xref: /freebsd/sys/net/rtsock.c (revision 7f5f3fcc32bfa553faa007579dfcaed84be3b047)
1c398230bSWarner Losh /*-
251369649SPedro F. Giffuni  * SPDX-License-Identifier: BSD-3-Clause
351369649SPedro F. Giffuni  *
4df8bae1dSRodney W. Grimes  * Copyright (c) 1988, 1991, 1993
5df8bae1dSRodney W. Grimes  *	The Regents of the University of California.  All rights reserved.
6df8bae1dSRodney W. Grimes  *
7df8bae1dSRodney W. Grimes  * Redistribution and use in source and binary forms, with or without
8df8bae1dSRodney W. Grimes  * modification, are permitted provided that the following conditions
9df8bae1dSRodney W. Grimes  * are met:
10df8bae1dSRodney W. Grimes  * 1. Redistributions of source code must retain the above copyright
11df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer.
12df8bae1dSRodney W. Grimes  * 2. Redistributions in binary form must reproduce the above copyright
13df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer in the
14df8bae1dSRodney W. Grimes  *    documentation and/or other materials provided with the distribution.
15fbbd9655SWarner Losh  * 3. Neither the name of the University nor the names of its contributors
16df8bae1dSRodney W. Grimes  *    may be used to endorse or promote products derived from this software
17df8bae1dSRodney W. Grimes  *    without specific prior written permission.
18df8bae1dSRodney W. Grimes  *
19df8bae1dSRodney W. Grimes  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20df8bae1dSRodney W. Grimes  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21df8bae1dSRodney W. Grimes  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22df8bae1dSRodney W. Grimes  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23df8bae1dSRodney W. Grimes  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24df8bae1dSRodney W. Grimes  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25df8bae1dSRodney W. Grimes  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26df8bae1dSRodney W. Grimes  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27df8bae1dSRodney W. Grimes  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28df8bae1dSRodney W. Grimes  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29df8bae1dSRodney W. Grimes  * SUCH DAMAGE.
30df8bae1dSRodney W. Grimes  *
3128070a0eSRuslan Ermilov  *	@(#)rtsock.c	8.7 (Berkeley) 10/12/95
32c3aac50fSPeter Wemm  * $FreeBSD$
33df8bae1dSRodney W. Grimes  */
348b6acd2bSConrad Meyer #include "opt_ddb.h"
35fedeb08bSAlexander V. Chernikov #include "opt_route.h"
36413628a7SBjoern A. Zeeb #include "opt_inet.h"
37413628a7SBjoern A. Zeeb #include "opt_inet6.h"
38e440aed9SQing Li 
39df8bae1dSRodney W. Grimes #include <sys/param.h>
40960ed29cSSeigo Tanimura #include <sys/jail.h>
41413628a7SBjoern A. Zeeb #include <sys/kernel.h>
42d0728d71SRobert Watson #include <sys/domain.h>
43609ff41fSWarner Losh #include <sys/lock.h>
444d1d4912SBruce Evans #include <sys/malloc.h>
45df8bae1dSRodney W. Grimes #include <sys/mbuf.h>
46acd3428bSRobert Watson #include <sys/priv.h>
47960ed29cSSeigo Tanimura #include <sys/proc.h>
48960ed29cSSeigo Tanimura #include <sys/protosw.h>
4920efcfc6SAndrey V. Elsukov #include <sys/rmlock.h>
503120b9d4SKip Macy #include <sys/rwlock.h>
51960ed29cSSeigo Tanimura #include <sys/signalvar.h>
52df8bae1dSRodney W. Grimes #include <sys/socket.h>
53df8bae1dSRodney W. Grimes #include <sys/socketvar.h>
54960ed29cSSeigo Tanimura #include <sys/sysctl.h>
55960ed29cSSeigo Tanimura #include <sys/systm.h>
56df8bae1dSRodney W. Grimes 
57df8bae1dSRodney W. Grimes #include <net/if.h>
5876039bc8SGleb Smirnoff #include <net/if_var.h>
598eca593cSQing Li #include <net/if_dl.h>
606e6b3f7cSQing Li #include <net/if_llatbl.h>
610ed6142bSQing Li #include <net/if_types.h>
62d989c7b3SRobert Watson #include <net/netisr.h>
63df8bae1dSRodney W. Grimes #include <net/raw_cb.h>
64960ed29cSSeigo Tanimura #include <net/route.h>
65a287a973SAlexander V. Chernikov #include <net/route/route_ctl.h>
66e7d8af4fSAlexander V. Chernikov #include <net/route/route_var.h>
674b79449eSBjoern A. Zeeb #include <net/vnet.h>
68df8bae1dSRodney W. Grimes 
695a59cefcSBosko Milekic #include <netinet/in.h>
70c7ab6602SQing Li #include <netinet/if_ether.h>
7108b68b0eSGleb Smirnoff #include <netinet/ip_carp.h>
72413628a7SBjoern A. Zeeb #ifdef INET6
732fe5a794SAlexander V. Chernikov #include <netinet6/in6_var.h>
740bebb544SHiroki Sato #include <netinet6/ip6_var.h>
75413628a7SBjoern A. Zeeb #include <netinet6/scope6_var.h>
76413628a7SBjoern A. Zeeb #endif
77a6663252SAlexander V. Chernikov #include <net/route/nhop.h>
785a59cefcSBosko Milekic 
79427a928aSKonstantin Belousov #ifdef COMPAT_FREEBSD32
80427a928aSKonstantin Belousov #include <sys/mount.h>
81427a928aSKonstantin Belousov #include <compat/freebsd32/freebsd32.h>
82427a928aSKonstantin Belousov 
83427a928aSKonstantin Belousov struct if_msghdr32 {
84427a928aSKonstantin Belousov 	uint16_t ifm_msglen;
85427a928aSKonstantin Belousov 	uint8_t	ifm_version;
86427a928aSKonstantin Belousov 	uint8_t	ifm_type;
87427a928aSKonstantin Belousov 	int32_t	ifm_addrs;
88427a928aSKonstantin Belousov 	int32_t	ifm_flags;
89427a928aSKonstantin Belousov 	uint16_t ifm_index;
90d25f8522SMark Johnston 	uint16_t _ifm_spare1;
91b245f96cSGleb Smirnoff 	struct	if_data ifm_data;
92427a928aSKonstantin Belousov };
936d076ae8SBjoern A. Zeeb 
946d076ae8SBjoern A. Zeeb struct if_msghdrl32 {
956d076ae8SBjoern A. Zeeb 	uint16_t ifm_msglen;
966d076ae8SBjoern A. Zeeb 	uint8_t	ifm_version;
976d076ae8SBjoern A. Zeeb 	uint8_t	ifm_type;
986d076ae8SBjoern A. Zeeb 	int32_t	ifm_addrs;
996d076ae8SBjoern A. Zeeb 	int32_t	ifm_flags;
1006d076ae8SBjoern A. Zeeb 	uint16_t ifm_index;
1016d076ae8SBjoern A. Zeeb 	uint16_t _ifm_spare1;
1026d076ae8SBjoern A. Zeeb 	uint16_t ifm_len;
1036d076ae8SBjoern A. Zeeb 	uint16_t ifm_data_off;
104d25f8522SMark Johnston 	uint32_t _ifm_spare2;
105b245f96cSGleb Smirnoff 	struct	if_data ifm_data;
1066d076ae8SBjoern A. Zeeb };
1076d076ae8SBjoern A. Zeeb 
1086d076ae8SBjoern A. Zeeb struct ifa_msghdrl32 {
1096d076ae8SBjoern A. Zeeb 	uint16_t ifam_msglen;
1106d076ae8SBjoern A. Zeeb 	uint8_t	ifam_version;
1116d076ae8SBjoern A. Zeeb 	uint8_t	ifam_type;
1126d076ae8SBjoern A. Zeeb 	int32_t	ifam_addrs;
1136d076ae8SBjoern A. Zeeb 	int32_t	ifam_flags;
1146d076ae8SBjoern A. Zeeb 	uint16_t ifam_index;
1156d076ae8SBjoern A. Zeeb 	uint16_t _ifam_spare1;
1166d076ae8SBjoern A. Zeeb 	uint16_t ifam_len;
1176d076ae8SBjoern A. Zeeb 	uint16_t ifam_data_off;
1186d076ae8SBjoern A. Zeeb 	int32_t	ifam_metric;
119b245f96cSGleb Smirnoff 	struct	if_data ifam_data;
1206d076ae8SBjoern A. Zeeb };
121279e33d4SKonstantin Belousov 
122279e33d4SKonstantin Belousov #define SA_SIZE32(sa)						\
123279e33d4SKonstantin Belousov     (  (((struct sockaddr *)(sa))->sa_len == 0) ?		\
124279e33d4SKonstantin Belousov 	sizeof(int)		:				\
125279e33d4SKonstantin Belousov 	1 + ( (((struct sockaddr *)(sa))->sa_len - 1) | (sizeof(int) - 1) ) )
126279e33d4SKonstantin Belousov 
1276d076ae8SBjoern A. Zeeb #endif /* COMPAT_FREEBSD32 */
128427a928aSKonstantin Belousov 
129a1c995b6SPoul-Henning Kamp MALLOC_DEFINE(M_RTABLE, "routetbl", "routing tables");
130a1c995b6SPoul-Henning Kamp 
131becc44d7SSam Leffler /* NB: these are not modified */
13252041295SPoul-Henning Kamp static struct	sockaddr route_src = { 2, PF_ROUTE, };
133076d0761SJulian Elischer static struct	sockaddr sa_zero   = { sizeof(sa_zero), AF_INET, };
134becc44d7SSam Leffler 
13508b68b0eSGleb Smirnoff /* These are external hooks for CARP. */
13608b68b0eSGleb Smirnoff int	(*carp_get_vhid_p)(struct ifaddr *);
13708b68b0eSGleb Smirnoff 
138528737fdSBjoern A. Zeeb /*
139528737fdSBjoern A. Zeeb  * Used by rtsock/raw_input callback code to decide whether to filter the update
140528737fdSBjoern A. Zeeb  * notification to a socket bound to a particular FIB.
141528737fdSBjoern A. Zeeb  */
142528737fdSBjoern A. Zeeb #define	RTS_FILTER_FIB	M_PROTO8
143528737fdSBjoern A. Zeeb 
144c5d4eab6SMarko Zec typedef struct {
14518aee723SPeter Pentchev 	int	ip_count;	/* attached w/ AF_INET */
146becc44d7SSam Leffler 	int	ip6_count;	/* attached w/ AF_INET6 */
147becc44d7SSam Leffler 	int	any_count;	/* total attached */
148c5d4eab6SMarko Zec } route_cb_t;
1495f901c92SAndrew Turner VNET_DEFINE_STATIC(route_cb_t, route_cb);
150c5d4eab6SMarko Zec #define	V_route_cb VNET(route_cb)
151df8bae1dSRodney W. Grimes 
152aea8b30fSSam Leffler struct mtx rtsock_mtx;
153aea8b30fSSam Leffler MTX_SYSINIT(rtsock, &rtsock_mtx, "rtsock route_cb lock", MTX_DEF);
154aea8b30fSSam Leffler 
155aea8b30fSSam Leffler #define	RTSOCK_LOCK()	mtx_lock(&rtsock_mtx)
156aea8b30fSSam Leffler #define	RTSOCK_UNLOCK()	mtx_unlock(&rtsock_mtx)
157aea8b30fSSam Leffler #define	RTSOCK_LOCK_ASSERT()	mtx_assert(&rtsock_mtx, MA_OWNED)
158aea8b30fSSam Leffler 
159fedeb08bSAlexander V. Chernikov SYSCTL_NODE(_net, OID_AUTO, route, CTLFLAG_RD | CTLFLAG_MPSAFE, 0, "");
160190a4c94SRobert Watson 
161df8bae1dSRodney W. Grimes struct walkarg {
162d68fb8d9SAlexander V. Chernikov 	int	family;
16352041295SPoul-Henning Kamp 	int	w_tmemsize;
16452041295SPoul-Henning Kamp 	int	w_op, w_arg;
16552041295SPoul-Henning Kamp 	caddr_t	w_tmem;
16652041295SPoul-Henning Kamp 	struct sysctl_req *w_req;
167d68fb8d9SAlexander V. Chernikov 	struct sockaddr *dst;
168d68fb8d9SAlexander V. Chernikov 	struct sockaddr *mask;
169df8bae1dSRodney W. Grimes };
170df8bae1dSRodney W. Grimes 
171d989c7b3SRobert Watson static void	rts_input(struct mbuf *m);
1726db47af4SAlexander V. Chernikov static struct mbuf *rtsock_msg_mbuf(int type, struct rt_addrinfo *rtinfo);
173f2e5eb36SAlexander V. Chernikov static int	rtsock_msg_buffer(int type, struct rt_addrinfo *rtinfo,
174f2e5eb36SAlexander V. Chernikov 			struct walkarg *w, int *plen);
1755dfc91d7SLuigi Rizzo static int	rt_xaddrs(caddr_t cp, caddr_t cplim,
1765dfc91d7SLuigi Rizzo 			struct rt_addrinfo *rtinfo);
1772fe5a794SAlexander V. Chernikov static int	cleanup_xaddrs(struct rt_addrinfo *info);
178d68fb8d9SAlexander V. Chernikov static int	sysctl_dumpentry(struct rtentry *rt, void *vw);
1792259a030SAlexander V. Chernikov static int	sysctl_dumpnhop(struct rtentry *rt, struct nhop_object *nh,
1802259a030SAlexander V. Chernikov 			uint32_t weight, struct walkarg *w);
181929ddbbbSAlfred Perlstein static int	sysctl_iflist(int af, struct walkarg *w);
18205b2efe0SBruce M Simpson static int	sysctl_ifmalist(int af, struct walkarg *w);
18373d76e77SKevin Lo static int	route_output(struct mbuf *m, struct socket *so, ...);
18493bfd365SAlexander V. Chernikov static void	rt_getmetrics(const struct rtentry *rt,
18593bfd365SAlexander V. Chernikov 			const struct nhop_object *nh, struct rt_metrics *out);
1863ca1a2d6SMax Laier static void	rt_dispatch(struct mbuf *, sa_family_t);
187c83dda36SAlexander V. Chernikov static int	handle_rtm_get(struct rt_addrinfo *info, u_int fibnum,
188a287a973SAlexander V. Chernikov 			struct rt_msghdr *rtm, struct rib_cmd_info *rc);
189592d300eSAlexander V. Chernikov static int	update_rtm_from_rc(struct rt_addrinfo *info,
190c83dda36SAlexander V. Chernikov 			struct rt_msghdr **prtm, int alloc_len,
191592d300eSAlexander V. Chernikov 			struct rib_cmd_info *rc, struct nhop_object *nh);
192c83dda36SAlexander V. Chernikov static void	send_rtm_reply(struct socket *so, struct rt_msghdr *rtm,
193c83dda36SAlexander V. Chernikov 			struct mbuf *m, sa_family_t saf, u_int fibnum,
194c83dda36SAlexander V. Chernikov 			int rtm_errno);
195d68fb8d9SAlexander V. Chernikov static bool	can_export_rte(struct ucred *td_ucred, bool rt_is_host,
196d68fb8d9SAlexander V. Chernikov 			const struct sockaddr *rt_dst);
197df8bae1dSRodney W. Grimes 
198d4b5cae4SRobert Watson static struct netisr_handler rtsock_nh = {
199d4b5cae4SRobert Watson 	.nh_name = "rtsock",
200d4b5cae4SRobert Watson 	.nh_handler = rts_input,
201d4b5cae4SRobert Watson 	.nh_proto = NETISR_ROUTE,
202d4b5cae4SRobert Watson 	.nh_policy = NETISR_POLICY_SOURCE,
203d4b5cae4SRobert Watson };
204d4b5cae4SRobert Watson 
205d4b5cae4SRobert Watson static int
206d4b5cae4SRobert Watson sysctl_route_netisr_maxqlen(SYSCTL_HANDLER_ARGS)
207d4b5cae4SRobert Watson {
208d4b5cae4SRobert Watson 	int error, qlimit;
209d4b5cae4SRobert Watson 
210d4b5cae4SRobert Watson 	netisr_getqlimit(&rtsock_nh, &qlimit);
211d4b5cae4SRobert Watson 	error = sysctl_handle_int(oidp, &qlimit, 0, req);
212d4b5cae4SRobert Watson         if (error || !req->newptr)
213d4b5cae4SRobert Watson                 return (error);
214d4b5cae4SRobert Watson 	if (qlimit < 1)
215d4b5cae4SRobert Watson 		return (EINVAL);
216d4b5cae4SRobert Watson 	return (netisr_setqlimit(&rtsock_nh, qlimit));
217d4b5cae4SRobert Watson }
2187029da5cSPawel Biernacki SYSCTL_PROC(_net_route, OID_AUTO, netisr_maxqlen,
2197029da5cSPawel Biernacki     CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_MPSAFE,
220d4b5cae4SRobert Watson     0, 0, sysctl_route_netisr_maxqlen, "I",
221d4b5cae4SRobert Watson     "maximum routing socket dispatch queue length");
222d4b5cae4SRobert Watson 
223d989c7b3SRobert Watson static void
224484149deSBjoern A. Zeeb vnet_rts_init(void)
225d989c7b3SRobert Watson {
226b062951aSRobert Watson 	int tmp;
227d989c7b3SRobert Watson 
228484149deSBjoern A. Zeeb 	if (IS_DEFAULT_VNET(curvnet)) {
229b062951aSRobert Watson 		if (TUNABLE_INT_FETCH("net.route.netisr_maxqlen", &tmp))
230d4b5cae4SRobert Watson 			rtsock_nh.nh_qlimit = tmp;
231d4b5cae4SRobert Watson 		netisr_register(&rtsock_nh);
232d989c7b3SRobert Watson 	}
233484149deSBjoern A. Zeeb #ifdef VIMAGE
234484149deSBjoern A. Zeeb 	 else
235484149deSBjoern A. Zeeb 		netisr_register_vnet(&rtsock_nh);
236484149deSBjoern A. Zeeb #endif
237484149deSBjoern A. Zeeb }
238484149deSBjoern A. Zeeb VNET_SYSINIT(vnet_rtsock, SI_SUB_PROTO_DOMAIN, SI_ORDER_THIRD,
239484149deSBjoern A. Zeeb     vnet_rts_init, 0);
240484149deSBjoern A. Zeeb 
241484149deSBjoern A. Zeeb #ifdef VIMAGE
242484149deSBjoern A. Zeeb static void
243484149deSBjoern A. Zeeb vnet_rts_uninit(void)
244484149deSBjoern A. Zeeb {
245484149deSBjoern A. Zeeb 
246484149deSBjoern A. Zeeb 	netisr_unregister_vnet(&rtsock_nh);
247484149deSBjoern A. Zeeb }
248484149deSBjoern A. Zeeb VNET_SYSUNINIT(vnet_rts_uninit, SI_SUB_PROTO_DOMAIN, SI_ORDER_THIRD,
249484149deSBjoern A. Zeeb     vnet_rts_uninit, 0);
250484149deSBjoern A. Zeeb #endif
251d989c7b3SRobert Watson 
252528737fdSBjoern A. Zeeb static int
253528737fdSBjoern A. Zeeb raw_input_rts_cb(struct mbuf *m, struct sockproto *proto, struct sockaddr *src,
254528737fdSBjoern A. Zeeb     struct rawcb *rp)
255528737fdSBjoern A. Zeeb {
256528737fdSBjoern A. Zeeb 	int fibnum;
257528737fdSBjoern A. Zeeb 
258528737fdSBjoern A. Zeeb 	KASSERT(m != NULL, ("%s: m is NULL", __func__));
259528737fdSBjoern A. Zeeb 	KASSERT(proto != NULL, ("%s: proto is NULL", __func__));
260528737fdSBjoern A. Zeeb 	KASSERT(rp != NULL, ("%s: rp is NULL", __func__));
261528737fdSBjoern A. Zeeb 
262528737fdSBjoern A. Zeeb 	/* No filtering requested. */
263528737fdSBjoern A. Zeeb 	if ((m->m_flags & RTS_FILTER_FIB) == 0)
264528737fdSBjoern A. Zeeb 		return (0);
265528737fdSBjoern A. Zeeb 
266528737fdSBjoern A. Zeeb 	/* Check if it is a rts and the fib matches the one of the socket. */
267528737fdSBjoern A. Zeeb 	fibnum = M_GETFIB(m);
268528737fdSBjoern A. Zeeb 	if (proto->sp_family != PF_ROUTE ||
269528737fdSBjoern A. Zeeb 	    rp->rcb_socket == NULL ||
270528737fdSBjoern A. Zeeb 	    rp->rcb_socket->so_fibnum == fibnum)
271528737fdSBjoern A. Zeeb 		return (0);
272528737fdSBjoern A. Zeeb 
273528737fdSBjoern A. Zeeb 	/* Filtering requested and no match, the socket shall be skipped. */
274528737fdSBjoern A. Zeeb 	return (1);
275528737fdSBjoern A. Zeeb }
276528737fdSBjoern A. Zeeb 
277d989c7b3SRobert Watson static void
278d989c7b3SRobert Watson rts_input(struct mbuf *m)
279d989c7b3SRobert Watson {
280d989c7b3SRobert Watson 	struct sockproto route_proto;
281d989c7b3SRobert Watson 	unsigned short *family;
282d989c7b3SRobert Watson 	struct m_tag *tag;
283d989c7b3SRobert Watson 
284d989c7b3SRobert Watson 	route_proto.sp_family = PF_ROUTE;
285d989c7b3SRobert Watson 	tag = m_tag_find(m, PACKET_TAG_RTSOCKFAM, NULL);
286d989c7b3SRobert Watson 	if (tag != NULL) {
287d989c7b3SRobert Watson 		family = (unsigned short *)(tag + 1);
288d989c7b3SRobert Watson 		route_proto.sp_protocol = *family;
289d989c7b3SRobert Watson 		m_tag_delete(m, tag);
290d989c7b3SRobert Watson 	} else
291d989c7b3SRobert Watson 		route_proto.sp_protocol = 0;
292d989c7b3SRobert Watson 
293528737fdSBjoern A. Zeeb 	raw_input_ext(m, &route_proto, &route_src, raw_input_rts_cb);
294d989c7b3SRobert Watson }
295d989c7b3SRobert Watson 
296a29f300eSGarrett Wollman /*
297a29f300eSGarrett Wollman  * It really doesn't make any sense at all for this code to share much
298a29f300eSGarrett Wollman  * with raw_usrreq.c, since its functionality is so restricted.  XXX
299a29f300eSGarrett Wollman  */
300ac45e92fSRobert Watson static void
301a29f300eSGarrett Wollman rts_abort(struct socket *so)
302df8bae1dSRodney W. Grimes {
3037e994955SRobert Watson 
304ac45e92fSRobert Watson 	raw_usrreqs.pru_abort(so);
305df8bae1dSRodney W. Grimes }
306a29f300eSGarrett Wollman 
307a152f8a3SRobert Watson static void
308a152f8a3SRobert Watson rts_close(struct socket *so)
309a152f8a3SRobert Watson {
310a152f8a3SRobert Watson 
311a152f8a3SRobert Watson 	raw_usrreqs.pru_close(so);
312a152f8a3SRobert Watson }
313a152f8a3SRobert Watson 
314a29f300eSGarrett Wollman /* pru_accept is EOPNOTSUPP */
315a29f300eSGarrett Wollman 
316a29f300eSGarrett Wollman static int
317b40ce416SJulian Elischer rts_attach(struct socket *so, int proto, struct thread *td)
318a29f300eSGarrett Wollman {
319a29f300eSGarrett Wollman 	struct rawcb *rp;
320c9b652e3SAndre Oppermann 	int error;
321a29f300eSGarrett Wollman 
322bc725eafSRobert Watson 	KASSERT(so->so_pcb == NULL, ("rts_attach: so_pcb != NULL"));
323bc725eafSRobert Watson 
3247cc0979fSDavid Malone 	/* XXX */
3251ede983cSDag-Erling Smørgrav 	rp = malloc(sizeof *rp, M_PCB, M_WAITOK | M_ZERO);
326a29f300eSGarrett Wollman 
327a29f300eSGarrett Wollman 	so->so_pcb = (caddr_t)rp;
3288b07e49aSJulian Elischer 	so->so_fibnum = td->td_proc->p_fibnum;
329162c0b2eSRuslan Ermilov 	error = raw_attach(so, proto);
330a29f300eSGarrett Wollman 	rp = sotorawcb(so);
331a29f300eSGarrett Wollman 	if (error) {
3327ba271aeSJonathan Chen 		so->so_pcb = NULL;
333a29f300eSGarrett Wollman 		free(rp, M_PCB);
334a29f300eSGarrett Wollman 		return error;
335a29f300eSGarrett Wollman 	}
336aea8b30fSSam Leffler 	RTSOCK_LOCK();
337a29f300eSGarrett Wollman 	switch(rp->rcb_proto.sp_protocol) {
338a29f300eSGarrett Wollman 	case AF_INET:
339c5d4eab6SMarko Zec 		V_route_cb.ip_count++;
340a29f300eSGarrett Wollman 		break;
341899ce4f4SYoshinobu Inoue 	case AF_INET6:
342c5d4eab6SMarko Zec 		V_route_cb.ip6_count++;
343899ce4f4SYoshinobu Inoue 		break;
344a29f300eSGarrett Wollman 	}
345c5d4eab6SMarko Zec 	V_route_cb.any_count++;
346aea8b30fSSam Leffler 	RTSOCK_UNLOCK();
34703e49181SSeigo Tanimura 	soisconnected(so);
348df8bae1dSRodney W. Grimes 	so->so_options |= SO_USELOOPBACK;
349a29f300eSGarrett Wollman 	return 0;
350df8bae1dSRodney W. Grimes }
351df8bae1dSRodney W. Grimes 
352a29f300eSGarrett Wollman static int
353b40ce416SJulian Elischer rts_bind(struct socket *so, struct sockaddr *nam, struct thread *td)
354a29f300eSGarrett Wollman {
3557e994955SRobert Watson 
3567e994955SRobert Watson 	return (raw_usrreqs.pru_bind(so, nam, td)); /* xxx just EINVAL */
357a29f300eSGarrett Wollman }
358a29f300eSGarrett Wollman 
359a29f300eSGarrett Wollman static int
360b40ce416SJulian Elischer rts_connect(struct socket *so, struct sockaddr *nam, struct thread *td)
361a29f300eSGarrett Wollman {
3627e994955SRobert Watson 
3637e994955SRobert Watson 	return (raw_usrreqs.pru_connect(so, nam, td)); /* XXX just EINVAL */
364a29f300eSGarrett Wollman }
365a29f300eSGarrett Wollman 
366a29f300eSGarrett Wollman /* pru_connect2 is EOPNOTSUPP */
367a29f300eSGarrett Wollman /* pru_control is EOPNOTSUPP */
368a29f300eSGarrett Wollman 
369bc725eafSRobert Watson static void
370a29f300eSGarrett Wollman rts_detach(struct socket *so)
371a29f300eSGarrett Wollman {
372a29f300eSGarrett Wollman 	struct rawcb *rp = sotorawcb(so);
373a29f300eSGarrett Wollman 
374bc725eafSRobert Watson 	KASSERT(rp != NULL, ("rts_detach: rp == NULL"));
375bc725eafSRobert Watson 
376aea8b30fSSam Leffler 	RTSOCK_LOCK();
377a29f300eSGarrett Wollman 	switch(rp->rcb_proto.sp_protocol) {
378a29f300eSGarrett Wollman 	case AF_INET:
379c5d4eab6SMarko Zec 		V_route_cb.ip_count--;
380a29f300eSGarrett Wollman 		break;
381899ce4f4SYoshinobu Inoue 	case AF_INET6:
382c5d4eab6SMarko Zec 		V_route_cb.ip6_count--;
383899ce4f4SYoshinobu Inoue 		break;
384a29f300eSGarrett Wollman 	}
385c5d4eab6SMarko Zec 	V_route_cb.any_count--;
386aea8b30fSSam Leffler 	RTSOCK_UNLOCK();
387bc725eafSRobert Watson 	raw_usrreqs.pru_detach(so);
388a29f300eSGarrett Wollman }
389a29f300eSGarrett Wollman 
390a29f300eSGarrett Wollman static int
391a29f300eSGarrett Wollman rts_disconnect(struct socket *so)
392a29f300eSGarrett Wollman {
3937e994955SRobert Watson 
3947e994955SRobert Watson 	return (raw_usrreqs.pru_disconnect(so));
395a29f300eSGarrett Wollman }
396a29f300eSGarrett Wollman 
397a29f300eSGarrett Wollman /* pru_listen is EOPNOTSUPP */
398a29f300eSGarrett Wollman 
399a29f300eSGarrett Wollman static int
40057bf258eSGarrett Wollman rts_peeraddr(struct socket *so, struct sockaddr **nam)
401a29f300eSGarrett Wollman {
4027e994955SRobert Watson 
4037e994955SRobert Watson 	return (raw_usrreqs.pru_peeraddr(so, nam));
404a29f300eSGarrett Wollman }
405a29f300eSGarrett Wollman 
406a29f300eSGarrett Wollman /* pru_rcvd is EOPNOTSUPP */
407a29f300eSGarrett Wollman /* pru_rcvoob is EOPNOTSUPP */
408a29f300eSGarrett Wollman 
409a29f300eSGarrett Wollman static int
41057bf258eSGarrett Wollman rts_send(struct socket *so, int flags, struct mbuf *m, struct sockaddr *nam,
411b40ce416SJulian Elischer 	 struct mbuf *control, struct thread *td)
412a29f300eSGarrett Wollman {
4137e994955SRobert Watson 
4147e994955SRobert Watson 	return (raw_usrreqs.pru_send(so, flags, m, nam, control, td));
415a29f300eSGarrett Wollman }
416a29f300eSGarrett Wollman 
417a29f300eSGarrett Wollman /* pru_sense is null */
418a29f300eSGarrett Wollman 
419a29f300eSGarrett Wollman static int
420a29f300eSGarrett Wollman rts_shutdown(struct socket *so)
421a29f300eSGarrett Wollman {
4227e994955SRobert Watson 
4237e994955SRobert Watson 	return (raw_usrreqs.pru_shutdown(so));
424a29f300eSGarrett Wollman }
425a29f300eSGarrett Wollman 
426a29f300eSGarrett Wollman static int
42757bf258eSGarrett Wollman rts_sockaddr(struct socket *so, struct sockaddr **nam)
428a29f300eSGarrett Wollman {
4297e994955SRobert Watson 
4307e994955SRobert Watson 	return (raw_usrreqs.pru_sockaddr(so, nam));
431a29f300eSGarrett Wollman }
432a29f300eSGarrett Wollman 
433a29f300eSGarrett Wollman static struct pr_usrreqs route_usrreqs = {
434756d52a1SPoul-Henning Kamp 	.pru_abort =		rts_abort,
435756d52a1SPoul-Henning Kamp 	.pru_attach =		rts_attach,
436756d52a1SPoul-Henning Kamp 	.pru_bind =		rts_bind,
437756d52a1SPoul-Henning Kamp 	.pru_connect =		rts_connect,
438756d52a1SPoul-Henning Kamp 	.pru_detach =		rts_detach,
439756d52a1SPoul-Henning Kamp 	.pru_disconnect =	rts_disconnect,
440756d52a1SPoul-Henning Kamp 	.pru_peeraddr =		rts_peeraddr,
441756d52a1SPoul-Henning Kamp 	.pru_send =		rts_send,
442756d52a1SPoul-Henning Kamp 	.pru_shutdown =		rts_shutdown,
443756d52a1SPoul-Henning Kamp 	.pru_sockaddr =		rts_sockaddr,
444a152f8a3SRobert Watson 	.pru_close =		rts_close,
445a29f300eSGarrett Wollman };
446a29f300eSGarrett Wollman 
447413628a7SBjoern A. Zeeb #ifndef _SOCKADDR_UNION_DEFINED
448413628a7SBjoern A. Zeeb #define	_SOCKADDR_UNION_DEFINED
449413628a7SBjoern A. Zeeb /*
450413628a7SBjoern A. Zeeb  * The union of all possible address formats we handle.
