xref: /freebsd/sys/netinet/in.c (revision 51369649b03ece2aed3eb61b0c8214b9aa5b2fa2)
1c398230bSWarner Losh /*-
2*51369649SPedro F. Giffuni  * SPDX-License-Identifier: BSD-3-Clause
3*51369649SPedro F. Giffuni  *
4df8bae1dSRodney W. Grimes  * Copyright (c) 1982, 1986, 1991, 1993
5df8bae1dSRodney W. Grimes  *	The Regents of the University of California.  All rights reserved.
681d96ce8SMax Laier  * Copyright (C) 2001 WIDE Project.  All rights reserved.
7df8bae1dSRodney W. Grimes  *
8df8bae1dSRodney W. Grimes  * Redistribution and use in source and binary forms, with or without
9df8bae1dSRodney W. Grimes  * modification, are permitted provided that the following conditions
10df8bae1dSRodney W. Grimes  * are met:
11df8bae1dSRodney W. Grimes  * 1. Redistributions of source code must retain the above copyright
12df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer.
13df8bae1dSRodney W. Grimes  * 2. Redistributions in binary form must reproduce the above copyright
14df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer in the
15df8bae1dSRodney W. Grimes  *    documentation and/or other materials provided with the distribution.
16fbbd9655SWarner Losh  * 3. Neither the name of the University nor the names of its contributors
17df8bae1dSRodney W. Grimes  *    may be used to endorse or promote products derived from this software
18df8bae1dSRodney W. Grimes  *    without specific prior written permission.
19df8bae1dSRodney W. Grimes  *
20df8bae1dSRodney W. Grimes  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21df8bae1dSRodney W. Grimes  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22df8bae1dSRodney W. Grimes  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23df8bae1dSRodney W. Grimes  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24df8bae1dSRodney W. Grimes  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25df8bae1dSRodney W. Grimes  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26df8bae1dSRodney W. Grimes  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27df8bae1dSRodney W. Grimes  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28df8bae1dSRodney W. Grimes  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29df8bae1dSRodney W. Grimes  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30df8bae1dSRodney W. Grimes  * SUCH DAMAGE.
31df8bae1dSRodney W. Grimes  *
322180b925SGarrett Wollman  *	@(#)in.c	8.4 (Berkeley) 1/9/95
33df8bae1dSRodney W. Grimes  */
34df8bae1dSRodney W. Grimes 
354b421e2dSMike Silbersack #include <sys/cdefs.h>
364b421e2dSMike Silbersack __FBSDID("$FreeBSD$");
374b421e2dSMike Silbersack 
38c7ea0aa6SQing Li #include "opt_mpath.h"
3950bb1704SGleb Smirnoff 
40df8bae1dSRodney W. Grimes #include <sys/param.h>
41c3322cb9SGleb Smirnoff #include <sys/eventhandler.h>
4226f9a767SRodney W. Grimes #include <sys/systm.h>
4351a53488SBruce Evans #include <sys/sockio.h>
44df8bae1dSRodney W. Grimes #include <sys/malloc.h>
45acd3428bSRobert Watson #include <sys/priv.h>
46df8bae1dSRodney W. Grimes #include <sys/socket.h>
475ce0eb7fSBjoern A. Zeeb #include <sys/jail.h>
48f6d24a78SPoul-Henning Kamp #include <sys/kernel.h>
49cc0a3c8cSAndrey V. Elsukov #include <sys/lock.h>
505ce0eb7fSBjoern A. Zeeb #include <sys/proc.h>
51cc0a3c8cSAndrey V. Elsukov #include <sys/rmlock.h>
52f6d24a78SPoul-Henning Kamp #include <sys/sysctl.h>
53ebc90701SQing Li #include <sys/syslog.h>
54f7a39160SGleb Smirnoff #include <sys/sx.h>
55df8bae1dSRodney W. Grimes 
56df8bae1dSRodney W. Grimes #include <net/if.h>
57df813b7eSQing Li #include <net/if_var.h>
58e162ea60SGeorge V. Neville-Neil #include <net/if_arp.h>
59ebc90701SQing Li #include <net/if_dl.h>
606e6b3f7cSQing Li #include <net/if_llatbl.h>
616a800098SYoshinobu Inoue #include <net/if_types.h>
62df8bae1dSRodney W. Grimes #include <net/route.h>
63ebc90701SQing Li #include <net/vnet.h>
64df8bae1dSRodney W. Grimes 
6508b68b0eSGleb Smirnoff #include <netinet/if_ether.h>
66df8bae1dSRodney W. Grimes #include <netinet/in.h>
67df8bae1dSRodney W. Grimes #include <netinet/in_var.h>
68e43cc4aeSHajimu UMEMOTO #include <netinet/in_pcb.h>
6971498f30SBruce M Simpson #include <netinet/ip_var.h>
7008b68b0eSGleb Smirnoff #include <netinet/ip_carp.h>
71d10910e6SBruce M Simpson #include <netinet/igmp_var.h>
72eddfbb76SRobert Watson #include <netinet/udp.h>
73eddfbb76SRobert Watson #include <netinet/udp_var.h>
7455166637SPoul-Henning Kamp 
7577b89ad8SGleb Smirnoff static int in_aifaddr_ioctl(u_long, caddr_t, struct ifnet *, struct thread *);
76338e227aSLuiz Otavio O Souza static int in_difaddr_ioctl(u_long, caddr_t, struct ifnet *, struct thread *);
776a800098SYoshinobu Inoue 
784d77a549SAlfred Perlstein static void	in_socktrim(struct sockaddr_in *);
79ec002feeSBruce M Simpson static void	in_purgemaddrs(struct ifnet *);
80df8bae1dSRodney W. Grimes 
8108b68b0eSGleb Smirnoff static VNET_DEFINE(int, nosameprefix);
8208b68b0eSGleb Smirnoff #define	V_nosameprefix			VNET(nosameprefix)
836df8a710SGleb Smirnoff SYSCTL_INT(_net_inet_ip, OID_AUTO, no_same_prefix, CTLFLAG_VNET | CTLFLAG_RW,
8408b68b0eSGleb Smirnoff 	&VNET_NAME(nosameprefix), 0,
851ae95409SGleb Smirnoff 	"Refuse to create same prefixes on different interfaces");
86477180fbSGarrett Wollman 
8782cea7e6SBjoern A. Zeeb VNET_DECLARE(struct inpcbinfo, ripcbinfo);
8882cea7e6SBjoern A. Zeeb #define	V_ripcbinfo			VNET(ripcbinfo)
8982cea7e6SBjoern A. Zeeb 
90f7a39160SGleb Smirnoff static struct sx in_control_sx;
91f7a39160SGleb Smirnoff SX_SYSINIT(in_control_sx, &in_control_sx, "in_control");
92f7a39160SGleb Smirnoff 
93df8bae1dSRodney W. Grimes /*
94df8bae1dSRodney W. Grimes  * Return 1 if an internet address is for a ``local'' host
95b365d954SGleb Smirnoff  * (one to which we have a connection).
96df8bae1dSRodney W. Grimes  */
9726f9a767SRodney W. Grimes int
98f2565d68SRobert Watson in_localaddr(struct in_addr in)
99df8bae1dSRodney W. Grimes {
100cc0a3c8cSAndrey V. Elsukov 	struct rm_priotracker in_ifa_tracker;
1013e85b721SEd Maste 	u_long i = ntohl(in.s_addr);
1023e85b721SEd Maste 	struct in_ifaddr *ia;
103df8bae1dSRodney W. Grimes 
104cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RLOCK(&in_ifa_tracker);
1052d9cfabaSRobert Watson 	TAILQ_FOREACH(ia, &V_in_ifaddrhead, ia_link) {
1062d9cfabaSRobert Watson 		if ((i & ia->ia_subnetmask) == ia->ia_subnet) {
107cc0a3c8cSAndrey V. Elsukov 			IN_IFADDR_RUNLOCK(&in_ifa_tracker);
1082d9cfabaSRobert Watson 			return (1);
1092d9cfabaSRobert Watson 		}
1102d9cfabaSRobert Watson 	}
111cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RUNLOCK(&in_ifa_tracker);
112df8bae1dSRodney W. Grimes 	return (0);
113df8bae1dSRodney W. Grimes }
114df8bae1dSRodney W. Grimes 
115df8bae1dSRodney W. Grimes /*
1162eccc90bSAndre Oppermann  * Return 1 if an internet address is for the local host and configured
1172eccc90bSAndre Oppermann  * on one of its interfaces.
1182eccc90bSAndre Oppermann  */
1192eccc90bSAndre Oppermann int
120f2565d68SRobert Watson in_localip(struct in_addr in)
1212eccc90bSAndre Oppermann {
122cc0a3c8cSAndrey V. Elsukov 	struct rm_priotracker in_ifa_tracker;
1232eccc90bSAndre Oppermann 	struct in_ifaddr *ia;
1242eccc90bSAndre Oppermann 
125cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RLOCK(&in_ifa_tracker);
1262eccc90bSAndre Oppermann 	LIST_FOREACH(ia, INADDR_HASH(in.s_addr), ia_hash) {
1272d9cfabaSRobert Watson 		if (IA_SIN(ia)->sin_addr.s_addr == in.s_addr) {
128cc0a3c8cSAndrey V. Elsukov 			IN_IFADDR_RUNLOCK(&in_ifa_tracker);
129460473a0SBjoern A. Zeeb 			return (1);
1302eccc90bSAndre Oppermann 		}
1312d9cfabaSRobert Watson 	}
132cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RUNLOCK(&in_ifa_tracker);
133460473a0SBjoern A. Zeeb 	return (0);
1342eccc90bSAndre Oppermann }
1352eccc90bSAndre Oppermann 
1362eccc90bSAndre Oppermann /*
13728ebe80cSGleb Smirnoff  * Return 1 if an internet address is configured on an interface.
13828ebe80cSGleb Smirnoff  */
13928ebe80cSGleb Smirnoff int
14028ebe80cSGleb Smirnoff in_ifhasaddr(struct ifnet *ifp, struct in_addr in)
14128ebe80cSGleb Smirnoff {
14228ebe80cSGleb Smirnoff 	struct ifaddr *ifa;
14328ebe80cSGleb Smirnoff 	struct in_ifaddr *ia;
14428ebe80cSGleb Smirnoff 
14528ebe80cSGleb Smirnoff 	IF_ADDR_RLOCK(ifp);
14628ebe80cSGleb Smirnoff 	TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
14728ebe80cSGleb Smirnoff 		if (ifa->ifa_addr->sa_family != AF_INET)
14828ebe80cSGleb Smirnoff 			continue;
14928ebe80cSGleb Smirnoff 		ia = (struct in_ifaddr *)ifa;
15028ebe80cSGleb Smirnoff 		if (ia->ia_addr.sin_addr.s_addr == in.s_addr) {
15128ebe80cSGleb Smirnoff 			IF_ADDR_RUNLOCK(ifp);
15228ebe80cSGleb Smirnoff 			return (1);
15328ebe80cSGleb Smirnoff 		}
15428ebe80cSGleb Smirnoff 	}
15528ebe80cSGleb Smirnoff 	IF_ADDR_RUNLOCK(ifp);
15628ebe80cSGleb Smirnoff 
15728ebe80cSGleb Smirnoff 	return (0);
15828ebe80cSGleb Smirnoff }
15928ebe80cSGleb Smirnoff 
16028ebe80cSGleb Smirnoff /*
161f7a39160SGleb Smirnoff  * Return a reference to the interface address which is different to
162f7a39160SGleb Smirnoff  * the supplied one but with same IP address value.
163f7a39160SGleb Smirnoff  */
164f7a39160SGleb Smirnoff static struct in_ifaddr *
165f7a39160SGleb Smirnoff in_localip_more(struct in_ifaddr *ia)
166f7a39160SGleb Smirnoff {
167cc0a3c8cSAndrey V. Elsukov 	struct rm_priotracker in_ifa_tracker;
168f7a39160SGleb Smirnoff 	in_addr_t in = IA_SIN(ia)->sin_addr.s_addr;
169f7a39160SGleb Smirnoff 	struct in_ifaddr *it;
170f7a39160SGleb Smirnoff 
171cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RLOCK(&in_ifa_tracker);
172f7a39160SGleb Smirnoff 	LIST_FOREACH(it, INADDR_HASH(in), ia_hash) {
173f7a39160SGleb Smirnoff 		if (it != ia && IA_SIN(it)->sin_addr.s_addr == in) {
174f7a39160SGleb Smirnoff 			ifa_ref(&it->ia_ifa);
175cc0a3c8cSAndrey V. Elsukov 			IN_IFADDR_RUNLOCK(&in_ifa_tracker);
176f7a39160SGleb Smirnoff 			return (it);
177f7a39160SGleb Smirnoff 		}
178f7a39160SGleb Smirnoff 	}
179cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RUNLOCK(&in_ifa_tracker);
180f7a39160SGleb Smirnoff 
181f7a39160SGleb Smirnoff 	return (NULL);
182f7a39160SGleb Smirnoff }
183f7a39160SGleb Smirnoff 
184f7a39160SGleb Smirnoff /*
185df8bae1dSRodney W. Grimes  * Determine whether an IP address is in a reserved set of addresses
186df8bae1dSRodney W. Grimes  * that may not be forwarded, or whether datagrams to that destination
187df8bae1dSRodney W. Grimes  * may be forwarded.
