1 /* 2 * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 3 * Use is subject to license terms. 4 */ 5 6 /* 7 * Copyright (c) 1988, 1991, 1993 8 * The Regents of the University of California. All rights reserved. 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 1. Redistributions of source code must retain the above copyright 14 * notice, this list of conditions and the following disclaimer. 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 3. All advertising materials mentioning features or use of this software 19 * must display the following acknowledgement: 20 * This product includes software developed by the University of 21 * California, Berkeley and its contributors. 22 * 4. Neither the name of the University nor the names of its contributors 23 * may be used to endorse or promote products derived from this software 24 * without specific prior written permission. 25 * 26 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 27 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 28 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 29 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 30 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 31 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 32 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 33 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 34 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 35 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 36 * SUCH DAMAGE. 37 * 38 * @(#)rtsock.c 8.6 (Berkeley) 2/11/95 39 */ 40 41 /* 42 * This file contains routines that processes routing socket requests. 43 */ 44 45 #include <sys/types.h> 46 #include <sys/stream.h> 47 #include <sys/stropts.h> 48 #include <sys/ddi.h> 49 #include <sys/strsubr.h> 50 #include <sys/cmn_err.h> 51 #include <sys/debug.h> 52 #include <sys/policy.h> 53 #include <sys/zone.h> 54 55 #include <sys/systm.h> 56 #include <sys/param.h> 57 #include <sys/socket.h> 58 #include <sys/strsun.h> 59 #include <net/if.h> 60 #include <net/route.h> 61 #include <netinet/in.h> 62 #include <net/if_dl.h> 63 #include <netinet/ip6.h> 64 65 #include <inet/common.h> 66 #include <inet/ip.h> 67 #include <inet/ip6.h> 68 #include <inet/ip_if.h> 69 #include <inet/ip_ire.h> 70 #include <inet/ip_ftable.h> 71 #include <inet/ip_rts.h> 72 73 #include <inet/ipclassifier.h> 74 75 #include <sys/tsol/tndb.h> 76 #include <sys/tsol/tnet.h> 77 78 #define RTS_MSG_SIZE(type, rtm_addrs, af, sacnt) \ 79 (rts_data_msg_size(rtm_addrs, af, sacnt) + rts_header_msg_size(type)) 80 81 static size_t rts_copyfromsockaddr(struct sockaddr *sa, in6_addr_t *addrp); 82 static void rts_fill_msg(int type, int rtm_addrs, ipaddr_t dst, 83 ipaddr_t mask, ipaddr_t gateway, ipaddr_t src_addr, ipaddr_t brd_addr, 84 ipaddr_t author, const ipif_t *ipif, mblk_t *mp, uint_t, const tsol_gc_t *); 85 static int rts_getaddrs(rt_msghdr_t *rtm, in6_addr_t *dst_addrp, 86 in6_addr_t *gw_addrp, in6_addr_t *net_maskp, in6_addr_t *authorp, 87 in6_addr_t *if_addrp, in6_addr_t *src_addrp, ushort_t *indexp, 88 sa_family_t *afp, tsol_rtsecattr_t *rtsecattr, int *error); 89 static void rts_getifdata(if_data_t *if_data, const ipif_t *ipif); 90 static int rts_getmetrics(ire_t *ire, rt_metrics_t *metrics); 91 static mblk_t *rts_rtmget(mblk_t *mp, ire_t *ire, ire_t *sire, 92 sa_family_t af); 93 static void rts_setmetrics(ire_t *ire, uint_t which, rt_metrics_t *metrics); 94 static void ip_rts_request_retry(ipsq_t *, queue_t *q, mblk_t *mp, void *); 95 96 /* 97 * Send `mp' to all eligible routing queues. A queue is ineligible if: 98 * 99 * 1. SO_USELOOPBACK is off and it is not the originating queue. 100 * 2. RTAW_UNDER_IPMP is on and RTSQ_UNDER_IPMP is clear in `flags'. 101 * 3. RTAW_UNDER_IPMP is off and RTSQ_NORMAL is clear in `flags'. 102 * 4. It is not the same address family as `af', and `af' isn't AF_UNSPEC. 103 */ 104 void 105 rts_queue_input(mblk_t *mp, conn_t *o_connp, sa_family_t af, uint_t flags, 106 ip_stack_t *ipst) 107 { 108 mblk_t *mp1; 109 conn_t *connp, *next_connp; 110 111 /* 112 * Since we don't have an ill_t here, RTSQ_DEFAULT must already be 113 * resolved to one or more of RTSQ_NORMAL|RTSQ_UNDER_IPMP by now. 114 */ 115 ASSERT(!(flags & RTSQ_DEFAULT)); 116 117 mutex_enter(&ipst->ips_rts_clients->connf_lock); 118 connp = ipst->ips_rts_clients->connf_head; 119 120 for (; connp != NULL; connp = next_connp) { 121 next_connp = connp->conn_next; 122 123 /* 124 * If there was a family specified when this routing socket was 125 * created and it doesn't match the family of the message to 126 * copy, then continue. 127 */ 128 if ((connp->conn_proto != AF_UNSPEC) && 129 (connp->conn_proto != af)) 130 continue; 131 132 /* 133 * Queue the message only if the conn_t and flags match. 134 */ 135 if (connp->conn_rtaware & RTAW_UNDER_IPMP) { 136 if (!(flags & RTSQ_UNDER_IPMP)) 137 continue; 138 } else { 139 if (!(flags & RTSQ_NORMAL)) 140 continue; 141 } 142 143 /* 144 * For the originating queue, we only copy the message upstream 145 * if loopback is set. For others reading on the routing 146 * socket, we check if there is room upstream for a copy of the 147 * message. 148 */ 149 if ((o_connp == connp) && connp->conn_loopback == 0) { 150 connp = connp->conn_next; 151 continue; 152 } 153 CONN_INC_REF(connp); 154 mutex_exit(&ipst->ips_rts_clients->connf_lock); 155 /* Pass to rts_input */ 156 if ((IPCL_IS_NONSTR(connp) && !PROTO_FLOW_CNTRLD(connp))|| 157 (!IPCL_IS_NONSTR(connp) && 158 canputnext(CONNP_TO_RQ(connp)))) { 159 mp1 = dupmsg(mp); 160 if (mp1 == NULL) 161 mp1 = copymsg(mp); 162 if (mp1 != NULL) 163 (connp->conn_recv)(connp, mp1, NULL); 164 } 165 166 mutex_enter(&ipst->ips_rts_clients->connf_lock); 167 /* reload next_connp since conn_next may have changed */ 168 next_connp = connp->conn_next; 169 CONN_DEC_REF(connp); 170 } 171 mutex_exit(&ipst->ips_rts_clients->connf_lock); 172 freemsg(mp); 173 } 174 175 /* 176 * Takes an ire and sends an ack to all the routing sockets. This 177 * routine is used 178 * - when a route is created/deleted through the ioctl interface. 179 * - when ire_expire deletes a stale redirect 180 */ 181 void 182 ip_rts_rtmsg(int type, ire_t *ire, int error, ip_stack_t *ipst) 183 { 184 mblk_t *mp; 185 rt_msghdr_t *rtm; 186 int rtm_addrs = (RTA_DST | RTA_NETMASK | RTA_GATEWAY); 187 sa_family_t af; 188 in6_addr_t gw_addr_v6; 189 190 if (ire == NULL) 191 return; 192 ASSERT(ire->ire_ipversion == IPV4_VERSION || 193 ire->ire_ipversion == IPV6_VERSION); 194 195 if (ire->ire_flags & RTF_SETSRC) 196 rtm_addrs |= RTA_SRC; 197 198 switch (ire->ire_ipversion) { 199 case IPV4_VERSION: 200 af = AF_INET; 201 mp = rts_alloc_msg(type, rtm_addrs, af, 0); 202 if (mp == NULL) 203 return; 204 rts_fill_msg(type, rtm_addrs, ire->ire_addr, ire->ire_mask, 205 ire->ire_gateway_addr, ire->ire_src_addr, 0, 0, NULL, mp, 206 0, NULL); 207 break; 208 case IPV6_VERSION: 209 af = AF_INET6; 210 mp = rts_alloc_msg(type, rtm_addrs, af, 0); 211 if (mp == NULL) 212 return; 213 mutex_enter(&ire->ire_lock); 214 gw_addr_v6 = ire->ire_gateway_addr_v6; 215 mutex_exit(&ire->ire_lock); 216 rts_fill_msg_v6(type, rtm_addrs, &ire->ire_addr_v6, 217 &ire->ire_mask_v6, &gw_addr_v6, 218 &ire->ire_src_addr_v6, &ipv6_all_zeros, &ipv6_all_zeros, 219 NULL, mp, 0, NULL); 220 break; 221 } 222 rtm = (rt_msghdr_t *)mp->b_rptr; 223 mp->b_wptr = (uchar_t *)&mp->b_rptr[rtm->rtm_msglen]; 224 rtm->rtm_addrs = rtm_addrs; 225 rtm->rtm_flags = ire->ire_flags; 226 if (error != 0) 227 rtm->rtm_errno = error; 228 else 229 rtm->rtm_flags |= RTF_DONE; 230 rts_queue_input(mp, NULL, af, RTSQ_ALL, ipst); 231 } 232 233 /* ARGSUSED */ 234 static void 235 ip_rts_request_retry(ipsq_t *dummy_sq, queue_t *q, mblk_t *mp, void *dummy) 236 { 237 (void) ip_rts_request(q, mp, msg_getcred(mp, NULL)); 238 } 239 240 /* 241 * This is a call from the RTS module 242 * indicating that this is a Routing Socket 243 * Stream. Insert this conn_t in routing 244 * socket client list. 245 */ 246 void 247 ip_rts_register(conn_t *connp) 248 { 249 ip_stack_t *ipst = connp->conn_netstack->netstack_ip; 250 251 connp->conn_loopback = 1; 252 ipcl_hash_insert_wildcard(ipst->ips_rts_clients, connp); 253 } 254 255 /* 256 * This is a call from the RTS module indicating that it is closing. 