1c398230bSWarner Losh /*- 251369649SPedro F. Giffuni * SPDX-License-Identifier: BSD-3-Clause 351369649SPedro F. Giffuni * 4df8bae1dSRodney W. Grimes * Copyright (c) 1988, 1991, 1993 5df8bae1dSRodney W. Grimes * The Regents of the University of California. All rights reserved. 6df8bae1dSRodney W. Grimes * 7df8bae1dSRodney W. Grimes * Redistribution and use in source and binary forms, with or without 8df8bae1dSRodney W. Grimes * modification, are permitted provided that the following conditions 9df8bae1dSRodney W. Grimes * are met: 10df8bae1dSRodney W. Grimes * 1. Redistributions of source code must retain the above copyright 11df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer. 12df8bae1dSRodney W. Grimes * 2. Redistributions in binary form must reproduce the above copyright 13df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer in the 14df8bae1dSRodney W. Grimes * documentation and/or other materials provided with the distribution. 15fbbd9655SWarner Losh * 3. Neither the name of the University nor the names of its contributors 16df8bae1dSRodney W. Grimes * may be used to endorse or promote products derived from this software 17df8bae1dSRodney W. Grimes * without specific prior written permission. 18df8bae1dSRodney W. Grimes * 19df8bae1dSRodney W. Grimes * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 20df8bae1dSRodney W. Grimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 21df8bae1dSRodney W. Grimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 22df8bae1dSRodney W. Grimes * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 23df8bae1dSRodney W. Grimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 24df8bae1dSRodney W. Grimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 25df8bae1dSRodney W. Grimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 26df8bae1dSRodney W. Grimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 27df8bae1dSRodney W. Grimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 28df8bae1dSRodney W. Grimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 29df8bae1dSRodney W. Grimes * SUCH DAMAGE. 30df8bae1dSRodney W. Grimes * 3128070a0eSRuslan Ermilov * @(#)rtsock.c 8.7 (Berkeley) 10/12/95 32c3aac50fSPeter Wemm * $FreeBSD$ 33df8bae1dSRodney W. Grimes */ 348b6acd2bSConrad Meyer #include "opt_ddb.h" 35fedeb08bSAlexander V. Chernikov #include "opt_route.h" 36413628a7SBjoern A. Zeeb #include "opt_inet.h" 37413628a7SBjoern A. Zeeb #include "opt_inet6.h" 38e440aed9SQing Li 39df8bae1dSRodney W. Grimes #include <sys/param.h> 40960ed29cSSeigo Tanimura #include <sys/jail.h> 41413628a7SBjoern A. Zeeb #include <sys/kernel.h> 42d0728d71SRobert Watson #include <sys/domain.h> 43609ff41fSWarner Losh #include <sys/lock.h> 444d1d4912SBruce Evans #include <sys/malloc.h> 45df8bae1dSRodney W. Grimes #include <sys/mbuf.h> 46acd3428bSRobert Watson #include <sys/priv.h> 47960ed29cSSeigo Tanimura #include <sys/proc.h> 48960ed29cSSeigo Tanimura #include <sys/protosw.h> 4920efcfc6SAndrey V. Elsukov #include <sys/rmlock.h> 503120b9d4SKip Macy #include <sys/rwlock.h> 51960ed29cSSeigo Tanimura #include <sys/signalvar.h> 52df8bae1dSRodney W. Grimes #include <sys/socket.h> 53df8bae1dSRodney W. Grimes #include <sys/socketvar.h> 54960ed29cSSeigo Tanimura #include <sys/sysctl.h> 55960ed29cSSeigo Tanimura #include <sys/systm.h> 56df8bae1dSRodney W. Grimes 57df8bae1dSRodney W. Grimes #include <net/if.h> 5876039bc8SGleb Smirnoff #include <net/if_var.h> 598eca593cSQing Li #include <net/if_dl.h> 606e6b3f7cSQing Li #include <net/if_llatbl.h> 610ed6142bSQing Li #include <net/if_types.h> 62d989c7b3SRobert Watson #include <net/netisr.h> 63df8bae1dSRodney W. Grimes #include <net/raw_cb.h> 64960ed29cSSeigo Tanimura #include <net/route.h> 65a287a973SAlexander V. Chernikov #include <net/route/route_ctl.h> 66e7d8af4fSAlexander V. Chernikov #include <net/route/route_var.h> 674b79449eSBjoern A. Zeeb #include <net/vnet.h> 68df8bae1dSRodney W. Grimes 695a59cefcSBosko Milekic #include <netinet/in.h> 70c7ab6602SQing Li #include <netinet/if_ether.h> 7108b68b0eSGleb Smirnoff #include <netinet/ip_carp.h> 72413628a7SBjoern A. Zeeb #ifdef INET6 732fe5a794SAlexander V. Chernikov #include <netinet6/in6_var.h> 740bebb544SHiroki Sato #include <netinet6/ip6_var.h> 75413628a7SBjoern A. Zeeb #include <netinet6/scope6_var.h> 76413628a7SBjoern A. Zeeb #endif 77a6663252SAlexander V. Chernikov #include <net/route/nhop.h> 785a59cefcSBosko Milekic 79427a928aSKonstantin Belousov #ifdef COMPAT_FREEBSD32 80427a928aSKonstantin Belousov #include <sys/mount.h> 81427a928aSKonstantin Belousov #include <compat/freebsd32/freebsd32.h> 82427a928aSKonstantin Belousov 83427a928aSKonstantin Belousov struct if_msghdr32 { 84427a928aSKonstantin Belousov uint16_t ifm_msglen; 85427a928aSKonstantin Belousov uint8_t ifm_version; 86427a928aSKonstantin Belousov uint8_t ifm_type; 87427a928aSKonstantin Belousov int32_t ifm_addrs; 88427a928aSKonstantin Belousov int32_t ifm_flags; 89427a928aSKonstantin Belousov uint16_t ifm_index; 90d25f8522SMark Johnston uint16_t _ifm_spare1; 91b245f96cSGleb Smirnoff struct if_data ifm_data; 92427a928aSKonstantin Belousov }; 936d076ae8SBjoern A. Zeeb 946d076ae8SBjoern A. Zeeb struct if_msghdrl32 { 956d076ae8SBjoern A. Zeeb uint16_t ifm_msglen; 966d076ae8SBjoern A. Zeeb uint8_t ifm_version; 976d076ae8SBjoern A. Zeeb uint8_t ifm_type; 986d076ae8SBjoern A. Zeeb int32_t ifm_addrs; 996d076ae8SBjoern A. Zeeb int32_t ifm_flags; 1006d076ae8SBjoern A. Zeeb uint16_t ifm_index; 1016d076ae8SBjoern A. Zeeb uint16_t _ifm_spare1; 1026d076ae8SBjoern A. Zeeb uint16_t ifm_len; 1036d076ae8SBjoern A. Zeeb uint16_t ifm_data_off; 104d25f8522SMark Johnston uint32_t _ifm_spare2; 105b245f96cSGleb Smirnoff struct if_data ifm_data; 1066d076ae8SBjoern A. Zeeb }; 1076d076ae8SBjoern A. Zeeb 1086d076ae8SBjoern A. Zeeb struct ifa_msghdrl32 { 1096d076ae8SBjoern A. Zeeb uint16_t ifam_msglen; 1106d076ae8SBjoern A. Zeeb uint8_t ifam_version; 1116d076ae8SBjoern A. Zeeb uint8_t ifam_type; 1126d076ae8SBjoern A. Zeeb int32_t ifam_addrs; 1136d076ae8SBjoern A. Zeeb int32_t ifam_flags; 1146d076ae8SBjoern A. Zeeb uint16_t ifam_index; 1156d076ae8SBjoern A. Zeeb uint16_t _ifam_spare1; 1166d076ae8SBjoern A. Zeeb uint16_t ifam_len; 1176d076ae8SBjoern A. Zeeb uint16_t ifam_data_off; 1186d076ae8SBjoern A. Zeeb int32_t ifam_metric; 119b245f96cSGleb Smirnoff struct if_data ifam_data; 1206d076ae8SBjoern A. Zeeb }; 121279e33d4SKonstantin Belousov 122279e33d4SKonstantin Belousov #define SA_SIZE32(sa) \ 123279e33d4SKonstantin Belousov ( (((struct sockaddr *)(sa))->sa_len == 0) ? \ 124279e33d4SKonstantin Belousov sizeof(int) : \ 125279e33d4SKonstantin Belousov 1 + ( (((struct sockaddr *)(sa))->sa_len - 1) | (sizeof(int) - 1) ) ) 126279e33d4SKonstantin Belousov 1276d076ae8SBjoern A. Zeeb #endif /* COMPAT_FREEBSD32 */ 128427a928aSKonstantin Belousov 129a1c995b6SPoul-Henning Kamp MALLOC_DEFINE(M_RTABLE, "routetbl", "routing tables"); 130a1c995b6SPoul-Henning Kamp 131becc44d7SSam Leffler /* NB: these are not modified */ 13252041295SPoul-Henning Kamp static struct sockaddr route_src = { 2, PF_ROUTE, }; 133076d0761SJulian Elischer static struct sockaddr sa_zero = { sizeof(sa_zero), AF_INET, }; 134becc44d7SSam Leffler 13508b68b0eSGleb Smirnoff /* These are external hooks for CARP. */ 13608b68b0eSGleb Smirnoff int (*carp_get_vhid_p)(struct ifaddr *); 13708b68b0eSGleb Smirnoff 138528737fdSBjoern A. Zeeb /* 139528737fdSBjoern A. Zeeb * Used by rtsock/raw_input callback code to decide whether to filter the update 140528737fdSBjoern A. Zeeb * notification to a socket bound to a particular FIB. 141528737fdSBjoern A. Zeeb */ 142528737fdSBjoern A. Zeeb #define RTS_FILTER_FIB M_PROTO8 143528737fdSBjoern A. Zeeb 144c5d4eab6SMarko Zec typedef struct { 14518aee723SPeter Pentchev int ip_count; /* attached w/ AF_INET */ 146becc44d7SSam Leffler int ip6_count; /* attached w/ AF_INET6 */ 147becc44d7SSam Leffler int any_count; /* total attached */ 148c5d4eab6SMarko Zec } route_cb_t; 1495f901c92SAndrew Turner VNET_DEFINE_STATIC(route_cb_t, route_cb); 150c5d4eab6SMarko Zec #define V_route_cb VNET(route_cb) 151df8bae1dSRodney W. Grimes 152aea8b30fSSam Leffler struct mtx rtsock_mtx; 153aea8b30fSSam Leffler MTX_SYSINIT(rtsock, &rtsock_mtx, "rtsock route_cb lock", MTX_DEF); 154aea8b30fSSam Leffler 155aea8b30fSSam Leffler #define RTSOCK_LOCK() mtx_lock(&rtsock_mtx) 156aea8b30fSSam Leffler #define RTSOCK_UNLOCK() mtx_unlock(&rtsock_mtx) 157aea8b30fSSam Leffler #define RTSOCK_LOCK_ASSERT() mtx_assert(&rtsock_mtx, MA_OWNED) 158aea8b30fSSam Leffler 159fedeb08bSAlexander V. Chernikov SYSCTL_NODE(_net, OID_AUTO, route, CTLFLAG_RD | CTLFLAG_MPSAFE, 0, ""); 160190a4c94SRobert Watson 161df8bae1dSRodney W. Grimes struct walkarg { 162d68fb8d9SAlexander V. Chernikov int family; 16352041295SPoul-Henning Kamp int w_tmemsize; 16452041295SPoul-Henning Kamp int w_op, w_arg; 16552041295SPoul-Henning Kamp caddr_t w_tmem; 16652041295SPoul-Henning Kamp struct sysctl_req *w_req; 167d68fb8d9SAlexander V. Chernikov struct sockaddr *dst; 168d68fb8d9SAlexander V. Chernikov struct sockaddr *mask; 169df8bae1dSRodney W. Grimes }; 170df8bae1dSRodney W. Grimes 171d989c7b3SRobert Watson static void rts_input(struct mbuf *m); 1726db47af4SAlexander V. Chernikov static struct mbuf *rtsock_msg_mbuf(int type, struct rt_addrinfo *rtinfo); 173f2e5eb36SAlexander V. Chernikov static int rtsock_msg_buffer(int type, struct rt_addrinfo *rtinfo, 174f2e5eb36SAlexander V. Chernikov struct walkarg *w, int *plen); 1755dfc91d7SLuigi Rizzo static int rt_xaddrs(caddr_t cp, caddr_t cplim, 1765dfc91d7SLuigi Rizzo struct rt_addrinfo *rtinfo); 1772fe5a794SAlexander V. Chernikov static int cleanup_xaddrs(struct rt_addrinfo *info); 178d68fb8d9SAlexander V. Chernikov static int sysctl_dumpentry(struct rtentry *rt, void *vw); 1792259a030SAlexander V. Chernikov static int sysctl_dumpnhop(struct rtentry *rt, struct nhop_object *nh, 1802259a030SAlexander V. Chernikov uint32_t weight, struct walkarg *w); 181929ddbbbSAlfred Perlstein static int sysctl_iflist(int af, struct walkarg *w); 18205b2efe0SBruce M Simpson static int sysctl_ifmalist(int af, struct walkarg *w); 18373d76e77SKevin Lo static int route_output(struct mbuf *m, struct socket *so, ...); 18493bfd365SAlexander V. Chernikov static void rt_getmetrics(const struct rtentry *rt, 18593bfd365SAlexander V. Chernikov const struct nhop_object *nh, struct rt_metrics *out); 1863ca1a2d6SMax Laier static void rt_dispatch(struct mbuf *, sa_family_t); 187c83dda36SAlexander V. Chernikov static int handle_rtm_get(struct rt_addrinfo *info, u_int fibnum, 188a287a973SAlexander V. Chernikov struct rt_msghdr *rtm, struct rib_cmd_info *rc); 189592d300eSAlexander V. Chernikov static int update_rtm_from_rc(struct rt_addrinfo *info, 190c83dda36SAlexander V. Chernikov struct rt_msghdr **prtm, int alloc_len, 191592d300eSAlexander V. Chernikov struct rib_cmd_info *rc, struct nhop_object *nh); 192c83dda36SAlexander V. Chernikov static void send_rtm_reply(struct socket *so, struct rt_msghdr *rtm, 193c83dda36SAlexander V. Chernikov struct mbuf *m, sa_family_t saf, u_int fibnum, 194c83dda36SAlexander V. Chernikov int rtm_errno); 195d68fb8d9SAlexander V. Chernikov static bool can_export_rte(struct ucred *td_ucred, bool rt_is_host, 196d68fb8d9SAlexander V. Chernikov const struct sockaddr *rt_dst); 197df8bae1dSRodney W. Grimes 198d4b5cae4SRobert Watson static struct netisr_handler rtsock_nh = { 199d4b5cae4SRobert Watson .nh_name = "rtsock", 200d4b5cae4SRobert Watson .nh_handler = rts_input, 201d4b5cae4SRobert Watson .nh_proto = NETISR_ROUTE, 202d4b5cae4SRobert Watson .nh_policy = NETISR_POLICY_SOURCE, 203d4b5cae4SRobert Watson }; 204d4b5cae4SRobert Watson 205d4b5cae4SRobert Watson static int 206d4b5cae4SRobert Watson sysctl_route_netisr_maxqlen(SYSCTL_HANDLER_ARGS) 207d4b5cae4SRobert Watson { 208d4b5cae4SRobert Watson int error, qlimit; 209d4b5cae4SRobert Watson 210d4b5cae4SRobert Watson netisr_getqlimit(&rtsock_nh, &qlimit); 211d4b5cae4SRobert Watson error = sysctl_handle_int(oidp, &qlimit, 0, req); 212d4b5cae4SRobert Watson if (error || !req->newptr) 213d4b5cae4SRobert Watson return (error); 214d4b5cae4SRobert Watson if (qlimit < 1) 215d4b5cae4SRobert Watson return (EINVAL); 216d4b5cae4SRobert Watson return (netisr_setqlimit(&rtsock_nh, qlimit)); 217d4b5cae4SRobert Watson } 2187029da5cSPawel Biernacki SYSCTL_PROC(_net_route, OID_AUTO, netisr_maxqlen, 2197029da5cSPawel Biernacki CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_MPSAFE, 220d4b5cae4SRobert Watson 0, 0, sysctl_route_netisr_maxqlen, "I", 221d4b5cae4SRobert Watson "maximum routing socket dispatch queue length"); 222d4b5cae4SRobert Watson 223d989c7b3SRobert Watson static void 224484149deSBjoern A. Zeeb vnet_rts_init(void) 225d989c7b3SRobert Watson { 226b062951aSRobert Watson int tmp; 227d989c7b3SRobert Watson 228484149deSBjoern A. Zeeb if (IS_DEFAULT_VNET(curvnet)) { 229b062951aSRobert Watson if (TUNABLE_INT_FETCH("net.route.netisr_maxqlen", &tmp)) 230d4b5cae4SRobert Watson rtsock_nh.nh_qlimit = tmp; 231d4b5cae4SRobert Watson netisr_register(&rtsock_nh); 232d989c7b3SRobert Watson } 233484149deSBjoern A. Zeeb #ifdef VIMAGE 234484149deSBjoern A. Zeeb else 235484149deSBjoern A. Zeeb netisr_register_vnet(&rtsock_nh); 236484149deSBjoern A. Zeeb #endif 237484149deSBjoern A. Zeeb } 238484149deSBjoern A. Zeeb VNET_SYSINIT(vnet_rtsock, SI_SUB_PROTO_DOMAIN, SI_ORDER_THIRD, 239484149deSBjoern A. Zeeb vnet_rts_init, 0); 240484149deSBjoern A. Zeeb 241484149deSBjoern A. Zeeb #ifdef VIMAGE 242484149deSBjoern A. Zeeb static void 243484149deSBjoern A. Zeeb vnet_rts_uninit(void) 244484149deSBjoern A. Zeeb { 245484149deSBjoern A. Zeeb 246484149deSBjoern A. Zeeb netisr_unregister_vnet(&rtsock_nh); 247484149deSBjoern A. Zeeb } 248484149deSBjoern A. Zeeb VNET_SYSUNINIT(vnet_rts_uninit, SI_SUB_PROTO_DOMAIN, SI_ORDER_THIRD, 249484149deSBjoern A. Zeeb vnet_rts_uninit, 0); 250484149deSBjoern A. Zeeb #endif 251d989c7b3SRobert Watson 252528737fdSBjoern A. Zeeb static int 253528737fdSBjoern A. Zeeb raw_input_rts_cb(struct mbuf *m, struct sockproto *proto, struct sockaddr *src, 254528737fdSBjoern A. Zeeb struct rawcb *rp) 255528737fdSBjoern A. Zeeb { 256528737fdSBjoern A. Zeeb int fibnum; 257528737fdSBjoern A. Zeeb 258528737fdSBjoern A. Zeeb KASSERT(m != NULL, ("%s: m is NULL", __func__)); 259528737fdSBjoern A. Zeeb KASSERT(proto != NULL, ("%s: proto is NULL", __func__)); 260528737fdSBjoern A. Zeeb KASSERT(rp != NULL, ("%s: rp is NULL", __func__)); 261528737fdSBjoern A. Zeeb 262528737fdSBjoern A. Zeeb /* No filtering requested. */ 263528737fdSBjoern A. Zeeb if ((m->m_flags & RTS_FILTER_FIB) == 0) 264528737fdSBjoern A. Zeeb return (0); 265528737fdSBjoern A. Zeeb 266528737fdSBjoern A. Zeeb /* Check if it is a rts and the fib matches the one of the socket. */ 267528737fdSBjoern A. Zeeb fibnum = M_GETFIB(m); 268528737fdSBjoern A. Zeeb if (proto->sp_family != PF_ROUTE || 269528737fdSBjoern A. Zeeb rp->rcb_socket == NULL || 270528737fdSBjoern A. Zeeb rp->rcb_socket->so_fibnum == fibnum) 271528737fdSBjoern A. Zeeb return (0); 272528737fdSBjoern A. Zeeb 273528737fdSBjoern A. Zeeb /* Filtering requested and no match, the socket shall be skipped. */ 274528737fdSBjoern A. Zeeb return (1); 275528737fdSBjoern A. Zeeb } 276528737fdSBjoern A. Zeeb 277d989c7b3SRobert Watson static void 278d989c7b3SRobert Watson rts_input(struct mbuf *m) 279d989c7b3SRobert Watson { 280d989c7b3SRobert Watson struct sockproto route_proto; 281d989c7b3SRobert Watson unsigned short *family; 282d989c7b3SRobert Watson struct m_tag *tag; 283d989c7b3SRobert Watson 284d989c7b3SRobert Watson route_proto.sp_family = PF_ROUTE; 285d989c7b3SRobert Watson tag = m_tag_find(m, PACKET_TAG_RTSOCKFAM, NULL); 286d989c7b3SRobert Watson if (tag != NULL) { 287d989c7b3SRobert Watson family = (unsigned short *)(tag + 1); 288d989c7b3SRobert Watson route_proto.sp_protocol = *family; 289d989c7b3SRobert Watson m_tag_delete(m, tag); 290d989c7b3SRobert Watson } else 291d989c7b3SRobert Watson route_proto.sp_protocol = 0; 292d989c7b3SRobert Watson 293528737fdSBjoern A. Zeeb raw_input_ext(m, &route_proto, &route_src, raw_input_rts_cb); 294d989c7b3SRobert Watson } 295d989c7b3SRobert Watson 296a29f300eSGarrett Wollman /* 297a29f300eSGarrett Wollman * It really doesn't make any sense at all for this code to share much 298a29f300eSGarrett Wollman * with raw_usrreq.c, since its functionality is so restricted. XXX 299a29f300eSGarrett Wollman */ 300ac45e92fSRobert Watson static void 301a29f300eSGarrett Wollman rts_abort(struct socket *so) 302df8bae1dSRodney W. Grimes { 3037e994955SRobert Watson 304ac45e92fSRobert Watson raw_usrreqs.pru_abort(so); 305df8bae1dSRodney W. Grimes } 306a29f300eSGarrett Wollman 307a152f8a3SRobert Watson static void 308a152f8a3SRobert Watson rts_close(struct socket *so) 309a152f8a3SRobert Watson { 310a152f8a3SRobert Watson 311a152f8a3SRobert Watson raw_usrreqs.pru_close(so); 312a152f8a3SRobert Watson } 313a152f8a3SRobert Watson 314a29f300eSGarrett Wollman /* pru_accept is EOPNOTSUPP */ 315a29f300eSGarrett Wollman 316a29f300eSGarrett Wollman static int 317b40ce416SJulian Elischer rts_attach(struct socket *so, int proto, struct thread *td) 318a29f300eSGarrett Wollman { 319a29f300eSGarrett Wollman struct rawcb *rp; 320c9b652e3SAndre Oppermann int error; 321a29f300eSGarrett Wollman 322bc725eafSRobert Watson KASSERT(so->so_pcb == NULL, ("rts_attach: so_pcb != NULL")); 323bc725eafSRobert Watson 3247cc0979fSDavid Malone /* XXX */ 3251ede983cSDag-Erling Smørgrav rp = malloc(sizeof *rp, M_PCB, M_WAITOK | M_ZERO); 326a29f300eSGarrett Wollman 327a29f300eSGarrett Wollman so->so_pcb = (caddr_t)rp; 3288b07e49aSJulian Elischer so->so_fibnum = td->td_proc->p_fibnum; 329162c0b2eSRuslan Ermilov error = raw_attach(so, proto); 330a29f300eSGarrett Wollman rp = sotorawcb(so); 331a29f300eSGarrett Wollman if (error) { 3327ba271aeSJonathan Chen so->so_pcb = NULL; 333a29f300eSGarrett Wollman free(rp, M_PCB); 334a29f300eSGarrett Wollman return error; 335a29f300eSGarrett Wollman } 336aea8b30fSSam Leffler RTSOCK_LOCK(); 337a29f300eSGarrett Wollman switch(rp->rcb_proto.sp_protocol) { 338a29f300eSGarrett Wollman case AF_INET: 339c5d4eab6SMarko Zec V_route_cb.ip_count++; 340a29f300eSGarrett Wollman break; 341899ce4f4SYoshinobu Inoue case AF_INET6: 342c5d4eab6SMarko Zec V_route_cb.ip6_count++; 343899ce4f4SYoshinobu Inoue break; 344a29f300eSGarrett Wollman } 345c5d4eab6SMarko Zec V_route_cb.any_count++; 346aea8b30fSSam Leffler RTSOCK_UNLOCK(); 34703e49181SSeigo Tanimura soisconnected(so); 348df8bae1dSRodney W. Grimes so->so_options |= SO_USELOOPBACK; 349a29f300eSGarrett Wollman return 0; 350df8bae1dSRodney W. Grimes } 351df8bae1dSRodney W. Grimes 352a29f300eSGarrett Wollman static int 353b40ce416SJulian Elischer rts_bind(struct socket *so, struct sockaddr *nam, struct thread *td) 354a29f300eSGarrett Wollman { 3557e994955SRobert Watson 3567e994955SRobert Watson return (raw_usrreqs.pru_bind(so, nam, td)); /* xxx just EINVAL */ 357a29f300eSGarrett Wollman } 358a29f300eSGarrett Wollman 359a29f300eSGarrett Wollman static int 360b40ce416SJulian Elischer rts_connect(struct socket *so, struct sockaddr *nam, struct thread *td) 361a29f300eSGarrett Wollman { 3627e994955SRobert Watson 3637e994955SRobert Watson return (raw_usrreqs.pru_connect(so, nam, td)); /* XXX just EINVAL */ 364a29f300eSGarrett Wollman } 365a29f300eSGarrett Wollman 366a29f300eSGarrett Wollman /* pru_connect2 is EOPNOTSUPP */ 367a29f300eSGarrett Wollman /* pru_control is EOPNOTSUPP */ 368a29f300eSGarrett Wollman 369bc725eafSRobert Watson static void 370a29f300eSGarrett Wollman rts_detach(struct socket *so) 371a29f300eSGarrett Wollman { 372a29f300eSGarrett Wollman struct rawcb *rp = sotorawcb(so); 373a29f300eSGarrett Wollman 374bc725eafSRobert Watson KASSERT(rp != NULL, ("rts_detach: rp == NULL")); 375bc725eafSRobert Watson 376aea8b30fSSam Leffler RTSOCK_LOCK(); 377a29f300eSGarrett Wollman switch(rp->rcb_proto.sp_protocol) { 378a29f300eSGarrett Wollman case AF_INET: 379c5d4eab6SMarko Zec V_route_cb.ip_count--; 380a29f300eSGarrett Wollman break; 381899ce4f4SYoshinobu Inoue case AF_INET6: 382c5d4eab6SMarko Zec V_route_cb.ip6_count--; 383899ce4f4SYoshinobu Inoue break; 384a29f300eSGarrett Wollman } 385c5d4eab6SMarko Zec V_route_cb.any_count--; 386aea8b30fSSam Leffler RTSOCK_UNLOCK(); 387bc725eafSRobert Watson raw_usrreqs.pru_detach(so); 388a29f300eSGarrett Wollman } 389a29f300eSGarrett Wollman 390a29f300eSGarrett Wollman static int 391a29f300eSGarrett Wollman rts_disconnect(struct socket *so) 392a29f300eSGarrett Wollman { 3937e994955SRobert Watson 3947e994955SRobert Watson return (raw_usrreqs.pru_disconnect(so)); 395a29f300eSGarrett Wollman } 396a29f300eSGarrett Wollman 397a29f300eSGarrett Wollman /* pru_listen is EOPNOTSUPP */ 398a29f300eSGarrett Wollman 399a29f300eSGarrett Wollman static int 40057bf258eSGarrett Wollman rts_peeraddr(struct socket *so, struct sockaddr **nam) 401a29f300eSGarrett Wollman { 4027e994955SRobert Watson 4037e994955SRobert Watson return (raw_usrreqs.pru_peeraddr(so, nam)); 404a29f300eSGarrett Wollman } 405a29f300eSGarrett Wollman 406a29f300eSGarrett Wollman /* pru_rcvd is EOPNOTSUPP */ 407a29f300eSGarrett Wollman /* pru_rcvoob is EOPNOTSUPP */ 408a29f300eSGarrett Wollman 409a29f300eSGarrett Wollman static int 41057bf258eSGarrett Wollman rts_send(struct socket *so, int flags, struct mbuf *m, struct sockaddr *nam, 411b40ce416SJulian Elischer struct mbuf *control, struct thread *td) 412a29f300eSGarrett Wollman { 4137e994955SRobert Watson 4147e994955SRobert Watson return (raw_usrreqs.pru_send(so, flags, m, nam, control, td)); 415a29f300eSGarrett Wollman } 416a29f300eSGarrett Wollman 417a29f300eSGarrett Wollman /* pru_sense is null */ 418a29f300eSGarrett Wollman 419a29f300eSGarrett Wollman static int 420a29f300eSGarrett Wollman rts_shutdown(struct socket *so) 421a29f300eSGarrett Wollman { 4227e994955SRobert Watson 4237e994955SRobert Watson return (raw_usrreqs.pru_shutdown(so)); 424a29f300eSGarrett Wollman } 425a29f300eSGarrett Wollman 426a29f300eSGarrett Wollman static int 42757bf258eSGarrett Wollman rts_sockaddr(struct socket *so, struct sockaddr **nam) 428a29f300eSGarrett Wollman { 4297e994955SRobert Watson 4307e994955SRobert Watson return (raw_usrreqs.pru_sockaddr(so, nam)); 431a29f300eSGarrett Wollman } 432a29f300eSGarrett Wollman 433a29f300eSGarrett Wollman static struct pr_usrreqs route_usrreqs = { 434756d52a1SPoul-Henning Kamp .pru_abort = rts_abort, 435756d52a1SPoul-Henning Kamp .pru_attach = rts_attach, 436756d52a1SPoul-Henning Kamp .pru_bind = rts_bind, 437756d52a1SPoul-Henning Kamp .pru_connect = rts_connect, 438756d52a1SPoul-Henning Kamp .pru_detach = rts_detach, 439756d52a1SPoul-Henning Kamp .pru_disconnect = rts_disconnect, 440756d52a1SPoul-Henning Kamp .pru_peeraddr = rts_peeraddr, 441756d52a1SPoul-Henning Kamp .pru_send = rts_send, 442756d52a1SPoul-Henning Kamp .pru_shutdown = rts_shutdown, 443756d52a1SPoul-Henning Kamp .pru_sockaddr = rts_sockaddr, 444a152f8a3SRobert Watson .pru_close = rts_close, 445a29f300eSGarrett Wollman }; 446a29f300eSGarrett Wollman 447413628a7SBjoern A. Zeeb #ifndef _SOCKADDR_UNION_DEFINED 448413628a7SBjoern A. Zeeb #define _SOCKADDR_UNION_DEFINED 449413628a7SBjoern A. Zeeb /* 450413628a7SBjoern A. Zeeb * The union of all possible address formats we handle. 451413628a7SBjoern A. Zeeb */ 452413628a7SBjoern A. Zeeb union sockaddr_union { 453413628a7SBjoern A. Zeeb struct sockaddr sa; 454413628a7SBjoern A. Zeeb struct sockaddr_in sin; 455413628a7SBjoern A. Zeeb struct sockaddr_in6 sin6; 456413628a7SBjoern A. Zeeb }; 457413628a7SBjoern A. Zeeb #endif /* _SOCKADDR_UNION_DEFINED */ 458413628a7SBjoern A. Zeeb 459413628a7SBjoern A. Zeeb static int 460413628a7SBjoern A. Zeeb rtm_get_jailed(struct rt_addrinfo *info, struct ifnet *ifp, 461aaad3c4fSAlexander V. Chernikov struct nhop_object *nh, union sockaddr_union *saun, struct ucred *cred) 462413628a7SBjoern A. Zeeb { 463a68cc388SGleb Smirnoff #if defined(INET) || defined(INET6) 464a68cc388SGleb Smirnoff struct epoch_tracker et; 465a68cc388SGleb Smirnoff #endif 466413628a7SBjoern A. Zeeb 4679c79d243SJamie Gritton /* First, see if the returned address is part of the jail. */ 468aaad3c4fSAlexander V. Chernikov if (prison_if(cred, nh->nh_ifa->ifa_addr) == 0) { 469aaad3c4fSAlexander V. Chernikov info->rti_info[RTAX_IFA] = nh->nh_ifa->ifa_addr; 4709c79d243SJamie Gritton return (0); 4719c79d243SJamie Gritton } 4729c79d243SJamie Gritton 473413628a7SBjoern A. Zeeb switch (info->rti_info[RTAX_DST]->sa_family) { 474413628a7SBjoern A. Zeeb #ifdef INET 475413628a7SBjoern A. Zeeb case AF_INET: 476413628a7SBjoern A. Zeeb { 477413628a7SBjoern A. Zeeb struct in_addr ia; 478413628a7SBjoern A. Zeeb struct ifaddr *ifa; 479413628a7SBjoern A. Zeeb int found; 480413628a7SBjoern A. Zeeb 481413628a7SBjoern A. Zeeb found = 0; 482413628a7SBjoern A. Zeeb /* 4839c79d243SJamie Gritton * Try to find an address on the given outgoing interface 4849c79d243SJamie Gritton * that belongs to the jail. 485413628a7SBjoern A. Zeeb */ 486a68cc388SGleb Smirnoff NET_EPOCH_ENTER(et); 487d7c5a620SMatt Macy CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) { 488413628a7SBjoern A. Zeeb struct sockaddr *sa; 489413628a7SBjoern A. Zeeb sa = ifa->ifa_addr; 490413628a7SBjoern A. Zeeb if (sa->sa_family != AF_INET) 491413628a7SBjoern A. Zeeb continue; 492413628a7SBjoern A. Zeeb ia = ((struct sockaddr_in *)sa)->sin_addr; 493b89e82ddSJamie Gritton if (prison_check_ip4(cred, &ia) == 0) { 494413628a7SBjoern A. Zeeb found = 1; 495413628a7SBjoern A. Zeeb break; 496413628a7SBjoern A. Zeeb } 497413628a7SBjoern A. Zeeb } 498a68cc388SGleb Smirnoff NET_EPOCH_EXIT(et); 499413628a7SBjoern A. Zeeb if (!found) { 500413628a7SBjoern A. Zeeb /* 5019c79d243SJamie Gritton * As a last resort return the 'default' jail address. 502413628a7SBjoern A. Zeeb */ 503aaad3c4fSAlexander V. Chernikov ia = ((struct sockaddr_in *)nh->nh_ifa->ifa_addr)-> 5040304c731SJamie Gritton sin_addr; 5051cecba0fSBjoern A. Zeeb if (prison_get_ip4(cred, &ia) != 0) 506413628a7SBjoern A. Zeeb return (ESRCH); 507413628a7SBjoern A. Zeeb } 508413628a7SBjoern A. Zeeb bzero(&saun->sin, sizeof(struct sockaddr_in)); 509413628a7SBjoern A. Zeeb saun->sin.sin_len = sizeof(struct sockaddr_in); 510413628a7SBjoern A. Zeeb saun->sin.sin_family = AF_INET; 511413628a7SBjoern A. Zeeb saun->sin.sin_addr.s_addr = ia.s_addr; 5129c79d243SJamie Gritton info->rti_info[RTAX_IFA] = (struct sockaddr *)&saun->sin; 513413628a7SBjoern A. Zeeb break; 514413628a7SBjoern A. Zeeb } 515413628a7SBjoern A. Zeeb #endif 516413628a7SBjoern A. Zeeb #ifdef INET6 517413628a7SBjoern A. Zeeb case AF_INET6: 518413628a7SBjoern A. Zeeb { 519413628a7SBjoern A. Zeeb struct in6_addr ia6; 520413628a7SBjoern A. Zeeb struct ifaddr *ifa; 521413628a7SBjoern A. Zeeb int found; 522413628a7SBjoern A. Zeeb 523413628a7SBjoern A. Zeeb found = 0; 524413628a7SBjoern A. Zeeb /* 5259c79d243SJamie Gritton * Try to find an address on the given outgoing interface 5269c79d243SJamie Gritton * that belongs to the jail. 527413628a7SBjoern A. Zeeb */ 528a68cc388SGleb Smirnoff NET_EPOCH_ENTER(et); 529d7c5a620SMatt Macy CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) { 530413628a7SBjoern A. Zeeb struct sockaddr *sa; 531413628a7SBjoern A. Zeeb sa = ifa->ifa_addr; 532413628a7SBjoern A. Zeeb if (sa->sa_family != AF_INET6) 533413628a7SBjoern A. Zeeb continue; 534413628a7SBjoern A. Zeeb bcopy(&((struct sockaddr_in6 *)sa)->sin6_addr, 535413628a7SBjoern A. Zeeb &ia6, sizeof(struct in6_addr)); 536b89e82ddSJamie Gritton if (prison_check_ip6(cred, &ia6) == 0) { 537413628a7SBjoern A. Zeeb found = 1; 538413628a7SBjoern A. Zeeb break; 539413628a7SBjoern A. Zeeb } 540413628a7SBjoern A. Zeeb } 541a68cc388SGleb Smirnoff NET_EPOCH_EXIT(et); 542413628a7SBjoern A. Zeeb if (!found) { 543413628a7SBjoern A. Zeeb /* 5449c79d243SJamie Gritton * As a last resort return the 'default' jail address. 545413628a7SBjoern A. Zeeb */ 546aaad3c4fSAlexander V. Chernikov ia6 = ((struct sockaddr_in6 *)nh->nh_ifa->ifa_addr)-> 5470304c731SJamie Gritton sin6_addr; 5481cecba0fSBjoern A. Zeeb if (prison_get_ip6(cred, &ia6) != 0) 549413628a7SBjoern A. Zeeb return (ESRCH); 550413628a7SBjoern A. Zeeb } 551413628a7SBjoern A. Zeeb bzero(&saun->sin6, sizeof(struct sockaddr_in6)); 552413628a7SBjoern A. Zeeb saun->sin6.sin6_len = sizeof(struct sockaddr_in6); 553413628a7SBjoern A. Zeeb saun->sin6.sin6_family = AF_INET6; 5549c79d243SJamie Gritton bcopy(&ia6, &saun->sin6.sin6_addr, sizeof(struct in6_addr)); 555413628a7SBjoern A. Zeeb if (sa6_recoverscope(&saun->sin6) != 0) 556413628a7SBjoern A. Zeeb return (ESRCH); 5579c79d243SJamie Gritton info->rti_info[RTAX_IFA] = (struct sockaddr *)&saun->sin6; 558413628a7SBjoern A. Zeeb break; 559413628a7SBjoern A. Zeeb } 560413628a7SBjoern A. Zeeb #endif 561413628a7SBjoern A. Zeeb default: 562413628a7SBjoern A. Zeeb return (ESRCH); 563413628a7SBjoern A. Zeeb } 564413628a7SBjoern A. Zeeb return (0); 565413628a7SBjoern A. Zeeb } 566413628a7SBjoern A. Zeeb 567145bf6c0SAlexander V. Chernikov static int 568145bf6c0SAlexander V. Chernikov fill_blackholeinfo(struct rt_addrinfo *info, union sockaddr_union *saun) 569145bf6c0SAlexander V. Chernikov { 570145bf6c0SAlexander V. Chernikov struct ifaddr *ifa; 571145bf6c0SAlexander V. Chernikov sa_family_t saf; 572145bf6c0SAlexander V. Chernikov 573145bf6c0SAlexander V. Chernikov if (V_loif == NULL) { 574145bf6c0SAlexander V. Chernikov printf("Unable to add blackhole/reject nhop without loopback"); 575145bf6c0SAlexander V. Chernikov return (ENOTSUP); 576145bf6c0SAlexander V. Chernikov } 577145bf6c0SAlexander V. Chernikov info->rti_ifp = V_loif; 578145bf6c0SAlexander V. Chernikov 579145bf6c0SAlexander V. Chernikov saf = info->rti_info[RTAX_DST]->sa_family; 580145bf6c0SAlexander V. Chernikov 581145bf6c0SAlexander V. Chernikov CK_STAILQ_FOREACH(ifa, &info->rti_ifp->if_addrhead, ifa_link) { 582145bf6c0SAlexander V. Chernikov if (ifa->ifa_addr->sa_family == saf) { 583145bf6c0SAlexander V. Chernikov info->rti_ifa = ifa; 584145bf6c0SAlexander V. Chernikov break; 585145bf6c0SAlexander V. Chernikov } 586145bf6c0SAlexander V. Chernikov } 587145bf6c0SAlexander V. Chernikov if (info->rti_ifa == NULL) 588145bf6c0SAlexander V. Chernikov return (ENOTSUP); 589145bf6c0SAlexander V. Chernikov 590145bf6c0SAlexander V. Chernikov bzero(saun, sizeof(union sockaddr_union)); 591145bf6c0SAlexander V. Chernikov switch (saf) { 5928ca99aecSAlexander V. Chernikov #ifdef INET 593145bf6c0SAlexander V. Chernikov case AF_INET: 594145bf6c0SAlexander V. Chernikov saun->sin.sin_family = AF_INET; 595145bf6c0SAlexander V. Chernikov saun->sin.sin_len = sizeof(struct sockaddr_in); 596145bf6c0SAlexander V. Chernikov saun->sin.sin_addr.s_addr = htonl(INADDR_LOOPBACK); 597145bf6c0SAlexander V. Chernikov break; 5988ca99aecSAlexander V. Chernikov #endif 5998ca99aecSAlexander V. Chernikov #ifdef INET6 600145bf6c0SAlexander V. Chernikov case AF_INET6: 601145bf6c0SAlexander V. Chernikov saun->sin6.sin6_family = AF_INET6; 602145bf6c0SAlexander V. Chernikov saun->sin6.sin6_len = sizeof(struct sockaddr_in6); 603145bf6c0SAlexander V. Chernikov saun->sin6.sin6_addr = in6addr_loopback; 604145bf6c0SAlexander V. Chernikov break; 6058ca99aecSAlexander V. Chernikov #endif 606145bf6c0SAlexander V. Chernikov default: 607145bf6c0SAlexander V. Chernikov return (ENOTSUP); 608145bf6c0SAlexander V. Chernikov } 609145bf6c0SAlexander V. Chernikov info->rti_info[RTAX_GATEWAY] = &saun->sa; 610145bf6c0SAlexander V. Chernikov info->rti_flags |= RTF_GATEWAY; 611145bf6c0SAlexander V. Chernikov 612145bf6c0SAlexander V. Chernikov return (0); 613145bf6c0SAlexander V. Chernikov } 614145bf6c0SAlexander V. Chernikov 615c83dda36SAlexander V. Chernikov /* 616c83dda36SAlexander V. Chernikov * Fills in @info based on userland-provided @rtm message. 617c83dda36SAlexander V. Chernikov * 618c83dda36SAlexander V. Chernikov * Returns 0 on success. 619c83dda36SAlexander V. Chernikov */ 620c83dda36SAlexander V. Chernikov static int 621c83dda36SAlexander V. Chernikov fill_addrinfo(struct rt_msghdr *rtm, int len, u_int fibnum, struct rt_addrinfo *info) 622c83dda36SAlexander V. Chernikov { 623c83dda36SAlexander V. Chernikov int error; 624c83dda36SAlexander V. Chernikov sa_family_t saf; 625c83dda36SAlexander V. Chernikov 626c83dda36SAlexander V. Chernikov rtm->rtm_pid = curproc->p_pid; 627c83dda36SAlexander V. Chernikov info->rti_addrs = rtm->rtm_addrs; 628c83dda36SAlexander V. Chernikov 629c83dda36SAlexander V. Chernikov info->rti_mflags = rtm->rtm_inits; 630c83dda36SAlexander V. Chernikov info->rti_rmx = &rtm->rtm_rmx; 631c83dda36SAlexander V. Chernikov 632c83dda36SAlexander V. Chernikov /* 633c83dda36SAlexander V. Chernikov * rt_xaddrs() performs s6_addr[2] := sin6_scope_id for AF_INET6 634c83dda36SAlexander V. Chernikov * link-local address because rtrequest requires addresses with 635c83dda36SAlexander V. Chernikov * embedded scope id. 636c83dda36SAlexander V. Chernikov */ 637c83dda36SAlexander V. Chernikov if (rt_xaddrs((caddr_t)(rtm + 1), len + (caddr_t)rtm, info)) 638c83dda36SAlexander V. Chernikov return (EINVAL); 639c83dda36SAlexander V. Chernikov 640c83dda36SAlexander V. Chernikov info->rti_flags = rtm->rtm_flags; 6412fe5a794SAlexander V. Chernikov error = cleanup_xaddrs(info); 6422fe5a794SAlexander V. Chernikov if (error != 0) 6432fe5a794SAlexander V. Chernikov return (error); 644c83dda36SAlexander V. Chernikov saf = info->rti_info[RTAX_DST]->sa_family; 645c83dda36SAlexander V. Chernikov /* 646c83dda36SAlexander V. Chernikov * Verify that the caller has the appropriate privilege; RTM_GET 647c83dda36SAlexander V. Chernikov * is the only operation the non-superuser is allowed. 648c83dda36SAlexander V. Chernikov */ 649c83dda36SAlexander V. Chernikov if (rtm->rtm_type != RTM_GET) { 650c83dda36SAlexander V. Chernikov error = priv_check(curthread, PRIV_NET_ROUTE); 651c83dda36SAlexander V. Chernikov if (error != 0) 652c83dda36SAlexander V. Chernikov return (error); 653c83dda36SAlexander V. Chernikov } 654c83dda36SAlexander V. Chernikov 655c83dda36SAlexander V. Chernikov /* 656c83dda36SAlexander V. Chernikov * The given gateway address may be an interface address. 657c83dda36SAlexander V. Chernikov * For example, issuing a "route change" command on a route 658c83dda36SAlexander V. Chernikov * entry that was created from a tunnel, and the gateway 659c83dda36SAlexander V. Chernikov * address given is the local end point. In this case the 660c83dda36SAlexander V. Chernikov * RTF_GATEWAY flag must be cleared or the destination will 661c83dda36SAlexander V. Chernikov * not be reachable even though there is no error message. 