188df8bae1dSRodney W. Grimes  */
18926f9a767SRodney W. Grimes int
190f2565d68SRobert Watson in_canforward(struct in_addr in)
191df8bae1dSRodney W. Grimes {
1923e85b721SEd Maste 	u_long i = ntohl(in.s_addr);
1933e85b721SEd Maste 	u_long net;
194df8bae1dSRodney W. Grimes 
195f8429ca2SBruce M Simpson 	if (IN_EXPERIMENTAL(i) || IN_MULTICAST(i) || IN_LINKLOCAL(i))
196df8bae1dSRodney W. Grimes 		return (0);
197df8bae1dSRodney W. Grimes 	if (IN_CLASSA(i)) {
198df8bae1dSRodney W. Grimes 		net = i & IN_CLASSA_NET;
199df8bae1dSRodney W. Grimes 		if (net == 0 || net == (IN_LOOPBACKNET << IN_CLASSA_NSHIFT))
200df8bae1dSRodney W. Grimes 			return (0);
201df8bae1dSRodney W. Grimes 	}
202df8bae1dSRodney W. Grimes 	return (1);
203df8bae1dSRodney W. Grimes }
204df8bae1dSRodney W. Grimes 
205df8bae1dSRodney W. Grimes /*
206df8bae1dSRodney W. Grimes  * Trim a mask in a sockaddr
207df8bae1dSRodney W. Grimes  */
2080312fbe9SPoul-Henning Kamp static void
209f2565d68SRobert Watson in_socktrim(struct sockaddr_in *ap)
210df8bae1dSRodney W. Grimes {
2113e85b721SEd Maste     char *cplim = (char *) &ap->sin_addr;
2123e85b721SEd Maste     char *cp = (char *) (&ap->sin_addr + 1);
213df8bae1dSRodney W. Grimes 
214df8bae1dSRodney W. Grimes     ap->sin_len = 0;
215df00058dSGarrett Wollman     while (--cp >= cplim)
216df8bae1dSRodney W. Grimes 	if (*cp) {
217df8bae1dSRodney W. Grimes 	    (ap)->sin_len = cp - (char *) (ap) + 1;
218df8bae1dSRodney W. Grimes 	    break;
219df8bae1dSRodney W. Grimes 	}
220df8bae1dSRodney W. Grimes }
221df8bae1dSRodney W. Grimes 
222df8bae1dSRodney W. Grimes /*
223df8bae1dSRodney W. Grimes  * Generic internet control operations (ioctl's).
224df8bae1dSRodney W. Grimes  */
22526f9a767SRodney W. Grimes int
226f2565d68SRobert Watson in_control(struct socket *so, u_long cmd, caddr_t data, struct ifnet *ifp,
227f2565d68SRobert Watson     struct thread *td)
228df8bae1dSRodney W. Grimes {
229f7a39160SGleb Smirnoff 	struct ifreq *ifr = (struct ifreq *)data;
230f7a39160SGleb Smirnoff 	struct sockaddr_in *addr = (struct sockaddr_in *)&ifr->ifr_addr;
231821b5cafSGleb Smirnoff 	struct ifaddr *ifa;
232f7a39160SGleb Smirnoff 	struct in_ifaddr *ia;
233f7a39160SGleb Smirnoff 	int error;
234f7a39160SGleb Smirnoff 
235f7a39160SGleb Smirnoff 	if (ifp == NULL)
236f7a39160SGleb Smirnoff 		return (EADDRNOTAVAIL);
23771212473SGleb Smirnoff 
23871212473SGleb Smirnoff 	/*
239f7a39160SGleb Smirnoff 	 * Filter out 4 ioctls we implement directly.  Forward the rest
240f7a39160SGleb Smirnoff 	 * to specific functions and ifp->if_ioctl().
241bbb3fb61SRobert Watson 	 */
2426a800098SYoshinobu Inoue 	switch (cmd) {
243bbb3fb61SRobert Watson 	case SIOCGIFADDR:
244bbb3fb61SRobert Watson 	case SIOCGIFBRDADDR:
245bbb3fb61SRobert Watson 	case SIOCGIFDSTADDR:
246bbb3fb61SRobert Watson 	case SIOCGIFNETMASK:
247f7a39160SGleb Smirnoff 		break;
2486d00fd9cSGleb Smirnoff 	case SIOCDIFADDR:
249f7a39160SGleb Smirnoff 		sx_xlock(&in_control_sx);
250338e227aSLuiz Otavio O Souza 		error = in_difaddr_ioctl(cmd, data, ifp, td);
251f7a39160SGleb Smirnoff 		sx_xunlock(&in_control_sx);
252f7a39160SGleb Smirnoff 		return (error);
25377b89ad8SGleb Smirnoff 	case OSIOCAIFADDR:	/* 9.x compat */
2546d00fd9cSGleb Smirnoff 	case SIOCAIFADDR:
255f7a39160SGleb Smirnoff 		sx_xlock(&in_control_sx);
25677b89ad8SGleb Smirnoff 		error = in_aifaddr_ioctl(cmd, data, ifp, td);
257f7a39160SGleb Smirnoff 		sx_xunlock(&in_control_sx);
258f7a39160SGleb Smirnoff 		return (error);
259bbb3fb61SRobert Watson 	case SIOCSIFADDR:
260bbb3fb61SRobert Watson 	case SIOCSIFBRDADDR:
261bbb3fb61SRobert Watson 	case SIOCSIFDSTADDR:
262bbb3fb61SRobert Watson 	case SIOCSIFNETMASK:
26356cf9dc1SGleb Smirnoff 		/* We no longer support that old commands. */
2646d00fd9cSGleb Smirnoff 		return (EINVAL);
265bbb3fb61SRobert Watson 	default:
266f7a39160SGleb Smirnoff 		if (ifp->if_ioctl == NULL)
267bbb3fb61SRobert Watson 			return (EOPNOTSUPP);
268bbb3fb61SRobert Watson 		return ((*ifp->if_ioctl)(ifp, cmd, data));
2696a800098SYoshinobu Inoue 	}
2706a800098SYoshinobu Inoue 
271821b5cafSGleb Smirnoff 	if (addr->sin_addr.s_addr != INADDR_ANY &&
272821b5cafSGleb Smirnoff 	    prison_check_ip4(td->td_ucred, &addr->sin_addr) != 0)
273821b5cafSGleb Smirnoff 		return (EADDRNOTAVAIL);
274821b5cafSGleb Smirnoff 
275cf7b18f1SRobert Watson 	/*
276a7f77a39SXin LI 	 * Find address for this interface, if it exists.  If an
277a7f77a39SXin LI 	 * address was specified, find that one instead of the
278a7f77a39SXin LI 	 * first one on the interface, if possible.
279df8bae1dSRodney W. Grimes 	 */
280821b5cafSGleb Smirnoff 	IF_ADDR_RLOCK(ifp);
281821b5cafSGleb Smirnoff 	TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
2829706c950SGleb Smirnoff 		if (ifa->ifa_addr->sa_family != AF_INET)
2839706c950SGleb Smirnoff 			continue;
284821b5cafSGleb Smirnoff 		ia = (struct in_ifaddr *)ifa;
285821b5cafSGleb Smirnoff 		if (ia->ia_addr.sin_addr.s_addr == addr->sin_addr.s_addr)
286df8bae1dSRodney W. Grimes 			break;
287ca925d9cSJonathan Lemon 	}
288a7f77a39SXin LI 	if (ifa == NULL)
289a7f77a39SXin LI 		TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link)
290a7f77a39SXin LI 			if (ifa->ifa_addr->sa_family == AF_INET) {
291a7f77a39SXin LI 				ia = (struct in_ifaddr *)ifa;
292a7f77a39SXin LI 				if (prison_check_ip4(td->td_ucred,
293a7f77a39SXin LI 				    &ia->ia_addr.sin_addr) == 0)
294a7f77a39SXin LI 					break;
295a7f77a39SXin LI 			}
296f7a39160SGleb Smirnoff 
297821b5cafSGleb Smirnoff 	if (ifa == NULL) {
298821b5cafSGleb Smirnoff 		IF_ADDR_RUNLOCK(ifp);
299f7a39160SGleb Smirnoff 		return (EADDRNOTAVAIL);
300ac0aa473SBill Fenner 	}
301df8bae1dSRodney W. Grimes 
302588885f2SRobert Watson 	error = 0;
303df8bae1dSRodney W. Grimes 	switch (cmd) {
304f7a39160SGleb Smirnoff 	case SIOCGIFADDR:
305f7a39160SGleb Smirnoff 		*addr = ia->ia_addr;
306f7a39160SGleb Smirnoff 		break;
3078c0fec80SRobert Watson 
308f7a39160SGleb Smirnoff 	case SIOCGIFBRDADDR:
309f7a39160SGleb Smirnoff 		if ((ifp->if_flags & IFF_BROADCAST) == 0) {
310f7a39160SGleb Smirnoff 			error = EINVAL;
311df8bae1dSRodney W. Grimes 			break;
312df8bae1dSRodney W. Grimes 		}
313f7a39160SGleb Smirnoff 		*addr = ia->ia_broadaddr;
314f7a39160SGleb Smirnoff 		break;
315f7a39160SGleb Smirnoff 
316f7a39160SGleb Smirnoff 	case SIOCGIFDSTADDR:
317f7a39160SGleb Smirnoff 		if ((ifp->if_flags & IFF_POINTOPOINT) == 0) {
318f7a39160SGleb Smirnoff 			error = EINVAL;
319f7a39160SGleb Smirnoff 			break;
320f7a39160SGleb Smirnoff 		}
321f7a39160SGleb Smirnoff 		*addr = ia->ia_dstaddr;
322f7a39160SGleb Smirnoff 		break;
323f7a39160SGleb Smirnoff 
324f7a39160SGleb Smirnoff 	case SIOCGIFNETMASK:
325f7a39160SGleb Smirnoff 		*addr = ia->ia_sockmask;
326f7a39160SGleb Smirnoff 		break;
327f7a39160SGleb Smirnoff 	}
328f7a39160SGleb Smirnoff 
329821b5cafSGleb Smirnoff 	IF_ADDR_RUNLOCK(ifp);
330f7a39160SGleb Smirnoff 
331f7a39160SGleb Smirnoff 	return (error);
3321067217dSGarrett Wollman }
333f7a39160SGleb Smirnoff 
334f7a39160SGleb Smirnoff static int
33577b89ad8SGleb Smirnoff in_aifaddr_ioctl(u_long cmd, caddr_t data, struct ifnet *ifp, struct thread *td)
336f7a39160SGleb Smirnoff {
337f7a39160SGleb Smirnoff 	const struct in_aliasreq *ifra = (struct in_aliasreq *)data;
338f7a39160SGleb Smirnoff 	const struct sockaddr_in *addr = &ifra->ifra_addr;
339f7a39160SGleb Smirnoff 	const struct sockaddr_in *broadaddr = &ifra->ifra_broadaddr;
340f7a39160SGleb Smirnoff 	const struct sockaddr_in *mask = &ifra->ifra_mask;
341f7a39160SGleb Smirnoff 	const struct sockaddr_in *dstaddr = &ifra->ifra_dstaddr;
34277b89ad8SGleb Smirnoff 	const int vhid = (cmd == SIOCAIFADDR) ? ifra->ifra_vhid : 0;
343f7a39160SGleb Smirnoff 	struct ifaddr *ifa;
344f7a39160SGleb Smirnoff 	struct in_ifaddr *ia;
345f7a39160SGleb Smirnoff 	bool iaIsFirst;
346f7a39160SGleb Smirnoff 	int error = 0;
347f7a39160SGleb Smirnoff 
348f7a39160SGleb Smirnoff 	error = priv_check(td, PRIV_NET_ADDIFADDR);
349f7a39160SGleb Smirnoff 	if (error)
350f7a39160SGleb Smirnoff 		return (error);
351f7a39160SGleb Smirnoff 
352f7a39160SGleb Smirnoff 	/*
353f7a39160SGleb Smirnoff 	 * ifra_addr must be present and be of INET family.
354f7a39160SGleb Smirnoff 	 * ifra_broadaddr/ifra_dstaddr and ifra_mask are optional.
355f7a39160SGleb Smirnoff 	 */
356f7a39160SGleb Smirnoff 	if (addr->sin_len != sizeof(struct sockaddr_in) ||
357f7a39160SGleb Smirnoff 	    addr->sin_family != AF_INET)
358f7a39160SGleb Smirnoff 		return (EINVAL);
359f7a39160SGleb Smirnoff 	if (broadaddr->sin_len != 0 &&
360f7a39160SGleb Smirnoff 	    (broadaddr->sin_len != sizeof(struct sockaddr_in) ||
361f7a39160SGleb Smirnoff 	    broadaddr->sin_family != AF_INET))
362f7a39160SGleb Smirnoff 		return (EINVAL);
363f7a39160SGleb Smirnoff 	if (mask->sin_len != 0 &&
364f7a39160SGleb Smirnoff 	    (mask->sin_len != sizeof(struct sockaddr_in) ||
365f7a39160SGleb Smirnoff 	    mask->sin_family != AF_INET))
366f7a39160SGleb Smirnoff 		return (EINVAL);
367f7a39160SGleb Smirnoff 	if ((ifp->if_flags & IFF_POINTOPOINT) &&
368f7a39160SGleb Smirnoff 	    (dstaddr->sin_len != sizeof(struct sockaddr_in) ||
369f7a39160SGleb Smirnoff 	     dstaddr->sin_addr.s_addr == INADDR_ANY))
370f7a39160SGleb Smirnoff 		return (EDESTADDRREQ);
371f7a39160SGleb Smirnoff 	if (vhid > 0 && carp_attach_p == NULL)
372f7a39160SGleb Smirnoff 		return (EPROTONOSUPPORT);
373f7a39160SGleb Smirnoff 
374f7a39160SGleb Smirnoff 	/*
375f7a39160SGleb Smirnoff 	 * See whether address already exist.
