xref: /freebsd/sys/netinet/ip_carp.c (revision d38c30c092828f4882ce13b08d0bd3fd6dc7afb5)
1 /*-
2  * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
3  *
4  * Copyright (c) 2002 Michael Shalayeff.
5  * Copyright (c) 2003 Ryan McBride.
6  * Copyright (c) 2011 Gleb Smirnoff <glebius@FreeBSD.org>
7  * All rights reserved.
8  *
9  * Redistribution and use in source and binary forms, with or without
10  * modification, are permitted provided that the following conditions
11  * are met:
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer.
14  * 2. Redistributions in binary form must reproduce the above copyright
15  *    notice, this list of conditions and the following disclaimer in the
16  *    documentation and/or other materials provided with the distribution.
17  *
18  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
19  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
20  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
21  * IN NO EVENT SHALL THE AUTHOR OR HIS RELATIVES BE LIABLE FOR ANY DIRECT,
22  * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
23  * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
24  * SERVICES; LOSS OF MIND, USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
26  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
27  * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
28  * THE POSSIBILITY OF SUCH DAMAGE.
29  */
30 
31 #include <sys/cdefs.h>
32 __FBSDID("$FreeBSD$");
33 
34 #include "opt_bpf.h"
35 #include "opt_inet.h"
36 #include "opt_inet6.h"
37 
38 #include <sys/param.h>
39 #include <sys/systm.h>
40 #include <sys/bus.h>
41 #include <sys/jail.h>
42 #include <sys/kernel.h>
43 #include <sys/limits.h>
44 #include <sys/malloc.h>
45 #include <sys/mbuf.h>
46 #include <sys/module.h>
47 #include <sys/priv.h>
48 #include <sys/proc.h>
49 #include <sys/protosw.h>
50 #include <sys/socket.h>
51 #include <sys/sockio.h>
52 #include <sys/sysctl.h>
53 #include <sys/syslog.h>
54 #include <sys/taskqueue.h>
55 #include <sys/counter.h>
56 
57 #include <net/ethernet.h>
58 #include <net/if.h>
59 #include <net/if_var.h>
60 #include <net/if_dl.h>
61 #include <net/if_llatbl.h>
62 #include <net/if_types.h>
63 #include <net/route.h>
64 #include <net/vnet.h>
65 
66 #if defined(INET) || defined(INET6)
67 #include <netinet/in.h>
68 #include <netinet/in_var.h>
69 #include <netinet/ip_carp.h>
70 #include <netinet/ip.h>
71 #include <machine/in_cksum.h>
72 #endif
73 #ifdef INET
74 #include <netinet/ip_var.h>
75 #include <netinet/if_ether.h>
76 #endif
77 
78 #ifdef INET6
79 #include <netinet/icmp6.h>
80 #include <netinet/ip6.h>
81 #include <netinet6/in6_var.h>
82 #include <netinet6/ip6_var.h>
83 #include <netinet6/scope6_var.h>
84 #include <netinet6/nd6.h>
85 #endif
86 
87 #include <crypto/sha1.h>
88 
89 static MALLOC_DEFINE(M_CARP, "CARP", "CARP addresses");
90 
91 struct carp_softc {
92 	struct ifnet		*sc_carpdev;	/* Pointer to parent ifnet. */
93 	struct ifaddr		**sc_ifas;	/* Our ifaddrs. */
94 	struct sockaddr_dl	sc_addr;	/* Our link level address. */
95 	struct callout		sc_ad_tmo;	/* Advertising timeout. */
96 #ifdef INET
97 	struct callout		sc_md_tmo;	/* Master down timeout. */
98 #endif
99 #ifdef INET6
100 	struct callout 		sc_md6_tmo;	/* XXX: Master down timeout. */
101 #endif
102 	struct mtx		sc_mtx;
103 
104 	int			sc_vhid;
105 	int			sc_advskew;
106 	int			sc_advbase;
107 
108 	int			sc_naddrs;
109 	int			sc_naddrs6;
110 	int			sc_ifasiz;
111 	enum { INIT = 0, BACKUP, MASTER }	sc_state;
112 	int			sc_suppress;
113 	int			sc_sendad_errors;
114 #define	CARP_SENDAD_MAX_ERRORS	3
115 	int			sc_sendad_success;
116 #define	CARP_SENDAD_MIN_SUCCESS 3
117 
118 	int			sc_init_counter;
119 	uint64_t		sc_counter;
120 
121 	/* authentication */
122 #define	CARP_HMAC_PAD	64
123 	unsigned char sc_key[CARP_KEY_LEN];
124 	unsigned char sc_pad[CARP_HMAC_PAD];
125 	SHA1_CTX sc_sha1;
126 
127 	TAILQ_ENTRY(carp_softc)	sc_list;	/* On the carp_if list. */
128 	LIST_ENTRY(carp_softc)	sc_next;	/* On the global list. */
129 };
130 
131 struct carp_if {
132 #ifdef INET
133 	int	cif_naddrs;
134 #endif
135 #ifdef INET6
136 	int	cif_naddrs6;
137 #endif
138 	TAILQ_HEAD(, carp_softc) cif_vrs;
139 #ifdef INET
140 	struct ip_moptions 	 cif_imo;
141 #endif
142 #ifdef INET6
143 	struct ip6_moptions 	 cif_im6o;
144 #endif
145 	struct ifnet	*cif_ifp;
146 	struct mtx	cif_mtx;
147 	uint32_t	cif_flags;
148 #define	CIF_PROMISC	0x00000001
149 };
150 
151 #define	CARP_INET	0
152 #define	CARP_INET6	1
153 static int proto_reg[] = {-1, -1};
154 
155 /*
156  * Brief design of carp(4).
157  *
158  * Any carp-capable ifnet may have a list of carp softcs hanging off
159  * its ifp->if_carp pointer. Each softc represents one unique virtual
160  * host id, or vhid. The softc has a back pointer to the ifnet. All
161  * softcs are joined in a global list, which has quite limited use.
162  *
163  * Any interface address that takes part in CARP negotiation has a
164  * pointer to the softc of its vhid, ifa->ifa_carp. That could be either
165  * AF_INET or AF_INET6 address.
166  *
167  * Although, one can get the softc's backpointer to ifnet and traverse
168  * through its ifp->if_addrhead queue to find all interface addresses
169  * involved in CARP, we keep a growable array of ifaddr pointers. This
170  * allows us to avoid grabbing the IF_ADDR_LOCK() in many traversals that
171  * do calls into the network stack, thus avoiding LORs.
172  *
173  * Locking:
174  *
175  * Each softc has a lock sc_mtx. It is used to synchronise carp_input_c(),
176  * callout-driven events and ioctl()s.
177  *
178  * To traverse the list of softcs on an ifnet we use CIF_LOCK() or carp_sx.
179  * To traverse the global list we use the mutex carp_mtx.
180  *
181  * Known issues with locking:
182  *
183  * - Sending ad, we put the pointer to the softc in an mtag, and no reference
184  *   counting is done on the softc.
185  * - On module unload we may race (?) with packet processing thread
186  *   dereferencing our function pointers.
187  */
188 
189 /* Accept incoming CARP packets. */
190 VNET_DEFINE_STATIC(int, carp_allow) = 1;
191 #define	V_carp_allow	VNET(carp_allow)
192 
193 /* Set DSCP in outgoing CARP packets. */
194 VNET_DEFINE_STATIC(int, carp_dscp) = 56;
195 #define	V_carp_dscp	VNET(carp_dscp)
196 
197 /* Preempt slower nodes. */
198 VNET_DEFINE_STATIC(int, carp_preempt) = 0;
199 #define	V_carp_preempt	VNET(carp_preempt)
200 
201 /* Log level. */
202 VNET_DEFINE_STATIC(int, carp_log) = 1;
203 #define	V_carp_log	VNET(carp_log)
204 
205 /* Global advskew demotion. */
206 VNET_DEFINE_STATIC(int, carp_demotion) = 0;
207 #define	V_carp_demotion	VNET(carp_demotion)
208 
209 /* Send error demotion factor. */
210 VNET_DEFINE_STATIC(int, carp_senderr_adj) = CARP_MAXSKEW;
211 #define	V_carp_senderr_adj	VNET(carp_senderr_adj)
212 
213 /* Iface down demotion factor. */
214 VNET_DEFINE_STATIC(int, carp_ifdown_adj) = CARP_MAXSKEW;
215 #define	V_carp_ifdown_adj	VNET(carp_ifdown_adj)
216 
217 static int carp_allow_sysctl(SYSCTL_HANDLER_ARGS);
218 static int carp_dscp_sysctl(SYSCTL_HANDLER_ARGS);
219 static int carp_demote_adj_sysctl(SYSCTL_HANDLER_ARGS);
220 
221 SYSCTL_NODE(_net_inet, IPPROTO_CARP,	carp,	CTLFLAG_RW, 0,	"CARP");
222 SYSCTL_PROC(_net_inet_carp, OID_AUTO, allow,
223     CTLFLAG_VNET | CTLTYPE_INT | CTLFLAG_RW, 0, 0, carp_allow_sysctl, "I",
224     "Accept incoming CARP packets");
225 SYSCTL_PROC(_net_inet_carp, OID_AUTO, dscp,
226     CTLFLAG_VNET | CTLTYPE_INT | CTLFLAG_RW, 0, 0, carp_dscp_sysctl, "I",
227     "DSCP value for carp packets");
228 SYSCTL_INT(_net_inet_carp, OID_AUTO, preempt, CTLFLAG_VNET | CTLFLAG_RW,
