Home | History | Annotate | Line # | Download | only in netinet
in.c revision 1.192
      1  1.192  knakahar /*	$NetBSD: in.c,v 1.192 2016/12/26 00:30:07 knakahara Exp $	*/
      2   1.48    itojun 
      3   1.48    itojun /*
      4   1.48    itojun  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
      5   1.48    itojun  * All rights reserved.
      6   1.77    itojun  *
      7   1.48    itojun  * Redistribution and use in source and binary forms, with or without
      8   1.48    itojun  * modification, are permitted provided that the following conditions
      9   1.48    itojun  * are met:
     10   1.48    itojun  * 1. Redistributions of source code must retain the above copyright
     11   1.48    itojun  *    notice, this list of conditions and the following disclaimer.
     12   1.48    itojun  * 2. Redistributions in binary form must reproduce the above copyright
     13   1.48    itojun  *    notice, this list of conditions and the following disclaimer in the
     14   1.48    itojun  *    documentation and/or other materials provided with the distribution.
     15   1.48    itojun  * 3. Neither the name of the project nor the names of its contributors
     16   1.48    itojun  *    may be used to endorse or promote products derived from this software
     17   1.48    itojun  *    without specific prior written permission.
     18   1.77    itojun  *
     19   1.48    itojun  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
     20   1.48    itojun  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     21   1.48    itojun  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     22   1.48    itojun  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
     23   1.48    itojun  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     24   1.48    itojun  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     25   1.48    itojun  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     26   1.48    itojun  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     27   1.48    itojun  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     28   1.48    itojun  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     29   1.48    itojun  * SUCH DAMAGE.
     30   1.48    itojun  */
     31   1.14       cgd 
     32   1.46   thorpej /*-
     33   1.46   thorpej  * Copyright (c) 1998 The NetBSD Foundation, Inc.
     34   1.46   thorpej  * All rights reserved.
     35   1.46   thorpej  *
     36   1.46   thorpej  * This code is derived from software contributed to The NetBSD Foundation
     37   1.46   thorpej  * by Public Access Networks Corporation ("Panix").  It was developed under
     38   1.46   thorpej  * contract to Panix by Eric Haszlakiewicz and Thor Lancelot Simon.
     39   1.46   thorpej  *
     40   1.46   thorpej  * Redistribution and use in source and binary forms, with or without
     41   1.46   thorpej  * modification, are permitted provided that the following conditions
     42   1.46   thorpej  * are met:
     43   1.46   thorpej  * 1. Redistributions of source code must retain the above copyright
     44   1.46   thorpej  *    notice, this list of conditions and the following disclaimer.
     45   1.46   thorpej  * 2. Redistributions in binary form must reproduce the above copyright
     46   1.46   thorpej  *    notice, this list of conditions and the following disclaimer in the
     47   1.46   thorpej  *    documentation and/or other materials provided with the distribution.
     48   1.46   thorpej  *
     49   1.46   thorpej  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     50   1.46   thorpej  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     51   1.46   thorpej  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     52   1.46   thorpej  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     53   1.46   thorpej  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     54   1.46   thorpej  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     55   1.46   thorpej  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     56   1.46   thorpej  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     57   1.46   thorpej  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     58   1.46   thorpej  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     59   1.46   thorpej  * POSSIBILITY OF SUCH DAMAGE.
     60   1.46   thorpej  */
     61   1.46   thorpej 
     62    1.1       cgd /*
     63   1.12   mycroft  * Copyright (c) 1982, 1986, 1991, 1993
     64   1.12   mycroft  *	The Regents of the University of California.  All rights reserved.
     65    1.1       cgd  *
     66    1.1       cgd  * Redistribution and use in source and binary forms, with or without
     67    1.1       cgd  * modification, are permitted provided that the following conditions
     68    1.1       cgd  * are met:
     69    1.1       cgd  * 1. Redistributions of source code must retain the above copyright
     70    1.1       cgd  *    notice, this list of conditions and the following disclaimer.
     71    1.1       cgd  * 2. Redistributions in binary form must reproduce the above copyright
     72    1.1       cgd  *    notice, this list of conditions and the following disclaimer in the
     73    1.1       cgd  *    documentation and/or other materials provided with the distribution.
     74   1.90       agc  * 3. Neither the name of the University nor the names of its contributors
     75    1.1       cgd  *    may be used to endorse or promote products derived from this software
     76    1.1       cgd  *    without specific prior written permission.
     77    1.1       cgd  *
     78    1.1       cgd  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     79    1.1       cgd  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     80    1.1       cgd  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     81    1.1       cgd  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     82    1.1       cgd  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     83    1.1       cgd  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     84    1.1       cgd  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     85    1.1       cgd  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     86    1.1       cgd  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     87    1.1       cgd  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     88    1.1       cgd  * SUCH DAMAGE.
     89    1.1       cgd  *
     90   1.36   thorpej  *	@(#)in.c	8.4 (Berkeley) 1/9/95
     91    1.1       cgd  */
     92   1.71     lukem 
     93   1.71     lukem #include <sys/cdefs.h>
     94  1.192  knakahar __KERNEL_RCSID(0, "$NetBSD: in.c,v 1.192 2016/12/26 00:30:07 knakahara Exp $");
     95   1.37    scottr 
     96  1.154     joerg #include "arp.h"
     97  1.157     pooka 
     98  1.157     pooka #ifdef _KERNEL_OPT