376f7a39160SGleb Smirnoff 	 */
377f7a39160SGleb Smirnoff 	iaIsFirst = true;
378f7a39160SGleb Smirnoff 	ia = NULL;
379f7a39160SGleb Smirnoff 	IF_ADDR_RLOCK(ifp);
380f7a39160SGleb Smirnoff 	TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
3819706c950SGleb Smirnoff 		struct in_ifaddr *it;
382f7a39160SGleb Smirnoff 
3839706c950SGleb Smirnoff 		if (ifa->ifa_addr->sa_family != AF_INET)
384f7a39160SGleb Smirnoff 			continue;
385f7a39160SGleb Smirnoff 
3869706c950SGleb Smirnoff 		it = (struct in_ifaddr *)ifa;
387f7a39160SGleb Smirnoff 		iaIsFirst = false;
388f7a39160SGleb Smirnoff 		if (it->ia_addr.sin_addr.s_addr == addr->sin_addr.s_addr &&
389f7a39160SGleb Smirnoff 		    prison_check_ip4(td->td_ucred, &addr->sin_addr) == 0)
390f7a39160SGleb Smirnoff 			ia = it;
3911067217dSGarrett Wollman 	}
392f7a39160SGleb Smirnoff 	IF_ADDR_RUNLOCK(ifp);
393f7a39160SGleb Smirnoff 
394f7a39160SGleb Smirnoff 	if (ia != NULL)
395338e227aSLuiz Otavio O Souza 		(void )in_difaddr_ioctl(cmd, data, ifp, td);
396f7a39160SGleb Smirnoff 
39746758960SGleb Smirnoff 	ifa = ifa_alloc(sizeof(struct in_ifaddr), M_WAITOK);
39846758960SGleb Smirnoff 	ia = (struct in_ifaddr *)ifa;
39959562606SGarrett Wollman 	ifa->ifa_addr = (struct sockaddr *)&ia->ia_addr;
40059562606SGarrett Wollman 	ifa->ifa_dstaddr = (struct sockaddr *)&ia->ia_dstaddr;
40159562606SGarrett Wollman 	ifa->ifa_netmask = (struct sockaddr *)&ia->ia_sockmask;
4022d9db0bcSEric van Gyzen 	callout_init_rw(&ia->ia_garp_timer, &ifp->if_addr_lock,
4032d9db0bcSEric van Gyzen 	    CALLOUT_RETURNUNLOCKED);
40419fc74fbSJeffrey Hsu 
405f7a39160SGleb Smirnoff 	ia->ia_ifp = ifp;
406f7a39160SGleb Smirnoff 	ia->ia_addr = *addr;
407f7a39160SGleb Smirnoff 	if (mask->sin_len != 0) {
408f7a39160SGleb Smirnoff 		ia->ia_sockmask = *mask;
409f7a39160SGleb Smirnoff 		ia->ia_subnetmask = ntohl(ia->ia_sockmask.sin_addr.s_addr);
410f7a39160SGleb Smirnoff 	} else {
411f7a39160SGleb Smirnoff 		in_addr_t i = ntohl(addr->sin_addr.s_addr);
412f7a39160SGleb Smirnoff 
413f7a39160SGleb Smirnoff 		/*
414f7a39160SGleb Smirnoff 	 	 * Be compatible with network classes, if netmask isn't
415f7a39160SGleb Smirnoff 		 * supplied, guess it based on classes.
416f7a39160SGleb Smirnoff 	 	 */
417f7a39160SGleb Smirnoff 		if (IN_CLASSA(i))
418f7a39160SGleb Smirnoff 			ia->ia_subnetmask = IN_CLASSA_NET;
419f7a39160SGleb Smirnoff 		else if (IN_CLASSB(i))
420f7a39160SGleb Smirnoff 			ia->ia_subnetmask = IN_CLASSB_NET;
421f7a39160SGleb Smirnoff 		else
422f7a39160SGleb Smirnoff 			ia->ia_subnetmask = IN_CLASSC_NET;
423f7a39160SGleb Smirnoff 		ia->ia_sockmask.sin_addr.s_addr = htonl(ia->ia_subnetmask);
424f7a39160SGleb Smirnoff 	}
425f7a39160SGleb Smirnoff 	ia->ia_subnet = ntohl(addr->sin_addr.s_addr) & ia->ia_subnetmask;
426f7a39160SGleb Smirnoff 	in_socktrim(&ia->ia_sockmask);
427f7a39160SGleb Smirnoff 
428df8bae1dSRodney W. Grimes 	if (ifp->if_flags & IFF_BROADCAST) {
429f7a39160SGleb Smirnoff 		if (broadaddr->sin_len != 0) {
430f7a39160SGleb Smirnoff 			ia->ia_broadaddr = *broadaddr;
431f7a39160SGleb Smirnoff 		} else if (ia->ia_subnetmask == IN_RFC3021_MASK) {
432f7a39160SGleb Smirnoff 			ia->ia_broadaddr.sin_addr.s_addr = INADDR_BROADCAST;
433f7a39160SGleb Smirnoff 			ia->ia_broadaddr.sin_len = sizeof(struct sockaddr_in);
434f7a39160SGleb Smirnoff 			ia->ia_broadaddr.sin_family = AF_INET;
435f7a39160SGleb Smirnoff 		} else {
436f7a39160SGleb Smirnoff 			ia->ia_broadaddr.sin_addr.s_addr =
437f7a39160SGleb Smirnoff 			    htonl(ia->ia_subnet | ~ia->ia_subnetmask);
438f7a39160SGleb Smirnoff 			ia->ia_broadaddr.sin_len = sizeof(struct sockaddr_in);
439df8bae1dSRodney W. Grimes 			ia->ia_broadaddr.sin_family = AF_INET;
440df8bae1dSRodney W. Grimes 		}
441f7a39160SGleb Smirnoff 	}
442f7a39160SGleb Smirnoff 
443f7a39160SGleb Smirnoff 	if (ifp->if_flags & IFF_POINTOPOINT)
444f7a39160SGleb Smirnoff 		ia->ia_dstaddr = *dstaddr;
445f7a39160SGleb Smirnoff 
446f7a39160SGleb Smirnoff 	/* XXXGL: rtinit() needs this strange assignment. */
447f7a39160SGleb Smirnoff 	if (ifp->if_flags & IFF_LOOPBACK)
448f7a39160SGleb Smirnoff                 ia->ia_dstaddr = ia->ia_addr;
449f3d30eb2SGleb Smirnoff 
4505af464bbSSteven Hartland 	if (vhid != 0) {
4515af464bbSSteven Hartland 		error = (*carp_attach_p)(&ia->ia_ifa, vhid);
4525af464bbSSteven Hartland 		if (error)
4535af464bbSSteven Hartland 			return (error);
4545af464bbSSteven Hartland 	}
4555af464bbSSteven Hartland 
456a49b317cSAlexander V. Chernikov 	/* if_addrhead is already referenced by ifa_alloc() */
457137f91e8SJohn Baldwin 	IF_ADDR_WLOCK(ifp);
4588021456aSRobert Watson 	TAILQ_INSERT_TAIL(&ifp->if_addrhead, ifa, ifa_link);
459137f91e8SJohn Baldwin 	IF_ADDR_WUNLOCK(ifp);
460f7a39160SGleb Smirnoff 
4618c0fec80SRobert Watson 	ifa_ref(ifa);			/* in_ifaddrhead */
4622d9cfabaSRobert Watson 	IN_IFADDR_WLOCK();
463603724d3SBjoern A. Zeeb 	TAILQ_INSERT_TAIL(&V_in_ifaddrhead, ia, ia_link);
464f7a39160SGleb Smirnoff 	LIST_INSERT_HEAD(INADDR_HASH(ia->ia_addr.sin_addr.s_addr), ia, ia_hash);
4652d9cfabaSRobert Watson 	IN_IFADDR_WUNLOCK();
466df8bae1dSRodney W. Grimes 
467f7a39160SGleb Smirnoff 	/*
468f7a39160SGleb Smirnoff 	 * Give the interface a chance to initialize
469f7a39160SGleb Smirnoff 	 * if this is its first address,
470f7a39160SGleb Smirnoff 	 * and to validate the address if necessary.
471f7a39160SGleb Smirnoff 	 */
472d34165f7SSteven Hartland 	if (ifp->if_ioctl != NULL) {
473f7a39160SGleb Smirnoff 		error = (*ifp->if_ioctl)(ifp, SIOCSIFADDR, (caddr_t)ia);
474f7a39160SGleb Smirnoff 		if (error)
4755af464bbSSteven Hartland 			goto fail1;
476d34165f7SSteven Hartland 	}
477f7a39160SGleb Smirnoff 
478f7a39160SGleb Smirnoff 	/*
479f7a39160SGleb Smirnoff 	 * Add route for the network.
480f7a39160SGleb Smirnoff 	 */
481f7a39160SGleb Smirnoff 	if (vhid == 0) {
482f7a39160SGleb Smirnoff 		int flags = RTF_UP;
483f7a39160SGleb Smirnoff 
484f7a39160SGleb Smirnoff 		if (ifp->if_flags & (IFF_LOOPBACK|IFF_POINTOPOINT))
485f7a39160SGleb Smirnoff 			flags |= RTF_HOST;
486f7a39160SGleb Smirnoff 
487f7a39160SGleb Smirnoff 		error = in_addprefix(ia, flags);
488f7a39160SGleb Smirnoff 		if (error)
4895af464bbSSteven Hartland 			goto fail1;
490df8bae1dSRodney W. Grimes 	}
491df8bae1dSRodney W. Grimes 
492588885f2SRobert Watson 	/*
493f7a39160SGleb Smirnoff 	 * Add a loopback route to self.
494588885f2SRobert Watson 	 */
495f7a39160SGleb Smirnoff 	if (vhid == 0 && (ifp->if_flags & IFF_LOOPBACK) == 0 &&
496c1f7c3f5SGleb Smirnoff 	    ia->ia_addr.sin_addr.s_addr != INADDR_ANY &&
497c1f7c3f5SGleb Smirnoff 	    !((ifp->if_flags & IFF_POINTOPOINT) &&
498c1f7c3f5SGleb Smirnoff 	     ia->ia_dstaddr.sin_addr.s_addr == ia->ia_addr.sin_addr.s_addr)) {
499f7a39160SGleb Smirnoff 		struct in_ifaddr *eia;
500df8bae1dSRodney W. Grimes 
501f7a39160SGleb Smirnoff 		eia = in_localip_more(ia);
502f7a39160SGleb Smirnoff 
503f7a39160SGleb Smirnoff 		if (eia == NULL) {
504f7a39160SGleb Smirnoff 			error = ifa_add_loopback_route((struct ifaddr *)ia,
505f7a39160SGleb Smirnoff 			    (struct sockaddr *)&ia->ia_addr);
506f7a39160SGleb Smirnoff 			if (error)
5075af464bbSSteven Hartland 				goto fail2;
508f7a39160SGleb Smirnoff 		} else
509f7a39160SGleb Smirnoff 			ifa_free(&eia->ia_ifa);
510588885f2SRobert Watson 	}
511df8bae1dSRodney W. Grimes 
512f7a39160SGleb Smirnoff 	if (iaIsFirst && (ifp->if_flags & IFF_MULTICAST)) {
513f7a39160SGleb Smirnoff 		struct in_addr allhosts_addr;
514f7a39160SGleb Smirnoff 		struct in_ifinfo *ii;
515df8bae1dSRodney W. Grimes 
516c75aa354SBruce M Simpson 		ii = ((struct in_ifinfo *)ifp->if_afdata[AF_INET]);
517f7a39160SGleb Smirnoff 		allhosts_addr.s_addr = htonl(INADDR_ALLHOSTS_GROUP);
518df8bae1dSRodney W. Grimes 
519f7a39160SGleb Smirnoff 		error = in_joingroup(ifp, &allhosts_addr, NULL,
520f7a39160SGleb Smirnoff 			&ii->ii_allhosts);
521f7a39160SGleb Smirnoff 	}
522f7a39160SGleb Smirnoff 
523f7a39160SGleb Smirnoff 	EVENTHANDLER_INVOKE(ifaddr_event, ifp);
524f7a39160SGleb Smirnoff 
525f7a39160SGleb Smirnoff 	return (error);
526f7a39160SGleb Smirnoff 
5275af464bbSSteven Hartland fail2:
528f7a39160SGleb Smirnoff 	if (vhid == 0)
529f7a39160SGleb Smirnoff 		(void )in_scrubprefix(ia, LLE_STATIC);
530f7a39160SGleb Smirnoff 
5315af464bbSSteven Hartland fail1:
532f7a39160SGleb Smirnoff 	if (ia->ia_ifa.ifa_carp)
533338e227aSLuiz Otavio O Souza 		(*carp_detach_p)(&ia->ia_ifa, false);
534f7a39160SGleb Smirnoff 
535f7a39160SGleb Smirnoff 	IF_ADDR_WLOCK(ifp);
536f7a39160SGleb Smirnoff 	TAILQ_REMOVE(&ifp->if_addrhead, &ia->ia_ifa, ifa_link);
537f7a39160SGleb Smirnoff 	IF_ADDR_WUNLOCK(ifp);
538a49b317cSAlexander V. Chernikov 	ifa_free(&ia->ia_ifa);		/* if_addrhead */
539f7a39160SGleb Smirnoff 
540f7a39160SGleb Smirnoff 	IN_IFADDR_WLOCK();
541f7a39160SGleb Smirnoff 	TAILQ_REMOVE(&V_in_ifaddrhead, ia, ia_link);
542f7a39160SGleb Smirnoff 	LIST_REMOVE(ia, ia_hash);
543f7a39160SGleb Smirnoff 	IN_IFADDR_WUNLOCK();
544a49b317cSAlexander V. Chernikov 	ifa_free(&ia->ia_ifa);		/* in_ifaddrhead */
545f7a39160SGleb Smirnoff 
546f7a39160SGleb Smirnoff 	return (error);
547f7a39160SGleb Smirnoff }
548f7a39160SGleb Smirnoff 
549f7a39160SGleb Smirnoff static int
550338e227aSLuiz Otavio O Souza in_difaddr_ioctl(u_long cmd, caddr_t data, struct ifnet *ifp, struct thread *td)
551f7a39160SGleb Smirnoff {
552f7a39160SGleb Smirnoff 	const struct ifreq *ifr = (struct ifreq *)data;
5536224cd89SNathan Whitehorn 	const struct sockaddr_in *addr = (const struct sockaddr_in *)
5546224cd89SNathan Whitehorn 	    &ifr->ifr_addr;
555f7a39160SGleb Smirnoff 	struct ifaddr *ifa;
556f7a39160SGleb Smirnoff 	struct in_ifaddr *ia;
557f7a39160SGleb Smirnoff 	bool deleteAny, iaIsLast;
558f7a39160SGleb Smirnoff 	int error;
559f7a39160SGleb Smirnoff 
560f7a39160SGleb Smirnoff 	if (td != NULL) {
561f7a39160SGleb Smirnoff 		error = priv_check(td, PRIV_NET_DELIFADDR);
562f7a39160SGleb Smirnoff 		if (error)
563f7a39160SGleb Smirnoff 			return (error);
564f7a39160SGleb Smirnoff 	}
565f7a39160SGleb Smirnoff 
566f7a39160SGleb Smirnoff 	if (addr->sin_len != sizeof(struct sockaddr_in) ||
567f7a39160SGleb Smirnoff 	    addr->sin_family != AF_INET)
568f7a39160SGleb Smirnoff 		deleteAny = true;
569f7a39160SGleb Smirnoff 	else
570f7a39160SGleb Smirnoff 		deleteAny = false;
571f7a39160SGleb Smirnoff 
572f7a39160SGleb Smirnoff 	iaIsLast = true;
573f7a39160SGleb Smirnoff 	ia = NULL;
574f7a39160SGleb Smirnoff 	IF_ADDR_WLOCK(ifp);
575f7a39160SGleb Smirnoff 	TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
5769706c950SGleb Smirnoff 		struct in_ifaddr *it;
577f7a39160SGleb Smirnoff 
5789706c950SGleb Smirnoff 		if (ifa->ifa_addr->sa_family != AF_INET)
579f7a39160SGleb Smirnoff 			continue;
580f7a39160SGleb Smirnoff 
5819706c950SGleb Smirnoff 		it = (struct in_ifaddr *)ifa;
582f7a39160SGleb Smirnoff 		if (deleteAny && ia == NULL && (td == NULL ||
583f7a39160SGleb Smirnoff 		    prison_check_ip4(td->td_ucred, &it->ia_addr.sin_addr) == 0))
584f7a39160SGleb Smirnoff 			ia = it;
585f7a39160SGleb Smirnoff 
586f7a39160SGleb Smirnoff 		if (it->ia_addr.sin_addr.s_addr == addr->sin_addr.s_addr &&
587f7a39160SGleb Smirnoff 		    (td == NULL || prison_check_ip4(td->td_ucred,
588f7a39160SGleb Smirnoff 		    &addr->sin_addr) == 0))
589f7a39160SGleb Smirnoff 			ia = it;
590f7a39160SGleb Smirnoff 
591f7a39160SGleb Smirnoff 		if (it != ia)
592f7a39160SGleb Smirnoff 			iaIsLast = false;
593f7a39160SGleb Smirnoff 	}
594f7a39160SGleb Smirnoff 
595f7a39160SGleb Smirnoff 	if (ia == NULL) {
596f7a39160SGleb Smirnoff 		IF_ADDR_WUNLOCK(ifp);
597f7a39160SGleb Smirnoff 		return (EADDRNOTAVAIL);
598f7a39160SGleb Smirnoff 	}
599f7a39160SGleb Smirnoff 
600f7a39160SGleb Smirnoff 	TAILQ_REMOVE(&ifp->if_addrhead, &ia->ia_ifa, ifa_link);
601f7a39160SGleb Smirnoff 	IF_ADDR_WUNLOCK(ifp);
602f7a39160SGleb Smirnoff 	ifa_free(&ia->ia_ifa);		/* if_addrhead */
603f7a39160SGleb Smirnoff 
604f7a39160SGleb Smirnoff 	IN_IFADDR_WLOCK();
605f7a39160SGleb Smirnoff 	TAILQ_REMOVE(&V_in_ifaddrhead, ia, ia_link);
606f7a39160SGleb Smirnoff 	LIST_REMOVE(ia, ia_hash);
607f7a39160SGleb Smirnoff 	IN_IFADDR_WUNLOCK();
608f7a39160SGleb Smirnoff 
609089cdfadSRuslan Ermilov 	/*
610237bf7f7SGleb Smirnoff 	 * in_scrubprefix() kills the interface route.
