xref: /freebsd/sys/netinet/in.c (revision c06cc56e3940ef36bca0f9163decf258766b52e2)
1c398230bSWarner Losh /*-
251369649SPedro F. Giffuni  * SPDX-License-Identifier: BSD-3-Clause
351369649SPedro F. Giffuni  *
4df8bae1dSRodney W. Grimes  * Copyright (c) 1982, 1986, 1991, 1993
5df8bae1dSRodney W. Grimes  *	The Regents of the University of California.  All rights reserved.
681d96ce8SMax Laier  * Copyright (C) 2001 WIDE Project.  All rights reserved.
7df8bae1dSRodney W. Grimes  *
8df8bae1dSRodney W. Grimes  * Redistribution and use in source and binary forms, with or without
9df8bae1dSRodney W. Grimes  * modification, are permitted provided that the following conditions
10df8bae1dSRodney W. Grimes  * are met:
11df8bae1dSRodney W. Grimes  * 1. Redistributions of source code must retain the above copyright
12df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer.
13df8bae1dSRodney W. Grimes  * 2. Redistributions in binary form must reproduce the above copyright
14df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer in the
15df8bae1dSRodney W. Grimes  *    documentation and/or other materials provided with the distribution.
16fbbd9655SWarner Losh  * 3. Neither the name of the University nor the names of its contributors
17df8bae1dSRodney W. Grimes  *    may be used to endorse or promote products derived from this software
18df8bae1dSRodney W. Grimes  *    without specific prior written permission.
19df8bae1dSRodney W. Grimes  *
20df8bae1dSRodney W. Grimes  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21df8bae1dSRodney W. Grimes  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22df8bae1dSRodney W. Grimes  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23df8bae1dSRodney W. Grimes  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24df8bae1dSRodney W. Grimes  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25df8bae1dSRodney W. Grimes  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26df8bae1dSRodney W. Grimes  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27df8bae1dSRodney W. Grimes  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28df8bae1dSRodney W. Grimes  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29df8bae1dSRodney W. Grimes  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30df8bae1dSRodney W. Grimes  * SUCH DAMAGE.
31df8bae1dSRodney W. Grimes  *
322180b925SGarrett Wollman  *	@(#)in.c	8.4 (Berkeley) 1/9/95
33df8bae1dSRodney W. Grimes  */
34df8bae1dSRodney W. Grimes 
354b421e2dSMike Silbersack #include <sys/cdefs.h>
364b421e2dSMike Silbersack __FBSDID("$FreeBSD$");
374b421e2dSMike Silbersack 
38c7ea0aa6SQing Li #include "opt_mpath.h"
3950bb1704SGleb Smirnoff 
40df8bae1dSRodney W. Grimes #include <sys/param.h>
41c3322cb9SGleb Smirnoff #include <sys/eventhandler.h>
4226f9a767SRodney W. Grimes #include <sys/systm.h>
4351a53488SBruce Evans #include <sys/sockio.h>
44df8bae1dSRodney W. Grimes #include <sys/malloc.h>
45acd3428bSRobert Watson #include <sys/priv.h>
46df8bae1dSRodney W. Grimes #include <sys/socket.h>
475ce0eb7fSBjoern A. Zeeb #include <sys/jail.h>
48f6d24a78SPoul-Henning Kamp #include <sys/kernel.h>
49cc0a3c8cSAndrey V. Elsukov #include <sys/lock.h>
505ce0eb7fSBjoern A. Zeeb #include <sys/proc.h>
51cc0a3c8cSAndrey V. Elsukov #include <sys/rmlock.h>
52f6d24a78SPoul-Henning Kamp #include <sys/sysctl.h>
53ebc90701SQing Li #include <sys/syslog.h>
54f7a39160SGleb Smirnoff #include <sys/sx.h>
55df8bae1dSRodney W. Grimes 
56df8bae1dSRodney W. Grimes #include <net/if.h>
57df813b7eSQing Li #include <net/if_var.h>
58e162ea60SGeorge V. Neville-Neil #include <net/if_arp.h>
59ebc90701SQing Li #include <net/if_dl.h>
606e6b3f7cSQing Li #include <net/if_llatbl.h>
616a800098SYoshinobu Inoue #include <net/if_types.h>
62df8bae1dSRodney W. Grimes #include <net/route.h>
63ebc90701SQing Li #include <net/vnet.h>
64df8bae1dSRodney W. Grimes 
6508b68b0eSGleb Smirnoff #include <netinet/if_ether.h>
66df8bae1dSRodney W. Grimes #include <netinet/in.h>
67df8bae1dSRodney W. Grimes #include <netinet/in_var.h>
68e43cc4aeSHajimu UMEMOTO #include <netinet/in_pcb.h>
6971498f30SBruce M Simpson #include <netinet/ip_var.h>
7008b68b0eSGleb Smirnoff #include <netinet/ip_carp.h>
71d10910e6SBruce M Simpson #include <netinet/igmp_var.h>
72eddfbb76SRobert Watson #include <netinet/udp.h>
73eddfbb76SRobert Watson #include <netinet/udp_var.h>
7455166637SPoul-Henning Kamp 
7577b89ad8SGleb Smirnoff static int in_aifaddr_ioctl(u_long, caddr_t, struct ifnet *, struct thread *);
76338e227aSLuiz Otavio O Souza static int in_difaddr_ioctl(u_long, caddr_t, struct ifnet *, struct thread *);
776a800098SYoshinobu Inoue 
784d77a549SAlfred Perlstein static void	in_socktrim(struct sockaddr_in *);
79ec002feeSBruce M Simpson static void	in_purgemaddrs(struct ifnet *);
80df8bae1dSRodney W. Grimes 
815f901c92SAndrew Turner VNET_DEFINE_STATIC(int, nosameprefix);
8208b68b0eSGleb Smirnoff #define	V_nosameprefix			VNET(nosameprefix)
836df8a710SGleb Smirnoff SYSCTL_INT(_net_inet_ip, OID_AUTO, no_same_prefix, CTLFLAG_VNET | CTLFLAG_RW,
8408b68b0eSGleb Smirnoff 	&VNET_NAME(nosameprefix), 0,
851ae95409SGleb Smirnoff 	"Refuse to create same prefixes on different interfaces");
86477180fbSGarrett Wollman 
8782cea7e6SBjoern A. Zeeb VNET_DECLARE(struct inpcbinfo, ripcbinfo);
8882cea7e6SBjoern A. Zeeb #define	V_ripcbinfo			VNET(ripcbinfo)
8982cea7e6SBjoern A. Zeeb 
90f7a39160SGleb Smirnoff static struct sx in_control_sx;
91f7a39160SGleb Smirnoff SX_SYSINIT(in_control_sx, &in_control_sx, "in_control");
92f7a39160SGleb Smirnoff 
93df8bae1dSRodney W. Grimes /*
94df8bae1dSRodney W. Grimes  * Return 1 if an internet address is for a ``local'' host
95b365d954SGleb Smirnoff  * (one to which we have a connection).
96df8bae1dSRodney W. Grimes  */
9726f9a767SRodney W. Grimes int
98f2565d68SRobert Watson in_localaddr(struct in_addr in)
99df8bae1dSRodney W. Grimes {
100cc0a3c8cSAndrey V. Elsukov 	struct rm_priotracker in_ifa_tracker;
1013e85b721SEd Maste 	u_long i = ntohl(in.s_addr);
1023e85b721SEd Maste 	struct in_ifaddr *ia;
103df8bae1dSRodney W. Grimes 
104cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RLOCK(&in_ifa_tracker);
105d7c5a620SMatt Macy 	CK_STAILQ_FOREACH(ia, &V_in_ifaddrhead, ia_link) {
1062d9cfabaSRobert Watson 		if ((i & ia->ia_subnetmask) == ia->ia_subnet) {
107cc0a3c8cSAndrey V. Elsukov 			IN_IFADDR_RUNLOCK(&in_ifa_tracker);
1082d9cfabaSRobert Watson 			return (1);
1092d9cfabaSRobert Watson 		}
1102d9cfabaSRobert Watson 	}
111cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RUNLOCK(&in_ifa_tracker);
112df8bae1dSRodney W. Grimes 	return (0);
113df8bae1dSRodney W. Grimes }
114df8bae1dSRodney W. Grimes 
115df8bae1dSRodney W. Grimes /*
1162eccc90bSAndre Oppermann  * Return 1 if an internet address is for the local host and configured
1172eccc90bSAndre Oppermann  * on one of its interfaces.
1182eccc90bSAndre Oppermann  */
1192eccc90bSAndre Oppermann int
120f2565d68SRobert Watson in_localip(struct in_addr in)
1212eccc90bSAndre Oppermann {
122cc0a3c8cSAndrey V. Elsukov 	struct rm_priotracker in_ifa_tracker;
1232eccc90bSAndre Oppermann 	struct in_ifaddr *ia;
1242eccc90bSAndre Oppermann 
125cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RLOCK(&in_ifa_tracker);
1262eccc90bSAndre Oppermann 	LIST_FOREACH(ia, INADDR_HASH(in.s_addr), ia_hash) {
1272d9cfabaSRobert Watson 		if (IA_SIN(ia)->sin_addr.s_addr == in.s_addr) {
128cc0a3c8cSAndrey V. Elsukov 			IN_IFADDR_RUNLOCK(&in_ifa_tracker);
129460473a0SBjoern A. Zeeb 			return (1);
1302eccc90bSAndre Oppermann 		}
1312d9cfabaSRobert Watson 	}
132cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RUNLOCK(&in_ifa_tracker);
133460473a0SBjoern A. Zeeb 	return (0);
1342eccc90bSAndre Oppermann }
1352eccc90bSAndre Oppermann 
1362eccc90bSAndre Oppermann /*
13728ebe80cSGleb Smirnoff  * Return 1 if an internet address is configured on an interface.
13828ebe80cSGleb Smirnoff  */
13928ebe80cSGleb Smirnoff int
14028ebe80cSGleb Smirnoff in_ifhasaddr(struct ifnet *ifp, struct in_addr in)
14128ebe80cSGleb Smirnoff {
142a68cc388SGleb Smirnoff 	struct epoch_tracker et;
14328ebe80cSGleb Smirnoff 	struct ifaddr *ifa;
14428ebe80cSGleb Smirnoff 	struct in_ifaddr *ia;
14528ebe80cSGleb Smirnoff 
146a68cc388SGleb Smirnoff 	NET_EPOCH_ENTER(et);
147d7c5a620SMatt Macy 	CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
14828ebe80cSGleb Smirnoff 		if (ifa->ifa_addr->sa_family != AF_INET)
14928ebe80cSGleb Smirnoff 			continue;
15028ebe80cSGleb Smirnoff 		ia = (struct in_ifaddr *)ifa;
15128ebe80cSGleb Smirnoff 		if (ia->ia_addr.sin_addr.s_addr == in.s_addr) {
152a68cc388SGleb Smirnoff 			NET_EPOCH_EXIT(et);
15328ebe80cSGleb Smirnoff 			return (1);
15428ebe80cSGleb Smirnoff 		}
15528ebe80cSGleb Smirnoff 	}
156a68cc388SGleb Smirnoff 	NET_EPOCH_EXIT(et);
15728ebe80cSGleb Smirnoff 
15828ebe80cSGleb Smirnoff 	return (0);
15928ebe80cSGleb Smirnoff }
16028ebe80cSGleb Smirnoff 
16128ebe80cSGleb Smirnoff /*
162f7a39160SGleb Smirnoff  * Return a reference to the interface address which is different to
163f7a39160SGleb Smirnoff  * the supplied one but with same IP address value.
164f7a39160SGleb Smirnoff  */
165f7a39160SGleb Smirnoff static struct in_ifaddr *
166f7a39160SGleb Smirnoff in_localip_more(struct in_ifaddr *ia)
167f7a39160SGleb Smirnoff {
168cc0a3c8cSAndrey V. Elsukov 	struct rm_priotracker in_ifa_tracker;
169f7a39160SGleb Smirnoff 	in_addr_t in = IA_SIN(ia)->sin_addr.s_addr;
170f7a39160SGleb Smirnoff 	struct in_ifaddr *it;
171f7a39160SGleb Smirnoff 
172cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RLOCK(&in_ifa_tracker);
173f7a39160SGleb Smirnoff 	LIST_FOREACH(it, INADDR_HASH(in), ia_hash) {
174f7a39160SGleb Smirnoff 		if (it != ia && IA_SIN(it)->sin_addr.s_addr == in) {
175f7a39160SGleb Smirnoff 			ifa_ref(&it->ia_ifa);
176cc0a3c8cSAndrey V. Elsukov 			IN_IFADDR_RUNLOCK(&in_ifa_tracker);
177f7a39160SGleb Smirnoff 			return (it);
178f7a39160SGleb Smirnoff 		}
179f7a39160SGleb Smirnoff 	}
180cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RUNLOCK(&in_ifa_tracker);
181f7a39160SGleb Smirnoff 
182f7a39160SGleb Smirnoff 	return (NULL);
183f7a39160SGleb Smirnoff }
184f7a39160SGleb Smirnoff 
185f7a39160SGleb Smirnoff /*
186df8bae1dSRodney W. Grimes  * Determine whether an IP address is in a reserved set of addresses
187df8bae1dSRodney W. Grimes  * that may not be forwarded, or whether datagrams to that destination
188df8bae1dSRodney W. Grimes  * may be forwarded.
