xref: /freebsd/sys/net/route.c (revision 69104ebe0ff52fec260c25511dc2d0e4b333a862)
1c398230bSWarner Losh /*-
251369649SPedro F. Giffuni  * SPDX-License-Identifier: BSD-3-Clause
351369649SPedro F. Giffuni  *
4df8bae1dSRodney W. Grimes  * Copyright (c) 1980, 1986, 1991, 1993
5df8bae1dSRodney W. Grimes  *	The Regents of the University of California.  All rights reserved.
6df8bae1dSRodney W. Grimes  *
7df8bae1dSRodney W. Grimes  * Redistribution and use in source and binary forms, with or without
8df8bae1dSRodney W. Grimes  * modification, are permitted provided that the following conditions
9df8bae1dSRodney W. Grimes  * are met:
10df8bae1dSRodney W. Grimes  * 1. Redistributions of source code must retain the above copyright
11df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer.
12df8bae1dSRodney W. Grimes  * 2. Redistributions in binary form must reproduce the above copyright
13df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer in the
14df8bae1dSRodney W. Grimes  *    documentation and/or other materials provided with the distribution.
15fbbd9655SWarner Losh  * 3. Neither the name of the University nor the names of its contributors
16df8bae1dSRodney W. Grimes  *    may be used to endorse or promote products derived from this software
17df8bae1dSRodney W. Grimes  *    without specific prior written permission.
18df8bae1dSRodney W. Grimes  *
19df8bae1dSRodney W. Grimes  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20df8bae1dSRodney W. Grimes  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21df8bae1dSRodney W. Grimes  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22df8bae1dSRodney W. Grimes  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23df8bae1dSRodney W. Grimes  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24df8bae1dSRodney W. Grimes  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25df8bae1dSRodney W. Grimes  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26df8bae1dSRodney W. Grimes  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27df8bae1dSRodney W. Grimes  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28df8bae1dSRodney W. Grimes  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29df8bae1dSRodney W. Grimes  * SUCH DAMAGE.
30df8bae1dSRodney W. Grimes  *
3142e9e16dSRuslan Ermilov  *	@(#)route.c	8.3.1.1 (Berkeley) 2/23/95
32c3aac50fSPeter Wemm  * $FreeBSD$
33df8bae1dSRodney W. Grimes  */
348b07e49aSJulian Elischer /************************************************************************
358b07e49aSJulian Elischer  * Note: In this file a 'fib' is a "forwarding information base"	*
368b07e49aSJulian Elischer  * Which is the new name for an in kernel routing (next hop) table.	*
378b07e49aSJulian Elischer  ***********************************************************************/
38df8bae1dSRodney W. Grimes 
391d5e9e22SEivind Eklund #include "opt_inet.h"
40096f2786SBjoern A. Zeeb #include "opt_inet6.h"
414bd49128SPeter Wemm #include "opt_mrouting.h"
42e440aed9SQing Li #include "opt_mpath.h"
43d6e23cf0SMichael Tuexen #include "opt_route.h"
444bd49128SPeter Wemm 
45df8bae1dSRodney W. Grimes #include <sys/param.h>
46df8bae1dSRodney W. Grimes #include <sys/systm.h>
474d1d4912SBruce Evans #include <sys/malloc.h>
48df8bae1dSRodney W. Grimes #include <sys/mbuf.h>
49df8bae1dSRodney W. Grimes #include <sys/socket.h>
508b07e49aSJulian Elischer #include <sys/sysctl.h>
513120b9d4SKip Macy #include <sys/syslog.h>
528b07e49aSJulian Elischer #include <sys/sysproto.h>
538b07e49aSJulian Elischer #include <sys/proc.h>
54df8bae1dSRodney W. Grimes #include <sys/domain.h>
55*69104ebeSMichael Tuexen #include <sys/eventhandler.h>
56cb64988fSLuoqi Chen #include <sys/kernel.h>
5720efcfc6SAndrey V. Elsukov #include <sys/lock.h>
5820efcfc6SAndrey V. Elsukov #include <sys/rmlock.h>
59df8bae1dSRodney W. Grimes 
60df8bae1dSRodney W. Grimes #include <net/if.h>
6176039bc8SGleb Smirnoff #include <net/if_var.h>
626e6b3f7cSQing Li #include <net/if_dl.h>
63df8bae1dSRodney W. Grimes #include <net/route.h>
6461eee0e2SAlexander V. Chernikov #include <net/route_var.h>
65530c0060SRobert Watson #include <net/vnet.h>
66df8bae1dSRodney W. Grimes 
67e440aed9SQing Li #ifdef RADIX_MPATH
68e440aed9SQing Li #include <net/radix_mpath.h>
69e440aed9SQing Li #endif
70e440aed9SQing Li 
71df8bae1dSRodney W. Grimes #include <netinet/in.h>
72b5e8ce9fSBruce Evans #include <netinet/ip_mroute.h>
73df8bae1dSRodney W. Grimes 
742dc1d581SAndre Oppermann #include <vm/uma.h>
752dc1d581SAndre Oppermann 
764871fc4aSJulian Elischer #define	RT_MAXFIBS	UINT16_MAX
77bfca216eSBjoern A. Zeeb 
78bfca216eSBjoern A. Zeeb /* Kernel config default option. */
79bfca216eSBjoern A. Zeeb #ifdef ROUTETABLES
80bfca216eSBjoern A. Zeeb #if ROUTETABLES <= 0
81bfca216eSBjoern A. Zeeb #error "ROUTETABLES defined too low"
82bfca216eSBjoern A. Zeeb #endif
83bfca216eSBjoern A. Zeeb #if ROUTETABLES > RT_MAXFIBS
84bfca216eSBjoern A. Zeeb #error "ROUTETABLES defined too big"
85bfca216eSBjoern A. Zeeb #endif
86bfca216eSBjoern A. Zeeb #define	RT_NUMFIBS	ROUTETABLES
87bfca216eSBjoern A. Zeeb #endif /* ROUTETABLES */
88bfca216eSBjoern A. Zeeb /* Initialize to default if not otherwise set. */
89bfca216eSBjoern A. Zeeb #ifndef	RT_NUMFIBS
90bfca216eSBjoern A. Zeeb #define	RT_NUMFIBS	1
91bfca216eSBjoern A. Zeeb #endif
92bfca216eSBjoern A. Zeeb 
934871fc4aSJulian Elischer /* This is read-only.. */
948b07e49aSJulian Elischer u_int rt_numfibs = RT_NUMFIBS;
95af3b2549SHans Petter Selasky SYSCTL_UINT(_net, OID_AUTO, fibs, CTLFLAG_RDTUN, &rt_numfibs, 0, "");
968b07e49aSJulian Elischer 
9766e8505fSJulian Elischer /*
9866e8505fSJulian Elischer  * By default add routes to all fibs for new interfaces.
9966e8505fSJulian Elischer  * Once this is set to 0 then only allocate routes on interface
10066e8505fSJulian Elischer  * changes for the FIB of the caller when adding a new set of addresses
10166e8505fSJulian Elischer  * to an interface.  XXX this is a shotgun aproach to a problem that needs
10266e8505fSJulian Elischer  * a more fine grained solution.. that will come.
103a8498625SBjoern A. Zeeb  * XXX also has the problems getting the FIB from curthread which will not
104a8498625SBjoern A. Zeeb  * always work given the fib can be overridden and prefixes can be added
105a8498625SBjoern A. Zeeb  * from the network stack context.
10666e8505fSJulian Elischer  */
107ee0bd4b9SHiroki Sato VNET_DEFINE(u_int, rt_add_addr_allfibs) = 1;
108ee0bd4b9SHiroki Sato SYSCTL_UINT(_net, OID_AUTO, add_addr_allfibs, CTLFLAG_RWTUN | CTLFLAG_VNET,
109ee0bd4b9SHiroki Sato     &VNET_NAME(rt_add_addr_allfibs), 0, "");
11066e8505fSJulian Elischer 
111eddfbb76SRobert Watson VNET_DEFINE(struct rtstat, rtstat);
1121e77c105SRobert Watson #define	V_rtstat	VNET(rtstat)
113b58ea5f3SBjoern A. Zeeb 
11461eee0e2SAlexander V. Chernikov VNET_DEFINE(struct rib_head *, rt_tables);
11582cea7e6SBjoern A. Zeeb #define	V_rt_tables	VNET(rt_tables)
11682cea7e6SBjoern A. Zeeb 
11782cea7e6SBjoern A. Zeeb VNET_DEFINE(int, rttrash);		/* routes not in table but not freed */
11882cea7e6SBjoern A. Zeeb #define	V_rttrash	VNET(rttrash)
11982cea7e6SBjoern A. Zeeb 
120bfe1aba4SMarko Zec 
121d6941ce9SLuigi Rizzo /*
122d6941ce9SLuigi Rizzo  * Convert a 'struct radix_node *' to a 'struct rtentry *'.
123d6941ce9SLuigi Rizzo  * The operation can be done safely (in this code) because a
124d6941ce9SLuigi Rizzo  * 'struct rtentry' starts with two 'struct radix_node''s, the first
125d6941ce9SLuigi Rizzo  * one representing leaf nodes in the routing tree, which is
126d6941ce9SLuigi Rizzo  * what the code in radix.c passes us as a 'struct radix_node'.
127d6941ce9SLuigi Rizzo  *
128d6941ce9SLuigi Rizzo  * But because there are a lot of assumptions in this conversion,
129d6941ce9SLuigi Rizzo  * do not cast explicitly, but always use the macro below.
130d6941ce9SLuigi Rizzo  */
131d6941ce9SLuigi Rizzo #define RNTORT(p)	((struct rtentry *)(p))
132d6941ce9SLuigi Rizzo 
1335f901c92SAndrew Turner VNET_DEFINE_STATIC(uma_zone_t, rtzone);		/* Routing table UMA zone. */
13482cea7e6SBjoern A. Zeeb #define	V_rtzone	VNET(rtzone)
13582cea7e6SBjoern A. Zeeb 
136d6e23cf0SMichael Tuexen EVENTHANDLER_LIST_DEFINE(rt_addrmsg);
137d6e23cf0SMichael Tuexen 
13861eee0e2SAlexander V. Chernikov static int rtrequest1_fib_change(struct rib_head *, struct rt_addrinfo *,
139c77462ddSAlexander V. Chernikov     struct rtentry **, u_int);
1400fb9298dSAlexander V. Chernikov static void rt_setmetrics(const struct rt_addrinfo *, struct rtentry *);
141e8b0643eSAlexander V. Chernikov static int rt_ifdelroute(const struct rtentry *rt, void *arg);
14261eee0e2SAlexander V. Chernikov static struct rtentry *rt_unlinkrte(struct rib_head *rnh,
143e8b0643eSAlexander V. Chernikov     struct rt_addrinfo *info, int *perror);
144e8b0643eSAlexander V. Chernikov static void rt_notifydelete(struct rtentry *rt, struct rt_addrinfo *info);
145e8b0643eSAlexander V. Chernikov #ifdef RADIX_MPATH
14661eee0e2SAlexander V. Chernikov static struct radix_node *rt_mpath_unlink(struct rib_head *rnh,
147e8b0643eSAlexander V. Chernikov     struct rt_addrinfo *info, struct rtentry *rto, int *perror);
148e8b0643eSAlexander V. Chernikov #endif
1499a1b64d5SAlexander V. Chernikov static int rt_exportinfo(struct rtentry *rt, struct rt_addrinfo *info,
1509a1b64d5SAlexander V. Chernikov     int flags);
151c77462ddSAlexander V. Chernikov 
1527f948f12SAlexander V. Chernikov struct if_mtuinfo
1537f948f12SAlexander V. Chernikov {
1547f948f12SAlexander V. Chernikov 	struct ifnet	*ifp;
1557f948f12SAlexander V. Chernikov 	int		mtu;
1567f948f12SAlexander V. Chernikov };
1577f948f12SAlexander V. Chernikov 
1587f948f12SAlexander V. Chernikov static int	if_updatemtu_cb(struct radix_node *, void *);
1597f948f12SAlexander V. Chernikov 
1608b07e49aSJulian Elischer /*
1618b07e49aSJulian Elischer  * handler for net.my_fibnum
1628b07e49aSJulian Elischer  */
1638b07e49aSJulian Elischer static int
1648b07e49aSJulian Elischer sysctl_my_fibnum(SYSCTL_HANDLER_ARGS)
165df8bae1dSRodney W. Grimes {
1668b07e49aSJulian Elischer         int fibnum;
1678b07e49aSJulian Elischer         int error;
1688b07e49aSJulian Elischer 
1698b07e49aSJulian Elischer         fibnum = curthread->td_proc->p_fibnum;
1708b07e49aSJulian Elischer         error = sysctl_handle_int(oidp, &fibnum, 0, req);
1718b07e49aSJulian Elischer         return (error);
172df8bae1dSRodney W. Grimes }
173df8bae1dSRodney W. Grimes 
1748b07e49aSJulian Elischer SYSCTL_PROC(_net, OID_AUTO, my_fibnum, CTLTYPE_INT|CTLFLAG_RD,
1758b07e49aSJulian Elischer             NULL, 0, &sysctl_my_fibnum, "I", "default FIB of caller");
1762dc1d581SAndre Oppermann 
17761eee0e2SAlexander V. Chernikov static __inline struct rib_head **
178c2c2a7c1SBjoern A. Zeeb rt_tables_get_rnh_ptr(int table, int fam)
179c2c2a7c1SBjoern A. Zeeb {
18061eee0e2SAlexander V. Chernikov 	struct rib_head **rnh;
181c2c2a7c1SBjoern A. Zeeb 
182c2c2a7c1SBjoern A. Zeeb 	KASSERT(table >= 0 && table < rt_numfibs, ("%s: table out of bounds.",
183c2c2a7c1SBjoern A. Zeeb 	    __func__));
184c2c2a7c1SBjoern A. Zeeb 	KASSERT(fam >= 0 && fam < (AF_MAX+1), ("%s: fam out of bounds.",
185c2c2a7c1SBjoern A. Zeeb 	    __func__));
186c2c2a7c1SBjoern A. Zeeb 
187c2c2a7c1SBjoern A. Zeeb 	/* rnh is [fib=0][af=0]. */
18861eee0e2SAlexander V. Chernikov 	rnh = (struct rib_head **)V_rt_tables;
189c2c2a7c1SBjoern A. Zeeb 	/* Get the offset to the requested table and fam. */
190c2c2a7c1SBjoern A. Zeeb 	rnh += table * (AF_MAX+1) + fam;
191c2c2a7c1SBjoern A. Zeeb 
192c2c2a7c1SBjoern A. Zeeb 	return (rnh);
193c2c2a7c1SBjoern A. Zeeb }
194c2c2a7c1SBjoern A. Zeeb 
19561eee0e2SAlexander V. Chernikov struct rib_head *
196c2c2a7c1SBjoern A. Zeeb rt_tables_get_rnh(int table, int fam)
197c2c2a7c1SBjoern A. Zeeb {
198c2c2a7c1SBjoern A. Zeeb 
199c2c2a7c1SBjoern A. Zeeb 	return (*rt_tables_get_rnh_ptr(table, fam));
200c2c2a7c1SBjoern A. Zeeb }
201c2c2a7c1SBjoern A. Zeeb 
2024f321dbdSBjoern A. Zeeb u_int
20384cc0778SGeorge V. Neville-Neil rt_tables_get_gen(int table, int fam)
20484cc0778SGeorge V. Neville-Neil {
20584cc0778SGeorge V. Neville-Neil 	struct rib_head *rnh;
20684cc0778SGeorge V. Neville-Neil 
20784cc0778SGeorge V. Neville-Neil 	rnh = *rt_tables_get_rnh_ptr(table, fam);
2086d768226SGeorge V. Neville-Neil 	KASSERT(rnh != NULL, ("%s: NULL rib_head pointer table %d fam %d",
2096d768226SGeorge V. Neville-Neil 	    __func__, table, fam));
21084cc0778SGeorge V. Neville-Neil 	return (rnh->rnh_gen);
21184cc0778SGeorge V. Neville-Neil }
21284cc0778SGeorge V. Neville-Neil 
21384cc0778SGeorge V. Neville-Neil 
214d0728d71SRobert Watson /*
215d0728d71SRobert Watson  * route initialization must occur before ip6_init2(), which happenas at
216d0728d71SRobert Watson  * SI_ORDER_MIDDLE.
