xref: /freebsd/sys/net/route.c (revision fbbd9655e5107c68e4e0146ff22b73d7350475bc)
1c398230bSWarner Losh /*-
2df8bae1dSRodney W. Grimes  * Copyright (c) 1980, 1986, 1991, 1993
3df8bae1dSRodney W. Grimes  *	The Regents of the University of California.  All rights reserved.
4df8bae1dSRodney W. Grimes  *
5df8bae1dSRodney W. Grimes  * Redistribution and use in source and binary forms, with or without
6df8bae1dSRodney W. Grimes  * modification, are permitted provided that the following conditions
7df8bae1dSRodney W. Grimes  * are met:
8df8bae1dSRodney W. Grimes  * 1. Redistributions of source code must retain the above copyright
9df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer.
10df8bae1dSRodney W. Grimes  * 2. Redistributions in binary form must reproduce the above copyright
11df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer in the
12df8bae1dSRodney W. Grimes  *    documentation and/or other materials provided with the distribution.
13*fbbd9655SWarner Losh  * 3. Neither the name of the University nor the names of its contributors
14df8bae1dSRodney W. Grimes  *    may be used to endorse or promote products derived from this software
15df8bae1dSRodney W. Grimes  *    without specific prior written permission.
16df8bae1dSRodney W. Grimes  *
17df8bae1dSRodney W. Grimes  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18df8bae1dSRodney W. Grimes  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19df8bae1dSRodney W. Grimes  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20df8bae1dSRodney W. Grimes  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21df8bae1dSRodney W. Grimes  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22df8bae1dSRodney W. Grimes  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23df8bae1dSRodney W. Grimes  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24df8bae1dSRodney W. Grimes  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25df8bae1dSRodney W. Grimes  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26df8bae1dSRodney W. Grimes  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27df8bae1dSRodney W. Grimes  * SUCH DAMAGE.
28df8bae1dSRodney W. Grimes  *
2942e9e16dSRuslan Ermilov  *	@(#)route.c	8.3.1.1 (Berkeley) 2/23/95
30c3aac50fSPeter Wemm  * $FreeBSD$
31df8bae1dSRodney W. Grimes  */
328b07e49aSJulian Elischer /************************************************************************
338b07e49aSJulian Elischer  * Note: In this file a 'fib' is a "forwarding information base"	*
348b07e49aSJulian Elischer  * Which is the new name for an in kernel routing (next hop) table.	*
358b07e49aSJulian Elischer  ***********************************************************************/
36df8bae1dSRodney W. Grimes 
371d5e9e22SEivind Eklund #include "opt_inet.h"
38096f2786SBjoern A. Zeeb #include "opt_inet6.h"
398b07e49aSJulian Elischer #include "opt_route.h"
404cbac30bSAlexander V. Chernikov #include "opt_sctp.h"
414bd49128SPeter Wemm #include "opt_mrouting.h"
42e440aed9SQing Li #include "opt_mpath.h"
434bd49128SPeter Wemm 
44df8bae1dSRodney W. Grimes #include <sys/param.h>
45df8bae1dSRodney W. Grimes #include <sys/systm.h>
464d1d4912SBruce Evans #include <sys/malloc.h>
47df8bae1dSRodney W. Grimes #include <sys/mbuf.h>
48df8bae1dSRodney W. Grimes #include <sys/socket.h>
498b07e49aSJulian Elischer #include <sys/sysctl.h>
503120b9d4SKip Macy #include <sys/syslog.h>
518b07e49aSJulian Elischer #include <sys/sysproto.h>
528b07e49aSJulian Elischer #include <sys/proc.h>
53df8bae1dSRodney W. Grimes #include <sys/domain.h>
54cb64988fSLuoqi Chen #include <sys/kernel.h>
55df8bae1dSRodney W. Grimes 
56df8bae1dSRodney W. Grimes #include <net/if.h>
5776039bc8SGleb Smirnoff #include <net/if_var.h>
586e6b3f7cSQing Li #include <net/if_dl.h>
59df8bae1dSRodney W. Grimes #include <net/route.h>
6061eee0e2SAlexander V. Chernikov #include <net/route_var.h>
61530c0060SRobert Watson #include <net/vnet.h>
62e5c610d6SQing Li #include <net/flowtable.h>
63df8bae1dSRodney W. Grimes 
64e440aed9SQing Li #ifdef RADIX_MPATH
65e440aed9SQing Li #include <net/radix_mpath.h>
66e440aed9SQing Li #endif
67e440aed9SQing Li 
68df8bae1dSRodney W. Grimes #include <netinet/in.h>
69b5e8ce9fSBruce Evans #include <netinet/ip_mroute.h>
70df8bae1dSRodney W. Grimes 
712dc1d581SAndre Oppermann #include <vm/uma.h>
722dc1d581SAndre Oppermann 
734871fc4aSJulian Elischer #define	RT_MAXFIBS	UINT16_MAX
74bfca216eSBjoern A. Zeeb 
75bfca216eSBjoern A. Zeeb /* Kernel config default option. */
76bfca216eSBjoern A. Zeeb #ifdef ROUTETABLES
77bfca216eSBjoern A. Zeeb #if ROUTETABLES <= 0
78bfca216eSBjoern A. Zeeb #error "ROUTETABLES defined too low"
79bfca216eSBjoern A. Zeeb #endif
80bfca216eSBjoern A. Zeeb #if ROUTETABLES > RT_MAXFIBS
81bfca216eSBjoern A. Zeeb #error "ROUTETABLES defined too big"
82bfca216eSBjoern A. Zeeb #endif
83bfca216eSBjoern A. Zeeb #define	RT_NUMFIBS	ROUTETABLES
84bfca216eSBjoern A. Zeeb #endif /* ROUTETABLES */
85bfca216eSBjoern A. Zeeb /* Initialize to default if not otherwise set. */
86bfca216eSBjoern A. Zeeb #ifndef	RT_NUMFIBS
87bfca216eSBjoern A. Zeeb #define	RT_NUMFIBS	1
88bfca216eSBjoern A. Zeeb #endif
89bfca216eSBjoern A. Zeeb 
904cbac30bSAlexander V. Chernikov #if defined(INET) || defined(INET6)
914cbac30bSAlexander V. Chernikov #ifdef SCTP
924cbac30bSAlexander V. Chernikov extern void sctp_addr_change(struct ifaddr *ifa, int cmd);
934cbac30bSAlexander V. Chernikov #endif /* SCTP */
944cbac30bSAlexander V. Chernikov #endif
954cbac30bSAlexander V. Chernikov 
964cbac30bSAlexander V. Chernikov 
974871fc4aSJulian Elischer /* This is read-only.. */
988b07e49aSJulian Elischer u_int rt_numfibs = RT_NUMFIBS;
99af3b2549SHans Petter Selasky SYSCTL_UINT(_net, OID_AUTO, fibs, CTLFLAG_RDTUN, &rt_numfibs, 0, "");
1008b07e49aSJulian Elischer 
10166e8505fSJulian Elischer /*
10266e8505fSJulian Elischer  * By default add routes to all fibs for new interfaces.
10366e8505fSJulian Elischer  * Once this is set to 0 then only allocate routes on interface
10466e8505fSJulian Elischer  * changes for the FIB of the caller when adding a new set of addresses
10566e8505fSJulian Elischer  * to an interface.  XXX this is a shotgun aproach to a problem that needs
10666e8505fSJulian Elischer  * a more fine grained solution.. that will come.
107a8498625SBjoern A. Zeeb  * XXX also has the problems getting the FIB from curthread which will not
108a8498625SBjoern A. Zeeb  * always work given the fib can be overridden and prefixes can be added
109a8498625SBjoern A. Zeeb  * from the network stack context.
11066e8505fSJulian Elischer  */
111ee0bd4b9SHiroki Sato VNET_DEFINE(u_int, rt_add_addr_allfibs) = 1;
112ee0bd4b9SHiroki Sato SYSCTL_UINT(_net, OID_AUTO, add_addr_allfibs, CTLFLAG_RWTUN | CTLFLAG_VNET,
113ee0bd4b9SHiroki Sato     &VNET_NAME(rt_add_addr_allfibs), 0, "");
11466e8505fSJulian Elischer 
115eddfbb76SRobert Watson VNET_DEFINE(struct rtstat, rtstat);
1161e77c105SRobert Watson #define	V_rtstat	VNET(rtstat)
117b58ea5f3SBjoern A. Zeeb 
11861eee0e2SAlexander V. Chernikov VNET_DEFINE(struct rib_head *, rt_tables);
11982cea7e6SBjoern A. Zeeb #define	V_rt_tables	VNET(rt_tables)
12082cea7e6SBjoern A. Zeeb 
12182cea7e6SBjoern A. Zeeb VNET_DEFINE(int, rttrash);		/* routes not in table but not freed */
12282cea7e6SBjoern A. Zeeb #define	V_rttrash	VNET(rttrash)
12382cea7e6SBjoern A. Zeeb 
124bfe1aba4SMarko Zec 
125d6941ce9SLuigi Rizzo /*
126d6941ce9SLuigi Rizzo  * Convert a 'struct radix_node *' to a 'struct rtentry *'.
127d6941ce9SLuigi Rizzo  * The operation can be done safely (in this code) because a
128d6941ce9SLuigi Rizzo  * 'struct rtentry' starts with two 'struct radix_node''s, the first
129d6941ce9SLuigi Rizzo  * one representing leaf nodes in the routing tree, which is
130d6941ce9SLuigi Rizzo  * what the code in radix.c passes us as a 'struct radix_node'.
131d6941ce9SLuigi Rizzo  *
132d6941ce9SLuigi Rizzo  * But because there are a lot of assumptions in this conversion,
133d6941ce9SLuigi Rizzo  * do not cast explicitly, but always use the macro below.
134d6941ce9SLuigi Rizzo  */
135d6941ce9SLuigi Rizzo #define RNTORT(p)	((struct rtentry *)(p))
136d6941ce9SLuigi Rizzo 
1373e288e62SDimitry Andric static VNET_DEFINE(uma_zone_t, rtzone);		/* Routing table UMA zone. */
13882cea7e6SBjoern A. Zeeb #define	V_rtzone	VNET(rtzone)
13982cea7e6SBjoern A. Zeeb 
14061eee0e2SAlexander V. Chernikov static int rtrequest1_fib_change(struct rib_head *, struct rt_addrinfo *,
141c77462ddSAlexander V. Chernikov     struct rtentry **, u_int);
1420fb9298dSAlexander V. Chernikov static void rt_setmetrics(const struct rt_addrinfo *, struct rtentry *);
143e8b0643eSAlexander V. Chernikov static int rt_ifdelroute(const struct rtentry *rt, void *arg);
14461eee0e2SAlexander V. Chernikov static struct rtentry *rt_unlinkrte(struct rib_head *rnh,
145e8b0643eSAlexander V. Chernikov     struct rt_addrinfo *info, int *perror);
146e8b0643eSAlexander V. Chernikov static void rt_notifydelete(struct rtentry *rt, struct rt_addrinfo *info);
147e8b0643eSAlexander V. Chernikov #ifdef RADIX_MPATH
14861eee0e2SAlexander V. Chernikov static struct radix_node *rt_mpath_unlink(struct rib_head *rnh,
149e8b0643eSAlexander V. Chernikov     struct rt_addrinfo *info, struct rtentry *rto, int *perror);
150e8b0643eSAlexander V. Chernikov #endif
1519a1b64d5SAlexander V. Chernikov static int rt_exportinfo(struct rtentry *rt, struct rt_addrinfo *info,
1529a1b64d5SAlexander V. Chernikov     int flags);
153c77462ddSAlexander V. Chernikov 
1547f948f12SAlexander V. Chernikov struct if_mtuinfo
1557f948f12SAlexander V. Chernikov {
1567f948f12SAlexander V. Chernikov 	struct ifnet	*ifp;
1577f948f12SAlexander V. Chernikov 	int		mtu;
1587f948f12SAlexander V. Chernikov };
1597f948f12SAlexander V. Chernikov 
1607f948f12SAlexander V. Chernikov static int	if_updatemtu_cb(struct radix_node *, void *);
1617f948f12SAlexander V. Chernikov 
1628b07e49aSJulian Elischer /*
1638b07e49aSJulian Elischer  * handler for net.my_fibnum
1648b07e49aSJulian Elischer  */
1658b07e49aSJulian Elischer static int
1668b07e49aSJulian Elischer sysctl_my_fibnum(SYSCTL_HANDLER_ARGS)
167df8bae1dSRodney W. Grimes {
1688b07e49aSJulian Elischer         int fibnum;
1698b07e49aSJulian Elischer         int error;
1708b07e49aSJulian Elischer 
1718b07e49aSJulian Elischer         fibnum = curthread->td_proc->p_fibnum;
1728b07e49aSJulian Elischer         error = sysctl_handle_int(oidp, &fibnum, 0, req);
1738b07e49aSJulian Elischer         return (error);
174df8bae1dSRodney W. Grimes }
175df8bae1dSRodney W. Grimes 
1768b07e49aSJulian Elischer SYSCTL_PROC(_net, OID_AUTO, my_fibnum, CTLTYPE_INT|CTLFLAG_RD,
1778b07e49aSJulian Elischer             NULL, 0, &sysctl_my_fibnum, "I", "default FIB of caller");
1782dc1d581SAndre Oppermann 
17961eee0e2SAlexander V. Chernikov static __inline struct rib_head **
180c2c2a7c1SBjoern A. Zeeb rt_tables_get_rnh_ptr(int table, int fam)
181c2c2a7c1SBjoern A. Zeeb {
18261eee0e2SAlexander V. Chernikov 	struct rib_head **rnh;
183c2c2a7c1SBjoern A. Zeeb 
184c2c2a7c1SBjoern A. Zeeb 	KASSERT(table >= 0 && table < rt_numfibs, ("%s: table out of bounds.",
185c2c2a7c1SBjoern A. Zeeb 	    __func__));
186c2c2a7c1SBjoern A. Zeeb 	KASSERT(fam >= 0 && fam < (AF_MAX+1), ("%s: fam out of bounds.",
187c2c2a7c1SBjoern A. Zeeb 	    __func__));
188c2c2a7c1SBjoern A. Zeeb 
189c2c2a7c1SBjoern A. Zeeb 	/* rnh is [fib=0][af=0]. */
19061eee0e2SAlexander V. Chernikov 	rnh = (struct rib_head **)V_rt_tables;
191c2c2a7c1SBjoern A. Zeeb 	/* Get the offset to the requested table and fam. */
192c2c2a7c1SBjoern A. Zeeb 	rnh += table * (AF_MAX+1) + fam;
193c2c2a7c1SBjoern A. Zeeb 
194c2c2a7c1SBjoern A. Zeeb 	return (rnh);
195c2c2a7c1SBjoern A. Zeeb }
196c2c2a7c1SBjoern A. Zeeb 
19761eee0e2SAlexander V. Chernikov struct rib_head *
198c2c2a7c1SBjoern A. Zeeb rt_tables_get_rnh(int table, int fam)
199c2c2a7c1SBjoern A. Zeeb {
200c2c2a7c1SBjoern A. Zeeb 
201c2c2a7c1SBjoern A. Zeeb 	return (*rt_tables_get_rnh_ptr(table, fam));
202c2c2a7c1SBjoern A. Zeeb }
203c2c2a7c1SBjoern A. Zeeb 
2044f321dbdSBjoern A. Zeeb u_int
20584cc0778SGeorge V. Neville-Neil rt_tables_get_gen(int table, int fam)
20684cc0778SGeorge V. Neville-Neil {
20784cc0778SGeorge V. Neville-Neil 	struct rib_head *rnh;
20884cc0778SGeorge V. Neville-Neil 
20984cc0778SGeorge V. Neville-Neil 	rnh = *rt_tables_get_rnh_ptr(table, fam);
2106d768226SGeorge V. Neville-Neil 	KASSERT(rnh != NULL, ("%s: NULL rib_head pointer table %d fam %d",
2116d768226SGeorge V. Neville-Neil 	    __func__, table, fam));
21284cc0778SGeorge V. Neville-Neil 	return (rnh->rnh_gen);
21384cc0778SGeorge V. Neville-Neil }
21484cc0778SGeorge V. Neville-Neil 
21584cc0778SGeorge V. Neville-Neil 
216d0728d71SRobert Watson /*
217d0728d71SRobert Watson  * route initialization must occur before ip6_init2(), which happenas at
218d0728d71SRobert Watson  * SI_ORDER_MIDDLE.
