK))
|
|
{
|
|
ip_fd->if_flags |= IFF_OPTSET;
|
|
|
|
ip_hash_proto(ip_fd);
|
|
}
|
|
|
|
else
|
|
ip_fd->if_flags &= ~IFF_OPTSET;
|
|
|
|
while (ip_fd->if_rdbuf_head)
|
|
{
|
|
pack= ip_fd->if_rdbuf_head;
|
|
ip_fd->if_rdbuf_head= pack->acc_ext_link;
|
|
bf_afree(pack);
|
|
}
|
|
return NW_OK;
|
|
}
|
|
|
|
PRIVATE void reply_thr_get(ip_fd, reply, for_ioctl)
|
|
ip_fd_t *ip_fd;
|
|
size_t reply;
|
|
int for_ioctl;
|
|
{
|
|
acc_t *result;
|
|
result= (ip_fd->if_get_userdata)(ip_fd->if_srfd, reply,
|
|
(size_t)0, for_ioctl);
|
|
assert (!result);
|
|
}
|
|
|
|
/*
|
|
* $PchId: ip_ioctl.c,v 1.8 1996/12/17 07:56:18 philip Exp $
|
|
*/
|