662c83dda36SAlexander V. Chernikov */ 663c83dda36SAlexander V. Chernikov if (info->rti_info[RTAX_GATEWAY] != NULL && 664c83dda36SAlexander V. Chernikov info->rti_info[RTAX_GATEWAY]->sa_family != AF_LINK) { 665c83dda36SAlexander V. Chernikov struct rt_addrinfo ginfo; 666c83dda36SAlexander V. Chernikov struct sockaddr *gdst; 667c83dda36SAlexander V. Chernikov struct sockaddr_storage ss; 668c83dda36SAlexander V. Chernikov 669c83dda36SAlexander V. Chernikov bzero(&ginfo, sizeof(ginfo)); 670c83dda36SAlexander V. Chernikov bzero(&ss, sizeof(ss)); 671c83dda36SAlexander V. Chernikov ss.ss_len = sizeof(ss); 672c83dda36SAlexander V. Chernikov 673c83dda36SAlexander V. Chernikov ginfo.rti_info[RTAX_GATEWAY] = (struct sockaddr *)&ss; 674c83dda36SAlexander V. Chernikov gdst = info->rti_info[RTAX_GATEWAY]; 675c83dda36SAlexander V. Chernikov 676c83dda36SAlexander V. Chernikov /* 677c83dda36SAlexander V. Chernikov * A host route through the loopback interface is 678c83dda36SAlexander V. Chernikov * installed for each interface adddress. In pre 8.0 679c83dda36SAlexander V. Chernikov * releases the interface address of a PPP link type 680c83dda36SAlexander V. Chernikov * is not reachable locally. This behavior is fixed as 681c83dda36SAlexander V. Chernikov * part of the new L2/L3 redesign and rewrite work. The 682c83dda36SAlexander V. Chernikov * signature of this interface address route is the 683aaad3c4fSAlexander V. Chernikov * AF_LINK sa_family type of the gateway, and the 684c83dda36SAlexander V. Chernikov * rt_ifp has the IFF_LOOPBACK flag set. 685c83dda36SAlexander V. Chernikov */ 686c83dda36SAlexander V. Chernikov if (rib_lookup_info(fibnum, gdst, NHR_REF, 0, &ginfo) == 0) { 687c83dda36SAlexander V. Chernikov if (ss.ss_family == AF_LINK && 688c83dda36SAlexander V. Chernikov ginfo.rti_ifp->if_flags & IFF_LOOPBACK) { 689c83dda36SAlexander V. Chernikov info->rti_flags &= ~RTF_GATEWAY; 690c83dda36SAlexander V. Chernikov info->rti_flags |= RTF_GWFLAG_COMPAT; 691c83dda36SAlexander V. Chernikov } 692c83dda36SAlexander V. Chernikov rib_free_info(&ginfo); 693c83dda36SAlexander V. Chernikov } 694c83dda36SAlexander V. Chernikov } 695c83dda36SAlexander V. Chernikov 696c83dda36SAlexander V. Chernikov return (0); 697c83dda36SAlexander V. Chernikov } 698c83dda36SAlexander V. Chernikov 699fedeb08bSAlexander V. Chernikov static struct nhop_object * 700fedeb08bSAlexander V. Chernikov select_nhop(struct nhop_object *nh, const struct sockaddr *gw) 701fedeb08bSAlexander V. Chernikov { 702fedeb08bSAlexander V. Chernikov if (!NH_IS_NHGRP(nh)) 703fedeb08bSAlexander V. Chernikov return (nh); 704fedeb08bSAlexander V. Chernikov #ifdef ROUTE_MPATH 705fedeb08bSAlexander V. Chernikov struct weightened_nhop *wn; 706fedeb08bSAlexander V. Chernikov uint32_t num_nhops; 707fedeb08bSAlexander V. Chernikov wn = nhgrp_get_nhops((struct nhgrp_object *)nh, &num_nhops); 708fedeb08bSAlexander V. Chernikov if (gw == NULL) 709fedeb08bSAlexander V. Chernikov return (wn[0].nh); 710fedeb08bSAlexander V. Chernikov for (int i = 0; i < num_nhops; i++) { 711fedeb08bSAlexander V. Chernikov if (match_nhop_gw(wn[i].nh, gw)) 712fedeb08bSAlexander V. Chernikov return (wn[i].nh); 713fedeb08bSAlexander V. Chernikov } 714fedeb08bSAlexander V. Chernikov #endif 715fedeb08bSAlexander V. Chernikov return (NULL); 716fedeb08bSAlexander V. Chernikov } 717fedeb08bSAlexander V. Chernikov 718c83dda36SAlexander V. Chernikov /* 719c83dda36SAlexander V. Chernikov * Handles RTM_GET message from routing socket, returning matching rt. 720c83dda36SAlexander V. Chernikov * 721c83dda36SAlexander V. Chernikov * Returns: 722c83dda36SAlexander V. Chernikov * 0 on success, with locked and referenced matching rt in @rt_nrt 723c83dda36SAlexander V. Chernikov * errno of failure 724c83dda36SAlexander V. Chernikov */ 725c83dda36SAlexander V. Chernikov static int 726c83dda36SAlexander V. Chernikov handle_rtm_get(struct rt_addrinfo *info, u_int fibnum, 727a287a973SAlexander V. Chernikov struct rt_msghdr *rtm, struct rib_cmd_info *rc) 728c83dda36SAlexander V. Chernikov { 729c83dda36SAlexander V. Chernikov RIB_RLOCK_TRACKER; 730c83dda36SAlexander V. Chernikov struct rib_head *rnh; 731fedeb08bSAlexander V. Chernikov struct nhop_object *nh; 732c83dda36SAlexander V. Chernikov sa_family_t saf; 733c83dda36SAlexander V. Chernikov 734c83dda36SAlexander V. Chernikov saf = info->rti_info[RTAX_DST]->sa_family; 735c83dda36SAlexander V. Chernikov 736c83dda36SAlexander V. Chernikov rnh = rt_tables_get_rnh(fibnum, saf); 737c83dda36SAlexander V. Chernikov if (rnh == NULL) 738c83dda36SAlexander V. Chernikov return (EAFNOSUPPORT); 739c83dda36SAlexander V. Chernikov 740c83dda36SAlexander V. Chernikov RIB_RLOCK(rnh); 741c83dda36SAlexander V. Chernikov 7422fe5a794SAlexander V. Chernikov /* 7432fe5a794SAlexander V. Chernikov * By (implicit) convention host route (one without netmask) 7442fe5a794SAlexander V. Chernikov * means longest-prefix-match request and the route with netmask 7452fe5a794SAlexander V. Chernikov * means exact-match lookup. 7462fe5a794SAlexander V. Chernikov * As cleanup_xaddrs() cleans up info flags&addrs for the /32,/128 7472fe5a794SAlexander V. Chernikov * prefixes, use original data to check for the netmask presence. 7482fe5a794SAlexander V. Chernikov */ 7492fe5a794SAlexander V. Chernikov if ((rtm->rtm_addrs & RTA_NETMASK) == 0) { 750c83dda36SAlexander V. Chernikov /* 751c83dda36SAlexander V. Chernikov * Provide longest prefix match for 752c83dda36SAlexander V. Chernikov * address lookup (no mask). 753c83dda36SAlexander V. Chernikov * 'route -n get addr' 754c83dda36SAlexander V. Chernikov */ 755a287a973SAlexander V. Chernikov rc->rc_rt = (struct rtentry *) rnh->rnh_matchaddr( 756c83dda36SAlexander V. Chernikov info->rti_info[RTAX_DST], &rnh->head); 757c83dda36SAlexander V. Chernikov } else 758a287a973SAlexander V. Chernikov rc->rc_rt = (struct rtentry *) rnh->rnh_lookup( 759c83dda36SAlexander V. Chernikov info->rti_info[RTAX_DST], 760c83dda36SAlexander V. Chernikov info->rti_info[RTAX_NETMASK], &rnh->head); 761c83dda36SAlexander V. Chernikov 762a287a973SAlexander V. Chernikov if (rc->rc_rt == NULL) { 763c83dda36SAlexander V. Chernikov RIB_RUNLOCK(rnh); 764c83dda36SAlexander V. Chernikov return (ESRCH); 765c83dda36SAlexander V. Chernikov } 766fedeb08bSAlexander V. Chernikov 767d68fb8d9SAlexander V. Chernikov nh = select_nhop(rt_get_raw_nhop(rc->rc_rt), info->rti_info[RTAX_GATEWAY]); 768fedeb08bSAlexander V. Chernikov if (nh == NULL) { 769c83dda36SAlexander V. Chernikov RIB_RUNLOCK(rnh); 770c83dda36SAlexander V. Chernikov return (ESRCH); 771c83dda36SAlexander V. Chernikov } 772c83dda36SAlexander V. Chernikov /* 773c83dda36SAlexander V. Chernikov * If performing proxied L2 entry insertion, and 774c83dda36SAlexander V. Chernikov * the actual PPP host entry is found, perform 775c83dda36SAlexander V. Chernikov * another search to retrieve the prefix route of 776c83dda36SAlexander V. Chernikov * the local end point of the PPP link. 777aaad3c4fSAlexander V. Chernikov * TODO: move this logic to userland. 778c83dda36SAlexander V. Chernikov */ 779c83dda36SAlexander V. Chernikov if (rtm->rtm_flags & RTF_ANNOUNCE) { 780c83dda36SAlexander V. Chernikov struct sockaddr laddr; 781c83dda36SAlexander V. Chernikov 782aaad3c4fSAlexander V. Chernikov if (nh->nh_ifp != NULL && 783aaad3c4fSAlexander V. Chernikov nh->nh_ifp->if_type == IFT_PROPVIRTUAL) { 784c83dda36SAlexander V. Chernikov struct ifaddr *ifa; 785c83dda36SAlexander V. Chernikov 786c83dda36SAlexander V. Chernikov ifa = ifa_ifwithnet(info->rti_info[RTAX_DST], 1, 787c83dda36SAlexander V. Chernikov RT_ALL_FIBS); 788c83dda36SAlexander V. Chernikov if (ifa != NULL) 789c83dda36SAlexander V. Chernikov rt_maskedcopy(ifa->ifa_addr, 790c83dda36SAlexander V. Chernikov &laddr, 791c83dda36SAlexander V. Chernikov ifa->ifa_netmask); 792c83dda36SAlexander V. Chernikov } else 793aaad3c4fSAlexander V. Chernikov rt_maskedcopy(nh->nh_ifa->ifa_addr, 794c83dda36SAlexander V. Chernikov &laddr, 795aaad3c4fSAlexander V. Chernikov nh->nh_ifa->ifa_netmask); 796c83dda36SAlexander V. Chernikov /* 797c83dda36SAlexander V. Chernikov * refactor rt and no lock operation necessary 798c83dda36SAlexander V. Chernikov */ 799a287a973SAlexander V. Chernikov rc->rc_rt = (struct rtentry *)rnh->rnh_matchaddr(&laddr, 800c83dda36SAlexander V. Chernikov &rnh->head); 801a287a973SAlexander V. Chernikov if (rc->rc_rt == NULL) { 802c83dda36SAlexander V. Chernikov RIB_RUNLOCK(rnh); 803c83dda36SAlexander V. Chernikov return (ESRCH); 804c83dda36SAlexander V. Chernikov } 805d68fb8d9SAlexander V. Chernikov nh = select_nhop(rt_get_raw_nhop(rc->rc_rt), info->rti_info[RTAX_GATEWAY]); 806fedeb08bSAlexander V. Chernikov if (nh == NULL) { 807fedeb08bSAlexander V. Chernikov RIB_RUNLOCK(rnh); 808fedeb08bSAlexander V. Chernikov return (ESRCH); 809c83dda36SAlexander V. Chernikov } 810fedeb08bSAlexander V. Chernikov } 811fedeb08bSAlexander V. Chernikov rc->rc_nh_new = nh; 8122259a030SAlexander V. Chernikov rc->rc_nh_weight = rc->rc_rt->rt_weight; 813c83dda36SAlexander V. Chernikov RIB_RUNLOCK(rnh); 814c83dda36SAlexander V. Chernikov 815c83dda36SAlexander V. Chernikov return (0); 816c83dda36SAlexander V. Chernikov } 817c83dda36SAlexander V. Chernikov 818d68fb8d9SAlexander V. Chernikov static void 819d68fb8d9SAlexander V. Chernikov init_sockaddrs_family(int family, struct sockaddr *dst, struct sockaddr *mask) 820d68fb8d9SAlexander V. Chernikov { 821d68fb8d9SAlexander V. Chernikov #ifdef INET 822d68fb8d9SAlexander V. Chernikov if (family == AF_INET) { 823d68fb8d9SAlexander V. Chernikov struct sockaddr_in *dst4 = (struct sockaddr_in *)dst; 824d68fb8d9SAlexander V. Chernikov struct sockaddr_in *mask4 = (struct sockaddr_in *)mask; 825d68fb8d9SAlexander V. Chernikov 826d68fb8d9SAlexander V. Chernikov bzero(dst4, sizeof(struct sockaddr_in)); 827d68fb8d9SAlexander V. Chernikov bzero(mask4, sizeof(struct sockaddr_in)); 828d68fb8d9SAlexander V. Chernikov 829d68fb8d9SAlexander V. Chernikov dst4->sin_family = AF_INET; 830d68fb8d9SAlexander V. Chernikov dst4->sin_len = sizeof(struct sockaddr_in); 831d68fb8d9SAlexander V. Chernikov mask4->sin_family = AF_INET; 832d68fb8d9SAlexander V. Chernikov mask4->sin_len = sizeof(struct sockaddr_in); 833d68fb8d9SAlexander V. Chernikov } 834d68fb8d9SAlexander V. Chernikov #endif 835d68fb8d9SAlexander V. Chernikov #ifdef INET6 836d68fb8d9SAlexander V. Chernikov if (family == AF_INET6) { 837d68fb8d9SAlexander V. Chernikov struct sockaddr_in6 *dst6 = (struct sockaddr_in6 *)dst; 838d68fb8d9SAlexander V. Chernikov struct sockaddr_in6 *mask6 = (struct sockaddr_in6 *)mask; 839d68fb8d9SAlexander V. Chernikov 840d68fb8d9SAlexander V. Chernikov bzero(dst6, sizeof(struct sockaddr_in6)); 841d68fb8d9SAlexander V. Chernikov bzero(mask6, sizeof(struct sockaddr_in6)); 842d68fb8d9SAlexander V. Chernikov 843d68fb8d9SAlexander V. Chernikov dst6->sin6_family = AF_INET6; 844d68fb8d9SAlexander V. Chernikov dst6->sin6_len = sizeof(struct sockaddr_in6); 845d68fb8d9SAlexander V. Chernikov mask6->sin6_family = AF_INET6; 846d68fb8d9SAlexander V. Chernikov mask6->sin6_len = sizeof(struct sockaddr_in6); 847d68fb8d9SAlexander V. Chernikov } 848d68fb8d9SAlexander V. Chernikov #endif 849d68fb8d9SAlexander V. Chernikov } 850d68fb8d9SAlexander V. Chernikov 851d68fb8d9SAlexander V. Chernikov static void 852d68fb8d9SAlexander V. Chernikov export_rtaddrs(const struct rtentry *rt, struct sockaddr *dst, 853d68fb8d9SAlexander V. Chernikov struct sockaddr *mask) 854d68fb8d9SAlexander V. Chernikov { 855d68fb8d9SAlexander V. Chernikov #ifdef INET 856d68fb8d9SAlexander V. Chernikov if (dst->sa_family == AF_INET) { 857d68fb8d9SAlexander V. Chernikov struct sockaddr_in *dst4 = (struct sockaddr_in *)dst; 858d68fb8d9SAlexander V. Chernikov struct sockaddr_in *mask4 = (struct sockaddr_in *)mask; 8592fb4a03dSRyan Libby uint32_t scopeid = 0; 860d68fb8d9SAlexander V. Chernikov rt_get_inet_prefix_pmask(rt, &dst4->sin_addr, &mask4->sin_addr, 861d68fb8d9SAlexander V. Chernikov &scopeid); 862d68fb8d9SAlexander V. Chernikov return; 863d68fb8d9SAlexander V. Chernikov } 864d68fb8d9SAlexander V. Chernikov #endif 865d68fb8d9SAlexander V. Chernikov #ifdef INET6 866d68fb8d9SAlexander V. Chernikov if (dst->sa_family == AF_INET6) { 867d68fb8d9SAlexander V. Chernikov struct sockaddr_in6 *dst6 = (struct sockaddr_in6 *)dst; 868d68fb8d9SAlexander V. Chernikov struct sockaddr_in6 *mask6 = (struct sockaddr_in6 *)mask; 8692fb4a03dSRyan Libby uint32_t scopeid = 0; 8702fb4a03dSRyan Libby rt_get_inet6_prefix_pmask(rt, &dst6->sin6_addr, 8712fb4a03dSRyan Libby &mask6->sin6_addr, &scopeid); 872d68fb8d9SAlexander V. Chernikov dst6->sin6_scope_id = scopeid; 873d68fb8d9SAlexander V. Chernikov return; 874d68fb8d9SAlexander V. Chernikov } 875d68fb8d9SAlexander V. Chernikov #endif 876d68fb8d9SAlexander V. Chernikov } 877d68fb8d9SAlexander V. Chernikov 878d68fb8d9SAlexander V. Chernikov 879c83dda36SAlexander V. Chernikov /* 880592d300eSAlexander V. Chernikov * Update sockaddrs, flags, etc in @prtm based on @rc data. 881c83dda36SAlexander V. Chernikov * rtm can be reallocated. 882c83dda36SAlexander V. Chernikov * 883c83dda36SAlexander V. Chernikov * Returns 0 on success, along with pointer to (potentially reallocated) 884c83dda36SAlexander V. Chernikov * rtm. 885c83dda36SAlexander V. Chernikov * 886c83dda36SAlexander V. Chernikov */ 887c83dda36SAlexander V. Chernikov static int 888592d300eSAlexander V. Chernikov update_rtm_from_rc(struct rt_addrinfo *info, struct rt_msghdr **prtm, 889592d300eSAlexander V. Chernikov int alloc_len, struct rib_cmd_info *rc, struct nhop_object *nh) 890c83dda36SAlexander V. Chernikov { 891c83dda36SAlexander V. Chernikov struct walkarg w; 892c83dda36SAlexander V. Chernikov union sockaddr_union saun; 893c83dda36SAlexander V. Chernikov struct rt_msghdr *rtm, *orig_rtm = NULL; 894c83dda36SAlexander V. Chernikov struct ifnet *ifp; 895c83dda36SAlexander V. Chernikov int error, len; 896c83dda36SAlexander V. Chernikov 897c83dda36SAlexander V. Chernikov rtm = *prtm; 898d68fb8d9SAlexander V. Chernikov union sockaddr_union sa_dst, sa_mask; 899d68fb8d9SAlexander V. Chernikov int family = info->rti_info[RTAX_DST]->sa_family; 900d68fb8d9SAlexander V. Chernikov init_sockaddrs_family(family, &sa_dst.sa, &sa_mask.sa); 901d68fb8d9SAlexander V. Chernikov export_rtaddrs(rc->rc_rt, &sa_dst.sa, &sa_mask.sa); 902c83dda36SAlexander V. Chernikov 903d68fb8d9SAlexander V. Chernikov info->rti_info[RTAX_DST] = &sa_dst.sa; 904d68fb8d9SAlexander V. Chernikov info->rti_info[RTAX_NETMASK] = rt_is_host(rc->rc_rt) ? NULL : &sa_mask.sa; 905aaad3c4fSAlexander V. Chernikov info->rti_info[RTAX_GATEWAY] = &nh->gw_sa; 906c83dda36SAlexander V. Chernikov info->rti_info[RTAX_GENMASK] = 0; 907aaad3c4fSAlexander V. Chernikov ifp = nh->nh_ifp; 908c83dda36SAlexander V. Chernikov if (rtm->rtm_addrs & (RTA_IFP | RTA_IFA)) { 909c83dda36SAlexander V. Chernikov if (ifp) { 910c83dda36SAlexander V. Chernikov info->rti_info[RTAX_IFP] = 911c83dda36SAlexander V. Chernikov ifp->if_addr->ifa_addr; 912aaad3c4fSAlexander V. Chernikov error = rtm_get_jailed(info, ifp, nh, 913c83dda36SAlexander V. Chernikov &saun, curthread->td_ucred); 914c83dda36SAlexander V. Chernikov if (error != 0) 915c83dda36SAlexander V. Chernikov return (error); 916c83dda36SAlexander V. Chernikov if (ifp->if_flags & IFF_POINTOPOINT) 917c83dda36SAlexander V. Chernikov info->rti_info[RTAX_BRD] = 918aaad3c4fSAlexander V. Chernikov nh->nh_ifa->ifa_dstaddr; 919c83dda36SAlexander V. Chernikov rtm->rtm_index = ifp->if_index; 920c83dda36SAlexander V. Chernikov } else { 921c83dda36SAlexander V. Chernikov info->rti_info[RTAX_IFP] = NULL; 922c83dda36SAlexander V. Chernikov info->rti_info[RTAX_IFA] = NULL; 923c83dda36SAlexander V. Chernikov } 924c83dda36SAlexander V. Chernikov } else if (ifp != NULL) 925c83dda36SAlexander V. Chernikov rtm->rtm_index = ifp->if_index; 926c83dda36SAlexander V. Chernikov 927c83dda36SAlexander V. Chernikov /* Check if we need to realloc storage */ 928c83dda36SAlexander V. Chernikov rtsock_msg_buffer(rtm->rtm_type, info, NULL, &len); 929c83dda36SAlexander V. Chernikov if (len > alloc_len) { 930c83dda36SAlexander V. Chernikov struct rt_msghdr *tmp_rtm; 931c83dda36SAlexander V. Chernikov 932c83dda36SAlexander V. Chernikov tmp_rtm = malloc(len, M_TEMP, M_NOWAIT); 933c83dda36SAlexander V. Chernikov if (tmp_rtm == NULL) 934c83dda36SAlexander V. Chernikov return (ENOBUFS); 935c83dda36SAlexander V. Chernikov bcopy(rtm, tmp_rtm, rtm->rtm_msglen); 936c83dda36SAlexander V. Chernikov orig_rtm = rtm; 937c83dda36SAlexander V. Chernikov rtm = tmp_rtm; 938c83dda36SAlexander V. Chernikov alloc_len = len; 939c83dda36SAlexander V. Chernikov 940c83dda36SAlexander V. Chernikov /* 941c83dda36SAlexander V. Chernikov * Delay freeing original rtm as info contains 942c83dda36SAlexander V. Chernikov * data referencing it. 943c83dda36SAlexander V. Chernikov */ 944c83dda36SAlexander V. Chernikov } 945c83dda36SAlexander V. Chernikov 946c83dda36SAlexander V. Chernikov w.w_tmem = (caddr_t)rtm; 947c83dda36SAlexander V. Chernikov w.w_tmemsize = alloc_len; 948c83dda36SAlexander V. Chernikov rtsock_msg_buffer(rtm->rtm_type, info, &w, &len); 949c83dda36SAlexander V. Chernikov 950592d300eSAlexander V. Chernikov rtm->rtm_flags = rc->rc_rt->rte_flags | nhop_get_rtflags(nh); 951592d300eSAlexander V. Chernikov if (rtm->rtm_flags & RTF_GWFLAG_COMPAT) 952c83dda36SAlexander V. Chernikov rtm->rtm_flags = RTF_GATEWAY | 953592d300eSAlexander V. Chernikov (rtm->rtm_flags & ~RTF_GWFLAG_COMPAT); 954592d300eSAlexander V. Chernikov rt_getmetrics(rc->rc_rt, nh, &rtm->rtm_rmx); 955592d300eSAlexander V. Chernikov rtm->rtm_rmx.rmx_weight = rc->rc_nh_weight; 956c83dda36SAlexander V. Chernikov rtm->rtm_addrs = info->rti_addrs; 957c83dda36SAlexander V. Chernikov 958c83dda36SAlexander V. Chernikov if (orig_rtm != NULL) 959c83dda36SAlexander V. Chernikov free(orig_rtm, M_TEMP); 960c83dda36SAlexander V. Chernikov *prtm = rtm; 961c83dda36SAlexander V. Chernikov 962c83dda36SAlexander V. Chernikov return (0); 963c83dda36SAlexander V. Chernikov } 964c83dda36SAlexander V. Chernikov 9659c584fa4SAlexander V. Chernikov #ifdef ROUTE_MPATH 966fedeb08bSAlexander V. Chernikov static void 967fedeb08bSAlexander V. Chernikov save_del_notification(struct rib_cmd_info *rc, void *_cbdata) 968fedeb08bSAlexander V. Chernikov { 969fedeb08bSAlexander V. Chernikov struct rib_cmd_info *rc_new = (struct rib_cmd_info *)_cbdata; 970fedeb08bSAlexander V. Chernikov 971fedeb08bSAlexander V. Chernikov if (rc->rc_cmd == RTM_DELETE) 972fedeb08bSAlexander V. Chernikov *rc_new = *rc; 973fedeb08bSAlexander V. Chernikov } 974fedeb08bSAlexander V. Chernikov 975fedeb08bSAlexander V. Chernikov static void 976fedeb08bSAlexander V. Chernikov save_add_notification(struct rib_cmd_info *rc, void *_cbdata) 977fedeb08bSAlexander V. Chernikov { 978fedeb08bSAlexander V. Chernikov struct rib_cmd_info *rc_new = (struct rib_cmd_info *)_cbdata; 979fedeb08bSAlexander V. Chernikov 980fedeb08bSAlexander V. Chernikov if (rc->rc_cmd == RTM_ADD) 981fedeb08bSAlexander V. Chernikov *rc_new = *rc; 982fedeb08bSAlexander V. Chernikov } 9839c584fa4SAlexander V. Chernikov #endif 984fedeb08bSAlexander V. Chernikov 985df8bae1dSRodney W. Grimes /*ARGSUSED*/ 98652041295SPoul-Henning Kamp static int 98773d76e77SKevin Lo route_output(struct mbuf *m, struct socket *so, ...) 