451413628a7SBjoern A. Zeeb  */
452413628a7SBjoern A. Zeeb union sockaddr_union {
453413628a7SBjoern A. Zeeb 	struct sockaddr		sa;
454413628a7SBjoern A. Zeeb 	struct sockaddr_in	sin;
455413628a7SBjoern A. Zeeb 	struct sockaddr_in6	sin6;
456413628a7SBjoern A. Zeeb };
457413628a7SBjoern A. Zeeb #endif /* _SOCKADDR_UNION_DEFINED */
458413628a7SBjoern A. Zeeb 
459413628a7SBjoern A. Zeeb static int
460413628a7SBjoern A. Zeeb rtm_get_jailed(struct rt_addrinfo *info, struct ifnet *ifp,
461aaad3c4fSAlexander V. Chernikov     struct nhop_object *nh, union sockaddr_union *saun, struct ucred *cred)
462413628a7SBjoern A. Zeeb {
463a68cc388SGleb Smirnoff #if defined(INET) || defined(INET6)
464a68cc388SGleb Smirnoff 	struct epoch_tracker et;
465a68cc388SGleb Smirnoff #endif
466413628a7SBjoern A. Zeeb 
4679c79d243SJamie Gritton 	/* First, see if the returned address is part of the jail. */
468aaad3c4fSAlexander V. Chernikov 	if (prison_if(cred, nh->nh_ifa->ifa_addr) == 0) {
469aaad3c4fSAlexander V. Chernikov 		info->rti_info[RTAX_IFA] = nh->nh_ifa->ifa_addr;
4709c79d243SJamie Gritton 		return (0);
4719c79d243SJamie Gritton 	}
4729c79d243SJamie Gritton 
473413628a7SBjoern A. Zeeb 	switch (info->rti_info[RTAX_DST]->sa_family) {
474413628a7SBjoern A. Zeeb #ifdef INET
475413628a7SBjoern A. Zeeb 	case AF_INET:
476413628a7SBjoern A. Zeeb 	{
477413628a7SBjoern A. Zeeb 		struct in_addr ia;
478413628a7SBjoern A. Zeeb 		struct ifaddr *ifa;
479413628a7SBjoern A. Zeeb 		int found;
480413628a7SBjoern A. Zeeb 
481413628a7SBjoern A. Zeeb 		found = 0;
482413628a7SBjoern A. Zeeb 		/*
4839c79d243SJamie Gritton 		 * Try to find an address on the given outgoing interface
4849c79d243SJamie Gritton 		 * that belongs to the jail.
485413628a7SBjoern A. Zeeb 		 */
486a68cc388SGleb Smirnoff 		NET_EPOCH_ENTER(et);
487d7c5a620SMatt Macy 		CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
488413628a7SBjoern A. Zeeb 			struct sockaddr *sa;
489413628a7SBjoern A. Zeeb 			sa = ifa->ifa_addr;
490413628a7SBjoern A. Zeeb 			if (sa->sa_family != AF_INET)
491413628a7SBjoern A. Zeeb 				continue;
492413628a7SBjoern A. Zeeb 			ia = ((struct sockaddr_in *)sa)->sin_addr;
493b89e82ddSJamie Gritton 			if (prison_check_ip4(cred, &ia) == 0) {
494413628a7SBjoern A. Zeeb 				found = 1;
495413628a7SBjoern A. Zeeb 				break;
496413628a7SBjoern A. Zeeb 			}
497413628a7SBjoern A. Zeeb 		}
498a68cc388SGleb Smirnoff 		NET_EPOCH_EXIT(et);
499413628a7SBjoern A. Zeeb 		if (!found) {
500413628a7SBjoern A. Zeeb 			/*
5019c79d243SJamie Gritton 			 * As a last resort return the 'default' jail address.
502413628a7SBjoern A. Zeeb 			 */
503aaad3c4fSAlexander V. Chernikov 			ia = ((struct sockaddr_in *)nh->nh_ifa->ifa_addr)->
5040304c731SJamie Gritton 			    sin_addr;
5051cecba0fSBjoern A. Zeeb 			if (prison_get_ip4(cred, &ia) != 0)
506413628a7SBjoern A. Zeeb 				return (ESRCH);
507413628a7SBjoern A. Zeeb 		}
508413628a7SBjoern A. Zeeb 		bzero(&saun->sin, sizeof(struct sockaddr_in));
509413628a7SBjoern A. Zeeb 		saun->sin.sin_len = sizeof(struct sockaddr_in);
510413628a7SBjoern A. Zeeb 		saun->sin.sin_family = AF_INET;
511413628a7SBjoern A. Zeeb 		saun->sin.sin_addr.s_addr = ia.s_addr;
5129c79d243SJamie Gritton 		info->rti_info[RTAX_IFA] = (struct sockaddr *)&saun->sin;
513413628a7SBjoern A. Zeeb 		break;
514413628a7SBjoern A. Zeeb 	}
515413628a7SBjoern A. Zeeb #endif
516413628a7SBjoern A. Zeeb #ifdef INET6
517413628a7SBjoern A. Zeeb 	case AF_INET6:
518413628a7SBjoern A. Zeeb 	{
519413628a7SBjoern A. Zeeb 		struct in6_addr ia6;
520413628a7SBjoern A. Zeeb 		struct ifaddr *ifa;
521413628a7SBjoern A. Zeeb 		int found;
522413628a7SBjoern A. Zeeb 
523413628a7SBjoern A. Zeeb 		found = 0;
524413628a7SBjoern A. Zeeb 		/*
5259c79d243SJamie Gritton 		 * Try to find an address on the given outgoing interface
5269c79d243SJamie Gritton 		 * that belongs to the jail.
527413628a7SBjoern A. Zeeb 		 */
528a68cc388SGleb Smirnoff 		NET_EPOCH_ENTER(et);
529d7c5a620SMatt Macy 		CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
530413628a7SBjoern A. Zeeb 			struct sockaddr *sa;
531413628a7SBjoern A. Zeeb 			sa = ifa->ifa_addr;
532413628a7SBjoern A. Zeeb 			if (sa->sa_family != AF_INET6)
533413628a7SBjoern A. Zeeb 				continue;
534413628a7SBjoern A. Zeeb 			bcopy(&((struct sockaddr_in6 *)sa)->sin6_addr,
535413628a7SBjoern A. Zeeb 			    &ia6, sizeof(struct in6_addr));
536b89e82ddSJamie Gritton 			if (prison_check_ip6(cred, &ia6) == 0) {
537413628a7SBjoern A. Zeeb 				found = 1;
538413628a7SBjoern A. Zeeb 				break;
539413628a7SBjoern A. Zeeb 			}
540413628a7SBjoern A. Zeeb 		}
541a68cc388SGleb Smirnoff 		NET_EPOCH_EXIT(et);
542413628a7SBjoern A. Zeeb 		if (!found) {
543413628a7SBjoern A. Zeeb 			/*
5449c79d243SJamie Gritton 			 * As a last resort return the 'default' jail address.
545413628a7SBjoern A. Zeeb 			 */
546aaad3c4fSAlexander V. Chernikov 			ia6 = ((struct sockaddr_in6 *)nh->nh_ifa->ifa_addr)->
5470304c731SJamie Gritton 			    sin6_addr;
5481cecba0fSBjoern A. Zeeb 			if (prison_get_ip6(cred, &ia6) != 0)
549413628a7SBjoern A. Zeeb 				return (ESRCH);
550413628a7SBjoern A. Zeeb 		}
551413628a7SBjoern A. Zeeb 		bzero(&saun->sin6, sizeof(struct sockaddr_in6));
552413628a7SBjoern A. Zeeb 		saun->sin6.sin6_len = sizeof(struct sockaddr_in6);
553413628a7SBjoern A. Zeeb 		saun->sin6.sin6_family = AF_INET6;
5549c79d243SJamie Gritton 		bcopy(&ia6, &saun->sin6.sin6_addr, sizeof(struct in6_addr));
555413628a7SBjoern A. Zeeb 		if (sa6_recoverscope(&saun->sin6) != 0)
556413628a7SBjoern A. Zeeb 			return (ESRCH);
5579c79d243SJamie Gritton 		info->rti_info[RTAX_IFA] = (struct sockaddr *)&saun->sin6;
558413628a7SBjoern A. Zeeb 		break;
559413628a7SBjoern A. Zeeb 	}
560413628a7SBjoern A. Zeeb #endif
561413628a7SBjoern A. Zeeb 	default:
562413628a7SBjoern A. Zeeb 		return (ESRCH);
563413628a7SBjoern A. Zeeb 	}
564413628a7SBjoern A. Zeeb 	return (0);
565413628a7SBjoern A. Zeeb }
566413628a7SBjoern A. Zeeb 
567145bf6c0SAlexander V. Chernikov static int
568145bf6c0SAlexander V. Chernikov fill_blackholeinfo(struct rt_addrinfo *info, union sockaddr_union *saun)
569145bf6c0SAlexander V. Chernikov {
570145bf6c0SAlexander V. Chernikov 	struct ifaddr *ifa;
571145bf6c0SAlexander V. Chernikov 	sa_family_t saf;
572145bf6c0SAlexander V. Chernikov 
573145bf6c0SAlexander V. Chernikov 	if (V_loif == NULL) {
574145bf6c0SAlexander V. Chernikov 		printf("Unable to add blackhole/reject nhop without loopback");
575145bf6c0SAlexander V. Chernikov 		return (ENOTSUP);
576145bf6c0SAlexander V. Chernikov 	}
577145bf6c0SAlexander V. Chernikov 	info->rti_ifp = V_loif;
578145bf6c0SAlexander V. Chernikov 
579145bf6c0SAlexander V. Chernikov 	saf = info->rti_info[RTAX_DST]->sa_family;
580145bf6c0SAlexander V. Chernikov 
581145bf6c0SAlexander V. Chernikov 	CK_STAILQ_FOREACH(ifa, &info->rti_ifp->if_addrhead, ifa_link) {
582145bf6c0SAlexander V. Chernikov 		if (ifa->ifa_addr->sa_family == saf) {
583145bf6c0SAlexander V. Chernikov 			info->rti_ifa = ifa;
584145bf6c0SAlexander V. Chernikov 			break;
585145bf6c0SAlexander V. Chernikov 		}
586145bf6c0SAlexander V. Chernikov 	}
587145bf6c0SAlexander V. Chernikov 	if (info->rti_ifa == NULL)
588145bf6c0SAlexander V. Chernikov 		return (ENOTSUP);
589145bf6c0SAlexander V. Chernikov 
590145bf6c0SAlexander V. Chernikov 	bzero(saun, sizeof(union sockaddr_union));
591145bf6c0SAlexander V. Chernikov 	switch (saf) {
5928ca99aecSAlexander V. Chernikov #ifdef INET
593145bf6c0SAlexander V. Chernikov 	case AF_INET:
594145bf6c0SAlexander V. Chernikov 		saun->sin.sin_family = AF_INET;
595145bf6c0SAlexander V. Chernikov 		saun->sin.sin_len = sizeof(struct sockaddr_in);
596145bf6c0SAlexander V. Chernikov 		saun->sin.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
597145bf6c0SAlexander V. Chernikov 		break;
5988ca99aecSAlexander V. Chernikov #endif
5998ca99aecSAlexander V. Chernikov #ifdef INET6
600145bf6c0SAlexander V. Chernikov 	case AF_INET6:
601145bf6c0SAlexander V. Chernikov 		saun->sin6.sin6_family = AF_INET6;
602145bf6c0SAlexander V. Chernikov 		saun->sin6.sin6_len = sizeof(struct sockaddr_in6);
603145bf6c0SAlexander V. Chernikov 		saun->sin6.sin6_addr = in6addr_loopback;
604145bf6c0SAlexander V. Chernikov 		break;
6058ca99aecSAlexander V. Chernikov #endif
606145bf6c0SAlexander V. Chernikov 	default:
607145bf6c0SAlexander V. Chernikov 		return (ENOTSUP);
608145bf6c0SAlexander V. Chernikov 	}
609145bf6c0SAlexander V. Chernikov 	info->rti_info[RTAX_GATEWAY] = &saun->sa;
610145bf6c0SAlexander V. Chernikov 	info->rti_flags |= RTF_GATEWAY;
611145bf6c0SAlexander V. Chernikov 
612145bf6c0SAlexander V. Chernikov 	return (0);
613145bf6c0SAlexander V. Chernikov }
614145bf6c0SAlexander V. Chernikov 
615c83dda36SAlexander V. Chernikov /*
616c83dda36SAlexander V. Chernikov  * Fills in @info based on userland-provided @rtm message.
617c83dda36SAlexander V. Chernikov  *
618c83dda36SAlexander V. Chernikov  * Returns 0 on success.
619c83dda36SAlexander V. Chernikov  */
620c83dda36SAlexander V. Chernikov static int
621c83dda36SAlexander V. Chernikov fill_addrinfo(struct rt_msghdr *rtm, int len, u_int fibnum, struct rt_addrinfo *info)
622c83dda36SAlexander V. Chernikov {
623c83dda36SAlexander V. Chernikov 	int error;
624c83dda36SAlexander V. Chernikov 	sa_family_t saf;
625c83dda36SAlexander V. Chernikov 
626c83dda36SAlexander V. Chernikov 	rtm->rtm_pid = curproc->p_pid;
627c83dda36SAlexander V. Chernikov 	info->rti_addrs = rtm->rtm_addrs;
628c83dda36SAlexander V. Chernikov 
629c83dda36SAlexander V. Chernikov 	info->rti_mflags = rtm->rtm_inits;
630c83dda36SAlexander V. Chernikov 	info->rti_rmx = &rtm->rtm_rmx;
631c83dda36SAlexander V. Chernikov 
632c83dda36SAlexander V. Chernikov 	/*
633c83dda36SAlexander V. Chernikov 	 * rt_xaddrs() performs s6_addr[2] := sin6_scope_id for AF_INET6
634c83dda36SAlexander V. Chernikov 	 * link-local address because rtrequest requires addresses with
635c83dda36SAlexander V. Chernikov 	 * embedded scope id.
636c83dda36SAlexander V. Chernikov 	 */
637c83dda36SAlexander V. Chernikov 	if (rt_xaddrs((caddr_t)(rtm + 1), len + (caddr_t)rtm, info))
638c83dda36SAlexander V. Chernikov 		return (EINVAL);
639c83dda36SAlexander V. Chernikov 
640c83dda36SAlexander V. Chernikov 	info->rti_flags = rtm->rtm_flags;
6412fe5a794SAlexander V. Chernikov 	error = cleanup_xaddrs(info);
6422fe5a794SAlexander V. Chernikov 	if (error != 0)
6432fe5a794SAlexander V. Chernikov 		return (error);
644c83dda36SAlexander V. Chernikov 	saf = info->rti_info[RTAX_DST]->sa_family;
645c83dda36SAlexander V. Chernikov 	/*
646c83dda36SAlexander V. Chernikov 	 * Verify that the caller has the appropriate privilege; RTM_GET
647c83dda36SAlexander V. Chernikov 	 * is the only operation the non-superuser is allowed.
648c83dda36SAlexander V. Chernikov 	 */
649c83dda36SAlexander V. Chernikov 	if (rtm->rtm_type != RTM_GET) {
650c83dda36SAlexander V. Chernikov 		error = priv_check(curthread, PRIV_NET_ROUTE);
651c83dda36SAlexander V. Chernikov 		if (error != 0)
652c83dda36SAlexander V. Chernikov 			return (error);
653c83dda36SAlexander V. Chernikov 	}
654c83dda36SAlexander V. Chernikov 
655c83dda36SAlexander V. Chernikov 	/*
656c83dda36SAlexander V. Chernikov 	 * The given gateway address may be an interface address.
657c83dda36SAlexander V. Chernikov 	 * For example, issuing a "route change" command on a route
658c83dda36SAlexander V. Chernikov 	 * entry that was created from a tunnel, and the gateway
659c83dda36SAlexander V. Chernikov 	 * address given is the local end point. In this case the
660c83dda36SAlexander V. Chernikov 	 * RTF_GATEWAY flag must be cleared or the destination will
661c83dda36SAlexander V. Chernikov 	 * not be reachable even though there is no error message.
662c83dda36SAlexander V. Chernikov 	 */
663c83dda36SAlexander V. Chernikov 	if (info->rti_info[RTAX_GATEWAY] != NULL &&
664c83dda36SAlexander V. Chernikov 	    info->rti_info[RTAX_GATEWAY]->sa_family != AF_LINK) {
665c83dda36SAlexander V. Chernikov 		struct rt_addrinfo ginfo;
666c83dda36SAlexander V. Chernikov 		struct sockaddr *gdst;
667c83dda36SAlexander V. Chernikov 		struct sockaddr_storage ss;
668c83dda36SAlexander V. Chernikov 
669c83dda36SAlexander V. Chernikov 		bzero(&ginfo, sizeof(ginfo));
670c83dda36SAlexander V. Chernikov 		bzero(&ss, sizeof(ss));
671c83dda36SAlexander V. Chernikov 		ss.ss_len = sizeof(ss);
672c83dda36SAlexander V. Chernikov 
673c83dda36SAlexander V. Chernikov 		ginfo.rti_info[RTAX_GATEWAY] = (struct sockaddr *)&ss;
674c83dda36SAlexander V. Chernikov 		gdst = info->rti_info[RTAX_GATEWAY];
675c83dda36SAlexander V. Chernikov 
676c83dda36SAlexander V. Chernikov 		/*
677c83dda36SAlexander V. Chernikov 		 * A host route through the loopback interface is
678c83dda36SAlexander V. Chernikov 		 * installed for each interface adddress. In pre 8.0
679c83dda36SAlexander V. Chernikov 		 * releases the interface address of a PPP link type
680c83dda36SAlexander V. Chernikov 		 * is not reachable locally. This behavior is fixed as
681c83dda36SAlexander V. Chernikov 		 * part of the new L2/L3 redesign and rewrite work. The
682c83dda36SAlexander V. Chernikov 		 * signature of this interface address route is the
683aaad3c4fSAlexander V. Chernikov 		 * AF_LINK sa_family type of the gateway, and the
684c83dda36SAlexander V. Chernikov 		 * rt_ifp has the IFF_LOOPBACK flag set.