     99   1.41  jonathan #include "opt_inet.h"
    100   1.47  sommerfe #include "opt_inet_conf.h"
    101   1.37    scottr #include "opt_mrouting.h"
    102  1.187     ozaki #include "opt_net_mpsafe.h"
    103  1.157     pooka #endif
    104    1.1       cgd 
    105    1.6   mycroft #include <sys/param.h>
    106    1.6   mycroft #include <sys/ioctl.h>
    107   1.12   mycroft #include <sys/errno.h>
    108  1.152       roy #include <sys/kernel.h>
    109   1.12   mycroft #include <sys/malloc.h>
    110    1.6   mycroft #include <sys/socket.h>
    111    1.6   mycroft #include <sys/socketvar.h>
    112  1.114    dyoung #include <sys/sysctl.h>
    113   1.26  christos #include <sys/systm.h>
    114   1.27   mycroft #include <sys/proc.h>
    115   1.72  christos #include <sys/syslog.h>
    116  1.108      elad #include <sys/kauth.h>
    117  1.158     ozaki #include <sys/kmem.h>
    118    1.6   mycroft 
    119  1.141       tls #include <sys/cprng.h>
    120  1.141       tls 
    121    1.6   mycroft #include <net/if.h>
    122    1.6   mycroft #include <net/route.h>
    123  1.144     rmind #include <net/pfil.h>
    124    1.6   mycroft 
    125  1.159     ozaki #include <net/if_arp.h>
    126   1.34        is #include <net/if_ether.h>
    127  1.158     ozaki #include <net/if_types.h>
    128  1.158     ozaki #include <net/if_llatbl.h>
    129  1.158     ozaki #include <net/if_dl.h>
    130   1.34        is 
    131   1.12   mycroft #include <netinet/in_systm.h>
    132    1.6   mycroft #include <netinet/in.h>
    133    1.6   mycroft #include <netinet/in_var.h>
    134   1.84      matt #include <netinet/ip.h>
    135   1.84      matt #include <netinet/ip_var.h>
    136  1.114    dyoung #include <netinet/in_ifattach.h>
    137   1.84      matt #include <netinet/in_pcb.h>
    138  1.158     ozaki #include <netinet/in_selsrc.h>
    139   1.34        is #include <netinet/if_inarp.h>
    140   1.19   mycroft #include <netinet/ip_mroute.h>
    141   1.26  christos #include <netinet/igmp_var.h>
    142   1.13    chopps 
    143  1.114    dyoung #ifdef IPSELSRC
    144  1.114    dyoung #include <netinet/in_selsrc.h>
    145  1.114    dyoung #endif
    146  1.114    dyoung 
    147  1.145     rmind static u_int	in_mask2len(struct in_addr *);
    148  1.145     rmind static void	in_len2mask(struct in_addr *, u_int);
    149  1.145     rmind static int	in_lifaddr_ioctl(struct socket *, u_long, void *,
    150  1.147       rtr 	struct ifnet *);
    151   1.48    itojun 
    152  1.189  knakahar static void	in_addrhash_insert_locked(struct in_ifaddr *);
    153  1.189  knakahar static void	in_addrhash_remove_locked(struct in_ifaddr *);
    154  1.189  knakahar 
    155  1.145     rmind static int	in_addprefix(struct in_ifaddr *, int);
    156  1.183       roy static void	in_scrubaddr(struct in_ifaddr *);
    157  1.145     rmind static int	in_scrubprefix(struct in_ifaddr *);
    158  1.145     rmind static void	in_sysctl_init(struct sysctllog **);
    159   1.67    itojun 
    160    1.1       cgd #ifndef SUBNETSARELOCAL
    161    1.1       cgd #define	SUBNETSARELOCAL	1
    162    1.1       cgd #endif
    163   1.47  sommerfe 
    164   1.47  sommerfe #ifndef HOSTZEROBROADCAST
    165  1.166  christos #define HOSTZEROBROADCAST 0
    166   1.47  sommerfe #endif
    167   1.47  sommerfe 
    168  1.146     rmind /* Note: 61, 127, 251, 509, 1021, 2039 are good. */
    169  1.146     rmind #ifndef IN_MULTI_HASH_SIZE
    170  1.146     rmind #define IN_MULTI_HASH_SIZE	509
    171  1.146     rmind #endif
    172  1.146     rmind 
    173  1.145     rmind static int			subnetsarelocal = SUBNETSARELOCAL;
    174  1.145     rmind static int			hostzeroisbroadcast = HOSTZEROBROADCAST;
    175   1.30       mrg 
    176    1.1       cgd /*
    177   1.65     enami  * This list is used to keep track of in_multi chains which belong to
    178   1.65     enami  * deleted interface addresses.  We use in_ifaddr so that a chain head
    179   1.65     enami  * won't be deallocated until all multicast address record are deleted.
    180   1.64    itojun  */
    181  1.146     rmind 
    182  1.146     rmind LIST_HEAD(in_multihashhead, in_multi);		/* Type of the hash head */
    183  1.145     rmind 
    184  1.145     rmind static struct pool		inmulti_pool;
    185  1.145     rmind static u_int			in_multientries;
    186  1.146     rmind static struct in_multihashhead *in_multihashtbl;
    187  1.146     rmind static u_long			in_multihash;
    188  1.146     rmind static krwlock_t		in_multilock;
    189  1.146     rmind 
    190  1.146     rmind #define IN_MULTI_HASH(x, ifp) \
    191  1.146     rmind     (in_multihashtbl[(u_long)((x) ^ (ifp->if_index)) % IN_MULTI_HASH_SIZE])
    192  1.145     rmind 
    193  1.171     ozaki /* XXX DEPRECATED. Keep them to avoid breaking kvm(3) users. */
    194  1.145     rmind struct in_ifaddrhashhead *	in_ifaddrhashtbl;
    195  1.145     rmind u_long				in_ifaddrhash;
    196  1.145     rmind struct in_ifaddrhead		in_ifaddrhead;
    197  1.178     ozaki static kmutex_t			in_ifaddr_lock;
    198  1.145     rmind 
    199  1.188  knakahar pserialize_t			in_ifaddrhash_psz;
    200  1.170     ozaki struct pslist_head *		in_ifaddrhashtbl_pslist;
    201  1.170     ozaki u_long				in_ifaddrhash_pslist;
    202  1.171     ozaki struct pslist_head		in_ifaddrhead_pslist;
    203  1.170     ozaki 
    204  1.145     rmind void
    205  1.145     rmind in_init(void)
    206  1.145     rmind {
    207  1.145     rmind 	pool_init(&inmulti_pool, sizeof(struct in_multi), 0, 0, 0, "inmltpl",
    208  1.145     rmind 	    NULL, IPL_SOFTNET);
    209  1.145     rmind 	TAILQ_INIT(&in_ifaddrhead);
    210  1.171     ozaki 	PSLIST_INIT(&in_ifaddrhead_pslist);
    211  1.145     rmind 
    212  1.145     rmind 	in_ifaddrhashtbl = hashinit(IN_IFADDR_HASH_SIZE, HASH_LIST, true,
    213  1.145     rmind 	    &in_ifaddrhash);
    214  1.178     ozaki 
    215  1.188  knakahar 	in_ifaddrhash_psz = pserialize_create();
    216  1.170     ozaki 	in_ifaddrhashtbl_pslist = hashinit(IN_IFADDR_HASH_SIZE, HASH_PSLIST,
    217  1.170     ozaki 	    true, &in_ifaddrhash_pslist);
    218  1.178     ozaki 	mutex_init(&in_ifaddr_lock, MUTEX_DEFAULT, IPL_NONE);
    219  1.178     ozaki 
    220  1.145     rmind 	in_multihashtbl = hashinit(IN_IFADDR_HASH_SIZE, HASH_LIST, true,
    221  1.145     rmind 	    &in_multihash);
    222  1.146     rmind 	rw_init(&in_multilock);
    223  1.145     rmind 
    224  1.145     rmind 	in_sysctl_init(NULL);
    225  1.145     rmind }
    226   1.64    itojun 
    227   1.64    itojun /*
    228    1.1       cgd  * Return 1 if an internet address is for a ``local'' host
    229    1.1       cgd  * (one to which we have a connection).  If subnetsarelocal
    230    1.1       cgd  * is true, this includes other subnets of the local net.
    231    1.1       cgd  * Otherwise, it includes only the directly-connected (sub)nets.