988df8bae1dSRodney W. Grimes { 9895dfc91d7SLuigi Rizzo struct rt_msghdr *rtm = NULL; 9905dfc91d7SLuigi Rizzo struct rtentry *rt = NULL; 991df8bae1dSRodney W. Grimes struct rt_addrinfo info; 992b8a6e03fSGleb Smirnoff struct epoch_tracker et; 9933deb3649SAlexander V. Chernikov #ifdef INET6 994d9302031SAlexander V. Chernikov struct sockaddr_storage ss; 9956bbfef90SHiroki Sato struct sockaddr_in6 *sin6; 9960bebb544SHiroki Sato int i, rti_need_deembed = 0; 9976bbfef90SHiroki Sato #endif 998f2e5eb36SAlexander V. Chernikov int alloc_len = 0, len, error = 0, fibnum; 9993ca1a2d6SMax Laier sa_family_t saf = AF_UNSPEC; 1000a287a973SAlexander V. Chernikov struct rib_cmd_info rc; 1001a287a973SAlexander V. Chernikov struct nhop_object *nh; 1002df8bae1dSRodney W. Grimes 1003f5d9a696SAlexander V. Chernikov fibnum = so->so_fibnum; 1004df8bae1dSRodney W. Grimes #define senderr(e) { error = e; goto flush;} 10055dfc91d7SLuigi Rizzo if (m == NULL || ((m->m_len < sizeof(long)) && 10065dfc91d7SLuigi Rizzo (m = m_pullup(m, sizeof(long))) == NULL)) 1007df8bae1dSRodney W. Grimes return (ENOBUFS); 1008df8bae1dSRodney W. Grimes if ((m->m_flags & M_PKTHDR) == 0) 1009df8bae1dSRodney W. Grimes panic("route_output"); 1010b8a6e03fSGleb Smirnoff NET_EPOCH_ENTER(et); 1011df8bae1dSRodney W. Grimes len = m->m_pkthdr.len; 1012df8bae1dSRodney W. Grimes if (len < sizeof(*rtm) || 1013f1fcb552SAlexander V. Chernikov len != mtod(m, struct rt_msghdr *)->rtm_msglen) 1014df8bae1dSRodney W. Grimes senderr(EINVAL); 1015f1fcb552SAlexander V. Chernikov 1016f2e5eb36SAlexander V. Chernikov /* 1017f2e5eb36SAlexander V. Chernikov * Most of current messages are in range 200-240 bytes, 1018d9437c0fSAlexander V. Chernikov * minimize possible re-allocation on reply using larger size 1019d9437c0fSAlexander V. Chernikov * buffer aligned on 1k boundaty. 1020f2e5eb36SAlexander V. Chernikov */ 1021f2e5eb36SAlexander V. Chernikov alloc_len = roundup2(len, 1024); 1022d9437c0fSAlexander V. Chernikov if ((rtm = malloc(alloc_len, M_TEMP, M_NOWAIT)) == NULL) 1023df8bae1dSRodney W. Grimes senderr(ENOBUFS); 1024f2e5eb36SAlexander V. Chernikov 1025df8bae1dSRodney W. Grimes m_copydata(m, 0, len, (caddr_t)rtm); 1026f1fcb552SAlexander V. Chernikov bzero(&info, sizeof(info)); 1027a287a973SAlexander V. Chernikov nh = NULL; 1028f1fcb552SAlexander V. Chernikov 1029df8bae1dSRodney W. Grimes if (rtm->rtm_version != RTM_VERSION) { 1030f1fcb552SAlexander V. Chernikov /* Do not touch message since format is unknown */ 1031f2e5eb36SAlexander V. Chernikov free(rtm, M_TEMP); 1032f1fcb552SAlexander V. Chernikov rtm = NULL; 1033df8bae1dSRodney W. Grimes senderr(EPROTONOSUPPORT); 1034df8bae1dSRodney W. Grimes } 1035f1fcb552SAlexander V. Chernikov 1036f1fcb552SAlexander V. Chernikov /* 1037f1fcb552SAlexander V. Chernikov * Starting from here, it is possible 1038f1fcb552SAlexander V. Chernikov * to alter original message and insert 1039f1fcb552SAlexander V. Chernikov * caller PID and error value. 1040f1fcb552SAlexander V. Chernikov */ 1041f1fcb552SAlexander V. Chernikov 1042c83dda36SAlexander V. Chernikov if ((error = fill_addrinfo(rtm, len, fibnum, &info)) != 0) { 1043dadb6c3bSRuslan Ermilov senderr(error); 1044acd3428bSRobert Watson } 1045162c0b2eSRuslan Ermilov 1046c83dda36SAlexander V. Chernikov saf = info.rti_info[RTAX_DST]->sa_family; 10479231d35fSQing Li 1048c83dda36SAlexander V. Chernikov /* support for new ARP code */ 1049c83dda36SAlexander V. Chernikov if (rtm->rtm_flags & RTF_LLDATA) { 1050c83dda36SAlexander V. Chernikov error = lla_rt_output(rtm, &info); 1051c83dda36SAlexander V. Chernikov #ifdef INET6 1052c83dda36SAlexander V. Chernikov if (error == 0) 1053bec053ffSAlexander V. Chernikov rti_need_deembed = 1; 1054c83dda36SAlexander V. Chernikov #endif 1055c83dda36SAlexander V. Chernikov goto flush; 10569231d35fSQing Li } 10579231d35fSQing Li 1058145bf6c0SAlexander V. Chernikov union sockaddr_union gw_saun; 1059145bf6c0SAlexander V. Chernikov int blackhole_flags = rtm->rtm_flags & (RTF_BLACKHOLE|RTF_REJECT); 1060145bf6c0SAlexander V. Chernikov if (blackhole_flags != 0) { 1061145bf6c0SAlexander V. Chernikov if (blackhole_flags != (RTF_BLACKHOLE | RTF_REJECT)) 1062145bf6c0SAlexander V. Chernikov error = fill_blackholeinfo(&info, &gw_saun); 1063145bf6c0SAlexander V. Chernikov else 1064145bf6c0SAlexander V. Chernikov error = EINVAL; 1065145bf6c0SAlexander V. Chernikov if (error != 0) 1066145bf6c0SAlexander V. Chernikov senderr(error); 1067145bf6c0SAlexander V. Chernikov /* TODO: rebuild rtm from scratch */ 1068145bf6c0SAlexander V. Chernikov } 1069145bf6c0SAlexander V. Chernikov 1070df8bae1dSRodney W. Grimes switch (rtm->rtm_type) { 1071df8bae1dSRodney W. Grimes case RTM_ADD: 1072c77462ddSAlexander V. Chernikov case RTM_CHANGE: 1073b3b6ff23SRyan Stone if (rtm->rtm_type == RTM_ADD) { 10745dfc91d7SLuigi Rizzo if (info.rti_info[RTAX_GATEWAY] == NULL) 1075df8bae1dSRodney W. Grimes senderr(EINVAL); 1076b3b6ff23SRyan Stone } 1077a287a973SAlexander V. Chernikov error = rib_action(fibnum, rtm->rtm_type, &info, &rc); 1078a287a973SAlexander V. Chernikov if (error == 0) { 10790bebb544SHiroki Sato #ifdef INET6 1080bec053ffSAlexander V. Chernikov rti_need_deembed = 1; 10810bebb544SHiroki Sato #endif 1082fedeb08bSAlexander V. Chernikov #ifdef ROUTE_MPATH 1083fedeb08bSAlexander V. Chernikov if (NH_IS_NHGRP(rc.rc_nh_new) || 1084fedeb08bSAlexander V. Chernikov (rc.rc_nh_old && NH_IS_NHGRP(rc.rc_nh_old))) { 1085fedeb08bSAlexander V. Chernikov struct rib_cmd_info rc_simple = {}; 1086fedeb08bSAlexander V. Chernikov rib_decompose_notification(&rc, 1087fedeb08bSAlexander V. Chernikov save_add_notification, (void *)&rc_simple); 1088fedeb08bSAlexander V. Chernikov rc = rc_simple; 1089fedeb08bSAlexander V. Chernikov } 1090fedeb08bSAlexander V. Chernikov #endif 1091a287a973SAlexander V. Chernikov nh = rc.rc_nh_new; 1092592d300eSAlexander V. Chernikov rtm->rtm_index = nh->nh_ifp->if_index; 10931b95005eSAlexander V. Chernikov rtm->rtm_flags = rc.rc_rt->rte_flags | nhop_get_rtflags(nh); 1094df8bae1dSRodney W. Grimes } 1095df8bae1dSRodney W. Grimes break; 1096df8bae1dSRodney W. Grimes 1097df8bae1dSRodney W. Grimes case RTM_DELETE: 1098a287a973SAlexander V. Chernikov error = rib_action(fibnum, RTM_DELETE, &info, &rc); 109978a82810SGarrett Wollman if (error == 0) { 1100fedeb08bSAlexander V. Chernikov #ifdef ROUTE_MPATH 1101fedeb08bSAlexander V. Chernikov if (NH_IS_NHGRP(rc.rc_nh_old) || 1102fedeb08bSAlexander V. Chernikov (rc.rc_nh_new && NH_IS_NHGRP(rc.rc_nh_new))) { 1103fedeb08bSAlexander V. Chernikov struct rib_cmd_info rc_simple = {}; 1104fedeb08bSAlexander V. Chernikov rib_decompose_notification(&rc, 1105fedeb08bSAlexander V. Chernikov save_del_notification, (void *)&rc_simple); 1106fedeb08bSAlexander V. Chernikov rc = rc_simple; 1107fedeb08bSAlexander V. Chernikov } 1108fedeb08bSAlexander V. Chernikov #endif 1109a287a973SAlexander V. Chernikov nh = rc.rc_nh_old; 111078a82810SGarrett Wollman goto report; 111178a82810SGarrett Wollman } 11120bebb544SHiroki Sato #ifdef INET6 11130bebb544SHiroki Sato /* rt_msg2() will not be used when RTM_DELETE fails. */ 1114bec053ffSAlexander V. Chernikov rti_need_deembed = 1; 11150bebb544SHiroki Sato #endif 1116df8bae1dSRodney W. Grimes break; 1117df8bae1dSRodney W. Grimes 1118df8bae1dSRodney W. Grimes case RTM_GET: 1119a287a973SAlexander V. Chernikov error = handle_rtm_get(&info, fibnum, rtm, &rc); 1120c83dda36SAlexander V. Chernikov if (error != 0) 1121c83dda36SAlexander V. Chernikov senderr(error); 1122a287a973SAlexander V. Chernikov nh = rc.rc_nh_new; 1123956b0b65SJeffrey Hsu 112478a82810SGarrett Wollman report: 1125d68fb8d9SAlexander V. Chernikov if (!can_export_rte(curthread->td_ucred, 1126d68fb8d9SAlexander V. Chernikov info.rti_info[RTAX_NETMASK] == NULL, 1127d68fb8d9SAlexander V. Chernikov info.rti_info[RTAX_DST])) { 1128813dd6aeSBjoern A. Zeeb senderr(ESRCH); 1129813dd6aeSBjoern A. Zeeb } 1130a287a973SAlexander V. Chernikov 1131592d300eSAlexander V. Chernikov error = update_rtm_from_rc(&info, &rtm, alloc_len, &rc, nh); 1132c83dda36SAlexander V. Chernikov /* 1133c83dda36SAlexander V. Chernikov * Note that some sockaddr pointers may have changed to 1134c83dda36SAlexander V. Chernikov * point to memory outsize @rtm. Some may be pointing 1135c83dda36SAlexander V. Chernikov * to the on-stack variables. 1136c83dda36SAlexander V. Chernikov * Given that, any pointer in @info CANNOT BE USED. 1137c83dda36SAlexander V. Chernikov */ 1138c83dda36SAlexander V. Chernikov 1139c83dda36SAlexander V. Chernikov /* 1140c83dda36SAlexander V. Chernikov * scopeid deembedding has been performed while 1141c83dda36SAlexander V. Chernikov * writing updated rtm in rtsock_msg_buffer(). 1142c83dda36SAlexander V. Chernikov * With that in mind, skip deembedding procedure below. 1143c83dda36SAlexander V. Chernikov */ 1144d9302031SAlexander V. Chernikov #ifdef INET6 1145c83dda36SAlexander V. Chernikov rti_need_deembed = 0; 1146d9302031SAlexander V. Chernikov #endif 1147c83dda36SAlexander V. Chernikov if (error != 0) 11489c79d243SJamie Gritton senderr(error); 1149df8bae1dSRodney W. Grimes break; 1150df8bae1dSRodney W. Grimes 1151df8bae1dSRodney W. Grimes default: 1152df8bae1dSRodney W. Grimes senderr(EOPNOTSUPP); 1153df8bae1dSRodney W. Grimes } 1154df8bae1dSRodney W. Grimes 1155df8bae1dSRodney W. Grimes flush: 1156b8a6e03fSGleb Smirnoff NET_EPOCH_EXIT(et); 11572bbab0afSAlexander V. Chernikov rt = NULL; 115892c227afSAlexander V. Chernikov 11590bebb544SHiroki Sato #ifdef INET6 1160c83dda36SAlexander V. Chernikov if (rtm != NULL) { 11610bebb544SHiroki Sato if (rti_need_deembed) { 11620bebb544SHiroki Sato /* sin6_scope_id is recovered before sending rtm. */ 11630bebb544SHiroki Sato sin6 = (struct sockaddr_in6 *)&ss; 116412bdf23aSHiroki Sato for (i = 0; i < RTAX_MAX; i++) { 11650bebb544SHiroki Sato if (info.rti_info[i] == NULL) 11660bebb544SHiroki Sato continue; 11670bebb544SHiroki Sato if (info.rti_info[i]->sa_family != AF_INET6) 11680bebb544SHiroki Sato continue; 11690bebb544SHiroki Sato bcopy(info.rti_info[i], sin6, sizeof(*sin6)); 11700bebb544SHiroki Sato if (sa6_recoverscope(sin6) == 0) 11710bebb544SHiroki Sato bcopy(sin6, info.rti_info[i], 11720bebb544SHiroki Sato sizeof(*sin6)); 11730bebb544SHiroki Sato } 11740bebb544SHiroki Sato } 1175c83dda36SAlexander V. Chernikov } 11760bebb544SHiroki Sato #endif 1177c83dda36SAlexander V. Chernikov send_rtm_reply(so, rtm, m, saf, fibnum, error); 1178c83dda36SAlexander V. Chernikov 1179c83dda36SAlexander V. Chernikov return (error); 1180c83dda36SAlexander V. Chernikov } 1181c83dda36SAlexander V. Chernikov 1182c83dda36SAlexander V. Chernikov /* 1183c83dda36SAlexander V. Chernikov * Sends the prepared reply message in @rtm to all rtsock clients. 1184c83dda36SAlexander V. Chernikov * Frees @m and @rtm. 1185c83dda36SAlexander V. Chernikov * 1186c83dda36SAlexander V. Chernikov */ 1187c83dda36SAlexander V. Chernikov static void 1188c83dda36SAlexander V. Chernikov send_rtm_reply(struct socket *so, struct rt_msghdr *rtm, struct mbuf *m, 1189c83dda36SAlexander V. Chernikov sa_family_t saf, u_int fibnum, int rtm_errno) 1190c83dda36SAlexander V. Chernikov { 1191c83dda36SAlexander V. Chernikov struct rawcb *rp = NULL; 1192c83dda36SAlexander V. Chernikov 1193c83dda36SAlexander V. Chernikov /* 1194c83dda36SAlexander V. Chernikov * Check to see if we don't want our own messages. 1195c83dda36SAlexander V. Chernikov */ 1196c83dda36SAlexander V. Chernikov if ((so->so_options & SO_USELOOPBACK) == 0) { 1197c83dda36SAlexander V. Chernikov if (V_route_cb.any_count <= 1) { 1198c83dda36SAlexander V. Chernikov if (rtm != NULL) 1199c83dda36SAlexander V. Chernikov free(rtm, M_TEMP); 1200c83dda36SAlexander V. Chernikov m_freem(m); 1201c83dda36SAlexander V. Chernikov return; 1202c83dda36SAlexander V. Chernikov } 1203c83dda36SAlexander V. Chernikov /* There is another listener, so construct message */ 1204c83dda36SAlexander V. Chernikov rp = sotorawcb(so); 1205c83dda36SAlexander V. Chernikov } 1206c83dda36SAlexander V. Chernikov 1207c83dda36SAlexander V. Chernikov if (rtm != NULL) { 1208c83dda36SAlexander V. Chernikov if (rtm_errno!= 0) 1209c83dda36SAlexander V. Chernikov rtm->rtm_errno = rtm_errno; 121092c227afSAlexander V. Chernikov else 121192c227afSAlexander V. Chernikov rtm->rtm_flags |= RTF_DONE; 121292c227afSAlexander V. Chernikov 1213df8bae1dSRodney W. Grimes m_copyback(m, 0, rtm->rtm_msglen, (caddr_t)rtm); 121403311056SHajimu UMEMOTO if (m->m_pkthdr.len < rtm->rtm_msglen) { 121503311056SHajimu UMEMOTO m_freem(m); 121603311056SHajimu UMEMOTO m = NULL; 121703311056SHajimu UMEMOTO } else if (m->m_pkthdr.len > rtm->rtm_msglen) 121803311056SHajimu UMEMOTO m_adj(m, rtm->rtm_msglen - m->m_pkthdr.len); 1219f2e5eb36SAlexander V. Chernikov 1220f2e5eb36SAlexander V. Chernikov free(rtm, M_TEMP); 1221df8bae1dSRodney W. Grimes } 122292c227afSAlexander V. Chernikov if (m != NULL) { 1223773aa053SAlexander V. Chernikov M_SETFIB(m, fibnum); 1224528737fdSBjoern A. Zeeb m->m_flags |= RTS_FILTER_FIB; 1225becc44d7SSam Leffler if (rp) { 1226becc44d7SSam Leffler /* 1227becc44d7SSam Leffler * XXX insure we don't get a copy by 1228becc44d7SSam Leffler * invalidating our protocol 1229becc44d7SSam Leffler */ 1230becc44d7SSam Leffler unsigned short family = rp->rcb_proto.sp_family; 1231becc44d7SSam Leffler rp->rcb_proto.sp_family = 0; 12323ca1a2d6SMax Laier rt_dispatch(m, saf); 1233becc44d7SSam Leffler rp->rcb_proto.sp_family = family; 1234becc44d7SSam Leffler } else 12353ca1a2d6SMax Laier rt_dispatch(m, saf); 1236becc44d7SSam Leffler } 1237df8bae1dSRodney W. Grimes } 1238df8bae1dSRodney W. Grimes 123952041295SPoul-Henning Kamp static void 124093bfd365SAlexander V. Chernikov rt_getmetrics(const struct rtentry *rt, const struct nhop_object *nh, 124193bfd365SAlexander V. Chernikov struct rt_metrics *out) 124297d8d152SAndre Oppermann { 1243e3a7aa6fSGleb Smirnoff 124497d8d152SAndre Oppermann bzero(out, sizeof(*out)); 124593bfd365SAlexander V. Chernikov out->rmx_mtu = nh->nh_mtu; 1246e3a7aa6fSGleb Smirnoff out->rmx_weight = rt->rt_weight; 124793bfd365SAlexander V. Chernikov out->rmx_nhidx = nhop_get_idx(nh); 1248e27c3f48SOleg Bulyzhin /* Kernel -> userland timebase conversion. */ 1249e3a7aa6fSGleb Smirnoff out->rmx_expire = rt->rt_expire ? 1250e3a7aa6fSGleb Smirnoff rt->rt_expire - time_uptime + time_second : 0; 125197d8d152SAndre Oppermann } 125297d8d152SAndre Oppermann 12537f33a738SJulian Elischer /* 12547f33a738SJulian Elischer * Extract the addresses of the passed sockaddrs. 12557f33a738SJulian Elischer * Do a little sanity checking so as to avoid bad memory references. 1256076d0761SJulian Elischer * This data is derived straight from userland. 12577f33a738SJulian Elischer */ 1258076d0761SJulian Elischer static int 1259becc44d7SSam Leffler rt_xaddrs(caddr_t cp, caddr_t cplim, struct rt_addrinfo *rtinfo) 1260df8bae1dSRodney W. Grimes { 1261e74642dfSLuigi Rizzo struct sockaddr *sa; 1262e74642dfSLuigi Rizzo int i; 1263df8bae1dSRodney W. Grimes 1264becc44d7SSam Leffler for (i = 0; i < RTAX_MAX && cp < cplim; i++) { 1265df8bae1dSRodney W. Grimes if ((rtinfo->rti_addrs & (1 << i)) == 0) 1266df8bae1dSRodney W. Grimes continue; 1267ff6d0a59SJulian Elischer sa = (struct sockaddr *)cp; 12687f33a738SJulian Elischer /* 1269076d0761SJulian Elischer * It won't fit. 12707f33a738SJulian Elischer */ 1271becc44d7SSam Leffler if (cp + sa->sa_len > cplim) 1272076d0761SJulian Elischer return (EINVAL); 12737f33a738SJulian Elischer /* 12747f33a738SJulian Elischer * there are no more.. quit now 12757f33a738SJulian Elischer * If there are more bits, they are in error. 12767f33a738SJulian Elischer * I've seen this. route(1) can evidently generate these. 12777f33a738SJulian Elischer * This causes kernel to core dump. 1278076d0761SJulian Elischer * for compatibility, If we see this, point to a safe address. 