685c83dda36SAlexander V. Chernikov 		 */
686c83dda36SAlexander V. Chernikov 		if (rib_lookup_info(fibnum, gdst, NHR_REF, 0, &ginfo) == 0) {
687c83dda36SAlexander V. Chernikov 			if (ss.ss_family == AF_LINK &&
688c83dda36SAlexander V. Chernikov 			    ginfo.rti_ifp->if_flags & IFF_LOOPBACK) {
689c83dda36SAlexander V. Chernikov 				info->rti_flags &= ~RTF_GATEWAY;
690c83dda36SAlexander V. Chernikov 				info->rti_flags |= RTF_GWFLAG_COMPAT;
691c83dda36SAlexander V. Chernikov 			}
692c83dda36SAlexander V. Chernikov 			rib_free_info(&ginfo);
693c83dda36SAlexander V. Chernikov 		}
694c83dda36SAlexander V. Chernikov 	}
695c83dda36SAlexander V. Chernikov 
696c83dda36SAlexander V. Chernikov 	return (0);
697c83dda36SAlexander V. Chernikov }
698c83dda36SAlexander V. Chernikov 
699fedeb08bSAlexander V. Chernikov static struct nhop_object *
700fedeb08bSAlexander V. Chernikov select_nhop(struct nhop_object *nh, const struct sockaddr *gw)
701fedeb08bSAlexander V. Chernikov {
702fedeb08bSAlexander V. Chernikov 	if (!NH_IS_NHGRP(nh))
703fedeb08bSAlexander V. Chernikov 		return (nh);
704fedeb08bSAlexander V. Chernikov #ifdef ROUTE_MPATH
705fedeb08bSAlexander V. Chernikov 	struct weightened_nhop *wn;
706fedeb08bSAlexander V. Chernikov 	uint32_t num_nhops;
707fedeb08bSAlexander V. Chernikov 	wn = nhgrp_get_nhops((struct nhgrp_object *)nh, &num_nhops);
708fedeb08bSAlexander V. Chernikov 	if (gw == NULL)
709fedeb08bSAlexander V. Chernikov 		return (wn[0].nh);
710fedeb08bSAlexander V. Chernikov 	for (int i = 0; i < num_nhops; i++) {
711fedeb08bSAlexander V. Chernikov 		if (match_nhop_gw(wn[i].nh, gw))
712fedeb08bSAlexander V. Chernikov 			return (wn[i].nh);
713fedeb08bSAlexander V. Chernikov 	}
714fedeb08bSAlexander V. Chernikov #endif
715fedeb08bSAlexander V. Chernikov 	return (NULL);
716fedeb08bSAlexander V. Chernikov }
717fedeb08bSAlexander V. Chernikov 
718c83dda36SAlexander V. Chernikov /*
719c83dda36SAlexander V. Chernikov  * Handles RTM_GET message from routing socket, returning matching rt.
720c83dda36SAlexander V. Chernikov  *
721c83dda36SAlexander V. Chernikov  * Returns:
722c83dda36SAlexander V. Chernikov  * 0 on success, with locked and referenced matching rt in @rt_nrt
723c83dda36SAlexander V. Chernikov  * errno of failure
724c83dda36SAlexander V. Chernikov  */
725c83dda36SAlexander V. Chernikov static int
726c83dda36SAlexander V. Chernikov handle_rtm_get(struct rt_addrinfo *info, u_int fibnum,
727a287a973SAlexander V. Chernikov     struct rt_msghdr *rtm, struct rib_cmd_info *rc)
728c83dda36SAlexander V. Chernikov {
729c83dda36SAlexander V. Chernikov 	RIB_RLOCK_TRACKER;
730c83dda36SAlexander V. Chernikov 	struct rib_head *rnh;
731fedeb08bSAlexander V. Chernikov 	struct nhop_object *nh;
732c83dda36SAlexander V. Chernikov 	sa_family_t saf;
733c83dda36SAlexander V. Chernikov 
734c83dda36SAlexander V. Chernikov 	saf = info->rti_info[RTAX_DST]->sa_family;
735c83dda36SAlexander V. Chernikov 
736c83dda36SAlexander V. Chernikov 	rnh = rt_tables_get_rnh(fibnum, saf);
737c83dda36SAlexander V. Chernikov 	if (rnh == NULL)
738c83dda36SAlexander V. Chernikov 		return (EAFNOSUPPORT);
739c83dda36SAlexander V. Chernikov 
740c83dda36SAlexander V. Chernikov 	RIB_RLOCK(rnh);
741c83dda36SAlexander V. Chernikov 
7422fe5a794SAlexander V. Chernikov 	/*
7432fe5a794SAlexander V. Chernikov 	 * By (implicit) convention host route (one without netmask)
7442fe5a794SAlexander V. Chernikov 	 * means longest-prefix-match request and the route with netmask
7452fe5a794SAlexander V. Chernikov 	 * means exact-match lookup.
7462fe5a794SAlexander V. Chernikov 	 * As cleanup_xaddrs() cleans up info flags&addrs for the /32,/128
7472fe5a794SAlexander V. Chernikov 	 * prefixes, use original data to check for the netmask presence.
7482fe5a794SAlexander V. Chernikov 	 */
7492fe5a794SAlexander V. Chernikov 	if ((rtm->rtm_addrs & RTA_NETMASK) == 0) {
750c83dda36SAlexander V. Chernikov 		/*
751c83dda36SAlexander V. Chernikov 		 * Provide longest prefix match for
752c83dda36SAlexander V. Chernikov 		 * address lookup (no mask).
753c83dda36SAlexander V. Chernikov 		 * 'route -n get addr'
754c83dda36SAlexander V. Chernikov 		 */
755a287a973SAlexander V. Chernikov 		rc->rc_rt = (struct rtentry *) rnh->rnh_matchaddr(
756c83dda36SAlexander V. Chernikov 		    info->rti_info[RTAX_DST], &rnh->head);
757c83dda36SAlexander V. Chernikov 	} else
758a287a973SAlexander V. Chernikov 		rc->rc_rt = (struct rtentry *) rnh->rnh_lookup(
759c83dda36SAlexander V. Chernikov 		    info->rti_info[RTAX_DST],
760c83dda36SAlexander V. Chernikov 		    info->rti_info[RTAX_NETMASK], &rnh->head);
761c83dda36SAlexander V. Chernikov 
762a287a973SAlexander V. Chernikov 	if (rc->rc_rt == NULL) {
763c83dda36SAlexander V. Chernikov 		RIB_RUNLOCK(rnh);
764c83dda36SAlexander V. Chernikov 		return (ESRCH);
765c83dda36SAlexander V. Chernikov 	}
766fedeb08bSAlexander V. Chernikov 
767d68fb8d9SAlexander V. Chernikov 	nh = select_nhop(rt_get_raw_nhop(rc->rc_rt), info->rti_info[RTAX_GATEWAY]);
768fedeb08bSAlexander V. Chernikov 	if (nh == NULL) {
769c83dda36SAlexander V. Chernikov 		RIB_RUNLOCK(rnh);
770c83dda36SAlexander V. Chernikov 		return (ESRCH);
771c83dda36SAlexander V. Chernikov 	}
772c83dda36SAlexander V. Chernikov 	/*
773c83dda36SAlexander V. Chernikov 	 * If performing proxied L2 entry insertion, and
774c83dda36SAlexander V. Chernikov 	 * the actual PPP host entry is found, perform
775c83dda36SAlexander V. Chernikov 	 * another search to retrieve the prefix route of
776c83dda36SAlexander V. Chernikov 	 * the local end point of the PPP link.
777aaad3c4fSAlexander V. Chernikov 	 * TODO: move this logic to userland.
778c83dda36SAlexander V. Chernikov 	 */
779c83dda36SAlexander V. Chernikov 	if (rtm->rtm_flags & RTF_ANNOUNCE) {
780c83dda36SAlexander V. Chernikov 		struct sockaddr laddr;
781c83dda36SAlexander V. Chernikov 
782aaad3c4fSAlexander V. Chernikov 		if (nh->nh_ifp != NULL &&
783aaad3c4fSAlexander V. Chernikov 		    nh->nh_ifp->if_type == IFT_PROPVIRTUAL) {
784c83dda36SAlexander V. Chernikov 			struct ifaddr *ifa;
785c83dda36SAlexander V. Chernikov 
786c83dda36SAlexander V. Chernikov 			ifa = ifa_ifwithnet(info->rti_info[RTAX_DST], 1,
787c83dda36SAlexander V. Chernikov 					RT_ALL_FIBS);
788c83dda36SAlexander V. Chernikov 			if (ifa != NULL)
789c83dda36SAlexander V. Chernikov 				rt_maskedcopy(ifa->ifa_addr,
790c83dda36SAlexander V. Chernikov 					      &laddr,
791c83dda36SAlexander V. Chernikov 					      ifa->ifa_netmask);
792c83dda36SAlexander V. Chernikov 		} else
793aaad3c4fSAlexander V. Chernikov 			rt_maskedcopy(nh->nh_ifa->ifa_addr,
794c83dda36SAlexander V. Chernikov 				      &laddr,
795aaad3c4fSAlexander V. Chernikov 				      nh->nh_ifa->ifa_netmask);
796c83dda36SAlexander V. Chernikov 		/*
797c83dda36SAlexander V. Chernikov 		 * refactor rt and no lock operation necessary
798c83dda36SAlexander V. Chernikov 		 */
799a287a973SAlexander V. Chernikov 		rc->rc_rt = (struct rtentry *)rnh->rnh_matchaddr(&laddr,
800c83dda36SAlexander V. Chernikov 		    &rnh->head);
801a287a973SAlexander V. Chernikov 		if (rc->rc_rt == NULL) {
802c83dda36SAlexander V. Chernikov 			RIB_RUNLOCK(rnh);
803c83dda36SAlexander V. Chernikov 			return (ESRCH);
804c83dda36SAlexander V. Chernikov 		}
805d68fb8d9SAlexander V. Chernikov 		nh = select_nhop(rt_get_raw_nhop(rc->rc_rt), info->rti_info[RTAX_GATEWAY]);
806fedeb08bSAlexander V. Chernikov 		if (nh == NULL) {
807fedeb08bSAlexander V. Chernikov 			RIB_RUNLOCK(rnh);
808fedeb08bSAlexander V. Chernikov 			return (ESRCH);
809c83dda36SAlexander V. Chernikov 		}
810fedeb08bSAlexander V. Chernikov 	}
811fedeb08bSAlexander V. Chernikov 	rc->rc_nh_new = nh;
8122259a030SAlexander V. Chernikov 	rc->rc_nh_weight = rc->rc_rt->rt_weight;
813c83dda36SAlexander V. Chernikov 	RIB_RUNLOCK(rnh);
814c83dda36SAlexander V. Chernikov 
815c83dda36SAlexander V. Chernikov 	return (0);
816c83dda36SAlexander V. Chernikov }
817c83dda36SAlexander V. Chernikov 
818d68fb8d9SAlexander V. Chernikov static void
819d68fb8d9SAlexander V. Chernikov init_sockaddrs_family(int family, struct sockaddr *dst, struct sockaddr *mask)
820d68fb8d9SAlexander V. Chernikov {
821d68fb8d9SAlexander V. Chernikov #ifdef INET
822d68fb8d9SAlexander V. Chernikov 	if (family == AF_INET) {
823d68fb8d9SAlexander V. Chernikov 		struct sockaddr_in *dst4 = (struct sockaddr_in *)dst;
824d68fb8d9SAlexander V. Chernikov 		struct sockaddr_in *mask4 = (struct sockaddr_in *)mask;
825d68fb8d9SAlexander V. Chernikov 
826d68fb8d9SAlexander V. Chernikov 		bzero(dst4, sizeof(struct sockaddr_in));
827d68fb8d9SAlexander V. Chernikov 		bzero(mask4, sizeof(struct sockaddr_in));
828d68fb8d9SAlexander V. Chernikov 
829d68fb8d9SAlexander V. Chernikov 		dst4->sin_family = AF_INET;
830d68fb8d9SAlexander V. Chernikov 		dst4->sin_len = sizeof(struct sockaddr_in);
831d68fb8d9SAlexander V. Chernikov 		mask4->sin_family = AF_INET;
832d68fb8d9SAlexander V. Chernikov 		mask4->sin_len = sizeof(struct sockaddr_in);
833d68fb8d9SAlexander V. Chernikov 	}
834d68fb8d9SAlexander V. Chernikov #endif
835d68fb8d9SAlexander V. Chernikov #ifdef INET6
836d68fb8d9SAlexander V. Chernikov 	if (family == AF_INET6) {
837d68fb8d9SAlexander V. Chernikov 		struct sockaddr_in6 *dst6 = (struct sockaddr_in6 *)dst;
838d68fb8d9SAlexander V. Chernikov 		struct sockaddr_in6 *mask6 = (struct sockaddr_in6 *)mask;
839d68fb8d9SAlexander V. Chernikov 
840d68fb8d9SAlexander V. Chernikov 		bzero(dst6, sizeof(struct sockaddr_in6));
841d68fb8d9SAlexander V. Chernikov 		bzero(mask6, sizeof(struct sockaddr_in6));
842d68fb8d9SAlexander V. Chernikov 
843d68fb8d9SAlexander V. Chernikov 		dst6->sin6_family = AF_INET6;
844d68fb8d9SAlexander V. Chernikov 		dst6->sin6_len = sizeof(struct sockaddr_in6);
845d68fb8d9SAlexander V. Chernikov 		mask6->sin6_family = AF_INET6;
846d68fb8d9SAlexander V. Chernikov 		mask6->sin6_len = sizeof(struct sockaddr_in6);
847d68fb8d9SAlexander V. Chernikov 	}
848d68fb8d9SAlexander V. Chernikov #endif
849d68fb8d9SAlexander V. Chernikov }
850d68fb8d9SAlexander V. Chernikov 
851d68fb8d9SAlexander V. Chernikov static void
852d68fb8d9SAlexander V. Chernikov export_rtaddrs(const struct rtentry *rt, struct sockaddr *dst,
853d68fb8d9SAlexander V. Chernikov     struct sockaddr *mask)
854d68fb8d9SAlexander V. Chernikov {
855d68fb8d9SAlexander V. Chernikov #ifdef INET
856d68fb8d9SAlexander V. Chernikov 	if (dst->sa_family == AF_INET) {
857d68fb8d9SAlexander V. Chernikov 		struct sockaddr_in *dst4 = (struct sockaddr_in *)dst;
858d68fb8d9SAlexander V. Chernikov 		struct sockaddr_in *mask4 = (struct sockaddr_in *)mask;
8592fb4a03dSRyan Libby 		uint32_t scopeid = 0;
860d68fb8d9SAlexander V. Chernikov 		rt_get_inet_prefix_pmask(rt, &dst4->sin_addr, &mask4->sin_addr,
861d68fb8d9SAlexander V. Chernikov 		    &scopeid);
862d68fb8d9SAlexander V. Chernikov 		return;
863d68fb8d9SAlexander V. Chernikov 	}
864d68fb8d9SAlexander V. Chernikov #endif
865d68fb8d9SAlexander V. Chernikov #ifdef INET6
866d68fb8d9SAlexander V. Chernikov 	if (dst->sa_family == AF_INET6) {
867d68fb8d9SAlexander V. Chernikov 		struct sockaddr_in6 *dst6 = (struct sockaddr_in6 *)dst;
868d68fb8d9SAlexander V. Chernikov 		struct sockaddr_in6 *mask6 = (struct sockaddr_in6 *)mask;
8692fb4a03dSRyan Libby 		uint32_t scopeid = 0;
8702fb4a03dSRyan Libby 		rt_get_inet6_prefix_pmask(rt, &dst6->sin6_addr,
8712fb4a03dSRyan Libby 		    &mask6->sin6_addr, &scopeid);
872d68fb8d9SAlexander V. Chernikov 		dst6->sin6_scope_id = scopeid;
873d68fb8d9SAlexander V. Chernikov 		return;
874d68fb8d9SAlexander V. Chernikov 	}
875d68fb8d9SAlexander V. Chernikov #endif
876d68fb8d9SAlexander V. Chernikov }
877d68fb8d9SAlexander V. Chernikov 
878d68fb8d9SAlexander V. Chernikov 
879c83dda36SAlexander V. Chernikov /*
880592d300eSAlexander V. Chernikov  * Update sockaddrs, flags, etc in @prtm based on @rc data.
881c83dda36SAlexander V. Chernikov  * rtm can be reallocated.
882c83dda36SAlexander V. Chernikov  *
883c83dda36SAlexander V. Chernikov  * Returns 0 on success, along with pointer to (potentially reallocated)
884c83dda36SAlexander V. Chernikov  *  rtm.
885c83dda36SAlexander V. Chernikov  *
886c83dda36SAlexander V. Chernikov  */
887c83dda36SAlexander V. Chernikov static int
888592d300eSAlexander V. Chernikov update_rtm_from_rc(struct rt_addrinfo *info, struct rt_msghdr **prtm,
889592d300eSAlexander V. Chernikov     int alloc_len, struct rib_cmd_info *rc, struct nhop_object *nh)
890c83dda36SAlexander V. Chernikov {
891c83dda36SAlexander V. Chernikov 	struct walkarg w;
892c83dda36SAlexander V. Chernikov 	union sockaddr_union saun;
893c83dda36SAlexander V. Chernikov 	struct rt_msghdr *rtm, *orig_rtm = NULL;
894c83dda36SAlexander V. Chernikov 	struct ifnet *ifp;
895c83dda36SAlexander V. Chernikov 	int error, len;
896c83dda36SAlexander V. Chernikov 
897c83dda36SAlexander V. Chernikov 	rtm = *prtm;
898d68fb8d9SAlexander V. Chernikov 	union sockaddr_union sa_dst, sa_mask;
899d68fb8d9SAlexander V. Chernikov 	int family = info->rti_info[RTAX_DST]->sa_family;
900d68fb8d9SAlexander V. Chernikov 	init_sockaddrs_family(family, &sa_dst.sa, &sa_mask.sa);
901d68fb8d9SAlexander V. Chernikov 	export_rtaddrs(rc->rc_rt, &sa_dst.sa, &sa_mask.sa);
902c83dda36SAlexander V. Chernikov 
903d68fb8d9SAlexander V. Chernikov 	info->rti_info[RTAX_DST] = &sa_dst.sa;
904d68fb8d9SAlexander V. Chernikov 	info->rti_info[RTAX_NETMASK] = rt_is_host(rc->rc_rt) ? NULL : &sa_mask.sa;
905aaad3c4fSAlexander V. Chernikov 	info->rti_info[RTAX_GATEWAY] = &nh->gw_sa;
906c83dda36SAlexander V. Chernikov 	info->rti_info[RTAX_GENMASK] = 0;
907aaad3c4fSAlexander V. Chernikov 	ifp = nh->nh_ifp;
908c83dda36SAlexander V. Chernikov 	if (rtm->rtm_addrs & (RTA_IFP | RTA_IFA)) {
909c83dda36SAlexander V. Chernikov 		if (ifp) {
910c83dda36SAlexander V. Chernikov 			info->rti_info[RTAX_IFP] =
911c83dda36SAlexander V. Chernikov 			    ifp->if_addr->ifa_addr;
912aaad3c4fSAlexander V. Chernikov 			error = rtm_get_jailed(info, ifp, nh,
913c83dda36SAlexander V. Chernikov 			    &saun, curthread->td_ucred);
914c83dda36SAlexander V. Chernikov 			if (error != 0)
915c83dda36SAlexander V. Chernikov 				return (error);
916c83dda36SAlexander V. Chernikov 			if (ifp->if_flags & IFF_POINTOPOINT)
917c83dda36SAlexander V. Chernikov 				info->rti_info[RTAX_BRD] =
918aaad3c4fSAlexander V. Chernikov 				    nh->nh_ifa->ifa_dstaddr;
919c83dda36SAlexander V. Chernikov 			rtm->rtm_index = ifp->if_index;
920c83dda36SAlexander V. Chernikov 		} else {
921c83dda36SAlexander V. Chernikov 			info->rti_info[RTAX_IFP] = NULL;
922c83dda36SAlexander V. Chernikov 			info->rti_info[RTAX_IFA] = NULL;
923c83dda36SAlexander V. Chernikov 		}
924c83dda36SAlexander V. Chernikov 	} else if (ifp != NULL)
925c83dda36SAlexander V. Chernikov 		rtm->rtm_index = ifp->if_index;
926c83dda36SAlexander V. Chernikov 
927c83dda36SAlexander V. Chernikov 	/* Check if we need to realloc storage */
928c83dda36SAlexander V. Chernikov 	rtsock_msg_buffer(rtm->rtm_type, info, NULL, &len);
929c83dda36SAlexander V. Chernikov 	if (len > alloc_len) {
930c83dda36SAlexander V. Chernikov 		struct rt_msghdr *tmp_rtm;
931c83dda36SAlexander V. Chernikov 
932c83dda36SAlexander V. Chernikov 		tmp_rtm = malloc(len, M_TEMP, M_NOWAIT);
933c83dda36SAlexander V. Chernikov 		if (tmp_rtm == NULL)
934c83dda36SAlexander V. Chernikov 			return (ENOBUFS);
935c83dda36SAlexander V. Chernikov 		bcopy(rtm, tmp_rtm, rtm->rtm_msglen);
936c83dda36SAlexander V. Chernikov 		orig_rtm = rtm;
937c83dda36SAlexander V. Chernikov 		rtm = tmp_rtm;
938c83dda36SAlexander V. Chernikov 		alloc_len = len;
939c83dda36SAlexander V. Chernikov 
940c83dda36SAlexander V. Chernikov 		/*
941c83dda36SAlexander V. Chernikov 		 * Delay freeing original rtm as info contains
942c83dda36SAlexander V. Chernikov 		 * data referencing it.
943c83dda36SAlexander V. Chernikov 		 */
944c83dda36SAlexander V. Chernikov 	}
945c83dda36SAlexander V. Chernikov 
946c83dda36SAlexander V. Chernikov 	w.w_tmem = (caddr_t)rtm;
947c83dda36SAlexander V. Chernikov 	w.w_tmemsize = alloc_len;
948c83dda36SAlexander V. Chernikov 	rtsock_msg_buffer(rtm->rtm_type, info, &w, &len);
949c83dda36SAlexander V. Chernikov 
950592d300eSAlexander V. Chernikov 	rtm->rtm_flags = rc->rc_rt->rte_flags | nhop_get_rtflags(nh);
951592d300eSAlexander V. Chernikov 	if (rtm->rtm_flags & RTF_GWFLAG_COMPAT)
952c83dda36SAlexander V. Chernikov 		rtm->rtm_flags = RTF_GATEWAY |
953592d300eSAlexander V. Chernikov 			(rtm->rtm_flags & ~RTF_GWFLAG_COMPAT);
954592d300eSAlexander V. Chernikov 	rt_getmetrics(rc->rc_rt, nh, &rtm->rtm_rmx);
955592d300eSAlexander V. Chernikov 	rtm->rtm_rmx.rmx_weight = rc->rc_nh_weight;
956c83dda36SAlexander V. Chernikov 	rtm->rtm_addrs = info->rti_addrs;
957c83dda36SAlexander V. Chernikov 
958c83dda36SAlexander V. Chernikov 	if (orig_rtm != NULL)
959c83dda36SAlexander V. Chernikov 		free(orig_rtm, M_TEMP);
960c83dda36SAlexander V. Chernikov 	*prtm = rtm;
961c83dda36SAlexander V. Chernikov 
962c83dda36SAlexander V. Chernikov 	return (0);
963c83dda36SAlexander V. Chernikov }
964c83dda36SAlexander V. Chernikov 
9659c584fa4SAlexander V. Chernikov #ifdef ROUTE_MPATH
966fedeb08bSAlexander V. Chernikov static void
967fedeb08bSAlexander V. Chernikov save_del_notification(struct rib_cmd_info *rc, void *_cbdata)
968fedeb08bSAlexander V. Chernikov {
969fedeb08bSAlexander V. Chernikov 	struct rib_cmd_info *rc_new = (struct rib_cmd_info *)_cbdata;
970fedeb08bSAlexander V. Chernikov 
971fedeb08bSAlexander V. Chernikov 	if (rc->rc_cmd == RTM_DELETE)
972fedeb08bSAlexander V. Chernikov 		*rc_new = *rc;
973fedeb08bSAlexander V. Chernikov }
974fedeb08bSAlexander V. Chernikov 
975fedeb08bSAlexander V. Chernikov static void
976fedeb08bSAlexander V. Chernikov save_add_notification(struct rib_cmd_info *rc, void *_cbdata)
977fedeb08bSAlexander V. Chernikov {
978fedeb08bSAlexander V. Chernikov 	struct rib_cmd_info *rc_new = (struct rib_cmd_info *)_cbdata;
979fedeb08bSAlexander V. Chernikov 
980fedeb08bSAlexander V. Chernikov 	if (rc->rc_cmd == RTM_ADD)
981fedeb08bSAlexander V. Chernikov 		*rc_new = *rc;
982fedeb08bSAlexander V. Chernikov }
9839c584fa4SAlexander V. Chernikov #endif
984fedeb08bSAlexander V. Chernikov 
985df8bae1dSRodney W. Grimes /*ARGSUSED*/
98652041295SPoul-Henning Kamp static int
98773d76e77SKevin Lo route_output(struct mbuf *m, struct socket *so, ...)
