xref: /illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ifconfig/ifconfig.c (revision 8e718be9d8b2bb15811a2dc0b61cbb5cc5fa3070)
1 /*
2  * Copyright (c) 1990, 2010, Oracle and/or its affiliates. All rights reserved.
3  * Copyright 2012, Daniil Lunev. All rights reserved.
4  * Copyright 2014, OmniTI Computer Consulting, Inc. All rights reserved.
5  */
6 /*
7  * Copyright (c) 1983 Regents of the University of California.
8  * All rights reserved.  The Berkeley software License Agreement
9  * specifies the terms and conditions for redistribution.
10  */
11 
12 #include "defs.h"
13 #include "strings.h"
14 #include "ifconfig.h"
15 #include <compat.h>
16 #include <libdlpi.h>
17 #include <libdllink.h>
18 #include <libdliptun.h>
19 #include <libdllink.h>
20 #include <inet/ip.h>
21 #include <inet/ipsec_impl.h>
22 #include <libipadm.h>
23 #include <ifaddrs.h>
24 #include <libsocket_priv.h>
25 
26 #define	LOOPBACK_IF	"lo0"
27 #define	NONE_STR	"none"
28 #define	ARP_MOD_NAME	"arp"
29 #define	LIFC_DEFAULT	(LIFC_NOXMIT | LIFC_TEMPORARY | LIFC_ALLZONES |\
30 			LIFC_UNDER_IPMP)
31 
32 typedef struct if_flags {
33 	uint64_t iff_value;
34 	char	*iff_name;
35 } if_flags_t;
36 
37 static if_flags_t	if_flags_tbl[] = {
38 	{ IFF_UP,		"UP" },
39 	{ IFF_BROADCAST,	"BROADCAST" },
40 	{ IFF_DEBUG,		"DEBUG" },
41 	{ IFF_LOOPBACK,		"LOOPBACK" },
42 	{ IFF_POINTOPOINT,	"POINTOPOINT" },
43 	{ IFF_NOTRAILERS,	"NOTRAILERS" },
44 	{ IFF_RUNNING,		"RUNNING" },
45 	{ IFF_NOARP,		"NOARP" },
46 	{ IFF_PROMISC,		"PROMISC" },
47 	{ IFF_ALLMULTI,		"ALLMULTI" },
48 	{ IFF_INTELLIGENT,	"INTELLIGENT" },
49 	{ IFF_MULTICAST,	"MULTICAST" },
50 	{ IFF_MULTI_BCAST,	"MULTI_BCAST" },
51 	{ IFF_UNNUMBERED,	"UNNUMBERED" },
52 	{ IFF_DHCPRUNNING,	"DHCP" },
53 	{ IFF_PRIVATE,		"PRIVATE" },
54 	{ IFF_NOXMIT,		"NOXMIT" },
55 	{ IFF_NOLOCAL,		"NOLOCAL" },
56 	{ IFF_DEPRECATED,	"DEPRECATED" },
57 	{ IFF_ADDRCONF,		"ADDRCONF" },
58 	{ IFF_ROUTER,		"ROUTER" },
59 	{ IFF_NONUD,		"NONUD" },
60 	{ IFF_ANYCAST,		"ANYCAST" },
61 	{ IFF_NORTEXCH,		"NORTEXCH" },
62 	{ IFF_IPV4,		"IPv4" },
63 	{ IFF_IPV6,		"IPv6" },
64 	{ IFF_NOFAILOVER,	"NOFAILOVER" },
65 	{ IFF_FAILED,		"FAILED" },
66 	{ IFF_STANDBY,		"STANDBY" },
67 	{ IFF_INACTIVE,		"INACTIVE" },
68 	{ IFF_OFFLINE,		"OFFLINE" },
69 	{ IFF_XRESOLV,		"XRESOLV" },
70 	{ IFF_COS_ENABLED,	"CoS" },
71 	{ IFF_PREFERRED,	"PREFERRED" },
72 	{ IFF_TEMPORARY,	"TEMPORARY" },
73 	{ IFF_FIXEDMTU,		"FIXEDMTU" },
74 	{ IFF_VIRTUAL,		"VIRTUAL" },
75 	{ IFF_DUPLICATE,	"DUPLICATE" },
76 	{ IFF_IPMP,		"IPMP"},
77 	{ IFF_VRRP,		"VRRP"},
78 	{ IFF_NOACCEPT,		"NOACCEPT"},
79 	{ IFF_L3PROTECT,	"L3PROTECT"}
80 };
81 
82 typedef struct {
83 	const char		*ia_app;
84 	uint64_t		ia_flag;
85 	uint_t			ia_tries;
86 } if_appflags_t;
87 
88 static const if_appflags_t if_appflags_tbl[] = {
89 	{ "dhcpagent(1M)",	IFF_DHCPRUNNING,	1 },
90 	{ "in.ndpd(1M)",	IFF_ADDRCONF,		3 },
91 	{  NULL,		0,			0 }
92 };
93 
94 static dladm_handle_t	dlh;
95 boolean_t		dlh_opened;
96 static struct		lifreq lifr;
97 /* current interface name a particular function is accessing */
98 static char		name[LIFNAMSIZ];
99 /* foreach interface saved name */
100 static char		origname[LIFNAMSIZ];
101 static int		setaddr;
102 static boolean_t	setaddr_done = _B_FALSE;
103 static boolean_t	ipsec_policy_set;
104 static boolean_t	ipsec_auth_covered;
105 static ipadm_handle_t	iph;
106 static ipadm_addrobj_t	ipaddr;
107 
108 /*
109  * Make sure the algorithm variables hold more than the sizeof an algorithm
110  * in PF_KEY.  (For now, more than a uint8_t.)  The NO_***_?ALG indicates that
111  * there was no algorithm requested, and in the ipsec_req that service should
112  * be disabled.  (E.g. if ah_aalg remains NO_AH_AALG, then AH will be
113  * disabled on that tunnel.)
114  */
115 #define	NO_AH_AALG 256
116 #define	NO_ESP_AALG 256
117 #define	NO_ESP_EALG 256
118 
119 int	s, s4, s6;
120 int	af = AF_INET;	/* default address family */
121 int	debug = 0;
122 int	all = 0;	/* setifdhcp() needs to know this */
123 int	verbose = 0;
124 int	v4compat = 0;	/* Compatible printing format */
125 
126 /*
127  * Function prototypes for command functions.
128  */
129 static int	addif(char *arg, int64_t param);
130 static int	inetipmp(char *arg, int64_t param);
131 static int	inetplumb(char *arg, int64_t param);
132 static int	inetunplumb(char *arg, int64_t param);
133 static int	removeif(char *arg, int64_t param);
134 static int	setdebugflag(char *arg, int64_t param);
135 static int	setifaddr(char *arg, int64_t param);
136 static int	setifbroadaddr(char *arg, int64_t param);
137 static int	setifdstaddr(char *arg, int64_t param);
138 static int	setifether(char *arg, int64_t param);
139 static int	setifflags(char *arg, int64_t param);
140 static int	setifindex(char *arg, int64_t param);
141 static int	setifmetric(char *arg, int64_t param);
142 static int	setifmtu(char *arg, int64_t param);
143 static int	setifnetmask(char *arg, int64_t param);
144 static int	setifprefixlen(char *arg, int64_t param);
145 static int	setifrevarp(char *arg, int64_t param);
146 static int	setifsubnet(char *arg, int64_t param);
147 static int	setiftdst(char *arg, int64_t param);
148 static int	setiftoken(char *arg, int64_t param);
149 static int	setiftsrc(char *arg, int64_t param);
150 static int	setverboseflag(char *arg, int64_t param);
151 static int	set_tun_ah_alg(char *arg, int64_t param);
152 static int	set_tun_esp_auth_alg(char *arg, int64_t param);
153 static int	set_tun_esp_encr_alg(char *arg, int64_t param);
154 static int	modlist(char *arg, int64_t param);
155 static int	modinsert(char *arg, int64_t param);
156 static int	modremove(char *arg, int64_t param);
157 static int	setifgroupname(char *arg, int64_t param);
158 static int	configinfo(char *arg, int64_t param);
159 static void	print_config_flags(int af, uint64_t flags);
160 static void	print_flags(uint64_t flags);
161 static void	print_ifether(const char *ifname);
162 static int	set_tun_encap_limit(char *arg, int64_t param);
163 static int	clr_tun_encap_limit(char *arg, int64_t param);
164 static int	set_tun_hop_limit(char *arg, int64_t param);
165 static int	setzone(char *arg, int64_t param);
166 static int	setallzones(char *arg, int64_t param);
167 static int	setifsrc(char *arg, int64_t param);
168 static int	lifnum(const char *ifname);
169 static void	plumball(int, char **, int64_t, int64_t, int64_t);
170 
171 /*
172  * Address family specific function prototypes.
173  */
174 static void	in_getaddr(char *s, struct sockaddr *saddr, int *plenp);
175 static void	in_status(int force, uint64_t flags);
176 static void	in_configinfo(int force, uint64_t flags);
177 static void	in6_getaddr(char *s, struct sockaddr *saddr, int *plenp);
178 static void	in6_status(int force, uint64_t flags);
179 static void	in6_configinfo(int force, uint64_t flags);
180 
181 /*
182  * Misc support functions
183  */
184 static boolean_t	ni_entry(const char *, void *);
185 static void		foreachinterface(int argc, char *argv[],
186 			    int af, int64_t onflags, int64_t offflags,
187 			    int64_t lifc_flags);
188 static void		ifconfig(int argc, char *argv[], int af,
189 			    struct ifaddrs *ifa);
190 static boolean_t	in_getmask(struct sockaddr_in *saddr,
191 			    boolean_t addr_set);
192 static int		in_getprefixlen(char *addr, boolean_t slash, int plen);
193 static boolean_t	in_prefixlentomask(int prefixlen, int maxlen,
194 			    uchar_t *mask);
195 static void		status(void);
196 static void		ifstatus(const char *ifname);
197 static void		tun_status(datalink_id_t);
198 static void		usage(void);
199 static int		setifdhcp(const char *caller, const char *ifname,
200 			    int argc, char *argv[]);
201 static int		ip_domux2fd(int *, int *, int *, int *, int *);
202 static int		ip_plink(int, int, int, int, int);
203 static int		modop(char *arg, char op);
204 static int		find_all_interfaces(struct lifconf *lifcp, char **buf,
205 			    int64_t lifc_flags);
206 static int		create_ipmp(const char *grname, int af,
207 			    const char *ifname, boolean_t implicit);
208 static void		start_ipmp_daemon(void);
209 static boolean_t 	ifaddr_up(ifaddrlistx_t *ifaddrp);
210 static boolean_t 	ifaddr_down(ifaddrlistx_t *ifaddrp);
211 static dladm_status_t	ifconfig_dladm_open(const char *, datalink_class_t,
212 			    datalink_id_t *);
213 static void		dladmerr_exit(dladm_status_t status, const char *str);
214 static void		ipadmerr_exit(ipadm_status_t status, const char *str);
215 static boolean_t	ifconfig_use_libipadm(int, const char *);
216 void			Perror0_exit(const char *cmd) __NORETURN;
217 
218 #define	max(a, b)	((a) < (b) ? (b) : (a))
219 
220 /*
221  * DHCP_EXIT_IF_FAILURE indicates that the operation failed, but if there
222  * are more interfaces to act on (i.e., ifconfig was invoked with -a), keep
223  * on going rather than exit with an error.
224  */
225 
226 #define	DHCP_EXIT_IF_FAILURE	-1
227 
228 #define	NEXTARG		0xffffff	/* command takes an argument */
229 #define	OPTARG		0xfffffe 	/* command takes an optional argument */
230 #define	AF_ANY		(-1)
231 
232 /* Refer to the comments in ifconfig() on the netmask "hack" */
233 #define	NETMASK_CMD	"netmask"
234 struct sockaddr_storage	g_netmask;
235 enum { G_NETMASK_NIL, G_NETMASK_PENDING, G_NETMASK_SET }
236     g_netmask_set = G_NETMASK_NIL;
237 
238 struct	cmd {
239 	char		*c_name;
240 	int64_t		c_parameter;	/* NEXTARG means next argv */
241 	int		(*c_func)(char *, int64_t);
242 	int		c_abortonfail;	/* don't continue parsing args */
243 					/* for the current interface */
244 	int	c_af;			/* address family restrictions */
245 } cmds[] = {
246 	{ "up",		IFF_UP,		setifflags,	0,	AF_ANY },
247 	{ "down",	-IFF_UP,	setifflags,	0,	AF_ANY },
248 	{ "trailers",	-IFF_NOTRAILERS, setifflags,	0,	AF_ANY },
249 	{ "-trailers",	IFF_NOTRAILERS,	setifflags,	0,	AF_ANY },
250 	{ "arp",	-IFF_NOARP,	setifflags,	0,	AF_INET },
251 	{ "-arp",	IFF_NOARP,	setifflags,	0,	AF_INET },
252 	{ "router",	IFF_ROUTER,	setifflags,	0,	AF_ANY },
253 	{ "-router",	-IFF_ROUTER,	setifflags,	0,	AF_ANY },
254 	{ "private",	IFF_PRIVATE,	setifflags,	0,	AF_ANY },
255 	{ "-private",	-IFF_PRIVATE,	setifflags,	0,	AF_ANY },
256 	{ "xmit",	-IFF_NOXMIT,	setifflags,	0,	AF_ANY },
257 	{ "-xmit",	IFF_NOXMIT,	setifflags,	0,	AF_ANY },
258 	{ "-nud",	IFF_NONUD,	setifflags,	0,	AF_INET6 },
259 	{ "nud",	-IFF_NONUD,	setifflags,	0,	AF_INET6 },
260 	{ "anycast",	IFF_ANYCAST,	setifflags,	0,	AF_ANY },
261 	{ "-anycast",	-IFF_ANYCAST,	setifflags,	0,	AF_ANY },
262 	{ "local",	-IFF_NOLOCAL,	setifflags,	0,	AF_ANY },
263 	{ "-local",	IFF_NOLOCAL,	setifflags,	0,	AF_ANY },
264 	{ "deprecated",	IFF_DEPRECATED,	setifflags,	0,	AF_ANY },
265 	{ "-deprecated", -IFF_DEPRECATED, setifflags,	0,	AF_ANY },
266 	{ "preferred",	IFF_PREFERRED,	setifflags,	0,	AF_INET6 },
267 	{ "-preferred",	-IFF_PREFERRED,	setifflags,	0,	AF_INET6 },
268 	{ "debug",	0,		setdebugflag,	0,	AF_ANY },
269 	{ "verbose",	0,		setverboseflag,	0,	AF_ANY },
270 	{ NETMASK_CMD,	NEXTARG,	setifnetmask,	0,	AF_INET },
271 	{ "metric",	NEXTARG,	setifmetric,	0,	AF_ANY },
272 	{ "mtu",	NEXTARG,	setifmtu,	0,	AF_ANY },
273 	{ "index",	NEXTARG,	setifindex,	0,	AF_ANY },
274 	{ "broadcast",	NEXTARG,	setifbroadaddr,	0,	AF_INET },
275 	{ "auto-revarp", 0,		setifrevarp,	1,	AF_INET },
276 	{ "ipmp",	0,		inetipmp,	1,	AF_ANY },
277 	{ "plumb",	0,		inetplumb,	1,	AF_ANY },
278 	{ "unplumb",	0,		inetunplumb,	0,	AF_ANY },
279 	{ "subnet",	NEXTARG,	setifsubnet,	0,	AF_ANY },
280 	{ "token",	NEXTARG,	setiftoken,	0,	AF_INET6 },
281 	{ "tsrc",	NEXTARG,	setiftsrc,	0,	AF_ANY },
282 	{ "tdst",	NEXTARG,	setiftdst,	0,	AF_ANY },
283 	{ "encr_auth_algs", NEXTARG,	set_tun_esp_auth_alg, 0, AF_ANY },
284 	{ "encr_algs",	NEXTARG,	set_tun_esp_encr_alg, 0, AF_ANY },
285 	{ "auth_algs",	NEXTARG,	set_tun_ah_alg,	0,	AF_ANY },
286 	{ "addif",	NEXTARG,	addif,		1,	AF_ANY },
287 	{ "removeif",	NEXTARG,	removeif,	1,	AF_ANY },
288 	{ "modlist",	0,		modlist,	1,	AF_ANY },
289 	{ "modinsert",	NEXTARG,	modinsert,	1,	AF_ANY },
290 	{ "modremove",	NEXTARG,	modremove,	1,	AF_ANY },
291 	{ "failover",	-IFF_NOFAILOVER, setifflags,	1,	AF_ANY },
292 	{ "-failover",	IFF_NOFAILOVER, setifflags,	1,	AF_ANY },
293 	{ "standby",	IFF_STANDBY,	setifflags,	1,	AF_ANY },
294 	{ "-standby",	-IFF_STANDBY,	setifflags,	1,	AF_ANY },
295 	{ "failed",	IFF_FAILED,	setifflags,	1,	AF_ANY },
296 	{ "-failed",	-IFF_FAILED,	setifflags,	1,	AF_ANY },
297 	{ "group",	NEXTARG,	setifgroupname,	1,	AF_ANY },
298 	{ "configinfo",	0,		configinfo,	1,	AF_ANY },
299 	{ "encaplimit",	NEXTARG,	set_tun_encap_limit,	0, AF_ANY },
300 	{ "-encaplimit", 0,		clr_tun_encap_limit,	0, AF_ANY },
301 	{ "thoplimit",	NEXTARG,	set_tun_hop_limit,	0, AF_ANY },
302 	{ "set",	NEXTARG,	setifaddr,	0,	AF_ANY },
303 	{ "destination", NEXTARG,	setifdstaddr,	0,	AF_ANY },
304 	{ "zone",	NEXTARG,	setzone,	0,	AF_ANY },
305 	{ "-zone",	0,		setzone,	0,	AF_ANY },
306 	{ "all-zones",	0,		setallzones,	0,	AF_ANY },
307 	{ "ether",	OPTARG,		setifether,	0,	AF_ANY },
308 	{ "usesrc",	NEXTARG,	setifsrc,	0,	AF_ANY },
309 
310 	/*
311 	 * NOTE: any additions to this table must also be applied to ifparse
312 	 *	(usr/src/cmd/cmd-inet/sbin/ifparse/ifparse.c)
313 	 */
314 
315 	{ 0,		0,		setifaddr,	0,	AF_ANY },
316 	{ 0,		0,		setifdstaddr,	0,	AF_ANY },
317 	{ 0,		0,		0,		0,	0 },
318 };
319 
320 
321 typedef struct if_config_cmd {
322 	uint64_t	iff_flag;
323 	int		iff_af;
324 	char		*iff_name;
325 } if_config_cmd_t;
326 
327 /*
328  * NOTE: print_config_flags() processes this table in order, so we put "up"
329  * last so that we can be sure "-failover" will take effect first.  Otherwise,
330  * IPMP test addresses will erroneously migrate to the IPMP interface.
331  */
332 static if_config_cmd_t	if_config_cmd_tbl[] = {
333 	{ IFF_NOTRAILERS,	AF_UNSPEC,	"-trailers"	},
334 	{ IFF_PRIVATE,		AF_UNSPEC,	"private"	},
335 	{ IFF_NOXMIT,		AF_UNSPEC,	"-xmit"		},
336 	{ IFF_ANYCAST,		AF_INET6,	"anycast"	},
337 	{ IFF_NOLOCAL,		AF_UNSPEC,	"-local"	},
338 	{ IFF_DEPRECATED,	AF_UNSPEC,	"deprecated"	},
339 	{ IFF_NOFAILOVER,	AF_UNSPEC,	"-failover"	},
340 	{ IFF_STANDBY,		AF_UNSPEC,	"standby"	},
341 	{ IFF_FAILED,		AF_UNSPEC,	"failed"	},
342 	{ IFF_PREFERRED,	AF_UNSPEC,	"preferred"	},
343 	{ IFF_NONUD,		AF_INET6,	"-nud"		},
344 	{ IFF_NOARP,		AF_INET,	"-arp"		},
345 	{ IFF_UP,		AF_UNSPEC, 	"up" 		},
346 	{ 0,			0,		NULL		},
347 };
348 
349 typedef struct ni {
350 	char		ni_name[LIFNAMSIZ];
351 	struct ni	*ni_next;
352 } ni_t;
353 
354 static ni_t	*ni_list = NULL;
355 static int	num_ni = 0;
356 
357 /* End defines and structure definitions for ifconfig -a plumb */
358 
359 /* Known address families */
360 struct afswtch {
361 	char *af_name;
362 	short af_af;
363 	void (*af_status)();
364 	void (*af_getaddr)();
365 	void (*af_configinfo)();
366 } afs[] = {
367 	{ "inet", AF_INET, in_status, in_getaddr, in_configinfo },
368 	{ "inet6", AF_INET6, in6_status, in6_getaddr, in6_configinfo },
369 	{ 0, 0,	0, 0, 0 }
370 };
371 
372 #define	SOCKET_AF(af)	(((af) == AF_UNSPEC) ? AF_INET : (af))
373 
374 struct afswtch *afp;	/* the address family being set or asked about */
375 
376 int
377 main(int argc, char *argv[])
378 {
379 	int64_t		lifc_flags;
380 	char		*default_ip_str;
381 	ipadm_status_t	istatus;
382 
383 	lifc_flags = LIFC_DEFAULT;
384 
385 	if (argc < 2) {
386 		(void) strncpy(name, "-a", sizeof (name));
387 	} else {
388 		argc--, argv++;
389 		if (strlen(*argv) > sizeof (name) - 1) {
390 			(void) fprintf(stderr, "%s: interface name too long\n",
391 			    *argv);
392 			exit(1);
393 		}
394 		(void) strncpy(name, *argv, sizeof (name));
395 	}
396 	name[sizeof (name) - 1] = '\0';
397 	(void) strncpy(origname, name, sizeof (origname));	/* For addif */
398 	default_ip_str = NULL;
399 	v4compat = get_compat_flag(&default_ip_str);
400 	if (v4compat == DEFAULT_PROT_BAD_VALUE) {
401 		(void) fprintf(stderr,
402 		    "ifconfig: %s: Bad value for %s in %s\n", default_ip_str,
403 		    DEFAULT_IP, INET_DEFAULT_FILE);
404 		free(default_ip_str);
405 		exit(2);
406 	}
407 	free(default_ip_str);
408 	argc--, argv++;
409 	if (argc > 0) {
410 		struct afswtch *myafp;
411 
412 		for (myafp = afp = afs; myafp->af_name; myafp++) {
413 			if (strcmp(myafp->af_name, *argv) == 0) {
414 				afp = myafp; argc--; argv++;
415 				break;
416 			}
417 		}
418 		af = lifr.lifr_addr.ss_family = afp->af_af;
419 		if (af == AF_INET6) {
420 			v4compat = 0;
421 		}
422 	}
423 
424 	s = socket(SOCKET_AF(af), SOCK_DGRAM, 0);
425 	s4 = socket(AF_INET, SOCK_DGRAM, 0);
426 	s6 = socket(AF_INET6, SOCK_DGRAM, 0);
427 	if (s == -1 || s4 == -1 || s6 == -1)
428 		Perror0_exit("socket");
429 	/*
430 	 * Open the global libipadm handle. The flag IPH_LEGACY has to
431 	 * be specified to indicate that logical interface names will
432 	 * be used during interface creation and address creation.