    232    1.1       cgd  */
    233    1.8   mycroft int
    234  1.103     perry in_localaddr(struct in_addr in)
    235    1.1       cgd {
    236   1.59  augustss 	struct in_ifaddr *ia;
    237  1.178     ozaki 	int localaddr = 0;
    238  1.178     ozaki 	int s = pserialize_read_enter();
    239    1.1       cgd 
    240    1.1       cgd 	if (subnetsarelocal) {
    241  1.171     ozaki 		IN_ADDRLIST_READER_FOREACH(ia) {
    242  1.178     ozaki 			if ((in.s_addr & ia->ia_netmask) == ia->ia_net) {
    243  1.178     ozaki 				localaddr = 1;
    244  1.178     ozaki 				break;
    245  1.178     ozaki 			}
    246  1.171     ozaki 		}
    247    1.1       cgd 	} else {
    248  1.171     ozaki 		IN_ADDRLIST_READER_FOREACH(ia) {
    249  1.178     ozaki 			if ((in.s_addr & ia->ia_subnetmask) == ia->ia_subnet) {
    250  1.178     ozaki 				localaddr = 1;
    251  1.178     ozaki 				break;
    252  1.178     ozaki 			}
    253  1.171     ozaki 		}
    254    1.1       cgd 	}
    255  1.178     ozaki 	pserialize_read_exit(s);
    256  1.178     ozaki 
    257  1.178     ozaki 	return localaddr;
    258    1.1       cgd }
    259    1.1       cgd 
    260    1.1       cgd /*
    261    1.1       cgd  * Determine whether an IP address is in a reserved set of addresses
    262    1.1       cgd  * that may not be forwarded, or whether datagrams to that destination
    263    1.1       cgd  * may be forwarded.
    264    1.1       cgd  */
    265    1.8   mycroft int
    266  1.103     perry in_canforward(struct in_addr in)
    267    1.1       cgd {
    268   1.59  augustss 	u_int32_t net;
    269    1.1       cgd 
    270   1.20   mycroft 	if (IN_EXPERIMENTAL(in.s_addr) || IN_MULTICAST(in.s_addr))
    271    1.1       cgd 		return (0);
    272   1.20   mycroft 	if (IN_CLASSA(in.s_addr)) {
    273   1.20   mycroft 		net = in.s_addr & IN_CLASSA_NET;
    274   1.20   mycroft 		if (net == 0 || net == htonl(IN_LOOPBACKNET << IN_CLASSA_NSHIFT))
    275    1.1       cgd 			return (0);
    276    1.1       cgd 	}
    277    1.1       cgd 	return (1);
    278    1.1       cgd }
    279    1.1       cgd 
    280   1.12   mycroft /*
    281   1.12   mycroft  * Trim a mask in a sockaddr
    282   1.12   mycroft  */
    283   1.12   mycroft void
    284  1.103     perry in_socktrim(struct sockaddr_in *ap)
    285   1.12   mycroft {
    286   1.59  augustss 	char *cplim = (char *) &ap->sin_addr;
    287   1.59  augustss 	char *cp = (char *) (&ap->sin_addr + 1);
    288   1.12   mycroft 
    289   1.12   mycroft 	ap->sin_len = 0;
    290   1.15   mycroft 	while (--cp >= cplim)
    291   1.12   mycroft 		if (*cp) {
    292   1.12   mycroft 			(ap)->sin_len = cp - (char *) (ap) + 1;
    293   1.12   mycroft 			break;
    294   1.12   mycroft 		}
    295   1.40      matt }
    296   1.40      matt 
    297   1.40      matt /*
    298   1.40      matt  *  Routine to take an Internet address and convert into a
    299   1.40      matt  *  "dotted quad" representation for printing.
    300   1.40      matt  */
    301   1.40      matt const char *
    302  1.103     perry in_fmtaddr(struct in_addr addr)
    303   1.40      matt {
    304   1.40      matt 	static char buf[sizeof("123.456.789.123")];
    305   1.40      matt 
    306   1.40      matt 	addr.s_addr = ntohl(addr.s_addr);
    307   1.40      matt 
    308   1.94    itojun 	snprintf(buf, sizeof(buf), "%d.%d.%d.%d",
    309   1.40      matt 		(addr.s_addr >> 24) & 0xFF,
    310   1.40      matt 		(addr.s_addr >> 16) & 0xFF,
    311   1.40      matt 		(addr.s_addr >>  8) & 0xFF,
    312   1.40      matt 		(addr.s_addr >>  0) & 0xFF);
    313   1.40      matt 	return buf;
    314   1.12   mycroft }
    315   1.12   mycroft 
    316   1.35   thorpej /*
    317   1.35   thorpej  * Maintain the "in_maxmtu" variable, which is the largest
    318   1.35   thorpej  * mtu for non-local interfaces with AF_INET addresses assigned
    319   1.35   thorpej  * to them that are up.
    320   1.35   thorpej  */
    321   1.35   thorpej unsigned long in_maxmtu;
    322   1.35   thorpej 
    323   1.35   thorpej void
    324  1.103     perry in_setmaxmtu(void)
    325   1.35   thorpej {
    326   1.59  augustss 	struct in_ifaddr *ia;
    327   1.59  augustss 	struct ifnet *ifp;
    328   1.35   thorpej 	unsigned long maxmtu = 0;
    329  1.178     ozaki 	int s = pserialize_read_enter();
    330   1.35   thorpej 
    331  1.171     ozaki 	IN_ADDRLIST_READER_FOREACH(ia) {
    332   1.35   thorpej 		if ((ifp = ia->ia_ifp) == 0)
    333   1.35   thorpej 			continue;
    334   1.35   thorpej 		if ((ifp->if_flags & (IFF_UP|IFF_LOOPBACK)) != IFF_UP)
    335   1.35   thorpej 			continue;
    336   1.35   thorpej 		if (ifp->if_mtu > maxmtu)
    337   1.38       tls 			maxmtu = ifp->if_mtu;
    338   1.35   thorpej 	}
    339   1.35   thorpej 	if (maxmtu)
    340   1.35   thorpej 		in_maxmtu = maxmtu;
    341  1.178     ozaki 	pserialize_read_exit(s);
    342   1.35   thorpej }
    343   1.35   thorpej 
    344   1.82   thorpej static u_int
    345  1.103     perry in_mask2len(struct in_addr *mask)
    346   1.48    itojun {
    347   1.82   thorpej 	u_int x, y;
    348   1.48    itojun 	u_char *p;
    349   1.48    itojun 
    350   1.48    itojun 	p = (u_char *)mask;
    351   1.48    itojun 	for (x = 0; x < sizeof(*mask); x++) {
    352   1.48    itojun 		if (p[x] != 0xff)
    353   1.48    itojun 			break;
    354   1.48    itojun 	}
    355   1.48    itojun 	y = 0;
    356   1.48    itojun 	if (x < sizeof(*mask)) {
    357  1.124    dyoung 		for (y = 0; y < NBBY; y++) {
    358   1.48    itojun 			if ((p[x] & (0x80 >> y)) == 0)
    359   1.48    itojun 				break;
    360   1.48    itojun 		}
    361   1.48    itojun 	}
    362  1.124    dyoung 	return x * NBBY + y;
    363   1.48    itojun }
    364   1.48    itojun 
    365   1.48    itojun static void
    366  1.103     perry in_len2mask(struct in_addr *mask, u_int len)
    367   1.48    itojun {
    368   1.82   thorpej 	u_int i;
    369   1.48    itojun 	u_char *p;
    370   1.48    itojun 
    371   1.48    itojun 	p = (u_char *)mask;
    372  1.132    cegger 	memset(mask, 0, sizeof(*mask));
    373  1.124    dyoung 	for (i = 0; i < len / NBBY; i++)
    374   1.48    itojun 		p[i] = 0xff;
    375  1.124    dyoung 	if (len % NBBY)
    376  1.124    dyoung 		p[i] = (0xff00 >> (len % NBBY)) & 0xff;
    377   1.48    itojun }
    378   1.48    itojun 
    379    1.1       cgd /*
    380    1.1       cgd  * Generic internet control operations (ioctl's).
