xref: /freebsd/sys/net/route.c (revision d6e23cf0cf52fc36a4f1583aed67332ad734fa1f)
1c398230bSWarner Losh /*-
251369649SPedro F. Giffuni  * SPDX-License-Identifier: BSD-3-Clause
351369649SPedro F. Giffuni  *
4df8bae1dSRodney W. Grimes  * Copyright (c) 1980, 1986, 1991, 1993
5df8bae1dSRodney W. Grimes  *	The Regents of the University of California.  All rights reserved.
6df8bae1dSRodney W. Grimes  *
7df8bae1dSRodney W. Grimes  * Redistribution and use in source and binary forms, with or without
8df8bae1dSRodney W. Grimes  * modification, are permitted provided that the following conditions
9df8bae1dSRodney W. Grimes  * are met:
10df8bae1dSRodney W. Grimes  * 1. Redistributions of source code must retain the above copyright
11df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer.
12df8bae1dSRodney W. Grimes  * 2. Redistributions in binary form must reproduce the above copyright
13df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer in the
14df8bae1dSRodney W. Grimes  *    documentation and/or other materials provided with the distribution.
15fbbd9655SWarner Losh  * 3. Neither the name of the University nor the names of its contributors
16df8bae1dSRodney W. Grimes  *    may be used to endorse or promote products derived from this software
17df8bae1dSRodney W. Grimes  *    without specific prior written permission.
18df8bae1dSRodney W. Grimes  *
19df8bae1dSRodney W. Grimes  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20df8bae1dSRodney W. Grimes  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21df8bae1dSRodney W. Grimes  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22df8bae1dSRodney W. Grimes  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23df8bae1dSRodney W. Grimes  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24df8bae1dSRodney W. Grimes  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25df8bae1dSRodney W. Grimes  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26df8bae1dSRodney W. Grimes  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27df8bae1dSRodney W. Grimes  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28df8bae1dSRodney W. Grimes  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29df8bae1dSRodney W. Grimes  * SUCH DAMAGE.
30df8bae1dSRodney W. Grimes  *
3142e9e16dSRuslan Ermilov  *	@(#)route.c	8.3.1.1 (Berkeley) 2/23/95
32c3aac50fSPeter Wemm  * $FreeBSD$
33df8bae1dSRodney W. Grimes  */
348b07e49aSJulian Elischer /************************************************************************
358b07e49aSJulian Elischer  * Note: In this file a 'fib' is a "forwarding information base"	*
368b07e49aSJulian Elischer  * Which is the new name for an in kernel routing (next hop) table.	*
378b07e49aSJulian Elischer  ***********************************************************************/
38df8bae1dSRodney W. Grimes 
391d5e9e22SEivind Eklund #include "opt_inet.h"
40096f2786SBjoern A. Zeeb #include "opt_inet6.h"
414bd49128SPeter Wemm #include "opt_mrouting.h"
42e440aed9SQing Li #include "opt_mpath.h"
43*d6e23cf0SMichael Tuexen #include "opt_route.h"
444bd49128SPeter Wemm 
45df8bae1dSRodney W. Grimes #include <sys/param.h>
46df8bae1dSRodney W. Grimes #include <sys/systm.h>
474d1d4912SBruce Evans #include <sys/malloc.h>
48df8bae1dSRodney W. Grimes #include <sys/mbuf.h>
49df8bae1dSRodney W. Grimes #include <sys/socket.h>
508b07e49aSJulian Elischer #include <sys/sysctl.h>
513120b9d4SKip Macy #include <sys/syslog.h>
528b07e49aSJulian Elischer #include <sys/sysproto.h>
538b07e49aSJulian Elischer #include <sys/proc.h>
54df8bae1dSRodney W. Grimes #include <sys/domain.h>
55cb64988fSLuoqi Chen #include <sys/kernel.h>
5620efcfc6SAndrey V. Elsukov #include <sys/lock.h>
5720efcfc6SAndrey V. Elsukov #include <sys/rmlock.h>
58df8bae1dSRodney W. Grimes 
59df8bae1dSRodney W. Grimes #include <net/if.h>
6076039bc8SGleb Smirnoff #include <net/if_var.h>
616e6b3f7cSQing Li #include <net/if_dl.h>
62df8bae1dSRodney W. Grimes #include <net/route.h>
6361eee0e2SAlexander V. Chernikov #include <net/route_var.h>
64530c0060SRobert Watson #include <net/vnet.h>
65df8bae1dSRodney W. Grimes 
66e440aed9SQing Li #ifdef RADIX_MPATH
67e440aed9SQing Li #include <net/radix_mpath.h>
68e440aed9SQing Li #endif
69e440aed9SQing Li 
70df8bae1dSRodney W. Grimes #include <netinet/in.h>
71b5e8ce9fSBruce Evans #include <netinet/ip_mroute.h>
72df8bae1dSRodney W. Grimes 
732dc1d581SAndre Oppermann #include <vm/uma.h>
742dc1d581SAndre Oppermann 
754871fc4aSJulian Elischer #define	RT_MAXFIBS	UINT16_MAX
76bfca216eSBjoern A. Zeeb 
77bfca216eSBjoern A. Zeeb /* Kernel config default option. */
78bfca216eSBjoern A. Zeeb #ifdef ROUTETABLES
79bfca216eSBjoern A. Zeeb #if ROUTETABLES <= 0
80bfca216eSBjoern A. Zeeb #error "ROUTETABLES defined too low"
81bfca216eSBjoern A. Zeeb #endif
82bfca216eSBjoern A. Zeeb #if ROUTETABLES > RT_MAXFIBS
83bfca216eSBjoern A. Zeeb #error "ROUTETABLES defined too big"
84bfca216eSBjoern A. Zeeb #endif
85bfca216eSBjoern A. Zeeb #define	RT_NUMFIBS	ROUTETABLES
86bfca216eSBjoern A. Zeeb #endif /* ROUTETABLES */
87bfca216eSBjoern A. Zeeb /* Initialize to default if not otherwise set. */
88bfca216eSBjoern A. Zeeb #ifndef	RT_NUMFIBS
89bfca216eSBjoern A. Zeeb #define	RT_NUMFIBS	1
90bfca216eSBjoern A. Zeeb #endif
91bfca216eSBjoern A. Zeeb 
924871fc4aSJulian Elischer /* This is read-only.. */
938b07e49aSJulian Elischer u_int rt_numfibs = RT_NUMFIBS;
94af3b2549SHans Petter Selasky SYSCTL_UINT(_net, OID_AUTO, fibs, CTLFLAG_RDTUN, &rt_numfibs, 0, "");
958b07e49aSJulian Elischer 
9666e8505fSJulian Elischer /*
9766e8505fSJulian Elischer  * By default add routes to all fibs for new interfaces.
9866e8505fSJulian Elischer  * Once this is set to 0 then only allocate routes on interface
9966e8505fSJulian Elischer  * changes for the FIB of the caller when adding a new set of addresses
10066e8505fSJulian Elischer  * to an interface.  XXX this is a shotgun aproach to a problem that needs
10166e8505fSJulian Elischer  * a more fine grained solution.. that will come.
102a8498625SBjoern A. Zeeb  * XXX also has the problems getting the FIB from curthread which will not
103a8498625SBjoern A. Zeeb  * always work given the fib can be overridden and prefixes can be added
104a8498625SBjoern A. Zeeb  * from the network stack context.
10566e8505fSJulian Elischer  */
106ee0bd4b9SHiroki Sato VNET_DEFINE(u_int, rt_add_addr_allfibs) = 1;
107ee0bd4b9SHiroki Sato SYSCTL_UINT(_net, OID_AUTO, add_addr_allfibs, CTLFLAG_RWTUN | CTLFLAG_VNET,
108ee0bd4b9SHiroki Sato     &VNET_NAME(rt_add_addr_allfibs), 0, "");
10966e8505fSJulian Elischer 
110eddfbb76SRobert Watson VNET_DEFINE(struct rtstat, rtstat);
1111e77c105SRobert Watson #define	V_rtstat	VNET(rtstat)
112b58ea5f3SBjoern A. Zeeb 
11361eee0e2SAlexander V. Chernikov VNET_DEFINE(struct rib_head *, rt_tables);
11482cea7e6SBjoern A. Zeeb #define	V_rt_tables	VNET(rt_tables)
11582cea7e6SBjoern A. Zeeb 
11682cea7e6SBjoern A. Zeeb VNET_DEFINE(int, rttrash);		/* routes not in table but not freed */
11782cea7e6SBjoern A. Zeeb #define	V_rttrash	VNET(rttrash)
11882cea7e6SBjoern A. Zeeb 
119bfe1aba4SMarko Zec 
120d6941ce9SLuigi Rizzo /*
121d6941ce9SLuigi Rizzo  * Convert a 'struct radix_node *' to a 'struct rtentry *'.
122d6941ce9SLuigi Rizzo  * The operation can be done safely (in this code) because a
123d6941ce9SLuigi Rizzo  * 'struct rtentry' starts with two 'struct radix_node''s, the first
124d6941ce9SLuigi Rizzo  * one representing leaf nodes in the routing tree, which is
125d6941ce9SLuigi Rizzo  * what the code in radix.c passes us as a 'struct radix_node'.
126d6941ce9SLuigi Rizzo  *
127d6941ce9SLuigi Rizzo  * But because there are a lot of assumptions in this conversion,
128d6941ce9SLuigi Rizzo  * do not cast explicitly, but always use the macro below.
129d6941ce9SLuigi Rizzo  */
130d6941ce9SLuigi Rizzo #define RNTORT(p)	((struct rtentry *)(p))
131d6941ce9SLuigi Rizzo 
1325f901c92SAndrew Turner VNET_DEFINE_STATIC(uma_zone_t, rtzone);		/* Routing table UMA zone. */
13382cea7e6SBjoern A. Zeeb #define	V_rtzone	VNET(rtzone)
13482cea7e6SBjoern A. Zeeb 
135*d6e23cf0SMichael Tuexen EVENTHANDLER_LIST_DEFINE(rt_addrmsg);
136*d6e23cf0SMichael Tuexen 
13761eee0e2SAlexander V. Chernikov static int rtrequest1_fib_change(struct rib_head *, struct rt_addrinfo *,
138c77462ddSAlexander V. Chernikov     struct rtentry **, u_int);
1390fb9298dSAlexander V. Chernikov static void rt_setmetrics(const struct rt_addrinfo *, struct rtentry *);
140e8b0643eSAlexander V. Chernikov static int rt_ifdelroute(const struct rtentry *rt, void *arg);
14161eee0e2SAlexander V. Chernikov static struct rtentry *rt_unlinkrte(struct rib_head *rnh,
142e8b0643eSAlexander V. Chernikov     struct rt_addrinfo *info, int *perror);
143e8b0643eSAlexander V. Chernikov static void rt_notifydelete(struct rtentry *rt, struct rt_addrinfo *info);
144e8b0643eSAlexander V. Chernikov #ifdef RADIX_MPATH
14561eee0e2SAlexander V. Chernikov static struct radix_node *rt_mpath_unlink(struct rib_head *rnh,
146e8b0643eSAlexander V. Chernikov     struct rt_addrinfo *info, struct rtentry *rto, int *perror);
147e8b0643eSAlexander V. Chernikov #endif
1489a1b64d5SAlexander V. Chernikov static int rt_exportinfo(struct rtentry *rt, struct rt_addrinfo *info,
1499a1b64d5SAlexander V. Chernikov     int flags);
150c77462ddSAlexander V. Chernikov 
1517f948f12SAlexander V. Chernikov struct if_mtuinfo
1527f948f12SAlexander V. Chernikov {
1537f948f12SAlexander V. Chernikov 	struct ifnet	*ifp;
1547f948f12SAlexander V. Chernikov 	int		mtu;
1557f948f12SAlexander V. Chernikov };
1567f948f12SAlexander V. Chernikov 
1577f948f12SAlexander V. Chernikov static int	if_updatemtu_cb(struct radix_node *, void *);
1587f948f12SAlexander V. Chernikov 
1598b07e49aSJulian Elischer /*
1608b07e49aSJulian Elischer  * handler for net.my_fibnum
1618b07e49aSJulian Elischer  */
1628b07e49aSJulian Elischer static int
1638b07e49aSJulian Elischer sysctl_my_fibnum(SYSCTL_HANDLER_ARGS)
164df8bae1dSRodney W. Grimes {
1658b07e49aSJulian Elischer         int fibnum;
1668b07e49aSJulian Elischer         int error;
1678b07e49aSJulian Elischer 
1688b07e49aSJulian Elischer         fibnum = curthread->td_proc->p_fibnum;
1698b07e49aSJulian Elischer         error = sysctl_handle_int(oidp, &fibnum, 0, req);
1708b07e49aSJulian Elischer         return (error);
171df8bae1dSRodney W. Grimes }
172df8bae1dSRodney W. Grimes 
1738b07e49aSJulian Elischer SYSCTL_PROC(_net, OID_AUTO, my_fibnum, CTLTYPE_INT|CTLFLAG_RD,
1748b07e49aSJulian Elischer             NULL, 0, &sysctl_my_fibnum, "I", "default FIB of caller");
1752dc1d581SAndre Oppermann 
17661eee0e2SAlexander V. Chernikov static __inline struct rib_head **
177c2c2a7c1SBjoern A. Zeeb rt_tables_get_rnh_ptr(int table, int fam)
178c2c2a7c1SBjoern A. Zeeb {
17961eee0e2SAlexander V. Chernikov 	struct rib_head **rnh;
180c2c2a7c1SBjoern A. Zeeb 
181c2c2a7c1SBjoern A. Zeeb 	KASSERT(table >= 0 && table < rt_numfibs, ("%s: table out of bounds.",
182c2c2a7c1SBjoern A. Zeeb 	    __func__));
183c2c2a7c1SBjoern A. Zeeb 	KASSERT(fam >= 0 && fam < (AF_MAX+1), ("%s: fam out of bounds.",
184c2c2a7c1SBjoern A. Zeeb 	    __func__));
185c2c2a7c1SBjoern A. Zeeb 
186c2c2a7c1SBjoern A. Zeeb 	/* rnh is [fib=0][af=0]. */
18761eee0e2SAlexander V. Chernikov 	rnh = (struct rib_head **)V_rt_tables;
188c2c2a7c1SBjoern A. Zeeb 	/* Get the offset to the requested table and fam. */
189c2c2a7c1SBjoern A. Zeeb 	rnh += table * (AF_MAX+1) + fam;
190c2c2a7c1SBjoern A. Zeeb 
191c2c2a7c1SBjoern A. Zeeb 	return (rnh);
192c2c2a7c1SBjoern A. Zeeb }
193c2c2a7c1SBjoern A. Zeeb 
19461eee0e2SAlexander V. Chernikov struct rib_head *
195c2c2a7c1SBjoern A. Zeeb rt_tables_get_rnh(int table, int fam)
196c2c2a7c1SBjoern A. Zeeb {
197c2c2a7c1SBjoern A. Zeeb 
198c2c2a7c1SBjoern A. Zeeb 	return (*rt_tables_get_rnh_ptr(table, fam));
199c2c2a7c1SBjoern A. Zeeb }
200c2c2a7c1SBjoern A. Zeeb 
2014f321dbdSBjoern A. Zeeb u_int
20284cc0778SGeorge V. Neville-Neil rt_tables_get_gen(int table, int fam)
20384cc0778SGeorge V. Neville-Neil {
20484cc0778SGeorge V. Neville-Neil 	struct rib_head *rnh;
20584cc0778SGeorge V. Neville-Neil 
20684cc0778SGeorge V. Neville-Neil 	rnh = *rt_tables_get_rnh_ptr(table, fam);
2076d768226SGeorge V. Neville-Neil 	KASSERT(rnh != NULL, ("%s: NULL rib_head pointer table %d fam %d",
2086d768226SGeorge V. Neville-Neil 	    __func__, table, fam));
20984cc0778SGeorge V. Neville-Neil 	return (rnh->rnh_gen);
21084cc0778SGeorge V. Neville-Neil }
21184cc0778SGeorge V. Neville-Neil 
21284cc0778SGeorge V. Neville-Neil 
213d0728d71SRobert Watson /*
214d0728d71SRobert Watson  * route initialization must occur before ip6_init2(), which happenas at
215d0728d71SRobert Watson  * SI_ORDER_MIDDLE.