189df8bae1dSRodney W. Grimes  */
19026f9a767SRodney W. Grimes int
191f2565d68SRobert Watson in_canforward(struct in_addr in)
192df8bae1dSRodney W. Grimes {
1933e85b721SEd Maste 	u_long i = ntohl(in.s_addr);
1943e85b721SEd Maste 	u_long net;
195df8bae1dSRodney W. Grimes 
196f8429ca2SBruce M Simpson 	if (IN_EXPERIMENTAL(i) || IN_MULTICAST(i) || IN_LINKLOCAL(i))
197df8bae1dSRodney W. Grimes 		return (0);
198df8bae1dSRodney W. Grimes 	if (IN_CLASSA(i)) {
199df8bae1dSRodney W. Grimes 		net = i & IN_CLASSA_NET;
200df8bae1dSRodney W. Grimes 		if (net == 0 || net == (IN_LOOPBACKNET << IN_CLASSA_NSHIFT))
201df8bae1dSRodney W. Grimes 			return (0);
202df8bae1dSRodney W. Grimes 	}
203df8bae1dSRodney W. Grimes 	return (1);
204df8bae1dSRodney W. Grimes }
205df8bae1dSRodney W. Grimes 
206df8bae1dSRodney W. Grimes /*
207df8bae1dSRodney W. Grimes  * Trim a mask in a sockaddr
208df8bae1dSRodney W. Grimes  */
2090312fbe9SPoul-Henning Kamp static void
210f2565d68SRobert Watson in_socktrim(struct sockaddr_in *ap)
211df8bae1dSRodney W. Grimes {
2123e85b721SEd Maste     char *cplim = (char *) &ap->sin_addr;
2133e85b721SEd Maste     char *cp = (char *) (&ap->sin_addr + 1);
214df8bae1dSRodney W. Grimes 
215df8bae1dSRodney W. Grimes     ap->sin_len = 0;
216df00058dSGarrett Wollman     while (--cp >= cplim)
217df8bae1dSRodney W. Grimes 	if (*cp) {
218df8bae1dSRodney W. Grimes 	    (ap)->sin_len = cp - (char *) (ap) + 1;
219df8bae1dSRodney W. Grimes 	    break;
220df8bae1dSRodney W. Grimes 	}
221df8bae1dSRodney W. Grimes }
222df8bae1dSRodney W. Grimes 
223df8bae1dSRodney W. Grimes /*
224df8bae1dSRodney W. Grimes  * Generic internet control operations (ioctl's).
225df8bae1dSRodney W. Grimes  */
22626f9a767SRodney W. Grimes int
227f2565d68SRobert Watson in_control(struct socket *so, u_long cmd, caddr_t data, struct ifnet *ifp,
228f2565d68SRobert Watson     struct thread *td)
229df8bae1dSRodney W. Grimes {
230f7a39160SGleb Smirnoff 	struct ifreq *ifr = (struct ifreq *)data;
231f7a39160SGleb Smirnoff 	struct sockaddr_in *addr = (struct sockaddr_in *)&ifr->ifr_addr;
232a68cc388SGleb Smirnoff 	struct epoch_tracker et;
233821b5cafSGleb Smirnoff 	struct ifaddr *ifa;
234f7a39160SGleb Smirnoff 	struct in_ifaddr *ia;
235f7a39160SGleb Smirnoff 	int error;
236f7a39160SGleb Smirnoff 
237f7a39160SGleb Smirnoff 	if (ifp == NULL)
238f7a39160SGleb Smirnoff 		return (EADDRNOTAVAIL);
23971212473SGleb Smirnoff 
24071212473SGleb Smirnoff 	/*
241f7a39160SGleb Smirnoff 	 * Filter out 4 ioctls we implement directly.  Forward the rest
242f7a39160SGleb Smirnoff 	 * to specific functions and ifp->if_ioctl().
243bbb3fb61SRobert Watson 	 */
2446a800098SYoshinobu Inoue 	switch (cmd) {
245bbb3fb61SRobert Watson 	case SIOCGIFADDR:
246bbb3fb61SRobert Watson 	case SIOCGIFBRDADDR:
247bbb3fb61SRobert Watson 	case SIOCGIFDSTADDR:
248bbb3fb61SRobert Watson 	case SIOCGIFNETMASK:
249f7a39160SGleb Smirnoff 		break;
2506d00fd9cSGleb Smirnoff 	case SIOCDIFADDR:
251f7a39160SGleb Smirnoff 		sx_xlock(&in_control_sx);
252338e227aSLuiz Otavio O Souza 		error = in_difaddr_ioctl(cmd, data, ifp, td);
253f7a39160SGleb Smirnoff 		sx_xunlock(&in_control_sx);
254f7a39160SGleb Smirnoff 		return (error);
25577b89ad8SGleb Smirnoff 	case OSIOCAIFADDR:	/* 9.x compat */
2566d00fd9cSGleb Smirnoff 	case SIOCAIFADDR:
257f7a39160SGleb Smirnoff 		sx_xlock(&in_control_sx);
25877b89ad8SGleb Smirnoff 		error = in_aifaddr_ioctl(cmd, data, ifp, td);
259f7a39160SGleb Smirnoff 		sx_xunlock(&in_control_sx);
260f7a39160SGleb Smirnoff 		return (error);
261bbb3fb61SRobert Watson 	case SIOCSIFADDR:
262bbb3fb61SRobert Watson 	case SIOCSIFBRDADDR:
263bbb3fb61SRobert Watson 	case SIOCSIFDSTADDR:
264bbb3fb61SRobert Watson 	case SIOCSIFNETMASK:
26556cf9dc1SGleb Smirnoff 		/* We no longer support that old commands. */
2666d00fd9cSGleb Smirnoff 		return (EINVAL);
267bbb3fb61SRobert Watson 	default:
268f7a39160SGleb Smirnoff 		if (ifp->if_ioctl == NULL)
269bbb3fb61SRobert Watson 			return (EOPNOTSUPP);
270bbb3fb61SRobert Watson 		return ((*ifp->if_ioctl)(ifp, cmd, data));
2716a800098SYoshinobu Inoue 	}
2726a800098SYoshinobu Inoue 
273821b5cafSGleb Smirnoff 	if (addr->sin_addr.s_addr != INADDR_ANY &&
274821b5cafSGleb Smirnoff 	    prison_check_ip4(td->td_ucred, &addr->sin_addr) != 0)
275821b5cafSGleb Smirnoff 		return (EADDRNOTAVAIL);
276821b5cafSGleb Smirnoff 
277cf7b18f1SRobert Watson 	/*
278a7f77a39SXin LI 	 * Find address for this interface, if it exists.  If an
279a7f77a39SXin LI 	 * address was specified, find that one instead of the
280a7f77a39SXin LI 	 * first one on the interface, if possible.
281df8bae1dSRodney W. Grimes 	 */
282a68cc388SGleb Smirnoff 	NET_EPOCH_ENTER(et);
283d7c5a620SMatt Macy 	CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
2849706c950SGleb Smirnoff 		if (ifa->ifa_addr->sa_family != AF_INET)
2859706c950SGleb Smirnoff 			continue;
286821b5cafSGleb Smirnoff 		ia = (struct in_ifaddr *)ifa;
287821b5cafSGleb Smirnoff 		if (ia->ia_addr.sin_addr.s_addr == addr->sin_addr.s_addr)
288df8bae1dSRodney W. Grimes 			break;
289ca925d9cSJonathan Lemon 	}
290a7f77a39SXin LI 	if (ifa == NULL)
291d7c5a620SMatt Macy 		CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link)
292a7f77a39SXin LI 			if (ifa->ifa_addr->sa_family == AF_INET) {
293a7f77a39SXin LI 				ia = (struct in_ifaddr *)ifa;
294a7f77a39SXin LI 				if (prison_check_ip4(td->td_ucred,
295a7f77a39SXin LI 				    &ia->ia_addr.sin_addr) == 0)
296a7f77a39SXin LI 					break;
297a7f77a39SXin LI 			}
298f7a39160SGleb Smirnoff 
299821b5cafSGleb Smirnoff 	if (ifa == NULL) {
300a68cc388SGleb Smirnoff 		NET_EPOCH_EXIT(et);
301f7a39160SGleb Smirnoff 		return (EADDRNOTAVAIL);
302ac0aa473SBill Fenner 	}
303df8bae1dSRodney W. Grimes 
304588885f2SRobert Watson 	error = 0;
305df8bae1dSRodney W. Grimes 	switch (cmd) {
306f7a39160SGleb Smirnoff 	case SIOCGIFADDR:
307f7a39160SGleb Smirnoff 		*addr = ia->ia_addr;
308f7a39160SGleb Smirnoff 		break;
3098c0fec80SRobert Watson 
310f7a39160SGleb Smirnoff 	case SIOCGIFBRDADDR:
311f7a39160SGleb Smirnoff 		if ((ifp->if_flags & IFF_BROADCAST) == 0) {
312f7a39160SGleb Smirnoff 			error = EINVAL;
313df8bae1dSRodney W. Grimes 			break;
314df8bae1dSRodney W. Grimes 		}
315f7a39160SGleb Smirnoff 		*addr = ia->ia_broadaddr;
316f7a39160SGleb Smirnoff 		break;
317f7a39160SGleb Smirnoff 
318f7a39160SGleb Smirnoff 	case SIOCGIFDSTADDR:
319f7a39160SGleb Smirnoff 		if ((ifp->if_flags & IFF_POINTOPOINT) == 0) {
320f7a39160SGleb Smirnoff 			error = EINVAL;
321f7a39160SGleb Smirnoff 			break;
322f7a39160SGleb Smirnoff 		}
323f7a39160SGleb Smirnoff 		*addr = ia->ia_dstaddr;
324f7a39160SGleb Smirnoff 		break;
325f7a39160SGleb Smirnoff 
326f7a39160SGleb Smirnoff 	case SIOCGIFNETMASK:
327f7a39160SGleb Smirnoff 		*addr = ia->ia_sockmask;
328f7a39160SGleb Smirnoff 		break;
329f7a39160SGleb Smirnoff 	}
330f7a39160SGleb Smirnoff 
331a68cc388SGleb Smirnoff 	NET_EPOCH_EXIT(et);
332f7a39160SGleb Smirnoff 
333f7a39160SGleb Smirnoff 	return (error);
3341067217dSGarrett Wollman }
335f7a39160SGleb Smirnoff 
336f7a39160SGleb Smirnoff static int
33777b89ad8SGleb Smirnoff in_aifaddr_ioctl(u_long cmd, caddr_t data, struct ifnet *ifp, struct thread *td)
338f7a39160SGleb Smirnoff {
339f7a39160SGleb Smirnoff 	const struct in_aliasreq *ifra = (struct in_aliasreq *)data;
340f7a39160SGleb Smirnoff 	const struct sockaddr_in *addr = &ifra->ifra_addr;
341f7a39160SGleb Smirnoff 	const struct sockaddr_in *broadaddr = &ifra->ifra_broadaddr;
342f7a39160SGleb Smirnoff 	const struct sockaddr_in *mask = &ifra->ifra_mask;
343f7a39160SGleb Smirnoff 	const struct sockaddr_in *dstaddr = &ifra->ifra_dstaddr;
34477b89ad8SGleb Smirnoff 	const int vhid = (cmd == SIOCAIFADDR) ? ifra->ifra_vhid : 0;
345a68cc388SGleb Smirnoff 	struct epoch_tracker et;
346f7a39160SGleb Smirnoff 	struct ifaddr *ifa;
347f7a39160SGleb Smirnoff 	struct in_ifaddr *ia;
348f7a39160SGleb Smirnoff 	bool iaIsFirst;
349f7a39160SGleb Smirnoff 	int error = 0;
350f7a39160SGleb Smirnoff 
351f7a39160SGleb Smirnoff 	error = priv_check(td, PRIV_NET_ADDIFADDR);
352f7a39160SGleb Smirnoff 	if (error)
353f7a39160SGleb Smirnoff 		return (error);
354f7a39160SGleb Smirnoff 
355f7a39160SGleb Smirnoff 	/*
356f7a39160SGleb Smirnoff 	 * ifra_addr must be present and be of INET family.
357f7a39160SGleb Smirnoff 	 * ifra_broadaddr/ifra_dstaddr and ifra_mask are optional.
358f7a39160SGleb Smirnoff 	 */
359f7a39160SGleb Smirnoff 	if (addr->sin_len != sizeof(struct sockaddr_in) ||
360f7a39160SGleb Smirnoff 	    addr->sin_family != AF_INET)
361f7a39160SGleb Smirnoff 		return (EINVAL);
362f7a39160SGleb Smirnoff 	if (broadaddr->sin_len != 0 &&
363f7a39160SGleb Smirnoff 	    (broadaddr->sin_len != sizeof(struct sockaddr_in) ||
364f7a39160SGleb Smirnoff 	    broadaddr->sin_family != AF_INET))
365f7a39160SGleb Smirnoff 		return (EINVAL);
366f7a39160SGleb Smirnoff 	if (mask->sin_len != 0 &&
367f7a39160SGleb Smirnoff 	    (mask->sin_len != sizeof(struct sockaddr_in) ||
368f7a39160SGleb Smirnoff 	    mask->sin_family != AF_INET))
369f7a39160SGleb Smirnoff 		return (EINVAL);
370f7a39160SGleb Smirnoff 	if ((ifp->if_flags & IFF_POINTOPOINT) &&
371f7a39160SGleb Smirnoff 	    (dstaddr->sin_len != sizeof(struct sockaddr_in) ||
372f7a39160SGleb Smirnoff 	     dstaddr->sin_addr.s_addr == INADDR_ANY))
373f7a39160SGleb Smirnoff 		return (EDESTADDRREQ);
374f7a39160SGleb Smirnoff 	if (vhid > 0 && carp_attach_p == NULL)
375f7a39160SGleb Smirnoff 		return (EPROTONOSUPPORT);
376f7a39160SGleb Smirnoff 
377f7a39160SGleb Smirnoff 	/*
378f7a39160SGleb Smirnoff 	 * See whether address already exist.