611089cdfadSRuslan Ermilov 	 */
612237bf7f7SGleb Smirnoff 	in_scrubprefix(ia, LLE_STATIC);
613588885f2SRobert Watson 
614c655b7c4SDavid Greenman 	/*
615089cdfadSRuslan Ermilov 	 * in_ifadown gets rid of all the rest of
616089cdfadSRuslan Ermilov 	 * the routes.  This is not quite the right
617089cdfadSRuslan Ermilov 	 * thing to do, but at least if we are running
618089cdfadSRuslan Ermilov 	 * a routing process they will come back.
619089cdfadSRuslan Ermilov 	 */
62091854268SRuslan Ermilov 	in_ifadown(&ia->ia_ifa, 1);
6210f02fdacSBrian Somers 
62208b68b0eSGleb Smirnoff 	if (ia->ia_ifa.ifa_carp)
623338e227aSLuiz Otavio O Souza 		(*carp_detach_p)(&ia->ia_ifa,
624338e227aSLuiz Otavio O Souza 		    (cmd == SIOCDIFADDR) ? false : true);
62508b68b0eSGleb Smirnoff 
626f7e083afSBruce M Simpson 	/*
627f7e083afSBruce M Simpson 	 * If this is the last IPv4 address configured on this
628f7e083afSBruce M Simpson 	 * interface, leave the all-hosts group.
629d10910e6SBruce M Simpson 	 * No state-change report need be transmitted.
630f7e083afSBruce M Simpson 	 */
631f7a39160SGleb Smirnoff 	if (iaIsLast && (ifp->if_flags & IFF_MULTICAST)) {
632f7a39160SGleb Smirnoff 		struct in_ifinfo *ii;
633f7a39160SGleb Smirnoff 
634c75aa354SBruce M Simpson 		ii = ((struct in_ifinfo *)ifp->if_afdata[AF_INET]);
635f7e083afSBruce M Simpson 		IN_MULTI_LOCK();
636d10910e6SBruce M Simpson 		if (ii->ii_allhosts) {
6376d00fd9cSGleb Smirnoff 			(void)in_leavegroup_locked(ii->ii_allhosts, NULL);
638d10910e6SBruce M Simpson 			ii->ii_allhosts = NULL;
639d10910e6SBruce M Simpson 		}
640f7e083afSBruce M Simpson 		IN_MULTI_UNLOCK();
641f7a39160SGleb Smirnoff 	}
6426d00fd9cSGleb Smirnoff 
6432d9db0bcSEric van Gyzen 	IF_ADDR_WLOCK(ifp);
6442d9db0bcSEric van Gyzen 	if (callout_stop(&ia->ia_garp_timer) == 1) {
6452d9db0bcSEric van Gyzen 		ifa_free(&ia->ia_ifa);
6462d9db0bcSEric van Gyzen 	}
6472d9db0bcSEric van Gyzen 	IF_ADDR_WUNLOCK(ifp);
6482d9db0bcSEric van Gyzen 
649f7a39160SGleb Smirnoff 	EVENTHANDLER_INVOKE(ifaddr_event, ifp);
650a49b317cSAlexander V. Chernikov 	ifa_free(&ia->ia_ifa);		/* in_ifaddrhead */
651f7a39160SGleb Smirnoff 
652f7a39160SGleb Smirnoff 	return (0);
653df8bae1dSRodney W. Grimes }
654df8bae1dSRodney W. Grimes 
65548321abeSMax Laier #define rtinitflags(x) \
65648321abeSMax Laier 	((((x)->ia_ifp->if_flags & (IFF_LOOPBACK | IFF_POINTOPOINT)) != 0) \
65748321abeSMax Laier 	    ? RTF_HOST : 0)
658ccbb9c35SQing Li 
659ccbb9c35SQing Li /*
660fbdd20a1SMatt Jacob  * Check if we have a route for the given prefix already or add one accordingly.
66148321abeSMax Laier  */
66208b68b0eSGleb Smirnoff int
663f2565d68SRobert Watson in_addprefix(struct in_ifaddr *target, int flags)
66448321abeSMax Laier {
665cc0a3c8cSAndrey V. Elsukov 	struct rm_priotracker in_ifa_tracker;
66648321abeSMax Laier 	struct in_ifaddr *ia;
667bfb26eecSGleb Smirnoff 	struct in_addr prefix, mask, p, m;
6680cfee0c2SAlan Somers 	int error;
66948321abeSMax Laier 
670fbdd20a1SMatt Jacob 	if ((flags & RTF_HOST) != 0) {
67148321abeSMax Laier 		prefix = target->ia_dstaddr.sin_addr;
672fbdd20a1SMatt Jacob 		mask.s_addr = 0;
673fbdd20a1SMatt Jacob 	} else {
67448321abeSMax Laier 		prefix = target->ia_addr.sin_addr;
67548321abeSMax Laier 		mask = target->ia_sockmask.sin_addr;
67648321abeSMax Laier 		prefix.s_addr &= mask.s_addr;
67748321abeSMax Laier 	}
67848321abeSMax Laier 
679cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RLOCK(&in_ifa_tracker);
6800cfee0c2SAlan Somers 	/* Look for an existing address with the same prefix, mask, and fib */
681603724d3SBjoern A. Zeeb 	TAILQ_FOREACH(ia, &V_in_ifaddrhead, ia_link) {
682bfb26eecSGleb Smirnoff 		if (rtinitflags(ia)) {
68372366606SKevin Lo 			p = ia->ia_dstaddr.sin_addr;
68448321abeSMax Laier 
68548321abeSMax Laier 			if (prefix.s_addr != p.s_addr)
68648321abeSMax Laier 				continue;
687bfb26eecSGleb Smirnoff 		} else {
688bfb26eecSGleb Smirnoff 			p = ia->ia_addr.sin_addr;
689bfb26eecSGleb Smirnoff 			m = ia->ia_sockmask.sin_addr;
690bfb26eecSGleb Smirnoff 			p.s_addr &= m.s_addr;
691bfb26eecSGleb Smirnoff 
692bfb26eecSGleb Smirnoff 			if (prefix.s_addr != p.s_addr ||
693bfb26eecSGleb Smirnoff 			    mask.s_addr != m.s_addr)
694bfb26eecSGleb Smirnoff 				continue;
695bfb26eecSGleb Smirnoff 		}
6960cfee0c2SAlan Somers 		if (target->ia_ifp->if_fib != ia->ia_ifp->if_fib)
6970cfee0c2SAlan Somers 			continue;
69848321abeSMax Laier 
69948321abeSMax Laier 		/*
70048321abeSMax Laier 		 * If we got a matching prefix route inserted by other
70148321abeSMax Laier 		 * interface address, we are done here.
70248321abeSMax Laier 		 */
7031ae95409SGleb Smirnoff 		if (ia->ia_flags & IFA_ROUTE) {
704c7ea0aa6SQing Li #ifdef RADIX_MPATH
705c7ea0aa6SQing Li 			if (ia->ia_addr.sin_addr.s_addr ==
70642db1b87SBjoern A. Zeeb 			    target->ia_addr.sin_addr.s_addr) {
707cc0a3c8cSAndrey V. Elsukov 				IN_IFADDR_RUNLOCK(&in_ifa_tracker);
708c7ea0aa6SQing Li 				return (EEXIST);
70942db1b87SBjoern A. Zeeb 			} else
710c7ea0aa6SQing Li 				break;
711c7ea0aa6SQing Li #endif
71208b68b0eSGleb Smirnoff 			if (V_nosameprefix) {
713cc0a3c8cSAndrey V. Elsukov 				IN_IFADDR_RUNLOCK(&in_ifa_tracker);
7141ae95409SGleb Smirnoff 				return (EEXIST);
7152d9cfabaSRobert Watson 			} else {
7160cfee0c2SAlan Somers 				int fibnum;
7170cfee0c2SAlan Somers 
718cc45ae40SHiroki Sato 				fibnum = V_rt_add_addr_allfibs ? RT_ALL_FIBS :
7190cfee0c2SAlan Somers 					target->ia_ifp->if_fib;
720d375edc9SAlexander V. Chernikov 				rt_addrmsg(RTM_ADD, &target->ia_ifa, fibnum);
721cc0a3c8cSAndrey V. Elsukov 				IN_IFADDR_RUNLOCK(&in_ifa_tracker);
7221ae95409SGleb Smirnoff 				return (0);
7231ae95409SGleb Smirnoff 			}
72448321abeSMax Laier 		}
7252d9cfabaSRobert Watson 	}
726cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RUNLOCK(&in_ifa_tracker);
72748321abeSMax Laier 
72848321abeSMax Laier 	/*
72948321abeSMax Laier 	 * No-one seem to have this prefix route, so we try to insert it.
73048321abeSMax Laier 	 */
73148321abeSMax Laier 	error = rtinit(&target->ia_ifa, (int)RTM_ADD, flags);
73248321abeSMax Laier 	if (!error)
73348321abeSMax Laier 		target->ia_flags |= IFA_ROUTE;
734460473a0SBjoern A. Zeeb 	return (error);
73548321abeSMax Laier }
73648321abeSMax Laier 
73748321abeSMax Laier /*
7383e7a2321SAlexander V. Chernikov  * Removes either all lle entries for given @ia, or lle
7393e7a2321SAlexander V. Chernikov  * corresponding to @ia address.
7403e7a2321SAlexander V. Chernikov  */
7413e7a2321SAlexander V. Chernikov static void
7423e7a2321SAlexander V. Chernikov in_scrubprefixlle(struct in_ifaddr *ia, int all, u_int flags)
7433e7a2321SAlexander V. Chernikov {
7443e7a2321SAlexander V. Chernikov 	struct sockaddr_in addr, mask;
7453e7a2321SAlexander V. Chernikov 	struct sockaddr *saddr, *smask;
7463e7a2321SAlexander V. Chernikov 	struct ifnet *ifp;
7473e7a2321SAlexander V. Chernikov 
7483e7a2321SAlexander V. Chernikov 	saddr = (struct sockaddr *)&addr;
7493e7a2321SAlexander V. Chernikov 	bzero(&addr, sizeof(addr));
7503e7a2321SAlexander V. Chernikov 	addr.sin_len = sizeof(addr);
7513e7a2321SAlexander V. Chernikov 	addr.sin_family = AF_INET;
7523e7a2321SAlexander V. Chernikov 	smask = (struct sockaddr *)&mask;
7533e7a2321SAlexander V. Chernikov 	bzero(&mask, sizeof(mask));
7543e7a2321SAlexander V. Chernikov 	mask.sin_len = sizeof(mask);
7553e7a2321SAlexander V. Chernikov 	mask.sin_family = AF_INET;
7563e7a2321SAlexander V. Chernikov 	mask.sin_addr.s_addr = ia->ia_subnetmask;
7573e7a2321SAlexander V. Chernikov 	ifp = ia->ia_ifp;
7583e7a2321SAlexander V. Chernikov 
75926a60575SAlexander V. Chernikov 	if (all) {
76026a60575SAlexander V. Chernikov 
76126a60575SAlexander V. Chernikov 		/*
76226a60575SAlexander V. Chernikov 		 * Remove all L2 entries matching given prefix.