216d0728d71SRobert Watson  */
2172eb5613fSLuigi Rizzo static void
2182eb5613fSLuigi Rizzo route_init(void)
219df8bae1dSRodney W. Grimes {
2208b07e49aSJulian Elischer 
2216f95a5ebSJulian Elischer 	/* whack the tunable ints into  line. */
2228b07e49aSJulian Elischer 	if (rt_numfibs > RT_MAXFIBS)
2238b07e49aSJulian Elischer 		rt_numfibs = RT_MAXFIBS;
2248b07e49aSJulian Elischer 	if (rt_numfibs == 0)
2258b07e49aSJulian Elischer 		rt_numfibs = 1;
2261ed81b73SMarko Zec }
227891cf3edSEd Maste SYSINIT(route_init, SI_SUB_PROTO_DOMAIN, SI_ORDER_THIRD, route_init, NULL);
2281ed81b73SMarko Zec 
229e3a7aa6fSGleb Smirnoff static int
230e3a7aa6fSGleb Smirnoff rtentry_zinit(void *mem, int size, int how)
231e3a7aa6fSGleb Smirnoff {
232e3a7aa6fSGleb Smirnoff 	struct rtentry *rt = mem;
233e3a7aa6fSGleb Smirnoff 
234b8af2820SMateusz Guzik 	rt->rt_pksent = counter_u64_alloc(how);
235e3a7aa6fSGleb Smirnoff 	if (rt->rt_pksent == NULL)
236e3a7aa6fSGleb Smirnoff 		return (ENOMEM);
237e3a7aa6fSGleb Smirnoff 
238e3a7aa6fSGleb Smirnoff 	RT_LOCK_INIT(rt);
239e3a7aa6fSGleb Smirnoff 
240e3a7aa6fSGleb Smirnoff 	return (0);
241e3a7aa6fSGleb Smirnoff }
242e3a7aa6fSGleb Smirnoff 
243e3a7aa6fSGleb Smirnoff static void
244e3a7aa6fSGleb Smirnoff rtentry_zfini(void *mem, int size)
245e3a7aa6fSGleb Smirnoff {
246e3a7aa6fSGleb Smirnoff 	struct rtentry *rt = mem;
247e3a7aa6fSGleb Smirnoff 
248e3a7aa6fSGleb Smirnoff 	RT_LOCK_DESTROY(rt);
249e3a7aa6fSGleb Smirnoff 	counter_u64_free(rt->rt_pksent);
250e3a7aa6fSGleb Smirnoff }
251e3a7aa6fSGleb Smirnoff 
252e3a7aa6fSGleb Smirnoff static int
253e3a7aa6fSGleb Smirnoff rtentry_ctor(void *mem, int size, void *arg, int how)
254e3a7aa6fSGleb Smirnoff {
255e3a7aa6fSGleb Smirnoff 	struct rtentry *rt = mem;
256e3a7aa6fSGleb Smirnoff 
257e3a7aa6fSGleb Smirnoff 	bzero(rt, offsetof(struct rtentry, rt_endzero));
258e3a7aa6fSGleb Smirnoff 	counter_u64_zero(rt->rt_pksent);
259e8b0643eSAlexander V. Chernikov 	rt->rt_chain = NULL;
260e3a7aa6fSGleb Smirnoff 
261e3a7aa6fSGleb Smirnoff 	return (0);
262e3a7aa6fSGleb Smirnoff }
263e3a7aa6fSGleb Smirnoff 
264d0728d71SRobert Watson static void
265256ea2abSGleb Smirnoff rtentry_dtor(void *mem, int size, void *arg)
266256ea2abSGleb Smirnoff {
267256ea2abSGleb Smirnoff 	struct rtentry *rt = mem;
268256ea2abSGleb Smirnoff 
269256ea2abSGleb Smirnoff 	RT_UNLOCK_COND(rt);
270256ea2abSGleb Smirnoff }
271256ea2abSGleb Smirnoff 
272256ea2abSGleb Smirnoff static void
273d0728d71SRobert Watson vnet_route_init(const void *unused __unused)
2741ed81b73SMarko Zec {
2751ed81b73SMarko Zec 	struct domain *dom;
27661eee0e2SAlexander V. Chernikov 	struct rib_head **rnh;
277c2c2a7c1SBjoern A. Zeeb 	int table;
2781ed81b73SMarko Zec 	int fam;
2791ed81b73SMarko Zec 
280c2c2a7c1SBjoern A. Zeeb 	V_rt_tables = malloc(rt_numfibs * (AF_MAX+1) *
28161eee0e2SAlexander V. Chernikov 	    sizeof(struct rib_head *), M_RTABLE, M_WAITOK|M_ZERO);
282c2c2a7c1SBjoern A. Zeeb 
283e3a7aa6fSGleb Smirnoff 	V_rtzone = uma_zcreate("rtentry", sizeof(struct rtentry),
284256ea2abSGleb Smirnoff 	    rtentry_ctor, rtentry_dtor,
285e3a7aa6fSGleb Smirnoff 	    rtentry_zinit, rtentry_zfini, UMA_ALIGN_PTR, 0);
2868b07e49aSJulian Elischer 	for (dom = domains; dom; dom = dom->dom_next) {
287b680a383SBjoern A. Zeeb 		if (dom->dom_rtattach == NULL)
288b680a383SBjoern A. Zeeb 			continue;
289b680a383SBjoern A. Zeeb 
2908b07e49aSJulian Elischer 		for  (table = 0; table < rt_numfibs; table++) {
291b680a383SBjoern A. Zeeb 			fam = dom->dom_family;
292b680a383SBjoern A. Zeeb 			if (table != 0 && fam != AF_INET6 && fam != AF_INET)
293b680a383SBjoern A. Zeeb 				break;
294b680a383SBjoern A. Zeeb 
295c2c2a7c1SBjoern A. Zeeb 			rnh = rt_tables_get_rnh_ptr(table, fam);
296c2c2a7c1SBjoern A. Zeeb 			if (rnh == NULL)
297c2c2a7c1SBjoern A. Zeeb 				panic("%s: rnh NULL", __func__);
298146a181fSAlexander V. Chernikov 			dom->dom_rtattach((void **)rnh, 0);
2998b07e49aSJulian Elischer 		}
3008b07e49aSJulian Elischer 	}
3018b07e49aSJulian Elischer }
302d0728d71SRobert Watson VNET_SYSINIT(vnet_route_init, SI_SUB_PROTO_DOMAIN, SI_ORDER_FOURTH,
303d0728d71SRobert Watson     vnet_route_init, 0);
3048b07e49aSJulian Elischer 
305bc29160dSMarko Zec #ifdef VIMAGE
306d0728d71SRobert Watson static void
307d0728d71SRobert Watson vnet_route_uninit(const void *unused __unused)
308bc29160dSMarko Zec {
309bc29160dSMarko Zec 	int table;
310bc29160dSMarko Zec 	int fam;
311bc29160dSMarko Zec 	struct domain *dom;
31261eee0e2SAlexander V. Chernikov 	struct rib_head **rnh;
313bc29160dSMarko Zec 
314bc29160dSMarko Zec 	for (dom = domains; dom; dom = dom->dom_next) {
315b680a383SBjoern A. Zeeb 		if (dom->dom_rtdetach == NULL)
316b680a383SBjoern A. Zeeb 			continue;
317b680a383SBjoern A. Zeeb 
318bc29160dSMarko Zec 		for (table = 0; table < rt_numfibs; table++) {
319b680a383SBjoern A. Zeeb 			fam = dom->dom_family;
320b680a383SBjoern A. Zeeb 
321b680a383SBjoern A. Zeeb 			if (table != 0 && fam != AF_INET6 && fam != AF_INET)
322b680a383SBjoern A. Zeeb 				break;
323b680a383SBjoern A. Zeeb 
324bc29160dSMarko Zec 			rnh = rt_tables_get_rnh_ptr(table, fam);
325bc29160dSMarko Zec 			if (rnh == NULL)
326bc29160dSMarko Zec 				panic("%s: rnh NULL", __func__);
32757c3556bSAlexander V. Chernikov 			dom->dom_rtdetach((void **)rnh, 0);
328bc29160dSMarko Zec 		}
329bc29160dSMarko Zec 	}
3306274ce3eSCraig Rodrigues 
3316274ce3eSCraig Rodrigues 	free(V_rt_tables, M_RTABLE);
3326274ce3eSCraig Rodrigues 	uma_zdestroy(V_rtzone);
333bc29160dSMarko Zec }
33489856f7eSBjoern A. Zeeb VNET_SYSUNINIT(vnet_route_uninit, SI_SUB_PROTO_DOMAIN, SI_ORDER_FIRST,
335d0728d71SRobert Watson     vnet_route_uninit, 0);
336bc29160dSMarko Zec #endif
337bc29160dSMarko Zec 
33861eee0e2SAlexander V. Chernikov struct rib_head *
33961eee0e2SAlexander V. Chernikov rt_table_init(int offset)
34061eee0e2SAlexander V. Chernikov {
34161eee0e2SAlexander V. Chernikov 	struct rib_head *rh;
34261eee0e2SAlexander V. Chernikov 
34361eee0e2SAlexander V. Chernikov 	rh = malloc(sizeof(struct rib_head), M_RTABLE, M_WAITOK | M_ZERO);
34461eee0e2SAlexander V. Chernikov 
34561eee0e2SAlexander V. Chernikov 	/* TODO: These details should be hidded inside radix.c */
34661eee0e2SAlexander V. Chernikov 	/* Init masks tree */
34761eee0e2SAlexander V. Chernikov 	rn_inithead_internal(&rh->head, rh->rnh_nodes, offset);
34861eee0e2SAlexander V. Chernikov 	rn_inithead_internal(&rh->rmhead.head, rh->rmhead.mask_nodes, 0);
34961eee0e2SAlexander V. Chernikov 	rh->head.rnh_masks = &rh->rmhead;
35061eee0e2SAlexander V. Chernikov 
35161eee0e2SAlexander V. Chernikov 	/* Init locks */
352abe95d87SAndrey V. Elsukov 	RIB_LOCK_INIT(rh);
35361eee0e2SAlexander V. Chernikov 
35461eee0e2SAlexander V. Chernikov 	/* Finally, set base callbacks */
35561eee0e2SAlexander V. Chernikov 	rh->rnh_addaddr = rn_addroute;
35661eee0e2SAlexander V. Chernikov 	rh->rnh_deladdr = rn_delete;
35761eee0e2SAlexander V. Chernikov 	rh->rnh_matchaddr = rn_match;
35861eee0e2SAlexander V. Chernikov 	rh->rnh_lookup = rn_lookup;
35961eee0e2SAlexander V. Chernikov 	rh->rnh_walktree = rn_walktree;
36061eee0e2SAlexander V. Chernikov 	rh->rnh_walktree_from = rn_walktree_from;
36161eee0e2SAlexander V. Chernikov 
36261eee0e2SAlexander V. Chernikov 	return (rh);
36361eee0e2SAlexander V. Chernikov }
36461eee0e2SAlexander V. Chernikov 
365a5243af2SBjoern A. Zeeb static int
366a5243af2SBjoern A. Zeeb rt_freeentry(struct radix_node *rn, void *arg)
367a5243af2SBjoern A. Zeeb {
368a5243af2SBjoern A. Zeeb 	struct radix_head * const rnh = arg;
369a5243af2SBjoern A. Zeeb 	struct radix_node *x;
370a5243af2SBjoern A. Zeeb 
371a5243af2SBjoern A. Zeeb 	x = (struct radix_node *)rn_delete(rn + 2, NULL, rnh);
372a5243af2SBjoern A. Zeeb 	if (x != NULL)
373a5243af2SBjoern A. Zeeb 		R_Free(x);
374a5243af2SBjoern A. Zeeb 	return (0);
375a5243af2SBjoern A. Zeeb }
376a5243af2SBjoern A. Zeeb 
37761eee0e2SAlexander V. Chernikov void
37861eee0e2SAlexander V. Chernikov rt_table_destroy(struct rib_head *rh)
37961eee0e2SAlexander V. Chernikov {
38061eee0e2SAlexander V. Chernikov 
381a5243af2SBjoern A. Zeeb 	rn_walktree(&rh->rmhead.head, rt_freeentry, &rh->rmhead.head);
382a5243af2SBjoern A. Zeeb 
38361eee0e2SAlexander V. Chernikov 	/* Assume table is already empty */
384abe95d87SAndrey V. Elsukov 	RIB_LOCK_DESTROY(rh);
38561eee0e2SAlexander V. Chernikov 	free(rh, M_RTABLE);
38661eee0e2SAlexander V. Chernikov }
38761eee0e2SAlexander V. Chernikov 
38861eee0e2SAlexander V. Chernikov 
3898b07e49aSJulian Elischer #ifndef _SYS_SYSPROTO_H_
3908b07e49aSJulian Elischer struct setfib_args {
3918b07e49aSJulian Elischer 	int     fibnum;
3928b07e49aSJulian Elischer };
3938b07e49aSJulian Elischer #endif
3948b07e49aSJulian Elischer int
3958451d0ddSKip Macy sys_setfib(struct thread *td, struct setfib_args *uap)
3968b07e49aSJulian Elischer {
3978b07e49aSJulian Elischer 	if (uap->fibnum < 0 || uap->fibnum >= rt_numfibs)
3988b07e49aSJulian Elischer 		return EINVAL;
3998b07e49aSJulian Elischer 	td->td_proc->p_fibnum = uap->fibnum;
4008b07e49aSJulian Elischer 	return (0);
401df8bae1dSRodney W. Grimes }
402df8bae1dSRodney W. Grimes 
403df8bae1dSRodney W. Grimes /*
404df8bae1dSRodney W. Grimes  * Packet routing routines.
405df8bae1dSRodney W. Grimes  */
406df8bae1dSRodney W. Grimes void
4078b07e49aSJulian Elischer rtalloc_ign_fib(struct route *ro, u_long ignore, u_int fibnum)
4088b07e49aSJulian Elischer {
4098b07e49aSJulian Elischer 	struct rtentry *rt;
4108b07e49aSJulian Elischer 
4118b07e49aSJulian Elischer 	if ((rt = ro->ro_rt) != NULL) {
4128b07e49aSJulian Elischer 		if (rt->rt_ifp != NULL && rt->rt_flags & RTF_UP)
4138b07e49aSJulian Elischer 			return;
4148b07e49aSJulian Elischer 		RTFREE(rt);
4158b07e49aSJulian Elischer 		ro->ro_rt = NULL;
4168b07e49aSJulian Elischer 	}
4178b07e49aSJulian Elischer 	ro->ro_rt = rtalloc1_fib(&ro->ro_dst, 1, ignore, fibnum);
418d1dd20beSSam Leffler 	if (ro->ro_rt)
419d1dd20beSSam Leffler 		RT_UNLOCK(ro->ro_rt);
420652082e6SGarrett Wollman }
421652082e6SGarrett Wollman 
422b0a76b88SJulian Elischer /*
423b0a76b88SJulian Elischer  * Look up the route that matches the address given
424b0a76b88SJulian Elischer  * Or, at least try.. Create a cloned route if needed.
425d1dd20beSSam Leffler  *
426d1dd20beSSam Leffler  * The returned route, if any, is locked.
427b0a76b88SJulian Elischer  */
428df8bae1dSRodney W. Grimes struct rtentry *
429d1dd20beSSam Leffler rtalloc1(struct sockaddr *dst, int report, u_long ignflags)
430df8bae1dSRodney W. Grimes {
431a8498625SBjoern A. Zeeb 
432a8498625SBjoern A. Zeeb 	return (rtalloc1_fib(dst, report, ignflags, RT_DEFAULT_FIB));
4338b07e49aSJulian Elischer }
4348b07e49aSJulian Elischer 
4358b07e49aSJulian Elischer struct rtentry *
4368b07e49aSJulian Elischer rtalloc1_fib(struct sockaddr *dst, int report, u_long ignflags,
4378b07e49aSJulian Elischer 		    u_int fibnum)
4388b07e49aSJulian Elischer {
43920efcfc6SAndrey V. Elsukov 	RIB_RLOCK_TRACKER;
44061eee0e2SAlexander V. Chernikov 	struct rib_head *rh;
441d1dd20beSSam Leffler 	struct radix_node *rn;
442d1dd20beSSam Leffler 	struct rtentry *newrt;
443df8bae1dSRodney W. Grimes 	struct rt_addrinfo info;
4446e6b3f7cSQing Li 	int err = 0, msgtype = RTM_MISS;
445df8bae1dSRodney W. Grimes 
4468b07e49aSJulian Elischer 	KASSERT((fibnum < rt_numfibs), ("rtalloc1_fib: bad fibnum"));
44761eee0e2SAlexander V. Chernikov 	rh = rt_tables_get_rnh(fibnum, dst->sa_family);
448e579f1c1SDmitry Chagin 	newrt = NULL;
44961eee0e2SAlexander V. Chernikov 	if (rh == NULL)
450523e6002SDmitry Chagin 		goto miss;
451523e6002SDmitry Chagin 
452b0a76b88SJulian Elischer 	/*
453b0a76b88SJulian Elischer 	 * Look up the address in the table for that Address Family
454b0a76b88SJulian Elischer 	 */
455b83aa367SAndrey V. Elsukov 	if ((ignflags & RTF_RNH_LOCKED) == 0)
45661eee0e2SAlexander V. Chernikov 		RIB_RLOCK(rh);
457b83aa367SAndrey V. Elsukov #ifdef INVARIANTS
458b83aa367SAndrey V. Elsukov 	else
459b83aa367SAndrey V. Elsukov 		RIB_LOCK_ASSERT(rh);
460b83aa367SAndrey V. Elsukov #endif
46161eee0e2SAlexander V. Chernikov 	rn = rh->rnh_matchaddr(dst, &rh->head);
4623120b9d4SKip Macy 	if (rn && ((rn->rn_flags & RNF_ROOT) == 0)) {
4636a873ef7SDmitry Chagin 		newrt = RNTORT(rn);
4643120b9d4SKip Macy 		RT_LOCK(newrt);
4653120b9d4SKip Macy 		RT_ADDREF(newrt);
466b83aa367SAndrey V. Elsukov 		if ((ignflags & RTF_RNH_LOCKED) == 0)
46761eee0e2SAlexander V. Chernikov 			RIB_RUNLOCK(rh);
4680eb64f4eSAlexander V. Chernikov 		return (newrt);
4696e6b3f7cSQing Li 
470b83aa367SAndrey V. Elsukov 	} else if ((ignflags & RTF_RNH_LOCKED) == 0)
47161eee0e2SAlexander V. Chernikov 		RIB_RUNLOCK(rh);
472b0a76b88SJulian Elischer 	/*
4738f1c8adeSLuiz Otavio O Souza 	 * Either we hit the root or could not find any match,
4748f1c8adeSLuiz Otavio O Souza 	 * which basically means: "cannot get there from here".
475b0a76b88SJulian Elischer 	 */
476956b0b65SJeffrey Hsu miss:
477523e6002SDmitry Chagin 	V_rtstat.rts_unreach++;
478523e6002SDmitry Chagin 
4796e6b3f7cSQing Li 	if (report) {
480b0a76b88SJulian Elischer 		/*
481b0a76b88SJulian Elischer 		 * If required, report the failure to the supervising
482b0a76b88SJulian Elischer 		 * Authorities.
483b0a76b88SJulian Elischer 		 * For a delete, this is not an error. (report == 0)
484b0a76b88SJulian Elischer 		 */
4856f5967c0SBruce Evans 		bzero(&info, sizeof(info));
486df8bae1dSRodney W. Grimes 		info.rti_info[RTAX_DST] = dst;
487528737fdSBjoern A. Zeeb 		rt_missmsg_fib(msgtype, &info, 0, err, fibnum);
488df8bae1dSRodney W. Grimes 	}
489df8bae1dSRodney W. Grimes 	return (newrt);
490df8bae1dSRodney W. Grimes }
491df8bae1dSRodney W. Grimes 
492499676dfSJulian Elischer /*
493499676dfSJulian Elischer  * Remove a reference count from an rtentry.
494499676dfSJulian Elischer  * If the count gets low enough, take it out of the routing table
495499676dfSJulian Elischer  */
496df8bae1dSRodney W. Grimes void
497d1dd20beSSam Leffler rtfree(struct rtentry *rt)
498df8bae1dSRodney W. Grimes {
49961eee0e2SAlexander V. Chernikov 	struct rib_head *rnh;
500df8bae1dSRodney W. Grimes 
501a0c0e34bSGleb Smirnoff 	KASSERT(rt != NULL,("%s: NULL rt", __func__));
502c2c2a7c1SBjoern A. Zeeb 	rnh = rt_tables_get_rnh(rt->rt_fibnum, rt_key(rt)->sa_family);
503a0c0e34bSGleb Smirnoff 	KASSERT(rnh != NULL,("%s: NULL rnh", __func__));
504499676dfSJulian Elischer 
505d1dd20beSSam Leffler 	RT_LOCK_ASSERT(rt);
506d1dd20beSSam Leffler 
507499676dfSJulian Elischer 	/*
508a0c0e34bSGleb Smirnoff 	 * The callers should use RTFREE_LOCKED() or RTFREE(), so
509a0c0e34bSGleb Smirnoff 	 * we should come here exactly with the last reference.
510499676dfSJulian Elischer 	 */
5117138d65cSSam Leffler 	RT_REMREF(rt);
512a0c0e34bSGleb Smirnoff 	if (rt->rt_refcnt > 0) {
513a42ea597SQing Li 		log(LOG_DEBUG, "%s: %p has %d refs\n", __func__, rt, rt->rt_refcnt);
514d1dd20beSSam Leffler 		goto done;
515a0c0e34bSGleb Smirnoff 	}
5169c63e9dbSSam Leffler 
5179c63e9dbSSam Leffler 	/*
5189c63e9dbSSam Leffler 	 * On last reference give the "close method" a chance
5199c63e9dbSSam Leffler 	 * to cleanup private state.  This also permits (for
5209c63e9dbSSam Leffler 	 * IPv4 and IPv6) a chance to decide if the routing table
5219c63e9dbSSam Leffler 	 * entry should be purged immediately or at a later time.
5229c63e9dbSSam Leffler 	 * When an immediate purge is to happen the close routine
5239c63e9dbSSam Leffler 	 * typically calls rtexpunge which clears the RTF_UP flag
5249c63e9dbSSam Leffler 	 * on the entry so that the code below reclaims the storage.
5259c63e9dbSSam Leffler 	 */
526d1dd20beSSam Leffler 	if (rt->rt_refcnt == 0 && rnh->rnh_close)
52761eee0e2SAlexander V. Chernikov 		rnh->rnh_close((struct radix_node *)rt, &rnh->head);
528499676dfSJulian Elischer 
529499676dfSJulian Elischer 	/*
530499676dfSJulian Elischer 	 * If we are no longer "up" (and ref == 0)
531499676dfSJulian Elischer 	 * then we can free the resources associated
532499676dfSJulian Elischer 	 * with the route.
533499676dfSJulian Elischer 	 */
534d1dd20beSSam Leffler 	if ((rt->rt_flags & RTF_UP) == 0) {
535df8bae1dSRodney W. Grimes 		if (rt->rt_nodes->rn_flags & (RNF_ACTIVE | RNF_ROOT))
536df8bae1dSRodney W. Grimes 			panic("rtfree 2");
537499676dfSJulian Elischer 		/*
538499676dfSJulian Elischer 		 * the rtentry must have been removed from the routing table
539499676dfSJulian Elischer 		 * so it is represented in rttrash.. remove that now.
540499676dfSJulian Elischer 		 */
541603724d3SBjoern A. Zeeb 		V_rttrash--;
542499676dfSJulian Elischer #ifdef	DIAGNOSTIC
543df8bae1dSRodney W. Grimes 		if (rt->rt_refcnt < 0) {
544623ae52eSPoul-Henning Kamp 			printf("rtfree: %p not freed (neg refs)\n", rt);
545d1dd20beSSam Leffler 			goto done;
546df8bae1dSRodney W. Grimes 		}
547499676dfSJulian Elischer #endif
548499676dfSJulian Elischer 		/*
549499676dfSJulian Elischer 		 * release references on items we hold them on..
550499676dfSJulian Elischer 		 * e.g other routes and ifaddrs.
551499676dfSJulian Elischer 		 */
55219fc74fbSJeffrey Hsu 		if (rt->rt_ifa)
5531099f828SRobert Watson 			ifa_free(rt->rt_ifa);
554499676dfSJulian Elischer 		/*
555499676dfSJulian Elischer 		 * The key is separatly alloc'd so free it (see rt_setgate()).
556499676dfSJulian Elischer 		 * This also frees the gateway, as they are always malloc'd
557499676dfSJulian Elischer 		 * together.
558499676dfSJulian Elischer 		 */
5598b15f615SLuiz Otavio O Souza 		R_Free(rt_key(rt));
560499676dfSJulian Elischer 
561499676dfSJulian Elischer 		/*
562499676dfSJulian Elischer 		 * and the rtentry itself of course
563499676dfSJulian Elischer 		 */
5641ed81b73SMarko Zec 		uma_zfree(V_rtzone, rt);
565d1dd20beSSam Leffler 		return;
566df8bae1dSRodney W. Grimes 	}
567d1dd20beSSam Leffler done:
568d1dd20beSSam Leffler 	RT_UNLOCK(rt);
569df8bae1dSRodney W. Grimes }
570df8bae1dSRodney W. Grimes 
571df8bae1dSRodney W. Grimes 
572df8bae1dSRodney W. Grimes /*
573df8bae1dSRodney W. Grimes  * Force a routing table entry to the specified
574df8bae1dSRodney W. Grimes  * destination to go through the given gateway.
575df8bae1dSRodney W. Grimes  * Normally called as a result of a routing redirect
576df8bae1dSRodney W. Grimes  * message from the network layer.
577df8bae1dSRodney W. Grimes  */
57826f9a767SRodney W. Grimes void
5798b07e49aSJulian Elischer rtredirect_fib(struct sockaddr *dst,
5808b07e49aSJulian Elischer 	struct sockaddr *gateway,
5818b07e49aSJulian Elischer 	struct sockaddr *netmask,
5828b07e49aSJulian Elischer 	int flags,
5838b07e49aSJulian Elischer 	struct sockaddr *src,
5848b07e49aSJulian Elischer 	u_int fibnum)
5858b07e49aSJulian Elischer {
586f2b2e77aSAlexander V. Chernikov 	struct rtentry *rt;
587df8bae1dSRodney W. Grimes 	int error = 0;
58885911824SLuigi Rizzo 	short *stat = NULL;
589df8bae1dSRodney W. Grimes 	struct rt_addrinfo info;
590df8bae1dSRodney W. Grimes 	struct ifaddr *ifa;
59161eee0e2SAlexander V. Chernikov 	struct rib_head *rnh;
592c2c2a7c1SBjoern A. Zeeb 
593b8a6e03fSGleb Smirnoff 	NET_EPOCH_ASSERT();
594b8a6e03fSGleb Smirnoff 
5958c0fec80SRobert Watson 	ifa = NULL;
596c2c2a7c1SBjoern A. Zeeb 	rnh = rt_tables_get_rnh(fibnum, dst->sa_family);
597c2c2a7c1SBjoern A. Zeeb 	if (rnh == NULL) {
598c2c2a7c1SBjoern A. Zeeb 		error = EAFNOSUPPORT;
599c2c2a7c1SBjoern A. Zeeb 		goto out;
600c2c2a7c1SBjoern A. Zeeb 	}
601df8bae1dSRodney W. Grimes 	/* verify the gateway is directly reachable */
6024f8585e0SAlan Somers 	if ((ifa = ifa_ifwithnet(gateway, 0, fibnum)) == NULL) {
603df8bae1dSRodney W. Grimes 		error = ENETUNREACH;
604df8bae1dSRodney W. Grimes 		goto out;
605df8bae1dSRodney W. Grimes 	}
6068b07e49aSJulian Elischer 	rt = rtalloc1_fib(dst, 0, 0UL, fibnum);	/* NB: rt is locked */
607df8bae1dSRodney W. Grimes 	/*
608df8bae1dSRodney W. Grimes 	 * If the redirect isn't from our current router for this dst,
609df8bae1dSRodney W. Grimes 	 * it's either old or wrong.  If it redirects us to ourselves,
610df8bae1dSRodney W. Grimes 	 * we have a routing loop, perhaps as a result of an interface
611df8bae1dSRodney W. Grimes 	 * going down recently.
