xref: /freebsd/sys/netinet/in.c (revision 69beb162848b15c967d3b45ac56501dbd8b94e91)
1c398230bSWarner Losh /*-
251369649SPedro F. Giffuni  * SPDX-License-Identifier: BSD-3-Clause
351369649SPedro F. Giffuni  *
4df8bae1dSRodney W. Grimes  * Copyright (c) 1982, 1986, 1991, 1993
5df8bae1dSRodney W. Grimes  *	The Regents of the University of California.  All rights reserved.
681d96ce8SMax Laier  * Copyright (C) 2001 WIDE Project.  All rights reserved.
7df8bae1dSRodney W. Grimes  *
8df8bae1dSRodney W. Grimes  * Redistribution and use in source and binary forms, with or without
9df8bae1dSRodney W. Grimes  * modification, are permitted provided that the following conditions
10df8bae1dSRodney W. Grimes  * are met:
11df8bae1dSRodney W. Grimes  * 1. Redistributions of source code must retain the above copyright
12df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer.
13df8bae1dSRodney W. Grimes  * 2. Redistributions in binary form must reproduce the above copyright
14df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer in the
15df8bae1dSRodney W. Grimes  *    documentation and/or other materials provided with the distribution.
16fbbd9655SWarner Losh  * 3. Neither the name of the University nor the names of its contributors
17df8bae1dSRodney W. Grimes  *    may be used to endorse or promote products derived from this software
18df8bae1dSRodney W. Grimes  *    without specific prior written permission.
19df8bae1dSRodney W. Grimes  *
20df8bae1dSRodney W. Grimes  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21df8bae1dSRodney W. Grimes  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22df8bae1dSRodney W. Grimes  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23df8bae1dSRodney W. Grimes  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24df8bae1dSRodney W. Grimes  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25df8bae1dSRodney W. Grimes  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26df8bae1dSRodney W. Grimes  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27df8bae1dSRodney W. Grimes  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28df8bae1dSRodney W. Grimes  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29df8bae1dSRodney W. Grimes  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30df8bae1dSRodney W. Grimes  * SUCH DAMAGE.
31df8bae1dSRodney W. Grimes  */
32df8bae1dSRodney W. Grimes 
334b421e2dSMike Silbersack #include <sys/cdefs.h>
34eb8dcdeaSGleb Smirnoff #include "opt_inet.h"
35eb8dcdeaSGleb Smirnoff 
362f35e7d9SMike Karels #define IN_HISTORICAL_NETS		/* include class masks */
372f35e7d9SMike Karels 
38df8bae1dSRodney W. Grimes #include <sys/param.h>
39c3322cb9SGleb Smirnoff #include <sys/eventhandler.h>
4026f9a767SRodney W. Grimes #include <sys/systm.h>
4151a53488SBruce Evans #include <sys/sockio.h>
42df8bae1dSRodney W. Grimes #include <sys/malloc.h>
43acd3428bSRobert Watson #include <sys/priv.h>
44df8bae1dSRodney W. Grimes #include <sys/socket.h>
455ce0eb7fSBjoern A. Zeeb #include <sys/jail.h>
46f6d24a78SPoul-Henning Kamp #include <sys/kernel.h>
47cc0a3c8cSAndrey V. Elsukov #include <sys/lock.h>
485ce0eb7fSBjoern A. Zeeb #include <sys/proc.h>
49f6d24a78SPoul-Henning Kamp #include <sys/sysctl.h>
50ebc90701SQing Li #include <sys/syslog.h>
51f7a39160SGleb Smirnoff #include <sys/sx.h>
52df8bae1dSRodney W. Grimes 
53df8bae1dSRodney W. Grimes #include <net/if.h>
54df813b7eSQing Li #include <net/if_var.h>
55e162ea60SGeorge V. Neville-Neil #include <net/if_arp.h>
56ebc90701SQing Li #include <net/if_dl.h>
576e6b3f7cSQing Li #include <net/if_llatbl.h>
583d0d5b21SJustin Hibbits #include <net/if_private.h>
596a800098SYoshinobu Inoue #include <net/if_types.h>
60df8bae1dSRodney W. Grimes #include <net/route.h>
6181728a53SAlexander V. Chernikov #include <net/route/nhop.h>
6281728a53SAlexander V. Chernikov #include <net/route/route_ctl.h>
63ebc90701SQing Li #include <net/vnet.h>
64df8bae1dSRodney W. Grimes 
6508b68b0eSGleb Smirnoff #include <netinet/if_ether.h>
66df8bae1dSRodney W. Grimes #include <netinet/in.h>
67936f4a42SAlexander V. Chernikov #include <netinet/in_fib.h>
68df8bae1dSRodney W. Grimes #include <netinet/in_var.h>
69e43cc4aeSHajimu UMEMOTO #include <netinet/in_pcb.h>
7071498f30SBruce M Simpson #include <netinet/ip_var.h>
7108b68b0eSGleb Smirnoff #include <netinet/ip_carp.h>
72d10910e6SBruce M Simpson #include <netinet/igmp_var.h>
73eddfbb76SRobert Watson #include <netinet/udp.h>
74eddfbb76SRobert Watson #include <netinet/udp_var.h>
7555166637SPoul-Henning Kamp 
76215bab79SShivank Garg #ifdef MAC
77215bab79SShivank Garg #include <security/mac/mac_framework.h>
78215bab79SShivank Garg #endif
79215bab79SShivank Garg 
80f375bf0eSAlexander V. Chernikov static int in_aifaddr_ioctl(u_long, caddr_t, struct ifnet *, struct ucred *);
81f375bf0eSAlexander V. Chernikov static int in_difaddr_ioctl(u_long, caddr_t, struct ifnet *, struct ucred *);
82f375bf0eSAlexander V. Chernikov static int in_gifaddr_ioctl(u_long, caddr_t, struct ifnet *, struct ucred *);
836a800098SYoshinobu Inoue 
844d77a549SAlfred Perlstein static void	in_socktrim(struct sockaddr_in *);
85ec002feeSBruce M Simpson static void	in_purgemaddrs(struct ifnet *);
86df8bae1dSRodney W. Grimes 
87130aebbaSAlexander V. Chernikov static bool	ia_need_loopback_route(const struct in_ifaddr *);
88130aebbaSAlexander V. Chernikov 
895f901c92SAndrew Turner VNET_DEFINE_STATIC(int, nosameprefix);
9008b68b0eSGleb Smirnoff #define	V_nosameprefix			VNET(nosameprefix)
916df8a710SGleb Smirnoff SYSCTL_INT(_net_inet_ip, OID_AUTO, no_same_prefix, CTLFLAG_VNET | CTLFLAG_RW,
9208b68b0eSGleb Smirnoff 	&VNET_NAME(nosameprefix), 0,
931ae95409SGleb Smirnoff 	"Refuse to create same prefixes on different interfaces");
94477180fbSGarrett Wollman 
95fd076593SMike Karels VNET_DEFINE_STATIC(bool, broadcast_lowest);
96fd076593SMike Karels #define	V_broadcast_lowest		VNET(broadcast_lowest)
97fd076593SMike Karels SYSCTL_BOOL(_net_inet_ip, OID_AUTO, broadcast_lowest, CTLFLAG_VNET | CTLFLAG_RW,
98fd076593SMike Karels 	&VNET_NAME(broadcast_lowest), 0,
99fd076593SMike Karels 	"Treat lowest address on a subnet (host 0) as broadcast");
100fd076593SMike Karels 
101efe58855SMike Karels VNET_DEFINE(bool, ip_allow_net240) = false;
102efe58855SMike Karels #define	V_ip_allow_net240		VNET(ip_allow_net240)
103efe58855SMike Karels SYSCTL_BOOL(_net_inet_ip, OID_AUTO, allow_net240,
104efe58855SMike Karels 	CTLFLAG_VNET | CTLFLAG_RW, &VNET_NAME(ip_allow_net240), 0,
10548ef7ed7SEd Maste 	"Allow forwarding of and ICMP response to Experimental addresses, aka Class E (240/4)");
106efe58855SMike Karels /* see https://datatracker.ietf.org/doc/draft-schoen-intarea-unicast-240 */
107efe58855SMike Karels 
108efe58855SMike Karels VNET_DEFINE(bool, ip_allow_net0) = false;
109efe58855SMike Karels SYSCTL_BOOL(_net_inet_ip, OID_AUTO, allow_net0,
110efe58855SMike Karels 	CTLFLAG_VNET | CTLFLAG_RW, &VNET_NAME(ip_allow_net0), 0,
11148ef7ed7SEd Maste 	"Allow forwarding of and ICMP response to addresses in network 0/8");
112efe58855SMike Karels /* see https://datatracker.ietf.org/doc/draft-schoen-intarea-unicast-0 */
113efe58855SMike Karels 
114efe58855SMike Karels VNET_DEFINE(uint32_t, in_loopback_mask) = IN_LOOPBACK_MASK_DFLT;
115efe58855SMike Karels #define	V_in_loopback_mask	VNET(in_loopback_mask)
116efe58855SMike Karels static int sysctl_loopback_prefixlen(SYSCTL_HANDLER_ARGS);
117efe58855SMike Karels SYSCTL_PROC(_net_inet_ip, OID_AUTO, loopback_prefixlen,
118efe58855SMike Karels 	CTLFLAG_VNET | CTLTYPE_INT | CTLFLAG_RW,
119efe58855SMike Karels 	NULL, 0, sysctl_loopback_prefixlen, "I",
120efe58855SMike Karels 	"Prefix length of address space reserved for loopback");
121efe58855SMike Karels /* see https://datatracker.ietf.org/doc/draft-schoen-intarea-unicast-127 */
122efe58855SMike Karels 
12382cea7e6SBjoern A. Zeeb VNET_DECLARE(struct inpcbinfo, ripcbinfo);
12482cea7e6SBjoern A. Zeeb #define	V_ripcbinfo			VNET(ripcbinfo)
12582cea7e6SBjoern A. Zeeb 
126f7a39160SGleb Smirnoff static struct sx in_control_sx;
127f7a39160SGleb Smirnoff SX_SYSINIT(in_control_sx, &in_control_sx, "in_control");
128f7a39160SGleb Smirnoff 
129df8bae1dSRodney W. Grimes /*
130*69beb162SZhenlei Huang  * Return true if an internet address is for a ``local'' host
131b365d954SGleb Smirnoff  * (one to which we have a connection).
132df8bae1dSRodney W. Grimes  */
133*69beb162SZhenlei Huang bool
134f2565d68SRobert Watson in_localaddr(struct in_addr in)
135df8bae1dSRodney W. Grimes {
1363e85b721SEd Maste 	u_long i = ntohl(in.s_addr);
1373e85b721SEd Maste 	struct in_ifaddr *ia;
138df8bae1dSRodney W. Grimes 
1392144431cSGleb Smirnoff 	NET_EPOCH_ASSERT();
1402144431cSGleb Smirnoff 
141d7c5a620SMatt Macy 	CK_STAILQ_FOREACH(ia, &V_in_ifaddrhead, ia_link) {
1422144431cSGleb Smirnoff 		if ((i & ia->ia_subnetmask) == ia->ia_subnet)
143*69beb162SZhenlei Huang 			return (true);
1442d9cfabaSRobert Watson 	}
1452144431cSGleb Smirnoff 
146*69beb162SZhenlei Huang 	return (false);
147df8bae1dSRodney W. Grimes }
148df8bae1dSRodney W. Grimes 
149df8bae1dSRodney W. Grimes /*
150a5e380e5SZhenlei Huang  * Return true if an internet address is for the local host and configured
1512eccc90bSAndre Oppermann  * on one of its interfaces.
1522eccc90bSAndre Oppermann  */
153c8ee75f2SGleb Smirnoff bool
154f2565d68SRobert Watson in_localip(struct in_addr in)
1552eccc90bSAndre Oppermann {
1562eccc90bSAndre Oppermann 	struct in_ifaddr *ia;
1572eccc90bSAndre Oppermann 
158c8ee75f2SGleb Smirnoff 	NET_EPOCH_ASSERT();
159c8ee75f2SGleb Smirnoff 
160c8ee75f2SGleb Smirnoff 	CK_LIST_FOREACH(ia, INADDR_HASH(in.s_addr), ia_hash)
161c8ee75f2SGleb Smirnoff 		if (IA_SIN(ia)->sin_addr.s_addr == in.s_addr)
162c8ee75f2SGleb Smirnoff 			return (true);
163c8ee75f2SGleb Smirnoff 
164c8ee75f2SGleb Smirnoff 	return (false);
1652eccc90bSAndre Oppermann }
1662eccc90bSAndre Oppermann 
1672eccc90bSAndre Oppermann /*
16856f78600SGleb Smirnoff  * Like in_localip(), but FIB-aware and carp(4)-aware.
1699c89392fSGleb Smirnoff  */
1709c89392fSGleb Smirnoff bool
1719c89392fSGleb Smirnoff in_localip_fib(struct in_addr in, uint16_t fib)
1729c89392fSGleb Smirnoff {
1739c89392fSGleb Smirnoff 	struct in_ifaddr *ia;
1749c89392fSGleb Smirnoff 
1759c89392fSGleb Smirnoff 	NET_EPOCH_ASSERT();
1769c89392fSGleb Smirnoff 
1779c89392fSGleb Smirnoff 	CK_LIST_FOREACH(ia, INADDR_HASH(in.s_addr), ia_hash)
1789c89392fSGleb Smirnoff 		if (IA_SIN(ia)->sin_addr.s_addr == in.s_addr &&
17956f78600SGleb Smirnoff 		    (ia->ia_ifa.ifa_carp == NULL ||
18056f78600SGleb Smirnoff 		    carp_master_p(&ia->ia_ifa)) &&
1819c89392fSGleb Smirnoff 		    ia->ia_ifa.ifa_ifp->if_fib == fib)
1829c89392fSGleb Smirnoff 			return (true);
1839c89392fSGleb Smirnoff 
1849c89392fSGleb Smirnoff 	return (false);
1859c89392fSGleb Smirnoff }
1869c89392fSGleb Smirnoff 
1879c89392fSGleb Smirnoff /*
18828ebe80cSGleb Smirnoff  * Return 1 if an internet address is configured on an interface.
18928ebe80cSGleb Smirnoff  */
19028ebe80cSGleb Smirnoff int
19128ebe80cSGleb Smirnoff in_ifhasaddr(struct ifnet *ifp, struct in_addr in)
19228ebe80cSGleb Smirnoff {
19328ebe80cSGleb Smirnoff 	struct ifaddr *ifa;
19428ebe80cSGleb Smirnoff 	struct in_ifaddr *ia;
19528ebe80cSGleb Smirnoff 
196b8a6e03fSGleb Smirnoff 	NET_EPOCH_ASSERT();
197b8a6e03fSGleb Smirnoff 
198d7c5a620SMatt Macy 	CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
19928ebe80cSGleb Smirnoff 		if (ifa->ifa_addr->sa_family != AF_INET)
20028ebe80cSGleb Smirnoff 			continue;
20128ebe80cSGleb Smirnoff 		ia = (struct in_ifaddr *)ifa;
202b8a6e03fSGleb Smirnoff 		if (ia->ia_addr.sin_addr.s_addr == in.s_addr)
20328ebe80cSGleb Smirnoff 			return (1);
20428ebe80cSGleb Smirnoff 	}
20528ebe80cSGleb Smirnoff 
20628ebe80cSGleb Smirnoff 	return (0);
20728ebe80cSGleb Smirnoff }
20828ebe80cSGleb Smirnoff 
20928ebe80cSGleb Smirnoff /*
210f7a39160SGleb Smirnoff  * Return a reference to the interface address which is different to
211f7a39160SGleb Smirnoff  * the supplied one but with same IP address value.
212f7a39160SGleb Smirnoff  */
213f7a39160SGleb Smirnoff static struct in_ifaddr *
2149fdbf7eeSAlexander V. Chernikov in_localip_more(struct in_ifaddr *original_ia)
215f7a39160SGleb Smirnoff {
216c8ee75f2SGleb Smirnoff 	struct epoch_tracker et;
2179fdbf7eeSAlexander V. Chernikov 	in_addr_t original_addr = IA_SIN(original_ia)->sin_addr.s_addr;
2189fdbf7eeSAlexander V. Chernikov 	uint32_t original_fib = original_ia->ia_ifa.ifa_ifp->if_fib;
2199fdbf7eeSAlexander V. Chernikov 	struct in_ifaddr *ia;
220f7a39160SGleb Smirnoff 
221c8ee75f2SGleb Smirnoff 	NET_EPOCH_ENTER(et);
222c8ee75f2SGleb Smirnoff 	CK_LIST_FOREACH(ia, INADDR_HASH(original_addr), ia_hash) {
2239fdbf7eeSAlexander V. Chernikov 		in_addr_t addr = IA_SIN(ia)->sin_addr.s_addr;
2249fdbf7eeSAlexander V. Chernikov 		uint32_t fib = ia->ia_ifa.ifa_ifp->if_fib;
2259fdbf7eeSAlexander V. Chernikov 		if (!V_rt_add_addr_allfibs && (original_fib != fib))
2269fdbf7eeSAlexander V. Chernikov 			continue;
2279fdbf7eeSAlexander V. Chernikov 		if ((original_ia != ia) && (original_addr == addr)) {
2289fdbf7eeSAlexander V. Chernikov 			ifa_ref(&ia->ia_ifa);
229c8ee75f2SGleb Smirnoff 			NET_EPOCH_EXIT(et);
2309fdbf7eeSAlexander V. Chernikov 			return (ia);
231f7a39160SGleb Smirnoff 		}
232f7a39160SGleb Smirnoff 	}
233c8ee75f2SGleb Smirnoff 	NET_EPOCH_EXIT(et);
234f7a39160SGleb Smirnoff 
235f7a39160SGleb Smirnoff 	return (NULL);
236f7a39160SGleb Smirnoff }
237f7a39160SGleb Smirnoff 
238f7a39160SGleb Smirnoff /*
2394b631fc8SAlexander V. Chernikov  * Tries to find first IPv4 address in the provided fib.