    381    1.1       cgd  * Ifp is 0 if not an interface-specific ioctl.
    382    1.1       cgd  */
    383    1.1       cgd /* ARGSUSED */
    384  1.177     ozaki static int
    385  1.177     ozaki in_control0(struct socket *so, u_long cmd, void *data, struct ifnet *ifp)
    386    1.1       cgd {
    387   1.59  augustss 	struct ifreq *ifr = (struct ifreq *)data;
    388  1.136    dyoung 	struct in_ifaddr *ia = NULL;
    389    1.1       cgd 	struct in_aliasreq *ifra = (struct in_aliasreq *)data;
    390  1.184       roy 	struct sockaddr_in oldaddr, *new_dstaddr;
    391    1.1       cgd 	int error, hostIsNew, maskIsNew;
    392  1.100      yamt 	int newifaddr = 0;
    393  1.169     ozaki 	bool run_hook = false;
    394  1.169     ozaki 	bool need_reinsert = false;
    395  1.178     ozaki 	struct psref psref;
    396  1.178     ozaki 	int bound;
    397   1.48    itojun 
    398   1.48    itojun 	switch (cmd) {
    399   1.48    itojun 	case SIOCALIFADDR:
    400   1.48    itojun 	case SIOCDLIFADDR:
    401  1.135    dyoung 	case SIOCGLIFADDR:
    402  1.135    dyoung 		if (ifp == NULL)
    403  1.135    dyoung 			return EINVAL;
    404  1.147       rtr 		return in_lifaddr_ioctl(so, cmd, data, ifp);
    405  1.135    dyoung 	case SIOCGIFADDRPREF:
    406  1.114    dyoung 	case SIOCSIFADDRPREF:
    407  1.117    dyoung 		if (ifp == NULL)
    408   1.48    itojun 			return EINVAL;
    409  1.147       rtr 		return ifaddrpref_ioctl(so, cmd, data, ifp);
    410   1.48    itojun 	}
    411   1.48    itojun 
    412  1.178     ozaki 	bound = curlwp_bind();
    413    1.1       cgd 	/*
    414    1.1       cgd 	 * Find address for this interface, if it exists.
    415    1.1       cgd 	 */
    416  1.117    dyoung 	if (ifp != NULL)
    417  1.178     ozaki 		ia = in_get_ia_from_ifp_psref(ifp, &psref);
    418    1.1       cgd 
    419  1.153       roy 	hostIsNew = 1;		/* moved here to appease gcc */
    420    1.1       cgd 	switch (cmd) {
    421    1.1       cgd 	case SIOCAIFADDR:
    422    1.1       cgd 	case SIOCDIFADDR:
    423   1.43  christos 	case SIOCGIFALIAS:
    424  1.152       roy 	case SIOCGIFAFLAG_IN:
    425  1.170     ozaki 		if (ifra->ifra_addr.sin_family == AF_INET) {
    426  1.178     ozaki 			int s;
    427  1.178     ozaki 
    428  1.178     ozaki 			if (ia != NULL)
    429  1.178     ozaki 				ia4_release(ia, &psref);
    430  1.178     ozaki 			s = pserialize_read_enter();
    431  1.170     ozaki 			IN_ADDRHASH_READER_FOREACH(ia,
    432  1.170     ozaki 			    ifra->ifra_addr.sin_addr.s_addr) {
    433  1.117    dyoung 				if (ia->ia_ifp == ifp &&
    434   1.38       tls 				    in_hosteq(ia->ia_addr.sin_addr,
    435   1.38       tls 				    ifra->ifra_addr.sin_addr))
    436   1.28   mycroft 					break;
    437   1.28   mycroft 			}
    438  1.178     ozaki 			if (ia != NULL)
    439  1.178     ozaki 				ia4_acquire(ia, &psref);
    440  1.178     ozaki 			pserialize_read_exit(s);
    441  1.170     ozaki 		}
    442  1.152       roy 		if ((cmd == SIOCDIFADDR ||
    443  1.152       roy 		    cmd == SIOCGIFALIAS ||
    444  1.152       roy 		    cmd == SIOCGIFAFLAG_IN) &&
    445  1.178     ozaki 		    ia == NULL) {
    446  1.178     ozaki 			error = EADDRNOTAVAIL;
    447  1.178     ozaki 			goto out;
    448  1.178     ozaki 		}
    449  1.105     seanb 
    450  1.105     seanb 		if (cmd == SIOCDIFADDR &&
    451  1.105     seanb 		    ifra->ifra_addr.sin_family == AF_UNSPEC) {
    452  1.105     seanb 			ifra->ifra_addr.sin_family = AF_INET;
    453  1.105     seanb 		}
    454    1.1       cgd 		/* FALLTHROUGH */
    455    1.1       cgd 	case SIOCSIFADDR:
    456  1.152       roy 		if (ia == NULL || ia->ia_addr.sin_family != AF_INET)
    457  1.152       roy 			;
    458  1.152       roy 		else if (ifra->ifra_addr.sin_len == 0) {
    459  1.152       roy 			ifra->ifra_addr = ia->ia_addr;
    460  1.152       roy 			hostIsNew = 0;
    461  1.152       roy 		} else if (in_hosteq(ia->ia_addr.sin_addr,
    462  1.152       roy 		           ifra->ifra_addr.sin_addr))
    463  1.152       roy 			hostIsNew = 0;
    464  1.152       roy 		/* FALLTHROUGH */
    465   1.52    itojun 	case SIOCSIFDSTADDR:
    466  1.178     ozaki 		if (ifra->ifra_addr.sin_family != AF_INET) {
    467  1.178     ozaki 			error = EAFNOSUPPORT;
    468  1.178     ozaki 			goto out;
    469  1.178     ozaki 		}
    470   1.54    itojun 		/* FALLTHROUGH */
    471    1.1       cgd 	case SIOCSIFNETMASK:
    472  1.117    dyoung 		if (ifp == NULL)
    473   1.44  christos 			panic("in_control");
    474   1.44  christos 