219d0728d71SRobert Watson  */
2202eb5613fSLuigi Rizzo static void
2212eb5613fSLuigi Rizzo route_init(void)
222df8bae1dSRodney W. Grimes {
2238b07e49aSJulian Elischer 
2246f95a5ebSJulian Elischer 	/* whack the tunable ints into  line. */
2258b07e49aSJulian Elischer 	if (rt_numfibs > RT_MAXFIBS)
2268b07e49aSJulian Elischer 		rt_numfibs = RT_MAXFIBS;
2278b07e49aSJulian Elischer 	if (rt_numfibs == 0)
2288b07e49aSJulian Elischer 		rt_numfibs = 1;
2291ed81b73SMarko Zec }
230d0728d71SRobert Watson SYSINIT(route_init, SI_SUB_PROTO_DOMAIN, SI_ORDER_THIRD, route_init, 0);
2311ed81b73SMarko Zec 
232e3a7aa6fSGleb Smirnoff static int
233e3a7aa6fSGleb Smirnoff rtentry_zinit(void *mem, int size, int how)
234e3a7aa6fSGleb Smirnoff {
235e3a7aa6fSGleb Smirnoff 	struct rtentry *rt = mem;
236e3a7aa6fSGleb Smirnoff 
237e3a7aa6fSGleb Smirnoff 	rt->rt_pksent = counter_u64_alloc(how);
238e3a7aa6fSGleb Smirnoff 	if (rt->rt_pksent == NULL)
239e3a7aa6fSGleb Smirnoff 		return (ENOMEM);
240e3a7aa6fSGleb Smirnoff 
241e3a7aa6fSGleb Smirnoff 	RT_LOCK_INIT(rt);
242e3a7aa6fSGleb Smirnoff 
243e3a7aa6fSGleb Smirnoff 	return (0);
244e3a7aa6fSGleb Smirnoff }
245e3a7aa6fSGleb Smirnoff 
246e3a7aa6fSGleb Smirnoff static void
247e3a7aa6fSGleb Smirnoff rtentry_zfini(void *mem, int size)
248e3a7aa6fSGleb Smirnoff {
249e3a7aa6fSGleb Smirnoff 	struct rtentry *rt = mem;
250e3a7aa6fSGleb Smirnoff 
251e3a7aa6fSGleb Smirnoff 	RT_LOCK_DESTROY(rt);
252e3a7aa6fSGleb Smirnoff 	counter_u64_free(rt->rt_pksent);
253e3a7aa6fSGleb Smirnoff }
254e3a7aa6fSGleb Smirnoff 
255e3a7aa6fSGleb Smirnoff static int
256e3a7aa6fSGleb Smirnoff rtentry_ctor(void *mem, int size, void *arg, int how)
257e3a7aa6fSGleb Smirnoff {
258e3a7aa6fSGleb Smirnoff 	struct rtentry *rt = mem;
259e3a7aa6fSGleb Smirnoff 
260e3a7aa6fSGleb Smirnoff 	bzero(rt, offsetof(struct rtentry, rt_endzero));
261e3a7aa6fSGleb Smirnoff 	counter_u64_zero(rt->rt_pksent);
262e8b0643eSAlexander V. Chernikov 	rt->rt_chain = NULL;
263e3a7aa6fSGleb Smirnoff 
264e3a7aa6fSGleb Smirnoff 	return (0);
265e3a7aa6fSGleb Smirnoff }
266e3a7aa6fSGleb Smirnoff 
267d0728d71SRobert Watson static void
268256ea2abSGleb Smirnoff rtentry_dtor(void *mem, int size, void *arg)
269256ea2abSGleb Smirnoff {
270256ea2abSGleb Smirnoff 	struct rtentry *rt = mem;
271256ea2abSGleb Smirnoff 
272256ea2abSGleb Smirnoff 	RT_UNLOCK_COND(rt);
273256ea2abSGleb Smirnoff }
274256ea2abSGleb Smirnoff 
275256ea2abSGleb Smirnoff static void
276d0728d71SRobert Watson vnet_route_init(const void *unused __unused)
2771ed81b73SMarko Zec {
2781ed81b73SMarko Zec 	struct domain *dom;
27961eee0e2SAlexander V. Chernikov 	struct rib_head **rnh;
280c2c2a7c1SBjoern A. Zeeb 	int table;
2811ed81b73SMarko Zec 	int fam;
2821ed81b73SMarko Zec 
283c2c2a7c1SBjoern A. Zeeb 	V_rt_tables = malloc(rt_numfibs * (AF_MAX+1) *
28461eee0e2SAlexander V. Chernikov 	    sizeof(struct rib_head *), M_RTABLE, M_WAITOK|M_ZERO);
285c2c2a7c1SBjoern A. Zeeb 
286e3a7aa6fSGleb Smirnoff 	V_rtzone = uma_zcreate("rtentry", sizeof(struct rtentry),
287256ea2abSGleb Smirnoff 	    rtentry_ctor, rtentry_dtor,
288e3a7aa6fSGleb Smirnoff 	    rtentry_zinit, rtentry_zfini, UMA_ALIGN_PTR, 0);
2898b07e49aSJulian Elischer 	for (dom = domains; dom; dom = dom->dom_next) {
290b680a383SBjoern A. Zeeb 		if (dom->dom_rtattach == NULL)
291b680a383SBjoern A. Zeeb 			continue;
292b680a383SBjoern A. Zeeb 
2938b07e49aSJulian Elischer 		for  (table = 0; table < rt_numfibs; table++) {
294b680a383SBjoern A. Zeeb 			fam = dom->dom_family;
295b680a383SBjoern A. Zeeb 			if (table != 0 && fam != AF_INET6 && fam != AF_INET)
296b680a383SBjoern A. Zeeb 				break;
297b680a383SBjoern A. Zeeb 
298c2c2a7c1SBjoern A. Zeeb 			rnh = rt_tables_get_rnh_ptr(table, fam);
299c2c2a7c1SBjoern A. Zeeb 			if (rnh == NULL)
300c2c2a7c1SBjoern A. Zeeb 				panic("%s: rnh NULL", __func__);
301146a181fSAlexander V. Chernikov 			dom->dom_rtattach((void **)rnh, 0);
3028b07e49aSJulian Elischer 		}
3038b07e49aSJulian Elischer 	}
3048b07e49aSJulian Elischer }
305d0728d71SRobert Watson VNET_SYSINIT(vnet_route_init, SI_SUB_PROTO_DOMAIN, SI_ORDER_FOURTH,
306d0728d71SRobert Watson     vnet_route_init, 0);
3078b07e49aSJulian Elischer 
308bc29160dSMarko Zec #ifdef VIMAGE
309d0728d71SRobert Watson static void
310d0728d71SRobert Watson vnet_route_uninit(const void *unused __unused)
311bc29160dSMarko Zec {
312bc29160dSMarko Zec 	int table;
313bc29160dSMarko Zec 	int fam;
314bc29160dSMarko Zec 	struct domain *dom;
31561eee0e2SAlexander V. Chernikov 	struct rib_head **rnh;
316bc29160dSMarko Zec 
317bc29160dSMarko Zec 	for (dom = domains; dom; dom = dom->dom_next) {
318b680a383SBjoern A. Zeeb 		if (dom->dom_rtdetach == NULL)
319b680a383SBjoern A. Zeeb 			continue;
320b680a383SBjoern A. Zeeb 
321bc29160dSMarko Zec 		for (table = 0; table < rt_numfibs; table++) {
322b680a383SBjoern A. Zeeb 			fam = dom->dom_family;
323b680a383SBjoern A. Zeeb 
324b680a383SBjoern A. Zeeb 			if (table != 0 && fam != AF_INET6 && fam != AF_INET)
325b680a383SBjoern A. Zeeb 				break;
326b680a383SBjoern A. Zeeb 
327bc29160dSMarko Zec 			rnh = rt_tables_get_rnh_ptr(table, fam);
328bc29160dSMarko Zec 			if (rnh == NULL)
329bc29160dSMarko Zec 				panic("%s: rnh NULL", __func__);
33057c3556bSAlexander V. Chernikov 			dom->dom_rtdetach((void **)rnh, 0);
331bc29160dSMarko Zec 		}
332bc29160dSMarko Zec 	}
3336274ce3eSCraig Rodrigues 
3346274ce3eSCraig Rodrigues 	free(V_rt_tables, M_RTABLE);
3356274ce3eSCraig Rodrigues 	uma_zdestroy(V_rtzone);
336bc29160dSMarko Zec }
33789856f7eSBjoern A. Zeeb VNET_SYSUNINIT(vnet_route_uninit, SI_SUB_PROTO_DOMAIN, SI_ORDER_FIRST,
338d0728d71SRobert Watson     vnet_route_uninit, 0);
339bc29160dSMarko Zec #endif
340bc29160dSMarko Zec 
34161eee0e2SAlexander V. Chernikov struct rib_head *
34261eee0e2SAlexander V. Chernikov rt_table_init(int offset)
34361eee0e2SAlexander V. Chernikov {
34461eee0e2SAlexander V. Chernikov 	struct rib_head *rh;
34561eee0e2SAlexander V. Chernikov 
34661eee0e2SAlexander V. Chernikov 	rh = malloc(sizeof(struct rib_head), M_RTABLE, M_WAITOK | M_ZERO);
34761eee0e2SAlexander V. Chernikov 
34861eee0e2SAlexander V. Chernikov 	/* TODO: These details should be hidded inside radix.c */
34961eee0e2SAlexander V. Chernikov 	/* Init masks tree */
35061eee0e2SAlexander V. Chernikov 	rn_inithead_internal(&rh->head, rh->rnh_nodes, offset);
35161eee0e2SAlexander V. Chernikov 	rn_inithead_internal(&rh->rmhead.head, rh->rmhead.mask_nodes, 0);
35261eee0e2SAlexander V. Chernikov 	rh->head.rnh_masks = &rh->rmhead;
35361eee0e2SAlexander V. Chernikov 
35461eee0e2SAlexander V. Chernikov 	/* Init locks */
355abe95d87SAndrey V. Elsukov 	RIB_LOCK_INIT(rh);
35661eee0e2SAlexander V. Chernikov 
35761eee0e2SAlexander V. Chernikov 	/* Finally, set base callbacks */
35861eee0e2SAlexander V. Chernikov 	rh->rnh_addaddr = rn_addroute;
35961eee0e2SAlexander V. Chernikov 	rh->rnh_deladdr = rn_delete;
36061eee0e2SAlexander V. Chernikov 	rh->rnh_matchaddr = rn_match;
36161eee0e2SAlexander V. Chernikov 	rh->rnh_lookup = rn_lookup;
36261eee0e2SAlexander V. Chernikov 	rh->rnh_walktree = rn_walktree;
36361eee0e2SAlexander V. Chernikov 	rh->rnh_walktree_from = rn_walktree_from;
36461eee0e2SAlexander V. Chernikov 
36561eee0e2SAlexander V. Chernikov 	return (rh);
36661eee0e2SAlexander V. Chernikov }
36761eee0e2SAlexander V. Chernikov 
368a5243af2SBjoern A. Zeeb static int
369a5243af2SBjoern A. Zeeb rt_freeentry(struct radix_node *rn, void *arg)
370a5243af2SBjoern A. Zeeb {
371a5243af2SBjoern A. Zeeb 	struct radix_head * const rnh = arg;
372a5243af2SBjoern A. Zeeb 	struct radix_node *x;
373a5243af2SBjoern A. Zeeb 
374a5243af2SBjoern A. Zeeb 	x = (struct radix_node *)rn_delete(rn + 2, NULL, rnh);
375a5243af2SBjoern A. Zeeb 	if (x != NULL)
376a5243af2SBjoern A. Zeeb 		R_Free(x);
377a5243af2SBjoern A. Zeeb 	return (0);
378a5243af2SBjoern A. Zeeb }
379a5243af2SBjoern A. Zeeb 
38061eee0e2SAlexander V. Chernikov void
38161eee0e2SAlexander V. Chernikov rt_table_destroy(struct rib_head *rh)
38261eee0e2SAlexander V. Chernikov {
38361eee0e2SAlexander V. Chernikov 
384a5243af2SBjoern A. Zeeb 	rn_walktree(&rh->rmhead.head, rt_freeentry, &rh->rmhead.head);
385a5243af2SBjoern A. Zeeb 
38661eee0e2SAlexander V. Chernikov 	/* Assume table is already empty */
387abe95d87SAndrey V. Elsukov 	RIB_LOCK_DESTROY(rh);
38861eee0e2SAlexander V. Chernikov 	free(rh, M_RTABLE);
38961eee0e2SAlexander V. Chernikov }
39061eee0e2SAlexander V. Chernikov 
39161eee0e2SAlexander V. Chernikov 
3928b07e49aSJulian Elischer #ifndef _SYS_SYSPROTO_H_
3938b07e49aSJulian Elischer struct setfib_args {
3948b07e49aSJulian Elischer 	int     fibnum;
3958b07e49aSJulian Elischer };
3968b07e49aSJulian Elischer #endif
3978b07e49aSJulian Elischer int
3988451d0ddSKip Macy sys_setfib(struct thread *td, struct setfib_args *uap)
3998b07e49aSJulian Elischer {
4008b07e49aSJulian Elischer 	if (uap->fibnum < 0 || uap->fibnum >= rt_numfibs)
4018b07e49aSJulian Elischer 		return EINVAL;
4028b07e49aSJulian Elischer 	td->td_proc->p_fibnum = uap->fibnum;
4038b07e49aSJulian Elischer 	return (0);
404df8bae1dSRodney W. Grimes }
405df8bae1dSRodney W. Grimes 
406df8bae1dSRodney W. Grimes /*
407df8bae1dSRodney W. Grimes  * Packet routing routines.
408df8bae1dSRodney W. Grimes  */
409df8bae1dSRodney W. Grimes void
4108b07e49aSJulian Elischer rtalloc_ign_fib(struct route *ro, u_long ignore, u_int fibnum)
4118b07e49aSJulian Elischer {
4128b07e49aSJulian Elischer 	struct rtentry *rt;
4138b07e49aSJulian Elischer 
4148b07e49aSJulian Elischer 	if ((rt = ro->ro_rt) != NULL) {
4158b07e49aSJulian Elischer 		if (rt->rt_ifp != NULL && rt->rt_flags & RTF_UP)
4168b07e49aSJulian Elischer 			return;
4178b07e49aSJulian Elischer 		RTFREE(rt);
4188b07e49aSJulian Elischer 		ro->ro_rt = NULL;
4198b07e49aSJulian Elischer 	}
4208b07e49aSJulian Elischer 	ro->ro_rt = rtalloc1_fib(&ro->ro_dst, 1, ignore, fibnum);
421d1dd20beSSam Leffler 	if (ro->ro_rt)
422d1dd20beSSam Leffler 		RT_UNLOCK(ro->ro_rt);
423652082e6SGarrett Wollman }
424652082e6SGarrett Wollman 
425b0a76b88SJulian Elischer /*
426b0a76b88SJulian Elischer  * Look up the route that matches the address given
427b0a76b88SJulian Elischer  * Or, at least try.. Create a cloned route if needed.
428d1dd20beSSam Leffler  *
429d1dd20beSSam Leffler  * The returned route, if any, is locked.
430b0a76b88SJulian Elischer  */
431df8bae1dSRodney W. Grimes struct rtentry *
432d1dd20beSSam Leffler rtalloc1(struct sockaddr *dst, int report, u_long ignflags)
433df8bae1dSRodney W. Grimes {
434a8498625SBjoern A. Zeeb 
435a8498625SBjoern A. Zeeb 	return (rtalloc1_fib(dst, report, ignflags, RT_DEFAULT_FIB));
4368b07e49aSJulian Elischer }
4378b07e49aSJulian Elischer 
4388b07e49aSJulian Elischer struct rtentry *
4398b07e49aSJulian Elischer rtalloc1_fib(struct sockaddr *dst, int report, u_long ignflags,
4408b07e49aSJulian Elischer 		    u_int fibnum)
4418b07e49aSJulian Elischer {
44261eee0e2SAlexander V. Chernikov 	struct rib_head *rh;
443d1dd20beSSam Leffler 	struct radix_node *rn;
444d1dd20beSSam Leffler 	struct rtentry *newrt;
445df8bae1dSRodney W. Grimes 	struct rt_addrinfo info;
4466e6b3f7cSQing Li 	int err = 0, msgtype = RTM_MISS;
447df8bae1dSRodney W. Grimes 
4488b07e49aSJulian Elischer 	KASSERT((fibnum < rt_numfibs), ("rtalloc1_fib: bad fibnum"));
44961eee0e2SAlexander V. Chernikov 	rh = rt_tables_get_rnh(fibnum, dst->sa_family);
450e579f1c1SDmitry Chagin 	newrt = NULL;
45161eee0e2SAlexander V. Chernikov 	if (rh == NULL)
452523e6002SDmitry Chagin 		goto miss;
453523e6002SDmitry Chagin 
454b0a76b88SJulian Elischer 	/*
455b0a76b88SJulian Elischer 	 * Look up the address in the table for that Address Family
456b0a76b88SJulian Elischer 	 */
45761eee0e2SAlexander V. Chernikov 	RIB_RLOCK(rh);
45861eee0e2SAlexander V. Chernikov 	rn = rh->rnh_matchaddr(dst, &rh->head);
4593120b9d4SKip Macy 	if (rn && ((rn->rn_flags & RNF_ROOT) == 0)) {
4606a873ef7SDmitry Chagin 		newrt = RNTORT(rn);
4613120b9d4SKip Macy 		RT_LOCK(newrt);
4623120b9d4SKip Macy 		RT_ADDREF(newrt);
46361eee0e2SAlexander V. Chernikov 		RIB_RUNLOCK(rh);
4640eb64f4eSAlexander V. Chernikov 		return (newrt);
4656e6b3f7cSQing Li 
4660eb64f4eSAlexander V. Chernikov 	} else
46761eee0e2SAlexander V. Chernikov 		RIB_RUNLOCK(rh);
4683120b9d4SKip Macy 
469b0a76b88SJulian Elischer 	/*
4708f1c8adeSLuiz Otavio O Souza 	 * Either we hit the root or could not find any match,
4718f1c8adeSLuiz Otavio O Souza 	 * which basically means: "cannot get there from here".
472b0a76b88SJulian Elischer 	 */
473956b0b65SJeffrey Hsu miss:
474523e6002SDmitry Chagin 	V_rtstat.rts_unreach++;
475523e6002SDmitry Chagin 
4766e6b3f7cSQing Li 	if (report) {
477b0a76b88SJulian Elischer 		/*
478b0a76b88SJulian Elischer 		 * If required, report the failure to the supervising
479b0a76b88SJulian Elischer 		 * Authorities.
480b0a76b88SJulian Elischer 		 * For a delete, this is not an error. (report == 0)
481b0a76b88SJulian Elischer 		 */
4826f5967c0SBruce Evans 		bzero(&info, sizeof(info));
483df8bae1dSRodney W. Grimes 		info.rti_info[RTAX_DST] = dst;
484528737fdSBjoern A. Zeeb 		rt_missmsg_fib(msgtype, &info, 0, err, fibnum);
485df8bae1dSRodney W. Grimes 	}
486df8bae1dSRodney W. Grimes 	return (newrt);
487df8bae1dSRodney W. Grimes }
488df8bae1dSRodney W. Grimes 
489499676dfSJulian Elischer /*
490499676dfSJulian Elischer  * Remove a reference count from an rtentry.
491499676dfSJulian Elischer  * If the count gets low enough, take it out of the routing table
492499676dfSJulian Elischer  */
493df8bae1dSRodney W. Grimes void
494d1dd20beSSam Leffler rtfree(struct rtentry *rt)
495df8bae1dSRodney W. Grimes {
49661eee0e2SAlexander V. Chernikov 	struct rib_head *rnh;
497df8bae1dSRodney W. Grimes 
498a0c0e34bSGleb Smirnoff 	KASSERT(rt != NULL,("%s: NULL rt", __func__));
499c2c2a7c1SBjoern A. Zeeb 	rnh = rt_tables_get_rnh(rt->rt_fibnum, rt_key(rt)->sa_family);
500a0c0e34bSGleb Smirnoff 	KASSERT(rnh != NULL,("%s: NULL rnh", __func__));
501499676dfSJulian Elischer 
502d1dd20beSSam Leffler 	RT_LOCK_ASSERT(rt);
503d1dd20beSSam Leffler 
504499676dfSJulian Elischer 	/*
505a0c0e34bSGleb Smirnoff 	 * The callers should use RTFREE_LOCKED() or RTFREE(), so
506a0c0e34bSGleb Smirnoff 	 * we should come here exactly with the last reference.
507499676dfSJulian Elischer 	 */
5087138d65cSSam Leffler 	RT_REMREF(rt);
509a0c0e34bSGleb Smirnoff 	if (rt->rt_refcnt > 0) {
510a42ea597SQing Li 		log(LOG_DEBUG, "%s: %p has %d refs\n", __func__, rt, rt->rt_refcnt);
511d1dd20beSSam Leffler 		goto done;
512a0c0e34bSGleb Smirnoff 	}
5139c63e9dbSSam Leffler 
5149c63e9dbSSam Leffler 	/*
5159c63e9dbSSam Leffler 	 * On last reference give the "close method" a chance
5169c63e9dbSSam Leffler 	 * to cleanup private state.  This also permits (for
5179c63e9dbSSam Leffler 	 * IPv4 and IPv6) a chance to decide if the routing table
5189c63e9dbSSam Leffler 	 * entry should be purged immediately or at a later time.
5199c63e9dbSSam Leffler 	 * When an immediate purge is to happen the close routine
5209c63e9dbSSam Leffler 	 * typically calls rtexpunge which clears the RTF_UP flag
5219c63e9dbSSam Leffler 	 * on the entry so that the code below reclaims the storage.
5229c63e9dbSSam Leffler 	 */
523d1dd20beSSam Leffler 	if (rt->rt_refcnt == 0 && rnh->rnh_close)
52461eee0e2SAlexander V. Chernikov 		rnh->rnh_close((struct radix_node *)rt, &rnh->head);
525499676dfSJulian Elischer 
526499676dfSJulian Elischer 	/*
527499676dfSJulian Elischer 	 * If we are no longer "up" (and ref == 0)
528499676dfSJulian Elischer 	 * then we can free the resources associated
529499676dfSJulian Elischer 	 * with the route.
530499676dfSJulian Elischer 	 */
531d1dd20beSSam Leffler 	if ((rt->rt_flags & RTF_UP) == 0) {
532df8bae1dSRodney W. Grimes 		if (rt->rt_nodes->rn_flags & (RNF_ACTIVE | RNF_ROOT))
533df8bae1dSRodney W. Grimes 			panic("rtfree 2");
534499676dfSJulian Elischer 		/*
535499676dfSJulian Elischer 		 * the rtentry must have been removed from the routing table
536499676dfSJulian Elischer 		 * so it is represented in rttrash.. remove that now.
537499676dfSJulian Elischer 		 */
538603724d3SBjoern A. Zeeb 		V_rttrash--;
539499676dfSJulian Elischer #ifdef	DIAGNOSTIC
540df8bae1dSRodney W. Grimes 		if (rt->rt_refcnt < 0) {
541623ae52eSPoul-Henning Kamp 			printf("rtfree: %p not freed (neg refs)\n", rt);
542d1dd20beSSam Leffler 			goto done;
543df8bae1dSRodney W. Grimes 		}
544499676dfSJulian Elischer #endif
545499676dfSJulian Elischer 		/*
546499676dfSJulian Elischer 		 * release references on items we hold them on..
547499676dfSJulian Elischer 		 * e.g other routes and ifaddrs.
548499676dfSJulian Elischer 		 */
54919fc74fbSJeffrey Hsu 		if (rt->rt_ifa)
5501099f828SRobert Watson 			ifa_free(rt->rt_ifa);
551499676dfSJulian Elischer 		/*
552499676dfSJulian Elischer 		 * The key is separatly alloc'd so free it (see rt_setgate()).
553499676dfSJulian Elischer 		 * This also frees the gateway, as they are always malloc'd
554499676dfSJulian Elischer 		 * together.
555499676dfSJulian Elischer 		 */
5568b15f615SLuiz Otavio O Souza 		R_Free(rt_key(rt));
557499676dfSJulian Elischer 
558499676dfSJulian Elischer 		/*
559499676dfSJulian Elischer 		 * and the rtentry itself of course
560499676dfSJulian Elischer 		 */
5611ed81b73SMarko Zec 		uma_zfree(V_rtzone, rt);
562d1dd20beSSam Leffler 		return;
563df8bae1dSRodney W. Grimes 	}
564d1dd20beSSam Leffler done:
565d1dd20beSSam Leffler 	RT_UNLOCK(rt);
566df8bae1dSRodney W. Grimes }
567df8bae1dSRodney W. Grimes 
568df8bae1dSRodney W. Grimes 
569df8bae1dSRodney W. Grimes /*
570df8bae1dSRodney W. Grimes  * Force a routing table entry to the specified
571df8bae1dSRodney W. Grimes  * destination to go through the given gateway.
572df8bae1dSRodney W. Grimes  * Normally called as a result of a routing redirect
573df8bae1dSRodney W. Grimes  * message from the network layer.
574df8bae1dSRodney W. Grimes  */
57526f9a767SRodney W. Grimes void
5768b07e49aSJulian Elischer rtredirect_fib(struct sockaddr *dst,
5778b07e49aSJulian Elischer 	struct sockaddr *gateway,
5788b07e49aSJulian Elischer 	struct sockaddr *netmask,
5798b07e49aSJulian Elischer 	int flags,
5808b07e49aSJulian Elischer 	struct sockaddr *src,
5818b07e49aSJulian Elischer 	u_int fibnum)
5828b07e49aSJulian Elischer {
583f2b2e77aSAlexander V. Chernikov 	struct rtentry *rt;
584df8bae1dSRodney W. Grimes 	int error = 0;
58585911824SLuigi Rizzo 	short *stat = NULL;
586df8bae1dSRodney W. Grimes 	struct rt_addrinfo info;
587df8bae1dSRodney W. Grimes 	struct ifaddr *ifa;
58861eee0e2SAlexander V. Chernikov 	struct rib_head *rnh;
589c2c2a7c1SBjoern A. Zeeb 
5908c0fec80SRobert Watson 	ifa = NULL;
591c2c2a7c1SBjoern A. Zeeb 	rnh = rt_tables_get_rnh(fibnum, dst->sa_family);
592c2c2a7c1SBjoern A. Zeeb 	if (rnh == NULL) {
593c2c2a7c1SBjoern A. Zeeb 		error = EAFNOSUPPORT;
594c2c2a7c1SBjoern A. Zeeb 		goto out;
595c2c2a7c1SBjoern A. Zeeb 	}
596df8bae1dSRodney W. Grimes 
597df8bae1dSRodney W. Grimes 	/* verify the gateway is directly reachable */
5984f8585e0SAlan Somers 	if ((ifa = ifa_ifwithnet(gateway, 0, fibnum)) == NULL) {
599df8bae1dSRodney W. Grimes 		error = ENETUNREACH;
600df8bae1dSRodney W. Grimes 		goto out;
601df8bae1dSRodney W. Grimes 	}
6028b07e49aSJulian Elischer 	rt = rtalloc1_fib(dst, 0, 0UL, fibnum);	/* NB: rt is locked */
603df8bae1dSRodney W. Grimes 	/*
604df8bae1dSRodney W. Grimes 	 * If the redirect isn't from our current router for this dst,
605df8bae1dSRodney W. Grimes 	 * it's either old or wrong.  If it redirects us to ourselves,
606df8bae1dSRodney W. Grimes 	 * we have a routing loop, perhaps as a result of an interface
607df8bae1dSRodney W. Grimes 	 * going down recently.