2404b631fc8SAlexander V. Chernikov  * Prefers non-loopback addresses and return loopback IFF
2414b631fc8SAlexander V. Chernikov  * @loopback_ok is set.
2424b631fc8SAlexander V. Chernikov  *
2434b631fc8SAlexander V. Chernikov  * Returns ifa or NULL.
2444b631fc8SAlexander V. Chernikov  */
2454b631fc8SAlexander V. Chernikov struct in_ifaddr *
2464b631fc8SAlexander V. Chernikov in_findlocal(uint32_t fibnum, bool loopback_ok)
2474b631fc8SAlexander V. Chernikov {
2484b631fc8SAlexander V. Chernikov 	struct in_ifaddr *ia = NULL, *ia_lo = NULL;
2494b631fc8SAlexander V. Chernikov 
2504b631fc8SAlexander V. Chernikov 	NET_EPOCH_ASSERT();
2514b631fc8SAlexander V. Chernikov 
2524b631fc8SAlexander V. Chernikov 	CK_STAILQ_FOREACH(ia, &V_in_ifaddrhead, ia_link) {
2534b631fc8SAlexander V. Chernikov 		uint32_t ia_fib = ia->ia_ifa.ifa_ifp->if_fib;
2544b631fc8SAlexander V. Chernikov 		if (!V_rt_add_addr_allfibs && (fibnum != ia_fib))
2554b631fc8SAlexander V. Chernikov 			continue;
2564b631fc8SAlexander V. Chernikov 
2574b631fc8SAlexander V. Chernikov 		if (!IN_LOOPBACK(ntohl(IA_SIN(ia)->sin_addr.s_addr)))
2584b631fc8SAlexander V. Chernikov 			break;
2594b631fc8SAlexander V. Chernikov 		if (loopback_ok)
2604b631fc8SAlexander V. Chernikov 			ia_lo = ia;
2614b631fc8SAlexander V. Chernikov 	}
2624b631fc8SAlexander V. Chernikov 
2634b631fc8SAlexander V. Chernikov 	if (ia == NULL)
2644b631fc8SAlexander V. Chernikov 		ia = ia_lo;
2654b631fc8SAlexander V. Chernikov 
2664b631fc8SAlexander V. Chernikov 	return (ia);
2674b631fc8SAlexander V. Chernikov }
2684b631fc8SAlexander V. Chernikov 
2694b631fc8SAlexander V. Chernikov /*
270df8bae1dSRodney W. Grimes  * Determine whether an IP address is in a reserved set of addresses
271df8bae1dSRodney W. Grimes  * that may not be forwarded, or whether datagrams to that destination
272df8bae1dSRodney W. Grimes  * may be forwarded.
273df8bae1dSRodney W. Grimes  */
27426f9a767SRodney W. Grimes int
275f2565d68SRobert Watson in_canforward(struct in_addr in)
276df8bae1dSRodney W. Grimes {
2773e85b721SEd Maste 	u_long i = ntohl(in.s_addr);
278df8bae1dSRodney W. Grimes 
279efe58855SMike Karels 	if (IN_MULTICAST(i) || IN_LINKLOCAL(i) || IN_LOOPBACK(i))
280efe58855SMike Karels 		return (0);
281efe58855SMike Karels 	if (IN_EXPERIMENTAL(i) && !V_ip_allow_net240)
282efe58855SMike Karels 		return (0);
283efe58855SMike Karels 	if (IN_ZERONET(i) && !V_ip_allow_net0)
284df8bae1dSRodney W. Grimes 		return (0);
285df8bae1dSRodney W. Grimes 	return (1);
286df8bae1dSRodney W. Grimes }
287df8bae1dSRodney W. Grimes 
288df8bae1dSRodney W. Grimes /*
289efe58855SMike Karels  * Sysctl to manage prefix of reserved loopback network; translate
290efe58855SMike Karels  * to/from mask.  The mask is always contiguous high-order 1 bits
291efe58855SMike Karels  * followed by all 0 bits.
292efe58855SMike Karels  */
293efe58855SMike Karels static int
294efe58855SMike Karels sysctl_loopback_prefixlen(SYSCTL_HANDLER_ARGS)
295efe58855SMike Karels {
296efe58855SMike Karels 	int error, preflen;
297efe58855SMike Karels 
298efe58855SMike Karels 	/* ffs is 1-based; compensate. */
299efe58855SMike Karels 	preflen = 33 - ffs(V_in_loopback_mask);
300efe58855SMike Karels 	error = sysctl_handle_int(oidp, &preflen, 0, req);
301efe58855SMike Karels 	if (error || !req->newptr)
302efe58855SMike Karels 		return (error);
303fb8ef16bSMike Karels 	if (preflen < 8 || preflen > 31)
304efe58855SMike Karels 		return (EINVAL);
305efe58855SMike Karels 	V_in_loopback_mask = 0xffffffff << (32 - preflen);
306efe58855SMike Karels 	return (0);
307efe58855SMike Karels }
308efe58855SMike Karels 
309efe58855SMike Karels /*
310df8bae1dSRodney W. Grimes  * Trim a mask in a sockaddr
311df8bae1dSRodney W. Grimes  */
3120312fbe9SPoul-Henning Kamp static void
313f2565d68SRobert Watson in_socktrim(struct sockaddr_in *ap)
314df8bae1dSRodney W. Grimes {
3153e85b721SEd Maste     char *cplim = (char *) &ap->sin_addr;
3163e85b721SEd Maste     char *cp = (char *) (&ap->sin_addr + 1);
317df8bae1dSRodney W. Grimes 
318df8bae1dSRodney W. Grimes     ap->sin_len = 0;
319df00058dSGarrett Wollman     while (--cp >= cplim)
320df8bae1dSRodney W. Grimes 	if (*cp) {
321df8bae1dSRodney W. Grimes 	    (ap)->sin_len = cp - (char *) (ap) + 1;
322df8bae1dSRodney W. Grimes 	    break;
323df8bae1dSRodney W. Grimes 	}
324df8bae1dSRodney W. Grimes }
325df8bae1dSRodney W. Grimes 
326df8bae1dSRodney W. Grimes /*
327df8bae1dSRodney W. Grimes  * Generic internet control operations (ioctl's).
328df8bae1dSRodney W. Grimes  */
32926f9a767SRodney W. Grimes int
330bb06a80cSAlexander V. Chernikov in_control_ioctl(u_long cmd, void *data, struct ifnet *ifp,
331bb06a80cSAlexander V. Chernikov     struct ucred *cred)
332df8bae1dSRodney W. Grimes {
333f7a39160SGleb Smirnoff 	struct ifreq *ifr = (struct ifreq *)data;
334f7a39160SGleb Smirnoff 	struct sockaddr_in *addr = (struct sockaddr_in *)&ifr->ifr_addr;
335a68cc388SGleb Smirnoff 	struct epoch_tracker et;
336821b5cafSGleb Smirnoff 	struct ifaddr *ifa;
337f7a39160SGleb Smirnoff 	struct in_ifaddr *ia;
338f7a39160SGleb Smirnoff 	int error;
339f7a39160SGleb Smirnoff 
340f7a39160SGleb Smirnoff 	if (ifp == NULL)
341f7a39160SGleb Smirnoff 		return (EADDRNOTAVAIL);
34271212473SGleb Smirnoff 
34371212473SGleb Smirnoff 	/*
344f7a39160SGleb Smirnoff 	 * Filter out 4 ioctls we implement directly.  Forward the rest
345f7a39160SGleb Smirnoff 	 * to specific functions and ifp->if_ioctl().
346bbb3fb61SRobert Watson 	 */
3476a800098SYoshinobu Inoue 	switch (cmd) {
348bbb3fb61SRobert Watson 	case SIOCGIFADDR:
349bbb3fb61SRobert Watson 	case SIOCGIFBRDADDR:
350bbb3fb61SRobert Watson 	case SIOCGIFDSTADDR:
351bbb3fb61SRobert Watson 	case SIOCGIFNETMASK:
352f7a39160SGleb Smirnoff 		break;
3536952c3e1SAndrey V. Elsukov 	case SIOCGIFALIAS:
3546952c3e1SAndrey V. Elsukov 		sx_xlock(&in_control_sx);
355f375bf0eSAlexander V. Chernikov 		error = in_gifaddr_ioctl(cmd, data, ifp, cred);
3566952c3e1SAndrey V. Elsukov 		sx_xunlock(&in_control_sx);
3576952c3e1SAndrey V. Elsukov 		return (error);
3586d00fd9cSGleb Smirnoff 	case SIOCDIFADDR:
359f7a39160SGleb Smirnoff 		sx_xlock(&in_control_sx);
360f375bf0eSAlexander V. Chernikov 		error = in_difaddr_ioctl(cmd, data, ifp, cred);
361f7a39160SGleb Smirnoff 		sx_xunlock(&in_control_sx);
362f7a39160SGleb Smirnoff 		return (error);
36377b89ad8SGleb Smirnoff 	case OSIOCAIFADDR:	/* 9.x compat */
3646d00fd9cSGleb Smirnoff 	case SIOCAIFADDR:
365f7a39160SGleb Smirnoff 		sx_xlock(&in_control_sx);
366f375bf0eSAlexander V. Chernikov 		error = in_aifaddr_ioctl(cmd, data, ifp, cred);
367f7a39160SGleb Smirnoff 		sx_xunlock(&in_control_sx);
368f7a39160SGleb Smirnoff 		return (error);
369bbb3fb61SRobert Watson 	case SIOCSIFADDR:
370bbb3fb61SRobert Watson 	case SIOCSIFBRDADDR:
371bbb3fb61SRobert Watson 	case SIOCSIFDSTADDR:
372bbb3fb61SRobert Watson 	case SIOCSIFNETMASK:
37356cf9dc1SGleb Smirnoff 		/* We no longer support that old commands. */
3746d00fd9cSGleb Smirnoff 		return (EINVAL);
375bbb3fb61SRobert Watson 	default:
376f7a39160SGleb Smirnoff 		if (ifp->if_ioctl == NULL)
377bbb3fb61SRobert Watson 			return (EOPNOTSUPP);
378bbb3fb61SRobert Watson 		return ((*ifp->if_ioctl)(ifp, cmd, data));
3796a800098SYoshinobu Inoue 	}
3806a800098SYoshinobu Inoue 
381821b5cafSGleb Smirnoff 	if (addr->sin_addr.s_addr != INADDR_ANY &&
382f375bf0eSAlexander V. Chernikov 	    prison_check_ip4(cred, &addr->sin_addr) != 0)
383821b5cafSGleb Smirnoff 		return (EADDRNOTAVAIL);
384821b5cafSGleb Smirnoff 
385cf7b18f1SRobert Watson 	/*
386a7f77a39SXin LI 	 * Find address for this interface, if it exists.  If an
387a7f77a39SXin LI 	 * address was specified, find that one instead of the
388a7f77a39SXin LI 	 * first one on the interface, if possible.
389df8bae1dSRodney W. Grimes 	 */
390a68cc388SGleb Smirnoff 	NET_EPOCH_ENTER(et);
391d7c5a620SMatt Macy 	CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
3929706c950SGleb Smirnoff 		if (ifa->ifa_addr->sa_family != AF_INET)
3939706c950SGleb Smirnoff 			continue;
394821b5cafSGleb Smirnoff 		ia = (struct in_ifaddr *)ifa;
395821b5cafSGleb Smirnoff 		if (ia->ia_addr.sin_addr.s_addr == addr->sin_addr.s_addr)
396df8bae1dSRodney W. Grimes 			break;
397ca925d9cSJonathan Lemon 	}
398a7f77a39SXin LI 	if (ifa == NULL)
399d7c5a620SMatt Macy 		CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link)
400a7f77a39SXin LI 			if (ifa->ifa_addr->sa_family == AF_INET) {
401a7f77a39SXin LI 				ia = (struct in_ifaddr *)ifa;
402f375bf0eSAlexander V. Chernikov 				if (prison_check_ip4(cred,
403a7f77a39SXin LI 				    &ia->ia_addr.sin_addr) == 0)
404a7f77a39SXin LI 					break;
405a7f77a39SXin LI 			}
406f7a39160SGleb Smirnoff 
407821b5cafSGleb Smirnoff 	if (ifa == NULL) {
408a68cc388SGleb Smirnoff 		NET_EPOCH_EXIT(et);
409f7a39160SGleb Smirnoff 		return (EADDRNOTAVAIL);
410ac0aa473SBill Fenner 	}
411df8bae1dSRodney W. Grimes 
412588885f2SRobert Watson 	error = 0;
413df8bae1dSRodney W. Grimes 	switch (cmd) {
414f7a39160SGleb Smirnoff 	case SIOCGIFADDR:
415f7a39160SGleb Smirnoff 		*addr = ia->ia_addr;
416f7a39160SGleb Smirnoff 		break;
4178c0fec80SRobert Watson 
418f7a39160SGleb Smirnoff 	case SIOCGIFBRDADDR:
419f7a39160SGleb Smirnoff 		if ((ifp->if_flags & IFF_BROADCAST) == 0) {
420f7a39160SGleb Smirnoff 			error = EINVAL;
421df8bae1dSRodney W. Grimes 			break;
422df8bae1dSRodney W. Grimes 		}
423f7a39160SGleb Smirnoff 		*addr = ia->ia_broadaddr;
424f7a39160SGleb Smirnoff 		break;
425f7a39160SGleb Smirnoff 
426f7a39160SGleb Smirnoff 	case SIOCGIFDSTADDR:
427f7a39160SGleb Smirnoff 		if ((ifp->if_flags & IFF_POINTOPOINT) == 0) {
428f7a39160SGleb Smirnoff 			error = EINVAL;
429f7a39160SGleb Smirnoff 			break;
430f7a39160SGleb Smirnoff 		}
431f7a39160SGleb Smirnoff 		*addr = ia->ia_dstaddr;
432f7a39160SGleb Smirnoff 		break;
433f7a39160SGleb Smirnoff 
434f7a39160SGleb Smirnoff 	case SIOCGIFNETMASK:
435f7a39160SGleb Smirnoff 		*addr = ia->ia_sockmask;
436f7a39160SGleb Smirnoff 		break;
437f7a39160SGleb Smirnoff 	}
438f7a39160SGleb Smirnoff 
439a68cc388SGleb Smirnoff 	NET_EPOCH_EXIT(et);
440f7a39160SGleb Smirnoff 
441f7a39160SGleb Smirnoff 	return (error);
4421067217dSGarrett Wollman }
443f7a39160SGleb Smirnoff 
444bb06a80cSAlexander V. Chernikov int
445e4e0f497SKristof Provost in_mask2len(struct in_addr *mask)
446e4e0f497SKristof Provost {
447e4e0f497SKristof Provost 	int x, y;
448e4e0f497SKristof Provost 	u_char *p;
449e4e0f497SKristof Provost 
450e4e0f497SKristof Provost 	p = (u_char *)mask;
451e4e0f497SKristof Provost 	for (x = 0; x < sizeof(*mask); x++) {
452e4e0f497SKristof Provost 		if (p[x] != 0xff)
453e4e0f497SKristof Provost 			break;
454e4e0f497SKristof Provost 	}
455e4e0f497SKristof Provost 	y = 0;
456e4e0f497SKristof Provost 	if (x < sizeof(*mask)) {
457e4e0f497SKristof Provost 		for (y = 0; y < 8; y++) {
458e4e0f497SKristof Provost 			if ((p[x] & (0x80 >> y)) == 0)
459e4e0f497SKristof Provost 				break;
460e4e0f497SKristof Provost 		}
461e4e0f497SKristof Provost 	}
462e4e0f497SKristof Provost 	return (x * 8 + y);
463e4e0f497SKristof Provost }
464e4e0f497SKristof Provost 
465e4e0f497SKristof Provost int
466bb06a80cSAlexander V. Chernikov in_control(struct socket *so, u_long cmd, void *data, struct ifnet *ifp,
467bb06a80cSAlexander V. Chernikov     struct thread *td)
468bb06a80cSAlexander V. Chernikov {
469bb06a80cSAlexander V. Chernikov 	return (in_control_ioctl(cmd, data, ifp, td ? td->td_ucred : NULL));
470bb06a80cSAlexander V. Chernikov }
471bb06a80cSAlexander V. Chernikov 
472f7a39160SGleb Smirnoff static int
473f375bf0eSAlexander V. Chernikov in_aifaddr_ioctl(u_long cmd, caddr_t data, struct ifnet *ifp, struct ucred *cred)
474f7a39160SGleb Smirnoff {
475f7a39160SGleb Smirnoff 	const struct in_aliasreq *ifra = (struct in_aliasreq *)data;
476f7a39160SGleb Smirnoff 	const struct sockaddr_in *addr = &ifra->ifra_addr;
477f7a39160SGleb Smirnoff 	const struct sockaddr_in *broadaddr = &ifra->ifra_broadaddr;
478f7a39160SGleb Smirnoff 	const struct sockaddr_in *mask = &ifra->ifra_mask;
479f7a39160SGleb Smirnoff 	const struct sockaddr_in *dstaddr = &ifra->ifra_dstaddr;
48077b89ad8SGleb Smirnoff 	const int vhid = (cmd == SIOCAIFADDR) ? ifra->ifra_vhid : 0;
481a68cc388SGleb Smirnoff 	struct epoch_tracker et;
482f7a39160SGleb Smirnoff 	struct ifaddr *ifa;
483f7a39160SGleb Smirnoff 	struct in_ifaddr *ia;
484f7a39160SGleb Smirnoff 	bool iaIsFirst;
485f7a39160SGleb Smirnoff 	int error = 0;
486f7a39160SGleb Smirnoff 
487f375bf0eSAlexander V. Chernikov 	error = priv_check_cred(cred, PRIV_NET_ADDIFADDR);
488f7a39160SGleb Smirnoff 	if (error)
489f7a39160SGleb Smirnoff 		return (error);
490f7a39160SGleb Smirnoff 
491f7a39160SGleb Smirnoff 	/*
492f7a39160SGleb Smirnoff 	 * ifra_addr must be present and be of INET family.