612df8bae1dSRodney W. Grimes 	 */
61317a03656SEric van Gyzen 	if (!(flags & RTF_DONE) && rt) {
61417a03656SEric van Gyzen 		if (!sa_equal(src, rt->rt_gateway)) {
615df8bae1dSRodney W. Grimes 			error = EINVAL;
616df8bae1dSRodney W. Grimes 			goto done;
61717a03656SEric van Gyzen 		}
61817a03656SEric van Gyzen 		if (rt->rt_ifa != ifa && ifa->ifa_addr->sa_family != AF_LINK) {
61917a03656SEric van Gyzen 			error = EINVAL;
62017a03656SEric van Gyzen 			goto done;
62117a03656SEric van Gyzen 		}
62217a03656SEric van Gyzen 	}
62317a03656SEric van Gyzen 	if ((flags & RTF_GATEWAY) && ifa_ifwithaddr_check(gateway)) {
62417a03656SEric van Gyzen 		error = EHOSTUNREACH;
62517a03656SEric van Gyzen 		goto done;
62617a03656SEric van Gyzen 	}
627df8bae1dSRodney W. Grimes 	/*
628df8bae1dSRodney W. Grimes 	 * Create a new entry if we just got back a wildcard entry
6296bccea7cSRebecca Cran 	 * or the lookup failed.  This is necessary for hosts
630df8bae1dSRodney W. Grimes 	 * which use routing redirects generated by smart gateways
631df8bae1dSRodney W. Grimes 	 * to dynamically build the routing tables.
632df8bae1dSRodney W. Grimes 	 */
63385911824SLuigi Rizzo 	if (rt == NULL || (rt_mask(rt) && rt_mask(rt)->sa_len < 2))
634df8bae1dSRodney W. Grimes 		goto create;
635df8bae1dSRodney W. Grimes 	/*
636df8bae1dSRodney W. Grimes 	 * Don't listen to the redirect if it's
637df8bae1dSRodney W. Grimes 	 * for a route to an interface.
638df8bae1dSRodney W. Grimes 	 */
639df8bae1dSRodney W. Grimes 	if (rt->rt_flags & RTF_GATEWAY) {
640df8bae1dSRodney W. Grimes 		if (((rt->rt_flags & RTF_HOST) == 0) && (flags & RTF_HOST)) {
641df8bae1dSRodney W. Grimes 			/*
642df8bae1dSRodney W. Grimes 			 * Changing from route to net => route to host.
643df8bae1dSRodney W. Grimes 			 * Create new route, rather than smashing route to net.
644df8bae1dSRodney W. Grimes 			 */
645df8bae1dSRodney W. Grimes 		create:
646fcbfdb37SAlexander V. Chernikov 			if (rt != NULL)
647fcbfdb37SAlexander V. Chernikov 				RTFREE_LOCKED(rt);
6488e7e854cSKip Macy 
64917a03656SEric van Gyzen 			flags |= RTF_DYNAMIC;
6508071913dSRuslan Ermilov 			bzero((caddr_t)&info, sizeof(info));
6518071913dSRuslan Ermilov 			info.rti_info[RTAX_DST] = dst;
6528071913dSRuslan Ermilov 			info.rti_info[RTAX_GATEWAY] = gateway;
6538071913dSRuslan Ermilov 			info.rti_info[RTAX_NETMASK] = netmask;
6541ebec5faSMatt Macy 			ifa_ref(ifa);
6558071913dSRuslan Ermilov 			info.rti_ifa = ifa;
6568071913dSRuslan Ermilov 			info.rti_flags = flags;
6578b07e49aSJulian Elischer 			error = rtrequest1_fib(RTM_ADD, &info, &rt, fibnum);
658d1dd20beSSam Leffler 			if (rt != NULL) {
6594de5d90cSSam Leffler 				RT_LOCK(rt);
6608071913dSRuslan Ermilov 				flags = rt->rt_flags;
661d1dd20beSSam Leffler 			}
6628e7e854cSKip Macy 
663603724d3SBjoern A. Zeeb 			stat = &V_rtstat.rts_dynamic;
664df8bae1dSRodney W. Grimes 		} else {
6658e7e854cSKip Macy 
666df8bae1dSRodney W. Grimes 			/*
667df8bae1dSRodney W. Grimes 			 * Smash the current notion of the gateway to
668df8bae1dSRodney W. Grimes 			 * this destination.  Should check about netmask!!!
669df8bae1dSRodney W. Grimes 			 */
67017a03656SEric van Gyzen 			if ((flags & RTF_GATEWAY) == 0)
67117a03656SEric van Gyzen 				rt->rt_flags &= ~RTF_GATEWAY;
672df8bae1dSRodney W. Grimes 			rt->rt_flags |= RTF_MODIFIED;
673df8bae1dSRodney W. Grimes 			flags |= RTF_MODIFIED;
674603724d3SBjoern A. Zeeb 			stat = &V_rtstat.rts_newgateway;
675499676dfSJulian Elischer 			/*
676499676dfSJulian Elischer 			 * add the key and gateway (in one malloc'd chunk).
677499676dfSJulian Elischer 			 */
6783120b9d4SKip Macy 			RT_UNLOCK(rt);
67961eee0e2SAlexander V. Chernikov 			RIB_WLOCK(rnh);
6803120b9d4SKip Macy 			RT_LOCK(rt);
681df8bae1dSRodney W. Grimes 			rt_setgate(rt, rt_key(rt), gateway);
68261eee0e2SAlexander V. Chernikov 			RIB_WUNLOCK(rnh);
683df8bae1dSRodney W. Grimes 		}
684df8bae1dSRodney W. Grimes 	} else
685df8bae1dSRodney W. Grimes 		error = EHOSTUNREACH;
686df8bae1dSRodney W. Grimes done:
687d1dd20beSSam Leffler 	if (rt)
6881951e633SJohn Baldwin 		RTFREE_LOCKED(rt);
689df8bae1dSRodney W. Grimes  out:
690df8bae1dSRodney W. Grimes 	if (error)
691603724d3SBjoern A. Zeeb 		V_rtstat.rts_badredirect++;
692df8bae1dSRodney W. Grimes 	else if (stat != NULL)
693df8bae1dSRodney W. Grimes 		(*stat)++;
694df8bae1dSRodney W. Grimes 	bzero((caddr_t)&info, sizeof(info));
695df8bae1dSRodney W. Grimes 	info.rti_info[RTAX_DST] = dst;
696df8bae1dSRodney W. Grimes 	info.rti_info[RTAX_GATEWAY] = gateway;
697df8bae1dSRodney W. Grimes 	info.rti_info[RTAX_NETMASK] = netmask;
698df8bae1dSRodney W. Grimes 	info.rti_info[RTAX_AUTHOR] = src;
699528737fdSBjoern A. Zeeb 	rt_missmsg_fib(RTM_REDIRECT, &info, flags, error, fibnum);
700df8bae1dSRodney W. Grimes }
701df8bae1dSRodney W. Grimes 
702df8bae1dSRodney W. Grimes /*
703df8bae1dSRodney W. Grimes  * Routing table ioctl interface.
704df8bae1dSRodney W. Grimes  */
705df8bae1dSRodney W. Grimes int
7068b07e49aSJulian Elischer rtioctl_fib(u_long req, caddr_t data, u_int fibnum)
707df8bae1dSRodney W. Grimes {
7085090559bSChristian S.J. Peron 
7095090559bSChristian S.J. Peron 	/*
7105090559bSChristian S.J. Peron 	 * If more ioctl commands are added here, make sure the proper
7115090559bSChristian S.J. Peron 	 * super-user checks are being performed because it is possible for
7125090559bSChristian S.J. Peron 	 * prison-root to make it this far if raw sockets have been enabled
7135090559bSChristian S.J. Peron 	 * in jails.
7145090559bSChristian S.J. Peron 	 */
715623ae52eSPoul-Henning Kamp #ifdef INET
716f0068c4aSGarrett Wollman 	/* Multicast goop, grrr... */
7178b07e49aSJulian Elischer 	return mrt_ioctl ? mrt_ioctl(req, data, fibnum) : EOPNOTSUPP;
718623ae52eSPoul-Henning Kamp #else /* INET */
719623ae52eSPoul-Henning Kamp 	return ENXIO;
720623ae52eSPoul-Henning Kamp #endif /* INET */
721df8bae1dSRodney W. Grimes }
722df8bae1dSRodney W. Grimes 
723df8bae1dSRodney W. Grimes struct ifaddr *
724441f9243SAlexander V. Chernikov ifa_ifwithroute(int flags, const struct sockaddr *dst, struct sockaddr *gateway,
7258b07e49aSJulian Elischer 				u_int fibnum)
7268b07e49aSJulian Elischer {
727f59c6cb0SAlexander V. Chernikov 	struct ifaddr *ifa;
728e034e82cSQing Li 	int not_found = 0;
729d1dd20beSSam Leffler 
7306573d758SMatt Macy 	MPASS(in_epoch(net_epoch_preempt));
731df8bae1dSRodney W. Grimes 	if ((flags & RTF_GATEWAY) == 0) {
732df8bae1dSRodney W. Grimes 		/*
733df8bae1dSRodney W. Grimes 		 * If we are adding a route to an interface,
734df8bae1dSRodney W. Grimes 		 * and the interface is a pt to pt link
735df8bae1dSRodney W. Grimes 		 * we should search for the destination
736df8bae1dSRodney W. Grimes 		 * as our clue to the interface.  Otherwise
737df8bae1dSRodney W. Grimes 		 * we can use the local address.
738df8bae1dSRodney W. Grimes 		 */
73985911824SLuigi Rizzo 		ifa = NULL;
74085911824SLuigi Rizzo 		if (flags & RTF_HOST)
7414f8585e0SAlan Somers 			ifa = ifa_ifwithdstaddr(dst, fibnum);
74285911824SLuigi Rizzo 		if (ifa == NULL)
743df8bae1dSRodney W. Grimes 			ifa = ifa_ifwithaddr(gateway);
744df8bae1dSRodney W. Grimes 	} else {
745df8bae1dSRodney W. Grimes 		/*
746df8bae1dSRodney W. Grimes 		 * If we are adding a route to a remote net
747df8bae1dSRodney W. Grimes 		 * or host, the gateway may still be on the
748df8bae1dSRodney W. Grimes 		 * other end of a pt to pt link.
749df8bae1dSRodney W. Grimes 		 */
7504f8585e0SAlan Somers 		ifa = ifa_ifwithdstaddr(gateway, fibnum);
751df8bae1dSRodney W. Grimes 	}
75285911824SLuigi Rizzo 	if (ifa == NULL)
7534f8585e0SAlan Somers 		ifa = ifa_ifwithnet(gateway, 0, fibnum);
75485911824SLuigi Rizzo 	if (ifa == NULL) {
755b83aa367SAndrey V. Elsukov 		struct rtentry *rt;
756b83aa367SAndrey V. Elsukov 
757b83aa367SAndrey V. Elsukov 		rt = rtalloc1_fib(gateway, 0, flags, fibnum);
75885911824SLuigi Rizzo 		if (rt == NULL)
7594f6c66ccSMatt Macy 			goto out;
760e034e82cSQing Li 		/*
761e034e82cSQing Li 		 * dismiss a gateway that is reachable only
762e034e82cSQing Li 		 * through the default router
763e034e82cSQing Li 		 */
764e034e82cSQing Li 		switch (gateway->sa_family) {
765e034e82cSQing Li 		case AF_INET:
766e034e82cSQing Li 			if (satosin(rt_key(rt))->sin_addr.s_addr == INADDR_ANY)
767e034e82cSQing Li 				not_found = 1;
768e034e82cSQing Li 			break;
769e034e82cSQing Li 		case AF_INET6:
770e034e82cSQing Li 			if (IN6_IS_ADDR_UNSPECIFIED(&satosin6(rt_key(rt))->sin6_addr))
771e034e82cSQing Li 				not_found = 1;
772e034e82cSQing Li 			break;
773e034e82cSQing Li 		default:
774e034e82cSQing Li 			break;
775e034e82cSQing Li 		}
7768c0fec80SRobert Watson 		if (!not_found && rt->rt_ifa != NULL) {
7778c0fec80SRobert Watson 			ifa = rt->rt_ifa;
7788c0fec80SRobert Watson 		}
7797138d65cSSam Leffler 		RT_REMREF(rt);
780d1dd20beSSam Leffler 		RT_UNLOCK(rt);
7818c0fec80SRobert Watson 		if (not_found || ifa == NULL)
7824f6c66ccSMatt Macy 			goto out;
783df8bae1dSRodney W. Grimes 	}
784df8bae1dSRodney W. Grimes 	if (ifa->ifa_addr->sa_family != dst->sa_family) {
785df8bae1dSRodney W. Grimes 		struct ifaddr *oifa = ifa;
786df8bae1dSRodney W. Grimes 		ifa = ifaof_ifpforaddr(dst, ifa->ifa_ifp);
78785911824SLuigi Rizzo 		if (ifa == NULL)
788df8bae1dSRodney W. Grimes 			ifa = oifa;
789df8bae1dSRodney W. Grimes 	}
7904f6c66ccSMatt Macy  out:
791df8bae1dSRodney W. Grimes 	return (ifa);
792df8bae1dSRodney W. Grimes }
793df8bae1dSRodney W. Grimes 
794b0a76b88SJulian Elischer /*
795b0a76b88SJulian Elischer  * Do appropriate manipulations of a routing tree given
796b0a76b88SJulian Elischer  * all the bits of info needed
797b0a76b88SJulian Elischer  */
798df8bae1dSRodney W. Grimes int
7998b07e49aSJulian Elischer rtrequest_fib(int req,
8008b07e49aSJulian Elischer 	struct sockaddr *dst,
8018b07e49aSJulian Elischer 	struct sockaddr *gateway,
8028b07e49aSJulian Elischer 	struct sockaddr *netmask,
8038b07e49aSJulian Elischer 	int flags,
8048b07e49aSJulian Elischer 	struct rtentry **ret_nrt,
8058b07e49aSJulian Elischer 	u_int fibnum)
8068b07e49aSJulian Elischer {
8078071913dSRuslan Ermilov 	struct rt_addrinfo info;
8088071913dSRuslan Ermilov 
809ac4a76ebSBjoern A. Zeeb 	if (dst->sa_len == 0)
810ac4a76ebSBjoern A. Zeeb 		return(EINVAL);
811ac4a76ebSBjoern A. Zeeb 
8128071913dSRuslan Ermilov 	bzero((caddr_t)&info, sizeof(info));
8138071913dSRuslan Ermilov 	info.rti_flags = flags;
8148071913dSRuslan Ermilov 	info.rti_info[RTAX_DST] = dst;
8158071913dSRuslan Ermilov 	info.rti_info[RTAX_GATEWAY] = gateway;
8168071913dSRuslan Ermilov 	info.rti_info[RTAX_NETMASK] = netmask;
8178b07e49aSJulian Elischer 	return rtrequest1_fib(req, &info, ret_nrt, fibnum);
8188071913dSRuslan Ermilov }
8198071913dSRuslan Ermilov 
8204bdf0b6aSAlexander V. Chernikov 
8212caee4beSAlexander V. Chernikov /*
8229a1b64d5SAlexander V. Chernikov  * Copy most of @rt data into @info.
8239a1b64d5SAlexander V. Chernikov  *
8249a1b64d5SAlexander V. Chernikov  * If @flags contains NHR_COPY, copies dst,netmask and gw to the
8259a1b64d5SAlexander V. Chernikov  * pointers specified by @info structure. Assume such pointers
8269a1b64d5SAlexander V. Chernikov  * are zeroed sockaddr-like structures with sa_len field initialized
8279a1b64d5SAlexander V. Chernikov  * to reflect size of the provided buffer. if no NHR_COPY is specified,
8289a1b64d5SAlexander V. Chernikov  * point dst,netmask and gw @info fields to appropriate @rt values.
8299a1b64d5SAlexander V. Chernikov  *
8309a1b64d5SAlexander V. Chernikov  * if @flags contains NHR_REF, do refcouting on rt_ifp.
8319a1b64d5SAlexander V. Chernikov  *
8329a1b64d5SAlexander V. Chernikov  * Returns 0 on success.
8339a1b64d5SAlexander V. Chernikov  */
8349a1b64d5SAlexander V. Chernikov int
8359a1b64d5SAlexander V. Chernikov rt_exportinfo(struct rtentry *rt, struct rt_addrinfo *info, int flags)
8369a1b64d5SAlexander V. Chernikov {
8379a1b64d5SAlexander V. Chernikov 	struct rt_metrics *rmx;
8389a1b64d5SAlexander V. Chernikov 	struct sockaddr *src, *dst;
8399a1b64d5SAlexander V. Chernikov 	int sa_len;
8409a1b64d5SAlexander V. Chernikov 
8419a1b64d5SAlexander V. Chernikov 	if (flags & NHR_COPY) {
8429a1b64d5SAlexander V. Chernikov 		/* Copy destination if dst is non-zero */
8439a1b64d5SAlexander V. Chernikov 		src = rt_key(rt);
8449a1b64d5SAlexander V. Chernikov 		dst = info->rti_info[RTAX_DST];
8459a1b64d5SAlexander V. Chernikov 		sa_len = src->sa_len;
84616703ea8SAlexander V. Chernikov 		if (dst != NULL) {
8479a1b64d5SAlexander V. Chernikov 			if (src->sa_len > dst->sa_len)
8489a1b64d5SAlexander V. Chernikov 				return (ENOMEM);
8499a1b64d5SAlexander V. Chernikov 			memcpy(dst, src, src->sa_len);
8509a1b64d5SAlexander V. Chernikov 			info->rti_addrs |= RTA_DST;
8519a1b64d5SAlexander V. Chernikov 		}
8529a1b64d5SAlexander V. Chernikov 
8539a1b64d5SAlexander V. Chernikov 		/* Copy mask if set && dst is non-zero */
8549a1b64d5SAlexander V. Chernikov 		src = rt_mask(rt);
8559a1b64d5SAlexander V. Chernikov 		dst = info->rti_info[RTAX_NETMASK];
8569a1b64d5SAlexander V. Chernikov 		if (src != NULL && dst != NULL) {
8579a1b64d5SAlexander V. Chernikov 
8589a1b64d5SAlexander V. Chernikov 			/*
8599a1b64d5SAlexander V. Chernikov 			 * Radix stores different value in sa_len,
8609a1b64d5SAlexander V. Chernikov 			 * assume rt_mask() to have the same length
8619a1b64d5SAlexander V. Chernikov 			 * as rt_key()
8629a1b64d5SAlexander V. Chernikov 			 */
8639a1b64d5SAlexander V. Chernikov 			if (sa_len > dst->sa_len)
8649a1b64d5SAlexander V. Chernikov 				return (ENOMEM);
8659a1b64d5SAlexander V. Chernikov 			memcpy(dst, src, src->sa_len);
8669a1b64d5SAlexander V. Chernikov 			info->rti_addrs |= RTA_NETMASK;
8679a1b64d5SAlexander V. Chernikov 		}
8689a1b64d5SAlexander V. Chernikov 
8699a1b64d5SAlexander V. Chernikov 		/* Copy gateway is set && dst is non-zero */
8709a1b64d5SAlexander V. Chernikov 		src = rt->rt_gateway;
8719a1b64d5SAlexander V. Chernikov 		dst = info->rti_info[RTAX_GATEWAY];
8729a1b64d5SAlexander V. Chernikov 		if ((rt->rt_flags & RTF_GATEWAY) && src != NULL && dst != NULL){
8739a1b64d5SAlexander V. Chernikov 			if (src->sa_len > dst->sa_len)
8749a1b64d5SAlexander V. Chernikov 				return (ENOMEM);
8759a1b64d5SAlexander V. Chernikov 			memcpy(dst, src, src->sa_len);
8769a1b64d5SAlexander V. Chernikov 			info->rti_addrs |= RTA_GATEWAY;
8779a1b64d5SAlexander V. Chernikov 		}
8789a1b64d5SAlexander V. Chernikov 	} else {
8799a1b64d5SAlexander V. Chernikov 		info->rti_info[RTAX_DST] = rt_key(rt);
8809a1b64d5SAlexander V. Chernikov 		info->rti_addrs |= RTA_DST;
8819a1b64d5SAlexander V. Chernikov 		if (rt_mask(rt) != NULL) {
8829a1b64d5SAlexander V. Chernikov 			info->rti_info[RTAX_NETMASK] = rt_mask(rt);
8839a1b64d5SAlexander V. Chernikov 			info->rti_addrs |= RTA_NETMASK;
8849a1b64d5SAlexander V. Chernikov 		}
8859a1b64d5SAlexander V. Chernikov 		if (rt->rt_flags & RTF_GATEWAY) {
8869a1b64d5SAlexander V. Chernikov 			info->rti_info[RTAX_GATEWAY] = rt->rt_gateway;
8879a1b64d5SAlexander V. Chernikov 			info->rti_addrs |= RTA_GATEWAY;
8889a1b64d5SAlexander V. Chernikov 		}
8899a1b64d5SAlexander V. Chernikov 	}
8909a1b64d5SAlexander V. Chernikov 
8919a1b64d5SAlexander V. Chernikov 	rmx = info->rti_rmx;
8929a1b64d5SAlexander V. Chernikov 	if (rmx != NULL) {
8939a1b64d5SAlexander V. Chernikov 		info->rti_mflags |= RTV_MTU;
8949a1b64d5SAlexander V. Chernikov 		rmx->rmx_mtu = rt->rt_mtu;
8959a1b64d5SAlexander V. Chernikov 	}
8969a1b64d5SAlexander V. Chernikov 
8979a1b64d5SAlexander V. Chernikov 	info->rti_flags = rt->rt_flags;
8989a1b64d5SAlexander V. Chernikov 	info->rti_ifp = rt->rt_ifp;
8999a1b64d5SAlexander V. Chernikov 	info->rti_ifa = rt->rt_ifa;
9001ebec5faSMatt Macy 	ifa_ref(info->rti_ifa);
9019a1b64d5SAlexander V. Chernikov 	if (flags & NHR_REF) {
9029a1b64d5SAlexander V. Chernikov 		/* Do 'traditional' refcouting */
9039a1b64d5SAlexander V. Chernikov 		if_ref(info->rti_ifp);
9049a1b64d5SAlexander V. Chernikov 	}
9059a1b64d5SAlexander V. Chernikov 
9069a1b64d5SAlexander V. Chernikov 	return (0);
9079a1b64d5SAlexander V. Chernikov }
9089a1b64d5SAlexander V. Chernikov 
9099a1b64d5SAlexander V. Chernikov /*
9109a1b64d5SAlexander V. Chernikov  * Lookups up route entry for @dst in RIB database for fib @fibnum.