608df8bae1dSRodney W. Grimes 	 */
60917a03656SEric van Gyzen 	if (!(flags & RTF_DONE) && rt) {
61017a03656SEric van Gyzen 		if (!sa_equal(src, rt->rt_gateway)) {
611df8bae1dSRodney W. Grimes 			error = EINVAL;
612df8bae1dSRodney W. Grimes 			goto done;
61317a03656SEric van Gyzen 		}
61417a03656SEric van Gyzen 		if (rt->rt_ifa != ifa && ifa->ifa_addr->sa_family != AF_LINK) {
61517a03656SEric van Gyzen 			error = EINVAL;
61617a03656SEric van Gyzen 			goto done;
61717a03656SEric van Gyzen 		}
61817a03656SEric van Gyzen 	}
61917a03656SEric van Gyzen 	if ((flags & RTF_GATEWAY) && ifa_ifwithaddr_check(gateway)) {
62017a03656SEric van Gyzen 		error = EHOSTUNREACH;
62117a03656SEric van Gyzen 		goto done;
62217a03656SEric van Gyzen 	}
623df8bae1dSRodney W. Grimes 	/*
624df8bae1dSRodney W. Grimes 	 * Create a new entry if we just got back a wildcard entry
6256bccea7cSRebecca Cran 	 * or the lookup failed.  This is necessary for hosts
626df8bae1dSRodney W. Grimes 	 * which use routing redirects generated by smart gateways
627df8bae1dSRodney W. Grimes 	 * to dynamically build the routing tables.
628df8bae1dSRodney W. Grimes 	 */
62985911824SLuigi Rizzo 	if (rt == NULL || (rt_mask(rt) && rt_mask(rt)->sa_len < 2))
630df8bae1dSRodney W. Grimes 		goto create;
631df8bae1dSRodney W. Grimes 	/*
632df8bae1dSRodney W. Grimes 	 * Don't listen to the redirect if it's
633df8bae1dSRodney W. Grimes 	 * for a route to an interface.
634df8bae1dSRodney W. Grimes 	 */
635df8bae1dSRodney W. Grimes 	if (rt->rt_flags & RTF_GATEWAY) {
636df8bae1dSRodney W. Grimes 		if (((rt->rt_flags & RTF_HOST) == 0) && (flags & RTF_HOST)) {
637df8bae1dSRodney W. Grimes 			/*
638df8bae1dSRodney W. Grimes 			 * Changing from route to net => route to host.
639df8bae1dSRodney W. Grimes 			 * Create new route, rather than smashing route to net.
640df8bae1dSRodney W. Grimes 			 */
641df8bae1dSRodney W. Grimes 		create:
642fcbfdb37SAlexander V. Chernikov 			if (rt != NULL)
643fcbfdb37SAlexander V. Chernikov 				RTFREE_LOCKED(rt);
6448e7e854cSKip Macy 
64517a03656SEric van Gyzen 			flags |= RTF_DYNAMIC;
6468071913dSRuslan Ermilov 			bzero((caddr_t)&info, sizeof(info));
6478071913dSRuslan Ermilov 			info.rti_info[RTAX_DST] = dst;
6488071913dSRuslan Ermilov 			info.rti_info[RTAX_GATEWAY] = gateway;
6498071913dSRuslan Ermilov 			info.rti_info[RTAX_NETMASK] = netmask;
6508071913dSRuslan Ermilov 			info.rti_ifa = ifa;
6518071913dSRuslan Ermilov 			info.rti_flags = flags;
6528b07e49aSJulian Elischer 			error = rtrequest1_fib(RTM_ADD, &info, &rt, fibnum);
653d1dd20beSSam Leffler 			if (rt != NULL) {
6544de5d90cSSam Leffler 				RT_LOCK(rt);
6558071913dSRuslan Ermilov 				flags = rt->rt_flags;
656d1dd20beSSam Leffler 			}
6578e7e854cSKip Macy 
658603724d3SBjoern A. Zeeb 			stat = &V_rtstat.rts_dynamic;
659df8bae1dSRodney W. Grimes 		} else {
6608e7e854cSKip Macy 
661df8bae1dSRodney W. Grimes 			/*
662df8bae1dSRodney W. Grimes 			 * Smash the current notion of the gateway to
663df8bae1dSRodney W. Grimes 			 * this destination.  Should check about netmask!!!
664df8bae1dSRodney W. Grimes 			 */
66517a03656SEric van Gyzen 			if ((flags & RTF_GATEWAY) == 0)
66617a03656SEric van Gyzen 				rt->rt_flags &= ~RTF_GATEWAY;
667df8bae1dSRodney W. Grimes 			rt->rt_flags |= RTF_MODIFIED;
668df8bae1dSRodney W. Grimes 			flags |= RTF_MODIFIED;
669603724d3SBjoern A. Zeeb 			stat = &V_rtstat.rts_newgateway;
670499676dfSJulian Elischer 			/*
671499676dfSJulian Elischer 			 * add the key and gateway (in one malloc'd chunk).
672499676dfSJulian Elischer 			 */
6733120b9d4SKip Macy 			RT_UNLOCK(rt);
67461eee0e2SAlexander V. Chernikov 			RIB_WLOCK(rnh);
6753120b9d4SKip Macy 			RT_LOCK(rt);
676df8bae1dSRodney W. Grimes 			rt_setgate(rt, rt_key(rt), gateway);
67761eee0e2SAlexander V. Chernikov 			RIB_WUNLOCK(rnh);
678df8bae1dSRodney W. Grimes 		}
679df8bae1dSRodney W. Grimes 	} else
680df8bae1dSRodney W. Grimes 		error = EHOSTUNREACH;
681df8bae1dSRodney W. Grimes done:
682d1dd20beSSam Leffler 	if (rt)
6831951e633SJohn Baldwin 		RTFREE_LOCKED(rt);
684df8bae1dSRodney W. Grimes out:
685df8bae1dSRodney W. Grimes 	if (error)
686603724d3SBjoern A. Zeeb 		V_rtstat.rts_badredirect++;
687df8bae1dSRodney W. Grimes 	else if (stat != NULL)
688df8bae1dSRodney W. Grimes 		(*stat)++;
689df8bae1dSRodney W. Grimes 	bzero((caddr_t)&info, sizeof(info));
690df8bae1dSRodney W. Grimes 	info.rti_info[RTAX_DST] = dst;
691df8bae1dSRodney W. Grimes 	info.rti_info[RTAX_GATEWAY] = gateway;
692df8bae1dSRodney W. Grimes 	info.rti_info[RTAX_NETMASK] = netmask;
693df8bae1dSRodney W. Grimes 	info.rti_info[RTAX_AUTHOR] = src;
694528737fdSBjoern A. Zeeb 	rt_missmsg_fib(RTM_REDIRECT, &info, flags, error, fibnum);
6958c0fec80SRobert Watson 	if (ifa != NULL)
6968c0fec80SRobert Watson 		ifa_free(ifa);
697df8bae1dSRodney W. Grimes }
698df8bae1dSRodney W. Grimes 
699df8bae1dSRodney W. Grimes /*
700df8bae1dSRodney W. Grimes  * Routing table ioctl interface.
701df8bae1dSRodney W. Grimes  */
702df8bae1dSRodney W. Grimes int
7038b07e49aSJulian Elischer rtioctl_fib(u_long req, caddr_t data, u_int fibnum)
704df8bae1dSRodney W. Grimes {
7055090559bSChristian S.J. Peron 
7065090559bSChristian S.J. Peron 	/*
7075090559bSChristian S.J. Peron 	 * If more ioctl commands are added here, make sure the proper
7085090559bSChristian S.J. Peron 	 * super-user checks are being performed because it is possible for
7095090559bSChristian S.J. Peron 	 * prison-root to make it this far if raw sockets have been enabled
7105090559bSChristian S.J. Peron 	 * in jails.
7115090559bSChristian S.J. Peron 	 */
712623ae52eSPoul-Henning Kamp #ifdef INET
713f0068c4aSGarrett Wollman 	/* Multicast goop, grrr... */
7148b07e49aSJulian Elischer 	return mrt_ioctl ? mrt_ioctl(req, data, fibnum) : EOPNOTSUPP;
715623ae52eSPoul-Henning Kamp #else /* INET */
716623ae52eSPoul-Henning Kamp 	return ENXIO;
717623ae52eSPoul-Henning Kamp #endif /* INET */
718df8bae1dSRodney W. Grimes }
719df8bae1dSRodney W. Grimes 
720df8bae1dSRodney W. Grimes struct ifaddr *
721441f9243SAlexander V. Chernikov ifa_ifwithroute(int flags, const struct sockaddr *dst, struct sockaddr *gateway,
7228b07e49aSJulian Elischer 				u_int fibnum)
7238b07e49aSJulian Elischer {
724f59c6cb0SAlexander V. Chernikov 	struct ifaddr *ifa;
725e034e82cSQing Li 	int not_found = 0;
726d1dd20beSSam Leffler 
727df8bae1dSRodney W. Grimes 	if ((flags & RTF_GATEWAY) == 0) {
728df8bae1dSRodney W. Grimes 		/*
729df8bae1dSRodney W. Grimes 		 * If we are adding a route to an interface,
730df8bae1dSRodney W. Grimes 		 * and the interface is a pt to pt link
731df8bae1dSRodney W. Grimes 		 * we should search for the destination
732df8bae1dSRodney W. Grimes 		 * as our clue to the interface.  Otherwise
733df8bae1dSRodney W. Grimes 		 * we can use the local address.
734df8bae1dSRodney W. Grimes 		 */
73585911824SLuigi Rizzo 		ifa = NULL;
73685911824SLuigi Rizzo 		if (flags & RTF_HOST)
7374f8585e0SAlan Somers 			ifa = ifa_ifwithdstaddr(dst, fibnum);
73885911824SLuigi Rizzo 		if (ifa == NULL)
739df8bae1dSRodney W. Grimes 			ifa = ifa_ifwithaddr(gateway);
740df8bae1dSRodney W. Grimes 	} else {
741df8bae1dSRodney W. Grimes 		/*
742df8bae1dSRodney W. Grimes 		 * If we are adding a route to a remote net
743df8bae1dSRodney W. Grimes 		 * or host, the gateway may still be on the
744df8bae1dSRodney W. Grimes 		 * other end of a pt to pt link.
745df8bae1dSRodney W. Grimes 		 */
7464f8585e0SAlan Somers 		ifa = ifa_ifwithdstaddr(gateway, fibnum);
747df8bae1dSRodney W. Grimes 	}
74885911824SLuigi Rizzo 	if (ifa == NULL)
7494f8585e0SAlan Somers 		ifa = ifa_ifwithnet(gateway, 0, fibnum);
75085911824SLuigi Rizzo 	if (ifa == NULL) {
751048738b5SAlexander V. Chernikov 		struct rtentry *rt = rtalloc1_fib(gateway, 0, 0, fibnum);
75285911824SLuigi Rizzo 		if (rt == NULL)
75385911824SLuigi Rizzo 			return (NULL);
754e034e82cSQing Li 		/*
755e034e82cSQing Li 		 * dismiss a gateway that is reachable only
756e034e82cSQing Li 		 * through the default router
757e034e82cSQing Li 		 */
758e034e82cSQing Li 		switch (gateway->sa_family) {
759e034e82cSQing Li 		case AF_INET:
760e034e82cSQing Li 			if (satosin(rt_key(rt))->sin_addr.s_addr == INADDR_ANY)
761e034e82cSQing Li 				not_found = 1;
762e034e82cSQing Li 			break;
763e034e82cSQing Li 		case AF_INET6:
764e034e82cSQing Li 			if (IN6_IS_ADDR_UNSPECIFIED(&satosin6(rt_key(rt))->sin6_addr))
765e034e82cSQing Li 				not_found = 1;
766e034e82cSQing Li 			break;
767e034e82cSQing Li 		default:
768e034e82cSQing Li 			break;
769e034e82cSQing Li 		}
7708c0fec80SRobert Watson 		if (!not_found && rt->rt_ifa != NULL) {
7718c0fec80SRobert Watson 			ifa = rt->rt_ifa;
7728c0fec80SRobert Watson 			ifa_ref(ifa);
7738c0fec80SRobert Watson 		}
7747138d65cSSam Leffler 		RT_REMREF(rt);
775d1dd20beSSam Leffler 		RT_UNLOCK(rt);
7768c0fec80SRobert Watson 		if (not_found || ifa == NULL)
77785911824SLuigi Rizzo 			return (NULL);
778df8bae1dSRodney W. Grimes 	}
779df8bae1dSRodney W. Grimes 	if (ifa->ifa_addr->sa_family != dst->sa_family) {
780df8bae1dSRodney W. Grimes 		struct ifaddr *oifa = ifa;
781df8bae1dSRodney W. Grimes 		ifa = ifaof_ifpforaddr(dst, ifa->ifa_ifp);
78285911824SLuigi Rizzo 		if (ifa == NULL)
783df8bae1dSRodney W. Grimes 			ifa = oifa;
7848c0fec80SRobert Watson 		else
7858c0fec80SRobert Watson 			ifa_free(oifa);
786df8bae1dSRodney W. Grimes 	}
787df8bae1dSRodney W. Grimes 	return (ifa);
788df8bae1dSRodney W. Grimes }
789df8bae1dSRodney W. Grimes 
790b0a76b88SJulian Elischer /*
791b0a76b88SJulian Elischer  * Do appropriate manipulations of a routing tree given
792b0a76b88SJulian Elischer  * all the bits of info needed
793b0a76b88SJulian Elischer  */
794df8bae1dSRodney W. Grimes int
7958b07e49aSJulian Elischer rtrequest_fib(int req,
7968b07e49aSJulian Elischer 	struct sockaddr *dst,
7978b07e49aSJulian Elischer 	struct sockaddr *gateway,
7988b07e49aSJulian Elischer 	struct sockaddr *netmask,
7998b07e49aSJulian Elischer 	int flags,
8008b07e49aSJulian Elischer 	struct rtentry **ret_nrt,
8018b07e49aSJulian Elischer 	u_int fibnum)
8028b07e49aSJulian Elischer {
8038071913dSRuslan Ermilov 	struct rt_addrinfo info;
8048071913dSRuslan Ermilov 
805ac4a76ebSBjoern A. Zeeb 	if (dst->sa_len == 0)
806ac4a76ebSBjoern A. Zeeb 		return(EINVAL);
807ac4a76ebSBjoern A. Zeeb 
8088071913dSRuslan Ermilov 	bzero((caddr_t)&info, sizeof(info));
8098071913dSRuslan Ermilov 	info.rti_flags = flags;
8108071913dSRuslan Ermilov 	info.rti_info[RTAX_DST] = dst;
8118071913dSRuslan Ermilov 	info.rti_info[RTAX_GATEWAY] = gateway;
8128071913dSRuslan Ermilov 	info.rti_info[RTAX_NETMASK] = netmask;
8138b07e49aSJulian Elischer 	return rtrequest1_fib(req, &info, ret_nrt, fibnum);
8148071913dSRuslan Ermilov }
8158071913dSRuslan Ermilov 
8164bdf0b6aSAlexander V. Chernikov 
8172caee4beSAlexander V. Chernikov /*
8189a1b64d5SAlexander V. Chernikov  * Copy most of @rt data into @info.
8199a1b64d5SAlexander V. Chernikov  *
8209a1b64d5SAlexander V. Chernikov  * If @flags contains NHR_COPY, copies dst,netmask and gw to the
8219a1b64d5SAlexander V. Chernikov  * pointers specified by @info structure. Assume such pointers
8229a1b64d5SAlexander V. Chernikov  * are zeroed sockaddr-like structures with sa_len field initialized
8239a1b64d5SAlexander V. Chernikov  * to reflect size of the provided buffer. if no NHR_COPY is specified,
8249a1b64d5SAlexander V. Chernikov  * point dst,netmask and gw @info fields to appropriate @rt values.
8259a1b64d5SAlexander V. Chernikov  *
8269a1b64d5SAlexander V. Chernikov  * if @flags contains NHR_REF, do refcouting on rt_ifp.
8279a1b64d5SAlexander V. Chernikov  *
8289a1b64d5SAlexander V. Chernikov  * Returns 0 on success.
8299a1b64d5SAlexander V. Chernikov  */
8309a1b64d5SAlexander V. Chernikov int
8319a1b64d5SAlexander V. Chernikov rt_exportinfo(struct rtentry *rt, struct rt_addrinfo *info, int flags)
8329a1b64d5SAlexander V. Chernikov {
8339a1b64d5SAlexander V. Chernikov 	struct rt_metrics *rmx;
8349a1b64d5SAlexander V. Chernikov 	struct sockaddr *src, *dst;
8359a1b64d5SAlexander V. Chernikov 	int sa_len;
8369a1b64d5SAlexander V. Chernikov 
8379a1b64d5SAlexander V. Chernikov 	if (flags & NHR_COPY) {
8389a1b64d5SAlexander V. Chernikov 		/* Copy destination if dst is non-zero */
8399a1b64d5SAlexander V. Chernikov 		src = rt_key(rt);
8409a1b64d5SAlexander V. Chernikov 		dst = info->rti_info[RTAX_DST];
8419a1b64d5SAlexander V. Chernikov 		sa_len = src->sa_len;
84216703ea8SAlexander V. Chernikov 		if (dst != NULL) {
8439a1b64d5SAlexander V. Chernikov 			if (src->sa_len > dst->sa_len)
8449a1b64d5SAlexander V. Chernikov 				return (ENOMEM);
8459a1b64d5SAlexander V. Chernikov 			memcpy(dst, src, src->sa_len);
8469a1b64d5SAlexander V. Chernikov 			info->rti_addrs |= RTA_DST;
8479a1b64d5SAlexander V. Chernikov 		}
8489a1b64d5SAlexander V. Chernikov 
8499a1b64d5SAlexander V. Chernikov 		/* Copy mask if set && dst is non-zero */
8509a1b64d5SAlexander V. Chernikov 		src = rt_mask(rt);
8519a1b64d5SAlexander V. Chernikov 		dst = info->rti_info[RTAX_NETMASK];
8529a1b64d5SAlexander V. Chernikov 		if (src != NULL && dst != NULL) {
8539a1b64d5SAlexander V. Chernikov 
8549a1b64d5SAlexander V. Chernikov 			/*
8559a1b64d5SAlexander V. Chernikov 			 * Radix stores different value in sa_len,
8569a1b64d5SAlexander V. Chernikov 			 * assume rt_mask() to have the same length
8579a1b64d5SAlexander V. Chernikov 			 * as rt_key()
8589a1b64d5SAlexander V. Chernikov 			 */
8599a1b64d5SAlexander V. Chernikov 			if (sa_len > dst->sa_len)
8609a1b64d5SAlexander V. Chernikov 				return (ENOMEM);
8619a1b64d5SAlexander V. Chernikov 			memcpy(dst, src, src->sa_len);
8629a1b64d5SAlexander V. Chernikov 			info->rti_addrs |= RTA_NETMASK;
8639a1b64d5SAlexander V. Chernikov 		}
8649a1b64d5SAlexander V. Chernikov 
8659a1b64d5SAlexander V. Chernikov 		/* Copy gateway is set && dst is non-zero */
8669a1b64d5SAlexander V. Chernikov 		src = rt->rt_gateway;
8679a1b64d5SAlexander V. Chernikov 		dst = info->rti_info[RTAX_GATEWAY];
8689a1b64d5SAlexander V. Chernikov 		if ((rt->rt_flags & RTF_GATEWAY) && src != NULL && dst != NULL){
8699a1b64d5SAlexander V. Chernikov 			if (src->sa_len > dst->sa_len)
8709a1b64d5SAlexander V. Chernikov 				return (ENOMEM);
8719a1b64d5SAlexander V. Chernikov 			memcpy(dst, src, src->sa_len);
8729a1b64d5SAlexander V. Chernikov 			info->rti_addrs |= RTA_GATEWAY;
8739a1b64d5SAlexander V. Chernikov 		}
8749a1b64d5SAlexander V. Chernikov 	} else {
8759a1b64d5SAlexander V. Chernikov 		info->rti_info[RTAX_DST] = rt_key(rt);
8769a1b64d5SAlexander V. Chernikov 		info->rti_addrs |= RTA_DST;
8779a1b64d5SAlexander V. Chernikov 		if (rt_mask(rt) != NULL) {
8789a1b64d5SAlexander V. Chernikov 			info->rti_info[RTAX_NETMASK] = rt_mask(rt);
8799a1b64d5SAlexander V. Chernikov 			info->rti_addrs |= RTA_NETMASK;
8809a1b64d5SAlexander V. Chernikov 		}
8819a1b64d5SAlexander V. Chernikov 		if (rt->rt_flags & RTF_GATEWAY) {
8829a1b64d5SAlexander V. Chernikov 			info->rti_info[RTAX_GATEWAY] = rt->rt_gateway;
8839a1b64d5SAlexander V. Chernikov 			info->rti_addrs |= RTA_GATEWAY;
8849a1b64d5SAlexander V. Chernikov 		}
8859a1b64d5SAlexander V. Chernikov 	}
8869a1b64d5SAlexander V. Chernikov 
8879a1b64d5SAlexander V. Chernikov 	rmx = info->rti_rmx;
8889a1b64d5SAlexander V. Chernikov 	if (rmx != NULL) {
8899a1b64d5SAlexander V. Chernikov 		info->rti_mflags |= RTV_MTU;
8909a1b64d5SAlexander V. Chernikov 		rmx->rmx_mtu = rt->rt_mtu;
8919a1b64d5SAlexander V. Chernikov 	}
8929a1b64d5SAlexander V. Chernikov 
8939a1b64d5SAlexander V. Chernikov 	info->rti_flags = rt->rt_flags;
8949a1b64d5SAlexander V. Chernikov 	info->rti_ifp = rt->rt_ifp;
8959a1b64d5SAlexander V. Chernikov 	info->rti_ifa = rt->rt_ifa;
8969a1b64d5SAlexander V. Chernikov 
8979a1b64d5SAlexander V. Chernikov 	if (flags & NHR_REF) {
8989a1b64d5SAlexander V. Chernikov 		/* Do 'traditional' refcouting */
8999a1b64d5SAlexander V. Chernikov 		if_ref(info->rti_ifp);
9009a1b64d5SAlexander V. Chernikov 	}
9019a1b64d5SAlexander V. Chernikov 
9029a1b64d5SAlexander V. Chernikov 	return (0);
9039a1b64d5SAlexander V. Chernikov }
9049a1b64d5SAlexander V. Chernikov 
9059a1b64d5SAlexander V. Chernikov /*
9069a1b64d5SAlexander V. Chernikov  * Lookups up route entry for @dst in RIB database for fib @fibnum.