257 */ 258 void 259 ip_rts_unregister(conn_t *connp) 260 { 261 ipcl_hash_remove(connp); 262 } 263 264 /* 265 * Processes requests received on a routing socket. It extracts all the 266 * arguments and calls the appropriate function to process the request. 267 * 268 * RTA_SRC bit flag requests are sent by 'route -setsrc'. 269 * 270 * In general, this function does not consume the message supplied but rather 271 * sends the message upstream with an appropriate UNIX errno. 272 * 273 * We may need to restart this operation if the ipif cannot be looked up 274 * due to an exclusive operation that is currently in progress. The restart 275 * entry point is ip_rts_request_retry. While the request is enqueud in the 276 * ipsq the ioctl could be aborted and the conn close. To ensure that we don't 277 * have stale conn pointers, ip_wput_ioctl does a conn refhold. This is 278 * released at the completion of the rts ioctl at the end of this function 279 * by calling CONN_OPER_PENDING_DONE or when the ioctl is aborted and 280 * conn close occurs in conn_ioctl_cleanup. 281 */ 282 int 283 ip_rts_request_common(queue_t *q, mblk_t *mp, conn_t *connp, cred_t *ioc_cr) 284 { 285 rt_msghdr_t *rtm = NULL; 286 in6_addr_t dst_addr_v6; 287 in6_addr_t src_addr_v6; 288 in6_addr_t gw_addr_v6; 289 in6_addr_t net_mask_v6; 290 in6_addr_t author_v6; 291 in6_addr_t if_addr_v6; 292 mblk_t *mp1, *ioc_mp = mp; 293 ire_t *ire = NULL; 294 ire_t *sire = NULL; 295 int error = 0; 296 int match_flags = MATCH_IRE_DSTONLY; 297 int match_flags_local = MATCH_IRE_TYPE | MATCH_IRE_GW; 298 int found_addrs; 299 sa_family_t af; 300 ipaddr_t dst_addr; 301 ipaddr_t gw_addr; 302 ipaddr_t src_addr; 303 ipaddr_t net_mask; 304 ushort_t index; 305 ipif_t *ipif = NULL; 306 ipif_t *tmp_ipif = NULL; 307 IOCP iocp = (IOCP)mp->b_rptr; 308 boolean_t gcgrp_xtraref = B_FALSE; 309 tsol_gcgrp_addr_t ga; 310 tsol_rtsecattr_t rtsecattr; 311 struct rtsa_s *rtsap = NULL; 312 tsol_gcgrp_t *gcgrp = NULL; 313 tsol_gc_t *gc = NULL; 314 ts_label_t *tsl = NULL; 315 zoneid_t zoneid; 316 ip_stack_t *ipst; 317 318 ip1dbg(("ip_rts_request: mp is %x\n", DB_TYPE(mp))); 319 320 zoneid = connp->conn_zoneid; 321 ipst = connp->conn_netstack->netstack_ip; 322 323 ASSERT(mp->b_cont != NULL); 324 /* ioc_mp holds mp */ 325 mp = mp->b_cont; 326 327 /* 328 * The Routing Socket data starts on 329 * next block. If there is no next block 330 * this is an indication from routing module 331 * that it is a routing socket stream queue. 332 * We need to support that for compatibility with SDP since 333 * it has a contract private interface to use IP_IOC_RTS_REQUEST. 334 */ 335 if (mp->b_cont == NULL) { 336 /* 337 * This is a message from SDP 338 * indicating that this is a Routing Socket 339 * Stream. Insert this conn_t in routing 340 * socket client list. 341 */ 342 connp->conn_loopback = 1; 343 ipcl_hash_insert_wildcard(ipst->ips_rts_clients, connp); 344 goto done; 345 } 346 mp1 = dupmsg(mp->b_cont); 347 if (mp1 == NULL) { 348 error = ENOBUFS; 349 goto done; 350 } 351 mp = mp1; 352 353 if (mp->b_cont != NULL && !pullupmsg(mp, -1)) { 354 freemsg(mp); 355 error = EINVAL; 356 goto done; 357 } 358 if ((mp->b_wptr - mp->b_rptr) < sizeof (rt_msghdr_t)) { 359 freemsg(mp); 360 error = EINVAL; 361 goto done; 362 } 363 364 /* 365 * Check the routing message for basic consistency including the 366 * version number and that the number of octets written is the same 367 * as specified by the rtm_msglen field. 368 * 369 * At this point, an error can be delivered back via rtm_errno. 370 */ 371 rtm = (rt_msghdr_t *)mp->b_rptr; 372 if ((mp->b_wptr - mp->b_rptr) != rtm->rtm_msglen) { 373 error = EINVAL; 374 goto done; 375 } 376 if (rtm->rtm_version != RTM_VERSION) { 377 error = EPROTONOSUPPORT; 378 goto done; 379 } 380 381 /* Only allow RTM_GET or RTM_RESOLVE for unprivileged process */ 382 if (rtm->rtm_type != RTM_GET && 383 rtm->rtm_type != RTM_RESOLVE && 384 (ioc_cr == NULL || 385 secpolicy_ip_config(ioc_cr, B_FALSE) != 0)) { 386 error = EPERM; 387 goto done; 388 } 389 390 found_addrs = rts_getaddrs(rtm, &dst_addr_v6, &gw_addr_v6, &net_mask_v6, 391 &author_v6, &if_addr_v6, &src_addr_v6, &index, &af, &rtsecattr, 392 &error); 393 394 if (error != 0) 395 goto done; 396 397 if ((found_addrs & RTA_DST) == 0) { 398 error = EINVAL; 399 goto done; 400 } 401 402 /* 403 * Based on the address family of the destination address, determine 404 * the destination, gateway and netmask and return the appropriate error 405 * if an unknown address family was specified (following the errno 406 * values that 4.4BSD-Lite2 returns.) 407 */ 408 switch (af) { 409 case AF_INET: 410 IN6_V4MAPPED_TO_IPADDR(&dst_addr_v6, dst_addr); 411 IN6_V4MAPPED_TO_IPADDR(&src_addr_v6, src_addr); 412 IN6_V4MAPPED_TO_IPADDR(&gw_addr_v6, gw_addr); 413 if (((found_addrs & RTA_NETMASK) == 0) || 414 (rtm->rtm_flags & RTF_HOST)) 415 net_mask = IP_HOST_MASK; 416 else 417 IN6_V4MAPPED_TO_IPADDR(&net_mask_v6, net_mask); 418 break; 419 case AF_INET6: 420 if (((found_addrs & RTA_NETMASK) == 0) || 421 (rtm->rtm_flags & RTF_HOST)) 422 net_mask_v6 = ipv6_all_ones; 423 break; 424 default: 425 /* 426 * These errno values are meant to be compatible with 427 * 4.4BSD-Lite2 for the given message types. 428 */ 429 switch (rtm->rtm_type) { 430 case RTM_ADD: 431 case RTM_DELETE: 432 error = ESRCH; 433 goto done; 434 case RTM_GET: 435 case RTM_CHANGE: 436 error = EAFNOSUPPORT; 437 goto done; 438 default: 439 error = EOPNOTSUPP; 440 goto done; 441 } 442 } 443 444 /* 445 * At this point, the address family must be something known. 446 */ 447 ASSERT(af == AF_INET || af == AF_INET6); 448 449 if (index != 0) { 450 ill_t *ill; 451 lookup: 452 /* 453 * IPC must be refheld somewhere in ip_wput_nondata or 454 * ip_wput_ioctl etc... and cleaned up if ioctl is killed. 455 * If ILL_CHANGING the request is queued in the ipsq. 456 */ 457 ill = ill_lookup_on_ifindex(index, af == AF_INET6, 458 CONNP_TO_WQ(connp), ioc_mp, ip_rts_request_retry, &error, 459 ipst); 460 if (ill == NULL) { 461 if (error != EINPROGRESS) 462 error = EINVAL; 463 goto done; 464 } 465 466 /* 467 * Since all interfaces in an IPMP group must be equivalent, 468 * we prevent changes to a specific underlying interface's 469 * routing configuration. However, for backward compatibility, 470 * we intepret a request to add a route on an underlying 471 * interface as a request to add a route on its IPMP interface. 