76326a60575SAlexander V. Chernikov 		 * Convert address to host representation to avoid
76426a60575SAlexander V. Chernikov 		 * doing this on every callback. ia_subnetmask is already
76526a60575SAlexander V. Chernikov 		 * stored in host representation.
76626a60575SAlexander V. Chernikov 		 */
76726a60575SAlexander V. Chernikov 		addr.sin_addr.s_addr = ntohl(ia->ia_addr.sin_addr.s_addr);
7683e7a2321SAlexander V. Chernikov 		lltable_prefix_free(AF_INET, saddr, smask, flags);
76926a60575SAlexander V. Chernikov 	} else {
77026a60575SAlexander V. Chernikov 		/* Remove interface address only */
77126a60575SAlexander V. Chernikov 		addr.sin_addr.s_addr = ia->ia_addr.sin_addr.s_addr;
7723e7a2321SAlexander V. Chernikov 		lltable_delete_addr(LLTABLE(ifp), LLE_IFADDR, saddr);
7733e7a2321SAlexander V. Chernikov 	}
77426a60575SAlexander V. Chernikov }
7753e7a2321SAlexander V. Chernikov 
7763e7a2321SAlexander V. Chernikov /*
77748321abeSMax Laier  * If there is no other address in the system that can serve a route to the
77848321abeSMax Laier  * same prefix, remove the route.  Hand over the route to the new address
77948321abeSMax Laier  * otherwise.
78048321abeSMax Laier  */
78108b68b0eSGleb Smirnoff int
7825b84dc78SQing Li in_scrubprefix(struct in_ifaddr *target, u_int flags)
78348321abeSMax Laier {
784cc0a3c8cSAndrey V. Elsukov 	struct rm_priotracker in_ifa_tracker;
78548321abeSMax Laier 	struct in_ifaddr *ia;
78655174c34SGleb Smirnoff 	struct in_addr prefix, mask, p, m;
7877278b62aSAlan Somers 	int error = 0;
78848321abeSMax Laier 
789df813b7eSQing Li 	/*
790df813b7eSQing Li 	 * Remove the loopback route to the interface address.
791df813b7eSQing Li 	 */
79292fac994SQing Li 	if ((target->ia_addr.sin_addr.s_addr != INADDR_ANY) &&
793c7ab6602SQing Li 	    !(target->ia_ifp->if_flags & IFF_LOOPBACK) &&
794f7a39160SGleb Smirnoff 	    (flags & LLE_STATIC)) {
795f7a39160SGleb Smirnoff 		struct in_ifaddr *eia;
796c7ab6602SQing Li 
79759c180c3SAlexander V. Chernikov 		/*
79859c180c3SAlexander V. Chernikov 		 * XXXME: add fib-aware in_localip.
79959c180c3SAlexander V. Chernikov 		 * We definitely don't want to switch between
80059c180c3SAlexander V. Chernikov 		 * prefixes in different fibs.
80159c180c3SAlexander V. Chernikov 		 */
802f7a39160SGleb Smirnoff 		eia = in_localip_more(target);
803f7a39160SGleb Smirnoff 
804f7a39160SGleb Smirnoff 		if (eia != NULL) {
805f7a39160SGleb Smirnoff 			error = ifa_switch_loopback_route((struct ifaddr *)eia,
80659c180c3SAlexander V. Chernikov 			    (struct sockaddr *)&target->ia_addr);
807f7a39160SGleb Smirnoff 			ifa_free(&eia->ia_ifa);
808f7a39160SGleb Smirnoff 		} else {
8099bb7d0f4SQing Li 			error = ifa_del_loopback_route((struct ifaddr *)target,
8109bb7d0f4SQing Li 			    (struct sockaddr *)&target->ia_addr);
8115b84dc78SQing Li 		}
812ebc90701SQing Li 	}
813ebc90701SQing Li 
81455174c34SGleb Smirnoff 	if (rtinitflags(target)) {
81548321abeSMax Laier 		prefix = target->ia_dstaddr.sin_addr;
81655174c34SGleb Smirnoff 		mask.s_addr = 0;
81755174c34SGleb Smirnoff 	} else {
81848321abeSMax Laier 		prefix = target->ia_addr.sin_addr;
81948321abeSMax Laier 		mask = target->ia_sockmask.sin_addr;
82048321abeSMax Laier 		prefix.s_addr &= mask.s_addr;
82148321abeSMax Laier 	}
82248321abeSMax Laier 
823ccbb9c35SQing Li 	if ((target->ia_flags & IFA_ROUTE) == 0) {
8247278b62aSAlan Somers 		int fibnum;
8257278b62aSAlan Somers 
826cc45ae40SHiroki Sato 		fibnum = V_rt_add_addr_allfibs ? RT_ALL_FIBS :
8277278b62aSAlan Somers 			target->ia_ifp->if_fib;
828d375edc9SAlexander V. Chernikov 		rt_addrmsg(RTM_DELETE, &target->ia_ifa, fibnum);
82926a60575SAlexander V. Chernikov 
83026a60575SAlexander V. Chernikov 		/*
83126a60575SAlexander V. Chernikov 		 * Removing address from !IFF_UP interface or
83226a60575SAlexander V. Chernikov 		 * prefix which exists on other interface (along with route).
83326a60575SAlexander V. Chernikov 		 * No entries should exist here except target addr.
83426a60575SAlexander V. Chernikov 		 * Given that, delete this entry only.
83526a60575SAlexander V. Chernikov 		 */
83626a60575SAlexander V. Chernikov 		in_scrubprefixlle(target, 0, flags);
837ccbb9c35SQing Li 		return (0);
838ccbb9c35SQing Li 	}
839ccbb9c35SQing Li 
840cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RLOCK(&in_ifa_tracker);
841603724d3SBjoern A. Zeeb 	TAILQ_FOREACH(ia, &V_in_ifaddrhead, ia_link) {
84255174c34SGleb Smirnoff 		if (rtinitflags(ia)) {
84348321abeSMax Laier 			p = ia->ia_dstaddr.sin_addr;
84455174c34SGleb Smirnoff 
84555174c34SGleb Smirnoff 			if (prefix.s_addr != p.s_addr)
84655174c34SGleb Smirnoff 				continue;
84755174c34SGleb Smirnoff 		} else {
84848321abeSMax Laier 			p = ia->ia_addr.sin_addr;
84955174c34SGleb Smirnoff 			m = ia->ia_sockmask.sin_addr;
85055174c34SGleb Smirnoff 			p.s_addr &= m.s_addr;
85155174c34SGleb Smirnoff 
85255174c34SGleb Smirnoff 			if (prefix.s_addr != p.s_addr ||
85355174c34SGleb Smirnoff 			    mask.s_addr != m.s_addr)
85455174c34SGleb Smirnoff 				continue;
85548321abeSMax Laier 		}
85648321abeSMax Laier 
85755174c34SGleb Smirnoff 		if ((ia->ia_ifp->if_flags & IFF_UP) == 0)
85848321abeSMax Laier 			continue;
85948321abeSMax Laier 
86048321abeSMax Laier 		/*
86148321abeSMax Laier 		 * If we got a matching prefix address, move IFA_ROUTE and
86248321abeSMax Laier 		 * the route itself to it.  Make sure that routing daemons
86348321abeSMax Laier 		 * get a heads-up.
86448321abeSMax Laier 		 */
86508b68b0eSGleb Smirnoff 		if ((ia->ia_flags & IFA_ROUTE) == 0) {
86679d51435SSergey Kandaurov 			ifa_ref(&ia->ia_ifa);
867cc0a3c8cSAndrey V. Elsukov 			IN_IFADDR_RUNLOCK(&in_ifa_tracker);
86892322284SQing Li 			error = rtinit(&(target->ia_ifa), (int)RTM_DELETE,
86948321abeSMax Laier 			    rtinitflags(target));
87092322284SQing Li 			if (error == 0)
87148321abeSMax Laier 				target->ia_flags &= ~IFA_ROUTE;
87292322284SQing Li 			else
87392322284SQing Li 				log(LOG_INFO, "in_scrubprefix: err=%d, old prefix delete failed\n",
87492322284SQing Li 					error);
8753e7a2321SAlexander V. Chernikov 			/* Scrub all entries IFF interface is different */
8763e7a2321SAlexander V. Chernikov 			in_scrubprefixlle(target, target->ia_ifp != ia->ia_ifp,
8773e7a2321SAlexander V. Chernikov 			    flags);
87848321abeSMax Laier 			error = rtinit(&ia->ia_ifa, (int)RTM_ADD,
87948321abeSMax Laier 			    rtinitflags(ia) | RTF_UP);
88048321abeSMax Laier 			if (error == 0)
88148321abeSMax Laier 				ia->ia_flags |= IFA_ROUTE;
88292322284SQing Li 			else
88392322284SQing Li 				log(LOG_INFO, "in_scrubprefix: err=%d, new prefix add failed\n",
88492322284SQing Li 					error);
88579d51435SSergey Kandaurov 			ifa_free(&ia->ia_ifa);
886460473a0SBjoern A. Zeeb 			return (error);
88748321abeSMax Laier 		}
88848321abeSMax Laier 	}
889cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RUNLOCK(&in_ifa_tracker);
89048321abeSMax Laier 
89148321abeSMax Laier 	/*
892c9d763bfSQing Li 	 * remove all L2 entries on the given prefix
893c9d763bfSQing Li 	 */
8943e7a2321SAlexander V. Chernikov 	in_scrubprefixlle(target, 1, flags);
895c9d763bfSQing Li 
896c9d763bfSQing Li 	/*
89748321abeSMax Laier 	 * As no-one seem to have this prefix, we can remove the route.
89848321abeSMax Laier 	 */
89992322284SQing Li 	error = rtinit(&(target->ia_ifa), (int)RTM_DELETE, rtinitflags(target));
90092322284SQing Li 	if (error == 0)
90148321abeSMax Laier 		target->ia_flags &= ~IFA_ROUTE;
90292322284SQing Li 	else
90392322284SQing Li 		log(LOG_INFO, "in_scrubprefix: err=%d, prefix delete failed\n", error);
90492322284SQing Li 	return (error);
90548321abeSMax Laier }
90648321abeSMax Laier 
90748321abeSMax Laier #undef rtinitflags
908df8bae1dSRodney W. Grimes 
90989856f7eSBjoern A. Zeeb void
91089856f7eSBjoern A. Zeeb in_ifscrub_all(void)
91189856f7eSBjoern A. Zeeb {
91289856f7eSBjoern A. Zeeb 	struct ifnet *ifp;
91389856f7eSBjoern A. Zeeb 	struct ifaddr *ifa, *nifa;
91489856f7eSBjoern A. Zeeb 	struct ifaliasreq ifr;
91589856f7eSBjoern A. Zeeb 
91689856f7eSBjoern A. Zeeb 	IFNET_RLOCK();
91789856f7eSBjoern A. Zeeb 	TAILQ_FOREACH(ifp, &V_ifnet, if_link) {
91889856f7eSBjoern A. Zeeb 		/* Cannot lock here - lock recursion. */
91989856f7eSBjoern A. Zeeb 		/* IF_ADDR_RLOCK(ifp); */
92089856f7eSBjoern A. Zeeb 		TAILQ_FOREACH_SAFE(ifa, &ifp->if_addrhead, ifa_link, nifa) {
92189856f7eSBjoern A. Zeeb 			if (ifa->ifa_addr->sa_family != AF_INET)
92289856f7eSBjoern A. Zeeb 				continue;
92389856f7eSBjoern A. Zeeb 
92489856f7eSBjoern A. Zeeb 			/*
92589856f7eSBjoern A. Zeeb 			 * This is ugly but the only way for legacy IP to
92689856f7eSBjoern A. Zeeb 			 * cleanly remove addresses and everything attached.
92789856f7eSBjoern A. Zeeb 			 */
92889856f7eSBjoern A. Zeeb 			bzero(&ifr, sizeof(ifr));
92989856f7eSBjoern A. Zeeb 			ifr.ifra_addr = *ifa->ifa_addr;
93089856f7eSBjoern A. Zeeb 			if (ifa->ifa_dstaddr)
93189856f7eSBjoern A. Zeeb 			ifr.ifra_broadaddr = *ifa->ifa_dstaddr;
93289856f7eSBjoern A. Zeeb 			(void)in_control(NULL, SIOCDIFADDR, (caddr_t)&ifr,
93389856f7eSBjoern A. Zeeb 			    ifp, NULL);
93489856f7eSBjoern A. Zeeb 		}
93589856f7eSBjoern A. Zeeb 		/* IF_ADDR_RUNLOCK(ifp); */
93689856f7eSBjoern A. Zeeb 		in_purgemaddrs(ifp);
93789856f7eSBjoern A. Zeeb 		igmp_domifdetach(ifp);
93889856f7eSBjoern A. Zeeb 	}
93989856f7eSBjoern A. Zeeb 	IFNET_RUNLOCK();
94089856f7eSBjoern A. Zeeb }
94189856f7eSBjoern A. Zeeb 
94290cc51a1SRyan Stone int
94390cc51a1SRyan Stone in_ifaddr_broadcast(struct in_addr in, struct in_ifaddr *ia)
94490cc51a1SRyan Stone {
94590cc51a1SRyan Stone 
94690cc51a1SRyan Stone 	return ((in.s_addr == ia->ia_broadaddr.sin_addr.s_addr ||
94790cc51a1SRyan Stone 	     /*
94890cc51a1SRyan Stone 	      * Check for old-style (host 0) broadcast, but
94990cc51a1SRyan Stone 	      * taking into account that RFC 3021 obsoletes it.