433 	 */
434 	if ((istatus = ipadm_open(&iph, IPH_LEGACY)) != IPADM_SUCCESS)
435 		ipadmerr_exit(istatus, "unable to open handle to libipadm");
436 
437 	/*
438 	 * Special interface names is any combination of these flags.
439 	 * Note that due to the ifconfig syntax they have to be combined
440 	 * as a single '-' option.
441 	 *	-a	All interfaces
442 	 *	-u	"up" interfaces
443 	 *	-d	"down" interfaces
444 	 *	-D	Interfaces not controlled by DHCP
445 	 *	-4	IPv4 interfaces
446 	 *	-6	IPv6 interfaces
447 	 *	-X	Turn on debug (not documented)
448 	 *	-v	Turn on verbose
449 	 *	-Z	Only interfaces in caller's zone
450 	 */
451 
452 	if (name[0] == '-') {
453 		/* One or more options */
454 		int64_t onflags = 0;
455 		int64_t offflags = 0;
456 		int c;
457 		char *av[2] = { "ifconfig", name };
458 
459 		while ((c = getopt(2, av, "audhDXZ46v")) != -1) {
460 			switch ((char)c) {
461 			case 'a':
462 				all = 1;
463 				break;
464 			case 'u':
465 				onflags |= IFF_UP;
466 				break;
467 			case 'd':
468 				offflags |= IFF_UP;
469 				break;
470 			case 'D':
471 				offflags |= IFF_DHCPRUNNING;
472 				break;
473 			case 'X':
474 				debug += 3;
475 				break;
476 			case 'Z':
477 				lifc_flags &= ~LIFC_ALLZONES;
478 				break;
479 			case '4':
480 				/*
481 				 * -4 is not a compatable flag, therefore
482 				 * we assume they want v4compat turned off
483 				 */
484 				v4compat = 0;
485 				onflags |= IFF_IPV4;
486 				break;
487 			case '6':
488 				/*
489 				 * If they want IPv6, well then we'll assume
490 				 * they don't want IPv4 compat
491 				 */
492 				v4compat = 0;
493 				onflags |= IFF_IPV6;
494 				break;
495 			case 'v':
496 				verbose = 1;
497 				break;
498 			case 'h':
499 			case '?':
500 				usage();
501 				exit(1);
502 			}
503 		}
504 		if (!all) {
505 			(void) fprintf(stderr,
506 			    "ifconfig: %s: no such interface\n", name);
507 			exit(1);
508 		}
509 		foreachinterface(argc, argv, af, onflags, offflags,
510 		    lifc_flags);
511 	} else {
512 		ifconfig(argc, argv, af, NULL);
513 	}
514 	ipadm_close(iph);
515 	return (0);
516 }
517 
518 /*
519  * For each interface, call ifconfig(argc, argv, af, ifa).
520  * Only call function if onflags and offflags are set or clear, respectively,
521  * in the interfaces flags field.
522  */
523 static void
524 foreachinterface(int argc, char *argv[], int af,
525     int64_t onflags, int64_t offflags, int64_t lifc_flags)
526 {
527 	ipadm_addr_info_t *ainfo, *ainfop;
528 	struct ifaddrs *ifa;
529 	ipadm_status_t istatus;
530 
531 	/*
532 	 * Special case:
533 	 * ifconfig -a plumb should find all network interfaces in the current
534 	 * zone.
535 	 */
536 	if (argc > 0 && (strcmp(*argv, "plumb") == 0)) {
537 		plumball(argc, argv, onflags, offflags, lifc_flags);
538 		return;
539 	}
540 	/* Get all addresses in kernel including addresses that are zero. */
541 	istatus = ipadm_addr_info(iph, NULL, &ainfo, IPADM_OPT_ZEROADDR,
542 	    lifc_flags);
543 	if (istatus != IPADM_SUCCESS)
544 		ipadmerr_exit(istatus, "could not get addresses from kernel");
545 
546 	/*
547 	 * For each logical interface, call ifconfig() with the
548 	 * given arguments.
549 	 */
550 	for (ainfop = ainfo; ainfop != NULL; ainfop = IA_NEXT(ainfop)) {
551 		if (ainfop->ia_state == IFA_DISABLED)
552 			continue;
553 		ifa = &ainfop->ia_ifa;
554 		if (onflags || offflags) {
555 			if ((ifa->ifa_flags & onflags) != onflags)
556 				continue;
557 			if ((~ifa->ifa_flags & offflags) != offflags)
558 				continue;
559 		}
560 		s = (ifa->ifa_addr->sa_family == AF_INET ? s4 : s6);
561 		(void) strncpy(name, ifa->ifa_name, sizeof (name));
562 		(void) strncpy(origname, name, sizeof (origname));
563 		ifconfig(argc, argv, af, ifa);
564 	}
565 	ipadm_free_addr_info(ainfo);
566 }
567 
568 /*
569  * Used for `ifconfig -a plumb'. Finds all datalinks and plumbs the interface.
570  */
571 static void
572 plumball(int argc, char *argv[], int64_t onflags, int64_t offflags,
573     int64_t lifc_flags)
574 {
575 	int n;
576 	struct lifreq *lifrp;
577 	struct lifconf lifc;
578 	char *buf;
579 
580 	if (onflags != 0 || offflags != 0) {
581 		(void) fprintf(stderr, "ifconfig: invalid syntax used to "
582 		    "plumb all interfaces.\n");
583 		exit(1);
584 	}
585 
586 	if (find_all_interfaces(&lifc, &buf, lifc_flags) != 0 ||
587 	    lifc.lifc_len == 0)
588 		return;
589 
590 	lifrp = lifc.lifc_req;
591 	for (n = lifc.lifc_len / sizeof (struct lifreq); n > 0; n--, lifrp++) {
592 		/*
593 		 * Reset global state
594 		 * setaddr: Used by parser to tear apart source and dest
595 		 * name and origname contain the name of the 'current'
596 		 * interface.
597 		 */
598 		setaddr = 0;
599 		(void) strncpy(name, lifrp->lifr_name, sizeof (name));
600 		(void) strncpy(origname, name, sizeof (origname));
601 		ifconfig(argc, argv, af, NULL);
602 	}
603 }
604 
605 /*
606  * Parses the interface name and the command in argv[]. Calls the
607  * appropriate callback function for the given command from `cmds[]'
608  * table.
609  * If there is no command specified, it prints all addresses.
610  */
611 static void
612 ifconfig(int argc, char *argv[], int af, struct ifaddrs *ifa)
613 {
614 	static boolean_t scan_netmask = _B_FALSE;
615 	int ret;
616 	ipadm_status_t istatus;
617 	struct lifreq lifr;
618 
619 	if (argc == 0) {
620 		status();
621 		return;
622 	}
623 
624 	if (strcmp(*argv, "auto-dhcp") == 0 || strcmp(*argv, "dhcp") == 0) {
625 		/*
626 		 * Some errors are ignored in the case where more than one
627 		 * interface is being operated on.
628 		 */
629 		ret = setifdhcp("ifconfig", name, argc, argv);
630 		if (ret == DHCP_EXIT_IF_FAILURE) {
631 			if (!all)
632 				exit(DHCP_EXIT_FAILURE);
633 		} else if (ret != DHCP_EXIT_SUCCESS) {
634 			exit(ret);
635 		}
636 		return;
637 	}
638 
639 	/*
640 	 * The following is a "hack" to get around the existing interface
641 	 * setting mechanism.  Currently, each interface attribute,
642 	 * such as address, netmask, broadcast, ... is set separately.  But
643 	 * sometimes two or more attributes must be set together.  For
644 	 * example, setting an address without a netmask does not make sense.
645 	 * Yet they can be set separately for IPv4 address using the current
646 	 * ifconfig(1M) syntax.  The kernel then "infers" the correct netmask
647 	 * using the deprecated "IP address classes."  This is simply not
648 	 * correct.
649 	 *
650 	 * The "hack" below is to go thru the whole command list looking for
651 	 * the netmask command first.  Then use this netmask to set the
652 	 * address.  This does not provide an extensible way to accommodate
653 	 * future need for setting more than one attributes together.
654 	 *
655 	 * Note that if the "netmask" command argument is a "+", we need
656 	 * to save this info and do the query after we know the address to
657 	 * be set.  The reason is that if "addif" is used, the working
658 	 * interface name will be changed later when the logical interface
659 	 * is created.  In in_getmask(), if an address is not provided,
660 	 * it will use the working interface's address to do the query.
661 	 * It will be wrong now as we don't know the logical interface's name.
662 	 *
663 	 * ifconfig(1M) is too overloaded and the code is so convoluted
664 	 * that it is "safer" not to re-architect the code to fix the above
665 	 * issue, hence this "hack."  We may be better off to have a new
666 	 * command with better syntax for configuring network interface
667 	 * parameters...
668 	 */
669 	if (!scan_netmask && afp->af_af == AF_INET) {
670 		int	largc;
671 		char	**largv;
672 
673 		/* Only go thru the command list once to find the netmask. */
674 		scan_netmask = _B_TRUE;
675 
676 		/*
677 		 * Currently, if multiple netmask commands are specified, the
678 		 * last one will be used as the final netmask.  So we need
679 		 * to scan the whole list to preserve this behavior.
680 		 */
681 		for (largc = argc, largv = argv; largc > 0; largc--, largv++) {
682 			if (strcmp(*largv, NETMASK_CMD) == 0) {
683 				if (--largc == 0)
684 					break;
685 				largv++;
686 				if (strcmp(*largv, "+") == 0) {
687 					g_netmask_set = G_NETMASK_PENDING;
688 				} else {
689 					in_getaddr(*largv, (struct sockaddr *)
690 					    &g_netmask, NULL);
691 					g_netmask_set = G_NETMASK_SET;
692 				}
693 				/* Continue the scan. */
694 			}
695 		}
696 	}
697 
698 	while (argc > 0) {
699 		struct cmd *p;
700 		boolean_t found_cmd;
701 
702 		if (debug)
703 			(void) printf("ifconfig: argv %s\n", *argv);
704 
705 		found_cmd = _B_FALSE;
706 		for (p = cmds; p->c_func; p++) {
707 			if (p->c_name) {
708 				if (strcmp(*argv, p->c_name) == 0) {
709 					/*
710 					 * indicate that the command was
711 					 * found and check to see if
712 					 * the address family is valid
713 					 */
714 					found_cmd = _B_TRUE;
715 					if (p->c_af == AF_ANY ||
716 					    af == p->c_af)
717 						break;
718 				}
719 			} else {
720 				if (p->c_af == AF_ANY ||
721 				    af == p->c_af)
722 					break;
723 			}
724 		}
725 		/*
726 		 * If we found the keyword, but the address family
727 		 * did not match spit out an error
728 		 */
729 		if (found_cmd && p->c_name == 0) {
730 			(void) fprintf(stderr, "ifconfig: Operation %s not"
731 			    " supported for %s\n", *argv, afp->af_name);
732 			exit(1);
733 		}
734 		/*
735 		 * else (no keyword found), we assume it's an address
736 		 * of some sort
737 		 */
738 		if (setaddr && ipaddr != NULL) {
739 			/*
740 			 * We must have already filled in a source address in
741 			 * `ipaddr' and we now got a destination address.
742 			 * Fill it in `ipaddr' and call libipadm to create
743 			 * the static address.
744 			 */
745 			if (p->c_name == 0) {
746 				istatus = ipadm_set_dst_addr(ipaddr, *argv,
747 				    (p->c_af == AF_ANY ? AF_UNSPEC : af));
748 				if (istatus != IPADM_SUCCESS) {
749 					ipadmerr_exit(istatus, "could not "
750 					    "set destination address");
751 				}
752 				/*
753 				 * finished processing dstaddr, so reset setaddr
754 				 */
755 				setaddr = 0;
756 			}
757 			/*
758 			 * Both source and destination address are in `ipaddr'.
759 			 * Add the address by calling libipadm.
760 			 */
761 			istatus = ipadm_create_addr(iph, ipaddr,
762 			    IPADM_OPT_ACTIVE);
763 			if (istatus != IPADM_SUCCESS)
764 				goto createfailed;
765 			ipadm_destroy_addrobj(ipaddr);
766 			ipaddr = NULL;
767 			setaddr_done = _B_TRUE;
768 			if (p->c_name == 0) {
769 				/* move parser along */
770 				argc--, argv++;
771 				continue;
772 			}
773 		}
774 		if (p->c_name == 0 && setaddr_done) {
775 			/*
776 			 * catch odd commands like
777 			 * "ifconfig <intf> addr1 addr2 addr3 addr4 up"
778 			 */
779 			(void) fprintf(stderr, "%s",
780 			    "ifconfig: cannot configure more than two "
781 			    "addresses in one command\n");
782 			exit(1);
783 		}
784 		if (p->c_func) {
785 			if (p->c_af == AF_INET6) {
786 				v4compat = 0;
787 			}
788 			if (p->c_parameter == NEXTARG ||
789 			    p->c_parameter == OPTARG) {
790 				argc--, argv++;
791 				if (argc == 0 && p->c_parameter == NEXTARG) {
792 					(void) fprintf(stderr,
793 					    "ifconfig: no argument for %s\n",
794 					    p->c_name);
795 					exit(1);
796 				}
797 			}
798 			/*
799 			 *	Call the function if:
800 			 *
801 			 *		there's no address family
802 			 *		restriction
803 			 *	OR
804 			 *		we don't know the address yet
805 			 *		(because we were called from
806 			 *		main)
807 			 *	OR
808 			 *		there is a restriction AND
809 			 *		the address families match
810 			 */
811 			if ((p->c_af == AF_ANY)	||
812 			    (ifa == NULL) ||
813 			    (ifa->ifa_addr->sa_family == p->c_af)) {
814 				ret = (*p->c_func)(*argv, p->c_parameter);
815 				/*
816 				 *	If c_func failed and we should
817 				 *	abort processing for this
818 				 *	interface on failure, return
819 				 *	now rather than going on to
820 				 *	process other commands for
821 				 *	the same interface.
822 				 */
823 				if (ret != 0 && p->c_abortonfail)
824 					return;
825 			}
826 		}
827 		argc--, argv++;
828 	}
829 
830 	if (setaddr && ipaddr != NULL) {
831 		/*
832 		 * Only the source address was provided, which was already
833 		 * set in `ipaddr'. Add the address by calling libipadm.
834 		 */
835 		istatus = ipadm_create_addr(iph, ipaddr, IPADM_OPT_ACTIVE);
836 		if (istatus != IPADM_SUCCESS)
837 			goto createfailed;
838 		ipadm_destroy_addrobj(ipaddr);
839 		ipaddr = NULL;
840 		setaddr_done = _B_TRUE;
841 	}
842 
843 	/* Check to see if there's a security hole in the tunnel setup. */
844 	if (ipsec_policy_set && !ipsec_auth_covered) {
845 		(void) fprintf(stderr, "ifconfig: WARNING: tunnel with only "
846 		    "ESP and no authentication.\n");
847 	}
848 	return;
849 
850 createfailed:
851 	(void) fprintf(stderr, "ifconfig: could not create address:% s\n",
852 	    ipadm_status2str(istatus));
853 	/* Remove the newly created logical interface. */
854 	if (strcmp(name, origname) != 0) {
855 		assert(strchr(name, ':') != NULL);
856 		(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
857 		(void) ioctl(s, SIOCLIFREMOVEIF, (caddr_t)&lifr);
858 	}
859 	exit(1);
860 }
861 
862 /* ARGSUSED */
863 static int
864 setdebugflag(char *val, int64_t arg)
865 {
866 	debug++;
867 	return (0);
868 }
869 
870 /* ARGSUSED */
871 static int
872 setverboseflag(char *val, int64_t arg)
873 {
874 	verbose++;
875 	return (0);
876 }
877 
878 /*
879  * This function fills in the given lifreq's lifr_addr field based on
880  * g_netmask_set.
881  */
882 static void
883 set_mask_lifreq(struct lifreq *lifr, struct sockaddr_storage *addr,
884     struct sockaddr_storage *mask)
885 {
886 	assert(addr != NULL);
887 	assert(mask != NULL);
888 
889 	switch (g_netmask_set) {
890 	case G_NETMASK_SET:
891 		lifr->lifr_addr = g_netmask;
892 		break;
893 
894 	case G_NETMASK_PENDING:
895 		/*
896 		 * "+" is used as the argument to "netmask" command.  Query
897 		 * the database on the correct netmask based on the address to
898 		 * be set.
899 		 */
900 		assert(afp->af_af == AF_INET);
901 		g_netmask = *addr;
902 		if (!in_getmask((struct sockaddr_in *)&g_netmask, _B_TRUE)) {
903 			lifr->lifr_addr = *mask;
904 			g_netmask_set = G_NETMASK_NIL;
905 		} else {
906 			lifr->lifr_addr = g_netmask;
907 			g_netmask_set = G_NETMASK_SET;
908 		}
909 		break;
910 
911 	case G_NETMASK_NIL:
912 	default:
913 		lifr->lifr_addr = *mask;
914 		break;
915 	}
916 }
917 
918 /*
919  * Set the interface address. Handles <addr>, <addr>/<n> as well as /<n>
920  * syntax for setting the address, the address plus netmask, and just
921  * the netmask respectively.
922  */
923 /* ARGSUSED */
924 static int
925 setifaddr(char *addr, int64_t param)
926 {
927 	ipadm_status_t istatus;
928 	int prefixlen = 0;
929 	struct  lifreq lifr1;
930 	struct	sockaddr_storage laddr;
931 	struct	sockaddr_storage netmask;
932 	struct	sockaddr_in6 *sin6;
933 	struct	sockaddr_in *sin;
934 	struct	sockaddr_storage sav_netmask;
935 	char cidraddr[BUFSIZ];
936 
937 	if (addr[0] == '/')
938 		return (setifprefixlen(addr, 0));
939 
940 	(*afp->af_getaddr)(addr, (struct sockaddr *)&laddr, &prefixlen);
941 
942 	(void) memset(&netmask, 0, sizeof (netmask));
943 	netmask.ss_family = afp->af_af;
944 	switch (prefixlen) {
945 	case NO_PREFIX:
946 		/* Nothing there - ok */
947 		break;
948 	case BAD_ADDR:
949 		(void) fprintf(stderr, "ifconfig: Bad prefix length in %s\n",
950 		    addr);
951 		exit(1);
952 	default:
953 		if (afp->af_af == AF_INET6) {
954 			sin6 = (struct sockaddr_in6 *)&netmask;
955 			if (!in_prefixlentomask(prefixlen, IPV6_ABITS,
956 			    (uchar_t *)&sin6->sin6_addr)) {
957 				(void) fprintf(stderr, "ifconfig: "
958 				    "Bad prefix length: %d\n",
959 				    prefixlen);
960 				exit(1);
961 			}
962 		} else {
963 			sin = (struct sockaddr_in *)&netmask;
964 			if (!in_prefixlentomask(prefixlen, IP_ABITS,
965 			    (uchar_t *)&sin->sin_addr)) {
966 				(void) fprintf(stderr, "ifconfig: "
967 				    "Bad prefix length: %d\n",
968 				    prefixlen);
969 				exit(1);
970 			}
971 		}
972 		/*
973 		 * Just in case of funny setting of both prefix and netmask,
974 		 * prefix should override the netmask command.
975 		 */
976 		g_netmask_set = G_NETMASK_NIL;
977 		break;
978 	}
979 
980 	/*
981 	 * Check and see if any "netmask" command is used and perform the
982 	 * necessary operation.
983 	 */
984 	set_mask_lifreq(&lifr, &laddr, &netmask);
985 
986 	/* This check is temporary until libipadm supports IPMP interfaces. */
987 	if (ifconfig_use_libipadm(s, name)) {
988 		char	addrstr[INET6_ADDRSTRLEN];
989 
990 		if (af == AF_INET) {
991 			sin = (struct sockaddr_in *)&laddr;
992 			(void) inet_ntop(AF_INET, &sin->sin_addr, addrstr,
993 			    sizeof (addrstr));
994 		} else {
995 			sin6 = (struct sockaddr_in6 *)&laddr;
996 			(void) inet_ntop(AF_INET6, &sin6->sin6_addr, addrstr,
997 			    sizeof (addrstr));
998 		}
999 		istatus = ipadm_create_addrobj(IPADM_ADDR_STATIC, name,
1000 		    &ipaddr);
1001 		if (istatus != IPADM_SUCCESS)
1002 			ipadmerr_exit(istatus, "setifaddr");
1003 
1004 		/*
1005 		 * lifr.lifr_addr, which is updated by set_mask_lifreq()
1006 		 * will contain the right mask to use.
1007 		 */
1008 		prefixlen = mask2plen((struct sockaddr *)&lifr.lifr_addr);
1009 		(void) snprintf(cidraddr, sizeof (cidraddr), "%s/%d",
1010 		    addrstr, prefixlen);
1011 
1012 		istatus = ipadm_set_addr(ipaddr, cidraddr, af);
1013 		if (istatus != IPADM_SUCCESS)
1014 			ipadmerr_exit(istatus, "could not set address");
1015 		/*
1016 		 * let parser know we got a source.
1017 		 * Next address, if given, should be dest
1018 		 */
1019 		setaddr++;
1020 
1021 		/*
1022 		 * address will be set by the parser after nextarg has
1023 		 * been scanned
1024 		 */
1025 		return (0);
1026 	}
1027 
1028 	/* Tell parser that an address was set */
1029 	setaddr++;
1030 	/* save copy of netmask to restore in case of error */
1031 	(void) strncpy(lifr1.lifr_name, name, sizeof (lifr1.lifr_name));
1032 	if (ioctl(s, SIOCGLIFNETMASK, (caddr_t)&lifr1) < 0)
1033 		Perror0_exit("SIOCGLIFNETMASK");
1034 	sav_netmask = lifr1.lifr_addr;
1035 
1036 	/*
1037 	 * If setting the address and not the mask, clear any existing mask
1038 	 * and the kernel will then assign the default (netmask has been set
1039 	 * to 0 in this case).  If setting both (either by using a prefix or
1040 	 * using the netmask command), set the mask first, so the address will
1041 	 * be interpreted correctly.
1042 	 */
1043 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
1044 	/* lifr.lifr_addr already contains netmask from set_mask_lifreq() */
1045 	if (ioctl(s, SIOCSLIFNETMASK, (caddr_t)&lifr) < 0)
1046 		Perror0_exit("SIOCSLIFNETMASK");
1047 
1048 	if (debug) {
1049 		char abuf[INET6_ADDRSTRLEN];
1050 		void *addr = (afp->af_af == AF_INET) ?
1051 		    (void *)&((struct sockaddr_in *)&laddr)->sin_addr :
1052 		    (void *)&((struct sockaddr_in6 *)&laddr)->sin6_addr;
1053 
1054 		(void) printf("Setting %s af %d addr %s\n",
1055 		    lifr.lifr_name, afp->af_af,
1056 		    inet_ntop(afp->af_af, addr, abuf, sizeof (abuf)));
1057 	}
1058 	lifr.lifr_addr = laddr;
1059 	lifr.lifr_addr.ss_family = afp->af_af;
1060 	if (ioctl(s, SIOCSLIFADDR, (caddr_t)&lifr) < 0) {
1061 		/*
1062 		 * Restore the netmask
1063 		 */
1064 		int saverr = errno;
1065 
1066 		(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
1067 		lifr.lifr_addr = sav_netmask;
1068 		(void) ioctl(s, SIOCSLIFNETMASK, (caddr_t)&lifr);
1069 		errno = saverr;
1070 		Perror0_exit("SIOCSLIFADDR");
1071 	}
1072 
1073 	return (0);
1074 }
1075 
1076 /*
1077  * The following functions are stolen from the ipseckey(1m) program.