12797f33a738SJulian Elischer */ 1280076d0761SJulian Elischer if (sa->sa_len == 0) { 1281076d0761SJulian Elischer rtinfo->rti_info[i] = &sa_zero; 1282076d0761SJulian Elischer return (0); /* should be EINVAL but for compat */ 1283df8bae1dSRodney W. Grimes } 1284076d0761SJulian Elischer /* accept it */ 12850bebb544SHiroki Sato #ifdef INET6 12860bebb544SHiroki Sato if (sa->sa_family == AF_INET6) 12870bebb544SHiroki Sato sa6_embedscope((struct sockaddr_in6 *)sa, 12880bebb544SHiroki Sato V_ip6_use_defzone); 12890bebb544SHiroki Sato #endif 1290076d0761SJulian Elischer rtinfo->rti_info[i] = sa; 1291e74642dfSLuigi Rizzo cp += SA_SIZE(sa); 1292076d0761SJulian Elischer } 1293076d0761SJulian Elischer return (0); 1294df8bae1dSRodney W. Grimes } 1295df8bae1dSRodney W. Grimes 1296a4513bacSAlexander V. Chernikov #ifdef INET 12972fe5a794SAlexander V. Chernikov static inline void 12982fe5a794SAlexander V. Chernikov fill_sockaddr_inet(struct sockaddr_in *sin, struct in_addr addr) 12992fe5a794SAlexander V. Chernikov { 13002fe5a794SAlexander V. Chernikov 13012fe5a794SAlexander V. Chernikov const struct sockaddr_in nsin = { 13022fe5a794SAlexander V. Chernikov .sin_family = AF_INET, 13032fe5a794SAlexander V. Chernikov .sin_len = sizeof(struct sockaddr_in), 13042fe5a794SAlexander V. Chernikov .sin_addr = addr, 13052fe5a794SAlexander V. Chernikov }; 13062fe5a794SAlexander V. Chernikov *sin = nsin; 13072fe5a794SAlexander V. Chernikov } 1308a4513bacSAlexander V. Chernikov #endif 13092fe5a794SAlexander V. Chernikov 1310a4513bacSAlexander V. Chernikov #ifdef INET6 13112fe5a794SAlexander V. Chernikov static inline void 13122fe5a794SAlexander V. Chernikov fill_sockaddr_inet6(struct sockaddr_in6 *sin6, const struct in6_addr *addr6, 13132fe5a794SAlexander V. Chernikov uint32_t scopeid) 13142fe5a794SAlexander V. Chernikov { 13152fe5a794SAlexander V. Chernikov 13162fe5a794SAlexander V. Chernikov const struct sockaddr_in6 nsin6 = { 13172fe5a794SAlexander V. Chernikov .sin6_family = AF_INET6, 13182fe5a794SAlexander V. Chernikov .sin6_len = sizeof(struct sockaddr_in6), 13192fe5a794SAlexander V. Chernikov .sin6_addr = *addr6, 13202fe5a794SAlexander V. Chernikov .sin6_scope_id = scopeid, 13212fe5a794SAlexander V. Chernikov }; 13222fe5a794SAlexander V. Chernikov *sin6 = nsin6; 13232fe5a794SAlexander V. Chernikov } 1324a4513bacSAlexander V. Chernikov #endif 13252fe5a794SAlexander V. Chernikov 1326e5b394f2SAlexander V. Chernikov /* 1327e5b394f2SAlexander V. Chernikov * Checks if gateway is suitable for lltable operations. 1328e5b394f2SAlexander V. Chernikov * Lltable code requires AF_LINK gateway with ifindex 1329e5b394f2SAlexander V. Chernikov * and mac address specified. 1330e5b394f2SAlexander V. Chernikov * Returns 0 on success. 1331e5b394f2SAlexander V. Chernikov */ 1332e5b394f2SAlexander V. Chernikov static int 1333e5b394f2SAlexander V. Chernikov cleanup_xaddrs_lladdr(struct rt_addrinfo *info) 1334e5b394f2SAlexander V. Chernikov { 1335e5b394f2SAlexander V. Chernikov struct sockaddr_dl *sdl = (struct sockaddr_dl *)info->rti_info[RTAX_GATEWAY]; 1336e5b394f2SAlexander V. Chernikov 1337e5b394f2SAlexander V. Chernikov if (sdl->sdl_family != AF_LINK) 1338e5b394f2SAlexander V. Chernikov return (EINVAL); 1339e5b394f2SAlexander V. Chernikov 1340e5b394f2SAlexander V. Chernikov if (sdl->sdl_index == 0) 1341e5b394f2SAlexander V. Chernikov return (EINVAL); 1342e5b394f2SAlexander V. Chernikov 1343e5b394f2SAlexander V. Chernikov if (offsetof(struct sockaddr_dl, sdl_data) + sdl->sdl_nlen + sdl->sdl_alen > sdl->sdl_len) 1344e5b394f2SAlexander V. Chernikov return (EINVAL); 1345e5b394f2SAlexander V. Chernikov 1346e5b394f2SAlexander V. Chernikov return (0); 1347e5b394f2SAlexander V. Chernikov } 1348e5b394f2SAlexander V. Chernikov 13492fe5a794SAlexander V. Chernikov static int 13502fe5a794SAlexander V. Chernikov cleanup_xaddrs_gateway(struct rt_addrinfo *info) 13512fe5a794SAlexander V. Chernikov { 13522fe5a794SAlexander V. Chernikov struct sockaddr *gw = info->rti_info[RTAX_GATEWAY]; 13532fe5a794SAlexander V. Chernikov 1354e5b394f2SAlexander V. Chernikov if (info->rti_flags & RTF_LLDATA) 1355e5b394f2SAlexander V. Chernikov return (cleanup_xaddrs_lladdr(info)); 1356e5b394f2SAlexander V. Chernikov 13572fe5a794SAlexander V. Chernikov switch (gw->sa_family) { 13582fe5a794SAlexander V. Chernikov #ifdef INET 13592fe5a794SAlexander V. Chernikov case AF_INET: 13602fe5a794SAlexander V. Chernikov { 13612fe5a794SAlexander V. Chernikov struct sockaddr_in *gw_sin = (struct sockaddr_in *)gw; 13622fe5a794SAlexander V. Chernikov if (gw_sin->sin_len < sizeof(struct sockaddr_in)) { 13632fe5a794SAlexander V. Chernikov printf("gw sin_len too small\n"); 13642fe5a794SAlexander V. Chernikov return (EINVAL); 13652fe5a794SAlexander V. Chernikov } 13662fe5a794SAlexander V. Chernikov fill_sockaddr_inet(gw_sin, gw_sin->sin_addr); 13672fe5a794SAlexander V. Chernikov } 13682fe5a794SAlexander V. Chernikov break; 13692fe5a794SAlexander V. Chernikov #endif 13702fe5a794SAlexander V. Chernikov #ifdef INET6 13712fe5a794SAlexander V. Chernikov case AF_INET6: 13722fe5a794SAlexander V. Chernikov { 13732fe5a794SAlexander V. Chernikov struct sockaddr_in6 *gw_sin6 = (struct sockaddr_in6 *)gw; 13742fe5a794SAlexander V. Chernikov if (gw_sin6->sin6_len < sizeof(struct sockaddr_in6)) { 13752fe5a794SAlexander V. Chernikov printf("gw sin6_len too small\n"); 13762fe5a794SAlexander V. Chernikov return (EINVAL); 13772fe5a794SAlexander V. Chernikov } 13782fe5a794SAlexander V. Chernikov fill_sockaddr_inet6(gw_sin6, &gw_sin6->sin6_addr, 0); 13792fe5a794SAlexander V. Chernikov break; 13802fe5a794SAlexander V. Chernikov } 13812fe5a794SAlexander V. Chernikov #endif 13822fe5a794SAlexander V. Chernikov case AF_LINK: 13832fe5a794SAlexander V. Chernikov { 1384*7f5f3fccSAlexander V. Chernikov struct sockaddr_dl *gw_sdl; 13852fe5a794SAlexander V. Chernikov 1386*7f5f3fccSAlexander V. Chernikov size_t sdl_min_len = offsetof(struct sockaddr_dl, sdl_data); 1387*7f5f3fccSAlexander V. Chernikov gw_sdl = (struct sockaddr_dl *)gw; 1388*7f5f3fccSAlexander V. Chernikov if (gw_sdl->sdl_len < sdl_min_len) { 13892fe5a794SAlexander V. Chernikov printf("gw sdl_len too small\n"); 13902fe5a794SAlexander V. Chernikov return (EINVAL); 13912fe5a794SAlexander V. Chernikov } 13922fe5a794SAlexander V. Chernikov 13932fe5a794SAlexander V. Chernikov const struct sockaddr_dl_short sdl = { 13942fe5a794SAlexander V. Chernikov .sdl_family = AF_LINK, 1395*7f5f3fccSAlexander V. Chernikov .sdl_len = sdl_min_len, 13962fe5a794SAlexander V. Chernikov .sdl_index = gw_sdl->sdl_index, 13972fe5a794SAlexander V. Chernikov }; 1398*7f5f3fccSAlexander V. Chernikov memcpy(gw_sdl, &sdl, sdl_min_len); 13992fe5a794SAlexander V. Chernikov break; 14002fe5a794SAlexander V. Chernikov } 14012fe5a794SAlexander V. Chernikov } 14022fe5a794SAlexander V. Chernikov 14032fe5a794SAlexander V. Chernikov return (0); 14042fe5a794SAlexander V. Chernikov } 14052fe5a794SAlexander V. Chernikov 1406f9e1cd6cSAlexander V. Chernikov static void 1407f9e1cd6cSAlexander V. Chernikov remove_netmask(struct rt_addrinfo *info) 1408f9e1cd6cSAlexander V. Chernikov { 1409f9e1cd6cSAlexander V. Chernikov info->rti_info[RTAX_NETMASK] = NULL; 1410f9e1cd6cSAlexander V. Chernikov info->rti_flags |= RTF_HOST; 1411f9e1cd6cSAlexander V. Chernikov info->rti_addrs &= ~RTA_NETMASK; 1412f9e1cd6cSAlexander V. Chernikov } 1413f9e1cd6cSAlexander V. Chernikov 1414a4513bacSAlexander V. Chernikov #ifdef INET 14152fe5a794SAlexander V. Chernikov static int 14162fe5a794SAlexander V. Chernikov cleanup_xaddrs_inet(struct rt_addrinfo *info) 14172fe5a794SAlexander V. Chernikov { 14182fe5a794SAlexander V. Chernikov struct sockaddr_in *dst_sa, *mask_sa; 14192fe5a794SAlexander V. Chernikov 14202fe5a794SAlexander V. Chernikov /* Check & fixup dst/netmask combination first */ 14212fe5a794SAlexander V. Chernikov dst_sa = (struct sockaddr_in *)info->rti_info[RTAX_DST]; 14222fe5a794SAlexander V. Chernikov mask_sa = (struct sockaddr_in *)info->rti_info[RTAX_NETMASK]; 14232fe5a794SAlexander V. Chernikov 14242fe5a794SAlexander V. Chernikov struct in_addr mask = { 14252fe5a794SAlexander V. Chernikov .s_addr = mask_sa ? mask_sa->sin_addr.s_addr : INADDR_BROADCAST, 14262fe5a794SAlexander V. Chernikov }; 14272fe5a794SAlexander V. Chernikov struct in_addr dst = { 14282fe5a794SAlexander V. Chernikov .s_addr = htonl(ntohl(dst_sa->sin_addr.s_addr) & ntohl(mask.s_addr)) 14292fe5a794SAlexander V. Chernikov }; 14302fe5a794SAlexander V. Chernikov 14312fe5a794SAlexander V. Chernikov if (dst_sa->sin_len < sizeof(struct sockaddr_in)) { 14322fe5a794SAlexander V. Chernikov printf("dst sin_len too small\n"); 14332fe5a794SAlexander V. Chernikov return (EINVAL); 14342fe5a794SAlexander V. Chernikov } 14352fe5a794SAlexander V. Chernikov if (mask_sa && mask_sa->sin_len < sizeof(struct sockaddr_in)) { 14362fe5a794SAlexander V. Chernikov printf("mask sin_len too small\n"); 14372fe5a794SAlexander V. Chernikov return (EINVAL); 14382fe5a794SAlexander V. Chernikov } 14392fe5a794SAlexander V. Chernikov fill_sockaddr_inet(dst_sa, dst); 14402fe5a794SAlexander V. Chernikov 14412fe5a794SAlexander V. Chernikov if (mask.s_addr != INADDR_BROADCAST) 14422fe5a794SAlexander V. Chernikov fill_sockaddr_inet(mask_sa, mask); 1443f9e1cd6cSAlexander V. Chernikov else 1444f9e1cd6cSAlexander V. Chernikov remove_netmask(info); 14452fe5a794SAlexander V. Chernikov 14462fe5a794SAlexander V. Chernikov /* Check gateway */ 14472fe5a794SAlexander V. Chernikov if (info->rti_info[RTAX_GATEWAY] != NULL) 14482fe5a794SAlexander V. Chernikov return (cleanup_xaddrs_gateway(info)); 14492fe5a794SAlexander V. Chernikov 14502fe5a794SAlexander V. Chernikov return (0); 14512fe5a794SAlexander V. Chernikov } 1452a4513bacSAlexander V. Chernikov #endif 14532fe5a794SAlexander V. Chernikov 1454a4513bacSAlexander V. Chernikov #ifdef INET6 14552fe5a794SAlexander V. Chernikov static int 14562fe5a794SAlexander V. Chernikov cleanup_xaddrs_inet6(struct rt_addrinfo *info) 14572fe5a794SAlexander V. Chernikov { 14582fe5a794SAlexander V. Chernikov struct sockaddr_in6 *dst_sa, *mask_sa; 14592fe5a794SAlexander V. Chernikov struct in6_addr mask; 14602fe5a794SAlexander V. Chernikov 14612fe5a794SAlexander V. Chernikov /* Check & fixup dst/netmask combination first */ 14622fe5a794SAlexander V. Chernikov dst_sa = (struct sockaddr_in6 *)info->rti_info[RTAX_DST]; 14632fe5a794SAlexander V. Chernikov mask_sa = (struct sockaddr_in6 *)info->rti_info[RTAX_NETMASK]; 14642fe5a794SAlexander V. Chernikov 14652fe5a794SAlexander V. Chernikov mask = mask_sa ? mask_sa->sin6_addr : in6mask128; 14662fe5a794SAlexander V. Chernikov IN6_MASK_ADDR(&dst_sa->sin6_addr, &mask); 14672fe5a794SAlexander V. Chernikov 14682fe5a794SAlexander V. Chernikov if (dst_sa->sin6_len < sizeof(struct sockaddr_in6)) { 14692fe5a794SAlexander V. Chernikov printf("dst sin6_len too small\n"); 14702fe5a794SAlexander V. Chernikov return (EINVAL); 14712fe5a794SAlexander V. Chernikov } 14722fe5a794SAlexander V. Chernikov if (mask_sa && mask_sa->sin6_len < sizeof(struct sockaddr_in6)) { 14732fe5a794SAlexander V. Chernikov printf("mask sin6_len too small\n"); 14742fe5a794SAlexander V. Chernikov return (EINVAL); 14752fe5a794SAlexander V. Chernikov } 14762fe5a794SAlexander V. Chernikov fill_sockaddr_inet6(dst_sa, &dst_sa->sin6_addr, 0); 14772fe5a794SAlexander V. Chernikov 14782fe5a794SAlexander V. Chernikov if (!IN6_ARE_ADDR_EQUAL(&mask, &in6mask128)) 14792fe5a794SAlexander V. Chernikov fill_sockaddr_inet6(mask_sa, &mask, 0); 1480f9e1cd6cSAlexander V. Chernikov else 1481f9e1cd6cSAlexander V. Chernikov remove_netmask(info); 14822fe5a794SAlexander V. Chernikov 14832fe5a794SAlexander V. Chernikov /* Check gateway */ 14842fe5a794SAlexander V. Chernikov if (info->rti_info[RTAX_GATEWAY] != NULL) 14852fe5a794SAlexander V. Chernikov return (cleanup_xaddrs_gateway(info)); 14862fe5a794SAlexander V. Chernikov 14872fe5a794SAlexander V. Chernikov return (0); 14882fe5a794SAlexander V. Chernikov } 1489a4513bacSAlexander V. Chernikov #endif 14902fe5a794SAlexander V. Chernikov 14912fe5a794SAlexander V. Chernikov static int 14922fe5a794SAlexander V. Chernikov cleanup_xaddrs(struct rt_addrinfo *info) 14932fe5a794SAlexander V. Chernikov { 14942fe5a794SAlexander V. Chernikov int error = EAFNOSUPPORT; 14952fe5a794SAlexander V. Chernikov 14962fe5a794SAlexander V. Chernikov if (info->rti_info[RTAX_DST] == NULL) 14972fe5a794SAlexander V. Chernikov return (EINVAL); 14982fe5a794SAlexander V. Chernikov 1499f9e1cd6cSAlexander V. Chernikov if (info->rti_flags & RTF_LLDATA) { 1500f9e1cd6cSAlexander V. Chernikov /* 1501f9e1cd6cSAlexander V. Chernikov * arp(8)/ndp(8) sends RTA_NETMASK for the associated 1502f9e1cd6cSAlexander V. Chernikov * prefix along with the actual address in RTA_DST. 1503f9e1cd6cSAlexander V. Chernikov * Remove netmask to avoid unnecessary address masking. 1504f9e1cd6cSAlexander V. Chernikov */ 1505f9e1cd6cSAlexander V. Chernikov remove_netmask(info); 1506f9e1cd6cSAlexander V. Chernikov } 1507f9e1cd6cSAlexander V. Chernikov 15082fe5a794SAlexander V. Chernikov switch (info->rti_info[RTAX_DST]->sa_family) { 15092fe5a794SAlexander V. Chernikov #ifdef INET 15102fe5a794SAlexander V. Chernikov case AF_INET: 15112fe5a794SAlexander V. Chernikov error = cleanup_xaddrs_inet(info); 15122fe5a794SAlexander V. Chernikov break; 15132fe5a794SAlexander V. Chernikov #endif 15142fe5a794SAlexander V. Chernikov #ifdef INET6 15152fe5a794SAlexander V. Chernikov case AF_INET6: 15162fe5a794SAlexander V. Chernikov error = cleanup_xaddrs_inet6(info); 15172fe5a794SAlexander V. Chernikov break; 15182fe5a794SAlexander V. Chernikov #endif 15192fe5a794SAlexander V. Chernikov } 15202fe5a794SAlexander V. Chernikov 15212fe5a794SAlexander V. Chernikov return (error); 15222fe5a794SAlexander V. Chernikov } 15232fe5a794SAlexander V. Chernikov 15246d076ae8SBjoern A. Zeeb /* 15253deb3649SAlexander V. Chernikov * Fill in @dmask with valid netmask leaving original @smask 15263deb3649SAlexander V. Chernikov * intact. Mostly used with radix netmasks. 15273deb3649SAlexander V. Chernikov */ 1528fc88ecd3SAlexander V. Chernikov struct sockaddr * 1529fc88ecd3SAlexander V. Chernikov rtsock_fix_netmask(const struct sockaddr *dst, const struct sockaddr *smask, 15303deb3649SAlexander V. Chernikov struct sockaddr_storage *dmask) 15313deb3649SAlexander V. Chernikov { 15323deb3649SAlexander V. Chernikov if (dst == NULL || smask == NULL) 15333deb3649SAlexander V. Chernikov return (NULL); 15343deb3649SAlexander V. Chernikov 15353deb3649SAlexander V. Chernikov memset(dmask, 0, dst->sa_len); 15363deb3649SAlexander V. Chernikov memcpy(dmask, smask, smask->sa_len); 15373deb3649SAlexander V. Chernikov dmask->ss_len = dst->sa_len; 15383deb3649SAlexander V. Chernikov dmask->ss_family = dst->sa_family; 15393deb3649SAlexander V. Chernikov 15403deb3649SAlexander V. Chernikov return ((struct sockaddr *)dmask); 15413deb3649SAlexander V. Chernikov } 15423deb3649SAlexander V. Chernikov 15433deb3649SAlexander V. Chernikov /* 15446db47af4SAlexander V. Chernikov * Writes information related to @rtinfo object to newly-allocated mbuf. 15456db47af4SAlexander V. Chernikov * Assumes MCLBYTES is enough to construct any message. 15466db47af4SAlexander V. Chernikov * Used for OS notifications of vaious events (if/ifa announces,etc) 15476db47af4SAlexander V. Chernikov * 15486db47af4SAlexander V. Chernikov * Returns allocated mbuf or NULL on failure. 15496d076ae8SBjoern A. Zeeb */ 1550df8bae1dSRodney W. Grimes static struct mbuf * 15516db47af4SAlexander V. Chernikov rtsock_msg_mbuf(int type, struct rt_addrinfo *rtinfo) 1552df8bae1dSRodney W. Grimes { 155392be2847SMark Johnston struct sockaddr_storage ss; 15545dfc91d7SLuigi Rizzo struct rt_msghdr *rtm; 15555dfc91d7SLuigi Rizzo struct mbuf *m; 15565dfc91d7SLuigi Rizzo int i; 15575dfc91d7SLuigi Rizzo struct sockaddr *sa; 15586bbfef90SHiroki Sato #ifdef INET6 15596bbfef90SHiroki Sato struct sockaddr_in6 *sin6; 15606bbfef90SHiroki Sato #endif 1561df8bae1dSRodney W. Grimes int len, dlen; 1562df8bae1dSRodney W. Grimes 1563df8bae1dSRodney W. Grimes switch (type) { 1564df8bae1dSRodney W. Grimes case RTM_DELADDR: 1565df8bae1dSRodney W. Grimes case RTM_NEWADDR: 1566df8bae1dSRodney W. Grimes len = sizeof(struct ifa_msghdr); 1567df8bae1dSRodney W. Grimes break; 1568df8bae1dSRodney W. Grimes 1569477180fbSGarrett Wollman case RTM_DELMADDR: 1570477180fbSGarrett Wollman case RTM_NEWMADDR: 1571477180fbSGarrett Wollman len = sizeof(struct ifma_msghdr); 1572477180fbSGarrett Wollman break; 1573477180fbSGarrett Wollman 1574df8bae1dSRodney W. Grimes case RTM_IFINFO: 1575df8bae1dSRodney W. Grimes len = sizeof(struct if_msghdr); 1576df8bae1dSRodney W. Grimes break; 1577df8bae1dSRodney W. Grimes 15787b6edd04SRuslan Ermilov case RTM_IFANNOUNCE: 1579b83a279fSSam Leffler case RTM_IEEE80211: 15807b6edd04SRuslan Ermilov len = sizeof(struct if_announcemsghdr); 15817b6edd04SRuslan Ermilov break; 15827b6edd04SRuslan Ermilov 1583df8bae1dSRodney W. Grimes default: 1584df8bae1dSRodney W. Grimes len = sizeof(struct rt_msghdr); 1585df8bae1dSRodney W. Grimes } 1586c69f77c3SGleb Smirnoff 1587c69f77c3SGleb Smirnoff /* XXXGL: can we use MJUMPAGESIZE cluster here? */ 1588c69f77c3SGleb Smirnoff KASSERT(len <= MCLBYTES, ("%s: message too big", __func__)); 1589c69f77c3SGleb Smirnoff if (len > MHLEN) 1590c69f77c3SGleb Smirnoff m = m_getcl(M_NOWAIT, MT_DATA, M_PKTHDR); 1591c69f77c3SGleb Smirnoff else 1592eb1b1807SGleb Smirnoff m = m_gethdr(M_NOWAIT, MT_DATA); 15935dfc91d7SLuigi Rizzo if (m == NULL) 159433841545SHajimu UMEMOTO return (m); 1595c69f77c3SGleb Smirnoff 1596df8bae1dSRodney W. Grimes m->m_pkthdr.len = m->m_len = len; 1597df8bae1dSRodney W. Grimes rtm = mtod(m, struct rt_msghdr *); 1598df8bae1dSRodney W. Grimes bzero((caddr_t)rtm, len); 1599df8bae1dSRodney W. Grimes for (i = 0; i < RTAX_MAX; i++) { 1600df8bae1dSRodney W. Grimes if ((sa = rtinfo->rti_info[i]) == NULL) 1601df8bae1dSRodney W. Grimes continue; 1602df8bae1dSRodney W. Grimes rtinfo->rti_addrs |= (1 << i); 160392be2847SMark Johnston 1604e74642dfSLuigi Rizzo dlen = SA_SIZE(sa); 160592be2847SMark Johnston KASSERT(dlen <= sizeof(ss), 160692be2847SMark Johnston ("%s: sockaddr size overflow", __func__)); 160792be2847SMark Johnston bzero(&ss, sizeof(ss)); 160892be2847SMark Johnston bcopy(sa, &ss, sa->sa_len); 160992be2847SMark Johnston sa = (struct sockaddr *)&ss; 16106bbfef90SHiroki Sato #ifdef INET6 1611bec053ffSAlexander V. Chernikov if (sa->sa_family == AF_INET6) { 161292be2847SMark Johnston sin6 = (struct sockaddr_in6 *)sa; 161392be2847SMark Johnston (void)sa6_recoverscope(sin6); 16146bbfef90SHiroki Sato } 16156bbfef90SHiroki Sato #endif 1616df8bae1dSRodney W. Grimes m_copyback(m, len, dlen, (caddr_t)sa); 1617df8bae1dSRodney W. Grimes len += dlen; 1618df8bae1dSRodney W. Grimes } 1619df8bae1dSRodney W. Grimes if (m->m_pkthdr.len != len) { 1620df8bae1dSRodney W. Grimes m_freem(m); 1621df8bae1dSRodney W. Grimes return (NULL); 1622df8bae1dSRodney W. Grimes } 1623df8bae1dSRodney W. Grimes rtm->rtm_msglen = len; 1624df8bae1dSRodney W. Grimes rtm->rtm_version = RTM_VERSION; 1625df8bae1dSRodney W. Grimes rtm->rtm_type = type; 1626df8bae1dSRodney W. Grimes return (m); 1627df8bae1dSRodney W. Grimes } 1628df8bae1dSRodney W. Grimes 16296d076ae8SBjoern A. Zeeb /* 1630f2e5eb36SAlexander V. Chernikov * Writes information related to @rtinfo object to preallocated buffer. 