95090cc51a1SRyan Stone 	      */
95190cc51a1SRyan Stone 	    (ia->ia_subnetmask != IN_RFC3021_MASK &&
95290cc51a1SRyan Stone 	    ntohl(in.s_addr) == ia->ia_subnet)) &&
95390cc51a1SRyan Stone 	     /*
95490cc51a1SRyan Stone 	      * Check for an all one subnetmask. These
95590cc51a1SRyan Stone 	      * only exist when an interface gets a secondary
95690cc51a1SRyan Stone 	      * address.
95790cc51a1SRyan Stone 	      */
95890cc51a1SRyan Stone 	    ia->ia_subnetmask != (u_long)0xffffffff);
95990cc51a1SRyan Stone }
96090cc51a1SRyan Stone 
961df8bae1dSRodney W. Grimes /*
962df8bae1dSRodney W. Grimes  * Return 1 if the address might be a local broadcast address.
963df8bae1dSRodney W. Grimes  */
96426f9a767SRodney W. Grimes int
965f2565d68SRobert Watson in_broadcast(struct in_addr in, struct ifnet *ifp)
966df8bae1dSRodney W. Grimes {
9673e85b721SEd Maste 	struct ifaddr *ifa;
96811f2a7cdSRyan Stone 	int found;
969df8bae1dSRodney W. Grimes 
970df8bae1dSRodney W. Grimes 	if (in.s_addr == INADDR_BROADCAST ||
971df8bae1dSRodney W. Grimes 	    in.s_addr == INADDR_ANY)
972460473a0SBjoern A. Zeeb 		return (1);
973df8bae1dSRodney W. Grimes 	if ((ifp->if_flags & IFF_BROADCAST) == 0)
974460473a0SBjoern A. Zeeb 		return (0);
97511f2a7cdSRyan Stone 	found = 0;
976df8bae1dSRodney W. Grimes 	/*
977df8bae1dSRodney W. Grimes 	 * Look through the list of addresses for a match
978df8bae1dSRodney W. Grimes 	 * with a broadcast address.
979df8bae1dSRodney W. Grimes 	 */
98011f2a7cdSRyan Stone 	IF_ADDR_RLOCK(ifp);
981462b86feSPoul-Henning Kamp 	TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link)
982df8bae1dSRodney W. Grimes 		if (ifa->ifa_addr->sa_family == AF_INET &&
98311f2a7cdSRyan Stone 		    in_ifaddr_broadcast(in, (struct in_ifaddr *)ifa)) {
98411f2a7cdSRyan Stone 			found = 1;
98511f2a7cdSRyan Stone 			break;
98611f2a7cdSRyan Stone 		}
98711f2a7cdSRyan Stone 	IF_ADDR_RUNLOCK(ifp);
98811f2a7cdSRyan Stone 	return (found);
989df8bae1dSRodney W. Grimes }
990ec002feeSBruce M Simpson 
991df8bae1dSRodney W. Grimes /*
992b1c53bc9SRobert Watson  * On interface removal, clean up IPv4 data structures hung off of the ifnet.
993b1c53bc9SRobert Watson  */
994b1c53bc9SRobert Watson void
995f2565d68SRobert Watson in_ifdetach(struct ifnet *ifp)
996b1c53bc9SRobert Watson {
997b1c53bc9SRobert Watson 
998603724d3SBjoern A. Zeeb 	in_pcbpurgeif0(&V_ripcbinfo, ifp);
999603724d3SBjoern A. Zeeb 	in_pcbpurgeif0(&V_udbinfo, ifp);
1000e06e816fSKevin Lo 	in_pcbpurgeif0(&V_ulitecbinfo, ifp);
1001ec002feeSBruce M Simpson 	in_purgemaddrs(ifp);
1002b1c53bc9SRobert Watson }
10036e6b3f7cSQing Li 
1004d10910e6SBruce M Simpson /*
1005d10910e6SBruce M Simpson  * Delete all IPv4 multicast address records, and associated link-layer
1006d10910e6SBruce M Simpson  * multicast address records, associated with ifp.
1007d10910e6SBruce M Simpson  * XXX It looks like domifdetach runs AFTER the link layer cleanup.
100856663a40SBruce M Simpson  * XXX This should not race with ifma_protospec being set during
100956663a40SBruce M Simpson  * a new allocation, if it does, we have bigger problems.
1010d10910e6SBruce M Simpson  */
1011d10910e6SBruce M Simpson static void
1012d10910e6SBruce M Simpson in_purgemaddrs(struct ifnet *ifp)
1013d10910e6SBruce M Simpson {
1014d10910e6SBruce M Simpson 	LIST_HEAD(,in_multi) purgeinms;
1015d10910e6SBruce M Simpson 	struct in_multi		*inm, *tinm;
1016d10910e6SBruce M Simpson 	struct ifmultiaddr	*ifma;
1017d10910e6SBruce M Simpson 
1018d10910e6SBruce M Simpson 	LIST_INIT(&purgeinms);
1019d10910e6SBruce M Simpson 	IN_MULTI_LOCK();
1020d10910e6SBruce M Simpson 
1021d10910e6SBruce M Simpson 	/*
1022d10910e6SBruce M Simpson 	 * Extract list of in_multi associated with the detaching ifp
1023d10910e6SBruce M Simpson 	 * which the PF_INET layer is about to release.
1024d10910e6SBruce M Simpson 	 * We need to do this as IF_ADDR_LOCK() may be re-acquired
1025d10910e6SBruce M Simpson 	 * by code further down.
1026d10910e6SBruce M Simpson 	 */
1027137f91e8SJohn Baldwin 	IF_ADDR_RLOCK(ifp);
1028d10910e6SBruce M Simpson 	TAILQ_FOREACH(ifma, &ifp->if_multiaddrs, ifma_link) {
102956663a40SBruce M Simpson 		if (ifma->ifma_addr->sa_family != AF_INET ||
103056663a40SBruce M Simpson 		    ifma->ifma_protospec == NULL)
1031d10910e6SBruce M Simpson 			continue;
103256663a40SBruce M Simpson #if 0
103356663a40SBruce M Simpson 		KASSERT(ifma->ifma_protospec != NULL,
103456663a40SBruce M Simpson 		    ("%s: ifma_protospec is NULL", __func__));
103556663a40SBruce M Simpson #endif
1036d10910e6SBruce M Simpson 		inm = (struct in_multi *)ifma->ifma_protospec;
1037d10910e6SBruce M Simpson 		LIST_INSERT_HEAD(&purgeinms, inm, inm_link);
1038d10910e6SBruce M Simpson 	}
1039137f91e8SJohn Baldwin 	IF_ADDR_RUNLOCK(ifp);
1040d10910e6SBruce M Simpson 
1041d10910e6SBruce M Simpson 	LIST_FOREACH_SAFE(inm, &purgeinms, inm_link, tinm) {
1042d10910e6SBruce M Simpson 		LIST_REMOVE(inm, inm_link);
104307cde5e9SRobert Watson 		inm_release_locked(inm);
1044d10910e6SBruce M Simpson 	}
1045d10910e6SBruce M Simpson 	igmp_ifdetach(ifp);
1046d10910e6SBruce M Simpson 
1047d10910e6SBruce M Simpson 	IN_MULTI_UNLOCK();
1048d10910e6SBruce M Simpson }
1049d10910e6SBruce M Simpson 
10506e6b3f7cSQing Li struct in_llentry {
10516e6b3f7cSQing Li 	struct llentry		base;
10526e6b3f7cSQing Li };
10536e6b3f7cSQing Li 
105411cdad98SAlexander V. Chernikov #define	IN_LLTBL_DEFAULT_HSIZE	32
105511cdad98SAlexander V. Chernikov #define	IN_LLTBL_HASH(k, h) \
105611cdad98SAlexander V. Chernikov 	(((((((k >> 8) ^ k) >> 8) ^ k) >> 8) ^ k) & ((h) - 1))
105711cdad98SAlexander V. Chernikov 
1058a93cda78SKip Macy /*
105911cdad98SAlexander V. Chernikov  * Do actual deallocation of @lle.
10602769d062SConrad Meyer  */
10612769d062SConrad Meyer static void
10622769d062SConrad Meyer in_lltable_destroy_lle_unlocked(struct llentry *lle)
10632769d062SConrad Meyer {
10642769d062SConrad Meyer 
10652769d062SConrad Meyer 	LLE_LOCK_DESTROY(lle);
10662769d062SConrad Meyer 	LLE_REQ_DESTROY(lle);
10672769d062SConrad Meyer 	free(lle, M_LLTABLE);
10682769d062SConrad Meyer }
10692769d062SConrad Meyer 
10702769d062SConrad Meyer /*
107111cdad98SAlexander V. Chernikov  * Called by LLE_FREE_LOCKED when number of references
107211cdad98SAlexander V. Chernikov  * drops to zero.
1073a93cda78SKip Macy  */
1074a93cda78SKip Macy static void
107511cdad98SAlexander V. Chernikov in_lltable_destroy_lle(struct llentry *lle)
1076a93cda78SKip Macy {
107711cdad98SAlexander V. Chernikov 
1078a93cda78SKip Macy 	LLE_WUNLOCK(lle);
10792769d062SConrad Meyer 	in_lltable_destroy_lle_unlocked(lle);
1080a93cda78SKip Macy }
1081a93cda78SKip Macy 
10826e6b3f7cSQing Li static struct llentry *
1083314294deSAlexander V. Chernikov in_lltable_new(struct in_addr addr4, u_int flags)
10846e6b3f7cSQing Li {
10856e6b3f7cSQing Li 	struct in_llentry *lle;
10866e6b3f7cSQing Li 
108790b357f6SGleb Smirnoff 	lle = malloc(sizeof(struct in_llentry), M_LLTABLE, M_NOWAIT | M_ZERO);
10886e6b3f7cSQing Li 	if (lle == NULL)		/* NB: caller generates msg */
10896e6b3f7cSQing Li 		return NULL;
10906e6b3f7cSQing Li 
10916e6b3f7cSQing Li 	/*
10926e6b3f7cSQing Li 	 * For IPv4 this will trigger "arpresolve" to generate
10936e6b3f7cSQing Li 	 * an ARP request.
10946e6b3f7cSQing Li 	 */
1095a98c06f1SGleb Smirnoff 	lle->base.la_expire = time_uptime; /* mark expired */
1096314294deSAlexander V. Chernikov 	lle->base.r_l3addr.addr4 = addr4;
10976e6b3f7cSQing Li 	lle->base.lle_refcnt = 1;
109811cdad98SAlexander V. Chernikov 	lle->base.lle_free = in_lltable_destroy_lle;
10996e6b3f7cSQing Li 	LLE_LOCK_INIT(&lle->base);
1100f8aee88fSAlexander V. Chernikov 	LLE_REQ_INIT(&lle->base);
11010447c136SAlexander V. Chernikov 	callout_init(&lle->base.lle_timer, 1);
1102ea537929SGleb Smirnoff 
1103ea537929SGleb Smirnoff 	return (&lle->base);
11046e6b3f7cSQing Li }
11056e6b3f7cSQing Li 
1106c9d763bfSQing Li #define IN_ARE_MASKED_ADDR_EQUAL(d, a, m)	(		\
11073e7a2321SAlexander V. Chernikov 	((((d).s_addr ^ (a).s_addr) & (m).s_addr)) == 0 )
1108c9d763bfSQing Li 
110911cdad98SAlexander V. Chernikov static int
11103e7a2321SAlexander V. Chernikov in_lltable_match_prefix(const struct sockaddr *saddr,
11113e7a2321SAlexander V. Chernikov     const struct sockaddr *smask, u_int flags, struct llentry *lle)
1112c9d763bfSQing Li {
11133e7a2321SAlexander V. Chernikov 	struct in_addr addr, mask, lle_addr;
11143e7a2321SAlexander V. Chernikov 
11153e7a2321SAlexander V. Chernikov 	addr = ((const struct sockaddr_in *)saddr)->sin_addr;
11163e7a2321SAlexander V. Chernikov 	mask = ((const struct sockaddr_in *)smask)->sin_addr;
11173e7a2321SAlexander V. Chernikov 	lle_addr.s_addr = ntohl(lle->r_l3addr.addr4.s_addr);
11183e7a2321SAlexander V. Chernikov 
11193e7a2321SAlexander V. Chernikov 	if (IN_ARE_MASKED_ADDR_EQUAL(lle_addr, addr, mask) == 0)
11203e7a2321SAlexander V. Chernikov 		return (0);
11213e7a2321SAlexander V. Chernikov 
11223e7a2321SAlexander V. Chernikov 	if (lle->la_flags & LLE_IFADDR) {
1123c9d763bfSQing Li 
11245b84dc78SQing Li 		/*
11253e7a2321SAlexander V. Chernikov 		 * Delete LLE_IFADDR records IFF address & flag matches.
11263e7a2321SAlexander V. Chernikov 		 * Note that addr is the interface address within prefix
11273e7a2321SAlexander V. Chernikov 		 * being matched.
11283e7a2321SAlexander V. Chernikov 		 * Note also we should handle 'ifdown' cases without removing
11293e7a2321SAlexander V. Chernikov 		 * ifaddr macs.