9079a1b64d5SAlexander V. Chernikov  * Exports entry data to @info using rt_exportinfo().
9089a1b64d5SAlexander V. Chernikov  *
9099a1b64d5SAlexander V. Chernikov  * if @flags contains NHR_REF, refcouting is performed on rt_ifp.
9109a1b64d5SAlexander V. Chernikov  *   All references can be released later by calling rib_free_info()
9119a1b64d5SAlexander V. Chernikov  *
9129a1b64d5SAlexander V. Chernikov  * Returns 0 on success.
9139a1b64d5SAlexander V. Chernikov  * Returns ENOENT for lookup failure, ENOMEM for export failure.
9149a1b64d5SAlexander V. Chernikov  */
9159a1b64d5SAlexander V. Chernikov int
9169a1b64d5SAlexander V. Chernikov rib_lookup_info(uint32_t fibnum, const struct sockaddr *dst, uint32_t flags,
9179a1b64d5SAlexander V. Chernikov     uint32_t flowid, struct rt_addrinfo *info)
9189a1b64d5SAlexander V. Chernikov {
91961eee0e2SAlexander V. Chernikov 	struct rib_head *rh;
9209a1b64d5SAlexander V. Chernikov 	struct radix_node *rn;
9219a1b64d5SAlexander V. Chernikov 	struct rtentry *rt;
9229a1b64d5SAlexander V. Chernikov 	int error;
9239a1b64d5SAlexander V. Chernikov 
9249a1b64d5SAlexander V. Chernikov 	KASSERT((fibnum < rt_numfibs), ("rib_lookup_rte: bad fibnum"));
9259a1b64d5SAlexander V. Chernikov 	rh = rt_tables_get_rnh(fibnum, dst->sa_family);
9269a1b64d5SAlexander V. Chernikov 	if (rh == NULL)
9279a1b64d5SAlexander V. Chernikov 		return (ENOENT);
9289a1b64d5SAlexander V. Chernikov 
92961eee0e2SAlexander V. Chernikov 	RIB_RLOCK(rh);
93061eee0e2SAlexander V. Chernikov 	rn = rh->rnh_matchaddr(__DECONST(void *, dst), &rh->head);
9319a1b64d5SAlexander V. Chernikov 	if (rn != NULL && ((rn->rn_flags & RNF_ROOT) == 0)) {
9329a1b64d5SAlexander V. Chernikov 		rt = RNTORT(rn);
9339a1b64d5SAlexander V. Chernikov 		/* Ensure route & ifp is UP */
9349a1b64d5SAlexander V. Chernikov 		if (RT_LINK_IS_UP(rt->rt_ifp)) {
9359a1b64d5SAlexander V. Chernikov 			flags = (flags & NHR_REF) | NHR_COPY;
9369a1b64d5SAlexander V. Chernikov 			error = rt_exportinfo(rt, info, flags);
93761eee0e2SAlexander V. Chernikov 			RIB_RUNLOCK(rh);
9389a1b64d5SAlexander V. Chernikov 
9399a1b64d5SAlexander V. Chernikov 			return (error);
9409a1b64d5SAlexander V. Chernikov 		}
9419a1b64d5SAlexander V. Chernikov 	}
94261eee0e2SAlexander V. Chernikov 	RIB_RUNLOCK(rh);
9439a1b64d5SAlexander V. Chernikov 
9449a1b64d5SAlexander V. Chernikov 	return (ENOENT);
9459a1b64d5SAlexander V. Chernikov }
9469a1b64d5SAlexander V. Chernikov 
9479a1b64d5SAlexander V. Chernikov /*
9489a1b64d5SAlexander V. Chernikov  * Releases all references acquired by rib_lookup_info() when
9499a1b64d5SAlexander V. Chernikov  * called with NHR_REF flags.
9509a1b64d5SAlexander V. Chernikov  */
9519a1b64d5SAlexander V. Chernikov void
9529a1b64d5SAlexander V. Chernikov rib_free_info(struct rt_addrinfo *info)
9539a1b64d5SAlexander V. Chernikov {
9549a1b64d5SAlexander V. Chernikov 
9559a1b64d5SAlexander V. Chernikov 	if_rele(info->rti_ifp);
9569a1b64d5SAlexander V. Chernikov }
9579a1b64d5SAlexander V. Chernikov 
9589a1b64d5SAlexander V. Chernikov /*
9592caee4beSAlexander V. Chernikov  * Iterates over all existing fibs in system calling
9602caee4beSAlexander V. Chernikov  *  @setwa_f function prior to traversing each fib.
9612caee4beSAlexander V. Chernikov  *  Calls @wa_f function for each element in current fib.
9622caee4beSAlexander V. Chernikov  * If af is not AF_UNSPEC, iterates over fibs in particular
9632caee4beSAlexander V. Chernikov  * address family.
9642caee4beSAlexander V. Chernikov  */
9654bdf0b6aSAlexander V. Chernikov void
9662caee4beSAlexander V. Chernikov rt_foreach_fib_walk(int af, rt_setwarg_t *setwa_f, rt_walktree_f_t *wa_f,
9672caee4beSAlexander V. Chernikov     void *arg)
9684bdf0b6aSAlexander V. Chernikov {
96961eee0e2SAlexander V. Chernikov 	struct rib_head *rnh;
9704bdf0b6aSAlexander V. Chernikov 	uint32_t fibnum;
9714bdf0b6aSAlexander V. Chernikov 	int i;
9724bdf0b6aSAlexander V. Chernikov 
9734bdf0b6aSAlexander V. Chernikov 	for (fibnum = 0; fibnum < rt_numfibs; fibnum++) {
9744bdf0b6aSAlexander V. Chernikov 		/* Do we want some specific family? */
9754bdf0b6aSAlexander V. Chernikov 		if (af != AF_UNSPEC) {
9764bdf0b6aSAlexander V. Chernikov 			rnh = rt_tables_get_rnh(fibnum, af);
9774bdf0b6aSAlexander V. Chernikov 			if (rnh == NULL)
9784bdf0b6aSAlexander V. Chernikov 				continue;
9794bdf0b6aSAlexander V. Chernikov 			if (setwa_f != NULL)
980e4790abfSAlexander V. Chernikov 				setwa_f(rnh, fibnum, af, arg);
9814bdf0b6aSAlexander V. Chernikov 
98261eee0e2SAlexander V. Chernikov 			RIB_WLOCK(rnh);
98361eee0e2SAlexander V. Chernikov 			rnh->rnh_walktree(&rnh->head, (walktree_f_t *)wa_f,arg);
98461eee0e2SAlexander V. Chernikov 			RIB_WUNLOCK(rnh);
9854bdf0b6aSAlexander V. Chernikov 			continue;
9864bdf0b6aSAlexander V. Chernikov 		}
9874bdf0b6aSAlexander V. Chernikov 
9884bdf0b6aSAlexander V. Chernikov 		for (i = 1; i <= AF_MAX; i++) {
9894bdf0b6aSAlexander V. Chernikov 			rnh = rt_tables_get_rnh(fibnum, i);
9904bdf0b6aSAlexander V. Chernikov 			if (rnh == NULL)
9914bdf0b6aSAlexander V. Chernikov 				continue;
9924bdf0b6aSAlexander V. Chernikov 			if (setwa_f != NULL)
9934bdf0b6aSAlexander V. Chernikov 				setwa_f(rnh, fibnum, i, arg);
9944bdf0b6aSAlexander V. Chernikov 
99561eee0e2SAlexander V. Chernikov 			RIB_WLOCK(rnh);
99661eee0e2SAlexander V. Chernikov 			rnh->rnh_walktree(&rnh->head, (walktree_f_t *)wa_f,arg);
99761eee0e2SAlexander V. Chernikov 			RIB_WUNLOCK(rnh);
9984bdf0b6aSAlexander V. Chernikov 		}
9994bdf0b6aSAlexander V. Chernikov 	}
10004bdf0b6aSAlexander V. Chernikov }
10014bdf0b6aSAlexander V. Chernikov 
1002e8b0643eSAlexander V. Chernikov struct rt_delinfo
1003e8b0643eSAlexander V. Chernikov {
1004e8b0643eSAlexander V. Chernikov 	struct rt_addrinfo info;
100561eee0e2SAlexander V. Chernikov 	struct rib_head *rnh;
1006e8b0643eSAlexander V. Chernikov 	struct rtentry *head;
1007e8b0643eSAlexander V. Chernikov };
1008e8b0643eSAlexander V. Chernikov 
1009e8b0643eSAlexander V. Chernikov /*
1010e8b0643eSAlexander V. Chernikov  * Conditionally unlinks @rn from radix tree based
1011e8b0643eSAlexander V. Chernikov  * on info data passed in @arg.
1012e8b0643eSAlexander V. Chernikov  */
1013e8b0643eSAlexander V. Chernikov static int
1014e8b0643eSAlexander V. Chernikov rt_checkdelroute(struct radix_node *rn, void *arg)
1015e8b0643eSAlexander V. Chernikov {
1016e8b0643eSAlexander V. Chernikov 	struct rt_delinfo *di;
1017e8b0643eSAlexander V. Chernikov 	struct rt_addrinfo *info;
1018e8b0643eSAlexander V. Chernikov 	struct rtentry *rt;
1019e8b0643eSAlexander V. Chernikov 	int error;
1020e8b0643eSAlexander V. Chernikov 
1021e8b0643eSAlexander V. Chernikov 	di = (struct rt_delinfo *)arg;
1022e8b0643eSAlexander V. Chernikov 	rt = (struct rtentry *)rn;
1023e8b0643eSAlexander V. Chernikov 	info = &di->info;
1024e8b0643eSAlexander V. Chernikov 	error = 0;
1025e8b0643eSAlexander V. Chernikov 
1026e8b0643eSAlexander V. Chernikov 	info->rti_info[RTAX_DST] = rt_key(rt);
1027e8b0643eSAlexander V. Chernikov 	info->rti_info[RTAX_NETMASK] = rt_mask(rt);
1028e8b0643eSAlexander V. Chernikov 	info->rti_info[RTAX_GATEWAY] = rt->rt_gateway;
1029e8b0643eSAlexander V. Chernikov 
1030e8b0643eSAlexander V. Chernikov 	rt = rt_unlinkrte(di->rnh, info, &error);
1031e8b0643eSAlexander V. Chernikov 	if (rt == NULL) {
1032e8b0643eSAlexander V. Chernikov 		/* Either not allowed or not matched. Skip entry */
1033e8b0643eSAlexander V. Chernikov 		return (0);
1034e8b0643eSAlexander V. Chernikov 	}
1035e8b0643eSAlexander V. Chernikov 
1036e8b0643eSAlexander V. Chernikov 	/* Entry was unlinked. Add to the list and return */
1037e8b0643eSAlexander V. Chernikov 	rt->rt_chain = di->head;
1038e8b0643eSAlexander V. Chernikov 	di->head = rt;
1039e8b0643eSAlexander V. Chernikov 
1040e8b0643eSAlexander V. Chernikov 	return (0);
1041e8b0643eSAlexander V. Chernikov }
1042e8b0643eSAlexander V. Chernikov 
1043e8b0643eSAlexander V. Chernikov /*
1044e8b0643eSAlexander V. Chernikov  * Iterates over all existing fibs in system.
1045e8b0643eSAlexander V. Chernikov  * Deletes each element for which @filter_f function returned
1046e8b0643eSAlexander V. Chernikov  * non-zero value.
1047e8b0643eSAlexander V. Chernikov  * If @af is not AF_UNSPEC, iterates over fibs in particular
1048e8b0643eSAlexander V. Chernikov  * address family.
1049e8b0643eSAlexander V. Chernikov  */
1050e8b0643eSAlexander V. Chernikov void
1051e8b0643eSAlexander V. Chernikov rt_foreach_fib_walk_del(int af, rt_filter_f_t *filter_f, void *arg)
1052e8b0643eSAlexander V. Chernikov {
105361eee0e2SAlexander V. Chernikov 	struct rib_head *rnh;
1054e8b0643eSAlexander V. Chernikov 	struct rt_delinfo di;
1055e8b0643eSAlexander V. Chernikov 	struct rtentry *rt;
1056e8b0643eSAlexander V. Chernikov 	uint32_t fibnum;
1057e8b0643eSAlexander V. Chernikov 	int i, start, end;
1058e8b0643eSAlexander V. Chernikov 
1059e8b0643eSAlexander V. Chernikov 	bzero(&di, sizeof(di));
1060e8b0643eSAlexander V. Chernikov 	di.info.rti_filter = filter_f;
1061e8b0643eSAlexander V. Chernikov 	di.info.rti_filterdata = arg;
1062e8b0643eSAlexander V. Chernikov 
1063e8b0643eSAlexander V. Chernikov 	for (fibnum = 0; fibnum < rt_numfibs; fibnum++) {
1064e8b0643eSAlexander V. Chernikov 		/* Do we want some specific family? */
1065e8b0643eSAlexander V. Chernikov 		if (af != AF_UNSPEC) {
1066e8b0643eSAlexander V. Chernikov 			start = af;
1067e8b0643eSAlexander V. Chernikov 			end = af;
1068e8b0643eSAlexander V. Chernikov 		} else {
1069e8b0643eSAlexander V. Chernikov 			start = 1;
1070e8b0643eSAlexander V. Chernikov 			end = AF_MAX;
1071e8b0643eSAlexander V. Chernikov 		}
1072e8b0643eSAlexander V. Chernikov 
1073e8b0643eSAlexander V. Chernikov 		for (i = start; i <= end; i++) {
1074e8b0643eSAlexander V. Chernikov 			rnh = rt_tables_get_rnh(fibnum, i);
1075e8b0643eSAlexander V. Chernikov 			if (rnh == NULL)
1076e8b0643eSAlexander V. Chernikov 				continue;
1077e8b0643eSAlexander V. Chernikov 			di.rnh = rnh;
1078e8b0643eSAlexander V. Chernikov 
107961eee0e2SAlexander V. Chernikov 			RIB_WLOCK(rnh);
108061eee0e2SAlexander V. Chernikov 			rnh->rnh_walktree(&rnh->head, rt_checkdelroute, &di);
108161eee0e2SAlexander V. Chernikov 			RIB_WUNLOCK(rnh);
1082e8b0643eSAlexander V. Chernikov 
1083e8b0643eSAlexander V. Chernikov 			if (di.head == NULL)
1084e8b0643eSAlexander V. Chernikov 				continue;
1085e8b0643eSAlexander V. Chernikov 
1086e8b0643eSAlexander V. Chernikov 			/* We might have something to reclaim */
1087e8b0643eSAlexander V. Chernikov 			while (di.head != NULL) {
1088e8b0643eSAlexander V. Chernikov 				rt = di.head;
1089e8b0643eSAlexander V. Chernikov 				di.head = rt->rt_chain;
1090e8b0643eSAlexander V. Chernikov 				rt->rt_chain = NULL;
1091e8b0643eSAlexander V. Chernikov 
1092e8b0643eSAlexander V. Chernikov 				/* TODO std rt -> rt_addrinfo export */
1093e8b0643eSAlexander V. Chernikov 				di.info.rti_info[RTAX_DST] = rt_key(rt);
1094e8b0643eSAlexander V. Chernikov 				di.info.rti_info[RTAX_NETMASK] = rt_mask(rt);
1095e8b0643eSAlexander V. Chernikov 
1096e8b0643eSAlexander V. Chernikov 				rt_notifydelete(rt, &di.info);
1097e8b0643eSAlexander V. Chernikov 				RTFREE_LOCKED(rt);
1098e8b0643eSAlexander V. Chernikov 			}
1099e8b0643eSAlexander V. Chernikov 
1100e8b0643eSAlexander V. Chernikov 		}
1101e8b0643eSAlexander V. Chernikov 	}
1102e8b0643eSAlexander V. Chernikov }
1103e8b0643eSAlexander V. Chernikov 
11044bdf0b6aSAlexander V. Chernikov /*
11054bdf0b6aSAlexander V. Chernikov  * Delete Routes for a Network Interface
11064bdf0b6aSAlexander V. Chernikov  *
11074bdf0b6aSAlexander V. Chernikov  * Called for each routing entry via the rnh->rnh_walktree() call above
11084bdf0b6aSAlexander V. Chernikov  * to delete all route entries referencing a detaching network interface.
11094bdf0b6aSAlexander V. Chernikov  *
11104bdf0b6aSAlexander V. Chernikov  * Arguments:
11114bdf0b6aSAlexander V. Chernikov  *	rt	pointer to rtentry
11124bdf0b6aSAlexander V. Chernikov  *	arg	argument passed to rnh->rnh_walktree() - detaching interface
11134bdf0b6aSAlexander V. Chernikov  *
11144bdf0b6aSAlexander V. Chernikov  * Returns:
11154bdf0b6aSAlexander V. Chernikov  *	0	successful
11164bdf0b6aSAlexander V. Chernikov  *	errno	failed - reason indicated
11174bdf0b6aSAlexander V. Chernikov  */
11184bdf0b6aSAlexander V. Chernikov static int
1119e8b0643eSAlexander V. Chernikov rt_ifdelroute(const struct rtentry *rt, void *arg)
11204bdf0b6aSAlexander V. Chernikov {
11214bdf0b6aSAlexander V. Chernikov 	struct ifnet	*ifp = arg;
11224bdf0b6aSAlexander V. Chernikov 
11234bdf0b6aSAlexander V. Chernikov 	if (rt->rt_ifp != ifp)
11244bdf0b6aSAlexander V. Chernikov 		return (0);
11254bdf0b6aSAlexander V. Chernikov 
11264bdf0b6aSAlexander V. Chernikov 	/*
11274bdf0b6aSAlexander V. Chernikov 	 * Protect (sorta) against walktree recursion problems
11284bdf0b6aSAlexander V. Chernikov 	 * with cloned routes
11294bdf0b6aSAlexander V. Chernikov 	 */
11304bdf0b6aSAlexander V. Chernikov 	if ((rt->rt_flags & RTF_UP) == 0)
11314bdf0b6aSAlexander V. Chernikov 		return (0);
11324bdf0b6aSAlexander V. Chernikov 
1133e8b0643eSAlexander V. Chernikov 	return (1);
11344bdf0b6aSAlexander V. Chernikov }
11354bdf0b6aSAlexander V. Chernikov 
11364bdf0b6aSAlexander V. Chernikov /*
11374bdf0b6aSAlexander V. Chernikov  * Delete all remaining routes using this interface
11384bdf0b6aSAlexander V. Chernikov  * Unfortuneatly the only way to do this is to slog through
11394bdf0b6aSAlexander V. Chernikov  * the entire routing table looking for routes which point
11404bdf0b6aSAlexander V. Chernikov  * to this interface...oh well...
11414bdf0b6aSAlexander V. Chernikov  */
11424bdf0b6aSAlexander V. Chernikov void
114380ae8d60SBjoern A. Zeeb rt_flushifroutes_af(struct ifnet *ifp, int af)
114480ae8d60SBjoern A. Zeeb {
114580ae8d60SBjoern A. Zeeb 	KASSERT((af >= 1 && af <= AF_MAX), ("%s: af %d not >= 1 and <= %d",
114680ae8d60SBjoern A. Zeeb 	    __func__, af, AF_MAX));
114780ae8d60SBjoern A. Zeeb 
114880ae8d60SBjoern A. Zeeb 	rt_foreach_fib_walk_del(af, rt_ifdelroute, ifp);
114980ae8d60SBjoern A. Zeeb }
115080ae8d60SBjoern A. Zeeb 
115180ae8d60SBjoern A. Zeeb void
11524bdf0b6aSAlexander V. Chernikov rt_flushifroutes(struct ifnet *ifp)
11534bdf0b6aSAlexander V. Chernikov {
11544bdf0b6aSAlexander V. Chernikov 
1155e8b0643eSAlexander V. Chernikov 	rt_foreach_fib_walk_del(AF_UNSPEC, rt_ifdelroute, ifp);
11564bdf0b6aSAlexander V. Chernikov }
11574bdf0b6aSAlexander V. Chernikov 
11588071913dSRuslan Ermilov /*
1159e8b0643eSAlexander V. Chernikov  * Conditionally unlinks rtentry matching data inside @info from @rnh.