217d0728d71SRobert Watson  */
2182eb5613fSLuigi Rizzo static void
2192eb5613fSLuigi Rizzo route_init(void)
220df8bae1dSRodney W. Grimes {
2218b07e49aSJulian Elischer 
2226f95a5ebSJulian Elischer 	/* whack the tunable ints into  line. */
2238b07e49aSJulian Elischer 	if (rt_numfibs > RT_MAXFIBS)
2248b07e49aSJulian Elischer 		rt_numfibs = RT_MAXFIBS;
2258b07e49aSJulian Elischer 	if (rt_numfibs == 0)
2268b07e49aSJulian Elischer 		rt_numfibs = 1;
2271ed81b73SMarko Zec }
228891cf3edSEd Maste SYSINIT(route_init, SI_SUB_PROTO_DOMAIN, SI_ORDER_THIRD, route_init, NULL);
2291ed81b73SMarko Zec 
230e3a7aa6fSGleb Smirnoff static int
231e3a7aa6fSGleb Smirnoff rtentry_zinit(void *mem, int size, int how)
232e3a7aa6fSGleb Smirnoff {
233e3a7aa6fSGleb Smirnoff 	struct rtentry *rt = mem;
234e3a7aa6fSGleb Smirnoff 
235b8af2820SMateusz Guzik 	rt->rt_pksent = counter_u64_alloc(how);
236e3a7aa6fSGleb Smirnoff 	if (rt->rt_pksent == NULL)
237e3a7aa6fSGleb Smirnoff 		return (ENOMEM);
238e3a7aa6fSGleb Smirnoff 
239e3a7aa6fSGleb Smirnoff 	RT_LOCK_INIT(rt);
240e3a7aa6fSGleb Smirnoff 
241e3a7aa6fSGleb Smirnoff 	return (0);
242e3a7aa6fSGleb Smirnoff }
243e3a7aa6fSGleb Smirnoff 
244e3a7aa6fSGleb Smirnoff static void
245e3a7aa6fSGleb Smirnoff rtentry_zfini(void *mem, int size)
246e3a7aa6fSGleb Smirnoff {
247e3a7aa6fSGleb Smirnoff 	struct rtentry *rt = mem;
248e3a7aa6fSGleb Smirnoff 
249e3a7aa6fSGleb Smirnoff 	RT_LOCK_DESTROY(rt);
250e3a7aa6fSGleb Smirnoff 	counter_u64_free(rt->rt_pksent);
251e3a7aa6fSGleb Smirnoff }
252e3a7aa6fSGleb Smirnoff 
253e3a7aa6fSGleb Smirnoff static int
254e3a7aa6fSGleb Smirnoff rtentry_ctor(void *mem, int size, void *arg, int how)
255e3a7aa6fSGleb Smirnoff {
256e3a7aa6fSGleb Smirnoff 	struct rtentry *rt = mem;
257e3a7aa6fSGleb Smirnoff 
258e3a7aa6fSGleb Smirnoff 	bzero(rt, offsetof(struct rtentry, rt_endzero));
259e3a7aa6fSGleb Smirnoff 	counter_u64_zero(rt->rt_pksent);
260e8b0643eSAlexander V. Chernikov 	rt->rt_chain = NULL;
261e3a7aa6fSGleb Smirnoff 
262e3a7aa6fSGleb Smirnoff 	return (0);
263e3a7aa6fSGleb Smirnoff }
264e3a7aa6fSGleb Smirnoff 
265d0728d71SRobert Watson static void
266256ea2abSGleb Smirnoff rtentry_dtor(void *mem, int size, void *arg)
267256ea2abSGleb Smirnoff {
268256ea2abSGleb Smirnoff 	struct rtentry *rt = mem;
269256ea2abSGleb Smirnoff 
270256ea2abSGleb Smirnoff 	RT_UNLOCK_COND(rt);
271256ea2abSGleb Smirnoff }
272256ea2abSGleb Smirnoff 
273256ea2abSGleb Smirnoff static void
274d0728d71SRobert Watson vnet_route_init(const void *unused __unused)
2751ed81b73SMarko Zec {
2761ed81b73SMarko Zec 	struct domain *dom;
27761eee0e2SAlexander V. Chernikov 	struct rib_head **rnh;
278c2c2a7c1SBjoern A. Zeeb 	int table;
2791ed81b73SMarko Zec 	int fam;
2801ed81b73SMarko Zec 
281c2c2a7c1SBjoern A. Zeeb 	V_rt_tables = malloc(rt_numfibs * (AF_MAX+1) *
28261eee0e2SAlexander V. Chernikov 	    sizeof(struct rib_head *), M_RTABLE, M_WAITOK|M_ZERO);
283c2c2a7c1SBjoern A. Zeeb 
284e3a7aa6fSGleb Smirnoff 	V_rtzone = uma_zcreate("rtentry", sizeof(struct rtentry),
285256ea2abSGleb Smirnoff 	    rtentry_ctor, rtentry_dtor,
286e3a7aa6fSGleb Smirnoff 	    rtentry_zinit, rtentry_zfini, UMA_ALIGN_PTR, 0);
2878b07e49aSJulian Elischer 	for (dom = domains; dom; dom = dom->dom_next) {
288b680a383SBjoern A. Zeeb 		if (dom->dom_rtattach == NULL)
289b680a383SBjoern A. Zeeb 			continue;
290b680a383SBjoern A. Zeeb 
2918b07e49aSJulian Elischer 		for  (table = 0; table < rt_numfibs; table++) {
292b680a383SBjoern A. Zeeb 			fam = dom->dom_family;
293b680a383SBjoern A. Zeeb 			if (table != 0 && fam != AF_INET6 && fam != AF_INET)
294b680a383SBjoern A. Zeeb 				break;
295b680a383SBjoern A. Zeeb 
296c2c2a7c1SBjoern A. Zeeb 			rnh = rt_tables_get_rnh_ptr(table, fam);
297c2c2a7c1SBjoern A. Zeeb 			if (rnh == NULL)
298c2c2a7c1SBjoern A. Zeeb 				panic("%s: rnh NULL", __func__);
299146a181fSAlexander V. Chernikov 			dom->dom_rtattach((void **)rnh, 0);
3008b07e49aSJulian Elischer 		}
3018b07e49aSJulian Elischer 	}
3028b07e49aSJulian Elischer }
303d0728d71SRobert Watson VNET_SYSINIT(vnet_route_init, SI_SUB_PROTO_DOMAIN, SI_ORDER_FOURTH,
304d0728d71SRobert Watson     vnet_route_init, 0);
3058b07e49aSJulian Elischer 
306bc29160dSMarko Zec #ifdef VIMAGE
307d0728d71SRobert Watson static void
308d0728d71SRobert Watson vnet_route_uninit(const void *unused __unused)
309bc29160dSMarko Zec {
310bc29160dSMarko Zec 	int table;
311bc29160dSMarko Zec 	int fam;
312bc29160dSMarko Zec 	struct domain *dom;
31361eee0e2SAlexander V. Chernikov 	struct rib_head **rnh;
314bc29160dSMarko Zec 
315bc29160dSMarko Zec 	for (dom = domains; dom; dom = dom->dom_next) {
316b680a383SBjoern A. Zeeb 		if (dom->dom_rtdetach == NULL)
317b680a383SBjoern A. Zeeb 			continue;
318b680a383SBjoern A. Zeeb 
319bc29160dSMarko Zec 		for (table = 0; table < rt_numfibs; table++) {
320b680a383SBjoern A. Zeeb 			fam = dom->dom_family;
321b680a383SBjoern A. Zeeb 
322b680a383SBjoern A. Zeeb 			if (table != 0 && fam != AF_INET6 && fam != AF_INET)
323b680a383SBjoern A. Zeeb 				break;
324b680a383SBjoern A. Zeeb 
325bc29160dSMarko Zec 			rnh = rt_tables_get_rnh_ptr(table, fam);
326bc29160dSMarko Zec 			if (rnh == NULL)
327bc29160dSMarko Zec 				panic("%s: rnh NULL", __func__);
32857c3556bSAlexander V. Chernikov 			dom->dom_rtdetach((void **)rnh, 0);
329bc29160dSMarko Zec 		}
330bc29160dSMarko Zec 	}
3316274ce3eSCraig Rodrigues 
3326274ce3eSCraig Rodrigues 	free(V_rt_tables, M_RTABLE);
3336274ce3eSCraig Rodrigues 	uma_zdestroy(V_rtzone);
334bc29160dSMarko Zec }
33589856f7eSBjoern A. Zeeb VNET_SYSUNINIT(vnet_route_uninit, SI_SUB_PROTO_DOMAIN, SI_ORDER_FIRST,
336d0728d71SRobert Watson     vnet_route_uninit, 0);
337bc29160dSMarko Zec #endif
338bc29160dSMarko Zec 
33961eee0e2SAlexander V. Chernikov struct rib_head *
34061eee0e2SAlexander V. Chernikov rt_table_init(int offset)
34161eee0e2SAlexander V. Chernikov {
34261eee0e2SAlexander V. Chernikov 	struct rib_head *rh;
34361eee0e2SAlexander V. Chernikov 
34461eee0e2SAlexander V. Chernikov 	rh = malloc(sizeof(struct rib_head), M_RTABLE, M_WAITOK | M_ZERO);
34561eee0e2SAlexander V. Chernikov 
34661eee0e2SAlexander V. Chernikov 	/* TODO: These details should be hidded inside radix.c */
34761eee0e2SAlexander V. Chernikov 	/* Init masks tree */
34861eee0e2SAlexander V. Chernikov 	rn_inithead_internal(&rh->head, rh->rnh_nodes, offset);
34961eee0e2SAlexander V. Chernikov 	rn_inithead_internal(&rh->rmhead.head, rh->rmhead.mask_nodes, 0);
35061eee0e2SAlexander V. Chernikov 	rh->head.rnh_masks = &rh->rmhead;
35161eee0e2SAlexander V. Chernikov 
35261eee0e2SAlexander V. Chernikov 	/* Init locks */
353abe95d87SAndrey V. Elsukov 	RIB_LOCK_INIT(rh);
35461eee0e2SAlexander V. Chernikov 
35561eee0e2SAlexander V. Chernikov 	/* Finally, set base callbacks */
35661eee0e2SAlexander V. Chernikov 	rh->rnh_addaddr = rn_addroute;
35761eee0e2SAlexander V. Chernikov 	rh->rnh_deladdr = rn_delete;
35861eee0e2SAlexander V. Chernikov 	rh->rnh_matchaddr = rn_match;
35961eee0e2SAlexander V. Chernikov 	rh->rnh_lookup = rn_lookup;
36061eee0e2SAlexander V. Chernikov 	rh->rnh_walktree = rn_walktree;
36161eee0e2SAlexander V. Chernikov 	rh->rnh_walktree_from = rn_walktree_from;
36261eee0e2SAlexander V. Chernikov 
36361eee0e2SAlexander V. Chernikov 	return (rh);
36461eee0e2SAlexander V. Chernikov }
36561eee0e2SAlexander V. Chernikov 
366a5243af2SBjoern A. Zeeb static int
367a5243af2SBjoern A. Zeeb rt_freeentry(struct radix_node *rn, void *arg)
368a5243af2SBjoern A. Zeeb {
369a5243af2SBjoern A. Zeeb 	struct radix_head * const rnh = arg;
370a5243af2SBjoern A. Zeeb 	struct radix_node *x;
371a5243af2SBjoern A. Zeeb 
372a5243af2SBjoern A. Zeeb 	x = (struct radix_node *)rn_delete(rn + 2, NULL, rnh);
373a5243af2SBjoern A. Zeeb 	if (x != NULL)
374a5243af2SBjoern A. Zeeb 		R_Free(x);
375a5243af2SBjoern A. Zeeb 	return (0);
376a5243af2SBjoern A. Zeeb }
377a5243af2SBjoern A. Zeeb 
37861eee0e2SAlexander V. Chernikov void
37961eee0e2SAlexander V. Chernikov rt_table_destroy(struct rib_head *rh)
38061eee0e2SAlexander V. Chernikov {
38161eee0e2SAlexander V. Chernikov 
382a5243af2SBjoern A. Zeeb 	rn_walktree(&rh->rmhead.head, rt_freeentry, &rh->rmhead.head);
383a5243af2SBjoern A. Zeeb 
38461eee0e2SAlexander V. Chernikov 	/* Assume table is already empty */
385abe95d87SAndrey V. Elsukov 	RIB_LOCK_DESTROY(rh);
38661eee0e2SAlexander V. Chernikov 	free(rh, M_RTABLE);
38761eee0e2SAlexander V. Chernikov }
38861eee0e2SAlexander V. Chernikov 
38961eee0e2SAlexander V. Chernikov 
3908b07e49aSJulian Elischer #ifndef _SYS_SYSPROTO_H_
3918b07e49aSJulian Elischer struct setfib_args {
3928b07e49aSJulian Elischer 	int     fibnum;
3938b07e49aSJulian Elischer };
3948b07e49aSJulian Elischer #endif
3958b07e49aSJulian Elischer int
3968451d0ddSKip Macy sys_setfib(struct thread *td, struct setfib_args *uap)
3978b07e49aSJulian Elischer {
3988b07e49aSJulian Elischer 	if (uap->fibnum < 0 || uap->fibnum >= rt_numfibs)
3998b07e49aSJulian Elischer 		return EINVAL;
4008b07e49aSJulian Elischer 	td->td_proc->p_fibnum = uap->fibnum;
4018b07e49aSJulian Elischer 	return (0);
402df8bae1dSRodney W. Grimes }
403df8bae1dSRodney W. Grimes 
404df8bae1dSRodney W. Grimes /*
405df8bae1dSRodney W. Grimes  * Packet routing routines.
406df8bae1dSRodney W. Grimes  */
407df8bae1dSRodney W. Grimes void
4088b07e49aSJulian Elischer rtalloc_ign_fib(struct route *ro, u_long ignore, u_int fibnum)
4098b07e49aSJulian Elischer {
4108b07e49aSJulian Elischer 	struct rtentry *rt;
4118b07e49aSJulian Elischer 
4128b07e49aSJulian Elischer 	if ((rt = ro->ro_rt) != NULL) {
4138b07e49aSJulian Elischer 		if (rt->rt_ifp != NULL && rt->rt_flags & RTF_UP)
4148b07e49aSJulian Elischer 			return;
4158b07e49aSJulian Elischer 		RTFREE(rt);
4168b07e49aSJulian Elischer 		ro->ro_rt = NULL;
4178b07e49aSJulian Elischer 	}
4188b07e49aSJulian Elischer 	ro->ro_rt = rtalloc1_fib(&ro->ro_dst, 1, ignore, fibnum);
419d1dd20beSSam Leffler 	if (ro->ro_rt)
420d1dd20beSSam Leffler 		RT_UNLOCK(ro->ro_rt);
421652082e6SGarrett Wollman }
422652082e6SGarrett Wollman 
423b0a76b88SJulian Elischer /*
424b0a76b88SJulian Elischer  * Look up the route that matches the address given
425b0a76b88SJulian Elischer  * Or, at least try.. Create a cloned route if needed.
426d1dd20beSSam Leffler  *
427d1dd20beSSam Leffler  * The returned route, if any, is locked.
428b0a76b88SJulian Elischer  */
429df8bae1dSRodney W. Grimes struct rtentry *
430d1dd20beSSam Leffler rtalloc1(struct sockaddr *dst, int report, u_long ignflags)
431df8bae1dSRodney W. Grimes {
432a8498625SBjoern A. Zeeb 
433a8498625SBjoern A. Zeeb 	return (rtalloc1_fib(dst, report, ignflags, RT_DEFAULT_FIB));
4348b07e49aSJulian Elischer }
4358b07e49aSJulian Elischer 
4368b07e49aSJulian Elischer struct rtentry *
4378b07e49aSJulian Elischer rtalloc1_fib(struct sockaddr *dst, int report, u_long ignflags,
4388b07e49aSJulian Elischer 		    u_int fibnum)
4398b07e49aSJulian Elischer {
44020efcfc6SAndrey V. Elsukov 	RIB_RLOCK_TRACKER;
44161eee0e2SAlexander V. Chernikov 	struct rib_head *rh;
442d1dd20beSSam Leffler 	struct radix_node *rn;
443d1dd20beSSam Leffler 	struct rtentry *newrt;
444df8bae1dSRodney W. Grimes 	struct rt_addrinfo info;
4456e6b3f7cSQing Li 	int err = 0, msgtype = RTM_MISS;
446df8bae1dSRodney W. Grimes 
4478b07e49aSJulian Elischer 	KASSERT((fibnum < rt_numfibs), ("rtalloc1_fib: bad fibnum"));
44861eee0e2SAlexander V. Chernikov 	rh = rt_tables_get_rnh(fibnum, dst->sa_family);
449e579f1c1SDmitry Chagin 	newrt = NULL;
45061eee0e2SAlexander V. Chernikov 	if (rh == NULL)
451523e6002SDmitry Chagin 		goto miss;
452523e6002SDmitry Chagin 
453b0a76b88SJulian Elischer 	/*
454b0a76b88SJulian Elischer 	 * Look up the address in the table for that Address Family
455b0a76b88SJulian Elischer 	 */
456b83aa367SAndrey V. Elsukov 	if ((ignflags & RTF_RNH_LOCKED) == 0)
45761eee0e2SAlexander V. Chernikov 		RIB_RLOCK(rh);
458b83aa367SAndrey V. Elsukov #ifdef INVARIANTS
459b83aa367SAndrey V. Elsukov 	else
460b83aa367SAndrey V. Elsukov 		RIB_LOCK_ASSERT(rh);
461b83aa367SAndrey V. Elsukov #endif
46261eee0e2SAlexander V. Chernikov 	rn = rh->rnh_matchaddr(dst, &rh->head);
4633120b9d4SKip Macy 	if (rn && ((rn->rn_flags & RNF_ROOT) == 0)) {
4646a873ef7SDmitry Chagin 		newrt = RNTORT(rn);
4653120b9d4SKip Macy 		RT_LOCK(newrt);
4663120b9d4SKip Macy 		RT_ADDREF(newrt);
467b83aa367SAndrey V. Elsukov 		if ((ignflags & RTF_RNH_LOCKED) == 0)
46861eee0e2SAlexander V. Chernikov 			RIB_RUNLOCK(rh);
4690eb64f4eSAlexander V. Chernikov 		return (newrt);
4706e6b3f7cSQing Li 
471b83aa367SAndrey V. Elsukov 	} else if ((ignflags & RTF_RNH_LOCKED) == 0)
47261eee0e2SAlexander V. Chernikov 		RIB_RUNLOCK(rh);
473b0a76b88SJulian Elischer 	/*
4748f1c8adeSLuiz Otavio O Souza 	 * Either we hit the root or could not find any match,
4758f1c8adeSLuiz Otavio O Souza 	 * which basically means: "cannot get there from here".
476b0a76b88SJulian Elischer 	 */
477956b0b65SJeffrey Hsu miss:
478523e6002SDmitry Chagin 	V_rtstat.rts_unreach++;
479523e6002SDmitry Chagin 
4806e6b3f7cSQing Li 	if (report) {
481b0a76b88SJulian Elischer 		/*
482b0a76b88SJulian Elischer 		 * If required, report the failure to the supervising
483b0a76b88SJulian Elischer 		 * Authorities.
484b0a76b88SJulian Elischer 		 * For a delete, this is not an error. (report == 0)
485b0a76b88SJulian Elischer 		 */
4866f5967c0SBruce Evans 		bzero(&info, sizeof(info));
487df8bae1dSRodney W. Grimes 		info.rti_info[RTAX_DST] = dst;
488528737fdSBjoern A. Zeeb 		rt_missmsg_fib(msgtype, &info, 0, err, fibnum);
489df8bae1dSRodney W. Grimes 	}
490df8bae1dSRodney W. Grimes 	return (newrt);
491df8bae1dSRodney W. Grimes }
492df8bae1dSRodney W. Grimes 
493499676dfSJulian Elischer /*
494499676dfSJulian Elischer  * Remove a reference count from an rtentry.
495499676dfSJulian Elischer  * If the count gets low enough, take it out of the routing table
496499676dfSJulian Elischer  */
497df8bae1dSRodney W. Grimes void
498d1dd20beSSam Leffler rtfree(struct rtentry *rt)
499df8bae1dSRodney W. Grimes {
50061eee0e2SAlexander V. Chernikov 	struct rib_head *rnh;
501df8bae1dSRodney W. Grimes 
502a0c0e34bSGleb Smirnoff 	KASSERT(rt != NULL,("%s: NULL rt", __func__));
503c2c2a7c1SBjoern A. Zeeb 	rnh = rt_tables_get_rnh(rt->rt_fibnum, rt_key(rt)->sa_family);
504a0c0e34bSGleb Smirnoff 	KASSERT(rnh != NULL,("%s: NULL rnh", __func__));
505499676dfSJulian Elischer 
506d1dd20beSSam Leffler 	RT_LOCK_ASSERT(rt);
507d1dd20beSSam Leffler 
508499676dfSJulian Elischer 	/*
509a0c0e34bSGleb Smirnoff 	 * The callers should use RTFREE_LOCKED() or RTFREE(), so
510a0c0e34bSGleb Smirnoff 	 * we should come here exactly with the last reference.
511499676dfSJulian Elischer 	 */
5127138d65cSSam Leffler 	RT_REMREF(rt);
513a0c0e34bSGleb Smirnoff 	if (rt->rt_refcnt > 0) {
514a42ea597SQing Li 		log(LOG_DEBUG, "%s: %p has %d refs\n", __func__, rt, rt->rt_refcnt);
515d1dd20beSSam Leffler 		goto done;
516a0c0e34bSGleb Smirnoff 	}
5179c63e9dbSSam Leffler 
5189c63e9dbSSam Leffler 	/*
5199c63e9dbSSam Leffler 	 * On last reference give the "close method" a chance
5209c63e9dbSSam Leffler 	 * to cleanup private state.  This also permits (for
5219c63e9dbSSam Leffler 	 * IPv4 and IPv6) a chance to decide if the routing table
5229c63e9dbSSam Leffler 	 * entry should be purged immediately or at a later time.
5239c63e9dbSSam Leffler 	 * When an immediate purge is to happen the close routine
5249c63e9dbSSam Leffler 	 * typically calls rtexpunge which clears the RTF_UP flag
5259c63e9dbSSam Leffler 	 * on the entry so that the code below reclaims the storage.
5269c63e9dbSSam Leffler 	 */
527d1dd20beSSam Leffler 	if (rt->rt_refcnt == 0 && rnh->rnh_close)
52861eee0e2SAlexander V. Chernikov 		rnh->rnh_close((struct radix_node *)rt, &rnh->head);
529499676dfSJulian Elischer 
530499676dfSJulian Elischer 	/*
531499676dfSJulian Elischer 	 * If we are no longer "up" (and ref == 0)
532499676dfSJulian Elischer 	 * then we can free the resources associated
533499676dfSJulian Elischer 	 * with the route.
534499676dfSJulian Elischer 	 */
535d1dd20beSSam Leffler 	if ((rt->rt_flags & RTF_UP) == 0) {
536df8bae1dSRodney W. Grimes 		if (rt->rt_nodes->rn_flags & (RNF_ACTIVE | RNF_ROOT))
537df8bae1dSRodney W. Grimes 			panic("rtfree 2");
538499676dfSJulian Elischer 		/*
539499676dfSJulian Elischer 		 * the rtentry must have been removed from the routing table
540499676dfSJulian Elischer 		 * so it is represented in rttrash.. remove that now.
541499676dfSJulian Elischer 		 */
542603724d3SBjoern A. Zeeb 		V_rttrash--;
543499676dfSJulian Elischer #ifdef	DIAGNOSTIC
544df8bae1dSRodney W. Grimes 		if (rt->rt_refcnt < 0) {
545623ae52eSPoul-Henning Kamp 			printf("rtfree: %p not freed (neg refs)\n", rt);
546d1dd20beSSam Leffler 			goto done;
547df8bae1dSRodney W. Grimes 		}
548499676dfSJulian Elischer #endif
549499676dfSJulian Elischer 		/*
550499676dfSJulian Elischer 		 * release references on items we hold them on..
551499676dfSJulian Elischer 		 * e.g other routes and ifaddrs.
552499676dfSJulian Elischer 		 */
55319fc74fbSJeffrey Hsu 		if (rt->rt_ifa)
5541099f828SRobert Watson 			ifa_free(rt->rt_ifa);
555499676dfSJulian Elischer 		/*
556499676dfSJulian Elischer 		 * The key is separatly alloc'd so free it (see rt_setgate()).
557499676dfSJulian Elischer 		 * This also frees the gateway, as they are always malloc'd
558499676dfSJulian Elischer 		 * together.
559499676dfSJulian Elischer 		 */
5608b15f615SLuiz Otavio O Souza 		R_Free(rt_key(rt));
561499676dfSJulian Elischer 
562499676dfSJulian Elischer 		/*
563499676dfSJulian Elischer 		 * and the rtentry itself of course
564499676dfSJulian Elischer 		 */
5651ed81b73SMarko Zec 		uma_zfree(V_rtzone, rt);
566d1dd20beSSam Leffler 		return;
567df8bae1dSRodney W. Grimes 	}
568d1dd20beSSam Leffler done:
569d1dd20beSSam Leffler 	RT_UNLOCK(rt);
570df8bae1dSRodney W. Grimes }
571df8bae1dSRodney W. Grimes 
572df8bae1dSRodney W. Grimes 
573df8bae1dSRodney W. Grimes /*
574df8bae1dSRodney W. Grimes  * Force a routing table entry to the specified
575df8bae1dSRodney W. Grimes  * destination to go through the given gateway.
576df8bae1dSRodney W. Grimes  * Normally called as a result of a routing redirect
577df8bae1dSRodney W. Grimes  * message from the network layer.
578df8bae1dSRodney W. Grimes  */
57926f9a767SRodney W. Grimes void
5808b07e49aSJulian Elischer rtredirect_fib(struct sockaddr *dst,
5818b07e49aSJulian Elischer 	struct sockaddr *gateway,
5828b07e49aSJulian Elischer 	struct sockaddr *netmask,
5838b07e49aSJulian Elischer 	int flags,
5848b07e49aSJulian Elischer 	struct sockaddr *src,
5858b07e49aSJulian Elischer 	u_int fibnum)
5868b07e49aSJulian Elischer {
587f2b2e77aSAlexander V. Chernikov 	struct rtentry *rt;
588df8bae1dSRodney W. Grimes 	int error = 0;
58985911824SLuigi Rizzo 	short *stat = NULL;
590df8bae1dSRodney W. Grimes 	struct rt_addrinfo info;
591df8bae1dSRodney W. Grimes 	struct ifaddr *ifa;
59261eee0e2SAlexander V. Chernikov 	struct rib_head *rnh;
593c2c2a7c1SBjoern A. Zeeb 
594b8a6e03fSGleb Smirnoff 	NET_EPOCH_ASSERT();
595b8a6e03fSGleb Smirnoff 
5968c0fec80SRobert Watson 	ifa = NULL;
597c2c2a7c1SBjoern A. Zeeb 	rnh = rt_tables_get_rnh(fibnum, dst->sa_family);
598c2c2a7c1SBjoern A. Zeeb 	if (rnh == NULL) {
599c2c2a7c1SBjoern A. Zeeb 		error = EAFNOSUPPORT;
600c2c2a7c1SBjoern A. Zeeb 		goto out;
601c2c2a7c1SBjoern A. Zeeb 	}
602df8bae1dSRodney W. Grimes 	/* verify the gateway is directly reachable */
6034f8585e0SAlan Somers 	if ((ifa = ifa_ifwithnet(gateway, 0, fibnum)) == NULL) {
604df8bae1dSRodney W. Grimes 		error = ENETUNREACH;
605df8bae1dSRodney W. Grimes 		goto out;
606df8bae1dSRodney W. Grimes 	}
6078b07e49aSJulian Elischer 	rt = rtalloc1_fib(dst, 0, 0UL, fibnum);	/* NB: rt is locked */
608df8bae1dSRodney W. Grimes 	/*
609df8bae1dSRodney W. Grimes 	 * If the redirect isn't from our current router for this dst,
610df8bae1dSRodney W. Grimes 	 * it's either old or wrong.  If it redirects us to ourselves,
611df8bae1dSRodney W. Grimes 	 * we have a routing loop, perhaps as a result of an interface
612df8bae1dSRodney W. Grimes 	 * going down recently.