472 */ 473 if (IS_UNDER_IPMP(ill)) { 474 switch (rtm->rtm_type) { 475 case RTM_CHANGE: 476 case RTM_DELETE: 477 ill_refrele(ill); 478 error = EINVAL; 479 goto done; 480 case RTM_ADD: 481 index = ipmp_ill_get_ipmp_ifindex(ill); 482 ill_refrele(ill); 483 if (index == 0) { 484 error = EINVAL; 485 goto done; 486 } 487 goto lookup; 488 } 489 } 490 491 ipif = ipif_get_next_ipif(NULL, ill); 492 ill_refrele(ill); 493 match_flags |= MATCH_IRE_ILL; 494 } 495 496 /* 497 * If a netmask was supplied in the message, then subsequent route 498 * lookups will attempt to match on the netmask as well. 499 */ 500 if ((found_addrs & RTA_NETMASK) != 0) 501 match_flags |= MATCH_IRE_MASK; 502 503 /* 504 * We only process any passed-in route security attributes for 505 * either RTM_ADD or RTM_CHANGE message; We overload them 506 * to do an RTM_GET as a different label; ignore otherwise. 507 */ 508 if (rtm->rtm_type == RTM_ADD || rtm->rtm_type == RTM_CHANGE || 509 rtm->rtm_type == RTM_GET) { 510 ASSERT(rtsecattr.rtsa_cnt <= TSOL_RTSA_REQUEST_MAX); 511 if (rtsecattr.rtsa_cnt > 0) 512 rtsap = &rtsecattr.rtsa_attr[0]; 513 } 514 515 switch (rtm->rtm_type) { 516 case RTM_ADD: 517 /* if we are adding a route, gateway is a must */ 518 if ((found_addrs & RTA_GATEWAY) == 0) { 519 error = EINVAL; 520 goto done; 521 } 522 523 /* Multirouting does not support net routes. */ 524 if ((rtm->rtm_flags & (RTF_MULTIRT | RTF_HOST)) == 525 RTF_MULTIRT) { 526 error = EADDRNOTAVAIL; 527 goto done; 528 } 529 530 /* 531 * Multirouting and user-specified source addresses 532 * do not support interface based routing. 533 * Assigning a source address to an interface based 534 * route is achievable by plumbing a new ipif and 535 * setting up the interface route via this ipif, 536 * though. 537 */ 538 if (rtm->rtm_flags & (RTF_MULTIRT | RTF_SETSRC)) { 539 if ((rtm->rtm_flags & RTF_GATEWAY) == 0) { 540 error = EADDRNOTAVAIL; 541 goto done; 542 } 543 } 544 545 switch (af) { 546 case AF_INET: 547 if (src_addr != INADDR_ANY) { 548 /* 549 * The RTF_SETSRC flag is present, check that 550 * the supplied src address is not the loopback 551 * address. This would produce martian packets. 552 */ 553 if (src_addr == htonl(INADDR_LOOPBACK)) { 554 error = EINVAL; 555 goto done; 556 } 557 /* 558 * Also check that the supplied address is a 559 * valid, local one. 560 */ 561 tmp_ipif = ipif_lookup_addr(src_addr, NULL, 562 ALL_ZONES, CONNP_TO_WQ(connp), ioc_mp, 563 ip_rts_request_retry, &error, ipst); 564 if (tmp_ipif == NULL) { 565 if (error != EINPROGRESS) 566 error = EADDRNOTAVAIL; 567 goto done; 568 } 569 if (!(tmp_ipif->ipif_flags & IPIF_UP) || 570 (tmp_ipif->ipif_flags & 571 (IPIF_NOLOCAL | IPIF_ANYCAST))) { 572 error = EINVAL; 573 goto done; 574 } 575 } else { 576 /* 577 * The RTF_SETSRC modifier must be associated 578 * to a non-null source address. 579 */ 580 if (rtm->rtm_flags & RTF_SETSRC) { 581 error = EINVAL; 582 goto done; 583 } 584 } 585 586 error = ip_rt_add(dst_addr, net_mask, gw_addr, src_addr, 587 rtm->rtm_flags, ipif, &ire, B_FALSE, 588 WR(q), ioc_mp, ip_rts_request_retry, 589 rtsap, ipst); 590 if (ipif != NULL) 591 ASSERT(!MUTEX_HELD(&ipif->ipif_ill->ill_lock)); 592 break; 593 case AF_INET6: 594 if (!IN6_IS_ADDR_UNSPECIFIED(&src_addr_v6)) { 595 /* 596 * The RTF_SETSRC flag is present, check that 597 * the supplied src address is not the loopback 598 * address. This would produce martian packets. 599 */ 600 if (IN6_IS_ADDR_LOOPBACK(&src_addr_v6)) { 601 error = EINVAL; 602 goto done; 603 } 604 /* 605 * Also check that the supplied address is a 606 * valid, local one. 607 */ 608 tmp_ipif = ipif_lookup_addr_v6(&src_addr_v6, 609 NULL, ALL_ZONES, CONNP_TO_WQ(connp), ioc_mp, 610 ip_rts_request_retry, &error, ipst); 611 if (tmp_ipif == NULL) { 612 if (error != EINPROGRESS) 613 error = EADDRNOTAVAIL; 614 goto done; 615 } 616 617 if (!(tmp_ipif->ipif_flags & IPIF_UP) || 618 (tmp_ipif->ipif_flags & 619 (IPIF_NOLOCAL | IPIF_ANYCAST))) { 620 error = EINVAL; 621 goto done; 622 } 623 624 error = ip_rt_add_v6(&dst_addr_v6, &net_mask_v6, 625 &gw_addr_v6, &src_addr_v6, rtm->rtm_flags, 626 ipif, &ire, WR(q), ioc_mp, 627 ip_rts_request_retry, rtsap, ipst); 628 break; 629 } 630 /* 631 * The RTF_SETSRC modifier must be associated 632 * to a non-null source address. 633 */ 634 if (rtm->rtm_flags & RTF_SETSRC) { 635 error = EINVAL; 636 goto done; 637 } 638 error = ip_rt_add_v6(&dst_addr_v6, &net_mask_v6, 639 &gw_addr_v6, NULL, rtm->rtm_flags, 640 ipif, &ire, WR(q), ioc_mp, 641 ip_rts_request_retry, rtsap, ipst); 642 if (ipif != NULL) 643 ASSERT(!MUTEX_HELD(&ipif->ipif_ill->ill_lock)); 644 break; 645 } 646 if (error != 0) 647 goto done; 648 ASSERT(ire != NULL); 649 rts_setmetrics(ire, rtm->rtm_inits, &rtm->rtm_rmx); 650 break; 651 case RTM_DELETE: 652 /* if we are deleting a route, gateway is a must */ 653 if ((found_addrs & RTA_GATEWAY) == 0) { 654 error = EINVAL; 655 goto done; 656 } 657 /* 658 * The RTF_SETSRC modifier does not make sense 659 * when deleting a route. 660 */ 661 if (rtm->rtm_flags & RTF_SETSRC) { 662 error = EINVAL; 663 goto done; 664 } 665 666 switch (af) { 667 case AF_INET: 668 error = ip_rt_delete(dst_addr, net_mask, gw_addr, 669 found_addrs, rtm->rtm_flags, ipif, B_FALSE, 670 WR(q), ioc_mp, ip_rts_request_retry, ipst); 671 break; 672 case AF_INET6: 673 error = ip_rt_delete_v6(&dst_addr_v6, &net_mask_v6, 674 &gw_addr_v6, found_addrs, rtm->rtm_flags, ipif, 675 WR(q), ioc_mp, ip_rts_request_retry, ipst); 676 break; 677 } 678 break; 679 case RTM_GET: 680 case RTM_CHANGE: 681 /* 682 * In the case of RTM_GET, the forwarding table should be 683 * searched recursively with default being matched if the 684 * specific route doesn't exist. Also, if a gateway was 685 * specified then the gateway address must also be matched. 686 * 687 * In the case of RTM_CHANGE, the gateway address (if supplied) 688 * is the new gateway address so matching on the gateway address 689 * is not done. This can lead to ambiguity when looking up the 690 * route to change as usually only the destination (and netmask, 691 * if supplied) is used for the lookup. However if a RTA_IFP 692 * sockaddr is also supplied, it can disambiguate which route to 693 * change provided the ambigous routes are tied to distinct 694 * ill's (or interface indices). If the routes are not tied to 695 * any particular interfaces (for example, with traditional 696 * gateway routes), then a RTA_IFP sockaddr will be of no use as 697 * it won't match any such routes. 698 * RTA_SRC is not supported for RTM_GET and RTM_CHANGE, 699 * except when RTM_CHANGE is combined to RTF_SETSRC. 700 */ 701 if (((found_addrs & RTA_SRC) != 0) && 702 ((rtm->rtm_type == RTM_GET) || 703 !