11305b84dc78SQing Li 		 */
11313e7a2321SAlexander V. Chernikov 		if (addr.s_addr == lle_addr.s_addr && (flags & LLE_STATIC) != 0)
11323e7a2321SAlexander V. Chernikov 			return (1);
11333e7a2321SAlexander V. Chernikov 		return (0);
11343e7a2321SAlexander V. Chernikov 	}
11353e7a2321SAlexander V. Chernikov 
11363e7a2321SAlexander V. Chernikov 	/* flags & LLE_STATIC means deleting both dynamic and static entries */
11373e7a2321SAlexander V. Chernikov 	if ((flags & LLE_STATIC) || !(lle->la_flags & LLE_STATIC))
113811cdad98SAlexander V. Chernikov 		return (1);
113911cdad98SAlexander V. Chernikov 
114011cdad98SAlexander V. Chernikov 	return (0);
114111cdad98SAlexander V. Chernikov }
114211cdad98SAlexander V. Chernikov 
114311cdad98SAlexander V. Chernikov static void
114411cdad98SAlexander V. Chernikov in_lltable_free_entry(struct lltable *llt, struct llentry *lle)
114511cdad98SAlexander V. Chernikov {
114611cdad98SAlexander V. Chernikov 	struct ifnet *ifp;
114711cdad98SAlexander V. Chernikov 	size_t pkts_dropped;
114811cdad98SAlexander V. Chernikov 
114911cdad98SAlexander V. Chernikov 	LLE_WLOCK_ASSERT(lle);
115011cdad98SAlexander V. Chernikov 	KASSERT(llt != NULL, ("lltable is NULL"));
115111cdad98SAlexander V. Chernikov 
115211cdad98SAlexander V. Chernikov 	/* Unlink entry from table if not already */
115311cdad98SAlexander V. Chernikov 	if ((lle->la_flags & LLE_LINKED) != 0) {
115411cdad98SAlexander V. Chernikov 		ifp = llt->llt_ifp;
115511cdad98SAlexander V. Chernikov 		IF_AFDATA_WLOCK_ASSERT(ifp);
115611cdad98SAlexander V. Chernikov 		lltable_unlink_entry(llt, lle);
115711cdad98SAlexander V. Chernikov 	}
115811cdad98SAlexander V. Chernikov 
115911cdad98SAlexander V. Chernikov 	/* cancel timer */
11607c4676ddSRandall Stewart 	if (callout_stop(&lle->lle_timer) > 0)
1161becba438SBjoern A. Zeeb 		LLE_REMREF(lle);
116211cdad98SAlexander V. Chernikov 
116311cdad98SAlexander V. Chernikov 	/* Drop hold queue */
1164e162ea60SGeorge V. Neville-Neil 	pkts_dropped = llentry_free(lle);
1165e162ea60SGeorge V. Neville-Neil 	ARPSTAT_ADD(dropped, pkts_dropped);
1166c9d763bfSQing Li }
1167c9d763bfSQing Li 
11686e6b3f7cSQing Li static int
1169c7ab6602SQing Li in_lltable_rtcheck(struct ifnet *ifp, u_int flags, const struct sockaddr *l3addr)
11706e6b3f7cSQing Li {
11719a1b64d5SAlexander V. Chernikov 	struct rt_addrinfo info;
11729a1b64d5SAlexander V. Chernikov 	struct sockaddr_in rt_key, rt_mask;
11739a1b64d5SAlexander V. Chernikov 	struct sockaddr rt_gateway;
11749a1b64d5SAlexander V. Chernikov 	int rt_flags;
11756e6b3f7cSQing Li 
11766e6b3f7cSQing Li 	KASSERT(l3addr->sa_family == AF_INET,
11776e6b3f7cSQing Li 	    ("sin_family %d", l3addr->sa_family));
11786e6b3f7cSQing Li 
11799a1b64d5SAlexander V. Chernikov 	bzero(&rt_key, sizeof(rt_key));
11809a1b64d5SAlexander V. Chernikov 	rt_key.sin_len = sizeof(rt_key);
11819a1b64d5SAlexander V. Chernikov 	bzero(&rt_mask, sizeof(rt_mask));
11829a1b64d5SAlexander V. Chernikov 	rt_mask.sin_len = sizeof(rt_mask);
11839a1b64d5SAlexander V. Chernikov 	bzero(&rt_gateway, sizeof(rt_gateway));
11849a1b64d5SAlexander V. Chernikov 	rt_gateway.sa_len = sizeof(rt_gateway);
118513e255faSMarko Zec 
11869a1b64d5SAlexander V. Chernikov 	bzero(&info, sizeof(info));
11879a1b64d5SAlexander V. Chernikov 	info.rti_info[RTAX_DST] = (struct sockaddr *)&rt_key;
11889a1b64d5SAlexander V. Chernikov 	info.rti_info[RTAX_NETMASK] = (struct sockaddr *)&rt_mask;
11899a1b64d5SAlexander V. Chernikov 	info.rti_info[RTAX_GATEWAY] = (struct sockaddr *)&rt_gateway;
11909a1b64d5SAlexander V. Chernikov 
11919a1b64d5SAlexander V. Chernikov 	if (rib_lookup_info(ifp->if_fib, l3addr, NHR_REF, 0, &info) != 0)
11926cf8e330SQing Li 		return (EINVAL);
11936cf8e330SQing Li 
11949a1b64d5SAlexander V. Chernikov 	rt_flags = info.rti_flags;
11959a1b64d5SAlexander V. Chernikov 
119613e255faSMarko Zec 	/*
119713e255faSMarko Zec 	 * If the gateway for an existing host route matches the target L3
11986cf8e330SQing Li 	 * address, which is a special route inserted by some implementation
11996cf8e330SQing Li 	 * such as MANET, and the interface is of the correct type, then
12006cf8e330SQing Li 	 * allow for ARP to proceed.
120113e255faSMarko Zec 	 */
12029a1b64d5SAlexander V. Chernikov 	if (rt_flags & RTF_GATEWAY) {
12039a1b64d5SAlexander V. Chernikov 		if (!(rt_flags & RTF_HOST) || !info.rti_ifp ||
12049a1b64d5SAlexander V. Chernikov 		    info.rti_ifp->if_type != IFT_ETHER ||
12059a1b64d5SAlexander V. Chernikov 		    (info.rti_ifp->if_flags & (IFF_NOARP | IFF_STATICARP)) != 0 ||
12069a1b64d5SAlexander V. Chernikov 		    memcmp(rt_gateway.sa_data, l3addr->sa_data,
120715d25219SQing Li 		    sizeof(in_addr_t)) != 0) {
12089a1b64d5SAlexander V. Chernikov 			rib_free_info(&info);
1209db92413eSQing Li 			return (EINVAL);
1210db92413eSQing Li 		}
121115d25219SQing Li 	}
12129a1b64d5SAlexander V. Chernikov 	rib_free_info(&info);
1213db92413eSQing Li 
1214db92413eSQing Li 	/*
1215db92413eSQing Li 	 * Make sure that at least the destination address is covered
1216db92413eSQing Li 	 * by the route. This is for handling the case where 2 or more
1217db92413eSQing Li 	 * interfaces have the same prefix. An incoming packet arrives
1218db92413eSQing Li 	 * on one interface and the corresponding outgoing packet leaves
1219db92413eSQing Li 	 * another interface.
1220db92413eSQing Li 	 */
12219a1b64d5SAlexander V. Chernikov 	if (!(rt_flags & RTF_HOST) && info.rti_ifp != ifp) {
122215d25219SQing Li 		const char *sa, *mask, *addr, *lim;
12238144690aSEric van Gyzen 		const struct sockaddr_in *l3sin;
1224db92413eSQing Li 
12259a1b64d5SAlexander V. Chernikov 		mask = (const char *)&rt_mask;
1226b3664a14SQing Li 		/*
1227b3664a14SQing Li 		 * Just being extra cautious to avoid some custom
1228b3664a14SQing Li 		 * code getting into trouble.
1229b3664a14SQing Li 		 */
12309a1b64d5SAlexander V. Chernikov 		if ((info.rti_addrs & RTA_NETMASK) == 0)
1231b3664a14SQing Li 			return (EINVAL);
1232b3664a14SQing Li 
12339a1b64d5SAlexander V. Chernikov 		sa = (const char *)&rt_key;
123415d25219SQing Li 		addr = (const char *)l3addr;
12358144690aSEric van Gyzen 		l3sin = (const struct sockaddr_in *)l3addr;
12368144690aSEric van Gyzen 		lim = addr + l3sin->sin_len;
1237db92413eSQing Li 
1238db92413eSQing Li 		for ( ; addr < lim; sa++, mask++, addr++) {
1239db92413eSQing Li 			if ((*sa ^ *addr) & *mask) {
12406cb2b4e7SQing Li #ifdef DIAGNOSTIC
12418144690aSEric van Gyzen 				char addrbuf[INET_ADDRSTRLEN];
12428144690aSEric van Gyzen 
12438144690aSEric van Gyzen 				log(LOG_INFO, "IPv4 address: \"%s\" "
12448144690aSEric van Gyzen 				    "is not on the network\n",
12458144690aSEric van Gyzen 				    inet_ntoa_r(l3sin->sin_addr, addrbuf));
1246b4a22c36SQing Li #endif
124715d25219SQing Li 				return (EINVAL);
12486e6b3f7cSQing Li 			}
1249db92413eSQing Li 		}
1250db92413eSQing Li 	}
1251db92413eSQing Li 
125215d25219SQing Li 	return (0);
12536e6b3f7cSQing Li }
12546e6b3f7cSQing Li 
125511cdad98SAlexander V. Chernikov static inline uint32_t
125611cdad98SAlexander V. Chernikov in_lltable_hash_dst(const struct in_addr dst, uint32_t hsize)
125711cdad98SAlexander V. Chernikov {
125811cdad98SAlexander V. Chernikov 
125911cdad98SAlexander V. Chernikov 	return (IN_LLTBL_HASH(dst.s_addr, hsize));
126011cdad98SAlexander V. Chernikov }
126111cdad98SAlexander V. Chernikov 
126211cdad98SAlexander V. Chernikov static uint32_t
126311cdad98SAlexander V. Chernikov in_lltable_hash(const struct llentry *lle, uint32_t hsize)
126411cdad98SAlexander V. Chernikov {
126511cdad98SAlexander V. Chernikov 
1266314294deSAlexander V. Chernikov 	return (in_lltable_hash_dst(lle->r_l3addr.addr4, hsize));
126711cdad98SAlexander V. Chernikov }
126811cdad98SAlexander V. Chernikov 
126911cdad98SAlexander V. Chernikov static void
127011cdad98SAlexander V. Chernikov in_lltable_fill_sa_entry(const struct llentry *lle, struct sockaddr *sa)
127111cdad98SAlexander V. Chernikov {
127211cdad98SAlexander V. Chernikov 	struct sockaddr_in *sin;
127311cdad98SAlexander V. Chernikov 
127411cdad98SAlexander V. Chernikov 	sin = (struct sockaddr_in *)sa;
127511cdad98SAlexander V. Chernikov 	bzero(sin, sizeof(*sin));
127611cdad98SAlexander V. Chernikov 	sin->sin_family = AF_INET;
127711cdad98SAlexander V. Chernikov 	sin->sin_len = sizeof(*sin);
1278314294deSAlexander V. Chernikov 	sin->sin_addr = lle->r_l3addr.addr4;
127911cdad98SAlexander V. Chernikov }
128011cdad98SAlexander V. Chernikov 
1281b4b1367aSAlexander V. Chernikov static inline struct llentry *
1282b4b1367aSAlexander V. Chernikov in_lltable_find_dst(struct lltable *llt, struct in_addr dst)
1283b4b1367aSAlexander V. Chernikov {
1284b4b1367aSAlexander V. Chernikov 	struct llentry *lle;
1285b4b1367aSAlexander V. Chernikov 	struct llentries *lleh;
128611cdad98SAlexander V. Chernikov 	u_int hashidx;
1287b4b1367aSAlexander V. Chernikov 
12883a749863SAlexander V. Chernikov 	hashidx = in_lltable_hash_dst(dst, llt->llt_hsize);
128911cdad98SAlexander V. Chernikov 	lleh = &llt->lle_head[hashidx];
1290b4b1367aSAlexander V. Chernikov 	LIST_FOREACH(lle, lleh, lle_next) {
1291b4b1367aSAlexander V. Chernikov 		if (lle->la_flags & LLE_DELETED)
1292b4b1367aSAlexander V. Chernikov 			continue;
1293314294deSAlexander V. Chernikov 		if (lle->r_l3addr.addr4.s_addr == dst.s_addr)
1294b4b1367aSAlexander V. Chernikov 			break;
1295b4b1367aSAlexander V. Chernikov 	}
1296b4b1367aSAlexander V. Chernikov 
1297b4b1367aSAlexander V. Chernikov 	return (lle);
1298b4b1367aSAlexander V. Chernikov }
1299b4b1367aSAlexander V. Chernikov 
13003e7a2321SAlexander V. Chernikov static void
13013e7a2321SAlexander V. Chernikov in_lltable_delete_entry(struct lltable *llt, struct llentry *lle)
1302b4b1367aSAlexander V. Chernikov {
1303b4b1367aSAlexander V. Chernikov 
1304b4b1367aSAlexander V. Chernikov 	lle->la_flags |= LLE_DELETED;
1305b4b1367aSAlexander V. Chernikov 	EVENTHANDLER_INVOKE(lle_event, lle, LLENTRY_DELETED);
1306b4b1367aSAlexander V. Chernikov #ifdef DIAGNOSTIC
1307b4b1367aSAlexander V. Chernikov 	log(LOG_INFO, "ifaddr cache = %p is deleted\n", lle);
1308b4b1367aSAlexander V. Chernikov #endif
1309b4b1367aSAlexander V. Chernikov 	llentry_free(lle);
1310b4b1367aSAlexander V. Chernikov }
1311b4b1367aSAlexander V. Chernikov 
1312b4b1367aSAlexander V. Chernikov static struct llentry *
13135a255516SAlexander V. Chernikov in_lltable_alloc(struct lltable *llt, u_int flags, const struct sockaddr *l3addr)
1314b4b1367aSAlexander V. Chernikov {
1315b4b1367aSAlexander V. Chernikov 	const struct sockaddr_in *sin = (const struct sockaddr_in *)l3addr;
1316b4b1367aSAlexander V. Chernikov 	struct ifnet *ifp = llt->llt_ifp;
1317b4b1367aSAlexander V. Chernikov 	struct llentry *lle;
13184fb3a820SAlexander V. Chernikov 	char linkhdr[LLE_MAX_LINKHDR];
13194fb3a820SAlexander V. Chernikov 	size_t linkhdrsize;
13204fb3a820SAlexander V. Chernikov 	int lladdr_off;
1321b4b1367aSAlexander V. Chernikov 
1322b4b1367aSAlexander V. Chernikov 	KASSERT(l3addr->sa_family == AF_INET,
1323b4b1367aSAlexander V. Chernikov 	    ("sin_family %d", l3addr->sa_family));
1324b4b1367aSAlexander V. Chernikov 
1325b4b1367aSAlexander V. Chernikov 	/*
1326b4b1367aSAlexander V. Chernikov 	 * A route that covers the given address must have
1327b4b1367aSAlexander V. Chernikov 	 * been installed 1st because we are doing a resolution,
1328b4b1367aSAlexander V. Chernikov 	 * verify this.