1631f2e5eb36SAlexander V. Chernikov * Stores needed size in @plen. If @w is NULL, calculates size without 1632f2e5eb36SAlexander V. Chernikov * writing. 1633f2e5eb36SAlexander V. Chernikov * Used for sysctl dumps and rtsock answers (RTM_DEL/RTM_GET) generation. 1634f2e5eb36SAlexander V. Chernikov * 1635f2e5eb36SAlexander V. Chernikov * Returns 0 on success. 1636f2e5eb36SAlexander V. Chernikov * 16376d076ae8SBjoern A. Zeeb */ 1638df8bae1dSRodney W. Grimes static int 1639f2e5eb36SAlexander V. Chernikov rtsock_msg_buffer(int type, struct rt_addrinfo *rtinfo, struct walkarg *w, int *plen) 1640df8bae1dSRodney W. Grimes { 164192be2847SMark Johnston struct sockaddr_storage ss; 164292be2847SMark Johnston int len, buflen = 0, dlen, i; 1643de46b2c6SAlexander V. Chernikov caddr_t cp = NULL; 1644f2e5eb36SAlexander V. Chernikov struct rt_msghdr *rtm = NULL; 16456bbfef90SHiroki Sato #ifdef INET6 16466bbfef90SHiroki Sato struct sockaddr_in6 *sin6; 16476bbfef90SHiroki Sato #endif 1648279e33d4SKonstantin Belousov #ifdef COMPAT_FREEBSD32 1649279e33d4SKonstantin Belousov bool compat32 = false; 1650279e33d4SKonstantin Belousov #endif 1651df8bae1dSRodney W. Grimes 1652df8bae1dSRodney W. Grimes switch (type) { 1653df8bae1dSRodney W. Grimes case RTM_DELADDR: 1654df8bae1dSRodney W. Grimes case RTM_NEWADDR: 16556d076ae8SBjoern A. Zeeb if (w != NULL && w->w_op == NET_RT_IFLISTL) { 16566d076ae8SBjoern A. Zeeb #ifdef COMPAT_FREEBSD32 1657279e33d4SKonstantin Belousov if (w->w_req->flags & SCTL_MASK32) { 16586d076ae8SBjoern A. Zeeb len = sizeof(struct ifa_msghdrl32); 1659279e33d4SKonstantin Belousov compat32 = true; 1660279e33d4SKonstantin Belousov } else 16616d076ae8SBjoern A. Zeeb #endif 16626d076ae8SBjoern A. Zeeb len = sizeof(struct ifa_msghdrl); 16636d076ae8SBjoern A. Zeeb } else 1664df8bae1dSRodney W. Grimes len = sizeof(struct ifa_msghdr); 1665df8bae1dSRodney W. Grimes break; 1666df8bae1dSRodney W. Grimes 1667df8bae1dSRodney W. Grimes case RTM_IFINFO: 1668427a928aSKonstantin Belousov #ifdef COMPAT_FREEBSD32 1669427a928aSKonstantin Belousov if (w != NULL && w->w_req->flags & SCTL_MASK32) { 16706d076ae8SBjoern A. Zeeb if (w->w_op == NET_RT_IFLISTL) 16716d076ae8SBjoern A. Zeeb len = sizeof(struct if_msghdrl32); 16726d076ae8SBjoern A. Zeeb else 1673427a928aSKonstantin Belousov len = sizeof(struct if_msghdr32); 1674279e33d4SKonstantin Belousov compat32 = true; 1675427a928aSKonstantin Belousov break; 1676427a928aSKonstantin Belousov } 1677427a928aSKonstantin Belousov #endif 16786d076ae8SBjoern A. Zeeb if (w != NULL && w->w_op == NET_RT_IFLISTL) 16796d076ae8SBjoern A. Zeeb len = sizeof(struct if_msghdrl); 16806d076ae8SBjoern A. Zeeb else 1681df8bae1dSRodney W. Grimes len = sizeof(struct if_msghdr); 1682df8bae1dSRodney W. Grimes break; 1683df8bae1dSRodney W. Grimes 168405b2efe0SBruce M Simpson case RTM_NEWMADDR: 168505b2efe0SBruce M Simpson len = sizeof(struct ifma_msghdr); 168605b2efe0SBruce M Simpson break; 168705b2efe0SBruce M Simpson 1688df8bae1dSRodney W. Grimes default: 1689df8bae1dSRodney W. Grimes len = sizeof(struct rt_msghdr); 1690df8bae1dSRodney W. Grimes } 1691f2e5eb36SAlexander V. Chernikov 1692f2e5eb36SAlexander V. Chernikov if (w != NULL) { 1693f2e5eb36SAlexander V. Chernikov rtm = (struct rt_msghdr *)w->w_tmem; 1694f2e5eb36SAlexander V. Chernikov buflen = w->w_tmemsize - len; 1695f2e5eb36SAlexander V. Chernikov cp = (caddr_t)w->w_tmem + len; 1696f2e5eb36SAlexander V. Chernikov } 1697f2e5eb36SAlexander V. Chernikov 1698f2e5eb36SAlexander V. Chernikov rtinfo->rti_addrs = 0; 1699df8bae1dSRodney W. Grimes for (i = 0; i < RTAX_MAX; i++) { 17005dfc91d7SLuigi Rizzo struct sockaddr *sa; 1701df8bae1dSRodney W. Grimes 17025dfc91d7SLuigi Rizzo if ((sa = rtinfo->rti_info[i]) == NULL) 1703df8bae1dSRodney W. Grimes continue; 1704df8bae1dSRodney W. Grimes rtinfo->rti_addrs |= (1 << i); 1705279e33d4SKonstantin Belousov #ifdef COMPAT_FREEBSD32 1706279e33d4SKonstantin Belousov if (compat32) 1707279e33d4SKonstantin Belousov dlen = SA_SIZE32(sa); 1708279e33d4SKonstantin Belousov else 1709279e33d4SKonstantin Belousov #endif 1710e74642dfSLuigi Rizzo dlen = SA_SIZE(sa); 1711f2e5eb36SAlexander V. Chernikov if (cp != NULL && buflen >= dlen) { 171292be2847SMark Johnston KASSERT(dlen <= sizeof(ss), 171392be2847SMark Johnston ("%s: sockaddr size overflow", __func__)); 171492be2847SMark Johnston bzero(&ss, sizeof(ss)); 171592be2847SMark Johnston bcopy(sa, &ss, sa->sa_len); 171692be2847SMark Johnston sa = (struct sockaddr *)&ss; 17176bbfef90SHiroki Sato #ifdef INET6 1718bec053ffSAlexander V. Chernikov if (sa->sa_family == AF_INET6) { 171992be2847SMark Johnston sin6 = (struct sockaddr_in6 *)sa; 172092be2847SMark Johnston (void)sa6_recoverscope(sin6); 17216bbfef90SHiroki Sato } 17226bbfef90SHiroki Sato #endif 1723df8bae1dSRodney W. Grimes bcopy((caddr_t)sa, cp, (unsigned)dlen); 1724df8bae1dSRodney W. Grimes cp += dlen; 1725f2e5eb36SAlexander V. Chernikov buflen -= dlen; 1726f2e5eb36SAlexander V. Chernikov } else if (cp != NULL) { 1727f2e5eb36SAlexander V. Chernikov /* 1728f2e5eb36SAlexander V. Chernikov * Buffer too small. Count needed size 1729f2e5eb36SAlexander V. Chernikov * and return with error. 1730f2e5eb36SAlexander V. Chernikov */ 1731f2e5eb36SAlexander V. Chernikov cp = NULL; 1732df8bae1dSRodney W. Grimes } 1733f2e5eb36SAlexander V. Chernikov 1734df8bae1dSRodney W. Grimes len += dlen; 1735df8bae1dSRodney W. Grimes } 1736f2e5eb36SAlexander V. Chernikov 1737f2e5eb36SAlexander V. Chernikov if (cp != NULL) { 1738f2e5eb36SAlexander V. Chernikov dlen = ALIGN(len) - len; 1739f2e5eb36SAlexander V. Chernikov if (buflen < dlen) 1740f2e5eb36SAlexander V. Chernikov cp = NULL; 1741d25f8522SMark Johnston else { 1742d25f8522SMark Johnston bzero(cp, dlen); 1743d25f8522SMark Johnston cp += dlen; 1744f2e5eb36SAlexander V. Chernikov buflen -= dlen; 1745f2e5eb36SAlexander V. Chernikov } 1746d25f8522SMark Johnston } 1747694ff264SAndrew Gallatin len = ALIGN(len); 1748df8bae1dSRodney W. Grimes 1749f2e5eb36SAlexander V. Chernikov if (cp != NULL) { 1750f2e5eb36SAlexander V. Chernikov /* fill header iff buffer is large enough */ 1751df8bae1dSRodney W. Grimes rtm->rtm_version = RTM_VERSION; 1752df8bae1dSRodney W. Grimes rtm->rtm_type = type; 1753df8bae1dSRodney W. Grimes rtm->rtm_msglen = len; 1754df8bae1dSRodney W. Grimes } 1755f2e5eb36SAlexander V. Chernikov 1756f2e5eb36SAlexander V. Chernikov *plen = len; 1757f2e5eb36SAlexander V. Chernikov 1758f2e5eb36SAlexander V. Chernikov if (w != NULL && cp == NULL) 1759f2e5eb36SAlexander V. Chernikov return (ENOBUFS); 1760f2e5eb36SAlexander V. Chernikov 1761f2e5eb36SAlexander V. Chernikov return (0); 1762df8bae1dSRodney W. Grimes } 1763df8bae1dSRodney W. Grimes 1764df8bae1dSRodney W. Grimes /* 1765df8bae1dSRodney W. Grimes * This routine is called to generate a message from the routing 1766a4641f4eSPedro F. Giffuni * socket indicating that a redirect has occurred, a routing lookup 1767df8bae1dSRodney W. Grimes * has failed, or that a protocol has detected timeouts to a particular 1768df8bae1dSRodney W. Grimes * destination. 1769df8bae1dSRodney W. Grimes */ 1770df8bae1dSRodney W. Grimes void 1771528737fdSBjoern A. Zeeb rt_missmsg_fib(int type, struct rt_addrinfo *rtinfo, int flags, int error, 1772528737fdSBjoern A. Zeeb int fibnum) 1773df8bae1dSRodney W. Grimes { 1774becc44d7SSam Leffler struct rt_msghdr *rtm; 1775becc44d7SSam Leffler struct mbuf *m; 1776df8bae1dSRodney W. Grimes struct sockaddr *sa = rtinfo->rti_info[RTAX_DST]; 1777df8bae1dSRodney W. Grimes 1778c5d4eab6SMarko Zec if (V_route_cb.any_count == 0) 1779df8bae1dSRodney W. Grimes return; 17806db47af4SAlexander V. Chernikov m = rtsock_msg_mbuf(type, rtinfo); 17815dfc91d7SLuigi Rizzo if (m == NULL) 1782df8bae1dSRodney W. Grimes return; 1783528737fdSBjoern A. Zeeb 17847d9b6df1SAlexander V. Chernikov if (fibnum != RT_ALL_FIBS) { 1785528737fdSBjoern A. Zeeb KASSERT(fibnum >= 0 && fibnum < rt_numfibs, ("%s: fibnum out " 1786528737fdSBjoern A. Zeeb "of range 0 <= %d < %d", __func__, fibnum, rt_numfibs)); 1787528737fdSBjoern A. Zeeb M_SETFIB(m, fibnum); 1788528737fdSBjoern A. Zeeb m->m_flags |= RTS_FILTER_FIB; 1789528737fdSBjoern A. Zeeb } 1790528737fdSBjoern A. Zeeb 1791df8bae1dSRodney W. Grimes rtm = mtod(m, struct rt_msghdr *); 1792df8bae1dSRodney W. Grimes rtm->rtm_flags = RTF_DONE | flags; 1793df8bae1dSRodney W. Grimes rtm->rtm_errno = error; 1794df8bae1dSRodney W. Grimes rtm->rtm_addrs = rtinfo->rti_addrs; 17953ca1a2d6SMax Laier rt_dispatch(m, sa ? sa->sa_family : AF_UNSPEC); 1796df8bae1dSRodney W. Grimes } 1797df8bae1dSRodney W. Grimes 1798528737fdSBjoern A. Zeeb void 1799528737fdSBjoern A. Zeeb rt_missmsg(int type, struct rt_addrinfo *rtinfo, int flags, int error) 1800528737fdSBjoern A. Zeeb { 1801528737fdSBjoern A. Zeeb 18027d9b6df1SAlexander V. Chernikov rt_missmsg_fib(type, rtinfo, flags, error, RT_ALL_FIBS); 1803528737fdSBjoern A. Zeeb } 1804528737fdSBjoern A. Zeeb 1805df8bae1dSRodney W. Grimes /* 1806df8bae1dSRodney W. Grimes * This routine is called to generate a message from the routing 1807df8bae1dSRodney W. Grimes * socket indicating that the status of a network interface has changed. 1808df8bae1dSRodney W. Grimes */ 1809df8bae1dSRodney W. Grimes void 1810becc44d7SSam Leffler rt_ifmsg(struct ifnet *ifp) 1811df8bae1dSRodney W. Grimes { 1812becc44d7SSam Leffler struct if_msghdr *ifm; 1813df8bae1dSRodney W. Grimes struct mbuf *m; 1814df8bae1dSRodney W. Grimes struct rt_addrinfo info; 1815df8bae1dSRodney W. Grimes 1816c5d4eab6SMarko Zec if (V_route_cb.any_count == 0) 1817df8bae1dSRodney W. Grimes return; 1818df8bae1dSRodney W. Grimes bzero((caddr_t)&info, sizeof(info)); 18196db47af4SAlexander V. Chernikov m = rtsock_msg_mbuf(RTM_IFINFO, &info); 18205dfc91d7SLuigi Rizzo if (m == NULL) 1821df8bae1dSRodney W. Grimes return; 1822df8bae1dSRodney W. Grimes ifm = mtod(m, struct if_msghdr *); 1823df8bae1dSRodney W. Grimes ifm->ifm_index = ifp->if_index; 1824292ee7beSRobert Watson ifm->ifm_flags = ifp->if_flags | ifp->if_drv_flags; 1825e6485f73SGleb Smirnoff if_data_copy(ifp, &ifm->ifm_data); 1826df8bae1dSRodney W. Grimes ifm->ifm_addrs = 0; 18273ca1a2d6SMax Laier rt_dispatch(m, AF_UNSPEC); 1828df8bae1dSRodney W. Grimes } 1829df8bae1dSRodney W. Grimes 1830df8bae1dSRodney W. Grimes /* 18314cbac30bSAlexander V. Chernikov * Announce interface address arrival/withdraw. 18324cbac30bSAlexander V. Chernikov * Please do not call directly, use rt_addrmsg(). 18334cbac30bSAlexander V. Chernikov * Assume input data to be valid. 18344cbac30bSAlexander V. Chernikov * Returns 0 on success. 1835df8bae1dSRodney W. Grimes */ 18364cbac30bSAlexander V. Chernikov int 18374cbac30bSAlexander V. Chernikov rtsock_addrmsg(int cmd, struct ifaddr *ifa, int fibnum) 1838df8bae1dSRodney W. Grimes { 1839df8bae1dSRodney W. Grimes struct rt_addrinfo info; 18404cbac30bSAlexander V. Chernikov struct sockaddr *sa; 18414cbac30bSAlexander V. Chernikov int ncmd; 18424cbac30bSAlexander V. Chernikov struct mbuf *m; 18434cbac30bSAlexander V. Chernikov struct ifa_msghdr *ifam; 1844df8bae1dSRodney W. Grimes struct ifnet *ifp = ifa->ifa_ifp; 18453deb3649SAlexander V. Chernikov struct sockaddr_storage ss; 1846df8bae1dSRodney W. Grimes 1847c5d4eab6SMarko Zec if (V_route_cb.any_count == 0) 18484cbac30bSAlexander V. Chernikov return (0); 1849df8bae1dSRodney W. Grimes 18504cbac30bSAlexander V. Chernikov ncmd = cmd == RTM_ADD ? RTM_NEWADDR : RTM_DELADDR; 18514cbac30bSAlexander V. Chernikov 18524cbac30bSAlexander V. Chernikov bzero((caddr_t)&info, sizeof(info)); 1853becc44d7SSam Leffler info.rti_info[RTAX_IFA] = sa = ifa->ifa_addr; 18544a0d6638SRuslan Ermilov info.rti_info[RTAX_IFP] = ifp->if_addr->ifa_addr; 18553deb3649SAlexander V. Chernikov info.rti_info[RTAX_NETMASK] = rtsock_fix_netmask( 1856e02d3fe7SAlexander V. Chernikov info.rti_info[RTAX_IFA], ifa->ifa_netmask, &ss); 1857becc44d7SSam Leffler info.rti_info[RTAX_BRD] = ifa->ifa_dstaddr; 18586db47af4SAlexander V. Chernikov if ((m = rtsock_msg_mbuf(ncmd, &info)) == NULL) 18594cbac30bSAlexander V. Chernikov return (ENOBUFS); 1860df8bae1dSRodney W. Grimes ifam = mtod(m, struct ifa_msghdr *); 1861df8bae1dSRodney W. Grimes ifam->ifam_index = ifp->if_index; 18629753faf5SGleb Smirnoff ifam->ifam_metric = ifa->ifa_ifp->if_metric; 1863df8bae1dSRodney W. Grimes ifam->ifam_flags = ifa->ifa_flags; 1864df8bae1dSRodney W. Grimes ifam->ifam_addrs = info.rti_addrs; 18654cbac30bSAlexander V. Chernikov 18664cbac30bSAlexander V. Chernikov if (fibnum != RT_ALL_FIBS) { 18674cbac30bSAlexander V. Chernikov M_SETFIB(m, fibnum); 18684cbac30bSAlexander V. Chernikov m->m_flags |= RTS_FILTER_FIB; 1869df8bae1dSRodney W. Grimes } 18704cbac30bSAlexander V. Chernikov 18714cbac30bSAlexander V. Chernikov rt_dispatch(m, sa ? sa->sa_family : AF_UNSPEC); 18724cbac30bSAlexander V. Chernikov 18734cbac30bSAlexander V. Chernikov return (0); 18744cbac30bSAlexander V. Chernikov } 18754cbac30bSAlexander V. Chernikov 18764cbac30bSAlexander V. Chernikov /* 1877e02d3fe7SAlexander V. Chernikov * Announce route addition/removal to rtsock based on @rt data. 1878e02d3fe7SAlexander V. Chernikov * Callers are advives to use rt_routemsg() instead of using this 1879e02d3fe7SAlexander V. Chernikov * function directly. 1880e02d3fe7SAlexander V. Chernikov * Assume @rt data is consistent. 18814cbac30bSAlexander V. Chernikov * 18824cbac30bSAlexander V. Chernikov * Returns 0 on success. 18834cbac30bSAlexander V. Chernikov */ 18844cbac30bSAlexander V. Chernikov int 1885d68cf57bSAlexander V. Chernikov rtsock_routemsg(int cmd, struct rtentry *rt, struct nhop_object *nh, 18864cbac30bSAlexander V. Chernikov int fibnum) 18874cbac30bSAlexander V. Chernikov { 1888d68cf57bSAlexander V. Chernikov union sockaddr_union dst, mask; 1889e02d3fe7SAlexander V. Chernikov struct rt_addrinfo info; 1890df8bae1dSRodney W. Grimes 1891c5d4eab6SMarko Zec if (V_route_cb.any_count == 0) 18924cbac30bSAlexander V. Chernikov return (0); 18934cbac30bSAlexander V. Chernikov 1894d68cf57bSAlexander V. Chernikov int family = rt_get_family(rt); 1895d68cf57bSAlexander V. Chernikov init_sockaddrs_family(family, &dst.sa, &mask.sa); 1896d68cf57bSAlexander V. Chernikov export_rtaddrs(rt, &dst.sa, &mask.sa); 1897d68cf57bSAlexander V. Chernikov 18984cbac30bSAlexander V. Chernikov bzero((caddr_t)&info, sizeof(info)); 1899d68cf57bSAlexander V. Chernikov info.rti_info[RTAX_DST] = &dst.sa; 1900d68cf57bSAlexander V. Chernikov info.rti_info[RTAX_NETMASK] = &mask.sa; 190193bfd365SAlexander V. Chernikov info.rti_info[RTAX_GATEWAY] = &nh->gw_sa; 190293bfd365SAlexander V. Chernikov info.rti_flags = rt->rte_flags | nhop_get_rtflags(nh); 1903d68cf57bSAlexander V. Chernikov info.rti_ifp = nh->nh_ifp; 1904e02d3fe7SAlexander V. Chernikov 1905e02d3fe7SAlexander V. Chernikov return (rtsock_routemsg_info(cmd, &info, fibnum)); 1906e02d3fe7SAlexander V. Chernikov } 1907e02d3fe7SAlexander V. Chernikov 1908e02d3fe7SAlexander V. Chernikov int 1909e02d3fe7SAlexander V. Chernikov rtsock_routemsg_info(int cmd, struct rt_addrinfo *info, int fibnum) 1910e02d3fe7SAlexander V. Chernikov { 1911e02d3fe7SAlexander V. Chernikov struct rt_msghdr *rtm; 1912e02d3fe7SAlexander V. Chernikov struct sockaddr *sa; 1913e02d3fe7SAlexander V. Chernikov struct mbuf *m; 1914e02d3fe7SAlexander V. Chernikov 1915e02d3fe7SAlexander V. Chernikov if (V_route_cb.any_count == 0) 1916e02d3fe7SAlexander V. Chernikov return (0); 1917e02d3fe7SAlexander V. Chernikov 1918e02d3fe7SAlexander V. Chernikov if (info->rti_flags & RTF_HOST) 1919e02d3fe7SAlexander V. Chernikov info->rti_info[RTAX_NETMASK] = NULL; 1920e02d3fe7SAlexander V. Chernikov 1921e02d3fe7SAlexander V. Chernikov m = rtsock_msg_mbuf(cmd, info); 1922e02d3fe7SAlexander V. Chernikov if (m == NULL) 19234cbac30bSAlexander V. Chernikov return (ENOBUFS); 19244cbac30bSAlexander V. Chernikov 19257d9b6df1SAlexander V. Chernikov if (fibnum != RT_ALL_FIBS) { 1926e02d3fe7SAlexander V. Chernikov KASSERT(fibnum >= 0 && fibnum < rt_numfibs, ("%s: fibnum out " 1927e02d3fe7SAlexander V. Chernikov "of range 0 <= %d < %d", __func__, fibnum, rt_numfibs)); 1928528737fdSBjoern A. Zeeb M_SETFIB(m, fibnum); 1929528737fdSBjoern A. Zeeb m->m_flags |= RTS_FILTER_FIB; 1930528737fdSBjoern A. Zeeb } 19314cbac30bSAlexander V. Chernikov 1932e02d3fe7SAlexander V. Chernikov rtm = mtod(m, struct rt_msghdr *); 1933e02d3fe7SAlexander V. Chernikov rtm->rtm_addrs = info->rti_addrs; 1934e02d3fe7SAlexander V. Chernikov if (info->rti_ifp != NULL) 1935e02d3fe7SAlexander V. Chernikov rtm->rtm_index = info->rti_ifp->if_index; 1936e02d3fe7SAlexander V. Chernikov /* Add RTF_DONE to indicate command 'completion' required by API */ 1937e02d3fe7SAlexander V. Chernikov info->rti_flags |= RTF_DONE; 1938e02d3fe7SAlexander V. Chernikov /* Reported routes has to be up */ 1939e02d3fe7SAlexander V. Chernikov if (cmd == RTM_ADD || cmd == RTM_CHANGE) 1940e02d3fe7SAlexander V. Chernikov info->rti_flags |= RTF_UP; 1941e02d3fe7SAlexander V. Chernikov rtm->rtm_flags = info->rti_flags; 1942e02d3fe7SAlexander V. Chernikov 1943e02d3fe7SAlexander V. Chernikov sa = info->rti_info[RTAX_DST]; 19443ca1a2d6SMax Laier rt_dispatch(m, sa ? sa->sa_family : AF_UNSPEC); 19454cbac30bSAlexander V. Chernikov 19464cbac30bSAlexander V. Chernikov return (0); 1947df8bae1dSRodney W. Grimes } 1948df8bae1dSRodney W. Grimes 1949477180fbSGarrett Wollman /* 1950477180fbSGarrett Wollman * This is the analogue to the rt_newaddrmsg which performs the same 1951477180fbSGarrett Wollman * function but for multicast group memberhips. This is easier since 1952477180fbSGarrett Wollman * there is no route state to worry about. 