(rtm->rtm_flags & RTF_SETSRC))) { 704 error = EOPNOTSUPP; 705 goto done; 706 } 707 708 if (rtm->rtm_type == RTM_GET) { 709 match_flags |= 710 (MATCH_IRE_DEFAULT | MATCH_IRE_RECURSIVE | 711 MATCH_IRE_SECATTR); 712 match_flags_local |= MATCH_IRE_SECATTR; 713 if ((found_addrs & RTA_GATEWAY) != 0) 714 match_flags |= MATCH_IRE_GW; 715 if (ioc_cr) 716 tsl = crgetlabel(ioc_cr); 717 if (rtsap != NULL) { 718 if (rtsa_validate(rtsap) != 0) { 719 error = EINVAL; 720 goto done; 721 } 722 if (tsl != NULL && 723 crgetzoneid(ioc_cr) != GLOBAL_ZONEID && 724 (tsl->tsl_doi != rtsap->rtsa_doi || 725 !bldominates(&tsl->tsl_label, 726 &rtsap->rtsa_slrange.lower_bound))) { 727 error = EPERM; 728 goto done; 729 } 730 tsl = labelalloc( 731 &rtsap->rtsa_slrange.lower_bound, 732 rtsap->rtsa_doi, KM_NOSLEEP); 733 } 734 } 735 if (rtm->rtm_type == RTM_CHANGE) { 736 if ((found_addrs & RTA_GATEWAY) && 737 (rtm->rtm_flags & RTF_SETSRC)) { 738 /* 739 * Do not want to change the gateway, 740 * but rather the source address. 741 */ 742 match_flags |= MATCH_IRE_GW; 743 } 744 } 745 746 /* 747 * If the netmask is all ones (either as supplied or as derived 748 * above), then first check for an IRE_LOOPBACK or 749 * IRE_LOCAL entry. 750 * 751 * If we didn't check for or find an IRE_LOOPBACK or IRE_LOCAL 752 * entry, then look in the forwarding table. 753 */ 754 switch (af) { 755 case AF_INET: 756 if (net_mask == IP_HOST_MASK) { 757 ire = ire_ctable_lookup(dst_addr, gw_addr, 758 IRE_LOCAL | IRE_LOOPBACK, NULL, zoneid, 759 tsl, match_flags_local, ipst); 760 /* 761 * If we found an IRE_LOCAL, make sure 762 * it is one that would be used by this 763 * zone to send packets. 764 */ 765 if (ire != NULL && 766 ire->ire_type == IRE_LOCAL && 767 ipst->ips_ip_restrict_interzone_loopback && 768 !ire_local_ok_across_zones(ire, 769 zoneid, &dst_addr, tsl, ipst)) { 770 ire_refrele(ire); 771 ire = NULL; 772 } 773 } 774 if (ire == NULL) { 775 ire = ire_ftable_lookup(dst_addr, net_mask, 776 gw_addr, 0, ipif, &sire, zoneid, 0, 777 tsl, match_flags, ipst); 778 } 779 break; 780 case AF_INET6: 781 if (IN6_ARE_ADDR_EQUAL(&net_mask_v6, &ipv6_all_ones)) { 782 ire = ire_ctable_lookup_v6(&dst_addr_v6, 783 &gw_addr_v6, IRE_LOCAL | IRE_LOOPBACK, NULL, 784 zoneid, tsl, match_flags_local, ipst); 785 /* 786 * If we found an IRE_LOCAL, make sure 787 * it is one that would be used by this 788 * zone to send packets. 789 */ 790 if (ire != NULL && 791 ire->ire_type == IRE_LOCAL && 792 ipst->ips_ip_restrict_interzone_loopback && 793 !ire_local_ok_across_zones(ire, 794 zoneid, (void *)&dst_addr_v6, tsl, ipst)) { 795 ire_refrele(ire); 796 ire = NULL; 797 } 798 } 799 if (ire == NULL) { 800 ire = ire_ftable_lookup_v6(&dst_addr_v6, 801 &net_mask_v6, &gw_addr_v6, 0, ipif, &sire, 802 zoneid, 0, tsl, match_flags, ipst); 803 } 804 break; 805 } 806 if (tsl != NULL && tsl != crgetlabel(ioc_cr)) 807 label_rele(tsl); 808 809 if (ire == NULL) { 810 error = ESRCH; 811 goto done; 812 } 813 /* we know the IRE before we come here */ 814 switch (rtm->rtm_type) { 815 case RTM_GET: 816 mp1 = rts_rtmget(mp, ire, sire, af); 817 if (mp1 == NULL) { 818 error = ENOBUFS; 819 goto done; 820 } 821 freemsg(mp); 822 mp = mp1; 823 rtm = (rt_msghdr_t *)mp->b_rptr; 824 break; 825 case RTM_CHANGE: 826 /* 827 * Do not allow to the multirouting state of a route 828 * to be changed. This aims to prevent undesirable 829 * stages where both multirt and non-multirt routes 830 * for the same destination are declared. 831 */ 832 if ((ire->ire_flags & RTF_MULTIRT) != 833 (rtm->rtm_flags & RTF_MULTIRT)) { 834 error = EINVAL; 835 goto done; 836 } 837 /* 838 * Note that we do not need to do 839 * ire_flush_cache_*(IRE_FLUSH_ADD) as a change 840 * in metrics or gateway will not affect existing 841 * routes since it does not create a more specific 842 * route. 843 */ 844 switch (af) { 845 case AF_INET: 846 ire_flush_cache_v4(ire, IRE_FLUSH_DELETE); 847 if ((found_addrs & RTA_GATEWAY) != 0 && 848 (ire->ire_gateway_addr != gw_addr)) { 849 ire->ire_gateway_addr = gw_addr; 850 } 851 852 if (rtsap != NULL) { 853 ga.ga_af = AF_INET; 854 IN6_IPADDR_TO_V4MAPPED( 855 ire->ire_gateway_addr, &ga.ga_addr); 856 857 gcgrp = gcgrp_lookup(&ga, B_TRUE); 858 if (gcgrp == NULL) { 859 error = ENOMEM; 860 goto done; 861 } 862 } 863 864 if ((found_addrs & RTA_SRC) != 0 && 865 (rtm->rtm_flags & RTF_SETSRC) != 0 && 866 (ire->ire_src_addr != src_addr)) { 867 868 if (src_addr != INADDR_ANY) { 869 /* 870 * The RTF_SETSRC flag is 871 * present, check that the 872 * supplied src address is not 873 * the loopback address. This 874 * would produce martian 875 * packets. 876 */ 877 if (src_addr == 878 htonl(INADDR_LOOPBACK)) { 879 error = EINVAL; 880 goto done; 881 } 882 /* 883 * Also check that the the 884 * supplied addr is a valid 885 * local address. 886 */ 887 tmp_ipif = ipif_lookup_addr( 888 src_addr, NULL, ALL_ZONES, 889 WR(q), ioc_mp, 890 ip_rts_request_retry, 891 &error, ipst); 892 if (tmp_ipif == NULL) { 893 error = (error == 894 EINPROGRESS) ? 895 error : 896 EADDRNOTAVAIL; 897 goto done; 898 } 899 900 if (!(tmp_ipif->ipif_flags & 901 IPIF_UP) || 902 (tmp_ipif->ipif_flags & 903 (IPIF_NOLOCAL | 904 IPIF_ANYCAST))) { 905 error = EINVAL; 906 goto done; 907 } 908 ire->ire_flags |= RTF_SETSRC; 909 } else { 910 ire->ire_flags &= ~RTF_SETSRC; 911 } 912 ire->ire_src_addr = src_addr; 913 } 914 break; 915 case AF_INET6: 916 ire_flush_cache_v6(ire, IRE_FLUSH_DELETE); 917 mutex_enter(&ire->ire_lock); 918 if ((found_addrs & RTA_GATEWAY) != 0 && 919 !IN6_ARE_ADDR_EQUAL( 920 &ire->ire_gateway_addr_v6, &gw_addr_v6)) { 921 ire->ire_gateway_addr_v6 = gw_addr_v6; 922 } 923 924 if (rtsap != NULL) { 925 ga.ga_af = AF_INET6; 926 ga.ga_addr = ire->ire_gateway_addr_v6; 927 928 gcgrp = gcgrp_lookup(&ga, B_TRUE); 929 if (gcgrp == NULL) { 930 error = ENOMEM; 931 goto done; 932 } 933 } 934 935 if ((found_addrs & RTA_SRC) != 0 && 936 (rtm->rtm_flags & RTF_SETSRC) != 0 && 937 !IN6_ARE_ADDR_EQUAL( 938 &ire->ire_src_addr_v6, &src_addr_v6)) { 939 940 if (!IN6_IS_ADDR_UNSPECIFIED( 941 &src_addr_v6)) { 942 /* 943 * The RTF_SETSRC flag is 944 * present, check that the 945 * supplied src address is not 946 * the loopback address. This 947 * would produce martian 948 * packets. 949 */ 950 if (IN6_IS_ADDR_LOOPBACK( 951 &src_addr_v6)) { 952 mutex_exit( 953 &ire->ire_lock); 954 error = EINVAL; 955 goto done; 956 } 957 /* 958 * Also check that the the 959 * supplied addr is a valid 960 * local address. 961 */ 962 tmp_ipif = ipif_lookup_addr_v6( 963 &src_addr_v6, NULL, 964 ALL_ZONES, 965 CONNP_TO_WQ(connp), ioc_mp, 966 ip_rts_request_retry, 967 &error, ipst); 968 if (tmp_ipif == NULL) { 969 mutex_exit( 970 &ire->ire_lock); 971 error = (error == 972 EINPROGRESS) ? 973 error : 974 EADDRNOTAVAIL; 975 goto done; 976 } 977 if (!(tmp_ipif->ipif_flags & 978 IPIF_UP) || 979 (tmp_ipif->ipif_flags & 980 (IPIF_NOLOCAL | 981 IPIF_ANYCAST))) { 982 mutex_exit( 983 &ire->ire_lock); 984 error = EINVAL; 985 goto done; 986 } 987 ire->ire_flags |= RTF_SETSRC; 988 } else { 989 ire->ire_flags &= ~RTF_SETSRC; 990 } 991 ire->ire_src_addr_v6 = src_addr_v6; 992 } 993 mutex_exit(&ire->ire_lock); 994 break; 995 } 996 997 if (rtsap != NULL) { 998 in_addr_t ga_addr4; 999 1000 ASSERT(gcgrp != NULL); 1001 1002 /* 1003 * Create and add the security attribute to 1004 * prefix IRE; it will add a reference to the 1005 * group upon allocating a new entry. If it 1006 * finds an already-existing entry for the 1007 * security attribute, it simply returns it 1008 * and no new group reference is made. 1009 */ 1010 gc = gc_create(rtsap, gcgrp, &gcgrp_xtraref); 1011 if (gc == NULL || 1012 (error = tsol_ire_init_gwattr(ire, 1013 ire->ire_ipversion, gc, NULL)) != 0) { 1014 if (gc != NULL) { 1015 GC_REFRELE(gc); 1016 } else { 1017 /* gc_create failed */ 1018 error = ENOMEM; 1019 } 1020 goto done; 1021 } 1022 1023 /* 1024 * Now delete any existing gateway IRE caches 1025 * as well as all caches using the gateway, 1026 * and allow them to be created on demand 1027 * through ip_newroute{_v6}. 