xref: /freebsd/sys/netinet/in.c (revision 5a2555160fbee37e281bfcaa3e51bd837e01ab99)
1c398230bSWarner Losh /*-
2df8bae1dSRodney W. Grimes  * Copyright (c) 1982, 1986, 1991, 1993
3df8bae1dSRodney W. Grimes  *	The Regents of the University of California.  All rights reserved.
481d96ce8SMax Laier  * Copyright (C) 2001 WIDE Project.  All rights reserved.
5df8bae1dSRodney W. Grimes  *
6df8bae1dSRodney W. Grimes  * Redistribution and use in source and binary forms, with or without
7df8bae1dSRodney W. Grimes  * modification, are permitted provided that the following conditions
8df8bae1dSRodney W. Grimes  * are met:
9df8bae1dSRodney W. Grimes  * 1. Redistributions of source code must retain the above copyright
10df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer.
11df8bae1dSRodney W. Grimes  * 2. Redistributions in binary form must reproduce the above copyright
12df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer in the
13df8bae1dSRodney W. Grimes  *    documentation and/or other materials provided with the distribution.
14df8bae1dSRodney W. Grimes  * 4. Neither the name of the University nor the names of its contributors
15df8bae1dSRodney W. Grimes  *    may be used to endorse or promote products derived from this software
16df8bae1dSRodney W. Grimes  *    without specific prior written permission.
17df8bae1dSRodney W. Grimes  *
18df8bae1dSRodney W. Grimes  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
19df8bae1dSRodney W. Grimes  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20df8bae1dSRodney W. Grimes  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21df8bae1dSRodney W. Grimes  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
22df8bae1dSRodney W. Grimes  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23df8bae1dSRodney W. Grimes  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24df8bae1dSRodney W. Grimes  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25df8bae1dSRodney W. Grimes  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26df8bae1dSRodney W. Grimes  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27df8bae1dSRodney W. Grimes  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28df8bae1dSRodney W. Grimes  * SUCH DAMAGE.
29df8bae1dSRodney W. Grimes  *
302180b925SGarrett Wollman  *	@(#)in.c	8.4 (Berkeley) 1/9/95
31df8bae1dSRodney W. Grimes  */
32df8bae1dSRodney W. Grimes 
334b421e2dSMike Silbersack #include <sys/cdefs.h>
344b421e2dSMike Silbersack __FBSDID("$FreeBSD$");
354b421e2dSMike Silbersack 
36c7ea0aa6SQing Li #include "opt_mpath.h"
3750bb1704SGleb Smirnoff 
38df8bae1dSRodney W. Grimes #include <sys/param.h>
39c3322cb9SGleb Smirnoff #include <sys/eventhandler.h>
4026f9a767SRodney W. Grimes #include <sys/systm.h>
4151a53488SBruce Evans #include <sys/sockio.h>
42df8bae1dSRodney W. Grimes #include <sys/malloc.h>
43acd3428bSRobert Watson #include <sys/priv.h>
44df8bae1dSRodney W. Grimes #include <sys/socket.h>
455ce0eb7fSBjoern A. Zeeb #include <sys/jail.h>
46f6d24a78SPoul-Henning Kamp #include <sys/kernel.h>
47cc0a3c8cSAndrey V. Elsukov #include <sys/lock.h>
485ce0eb7fSBjoern A. Zeeb #include <sys/proc.h>
49cc0a3c8cSAndrey V. Elsukov #include <sys/rmlock.h>
50f6d24a78SPoul-Henning Kamp #include <sys/sysctl.h>
51ebc90701SQing Li #include <sys/syslog.h>
52f7a39160SGleb Smirnoff #include <sys/sx.h>
53df8bae1dSRodney W. Grimes 
54df8bae1dSRodney W. Grimes #include <net/if.h>
55df813b7eSQing Li #include <net/if_var.h>
56e162ea60SGeorge V. Neville-Neil #include <net/if_arp.h>
57ebc90701SQing Li #include <net/if_dl.h>
586e6b3f7cSQing Li #include <net/if_llatbl.h>
596a800098SYoshinobu Inoue #include <net/if_types.h>
60df8bae1dSRodney W. Grimes #include <net/route.h>
61ebc90701SQing Li #include <net/vnet.h>
62df8bae1dSRodney W. Grimes 
6308b68b0eSGleb Smirnoff #include <netinet/if_ether.h>
64df8bae1dSRodney W. Grimes #include <netinet/in.h>
65df8bae1dSRodney W. Grimes #include <netinet/in_var.h>
66e43cc4aeSHajimu UMEMOTO #include <netinet/in_pcb.h>
6771498f30SBruce M Simpson #include <netinet/ip_var.h>
6808b68b0eSGleb Smirnoff #include <netinet/ip_carp.h>
69d10910e6SBruce M Simpson #include <netinet/igmp_var.h>
70eddfbb76SRobert Watson #include <netinet/udp.h>
71eddfbb76SRobert Watson #include <netinet/udp_var.h>
7255166637SPoul-Henning Kamp 
7377b89ad8SGleb Smirnoff static int in_aifaddr_ioctl(u_long, caddr_t, struct ifnet *, struct thread *);
74f7a39160SGleb Smirnoff static int in_difaddr_ioctl(caddr_t, struct ifnet *, struct thread *);
756a800098SYoshinobu Inoue 
764d77a549SAlfred Perlstein static void	in_socktrim(struct sockaddr_in *);
77ec002feeSBruce M Simpson static void	in_purgemaddrs(struct ifnet *);
78df8bae1dSRodney W. Grimes 
7908b68b0eSGleb Smirnoff static VNET_DEFINE(int, nosameprefix);
8008b68b0eSGleb Smirnoff #define	V_nosameprefix			VNET(nosameprefix)
816df8a710SGleb Smirnoff SYSCTL_INT(_net_inet_ip, OID_AUTO, no_same_prefix, CTLFLAG_VNET | CTLFLAG_RW,
8208b68b0eSGleb Smirnoff 	&VNET_NAME(nosameprefix), 0,
831ae95409SGleb Smirnoff 	"Refuse to create same prefixes on different interfaces");
84477180fbSGarrett Wollman 
8582cea7e6SBjoern A. Zeeb VNET_DECLARE(struct inpcbinfo, ripcbinfo);
8682cea7e6SBjoern A. Zeeb #define	V_ripcbinfo			VNET(ripcbinfo)
8782cea7e6SBjoern A. Zeeb 
88f7a39160SGleb Smirnoff static struct sx in_control_sx;
89f7a39160SGleb Smirnoff SX_SYSINIT(in_control_sx, &in_control_sx, "in_control");
90f7a39160SGleb Smirnoff 
91df8bae1dSRodney W. Grimes /*
92df8bae1dSRodney W. Grimes  * Return 1 if an internet address is for a ``local'' host
93b365d954SGleb Smirnoff  * (one to which we have a connection).
94df8bae1dSRodney W. Grimes  */
9526f9a767SRodney W. Grimes int
96f2565d68SRobert Watson in_localaddr(struct in_addr in)
97df8bae1dSRodney W. Grimes {
98cc0a3c8cSAndrey V. Elsukov 	struct rm_priotracker in_ifa_tracker;
99df8bae1dSRodney W. Grimes 	register u_long i = ntohl(in.s_addr);
100df8bae1dSRodney W. Grimes 	register struct in_ifaddr *ia;
101df8bae1dSRodney W. Grimes 
102cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RLOCK(&in_ifa_tracker);
1032d9cfabaSRobert Watson 	TAILQ_FOREACH(ia, &V_in_ifaddrhead, ia_link) {
1042d9cfabaSRobert Watson 		if ((i & ia->ia_subnetmask) == ia->ia_subnet) {
105cc0a3c8cSAndrey V. Elsukov 			IN_IFADDR_RUNLOCK(&in_ifa_tracker);
1062d9cfabaSRobert Watson 			return (1);
1072d9cfabaSRobert Watson 		}
1082d9cfabaSRobert Watson 	}
109cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RUNLOCK(&in_ifa_tracker);
110df8bae1dSRodney W. Grimes 	return (0);
111df8bae1dSRodney W. Grimes }
112df8bae1dSRodney W. Grimes 
113df8bae1dSRodney W. Grimes /*
1142eccc90bSAndre Oppermann  * Return 1 if an internet address is for the local host and configured
1152eccc90bSAndre Oppermann  * on one of its interfaces.
1162eccc90bSAndre Oppermann  */
1172eccc90bSAndre Oppermann int
118f2565d68SRobert Watson in_localip(struct in_addr in)
1192eccc90bSAndre Oppermann {
120cc0a3c8cSAndrey V. Elsukov 	struct rm_priotracker in_ifa_tracker;
1212eccc90bSAndre Oppermann 	struct in_ifaddr *ia;
1222eccc90bSAndre Oppermann 
123cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RLOCK(&in_ifa_tracker);
1242eccc90bSAndre Oppermann 	LIST_FOREACH(ia, INADDR_HASH(in.s_addr), ia_hash) {
1252d9cfabaSRobert Watson 		if (IA_SIN(ia)->sin_addr.s_addr == in.s_addr) {
126cc0a3c8cSAndrey V. Elsukov 			IN_IFADDR_RUNLOCK(&in_ifa_tracker);
127460473a0SBjoern A. Zeeb 			return (1);
1282eccc90bSAndre Oppermann 		}
1292d9cfabaSRobert Watson 	}
130cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RUNLOCK(&in_ifa_tracker);
131460473a0SBjoern A. Zeeb 	return (0);
1322eccc90bSAndre Oppermann }
1332eccc90bSAndre Oppermann 
1342eccc90bSAndre Oppermann /*
13528ebe80cSGleb Smirnoff  * Return 1 if an internet address is configured on an interface.
13628ebe80cSGleb Smirnoff  */
13728ebe80cSGleb Smirnoff int
13828ebe80cSGleb Smirnoff in_ifhasaddr(struct ifnet *ifp, struct in_addr in)
13928ebe80cSGleb Smirnoff {
14028ebe80cSGleb Smirnoff 	struct ifaddr *ifa;
14128ebe80cSGleb Smirnoff 	struct in_ifaddr *ia;
14228ebe80cSGleb Smirnoff 
14328ebe80cSGleb Smirnoff 	IF_ADDR_RLOCK(ifp);
14428ebe80cSGleb Smirnoff 	TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
14528ebe80cSGleb Smirnoff 		if (ifa->ifa_addr->sa_family != AF_INET)
14628ebe80cSGleb Smirnoff 			continue;
14728ebe80cSGleb Smirnoff 		ia = (struct in_ifaddr *)ifa;
14828ebe80cSGleb Smirnoff 		if (ia->ia_addr.sin_addr.s_addr == in.s_addr) {
14928ebe80cSGleb Smirnoff 			IF_ADDR_RUNLOCK(ifp);
15028ebe80cSGleb Smirnoff 			return (1);
15128ebe80cSGleb Smirnoff 		}
15228ebe80cSGleb Smirnoff 	}
15328ebe80cSGleb Smirnoff 	IF_ADDR_RUNLOCK(ifp);
15428ebe80cSGleb Smirnoff 
15528ebe80cSGleb Smirnoff 	return (0);
15628ebe80cSGleb Smirnoff }
15728ebe80cSGleb Smirnoff 
15828ebe80cSGleb Smirnoff /*
159f7a39160SGleb Smirnoff  * Return a reference to the interface address which is different to
160f7a39160SGleb Smirnoff  * the supplied one but with same IP address value.
161f7a39160SGleb Smirnoff  */
162f7a39160SGleb Smirnoff static struct in_ifaddr *
163f7a39160SGleb Smirnoff in_localip_more(struct in_ifaddr *ia)
164f7a39160SGleb Smirnoff {
165cc0a3c8cSAndrey V. Elsukov 	struct rm_priotracker in_ifa_tracker;
166f7a39160SGleb Smirnoff 	in_addr_t in = IA_SIN(ia)->sin_addr.s_addr;
167f7a39160SGleb Smirnoff 	struct in_ifaddr *it;
168f7a39160SGleb Smirnoff 
169cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RLOCK(&in_ifa_tracker);
170f7a39160SGleb Smirnoff 	LIST_FOREACH(it, INADDR_HASH(in), ia_hash) {
171f7a39160SGleb Smirnoff 		if (it != ia && IA_SIN(it)->sin_addr.s_addr == in) {
172f7a39160SGleb Smirnoff 			ifa_ref(&it->ia_ifa);
173cc0a3c8cSAndrey V. Elsukov 			IN_IFADDR_RUNLOCK(&in_ifa_tracker);
174f7a39160SGleb Smirnoff 			return (it);
175f7a39160SGleb Smirnoff 		}
176f7a39160SGleb Smirnoff 	}
177cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RUNLOCK(&in_ifa_tracker);
178f7a39160SGleb Smirnoff 
179f7a39160SGleb Smirnoff 	return (NULL);
180f7a39160SGleb Smirnoff }
181f7a39160SGleb Smirnoff 
182f7a39160SGleb Smirnoff /*
183df8bae1dSRodney W. Grimes  * Determine whether an IP address is in a reserved set of addresses
184df8bae1dSRodney W. Grimes  * that may not be forwarded, or whether datagrams to that destination
185df8bae1dSRodney W. Grimes  * may be forwarded.