229     &VNET_NAME(carp_preempt), 0, "High-priority backup preemption mode");
230 SYSCTL_INT(_net_inet_carp, OID_AUTO, log, CTLFLAG_VNET | CTLFLAG_RW,
231     &VNET_NAME(carp_log), 0, "CARP log level");
232 SYSCTL_PROC(_net_inet_carp, OID_AUTO, demotion,
233     CTLFLAG_VNET | CTLTYPE_INT | CTLFLAG_RW,
234     0, 0, carp_demote_adj_sysctl, "I",
235     "Adjust demotion factor (skew of advskew)");
236 SYSCTL_INT(_net_inet_carp, OID_AUTO, senderr_demotion_factor,
237     CTLFLAG_VNET | CTLFLAG_RW,
238     &VNET_NAME(carp_senderr_adj), 0, "Send error demotion factor adjustment");
239 SYSCTL_INT(_net_inet_carp, OID_AUTO, ifdown_demotion_factor,
240     CTLFLAG_VNET | CTLFLAG_RW,
241     &VNET_NAME(carp_ifdown_adj), 0,
242     "Interface down demotion factor adjustment");
243 
244 VNET_PCPUSTAT_DEFINE(struct carpstats, carpstats);
245 VNET_PCPUSTAT_SYSINIT(carpstats);
246 VNET_PCPUSTAT_SYSUNINIT(carpstats);
247 
248 #define	CARPSTATS_ADD(name, val)	\
249     counter_u64_add(VNET(carpstats)[offsetof(struct carpstats, name) / \
250 	sizeof(uint64_t)], (val))
251 #define	CARPSTATS_INC(name)		CARPSTATS_ADD(name, 1)
252 
253 SYSCTL_VNET_PCPUSTAT(_net_inet_carp, OID_AUTO, stats, struct carpstats,
254     carpstats, "CARP statistics (struct carpstats, netinet/ip_carp.h)");
255 
256 #define	CARP_LOCK_INIT(sc)	mtx_init(&(sc)->sc_mtx, "carp_softc",   \
257 	NULL, MTX_DEF)
258 #define	CARP_LOCK_DESTROY(sc)	mtx_destroy(&(sc)->sc_mtx)
259 #define	CARP_LOCK_ASSERT(sc)	mtx_assert(&(sc)->sc_mtx, MA_OWNED)
260 #define	CARP_LOCK(sc)		mtx_lock(&(sc)->sc_mtx)
261 #define	CARP_UNLOCK(sc)		mtx_unlock(&(sc)->sc_mtx)
262 #define	CIF_LOCK_INIT(cif)	mtx_init(&(cif)->cif_mtx, "carp_if",   \
263 	NULL, MTX_DEF)
264 #define	CIF_LOCK_DESTROY(cif)	mtx_destroy(&(cif)->cif_mtx)
265 #define	CIF_LOCK_ASSERT(cif)	mtx_assert(&(cif)->cif_mtx, MA_OWNED)
266 #define	CIF_LOCK(cif)		mtx_lock(&(cif)->cif_mtx)
267 #define	CIF_UNLOCK(cif)		mtx_unlock(&(cif)->cif_mtx)
268 #define	CIF_FREE(cif)	do {				\
269 		CIF_LOCK(cif);				\
270 		if (TAILQ_EMPTY(&(cif)->cif_vrs))	\
271 			carp_free_if(cif);		\
272 		else					\
273 			CIF_UNLOCK(cif);		\
274 } while (0)
275 
276 #define	CARP_LOG(...)	do {				\
277 	if (V_carp_log > 0)				\
278 		log(LOG_INFO, "carp: " __VA_ARGS__);	\
279 } while (0)
280 
281 #define	CARP_DEBUG(...)	do {				\
282 	if (V_carp_log > 1)				\
283 		log(LOG_DEBUG, __VA_ARGS__);		\
284 } while (0)
285 
286 #define	IFNET_FOREACH_IFA(ifp, ifa)					\
287 	CK_STAILQ_FOREACH((ifa), &(ifp)->if_addrhead, ifa_link)	\
288 		if ((ifa)->ifa_carp != NULL)
289 
290 #define	CARP_FOREACH_IFA(sc, ifa)					\
291 	CARP_LOCK_ASSERT(sc);						\
292 	for (int _i = 0;						\
293 		_i < (sc)->sc_naddrs + (sc)->sc_naddrs6 &&		\
294 		((ifa) = sc->sc_ifas[_i]) != NULL;			\
295 		++_i)
296 
297 #define	IFNET_FOREACH_CARP(ifp, sc)					\
298 	KASSERT(mtx_owned(&ifp->if_carp->cif_mtx) ||			\
299 	    sx_xlocked(&carp_sx), ("cif_vrs not locked"));		\
300 	TAILQ_FOREACH((sc), &(ifp)->if_carp->cif_vrs, sc_list)
301 
302 #define	DEMOTE_ADVSKEW(sc)					\
303     (((sc)->sc_advskew + V_carp_demotion > CARP_MAXSKEW) ?	\
304     CARP_MAXSKEW : ((sc)->sc_advskew + V_carp_demotion))
305 
306 static void	carp_input_c(struct mbuf *, struct carp_header *, sa_family_t);
307 static struct carp_softc
308 		*carp_alloc(struct ifnet *);
309 static void	carp_destroy(struct carp_softc *);
310 static struct carp_if
311 		*carp_alloc_if(struct ifnet *);
312 static void	carp_free_if(struct carp_if *);
313 static void	carp_set_state(struct carp_softc *, int, const char* reason);
314 static void	carp_sc_state(struct carp_softc *);
315 static void	carp_setrun(struct carp_softc *, sa_family_t);
316 static void	carp_master_down(void *);
317 static void	carp_master_down_locked(struct carp_softc *,
318     		    const char* reason);
319 static void	carp_send_ad(void *);
320 static void	carp_send_ad_locked(struct carp_softc *);
321 static void	carp_addroute(struct carp_softc *);
322 static void	carp_ifa_addroute(struct ifaddr *);
323 static void	carp_delroute(struct carp_softc *);
324 static void	carp_ifa_delroute(struct ifaddr *);
325 static void	carp_send_ad_all(void *, int);
326 static void	carp_demote_adj(int, char *);
327 
328 static LIST_HEAD(, carp_softc) carp_list;
329 static struct mtx carp_mtx;
330 static struct sx carp_sx;
331 static struct task carp_sendall_task =
332     TASK_INITIALIZER(0, carp_send_ad_all, NULL);
333 
334 static void
335 carp_hmac_prepare(struct carp_softc *sc)
336 {
337 	uint8_t version = CARP_VERSION, type = CARP_ADVERTISEMENT;
338 	uint8_t vhid = sc->sc_vhid & 0xff;
339 	struct ifaddr *ifa;
340 	int i, found;
341 #ifdef INET
342 	struct in_addr last, cur, in;
343 #endif
344 #ifdef INET6
345 	struct in6_addr last6, cur6, in6;
346 #endif
347 
348 	CARP_LOCK_ASSERT(sc);
349 
350 	/* Compute ipad from key. */
351 	bzero(sc->sc_pad, sizeof(sc->sc_pad));
352 	bcopy(sc->sc_key, sc->sc_pad, sizeof(sc->sc_key));
353 	for (i = 0; i < sizeof(sc->sc_pad); i++)
354 		sc->sc_pad[i] ^= 0x36;
355 
356 	/* Precompute first part of inner hash. */
357 	SHA1Init(&sc->sc_sha1);
358 	SHA1Update(&sc->sc_sha1, sc->sc_pad, sizeof(sc->sc_pad));
359 	SHA1Update(&sc->sc_sha1, (void *)&version, sizeof(version));
360 	SHA1Update(&sc->sc_sha1, (void *)&type, sizeof(type));
361 	SHA1Update(&sc->sc_sha1, (void *)&vhid, sizeof(vhid));
362 #ifdef INET
363 	cur.s_addr = 0;
364 	do {
365 		found = 0;
366 		last = cur;
367 		cur.s_addr = 0xffffffff;
368 		CARP_FOREACH_IFA(sc, ifa) {
369 			in.s_addr = ifatoia(ifa)->ia_addr.sin_addr.s_addr;
370 			if (ifa->ifa_addr->sa_family == AF_INET &&
371 			    ntohl(in.s_addr) > ntohl(last.s_addr) &&
372 			    ntohl(in.s_addr) < ntohl(cur.s_addr)) {
373 				cur.s_addr = in.s_addr;
374 				found++;
375 			}
376 		}
377 		if (found)
378 			SHA1Update(&sc->sc_sha1, (void *)&cur, sizeof(cur));
379 	} while (found);
380 #endif /* INET */
381 #ifdef INET6
382 	memset(&cur6, 0, sizeof(cur6));
383 	do {
384 		found = 0;
385 		last6 = cur6;
386 		memset(&cur6, 0xff, sizeof(cur6));
387 		CARP_FOREACH_IFA(sc, ifa) {
388 			in6 = ifatoia6(ifa)->ia_addr.sin6_addr;
389 			if (IN6_IS_SCOPE_EMBED(&in6))
390 				in6.s6_addr16[1] = 0;
391 			if (ifa->ifa_addr->sa_family == AF_INET6 &&
392 			    memcmp(&in6, &last6, sizeof(in6)) > 0 &&
393 			    memcmp(&in6, &cur6, sizeof(in6)) < 0) {
394 				cur6 = in6;
395 				found++;
396 			}
397 		}
398 		if (found)
399 			SHA1Update(&sc->sc_sha1, (void *)&cur6, sizeof(cur6));
400 	} while (found);
401 #endif /* INET6 */
402 
403 	/* convert ipad to opad */
404 	for (i = 0; i < sizeof(sc->sc_pad); i++)
405 		sc->sc_pad[i] ^= 0x36 ^ 0x5c;
406 }
407 
408 static void
409 carp_hmac_generate(struct carp_softc *sc, uint32_t counter[2],
410     unsigned char md[20])
411 {
412 	SHA1_CTX sha1ctx;
413 
414 	CARP_LOCK_ASSERT(sc);
415 
416 	/* fetch first half of inner hash */
417 	bcopy(&sc->sc_sha1, &sha1ctx, sizeof(sha1ctx));
418 
419 	SHA1Update(&sha1ctx, (void *)counter, sizeof(sc->sc_counter));
420 	SHA1Final(md, &sha1ctx);
421 
422 	/* outer hash */
423 	SHA1Init(&sha1ctx);
424 	SHA1Update(&sha1ctx, sc->sc_pad, sizeof(sc->sc_pad));
425 	SHA1Update(&sha1ctx, md, 20);
426 	SHA1Final(md, &sha1ctx);
427 }
428 
429 static int
430 carp_hmac_verify(struct carp_softc *sc, uint32_t counter[2],
431     unsigned char md[20])
432 {
433 	unsigned char md2[20];
434 
435 	CARP_LOCK_ASSERT(sc);
436 
437 	carp_hmac_generate(sc, counter, md2);
438 
439 	return (bcmp(md, md2, sizeof(md2)));
440 }
441 
442 /*
443  * process input packet.
444  * we have rearranged checks order compared to the rfc,
445  * but it seems more efficient this way or not possible otherwise.