1078  * Perhaps they should be somewhere common, but for now, we just maintain
1079  * two versions.  We do this because of the different semantics for which
1080  * algorithms we select ("requested" for ifconfig vs. "actual" for key).
1081  */
1082 
1083 static ulong_t
1084 parsenum(char *num)
1085 {
1086 	ulong_t rc;
1087 	char *end = NULL;
1088 
1089 	errno = 0;
1090 	rc = strtoul(num, &end, 0);
1091 	if (errno != 0 || end == num || *end != '\0') {
1092 		rc = (ulong_t)-1;
1093 	}
1094 
1095 	return (rc);
1096 }
1097 
1098 /*
1099  * Parse and reverse parse possible algorithm values, include numbers.
1100  * Mostly stolen from ipseckey.c. See the comments above parsenum() for why
1101  * this isn't common to ipseckey.c.
1102  *
1103  * NOTE: Static buffer in this function for the return value.  Since ifconfig
1104  *       isn't multithreaded, this isn't a huge problem.
1105  */
1106 
1107 #define	NBUF_SIZE 20	/* Enough to print a large integer. */
1108 
1109 static char *
1110 rparsealg(uint8_t alg_value, int proto_num)
1111 {
1112 	struct ipsecalgent *alg;
1113 	static char numprint[128];	/* Enough to hold an algorithm name. */
1114 
1115 	/*
1116 	 * Special cases for "any" and "none"
1117 	 * The kernel needs to be able to distinguish between "any"
1118 	 * and "none" and the APIs are underdefined in this area for auth.
1119 	 */
1120 	if (proto_num == IPSEC_PROTO_AH) {
1121 		if (alg_value == SADB_AALG_NONE)
1122 			return ("none");
1123 		if (alg_value == SADB_AALG_ANY)
1124 			return ("any");
1125 	}
1126 
1127 	alg = getipsecalgbynum(alg_value, proto_num, NULL);
1128 	if (alg != NULL) {
1129 		(void) strlcpy(numprint, alg->a_names[0], sizeof (numprint));
1130 		freeipsecalgent(alg);
1131 	} else {
1132 		(void) snprintf(numprint, sizeof (numprint), "%d", alg_value);
1133 	}
1134 
1135 	return (numprint);
1136 }
1137 
1138 static uint_t
1139 parsealg(char *algname, int proto_num)
1140 {
1141 	struct ipsecalgent *alg;
1142 	ulong_t invalue;
1143 
1144 	if (algname == NULL) {
1145 		(void) fprintf(stderr, "ifconfig: Unexpected end of command "
1146 		    "line.\n");
1147 		exit(1);
1148 	}
1149 
1150 	/*
1151 	 * Special-case "none" and "any".
1152 	 * Use strcasecmp because its length is bounded.
1153 	 */
1154 	if (strcasecmp("none", algname) == 0) {
1155 		return ((proto_num == IPSEC_PROTO_ESP) ?
1156 		    NO_ESP_EALG : NO_ESP_AALG);
1157 	}
1158 	if ((strcasecmp("any", algname) == 0) && (proto_num == IPSEC_PROTO_AH))
1159 		return (SADB_AALG_ANY);
1160 
1161 	alg = getipsecalgbyname(algname, proto_num, NULL);
1162 	if (alg != NULL) {
1163 		invalue = alg->a_alg_num;
1164 		freeipsecalgent(alg);
1165 		return ((uint_t)invalue);
1166 	}
1167 
1168 	/*
1169 	 * Since algorithms can be loaded during kernel run-time, check for
1170 	 * numeric algorithm values too.
1171 	 */
1172 	invalue = parsenum(algname);
1173 	if ((invalue & (ulong_t)0xff) == invalue)
1174 		return ((uint_t)invalue);
1175 
1176 	(void) fprintf(stderr, "ifconfig: %s algorithm type %s unknown.\n",
1177 	    (proto_num == IPSEC_PROTO_ESP) ?
1178 	    "Encryption" : "Authentication", algname);
1179 	exit(1);
1180 	/* NOTREACHED */
1181 }
1182 
1183 /*
1184  * Actual ifconfig functions to set tunnel security properties.
1185  */
1186 
1187 enum ipsec_alg_type { ESP_ENCR_ALG = 1, ESP_AUTH_ALG, AH_AUTH_ALG };
1188 
1189 static int
1190 set_tun_algs(int which_alg, int alg)
1191 {
1192 	boolean_t	encr_alg_set = _B_FALSE;
1193 	iptun_params_t	params;
1194 	dladm_status_t	status;
1195 	ipsec_req_t	*ipsr;
1196 
1197 	if ((status = ifconfig_dladm_open(name, DATALINK_CLASS_IPTUN,
1198 	    &params.iptun_param_linkid)) != DLADM_STATUS_OK)
1199 		goto done;
1200 
1201 	status = dladm_iptun_getparams(dlh, &params, DLADM_OPT_ACTIVE);
1202 	if (status != DLADM_STATUS_OK)
1203 		goto done;
1204 
1205 	ipsr = &params.iptun_param_secinfo;
1206 
1207 	/*
1208 	 * If I'm just starting off this ifconfig, I want a clean slate,
1209 	 * otherwise, I've captured the current tunnel security settings.
1210 	 * In the case of continuation, I merely add to the settings.
1211 	 */
1212 	if (!(params.iptun_param_flags & IPTUN_PARAM_SECINFO))
1213 		(void) memset(ipsr, 0, sizeof (*ipsr));
1214 
1215 	/* We're only modifying the IPsec information */
1216 	params.iptun_param_flags = IPTUN_PARAM_SECINFO;
1217 
1218 	switch (which_alg) {
1219 	case ESP_ENCR_ALG:
1220 		if (alg == NO_ESP_EALG) {
1221 			if (ipsr->ipsr_esp_auth_alg == SADB_AALG_NONE)
1222 				ipsr->ipsr_esp_req = 0;
1223 			ipsr->ipsr_esp_alg = SADB_EALG_NONE;
1224 
1225 			/* Let the user specify NULL encryption implicitly. */
1226 			if (ipsr->ipsr_esp_auth_alg != SADB_AALG_NONE) {
1227 				encr_alg_set = _B_TRUE;
1228 				ipsr->ipsr_esp_alg = SADB_EALG_NULL;
1229 			}
1230 		} else {
1231 			encr_alg_set = _B_TRUE;
1232 			ipsr->ipsr_esp_req =
1233 			    IPSEC_PREF_REQUIRED | IPSEC_PREF_UNIQUE;
1234 			ipsr->ipsr_esp_alg = alg;
1235 		}
1236 		break;
1237 	case ESP_AUTH_ALG:
1238 		if (alg == NO_ESP_AALG) {
1239 			if ((ipsr->ipsr_esp_alg == SADB_EALG_NONE ||
1240 			    ipsr->ipsr_esp_alg == SADB_EALG_NULL) &&
1241 			    !encr_alg_set)
1242 				ipsr->ipsr_esp_req = 0;
1243 			ipsr->ipsr_esp_auth_alg = SADB_AALG_NONE;
1244 		} else {
1245 			ipsr->ipsr_esp_req =
1246 			    IPSEC_PREF_REQUIRED | IPSEC_PREF_UNIQUE;
1247 			ipsr->ipsr_esp_auth_alg = alg;
1248 
1249 			/* Let the user specify NULL encryption implicitly. */
1250 			if (ipsr->ipsr_esp_alg == SADB_EALG_NONE &&
1251 			    !encr_alg_set)
1252 				ipsr->ipsr_esp_alg = SADB_EALG_NULL;
1253 		}
1254 		break;
1255 	case AH_AUTH_ALG:
1256 		if (alg == NO_AH_AALG) {
1257 			ipsr->ipsr_ah_req = 0;
1258 			ipsr->ipsr_auth_alg = SADB_AALG_NONE;
1259 		} else {
1260 			ipsr->ipsr_ah_req =
1261 			    IPSEC_PREF_REQUIRED | IPSEC_PREF_UNIQUE;
1262 			ipsr->ipsr_auth_alg = alg;
1263 		}
1264 		break;
1265 		/* Will never hit DEFAULT */
1266 	}
1267 
1268 	status = dladm_iptun_modify(dlh, &params, DLADM_OPT_ACTIVE);
1269 
1270 done:
1271 	if (status != DLADM_STATUS_OK)
1272 		dladmerr_exit(status, name);
1273 	else {
1274 		ipsec_policy_set = _B_TRUE;
1275 		if ((ipsr->ipsr_esp_req != 0 &&
1276 		    ipsr->ipsr_esp_auth_alg != SADB_AALG_NONE) ||
1277 		    (ipsr->ipsr_ah_req != 0 &&
1278 		    ipsr->ipsr_auth_alg != SADB_AALG_NONE))
1279 			ipsec_auth_covered = _B_TRUE;
1280 	}
1281 	return (0);
1282 }
1283 
1284 /* ARGSUSED */
1285 static int
1286 set_tun_esp_encr_alg(char *addr, int64_t param)
1287 {
1288 	return (set_tun_algs(ESP_ENCR_ALG,
1289 	    parsealg(addr, IPSEC_PROTO_ESP)));
1290 }
1291 
1292 /* ARGSUSED */
1293 static int
1294 set_tun_esp_auth_alg(char *addr, int64_t param)
1295 {
1296 	return (set_tun_algs(ESP_AUTH_ALG,
1297 	    parsealg(addr, IPSEC_PROTO_AH)));
1298 }
1299 
1300 /* ARGSUSED */
1301 static int
1302 set_tun_ah_alg(char *addr, int64_t param)
1303 {
1304 	return (set_tun_algs(AH_AUTH_ALG,
1305 	    parsealg(addr, IPSEC_PROTO_AH)));
1306 }
1307 
1308 /* ARGSUSED */
1309 static int
1310 setifrevarp(char *arg, int64_t param)
1311 {
1312 	struct sockaddr_in	laddr;
1313 
1314 	if (afp->af_af == AF_INET6) {
1315 		(void) fprintf(stderr,
1316 		    "ifconfig: revarp not possible on IPv6 interface %s\n",
1317 		    name);
1318 		exit(1);
1319 	}
1320 	if (doifrevarp(name, &laddr)) {
1321 		(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
1322 		laddr.sin_family = AF_INET;
1323 		(void) memcpy(&lifr.lifr_addr, &laddr, sizeof (laddr));
1324 		if (ioctl(s, SIOCSLIFADDR, (caddr_t)&lifr) < 0)
1325 			Perror0_exit("SIOCSLIFADDR");
1326 	}
1327 	return (0);
1328 }
1329 
1330 /* ARGSUSED */
1331 static int
1332 setifsubnet(char *addr, int64_t param)
1333 {
1334 	int prefixlen = 0;
1335 	struct	sockaddr_storage subnet;
1336 
1337 	(*afp->af_getaddr)(addr, &subnet, &prefixlen);
1338 
1339 	switch (prefixlen) {
1340 	case NO_PREFIX:
1341 		(void) fprintf(stderr,
1342 		    "ifconfig: Missing prefix length in subnet %s\n", addr);
1343 		exit(1);
1344 		/* NOTREACHED */
1345 	case BAD_ADDR:
1346 		(void) fprintf(stderr,
1347 		    "ifconfig: Bad prefix length in %s\n", addr);
1348 		exit(1);
1349 	default:
1350 		break;
1351 	}
1352 
1353 	lifr.lifr_addr = subnet;
1354 	lifr.lifr_addrlen = prefixlen;
1355 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
1356 	if (ioctl(s, SIOCSLIFSUBNET, (caddr_t)&lifr) < 0)
1357 		Perror0_exit("SIOCSLIFSUBNET");
1358 
1359 	return (0);
1360 }
1361 
1362 /* ARGSUSED */
1363 static int
1364 setifnetmask(char *addr, int64_t param)
1365 {
1366 	struct sockaddr_in netmask;
1367 
1368 	assert(afp->af_af != AF_INET6);
1369 
1370 	if (strcmp(addr, "+") == 0) {
1371 		if (!in_getmask(&netmask, _B_FALSE))
1372 			return (0);
1373 		(void) printf("Setting netmask of %s to %s\n", name,
1374 		    inet_ntoa(netmask.sin_addr));
1375 	} else {
1376 		in_getaddr(addr, (struct sockaddr *)&netmask, NULL);
1377 	}
1378 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
1379 	(void) memcpy(&lifr.lifr_addr, &netmask, sizeof (netmask));
1380 	if (ioctl(s, SIOCSLIFNETMASK, (caddr_t)&lifr) < 0)
1381 		Perror0_exit("SIOCSLIFNETMASK");
1382 	return (0);
1383 }
1384 
1385 /*
1386  * Parse '/<n>' as a netmask.
1387  */
1388 /* ARGSUSED */
1389 static int
1390 setifprefixlen(char *addr, int64_t param)
1391 {
1392 	int prefixlen;
1393 	int af = afp->af_af;
1394 
1395 	prefixlen = in_getprefixlen(addr, _B_TRUE,
1396 	    (af == AF_INET) ? IP_ABITS : IPV6_ABITS);
1397 	if (prefixlen < 0) {
1398 		(void) fprintf(stderr,
1399 		    "ifconfig: Bad prefix length in %s\n", addr);
1400 		exit(1);
1401 	}
1402 	(void) memset(&lifr.lifr_addr, 0, sizeof (lifr.lifr_addr));
1403 	lifr.lifr_addr.ss_family = af;
1404 	if (af == AF_INET6) {
1405 		struct sockaddr_in6 *sin6;
1406 
1407 		sin6 = (struct sockaddr_in6 *)&lifr.lifr_addr;
1408 		if (!in_prefixlentomask(prefixlen, IPV6_ABITS,
1409 		    (uchar_t *)&sin6->sin6_addr)) {
1410 			(void) fprintf(stderr, "ifconfig: "
1411 			    "Bad prefix length: %d\n",
1412 			    prefixlen);
1413 			exit(1);
1414 		}
1415 	} else if (af == AF_INET) {
1416 		struct sockaddr_in *sin;
1417 
1418 		sin = (struct sockaddr_in *)&lifr.lifr_addr;
1419 		if (!in_prefixlentomask(prefixlen, IP_ABITS,
1420 		    (uchar_t *)&sin->sin_addr)) {
1421 			(void) fprintf(stderr, "ifconfig: "
1422 			    "Bad prefix length: %d\n",
1423 			    prefixlen);
1424 			exit(1);
1425 		}
1426 	} else {
1427 		(void) fprintf(stderr, "ifconfig: setting prefix only supported"
1428 		    " for address family inet or inet6\n");
1429 		exit(1);
1430 	}
1431 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
1432 	if (ioctl(s, SIOCSLIFNETMASK, (caddr_t)&lifr) < 0)
1433 		Perror0_exit("SIOCSLIFNETMASK");
1434 	return (0);
1435 }
1436 
1437 /* ARGSUSED */
1438 static int
1439 setifbroadaddr(char *addr, int64_t param)
1440 {
1441 	struct	sockaddr_in broadaddr;
1442 
1443 	assert(afp->af_af != AF_INET6);
1444 
1445 	if (strcmp(addr, "+") == 0) {
1446 		/*
1447 		 * This doesn't set the broadcast address at all. Rather, it
1448 		 * gets, then sets the interface's address, relying on the fact
1449 		 * that resetting the address will reset the broadcast address.
1450 		 */
1451 		(void) strncpy(lifr.lifr_name, name,
1452 		    sizeof (lifr.lifr_name));
1453 		if (ioctl(s, SIOCGLIFADDR, (caddr_t)&lifr) < 0) {
1454 			if (errno != EADDRNOTAVAIL)
1455 				Perror0_exit("SIOCGLIFADDR");
1456 			return (0);
1457 		}
1458 		if (ioctl(s, SIOCSLIFADDR, (caddr_t)&lifr) < 0)
1459 			Perror0_exit("SIOCGLIFADDR");
1460 
1461 		return (0);
1462 	}
1463 	in_getaddr(addr, (struct sockaddr *)&broadaddr, NULL);
1464 
1465 	(void) memcpy(&lifr.lifr_addr, &broadaddr, sizeof (broadaddr));
1466 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
1467 	if (ioctl(s, SIOCSLIFBRDADDR, (caddr_t)&lifr) < 0)
1468 		Perror0_exit("SIOCSLIFBRDADDR");
1469 	return (0);
1470 }
1471 
1472 /*
1473  * set interface destination address
1474  */
1475 /* ARGSUSED */
1476 static int
1477 setifdstaddr(char *addr, int64_t param)
1478 {
1479 	(*afp->af_getaddr)(addr, (struct sockaddr *)&lifr.lifr_addr, NULL);
1480 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
1481 	if (ioctl(s, SIOCSLIFDSTADDR, (caddr_t)&lifr) < 0)
1482 		Perror0_exit("setifdstaddr: SIOCSLIFDSTADDR");
1483 	return (0);
1484 }
1485 
1486 /* ARGSUSED */
1487 static int
1488 setifflags(char *val, int64_t value)
1489 {
1490 	struct lifreq lifrl;	/* local lifreq struct */
1491 	boolean_t bringup = _B_FALSE;
1492 
1493 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
1494 	if (ioctl(s, SIOCGLIFFLAGS, (caddr_t)&lifr) < 0)
1495 		Perror0_exit("setifflags: SIOCGLIFFLAGS");
1496 
1497 	if (value < 0) {
1498 		value = -value;
1499 
1500 		if ((value & IFF_NOFAILOVER) && (lifr.lifr_flags & IFF_UP)) {
1501 			/*
1502 			 * The kernel does not allow administratively up test
1503 			 * addresses to be converted to data addresses.  Bring
1504 			 * the address down first, then bring it up after it's
1505 			 * been converted to a data address.
1506 			 */
1507 			lifr.lifr_flags &= ~IFF_UP;
1508 			(void) ioctl(s, SIOCSLIFFLAGS, (caddr_t)&lifr);
1509 			bringup = _B_TRUE;
1510 		}
1511 
1512 		lifr.lifr_flags &= ~value;
1513 		if ((value & (IFF_UP | IFF_NOFAILOVER)) &&
1514 		    (lifr.lifr_flags & IFF_DUPLICATE)) {
1515 			/*
1516 			 * If the user is trying to mark an interface with a
1517 			 * duplicate address as "down," or convert a duplicate
1518 			 * test address to a data address, then fetch the
1519 			 * address and set it.  This will cause IP to clear
1520 			 * the IFF_DUPLICATE flag and stop the automatic
1521 			 * recovery timer.
1522 			 */
1523 			value = lifr.lifr_flags;
1524 			if (ioctl(s, SIOCGLIFADDR, (caddr_t)&lifr) >= 0)
1525 				(void) ioctl(s, SIOCSLIFADDR, (caddr_t)&lifr);
1526 			lifr.lifr_flags = value;
1527 		}
1528 	} else {
1529 		lifr.lifr_flags |= value;
1530 	}
1531 
1532 	/*
1533 	 * If we're about to bring up an underlying physical IPv6 interface in
1534 	 * an IPMP group, ensure the IPv6 IPMP interface is also up.  This is
1535 	 * for backward compatibility with legacy configurations in which
1536 	 * there are no explicit hostname files for IPMP interfaces.  (For
1537 	 * IPv4, this is automatically handled by the kernel when migrating
1538 	 * the underlying interface's data address to the IPMP interface.)
1539 	 */
1540 	(void) strlcpy(lifrl.lifr_name, name, LIFNAMSIZ);
1541 
1542 	if (lifnum(lifr.lifr_name) == 0 &&
1543 	    (lifr.lifr_flags & (IFF_UP|IFF_IPV6)) == (IFF_UP|IFF_IPV6) &&
1544 	    ioctl(s, SIOCGLIFGROUPNAME, &lifrl) == 0 &&
1545 	    lifrl.lifr_groupname[0] != '\0') {
1546 		lifgroupinfo_t lifgr;
1547 
1548 		(void) strlcpy(lifgr.gi_grname, lifrl.lifr_groupname,
1549 		    LIFGRNAMSIZ);
1550 		if (ioctl(s, SIOCGLIFGROUPINFO, &lifgr) == -1)
1551 			Perror0_exit("setifflags: SIOCGLIFGROUPINFO");
1552 
1553 		(void) strlcpy(lifrl.lifr_name, lifgr.gi_grifname, LIFNAMSIZ);
1554 		if (ioctl(s, SIOCGLIFFLAGS, &lifrl) == -1)
1555 			Perror0_exit("setifflags: SIOCGLIFFLAGS");
1556 		if (!(lifrl.lifr_flags & IFF_UP)) {
1557 			lifrl.lifr_flags |= IFF_UP;
1558 			if (ioctl(s, SIOCSLIFFLAGS, &lifrl) == -1)
1559 				Perror0_exit("setifflags: SIOCSLIFFLAGS");
1560 		}
1561 	}
1562 
1563 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
1564 	if (ioctl(s, SIOCSLIFFLAGS, (caddr_t)&lifr) < 0)
1565 		Perror0_exit("setifflags: SIOCSLIFFLAGS");
1566 
1567 	if (bringup) {
1568 		lifr.lifr_flags |= IFF_UP;
1569 		if (ioctl(s, SIOCSLIFFLAGS, (caddr_t)&lifr) < 0)
1570 			Perror0_exit("setifflags: SIOCSLIFFLAGS IFF_UP");
1571 	}
1572 
1573 	return (0);
1574 }
1575 
1576 /* ARGSUSED */
1577 static int
1578 setifmetric(char *val, int64_t param)
1579 {
1580 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
1581 	lifr.lifr_metric = atoi(val);
1582 	if (ioctl(s, SIOCSLIFMETRIC, (caddr_t)&lifr) < 0)
1583 		Perror0_exit("setifmetric: SIOCSLIFMETRIC");
1584 	return (0);
1585 }
1586 
1587 /* ARGSUSED */
1588 static int
1589 setifmtu(char *val, int64_t param)
1590 {
1591 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
1592 	lifr.lifr_mtu = atoi(val);
1593 	if (ioctl(s, SIOCSLIFMTU, (caddr_t)&lifr) < 0)
1594 		Perror0_exit("setifmtu: SIOCSLIFMTU");
1595 	return (0);
1596 }
1597 
1598 /* ARGSUSED */
1599 static int
1600 setifindex(char *val, int64_t param)
1601 {
1602 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
1603 	lifr.lifr_index = atoi(val);
1604 	if (ioctl(s, SIOCSLIFINDEX, (caddr_t)&lifr) < 0)
1605 		Perror0_exit("setifindex: SIOCSLIFINDEX");
1606 	return (0);
1607 }
1608 
1609 /* ARGSUSED */
1610 static void
1611 notifycb(dlpi_handle_t dh, dlpi_notifyinfo_t *dnip, void *arg)
1612 {
1613 }
1614 
1615 /* ARGSUSED */
1616 static int
1617 setifether(char *addr, int64_t param)
1618 {
1619 	uchar_t		*hwaddr;
1620 	int		hwaddrlen;
1621 	int		retval;
1622 	ifaddrlistx_t	*ifaddrp, *ifaddrs = NULL;
1623 	dlpi_handle_t	dh;
1624 	dlpi_notifyid_t id;
1625 
1626 	if (addr == NULL) {
1627 		ifstatus(name);
1628 		print_ifether(name);
1629 		return (0);
1630 	}
1631 
1632 	/*
1633 	 * if the IP interface in the arguments is a logical
1634 	 * interface, exit with an error now.