379f7a39160SGleb Smirnoff 	 */
380f7a39160SGleb Smirnoff 	iaIsFirst = true;
381f7a39160SGleb Smirnoff 	ia = NULL;
382a68cc388SGleb Smirnoff 	NET_EPOCH_ENTER(et);
383d7c5a620SMatt Macy 	CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
3849706c950SGleb Smirnoff 		struct in_ifaddr *it;
385f7a39160SGleb Smirnoff 
3869706c950SGleb Smirnoff 		if (ifa->ifa_addr->sa_family != AF_INET)
387f7a39160SGleb Smirnoff 			continue;
388f7a39160SGleb Smirnoff 
3899706c950SGleb Smirnoff 		it = (struct in_ifaddr *)ifa;
390f7a39160SGleb Smirnoff 		iaIsFirst = false;
391f7a39160SGleb Smirnoff 		if (it->ia_addr.sin_addr.s_addr == addr->sin_addr.s_addr &&
392f7a39160SGleb Smirnoff 		    prison_check_ip4(td->td_ucred, &addr->sin_addr) == 0)
393f7a39160SGleb Smirnoff 			ia = it;
3941067217dSGarrett Wollman 	}
395a68cc388SGleb Smirnoff 	NET_EPOCH_EXIT(et);
396f7a39160SGleb Smirnoff 
397f7a39160SGleb Smirnoff 	if (ia != NULL)
398338e227aSLuiz Otavio O Souza 		(void )in_difaddr_ioctl(cmd, data, ifp, td);
399f7a39160SGleb Smirnoff 
40046758960SGleb Smirnoff 	ifa = ifa_alloc(sizeof(struct in_ifaddr), M_WAITOK);
40146758960SGleb Smirnoff 	ia = (struct in_ifaddr *)ifa;
40259562606SGarrett Wollman 	ifa->ifa_addr = (struct sockaddr *)&ia->ia_addr;
40359562606SGarrett Wollman 	ifa->ifa_dstaddr = (struct sockaddr *)&ia->ia_dstaddr;
40459562606SGarrett Wollman 	ifa->ifa_netmask = (struct sockaddr *)&ia->ia_sockmask;
4052d9db0bcSEric van Gyzen 	callout_init_rw(&ia->ia_garp_timer, &ifp->if_addr_lock,
4062d9db0bcSEric van Gyzen 	    CALLOUT_RETURNUNLOCKED);
40719fc74fbSJeffrey Hsu 
408f7a39160SGleb Smirnoff 	ia->ia_ifp = ifp;
409f7a39160SGleb Smirnoff 	ia->ia_addr = *addr;
410f7a39160SGleb Smirnoff 	if (mask->sin_len != 0) {
411f7a39160SGleb Smirnoff 		ia->ia_sockmask = *mask;
412f7a39160SGleb Smirnoff 		ia->ia_subnetmask = ntohl(ia->ia_sockmask.sin_addr.s_addr);
413f7a39160SGleb Smirnoff 	} else {
414f7a39160SGleb Smirnoff 		in_addr_t i = ntohl(addr->sin_addr.s_addr);
415f7a39160SGleb Smirnoff 
416f7a39160SGleb Smirnoff 		/*
417f7a39160SGleb Smirnoff 	 	 * Be compatible with network classes, if netmask isn't
418f7a39160SGleb Smirnoff 		 * supplied, guess it based on classes.
419f7a39160SGleb Smirnoff 	 	 */
420f7a39160SGleb Smirnoff 		if (IN_CLASSA(i))
421f7a39160SGleb Smirnoff 			ia->ia_subnetmask = IN_CLASSA_NET;
422f7a39160SGleb Smirnoff 		else if (IN_CLASSB(i))
423f7a39160SGleb Smirnoff 			ia->ia_subnetmask = IN_CLASSB_NET;
424f7a39160SGleb Smirnoff 		else
425f7a39160SGleb Smirnoff 			ia->ia_subnetmask = IN_CLASSC_NET;
426f7a39160SGleb Smirnoff 		ia->ia_sockmask.sin_addr.s_addr = htonl(ia->ia_subnetmask);
427f7a39160SGleb Smirnoff 	}
428f7a39160SGleb Smirnoff 	ia->ia_subnet = ntohl(addr->sin_addr.s_addr) & ia->ia_subnetmask;
429f7a39160SGleb Smirnoff 	in_socktrim(&ia->ia_sockmask);
430f7a39160SGleb Smirnoff 
431df8bae1dSRodney W. Grimes 	if (ifp->if_flags & IFF_BROADCAST) {
432f7a39160SGleb Smirnoff 		if (broadaddr->sin_len != 0) {
433f7a39160SGleb Smirnoff 			ia->ia_broadaddr = *broadaddr;
434f7a39160SGleb Smirnoff 		} else if (ia->ia_subnetmask == IN_RFC3021_MASK) {
435f7a39160SGleb Smirnoff 			ia->ia_broadaddr.sin_addr.s_addr = INADDR_BROADCAST;
436f7a39160SGleb Smirnoff 			ia->ia_broadaddr.sin_len = sizeof(struct sockaddr_in);
437f7a39160SGleb Smirnoff 			ia->ia_broadaddr.sin_family = AF_INET;
438f7a39160SGleb Smirnoff 		} else {
439f7a39160SGleb Smirnoff 			ia->ia_broadaddr.sin_addr.s_addr =
440f7a39160SGleb Smirnoff 			    htonl(ia->ia_subnet | ~ia->ia_subnetmask);
441f7a39160SGleb Smirnoff 			ia->ia_broadaddr.sin_len = sizeof(struct sockaddr_in);
442df8bae1dSRodney W. Grimes 			ia->ia_broadaddr.sin_family = AF_INET;
443df8bae1dSRodney W. Grimes 		}
444f7a39160SGleb Smirnoff 	}
445f7a39160SGleb Smirnoff 
446f7a39160SGleb Smirnoff 	if (ifp->if_flags & IFF_POINTOPOINT)
447f7a39160SGleb Smirnoff 		ia->ia_dstaddr = *dstaddr;
448f7a39160SGleb Smirnoff 
449f7a39160SGleb Smirnoff 	/* XXXGL: rtinit() needs this strange assignment. */
450f7a39160SGleb Smirnoff 	if (ifp->if_flags & IFF_LOOPBACK)
451f7a39160SGleb Smirnoff                 ia->ia_dstaddr = ia->ia_addr;
452f3d30eb2SGleb Smirnoff 
4535af464bbSSteven Hartland 	if (vhid != 0) {
4545af464bbSSteven Hartland 		error = (*carp_attach_p)(&ia->ia_ifa, vhid);
4555af464bbSSteven Hartland 		if (error)
4565af464bbSSteven Hartland 			return (error);
4575af464bbSSteven Hartland 	}
4585af464bbSSteven Hartland 
459a49b317cSAlexander V. Chernikov 	/* if_addrhead is already referenced by ifa_alloc() */
460137f91e8SJohn Baldwin 	IF_ADDR_WLOCK(ifp);
461d7c5a620SMatt Macy 	CK_STAILQ_INSERT_TAIL(&ifp->if_addrhead, ifa, ifa_link);
462137f91e8SJohn Baldwin 	IF_ADDR_WUNLOCK(ifp);
463f7a39160SGleb Smirnoff 
4648c0fec80SRobert Watson 	ifa_ref(ifa);			/* in_ifaddrhead */
4652d9cfabaSRobert Watson 	IN_IFADDR_WLOCK();
466d7c5a620SMatt Macy 	CK_STAILQ_INSERT_TAIL(&V_in_ifaddrhead, ia, ia_link);
467f7a39160SGleb Smirnoff 	LIST_INSERT_HEAD(INADDR_HASH(ia->ia_addr.sin_addr.s_addr), ia, ia_hash);
4682d9cfabaSRobert Watson 	IN_IFADDR_WUNLOCK();
469df8bae1dSRodney W. Grimes 
470f7a39160SGleb Smirnoff 	/*
471f7a39160SGleb Smirnoff 	 * Give the interface a chance to initialize
472f7a39160SGleb Smirnoff 	 * if this is its first address,
473f7a39160SGleb Smirnoff 	 * and to validate the address if necessary.
474f7a39160SGleb Smirnoff 	 */
475d34165f7SSteven Hartland 	if (ifp->if_ioctl != NULL) {
476f7a39160SGleb Smirnoff 		error = (*ifp->if_ioctl)(ifp, SIOCSIFADDR, (caddr_t)ia);
477f7a39160SGleb Smirnoff 		if (error)
4785af464bbSSteven Hartland 			goto fail1;
479d34165f7SSteven Hartland 	}
480f7a39160SGleb Smirnoff 
481f7a39160SGleb Smirnoff 	/*
482f7a39160SGleb Smirnoff 	 * Add route for the network.
483f7a39160SGleb Smirnoff 	 */
484f7a39160SGleb Smirnoff 	if (vhid == 0) {
485f7a39160SGleb Smirnoff 		int flags = RTF_UP;
486f7a39160SGleb Smirnoff 
487f7a39160SGleb Smirnoff 		if (ifp->if_flags & (IFF_LOOPBACK|IFF_POINTOPOINT))
488f7a39160SGleb Smirnoff 			flags |= RTF_HOST;
489f7a39160SGleb Smirnoff 
490f7a39160SGleb Smirnoff 		error = in_addprefix(ia, flags);
491f7a39160SGleb Smirnoff 		if (error)
4925af464bbSSteven Hartland 			goto fail1;
493df8bae1dSRodney W. Grimes 	}
494df8bae1dSRodney W. Grimes 
495588885f2SRobert Watson 	/*
496f7a39160SGleb Smirnoff 	 * Add a loopback route to self.
497588885f2SRobert Watson 	 */
498f7a39160SGleb Smirnoff 	if (vhid == 0 && (ifp->if_flags & IFF_LOOPBACK) == 0 &&
499c1f7c3f5SGleb Smirnoff 	    ia->ia_addr.sin_addr.s_addr != INADDR_ANY &&
500c1f7c3f5SGleb Smirnoff 	    !((ifp->if_flags & IFF_POINTOPOINT) &&
501c1f7c3f5SGleb Smirnoff 	     ia->ia_dstaddr.sin_addr.s_addr == ia->ia_addr.sin_addr.s_addr)) {
502f7a39160SGleb Smirnoff 		struct in_ifaddr *eia;
503df8bae1dSRodney W. Grimes 
504f7a39160SGleb Smirnoff 		eia = in_localip_more(ia);
505f7a39160SGleb Smirnoff 
506f7a39160SGleb Smirnoff 		if (eia == NULL) {
507f7a39160SGleb Smirnoff 			error = ifa_add_loopback_route((struct ifaddr *)ia,
508f7a39160SGleb Smirnoff 			    (struct sockaddr *)&ia->ia_addr);
509f7a39160SGleb Smirnoff 			if (error)
5105af464bbSSteven Hartland 				goto fail2;
511f7a39160SGleb Smirnoff 		} else
512f7a39160SGleb Smirnoff 			ifa_free(&eia->ia_ifa);
513588885f2SRobert Watson 	}
514df8bae1dSRodney W. Grimes 
515f7a39160SGleb Smirnoff 	if (iaIsFirst && (ifp->if_flags & IFF_MULTICAST)) {
516f7a39160SGleb Smirnoff 		struct in_addr allhosts_addr;
517f7a39160SGleb Smirnoff 		struct in_ifinfo *ii;
518df8bae1dSRodney W. Grimes 
519c75aa354SBruce M Simpson 		ii = ((struct in_ifinfo *)ifp->if_afdata[AF_INET]);
520f7a39160SGleb Smirnoff 		allhosts_addr.s_addr = htonl(INADDR_ALLHOSTS_GROUP);
521df8bae1dSRodney W. Grimes 
522f7a39160SGleb Smirnoff 		error = in_joingroup(ifp, &allhosts_addr, NULL,
523f7a39160SGleb Smirnoff 			&ii->ii_allhosts);
524f7a39160SGleb Smirnoff 	}
525f7a39160SGleb Smirnoff 
52664d63b1eSAndrey V. Elsukov 	/*
52764d63b1eSAndrey V. Elsukov 	 * Note: we don't need extra reference for ifa, since we called
52864d63b1eSAndrey V. Elsukov 	 * with sx lock held, and ifaddr can not be deleted in concurrent
52964d63b1eSAndrey V. Elsukov 	 * thread.