186df8bae1dSRodney W. Grimes  */
18726f9a767SRodney W. Grimes int
188f2565d68SRobert Watson in_canforward(struct in_addr in)
189df8bae1dSRodney W. Grimes {
190df8bae1dSRodney W. Grimes 	register u_long i = ntohl(in.s_addr);
191df8bae1dSRodney W. Grimes 	register u_long net;
192df8bae1dSRodney W. Grimes 
193f8429ca2SBruce M Simpson 	if (IN_EXPERIMENTAL(i) || IN_MULTICAST(i) || IN_LINKLOCAL(i))
194df8bae1dSRodney W. Grimes 		return (0);
195df8bae1dSRodney W. Grimes 	if (IN_CLASSA(i)) {
196df8bae1dSRodney W. Grimes 		net = i & IN_CLASSA_NET;
197df8bae1dSRodney W. Grimes 		if (net == 0 || net == (IN_LOOPBACKNET << IN_CLASSA_NSHIFT))
198df8bae1dSRodney W. Grimes 			return (0);
199df8bae1dSRodney W. Grimes 	}
200df8bae1dSRodney W. Grimes 	return (1);
201df8bae1dSRodney W. Grimes }
202df8bae1dSRodney W. Grimes 
203df8bae1dSRodney W. Grimes /*
204df8bae1dSRodney W. Grimes  * Trim a mask in a sockaddr
205df8bae1dSRodney W. Grimes  */
2060312fbe9SPoul-Henning Kamp static void
207f2565d68SRobert Watson in_socktrim(struct sockaddr_in *ap)
208df8bae1dSRodney W. Grimes {
209df8bae1dSRodney W. Grimes     register char *cplim = (char *) &ap->sin_addr;
210df8bae1dSRodney W. Grimes     register char *cp = (char *) (&ap->sin_addr + 1);
211df8bae1dSRodney W. Grimes 
212df8bae1dSRodney W. Grimes     ap->sin_len = 0;
213df00058dSGarrett Wollman     while (--cp >= cplim)
214df8bae1dSRodney W. Grimes 	if (*cp) {
215df8bae1dSRodney W. Grimes 	    (ap)->sin_len = cp - (char *) (ap) + 1;
216df8bae1dSRodney W. Grimes 	    break;
217df8bae1dSRodney W. Grimes 	}
218df8bae1dSRodney W. Grimes }
219df8bae1dSRodney W. Grimes 
220df8bae1dSRodney W. Grimes /*
221df8bae1dSRodney W. Grimes  * Generic internet control operations (ioctl's).
222df8bae1dSRodney W. Grimes  */
22326f9a767SRodney W. Grimes int
224f2565d68SRobert Watson in_control(struct socket *so, u_long cmd, caddr_t data, struct ifnet *ifp,
225f2565d68SRobert Watson     struct thread *td)
226df8bae1dSRodney W. Grimes {
227f7a39160SGleb Smirnoff 	struct ifreq *ifr = (struct ifreq *)data;
228f7a39160SGleb Smirnoff 	struct sockaddr_in *addr = (struct sockaddr_in *)&ifr->ifr_addr;
229821b5cafSGleb Smirnoff 	struct ifaddr *ifa;
230f7a39160SGleb Smirnoff 	struct in_ifaddr *ia;
231f7a39160SGleb Smirnoff 	int error;
232f7a39160SGleb Smirnoff 
233f7a39160SGleb Smirnoff 	if (ifp == NULL)
234f7a39160SGleb Smirnoff 		return (EADDRNOTAVAIL);
23571212473SGleb Smirnoff 
23671212473SGleb Smirnoff 	/*
237f7a39160SGleb Smirnoff 	 * Filter out 4 ioctls we implement directly.  Forward the rest
238f7a39160SGleb Smirnoff 	 * to specific functions and ifp->if_ioctl().
239bbb3fb61SRobert Watson 	 */
2406a800098SYoshinobu Inoue 	switch (cmd) {
241bbb3fb61SRobert Watson 	case SIOCGIFADDR:
242bbb3fb61SRobert Watson 	case SIOCGIFBRDADDR:
243bbb3fb61SRobert Watson 	case SIOCGIFDSTADDR:
244bbb3fb61SRobert Watson 	case SIOCGIFNETMASK:
245f7a39160SGleb Smirnoff 		break;
2466d00fd9cSGleb Smirnoff 	case SIOCDIFADDR:
247f7a39160SGleb Smirnoff 		sx_xlock(&in_control_sx);
248f7a39160SGleb Smirnoff 		error = in_difaddr_ioctl(data, ifp, td);
249f7a39160SGleb Smirnoff 		sx_xunlock(&in_control_sx);
250f7a39160SGleb Smirnoff 		return (error);
25177b89ad8SGleb Smirnoff 	case OSIOCAIFADDR:	/* 9.x compat */
2526d00fd9cSGleb Smirnoff 	case SIOCAIFADDR:
253f7a39160SGleb Smirnoff 		sx_xlock(&in_control_sx);
25477b89ad8SGleb Smirnoff 		error = in_aifaddr_ioctl(cmd, data, ifp, td);
255f7a39160SGleb Smirnoff 		sx_xunlock(&in_control_sx);
256f7a39160SGleb Smirnoff 		return (error);
257bbb3fb61SRobert Watson 	case SIOCSIFADDR:
258bbb3fb61SRobert Watson 	case SIOCSIFBRDADDR:
259bbb3fb61SRobert Watson 	case SIOCSIFDSTADDR:
260bbb3fb61SRobert Watson 	case SIOCSIFNETMASK:
26156cf9dc1SGleb Smirnoff 		/* We no longer support that old commands. */
2626d00fd9cSGleb Smirnoff 		return (EINVAL);
263bbb3fb61SRobert Watson 	default:
264f7a39160SGleb Smirnoff 		if (ifp->if_ioctl == NULL)
265bbb3fb61SRobert Watson 			return (EOPNOTSUPP);
266bbb3fb61SRobert Watson 		return ((*ifp->if_ioctl)(ifp, cmd, data));
2676a800098SYoshinobu Inoue 	}
2686a800098SYoshinobu Inoue 
269821b5cafSGleb Smirnoff 	if (addr->sin_addr.s_addr != INADDR_ANY &&
270821b5cafSGleb Smirnoff 	    prison_check_ip4(td->td_ucred, &addr->sin_addr) != 0)
271821b5cafSGleb Smirnoff 		return (EADDRNOTAVAIL);
272821b5cafSGleb Smirnoff 
273cf7b18f1SRobert Watson 	/*
274a7f77a39SXin LI 	 * Find address for this interface, if it exists.  If an
275a7f77a39SXin LI 	 * address was specified, find that one instead of the
276a7f77a39SXin LI 	 * first one on the interface, if possible.
277df8bae1dSRodney W. Grimes 	 */
278821b5cafSGleb Smirnoff 	IF_ADDR_RLOCK(ifp);
279821b5cafSGleb Smirnoff 	TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
2809706c950SGleb Smirnoff 		if (ifa->ifa_addr->sa_family != AF_INET)
2819706c950SGleb Smirnoff 			continue;
282821b5cafSGleb Smirnoff 		ia = (struct in_ifaddr *)ifa;
283821b5cafSGleb Smirnoff 		if (ia->ia_addr.sin_addr.s_addr == addr->sin_addr.s_addr)
284df8bae1dSRodney W. Grimes 			break;
285ca925d9cSJonathan Lemon 	}
286a7f77a39SXin LI 	if (ifa == NULL)
287a7f77a39SXin LI 		TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link)
288a7f77a39SXin LI 			if (ifa->ifa_addr->sa_family == AF_INET) {
289a7f77a39SXin LI 				ia = (struct in_ifaddr *)ifa;
290a7f77a39SXin LI 				if (prison_check_ip4(td->td_ucred,
291a7f77a39SXin LI 				    &ia->ia_addr.sin_addr) == 0)
292a7f77a39SXin LI 					break;
293a7f77a39SXin LI 			}
294f7a39160SGleb Smirnoff 
295821b5cafSGleb Smirnoff 	if (ifa == NULL) {
296821b5cafSGleb Smirnoff 		IF_ADDR_RUNLOCK(ifp);
297f7a39160SGleb Smirnoff 		return (EADDRNOTAVAIL);
298ac0aa473SBill Fenner 	}
299df8bae1dSRodney W. Grimes 
300588885f2SRobert Watson 	error = 0;
301df8bae1dSRodney W. Grimes 	switch (cmd) {
302f7a39160SGleb Smirnoff 	case SIOCGIFADDR:
303f7a39160SGleb Smirnoff 		*addr = ia->ia_addr;
304f7a39160SGleb Smirnoff 		break;
3058c0fec80SRobert Watson 
306f7a39160SGleb Smirnoff 	case SIOCGIFBRDADDR:
307f7a39160SGleb Smirnoff 		if ((ifp->if_flags & IFF_BROADCAST) == 0) {
308f7a39160SGleb Smirnoff 			error = EINVAL;
309df8bae1dSRodney W. Grimes 			break;
310df8bae1dSRodney W. Grimes 		}
311f7a39160SGleb Smirnoff 		*addr = ia->ia_broadaddr;
312f7a39160SGleb Smirnoff 		break;
313f7a39160SGleb Smirnoff 
314f7a39160SGleb Smirnoff 	case SIOCGIFDSTADDR:
315f7a39160SGleb Smirnoff 		if ((ifp->if_flags & IFF_POINTOPOINT) == 0) {
316f7a39160SGleb Smirnoff 			error = EINVAL;
317f7a39160SGleb Smirnoff 			break;
318f7a39160SGleb Smirnoff 		}
319f7a39160SGleb Smirnoff 		*addr = ia->ia_dstaddr;
320f7a39160SGleb Smirnoff 		break;
321f7a39160SGleb Smirnoff 
322f7a39160SGleb Smirnoff 	case SIOCGIFNETMASK:
323f7a39160SGleb Smirnoff 		*addr = ia->ia_sockmask;
324f7a39160SGleb Smirnoff 		break;
325f7a39160SGleb Smirnoff 	}
326f7a39160SGleb Smirnoff 
327821b5cafSGleb Smirnoff 	IF_ADDR_RUNLOCK(ifp);
328f7a39160SGleb Smirnoff 
329f7a39160SGleb Smirnoff 	return (error);
3301067217dSGarrett Wollman }
331f7a39160SGleb Smirnoff 
332f7a39160SGleb Smirnoff static int
33377b89ad8SGleb Smirnoff in_aifaddr_ioctl(u_long cmd, caddr_t data, struct ifnet *ifp, struct thread *td)
334f7a39160SGleb Smirnoff {
335f7a39160SGleb Smirnoff 	const struct in_aliasreq *ifra = (struct in_aliasreq *)data;
336f7a39160SGleb Smirnoff 	const struct sockaddr_in *addr = &ifra->ifra_addr;
337f7a39160SGleb Smirnoff 	const struct sockaddr_in *broadaddr = &ifra->ifra_broadaddr;
338f7a39160SGleb Smirnoff 	const struct sockaddr_in *mask = &ifra->ifra_mask;
339f7a39160SGleb Smirnoff 	const struct sockaddr_in *dstaddr = &ifra->ifra_dstaddr;
34077b89ad8SGleb Smirnoff 	const int vhid = (cmd == SIOCAIFADDR) ? ifra->ifra_vhid : 0;
341f7a39160SGleb Smirnoff 	struct ifaddr *ifa;
342f7a39160SGleb Smirnoff 	struct in_ifaddr *ia;
343f7a39160SGleb Smirnoff 	bool iaIsFirst;
344f7a39160SGleb Smirnoff 	int error = 0;
345f7a39160SGleb Smirnoff 
346f7a39160SGleb Smirnoff 	error = priv_check(td, PRIV_NET_ADDIFADDR);
347f7a39160SGleb Smirnoff 	if (error)
348f7a39160SGleb Smirnoff 		return (error);
349f7a39160SGleb Smirnoff 
350f7a39160SGleb Smirnoff 	/*
351f7a39160SGleb Smirnoff 	 * ifra_addr must be present and be of INET family.
352f7a39160SGleb Smirnoff 	 * ifra_broadaddr/ifra_dstaddr and ifra_mask are optional.