988df8bae1dSRodney W. Grimes {
9895dfc91d7SLuigi Rizzo 	struct rt_msghdr *rtm = NULL;
9905dfc91d7SLuigi Rizzo 	struct rtentry *rt = NULL;
991df8bae1dSRodney W. Grimes 	struct rt_addrinfo info;
992b8a6e03fSGleb Smirnoff 	struct epoch_tracker et;
9933deb3649SAlexander V. Chernikov #ifdef INET6
994d9302031SAlexander V. Chernikov 	struct sockaddr_storage ss;
9956bbfef90SHiroki Sato 	struct sockaddr_in6 *sin6;
9960bebb544SHiroki Sato 	int i, rti_need_deembed = 0;
9976bbfef90SHiroki Sato #endif
998f2e5eb36SAlexander V. Chernikov 	int alloc_len = 0, len, error = 0, fibnum;
9993ca1a2d6SMax Laier 	sa_family_t saf = AF_UNSPEC;
1000a287a973SAlexander V. Chernikov 	struct rib_cmd_info rc;
1001a287a973SAlexander V. Chernikov 	struct nhop_object *nh;
1002df8bae1dSRodney W. Grimes 
1003f5d9a696SAlexander V. Chernikov 	fibnum = so->so_fibnum;
1004df8bae1dSRodney W. Grimes #define senderr(e) { error = e; goto flush;}
10055dfc91d7SLuigi Rizzo 	if (m == NULL || ((m->m_len < sizeof(long)) &&
10065dfc91d7SLuigi Rizzo 		       (m = m_pullup(m, sizeof(long))) == NULL))
1007df8bae1dSRodney W. Grimes 		return (ENOBUFS);
1008df8bae1dSRodney W. Grimes 	if ((m->m_flags & M_PKTHDR) == 0)
1009df8bae1dSRodney W. Grimes 		panic("route_output");
1010b8a6e03fSGleb Smirnoff 	NET_EPOCH_ENTER(et);
1011df8bae1dSRodney W. Grimes 	len = m->m_pkthdr.len;
1012df8bae1dSRodney W. Grimes 	if (len < sizeof(*rtm) ||
1013f1fcb552SAlexander V. Chernikov 	    len != mtod(m, struct rt_msghdr *)->rtm_msglen)
1014df8bae1dSRodney W. Grimes 		senderr(EINVAL);
1015f1fcb552SAlexander V. Chernikov 
1016f2e5eb36SAlexander V. Chernikov 	/*
1017f2e5eb36SAlexander V. Chernikov 	 * Most of current messages are in range 200-240 bytes,
1018d9437c0fSAlexander V. Chernikov 	 * minimize possible re-allocation on reply using larger size
1019d9437c0fSAlexander V. Chernikov 	 * buffer aligned on 1k boundaty.
1020f2e5eb36SAlexander V. Chernikov 	 */
1021f2e5eb36SAlexander V. Chernikov 	alloc_len = roundup2(len, 1024);
1022d9437c0fSAlexander V. Chernikov 	if ((rtm = malloc(alloc_len, M_TEMP, M_NOWAIT)) == NULL)
1023df8bae1dSRodney W. Grimes 		senderr(ENOBUFS);
1024f2e5eb36SAlexander V. Chernikov 
1025df8bae1dSRodney W. Grimes 	m_copydata(m, 0, len, (caddr_t)rtm);
1026f1fcb552SAlexander V. Chernikov 	bzero(&info, sizeof(info));
1027a287a973SAlexander V. Chernikov 	nh = NULL;
1028f1fcb552SAlexander V. Chernikov 
1029df8bae1dSRodney W. Grimes 	if (rtm->rtm_version != RTM_VERSION) {
1030f1fcb552SAlexander V. Chernikov 		/* Do not touch message since format is unknown */
1031f2e5eb36SAlexander V. Chernikov 		free(rtm, M_TEMP);
1032f1fcb552SAlexander V. Chernikov 		rtm = NULL;
1033df8bae1dSRodney W. Grimes 		senderr(EPROTONOSUPPORT);
1034df8bae1dSRodney W. Grimes 	}
1035f1fcb552SAlexander V. Chernikov 
1036f1fcb552SAlexander V. Chernikov 	/*
1037f1fcb552SAlexander V. Chernikov 	 * Starting from here, it is possible
1038f1fcb552SAlexander V. Chernikov 	 * to alter original message and insert
1039f1fcb552SAlexander V. Chernikov 	 * caller PID and error value.
1040f1fcb552SAlexander V. Chernikov 	 */
1041f1fcb552SAlexander V. Chernikov 
1042c83dda36SAlexander V. Chernikov 	if ((error = fill_addrinfo(rtm, len, fibnum, &info)) != 0) {
1043dadb6c3bSRuslan Ermilov 		senderr(error);
1044acd3428bSRobert Watson 	}
1045162c0b2eSRuslan Ermilov 
1046c83dda36SAlexander V. Chernikov 	saf = info.rti_info[RTAX_DST]->sa_family;
10479231d35fSQing Li 
1048c83dda36SAlexander V. Chernikov 	/* support for new ARP code */
1049c83dda36SAlexander V. Chernikov 	if (rtm->rtm_flags & RTF_LLDATA) {
1050c83dda36SAlexander V. Chernikov 		error = lla_rt_output(rtm, &info);
1051c83dda36SAlexander V. Chernikov #ifdef INET6
1052c83dda36SAlexander V. Chernikov 		if (error == 0)
1053bec053ffSAlexander V. Chernikov 			rti_need_deembed = 1;
1054c83dda36SAlexander V. Chernikov #endif
1055c83dda36SAlexander V. Chernikov 		goto flush;
10569231d35fSQing Li 	}
10579231d35fSQing Li 
1058145bf6c0SAlexander V. Chernikov 	union sockaddr_union gw_saun;
1059145bf6c0SAlexander V. Chernikov 	int blackhole_flags = rtm->rtm_flags & (RTF_BLACKHOLE|RTF_REJECT);
1060145bf6c0SAlexander V. Chernikov 	if (blackhole_flags != 0) {
1061145bf6c0SAlexander V. Chernikov 		if (blackhole_flags != (RTF_BLACKHOLE | RTF_REJECT))
1062145bf6c0SAlexander V. Chernikov 			error = fill_blackholeinfo(&info, &gw_saun);
1063145bf6c0SAlexander V. Chernikov 		else
1064145bf6c0SAlexander V. Chernikov 			error = EINVAL;
1065145bf6c0SAlexander V. Chernikov 		if (error != 0)
1066145bf6c0SAlexander V. Chernikov 			senderr(error);
1067145bf6c0SAlexander V. Chernikov 		/* TODO: rebuild rtm from scratch */
1068145bf6c0SAlexander V. Chernikov 	}
1069145bf6c0SAlexander V. Chernikov 
1070df8bae1dSRodney W. Grimes 	switch (rtm->rtm_type) {
1071df8bae1dSRodney W. Grimes 	case RTM_ADD:
1072c77462ddSAlexander V. Chernikov 	case RTM_CHANGE:
1073b3b6ff23SRyan Stone 		if (rtm->rtm_type == RTM_ADD) {
10745dfc91d7SLuigi Rizzo 			if (info.rti_info[RTAX_GATEWAY] == NULL)
1075df8bae1dSRodney W. Grimes 				senderr(EINVAL);
1076b3b6ff23SRyan Stone 		}
1077a287a973SAlexander V. Chernikov 		error = rib_action(fibnum, rtm->rtm_type, &info, &rc);
1078a287a973SAlexander V. Chernikov 		if (error == 0) {
10790bebb544SHiroki Sato #ifdef INET6
1080bec053ffSAlexander V. Chernikov 			rti_need_deembed = 1;
10810bebb544SHiroki Sato #endif
1082fedeb08bSAlexander V. Chernikov #ifdef ROUTE_MPATH
1083fedeb08bSAlexander V. Chernikov 			if (NH_IS_NHGRP(rc.rc_nh_new) ||
1084fedeb08bSAlexander V. Chernikov 			    (rc.rc_nh_old && NH_IS_NHGRP(rc.rc_nh_old))) {
1085fedeb08bSAlexander V. Chernikov 				struct rib_cmd_info rc_simple = {};
1086fedeb08bSAlexander V. Chernikov 				rib_decompose_notification(&rc,
1087fedeb08bSAlexander V. Chernikov 				    save_add_notification, (void *)&rc_simple);
1088fedeb08bSAlexander V. Chernikov 				rc = rc_simple;
1089fedeb08bSAlexander V. Chernikov 			}
1090fedeb08bSAlexander V. Chernikov #endif
1091a287a973SAlexander V. Chernikov 			nh = rc.rc_nh_new;
1092592d300eSAlexander V. Chernikov 			rtm->rtm_index = nh->nh_ifp->if_index;
10931b95005eSAlexander V. Chernikov 			rtm->rtm_flags = rc.rc_rt->rte_flags | nhop_get_rtflags(nh);
1094df8bae1dSRodney W. Grimes 		}
1095df8bae1dSRodney W. Grimes 		break;
1096df8bae1dSRodney W. Grimes 
1097df8bae1dSRodney W. Grimes 	case RTM_DELETE:
1098a287a973SAlexander V. Chernikov 		error = rib_action(fibnum, RTM_DELETE, &info, &rc);
109978a82810SGarrett Wollman 		if (error == 0) {
1100fedeb08bSAlexander V. Chernikov #ifdef ROUTE_MPATH
1101fedeb08bSAlexander V. Chernikov 			if (NH_IS_NHGRP(rc.rc_nh_old) ||
1102fedeb08bSAlexander V. Chernikov 			    (rc.rc_nh_new && NH_IS_NHGRP(rc.rc_nh_new))) {
1103fedeb08bSAlexander V. Chernikov 				struct rib_cmd_info rc_simple = {};
1104fedeb08bSAlexander V. Chernikov 				rib_decompose_notification(&rc,
1105fedeb08bSAlexander V. Chernikov 				    save_del_notification, (void *)&rc_simple);
1106fedeb08bSAlexander V. Chernikov 				rc = rc_simple;
1107fedeb08bSAlexander V. Chernikov 			}
1108fedeb08bSAlexander V. Chernikov #endif
1109a287a973SAlexander V. Chernikov 			nh = rc.rc_nh_old;
111078a82810SGarrett Wollman 			goto report;
111178a82810SGarrett Wollman 		}
11120bebb544SHiroki Sato #ifdef INET6
11130bebb544SHiroki Sato 		/* rt_msg2() will not be used when RTM_DELETE fails. */
1114bec053ffSAlexander V. Chernikov 		rti_need_deembed = 1;
11150bebb544SHiroki Sato #endif
1116df8bae1dSRodney W. Grimes 		break;
1117df8bae1dSRodney W. Grimes 
1118df8bae1dSRodney W. Grimes 	case RTM_GET:
1119a287a973SAlexander V. Chernikov 		error = handle_rtm_get(&info, fibnum, rtm, &rc);
1120c83dda36SAlexander V. Chernikov 		if (error != 0)
1121c83dda36SAlexander V. Chernikov 			senderr(error);
1122a287a973SAlexander V. Chernikov 		nh = rc.rc_nh_new;
1123956b0b65SJeffrey Hsu 
112478a82810SGarrett Wollman report:
1125d68fb8d9SAlexander V. Chernikov 		if (!can_export_rte(curthread->td_ucred,
1126d68fb8d9SAlexander V. Chernikov 		    info.rti_info[RTAX_NETMASK] == NULL,
1127d68fb8d9SAlexander V. Chernikov 		    info.rti_info[RTAX_DST])) {
1128813dd6aeSBjoern A. Zeeb 			senderr(ESRCH);
1129813dd6aeSBjoern A. Zeeb 		}
1130a287a973SAlexander V. Chernikov 
1131592d300eSAlexander V. Chernikov 		error = update_rtm_from_rc(&info, &rtm, alloc_len, &rc, nh);
1132c83dda36SAlexander V. Chernikov 		/*
1133c83dda36SAlexander V. Chernikov 		 * Note that some sockaddr pointers may have changed to
1134c83dda36SAlexander V. Chernikov 		 * point to memory outsize @rtm. Some may be pointing
1135c83dda36SAlexander V. Chernikov 		 * to the on-stack variables.
1136c83dda36SAlexander V. Chernikov 		 * Given that, any pointer in @info CANNOT BE USED.
1137c83dda36SAlexander V. Chernikov 		 */
1138c83dda36SAlexander V. Chernikov 
1139c83dda36SAlexander V. Chernikov 		/*
1140c83dda36SAlexander V. Chernikov 		 * scopeid deembedding has been performed while
1141c83dda36SAlexander V. Chernikov 		 * writing updated rtm in rtsock_msg_buffer().
1142c83dda36SAlexander V. Chernikov 		 * With that in mind, skip deembedding procedure below.
1143c83dda36SAlexander V. Chernikov 		 */
1144d9302031SAlexander V. Chernikov #ifdef INET6
1145c83dda36SAlexander V. Chernikov 		rti_need_deembed = 0;
1146d9302031SAlexander V. Chernikov #endif
1147c83dda36SAlexander V. Chernikov 		if (error != 0)
11489c79d243SJamie Gritton 			senderr(error);
1149df8bae1dSRodney W. Grimes 		break;
1150df8bae1dSRodney W. Grimes 
1151df8bae1dSRodney W. Grimes 	default:
1152df8bae1dSRodney W. Grimes 		senderr(EOPNOTSUPP);
1153df8bae1dSRodney W. Grimes 	}
1154df8bae1dSRodney W. Grimes 
1155df8bae1dSRodney W. Grimes flush:
1156b8a6e03fSGleb Smirnoff 	NET_EPOCH_EXIT(et);
11572bbab0afSAlexander V. Chernikov 	rt = NULL;
115892c227afSAlexander V. Chernikov 
11590bebb544SHiroki Sato #ifdef INET6
1160c83dda36SAlexander V. Chernikov 	if (rtm != NULL) {
11610bebb544SHiroki Sato 		if (rti_need_deembed) {
11620bebb544SHiroki Sato 			/* sin6_scope_id is recovered before sending rtm. */
11630bebb544SHiroki Sato 			sin6 = (struct sockaddr_in6 *)&ss;
116412bdf23aSHiroki Sato 			for (i = 0; i < RTAX_MAX; i++) {
11650bebb544SHiroki Sato 				if (info.rti_info[i] == NULL)
11660bebb544SHiroki Sato 					continue;
11670bebb544SHiroki Sato 				if (info.rti_info[i]->sa_family != AF_INET6)
11680bebb544SHiroki Sato 					continue;
11690bebb544SHiroki Sato 				bcopy(info.rti_info[i], sin6, sizeof(*sin6));
11700bebb544SHiroki Sato 				if (sa6_recoverscope(sin6) == 0)
11710bebb544SHiroki Sato 					bcopy(sin6, info.rti_info[i],
11720bebb544SHiroki Sato 						    sizeof(*sin6));
11730bebb544SHiroki Sato 			}
11740bebb544SHiroki Sato 		}
1175c83dda36SAlexander V. Chernikov 	}
11760bebb544SHiroki Sato #endif
1177c83dda36SAlexander V. Chernikov 	send_rtm_reply(so, rtm, m, saf, fibnum, error);
1178c83dda36SAlexander V. Chernikov 
1179c83dda36SAlexander V. Chernikov 	return (error);
1180c83dda36SAlexander V. Chernikov }
1181c83dda36SAlexander V. Chernikov 
1182c83dda36SAlexander V. Chernikov /*
1183c83dda36SAlexander V. Chernikov  * Sends the prepared reply message in @rtm to all rtsock clients.
1184c83dda36SAlexander V. Chernikov  * Frees @m and @rtm.
1185c83dda36SAlexander V. Chernikov  *
1186c83dda36SAlexander V. Chernikov  */
1187c83dda36SAlexander V. Chernikov static void
1188c83dda36SAlexander V. Chernikov send_rtm_reply(struct socket *so, struct rt_msghdr *rtm, struct mbuf *m,
1189c83dda36SAlexander V. Chernikov     sa_family_t saf, u_int fibnum, int rtm_errno)
1190c83dda36SAlexander V. Chernikov {
1191c83dda36SAlexander V. Chernikov 	struct rawcb *rp = NULL;
1192c83dda36SAlexander V. Chernikov 
1193c83dda36SAlexander V. Chernikov 	/*
1194c83dda36SAlexander V. Chernikov 	 * Check to see if we don't want our own messages.
1195c83dda36SAlexander V. Chernikov 	 */
1196c83dda36SAlexander V. Chernikov 	if ((so->so_options & SO_USELOOPBACK) == 0) {
1197c83dda36SAlexander V. Chernikov 		if (V_route_cb.any_count <= 1) {
1198c83dda36SAlexander V. Chernikov 			if (rtm != NULL)
1199c83dda36SAlexander V. Chernikov 				free(rtm, M_TEMP);
1200c83dda36SAlexander V. Chernikov 			m_freem(m);
1201c83dda36SAlexander V. Chernikov 			return;
1202c83dda36SAlexander V. Chernikov 		}
1203c83dda36SAlexander V. Chernikov 		/* There is another listener, so construct message */
1204c83dda36SAlexander V. Chernikov 		rp = sotorawcb(so);
1205c83dda36SAlexander V. Chernikov 	}
1206c83dda36SAlexander V. Chernikov 
1207c83dda36SAlexander V. Chernikov 	if (rtm != NULL) {
1208c83dda36SAlexander V. Chernikov 		if (rtm_errno!= 0)
1209c83dda36SAlexander V. Chernikov 			rtm->rtm_errno = rtm_errno;
121092c227afSAlexander V. Chernikov 		else
121192c227afSAlexander V. Chernikov 			rtm->rtm_flags |= RTF_DONE;
121292c227afSAlexander V. Chernikov 
1213df8bae1dSRodney W. Grimes 		m_copyback(m, 0, rtm->rtm_msglen, (caddr_t)rtm);
121403311056SHajimu UMEMOTO 		if (m->m_pkthdr.len < rtm->rtm_msglen) {
121503311056SHajimu UMEMOTO 			m_freem(m);
121603311056SHajimu UMEMOTO 			m = NULL;
121703311056SHajimu UMEMOTO 		} else if (m->m_pkthdr.len > rtm->rtm_msglen)
121803311056SHajimu UMEMOTO 			m_adj(m, rtm->rtm_msglen - m->m_pkthdr.len);
1219f2e5eb36SAlexander V. Chernikov 
1220f2e5eb36SAlexander V. Chernikov 		free(rtm, M_TEMP);
1221df8bae1dSRodney W. Grimes 	}
122292c227afSAlexander V. Chernikov 	if (m != NULL) {
1223773aa053SAlexander V. Chernikov 		M_SETFIB(m, fibnum);
1224528737fdSBjoern A. Zeeb 		m->m_flags |= RTS_FILTER_FIB;
1225becc44d7SSam Leffler 		if (rp) {
1226becc44d7SSam Leffler 			/*
1227becc44d7SSam Leffler 			 * XXX insure we don't get a copy by
1228becc44d7SSam Leffler 			 * invalidating our protocol
1229becc44d7SSam Leffler 			 */
1230becc44d7SSam Leffler 			unsigned short family = rp->rcb_proto.sp_family;
1231becc44d7SSam Leffler 			rp->rcb_proto.sp_family = 0;
12323ca1a2d6SMax Laier 			rt_dispatch(m, saf);
1233becc44d7SSam Leffler 			rp->rcb_proto.sp_family = family;
1234becc44d7SSam Leffler 		} else
12353ca1a2d6SMax Laier 			rt_dispatch(m, saf);
1236becc44d7SSam Leffler 	}
1237df8bae1dSRodney W. Grimes }
1238df8bae1dSRodney W. Grimes 
123952041295SPoul-Henning Kamp static void
124093bfd365SAlexander V. Chernikov rt_getmetrics(const struct rtentry *rt, const struct nhop_object *nh,
124193bfd365SAlexander V. Chernikov     struct rt_metrics *out)
124297d8d152SAndre Oppermann {
1243e3a7aa6fSGleb Smirnoff 
124497d8d152SAndre Oppermann 	bzero(out, sizeof(*out));
124593bfd365SAlexander V. Chernikov 	out->rmx_mtu = nh->nh_mtu;
1246e3a7aa6fSGleb Smirnoff 	out->rmx_weight = rt->rt_weight;
124793bfd365SAlexander V. Chernikov 	out->rmx_nhidx = nhop_get_idx(nh);
1248e27c3f48SOleg Bulyzhin 	/* Kernel -> userland timebase conversion. */
1249e3a7aa6fSGleb Smirnoff 	out->rmx_expire = rt->rt_expire ?
1250e3a7aa6fSGleb Smirnoff 	    rt->rt_expire - time_uptime + time_second : 0;
125197d8d152SAndre Oppermann }
125297d8d152SAndre Oppermann 
12537f33a738SJulian Elischer /*
12547f33a738SJulian Elischer  * Extract the addresses of the passed sockaddrs.
12557f33a738SJulian Elischer  * Do a little sanity checking so as to avoid bad memory references.
1256076d0761SJulian Elischer  * This data is derived straight from userland.
12577f33a738SJulian Elischer  */
1258076d0761SJulian Elischer static int
1259becc44d7SSam Leffler rt_xaddrs(caddr_t cp, caddr_t cplim, struct rt_addrinfo *rtinfo)
1260df8bae1dSRodney W. Grimes {
1261e74642dfSLuigi Rizzo 	struct sockaddr *sa;
1262e74642dfSLuigi Rizzo 	int i;
1263df8bae1dSRodney W. Grimes 
1264becc44d7SSam Leffler 	for (i = 0; i < RTAX_MAX && cp < cplim; i++) {
1265df8bae1dSRodney W. Grimes 		if ((rtinfo->rti_addrs & (1 << i)) == 0)
1266df8bae1dSRodney W. Grimes 			continue;
1267ff6d0a59SJulian Elischer 		sa = (struct sockaddr *)cp;
12687f33a738SJulian Elischer 		/*
1269076d0761SJulian Elischer 		 * It won't fit.
12707f33a738SJulian Elischer 		 */
1271becc44d7SSam Leffler 		if (cp + sa->sa_len > cplim)
1272076d0761SJulian Elischer 			return (EINVAL);
12737f33a738SJulian Elischer 		/*
12747f33a738SJulian Elischer 		 * there are no more.. quit now
12757f33a738SJulian Elischer 		 * If there are more bits, they are in error.
12767f33a738SJulian Elischer 		 * I've seen this. route(1) can evidently generate these.
12777f33a738SJulian Elischer 		 * This causes kernel to core dump.
1278076d0761SJulian Elischer 		 * for compatibility, If we see this, point to a safe address.
12797f33a738SJulian Elischer 		 */
1280076d0761SJulian Elischer 		if (sa->sa_len == 0) {
1281076d0761SJulian Elischer 			rtinfo->rti_info[i] = &sa_zero;
1282076d0761SJulian Elischer 			return (0); /* should be EINVAL but for compat */
1283df8bae1dSRodney W. Grimes 		}
1284076d0761SJulian Elischer 		/* accept it */
12850bebb544SHiroki Sato #ifdef INET6
12860bebb544SHiroki Sato 		if (sa->sa_family == AF_INET6)
12870bebb544SHiroki Sato 			sa6_embedscope((struct sockaddr_in6 *)sa,
12880bebb544SHiroki Sato 			    V_ip6_use_defzone);
12890bebb544SHiroki Sato #endif
1290076d0761SJulian Elischer 		rtinfo->rti_info[i] = sa;
1291e74642dfSLuigi Rizzo 		cp += SA_SIZE(sa);
1292076d0761SJulian Elischer 	}
1293076d0761SJulian Elischer 	return (0);
1294df8bae1dSRodney W. Grimes }
1295df8bae1dSRodney W. Grimes 
1296a4513bacSAlexander V. Chernikov #ifdef INET
12972fe5a794SAlexander V. Chernikov static inline void
12982fe5a794SAlexander V. Chernikov fill_sockaddr_inet(struct sockaddr_in *sin, struct in_addr addr)
12992fe5a794SAlexander V. Chernikov {
13002fe5a794SAlexander V. Chernikov 
13012fe5a794SAlexander V. Chernikov 	const struct sockaddr_in nsin = {
13022fe5a794SAlexander V. Chernikov 		.sin_family = AF_INET,
13032fe5a794SAlexander V. Chernikov 		.sin_len = sizeof(struct sockaddr_in),
13042fe5a794SAlexander V. Chernikov 		.sin_addr = addr,
13052fe5a794SAlexander V. Chernikov 	};
13062fe5a794SAlexander V. Chernikov 	*sin = nsin;
13072fe5a794SAlexander V. Chernikov }
1308a4513bacSAlexander V. Chernikov #endif
13092fe5a794SAlexander V. Chernikov 
1310a4513bacSAlexander V. Chernikov #ifdef INET6
13112fe5a794SAlexander V. Chernikov static inline void
13122fe5a794SAlexander V. Chernikov fill_sockaddr_inet6(struct sockaddr_in6 *sin6, const struct in6_addr *addr6,
13132fe5a794SAlexander V. Chernikov     uint32_t scopeid)
13142fe5a794SAlexander V. Chernikov {
13152fe5a794SAlexander V. Chernikov 
13162fe5a794SAlexander V. Chernikov 	const struct sockaddr_in6 nsin6 = {
13172fe5a794SAlexander V. Chernikov 		.sin6_family = AF_INET6,
13182fe5a794SAlexander V. Chernikov 		.sin6_len = sizeof(struct sockaddr_in6),
13192fe5a794SAlexander V. Chernikov 		.sin6_addr = *addr6,
13202fe5a794SAlexander V. Chernikov 		.sin6_scope_id = scopeid,
13212fe5a794SAlexander V. Chernikov 	};
13222fe5a794SAlexander V. Chernikov 	*sin6 = nsin6;
13232fe5a794SAlexander V. Chernikov }
1324a4513bacSAlexander V. Chernikov #endif
13252fe5a794SAlexander V. Chernikov 
1326e5b394f2SAlexander V. Chernikov /*
1327e5b394f2SAlexander V. Chernikov  * Checks if gateway is suitable for lltable operations.
1328e5b394f2SAlexander V. Chernikov  * Lltable code requires AF_LINK gateway with ifindex
1329e5b394f2SAlexander V. Chernikov  *  and mac address specified.
1330e5b394f2SAlexander V. Chernikov  * Returns 0 on success.