493f7a39160SGleb Smirnoff 	 * ifra_broadaddr/ifra_dstaddr and ifra_mask are optional.
494f7a39160SGleb Smirnoff 	 */
495f7a39160SGleb Smirnoff 	if (addr->sin_len != sizeof(struct sockaddr_in) ||
496f7a39160SGleb Smirnoff 	    addr->sin_family != AF_INET)
497f7a39160SGleb Smirnoff 		return (EINVAL);
498f7a39160SGleb Smirnoff 	if (broadaddr->sin_len != 0 &&
499f7a39160SGleb Smirnoff 	    (broadaddr->sin_len != sizeof(struct sockaddr_in) ||
500f7a39160SGleb Smirnoff 	    broadaddr->sin_family != AF_INET))
501f7a39160SGleb Smirnoff 		return (EINVAL);
502f7a39160SGleb Smirnoff 	if (mask->sin_len != 0 &&
503f7a39160SGleb Smirnoff 	    (mask->sin_len != sizeof(struct sockaddr_in) ||
504f7a39160SGleb Smirnoff 	    mask->sin_family != AF_INET))
505f7a39160SGleb Smirnoff 		return (EINVAL);
506f7a39160SGleb Smirnoff 	if ((ifp->if_flags & IFF_POINTOPOINT) &&
507f7a39160SGleb Smirnoff 	    (dstaddr->sin_len != sizeof(struct sockaddr_in) ||
508f7a39160SGleb Smirnoff 	     dstaddr->sin_addr.s_addr == INADDR_ANY))
509f7a39160SGleb Smirnoff 		return (EDESTADDRREQ);
510620cf65cSArtem Khramov 	if (vhid != 0 && carp_attach_p == NULL)
511f7a39160SGleb Smirnoff 		return (EPROTONOSUPPORT);
512f7a39160SGleb Smirnoff 
513215bab79SShivank Garg #ifdef MAC
514215bab79SShivank Garg 	/* Check if a MAC policy disallows setting the IPv4 address. */
515215bab79SShivank Garg 	error = mac_inet_check_add_addr(cred, &addr->sin_addr, ifp);
516215bab79SShivank Garg 	if (error != 0)
517215bab79SShivank Garg 		return (error);
518215bab79SShivank Garg #endif
519215bab79SShivank Garg 
520f7a39160SGleb Smirnoff 	/*
521f7a39160SGleb Smirnoff 	 * See whether address already exist.
522f7a39160SGleb Smirnoff 	 */
523f7a39160SGleb Smirnoff 	iaIsFirst = true;
524f7a39160SGleb Smirnoff 	ia = NULL;
525a68cc388SGleb Smirnoff 	NET_EPOCH_ENTER(et);
526d7c5a620SMatt Macy 	CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
5279706c950SGleb Smirnoff 		struct in_ifaddr *it;
528f7a39160SGleb Smirnoff 
5299706c950SGleb Smirnoff 		if (ifa->ifa_addr->sa_family != AF_INET)
530f7a39160SGleb Smirnoff 			continue;
531f7a39160SGleb Smirnoff 
5329706c950SGleb Smirnoff 		it = (struct in_ifaddr *)ifa;
533f7a39160SGleb Smirnoff 		if (it->ia_addr.sin_addr.s_addr == addr->sin_addr.s_addr &&
534f375bf0eSAlexander V. Chernikov 		    prison_check_ip4(cred, &addr->sin_addr) == 0)
535f7a39160SGleb Smirnoff 			ia = it;
5363f740d43SAndrey V. Elsukov 		else
5373f740d43SAndrey V. Elsukov 			iaIsFirst = false;
5381067217dSGarrett Wollman 	}
539a68cc388SGleb Smirnoff 	NET_EPOCH_EXIT(et);
540f7a39160SGleb Smirnoff 
541f7a39160SGleb Smirnoff 	if (ia != NULL)
542f375bf0eSAlexander V. Chernikov 		(void )in_difaddr_ioctl(cmd, data, ifp, cred);
543f7a39160SGleb Smirnoff 
54446758960SGleb Smirnoff 	ifa = ifa_alloc(sizeof(struct in_ifaddr), M_WAITOK);
54546758960SGleb Smirnoff 	ia = (struct in_ifaddr *)ifa;
54659562606SGarrett Wollman 	ifa->ifa_addr = (struct sockaddr *)&ia->ia_addr;
54759562606SGarrett Wollman 	ifa->ifa_dstaddr = (struct sockaddr *)&ia->ia_dstaddr;
54859562606SGarrett Wollman 	ifa->ifa_netmask = (struct sockaddr *)&ia->ia_sockmask;
5492d9db0bcSEric van Gyzen 	callout_init_rw(&ia->ia_garp_timer, &ifp->if_addr_lock,
5502d9db0bcSEric van Gyzen 	    CALLOUT_RETURNUNLOCKED);
55119fc74fbSJeffrey Hsu 
552f7a39160SGleb Smirnoff 	ia->ia_ifp = ifp;
553f7a39160SGleb Smirnoff 	ia->ia_addr = *addr;
554f7a39160SGleb Smirnoff 	if (mask->sin_len != 0) {
555f7a39160SGleb Smirnoff 		ia->ia_sockmask = *mask;
556f7a39160SGleb Smirnoff 		ia->ia_subnetmask = ntohl(ia->ia_sockmask.sin_addr.s_addr);
557f7a39160SGleb Smirnoff 	} else {
5582f35e7d9SMike Karels 		in_addr_t i = ntohl(addr->sin_addr.s_addr);
5592f35e7d9SMike Karels 
560f7a39160SGleb Smirnoff 		/*
5612f35e7d9SMike Karels 	 	 * If netmask isn't supplied, use historical default.
56220d59403SMike Karels 		 * This is deprecated for interfaces other than loopback
56320d59403SMike Karels 		 * or point-to-point; warn in other cases.  In the future
56420d59403SMike Karels 		 * we should return an error rather than warning.
565f7a39160SGleb Smirnoff 	 	 */
56620d59403SMike Karels 		if ((ifp->if_flags & (IFF_POINTOPOINT | IFF_LOOPBACK)) == 0)
56720d59403SMike Karels 			printf("%s: set address: WARNING: network mask "
5682f35e7d9SMike Karels 			     "should be specified; using historical default\n",
56920d59403SMike Karels 			     ifp->if_xname);
5702f35e7d9SMike Karels 		if (IN_CLASSA(i))
5712f35e7d9SMike Karels 			ia->ia_subnetmask = IN_CLASSA_NET;
5722f35e7d9SMike Karels 		else if (IN_CLASSB(i))
5732f35e7d9SMike Karels 			ia->ia_subnetmask = IN_CLASSB_NET;
5742f35e7d9SMike Karels 		else
5752f35e7d9SMike Karels 			ia->ia_subnetmask = IN_CLASSC_NET;
576f7a39160SGleb Smirnoff 		ia->ia_sockmask.sin_addr.s_addr = htonl(ia->ia_subnetmask);
577f7a39160SGleb Smirnoff 	}
578f7a39160SGleb Smirnoff 	ia->ia_subnet = ntohl(addr->sin_addr.s_addr) & ia->ia_subnetmask;
579f7a39160SGleb Smirnoff 	in_socktrim(&ia->ia_sockmask);
580f7a39160SGleb Smirnoff 
581df8bae1dSRodney W. Grimes 	if (ifp->if_flags & IFF_BROADCAST) {
582f7a39160SGleb Smirnoff 		if (broadaddr->sin_len != 0) {
583f7a39160SGleb Smirnoff 			ia->ia_broadaddr = *broadaddr;
584f7a39160SGleb Smirnoff 		} else if (ia->ia_subnetmask == IN_RFC3021_MASK) {
585f7a39160SGleb Smirnoff 			ia->ia_broadaddr.sin_addr.s_addr = INADDR_BROADCAST;
586f7a39160SGleb Smirnoff 			ia->ia_broadaddr.sin_len = sizeof(struct sockaddr_in);
587f7a39160SGleb Smirnoff 			ia->ia_broadaddr.sin_family = AF_INET;
588f7a39160SGleb Smirnoff 		} else {
589f7a39160SGleb Smirnoff 			ia->ia_broadaddr.sin_addr.s_addr =
590f7a39160SGleb Smirnoff 			    htonl(ia->ia_subnet | ~ia->ia_subnetmask);
591f7a39160SGleb Smirnoff 			ia->ia_broadaddr.sin_len = sizeof(struct sockaddr_in);
592df8bae1dSRodney W. Grimes 			ia->ia_broadaddr.sin_family = AF_INET;
593df8bae1dSRodney W. Grimes 		}
594f7a39160SGleb Smirnoff 	}
595f7a39160SGleb Smirnoff 
596f7a39160SGleb Smirnoff 	if (ifp->if_flags & IFF_POINTOPOINT)
597f7a39160SGleb Smirnoff 		ia->ia_dstaddr = *dstaddr;
598f7a39160SGleb Smirnoff 
5995af464bbSSteven Hartland 	if (vhid != 0) {
6005af464bbSSteven Hartland 		error = (*carp_attach_p)(&ia->ia_ifa, vhid);
6015af464bbSSteven Hartland 		if (error)
6025af464bbSSteven Hartland 			return (error);
6035af464bbSSteven Hartland 	}
6045af464bbSSteven Hartland 
605a49b317cSAlexander V. Chernikov 	/* if_addrhead is already referenced by ifa_alloc() */
606137f91e8SJohn Baldwin 	IF_ADDR_WLOCK(ifp);
607d7c5a620SMatt Macy 	CK_STAILQ_INSERT_TAIL(&ifp->if_addrhead, ifa, ifa_link);
608137f91e8SJohn Baldwin 	IF_ADDR_WUNLOCK(ifp);
609f7a39160SGleb Smirnoff 
6108c0fec80SRobert Watson 	ifa_ref(ifa);			/* in_ifaddrhead */
611c8ee75f2SGleb Smirnoff 	sx_assert(&in_control_sx, SA_XLOCKED);
612d7c5a620SMatt Macy 	CK_STAILQ_INSERT_TAIL(&V_in_ifaddrhead, ia, ia_link);
613c8ee75f2SGleb Smirnoff 	CK_LIST_INSERT_HEAD(INADDR_HASH(ia->ia_addr.sin_addr.s_addr), ia,
614c8ee75f2SGleb Smirnoff 	    ia_hash);
615df8bae1dSRodney W. Grimes 
616f7a39160SGleb Smirnoff 	/*
617f7a39160SGleb Smirnoff 	 * Give the interface a chance to initialize
618f7a39160SGleb Smirnoff 	 * if this is its first address,
619f7a39160SGleb Smirnoff 	 * and to validate the address if necessary.
620f7a39160SGleb Smirnoff 	 */
621d34165f7SSteven Hartland 	if (ifp->if_ioctl != NULL) {
622f7a39160SGleb Smirnoff 		error = (*ifp->if_ioctl)(ifp, SIOCSIFADDR, (caddr_t)ia);
623f7a39160SGleb Smirnoff 		if (error)
6245af464bbSSteven Hartland 			goto fail1;
625d34165f7SSteven Hartland 	}
626f7a39160SGleb Smirnoff 
627f7a39160SGleb Smirnoff 	/*
628f7a39160SGleb Smirnoff 	 * Add route for the network.
629f7a39160SGleb Smirnoff 	 */
630f7a39160SGleb Smirnoff 	if (vhid == 0) {
631130aebbaSAlexander V. Chernikov 		error = in_addprefix(ia);
632f7a39160SGleb Smirnoff 		if (error)
6335af464bbSSteven Hartland 			goto fail1;
634df8bae1dSRodney W. Grimes 	}
635df8bae1dSRodney W. Grimes 
636588885f2SRobert Watson 	/*
637f7a39160SGleb Smirnoff 	 * Add a loopback route to self.
638588885f2SRobert Watson 	 */
639130aebbaSAlexander V. Chernikov 	if (vhid == 0 && ia_need_loopback_route(ia)) {
640f7a39160SGleb Smirnoff 		struct in_ifaddr *eia;
641df8bae1dSRodney W. Grimes 
642f7a39160SGleb Smirnoff 		eia = in_localip_more(ia);
643f7a39160SGleb Smirnoff 
644f7a39160SGleb Smirnoff 		if (eia == NULL) {
645f7a39160SGleb Smirnoff 			error = ifa_add_loopback_route((struct ifaddr *)ia,
646f7a39160SGleb Smirnoff 			    (struct sockaddr *)&ia->ia_addr);
647f7a39160SGleb Smirnoff 			if (error)
6485af464bbSSteven Hartland 				goto fail2;
649f7a39160SGleb Smirnoff 		} else
650f7a39160SGleb Smirnoff 			ifa_free(&eia->ia_ifa);
651588885f2SRobert Watson 	}
652df8bae1dSRodney W. Grimes 
653f7a39160SGleb Smirnoff 	if (iaIsFirst && (ifp->if_flags & IFF_MULTICAST)) {
654f7a39160SGleb Smirnoff 		struct in_addr allhosts_addr;
655f7a39160SGleb Smirnoff 		struct in_ifinfo *ii;
656df8bae1dSRodney W. Grimes 
657c75aa354SBruce M Simpson 		ii = ((struct in_ifinfo *)ifp->if_afdata[AF_INET]);
658f7a39160SGleb Smirnoff 		allhosts_addr.s_addr = htonl(INADDR_ALLHOSTS_GROUP);
659df8bae1dSRodney W. Grimes 
660f7a39160SGleb Smirnoff 		error = in_joingroup(ifp, &allhosts_addr, NULL,
661f7a39160SGleb Smirnoff 			&ii->ii_allhosts);
662f7a39160SGleb Smirnoff 	}
663f7a39160SGleb Smirnoff 
66464d63b1eSAndrey V. Elsukov 	/*
66564d63b1eSAndrey V. Elsukov 	 * Note: we don't need extra reference for ifa, since we called
66664d63b1eSAndrey V. Elsukov 	 * with sx lock held, and ifaddr can not be deleted in concurrent
66764d63b1eSAndrey V. Elsukov 	 * thread.
66864d63b1eSAndrey V. Elsukov 	 */
66964d63b1eSAndrey V. Elsukov 	EVENTHANDLER_INVOKE(ifaddr_event_ext, ifp, ifa, IFADDR_EVENT_ADD);
670f7a39160SGleb Smirnoff 
671f7a39160SGleb Smirnoff 	return (error);
672f7a39160SGleb Smirnoff 
6735af464bbSSteven Hartland fail2:
674f7a39160SGleb Smirnoff 	if (vhid == 0)
675f7a39160SGleb Smirnoff 		(void )in_scrubprefix(ia, LLE_STATIC);
676f7a39160SGleb Smirnoff 
6775af464bbSSteven Hartland fail1:
678f7a39160SGleb Smirnoff 	if (ia->ia_ifa.ifa_carp)
679338e227aSLuiz Otavio O Souza 		(*carp_detach_p)(&ia->ia_ifa, false);
680f7a39160SGleb Smirnoff 
681f7a39160SGleb Smirnoff 	IF_ADDR_WLOCK(ifp);
682d7c5a620SMatt Macy 	CK_STAILQ_REMOVE(&ifp->if_addrhead, &ia->ia_ifa, ifaddr, ifa_link);
683f7a39160SGleb Smirnoff 	IF_ADDR_WUNLOCK(ifp);
684a49b317cSAlexander V. Chernikov 	ifa_free(&ia->ia_ifa);		/* if_addrhead */
685f7a39160SGleb Smirnoff 
686c8ee75f2SGleb Smirnoff 	sx_assert(&in_control_sx, SA_XLOCKED);
687d7c5a620SMatt Macy 	CK_STAILQ_REMOVE(&V_in_ifaddrhead, ia, in_ifaddr, ia_link);
688c8ee75f2SGleb Smirnoff 	CK_LIST_REMOVE(ia, ia_hash);
689a49b317cSAlexander V. Chernikov 	ifa_free(&ia->ia_ifa);		/* in_ifaddrhead */
690f7a39160SGleb Smirnoff 
691f7a39160SGleb Smirnoff 	return (error);
692f7a39160SGleb Smirnoff }
693f7a39160SGleb Smirnoff 
694f7a39160SGleb Smirnoff static int
695f375bf0eSAlexander V. Chernikov in_difaddr_ioctl(u_long cmd, caddr_t data, struct ifnet *ifp, struct ucred *cred)
696f7a39160SGleb Smirnoff {
697f7a39160SGleb Smirnoff 	const struct ifreq *ifr = (struct ifreq *)data;
6986224cd89SNathan Whitehorn 	const struct sockaddr_in *addr = (const struct sockaddr_in *)
6996224cd89SNathan Whitehorn 	    &ifr->ifr_addr;
700f7a39160SGleb Smirnoff 	struct ifaddr *ifa;
701f7a39160SGleb Smirnoff 	struct in_ifaddr *ia;
702f7a39160SGleb Smirnoff 	bool deleteAny, iaIsLast;
703f7a39160SGleb Smirnoff 	int error;
704f7a39160SGleb Smirnoff 
705f375bf0eSAlexander V. Chernikov 	if (cred != NULL) {
706f375bf0eSAlexander V. Chernikov 		error = priv_check_cred(cred, PRIV_NET_DELIFADDR);
707f7a39160SGleb Smirnoff 		if (error)
708f7a39160SGleb Smirnoff 			return (error);
709f7a39160SGleb Smirnoff 	}
710f7a39160SGleb Smirnoff 
711f7a39160SGleb Smirnoff 	if (addr->sin_len != sizeof(struct sockaddr_in) ||
712f7a39160SGleb Smirnoff 	    addr->sin_family != AF_INET)
713f7a39160SGleb Smirnoff 		deleteAny = true;
714f7a39160SGleb Smirnoff 	else
715f7a39160SGleb Smirnoff 		deleteAny = false;
716f7a39160SGleb Smirnoff 
717f7a39160SGleb Smirnoff 	iaIsLast = true;
718f7a39160SGleb Smirnoff 	ia = NULL;
719f7a39160SGleb Smirnoff 	IF_ADDR_WLOCK(ifp);
720d7c5a620SMatt Macy 	CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
7219706c950SGleb Smirnoff 		struct in_ifaddr *it;
722f7a39160SGleb Smirnoff 
7239706c950SGleb Smirnoff 		if (ifa->ifa_addr->sa_family != AF_INET)
724f7a39160SGleb Smirnoff 			continue;
725f7a39160SGleb Smirnoff 
7269706c950SGleb Smirnoff 		it = (struct in_ifaddr *)ifa;
727f375bf0eSAlexander V. Chernikov 		if (deleteAny && ia == NULL && (cred == NULL ||
728f375bf0eSAlexander V. Chernikov 		    prison_check_ip4(cred, &it->ia_addr.sin_addr) == 0))
729f7a39160SGleb Smirnoff 			ia = it;
730f7a39160SGleb Smirnoff 
731f7a39160SGleb Smirnoff 		if (it->ia_addr.sin_addr.s_addr == addr->sin_addr.s_addr &&
732f375bf0eSAlexander V. Chernikov 		    (cred == NULL || prison_check_ip4(cred,
733f7a39160SGleb Smirnoff 		    &addr->sin_addr) == 0))
734f7a39160SGleb Smirnoff 			ia = it;
735f7a39160SGleb Smirnoff 
736f7a39160SGleb Smirnoff 		if (it != ia)
737f7a39160SGleb Smirnoff 			iaIsLast = false;
738f7a39160SGleb Smirnoff 	}
739f7a39160SGleb Smirnoff 
740f7a39160SGleb Smirnoff 	if (ia == NULL) {
741f7a39160SGleb Smirnoff 		IF_ADDR_WUNLOCK(ifp);
742f7a39160SGleb Smirnoff 		return (EADDRNOTAVAIL);
743f7a39160SGleb Smirnoff 	}
744f7a39160SGleb Smirnoff 
745d7c5a620SMatt Macy 	CK_STAILQ_REMOVE(&ifp->if_addrhead, &ia->ia_ifa, ifaddr, ifa_link);
746f7a39160SGleb Smirnoff 	IF_ADDR_WUNLOCK(ifp);
747f7a39160SGleb Smirnoff 	ifa_free(&ia->ia_ifa);		/* if_addrhead */
748f7a39160SGleb Smirnoff 
749c8ee75f2SGleb Smirnoff 	sx_assert(&in_control_sx, SA_XLOCKED);
750d7c5a620SMatt Macy 	CK_STAILQ_REMOVE(&V_in_ifaddrhead, ia, in_ifaddr, ia_link);
751c8ee75f2SGleb Smirnoff 	CK_LIST_REMOVE(ia, ia_hash);
752f7a39160SGleb Smirnoff 
753089cdfadSRuslan Ermilov 	/*
754237bf7f7SGleb Smirnoff 	 * in_scrubprefix() kills the interface route.