446  */
447 #ifdef INET
448 int
449 carp_input(struct mbuf **mp, int *offp, int proto)
450 {
451 	struct mbuf *m = *mp;
452 	struct ip *ip = mtod(m, struct ip *);
453 	struct carp_header *ch;
454 	int iplen, len;
455 
456 	iplen = *offp;
457 	*mp = NULL;
458 
459 	CARPSTATS_INC(carps_ipackets);
460 
461 	if (!V_carp_allow) {
462 		m_freem(m);
463 		return (IPPROTO_DONE);
464 	}
465 
466 	/* verify that the IP TTL is 255.  */
467 	if (ip->ip_ttl != CARP_DFLTTL) {
468 		CARPSTATS_INC(carps_badttl);
469 		CARP_DEBUG("%s: received ttl %d != 255 on %s\n", __func__,
470 		    ip->ip_ttl,
471 		    m->m_pkthdr.rcvif->if_xname);
472 		m_freem(m);
473 		return (IPPROTO_DONE);
474 	}
475 
476 	iplen = ip->ip_hl << 2;
477 
478 	if (m->m_pkthdr.len < iplen + sizeof(*ch)) {
479 		CARPSTATS_INC(carps_badlen);
480 		CARP_DEBUG("%s: received len %zd < sizeof(struct carp_header) "
481 		    "on %s\n", __func__, m->m_len - sizeof(struct ip),
482 		    m->m_pkthdr.rcvif->if_xname);
483 		m_freem(m);
484 		return (IPPROTO_DONE);
485 	}
486 
487 	if (iplen + sizeof(*ch) < m->m_len) {
488 		if ((m = m_pullup(m, iplen + sizeof(*ch))) == NULL) {
489 			CARPSTATS_INC(carps_hdrops);
490 			CARP_DEBUG("%s: pullup failed\n", __func__);
491 			return (IPPROTO_DONE);
492 		}
493 		ip = mtod(m, struct ip *);
494 	}
495 	ch = (struct carp_header *)((char *)ip + iplen);
496 
497 	/*
498 	 * verify that the received packet length is
499 	 * equal to the CARP header
500 	 */
501 	len = iplen + sizeof(*ch);
502 	if (len > m->m_pkthdr.len) {
503 		CARPSTATS_INC(carps_badlen);
504 		CARP_DEBUG("%s: packet too short %d on %s\n", __func__,
505 		    m->m_pkthdr.len,
506 		    m->m_pkthdr.rcvif->if_xname);
507 		m_freem(m);
508 		return (IPPROTO_DONE);
509 	}
510 
511 	if ((m = m_pullup(m, len)) == NULL) {
512 		CARPSTATS_INC(carps_hdrops);
513 		return (IPPROTO_DONE);
514 	}
515 	ip = mtod(m, struct ip *);
516 	ch = (struct carp_header *)((char *)ip + iplen);
517 
518 	/* verify the CARP checksum */
519 	m->m_data += iplen;
520 	if (in_cksum(m, len - iplen)) {
521 		CARPSTATS_INC(carps_badsum);
522 		CARP_DEBUG("%s: checksum failed on %s\n", __func__,
523 		    m->m_pkthdr.rcvif->if_xname);
524 		m_freem(m);
525 		return (IPPROTO_DONE);
526 	}
527 	m->m_data -= iplen;
528 
529 	carp_input_c(m, ch, AF_INET);
530 	return (IPPROTO_DONE);
531 }
532 #endif
533 
534 #ifdef INET6
535 int
536 carp6_input(struct mbuf **mp, int *offp, int proto)
537 {
538 	struct mbuf *m = *mp;
539 	struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *);
540 	struct carp_header *ch;
541 	u_int len;
542 
543 	CARPSTATS_INC(carps_ipackets6);
544 
545 	if (!V_carp_allow) {
546 		m_freem(m);
547 		return (IPPROTO_DONE);
548 	}
549 
550 	/* check if received on a valid carp interface */
551 	if (m->m_pkthdr.rcvif->if_carp == NULL) {
552 		CARPSTATS_INC(carps_badif);
553 		CARP_DEBUG("%s: packet received on non-carp interface: %s\n",
554 		    __func__, m->m_pkthdr.rcvif->if_xname);
555 		m_freem(m);
556 		return (IPPROTO_DONE);
557 	}
558 
559 	/* verify that the IP TTL is 255 */
560 	if (ip6->ip6_hlim != CARP_DFLTTL) {
561 		CARPSTATS_INC(carps_badttl);
562 		CARP_DEBUG("%s: received ttl %d != 255 on %s\n", __func__,
563 		    ip6->ip6_hlim, m->m_pkthdr.rcvif->if_xname);
564 		m_freem(m);
565 		return (IPPROTO_DONE);
566 	}
567 
568 	/* verify that we have a complete carp packet */
569 	if (m->m_len < *offp + sizeof(*ch)) {
570 		len = m->m_len;
571 		m = m_pullup(m, *offp + sizeof(*ch));
572 		if (m == NULL) {
573 			CARPSTATS_INC(carps_badlen);
574 			CARP_DEBUG("%s: packet size %u too small\n", __func__, len);
575 			return (IPPROTO_DONE);
576 		}
577 	}
578 	ch = (struct carp_header *)(mtod(m, char *) + *offp);
579 
580 
581 	/* verify the CARP checksum */
582 	m->m_data += *offp;
583 	if (in_cksum(m, sizeof(*ch))) {
584 		CARPSTATS_INC(carps_badsum);
585 		CARP_DEBUG("%s: checksum failed, on %s\n", __func__,
586 		    m->m_pkthdr.rcvif->if_xname);
587 		m_freem(m);
588 		return (IPPROTO_DONE);
589 	}
590 	m->m_data -= *offp;
591 
592 	carp_input_c(m, ch, AF_INET6);
593 	return (IPPROTO_DONE);
594 }
595 #endif /* INET6 */
596 
597 /*
598  * This routine should not be necessary at all, but some switches
599  * (VMWare ESX vswitches) can echo our own packets back at us,
600  * and we must ignore them or they will cause us to drop out of
601  * MASTER mode.
602  *
603  * We cannot catch all cases of network loops.  Instead, what we
604  * do here is catch any packet that arrives with a carp header
605  * with a VHID of 0, that comes from an address that is our own.
606  * These packets are by definition "from us" (even if they are from
607  * a misconfigured host that is pretending to be us).
608  *
609  * The VHID test is outside this mini-function.
610  */
611 static int
612 carp_source_is_self(struct mbuf *m, struct ifaddr *ifa, sa_family_t af)
613 {
614 #ifdef INET
615 	struct ip *ip4;
616 	struct in_addr in4;
617 #endif
618 #ifdef INET6
619 	struct ip6_hdr *ip6;
620 	struct in6_addr in6;
621 #endif
622 
623 	switch (af) {
624 #ifdef INET
625 	case AF_INET:
626 		ip4 = mtod(m, struct ip *);
627 		in4 = ifatoia(ifa)->ia_addr.sin_addr;
628 		return (in4.s_addr == ip4->ip_src.s_addr);
629 #endif
630 #ifdef INET6
631 	case AF_INET6:
632 		ip6 = mtod(m, struct ip6_hdr *);
633 		in6 = ifatoia6(ifa)->ia_addr.sin6_addr;
634 		return (memcmp(&in6, &ip6->ip6_src, sizeof(in6)) == 0);
635 #endif
636 	default:
637 		break;
638 	}
639 	return (0);
640 }
641 
642 static void
643 carp_input_c(struct mbuf *m, struct carp_header *ch, sa_family_t af)
644 {
645 	struct ifnet *ifp = m->m_pkthdr.rcvif;
646 	struct ifaddr *ifa, *match;
647 	struct carp_softc *sc;
648 	uint64_t tmp_counter;
649 	struct timeval sc_tv, ch_tv;
650 	int error;
651 
652 	NET_EPOCH_ASSERT();
653 
654 	/*
655 	 * Verify that the VHID is valid on the receiving interface.
656 	 *
657 	 * There should be just one match.  If there are none
658 	 * the VHID is not valid and we drop the packet.  If
659 	 * there are multiple VHID matches, take just the first
660 	 * one, for compatibility with previous code.  While we're
661 	 * scanning, check for obvious loops in the network topology
662 	 * (these should never happen, and as noted above, we may
663 	 * miss real loops; this is just a double-check).
664 	 */
665 	error = 0;
666 	match = NULL;
667 	IFNET_FOREACH_IFA(ifp, ifa) {
668 		if (match == NULL && ifa->ifa_carp != NULL &&
669 		    ifa->ifa_addr->sa_family == af &&
670 		    ifa->ifa_carp->sc_vhid == ch->carp_vhid)
671 			match = ifa;
672 		if (ch->carp_vhid == 0 && carp_source_is_self(m, ifa, af))
673 			error = ELOOP;
674 	}
675 	ifa = error ? NULL : match;
676 	if (ifa != NULL)
677 		ifa_ref(ifa);
678 
679 	if (ifa == NULL) {
680 		if (error == ELOOP) {
681 			CARP_DEBUG("dropping looped packet on interface %s\n",
682 			    ifp->if_xname);
683 			CARPSTATS_INC(carps_badif);	/* ??? */
684 		} else {
685 			CARPSTATS_INC(carps_badvhid);
686 		}
687 		m_freem(m);
688 		return;
689 	}
690 
691 	/* verify the CARP version. */
692 	if (ch->carp_version != CARP_VERSION) {
693 		CARPSTATS_INC(carps_badver);
694 		CARP_DEBUG("%s: invalid version %d\n", ifp->if_xname,
695 		    ch->carp_version);
696 		ifa_free(ifa);
697 		m_freem(m);
698 		return;
699 	}
700 
701 	sc = ifa->ifa_carp;
702 	CARP_LOCK(sc);
703 	ifa_free(ifa);
704 
705 	if (carp_hmac_verify(sc, ch->carp_counter, ch->carp_md)) {
706 		CARPSTATS_INC(carps_badauth);
707 		CARP_DEBUG("%s: incorrect hash for VHID %u@%s\n", __func__,
708 		    sc->sc_vhid, ifp->if_xname);
709 		goto out;
710 	}
711 
712 	tmp_counter = ntohl(ch->carp_counter[0]);
713 	tmp_counter = tmp_counter<<32;
714 	tmp_counter += ntohl(ch->carp_counter[1]);
715 
716 	/* XXX Replay protection goes here */
717 
718 	sc->sc_init_counter = 0;
719 	sc->sc_counter = tmp_counter;
720 
721 	sc_tv.tv_sec = sc->sc_advbase;
722 	sc_tv.tv_usec = DEMOTE_ADVSKEW(sc) * 1000000 / 256;
723 	ch_tv.tv_sec = ch->carp_advbase;
724 	ch_tv.tv_usec = ch->carp_advskew * 1000000 / 256;
725 
726 	switch (sc->sc_state) {
727 	case INIT:
728 		break;
729 	case MASTER:
730 		/*
731 		 * If we receive an advertisement from a master who's going to
732 		 * be more frequent than us, go into BACKUP state.
733 		 */
734 		if (timevalcmp(&sc_tv, &ch_tv, >) ||
735 		    timevalcmp(&sc_tv, &ch_tv, ==)) {
736 			callout_stop(&sc->sc_ad_tmo);
737 			carp_set_state(sc, BACKUP,
738 			    "more frequent advertisement received");
739 			carp_setrun(sc, 0);
740 			carp_delroute(sc);
741 		}
742 		break;
743 	case BACKUP:
744 		/*
745 		 * If we're pre-empting masters who advertise slower than us,
746 		 * and this one claims to be slower, treat him as down.
747 		 */
748 		if (V_carp_preempt && timevalcmp(&sc_tv, &ch_tv, <)) {
749 			carp_master_down_locked(sc,
750 			    "preempting a slower master");
751 			break;
752 		}
753 
754 		/*
755 		 *  If the master is going to advertise at such a low frequency
756 		 *  that he's guaranteed to time out, we'd might as well just
757 		 *  treat him as timed out now.
758 		 */
759 		sc_tv.tv_sec = sc->sc_advbase * 3;
760 		if (timevalcmp(&sc_tv, &ch_tv, <)) {
761 			carp_master_down_locked(sc, "master will time out");
762 			break;
763 		}
764 
765 		/*
766 		 * Otherwise, we reset the counter and wait for the next
767 		 * advertisement.
768 		 */
769 		carp_setrun(sc, af);
770 		break;
771 	}
772 
773 out:
774 	CARP_UNLOCK(sc);
775 	m_freem(m);
776 }
777 
778 static int
779 carp_prepare_ad(struct mbuf *m, struct carp_softc *sc, struct carp_header *ch)
780 {
781 	struct m_tag *mtag;
782 
783 	if (sc->sc_init_counter) {
784 		/* this could also be seconds since unix epoch */
785 		sc->sc_counter = arc4random();
786 		sc->sc_counter = sc->sc_counter << 32;
787 		sc->sc_counter += arc4random();
788 	} else
789 		sc->sc_counter++;
790 
791 	ch->carp_counter[0] = htonl((sc->sc_counter>>32)&0xffffffff);
792 	ch->carp_counter[1] = htonl(sc->sc_counter&0xffffffff);
793 
794 	carp_hmac_generate(sc, ch->carp_counter, ch->carp_md);
795 
796 	/* Tag packet for carp_output */
797 	if ((mtag = m_tag_get(PACKET_TAG_CARP, sizeof(struct carp_softc *),
798 	    M_NOWAIT)) == NULL) {
799 		m_freem(m);
800 		CARPSTATS_INC(carps_onomem);
801 		return (ENOMEM);
802 	}
803 	bcopy(&sc, mtag + 1, sizeof(sc));
804 	m_tag_prepend(m, mtag);
805 
806 	return (0);
807 }
808 
809 /*
810  * To avoid LORs and possible recursions this function shouldn't
811  * be called directly, but scheduled via taskqueue.