9119a1b64d5SAlexander V. Chernikov  * Exports entry data to @info using rt_exportinfo().
9129a1b64d5SAlexander V. Chernikov  *
9139a1b64d5SAlexander V. Chernikov  * if @flags contains NHR_REF, refcouting is performed on rt_ifp.
9149a1b64d5SAlexander V. Chernikov  *   All references can be released later by calling rib_free_info()
9159a1b64d5SAlexander V. Chernikov  *
9169a1b64d5SAlexander V. Chernikov  * Returns 0 on success.
9179a1b64d5SAlexander V. Chernikov  * Returns ENOENT for lookup failure, ENOMEM for export failure.
9189a1b64d5SAlexander V. Chernikov  */
9199a1b64d5SAlexander V. Chernikov int
9209a1b64d5SAlexander V. Chernikov rib_lookup_info(uint32_t fibnum, const struct sockaddr *dst, uint32_t flags,
9219a1b64d5SAlexander V. Chernikov     uint32_t flowid, struct rt_addrinfo *info)
9229a1b64d5SAlexander V. Chernikov {
92320efcfc6SAndrey V. Elsukov 	RIB_RLOCK_TRACKER;
92461eee0e2SAlexander V. Chernikov 	struct rib_head *rh;
9259a1b64d5SAlexander V. Chernikov 	struct radix_node *rn;
9269a1b64d5SAlexander V. Chernikov 	struct rtentry *rt;
9279a1b64d5SAlexander V. Chernikov 	int error;
9289a1b64d5SAlexander V. Chernikov 
9299a1b64d5SAlexander V. Chernikov 	KASSERT((fibnum < rt_numfibs), ("rib_lookup_rte: bad fibnum"));
9309a1b64d5SAlexander V. Chernikov 	rh = rt_tables_get_rnh(fibnum, dst->sa_family);
9319a1b64d5SAlexander V. Chernikov 	if (rh == NULL)
9329a1b64d5SAlexander V. Chernikov 		return (ENOENT);
9339a1b64d5SAlexander V. Chernikov 
93461eee0e2SAlexander V. Chernikov 	RIB_RLOCK(rh);
93561eee0e2SAlexander V. Chernikov 	rn = rh->rnh_matchaddr(__DECONST(void *, dst), &rh->head);
9369a1b64d5SAlexander V. Chernikov 	if (rn != NULL && ((rn->rn_flags & RNF_ROOT) == 0)) {
9379a1b64d5SAlexander V. Chernikov 		rt = RNTORT(rn);
9389a1b64d5SAlexander V. Chernikov 		/* Ensure route & ifp is UP */
9399a1b64d5SAlexander V. Chernikov 		if (RT_LINK_IS_UP(rt->rt_ifp)) {
9409a1b64d5SAlexander V. Chernikov 			flags = (flags & NHR_REF) | NHR_COPY;
9419a1b64d5SAlexander V. Chernikov 			error = rt_exportinfo(rt, info, flags);
94261eee0e2SAlexander V. Chernikov 			RIB_RUNLOCK(rh);
9439a1b64d5SAlexander V. Chernikov 
9449a1b64d5SAlexander V. Chernikov 			return (error);
9459a1b64d5SAlexander V. Chernikov 		}
9469a1b64d5SAlexander V. Chernikov 	}
94761eee0e2SAlexander V. Chernikov 	RIB_RUNLOCK(rh);
9489a1b64d5SAlexander V. Chernikov 
9499a1b64d5SAlexander V. Chernikov 	return (ENOENT);
9509a1b64d5SAlexander V. Chernikov }
9519a1b64d5SAlexander V. Chernikov 
9529a1b64d5SAlexander V. Chernikov /*
9539a1b64d5SAlexander V. Chernikov  * Releases all references acquired by rib_lookup_info() when
9549a1b64d5SAlexander V. Chernikov  * called with NHR_REF flags.
9559a1b64d5SAlexander V. Chernikov  */
9569a1b64d5SAlexander V. Chernikov void
9579a1b64d5SAlexander V. Chernikov rib_free_info(struct rt_addrinfo *info)
9589a1b64d5SAlexander V. Chernikov {
9599a1b64d5SAlexander V. Chernikov 
9609a1b64d5SAlexander V. Chernikov 	if_rele(info->rti_ifp);
9619a1b64d5SAlexander V. Chernikov }
9629a1b64d5SAlexander V. Chernikov 
9639a1b64d5SAlexander V. Chernikov /*
9642caee4beSAlexander V. Chernikov  * Iterates over all existing fibs in system calling
9652caee4beSAlexander V. Chernikov  *  @setwa_f function prior to traversing each fib.
9662caee4beSAlexander V. Chernikov  *  Calls @wa_f function for each element in current fib.
9672caee4beSAlexander V. Chernikov  * If af is not AF_UNSPEC, iterates over fibs in particular
9682caee4beSAlexander V. Chernikov  * address family.
9692caee4beSAlexander V. Chernikov  */
9704bdf0b6aSAlexander V. Chernikov void
9712caee4beSAlexander V. Chernikov rt_foreach_fib_walk(int af, rt_setwarg_t *setwa_f, rt_walktree_f_t *wa_f,
9722caee4beSAlexander V. Chernikov     void *arg)
9734bdf0b6aSAlexander V. Chernikov {
97461eee0e2SAlexander V. Chernikov 	struct rib_head *rnh;
9754bdf0b6aSAlexander V. Chernikov 	uint32_t fibnum;
9764bdf0b6aSAlexander V. Chernikov 	int i;
9774bdf0b6aSAlexander V. Chernikov 
9784bdf0b6aSAlexander V. Chernikov 	for (fibnum = 0; fibnum < rt_numfibs; fibnum++) {
9794bdf0b6aSAlexander V. Chernikov 		/* Do we want some specific family? */
9804bdf0b6aSAlexander V. Chernikov 		if (af != AF_UNSPEC) {
9814bdf0b6aSAlexander V. Chernikov 			rnh = rt_tables_get_rnh(fibnum, af);
9824bdf0b6aSAlexander V. Chernikov 			if (rnh == NULL)
9834bdf0b6aSAlexander V. Chernikov 				continue;
9844bdf0b6aSAlexander V. Chernikov 			if (setwa_f != NULL)
985e4790abfSAlexander V. Chernikov 				setwa_f(rnh, fibnum, af, arg);
9864bdf0b6aSAlexander V. Chernikov 
98761eee0e2SAlexander V. Chernikov 			RIB_WLOCK(rnh);
98861eee0e2SAlexander V. Chernikov 			rnh->rnh_walktree(&rnh->head, (walktree_f_t *)wa_f,arg);
98961eee0e2SAlexander V. Chernikov 			RIB_WUNLOCK(rnh);
9904bdf0b6aSAlexander V. Chernikov 			continue;
9914bdf0b6aSAlexander V. Chernikov 		}
9924bdf0b6aSAlexander V. Chernikov 
9934bdf0b6aSAlexander V. Chernikov 		for (i = 1; i <= AF_MAX; i++) {
9944bdf0b6aSAlexander V. Chernikov 			rnh = rt_tables_get_rnh(fibnum, i);
9954bdf0b6aSAlexander V. Chernikov 			if (rnh == NULL)
9964bdf0b6aSAlexander V. Chernikov 				continue;
9974bdf0b6aSAlexander V. Chernikov 			if (setwa_f != NULL)
9984bdf0b6aSAlexander V. Chernikov 				setwa_f(rnh, fibnum, i, arg);
9994bdf0b6aSAlexander V. Chernikov 
100061eee0e2SAlexander V. Chernikov 			RIB_WLOCK(rnh);
100161eee0e2SAlexander V. Chernikov 			rnh->rnh_walktree(&rnh->head, (walktree_f_t *)wa_f,arg);
100261eee0e2SAlexander V. Chernikov 			RIB_WUNLOCK(rnh);
10034bdf0b6aSAlexander V. Chernikov 		}
10044bdf0b6aSAlexander V. Chernikov 	}
10054bdf0b6aSAlexander V. Chernikov }
10064bdf0b6aSAlexander V. Chernikov 
1007e8b0643eSAlexander V. Chernikov struct rt_delinfo
1008e8b0643eSAlexander V. Chernikov {
1009e8b0643eSAlexander V. Chernikov 	struct rt_addrinfo info;
101061eee0e2SAlexander V. Chernikov 	struct rib_head *rnh;
1011e8b0643eSAlexander V. Chernikov 	struct rtentry *head;
1012e8b0643eSAlexander V. Chernikov };
1013e8b0643eSAlexander V. Chernikov 
1014e8b0643eSAlexander V. Chernikov /*
1015e8b0643eSAlexander V. Chernikov  * Conditionally unlinks @rn from radix tree based
1016e8b0643eSAlexander V. Chernikov  * on info data passed in @arg.
1017e8b0643eSAlexander V. Chernikov  */
1018e8b0643eSAlexander V. Chernikov static int
1019e8b0643eSAlexander V. Chernikov rt_checkdelroute(struct radix_node *rn, void *arg)
1020e8b0643eSAlexander V. Chernikov {
1021e8b0643eSAlexander V. Chernikov 	struct rt_delinfo *di;
1022e8b0643eSAlexander V. Chernikov 	struct rt_addrinfo *info;
1023e8b0643eSAlexander V. Chernikov 	struct rtentry *rt;
1024e8b0643eSAlexander V. Chernikov 	int error;
1025e8b0643eSAlexander V. Chernikov 
1026e8b0643eSAlexander V. Chernikov 	di = (struct rt_delinfo *)arg;
1027e8b0643eSAlexander V. Chernikov 	rt = (struct rtentry *)rn;
1028e8b0643eSAlexander V. Chernikov 	info = &di->info;
1029e8b0643eSAlexander V. Chernikov 	error = 0;
1030e8b0643eSAlexander V. Chernikov 
1031e8b0643eSAlexander V. Chernikov 	info->rti_info[RTAX_DST] = rt_key(rt);
1032e8b0643eSAlexander V. Chernikov 	info->rti_info[RTAX_NETMASK] = rt_mask(rt);
1033e8b0643eSAlexander V. Chernikov 	info->rti_info[RTAX_GATEWAY] = rt->rt_gateway;
1034e8b0643eSAlexander V. Chernikov 
1035e8b0643eSAlexander V. Chernikov 	rt = rt_unlinkrte(di->rnh, info, &error);
1036e8b0643eSAlexander V. Chernikov 	if (rt == NULL) {
1037e8b0643eSAlexander V. Chernikov 		/* Either not allowed or not matched. Skip entry */
1038e8b0643eSAlexander V. Chernikov 		return (0);
1039e8b0643eSAlexander V. Chernikov 	}
1040e8b0643eSAlexander V. Chernikov 
1041e8b0643eSAlexander V. Chernikov 	/* Entry was unlinked. Add to the list and return */
1042e8b0643eSAlexander V. Chernikov 	rt->rt_chain = di->head;
1043e8b0643eSAlexander V. Chernikov 	di->head = rt;
1044e8b0643eSAlexander V. Chernikov 
1045e8b0643eSAlexander V. Chernikov 	return (0);
1046e8b0643eSAlexander V. Chernikov }
1047e8b0643eSAlexander V. Chernikov 
1048e8b0643eSAlexander V. Chernikov /*
1049e8b0643eSAlexander V. Chernikov  * Iterates over all existing fibs in system.
1050e8b0643eSAlexander V. Chernikov  * Deletes each element for which @filter_f function returned
1051e8b0643eSAlexander V. Chernikov  * non-zero value.
1052e8b0643eSAlexander V. Chernikov  * If @af is not AF_UNSPEC, iterates over fibs in particular
1053e8b0643eSAlexander V. Chernikov  * address family.
1054e8b0643eSAlexander V. Chernikov  */
1055e8b0643eSAlexander V. Chernikov void
1056e8b0643eSAlexander V. Chernikov rt_foreach_fib_walk_del(int af, rt_filter_f_t *filter_f, void *arg)
1057e8b0643eSAlexander V. Chernikov {
105861eee0e2SAlexander V. Chernikov 	struct rib_head *rnh;
1059e8b0643eSAlexander V. Chernikov 	struct rt_delinfo di;
1060e8b0643eSAlexander V. Chernikov 	struct rtentry *rt;
1061e8b0643eSAlexander V. Chernikov 	uint32_t fibnum;
1062e8b0643eSAlexander V. Chernikov 	int i, start, end;
1063e8b0643eSAlexander V. Chernikov 
1064e8b0643eSAlexander V. Chernikov 	bzero(&di, sizeof(di));
1065e8b0643eSAlexander V. Chernikov 	di.info.rti_filter = filter_f;
1066e8b0643eSAlexander V. Chernikov 	di.info.rti_filterdata = arg;
1067e8b0643eSAlexander V. Chernikov 
1068e8b0643eSAlexander V. Chernikov 	for (fibnum = 0; fibnum < rt_numfibs; fibnum++) {
1069e8b0643eSAlexander V. Chernikov 		/* Do we want some specific family? */
1070e8b0643eSAlexander V. Chernikov 		if (af != AF_UNSPEC) {
1071e8b0643eSAlexander V. Chernikov 			start = af;
1072e8b0643eSAlexander V. Chernikov 			end = af;
1073e8b0643eSAlexander V. Chernikov 		} else {
1074e8b0643eSAlexander V. Chernikov 			start = 1;
1075e8b0643eSAlexander V. Chernikov 			end = AF_MAX;
1076e8b0643eSAlexander V. Chernikov 		}
1077e8b0643eSAlexander V. Chernikov 
1078e8b0643eSAlexander V. Chernikov 		for (i = start; i <= end; i++) {
1079e8b0643eSAlexander V. Chernikov 			rnh = rt_tables_get_rnh(fibnum, i);
1080e8b0643eSAlexander V. Chernikov 			if (rnh == NULL)
1081e8b0643eSAlexander V. Chernikov 				continue;
1082e8b0643eSAlexander V. Chernikov 			di.rnh = rnh;
1083e8b0643eSAlexander V. Chernikov 
108461eee0e2SAlexander V. Chernikov 			RIB_WLOCK(rnh);
108561eee0e2SAlexander V. Chernikov 			rnh->rnh_walktree(&rnh->head, rt_checkdelroute, &di);
108661eee0e2SAlexander V. Chernikov 			RIB_WUNLOCK(rnh);
1087e8b0643eSAlexander V. Chernikov 
1088e8b0643eSAlexander V. Chernikov 			if (di.head == NULL)
1089e8b0643eSAlexander V. Chernikov 				continue;
1090e8b0643eSAlexander V. Chernikov 
1091e8b0643eSAlexander V. Chernikov 			/* We might have something to reclaim */
1092e8b0643eSAlexander V. Chernikov 			while (di.head != NULL) {
1093e8b0643eSAlexander V. Chernikov 				rt = di.head;
1094e8b0643eSAlexander V. Chernikov 				di.head = rt->rt_chain;
1095e8b0643eSAlexander V. Chernikov 				rt->rt_chain = NULL;
1096e8b0643eSAlexander V. Chernikov 
1097e8b0643eSAlexander V. Chernikov 				/* TODO std rt -> rt_addrinfo export */
1098e8b0643eSAlexander V. Chernikov 				di.info.rti_info[RTAX_DST] = rt_key(rt);
1099e8b0643eSAlexander V. Chernikov 				di.info.rti_info[RTAX_NETMASK] = rt_mask(rt);
1100e8b0643eSAlexander V. Chernikov 
1101e8b0643eSAlexander V. Chernikov 				rt_notifydelete(rt, &di.info);
1102e8b0643eSAlexander V. Chernikov 				RTFREE_LOCKED(rt);
1103e8b0643eSAlexander V. Chernikov 			}
1104e8b0643eSAlexander V. Chernikov 
1105e8b0643eSAlexander V. Chernikov 		}
1106e8b0643eSAlexander V. Chernikov 	}
1107e8b0643eSAlexander V. Chernikov }
1108e8b0643eSAlexander V. Chernikov 
11094bdf0b6aSAlexander V. Chernikov /*
11104bdf0b6aSAlexander V. Chernikov  * Delete Routes for a Network Interface
11114bdf0b6aSAlexander V. Chernikov  *
11124bdf0b6aSAlexander V. Chernikov  * Called for each routing entry via the rnh->rnh_walktree() call above
11134bdf0b6aSAlexander V. Chernikov  * to delete all route entries referencing a detaching network interface.
11144bdf0b6aSAlexander V. Chernikov  *
11154bdf0b6aSAlexander V. Chernikov  * Arguments:
11164bdf0b6aSAlexander V. Chernikov  *	rt	pointer to rtentry
11174bdf0b6aSAlexander V. Chernikov  *	arg	argument passed to rnh->rnh_walktree() - detaching interface
11184bdf0b6aSAlexander V. Chernikov  *
11194bdf0b6aSAlexander V. Chernikov  * Returns:
11204bdf0b6aSAlexander V. Chernikov  *	0	successful
11214bdf0b6aSAlexander V. Chernikov  *	errno	failed - reason indicated
11224bdf0b6aSAlexander V. Chernikov  */
11234bdf0b6aSAlexander V. Chernikov static int
1124e8b0643eSAlexander V. Chernikov rt_ifdelroute(const struct rtentry *rt, void *arg)
11254bdf0b6aSAlexander V. Chernikov {
11264bdf0b6aSAlexander V. Chernikov 	struct ifnet	*ifp = arg;
11274bdf0b6aSAlexander V. Chernikov 
11284bdf0b6aSAlexander V. Chernikov 	if (rt->rt_ifp != ifp)
11294bdf0b6aSAlexander V. Chernikov 		return (0);
11304bdf0b6aSAlexander V. Chernikov 
11314bdf0b6aSAlexander V. Chernikov 	/*
11324bdf0b6aSAlexander V. Chernikov 	 * Protect (sorta) against walktree recursion problems
11334bdf0b6aSAlexander V. Chernikov 	 * with cloned routes
11344bdf0b6aSAlexander V. Chernikov 	 */
11354bdf0b6aSAlexander V. Chernikov 	if ((rt->rt_flags & RTF_UP) == 0)
11364bdf0b6aSAlexander V. Chernikov 		return (0);
11374bdf0b6aSAlexander V. Chernikov 
1138e8b0643eSAlexander V. Chernikov 	return (1);
11394bdf0b6aSAlexander V. Chernikov }
11404bdf0b6aSAlexander V. Chernikov 
11414bdf0b6aSAlexander V. Chernikov /*
11424bdf0b6aSAlexander V. Chernikov  * Delete all remaining routes using this interface
11434bdf0b6aSAlexander V. Chernikov  * Unfortuneatly the only way to do this is to slog through
11444bdf0b6aSAlexander V. Chernikov  * the entire routing table looking for routes which point
11454bdf0b6aSAlexander V. Chernikov  * to this interface...oh well...
11464bdf0b6aSAlexander V. Chernikov  */
11474bdf0b6aSAlexander V. Chernikov void
114880ae8d60SBjoern A. Zeeb rt_flushifroutes_af(struct ifnet *ifp, int af)
114980ae8d60SBjoern A. Zeeb {
115080ae8d60SBjoern A. Zeeb 	KASSERT((af >= 1 && af <= AF_MAX), ("%s: af %d not >= 1 and <= %d",
115180ae8d60SBjoern A. Zeeb 	    __func__, af, AF_MAX));
115280ae8d60SBjoern A. Zeeb 
115380ae8d60SBjoern A. Zeeb 	rt_foreach_fib_walk_del(af, rt_ifdelroute, ifp);
115480ae8d60SBjoern A. Zeeb }
115580ae8d60SBjoern A. Zeeb 
115680ae8d60SBjoern A. Zeeb void
11574bdf0b6aSAlexander V. Chernikov rt_flushifroutes(struct ifnet *ifp)
11584bdf0b6aSAlexander V. Chernikov {
11594bdf0b6aSAlexander V. Chernikov 
1160e8b0643eSAlexander V. Chernikov 	rt_foreach_fib_walk_del(AF_UNSPEC, rt_ifdelroute, ifp);
11614bdf0b6aSAlexander V. Chernikov }
11624bdf0b6aSAlexander V. Chernikov 
11638071913dSRuslan Ermilov /*
1164e8b0643eSAlexander V. Chernikov  * Conditionally unlinks rtentry matching data inside @info from @rnh.