755089cdfadSRuslan Ermilov 	 */
756237bf7f7SGleb Smirnoff 	in_scrubprefix(ia, LLE_STATIC);
757588885f2SRobert Watson 
758c655b7c4SDavid Greenman 	/*
759089cdfadSRuslan Ermilov 	 * in_ifadown gets rid of all the rest of
760089cdfadSRuslan Ermilov 	 * the routes.  This is not quite the right
761089cdfadSRuslan Ermilov 	 * thing to do, but at least if we are running
762089cdfadSRuslan Ermilov 	 * a routing process they will come back.
763089cdfadSRuslan Ermilov 	 */
76491854268SRuslan Ermilov 	in_ifadown(&ia->ia_ifa, 1);
7650f02fdacSBrian Somers 
76608b68b0eSGleb Smirnoff 	if (ia->ia_ifa.ifa_carp)
76759b2022fSLuiz Otavio O Souza 		(*carp_detach_p)(&ia->ia_ifa, cmd == SIOCAIFADDR);
76808b68b0eSGleb Smirnoff 
769f7e083afSBruce M Simpson 	/*
770f7e083afSBruce M Simpson 	 * If this is the last IPv4 address configured on this
771f7e083afSBruce M Simpson 	 * interface, leave the all-hosts group.
772d10910e6SBruce M Simpson 	 * No state-change report need be transmitted.
773f7e083afSBruce M Simpson 	 */
774f7a39160SGleb Smirnoff 	if (iaIsLast && (ifp->if_flags & IFF_MULTICAST)) {
775f7a39160SGleb Smirnoff 		struct in_ifinfo *ii;
776f7a39160SGleb Smirnoff 
777c75aa354SBruce M Simpson 		ii = ((struct in_ifinfo *)ifp->if_afdata[AF_INET]);
778d10910e6SBruce M Simpson 		if (ii->ii_allhosts) {
779f3e1324bSStephen Hurd 			(void)in_leavegroup(ii->ii_allhosts, NULL);
780d10910e6SBruce M Simpson 			ii->ii_allhosts = NULL;
781d10910e6SBruce M Simpson 		}
782f7a39160SGleb Smirnoff 	}
7836d00fd9cSGleb Smirnoff 
7842d9db0bcSEric van Gyzen 	IF_ADDR_WLOCK(ifp);
7852d9db0bcSEric van Gyzen 	if (callout_stop(&ia->ia_garp_timer) == 1) {
7862d9db0bcSEric van Gyzen 		ifa_free(&ia->ia_ifa);
7872d9db0bcSEric van Gyzen 	}
7882d9db0bcSEric van Gyzen 	IF_ADDR_WUNLOCK(ifp);
7892d9db0bcSEric van Gyzen 
79064d63b1eSAndrey V. Elsukov 	EVENTHANDLER_INVOKE(ifaddr_event_ext, ifp, &ia->ia_ifa,
79164d63b1eSAndrey V. Elsukov 	    IFADDR_EVENT_DEL);
792a49b317cSAlexander V. Chernikov 	ifa_free(&ia->ia_ifa);		/* in_ifaddrhead */
793f7a39160SGleb Smirnoff 
794f7a39160SGleb Smirnoff 	return (0);
795df8bae1dSRodney W. Grimes }
796df8bae1dSRodney W. Grimes 
7976952c3e1SAndrey V. Elsukov static int
798f375bf0eSAlexander V. Chernikov in_gifaddr_ioctl(u_long cmd, caddr_t data, struct ifnet *ifp, struct ucred *cred)
7996952c3e1SAndrey V. Elsukov {
8006952c3e1SAndrey V. Elsukov 	struct in_aliasreq *ifra = (struct in_aliasreq *)data;
8016952c3e1SAndrey V. Elsukov 	const struct sockaddr_in *addr = &ifra->ifra_addr;
8026952c3e1SAndrey V. Elsukov 	struct epoch_tracker et;
8036952c3e1SAndrey V. Elsukov 	struct ifaddr *ifa;
8046952c3e1SAndrey V. Elsukov 	struct in_ifaddr *ia;
8056952c3e1SAndrey V. Elsukov 
8066952c3e1SAndrey V. Elsukov 	/*
8076952c3e1SAndrey V. Elsukov 	 * ifra_addr must be present and be of INET family.
8086952c3e1SAndrey V. Elsukov 	 */
8096952c3e1SAndrey V. Elsukov 	if (addr->sin_len != sizeof(struct sockaddr_in) ||
8106952c3e1SAndrey V. Elsukov 	    addr->sin_family != AF_INET)
8116952c3e1SAndrey V. Elsukov 		return (EINVAL);
8126952c3e1SAndrey V. Elsukov 
8136952c3e1SAndrey V. Elsukov 	/*
8146952c3e1SAndrey V. Elsukov 	 * See whether address exist.
8156952c3e1SAndrey V. Elsukov 	 */
8166952c3e1SAndrey V. Elsukov 	ia = NULL;
8176952c3e1SAndrey V. Elsukov 	NET_EPOCH_ENTER(et);
8186952c3e1SAndrey V. Elsukov 	CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
8196952c3e1SAndrey V. Elsukov 		struct in_ifaddr *it;
8206952c3e1SAndrey V. Elsukov 
8216952c3e1SAndrey V. Elsukov 		if (ifa->ifa_addr->sa_family != AF_INET)
8226952c3e1SAndrey V. Elsukov 			continue;
8236952c3e1SAndrey V. Elsukov 
8246952c3e1SAndrey V. Elsukov 		it = (struct in_ifaddr *)ifa;
8256952c3e1SAndrey V. Elsukov 		if (it->ia_addr.sin_addr.s_addr == addr->sin_addr.s_addr &&
826f375bf0eSAlexander V. Chernikov 		    prison_check_ip4(cred, &addr->sin_addr) == 0) {
8276952c3e1SAndrey V. Elsukov 			ia = it;
8286952c3e1SAndrey V. Elsukov 			break;
8296952c3e1SAndrey V. Elsukov 		}
8306952c3e1SAndrey V. Elsukov 	}
8316952c3e1SAndrey V. Elsukov 	if (ia == NULL) {
8326952c3e1SAndrey V. Elsukov 		NET_EPOCH_EXIT(et);
8336952c3e1SAndrey V. Elsukov 		return (EADDRNOTAVAIL);
8346952c3e1SAndrey V. Elsukov 	}
8356952c3e1SAndrey V. Elsukov 
8366952c3e1SAndrey V. Elsukov 	ifra->ifra_mask = ia->ia_sockmask;
8376952c3e1SAndrey V. Elsukov 	if ((ifp->if_flags & IFF_POINTOPOINT) &&
8386952c3e1SAndrey V. Elsukov 	    ia->ia_dstaddr.sin_family == AF_INET)
8396952c3e1SAndrey V. Elsukov 		ifra->ifra_dstaddr = ia->ia_dstaddr;
8406952c3e1SAndrey V. Elsukov 	else if ((ifp->if_flags & IFF_BROADCAST) &&
8416952c3e1SAndrey V. Elsukov 	    ia->ia_broadaddr.sin_family == AF_INET)
8426952c3e1SAndrey V. Elsukov 		ifra->ifra_broadaddr = ia->ia_broadaddr;
8436952c3e1SAndrey V. Elsukov 	else
8446952c3e1SAndrey V. Elsukov 		memset(&ifra->ifra_broadaddr, 0,
8456952c3e1SAndrey V. Elsukov 		    sizeof(ifra->ifra_broadaddr));
8466952c3e1SAndrey V. Elsukov 
8476952c3e1SAndrey V. Elsukov 	NET_EPOCH_EXIT(et);
8486952c3e1SAndrey V. Elsukov 	return (0);
8496952c3e1SAndrey V. Elsukov }
8506952c3e1SAndrey V. Elsukov 
85181728a53SAlexander V. Chernikov static int
85281728a53SAlexander V. Chernikov in_match_ifaddr(const struct rtentry *rt, const struct nhop_object *nh, void *arg)
85381728a53SAlexander V. Chernikov {
85481728a53SAlexander V. Chernikov 
85581728a53SAlexander V. Chernikov 	if (nh->nh_ifa == (struct ifaddr *)arg)
85681728a53SAlexander V. Chernikov 		return (1);
85781728a53SAlexander V. Chernikov 
85881728a53SAlexander V. Chernikov 	return (0);
85981728a53SAlexander V. Chernikov }
86081728a53SAlexander V. Chernikov 
86181728a53SAlexander V. Chernikov static int
8627b3440fcSAlexander V. Chernikov in_handle_prefix_route(uint32_t fibnum, int cmd,
8637b3440fcSAlexander V. Chernikov     struct sockaddr_in *dst, struct sockaddr_in *netmask, struct ifaddr *ifa,
8647b3440fcSAlexander V. Chernikov     struct ifnet *ifp)
86581728a53SAlexander V. Chernikov {
86681728a53SAlexander V. Chernikov 
86781728a53SAlexander V. Chernikov 	NET_EPOCH_ASSERT();
86881728a53SAlexander V. Chernikov 
8697b3440fcSAlexander V. Chernikov 	/* Prepare gateway */
8707b3440fcSAlexander V. Chernikov 	struct sockaddr_dl_short sdl = {
8717b3440fcSAlexander V. Chernikov 		.sdl_family = AF_LINK,
8727b3440fcSAlexander V. Chernikov 		.sdl_len = sizeof(struct sockaddr_dl_short),
8737b3440fcSAlexander V. Chernikov 		.sdl_type = ifa->ifa_ifp->if_type,
8747b3440fcSAlexander V. Chernikov 		.sdl_index = ifa->ifa_ifp->if_index,
8757b3440fcSAlexander V. Chernikov 	};
87681728a53SAlexander V. Chernikov 
8777b3440fcSAlexander V. Chernikov 	struct rt_addrinfo info = {
8787b3440fcSAlexander V. Chernikov 		.rti_ifa = ifa,
8797b3440fcSAlexander V. Chernikov 		.rti_ifp = ifp,
8807b3440fcSAlexander V. Chernikov 		.rti_flags = RTF_PINNED | ((netmask != NULL) ? 0 : RTF_HOST),
8817b3440fcSAlexander V. Chernikov 		.rti_info = {
8827b3440fcSAlexander V. Chernikov 			[RTAX_DST] = (struct sockaddr *)dst,
8837b3440fcSAlexander V. Chernikov 			[RTAX_NETMASK] = (struct sockaddr *)netmask,
8847b3440fcSAlexander V. Chernikov 			[RTAX_GATEWAY] = (struct sockaddr *)&sdl,
8857b3440fcSAlexander V. Chernikov 		},
8867b3440fcSAlexander V. Chernikov 		/* Ensure we delete the prefix IFF prefix ifa matches */
8877b3440fcSAlexander V. Chernikov 		.rti_filter = in_match_ifaddr,
8887b3440fcSAlexander V. Chernikov 		.rti_filterdata = ifa,
8897b3440fcSAlexander V. Chernikov 	};
8907b3440fcSAlexander V. Chernikov 
8917b3440fcSAlexander V. Chernikov 	return (rib_handle_ifaddr_info(fibnum, cmd, &info));
89281728a53SAlexander V. Chernikov }
89381728a53SAlexander V. Chernikov 
89481728a53SAlexander V. Chernikov /*
895130aebbaSAlexander V. Chernikov  * Routing table interaction with interface addresses.
896130aebbaSAlexander V. Chernikov  *
897130aebbaSAlexander V. Chernikov  * In general, two types of routes needs to be installed:
898130aebbaSAlexander V. Chernikov  * a) "interface" or "prefix" route, telling user that the addresses
899130aebbaSAlexander V. Chernikov  *   behind the ifa prefix are reached directly.
900130aebbaSAlexander V. Chernikov  * b) "loopback" route installed for the ifa address, telling user that
901130aebbaSAlexander V. Chernikov  *   the address belongs to local system.
902130aebbaSAlexander V. Chernikov  *
903130aebbaSAlexander V. Chernikov  * Handling for (a) and (b) differs in multi-fib aspects, hence they
904130aebbaSAlexander V. Chernikov  *  are implemented in different functions below.
905130aebbaSAlexander V. Chernikov  *
906130aebbaSAlexander V. Chernikov  * The cases above may intersect - /32 interface aliases results in
907130aebbaSAlexander V. Chernikov  *  the same prefix produced by (a) and (b). This blurs the definition
908130aebbaSAlexander V. Chernikov  *  of the "loopback" route and complicate interactions. The interaction
909130aebbaSAlexander V. Chernikov  *  table is defined below. The case numbers are used in the multiple
910130aebbaSAlexander V. Chernikov  *  functions below to refer to the particular test case.
911130aebbaSAlexander V. Chernikov  *
91281728a53SAlexander V. Chernikov  * There can be multiple options:
913130aebbaSAlexander V. Chernikov  * 1) Adding address with prefix on non-p2p/non-loopback interface.
914130aebbaSAlexander V. Chernikov  *  Example: 192.0.2.1/24. Action:
915130aebbaSAlexander V. Chernikov  *  * add "prefix" route towards 192.0.2.0/24 via @ia interface,
916130aebbaSAlexander V. Chernikov  *    using @ia as an address source.
917130aebbaSAlexander V. Chernikov  *  * add "loopback" route towards 192.0.2.1 via V_loif, saving
918130aebbaSAlexander V. Chernikov  *   @ia ifp in the gateway and using @ia as an address source.
919130aebbaSAlexander V. Chernikov  *
920130aebbaSAlexander V. Chernikov  * 2) Adding address with /32 mask to non-p2p/non-loopback interface.
921130aebbaSAlexander V. Chernikov  *  Example: 192.0.2.2/32. Action:
922130aebbaSAlexander V. Chernikov  *  * add "prefix" host route via V_loif, using @ia as an address source.
923130aebbaSAlexander V. Chernikov  *
92481728a53SAlexander V. Chernikov  * 3) Adding address with or without prefix to p2p interface.
925130aebbaSAlexander V. Chernikov  *  Example: 10.0.0.1/24->10.0.0.2. Action:
926130aebbaSAlexander V. Chernikov  *  * add "prefix" host route towards 10.0.0.2 via this interface, using @ia
927130aebbaSAlexander V. Chernikov  *    as an address source. Note: no sense in installing full /24 as the interface
928130aebbaSAlexander V. Chernikov  *    is point-to-point.
929130aebbaSAlexander V. Chernikov  *  * add "loopback" route towards 10.0.9.1 via V_loif, saving
930130aebbaSAlexander V. Chernikov  *   @ia ifp in the gateway and using @ia as an address source.
931130aebbaSAlexander V. Chernikov  *
93281728a53SAlexander V. Chernikov  * 4) Adding address with or without prefix to loopback interface.
933130aebbaSAlexander V. Chernikov  *  Example: 192.0.2.1/24. Action:
934130aebbaSAlexander V. Chernikov  *  * add "prefix" host route via @ia interface, using @ia as an address source.
935130aebbaSAlexander V. Chernikov  *    Note: Skip installing /24 prefix as it would introduce TTL loop
936130aebbaSAlexander V. Chernikov  *    for the traffic destined to these addresses.