353f7a39160SGleb Smirnoff 	 */
354f7a39160SGleb Smirnoff 	if (addr->sin_len != sizeof(struct sockaddr_in) ||
355f7a39160SGleb Smirnoff 	    addr->sin_family != AF_INET)
356f7a39160SGleb Smirnoff 		return (EINVAL);
357f7a39160SGleb Smirnoff 	if (broadaddr->sin_len != 0 &&
358f7a39160SGleb Smirnoff 	    (broadaddr->sin_len != sizeof(struct sockaddr_in) ||
359f7a39160SGleb Smirnoff 	    broadaddr->sin_family != AF_INET))
360f7a39160SGleb Smirnoff 		return (EINVAL);
361f7a39160SGleb Smirnoff 	if (mask->sin_len != 0 &&
362f7a39160SGleb Smirnoff 	    (mask->sin_len != sizeof(struct sockaddr_in) ||
363f7a39160SGleb Smirnoff 	    mask->sin_family != AF_INET))
364f7a39160SGleb Smirnoff 		return (EINVAL);
365f7a39160SGleb Smirnoff 	if ((ifp->if_flags & IFF_POINTOPOINT) &&
366f7a39160SGleb Smirnoff 	    (dstaddr->sin_len != sizeof(struct sockaddr_in) ||
367f7a39160SGleb Smirnoff 	     dstaddr->sin_addr.s_addr == INADDR_ANY))
368f7a39160SGleb Smirnoff 		return (EDESTADDRREQ);
369f7a39160SGleb Smirnoff 	if (vhid > 0 && carp_attach_p == NULL)
370f7a39160SGleb Smirnoff 		return (EPROTONOSUPPORT);
371f7a39160SGleb Smirnoff 
372f7a39160SGleb Smirnoff 	/*
373f7a39160SGleb Smirnoff 	 * See whether address already exist.
374f7a39160SGleb Smirnoff 	 */
375f7a39160SGleb Smirnoff 	iaIsFirst = true;
376f7a39160SGleb Smirnoff 	ia = NULL;
377f7a39160SGleb Smirnoff 	IF_ADDR_RLOCK(ifp);
378f7a39160SGleb Smirnoff 	TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
3799706c950SGleb Smirnoff 		struct in_ifaddr *it;
380f7a39160SGleb Smirnoff 
3819706c950SGleb Smirnoff 		if (ifa->ifa_addr->sa_family != AF_INET)
382f7a39160SGleb Smirnoff 			continue;
383f7a39160SGleb Smirnoff 
3849706c950SGleb Smirnoff 		it = (struct in_ifaddr *)ifa;
385f7a39160SGleb Smirnoff 		iaIsFirst = false;
386f7a39160SGleb Smirnoff 		if (it->ia_addr.sin_addr.s_addr == addr->sin_addr.s_addr &&
387f7a39160SGleb Smirnoff 		    prison_check_ip4(td->td_ucred, &addr->sin_addr) == 0)
388f7a39160SGleb Smirnoff 			ia = it;
3891067217dSGarrett Wollman 	}
390f7a39160SGleb Smirnoff 	IF_ADDR_RUNLOCK(ifp);
391f7a39160SGleb Smirnoff 
392f7a39160SGleb Smirnoff 	if (ia != NULL)
393f7a39160SGleb Smirnoff 		(void )in_difaddr_ioctl(data, ifp, td);
394f7a39160SGleb Smirnoff 
39546758960SGleb Smirnoff 	ifa = ifa_alloc(sizeof(struct in_ifaddr), M_WAITOK);
39646758960SGleb Smirnoff 	ia = (struct in_ifaddr *)ifa;
39759562606SGarrett Wollman 	ifa->ifa_addr = (struct sockaddr *)&ia->ia_addr;
39859562606SGarrett Wollman 	ifa->ifa_dstaddr = (struct sockaddr *)&ia->ia_dstaddr;
39959562606SGarrett Wollman 	ifa->ifa_netmask = (struct sockaddr *)&ia->ia_sockmask;
40019fc74fbSJeffrey Hsu 
401f7a39160SGleb Smirnoff 	ia->ia_ifp = ifp;
402f7a39160SGleb Smirnoff 	ia->ia_addr = *addr;
403f7a39160SGleb Smirnoff 	if (mask->sin_len != 0) {
404f7a39160SGleb Smirnoff 		ia->ia_sockmask = *mask;
405f7a39160SGleb Smirnoff 		ia->ia_subnetmask = ntohl(ia->ia_sockmask.sin_addr.s_addr);
406f7a39160SGleb Smirnoff 	} else {
407f7a39160SGleb Smirnoff 		in_addr_t i = ntohl(addr->sin_addr.s_addr);
408f7a39160SGleb Smirnoff 
409f7a39160SGleb Smirnoff 		/*
410f7a39160SGleb Smirnoff 	 	 * Be compatible with network classes, if netmask isn't
411f7a39160SGleb Smirnoff 		 * supplied, guess it based on classes.
412f7a39160SGleb Smirnoff 	 	 */
413f7a39160SGleb Smirnoff 		if (IN_CLASSA(i))
414f7a39160SGleb Smirnoff 			ia->ia_subnetmask = IN_CLASSA_NET;
415f7a39160SGleb Smirnoff 		else if (IN_CLASSB(i))
416f7a39160SGleb Smirnoff 			ia->ia_subnetmask = IN_CLASSB_NET;
417f7a39160SGleb Smirnoff 		else
418f7a39160SGleb Smirnoff 			ia->ia_subnetmask = IN_CLASSC_NET;
419f7a39160SGleb Smirnoff 		ia->ia_sockmask.sin_addr.s_addr = htonl(ia->ia_subnetmask);
420f7a39160SGleb Smirnoff 	}
421f7a39160SGleb Smirnoff 	ia->ia_subnet = ntohl(addr->sin_addr.s_addr) & ia->ia_subnetmask;
422f7a39160SGleb Smirnoff 	in_socktrim(&ia->ia_sockmask);
423f7a39160SGleb Smirnoff 
424df8bae1dSRodney W. Grimes 	if (ifp->if_flags & IFF_BROADCAST) {
425f7a39160SGleb Smirnoff 		if (broadaddr->sin_len != 0) {
426f7a39160SGleb Smirnoff 			ia->ia_broadaddr = *broadaddr;
427f7a39160SGleb Smirnoff 		} else if (ia->ia_subnetmask == IN_RFC3021_MASK) {
428f7a39160SGleb Smirnoff 			ia->ia_broadaddr.sin_addr.s_addr = INADDR_BROADCAST;
429f7a39160SGleb Smirnoff 			ia->ia_broadaddr.sin_len = sizeof(struct sockaddr_in);
430f7a39160SGleb Smirnoff 			ia->ia_broadaddr.sin_family = AF_INET;
431f7a39160SGleb Smirnoff 		} else {
432f7a39160SGleb Smirnoff 			ia->ia_broadaddr.sin_addr.s_addr =
433f7a39160SGleb Smirnoff 			    htonl(ia->ia_subnet | ~ia->ia_subnetmask);
434f7a39160SGleb Smirnoff 			ia->ia_broadaddr.sin_len = sizeof(struct sockaddr_in);
435df8bae1dSRodney W. Grimes 			ia->ia_broadaddr.sin_family = AF_INET;
436df8bae1dSRodney W. Grimes 		}
437f7a39160SGleb Smirnoff 	}
438f7a39160SGleb Smirnoff 
439f7a39160SGleb Smirnoff 	if (ifp->if_flags & IFF_POINTOPOINT)
440f7a39160SGleb Smirnoff 		ia->ia_dstaddr = *dstaddr;
441f7a39160SGleb Smirnoff 
442f7a39160SGleb Smirnoff 	/* XXXGL: rtinit() needs this strange assignment. */
443f7a39160SGleb Smirnoff 	if (ifp->if_flags & IFF_LOOPBACK)
444f7a39160SGleb Smirnoff                 ia->ia_dstaddr = ia->ia_addr;
445f3d30eb2SGleb Smirnoff 
4465af464bbSSteven Hartland 	if (vhid != 0) {
4475af464bbSSteven Hartland 		error = (*carp_attach_p)(&ia->ia_ifa, vhid);
4485af464bbSSteven Hartland 		if (error)
4495af464bbSSteven Hartland 			return (error);
4505af464bbSSteven Hartland 	}
4515af464bbSSteven Hartland 
452a49b317cSAlexander V. Chernikov 	/* if_addrhead is already referenced by ifa_alloc() */
453137f91e8SJohn Baldwin 	IF_ADDR_WLOCK(ifp);
4548021456aSRobert Watson 	TAILQ_INSERT_TAIL(&ifp->if_addrhead, ifa, ifa_link);
455137f91e8SJohn Baldwin 	IF_ADDR_WUNLOCK(ifp);
456f7a39160SGleb Smirnoff 
4578c0fec80SRobert Watson 	ifa_ref(ifa);			/* in_ifaddrhead */
4582d9cfabaSRobert Watson 	IN_IFADDR_WLOCK();
459603724d3SBjoern A. Zeeb 	TAILQ_INSERT_TAIL(&V_in_ifaddrhead, ia, ia_link);
460f7a39160SGleb Smirnoff 	LIST_INSERT_HEAD(INADDR_HASH(ia->ia_addr.sin_addr.s_addr), ia, ia_hash);
4612d9cfabaSRobert Watson 	IN_IFADDR_WUNLOCK();
462df8bae1dSRodney W. Grimes 
463f7a39160SGleb Smirnoff 	/*
464f7a39160SGleb Smirnoff 	 * Give the interface a chance to initialize
465f7a39160SGleb Smirnoff 	 * if this is its first address,
466f7a39160SGleb Smirnoff 	 * and to validate the address if necessary.
467f7a39160SGleb Smirnoff 	 */
468d34165f7SSteven Hartland 	if (ifp->if_ioctl != NULL) {
469f7a39160SGleb Smirnoff 		error = (*ifp->if_ioctl)(ifp, SIOCSIFADDR, (caddr_t)ia);
470f7a39160SGleb Smirnoff 		if (error)
4715af464bbSSteven Hartland 			goto fail1;
472d34165f7SSteven Hartland 	}
473f7a39160SGleb Smirnoff 
474f7a39160SGleb Smirnoff 	/*
475f7a39160SGleb Smirnoff 	 * Add route for the network.
476f7a39160SGleb Smirnoff 	 */
477f7a39160SGleb Smirnoff 	if (vhid == 0) {
478f7a39160SGleb Smirnoff 		int flags = RTF_UP;
479f7a39160SGleb Smirnoff 
480f7a39160SGleb Smirnoff 		if (ifp->if_flags & (IFF_LOOPBACK|IFF_POINTOPOINT))
481f7a39160SGleb Smirnoff 			flags |= RTF_HOST;
482f7a39160SGleb Smirnoff 
483f7a39160SGleb Smirnoff 		error = in_addprefix(ia, flags);
484f7a39160SGleb Smirnoff 		if (error)
4855af464bbSSteven Hartland 			goto fail1;
486df8bae1dSRodney W. Grimes 	}
487df8bae1dSRodney W. Grimes 
488588885f2SRobert Watson 	/*
489f7a39160SGleb Smirnoff 	 * Add a loopback route to self.