812  */
813 static void
814 carp_send_ad_all(void *ctx __unused, int pending __unused)
815 {
816 	struct carp_softc *sc;
817 
818 	mtx_lock(&carp_mtx);
819 	LIST_FOREACH(sc, &carp_list, sc_next)
820 		if (sc->sc_state == MASTER) {
821 			CARP_LOCK(sc);
822 			CURVNET_SET(sc->sc_carpdev->if_vnet);
823 			carp_send_ad_locked(sc);
824 			CURVNET_RESTORE();
825 			CARP_UNLOCK(sc);
826 		}
827 	mtx_unlock(&carp_mtx);
828 }
829 
830 /* Send a periodic advertisement, executed in callout context. */
831 static void
832 carp_send_ad(void *v)
833 {
834 	struct carp_softc *sc = v;
835 
836 	CARP_LOCK_ASSERT(sc);
837 	CURVNET_SET(sc->sc_carpdev->if_vnet);
838 	carp_send_ad_locked(sc);
839 	CURVNET_RESTORE();
840 	CARP_UNLOCK(sc);
841 }
842 
843 static void
844 carp_send_ad_error(struct carp_softc *sc, int error)
845 {
846 
847 	if (error) {
848 		if (sc->sc_sendad_errors < INT_MAX)
849 			sc->sc_sendad_errors++;
850 		if (sc->sc_sendad_errors == CARP_SENDAD_MAX_ERRORS) {
851 			static const char fmt[] = "send error %d on %s";
852 			char msg[sizeof(fmt) + IFNAMSIZ];
853 
854 			sprintf(msg, fmt, error, sc->sc_carpdev->if_xname);
855 			carp_demote_adj(V_carp_senderr_adj, msg);
856 		}
857 		sc->sc_sendad_success = 0;
858 	} else {
859 		if (sc->sc_sendad_errors >= CARP_SENDAD_MAX_ERRORS &&
860 		    ++sc->sc_sendad_success >= CARP_SENDAD_MIN_SUCCESS) {
861 			static const char fmt[] = "send ok on %s";
862 			char msg[sizeof(fmt) + IFNAMSIZ];
863 
864 			sprintf(msg, fmt, sc->sc_carpdev->if_xname);
865 			carp_demote_adj(-V_carp_senderr_adj, msg);
866 			sc->sc_sendad_errors = 0;
867 		} else
868 			sc->sc_sendad_errors = 0;
869 	}
870 }
871 
872 /*
873  * Pick the best ifaddr on the given ifp for sending CARP
874  * advertisements.
875  *
876  * "Best" here is defined by ifa_preferred().  This function is much
877  * much like ifaof_ifpforaddr() except that we just use ifa_preferred().
878  *
879  * (This could be simplified to return the actual address, except that
880  * it has a different format in AF_INET and AF_INET6.)
881  */
882 static struct ifaddr *
883 carp_best_ifa(int af, struct ifnet *ifp)
884 {
885 	struct ifaddr *ifa, *best;
886 
887 	NET_EPOCH_ASSERT();
888 
889 	if (af >= AF_MAX)
890 		return (NULL);
891 	best = NULL;
892 	CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
893 		if (ifa->ifa_addr->sa_family == af &&
894 		    (best == NULL || ifa_preferred(best, ifa)))
895 			best = ifa;
896 	}
897 	if (best != NULL)
898 		ifa_ref(best);
899 	return (best);
900 }
901 
902 static void
903 carp_send_ad_locked(struct carp_softc *sc)
904 {
905 	struct carp_header ch;
906 	struct timeval tv;
907 	struct epoch_tracker et;
908 	struct ifaddr *ifa;
909 	struct carp_header *ch_ptr;
910 	struct mbuf *m;
911 	int len, advskew;
912 
913 	CARP_LOCK_ASSERT(sc);
914 
915 	advskew = DEMOTE_ADVSKEW(sc);
916 	tv.tv_sec = sc->sc_advbase;
917 	tv.tv_usec = advskew * 1000000 / 256;
918 
919 	ch.carp_version = CARP_VERSION;
920 	ch.carp_type = CARP_ADVERTISEMENT;
921 	ch.carp_vhid = sc->sc_vhid;
922 	ch.carp_advbase = sc->sc_advbase;
923 	ch.carp_advskew = advskew;
924 	ch.carp_authlen = 7;	/* XXX DEFINE */
925 	ch.carp_pad1 = 0;	/* must be zero */
926 	ch.carp_cksum = 0;
927 
928 	/* XXXGL: OpenBSD picks first ifaddr with needed family. */
929 
930 #ifdef INET
931 	if (sc->sc_naddrs) {
932 		struct ip *ip;
933 
934 		m = m_gethdr(M_NOWAIT, MT_DATA);
935 		if (m == NULL) {
936 			CARPSTATS_INC(carps_onomem);
937 			goto resched;
938 		}
939 		len = sizeof(*ip) + sizeof(ch);
940 		m->m_pkthdr.len = len;
941 		m->m_pkthdr.rcvif = NULL;
942 		m->m_len = len;
943 		M_ALIGN(m, m->m_len);
944 		m->m_flags |= M_MCAST;
945 		ip = mtod(m, struct ip *);
946 		ip->ip_v = IPVERSION;
947 		ip->ip_hl = sizeof(*ip) >> 2;
948 		ip->ip_tos = V_carp_dscp << IPTOS_DSCP_OFFSET;
949 		ip->ip_len = htons(len);
950 		ip->ip_off = htons(IP_DF);
951 		ip->ip_ttl = CARP_DFLTTL;
952 		ip->ip_p = IPPROTO_CARP;
953 		ip->ip_sum = 0;
954 		ip_fillid(ip);
955 
956 		ifa = carp_best_ifa(AF_INET, sc->sc_carpdev);
957 		if (ifa != NULL) {
958 			ip->ip_src.s_addr =
959 			    ifatoia(ifa)->ia_addr.sin_addr.s_addr;
960 			ifa_free(ifa);
961 		} else
962 			ip->ip_src.s_addr = 0;
963 		ip->ip_dst.s_addr = htonl(INADDR_CARP_GROUP);
964 
965 		ch_ptr = (struct carp_header *)(&ip[1]);
966 		bcopy(&ch, ch_ptr, sizeof(ch));
967 		if (carp_prepare_ad(m, sc, ch_ptr))
968 			goto resched;
969 
970 		m->m_data += sizeof(*ip);
971 		ch_ptr->carp_cksum = in_cksum(m, len - sizeof(*ip));
972 		m->m_data -= sizeof(*ip);
973 
974 		CARPSTATS_INC(carps_opackets);
975 
976 		NET_EPOCH_ENTER(et);
977 		carp_send_ad_error(sc, ip_output(m, NULL, NULL, IP_RAWOUTPUT,
978 		    &sc->sc_carpdev->if_carp->cif_imo, NULL));
979 		NET_EPOCH_EXIT(et);
980 	}
981 #endif /* INET */
982 #ifdef INET6
983 	if (sc->sc_naddrs6) {
984 		struct ip6_hdr *ip6;
985 
986 		m = m_gethdr(M_NOWAIT, MT_DATA);
987 		if (m == NULL) {
988 			CARPSTATS_INC(carps_onomem);
989 			goto resched;
990 		}
991 		len = sizeof(*ip6) + sizeof(ch);
992 		m->m_pkthdr.len = len;
993 		m->m_pkthdr.rcvif = NULL;
994 		m->m_len = len;
995 		M_ALIGN(m, m->m_len);
996 		m->m_flags |= M_MCAST;
997 		ip6 = mtod(m, struct ip6_hdr *);
998 		bzero(ip6, sizeof(*ip6));
999 		ip6->ip6_vfc |= IPV6_VERSION;
1000 		/* Traffic class isn't defined in ip6 struct instead
1001 		 * it gets offset into flowid field */
1002 		ip6->ip6_flow |= htonl(V_carp_dscp << (IPV6_FLOWLABEL_LEN +
1003 		    IPTOS_DSCP_OFFSET));
1004 		ip6->ip6_hlim = CARP_DFLTTL;
1005 		ip6->ip6_nxt = IPPROTO_CARP;
1006 
1007 		/* set the source address */
1008 		ifa = carp_best_ifa(AF_INET6, sc->sc_carpdev);
1009 		if (ifa != NULL) {
1010 			bcopy(IFA_IN6(ifa), &ip6->ip6_src,
1011 			    sizeof(struct in6_addr));
1012 			ifa_free(ifa);
1013 		} else
1014 			/* This should never happen with IPv6. */
1015 			bzero(&ip6->ip6_src, sizeof(struct in6_addr));
1016 
1017 		/* Set the multicast destination. */
1018 		ip6->ip6_dst.s6_addr16[0] = htons(0xff02);
1019 		ip6->ip6_dst.s6_addr8[15] = 0x12;
1020 		if (in6_setscope(&ip6->ip6_dst, sc->sc_carpdev, NULL) != 0) {
1021 			m_freem(m);
1022 			CARP_DEBUG("%s: in6_setscope failed\n", __func__);
1023 			goto resched;
1024 		}
1025 
1026 		ch_ptr = (struct carp_header *)(&ip6[1]);
1027 		bcopy(&ch, ch_ptr, sizeof(ch));
1028 		if (carp_prepare_ad(m, sc, ch_ptr))
1029 			goto resched;
1030 
1031 		m->m_data += sizeof(*ip6);
1032 		ch_ptr->carp_cksum = in_cksum(m, len - sizeof(*ip6));
1033 		m->m_data -= sizeof(*ip6);
1034 
1035 		CARPSTATS_INC(carps_opackets6);
1036 
1037 		NET_EPOCH_ENTER(et);
1038 		carp_send_ad_error(sc, ip6_output(m, NULL, NULL, 0,
1039 		    &sc->sc_carpdev->if_carp->cif_im6o, NULL, NULL));
1040 		NET_EPOCH_EXIT(et);
1041 	}
1042 #endif /* INET6 */
1043 
1044 resched:
1045 	callout_reset(&sc->sc_ad_tmo, tvtohz(&tv), carp_send_ad, sc);
1046 }
1047 
1048 static void
1049 carp_addroute(struct carp_softc *sc)
1050 {
1051 	struct ifaddr *ifa;
1052 
1053 	CARP_FOREACH_IFA(sc, ifa)
1054 		carp_ifa_addroute(ifa);
1055 }
1056 
1057 static void
1058 carp_ifa_addroute(struct ifaddr *ifa)
1059 {
1060 
1061 	switch (ifa->ifa_addr->sa_family) {
1062 #ifdef INET
1063 	case AF_INET:
1064 		in_addprefix(ifatoia(ifa), RTF_UP);
1065 		ifa_add_loopback_route(ifa,
1066 		    (struct sockaddr *)&ifatoia(ifa)->ia_addr);
1067 		break;
1068 #endif
1069 #ifdef INET6
1070 	case AF_INET6:
1071 		ifa_add_loopback_route(ifa,
1072 		    (struct sockaddr *)&ifatoia6(ifa)->ia_addr);
1073 		nd6_add_ifa_lle(ifatoia6(ifa));
1074 		break;
1075 #endif
1076 	}
1077 }
1078 
1079 static void
1080 carp_delroute(struct carp_softc *sc)
1081 {
1082 	struct ifaddr *ifa;
1083 
1084 	CARP_FOREACH_IFA(sc, ifa)
1085 		carp_ifa_delroute(ifa);
1086 }
1087 
1088 static void
1089 carp_ifa_delroute(struct ifaddr *ifa)
1090 {
1091 
1092 	switch (ifa->ifa_addr->sa_family) {
1093 #ifdef INET
1094 	case AF_INET:
1095 		ifa_del_loopback_route(ifa,
1096 		    (struct sockaddr *)&ifatoia(ifa)->ia_addr);
1097 		in_scrubprefix(ifatoia(ifa), LLE_STATIC);
1098 		break;
1099 #endif
1100 #ifdef INET6
1101 	case AF_INET6:
1102 		ifa_del_loopback_route(ifa,
1103 		    (struct sockaddr *)&ifatoia6(ifa)->ia_addr);
1104 		nd6_rem_ifa_lle(ifatoia6(ifa), 1);
1105 		break;
1106 #endif
1107 	}
1108 }
1109 
1110 int
1111 carp_master(struct ifaddr *ifa)
1112 {
1113 	struct carp_softc *sc = ifa->ifa_carp;
1114 
1115 	return (sc->sc_state == MASTER);
1116 }
1117 
1118 #ifdef INET
1119 /*
1120  * Broadcast a gratuitous ARP request containing
1121  * the virtual router MAC address for each IP address
1122  * associated with the virtual router.