937130aebbaSAlexander V. Chernikov  */
938130aebbaSAlexander V. Chernikov 
939130aebbaSAlexander V. Chernikov /*
940130aebbaSAlexander V. Chernikov  * Checks if @ia needs to install loopback route to @ia address via
941130aebbaSAlexander V. Chernikov  *  ifa_maintain_loopback_route().
942130aebbaSAlexander V. Chernikov  *
943130aebbaSAlexander V. Chernikov  * Return true on success.
944130aebbaSAlexander V. Chernikov  */
945130aebbaSAlexander V. Chernikov static bool
946130aebbaSAlexander V. Chernikov ia_need_loopback_route(const struct in_ifaddr *ia)
947130aebbaSAlexander V. Chernikov {
948130aebbaSAlexander V. Chernikov 	struct ifnet *ifp = ia->ia_ifp;
949130aebbaSAlexander V. Chernikov 
950130aebbaSAlexander V. Chernikov 	/* Case 4: Skip loopback interfaces */
951130aebbaSAlexander V. Chernikov 	if ((ifp->if_flags & IFF_LOOPBACK) ||
952130aebbaSAlexander V. Chernikov 	    (ia->ia_addr.sin_addr.s_addr == INADDR_ANY))
953130aebbaSAlexander V. Chernikov 		return (false);
954130aebbaSAlexander V. Chernikov 
955130aebbaSAlexander V. Chernikov 	/* Clash avoidance: Skip p2p interfaces with both addresses are equal */
956130aebbaSAlexander V. Chernikov 	if ((ifp->if_flags & IFF_POINTOPOINT) &&
957130aebbaSAlexander V. Chernikov 	    ia->ia_dstaddr.sin_addr.s_addr == ia->ia_addr.sin_addr.s_addr)
958130aebbaSAlexander V. Chernikov 		return (false);
959130aebbaSAlexander V. Chernikov 
960130aebbaSAlexander V. Chernikov 	/* Case 2: skip /32 prefixes */
961130aebbaSAlexander V. Chernikov 	if (!(ifp->if_flags & IFF_POINTOPOINT) &&
962130aebbaSAlexander V. Chernikov 	    (ia->ia_sockmask.sin_addr.s_addr == INADDR_BROADCAST))
963130aebbaSAlexander V. Chernikov 		return (false);
964130aebbaSAlexander V. Chernikov 
965130aebbaSAlexander V. Chernikov 	return (true);
966130aebbaSAlexander V. Chernikov }
967130aebbaSAlexander V. Chernikov 
968130aebbaSAlexander V. Chernikov /*
969130aebbaSAlexander V. Chernikov  * Calculate "prefix" route corresponding to @ia.
970130aebbaSAlexander V. Chernikov  */
971130aebbaSAlexander V. Chernikov static void
972130aebbaSAlexander V. Chernikov ia_getrtprefix(const struct in_ifaddr *ia, struct in_addr *prefix, struct in_addr *mask)
973130aebbaSAlexander V. Chernikov {
974130aebbaSAlexander V. Chernikov 
975130aebbaSAlexander V. Chernikov 	if (ia->ia_ifp->if_flags & IFF_POINTOPOINT) {
976130aebbaSAlexander V. Chernikov 		/* Case 3: return host route for dstaddr */
977130aebbaSAlexander V. Chernikov 		*prefix = ia->ia_dstaddr.sin_addr;
978130aebbaSAlexander V. Chernikov 		mask->s_addr = INADDR_BROADCAST;
979130aebbaSAlexander V. Chernikov 	} else if (ia->ia_ifp->if_flags & IFF_LOOPBACK) {
980130aebbaSAlexander V. Chernikov 		/* Case 4: return host route for ifaddr */
981130aebbaSAlexander V. Chernikov 		*prefix = ia->ia_addr.sin_addr;
982130aebbaSAlexander V. Chernikov 		mask->s_addr = INADDR_BROADCAST;
983130aebbaSAlexander V. Chernikov 	} else {
984130aebbaSAlexander V. Chernikov 		/* Cases 1,2: return actual ia prefix */
985130aebbaSAlexander V. Chernikov 		*prefix = ia->ia_addr.sin_addr;
986130aebbaSAlexander V. Chernikov 		*mask = ia->ia_sockmask.sin_addr;
987130aebbaSAlexander V. Chernikov 		prefix->s_addr &= mask->s_addr;
988130aebbaSAlexander V. Chernikov 	}
989130aebbaSAlexander V. Chernikov }
990130aebbaSAlexander V. Chernikov 
991130aebbaSAlexander V. Chernikov /*
992130aebbaSAlexander V. Chernikov  * Adds or delete interface "prefix" route corresponding to @ifa.
993130aebbaSAlexander V. Chernikov  *  Returns 0 on success or errno.
99481728a53SAlexander V. Chernikov  */
995b8103ca7SGleb Smirnoff static int
99681728a53SAlexander V. Chernikov in_handle_ifaddr_route(int cmd, struct in_ifaddr *ia)
99781728a53SAlexander V. Chernikov {
99881728a53SAlexander V. Chernikov 	struct ifaddr *ifa = &ia->ia_ifa;
99981728a53SAlexander V. Chernikov 	struct in_addr daddr, maddr;
10007b3440fcSAlexander V. Chernikov 	struct sockaddr_in *pmask;
100181728a53SAlexander V. Chernikov 	struct epoch_tracker et;
100281728a53SAlexander V. Chernikov 	int error;
100381728a53SAlexander V. Chernikov 
1004130aebbaSAlexander V. Chernikov 	ia_getrtprefix(ia, &daddr, &maddr);
100581728a53SAlexander V. Chernikov 
10067b3440fcSAlexander V. Chernikov 	struct sockaddr_in mask = {
10077b3440fcSAlexander V. Chernikov 		.sin_family = AF_INET,
10087b3440fcSAlexander V. Chernikov 		.sin_len = sizeof(struct sockaddr_in),
10097b3440fcSAlexander V. Chernikov 		.sin_addr = maddr,
10107b3440fcSAlexander V. Chernikov 	};
10117b3440fcSAlexander V. Chernikov 
10127b3440fcSAlexander V. Chernikov 	pmask = (maddr.s_addr != INADDR_BROADCAST) ? &mask : NULL;
101381728a53SAlexander V. Chernikov 
101481728a53SAlexander V. Chernikov 	struct sockaddr_in dst = {
101581728a53SAlexander V. Chernikov 		.sin_family = AF_INET,
101681728a53SAlexander V. Chernikov 		.sin_len = sizeof(struct sockaddr_in),
101781728a53SAlexander V. Chernikov 		.sin_addr.s_addr = daddr.s_addr & maddr.s_addr,
101881728a53SAlexander V. Chernikov 	};
101981728a53SAlexander V. Chernikov 
1020130aebbaSAlexander V. Chernikov 	struct ifnet *ifp = ia->ia_ifp;
1021130aebbaSAlexander V. Chernikov 
1022130aebbaSAlexander V. Chernikov 	if ((maddr.s_addr == INADDR_BROADCAST) &&
1023130aebbaSAlexander V. Chernikov 	    (!(ia->ia_ifp->if_flags & (IFF_POINTOPOINT|IFF_LOOPBACK)))) {
1024130aebbaSAlexander V. Chernikov 		/* Case 2: host route on broadcast interface */
1025130aebbaSAlexander V. Chernikov 		ifp = V_loif;
1026130aebbaSAlexander V. Chernikov 	}
1027130aebbaSAlexander V. Chernikov 
102881728a53SAlexander V. Chernikov 	uint32_t fibnum = ifa->ifa_ifp->if_fib;
102981728a53SAlexander V. Chernikov 	NET_EPOCH_ENTER(et);
10307b3440fcSAlexander V. Chernikov 	error = in_handle_prefix_route(fibnum, cmd, &dst, pmask, ifa, ifp);
103181728a53SAlexander V. Chernikov 	NET_EPOCH_EXIT(et);
103281728a53SAlexander V. Chernikov 
103381728a53SAlexander V. Chernikov 	return (error);
103481728a53SAlexander V. Chernikov }
103581728a53SAlexander V. Chernikov 
1036ccbb9c35SQing Li /*
1037d68cf57bSAlexander V. Chernikov  * Check if we have a route for the given prefix already.
103848321abeSMax Laier  */
1039d68cf57bSAlexander V. Chernikov static bool
1040130aebbaSAlexander V. Chernikov in_hasrtprefix(struct in_ifaddr *target)
104148321abeSMax Laier {
10422144431cSGleb Smirnoff 	struct epoch_tracker et;
104348321abeSMax Laier 	struct in_ifaddr *ia;
1044bfb26eecSGleb Smirnoff 	struct in_addr prefix, mask, p, m;
1045d68cf57bSAlexander V. Chernikov 	bool result = false;
104648321abeSMax Laier 
1047130aebbaSAlexander V. Chernikov 	ia_getrtprefix(target, &prefix, &mask);
104848321abeSMax Laier 
10490cfee0c2SAlan Somers 	/* Look for an existing address with the same prefix, mask, and fib */
10502144431cSGleb Smirnoff 	NET_EPOCH_ENTER(et);
1051d7c5a620SMatt Macy 	CK_STAILQ_FOREACH(ia, &V_in_ifaddrhead, ia_link) {
1052130aebbaSAlexander V. Chernikov 		ia_getrtprefix(ia, &p, &m);
1053bfb26eecSGleb Smirnoff 
1054bfb26eecSGleb Smirnoff 		if (prefix.s_addr != p.s_addr ||
1055bfb26eecSGleb Smirnoff 		    mask.s_addr != m.s_addr)
1056bfb26eecSGleb Smirnoff 			continue;
1057130aebbaSAlexander V. Chernikov 
10580cfee0c2SAlan Somers 		if (target->ia_ifp->if_fib != ia->ia_ifp->if_fib)
10590cfee0c2SAlan Somers 			continue;
106048321abeSMax Laier 
106148321abeSMax Laier 		/*
106248321abeSMax Laier 		 * If we got a matching prefix route inserted by other
106348321abeSMax Laier 		 * interface address, we are done here.
106448321abeSMax Laier 		 */
10651ae95409SGleb Smirnoff 		if (ia->ia_flags & IFA_ROUTE) {
1066d68cf57bSAlexander V. Chernikov 			result = true;
1067d68cf57bSAlexander V. Chernikov 			break;
1068d68cf57bSAlexander V. Chernikov 		}
1069d68cf57bSAlexander V. Chernikov 	}
10702144431cSGleb Smirnoff 	NET_EPOCH_EXIT(et);
10710cfee0c2SAlan Somers 
1072d68cf57bSAlexander V. Chernikov 	return (result);
1073d68cf57bSAlexander V. Chernikov }
1074d68cf57bSAlexander V. Chernikov 
1075d68cf57bSAlexander V. Chernikov int
1076130aebbaSAlexander V. Chernikov in_addprefix(struct in_ifaddr *target)
1077d68cf57bSAlexander V. Chernikov {
1078d68cf57bSAlexander V. Chernikov 	int error;
1079d68cf57bSAlexander V. Chernikov 
1080130aebbaSAlexander V. Chernikov 	if (in_hasrtprefix(target)) {
1081d68cf57bSAlexander V. Chernikov 		if (V_nosameprefix)
1082d68cf57bSAlexander V. Chernikov 			return (EEXIST);
1083d68cf57bSAlexander V. Chernikov 		else {
1084d68cf57bSAlexander V. Chernikov 			rt_addrmsg(RTM_ADD, &target->ia_ifa,
1085d68cf57bSAlexander V. Chernikov 			    target->ia_ifp->if_fib);
10861ae95409SGleb Smirnoff 			return (0);
10871ae95409SGleb Smirnoff 		}
108848321abeSMax Laier 	}
108948321abeSMax Laier 
109048321abeSMax Laier 	/*
109148321abeSMax Laier 	 * No-one seem to have this prefix route, so we try to insert it.
109248321abeSMax Laier 	 */
109381728a53SAlexander V. Chernikov 	rt_addrmsg(RTM_ADD, &target->ia_ifa, target->ia_ifp->if_fib);
109481728a53SAlexander V. Chernikov 	error = in_handle_ifaddr_route(RTM_ADD, target);
109548321abeSMax Laier 	if (!error)
109648321abeSMax Laier 		target->ia_flags |= IFA_ROUTE;
1097460473a0SBjoern A. Zeeb 	return (error);
109848321abeSMax Laier }
109948321abeSMax Laier 
110048321abeSMax Laier /*
11013e7a2321SAlexander V. Chernikov  * Removes either all lle entries for given @ia, or lle
11023e7a2321SAlexander V. Chernikov  * corresponding to @ia address.
11033e7a2321SAlexander V. Chernikov  */
11043e7a2321SAlexander V. Chernikov static void
11053e7a2321SAlexander V. Chernikov in_scrubprefixlle(struct in_ifaddr *ia, int all, u_int flags)
11063e7a2321SAlexander V. Chernikov {
11073e7a2321SAlexander V. Chernikov 	struct sockaddr_in addr, mask;
11083e7a2321SAlexander V. Chernikov 	struct sockaddr *saddr, *smask;
11093e7a2321SAlexander V. Chernikov 	struct ifnet *ifp;
11103e7a2321SAlexander V. Chernikov 
11113e7a2321SAlexander V. Chernikov 	saddr = (struct sockaddr *)&addr;
11123e7a2321SAlexander V. Chernikov 	bzero(&addr, sizeof(addr));
11133e7a2321SAlexander V. Chernikov 	addr.sin_len = sizeof(addr);
11143e7a2321SAlexander V. Chernikov 	addr.sin_family = AF_INET;
11153e7a2321SAlexander V. Chernikov 	smask = (struct sockaddr *)&mask;
11163e7a2321SAlexander V. Chernikov 	bzero(&mask, sizeof(mask));
11173e7a2321SAlexander V. Chernikov 	mask.sin_len = sizeof(mask);
11183e7a2321SAlexander V. Chernikov 	mask.sin_family = AF_INET;
11193e7a2321SAlexander V. Chernikov 	mask.sin_addr.s_addr = ia->ia_subnetmask;
11203e7a2321SAlexander V. Chernikov 	ifp = ia->ia_ifp;
11213e7a2321SAlexander V. Chernikov 
112226a60575SAlexander V. Chernikov 	if (all) {
112326a60575SAlexander V. Chernikov 		/*
112426a60575SAlexander V. Chernikov 		 * Remove all L2 entries matching given prefix.
112526a60575SAlexander V. Chernikov 		 * Convert address to host representation to avoid
112626a60575SAlexander V. Chernikov 		 * doing this on every callback. ia_subnetmask is already
112726a60575SAlexander V. Chernikov 		 * stored in host representation.
112826a60575SAlexander V. Chernikov 		 */
112926a60575SAlexander V. Chernikov 		addr.sin_addr.s_addr = ntohl(ia->ia_addr.sin_addr.s_addr);
11303e7a2321SAlexander V. Chernikov 		lltable_prefix_free(AF_INET, saddr, smask, flags);
113126a60575SAlexander V. Chernikov 	} else {
113226a60575SAlexander V. Chernikov 		/* Remove interface address only */
113326a60575SAlexander V. Chernikov 		addr.sin_addr.s_addr = ia->ia_addr.sin_addr.s_addr;
11343e7a2321SAlexander V. Chernikov 		lltable_delete_addr(LLTABLE(ifp), LLE_IFADDR, saddr);
11353e7a2321SAlexander V. Chernikov 	}
113626a60575SAlexander V. Chernikov }
11373e7a2321SAlexander V. Chernikov 
11383e7a2321SAlexander V. Chernikov /*
113948321abeSMax Laier  * If there is no other address in the system that can serve a route to the
114048321abeSMax Laier  * same prefix, remove the route.  Hand over the route to the new address
114148321abeSMax Laier  * otherwise.
114248321abeSMax Laier  */
114308b68b0eSGleb Smirnoff int
11445b84dc78SQing Li in_scrubprefix(struct in_ifaddr *target, u_int flags)
114548321abeSMax Laier {
11462144431cSGleb Smirnoff 	struct epoch_tracker et;
114748321abeSMax Laier 	struct in_ifaddr *ia;
114855174c34SGleb Smirnoff 	struct in_addr prefix, mask, p, m;
11497278b62aSAlan Somers 	int error = 0;
115048321abeSMax Laier 
1151df813b7eSQing Li 	/*
1152df813b7eSQing Li 	 * Remove the loopback route to the interface address.
1153df813b7eSQing Li 	 */
1154130aebbaSAlexander V. Chernikov 	if (ia_need_loopback_route(target) && (flags & LLE_STATIC)) {
1155f7a39160SGleb Smirnoff 		struct in_ifaddr *eia;
1156c7ab6602SQing Li 
1157f7a39160SGleb Smirnoff 		eia = in_localip_more(target);
1158f7a39160SGleb Smirnoff 
1159f7a39160SGleb Smirnoff 		if (eia != NULL) {
1160f7a39160SGleb Smirnoff 			error = ifa_switch_loopback_route((struct ifaddr *)eia,
116159c180c3SAlexander V. Chernikov 			    (struct sockaddr *)&target->ia_addr);
1162f7a39160SGleb Smirnoff 			ifa_free(&eia->ia_ifa);
1163f7a39160SGleb Smirnoff 		} else {
11649bb7d0f4SQing Li 			error = ifa_del_loopback_route((struct ifaddr *)target,
11659bb7d0f4SQing Li 			    (struct sockaddr *)&target->ia_addr);
11665b84dc78SQing Li 		}
1167ebc90701SQing Li 	}
1168ebc90701SQing Li 
1169130aebbaSAlexander V. Chernikov 	ia_getrtprefix(target, &prefix, &mask);
117048321abeSMax Laier 
1171ccbb9c35SQing Li 	if ((target->ia_flags & IFA_ROUTE) == 0) {
1172d68cf57bSAlexander V. Chernikov 		rt_addrmsg(RTM_DELETE, &target->ia_ifa, target->ia_ifp->if_fib);
117326a60575SAlexander V. Chernikov 
117426a60575SAlexander V. Chernikov 		/*
117526a60575SAlexander V. Chernikov 		 * Removing address from !IFF_UP interface or
117626a60575SAlexander V. Chernikov 		 * prefix which exists on other interface (along with route).