1028 */ 1029 IN6_V4MAPPED_TO_IPADDR(&ga.ga_addr, ga_addr4); 1030 if (af == AF_INET) { 1031 ire_clookup_delete_cache_gw( 1032 ga_addr4, ALL_ZONES, ipst); 1033 } else { 1034 ire_clookup_delete_cache_gw_v6( 1035 &ga.ga_addr, ALL_ZONES, ipst); 1036 } 1037 } 1038 rts_setmetrics(ire, rtm->rtm_inits, &rtm->rtm_rmx); 1039 break; 1040 } 1041 break; 1042 default: 1043 error = EOPNOTSUPP; 1044 break; 1045 } 1046 done: 1047 if (ire != NULL) 1048 ire_refrele(ire); 1049 if (sire != NULL) 1050 ire_refrele(sire); 1051 if (ipif != NULL) 1052 ipif_refrele(ipif); 1053 if (tmp_ipif != NULL) 1054 ipif_refrele(tmp_ipif); 1055 1056 if (gcgrp_xtraref) 1057 GCGRP_REFRELE(gcgrp); 1058 1059 if (error == EINPROGRESS) { 1060 if (rtm != NULL) 1061 freemsg(mp); 1062 return (error); 1063 } 1064 if (rtm != NULL) { 1065 ASSERT(mp->b_wptr <= mp->b_datap->db_lim); 1066 if (error != 0) { 1067 rtm->rtm_errno = error; 1068 /* Send error ACK */ 1069 ip1dbg(("ip_rts_request: error %d\n", error)); 1070 } else { 1071 rtm->rtm_flags |= RTF_DONE; 1072 /* OK ACK already set up by caller except this */ 1073 ip2dbg(("ip_rts_request: OK ACK\n")); 1074 } 1075 rts_queue_input(mp, connp, af, RTSQ_ALL, ipst); 1076 } 1077 1078 iocp->ioc_error = error; 1079 ioc_mp->b_datap->db_type = M_IOCACK; 1080 if (iocp->ioc_error != 0) 1081 iocp->ioc_count = 0; 1082 (connp->conn_recv)(connp, ioc_mp, NULL); 1083 1084 /* conn was refheld in ip_wput_ioctl. */ 1085 CONN_OPER_PENDING_DONE(connp); 1086 1087 return (error); 1088 } 1089 1090 int 1091 ip_rts_request(queue_t *q, mblk_t *mp, cred_t *ioc_cr) 1092 { 1093 return (ip_rts_request_common(q, mp, Q_TO_CONN(q), ioc_cr)); 1094 } 1095 1096 /* 1097 * Build a reply to the RTM_GET request contained in the given message block 1098 * using the retrieved IRE of the destination address, the parent IRE (if it 1099 * exists) and the address family. 1100 * 1101 * Returns a pointer to a message block containing the reply if successful, 1102 * otherwise NULL is returned. 1103 */ 1104 static mblk_t * 1105 rts_rtmget(mblk_t *mp, ire_t *ire, ire_t *sire, sa_family_t af) 1106 { 1107 rt_msghdr_t *rtm; 1108 rt_msghdr_t *new_rtm; 1109 mblk_t *new_mp; 1110 int rtm_addrs; 1111 int rtm_flags; 1112 in6_addr_t gw_addr_v6; 1113 tsol_ire_gw_secattr_t *attrp = NULL; 1114 tsol_gc_t *gc = NULL; 1115 tsol_gcgrp_t *gcgrp = NULL; 1116 int sacnt = 0; 1117 1118 ASSERT(ire->ire_ipif != NULL); 1119 rtm = (rt_msghdr_t *)mp->b_rptr; 1120 1121 if (sire != NULL && sire->ire_gw_secattr != NULL) 1122 attrp = sire->ire_gw_secattr; 1123 else if (ire->ire_gw_secattr != NULL) 1124 attrp = ire->ire_gw_secattr; 1125 1126 if (attrp != NULL) { 1127 mutex_enter(&attrp->igsa_lock); 1128 if ((gc = attrp->igsa_gc) != NULL) { 1129 gcgrp = gc->gc_grp; 1130 ASSERT(gcgrp != NULL); 1131 rw_enter(&gcgrp->gcgrp_rwlock, RW_READER); 1132 sacnt = 1; 1133 } else if ((gcgrp = attrp->igsa_gcgrp) != NULL) { 1134 rw_enter(&gcgrp->gcgrp_rwlock, RW_READER); 1135 gc = gcgrp->gcgrp_head; 1136 sacnt = gcgrp->gcgrp_count; 1137 } 1138 mutex_exit(&attrp->igsa_lock); 1139 1140 /* do nothing if there's no gc to report */ 1141 if (gc == NULL) { 1142 ASSERT(sacnt == 0); 1143 if (gcgrp != NULL) { 1144 /* we might as well drop the lock now */ 1145 rw_exit(&gcgrp->gcgrp_rwlock); 1146 gcgrp = NULL; 1147 } 1148 attrp = NULL; 1149 } 1150 1151 ASSERT(gc == NULL || (gcgrp != NULL && 1152 RW_LOCK_HELD(&gcgrp->gcgrp_rwlock))); 1153 } 1154 ASSERT(sacnt == 0 || gc != NULL); 1155 1156 /* 1157 * Always return RTA_DST, RTA_GATEWAY and RTA_NETMASK. 1158 * 1159 * The 4.4BSD-Lite2 code (net/rtsock.c) returns both 1160 * RTA_IFP and RTA_IFA if either is defined, and also 1161 * returns RTA_BRD if the appropriate interface is 1162 * point-to-point. 1163 */ 1164 rtm_addrs = (RTA_DST | RTA_GATEWAY | RTA_NETMASK); 1165 if (rtm->rtm_addrs & (RTA_IFP | RTA_IFA)) { 1166 rtm_addrs |= (RTA_IFP | RTA_IFA); 1167 if (ire->ire_ipif->ipif_flags & IPIF_POINTOPOINT) 1168 rtm_addrs |= RTA_BRD; 1169 } 1170 1171 new_mp = rts_alloc_msg(RTM_GET, rtm_addrs, af, sacnt); 1172 if (new_mp == NULL) { 1173 if (gcgrp != NULL) 1174 rw_exit(&gcgrp->gcgrp_rwlock); 1175 return (NULL); 1176 } 1177 1178 /* 1179 * We set the destination address, gateway address, 1180 * netmask and flags in the RTM_GET response depending 1181 * on whether we found a parent IRE or not. 1182 * In particular, if we did find a parent IRE during the 1183 * recursive search, use that IRE's gateway address. 1184 * Otherwise, we use the IRE's source address for the 1185 * gateway address. 1186 */ 1187 ASSERT(af == AF_INET || af == AF_INET6); 1188 switch (af) { 1189 case AF_INET: 1190 if (sire == NULL) { 1191 rtm_flags = ire->ire_flags; 1192 rts_fill_msg(RTM_GET, rtm_addrs, ire->ire_addr, 1193 ire->ire_mask, ire->ire_src_addr, ire->ire_src_addr, 1194 ire->ire_ipif->ipif_pp_dst_addr, 0, ire->ire_ipif, 1195 new_mp, sacnt, gc); 1196 } else { 1197 if (sire->ire_flags & RTF_SETSRC) 1198 rtm_addrs |= RTA_SRC; 1199 1200 rtm_flags = sire->ire_flags; 1201 rts_fill_msg(RTM_GET, rtm_addrs, sire->ire_addr, 1202 sire->ire_mask, sire->ire_gateway_addr, 1203 (sire->ire_flags & RTF_SETSRC) ? 1204 sire->ire_src_addr : ire->ire_src_addr, 1205 ire->ire_ipif->ipif_pp_dst_addr, 1206 0, ire->ire_ipif, new_mp, sacnt, gc); 1207 } 1208 break; 1209 case AF_INET6: 1210 if (sire == NULL) { 1211 rtm_flags = ire->ire_flags; 1212 rts_fill_msg_v6(RTM_GET, rtm_addrs, &ire->ire_addr_v6, 1213 &ire->ire_mask_v6, &ire->ire_src_addr_v6, 1214 &ire->ire_src_addr_v6, 1215 &ire->ire_ipif->ipif_v6pp_dst_addr, 1216 &ipv6_all_zeros, ire->ire_ipif, new_mp, 1217 sacnt, gc); 1218 } else { 1219 if (sire->ire_flags & RTF_SETSRC) 1220 rtm_addrs |= RTA_SRC; 1221 1222 rtm_flags = sire->ire_flags; 1223 mutex_enter(&sire->ire_lock); 1224 gw_addr_v6 = sire->ire_gateway_addr_v6; 1225 mutex_exit(&sire->ire_lock); 1226 rts_fill_msg_v6(RTM_GET, rtm_addrs, &sire->ire_addr_v6, 1227 &sire->ire_mask_v6, &gw_addr_v6, 1228 (sire->ire_flags & RTF_SETSRC) ? 1229 &sire->ire_src_addr_v6 : &ire->ire_src_addr_v6, 1230 &ire->ire_ipif->ipif_v6pp_dst_addr, &ipv6_all_zeros, 1231 ire->ire_ipif, new_mp, sacnt, gc); 1232 } 1233 break; 1234 } 1235 1236 if (gcgrp != NULL) 1237 rw_exit(&gcgrp->gcgrp_rwlock); 1238 1239 new_rtm = (rt_msghdr_t *)new_mp->b_rptr; 1240 1241 /* 1242 * The rtm_msglen, rtm_version and rtm_type fields in 1243 * RTM_GET response are filled in by rts_fill_msg. 1244 * 1245 * rtm_addrs and rtm_flags are filled in based on what 1246 * was requested and the state of the IREs looked up 1247 * above. 