1123  */
1124 static void
1125 carp_send_arp(struct carp_softc *sc)
1126 {
1127 	struct ifaddr *ifa;
1128 	struct in_addr addr;
1129 
1130 	CARP_FOREACH_IFA(sc, ifa) {
1131 		if (ifa->ifa_addr->sa_family != AF_INET)
1132 			continue;
1133 		addr = ((struct sockaddr_in *)ifa->ifa_addr)->sin_addr;
1134 		arp_announce_ifaddr(sc->sc_carpdev, addr, LLADDR(&sc->sc_addr));
1135 	}
1136 }
1137 
1138 int
1139 carp_iamatch(struct ifaddr *ifa, uint8_t **enaddr)
1140 {
1141 	struct carp_softc *sc = ifa->ifa_carp;
1142 
1143 	if (sc->sc_state == MASTER) {
1144 		*enaddr = LLADDR(&sc->sc_addr);
1145 		return (1);
1146 	}
1147 
1148 	return (0);
1149 }
1150 #endif
1151 
1152 #ifdef INET6
1153 static void
1154 carp_send_na(struct carp_softc *sc)
1155 {
1156 	static struct in6_addr mcast = IN6ADDR_LINKLOCAL_ALLNODES_INIT;
1157 	struct ifaddr *ifa;
1158 	struct in6_addr *in6;
1159 
1160 	CARP_FOREACH_IFA(sc, ifa) {
1161 		if (ifa->ifa_addr->sa_family != AF_INET6)
1162 			continue;
1163 
1164 		in6 = IFA_IN6(ifa);
1165 		nd6_na_output(sc->sc_carpdev, &mcast, in6,
1166 		    ND_NA_FLAG_OVERRIDE, 1, NULL);
1167 		DELAY(1000);	/* XXX */
1168 	}
1169 }
1170 
1171 /*
1172  * Returns ifa in case it's a carp address and it is MASTER, or if the address
1173  * matches and is not a carp address.  Returns NULL otherwise.
1174  */
1175 struct ifaddr *
1176 carp_iamatch6(struct ifnet *ifp, struct in6_addr *taddr)
1177 {
1178 	struct ifaddr *ifa;
1179 
1180 	NET_EPOCH_ASSERT();
1181 
1182 	ifa = NULL;
1183 	CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
1184 		if (ifa->ifa_addr->sa_family != AF_INET6)
1185 			continue;
1186 		if (!IN6_ARE_ADDR_EQUAL(taddr, IFA_IN6(ifa)))
1187 			continue;
1188 		if (ifa->ifa_carp && ifa->ifa_carp->sc_state != MASTER)
1189 			ifa = NULL;
1190 		else
1191 			ifa_ref(ifa);
1192 		break;
1193 	}
1194 
1195 	return (ifa);
1196 }
1197 
1198 char *
1199 carp_macmatch6(struct ifnet *ifp, struct mbuf *m, const struct in6_addr *taddr)
1200 {
1201 	struct ifaddr *ifa;
1202 
1203 	NET_EPOCH_ASSERT();
1204 
1205 	IFNET_FOREACH_IFA(ifp, ifa)
1206 		if (ifa->ifa_addr->sa_family == AF_INET6 &&
1207 		    IN6_ARE_ADDR_EQUAL(taddr, IFA_IN6(ifa))) {
1208 			struct carp_softc *sc = ifa->ifa_carp;
1209 			struct m_tag *mtag;
1210 
1211 			mtag = m_tag_get(PACKET_TAG_CARP,
1212 			    sizeof(struct carp_softc *), M_NOWAIT);
1213 			if (mtag == NULL)
1214 				/* Better a bit than nothing. */
1215 				return (LLADDR(&sc->sc_addr));
1216 
1217 			bcopy(&sc, mtag + 1, sizeof(sc));
1218 			m_tag_prepend(m, mtag);
1219 
1220 			return (LLADDR(&sc->sc_addr));
1221 		}
1222 
1223 	return (NULL);
1224 }
1225 #endif /* INET6 */
1226 
1227 int
1228 carp_forus(struct ifnet *ifp, u_char *dhost)
1229 {
1230 	struct carp_softc *sc;
1231 	uint8_t *ena = dhost;
1232 
1233 	if (ena[0] || ena[1] || ena[2] != 0x5e || ena[3] || ena[4] != 1)
1234 		return (0);
1235 
1236 	CIF_LOCK(ifp->if_carp);
1237 	IFNET_FOREACH_CARP(ifp, sc) {
1238 		/*
1239 		 * CARP_LOCK() is not here, since would protect nothing, but
1240 		 * cause deadlock with if_bridge, calling this under its lock.
1241 		 */
1242 		if (sc->sc_state == MASTER && !bcmp(dhost, LLADDR(&sc->sc_addr),
1243 		    ETHER_ADDR_LEN)) {
1244 			CIF_UNLOCK(ifp->if_carp);
1245 			return (1);
1246 		}
1247 	}
1248 	CIF_UNLOCK(ifp->if_carp);
1249 
1250 	return (0);
1251 }
1252 
1253 /* Master down timeout event, executed in callout context. */
1254 static void
1255 carp_master_down(void *v)
1256 {
1257 	struct carp_softc *sc = v;
1258 
1259 	CARP_LOCK_ASSERT(sc);
1260 
1261 	CURVNET_SET(sc->sc_carpdev->if_vnet);
1262 	if (sc->sc_state == BACKUP) {
1263 		carp_master_down_locked(sc, "master timed out");
1264 	}
1265 	CURVNET_RESTORE();
1266 
1267 	CARP_UNLOCK(sc);
1268 }
1269 
1270 static void
1271 carp_master_down_locked(struct carp_softc *sc, const char *reason)
1272 {
1273 
1274 	CARP_LOCK_ASSERT(sc);
1275 
1276 	switch (sc->sc_state) {
1277 	case BACKUP:
1278 		carp_set_state(sc, MASTER, reason);
1279 		carp_send_ad_locked(sc);
1280 #ifdef INET
1281 		carp_send_arp(sc);
1282 #endif
1283 #ifdef INET6
1284 		carp_send_na(sc);
1285 #endif
1286 		carp_setrun(sc, 0);
1287 		carp_addroute(sc);
1288 		break;
1289 	case INIT:
1290 	case MASTER:
1291 #ifdef INVARIANTS
1292 		panic("carp: VHID %u@%s: master_down event in %s state\n",
1293 		    sc->sc_vhid,
1294 		    sc->sc_carpdev->if_xname,
1295 		    sc->sc_state ? "MASTER" : "INIT");
1296 #endif
1297 		break;
1298 	}
1299 }
1300 
1301 /*
1302  * When in backup state, af indicates whether to reset the master down timer
1303  * for v4 or v6. If it's set to zero, reset the ones which are already pending.
1304  */
1305 static void
1306 carp_setrun(struct carp_softc *sc, sa_family_t af)
1307 {
1308 	struct timeval tv;
1309 
1310 	CARP_LOCK_ASSERT(sc);
1311 
1312 	if ((sc->sc_carpdev->if_flags & IFF_UP) == 0 ||
1313 	    sc->sc_carpdev->if_link_state != LINK_STATE_UP ||
1314 	    (sc->sc_naddrs == 0 && sc->sc_naddrs6 == 0) ||
1315 	    !V_carp_allow)
1316 		return;
1317 
1318 	switch (sc->sc_state) {
1319 	case INIT:
1320 		carp_set_state(sc, BACKUP, "initialization complete");
1321 		carp_setrun(sc, 0);
1322 		break;
1323 	case BACKUP:
1324 		callout_stop(&sc->sc_ad_tmo);
1325 		tv.tv_sec = 3 * sc->sc_advbase;
1326 		tv.tv_usec = sc->sc_advskew * 1000000 / 256;
1327 		switch (af) {
1328 #ifdef INET
1329 		case AF_INET:
1330 			callout_reset(&sc->sc_md_tmo, tvtohz(&tv),
1331 			    carp_master_down, sc);
1332 			break;
1333 #endif
1334 #ifdef INET6
1335 		case AF_INET6:
1336 			callout_reset(&sc->sc_md6_tmo, tvtohz(&tv),
1337 			    carp_master_down, sc);
1338 			break;
1339 #endif
1340 		default:
1341 #ifdef INET
1342 			if (sc->sc_naddrs)
1343 				callout_reset(&sc->sc_md_tmo, tvtohz(&tv),
1344 				    carp_master_down, sc);
1345 #endif
1346 #ifdef INET6
1347 			if (sc->sc_naddrs6)
1348 				callout_reset(&sc->sc_md6_tmo, tvtohz(&tv),
1349 				    carp_master_down, sc);
1350 #endif
1351 			break;
1352 		}
1353 		break;
1354 	case MASTER:
1355 		tv.tv_sec = sc->sc_advbase;
1356 		tv.tv_usec = sc->sc_advskew * 1000000 / 256;
1357 		callout_reset(&sc->sc_ad_tmo, tvtohz(&tv),
1358 		    carp_send_ad, sc);
1359 		break;
1360 	}
1361 }
1362 
1363 /*
1364  * Setup multicast structures.