1160e8b0643eSAlexander V. Chernikov  * Returns unlinked, locked and referenced @rtentry on success,
1161e8b0643eSAlexander V. Chernikov  * Returns NULL and sets @perror to:
1162e8b0643eSAlexander V. Chernikov  * ESRCH - if prefix was not found,
1163e8b0643eSAlexander V. Chernikov  * EADDRINUSE - if trying to delete PINNED route without appropriate flag.
1164e8b0643eSAlexander V. Chernikov  * ENOENT - if supplied filter function returned 0 (not matched).
1165e8b0643eSAlexander V. Chernikov  */
1166e8b0643eSAlexander V. Chernikov static struct rtentry *
116761eee0e2SAlexander V. Chernikov rt_unlinkrte(struct rib_head *rnh, struct rt_addrinfo *info, int *perror)
1168e8b0643eSAlexander V. Chernikov {
1169e8b0643eSAlexander V. Chernikov 	struct sockaddr *dst, *netmask;
1170e8b0643eSAlexander V. Chernikov 	struct rtentry *rt;
1171e8b0643eSAlexander V. Chernikov 	struct radix_node *rn;
1172e8b0643eSAlexander V. Chernikov 
1173e8b0643eSAlexander V. Chernikov 	dst = info->rti_info[RTAX_DST];
1174e8b0643eSAlexander V. Chernikov 	netmask = info->rti_info[RTAX_NETMASK];
1175e8b0643eSAlexander V. Chernikov 
117661eee0e2SAlexander V. Chernikov 	rt = (struct rtentry *)rnh->rnh_lookup(dst, netmask, &rnh->head);
1177e8b0643eSAlexander V. Chernikov 	if (rt == NULL) {
1178e8b0643eSAlexander V. Chernikov 		*perror = ESRCH;
1179e8b0643eSAlexander V. Chernikov 		return (NULL);
1180e8b0643eSAlexander V. Chernikov 	}
1181e8b0643eSAlexander V. Chernikov 
1182e8b0643eSAlexander V. Chernikov 	if ((info->rti_flags & RTF_PINNED) == 0) {
1183e8b0643eSAlexander V. Chernikov 		/* Check if target route can be deleted */
1184e8b0643eSAlexander V. Chernikov 		if (rt->rt_flags & RTF_PINNED) {
1185e8b0643eSAlexander V. Chernikov 			*perror = EADDRINUSE;
1186e8b0643eSAlexander V. Chernikov 			return (NULL);
1187e8b0643eSAlexander V. Chernikov 		}
1188e8b0643eSAlexander V. Chernikov 	}
1189e8b0643eSAlexander V. Chernikov 
1190e8b0643eSAlexander V. Chernikov 	if (info->rti_filter != NULL) {
1191e8b0643eSAlexander V. Chernikov 		if (info->rti_filter(rt, info->rti_filterdata) == 0) {
1192e8b0643eSAlexander V. Chernikov 			/* Not matched */
1193e8b0643eSAlexander V. Chernikov 			*perror = ENOENT;
1194e8b0643eSAlexander V. Chernikov 			return (NULL);
1195e8b0643eSAlexander V. Chernikov 		}
1196e8b0643eSAlexander V. Chernikov 
1197e8b0643eSAlexander V. Chernikov 		/*
1198e8b0643eSAlexander V. Chernikov 		 * Filter function requested rte deletion.
1199e8b0643eSAlexander V. Chernikov 		 * Ease the caller work by filling in remaining info
1200e8b0643eSAlexander V. Chernikov 		 * from that particular entry.
1201e8b0643eSAlexander V. Chernikov 		 */
1202e8b0643eSAlexander V. Chernikov 		info->rti_info[RTAX_GATEWAY] = rt->rt_gateway;
1203e8b0643eSAlexander V. Chernikov 	}
1204e8b0643eSAlexander V. Chernikov 
1205e8b0643eSAlexander V. Chernikov 	/*
1206e8b0643eSAlexander V. Chernikov 	 * Remove the item from the tree and return it.
1207e8b0643eSAlexander V. Chernikov 	 * Complain if it is not there and do no more processing.
1208e8b0643eSAlexander V. Chernikov 	 */
1209e8b0643eSAlexander V. Chernikov 	*perror = ESRCH;
1210e8b0643eSAlexander V. Chernikov #ifdef RADIX_MPATH
121161eee0e2SAlexander V. Chernikov 	if (rt_mpath_capable(rnh))
1212e8b0643eSAlexander V. Chernikov 		rn = rt_mpath_unlink(rnh, info, rt, perror);
1213e8b0643eSAlexander V. Chernikov 	else
1214e8b0643eSAlexander V. Chernikov #endif
121561eee0e2SAlexander V. Chernikov 	rn = rnh->rnh_deladdr(dst, netmask, &rnh->head);
1216e8b0643eSAlexander V. Chernikov 	if (rn == NULL)
1217e8b0643eSAlexander V. Chernikov 		return (NULL);
1218e8b0643eSAlexander V. Chernikov 
1219e8b0643eSAlexander V. Chernikov 	if (rn->rn_flags & (RNF_ACTIVE | RNF_ROOT))
1220e8b0643eSAlexander V. Chernikov 		panic ("rtrequest delete");
1221e8b0643eSAlexander V. Chernikov 
1222e8b0643eSAlexander V. Chernikov 	rt = RNTORT(rn);
1223e8b0643eSAlexander V. Chernikov 	RT_LOCK(rt);
1224e8b0643eSAlexander V. Chernikov 	RT_ADDREF(rt);
12254b3dc898SAlexander V. Chernikov 	rt->rt_flags &= ~RTF_UP;
1226e8b0643eSAlexander V. Chernikov 
1227e8b0643eSAlexander V. Chernikov 	*perror = 0;
1228e8b0643eSAlexander V. Chernikov 
1229e8b0643eSAlexander V. Chernikov 	return (rt);
1230e8b0643eSAlexander V. Chernikov }
1231e8b0643eSAlexander V. Chernikov 
1232e8b0643eSAlexander V. Chernikov static void
1233e8b0643eSAlexander V. Chernikov rt_notifydelete(struct rtentry *rt, struct rt_addrinfo *info)
1234e8b0643eSAlexander V. Chernikov {
1235e8b0643eSAlexander V. Chernikov 	struct ifaddr *ifa;
1236e8b0643eSAlexander V. Chernikov 
1237e8b0643eSAlexander V. Chernikov 	/*
1238e8b0643eSAlexander V. Chernikov 	 * give the protocol a chance to keep things in sync.
1239e8b0643eSAlexander V. Chernikov 	 */
1240e8b0643eSAlexander V. Chernikov 	ifa = rt->rt_ifa;
1241e8b0643eSAlexander V. Chernikov 	if (ifa != NULL && ifa->ifa_rtrequest != NULL)
1242e8b0643eSAlexander V. Chernikov 		ifa->ifa_rtrequest(RTM_DELETE, rt, info);
1243e8b0643eSAlexander V. Chernikov 
1244e8b0643eSAlexander V. Chernikov 	/*
1245e8b0643eSAlexander V. Chernikov 	 * One more rtentry floating around that is not
1246e8b0643eSAlexander V. Chernikov 	 * linked to the routing table. rttrash will be decremented
1247e8b0643eSAlexander V. Chernikov 	 * when RTFREE(rt) is eventually called.
1248e8b0643eSAlexander V. Chernikov 	 */
1249e8b0643eSAlexander V. Chernikov 	V_rttrash++;
1250e8b0643eSAlexander V. Chernikov }
1251e8b0643eSAlexander V. Chernikov 
1252e8b0643eSAlexander V. Chernikov 
1253e8b0643eSAlexander V. Chernikov /*
12548071913dSRuslan Ermilov  * These (questionable) definitions of apparent local variables apply
12558071913dSRuslan Ermilov  * to the next two functions.  XXXXXX!!!
12568071913dSRuslan Ermilov  */
12578071913dSRuslan Ermilov #define	dst	info->rti_info[RTAX_DST]
12588071913dSRuslan Ermilov #define	gateway	info->rti_info[RTAX_GATEWAY]
12598071913dSRuslan Ermilov #define	netmask	info->rti_info[RTAX_NETMASK]
12608071913dSRuslan Ermilov #define	ifaaddr	info->rti_info[RTAX_IFA]
12618071913dSRuslan Ermilov #define	ifpaddr	info->rti_info[RTAX_IFP]
12628071913dSRuslan Ermilov #define	flags	info->rti_flags
12638071913dSRuslan Ermilov 
12648c0fec80SRobert Watson /*
12658c0fec80SRobert Watson  * Look up rt_addrinfo for a specific fib.  Note that if rti_ifa is defined,
12668c0fec80SRobert Watson  * it will be referenced so the caller must free it.
12678c0fec80SRobert Watson  */
12688b07e49aSJulian Elischer int
12698b07e49aSJulian Elischer rt_getifa_fib(struct rt_addrinfo *info, u_int fibnum)
12708b07e49aSJulian Elischer {
12718071913dSRuslan Ermilov 	struct ifaddr *ifa;
12728071913dSRuslan Ermilov 	int error = 0;
12738071913dSRuslan Ermilov 
12748071913dSRuslan Ermilov 	/*
12758071913dSRuslan Ermilov 	 * ifp may be specified by sockaddr_dl
12768071913dSRuslan Ermilov 	 * when protocol address is ambiguous.
12778071913dSRuslan Ermilov 	 */
12788071913dSRuslan Ermilov 	if (info->rti_ifp == NULL && ifpaddr != NULL &&
12798071913dSRuslan Ermilov 	    ifpaddr->sa_family == AF_LINK &&
12804f8585e0SAlan Somers 	    (ifa = ifa_ifwithnet(ifpaddr, 0, fibnum)) != NULL) {
12818071913dSRuslan Ermilov 		info->rti_ifp = ifa->ifa_ifp;
12828c0fec80SRobert Watson 		ifa_free(ifa);
12838c0fec80SRobert Watson 	}
12848071913dSRuslan Ermilov 	if (info->rti_ifa == NULL && ifaaddr != NULL)
12858071913dSRuslan Ermilov 		info->rti_ifa = ifa_ifwithaddr(ifaaddr);
12868071913dSRuslan Ermilov 	if (info->rti_ifa == NULL) {
12878071913dSRuslan Ermilov 		struct sockaddr *sa;
12888071913dSRuslan Ermilov 
12898071913dSRuslan Ermilov 		sa = ifaaddr != NULL ? ifaaddr :
12908071913dSRuslan Ermilov 		    (gateway != NULL ? gateway : dst);
12918071913dSRuslan Ermilov 		if (sa != NULL && info->rti_ifp != NULL)
12928071913dSRuslan Ermilov 			info->rti_ifa = ifaof_ifpforaddr(sa, info->rti_ifp);
12938071913dSRuslan Ermilov 		else if (dst != NULL && gateway != NULL)
12944f8585e0SAlan Somers 			info->rti_ifa = ifa_ifwithroute(flags, dst, gateway,
12958b07e49aSJulian Elischer 							fibnum);
12968071913dSRuslan Ermilov 		else if (sa != NULL)
12974f8585e0SAlan Somers 			info->rti_ifa = ifa_ifwithroute(flags, sa, sa,
12988b07e49aSJulian Elischer 							fibnum);
12998071913dSRuslan Ermilov 	}
13008071913dSRuslan Ermilov 	if ((ifa = info->rti_ifa) != NULL) {
13018071913dSRuslan Ermilov 		if (info->rti_ifp == NULL)
13028071913dSRuslan Ermilov 			info->rti_ifp = ifa->ifa_ifp;
13038071913dSRuslan Ermilov 	} else
13048071913dSRuslan Ermilov 		error = ENETUNREACH;
13058071913dSRuslan Ermilov 	return (error);
13068071913dSRuslan Ermilov }
13078071913dSRuslan Ermilov 
13087f948f12SAlexander V. Chernikov static int
13097f948f12SAlexander V. Chernikov if_updatemtu_cb(struct radix_node *rn, void *arg)
13107f948f12SAlexander V. Chernikov {
13117f948f12SAlexander V. Chernikov 	struct rtentry *rt;
13127f948f12SAlexander V. Chernikov 	struct if_mtuinfo *ifmtu;
13137f948f12SAlexander V. Chernikov 
13147f948f12SAlexander V. Chernikov 	rt = (struct rtentry *)rn;
13157f948f12SAlexander V. Chernikov 	ifmtu = (struct if_mtuinfo *)arg;
13167f948f12SAlexander V. Chernikov 
13177f948f12SAlexander V. Chernikov 	if (rt->rt_ifp != ifmtu->ifp)
13187f948f12SAlexander V. Chernikov 		return (0);
13197f948f12SAlexander V. Chernikov 
13207f948f12SAlexander V. Chernikov 	if (rt->rt_mtu >= ifmtu->mtu) {
13217f948f12SAlexander V. Chernikov 		/* We have to decrease mtu regardless of flags */
13227f948f12SAlexander V. Chernikov 		rt->rt_mtu = ifmtu->mtu;
13237f948f12SAlexander V. Chernikov 		return (0);
13247f948f12SAlexander V. Chernikov 	}
13257f948f12SAlexander V. Chernikov 
13267f948f12SAlexander V. Chernikov 	/*
13277f948f12SAlexander V. Chernikov 	 * New MTU is bigger. Check if are allowed to alter it
13287f948f12SAlexander V. Chernikov 	 */
13297f948f12SAlexander V. Chernikov 	if ((rt->rt_flags & (RTF_FIXEDMTU | RTF_GATEWAY | RTF_HOST)) != 0) {
13307f948f12SAlexander V. Chernikov 
13317f948f12SAlexander V. Chernikov 		/*
13327f948f12SAlexander V. Chernikov 		 * Skip routes with user-supplied MTU and
13337f948f12SAlexander V. Chernikov 		 * non-interface routes
13347f948f12SAlexander V. Chernikov 		 */
13357f948f12SAlexander V. Chernikov 		return (0);
13367f948f12SAlexander V. Chernikov 	}
13377f948f12SAlexander V. Chernikov 
13387f948f12SAlexander V. Chernikov 	/* We are safe to update route MTU */
13397f948f12SAlexander V. Chernikov 	rt->rt_mtu = ifmtu->mtu;
13407f948f12SAlexander V. Chernikov 
13417f948f12SAlexander V. Chernikov 	return (0);
13427f948f12SAlexander V. Chernikov }
13437f948f12SAlexander V. Chernikov 
13447f948f12SAlexander V. Chernikov void
13457f948f12SAlexander V. Chernikov rt_updatemtu(struct ifnet *ifp)
13467f948f12SAlexander V. Chernikov {
13477f948f12SAlexander V. Chernikov 	struct if_mtuinfo ifmtu;
134861eee0e2SAlexander V. Chernikov 	struct rib_head *rnh;
13497f948f12SAlexander V. Chernikov 	int i, j;
13507f948f12SAlexander V. Chernikov 
13517f948f12SAlexander V. Chernikov 	ifmtu.ifp = ifp;
13527f948f12SAlexander V. Chernikov 
13537f948f12SAlexander V. Chernikov 	/*
13547f948f12SAlexander V. Chernikov 	 * Try to update rt_mtu for all routes using this interface
13557f948f12SAlexander V. Chernikov 	 * Unfortunately the only way to do this is to traverse all
13567f948f12SAlexander V. Chernikov 	 * routing tables in all fibs/domains.
13577f948f12SAlexander V. Chernikov 	 */
13587f948f12SAlexander V. Chernikov 	for (i = 1; i <= AF_MAX; i++) {
13597f948f12SAlexander V. Chernikov 		ifmtu.mtu = if_getmtu_family(ifp, i);
13607f948f12SAlexander V. Chernikov 		for (j = 0; j < rt_numfibs; j++) {
13617f948f12SAlexander V. Chernikov 			rnh = rt_tables_get_rnh(j, i);
13627f948f12SAlexander V. Chernikov 			if (rnh == NULL)
13637f948f12SAlexander V. Chernikov 				continue;
136461eee0e2SAlexander V. Chernikov 			RIB_WLOCK(rnh);
136561eee0e2SAlexander V. Chernikov 			rnh->rnh_walktree(&rnh->head, if_updatemtu_cb, &ifmtu);
136661eee0e2SAlexander V. Chernikov 			RIB_WUNLOCK(rnh);
13677f948f12SAlexander V. Chernikov 		}
13687f948f12SAlexander V. Chernikov 	}
13697f948f12SAlexander V. Chernikov }
13707f948f12SAlexander V. Chernikov 
13717f948f12SAlexander V. Chernikov 
13725a2f4cbdSAlexander V. Chernikov #if 0
13735a2f4cbdSAlexander V. Chernikov int p_sockaddr(char *buf, int buflen, struct sockaddr *s);
13745a2f4cbdSAlexander V. Chernikov int rt_print(char *buf, int buflen, struct rtentry *rt);
13755a2f4cbdSAlexander V. Chernikov 
13765a2f4cbdSAlexander V. Chernikov int
13775a2f4cbdSAlexander V. Chernikov p_sockaddr(char *buf, int buflen, struct sockaddr *s)
13785a2f4cbdSAlexander V. Chernikov {
13795a2f4cbdSAlexander V. Chernikov 	void *paddr = NULL;
13805a2f4cbdSAlexander V. Chernikov 
13815a2f4cbdSAlexander V. Chernikov 	switch (s->sa_family) {
13825a2f4cbdSAlexander V. Chernikov 	case AF_INET:
13835a2f4cbdSAlexander V. Chernikov 		paddr = &((struct sockaddr_in *)s)->sin_addr;
13845a2f4cbdSAlexander V. Chernikov 		break;
13855a2f4cbdSAlexander V. Chernikov 	case AF_INET6:
13865a2f4cbdSAlexander V. Chernikov 		paddr = &((struct sockaddr_in6 *)s)->sin6_addr;
13875a2f4cbdSAlexander V. Chernikov 		break;
13885a2f4cbdSAlexander V. Chernikov 	}
13895a2f4cbdSAlexander V. Chernikov 
13905a2f4cbdSAlexander V. Chernikov 	if (paddr == NULL)
13915a2f4cbdSAlexander V. Chernikov 		return (0);
13925a2f4cbdSAlexander V. Chernikov 
13935a2f4cbdSAlexander V. Chernikov 	if (inet_ntop(s->sa_family, paddr, buf, buflen) == NULL)
13945a2f4cbdSAlexander V. Chernikov 		return (0);
13955a2f4cbdSAlexander V. Chernikov 
13965a2f4cbdSAlexander V. Chernikov 	return (strlen(buf));
13975a2f4cbdSAlexander V. Chernikov }
13985a2f4cbdSAlexander V. Chernikov 
13995a2f4cbdSAlexander V. Chernikov int
14005a2f4cbdSAlexander V. Chernikov rt_print(char *buf, int buflen, struct rtentry *rt)
14015a2f4cbdSAlexander V. Chernikov {
14025a2f4cbdSAlexander V. Chernikov 	struct sockaddr *addr, *mask;
14035a2f4cbdSAlexander V. Chernikov 	int i = 0;
14045a2f4cbdSAlexander V. Chernikov 
14055a2f4cbdSAlexander V. Chernikov 	addr = rt_key(rt);
14065a2f4cbdSAlexander V. Chernikov 	mask = rt_mask(rt);
14075a2f4cbdSAlexander V. Chernikov 
14085a2f4cbdSAlexander V. Chernikov 	i = p_sockaddr(buf, buflen, addr);
14095a2f4cbdSAlexander V. Chernikov 	if (!(rt->rt_flags & RTF_HOST)) {
14105a2f4cbdSAlexander V. Chernikov 		buf[i++] = '/';
14115a2f4cbdSAlexander V. Chernikov 		i += p_sockaddr(buf + i, buflen - i, mask);
14125a2f4cbdSAlexander V. Chernikov 	}
14135a2f4cbdSAlexander V. Chernikov 
14145a2f4cbdSAlexander V. Chernikov 	if (rt->rt_flags & RTF_GATEWAY) {
14155a2f4cbdSAlexander V. Chernikov 		buf[i++] = '>';
14165a2f4cbdSAlexander V. Chernikov 		i += p_sockaddr(buf + i, buflen - i, rt->rt_gateway);
14175a2f4cbdSAlexander V. Chernikov 	}
14185a2f4cbdSAlexander V. Chernikov 
14195a2f4cbdSAlexander V. Chernikov 	return (i);
14205a2f4cbdSAlexander V. Chernikov }
14215a2f4cbdSAlexander V. Chernikov #endif
14225a2f4cbdSAlexander V. Chernikov 
1423427ac07fSKip Macy #ifdef RADIX_MPATH
1424e8b0643eSAlexander V. Chernikov /*
1425e8b0643eSAlexander V. Chernikov  * Deletes key for single-path routes, unlinks rtentry with
1426e8b0643eSAlexander V. Chernikov  * gateway specified in @info from multi-path routes.
1427e8b0643eSAlexander V. Chernikov  *
1428e8b0643eSAlexander V. Chernikov  * Returnes unlinked entry. In case of failure, returns NULL
1429e8b0643eSAlexander V. Chernikov  * and sets @perror to ESRCH.
1430e8b0643eSAlexander V. Chernikov  */
1431e8b0643eSAlexander V. Chernikov static struct radix_node *
143261eee0e2SAlexander V. Chernikov rt_mpath_unlink(struct rib_head *rnh, struct rt_addrinfo *info,
1433e8b0643eSAlexander V. Chernikov     struct rtentry *rto, int *perror)
1434427ac07fSKip Macy {
1435427ac07fSKip Macy 	/*
1436427ac07fSKip Macy 	 * if we got multipath routes, we require users to specify
1437427ac07fSKip Macy 	 * a matching RTAX_GATEWAY.