613df8bae1dSRodney W. Grimes 	 */
61417a03656SEric van Gyzen 	if (!(flags & RTF_DONE) && rt) {
61517a03656SEric van Gyzen 		if (!sa_equal(src, rt->rt_gateway)) {
616df8bae1dSRodney W. Grimes 			error = EINVAL;
617df8bae1dSRodney W. Grimes 			goto done;
61817a03656SEric van Gyzen 		}
61917a03656SEric van Gyzen 		if (rt->rt_ifa != ifa && ifa->ifa_addr->sa_family != AF_LINK) {
62017a03656SEric van Gyzen 			error = EINVAL;
62117a03656SEric van Gyzen 			goto done;
62217a03656SEric van Gyzen 		}
62317a03656SEric van Gyzen 	}
62417a03656SEric van Gyzen 	if ((flags & RTF_GATEWAY) && ifa_ifwithaddr_check(gateway)) {
62517a03656SEric van Gyzen 		error = EHOSTUNREACH;
62617a03656SEric van Gyzen 		goto done;
62717a03656SEric van Gyzen 	}
628df8bae1dSRodney W. Grimes 	/*
629df8bae1dSRodney W. Grimes 	 * Create a new entry if we just got back a wildcard entry
6306bccea7cSRebecca Cran 	 * or the lookup failed.  This is necessary for hosts
631df8bae1dSRodney W. Grimes 	 * which use routing redirects generated by smart gateways
632df8bae1dSRodney W. Grimes 	 * to dynamically build the routing tables.
633df8bae1dSRodney W. Grimes 	 */
63485911824SLuigi Rizzo 	if (rt == NULL || (rt_mask(rt) && rt_mask(rt)->sa_len < 2))
635df8bae1dSRodney W. Grimes 		goto create;
636df8bae1dSRodney W. Grimes 	/*
637df8bae1dSRodney W. Grimes 	 * Don't listen to the redirect if it's
638df8bae1dSRodney W. Grimes 	 * for a route to an interface.
639df8bae1dSRodney W. Grimes 	 */
640df8bae1dSRodney W. Grimes 	if (rt->rt_flags & RTF_GATEWAY) {
641df8bae1dSRodney W. Grimes 		if (((rt->rt_flags & RTF_HOST) == 0) && (flags & RTF_HOST)) {
642df8bae1dSRodney W. Grimes 			/*
643df8bae1dSRodney W. Grimes 			 * Changing from route to net => route to host.
644df8bae1dSRodney W. Grimes 			 * Create new route, rather than smashing route to net.
645df8bae1dSRodney W. Grimes 			 */
646df8bae1dSRodney W. Grimes 		create:
647fcbfdb37SAlexander V. Chernikov 			if (rt != NULL)
648fcbfdb37SAlexander V. Chernikov 				RTFREE_LOCKED(rt);
6498e7e854cSKip Macy 
65017a03656SEric van Gyzen 			flags |= RTF_DYNAMIC;
6518071913dSRuslan Ermilov 			bzero((caddr_t)&info, sizeof(info));
6528071913dSRuslan Ermilov 			info.rti_info[RTAX_DST] = dst;
6538071913dSRuslan Ermilov 			info.rti_info[RTAX_GATEWAY] = gateway;
6548071913dSRuslan Ermilov 			info.rti_info[RTAX_NETMASK] = netmask;
6551ebec5faSMatt Macy 			ifa_ref(ifa);
6568071913dSRuslan Ermilov 			info.rti_ifa = ifa;
6578071913dSRuslan Ermilov 			info.rti_flags = flags;
6588b07e49aSJulian Elischer 			error = rtrequest1_fib(RTM_ADD, &info, &rt, fibnum);
659d1dd20beSSam Leffler 			if (rt != NULL) {
6604de5d90cSSam Leffler 				RT_LOCK(rt);
6618071913dSRuslan Ermilov 				flags = rt->rt_flags;
662d1dd20beSSam Leffler 			}
6638e7e854cSKip Macy 
664603724d3SBjoern A. Zeeb 			stat = &V_rtstat.rts_dynamic;
665df8bae1dSRodney W. Grimes 		} else {
6668e7e854cSKip Macy 
667df8bae1dSRodney W. Grimes 			/*
668df8bae1dSRodney W. Grimes 			 * Smash the current notion of the gateway to
669df8bae1dSRodney W. Grimes 			 * this destination.  Should check about netmask!!!
670df8bae1dSRodney W. Grimes 			 */
67117a03656SEric van Gyzen 			if ((flags & RTF_GATEWAY) == 0)
67217a03656SEric van Gyzen 				rt->rt_flags &= ~RTF_GATEWAY;
673df8bae1dSRodney W. Grimes 			rt->rt_flags |= RTF_MODIFIED;
674df8bae1dSRodney W. Grimes 			flags |= RTF_MODIFIED;
675603724d3SBjoern A. Zeeb 			stat = &V_rtstat.rts_newgateway;
676499676dfSJulian Elischer 			/*
677499676dfSJulian Elischer 			 * add the key and gateway (in one malloc'd chunk).
678499676dfSJulian Elischer 			 */
6793120b9d4SKip Macy 			RT_UNLOCK(rt);
68061eee0e2SAlexander V. Chernikov 			RIB_WLOCK(rnh);
6813120b9d4SKip Macy 			RT_LOCK(rt);
682df8bae1dSRodney W. Grimes 			rt_setgate(rt, rt_key(rt), gateway);
68361eee0e2SAlexander V. Chernikov 			RIB_WUNLOCK(rnh);
684df8bae1dSRodney W. Grimes 		}
685df8bae1dSRodney W. Grimes 	} else
686df8bae1dSRodney W. Grimes 		error = EHOSTUNREACH;
687df8bae1dSRodney W. Grimes done:
688d1dd20beSSam Leffler 	if (rt)
6891951e633SJohn Baldwin 		RTFREE_LOCKED(rt);
690df8bae1dSRodney W. Grimes  out:
691df8bae1dSRodney W. Grimes 	if (error)
692603724d3SBjoern A. Zeeb 		V_rtstat.rts_badredirect++;
693df8bae1dSRodney W. Grimes 	else if (stat != NULL)
694df8bae1dSRodney W. Grimes 		(*stat)++;
695df8bae1dSRodney W. Grimes 	bzero((caddr_t)&info, sizeof(info));
696df8bae1dSRodney W. Grimes 	info.rti_info[RTAX_DST] = dst;
697df8bae1dSRodney W. Grimes 	info.rti_info[RTAX_GATEWAY] = gateway;
698df8bae1dSRodney W. Grimes 	info.rti_info[RTAX_NETMASK] = netmask;
699df8bae1dSRodney W. Grimes 	info.rti_info[RTAX_AUTHOR] = src;
700528737fdSBjoern A. Zeeb 	rt_missmsg_fib(RTM_REDIRECT, &info, flags, error, fibnum);
701df8bae1dSRodney W. Grimes }
702df8bae1dSRodney W. Grimes 
703df8bae1dSRodney W. Grimes /*
704df8bae1dSRodney W. Grimes  * Routing table ioctl interface.
705df8bae1dSRodney W. Grimes  */
706df8bae1dSRodney W. Grimes int
7078b07e49aSJulian Elischer rtioctl_fib(u_long req, caddr_t data, u_int fibnum)
708df8bae1dSRodney W. Grimes {
7095090559bSChristian S.J. Peron 
7105090559bSChristian S.J. Peron 	/*
7115090559bSChristian S.J. Peron 	 * If more ioctl commands are added here, make sure the proper
7125090559bSChristian S.J. Peron 	 * super-user checks are being performed because it is possible for
7135090559bSChristian S.J. Peron 	 * prison-root to make it this far if raw sockets have been enabled
7145090559bSChristian S.J. Peron 	 * in jails.
7155090559bSChristian S.J. Peron 	 */
716623ae52eSPoul-Henning Kamp #ifdef INET
717f0068c4aSGarrett Wollman 	/* Multicast goop, grrr... */
7188b07e49aSJulian Elischer 	return mrt_ioctl ? mrt_ioctl(req, data, fibnum) : EOPNOTSUPP;
719623ae52eSPoul-Henning Kamp #else /* INET */
720623ae52eSPoul-Henning Kamp 	return ENXIO;
721623ae52eSPoul-Henning Kamp #endif /* INET */
722df8bae1dSRodney W. Grimes }
723df8bae1dSRodney W. Grimes 
724df8bae1dSRodney W. Grimes struct ifaddr *
725441f9243SAlexander V. Chernikov ifa_ifwithroute(int flags, const struct sockaddr *dst, struct sockaddr *gateway,
7268b07e49aSJulian Elischer 				u_int fibnum)
7278b07e49aSJulian Elischer {
728f59c6cb0SAlexander V. Chernikov 	struct ifaddr *ifa;
729e034e82cSQing Li 	int not_found = 0;
730d1dd20beSSam Leffler 
7316573d758SMatt Macy 	MPASS(in_epoch(net_epoch_preempt));
732df8bae1dSRodney W. Grimes 	if ((flags & RTF_GATEWAY) == 0) {
733df8bae1dSRodney W. Grimes 		/*
734df8bae1dSRodney W. Grimes 		 * If we are adding a route to an interface,
735df8bae1dSRodney W. Grimes 		 * and the interface is a pt to pt link
736df8bae1dSRodney W. Grimes 		 * we should search for the destination
737df8bae1dSRodney W. Grimes 		 * as our clue to the interface.  Otherwise
738df8bae1dSRodney W. Grimes 		 * we can use the local address.
739df8bae1dSRodney W. Grimes 		 */
74085911824SLuigi Rizzo 		ifa = NULL;
74185911824SLuigi Rizzo 		if (flags & RTF_HOST)
7424f8585e0SAlan Somers 			ifa = ifa_ifwithdstaddr(dst, fibnum);
74385911824SLuigi Rizzo 		if (ifa == NULL)
744df8bae1dSRodney W. Grimes 			ifa = ifa_ifwithaddr(gateway);
745df8bae1dSRodney W. Grimes 	} else {
746df8bae1dSRodney W. Grimes 		/*
747df8bae1dSRodney W. Grimes 		 * If we are adding a route to a remote net
748df8bae1dSRodney W. Grimes 		 * or host, the gateway may still be on the
749df8bae1dSRodney W. Grimes 		 * other end of a pt to pt link.
750df8bae1dSRodney W. Grimes 		 */
7514f8585e0SAlan Somers 		ifa = ifa_ifwithdstaddr(gateway, fibnum);
752df8bae1dSRodney W. Grimes 	}
75385911824SLuigi Rizzo 	if (ifa == NULL)
7544f8585e0SAlan Somers 		ifa = ifa_ifwithnet(gateway, 0, fibnum);
75585911824SLuigi Rizzo 	if (ifa == NULL) {
756b83aa367SAndrey V. Elsukov 		struct rtentry *rt;
757b83aa367SAndrey V. Elsukov 
758b83aa367SAndrey V. Elsukov 		rt = rtalloc1_fib(gateway, 0, flags, fibnum);
75985911824SLuigi Rizzo 		if (rt == NULL)
7604f6c66ccSMatt Macy 			goto out;
761e034e82cSQing Li 		/*
762e034e82cSQing Li 		 * dismiss a gateway that is reachable only
763e034e82cSQing Li 		 * through the default router
764e034e82cSQing Li 		 */
765e034e82cSQing Li 		switch (gateway->sa_family) {
766e034e82cSQing Li 		case AF_INET:
767e034e82cSQing Li 			if (satosin(rt_key(rt))->sin_addr.s_addr == INADDR_ANY)
768e034e82cSQing Li 				not_found = 1;
769e034e82cSQing Li 			break;
770e034e82cSQing Li 		case AF_INET6:
771e034e82cSQing Li 			if (IN6_IS_ADDR_UNSPECIFIED(&satosin6(rt_key(rt))->sin6_addr))
772e034e82cSQing Li 				not_found = 1;
773e034e82cSQing Li 			break;
774e034e82cSQing Li 		default:
775e034e82cSQing Li 			break;
776e034e82cSQing Li 		}
7778c0fec80SRobert Watson 		if (!not_found && rt->rt_ifa != NULL) {
7788c0fec80SRobert Watson 			ifa = rt->rt_ifa;
7798c0fec80SRobert Watson 		}
7807138d65cSSam Leffler 		RT_REMREF(rt);
781d1dd20beSSam Leffler 		RT_UNLOCK(rt);
7828c0fec80SRobert Watson 		if (not_found || ifa == NULL)
7834f6c66ccSMatt Macy 			goto out;
784df8bae1dSRodney W. Grimes 	}
785df8bae1dSRodney W. Grimes 	if (ifa->ifa_addr->sa_family != dst->sa_family) {
786df8bae1dSRodney W. Grimes 		struct ifaddr *oifa = ifa;
787df8bae1dSRodney W. Grimes 		ifa = ifaof_ifpforaddr(dst, ifa->ifa_ifp);
78885911824SLuigi Rizzo 		if (ifa == NULL)
789df8bae1dSRodney W. Grimes 			ifa = oifa;
790df8bae1dSRodney W. Grimes 	}
7914f6c66ccSMatt Macy  out:
792df8bae1dSRodney W. Grimes 	return (ifa);
793df8bae1dSRodney W. Grimes }
794df8bae1dSRodney W. Grimes 
795b0a76b88SJulian Elischer /*
796b0a76b88SJulian Elischer  * Do appropriate manipulations of a routing tree given
797b0a76b88SJulian Elischer  * all the bits of info needed
798b0a76b88SJulian Elischer  */
799df8bae1dSRodney W. Grimes int
8008b07e49aSJulian Elischer rtrequest_fib(int req,
8018b07e49aSJulian Elischer 	struct sockaddr *dst,
8028b07e49aSJulian Elischer 	struct sockaddr *gateway,
8038b07e49aSJulian Elischer 	struct sockaddr *netmask,
8048b07e49aSJulian Elischer 	int flags,
8058b07e49aSJulian Elischer 	struct rtentry **ret_nrt,
8068b07e49aSJulian Elischer 	u_int fibnum)
8078b07e49aSJulian Elischer {
8088071913dSRuslan Ermilov 	struct rt_addrinfo info;
8098071913dSRuslan Ermilov 
810ac4a76ebSBjoern A. Zeeb 	if (dst->sa_len == 0)
811ac4a76ebSBjoern A. Zeeb 		return(EINVAL);
812ac4a76ebSBjoern A. Zeeb 
8138071913dSRuslan Ermilov 	bzero((caddr_t)&info, sizeof(info));
8148071913dSRuslan Ermilov 	info.rti_flags = flags;
8158071913dSRuslan Ermilov 	info.rti_info[RTAX_DST] = dst;
8168071913dSRuslan Ermilov 	info.rti_info[RTAX_GATEWAY] = gateway;
8178071913dSRuslan Ermilov 	info.rti_info[RTAX_NETMASK] = netmask;
8188b07e49aSJulian Elischer 	return rtrequest1_fib(req, &info, ret_nrt, fibnum);
8198071913dSRuslan Ermilov }
8208071913dSRuslan Ermilov 
8214bdf0b6aSAlexander V. Chernikov 
8222caee4beSAlexander V. Chernikov /*
8239a1b64d5SAlexander V. Chernikov  * Copy most of @rt data into @info.
8249a1b64d5SAlexander V. Chernikov  *
8259a1b64d5SAlexander V. Chernikov  * If @flags contains NHR_COPY, copies dst,netmask and gw to the
8269a1b64d5SAlexander V. Chernikov  * pointers specified by @info structure. Assume such pointers
8279a1b64d5SAlexander V. Chernikov  * are zeroed sockaddr-like structures with sa_len field initialized
8289a1b64d5SAlexander V. Chernikov  * to reflect size of the provided buffer. if no NHR_COPY is specified,
8299a1b64d5SAlexander V. Chernikov  * point dst,netmask and gw @info fields to appropriate @rt values.
8309a1b64d5SAlexander V. Chernikov  *
8319a1b64d5SAlexander V. Chernikov  * if @flags contains NHR_REF, do refcouting on rt_ifp.
8329a1b64d5SAlexander V. Chernikov  *
8339a1b64d5SAlexander V. Chernikov  * Returns 0 on success.
8349a1b64d5SAlexander V. Chernikov  */
8359a1b64d5SAlexander V. Chernikov int
8369a1b64d5SAlexander V. Chernikov rt_exportinfo(struct rtentry *rt, struct rt_addrinfo *info, int flags)
8379a1b64d5SAlexander V. Chernikov {
8389a1b64d5SAlexander V. Chernikov 	struct rt_metrics *rmx;
8399a1b64d5SAlexander V. Chernikov 	struct sockaddr *src, *dst;
8409a1b64d5SAlexander V. Chernikov 	int sa_len;
8419a1b64d5SAlexander V. Chernikov 
8429a1b64d5SAlexander V. Chernikov 	if (flags & NHR_COPY) {
8439a1b64d5SAlexander V. Chernikov 		/* Copy destination if dst is non-zero */
8449a1b64d5SAlexander V. Chernikov 		src = rt_key(rt);
8459a1b64d5SAlexander V. Chernikov 		dst = info->rti_info[RTAX_DST];
8469a1b64d5SAlexander V. Chernikov 		sa_len = src->sa_len;
84716703ea8SAlexander V. Chernikov 		if (dst != NULL) {
8489a1b64d5SAlexander V. Chernikov 			if (src->sa_len > dst->sa_len)
8499a1b64d5SAlexander V. Chernikov 				return (ENOMEM);
8509a1b64d5SAlexander V. Chernikov 			memcpy(dst, src, src->sa_len);
8519a1b64d5SAlexander V. Chernikov 			info->rti_addrs |= RTA_DST;
8529a1b64d5SAlexander V. Chernikov 		}
8539a1b64d5SAlexander V. Chernikov 
8549a1b64d5SAlexander V. Chernikov 		/* Copy mask if set && dst is non-zero */
8559a1b64d5SAlexander V. Chernikov 		src = rt_mask(rt);
8569a1b64d5SAlexander V. Chernikov 		dst = info->rti_info[RTAX_NETMASK];
8579a1b64d5SAlexander V. Chernikov 		if (src != NULL && dst != NULL) {
8589a1b64d5SAlexander V. Chernikov 
8599a1b64d5SAlexander V. Chernikov 			/*
8609a1b64d5SAlexander V. Chernikov 			 * Radix stores different value in sa_len,
8619a1b64d5SAlexander V. Chernikov 			 * assume rt_mask() to have the same length
8629a1b64d5SAlexander V. Chernikov 			 * as rt_key()
8639a1b64d5SAlexander V. Chernikov 			 */
8649a1b64d5SAlexander V. Chernikov 			if (sa_len > dst->sa_len)
8659a1b64d5SAlexander V. Chernikov 				return (ENOMEM);
8669a1b64d5SAlexander V. Chernikov 			memcpy(dst, src, src->sa_len);
8679a1b64d5SAlexander V. Chernikov 			info->rti_addrs |= RTA_NETMASK;
8689a1b64d5SAlexander V. Chernikov 		}
8699a1b64d5SAlexander V. Chernikov 
8709a1b64d5SAlexander V. Chernikov 		/* Copy gateway is set && dst is non-zero */
8719a1b64d5SAlexander V. Chernikov 		src = rt->rt_gateway;
8729a1b64d5SAlexander V. Chernikov 		dst = info->rti_info[RTAX_GATEWAY];
8739a1b64d5SAlexander V. Chernikov 		if ((rt->rt_flags & RTF_GATEWAY) && src != NULL && dst != NULL){
8749a1b64d5SAlexander V. Chernikov 			if (src->sa_len > dst->sa_len)
8759a1b64d5SAlexander V. Chernikov 				return (ENOMEM);
8769a1b64d5SAlexander V. Chernikov 			memcpy(dst, src, src->sa_len);
8779a1b64d5SAlexander V. Chernikov 			info->rti_addrs |= RTA_GATEWAY;
8789a1b64d5SAlexander V. Chernikov 		}
8799a1b64d5SAlexander V. Chernikov 	} else {
8809a1b64d5SAlexander V. Chernikov 		info->rti_info[RTAX_DST] = rt_key(rt);
8819a1b64d5SAlexander V. Chernikov 		info->rti_addrs |= RTA_DST;
8829a1b64d5SAlexander V. Chernikov 		if (rt_mask(rt) != NULL) {
8839a1b64d5SAlexander V. Chernikov 			info->rti_info[RTAX_NETMASK] = rt_mask(rt);
8849a1b64d5SAlexander V. Chernikov 			info->rti_addrs |= RTA_NETMASK;
8859a1b64d5SAlexander V. Chernikov 		}
8869a1b64d5SAlexander V. Chernikov 		if (rt->rt_flags & RTF_GATEWAY) {
8879a1b64d5SAlexander V. Chernikov 			info->rti_info[RTAX_GATEWAY] = rt->rt_gateway;
8889a1b64d5SAlexander V. Chernikov 			info->rti_addrs |= RTA_GATEWAY;
8899a1b64d5SAlexander V. Chernikov 		}
8909a1b64d5SAlexander V. Chernikov 	}
8919a1b64d5SAlexander V. Chernikov 
8929a1b64d5SAlexander V. Chernikov 	rmx = info->rti_rmx;
8939a1b64d5SAlexander V. Chernikov 	if (rmx != NULL) {
8949a1b64d5SAlexander V. Chernikov 		info->rti_mflags |= RTV_MTU;
8959a1b64d5SAlexander V. Chernikov 		rmx->rmx_mtu = rt->rt_mtu;
8969a1b64d5SAlexander V. Chernikov 	}
8979a1b64d5SAlexander V. Chernikov 
8989a1b64d5SAlexander V. Chernikov 	info->rti_flags = rt->rt_flags;
8999a1b64d5SAlexander V. Chernikov 	info->rti_ifp = rt->rt_ifp;
9009a1b64d5SAlexander V. Chernikov 	info->rti_ifa = rt->rt_ifa;
9011ebec5faSMatt Macy 	ifa_ref(info->rti_ifa);
9029a1b64d5SAlexander V. Chernikov 	if (flags & NHR_REF) {
9039a1b64d5SAlexander V. Chernikov 		/* Do 'traditional' refcouting */
9049a1b64d5SAlexander V. Chernikov 		if_ref(info->rti_ifp);
9059a1b64d5SAlexander V. Chernikov 	}
9069a1b64d5SAlexander V. Chernikov 
9079a1b64d5SAlexander V. Chernikov 	return (0);
9089a1b64d5SAlexander V. Chernikov }
9099a1b64d5SAlexander V. Chernikov 
9109a1b64d5SAlexander V. Chernikov /*
9119a1b64d5SAlexander V. Chernikov  * Lookups up route entry for @dst in RIB database for fib @fibnum.