1331e5b394f2SAlexander V. Chernikov  */
1332e5b394f2SAlexander V. Chernikov static int
1333e5b394f2SAlexander V. Chernikov cleanup_xaddrs_lladdr(struct rt_addrinfo *info)
1334e5b394f2SAlexander V. Chernikov {
1335e5b394f2SAlexander V. Chernikov 	struct sockaddr_dl *sdl = (struct sockaddr_dl *)info->rti_info[RTAX_GATEWAY];
1336e5b394f2SAlexander V. Chernikov 
1337e5b394f2SAlexander V. Chernikov 	if (sdl->sdl_family != AF_LINK)
1338e5b394f2SAlexander V. Chernikov 		return (EINVAL);
1339e5b394f2SAlexander V. Chernikov 
1340e5b394f2SAlexander V. Chernikov 	if (sdl->sdl_index == 0)
1341e5b394f2SAlexander V. Chernikov 		return (EINVAL);
1342e5b394f2SAlexander V. Chernikov 
1343e5b394f2SAlexander V. Chernikov 	if (offsetof(struct sockaddr_dl, sdl_data) + sdl->sdl_nlen + sdl->sdl_alen > sdl->sdl_len)
1344e5b394f2SAlexander V. Chernikov 		return (EINVAL);
1345e5b394f2SAlexander V. Chernikov 
1346e5b394f2SAlexander V. Chernikov 	return (0);
1347e5b394f2SAlexander V. Chernikov }
1348e5b394f2SAlexander V. Chernikov 
13492fe5a794SAlexander V. Chernikov static int
13502fe5a794SAlexander V. Chernikov cleanup_xaddrs_gateway(struct rt_addrinfo *info)
13512fe5a794SAlexander V. Chernikov {
13522fe5a794SAlexander V. Chernikov 	struct sockaddr *gw = info->rti_info[RTAX_GATEWAY];
13532fe5a794SAlexander V. Chernikov 
1354e5b394f2SAlexander V. Chernikov 	if (info->rti_flags & RTF_LLDATA)
1355e5b394f2SAlexander V. Chernikov 		return (cleanup_xaddrs_lladdr(info));
1356e5b394f2SAlexander V. Chernikov 
13572fe5a794SAlexander V. Chernikov 	switch (gw->sa_family) {
13582fe5a794SAlexander V. Chernikov #ifdef INET
13592fe5a794SAlexander V. Chernikov 	case AF_INET:
13602fe5a794SAlexander V. Chernikov 		{
13612fe5a794SAlexander V. Chernikov 			struct sockaddr_in *gw_sin = (struct sockaddr_in *)gw;
13622fe5a794SAlexander V. Chernikov 			if (gw_sin->sin_len < sizeof(struct sockaddr_in)) {
13632fe5a794SAlexander V. Chernikov 				printf("gw sin_len too small\n");
13642fe5a794SAlexander V. Chernikov 				return (EINVAL);
13652fe5a794SAlexander V. Chernikov 			}
13662fe5a794SAlexander V. Chernikov 			fill_sockaddr_inet(gw_sin, gw_sin->sin_addr);
13672fe5a794SAlexander V. Chernikov 		}
13682fe5a794SAlexander V. Chernikov 		break;
13692fe5a794SAlexander V. Chernikov #endif
13702fe5a794SAlexander V. Chernikov #ifdef INET6
13712fe5a794SAlexander V. Chernikov 	case AF_INET6:
13722fe5a794SAlexander V. Chernikov 		{
13732fe5a794SAlexander V. Chernikov 			struct sockaddr_in6 *gw_sin6 = (struct sockaddr_in6 *)gw;
13742fe5a794SAlexander V. Chernikov 			if (gw_sin6->sin6_len < sizeof(struct sockaddr_in6)) {
13752fe5a794SAlexander V. Chernikov 				printf("gw sin6_len too small\n");
13762fe5a794SAlexander V. Chernikov 				return (EINVAL);
13772fe5a794SAlexander V. Chernikov 			}
13782fe5a794SAlexander V. Chernikov 			fill_sockaddr_inet6(gw_sin6, &gw_sin6->sin6_addr, 0);
13792fe5a794SAlexander V. Chernikov 			break;
13802fe5a794SAlexander V. Chernikov 		}
13812fe5a794SAlexander V. Chernikov #endif
13822fe5a794SAlexander V. Chernikov 	case AF_LINK:
13832fe5a794SAlexander V. Chernikov 		{
1384*7f5f3fccSAlexander V. Chernikov 			struct sockaddr_dl *gw_sdl;
13852fe5a794SAlexander V. Chernikov 
1386*7f5f3fccSAlexander V. Chernikov 			size_t sdl_min_len = offsetof(struct sockaddr_dl, sdl_data);
1387*7f5f3fccSAlexander V. Chernikov 			gw_sdl = (struct sockaddr_dl *)gw;
1388*7f5f3fccSAlexander V. Chernikov 			if (gw_sdl->sdl_len < sdl_min_len) {
13892fe5a794SAlexander V. Chernikov 				printf("gw sdl_len too small\n");
13902fe5a794SAlexander V. Chernikov 				return (EINVAL);
13912fe5a794SAlexander V. Chernikov 			}
13922fe5a794SAlexander V. Chernikov 
13932fe5a794SAlexander V. Chernikov 			const struct sockaddr_dl_short sdl = {
13942fe5a794SAlexander V. Chernikov 				.sdl_family = AF_LINK,
1395*7f5f3fccSAlexander V. Chernikov 				.sdl_len = sdl_min_len,
13962fe5a794SAlexander V. Chernikov 				.sdl_index = gw_sdl->sdl_index,
13972fe5a794SAlexander V. Chernikov 			};
1398*7f5f3fccSAlexander V. Chernikov 			memcpy(gw_sdl, &sdl, sdl_min_len);
13992fe5a794SAlexander V. Chernikov 			break;
14002fe5a794SAlexander V. Chernikov 		}
14012fe5a794SAlexander V. Chernikov 	}
14022fe5a794SAlexander V. Chernikov 
14032fe5a794SAlexander V. Chernikov 	return (0);
14042fe5a794SAlexander V. Chernikov }
14052fe5a794SAlexander V. Chernikov 
1406f9e1cd6cSAlexander V. Chernikov static void
1407f9e1cd6cSAlexander V. Chernikov remove_netmask(struct rt_addrinfo *info)
1408f9e1cd6cSAlexander V. Chernikov {
1409f9e1cd6cSAlexander V. Chernikov 	info->rti_info[RTAX_NETMASK] = NULL;
1410f9e1cd6cSAlexander V. Chernikov 	info->rti_flags |= RTF_HOST;
1411f9e1cd6cSAlexander V. Chernikov 	info->rti_addrs &= ~RTA_NETMASK;
1412f9e1cd6cSAlexander V. Chernikov }
1413f9e1cd6cSAlexander V. Chernikov 
1414a4513bacSAlexander V. Chernikov #ifdef INET
14152fe5a794SAlexander V. Chernikov static int
14162fe5a794SAlexander V. Chernikov cleanup_xaddrs_inet(struct rt_addrinfo *info)
14172fe5a794SAlexander V. Chernikov {
14182fe5a794SAlexander V. Chernikov 	struct sockaddr_in *dst_sa, *mask_sa;
14192fe5a794SAlexander V. Chernikov 
14202fe5a794SAlexander V. Chernikov 	/* Check & fixup dst/netmask combination first */
14212fe5a794SAlexander V. Chernikov 	dst_sa = (struct sockaddr_in *)info->rti_info[RTAX_DST];
14222fe5a794SAlexander V. Chernikov 	mask_sa = (struct sockaddr_in *)info->rti_info[RTAX_NETMASK];
14232fe5a794SAlexander V. Chernikov 
14242fe5a794SAlexander V. Chernikov 	struct in_addr mask = {
14252fe5a794SAlexander V. Chernikov 		.s_addr = mask_sa ? mask_sa->sin_addr.s_addr : INADDR_BROADCAST,
14262fe5a794SAlexander V. Chernikov 	};
14272fe5a794SAlexander V. Chernikov 	struct in_addr dst = {
14282fe5a794SAlexander V. Chernikov 		.s_addr = htonl(ntohl(dst_sa->sin_addr.s_addr) & ntohl(mask.s_addr))
14292fe5a794SAlexander V. Chernikov 	};
14302fe5a794SAlexander V. Chernikov 
14312fe5a794SAlexander V. Chernikov 	if (dst_sa->sin_len < sizeof(struct sockaddr_in)) {
14322fe5a794SAlexander V. Chernikov 		printf("dst sin_len too small\n");
14332fe5a794SAlexander V. Chernikov 		return (EINVAL);
14342fe5a794SAlexander V. Chernikov 	}
14352fe5a794SAlexander V. Chernikov 	if (mask_sa && mask_sa->sin_len < sizeof(struct sockaddr_in)) {
14362fe5a794SAlexander V. Chernikov 		printf("mask sin_len too small\n");
14372fe5a794SAlexander V. Chernikov 		return (EINVAL);
14382fe5a794SAlexander V. Chernikov 	}
14392fe5a794SAlexander V. Chernikov 	fill_sockaddr_inet(dst_sa, dst);
14402fe5a794SAlexander V. Chernikov 
14412fe5a794SAlexander V. Chernikov 	if (mask.s_addr != INADDR_BROADCAST)
14422fe5a794SAlexander V. Chernikov 		fill_sockaddr_inet(mask_sa, mask);
1443f9e1cd6cSAlexander V. Chernikov 	else
1444f9e1cd6cSAlexander V. Chernikov 		remove_netmask(info);
14452fe5a794SAlexander V. Chernikov 
14462fe5a794SAlexander V. Chernikov 	/* Check gateway */
14472fe5a794SAlexander V. Chernikov 	if (info->rti_info[RTAX_GATEWAY] != NULL)
14482fe5a794SAlexander V. Chernikov 		return (cleanup_xaddrs_gateway(info));
14492fe5a794SAlexander V. Chernikov 
14502fe5a794SAlexander V. Chernikov 	return (0);
14512fe5a794SAlexander V. Chernikov }
1452a4513bacSAlexander V. Chernikov #endif
14532fe5a794SAlexander V. Chernikov 
1454a4513bacSAlexander V. Chernikov #ifdef INET6
14552fe5a794SAlexander V. Chernikov static int
14562fe5a794SAlexander V. Chernikov cleanup_xaddrs_inet6(struct rt_addrinfo *info)
14572fe5a794SAlexander V. Chernikov {
14582fe5a794SAlexander V. Chernikov 	struct sockaddr_in6 *dst_sa, *mask_sa;
14592fe5a794SAlexander V. Chernikov 	struct in6_addr mask;
14602fe5a794SAlexander V. Chernikov 
14612fe5a794SAlexander V. Chernikov 	/* Check & fixup dst/netmask combination first */
14622fe5a794SAlexander V. Chernikov 	dst_sa = (struct sockaddr_in6 *)info->rti_info[RTAX_DST];
14632fe5a794SAlexander V. Chernikov 	mask_sa = (struct sockaddr_in6 *)info->rti_info[RTAX_NETMASK];
14642fe5a794SAlexander V. Chernikov 
14652fe5a794SAlexander V. Chernikov 	mask = mask_sa ? mask_sa->sin6_addr : in6mask128;
14662fe5a794SAlexander V. Chernikov 	IN6_MASK_ADDR(&dst_sa->sin6_addr, &mask);
14672fe5a794SAlexander V. Chernikov 
14682fe5a794SAlexander V. Chernikov 	if (dst_sa->sin6_len < sizeof(struct sockaddr_in6)) {
14692fe5a794SAlexander V. Chernikov 		printf("dst sin6_len too small\n");
14702fe5a794SAlexander V. Chernikov 		return (EINVAL);
14712fe5a794SAlexander V. Chernikov 	}
14722fe5a794SAlexander V. Chernikov 	if (mask_sa && mask_sa->sin6_len < sizeof(struct sockaddr_in6)) {
14732fe5a794SAlexander V. Chernikov 		printf("mask sin6_len too small\n");
14742fe5a794SAlexander V. Chernikov 		return (EINVAL);
14752fe5a794SAlexander V. Chernikov 	}
14762fe5a794SAlexander V. Chernikov 	fill_sockaddr_inet6(dst_sa, &dst_sa->sin6_addr, 0);
14772fe5a794SAlexander V. Chernikov 
14782fe5a794SAlexander V. Chernikov 	if (!IN6_ARE_ADDR_EQUAL(&mask, &in6mask128))
14792fe5a794SAlexander V. Chernikov 		fill_sockaddr_inet6(mask_sa, &mask, 0);
1480f9e1cd6cSAlexander V. Chernikov 	else
1481f9e1cd6cSAlexander V. Chernikov 		remove_netmask(info);
14822fe5a794SAlexander V. Chernikov 
14832fe5a794SAlexander V. Chernikov 	/* Check gateway */
14842fe5a794SAlexander V. Chernikov 	if (info->rti_info[RTAX_GATEWAY] != NULL)
14852fe5a794SAlexander V. Chernikov 		return (cleanup_xaddrs_gateway(info));
14862fe5a794SAlexander V. Chernikov 
14872fe5a794SAlexander V. Chernikov 	return (0);
14882fe5a794SAlexander V. Chernikov }
1489a4513bacSAlexander V. Chernikov #endif
14902fe5a794SAlexander V. Chernikov 
14912fe5a794SAlexander V. Chernikov static int
14922fe5a794SAlexander V. Chernikov cleanup_xaddrs(struct rt_addrinfo *info)
14932fe5a794SAlexander V. Chernikov {
14942fe5a794SAlexander V. Chernikov 	int error = EAFNOSUPPORT;
14952fe5a794SAlexander V. Chernikov 
14962fe5a794SAlexander V. Chernikov 	if (info->rti_info[RTAX_DST] == NULL)
14972fe5a794SAlexander V. Chernikov 		return (EINVAL);
14982fe5a794SAlexander V. Chernikov 
1499f9e1cd6cSAlexander V. Chernikov 	if (info->rti_flags & RTF_LLDATA) {
1500f9e1cd6cSAlexander V. Chernikov 		/*
1501f9e1cd6cSAlexander V. Chernikov 		 * arp(8)/ndp(8) sends RTA_NETMASK for the associated
1502f9e1cd6cSAlexander V. Chernikov 		 * prefix along with the actual address in RTA_DST.
1503f9e1cd6cSAlexander V. Chernikov 		 * Remove netmask to avoid unnecessary address masking.
1504f9e1cd6cSAlexander V. Chernikov 		 */
1505f9e1cd6cSAlexander V. Chernikov 		remove_netmask(info);
1506f9e1cd6cSAlexander V. Chernikov 	}
1507f9e1cd6cSAlexander V. Chernikov 
15082fe5a794SAlexander V. Chernikov 	switch (info->rti_info[RTAX_DST]->sa_family) {
15092fe5a794SAlexander V. Chernikov #ifdef INET
15102fe5a794SAlexander V. Chernikov 	case AF_INET:
15112fe5a794SAlexander V. Chernikov 		error = cleanup_xaddrs_inet(info);
15122fe5a794SAlexander V. Chernikov 		break;
15132fe5a794SAlexander V. Chernikov #endif
15142fe5a794SAlexander V. Chernikov #ifdef INET6
15152fe5a794SAlexander V. Chernikov 	case AF_INET6:
15162fe5a794SAlexander V. Chernikov 		error = cleanup_xaddrs_inet6(info);
15172fe5a794SAlexander V. Chernikov 		break;
15182fe5a794SAlexander V. Chernikov #endif
15192fe5a794SAlexander V. Chernikov 	}
15202fe5a794SAlexander V. Chernikov 
15212fe5a794SAlexander V. Chernikov 	return (error);
15222fe5a794SAlexander V. Chernikov }
15232fe5a794SAlexander V. Chernikov 
15246d076ae8SBjoern A. Zeeb /*
15253deb3649SAlexander V. Chernikov  * Fill in @dmask with valid netmask leaving original @smask
15263deb3649SAlexander V. Chernikov  * intact. Mostly used with radix netmasks.
15273deb3649SAlexander V. Chernikov  */
1528fc88ecd3SAlexander V. Chernikov struct sockaddr *
1529fc88ecd3SAlexander V. Chernikov rtsock_fix_netmask(const struct sockaddr *dst, const struct sockaddr *smask,
15303deb3649SAlexander V. Chernikov     struct sockaddr_storage *dmask)
15313deb3649SAlexander V. Chernikov {
15323deb3649SAlexander V. Chernikov 	if (dst == NULL || smask == NULL)
15333deb3649SAlexander V. Chernikov 		return (NULL);
15343deb3649SAlexander V. Chernikov 
15353deb3649SAlexander V. Chernikov 	memset(dmask, 0, dst->sa_len);
15363deb3649SAlexander V. Chernikov 	memcpy(dmask, smask, smask->sa_len);
15373deb3649SAlexander V. Chernikov 	dmask->ss_len = dst->sa_len;
15383deb3649SAlexander V. Chernikov 	dmask->ss_family = dst->sa_family;
15393deb3649SAlexander V. Chernikov 
15403deb3649SAlexander V. Chernikov 	return ((struct sockaddr *)dmask);
15413deb3649SAlexander V. Chernikov }
15423deb3649SAlexander V. Chernikov 
15433deb3649SAlexander V. Chernikov /*
15446db47af4SAlexander V. Chernikov  * Writes information related to @rtinfo object to newly-allocated mbuf.
15456db47af4SAlexander V. Chernikov  * Assumes MCLBYTES is enough to construct any message.
15466db47af4SAlexander V. Chernikov  * Used for OS notifications of vaious events (if/ifa announces,etc)
15476db47af4SAlexander V. Chernikov  *
15486db47af4SAlexander V. Chernikov  * Returns allocated mbuf or NULL on failure.
15496d076ae8SBjoern A. Zeeb  */
1550df8bae1dSRodney W. Grimes static struct mbuf *
15516db47af4SAlexander V. Chernikov rtsock_msg_mbuf(int type, struct rt_addrinfo *rtinfo)
1552df8bae1dSRodney W. Grimes {
155392be2847SMark Johnston 	struct sockaddr_storage ss;
15545dfc91d7SLuigi Rizzo 	struct rt_msghdr *rtm;
15555dfc91d7SLuigi Rizzo 	struct mbuf *m;
15565dfc91d7SLuigi Rizzo 	int i;
15575dfc91d7SLuigi Rizzo 	struct sockaddr *sa;
15586bbfef90SHiroki Sato #ifdef INET6
15596bbfef90SHiroki Sato 	struct sockaddr_in6 *sin6;
15606bbfef90SHiroki Sato #endif
1561df8bae1dSRodney W. Grimes 	int len, dlen;
1562df8bae1dSRodney W. Grimes 
1563df8bae1dSRodney W. Grimes 	switch (type) {
1564df8bae1dSRodney W. Grimes 	case RTM_DELADDR:
1565df8bae1dSRodney W. Grimes 	case RTM_NEWADDR:
1566df8bae1dSRodney W. Grimes 		len = sizeof(struct ifa_msghdr);
1567df8bae1dSRodney W. Grimes 		break;
1568df8bae1dSRodney W. Grimes 
1569477180fbSGarrett Wollman 	case RTM_DELMADDR:
1570477180fbSGarrett Wollman 	case RTM_NEWMADDR:
1571477180fbSGarrett Wollman 		len = sizeof(struct ifma_msghdr);
1572477180fbSGarrett Wollman 		break;
1573477180fbSGarrett Wollman 
1574df8bae1dSRodney W. Grimes 	case RTM_IFINFO:
1575df8bae1dSRodney W. Grimes 		len = sizeof(struct if_msghdr);
1576df8bae1dSRodney W. Grimes 		break;
1577df8bae1dSRodney W. Grimes 
15787b6edd04SRuslan Ermilov 	case RTM_IFANNOUNCE:
1579b83a279fSSam Leffler 	case RTM_IEEE80211:
15807b6edd04SRuslan Ermilov 		len = sizeof(struct if_announcemsghdr);
15817b6edd04SRuslan Ermilov 		break;
15827b6edd04SRuslan Ermilov 
1583df8bae1dSRodney W. Grimes 	default:
1584df8bae1dSRodney W. Grimes 		len = sizeof(struct rt_msghdr);
1585df8bae1dSRodney W. Grimes 	}
1586c69f77c3SGleb Smirnoff 
1587c69f77c3SGleb Smirnoff 	/* XXXGL: can we use MJUMPAGESIZE cluster here? */
1588c69f77c3SGleb Smirnoff 	KASSERT(len <= MCLBYTES, ("%s: message too big", __func__));
1589c69f77c3SGleb Smirnoff 	if (len > MHLEN)
1590c69f77c3SGleb Smirnoff 		m = m_getcl(M_NOWAIT, MT_DATA, M_PKTHDR);
1591c69f77c3SGleb Smirnoff 	else
1592eb1b1807SGleb Smirnoff 		m = m_gethdr(M_NOWAIT, MT_DATA);
15935dfc91d7SLuigi Rizzo 	if (m == NULL)
159433841545SHajimu UMEMOTO 		return (m);
1595c69f77c3SGleb Smirnoff 
1596df8bae1dSRodney W. Grimes 	m->m_pkthdr.len = m->m_len = len;
1597df8bae1dSRodney W. Grimes 	rtm = mtod(m, struct rt_msghdr *);
1598df8bae1dSRodney W. Grimes 	bzero((caddr_t)rtm, len);
1599df8bae1dSRodney W. Grimes 	for (i = 0; i < RTAX_MAX; i++) {
1600df8bae1dSRodney W. Grimes 		if ((sa = rtinfo->rti_info[i]) == NULL)
1601df8bae1dSRodney W. Grimes 			continue;
1602df8bae1dSRodney W. Grimes 		rtinfo->rti_addrs |= (1 << i);
160392be2847SMark Johnston 
1604e74642dfSLuigi Rizzo 		dlen = SA_SIZE(sa);
160592be2847SMark Johnston 		KASSERT(dlen <= sizeof(ss),
160692be2847SMark Johnston 		    ("%s: sockaddr size overflow", __func__));
160792be2847SMark Johnston 		bzero(&ss, sizeof(ss));
160892be2847SMark Johnston 		bcopy(sa, &ss, sa->sa_len);
160992be2847SMark Johnston 		sa = (struct sockaddr *)&ss;
16106bbfef90SHiroki Sato #ifdef INET6
1611bec053ffSAlexander V. Chernikov 		if (sa->sa_family == AF_INET6) {
161292be2847SMark Johnston 			sin6 = (struct sockaddr_in6 *)sa;
161392be2847SMark Johnston 			(void)sa6_recoverscope(sin6);
16146bbfef90SHiroki Sato 		}
16156bbfef90SHiroki Sato #endif
1616df8bae1dSRodney W. Grimes 		m_copyback(m, len, dlen, (caddr_t)sa);
1617df8bae1dSRodney W. Grimes 		len += dlen;
1618df8bae1dSRodney W. Grimes 	}
1619df8bae1dSRodney W. Grimes 	if (m->m_pkthdr.len != len) {
1620df8bae1dSRodney W. Grimes 		m_freem(m);
1621df8bae1dSRodney W. Grimes 		return (NULL);
1622df8bae1dSRodney W. Grimes 	}
1623df8bae1dSRodney W. Grimes 	rtm->rtm_msglen = len;
1624df8bae1dSRodney W. Grimes 	rtm->rtm_version = RTM_VERSION;
1625df8bae1dSRodney W. Grimes 	rtm->rtm_type = type;
1626df8bae1dSRodney W. Grimes 	return (m);
1627df8bae1dSRodney W. Grimes }
1628df8bae1dSRodney W. Grimes 
16296d076ae8SBjoern A. Zeeb /*
1630f2e5eb36SAlexander V. Chernikov  * Writes information related to @rtinfo object to preallocated buffer.
1631f2e5eb36SAlexander V. Chernikov  * Stores needed size in @plen. If @w is NULL, calculates size without
1632f2e5eb36SAlexander V. Chernikov  * writing.
1633f2e5eb36SAlexander V. Chernikov  * Used for sysctl dumps and rtsock answers (RTM_DEL/RTM_GET) generation.
1634f2e5eb36SAlexander V. Chernikov  *
1635f2e5eb36SAlexander V. Chernikov  * Returns 0 on success.