117726a60575SAlexander V. Chernikov 		 * No entries should exist here except target addr.
117826a60575SAlexander V. Chernikov 		 * Given that, delete this entry only.
117926a60575SAlexander V. Chernikov 		 */
118026a60575SAlexander V. Chernikov 		in_scrubprefixlle(target, 0, flags);
1181ccbb9c35SQing Li 		return (0);
1182ccbb9c35SQing Li 	}
1183ccbb9c35SQing Li 
11842144431cSGleb Smirnoff 	NET_EPOCH_ENTER(et);
1185d7c5a620SMatt Macy 	CK_STAILQ_FOREACH(ia, &V_in_ifaddrhead, ia_link) {
1186130aebbaSAlexander V. Chernikov 		ia_getrtprefix(ia, &p, &m);
118755174c34SGleb Smirnoff 
118855174c34SGleb Smirnoff 		if (prefix.s_addr != p.s_addr ||
118955174c34SGleb Smirnoff 		    mask.s_addr != m.s_addr)
119055174c34SGleb Smirnoff 			continue;
119148321abeSMax Laier 
119255174c34SGleb Smirnoff 		if ((ia->ia_ifp->if_flags & IFF_UP) == 0)
119348321abeSMax Laier 			continue;
119448321abeSMax Laier 
119548321abeSMax Laier 		/*
119648321abeSMax Laier 		 * If we got a matching prefix address, move IFA_ROUTE and
119748321abeSMax Laier 		 * the route itself to it.  Make sure that routing daemons
119848321abeSMax Laier 		 * get a heads-up.
119948321abeSMax Laier 		 */
120008b68b0eSGleb Smirnoff 		if ((ia->ia_flags & IFA_ROUTE) == 0) {
120179d51435SSergey Kandaurov 			ifa_ref(&ia->ia_ifa);
12022144431cSGleb Smirnoff 			NET_EPOCH_EXIT(et);
120381728a53SAlexander V. Chernikov 			error = in_handle_ifaddr_route(RTM_DELETE, target);
120492322284SQing Li 			if (error == 0)
120548321abeSMax Laier 				target->ia_flags &= ~IFA_ROUTE;
120692322284SQing Li 			else
120792322284SQing Li 				log(LOG_INFO, "in_scrubprefix: err=%d, old prefix delete failed\n",
120892322284SQing Li 					error);
12093e7a2321SAlexander V. Chernikov 			/* Scrub all entries IFF interface is different */
12103e7a2321SAlexander V. Chernikov 			in_scrubprefixlle(target, target->ia_ifp != ia->ia_ifp,
12113e7a2321SAlexander V. Chernikov 			    flags);
121281728a53SAlexander V. Chernikov 			error = in_handle_ifaddr_route(RTM_ADD, ia);
121348321abeSMax Laier 			if (error == 0)
121448321abeSMax Laier 				ia->ia_flags |= IFA_ROUTE;
121592322284SQing Li 			else
121692322284SQing Li 				log(LOG_INFO, "in_scrubprefix: err=%d, new prefix add failed\n",
121792322284SQing Li 					error);
121879d51435SSergey Kandaurov 			ifa_free(&ia->ia_ifa);
1219460473a0SBjoern A. Zeeb 			return (error);
122048321abeSMax Laier 		}
122148321abeSMax Laier 	}
12222144431cSGleb Smirnoff 	NET_EPOCH_EXIT(et);
122348321abeSMax Laier 
122448321abeSMax Laier 	/*
1225c9d763bfSQing Li 	 * remove all L2 entries on the given prefix
1226c9d763bfSQing Li 	 */
12273e7a2321SAlexander V. Chernikov 	in_scrubprefixlle(target, 1, flags);
1228c9d763bfSQing Li 
1229c9d763bfSQing Li 	/*
123048321abeSMax Laier 	 * As no-one seem to have this prefix, we can remove the route.
123148321abeSMax Laier 	 */
123281728a53SAlexander V. Chernikov 	rt_addrmsg(RTM_DELETE, &target->ia_ifa, target->ia_ifp->if_fib);
123381728a53SAlexander V. Chernikov 	error = in_handle_ifaddr_route(RTM_DELETE, target);
123492322284SQing Li 	if (error == 0)
123548321abeSMax Laier 		target->ia_flags &= ~IFA_ROUTE;
123692322284SQing Li 	else
123792322284SQing Li 		log(LOG_INFO, "in_scrubprefix: err=%d, prefix delete failed\n", error);
123892322284SQing Li 	return (error);
123948321abeSMax Laier }
124048321abeSMax Laier 
124189856f7eSBjoern A. Zeeb void
124289856f7eSBjoern A. Zeeb in_ifscrub_all(void)
124389856f7eSBjoern A. Zeeb {
124489856f7eSBjoern A. Zeeb 	struct ifnet *ifp;
124589856f7eSBjoern A. Zeeb 	struct ifaddr *ifa, *nifa;
1246bc06c514SKonrad Witaszczyk 	struct ifreq ifr;
124789856f7eSBjoern A. Zeeb 
124889856f7eSBjoern A. Zeeb 	IFNET_RLOCK();
12494f6c66ccSMatt Macy 	CK_STAILQ_FOREACH(ifp, &V_ifnet, if_link) {
125089856f7eSBjoern A. Zeeb 		/* Cannot lock here - lock recursion. */
1251a68cc388SGleb Smirnoff 		/* NET_EPOCH_ENTER(et); */
1252d7c5a620SMatt Macy 		CK_STAILQ_FOREACH_SAFE(ifa, &ifp->if_addrhead, ifa_link, nifa) {
125389856f7eSBjoern A. Zeeb 			if (ifa->ifa_addr->sa_family != AF_INET)
125489856f7eSBjoern A. Zeeb 				continue;
125589856f7eSBjoern A. Zeeb 
125689856f7eSBjoern A. Zeeb 			/*
125789856f7eSBjoern A. Zeeb 			 * This is ugly but the only way for legacy IP to
125889856f7eSBjoern A. Zeeb 			 * cleanly remove addresses and everything attached.
125989856f7eSBjoern A. Zeeb 			 */
126089856f7eSBjoern A. Zeeb 			bzero(&ifr, sizeof(ifr));
1261bc06c514SKonrad Witaszczyk 			ifr.ifr_addr = *ifa->ifa_addr;
126289856f7eSBjoern A. Zeeb 			(void)in_control(NULL, SIOCDIFADDR, (caddr_t)&ifr,
126389856f7eSBjoern A. Zeeb 			    ifp, NULL);
126489856f7eSBjoern A. Zeeb 		}
1265a68cc388SGleb Smirnoff 		/* NET_EPOCH_EXIT(et); */
126689856f7eSBjoern A. Zeeb 		in_purgemaddrs(ifp);
126789856f7eSBjoern A. Zeeb 		igmp_domifdetach(ifp);
126889856f7eSBjoern A. Zeeb 	}
126989856f7eSBjoern A. Zeeb 	IFNET_RUNLOCK();
127089856f7eSBjoern A. Zeeb }
127189856f7eSBjoern A. Zeeb 
1272dc9db1f6SGleb Smirnoff bool
127390cc51a1SRyan Stone in_ifaddr_broadcast(struct in_addr in, struct in_ifaddr *ia)
127490cc51a1SRyan Stone {
127590cc51a1SRyan Stone 
127690cc51a1SRyan Stone 	return ((in.s_addr == ia->ia_broadaddr.sin_addr.s_addr ||
127790cc51a1SRyan Stone 	     /*
1278fd076593SMike Karels 	      * Optionally check for old-style (host 0) broadcast, but
127990cc51a1SRyan Stone 	      * taking into account that RFC 3021 obsoletes it.
128090cc51a1SRyan Stone 	      */
1281dc9db1f6SGleb Smirnoff 	    __predict_false(V_broadcast_lowest &&
1282dc9db1f6SGleb Smirnoff 	    ia->ia_subnetmask != IN_RFC3021_MASK &&
128390cc51a1SRyan Stone 	    ntohl(in.s_addr) == ia->ia_subnet)) &&
128490cc51a1SRyan Stone 	     /*
128590cc51a1SRyan Stone 	      * Check for an all one subnetmask. These
128690cc51a1SRyan Stone 	      * only exist when an interface gets a secondary
128790cc51a1SRyan Stone 	      * address.
128890cc51a1SRyan Stone 	      */
128990cc51a1SRyan Stone 	    ia->ia_subnetmask != (u_long)0xffffffff);
129090cc51a1SRyan Stone }
129190cc51a1SRyan Stone 
1292df8bae1dSRodney W. Grimes /*
1293dc9db1f6SGleb Smirnoff  * Return true if the address might be a local broadcast address.
1294df8bae1dSRodney W. Grimes  */
1295dc9db1f6SGleb Smirnoff bool
1296197fc4caSGleb Smirnoff in_ifnet_broadcast(struct in_addr in, struct ifnet *ifp)
1297df8bae1dSRodney W. Grimes {
12983e85b721SEd Maste 	struct ifaddr *ifa;
1299df8bae1dSRodney W. Grimes 
1300b8a6e03fSGleb Smirnoff 	NET_EPOCH_ASSERT();
1301b8a6e03fSGleb Smirnoff 
1302532106f7SGleb Smirnoff 	if (in_broadcast(in))
1303dc9db1f6SGleb Smirnoff 		return (true);
1304df8bae1dSRodney W. Grimes 	if ((ifp->if_flags & IFF_BROADCAST) == 0)
1305dc9db1f6SGleb Smirnoff 		return (false);
1306df8bae1dSRodney W. Grimes 	/*
1307df8bae1dSRodney W. Grimes 	 * Look through the list of addresses for a match
1308df8bae1dSRodney W. Grimes 	 * with a broadcast address.
1309df8bae1dSRodney W. Grimes 	 */
1310d7c5a620SMatt Macy 	CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link)
1311df8bae1dSRodney W. Grimes 		if (ifa->ifa_addr->sa_family == AF_INET &&
1312dc9db1f6SGleb Smirnoff 		    in_ifaddr_broadcast(in, (struct in_ifaddr *)ifa))
1313dc9db1f6SGleb Smirnoff 			return (true);
1314dc9db1f6SGleb Smirnoff 	return (false);
1315df8bae1dSRodney W. Grimes }
1316ec002feeSBruce M Simpson 
1317df8bae1dSRodney W. Grimes /*
1318b1c53bc9SRobert Watson  * On interface removal, clean up IPv4 data structures hung off of the ifnet.
1319b1c53bc9SRobert Watson  */
1320b1c53bc9SRobert Watson void
1321f2565d68SRobert Watson in_ifdetach(struct ifnet *ifp)
1322b1c53bc9SRobert Watson {
1323f3e1324bSStephen Hurd 	IN_MULTI_LOCK();
1324603724d3SBjoern A. Zeeb 	in_pcbpurgeif0(&V_ripcbinfo, ifp);
1325603724d3SBjoern A. Zeeb 	in_pcbpurgeif0(&V_udbinfo, ifp);
1326e06e816fSKevin Lo 	in_pcbpurgeif0(&V_ulitecbinfo, ifp);
1327ec002feeSBruce M Simpson 	in_purgemaddrs(ifp);
1328f3e1324bSStephen Hurd 	IN_MULTI_UNLOCK();
13293689652cSHans Petter Selasky 
13303689652cSHans Petter Selasky 	/*
13313689652cSHans Petter Selasky 	 * Make sure all multicast deletions invoking if_ioctl() are
13323689652cSHans Petter Selasky 	 * completed before returning. Else we risk accessing a freed
13333689652cSHans Petter Selasky 	 * ifnet structure pointer.
13343689652cSHans Petter Selasky 	 */
13353689652cSHans Petter Selasky 	inm_release_wait(NULL);
1336b1c53bc9SRobert Watson }
13376e6b3f7cSQing Li 
1338b8103ca7SGleb Smirnoff static void
1339b8103ca7SGleb Smirnoff in_ifnet_event(void *arg __unused, struct ifnet *ifp, int event)
1340b8103ca7SGleb Smirnoff {
1341b8103ca7SGleb Smirnoff 	struct epoch_tracker et;
1342b8103ca7SGleb Smirnoff 	struct ifaddr *ifa;
1343b8103ca7SGleb Smirnoff 	struct in_ifaddr *ia;
1344b8103ca7SGleb Smirnoff 	int error;
1345b8103ca7SGleb Smirnoff 
1346b8103ca7SGleb Smirnoff 	NET_EPOCH_ENTER(et);
1347b8103ca7SGleb Smirnoff 	switch (event) {
1348b8103ca7SGleb Smirnoff 	case IFNET_EVENT_DOWN:
1349b8103ca7SGleb Smirnoff 		CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
1350b8103ca7SGleb Smirnoff 			if (ifa->ifa_addr->sa_family != AF_INET)
1351b8103ca7SGleb Smirnoff 				continue;
1352b8103ca7SGleb Smirnoff 			ia = (struct in_ifaddr *)ifa;
1353b8103ca7SGleb Smirnoff 			if ((ia->ia_flags & IFA_ROUTE) == 0)
1354b8103ca7SGleb Smirnoff 				continue;
1355b8103ca7SGleb Smirnoff 			ifa_ref(ifa);
1356b8103ca7SGleb Smirnoff 			/*
1357b8103ca7SGleb Smirnoff 			 * in_scrubprefix() kills the interface route.
1358b8103ca7SGleb Smirnoff 			 */
1359b8103ca7SGleb Smirnoff 			in_scrubprefix(ia, 0);
1360b8103ca7SGleb Smirnoff 			/*
1361b8103ca7SGleb Smirnoff 			 * in_ifadown gets rid of all the rest of the
1362b8103ca7SGleb Smirnoff 			 * routes.  This is not quite the right thing
1363b8103ca7SGleb Smirnoff 			 * to do, but at least if we are running a
1364b8103ca7SGleb Smirnoff 			 * routing process they will come back.
1365b8103ca7SGleb Smirnoff 			 */
1366b8103ca7SGleb Smirnoff 			in_ifadown(ifa, 0);
1367b8103ca7SGleb Smirnoff 			ifa_free(ifa);
1368b8103ca7SGleb Smirnoff 		}
1369b8103ca7SGleb Smirnoff 		break;
1370b8103ca7SGleb Smirnoff 
1371b8103ca7SGleb Smirnoff 	case IFNET_EVENT_UP:
1372b8103ca7SGleb Smirnoff 		CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
1373b8103ca7SGleb Smirnoff 			if (ifa->ifa_addr->sa_family != AF_INET)
1374b8103ca7SGleb Smirnoff 				continue;
1375b8103ca7SGleb Smirnoff 			ia = (struct in_ifaddr *)ifa;
1376b8103ca7SGleb Smirnoff 			if (ia->ia_flags & IFA_ROUTE)
1377b8103ca7SGleb Smirnoff 				continue;
1378b8103ca7SGleb Smirnoff 			ifa_ref(ifa);
1379b8103ca7SGleb Smirnoff 			error = ifa_del_loopback_route(ifa, ifa->ifa_addr);
1380b8103ca7SGleb Smirnoff 			rt_addrmsg(RTM_ADD, ifa, ifa->ifa_ifp->if_fib);
1381b8103ca7SGleb Smirnoff 			error = in_handle_ifaddr_route(RTM_ADD, ia);
1382b8103ca7SGleb Smirnoff 			if (error == 0)
1383b8103ca7SGleb Smirnoff 				ia->ia_flags |= IFA_ROUTE;
1384b8103ca7SGleb Smirnoff 			error = ifa_add_loopback_route(ifa, ifa->ifa_addr);
1385b8103ca7SGleb Smirnoff 			ifa_free(ifa);
1386b8103ca7SGleb Smirnoff 		}
1387b8103ca7SGleb Smirnoff 		break;
1388b8103ca7SGleb Smirnoff 	}
1389b8103ca7SGleb Smirnoff 	NET_EPOCH_EXIT(et);
1390b8103ca7SGleb Smirnoff }
1391b8103ca7SGleb Smirnoff EVENTHANDLER_DEFINE(ifnet_event, in_ifnet_event, NULL, EVENTHANDLER_PRI_ANY);
1392b8103ca7SGleb Smirnoff 
1393d10910e6SBruce M Simpson /*
1394d10910e6SBruce M Simpson  * Delete all IPv4 multicast address records, and associated link-layer
1395d10910e6SBruce M Simpson  * multicast address records, associated with ifp.
1396d10910e6SBruce M Simpson  * XXX It looks like domifdetach runs AFTER the link layer cleanup.
139756663a40SBruce M Simpson  * XXX This should not race with ifma_protospec being set during
139856663a40SBruce M Simpson  * a new allocation, if it does, we have bigger problems.
1399d10910e6SBruce M Simpson  */
1400d10910e6SBruce M Simpson static void
1401d10910e6SBruce M Simpson in_purgemaddrs(struct ifnet *ifp)
1402d10910e6SBruce M Simpson {
14031e9482f4SAlexander Motin 	struct epoch_tracker	 et;
1404f3e1324bSStephen Hurd 	struct in_multi_head purgeinms;
1405f3e1324bSStephen Hurd 	struct in_multi		*inm;
14061e9482f4SAlexander Motin 	struct ifmultiaddr	*ifma;
1407d10910e6SBruce M Simpson 
1408f3e1324bSStephen Hurd 	SLIST_INIT(&purgeinms);
1409f3e1324bSStephen Hurd 	IN_MULTI_LIST_LOCK();
1410d10910e6SBruce M Simpson 
1411d10910e6SBruce M Simpson 	/*
1412d10910e6SBruce M Simpson 	 * Extract list of in_multi associated with the detaching ifp
1413d10910e6SBruce M Simpson 	 * which the PF_INET layer is about to release.
1414d10910e6SBruce M Simpson 	 * We need to do this as IF_ADDR_LOCK() may be re-acquired
1415d10910e6SBruce M Simpson 	 * by code further down.