9129a1b64d5SAlexander V. Chernikov  * Exports entry data to @info using rt_exportinfo().
9139a1b64d5SAlexander V. Chernikov  *
9149a1b64d5SAlexander V. Chernikov  * if @flags contains NHR_REF, refcouting is performed on rt_ifp.
9159a1b64d5SAlexander V. Chernikov  *   All references can be released later by calling rib_free_info()
9169a1b64d5SAlexander V. Chernikov  *
9179a1b64d5SAlexander V. Chernikov  * Returns 0 on success.
9189a1b64d5SAlexander V. Chernikov  * Returns ENOENT for lookup failure, ENOMEM for export failure.
9199a1b64d5SAlexander V. Chernikov  */
9209a1b64d5SAlexander V. Chernikov int
9219a1b64d5SAlexander V. Chernikov rib_lookup_info(uint32_t fibnum, const struct sockaddr *dst, uint32_t flags,
9229a1b64d5SAlexander V. Chernikov     uint32_t flowid, struct rt_addrinfo *info)
9239a1b64d5SAlexander V. Chernikov {
92420efcfc6SAndrey V. Elsukov 	RIB_RLOCK_TRACKER;
92561eee0e2SAlexander V. Chernikov 	struct rib_head *rh;
9269a1b64d5SAlexander V. Chernikov 	struct radix_node *rn;
9279a1b64d5SAlexander V. Chernikov 	struct rtentry *rt;
9289a1b64d5SAlexander V. Chernikov 	int error;
9299a1b64d5SAlexander V. Chernikov 
9309a1b64d5SAlexander V. Chernikov 	KASSERT((fibnum < rt_numfibs), ("rib_lookup_rte: bad fibnum"));
9319a1b64d5SAlexander V. Chernikov 	rh = rt_tables_get_rnh(fibnum, dst->sa_family);
9329a1b64d5SAlexander V. Chernikov 	if (rh == NULL)
9339a1b64d5SAlexander V. Chernikov 		return (ENOENT);
9349a1b64d5SAlexander V. Chernikov 
93561eee0e2SAlexander V. Chernikov 	RIB_RLOCK(rh);
93661eee0e2SAlexander V. Chernikov 	rn = rh->rnh_matchaddr(__DECONST(void *, dst), &rh->head);
9379a1b64d5SAlexander V. Chernikov 	if (rn != NULL && ((rn->rn_flags & RNF_ROOT) == 0)) {
9389a1b64d5SAlexander V. Chernikov 		rt = RNTORT(rn);
9399a1b64d5SAlexander V. Chernikov 		/* Ensure route & ifp is UP */
9409a1b64d5SAlexander V. Chernikov 		if (RT_LINK_IS_UP(rt->rt_ifp)) {
9419a1b64d5SAlexander V. Chernikov 			flags = (flags & NHR_REF) | NHR_COPY;
9429a1b64d5SAlexander V. Chernikov 			error = rt_exportinfo(rt, info, flags);
94361eee0e2SAlexander V. Chernikov 			RIB_RUNLOCK(rh);
9449a1b64d5SAlexander V. Chernikov 
9459a1b64d5SAlexander V. Chernikov 			return (error);
9469a1b64d5SAlexander V. Chernikov 		}
9479a1b64d5SAlexander V. Chernikov 	}
94861eee0e2SAlexander V. Chernikov 	RIB_RUNLOCK(rh);
9499a1b64d5SAlexander V. Chernikov 
9509a1b64d5SAlexander V. Chernikov 	return (ENOENT);
9519a1b64d5SAlexander V. Chernikov }
9529a1b64d5SAlexander V. Chernikov 
9539a1b64d5SAlexander V. Chernikov /*
9549a1b64d5SAlexander V. Chernikov  * Releases all references acquired by rib_lookup_info() when
9559a1b64d5SAlexander V. Chernikov  * called with NHR_REF flags.
9569a1b64d5SAlexander V. Chernikov  */
9579a1b64d5SAlexander V. Chernikov void
9589a1b64d5SAlexander V. Chernikov rib_free_info(struct rt_addrinfo *info)
9599a1b64d5SAlexander V. Chernikov {
9609a1b64d5SAlexander V. Chernikov 
9619a1b64d5SAlexander V. Chernikov 	if_rele(info->rti_ifp);
9629a1b64d5SAlexander V. Chernikov }
9639a1b64d5SAlexander V. Chernikov 
9649a1b64d5SAlexander V. Chernikov /*
9652caee4beSAlexander V. Chernikov  * Iterates over all existing fibs in system calling
9662caee4beSAlexander V. Chernikov  *  @setwa_f function prior to traversing each fib.
9672caee4beSAlexander V. Chernikov  *  Calls @wa_f function for each element in current fib.
9682caee4beSAlexander V. Chernikov  * If af is not AF_UNSPEC, iterates over fibs in particular
9692caee4beSAlexander V. Chernikov  * address family.
9702caee4beSAlexander V. Chernikov  */
9714bdf0b6aSAlexander V. Chernikov void
9722caee4beSAlexander V. Chernikov rt_foreach_fib_walk(int af, rt_setwarg_t *setwa_f, rt_walktree_f_t *wa_f,
9732caee4beSAlexander V. Chernikov     void *arg)
9744bdf0b6aSAlexander V. Chernikov {
97561eee0e2SAlexander V. Chernikov 	struct rib_head *rnh;
9764bdf0b6aSAlexander V. Chernikov 	uint32_t fibnum;
9774bdf0b6aSAlexander V. Chernikov 	int i;
9784bdf0b6aSAlexander V. Chernikov 
9794bdf0b6aSAlexander V. Chernikov 	for (fibnum = 0; fibnum < rt_numfibs; fibnum++) {
9804bdf0b6aSAlexander V. Chernikov 		/* Do we want some specific family? */
9814bdf0b6aSAlexander V. Chernikov 		if (af != AF_UNSPEC) {
9824bdf0b6aSAlexander V. Chernikov 			rnh = rt_tables_get_rnh(fibnum, af);
9834bdf0b6aSAlexander V. Chernikov 			if (rnh == NULL)
9844bdf0b6aSAlexander V. Chernikov 				continue;
9854bdf0b6aSAlexander V. Chernikov 			if (setwa_f != NULL)
986e4790abfSAlexander V. Chernikov 				setwa_f(rnh, fibnum, af, arg);
9874bdf0b6aSAlexander V. Chernikov 
98861eee0e2SAlexander V. Chernikov 			RIB_WLOCK(rnh);
98961eee0e2SAlexander V. Chernikov 			rnh->rnh_walktree(&rnh->head, (walktree_f_t *)wa_f,arg);
99061eee0e2SAlexander V. Chernikov 			RIB_WUNLOCK(rnh);
9914bdf0b6aSAlexander V. Chernikov 			continue;
9924bdf0b6aSAlexander V. Chernikov 		}
9934bdf0b6aSAlexander V. Chernikov 
9944bdf0b6aSAlexander V. Chernikov 		for (i = 1; i <= AF_MAX; i++) {
9954bdf0b6aSAlexander V. Chernikov 			rnh = rt_tables_get_rnh(fibnum, i);
9964bdf0b6aSAlexander V. Chernikov 			if (rnh == NULL)
9974bdf0b6aSAlexander V. Chernikov 				continue;
9984bdf0b6aSAlexander V. Chernikov 			if (setwa_f != NULL)
9994bdf0b6aSAlexander V. Chernikov 				setwa_f(rnh, fibnum, i, arg);
10004bdf0b6aSAlexander V. Chernikov 
100161eee0e2SAlexander V. Chernikov 			RIB_WLOCK(rnh);
100261eee0e2SAlexander V. Chernikov 			rnh->rnh_walktree(&rnh->head, (walktree_f_t *)wa_f,arg);
100361eee0e2SAlexander V. Chernikov 			RIB_WUNLOCK(rnh);
10044bdf0b6aSAlexander V. Chernikov 		}
10054bdf0b6aSAlexander V. Chernikov 	}
10064bdf0b6aSAlexander V. Chernikov }
10074bdf0b6aSAlexander V. Chernikov 
1008e8b0643eSAlexander V. Chernikov struct rt_delinfo
1009e8b0643eSAlexander V. Chernikov {
1010e8b0643eSAlexander V. Chernikov 	struct rt_addrinfo info;
101161eee0e2SAlexander V. Chernikov 	struct rib_head *rnh;
1012e8b0643eSAlexander V. Chernikov 	struct rtentry *head;
1013e8b0643eSAlexander V. Chernikov };
1014e8b0643eSAlexander V. Chernikov 
1015e8b0643eSAlexander V. Chernikov /*
1016e8b0643eSAlexander V. Chernikov  * Conditionally unlinks @rn from radix tree based
1017e8b0643eSAlexander V. Chernikov  * on info data passed in @arg.
1018e8b0643eSAlexander V. Chernikov  */
1019e8b0643eSAlexander V. Chernikov static int
1020e8b0643eSAlexander V. Chernikov rt_checkdelroute(struct radix_node *rn, void *arg)
1021e8b0643eSAlexander V. Chernikov {
1022e8b0643eSAlexander V. Chernikov 	struct rt_delinfo *di;
1023e8b0643eSAlexander V. Chernikov 	struct rt_addrinfo *info;
1024e8b0643eSAlexander V. Chernikov 	struct rtentry *rt;
1025e8b0643eSAlexander V. Chernikov 	int error;
1026e8b0643eSAlexander V. Chernikov 
1027e8b0643eSAlexander V. Chernikov 	di = (struct rt_delinfo *)arg;
1028e8b0643eSAlexander V. Chernikov 	rt = (struct rtentry *)rn;
1029e8b0643eSAlexander V. Chernikov 	info = &di->info;
1030e8b0643eSAlexander V. Chernikov 	error = 0;
1031e8b0643eSAlexander V. Chernikov 
1032e8b0643eSAlexander V. Chernikov 	info->rti_info[RTAX_DST] = rt_key(rt);
1033e8b0643eSAlexander V. Chernikov 	info->rti_info[RTAX_NETMASK] = rt_mask(rt);
1034e8b0643eSAlexander V. Chernikov 	info->rti_info[RTAX_GATEWAY] = rt->rt_gateway;
1035e8b0643eSAlexander V. Chernikov 
1036e8b0643eSAlexander V. Chernikov 	rt = rt_unlinkrte(di->rnh, info, &error);
1037e8b0643eSAlexander V. Chernikov 	if (rt == NULL) {
1038e8b0643eSAlexander V. Chernikov 		/* Either not allowed or not matched. Skip entry */
1039e8b0643eSAlexander V. Chernikov 		return (0);
1040e8b0643eSAlexander V. Chernikov 	}
1041e8b0643eSAlexander V. Chernikov 
1042e8b0643eSAlexander V. Chernikov 	/* Entry was unlinked. Add to the list and return */
1043e8b0643eSAlexander V. Chernikov 	rt->rt_chain = di->head;
1044e8b0643eSAlexander V. Chernikov 	di->head = rt;
1045e8b0643eSAlexander V. Chernikov 
1046e8b0643eSAlexander V. Chernikov 	return (0);
1047e8b0643eSAlexander V. Chernikov }
1048e8b0643eSAlexander V. Chernikov 
1049e8b0643eSAlexander V. Chernikov /*
1050e8b0643eSAlexander V. Chernikov  * Iterates over all existing fibs in system.
1051e8b0643eSAlexander V. Chernikov  * Deletes each element for which @filter_f function returned
1052e8b0643eSAlexander V. Chernikov  * non-zero value.
1053e8b0643eSAlexander V. Chernikov  * If @af is not AF_UNSPEC, iterates over fibs in particular
1054e8b0643eSAlexander V. Chernikov  * address family.
1055e8b0643eSAlexander V. Chernikov  */
1056e8b0643eSAlexander V. Chernikov void
1057e8b0643eSAlexander V. Chernikov rt_foreach_fib_walk_del(int af, rt_filter_f_t *filter_f, void *arg)
1058e8b0643eSAlexander V. Chernikov {
105961eee0e2SAlexander V. Chernikov 	struct rib_head *rnh;
1060e8b0643eSAlexander V. Chernikov 	struct rt_delinfo di;
1061e8b0643eSAlexander V. Chernikov 	struct rtentry *rt;
1062e8b0643eSAlexander V. Chernikov 	uint32_t fibnum;
1063e8b0643eSAlexander V. Chernikov 	int i, start, end;
1064e8b0643eSAlexander V. Chernikov 
1065e8b0643eSAlexander V. Chernikov 	bzero(&di, sizeof(di));
1066e8b0643eSAlexander V. Chernikov 	di.info.rti_filter = filter_f;
1067e8b0643eSAlexander V. Chernikov 	di.info.rti_filterdata = arg;
1068e8b0643eSAlexander V. Chernikov 
1069e8b0643eSAlexander V. Chernikov 	for (fibnum = 0; fibnum < rt_numfibs; fibnum++) {
1070e8b0643eSAlexander V. Chernikov 		/* Do we want some specific family? */
1071e8b0643eSAlexander V. Chernikov 		if (af != AF_UNSPEC) {
1072e8b0643eSAlexander V. Chernikov 			start = af;
1073e8b0643eSAlexander V. Chernikov 			end = af;
1074e8b0643eSAlexander V. Chernikov 		} else {
1075e8b0643eSAlexander V. Chernikov 			start = 1;
1076e8b0643eSAlexander V. Chernikov 			end = AF_MAX;
1077e8b0643eSAlexander V. Chernikov 		}
1078e8b0643eSAlexander V. Chernikov 
1079e8b0643eSAlexander V. Chernikov 		for (i = start; i <= end; i++) {
1080e8b0643eSAlexander V. Chernikov 			rnh = rt_tables_get_rnh(fibnum, i);
1081e8b0643eSAlexander V. Chernikov 			if (rnh == NULL)
1082e8b0643eSAlexander V. Chernikov 				continue;
1083e8b0643eSAlexander V. Chernikov 			di.rnh = rnh;
1084e8b0643eSAlexander V. Chernikov 
108561eee0e2SAlexander V. Chernikov 			RIB_WLOCK(rnh);
108661eee0e2SAlexander V. Chernikov 			rnh->rnh_walktree(&rnh->head, rt_checkdelroute, &di);
108761eee0e2SAlexander V. Chernikov 			RIB_WUNLOCK(rnh);
1088e8b0643eSAlexander V. Chernikov 
1089e8b0643eSAlexander V. Chernikov 			if (di.head == NULL)
1090e8b0643eSAlexander V. Chernikov 				continue;
1091e8b0643eSAlexander V. Chernikov 
1092e8b0643eSAlexander V. Chernikov 			/* We might have something to reclaim */
1093e8b0643eSAlexander V. Chernikov 			while (di.head != NULL) {
1094e8b0643eSAlexander V. Chernikov 				rt = di.head;
1095e8b0643eSAlexander V. Chernikov 				di.head = rt->rt_chain;
1096e8b0643eSAlexander V. Chernikov 				rt->rt_chain = NULL;
1097e8b0643eSAlexander V. Chernikov 
1098e8b0643eSAlexander V. Chernikov 				/* TODO std rt -> rt_addrinfo export */
1099e8b0643eSAlexander V. Chernikov 				di.info.rti_info[RTAX_DST] = rt_key(rt);
1100e8b0643eSAlexander V. Chernikov 				di.info.rti_info[RTAX_NETMASK] = rt_mask(rt);
1101e8b0643eSAlexander V. Chernikov 
1102e8b0643eSAlexander V. Chernikov 				rt_notifydelete(rt, &di.info);
1103e8b0643eSAlexander V. Chernikov 				RTFREE_LOCKED(rt);
1104e8b0643eSAlexander V. Chernikov 			}
1105e8b0643eSAlexander V. Chernikov 
1106e8b0643eSAlexander V. Chernikov 		}
1107e8b0643eSAlexander V. Chernikov 	}
1108e8b0643eSAlexander V. Chernikov }
1109e8b0643eSAlexander V. Chernikov 
11104bdf0b6aSAlexander V. Chernikov /*
11114bdf0b6aSAlexander V. Chernikov  * Delete Routes for a Network Interface
11124bdf0b6aSAlexander V. Chernikov  *
11134bdf0b6aSAlexander V. Chernikov  * Called for each routing entry via the rnh->rnh_walktree() call above
11144bdf0b6aSAlexander V. Chernikov  * to delete all route entries referencing a detaching network interface.
11154bdf0b6aSAlexander V. Chernikov  *
11164bdf0b6aSAlexander V. Chernikov  * Arguments:
11174bdf0b6aSAlexander V. Chernikov  *	rt	pointer to rtentry
11184bdf0b6aSAlexander V. Chernikov  *	arg	argument passed to rnh->rnh_walktree() - detaching interface
11194bdf0b6aSAlexander V. Chernikov  *
11204bdf0b6aSAlexander V. Chernikov  * Returns:
11214bdf0b6aSAlexander V. Chernikov  *	0	successful
11224bdf0b6aSAlexander V. Chernikov  *	errno	failed - reason indicated
11234bdf0b6aSAlexander V. Chernikov  */
11244bdf0b6aSAlexander V. Chernikov static int
1125e8b0643eSAlexander V. Chernikov rt_ifdelroute(const struct rtentry *rt, void *arg)
11264bdf0b6aSAlexander V. Chernikov {
11274bdf0b6aSAlexander V. Chernikov 	struct ifnet	*ifp = arg;
11284bdf0b6aSAlexander V. Chernikov 
11294bdf0b6aSAlexander V. Chernikov 	if (rt->rt_ifp != ifp)
11304bdf0b6aSAlexander V. Chernikov 		return (0);
11314bdf0b6aSAlexander V. Chernikov 
11324bdf0b6aSAlexander V. Chernikov 	/*
11334bdf0b6aSAlexander V. Chernikov 	 * Protect (sorta) against walktree recursion problems
11344bdf0b6aSAlexander V. Chernikov 	 * with cloned routes
11354bdf0b6aSAlexander V. Chernikov 	 */
11364bdf0b6aSAlexander V. Chernikov 	if ((rt->rt_flags & RTF_UP) == 0)
11374bdf0b6aSAlexander V. Chernikov 		return (0);
11384bdf0b6aSAlexander V. Chernikov 
1139e8b0643eSAlexander V. Chernikov 	return (1);
11404bdf0b6aSAlexander V. Chernikov }
11414bdf0b6aSAlexander V. Chernikov 
11424bdf0b6aSAlexander V. Chernikov /*
11434bdf0b6aSAlexander V. Chernikov  * Delete all remaining routes using this interface
11444bdf0b6aSAlexander V. Chernikov  * Unfortuneatly the only way to do this is to slog through
11454bdf0b6aSAlexander V. Chernikov  * the entire routing table looking for routes which point
11464bdf0b6aSAlexander V. Chernikov  * to this interface...oh well...
11474bdf0b6aSAlexander V. Chernikov  */
11484bdf0b6aSAlexander V. Chernikov void
114980ae8d60SBjoern A. Zeeb rt_flushifroutes_af(struct ifnet *ifp, int af)
115080ae8d60SBjoern A. Zeeb {
115180ae8d60SBjoern A. Zeeb 	KASSERT((af >= 1 && af <= AF_MAX), ("%s: af %d not >= 1 and <= %d",
115280ae8d60SBjoern A. Zeeb 	    __func__, af, AF_MAX));
115380ae8d60SBjoern A. Zeeb 
115480ae8d60SBjoern A. Zeeb 	rt_foreach_fib_walk_del(af, rt_ifdelroute, ifp);
115580ae8d60SBjoern A. Zeeb }
115680ae8d60SBjoern A. Zeeb 
115780ae8d60SBjoern A. Zeeb void
11584bdf0b6aSAlexander V. Chernikov rt_flushifroutes(struct ifnet *ifp)
11594bdf0b6aSAlexander V. Chernikov {
11604bdf0b6aSAlexander V. Chernikov 
1161e8b0643eSAlexander V. Chernikov 	rt_foreach_fib_walk_del(AF_UNSPEC, rt_ifdelroute, ifp);
11624bdf0b6aSAlexander V. Chernikov }
11634bdf0b6aSAlexander V. Chernikov 
11648071913dSRuslan Ermilov /*
1165e8b0643eSAlexander V. Chernikov  * Conditionally unlinks rtentry matching data inside @info from @rnh.