53064d63b1eSAndrey V. Elsukov 	 */
53164d63b1eSAndrey V. Elsukov 	EVENTHANDLER_INVOKE(ifaddr_event_ext, ifp, ifa, IFADDR_EVENT_ADD);
532f7a39160SGleb Smirnoff 
533f7a39160SGleb Smirnoff 	return (error);
534f7a39160SGleb Smirnoff 
5355af464bbSSteven Hartland fail2:
536f7a39160SGleb Smirnoff 	if (vhid == 0)
537f7a39160SGleb Smirnoff 		(void )in_scrubprefix(ia, LLE_STATIC);
538f7a39160SGleb Smirnoff 
5395af464bbSSteven Hartland fail1:
540f7a39160SGleb Smirnoff 	if (ia->ia_ifa.ifa_carp)
541338e227aSLuiz Otavio O Souza 		(*carp_detach_p)(&ia->ia_ifa, false);
542f7a39160SGleb Smirnoff 
543f7a39160SGleb Smirnoff 	IF_ADDR_WLOCK(ifp);
544d7c5a620SMatt Macy 	CK_STAILQ_REMOVE(&ifp->if_addrhead, &ia->ia_ifa, ifaddr, ifa_link);
545f7a39160SGleb Smirnoff 	IF_ADDR_WUNLOCK(ifp);
546a49b317cSAlexander V. Chernikov 	ifa_free(&ia->ia_ifa);		/* if_addrhead */
547f7a39160SGleb Smirnoff 
548f7a39160SGleb Smirnoff 	IN_IFADDR_WLOCK();
549d7c5a620SMatt Macy 	CK_STAILQ_REMOVE(&V_in_ifaddrhead, ia, in_ifaddr, ia_link);
550f7a39160SGleb Smirnoff 	LIST_REMOVE(ia, ia_hash);
551f7a39160SGleb Smirnoff 	IN_IFADDR_WUNLOCK();
552a49b317cSAlexander V. Chernikov 	ifa_free(&ia->ia_ifa);		/* in_ifaddrhead */
553f7a39160SGleb Smirnoff 
554f7a39160SGleb Smirnoff 	return (error);
555f7a39160SGleb Smirnoff }
556f7a39160SGleb Smirnoff 
557f7a39160SGleb Smirnoff static int
558338e227aSLuiz Otavio O Souza in_difaddr_ioctl(u_long cmd, caddr_t data, struct ifnet *ifp, struct thread *td)
559f7a39160SGleb Smirnoff {
560f7a39160SGleb Smirnoff 	const struct ifreq *ifr = (struct ifreq *)data;
5616224cd89SNathan Whitehorn 	const struct sockaddr_in *addr = (const struct sockaddr_in *)
5626224cd89SNathan Whitehorn 	    &ifr->ifr_addr;
563f7a39160SGleb Smirnoff 	struct ifaddr *ifa;
564f7a39160SGleb Smirnoff 	struct in_ifaddr *ia;
565f7a39160SGleb Smirnoff 	bool deleteAny, iaIsLast;
566f7a39160SGleb Smirnoff 	int error;
567f7a39160SGleb Smirnoff 
568f7a39160SGleb Smirnoff 	if (td != NULL) {
569f7a39160SGleb Smirnoff 		error = priv_check(td, PRIV_NET_DELIFADDR);
570f7a39160SGleb Smirnoff 		if (error)
571f7a39160SGleb Smirnoff 			return (error);
572f7a39160SGleb Smirnoff 	}
573f7a39160SGleb Smirnoff 
574f7a39160SGleb Smirnoff 	if (addr->sin_len != sizeof(struct sockaddr_in) ||
575f7a39160SGleb Smirnoff 	    addr->sin_family != AF_INET)
576f7a39160SGleb Smirnoff 		deleteAny = true;
577f7a39160SGleb Smirnoff 	else
578f7a39160SGleb Smirnoff 		deleteAny = false;
579f7a39160SGleb Smirnoff 
580f7a39160SGleb Smirnoff 	iaIsLast = true;
581f7a39160SGleb Smirnoff 	ia = NULL;
582f7a39160SGleb Smirnoff 	IF_ADDR_WLOCK(ifp);
583d7c5a620SMatt Macy 	CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
5849706c950SGleb Smirnoff 		struct in_ifaddr *it;
585f7a39160SGleb Smirnoff 
5869706c950SGleb Smirnoff 		if (ifa->ifa_addr->sa_family != AF_INET)
587f7a39160SGleb Smirnoff 			continue;
588f7a39160SGleb Smirnoff 
5899706c950SGleb Smirnoff 		it = (struct in_ifaddr *)ifa;
590f7a39160SGleb Smirnoff 		if (deleteAny && ia == NULL && (td == NULL ||
591f7a39160SGleb Smirnoff 		    prison_check_ip4(td->td_ucred, &it->ia_addr.sin_addr) == 0))
592f7a39160SGleb Smirnoff 			ia = it;
593f7a39160SGleb Smirnoff 
594f7a39160SGleb Smirnoff 		if (it->ia_addr.sin_addr.s_addr == addr->sin_addr.s_addr &&
595f7a39160SGleb Smirnoff 		    (td == NULL || prison_check_ip4(td->td_ucred,
596f7a39160SGleb Smirnoff 		    &addr->sin_addr) == 0))
597f7a39160SGleb Smirnoff 			ia = it;
598f7a39160SGleb Smirnoff 
599f7a39160SGleb Smirnoff 		if (it != ia)
600f7a39160SGleb Smirnoff 			iaIsLast = false;
601f7a39160SGleb Smirnoff 	}
602f7a39160SGleb Smirnoff 
603f7a39160SGleb Smirnoff 	if (ia == NULL) {
604f7a39160SGleb Smirnoff 		IF_ADDR_WUNLOCK(ifp);
605f7a39160SGleb Smirnoff 		return (EADDRNOTAVAIL);
606f7a39160SGleb Smirnoff 	}
607f7a39160SGleb Smirnoff 
608d7c5a620SMatt Macy 	CK_STAILQ_REMOVE(&ifp->if_addrhead, &ia->ia_ifa, ifaddr, ifa_link);
609f7a39160SGleb Smirnoff 	IF_ADDR_WUNLOCK(ifp);
610f7a39160SGleb Smirnoff 	ifa_free(&ia->ia_ifa);		/* if_addrhead */
611f7a39160SGleb Smirnoff 
612f7a39160SGleb Smirnoff 	IN_IFADDR_WLOCK();
613d7c5a620SMatt Macy 	CK_STAILQ_REMOVE(&V_in_ifaddrhead, ia, in_ifaddr, ia_link);
614f7a39160SGleb Smirnoff 	LIST_REMOVE(ia, ia_hash);
615f7a39160SGleb Smirnoff 	IN_IFADDR_WUNLOCK();
616f7a39160SGleb Smirnoff 
617089cdfadSRuslan Ermilov 	/*
618237bf7f7SGleb Smirnoff 	 * in_scrubprefix() kills the interface route.
619089cdfadSRuslan Ermilov 	 */
620237bf7f7SGleb Smirnoff 	in_scrubprefix(ia, LLE_STATIC);
621588885f2SRobert Watson 
622c655b7c4SDavid Greenman 	/*
623089cdfadSRuslan Ermilov 	 * in_ifadown gets rid of all the rest of
624089cdfadSRuslan Ermilov 	 * the routes.  This is not quite the right
625089cdfadSRuslan Ermilov 	 * thing to do, but at least if we are running
626089cdfadSRuslan Ermilov 	 * a routing process they will come back.
627089cdfadSRuslan Ermilov 	 */
62891854268SRuslan Ermilov 	in_ifadown(&ia->ia_ifa, 1);
6290f02fdacSBrian Somers 
63008b68b0eSGleb Smirnoff 	if (ia->ia_ifa.ifa_carp)
63159b2022fSLuiz Otavio O Souza 		(*carp_detach_p)(&ia->ia_ifa, cmd == SIOCAIFADDR);
63208b68b0eSGleb Smirnoff 
633f7e083afSBruce M Simpson 	/*
634f7e083afSBruce M Simpson 	 * If this is the last IPv4 address configured on this
635f7e083afSBruce M Simpson 	 * interface, leave the all-hosts group.
636d10910e6SBruce M Simpson 	 * No state-change report need be transmitted.
637f7e083afSBruce M Simpson 	 */
638f7a39160SGleb Smirnoff 	if (iaIsLast && (ifp->if_flags & IFF_MULTICAST)) {
639f7a39160SGleb Smirnoff 		struct in_ifinfo *ii;
640f7a39160SGleb Smirnoff 
641c75aa354SBruce M Simpson 		ii = ((struct in_ifinfo *)ifp->if_afdata[AF_INET]);
642d10910e6SBruce M Simpson 		if (ii->ii_allhosts) {
643f3e1324bSStephen Hurd 			(void)in_leavegroup(ii->ii_allhosts, NULL);
644d10910e6SBruce M Simpson 			ii->ii_allhosts = NULL;
645d10910e6SBruce M Simpson 		}
646f7a39160SGleb Smirnoff 	}
6476d00fd9cSGleb Smirnoff 
6482d9db0bcSEric van Gyzen 	IF_ADDR_WLOCK(ifp);
6492d9db0bcSEric van Gyzen 	if (callout_stop(&ia->ia_garp_timer) == 1) {
6502d9db0bcSEric van Gyzen 		ifa_free(&ia->ia_ifa);
6512d9db0bcSEric van Gyzen 	}
6522d9db0bcSEric van Gyzen 	IF_ADDR_WUNLOCK(ifp);
6532d9db0bcSEric van Gyzen 
65464d63b1eSAndrey V. Elsukov 	EVENTHANDLER_INVOKE(ifaddr_event_ext, ifp, &ia->ia_ifa,
65564d63b1eSAndrey V. Elsukov 	    IFADDR_EVENT_DEL);
656a49b317cSAlexander V. Chernikov 	ifa_free(&ia->ia_ifa);		/* in_ifaddrhead */
657f7a39160SGleb Smirnoff 
658f7a39160SGleb Smirnoff 	return (0);
659df8bae1dSRodney W. Grimes }
660df8bae1dSRodney W. Grimes 
66148321abeSMax Laier #define rtinitflags(x) \
66248321abeSMax Laier 	((((x)->ia_ifp->if_flags & (IFF_LOOPBACK | IFF_POINTOPOINT)) != 0) \
66348321abeSMax Laier 	    ? RTF_HOST : 0)
664ccbb9c35SQing Li 
665ccbb9c35SQing Li /*
666fbdd20a1SMatt Jacob  * Check if we have a route for the given prefix already or add one accordingly.
66748321abeSMax Laier  */
66808b68b0eSGleb Smirnoff int
669f2565d68SRobert Watson in_addprefix(struct in_ifaddr *target, int flags)
67048321abeSMax Laier {
671cc0a3c8cSAndrey V. Elsukov 	struct rm_priotracker in_ifa_tracker;
67248321abeSMax Laier 	struct in_ifaddr *ia;
673bfb26eecSGleb Smirnoff 	struct in_addr prefix, mask, p, m;
6740cfee0c2SAlan Somers 	int error;
67548321abeSMax Laier 
676fbdd20a1SMatt Jacob 	if ((flags & RTF_HOST) != 0) {
67748321abeSMax Laier 		prefix = target->ia_dstaddr.sin_addr;
678fbdd20a1SMatt Jacob 		mask.s_addr = 0;
679fbdd20a1SMatt Jacob 	} else {
68048321abeSMax Laier 		prefix = target->ia_addr.sin_addr;
68148321abeSMax Laier 		mask = target->ia_sockmask.sin_addr;
68248321abeSMax Laier 		prefix.s_addr &= mask.s_addr;
68348321abeSMax Laier 	}
68448321abeSMax Laier 
685cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RLOCK(&in_ifa_tracker);
6860cfee0c2SAlan Somers 	/* Look for an existing address with the same prefix, mask, and fib */
687d7c5a620SMatt Macy 	CK_STAILQ_FOREACH(ia, &V_in_ifaddrhead, ia_link) {
688bfb26eecSGleb Smirnoff 		if (rtinitflags(ia)) {
68972366606SKevin Lo 			p = ia->ia_dstaddr.sin_addr;
69048321abeSMax Laier 
69148321abeSMax Laier 			if (prefix.s_addr != p.s_addr)
69248321abeSMax Laier 				continue;
693bfb26eecSGleb Smirnoff 		} else {
694bfb26eecSGleb Smirnoff 			p = ia->ia_addr.sin_addr;
695bfb26eecSGleb Smirnoff 			m = ia->ia_sockmask.sin_addr;
696bfb26eecSGleb Smirnoff 			p.s_addr &= m.s_addr;
697bfb26eecSGleb Smirnoff 
698bfb26eecSGleb Smirnoff 			if (prefix.s_addr != p.s_addr ||
699bfb26eecSGleb Smirnoff 			    mask.s_addr != m.s_addr)
700bfb26eecSGleb Smirnoff 				continue;
701bfb26eecSGleb Smirnoff 		}
7020cfee0c2SAlan Somers 		if (target->ia_ifp->if_fib != ia->ia_ifp->if_fib)
7030cfee0c2SAlan Somers 			continue;
70448321abeSMax Laier 
70548321abeSMax Laier 		/*
70648321abeSMax Laier 		 * If we got a matching prefix route inserted by other
70748321abeSMax Laier 		 * interface address, we are done here.
70848321abeSMax Laier 		 */
7091ae95409SGleb Smirnoff 		if (ia->ia_flags & IFA_ROUTE) {
710c7ea0aa6SQing Li #ifdef RADIX_MPATH
711c7ea0aa6SQing Li 			if (ia->ia_addr.sin_addr.s_addr ==
71242db1b87SBjoern A. Zeeb 			    target->ia_addr.sin_addr.s_addr) {
713cc0a3c8cSAndrey V. Elsukov 				IN_IFADDR_RUNLOCK(&in_ifa_tracker);
714c7ea0aa6SQing Li 				return (EEXIST);
71542db1b87SBjoern A. Zeeb 			} else
716c7ea0aa6SQing Li 				break;
717c7ea0aa6SQing Li #endif
71808b68b0eSGleb Smirnoff 			if (V_nosameprefix) {
719cc0a3c8cSAndrey V. Elsukov 				IN_IFADDR_RUNLOCK(&in_ifa_tracker);
7201ae95409SGleb Smirnoff 				return (EEXIST);
7212d9cfabaSRobert Watson 			} else {
7220cfee0c2SAlan Somers 				int fibnum;
7230cfee0c2SAlan Somers 
724cc45ae40SHiroki Sato 				fibnum = V_rt_add_addr_allfibs ? RT_ALL_FIBS :
7250cfee0c2SAlan Somers 					target->ia_ifp->if_fib;
726d375edc9SAlexander V. Chernikov 				rt_addrmsg(RTM_ADD, &target->ia_ifa, fibnum);
727cc0a3c8cSAndrey V. Elsukov 				IN_IFADDR_RUNLOCK(&in_ifa_tracker);
7281ae95409SGleb Smirnoff 				return (0);
7291ae95409SGleb Smirnoff 			}
73048321abeSMax Laier 		}
7312d9cfabaSRobert Watson 	}
732cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RUNLOCK(&in_ifa_tracker);
73348321abeSMax Laier 
73448321abeSMax Laier 	/*
73548321abeSMax Laier 	 * No-one seem to have this prefix route, so we try to insert it.
73648321abeSMax Laier 	 */
73748321abeSMax Laier 	error = rtinit(&target->ia_ifa, (int)RTM_ADD, flags);
73848321abeSMax Laier 	if (!error)
73948321abeSMax Laier 		target->ia_flags |= IFA_ROUTE;
740460473a0SBjoern A. Zeeb 	return (error);
74148321abeSMax Laier }
74248321abeSMax Laier 
74348321abeSMax Laier /*
7443e7a2321SAlexander V. Chernikov  * Removes either all lle entries for given @ia, or lle
7453e7a2321SAlexander V. Chernikov  * corresponding to @ia address.
7463e7a2321SAlexander V. Chernikov  */
7473e7a2321SAlexander V. Chernikov static void
7483e7a2321SAlexander V. Chernikov in_scrubprefixlle(struct in_ifaddr *ia, int all, u_int flags)
7493e7a2321SAlexander V. Chernikov {
7503e7a2321SAlexander V. Chernikov 	struct sockaddr_in addr, mask;
7513e7a2321SAlexander V. Chernikov 	struct sockaddr *saddr, *smask;
7523e7a2321SAlexander V. Chernikov 	struct ifnet *ifp;
7533e7a2321SAlexander V. Chernikov 
7543e7a2321SAlexander V. Chernikov 	saddr = (struct sockaddr *)&addr;
7553e7a2321SAlexander V. Chernikov 	bzero(&addr, sizeof(addr));
7563e7a2321SAlexander V. Chernikov 	addr.sin_len = sizeof(addr);
7573e7a2321SAlexander V. Chernikov 	addr.sin_family = AF_INET;
7583e7a2321SAlexander V. Chernikov 	smask = (struct sockaddr *)&mask;
7593e7a2321SAlexander V. Chernikov 	bzero(&mask, sizeof(mask));
7603e7a2321SAlexander V. Chernikov 	mask.sin_len = sizeof(mask);
7613e7a2321SAlexander V. Chernikov 	mask.sin_family = AF_INET;
7623e7a2321SAlexander V. Chernikov 	mask.sin_addr.s_addr = ia->ia_subnetmask;
7633e7a2321SAlexander V. Chernikov 	ifp = ia->ia_ifp;
7643e7a2321SAlexander V. Chernikov 
76526a60575SAlexander V. Chernikov 	if (all) {
76626a60575SAlexander V. Chernikov 
76726a60575SAlexander V. Chernikov 		/*
76826a60575SAlexander V. Chernikov 		 * Remove all L2 entries matching given prefix.