1953477180fbSGarrett Wollman */ 1954477180fbSGarrett Wollman void 1955becc44d7SSam Leffler rt_newmaddrmsg(int cmd, struct ifmultiaddr *ifma) 1956477180fbSGarrett Wollman { 1957477180fbSGarrett Wollman struct rt_addrinfo info; 19585dfc91d7SLuigi Rizzo struct mbuf *m = NULL; 1959477180fbSGarrett Wollman struct ifnet *ifp = ifma->ifma_ifp; 1960477180fbSGarrett Wollman struct ifma_msghdr *ifmam; 1961477180fbSGarrett Wollman 1962c5d4eab6SMarko Zec if (V_route_cb.any_count == 0) 1963477180fbSGarrett Wollman return; 1964477180fbSGarrett Wollman 1965477180fbSGarrett Wollman bzero((caddr_t)&info, sizeof(info)); 1966becc44d7SSam Leffler info.rti_info[RTAX_IFA] = ifma->ifma_addr; 19677edd877aSMatt Macy if (ifp && ifp->if_addr) 19687edd877aSMatt Macy info.rti_info[RTAX_IFP] = ifp->if_addr->ifa_addr; 19697edd877aSMatt Macy else 19707edd877aSMatt Macy info.rti_info[RTAX_IFP] = NULL; 1971477180fbSGarrett Wollman /* 1972477180fbSGarrett Wollman * If a link-layer address is present, present it as a ``gateway'' 1973477180fbSGarrett Wollman * (similarly to how ARP entries, e.g., are presented). 1974477180fbSGarrett Wollman */ 1975becc44d7SSam Leffler info.rti_info[RTAX_GATEWAY] = ifma->ifma_lladdr; 19766db47af4SAlexander V. Chernikov m = rtsock_msg_mbuf(cmd, &info); 1977becc44d7SSam Leffler if (m == NULL) 1978477180fbSGarrett Wollman return; 1979477180fbSGarrett Wollman ifmam = mtod(m, struct ifma_msghdr *); 198075ae0c01SBruce M Simpson KASSERT(ifp != NULL, ("%s: link-layer multicast address w/o ifp\n", 198175ae0c01SBruce M Simpson __func__)); 1982477180fbSGarrett Wollman ifmam->ifmam_index = ifp->if_index; 1983477180fbSGarrett Wollman ifmam->ifmam_addrs = info.rti_addrs; 19843ca1a2d6SMax Laier rt_dispatch(m, ifma->ifma_addr ? ifma->ifma_addr->sa_family : AF_UNSPEC); 1985477180fbSGarrett Wollman } 198652041295SPoul-Henning Kamp 1987b83a279fSSam Leffler static struct mbuf * 1988b83a279fSSam Leffler rt_makeifannouncemsg(struct ifnet *ifp, int type, int what, 1989b83a279fSSam Leffler struct rt_addrinfo *info) 1990b83a279fSSam Leffler { 1991b83a279fSSam Leffler struct if_announcemsghdr *ifan; 1992b83a279fSSam Leffler struct mbuf *m; 1993b83a279fSSam Leffler 1994c5d4eab6SMarko Zec if (V_route_cb.any_count == 0) 1995b83a279fSSam Leffler return NULL; 1996b83a279fSSam Leffler bzero((caddr_t)info, sizeof(*info)); 19976db47af4SAlexander V. Chernikov m = rtsock_msg_mbuf(type, info); 1998b83a279fSSam Leffler if (m != NULL) { 1999b83a279fSSam Leffler ifan = mtod(m, struct if_announcemsghdr *); 2000b83a279fSSam Leffler ifan->ifan_index = ifp->if_index; 2001b83a279fSSam Leffler strlcpy(ifan->ifan_name, ifp->if_xname, 2002b83a279fSSam Leffler sizeof(ifan->ifan_name)); 2003b83a279fSSam Leffler ifan->ifan_what = what; 2004b83a279fSSam Leffler } 2005b83a279fSSam Leffler return m; 2006b83a279fSSam Leffler } 2007b83a279fSSam Leffler 2008b83a279fSSam Leffler /* 2009b83a279fSSam Leffler * This is called to generate routing socket messages indicating 2010b83a279fSSam Leffler * IEEE80211 wireless events. 2011b83a279fSSam Leffler * XXX we piggyback on the RTM_IFANNOUNCE msg format in a clumsy way. 2012b83a279fSSam Leffler */ 2013b83a279fSSam Leffler void 2014b83a279fSSam Leffler rt_ieee80211msg(struct ifnet *ifp, int what, void *data, size_t data_len) 2015b83a279fSSam Leffler { 2016b83a279fSSam Leffler struct mbuf *m; 2017b83a279fSSam Leffler struct rt_addrinfo info; 2018b83a279fSSam Leffler 2019b83a279fSSam Leffler m = rt_makeifannouncemsg(ifp, RTM_IEEE80211, what, &info); 2020b83a279fSSam Leffler if (m != NULL) { 2021b83a279fSSam Leffler /* 2022b83a279fSSam Leffler * Append the ieee80211 data. Try to stick it in the 2023b83a279fSSam Leffler * mbuf containing the ifannounce msg; otherwise allocate 2024b83a279fSSam Leffler * a new mbuf and append. 2025b83a279fSSam Leffler * 2026b83a279fSSam Leffler * NB: we assume m is a single mbuf. 2027b83a279fSSam Leffler */ 2028b83a279fSSam Leffler if (data_len > M_TRAILINGSPACE(m)) { 2029b83a279fSSam Leffler struct mbuf *n = m_get(M_NOWAIT, MT_DATA); 2030b83a279fSSam Leffler if (n == NULL) { 2031b83a279fSSam Leffler m_freem(m); 2032b83a279fSSam Leffler return; 2033b83a279fSSam Leffler } 2034b83a279fSSam Leffler bcopy(data, mtod(n, void *), data_len); 2035b83a279fSSam Leffler n->m_len = data_len; 2036b83a279fSSam Leffler m->m_next = n; 2037b83a279fSSam Leffler } else if (data_len > 0) { 2038b83a279fSSam Leffler bcopy(data, mtod(m, u_int8_t *) + m->m_len, data_len); 2039b83a279fSSam Leffler m->m_len += data_len; 2040b83a279fSSam Leffler } 2041b83a279fSSam Leffler if (m->m_flags & M_PKTHDR) 2042b83a279fSSam Leffler m->m_pkthdr.len += data_len; 2043b83a279fSSam Leffler mtod(m, struct if_announcemsghdr *)->ifan_msglen += data_len; 20443ca1a2d6SMax Laier rt_dispatch(m, AF_UNSPEC); 2045b83a279fSSam Leffler } 2046b83a279fSSam Leffler } 2047b83a279fSSam Leffler 2048df8bae1dSRodney W. Grimes /* 20497b6edd04SRuslan Ermilov * This is called to generate routing socket messages indicating 20507b6edd04SRuslan Ermilov * network interface arrival and departure. 20517b6edd04SRuslan Ermilov */ 20527b6edd04SRuslan Ermilov void 2053becc44d7SSam Leffler rt_ifannouncemsg(struct ifnet *ifp, int what) 20547b6edd04SRuslan Ermilov { 20557b6edd04SRuslan Ermilov struct mbuf *m; 20567b6edd04SRuslan Ermilov struct rt_addrinfo info; 20577b6edd04SRuslan Ermilov 2058b83a279fSSam Leffler m = rt_makeifannouncemsg(ifp, RTM_IFANNOUNCE, what, &info); 2059b83a279fSSam Leffler if (m != NULL) 20603ca1a2d6SMax Laier rt_dispatch(m, AF_UNSPEC); 2061becc44d7SSam Leffler } 2062becc44d7SSam Leffler 2063becc44d7SSam Leffler static void 20643ca1a2d6SMax Laier rt_dispatch(struct mbuf *m, sa_family_t saf) 2065becc44d7SSam Leffler { 2066d989c7b3SRobert Watson struct m_tag *tag; 2067becc44d7SSam Leffler 2068d989c7b3SRobert Watson /* 2069d989c7b3SRobert Watson * Preserve the family from the sockaddr, if any, in an m_tag for 2070d989c7b3SRobert Watson * use when injecting the mbuf into the routing socket buffer from 2071d989c7b3SRobert Watson * the netisr. 2072d989c7b3SRobert Watson */ 20733ca1a2d6SMax Laier if (saf != AF_UNSPEC) { 2074d989c7b3SRobert Watson tag = m_tag_get(PACKET_TAG_RTSOCKFAM, sizeof(unsigned short), 2075d989c7b3SRobert Watson M_NOWAIT); 2076d989c7b3SRobert Watson if (tag == NULL) { 2077d989c7b3SRobert Watson m_freem(m); 2078d989c7b3SRobert Watson return; 2079d989c7b3SRobert Watson } 20803ca1a2d6SMax Laier *(unsigned short *)(tag + 1) = saf; 2081d989c7b3SRobert Watson m_tag_prepend(m, tag); 2082d989c7b3SRobert Watson } 208321ca7b57SMarko Zec #ifdef VIMAGE 208421ca7b57SMarko Zec if (V_loif) 208521ca7b57SMarko Zec m->m_pkthdr.rcvif = V_loif; 208621ca7b57SMarko Zec else { 208721ca7b57SMarko Zec m_freem(m); 208821ca7b57SMarko Zec return; 208921ca7b57SMarko Zec } 209021ca7b57SMarko Zec #endif 20913161f583SAndre Oppermann netisr_queue(NETISR_ROUTE, m); /* mbuf is free'd on failure. */ 20927b6edd04SRuslan Ermilov } 20937b6edd04SRuslan Ermilov 20947b6edd04SRuslan Ermilov /* 2095c83dda36SAlexander V. Chernikov * Checks if rte can be exported v.r.t jails/vnets. 2096c83dda36SAlexander V. Chernikov * 2097c83dda36SAlexander V. Chernikov * Returns 1 if it can, 0 otherwise. 2098c83dda36SAlexander V. Chernikov */ 2099d68fb8d9SAlexander V. Chernikov static bool 2100d68fb8d9SAlexander V. Chernikov can_export_rte(struct ucred *td_ucred, bool rt_is_host, 2101d68fb8d9SAlexander V. Chernikov const struct sockaddr *rt_dst) 2102c83dda36SAlexander V. Chernikov { 2103c83dda36SAlexander V. Chernikov 2104d68fb8d9SAlexander V. Chernikov if ((!rt_is_host) ? jailed_without_vnet(td_ucred) 2105d68fb8d9SAlexander V. Chernikov : prison_if(td_ucred, rt_dst) != 0) 2106d68fb8d9SAlexander V. Chernikov return (false); 2107d68fb8d9SAlexander V. Chernikov return (true); 2108c83dda36SAlexander V. Chernikov } 2109c83dda36SAlexander V. Chernikov 2110d68fb8d9SAlexander V. Chernikov 2111c83dda36SAlexander V. Chernikov /* 2112df8bae1dSRodney W. Grimes * This is used in dumping the kernel table via sysctl(). 2113df8bae1dSRodney W. Grimes */ 211437c84183SPoul-Henning Kamp static int 2115d68fb8d9SAlexander V. Chernikov sysctl_dumpentry(struct rtentry *rt, void *vw) 2116df8bae1dSRodney W. Grimes { 2117becc44d7SSam Leffler struct walkarg *w = vw; 21188c61eb21SAlexander V. Chernikov struct nhop_object *nh; 21192259a030SAlexander V. Chernikov int error = 0; 2120df8bae1dSRodney W. Grimes 2121a68cc388SGleb Smirnoff NET_EPOCH_ASSERT(); 2122a716ad4aSAndrey V. Elsukov 2123d68fb8d9SAlexander V. Chernikov export_rtaddrs(rt, w->dst, w->mask); 2124d68fb8d9SAlexander V. Chernikov if (!can_export_rte(w->w_req->td->td_ucred, rt_is_host(rt), w->dst)) 2125813dd6aeSBjoern A. Zeeb return (0); 2126d68fb8d9SAlexander V. Chernikov nh = rt_get_raw_nhop(rt); 2127fedeb08bSAlexander V. Chernikov #ifdef ROUTE_MPATH 2128fedeb08bSAlexander V. Chernikov if (NH_IS_NHGRP(nh)) { 2129fedeb08bSAlexander V. Chernikov struct weightened_nhop *wn; 2130fedeb08bSAlexander V. Chernikov uint32_t num_nhops; 2131fedeb08bSAlexander V. Chernikov wn = nhgrp_get_nhops((struct nhgrp_object *)nh, &num_nhops); 2132fedeb08bSAlexander V. Chernikov for (int i = 0; i < num_nhops; i++) { 2133fedeb08bSAlexander V. Chernikov error = sysctl_dumpnhop(rt, wn[i].nh, wn[i].weight, w); 2134fedeb08bSAlexander V. Chernikov if (error != 0) 2135fedeb08bSAlexander V. Chernikov return (error); 2136fedeb08bSAlexander V. Chernikov } 2137fedeb08bSAlexander V. Chernikov } else 2138fedeb08bSAlexander V. Chernikov #endif 21392259a030SAlexander V. Chernikov error = sysctl_dumpnhop(rt, nh, rt->rt_weight, w); 21402259a030SAlexander V. Chernikov 21412259a030SAlexander V. Chernikov return (0); 21422259a030SAlexander V. Chernikov } 21432259a030SAlexander V. Chernikov 21442259a030SAlexander V. Chernikov 21452259a030SAlexander V. Chernikov static int 21462259a030SAlexander V. Chernikov sysctl_dumpnhop(struct rtentry *rt, struct nhop_object *nh, uint32_t weight, 21472259a030SAlexander V. Chernikov struct walkarg *w) 21482259a030SAlexander V. Chernikov { 21492259a030SAlexander V. Chernikov struct rt_addrinfo info; 21502259a030SAlexander V. Chernikov int error = 0, size; 2151d68fb8d9SAlexander V. Chernikov uint32_t rtflags; 2152d68fb8d9SAlexander V. Chernikov 2153d68fb8d9SAlexander V. Chernikov rtflags = nhop_get_rtflags(nh); 2154d68fb8d9SAlexander V. Chernikov 2155d68fb8d9SAlexander V. Chernikov if (w->w_op == NET_RT_FLAGS && !(rtflags & w->w_arg)) 2156d68fb8d9SAlexander V. Chernikov return (0); 21572259a030SAlexander V. Chernikov 2158df8bae1dSRodney W. Grimes bzero((caddr_t)&info, sizeof(info)); 2159d68fb8d9SAlexander V. Chernikov info.rti_info[RTAX_DST] = w->dst; 216093bfd365SAlexander V. Chernikov info.rti_info[RTAX_GATEWAY] = &nh->gw_sa; 2161d68fb8d9SAlexander V. Chernikov info.rti_info[RTAX_NETMASK] = (rtflags & RTF_HOST) ? NULL : w->mask; 21626e6b3f7cSQing Li info.rti_info[RTAX_GENMASK] = 0; 21638c61eb21SAlexander V. Chernikov if (nh->nh_ifp && !(nh->nh_ifp->if_flags & IFF_DYING)) { 21648c61eb21SAlexander V. Chernikov info.rti_info[RTAX_IFP] = nh->nh_ifp->if_addr->ifa_addr; 21658c61eb21SAlexander V. Chernikov info.rti_info[RTAX_IFA] = nh->nh_ifa->ifa_addr; 21668c61eb21SAlexander V. Chernikov if (nh->nh_ifp->if_flags & IFF_POINTOPOINT) 21678c61eb21SAlexander V. Chernikov info.rti_info[RTAX_BRD] = nh->nh_ifa->ifa_dstaddr; 216828070a0eSRuslan Ermilov } 2169f2e5eb36SAlexander V. Chernikov if ((error = rtsock_msg_buffer(RTM_GET, &info, w, &size)) != 0) 2170f2e5eb36SAlexander V. Chernikov return (error); 217152041295SPoul-Henning Kamp if (w->w_req && w->w_tmem) { 2172becc44d7SSam Leffler struct rt_msghdr *rtm = (struct rt_msghdr *)w->w_tmem; 2173df8bae1dSRodney W. Grimes 2174d25f8522SMark Johnston bzero(&rtm->rtm_index, 2175d25f8522SMark Johnston sizeof(*rtm) - offsetof(struct rt_msghdr, rtm_index)); 2176d68fb8d9SAlexander V. Chernikov 2177d68fb8d9SAlexander V. Chernikov /* 2178d68fb8d9SAlexander V. Chernikov * rte flags may consist of RTF_HOST (duplicated in nhop rtflags) 2179d68fb8d9SAlexander V. Chernikov * and RTF_UP (if entry is linked, which is always true here). 2180d68fb8d9SAlexander V. Chernikov * Given that, use nhop rtflags & add RTF_UP. 2181d68fb8d9SAlexander V. Chernikov */ 2182d68fb8d9SAlexander V. Chernikov rtm->rtm_flags = rtflags | RTF_UP; 2183d68fb8d9SAlexander V. Chernikov if (rtm->rtm_flags & RTF_GWFLAG_COMPAT) 2184f672f56fSQing Li rtm->rtm_flags = RTF_GATEWAY | 2185d68fb8d9SAlexander V. Chernikov (rtm->rtm_flags & ~RTF_GWFLAG_COMPAT); 218693bfd365SAlexander V. Chernikov rt_getmetrics(rt, nh, &rtm->rtm_rmx); 2187fedeb08bSAlexander V. Chernikov rtm->rtm_rmx.rmx_weight = weight; 21888c61eb21SAlexander V. Chernikov rtm->rtm_index = nh->nh_ifp->if_index; 2189df8bae1dSRodney W. Grimes rtm->rtm_addrs = info.rti_addrs; 219052041295SPoul-Henning Kamp error = SYSCTL_OUT(w->w_req, (caddr_t)rtm, size); 219152041295SPoul-Henning Kamp return (error); 2192df8bae1dSRodney W. Grimes } 2193df8bae1dSRodney W. Grimes return (error); 2194df8bae1dSRodney W. Grimes } 2195df8bae1dSRodney W. Grimes 219637c84183SPoul-Henning Kamp static int 2197ab607f28SRyan Stone sysctl_iflist_ifml(struct ifnet *ifp, const struct if_data *src_ifd, 2198ab607f28SRyan Stone struct rt_addrinfo *info, struct walkarg *w, int len) 21996d076ae8SBjoern A. Zeeb { 22006d076ae8SBjoern A. Zeeb struct if_msghdrl *ifm; 2201b245f96cSGleb Smirnoff struct if_data *ifd; 2202b245f96cSGleb Smirnoff 2203b245f96cSGleb Smirnoff ifm = (struct if_msghdrl *)w->w_tmem; 22046d076ae8SBjoern A. Zeeb 22056d076ae8SBjoern A. Zeeb #ifdef COMPAT_FREEBSD32 22066d076ae8SBjoern A. Zeeb if (w->w_req->flags & SCTL_MASK32) { 22076d076ae8SBjoern A. Zeeb struct if_msghdrl32 *ifm32; 22086d076ae8SBjoern A. Zeeb 2209b245f96cSGleb Smirnoff ifm32 = (struct if_msghdrl32 *)ifm; 22106d076ae8SBjoern A. Zeeb ifm32->ifm_addrs = info->rti_addrs; 22116d076ae8SBjoern A. Zeeb ifm32->ifm_flags = ifp->if_flags | ifp->if_drv_flags; 22126d076ae8SBjoern A. Zeeb ifm32->ifm_index = ifp->if_index; 22136d076ae8SBjoern A. Zeeb ifm32->_ifm_spare1 = 0; 22146d076ae8SBjoern A. Zeeb ifm32->ifm_len = sizeof(*ifm32); 22156d076ae8SBjoern A. Zeeb ifm32->ifm_data_off = offsetof(struct if_msghdrl32, ifm_data); 2216d25f8522SMark Johnston ifm32->_ifm_spare2 = 0; 2217b245f96cSGleb Smirnoff ifd = &ifm32->ifm_data; 2218b245f96cSGleb Smirnoff } else 22196d076ae8SBjoern A. Zeeb #endif 2220b245f96cSGleb Smirnoff { 22216d076ae8SBjoern A. Zeeb ifm->ifm_addrs = info->rti_addrs; 22226d076ae8SBjoern A. Zeeb ifm->ifm_flags = ifp->if_flags | ifp->if_drv_flags; 22236d076ae8SBjoern A. Zeeb ifm->ifm_index = ifp->if_index; 22246d076ae8SBjoern A. Zeeb ifm->_ifm_spare1 = 0; 22256d076ae8SBjoern A. Zeeb ifm->ifm_len = sizeof(*ifm); 22266d076ae8SBjoern A. Zeeb ifm->ifm_data_off = offsetof(struct if_msghdrl, ifm_data); 2227d25f8522SMark Johnston ifm->_ifm_spare2 = 0; 2228b245f96cSGleb Smirnoff ifd = &ifm->ifm_data; 2229b245f96cSGleb Smirnoff } 22306d076ae8SBjoern A. Zeeb 2231ab607f28SRyan Stone memcpy(ifd, src_ifd, sizeof(*ifd)); 2232b245f96cSGleb Smirnoff 22336d076ae8SBjoern A. Zeeb return (SYSCTL_OUT(w->w_req, (caddr_t)ifm, len)); 22346d076ae8SBjoern A. Zeeb } 22356d076ae8SBjoern A. Zeeb 22366d076ae8SBjoern A. Zeeb static int 2237ab607f28SRyan Stone sysctl_iflist_ifm(struct ifnet *ifp, const struct if_data *src_ifd, 2238ab607f28SRyan Stone struct rt_addrinfo *info, struct walkarg *w, int len) 22396d076ae8SBjoern A. Zeeb { 22406d076ae8SBjoern A. Zeeb struct if_msghdr *ifm; 2241b245f96cSGleb Smirnoff struct if_data *ifd; 2242b245f96cSGleb Smirnoff 2243b245f96cSGleb Smirnoff ifm = (struct if_msghdr *)w->w_tmem; 22446d076ae8SBjoern A. Zeeb 22456d076ae8SBjoern A. Zeeb #ifdef COMPAT_FREEBSD32 22466d076ae8SBjoern A. Zeeb if (w->w_req->flags & SCTL_MASK32) { 22476d076ae8SBjoern A. Zeeb struct if_msghdr32 *ifm32; 22486d076ae8SBjoern A. Zeeb 2249b245f96cSGleb Smirnoff ifm32 = (struct if_msghdr32 *)ifm; 22506d076ae8SBjoern A. Zeeb ifm32->ifm_addrs = info->rti_addrs; 22516d076ae8SBjoern A. Zeeb ifm32->ifm_flags = ifp->if_flags | ifp->if_drv_flags; 22526d076ae8SBjoern A. Zeeb ifm32->ifm_index = ifp->if_index; 2253d25f8522SMark Johnston ifm32->_ifm_spare1 = 0; 2254b245f96cSGleb Smirnoff ifd = &ifm32->ifm_data; 2255b245f96cSGleb Smirnoff } else 22566d076ae8SBjoern A. Zeeb #endif 2257b245f96cSGleb Smirnoff { 22586d076ae8SBjoern A. Zeeb ifm->ifm_addrs = info->rti_addrs; 22596d076ae8SBjoern A. Zeeb ifm->ifm_flags = ifp->if_flags | ifp->if_drv_flags; 22606d076ae8SBjoern A. Zeeb ifm->ifm_index = ifp->if_index; 2261d25f8522SMark Johnston ifm->_ifm_spare1 = 0; 2262b245f96cSGleb Smirnoff ifd = &ifm->ifm_data; 2263b245f96cSGleb Smirnoff } 22646d076ae8SBjoern A. Zeeb 2265ab607f28SRyan Stone memcpy(ifd, src_ifd, sizeof(*ifd)); 22662d70c0deSGleb Smirnoff 22676d076ae8SBjoern A. Zeeb return (SYSCTL_OUT(w->w_req, (caddr_t)ifm, len)); 22686d076ae8SBjoern A. Zeeb } 22696d076ae8SBjoern A. Zeeb 22706d076ae8SBjoern A. Zeeb static int 22716d076ae8SBjoern A. Zeeb sysctl_iflist_ifaml(struct ifaddr *ifa, struct rt_addrinfo *info, 22726d076ae8SBjoern A. Zeeb struct walkarg *w, int len) 22736d076ae8SBjoern A. Zeeb { 22746d076ae8SBjoern