490588885f2SRobert Watson 	 */
491f7a39160SGleb Smirnoff 	if (vhid == 0 && (ifp->if_flags & IFF_LOOPBACK) == 0 &&
492c1f7c3f5SGleb Smirnoff 	    ia->ia_addr.sin_addr.s_addr != INADDR_ANY &&
493c1f7c3f5SGleb Smirnoff 	    !((ifp->if_flags & IFF_POINTOPOINT) &&
494c1f7c3f5SGleb Smirnoff 	     ia->ia_dstaddr.sin_addr.s_addr == ia->ia_addr.sin_addr.s_addr)) {
495f7a39160SGleb Smirnoff 		struct in_ifaddr *eia;
496df8bae1dSRodney W. Grimes 
497f7a39160SGleb Smirnoff 		eia = in_localip_more(ia);
498f7a39160SGleb Smirnoff 
499f7a39160SGleb Smirnoff 		if (eia == NULL) {
500f7a39160SGleb Smirnoff 			error = ifa_add_loopback_route((struct ifaddr *)ia,
501f7a39160SGleb Smirnoff 			    (struct sockaddr *)&ia->ia_addr);
502f7a39160SGleb Smirnoff 			if (error)
5035af464bbSSteven Hartland 				goto fail2;
504f7a39160SGleb Smirnoff 		} else
505f7a39160SGleb Smirnoff 			ifa_free(&eia->ia_ifa);
506588885f2SRobert Watson 	}
507df8bae1dSRodney W. Grimes 
508f7a39160SGleb Smirnoff 	if (iaIsFirst && (ifp->if_flags & IFF_MULTICAST)) {
509f7a39160SGleb Smirnoff 		struct in_addr allhosts_addr;
510f7a39160SGleb Smirnoff 		struct in_ifinfo *ii;
511df8bae1dSRodney W. Grimes 
512c75aa354SBruce M Simpson 		ii = ((struct in_ifinfo *)ifp->if_afdata[AF_INET]);
513f7a39160SGleb Smirnoff 		allhosts_addr.s_addr = htonl(INADDR_ALLHOSTS_GROUP);
514df8bae1dSRodney W. Grimes 
515f7a39160SGleb Smirnoff 		error = in_joingroup(ifp, &allhosts_addr, NULL,
516f7a39160SGleb Smirnoff 			&ii->ii_allhosts);
517f7a39160SGleb Smirnoff 	}
518f7a39160SGleb Smirnoff 
519f7a39160SGleb Smirnoff 	EVENTHANDLER_INVOKE(ifaddr_event, ifp);
520f7a39160SGleb Smirnoff 
521f7a39160SGleb Smirnoff 	return (error);
522f7a39160SGleb Smirnoff 
5235af464bbSSteven Hartland fail2:
524f7a39160SGleb Smirnoff 	if (vhid == 0)
525f7a39160SGleb Smirnoff 		(void )in_scrubprefix(ia, LLE_STATIC);
526f7a39160SGleb Smirnoff 
5275af464bbSSteven Hartland fail1:
528f7a39160SGleb Smirnoff 	if (ia->ia_ifa.ifa_carp)
529f7a39160SGleb Smirnoff 		(*carp_detach_p)(&ia->ia_ifa);
530f7a39160SGleb Smirnoff 
531f7a39160SGleb Smirnoff 	IF_ADDR_WLOCK(ifp);
532f7a39160SGleb Smirnoff 	TAILQ_REMOVE(&ifp->if_addrhead, &ia->ia_ifa, ifa_link);
533f7a39160SGleb Smirnoff 	IF_ADDR_WUNLOCK(ifp);
534a49b317cSAlexander V. Chernikov 	ifa_free(&ia->ia_ifa);		/* if_addrhead */
535f7a39160SGleb Smirnoff 
536f7a39160SGleb Smirnoff 	IN_IFADDR_WLOCK();
537f7a39160SGleb Smirnoff 	TAILQ_REMOVE(&V_in_ifaddrhead, ia, ia_link);
538f7a39160SGleb Smirnoff 	LIST_REMOVE(ia, ia_hash);
539f7a39160SGleb Smirnoff 	IN_IFADDR_WUNLOCK();
540a49b317cSAlexander V. Chernikov 	ifa_free(&ia->ia_ifa);		/* in_ifaddrhead */
541f7a39160SGleb Smirnoff 
542f7a39160SGleb Smirnoff 	return (error);
543f7a39160SGleb Smirnoff }
544f7a39160SGleb Smirnoff 
545f7a39160SGleb Smirnoff static int
546f7a39160SGleb Smirnoff in_difaddr_ioctl(caddr_t data, struct ifnet *ifp, struct thread *td)
547f7a39160SGleb Smirnoff {
548f7a39160SGleb Smirnoff 	const struct ifreq *ifr = (struct ifreq *)data;
5496224cd89SNathan Whitehorn 	const struct sockaddr_in *addr = (const struct sockaddr_in *)
5506224cd89SNathan Whitehorn 	    &ifr->ifr_addr;
551f7a39160SGleb Smirnoff 	struct ifaddr *ifa;
552f7a39160SGleb Smirnoff 	struct in_ifaddr *ia;
553f7a39160SGleb Smirnoff 	bool deleteAny, iaIsLast;
554f7a39160SGleb Smirnoff 	int error;
555f7a39160SGleb Smirnoff 
556f7a39160SGleb Smirnoff 	if (td != NULL) {
557f7a39160SGleb Smirnoff 		error = priv_check(td, PRIV_NET_DELIFADDR);
558f7a39160SGleb Smirnoff 		if (error)
559f7a39160SGleb Smirnoff 			return (error);
560f7a39160SGleb Smirnoff 	}
561f7a39160SGleb Smirnoff 
562f7a39160SGleb Smirnoff 	if (addr->sin_len != sizeof(struct sockaddr_in) ||
563f7a39160SGleb Smirnoff 	    addr->sin_family != AF_INET)
564f7a39160SGleb Smirnoff 		deleteAny = true;
565f7a39160SGleb Smirnoff 	else
566f7a39160SGleb Smirnoff 		deleteAny = false;
567f7a39160SGleb Smirnoff 
568f7a39160SGleb Smirnoff 	iaIsLast = true;
569f7a39160SGleb Smirnoff 	ia = NULL;
570f7a39160SGleb Smirnoff 	IF_ADDR_WLOCK(ifp);
571f7a39160SGleb Smirnoff 	TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
5729706c950SGleb Smirnoff 		struct in_ifaddr *it;
573f7a39160SGleb Smirnoff 
5749706c950SGleb Smirnoff 		if (ifa->ifa_addr->sa_family != AF_INET)
575f7a39160SGleb Smirnoff 			continue;
576f7a39160SGleb Smirnoff 
5779706c950SGleb Smirnoff 		it = (struct in_ifaddr *)ifa;
578f7a39160SGleb Smirnoff 		if (deleteAny && ia == NULL && (td == NULL ||
579f7a39160SGleb Smirnoff 		    prison_check_ip4(td->td_ucred, &it->ia_addr.sin_addr) == 0))
580f7a39160SGleb Smirnoff 			ia = it;
581f7a39160SGleb Smirnoff 
582f7a39160SGleb Smirnoff 		if (it->ia_addr.sin_addr.s_addr == addr->sin_addr.s_addr &&
583f7a39160SGleb Smirnoff 		    (td == NULL || prison_check_ip4(td->td_ucred,
584f7a39160SGleb Smirnoff 		    &addr->sin_addr) == 0))
585f7a39160SGleb Smirnoff 			ia = it;
586f7a39160SGleb Smirnoff 
587f7a39160SGleb Smirnoff 		if (it != ia)
588f7a39160SGleb Smirnoff 			iaIsLast = false;
589f7a39160SGleb Smirnoff 	}
590f7a39160SGleb Smirnoff 
591f7a39160SGleb Smirnoff 	if (ia == NULL) {
592f7a39160SGleb Smirnoff 		IF_ADDR_WUNLOCK(ifp);
593f7a39160SGleb Smirnoff 		return (EADDRNOTAVAIL);
594f7a39160SGleb Smirnoff 	}
595f7a39160SGleb Smirnoff 
596f7a39160SGleb Smirnoff 	TAILQ_REMOVE(&ifp->if_addrhead, &ia->ia_ifa, ifa_link);
597f7a39160SGleb Smirnoff 	IF_ADDR_WUNLOCK(ifp);
598f7a39160SGleb Smirnoff 	ifa_free(&ia->ia_ifa);		/* if_addrhead */
599f7a39160SGleb Smirnoff 
600f7a39160SGleb Smirnoff 	IN_IFADDR_WLOCK();
601f7a39160SGleb Smirnoff 	TAILQ_REMOVE(&V_in_ifaddrhead, ia, ia_link);
602f7a39160SGleb Smirnoff 	LIST_REMOVE(ia, ia_hash);
603f7a39160SGleb Smirnoff 	IN_IFADDR_WUNLOCK();
604f7a39160SGleb Smirnoff 
605089cdfadSRuslan Ermilov 	/*
606237bf7f7SGleb Smirnoff 	 * in_scrubprefix() kills the interface route.
607089cdfadSRuslan Ermilov 	 */
608237bf7f7SGleb Smirnoff 	in_scrubprefix(ia, LLE_STATIC);
609588885f2SRobert Watson 
610c655b7c4SDavid Greenman 	/*
611089cdfadSRuslan Ermilov 	 * in_ifadown gets rid of all the rest of
612089cdfadSRuslan Ermilov 	 * the routes.  This is not quite the right
613089cdfadSRuslan Ermilov 	 * thing to do, but at least if we are running
614089cdfadSRuslan Ermilov 	 * a routing process they will come back.
615089cdfadSRuslan Ermilov 	 */
61691854268SRuslan Ermilov 	in_ifadown(&ia->ia_ifa, 1);
6170f02fdacSBrian Somers 
61808b68b0eSGleb Smirnoff 	if (ia->ia_ifa.ifa_carp)
61908b68b0eSGleb Smirnoff 		(*carp_detach_p)(&ia->ia_ifa);
62008b68b0eSGleb Smirnoff 
621f7e083afSBruce M Simpson 	/*
622f7e083afSBruce M Simpson 	 * If this is the last IPv4 address configured on this
623f7e083afSBruce M Simpson 	 * interface, leave the all-hosts group.
624d10910e6SBruce M Simpson 	 * No state-change report need be transmitted.
625f7e083afSBruce M Simpson 	 */
626f7a39160SGleb Smirnoff 	if (iaIsLast && (ifp->if_flags & IFF_MULTICAST)) {
627f7a39160SGleb Smirnoff 		struct in_ifinfo *ii;
628f7a39160SGleb Smirnoff 
629c75aa354SBruce M Simpson 		ii = ((struct in_ifinfo *)ifp->if_afdata[AF_INET]);
630f7e083afSBruce M Simpson 		IN_MULTI_LOCK();
631d10910e6SBruce M Simpson 		if (ii->ii_allhosts) {
6326d00fd9cSGleb Smirnoff 			(void)in_leavegroup_locked(ii->ii_allhosts, NULL);
633d10910e6SBruce M Simpson 			ii->ii_allhosts = NULL;
634d10910e6SBruce M Simpson 		}
635f7e083afSBruce M Simpson 		IN_MULTI_UNLOCK();
636f7a39160SGleb Smirnoff 	}
6376d00fd9cSGleb Smirnoff 
638f7a39160SGleb Smirnoff 	EVENTHANDLER_INVOKE(ifaddr_event, ifp);
639a49b317cSAlexander V. Chernikov 	ifa_free(&ia->ia_ifa);		/* in_ifaddrhead */
640f7a39160SGleb Smirnoff 
641f7a39160SGleb Smirnoff 	return (0);
642df8bae1dSRodney W. Grimes }
643df8bae1dSRodney W. Grimes 
64448321abeSMax Laier #define rtinitflags(x) \
64548321abeSMax Laier 	((((x)->ia_ifp->if_flags & (IFF_LOOPBACK | IFF_POINTOPOINT)) != 0) \
64648321abeSMax Laier 	    ? RTF_HOST : 0)
647ccbb9c35SQing Li 
648ccbb9c35SQing Li /*
649fbdd20a1SMatt Jacob  * Check if we have a route for the given prefix already or add one accordingly.
65048321abeSMax Laier  */
65108b68b0eSGleb Smirnoff int
652f2565d68SRobert Watson in_addprefix(struct in_ifaddr *target, int flags)
65348321abeSMax Laier {
654cc0a3c8cSAndrey V. Elsukov 	struct rm_priotracker in_ifa_tracker;
65548321abeSMax Laier 	struct in_ifaddr *ia;
656bfb26eecSGleb Smirnoff 	struct in_addr prefix, mask, p, m;
6570cfee0c2SAlan Somers 	int error;
65848321abeSMax Laier 
659fbdd20a1SMatt Jacob 	if ((flags & RTF_HOST) != 0) {
66048321abeSMax Laier 		prefix = target->ia_dstaddr.sin_addr;
661fbdd20a1SMatt Jacob 		mask.s_addr = 0;
662fbdd20a1SMatt Jacob 	} else {
66348321abeSMax Laier 		prefix = target->ia_addr.sin_addr;
66448321abeSMax Laier 		mask = target->ia_sockmask.sin_addr;
66548321abeSMax Laier 		prefix.s_addr &= mask.s_addr;
66648321abeSMax Laier 	}
66748321abeSMax Laier 
668cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RLOCK(&in_ifa_tracker);
6690cfee0c2SAlan Somers 	/* Look for an existing address with the same prefix, mask, and fib */
670603724d3SBjoern A. Zeeb 	TAILQ_FOREACH(ia, &V_in_ifaddrhead, ia_link) {
671bfb26eecSGleb Smirnoff 		if (rtinitflags(ia)) {
67272366606SKevin Lo 			p = ia->ia_dstaddr.sin_addr;
67348321abeSMax Laier 
67448321abeSMax Laier 			if (prefix.s_addr != p.s_addr)
67548321abeSMax Laier 				continue;
676bfb26eecSGleb Smirnoff 		} else {
677bfb26eecSGleb Smirnoff 			p = ia->ia_addr.sin_addr;
678bfb26eecSGleb Smirnoff 			m = ia->ia_sockmask.sin_addr;
679bfb26eecSGleb Smirnoff 			p.s_addr &= m.s_addr;
680bfb26eecSGleb Smirnoff 
681bfb26eecSGleb Smirnoff 			if (prefix.s_addr != p.s_addr ||
682bfb26eecSGleb Smirnoff 			    mask.s_addr != m.s_addr)
683bfb26eecSGleb Smirnoff 				continue;
684bfb26eecSGleb Smirnoff 		}
6850cfee0c2SAlan Somers 		if (target->ia_ifp->if_fib != ia->ia_ifp->if_fib)
6860cfee0c2SAlan Somers 			continue;
68748321abeSMax Laier 
68848321abeSMax Laier 		/*
68948321abeSMax Laier 		 * If we got a matching prefix route inserted by other
69048321abeSMax Laier 		 * interface address, we are done here.