1166e8b0643eSAlexander V. Chernikov  * Returns unlinked, locked and referenced @rtentry on success,
1167e8b0643eSAlexander V. Chernikov  * Returns NULL and sets @perror to:
1168e8b0643eSAlexander V. Chernikov  * ESRCH - if prefix was not found,
1169e8b0643eSAlexander V. Chernikov  * EADDRINUSE - if trying to delete PINNED route without appropriate flag.
1170e8b0643eSAlexander V. Chernikov  * ENOENT - if supplied filter function returned 0 (not matched).
1171e8b0643eSAlexander V. Chernikov  */
1172e8b0643eSAlexander V. Chernikov static struct rtentry *
117361eee0e2SAlexander V. Chernikov rt_unlinkrte(struct rib_head *rnh, struct rt_addrinfo *info, int *perror)
1174e8b0643eSAlexander V. Chernikov {
1175e8b0643eSAlexander V. Chernikov 	struct sockaddr *dst, *netmask;
1176e8b0643eSAlexander V. Chernikov 	struct rtentry *rt;
1177e8b0643eSAlexander V. Chernikov 	struct radix_node *rn;
1178e8b0643eSAlexander V. Chernikov 
1179e8b0643eSAlexander V. Chernikov 	dst = info->rti_info[RTAX_DST];
1180e8b0643eSAlexander V. Chernikov 	netmask = info->rti_info[RTAX_NETMASK];
1181e8b0643eSAlexander V. Chernikov 
118261eee0e2SAlexander V. Chernikov 	rt = (struct rtentry *)rnh->rnh_lookup(dst, netmask, &rnh->head);
1183e8b0643eSAlexander V. Chernikov 	if (rt == NULL) {
1184e8b0643eSAlexander V. Chernikov 		*perror = ESRCH;
1185e8b0643eSAlexander V. Chernikov 		return (NULL);
1186e8b0643eSAlexander V. Chernikov 	}
1187e8b0643eSAlexander V. Chernikov 
1188e8b0643eSAlexander V. Chernikov 	if ((info->rti_flags & RTF_PINNED) == 0) {
1189e8b0643eSAlexander V. Chernikov 		/* Check if target route can be deleted */
1190e8b0643eSAlexander V. Chernikov 		if (rt->rt_flags & RTF_PINNED) {
1191e8b0643eSAlexander V. Chernikov 			*perror = EADDRINUSE;
1192e8b0643eSAlexander V. Chernikov 			return (NULL);
1193e8b0643eSAlexander V. Chernikov 		}
1194e8b0643eSAlexander V. Chernikov 	}
1195e8b0643eSAlexander V. Chernikov 
1196e8b0643eSAlexander V. Chernikov 	if (info->rti_filter != NULL) {
1197e8b0643eSAlexander V. Chernikov 		if (info->rti_filter(rt, info->rti_filterdata) == 0) {
1198e8b0643eSAlexander V. Chernikov 			/* Not matched */
1199e8b0643eSAlexander V. Chernikov 			*perror = ENOENT;
1200e8b0643eSAlexander V. Chernikov 			return (NULL);
1201e8b0643eSAlexander V. Chernikov 		}
1202e8b0643eSAlexander V. Chernikov 
1203e8b0643eSAlexander V. Chernikov 		/*
1204e8b0643eSAlexander V. Chernikov 		 * Filter function requested rte deletion.
1205e8b0643eSAlexander V. Chernikov 		 * Ease the caller work by filling in remaining info
1206e8b0643eSAlexander V. Chernikov 		 * from that particular entry.
1207e8b0643eSAlexander V. Chernikov 		 */
1208e8b0643eSAlexander V. Chernikov 		info->rti_info[RTAX_GATEWAY] = rt->rt_gateway;
1209e8b0643eSAlexander V. Chernikov 	}
1210e8b0643eSAlexander V. Chernikov 
1211e8b0643eSAlexander V. Chernikov 	/*
1212e8b0643eSAlexander V. Chernikov 	 * Remove the item from the tree and return it.
1213e8b0643eSAlexander V. Chernikov 	 * Complain if it is not there and do no more processing.
1214e8b0643eSAlexander V. Chernikov 	 */
1215e8b0643eSAlexander V. Chernikov 	*perror = ESRCH;
1216e8b0643eSAlexander V. Chernikov #ifdef RADIX_MPATH
121761eee0e2SAlexander V. Chernikov 	if (rt_mpath_capable(rnh))
1218e8b0643eSAlexander V. Chernikov 		rn = rt_mpath_unlink(rnh, info, rt, perror);
1219e8b0643eSAlexander V. Chernikov 	else
1220e8b0643eSAlexander V. Chernikov #endif
122161eee0e2SAlexander V. Chernikov 	rn = rnh->rnh_deladdr(dst, netmask, &rnh->head);
1222e8b0643eSAlexander V. Chernikov 	if (rn == NULL)
1223e8b0643eSAlexander V. Chernikov 		return (NULL);
1224e8b0643eSAlexander V. Chernikov 
1225e8b0643eSAlexander V. Chernikov 	if (rn->rn_flags & (RNF_ACTIVE | RNF_ROOT))
1226e8b0643eSAlexander V. Chernikov 		panic ("rtrequest delete");
1227e8b0643eSAlexander V. Chernikov 
1228e8b0643eSAlexander V. Chernikov 	rt = RNTORT(rn);
1229e8b0643eSAlexander V. Chernikov 	RT_LOCK(rt);
1230e8b0643eSAlexander V. Chernikov 	RT_ADDREF(rt);
12314b3dc898SAlexander V. Chernikov 	rt->rt_flags &= ~RTF_UP;
1232e8b0643eSAlexander V. Chernikov 
1233e8b0643eSAlexander V. Chernikov 	*perror = 0;
1234e8b0643eSAlexander V. Chernikov 
1235e8b0643eSAlexander V. Chernikov 	return (rt);
1236e8b0643eSAlexander V. Chernikov }
1237e8b0643eSAlexander V. Chernikov 
1238e8b0643eSAlexander V. Chernikov static void
1239e8b0643eSAlexander V. Chernikov rt_notifydelete(struct rtentry *rt, struct rt_addrinfo *info)
1240e8b0643eSAlexander V. Chernikov {
1241e8b0643eSAlexander V. Chernikov 	struct ifaddr *ifa;
1242e8b0643eSAlexander V. Chernikov 
1243e8b0643eSAlexander V. Chernikov 	/*
1244e8b0643eSAlexander V. Chernikov 	 * give the protocol a chance to keep things in sync.
1245e8b0643eSAlexander V. Chernikov 	 */
1246e8b0643eSAlexander V. Chernikov 	ifa = rt->rt_ifa;
1247e8b0643eSAlexander V. Chernikov 	if (ifa != NULL && ifa->ifa_rtrequest != NULL)
1248e8b0643eSAlexander V. Chernikov 		ifa->ifa_rtrequest(RTM_DELETE, rt, info);
1249e8b0643eSAlexander V. Chernikov 
1250e8b0643eSAlexander V. Chernikov 	/*
1251e8b0643eSAlexander V. Chernikov 	 * One more rtentry floating around that is not
1252e8b0643eSAlexander V. Chernikov 	 * linked to the routing table. rttrash will be decremented
1253e8b0643eSAlexander V. Chernikov 	 * when RTFREE(rt) is eventually called.
1254e8b0643eSAlexander V. Chernikov 	 */
1255e8b0643eSAlexander V. Chernikov 	V_rttrash++;
1256e8b0643eSAlexander V. Chernikov }
1257e8b0643eSAlexander V. Chernikov 
1258e8b0643eSAlexander V. Chernikov 
1259e8b0643eSAlexander V. Chernikov /*
12608071913dSRuslan Ermilov  * These (questionable) definitions of apparent local variables apply
12618071913dSRuslan Ermilov  * to the next two functions.  XXXXXX!!!
12628071913dSRuslan Ermilov  */
12638071913dSRuslan Ermilov #define	dst	info->rti_info[RTAX_DST]
12648071913dSRuslan Ermilov #define	gateway	info->rti_info[RTAX_GATEWAY]
12658071913dSRuslan Ermilov #define	netmask	info->rti_info[RTAX_NETMASK]
12668071913dSRuslan Ermilov #define	ifaaddr	info->rti_info[RTAX_IFA]
12678071913dSRuslan Ermilov #define	ifpaddr	info->rti_info[RTAX_IFP]
12688071913dSRuslan Ermilov #define	flags	info->rti_flags
12698071913dSRuslan Ermilov 
12708c0fec80SRobert Watson /*
12718c0fec80SRobert Watson  * Look up rt_addrinfo for a specific fib.  Note that if rti_ifa is defined,
12728c0fec80SRobert Watson  * it will be referenced so the caller must free it.
12732ad7ed6eSAlexander V. Chernikov  *
12742ad7ed6eSAlexander V. Chernikov  * Assume basic consistency checks are executed by callers:
12752ad7ed6eSAlexander V. Chernikov  * RTAX_DST exists, if RTF_GATEWAY is set, RTAX_GATEWAY exists as well.
12768c0fec80SRobert Watson  */
12778b07e49aSJulian Elischer int
12788b07e49aSJulian Elischer rt_getifa_fib(struct rt_addrinfo *info, u_int fibnum)
12798b07e49aSJulian Elischer {
1280a68cc388SGleb Smirnoff 	struct epoch_tracker et;
12811ebec5faSMatt Macy 	int needref, error;
12828071913dSRuslan Ermilov 
12838071913dSRuslan Ermilov 	/*
12848071913dSRuslan Ermilov 	 * ifp may be specified by sockaddr_dl
12858071913dSRuslan Ermilov 	 * when protocol address is ambiguous.
12868071913dSRuslan Ermilov 	 */
12871ebec5faSMatt Macy 	error = 0;
12881ebec5faSMatt Macy 	needref = (info->rti_ifa == NULL);
1289a68cc388SGleb Smirnoff 	NET_EPOCH_ENTER(et);
12902ad7ed6eSAlexander V. Chernikov 
12912ad7ed6eSAlexander V. Chernikov 	/* If we have interface specified by the ifindex in the address, use it */
12928071913dSRuslan Ermilov 	if (info->rti_ifp == NULL && ifpaddr != NULL &&
12932ad7ed6eSAlexander V. Chernikov 	    ifpaddr->sa_family == AF_LINK) {
12942ad7ed6eSAlexander V. Chernikov 	    const struct sockaddr_dl *sdl = (const struct sockaddr_dl *)ifpaddr;
12952ad7ed6eSAlexander V. Chernikov 	    if (sdl->sdl_index != 0)
12962ad7ed6eSAlexander V. Chernikov 		    info->rti_ifp = ifnet_byindex_locked(sdl->sdl_index);
12978c0fec80SRobert Watson 	}
12982ad7ed6eSAlexander V. Chernikov 	/*
12992ad7ed6eSAlexander V. Chernikov 	 * If we have source address specified, try to find it
13002ad7ed6eSAlexander V. Chernikov 	 * TODO: avoid enumerating all ifas on all interfaces.
13012ad7ed6eSAlexander V. Chernikov 	 */
13028071913dSRuslan Ermilov 	if (info->rti_ifa == NULL && ifaaddr != NULL)
13038071913dSRuslan Ermilov 		info->rti_ifa = ifa_ifwithaddr(ifaaddr);
13048071913dSRuslan Ermilov 	if (info->rti_ifa == NULL) {
13058071913dSRuslan Ermilov 		struct sockaddr *sa;
13068071913dSRuslan Ermilov 
13072ad7ed6eSAlexander V. Chernikov 		/*
13082ad7ed6eSAlexander V. Chernikov 		 * Most common use case for the userland-supplied routes.
13092ad7ed6eSAlexander V. Chernikov 		 *
13102ad7ed6eSAlexander V. Chernikov 		 * Choose sockaddr to select ifa.
13112ad7ed6eSAlexander V. Chernikov 		 * -- if ifp is set --
13122ad7ed6eSAlexander V. Chernikov 		 * Order of preference:
13132ad7ed6eSAlexander V. Chernikov 		 * 1) IFA address
13142ad7ed6eSAlexander V. Chernikov 		 * 2) gateway address
13152ad7ed6eSAlexander V. Chernikov 		 *   Note: for interface routes link-level gateway address
13162ad7ed6eSAlexander V. Chernikov 		 *     is specified to indicate the interface index without
13172ad7ed6eSAlexander V. Chernikov 		 *     specifying RTF_GATEWAY. In this case, ignore gateway
13182ad7ed6eSAlexander V. Chernikov 		 *   Note: gateway AF may be different from dst AF. In this case,
13192ad7ed6eSAlexander V. Chernikov 		 *   ignore gateway
13202ad7ed6eSAlexander V. Chernikov 		 * 3) final destination.
13212ad7ed6eSAlexander V. Chernikov 		 * 4) if all of these fails, try to get at least link-level ifa.
13222ad7ed6eSAlexander V. Chernikov 		 * -- else --
13232ad7ed6eSAlexander V. Chernikov 		 * try to lookup gateway or dst in the routing table to get ifa
13242ad7ed6eSAlexander V. Chernikov 		 */
13252ad7ed6eSAlexander V. Chernikov 		if (info->rti_info[RTAX_IFA] != NULL)
13262ad7ed6eSAlexander V. Chernikov 			sa = info->rti_info[RTAX_IFA];
13272ad7ed6eSAlexander V. Chernikov 		else if ((info->rti_flags & RTF_GATEWAY) != 0 &&
13282ad7ed6eSAlexander V. Chernikov 		    gateway->sa_family == dst->sa_family)
13292ad7ed6eSAlexander V. Chernikov 			sa = gateway;
13302ad7ed6eSAlexander V. Chernikov 		else
13312ad7ed6eSAlexander V. Chernikov 			sa = dst;
13322ad7ed6eSAlexander V. Chernikov 		if (info->rti_ifp != NULL) {
13338071913dSRuslan Ermilov 			info->rti_ifa = ifaof_ifpforaddr(sa, info->rti_ifp);
13342ad7ed6eSAlexander V. Chernikov 			/* Case 4 */
13352ad7ed6eSAlexander V. Chernikov 			if (info->rti_ifa == NULL && gateway != NULL)
13362ad7ed6eSAlexander V. Chernikov 				info->rti_ifa = ifaof_ifpforaddr(gateway, info->rti_ifp);
13372ad7ed6eSAlexander V. Chernikov 		} else if (dst != NULL && gateway != NULL)
13384f8585e0SAlan Somers 			info->rti_ifa = ifa_ifwithroute(flags, dst, gateway,
13398b07e49aSJulian Elischer 							fibnum);
13408071913dSRuslan Ermilov 		else if (sa != NULL)
13414f8585e0SAlan Somers 			info->rti_ifa = ifa_ifwithroute(flags, sa, sa,
13428b07e49aSJulian Elischer 							fibnum);
13438071913dSRuslan Ermilov 	}
13441ebec5faSMatt Macy 	if (needref && info->rti_ifa != NULL) {
13458071913dSRuslan Ermilov 		if (info->rti_ifp == NULL)
1346134804c8SMatt Macy 			info->rti_ifp = info->rti_ifa->ifa_ifp;
13474f6c66ccSMatt Macy 		ifa_ref(info->rti_ifa);
13488071913dSRuslan Ermilov 	} else
13498071913dSRuslan Ermilov 		error = ENETUNREACH;
1350a68cc388SGleb Smirnoff 	NET_EPOCH_EXIT(et);
13518071913dSRuslan Ermilov 	return (error);
13528071913dSRuslan Ermilov }
13538071913dSRuslan Ermilov 
13547f948f12SAlexander V. Chernikov static int
13557f948f12SAlexander V. Chernikov if_updatemtu_cb(struct radix_node *rn, void *arg)
13567f948f12SAlexander V. Chernikov {
13577f948f12SAlexander V. Chernikov 	struct rtentry *rt;
13587f948f12SAlexander V. Chernikov 	struct if_mtuinfo *ifmtu;
13597f948f12SAlexander V. Chernikov 
13607f948f12SAlexander V. Chernikov 	rt = (struct rtentry *)rn;
13617f948f12SAlexander V. Chernikov 	ifmtu = (struct if_mtuinfo *)arg;
13627f948f12SAlexander V. Chernikov 
13637f948f12SAlexander V. Chernikov 	if (rt->rt_ifp != ifmtu->ifp)
13647f948f12SAlexander V. Chernikov 		return (0);
13657f948f12SAlexander V. Chernikov 
13667f948f12SAlexander V. Chernikov 	if (rt->rt_mtu >= ifmtu->mtu) {
13677f948f12SAlexander V. Chernikov 		/* We have to decrease mtu regardless of flags */
13687f948f12SAlexander V. Chernikov 		rt->rt_mtu = ifmtu->mtu;
13697f948f12SAlexander V. Chernikov 		return (0);
13707f948f12SAlexander V. Chernikov 	}
13717f948f12SAlexander V. Chernikov 
13727f948f12SAlexander V. Chernikov 	/*
13737f948f12SAlexander V. Chernikov 	 * New MTU is bigger. Check if are allowed to alter it
13747f948f12SAlexander V. Chernikov 	 */
13757f948f12SAlexander V. Chernikov 	if ((rt->rt_flags & (RTF_FIXEDMTU | RTF_GATEWAY | RTF_HOST)) != 0) {
13767f948f12SAlexander V. Chernikov 
13777f948f12SAlexander V. Chernikov 		/*
13787f948f12SAlexander V. Chernikov 		 * Skip routes with user-supplied MTU and
13797f948f12SAlexander V. Chernikov 		 * non-interface routes
13807f948f12SAlexander V. Chernikov 		 */
13817f948f12SAlexander V. Chernikov 		return (0);
13827f948f12SAlexander V. Chernikov 	}
13837f948f12SAlexander V. Chernikov 
13847f948f12SAlexander V. Chernikov 	/* We are safe to update route MTU */
13857f948f12SAlexander V. Chernikov 	rt->rt_mtu = ifmtu->mtu;
13867f948f12SAlexander V. Chernikov 
13877f948f12SAlexander V. Chernikov 	return (0);
13887f948f12SAlexander V. Chernikov }
13897f948f12SAlexander V. Chernikov 
13907f948f12SAlexander V. Chernikov void
13917f948f12SAlexander V. Chernikov rt_updatemtu(struct ifnet *ifp)
13927f948f12SAlexander V. Chernikov {
13937f948f12SAlexander V. Chernikov 	struct if_mtuinfo ifmtu;
139461eee0e2SAlexander V. Chernikov 	struct rib_head *rnh;
13957f948f12SAlexander V. Chernikov 	int i, j;
13967f948f12SAlexander V. Chernikov 
13977f948f12SAlexander V. Chernikov 	ifmtu.ifp = ifp;
13987f948f12SAlexander V. Chernikov 
13997f948f12SAlexander V. Chernikov 	/*
14007f948f12SAlexander V. Chernikov 	 * Try to update rt_mtu for all routes using this interface
14017f948f12SAlexander V. Chernikov 	 * Unfortunately the only way to do this is to traverse all
14027f948f12SAlexander V. Chernikov 	 * routing tables in all fibs/domains.