1165e8b0643eSAlexander V. Chernikov  * Returns unlinked, locked and referenced @rtentry on success,
1166e8b0643eSAlexander V. Chernikov  * Returns NULL and sets @perror to:
1167e8b0643eSAlexander V. Chernikov  * ESRCH - if prefix was not found,
1168e8b0643eSAlexander V. Chernikov  * EADDRINUSE - if trying to delete PINNED route without appropriate flag.
1169e8b0643eSAlexander V. Chernikov  * ENOENT - if supplied filter function returned 0 (not matched).
1170e8b0643eSAlexander V. Chernikov  */
1171e8b0643eSAlexander V. Chernikov static struct rtentry *
117261eee0e2SAlexander V. Chernikov rt_unlinkrte(struct rib_head *rnh, struct rt_addrinfo *info, int *perror)
1173e8b0643eSAlexander V. Chernikov {
1174e8b0643eSAlexander V. Chernikov 	struct sockaddr *dst, *netmask;
1175e8b0643eSAlexander V. Chernikov 	struct rtentry *rt;
1176e8b0643eSAlexander V. Chernikov 	struct radix_node *rn;
1177e8b0643eSAlexander V. Chernikov 
1178e8b0643eSAlexander V. Chernikov 	dst = info->rti_info[RTAX_DST];
1179e8b0643eSAlexander V. Chernikov 	netmask = info->rti_info[RTAX_NETMASK];
1180e8b0643eSAlexander V. Chernikov 
118161eee0e2SAlexander V. Chernikov 	rt = (struct rtentry *)rnh->rnh_lookup(dst, netmask, &rnh->head);
1182e8b0643eSAlexander V. Chernikov 	if (rt == NULL) {
1183e8b0643eSAlexander V. Chernikov 		*perror = ESRCH;
1184e8b0643eSAlexander V. Chernikov 		return (NULL);
1185e8b0643eSAlexander V. Chernikov 	}
1186e8b0643eSAlexander V. Chernikov 
1187e8b0643eSAlexander V. Chernikov 	if ((info->rti_flags & RTF_PINNED) == 0) {
1188e8b0643eSAlexander V. Chernikov 		/* Check if target route can be deleted */
1189e8b0643eSAlexander V. Chernikov 		if (rt->rt_flags & RTF_PINNED) {
1190e8b0643eSAlexander V. Chernikov 			*perror = EADDRINUSE;
1191e8b0643eSAlexander V. Chernikov 			return (NULL);
1192e8b0643eSAlexander V. Chernikov 		}
1193e8b0643eSAlexander V. Chernikov 	}
1194e8b0643eSAlexander V. Chernikov 
1195e8b0643eSAlexander V. Chernikov 	if (info->rti_filter != NULL) {
1196e8b0643eSAlexander V. Chernikov 		if (info->rti_filter(rt, info->rti_filterdata) == 0) {
1197e8b0643eSAlexander V. Chernikov 			/* Not matched */
1198e8b0643eSAlexander V. Chernikov 			*perror = ENOENT;
1199e8b0643eSAlexander V. Chernikov 			return (NULL);
1200e8b0643eSAlexander V. Chernikov 		}
1201e8b0643eSAlexander V. Chernikov 
1202e8b0643eSAlexander V. Chernikov 		/*
1203e8b0643eSAlexander V. Chernikov 		 * Filter function requested rte deletion.
1204e8b0643eSAlexander V. Chernikov 		 * Ease the caller work by filling in remaining info
1205e8b0643eSAlexander V. Chernikov 		 * from that particular entry.
1206e8b0643eSAlexander V. Chernikov 		 */
1207e8b0643eSAlexander V. Chernikov 		info->rti_info[RTAX_GATEWAY] = rt->rt_gateway;
1208e8b0643eSAlexander V. Chernikov 	}
1209e8b0643eSAlexander V. Chernikov 
1210e8b0643eSAlexander V. Chernikov 	/*
1211e8b0643eSAlexander V. Chernikov 	 * Remove the item from the tree and return it.
1212e8b0643eSAlexander V. Chernikov 	 * Complain if it is not there and do no more processing.
1213e8b0643eSAlexander V. Chernikov 	 */
1214e8b0643eSAlexander V. Chernikov 	*perror = ESRCH;
1215e8b0643eSAlexander V. Chernikov #ifdef RADIX_MPATH
121661eee0e2SAlexander V. Chernikov 	if (rt_mpath_capable(rnh))
1217e8b0643eSAlexander V. Chernikov 		rn = rt_mpath_unlink(rnh, info, rt, perror);
1218e8b0643eSAlexander V. Chernikov 	else
1219e8b0643eSAlexander V. Chernikov #endif
122061eee0e2SAlexander V. Chernikov 	rn = rnh->rnh_deladdr(dst, netmask, &rnh->head);
1221e8b0643eSAlexander V. Chernikov 	if (rn == NULL)
1222e8b0643eSAlexander V. Chernikov 		return (NULL);
1223e8b0643eSAlexander V. Chernikov 
1224e8b0643eSAlexander V. Chernikov 	if (rn->rn_flags & (RNF_ACTIVE | RNF_ROOT))
1225e8b0643eSAlexander V. Chernikov 		panic ("rtrequest delete");
1226e8b0643eSAlexander V. Chernikov 
1227e8b0643eSAlexander V. Chernikov 	rt = RNTORT(rn);
1228e8b0643eSAlexander V. Chernikov 	RT_LOCK(rt);
1229e8b0643eSAlexander V. Chernikov 	RT_ADDREF(rt);
12304b3dc898SAlexander V. Chernikov 	rt->rt_flags &= ~RTF_UP;
1231e8b0643eSAlexander V. Chernikov 
1232e8b0643eSAlexander V. Chernikov 	*perror = 0;
1233e8b0643eSAlexander V. Chernikov 
1234e8b0643eSAlexander V. Chernikov 	return (rt);
1235e8b0643eSAlexander V. Chernikov }
1236e8b0643eSAlexander V. Chernikov 
1237e8b0643eSAlexander V. Chernikov static void
1238e8b0643eSAlexander V. Chernikov rt_notifydelete(struct rtentry *rt, struct rt_addrinfo *info)
1239e8b0643eSAlexander V. Chernikov {
1240e8b0643eSAlexander V. Chernikov 	struct ifaddr *ifa;
1241e8b0643eSAlexander V. Chernikov 
1242e8b0643eSAlexander V. Chernikov 	/*
1243e8b0643eSAlexander V. Chernikov 	 * give the protocol a chance to keep things in sync.
1244e8b0643eSAlexander V. Chernikov 	 */
1245e8b0643eSAlexander V. Chernikov 	ifa = rt->rt_ifa;
1246e8b0643eSAlexander V. Chernikov 	if (ifa != NULL && ifa->ifa_rtrequest != NULL)
1247e8b0643eSAlexander V. Chernikov 		ifa->ifa_rtrequest(RTM_DELETE, rt, info);
1248e8b0643eSAlexander V. Chernikov 
1249e8b0643eSAlexander V. Chernikov 	/*
1250e8b0643eSAlexander V. Chernikov 	 * One more rtentry floating around that is not
1251e8b0643eSAlexander V. Chernikov 	 * linked to the routing table. rttrash will be decremented
1252e8b0643eSAlexander V. Chernikov 	 * when RTFREE(rt) is eventually called.
1253e8b0643eSAlexander V. Chernikov 	 */
1254e8b0643eSAlexander V. Chernikov 	V_rttrash++;
1255e8b0643eSAlexander V. Chernikov }
1256e8b0643eSAlexander V. Chernikov 
1257e8b0643eSAlexander V. Chernikov 
1258e8b0643eSAlexander V. Chernikov /*
12598071913dSRuslan Ermilov  * These (questionable) definitions of apparent local variables apply
12608071913dSRuslan Ermilov  * to the next two functions.  XXXXXX!!!
12618071913dSRuslan Ermilov  */
12628071913dSRuslan Ermilov #define	dst	info->rti_info[RTAX_DST]
12638071913dSRuslan Ermilov #define	gateway	info->rti_info[RTAX_GATEWAY]
12648071913dSRuslan Ermilov #define	netmask	info->rti_info[RTAX_NETMASK]
12658071913dSRuslan Ermilov #define	ifaaddr	info->rti_info[RTAX_IFA]
12668071913dSRuslan Ermilov #define	ifpaddr	info->rti_info[RTAX_IFP]
12678071913dSRuslan Ermilov #define	flags	info->rti_flags
12688071913dSRuslan Ermilov 
12698c0fec80SRobert Watson /*
12708c0fec80SRobert Watson  * Look up rt_addrinfo for a specific fib.  Note that if rti_ifa is defined,
12718c0fec80SRobert Watson  * it will be referenced so the caller must free it.
12722ad7ed6eSAlexander V. Chernikov  *
12732ad7ed6eSAlexander V. Chernikov  * Assume basic consistency checks are executed by callers:
12742ad7ed6eSAlexander V. Chernikov  * RTAX_DST exists, if RTF_GATEWAY is set, RTAX_GATEWAY exists as well.
12758c0fec80SRobert Watson  */
12768b07e49aSJulian Elischer int
12778b07e49aSJulian Elischer rt_getifa_fib(struct rt_addrinfo *info, u_int fibnum)
12788b07e49aSJulian Elischer {
1279a68cc388SGleb Smirnoff 	struct epoch_tracker et;
12801ebec5faSMatt Macy 	int needref, error;
12818071913dSRuslan Ermilov 
12828071913dSRuslan Ermilov 	/*
12838071913dSRuslan Ermilov 	 * ifp may be specified by sockaddr_dl
12848071913dSRuslan Ermilov 	 * when protocol address is ambiguous.
12858071913dSRuslan Ermilov 	 */
12861ebec5faSMatt Macy 	error = 0;
12871ebec5faSMatt Macy 	needref = (info->rti_ifa == NULL);
1288a68cc388SGleb Smirnoff 	NET_EPOCH_ENTER(et);
12892ad7ed6eSAlexander V. Chernikov 
12902ad7ed6eSAlexander V. Chernikov 	/* If we have interface specified by the ifindex in the address, use it */
12918071913dSRuslan Ermilov 	if (info->rti_ifp == NULL && ifpaddr != NULL &&
12922ad7ed6eSAlexander V. Chernikov 	    ifpaddr->sa_family == AF_LINK) {
12932ad7ed6eSAlexander V. Chernikov 	    const struct sockaddr_dl *sdl = (const struct sockaddr_dl *)ifpaddr;
12942ad7ed6eSAlexander V. Chernikov 	    if (sdl->sdl_index != 0)
12952ad7ed6eSAlexander V. Chernikov 		    info->rti_ifp = ifnet_byindex_locked(sdl->sdl_index);
12968c0fec80SRobert Watson 	}
12972ad7ed6eSAlexander V. Chernikov 	/*
12982ad7ed6eSAlexander V. Chernikov 	 * If we have source address specified, try to find it
12992ad7ed6eSAlexander V. Chernikov 	 * TODO: avoid enumerating all ifas on all interfaces.
13002ad7ed6eSAlexander V. Chernikov 	 */
13018071913dSRuslan Ermilov 	if (info->rti_ifa == NULL && ifaaddr != NULL)
13028071913dSRuslan Ermilov 		info->rti_ifa = ifa_ifwithaddr(ifaaddr);
13038071913dSRuslan Ermilov 	if (info->rti_ifa == NULL) {
13048071913dSRuslan Ermilov 		struct sockaddr *sa;
13058071913dSRuslan Ermilov 
13062ad7ed6eSAlexander V. Chernikov 		/*
13072ad7ed6eSAlexander V. Chernikov 		 * Most common use case for the userland-supplied routes.
13082ad7ed6eSAlexander V. Chernikov 		 *
13092ad7ed6eSAlexander V. Chernikov 		 * Choose sockaddr to select ifa.
13102ad7ed6eSAlexander V. Chernikov 		 * -- if ifp is set --
13112ad7ed6eSAlexander V. Chernikov 		 * Order of preference:
13122ad7ed6eSAlexander V. Chernikov 		 * 1) IFA address
13132ad7ed6eSAlexander V. Chernikov 		 * 2) gateway address
13142ad7ed6eSAlexander V. Chernikov 		 *   Note: for interface routes link-level gateway address
13152ad7ed6eSAlexander V. Chernikov 		 *     is specified to indicate the interface index without
13162ad7ed6eSAlexander V. Chernikov 		 *     specifying RTF_GATEWAY. In this case, ignore gateway
13172ad7ed6eSAlexander V. Chernikov 		 *   Note: gateway AF may be different from dst AF. In this case,
13182ad7ed6eSAlexander V. Chernikov 		 *   ignore gateway
13192ad7ed6eSAlexander V. Chernikov 		 * 3) final destination.
13202ad7ed6eSAlexander V. Chernikov 		 * 4) if all of these fails, try to get at least link-level ifa.
13212ad7ed6eSAlexander V. Chernikov 		 * -- else --
13222ad7ed6eSAlexander V. Chernikov 		 * try to lookup gateway or dst in the routing table to get ifa
13232ad7ed6eSAlexander V. Chernikov 		 */
13242ad7ed6eSAlexander V. Chernikov 		if (info->rti_info[RTAX_IFA] != NULL)
13252ad7ed6eSAlexander V. Chernikov 			sa = info->rti_info[RTAX_IFA];
13262ad7ed6eSAlexander V. Chernikov 		else if ((info->rti_flags & RTF_GATEWAY) != 0 &&
13272ad7ed6eSAlexander V. Chernikov 		    gateway->sa_family == dst->sa_family)
13282ad7ed6eSAlexander V. Chernikov 			sa = gateway;
13292ad7ed6eSAlexander V. Chernikov 		else
13302ad7ed6eSAlexander V. Chernikov 			sa = dst;
13312ad7ed6eSAlexander V. Chernikov 		if (info->rti_ifp != NULL) {
13328071913dSRuslan Ermilov 			info->rti_ifa = ifaof_ifpforaddr(sa, info->rti_ifp);
13332ad7ed6eSAlexander V. Chernikov 			/* Case 4 */
13342ad7ed6eSAlexander V. Chernikov 			if (info->rti_ifa == NULL && gateway != NULL)
13352ad7ed6eSAlexander V. Chernikov 				info->rti_ifa = ifaof_ifpforaddr(gateway, info->rti_ifp);
13362ad7ed6eSAlexander V. Chernikov 		} else if (dst != NULL && gateway != NULL)
13374f8585e0SAlan Somers 			info->rti_ifa = ifa_ifwithroute(flags, dst, gateway,
13388b07e49aSJulian Elischer 							fibnum);
13398071913dSRuslan Ermilov 		else if (sa != NULL)
13404f8585e0SAlan Somers 			info->rti_ifa = ifa_ifwithroute(flags, sa, sa,
13418b07e49aSJulian Elischer 							fibnum);
13428071913dSRuslan Ermilov 	}
13431ebec5faSMatt Macy 	if (needref && info->rti_ifa != NULL) {
13448071913dSRuslan Ermilov 		if (info->rti_ifp == NULL)
1345134804c8SMatt Macy 			info->rti_ifp = info->rti_ifa->ifa_ifp;
13464f6c66ccSMatt Macy 		ifa_ref(info->rti_ifa);
13478071913dSRuslan Ermilov 	} else
13488071913dSRuslan Ermilov 		error = ENETUNREACH;
1349a68cc388SGleb Smirnoff 	NET_EPOCH_EXIT(et);
13508071913dSRuslan Ermilov 	return (error);
13518071913dSRuslan Ermilov }
13528071913dSRuslan Ermilov 
13537f948f12SAlexander V. Chernikov static int
13547f948f12SAlexander V. Chernikov if_updatemtu_cb(struct radix_node *rn, void *arg)
13557f948f12SAlexander V. Chernikov {
13567f948f12SAlexander V. Chernikov 	struct rtentry *rt;
13577f948f12SAlexander V. Chernikov 	struct if_mtuinfo *ifmtu;
13587f948f12SAlexander V. Chernikov 
13597f948f12SAlexander V. Chernikov 	rt = (struct rtentry *)rn;
13607f948f12SAlexander V. Chernikov 	ifmtu = (struct if_mtuinfo *)arg;
13617f948f12SAlexander V. Chernikov 
13627f948f12SAlexander V. Chernikov 	if (rt->rt_ifp != ifmtu->ifp)
13637f948f12SAlexander V. Chernikov 		return (0);
13647f948f12SAlexander V. Chernikov 
13657f948f12SAlexander V. Chernikov 	if (rt->rt_mtu >= ifmtu->mtu) {
13667f948f12SAlexander V. Chernikov 		/* We have to decrease mtu regardless of flags */
13677f948f12SAlexander V. Chernikov 		rt->rt_mtu = ifmtu->mtu;
13687f948f12SAlexander V. Chernikov 		return (0);
13697f948f12SAlexander V. Chernikov 	}
13707f948f12SAlexander V. Chernikov 
13717f948f12SAlexander V. Chernikov 	/*
13727f948f12SAlexander V. Chernikov 	 * New MTU is bigger. Check if are allowed to alter it
13737f948f12SAlexander V. Chernikov 	 */
13747f948f12SAlexander V. Chernikov 	if ((rt->rt_flags & (RTF_FIXEDMTU | RTF_GATEWAY | RTF_HOST)) != 0) {
13757f948f12SAlexander V. Chernikov 
13767f948f12SAlexander V. Chernikov 		/*
13777f948f12SAlexander V. Chernikov 		 * Skip routes with user-supplied MTU and
13787f948f12SAlexander V. Chernikov 		 * non-interface routes
13797f948f12SAlexander V. Chernikov 		 */
13807f948f12SAlexander V. Chernikov 		return (0);
13817f948f12SAlexander V. Chernikov 	}
13827f948f12SAlexander V. Chernikov 
13837f948f12SAlexander V. Chernikov 	/* We are safe to update route MTU */
13847f948f12SAlexander V. Chernikov 	rt->rt_mtu = ifmtu->mtu;
13857f948f12SAlexander V. Chernikov 
13867f948f12SAlexander V. Chernikov 	return (0);
13877f948f12SAlexander V. Chernikov }
13887f948f12SAlexander V. Chernikov 
13897f948f12SAlexander V. Chernikov void
13907f948f12SAlexander V. Chernikov rt_updatemtu(struct ifnet *ifp)
13917f948f12SAlexander V. Chernikov {
13927f948f12SAlexander V. Chernikov 	struct if_mtuinfo ifmtu;
139361eee0e2SAlexander V. Chernikov 	struct rib_head *rnh;
13947f948f12SAlexander V. Chernikov 	int i, j;
13957f948f12SAlexander V. Chernikov 
13967f948f12SAlexander V. Chernikov 	ifmtu.ifp = ifp;
13977f948f12SAlexander V. Chernikov 
13987f948f12SAlexander V. Chernikov 	/*
13997f948f12SAlexander V. Chernikov 	 * Try to update rt_mtu for all routes using this interface
14007f948f12SAlexander V. Chernikov 	 * Unfortunately the only way to do this is to traverse all
14017f948f12SAlexander V. Chernikov 	 * routing tables in all fibs/domains.