1636f2e5eb36SAlexander V. Chernikov  *
16376d076ae8SBjoern A. Zeeb  */
1638df8bae1dSRodney W. Grimes static int
1639f2e5eb36SAlexander V. Chernikov rtsock_msg_buffer(int type, struct rt_addrinfo *rtinfo, struct walkarg *w, int *plen)
1640df8bae1dSRodney W. Grimes {
164192be2847SMark Johnston 	struct sockaddr_storage ss;
164292be2847SMark Johnston 	int len, buflen = 0, dlen, i;
1643de46b2c6SAlexander V. Chernikov 	caddr_t cp = NULL;
1644f2e5eb36SAlexander V. Chernikov 	struct rt_msghdr *rtm = NULL;
16456bbfef90SHiroki Sato #ifdef INET6
16466bbfef90SHiroki Sato 	struct sockaddr_in6 *sin6;
16476bbfef90SHiroki Sato #endif
1648279e33d4SKonstantin Belousov #ifdef COMPAT_FREEBSD32
1649279e33d4SKonstantin Belousov 	bool compat32 = false;
1650279e33d4SKonstantin Belousov #endif
1651df8bae1dSRodney W. Grimes 
1652df8bae1dSRodney W. Grimes 	switch (type) {
1653df8bae1dSRodney W. Grimes 	case RTM_DELADDR:
1654df8bae1dSRodney W. Grimes 	case RTM_NEWADDR:
16556d076ae8SBjoern A. Zeeb 		if (w != NULL && w->w_op == NET_RT_IFLISTL) {
16566d076ae8SBjoern A. Zeeb #ifdef COMPAT_FREEBSD32
1657279e33d4SKonstantin Belousov 			if (w->w_req->flags & SCTL_MASK32) {
16586d076ae8SBjoern A. Zeeb 				len = sizeof(struct ifa_msghdrl32);
1659279e33d4SKonstantin Belousov 				compat32 = true;
1660279e33d4SKonstantin Belousov 			} else
16616d076ae8SBjoern A. Zeeb #endif
16626d076ae8SBjoern A. Zeeb 				len = sizeof(struct ifa_msghdrl);
16636d076ae8SBjoern A. Zeeb 		} else
1664df8bae1dSRodney W. Grimes 			len = sizeof(struct ifa_msghdr);
1665df8bae1dSRodney W. Grimes 		break;
1666df8bae1dSRodney W. Grimes 
1667df8bae1dSRodney W. Grimes 	case RTM_IFINFO:
1668427a928aSKonstantin Belousov #ifdef COMPAT_FREEBSD32
1669427a928aSKonstantin Belousov 		if (w != NULL && w->w_req->flags & SCTL_MASK32) {
16706d076ae8SBjoern A. Zeeb 			if (w->w_op == NET_RT_IFLISTL)
16716d076ae8SBjoern A. Zeeb 				len = sizeof(struct if_msghdrl32);
16726d076ae8SBjoern A. Zeeb 			else
1673427a928aSKonstantin Belousov 				len = sizeof(struct if_msghdr32);
1674279e33d4SKonstantin Belousov 			compat32 = true;
1675427a928aSKonstantin Belousov 			break;
1676427a928aSKonstantin Belousov 		}
1677427a928aSKonstantin Belousov #endif
16786d076ae8SBjoern A. Zeeb 		if (w != NULL && w->w_op == NET_RT_IFLISTL)
16796d076ae8SBjoern A. Zeeb 			len = sizeof(struct if_msghdrl);
16806d076ae8SBjoern A. Zeeb 		else
1681df8bae1dSRodney W. Grimes 			len = sizeof(struct if_msghdr);
1682df8bae1dSRodney W. Grimes 		break;
1683df8bae1dSRodney W. Grimes 
168405b2efe0SBruce M Simpson 	case RTM_NEWMADDR:
168505b2efe0SBruce M Simpson 		len = sizeof(struct ifma_msghdr);
168605b2efe0SBruce M Simpson 		break;
168705b2efe0SBruce M Simpson 
1688df8bae1dSRodney W. Grimes 	default:
1689df8bae1dSRodney W. Grimes 		len = sizeof(struct rt_msghdr);
1690df8bae1dSRodney W. Grimes 	}
1691f2e5eb36SAlexander V. Chernikov 
1692f2e5eb36SAlexander V. Chernikov 	if (w != NULL) {
1693f2e5eb36SAlexander V. Chernikov 		rtm = (struct rt_msghdr *)w->w_tmem;
1694f2e5eb36SAlexander V. Chernikov 		buflen = w->w_tmemsize - len;
1695f2e5eb36SAlexander V. Chernikov 		cp = (caddr_t)w->w_tmem + len;
1696f2e5eb36SAlexander V. Chernikov 	}
1697f2e5eb36SAlexander V. Chernikov 
1698f2e5eb36SAlexander V. Chernikov 	rtinfo->rti_addrs = 0;
1699df8bae1dSRodney W. Grimes 	for (i = 0; i < RTAX_MAX; i++) {
17005dfc91d7SLuigi Rizzo 		struct sockaddr *sa;
1701df8bae1dSRodney W. Grimes 
17025dfc91d7SLuigi Rizzo 		if ((sa = rtinfo->rti_info[i]) == NULL)
1703df8bae1dSRodney W. Grimes 			continue;
1704df8bae1dSRodney W. Grimes 		rtinfo->rti_addrs |= (1 << i);
1705279e33d4SKonstantin Belousov #ifdef COMPAT_FREEBSD32
1706279e33d4SKonstantin Belousov 		if (compat32)
1707279e33d4SKonstantin Belousov 			dlen = SA_SIZE32(sa);
1708279e33d4SKonstantin Belousov 		else
1709279e33d4SKonstantin Belousov #endif
1710e74642dfSLuigi Rizzo 			dlen = SA_SIZE(sa);
1711f2e5eb36SAlexander V. Chernikov 		if (cp != NULL && buflen >= dlen) {
171292be2847SMark Johnston 			KASSERT(dlen <= sizeof(ss),
171392be2847SMark Johnston 			    ("%s: sockaddr size overflow", __func__));
171492be2847SMark Johnston 			bzero(&ss, sizeof(ss));
171592be2847SMark Johnston 			bcopy(sa, &ss, sa->sa_len);
171692be2847SMark Johnston 			sa = (struct sockaddr *)&ss;
17176bbfef90SHiroki Sato #ifdef INET6
1718bec053ffSAlexander V. Chernikov 			if (sa->sa_family == AF_INET6) {
171992be2847SMark Johnston 				sin6 = (struct sockaddr_in6 *)sa;
172092be2847SMark Johnston 				(void)sa6_recoverscope(sin6);
17216bbfef90SHiroki Sato 			}
17226bbfef90SHiroki Sato #endif
1723df8bae1dSRodney W. Grimes 			bcopy((caddr_t)sa, cp, (unsigned)dlen);
1724df8bae1dSRodney W. Grimes 			cp += dlen;
1725f2e5eb36SAlexander V. Chernikov 			buflen -= dlen;
1726f2e5eb36SAlexander V. Chernikov 		} else if (cp != NULL) {
1727f2e5eb36SAlexander V. Chernikov 			/*
1728f2e5eb36SAlexander V. Chernikov 			 * Buffer too small. Count needed size
1729f2e5eb36SAlexander V. Chernikov 			 * and return with error.
1730f2e5eb36SAlexander V. Chernikov 			 */
1731f2e5eb36SAlexander V. Chernikov 			cp = NULL;
1732df8bae1dSRodney W. Grimes 		}
1733f2e5eb36SAlexander V. Chernikov 
1734df8bae1dSRodney W. Grimes 		len += dlen;
1735df8bae1dSRodney W. Grimes 	}
1736f2e5eb36SAlexander V. Chernikov 
1737f2e5eb36SAlexander V. Chernikov 	if (cp != NULL) {
1738f2e5eb36SAlexander V. Chernikov 		dlen = ALIGN(len) - len;
1739f2e5eb36SAlexander V. Chernikov 		if (buflen < dlen)
1740f2e5eb36SAlexander V. Chernikov 			cp = NULL;
1741d25f8522SMark Johnston 		else {
1742d25f8522SMark Johnston 			bzero(cp, dlen);
1743d25f8522SMark Johnston 			cp += dlen;
1744f2e5eb36SAlexander V. Chernikov 			buflen -= dlen;
1745f2e5eb36SAlexander V. Chernikov 		}
1746d25f8522SMark Johnston 	}
1747694ff264SAndrew Gallatin 	len = ALIGN(len);
1748df8bae1dSRodney W. Grimes 
1749f2e5eb36SAlexander V. Chernikov 	if (cp != NULL) {
1750f2e5eb36SAlexander V. Chernikov 		/* fill header iff buffer is large enough */
1751df8bae1dSRodney W. Grimes 		rtm->rtm_version = RTM_VERSION;
1752df8bae1dSRodney W. Grimes 		rtm->rtm_type = type;
1753df8bae1dSRodney W. Grimes 		rtm->rtm_msglen = len;
1754df8bae1dSRodney W. Grimes 	}
1755f2e5eb36SAlexander V. Chernikov 
1756f2e5eb36SAlexander V. Chernikov 	*plen = len;
1757f2e5eb36SAlexander V. Chernikov 
1758f2e5eb36SAlexander V. Chernikov 	if (w != NULL && cp == NULL)
1759f2e5eb36SAlexander V. Chernikov 		return (ENOBUFS);
1760f2e5eb36SAlexander V. Chernikov 
1761f2e5eb36SAlexander V. Chernikov 	return (0);
1762df8bae1dSRodney W. Grimes }
1763df8bae1dSRodney W. Grimes 
1764df8bae1dSRodney W. Grimes /*
1765df8bae1dSRodney W. Grimes  * This routine is called to generate a message from the routing
1766a4641f4eSPedro F. Giffuni  * socket indicating that a redirect has occurred, a routing lookup
1767df8bae1dSRodney W. Grimes  * has failed, or that a protocol has detected timeouts to a particular
1768df8bae1dSRodney W. Grimes  * destination.
1769df8bae1dSRodney W. Grimes  */
1770df8bae1dSRodney W. Grimes void
1771528737fdSBjoern A. Zeeb rt_missmsg_fib(int type, struct rt_addrinfo *rtinfo, int flags, int error,
1772528737fdSBjoern A. Zeeb     int fibnum)
1773df8bae1dSRodney W. Grimes {
1774becc44d7SSam Leffler 	struct rt_msghdr *rtm;
1775becc44d7SSam Leffler 	struct mbuf *m;
1776df8bae1dSRodney W. Grimes 	struct sockaddr *sa = rtinfo->rti_info[RTAX_DST];
1777df8bae1dSRodney W. Grimes 
1778c5d4eab6SMarko Zec 	if (V_route_cb.any_count == 0)
1779df8bae1dSRodney W. Grimes 		return;
17806db47af4SAlexander V. Chernikov 	m = rtsock_msg_mbuf(type, rtinfo);
17815dfc91d7SLuigi Rizzo 	if (m == NULL)
1782df8bae1dSRodney W. Grimes 		return;
1783528737fdSBjoern A. Zeeb 
17847d9b6df1SAlexander V. Chernikov 	if (fibnum != RT_ALL_FIBS) {
1785528737fdSBjoern A. Zeeb 		KASSERT(fibnum >= 0 && fibnum < rt_numfibs, ("%s: fibnum out "
1786528737fdSBjoern A. Zeeb 		    "of range 0 <= %d < %d", __func__, fibnum, rt_numfibs));
1787528737fdSBjoern A. Zeeb 		M_SETFIB(m, fibnum);
1788528737fdSBjoern A. Zeeb 		m->m_flags |= RTS_FILTER_FIB;
1789528737fdSBjoern A. Zeeb 	}
1790528737fdSBjoern A. Zeeb 
1791df8bae1dSRodney W. Grimes 	rtm = mtod(m, struct rt_msghdr *);
1792df8bae1dSRodney W. Grimes 	rtm->rtm_flags = RTF_DONE | flags;
1793df8bae1dSRodney W. Grimes 	rtm->rtm_errno = error;
1794df8bae1dSRodney W. Grimes 	rtm->rtm_addrs = rtinfo->rti_addrs;
17953ca1a2d6SMax Laier 	rt_dispatch(m, sa ? sa->sa_family : AF_UNSPEC);
1796df8bae1dSRodney W. Grimes }
1797df8bae1dSRodney W. Grimes 
1798528737fdSBjoern A. Zeeb void
1799528737fdSBjoern A. Zeeb rt_missmsg(int type, struct rt_addrinfo *rtinfo, int flags, int error)
1800528737fdSBjoern A. Zeeb {
1801528737fdSBjoern A. Zeeb 
18027d9b6df1SAlexander V. Chernikov 	rt_missmsg_fib(type, rtinfo, flags, error, RT_ALL_FIBS);
1803528737fdSBjoern A. Zeeb }
1804528737fdSBjoern A. Zeeb 
1805df8bae1dSRodney W. Grimes /*
1806df8bae1dSRodney W. Grimes  * This routine is called to generate a message from the routing
1807df8bae1dSRodney W. Grimes  * socket indicating that the status of a network interface has changed.
1808df8bae1dSRodney W. Grimes  */
1809df8bae1dSRodney W. Grimes void
1810becc44d7SSam Leffler rt_ifmsg(struct ifnet *ifp)
1811df8bae1dSRodney W. Grimes {
1812becc44d7SSam Leffler 	struct if_msghdr *ifm;
1813df8bae1dSRodney W. Grimes 	struct mbuf *m;
1814df8bae1dSRodney W. Grimes 	struct rt_addrinfo info;
1815df8bae1dSRodney W. Grimes 
1816c5d4eab6SMarko Zec 	if (V_route_cb.any_count == 0)
1817df8bae1dSRodney W. Grimes 		return;
1818df8bae1dSRodney W. Grimes 	bzero((caddr_t)&info, sizeof(info));
18196db47af4SAlexander V. Chernikov 	m = rtsock_msg_mbuf(RTM_IFINFO, &info);
18205dfc91d7SLuigi Rizzo 	if (m == NULL)
1821df8bae1dSRodney W. Grimes 		return;
1822df8bae1dSRodney W. Grimes 	ifm = mtod(m, struct if_msghdr *);
1823df8bae1dSRodney W. Grimes 	ifm->ifm_index = ifp->if_index;
1824292ee7beSRobert Watson 	ifm->ifm_flags = ifp->if_flags | ifp->if_drv_flags;
1825e6485f73SGleb Smirnoff 	if_data_copy(ifp, &ifm->ifm_data);
1826df8bae1dSRodney W. Grimes 	ifm->ifm_addrs = 0;
18273ca1a2d6SMax Laier 	rt_dispatch(m, AF_UNSPEC);
1828df8bae1dSRodney W. Grimes }
1829df8bae1dSRodney W. Grimes 
1830df8bae1dSRodney W. Grimes /*
18314cbac30bSAlexander V. Chernikov  * Announce interface address arrival/withdraw.
18324cbac30bSAlexander V. Chernikov  * Please do not call directly, use rt_addrmsg().
18334cbac30bSAlexander V. Chernikov  * Assume input data to be valid.
18344cbac30bSAlexander V. Chernikov  * Returns 0 on success.
1835df8bae1dSRodney W. Grimes  */
18364cbac30bSAlexander V. Chernikov int
18374cbac30bSAlexander V. Chernikov rtsock_addrmsg(int cmd, struct ifaddr *ifa, int fibnum)
1838df8bae1dSRodney W. Grimes {
1839df8bae1dSRodney W. Grimes 	struct rt_addrinfo info;
18404cbac30bSAlexander V. Chernikov 	struct sockaddr *sa;
18414cbac30bSAlexander V. Chernikov 	int ncmd;
18424cbac30bSAlexander V. Chernikov 	struct mbuf *m;
18434cbac30bSAlexander V. Chernikov 	struct ifa_msghdr *ifam;
1844df8bae1dSRodney W. Grimes 	struct ifnet *ifp = ifa->ifa_ifp;
18453deb3649SAlexander V. Chernikov 	struct sockaddr_storage ss;
1846df8bae1dSRodney W. Grimes 
1847c5d4eab6SMarko Zec 	if (V_route_cb.any_count == 0)
18484cbac30bSAlexander V. Chernikov 		return (0);
1849df8bae1dSRodney W. Grimes 
18504cbac30bSAlexander V. Chernikov 	ncmd = cmd == RTM_ADD ? RTM_NEWADDR : RTM_DELADDR;
18514cbac30bSAlexander V. Chernikov 
18524cbac30bSAlexander V. Chernikov 	bzero((caddr_t)&info, sizeof(info));
1853becc44d7SSam Leffler 	info.rti_info[RTAX_IFA] = sa = ifa->ifa_addr;
18544a0d6638SRuslan Ermilov 	info.rti_info[RTAX_IFP] = ifp->if_addr->ifa_addr;
18553deb3649SAlexander V. Chernikov 	info.rti_info[RTAX_NETMASK] = rtsock_fix_netmask(
1856e02d3fe7SAlexander V. Chernikov 	    info.rti_info[RTAX_IFA], ifa->ifa_netmask, &ss);
1857becc44d7SSam Leffler 	info.rti_info[RTAX_BRD] = ifa->ifa_dstaddr;
18586db47af4SAlexander V. Chernikov 	if ((m = rtsock_msg_mbuf(ncmd, &info)) == NULL)
18594cbac30bSAlexander V. Chernikov 		return (ENOBUFS);
1860df8bae1dSRodney W. Grimes 	ifam = mtod(m, struct ifa_msghdr *);
1861df8bae1dSRodney W. Grimes 	ifam->ifam_index = ifp->if_index;
18629753faf5SGleb Smirnoff 	ifam->ifam_metric = ifa->ifa_ifp->if_metric;
1863df8bae1dSRodney W. Grimes 	ifam->ifam_flags = ifa->ifa_flags;
1864df8bae1dSRodney W. Grimes 	ifam->ifam_addrs = info.rti_addrs;
18654cbac30bSAlexander V. Chernikov 
18664cbac30bSAlexander V. Chernikov 	if (fibnum != RT_ALL_FIBS) {
18674cbac30bSAlexander V. Chernikov 		M_SETFIB(m, fibnum);
18684cbac30bSAlexander V. Chernikov 		m->m_flags |= RTS_FILTER_FIB;
1869df8bae1dSRodney W. Grimes 	}
18704cbac30bSAlexander V. Chernikov 
18714cbac30bSAlexander V. Chernikov 	rt_dispatch(m, sa ? sa->sa_family : AF_UNSPEC);
18724cbac30bSAlexander V. Chernikov 
18734cbac30bSAlexander V. Chernikov 	return (0);
18744cbac30bSAlexander V. Chernikov }
18754cbac30bSAlexander V. Chernikov 
18764cbac30bSAlexander V. Chernikov /*
1877e02d3fe7SAlexander V. Chernikov  * Announce route addition/removal to rtsock based on @rt data.
1878e02d3fe7SAlexander V. Chernikov  * Callers are advives to use rt_routemsg() instead of using this
1879e02d3fe7SAlexander V. Chernikov  *  function directly.
1880e02d3fe7SAlexander V. Chernikov  * Assume @rt data is consistent.
18814cbac30bSAlexander V. Chernikov  *
18824cbac30bSAlexander V. Chernikov  * Returns 0 on success.
18834cbac30bSAlexander V. Chernikov  */
18844cbac30bSAlexander V. Chernikov int
1885d68cf57bSAlexander V. Chernikov rtsock_routemsg(int cmd, struct rtentry *rt, struct nhop_object *nh,
18864cbac30bSAlexander V. Chernikov     int fibnum)
18874cbac30bSAlexander V. Chernikov {
1888d68cf57bSAlexander V. Chernikov 	union sockaddr_union dst, mask;
1889e02d3fe7SAlexander V. Chernikov 	struct rt_addrinfo info;
1890df8bae1dSRodney W. Grimes 
1891c5d4eab6SMarko Zec 	if (V_route_cb.any_count == 0)
18924cbac30bSAlexander V. Chernikov 		return (0);
18934cbac30bSAlexander V. Chernikov 
1894d68cf57bSAlexander V. Chernikov 	int family = rt_get_family(rt);
1895d68cf57bSAlexander V. Chernikov 	init_sockaddrs_family(family, &dst.sa, &mask.sa);
1896d68cf57bSAlexander V. Chernikov 	export_rtaddrs(rt, &dst.sa, &mask.sa);
1897d68cf57bSAlexander V. Chernikov 
18984cbac30bSAlexander V. Chernikov 	bzero((caddr_t)&info, sizeof(info));
1899d68cf57bSAlexander V. Chernikov 	info.rti_info[RTAX_DST] = &dst.sa;
1900d68cf57bSAlexander V. Chernikov 	info.rti_info[RTAX_NETMASK] = &mask.sa;
190193bfd365SAlexander V. Chernikov 	info.rti_info[RTAX_GATEWAY] = &nh->gw_sa;
190293bfd365SAlexander V. Chernikov 	info.rti_flags = rt->rte_flags | nhop_get_rtflags(nh);
1903d68cf57bSAlexander V. Chernikov 	info.rti_ifp = nh->nh_ifp;
1904e02d3fe7SAlexander V. Chernikov 
1905e02d3fe7SAlexander V. Chernikov 	return (rtsock_routemsg_info(cmd, &info, fibnum));
1906e02d3fe7SAlexander V. Chernikov }
1907e02d3fe7SAlexander V. Chernikov 
1908e02d3fe7SAlexander V. Chernikov int
1909e02d3fe7SAlexander V. Chernikov rtsock_routemsg_info(int cmd, struct rt_addrinfo *info, int fibnum)
1910e02d3fe7SAlexander V. Chernikov {
1911e02d3fe7SAlexander V. Chernikov 	struct rt_msghdr *rtm;
1912e02d3fe7SAlexander V. Chernikov 	struct sockaddr *sa;
1913e02d3fe7SAlexander V. Chernikov 	struct mbuf *m;
1914e02d3fe7SAlexander V. Chernikov 
1915e02d3fe7SAlexander V. Chernikov 	if (V_route_cb.any_count == 0)
1916e02d3fe7SAlexander V. Chernikov 		return (0);
1917e02d3fe7SAlexander V. Chernikov 
1918e02d3fe7SAlexander V. Chernikov 	if (info->rti_flags & RTF_HOST)
1919e02d3fe7SAlexander V. Chernikov 		info->rti_info[RTAX_NETMASK] = NULL;
1920e02d3fe7SAlexander V. Chernikov 
1921e02d3fe7SAlexander V. Chernikov 	m = rtsock_msg_mbuf(cmd, info);
1922e02d3fe7SAlexander V. Chernikov 	if (m == NULL)
19234cbac30bSAlexander V. Chernikov 		return (ENOBUFS);
19244cbac30bSAlexander V. Chernikov 
19257d9b6df1SAlexander V. Chernikov 	if (fibnum != RT_ALL_FIBS) {
1926e02d3fe7SAlexander V. Chernikov 		KASSERT(fibnum >= 0 && fibnum < rt_numfibs, ("%s: fibnum out "
1927e02d3fe7SAlexander V. Chernikov 		    "of range 0 <= %d < %d", __func__, fibnum, rt_numfibs));
1928528737fdSBjoern A. Zeeb 		M_SETFIB(m, fibnum);
1929528737fdSBjoern A. Zeeb 		m->m_flags |= RTS_FILTER_FIB;
1930528737fdSBjoern A. Zeeb 	}
19314cbac30bSAlexander V. Chernikov 
1932e02d3fe7SAlexander V. Chernikov 	rtm = mtod(m, struct rt_msghdr *);
1933e02d3fe7SAlexander V. Chernikov 	rtm->rtm_addrs = info->rti_addrs;
1934e02d3fe7SAlexander V. Chernikov 	if (info->rti_ifp != NULL)
1935e02d3fe7SAlexander V. Chernikov 		rtm->rtm_index = info->rti_ifp->if_index;
1936e02d3fe7SAlexander V. Chernikov 	/* Add RTF_DONE to indicate command 'completion' required by API */
1937e02d3fe7SAlexander V. Chernikov 	info->rti_flags |= RTF_DONE;
1938e02d3fe7SAlexander V. Chernikov 	/* Reported routes has to be up */
1939e02d3fe7SAlexander V. Chernikov 	if (cmd == RTM_ADD || cmd == RTM_CHANGE)
1940e02d3fe7SAlexander V. Chernikov 		info->rti_flags |= RTF_UP;
1941e02d3fe7SAlexander V. Chernikov 	rtm->rtm_flags = info->rti_flags;
1942e02d3fe7SAlexander V. Chernikov 
1943e02d3fe7SAlexander V. Chernikov 	sa = info->rti_info[RTAX_DST];
19443ca1a2d6SMax Laier 	rt_dispatch(m, sa ? sa->sa_family : AF_UNSPEC);
19454cbac30bSAlexander V. Chernikov 
19464cbac30bSAlexander V. Chernikov 	return (0);
1947df8bae1dSRodney W. Grimes }
1948df8bae1dSRodney W. Grimes 
1949477180fbSGarrett Wollman /*
1950477180fbSGarrett Wollman  * This is the analogue to the rt_newaddrmsg which performs the same
1951477180fbSGarrett Wollman  * function but for multicast group memberhips.  This is easier since
1952477180fbSGarrett Wollman  * there is no route state to worry about.
1953477180fbSGarrett Wollman  */
1954477180fbSGarrett Wollman void
1955becc44d7SSam Leffler rt_newmaddrmsg(int cmd, struct ifmultiaddr *ifma)
1956477180fbSGarrett Wollman {
1957477180fbSGarrett Wollman 	struct rt_addrinfo info;
19585dfc91d7SLuigi Rizzo 	struct mbuf *m = NULL;
1959477180fbSGarrett Wollman 	struct ifnet *ifp = ifma->ifma_ifp;
1960477180fbSGarrett Wollman 	struct ifma_msghdr *ifmam;
1961477180fbSGarrett Wollman 
1962c5d4eab6SMarko Zec 	if (V_route_cb.any_count == 0)
1963477180fbSGarrett Wollman 		return;
1964477180fbSGarrett Wollman 
1965477180fbSGarrett Wollman 	bzero((caddr_t)&info, sizeof(info));
1966becc44d7SSam Leffler 	info.rti_info[RTAX_IFA] = ifma->ifma_addr;
19677edd877aSMatt Macy 	if (ifp && ifp->if_addr)
19687edd877aSMatt Macy 		info.rti_info[RTAX_IFP] = ifp->if_addr->ifa_addr;
19697edd877aSMatt Macy 	else
19707edd877aSMatt Macy 		info.rti_info[RTAX_IFP] = NULL;
1971477180fbSGarrett Wollman 	/*
1972477180fbSGarrett Wollman 	 * If a link-layer address is present, present it as a ``gateway''
1973477180fbSGarrett Wollman 	 * (similarly to how ARP entries, e.g., are presented).