69148321abeSMax Laier 		 */
6921ae95409SGleb Smirnoff 		if (ia->ia_flags & IFA_ROUTE) {
693c7ea0aa6SQing Li #ifdef RADIX_MPATH
694c7ea0aa6SQing Li 			if (ia->ia_addr.sin_addr.s_addr ==
69542db1b87SBjoern A. Zeeb 			    target->ia_addr.sin_addr.s_addr) {
696cc0a3c8cSAndrey V. Elsukov 				IN_IFADDR_RUNLOCK(&in_ifa_tracker);
697c7ea0aa6SQing Li 				return (EEXIST);
69842db1b87SBjoern A. Zeeb 			} else
699c7ea0aa6SQing Li 				break;
700c7ea0aa6SQing Li #endif
70108b68b0eSGleb Smirnoff 			if (V_nosameprefix) {
702cc0a3c8cSAndrey V. Elsukov 				IN_IFADDR_RUNLOCK(&in_ifa_tracker);
7031ae95409SGleb Smirnoff 				return (EEXIST);
7042d9cfabaSRobert Watson 			} else {
7050cfee0c2SAlan Somers 				int fibnum;
7060cfee0c2SAlan Somers 
707cc45ae40SHiroki Sato 				fibnum = V_rt_add_addr_allfibs ? RT_ALL_FIBS :
7080cfee0c2SAlan Somers 					target->ia_ifp->if_fib;
709d375edc9SAlexander V. Chernikov 				rt_addrmsg(RTM_ADD, &target->ia_ifa, fibnum);
710cc0a3c8cSAndrey V. Elsukov 				IN_IFADDR_RUNLOCK(&in_ifa_tracker);
7111ae95409SGleb Smirnoff 				return (0);
7121ae95409SGleb Smirnoff 			}
71348321abeSMax Laier 		}
7142d9cfabaSRobert Watson 	}
715cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RUNLOCK(&in_ifa_tracker);
71648321abeSMax Laier 
71748321abeSMax Laier 	/*
71848321abeSMax Laier 	 * No-one seem to have this prefix route, so we try to insert it.
71948321abeSMax Laier 	 */
72048321abeSMax Laier 	error = rtinit(&target->ia_ifa, (int)RTM_ADD, flags);
72148321abeSMax Laier 	if (!error)
72248321abeSMax Laier 		target->ia_flags |= IFA_ROUTE;
723460473a0SBjoern A. Zeeb 	return (error);
72448321abeSMax Laier }
72548321abeSMax Laier 
72648321abeSMax Laier /*
72748321abeSMax Laier  * If there is no other address in the system that can serve a route to the
72848321abeSMax Laier  * same prefix, remove the route.  Hand over the route to the new address
72948321abeSMax Laier  * otherwise.
73048321abeSMax Laier  */
73108b68b0eSGleb Smirnoff int
7325b84dc78SQing Li in_scrubprefix(struct in_ifaddr *target, u_int flags)
73348321abeSMax Laier {
734cc0a3c8cSAndrey V. Elsukov 	struct rm_priotracker in_ifa_tracker;
73548321abeSMax Laier 	struct in_ifaddr *ia;
73655174c34SGleb Smirnoff 	struct in_addr prefix, mask, p, m;
7377278b62aSAlan Somers 	int error = 0;
738c9d763bfSQing Li 	struct sockaddr_in prefix0, mask0;
73948321abeSMax Laier 
740df813b7eSQing Li 	/*
741df813b7eSQing Li 	 * Remove the loopback route to the interface address.
742df813b7eSQing Li 	 */
74392fac994SQing Li 	if ((target->ia_addr.sin_addr.s_addr != INADDR_ANY) &&
744c7ab6602SQing Li 	    !(target->ia_ifp->if_flags & IFF_LOOPBACK) &&
745f7a39160SGleb Smirnoff 	    (flags & LLE_STATIC)) {
746f7a39160SGleb Smirnoff 		struct in_ifaddr *eia;
747c7ab6602SQing Li 
748f7a39160SGleb Smirnoff 		eia = in_localip_more(target);
749f7a39160SGleb Smirnoff 
750f7a39160SGleb Smirnoff 		if (eia != NULL) {
7517278b62aSAlan Somers 			int fibnum = target->ia_ifp->if_fib;
7527278b62aSAlan Somers 
753f7a39160SGleb Smirnoff 			error = ifa_switch_loopback_route((struct ifaddr *)eia,
7540489b891SAlan Somers 			    (struct sockaddr *)&target->ia_addr, fibnum);
755f7a39160SGleb Smirnoff 			ifa_free(&eia->ia_ifa);
756f7a39160SGleb Smirnoff 		} else {
7579bb7d0f4SQing Li 			error = ifa_del_loopback_route((struct ifaddr *)target,
7589bb7d0f4SQing Li 			    (struct sockaddr *)&target->ia_addr);
7595b84dc78SQing Li 		}
760f7a39160SGleb Smirnoff 
761f7a39160SGleb Smirnoff 		if (!(target->ia_ifp->if_flags & IFF_NOARP))
762fa3cfd39SQing Li 			/* remove arp cache */
763f7a39160SGleb Smirnoff 			arp_ifscrub(target->ia_ifp,
764f7a39160SGleb Smirnoff 			    IA_SIN(target)->sin_addr.s_addr);
765ebc90701SQing Li 	}
766ebc90701SQing Li 
76755174c34SGleb Smirnoff 	if (rtinitflags(target)) {
76848321abeSMax Laier 		prefix = target->ia_dstaddr.sin_addr;
76955174c34SGleb Smirnoff 		mask.s_addr = 0;
77055174c34SGleb Smirnoff 	} else {
77148321abeSMax Laier 		prefix = target->ia_addr.sin_addr;
77248321abeSMax Laier 		mask = target->ia_sockmask.sin_addr;
77348321abeSMax Laier 		prefix.s_addr &= mask.s_addr;
77448321abeSMax Laier 	}
77548321abeSMax Laier 
776ccbb9c35SQing Li 	if ((target->ia_flags & IFA_ROUTE) == 0) {
7777278b62aSAlan Somers 		int fibnum;
7787278b62aSAlan Somers 
779cc45ae40SHiroki Sato 		fibnum = V_rt_add_addr_allfibs ? RT_ALL_FIBS :
7807278b62aSAlan Somers 			target->ia_ifp->if_fib;
781d375edc9SAlexander V. Chernikov 		rt_addrmsg(RTM_DELETE, &target->ia_ifa, fibnum);
782ccbb9c35SQing Li 		return (0);
783ccbb9c35SQing Li 	}
784ccbb9c35SQing Li 
785cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RLOCK(&in_ifa_tracker);
786603724d3SBjoern A. Zeeb 	TAILQ_FOREACH(ia, &V_in_ifaddrhead, ia_link) {
78755174c34SGleb Smirnoff 		if (rtinitflags(ia)) {
78848321abeSMax Laier 			p = ia->ia_dstaddr.sin_addr;
78955174c34SGleb Smirnoff 
79055174c34SGleb Smirnoff 			if (prefix.s_addr != p.s_addr)
79155174c34SGleb Smirnoff 				continue;
79255174c34SGleb Smirnoff 		} else {
79348321abeSMax Laier 			p = ia->ia_addr.sin_addr;
79455174c34SGleb Smirnoff 			m = ia->ia_sockmask.sin_addr;
79555174c34SGleb Smirnoff 			p.s_addr &= m.s_addr;
79655174c34SGleb Smirnoff 
79755174c34SGleb Smirnoff 			if (prefix.s_addr != p.s_addr ||
79855174c34SGleb Smirnoff 			    mask.s_addr != m.s_addr)
79955174c34SGleb Smirnoff 				continue;
80048321abeSMax Laier 		}
80148321abeSMax Laier 
80255174c34SGleb Smirnoff 		if ((ia->ia_ifp->if_flags & IFF_UP) == 0)
80348321abeSMax Laier 			continue;
80448321abeSMax Laier 
80548321abeSMax Laier 		/*
80648321abeSMax Laier 		 * If we got a matching prefix address, move IFA_ROUTE and
80748321abeSMax Laier 		 * the route itself to it.  Make sure that routing daemons
80848321abeSMax Laier 		 * get a heads-up.
80948321abeSMax Laier 		 */
81008b68b0eSGleb Smirnoff 		if ((ia->ia_flags & IFA_ROUTE) == 0) {
81179d51435SSergey Kandaurov 			ifa_ref(&ia->ia_ifa);
812cc0a3c8cSAndrey V. Elsukov 			IN_IFADDR_RUNLOCK(&in_ifa_tracker);
81392322284SQing Li 			error = rtinit(&(target->ia_ifa), (int)RTM_DELETE,
81448321abeSMax Laier 			    rtinitflags(target));
81592322284SQing Li 			if (error == 0)
81648321abeSMax Laier 				target->ia_flags &= ~IFA_ROUTE;
81792322284SQing Li 			else
81892322284SQing Li 				log(LOG_INFO, "in_scrubprefix: err=%d, old prefix delete failed\n",
81992322284SQing Li 					error);
82048321abeSMax Laier 			error = rtinit(&ia->ia_ifa, (int)RTM_ADD,
82148321abeSMax Laier 			    rtinitflags(ia) | RTF_UP);
82248321abeSMax Laier 			if (error == 0)
82348321abeSMax Laier 				ia->ia_flags |= IFA_ROUTE;
82492322284SQing Li 			else
82592322284SQing Li 				log(LOG_INFO, "in_scrubprefix: err=%d, new prefix add failed\n",
82692322284SQing Li 					error);
82779d51435SSergey Kandaurov 			ifa_free(&ia->ia_ifa);
828460473a0SBjoern A. Zeeb 			return (error);
82948321abeSMax Laier 		}
83048321abeSMax Laier 	}
831cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RUNLOCK(&in_ifa_tracker);
83248321abeSMax Laier 
83348321abeSMax Laier 	/*
834c9d763bfSQing Li 	 * remove all L2 entries on the given prefix
835c9d763bfSQing Li 	 */
836c9d763bfSQing Li 	bzero(&prefix0, sizeof(prefix0));
837c9d763bfSQing Li 	prefix0.sin_len = sizeof(prefix0);
838c9d763bfSQing Li 	prefix0.sin_family = AF_INET;
839c9d763bfSQing Li 	prefix0.sin_addr.s_addr = target->ia_subnet;
840c9d763bfSQing Li 	bzero(&mask0, sizeof(mask0));
841c9d763bfSQing Li 	mask0.sin_len = sizeof(mask0);
842c9d763bfSQing Li 	mask0.sin_family = AF_INET;
843c9d763bfSQing Li 	mask0.sin_addr.s_addr = target->ia_subnetmask;
844c9d763bfSQing Li 	lltable_prefix_free(AF_INET, (struct sockaddr *)&prefix0,
8455b84dc78SQing Li 	    (struct sockaddr *)&mask0, flags);
846c9d763bfSQing Li 
847c9d763bfSQing Li 	/*
84848321abeSMax Laier 	 * As no-one seem to have this prefix, we can remove the route.
84948321abeSMax Laier 	 */
85092322284SQing Li 	error = rtinit(&(target->ia_ifa), (int)RTM_DELETE, rtinitflags(target));
85192322284SQing Li 	if (error == 0)
85248321abeSMax Laier 		target->ia_flags &= ~IFA_ROUTE;
85392322284SQing Li 	else
85492322284SQing Li 		log(LOG_INFO, "in_scrubprefix: err=%d, prefix delete failed\n", error);
85592322284SQing Li 	return (error);
85648321abeSMax Laier }
85748321abeSMax Laier 
85848321abeSMax Laier #undef rtinitflags
859df8bae1dSRodney W. Grimes 
860df8bae1dSRodney W. Grimes /*
861df8bae1dSRodney W. Grimes  * Return 1 if the address might be a local broadcast address.