76926a60575SAlexander V. Chernikov 		 * Convert address to host representation to avoid
77026a60575SAlexander V. Chernikov 		 * doing this on every callback. ia_subnetmask is already
77126a60575SAlexander V. Chernikov 		 * stored in host representation.
77226a60575SAlexander V. Chernikov 		 */
77326a60575SAlexander V. Chernikov 		addr.sin_addr.s_addr = ntohl(ia->ia_addr.sin_addr.s_addr);
7743e7a2321SAlexander V. Chernikov 		lltable_prefix_free(AF_INET, saddr, smask, flags);
77526a60575SAlexander V. Chernikov 	} else {
77626a60575SAlexander V. Chernikov 		/* Remove interface address only */
77726a60575SAlexander V. Chernikov 		addr.sin_addr.s_addr = ia->ia_addr.sin_addr.s_addr;
7783e7a2321SAlexander V. Chernikov 		lltable_delete_addr(LLTABLE(ifp), LLE_IFADDR, saddr);
7793e7a2321SAlexander V. Chernikov 	}
78026a60575SAlexander V. Chernikov }
7813e7a2321SAlexander V. Chernikov 
7823e7a2321SAlexander V. Chernikov /*
78348321abeSMax Laier  * If there is no other address in the system that can serve a route to the
78448321abeSMax Laier  * same prefix, remove the route.  Hand over the route to the new address
78548321abeSMax Laier  * otherwise.
78648321abeSMax Laier  */
78708b68b0eSGleb Smirnoff int
7885b84dc78SQing Li in_scrubprefix(struct in_ifaddr *target, u_int flags)
78948321abeSMax Laier {
790cc0a3c8cSAndrey V. Elsukov 	struct rm_priotracker in_ifa_tracker;
79148321abeSMax Laier 	struct in_ifaddr *ia;
79255174c34SGleb Smirnoff 	struct in_addr prefix, mask, p, m;
7937278b62aSAlan Somers 	int error = 0;
79448321abeSMax Laier 
795df813b7eSQing Li 	/*
796df813b7eSQing Li 	 * Remove the loopback route to the interface address.
797df813b7eSQing Li 	 */
79892fac994SQing Li 	if ((target->ia_addr.sin_addr.s_addr != INADDR_ANY) &&
799c7ab6602SQing Li 	    !(target->ia_ifp->if_flags & IFF_LOOPBACK) &&
800f7a39160SGleb Smirnoff 	    (flags & LLE_STATIC)) {
801f7a39160SGleb Smirnoff 		struct in_ifaddr *eia;
802c7ab6602SQing Li 
80359c180c3SAlexander V. Chernikov 		/*
80459c180c3SAlexander V. Chernikov 		 * XXXME: add fib-aware in_localip.
80559c180c3SAlexander V. Chernikov 		 * We definitely don't want to switch between
80659c180c3SAlexander V. Chernikov 		 * prefixes in different fibs.
80759c180c3SAlexander V. Chernikov 		 */
808f7a39160SGleb Smirnoff 		eia = in_localip_more(target);
809f7a39160SGleb Smirnoff 
810f7a39160SGleb Smirnoff 		if (eia != NULL) {
811f7a39160SGleb Smirnoff 			error = ifa_switch_loopback_route((struct ifaddr *)eia,
81259c180c3SAlexander V. Chernikov 			    (struct sockaddr *)&target->ia_addr);
813f7a39160SGleb Smirnoff 			ifa_free(&eia->ia_ifa);
814f7a39160SGleb Smirnoff 		} else {
8159bb7d0f4SQing Li 			error = ifa_del_loopback_route((struct ifaddr *)target,
8169bb7d0f4SQing Li 			    (struct sockaddr *)&target->ia_addr);
8175b84dc78SQing Li 		}
818ebc90701SQing Li 	}
819ebc90701SQing Li 
82055174c34SGleb Smirnoff 	if (rtinitflags(target)) {
82148321abeSMax Laier 		prefix = target->ia_dstaddr.sin_addr;
82255174c34SGleb Smirnoff 		mask.s_addr = 0;
82355174c34SGleb Smirnoff 	} else {
82448321abeSMax Laier 		prefix = target->ia_addr.sin_addr;
82548321abeSMax Laier 		mask = target->ia_sockmask.sin_addr;
82648321abeSMax Laier 		prefix.s_addr &= mask.s_addr;
82748321abeSMax Laier 	}
82848321abeSMax Laier 
829ccbb9c35SQing Li 	if ((target->ia_flags & IFA_ROUTE) == 0) {
8307278b62aSAlan Somers 		int fibnum;
8317278b62aSAlan Somers 
832cc45ae40SHiroki Sato 		fibnum = V_rt_add_addr_allfibs ? RT_ALL_FIBS :
8337278b62aSAlan Somers 			target->ia_ifp->if_fib;
834d375edc9SAlexander V. Chernikov 		rt_addrmsg(RTM_DELETE, &target->ia_ifa, fibnum);
83526a60575SAlexander V. Chernikov 
83626a60575SAlexander V. Chernikov 		/*
83726a60575SAlexander V. Chernikov 		 * Removing address from !IFF_UP interface or
83826a60575SAlexander V. Chernikov 		 * prefix which exists on other interface (along with route).
83926a60575SAlexander V. Chernikov 		 * No entries should exist here except target addr.
84026a60575SAlexander V. Chernikov 		 * Given that, delete this entry only.
84126a60575SAlexander V. Chernikov 		 */
84226a60575SAlexander V. Chernikov 		in_scrubprefixlle(target, 0, flags);
843ccbb9c35SQing Li 		return (0);
844ccbb9c35SQing Li 	}
845ccbb9c35SQing Li 
846cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RLOCK(&in_ifa_tracker);
847d7c5a620SMatt Macy 	CK_STAILQ_FOREACH(ia, &V_in_ifaddrhead, ia_link) {
84855174c34SGleb Smirnoff 		if (rtinitflags(ia)) {
84948321abeSMax Laier 			p = ia->ia_dstaddr.sin_addr;
85055174c34SGleb Smirnoff 
85155174c34SGleb Smirnoff 			if (prefix.s_addr != p.s_addr)
85255174c34SGleb Smirnoff 				continue;
85355174c34SGleb Smirnoff 		} else {
85448321abeSMax Laier 			p = ia->ia_addr.sin_addr;
85555174c34SGleb Smirnoff 			m = ia->ia_sockmask.sin_addr;
85655174c34SGleb Smirnoff 			p.s_addr &= m.s_addr;
85755174c34SGleb Smirnoff 
85855174c34SGleb Smirnoff 			if (prefix.s_addr != p.s_addr ||
85955174c34SGleb Smirnoff 			    mask.s_addr != m.s_addr)
86055174c34SGleb Smirnoff 				continue;
86148321abeSMax Laier 		}
86248321abeSMax Laier 
86355174c34SGleb Smirnoff 		if ((ia->ia_ifp->if_flags & IFF_UP) == 0)
86448321abeSMax Laier 			continue;
86548321abeSMax Laier 
86648321abeSMax Laier 		/*
86748321abeSMax Laier 		 * If we got a matching prefix address, move IFA_ROUTE and
86848321abeSMax Laier 		 * the route itself to it.  Make sure that routing daemons
86948321abeSMax Laier 		 * get a heads-up.
87048321abeSMax Laier 		 */
87108b68b0eSGleb Smirnoff 		if ((ia->ia_flags & IFA_ROUTE) == 0) {
87279d51435SSergey Kandaurov 			ifa_ref(&ia->ia_ifa);
873cc0a3c8cSAndrey V. Elsukov 			IN_IFADDR_RUNLOCK(&in_ifa_tracker);
87492322284SQing Li 			error = rtinit(&(target->ia_ifa), (int)RTM_DELETE,
87548321abeSMax Laier 			    rtinitflags(target));
87692322284SQing Li 			if (error == 0)
87748321abeSMax Laier 				target->ia_flags &= ~IFA_ROUTE;
87892322284SQing Li 			else
87992322284SQing Li 				log(LOG_INFO, "in_scrubprefix: err=%d, old prefix delete failed\n",
88092322284SQing Li 					error);
8813e7a2321SAlexander V. Chernikov 			/* Scrub all entries IFF interface is different */
8823e7a2321SAlexander V. Chernikov 			in_scrubprefixlle(target, target->ia_ifp != ia->ia_ifp,
8833e7a2321SAlexander V. Chernikov 			    flags);
88448321abeSMax Laier 			error = rtinit(&ia->ia_ifa, (int)RTM_ADD,
88548321abeSMax Laier 			    rtinitflags(ia) | RTF_UP);
88648321abeSMax Laier 			if (error == 0)
88748321abeSMax Laier 				ia->ia_flags |= IFA_ROUTE;
88892322284SQing Li 			else
88992322284SQing Li 				log(LOG_INFO, "in_scrubprefix: err=%d, new prefix add failed\n",
89092322284SQing Li 					error);
89179d51435SSergey Kandaurov 			ifa_free(&ia->ia_ifa);
892460473a0SBjoern A. Zeeb 			return (error);
89348321abeSMax Laier 		}
89448321abeSMax Laier 	}
895cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RUNLOCK(&in_ifa_tracker);
89648321abeSMax Laier 
89748321abeSMax Laier 	/*
898c9d763bfSQing Li 	 * remove all L2 entries on the given prefix
899c9d763bfSQing Li 	 */
9003e7a2321SAlexander V. Chernikov 	in_scrubprefixlle(target, 1, flags);
901c9d763bfSQing Li 
902c9d763bfSQing Li 	/*
90348321abeSMax Laier 	 * As no-one seem to have this prefix, we can remove the route.
90448321abeSMax Laier 	 */
90592322284SQing Li 	error = rtinit(&(target->ia_ifa), (int)RTM_DELETE, rtinitflags(target));
90692322284SQing Li 	if (error == 0)
90748321abeSMax Laier 		target->ia_flags &= ~IFA_ROUTE;
90892322284SQing Li 	else
90992322284SQing Li 		log(LOG_INFO, "in_scrubprefix: err=%d, prefix delete failed\n", error);
91092322284SQing Li 	return (error);
91148321abeSMax Laier }
91248321abeSMax Laier 
91348321abeSMax Laier #undef rtinitflags
914df8bae1dSRodney W. Grimes 
91589856f7eSBjoern A. Zeeb void
91689856f7eSBjoern A. Zeeb in_ifscrub_all(void)
91789856f7eSBjoern A. Zeeb {
91889856f7eSBjoern A. Zeeb 	struct ifnet *ifp;
91989856f7eSBjoern A. Zeeb 	struct ifaddr *ifa, *nifa;
92089856f7eSBjoern A. Zeeb 	struct ifaliasreq ifr;
92189856f7eSBjoern A. Zeeb 
92289856f7eSBjoern A. Zeeb 	IFNET_RLOCK();
9234f6c66ccSMatt Macy 	CK_STAILQ_FOREACH(ifp, &V_ifnet, if_link) {
92489856f7eSBjoern A. Zeeb 		/* Cannot lock here - lock recursion. */
925a68cc388SGleb Smirnoff 		/* NET_EPOCH_ENTER(et); */
926d7c5a620SMatt Macy 		CK_STAILQ_FOREACH_SAFE(ifa, &ifp->if_addrhead, ifa_link, nifa) {
92789856f7eSBjoern A. Zeeb 			if (ifa->ifa_addr->sa_family != AF_INET)
92889856f7eSBjoern A. Zeeb 				continue;
92989856f7eSBjoern A. Zeeb 
93089856f7eSBjoern A. Zeeb 			/*
93189856f7eSBjoern A. Zeeb 			 * This is ugly but the only way for legacy IP to
93289856f7eSBjoern A. Zeeb 			 * cleanly remove addresses and everything attached.
93389856f7eSBjoern A. Zeeb 			 */
93489856f7eSBjoern A. Zeeb 			bzero(&ifr, sizeof(ifr));
93589856f7eSBjoern A. Zeeb 			ifr.ifra_addr = *ifa->ifa_addr;
93689856f7eSBjoern A. Zeeb 			if (ifa->ifa_dstaddr)
93789856f7eSBjoern A. Zeeb 			ifr.ifra_broadaddr = *ifa->ifa_dstaddr;
93889856f7eSBjoern A. Zeeb 			(void)in_control(NULL, SIOCDIFADDR, (caddr_t)&ifr,
93989856f7eSBjoern A. Zeeb 			    ifp, NULL);
94089856f7eSBjoern A. Zeeb 		}
941a68cc388SGleb Smirnoff 		/* NET_EPOCH_EXIT(et); */
94289856f7eSBjoern A. Zeeb 		in_purgemaddrs(ifp);
94389856f7eSBjoern A. Zeeb 		igmp_domifdetach(ifp);
94489856f7eSBjoern A. Zeeb 	}
94589856f7eSBjoern A. Zeeb 	IFNET_RUNLOCK();
94689856f7eSBjoern A. Zeeb }
94789856f7eSBjoern A. Zeeb 
94890cc51a1SRyan Stone int
94990cc51a1SRyan Stone in_ifaddr_broadcast(struct in_addr in, struct in_ifaddr *ia)
95090cc51a1SRyan Stone {
95190cc51a1SRyan Stone 
95290cc51a1SRyan Stone 	return ((in.s_addr == ia->ia_broadaddr.sin_addr.s_addr ||
95390cc51a1SRyan Stone 	     /*
95490cc51a1SRyan Stone 	      * Check for old-style (host 0) broadcast, but
95590cc51a1SRyan Stone 	      * taking into account that RFC 3021 obsoletes it.
95690cc51a1SRyan Stone 	      */
95790cc51a1SRyan Stone 	    (ia->ia_subnetmask != IN_RFC3021_MASK &&
95890cc51a1SRyan Stone 	    ntohl(in.s_addr) == ia->ia_subnet)) &&
95990cc51a1SRyan Stone 	     /*
96090cc51a1SRyan Stone 	      * Check for an all one subnetmask. These
96190cc51a1SRyan Stone 	      * only exist when an interface gets a secondary
96290cc51a1SRyan Stone 	      * address.