1416d10910e6SBruce M Simpson 	 */
1417b6f6f880SMatt Macy 	IF_ADDR_WLOCK(ifp);
14181e9482f4SAlexander Motin 	NET_EPOCH_ENTER(et);
14191e9482f4SAlexander Motin 	CK_STAILQ_FOREACH(ifma, &ifp->if_multiaddrs, ifma_link) {
14201e9482f4SAlexander Motin 		inm = inm_ifmultiaddr_get_inm(ifma);
14211e9482f4SAlexander Motin 		if (inm == NULL)
1422d10910e6SBruce M Simpson 			continue;
1423f3e1324bSStephen Hurd 		inm_rele_locked(&purgeinms, inm);
1424d10910e6SBruce M Simpson 	}
14251e9482f4SAlexander Motin 	NET_EPOCH_EXIT(et);
1426b6f6f880SMatt Macy 	IF_ADDR_WUNLOCK(ifp);
1427d10910e6SBruce M Simpson 
1428f3e1324bSStephen Hurd 	inm_release_list_deferred(&purgeinms);
1429d10910e6SBruce M Simpson 	igmp_ifdetach(ifp);
1430f3e1324bSStephen Hurd 	IN_MULTI_LIST_UNLOCK();
1431d10910e6SBruce M Simpson }
1432d10910e6SBruce M Simpson 
14336e6b3f7cSQing Li struct in_llentry {
14346e6b3f7cSQing Li 	struct llentry		base;
14356e6b3f7cSQing Li };
14366e6b3f7cSQing Li 
143711cdad98SAlexander V. Chernikov #define	IN_LLTBL_DEFAULT_HSIZE	32
143811cdad98SAlexander V. Chernikov #define	IN_LLTBL_HASH(k, h) \
143911cdad98SAlexander V. Chernikov 	(((((((k >> 8) ^ k) >> 8) ^ k) >> 8) ^ k) & ((h) - 1))
144011cdad98SAlexander V. Chernikov 
1441a93cda78SKip Macy /*
144211cdad98SAlexander V. Chernikov  * Do actual deallocation of @lle.
14432769d062SConrad Meyer  */
14442769d062SConrad Meyer static void
14454f6c66ccSMatt Macy in_lltable_destroy_lle_unlocked(epoch_context_t ctx)
14462769d062SConrad Meyer {
14474f6c66ccSMatt Macy 	struct llentry *lle;
14482769d062SConrad Meyer 
14494f6c66ccSMatt Macy 	lle = __containerof(ctx, struct llentry, lle_epoch_ctx);
14502769d062SConrad Meyer 	LLE_LOCK_DESTROY(lle);
14512769d062SConrad Meyer 	LLE_REQ_DESTROY(lle);
14522769d062SConrad Meyer 	free(lle, M_LLTABLE);
14532769d062SConrad Meyer }
14542769d062SConrad Meyer 
14552769d062SConrad Meyer /*
145611cdad98SAlexander V. Chernikov  * Called by LLE_FREE_LOCKED when number of references
145711cdad98SAlexander V. Chernikov  * drops to zero.
1458a93cda78SKip Macy  */
1459a93cda78SKip Macy static void
146011cdad98SAlexander V. Chernikov in_lltable_destroy_lle(struct llentry *lle)
1461a93cda78SKip Macy {
146211cdad98SAlexander V. Chernikov 
1463a93cda78SKip Macy 	LLE_WUNLOCK(lle);
14642a4bd982SGleb Smirnoff 	NET_EPOCH_CALL(in_lltable_destroy_lle_unlocked, &lle->lle_epoch_ctx);
1465a93cda78SKip Macy }
1466a93cda78SKip Macy 
14676e6b3f7cSQing Li static struct llentry *
1468314294deSAlexander V. Chernikov in_lltable_new(struct in_addr addr4, u_int flags)
14696e6b3f7cSQing Li {
14706e6b3f7cSQing Li 	struct in_llentry *lle;
14716e6b3f7cSQing Li 
147290b357f6SGleb Smirnoff 	lle = malloc(sizeof(struct in_llentry), M_LLTABLE, M_NOWAIT | M_ZERO);
14736e6b3f7cSQing Li 	if (lle == NULL)		/* NB: caller generates msg */
14746e6b3f7cSQing Li 		return NULL;
14756e6b3f7cSQing Li 
14766e6b3f7cSQing Li 	/*
14776e6b3f7cSQing Li 	 * For IPv4 this will trigger "arpresolve" to generate
14786e6b3f7cSQing Li 	 * an ARP request.
14796e6b3f7cSQing Li 	 */
1480a98c06f1SGleb Smirnoff 	lle->base.la_expire = time_uptime; /* mark expired */
1481314294deSAlexander V. Chernikov 	lle->base.r_l3addr.addr4 = addr4;
14826e6b3f7cSQing Li 	lle->base.lle_refcnt = 1;
148311cdad98SAlexander V. Chernikov 	lle->base.lle_free = in_lltable_destroy_lle;
14846e6b3f7cSQing Li 	LLE_LOCK_INIT(&lle->base);
1485f8aee88fSAlexander V. Chernikov 	LLE_REQ_INIT(&lle->base);
14860447c136SAlexander V. Chernikov 	callout_init(&lle->base.lle_timer, 1);
1487ea537929SGleb Smirnoff 
1488ea537929SGleb Smirnoff 	return (&lle->base);
14896e6b3f7cSQing Li }
14906e6b3f7cSQing Li 
149111cdad98SAlexander V. Chernikov static int
14923e7a2321SAlexander V. Chernikov in_lltable_match_prefix(const struct sockaddr *saddr,
14933e7a2321SAlexander V. Chernikov     const struct sockaddr *smask, u_int flags, struct llentry *lle)
1494c9d763bfSQing Li {
14953e7a2321SAlexander V. Chernikov 	struct in_addr addr, mask, lle_addr;
14963e7a2321SAlexander V. Chernikov 
14973e7a2321SAlexander V. Chernikov 	addr = ((const struct sockaddr_in *)saddr)->sin_addr;
14983e7a2321SAlexander V. Chernikov 	mask = ((const struct sockaddr_in *)smask)->sin_addr;
14993e7a2321SAlexander V. Chernikov 	lle_addr.s_addr = ntohl(lle->r_l3addr.addr4.s_addr);
15003e7a2321SAlexander V. Chernikov 
15013e7a2321SAlexander V. Chernikov 	if (IN_ARE_MASKED_ADDR_EQUAL(lle_addr, addr, mask) == 0)
15023e7a2321SAlexander V. Chernikov 		return (0);
15033e7a2321SAlexander V. Chernikov 
15043e7a2321SAlexander V. Chernikov 	if (lle->la_flags & LLE_IFADDR) {
15055b84dc78SQing Li 		/*
15063e7a2321SAlexander V. Chernikov 		 * Delete LLE_IFADDR records IFF address & flag matches.
15073e7a2321SAlexander V. Chernikov 		 * Note that addr is the interface address within prefix
15083e7a2321SAlexander V. Chernikov 		 * being matched.
15093e7a2321SAlexander V. Chernikov 		 * Note also we should handle 'ifdown' cases without removing
15103e7a2321SAlexander V. Chernikov 		 * ifaddr macs.
15115b84dc78SQing Li 		 */
15123e7a2321SAlexander V. Chernikov 		if (addr.s_addr == lle_addr.s_addr && (flags & LLE_STATIC) != 0)
15133e7a2321SAlexander V. Chernikov 			return (1);
15143e7a2321SAlexander V. Chernikov 		return (0);
15153e7a2321SAlexander V. Chernikov 	}
15163e7a2321SAlexander V. Chernikov 
15173e7a2321SAlexander V. Chernikov 	/* flags & LLE_STATIC means deleting both dynamic and static entries */
15183e7a2321SAlexander V. Chernikov 	if ((flags & LLE_STATIC) || !(lle->la_flags & LLE_STATIC))
151911cdad98SAlexander V. Chernikov 		return (1);
152011cdad98SAlexander V. Chernikov 
152111cdad98SAlexander V. Chernikov 	return (0);
152211cdad98SAlexander V. Chernikov }
152311cdad98SAlexander V. Chernikov 
152411cdad98SAlexander V. Chernikov static void
152511cdad98SAlexander V. Chernikov in_lltable_free_entry(struct lltable *llt, struct llentry *lle)
152611cdad98SAlexander V. Chernikov {
152711cdad98SAlexander V. Chernikov 	size_t pkts_dropped;
152811cdad98SAlexander V. Chernikov 
152911cdad98SAlexander V. Chernikov 	LLE_WLOCK_ASSERT(lle);
153011cdad98SAlexander V. Chernikov 	KASSERT(llt != NULL, ("lltable is NULL"));
153111cdad98SAlexander V. Chernikov 
153211cdad98SAlexander V. Chernikov 	/* Unlink entry from table if not already */
153311cdad98SAlexander V. Chernikov 	if ((lle->la_flags & LLE_LINKED) != 0) {
1534f6960e20SMatt Macy 		IF_AFDATA_WLOCK_ASSERT(llt->llt_ifp);
153511cdad98SAlexander V. Chernikov 		lltable_unlink_entry(llt, lle);
153611cdad98SAlexander V. Chernikov 	}
153711cdad98SAlexander V. Chernikov 
153811cdad98SAlexander V. Chernikov 	/* Drop hold queue */
1539e162ea60SGeorge V. Neville-Neil 	pkts_dropped = llentry_free(lle);
1540e162ea60SGeorge V. Neville-Neil 	ARPSTAT_ADD(dropped, pkts_dropped);
1541c9d763bfSQing Li }
1542c9d763bfSQing Li 
15436e6b3f7cSQing Li static int
1544c7ab6602SQing Li in_lltable_rtcheck(struct ifnet *ifp, u_int flags, const struct sockaddr *l3addr)
15456e6b3f7cSQing Li {
1546936f4a42SAlexander V. Chernikov 	struct nhop_object *nh;
1547936f4a42SAlexander V. Chernikov 	struct in_addr addr;
15486e6b3f7cSQing Li 
15496e6b3f7cSQing Li 	KASSERT(l3addr->sa_family == AF_INET,
15506e6b3f7cSQing Li 	    ("sin_family %d", l3addr->sa_family));
15516e6b3f7cSQing Li 
1552936f4a42SAlexander V. Chernikov 	addr = ((const struct sockaddr_in *)l3addr)->sin_addr;
155313e255faSMarko Zec 
1554936f4a42SAlexander V. Chernikov 	nh = fib4_lookup(ifp->if_fib, addr, 0, NHR_NONE, 0);
1555936f4a42SAlexander V. Chernikov 	if (nh == NULL)
15566cf8e330SQing Li 		return (EINVAL);
15576cf8e330SQing Li 
155813e255faSMarko Zec 	/*
155913e255faSMarko Zec 	 * If the gateway for an existing host route matches the target L3
15606cf8e330SQing Li 	 * address, which is a special route inserted by some implementation
15616cf8e330SQing Li 	 * such as MANET, and the interface is of the correct type, then
15626cf8e330SQing Li 	 * allow for ARP to proceed.
156313e255faSMarko Zec 	 */
1564936f4a42SAlexander V. Chernikov 	if (nh->nh_flags & NHF_GATEWAY) {
1565936f4a42SAlexander V. Chernikov 		if (!(nh->nh_flags & NHF_HOST) || nh->nh_ifp->if_type != IFT_ETHER ||
1566936f4a42SAlexander V. Chernikov 		    (nh->nh_ifp->if_flags & (IFF_NOARP | IFF_STATICARP)) != 0 ||
1567936f4a42SAlexander V. Chernikov 		    memcmp(nh->gw_sa.sa_data, l3addr->sa_data,
156815d25219SQing Li 		    sizeof(in_addr_t)) != 0) {
1569db92413eSQing Li 			return (EINVAL);
1570db92413eSQing Li 		}
157115d25219SQing Li 	}
1572db92413eSQing Li 
1573db92413eSQing Li 	/*
1574db92413eSQing Li 	 * Make sure that at least the destination address is covered
1575db92413eSQing Li 	 * by the route. This is for handling the case where 2 or more
1576db92413eSQing Li 	 * interfaces have the same prefix. An incoming packet arrives
1577db92413eSQing Li 	 * on one interface and the corresponding outgoing packet leaves
1578db92413eSQing Li 	 * another interface.
1579db92413eSQing Li 	 */
1580936f4a42SAlexander V. Chernikov 	if ((nh->nh_ifp != ifp) && (nh->nh_flags & NHF_HOST) == 0) {
1581936f4a42SAlexander V. Chernikov 		struct in_ifaddr *ia = (struct in_ifaddr *)ifaof_ifpforaddr(l3addr, ifp);
1582936f4a42SAlexander V. Chernikov 		struct in_addr dst_addr, mask_addr;
1583db92413eSQing Li 
1584936f4a42SAlexander V. Chernikov 		if (ia == NULL)
1585936f4a42SAlexander V. Chernikov 			return (EINVAL);
1586936f4a42SAlexander V. Chernikov 
1587b3664a14SQing Li 		/*
1588936f4a42SAlexander V. Chernikov 		 * ifaof_ifpforaddr() returns _best matching_ IFA.
1589936f4a42SAlexander V. Chernikov 		 * It is possible that ifa prefix does not cover our address.
1590936f4a42SAlexander V. Chernikov 		 * Explicitly verify and fail if that's the case.
1591b3664a14SQing Li 		 */
1592936f4a42SAlexander V. Chernikov 		dst_addr = IA_SIN(ia)->sin_addr;
1593936f4a42SAlexander V. Chernikov 		mask_addr.s_addr = htonl(ia->ia_subnetmask);
1594936f4a42SAlexander V. Chernikov 
1595936f4a42SAlexander V. Chernikov 		if (!IN_ARE_MASKED_ADDR_EQUAL(dst_addr, addr, mask_addr))
1596b3664a14SQing Li 			return (EINVAL);
1597db92413eSQing Li 	}
1598db92413eSQing Li 
159915d25219SQing Li 	return (0);
16006e6b3f7cSQing Li }
16016e6b3f7cSQing Li 
160211cdad98SAlexander V. Chernikov static inline uint32_t
160311cdad98SAlexander V. Chernikov in_lltable_hash_dst(const struct in_addr dst, uint32_t hsize)
160411cdad98SAlexander V. Chernikov {
160511cdad98SAlexander V. Chernikov 
160611cdad98SAlexander V. Chernikov 	return (IN_LLTBL_HASH(dst.s_addr, hsize));
160711cdad98SAlexander V. Chernikov }
160811cdad98SAlexander V. Chernikov 
160911cdad98SAlexander V. Chernikov static uint32_t
161011cdad98SAlexander V. Chernikov in_lltable_hash(const struct llentry *lle, uint32_t hsize)
161111cdad98SAlexander V. Chernikov {
161211cdad98SAlexander V. Chernikov 
1613314294deSAlexander V. Chernikov 	return (in_lltable_hash_dst(lle->r_l3addr.addr4, hsize));
161411cdad98SAlexander V. Chernikov }
161511cdad98SAlexander V. Chernikov 
161611cdad98SAlexander V. Chernikov static void
161711cdad98SAlexander V. Chernikov in_lltable_fill_sa_entry(const struct llentry *lle, struct sockaddr *sa)
161811cdad98SAlexander V. Chernikov {
161911cdad98SAlexander V. Chernikov 	struct sockaddr_in *sin;
162011cdad98SAlexander V. Chernikov 
162111cdad98SAlexander V. Chernikov 	sin = (struct sockaddr_in *)sa;
162211cdad98SAlexander V. Chernikov 	bzero(sin, sizeof(*sin));
162311cdad98SAlexander V. Chernikov 	sin->sin_family = AF_INET;
162411cdad98SAlexander V. Chernikov 	sin->sin_len = sizeof(*sin);
1625314294deSAlexander V. Chernikov 	sin->sin_addr = lle->r_l3addr.addr4;
162611cdad98SAlexander V. Chernikov }
162711cdad98SAlexander V. Chernikov 
1628b4b1367aSAlexander V. Chernikov static inline struct llentry *
1629b4b1367aSAlexander V. Chernikov in_lltable_find_dst(struct lltable *llt, struct in_addr dst)
1630b4b1367aSAlexander V. Chernikov {
1631b4b1367aSAlexander V. Chernikov 	struct llentry *lle;
1632b4b1367aSAlexander V. Chernikov 	struct llentries *lleh;
163311cdad98SAlexander V. Chernikov 	u_int hashidx;
1634b4b1367aSAlexander V. Chernikov 
16353a749863SAlexander V. Chernikov 	hashidx = in_lltable_hash_dst(dst, llt->llt_hsize);
163611cdad98SAlexander V. Chernikov 	lleh = &llt->lle_head[hashidx];
16374f6c66ccSMatt Macy 	CK_LIST_FOREACH(lle, lleh, lle_next) {
1638b4b1367aSAlexander V. Chernikov 		if (lle->la_flags & LLE_DELETED)
1639b4b1367aSAlexander V. Chernikov 			continue;
1640314294deSAlexander V. Chernikov 		if (lle->r_l3addr.addr4.s_addr == dst.s_addr)
1641b4b1367aSAlexander V. Chernikov 			break;
1642b4b1367aSAlexander V. Chernikov 	}
1643b4b1367aSAlexander V. Chernikov 
1644b4b1367aSAlexander V. Chernikov 	return (lle);
1645b4b1367aSAlexander V. Chernikov }
1646b4b1367aSAlexander V. Chernikov 
16473e7a2321SAlexander V. Chernikov static void
16483e7a2321SAlexander V. Chernikov in_lltable_delete_entry(struct lltable *llt, struct llentry *lle)
1649b4b1367aSAlexander V. Chernikov {
1650b4b1367aSAlexander V. Chernikov 
1651b4b1367aSAlexander V. Chernikov 	lle->la_flags |= LLE_DELETED;
1652b4b1367aSAlexander V. Chernikov 	EVENTHANDLER_INVOKE(lle_event, lle, LLENTRY_DELETED);
1653b4b1367aSAlexander V. Chernikov #ifdef DIAGNOSTIC
1654b4b1367aSAlexander V. Chernikov 	log(LOG_INFO, "ifaddr cache = %p is deleted\n", lle);
1655b4b1367aSAlexander V. Chernikov #endif
1656b4b1367aSAlexander V. Chernikov 	llentry_free(lle);
1657b4b1367aSAlexander V. Chernikov }
1658b4b1367aSAlexander V. Chernikov 
1659b4b1367aSAlexander V. Chernikov static struct llentry *
16605a255516SAlexander V. Chernikov in_lltable_alloc(struct lltable *llt, u_int flags, const struct sockaddr *l3addr)
1661b4b1367aSAlexander V. Chernikov {
1662b4b1367aSAlexander V. Chernikov 	const struct sockaddr_in *sin = (const struct sockaddr_in *)l3addr;
1663b4b1367aSAlexander V. Chernikov 	struct ifnet *ifp = llt->llt_ifp;
1664b4b1367aSAlexander V. Chernikov 	struct llentry *lle;
16654fb3a820SAlexander V. Chernikov 	char linkhdr[LLE_MAX_LINKHDR];
16664fb3a820SAlexander V. Chernikov 	size_t linkhdrsize;
16674fb3a820SAlexander V. Chernikov 	int lladdr_off;
1668b4b1367aSAlexander V. Chernikov 
1669b4b1367aSAlexander V. Chernikov 	KASSERT(l3addr->sa_family == AF_INET,
1670b4b1367aSAlexander V. Chernikov 	    ("sin_family %d", l3addr->sa_family));
1671b4b1367aSAlexander V. Chernikov 
1672b4b1367aSAlexander V. Chernikov 	/*
1673b4b1367aSAlexander V. Chernikov 	 * A route that covers the given address must have
1674b4b1367aSAlexander V. Chernikov 	 * been installed 1st because we are doing a resolution,
1675b4b1367aSAlexander V. Chernikov 	 * verify this.