1974477180fbSGarrett Wollman 	 */
1975becc44d7SSam Leffler 	info.rti_info[RTAX_GATEWAY] = ifma->ifma_lladdr;
19766db47af4SAlexander V. Chernikov 	m = rtsock_msg_mbuf(cmd, &info);
1977becc44d7SSam Leffler 	if (m == NULL)
1978477180fbSGarrett Wollman 		return;
1979477180fbSGarrett Wollman 	ifmam = mtod(m, struct ifma_msghdr *);
198075ae0c01SBruce M Simpson 	KASSERT(ifp != NULL, ("%s: link-layer multicast address w/o ifp\n",
198175ae0c01SBruce M Simpson 	    __func__));
1982477180fbSGarrett Wollman 	ifmam->ifmam_index = ifp->if_index;
1983477180fbSGarrett Wollman 	ifmam->ifmam_addrs = info.rti_addrs;
19843ca1a2d6SMax Laier 	rt_dispatch(m, ifma->ifma_addr ? ifma->ifma_addr->sa_family : AF_UNSPEC);
1985477180fbSGarrett Wollman }
198652041295SPoul-Henning Kamp 
1987b83a279fSSam Leffler static struct mbuf *
1988b83a279fSSam Leffler rt_makeifannouncemsg(struct ifnet *ifp, int type, int what,
1989b83a279fSSam Leffler 	struct rt_addrinfo *info)
1990b83a279fSSam Leffler {
1991b83a279fSSam Leffler 	struct if_announcemsghdr *ifan;
1992b83a279fSSam Leffler 	struct mbuf *m;
1993b83a279fSSam Leffler 
1994c5d4eab6SMarko Zec 	if (V_route_cb.any_count == 0)
1995b83a279fSSam Leffler 		return NULL;
1996b83a279fSSam Leffler 	bzero((caddr_t)info, sizeof(*info));
19976db47af4SAlexander V. Chernikov 	m = rtsock_msg_mbuf(type, info);
1998b83a279fSSam Leffler 	if (m != NULL) {
1999b83a279fSSam Leffler 		ifan = mtod(m, struct if_announcemsghdr *);
2000b83a279fSSam Leffler 		ifan->ifan_index = ifp->if_index;
2001b83a279fSSam Leffler 		strlcpy(ifan->ifan_name, ifp->if_xname,
2002b83a279fSSam Leffler 			sizeof(ifan->ifan_name));
2003b83a279fSSam Leffler 		ifan->ifan_what = what;
2004b83a279fSSam Leffler 	}
2005b83a279fSSam Leffler 	return m;
2006b83a279fSSam Leffler }
2007b83a279fSSam Leffler 
2008b83a279fSSam Leffler /*
2009b83a279fSSam Leffler  * This is called to generate routing socket messages indicating
2010b83a279fSSam Leffler  * IEEE80211 wireless events.
2011b83a279fSSam Leffler  * XXX we piggyback on the RTM_IFANNOUNCE msg format in a clumsy way.
2012b83a279fSSam Leffler  */
2013b83a279fSSam Leffler void
2014b83a279fSSam Leffler rt_ieee80211msg(struct ifnet *ifp, int what, void *data, size_t data_len)
2015b83a279fSSam Leffler {
2016b83a279fSSam Leffler 	struct mbuf *m;
2017b83a279fSSam Leffler 	struct rt_addrinfo info;
2018b83a279fSSam Leffler 
2019b83a279fSSam Leffler 	m = rt_makeifannouncemsg(ifp, RTM_IEEE80211, what, &info);
2020b83a279fSSam Leffler 	if (m != NULL) {
2021b83a279fSSam Leffler 		/*
2022b83a279fSSam Leffler 		 * Append the ieee80211 data.  Try to stick it in the
2023b83a279fSSam Leffler 		 * mbuf containing the ifannounce msg; otherwise allocate
2024b83a279fSSam Leffler 		 * a new mbuf and append.
2025b83a279fSSam Leffler 		 *
2026b83a279fSSam Leffler 		 * NB: we assume m is a single mbuf.
2027b83a279fSSam Leffler 		 */
2028b83a279fSSam Leffler 		if (data_len > M_TRAILINGSPACE(m)) {
2029b83a279fSSam Leffler 			struct mbuf *n = m_get(M_NOWAIT, MT_DATA);
2030b83a279fSSam Leffler 			if (n == NULL) {
2031b83a279fSSam Leffler 				m_freem(m);
2032b83a279fSSam Leffler 				return;
2033b83a279fSSam Leffler 			}
2034b83a279fSSam Leffler 			bcopy(data, mtod(n, void *), data_len);
2035b83a279fSSam Leffler 			n->m_len = data_len;
2036b83a279fSSam Leffler 			m->m_next = n;
2037b83a279fSSam Leffler 		} else if (data_len > 0) {
2038b83a279fSSam Leffler 			bcopy(data, mtod(m, u_int8_t *) + m->m_len, data_len);
2039b83a279fSSam Leffler 			m->m_len += data_len;
2040b83a279fSSam Leffler 		}
2041b83a279fSSam Leffler 		if (m->m_flags & M_PKTHDR)
2042b83a279fSSam Leffler 			m->m_pkthdr.len += data_len;
2043b83a279fSSam Leffler 		mtod(m, struct if_announcemsghdr *)->ifan_msglen += data_len;
20443ca1a2d6SMax Laier 		rt_dispatch(m, AF_UNSPEC);
2045b83a279fSSam Leffler 	}
2046b83a279fSSam Leffler }
2047b83a279fSSam Leffler 
2048df8bae1dSRodney W. Grimes /*
20497b6edd04SRuslan Ermilov  * This is called to generate routing socket messages indicating
20507b6edd04SRuslan Ermilov  * network interface arrival and departure.
20517b6edd04SRuslan Ermilov  */
20527b6edd04SRuslan Ermilov void
2053becc44d7SSam Leffler rt_ifannouncemsg(struct ifnet *ifp, int what)
20547b6edd04SRuslan Ermilov {
20557b6edd04SRuslan Ermilov 	struct mbuf *m;
20567b6edd04SRuslan Ermilov 	struct rt_addrinfo info;
20577b6edd04SRuslan Ermilov 
2058b83a279fSSam Leffler 	m = rt_makeifannouncemsg(ifp, RTM_IFANNOUNCE, what, &info);
2059b83a279fSSam Leffler 	if (m != NULL)
20603ca1a2d6SMax Laier 		rt_dispatch(m, AF_UNSPEC);
2061becc44d7SSam Leffler }
2062becc44d7SSam Leffler 
2063becc44d7SSam Leffler static void
20643ca1a2d6SMax Laier rt_dispatch(struct mbuf *m, sa_family_t saf)
2065becc44d7SSam Leffler {
2066d989c7b3SRobert Watson 	struct m_tag *tag;
2067becc44d7SSam Leffler 
2068d989c7b3SRobert Watson 	/*
2069d989c7b3SRobert Watson 	 * Preserve the family from the sockaddr, if any, in an m_tag for
2070d989c7b3SRobert Watson 	 * use when injecting the mbuf into the routing socket buffer from
2071d989c7b3SRobert Watson 	 * the netisr.
2072d989c7b3SRobert Watson 	 */
20733ca1a2d6SMax Laier 	if (saf != AF_UNSPEC) {
2074d989c7b3SRobert Watson 		tag = m_tag_get(PACKET_TAG_RTSOCKFAM, sizeof(unsigned short),
2075d989c7b3SRobert Watson 		    M_NOWAIT);
2076d989c7b3SRobert Watson 		if (tag == NULL) {
2077d989c7b3SRobert Watson 			m_freem(m);
2078d989c7b3SRobert Watson 			return;
2079d989c7b3SRobert Watson 		}
20803ca1a2d6SMax Laier 		*(unsigned short *)(tag + 1) = saf;
2081d989c7b3SRobert Watson 		m_tag_prepend(m, tag);
2082d989c7b3SRobert Watson 	}
208321ca7b57SMarko Zec #ifdef VIMAGE
208421ca7b57SMarko Zec 	if (V_loif)
208521ca7b57SMarko Zec 		m->m_pkthdr.rcvif = V_loif;
208621ca7b57SMarko Zec 	else {
208721ca7b57SMarko Zec 		m_freem(m);
208821ca7b57SMarko Zec 		return;
208921ca7b57SMarko Zec 	}
209021ca7b57SMarko Zec #endif
20913161f583SAndre Oppermann 	netisr_queue(NETISR_ROUTE, m);	/* mbuf is free'd on failure. */
20927b6edd04SRuslan Ermilov }
20937b6edd04SRuslan Ermilov 
20947b6edd04SRuslan Ermilov /*
2095c83dda36SAlexander V. Chernikov  * Checks if rte can be exported v.r.t jails/vnets.
2096c83dda36SAlexander V. Chernikov  *
2097c83dda36SAlexander V. Chernikov  * Returns 1 if it can, 0 otherwise.
2098c83dda36SAlexander V. Chernikov  */
2099d68fb8d9SAlexander V. Chernikov static bool
2100d68fb8d9SAlexander V. Chernikov can_export_rte(struct ucred *td_ucred, bool rt_is_host,
2101d68fb8d9SAlexander V. Chernikov     const struct sockaddr *rt_dst)
2102c83dda36SAlexander V. Chernikov {
2103c83dda36SAlexander V. Chernikov 
2104d68fb8d9SAlexander V. Chernikov 	if ((!rt_is_host) ? jailed_without_vnet(td_ucred)
2105d68fb8d9SAlexander V. Chernikov 	    : prison_if(td_ucred, rt_dst) != 0)
2106d68fb8d9SAlexander V. Chernikov 		return (false);
2107d68fb8d9SAlexander V. Chernikov 	return (true);
2108c83dda36SAlexander V. Chernikov }
2109c83dda36SAlexander V. Chernikov 
2110d68fb8d9SAlexander V. Chernikov 
2111c83dda36SAlexander V. Chernikov /*
2112df8bae1dSRodney W. Grimes  * This is used in dumping the kernel table via sysctl().
2113df8bae1dSRodney W. Grimes  */
211437c84183SPoul-Henning Kamp static int
2115d68fb8d9SAlexander V. Chernikov sysctl_dumpentry(struct rtentry *rt, void *vw)
2116df8bae1dSRodney W. Grimes {
2117becc44d7SSam Leffler 	struct walkarg *w = vw;
21188c61eb21SAlexander V. Chernikov 	struct nhop_object *nh;
21192259a030SAlexander V. Chernikov 	int error = 0;
2120df8bae1dSRodney W. Grimes 
2121a68cc388SGleb Smirnoff 	NET_EPOCH_ASSERT();
2122a716ad4aSAndrey V. Elsukov 
2123d68fb8d9SAlexander V. Chernikov 	export_rtaddrs(rt, w->dst, w->mask);
2124d68fb8d9SAlexander V. Chernikov 	if (!can_export_rte(w->w_req->td->td_ucred, rt_is_host(rt), w->dst))
2125813dd6aeSBjoern A. Zeeb 		return (0);
2126d68fb8d9SAlexander V. Chernikov 	nh = rt_get_raw_nhop(rt);
2127fedeb08bSAlexander V. Chernikov #ifdef ROUTE_MPATH
2128fedeb08bSAlexander V. Chernikov 	if (NH_IS_NHGRP(nh)) {
2129fedeb08bSAlexander V. Chernikov 		struct weightened_nhop *wn;
2130fedeb08bSAlexander V. Chernikov 		uint32_t num_nhops;
2131fedeb08bSAlexander V. Chernikov 		wn = nhgrp_get_nhops((struct nhgrp_object *)nh, &num_nhops);
2132fedeb08bSAlexander V. Chernikov 		for (int i = 0; i < num_nhops; i++) {
2133fedeb08bSAlexander V. Chernikov 			error = sysctl_dumpnhop(rt, wn[i].nh, wn[i].weight, w);
2134fedeb08bSAlexander V. Chernikov 			if (error != 0)
2135fedeb08bSAlexander V. Chernikov 				return (error);
2136fedeb08bSAlexander V. Chernikov 		}
2137fedeb08bSAlexander V. Chernikov 	} else
2138fedeb08bSAlexander V. Chernikov #endif
21392259a030SAlexander V. Chernikov 		error = sysctl_dumpnhop(rt, nh, rt->rt_weight, w);
21402259a030SAlexander V. Chernikov 
21412259a030SAlexander V. Chernikov 	return (0);
21422259a030SAlexander V. Chernikov }
21432259a030SAlexander V. Chernikov 
21442259a030SAlexander V. Chernikov 
21452259a030SAlexander V. Chernikov static int
21462259a030SAlexander V. Chernikov sysctl_dumpnhop(struct rtentry *rt, struct nhop_object *nh, uint32_t weight,
21472259a030SAlexander V. Chernikov     struct walkarg *w)
21482259a030SAlexander V. Chernikov {
21492259a030SAlexander V. Chernikov 	struct rt_addrinfo info;
21502259a030SAlexander V. Chernikov 	int error = 0, size;
2151d68fb8d9SAlexander V. Chernikov 	uint32_t rtflags;
2152d68fb8d9SAlexander V. Chernikov 
2153d68fb8d9SAlexander V. Chernikov 	rtflags = nhop_get_rtflags(nh);
2154d68fb8d9SAlexander V. Chernikov 
2155d68fb8d9SAlexander V. Chernikov 	if (w->w_op == NET_RT_FLAGS && !(rtflags & w->w_arg))
2156d68fb8d9SAlexander V. Chernikov 		return (0);
21572259a030SAlexander V. Chernikov 
2158df8bae1dSRodney W. Grimes 	bzero((caddr_t)&info, sizeof(info));
2159d68fb8d9SAlexander V. Chernikov 	info.rti_info[RTAX_DST] = w->dst;
216093bfd365SAlexander V. Chernikov 	info.rti_info[RTAX_GATEWAY] = &nh->gw_sa;
2161d68fb8d9SAlexander V. Chernikov 	info.rti_info[RTAX_NETMASK] = (rtflags & RTF_HOST) ? NULL : w->mask;
21626e6b3f7cSQing Li 	info.rti_info[RTAX_GENMASK] = 0;
21638c61eb21SAlexander V. Chernikov 	if (nh->nh_ifp && !(nh->nh_ifp->if_flags & IFF_DYING)) {
21648c61eb21SAlexander V. Chernikov 		info.rti_info[RTAX_IFP] = nh->nh_ifp->if_addr->ifa_addr;
21658c61eb21SAlexander V. Chernikov 		info.rti_info[RTAX_IFA] = nh->nh_ifa->ifa_addr;
21668c61eb21SAlexander V. Chernikov 		if (nh->nh_ifp->if_flags & IFF_POINTOPOINT)
21678c61eb21SAlexander V. Chernikov 			info.rti_info[RTAX_BRD] = nh->nh_ifa->ifa_dstaddr;
216828070a0eSRuslan Ermilov 	}
2169f2e5eb36SAlexander V. Chernikov 	if ((error = rtsock_msg_buffer(RTM_GET, &info, w, &size)) != 0)
2170f2e5eb36SAlexander V. Chernikov 		return (error);
217152041295SPoul-Henning Kamp 	if (w->w_req && w->w_tmem) {
2172becc44d7SSam Leffler 		struct rt_msghdr *rtm = (struct rt_msghdr *)w->w_tmem;
2173df8bae1dSRodney W. Grimes 
2174d25f8522SMark Johnston 		bzero(&rtm->rtm_index,
2175d25f8522SMark Johnston 		    sizeof(*rtm) - offsetof(struct rt_msghdr, rtm_index));
2176d68fb8d9SAlexander V. Chernikov 
2177d68fb8d9SAlexander V. Chernikov 		/*
2178d68fb8d9SAlexander V. Chernikov 		 * rte flags may consist of RTF_HOST (duplicated in nhop rtflags)
2179d68fb8d9SAlexander V. Chernikov 		 * and RTF_UP (if entry is linked, which is always true here).
2180d68fb8d9SAlexander V. Chernikov 		 * Given that, use nhop rtflags & add RTF_UP.
2181d68fb8d9SAlexander V. Chernikov 		 */
2182d68fb8d9SAlexander V. Chernikov 		rtm->rtm_flags = rtflags | RTF_UP;
2183d68fb8d9SAlexander V. Chernikov 		if (rtm->rtm_flags & RTF_GWFLAG_COMPAT)
2184f672f56fSQing Li 			rtm->rtm_flags = RTF_GATEWAY |
2185d68fb8d9SAlexander V. Chernikov 				(rtm->rtm_flags & ~RTF_GWFLAG_COMPAT);
218693bfd365SAlexander V. Chernikov 		rt_getmetrics(rt, nh, &rtm->rtm_rmx);
2187fedeb08bSAlexander V. Chernikov 		rtm->rtm_rmx.rmx_weight = weight;
21888c61eb21SAlexander V. Chernikov 		rtm->rtm_index = nh->nh_ifp->if_index;
2189df8bae1dSRodney W. Grimes 		rtm->rtm_addrs = info.rti_addrs;
219052041295SPoul-Henning Kamp 		error = SYSCTL_OUT(w->w_req, (caddr_t)rtm, size);
219152041295SPoul-Henning Kamp 		return (error);
2192df8bae1dSRodney W. Grimes 	}
2193df8bae1dSRodney W. Grimes 	return (error);
2194df8bae1dSRodney W. Grimes }
2195df8bae1dSRodney W. Grimes 
219637c84183SPoul-Henning Kamp static int
2197ab607f28SRyan Stone sysctl_iflist_ifml(struct ifnet *ifp, const struct if_data *src_ifd,
2198ab607f28SRyan Stone     struct rt_addrinfo *info, struct walkarg *w, int len)
21996d076ae8SBjoern A. Zeeb {
22006d076ae8SBjoern A. Zeeb 	struct if_msghdrl *ifm;
2201b245f96cSGleb Smirnoff 	struct if_data *ifd;
2202b245f96cSGleb Smirnoff 
2203b245f96cSGleb Smirnoff 	ifm = (struct if_msghdrl *)w->w_tmem;
22046d076ae8SBjoern A. Zeeb 
22056d076ae8SBjoern A. Zeeb #ifdef COMPAT_FREEBSD32
22066d076ae8SBjoern A. Zeeb 	if (w->w_req->flags & SCTL_MASK32) {
22076d076ae8SBjoern A. Zeeb 		struct if_msghdrl32 *ifm32;
22086d076ae8SBjoern A. Zeeb 
2209b245f96cSGleb Smirnoff 		ifm32 = (struct if_msghdrl32 *)ifm;
22106d076ae8SBjoern A. Zeeb 		ifm32->ifm_addrs = info->rti_addrs;
22116d076ae8SBjoern A. Zeeb 		ifm32->ifm_flags = ifp->if_flags | ifp->if_drv_flags;
22126d076ae8SBjoern A. Zeeb 		ifm32->ifm_index = ifp->if_index;
22136d076ae8SBjoern A. Zeeb 		ifm32->_ifm_spare1 = 0;
22146d076ae8SBjoern A. Zeeb 		ifm32->ifm_len = sizeof(*ifm32);
22156d076ae8SBjoern A. Zeeb 		ifm32->ifm_data_off = offsetof(struct if_msghdrl32, ifm_data);
2216d25f8522SMark Johnston 		ifm32->_ifm_spare2 = 0;
2217b245f96cSGleb Smirnoff 		ifd = &ifm32->ifm_data;
2218b245f96cSGleb Smirnoff 	} else
22196d076ae8SBjoern A. Zeeb #endif
2220b245f96cSGleb Smirnoff 	{
22216d076ae8SBjoern A. Zeeb 		ifm->ifm_addrs = info->rti_addrs;
22226d076ae8SBjoern A. Zeeb 		ifm->ifm_flags = ifp->if_flags | ifp->if_drv_flags;
22236d076ae8SBjoern A. Zeeb 		ifm->ifm_index = ifp->if_index;
22246d076ae8SBjoern A. Zeeb 		ifm->_ifm_spare1 = 0;
22256d076ae8SBjoern A. Zeeb 		ifm->ifm_len = sizeof(*ifm);
22266d076ae8SBjoern A. Zeeb 		ifm->ifm_data_off = offsetof(struct if_msghdrl, ifm_data);
2227d25f8522SMark Johnston 		ifm->_ifm_spare2 = 0;
2228b245f96cSGleb Smirnoff 		ifd = &ifm->ifm_data;
2229b245f96cSGleb Smirnoff 	}
22306d076ae8SBjoern A. Zeeb 
2231ab607f28SRyan Stone 	memcpy(ifd, src_ifd, sizeof(*ifd));
2232b245f96cSGleb Smirnoff 
22336d076ae8SBjoern A. Zeeb 	return (SYSCTL_OUT(w->w_req, (caddr_t)ifm, len));
22346d076ae8SBjoern A. Zeeb }
22356d076ae8SBjoern A. Zeeb 
22366d076ae8SBjoern A. Zeeb static int
2237ab607f28SRyan Stone sysctl_iflist_ifm(struct ifnet *ifp, const struct if_data *src_ifd,
2238ab607f28SRyan Stone     struct rt_addrinfo *info, struct walkarg *w, int len)
22396d076ae8SBjoern A. Zeeb {
22406d076ae8SBjoern A. Zeeb 	struct if_msghdr *ifm;
2241b245f96cSGleb Smirnoff 	struct if_data *ifd;
2242b245f96cSGleb Smirnoff 
2243b245f96cSGleb Smirnoff 	ifm = (struct if_msghdr *)w->w_tmem;
22446d076ae8SBjoern A. Zeeb 
22456d076ae8SBjoern A. Zeeb #ifdef COMPAT_FREEBSD32
22466d076ae8SBjoern A. Zeeb 	if (w->w_req->flags & SCTL_MASK32) {
22476d076ae8SBjoern A. Zeeb 		struct if_msghdr32 *ifm32;
22486d076ae8SBjoern A. Zeeb 
2249b245f96cSGleb Smirnoff 		ifm32 = (struct if_msghdr32 *)ifm;
22506d076ae8SBjoern A. Zeeb 		ifm32->ifm_addrs = info->rti_addrs;
22516d076ae8SBjoern A. Zeeb 		ifm32->ifm_flags = ifp->if_flags | ifp->if_drv_flags;
22526d076ae8SBjoern A. Zeeb 		ifm32->ifm_index = ifp->if_index;
2253d25f8522SMark Johnston 		ifm32->_ifm_spare1 = 0;
2254b245f96cSGleb Smirnoff 		ifd = &ifm32->ifm_data;
2255b245f96cSGleb Smirnoff 	} else
22566d076ae8SBjoern A. Zeeb #endif
2257b245f96cSGleb Smirnoff 	{
22586d076ae8SBjoern A. Zeeb 		ifm->ifm_addrs = info->rti_addrs;
22596d076ae8SBjoern A. Zeeb 		ifm->ifm_flags = ifp->if_flags | ifp->if_drv_flags;
22606d076ae8SBjoern A. Zeeb 		ifm->ifm_index = ifp->if_index;
2261d25f8522SMark Johnston 		ifm->_ifm_spare1 = 0;
2262b245f96cSGleb Smirnoff 		ifd = &ifm->ifm_data;
2263b245f96cSGleb Smirnoff 	}
22646d076ae8SBjoern A. Zeeb 
2265ab607f28SRyan Stone 	memcpy(ifd, src_ifd, sizeof(*ifd));
22662d70c0deSGleb Smirnoff 
22676d076ae8SBjoern A. Zeeb 	return (SYSCTL_OUT(w->w_req, (caddr_t)ifm, len));
22686d076ae8SBjoern A. Zeeb }
22696d076ae8SBjoern A. Zeeb 
22706d076ae8SBjoern A. Zeeb static int
22716d076ae8SBjoern A. Zeeb sysctl_iflist_ifaml(struct ifaddr *ifa, struct rt_addrinfo *info,
22726d076ae8SBjoern A. Zeeb     struct walkarg *w, int len)
22736d076ae8SBjoern A. Zeeb {
22746d076ae8SBjoern A. Zeeb 	struct ifa_msghdrl *ifam;
2275b245f96cSGleb Smirnoff 	struct if_data *ifd;
2276b245f96cSGleb Smirnoff 
2277b245f96cSGleb Smirnoff 	ifam = (struct ifa_msghdrl *)w->w_tmem;
22786d076ae8SBjoern A. Zeeb 
22796d076ae8SBjoern A. Zeeb #ifdef COMPAT_FREEBSD32
22806d076ae8SBjoern A. Zeeb 	if (w->w_req->flags & SCTL_MASK32) {
22816d076ae8SBjoern A. Zeeb 		struct ifa_msghdrl32 *ifam32;
22826d076ae8SBjoern A. Zeeb 
2283b245f96cSGleb Smirnoff 		ifam32 = (struct ifa_msghdrl32 *)ifam;
22846d076ae8SBjoern A. Zeeb 		ifam32->ifam_addrs = info->rti_addrs;
22856d076ae8SBjoern A. Zeeb 		ifam32->ifam_flags = ifa->ifa_flags;
22866d076ae8SBjoern A. Zeeb 		ifam32->ifam_index = ifa->ifa_ifp->if_index;
22876d076ae8SBjoern A. Zeeb 		ifam32->_ifam_spare1 = 0;
22886d076ae8SBjoern A. Zeeb 		ifam32->ifam_len = sizeof(*ifam32);
22896d076ae8SBjoern A. Zeeb 		ifam32->ifam_data_off =
22906d076ae8SBjoern A. Zeeb 		    offsetof(struct ifa_msghdrl32, ifam_data);