862df8bae1dSRodney W. Grimes  */
86326f9a767SRodney W. Grimes int
864f2565d68SRobert Watson in_broadcast(struct in_addr in, struct ifnet *ifp)
865df8bae1dSRodney W. Grimes {
866df8bae1dSRodney W. Grimes 	register struct ifaddr *ifa;
867df8bae1dSRodney W. Grimes 	u_long t;
868df8bae1dSRodney W. Grimes 
869df8bae1dSRodney W. Grimes 	if (in.s_addr == INADDR_BROADCAST ||
870df8bae1dSRodney W. Grimes 	    in.s_addr == INADDR_ANY)
871460473a0SBjoern A. Zeeb 		return (1);
872df8bae1dSRodney W. Grimes 	if ((ifp->if_flags & IFF_BROADCAST) == 0)
873460473a0SBjoern A. Zeeb 		return (0);
874df8bae1dSRodney W. Grimes 	t = ntohl(in.s_addr);
875df8bae1dSRodney W. Grimes 	/*
876df8bae1dSRodney W. Grimes 	 * Look through the list of addresses for a match
877df8bae1dSRodney W. Grimes 	 * with a broadcast address.
878df8bae1dSRodney W. Grimes 	 */
879df8bae1dSRodney W. Grimes #define ia ((struct in_ifaddr *)ifa)
880462b86feSPoul-Henning Kamp 	TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link)
881df8bae1dSRodney W. Grimes 		if (ifa->ifa_addr->sa_family == AF_INET &&
882df8bae1dSRodney W. Grimes 		    (in.s_addr == ia->ia_broadaddr.sin_addr.s_addr ||
883df8bae1dSRodney W. Grimes 		     /*
88453883e0cSGleb Smirnoff 		      * Check for old-style (host 0) broadcast, but
88553883e0cSGleb Smirnoff 		      * taking into account that RFC 3021 obsoletes it.
886df8bae1dSRodney W. Grimes 		      */
88753883e0cSGleb Smirnoff 		    (ia->ia_subnetmask != IN_RFC3021_MASK &&
88853883e0cSGleb Smirnoff 		    t == ia->ia_subnet)) &&
8898dd27fd6SGuido van Rooij 		     /*
8908dd27fd6SGuido van Rooij 		      * Check for an all one subnetmask. These
8918dd27fd6SGuido van Rooij 		      * only exist when an interface gets a secondary
8928dd27fd6SGuido van Rooij 		      * address.
8938dd27fd6SGuido van Rooij 		      */
8948dd27fd6SGuido van Rooij 		    ia->ia_subnetmask != (u_long)0xffffffff)
895460473a0SBjoern A. Zeeb 			    return (1);
896df8bae1dSRodney W. Grimes 	return (0);
897df8bae1dSRodney W. Grimes #undef ia
898df8bae1dSRodney W. Grimes }
899ec002feeSBruce M Simpson 
900df8bae1dSRodney W. Grimes /*
901b1c53bc9SRobert Watson  * On interface removal, clean up IPv4 data structures hung off of the ifnet.
902b1c53bc9SRobert Watson  */
903b1c53bc9SRobert Watson void
904f2565d68SRobert Watson in_ifdetach(struct ifnet *ifp)
905b1c53bc9SRobert Watson {
906b1c53bc9SRobert Watson 
907603724d3SBjoern A. Zeeb 	in_pcbpurgeif0(&V_ripcbinfo, ifp);
908603724d3SBjoern A. Zeeb 	in_pcbpurgeif0(&V_udbinfo, ifp);
909e06e816fSKevin Lo 	in_pcbpurgeif0(&V_ulitecbinfo, ifp);
910ec002feeSBruce M Simpson 	in_purgemaddrs(ifp);
911b1c53bc9SRobert Watson }
9126e6b3f7cSQing Li 
913d10910e6SBruce M Simpson /*
914d10910e6SBruce M Simpson  * Delete all IPv4 multicast address records, and associated link-layer
915d10910e6SBruce M Simpson  * multicast address records, associated with ifp.
916d10910e6SBruce M Simpson  * XXX It looks like domifdetach runs AFTER the link layer cleanup.
91756663a40SBruce M Simpson  * XXX This should not race with ifma_protospec being set during
91856663a40SBruce M Simpson  * a new allocation, if it does, we have bigger problems.
919d10910e6SBruce M Simpson  */
920d10910e6SBruce M Simpson static void
921d10910e6SBruce M Simpson in_purgemaddrs(struct ifnet *ifp)
922d10910e6SBruce M Simpson {
923d10910e6SBruce M Simpson 	LIST_HEAD(,in_multi) purgeinms;
924d10910e6SBruce M Simpson 	struct in_multi		*inm, *tinm;
925d10910e6SBruce M Simpson 	struct ifmultiaddr	*ifma;
926d10910e6SBruce M Simpson 
927d10910e6SBruce M Simpson 	LIST_INIT(&purgeinms);
928d10910e6SBruce M Simpson 	IN_MULTI_LOCK();
929d10910e6SBruce M Simpson 
930d10910e6SBruce M Simpson 	/*
931d10910e6SBruce M Simpson 	 * Extract list of in_multi associated with the detaching ifp
932d10910e6SBruce M Simpson 	 * which the PF_INET layer is about to release.
933d10910e6SBruce M Simpson 	 * We need to do this as IF_ADDR_LOCK() may be re-acquired
934d10910e6SBruce M Simpson 	 * by code further down.
935d10910e6SBruce M Simpson 	 */
936137f91e8SJohn Baldwin 	IF_ADDR_RLOCK(ifp);
937d10910e6SBruce M Simpson 	TAILQ_FOREACH(ifma, &ifp->if_multiaddrs, ifma_link) {
93856663a40SBruce M Simpson 		if (ifma->ifma_addr->sa_family != AF_INET ||
93956663a40SBruce M Simpson 		    ifma->ifma_protospec == NULL)
940d10910e6SBruce M Simpson 			continue;
94156663a40SBruce M Simpson #if 0
94256663a40SBruce M Simpson 		KASSERT(ifma->ifma_protospec != NULL,
94356663a40SBruce M Simpson 		    ("%s: ifma_protospec is NULL", __func__));
94456663a40SBruce M Simpson #endif
945d10910e6SBruce M Simpson 		inm = (struct in_multi *)ifma->ifma_protospec;
946d10910e6SBruce M Simpson 		LIST_INSERT_HEAD(&purgeinms, inm, inm_link);
947d10910e6SBruce M Simpson 	}
948137f91e8SJohn Baldwin 	IF_ADDR_RUNLOCK(ifp);
949d10910e6SBruce M Simpson 
950d10910e6SBruce M Simpson 	LIST_FOREACH_SAFE(inm, &purgeinms, inm_link, tinm) {
951d10910e6SBruce M Simpson 		LIST_REMOVE(inm, inm_link);
95207cde5e9SRobert Watson 		inm_release_locked(inm);
953d10910e6SBruce M Simpson 	}
954d10910e6SBruce M Simpson 	igmp_ifdetach(ifp);
955d10910e6SBruce M Simpson 
956d10910e6SBruce M Simpson 	IN_MULTI_UNLOCK();
957d10910e6SBruce M Simpson }
958d10910e6SBruce M Simpson 
9596e6b3f7cSQing Li struct in_llentry {
9606e6b3f7cSQing Li 	struct llentry		base;
9616e6b3f7cSQing Li };
9626e6b3f7cSQing Li 
96311cdad98SAlexander V. Chernikov #define	IN_LLTBL_DEFAULT_HSIZE	32
96411cdad98SAlexander V. Chernikov #define	IN_LLTBL_HASH(k, h) \
96511cdad98SAlexander V. Chernikov 	(((((((k >> 8) ^ k) >> 8) ^ k) >> 8) ^ k) & ((h) - 1))
96611cdad98SAlexander V. Chernikov 
967a93cda78SKip Macy /*
96811cdad98SAlexander V. Chernikov  * Do actual deallocation of @lle.
96911cdad98SAlexander V. Chernikov  * Called by LLE_FREE_LOCKED when number of references
97011cdad98SAlexander V. Chernikov  * drops to zero.
971a93cda78SKip Macy  */
972a93cda78SKip Macy static void
97311cdad98SAlexander V. Chernikov in_lltable_destroy_lle(struct llentry *lle)
974a93cda78SKip Macy {
97511cdad98SAlexander V. Chernikov 
976a93cda78SKip Macy 	LLE_WUNLOCK(lle);
977a93cda78SKip Macy 	LLE_LOCK_DESTROY(lle);
978a93cda78SKip Macy 	free(lle, M_LLTABLE);
979a93cda78SKip Macy }
980a93cda78SKip Macy 
9816e6b3f7cSQing Li static struct llentry *
982314294deSAlexander V. Chernikov in_lltable_new(struct in_addr addr4, u_int flags)
9836e6b3f7cSQing Li {
9846e6b3f7cSQing Li 	struct in_llentry *lle;
9856e6b3f7cSQing Li 
98690b357f6SGleb Smirnoff 	lle = malloc(sizeof(struct in_llentry), M_LLTABLE, M_NOWAIT | M_ZERO);
9876e6b3f7cSQing Li 	if (lle == NULL)		/* NB: caller generates msg */
9886e6b3f7cSQing Li 		return NULL;
9896e6b3f7cSQing Li 
9906e6b3f7cSQing Li 	/*
9916e6b3f7cSQing Li 	 * For IPv4 this will trigger "arpresolve" to generate
9926e6b3f7cSQing Li 	 * an ARP request.
9936e6b3f7cSQing Li 	 */
994a98c06f1SGleb Smirnoff 	lle->base.la_expire = time_uptime; /* mark expired */
995314294deSAlexander V. Chernikov 	lle->base.r_l3addr.addr4 = addr4;
9966e6b3f7cSQing Li 	lle->base.lle_refcnt = 1;
99711cdad98SAlexander V. Chernikov 	lle->base.lle_free = in_lltable_destroy_lle;
9986e6b3f7cSQing Li 	LLE_LOCK_INIT(&lle->base);
9990447c136SAlexander V. Chernikov 	callout_init(&lle->base.lle_timer, 1);
1000ea537929SGleb Smirnoff 
1001ea537929SGleb Smirnoff 	return (&lle->base);
10026e6b3f7cSQing Li }
10036e6b3f7cSQing Li 
1004c9d763bfSQing Li #define IN_ARE_MASKED_ADDR_EQUAL(d, a, m)	(			\
1005314294deSAlexander V. Chernikov 	    (((ntohl((d).s_addr) ^ (a)->sin_addr.s_addr) & (m)->sin_addr.s_addr)) == 0 )
1006c9d763bfSQing Li 
100711cdad98SAlexander V. Chernikov static int
100811cdad98SAlexander V. Chernikov in_lltable_match_prefix(const struct sockaddr *prefix,
100911cdad98SAlexander V. Chernikov     const struct sockaddr *mask, u_int flags, struct llentry *lle)
1010c9d763bfSQing Li {
1011c9d763bfSQing Li 	const struct sockaddr_in *pfx = (const struct sockaddr_in *)prefix;
1012c9d763bfSQing Li 	const struct sockaddr_in *msk = (const struct sockaddr_in *)mask;
1013c9d763bfSQing Li 
10145b84dc78SQing Li 	/*
10155b84dc78SQing Li 	 * (flags & LLE_STATIC) means deleting all entries
1016ea50c13eSGleb Smirnoff 	 * including static ARP entries.