14037f948f12SAlexander V. Chernikov 	 */
14047f948f12SAlexander V. Chernikov 	for (i = 1; i <= AF_MAX; i++) {
14057f948f12SAlexander V. Chernikov 		ifmtu.mtu = if_getmtu_family(ifp, i);
14067f948f12SAlexander V. Chernikov 		for (j = 0; j < rt_numfibs; j++) {
14077f948f12SAlexander V. Chernikov 			rnh = rt_tables_get_rnh(j, i);
14087f948f12SAlexander V. Chernikov 			if (rnh == NULL)
14097f948f12SAlexander V. Chernikov 				continue;
141061eee0e2SAlexander V. Chernikov 			RIB_WLOCK(rnh);
141161eee0e2SAlexander V. Chernikov 			rnh->rnh_walktree(&rnh->head, if_updatemtu_cb, &ifmtu);
141261eee0e2SAlexander V. Chernikov 			RIB_WUNLOCK(rnh);
14137f948f12SAlexander V. Chernikov 		}
14147f948f12SAlexander V. Chernikov 	}
14157f948f12SAlexander V. Chernikov }
14167f948f12SAlexander V. Chernikov 
14177f948f12SAlexander V. Chernikov 
14185a2f4cbdSAlexander V. Chernikov #if 0
14195a2f4cbdSAlexander V. Chernikov int p_sockaddr(char *buf, int buflen, struct sockaddr *s);
14205a2f4cbdSAlexander V. Chernikov int rt_print(char *buf, int buflen, struct rtentry *rt);
14215a2f4cbdSAlexander V. Chernikov 
14225a2f4cbdSAlexander V. Chernikov int
14235a2f4cbdSAlexander V. Chernikov p_sockaddr(char *buf, int buflen, struct sockaddr *s)
14245a2f4cbdSAlexander V. Chernikov {
14255a2f4cbdSAlexander V. Chernikov 	void *paddr = NULL;
14265a2f4cbdSAlexander V. Chernikov 
14275a2f4cbdSAlexander V. Chernikov 	switch (s->sa_family) {
14285a2f4cbdSAlexander V. Chernikov 	case AF_INET:
14295a2f4cbdSAlexander V. Chernikov 		paddr = &((struct sockaddr_in *)s)->sin_addr;
14305a2f4cbdSAlexander V. Chernikov 		break;
14315a2f4cbdSAlexander V. Chernikov 	case AF_INET6:
14325a2f4cbdSAlexander V. Chernikov 		paddr = &((struct sockaddr_in6 *)s)->sin6_addr;
14335a2f4cbdSAlexander V. Chernikov 		break;
14345a2f4cbdSAlexander V. Chernikov 	}
14355a2f4cbdSAlexander V. Chernikov 
14365a2f4cbdSAlexander V. Chernikov 	if (paddr == NULL)
14375a2f4cbdSAlexander V. Chernikov 		return (0);
14385a2f4cbdSAlexander V. Chernikov 
14395a2f4cbdSAlexander V. Chernikov 	if (inet_ntop(s->sa_family, paddr, buf, buflen) == NULL)
14405a2f4cbdSAlexander V. Chernikov 		return (0);
14415a2f4cbdSAlexander V. Chernikov 
14425a2f4cbdSAlexander V. Chernikov 	return (strlen(buf));
14435a2f4cbdSAlexander V. Chernikov }
14445a2f4cbdSAlexander V. Chernikov 
14455a2f4cbdSAlexander V. Chernikov int
14465a2f4cbdSAlexander V. Chernikov rt_print(char *buf, int buflen, struct rtentry *rt)
14475a2f4cbdSAlexander V. Chernikov {
14485a2f4cbdSAlexander V. Chernikov 	struct sockaddr *addr, *mask;
14495a2f4cbdSAlexander V. Chernikov 	int i = 0;
14505a2f4cbdSAlexander V. Chernikov 
14515a2f4cbdSAlexander V. Chernikov 	addr = rt_key(rt);
14525a2f4cbdSAlexander V. Chernikov 	mask = rt_mask(rt);
14535a2f4cbdSAlexander V. Chernikov 
14545a2f4cbdSAlexander V. Chernikov 	i = p_sockaddr(buf, buflen, addr);
14555a2f4cbdSAlexander V. Chernikov 	if (!(rt->rt_flags & RTF_HOST)) {
14565a2f4cbdSAlexander V. Chernikov 		buf[i++] = '/';
14575a2f4cbdSAlexander V. Chernikov 		i += p_sockaddr(buf + i, buflen - i, mask);
14585a2f4cbdSAlexander V. Chernikov 	}
14595a2f4cbdSAlexander V. Chernikov 
14605a2f4cbdSAlexander V. Chernikov 	if (rt->rt_flags & RTF_GATEWAY) {
14615a2f4cbdSAlexander V. Chernikov 		buf[i++] = '>';
14625a2f4cbdSAlexander V. Chernikov 		i += p_sockaddr(buf + i, buflen - i, rt->rt_gateway);
14635a2f4cbdSAlexander V. Chernikov 	}
14645a2f4cbdSAlexander V. Chernikov 
14655a2f4cbdSAlexander V. Chernikov 	return (i);
14665a2f4cbdSAlexander V. Chernikov }
14675a2f4cbdSAlexander V. Chernikov #endif
14685a2f4cbdSAlexander V. Chernikov 
1469427ac07fSKip Macy #ifdef RADIX_MPATH
1470e8b0643eSAlexander V. Chernikov /*
1471e8b0643eSAlexander V. Chernikov  * Deletes key for single-path routes, unlinks rtentry with
1472e8b0643eSAlexander V. Chernikov  * gateway specified in @info from multi-path routes.
1473e8b0643eSAlexander V. Chernikov  *
1474e8b0643eSAlexander V. Chernikov  * Returnes unlinked entry. In case of failure, returns NULL
1475e8b0643eSAlexander V. Chernikov  * and sets @perror to ESRCH.
1476e8b0643eSAlexander V. Chernikov  */
1477e8b0643eSAlexander V. Chernikov static struct radix_node *
147861eee0e2SAlexander V. Chernikov rt_mpath_unlink(struct rib_head *rnh, struct rt_addrinfo *info,
1479e8b0643eSAlexander V. Chernikov     struct rtentry *rto, int *perror)
1480427ac07fSKip Macy {
1481427ac07fSKip Macy 	/*
1482427ac07fSKip Macy 	 * if we got multipath routes, we require users to specify
1483427ac07fSKip Macy 	 * a matching RTAX_GATEWAY.
1484427ac07fSKip Macy 	 */
1485e8b0643eSAlexander V. Chernikov 	struct rtentry *rt; // *rto = NULL;
1486f59c6cb0SAlexander V. Chernikov 	struct radix_node *rn;
1487e8b0643eSAlexander V. Chernikov 	struct sockaddr *gw;
1488427ac07fSKip Macy 
1489e8b0643eSAlexander V. Chernikov 	gw = info->rti_info[RTAX_GATEWAY];
1490e8b0643eSAlexander V. Chernikov 	rt = rt_mpath_matchgate(rto, gw);
1491e8b0643eSAlexander V. Chernikov 	if (rt == NULL) {
1492e8b0643eSAlexander V. Chernikov 		*perror = ESRCH;
1493e8b0643eSAlexander V. Chernikov 		return (NULL);
1494e8b0643eSAlexander V. Chernikov 	}
14955a2f4cbdSAlexander V. Chernikov 
1496427ac07fSKip Macy 	/*
1497427ac07fSKip Macy 	 * this is the first entry in the chain
1498427ac07fSKip Macy 	 */
1499427ac07fSKip Macy 	if (rto == rt) {
1500427ac07fSKip Macy 		rn = rn_mpath_next((struct radix_node *)rt);
1501427ac07fSKip Macy 		/*
1502427ac07fSKip Macy 		 * there is another entry, now it's active
1503427ac07fSKip Macy 		 */
1504427ac07fSKip Macy 		if (rn) {
1505427ac07fSKip Macy 			rto = RNTORT(rn);
1506427ac07fSKip Macy 			RT_LOCK(rto);
1507427ac07fSKip Macy 			rto->rt_flags |= RTF_UP;
1508427ac07fSKip Macy 			RT_UNLOCK(rto);
1509427ac07fSKip Macy 		} else if (rt->rt_flags & RTF_GATEWAY) {
1510427ac07fSKip Macy 			/*
1511427ac07fSKip Macy 			 * For gateway routes, we need to
1512427ac07fSKip Macy 			 * make sure that we we are deleting
1513427ac07fSKip Macy 			 * the correct gateway.
1514427ac07fSKip Macy 			 * rt_mpath_matchgate() does not
1515427ac07fSKip Macy 			 * check the case when there is only
1516427ac07fSKip Macy 			 * one route in the chain.
1517427ac07fSKip Macy 			 */
1518e8b0643eSAlexander V. Chernikov 			if (gw &&
1519e8b0643eSAlexander V. Chernikov 			    (rt->rt_gateway->sa_len != gw->sa_len ||
1520e8b0643eSAlexander V. Chernikov 				memcmp(rt->rt_gateway, gw, gw->sa_len))) {
1521e8b0643eSAlexander V. Chernikov 				*perror = ESRCH;
1522e8b0643eSAlexander V. Chernikov 				return (NULL);
1523e8b0643eSAlexander V. Chernikov 			}
15246a7bff2cSKip Macy 		}
15256a7bff2cSKip Macy 
1526427ac07fSKip Macy 		/*
1527427ac07fSKip Macy 		 * use the normal delete code to remove
1528427ac07fSKip Macy 		 * the first entry
1529427ac07fSKip Macy 		 */
153061eee0e2SAlexander V. Chernikov 		rn = rnh->rnh_deladdr(dst, netmask, &rnh->head);
1531e8b0643eSAlexander V. Chernikov 		*perror = 0;
1532e8b0643eSAlexander V. Chernikov 		return (rn);
1533427ac07fSKip Macy 	}
1534427ac07fSKip Macy 
1535427ac07fSKip Macy 	/*
1536427ac07fSKip Macy 	 * if the entry is 2nd and on up
1537427ac07fSKip Macy 	 */
1538e8b0643eSAlexander V. Chernikov 	if (rt_mpath_deldup(rto, rt) == 0)
1539427ac07fSKip Macy 		panic ("rtrequest1: rt_mpath_deldup");
1540e8b0643eSAlexander V. Chernikov 	*perror = 0;
1541e8b0643eSAlexander V. Chernikov 	rn = (struct radix_node *)rt;
1542e8b0643eSAlexander V. Chernikov 	return (rn);
1543427ac07fSKip Macy }
1544427ac07fSKip Macy #endif
1545427ac07fSKip Macy 
15468071913dSRuslan Ermilov int
15478b07e49aSJulian Elischer rtrequest1_fib(int req, struct rt_addrinfo *info, struct rtentry **ret_nrt,
15488b07e49aSJulian Elischer 				u_int fibnum)
15498b07e49aSJulian Elischer {
1550048738b5SAlexander V. Chernikov 	int error = 0;
15514b3dc898SAlexander V. Chernikov 	struct rtentry *rt, *rt_old;
1552f59c6cb0SAlexander V. Chernikov 	struct radix_node *rn;
155361eee0e2SAlexander V. Chernikov 	struct rib_head *rnh;
1554df8bae1dSRodney W. Grimes 	struct ifaddr *ifa;
1555df8bae1dSRodney W. Grimes 	struct sockaddr *ndst;
155646a70de2SQing Li 	struct sockaddr_storage mdst;
1557df8bae1dSRodney W. Grimes 
15588b07e49aSJulian Elischer 	KASSERT((fibnum < rt_numfibs), ("rtrequest1_fib: bad fibnum"));
1559048738b5SAlexander V. Chernikov 	KASSERT((flags & RTF_RNH_LOCKED) == 0, ("rtrequest1_fib: locked"));
1560b680a383SBjoern A. Zeeb 	switch (dst->sa_family) {
1561b680a383SBjoern A. Zeeb 	case AF_INET6:
1562b680a383SBjoern A. Zeeb 	case AF_INET:
1563b680a383SBjoern A. Zeeb 		/* We support multiple FIBs. */
1564b680a383SBjoern A. Zeeb 		break;
1565b680a383SBjoern A. Zeeb 	default:
1566b680a383SBjoern A. Zeeb 		fibnum = RT_DEFAULT_FIB;
1567b680a383SBjoern A. Zeeb 		break;
1568b680a383SBjoern A. Zeeb 	}
1569b680a383SBjoern A. Zeeb 
1570b0a76b88SJulian Elischer 	/*
1571b0a76b88SJulian Elischer 	 * Find the correct routing tree to use for this Address Family
1572b0a76b88SJulian Elischer 	 */
1573c2c2a7c1SBjoern A. Zeeb 	rnh = rt_tables_get_rnh(fibnum, dst->sa_family);
157485911824SLuigi Rizzo 	if (rnh == NULL)
1575983985c1SJeffrey Hsu 		return (EAFNOSUPPORT);
1576048738b5SAlexander V. Chernikov 
1577b0a76b88SJulian Elischer 	/*
1578b0a76b88SJulian Elischer 	 * If we are adding a host route then we don't want to put
157966953138SRuslan Ermilov 	 * a netmask in the tree, nor do we want to clone it.
1580b0a76b88SJulian Elischer 	 */
15816e6b3f7cSQing Li 	if (flags & RTF_HOST)
158285911824SLuigi Rizzo 		netmask = NULL;
15836e6b3f7cSQing Li 
1584df8bae1dSRodney W. Grimes 	switch (req) {
1585df8bae1dSRodney W. Grimes 	case RTM_DELETE:
158646a70de2SQing Li 		if (netmask) {
1587d8dc4e35SGeorge V. Neville-Neil 			if (dst->sa_len > sizeof(mdst))
1588d8dc4e35SGeorge V. Neville-Neil 				return (EINVAL);
158946a70de2SQing Li 			rt_maskedcopy(dst, (struct sockaddr *)&mdst, netmask);
159046a70de2SQing Li 			dst = (struct sockaddr *)&mdst;
159146a70de2SQing Li 		}
1592e8b0643eSAlexander V. Chernikov 
159361eee0e2SAlexander V. Chernikov 		RIB_WLOCK(rnh);
1594e8b0643eSAlexander V. Chernikov 		rt = rt_unlinkrte(rnh, info, &error);
159561eee0e2SAlexander V. Chernikov 		RIB_WUNLOCK(rnh);
1596e8b0643eSAlexander V. Chernikov 		if (error != 0)
1597048738b5SAlexander V. Chernikov 			return (error);
15983034f43fSAlexander V. Chernikov 
1599e8b0643eSAlexander V. Chernikov 		rt_notifydelete(rt, info);
1600499676dfSJulian Elischer 
1601499676dfSJulian Elischer 		/*
1602499676dfSJulian Elischer 		 * If the caller wants it, then it can have it,
1603499676dfSJulian Elischer 		 * but it's up to it to free the rtentry as we won't be
1604499676dfSJulian Elischer 		 * doing it.
1605b0a76b88SJulian Elischer 		 */
1606d1dd20beSSam Leffler 		if (ret_nrt) {
1607df8bae1dSRodney W. Grimes 			*ret_nrt = rt;
1608d1dd20beSSam Leffler 			RT_UNLOCK(rt);
1609d1dd20beSSam Leffler 		} else
1610d1dd20beSSam Leffler 			RTFREE_LOCKED(rt);
1611df8bae1dSRodney W. Grimes 		break;
1612df8bae1dSRodney W. Grimes 	case RTM_RESOLVE:
16136e6b3f7cSQing Li 		/*
16146e6b3f7cSQing Li 		 * resolve was only used for route cloning
16156e6b3f7cSQing Li 		 * here for compat
16166e6b3f7cSQing Li 		 */
16176e6b3f7cSQing Li 		break;
1618df8bae1dSRodney W. Grimes 	case RTM_ADD:
16195df72964SGarrett Wollman 		if ((flags & RTF_GATEWAY) && !gateway)
1620048738b5SAlexander V. Chernikov 			return (EINVAL);
162116a2e0a6SQing Li 		if (dst && gateway && (dst->sa_family != gateway->sa_family) &&
162216a2e0a6SQing Li 		    (gateway->sa_family != AF_UNSPEC) && (gateway->sa_family != AF_LINK))
1623048738b5SAlexander V. Chernikov 			return (EINVAL);
16245df72964SGarrett Wollman 
16258c0fec80SRobert Watson 		if (info->rti_ifa == NULL) {
16268c0fec80SRobert Watson 			error = rt_getifa_fib(info, fibnum);
16278c0fec80SRobert Watson 			if (error)
1628048738b5SAlexander V. Chernikov 				return (error);
16299379029aSMatt Macy 		}
1630e3a7aa6fSGleb Smirnoff 		rt = uma_zalloc(V_rtzone, M_NOWAIT);
16318c0fec80SRobert Watson 		if (rt == NULL) {
1632048738b5SAlexander V. Chernikov 			return (ENOBUFS);
16338c0fec80SRobert Watson 		}
1634df8bae1dSRodney W. Grimes 		rt->rt_flags = RTF_UP | flags;
16358b07e49aSJulian Elischer 		rt->rt_fibnum = fibnum;
1636499676dfSJulian Elischer 		/*
1637a8498625SBjoern A. Zeeb 		 * Add the gateway. Possibly re-malloc-ing the storage for it.
1638499676dfSJulian Elischer 		 */
1639831a80b0SMatthew Dillon 		if ((error = rt_setgate(rt, dst, gateway)) != 0) {
16401ed81b73SMarko Zec 			uma_zfree(V_rtzone, rt);
1641048738b5SAlexander V. Chernikov 			return (error);
1642df8bae1dSRodney W. Grimes 		}
1643499676dfSJulian Elischer 
1644499676dfSJulian Elischer 		/*
1645499676dfSJulian Elischer 		 * point to the (possibly newly malloc'd) dest address.
1646499676dfSJulian Elischer 		 */
1647d1dd20beSSam Leffler 		ndst = (struct sockaddr *)rt_key(rt);
1648499676dfSJulian Elischer 
1649499676dfSJulian Elischer 		/*
1650499676dfSJulian Elischer 		 * make sure it contains the value we want (masked if needed).
1651499676dfSJulian Elischer 		 */
1652df8bae1dSRodney W. Grimes 		if (netmask) {
1653df8bae1dSRodney W. Grimes 			rt_maskedcopy(dst, ndst, netmask);
1654df8bae1dSRodney W. Grimes 		} else
16551838a647SLuigi Rizzo 			bcopy(dst, ndst, dst->sa_len);
16568e718bb4SGarrett Wollman 
16578e718bb4SGarrett Wollman 		/*
16588c0fec80SRobert Watson 		 * We use the ifa reference returned by rt_getifa_fib().
16598e718bb4SGarrett Wollman 		 * This moved from below so that rnh->rnh_addaddr() can
1660499676dfSJulian Elischer 		 * examine the ifa and  ifa->ifa_ifp if it so desires.
16618e718bb4SGarrett Wollman 		 */
16629379029aSMatt Macy 		ifa = info->rti_ifa;
16639379029aSMatt Macy 		ifa_ref(ifa);
16648e718bb4SGarrett Wollman 		rt->rt_ifa = ifa;
16658e718bb4SGarrett Wollman 		rt->rt_ifp = ifa->ifa_ifp;
1666e3a7aa6fSGleb Smirnoff 		rt->rt_weight = 1;
16678e718bb4SGarrett Wollman 
16681a75e3b2SAlexander V. Chernikov 		rt_setmetrics(info, rt);
16691a75e3b2SAlexander V. Chernikov 
167061eee0e2SAlexander V. Chernikov 		RIB_WLOCK(rnh);
1671048738b5SAlexander V. Chernikov 		RT_LOCK(rt);
1672e440aed9SQing Li #ifdef RADIX_MPATH
1673e440aed9SQing Li 		/* do not permit exactly the same dst/mask/gw pair */
167461eee0e2SAlexander V. Chernikov 		if (rt_mpath_capable(rnh) &&
1675e440aed9SQing Li 			rt_mpath_conflict(rnh, rt, netmask)) {
167661eee0e2SAlexander V. Chernikov 			RIB_WUNLOCK(rnh);
1677048738b5SAlexander V. Chernikov 
16781099f828SRobert Watson 			ifa_free(rt->rt_ifa);
16798b15f615SLuiz Otavio O Souza 			R_Free(rt_key(rt));
16801ed81b73SMarko Zec 			uma_zfree(V_rtzone, rt);
1681048738b5SAlexander V. Chernikov 			return (EEXIST);
1682e440aed9SQing Li 		}
1683e440aed9SQing Li #endif
1684e440aed9SQing Li 
1685d1dd20beSSam Leffler 		/* XXX mtu manipulation will be done in rnh_addaddr -- itojun */
168661eee0e2SAlexander V. Chernikov 		rn = rnh->rnh_addaddr(ndst, netmask, &rnh->head, rt->rt_nodes);
16874b3dc898SAlexander V. Chernikov 
16884b3dc898SAlexander V. Chernikov 		rt_old = NULL;
16894b3dc898SAlexander V. Chernikov 		if (rn == NULL && (info->rti_flags & RTF_PINNED) != 0) {
16904b3dc898SAlexander V. Chernikov 
16914b3dc898SAlexander V. Chernikov 			/*
16924b3dc898SAlexander V. Chernikov 			 * Force removal and re-try addition
16934b3dc898SAlexander V. Chernikov 			 * TODO: better multipath&pinned support
16944b3dc898SAlexander V. Chernikov 			 */
16954b3dc898SAlexander V. Chernikov 			struct sockaddr *info_dst = info->rti_info[RTAX_DST];
16964b3dc898SAlexander V. Chernikov 			info->rti_info[RTAX_DST] = ndst;
16976af272d8SAlexander V. Chernikov 			/* Do not delete existing PINNED(interface) routes */
16986af272d8SAlexander V. Chernikov 			info->rti_flags &= ~RTF_PINNED;
16994b3dc898SAlexander V. Chernikov 			rt_old = rt_unlinkrte(rnh, info, &error);
17006af272d8SAlexander V. Chernikov 			info->rti_flags |= RTF_PINNED;
17014b3dc898SAlexander V. Chernikov 			info->rti_info[RTAX_DST] = info_dst;
17024b3dc898SAlexander V. Chernikov 			if (rt_old != NULL)
170361eee0e2SAlexander V. Chernikov 				rn = rnh->rnh_addaddr(ndst, netmask, &rnh->head,
17044b3dc898SAlexander V. Chernikov 				    rt->rt_nodes);
17054b3dc898SAlexander V. Chernikov 		}
170661eee0e2SAlexander V. Chernikov 		RIB_WUNLOCK(rnh);
17074b3dc898SAlexander V. Chernikov 
17084b3dc898SAlexander V. Chernikov 		if (rt_old != NULL)
17094b3dc898SAlexander V. Chernikov 			RT_UNLOCK(rt_old);
17104b3dc898SAlexander V. Chernikov 
1711499676dfSJulian Elischer 		/*
1712499676dfSJulian Elischer 		 * If it still failed to go into the tree,
1713499676dfSJulian Elischer 		 * then un-make it (this should be a function)
1714499676dfSJulian Elischer 		 */
171585911824SLuigi Rizzo 		if (rn == NULL) {
17161099f828SRobert Watson 			ifa_free(rt->rt_ifa);
17178b15f615SLuiz Otavio O Souza 			R_Free(rt_key(rt));
17181ed81b73SMarko Zec 			uma_zfree(V_rtzone, rt);
1719048738b5SAlexander V. Chernikov 			return (EEXIST);
1720df8bae1dSRodney W. Grimes 		}
1721499676dfSJulian Elischer 
17224b3dc898SAlexander V. Chernikov 		if (rt_old != NULL) {
17234b3dc898SAlexander V. Chernikov 			rt_notifydelete(rt_old, info);
17244b3dc898SAlexander V. Chernikov 			RTFREE(rt_old);
17254b3dc898SAlexander V. Chernikov 		}
17264b3dc898SAlexander V. Chernikov 
1727499676dfSJulian Elischer 		/*
1728a0c0e34bSGleb Smirnoff 		 * If this protocol has something to add to this then
1729499676dfSJulian Elischer 		 * allow it to do that as well.