22919753faf5SGleb Smirnoff 		ifam32->ifam_metric = ifa->ifa_ifp->if_metric;
2292b245f96cSGleb Smirnoff 		ifd = &ifam32->ifam_data;
2293b245f96cSGleb Smirnoff 	} else
22946d076ae8SBjoern A. Zeeb #endif
2295b245f96cSGleb Smirnoff 	{
22966d076ae8SBjoern A. Zeeb 		ifam->ifam_addrs = info->rti_addrs;
22976d076ae8SBjoern A. Zeeb 		ifam->ifam_flags = ifa->ifa_flags;
22986d076ae8SBjoern A. Zeeb 		ifam->ifam_index = ifa->ifa_ifp->if_index;
22996d076ae8SBjoern A. Zeeb 		ifam->_ifam_spare1 = 0;
23006d076ae8SBjoern A. Zeeb 		ifam->ifam_len = sizeof(*ifam);
23016d076ae8SBjoern A. Zeeb 		ifam->ifam_data_off = offsetof(struct ifa_msghdrl, ifam_data);
23029753faf5SGleb Smirnoff 		ifam->ifam_metric = ifa->ifa_ifp->if_metric;
2303b245f96cSGleb Smirnoff 		ifd = &ifam->ifam_data;
2304b245f96cSGleb Smirnoff 	}
23056d076ae8SBjoern A. Zeeb 
2306b245f96cSGleb Smirnoff 	bzero(ifd, sizeof(*ifd));
2307b245f96cSGleb Smirnoff 	ifd->ifi_datalen = sizeof(struct if_data);
2308b245f96cSGleb Smirnoff 	ifd->ifi_ipackets = counter_u64_fetch(ifa->ifa_ipackets);
2309b245f96cSGleb Smirnoff 	ifd->ifi_opackets = counter_u64_fetch(ifa->ifa_opackets);
2310b245f96cSGleb Smirnoff 	ifd->ifi_ibytes = counter_u64_fetch(ifa->ifa_ibytes);
2311b245f96cSGleb Smirnoff 	ifd->ifi_obytes = counter_u64_fetch(ifa->ifa_obytes);
23127caf4ab7SGleb Smirnoff 
23136d076ae8SBjoern A. Zeeb 	/* Fixup if_data carp(4) vhid. */
23146d076ae8SBjoern A. Zeeb 	if (carp_get_vhid_p != NULL)
2315b245f96cSGleb Smirnoff 		ifd->ifi_vhid = (*carp_get_vhid_p)(ifa);
23166d076ae8SBjoern A. Zeeb 
23176d076ae8SBjoern A. Zeeb 	return (SYSCTL_OUT(w->w_req, w->w_tmem, len));
23186d076ae8SBjoern A. Zeeb }
23196d076ae8SBjoern A. Zeeb 
23206d076ae8SBjoern A. Zeeb static int
23216d076ae8SBjoern A. Zeeb sysctl_iflist_ifam(struct ifaddr *ifa, struct rt_addrinfo *info,
23226d076ae8SBjoern A. Zeeb     struct walkarg *w, int len)
23236d076ae8SBjoern A. Zeeb {
23246d076ae8SBjoern A. Zeeb 	struct ifa_msghdr *ifam;
23256d076ae8SBjoern A. Zeeb 
23266d076ae8SBjoern A. Zeeb 	ifam = (struct ifa_msghdr *)w->w_tmem;
23276d076ae8SBjoern A. Zeeb 	ifam->ifam_addrs = info->rti_addrs;
23286d076ae8SBjoern A. Zeeb 	ifam->ifam_flags = ifa->ifa_flags;
23296d076ae8SBjoern A. Zeeb 	ifam->ifam_index = ifa->ifa_ifp->if_index;
2330d25f8522SMark Johnston 	ifam->_ifam_spare1 = 0;
23319753faf5SGleb Smirnoff 	ifam->ifam_metric = ifa->ifa_ifp->if_metric;
23326d076ae8SBjoern A. Zeeb 
23336d076ae8SBjoern A. Zeeb 	return (SYSCTL_OUT(w->w_req, w->w_tmem, len));
23346d076ae8SBjoern A. Zeeb }
23356d076ae8SBjoern A. Zeeb 
23366d076ae8SBjoern A. Zeeb static int
2337becc44d7SSam Leffler sysctl_iflist(int af, struct walkarg *w)
2338df8bae1dSRodney W. Grimes {
2339becc44d7SSam Leffler 	struct ifnet *ifp;
2340becc44d7SSam Leffler 	struct ifaddr *ifa;
2341ab607f28SRyan Stone 	struct if_data ifd;
2342df8bae1dSRodney W. Grimes 	struct rt_addrinfo info;
2343df8bae1dSRodney W. Grimes 	int len, error = 0;
23443deb3649SAlexander V. Chernikov 	struct sockaddr_storage ss;
2345df8bae1dSRodney W. Grimes 
2346df8bae1dSRodney W. Grimes 	bzero((caddr_t)&info, sizeof(info));
2347ab607f28SRyan Stone 	bzero(&ifd, sizeof(ifd));
23484f6c66ccSMatt Macy 	CK_STAILQ_FOREACH(ifp, &V_ifnet, if_link) {
2349df8bae1dSRodney W. Grimes 		if (w->w_arg && w->w_arg != ifp->if_index)
2350df8bae1dSRodney W. Grimes 			continue;
2351ab607f28SRyan Stone 		if_data_copy(ifp, &ifd);
23524a0d6638SRuslan Ermilov 		ifa = ifp->if_addr;
2353becc44d7SSam Leffler 		info.rti_info[RTAX_IFP] = ifa->ifa_addr;
2354f2e5eb36SAlexander V. Chernikov 		error = rtsock_msg_buffer(RTM_IFINFO, &info, w, &len);
2355f2e5eb36SAlexander V. Chernikov 		if (error != 0)
2356f2e5eb36SAlexander V. Chernikov 			goto done;
23575dfc91d7SLuigi Rizzo 		info.rti_info[RTAX_IFP] = NULL;
235852041295SPoul-Henning Kamp 		if (w->w_req && w->w_tmem) {
23596d076ae8SBjoern A. Zeeb 			if (w->w_op == NET_RT_IFLISTL)
2360ab607f28SRyan Stone 				error = sysctl_iflist_ifml(ifp, &ifd, &info, w,
2361ab607f28SRyan Stone 				    len);
23626d076ae8SBjoern A. Zeeb 			else
2363ab607f28SRyan Stone 				error = sysctl_iflist_ifm(ifp, &ifd, &info, w,
2364ab607f28SRyan Stone 				    len);
2365df440948SPoul-Henning Kamp 			if (error)
2366a35b06c5SJonathan Lemon 				goto done;
2367df8bae1dSRodney W. Grimes 		}
2368d7c5a620SMatt Macy 		while ((ifa = CK_STAILQ_NEXT(ifa, ifa_link)) != NULL) {
2369df8bae1dSRodney W. Grimes 			if (af && af != ifa->ifa_addr->sa_family)
2370df8bae1dSRodney W. Grimes 				continue;
2371b89e82ddSJamie Gritton 			if (prison_if(w->w_req->td->td_ucred,
2372b89e82ddSJamie Gritton 			    ifa->ifa_addr) != 0)
237375c13541SPoul-Henning Kamp 				continue;
2374becc44d7SSam Leffler 			info.rti_info[RTAX_IFA] = ifa->ifa_addr;
23753deb3649SAlexander V. Chernikov 			info.rti_info[RTAX_NETMASK] = rtsock_fix_netmask(
23763deb3649SAlexander V. Chernikov 			    ifa->ifa_addr, ifa->ifa_netmask, &ss);
2377becc44d7SSam Leffler 			info.rti_info[RTAX_BRD] = ifa->ifa_dstaddr;
2378f2e5eb36SAlexander V. Chernikov 			error = rtsock_msg_buffer(RTM_NEWADDR, &info, w, &len);
2379f2e5eb36SAlexander V. Chernikov 			if (error != 0)
2380f2e5eb36SAlexander V. Chernikov 				goto done;
238152041295SPoul-Henning Kamp 			if (w->w_req && w->w_tmem) {
23826d076ae8SBjoern A. Zeeb 				if (w->w_op == NET_RT_IFLISTL)
23836d076ae8SBjoern A. Zeeb 					error = sysctl_iflist_ifaml(ifa, &info,
23846d076ae8SBjoern A. Zeeb 					    w, len);
23856d076ae8SBjoern A. Zeeb 				else
23866d076ae8SBjoern A. Zeeb 					error = sysctl_iflist_ifam(ifa, &info,
23876d076ae8SBjoern A. Zeeb 					    w, len);
2388df440948SPoul-Henning Kamp 				if (error)
2389a35b06c5SJonathan Lemon 					goto done;
2390df8bae1dSRodney W. Grimes 			}
2391df8bae1dSRodney W. Grimes 		}
23923deb3649SAlexander V. Chernikov 		info.rti_info[RTAX_IFA] = NULL;
23933deb3649SAlexander V. Chernikov 		info.rti_info[RTAX_NETMASK] = NULL;
23945dfc91d7SLuigi Rizzo 		info.rti_info[RTAX_BRD] = NULL;
2395df8bae1dSRodney W. Grimes 	}
2396a35b06c5SJonathan Lemon done:
2397a35b06c5SJonathan Lemon 	return (error);
2398df8bae1dSRodney W. Grimes }
2399df8bae1dSRodney W. Grimes 
2400ebda3fc3SBjoern A. Zeeb static int
24019b98ee2cSLuigi Rizzo sysctl_ifmalist(int af, struct walkarg *w)
240205b2efe0SBruce M Simpson {
240305b2efe0SBruce M Simpson 	struct rt_addrinfo info;
24049b98ee2cSLuigi Rizzo 	struct ifaddr *ifa;
240555dfce58SMark Johnston 	struct ifmultiaddr *ifma;
240655dfce58SMark Johnston 	struct ifnet *ifp;
240755dfce58SMark Johnston 	int error, len;
240805b2efe0SBruce M Simpson 
2409b8a6e03fSGleb Smirnoff 	NET_EPOCH_ASSERT();
2410b8a6e03fSGleb Smirnoff 
241155dfce58SMark Johnston 	error = 0;
241205b2efe0SBruce M Simpson 	bzero((caddr_t)&info, sizeof(info));
241355dfce58SMark Johnston 
24144f6c66ccSMatt Macy 	CK_STAILQ_FOREACH(ifp, &V_ifnet, if_link) {
241505b2efe0SBruce M Simpson 		if (w->w_arg && w->w_arg != ifp->if_index)
241605b2efe0SBruce M Simpson 			continue;
24174a0d6638SRuslan Ermilov 		ifa = ifp->if_addr;
2418913af518SLuigi Rizzo 		info.rti_info[RTAX_IFP] = ifa ? ifa->ifa_addr : NULL;
2419d7c5a620SMatt Macy 		CK_STAILQ_FOREACH(ifma, &ifp->if_multiaddrs, ifma_link) {
242005b2efe0SBruce M Simpson 			if (af && af != ifma->ifma_addr->sa_family)
242105b2efe0SBruce M Simpson 				continue;
2422b89e82ddSJamie Gritton 			if (prison_if(w->w_req->td->td_ucred,
2423b89e82ddSJamie Gritton 			    ifma->ifma_addr) != 0)
242405b2efe0SBruce M Simpson 				continue;
242505b2efe0SBruce M Simpson 			info.rti_info[RTAX_IFA] = ifma->ifma_addr;
2426913af518SLuigi Rizzo 			info.rti_info[RTAX_GATEWAY] =
2427913af518SLuigi Rizzo 			    (ifma->ifma_addr->sa_family != AF_LINK) ?
2428913af518SLuigi Rizzo 			    ifma->ifma_lladdr : NULL;
2429c9f98940SAlexander V. Chernikov 			error = rtsock_msg_buffer(RTM_NEWMADDR, &info, w, &len);
2430f2e5eb36SAlexander V. Chernikov 			if (error != 0)
243155dfce58SMark Johnston 				break;
243205b2efe0SBruce M Simpson 			if (w->w_req && w->w_tmem) {
24339b98ee2cSLuigi Rizzo 				struct ifma_msghdr *ifmam;
243405b2efe0SBruce M Simpson 
243505b2efe0SBruce M Simpson 				ifmam = (struct ifma_msghdr *)w->w_tmem;
243605b2efe0SBruce M Simpson 				ifmam->ifmam_index = ifma->ifma_ifp->if_index;
243705b2efe0SBruce M Simpson 				ifmam->ifmam_flags = 0;
243805b2efe0SBruce M Simpson 				ifmam->ifmam_addrs = info.rti_addrs;
2439d25f8522SMark Johnston 				ifmam->_ifmam_spare1 = 0;
244005b2efe0SBruce M Simpson 				error = SYSCTL_OUT(w->w_req, w->w_tmem, len);
244155dfce58SMark Johnston 				if (error != 0)
244255dfce58SMark Johnston 					break;
244305b2efe0SBruce M Simpson 			}
244405b2efe0SBruce M Simpson 		}
244555dfce58SMark Johnston 		if (error != 0)
244655dfce58SMark Johnston 			break;
2447fe0fc7efSChristian S.J. Peron 	}
244805b2efe0SBruce M Simpson 	return (error);
244905b2efe0SBruce M Simpson }
245005b2efe0SBruce M Simpson 
2451d68fb8d9SAlexander V. Chernikov static void
2452d68fb8d9SAlexander V. Chernikov rtable_sysctl_dump(uint32_t fibnum, int family, struct walkarg *w)
2453d68fb8d9SAlexander V. Chernikov {
2454d68fb8d9SAlexander V. Chernikov 	union sockaddr_union sa_dst, sa_mask;
2455d68fb8d9SAlexander V. Chernikov 
2456d68fb8d9SAlexander V. Chernikov 	w->family = family;
2457d68fb8d9SAlexander V. Chernikov 	w->dst = (struct sockaddr *)&sa_dst;
2458d68fb8d9SAlexander V. Chernikov 	w->mask = (struct sockaddr *)&sa_mask;
2459d68fb8d9SAlexander V. Chernikov 
2460d68fb8d9SAlexander V. Chernikov 	init_sockaddrs_family(family, w->dst, w->mask);
2461d68fb8d9SAlexander V. Chernikov 
2462d68fb8d9SAlexander V. Chernikov 	rib_walk(fibnum, family, false, sysctl_dumpentry, w);
2463d68fb8d9SAlexander V. Chernikov }
2464d68fb8d9SAlexander V. Chernikov 
246552041295SPoul-Henning Kamp static int
246682d9ae4eSPoul-Henning Kamp sysctl_rtsock(SYSCTL_HANDLER_ARGS)
2467df8bae1dSRodney W. Grimes {
2468b8a6e03fSGleb Smirnoff 	struct epoch_tracker et;
246952041295SPoul-Henning Kamp 	int	*name = (int *)arg1;
247052041295SPoul-Henning Kamp 	u_int	namelen = arg2;
247161eee0e2SAlexander V. Chernikov 	struct rib_head *rnh = NULL; /* silence compiler. */
2472fe0fc7efSChristian S.J. Peron 	int	i, lim, error = EINVAL;
24734825b1e0SHiroki Sato 	int	fib = 0;
2474df8bae1dSRodney W. Grimes 	u_char	af;
2475df8bae1dSRodney W. Grimes 	struct	walkarg w;
2476df8bae1dSRodney W. Grimes 
247752041295SPoul-Henning Kamp 	name ++;
247852041295SPoul-Henning Kamp 	namelen--;
247952041295SPoul-Henning Kamp 	if (req->newptr)
2480df8bae1dSRodney W. Grimes 		return (EPERM);
2481fedeb08bSAlexander V. Chernikov 	if (name[1] == NET_RT_DUMP || name[1] == NET_RT_NHOP || name[1] == NET_RT_NHGRP) {
24824825b1e0SHiroki Sato 		if (namelen == 3)
24834825b1e0SHiroki Sato 			fib = req->td->td_proc->p_fibnum;
24844825b1e0SHiroki Sato 		else if (namelen == 4)
24857d9b6df1SAlexander V. Chernikov 			fib = (name[3] == RT_ALL_FIBS) ?
24864825b1e0SHiroki Sato 			    req->td->td_proc->p_fibnum : name[3];
24874825b1e0SHiroki Sato 		else
24884825b1e0SHiroki Sato 			return ((namelen < 3) ? EISDIR : ENOTDIR);
24894825b1e0SHiroki Sato 		if (fib < 0 || fib >= rt_numfibs)
24904825b1e0SHiroki Sato 			return (EINVAL);
24914825b1e0SHiroki Sato 	} else if (namelen != 3)
2492f7a54d06SCrist J. Clark 		return ((namelen < 3) ? EISDIR : ENOTDIR);
2493df8bae1dSRodney W. Grimes 	af = name[0];
2494b2aaf46eSJeffrey Hsu 	if (af > AF_MAX)
2495b2aaf46eSJeffrey Hsu 		return (EINVAL);
24966b96f1afSLuigi Rizzo 	bzero(&w, sizeof(w));
2497df8bae1dSRodney W. Grimes 	w.w_op = name[1];
2498df8bae1dSRodney W. Grimes 	w.w_arg = name[2];
249952041295SPoul-Henning Kamp 	w.w_req = req;
2500df8bae1dSRodney W. Grimes 
2501fe0fc7efSChristian S.J. Peron 	error = sysctl_wire_old_buffer(req, 0);
2502fe0fc7efSChristian S.J. Peron 	if (error)
2503fe0fc7efSChristian S.J. Peron 		return (error);
2504f2e5eb36SAlexander V. Chernikov 
2505f2e5eb36SAlexander V. Chernikov 	/*
2506f2e5eb36SAlexander V. Chernikov 	 * Allocate reply buffer in advance.
2507f2e5eb36SAlexander V. Chernikov 	 * All rtsock messages has maximum length of u_short.
2508f2e5eb36SAlexander V. Chernikov 	 */
2509f2e5eb36SAlexander V. Chernikov 	w.w_tmemsize = 65536;
2510f2e5eb36SAlexander V. Chernikov 	w.w_tmem = malloc(w.w_tmemsize, M_TEMP, M_WAITOK);
2511f2e5eb36SAlexander V. Chernikov 
2512b8a6e03fSGleb Smirnoff 	NET_EPOCH_ENTER(et);
2513df8bae1dSRodney W. Grimes 	switch (w.w_op) {
2514df8bae1dSRodney W. Grimes 	case NET_RT_DUMP:
2515df8bae1dSRodney W. Grimes 	case NET_RT_FLAGS:
2516a8b76c8fSLuigi Rizzo 		if (af == 0) {			/* dump all tables */
2517a8b76c8fSLuigi Rizzo 			i = 1;
2518a8b76c8fSLuigi Rizzo 			lim = AF_MAX;
2519a8b76c8fSLuigi Rizzo 		} else				/* dump only one table */
2520a8b76c8fSLuigi Rizzo 			i = lim = af;
25218eca593cSQing Li 
25228eca593cSQing Li 		/*
25238eca593cSQing Li 		 * take care of llinfo entries, the caller must
25248eca593cSQing Li 		 * specify an AF
25258eca593cSQing Li 		 */
252614981d80SQing Li 		if (w.w_op == NET_RT_FLAGS &&
252782b334e8SQing Li 		    (w.w_arg == 0 || w.w_arg & RTF_LLINFO)) {
25288eca593cSQing Li 			if (af != 0)
25298eca593cSQing Li 				error = lltable_sysctl_dumparp(af, w.w_req);
25308eca593cSQing Li 			else
25318eca593cSQing Li 				error = EINVAL;
25328eca593cSQing Li 			break;
25338eca593cSQing Li 		}
25348eca593cSQing Li 		/*
25358eca593cSQing Li 		 * take care of routing entries
25368eca593cSQing Li 		 */
253720b0cdb7SBjoern A. Zeeb 		for (error = 0; error == 0 && i <= lim; i++) {
25384825b1e0SHiroki Sato 			rnh = rt_tables_get_rnh(fib, i);
2539c2c2a7c1SBjoern A. Zeeb 			if (rnh != NULL) {
2540d68fb8d9SAlexander V. Chernikov 				rtable_sysctl_dump(fib, i, &w);
2541a8b76c8fSLuigi Rizzo 			} else if (af != 0)
2542956b0b65SJeffrey Hsu 				error = EAFNOSUPPORT;
254320b0cdb7SBjoern A. Zeeb 		}
2544df8bae1dSRodney W. Grimes 		break;
2545a6663252SAlexander V. Chernikov 	case NET_RT_NHOP:
2546fedeb08bSAlexander V. Chernikov 	case NET_RT_NHGRP:
2547a6663252SAlexander V. Chernikov 		/* Allow dumping one specific af/fib at a time */
2548a6663252SAlexander V. Chernikov 		if (namelen < 4) {
2549a6663252SAlexander V. Chernikov 			error = EINVAL;
2550a6663252SAlexander V. Chernikov 			break;
2551a6663252SAlexander V. Chernikov 		}
2552a6663252SAlexander V. Chernikov 		fib = name[3];
2553a6663252SAlexander V. Chernikov 		if (fib < 0 || fib > rt_numfibs) {
2554a6663252SAlexander V. Chernikov 			error = EINVAL;
2555a6663252SAlexander V. Chernikov 			break;
2556a6663252SAlexander V. Chernikov 		}
2557a6663252SAlexander V. Chernikov 		rnh = rt_tables_get_rnh(fib, af);
2558a6663252SAlexander V. Chernikov 		if (rnh == NULL) {
2559a6663252SAlexander V. Chernikov 			error = EAFNOSUPPORT;
2560a6663252SAlexander V. Chernikov 			break;
2561a6663252SAlexander V. Chernikov 		}
2562a6663252SAlexander V. Chernikov 		if (w.w_op == NET_RT_NHOP)
2563a6663252SAlexander V. Chernikov 			error = nhops_dump_sysctl(rnh, w.w_req);
2564fedeb08bSAlexander V. Chernikov 		else
2565fedeb08bSAlexander V. Chernikov #ifdef ROUTE_MPATH
2566fedeb08bSAlexander V. Chernikov 			error = nhgrp_dump_sysctl(rnh, w.w_req);
2567fedeb08bSAlexander V. Chernikov #else
2568fedeb08bSAlexander V. Chernikov 			error = ENOTSUP;
2569fedeb08bSAlexander V. Chernikov #endif
2570a6663252SAlexander V. Chernikov 		break;
2571df8bae1dSRodney W. Grimes 	case NET_RT_IFLIST:
25726d076ae8SBjoern A. Zeeb 	case NET_RT_IFLISTL:
2573df8bae1dSRodney W. Grimes 		error = sysctl_iflist(af, &w);
257405b2efe0SBruce M Simpson 		break;
257505b2efe0SBruce M Simpson 
257605b2efe0SBruce M Simpson 	case NET_RT_IFMALIST:
257705b2efe0SBruce M Simpson 		error = sysctl_ifmalist(af, &w);
257805b2efe0SBruce M Simpson 		break;
2579df8bae1dSRodney W. Grimes 	}
2580b8a6e03fSGleb Smirnoff 	NET_EPOCH_EXIT(et);
2581f2e5eb36SAlexander V. Chernikov 
2582f2e5eb36SAlexander V. Chernikov 	free(w.w_tmem, M_TEMP);
2583df8bae1dSRodney W. Grimes 	return (error);
2584df8bae1dSRodney W. Grimes }
2585df8bae1dSRodney W. Grimes 
25868a9a28c4SGleb Smirnoff static SYSCTL_NODE(_net, PF_ROUTE, routetable, CTLFLAG_RD | CTLFLAG_MPSAFE,
25878a9a28c4SGleb Smirnoff     sysctl_rtsock, "Return route tables and interface/address lists");
258852041295SPoul-Henning Kamp 
2589df8bae1dSRodney W. Grimes /*
2590df8bae1dSRodney W. Grimes  * Definitions of protocols supported in the ROUTE domain.
2591df8bae1dSRodney W. Grimes  */
2592df8bae1dSRodney W. Grimes 
25935b1c0294SDavid E. O'Brien static struct domain routedomain;		/* or at least forward */
2594df8bae1dSRodney W. Grimes 
259552041295SPoul-Henning Kamp static struct protosw routesw[] = {
2596303989a2SRuslan Ermilov {
2597303989a2SRuslan Ermilov 	.pr_type =		SOCK_RAW,
2598303989a2SRuslan Ermilov 	.pr_domain =		&routedomain,
2599303989a2SRuslan Ermilov 	.pr_flags =		PR_ATOMIC|PR_ADDR,
2600303989a2SRuslan Ermilov 	.pr_output =		route_output,
2601303989a2SRuslan Ermilov 	.pr_ctlinput =		raw_ctlinput,
2602303989a2SRuslan Ermilov 	.pr_init =		raw_init,
2603303989a2SRuslan Ermilov 	.pr_usrreqs =		&route_usrreqs
2604df8bae1dSRodney W. Grimes }
2605df8bae1dSRodney W. Grimes };
2606df8bae1dSRodney W. Grimes 
2607303989a2SRuslan Ermilov static struct domain routedomain = {
2608303989a2SRuslan Ermilov 	.dom_family =		PF_ROUTE,
2609303989a2SRuslan Ermilov 	.dom_name =		"route",
2610303989a2SRuslan Ermilov 	.dom_protosw =		routesw,
261102abd400SPedro F. Giffuni 	.dom_protoswNPROTOSW =	&routesw[nitems(routesw)]
2612303989a2SRuslan Ermilov };
261378a82810SGarrett Wollman 
2614d0728d71SRobert Watson VNET_DOMAIN_SET(route);
2615