1329b4b1367aSAlexander V. Chernikov 	 */
1330b4b1367aSAlexander V. Chernikov 	if (!(flags & LLE_IFADDR) &&
1331b4b1367aSAlexander V. Chernikov 	    in_lltable_rtcheck(ifp, flags, l3addr) != 0)
1332b4b1367aSAlexander V. Chernikov 		return (NULL);
1333b4b1367aSAlexander V. Chernikov 
1334314294deSAlexander V. Chernikov 	lle = in_lltable_new(sin->sin_addr, flags);
1335b4b1367aSAlexander V. Chernikov 	if (lle == NULL) {
1336b4b1367aSAlexander V. Chernikov 		log(LOG_INFO, "lla_lookup: new lle malloc failed\n");
1337b4b1367aSAlexander V. Chernikov 		return (NULL);
1338b4b1367aSAlexander V. Chernikov 	}
1339b4b1367aSAlexander V. Chernikov 	lle->la_flags = flags;
1340f8aee88fSAlexander V. Chernikov 	if (flags & LLE_STATIC)
1341f8aee88fSAlexander V. Chernikov 		lle->r_flags |= RLLE_VALID;
1342b4b1367aSAlexander V. Chernikov 	if ((flags & LLE_IFADDR) == LLE_IFADDR) {
13434fb3a820SAlexander V. Chernikov 		linkhdrsize = LLE_MAX_LINKHDR;
13444fb3a820SAlexander V. Chernikov 		if (lltable_calc_llheader(ifp, AF_INET, IF_LLADDR(ifp),
13452769d062SConrad Meyer 		    linkhdr, &linkhdrsize, &lladdr_off) != 0) {
13462769d062SConrad Meyer 			in_lltable_destroy_lle_unlocked(lle);
13474fb3a820SAlexander V. Chernikov 			return (NULL);
13482769d062SConrad Meyer 		}
13494fb3a820SAlexander V. Chernikov 		lltable_set_entry_addr(ifp, lle, linkhdr, linkhdrsize,
13504fb3a820SAlexander V. Chernikov 		    lladdr_off);
1351ddd208f7SAlexander V. Chernikov 		lle->la_flags |= LLE_STATIC;
1352f8aee88fSAlexander V. Chernikov 		lle->r_flags |= (RLLE_VALID | RLLE_IFADDR);
1353b4b1367aSAlexander V. Chernikov 	}
1354b4b1367aSAlexander V. Chernikov 
1355b4b1367aSAlexander V. Chernikov 	return (lle);
1356b4b1367aSAlexander V. Chernikov }
1357b4b1367aSAlexander V. Chernikov 
13586e6b3f7cSQing Li /*
13596e6b3f7cSQing Li  * Return NULL if not found or marked for deletion.
13606e6b3f7cSQing Li  * If found return lle read locked.
13616e6b3f7cSQing Li  */
13626e6b3f7cSQing Li static struct llentry *
13636e6b3f7cSQing Li in_lltable_lookup(struct lltable *llt, u_int flags, const struct sockaddr *l3addr)
13646e6b3f7cSQing Li {
13656e6b3f7cSQing Li 	const struct sockaddr_in *sin = (const struct sockaddr_in *)l3addr;
13666e6b3f7cSQing Li 	struct llentry *lle;
13676e6b3f7cSQing Li 
13686e4cd746SMarius Strobl 	IF_AFDATA_LOCK_ASSERT(llt->llt_ifp);
13696e6b3f7cSQing Li 	KASSERT(l3addr->sa_family == AF_INET,
13706e6b3f7cSQing Li 	    ("sin_family %d", l3addr->sa_family));
137111cdad98SAlexander V. Chernikov 	lle = in_lltable_find_dst(llt, sin->sin_addr);
1372b4b1367aSAlexander V. Chernikov 
1373b4b1367aSAlexander V. Chernikov 	if (lle == NULL)
13746e6b3f7cSQing Li 		return (NULL);
13756e6b3f7cSQing Li 
1376f8aee88fSAlexander V. Chernikov 	KASSERT((flags & (LLE_UNLOCKED|LLE_EXCLUSIVE)) !=
1377f8aee88fSAlexander V. Chernikov 	    (LLE_UNLOCKED|LLE_EXCLUSIVE),("wrong lle request flags: 0x%X",
1378f8aee88fSAlexander V. Chernikov 	    flags));
1379f8aee88fSAlexander V. Chernikov 
1380f8aee88fSAlexander V. Chernikov 	if (flags & LLE_UNLOCKED)
1381f8aee88fSAlexander V. Chernikov 		return (lle);
1382f8aee88fSAlexander V. Chernikov 
13836e6b3f7cSQing Li 	if (flags & LLE_EXCLUSIVE)
13846e6b3f7cSQing Li 		LLE_WLOCK(lle);
13856e6b3f7cSQing Li 	else
13866e6b3f7cSQing Li 		LLE_RLOCK(lle);
1387b4b1367aSAlexander V. Chernikov 
13886e6b3f7cSQing Li 	return (lle);
13896e6b3f7cSQing Li }
13906e6b3f7cSQing Li 
13916e6b3f7cSQing Li static int
139211cdad98SAlexander V. Chernikov in_lltable_dump_entry(struct lltable *llt, struct llentry *lle,
139311cdad98SAlexander V. Chernikov     struct sysctl_req *wr)
13946e6b3f7cSQing Li {
13956e6b3f7cSQing Li 	struct ifnet *ifp = llt->llt_ifp;
13966e6b3f7cSQing Li 	/* XXX stack use */
13976e6b3f7cSQing Li 	struct {
13986e6b3f7cSQing Li 		struct rt_msghdr	rtm;
13999711a168SGleb Smirnoff 		struct sockaddr_in	sin;
14006e6b3f7cSQing Li 		struct sockaddr_dl	sdl;
14016e6b3f7cSQing Li 	} arpc;
14026e6b3f7cSQing Li 	struct sockaddr_dl *sdl;
140311cdad98SAlexander V. Chernikov 	int error;
14046e6b3f7cSQing Li 
140511cdad98SAlexander V. Chernikov 	bzero(&arpc, sizeof(arpc));
14066e6b3f7cSQing Li 			/* skip deleted entries */
140793704ac5SQing Li 			if ((lle->la_flags & LLE_DELETED) == LLE_DELETED)
140811cdad98SAlexander V. Chernikov 				return (0);
1409813dd6aeSBjoern A. Zeeb 			/* Skip if jailed and not a valid IP of the prison. */
141011cdad98SAlexander V. Chernikov 			lltable_fill_sa_entry(lle,(struct sockaddr *)&arpc.sin);
141111cdad98SAlexander V. Chernikov 			if (prison_if(wr->td->td_ucred,
141211cdad98SAlexander V. Chernikov 			    (struct sockaddr *)&arpc.sin) != 0)
141311cdad98SAlexander V. Chernikov 				return (0);
14146e6b3f7cSQing Li 			/*
14156e6b3f7cSQing Li 			 * produce a msg made of:
14166e6b3f7cSQing Li 			 *  struct rt_msghdr;
14179711a168SGleb Smirnoff 			 *  struct sockaddr_in; (IPv4)
14186e6b3f7cSQing Li 			 *  struct sockaddr_dl;
14196e6b3f7cSQing Li 			 */
14206e6b3f7cSQing Li 			arpc.rtm.rtm_msglen = sizeof(arpc);
1421c0e9a8a1SHartmut Brandt 			arpc.rtm.rtm_version = RTM_VERSION;
1422c0e9a8a1SHartmut Brandt 			arpc.rtm.rtm_type = RTM_GET;
1423c0e9a8a1SHartmut Brandt 			arpc.rtm.rtm_flags = RTF_UP;
1424c0e9a8a1SHartmut Brandt 			arpc.rtm.rtm_addrs = RTA_DST | RTA_GATEWAY;
14256e6b3f7cSQing Li 
14266e6b3f7cSQing Li 			/* publish */
14279711a168SGleb Smirnoff 			if (lle->la_flags & LLE_PUB)
14286e6b3f7cSQing Li 				arpc.rtm.rtm_flags |= RTF_ANNOUNCE;
14296e6b3f7cSQing Li 
14306e6b3f7cSQing Li 			sdl = &arpc.sdl;
14316e6b3f7cSQing Li 			sdl->sdl_family = AF_LINK;
14326e6b3f7cSQing Li 			sdl->sdl_len = sizeof(*sdl);
14336e6b3f7cSQing Li 			sdl->sdl_index = ifp->if_index;
14346e6b3f7cSQing Li 			sdl->sdl_type = ifp->if_type;
143593704ac5SQing Li 			if ((lle->la_flags & LLE_VALID) == LLE_VALID) {
143693704ac5SQing Li 				sdl->sdl_alen = ifp->if_addrlen;
14374fb3a820SAlexander V. Chernikov 				bcopy(lle->ll_addr, LLADDR(sdl), ifp->if_addrlen);
143893704ac5SQing Li 			} else {
143993704ac5SQing Li 				sdl->sdl_alen = 0;
144093704ac5SQing Li 				bzero(LLADDR(sdl), ifp->if_addrlen);
144193704ac5SQing Li 			}
14426e6b3f7cSQing Li 
14436e6b3f7cSQing Li 			arpc.rtm.rtm_rmx.rmx_expire =
14446e6b3f7cSQing Li 			    lle->la_flags & LLE_STATIC ? 0 : lle->la_expire;
14458eca593cSQing Li 			arpc.rtm.rtm_flags |= (RTF_HOST | RTF_LLDATA);
14466e6b3f7cSQing Li 			if (lle->la_flags & LLE_STATIC)
14476e6b3f7cSQing Li 				arpc.rtm.rtm_flags |= RTF_STATIC;
14484a336ef4SAlexander V. Chernikov 			if (lle->la_flags & LLE_IFADDR)
14494a336ef4SAlexander V. Chernikov 				arpc.rtm.rtm_flags |= RTF_PINNED;
14506e6b3f7cSQing Li 			arpc.rtm.rtm_index = ifp->if_index;
14516e6b3f7cSQing Li 			error = SYSCTL_OUT(wr, &arpc, sizeof(arpc));
145211cdad98SAlexander V. Chernikov 
145311cdad98SAlexander V. Chernikov 	return (error);
14546e6b3f7cSQing Li }
14556e6b3f7cSQing Li 
14563a749863SAlexander V. Chernikov static struct lltable *
14573a749863SAlexander V. Chernikov in_lltattach(struct ifnet *ifp)
14586e6b3f7cSQing Li {
1459d10910e6SBruce M Simpson 	struct lltable *llt;
14606e6b3f7cSQing Li 
14613a749863SAlexander V. Chernikov 	llt = lltable_allocate_htbl(IN_LLTBL_DEFAULT_HSIZE);
1462721cd2e0SAlexander V. Chernikov  	llt->llt_af = AF_INET;
1463721cd2e0SAlexander V. Chernikov  	llt->llt_ifp = ifp;
1464d10910e6SBruce M Simpson 
14656e6b3f7cSQing Li 	llt->llt_lookup = in_lltable_lookup;
14665a255516SAlexander V. Chernikov 	llt->llt_alloc_entry = in_lltable_alloc;
14673e7a2321SAlexander V. Chernikov 	llt->llt_delete_entry = in_lltable_delete_entry;
146811cdad98SAlexander V. Chernikov 	llt->llt_dump_entry = in_lltable_dump_entry;
146911cdad98SAlexander V. Chernikov 	llt->llt_hash = in_lltable_hash;
147011cdad98SAlexander V. Chernikov 	llt->llt_fill_sa_entry = in_lltable_fill_sa_entry;
147111cdad98SAlexander V. Chernikov 	llt->llt_free_entry = in_lltable_free_entry;
147211cdad98SAlexander V. Chernikov 	llt->llt_match_prefix = in_lltable_match_prefix;
1473721cd2e0SAlexander V. Chernikov  	lltable_link(llt);
1474d10910e6SBruce M Simpson 
14753a749863SAlexander V. Chernikov 	return (llt);
14763a749863SAlexander V. Chernikov }
14773a749863SAlexander V. Chernikov 
14783a749863SAlexander V. Chernikov void *
14793a749863SAlexander V. Chernikov in_domifattach(struct ifnet *ifp)
14803a749863SAlexander V. Chernikov {
14813a749863SAlexander V. Chernikov 	struct in_ifinfo *ii;
14823a749863SAlexander V. Chernikov 
1483721cd2e0SAlexander V. Chernikov 	ii = malloc(sizeof(struct in_ifinfo), M_IFADDR, M_WAITOK|M_ZERO);
148441cb42a6SAlexander V. Chernikov 
14853a749863SAlexander V. Chernikov 	ii->ii_llt = in_lltattach(ifp);
1486d10910e6SBruce M Simpson 	ii->ii_igmp = igmp_domifattach(ifp);
1487d10910e6SBruce M Simpson 
148841cb42a6SAlexander V. Chernikov 	return (ii);
14896e6b3f7cSQing Li }
14906e6b3f7cSQing Li 
14916e6b3f7cSQing Li void
1492d10910e6SBruce M Simpson in_domifdetach(struct ifnet *ifp, void *aux)
14936e6b3f7cSQing Li {
1494d10910e6SBruce M Simpson 	struct in_ifinfo *ii = (struct in_ifinfo *)aux;
14956e6b3f7cSQing Li 
1496d10910e6SBruce M Simpson 	igmp_domifdetach(ifp);
1497d10910e6SBruce M Simpson 	lltable_free(ii->ii_llt);
1498d10910e6SBruce M Simpson 	free(ii, M_IFADDR);
14996e6b3f7cSQing Li }
1500