A. Zeeb struct ifa_msghdrl *ifam; 2275b245f96cSGleb Smirnoff struct if_data *ifd; 2276b245f96cSGleb Smirnoff 2277b245f96cSGleb Smirnoff ifam = (struct ifa_msghdrl *)w->w_tmem; 22786d076ae8SBjoern A. Zeeb 22796d076ae8SBjoern A. Zeeb #ifdef COMPAT_FREEBSD32 22806d076ae8SBjoern A. Zeeb if (w->w_req->flags & SCTL_MASK32) { 22816d076ae8SBjoern A. Zeeb struct ifa_msghdrl32 *ifam32; 22826d076ae8SBjoern A. Zeeb 2283b245f96cSGleb Smirnoff ifam32 = (struct ifa_msghdrl32 *)ifam; 22846d076ae8SBjoern A. Zeeb ifam32->ifam_addrs = info->rti_addrs; 22856d076ae8SBjoern A. Zeeb ifam32->ifam_flags = ifa->ifa_flags; 22866d076ae8SBjoern A. Zeeb ifam32->ifam_index = ifa->ifa_ifp->if_index; 22876d076ae8SBjoern A. Zeeb ifam32->_ifam_spare1 = 0; 22886d076ae8SBjoern A. Zeeb ifam32->ifam_len = sizeof(*ifam32); 22896d076ae8SBjoern A. Zeeb ifam32->ifam_data_off = 22906d076ae8SBjoern A. Zeeb offsetof(struct ifa_msghdrl32, ifam_data); 22919753faf5SGleb Smirnoff ifam32->ifam_metric = ifa->ifa_ifp->if_metric; 2292b245f96cSGleb Smirnoff ifd = &ifam32->ifam_data; 2293b245f96cSGleb Smirnoff } else 22946d076ae8SBjoern A. Zeeb #endif 2295b245f96cSGleb Smirnoff { 22966d076ae8SBjoern A. Zeeb ifam->ifam_addrs = info->rti_addrs; 22976d076ae8SBjoern A. Zeeb ifam->ifam_flags = ifa->ifa_flags; 22986d076ae8SBjoern A. Zeeb ifam->ifam_index = ifa->ifa_ifp->if_index; 22996d076ae8SBjoern A. Zeeb ifam->_ifam_spare1 = 0; 23006d076ae8SBjoern A. Zeeb ifam->ifam_len = sizeof(*ifam); 23016d076ae8SBjoern A. Zeeb ifam->ifam_data_off = offsetof(struct ifa_msghdrl, ifam_data); 23029753faf5SGleb Smirnoff ifam->ifam_metric = ifa->ifa_ifp->if_metric; 2303b245f96cSGleb Smirnoff ifd = &ifam->ifam_data; 2304b245f96cSGleb Smirnoff } 23056d076ae8SBjoern A. Zeeb 2306b245f96cSGleb Smirnoff bzero(ifd, sizeof(*ifd)); 2307b245f96cSGleb Smirnoff ifd->ifi_datalen = sizeof(struct if_data); 2308b245f96cSGleb Smirnoff ifd->ifi_ipackets = counter_u64_fetch(ifa->ifa_ipackets); 2309b245f96cSGleb Smirnoff ifd->ifi_opackets = counter_u64_fetch(ifa->ifa_opackets); 2310b245f96cSGleb Smirnoff ifd->ifi_ibytes = counter_u64_fetch(ifa->ifa_ibytes); 2311b245f96cSGleb Smirnoff ifd->ifi_obytes = counter_u64_fetch(ifa->ifa_obytes); 23127caf4ab7SGleb Smirnoff 23136d076ae8SBjoern A. Zeeb /* Fixup if_data carp(4) vhid. */ 23146d076ae8SBjoern A. Zeeb if (carp_get_vhid_p != NULL) 2315b245f96cSGleb Smirnoff ifd->ifi_vhid = (*carp_get_vhid_p)(ifa); 23166d076ae8SBjoern A. Zeeb 23176d076ae8SBjoern A. Zeeb return (SYSCTL_OUT(w->w_req, w->w_tmem, len)); 23186d076ae8SBjoern A. Zeeb } 23196d076ae8SBjoern A. Zeeb 23206d076ae8SBjoern A. Zeeb static int 23216d076ae8SBjoern A. Zeeb sysctl_iflist_ifam(struct ifaddr *ifa, struct rt_addrinfo *info, 23226d076ae8SBjoern A. Zeeb struct walkarg *w, int len) 23236d076ae8SBjoern A. Zeeb { 23246d076ae8SBjoern A. Zeeb struct ifa_msghdr *ifam; 23256d076ae8SBjoern A. Zeeb 23266d076ae8SBjoern A. Zeeb ifam = (struct ifa_msghdr *)w->w_tmem; 23276d076ae8SBjoern A. Zeeb ifam->ifam_addrs = info->rti_addrs; 23286d076ae8SBjoern A. Zeeb ifam->ifam_flags = ifa->ifa_flags; 23296d076ae8SBjoern A. Zeeb ifam->ifam_index = ifa->ifa_ifp->if_index; 2330d25f8522SMark Johnston ifam->_ifam_spare1 = 0; 23319753faf5SGleb Smirnoff ifam->ifam_metric = ifa->ifa_ifp->if_metric; 23326d076ae8SBjoern A. Zeeb 23336d076ae8SBjoern A. Zeeb return (SYSCTL_OUT(w->w_req, w->w_tmem, len)); 23346d076ae8SBjoern A. Zeeb } 23356d076ae8SBjoern A. Zeeb 23366d076ae8SBjoern A. Zeeb static int 2337becc44d7SSam Leffler sysctl_iflist(int af, struct walkarg *w) 2338df8bae1dSRodney W. Grimes { 2339becc44d7SSam Leffler struct ifnet *ifp; 2340becc44d7SSam Leffler struct ifaddr *ifa; 2341ab607f28SRyan Stone struct if_data ifd; 2342df8bae1dSRodney W. Grimes struct rt_addrinfo info; 2343df8bae1dSRodney W. Grimes int len, error = 0; 23443deb3649SAlexander V. Chernikov struct sockaddr_storage ss; 2345df8bae1dSRodney W. Grimes 2346df8bae1dSRodney W. Grimes bzero((caddr_t)&info, sizeof(info)); 2347ab607f28SRyan Stone bzero(&ifd, sizeof(ifd)); 23484f6c66ccSMatt Macy CK_STAILQ_FOREACH(ifp, &V_ifnet, if_link) { 2349df8bae1dSRodney W. Grimes if (w->w_arg && w->w_arg != ifp->if_index) 2350df8bae1dSRodney W. Grimes continue; 2351ab607f28SRyan Stone if_data_copy(ifp, &ifd); 23524a0d6638SRuslan Ermilov ifa = ifp->if_addr; 2353becc44d7SSam Leffler info.rti_info[RTAX_IFP] = ifa->ifa_addr; 2354f2e5eb36SAlexander V. Chernikov error = rtsock_msg_buffer(RTM_IFINFO, &info, w, &len); 2355f2e5eb36SAlexander V. Chernikov if (error != 0) 2356f2e5eb36SAlexander V. Chernikov goto done; 23575dfc91d7SLuigi Rizzo info.rti_info[RTAX_IFP] = NULL; 235852041295SPoul-Henning Kamp if (w->w_req && w->w_tmem) { 23596d076ae8SBjoern A. Zeeb if (w->w_op == NET_RT_IFLISTL) 2360ab607f28SRyan Stone error = sysctl_iflist_ifml(ifp, &ifd, &info, w, 2361ab607f28SRyan Stone len); 23626d076ae8SBjoern A. Zeeb else 2363ab607f28SRyan Stone error = sysctl_iflist_ifm(ifp, &ifd, &info, w, 2364ab607f28SRyan Stone len); 2365df440948SPoul-Henning Kamp if (error) 2366a35b06c5SJonathan Lemon goto done; 2367df8bae1dSRodney W. Grimes } 2368d7c5a620SMatt Macy while ((ifa = CK_STAILQ_NEXT(ifa, ifa_link)) != NULL) { 2369df8bae1dSRodney W. Grimes if (af && af != ifa->ifa_addr->sa_family) 2370df8bae1dSRodney W. Grimes continue; 2371b89e82ddSJamie Gritton if (prison_if(w->w_req->td->td_ucred, 2372b89e82ddSJamie Gritton ifa->ifa_addr) != 0) 237375c13541SPoul-Henning Kamp continue; 2374becc44d7SSam Leffler info.rti_info[RTAX_IFA] = ifa->ifa_addr; 23753deb3649SAlexander V. Chernikov info.rti_info[RTAX_NETMASK] = rtsock_fix_netmask( 23763deb3649SAlexander V. Chernikov ifa->ifa_addr, ifa->ifa_netmask, &ss); 2377becc44d7SSam Leffler info.rti_info[RTAX_BRD] = ifa->ifa_dstaddr; 2378f2e5eb36SAlexander V. Chernikov error = rtsock_msg_buffer(RTM_NEWADDR, &info, w, &len); 2379f2e5eb36SAlexander V. Chernikov if (error != 0) 2380f2e5eb36SAlexander V. Chernikov goto done; 238152041295SPoul-Henning Kamp if (w->w_req && w->w_tmem) { 23826d076ae8SBjoern A. Zeeb if (w->w_op == NET_RT_IFLISTL) 23836d076ae8SBjoern A. Zeeb error = sysctl_iflist_ifaml(ifa, &info, 23846d076ae8SBjoern A. Zeeb w, len); 23856d076ae8SBjoern A. Zeeb else 23866d076ae8SBjoern A. Zeeb error = sysctl_iflist_ifam(ifa, &info, 23876d076ae8SBjoern A. Zeeb w, len); 2388df440948SPoul-Henning Kamp if (error) 2389a35b06c5SJonathan Lemon goto done; 2390df8bae1dSRodney W. Grimes } 2391df8bae1dSRodney W. Grimes } 23923deb3649SAlexander V. Chernikov info.rti_info[RTAX_IFA] = NULL; 23933deb3649SAlexander V. Chernikov info.rti_info[RTAX_NETMASK] = NULL; 23945dfc91d7SLuigi Rizzo info.rti_info[RTAX_BRD] = NULL; 2395df8bae1dSRodney W. Grimes } 2396a35b06c5SJonathan Lemon done: 2397a35b06c5SJonathan Lemon return (error); 2398df8bae1dSRodney W. Grimes } 2399df8bae1dSRodney W. Grimes 2400ebda3fc3SBjoern A. Zeeb static int 24019b98ee2cSLuigi Rizzo sysctl_ifmalist(int af, struct walkarg *w) 240205b2efe0SBruce M Simpson { 240305b2efe0SBruce M Simpson struct rt_addrinfo info; 24049b98ee2cSLuigi Rizzo struct ifaddr *ifa; 240555dfce58SMark Johnston struct ifmultiaddr *ifma; 240655dfce58SMark Johnston struct ifnet *ifp; 240755dfce58SMark Johnston int error, len; 240805b2efe0SBruce M Simpson 2409b8a6e03fSGleb Smirnoff NET_EPOCH_ASSERT(); 2410b8a6e03fSGleb Smirnoff 241155dfce58SMark Johnston error = 0; 241205b2efe0SBruce M Simpson bzero((caddr_t)&info, sizeof(info)); 241355dfce58SMark Johnston 24144f6c66ccSMatt Macy CK_STAILQ_FOREACH(ifp, &V_ifnet, if_link) { 241505b2efe0SBruce M Simpson if (w->w_arg && w->w_arg != ifp->if_index) 241605b2efe0SBruce M Simpson continue; 24174a0d6638SRuslan Ermilov ifa = ifp->if_addr; 2418913af518SLuigi Rizzo info.rti_info[RTAX_IFP] = ifa ? ifa->ifa_addr : NULL; 2419d7c5a620SMatt Macy CK_STAILQ_FOREACH(ifma, &ifp->if_multiaddrs, ifma_link) { 242005b2efe0SBruce M Simpson if (af && af != ifma->ifma_addr->sa_family) 242105b2efe0SBruce M Simpson continue; 2422b89e82ddSJamie Gritton if (prison_if(w->w_req->td->td_ucred, 2423b89e82ddSJamie Gritton ifma->ifma_addr) != 0) 242405b2efe0SBruce M Simpson continue; 242505b2efe0SBruce M Simpson info.rti_info[RTAX_IFA] = ifma->ifma_addr; 2426913af518SLuigi Rizzo info.rti_info[RTAX_GATEWAY] = 2427913af518SLuigi Rizzo (ifma->ifma_addr->sa_family != AF_LINK) ? 2428913af518SLuigi Rizzo ifma->ifma_lladdr : NULL; 2429c9f98940SAlexander V. Chernikov error = rtsock_msg_buffer(RTM_NEWMADDR, &info, w, &len); 2430f2e5eb36SAlexander V. Chernikov if (error != 0) 243155dfce58SMark Johnston break; 243205b2efe0SBruce M Simpson if (w->w_req && w->w_tmem) { 24339b98ee2cSLuigi Rizzo struct ifma_msghdr *ifmam; 243405b2efe0SBruce M Simpson 243505b2efe0SBruce M Simpson ifmam = (struct ifma_msghdr *)w->w_tmem; 243605b2efe0SBruce M Simpson ifmam->ifmam_index = ifma->ifma_ifp->if_index; 243705b2efe0SBruce M Simpson ifmam->ifmam_flags = 0; 243805b2efe0SBruce M Simpson ifmam->ifmam_addrs = info.rti_addrs; 2439d25f8522SMark Johnston ifmam->_ifmam_spare1 = 0; 244005b2efe0SBruce M Simpson error = SYSCTL_OUT(w->w_req, w->w_tmem, len); 244155dfce58SMark Johnston if (error != 0) 244255dfce58SMark Johnston break; 244305b2efe0SBruce M Simpson } 244405b2efe0SBruce M Simpson } 244555dfce58SMark Johnston if (error != 0) 244655dfce58SMark Johnston break; 2447fe0fc7efSChristian S.J. Peron } 244805b2efe0SBruce M Simpson return (error); 244905b2efe0SBruce M Simpson } 245005b2efe0SBruce M Simpson 2451d68fb8d9SAlexander V. Chernikov static void 2452d68fb8d9SAlexander V. Chernikov rtable_sysctl_dump(uint32_t fibnum, int family, struct walkarg *w) 2453d68fb8d9SAlexander V. Chernikov { 2454d68fb8d9SAlexander V. Chernikov union sockaddr_union sa_dst, sa_mask; 2455d68fb8d9SAlexander V. Chernikov 2456d68fb8d9SAlexander V. Chernikov w->family = family; 2457d68fb8d9SAlexander V. Chernikov w->dst = (struct sockaddr *)&sa_dst; 2458d68fb8d9SAlexander V. Chernikov w->mask = (struct sockaddr *)&sa_mask; 2459d68fb8d9SAlexander V. Chernikov 2460d68fb8d9SAlexander V. Chernikov init_sockaddrs_family(family, w->dst, w->mask); 2461d68fb8d9SAlexander V. Chernikov 2462d68fb8d9SAlexander V. Chernikov rib_walk(fibnum, family, false, sysctl_dumpentry, w); 2463d68fb8d9SAlexander V. Chernikov } 2464d68fb8d9SAlexander V. Chernikov 246552041295SPoul-Henning Kamp static int 246682d9ae4eSPoul-Henning Kamp sysctl_rtsock(SYSCTL_HANDLER_ARGS) 2467df8bae1dSRodney W. Grimes { 2468b8a6e03fSGleb Smirnoff struct epoch_tracker et; 246952041295SPoul-Henning Kamp int *name = (int *)arg1; 247052041295SPoul-Henning Kamp u_int namelen = arg2; 247161eee0e2SAlexander V. Chernikov struct rib_head *rnh = NULL; /* silence compiler. */ 2472fe0fc7efSChristian S.J. Peron int i, lim, error = EINVAL; 24734825b1e0SHiroki Sato int fib = 0; 2474df8bae1dSRodney W. Grimes u_char af; 2475df8bae1dSRodney W. Grimes struct walkarg w; 2476df8bae1dSRodney W. Grimes 247752041295SPoul-Henning Kamp name ++; 247852041295SPoul-Henning Kamp namelen--; 247952041295SPoul-Henning Kamp if (req->newptr) 2480df8bae1dSRodney W. Grimes return (EPERM); 2481fedeb08bSAlexander V. Chernikov if (name[1] == NET_RT_DUMP || name[1] == NET_RT_NHOP || name[1] == NET_RT_NHGRP) { 24824825b1e0SHiroki Sato if (namelen == 3) 24834825b1e0SHiroki Sato fib = req->td->td_proc->p_fibnum; 24844825b1e0SHiroki Sato else if (namelen == 4) 24857d9b6df1SAlexander V. Chernikov fib = (name[3] == RT_ALL_FIBS) ? 24864825b1e0SHiroki Sato req->td->td_proc->p_fibnum : name[3]; 24874825b1e0SHiroki Sato else 24884825b1e0SHiroki Sato return ((namelen < 3) ? EISDIR : ENOTDIR); 24894825b1e0SHiroki Sato if (fib < 0 || fib >= rt_numfibs) 24904825b1e0SHiroki Sato return (EINVAL); 24914825b1e0SHiroki Sato } else if (namelen != 3) 2492f7a54d06SCrist J. Clark return ((namelen < 3) ? EISDIR : ENOTDIR); 2493df8bae1dSRodney W. Grimes af = name[0]; 2494b2aaf46eSJeffrey Hsu if (af > AF_MAX) 2495b2aaf46eSJeffrey Hsu return (EINVAL); 24966b96f1afSLuigi Rizzo bzero(&w, sizeof(w)); 2497df8bae1dSRodney W. Grimes w.w_op = name[1]; 2498df8bae1dSRodney W. Grimes w.w_arg = name[2]; 249952041295SPoul-Henning Kamp w.w_req = req; 2500df8bae1dSRodney W. Grimes 2501fe0fc7efSChristian S.J. Peron error = sysctl_wire_old_buffer(req, 0); 2502fe0fc7efSChristian S.J. Peron if (error) 2503fe0fc7efSChristian S.J. Peron return (error); 2504f2e5eb36SAlexander V. Chernikov 2505f2e5eb36SAlexander V. Chernikov /* 2506f2e5eb36SAlexander V. Chernikov * Allocate reply buffer in advance. 2507f2e5eb36SAlexander V. Chernikov * All rtsock messages has maximum length of u_short. 2508f2e5eb36SAlexander V. Chernikov */ 2509f2e5eb36SAlexander V. Chernikov w.w_tmemsize = 65536; 2510f2e5eb36SAlexander V. Chernikov w.w_tmem = malloc(w.w_tmemsize, M_TEMP, M_WAITOK); 2511f2e5eb36SAlexander V. Chernikov 2512b8a6e03fSGleb Smirnoff NET_EPOCH_ENTER(et); 2513df8bae1dSRodney W. Grimes switch (w.w_op) { 2514df8bae1dSRodney W. Grimes case NET_RT_DUMP: 2515df8bae1dSRodney W. Grimes case NET_RT_FLAGS: 2516a8b76c8fSLuigi Rizzo if (af == 0) { /* dump all tables */ 2517a8b76c8fSLuigi Rizzo i = 1; 2518a8b76c8fSLuigi Rizzo lim = AF_MAX; 2519a8b76c8fSLuigi Rizzo } else /* dump only one table */ 2520a8b76c8fSLuigi Rizzo i = lim = af; 25218eca593cSQing Li 25228eca593cSQing Li /* 25238eca593cSQing Li * take care of llinfo entries, the caller must 25248eca593cSQing Li * specify an AF 25258eca593cSQing Li */ 252614981d80SQing Li if (w.w_op == NET_RT_FLAGS && 252782b334e8SQing Li (w.w_arg == 0 || w.w_arg & RTF_LLINFO)) { 25288eca593cSQing Li if (af != 0) 25298eca593cSQing Li error = lltable_sysctl_dumparp(af, w.w_req); 25308eca593cSQing Li else 25318eca593cSQing Li error = EINVAL; 25328eca593cSQing Li break; 25338eca593cSQing Li } 25348eca593cSQing Li /* 25358eca593cSQing Li * take care of routing entries 25368eca593cSQing Li */ 253720b0cdb7SBjoern A. Zeeb for (error = 0; error == 0 && i <= lim; i++) { 25384825b1e0SHiroki Sato rnh = rt_tables_get_rnh(fib, i); 2539c2c2a7c1SBjoern A. Zeeb if (rnh != NULL) { 2540d68fb8d9SAlexander V. Chernikov rtable_sysctl_dump(fib, i, &w); 2541a8b76c8fSLuigi Rizzo } else if (af != 0) 2542956b0b65SJeffrey Hsu error = EAFNOSUPPORT; 254320b0cdb7SBjoern A. Zeeb } 2544df8bae1dSRodney W. Grimes break; 2545a6663252SAlexander V. Chernikov case NET_RT_NHOP: 2546fedeb08bSAlexander V. Chernikov case NET_RT_NHGRP: 2547a6663252SAlexander V. Chernikov /* Allow dumping one specific af/fib at a time */ 2548a6663252SAlexander V. Chernikov if (namelen < 4) { 2549a6663252SAlexander V. Chernikov error = EINVAL; 2550a6663252SAlexander V. Chernikov break; 2551a6663252SAlexander V. Chernikov } 2552a6663252SAlexander V. Chernikov fib = name[3]; 2553a6663252SAlexander V. Chernikov if (fib < 0 || fib > rt_numfibs) { 2554a6663252SAlexander V. Chernikov error = EINVAL; 2555a6663252SAlexander V. Chernikov break; 2556a6663252SAlexander V. Chernikov } 2557a6663252SAlexander V. Chernikov rnh = rt_tables_get_rnh(fib, af); 2558a6663252SAlexander V. Chernikov if (rnh == NULL) { 2559a6663252SAlexander V. Chernikov error = EAFNOSUPPORT; 2560a6663252SAlexander V. Chernikov break; 2561a6663252SAlexander V. Chernikov } 2562a6663252SAlexander V. Chernikov if (w.w_op == NET_RT_NHOP) 2563a6663252SAlexander V. Chernikov error = nhops_dump_sysctl(rnh, w.w_req); 2564fedeb08bSAlexander V. Chernikov else 2565fedeb08bSAlexander V. Chernikov #ifdef ROUTE_MPATH 2566fedeb08bSAlexander V. Chernikov error = nhgrp_dump_sysctl(rnh, w.w_req); 2567fedeb08bSAlexander V. Chernikov #else 2568fedeb08bSAlexander V. Chernikov error = ENOTSUP; 2569fedeb08bSAlexander V. Chernikov #endif 2570a6663252SAlexander V. Chernikov break; 2571df8bae1dSRodney W. Grimes case NET_RT_IFLIST: 25726d076ae8SBjoern A. Zeeb case NET_RT_IFLISTL: 2573df8bae1dSRodney W. Grimes error = sysctl_iflist(af, &w); 257405b2efe0SBruce M Simpson break; 257505b2efe0SBruce M Simpson 257605b2efe0SBruce M Simpson case NET_RT_IFMALIST: 257705b2efe0SBruce M Simpson error = sysctl_ifmalist(af, &w); 257805b2efe0SBruce M Simpson break; 2579df8bae1dSRodney W. Grimes } 2580b8a6e03fSGleb Smirnoff NET_EPOCH_EXIT(et); 2581f2e5eb36SAlexander V. Chernikov 2582f2e5eb36SAlexander V. Chernikov free(w.w_tmem, M_TEMP); 2583df8bae1dSRodney W. Grimes return (error); 2584df8bae1dSRodney W. Grimes } 2585df8bae1dSRodney W. Grimes 25868a9a28c4SGleb Smirnoff static SYSCTL_NODE(_net, PF_ROUTE, routetable, CTLFLAG_RD | CTLFLAG_MPSAFE, 25878a9a28c4SGleb Smirnoff sysctl_rtsock, "Return route tables and interface/address lists"); 258852041295SPoul-Henning Kamp 2589df8bae1dSRodney W. Grimes /* 2590df8bae1dSRodney W. Grimes * Definitions of protocols supported in the ROUTE domain. 2591df8bae1dSRodney W. Grimes */ 2592df8bae1dSRodney W. Grimes 25935b1c0294SDavid E. O'Brien static struct domain routedomain; /* or at least forward */ 2594df8bae1dSRodney W. Grimes 259552041295SPoul-Henning Kamp static struct protosw routesw[] = { 2596303989a2SRuslan Ermilov { 2597303989a2SRuslan Ermilov .pr_type = SOCK_RAW, 2598303989a2SRuslan Ermilov .pr_domain = &routedomain, 2599303989a2SRuslan Ermilov .pr_flags = PR_ATOMIC|PR_ADDR, 2600303989a2SRuslan Ermilov .pr_output = route_output, 2601303989a2SRuslan Ermilov .pr_ctlinput = raw_ctlinput, 2602303989a2SRuslan Ermilov .pr_init = raw_init, 2603303989a2SRuslan Ermilov .pr_usrreqs = &route_usrreqs 2604df8bae1dSRodney W. Grimes } 2605df8bae1dSRodney W. Grimes }; 2606df8bae1dSRodney W. Grimes 2607303989a2SRuslan Ermilov static struct domain routedomain = { 2608303989a2SRuslan Ermilov .dom_family = PF_ROUTE, 2609303989a2SRuslan Ermilov .dom_name = "route", 2610303989a2SRuslan Ermilov .dom_protosw = routesw, 261102abd400SPedro F. Giffuni .dom_protoswNPROTOSW = &routesw[nitems(routesw)] 2612303989a2SRuslan Ermilov }; 261378a82810SGarrett Wollman 2614d0728d71SRobert Watson VNET_DOMAIN_SET(route); 2615