96390cc51a1SRyan Stone 	      */
96490cc51a1SRyan Stone 	    ia->ia_subnetmask != (u_long)0xffffffff);
96590cc51a1SRyan Stone }
96690cc51a1SRyan Stone 
967df8bae1dSRodney W. Grimes /*
968df8bae1dSRodney W. Grimes  * Return 1 if the address might be a local broadcast address.
969df8bae1dSRodney W. Grimes  */
97026f9a767SRodney W. Grimes int
971f2565d68SRobert Watson in_broadcast(struct in_addr in, struct ifnet *ifp)
972df8bae1dSRodney W. Grimes {
973a68cc388SGleb Smirnoff 	struct epoch_tracker et;
9743e85b721SEd Maste 	struct ifaddr *ifa;
97511f2a7cdSRyan Stone 	int found;
976df8bae1dSRodney W. Grimes 
977df8bae1dSRodney W. Grimes 	if (in.s_addr == INADDR_BROADCAST ||
978df8bae1dSRodney W. Grimes 	    in.s_addr == INADDR_ANY)
979460473a0SBjoern A. Zeeb 		return (1);
980df8bae1dSRodney W. Grimes 	if ((ifp->if_flags & IFF_BROADCAST) == 0)
981460473a0SBjoern A. Zeeb 		return (0);
98211f2a7cdSRyan Stone 	found = 0;
983df8bae1dSRodney W. Grimes 	/*
984df8bae1dSRodney W. Grimes 	 * Look through the list of addresses for a match
985df8bae1dSRodney W. Grimes 	 * with a broadcast address.
986df8bae1dSRodney W. Grimes 	 */
987a68cc388SGleb Smirnoff 	NET_EPOCH_ENTER(et);
988d7c5a620SMatt Macy 	CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link)
989df8bae1dSRodney W. Grimes 		if (ifa->ifa_addr->sa_family == AF_INET &&
99011f2a7cdSRyan Stone 		    in_ifaddr_broadcast(in, (struct in_ifaddr *)ifa)) {
99111f2a7cdSRyan Stone 			found = 1;
99211f2a7cdSRyan Stone 			break;
99311f2a7cdSRyan Stone 		}
994a68cc388SGleb Smirnoff 	NET_EPOCH_EXIT(et);
99511f2a7cdSRyan Stone 	return (found);
996df8bae1dSRodney W. Grimes }
997ec002feeSBruce M Simpson 
998df8bae1dSRodney W. Grimes /*
999b1c53bc9SRobert Watson  * On interface removal, clean up IPv4 data structures hung off of the ifnet.
1000b1c53bc9SRobert Watson  */
1001b1c53bc9SRobert Watson void
1002f2565d68SRobert Watson in_ifdetach(struct ifnet *ifp)
1003b1c53bc9SRobert Watson {
1004f3e1324bSStephen Hurd 	IN_MULTI_LOCK();
1005603724d3SBjoern A. Zeeb 	in_pcbpurgeif0(&V_ripcbinfo, ifp);
1006603724d3SBjoern A. Zeeb 	in_pcbpurgeif0(&V_udbinfo, ifp);
1007e06e816fSKevin Lo 	in_pcbpurgeif0(&V_ulitecbinfo, ifp);
1008ec002feeSBruce M Simpson 	in_purgemaddrs(ifp);
1009f3e1324bSStephen Hurd 	IN_MULTI_UNLOCK();
1010b1c53bc9SRobert Watson }
10116e6b3f7cSQing Li 
1012d10910e6SBruce M Simpson /*
1013d10910e6SBruce M Simpson  * Delete all IPv4 multicast address records, and associated link-layer
1014d10910e6SBruce M Simpson  * multicast address records, associated with ifp.
1015d10910e6SBruce M Simpson  * XXX It looks like domifdetach runs AFTER the link layer cleanup.
101656663a40SBruce M Simpson  * XXX This should not race with ifma_protospec being set during
101756663a40SBruce M Simpson  * a new allocation, if it does, we have bigger problems.
1018d10910e6SBruce M Simpson  */
1019d10910e6SBruce M Simpson static void
1020d10910e6SBruce M Simpson in_purgemaddrs(struct ifnet *ifp)
1021d10910e6SBruce M Simpson {
1022f3e1324bSStephen Hurd 	struct in_multi_head purgeinms;
1023f3e1324bSStephen Hurd 	struct in_multi		*inm;
1024b6f6f880SMatt Macy 	struct ifmultiaddr	*ifma, *next;
1025d10910e6SBruce M Simpson 
1026f3e1324bSStephen Hurd 	SLIST_INIT(&purgeinms);
1027f3e1324bSStephen Hurd 	IN_MULTI_LIST_LOCK();
1028d10910e6SBruce M Simpson 
1029d10910e6SBruce M Simpson 	/*
1030d10910e6SBruce M Simpson 	 * Extract list of in_multi associated with the detaching ifp
1031d10910e6SBruce M Simpson 	 * which the PF_INET layer is about to release.
1032d10910e6SBruce M Simpson 	 * We need to do this as IF_ADDR_LOCK() may be re-acquired
1033d10910e6SBruce M Simpson 	 * by code further down.
1034d10910e6SBruce M Simpson 	 */
1035b6f6f880SMatt Macy 	IF_ADDR_WLOCK(ifp);
1036b6f6f880SMatt Macy  restart:
1037d7c5a620SMatt Macy 	CK_STAILQ_FOREACH_SAFE(ifma, &ifp->if_multiaddrs, ifma_link, next) {
103856663a40SBruce M Simpson 		if (ifma->ifma_addr->sa_family != AF_INET ||
103956663a40SBruce M Simpson 		    ifma->ifma_protospec == NULL)
1040d10910e6SBruce M Simpson 			continue;
1041d10910e6SBruce M Simpson 		inm = (struct in_multi *)ifma->ifma_protospec;
1042f3e1324bSStephen Hurd 		inm_rele_locked(&purgeinms, inm);
1043b6f6f880SMatt Macy 		if (__predict_false(ifma_restart)) {
1044b6f6f880SMatt Macy 			ifma_restart = true;
1045b6f6f880SMatt Macy 			goto restart;
1046d10910e6SBruce M Simpson 		}
1047b6f6f880SMatt Macy 	}
1048b6f6f880SMatt Macy 	IF_ADDR_WUNLOCK(ifp);
1049d10910e6SBruce M Simpson 
1050f3e1324bSStephen Hurd 	inm_release_list_deferred(&purgeinms);
1051d10910e6SBruce M Simpson 	igmp_ifdetach(ifp);
1052f3e1324bSStephen Hurd 	IN_MULTI_LIST_UNLOCK();
1053d10910e6SBruce M Simpson }
1054d10910e6SBruce M Simpson 
10556e6b3f7cSQing Li struct in_llentry {
10566e6b3f7cSQing Li 	struct llentry		base;
10576e6b3f7cSQing Li };
10586e6b3f7cSQing Li 
105911cdad98SAlexander V. Chernikov #define	IN_LLTBL_DEFAULT_HSIZE	32
106011cdad98SAlexander V. Chernikov #define	IN_LLTBL_HASH(k, h) \
106111cdad98SAlexander V. Chernikov 	(((((((k >> 8) ^ k) >> 8) ^ k) >> 8) ^ k) & ((h) - 1))
106211cdad98SAlexander V. Chernikov 
1063a93cda78SKip Macy /*
106411cdad98SAlexander V. Chernikov  * Do actual deallocation of @lle.
10652769d062SConrad Meyer  */
10662769d062SConrad Meyer static void
10674f6c66ccSMatt Macy in_lltable_destroy_lle_unlocked(epoch_context_t ctx)
10682769d062SConrad Meyer {
10694f6c66ccSMatt Macy 	struct llentry *lle;
10702769d062SConrad Meyer 
10714f6c66ccSMatt Macy 	lle = __containerof(ctx, struct llentry, lle_epoch_ctx);
10722769d062SConrad Meyer 	LLE_LOCK_DESTROY(lle);
10732769d062SConrad Meyer 	LLE_REQ_DESTROY(lle);
10742769d062SConrad Meyer 	free(lle, M_LLTABLE);
10752769d062SConrad Meyer }
10762769d062SConrad Meyer 
10772769d062SConrad Meyer /*
10781435dcd9SAlexander V. Chernikov  * Called by the datapath to indicate that
10791435dcd9SAlexander V. Chernikov  * the entry was used.
10801435dcd9SAlexander V. Chernikov  */
10811435dcd9SAlexander V. Chernikov static void
10821435dcd9SAlexander V. Chernikov in_lltable_mark_used(struct llentry *lle)
10831435dcd9SAlexander V. Chernikov {
10841435dcd9SAlexander V. Chernikov 
10851435dcd9SAlexander V. Chernikov 	LLE_REQ_LOCK(lle);
10861435dcd9SAlexander V. Chernikov 	lle->r_skip_req = 0;
10871435dcd9SAlexander V. Chernikov 	LLE_REQ_UNLOCK(lle);
10881435dcd9SAlexander V. Chernikov }
10891435dcd9SAlexander V. Chernikov 
10901435dcd9SAlexander V. Chernikov /*
109111cdad98SAlexander V. Chernikov  * Called by LLE_FREE_LOCKED when number of references
109211cdad98SAlexander V. Chernikov  * drops to zero.
1093a93cda78SKip Macy  */
1094a93cda78SKip Macy static void
109511cdad98SAlexander V. Chernikov in_lltable_destroy_lle(struct llentry *lle)
1096a93cda78SKip Macy {
109711cdad98SAlexander V. Chernikov 
1098a93cda78SKip Macy 	LLE_WUNLOCK(lle);
10994f6c66ccSMatt Macy 	epoch_call(net_epoch_preempt,  &lle->lle_epoch_ctx, in_lltable_destroy_lle_unlocked);
1100a93cda78SKip Macy }
1101a93cda78SKip Macy 
11026e6b3f7cSQing Li static struct llentry *
1103314294deSAlexander V. Chernikov in_lltable_new(struct in_addr addr4, u_int flags)
11046e6b3f7cSQing Li {
11056e6b3f7cSQing Li 	struct in_llentry *lle;
11066e6b3f7cSQing Li 
110790b357f6SGleb Smirnoff 	lle = malloc(sizeof(struct in_llentry), M_LLTABLE, M_NOWAIT | M_ZERO);
11086e6b3f7cSQing Li 	if (lle == NULL)		/* NB: caller generates msg */
11096e6b3f7cSQing Li 		return NULL;
11106e6b3f7cSQing Li 
11116e6b3f7cSQing Li 	/*
11126e6b3f7cSQing Li 	 * For IPv4 this will trigger "arpresolve" to generate
11136e6b3f7cSQing Li 	 * an ARP request.
11146e6b3f7cSQing Li 	 */
1115a98c06f1SGleb Smirnoff 	lle->base.la_expire = time_uptime; /* mark expired */
1116314294deSAlexander V. Chernikov 	lle->base.r_l3addr.addr4 = addr4;
11176e6b3f7cSQing Li 	lle->base.lle_refcnt = 1;
111811cdad98SAlexander V. Chernikov 	lle->base.lle_free = in_lltable_destroy_lle;
11196e6b3f7cSQing Li 	LLE_LOCK_INIT(&lle->base);
1120f8aee88fSAlexander V. Chernikov 	LLE_REQ_INIT(&lle->base);
11210447c136SAlexander V. Chernikov 	callout_init(&lle->base.lle_timer, 1);
1122ea537929SGleb Smirnoff 
1123ea537929SGleb Smirnoff 	return (&lle->base);
11246e6b3f7cSQing Li }
11256e6b3f7cSQing Li 
1126c9d763bfSQing Li #define IN_ARE_MASKED_ADDR_EQUAL(d, a, m)	(		\
11273e7a2321SAlexander V. Chernikov 	((((d).s_addr ^ (a).s_addr) & (m).s_addr)) == 0 )
1128c9d763bfSQing Li 
112911cdad98SAlexander V. Chernikov static int
11303e7a2321SAlexander V. Chernikov in_lltable_match_prefix(const struct sockaddr *saddr,
11313e7a2321SAlexander V. Chernikov     const struct sockaddr *smask, u_int flags, struct llentry *lle)
1132c9d763bfSQing Li {
11333e7a2321SAlexander V. Chernikov 	struct in_addr addr, mask, lle_addr;
11343e7a2321SAlexander V. Chernikov 
11353e7a2321SAlexander V. Chernikov 	addr = ((const struct sockaddr_in *)saddr)->sin_addr;
11363e7a2321SAlexander V. Chernikov 	mask = ((const struct sockaddr_in *)smask)->sin_addr;
11373e7a2321SAlexander V. Chernikov 	lle_addr.s_addr = ntohl(lle->r_l3addr.addr4.s_addr);
11383e7a2321SAlexander V. Chernikov 
11393e7a2321SAlexander V. Chernikov 	if (IN_ARE_MASKED_ADDR_EQUAL(lle_addr, addr, mask) == 0)
11403e7a2321SAlexander V. Chernikov 		return (0);
11413e7a2321SAlexander V. Chernikov 
11423e7a2321SAlexander V. Chernikov 	if (lle->la_flags & LLE_IFADDR) {
1143c9d763bfSQing Li 
11445b84dc78SQing Li 		/*
11453e7a2321SAlexander V. Chernikov 		 * Delete LLE_IFADDR records IFF address & flag matches.
11463e7a2321SAlexander V. Chernikov 		 * Note that addr is the interface address within prefix
11473e7a2321SAlexander V. Chernikov 		 * being matched.
11483e7a2321SAlexander V. Chernikov 		 * Note also we should handle 'ifdown' cases without removing
11493e7a2321SAlexander V. Chernikov 		 * ifaddr macs.