1248 * 1249 * rtm_inits and rtm_rmx are filled in with metrics 1250 * based on whether a parent IRE was found or not. 1251 * 1252 * TODO: rtm_index and rtm_use should probably be 1253 * filled in with something resonable here and not just 1254 * copied from the request. 1255 */ 1256 new_rtm->rtm_index = rtm->rtm_index; 1257 new_rtm->rtm_pid = rtm->rtm_pid; 1258 new_rtm->rtm_seq = rtm->rtm_seq; 1259 new_rtm->rtm_use = rtm->rtm_use; 1260 new_rtm->rtm_addrs = rtm_addrs; 1261 new_rtm->rtm_flags = rtm_flags; 1262 if (sire == NULL) 1263 new_rtm->rtm_inits = rts_getmetrics(ire, &new_rtm->rtm_rmx); 1264 else 1265 new_rtm->rtm_inits = rts_getmetrics(sire, &new_rtm->rtm_rmx); 1266 1267 return (new_mp); 1268 } 1269 1270 /* 1271 * Fill the given if_data_t with interface statistics. 1272 */ 1273 static void 1274 rts_getifdata(if_data_t *if_data, const ipif_t *ipif) 1275 { 1276 if_data->ifi_type = ipif->ipif_type; /* ethernet, tokenring, etc */ 1277 if_data->ifi_addrlen = 0; /* media address length */ 1278 if_data->ifi_hdrlen = 0; /* media header length */ 1279 if_data->ifi_mtu = ipif->ipif_mtu; /* maximum transmission unit */ 1280 if_data->ifi_metric = ipif->ipif_metric; /* metric (external only) */ 1281 if_data->ifi_baudrate = 0; /* linespeed */ 1282 1283 if_data->ifi_ipackets = 0; /* packets received on if */ 1284 if_data->ifi_ierrors = 0; /* input errors on interface */ 1285 if_data->ifi_opackets = 0; /* packets sent on interface */ 1286 if_data->ifi_oerrors = 0; /* output errors on if */ 1287 if_data->ifi_collisions = 0; /* collisions on csma if */ 1288 if_data->ifi_ibytes = 0; /* total number received */ 1289 if_data->ifi_obytes = 0; /* total number sent */ 1290 if_data->ifi_imcasts = 0; /* multicast packets received */ 1291 if_data->ifi_omcasts = 0; /* multicast packets sent */ 1292 if_data->ifi_iqdrops = 0; /* dropped on input */ 1293 if_data->ifi_noproto = 0; /* destined for unsupported */ 1294 /* protocol. */ 1295 } 1296 1297 /* 1298 * Set the metrics on a forwarding table route. 1299 */ 1300 static void 1301 rts_setmetrics(ire_t *ire, uint_t which, rt_metrics_t *metrics) 1302 { 1303 clock_t rtt; 1304 clock_t rtt_sd; 1305 ipif_t *ipif; 1306 ifrt_t *ifrt; 1307 mblk_t *mp; 1308 in6_addr_t gw_addr_v6; 1309 1310 /* 1311 * Bypass obtaining the lock and searching ipif_saved_ire_mp in the 1312 * common case of no metrics. 1313 */ 1314 if (which == 0) 1315 return; 1316 ire->ire_uinfo.iulp_set = B_TRUE; 1317 1318 /* 1319 * iulp_rtt and iulp_rtt_sd are in milliseconds, but 4.4BSD-Lite2's 1320 * <net/route.h> says: rmx_rtt and rmx_rttvar are stored as 1321 * microseconds. 1322 */ 1323 if (which & RTV_RTT) 1324 rtt = metrics->rmx_rtt / 1000; 1325 if (which & RTV_RTTVAR) 1326 rtt_sd = metrics->rmx_rttvar / 1000; 1327 1328 /* 1329 * Update the metrics in the IRE itself. 1330 */ 1331 mutex_enter(&ire->ire_lock); 1332 if (which & RTV_MTU) 1333 ire->ire_max_frag = metrics->rmx_mtu; 1334 if (which & RTV_RTT) 1335 ire->ire_uinfo.iulp_rtt = rtt; 1336 if (which & RTV_SSTHRESH) 1337 ire->ire_uinfo.iulp_ssthresh = metrics->rmx_ssthresh; 1338 if (which & RTV_RTTVAR) 1339 ire->ire_uinfo.iulp_rtt_sd = rtt_sd; 1340 if (which & RTV_SPIPE) 1341 ire->ire_uinfo.iulp_spipe = metrics->rmx_sendpipe; 1342 if (which & RTV_RPIPE) 1343 ire->ire_uinfo.iulp_rpipe = metrics->rmx_recvpipe; 1344 mutex_exit(&ire->ire_lock); 1345 1346 /* 1347 * Search through the ifrt_t chain hanging off the IPIF in order to 1348 * reflect the metric change there. 1349 */ 1350 ipif = ire->ire_ipif; 1351 if (ipif == NULL) 1352 return; 1353 ASSERT((ipif->ipif_isv6 && ire->ire_ipversion == IPV6_VERSION) || 1354 ((!ipif->ipif_isv6 && ire->ire_ipversion == IPV4_VERSION))); 1355 if (ipif->ipif_isv6) { 1356 mutex_enter(&ire->ire_lock); 1357 gw_addr_v6 = ire->ire_gateway_addr_v6; 1358 mutex_exit(&ire->ire_lock); 1359 } 1360 mutex_enter(&ipif->ipif_saved_ire_lock); 1361 for (mp = ipif->ipif_saved_ire_mp; mp != NULL; mp = mp->b_cont) { 1362 /* 1363 * On a given ipif, the triple of address, gateway and mask is 1364 * unique for each saved IRE (in the case of ordinary interface 1365 * routes, the gateway address is all-zeroes). 1366 */ 1367 ifrt = (ifrt_t *)mp->b_rptr; 1368 if (ipif->ipif_isv6) { 1369 if (!IN6_ARE_ADDR_EQUAL(&ifrt->ifrt_v6addr, 1370 &ire->ire_addr_v6) || 1371 !IN6_ARE_ADDR_EQUAL(&ifrt->ifrt_v6gateway_addr, 1372 &gw_addr_v6) || 1373 !IN6_ARE_ADDR_EQUAL(&ifrt->ifrt_v6mask, 1374 &ire->ire_mask_v6)) 1375 continue; 1376 } else { 1377 if (ifrt->ifrt_addr != ire->ire_addr || 1378 ifrt->ifrt_gateway_addr != ire->ire_gateway_addr || 1379 ifrt->ifrt_mask != ire->ire_mask) 1380 continue; 1381 } 1382 if (which & RTV_MTU) 1383 ifrt->ifrt_max_frag = metrics->rmx_mtu; 1384 if (which & RTV_RTT) 1385 ifrt->ifrt_iulp_info.iulp_rtt = rtt; 1386 if (which & RTV_SSTHRESH) { 1387 ifrt->ifrt_iulp_info.iulp_ssthresh = 1388 metrics->rmx_ssthresh; 1389 } 1390 if (which & RTV_RTTVAR) 1391 ifrt->ifrt_iulp_info.iulp_rtt_sd = metrics->rmx_rttvar; 1392 if (which & RTV_SPIPE) 1393 ifrt->ifrt_iulp_info.iulp_spipe = metrics->rmx_sendpipe; 1394 if (which & RTV_RPIPE) 1395 ifrt->ifrt_iulp_info.iulp_rpipe = metrics->rmx_recvpipe; 1396 break; 1397 } 1398 mutex_exit(&ipif->ipif_saved_ire_lock); 1399 } 1400 1401 /* 1402 * Get the metrics from a forwarding table route. 1403 */ 1404 static int 1405 rts_getmetrics(ire_t *ire, rt_metrics_t *metrics) 1406 { 1407 int metrics_set = 0; 1408 1409 bzero(metrics, sizeof (rt_metrics_t)); 1410 /* 1411 * iulp_rtt and iulp_rtt_sd are in milliseconds, but 4.4BSD-Lite2's 1412 * <net/route.h> says: rmx_rtt and rmx_rttvar are stored as 1413 * microseconds. 1414 */ 1415 metrics->rmx_rtt = ire->ire_uinfo.iulp_rtt * 1000; 1416 metrics_set |= RTV_RTT; 1417 metrics->rmx_mtu = ire->ire_max_frag; 1418 metrics_set |= RTV_MTU; 1419 metrics->rmx_ssthresh = ire->ire_uinfo.iulp_ssthresh; 1420 metrics_set |= RTV_SSTHRESH; 1421 metrics->rmx_rttvar = ire->ire_uinfo.iulp_rtt_sd * 1000; 1422 metrics_set |= RTV_RTTVAR; 1423 metrics->rmx_sendpipe = ire->ire_uinfo.iulp_spipe; 1424 metrics_set |= RTV_SPIPE; 1425 metrics->rmx_recvpipe = ire->ire_uinfo.iulp_rpipe; 1426 metrics_set |= RTV_RPIPE; 1427 return (metrics_set); 1428 } 1429 1430 /* 1431 * Takes a pointer to a routing message and extracts necessary info by looking 1432 * at the rtm->rtm_addrs bits and store the requested sockaddrs in the pointers 1433 * passed (all of which must be valid). 1434 * 1435 * The bitmask of sockaddrs actually found in the message is returned, or zero 1436 * is returned in the case of an error. 1437 */ 1438 static int 1439 rts_getaddrs(rt_msghdr_t *rtm, in6_addr_t *dst_addrp, in6_addr_t *gw_addrp, 1440 in6_addr_t *net_maskp, in6_addr_t *authorp, in6_addr_t *if_addrp, 1441 in6_addr_t *in_src_addrp, ushort_t *indexp, sa_family_t *afp, 1442 tsol_rtsecattr_t *rtsecattr, int *error) 1443 { 1444 struct sockaddr *sa; 1445 int i; 1446 int addr_bits; 1447 int length; 1448 int found_addrs = 0; 1449 caddr_t cp; 1450 size_t size; 1451 struct sockaddr_dl *sdl; 1452 1453 *dst_addrp = ipv6_all_zeros; 1454 *gw_addrp = ipv6_all_zeros; 1455 *net_maskp = ipv6_all_zeros; 1456 *authorp = ipv6_all_zeros; 1457 *if_addrp = ipv6_all_zeros; 1458 *in_src_addrp = ipv6_all_zeros; 1459 *indexp = 0; 1460 *afp = AF_UNSPEC; 1461 rtsecattr->rtsa_cnt = 0; 1462 *error = 0; 1463 1464 /* 1465 * At present we handle only RTA_DST, RTA_GATEWAY, RTA_NETMASK, RTA_IFP, 1466 * RTA_IFA and RTA_AUTHOR. The rest will be added as we need them. 1467 */ 1468 cp = (caddr_t)&rtm[1]; 1469 length = rtm->rtm_msglen; 1470 for (i = 0; (i < RTA_NUMBITS) && ((cp - (caddr_t)rtm) < length); i++) { 1471 /* 1472 * The address family we are working with starts out as 1473 * AF_UNSPEC, but is set to the one specified with the 1474 * destination address. 