1730499676dfSJulian Elischer 		 */
1731df8bae1dSRodney W. Grimes 		if (ifa->ifa_rtrequest)
17328071913dSRuslan Ermilov 			ifa->ifa_rtrequest(req, rt, info);
1733499676dfSJulian Elischer 
1734cd02a0b7SGarrett Wollman 		/*
1735499676dfSJulian Elischer 		 * actually return a resultant rtentry and
1736499676dfSJulian Elischer 		 * give the caller a single reference.
1737499676dfSJulian Elischer 		 */
1738df8bae1dSRodney W. Grimes 		if (ret_nrt) {
1739df8bae1dSRodney W. Grimes 			*ret_nrt = rt;
17407138d65cSSam Leffler 			RT_ADDREF(rt);
1741df8bae1dSRodney W. Grimes 		}
174284cc0778SGeorge V. Neville-Neil 		rnh->rnh_gen++;		/* Routing table updated */
1743d1dd20beSSam Leffler 		RT_UNLOCK(rt);
1744df8bae1dSRodney W. Grimes 		break;
1745c77462ddSAlexander V. Chernikov 	case RTM_CHANGE:
174661eee0e2SAlexander V. Chernikov 		RIB_WLOCK(rnh);
1747c77462ddSAlexander V. Chernikov 		error = rtrequest1_fib_change(rnh, info, ret_nrt, fibnum);
174861eee0e2SAlexander V. Chernikov 		RIB_WUNLOCK(rnh);
1749c77462ddSAlexander V. Chernikov 		break;
17508071913dSRuslan Ermilov 	default:
17518071913dSRuslan Ermilov 		error = EOPNOTSUPP;
1752df8bae1dSRodney W. Grimes 	}
1753048738b5SAlexander V. Chernikov 
1754df8bae1dSRodney W. Grimes 	return (error);
1755d1dd20beSSam Leffler }
1756d1dd20beSSam Leffler 
17578071913dSRuslan Ermilov #undef dst
17588071913dSRuslan Ermilov #undef gateway
17598071913dSRuslan Ermilov #undef netmask
17608071913dSRuslan Ermilov #undef ifaaddr
17618071913dSRuslan Ermilov #undef ifpaddr
17628071913dSRuslan Ermilov #undef flags
1763df8bae1dSRodney W. Grimes 
1764c77462ddSAlexander V. Chernikov static int
176561eee0e2SAlexander V. Chernikov rtrequest1_fib_change(struct rib_head *rnh, struct rt_addrinfo *info,
1766c77462ddSAlexander V. Chernikov     struct rtentry **ret_nrt, u_int fibnum)
1767c77462ddSAlexander V. Chernikov {
1768c77462ddSAlexander V. Chernikov 	struct rtentry *rt = NULL;
1769c77462ddSAlexander V. Chernikov 	int error = 0;
1770c77462ddSAlexander V. Chernikov 	int free_ifa = 0;
17711a75e3b2SAlexander V. Chernikov 	int family, mtu;
17727f948f12SAlexander V. Chernikov 	struct if_mtuinfo ifmtu;
1773c77462ddSAlexander V. Chernikov 
1774bc3d87fdSRyan Stone 	RIB_WLOCK_ASSERT(rnh);
1775bc3d87fdSRyan Stone 
1776c77462ddSAlexander V. Chernikov 	rt = (struct rtentry *)rnh->rnh_lookup(info->rti_info[RTAX_DST],
177761eee0e2SAlexander V. Chernikov 	    info->rti_info[RTAX_NETMASK], &rnh->head);
1778c77462ddSAlexander V. Chernikov 
1779c77462ddSAlexander V. Chernikov 	if (rt == NULL)
1780c77462ddSAlexander V. Chernikov 		return (ESRCH);
1781c77462ddSAlexander V. Chernikov 
1782c77462ddSAlexander V. Chernikov #ifdef RADIX_MPATH
1783c77462ddSAlexander V. Chernikov 	/*
1784c77462ddSAlexander V. Chernikov 	 * If we got multipath routes,
1785c77462ddSAlexander V. Chernikov 	 * we require users to specify a matching RTAX_GATEWAY.
1786c77462ddSAlexander V. Chernikov 	 */
178761eee0e2SAlexander V. Chernikov 	if (rt_mpath_capable(rnh)) {
1788c77462ddSAlexander V. Chernikov 		rt = rt_mpath_matchgate(rt, info->rti_info[RTAX_GATEWAY]);
1789c77462ddSAlexander V. Chernikov 		if (rt == NULL)
1790c77462ddSAlexander V. Chernikov 			return (ESRCH);
1791c77462ddSAlexander V. Chernikov 	}
1792c77462ddSAlexander V. Chernikov #endif
1793c77462ddSAlexander V. Chernikov 
1794c77462ddSAlexander V. Chernikov 	RT_LOCK(rt);
1795c77462ddSAlexander V. Chernikov 
17961a75e3b2SAlexander V. Chernikov 	rt_setmetrics(info, rt);
17971a75e3b2SAlexander V. Chernikov 
1798c77462ddSAlexander V. Chernikov 	/*
1799c77462ddSAlexander V. Chernikov 	 * New gateway could require new ifaddr, ifp;
1800c77462ddSAlexander V. Chernikov 	 * flags may also be different; ifp may be specified
1801c77462ddSAlexander V. Chernikov 	 * by ll sockaddr when protocol address is ambiguous
1802c77462ddSAlexander V. Chernikov 	 */
1803c77462ddSAlexander V. Chernikov 	if (((rt->rt_flags & RTF_GATEWAY) &&
1804c77462ddSAlexander V. Chernikov 	    info->rti_info[RTAX_GATEWAY] != NULL) ||
1805c77462ddSAlexander V. Chernikov 	    info->rti_info[RTAX_IFP] != NULL ||
1806c77462ddSAlexander V. Chernikov 	    (info->rti_info[RTAX_IFA] != NULL &&
1807c77462ddSAlexander V. Chernikov 	     !sa_equal(info->rti_info[RTAX_IFA], rt->rt_ifa->ifa_addr))) {
1808b83aa367SAndrey V. Elsukov 		/*
1809b83aa367SAndrey V. Elsukov 		 * XXX: Temporarily set RTF_RNH_LOCKED flag in the rti_flags
1810b83aa367SAndrey V. Elsukov 		 *	to avoid rlock in the ifa_ifwithroute().
1811b83aa367SAndrey V. Elsukov 		 */
1812b83aa367SAndrey V. Elsukov 		info->rti_flags |= RTF_RNH_LOCKED;
1813c77462ddSAlexander V. Chernikov 		error = rt_getifa_fib(info, fibnum);
1814b83aa367SAndrey V. Elsukov 		info->rti_flags &= ~RTF_RNH_LOCKED;
1815c77462ddSAlexander V. Chernikov 		if (info->rti_ifa != NULL)
1816c77462ddSAlexander V. Chernikov 			free_ifa = 1;
1817c77462ddSAlexander V. Chernikov 
1818c77462ddSAlexander V. Chernikov 		if (error != 0)
1819a713ee5cSAlexander V. Chernikov 			goto bad;
1820c77462ddSAlexander V. Chernikov 	}
1821c77462ddSAlexander V. Chernikov 
1822c77462ddSAlexander V. Chernikov 	/* Check if outgoing interface has changed */
1823c77462ddSAlexander V. Chernikov 	if (info->rti_ifa != NULL && info->rti_ifa != rt->rt_ifa &&
182419f41c2aSRyan Stone 	    rt->rt_ifa != NULL) {
182519f41c2aSRyan Stone 		if (rt->rt_ifa->ifa_rtrequest != NULL)
1826c77462ddSAlexander V. Chernikov 			rt->rt_ifa->ifa_rtrequest(RTM_DELETE, rt, info);
1827c77462ddSAlexander V. Chernikov 		ifa_free(rt->rt_ifa);
18281ebec5faSMatt Macy 		rt->rt_ifa = NULL;
1829c77462ddSAlexander V. Chernikov 	}
1830c77462ddSAlexander V. Chernikov 	/* Update gateway address */
1831c77462ddSAlexander V. Chernikov 	if (info->rti_info[RTAX_GATEWAY] != NULL) {
1832c77462ddSAlexander V. Chernikov 		error = rt_setgate(rt, rt_key(rt), info->rti_info[RTAX_GATEWAY]);
1833c77462ddSAlexander V. Chernikov 		if (error != 0)
1834a713ee5cSAlexander V. Chernikov 			goto bad;
1835c77462ddSAlexander V. Chernikov 
1836c77462ddSAlexander V. Chernikov 		rt->rt_flags &= ~RTF_GATEWAY;
1837c77462ddSAlexander V. Chernikov 		rt->rt_flags |= (RTF_GATEWAY & info->rti_flags);
1838c77462ddSAlexander V. Chernikov 	}
1839c77462ddSAlexander V. Chernikov 
1840c77462ddSAlexander V. Chernikov 	if (info->rti_ifa != NULL && info->rti_ifa != rt->rt_ifa) {
1841c77462ddSAlexander V. Chernikov 		ifa_ref(info->rti_ifa);
1842c77462ddSAlexander V. Chernikov 		rt->rt_ifa = info->rti_ifa;
1843c77462ddSAlexander V. Chernikov 		rt->rt_ifp = info->rti_ifp;
1844c77462ddSAlexander V. Chernikov 	}
1845c77462ddSAlexander V. Chernikov 	/* Allow some flags to be toggled on change. */
1846c77462ddSAlexander V. Chernikov 	rt->rt_flags &= ~RTF_FMASK;
1847c77462ddSAlexander V. Chernikov 	rt->rt_flags |= info->rti_flags & RTF_FMASK;
1848c77462ddSAlexander V. Chernikov 
1849c77462ddSAlexander V. Chernikov 	if (rt->rt_ifa && rt->rt_ifa->ifa_rtrequest != NULL)
1850c77462ddSAlexander V. Chernikov 	       rt->rt_ifa->ifa_rtrequest(RTM_ADD, rt, info);
1851c77462ddSAlexander V. Chernikov 
18527f948f12SAlexander V. Chernikov 	/* Alter route MTU if necessary */
18531a75e3b2SAlexander V. Chernikov 	if (rt->rt_ifp != NULL) {
18541a75e3b2SAlexander V. Chernikov 		family = info->rti_info[RTAX_DST]->sa_family;
18551a75e3b2SAlexander V. Chernikov 		mtu = if_getmtu_family(rt->rt_ifp, family);
18567f948f12SAlexander V. Chernikov 		/* Set default MTU */
18577f948f12SAlexander V. Chernikov 		if (rt->rt_mtu == 0)
18581a75e3b2SAlexander V. Chernikov 			rt->rt_mtu = mtu;
18597f948f12SAlexander V. Chernikov 		if (rt->rt_mtu != mtu) {
18607f948f12SAlexander V. Chernikov 			/* Check if we really need to update */
18617f948f12SAlexander V. Chernikov 			ifmtu.ifp = rt->rt_ifp;
18627f948f12SAlexander V. Chernikov 			ifmtu.mtu = mtu;
18637f948f12SAlexander V. Chernikov 			if_updatemtu_cb(rt->rt_nodes, &ifmtu);
18647f948f12SAlexander V. Chernikov 		}
18651a75e3b2SAlexander V. Chernikov 	}
18660fb9298dSAlexander V. Chernikov 
1867bc3d87fdSRyan Stone 	/*
1868bc3d87fdSRyan Stone 	 * This route change may have modified the route's gateway.  In that
1869bc3d87fdSRyan Stone 	 * case, any inpcbs that have cached this route need to invalidate their
1870bc3d87fdSRyan Stone 	 * llentry cache.
1871bc3d87fdSRyan Stone 	 */
1872bc3d87fdSRyan Stone 	rnh->rnh_gen++;
1873bc3d87fdSRyan Stone 
1874c77462ddSAlexander V. Chernikov 	if (ret_nrt) {
1875c77462ddSAlexander V. Chernikov 		*ret_nrt = rt;
1876c77462ddSAlexander V. Chernikov 		RT_ADDREF(rt);
1877c77462ddSAlexander V. Chernikov 	}
1878c77462ddSAlexander V. Chernikov bad:
1879c77462ddSAlexander V. Chernikov 	RT_UNLOCK(rt);
18801ebec5faSMatt Macy 	if (free_ifa != 0) {
1881c77462ddSAlexander V. Chernikov 		ifa_free(info->rti_ifa);
18821ebec5faSMatt Macy 		info->rti_ifa = NULL;
18831ebec5faSMatt Macy 	}
1884c77462ddSAlexander V. Chernikov 	return (error);
1885c77462ddSAlexander V. Chernikov }
1886c77462ddSAlexander V. Chernikov 
18870fb9298dSAlexander V. Chernikov static void
18880fb9298dSAlexander V. Chernikov rt_setmetrics(const struct rt_addrinfo *info, struct rtentry *rt)
18890fb9298dSAlexander V. Chernikov {
18900fb9298dSAlexander V. Chernikov 
18917f948f12SAlexander V. Chernikov 	if (info->rti_mflags & RTV_MTU) {
18927f948f12SAlexander V. Chernikov 		if (info->rti_rmx->rmx_mtu != 0) {
18937f948f12SAlexander V. Chernikov 
18947f948f12SAlexander V. Chernikov 			/*
18957f948f12SAlexander V. Chernikov 			 * MTU was explicitly provided by user.
18967f948f12SAlexander V. Chernikov 			 * Keep it.
18977f948f12SAlexander V. Chernikov 			 */
18987f948f12SAlexander V. Chernikov 			rt->rt_flags |= RTF_FIXEDMTU;
18997f948f12SAlexander V. Chernikov 		} else {
19007f948f12SAlexander V. Chernikov 
19017f948f12SAlexander V. Chernikov 			/*
19027f948f12SAlexander V. Chernikov 			 * User explicitly sets MTU to 0.
19037f948f12SAlexander V. Chernikov 			 * Assume rollback to default.
19047f948f12SAlexander V. Chernikov 			 */
19057f948f12SAlexander V. Chernikov 			rt->rt_flags &= ~RTF_FIXEDMTU;
19067f948f12SAlexander V. Chernikov 		}
19070fb9298dSAlexander V. Chernikov 		rt->rt_mtu = info->rti_rmx->rmx_mtu;
19087f948f12SAlexander V. Chernikov 	}
19090fb9298dSAlexander V. Chernikov 	if (info->rti_mflags & RTV_WEIGHT)
19100fb9298dSAlexander V. Chernikov 		rt->rt_weight = info->rti_rmx->rmx_weight;
19110fb9298dSAlexander V. Chernikov 	/* Kernel -> userland timebase conversion. */
19120fb9298dSAlexander V. Chernikov 	if (info->rti_mflags & RTV_EXPIRE)
19130fb9298dSAlexander V. Chernikov 		rt->rt_expire = info->rti_rmx->rmx_expire ?
19140fb9298dSAlexander V. Chernikov 		    info->rti_rmx->rmx_expire - time_second + time_uptime : 0;
19150fb9298dSAlexander V. Chernikov }
19160fb9298dSAlexander V. Chernikov 
1917df8bae1dSRodney W. Grimes int
1918d1dd20beSSam Leffler rt_setgate(struct rtentry *rt, struct sockaddr *dst, struct sockaddr *gate)
1919df8bae1dSRodney W. Grimes {
1920d1dd20beSSam Leffler 	/* XXX dst may be overwritten, can we move this to below */
19216e6b3f7cSQing Li 	int dlen = SA_SIZE(dst), glen = SA_SIZE(gate);
1922df8bae1dSRodney W. Grimes 
19231db1fffaSBill Fenner 	/*
192485911824SLuigi Rizzo 	 * Prepare to store the gateway in rt->rt_gateway.
192585911824SLuigi Rizzo 	 * Both dst and gateway are stored one after the other in the same
192685911824SLuigi Rizzo 	 * malloc'd chunk. If we have room, we can reuse the old buffer,
192785911824SLuigi Rizzo 	 * rt_gateway already points to the right place.
192885911824SLuigi Rizzo 	 * Otherwise, malloc a new block and update the 'dst' address.
1929499676dfSJulian Elischer 	 */
193085911824SLuigi Rizzo 	if (rt->rt_gateway == NULL || glen > SA_SIZE(rt->rt_gateway)) {
193185911824SLuigi Rizzo 		caddr_t new;
193285911824SLuigi Rizzo 
1933df8bae1dSRodney W. Grimes 		R_Malloc(new, caddr_t, dlen + glen);
193485911824SLuigi Rizzo 		if (new == NULL)
19351db1fffaSBill Fenner 			return ENOBUFS;
1936499676dfSJulian Elischer 		/*
193785911824SLuigi Rizzo 		 * XXX note, we copy from *dst and not *rt_key(rt) because
193885911824SLuigi Rizzo 		 * rt_setgate() can be called to initialize a newly
193985911824SLuigi Rizzo 		 * allocated route entry, in which case rt_key(rt) == NULL
194085911824SLuigi Rizzo 		 * (and also rt->rt_gateway == NULL).
194185911824SLuigi Rizzo 		 * Free()/free() handle a NULL argument just fine.
1942499676dfSJulian Elischer 		 */
19431838a647SLuigi Rizzo 		bcopy(dst, new, dlen);
19448b15f615SLuiz Otavio O Souza 		R_Free(rt_key(rt));	/* free old block, if any */
1945445e045bSAlexander Kabaev 		rt_key(rt) = (struct sockaddr *)new;
194685911824SLuigi Rizzo 		rt->rt_gateway = (struct sockaddr *)(new + dlen);
1947df8bae1dSRodney W. Grimes 	}
1948499676dfSJulian Elischer 
1949499676dfSJulian Elischer 	/*
195085911824SLuigi Rizzo 	 * Copy the new gateway value into the memory chunk.
195185911824SLuigi Rizzo 	 */
195285911824SLuigi Rizzo 	bcopy(gate, rt->rt_gateway, glen);
195385911824SLuigi Rizzo 
19546e6b3f7cSQing Li 	return (0);
1955df8bae1dSRodney W. Grimes }
1956df8bae1dSRodney W. Grimes 
1957c7ab6602SQing Li void
1958d1dd20beSSam Leffler rt_maskedcopy(struct sockaddr *src, struct sockaddr *dst, struct sockaddr *netmask)
1959df8bae1dSRodney W. Grimes {
1960f59c6cb0SAlexander V. Chernikov 	u_char *cp1 = (u_char *)src;
1961f59c6cb0SAlexander V. Chernikov 	u_char *cp2 = (u_char *)dst;
1962f59c6cb0SAlexander V. Chernikov 	u_char *cp3 = (u_char *)netmask;
1963df8bae1dSRodney W. Grimes 	u_char *cplim = cp2 + *cp3;
1964df8bae1dSRodney W. Grimes 	u_char *cplim2 = cp2 + *cp1;
1965df8bae1dSRodney W. Grimes 
1966df8bae1dSRodney W. Grimes 	*cp2++ = *cp1++; *cp2++ = *cp1++; /* copies sa_len & sa_family */
1967df8bae1dSRodney W. Grimes 	cp3 += 2;
1968df8bae1dSRodney W. Grimes 	if (cplim > cplim2)
1969df8bae1dSRodney W. Grimes 		cplim = cplim2;
1970df8bae1dSRodney W. Grimes 	while (cp2 < cplim)
1971df8bae1dSRodney W. Grimes 		*cp2++ = *cp1++ & *cp3++;
1972df8bae1dSRodney W. Grimes 	if (cp2 < cplim2)
1973df8bae1dSRodney W. Grimes 		bzero((caddr_t)cp2, (unsigned)(cplim2 - cp2));
1974df8bae1dSRodney W. Grimes }
1975df8bae1dSRodney W. Grimes 
1976df8bae1dSRodney W. Grimes /*
1977df8bae1dSRodney W. Grimes  * Set up a routing table entry, normally
1978df8bae1dSRodney W. Grimes  * for an interface.