11505b84dc78SQing Li 		 */
11513e7a2321SAlexander V. Chernikov 		if (addr.s_addr == lle_addr.s_addr && (flags & LLE_STATIC) != 0)
11523e7a2321SAlexander V. Chernikov 			return (1);
11533e7a2321SAlexander V. Chernikov 		return (0);
11543e7a2321SAlexander V. Chernikov 	}
11553e7a2321SAlexander V. Chernikov 
11563e7a2321SAlexander V. Chernikov 	/* flags & LLE_STATIC means deleting both dynamic and static entries */
11573e7a2321SAlexander V. Chernikov 	if ((flags & LLE_STATIC) || !(lle->la_flags & LLE_STATIC))
115811cdad98SAlexander V. Chernikov 		return (1);
115911cdad98SAlexander V. Chernikov 
116011cdad98SAlexander V. Chernikov 	return (0);
116111cdad98SAlexander V. Chernikov }
116211cdad98SAlexander V. Chernikov 
116311cdad98SAlexander V. Chernikov static void
116411cdad98SAlexander V. Chernikov in_lltable_free_entry(struct lltable *llt, struct llentry *lle)
116511cdad98SAlexander V. Chernikov {
116611cdad98SAlexander V. Chernikov 	size_t pkts_dropped;
116711cdad98SAlexander V. Chernikov 
116811cdad98SAlexander V. Chernikov 	LLE_WLOCK_ASSERT(lle);
116911cdad98SAlexander V. Chernikov 	KASSERT(llt != NULL, ("lltable is NULL"));
117011cdad98SAlexander V. Chernikov 
117111cdad98SAlexander V. Chernikov 	/* Unlink entry from table if not already */
117211cdad98SAlexander V. Chernikov 	if ((lle->la_flags & LLE_LINKED) != 0) {
1173f6960e20SMatt Macy 		IF_AFDATA_WLOCK_ASSERT(llt->llt_ifp);
117411cdad98SAlexander V. Chernikov 		lltable_unlink_entry(llt, lle);
117511cdad98SAlexander V. Chernikov 	}
117611cdad98SAlexander V. Chernikov 
117711cdad98SAlexander V. Chernikov 	/* Drop hold queue */
1178e162ea60SGeorge V. Neville-Neil 	pkts_dropped = llentry_free(lle);
1179e162ea60SGeorge V. Neville-Neil 	ARPSTAT_ADD(dropped, pkts_dropped);
1180c9d763bfSQing Li }
1181c9d763bfSQing Li 
11826e6b3f7cSQing Li static int
1183c7ab6602SQing Li in_lltable_rtcheck(struct ifnet *ifp, u_int flags, const struct sockaddr *l3addr)
11846e6b3f7cSQing Li {
11859a1b64d5SAlexander V. Chernikov 	struct rt_addrinfo info;
11869a1b64d5SAlexander V. Chernikov 	struct sockaddr_in rt_key, rt_mask;
11879a1b64d5SAlexander V. Chernikov 	struct sockaddr rt_gateway;
11889a1b64d5SAlexander V. Chernikov 	int rt_flags;
11896e6b3f7cSQing Li 
11906e6b3f7cSQing Li 	KASSERT(l3addr->sa_family == AF_INET,
11916e6b3f7cSQing Li 	    ("sin_family %d", l3addr->sa_family));
11926e6b3f7cSQing Li 
11939a1b64d5SAlexander V. Chernikov 	bzero(&rt_key, sizeof(rt_key));
11949a1b64d5SAlexander V. Chernikov 	rt_key.sin_len = sizeof(rt_key);
11959a1b64d5SAlexander V. Chernikov 	bzero(&rt_mask, sizeof(rt_mask));
11969a1b64d5SAlexander V. Chernikov 	rt_mask.sin_len = sizeof(rt_mask);
11979a1b64d5SAlexander V. Chernikov 	bzero(&rt_gateway, sizeof(rt_gateway));
11989a1b64d5SAlexander V. Chernikov 	rt_gateway.sa_len = sizeof(rt_gateway);
119913e255faSMarko Zec 
12009a1b64d5SAlexander V. Chernikov 	bzero(&info, sizeof(info));
12019a1b64d5SAlexander V. Chernikov 	info.rti_info[RTAX_DST] = (struct sockaddr *)&rt_key;
12029a1b64d5SAlexander V. Chernikov 	info.rti_info[RTAX_NETMASK] = (struct sockaddr *)&rt_mask;
12039a1b64d5SAlexander V. Chernikov 	info.rti_info[RTAX_GATEWAY] = (struct sockaddr *)&rt_gateway;
12049a1b64d5SAlexander V. Chernikov 
12059a1b64d5SAlexander V. Chernikov 	if (rib_lookup_info(ifp->if_fib, l3addr, NHR_REF, 0, &info) != 0)
12066cf8e330SQing Li 		return (EINVAL);
12076cf8e330SQing Li 
12089a1b64d5SAlexander V. Chernikov 	rt_flags = info.rti_flags;
12099a1b64d5SAlexander V. Chernikov 
121013e255faSMarko Zec 	/*
121113e255faSMarko Zec 	 * If the gateway for an existing host route matches the target L3
12126cf8e330SQing Li 	 * address, which is a special route inserted by some implementation
12136cf8e330SQing Li 	 * such as MANET, and the interface is of the correct type, then
12146cf8e330SQing Li 	 * allow for ARP to proceed.
121513e255faSMarko Zec 	 */
12169a1b64d5SAlexander V. Chernikov 	if (rt_flags & RTF_GATEWAY) {
12179a1b64d5SAlexander V. Chernikov 		if (!(rt_flags & RTF_HOST) || !info.rti_ifp ||
12189a1b64d5SAlexander V. Chernikov 		    info.rti_ifp->if_type != IFT_ETHER ||
12199a1b64d5SAlexander V. Chernikov 		    (info.rti_ifp->if_flags & (IFF_NOARP | IFF_STATICARP)) != 0 ||
12209a1b64d5SAlexander V. Chernikov 		    memcmp(rt_gateway.sa_data, l3addr->sa_data,
122115d25219SQing Li 		    sizeof(in_addr_t)) != 0) {
12229a1b64d5SAlexander V. Chernikov 			rib_free_info(&info);
1223db92413eSQing Li 			return (EINVAL);
1224db92413eSQing Li 		}
122515d25219SQing Li 	}
12269a1b64d5SAlexander V. Chernikov 	rib_free_info(&info);
1227db92413eSQing Li 
1228db92413eSQing Li 	/*
1229db92413eSQing Li 	 * Make sure that at least the destination address is covered
1230db92413eSQing Li 	 * by the route. This is for handling the case where 2 or more
1231db92413eSQing Li 	 * interfaces have the same prefix. An incoming packet arrives
1232db92413eSQing Li 	 * on one interface and the corresponding outgoing packet leaves
1233db92413eSQing Li 	 * another interface.
1234db92413eSQing Li 	 */
12359a1b64d5SAlexander V. Chernikov 	if (!(rt_flags & RTF_HOST) && info.rti_ifp != ifp) {
123615d25219SQing Li 		const char *sa, *mask, *addr, *lim;
12378144690aSEric van Gyzen 		const struct sockaddr_in *l3sin;
1238db92413eSQing Li 
12399a1b64d5SAlexander V. Chernikov 		mask = (const char *)&rt_mask;
1240b3664a14SQing Li 		/*
1241b3664a14SQing Li 		 * Just being extra cautious to avoid some custom
1242b3664a14SQing Li 		 * code getting into trouble.
1243b3664a14SQing Li 		 */
12449a1b64d5SAlexander V. Chernikov 		if ((info.rti_addrs & RTA_NETMASK) == 0)
1245b3664a14SQing Li 			return (EINVAL);
1246b3664a14SQing Li 
12479a1b64d5SAlexander V. Chernikov 		sa = (const char *)&rt_key;
124815d25219SQing Li 		addr = (const char *)l3addr;
12498144690aSEric van Gyzen 		l3sin = (const struct sockaddr_in *)l3addr;
12508144690aSEric van Gyzen 		lim = addr + l3sin->sin_len;
1251db92413eSQing Li 
1252db92413eSQing Li 		for ( ; addr < lim; sa++, mask++, addr++) {
1253db92413eSQing Li 			if ((*sa ^ *addr) & *mask) {
12546cb2b4e7SQing Li #ifdef DIAGNOSTIC
12558144690aSEric van Gyzen 				char addrbuf[INET_ADDRSTRLEN];
12568144690aSEric van Gyzen 
12578144690aSEric van Gyzen 				log(LOG_INFO, "IPv4 address: \"%s\" "
12588144690aSEric van Gyzen 				    "is not on the network\n",
12598144690aSEric van Gyzen 				    inet_ntoa_r(l3sin->sin_addr, addrbuf));
1260b4a22c36SQing Li #endif
126115d25219SQing Li 				return (EINVAL);
12626e6b3f7cSQing Li 			}
1263db92413eSQing Li 		}
1264db92413eSQing Li 	}
1265db92413eSQing Li 
126615d25219SQing Li 	return (0);
12676e6b3f7cSQing Li }
12686e6b3f7cSQing Li 
126911cdad98SAlexander V. Chernikov static inline uint32_t
127011cdad98SAlexander V. Chernikov in_lltable_hash_dst(const struct in_addr dst, uint32_t hsize)
127111cdad98SAlexander V. Chernikov {
127211cdad98SAlexander V. Chernikov 
127311cdad98SAlexander V. Chernikov 	return (IN_LLTBL_HASH(dst.s_addr, hsize));
127411cdad98SAlexander V. Chernikov }
127511cdad98SAlexander V. Chernikov 
127611cdad98SAlexander V. Chernikov static uint32_t
127711cdad98SAlexander V. Chernikov in_lltable_hash(const struct llentry *lle, uint32_t hsize)
127811cdad98SAlexander V. Chernikov {
127911cdad98SAlexander V. Chernikov 
1280314294deSAlexander V. Chernikov 	return (in_lltable_hash_dst(lle->r_l3addr.addr4, hsize));
128111cdad98SAlexander V. Chernikov }
128211cdad98SAlexander V. Chernikov 
128311cdad98SAlexander V. Chernikov static void
128411cdad98SAlexander V. Chernikov in_lltable_fill_sa_entry(const struct llentry *lle, struct sockaddr *sa)
128511cdad98SAlexander V. Chernikov {
128611cdad98SAlexander V. Chernikov 	struct sockaddr_in *sin;
128711cdad98SAlexander V. Chernikov 
128811cdad98SAlexander V. Chernikov 	sin = (struct sockaddr_in *)sa;
128911cdad98SAlexander V. Chernikov 	bzero(sin, sizeof(*sin));
129011cdad98SAlexander V. Chernikov 	sin->sin_family = AF_INET;
129111cdad98SAlexander V. Chernikov 	sin->sin_len = sizeof(*sin);
1292314294deSAlexander V. Chernikov 	sin->sin_addr = lle->r_l3addr.addr4;
129311cdad98SAlexander V. Chernikov }
129411cdad98SAlexander V. Chernikov 
1295b4b1367aSAlexander V. Chernikov static inline struct llentry *
1296b4b1367aSAlexander V. Chernikov in_lltable_find_dst(struct lltable *llt, struct in_addr dst)
1297b4b1367aSAlexander V. Chernikov {
1298b4b1367aSAlexander V. Chernikov 	struct llentry *lle;
1299b4b1367aSAlexander V. Chernikov 	struct llentries *lleh;
130011cdad98SAlexander V. Chernikov 	u_int hashidx;
1301b4b1367aSAlexander V. Chernikov 
13023a749863SAlexander V. Chernikov 	hashidx = in_lltable_hash_dst(dst, llt->llt_hsize);
130311cdad98SAlexander V. Chernikov 	lleh = &llt->lle_head[hashidx];
13044f6c66ccSMatt Macy 	CK_LIST_FOREACH(lle, lleh, lle_next) {
1305b4b1367aSAlexander V. Chernikov 		if (lle->la_flags & LLE_DELETED)
1306b4b1367aSAlexander V. Chernikov 			continue;
1307314294deSAlexander V. Chernikov 		if (lle->r_l3addr.addr4.s_addr == dst.s_addr)
1308b4b1367aSAlexander V. Chernikov 			break;
1309b4b1367aSAlexander V. Chernikov 	}
1310b4b1367aSAlexander V. Chernikov 
1311b4b1367aSAlexander V. Chernikov 	return (lle);
1312b4b1367aSAlexander V. Chernikov }
1313b4b1367aSAlexander V. Chernikov 
13143e7a2321SAlexander V. Chernikov static void
13153e7a2321SAlexander V. Chernikov in_lltable_delete_entry(struct lltable *llt, struct llentry *lle)
1316b4b1367aSAlexander V. Chernikov {
1317b4b1367aSAlexander V. Chernikov 
1318b4b1367aSAlexander V. Chernikov 	lle->la_flags |= LLE_DELETED;
1319b4b1367aSAlexander V. Chernikov 	EVENTHANDLER_INVOKE(lle_event, lle, LLENTRY_DELETED);
1320b4b1367aSAlexander V. Chernikov #ifdef DIAGNOSTIC
1321b4b1367aSAlexander V. Chernikov 	log(LOG_INFO, "ifaddr cache = %p is deleted\n", lle);
1322b4b1367aSAlexander V. Chernikov #endif
1323b4b1367aSAlexander V. Chernikov 	llentry_free(lle);
1324b4b1367aSAlexander V. Chernikov }
1325b4b1367aSAlexander V. Chernikov 
1326b4b1367aSAlexander V. Chernikov static struct llentry *
13275a255516SAlexander V. Chernikov in_lltable_alloc(struct lltable *llt, u_int flags, const struct sockaddr *l3addr)
1328b4b1367aSAlexander V. Chernikov {
1329b4b1367aSAlexander V. Chernikov 	const struct sockaddr_in *sin = (const struct sockaddr_in *)l3addr;
1330b4b1367aSAlexander V. Chernikov 	struct ifnet *ifp = llt->llt_ifp;
1331b4b1367aSAlexander V. Chernikov 	struct llentry *lle;
13324fb3a820SAlexander V. Chernikov 	char linkhdr[LLE_MAX_LINKHDR];
13334fb3a820SAlexander V. Chernikov 	size_t linkhdrsize;
13344fb3a820SAlexander V. Chernikov 	int lladdr_off;
1335b4b1367aSAlexander V. Chernikov 
1336b4b1367aSAlexander V. Chernikov 	KASSERT(l3addr->sa_family == AF_INET,
1337b4b1367aSAlexander V. Chernikov 	    ("sin_family %d", l3addr->sa_family));
1338b4b1367aSAlexander V. Chernikov 
1339b4b1367aSAlexander V. Chernikov 	/*
1340b4b1367aSAlexander V. Chernikov 	 * A route that covers the given address must have
1341b4b1367aSAlexander V. Chernikov 	 * been installed 1st because we are doing a resolution,
1342b4b1367aSAlexander V. Chernikov 	 * verify this.