1676b4b1367aSAlexander V. Chernikov 	 */
1677b4b1367aSAlexander V. Chernikov 	if (!(flags & LLE_IFADDR) &&
1678b4b1367aSAlexander V. Chernikov 	    in_lltable_rtcheck(ifp, flags, l3addr) != 0)
1679b4b1367aSAlexander V. Chernikov 		return (NULL);
1680b4b1367aSAlexander V. Chernikov 
1681314294deSAlexander V. Chernikov 	lle = in_lltable_new(sin->sin_addr, flags);
1682b4b1367aSAlexander V. Chernikov 	if (lle == NULL) {
1683b4b1367aSAlexander V. Chernikov 		log(LOG_INFO, "lla_lookup: new lle malloc failed\n");
1684b4b1367aSAlexander V. Chernikov 		return (NULL);
1685b4b1367aSAlexander V. Chernikov 	}
1686b4b1367aSAlexander V. Chernikov 	lle->la_flags = flags;
1687f8aee88fSAlexander V. Chernikov 	if (flags & LLE_STATIC)
1688f8aee88fSAlexander V. Chernikov 		lle->r_flags |= RLLE_VALID;
1689b4b1367aSAlexander V. Chernikov 	if ((flags & LLE_IFADDR) == LLE_IFADDR) {
16904fb3a820SAlexander V. Chernikov 		linkhdrsize = LLE_MAX_LINKHDR;
16914fb3a820SAlexander V. Chernikov 		if (lltable_calc_llheader(ifp, AF_INET, IF_LLADDR(ifp),
16922769d062SConrad Meyer 		    linkhdr, &linkhdrsize, &lladdr_off) != 0) {
1693990a6d18SMark Johnston 			in_lltable_free_entry(llt, lle);
16944fb3a820SAlexander V. Chernikov 			return (NULL);
16952769d062SConrad Meyer 		}
16964fb3a820SAlexander V. Chernikov 		lltable_set_entry_addr(ifp, lle, linkhdr, linkhdrsize,
16974fb3a820SAlexander V. Chernikov 		    lladdr_off);
1698ddd208f7SAlexander V. Chernikov 		lle->la_flags |= LLE_STATIC;
1699f8aee88fSAlexander V. Chernikov 		lle->r_flags |= (RLLE_VALID | RLLE_IFADDR);
1700ca185047SAlexander V. Chernikov 		lle->la_expire = 0;
1701b4b1367aSAlexander V. Chernikov 	}
1702b4b1367aSAlexander V. Chernikov 
1703b4b1367aSAlexander V. Chernikov 	return (lle);
1704b4b1367aSAlexander V. Chernikov }
1705b4b1367aSAlexander V. Chernikov 
17066e6b3f7cSQing Li /*
17076e6b3f7cSQing Li  * Return NULL if not found or marked for deletion.
17086e6b3f7cSQing Li  * If found return lle read locked.
17096e6b3f7cSQing Li  */
17106e6b3f7cSQing Li static struct llentry *
17116e6b3f7cSQing Li in_lltable_lookup(struct lltable *llt, u_int flags, const struct sockaddr *l3addr)
17126e6b3f7cSQing Li {
17136e6b3f7cSQing Li 	const struct sockaddr_in *sin = (const struct sockaddr_in *)l3addr;
17146e6b3f7cSQing Li 	struct llentry *lle;
17156e6b3f7cSQing Li 
17166e4cd746SMarius Strobl 	IF_AFDATA_LOCK_ASSERT(llt->llt_ifp);
17176e6b3f7cSQing Li 	KASSERT(l3addr->sa_family == AF_INET,
17186e6b3f7cSQing Li 	    ("sin_family %d", l3addr->sa_family));
171949cf58e5SMark Johnston 	KASSERT((flags & (LLE_UNLOCKED | LLE_EXCLUSIVE)) !=
172049cf58e5SMark Johnston 	    (LLE_UNLOCKED | LLE_EXCLUSIVE),
172149cf58e5SMark Johnston 	    ("wrong lle request flags: %#x", flags));
1722b4b1367aSAlexander V. Chernikov 
172349cf58e5SMark Johnston 	lle = in_lltable_find_dst(llt, sin->sin_addr);
1724b4b1367aSAlexander V. Chernikov 	if (lle == NULL)
17256e6b3f7cSQing Li 		return (NULL);
1726f8aee88fSAlexander V. Chernikov 	if (flags & LLE_UNLOCKED)
1727f8aee88fSAlexander V. Chernikov 		return (lle);
1728f8aee88fSAlexander V. Chernikov 
17296e6b3f7cSQing Li 	if (flags & LLE_EXCLUSIVE)
17306e6b3f7cSQing Li 		LLE_WLOCK(lle);
17316e6b3f7cSQing Li 	else
17326e6b3f7cSQing Li 		LLE_RLOCK(lle);
1733b4b1367aSAlexander V. Chernikov 
1734c06cc56eSMark Johnston 	/*
1735c06cc56eSMark Johnston 	 * If the afdata lock is not held, the LLE may have been unlinked while
1736c06cc56eSMark Johnston 	 * we were blocked on the LLE lock.  Check for this case.
1737c06cc56eSMark Johnston 	 */
1738c06cc56eSMark Johnston 	if (__predict_false((lle->la_flags & LLE_LINKED) == 0)) {
1739c06cc56eSMark Johnston 		if (flags & LLE_EXCLUSIVE)
1740c06cc56eSMark Johnston 			LLE_WUNLOCK(lle);
1741c06cc56eSMark Johnston 		else
1742c06cc56eSMark Johnston 			LLE_RUNLOCK(lle);
1743c06cc56eSMark Johnston 		return (NULL);
1744c06cc56eSMark Johnston 	}
17456e6b3f7cSQing Li 	return (lle);
17466e6b3f7cSQing Li }
17476e6b3f7cSQing Li 
17486e6b3f7cSQing Li static int
174911cdad98SAlexander V. Chernikov in_lltable_dump_entry(struct lltable *llt, struct llentry *lle,
175011cdad98SAlexander V. Chernikov     struct sysctl_req *wr)
17516e6b3f7cSQing Li {
17526e6b3f7cSQing Li 	struct ifnet *ifp = llt->llt_ifp;
17536e6b3f7cSQing Li 	/* XXX stack use */
17546e6b3f7cSQing Li 	struct {
17556e6b3f7cSQing Li 		struct rt_msghdr	rtm;
17569711a168SGleb Smirnoff 		struct sockaddr_in	sin;
17576e6b3f7cSQing Li 		struct sockaddr_dl	sdl;
17586e6b3f7cSQing Li 	} arpc;
17596e6b3f7cSQing Li 	struct sockaddr_dl *sdl;
176011cdad98SAlexander V. Chernikov 	int error;
17616e6b3f7cSQing Li 
176211cdad98SAlexander V. Chernikov 	bzero(&arpc, sizeof(arpc));
17636e6b3f7cSQing Li 	/* skip deleted entries */
176493704ac5SQing Li 	if ((lle->la_flags & LLE_DELETED) == LLE_DELETED)
176511cdad98SAlexander V. Chernikov 		return (0);
1766813dd6aeSBjoern A. Zeeb 	/* Skip if jailed and not a valid IP of the prison. */
176711cdad98SAlexander V. Chernikov 	lltable_fill_sa_entry(lle,(struct sockaddr *)&arpc.sin);
1768514ef08cSBrooks Davis 	if (prison_if(wr->td->td_ucred, (struct sockaddr *)&arpc.sin) != 0)
176911cdad98SAlexander V. Chernikov 		return (0);
17706e6b3f7cSQing Li 	/*
17716e6b3f7cSQing Li 	 * produce a msg made of:
17726e6b3f7cSQing Li 	 *  struct rt_msghdr;
17739711a168SGleb Smirnoff 	 *  struct sockaddr_in; (IPv4)
17746e6b3f7cSQing Li 	 *  struct sockaddr_dl;
17756e6b3f7cSQing Li 	 */
17766e6b3f7cSQing Li 	arpc.rtm.rtm_msglen = sizeof(arpc);
1777c0e9a8a1SHartmut Brandt 	arpc.rtm.rtm_version = RTM_VERSION;
1778c0e9a8a1SHartmut Brandt 	arpc.rtm.rtm_type = RTM_GET;
1779c0e9a8a1SHartmut Brandt 	arpc.rtm.rtm_flags = RTF_UP;
1780c0e9a8a1SHartmut Brandt 	arpc.rtm.rtm_addrs = RTA_DST | RTA_GATEWAY;
17816e6b3f7cSQing Li 
17826e6b3f7cSQing Li 	/* publish */
17839711a168SGleb Smirnoff 	if (lle->la_flags & LLE_PUB)
17846e6b3f7cSQing Li 		arpc.rtm.rtm_flags |= RTF_ANNOUNCE;
17856e6b3f7cSQing Li 
17866e6b3f7cSQing Li 	sdl = &arpc.sdl;
17876e6b3f7cSQing Li 	sdl->sdl_family = AF_LINK;
17886e6b3f7cSQing Li 	sdl->sdl_len = sizeof(*sdl);
17896e6b3f7cSQing Li 	sdl->sdl_index = ifp->if_index;
17906e6b3f7cSQing Li 	sdl->sdl_type = ifp->if_type;
179193704ac5SQing Li 	if ((lle->la_flags & LLE_VALID) == LLE_VALID) {
179293704ac5SQing Li 		sdl->sdl_alen = ifp->if_addrlen;
17934fb3a820SAlexander V. Chernikov 		bcopy(lle->ll_addr, LLADDR(sdl), ifp->if_addrlen);
179493704ac5SQing Li 	} else {
179593704ac5SQing Li 		sdl->sdl_alen = 0;
179693704ac5SQing Li 		bzero(LLADDR(sdl), ifp->if_addrlen);
179793704ac5SQing Li 	}
17986e6b3f7cSQing Li 
17996e6b3f7cSQing Li 	arpc.rtm.rtm_rmx.rmx_expire =
18006e6b3f7cSQing Li 	    lle->la_flags & LLE_STATIC ? 0 : lle->la_expire;
18018eca593cSQing Li 	arpc.rtm.rtm_flags |= (RTF_HOST | RTF_LLDATA);
18026e6b3f7cSQing Li 	if (lle->la_flags & LLE_STATIC)
18036e6b3f7cSQing Li 		arpc.rtm.rtm_flags |= RTF_STATIC;
18044a336ef4SAlexander V. Chernikov 	if (lle->la_flags & LLE_IFADDR)
18054a336ef4SAlexander V. Chernikov 		arpc.rtm.rtm_flags |= RTF_PINNED;
18066e6b3f7cSQing Li 	arpc.rtm.rtm_index = ifp->if_index;
18076e6b3f7cSQing Li 	error = SYSCTL_OUT(wr, &arpc, sizeof(arpc));
180811cdad98SAlexander V. Chernikov 
180911cdad98SAlexander V. Chernikov 	return (error);
18106e6b3f7cSQing Li }
18116e6b3f7cSQing Li 
181277001f9bSKUROSAWA Takahiro static void
181377001f9bSKUROSAWA Takahiro in_lltable_post_resolved(struct lltable *llt, struct llentry *lle)
181477001f9bSKUROSAWA Takahiro {
181577001f9bSKUROSAWA Takahiro 	struct ifnet *ifp = llt->llt_ifp;
181677001f9bSKUROSAWA Takahiro 
181777001f9bSKUROSAWA Takahiro 	/* gratuitous ARP */
181877001f9bSKUROSAWA Takahiro 	if ((lle->la_flags & LLE_PUB) != 0)
181977001f9bSKUROSAWA Takahiro 		arprequest(ifp, &lle->r_l3addr.addr4, &lle->r_l3addr.addr4,
182077001f9bSKUROSAWA Takahiro 		    lle->ll_addr);
182177001f9bSKUROSAWA Takahiro }
182277001f9bSKUROSAWA Takahiro 
18233a749863SAlexander V. Chernikov static struct lltable *
18243a749863SAlexander V. Chernikov in_lltattach(struct ifnet *ifp)
18256e6b3f7cSQing Li {
1826d10910e6SBruce M Simpson 	struct lltable *llt;
18276e6b3f7cSQing Li 
18283a749863SAlexander V. Chernikov 	llt = lltable_allocate_htbl(IN_LLTBL_DEFAULT_HSIZE);
1829721cd2e0SAlexander V. Chernikov  	llt->llt_af = AF_INET;
1830721cd2e0SAlexander V. Chernikov  	llt->llt_ifp = ifp;
1831d10910e6SBruce M Simpson 
18326e6b3f7cSQing Li 	llt->llt_lookup = in_lltable_lookup;
18335a255516SAlexander V. Chernikov 	llt->llt_alloc_entry = in_lltable_alloc;
18343e7a2321SAlexander V. Chernikov 	llt->llt_delete_entry = in_lltable_delete_entry;
183511cdad98SAlexander V. Chernikov 	llt->llt_dump_entry = in_lltable_dump_entry;
183611cdad98SAlexander V. Chernikov 	llt->llt_hash = in_lltable_hash;
183711cdad98SAlexander V. Chernikov 	llt->llt_fill_sa_entry = in_lltable_fill_sa_entry;
183811cdad98SAlexander V. Chernikov 	llt->llt_free_entry = in_lltable_free_entry;
183911cdad98SAlexander V. Chernikov 	llt->llt_match_prefix = in_lltable_match_prefix;
1840f3a3b061SAlexander V. Chernikov 	llt->llt_mark_used = llentry_mark_used;
184177001f9bSKUROSAWA Takahiro 	llt->llt_post_resolved = in_lltable_post_resolved;
1842721cd2e0SAlexander V. Chernikov  	lltable_link(llt);
1843d10910e6SBruce M Simpson 
18443a749863SAlexander V. Chernikov 	return (llt);
18453a749863SAlexander V. Chernikov }
18463a749863SAlexander V. Chernikov 
1847ff3a85d3SAlexander V. Chernikov struct lltable *
1848ff3a85d3SAlexander V. Chernikov in_lltable_get(struct ifnet *ifp)
1849ff3a85d3SAlexander V. Chernikov {
1850ff3a85d3SAlexander V. Chernikov 	struct lltable *llt = NULL;
1851ff3a85d3SAlexander V. Chernikov 
1852ff3a85d3SAlexander V. Chernikov 	void *afdata_ptr = ifp->if_afdata[AF_INET];
1853ff3a85d3SAlexander V. Chernikov 	if (afdata_ptr != NULL)
1854ff3a85d3SAlexander V. Chernikov 		llt = ((struct in_ifinfo *)afdata_ptr)->ii_llt;
1855ff3a85d3SAlexander V. Chernikov 	return (llt);
1856ff3a85d3SAlexander V. Chernikov }
1857ff3a85d3SAlexander V. Chernikov 
18583a749863SAlexander V. Chernikov void *
18593a749863SAlexander V. Chernikov in_domifattach(struct ifnet *ifp)
18603a749863SAlexander V. Chernikov {
18613a749863SAlexander V. Chernikov 	struct in_ifinfo *ii;
18623a749863SAlexander V. Chernikov 
1863721cd2e0SAlexander V. Chernikov 	ii = malloc(sizeof(struct in_ifinfo), M_IFADDR, M_WAITOK|M_ZERO);
186441cb42a6SAlexander V. Chernikov 
18653a749863SAlexander V. Chernikov 	ii->ii_llt = in_lltattach(ifp);
1866d10910e6SBruce M Simpson 	ii->ii_igmp = igmp_domifattach(ifp);
1867d10910e6SBruce M Simpson 
186841cb42a6SAlexander V. Chernikov 	return (ii);
18696e6b3f7cSQing Li }
18706e6b3f7cSQing Li 
18716e6b3f7cSQing Li void
1872d10910e6SBruce M Simpson in_domifdetach(struct ifnet *ifp, void *aux)
18736e6b3f7cSQing Li {
1874d10910e6SBruce M Simpson 	struct in_ifinfo *ii = (struct in_ifinfo *)aux;
18756e6b3f7cSQing Li 
1876d10910e6SBruce M Simpson 	igmp_domifdetach(ifp);
1877d10910e6SBruce M Simpson 	lltable_free(ii->ii_llt);
1878d10910e6SBruce M Simpson 	free(ii, M_IFADDR);
18796e6b3f7cSQing Li }
1880