1438427ac07fSKip Macy 	 */
1439e8b0643eSAlexander V. Chernikov 	struct rtentry *rt; // *rto = NULL;
1440f59c6cb0SAlexander V. Chernikov 	struct radix_node *rn;
1441e8b0643eSAlexander V. Chernikov 	struct sockaddr *gw;
1442427ac07fSKip Macy 
1443e8b0643eSAlexander V. Chernikov 	gw = info->rti_info[RTAX_GATEWAY];
1444e8b0643eSAlexander V. Chernikov 	rt = rt_mpath_matchgate(rto, gw);
1445e8b0643eSAlexander V. Chernikov 	if (rt == NULL) {
1446e8b0643eSAlexander V. Chernikov 		*perror = ESRCH;
1447e8b0643eSAlexander V. Chernikov 		return (NULL);
1448e8b0643eSAlexander V. Chernikov 	}
14495a2f4cbdSAlexander V. Chernikov 
1450427ac07fSKip Macy 	/*
1451427ac07fSKip Macy 	 * this is the first entry in the chain
1452427ac07fSKip Macy 	 */
1453427ac07fSKip Macy 	if (rto == rt) {
1454427ac07fSKip Macy 		rn = rn_mpath_next((struct radix_node *)rt);
1455427ac07fSKip Macy 		/*
1456427ac07fSKip Macy 		 * there is another entry, now it's active
1457427ac07fSKip Macy 		 */
1458427ac07fSKip Macy 		if (rn) {
1459427ac07fSKip Macy 			rto = RNTORT(rn);
1460427ac07fSKip Macy 			RT_LOCK(rto);
1461427ac07fSKip Macy 			rto->rt_flags |= RTF_UP;
1462427ac07fSKip Macy 			RT_UNLOCK(rto);
1463427ac07fSKip Macy 		} else if (rt->rt_flags & RTF_GATEWAY) {
1464427ac07fSKip Macy 			/*
1465427ac07fSKip Macy 			 * For gateway routes, we need to
1466427ac07fSKip Macy 			 * make sure that we we are deleting
1467427ac07fSKip Macy 			 * the correct gateway.
1468427ac07fSKip Macy 			 * rt_mpath_matchgate() does not
1469427ac07fSKip Macy 			 * check the case when there is only
1470427ac07fSKip Macy 			 * one route in the chain.
1471427ac07fSKip Macy 			 */
1472e8b0643eSAlexander V. Chernikov 			if (gw &&
1473e8b0643eSAlexander V. Chernikov 			    (rt->rt_gateway->sa_len != gw->sa_len ||
1474e8b0643eSAlexander V. Chernikov 				memcmp(rt->rt_gateway, gw, gw->sa_len))) {
1475e8b0643eSAlexander V. Chernikov 				*perror = ESRCH;
1476e8b0643eSAlexander V. Chernikov 				return (NULL);
1477e8b0643eSAlexander V. Chernikov 			}
14786a7bff2cSKip Macy 		}
14796a7bff2cSKip Macy 
1480427ac07fSKip Macy 		/*
1481427ac07fSKip Macy 		 * use the normal delete code to remove
1482427ac07fSKip Macy 		 * the first entry
1483427ac07fSKip Macy 		 */
148461eee0e2SAlexander V. Chernikov 		rn = rnh->rnh_deladdr(dst, netmask, &rnh->head);
1485e8b0643eSAlexander V. Chernikov 		*perror = 0;
1486e8b0643eSAlexander V. Chernikov 		return (rn);
1487427ac07fSKip Macy 	}
1488427ac07fSKip Macy 
1489427ac07fSKip Macy 	/*
1490427ac07fSKip Macy 	 * if the entry is 2nd and on up
1491427ac07fSKip Macy 	 */
1492e8b0643eSAlexander V. Chernikov 	if (rt_mpath_deldup(rto, rt) == 0)
1493427ac07fSKip Macy 		panic ("rtrequest1: rt_mpath_deldup");
1494e8b0643eSAlexander V. Chernikov 	*perror = 0;
1495e8b0643eSAlexander V. Chernikov 	rn = (struct radix_node *)rt;
1496e8b0643eSAlexander V. Chernikov 	return (rn);
1497427ac07fSKip Macy }
1498427ac07fSKip Macy #endif
1499427ac07fSKip Macy 
1500674e0823SAlexander V. Chernikov #ifdef FLOWTABLE
1501674e0823SAlexander V. Chernikov static struct rtentry *
150261eee0e2SAlexander V. Chernikov rt_flowtable_check_route(struct rib_head *rnh, struct rt_addrinfo *info)
1503674e0823SAlexander V. Chernikov {
1504af5c99e5SEnji Cooper #if defined(INET6) || defined(INET)
1505674e0823SAlexander V. Chernikov 	struct radix_node *rn;
1506af5c99e5SEnji Cooper #endif
1507674e0823SAlexander V. Chernikov 	struct rtentry *rt0;
1508674e0823SAlexander V. Chernikov 
1509674e0823SAlexander V. Chernikov 	rt0 = NULL;
1510674e0823SAlexander V. Chernikov 	/* "flow-table" only supports IPv6 and IPv4 at the moment. */
1511674e0823SAlexander V. Chernikov 	switch (dst->sa_family) {
1512674e0823SAlexander V. Chernikov #ifdef INET6
1513674e0823SAlexander V. Chernikov 	case AF_INET6:
1514674e0823SAlexander V. Chernikov #endif
1515674e0823SAlexander V. Chernikov #ifdef INET
1516674e0823SAlexander V. Chernikov 	case AF_INET:
1517674e0823SAlexander V. Chernikov #endif
1518674e0823SAlexander V. Chernikov #if defined(INET6) || defined(INET)
151994017572SAlexander V. Chernikov 		rn = rnh->rnh_matchaddr(dst, &rnh->head);
1520674e0823SAlexander V. Chernikov 		if (rn && ((rn->rn_flags & RNF_ROOT) == 0)) {
1521674e0823SAlexander V. Chernikov 			struct sockaddr *mask;
1522674e0823SAlexander V. Chernikov 			u_char *m, *n;
1523674e0823SAlexander V. Chernikov 			int len;
1524674e0823SAlexander V. Chernikov 
1525674e0823SAlexander V. Chernikov 			/*
1526674e0823SAlexander V. Chernikov 			 * compare mask to see if the new route is
1527674e0823SAlexander V. Chernikov 			 * more specific than the existing one
1528674e0823SAlexander V. Chernikov 			 */
1529674e0823SAlexander V. Chernikov 			rt0 = RNTORT(rn);
1530674e0823SAlexander V. Chernikov 			RT_LOCK(rt0);
1531674e0823SAlexander V. Chernikov 			RT_ADDREF(rt0);
1532674e0823SAlexander V. Chernikov 			RT_UNLOCK(rt0);
1533674e0823SAlexander V. Chernikov 			/*
1534674e0823SAlexander V. Chernikov 			 * A host route is already present, so
1535674e0823SAlexander V. Chernikov 			 * leave the flow-table entries as is.
1536674e0823SAlexander V. Chernikov 			 */
1537674e0823SAlexander V. Chernikov 			if (rt0->rt_flags & RTF_HOST) {
1538674e0823SAlexander V. Chernikov 				RTFREE(rt0);
1539674e0823SAlexander V. Chernikov 				rt0 = NULL;
1540674e0823SAlexander V. Chernikov 			} else if (!(flags & RTF_HOST) && netmask) {
1541674e0823SAlexander V. Chernikov 				mask = rt_mask(rt0);
1542674e0823SAlexander V. Chernikov 				len = mask->sa_len;
1543674e0823SAlexander V. Chernikov 				m = (u_char *)mask;
1544674e0823SAlexander V. Chernikov 				n = (u_char *)netmask;
1545674e0823SAlexander V. Chernikov 				while (len-- > 0) {
1546674e0823SAlexander V. Chernikov 					if (*n != *m)
1547674e0823SAlexander V. Chernikov 						break;
1548674e0823SAlexander V. Chernikov 					n++;
1549674e0823SAlexander V. Chernikov 					m++;
1550674e0823SAlexander V. Chernikov 				}
1551674e0823SAlexander V. Chernikov 				if (len == 0 || (*n < *m)) {
1552674e0823SAlexander V. Chernikov 					RTFREE(rt0);
1553674e0823SAlexander V. Chernikov 					rt0 = NULL;
1554674e0823SAlexander V. Chernikov 				}
1555674e0823SAlexander V. Chernikov 			}
1556674e0823SAlexander V. Chernikov 		}
1557674e0823SAlexander V. Chernikov #endif/* INET6 || INET */
1558674e0823SAlexander V. Chernikov 	}
1559674e0823SAlexander V. Chernikov 
1560674e0823SAlexander V. Chernikov 	return (rt0);
1561674e0823SAlexander V. Chernikov }
1562674e0823SAlexander V. Chernikov #endif
1563674e0823SAlexander V. Chernikov 
15648071913dSRuslan Ermilov int
15658b07e49aSJulian Elischer rtrequest1_fib(int req, struct rt_addrinfo *info, struct rtentry **ret_nrt,
15668b07e49aSJulian Elischer 				u_int fibnum)
15678b07e49aSJulian Elischer {
1568048738b5SAlexander V. Chernikov 	int error = 0;
15694b3dc898SAlexander V. Chernikov 	struct rtentry *rt, *rt_old;
1570e5c610d6SQing Li #ifdef FLOWTABLE
1571f59c6cb0SAlexander V. Chernikov 	struct rtentry *rt0;
1572e5c610d6SQing Li #endif
1573f59c6cb0SAlexander V. Chernikov 	struct radix_node *rn;
157461eee0e2SAlexander V. Chernikov 	struct rib_head *rnh;
1575df8bae1dSRodney W. Grimes 	struct ifaddr *ifa;
1576df8bae1dSRodney W. Grimes 	struct sockaddr *ndst;
157746a70de2SQing Li 	struct sockaddr_storage mdst;
1578df8bae1dSRodney W. Grimes 
15798b07e49aSJulian Elischer 	KASSERT((fibnum < rt_numfibs), ("rtrequest1_fib: bad fibnum"));
1580048738b5SAlexander V. Chernikov 	KASSERT((flags & RTF_RNH_LOCKED) == 0, ("rtrequest1_fib: locked"));
1581b680a383SBjoern A. Zeeb 	switch (dst->sa_family) {
1582b680a383SBjoern A. Zeeb 	case AF_INET6:
1583b680a383SBjoern A. Zeeb 	case AF_INET:
1584b680a383SBjoern A. Zeeb 		/* We support multiple FIBs. */
1585b680a383SBjoern A. Zeeb 		break;
1586b680a383SBjoern A. Zeeb 	default:
1587b680a383SBjoern A. Zeeb 		fibnum = RT_DEFAULT_FIB;
1588b680a383SBjoern A. Zeeb 		break;
1589b680a383SBjoern A. Zeeb 	}
1590b680a383SBjoern A. Zeeb 
1591b0a76b88SJulian Elischer 	/*
1592b0a76b88SJulian Elischer 	 * Find the correct routing tree to use for this Address Family
1593b0a76b88SJulian Elischer 	 */
1594c2c2a7c1SBjoern A. Zeeb 	rnh = rt_tables_get_rnh(fibnum, dst->sa_family);
159585911824SLuigi Rizzo 	if (rnh == NULL)
1596983985c1SJeffrey Hsu 		return (EAFNOSUPPORT);
1597048738b5SAlexander V. Chernikov 
1598b0a76b88SJulian Elischer 	/*
1599b0a76b88SJulian Elischer 	 * If we are adding a host route then we don't want to put
160066953138SRuslan Ermilov 	 * a netmask in the tree, nor do we want to clone it.
1601b0a76b88SJulian Elischer 	 */
16026e6b3f7cSQing Li 	if (flags & RTF_HOST)
160385911824SLuigi Rizzo 		netmask = NULL;
16046e6b3f7cSQing Li 
1605df8bae1dSRodney W. Grimes 	switch (req) {
1606df8bae1dSRodney W. Grimes 	case RTM_DELETE:
160746a70de2SQing Li 		if (netmask) {
160846a70de2SQing Li 			rt_maskedcopy(dst, (struct sockaddr *)&mdst, netmask);
160946a70de2SQing Li 			dst = (struct sockaddr *)&mdst;
161046a70de2SQing Li 		}
1611e8b0643eSAlexander V. Chernikov 
161261eee0e2SAlexander V. Chernikov 		RIB_WLOCK(rnh);
1613e8b0643eSAlexander V. Chernikov 		rt = rt_unlinkrte(rnh, info, &error);
161461eee0e2SAlexander V. Chernikov 		RIB_WUNLOCK(rnh);
1615e8b0643eSAlexander V. Chernikov 		if (error != 0)
1616048738b5SAlexander V. Chernikov 			return (error);
16173034f43fSAlexander V. Chernikov 
1618e8b0643eSAlexander V. Chernikov 		rt_notifydelete(rt, info);
1619499676dfSJulian Elischer 
1620499676dfSJulian Elischer 		/*
1621499676dfSJulian Elischer 		 * If the caller wants it, then it can have it,
1622499676dfSJulian Elischer 		 * but it's up to it to free the rtentry as we won't be
1623499676dfSJulian Elischer 		 * doing it.
1624b0a76b88SJulian Elischer 		 */
1625d1dd20beSSam Leffler 		if (ret_nrt) {
1626df8bae1dSRodney W. Grimes 			*ret_nrt = rt;
1627d1dd20beSSam Leffler 			RT_UNLOCK(rt);
1628d1dd20beSSam Leffler 		} else
1629d1dd20beSSam Leffler 			RTFREE_LOCKED(rt);
1630df8bae1dSRodney W. Grimes 		break;
1631df8bae1dSRodney W. Grimes 	case RTM_RESOLVE:
16326e6b3f7cSQing Li 		/*
16336e6b3f7cSQing Li 		 * resolve was only used for route cloning
16346e6b3f7cSQing Li 		 * here for compat
16356e6b3f7cSQing Li 		 */
16366e6b3f7cSQing Li 		break;
1637df8bae1dSRodney W. Grimes 	case RTM_ADD:
16385df72964SGarrett Wollman 		if ((flags & RTF_GATEWAY) && !gateway)
1639048738b5SAlexander V. Chernikov 			return (EINVAL);
164016a2e0a6SQing Li 		if (dst && gateway && (dst->sa_family != gateway->sa_family) &&
164116a2e0a6SQing Li 		    (gateway->sa_family != AF_UNSPEC) && (gateway->sa_family != AF_LINK))
1642048738b5SAlexander V. Chernikov 			return (EINVAL);
16435df72964SGarrett Wollman 
16448c0fec80SRobert Watson 		if (info->rti_ifa == NULL) {
16458c0fec80SRobert Watson 			error = rt_getifa_fib(info, fibnum);
16468c0fec80SRobert Watson 			if (error)
1647048738b5SAlexander V. Chernikov 				return (error);
16488c0fec80SRobert Watson 		} else
16498c0fec80SRobert Watson 			ifa_ref(info->rti_ifa);
16508071913dSRuslan Ermilov 		ifa = info->rti_ifa;
1651e3a7aa6fSGleb Smirnoff 		rt = uma_zalloc(V_rtzone, M_NOWAIT);
16528c0fec80SRobert Watson 		if (rt == NULL) {
16538c0fec80SRobert Watson 			ifa_free(ifa);
1654048738b5SAlexander V. Chernikov 			return (ENOBUFS);
16558c0fec80SRobert Watson 		}
1656df8bae1dSRodney W. Grimes 		rt->rt_flags = RTF_UP | flags;
16578b07e49aSJulian Elischer 		rt->rt_fibnum = fibnum;
1658499676dfSJulian Elischer 		/*
1659a8498625SBjoern A. Zeeb 		 * Add the gateway. Possibly re-malloc-ing the storage for it.
1660499676dfSJulian Elischer 		 */
1661831a80b0SMatthew Dillon 		if ((error = rt_setgate(rt, dst, gateway)) != 0) {
16628c0fec80SRobert Watson 			ifa_free(ifa);
16631ed81b73SMarko Zec 			uma_zfree(V_rtzone, rt);
1664048738b5SAlexander V. Chernikov 			return (error);
1665df8bae1dSRodney W. Grimes 		}
1666499676dfSJulian Elischer 
1667499676dfSJulian Elischer 		/*
1668499676dfSJulian Elischer 		 * point to the (possibly newly malloc'd) dest address.
1669499676dfSJulian Elischer 		 */
1670d1dd20beSSam Leffler 		ndst = (struct sockaddr *)rt_key(rt);
1671499676dfSJulian Elischer 
1672499676dfSJulian Elischer 		/*
1673499676dfSJulian Elischer 		 * make sure it contains the value we want (masked if needed).
1674499676dfSJulian Elischer 		 */
1675df8bae1dSRodney W. Grimes 		if (netmask) {
1676df8bae1dSRodney W. Grimes 			rt_maskedcopy(dst, ndst, netmask);
1677df8bae1dSRodney W. Grimes 		} else
16781838a647SLuigi Rizzo 			bcopy(dst, ndst, dst->sa_len);
16798e718bb4SGarrett Wollman 
16808e718bb4SGarrett Wollman 		/*
16818c0fec80SRobert Watson 		 * We use the ifa reference returned by rt_getifa_fib().
16828e718bb4SGarrett Wollman 		 * This moved from below so that rnh->rnh_addaddr() can
1683499676dfSJulian Elischer 		 * examine the ifa and  ifa->ifa_ifp if it so desires.
16848e718bb4SGarrett Wollman 		 */
16858e718bb4SGarrett Wollman 		rt->rt_ifa = ifa;
16868e718bb4SGarrett Wollman 		rt->rt_ifp = ifa->ifa_ifp;
1687e3a7aa6fSGleb Smirnoff 		rt->rt_weight = 1;
16888e718bb4SGarrett Wollman 
16891a75e3b2SAlexander V. Chernikov 		rt_setmetrics(info, rt);
16901a75e3b2SAlexander V. Chernikov 
169161eee0e2SAlexander V. Chernikov 		RIB_WLOCK(rnh);
1692048738b5SAlexander V. Chernikov 		RT_LOCK(rt);
1693e440aed9SQing Li #ifdef RADIX_MPATH
1694e440aed9SQing Li 		/* do not permit exactly the same dst/mask/gw pair */
169561eee0e2SAlexander V. Chernikov 		if (rt_mpath_capable(rnh) &&
1696e440aed9SQing Li 			rt_mpath_conflict(rnh, rt, netmask)) {
169761eee0e2SAlexander V. Chernikov 			RIB_WUNLOCK(rnh);
1698048738b5SAlexander V. Chernikov 
16991099f828SRobert Watson 			ifa_free(rt->rt_ifa);
17008b15f615SLuiz Otavio O Souza 			R_Free(rt_key(rt));
17011ed81b73SMarko Zec 			uma_zfree(V_rtzone, rt);
1702048738b5SAlexander V. Chernikov 			return (EEXIST);
1703e440aed9SQing Li 		}
1704e440aed9SQing Li #endif
1705e440aed9SQing Li 
1706e5c610d6SQing Li #ifdef FLOWTABLE
1707674e0823SAlexander V. Chernikov 		rt0 = rt_flowtable_check_route(rnh, info);
1708096f2786SBjoern A. Zeeb #endif /* FLOWTABLE */
1709e5c610d6SQing Li 
1710d1dd20beSSam Leffler 		/* XXX mtu manipulation will be done in rnh_addaddr -- itojun */
171161eee0e2SAlexander V. Chernikov 		rn = rnh->rnh_addaddr(ndst, netmask, &rnh->head, rt->rt_nodes);
17124b3dc898SAlexander V. Chernikov 
17134b3dc898SAlexander V. Chernikov 		rt_old = NULL;
17144b3dc898SAlexander V. Chernikov 		if (rn == NULL && (info->rti_flags & RTF_PINNED) != 0) {
17154b3dc898SAlexander V. Chernikov 
17164b3dc898SAlexander V. Chernikov 			/*
17174b3dc898SAlexander V. Chernikov 			 * Force removal and re-try addition
17184b3dc898SAlexander V. Chernikov 			 * TODO: better multipath&pinned support
17194b3dc898SAlexander V. Chernikov 			 */
17204b3dc898SAlexander V. Chernikov 			struct sockaddr *info_dst = info->rti_info[RTAX_DST];
17214b3dc898SAlexander V. Chernikov 			info->rti_info[RTAX_DST] = ndst;
17226af272d8SAlexander V. Chernikov 			/* Do not delete existing PINNED(interface) routes */
17236af272d8SAlexander V. Chernikov 			info->rti_flags &= ~RTF_PINNED;
17244b3dc898SAlexander V. Chernikov 			rt_old = rt_unlinkrte(rnh, info, &error);
17256af272d8SAlexander V. Chernikov 			info->rti_flags |= RTF_PINNED;
17264b3dc898SAlexander V. Chernikov 			info->rti_info[RTAX_DST] = info_dst;
17274b3dc898SAlexander V. Chernikov 			if (rt_old != NULL)
172861eee0e2SAlexander V. Chernikov 				rn = rnh->rnh_addaddr(ndst, netmask, &rnh->head,
17294b3dc898SAlexander V. Chernikov 				    rt->rt_nodes);
17304b3dc898SAlexander V. Chernikov 		}
173161eee0e2SAlexander V. Chernikov 		RIB_WUNLOCK(rnh);
17324b3dc898SAlexander V. Chernikov 
17334b3dc898SAlexander V. Chernikov 		if (rt_old != NULL)
17344b3dc898SAlexander V. Chernikov 			RT_UNLOCK(rt_old);
17354b3dc898SAlexander V. Chernikov 
1736499676dfSJulian Elischer 		/*
1737499676dfSJulian Elischer 		 * If it still failed to go into the tree,
1738499676dfSJulian Elischer 		 * then un-make it (this should be a function)
1739499676dfSJulian Elischer 		 */
174085911824SLuigi Rizzo 		if (rn == NULL) {
17411099f828SRobert Watson 			ifa_free(rt->rt_ifa);
17428b15f615SLuiz Otavio O Souza 			R_Free(rt_key(rt));
17431ed81b73SMarko Zec 			uma_zfree(V_rtzone, rt);
1744e5c610d6SQing Li #ifdef FLOWTABLE
1745e5c610d6SQing Li 			if (rt0 != NULL)
1746e5c610d6SQing Li 				RTFREE(rt0);
1747e5c610d6SQing Li #endif
1748048738b5SAlexander V. Chernikov 			return (EEXIST);
1749df8bae1dSRodney W. Grimes 		}
1750e5c610d6SQing Li #ifdef FLOWTABLE
1751e5c610d6SQing Li 		else if (rt0 != NULL) {
17525d6d7e75SGleb Smirnoff 			flowtable_route_flush(dst->sa_family, rt0);
1753e5c610d6SQing Li 			RTFREE(rt0);
1754e5c610d6SQing Li 		}
1755e5c610d6SQing Li #endif
1756499676dfSJulian Elischer 
17574b3dc898SAlexander V. Chernikov 		if (rt_old != NULL) {
17584b3dc898SAlexander V. Chernikov 			rt_notifydelete(rt_old, info);
17594b3dc898SAlexander V. Chernikov 			RTFREE(rt_old);
17604b3dc898SAlexander V. Chernikov 		}
17614b3dc898SAlexander V. Chernikov 
1762499676dfSJulian Elischer 		/*
1763a0c0e34bSGleb Smirnoff 		 * If this protocol has something to add to this then
1764499676dfSJulian Elischer 		 * allow it to do that as well.