1635 	 */
1636 	if (strchr(name, ':') != NULL) {
1637 		(void) fprintf(stderr, "ifconfig: cannot change"
1638 		    " ethernet address of a logical interface\n");
1639 		exit(1);
1640 	}
1641 
1642 	if ((hwaddr = _link_aton(addr, &hwaddrlen)) == NULL) {
1643 		if (hwaddrlen == -1)
1644 			(void) fprintf(stderr,
1645 			    "ifconfig: bad ethernet address\n");
1646 		else
1647 			(void) fprintf(stderr, "ifconfig: malloc() failed\n");
1648 		exit(1);
1649 	}
1650 
1651 	if ((retval = dlpi_open(name, &dh, 0)) != DLPI_SUCCESS)
1652 		Perrdlpi_exit("cannot dlpi_open() link", name, retval);
1653 
1654 	retval = dlpi_enabnotify(dh, DL_NOTE_PHYS_ADDR, notifycb, NULL, &id);
1655 	if (retval == DLPI_SUCCESS) {
1656 		(void) dlpi_disabnotify(dh, id, NULL);
1657 	} else {
1658 		/*
1659 		 * This link does not support DL_NOTE_PHYS_ADDR: bring down
1660 		 * all of the addresses to flush the old hardware address
1661 		 * information out of IP.
1662 		 *
1663 		 * NOTE: Skipping this when DL_NOTE_PHYS_ADDR is supported is
1664 		 * more than an optimization: in.mpathd will set IFF_OFFLINE
1665 		 * if it's notified and the new address is a duplicate of
1666 		 * another in the group -- but the flags manipulation in
1667 		 * ifaddr_{down,up}() cannot be atomic and thus might clobber
1668 		 * IFF_OFFLINE, confusing in.mpathd.
1669 		 */
1670 		if (ifaddrlistx(name, IFF_UP, 0, &ifaddrs) == -1)
1671 			Perror2_exit(name, "cannot get address list");
1672 
1673 		ifaddrp = ifaddrs;
1674 		for (; ifaddrp != NULL; ifaddrp = ifaddrp->ia_next) {
1675 			if (!ifaddr_down(ifaddrp)) {
1676 				Perror2_exit(ifaddrp->ia_name,
1677 				    "cannot bring down");
1678 			}
1679 		}
1680 	}
1681 
1682 	/*
1683 	 * Change the hardware address.
1684 	 */
1685 	retval = dlpi_set_physaddr(dh, DL_CURR_PHYS_ADDR, hwaddr, hwaddrlen);
1686 	if (retval != DLPI_SUCCESS) {
1687 		(void) fprintf(stderr,
1688 		    "ifconfig: failed setting mac address on %s\n", name);
1689 	}
1690 	dlpi_close(dh);
1691 
1692 	/*
1693 	 * If any addresses were brought down before changing the hardware
1694 	 * address, bring them up again.
1695 	 */
1696 	for (ifaddrp = ifaddrs; ifaddrp != NULL; ifaddrp = ifaddrp->ia_next) {
1697 		if (!ifaddr_up(ifaddrp))
1698 			Perror2_exit(ifaddrp->ia_name, "cannot bring up");
1699 	}
1700 	ifaddrlistx_free(ifaddrs);
1701 
1702 	return (0);
1703 }
1704 
1705 /*
1706  * Print an interface's Ethernet address, if it has one.
1707  */
1708 static void
1709 print_ifether(const char *ifname)
1710 {
1711 	int fd;
1712 
1713 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
1714 
1715 	fd = socket(AF_INET, SOCK_DGRAM, 0);
1716 	if (fd == -1 || ioctl(fd, SIOCGLIFFLAGS, &lifr) == -1) {
1717 		/*
1718 		 * It's possible the interface is only configured for
1719 		 * IPv6; check again with AF_INET6.
1720 		 */
1721 		(void) close(fd);
1722 		fd = socket(AF_INET6, SOCK_DGRAM, 0);
1723 		if (fd == -1 || ioctl(fd, SIOCGLIFFLAGS, &lifr) == -1) {
1724 			(void) close(fd);
1725 			return;
1726 		}
1727 	}
1728 	(void) close(fd);
1729 
1730 	/* VNI and IPMP interfaces don't have MAC addresses */
1731 	if (lifr.lifr_flags & (IFF_VIRTUAL|IFF_IPMP))
1732 		return;
1733 
1734 	/* IP tunnels also don't have Ethernet-like MAC addresses */
1735 	if (ifconfig_dladm_open(ifname, DATALINK_CLASS_IPTUN, NULL) ==
1736 	    DLADM_STATUS_OK)
1737 		return;
1738 
1739 	dlpi_print_address(ifname);
1740 }
1741 
1742 /*
1743  * static int find_all_interfaces(struct lifconf *lifcp, char **buf,
1744  *     int64_t lifc_flags)
1745  *
1746  * It finds all active data links.
1747  *
1748  * It takes in input a pointer to struct lifconf to receive interfaces
1749  * informations, a **char to hold allocated buffer, and a lifc_flags.
1750  *
1751  * Return values:
1752  *  0 = everything OK
1753  * -1 = problem
1754  */
1755 static int
1756 find_all_interfaces(struct lifconf *lifcp, char **buf, int64_t lifc_flags)
1757 {
1758 	unsigned bufsize;
1759 	int n;
1760 	ni_t *nip;
1761 	struct lifreq *lifrp;
1762 	dladm_status_t status;
1763 
1764 	if (!dlh_opened) {
1765 		status = ifconfig_dladm_open(NULL, 0, NULL);
1766 		if (status != DLADM_STATUS_OK)
1767 			dladmerr_exit(status, "unable to open dladm handle");
1768 	}
1769 
1770 	(void) dlpi_walk(ni_entry, dlh, 0);
1771 
1772 	/* Now, translate the linked list into a struct lifreq buffer */
1773 	if (num_ni == 0) {
1774 		lifcp->lifc_family = AF_UNSPEC;
1775 		lifcp->lifc_flags = lifc_flags;
1776 		lifcp->lifc_len = 0;
1777 		lifcp->lifc_buf = NULL;
1778 		return (0);
1779 	}
1780 
1781 	bufsize = num_ni * sizeof (struct lifreq);
1782 	if ((*buf = malloc(bufsize)) == NULL)
1783 		Perror0_exit("find_all_interfaces: malloc failed");
1784 
1785 	lifcp->lifc_family = AF_UNSPEC;
1786 	lifcp->lifc_flags = lifc_flags;
1787 	lifcp->lifc_len = bufsize;
1788 	lifcp->lifc_buf = *buf;
1789 
1790 	for (n = 0, lifrp = lifcp->lifc_req; n < num_ni; n++, lifrp++) {
1791 		nip = ni_list;
1792 		(void) strncpy(lifrp->lifr_name, nip->ni_name,
1793 		    sizeof (lifr.lifr_name));
1794 		ni_list = nip->ni_next;
1795 		free(nip);
1796 	}
1797 	return (0);
1798 }
1799 
1800 /*
1801  * Create the next unused logical interface using the original name
1802  * and assign the address (and mask if '/<n>' is part of the address).
1803  * Use the new logical interface for subsequent subcommands by updating
1804  * the name variable.
1805  *
1806  * This allows syntax like:
1807  *	ifconfig le0 addif 109.106.86.130 netmask + up \
1808  *	addif 109.106.86.131 netmask + up
1809  */
1810 /* ARGSUSED */
1811 static int
1812 addif(char *str, int64_t param)
1813 {
1814 	int prefixlen = 0;
1815 	struct sockaddr_storage laddr;
1816 	struct sockaddr_storage mask;
1817 	struct sockaddr_in6 *sin6;
1818 	struct sockaddr_in *sin;
1819 	ipadm_status_t istatus;
1820 	char cidraddr[BUFSIZ];
1821 	char addrstr[INET6_ADDRSTRLEN];
1822 
1823 	(void) strncpy(name, origname, sizeof (name));
1824 
1825 	if (strchr(name, ':') != NULL) {
1826 		(void) fprintf(stderr,
1827 		    "ifconfig: addif: bad physical interface name %s\n",
1828 		    name);
1829 		exit(1);
1830 	}
1831 
1832 	/*
1833 	 * clear so parser will interpret next address as source followed
1834 	 * by possible dest
1835 	 */
1836 	setaddr = 0;
1837 	(*afp->af_getaddr)(str, (struct sockaddr *)&laddr, &prefixlen);
1838 
1839 	(void) memset(&mask, 0, sizeof (mask));
1840 	mask.ss_family = afp->af_af;
1841 
1842 	switch (prefixlen) {
1843 	case NO_PREFIX:
1844 		/* Nothing there - ok */
1845 		break;
1846 	case BAD_ADDR:
1847 		(void) fprintf(stderr,
1848 		    "ifconfig: Bad prefix length in %s\n", str);
1849 		exit(1);
1850 	default:
1851 		(void) memset(&mask, 0, sizeof (mask));
1852 		mask.ss_family = afp->af_af;
1853 		if (afp->af_af == AF_INET6) {
1854 			sin6 = (struct sockaddr_in6 *)&mask;
1855 			if (!in_prefixlentomask(prefixlen, IPV6_ABITS,
1856 			    (uchar_t *)&sin6->sin6_addr)) {
1857 				(void) fprintf(stderr, "ifconfig: "
1858 				    "Bad prefix length: %d\n",
1859 				    prefixlen);
1860 				exit(1);
1861 			}
1862 		} else {
1863 			sin = (struct sockaddr_in *)&mask;
1864 			if (!in_prefixlentomask(prefixlen, IP_ABITS,
1865 			    (uchar_t *)&sin->sin_addr)) {
1866 				(void) fprintf(stderr, "ifconfig: "
1867 				    "Bad prefix length: %d\n",
1868 				    prefixlen);
1869 				exit(1);
1870 			}
1871 		}
1872 		g_netmask_set = G_NETMASK_NIL;
1873 		break;
1874 	}
1875 
1876 	/*
1877 	 * This is a "hack" to get around the problem of SIOCLIFADDIF.  The
1878 	 * problem is that this ioctl does not include the netmask when
1879 	 * adding a logical interface.  This is the same problem described
1880 	 * in the ifconfig() comments.  To get around this problem, we first
1881 	 * add the logical interface with a 0 address.  After that, we set
1882 	 * the netmask if provided.  Finally we set the interface address.
1883 	 */
1884 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
1885 	(void) memset(&lifr.lifr_addr, 0, sizeof (lifr.lifr_addr));
1886 
1887 	/* Note: no need to do DAD here since the interface isn't up yet. */
1888 
1889 	if (ioctl(s, SIOCLIFADDIF, (caddr_t)&lifr) < 0)
1890 		Perror0_exit("addif: SIOCLIFADDIF");
1891 
1892 	(void) printf("Created new logical interface %s\n",
1893 	    lifr.lifr_name);
1894 	(void) strncpy(name, lifr.lifr_name, sizeof (name));
1895 
1896 	/*
1897 	 * Check and see if any "netmask" command is used and perform the
1898 	 * necessary operation.
1899 	 */
1900 	set_mask_lifreq(&lifr, &laddr, &mask);
1901 
1902 	/* This check is temporary until libipadm supports IPMP interfaces. */
1903 	if (ifconfig_use_libipadm(s, name)) {
1904 		/*
1905 		 * We added the logical interface above before calling
1906 		 * ipadm_create_addr(), because, with IPH_LEGACY, we need
1907 		 * to do an addif for `ifconfig ce0 addif <addr>' but not for
1908 		 * `ifconfig ce0 <addr>'. libipadm does not have a flag to
1909 		 * to differentiate between these two cases. To keep it simple,
1910 		 * we always create the logical interface and pass it to
1911 		 * libipadm instead of requiring libipadm to addif for some
1912 		 * cases and not do addif for other cases.
1913 		 */
1914 		istatus = ipadm_create_addrobj(IPADM_ADDR_STATIC, name,
1915 		    &ipaddr);
1916 		if (istatus != IPADM_SUCCESS)
1917 			ipadmerr_exit(istatus, "addif");
1918 
1919 		if (af == AF_INET) {
1920 			sin = (struct sockaddr_in *)&laddr;
1921 			(void) inet_ntop(AF_INET, &sin->sin_addr, addrstr,
1922 			    sizeof (addrstr));
1923 		} else {
1924 			sin6 = (struct sockaddr_in6 *)&laddr;
1925 			(void) inet_ntop(AF_INET6, &sin6->sin6_addr, addrstr,
1926 			    sizeof (addrstr));
1927 		}
1928 		/*
1929 		 * lifr.lifr_addr, which is updated by set_mask_lifreq()
1930 		 * will contain the right mask to use.
1931 		 */
1932 		prefixlen = mask2plen((struct sockaddr *)&lifr.lifr_addr);
1933 
1934 		(void) snprintf(cidraddr, sizeof (cidraddr), "%s/%d",
1935 		    addrstr, prefixlen);
1936 
1937 		istatus = ipadm_set_addr(ipaddr, cidraddr, af);
1938 
1939 		if (istatus != IPADM_SUCCESS)
1940 			ipadmerr_exit(istatus, "could not set address");
1941 		setaddr++;
1942 		/*
1943 		 * address will be set by the parser after nextarg
1944 		 * has been scanned
1945 		 */
1946 		return (0);
1947 	}
1948 
1949 	/*
1950 	 * Only set the netmask if "netmask" command is used or a prefix is
1951 	 * provided.
1952 	 */
1953 	if (g_netmask_set == G_NETMASK_SET || prefixlen >= 0) {
1954 		/*
1955 		 * lifr.lifr_addr already contains netmask from
1956 		 * set_mask_lifreq().
1957 		 */
1958 		if (ioctl(s, SIOCSLIFNETMASK, (caddr_t)&lifr) < 0)
1959 			Perror0_exit("addif: SIOCSLIFNETMASK");
1960 	}
1961 
1962 	/* Finally, we set the interface address. */
1963 	lifr.lifr_addr = laddr;
1964 	if (ioctl(s, SIOCSLIFADDR, (caddr_t)&lifr) < 0)
1965 		Perror0_exit("SIOCSLIFADDR");
1966 
1967 	/*
1968 	 * let parser know we got a source.
1969 	 * Next address, if given, should be dest
1970 	 */
1971 	setaddr++;
1972 	return (0);
1973 }
1974 
1975 /*
1976  * Remove a logical interface based on its IP address. Unlike addif
1977  * there is no '/<n>' here.
1978  * Verifies that the interface is down before it is removed.
1979  */
1980 /* ARGSUSED */
1981 static int
1982 removeif(char *str, int64_t param)
1983 {
1984 	struct sockaddr_storage laddr;
1985 	ipadm_status_t istatus;
1986 	ipadm_addr_info_t *ainfo, *ainfop;
1987 
1988 	if (strchr(name, ':') != NULL) {
1989 		(void) fprintf(stderr,
1990 		    "ifconfig: removeif: bad physical interface name %s\n",
1991 		    name);
1992 		exit(1);
1993 	}
1994 
1995 	(*afp->af_getaddr)(str, &laddr, NULL);
1996 
1997 	/*
1998 	 * Following check is temporary until libipadm supports
1999 	 * IPMP interfaces.
2000 	 */
2001 	if (!ifconfig_use_libipadm(s, name))
2002 		goto delete;
2003 
2004 	/*
2005 	 * Get all addresses and search this address among the active
2006 	 * addresses. If an address object was found, delete using
2007 	 * ipadm_delete_addr().
2008 	 */
2009 	istatus = ipadm_addr_info(iph, name, &ainfo, 0, LIFC_DEFAULT);
2010 	if (istatus != IPADM_SUCCESS)
2011 		ipadmerr_exit(istatus, "removeif");
2012 
2013 	for (ainfop = ainfo; ainfop != NULL; ainfop = IA_NEXT(ainfop))
2014 		if (sockaddrcmp(
2015 		    (struct sockaddr_storage *)ainfop->ia_ifa.ifa_addr, &laddr))
2016 			break;
2017 
2018 	if (ainfop != NULL) {
2019 		if (strchr(ainfop->ia_ifa.ifa_name, ':') == NULL) {
2020 			(void) fprintf(stderr,
2021 			    "ifconfig: removeif: cannot remove interface: %s\n",
2022 			    name);
2023 			exit(1);
2024 		}
2025 		if (ainfop->ia_aobjname[0] != '\0') {
2026 			istatus = ipadm_delete_addr(iph, ainfop->ia_aobjname,
2027 			    IPADM_OPT_ACTIVE);
2028 			if (istatus != IPADM_SUCCESS) {
2029 				ipadmerr_exit(istatus,
2030 				    "could not delete address");
2031 			}
2032 			ipadm_free_addr_info(ainfo);
2033 			return (0);
2034 		}
2035 	}
2036 	ipadm_free_addr_info(ainfo);
2037 
2038 delete:
2039 	/*
2040 	 * An address object for this address was not found in ipadm.
2041 	 * Delete with SIOCLIFREMOVEIF.
2042 	 */
2043 	lifr.lifr_addr = laddr;
2044 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
2045 	if (ioctl(s, SIOCLIFREMOVEIF, (caddr_t)&lifr) < 0) {
2046 		if (errno == EBUSY) {
2047 			/* This can only happen if ipif_id = 0 */
2048 			(void) fprintf(stderr,
2049 			    "ifconfig: removeif: cannot remove interface: %s\n",
2050 			    name);
2051 			exit(1);
2052 		}
2053 		Perror0_exit("removeif: SIOCLIFREMOVEIF");
2054 	}
2055 	return (0);
2056 }
2057 
2058 /*
2059  * Set the address token for IPv6.
2060  */
2061 /* ARGSUSED */
2062 static int
2063 setiftoken(char *addr, int64_t param)
2064 {
2065 	int prefixlen = 0;
2066 	struct sockaddr_in6 token;
2067 
2068 	in6_getaddr(addr, (struct sockaddr *)&token, &prefixlen);
2069 	switch (prefixlen) {
2070 	case NO_PREFIX:
2071 		(void) fprintf(stderr,
2072 		    "ifconfig: Missing prefix length in subnet %s\n", addr);
2073 		exit(1);
2074 		/* NOTREACHED */
2075 	case BAD_ADDR:
2076 		(void) fprintf(stderr,
2077 		    "ifconfig: Bad prefix length in %s\n", addr);
2078 		exit(1);
2079 	default:
2080 		break;
2081 	}
2082 	(void) memcpy(&lifr.lifr_addr, &token, sizeof (token));
2083 	lifr.lifr_addrlen = prefixlen;
2084 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
2085 	if (ioctl(s, SIOCSLIFTOKEN, (caddr_t)&lifr) < 0)  {
2086 		Perror0_exit("setiftoken: SIOCSLIFTOKEN");
2087 	}
2088 	return (0);
2089 }
2090 
2091 /* ARGSUSED */
2092 static int
2093 setifgroupname(char *grname, int64_t param)
2094 {
2095 	lifgroupinfo_t		lifgr;
2096 	struct lifreq		lifrl;
2097 	ifaddrlistx_t		*ifaddrp, *nextifaddrp;
2098 	ifaddrlistx_t		*ifaddrs = NULL, *downaddrs = NULL;
2099 	int			af;
2100 
2101 	if (debug) {
2102 		(void) printf("Setting groupname %s on interface %s\n",
2103 		    grname, name);
2104 	}
2105 
2106 	(void) strlcpy(lifrl.lifr_name, name, LIFNAMSIZ);
2107 	(void) strlcpy(lifrl.lifr_groupname, grname, LIFGRNAMSIZ);
2108 
2109 	while (ioctl(s, SIOCSLIFGROUPNAME, &lifrl) == -1) {
2110 		switch (errno) {
2111 		case ENOENT:
2112 			/*
2113 			 * The group doesn't yet exist; create it and repeat.
2114 			 */
2115 			af = afp->af_af;
2116 			if (create_ipmp(grname, af, NULL, _B_TRUE) == -1) {
2117 				if (errno == EEXIST)
2118 					continue;
2119 
2120 				Perror2(grname, "cannot create IPMP group");
2121 				goto fail;
2122 			}
2123 			continue;
2124 
2125 		case EALREADY:
2126 			/*
2127 			 * The interface is already in another group; must
2128 			 * remove existing membership first.
2129 			 */
2130 			lifrl.lifr_groupname[0] = '\0';
2131 			if (ioctl(s, SIOCSLIFGROUPNAME, &lifrl) == -1) {
2132 				Perror2(name, "cannot remove existing "
2133 				    "IPMP group membership");
2134 				goto fail;
2135 			}
2136 			(void) strlcpy(lifrl.lifr_groupname, grname,
2137 			    LIFGRNAMSIZ);
2138 			continue;
2139 
2140 		case EAFNOSUPPORT:
2141 			/*
2142 			 * The group exists, but it's not configured with the
2143 			 * address families the interface needs.  Since only
2144 			 * two address families are currently supported, just
2145 			 * configure the "other" address family.  Note that we
2146 			 * may race with group deletion or creation by another
2147 			 * process (ENOENT or EEXIST); in such cases we repeat
2148 			 * our original SIOCSLIFGROUPNAME.
2149 			 */
2150 			(void) strlcpy(lifgr.gi_grname, grname, LIFGRNAMSIZ);
2151 			if (ioctl(s, SIOCGLIFGROUPINFO, &lifgr) == -1) {
2152 				if (errno == ENOENT)
2153 					continue;
2154 
2155 				Perror2(grname, "SIOCGLIFGROUPINFO");
2156 				goto fail;
2157 			}
2158 
2159 			af = lifgr.gi_v4 ? AF_INET6 : AF_INET;
2160 			if (create_ipmp(grname, af, lifgr.gi_grifname,
2161 			    _B_TRUE) == -1) {
2162 				if (errno == EEXIST)
2163 					continue;
2164 
2165 				Perror2(grname, "cannot configure IPMP group");
2166 				goto fail;
2167 			}
2168 			continue;
2169 
2170 		case EADDRINUSE:
2171 			/*
2172 			 * Some addresses are in-use (or under control of DAD).
2173 			 * Bring them down and retry the group join operation.
2174 			 * We will bring them back up after the interface has
2175 			 * been placed in the group.
2176 			 */
2177 			if (ifaddrlistx(lifrl.lifr_name, IFF_UP|IFF_DUPLICATE,
2178 			    0, &ifaddrs) == -1) {
2179 				Perror2(grname, "cannot get address list");
2180 				goto fail;
2181 			}
2182 
2183 			ifaddrp = ifaddrs;
2184 			for (; ifaddrp != NULL; ifaddrp = nextifaddrp) {
2185 				if (!ifaddr_down(ifaddrp)) {
2186 					ifaddrs = ifaddrp;
2187 					goto fail;
2188 				}
2189 				nextifaddrp = ifaddrp->ia_next;
2190 				ifaddrp->ia_next = downaddrs;
2191 				downaddrs = ifaddrp;
2192 			}
2193 			ifaddrs = NULL;
2194 			continue;
2195 
2196 		case EADDRNOTAVAIL: {
2197 			/*
2198 			 * Some data addresses are under application control.
2199 			 * For some of these (e.g., ADDRCONF), the application
2200 			 * should remove the address, in which case we retry a
2201 			 * few times (since the application's action is not
2202 			 * atomic with respect to us) before bailing out and
2203 			 * informing the user.