1979df8bae1dSRodney W. Grimes  */
19808b07e49aSJulian Elischer #define _SOCKADDR_TMPSIZE 128 /* Not too big.. kernel stack size is limited */
19818b07e49aSJulian Elischer static inline  int
19828b07e49aSJulian Elischer rtinit1(struct ifaddr *ifa, int cmd, int flags, int fibnum)
1983df8bae1dSRodney W. Grimes {
198420efcfc6SAndrey V. Elsukov 	RIB_RLOCK_TRACKER;
19855aca0b30SLuigi Rizzo 	struct sockaddr *dst;
19868071913dSRuslan Ermilov 	struct sockaddr *netmask;
198785911824SLuigi Rizzo 	struct rtentry *rt = NULL;
19888071913dSRuslan Ermilov 	struct rt_addrinfo info;
1989e440aed9SQing Li 	int error = 0;
19908b07e49aSJulian Elischer 	int startfib, endfib;
19918b07e49aSJulian Elischer 	char tempbuf[_SOCKADDR_TMPSIZE];
19928b07e49aSJulian Elischer 	int didwork = 0;
19938b07e49aSJulian Elischer 	int a_failure = 0;
1994563ab4e4SAlexander V. Chernikov 	struct sockaddr_dl *sdl = NULL;
199561eee0e2SAlexander V. Chernikov 	struct rib_head *rnh;
1996df8bae1dSRodney W. Grimes 
19978071913dSRuslan Ermilov 	if (flags & RTF_HOST) {
19988071913dSRuslan Ermilov 		dst = ifa->ifa_dstaddr;
19998071913dSRuslan Ermilov 		netmask = NULL;
20008071913dSRuslan Ermilov 	} else {
20018071913dSRuslan Ermilov 		dst = ifa->ifa_addr;
20028071913dSRuslan Ermilov 		netmask = ifa->ifa_netmask;
20038071913dSRuslan Ermilov 	}
2004b3dd0771SBjoern A. Zeeb 	if (dst->sa_len == 0)
2005b3dd0771SBjoern A. Zeeb 		return(EINVAL);
2006b680a383SBjoern A. Zeeb 	switch (dst->sa_family) {
2007b680a383SBjoern A. Zeeb 	case AF_INET6:
2008b680a383SBjoern A. Zeeb 	case AF_INET:
2009b680a383SBjoern A. Zeeb 		/* We support multiple FIBs. */
2010b680a383SBjoern A. Zeeb 		break;
2011b680a383SBjoern A. Zeeb 	default:
2012b680a383SBjoern A. Zeeb 		fibnum = RT_DEFAULT_FIB;
2013b680a383SBjoern A. Zeeb 		break;
2014b680a383SBjoern A. Zeeb 	}
20157d9b6df1SAlexander V. Chernikov 	if (fibnum == RT_ALL_FIBS) {
2016ee0bd4b9SHiroki Sato 		if (V_rt_add_addr_allfibs == 0 && cmd == (int)RTM_ADD)
20170489b891SAlan Somers 			startfib = endfib = ifa->ifa_ifp->if_fib;
2018ee0bd4b9SHiroki Sato 		else {
20198b07e49aSJulian Elischer 			startfib = 0;
20208b07e49aSJulian Elischer 			endfib = rt_numfibs - 1;
202166e8505fSJulian Elischer 		}
20228b07e49aSJulian Elischer 	} else {
20238b07e49aSJulian Elischer 		KASSERT((fibnum < rt_numfibs), ("rtinit1: bad fibnum"));
20248b07e49aSJulian Elischer 		startfib = fibnum;
20258b07e49aSJulian Elischer 		endfib = fibnum;
20268b07e49aSJulian Elischer 	}
2027ac4a76ebSBjoern A. Zeeb 
2028b0a76b88SJulian Elischer 	/*
20298b07e49aSJulian Elischer 	 * If it's a delete, check that if it exists,
20308b07e49aSJulian Elischer 	 * it's on the correct interface or we might scrub
20318b07e49aSJulian Elischer 	 * a route to another ifa which would
2032b0a76b88SJulian Elischer 	 * be confusing at best and possibly worse.
2033b0a76b88SJulian Elischer 	 */
2034df8bae1dSRodney W. Grimes 	if (cmd == RTM_DELETE) {
2035b0a76b88SJulian Elischer 		/*
2036b0a76b88SJulian Elischer 		 * It's a delete, so it should already exist..
2037b0a76b88SJulian Elischer 		 * If it's a net, mask off the host bits
2038b0a76b88SJulian Elischer 		 * (Assuming we have a mask)
20398b07e49aSJulian Elischer 		 * XXX this is kinda inet specific..
2040b0a76b88SJulian Elischer 		 */
20418071913dSRuslan Ermilov 		if (netmask != NULL) {
20428b07e49aSJulian Elischer 			rt_maskedcopy(dst, (struct sockaddr *)tempbuf, netmask);
20438b07e49aSJulian Elischer 			dst = (struct sockaddr *)tempbuf;
2044df8bae1dSRodney W. Grimes 		}
2045563ab4e4SAlexander V. Chernikov 	} else if (cmd == RTM_ADD) {
2046563ab4e4SAlexander V. Chernikov 		sdl = (struct sockaddr_dl *)tempbuf;
2047563ab4e4SAlexander V. Chernikov 		bzero(sdl, sizeof(struct sockaddr_dl));
2048563ab4e4SAlexander V. Chernikov 		sdl->sdl_family = AF_LINK;
2049563ab4e4SAlexander V. Chernikov 		sdl->sdl_len = sizeof(struct sockaddr_dl);
2050563ab4e4SAlexander V. Chernikov 		sdl->sdl_type = ifa->ifa_ifp->if_type;
2051563ab4e4SAlexander V. Chernikov 		sdl->sdl_index = ifa->ifa_ifp->if_index;
20528b07e49aSJulian Elischer         }
20538b07e49aSJulian Elischer 	/*
20548b07e49aSJulian Elischer 	 * Now go through all the requested tables (fibs) and do the
20558b07e49aSJulian Elischer 	 * requested action. Realistically, this will either be fib 0
20568b07e49aSJulian Elischer 	 * for protocols that don't do multiple tables or all the
2057a8498625SBjoern A. Zeeb 	 * tables for those that do.
20588b07e49aSJulian Elischer 	 */
20598b07e49aSJulian Elischer 	for ( fibnum = startfib; fibnum <= endfib; fibnum++) {
20608b07e49aSJulian Elischer 		if (cmd == RTM_DELETE) {
20618b07e49aSJulian Elischer 			struct radix_node *rn;
2062b0a76b88SJulian Elischer 			/*
20638071913dSRuslan Ermilov 			 * Look up an rtentry that is in the routing tree and
20648071913dSRuslan Ermilov 			 * contains the correct info.
2065b0a76b88SJulian Elischer 			 */
2066c2c2a7c1SBjoern A. Zeeb 			rnh = rt_tables_get_rnh(fibnum, dst->sa_family);
2067c2c2a7c1SBjoern A. Zeeb 			if (rnh == NULL)
20688b07e49aSJulian Elischer 				/* this table doesn't exist but others might */
20698b07e49aSJulian Elischer 				continue;
207061eee0e2SAlexander V. Chernikov 			RIB_RLOCK(rnh);
207161eee0e2SAlexander V. Chernikov 			rn = rnh->rnh_lookup(dst, netmask, &rnh->head);
2072e440aed9SQing Li #ifdef RADIX_MPATH
207361eee0e2SAlexander V. Chernikov 			if (rt_mpath_capable(rnh)) {
2074e440aed9SQing Li 
2075e440aed9SQing Li 				if (rn == NULL)
2076e440aed9SQing Li 					error = ESRCH;
2077e440aed9SQing Li 				else {
2078e440aed9SQing Li 					rt = RNTORT(rn);
2079e440aed9SQing Li 					/*
20808b07e49aSJulian Elischer 					 * for interface route the
20818b07e49aSJulian Elischer 					 * rt->rt_gateway is sockaddr_intf
20828b07e49aSJulian Elischer 					 * for cloning ARP entries, so
20838b07e49aSJulian Elischer 					 * rt_mpath_matchgate must use the
20848b07e49aSJulian Elischer 					 * interface address
2085e440aed9SQing Li 					 */
20868b07e49aSJulian Elischer 					rt = rt_mpath_matchgate(rt,
20878b07e49aSJulian Elischer 					    ifa->ifa_addr);
2088034c09ffSAlexander V. Chernikov 					if (rt == NULL)
2089e440aed9SQing Li 						error = ESRCH;
2090e440aed9SQing Li 				}
2091e440aed9SQing Li 			}
2092e440aed9SQing Li #endif
20938b07e49aSJulian Elischer 			error = (rn == NULL ||
20948071913dSRuslan Ermilov 			    (rn->rn_flags & RNF_ROOT) ||
20955a2f4cbdSAlexander V. Chernikov 			    RNTORT(rn)->rt_ifa != ifa);
209661eee0e2SAlexander V. Chernikov 			RIB_RUNLOCK(rnh);
2097956b0b65SJeffrey Hsu 			if (error) {
20988b07e49aSJulian Elischer 				/* this is only an error if bad on ALL tables */
20998b07e49aSJulian Elischer 				continue;
2100df8bae1dSRodney W. Grimes 			}
2101b0a76b88SJulian Elischer 		}
2102b0a76b88SJulian Elischer 		/*
2103b0a76b88SJulian Elischer 		 * Do the actual request
2104b0a76b88SJulian Elischer 		 */
21058071913dSRuslan Ermilov 		bzero((caddr_t)&info, sizeof(info));
21061ebec5faSMatt Macy 		ifa_ref(ifa);
21078071913dSRuslan Ermilov 		info.rti_ifa = ifa;
21083034f43fSAlexander V. Chernikov 		info.rti_flags = flags |
21093034f43fSAlexander V. Chernikov 		    (ifa->ifa_flags & ~IFA_RTSELF) | RTF_PINNED;
21108071913dSRuslan Ermilov 		info.rti_info[RTAX_DST] = dst;
21116e6b3f7cSQing Li 		/*
21126e6b3f7cSQing Li 		 * doing this for compatibility reasons
21136e6b3f7cSQing Li 		 */
21146e6b3f7cSQing Li 		if (cmd == RTM_ADD)
2115563ab4e4SAlexander V. Chernikov 			info.rti_info[RTAX_GATEWAY] = (struct sockaddr *)sdl;
21166e6b3f7cSQing Li 		else
21178071913dSRuslan Ermilov 			info.rti_info[RTAX_GATEWAY] = ifa->ifa_addr;
21188071913dSRuslan Ermilov 		info.rti_info[RTAX_NETMASK] = netmask;
21198b07e49aSJulian Elischer 		error = rtrequest1_fib(cmd, &info, &rt, fibnum);
21203034f43fSAlexander V. Chernikov 
21215aca0b30SLuigi Rizzo 		if (error == 0 && rt != NULL) {
21228071913dSRuslan Ermilov 			/*
21236f99b44cSBrian Somers 			 * notify any listening routing agents of the change
21248071913dSRuslan Ermilov 			 */
2125d1dd20beSSam Leffler 			RT_LOCK(rt);
2126e440aed9SQing Li #ifdef RADIX_MPATH
2127e440aed9SQing Li 			/*
2128e440aed9SQing Li 			 * in case address alias finds the first address
21298d74af36SBjoern A. Zeeb 			 * e.g. ifconfig bge0 192.0.2.246/24
21308d74af36SBjoern A. Zeeb 			 * e.g. ifconfig bge0 192.0.2.247/24
21318d74af36SBjoern A. Zeeb 			 * the address set in the route is 192.0.2.246
21328d74af36SBjoern A. Zeeb 			 * so we need to replace it with 192.0.2.247
2133e440aed9SQing Li 			 */
21348b07e49aSJulian Elischer 			if (memcmp(rt->rt_ifa->ifa_addr,
21358b07e49aSJulian Elischer 			    ifa->ifa_addr, ifa->ifa_addr->sa_len)) {
21361099f828SRobert Watson 				ifa_free(rt->rt_ifa);
21371099f828SRobert Watson 				ifa_ref(ifa);
2138e440aed9SQing Li 				rt->rt_ifp = ifa->ifa_ifp;
2139e440aed9SQing Li 				rt->rt_ifa = ifa;
2140e440aed9SQing Li 			}
2141e440aed9SQing Li #endif
21427f279720SMichael Tuexen 			RT_ADDREF(rt);
21437f279720SMichael Tuexen 			RT_UNLOCK(rt);
2144528737fdSBjoern A. Zeeb 			rt_newaddrmsg_fib(cmd, ifa, error, rt, fibnum);
21457f279720SMichael Tuexen 			RT_LOCK(rt);
21467f279720SMichael Tuexen 			RT_REMREF(rt);
21478071913dSRuslan Ermilov 			if (cmd == RTM_DELETE) {
2148b0a76b88SJulian Elischer 				/*
21498b07e49aSJulian Elischer 				 * If we are deleting, and we found an entry,
21508b07e49aSJulian Elischer 				 * then it's been removed from the tree..
21518b07e49aSJulian Elischer 				 * now throw it away.
2152b0a76b88SJulian Elischer 				 */
2153d1dd20beSSam Leffler 				RTFREE_LOCKED(rt);
2154d1dd20beSSam Leffler 			} else {
2155d1dd20beSSam Leffler 				if (cmd == RTM_ADD) {
2156b0a76b88SJulian Elischer 					/*
21578b07e49aSJulian Elischer 					 * We just wanted to add it..
21588b07e49aSJulian Elischer 					 * we don't actually need a reference.
2159b0a76b88SJulian Elischer 					 */
21607138d65cSSam Leffler 					RT_REMREF(rt);
2161df8bae1dSRodney W. Grimes 				}
2162d1dd20beSSam Leffler 				RT_UNLOCK(rt);
2163d1dd20beSSam Leffler 			}
21648b07e49aSJulian Elischer 			didwork = 1;
2165df8bae1dSRodney W. Grimes 		}
21668b07e49aSJulian Elischer 		if (error)
21678b07e49aSJulian Elischer 			a_failure = error;
21688b07e49aSJulian Elischer 	}
21698b07e49aSJulian Elischer 	if (cmd == RTM_DELETE) {
21708b07e49aSJulian Elischer 		if (didwork) {
21718b07e49aSJulian Elischer 			error = 0;
21728b07e49aSJulian Elischer 		} else {
21738b07e49aSJulian Elischer 			/* we only give an error if it wasn't in any table */
21748b07e49aSJulian Elischer 			error = ((flags & RTF_HOST) ?
21758b07e49aSJulian Elischer 			    EHOSTUNREACH : ENETUNREACH);
21768b07e49aSJulian Elischer 		}
21778b07e49aSJulian Elischer 	} else {
21788b07e49aSJulian Elischer 		if (a_failure) {
21798b07e49aSJulian Elischer 			/* return an error if any of them failed */
21808b07e49aSJulian Elischer 			error = a_failure;
21818b07e49aSJulian Elischer 		}
21828b07e49aSJulian Elischer 	}
21833ec66d6cSDavid Greenman 	return (error);
21843ec66d6cSDavid Greenman }
2185cb64988fSLuoqi Chen 
21868b07e49aSJulian Elischer /*
21878b07e49aSJulian Elischer  * Set up a routing table entry, normally
21888b07e49aSJulian Elischer  * for an interface.
21898b07e49aSJulian Elischer  */
21908b07e49aSJulian Elischer int
21918b07e49aSJulian Elischer rtinit(struct ifaddr *ifa, int cmd, int flags)
21928b07e49aSJulian Elischer {
21938b07e49aSJulian Elischer 	struct sockaddr *dst;
2194a8498625SBjoern A. Zeeb 	int fib = RT_DEFAULT_FIB;
21958b07e49aSJulian Elischer 
21968b07e49aSJulian Elischer 	if (flags & RTF_HOST) {
21978b07e49aSJulian Elischer 		dst = ifa->ifa_dstaddr;
21988b07e49aSJulian Elischer 	} else {
21998b07e49aSJulian Elischer 		dst = ifa->ifa_addr;
22008b07e49aSJulian Elischer 	}
22018b07e49aSJulian Elischer 
2202b680a383SBjoern A. Zeeb 	switch (dst->sa_family) {
2203b680a383SBjoern A. Zeeb 	case AF_INET6:
2204b680a383SBjoern A. Zeeb 	case AF_INET:
2205b680a383SBjoern A. Zeeb 		/* We do support multiple FIBs. */
22067d9b6df1SAlexander V. Chernikov 		fib = RT_ALL_FIBS;
2207b680a383SBjoern A. Zeeb 		break;
2208b680a383SBjoern A. Zeeb 	}
22098b07e49aSJulian Elischer 	return (rtinit1(ifa, cmd, flags, fib));
22108b07e49aSJulian Elischer }
22114cbac30bSAlexander V. Chernikov 
22124cbac30bSAlexander V. Chernikov /*
22134cbac30bSAlexander V. Chernikov  * Announce interface address arrival/withdraw
22144cbac30bSAlexander V. Chernikov  * Returns 0 on success.
22154cbac30bSAlexander V. Chernikov  */
22164cbac30bSAlexander V. Chernikov int
22174cbac30bSAlexander V. Chernikov rt_addrmsg(int cmd, struct ifaddr *ifa, int fibnum)
22184cbac30bSAlexander V. Chernikov {
22194cbac30bSAlexander V. Chernikov 
22204cbac30bSAlexander V. Chernikov 	KASSERT(cmd == RTM_ADD || cmd == RTM_DELETE,
2221d375edc9SAlexander V. Chernikov 	    ("unexpected cmd %d", cmd));
2222d375edc9SAlexander V. Chernikov 	KASSERT(fibnum == RT_ALL_FIBS || (fibnum >= 0 && fibnum < rt_numfibs),
2223d375edc9SAlexander V. Chernikov 	    ("%s: fib out of range 0 <=%d<%d", __func__, fibnum, rt_numfibs));
22244cbac30bSAlexander V. Chernikov 
2225d6e23cf0SMichael Tuexen 	EVENTHANDLER_DIRECT_INVOKE(rt_addrmsg, ifa, cmd);
22264cbac30bSAlexander V. Chernikov 	return (rtsock_addrmsg(cmd, ifa, fibnum));
22274cbac30bSAlexander V. Chernikov }
22284cbac30bSAlexander V. Chernikov 
22294cbac30bSAlexander V. Chernikov /*
2230d375edc9SAlexander V. Chernikov  * Announce route addition/removal.
22314cbac30bSAlexander V. Chernikov  * Users of this function MUST validate input data BEFORE calling.
22324cbac30bSAlexander V. Chernikov  * However we have to be able to handle invalid data:
22334cbac30bSAlexander V. Chernikov  * if some userland app sends us "invalid" route message (invalid mask,
2234d375edc9SAlexander V. Chernikov  * no dst, wrong address families, etc...) we need to pass it back
22354cbac30bSAlexander V. Chernikov  * to app (and any other rtsock consumers) with rtm_errno field set to
22364cbac30bSAlexander V. Chernikov  * non-zero value.
22374cbac30bSAlexander V. Chernikov  * Returns 0 on success.
22384cbac30bSAlexander V. Chernikov  */
22394cbac30bSAlexander V. Chernikov int
22404cbac30bSAlexander V. Chernikov rt_routemsg(int cmd, struct ifnet *ifp, int error, struct rtentry *rt,
22414cbac30bSAlexander V. Chernikov     int fibnum)
22424cbac30bSAlexander V. Chernikov {
22434cbac30bSAlexander V. Chernikov 
22444cbac30bSAlexander V. Chernikov 	KASSERT(cmd == RTM_ADD || cmd == RTM_DELETE,
2245d375edc9SAlexander V. Chernikov 	    ("unexpected cmd %d", cmd));
22464cbac30bSAlexander V. Chernikov 
2247d375edc9SAlexander V. Chernikov 	KASSERT(fibnum == RT_ALL_FIBS || (fibnum >= 0 && fibnum < rt_numfibs),
2248d375edc9SAlexander V. Chernikov 	    ("%s: fib out of range 0 <=%d<%d", __func__, fibnum, rt_numfibs));
22494cbac30bSAlexander V. Chernikov 
22504cbac30bSAlexander V. Chernikov 	KASSERT(rt_key(rt) != NULL, (":%s: rt_key must be supplied", __func__));
22514cbac30bSAlexander V. Chernikov 
22524cbac30bSAlexander V. Chernikov 	return (rtsock_routemsg(cmd, ifp, error, rt, fibnum));
22534cbac30bSAlexander V. Chernikov }
22544cbac30bSAlexander V. Chernikov 
22554cbac30bSAlexander V. Chernikov void
22564cbac30bSAlexander V. Chernikov rt_newaddrmsg(int cmd, struct ifaddr *ifa, int error, struct rtentry *rt)
22574cbac30bSAlexander V. Chernikov {
22584cbac30bSAlexander V. Chernikov 
22594cbac30bSAlexander V. Chernikov 	rt_newaddrmsg_fib(cmd, ifa, error, rt, RT_ALL_FIBS);
22604cbac30bSAlexander V. Chernikov }
22614cbac30bSAlexander V. Chernikov 
22624cbac30bSAlexander V. Chernikov /*
22634cbac30bSAlexander V. Chernikov  * This is called to generate messages from the routing socket
22644cbac30bSAlexander V. Chernikov  * indicating a network interface has had addresses associated with it.
22654cbac30bSAlexander V. Chernikov  */
22664cbac30bSAlexander V. Chernikov void
22674cbac30bSAlexander V. Chernikov rt_newaddrmsg_fib(int cmd, struct ifaddr *ifa, int error, struct rtentry *rt,
22684cbac30bSAlexander V. Chernikov     int fibnum)
22694cbac30bSAlexander V. Chernikov {
22704cbac30bSAlexander V. Chernikov 
22714cbac30bSAlexander V. Chernikov 	KASSERT(cmd == RTM_ADD || cmd == RTM_DELETE,
22724cbac30bSAlexander V. Chernikov 		("unexpected cmd %u", cmd));
2273d375edc9SAlexander V. Chernikov 	KASSERT(fibnum == RT_ALL_FIBS || (fibnum >= 0 && fibnum < rt_numfibs),
2274d375edc9SAlexander V. Chernikov 	    ("%s: fib out of range 0 <=%d<%d", __func__, fibnum, rt_numfibs));
22754cbac30bSAlexander V. Chernikov 
22764cbac30bSAlexander V. Chernikov 	if (cmd == RTM_ADD) {
22774cbac30bSAlexander V. Chernikov 		rt_addrmsg(cmd, ifa, fibnum);
22784cbac30bSAlexander V. Chernikov 		if (rt != NULL)
22794cbac30bSAlexander V. Chernikov 			rt_routemsg(cmd, ifa->ifa_ifp, error, rt, fibnum);
22804cbac30bSAlexander V. Chernikov 	} else {
22814cbac30bSAlexander V. Chernikov 		if (rt != NULL)
22824cbac30bSAlexander V. Chernikov 			rt_routemsg(cmd, ifa->ifa_ifp, error, rt, fibnum);
22834cbac30bSAlexander V. Chernikov 		rt_addrmsg(cmd, ifa, fibnum);
22844cbac30bSAlexander V. Chernikov 	}
22854cbac30bSAlexander V. Chernikov }
22864cbac30bSAlexander V. Chernikov 
2287