14027f948f12SAlexander V. Chernikov 	 */
14037f948f12SAlexander V. Chernikov 	for (i = 1; i <= AF_MAX; i++) {
14047f948f12SAlexander V. Chernikov 		ifmtu.mtu = if_getmtu_family(ifp, i);
14057f948f12SAlexander V. Chernikov 		for (j = 0; j < rt_numfibs; j++) {
14067f948f12SAlexander V. Chernikov 			rnh = rt_tables_get_rnh(j, i);
14077f948f12SAlexander V. Chernikov 			if (rnh == NULL)
14087f948f12SAlexander V. Chernikov 				continue;
140961eee0e2SAlexander V. Chernikov 			RIB_WLOCK(rnh);
141061eee0e2SAlexander V. Chernikov 			rnh->rnh_walktree(&rnh->head, if_updatemtu_cb, &ifmtu);
141161eee0e2SAlexander V. Chernikov 			RIB_WUNLOCK(rnh);
14127f948f12SAlexander V. Chernikov 		}
14137f948f12SAlexander V. Chernikov 	}
14147f948f12SAlexander V. Chernikov }
14157f948f12SAlexander V. Chernikov 
14167f948f12SAlexander V. Chernikov 
14175a2f4cbdSAlexander V. Chernikov #if 0
14185a2f4cbdSAlexander V. Chernikov int p_sockaddr(char *buf, int buflen, struct sockaddr *s);
14195a2f4cbdSAlexander V. Chernikov int rt_print(char *buf, int buflen, struct rtentry *rt);
14205a2f4cbdSAlexander V. Chernikov 
14215a2f4cbdSAlexander V. Chernikov int
14225a2f4cbdSAlexander V. Chernikov p_sockaddr(char *buf, int buflen, struct sockaddr *s)
14235a2f4cbdSAlexander V. Chernikov {
14245a2f4cbdSAlexander V. Chernikov 	void *paddr = NULL;
14255a2f4cbdSAlexander V. Chernikov 
14265a2f4cbdSAlexander V. Chernikov 	switch (s->sa_family) {
14275a2f4cbdSAlexander V. Chernikov 	case AF_INET:
14285a2f4cbdSAlexander V. Chernikov 		paddr = &((struct sockaddr_in *)s)->sin_addr;
14295a2f4cbdSAlexander V. Chernikov 		break;
14305a2f4cbdSAlexander V. Chernikov 	case AF_INET6:
14315a2f4cbdSAlexander V. Chernikov 		paddr = &((struct sockaddr_in6 *)s)->sin6_addr;
14325a2f4cbdSAlexander V. Chernikov 		break;
14335a2f4cbdSAlexander V. Chernikov 	}
14345a2f4cbdSAlexander V. Chernikov 
14355a2f4cbdSAlexander V. Chernikov 	if (paddr == NULL)
14365a2f4cbdSAlexander V. Chernikov 		return (0);
14375a2f4cbdSAlexander V. Chernikov 
14385a2f4cbdSAlexander V. Chernikov 	if (inet_ntop(s->sa_family, paddr, buf, buflen) == NULL)
14395a2f4cbdSAlexander V. Chernikov 		return (0);
14405a2f4cbdSAlexander V. Chernikov 
14415a2f4cbdSAlexander V. Chernikov 	return (strlen(buf));
14425a2f4cbdSAlexander V. Chernikov }
14435a2f4cbdSAlexander V. Chernikov 
14445a2f4cbdSAlexander V. Chernikov int
14455a2f4cbdSAlexander V. Chernikov rt_print(char *buf, int buflen, struct rtentry *rt)
14465a2f4cbdSAlexander V. Chernikov {
14475a2f4cbdSAlexander V. Chernikov 	struct sockaddr *addr, *mask;
14485a2f4cbdSAlexander V. Chernikov 	int i = 0;
14495a2f4cbdSAlexander V. Chernikov 
14505a2f4cbdSAlexander V. Chernikov 	addr = rt_key(rt);
14515a2f4cbdSAlexander V. Chernikov 	mask = rt_mask(rt);
14525a2f4cbdSAlexander V. Chernikov 
14535a2f4cbdSAlexander V. Chernikov 	i = p_sockaddr(buf, buflen, addr);
14545a2f4cbdSAlexander V. Chernikov 	if (!(rt->rt_flags & RTF_HOST)) {
14555a2f4cbdSAlexander V. Chernikov 		buf[i++] = '/';
14565a2f4cbdSAlexander V. Chernikov 		i += p_sockaddr(buf + i, buflen - i, mask);
14575a2f4cbdSAlexander V. Chernikov 	}
14585a2f4cbdSAlexander V. Chernikov 
14595a2f4cbdSAlexander V. Chernikov 	if (rt->rt_flags & RTF_GATEWAY) {
14605a2f4cbdSAlexander V. Chernikov 		buf[i++] = '>';
14615a2f4cbdSAlexander V. Chernikov 		i += p_sockaddr(buf + i, buflen - i, rt->rt_gateway);
14625a2f4cbdSAlexander V. Chernikov 	}
14635a2f4cbdSAlexander V. Chernikov 
14645a2f4cbdSAlexander V. Chernikov 	return (i);
14655a2f4cbdSAlexander V. Chernikov }
14665a2f4cbdSAlexander V. Chernikov #endif
14675a2f4cbdSAlexander V. Chernikov 
1468427ac07fSKip Macy #ifdef RADIX_MPATH
1469e8b0643eSAlexander V. Chernikov /*
1470e8b0643eSAlexander V. Chernikov  * Deletes key for single-path routes, unlinks rtentry with
1471e8b0643eSAlexander V. Chernikov  * gateway specified in @info from multi-path routes.
1472e8b0643eSAlexander V. Chernikov  *
1473e8b0643eSAlexander V. Chernikov  * Returnes unlinked entry. In case of failure, returns NULL
1474e8b0643eSAlexander V. Chernikov  * and sets @perror to ESRCH.
1475e8b0643eSAlexander V. Chernikov  */
1476e8b0643eSAlexander V. Chernikov static struct radix_node *
147761eee0e2SAlexander V. Chernikov rt_mpath_unlink(struct rib_head *rnh, struct rt_addrinfo *info,
1478e8b0643eSAlexander V. Chernikov     struct rtentry *rto, int *perror)
1479427ac07fSKip Macy {
1480427ac07fSKip Macy 	/*
1481427ac07fSKip Macy 	 * if we got multipath routes, we require users to specify
1482427ac07fSKip Macy 	 * a matching RTAX_GATEWAY.
1483427ac07fSKip Macy 	 */
1484e8b0643eSAlexander V. Chernikov 	struct rtentry *rt; // *rto = NULL;
1485f59c6cb0SAlexander V. Chernikov 	struct radix_node *rn;
1486e8b0643eSAlexander V. Chernikov 	struct sockaddr *gw;
1487427ac07fSKip Macy 
1488e8b0643eSAlexander V. Chernikov 	gw = info->rti_info[RTAX_GATEWAY];
1489e8b0643eSAlexander V. Chernikov 	rt = rt_mpath_matchgate(rto, gw);
1490e8b0643eSAlexander V. Chernikov 	if (rt == NULL) {
1491e8b0643eSAlexander V. Chernikov 		*perror = ESRCH;
1492e8b0643eSAlexander V. Chernikov 		return (NULL);
1493e8b0643eSAlexander V. Chernikov 	}
14945a2f4cbdSAlexander V. Chernikov 
1495427ac07fSKip Macy 	/*
1496427ac07fSKip Macy 	 * this is the first entry in the chain
1497427ac07fSKip Macy 	 */
1498427ac07fSKip Macy 	if (rto == rt) {
1499427ac07fSKip Macy 		rn = rn_mpath_next((struct radix_node *)rt);
1500427ac07fSKip Macy 		/*
1501427ac07fSKip Macy 		 * there is another entry, now it's active
1502427ac07fSKip Macy 		 */
1503427ac07fSKip Macy 		if (rn) {
1504427ac07fSKip Macy 			rto = RNTORT(rn);
1505427ac07fSKip Macy 			RT_LOCK(rto);
1506427ac07fSKip Macy 			rto->rt_flags |= RTF_UP;
1507427ac07fSKip Macy 			RT_UNLOCK(rto);
1508427ac07fSKip Macy 		} else if (rt->rt_flags & RTF_GATEWAY) {
1509427ac07fSKip Macy 			/*
1510427ac07fSKip Macy 			 * For gateway routes, we need to
1511427ac07fSKip Macy 			 * make sure that we we are deleting
1512427ac07fSKip Macy 			 * the correct gateway.
1513427ac07fSKip Macy 			 * rt_mpath_matchgate() does not
1514427ac07fSKip Macy 			 * check the case when there is only
1515427ac07fSKip Macy 			 * one route in the chain.
1516427ac07fSKip Macy 			 */
1517e8b0643eSAlexander V. Chernikov 			if (gw &&
1518e8b0643eSAlexander V. Chernikov 			    (rt->rt_gateway->sa_len != gw->sa_len ||
1519e8b0643eSAlexander V. Chernikov 				memcmp(rt->rt_gateway, gw, gw->sa_len))) {
1520e8b0643eSAlexander V. Chernikov 				*perror = ESRCH;
1521e8b0643eSAlexander V. Chernikov 				return (NULL);
1522e8b0643eSAlexander V. Chernikov 			}
15236a7bff2cSKip Macy 		}
15246a7bff2cSKip Macy 
1525427ac07fSKip Macy 		/*
1526427ac07fSKip Macy 		 * use the normal delete code to remove
1527427ac07fSKip Macy 		 * the first entry
1528427ac07fSKip Macy 		 */
152961eee0e2SAlexander V. Chernikov 		rn = rnh->rnh_deladdr(dst, netmask, &rnh->head);
1530e8b0643eSAlexander V. Chernikov 		*perror = 0;
1531e8b0643eSAlexander V. Chernikov 		return (rn);
1532427ac07fSKip Macy 	}
1533427ac07fSKip Macy 
1534427ac07fSKip Macy 	/*
1535427ac07fSKip Macy 	 * if the entry is 2nd and on up
1536427ac07fSKip Macy 	 */
1537e8b0643eSAlexander V. Chernikov 	if (rt_mpath_deldup(rto, rt) == 0)
1538427ac07fSKip Macy 		panic ("rtrequest1: rt_mpath_deldup");
1539e8b0643eSAlexander V. Chernikov 	*perror = 0;
1540e8b0643eSAlexander V. Chernikov 	rn = (struct radix_node *)rt;
1541e8b0643eSAlexander V. Chernikov 	return (rn);
1542427ac07fSKip Macy }
1543427ac07fSKip Macy #endif
1544427ac07fSKip Macy 
15458071913dSRuslan Ermilov int
15468b07e49aSJulian Elischer rtrequest1_fib(int req, struct rt_addrinfo *info, struct rtentry **ret_nrt,
15478b07e49aSJulian Elischer 				u_int fibnum)
15488b07e49aSJulian Elischer {
1549048738b5SAlexander V. Chernikov 	int error = 0;
15504b3dc898SAlexander V. Chernikov 	struct rtentry *rt, *rt_old;
1551f59c6cb0SAlexander V. Chernikov 	struct radix_node *rn;
155261eee0e2SAlexander V. Chernikov 	struct rib_head *rnh;
1553df8bae1dSRodney W. Grimes 	struct ifaddr *ifa;
1554df8bae1dSRodney W. Grimes 	struct sockaddr *ndst;
155546a70de2SQing Li 	struct sockaddr_storage mdst;
1556df8bae1dSRodney W. Grimes 
15578b07e49aSJulian Elischer 	KASSERT((fibnum < rt_numfibs), ("rtrequest1_fib: bad fibnum"));
1558048738b5SAlexander V. Chernikov 	KASSERT((flags & RTF_RNH_LOCKED) == 0, ("rtrequest1_fib: locked"));
1559b680a383SBjoern A. Zeeb 	switch (dst->sa_family) {
1560b680a383SBjoern A. Zeeb 	case AF_INET6:
1561b680a383SBjoern A. Zeeb 	case AF_INET:
1562b680a383SBjoern A. Zeeb 		/* We support multiple FIBs. */
1563b680a383SBjoern A. Zeeb 		break;
1564b680a383SBjoern A. Zeeb 	default:
1565b680a383SBjoern A. Zeeb 		fibnum = RT_DEFAULT_FIB;
1566b680a383SBjoern A. Zeeb 		break;
1567b680a383SBjoern A. Zeeb 	}
1568b680a383SBjoern A. Zeeb 
1569b0a76b88SJulian Elischer 	/*
1570b0a76b88SJulian Elischer 	 * Find the correct routing tree to use for this Address Family
1571b0a76b88SJulian Elischer 	 */
1572c2c2a7c1SBjoern A. Zeeb 	rnh = rt_tables_get_rnh(fibnum, dst->sa_family);
157385911824SLuigi Rizzo 	if (rnh == NULL)
1574983985c1SJeffrey Hsu 		return (EAFNOSUPPORT);
1575048738b5SAlexander V. Chernikov 
1576b0a76b88SJulian Elischer 	/*
1577b0a76b88SJulian Elischer 	 * If we are adding a host route then we don't want to put
157866953138SRuslan Ermilov 	 * a netmask in the tree, nor do we want to clone it.
1579b0a76b88SJulian Elischer 	 */
15806e6b3f7cSQing Li 	if (flags & RTF_HOST)
158185911824SLuigi Rizzo 		netmask = NULL;
15826e6b3f7cSQing Li 
1583df8bae1dSRodney W. Grimes 	switch (req) {
1584df8bae1dSRodney W. Grimes 	case RTM_DELETE:
158546a70de2SQing Li 		if (netmask) {
1586d8dc4e35SGeorge V. Neville-Neil 			if (dst->sa_len > sizeof(mdst))
1587d8dc4e35SGeorge V. Neville-Neil 				return (EINVAL);
158846a70de2SQing Li 			rt_maskedcopy(dst, (struct sockaddr *)&mdst, netmask);
158946a70de2SQing Li 			dst = (struct sockaddr *)&mdst;
159046a70de2SQing Li 		}
1591e8b0643eSAlexander V. Chernikov 
159261eee0e2SAlexander V. Chernikov 		RIB_WLOCK(rnh);
1593e8b0643eSAlexander V. Chernikov 		rt = rt_unlinkrte(rnh, info, &error);
159461eee0e2SAlexander V. Chernikov 		RIB_WUNLOCK(rnh);
1595e8b0643eSAlexander V. Chernikov 		if (error != 0)
1596048738b5SAlexander V. Chernikov 			return (error);
15973034f43fSAlexander V. Chernikov 
1598e8b0643eSAlexander V. Chernikov 		rt_notifydelete(rt, info);
1599499676dfSJulian Elischer 
1600499676dfSJulian Elischer 		/*
1601499676dfSJulian Elischer 		 * If the caller wants it, then it can have it,
1602499676dfSJulian Elischer 		 * but it's up to it to free the rtentry as we won't be
1603499676dfSJulian Elischer 		 * doing it.
1604b0a76b88SJulian Elischer 		 */
1605d1dd20beSSam Leffler 		if (ret_nrt) {
1606df8bae1dSRodney W. Grimes 			*ret_nrt = rt;
1607d1dd20beSSam Leffler 			RT_UNLOCK(rt);
1608d1dd20beSSam Leffler 		} else
1609d1dd20beSSam Leffler 			RTFREE_LOCKED(rt);
1610df8bae1dSRodney W. Grimes 		break;
1611df8bae1dSRodney W. Grimes 	case RTM_RESOLVE:
16126e6b3f7cSQing Li 		/*
16136e6b3f7cSQing Li 		 * resolve was only used for route cloning
16146e6b3f7cSQing Li 		 * here for compat
16156e6b3f7cSQing Li 		 */
16166e6b3f7cSQing Li 		break;
1617df8bae1dSRodney W. Grimes 	case RTM_ADD:
16185df72964SGarrett Wollman 		if ((flags & RTF_GATEWAY) && !gateway)
1619048738b5SAlexander V. Chernikov 			return (EINVAL);
162016a2e0a6SQing Li 		if (dst && gateway && (dst->sa_family != gateway->sa_family) &&
162116a2e0a6SQing Li 		    (gateway->sa_family != AF_UNSPEC) && (gateway->sa_family != AF_LINK))
1622048738b5SAlexander V. Chernikov 			return (EINVAL);
16235df72964SGarrett Wollman 
16248c0fec80SRobert Watson 		if (info->rti_ifa == NULL) {
16258c0fec80SRobert Watson 			error = rt_getifa_fib(info, fibnum);
16268c0fec80SRobert Watson 			if (error)
1627048738b5SAlexander V. Chernikov 				return (error);
16289379029aSMatt Macy 		}
1629e3a7aa6fSGleb Smirnoff 		rt = uma_zalloc(V_rtzone, M_NOWAIT);
16308c0fec80SRobert Watson 		if (rt == NULL) {
1631048738b5SAlexander V. Chernikov 			return (ENOBUFS);
16328c0fec80SRobert Watson 		}
1633df8bae1dSRodney W. Grimes 		rt->rt_flags = RTF_UP | flags;
16348b07e49aSJulian Elischer 		rt->rt_fibnum = fibnum;
1635499676dfSJulian Elischer 		/*
1636a8498625SBjoern A. Zeeb 		 * Add the gateway. Possibly re-malloc-ing the storage for it.
1637499676dfSJulian Elischer 		 */
1638831a80b0SMatthew Dillon 		if ((error = rt_setgate(rt, dst, gateway)) != 0) {
16391ed81b73SMarko Zec 			uma_zfree(V_rtzone, rt);
1640048738b5SAlexander V. Chernikov 			return (error);
1641df8bae1dSRodney W. Grimes 		}
1642499676dfSJulian Elischer 
1643499676dfSJulian Elischer 		/*
1644499676dfSJulian Elischer 		 * point to the (possibly newly malloc'd) dest address.
1645499676dfSJulian Elischer 		 */
1646d1dd20beSSam Leffler 		ndst = (struct sockaddr *)rt_key(rt);
1647499676dfSJulian Elischer 
1648499676dfSJulian Elischer 		/*
1649499676dfSJulian Elischer 		 * make sure it contains the value we want (masked if needed).
1650499676dfSJulian Elischer 		 */
1651df8bae1dSRodney W. Grimes 		if (netmask) {
1652df8bae1dSRodney W. Grimes 			rt_maskedcopy(dst, ndst, netmask);
1653df8bae1dSRodney W. Grimes 		} else
16541838a647SLuigi Rizzo 			bcopy(dst, ndst, dst->sa_len);
16558e718bb4SGarrett Wollman 
16568e718bb4SGarrett Wollman 		/*
16578c0fec80SRobert Watson 		 * We use the ifa reference returned by rt_getifa_fib().
16588e718bb4SGarrett Wollman 		 * This moved from below so that rnh->rnh_addaddr() can
1659499676dfSJulian Elischer 		 * examine the ifa and  ifa->ifa_ifp if it so desires.
16608e718bb4SGarrett Wollman 		 */
16619379029aSMatt Macy 		ifa = info->rti_ifa;
16629379029aSMatt Macy 		ifa_ref(ifa);
16638e718bb4SGarrett Wollman 		rt->rt_ifa = ifa;
16648e718bb4SGarrett Wollman 		rt->rt_ifp = ifa->ifa_ifp;
1665e3a7aa6fSGleb Smirnoff 		rt->rt_weight = 1;
16668e718bb4SGarrett Wollman 
16671a75e3b2SAlexander V. Chernikov 		rt_setmetrics(info, rt);
16681a75e3b2SAlexander V. Chernikov 
166961eee0e2SAlexander V. Chernikov 		RIB_WLOCK(rnh);
1670048738b5SAlexander V. Chernikov 		RT_LOCK(rt);
1671e440aed9SQing Li #ifdef RADIX_MPATH
1672e440aed9SQing Li 		/* do not permit exactly the same dst/mask/gw pair */
167361eee0e2SAlexander V. Chernikov 		if (rt_mpath_capable(rnh) &&
1674e440aed9SQing Li 			rt_mpath_conflict(rnh, rt, netmask)) {
167561eee0e2SAlexander V. Chernikov 			RIB_WUNLOCK(rnh);
1676048738b5SAlexander V. Chernikov 
16771099f828SRobert Watson 			ifa_free(rt->rt_ifa);
16788b15f615SLuiz Otavio O Souza 			R_Free(rt_key(rt));
16791ed81b73SMarko Zec 			uma_zfree(V_rtzone, rt);
1680048738b5SAlexander V. Chernikov 			return (EEXIST);
1681e440aed9SQing Li 		}
1682e440aed9SQing Li #endif
1683e440aed9SQing Li 
1684d1dd20beSSam Leffler 		/* XXX mtu manipulation will be done in rnh_addaddr -- itojun */
168561eee0e2SAlexander V. Chernikov 		rn = rnh->rnh_addaddr(ndst, netmask, &rnh->head, rt->rt_nodes);
16864b3dc898SAlexander V. Chernikov 
16874b3dc898SAlexander V. Chernikov 		rt_old = NULL;
16884b3dc898SAlexander V. Chernikov 		if (rn == NULL && (info->rti_flags & RTF_PINNED) != 0) {
16894b3dc898SAlexander V. Chernikov 
16904b3dc898SAlexander V. Chernikov 			/*
16914b3dc898SAlexander V. Chernikov 			 * Force removal and re-try addition
16924b3dc898SAlexander V. Chernikov 			 * TODO: better multipath&pinned support
16934b3dc898SAlexander V. Chernikov 			 */
16944b3dc898SAlexander V. Chernikov 			struct sockaddr *info_dst = info->rti_info[RTAX_DST];
16954b3dc898SAlexander V. Chernikov 			info->rti_info[RTAX_DST] = ndst;
16966af272d8SAlexander V. Chernikov 			/* Do not delete existing PINNED(interface) routes */
16976af272d8SAlexander V. Chernikov 			info->rti_flags &= ~RTF_PINNED;
16984b3dc898SAlexander V. Chernikov 			rt_old = rt_unlinkrte(rnh, info, &error);
16996af272d8SAlexander V. Chernikov 			info->rti_flags |= RTF_PINNED;
17004b3dc898SAlexander V. Chernikov 			info->rti_info[RTAX_DST] = info_dst;
17014b3dc898SAlexander V. Chernikov 			if (rt_old != NULL)
170261eee0e2SAlexander V. Chernikov 				rn = rnh->rnh_addaddr(ndst, netmask, &rnh->head,
17034b3dc898SAlexander V. Chernikov 				    rt->rt_nodes);
17044b3dc898SAlexander V. Chernikov 		}
170561eee0e2SAlexander V. Chernikov 		RIB_WUNLOCK(rnh);
17064b3dc898SAlexander V. Chernikov 
17074b3dc898SAlexander V. Chernikov 		if (rt_old != NULL)
17084b3dc898SAlexander V. Chernikov 			RT_UNLOCK(rt_old);
17094b3dc898SAlexander V. Chernikov 
1710499676dfSJulian Elischer 		/*
1711499676dfSJulian Elischer 		 * If it still failed to go into the tree,
1712499676dfSJulian Elischer 		 * then un-make it (this should be a function)
1713499676dfSJulian Elischer 		 */
171485911824SLuigi Rizzo 		if (rn == NULL) {
17151099f828SRobert Watson 			ifa_free(rt->rt_ifa);
17168b15f615SLuiz Otavio O Souza 			R_Free(rt_key(rt));
17171ed81b73SMarko Zec 			uma_zfree(V_rtzone, rt);
1718048738b5SAlexander V. Chernikov 			return (EEXIST);
1719df8bae1dSRodney W. Grimes 		}
1720499676dfSJulian Elischer 
17214b3dc898SAlexander V. Chernikov 		if (rt_old != NULL) {
17224b3dc898SAlexander V. Chernikov 			rt_notifydelete(rt_old, info);
17234b3dc898SAlexander V. Chernikov 			RTFREE(rt_old);
17244b3dc898SAlexander V. Chernikov 		}
17254b3dc898SAlexander V. Chernikov 
1726499676dfSJulian Elischer 		/*
1727a0c0e34bSGleb Smirnoff 		 * If this protocol has something to add to this then
1728499676dfSJulian Elischer 		 * allow it to do that as well.