2204 			 */
2205 			int ntries, nappaddr = 0;
2206 			const if_appflags_t *iap = if_appflags_tbl;
2207 
2208 			for (; iap->ia_app != NULL; iap++) {
2209 				ntries = 0;
2210 again:
2211 				if (ifaddrlistx(lifrl.lifr_name, iap->ia_flag,
2212 				    IFF_NOFAILOVER, &ifaddrs) == -1) {
2213 					(void) fprintf(stderr, "ifconfig: %s: "
2214 					    "cannot get data addresses managed "
2215 					    "by %s\n", lifrl.lifr_name,
2216 					    iap->ia_app);
2217 					goto fail;
2218 				}
2219 
2220 				if (ifaddrs == NULL)
2221 					continue;
2222 
2223 				ifaddrlistx_free(ifaddrs);
2224 				ifaddrs = NULL;
2225 
2226 				if (++ntries < iap->ia_tries) {
2227 					(void) poll(NULL, 0, 100);
2228 					goto again;
2229 				}
2230 
2231 				(void) fprintf(stderr, "ifconfig: cannot join "
2232 				    "IPMP group: %s has data addresses managed "
2233 				    "by %s\n", lifrl.lifr_name, iap->ia_app);
2234 				nappaddr++;
2235 			}
2236 			if (nappaddr > 0)
2237 				goto fail;
2238 			continue;
2239 		}
2240 		default:
2241 			Perror2(name, "SIOCSLIFGROUPNAME");
2242 			goto fail;
2243 		}
2244 	}
2245 
2246 	/*
2247 	 * If the interface being moved is under the control of `ipmgmtd(1M)'
2248 	 * dameon then we should inform the daemon about this move, so that
2249 	 * the daemon can delete the state associated with this interface.
2250 	 *
2251 	 * This workaround is needed until the IPMP support in ipadm(1M).
2252 	 */
2253 	ipadm_if_move(iph, name);
2254 
2255 	/*
2256 	 * If there were addresses that we had to bring down, it's time to
2257 	 * bring them up again.  As part of bringing them up, the kernel will
2258 	 * automatically move them to the new IPMP interface.
2259 	 */
2260 	for (ifaddrp = downaddrs; ifaddrp != NULL; ifaddrp = ifaddrp->ia_next) {
2261 		if (!ifaddr_up(ifaddrp) && errno != ENXIO) {
2262 			(void) fprintf(stderr, "ifconfig: cannot bring back up "
2263 			    "%s: %s\n", ifaddrp->ia_name, strerror(errno));
2264 		}
2265 	}
2266 	ifaddrlistx_free(downaddrs);
2267 	return (0);
2268 fail:
2269 	/*
2270 	 * Attempt to bring back up any interfaces that we downed.
2271 	 */
2272 	for (ifaddrp = downaddrs; ifaddrp != NULL; ifaddrp = ifaddrp->ia_next) {
2273 		if (!ifaddr_up(ifaddrp) && errno != ENXIO) {
2274 			(void) fprintf(stderr, "ifconfig: cannot bring back up "
2275 			    "%s: %s\n", ifaddrp->ia_name, strerror(errno));
2276 		}
2277 	}
2278 	ifaddrlistx_free(downaddrs);
2279 	ifaddrlistx_free(ifaddrs);
2280 
2281 	/*
2282 	 * We'd return -1, but foreachinterface() doesn't propagate the error
2283 	 * into the exit status, so we're forced to explicitly exit().
2284 	 */
2285 	exit(1);
2286 	/* NOTREACHED */
2287 }
2288 
2289 static boolean_t
2290 modcheck(const char *ifname)
2291 {
2292 	(void) strlcpy(lifr.lifr_name, ifname, sizeof (lifr.lifr_name));
2293 
2294 	if (ioctl(s, SIOCGLIFFLAGS, &lifr) < 0) {
2295 		Perror0("SIOCGLIFFLAGS");
2296 		return (_B_FALSE);
2297 	}
2298 
2299 	if (lifr.lifr_flags & IFF_IPMP) {
2300 		(void) fprintf(stderr, "ifconfig: %s: module operations not"
2301 		    " supported on IPMP interfaces\n", ifname);
2302 		return (_B_FALSE);
2303 	}
2304 	if (lifr.lifr_flags & IFF_VIRTUAL) {
2305 		(void) fprintf(stderr, "ifconfig: %s: module operations not"
2306 		    " supported on virtual IP interfaces\n", ifname);
2307 		return (_B_FALSE);
2308 	}
2309 	return (_B_TRUE);
2310 }
2311 
2312 /*
2313  * To list all the modules above a given network interface.
2314  */
2315 /* ARGSUSED */
2316 static int
2317 modlist(char *null, int64_t param)
2318 {
2319 	int muxid_fd;
2320 	int muxfd;
2321 	int ipfd_lowstr;
2322 	int arpfd_lowstr;
2323 	int num_mods;
2324 	int i;
2325 	struct str_list strlist;
2326 	int orig_arpid;
2327 
2328 	/*
2329 	 * We'd return -1, but foreachinterface() doesn't propagate the error
2330 	 * into the exit status, so we're forced to explicitly exit().
2331 	 */
2332 	if (!modcheck(name))
2333 		exit(1);
2334 
2335 	if (ip_domux2fd(&muxfd, &muxid_fd, &ipfd_lowstr, &arpfd_lowstr,
2336 	    &orig_arpid) < 0) {
2337 		return (-1);
2338 	}
2339 	if ((num_mods = ioctl(ipfd_lowstr, I_LIST, NULL)) < 0) {
2340 		Perror0("cannot I_LIST to get the number of modules");
2341 	} else {
2342 		if (debug > 0) {
2343 			(void) printf("Listing (%d) modules above %s\n",
2344 			    num_mods, name);
2345 		}
2346 
2347 		strlist.sl_nmods = num_mods;
2348 		strlist.sl_modlist = malloc(sizeof (struct str_mlist) *
2349 		    num_mods);
2350 		if (strlist.sl_modlist == NULL) {
2351 			Perror0("cannot malloc");
2352 		} else {
2353 			if (ioctl(ipfd_lowstr, I_LIST, (caddr_t)&strlist) < 0) {
2354 				Perror0("cannot I_LIST for module names");
2355 			} else {
2356 				for (i = 0; i < strlist.sl_nmods; i++) {
2357 					(void) printf("%d %s\n", i,
2358 					    strlist.sl_modlist[i].l_name);
2359 				}
2360 			}
2361 			free(strlist.sl_modlist);
2362 		}
2363 	}
2364 	return (ip_plink(muxfd, muxid_fd, ipfd_lowstr, arpfd_lowstr,
2365 	    orig_arpid));
2366 }
2367 
2368 #define	MODINSERT_OP	'i'
2369 #define	MODREMOVE_OP	'r'
2370 
2371 /*
2372  * To insert a module to the stream of the interface.  It is just a
2373  * wrapper.  The real function is modop().
2374  */
2375 /* ARGSUSED */
2376 static int
2377 modinsert(char *arg, int64_t param)
2378 {
2379 	return (modop(arg, MODINSERT_OP));
2380 }
2381 
2382 /*
2383  * To remove a module from the stream of the interface.  It is just a
2384  * wrapper.  The real function is modop().
2385  */
2386 /* ARGSUSED */
2387 static int
2388 modremove(char *arg, int64_t param)
2389 {
2390 	return (modop(arg, MODREMOVE_OP));
2391 }
2392 
2393 /*
2394  * Helper function for mod*() functions.  It gets a fd to the lower IP
2395  * stream and I_PUNLINK's the lower stream.  It also initializes the
2396  * global variable lifr.
2397  *
2398  * Param:
2399  *	int *muxfd: fd to /dev/udp{,6} for I_PLINK/I_PUNLINK
2400  *	int *muxid_fd: fd to /dev/udp{,6} for LIFMUXID
2401  *	int *ipfd_lowstr: fd to the lower IP stream.
2402  *	int *arpfd_lowstr: fd to the lower ARP stream.
2403  *
2404  * Return:
2405  *	-1 if operation fails, 0 otherwise.
2406  *
2407  * Please see the big block comment above ifplumb() for the logic of the
2408  * PLINK/PUNLINK
2409  */
2410 static int
2411 ip_domux2fd(int *muxfd, int *muxid_fd, int *ipfd_lowstr, int *arpfd_lowstr,
2412     int *orig_arpid)
2413 {
2414 	uint64_t	flags;
2415 	char		*udp_dev_name;
2416 
2417 	*orig_arpid = 0;
2418 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
2419 	if (ioctl(s, SIOCGLIFFLAGS, (caddr_t)&lifr) < 0) {
2420 		Perror0_exit("status: SIOCGLIFFLAGS");
2421 	}
2422 	flags = lifr.lifr_flags;
2423 	if (flags & IFF_IPV4) {
2424 		udp_dev_name = UDP_DEV_NAME;
2425 	} else if (flags & IFF_IPV6) {
2426 		udp_dev_name = UDP6_DEV_NAME;
2427 	} else {
2428 		return (-1);
2429 	}
2430 
2431 	if ((*muxid_fd = open(udp_dev_name, O_RDWR)) < 0) {
2432 		Perror2("open", udp_dev_name);
2433 		return (-1);
2434 	}
2435 	if (ioctl(*muxid_fd, SIOCGLIFMUXID, (caddr_t)&lifr) < 0) {
2436 		Perror2("SIOCGLIFMUXID", udp_dev_name);
2437 		return (-1);
2438 	}
2439 	if (debug > 0) {
2440 		(void) printf("ARP_muxid %d IP_muxid %d\n",
2441 		    lifr.lifr_arp_muxid, lifr.lifr_ip_muxid);
2442 	}
2443 
2444 	/*
2445 	 * Use /dev/udp{,6} as the mux to avoid linkcycles.
2446 	 */
2447 	if (ipadm_open_arp_on_udp(udp_dev_name, muxfd) != IPADM_SUCCESS)
2448 		return (-1);
2449 
2450 	if (lifr.lifr_arp_muxid != 0) {
2451 		if ((*arpfd_lowstr = ioctl(*muxfd, _I_MUXID2FD,
2452 		    lifr.lifr_arp_muxid)) < 0) {
2453 			if ((errno == EINVAL) &&
2454 			    (flags & (IFF_NOARP | IFF_IPV6))) {
2455 				/*
2456 				 * Some plumbing utilities set the muxid to
2457 				 * -1 or some invalid value to signify that
2458 				 * there is no arp stream. Set the muxid to 0
2459 				 * before trying to unplumb the IP stream.
2460 				 * IP does not allow the IP stream to be
2461 				 * unplumbed if it sees a non-null arp muxid,
2462 				 * for consistency of IP-ARP streams.
2463 				 */
2464 				*orig_arpid = lifr.lifr_arp_muxid;
2465 				lifr.lifr_arp_muxid = 0;
2466 				(void) ioctl(*muxid_fd, SIOCSLIFMUXID,
2467 				    (caddr_t)&lifr);
2468 				*arpfd_lowstr = -1;
2469 			} else {
2470 				Perror0("_I_MUXID2FD");
2471 				return (-1);
2472 			}
2473 		} else if (ioctl(*muxfd, I_PUNLINK,
2474 		    lifr.lifr_arp_muxid) < 0) {
2475 			Perror2("I_PUNLINK", udp_dev_name);
2476 			return (-1);
2477 		}
2478 	} else {
2479 		*arpfd_lowstr = -1;
2480 	}
2481 
2482 	if ((*ipfd_lowstr = ioctl(*muxfd, _I_MUXID2FD,
2483 	    lifr.lifr_ip_muxid)) < 0) {
2484 		Perror0("_I_MUXID2FD");
2485 		/* Undo any changes we made */
2486 		if (*orig_arpid != 0) {
2487 			lifr.lifr_arp_muxid = *orig_arpid;
2488 			(void) ioctl(*muxid_fd, SIOCSLIFMUXID, (caddr_t)&lifr);
2489 		}
2490 		return (-1);
2491 	}
2492 	if (ioctl(*muxfd, I_PUNLINK, lifr.lifr_ip_muxid) < 0) {
2493 		Perror2("I_PUNLINK", udp_dev_name);
2494 		/* Undo any changes we made */
2495 		if (*orig_arpid != 0) {
2496 			lifr.lifr_arp_muxid = *orig_arpid;
2497 			(void) ioctl(*muxid_fd, SIOCSLIFMUXID, (caddr_t)&lifr);
2498 		}
2499 		return (-1);
2500 	}
2501 	return (0);
2502 }
2503 
2504 /*
2505  * Helper function for mod*() functions.  It I_PLINK's back the upper and
2506  * lower IP streams.  Note that this function must be called after
2507  * ip_domux2fd().  In ip_domux2fd(), the global variable lifr is initialized
2508  * and ip_plink() needs information in lifr.  So ip_domux2fd() and ip_plink()
2509  * must be called in pairs.
2510  *
2511  * Param:
2512  *	int muxfd: fd to /dev/udp{,6} for I_PLINK/I_PUNLINK
2513  *	int muxid_fd: fd to /dev/udp{,6} for LIFMUXID
2514  *	int ipfd_lowstr: fd to the lower IP stream.
2515  *	int arpfd_lowstr: fd to the lower ARP stream.
2516  *
2517  * Return:
2518  *	-1 if operation fails, 0 otherwise.
2519  *
2520  * Please see the big block comment above ifplumb() for the logic of the
2521  * PLINK/PUNLINK
2522  */
2523 static int
2524 ip_plink(int muxfd, int muxid_fd, int ipfd_lowstr, int arpfd_lowstr,
2525     int orig_arpid)
2526 {
2527 	int ip_muxid;
2528 
2529 	ip_muxid = ioctl(muxfd, I_PLINK, ipfd_lowstr);
2530 	if (ip_muxid < 0) {
2531 		Perror2("I_PLINK", UDP_DEV_NAME);
2532 		return (-1);
2533 	}
2534 
2535 	/*
2536 	 * If there is an arp stream, plink it. If there is no
2537 	 * arp stream, then it is possible that the plumbing
2538 	 * utility could have stored any value in the arp_muxid.
2539 	 * If so, restore it from orig_arpid.
2540 	 */
2541 	if (arpfd_lowstr != -1) {
2542 		if (ioctl(muxfd, I_PLINK, arpfd_lowstr) < 0) {
2543 			Perror2("I_PLINK", UDP_DEV_NAME);
2544 			return (-1);
2545 		}
2546 	} else if (orig_arpid != 0) {
2547 		/* Undo the changes we did in ip_domux2fd */
2548 		lifr.lifr_arp_muxid = orig_arpid;
2549 		lifr.lifr_ip_muxid = ip_muxid;
2550 		(void) ioctl(muxid_fd, SIOCSLIFMUXID, (caddr_t)&lifr);
2551 	}
2552 
2553 	(void) close(muxfd);
2554 	(void) close(muxid_fd);
2555 	return (0);
2556 }
2557 
2558 /*
2559  * The real function to perform module insertion/removal.
2560  *
2561  * Param:
2562  *	char *arg: the argument string module_name@position
2563  *	char op: operation, either MODINSERT_OP or MODREMOVE_OP.
2564  *
2565  * Return:
2566  *	Before doing ip_domux2fd(), this function calls exit(1) in case of
2567  *	error.  After ip_domux2fd() is done, it returns -1 for error, 0
2568  *	otherwise.
2569  */
2570 static int
2571 modop(char *arg, char op)
2572 {
2573 	char *pos_p;
2574 	int muxfd;
2575 	int muxid_fd;
2576 	int ipfd_lowstr;  /* IP stream (lower stream of mux) to be plinked */
2577 	int arpfd_lowstr; /* ARP stream (lower stream of mux) to be plinked */
2578 	struct strmodconf mod;
2579 	char *at_char = "@";
2580 	char *arg_str;
2581 	int orig_arpid;
2582 
2583 	/*
2584 	 * We'd return -1, but foreachinterface() doesn't propagate the error
2585 	 * into the exit status, so we're forced to explicitly exit().
2586 	 */
2587 	if (!modcheck(name))
2588 		exit(1);
2589 
2590 	/* Need to save the original string for -a option. */
2591 	if ((arg_str = malloc(strlen(arg) + 1)) == NULL) {
2592 		Perror0("cannot malloc");
2593 		return (-1);
2594 	}
2595 	(void) strcpy(arg_str, arg);
2596 
2597 	if (*arg_str == *at_char) {
2598 		(void) fprintf(stderr,
2599 		    "ifconfig: must supply a module name\n");
2600 		exit(1);
2601 	}
2602 	mod.mod_name = strtok(arg_str, at_char);
2603 	if (strlen(mod.mod_name) > FMNAMESZ) {
2604 		(void) fprintf(stderr, "ifconfig: module name too long: %s\n",
2605 		    mod.mod_name);
2606 		exit(1);
2607 	}
2608 
2609 	/*
2610 	 * Need to make sure that the core TCP/IP stack modules are not
2611 	 * removed.  Otherwise, "bad" things can happen.  If a module
2612 	 * is removed and inserted back, it loses its old state.  But
2613 	 * the modules above it still have the old state.  E.g. IP assumes
2614 	 * fast data path while tunnel after re-inserted assumes that it can
2615 	 * receive M_DATA only in fast data path for which it does not have
2616 	 * any state.  This is a general caveat of _I_REMOVE/_I_INSERT.
2617 	 */
2618 	if (op == MODREMOVE_OP &&
2619 	    (strcmp(mod.mod_name, ARP_MOD_NAME) == 0 ||
2620 	    strcmp(mod.mod_name, IP_MOD_NAME) == 0)) {
2621 		(void) fprintf(stderr, "ifconfig: cannot remove %s\n",
2622 		    mod.mod_name);
2623 		exit(1);
2624 	}
2625 
2626 	if ((pos_p = strtok(NULL, at_char)) == NULL) {
2627 		(void) fprintf(stderr, "ifconfig: must supply a position\n");
2628 		exit(1);
2629 	}
2630 	mod.pos = atoi(pos_p);
2631 
2632 	if (ip_domux2fd(&muxfd, &muxid_fd, &ipfd_lowstr, &arpfd_lowstr,
2633 	    &orig_arpid) < 0) {
2634 		free(arg_str);
2635 		return (-1);
2636 	}
2637 	switch (op) {
2638 	case MODINSERT_OP:
2639 		if (debug > 0) {
2640 			(void) printf("Inserting module %s at %d\n",
2641 			    mod.mod_name, mod.pos);
2642 		}
2643 		if (ioctl(ipfd_lowstr, _I_INSERT, (caddr_t)&mod) < 0) {
2644 			Perror2("fail to insert module", mod.mod_name);
2645 		}
2646 		break;
2647 	case MODREMOVE_OP:
2648 		if (debug > 0) {
2649 			(void) printf("Removing module %s at %d\n",
2650 			    mod.mod_name, mod.pos);
2651 		}
2652 		if (ioctl(ipfd_lowstr, _I_REMOVE, (caddr_t)&mod) < 0) {
2653 			Perror2("fail to remove module", mod.mod_name);
2654 		}
2655 		break;
2656 	default:
2657 		/* Should never get to here. */
2658 		(void) fprintf(stderr, "Unknown operation\n");
2659 		break;
2660 	}
2661 	free(arg_str);
2662 	return (ip_plink(muxfd, muxid_fd, ipfd_lowstr, arpfd_lowstr,
2663 	    orig_arpid));
2664 }
2665 
2666 static int
2667 modify_tun(iptun_params_t *params)
2668 {
2669 	dladm_status_t status;
2670 
2671 	if ((status = ifconfig_dladm_open(name, DATALINK_CLASS_IPTUN,
2672 	    &params->iptun_param_linkid)) == DLADM_STATUS_OK)
2673 		status = dladm_iptun_modify(dlh, params, DLADM_OPT_ACTIVE);
2674 	if (status != DLADM_STATUS_OK)
2675 		dladmerr_exit(status, name);
2676 	return (0);
2677 }
2678 
2679 /*
2680  * Set tunnel source address
2681  */
2682 /* ARGSUSED */
2683 static int
2684 setiftsrc(char *addr, int64_t param)
2685 {
2686 	iptun_params_t params;
2687 
2688 	params.iptun_param_flags = IPTUN_PARAM_LADDR;
2689 	(void) strlcpy(params.iptun_param_laddr, addr,
2690 	    sizeof (params.iptun_param_laddr));
2691 	return (modify_tun(&params));
2692 }
2693 
2694 /*
2695  * Set tunnel destination address
2696  */
2697 /* ARGSUSED */
2698 static int
2699 setiftdst(char *addr, int64_t param)
2700 {
2701 	iptun_params_t params;
2702 
2703 	params.iptun_param_flags = IPTUN_PARAM_RADDR;
2704 	(void) strlcpy(params.iptun_param_raddr, addr,
2705 	    sizeof (params.iptun_param_raddr));
2706 	return (modify_tun(&params));
2707 }
2708 
2709 static int
2710 set_tun_prop(const char *propname, char *value)
2711 {
2712 	dladm_status_t	status;
2713 	datalink_id_t	linkid;
2714 
2715 	status = ifconfig_dladm_open(name, DATALINK_CLASS_IPTUN, &linkid);
2716 	if (status == DLADM_STATUS_OK) {
2717 		status = dladm_set_linkprop(dlh, linkid, propname, &value, 1,
2718 		    DLADM_OPT_ACTIVE);
2719 	}
2720 	if (status != DLADM_STATUS_OK)
2721 		dladmerr_exit(status, name);
2722 	return (0);
2723 }
2724 
2725 /* Set tunnel encapsulation limit. */
2726 /* ARGSUSED */
2727 static int
2728 set_tun_encap_limit(char *arg, int64_t param)
2729 {
2730 	return (set_tun_prop("encaplimit", arg));
2731 }
2732 
2733 /* Disable encapsulation limit. */
2734 /* ARGSUSED */
2735 static int
2736 clr_tun_encap_limit(char *arg, int64_t param)
2737 {
2738 	return (set_tun_encap_limit("-1", 0));
2739 }
2740 
2741 /* Set tunnel hop limit. */
2742 /* ARGSUSED */
2743 static int
2744 set_tun_hop_limit(char *arg, int64_t param)
2745 {
2746 	return (set_tun_prop("hoplimit", arg));
2747 }
2748 
2749 /* Set zone ID */
2750 static int
2751 setzone(char *arg, int64_t param)
2752 {
2753 	zoneid_t zoneid = GLOBAL_ZONEID;
2754 
2755 	if (param == NEXTARG) {
2756 		/* zone must be active */
2757 		if ((zoneid = getzoneidbyname(arg)) == -1) {
2758 			(void) fprintf(stderr,
2759 			    "ifconfig: unknown zone '%s'\n", arg);
2760 			exit(1);
2761 		}
2762 	}
2763 	(void) strlcpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
2764 	lifr.lifr_zoneid = zoneid;
2765 	if (ioctl(s, SIOCSLIFZONE, (caddr_t)&lifr) == -1)
2766 		Perror0_exit("SIOCSLIFZONE");
2767 	return (0);
2768 }
2769 
2770 /* Put interface into all zones */
2771 /* ARGSUSED */
2772 static int
2773 setallzones(char *arg, int64_t param)
2774 {
2775 	(void) strlcpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
2776 	lifr.lifr_zoneid = ALL_ZONES;
2777 	if (ioctl(s, SIOCSLIFZONE, (caddr_t)&lifr) == -1)
2778 		Perror0_exit("SIOCSLIFZONE");
2779 	return (0);
2780 }
2781 
2782 /* Set source address to use */
2783 /* ARGSUSED */
2784 static int
2785 setifsrc(char *arg, int64_t param)
2786 {
2787 	uint_t ifindex = 0;
2788 	int rval;
2789 
2790 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
2791 
2792 	/*
2793 	 * Argument can be either an interface name or "none". The latter means
2794 	 * that any previous selection is cleared.