1343b4b1367aSAlexander V. Chernikov 	 */
1344b4b1367aSAlexander V. Chernikov 	if (!(flags & LLE_IFADDR) &&
1345b4b1367aSAlexander V. Chernikov 	    in_lltable_rtcheck(ifp, flags, l3addr) != 0)
1346b4b1367aSAlexander V. Chernikov 		return (NULL);
1347b4b1367aSAlexander V. Chernikov 
1348314294deSAlexander V. Chernikov 	lle = in_lltable_new(sin->sin_addr, flags);
1349b4b1367aSAlexander V. Chernikov 	if (lle == NULL) {
1350b4b1367aSAlexander V. Chernikov 		log(LOG_INFO, "lla_lookup: new lle malloc failed\n");
1351b4b1367aSAlexander V. Chernikov 		return (NULL);
1352b4b1367aSAlexander V. Chernikov 	}
1353b4b1367aSAlexander V. Chernikov 	lle->la_flags = flags;
1354f8aee88fSAlexander V. Chernikov 	if (flags & LLE_STATIC)
1355f8aee88fSAlexander V. Chernikov 		lle->r_flags |= RLLE_VALID;
1356b4b1367aSAlexander V. Chernikov 	if ((flags & LLE_IFADDR) == LLE_IFADDR) {
13574fb3a820SAlexander V. Chernikov 		linkhdrsize = LLE_MAX_LINKHDR;
13584fb3a820SAlexander V. Chernikov 		if (lltable_calc_llheader(ifp, AF_INET, IF_LLADDR(ifp),
13592769d062SConrad Meyer 		    linkhdr, &linkhdrsize, &lladdr_off) != 0) {
13604f6c66ccSMatt Macy 			epoch_call(net_epoch_preempt,  &lle->lle_epoch_ctx, in_lltable_destroy_lle_unlocked);
13614fb3a820SAlexander V. Chernikov 			return (NULL);
13622769d062SConrad Meyer 		}
13634fb3a820SAlexander V. Chernikov 		lltable_set_entry_addr(ifp, lle, linkhdr, linkhdrsize,
13644fb3a820SAlexander V. Chernikov 		    lladdr_off);
1365ddd208f7SAlexander V. Chernikov 		lle->la_flags |= LLE_STATIC;
1366f8aee88fSAlexander V. Chernikov 		lle->r_flags |= (RLLE_VALID | RLLE_IFADDR);
1367b4b1367aSAlexander V. Chernikov 	}
1368b4b1367aSAlexander V. Chernikov 
1369b4b1367aSAlexander V. Chernikov 	return (lle);
1370b4b1367aSAlexander V. Chernikov }
1371b4b1367aSAlexander V. Chernikov 
13726e6b3f7cSQing Li /*
13736e6b3f7cSQing Li  * Return NULL if not found or marked for deletion.
13746e6b3f7cSQing Li  * If found return lle read locked.
13756e6b3f7cSQing Li  */
13766e6b3f7cSQing Li static struct llentry *
13776e6b3f7cSQing Li in_lltable_lookup(struct lltable *llt, u_int flags, const struct sockaddr *l3addr)
13786e6b3f7cSQing Li {
13796e6b3f7cSQing Li 	const struct sockaddr_in *sin = (const struct sockaddr_in *)l3addr;
13806e6b3f7cSQing Li 	struct llentry *lle;
13816e6b3f7cSQing Li 
13826e4cd746SMarius Strobl 	IF_AFDATA_LOCK_ASSERT(llt->llt_ifp);
13836e6b3f7cSQing Li 	KASSERT(l3addr->sa_family == AF_INET,
13846e6b3f7cSQing Li 	    ("sin_family %d", l3addr->sa_family));
138511cdad98SAlexander V. Chernikov 	lle = in_lltable_find_dst(llt, sin->sin_addr);
1386b4b1367aSAlexander V. Chernikov 
1387b4b1367aSAlexander V. Chernikov 	if (lle == NULL)
13886e6b3f7cSQing Li 		return (NULL);
13896e6b3f7cSQing Li 
1390f8aee88fSAlexander V. Chernikov 	KASSERT((flags & (LLE_UNLOCKED|LLE_EXCLUSIVE)) !=
1391f8aee88fSAlexander V. Chernikov 	    (LLE_UNLOCKED|LLE_EXCLUSIVE),("wrong lle request flags: 0x%X",
1392f8aee88fSAlexander V. Chernikov 	    flags));
1393f8aee88fSAlexander V. Chernikov 
1394f8aee88fSAlexander V. Chernikov 	if (flags & LLE_UNLOCKED)
1395f8aee88fSAlexander V. Chernikov 		return (lle);
1396f8aee88fSAlexander V. Chernikov 
13976e6b3f7cSQing Li 	if (flags & LLE_EXCLUSIVE)
13986e6b3f7cSQing Li 		LLE_WLOCK(lle);
13996e6b3f7cSQing Li 	else
14006e6b3f7cSQing Li 		LLE_RLOCK(lle);
1401b4b1367aSAlexander V. Chernikov 
1402*c06cc56eSMark Johnston 	/*
1403*c06cc56eSMark Johnston 	 * If the afdata lock is not held, the LLE may have been unlinked while
1404*c06cc56eSMark Johnston 	 * we were blocked on the LLE lock.  Check for this case.
1405*c06cc56eSMark Johnston 	 */
1406*c06cc56eSMark Johnston 	if (__predict_false((lle->la_flags & LLE_LINKED) == 0)) {
1407*c06cc56eSMark Johnston 		if (flags & LLE_EXCLUSIVE)
1408*c06cc56eSMark Johnston 			LLE_WUNLOCK(lle);
1409*c06cc56eSMark Johnston 		else
1410*c06cc56eSMark Johnston 			LLE_RUNLOCK(lle);
1411*c06cc56eSMark Johnston 		return (NULL);
1412*c06cc56eSMark Johnston 	}
14136e6b3f7cSQing Li 	return (lle);
14146e6b3f7cSQing Li }
14156e6b3f7cSQing Li 
14166e6b3f7cSQing Li static int
141711cdad98SAlexander V. Chernikov in_lltable_dump_entry(struct lltable *llt, struct llentry *lle,
141811cdad98SAlexander V. Chernikov     struct sysctl_req *wr)
14196e6b3f7cSQing Li {
14206e6b3f7cSQing Li 	struct ifnet *ifp = llt->llt_ifp;
14216e6b3f7cSQing Li 	/* XXX stack use */
14226e6b3f7cSQing Li 	struct {
14236e6b3f7cSQing Li 		struct rt_msghdr	rtm;
14249711a168SGleb Smirnoff 		struct sockaddr_in	sin;
14256e6b3f7cSQing Li 		struct sockaddr_dl	sdl;
14266e6b3f7cSQing Li 	} arpc;
14276e6b3f7cSQing Li 	struct sockaddr_dl *sdl;
142811cdad98SAlexander V. Chernikov 	int error;
14296e6b3f7cSQing Li 
143011cdad98SAlexander V. Chernikov 	bzero(&arpc, sizeof(arpc));
14316e6b3f7cSQing Li 	/* skip deleted entries */
143293704ac5SQing Li 	if ((lle->la_flags & LLE_DELETED) == LLE_DELETED)
143311cdad98SAlexander V. Chernikov 		return (0);
1434813dd6aeSBjoern A. Zeeb 	/* Skip if jailed and not a valid IP of the prison. */
143511cdad98SAlexander V. Chernikov 	lltable_fill_sa_entry(lle,(struct sockaddr *)&arpc.sin);
1436514ef08cSBrooks Davis 	if (prison_if(wr->td->td_ucred, (struct sockaddr *)&arpc.sin) != 0)
143711cdad98SAlexander V. Chernikov 		return (0);
14386e6b3f7cSQing Li 	/*
14396e6b3f7cSQing Li 	 * produce a msg made of:
14406e6b3f7cSQing Li 	 *  struct rt_msghdr;
14419711a168SGleb Smirnoff 	 *  struct sockaddr_in; (IPv4)
14426e6b3f7cSQing Li 	 *  struct sockaddr_dl;
14436e6b3f7cSQing Li 	 */
14446e6b3f7cSQing Li 	arpc.rtm.rtm_msglen = sizeof(arpc);
1445c0e9a8a1SHartmut Brandt 	arpc.rtm.rtm_version = RTM_VERSION;
1446c0e9a8a1SHartmut Brandt 	arpc.rtm.rtm_type = RTM_GET;
1447c0e9a8a1SHartmut Brandt 	arpc.rtm.rtm_flags = RTF_UP;
1448c0e9a8a1SHartmut Brandt 	arpc.rtm.rtm_addrs = RTA_DST | RTA_GATEWAY;
14496e6b3f7cSQing Li 
14506e6b3f7cSQing Li 	/* publish */
14519711a168SGleb Smirnoff 	if (lle->la_flags & LLE_PUB)
14526e6b3f7cSQing Li 		arpc.rtm.rtm_flags |= RTF_ANNOUNCE;
14536e6b3f7cSQing Li 
14546e6b3f7cSQing Li 	sdl = &arpc.sdl;
14556e6b3f7cSQing Li 	sdl->sdl_family = AF_LINK;
14566e6b3f7cSQing Li 	sdl->sdl_len = sizeof(*sdl);
14576e6b3f7cSQing Li 	sdl->sdl_index = ifp->if_index;
14586e6b3f7cSQing Li 	sdl->sdl_type = ifp->if_type;
145993704ac5SQing Li 	if ((lle->la_flags & LLE_VALID) == LLE_VALID) {
146093704ac5SQing Li 		sdl->sdl_alen = ifp->if_addrlen;
14614fb3a820SAlexander V. Chernikov 		bcopy(lle->ll_addr, LLADDR(sdl), ifp->if_addrlen);
146293704ac5SQing Li 	} else {
146393704ac5SQing Li 		sdl->sdl_alen = 0;
146493704ac5SQing Li 		bzero(LLADDR(sdl), ifp->if_addrlen);
146593704ac5SQing Li 	}
14666e6b3f7cSQing Li 
14676e6b3f7cSQing Li 	arpc.rtm.rtm_rmx.rmx_expire =
14686e6b3f7cSQing Li 	    lle->la_flags & LLE_STATIC ? 0 : lle->la_expire;
14698eca593cSQing Li 	arpc.rtm.rtm_flags |= (RTF_HOST | RTF_LLDATA);
14706e6b3f7cSQing Li 	if (lle->la_flags & LLE_STATIC)
14716e6b3f7cSQing Li 		arpc.rtm.rtm_flags |= RTF_STATIC;
14724a336ef4SAlexander V. Chernikov 	if (lle->la_flags & LLE_IFADDR)
14734a336ef4SAlexander V. Chernikov 		arpc.rtm.rtm_flags |= RTF_PINNED;
14746e6b3f7cSQing Li 	arpc.rtm.rtm_index = ifp->if_index;
14756e6b3f7cSQing Li 	error = SYSCTL_OUT(wr, &arpc, sizeof(arpc));
147611cdad98SAlexander V. Chernikov 
147711cdad98SAlexander V. Chernikov 	return (error);
14786e6b3f7cSQing Li }
14796e6b3f7cSQing Li 
14803a749863SAlexander V. Chernikov static struct lltable *
14813a749863SAlexander V. Chernikov in_lltattach(struct ifnet *ifp)
14826e6b3f7cSQing Li {
1483d10910e6SBruce M Simpson 	struct lltable *llt;
14846e6b3f7cSQing Li 
14853a749863SAlexander V. Chernikov 	llt = lltable_allocate_htbl(IN_LLTBL_DEFAULT_HSIZE);
1486721cd2e0SAlexander V. Chernikov  	llt->llt_af = AF_INET;
1487721cd2e0SAlexander V. Chernikov  	llt->llt_ifp = ifp;
1488d10910e6SBruce M Simpson 
14896e6b3f7cSQing Li 	llt->llt_lookup = in_lltable_lookup;
14905a255516SAlexander V. Chernikov 	llt->llt_alloc_entry = in_lltable_alloc;
14913e7a2321SAlexander V. Chernikov 	llt->llt_delete_entry = in_lltable_delete_entry;
149211cdad98SAlexander V. Chernikov 	llt->llt_dump_entry = in_lltable_dump_entry;
149311cdad98SAlexander V. Chernikov 	llt->llt_hash = in_lltable_hash;
149411cdad98SAlexander V. Chernikov 	llt->llt_fill_sa_entry = in_lltable_fill_sa_entry;
149511cdad98SAlexander V. Chernikov 	llt->llt_free_entry = in_lltable_free_entry;
149611cdad98SAlexander V. Chernikov 	llt->llt_match_prefix = in_lltable_match_prefix;
14971435dcd9SAlexander V. Chernikov 	llt->llt_mark_used = in_lltable_mark_used;
1498721cd2e0SAlexander V. Chernikov  	lltable_link(llt);
1499d10910e6SBruce M Simpson 
15003a749863SAlexander V. Chernikov 	return (llt);
15013a749863SAlexander V. Chernikov }
15023a749863SAlexander V. Chernikov 
15033a749863SAlexander V. Chernikov void *
15043a749863SAlexander V. Chernikov in_domifattach(struct ifnet *ifp)
15053a749863SAlexander V. Chernikov {
15063a749863SAlexander V. Chernikov 	struct in_ifinfo *ii;
15073a749863SAlexander V. Chernikov 
1508721cd2e0SAlexander V. Chernikov 	ii = malloc(sizeof(struct in_ifinfo), M_IFADDR, M_WAITOK|M_ZERO);
150941cb42a6SAlexander V. Chernikov 
15103a749863SAlexander V. Chernikov 	ii->ii_llt = in_lltattach(ifp);
1511d10910e6SBruce M Simpson 	ii->ii_igmp = igmp_domifattach(ifp);
1512d10910e6SBruce M Simpson 
151341cb42a6SAlexander V. Chernikov 	return (ii);
15146e6b3f7cSQing Li }
15156e6b3f7cSQing Li 
15166e6b3f7cSQing Li void
1517d10910e6SBruce M Simpson in_domifdetach(struct ifnet *ifp, void *aux)
15186e6b3f7cSQing Li {
1519d10910e6SBruce M Simpson 	struct in_ifinfo *ii = (struct in_ifinfo *)aux;
15206e6b3f7cSQing Li 
1521d10910e6SBruce M Simpson 	igmp_domifdetach(ifp);
1522d10910e6SBruce M Simpson 	lltable_free(ii->ii_llt);
1523d10910e6SBruce M Simpson 	free(ii, M_IFADDR);
15246e6b3f7cSQing Li }
1525