    475  1.152       roy 		if (cmd == SIOCGIFALIAS || cmd == SIOCGIFAFLAG_IN)
    476   1.44  christos 			break;
    477   1.44  christos 
    478  1.100      yamt 		if (ia == NULL &&
    479  1.178     ozaki 		    (cmd == SIOCSIFNETMASK || cmd == SIOCSIFDSTADDR)) {
    480  1.178     ozaki 			error = EADDRNOTAVAIL;
    481  1.178     ozaki 			goto out;
    482  1.178     ozaki 		}
    483  1.100      yamt 
    484  1.147       rtr 		if (kauth_authorize_network(curlwp->l_cred, KAUTH_NETWORK_INTERFACE,
    485  1.113      elad 		    KAUTH_REQ_NETWORK_INTERFACE_SETPRIV, ifp, (void *)cmd,
    486  1.178     ozaki 		    NULL) != 0) {
    487  1.178     ozaki 			error = EPERM;
    488  1.178     ozaki 			goto out;
    489  1.178     ozaki 		}
    490    1.1       cgd 
    491  1.136    dyoung 		if (ia == NULL) {
    492  1.129    cegger 			ia = malloc(sizeof(*ia), M_IFADDR, M_WAITOK|M_ZERO);
    493  1.178     ozaki 			if (ia == NULL) {
    494  1.178     ozaki 				error = ENOBUFS;
    495  1.178     ozaki 				goto out;
    496  1.178     ozaki 			}
    497   1.21   mycroft 			ia->ia_ifa.ifa_addr = sintosa(&ia->ia_addr);
    498   1.21   mycroft 			ia->ia_ifa.ifa_dstaddr = sintosa(&ia->ia_dstaddr);
    499   1.21   mycroft 			ia->ia_ifa.ifa_netmask = sintosa(&ia->ia_sockmask);
    500  1.114    dyoung #ifdef IPSELSRC
    501  1.114    dyoung 			ia->ia_ifa.ifa_getifa = in_getifa;
    502  1.114    dyoung #else /* IPSELSRC */
    503  1.114    dyoung 			ia->ia_ifa.ifa_getifa = NULL;
    504  1.114    dyoung #endif /* IPSELSRC */
    505    1.1       cgd 			ia->ia_sockmask.sin_len = 8;
    506  1.149  christos 			ia->ia_sockmask.sin_family = AF_INET;
    507    1.1       cgd 			if (ifp->if_flags & IFF_BROADCAST) {
    508    1.1       cgd 				ia->ia_broadaddr.sin_len = sizeof(ia->ia_addr);
    509    1.1       cgd 				ia->ia_broadaddr.sin_family = AF_INET;
    510    1.1       cgd 			}
    511    1.1       cgd 			ia->ia_ifp = ifp;
    512  1.141       tls 			ia->ia_idsalt = cprng_fast32() % 65535;
    513   1.24   mycroft 			LIST_INIT(&ia->ia_multiaddrs);
    514  1.170     ozaki 			IN_ADDRHASH_ENTRY_INIT(ia);
    515  1.171     ozaki 			IN_ADDRLIST_ENTRY_INIT(ia);
    516  1.178     ozaki 			ifa_psref_init(&ia->ia_ifa);
    517  1.169     ozaki 
    518  1.100      yamt 			newifaddr = 1;
    519   1.81    simonb 		}
    520    1.1       cgd 		break;
    521    1.1       cgd 
    522    1.1       cgd 	case SIOCSIFBRDADDR:
    523  1.147       rtr 		if (kauth_authorize_network(curlwp->l_cred, KAUTH_NETWORK_INTERFACE,
    524  1.113      elad 		    KAUTH_REQ_NETWORK_INTERFACE_SETPRIV, ifp, (void *)cmd,
    525  1.178     ozaki 		    NULL) != 0) {
    526  1.178     ozaki 			error = EPERM;
    527  1.178     ozaki 			goto out;
    528  1.178     ozaki 		}
    529    1.1       cgd 		/* FALLTHROUGH */
    530    1.1       cgd 
    531    1.1       cgd 	case SIOCGIFADDR:
    532    1.1       cgd 	case SIOCGIFNETMASK:
    533    1.1       cgd 	case SIOCGIFDSTADDR:
    534    1.1       cgd 	case SIOCGIFBRDADDR:
    535  1.178     ozaki 		if (ia == NULL) {
    536  1.178     ozaki 			error = EADDRNOTAVAIL;
    537  1.178     ozaki 			goto out;
    538  1.178     ozaki 		}
    539    1.1       cgd 		break;
    540    1.1       cgd 	}
    541  1.100      yamt 	error = 0;
    542    1.1       cgd 	switch (cmd) {
    543    1.1       cgd 
    544    1.1       cgd 	case SIOCGIFADDR:
    545  1.118    dyoung 		ifreq_setaddr(cmd, ifr, sintocsa(&ia->ia_addr));
    546    1.1       cgd 		break;
    547    1.1       cgd 
    548    1.1       cgd 	case SIOCGIFBRDADDR:
    549  1.178     ozaki 		if ((ifp->if_flags & IFF_BROADCAST) == 0) {
    550  1.178     ozaki 			error = EINVAL;
    551  1.178     ozaki 			goto out;
    552  1.178     ozaki 		}
    553  1.118    dyoung 		ifreq_setdstaddr(cmd, ifr, sintocsa(&ia->ia_broadaddr));
    554    1.1       cgd 		break;
    555    1.1       cgd 
    556    1.1       cgd 	case SIOCGIFDSTADDR:
    557  1.178     ozaki 		if ((ifp->if_flags & IFF_POINTOPOINT) == 0) {
    558  1.178     ozaki 			error = EINVAL;
    559  1.178     ozaki 			goto out;
    560  1.178     ozaki 		}
    561  1.118    dyoung 		ifreq_setdstaddr(cmd, ifr, sintocsa(&ia->ia_dstaddr));
    562    1.1       cgd 		break;
    563    1.1       cgd 
    564    1.1       cgd 	case SIOCGIFNETMASK:
    565  1.149  christos 		/*
    566  1.149  christos 		 * We keep the number of trailing zero bytes the sin_len field
    567  1.149  christos 		 * of ia_sockmask, so we fix this before we pass it back to
    568  1.149  christos 		 * userland.