2795 	 */
2796 
2797 	if (strchr(arg, ':') != NULL) {
2798 		(void) fprintf(stderr,
2799 		    "ifconfig: Cannot specify logical interface for usesrc \n");
2800 		exit(1);
2801 	}
2802 
2803 	rval = strcmp(arg, NONE_STR);
2804 	if (rval != 0) {
2805 		if ((ifindex = if_nametoindex(arg)) == 0) {
2806 			(void) strncpy(lifr.lifr_name, arg, LIFNAMSIZ);
2807 			Perror0_exit("Could not get interface index");
2808 		}
2809 		lifr.lifr_index = ifindex;
2810 	} else {
2811 		if (ioctl(s, SIOCGLIFUSESRC, (caddr_t)&lifr) != 0)
2812 			Perror0_exit("Not a valid usesrc consumer");
2813 		lifr.lifr_index = 0;
2814 	}
2815 
2816 	if (debug)
2817 		(void) printf("setifsrc: lifr_name %s, lifr_index %d\n",
2818 		    lifr.lifr_name, lifr.lifr_index);
2819 
2820 	if (ioctl(s, SIOCSLIFUSESRC, (caddr_t)&lifr) == -1) {
2821 		if (rval == 0)
2822 			Perror0_exit("Cannot reset usesrc group");
2823 		else
2824 			Perror0_exit("Could not set source interface");
2825 	}
2826 
2827 	return (0);
2828 }
2829 
2830 /*
2831  * Print the interface status line associated with `ifname'
2832  */
2833 static void
2834 ifstatus(const char *ifname)
2835 {
2836 	uint64_t flags;
2837 	char if_usesrc_name[LIFNAMSIZ];
2838 	char *newbuf;
2839 	int n, numifs, rval = 0;
2840 	struct lifreq *lifrp;
2841 	struct lifsrcof lifs;
2842 
2843 	(void) strncpy(lifr.lifr_name, ifname, sizeof (lifr.lifr_name));
2844 	if (ioctl(s, SIOCGLIFFLAGS, (caddr_t)&lifr) < 0) {
2845 		Perror0_exit("status: SIOCGLIFFLAGS");
2846 	}
2847 	flags = lifr.lifr_flags;
2848 
2849 	/*
2850 	 * In V4 compatibility mode, we don't print the IFF_IPV4 flag or
2851 	 * interfaces with IFF_IPV6 set.
2852 	 */
2853 	if (v4compat) {
2854 		flags &= ~IFF_IPV4;
2855 		if (flags & IFF_IPV6)
2856 			return;
2857 	}
2858 
2859 	(void) printf("%s: ", ifname);
2860 	print_flags(flags);
2861 
2862 	(void) strncpy(lifr.lifr_name, ifname, sizeof (lifr.lifr_name));
2863 	if (ioctl(s, SIOCGLIFMETRIC, (caddr_t)&lifr) < 0) {
2864 		Perror0_exit("status: SIOCGLIFMETRIC");
2865 	} else {
2866 		if (lifr.lifr_metric)
2867 			(void) printf(" metric %d", lifr.lifr_metric);
2868 	}
2869 	if (ioctl(s, SIOCGLIFMTU, (caddr_t)&lifr) >= 0)
2870 		(void) printf(" mtu %u", lifr.lifr_mtu);
2871 
2872 	/* don't print index or zone when in compatibility mode */
2873 	if (!v4compat) {
2874 		if (ioctl(s, SIOCGLIFINDEX, (caddr_t)&lifr) >= 0)
2875 			(void) printf(" index %d", lifr.lifr_index);
2876 		/*
2877 		 * Stack instances use GLOBAL_ZONEID for IP data structures
2878 		 * even in the non-global zone.
2879 		 */
2880 		if (ioctl(s, SIOCGLIFZONE, (caddr_t)&lifr) >= 0 &&
2881 		    lifr.lifr_zoneid != getzoneid() &&
2882 		    lifr.lifr_zoneid != GLOBAL_ZONEID) {
2883 			char zone_name[ZONENAME_MAX];
2884 
2885 			if (lifr.lifr_zoneid == ALL_ZONES) {
2886 				(void) printf("\n\tall-zones");
2887 			} else if (getzonenamebyid(lifr.lifr_zoneid, zone_name,
2888 			    sizeof (zone_name)) < 0) {
2889 				(void) printf("\n\tzone %d", lifr.lifr_zoneid);
2890 			} else {
2891 				(void) printf("\n\tzone %s", zone_name);
2892 			}
2893 		}
2894 	}
2895 
2896 	if (ioctl(s, SIOCGLIFINDEX, (caddr_t)&lifr) >= 0) {
2897 		lifs.lifs_ifindex = lifr.lifr_index;
2898 
2899 		/*
2900 		 * Find the number of interfaces that use this interfaces'
2901 		 * address as a source address
2902 		 */
2903 		lifs.lifs_buf = NULL;
2904 		lifs.lifs_maxlen = 0;
2905 		for (;;) {
2906 			/* The first pass will give the bufsize we need */
2907 			rval = ioctl(s, SIOCGLIFSRCOF, (char *)&lifs);
2908 			if (rval < 0) {
2909 				if (lifs.lifs_buf != NULL) {
2910 					free(lifs.lifs_buf);
2911 					lifs.lifs_buf = NULL;
2912 				}
2913 				lifs.lifs_len = 0;
2914 				break;
2915 			}
2916 			if (lifs.lifs_len <= lifs.lifs_maxlen)
2917 				break;
2918 			/* Use kernel's size + a small margin to avoid loops */
2919 			lifs.lifs_maxlen = lifs.lifs_len +
2920 			    5 * sizeof (struct lifreq);
2921 			/* For the first pass, realloc acts like malloc */
2922 			newbuf = realloc(lifs.lifs_buf, lifs.lifs_maxlen);
2923 			if (newbuf == NULL) {
2924 				if (lifs.lifs_buf != NULL) {
2925 					free(lifs.lifs_buf);
2926 					lifs.lifs_buf = NULL;
2927 				}
2928 				lifs.lifs_len = 0;
2929 				break;
2930 			}
2931 			lifs.lifs_buf = newbuf;
2932 		}
2933 
2934 
2935 		numifs = lifs.lifs_len / sizeof (struct lifreq);
2936 		if (numifs > 0) {
2937 			lifrp = lifs.lifs_req;
2938 			(void) printf("\n\tsrcof");
2939 			for (n = numifs; n > 0; n--, lifrp++) {
2940 				(void) printf(" %s", lifrp->lifr_name);
2941 			}
2942 		}
2943 
2944 		if (lifs.lifs_buf != NULL)
2945 			free(lifs.lifs_buf);
2946 	}
2947 
2948 	/* Find the interface whose source address this interface uses */
2949 	if (ioctl(s, SIOCGLIFUSESRC, (caddr_t)&lifr) == 0) {
2950 		if (lifr.lifr_index != 0) {
2951 			if (if_indextoname(lifr.lifr_index,
2952 			    if_usesrc_name) == NULL) {
2953 				(void) printf("\n\tusesrc ifIndex %d",
2954 				    lifr.lifr_index);
2955 			} else {
2956 				(void) printf("\n\tusesrc %s", if_usesrc_name);
2957 			}
2958 		}
2959 	}
2960 
2961 	(void) putchar('\n');
2962 }
2963 
2964 /*
2965  * Print the status of the interface.  If an address family was
2966  * specified, show it and it only; otherwise, show them all.
2967  */
2968 static void
2969 status(void)
2970 {
2971 	struct afswtch	*p = afp;
2972 	uint64_t	flags;
2973 	datalink_id_t	linkid;
2974 
2975 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
2976 	if (ioctl(s, SIOCGLIFFLAGS, (caddr_t)&lifr) < 0) {
2977 		Perror0_exit("status: SIOCGLIFFLAGS");
2978 	}
2979 
2980 	flags = lifr.lifr_flags;
2981 
2982 	/*
2983 	 * Only print the interface status if the address family matches
2984 	 * the interface family flag.
2985 	 */
2986 	if (p != NULL) {
2987 		if (((p->af_af == AF_INET6) && (flags & IFF_IPV4)) ||
2988 		    ((p->af_af == AF_INET) && (flags & IFF_IPV6)))
2989 			return;
2990 	}
2991 
2992 	/*
2993 	 * In V4 compatibility mode, don't print IFF_IPV6 interfaces.
2994 	 */
2995 	if (v4compat && (flags & IFF_IPV6))
2996 		return;
2997 
2998 	ifstatus(name);
2999 
3000 	if (ifconfig_dladm_open(name, DATALINK_CLASS_IPTUN, &linkid) ==
3001 	    DLADM_STATUS_OK)
3002 		tun_status(linkid);
3003 
3004 	if (p != NULL) {
3005 		(*p->af_status)(1, flags);
3006 	} else {
3007 		for (p = afs; p->af_name; p++) {
3008 			/* set global af for use in p->af_status */
3009 			af = p->af_af;
3010 			(*p->af_status)(0, flags);
3011 		}
3012 
3013 		/*
3014 		 * Historically, 'ether' has been an address family,
3015 		 * so print it here.
3016 		 */
3017 		print_ifether(name);
3018 	}
3019 }
3020 
3021 /*
3022  * Print the status of the interface in a format that can be used to
3023  * reconfigure the interface later. Code stolen from status() above.
3024  */
3025 /* ARGSUSED */
3026 static int
3027 configinfo(char *null, int64_t param)
3028 {
3029 	char *cp;
3030 	struct afswtch *p = afp;
3031 	uint64_t flags;
3032 	char lifname[LIFNAMSIZ];
3033 	char if_usesrc_name[LIFNAMSIZ];
3034 
3035 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
3036 
3037 	if (ioctl(s, SIOCGLIFFLAGS, (caddr_t)&lifr) < 0) {
3038 		Perror0_exit("status: SIOCGLIFFLAGS");
3039 	}
3040 	flags = lifr.lifr_flags;
3041 
3042 	if (debug) {
3043 		(void) printf("configinfo: name %s flags  0x%llx af_af %d\n",
3044 		    name, flags, p != NULL ? p->af_af : -1);
3045 	}
3046 
3047 	/*
3048 	 * Build the interface name to print (we cannot directly use `name'
3049 	 * because one cannot "plumb" ":0" interfaces).
3050 	 */
3051 	(void) strlcpy(lifname, name, LIFNAMSIZ);
3052 	if ((cp = strchr(lifname, ':')) != NULL && atoi(cp + 1) == 0)
3053 		*cp = '\0';
3054 
3055 	/*
3056 	 * if the interface is IPv4
3057 	 *	if we have a IPv6 address family restriction return
3058 	 *		so it won't print
3059 	 *	if we are in IPv4 compatibility mode, clear out IFF_IPV4
3060 	 *		so we don't print it.
3061 	 */
3062 	if (flags & IFF_IPV4) {
3063 		if (p && p->af_af == AF_INET6)
3064 			return (-1);
3065 		if (v4compat)
3066 			flags &= ~IFF_IPV4;
3067 
3068 		(void) printf("%s inet plumb", lifname);
3069 	} else if (flags & IFF_IPV6) {
3070 		/*
3071 		 * else if the interface is IPv6
3072 		 *	if we have a IPv4 address family restriction return
3073 		 *	or we are in IPv4 compatibiltiy mode, return.
3074 		 */
3075 		if (p && p->af_af == AF_INET)
3076 			return (-1);
3077 		if (v4compat)
3078 			return (-1);
3079 
3080 		(void) printf("%s inet6 plumb", lifname);
3081 	}
3082 
3083 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
3084 	if (ioctl(s, SIOCGLIFMETRIC, (caddr_t)&lifr) < 0) {
3085 		Perror0_exit("configinfo: SIOCGLIFMETRIC");
3086 	} else {
3087 		if (lifr.lifr_metric)
3088 			(void) printf(" metric %d ", lifr.lifr_metric);
3089 	}
3090 	if (((flags & (IFF_VIRTUAL|IFF_LOOPBACK)) != IFF_VIRTUAL) &&
3091 	    ioctl(s, SIOCGLIFMTU, (caddr_t)&lifr) >= 0)
3092 		(void) printf(" mtu %u", lifr.lifr_mtu);
3093 
3094 	/* Index only applies to the zeroth interface */
3095 	if (lifnum(name) == 0) {
3096 		if (ioctl(s, SIOCGLIFINDEX, (caddr_t)&lifr) >= 0)
3097 			(void) printf(" index %d", lifr.lifr_index);
3098 	}
3099 
3100 	if (ioctl(s, SIOCGLIFUSESRC, (caddr_t)&lifr) == 0) {
3101 		if (lifr.lifr_index != 0) {
3102 			if (if_indextoname(lifr.lifr_index,
3103 			    if_usesrc_name) != NULL) {
3104 				(void) printf(" usesrc %s", if_usesrc_name);
3105 			}
3106 		}
3107 	}
3108 
3109 	if (p != NULL) {
3110 		(*p->af_configinfo)(1, flags);
3111 	} else {
3112 		for (p = afs; p->af_name; p++) {
3113 			(void) close(s);
3114 			s = socket(SOCKET_AF(p->af_af), SOCK_DGRAM, 0);
3115 			/* set global af for use in p->af_configinfo */
3116 			af = p->af_af;
3117 			if (s == -1) {
3118 				Perror0_exit("socket");
3119 			}
3120 			(*p->af_configinfo)(0, flags);
3121 		}
3122 	}
3123 
3124 	(void) putchar('\n');
3125 	return (0);
3126 }
3127 
3128 static void
3129 print_tsec(iptun_params_t *params)
3130 {
3131 	ipsec_req_t *ipsr;
3132 
3133 	(void) printf("\ttunnel security settings  ");
3134 	if (!(params->iptun_param_flags & IPTUN_PARAM_SECINFO)) {
3135 		(void) printf("-->  use 'ipsecconf -ln -i %s'", name);
3136 	} else {
3137 		ipsr = &params->iptun_param_secinfo;
3138 		if (ipsr->ipsr_ah_req & IPSEC_PREF_REQUIRED) {
3139 			(void) printf("ah (%s)  ",
3140 			    rparsealg(ipsr->ipsr_auth_alg, IPSEC_PROTO_AH));
3141 		}
3142 		if (ipsr->ipsr_esp_req & IPSEC_PREF_REQUIRED) {
3143 			(void) printf("esp (%s",
3144 			    rparsealg(ipsr->ipsr_esp_alg, IPSEC_PROTO_ESP));
3145 			(void) printf("/%s)",
3146 			    rparsealg(ipsr->ipsr_esp_auth_alg, IPSEC_PROTO_AH));
3147 		}
3148 	}
3149 	(void) printf("\n");
3150 }
3151 
3152 static void
3153 tun_status(datalink_id_t linkid)
3154 {
3155 	iptun_params_t	params;
3156 	char		propval[DLADM_PROP_VAL_MAX];
3157 	char		*valptr[1];
3158 	uint_t		valcnt = 1;
3159 	boolean_t	tabbed = _B_FALSE;
3160 
3161 	params.iptun_param_linkid = linkid;
3162 
3163 	/* If dladm_iptun_getparams() fails, assume we are not a tunnel. */
3164 	assert(dlh_opened);
3165 	if (dladm_iptun_getparams(dlh, &params, DLADM_OPT_ACTIVE) !=
3166 	    DLADM_STATUS_OK)
3167 		return;
3168 
3169 	switch (params.iptun_param_type) {
3170 	case IPTUN_TYPE_IPV4:
3171 	case IPTUN_TYPE_6TO4:
3172 		(void) printf("\tinet");
3173 		break;
3174 	case IPTUN_TYPE_IPV6:
3175 		(void) printf("\tinet6");
3176 		break;
3177 	default:
3178 		dladmerr_exit(DLADM_STATUS_IPTUNTYPE, name);
3179 		break;
3180 	}
3181 
3182 	/*
3183 	 * There is always a source address.  If it hasn't been explicitly
3184 	 * set, the API will pass back a buffer containing the unspecified
3185 	 * address.
3186 	 */
3187 	(void) printf(" tunnel src %s ", params.iptun_param_laddr);
3188 
3189 	if (params.iptun_param_flags & IPTUN_PARAM_RADDR)
3190 		(void) printf("tunnel dst %s\n", params.iptun_param_raddr);
3191 	else
3192 		(void) putchar('\n');
3193 
3194 	if (params.iptun_param_flags & IPTUN_PARAM_IPSECPOL)
3195 		print_tsec(&params);
3196 
3197 	valptr[0] = propval;
3198 	if (dladm_get_linkprop(dlh, linkid, DLADM_PROP_VAL_CURRENT, "hoplimit",
3199 	    (char **)valptr, &valcnt) == DLADM_STATUS_OK) {
3200 		(void) printf("\ttunnel hop limit %s ", propval);
3201 		tabbed = _B_TRUE;
3202 	}
3203 
3204 	if (dladm_get_linkprop(dlh, linkid, DLADM_PROP_VAL_CURRENT,
3205 	    "encaplimit", (char **)valptr, &valcnt) == DLADM_STATUS_OK) {
3206 		uint32_t elim;
3207 
3208 		if (!tabbed) {
3209 			(void) putchar('\t');
3210 			tabbed = _B_TRUE;
3211 		}
3212 		elim = strtol(propval, NULL, 10);
3213 		if (elim > 0)
3214 			(void) printf("tunnel encapsulation limit %s", propval);
3215 		else
3216 			(void) printf("tunnel encapsulation limit disabled");
3217 	}
3218 
3219 	if (tabbed)
3220 		(void) putchar('\n');
3221 }
3222 
3223 static void
3224 in_status(int force, uint64_t flags)
3225 {
3226 	struct sockaddr_in	*sin, *laddr;
3227 	struct sockaddr_in	netmask = { AF_INET };
3228 
3229 	if (debug)
3230 		(void) printf("in_status(%s) flags 0x%llx\n", name, flags);
3231 
3232 	/* only print status for IPv4 interfaces */
3233 	if (!(flags & IFF_IPV4))
3234 		return;
3235 
3236 	if (!(flags & IFF_NOLOCAL)) {
3237 		(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
3238 		if (ioctl(s, SIOCGLIFADDR, (caddr_t)&lifr) < 0) {
3239 			if (errno == EADDRNOTAVAIL || errno == EAFNOSUPPORT ||
3240 			    errno == ENXIO) {
3241 				if (!force)
3242 					return;
3243 				(void) memset(&lifr.lifr_addr, 0,
3244 				    sizeof (lifr.lifr_addr));
3245 			} else
3246 				Perror0_exit("in_status: SIOCGLIFADDR");
3247 		}
3248 		sin = (struct sockaddr_in *)&lifr.lifr_addr;
3249 		(void) printf("\tinet %s ", inet_ntoa(sin->sin_addr));
3250 		laddr = sin;
3251 	} else {
3252 		(void) printf("\tinet ");
3253 	}
3254 
3255 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
3256 	if (ioctl(s, SIOCGLIFSUBNET, (caddr_t)&lifr) < 0) {
3257 		if (errno == EADDRNOTAVAIL || errno == EAFNOSUPPORT ||
3258 		    errno == ENXIO) {
3259 			if (!force)
3260 				return;
3261 			(void) memset(&lifr.lifr_addr, 0,
3262 			    sizeof (lifr.lifr_addr));
3263 		} else {
3264 			Perror0_exit("in_status: SIOCGLIFSUBNET");
3265 		}
3266 	}
3267 	sin = (struct sockaddr_in *)&lifr.lifr_addr;
3268 	if ((flags & IFF_NOLOCAL) ||
3269 	    sin->sin_addr.s_addr != laddr->sin_addr.s_addr) {
3270 		(void) printf("subnet %s/%d ", inet_ntoa(sin->sin_addr),
3271 		    lifr.lifr_addrlen);
3272 	}
3273 	if (sin->sin_family != AF_INET) {
3274 		(void) printf("Wrong family: %d\n", sin->sin_family);
3275 	}
3276 
3277 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
3278 	if (ioctl(s, SIOCGLIFNETMASK, (caddr_t)&lifr) < 0) {
3279 		if (errno != EADDRNOTAVAIL)
3280 			Perror0_exit("in_status: SIOCGLIFNETMASK");
3281 		(void) memset(&lifr.lifr_addr, 0, sizeof (lifr.lifr_addr));
3282 	} else
3283 		netmask.sin_addr =
3284 		    ((struct sockaddr_in *)&lifr.lifr_addr)->sin_addr;
3285 	if (flags & IFF_POINTOPOINT) {
3286 		(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
3287 		if (ioctl(s, SIOCGLIFDSTADDR, (caddr_t)&lifr) < 0) {
3288 			if (errno == EADDRNOTAVAIL)
3289 				(void) memset(&lifr.lifr_addr, 0,
3290 				    sizeof (lifr.lifr_addr));
3291 			else
3292 				Perror0_exit("in_status: SIOCGLIFDSTADDR");
3293 		}
3294 		sin = (struct sockaddr_in *)&lifr.lifr_dstaddr;
3295 		(void) printf("--> %s ", inet_ntoa(sin->sin_addr));
3296 	}
3297 	(void) printf("netmask %x ", ntohl(netmask.sin_addr.s_addr));
3298 	if (flags & IFF_BROADCAST) {
3299 		(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
3300 		if (ioctl(s, SIOCGLIFBRDADDR, (caddr_t)&lifr) < 0) {
3301 			if (errno == EADDRNOTAVAIL)
3302 				(void) memset(&lifr.lifr_addr, 0,
3303 				    sizeof (lifr.lifr_addr));
3304 			else
3305 				Perror0_exit("in_status: SIOCGLIFBRDADDR");
3306 		}
3307 		sin = (struct sockaddr_in *)&lifr.lifr_addr;
3308 		if (sin->sin_addr.s_addr != 0) {
3309 			(void) printf("broadcast %s",
3310 			    inet_ntoa(sin->sin_addr));
3311 		}
3312 	}
3313 	/* If there is a groupname, print it for only the physical interface */
3314 	if (strchr(name, ':') == NULL) {
3315 		if (ioctl(s, SIOCGLIFGROUPNAME, &lifr) >= 0 &&
3316 		    lifr.lifr_groupname[0] != '\0') {
3317 			(void) printf("\n\tgroupname %s", lifr.lifr_groupname);
3318 		}
3319 	}
3320 	(void) putchar('\n');
3321 }
3322 
3323 static void
3324 in6_status(int force, uint64_t flags)
3325 {
3326 	char			abuf[INET6_ADDRSTRLEN];
3327 	struct sockaddr_in6	*sin6, *laddr6;
3328 
3329 	if (debug)
3330 		(void) printf("in6_status(%s) flags 0x%llx\n", name, flags);
3331 
3332 	if (!(flags & IFF_IPV6))
3333 		return;
3334 
3335 	if (!(flags & IFF_NOLOCAL)) {
3336 		(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
3337 		if (ioctl(s, SIOCGLIFADDR, (caddr_t)&lifr) < 0) {
3338 			if (errno == EADDRNOTAVAIL || errno == EAFNOSUPPORT ||
3339 			    errno == ENXIO) {
3340 				if (!force)
3341 					return;
3342 				(void) memset(&lifr.lifr_addr, 0,
3343 				    sizeof (lifr.lifr_addr));
3344 			} else
3345 				Perror0_exit("in_status6: SIOCGLIFADDR");