1365  */
1366 static int
1367 carp_multicast_setup(struct carp_if *cif, sa_family_t sa)
1368 {
1369 	struct ifnet *ifp = cif->cif_ifp;
1370 	int error = 0;
1371 
1372 	switch (sa) {
1373 #ifdef INET
1374 	case AF_INET:
1375 	    {
1376 		struct ip_moptions *imo = &cif->cif_imo;
1377 		struct in_mfilter *imf;
1378 		struct in_addr addr;
1379 
1380 		if (ip_mfilter_first(&imo->imo_head) != NULL)
1381 			return (0);
1382 
1383 		imf = ip_mfilter_alloc(M_WAITOK, 0, 0);
1384 		ip_mfilter_init(&imo->imo_head);
1385 		imo->imo_multicast_vif = -1;
1386 
1387 		addr.s_addr = htonl(INADDR_CARP_GROUP);
1388 		if ((error = in_joingroup(ifp, &addr, NULL,
1389 		    &imf->imf_inm)) != 0) {
1390 			ip_mfilter_free(imf);
1391 			break;
1392 		}
1393 
1394 		ip_mfilter_insert(&imo->imo_head, imf);
1395 		imo->imo_multicast_ifp = ifp;
1396 		imo->imo_multicast_ttl = CARP_DFLTTL;
1397 		imo->imo_multicast_loop = 0;
1398 		break;
1399 	   }
1400 #endif
1401 #ifdef INET6
1402 	case AF_INET6:
1403 	    {
1404 		struct ip6_moptions *im6o = &cif->cif_im6o;
1405 		struct in6_mfilter *im6f[2];
1406 		struct in6_addr in6;
1407 
1408 		if (ip6_mfilter_first(&im6o->im6o_head))
1409 			return (0);
1410 
1411 		im6f[0] = ip6_mfilter_alloc(M_WAITOK, 0, 0);
1412 		im6f[1] = ip6_mfilter_alloc(M_WAITOK, 0, 0);
1413 
1414 		ip6_mfilter_init(&im6o->im6o_head);
1415 		im6o->im6o_multicast_hlim = CARP_DFLTTL;
1416 		im6o->im6o_multicast_ifp = ifp;
1417 
1418 		/* Join IPv6 CARP multicast group. */
1419 		bzero(&in6, sizeof(in6));
1420 		in6.s6_addr16[0] = htons(0xff02);
1421 		in6.s6_addr8[15] = 0x12;
1422 		if ((error = in6_setscope(&in6, ifp, NULL)) != 0) {
1423 			ip6_mfilter_free(im6f[0]);
1424 			ip6_mfilter_free(im6f[1]);
1425 			break;
1426 		}
1427 		if ((error = in6_joingroup(ifp, &in6, NULL, &im6f[0]->im6f_in6m, 0)) != 0) {
1428 			ip6_mfilter_free(im6f[0]);
1429 			ip6_mfilter_free(im6f[1]);
1430 			break;
1431 		}
1432 
1433 		/* Join solicited multicast address. */
1434 		bzero(&in6, sizeof(in6));
1435 		in6.s6_addr16[0] = htons(0xff02);
1436 		in6.s6_addr32[1] = 0;
1437 		in6.s6_addr32[2] = htonl(1);
1438 		in6.s6_addr32[3] = 0;
1439 		in6.s6_addr8[12] = 0xff;
1440 
1441 		if ((error = in6_setscope(&in6, ifp, NULL)) != 0) {
1442 			ip6_mfilter_free(im6f[0]);
1443 			ip6_mfilter_free(im6f[1]);
1444 			break;
1445 		}
1446 
1447 		if ((error = in6_joingroup(ifp, &in6, NULL, &im6f[1]->im6f_in6m, 0)) != 0) {
1448 			in6_leavegroup(im6f[0]->im6f_in6m, NULL);
1449 			ip6_mfilter_free(im6f[0]);
1450 			ip6_mfilter_free(im6f[1]);
1451 			break;
1452 		}
1453 		ip6_mfilter_insert(&im6o->im6o_head, im6f[0]);
1454 		ip6_mfilter_insert(&im6o->im6o_head, im6f[1]);
1455 		break;
1456 	    }
1457 #endif
1458 	}
1459 
1460 	return (error);
1461 }
1462 
1463 /*
1464  * Free multicast structures.
1465  */
1466 static void
1467 carp_multicast_cleanup(struct carp_if *cif, sa_family_t sa)
1468 {
1469 #ifdef INET
1470 	struct ip_moptions *imo = &cif->cif_imo;
1471 	struct in_mfilter *imf;
1472 #endif
1473 #ifdef INET6
1474 	struct ip6_moptions *im6o = &cif->cif_im6o;
1475 	struct in6_mfilter *im6f;
1476 #endif
1477 	sx_assert(&carp_sx, SA_XLOCKED);
1478 
1479 	switch (sa) {
1480 #ifdef INET
1481 	case AF_INET:
1482 		if (cif->cif_naddrs != 0)
1483 			break;
1484 
1485 		while ((imf = ip_mfilter_first(&imo->imo_head)) != NULL) {
1486 			ip_mfilter_remove(&imo->imo_head, imf);
1487 			in_leavegroup(imf->imf_inm, NULL);
1488 			ip_mfilter_free(imf);
1489 		}
1490 		break;
1491 #endif
1492 #ifdef INET6
1493 	case AF_INET6:
1494 		if (cif->cif_naddrs6 != 0)
1495 			break;
1496 
1497 		while ((im6f = ip6_mfilter_first(&im6o->im6o_head)) != NULL) {
1498 			ip6_mfilter_remove(&im6o->im6o_head, im6f);
1499 			in6_leavegroup(im6f->im6f_in6m, NULL);
1500 			ip6_mfilter_free(im6f);
1501 		}
1502 		break;
1503 #endif
1504 	}
1505 }
1506 
1507 int
1508 carp_output(struct ifnet *ifp, struct mbuf *m, const struct sockaddr *sa)
1509 {
1510 	struct m_tag *mtag;
1511 	struct carp_softc *sc;
1512 
1513 	if (!sa)
1514 		return (0);
1515 
1516 	switch (sa->sa_family) {
1517 #ifdef INET
1518 	case AF_INET:
1519 		break;
1520 #endif
1521 #ifdef INET6
1522 	case AF_INET6:
1523 		break;
1524 #endif
1525 	default:
1526 		return (0);
1527 	}
1528 
1529 	mtag = m_tag_find(m, PACKET_TAG_CARP, NULL);
1530 	if (mtag == NULL)
1531 		return (0);
1532 
1533 	bcopy(mtag + 1, &sc, sizeof(sc));
1534 
1535 	/* Set the source MAC address to the Virtual Router MAC Address. */
1536 	switch (ifp->if_type) {
1537 	case IFT_ETHER:
1538 	case IFT_BRIDGE:
1539 	case IFT_L2VLAN: {
1540 			struct ether_header *eh;
1541 
1542 			eh = mtod(m, struct ether_header *);
1543 			eh->ether_shost[0] = 0;
1544 			eh->ether_shost[1] = 0;
1545 			eh->ether_shost[2] = 0x5e;
1546 			eh->ether_shost[3] = 0;
1547 			eh->ether_shost[4] = 1;
1548 			eh->ether_shost[5] = sc->sc_vhid;
1549 		}
1550 		break;
1551 	default:
1552 		printf("%s: carp is not supported for the %d interface type\n",
1553 		    ifp->if_xname, ifp->if_type);
1554 		return (EOPNOTSUPP);
1555 	}
1556 
1557 	return (0);
1558 }
1559 
1560 static struct carp_softc*
1561 carp_alloc(struct ifnet *ifp)
1562 {
1563 	struct carp_softc *sc;
1564 	struct carp_if *cif;
1565 
1566 	sx_assert(&carp_sx, SA_XLOCKED);
1567 
1568 	if ((cif = ifp->if_carp) == NULL)
1569 		cif = carp_alloc_if(ifp);
1570 
1571 	sc = malloc(sizeof(*sc), M_CARP, M_WAITOK|M_ZERO);
1572 
1573 	sc->sc_advbase = CARP_DFLTINTV;
1574 	sc->sc_vhid = -1;	/* required setting */
1575 	sc->sc_init_counter = 1;
1576 	sc->sc_state = INIT;
1577 
1578 	sc->sc_ifasiz = sizeof(struct ifaddr *);
1579 	sc->sc_ifas = malloc(sc->sc_ifasiz, M_CARP, M_WAITOK|M_ZERO);
1580 	sc->sc_carpdev = ifp;
1581 
1582 	CARP_LOCK_INIT(sc);
1583 #ifdef INET
1584 	callout_init_mtx(&sc->sc_md_tmo, &sc->sc_mtx, CALLOUT_RETURNUNLOCKED);
1585 #endif
1586 #ifdef INET6
1587 	callout_init_mtx(&sc->sc_md6_tmo, &sc->sc_mtx, CALLOUT_RETURNUNLOCKED);
1588 #endif
1589 	callout_init_mtx(&sc->sc_ad_tmo, &sc->sc_mtx, CALLOUT_RETURNUNLOCKED);
1590 
1591 	CIF_LOCK(cif);
1592 	TAILQ_INSERT_TAIL(&cif->cif_vrs, sc, sc_list);
1593 	CIF_UNLOCK(cif);
1594 
1595 	mtx_lock(&carp_mtx);
1596 	LIST_INSERT_HEAD(&carp_list, sc, sc_next);
1597 	mtx_unlock(&carp_mtx);
1598 
1599 	return (sc);
1600 }
1601 
1602 static void
1603 carp_grow_ifas(struct carp_softc *sc)
1604 {
1605 	struct ifaddr **new;
1606 
1607 	new = malloc(sc->sc_ifasiz * 2, M_CARP, M_WAITOK | M_ZERO);
1608 	CARP_LOCK(sc);
1609 	bcopy(sc->sc_ifas, new, sc->sc_ifasiz);
1610 	free(sc->sc_ifas, M_CARP);
1611 	sc->sc_ifas = new;
1612 	sc->sc_ifasiz *= 2;
1613 	CARP_UNLOCK(sc);
1614 }
1615 
1616 static void
1617 carp_destroy(struct carp_softc *sc)
1618 {
1619 	struct ifnet *ifp = sc->sc_carpdev;
1620 	struct carp_if *cif = ifp->if_carp;
1621 
1622 	sx_assert(&carp_sx, SA_XLOCKED);
1623 
1624 	if (sc->sc_suppress)
1625 		carp_demote_adj(-V_carp_ifdown_adj, "vhid removed");
1626 	CARP_UNLOCK(sc);
1627 
1628 	CIF_LOCK(cif);
1629 	TAILQ_REMOVE(&cif->cif_vrs, sc, sc_list);
1630 	CIF_UNLOCK(cif);
1631 
1632 	mtx_lock(&carp_mtx);
1633 	LIST_REMOVE(sc, sc_next);
1634 	mtx_unlock(&carp_mtx);
1635 
1636 	callout_drain(&sc->sc_ad_tmo);
1637 #ifdef INET
1638 	callout_drain(&sc->sc_md_tmo);
1639 #endif
1640 #ifdef INET6
1641 	callout_drain(&sc->sc_md6_tmo);
1642 #endif
1643 	CARP_LOCK_DESTROY(sc);
1644 
1645 	free(sc->sc_ifas, M_CARP);
1646 	free(sc, M_CARP);
1647 }
1648 
1649 static struct carp_if*
1650 carp_alloc_if(struct ifnet *ifp)
1651 {
1652 	struct carp_if *cif;
1653 	int error;
1654 
1655 	cif = malloc(sizeof(*cif), M_CARP, M_WAITOK|M_ZERO);
1656 
1657 	if ((error = ifpromisc(ifp, 1)) != 0)
1658 		printf("%s: ifpromisc(%s) failed: %d\n",
1659 		    __func__, ifp->if_xname, error);
1660 	else
1661 		cif->cif_flags |= CIF_PROMISC;
1662 
1663 	CIF_LOCK_INIT(cif);
1664 	cif->cif_ifp = ifp;
1665 	TAILQ_INIT(&cif->cif_vrs);
1666 
1667 	IF_ADDR_WLOCK(ifp);
1668 	ifp->if_carp = cif;
1669 	if_ref(ifp);
1670 	IF_ADDR_WUNLOCK(ifp);