1729499676dfSJulian Elischer 		 */
1730df8bae1dSRodney W. Grimes 		if (ifa->ifa_rtrequest)
17318071913dSRuslan Ermilov 			ifa->ifa_rtrequest(req, rt, info);
1732499676dfSJulian Elischer 
1733cd02a0b7SGarrett Wollman 		/*
1734499676dfSJulian Elischer 		 * actually return a resultant rtentry and
1735499676dfSJulian Elischer 		 * give the caller a single reference.
1736499676dfSJulian Elischer 		 */
1737df8bae1dSRodney W. Grimes 		if (ret_nrt) {
1738df8bae1dSRodney W. Grimes 			*ret_nrt = rt;
17397138d65cSSam Leffler 			RT_ADDREF(rt);
1740df8bae1dSRodney W. Grimes 		}
174184cc0778SGeorge V. Neville-Neil 		rnh->rnh_gen++;		/* Routing table updated */
1742d1dd20beSSam Leffler 		RT_UNLOCK(rt);
1743df8bae1dSRodney W. Grimes 		break;
1744c77462ddSAlexander V. Chernikov 	case RTM_CHANGE:
174561eee0e2SAlexander V. Chernikov 		RIB_WLOCK(rnh);
1746c77462ddSAlexander V. Chernikov 		error = rtrequest1_fib_change(rnh, info, ret_nrt, fibnum);
174761eee0e2SAlexander V. Chernikov 		RIB_WUNLOCK(rnh);
1748c77462ddSAlexander V. Chernikov 		break;
17498071913dSRuslan Ermilov 	default:
17508071913dSRuslan Ermilov 		error = EOPNOTSUPP;
1751df8bae1dSRodney W. Grimes 	}
1752048738b5SAlexander V. Chernikov 
1753df8bae1dSRodney W. Grimes 	return (error);
1754d1dd20beSSam Leffler }
1755d1dd20beSSam Leffler 
17568071913dSRuslan Ermilov #undef dst
17578071913dSRuslan Ermilov #undef gateway
17588071913dSRuslan Ermilov #undef netmask
17598071913dSRuslan Ermilov #undef ifaaddr
17608071913dSRuslan Ermilov #undef ifpaddr
17618071913dSRuslan Ermilov #undef flags
1762df8bae1dSRodney W. Grimes 
1763c77462ddSAlexander V. Chernikov static int
176461eee0e2SAlexander V. Chernikov rtrequest1_fib_change(struct rib_head *rnh, struct rt_addrinfo *info,
1765c77462ddSAlexander V. Chernikov     struct rtentry **ret_nrt, u_int fibnum)
1766c77462ddSAlexander V. Chernikov {
1767c77462ddSAlexander V. Chernikov 	struct rtentry *rt = NULL;
1768c77462ddSAlexander V. Chernikov 	int error = 0;
1769c77462ddSAlexander V. Chernikov 	int free_ifa = 0;
17701a75e3b2SAlexander V. Chernikov 	int family, mtu;
17717f948f12SAlexander V. Chernikov 	struct if_mtuinfo ifmtu;
1772c77462ddSAlexander V. Chernikov 
1773bc3d87fdSRyan Stone 	RIB_WLOCK_ASSERT(rnh);
1774bc3d87fdSRyan Stone 
1775c77462ddSAlexander V. Chernikov 	rt = (struct rtentry *)rnh->rnh_lookup(info->rti_info[RTAX_DST],
177661eee0e2SAlexander V. Chernikov 	    info->rti_info[RTAX_NETMASK], &rnh->head);
1777c77462ddSAlexander V. Chernikov 
1778c77462ddSAlexander V. Chernikov 	if (rt == NULL)
1779c77462ddSAlexander V. Chernikov 		return (ESRCH);
1780c77462ddSAlexander V. Chernikov 
1781c77462ddSAlexander V. Chernikov #ifdef RADIX_MPATH
1782c77462ddSAlexander V. Chernikov 	/*
1783c77462ddSAlexander V. Chernikov 	 * If we got multipath routes,
1784c77462ddSAlexander V. Chernikov 	 * we require users to specify a matching RTAX_GATEWAY.
1785c77462ddSAlexander V. Chernikov 	 */
178661eee0e2SAlexander V. Chernikov 	if (rt_mpath_capable(rnh)) {
1787c77462ddSAlexander V. Chernikov 		rt = rt_mpath_matchgate(rt, info->rti_info[RTAX_GATEWAY]);
1788c77462ddSAlexander V. Chernikov 		if (rt == NULL)
1789c77462ddSAlexander V. Chernikov 			return (ESRCH);
1790c77462ddSAlexander V. Chernikov 	}
1791c77462ddSAlexander V. Chernikov #endif
1792c77462ddSAlexander V. Chernikov 
1793c77462ddSAlexander V. Chernikov 	RT_LOCK(rt);
1794c77462ddSAlexander V. Chernikov 
17951a75e3b2SAlexander V. Chernikov 	rt_setmetrics(info, rt);
17961a75e3b2SAlexander V. Chernikov 
1797c77462ddSAlexander V. Chernikov 	/*
1798c77462ddSAlexander V. Chernikov 	 * New gateway could require new ifaddr, ifp;
1799c77462ddSAlexander V. Chernikov 	 * flags may also be different; ifp may be specified
1800c77462ddSAlexander V. Chernikov 	 * by ll sockaddr when protocol address is ambiguous
1801c77462ddSAlexander V. Chernikov 	 */
1802c77462ddSAlexander V. Chernikov 	if (((rt->rt_flags & RTF_GATEWAY) &&
1803c77462ddSAlexander V. Chernikov 	    info->rti_info[RTAX_GATEWAY] != NULL) ||
1804c77462ddSAlexander V. Chernikov 	    info->rti_info[RTAX_IFP] != NULL ||
1805c77462ddSAlexander V. Chernikov 	    (info->rti_info[RTAX_IFA] != NULL &&
1806c77462ddSAlexander V. Chernikov 	     !sa_equal(info->rti_info[RTAX_IFA], rt->rt_ifa->ifa_addr))) {
1807b83aa367SAndrey V. Elsukov 		/*
1808b83aa367SAndrey V. Elsukov 		 * XXX: Temporarily set RTF_RNH_LOCKED flag in the rti_flags
1809b83aa367SAndrey V. Elsukov 		 *	to avoid rlock in the ifa_ifwithroute().
1810b83aa367SAndrey V. Elsukov 		 */
1811b83aa367SAndrey V. Elsukov 		info->rti_flags |= RTF_RNH_LOCKED;
1812c77462ddSAlexander V. Chernikov 		error = rt_getifa_fib(info, fibnum);
1813b83aa367SAndrey V. Elsukov 		info->rti_flags &= ~RTF_RNH_LOCKED;
1814c77462ddSAlexander V. Chernikov 		if (info->rti_ifa != NULL)
1815c77462ddSAlexander V. Chernikov 			free_ifa = 1;
1816c77462ddSAlexander V. Chernikov 
1817c77462ddSAlexander V. Chernikov 		if (error != 0)
1818a713ee5cSAlexander V. Chernikov 			goto bad;
1819c77462ddSAlexander V. Chernikov 	}
1820c77462ddSAlexander V. Chernikov 
1821c77462ddSAlexander V. Chernikov 	/* Check if outgoing interface has changed */
1822c77462ddSAlexander V. Chernikov 	if (info->rti_ifa != NULL && info->rti_ifa != rt->rt_ifa &&
182319f41c2aSRyan Stone 	    rt->rt_ifa != NULL) {
182419f41c2aSRyan Stone 		if (rt->rt_ifa->ifa_rtrequest != NULL)
1825c77462ddSAlexander V. Chernikov 			rt->rt_ifa->ifa_rtrequest(RTM_DELETE, rt, info);
1826c77462ddSAlexander V. Chernikov 		ifa_free(rt->rt_ifa);
18271ebec5faSMatt Macy 		rt->rt_ifa = NULL;
1828c77462ddSAlexander V. Chernikov 	}
1829c77462ddSAlexander V. Chernikov 	/* Update gateway address */
1830c77462ddSAlexander V. Chernikov 	if (info->rti_info[RTAX_GATEWAY] != NULL) {
1831c77462ddSAlexander V. Chernikov 		error = rt_setgate(rt, rt_key(rt), info->rti_info[RTAX_GATEWAY]);
1832c77462ddSAlexander V. Chernikov 		if (error != 0)
1833a713ee5cSAlexander V. Chernikov 			goto bad;
1834c77462ddSAlexander V. Chernikov 
1835c77462ddSAlexander V. Chernikov 		rt->rt_flags &= ~RTF_GATEWAY;
1836c77462ddSAlexander V. Chernikov 		rt->rt_flags |= (RTF_GATEWAY & info->rti_flags);
1837c77462ddSAlexander V. Chernikov 	}
1838c77462ddSAlexander V. Chernikov 
1839c77462ddSAlexander V. Chernikov 	if (info->rti_ifa != NULL && info->rti_ifa != rt->rt_ifa) {
1840c77462ddSAlexander V. Chernikov 		ifa_ref(info->rti_ifa);
1841c77462ddSAlexander V. Chernikov 		rt->rt_ifa = info->rti_ifa;
1842c77462ddSAlexander V. Chernikov 		rt->rt_ifp = info->rti_ifp;
1843c77462ddSAlexander V. Chernikov 	}
1844c77462ddSAlexander V. Chernikov 	/* Allow some flags to be toggled on change. */
1845c77462ddSAlexander V. Chernikov 	rt->rt_flags &= ~RTF_FMASK;
1846c77462ddSAlexander V. Chernikov 	rt->rt_flags |= info->rti_flags & RTF_FMASK;
1847c77462ddSAlexander V. Chernikov 
1848c77462ddSAlexander V. Chernikov 	if (rt->rt_ifa && rt->rt_ifa->ifa_rtrequest != NULL)
1849c77462ddSAlexander V. Chernikov 	       rt->rt_ifa->ifa_rtrequest(RTM_ADD, rt, info);
1850c77462ddSAlexander V. Chernikov 
18517f948f12SAlexander V. Chernikov 	/* Alter route MTU if necessary */
18521a75e3b2SAlexander V. Chernikov 	if (rt->rt_ifp != NULL) {
18531a75e3b2SAlexander V. Chernikov 		family = info->rti_info[RTAX_DST]->sa_family;
18541a75e3b2SAlexander V. Chernikov 		mtu = if_getmtu_family(rt->rt_ifp, family);
18557f948f12SAlexander V. Chernikov 		/* Set default MTU */
18567f948f12SAlexander V. Chernikov 		if (rt->rt_mtu == 0)
18571a75e3b2SAlexander V. Chernikov 			rt->rt_mtu = mtu;
18587f948f12SAlexander V. Chernikov 		if (rt->rt_mtu != mtu) {
18597f948f12SAlexander V. Chernikov 			/* Check if we really need to update */
18607f948f12SAlexander V. Chernikov 			ifmtu.ifp = rt->rt_ifp;
18617f948f12SAlexander V. Chernikov 			ifmtu.mtu = mtu;
18627f948f12SAlexander V. Chernikov 			if_updatemtu_cb(rt->rt_nodes, &ifmtu);
18637f948f12SAlexander V. Chernikov 		}
18641a75e3b2SAlexander V. Chernikov 	}
18650fb9298dSAlexander V. Chernikov 
1866bc3d87fdSRyan Stone 	/*
1867bc3d87fdSRyan Stone 	 * This route change may have modified the route's gateway.  In that
1868bc3d87fdSRyan Stone 	 * case, any inpcbs that have cached this route need to invalidate their
1869bc3d87fdSRyan Stone 	 * llentry cache.
1870bc3d87fdSRyan Stone 	 */
1871bc3d87fdSRyan Stone 	rnh->rnh_gen++;
1872bc3d87fdSRyan Stone 
1873c77462ddSAlexander V. Chernikov 	if (ret_nrt) {
1874c77462ddSAlexander V. Chernikov 		*ret_nrt = rt;
1875c77462ddSAlexander V. Chernikov 		RT_ADDREF(rt);
1876c77462ddSAlexander V. Chernikov 	}
1877c77462ddSAlexander V. Chernikov bad:
1878c77462ddSAlexander V. Chernikov 	RT_UNLOCK(rt);
18791ebec5faSMatt Macy 	if (free_ifa != 0) {
1880c77462ddSAlexander V. Chernikov 		ifa_free(info->rti_ifa);
18811ebec5faSMatt Macy 		info->rti_ifa = NULL;
18821ebec5faSMatt Macy 	}
1883c77462ddSAlexander V. Chernikov 	return (error);
1884c77462ddSAlexander V. Chernikov }
1885c77462ddSAlexander V. Chernikov 
18860fb9298dSAlexander V. Chernikov static void
18870fb9298dSAlexander V. Chernikov rt_setmetrics(const struct rt_addrinfo *info, struct rtentry *rt)
18880fb9298dSAlexander V. Chernikov {
18890fb9298dSAlexander V. Chernikov 
18907f948f12SAlexander V. Chernikov 	if (info->rti_mflags & RTV_MTU) {
18917f948f12SAlexander V. Chernikov 		if (info->rti_rmx->rmx_mtu != 0) {
18927f948f12SAlexander V. Chernikov 
18937f948f12SAlexander V. Chernikov 			/*
18947f948f12SAlexander V. Chernikov 			 * MTU was explicitly provided by user.
18957f948f12SAlexander V. Chernikov 			 * Keep it.
18967f948f12SAlexander V. Chernikov 			 */
18977f948f12SAlexander V. Chernikov 			rt->rt_flags |= RTF_FIXEDMTU;
18987f948f12SAlexander V. Chernikov 		} else {
18997f948f12SAlexander V. Chernikov 
19007f948f12SAlexander V. Chernikov 			/*
19017f948f12SAlexander V. Chernikov 			 * User explicitly sets MTU to 0.
19027f948f12SAlexander V. Chernikov 			 * Assume rollback to default.
19037f948f12SAlexander V. Chernikov 			 */
19047f948f12SAlexander V. Chernikov 			rt->rt_flags &= ~RTF_FIXEDMTU;
19057f948f12SAlexander V. Chernikov 		}
19060fb9298dSAlexander V. Chernikov 		rt->rt_mtu = info->rti_rmx->rmx_mtu;
19077f948f12SAlexander V. Chernikov 	}
19080fb9298dSAlexander V. Chernikov 	if (info->rti_mflags & RTV_WEIGHT)
19090fb9298dSAlexander V. Chernikov 		rt->rt_weight = info->rti_rmx->rmx_weight;
19100fb9298dSAlexander V. Chernikov 	/* Kernel -> userland timebase conversion. */
19110fb9298dSAlexander V. Chernikov 	if (info->rti_mflags & RTV_EXPIRE)
19120fb9298dSAlexander V. Chernikov 		rt->rt_expire = info->rti_rmx->rmx_expire ?
19130fb9298dSAlexander V. Chernikov 		    info->rti_rmx->rmx_expire - time_second + time_uptime : 0;
19140fb9298dSAlexander V. Chernikov }
19150fb9298dSAlexander V. Chernikov 
1916df8bae1dSRodney W. Grimes int
1917d1dd20beSSam Leffler rt_setgate(struct rtentry *rt, struct sockaddr *dst, struct sockaddr *gate)
1918df8bae1dSRodney W. Grimes {
1919d1dd20beSSam Leffler 	/* XXX dst may be overwritten, can we move this to below */
19206e6b3f7cSQing Li 	int dlen = SA_SIZE(dst), glen = SA_SIZE(gate);
1921df8bae1dSRodney W. Grimes 
19221db1fffaSBill Fenner 	/*
192385911824SLuigi Rizzo 	 * Prepare to store the gateway in rt->rt_gateway.
192485911824SLuigi Rizzo 	 * Both dst and gateway are stored one after the other in the same
192585911824SLuigi Rizzo 	 * malloc'd chunk. If we have room, we can reuse the old buffer,
192685911824SLuigi Rizzo 	 * rt_gateway already points to the right place.
192785911824SLuigi Rizzo 	 * Otherwise, malloc a new block and update the 'dst' address.
1928499676dfSJulian Elischer 	 */
192985911824SLuigi Rizzo 	if (rt->rt_gateway == NULL || glen > SA_SIZE(rt->rt_gateway)) {
193085911824SLuigi Rizzo 		caddr_t new;
193185911824SLuigi Rizzo 
1932df8bae1dSRodney W. Grimes 		R_Malloc(new, caddr_t, dlen + glen);
193385911824SLuigi Rizzo 		if (new == NULL)
19341db1fffaSBill Fenner 			return ENOBUFS;
1935499676dfSJulian Elischer 		/*
193685911824SLuigi Rizzo 		 * XXX note, we copy from *dst and not *rt_key(rt) because
193785911824SLuigi Rizzo 		 * rt_setgate() can be called to initialize a newly
193885911824SLuigi Rizzo 		 * allocated route entry, in which case rt_key(rt) == NULL
193985911824SLuigi Rizzo 		 * (and also rt->rt_gateway == NULL).
194085911824SLuigi Rizzo 		 * Free()/free() handle a NULL argument just fine.
1941499676dfSJulian Elischer 		 */
19421838a647SLuigi Rizzo 		bcopy(dst, new, dlen);
19438b15f615SLuiz Otavio O Souza 		R_Free(rt_key(rt));	/* free old block, if any */
1944445e045bSAlexander Kabaev 		rt_key(rt) = (struct sockaddr *)new;
194585911824SLuigi Rizzo 		rt->rt_gateway = (struct sockaddr *)(new + dlen);
1946df8bae1dSRodney W. Grimes 	}
1947499676dfSJulian Elischer 
1948499676dfSJulian Elischer 	/*
194985911824SLuigi Rizzo 	 * Copy the new gateway value into the memory chunk.
195085911824SLuigi Rizzo 	 */
195185911824SLuigi Rizzo 	bcopy(gate, rt->rt_gateway, glen);
195285911824SLuigi Rizzo 
19536e6b3f7cSQing Li 	return (0);
1954df8bae1dSRodney W. Grimes }
1955df8bae1dSRodney W. Grimes 
1956c7ab6602SQing Li void
1957d1dd20beSSam Leffler rt_maskedcopy(struct sockaddr *src, struct sockaddr *dst, struct sockaddr *netmask)
1958df8bae1dSRodney W. Grimes {
1959f59c6cb0SAlexander V. Chernikov 	u_char *cp1 = (u_char *)src;
1960f59c6cb0SAlexander V. Chernikov 	u_char *cp2 = (u_char *)dst;
1961f59c6cb0SAlexander V. Chernikov 	u_char *cp3 = (u_char *)netmask;
1962df8bae1dSRodney W. Grimes 	u_char *cplim = cp2 + *cp3;
1963df8bae1dSRodney W. Grimes 	u_char *cplim2 = cp2 + *cp1;
1964df8bae1dSRodney W. Grimes 
1965df8bae1dSRodney W. Grimes 	*cp2++ = *cp1++; *cp2++ = *cp1++; /* copies sa_len & sa_family */
1966df8bae1dSRodney W. Grimes 	cp3 += 2;
1967df8bae1dSRodney W. Grimes 	if (cplim > cplim2)
1968df8bae1dSRodney W. Grimes 		cplim = cplim2;
1969df8bae1dSRodney W. Grimes 	while (cp2 < cplim)
1970df8bae1dSRodney W. Grimes 		*cp2++ = *cp1++ & *cp3++;
1971df8bae1dSRodney W. Grimes 	if (cp2 < cplim2)
1972df8bae1dSRodney W. Grimes 		bzero((caddr_t)cp2, (unsigned)(cplim2 - cp2));
1973df8bae1dSRodney W. Grimes }
1974df8bae1dSRodney W. Grimes 
1975df8bae1dSRodney W. Grimes /*
1976df8bae1dSRodney W. Grimes  * Set up a routing table entry, normally
1977df8bae1dSRodney W. Grimes  * for an interface.