3346 		}
3347 		sin6 = (struct sockaddr_in6 *)&lifr.lifr_addr;
3348 		(void) printf("\tinet6 %s/%d ",
3349 		    inet_ntop(AF_INET6, (void *)&sin6->sin6_addr,
3350 		    abuf, sizeof (abuf)),
3351 		    lifr.lifr_addrlen);
3352 		laddr6 = sin6;
3353 	} else {
3354 		(void) printf("\tinet6 ");
3355 	}
3356 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
3357 	if (ioctl(s, SIOCGLIFSUBNET, (caddr_t)&lifr) < 0) {
3358 		if (errno == EADDRNOTAVAIL || errno == EAFNOSUPPORT ||
3359 		    errno == ENXIO) {
3360 			if (!force)
3361 				return;
3362 			(void) memset(&lifr.lifr_addr, 0,
3363 			    sizeof (lifr.lifr_addr));
3364 		} else
3365 			Perror0_exit("in_status6: SIOCGLIFSUBNET");
3366 	}
3367 	sin6 = (struct sockaddr_in6 *)&lifr.lifr_addr;
3368 	if ((flags & IFF_NOLOCAL) ||
3369 	    !IN6_ARE_ADDR_EQUAL(&sin6->sin6_addr, &laddr6->sin6_addr)) {
3370 		(void) printf("subnet %s/%d ",
3371 		    inet_ntop(AF_INET6, (void *)&sin6->sin6_addr,
3372 		    abuf, sizeof (abuf)),
3373 		    lifr.lifr_addrlen);
3374 	}
3375 	if (sin6->sin6_family != AF_INET6) {
3376 		(void) printf("Wrong family: %d\n", sin6->sin6_family);
3377 	}
3378 	if (flags & IFF_POINTOPOINT) {
3379 		(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
3380 		if (ioctl(s, SIOCGLIFDSTADDR, (caddr_t)&lifr) < 0) {
3381 			if (errno == EADDRNOTAVAIL)
3382 				(void) memset(&lifr.lifr_addr, 0,
3383 				    sizeof (lifr.lifr_addr));
3384 			else
3385 				Perror0_exit("in_status6: SIOCGLIFDSTADDR");
3386 		}
3387 		sin6 = (struct sockaddr_in6 *)&lifr.lifr_dstaddr;
3388 		(void) printf("--> %s ",
3389 		    inet_ntop(AF_INET6, (void *)&sin6->sin6_addr,
3390 		    abuf, sizeof (abuf)));
3391 	}
3392 	if (verbose) {
3393 		(void) putchar('\n');
3394 		(void) putchar('\t');
3395 		(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
3396 		if (ioctl(s, SIOCGLIFTOKEN, (caddr_t)&lifr) < 0) {
3397 			if (errno == EADDRNOTAVAIL || errno == EINVAL)
3398 				(void) memset(&lifr.lifr_addr, 0,
3399 				    sizeof (lifr.lifr_addr));
3400 			else
3401 				Perror0_exit("in_status6: SIOCGLIFTOKEN");
3402 		} else {
3403 			sin6 = (struct sockaddr_in6 *)&lifr.lifr_addr;
3404 			(void) printf("token %s/%d ",
3405 			    inet_ntop(AF_INET6, (void *)&sin6->sin6_addr,
3406 			    abuf, sizeof (abuf)),
3407 			    lifr.lifr_addrlen);
3408 		}
3409 		if (ioctl(s, SIOCGLIFLNKINFO, (caddr_t)&lifr) < 0) {
3410 			if (errno != EINVAL) {
3411 				Perror0_exit("in_status6: SIOCGLIFLNKINFO");
3412 			}
3413 		} else {
3414 			(void) printf("maxhops %u, reachtime %u ms, "
3415 			    "reachretrans %u ms, maxmtu %u ",
3416 			    lifr.lifr_ifinfo.lir_maxhops,
3417 			    lifr.lifr_ifinfo.lir_reachtime,
3418 			    lifr.lifr_ifinfo.lir_reachretrans,
3419 			    lifr.lifr_ifinfo.lir_maxmtu);
3420 		}
3421 	}
3422 	/* If there is a groupname, print it for only the physical interface */
3423 	if (strchr(name, ':') == NULL) {
3424 		if (ioctl(s, SIOCGLIFGROUPNAME, &lifr) >= 0 &&
3425 		    lifr.lifr_groupname[0] != '\0') {
3426 			(void) printf("\n\tgroupname %s", lifr.lifr_groupname);
3427 		}
3428 	}
3429 	(void) putchar('\n');
3430 }
3431 
3432 static void
3433 in_configinfo(int force, uint64_t flags)
3434 {
3435 	struct sockaddr_in *sin, *laddr;
3436 	struct	sockaddr_in netmask = { AF_INET };
3437 
3438 	if (debug)
3439 		(void) printf("in_configinfo(%s) flags 0x%llx\n", name, flags);
3440 
3441 	/* only configinfo info for IPv4 interfaces */
3442 	if (!(flags & IFF_IPV4))
3443 		return;
3444 
3445 	if (!(flags & IFF_NOLOCAL)) {
3446 		(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
3447 		if (ioctl(s, SIOCGLIFADDR, (caddr_t)&lifr) < 0) {
3448 			if (errno == EADDRNOTAVAIL || errno == EAFNOSUPPORT ||
3449 			    errno == ENXIO) {
3450 				if (!force)
3451 					return;
3452 				(void) memset(&lifr.lifr_addr, 0,
3453 				    sizeof (lifr.lifr_addr));
3454 			} else
3455 				Perror0_exit("in_configinfo: SIOCGLIFADDR");
3456 		}
3457 		sin = (struct sockaddr_in *)&lifr.lifr_addr;
3458 		(void) printf(" set %s ", inet_ntoa(sin->sin_addr));
3459 		laddr = sin;
3460 	}
3461 
3462 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
3463 	if (ioctl(s, SIOCGLIFSUBNET, (caddr_t)&lifr) < 0) {
3464 		if (errno == EADDRNOTAVAIL || errno == EAFNOSUPPORT ||
3465 		    errno == ENXIO) {
3466 			if (!force)
3467 				return;
3468 			(void) memset(&lifr.lifr_addr, 0,
3469 			    sizeof (lifr.lifr_addr));
3470 		} else {
3471 			Perror0_exit("in_configinfo: SIOCGLIFSUBNET");
3472 		}
3473 	}
3474 	sin = (struct sockaddr_in *)&lifr.lifr_addr;
3475 
3476 	if ((flags & IFF_NOLOCAL) ||
3477 	    sin->sin_addr.s_addr != laddr->sin_addr.s_addr) {
3478 		(void) printf(" subnet %s/%d ", inet_ntoa(sin->sin_addr),
3479 		    lifr.lifr_addrlen);
3480 	}
3481 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
3482 	if (ioctl(s, SIOCGLIFNETMASK, (caddr_t)&lifr) < 0) {
3483 		if (errno != EADDRNOTAVAIL)
3484 			Perror0_exit("in_configinfo: SIOCGLIFNETMASK");
3485 		(void) memset(&lifr.lifr_addr, 0, sizeof (lifr.lifr_addr));
3486 	} else
3487 		netmask.sin_addr =
3488 		    ((struct sockaddr_in *)&lifr.lifr_addr)->sin_addr;
3489 	if (flags & IFF_POINTOPOINT) {
3490 		(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
3491 		if (ioctl(s, SIOCGLIFDSTADDR, (caddr_t)&lifr) < 0) {
3492 			if (errno == EADDRNOTAVAIL)
3493 				(void) memset(&lifr.lifr_addr, 0,
3494 				    sizeof (lifr.lifr_addr));
3495 			else
3496 				Perror0_exit("in_configinfo: SIOCGLIFDSTADDR");
3497 		}
3498 		sin = (struct sockaddr_in *)&lifr.lifr_dstaddr;
3499 		(void) printf(" destination %s ", inet_ntoa(sin->sin_addr));
3500 	}
3501 	(void) printf(" netmask 0x%x ", ntohl(netmask.sin_addr.s_addr));
3502 	if (flags & IFF_BROADCAST) {
3503 		(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
3504 		if (ioctl(s, SIOCGLIFBRDADDR, (caddr_t)&lifr) < 0) {
3505 			if (errno == EADDRNOTAVAIL)
3506 				(void) memset(&lifr.lifr_addr, 0,
3507 				    sizeof (lifr.lifr_addr));
3508 			else
3509 				Perror0_exit("in_configinfo: SIOCGLIFBRDADDR");
3510 		}
3511 		sin = (struct sockaddr_in *)&lifr.lifr_addr;
3512 		if (sin->sin_addr.s_addr != 0) {
3513 			(void) printf(" broadcast %s ",
3514 			    inet_ntoa(sin->sin_addr));
3515 		}
3516 	}
3517 
3518 	/* If there is a groupname, print it for only the zeroth interface */
3519 	if (lifnum(name) == 0) {
3520 		if (ioctl(s, SIOCGLIFGROUPNAME, &lifr) >= 0 &&
3521 		    lifr.lifr_groupname[0] != '\0') {
3522 			(void) printf(" group %s ", lifr.lifr_groupname);
3523 		}
3524 	}
3525 
3526 	/* Print flags to configure */
3527 	print_config_flags(AF_INET, flags);
3528 }
3529 
3530 static void
3531 in6_configinfo(int force, uint64_t flags)
3532 {
3533 	char abuf[INET6_ADDRSTRLEN];
3534 	struct sockaddr_in6 *sin6, *laddr6;
3535 
3536 	if (debug)
3537 		(void) printf("in6_configinfo(%s) flags 0x%llx\n", name,
3538 		    flags);
3539 
3540 	if (!(flags & IFF_IPV6))
3541 		return;
3542 
3543 	if (!(flags & IFF_NOLOCAL)) {
3544 		(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
3545 		if (ioctl(s, SIOCGLIFADDR, (caddr_t)&lifr) < 0) {
3546 			if (errno == EADDRNOTAVAIL || errno == EAFNOSUPPORT ||
3547 			    errno == ENXIO) {
3548 				if (!force)
3549 					return;
3550 				(void) memset(&lifr.lifr_addr, 0,
3551 				    sizeof (lifr.lifr_addr));
3552 			} else
3553 				Perror0_exit("in6_configinfo: SIOCGLIFADDR");
3554 		}
3555 		sin6 = (struct sockaddr_in6 *)&lifr.lifr_addr;
3556 		(void) printf(" set %s/%d ",
3557 		    inet_ntop(AF_INET6, &sin6->sin6_addr, abuf, sizeof (abuf)),
3558 		    lifr.lifr_addrlen);
3559 		laddr6 = sin6;
3560 	}
3561 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
3562 	if (ioctl(s, SIOCGLIFSUBNET, (caddr_t)&lifr) < 0) {
3563 		if (errno == EADDRNOTAVAIL || errno == EAFNOSUPPORT ||
3564 		    errno == ENXIO) {
3565 			if (!force)
3566 				return;
3567 			(void) memset(&lifr.lifr_addr, 0,
3568 			    sizeof (lifr.lifr_addr));
3569 		} else
3570 			Perror0_exit("in6_configinfo: SIOCGLIFSUBNET");
3571 	}
3572 	sin6 = (struct sockaddr_in6 *)&lifr.lifr_addr;
3573 	if ((flags & IFF_NOLOCAL) ||
3574 	    !IN6_ARE_ADDR_EQUAL(&sin6->sin6_addr, &laddr6->sin6_addr)) {
3575 		(void) printf(" subnet %s/%d ",
3576 		    inet_ntop(AF_INET6, (void *)&sin6->sin6_addr,
3577 		    abuf, sizeof (abuf)),
3578 		    lifr.lifr_addrlen);
3579 	}
3580 
3581 	if (flags & IFF_POINTOPOINT) {
3582 		(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
3583 		if (ioctl(s, SIOCGLIFDSTADDR, (caddr_t)&lifr) < 0) {
3584 			if (errno == EADDRNOTAVAIL)
3585 				(void) memset(&lifr.lifr_addr, 0,
3586 				    sizeof (lifr.lifr_addr));
3587 			else
3588 				Perror0_exit("in6_configinfo: SIOCGLIFDSTADDR");
3589 		}
3590 		sin6 = (struct sockaddr_in6 *)&lifr.lifr_dstaddr;
3591 		(void) printf(" destination %s ",
3592 		    inet_ntop(AF_INET6, (void *)&sin6->sin6_addr,
3593 		    abuf, sizeof (abuf)));
3594 	}
3595 
3596 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
3597 	if (ioctl(s, SIOCGLIFTOKEN, (caddr_t)&lifr) < 0) {
3598 		if (errno == EADDRNOTAVAIL || errno == EINVAL)
3599 			(void) memset(&lifr.lifr_addr, 0,
3600 			    sizeof (lifr.lifr_addr));
3601 		else
3602 			Perror0_exit("in6_configinfo: SIOCGLIFTOKEN");
3603 	} else {
3604 		sin6 = (struct sockaddr_in6 *)&lifr.lifr_addr;
3605 		(void) printf(" token %s/%d ",
3606 		    inet_ntop(AF_INET6, (void *)&sin6->sin6_addr,
3607 		    abuf, sizeof (abuf)),
3608 		    lifr.lifr_addrlen);
3609 	}
3610 
3611 	/* If there is a groupname, print it for only the zeroth interface */
3612 	if (lifnum(name) == 0) {
3613 		if (ioctl(s, SIOCGLIFGROUPNAME, &lifr) >= 0 &&
3614 		    lifr.lifr_groupname[0] != '\0') {
3615 			(void) printf(" group %s ", lifr.lifr_groupname);
3616 		}
3617 	}
3618 
3619 	/* Print flags to configure */
3620 	print_config_flags(AF_INET6, flags);
3621 }
3622 
3623 /*
3624  * If this is a physical interface then remove it.
3625  * If it is a logical interface name use SIOCLIFREMOVEIF to
3626  * remove it. In both cases fail if it doesn't exist.
3627  */
3628 /* ARGSUSED */
3629 static int
3630 inetunplumb(char *arg, int64_t param)
3631 {
3632 	ipadm_status_t	istatus;
3633 
3634 	istatus = ipadm_delete_if(iph, name, afp->af_af, IPADM_OPT_ACTIVE);
3635 	if (istatus != IPADM_SUCCESS) {
3636 		(void) fprintf(stderr, "ifconfig: cannot unplumb %s: %s\n",
3637 		    name, ipadm_status2str(istatus));
3638 		exit(1);
3639 	}
3640 
3641 	return (0);
3642 }
3643 
3644 /*
3645  * Create the interface in `name', using ipadm_create_if(). If `name' is a
3646  * logical interface or loopback interface, ipadm_create_if() uses
3647  * SIOCLIFADDIF to create it.
3648  */
3649 /* ARGSUSED */
3650 static int
3651 inetplumb(char *arg, int64_t param)
3652 {
3653 	ipadm_status_t	istatus;
3654 
3655 	istatus = ipadm_create_if(iph, name, afp->af_af, IPADM_OPT_ACTIVE);
3656 	if (istatus != IPADM_SUCCESS) {
3657 		(void) fprintf(stderr, "ifconfig: cannot plumb %s: %s\n",
3658 		    name, ipadm_status2str(istatus));
3659 		if (istatus != IPADM_IF_EXISTS)
3660 			exit(1);
3661 	}
3662 	return (0);
3663 }
3664 
3665 /* ARGSUSED */
3666 static int
3667 inetipmp(char *arg, int64_t param)
3668 {
3669 	int retval;
3670 
3671 	/*
3672 	 * Treat e.g. "ifconfig ipmp0:2 ipmp" as "ifconfig ipmp0:2 plumb".
3673 	 * Otherwise, try to create the requested IPMP interface.
3674 	 */
3675 	if (strchr(name, ':') != NULL)
3676 		retval = inetplumb(arg, param);
3677 	else
3678 		retval = create_ipmp(name, afp->af_af, name, _B_FALSE);
3679 
3680 	/*
3681 	 * We'd return -1, but foreachinterface() doesn't propagate the error
3682 	 * into the exit status, so we're forced to explicitly exit().
3683 	 */
3684 	if (retval == -1)
3685 		exit(1);
3686 	return (0);
3687 }
3688 
3689 /*
3690  * Create an IPMP group `grname' with address family `af'.  If `ifname' is
3691  * non-NULL, it specifies the interface name to use.  Otherwise, use the name
3692  * ipmpN, where N corresponds to the lowest available integer.  If `implicit'
3693  * is set, then the group is being created as a side-effect of placing an
3694  * underlying interface in a group.  Also start in.mpathd if necessary.
3695  */
3696 static int
3697 create_ipmp(const char *grname, int af, const char *ifname, boolean_t implicit)
3698 {
3699 	static int ipmp_daemon_started;
3700 	uint32_t flags = IPADM_OPT_IPMP|IPADM_OPT_ACTIVE;
3701 	ipadm_status_t istatus;
3702 
3703 	if (debug) {
3704 		(void) printf("create_ipmp: ifname %s grname %s af %d\n",
3705 		    ifname != NULL ? ifname : "NULL", grname, af);
3706 	}
3707 
3708 	/*
3709 	 * ipadm_create_if() creates the IPMP interface and fills in the
3710 	 * ppa in lifr.lifr_name, if `ifname'="ipmp".
3711 	 */
3712 	(void) strlcpy(lifr.lifr_name, (ifname ? ifname : "ipmp"),
3713 	    sizeof (lifr.lifr_name));
3714 	if (ifname == NULL)
3715 		flags |= IPADM_OPT_GENPPA;
3716 	istatus = ipadm_create_if(iph, lifr.lifr_name, af, flags);
3717 	if (istatus != IPADM_SUCCESS) {
3718 		(void) fprintf(stderr, "ifconfig: cannot create IPMP interface "
3719 		    "%s: %s\n", grname, ipadm_status2str(istatus));
3720 		return (-1);
3721 	}
3722 
3723 	/*
3724 	 * To preserve backward-compatibility, always bring up the link-local
3725 	 * address for implicitly-created IPv6 IPMP interfaces.
3726 	 */
3727 	if (implicit && af == AF_INET6) {
3728 		if (ioctl(s6, SIOCGLIFFLAGS, &lifr) == 0) {
3729 			lifr.lifr_flags |= IFF_UP;
3730 			(void) ioctl(s6, SIOCSLIFFLAGS, &lifr);
3731 		}
3732 	}
3733 
3734 	/*
3735 	 * If the caller requested a different group name, issue a
3736 	 * SIOCSLIFGROUPNAME on the new IPMP interface.
3737 	 */
3738 	if (strcmp(lifr.lifr_name, grname) != 0) {
3739 		(void) strlcpy(lifr.lifr_groupname, grname, LIFGRNAMSIZ);
3740 		if (ioctl(s, SIOCSLIFGROUPNAME, &lifr) == -1) {
3741 			Perror0("SIOCSLIFGROUPNAME");
3742 			return (-1);
3743 		}
3744 	}
3745 
3746 	/*
3747 	 * If we haven't done so yet, ensure in.mpathd is started.
3748 	 */
3749 	if (ipmp_daemon_started++ == 0)
3750 		start_ipmp_daemon();
3751 
3752 	return (0);
3753 }
3754 
3755 /*
3756  * Start in.mpathd if it's not already running.
3757  */
3758 static void
3759 start_ipmp_daemon(void)
3760 {
3761 	int retval;
3762 	ipmp_handle_t ipmp_handle;
3763 
3764 	/*
3765 	 * Ping in.mpathd to see if it's running already.
3766 	 */
3767 	if ((retval = ipmp_open(&ipmp_handle)) != IPMP_SUCCESS) {
3768 		(void) fprintf(stderr, "ifconfig: cannot create IPMP handle: "
3769 		    "%s\n", ipmp_errmsg(retval));
3770 		return;
3771 	}
3772 
3773 	retval = ipmp_ping_daemon(ipmp_handle);
3774 	ipmp_close(ipmp_handle);
3775 
3776 	switch (retval) {
3777 	case IPMP_ENOMPATHD:
3778 		break;
3779 	case IPMP_SUCCESS:
3780 		return;
3781 	default:
3782 		(void) fprintf(stderr, "ifconfig: cannot ping in.mpathd: %s\n",
3783 		    ipmp_errmsg(retval));
3784 		break;
3785 	}
3786 
3787 	/*
3788 	 * Start in.mpathd.  Note that in.mpathd will handle multiple
3789 	 * incarnations (ipmp_ping_daemon() is just an optimization) so we
3790 	 * don't need to worry about racing with another ifconfig process.
3791 	 */
3792 	switch (fork()) {
3793 	case -1:
3794 		Perror0_exit("start_ipmp_daemon: fork");
3795 		/* NOTREACHED */
3796 	case 0:
3797 		(void) execl(MPATHD_PATH, MPATHD_PATH, NULL);
3798 		_exit(1);
3799 		/* NOTREACHED */
3800 	default:
3801 		break;
3802 	}
3803 }
3804 
3805 /*
3806  * Bring the address named by `ifaddrp' up or down.  Doesn't trust any mutable
3807  * values in ia_flags since they may be stale.
3808  */
3809 static boolean_t
3810 ifaddr_op(ifaddrlistx_t *ifaddrp, boolean_t up)
3811 {
3812 	struct lifreq	lifrl;	/* Local lifreq struct */
3813 	int		fd = (ifaddrp->ia_flags & IFF_IPV4) ? s4 : s6;
3814 
3815 	(void) memset(&lifrl, 0, sizeof (lifrl));
3816 	(void) strlcpy(lifrl.lifr_name, ifaddrp->ia_name, LIFNAMSIZ);
3817 	if (ioctl(fd, SIOCGLIFFLAGS, &lifrl) == -1)
3818 		return (_B_FALSE);
3819 
3820 	if (up)
3821 		lifrl.lifr_flags |= IFF_UP;
3822 	else
3823 		lifrl.lifr_flags &= ~IFF_UP;
3824 
3825 	if (ioctl(fd, SIOCSLIFFLAGS, &lifrl) == -1)
3826 		return (_B_FALSE);
3827 
3828 	/*
3829 	 * If we're trying to bring the address down, ensure that DAD activity
3830 	 * (observable by IFF_DUPLICATE) has also been stopped.
3831 	 */
3832 	if (!up && ioctl(fd, SIOCGLIFFLAGS, &lifrl) != -1 &&
3833 	    lifrl.lifr_flags & IFF_DUPLICATE) {
3834 		if (ioctl(fd, SIOCGLIFADDR, &lifrl) == -1 ||
3835 		    ioctl(fd, SIOCSLIFADDR, &lifrl) == -1) {
3836 			return (_B_FALSE);
3837 		}
3838 	}
3839 	return (_B_TRUE);
3840 }
3841 
3842 static boolean_t
3843 ifaddr_up(ifaddrlistx_t *ifaddrp)
3844 {
3845 	return (ifaddr_op(ifaddrp, _B_TRUE));
3846 }
3847 
3848 static boolean_t
3849 ifaddr_down(ifaddrlistx_t *ifaddrp)
3850 {
3851 	return (ifaddr_op(ifaddrp, _B_FALSE));
3852 }
3853 
3854 /*
3855  * Open the global libdladm handle "dlh" if it isn't already opened.  The
3856  * caller may optionally supply a link name to obtain its linkid.  If a link
3857  * of a specific class or classes is required, reqclass specifies the class
3858  * mask.