1671 
1672 	return (cif);
1673 }
1674 
1675 static void
1676 carp_free_if(struct carp_if *cif)
1677 {
1678 	struct ifnet *ifp = cif->cif_ifp;
1679 
1680 	CIF_LOCK_ASSERT(cif);
1681 	KASSERT(TAILQ_EMPTY(&cif->cif_vrs), ("%s: softc list not empty",
1682 	    __func__));
1683 
1684 	IF_ADDR_WLOCK(ifp);
1685 	ifp->if_carp = NULL;
1686 	IF_ADDR_WUNLOCK(ifp);
1687 
1688 	CIF_LOCK_DESTROY(cif);
1689 
1690 	if (cif->cif_flags & CIF_PROMISC)
1691 		ifpromisc(ifp, 0);
1692 	if_rele(ifp);
1693 
1694 	free(cif, M_CARP);
1695 }
1696 
1697 static void
1698 carp_carprcp(struct carpreq *carpr, struct carp_softc *sc, int priv)
1699 {
1700 
1701 	CARP_LOCK(sc);
1702 	carpr->carpr_state = sc->sc_state;
1703 	carpr->carpr_vhid = sc->sc_vhid;
1704 	carpr->carpr_advbase = sc->sc_advbase;
1705 	carpr->carpr_advskew = sc->sc_advskew;
1706 	if (priv)
1707 		bcopy(sc->sc_key, carpr->carpr_key, sizeof(carpr->carpr_key));
1708 	else
1709 		bzero(carpr->carpr_key, sizeof(carpr->carpr_key));
1710 	CARP_UNLOCK(sc);
1711 }
1712 
1713 int
1714 carp_ioctl(struct ifreq *ifr, u_long cmd, struct thread *td)
1715 {
1716 	struct carpreq carpr;
1717 	struct ifnet *ifp;
1718 	struct carp_softc *sc = NULL;
1719 	int error = 0, locked = 0;
1720 
1721 	if ((error = copyin(ifr_data_get_ptr(ifr), &carpr, sizeof carpr)))
1722 		return (error);
1723 
1724 	ifp = ifunit_ref(ifr->ifr_name);
1725 	if (ifp == NULL)
1726 		return (ENXIO);
1727 
1728 	switch (ifp->if_type) {
1729 	case IFT_ETHER:
1730 	case IFT_L2VLAN:
1731 	case IFT_BRIDGE:
1732 		break;
1733 	default:
1734 		error = EOPNOTSUPP;
1735 		goto out;
1736 	}
1737 
1738 	if ((ifp->if_flags & IFF_MULTICAST) == 0) {
1739 		error = EADDRNOTAVAIL;
1740 		goto out;
1741 	}
1742 
1743 	sx_xlock(&carp_sx);
1744 	switch (cmd) {
1745 	case SIOCSVH:
1746 		if ((error = priv_check(td, PRIV_NETINET_CARP)))
1747 			break;
1748 		if (carpr.carpr_vhid <= 0 || carpr.carpr_vhid > CARP_MAXVHID ||
1749 		    carpr.carpr_advbase < 0 || carpr.carpr_advskew < 0) {
1750 			error = EINVAL;
1751 			break;
1752 		}
1753 
1754 		if (ifp->if_carp) {
1755 			IFNET_FOREACH_CARP(ifp, sc)
1756 				if (sc->sc_vhid == carpr.carpr_vhid)
1757 					break;
1758 		}
1759 		if (sc == NULL) {
1760 			sc = carp_alloc(ifp);
1761 			CARP_LOCK(sc);
1762 			sc->sc_vhid = carpr.carpr_vhid;
1763 			LLADDR(&sc->sc_addr)[0] = 0;
1764 			LLADDR(&sc->sc_addr)[1] = 0;
1765 			LLADDR(&sc->sc_addr)[2] = 0x5e;
1766 			LLADDR(&sc->sc_addr)[3] = 0;
1767 			LLADDR(&sc->sc_addr)[4] = 1;
1768 			LLADDR(&sc->sc_addr)[5] = sc->sc_vhid;
1769 		} else
1770 			CARP_LOCK(sc);
1771 		locked = 1;
1772 		if (carpr.carpr_advbase > 0) {
1773 			if (carpr.carpr_advbase > 255 ||
1774 			    carpr.carpr_advbase < CARP_DFLTINTV) {
1775 				error = EINVAL;
1776 				break;
1777 			}
1778 			sc->sc_advbase = carpr.carpr_advbase;
1779 		}
1780 		if (carpr.carpr_advskew >= 255) {
1781 			error = EINVAL;
1782 			break;
1783 		}
1784 		sc->sc_advskew = carpr.carpr_advskew;
1785 		if (carpr.carpr_key[0] != '\0') {
1786 			bcopy(carpr.carpr_key, sc->sc_key, sizeof(sc->sc_key));
1787 			carp_hmac_prepare(sc);
1788 		}
1789 		if (sc->sc_state != INIT &&
1790 		    carpr.carpr_state != sc->sc_state) {
1791 			switch (carpr.carpr_state) {
1792 			case BACKUP:
1793 				callout_stop(&sc->sc_ad_tmo);
1794 				carp_set_state(sc, BACKUP,
1795 				    "user requested via ifconfig");
1796 				carp_setrun(sc, 0);
1797 				carp_delroute(sc);
1798 				break;
1799 			case MASTER:
1800 				carp_master_down_locked(sc,
1801 				    "user requested via ifconfig");
1802 				break;
1803 			default:
1804 				break;
1805 			}
1806 		}
1807 		break;
1808 
1809 	case SIOCGVH:
1810 	    {
1811 		int priveleged;
1812 
1813 		if (carpr.carpr_vhid < 0 || carpr.carpr_vhid > CARP_MAXVHID) {
1814 			error = EINVAL;
1815 			break;
1816 		}
1817 		if (carpr.carpr_count < 1) {
1818 			error = EMSGSIZE;
1819 			break;
1820 		}
1821 		if (ifp->if_carp == NULL) {
1822 			error = ENOENT;
1823 			break;
1824 		}
1825 
1826 		priveleged = (priv_check(td, PRIV_NETINET_CARP) == 0);
1827 		if (carpr.carpr_vhid != 0) {
1828 			IFNET_FOREACH_CARP(ifp, sc)
1829 				if (sc->sc_vhid == carpr.carpr_vhid)
1830 					break;
1831 			if (sc == NULL) {
1832 				error = ENOENT;
1833 				break;
1834 			}
1835 			carp_carprcp(&carpr, sc, priveleged);
1836 			error = copyout(&carpr, ifr_data_get_ptr(ifr),
1837 			    sizeof(carpr));
1838 		} else  {
1839 			int i, count;
1840 
1841 			count = 0;
1842 			IFNET_FOREACH_CARP(ifp, sc)
1843 				count++;
1844 
1845 			if (count > carpr.carpr_count) {
1846 				CIF_UNLOCK(ifp->if_carp);
1847 				error = EMSGSIZE;
1848 				break;
1849 			}
1850 
1851 			i = 0;
1852 			IFNET_FOREACH_CARP(ifp, sc) {
1853 				carp_carprcp(&carpr, sc, priveleged);
1854 				carpr.carpr_count = count;
1855 				error = copyout(&carpr,
1856 				    (char *)ifr_data_get_ptr(ifr) +
1857 				    (i * sizeof(carpr)), sizeof(carpr));
1858 				if (error) {
1859 					CIF_UNLOCK(ifp->if_carp);
1860 					break;
1861 				}
1862 				i++;
1863 			}
1864 		}
1865 		break;
1866 	    }
1867 	default:
1868 		error = EINVAL;
1869 	}
1870 	sx_xunlock(&carp_sx);
1871 
1872 out:
1873 	if (locked)
1874 		CARP_UNLOCK(sc);
1875 	if_rele(ifp);
1876 
1877 	return (error);
1878 }
1879 
1880 static int
1881 carp_get_vhid(struct ifaddr *ifa)
1882 {
1883 
1884 	if (ifa == NULL || ifa->ifa_carp == NULL)
1885 		return (0);
1886 
1887 	return (ifa->ifa_carp->sc_vhid);
1888 }
1889 
1890 int
1891 carp_attach(struct ifaddr *ifa, int vhid)
1892 {
1893 	struct ifnet *ifp = ifa->ifa_ifp;
1894 	struct carp_if *cif = ifp->if_carp;
1895 	struct carp_softc *sc;
1896 	int index, error;
1897 
1898 	KASSERT(ifa->ifa_carp == NULL, ("%s: ifa %p attached", __func__, ifa));
1899 
1900 	switch (ifa->ifa_addr->sa_family) {
1901 #ifdef INET
1902 	case AF_INET:
1903 #endif
1904 #ifdef INET6
1905 	case AF_INET6:
1906 #endif
1907 		break;
1908 	default:
1909 		return (EPROTOTYPE);
1910 	}
1911 
1912 	sx_xlock(&carp_sx);
1913 	if (ifp->if_carp == NULL) {
1914 		sx_xunlock(&carp_sx);
1915 		return (ENOPROTOOPT);
1916 	}
1917 
1918 	IFNET_FOREACH_CARP(ifp, sc)
1919 		if (sc->sc_vhid == vhid)
1920 			break;
1921 	if (sc == NULL) {
1922 		sx_xunlock(&carp_sx);
1923 		return (ENOENT);
1924 	}
1925 
1926 	error = carp_multicast_setup(cif, ifa->ifa_addr->sa_family);
1927 	if (error) {
1928 		CIF_FREE(cif);
1929 		sx_xunlock(&carp_sx);
1930 		return (error);
1931 	}
1932 
1933 	index = sc->sc_naddrs + sc->sc_naddrs6 + 1;
1934 	if (index > sc->sc_ifasiz / sizeof(struct ifaddr *))
1935 		carp_grow_ifas(sc);
1936 
1937 	switch (ifa->ifa_addr->sa_family) {
1938 #ifdef INET
1939 	case AF_INET:
1940 		cif->cif_naddrs++;
1941 		sc->sc_naddrs++;
1942 		break;
1943 #endif
1944 #ifdef INET6
1945 	case AF_INET6:
1946 		cif->cif_naddrs6++;
1947 		sc->sc_naddrs6++;
1948 		break;
1949 #endif
1950 	}
1951 
1952 	ifa_ref(ifa);
1953 
1954 	CARP_LOCK(sc);
1955 	sc->sc_ifas[index - 1] = ifa;
1956 	ifa->ifa_carp = sc;
1957 	carp_hmac_prepare(sc);
1958 	carp_sc_state(sc);
1959 	CARP_UNLOCK(sc);
1960 
1961 	sx_xunlock(&carp_sx);
1962 
1963 	return (0);
1964 }
1965 
1966 void
1967 carp_detach(struct ifaddr *ifa, bool keep_cif)
1968 {
1969 	struct ifnet *ifp = ifa->ifa_ifp;
1970 	struct carp_if *cif = ifp->if_carp;
1971 	struct carp_softc *sc = ifa->ifa_carp;
1972 	int i, index;
1973 
1974 	KASSERT(sc != NULL, ("%s: %p not attached", __func__, ifa));
1975 
1976 	sx_xlock(&carp_sx);
1977 
1978 	CARP_LOCK(sc);
1979 	/* Shift array. */
1980 	index = sc->sc_naddrs + sc->sc_naddrs6;
1981 	for (i = 0; i < index; i++)
1982 		if (sc->sc_ifas[i] == ifa)
1983 			break;
1984 	KASSERT(i < index, ("%s: %p no backref", __func__, ifa));
1985 	for (; i < index - 1; i++)
1986 		sc->sc_ifas[i] = sc->sc_ifas[i+1];
1987 	sc->sc_ifas[index - 1] = NULL;
1988 
1989 	switch (ifa->ifa_addr->sa_family) {
1990 #ifdef INET
1991 	case AF_INET:
1992 		cif->cif_naddrs--;
1993 		sc->sc_naddrs--;
1994 		break;
1995 #endif
1996 #ifdef INET6