10175b84dc78SQing Li 	 */
1018314294deSAlexander V. Chernikov 	if (IN_ARE_MASKED_ADDR_EQUAL(lle->r_l3addr.addr4, pfx, msk) &&
101911cdad98SAlexander V. Chernikov 	    ((flags & LLE_STATIC) || !(lle->la_flags & LLE_STATIC)))
102011cdad98SAlexander V. Chernikov 		return (1);
102111cdad98SAlexander V. Chernikov 
102211cdad98SAlexander V. Chernikov 	return (0);
102311cdad98SAlexander V. Chernikov }
102411cdad98SAlexander V. Chernikov 
102511cdad98SAlexander V. Chernikov static void
102611cdad98SAlexander V. Chernikov in_lltable_free_entry(struct lltable *llt, struct llentry *lle)
102711cdad98SAlexander V. Chernikov {
102811cdad98SAlexander V. Chernikov 	struct ifnet *ifp;
102911cdad98SAlexander V. Chernikov 	size_t pkts_dropped;
103011cdad98SAlexander V. Chernikov 
103111cdad98SAlexander V. Chernikov 	LLE_WLOCK_ASSERT(lle);
103211cdad98SAlexander V. Chernikov 	KASSERT(llt != NULL, ("lltable is NULL"));
103311cdad98SAlexander V. Chernikov 
103411cdad98SAlexander V. Chernikov 	/* Unlink entry from table if not already */
103511cdad98SAlexander V. Chernikov 	if ((lle->la_flags & LLE_LINKED) != 0) {
103611cdad98SAlexander V. Chernikov 		ifp = llt->llt_ifp;
103711cdad98SAlexander V. Chernikov 		IF_AFDATA_WLOCK_ASSERT(ifp);
103811cdad98SAlexander V. Chernikov 		lltable_unlink_entry(llt, lle);
103911cdad98SAlexander V. Chernikov 	}
104011cdad98SAlexander V. Chernikov 
104111cdad98SAlexander V. Chernikov 	/* cancel timer */
10420447c136SAlexander V. Chernikov 	if (callout_stop(&lle->lle_timer))
1043becba438SBjoern A. Zeeb 		LLE_REMREF(lle);
104411cdad98SAlexander V. Chernikov 
104511cdad98SAlexander V. Chernikov 	/* Drop hold queue */
1046e162ea60SGeorge V. Neville-Neil 	pkts_dropped = llentry_free(lle);
1047e162ea60SGeorge V. Neville-Neil 	ARPSTAT_ADD(dropped, pkts_dropped);
1048c9d763bfSQing Li }
1049c9d763bfSQing Li 
10506e6b3f7cSQing Li static int
1051c7ab6602SQing Li in_lltable_rtcheck(struct ifnet *ifp, u_int flags, const struct sockaddr *l3addr)
10526e6b3f7cSQing Li {
10536e6b3f7cSQing Li 	struct rtentry *rt;
10546e6b3f7cSQing Li 
10556e6b3f7cSQing Li 	KASSERT(l3addr->sa_family == AF_INET,
10566e6b3f7cSQing Li 	    ("sin_family %d", l3addr->sa_family));
10576e6b3f7cSQing Li 
1058743c072aSAlan Somers 	/* XXX rtalloc1_fib should take a const param */
1059743c072aSAlan Somers 	rt = rtalloc1_fib(__DECONST(struct sockaddr *, l3addr), 0, 0,
1060743c072aSAlan Somers 	    ifp->if_fib);
106113e255faSMarko Zec 
10626cf8e330SQing Li 	if (rt == NULL)
10636cf8e330SQing Li 		return (EINVAL);
10646cf8e330SQing Li 
106513e255faSMarko Zec 	/*
106613e255faSMarko Zec 	 * If the gateway for an existing host route matches the target L3
10676cf8e330SQing Li 	 * address, which is a special route inserted by some implementation
10686cf8e330SQing Li 	 * such as MANET, and the interface is of the correct type, then
10696cf8e330SQing Li 	 * allow for ARP to proceed.
107013e255faSMarko Zec 	 */
1071db92413eSQing Li 	if (rt->rt_flags & RTF_GATEWAY) {
107215d25219SQing Li 		if (!(rt->rt_flags & RTF_HOST) || !rt->rt_ifp ||
107315d25219SQing Li 		    rt->rt_ifp->if_type != IFT_ETHER ||
1074ea50c13eSGleb Smirnoff 		    (rt->rt_ifp->if_flags & (IFF_NOARP | IFF_STATICARP)) != 0 ||
107515d25219SQing Li 		    memcmp(rt->rt_gateway->sa_data, l3addr->sa_data,
107615d25219SQing Li 		    sizeof(in_addr_t)) != 0) {
1077db92413eSQing Li 			RTFREE_LOCKED(rt);
1078db92413eSQing Li 			return (EINVAL);
1079db92413eSQing Li 		}
108015d25219SQing Li 	}
1081db92413eSQing Li 
1082db92413eSQing Li 	/*
1083db92413eSQing Li 	 * Make sure that at least the destination address is covered
1084db92413eSQing Li 	 * by the route. This is for handling the case where 2 or more
1085db92413eSQing Li 	 * interfaces have the same prefix. An incoming packet arrives
1086db92413eSQing Li 	 * on one interface and the corresponding outgoing packet leaves
1087db92413eSQing Li 	 * another interface.
1088db92413eSQing Li 	 */
1089b3664a14SQing Li 	if (!(rt->rt_flags & RTF_HOST) && rt->rt_ifp != ifp) {
109015d25219SQing Li 		const char *sa, *mask, *addr, *lim;
1091db92413eSQing Li 		int len;
1092db92413eSQing Li 
109315d25219SQing Li 		mask = (const char *)rt_mask(rt);
1094b3664a14SQing Li 		/*
1095b3664a14SQing Li 		 * Just being extra cautious to avoid some custom
1096b3664a14SQing Li 		 * code getting into trouble.
1097b3664a14SQing Li 		 */
1098b3664a14SQing Li 		if (mask == NULL) {
1099b3664a14SQing Li 			RTFREE_LOCKED(rt);
1100b3664a14SQing Li 			return (EINVAL);
1101b3664a14SQing Li 		}
1102b3664a14SQing Li 
1103b3664a14SQing Li 		sa = (const char *)rt_key(rt);
110415d25219SQing Li 		addr = (const char *)l3addr;
110515d25219SQing Li 		len = ((const struct sockaddr_in *)l3addr)->sin_len;
1106db92413eSQing Li 		lim = addr + len;
1107db92413eSQing Li 
1108db92413eSQing Li 		for ( ; addr < lim; sa++, mask++, addr++) {
1109db92413eSQing Li 			if ((*sa ^ *addr) & *mask) {
11106cb2b4e7SQing Li #ifdef DIAGNOSTIC
11116e6b3f7cSQing Li 				log(LOG_INFO, "IPv4 address: \"%s\" is not on the network\n",
11126e6b3f7cSQing Li 				    inet_ntoa(((const struct sockaddr_in *)l3addr)->sin_addr));
1113b4a22c36SQing Li #endif
111415d25219SQing Li 				RTFREE_LOCKED(rt);
111515d25219SQing Li 				return (EINVAL);
11166e6b3f7cSQing Li 			}
1117db92413eSQing Li 		}
1118db92413eSQing Li 	}
1119db92413eSQing Li 
11206e6b3f7cSQing Li 	RTFREE_LOCKED(rt);
112115d25219SQing Li 	return (0);
11226e6b3f7cSQing Li }
11236e6b3f7cSQing Li 
112411cdad98SAlexander V. Chernikov static inline uint32_t
112511cdad98SAlexander V. Chernikov in_lltable_hash_dst(const struct in_addr dst, uint32_t hsize)
112611cdad98SAlexander V. Chernikov {
112711cdad98SAlexander V. Chernikov 
112811cdad98SAlexander V. Chernikov 	return (IN_LLTBL_HASH(dst.s_addr, hsize));
112911cdad98SAlexander V. Chernikov }
113011cdad98SAlexander V. Chernikov 
113111cdad98SAlexander V. Chernikov static uint32_t
113211cdad98SAlexander V. Chernikov in_lltable_hash(const struct llentry *lle, uint32_t hsize)
113311cdad98SAlexander V. Chernikov {
113411cdad98SAlexander V. Chernikov 
1135314294deSAlexander V. Chernikov 	return (in_lltable_hash_dst(lle->r_l3addr.addr4, hsize));
113611cdad98SAlexander V. Chernikov }
113711cdad98SAlexander V. Chernikov 
113811cdad98SAlexander V. Chernikov static void
113911cdad98SAlexander V. Chernikov in_lltable_fill_sa_entry(const struct llentry *lle, struct sockaddr *sa)
114011cdad98SAlexander V. Chernikov {
114111cdad98SAlexander V. Chernikov 	struct sockaddr_in *sin;
114211cdad98SAlexander V. Chernikov 
114311cdad98SAlexander V. Chernikov 	sin = (struct sockaddr_in *)sa;
114411cdad98SAlexander V. Chernikov 	bzero(sin, sizeof(*sin));
114511cdad98SAlexander V. Chernikov 	sin->sin_family = AF_INET;
114611cdad98SAlexander V. Chernikov 	sin->sin_len = sizeof(*sin);
1147314294deSAlexander V. Chernikov 	sin->sin_addr = lle->r_l3addr.addr4;
114811cdad98SAlexander V. Chernikov }
114911cdad98SAlexander V. Chernikov 
1150b4b1367aSAlexander V. Chernikov static inline struct llentry *
1151b4b1367aSAlexander V. Chernikov in_lltable_find_dst(struct lltable *llt, struct in_addr dst)
1152b4b1367aSAlexander V. Chernikov {
1153b4b1367aSAlexander V. Chernikov 	struct llentry *lle;
1154b4b1367aSAlexander V. Chernikov 	struct llentries *lleh;
115511cdad98SAlexander V. Chernikov 	u_int hashidx;
1156b4b1367aSAlexander V. Chernikov 
11573a749863SAlexander V. Chernikov 	hashidx = in_lltable_hash_dst(dst, llt->llt_hsize);
115811cdad98SAlexander V. Chernikov 	lleh = &llt->lle_head[hashidx];
1159b4b1367aSAlexander V. Chernikov 	LIST_FOREACH(lle, lleh, lle_next) {
1160b4b1367aSAlexander V. Chernikov 		if (lle->la_flags & LLE_DELETED)
1161b4b1367aSAlexander V. Chernikov 			continue;
1162314294deSAlexander V. Chernikov 		if (lle->r_l3addr.addr4.s_addr == dst.s_addr)
1163b4b1367aSAlexander V. Chernikov 			break;
1164b4b1367aSAlexander V. Chernikov 	}
1165b4b1367aSAlexander V. Chernikov 
1166b4b1367aSAlexander V. Chernikov 	return (lle);
1167b4b1367aSAlexander V. Chernikov }
1168b4b1367aSAlexander V. Chernikov 
1169b4b1367aSAlexander V. Chernikov static int
1170b4b1367aSAlexander V. Chernikov in_lltable_delete(struct lltable *llt, u_int flags,
1171b4b1367aSAlexander V. Chernikov     const struct sockaddr *l3addr)
1172b4b1367aSAlexander V. Chernikov {
1173b4b1367aSAlexander V. Chernikov 	const struct sockaddr_in *sin = (const struct sockaddr_in *)l3addr;
1174b4b1367aSAlexander V. Chernikov 	struct llentry *lle;
1175b4b1367aSAlexander V. Chernikov 
11766e4cd746SMarius Strobl 	IF_AFDATA_WLOCK_ASSERT(llt->llt_ifp);
1177b4b1367aSAlexander V. Chernikov 	KASSERT(l3addr->sa_family == AF_INET,
1178b4b1367aSAlexander V. Chernikov 	    ("sin_family %d", l3addr->sa_family));
1179b4b1367aSAlexander V. Chernikov 
1180b4b1367aSAlexander V. Chernikov 	lle = in_lltable_find_dst(llt, sin->sin_addr);
1181b4b1367aSAlexander V. Chernikov 	if (lle == NULL) {
1182b4b1367aSAlexander V. Chernikov #ifdef DIAGNOSTIC
1183b4b1367aSAlexander V. Chernikov 		log(LOG_INFO, "interface address is missing from cache = %p  in delete\n", lle);
1184b4b1367aSAlexander V. Chernikov #endif
1185b4b1367aSAlexander V. Chernikov 		return (ENOENT);
1186b4b1367aSAlexander V. Chernikov 	}
1187b4b1367aSAlexander V. Chernikov 
1188b4b1367aSAlexander V. Chernikov 	if (!(lle->la_flags & LLE_IFADDR) || (flags & LLE_IFADDR)) {
1189b4b1367aSAlexander V. Chernikov 		LLE_WLOCK(lle);
1190b4b1367aSAlexander V. Chernikov 		lle->la_flags |= LLE_DELETED;
1191b4b1367aSAlexander V. Chernikov 		EVENTHANDLER_INVOKE(lle_event, lle, LLENTRY_DELETED);
1192b4b1367aSAlexander V. Chernikov #ifdef DIAGNOSTIC
1193b4b1367aSAlexander V. Chernikov 		log(LOG_INFO, "ifaddr cache = %p is deleted\n", lle);
1194b4b1367aSAlexander V. Chernikov #endif
1195b4b1367aSAlexander V. Chernikov 		if ((lle->la_flags & (LLE_STATIC | LLE_IFADDR)) == LLE_STATIC)
1196b4b1367aSAlexander V. Chernikov 			llentry_free(lle);
1197b4b1367aSAlexander V. Chernikov 		else
1198b4b1367aSAlexander V. Chernikov 			LLE_WUNLOCK(lle);
1199b4b1367aSAlexander V. Chernikov 	}
1200b4b1367aSAlexander V. Chernikov 
1201b4b1367aSAlexander V. Chernikov 	return (0);
1202b4b1367aSAlexander V. Chernikov }
1203b4b1367aSAlexander V. Chernikov 
1204b4b1367aSAlexander V. Chernikov static struct llentry *
1205*5a255516SAlexander V. Chernikov in_lltable_alloc(struct lltable *llt, u_int flags, const struct sockaddr *l3addr)
1206b4b1367aSAlexander V. Chernikov {
1207b4b1367aSAlexander V. Chernikov 	const struct sockaddr_in *sin = (const struct sockaddr_in *)l3addr;
1208b4b1367aSAlexander V. Chernikov 	struct ifnet *ifp = llt->llt_ifp;
1209b4b1367aSAlexander V. Chernikov 	struct llentry *lle;
1210b4b1367aSAlexander V. Chernikov 
1211b4b1367aSAlexander V. Chernikov 	KASSERT(l3addr->sa_family == AF_INET,
1212b4b1367aSAlexander V. Chernikov 	    ("sin_family %d", l3addr->sa_family));
1213b4b1367aSAlexander V. Chernikov 
1214b4b1367aSAlexander V. Chernikov 	/*
1215b4b1367aSAlexander V. Chernikov 	 * A route that covers the given address must have
1216b4b1367aSAlexander V. Chernikov 	 * been installed 1st because we are doing a resolution,
1217b4b1367aSAlexander V. Chernikov 	 * verify this.