1475 * 1476 * If the "working" address family that has been set to 1477 * something other than AF_UNSPEC, then the address family of 1478 * subsequent sockaddrs must either be AF_UNSPEC (for 1479 * compatibility with older programs) or must be the same as our 1480 * "working" one. 1481 * 1482 * This code assumes that RTA_DST (1) comes first in the loop. 1483 */ 1484 sa = (struct sockaddr *)cp; 1485 addr_bits = (rtm->rtm_addrs & (1 << i)); 1486 if (addr_bits == 0) 1487 continue; 1488 switch (addr_bits) { 1489 case RTA_DST: 1490 size = rts_copyfromsockaddr(sa, dst_addrp); 1491 *afp = sa->sa_family; 1492 break; 1493 case RTA_GATEWAY: 1494 if (sa->sa_family != *afp && sa->sa_family != AF_UNSPEC) 1495 return (0); 1496 size = rts_copyfromsockaddr(sa, gw_addrp); 1497 break; 1498 case RTA_NETMASK: 1499 if (sa->sa_family != *afp && sa->sa_family != AF_UNSPEC) 1500 return (0); 1501 size = rts_copyfromsockaddr(sa, net_maskp); 1502 break; 1503 case RTA_IFP: 1504 if (sa->sa_family != AF_LINK && 1505 sa->sa_family != AF_UNSPEC) 1506 return (0); 1507 sdl = (struct sockaddr_dl *)cp; 1508 *indexp = sdl->sdl_index; 1509 size = sizeof (struct sockaddr_dl); 1510 break; 1511 case RTA_SRC: 1512 /* Source address of the incoming packet */ 1513 size = rts_copyfromsockaddr(sa, in_src_addrp); 1514 *afp = sa->sa_family; 1515 break; 1516 case RTA_IFA: 1517 if (sa->sa_family != *afp && sa->sa_family != AF_UNSPEC) 1518 return (0); 1519 size = rts_copyfromsockaddr(sa, if_addrp); 1520 break; 1521 case RTA_AUTHOR: 1522 if (sa->sa_family != *afp && sa->sa_family != AF_UNSPEC) 1523 return (0); 1524 size = rts_copyfromsockaddr(sa, authorp); 1525 break; 1526 default: 1527 return (0); 1528 } 1529 if (size == 0) 1530 return (0); 1531 cp += size; 1532 found_addrs |= addr_bits; 1533 } 1534 1535 /* 1536 * Parse the routing message and look for any security- 1537 * related attributes for the route. For each valid 1538 * attribute, allocate/obtain the corresponding kernel 1539 * route security attributes. 1540 */ 1541 if (((cp - (caddr_t)rtm) < length) && is_system_labeled()) { 1542 *error = tsol_rtsa_init(rtm, rtsecattr, cp); 1543 ASSERT(rtsecattr->rtsa_cnt <= TSOL_RTSA_REQUEST_MAX); 1544 } 1545 1546 return (found_addrs); 1547 } 1548 1549 /* 1550 * Fills the message with the given info. 1551 */ 1552 static void 1553 rts_fill_msg(int type, int rtm_addrs, ipaddr_t dst, ipaddr_t mask, 1554 ipaddr_t gateway, ipaddr_t src_addr, ipaddr_t brd_addr, ipaddr_t author, 1555 const ipif_t *ipif, mblk_t *mp, uint_t sacnt, const tsol_gc_t *gc) 1556 { 1557 rt_msghdr_t *rtm; 1558 sin_t *sin; 1559 size_t data_size, header_size; 1560 uchar_t *cp; 1561 int i; 1562 1563 ASSERT(mp != NULL); 1564 ASSERT(sacnt == 0 || gc != NULL); 1565 /* 1566 * First find the type of the message 1567 * and its length. 1568 */ 1569 header_size = rts_header_msg_size(type); 1570 /* 1571 * Now find the size of the data 1572 * that follows the message header. 1573 */ 1574 data_size = rts_data_msg_size(rtm_addrs, AF_INET, sacnt); 1575 1576 rtm = (rt_msghdr_t *)mp->b_rptr; 1577 mp->b_wptr = &mp->b_rptr[header_size]; 1578 cp = mp->b_wptr; 1579 bzero(cp, data_size); 1580 for (i = 0; i < RTA_NUMBITS; i++) { 1581 sin = (sin_t *)cp; 1582 switch (rtm_addrs & (1 << i)) { 1583 case RTA_DST: 1584 sin->sin_addr.s_addr = dst; 1585 sin->sin_family = AF_INET; 1586 cp += sizeof (sin_t); 1587 break; 1588 case RTA_GATEWAY: 1589 sin->sin_addr.s_addr = gateway; 1590 sin->sin_family = AF_INET; 1591 cp += sizeof (sin_t); 1592 break; 1593 case RTA_NETMASK: 1594 sin->sin_addr.s_addr = mask; 1595 sin->sin_family = AF_INET; 1596 cp += sizeof (sin_t); 1597 break; 1598 case RTA_IFP: 1599 cp += ill_dls_info((struct sockaddr_dl *)cp, ipif); 1600 break; 1601 case RTA_IFA: 1602 case RTA_SRC: 1603 sin->sin_addr.s_addr = src_addr; 1604 sin->sin_family = AF_INET; 1605 cp += sizeof (sin_t); 1606 break; 1607 case RTA_AUTHOR: 1608 sin->sin_addr.s_addr = author; 1609 sin->sin_family = AF_INET; 1610 cp += sizeof (sin_t); 1611 break; 1612 case RTA_BRD: 1613 /* 1614 * RTA_BRD is used typically to specify a point-to-point 1615 * destination address. 1616 */ 1617 sin->sin_addr.s_addr = brd_addr; 1618 sin->sin_family = AF_INET; 1619 cp += sizeof (sin_t); 1620 break; 1621 } 1622 } 1623 1624 if (gc != NULL) { 1625 rtm_ext_t *rtm_ext; 1626 struct rtsa_s *rp_dst; 1627 tsol_rtsecattr_t *rsap; 1628 int i; 1629 1630 ASSERT(gc->gc_grp != NULL); 1631 ASSERT(RW_LOCK_HELD(&gc->gc_grp->gcgrp_rwlock)); 1632 ASSERT(sacnt > 0); 1633 1634 rtm_ext = (rtm_ext_t *)cp; 1635 rtm_ext->rtmex_type = RTMEX_GATEWAY_SECATTR; 1636 rtm_ext->rtmex_len = TSOL_RTSECATTR_SIZE(sacnt); 1637 1638 rsap = (tsol_rtsecattr_t *)(rtm_ext + 1); 1639 rsap->rtsa_cnt = sacnt; 1640 rp_dst = rsap->rtsa_attr; 1641 1642 for (i = 0; i < sacnt; i++, gc = gc->gc_next, rp_dst++) { 1643 ASSERT(gc->gc_db != NULL); 1644 bcopy(&gc->gc_db->gcdb_attr, rp_dst, sizeof (*rp_dst)); 1645 } 1646 cp = (uchar_t *)rp_dst; 1647 } 1648 1649 mp->b_wptr = cp; 1650 mp->b_cont = NULL; 1651 /* 1652 * set the fields that are common to 1653 * to different messages. 1654 */ 1655 rtm->rtm_msglen = (short)(header_size + data_size); 1656 rtm->rtm_version = RTM_VERSION; 1657 rtm->rtm_type = (uchar_t)type; 1658 } 1659 1660 /* 1661 * Allocates and initializes a routing socket message. 1662 */ 1663 mblk_t * 1664 rts_alloc_msg(int type, int rtm_addrs, sa_family_t af, uint_t sacnt) 1665 { 1666 size_t length; 1667 mblk_t *mp; 1668 1669 length = RTS_MSG_SIZE(type, rtm_addrs, af, sacnt); 1670 mp = allocb(length, BPRI_MED); 1671 if (mp == NULL) 1672 return (mp); 1673 bzero(mp->b_rptr, length); 1674 return (mp); 1675 } 1676 1677 /* 1678 * Returns the size of the routing 1679 * socket message header size. 1680 */ 1681 size_t 1682 rts_header_msg_size(int type) 1683 { 1684 switch (type) { 1685 case RTM_DELADDR: 1686 case RTM_NEWADDR: 1687 return (sizeof (ifa_msghdr_t)); 1688 case RTM_IFINFO: 1689 return (sizeof (if_msghdr_t)); 1690 default: 1691 return (sizeof (rt_msghdr_t)); 1692 } 1693 } 1694 1695 /* 1696 * Returns the size of the message needed with the given rtm_addrs and family. 1697 * 1698 * It is assumed that all of the sockaddrs (with the exception of RTA_IFP) are 1699 * of the same family (currently either AF_INET or AF_INET6). 