1997 	case AF_INET6:
1998 		cif->cif_naddrs6--;
1999 		sc->sc_naddrs6--;
2000 		break;
2001 #endif
2002 	}
2003 
2004 	carp_ifa_delroute(ifa);
2005 	carp_multicast_cleanup(cif, ifa->ifa_addr->sa_family);
2006 
2007 	ifa->ifa_carp = NULL;
2008 	ifa_free(ifa);
2009 
2010 	carp_hmac_prepare(sc);
2011 	carp_sc_state(sc);
2012 
2013 	if (!keep_cif && sc->sc_naddrs == 0 && sc->sc_naddrs6 == 0)
2014 		carp_destroy(sc);
2015 	else
2016 		CARP_UNLOCK(sc);
2017 
2018 	if (!keep_cif)
2019 		CIF_FREE(cif);
2020 
2021 	sx_xunlock(&carp_sx);
2022 }
2023 
2024 static void
2025 carp_set_state(struct carp_softc *sc, int state, const char *reason)
2026 {
2027 
2028 	CARP_LOCK_ASSERT(sc);
2029 
2030 	if (sc->sc_state != state) {
2031 		const char *carp_states[] = { CARP_STATES };
2032 		char subsys[IFNAMSIZ+5];
2033 
2034 		snprintf(subsys, IFNAMSIZ+5, "%u@%s", sc->sc_vhid,
2035 		    sc->sc_carpdev->if_xname);
2036 
2037 		CARP_LOG("%s: %s -> %s (%s)\n", subsys,
2038 		    carp_states[sc->sc_state], carp_states[state], reason);
2039 
2040 		sc->sc_state = state;
2041 
2042 		devctl_notify("CARP", subsys, carp_states[state], NULL);
2043 	}
2044 }
2045 
2046 static void
2047 carp_linkstate(struct ifnet *ifp)
2048 {
2049 	struct carp_softc *sc;
2050 
2051 	CIF_LOCK(ifp->if_carp);
2052 	IFNET_FOREACH_CARP(ifp, sc) {
2053 		CARP_LOCK(sc);
2054 		carp_sc_state(sc);
2055 		CARP_UNLOCK(sc);
2056 	}
2057 	CIF_UNLOCK(ifp->if_carp);
2058 }
2059 
2060 static void
2061 carp_sc_state(struct carp_softc *sc)
2062 {
2063 
2064 	CARP_LOCK_ASSERT(sc);
2065 
2066 	if (sc->sc_carpdev->if_link_state != LINK_STATE_UP ||
2067 	    !(sc->sc_carpdev->if_flags & IFF_UP) ||
2068 	    !V_carp_allow) {
2069 		callout_stop(&sc->sc_ad_tmo);
2070 #ifdef INET
2071 		callout_stop(&sc->sc_md_tmo);
2072 #endif
2073 #ifdef INET6
2074 		callout_stop(&sc->sc_md6_tmo);
2075 #endif
2076 		carp_set_state(sc, INIT, "hardware interface down");
2077 		carp_setrun(sc, 0);
2078 		if (!sc->sc_suppress)
2079 			carp_demote_adj(V_carp_ifdown_adj, "interface down");
2080 		sc->sc_suppress = 1;
2081 	} else {
2082 		carp_set_state(sc, INIT, "hardware interface up");
2083 		carp_setrun(sc, 0);
2084 		if (sc->sc_suppress)
2085 			carp_demote_adj(-V_carp_ifdown_adj, "interface up");
2086 		sc->sc_suppress = 0;
2087 	}
2088 }
2089 
2090 static void
2091 carp_demote_adj(int adj, char *reason)
2092 {
2093 	atomic_add_int(&V_carp_demotion, adj);
2094 	CARP_LOG("demoted by %d to %d (%s)\n", adj, V_carp_demotion, reason);
2095 	taskqueue_enqueue(taskqueue_swi, &carp_sendall_task);
2096 }
2097 
2098 static int
2099 carp_allow_sysctl(SYSCTL_HANDLER_ARGS)
2100 {
2101 	int new, error;
2102 	struct carp_softc *sc;
2103 
2104 	new = V_carp_allow;
2105 	error = sysctl_handle_int(oidp, &new, 0, req);
2106 	if (error || !req->newptr)
2107 		return (error);
2108 
2109 	if (V_carp_allow != new) {
2110 		V_carp_allow = new;
2111 
2112 		mtx_lock(&carp_mtx);
2113 		LIST_FOREACH(sc, &carp_list, sc_next) {
2114 			CARP_LOCK(sc);
2115 			if (curvnet == sc->sc_carpdev->if_vnet)
2116 				carp_sc_state(sc);
2117 			CARP_UNLOCK(sc);
2118 		}
2119 		mtx_unlock(&carp_mtx);
2120 	}
2121 
2122 	return (0);
2123 }
2124 
2125 static int
2126 carp_dscp_sysctl(SYSCTL_HANDLER_ARGS)
2127 {
2128 	int new, error;
2129 
2130 	new = V_carp_dscp;
2131 	error = sysctl_handle_int(oidp, &new, 0, req);
2132 	if (error || !req->newptr)
2133 		return (error);
2134 
2135 	if (new < 0 || new > 63)
2136 		return (EINVAL);
2137 
2138 	V_carp_dscp = new;
2139 
2140 	return (0);
2141 }
2142 
2143 static int
2144 carp_demote_adj_sysctl(SYSCTL_HANDLER_ARGS)
2145 {
2146 	int new, error;
2147 
2148 	new = V_carp_demotion;
2149 	error = sysctl_handle_int(oidp, &new, 0, req);
2150 	if (error || !req->newptr)
2151 		return (error);
2152 
2153 	carp_demote_adj(new, "sysctl");
2154 
2155 	return (0);
2156 }
2157 
2158 #ifdef INET
2159 extern  struct domain inetdomain;
2160 static struct protosw in_carp_protosw = {
2161 	.pr_type =		SOCK_RAW,
2162 	.pr_domain =		&inetdomain,
2163 	.pr_protocol =		IPPROTO_CARP,
2164 	.pr_flags =		PR_ATOMIC|PR_ADDR,
2165 	.pr_input =		carp_input,
2166 	.pr_output =		rip_output,
2167 	.pr_ctloutput =		rip_ctloutput,
2168 	.pr_usrreqs =		&rip_usrreqs
2169 };
2170 #endif
2171 
2172 #ifdef INET6
2173 extern	struct domain inet6domain;
2174 static struct protosw in6_carp_protosw = {
2175 	.pr_type =		SOCK_RAW,
2176 	.pr_domain =		&inet6domain,
2177 	.pr_protocol =		IPPROTO_CARP,
2178 	.pr_flags =		PR_ATOMIC|PR_ADDR,
2179 	.pr_input =		carp6_input,
2180 	.pr_output =		rip6_output,
2181 	.pr_ctloutput =		rip6_ctloutput,
2182 	.pr_usrreqs =		&rip6_usrreqs
2183 };
2184 #endif
2185 
2186 static void
2187 carp_mod_cleanup(void)
2188 {
2189 
2190 #ifdef INET
2191 	if (proto_reg[CARP_INET] == 0) {
2192 		(void)ipproto_unregister(IPPROTO_CARP);
2193 		pf_proto_unregister(PF_INET, IPPROTO_CARP, SOCK_RAW);
2194 		proto_reg[CARP_INET] = -1;
2195 	}
2196 	carp_iamatch_p = NULL;
2197 #endif
2198 #ifdef INET6
2199 	if (proto_reg[CARP_INET6] == 0) {
2200 		(void)ip6proto_unregister(IPPROTO_CARP);
2201 		pf_proto_unregister(PF_INET6, IPPROTO_CARP, SOCK_RAW);
2202 		proto_reg[CARP_INET6] = -1;
2203 	}
2204 	carp_iamatch6_p = NULL;
2205 	carp_macmatch6_p = NULL;
2206 #endif
2207 	carp_ioctl_p = NULL;
2208 	carp_attach_p = NULL;
2209 	carp_detach_p = NULL;
2210 	carp_get_vhid_p = NULL;
2211 	carp_linkstate_p = NULL;
2212 	carp_forus_p = NULL;
2213 	carp_output_p = NULL;
2214 	carp_demote_adj_p = NULL;
2215 	carp_master_p = NULL;
2216 	mtx_unlock(&carp_mtx);
2217 	taskqueue_drain(taskqueue_swi, &carp_sendall_task);
2218 	mtx_destroy(&carp_mtx);
2219 	sx_destroy(&carp_sx);
2220 }
2221 
2222 static int
2223 carp_mod_load(void)
2224 {
2225 	int err;
2226 
2227 	mtx_init(&carp_mtx, "carp_mtx", NULL, MTX_DEF);
2228 	sx_init(&carp_sx, "carp_sx");
2229 	LIST_INIT(&carp_list);
2230 	carp_get_vhid_p = carp_get_vhid;
2231 	carp_forus_p = carp_forus;
2232 	carp_output_p = carp_output;
2233 	carp_linkstate_p = carp_linkstate;
2234 	carp_ioctl_p = carp_ioctl;
2235 	carp_attach_p = carp_attach;
2236 	carp_detach_p = carp_detach;
2237 	carp_demote_adj_p = carp_demote_adj;
2238 	carp_master_p = carp_master;
2239 #ifdef INET6
2240 	carp_iamatch6_p = carp_iamatch6;
2241 	carp_macmatch6_p = carp_macmatch6;
2242 	proto_reg[CARP_INET6] = pf_proto_register(PF_INET6,
2243 	    (struct protosw *)&in6_carp_protosw);
2244 	if (proto_reg[CARP_INET6]) {
2245 		printf("carp: error %d attaching to PF_INET6\n",
2246 		    proto_reg[CARP_INET6]);
2247 		carp_mod_cleanup();
2248 		return (proto_reg[CARP_INET6]);
2249 	}
2250 	err = ip6proto_register(IPPROTO_CARP);
2251 	if (err) {
2252 		printf("carp: error %d registering with INET6\n", err);
2253 		carp_mod_cleanup();
2254 		return (err);
2255 	}
2256 #endif
2257 #ifdef INET
2258 	carp_iamatch_p = carp_iamatch;
2259 	proto_reg[CARP_INET] = pf_proto_register(PF_INET, &in_carp_protosw);
2260 	if (proto_reg[CARP_INET]) {
2261 		printf("carp: error %d attaching to PF_INET\n",
2262 		    proto_reg[CARP_INET]);
2263 		carp_mod_cleanup();
2264 		return (proto_reg[CARP_INET]);
2265 	}
2266 	err = ipproto_register(IPPROTO_CARP);
2267 	if (err) {
2268 		printf("carp: error %d registering with INET\n", err);
2269 		carp_mod_cleanup();
2270 		return (err);
2271 	}
2272 #endif
2273 	return (0);
2274 }
2275 
2276 static int
2277 carp_modevent(module_t mod, int type, void *data)
2278 {
2279 	switch (type) {
2280 	case MOD_LOAD:
2281 		return carp_mod_load();
2282 		/* NOTREACHED */
2283 	case MOD_UNLOAD:
2284 		mtx_lock(&carp_mtx);
2285 		if (LIST_EMPTY(&carp_list))
2286 			carp_mod_cleanup();
2287 		else {
2288 			mtx_unlock(&carp_mtx);
2289 			return (EBUSY);
2290 		}
2291 		break;
2292 
2293 	default:
2294 		return (EINVAL);
2295 	}
2296 
2297 	return (0);
2298 }
2299 
2300 static moduledata_t carp_mod = {
2301 	"carp",
2302 	carp_modevent,
2303 	0
2304 };
2305 
2306 DECLARE_MODULE(carp, carp_mod, SI_SUB_PROTO_DOMAIN, SI_ORDER_ANY);
2307