1765499676dfSJulian Elischer 		 */
1766df8bae1dSRodney W. Grimes 		if (ifa->ifa_rtrequest)
17678071913dSRuslan Ermilov 			ifa->ifa_rtrequest(req, rt, info);
1768499676dfSJulian Elischer 
1769cd02a0b7SGarrett Wollman 		/*
1770499676dfSJulian Elischer 		 * actually return a resultant rtentry and
1771499676dfSJulian Elischer 		 * give the caller a single reference.
1772499676dfSJulian Elischer 		 */
1773df8bae1dSRodney W. Grimes 		if (ret_nrt) {
1774df8bae1dSRodney W. Grimes 			*ret_nrt = rt;
17757138d65cSSam Leffler 			RT_ADDREF(rt);
1776df8bae1dSRodney W. Grimes 		}
177784cc0778SGeorge V. Neville-Neil 		rnh->rnh_gen++;		/* Routing table updated */
1778d1dd20beSSam Leffler 		RT_UNLOCK(rt);
1779df8bae1dSRodney W. Grimes 		break;
1780c77462ddSAlexander V. Chernikov 	case RTM_CHANGE:
178161eee0e2SAlexander V. Chernikov 		RIB_WLOCK(rnh);
1782c77462ddSAlexander V. Chernikov 		error = rtrequest1_fib_change(rnh, info, ret_nrt, fibnum);
178361eee0e2SAlexander V. Chernikov 		RIB_WUNLOCK(rnh);
1784c77462ddSAlexander V. Chernikov 		break;
17858071913dSRuslan Ermilov 	default:
17868071913dSRuslan Ermilov 		error = EOPNOTSUPP;
1787df8bae1dSRodney W. Grimes 	}
1788048738b5SAlexander V. Chernikov 
1789df8bae1dSRodney W. Grimes 	return (error);
1790d1dd20beSSam Leffler }
1791d1dd20beSSam Leffler 
17928071913dSRuslan Ermilov #undef dst
17938071913dSRuslan Ermilov #undef gateway
17948071913dSRuslan Ermilov #undef netmask
17958071913dSRuslan Ermilov #undef ifaaddr
17968071913dSRuslan Ermilov #undef ifpaddr
17978071913dSRuslan Ermilov #undef flags
1798df8bae1dSRodney W. Grimes 
1799c77462ddSAlexander V. Chernikov static int
180061eee0e2SAlexander V. Chernikov rtrequest1_fib_change(struct rib_head *rnh, struct rt_addrinfo *info,
1801c77462ddSAlexander V. Chernikov     struct rtentry **ret_nrt, u_int fibnum)
1802c77462ddSAlexander V. Chernikov {
1803c77462ddSAlexander V. Chernikov 	struct rtentry *rt = NULL;
1804c77462ddSAlexander V. Chernikov 	int error = 0;
1805c77462ddSAlexander V. Chernikov 	int free_ifa = 0;
18061a75e3b2SAlexander V. Chernikov 	int family, mtu;
18077f948f12SAlexander V. Chernikov 	struct if_mtuinfo ifmtu;
1808c77462ddSAlexander V. Chernikov 
1809c77462ddSAlexander V. Chernikov 	rt = (struct rtentry *)rnh->rnh_lookup(info->rti_info[RTAX_DST],
181061eee0e2SAlexander V. Chernikov 	    info->rti_info[RTAX_NETMASK], &rnh->head);
1811c77462ddSAlexander V. Chernikov 
1812c77462ddSAlexander V. Chernikov 	if (rt == NULL)
1813c77462ddSAlexander V. Chernikov 		return (ESRCH);
1814c77462ddSAlexander V. Chernikov 
1815c77462ddSAlexander V. Chernikov #ifdef RADIX_MPATH
1816c77462ddSAlexander V. Chernikov 	/*
1817c77462ddSAlexander V. Chernikov 	 * If we got multipath routes,
1818c77462ddSAlexander V. Chernikov 	 * we require users to specify a matching RTAX_GATEWAY.
1819c77462ddSAlexander V. Chernikov 	 */
182061eee0e2SAlexander V. Chernikov 	if (rt_mpath_capable(rnh)) {
1821c77462ddSAlexander V. Chernikov 		rt = rt_mpath_matchgate(rt, info->rti_info[RTAX_GATEWAY]);
1822c77462ddSAlexander V. Chernikov 		if (rt == NULL)
1823c77462ddSAlexander V. Chernikov 			return (ESRCH);
1824c77462ddSAlexander V. Chernikov 	}
1825c77462ddSAlexander V. Chernikov #endif
1826c77462ddSAlexander V. Chernikov 
1827c77462ddSAlexander V. Chernikov 	RT_LOCK(rt);
1828c77462ddSAlexander V. Chernikov 
18291a75e3b2SAlexander V. Chernikov 	rt_setmetrics(info, rt);
18301a75e3b2SAlexander V. Chernikov 
1831c77462ddSAlexander V. Chernikov 	/*
1832c77462ddSAlexander V. Chernikov 	 * New gateway could require new ifaddr, ifp;
1833c77462ddSAlexander V. Chernikov 	 * flags may also be different; ifp may be specified
1834c77462ddSAlexander V. Chernikov 	 * by ll sockaddr when protocol address is ambiguous
1835c77462ddSAlexander V. Chernikov 	 */
1836c77462ddSAlexander V. Chernikov 	if (((rt->rt_flags & RTF_GATEWAY) &&
1837c77462ddSAlexander V. Chernikov 	    info->rti_info[RTAX_GATEWAY] != NULL) ||
1838c77462ddSAlexander V. Chernikov 	    info->rti_info[RTAX_IFP] != NULL ||
1839c77462ddSAlexander V. Chernikov 	    (info->rti_info[RTAX_IFA] != NULL &&
1840c77462ddSAlexander V. Chernikov 	     !sa_equal(info->rti_info[RTAX_IFA], rt->rt_ifa->ifa_addr))) {
1841c77462ddSAlexander V. Chernikov 
1842c77462ddSAlexander V. Chernikov 		error = rt_getifa_fib(info, fibnum);
1843c77462ddSAlexander V. Chernikov 		if (info->rti_ifa != NULL)
1844c77462ddSAlexander V. Chernikov 			free_ifa = 1;
1845c77462ddSAlexander V. Chernikov 
1846c77462ddSAlexander V. Chernikov 		if (error != 0)
1847a713ee5cSAlexander V. Chernikov 			goto bad;
1848c77462ddSAlexander V. Chernikov 	}
1849c77462ddSAlexander V. Chernikov 
1850c77462ddSAlexander V. Chernikov 	/* Check if outgoing interface has changed */
1851c77462ddSAlexander V. Chernikov 	if (info->rti_ifa != NULL && info->rti_ifa != rt->rt_ifa &&
1852c77462ddSAlexander V. Chernikov 	    rt->rt_ifa != NULL && rt->rt_ifa->ifa_rtrequest != NULL) {
1853c77462ddSAlexander V. Chernikov 		rt->rt_ifa->ifa_rtrequest(RTM_DELETE, rt, info);
1854c77462ddSAlexander V. Chernikov 		ifa_free(rt->rt_ifa);
1855c77462ddSAlexander V. Chernikov 	}
1856c77462ddSAlexander V. Chernikov 	/* Update gateway address */
1857c77462ddSAlexander V. Chernikov 	if (info->rti_info[RTAX_GATEWAY] != NULL) {
1858c77462ddSAlexander V. Chernikov 		error = rt_setgate(rt, rt_key(rt), info->rti_info[RTAX_GATEWAY]);
1859c77462ddSAlexander V. Chernikov 		if (error != 0)
1860a713ee5cSAlexander V. Chernikov 			goto bad;
1861c77462ddSAlexander V. Chernikov 
1862c77462ddSAlexander V. Chernikov 		rt->rt_flags &= ~RTF_GATEWAY;
1863c77462ddSAlexander V. Chernikov 		rt->rt_flags |= (RTF_GATEWAY & info->rti_flags);
1864c77462ddSAlexander V. Chernikov 	}
1865c77462ddSAlexander V. Chernikov 
1866c77462ddSAlexander V. Chernikov 	if (info->rti_ifa != NULL && info->rti_ifa != rt->rt_ifa) {
1867c77462ddSAlexander V. Chernikov 		ifa_ref(info->rti_ifa);
1868c77462ddSAlexander V. Chernikov 		rt->rt_ifa = info->rti_ifa;
1869c77462ddSAlexander V. Chernikov 		rt->rt_ifp = info->rti_ifp;
1870c77462ddSAlexander V. Chernikov 	}
1871c77462ddSAlexander V. Chernikov 	/* Allow some flags to be toggled on change. */
1872c77462ddSAlexander V. Chernikov 	rt->rt_flags &= ~RTF_FMASK;
1873c77462ddSAlexander V. Chernikov 	rt->rt_flags |= info->rti_flags & RTF_FMASK;
1874c77462ddSAlexander V. Chernikov 
1875c77462ddSAlexander V. Chernikov 	if (rt->rt_ifa && rt->rt_ifa->ifa_rtrequest != NULL)
1876c77462ddSAlexander V. Chernikov 	       rt->rt_ifa->ifa_rtrequest(RTM_ADD, rt, info);
1877c77462ddSAlexander V. Chernikov 
18787f948f12SAlexander V. Chernikov 	/* Alter route MTU if necessary */
18791a75e3b2SAlexander V. Chernikov 	if (rt->rt_ifp != NULL) {
18801a75e3b2SAlexander V. Chernikov 		family = info->rti_info[RTAX_DST]->sa_family;
18811a75e3b2SAlexander V. Chernikov 		mtu = if_getmtu_family(rt->rt_ifp, family);
18827f948f12SAlexander V. Chernikov 		/* Set default MTU */
18837f948f12SAlexander V. Chernikov 		if (rt->rt_mtu == 0)
18841a75e3b2SAlexander V. Chernikov 			rt->rt_mtu = mtu;
18857f948f12SAlexander V. Chernikov 		if (rt->rt_mtu != mtu) {
18867f948f12SAlexander V. Chernikov 			/* Check if we really need to update */
18877f948f12SAlexander V. Chernikov 			ifmtu.ifp = rt->rt_ifp;
18887f948f12SAlexander V. Chernikov 			ifmtu.mtu = mtu;
18897f948f12SAlexander V. Chernikov 			if_updatemtu_cb(rt->rt_nodes, &ifmtu);
18907f948f12SAlexander V. Chernikov 		}
18911a75e3b2SAlexander V. Chernikov 	}
18920fb9298dSAlexander V. Chernikov 
1893c77462ddSAlexander V. Chernikov 	if (ret_nrt) {
1894c77462ddSAlexander V. Chernikov 		*ret_nrt = rt;
1895c77462ddSAlexander V. Chernikov 		RT_ADDREF(rt);
1896c77462ddSAlexander V. Chernikov 	}
1897c77462ddSAlexander V. Chernikov bad:
1898c77462ddSAlexander V. Chernikov 	RT_UNLOCK(rt);
1899c77462ddSAlexander V. Chernikov 	if (free_ifa != 0)
1900c77462ddSAlexander V. Chernikov 		ifa_free(info->rti_ifa);
1901c77462ddSAlexander V. Chernikov 	return (error);
1902c77462ddSAlexander V. Chernikov }
1903c77462ddSAlexander V. Chernikov 
19040fb9298dSAlexander V. Chernikov static void
19050fb9298dSAlexander V. Chernikov rt_setmetrics(const struct rt_addrinfo *info, struct rtentry *rt)
19060fb9298dSAlexander V. Chernikov {
19070fb9298dSAlexander V. Chernikov 
19087f948f12SAlexander V. Chernikov 	if (info->rti_mflags & RTV_MTU) {
19097f948f12SAlexander V. Chernikov 		if (info->rti_rmx->rmx_mtu != 0) {
19107f948f12SAlexander V. Chernikov 
19117f948f12SAlexander V. Chernikov 			/*
19127f948f12SAlexander V. Chernikov 			 * MTU was explicitly provided by user.
19137f948f12SAlexander V. Chernikov 			 * Keep it.
19147f948f12SAlexander V. Chernikov 			 */
19157f948f12SAlexander V. Chernikov 			rt->rt_flags |= RTF_FIXEDMTU;
19167f948f12SAlexander V. Chernikov 		} else {
19177f948f12SAlexander V. Chernikov 
19187f948f12SAlexander V. Chernikov 			/*
19197f948f12SAlexander V. Chernikov 			 * User explicitly sets MTU to 0.
19207f948f12SAlexander V. Chernikov 			 * Assume rollback to default.
19217f948f12SAlexander V. Chernikov 			 */
19227f948f12SAlexander V. Chernikov 			rt->rt_flags &= ~RTF_FIXEDMTU;
19237f948f12SAlexander V. Chernikov 		}
19240fb9298dSAlexander V. Chernikov 		rt->rt_mtu = info->rti_rmx->rmx_mtu;
19257f948f12SAlexander V. Chernikov 	}
19260fb9298dSAlexander V. Chernikov 	if (info->rti_mflags & RTV_WEIGHT)
19270fb9298dSAlexander V. Chernikov 		rt->rt_weight = info->rti_rmx->rmx_weight;
19280fb9298dSAlexander V. Chernikov 	/* Kernel -> userland timebase conversion. */
19290fb9298dSAlexander V. Chernikov 	if (info->rti_mflags & RTV_EXPIRE)
19300fb9298dSAlexander V. Chernikov 		rt->rt_expire = info->rti_rmx->rmx_expire ?
19310fb9298dSAlexander V. Chernikov 		    info->rti_rmx->rmx_expire - time_second + time_uptime : 0;
19320fb9298dSAlexander V. Chernikov }
19330fb9298dSAlexander V. Chernikov 
1934df8bae1dSRodney W. Grimes int
1935d1dd20beSSam Leffler rt_setgate(struct rtentry *rt, struct sockaddr *dst, struct sockaddr *gate)
1936df8bae1dSRodney W. Grimes {
1937d1dd20beSSam Leffler 	/* XXX dst may be overwritten, can we move this to below */
19386e6b3f7cSQing Li 	int dlen = SA_SIZE(dst), glen = SA_SIZE(gate);
1939df8bae1dSRodney W. Grimes 
19401db1fffaSBill Fenner 	/*
194185911824SLuigi Rizzo 	 * Prepare to store the gateway in rt->rt_gateway.
194285911824SLuigi Rizzo 	 * Both dst and gateway are stored one after the other in the same
194385911824SLuigi Rizzo 	 * malloc'd chunk. If we have room, we can reuse the old buffer,
194485911824SLuigi Rizzo 	 * rt_gateway already points to the right place.
194585911824SLuigi Rizzo 	 * Otherwise, malloc a new block and update the 'dst' address.
1946499676dfSJulian Elischer 	 */
194785911824SLuigi Rizzo 	if (rt->rt_gateway == NULL || glen > SA_SIZE(rt->rt_gateway)) {
194885911824SLuigi Rizzo 		caddr_t new;
194985911824SLuigi Rizzo 
1950df8bae1dSRodney W. Grimes 		R_Malloc(new, caddr_t, dlen + glen);
195185911824SLuigi Rizzo 		if (new == NULL)
19521db1fffaSBill Fenner 			return ENOBUFS;
1953499676dfSJulian Elischer 		/*
195485911824SLuigi Rizzo 		 * XXX note, we copy from *dst and not *rt_key(rt) because
195585911824SLuigi Rizzo 		 * rt_setgate() can be called to initialize a newly
195685911824SLuigi Rizzo 		 * allocated route entry, in which case rt_key(rt) == NULL
195785911824SLuigi Rizzo 		 * (and also rt->rt_gateway == NULL).
195885911824SLuigi Rizzo 		 * Free()/free() handle a NULL argument just fine.
1959499676dfSJulian Elischer 		 */
19601838a647SLuigi Rizzo 		bcopy(dst, new, dlen);
19618b15f615SLuiz Otavio O Souza 		R_Free(rt_key(rt));	/* free old block, if any */
1962445e045bSAlexander Kabaev 		rt_key(rt) = (struct sockaddr *)new;
196385911824SLuigi Rizzo 		rt->rt_gateway = (struct sockaddr *)(new + dlen);
1964df8bae1dSRodney W. Grimes 	}
1965499676dfSJulian Elischer 
1966499676dfSJulian Elischer 	/*
196785911824SLuigi Rizzo 	 * Copy the new gateway value into the memory chunk.
196885911824SLuigi Rizzo 	 */
196985911824SLuigi Rizzo 	bcopy(gate, rt->rt_gateway, glen);
197085911824SLuigi Rizzo 
19716e6b3f7cSQing Li 	return (0);
1972df8bae1dSRodney W. Grimes }
1973df8bae1dSRodney W. Grimes 
1974c7ab6602SQing Li void
1975d1dd20beSSam Leffler rt_maskedcopy(struct sockaddr *src, struct sockaddr *dst, struct sockaddr *netmask)
1976df8bae1dSRodney W. Grimes {
1977f59c6cb0SAlexander V. Chernikov 	u_char *cp1 = (u_char *)src;
1978f59c6cb0SAlexander V. Chernikov 	u_char *cp2 = (u_char *)dst;
1979f59c6cb0SAlexander V. Chernikov 	u_char *cp3 = (u_char *)netmask;
1980df8bae1dSRodney W. Grimes 	u_char *cplim = cp2 + *cp3;
1981df8bae1dSRodney W. Grimes 	u_char *cplim2 = cp2 + *cp1;
1982df8bae1dSRodney W. Grimes 
1983df8bae1dSRodney W. Grimes 	*cp2++ = *cp1++; *cp2++ = *cp1++; /* copies sa_len & sa_family */
1984df8bae1dSRodney W. Grimes 	cp3 += 2;
1985df8bae1dSRodney W. Grimes 	if (cplim > cplim2)
1986df8bae1dSRodney W. Grimes 		cplim = cplim2;
1987df8bae1dSRodney W. Grimes 	while (cp2 < cplim)
1988df8bae1dSRodney W. Grimes 		*cp2++ = *cp1++ & *cp3++;
1989df8bae1dSRodney W. Grimes 	if (cp2 < cplim2)
1990df8bae1dSRodney W. Grimes 		bzero((caddr_t)cp2, (unsigned)(cplim2 - cp2));
1991df8bae1dSRodney W. Grimes }
1992df8bae1dSRodney W. Grimes 
1993df8bae1dSRodney W. Grimes /*
1994df8bae1dSRodney W. Grimes  * Set up a routing table entry, normally
1995df8bae1dSRodney W. Grimes  * for an interface.