1700 */ 1701 size_t 1702 rts_data_msg_size(int rtm_addrs, sa_family_t af, uint_t sacnt) 1703 { 1704 int i; 1705 size_t length = 0; 1706 1707 for (i = 0; i < RTA_NUMBITS; i++) { 1708 switch (rtm_addrs & (1 << i)) { 1709 case RTA_IFP: 1710 length += sizeof (struct sockaddr_dl); 1711 break; 1712 case RTA_DST: 1713 case RTA_GATEWAY: 1714 case RTA_NETMASK: 1715 case RTA_SRC: 1716 case RTA_IFA: 1717 case RTA_AUTHOR: 1718 case RTA_BRD: 1719 ASSERT(af == AF_INET || af == AF_INET6); 1720 switch (af) { 1721 case AF_INET: 1722 length += sizeof (sin_t); 1723 break; 1724 case AF_INET6: 1725 length += sizeof (sin6_t); 1726 break; 1727 } 1728 break; 1729 } 1730 } 1731 if (sacnt > 0) 1732 length += sizeof (rtm_ext_t) + TSOL_RTSECATTR_SIZE(sacnt); 1733 1734 return (length); 1735 } 1736 1737 /* 1738 * This routine is called to generate a message to the routing 1739 * socket indicating that a redirect has occured, a routing lookup 1740 * has failed, or that a protocol has detected timeouts to a particular 1741 * destination. This routine is called for message types RTM_LOSING, 1742 * RTM_REDIRECT, and RTM_MISS. 1743 */ 1744 void 1745 ip_rts_change(int type, ipaddr_t dst_addr, ipaddr_t gw_addr, ipaddr_t net_mask, 1746 ipaddr_t source, ipaddr_t author, int flags, int error, int rtm_addrs, 1747 ip_stack_t *ipst) 1748 { 1749 rt_msghdr_t *rtm; 1750 mblk_t *mp; 1751 1752 if (rtm_addrs == 0) 1753 return; 1754 mp = rts_alloc_msg(type, rtm_addrs, AF_INET, 0); 1755 if (mp == NULL) 1756 return; 1757 rts_fill_msg(type, rtm_addrs, dst_addr, net_mask, gw_addr, source, 0, 1758 author, NULL, mp, 0, NULL); 1759 rtm = (rt_msghdr_t *)mp->b_rptr; 1760 rtm->rtm_flags = flags; 1761 rtm->rtm_errno = error; 1762 rtm->rtm_flags |= RTF_DONE; 1763 rtm->rtm_addrs = rtm_addrs; 1764 rts_queue_input(mp, NULL, AF_INET, RTSQ_ALL, ipst); 1765 } 1766 1767 /* 1768 * This routine is called to generate a message to the routing 1769 * socket indicating that the status of a network interface has changed. 1770 * Message type generated RTM_IFINFO. 1771 */ 1772 void 1773 ip_rts_ifmsg(const ipif_t *ipif, uint_t flags) 1774 { 1775 ip_rts_xifmsg(ipif, 0, 0, flags); 1776 } 1777 1778 void 1779 ip_rts_xifmsg(const ipif_t *ipif, uint64_t set, uint64_t clear, uint_t flags) 1780 { 1781 if_msghdr_t *ifm; 1782 mblk_t *mp; 1783 sa_family_t af; 1784 ip_stack_t *ipst = ipif->ipif_ill->ill_ipst; 1785 1786 /* 1787 * This message should be generated only when the physical interface 1788 * is changing state. 1789 */ 1790 if (ipif->ipif_id != 0) 1791 return; 1792 1793 if (ipif->ipif_isv6) { 1794 af = AF_INET6; 1795 mp = rts_alloc_msg(RTM_IFINFO, RTA_IFP, af, 0); 1796 if (mp == NULL) 1797 return; 1798 rts_fill_msg_v6(RTM_IFINFO, RTA_IFP, &ipv6_all_zeros, 1799 &ipv6_all_zeros, &ipv6_all_zeros, &ipv6_all_zeros, 1800 &ipv6_all_zeros, &ipv6_all_zeros, ipif, mp, 0, NULL); 1801 } else { 1802 af = AF_INET; 1803 mp = rts_alloc_msg(RTM_IFINFO, RTA_IFP, af, 0); 1804 if (mp == NULL) 1805 return; 1806 rts_fill_msg(RTM_IFINFO, RTA_IFP, 0, 0, 0, 0, 0, 0, ipif, mp, 1807 0, NULL); 1808 } 1809 ifm = (if_msghdr_t *)mp->b_rptr; 1810 ifm->ifm_index = ipif->ipif_ill->ill_phyint->phyint_ifindex; 1811 ifm->ifm_flags = (ipif->ipif_flags | ipif->ipif_ill->ill_flags | 1812 ipif->ipif_ill->ill_phyint->phyint_flags | set) & ~clear; 1813 rts_getifdata(&ifm->ifm_data, ipif); 1814 ifm->ifm_addrs = RTA_IFP; 1815 1816 if (flags & RTSQ_DEFAULT) { 1817 flags = RTSQ_ALL; 1818 /* 1819 * If this message is for an underlying interface, prevent 1820 * "normal" (IPMP-unaware) routing sockets from seeing it. 1821 */ 1822 if (IS_UNDER_IPMP(ipif->ipif_ill)) 1823 flags &= ~RTSQ_NORMAL; 1824 } 1825 1826 rts_queue_input(mp, NULL, af, flags, ipst); 1827 } 1828 1829 /* 1830 * This is called to generate messages to the routing socket 1831 * indicating a network interface has had addresses associated with it. 1832 * The structure of the code is based on the 4.4BSD-Lite2 <net/rtsock.c>. 1833 */ 1834 void 1835 ip_rts_newaddrmsg(int cmd, int error, const ipif_t *ipif, uint_t flags) 1836 { 1837 int pass; 1838 int ncmd; 1839 int rtm_addrs; 1840 mblk_t *mp; 1841 ifa_msghdr_t *ifam; 1842 rt_msghdr_t *rtm; 1843 sa_family_t af; 1844 ip_stack_t *ipst = ipif->ipif_ill->ill_ipst; 1845 1846 if (ipif->ipif_isv6) 1847 af = AF_INET6; 1848 else 1849 af = AF_INET; 1850 1851 if (flags & RTSQ_DEFAULT) { 1852 flags = RTSQ_ALL; 1853 /* 1854 * If this message is for an underlying interface, prevent 1855 * "normal" (IPMP-unaware) routing sockets from seeing it. 1856 */ 1857 if (IS_UNDER_IPMP(ipif->ipif_ill)) 1858 flags &= ~RTSQ_NORMAL; 1859 } 1860 1861 /* 1862 * If the request is DELETE, send RTM_DELETE and RTM_DELADDR. 1863 * if the request is ADD, send RTM_NEWADDR and RTM_ADD. 1864 */ 1865 for (pass = 1; pass < 3; pass++) { 1866 if ((cmd == RTM_ADD && pass == 1) || 1867 (cmd == RTM_DELETE && pass == 2)) { 1868 ncmd = ((cmd == RTM_ADD) ? RTM_NEWADDR : RTM_DELADDR); 1869 1870 rtm_addrs = (RTA_IFA | RTA_NETMASK | RTA_BRD | RTA_IFP); 1871 mp = rts_alloc_msg(ncmd, rtm_addrs, af, 0); 1872 if (mp == NULL) 1873 continue; 1874 switch (af) { 1875 case AF_INET: 1876 rts_fill_msg(ncmd, rtm_addrs, 0, 1877 ipif->ipif_net_mask, 0, ipif->ipif_lcl_addr, 1878 ipif->ipif_pp_dst_addr, 0, ipif, mp, 1879 0, NULL); 1880 break; 1881 case AF_INET6: 1882 rts_fill_msg_v6(ncmd, rtm_addrs, 1883 &ipv6_all_zeros, &ipif->ipif_v6net_mask, 1884 &ipv6_all_zeros, &ipif->ipif_v6lcl_addr, 1885 &ipif->ipif_v6pp_dst_addr, &ipv6_all_zeros, 1886 ipif, mp, 0, NULL); 1887 break; 1888 } 1889 ifam = (ifa_msghdr_t *)mp->b_rptr; 1890 ifam->ifam_index = 1891 ipif->ipif_ill->ill_phyint->phyint_ifindex; 1892 ifam->ifam_metric = ipif->ipif_metric; 1893 ifam->ifam_flags = ((cmd == RTM_ADD) ? RTF_UP : 0); 1894 ifam->ifam_addrs = rtm_addrs; 1895 rts_queue_input(mp, NULL, af, flags, ipst); 1896 } 1897 if ((cmd == RTM_ADD && pass == 2) || 1898 (cmd == RTM_DELETE && pass == 1)) { 1899 rtm_addrs = (RTA_DST | RTA_NETMASK); 1900 mp = rts_alloc_msg(cmd, rtm_addrs, af, 0); 1901 if (mp == NULL) 1902 continue; 1903 switch (af) { 1904 case AF_INET: 1905 rts_fill_msg(cmd, rtm_addrs, 1906 ipif->ipif_lcl_addr, ipif->ipif_net_mask, 0, 1907 0, 0, 0, NULL, mp, 0, NULL); 1908 break; 1909 case AF_INET6: 1910 rts_fill_msg_v6(cmd, rtm_addrs, 1911 &ipif->ipif_v6lcl_addr, 1912 &ipif->ipif_v6net_mask, &ipv6_all_zeros, 1913 &ipv6_all_zeros, &ipv6_all_zeros, 1914 &ipv6_all_zeros, NULL, mp, 0, NULL); 1915 break; 1916 } 1917 rtm = (rt_msghdr_t *)mp->b_rptr; 1918 rtm->rtm_index = 1919 ipif->ipif_ill->ill_phyint->phyint_ifindex; 1920 rtm->rtm_flags = ((cmd == RTM_ADD) ? RTF_UP : 0); 1921 rtm->rtm_errno = error; 1922 if (error == 0) 1923 rtm->rtm_flags |= RTF_DONE; 1924 rtm->rtm_addrs = rtm_addrs; 1925 rts_queue_input(mp, NULL, af, flags, ipst); 1926 } 1927 } 1928 } 1929 1930 /* 1931 * Based on the address family specified in a sockaddr, copy the address field 1932 * into an in6_addr_t. 1933 * 1934 * In the case of AF_UNSPEC, we assume the family is actually AF_INET for 1935 * compatibility with programs that leave the family cleared in the sockaddr. 1936 * Callers of rts_copyfromsockaddr should check the family themselves if they 1937 * wish to verify its value. 1938 * 1939 * In the case of AF_INET6, a check is made to ensure that address is not an 1940 * IPv4-mapped address. 1941 */ 1942 size_t 1943 rts_copyfromsockaddr(struct sockaddr *sa, in6_addr_t *addrp) 1944 { 1945 switch (sa->sa_family) { 1946 case AF_INET: 1947 case AF_UNSPEC: 1948 IN6_IPADDR_TO_V4MAPPED(((sin_t *)sa)->sin_addr.s_addr, addrp); 1949 return (sizeof (sin_t)); 1950 case AF_INET6: 1951 *addrp = ((sin6_t *)sa)->sin6_addr; 1952 if (IN6_IS_ADDR_V4MAPPED(addrp)) 1953 return (0); 1954 return (sizeof (sin6_t)); 1955 default: 1956 return (0); 1957 } 1958 } 1959