    569  1.149  christos 		 */
    570  1.149  christos 		oldaddr = ia->ia_sockmask;
    571  1.149  christos 		oldaddr.sin_len = sizeof(struct sockaddr_in);
    572  1.149  christos 		ifreq_setaddr(cmd, ifr, (const void *)&oldaddr);
    573    1.1       cgd 		break;
    574    1.1       cgd 
    575    1.1       cgd 	case SIOCSIFDSTADDR:
    576  1.178     ozaki 		if ((ifp->if_flags & IFF_POINTOPOINT) == 0) {
    577  1.178     ozaki 			error = EINVAL;
    578  1.178     ozaki 			goto out;
    579  1.178     ozaki 		}
    580    1.1       cgd 		oldaddr = ia->ia_dstaddr;
    581  1.118    dyoung 		ia->ia_dstaddr = *satocsin(ifreq_getdstaddr(cmd, ifr));
    582  1.139    dyoung 		if ((error = if_addr_init(ifp, &ia->ia_ifa, false)) != 0) {
    583    1.1       cgd 			ia->ia_dstaddr = oldaddr;
    584  1.178     ozaki 			goto out;
    585    1.1       cgd 		}
    586    1.1       cgd 		if (ia->ia_flags & IFA_ROUTE) {
    587   1.21   mycroft 			ia->ia_ifa.ifa_dstaddr = sintosa(&oldaddr);
    588  1.117    dyoung 			rtinit(&ia->ia_ifa, RTM_DELETE, RTF_HOST);
    589   1.21   mycroft 			ia->ia_ifa.ifa_dstaddr = sintosa(&ia->ia_dstaddr);
    590  1.117    dyoung 			rtinit(&ia->ia_ifa, RTM_ADD, RTF_HOST|RTF_UP);
    591    1.1       cgd 		}
    592    1.1       cgd 		break;
    593    1.1       cgd 
    594    1.1       cgd 	case SIOCSIFBRDADDR:
    595  1.178     ozaki 		if ((ifp->if_flags & IFF_BROADCAST) == 0) {
    596  1.178     ozaki 			error = EINVAL;
    597  1.178     ozaki 			goto out;
    598  1.178     ozaki 		}
    599  1.118    dyoung 		ia->ia_broadaddr = *satocsin(ifreq_getbroadaddr(cmd, ifr));
    600    1.1       cgd 		break;
    601    1.1       cgd 
    602    1.1       cgd 	case SIOCSIFADDR:
    603  1.169     ozaki 		if (!newifaddr) {
    604  1.189  knakahar 			in_addrhash_remove(ia);
    605  1.169     ozaki 			need_reinsert = true;
    606  1.169     ozaki 		}
    607  1.184       roy 		error = in_ifinit(ifp, ia, satocsin(ifreq_getaddr(cmd, ifr)),
    608  1.184       roy 		    NULL, 1);
    609  1.169     ozaki 
    610  1.169     ozaki 		run_hook = true;
    611  1.100      yamt 		break;
    612    1.1       cgd 
    613    1.1       cgd 	case SIOCSIFNETMASK:
    614  1.185       roy 		in_scrubprefix(ia);
    615  1.118    dyoung 		ia->ia_sockmask = *satocsin(ifreq_getaddr(cmd, ifr));
    616   1.97   mycroft 		ia->ia_subnetmask = ia->ia_sockmask.sin_addr.s_addr;
    617  1.169     ozaki 		if (!newifaddr) {
    618  1.189  knakahar 			in_addrhash_remove(ia);
    619  1.169     ozaki 			need_reinsert = true;
    620  1.169     ozaki 		}
    621  1.184       roy 		error = in_ifinit(ifp, ia, NULL, NULL, 0);
    622  1.100      yamt 		break;
    623    1.1       cgd 
    624    1.1       cgd 	case SIOCAIFADDR:
    625    1.1       cgd 		maskIsNew = 0;
    626    1.1       cgd 		if (ifra->ifra_mask.sin_len) {
    627  1.185       roy 			in_scrubprefix(ia);
    628    1.1       cgd 			ia->ia_sockmask = ifra->ifra_mask;
    629   1.20   mycroft 			ia->ia_subnetmask = ia->ia_sockmask.sin_addr.s_addr;
    630    1.1       cgd 			maskIsNew = 1;
    631    1.1       cgd 		}
    632    1.1       cgd 		if ((ifp->if_flags & IFF_POINTOPOINT) &&
    633    1.1       cgd 		    (ifra->ifra_dstaddr.sin_family == AF_INET)) {
    634  1.184       roy 			new_dstaddr = &ifra->ifra_dstaddr;
    635    1.1       cgd 			maskIsNew  = 1; /* We lie; but the effect's the same */
    636  1.184       roy 		} else
    637  1.184       roy 			new_dstaddr = NULL;
    638    1.1       cgd 		if (ifra->ifra_addr.sin_family == AF_INET &&
    639   1.56    itojun 		    (hostIsNew || maskIsNew)) {
    640  1.169     ozaki 			if (!newifaddr) {
    641  1.189  knakahar 				in_addrhash_remove(ia);
    642  1.169     ozaki 				need_reinsert = true;
    643  1.169     ozaki 			}
    644  1.184       roy 			error = in_ifinit(ifp, ia, &ifra->ifra_addr,
    645  1.184       roy 			    new_dstaddr, 0);
    646   1.56    itojun 		}
    647    1.1       cgd 		if ((ifp->if_flags & IFF_BROADCAST) &&
    648    1.1       cgd 		    (ifra->ifra_broadaddr.sin_family == AF_INET))
    649    1.1       cgd 			ia->ia_broadaddr = ifra->ifra_broadaddr;
    650  1.169     ozaki 		run_hook = true;
    651  1.100      yamt 		break;
    652   1.43  christos 
    653   1.43  christos 	case SIOCGIFALIAS:
    654   1.43  christos 		ifra->ifra_mask = ia->ia_sockmask;
    655   1.43  christos 		if ((ifp->if_flags & IFF_POINTOPOINT) &&
    656   1.43  christos 		    (ia->ia_dstaddr.sin_family == AF_INET))
    657   1.43  christos 			ifra->ifra_dstaddr = ia->ia_dstaddr;
    658   1.43  christos 		else if ((ifp->if_flags & IFF_BROADCAST) &&
    659   1.43  christos 		    (ia->ia_broadaddr.sin_family == AF_INET))
    660   1.43  christos 			ifra->ifra_broadaddr = ia->ia_broadaddr;
    661   1.43  christos 		else
    662  1.117    dyoung 			memset(&ifra->ifra_broadaddr, 0,
    663   1.48    itojun 			      sizeof(ifra->ifra_broadaddr));
    664  1.100      yamt 		break;
    665    1.1       cgd 
    666  1.152       roy 	case SIOCGIFAFLAG_IN:
    667  1.152       roy 		ifr->ifr_addrflags = ia->ia4_flags;
    668  1.152       roy 		break;
    669  1.152       roy 
    670    1.1       cgd 	case SIOCDIFADDR:
    671  1.178     ozaki 		ia4_release(ia, &psref);
    672  1.121    dyoung 		in_purgeaddr(&ia->ia_ifa);
    673  1.178     ozaki 		ia = NULL;
    674  1.169     ozaki 		run_hook = true;
    675    1.1       cgd 		break;
    676   1.19   mycroft 
    677   1.19   mycroft #ifdef MROUTING
    678   1.19   mycroft 	case SIOCGETVIFCNT:
    679   1.19   mycroft 	case SIOCGETSGCNT:
    680  1.100      yamt 		error = mrt_ioctl(so, cmd, data);
    681  1.100      yamt 		break;
    682   1.19   mycroft #endif /* MROUTING */
    683    1.1       cgd 
    684    1.1       cgd 	default:
    685  1.178     ozaki 		error = ENOTTY;
    686  1.178     ozaki 		goto out;
    687  1.100      yamt 	}
    688  1.100      yamt 
    689  1.169     ozaki 	/*
    690  1.169     ozaki 	 * XXX insert regardless of error to make in_purgeaddr below work.
    691  1.169     ozaki 	 * Need to improve.