3859  */
3860 static dladm_status_t
3861 ifconfig_dladm_open(const char *name, datalink_class_t reqclass,
3862     datalink_id_t *linkid)
3863 {
3864 	dladm_status_t status = DLADM_STATUS_OK;
3865 	datalink_class_t class;
3866 
3867 	if (!dlh_opened) {
3868 		if ((status = dladm_open(&dlh)) != DLADM_STATUS_OK)
3869 			return (status);
3870 		dlh_opened = _B_TRUE;
3871 	}
3872 	if (name != NULL) {
3873 		status = dladm_name2info(dlh, name, linkid, NULL, &class, NULL);
3874 		if (status == DLADM_STATUS_OK) {
3875 			if (!(class & reqclass))
3876 				status = DLADM_STATUS_LINKINVAL;
3877 		}
3878 	}
3879 	return (status);
3880 }
3881 
3882 /*
3883  * This function checks if we can use libipadm API's. We will only
3884  * call libipadm functions for non-IPMP interfaces. This check is
3885  * temporary until libipadm supports IPMP interfaces.
3886  */
3887 static boolean_t
3888 ifconfig_use_libipadm(int s, const char *lifname)
3889 {
3890 	struct lifreq lifr1;
3891 
3892 	(void) strlcpy(lifr1.lifr_name, lifname, sizeof (lifr1.lifr_name));
3893 	if (ioctl(s, SIOCGLIFGROUPNAME, (caddr_t)&lifr1) < 0) {
3894 		(void) strncpy(lifr.lifr_name, lifname,
3895 		    sizeof (lifr.lifr_name));
3896 		Perror0_exit("error");
3897 	}
3898 
3899 	return (lifr1.lifr_groupname[0] == '\0');
3900 }
3901 
3902 static void
3903 ipadmerr_exit(ipadm_status_t status, const char *str)
3904 {
3905 	(void) fprintf(stderr, "ifconfig: %s: %s\n", str,
3906 	    ipadm_status2str(status));
3907 	exit(1);
3908 }
3909 
3910 static void
3911 dladmerr_exit(dladm_status_t status, const char *str)
3912 {
3913 	char errstr[DLADM_STRSIZE];
3914 
3915 	(void) fprintf(stderr, "%s: %s\n", str,
3916 	    dladm_status2str(status, errstr));
3917 	exit(1);
3918 }
3919 
3920 void
3921 Perror0(const char *cmd)
3922 {
3923 	Perror2(cmd, lifr.lifr_name);
3924 }
3925 
3926 void
3927 Perror0_exit(const char *cmd)
3928 {
3929 	Perror0(cmd);
3930 	exit(1);
3931 }
3932 
3933 void
3934 Perror2(const char *cmd, const char *str)
3935 {
3936 	int error = errno;
3937 
3938 	(void) fprintf(stderr, "ifconfig: %s: ", cmd);
3939 
3940 	switch (error) {
3941 	case ENXIO:
3942 		(void) fprintf(stderr, "%s: no such interface\n", str);
3943 		break;
3944 	case EPERM:
3945 		(void) fprintf(stderr, "%s: permission denied\n", str);
3946 		break;
3947 	case EEXIST:
3948 		(void) fprintf(stderr, "%s: already exists\n", str);
3949 		break;
3950 	case ENAMETOOLONG:
3951 		(void) fprintf(stderr, "%s: interface name too long\n", str);
3952 		break;
3953 	case ERANGE:
3954 		(void) fprintf(stderr, "%s: logical interface id is outside "
3955 		    "allowed range\n", str);
3956 		break;
3957 	default:
3958 		errno = error;
3959 		perror(str);
3960 	}
3961 }
3962 
3963 /*
3964  * Print out error message (Perror2()) and exit
3965  */
3966 void
3967 Perror2_exit(const char *cmd, const char *str)
3968 {
3969 	Perror2(cmd, str);
3970 	exit(1);
3971 	/* NOTREACHED */
3972 }
3973 
3974 void
3975 Perrdlpi(const char *cmd, const char *linkname, int err)
3976 {
3977 	(void) fprintf(stderr, "ifconfig: %s \"%s\": %s\n", cmd,
3978 	    linkname, dlpi_strerror(err));
3979 }
3980 
3981 /*
3982  * Print out error message (Perrdlpi()) and exit
3983  */
3984 void
3985 Perrdlpi_exit(const char *cmd, const char *linkname, int err)
3986 {
3987 	Perrdlpi(cmd, linkname, err);
3988 	exit(1);
3989 }
3990 
3991 /*
3992  * If the last argument is non-NULL allow a <addr>/<n> syntax and
3993  * pass out <n> in *plenp.
3994  * If <n> doesn't parse return BAD_ADDR as *plenp.
3995  * If no /<n> is present return NO_PREFIX as *plenp.
3996  */
3997 static void
3998 in_getaddr(char *s, struct sockaddr *saddr, int *plenp)
3999 {
4000 	/* LINTED: alignment */
4001 	struct sockaddr_in *sin = (struct sockaddr_in *)saddr;
4002 	struct hostent *hp;
4003 	struct netent *np;
4004 	char str[BUFSIZ];
4005 	int error_num;
4006 
4007 	(void) strncpy(str, s, sizeof (str));
4008 
4009 	/*
4010 	 * Look for '/'<n> is plenp
4011 	 */
4012 	if (plenp != NULL) {
4013 		char *cp;
4014 
4015 		*plenp = in_getprefixlen(str, _B_TRUE, IP_ABITS);
4016 		if (*plenp == BAD_ADDR)
4017 			return;
4018 		cp = strchr(str, '/');
4019 		if (cp != NULL)
4020 			*cp = '\0';
4021 	} else if (strchr(str, '/') != NULL) {
4022 		(void) fprintf(stderr, "ifconfig: %s: unexpected '/'\n", str);
4023 		exit(1);
4024 	}
4025 
4026 	(void) memset(sin, 0, sizeof (*sin));
4027 
4028 	/*
4029 	 *	Try to catch attempts to set the broadcast address to all 1's.
4030 	 */
4031 	if (strcmp(str, "255.255.255.255") == 0 ||
4032 	    (strtoul(str, (char **)NULL, 0) == 0xffffffffUL)) {
4033 		sin->sin_family = AF_INET;
4034 		sin->sin_addr.s_addr = 0xffffffff;
4035 		return;
4036 	}
4037 
4038 	hp = getipnodebyname(str, AF_INET, 0, &error_num);
4039 	if (hp) {
4040 		sin->sin_family = hp->h_addrtype;
4041 		(void) memcpy(&sin->sin_addr, hp->h_addr, hp->h_length);
4042 		freehostent(hp);
4043 		return;
4044 	}
4045 	np = getnetbyname(str);
4046 	if (np) {
4047 		sin->sin_family = np->n_addrtype;
4048 		sin->sin_addr = inet_makeaddr(np->n_net, INADDR_ANY);
4049 		return;
4050 	}
4051 	if (error_num == TRY_AGAIN) {
4052 		(void) fprintf(stderr, "ifconfig: %s: bad address "
4053 		    "(try again later)\n", s);
4054 	} else {
4055 		(void) fprintf(stderr, "ifconfig: %s: bad address\n", s);
4056 	}
4057 	exit(1);
4058 }
4059 
4060 /*
4061  * If the last argument is non-NULL allow a <addr>/<n> syntax and
4062  * pass out <n> in *plenp.
4063  * If <n> doesn't parse return BAD_ADDR as *plenp.
4064  * If no /<n> is present return NO_PREFIX as *plenp.
4065  */
4066 static void
4067 in6_getaddr(char *s, struct sockaddr *saddr, int *plenp)
4068 {
4069 	/* LINTED: alignment */
4070 	struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)saddr;
4071 	struct hostent *hp;
4072 	char str[BUFSIZ];
4073 	int error_num;
4074 
4075 	(void) strncpy(str, s, sizeof (str));
4076 
4077 	/*
4078 	 * Look for '/'<n> is plenp
4079 	 */
4080 	if (plenp != NULL) {
4081 		char *cp;
4082 
4083 		*plenp = in_getprefixlen(str, _B_TRUE, IPV6_ABITS);
4084 		if (*plenp == BAD_ADDR)
4085 			return;
4086 		cp = strchr(str, '/');
4087 		if (cp != NULL)
4088 			*cp = '\0';
4089 	} else if (strchr(str, '/') != NULL) {
4090 		(void) fprintf(stderr, "ifconfig: %s: unexpected '/'\n", str);
4091 		exit(1);
4092 	}
4093 
4094 	(void) memset(sin6, 0, sizeof (*sin6));
4095 
4096 	hp = getipnodebyname(str, AF_INET6, 0, &error_num);
4097 	if (hp) {
4098 		sin6->sin6_family = hp->h_addrtype;
4099 		(void) memcpy(&sin6->sin6_addr, hp->h_addr, hp->h_length);
4100 		freehostent(hp);
4101 		return;
4102 	}
4103 	if (error_num == TRY_AGAIN) {
4104 		(void) fprintf(stderr, "ifconfig: %s: bad address "
4105 		    "(try again later)\n", s);
4106 	} else {
4107 		(void) fprintf(stderr, "ifconfig: %s: bad address\n", s);
4108 	}
4109 	exit(1);
4110 }
4111 
4112 /*
4113  * If "slash" is zero this parses the whole string as
4114  * an integer. With "slash" non zero it parses the tail part as an integer.
4115  *
4116  * If it is not a valid integer this returns BAD_ADDR.
4117  * If there is /<n> present this returns NO_PREFIX.
4118  */
4119 static int
4120 in_getprefixlen(char *addr, boolean_t slash, int max_plen)
4121 {
4122 	int prefixlen;
4123 	char *str, *end;
4124 
4125 	if (slash) {
4126 		str = strchr(addr, '/');
4127 		if (str == NULL)
4128 			return (NO_PREFIX);
4129 		str++;
4130 	} else
4131 		str = addr;
4132 
4133 	prefixlen = strtol(str, &end, 10);
4134 	if (prefixlen < 0)
4135 		return (BAD_ADDR);
4136 	if (str == end)
4137 		return (BAD_ADDR);
4138 	if (max_plen != 0 && max_plen < prefixlen)
4139 		return (BAD_ADDR);
4140 	return (prefixlen);
4141 }
4142 
4143 /*
4144  * Convert a prefix length to a mask.
4145  * Returns 1 if ok. 0 otherwise.
4146  * Assumes the mask array is zero'ed by the caller.
4147  */
4148 static boolean_t
4149 in_prefixlentomask(int prefixlen, int maxlen, uchar_t *mask)
4150 {
4151 	if (prefixlen < 0 || prefixlen > maxlen)
4152 		return (0);
4153 
4154 	while (prefixlen > 0) {
4155 		if (prefixlen >= 8) {
4156 			*mask++ = 0xFF;
4157 			prefixlen -= 8;
4158 			continue;
4159 		}
4160 		*mask |= 1 << (8 - prefixlen);
4161 		prefixlen--;
4162 	}
4163 	return (1);
4164 }
4165 
4166 static void
4167 print_flags(uint64_t flags)
4168 {
4169 	boolean_t first = _B_TRUE;
4170 	int cnt, i;
4171 
4172 	(void) printf("flags=%llx", flags);
4173 	cnt = sizeof (if_flags_tbl) / sizeof (if_flags_t);
4174 	for (i = 0; i < cnt; i++) {
4175 		if (flags & if_flags_tbl[i].iff_value) {
4176 			if (first) {
4177 				(void) printf("<");
4178 				first = _B_FALSE;
4179 			} else {
4180 				/*
4181 				 * It has to be here and not with the
4182 				 * printf below because for the last one,
4183 				 * we don't want a comma before the ">".
4184 				 */
4185 				(void) printf(",");
4186 			}
4187 			(void) printf("%s", if_flags_tbl[i].iff_name);
4188 		}
4189 	}
4190 	if (!first)
4191 		(void) printf(">");
4192 }
4193 
4194 static void
4195 print_config_flags(int af, uint64_t flags)
4196 {
4197 	if_config_cmd_t *cmdp;
4198 
4199 	for (cmdp = if_config_cmd_tbl; cmdp->iff_flag != 0; cmdp++) {
4200 		if ((flags & cmdp->iff_flag) &&
4201 		    (cmdp->iff_af == AF_UNSPEC || cmdp->iff_af == af)) {
4202 			(void) printf("%s ", cmdp->iff_name);
4203 		}
4204 	}
4205 }
4206 
4207 /*
4208  * Use the configured directory lookup mechanism (e.g. files/NIS/...)
4209  * to find the network mask.  Returns true if we found one to set.
4210  *
4211  * The parameter addr_set controls whether we should get the address of
4212  * the working interface for the netmask query.  If addr_set is true,
4213  * we will use the address provided.  Otherwise, we will find the working
4214  * interface's address and use it instead.
4215  */
4216 static boolean_t
4217 in_getmask(struct sockaddr_in *saddr, boolean_t addr_set)
4218 {
4219 	struct sockaddr_in ifaddr;
4220 
4221 	/*
4222 	 * Read the address from the interface if it is not passed in.
4223 	 */
4224 	if (!addr_set) {
4225 		(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
4226 		if (ioctl(s, SIOCGLIFADDR, (caddr_t)&lifr) < 0) {
4227 			if (errno != EADDRNOTAVAIL) {
4228 				(void) fprintf(stderr, "Need net number for "
4229 				    "mask\n");
4230 			}
4231 			return (_B_FALSE);
4232 		}
4233 		ifaddr = *((struct sockaddr_in *)&lifr.lifr_addr);
4234 	} else {
4235 		ifaddr.sin_addr = saddr->sin_addr;
4236 	}
4237 	if (getnetmaskbyaddr(ifaddr.sin_addr, &saddr->sin_addr) == 0) {
4238 		saddr->sin_family = AF_INET;
4239 		return (_B_TRUE);
4240 	}
4241 	return (_B_FALSE);
4242 }
4243 
4244 static int
4245 lifnum(const char *ifname)
4246 {
4247 	const char *cp;
4248 
4249 	if ((cp = strchr(ifname, ':')) == NULL)
4250 		return (0);
4251 	else
4252 		return (atoi(cp + 1));
4253 }
4254 
4255 static void
4256 add_ni(const char *name)
4257 {
4258 	ni_t **pp;
4259 	ni_t *p;
4260 
4261 	for (pp = &ni_list; (p = *pp) != NULL; pp = &(p->ni_next)) {
4262 		if (strcmp(p->ni_name, name) == 0) {
4263 			if (debug > 2)
4264 				(void) fprintf(stderr, "'%s' is a duplicate\n",
4265 				    name);
4266 			return;
4267 		}
4268 	}
4269 
4270 	if (debug > 2)
4271 		(void) fprintf(stderr, "adding '%s'\n",
4272 		    name);
4273 
4274 	if ((p = malloc(sizeof (ni_t))) == NULL)
4275 		return;
4276 
4277 	(void) strlcpy(p->ni_name, name, sizeof (p->ni_name));
4278 	p->ni_next = NULL;
4279 
4280 	*pp = p;
4281 	num_ni++;
4282 }
4283 
4284 static boolean_t
4285 ni_entry(const char *linkname, void *arg)
4286 {
4287 	dlpi_handle_t	dh;
4288 	datalink_class_t class;
4289 
4290 	(void) dladm_name2info(arg, linkname, NULL, NULL, &class, NULL);
4291 
4292 	if (class == DATALINK_CLASS_ETHERSTUB)
4293 		return (_B_FALSE);
4294 	if (dlpi_open(linkname, &dh, 0) != DLPI_SUCCESS)
4295 		return (_B_FALSE);
4296 
4297 	add_ni(linkname);
4298 
4299 	dlpi_close(dh);
4300 	return (_B_FALSE);
4301 }
4302 
4303 /*
4304  * dhcp-related routines
4305  */
4306 
4307 static int
4308 setifdhcp(const char *caller, const char *ifname, int argc, char *argv[])
4309 {
4310 	dhcp_ipc_request_t	*request;
4311 	dhcp_ipc_reply_t	*reply	= NULL;
4312 	int			timeout = DHCP_IPC_WAIT_DEFAULT;
4313 	dhcp_ipc_type_t		type	= DHCP_START;
4314 	int			error;
4315 	boolean_t		is_primary = _B_FALSE;
4316 	boolean_t		started = _B_FALSE;
4317 
4318 	for (argv++; --argc > 0; argv++) {
4319 
4320 		if (strcmp(*argv, "primary") == 0) {
4321 			is_primary = _B_TRUE;
4322 			continue;
4323 		}
4324 
4325 		if (strcmp(*argv, "wait") == 0) {
4326 			if (--argc <= 0) {
4327 				usage();
4328 				return (DHCP_EXIT_BADARGS);
4329 			}
4330 			argv++;
4331 
4332 			if (strcmp(*argv, "forever") == 0) {
4333 				timeout = DHCP_IPC_WAIT_FOREVER;
4334 				continue;
4335 			}
4336 
4337 			if (sscanf(*argv, "%d", &timeout) != 1) {
4338 				usage();
4339 				return (DHCP_EXIT_BADARGS);
4340 			}
4341 
4342 			if (timeout < 0) {
4343 				usage();
4344 				return (DHCP_EXIT_BADARGS);
4345 			}
4346 			continue;
4347 		}
4348 
4349 		type = dhcp_string_to_request(*argv);
4350 		if (type == -1) {
4351 			usage();
4352 			return (DHCP_EXIT_BADARGS);
4353 		}
4354 	}
4355 
4356 	/*
4357 	 * Only try to start agent on start or inform; in all other cases it
4358 	 * has to already be running for anything to make sense.
4359 	 */
4360 	if (type == DHCP_START || type == DHCP_INFORM) {
4361 		if (dhcp_start_agent(DHCP_IPC_MAX_WAIT) == -1) {
4362 			(void) fprintf(stderr, "%s: unable to start %s\n",
4363 			    caller, DHCP_AGENT_PATH);
4364 			return (DHCP_EXIT_FAILURE);
4365 		}
4366 		started = _B_TRUE;
4367 	}
4368 
4369 	if (is_primary)
4370 		type |= DHCP_PRIMARY;
4371 
4372 	if (af != AF_INET)
4373 		type |= DHCP_V6;
4374 
4375 	request = dhcp_ipc_alloc_request(type, ifname, NULL, 0, DHCP_TYPE_NONE);
4376 	if (request == NULL) {
4377 		(void) fprintf(stderr, "%s: out of memory\n", caller);
4378 		return (DHCP_EXIT_SYSTEM);
4379 	}
4380 
4381 	error = dhcp_ipc_make_request(request, &reply, timeout);
4382 	if (error != 0) {
4383 		free(request);
4384 		/*
4385 		 * Re-map connect error to not under control if we didn't try a
4386 		 * start operation, as this has to be true and results in a
4387 		 * clearer message, not to mention preserving compatibility
4388 		 * with the days when we always started dhcpagent for every
4389 		 * request.
4390 		 */
4391 		if (error == DHCP_IPC_E_CONNECT && !started)
4392 			error = DHCP_IPC_E_UNKIF;
4393 		(void) fprintf(stderr, "%s: %s: %s\n", caller, ifname,
4394 		    dhcp_ipc_strerror(error));
4395 		return (DHCP_EXIT_FAILURE);
4396 	}
4397 
4398 	error = reply->return_code;
4399 	if (error != 0) {
4400 		free(request);
4401 		free(reply);
4402 
4403 		if (error == DHCP_IPC_E_TIMEOUT && timeout == 0)
4404 			return (DHCP_EXIT_SUCCESS);
4405 
4406 		(void) fprintf(stderr, "%s: %s: %s\n", caller, ifname,
4407 		    dhcp_ipc_strerror(error));
4408 
4409 		if (error == DHCP_IPC_E_TIMEOUT)
4410 			return (DHCP_EXIT_TIMEOUT);
4411 		else
4412 			return (DHCP_EXIT_IF_FAILURE);
4413 	}
4414 
4415 	if (DHCP_IPC_CMD(type) == DHCP_STATUS) {
4416 		(void) printf("%s", dhcp_status_hdr_string());
4417 		(void) printf("%s", dhcp_status_reply_to_string(reply));
4418 	}
4419 
4420 	free(request);
4421 	free(reply);
4422 	return (DHCP_EXIT_SUCCESS);
4423 }
4424 
4425 static void
4426 usage(void)
4427 {
4428 	(void) fprintf(stderr,
4429 	    "usage: ifconfig <interface> | -a[ 4 | 6 | D ][ u | d ][ Z ]\n");
4430 
4431 	(void) fprintf(stderr, "%s",
4432 	    "\t[ <addr_family> ]\n"
4433 	    "\t[ <address>[/<prefix_length>] [ <dest_address> ] ]\n"
4434 	    "\t[ set [ <address>][/<prefix_length>] ]"
4435 	    " [ <address>/<prefix_length>] ]\n"
4436 	    "\t[ destination <dest_address> ]\n"
4437 	    "\t[ addif <address>[/<prefix_length>]"
4438 	    "  [ <dest_address> ] ]\n"
4439 	    "\t[ removeif <address>[/<prefix_length>] ]\n"
4440 	    "\t[ arp | -arp ]\n"
4441 	    "\t[ auto-revarp ]\n"
4442 	    "\t[ broadcast <broad_addr> ]\n"
4443 	    "\t[ index <if_index> ]\n"
4444 	    "\t[ metric <n> ] [ mtu <n> ]\n"
4445 	    "\t[ netmask <mask> ]\n"
4446 	    "\t[ plumb ] [ unplumb ]\n"
4447 	    "\t[ preferred | -preferred ]\n"
4448 	    "\t[ private | -private ]\n"
4449 	    "\t[ local | -local ]\n"
4450 	    "\t[ router | -router ]\n"
4451 	    "\t[ subnet <subnet_address>]\n"
4452 	    "\t[ trailers | -trailers ]\n"
4453 	    "\t[ token <address>/<prefix_length> ]\n"
4454 	    "\t[ tsrc <tunnel_src_address> ]\n"
4455 	    "\t[ tdst <tunnel_dest_address> ]\n"
4456 	    "\t[ auth_algs <tunnel_AH_authentication_algorithm> ]\n"
4457 	    "\t[ encr_algs <tunnel_ESP_encryption_algorithm> ]\n"
4458 	    "\t[ encr_auth_algs <tunnel_ESP_authentication_algorithm> ]\n"
4459 	    "\t[ up ] [ down ]\n"
4460 	    "\t[ xmit | -xmit ]\n"
4461 	    "\t[ modlist ]\n"
4462 	    "\t[ modinsert <module_name@position> ]\n"
4463 	    "\t[ modremove <module_name@position> ]\n"
4464 	    "\t[ ipmp ]\n"
4465 	    "\t[ group <groupname>] | [ group \"\"]\n"
4466 	    "\t[ deprecated | -deprecated ]\n"
4467 	    "\t[ standby | -standby ]\n"
4468 	    "\t[ failover | -failover ]\n"
4469 	    "\t[ zone <zonename> | -zone ]\n"
4470 	    "\t[ usesrc <interface> ]\n"
4471 	    "\t[ all-zones ]\n");
4472 
4473 	(void) fprintf(stderr, "or\n");
4474 	(void) fprintf(stderr,
4475 	    "\tifconfig <interface> |  -a[ 4 | 6 | D ] [ u | d ]\n");
4476 
4477 	(void) fprintf(stderr, "%s", "\tauto-dhcp | dhcp\n"
4478 	    "\t[ wait <time> | forever ]\n\t[ primary ]\n"
4479 	    "\tstart | drop | ping | release | status | inform\n");
4480 }
4481