1978df8bae1dSRodney W. Grimes  */
19798b07e49aSJulian Elischer #define _SOCKADDR_TMPSIZE 128 /* Not too big.. kernel stack size is limited */
19808b07e49aSJulian Elischer static inline  int
19818b07e49aSJulian Elischer rtinit1(struct ifaddr *ifa, int cmd, int flags, int fibnum)
1982df8bae1dSRodney W. Grimes {
198320efcfc6SAndrey V. Elsukov 	RIB_RLOCK_TRACKER;
19845aca0b30SLuigi Rizzo 	struct sockaddr *dst;
19858071913dSRuslan Ermilov 	struct sockaddr *netmask;
198685911824SLuigi Rizzo 	struct rtentry *rt = NULL;
19878071913dSRuslan Ermilov 	struct rt_addrinfo info;
1988e440aed9SQing Li 	int error = 0;
19898b07e49aSJulian Elischer 	int startfib, endfib;
19908b07e49aSJulian Elischer 	char tempbuf[_SOCKADDR_TMPSIZE];
19918b07e49aSJulian Elischer 	int didwork = 0;
19928b07e49aSJulian Elischer 	int a_failure = 0;
1993563ab4e4SAlexander V. Chernikov 	struct sockaddr_dl *sdl = NULL;
199461eee0e2SAlexander V. Chernikov 	struct rib_head *rnh;
1995df8bae1dSRodney W. Grimes 
19968071913dSRuslan Ermilov 	if (flags & RTF_HOST) {
19978071913dSRuslan Ermilov 		dst = ifa->ifa_dstaddr;
19988071913dSRuslan Ermilov 		netmask = NULL;
19998071913dSRuslan Ermilov 	} else {
20008071913dSRuslan Ermilov 		dst = ifa->ifa_addr;
20018071913dSRuslan Ermilov 		netmask = ifa->ifa_netmask;
20028071913dSRuslan Ermilov 	}
2003b3dd0771SBjoern A. Zeeb 	if (dst->sa_len == 0)
2004b3dd0771SBjoern A. Zeeb 		return(EINVAL);
2005b680a383SBjoern A. Zeeb 	switch (dst->sa_family) {
2006b680a383SBjoern A. Zeeb 	case AF_INET6:
2007b680a383SBjoern A. Zeeb 	case AF_INET:
2008b680a383SBjoern A. Zeeb 		/* We support multiple FIBs. */
2009b680a383SBjoern A. Zeeb 		break;
2010b680a383SBjoern A. Zeeb 	default:
2011b680a383SBjoern A. Zeeb 		fibnum = RT_DEFAULT_FIB;
2012b680a383SBjoern A. Zeeb 		break;
2013b680a383SBjoern A. Zeeb 	}
20147d9b6df1SAlexander V. Chernikov 	if (fibnum == RT_ALL_FIBS) {
2015ee0bd4b9SHiroki Sato 		if (V_rt_add_addr_allfibs == 0 && cmd == (int)RTM_ADD)
20160489b891SAlan Somers 			startfib = endfib = ifa->ifa_ifp->if_fib;
2017ee0bd4b9SHiroki Sato 		else {
20188b07e49aSJulian Elischer 			startfib = 0;
20198b07e49aSJulian Elischer 			endfib = rt_numfibs - 1;
202066e8505fSJulian Elischer 		}
20218b07e49aSJulian Elischer 	} else {
20228b07e49aSJulian Elischer 		KASSERT((fibnum < rt_numfibs), ("rtinit1: bad fibnum"));
20238b07e49aSJulian Elischer 		startfib = fibnum;
20248b07e49aSJulian Elischer 		endfib = fibnum;
20258b07e49aSJulian Elischer 	}
2026ac4a76ebSBjoern A. Zeeb 
2027b0a76b88SJulian Elischer 	/*
20288b07e49aSJulian Elischer 	 * If it's a delete, check that if it exists,
20298b07e49aSJulian Elischer 	 * it's on the correct interface or we might scrub
20308b07e49aSJulian Elischer 	 * a route to another ifa which would
2031b0a76b88SJulian Elischer 	 * be confusing at best and possibly worse.
2032b0a76b88SJulian Elischer 	 */
2033df8bae1dSRodney W. Grimes 	if (cmd == RTM_DELETE) {
2034b0a76b88SJulian Elischer 		/*
2035b0a76b88SJulian Elischer 		 * It's a delete, so it should already exist..
2036b0a76b88SJulian Elischer 		 * If it's a net, mask off the host bits
2037b0a76b88SJulian Elischer 		 * (Assuming we have a mask)
20388b07e49aSJulian Elischer 		 * XXX this is kinda inet specific..
2039b0a76b88SJulian Elischer 		 */
20408071913dSRuslan Ermilov 		if (netmask != NULL) {
20418b07e49aSJulian Elischer 			rt_maskedcopy(dst, (struct sockaddr *)tempbuf, netmask);
20428b07e49aSJulian Elischer 			dst = (struct sockaddr *)tempbuf;
2043df8bae1dSRodney W. Grimes 		}
2044563ab4e4SAlexander V. Chernikov 	} else if (cmd == RTM_ADD) {
2045563ab4e4SAlexander V. Chernikov 		sdl = (struct sockaddr_dl *)tempbuf;
2046563ab4e4SAlexander V. Chernikov 		bzero(sdl, sizeof(struct sockaddr_dl));
2047563ab4e4SAlexander V. Chernikov 		sdl->sdl_family = AF_LINK;
2048563ab4e4SAlexander V. Chernikov 		sdl->sdl_len = sizeof(struct sockaddr_dl);
2049563ab4e4SAlexander V. Chernikov 		sdl->sdl_type = ifa->ifa_ifp->if_type;
2050563ab4e4SAlexander V. Chernikov 		sdl->sdl_index = ifa->ifa_ifp->if_index;
20518b07e49aSJulian Elischer         }
20528b07e49aSJulian Elischer 	/*
20538b07e49aSJulian Elischer 	 * Now go through all the requested tables (fibs) and do the
20548b07e49aSJulian Elischer 	 * requested action. Realistically, this will either be fib 0
20558b07e49aSJulian Elischer 	 * for protocols that don't do multiple tables or all the
2056a8498625SBjoern A. Zeeb 	 * tables for those that do.
20578b07e49aSJulian Elischer 	 */
20588b07e49aSJulian Elischer 	for ( fibnum = startfib; fibnum <= endfib; fibnum++) {
20598b07e49aSJulian Elischer 		if (cmd == RTM_DELETE) {
20608b07e49aSJulian Elischer 			struct radix_node *rn;
2061b0a76b88SJulian Elischer 			/*
20628071913dSRuslan Ermilov 			 * Look up an rtentry that is in the routing tree and
20638071913dSRuslan Ermilov 			 * contains the correct info.
2064b0a76b88SJulian Elischer 			 */
2065c2c2a7c1SBjoern A. Zeeb 			rnh = rt_tables_get_rnh(fibnum, dst->sa_family);
2066c2c2a7c1SBjoern A. Zeeb 			if (rnh == NULL)
20678b07e49aSJulian Elischer 				/* this table doesn't exist but others might */
20688b07e49aSJulian Elischer 				continue;
206961eee0e2SAlexander V. Chernikov 			RIB_RLOCK(rnh);
207061eee0e2SAlexander V. Chernikov 			rn = rnh->rnh_lookup(dst, netmask, &rnh->head);
2071e440aed9SQing Li #ifdef RADIX_MPATH
207261eee0e2SAlexander V. Chernikov 			if (rt_mpath_capable(rnh)) {
2073e440aed9SQing Li 
2074e440aed9SQing Li 				if (rn == NULL)
2075e440aed9SQing Li 					error = ESRCH;
2076e440aed9SQing Li 				else {
2077e440aed9SQing Li 					rt = RNTORT(rn);
2078e440aed9SQing Li 					/*
20798b07e49aSJulian Elischer 					 * for interface route the
20808b07e49aSJulian Elischer 					 * rt->rt_gateway is sockaddr_intf
20818b07e49aSJulian Elischer 					 * for cloning ARP entries, so
20828b07e49aSJulian Elischer 					 * rt_mpath_matchgate must use the
20838b07e49aSJulian Elischer 					 * interface address
2084e440aed9SQing Li 					 */
20858b07e49aSJulian Elischer 					rt = rt_mpath_matchgate(rt,
20868b07e49aSJulian Elischer 					    ifa->ifa_addr);
2087034c09ffSAlexander V. Chernikov 					if (rt == NULL)
2088e440aed9SQing Li 						error = ESRCH;
2089e440aed9SQing Li 				}
2090e440aed9SQing Li 			}
2091e440aed9SQing Li #endif
20928b07e49aSJulian Elischer 			error = (rn == NULL ||
20938071913dSRuslan Ermilov 			    (rn->rn_flags & RNF_ROOT) ||
20945a2f4cbdSAlexander V. Chernikov 			    RNTORT(rn)->rt_ifa != ifa);
209561eee0e2SAlexander V. Chernikov 			RIB_RUNLOCK(rnh);
2096956b0b65SJeffrey Hsu 			if (error) {
20978b07e49aSJulian Elischer 				/* this is only an error if bad on ALL tables */
20988b07e49aSJulian Elischer 				continue;
2099df8bae1dSRodney W. Grimes 			}
2100b0a76b88SJulian Elischer 		}
2101b0a76b88SJulian Elischer 		/*
2102b0a76b88SJulian Elischer 		 * Do the actual request
2103b0a76b88SJulian Elischer 		 */
21048071913dSRuslan Ermilov 		bzero((caddr_t)&info, sizeof(info));
21051ebec5faSMatt Macy 		ifa_ref(ifa);
21068071913dSRuslan Ermilov 		info.rti_ifa = ifa;
21073034f43fSAlexander V. Chernikov 		info.rti_flags = flags |
21083034f43fSAlexander V. Chernikov 		    (ifa->ifa_flags & ~IFA_RTSELF) | RTF_PINNED;
21098071913dSRuslan Ermilov 		info.rti_info[RTAX_DST] = dst;
21106e6b3f7cSQing Li 		/*
21116e6b3f7cSQing Li 		 * doing this for compatibility reasons
21126e6b3f7cSQing Li 		 */
21136e6b3f7cSQing Li 		if (cmd == RTM_ADD)
2114563ab4e4SAlexander V. Chernikov 			info.rti_info[RTAX_GATEWAY] = (struct sockaddr *)sdl;
21156e6b3f7cSQing Li 		else
21168071913dSRuslan Ermilov 			info.rti_info[RTAX_GATEWAY] = ifa->ifa_addr;
21178071913dSRuslan Ermilov 		info.rti_info[RTAX_NETMASK] = netmask;
21188b07e49aSJulian Elischer 		error = rtrequest1_fib(cmd, &info, &rt, fibnum);
21193034f43fSAlexander V. Chernikov 
21205aca0b30SLuigi Rizzo 		if (error == 0 && rt != NULL) {
21218071913dSRuslan Ermilov 			/*
21226f99b44cSBrian Somers 			 * notify any listening routing agents of the change
21238071913dSRuslan Ermilov 			 */
2124d1dd20beSSam Leffler 			RT_LOCK(rt);
2125e440aed9SQing Li #ifdef RADIX_MPATH
2126e440aed9SQing Li 			/*
2127e440aed9SQing Li 			 * in case address alias finds the first address
21288d74af36SBjoern A. Zeeb 			 * e.g. ifconfig bge0 192.0.2.246/24
21298d74af36SBjoern A. Zeeb 			 * e.g. ifconfig bge0 192.0.2.247/24
21308d74af36SBjoern A. Zeeb 			 * the address set in the route is 192.0.2.246
21318d74af36SBjoern A. Zeeb 			 * so we need to replace it with 192.0.2.247
2132e440aed9SQing Li 			 */
21338b07e49aSJulian Elischer 			if (memcmp(rt->rt_ifa->ifa_addr,
21348b07e49aSJulian Elischer 			    ifa->ifa_addr, ifa->ifa_addr->sa_len)) {
21351099f828SRobert Watson 				ifa_free(rt->rt_ifa);
21361099f828SRobert Watson 				ifa_ref(ifa);
2137e440aed9SQing Li 				rt->rt_ifp = ifa->ifa_ifp;
2138e440aed9SQing Li 				rt->rt_ifa = ifa;
2139e440aed9SQing Li 			}
2140e440aed9SQing Li #endif
21417f279720SMichael Tuexen 			RT_ADDREF(rt);
21427f279720SMichael Tuexen 			RT_UNLOCK(rt);
2143528737fdSBjoern A. Zeeb 			rt_newaddrmsg_fib(cmd, ifa, error, rt, fibnum);
21447f279720SMichael Tuexen 			RT_LOCK(rt);
21457f279720SMichael Tuexen 			RT_REMREF(rt);
21468071913dSRuslan Ermilov 			if (cmd == RTM_DELETE) {
2147b0a76b88SJulian Elischer 				/*
21488b07e49aSJulian Elischer 				 * If we are deleting, and we found an entry,
21498b07e49aSJulian Elischer 				 * then it's been removed from the tree..
21508b07e49aSJulian Elischer 				 * now throw it away.
2151b0a76b88SJulian Elischer 				 */
2152d1dd20beSSam Leffler 				RTFREE_LOCKED(rt);
2153d1dd20beSSam Leffler 			} else {
2154d1dd20beSSam Leffler 				if (cmd == RTM_ADD) {
2155b0a76b88SJulian Elischer 					/*
21568b07e49aSJulian Elischer 					 * We just wanted to add it..
21578b07e49aSJulian Elischer 					 * we don't actually need a reference.
2158b0a76b88SJulian Elischer 					 */
21597138d65cSSam Leffler 					RT_REMREF(rt);
2160df8bae1dSRodney W. Grimes 				}
2161d1dd20beSSam Leffler 				RT_UNLOCK(rt);
2162d1dd20beSSam Leffler 			}
21638b07e49aSJulian Elischer 			didwork = 1;
2164df8bae1dSRodney W. Grimes 		}
21658b07e49aSJulian Elischer 		if (error)
21668b07e49aSJulian Elischer 			a_failure = error;
21678b07e49aSJulian Elischer 	}
21688b07e49aSJulian Elischer 	if (cmd == RTM_DELETE) {
21698b07e49aSJulian Elischer 		if (didwork) {
21708b07e49aSJulian Elischer 			error = 0;
21718b07e49aSJulian Elischer 		} else {
21728b07e49aSJulian Elischer 			/* we only give an error if it wasn't in any table */
21738b07e49aSJulian Elischer 			error = ((flags & RTF_HOST) ?
21748b07e49aSJulian Elischer 			    EHOSTUNREACH : ENETUNREACH);
21758b07e49aSJulian Elischer 		}
21768b07e49aSJulian Elischer 	} else {
21778b07e49aSJulian Elischer 		if (a_failure) {
21788b07e49aSJulian Elischer 			/* return an error if any of them failed */
21798b07e49aSJulian Elischer 			error = a_failure;
21808b07e49aSJulian Elischer 		}
21818b07e49aSJulian Elischer 	}
21823ec66d6cSDavid Greenman 	return (error);
21833ec66d6cSDavid Greenman }
2184cb64988fSLuoqi Chen 
21858b07e49aSJulian Elischer /*
21868b07e49aSJulian Elischer  * Set up a routing table entry, normally
21878b07e49aSJulian Elischer  * for an interface.
21888b07e49aSJulian Elischer  */
21898b07e49aSJulian Elischer int
21908b07e49aSJulian Elischer rtinit(struct ifaddr *ifa, int cmd, int flags)
21918b07e49aSJulian Elischer {
21928b07e49aSJulian Elischer 	struct sockaddr *dst;
2193a8498625SBjoern A. Zeeb 	int fib = RT_DEFAULT_FIB;
21948b07e49aSJulian Elischer 
21958b07e49aSJulian Elischer 	if (flags & RTF_HOST) {
21968b07e49aSJulian Elischer 		dst = ifa->ifa_dstaddr;
21978b07e49aSJulian Elischer 	} else {
21988b07e49aSJulian Elischer 		dst = ifa->ifa_addr;
21998b07e49aSJulian Elischer 	}
22008b07e49aSJulian Elischer 
2201b680a383SBjoern A. Zeeb 	switch (dst->sa_family) {
2202b680a383SBjoern A. Zeeb 	case AF_INET6:
2203b680a383SBjoern A. Zeeb 	case AF_INET:
2204b680a383SBjoern A. Zeeb 		/* We do support multiple FIBs. */
22057d9b6df1SAlexander V. Chernikov 		fib = RT_ALL_FIBS;
2206b680a383SBjoern A. Zeeb 		break;
2207b680a383SBjoern A. Zeeb 	}
22088b07e49aSJulian Elischer 	return (rtinit1(ifa, cmd, flags, fib));
22098b07e49aSJulian Elischer }
22104cbac30bSAlexander V. Chernikov 
22114cbac30bSAlexander V. Chernikov /*
22124cbac30bSAlexander V. Chernikov  * Announce interface address arrival/withdraw
22134cbac30bSAlexander V. Chernikov  * Returns 0 on success.
22144cbac30bSAlexander V. Chernikov  */
22154cbac30bSAlexander V. Chernikov int
22164cbac30bSAlexander V. Chernikov rt_addrmsg(int cmd, struct ifaddr *ifa, int fibnum)
22174cbac30bSAlexander V. Chernikov {
22184cbac30bSAlexander V. Chernikov 
22194cbac30bSAlexander V. Chernikov 	KASSERT(cmd == RTM_ADD || cmd == RTM_DELETE,
2220d375edc9SAlexander V. Chernikov 	    ("unexpected cmd %d", cmd));
2221d375edc9SAlexander V. Chernikov 	KASSERT(fibnum == RT_ALL_FIBS || (fibnum >= 0 && fibnum < rt_numfibs),
2222d375edc9SAlexander V. Chernikov 	    ("%s: fib out of range 0 <=%d<%d", __func__, fibnum, rt_numfibs));
22234cbac30bSAlexander V. Chernikov 
2224*d6e23cf0SMichael Tuexen 	EVENTHANDLER_DIRECT_INVOKE(rt_addrmsg, ifa, cmd);
22254cbac30bSAlexander V. Chernikov 	return (rtsock_addrmsg(cmd, ifa, fibnum));
22264cbac30bSAlexander V. Chernikov }
22274cbac30bSAlexander V. Chernikov 
22284cbac30bSAlexander V. Chernikov /*
2229d375edc9SAlexander V. Chernikov  * Announce route addition/removal.
22304cbac30bSAlexander V. Chernikov  * Users of this function MUST validate input data BEFORE calling.
22314cbac30bSAlexander V. Chernikov  * However we have to be able to handle invalid data:
22324cbac30bSAlexander V. Chernikov  * if some userland app sends us "invalid" route message (invalid mask,
2233d375edc9SAlexander V. Chernikov  * no dst, wrong address families, etc...) we need to pass it back
22344cbac30bSAlexander V. Chernikov  * to app (and any other rtsock consumers) with rtm_errno field set to
22354cbac30bSAlexander V. Chernikov  * non-zero value.
22364cbac30bSAlexander V. Chernikov  * Returns 0 on success.
22374cbac30bSAlexander V. Chernikov  */
22384cbac30bSAlexander V. Chernikov int
22394cbac30bSAlexander V. Chernikov rt_routemsg(int cmd, struct ifnet *ifp, int error, struct rtentry *rt,
22404cbac30bSAlexander V. Chernikov     int fibnum)
22414cbac30bSAlexander V. Chernikov {
22424cbac30bSAlexander V. Chernikov 
22434cbac30bSAlexander V. Chernikov 	KASSERT(cmd == RTM_ADD || cmd == RTM_DELETE,
2244d375edc9SAlexander V. Chernikov 	    ("unexpected cmd %d", cmd));
22454cbac30bSAlexander V. Chernikov 
2246d375edc9SAlexander V. Chernikov 	KASSERT(fibnum == RT_ALL_FIBS || (fibnum >= 0 && fibnum < rt_numfibs),
2247d375edc9SAlexander V. Chernikov 	    ("%s: fib out of range 0 <=%d<%d", __func__, fibnum, rt_numfibs));
22484cbac30bSAlexander V. Chernikov 
22494cbac30bSAlexander V. Chernikov 	KASSERT(rt_key(rt) != NULL, (":%s: rt_key must be supplied", __func__));
22504cbac30bSAlexander V. Chernikov 
22514cbac30bSAlexander V. Chernikov 	return (rtsock_routemsg(cmd, ifp, error, rt, fibnum));
22524cbac30bSAlexander V. Chernikov }
22534cbac30bSAlexander V. Chernikov 
22544cbac30bSAlexander V. Chernikov void
22554cbac30bSAlexander V. Chernikov rt_newaddrmsg(int cmd, struct ifaddr *ifa, int error, struct rtentry *rt)
22564cbac30bSAlexander V. Chernikov {
22574cbac30bSAlexander V. Chernikov 
22584cbac30bSAlexander V. Chernikov 	rt_newaddrmsg_fib(cmd, ifa, error, rt, RT_ALL_FIBS);
22594cbac30bSAlexander V. Chernikov }
22604cbac30bSAlexander V. Chernikov 
22614cbac30bSAlexander V. Chernikov /*
22624cbac30bSAlexander V. Chernikov  * This is called to generate messages from the routing socket
22634cbac30bSAlexander V. Chernikov  * indicating a network interface has had addresses associated with it.
22644cbac30bSAlexander V. Chernikov  */
22654cbac30bSAlexander V. Chernikov void
22664cbac30bSAlexander V. Chernikov rt_newaddrmsg_fib(int cmd, struct ifaddr *ifa, int error, struct rtentry *rt,
22674cbac30bSAlexander V. Chernikov     int fibnum)
22684cbac30bSAlexander V. Chernikov {
22694cbac30bSAlexander V. Chernikov 
22704cbac30bSAlexander V. Chernikov 	KASSERT(cmd == RTM_ADD || cmd == RTM_DELETE,
22714cbac30bSAlexander V. Chernikov 		("unexpected cmd %u", cmd));
2272d375edc9SAlexander V. Chernikov 	KASSERT(fibnum == RT_ALL_FIBS || (fibnum >= 0 && fibnum < rt_numfibs),
2273d375edc9SAlexander V. Chernikov 	    ("%s: fib out of range 0 <=%d<%d", __func__, fibnum, rt_numfibs));
22744cbac30bSAlexander V. Chernikov 
22754cbac30bSAlexander V. Chernikov 	if (cmd == RTM_ADD) {
22764cbac30bSAlexander V. Chernikov 		rt_addrmsg(cmd, ifa, fibnum);
22774cbac30bSAlexander V. Chernikov 		if (rt != NULL)
22784cbac30bSAlexander V. Chernikov 			rt_routemsg(cmd, ifa->ifa_ifp, error, rt, fibnum);
22794cbac30bSAlexander V. Chernikov 	} else {
22804cbac30bSAlexander V. Chernikov 		if (rt != NULL)
22814cbac30bSAlexander V. Chernikov 			rt_routemsg(cmd, ifa->ifa_ifp, error, rt, fibnum);
22824cbac30bSAlexander V. Chernikov 		rt_addrmsg(cmd, ifa, fibnum);
22834cbac30bSAlexander V. Chernikov 	}
22844cbac30bSAlexander V. Chernikov }
22854cbac30bSAlexander V. Chernikov 
2286