    692  1.169     ozaki 	 */
    693  1.169     ozaki 	if (newifaddr) {
    694  1.169     ozaki 		ifaref(&ia->ia_ifa);
    695  1.169     ozaki 		ifa_insert(ifp, &ia->ia_ifa);
    696  1.178     ozaki 
    697  1.178     ozaki 		mutex_enter(&in_ifaddr_lock);
    698  1.178     ozaki 		TAILQ_INSERT_TAIL(&in_ifaddrhead, ia, ia_list);
    699  1.171     ozaki 		IN_ADDRLIST_WRITER_INSERT_TAIL(ia);
    700  1.189  knakahar 		in_addrhash_insert_locked(ia);
    701  1.178     ozaki 		mutex_exit(&in_ifaddr_lock);
    702  1.169     ozaki 	} else if (need_reinsert) {
    703  1.189  knakahar 		in_addrhash_insert(ia);
    704  1.169     ozaki 	}
    705  1.169     ozaki 
    706  1.169     ozaki 	if (error == 0) {
    707  1.169     ozaki 		if (run_hook)
    708  1.169     ozaki 			(void)pfil_run_hooks(if_pfil,
    709  1.169     ozaki 			    (struct mbuf **)cmd, ifp, PFIL_IFADDR);
    710  1.169     ozaki 	} else if (newifaddr) {
    711  1.100      yamt 		KASSERT(ia != NULL);
    712  1.121    dyoung 		in_purgeaddr(&ia->ia_ifa);
    713  1.178     ozaki 		ia = NULL;
    714    1.1       cgd 	}
    715  1.100      yamt 
    716  1.178     ozaki out:
    717  1.178     ozaki 	if (!newifaddr && ia != NULL)
    718  1.178     ozaki 		ia4_release(ia, &psref);
    719  1.178     ozaki 	curlwp_bindx(bound);
    720  1.100      yamt 	return error;
    721   1.50   thorpej }
    722   1.50   thorpej 
    723  1.177     ozaki int
    724  1.177     ozaki in_control(struct socket *so, u_long cmd, void *data, struct ifnet *ifp)
    725  1.177     ozaki {
    726  1.177     ozaki 	int error;
    727  1.177     ozaki 
    728  1.187     ozaki #ifndef NET_MPSAFE
    729  1.177     ozaki 	mutex_enter(softnet_lock);
    730  1.187     ozaki #endif
    731  1.177     ozaki 	error = in_control0(so, cmd, data, ifp);
    732  1.187     ozaki #ifndef NET_MPSAFE
    733  1.177     ozaki 	mutex_exit(softnet_lock);
    734  1.187     ozaki #endif
    735  1.177     ozaki 
    736  1.177     ozaki 	return error;
    737  1.177     ozaki }
    738  1.177     ozaki 
    739  1.150       roy /* Add ownaddr as loopback rtentry. */
    740  1.150       roy static void
    741  1.150       roy in_ifaddlocal(struct ifaddr *ifa)
    742  1.150       roy {
    743  1.151       roy 	struct in_ifaddr *ia;
    744  1.151       roy 
    745  1.151       roy 	ia = (struct in_ifaddr *)ifa;
    746  1.151       roy 	if (ia->ia_addr.sin_addr.s_addr == INADDR_ANY ||
    747  1.151       roy 	    (ia->ia_ifp->if_flags & IFF_POINTOPOINT &&
    748  1.151       roy 	    in_hosteq(ia->ia_dstaddr.sin_addr, ia->ia_addr.sin_addr)))
    749  1.151       roy 	{
    750  1.151       roy 		rt_newaddrmsg(RTM_NEWADDR, ifa, 0, NULL);
    751  1.151       roy 		return;
    752  1.151       roy 	}
    753  1.150       roy 
    754  1.150       roy 	rt_ifa_addlocal(ifa);
    755  1.150       roy }
    756  1.150       roy 
    757  1.168     ozaki /* Remove loopback entry of ownaddr */
    758  1.150       roy static void
    759  1.150       roy in_ifremlocal(struct ifaddr *ifa)
    760  1.150       roy {
    761  1.150       roy 	struct in_ifaddr *ia, *p;
    762  1.150       roy 	struct ifaddr *alt_ifa = NULL;
    763  1.150       roy 	int ia_count = 0;
    764  1.178     ozaki 	int s;
    765  1.178     ozaki 	struct psref psref;
    766  1.178     ozaki 	int bound = curlwp_bind();
    767  1.150       roy 
    768  1.150       roy 	ia = (struct in_ifaddr *)ifa;
    769  1.150       roy 	/* Delete the entry if exactly one ifaddr matches the
    770  1.150       roy 	 * address, ifa->ifa_addr. */
    771  1.178     ozaki 	s = pserialize_read_enter();
    772  1.171     ozaki 	IN_ADDRLIST_READER_FOREACH(p) {
    773  1.150       roy 		if (!in_hosteq(p->ia_addr.sin_addr, ia->ia_addr.sin_addr))
    774  1.150       roy 			continue;
    775  1.150       roy 		if (p->ia_ifp != ia->ia_ifp)
    776  1.150       roy 			alt_ifa = &p->ia_ifa;
    777  1.150       roy 		if (++ia_count > 1 && alt_ifa != NULL)
    778  1.150       roy 			break;
    779  1.150       roy 	}
    780  1.178     ozaki 	if (alt_ifa != NULL && ia_count > 1)
    781  1.178     ozaki 		ifa_acquire(alt_ifa, &psref);
    782  1.178     ozaki 	pserialize_read_exit(s);
    783  1.150       roy 
    784  1.150       roy 	if (ia_count == 0)
    785  1.178     ozaki 		goto out;
    786  1.150       roy 
    787  1.150       roy 	rt_ifa_remlocal(ifa, ia_count == 1 ? NULL : alt_ifa);
    788  1.178     ozaki 	if (alt_ifa != NULL && ia_count > 1)
    789  1.178     ozaki 		ifa_release(alt_ifa, &psref);
    790  1.178     ozaki out:
    791  1.178     ozaki 	curlwp_bindx(bound);
    792  1.150       roy }
    793  1.150       roy 
    794  1.183       roy static void
    795  1.183       roy in_scrubaddr(struct in_ifaddr *ia)
    796  1.183       roy {
    797  1.183       roy 
    798  1.183       roy 	/* stop DAD processing */
    799  1.183       roy 	if (ia->ia_dad_stop != NULL)
    800  1.183       roy 		ia->ia_dad_stop(&ia->ia_ifa);
    801  1.183       roy 
    802  1.185       roy 	in_scrubprefix(ia);
    803  1.183       roy 	in_ifremlocal(&ia->ia_ifa);
    804  1.185       roy 
    805  1.183       roy 	if (ia->ia_allhosts != NULL) {
    806  1.183       roy 		in_delmulti(ia->ia_allhosts);
    807  1.183       roy 		ia->ia_allhosts = NULL;
    808  1.183       roy 	}
    809  1.183       roy }
    810  1.183       roy 
    811  1.178     ozaki /*
    812  1.178     ozaki  * Depends on it isn't called in concurrent. It should be guaranteed
    813  1.178     ozaki  * by ifa->ifa_ifp's ioctl lock. The possible callers are in_control
    814  1.178     ozaki  * and if_purgeaddrs; the former is called iva ifa->ifa_ifp's ioctl
    815  1.178     ozaki  * and the latter is called via ifa->ifa_ifp's if_detach. The functions
    816  1.178     ozaki  * never be executed in concurrent.