1996df8bae1dSRodney W. Grimes  */
19978b07e49aSJulian Elischer #define _SOCKADDR_TMPSIZE 128 /* Not too big.. kernel stack size is limited */
19988b07e49aSJulian Elischer static inline  int
19998b07e49aSJulian Elischer rtinit1(struct ifaddr *ifa, int cmd, int flags, int fibnum)
2000df8bae1dSRodney W. Grimes {
20015aca0b30SLuigi Rizzo 	struct sockaddr *dst;
20028071913dSRuslan Ermilov 	struct sockaddr *netmask;
200385911824SLuigi Rizzo 	struct rtentry *rt = NULL;
20048071913dSRuslan Ermilov 	struct rt_addrinfo info;
2005e440aed9SQing Li 	int error = 0;
20068b07e49aSJulian Elischer 	int startfib, endfib;
20078b07e49aSJulian Elischer 	char tempbuf[_SOCKADDR_TMPSIZE];
20088b07e49aSJulian Elischer 	int didwork = 0;
20098b07e49aSJulian Elischer 	int a_failure = 0;
20106e6b3f7cSQing Li 	static struct sockaddr_dl null_sdl = {sizeof(null_sdl), AF_LINK};
201161eee0e2SAlexander V. Chernikov 	struct rib_head *rnh;
2012df8bae1dSRodney W. Grimes 
20138071913dSRuslan Ermilov 	if (flags & RTF_HOST) {
20148071913dSRuslan Ermilov 		dst = ifa->ifa_dstaddr;
20158071913dSRuslan Ermilov 		netmask = NULL;
20168071913dSRuslan Ermilov 	} else {
20178071913dSRuslan Ermilov 		dst = ifa->ifa_addr;
20188071913dSRuslan Ermilov 		netmask = ifa->ifa_netmask;
20198071913dSRuslan Ermilov 	}
2020b3dd0771SBjoern A. Zeeb 	if (dst->sa_len == 0)
2021b3dd0771SBjoern A. Zeeb 		return(EINVAL);
2022b680a383SBjoern A. Zeeb 	switch (dst->sa_family) {
2023b680a383SBjoern A. Zeeb 	case AF_INET6:
2024b680a383SBjoern A. Zeeb 	case AF_INET:
2025b680a383SBjoern A. Zeeb 		/* We support multiple FIBs. */
2026b680a383SBjoern A. Zeeb 		break;
2027b680a383SBjoern A. Zeeb 	default:
2028b680a383SBjoern A. Zeeb 		fibnum = RT_DEFAULT_FIB;
2029b680a383SBjoern A. Zeeb 		break;
2030b680a383SBjoern A. Zeeb 	}
20317d9b6df1SAlexander V. Chernikov 	if (fibnum == RT_ALL_FIBS) {
2032ee0bd4b9SHiroki Sato 		if (V_rt_add_addr_allfibs == 0 && cmd == (int)RTM_ADD)
20330489b891SAlan Somers 			startfib = endfib = ifa->ifa_ifp->if_fib;
2034ee0bd4b9SHiroki Sato 		else {
20358b07e49aSJulian Elischer 			startfib = 0;
20368b07e49aSJulian Elischer 			endfib = rt_numfibs - 1;
203766e8505fSJulian Elischer 		}
20388b07e49aSJulian Elischer 	} else {
20398b07e49aSJulian Elischer 		KASSERT((fibnum < rt_numfibs), ("rtinit1: bad fibnum"));
20408b07e49aSJulian Elischer 		startfib = fibnum;
20418b07e49aSJulian Elischer 		endfib = fibnum;
20428b07e49aSJulian Elischer 	}
2043ac4a76ebSBjoern A. Zeeb 
2044b0a76b88SJulian Elischer 	/*
20458b07e49aSJulian Elischer 	 * If it's a delete, check that if it exists,
20468b07e49aSJulian Elischer 	 * it's on the correct interface or we might scrub
20478b07e49aSJulian Elischer 	 * a route to another ifa which would
2048b0a76b88SJulian Elischer 	 * be confusing at best and possibly worse.
2049b0a76b88SJulian Elischer 	 */
2050df8bae1dSRodney W. Grimes 	if (cmd == RTM_DELETE) {
2051b0a76b88SJulian Elischer 		/*
2052b0a76b88SJulian Elischer 		 * It's a delete, so it should already exist..
2053b0a76b88SJulian Elischer 		 * If it's a net, mask off the host bits
2054b0a76b88SJulian Elischer 		 * (Assuming we have a mask)
20558b07e49aSJulian Elischer 		 * XXX this is kinda inet specific..
2056b0a76b88SJulian Elischer 		 */
20578071913dSRuslan Ermilov 		if (netmask != NULL) {
20588b07e49aSJulian Elischer 			rt_maskedcopy(dst, (struct sockaddr *)tempbuf, netmask);
20598b07e49aSJulian Elischer 			dst = (struct sockaddr *)tempbuf;
2060df8bae1dSRodney W. Grimes 		}
20618b07e49aSJulian Elischer 	}
20628b07e49aSJulian Elischer 	/*
20638b07e49aSJulian Elischer 	 * Now go through all the requested tables (fibs) and do the
20648b07e49aSJulian Elischer 	 * requested action. Realistically, this will either be fib 0
20658b07e49aSJulian Elischer 	 * for protocols that don't do multiple tables or all the
2066a8498625SBjoern A. Zeeb 	 * tables for those that do.
20678b07e49aSJulian Elischer 	 */
20688b07e49aSJulian Elischer 	for ( fibnum = startfib; fibnum <= endfib; fibnum++) {
20698b07e49aSJulian Elischer 		if (cmd == RTM_DELETE) {
20708b07e49aSJulian Elischer 			struct radix_node *rn;
2071b0a76b88SJulian Elischer 			/*
20728071913dSRuslan Ermilov 			 * Look up an rtentry that is in the routing tree and
20738071913dSRuslan Ermilov 			 * contains the correct info.
2074b0a76b88SJulian Elischer 			 */
2075c2c2a7c1SBjoern A. Zeeb 			rnh = rt_tables_get_rnh(fibnum, dst->sa_family);
2076c2c2a7c1SBjoern A. Zeeb 			if (rnh == NULL)
20778b07e49aSJulian Elischer 				/* this table doesn't exist but others might */
20788b07e49aSJulian Elischer 				continue;
207961eee0e2SAlexander V. Chernikov 			RIB_RLOCK(rnh);
208061eee0e2SAlexander V. Chernikov 			rn = rnh->rnh_lookup(dst, netmask, &rnh->head);
2081e440aed9SQing Li #ifdef RADIX_MPATH
208261eee0e2SAlexander V. Chernikov 			if (rt_mpath_capable(rnh)) {
2083e440aed9SQing Li 
2084e440aed9SQing Li 				if (rn == NULL)
2085e440aed9SQing Li 					error = ESRCH;
2086e440aed9SQing Li 				else {
2087e440aed9SQing Li 					rt = RNTORT(rn);
2088e440aed9SQing Li 					/*
20898b07e49aSJulian Elischer 					 * for interface route the
20908b07e49aSJulian Elischer 					 * rt->rt_gateway is sockaddr_intf
20918b07e49aSJulian Elischer 					 * for cloning ARP entries, so
20928b07e49aSJulian Elischer 					 * rt_mpath_matchgate must use the
20938b07e49aSJulian Elischer 					 * interface address
2094e440aed9SQing Li 					 */
20958b07e49aSJulian Elischer 					rt = rt_mpath_matchgate(rt,
20968b07e49aSJulian Elischer 					    ifa->ifa_addr);
2097034c09ffSAlexander V. Chernikov 					if (rt == NULL)
2098e440aed9SQing Li 						error = ESRCH;
2099e440aed9SQing Li 				}
2100e440aed9SQing Li 			}
2101e440aed9SQing Li #endif
21028b07e49aSJulian Elischer 			error = (rn == NULL ||
21038071913dSRuslan Ermilov 			    (rn->rn_flags & RNF_ROOT) ||
21045a2f4cbdSAlexander V. Chernikov 			    RNTORT(rn)->rt_ifa != ifa);
210561eee0e2SAlexander V. Chernikov 			RIB_RUNLOCK(rnh);
2106956b0b65SJeffrey Hsu 			if (error) {
21078b07e49aSJulian Elischer 				/* this is only an error if bad on ALL tables */
21088b07e49aSJulian Elischer 				continue;
2109df8bae1dSRodney W. Grimes 			}
2110b0a76b88SJulian Elischer 		}
2111b0a76b88SJulian Elischer 		/*
2112b0a76b88SJulian Elischer 		 * Do the actual request
2113b0a76b88SJulian Elischer 		 */
21148071913dSRuslan Ermilov 		bzero((caddr_t)&info, sizeof(info));
21158071913dSRuslan Ermilov 		info.rti_ifa = ifa;
21163034f43fSAlexander V. Chernikov 		info.rti_flags = flags |
21173034f43fSAlexander V. Chernikov 		    (ifa->ifa_flags & ~IFA_RTSELF) | RTF_PINNED;
21188071913dSRuslan Ermilov 		info.rti_info[RTAX_DST] = dst;
21196e6b3f7cSQing Li 		/*
21206e6b3f7cSQing Li 		 * doing this for compatibility reasons
21216e6b3f7cSQing Li 		 */
21226e6b3f7cSQing Li 		if (cmd == RTM_ADD)
21236e6b3f7cSQing Li 			info.rti_info[RTAX_GATEWAY] =
21246e6b3f7cSQing Li 			    (struct sockaddr *)&null_sdl;
21256e6b3f7cSQing Li 		else
21268071913dSRuslan Ermilov 			info.rti_info[RTAX_GATEWAY] = ifa->ifa_addr;
21278071913dSRuslan Ermilov 		info.rti_info[RTAX_NETMASK] = netmask;
21288b07e49aSJulian Elischer 		error = rtrequest1_fib(cmd, &info, &rt, fibnum);
21293034f43fSAlexander V. Chernikov 
21305aca0b30SLuigi Rizzo 		if (error == 0 && rt != NULL) {
21318071913dSRuslan Ermilov 			/*
21326f99b44cSBrian Somers 			 * notify any listening routing agents of the change
21338071913dSRuslan Ermilov 			 */
2134d1dd20beSSam Leffler 			RT_LOCK(rt);
2135e440aed9SQing Li #ifdef RADIX_MPATH
2136e440aed9SQing Li 			/*
2137e440aed9SQing Li 			 * in case address alias finds the first address
21388d74af36SBjoern A. Zeeb 			 * e.g. ifconfig bge0 192.0.2.246/24
21398d74af36SBjoern A. Zeeb 			 * e.g. ifconfig bge0 192.0.2.247/24
21408d74af36SBjoern A. Zeeb 			 * the address set in the route is 192.0.2.246
21418d74af36SBjoern A. Zeeb 			 * so we need to replace it with 192.0.2.247
2142e440aed9SQing Li 			 */
21438b07e49aSJulian Elischer 			if (memcmp(rt->rt_ifa->ifa_addr,
21448b07e49aSJulian Elischer 			    ifa->ifa_addr, ifa->ifa_addr->sa_len)) {
21451099f828SRobert Watson 				ifa_free(rt->rt_ifa);
21461099f828SRobert Watson 				ifa_ref(ifa);
2147e440aed9SQing Li 				rt->rt_ifp = ifa->ifa_ifp;
2148e440aed9SQing Li 				rt->rt_ifa = ifa;
2149e440aed9SQing Li 			}
2150e440aed9SQing Li #endif
21516e6b3f7cSQing Li 			/*
21526e6b3f7cSQing Li 			 * doing this for compatibility reasons
21536e6b3f7cSQing Li 			 */
21546e6b3f7cSQing Li 			if (cmd == RTM_ADD) {
21556e6b3f7cSQing Li 			    ((struct sockaddr_dl *)rt->rt_gateway)->sdl_type  =
21566e6b3f7cSQing Li 				rt->rt_ifp->if_type;
21576e6b3f7cSQing Li 			    ((struct sockaddr_dl *)rt->rt_gateway)->sdl_index =
21586e6b3f7cSQing Li 				rt->rt_ifp->if_index;
21596e6b3f7cSQing Li 			}
21607f279720SMichael Tuexen 			RT_ADDREF(rt);
21617f279720SMichael Tuexen 			RT_UNLOCK(rt);
2162528737fdSBjoern A. Zeeb 			rt_newaddrmsg_fib(cmd, ifa, error, rt, fibnum);
21637f279720SMichael Tuexen 			RT_LOCK(rt);
21647f279720SMichael Tuexen 			RT_REMREF(rt);
21658071913dSRuslan Ermilov 			if (cmd == RTM_DELETE) {
2166b0a76b88SJulian Elischer 				/*
21678b07e49aSJulian Elischer 				 * If we are deleting, and we found an entry,
21688b07e49aSJulian Elischer 				 * then it's been removed from the tree..
21698b07e49aSJulian Elischer 				 * now throw it away.
2170b0a76b88SJulian Elischer 				 */
2171d1dd20beSSam Leffler 				RTFREE_LOCKED(rt);
2172d1dd20beSSam Leffler 			} else {
2173d1dd20beSSam Leffler 				if (cmd == RTM_ADD) {
2174b0a76b88SJulian Elischer 					/*
21758b07e49aSJulian Elischer 					 * We just wanted to add it..
21768b07e49aSJulian Elischer 					 * we don't actually need a reference.
2177b0a76b88SJulian Elischer 					 */
21787138d65cSSam Leffler 					RT_REMREF(rt);
2179df8bae1dSRodney W. Grimes 				}
2180d1dd20beSSam Leffler 				RT_UNLOCK(rt);
2181d1dd20beSSam Leffler 			}
21828b07e49aSJulian Elischer 			didwork = 1;
2183df8bae1dSRodney W. Grimes 		}
21848b07e49aSJulian Elischer 		if (error)
21858b07e49aSJulian Elischer 			a_failure = error;
21868b07e49aSJulian Elischer 	}
21878b07e49aSJulian Elischer 	if (cmd == RTM_DELETE) {
21888b07e49aSJulian Elischer 		if (didwork) {
21898b07e49aSJulian Elischer 			error = 0;
21908b07e49aSJulian Elischer 		} else {
21918b07e49aSJulian Elischer 			/* we only give an error if it wasn't in any table */
21928b07e49aSJulian Elischer 			error = ((flags & RTF_HOST) ?
21938b07e49aSJulian Elischer 			    EHOSTUNREACH : ENETUNREACH);
21948b07e49aSJulian Elischer 		}
21958b07e49aSJulian Elischer 	} else {
21968b07e49aSJulian Elischer 		if (a_failure) {
21978b07e49aSJulian Elischer 			/* return an error if any of them failed */
21988b07e49aSJulian Elischer 			error = a_failure;
21998b07e49aSJulian Elischer 		}
22008b07e49aSJulian Elischer 	}
22013ec66d6cSDavid Greenman 	return (error);
22023ec66d6cSDavid Greenman }
2203cb64988fSLuoqi Chen 
22048b07e49aSJulian Elischer /*
22058b07e49aSJulian Elischer  * Set up a routing table entry, normally
22068b07e49aSJulian Elischer  * for an interface.
22078b07e49aSJulian Elischer  */
22088b07e49aSJulian Elischer int
22098b07e49aSJulian Elischer rtinit(struct ifaddr *ifa, int cmd, int flags)
22108b07e49aSJulian Elischer {
22118b07e49aSJulian Elischer 	struct sockaddr *dst;
2212a8498625SBjoern A. Zeeb 	int fib = RT_DEFAULT_FIB;
22138b07e49aSJulian Elischer 
22148b07e49aSJulian Elischer 	if (flags & RTF_HOST) {
22158b07e49aSJulian Elischer 		dst = ifa->ifa_dstaddr;
22168b07e49aSJulian Elischer 	} else {
22178b07e49aSJulian Elischer 		dst = ifa->ifa_addr;
22188b07e49aSJulian Elischer 	}
22198b07e49aSJulian Elischer 
2220b680a383SBjoern A. Zeeb 	switch (dst->sa_family) {
2221b680a383SBjoern A. Zeeb 	case AF_INET6:
2222b680a383SBjoern A. Zeeb 	case AF_INET:
2223b680a383SBjoern A. Zeeb 		/* We do support multiple FIBs. */
22247d9b6df1SAlexander V. Chernikov 		fib = RT_ALL_FIBS;
2225b680a383SBjoern A. Zeeb 		break;
2226b680a383SBjoern A. Zeeb 	}
22278b07e49aSJulian Elischer 	return (rtinit1(ifa, cmd, flags, fib));
22288b07e49aSJulian Elischer }
22294cbac30bSAlexander V. Chernikov 
22304cbac30bSAlexander V. Chernikov /*
22314cbac30bSAlexander V. Chernikov  * Announce interface address arrival/withdraw
22324cbac30bSAlexander V. Chernikov  * Returns 0 on success.
22334cbac30bSAlexander V. Chernikov  */
22344cbac30bSAlexander V. Chernikov int
22354cbac30bSAlexander V. Chernikov rt_addrmsg(int cmd, struct ifaddr *ifa, int fibnum)
22364cbac30bSAlexander V. Chernikov {
22374cbac30bSAlexander V. Chernikov 
22384cbac30bSAlexander V. Chernikov 	KASSERT(cmd == RTM_ADD || cmd == RTM_DELETE,
2239d375edc9SAlexander V. Chernikov 	    ("unexpected cmd %d", cmd));
22404cbac30bSAlexander V. Chernikov 
2241d375edc9SAlexander V. Chernikov 	KASSERT(fibnum == RT_ALL_FIBS || (fibnum >= 0 && fibnum < rt_numfibs),
2242d375edc9SAlexander V. Chernikov 	    ("%s: fib out of range 0 <=%d<%d", __func__, fibnum, rt_numfibs));
22434cbac30bSAlexander V. Chernikov 
22447f946da0SMichael Tuexen #if defined(INET) || defined(INET6)
22457f946da0SMichael Tuexen #ifdef SCTP
22467f946da0SMichael Tuexen 	/*
22477f946da0SMichael Tuexen 	 * notify the SCTP stack
22487f946da0SMichael Tuexen 	 * this will only get called when an address is added/deleted
22497f946da0SMichael Tuexen 	 * XXX pass the ifaddr struct instead if ifa->ifa_addr...
22507f946da0SMichael Tuexen 	 */
22517f946da0SMichael Tuexen 	sctp_addr_change(ifa, cmd);
22527f946da0SMichael Tuexen #endif /* SCTP */
22537f946da0SMichael Tuexen #endif
22544cbac30bSAlexander V. Chernikov 	return (rtsock_addrmsg(cmd, ifa, fibnum));
22554cbac30bSAlexander V. Chernikov }
22564cbac30bSAlexander V. Chernikov 
22574cbac30bSAlexander V. Chernikov /*
2258d375edc9SAlexander V. Chernikov  * Announce route addition/removal.
22594cbac30bSAlexander V. Chernikov  * Users of this function MUST validate input data BEFORE calling.
22604cbac30bSAlexander V. Chernikov  * However we have to be able to handle invalid data:
22614cbac30bSAlexander V. Chernikov  * if some userland app sends us "invalid" route message (invalid mask,
2262d375edc9SAlexander V. Chernikov  * no dst, wrong address families, etc...) we need to pass it back
22634cbac30bSAlexander V. Chernikov  * to app (and any other rtsock consumers) with rtm_errno field set to
22644cbac30bSAlexander V. Chernikov  * non-zero value.
22654cbac30bSAlexander V. Chernikov  * Returns 0 on success.
22664cbac30bSAlexander V. Chernikov  */
22674cbac30bSAlexander V. Chernikov int
22684cbac30bSAlexander V. Chernikov rt_routemsg(int cmd, struct ifnet *ifp, int error, struct rtentry *rt,
22694cbac30bSAlexander V. Chernikov     int fibnum)
22704cbac30bSAlexander V. Chernikov {
22714cbac30bSAlexander V. Chernikov 
22724cbac30bSAlexander V. Chernikov 	KASSERT(cmd == RTM_ADD || cmd == RTM_DELETE,
2273d375edc9SAlexander V. Chernikov 	    ("unexpected cmd %d", cmd));
22744cbac30bSAlexander V. Chernikov 
2275d375edc9SAlexander V. Chernikov 	KASSERT(fibnum == RT_ALL_FIBS || (fibnum >= 0 && fibnum < rt_numfibs),
2276d375edc9SAlexander V. Chernikov 	    ("%s: fib out of range 0 <=%d<%d", __func__, fibnum, rt_numfibs));
22774cbac30bSAlexander V. Chernikov 
22784cbac30bSAlexander V. Chernikov 	KASSERT(rt_key(rt) != NULL, (":%s: rt_key must be supplied", __func__));
22794cbac30bSAlexander V. Chernikov 
22804cbac30bSAlexander V. Chernikov 	return (rtsock_routemsg(cmd, ifp, error, rt, fibnum));
22814cbac30bSAlexander V. Chernikov }
22824cbac30bSAlexander V. Chernikov 
22834cbac30bSAlexander V. Chernikov void
22844cbac30bSAlexander V. Chernikov rt_newaddrmsg(int cmd, struct ifaddr *ifa, int error, struct rtentry *rt)
22854cbac30bSAlexander V. Chernikov {
22864cbac30bSAlexander V. Chernikov 
22874cbac30bSAlexander V. Chernikov 	rt_newaddrmsg_fib(cmd, ifa, error, rt, RT_ALL_FIBS);
22884cbac30bSAlexander V. Chernikov }
22894cbac30bSAlexander V. Chernikov 
22904cbac30bSAlexander V. Chernikov /*
22914cbac30bSAlexander V. Chernikov  * This is called to generate messages from the routing socket
22924cbac30bSAlexander V. Chernikov  * indicating a network interface has had addresses associated with it.
22934cbac30bSAlexander V. Chernikov  */
22944cbac30bSAlexander V. Chernikov void
22954cbac30bSAlexander V. Chernikov rt_newaddrmsg_fib(int cmd, struct ifaddr *ifa, int error, struct rtentry *rt,
22964cbac30bSAlexander V. Chernikov     int fibnum)
22974cbac30bSAlexander V. Chernikov {
22984cbac30bSAlexander V. Chernikov 
22994cbac30bSAlexander V. Chernikov 	KASSERT(cmd == RTM_ADD || cmd == RTM_DELETE,
23004cbac30bSAlexander V. Chernikov 		("unexpected cmd %u", cmd));
2301d375edc9SAlexander V. Chernikov 	KASSERT(fibnum == RT_ALL_FIBS || (fibnum >= 0 && fibnum < rt_numfibs),
2302d375edc9SAlexander V. Chernikov 	    ("%s: fib out of range 0 <=%d<%d", __func__, fibnum, rt_numfibs));
23034cbac30bSAlexander V. Chernikov 
23044cbac30bSAlexander V. Chernikov 	if (cmd == RTM_ADD) {
23054cbac30bSAlexander V. Chernikov 		rt_addrmsg(cmd, ifa, fibnum);
23064cbac30bSAlexander V. Chernikov 		if (rt != NULL)
23074cbac30bSAlexander V. Chernikov 			rt_routemsg(cmd, ifa->ifa_ifp, error, rt, fibnum);
23084cbac30bSAlexander V. Chernikov 	} else {
23094cbac30bSAlexander V. Chernikov 		if (rt != NULL)
23104cbac30bSAlexander V. Chernikov 			rt_routemsg(cmd, ifa->ifa_ifp, error, rt, fibnum);
23114cbac30bSAlexander V. Chernikov 		rt_addrmsg(cmd, ifa, fibnum);
23124cbac30bSAlexander V. Chernikov 	}
23134cbac30bSAlexander V. Chernikov }
23144cbac30bSAlexander V. Chernikov 
2315