1218b4b1367aSAlexander V. Chernikov 	 */
1219b4b1367aSAlexander V. Chernikov 	if (!(flags & LLE_IFADDR) &&
1220b4b1367aSAlexander V. Chernikov 	    in_lltable_rtcheck(ifp, flags, l3addr) != 0)
1221b4b1367aSAlexander V. Chernikov 		return (NULL);
1222b4b1367aSAlexander V. Chernikov 
1223314294deSAlexander V. Chernikov 	lle = in_lltable_new(sin->sin_addr, flags);
1224b4b1367aSAlexander V. Chernikov 	if (lle == NULL) {
1225b4b1367aSAlexander V. Chernikov 		log(LOG_INFO, "lla_lookup: new lle malloc failed\n");
1226b4b1367aSAlexander V. Chernikov 		return (NULL);
1227b4b1367aSAlexander V. Chernikov 	}
1228b4b1367aSAlexander V. Chernikov 	lle->la_flags = flags;
1229b4b1367aSAlexander V. Chernikov 	if ((flags & LLE_IFADDR) == LLE_IFADDR) {
1230b4b1367aSAlexander V. Chernikov 		bcopy(IF_LLADDR(ifp), &lle->ll_addr, ifp->if_addrlen);
1231b4b1367aSAlexander V. Chernikov 		lle->la_flags |= (LLE_VALID | LLE_STATIC);
1232b4b1367aSAlexander V. Chernikov 	}
1233b4b1367aSAlexander V. Chernikov 
1234b4b1367aSAlexander V. Chernikov 	return (lle);
1235b4b1367aSAlexander V. Chernikov }
1236b4b1367aSAlexander V. Chernikov 
12376e6b3f7cSQing Li /*
12386e6b3f7cSQing Li  * Return NULL if not found or marked for deletion.
12396e6b3f7cSQing Li  * If found return lle read locked.
12406e6b3f7cSQing Li  */
12416e6b3f7cSQing Li static struct llentry *
12426e6b3f7cSQing Li in_lltable_lookup(struct lltable *llt, u_int flags, const struct sockaddr *l3addr)
12436e6b3f7cSQing Li {
12446e6b3f7cSQing Li 	const struct sockaddr_in *sin = (const struct sockaddr_in *)l3addr;
12456e6b3f7cSQing Li 	struct llentry *lle;
12466e6b3f7cSQing Li 
12476e4cd746SMarius Strobl 	IF_AFDATA_LOCK_ASSERT(llt->llt_ifp);
12486e6b3f7cSQing Li 	KASSERT(l3addr->sa_family == AF_INET,
12496e6b3f7cSQing Li 	    ("sin_family %d", l3addr->sa_family));
125011cdad98SAlexander V. Chernikov 	lle = in_lltable_find_dst(llt, sin->sin_addr);
1251b4b1367aSAlexander V. Chernikov 
1252b4b1367aSAlexander V. Chernikov 	if (lle == NULL)
12536e6b3f7cSQing Li 		return (NULL);
12546e6b3f7cSQing Li 
12556e6b3f7cSQing Li 	if (flags & LLE_EXCLUSIVE)
12566e6b3f7cSQing Li 		LLE_WLOCK(lle);
12576e6b3f7cSQing Li 	else
12586e6b3f7cSQing Li 		LLE_RLOCK(lle);
1259b4b1367aSAlexander V. Chernikov 
12606e6b3f7cSQing Li 	return (lle);
12616e6b3f7cSQing Li }
12626e6b3f7cSQing Li 
12636e6b3f7cSQing Li static int
126411cdad98SAlexander V. Chernikov in_lltable_dump_entry(struct lltable *llt, struct llentry *lle,
126511cdad98SAlexander V. Chernikov     struct sysctl_req *wr)
12666e6b3f7cSQing Li {
12676e6b3f7cSQing Li 	struct ifnet *ifp = llt->llt_ifp;
12686e6b3f7cSQing Li 	/* XXX stack use */
12696e6b3f7cSQing Li 	struct {
12706e6b3f7cSQing Li 		struct rt_msghdr	rtm;
12719711a168SGleb Smirnoff 		struct sockaddr_in	sin;
12726e6b3f7cSQing Li 		struct sockaddr_dl	sdl;
12736e6b3f7cSQing Li 	} arpc;
12746e6b3f7cSQing Li 	struct sockaddr_dl *sdl;
127511cdad98SAlexander V. Chernikov 	int error;
12766e6b3f7cSQing Li 
127711cdad98SAlexander V. Chernikov 	bzero(&arpc, sizeof(arpc));
12786e6b3f7cSQing Li 			/* skip deleted entries */
127993704ac5SQing Li 			if ((lle->la_flags & LLE_DELETED) == LLE_DELETED)
128011cdad98SAlexander V. Chernikov 				return (0);
1281813dd6aeSBjoern A. Zeeb 			/* Skip if jailed and not a valid IP of the prison. */
128211cdad98SAlexander V. Chernikov 			lltable_fill_sa_entry(lle,(struct sockaddr *)&arpc.sin);
128311cdad98SAlexander V. Chernikov 			if (prison_if(wr->td->td_ucred,
128411cdad98SAlexander V. Chernikov 			    (struct sockaddr *)&arpc.sin) != 0)
128511cdad98SAlexander V. Chernikov 				return (0);
12866e6b3f7cSQing Li 			/*
12876e6b3f7cSQing Li 			 * produce a msg made of:
12886e6b3f7cSQing Li 			 *  struct rt_msghdr;
12899711a168SGleb Smirnoff 			 *  struct sockaddr_in; (IPv4)
12906e6b3f7cSQing Li 			 *  struct sockaddr_dl;
12916e6b3f7cSQing Li 			 */
12926e6b3f7cSQing Li 			arpc.rtm.rtm_msglen = sizeof(arpc);
1293c0e9a8a1SHartmut Brandt 			arpc.rtm.rtm_version = RTM_VERSION;
1294c0e9a8a1SHartmut Brandt 			arpc.rtm.rtm_type = RTM_GET;
1295c0e9a8a1SHartmut Brandt 			arpc.rtm.rtm_flags = RTF_UP;
1296c0e9a8a1SHartmut Brandt 			arpc.rtm.rtm_addrs = RTA_DST | RTA_GATEWAY;
12976e6b3f7cSQing Li 
12986e6b3f7cSQing Li 			/* publish */
12999711a168SGleb Smirnoff 			if (lle->la_flags & LLE_PUB)
13006e6b3f7cSQing Li 				arpc.rtm.rtm_flags |= RTF_ANNOUNCE;
13016e6b3f7cSQing Li 
13026e6b3f7cSQing Li 			sdl = &arpc.sdl;
13036e6b3f7cSQing Li 			sdl->sdl_family = AF_LINK;
13046e6b3f7cSQing Li 			sdl->sdl_len = sizeof(*sdl);
13056e6b3f7cSQing Li 			sdl->sdl_index = ifp->if_index;
13066e6b3f7cSQing Li 			sdl->sdl_type = ifp->if_type;
130793704ac5SQing Li 			if ((lle->la_flags & LLE_VALID) == LLE_VALID) {
130893704ac5SQing Li 				sdl->sdl_alen = ifp->if_addrlen;
13096e6b3f7cSQing Li 				bcopy(&lle->ll_addr, LLADDR(sdl), ifp->if_addrlen);
131093704ac5SQing Li 			} else {
131193704ac5SQing Li 				sdl->sdl_alen = 0;
131293704ac5SQing Li 				bzero(LLADDR(sdl), ifp->if_addrlen);
131393704ac5SQing Li 			}
13146e6b3f7cSQing Li 
13156e6b3f7cSQing Li 			arpc.rtm.rtm_rmx.rmx_expire =
13166e6b3f7cSQing Li 			    lle->la_flags & LLE_STATIC ? 0 : lle->la_expire;
13178eca593cSQing Li 			arpc.rtm.rtm_flags |= (RTF_HOST | RTF_LLDATA);
13186e6b3f7cSQing Li 			if (lle->la_flags & LLE_STATIC)
13196e6b3f7cSQing Li 				arpc.rtm.rtm_flags |= RTF_STATIC;
13206e6b3f7cSQing Li 			arpc.rtm.rtm_index = ifp->if_index;
13216e6b3f7cSQing Li 			error = SYSCTL_OUT(wr, &arpc, sizeof(arpc));
132211cdad98SAlexander V. Chernikov 
132311cdad98SAlexander V. Chernikov 	return (error);
13246e6b3f7cSQing Li }
13256e6b3f7cSQing Li 
13263a749863SAlexander V. Chernikov static struct lltable *
13273a749863SAlexander V. Chernikov in_lltattach(struct ifnet *ifp)
13286e6b3f7cSQing Li {
1329d10910e6SBruce M Simpson 	struct lltable *llt;
13306e6b3f7cSQing Li 
13313a749863SAlexander V. Chernikov 	llt = lltable_allocate_htbl(IN_LLTBL_DEFAULT_HSIZE);
1332721cd2e0SAlexander V. Chernikov  	llt->llt_af = AF_INET;
1333721cd2e0SAlexander V. Chernikov  	llt->llt_ifp = ifp;
1334d10910e6SBruce M Simpson 
13356e6b3f7cSQing Li 	llt->llt_lookup = in_lltable_lookup;
1336*5a255516SAlexander V. Chernikov 	llt->llt_alloc_entry = in_lltable_alloc;
1337b4b1367aSAlexander V. Chernikov 	llt->llt_delete = in_lltable_delete;
133811cdad98SAlexander V. Chernikov 	llt->llt_dump_entry = in_lltable_dump_entry;
133911cdad98SAlexander V. Chernikov 	llt->llt_hash = in_lltable_hash;
134011cdad98SAlexander V. Chernikov 	llt->llt_fill_sa_entry = in_lltable_fill_sa_entry;
134111cdad98SAlexander V. Chernikov 	llt->llt_free_entry = in_lltable_free_entry;
134211cdad98SAlexander V. Chernikov 	llt->llt_match_prefix = in_lltable_match_prefix;
1343721cd2e0SAlexander V. Chernikov  	lltable_link(llt);
1344d10910e6SBruce M Simpson 
13453a749863SAlexander V. Chernikov 	return (llt);
13463a749863SAlexander V. Chernikov }
13473a749863SAlexander V. Chernikov 
13483a749863SAlexander V. Chernikov void *
13493a749863SAlexander V. Chernikov in_domifattach(struct ifnet *ifp)
13503a749863SAlexander V. Chernikov {
13513a749863SAlexander V. Chernikov 	struct in_ifinfo *ii;
13523a749863SAlexander V. Chernikov 
1353721cd2e0SAlexander V. Chernikov 	ii = malloc(sizeof(struct in_ifinfo), M_IFADDR, M_WAITOK|M_ZERO);
135441cb42a6SAlexander V. Chernikov 
13553a749863SAlexander V. Chernikov 	ii->ii_llt = in_lltattach(ifp);
1356d10910e6SBruce M Simpson 	ii->ii_igmp = igmp_domifattach(ifp);
1357d10910e6SBruce M Simpson 
135841cb42a6SAlexander V. Chernikov 	return (ii);
13596e6b3f7cSQing Li }
13606e6b3f7cSQing Li 
13616e6b3f7cSQing Li void
1362d10910e6SBruce M Simpson in_domifdetach(struct ifnet *ifp, void *aux)
13636e6b3f7cSQing Li {
1364d10910e6SBruce M Simpson 	struct in_ifinfo *ii = (struct in_ifinfo *)aux;
13656e6b3f7cSQing Li 
1366d10910e6SBruce M Simpson 	igmp_domifdetach(ifp);
1367d10910e6SBruce M Simpson 	lltable_free(ii->ii_llt);
1368d10910e6SBruce M Simpson 	free(ii, M_IFADDR);
13696e6b3f7cSQing Li }
1370