    817  1.178     ozaki  */
    818   1.50   thorpej void
    819  1.121    dyoung in_purgeaddr(struct ifaddr *ifa)
    820   1.50   thorpej {
    821  1.183       roy 	struct in_ifaddr *ia = (void *) ifa;
    822  1.121    dyoung 	struct ifnet *ifp = ifa->ifa_ifp;
    823   1.50   thorpej 
    824  1.178     ozaki 	KASSERT(!ifa_held(ifa));
    825  1.178     ozaki 
    826  1.191     ozaki 	ifa->ifa_flags |= IFA_DESTROYING;
    827  1.183       roy 	in_scrubaddr(ia);
    828  1.178     ozaki 
    829  1.178     ozaki 	mutex_enter(&in_ifaddr_lock);
    830  1.189  knakahar 	in_addrhash_remove_locked(ia);
    831   1.93  jonathan 	TAILQ_REMOVE(&in_ifaddrhead, ia, ia_list);
    832  1.171     ozaki 	IN_ADDRLIST_WRITER_REMOVE(ia);
    833  1.178     ozaki 	ifa_remove(ifp, &ia->ia_ifa);
    834  1.188  knakahar #ifdef NET_MPSAFE
    835  1.188  knakahar 	pserialize_perform(in_ifaddrhash_psz);
    836  1.188  knakahar #endif
    837  1.192  knakahar 	mutex_exit(&in_ifaddr_lock);
    838  1.178     ozaki 	IN_ADDRHASH_ENTRY_DESTROY(ia);
    839  1.171     ozaki 	IN_ADDRLIST_ENTRY_DESTROY(ia);
    840  1.148     rmind 	ifafree(&ia->ia_ifa);
    841   1.50   thorpej 	in_setmaxmtu();
    842   1.51   thorpej }
    843   1.51   thorpej 
    844  1.189  knakahar static void
    845  1.189  knakahar in_addrhash_insert_locked(struct in_ifaddr *ia)
    846  1.189  knakahar {
    847  1.189  knakahar 
    848  1.189  knakahar 	KASSERT(mutex_owned(&in_ifaddr_lock));
    849  1.189  knakahar 
    850  1.189  knakahar 	LIST_INSERT_HEAD(&IN_IFADDR_HASH(ia->ia_addr.sin_addr.s_addr), ia,
    851  1.189  knakahar 	    ia_hash);
    852  1.189  knakahar 	IN_ADDRHASH_ENTRY_INIT(ia);
    853  1.189  knakahar 	IN_ADDRHASH_WRITER_INSERT_HEAD(ia);
    854  1.189  knakahar }
    855  1.189  knakahar 
    856  1.189  knakahar void
    857  1.189  knakahar in_addrhash_insert(struct in_ifaddr *ia)
    858  1.189  knakahar {
    859  1.189  knakahar 
    860  1.189  knakahar 	mutex_enter(&in_ifaddr_lock);
    861  1.189  knakahar 	in_addrhash_insert_locked(ia);
    862  1.189  knakahar 	mutex_exit(&in_ifaddr_lock);
    863  1.189  knakahar }
    864  1.189  knakahar 
    865  1.189  knakahar static void
    866  1.189  knakahar in_addrhash_remove_locked(struct in_ifaddr *ia)
    867  1.189  knakahar {
    868  1.189  knakahar 
    869  1.189  knakahar 	KASSERT(mutex_owned(&in_ifaddr_lock));
    870  1.189  knakahar 
    871  1.189  knakahar 	LIST_REMOVE(ia, ia_hash);
    872  1.189  knakahar 	IN_ADDRHASH_WRITER_REMOVE(ia);
    873  1.189  knakahar }
    874  1.189  knakahar 
    875  1.189  knakahar void
    876  1.189  knakahar in_addrhash_remove(struct in_ifaddr *ia)
    877  1.189  knakahar {
    878  1.189  knakahar 
    879  1.189  knakahar 	mutex_enter(&in_ifaddr_lock);
    880  1.189  knakahar 	in_addrhash_remove_locked(ia);
    881  1.189  knakahar #ifdef NET_MPSAFE
    882  1.189  knakahar 	pserialize_perform(in_ifaddrhash_psz);
    883  1.189  knakahar #endif
    884  1.192  knakahar 	mutex_exit(&in_ifaddr_lock);
    885  1.189  knakahar 	IN_ADDRHASH_ENTRY_DESTROY(ia);
    886  1.189  knakahar }
    887  1.189  knakahar 
    888   1.51   thorpej void
    889  1.111       tls in_purgeif(struct ifnet *ifp)		/* MUST be called at splsoftnet() */
    890   1.51   thorpej {
    891  1.121    dyoung 	if_purgeaddrs(ifp, AF_INET, in_purgeaddr);
    892  1.111       tls 	igmp_purgeif(ifp);		/* manipulates pools */
    893   1.89    itojun #ifdef MROUTING
    894   1.89    itojun 	ip_mrouter_detach(ifp);
    895   1.89    itojun #endif
    896   1.48    itojun }
    897   1.48    itojun 
    898   1.48    itojun /*
    899   1.48    itojun  * SIOC[GAD]LIFADDR.
    900   1.48    itojun  *	SIOCGLIFADDR: get first address. (???)
    901   1.48    itojun  *	SIOCGLIFADDR with IFLR_PREFIX:
    902   1.48    itojun  *		get first address that matches the specified prefix.
    903   1.48    itojun  *	SIOCALIFADDR: add the specified address.
    904   1.48    itojun  *	SIOCALIFADDR with IFLR_PREFIX:
    905   1.48    itojun  *		EINVAL since we can't deduce hostid part of the address.
    906   1.48    itojun  *	SIOCDLIFADDR: delete the specified address.
    907   1.48    itojun  *	SIOCDLIFADDR with IFLR_PREFIX:
    908   1.48    itojun  *		delete the first address that matches the specified prefix.
    909   1.48    itojun  * return values:
    910   1.48    itojun  *	EINVAL on invalid parameters
    911   1.48    itojun  *	EADDRNOTAVAIL on prefix match failed/specified address not found
    912   1.48    itojun  *	other values may be returned from in_ioctl()
    913   1.48    itojun  */
    914   1.48    itojun static int
    915  1.116  christos in_lifaddr_ioctl(struct socket *so, u_long cmd, void *data,
    916  1.147       rtr     struct ifnet *ifp)
    917   1.48    itojun {
    918   1.48    itojun 	struct if_laddrreq *iflr = (struct if_laddrreq *)data;
    919   1.48    itojun 	struct ifaddr *ifa;
    920   1.49    itojun 	struct sockaddr *sa;
    921   1.48    itojun 
    922   1.48    itojun 	/* sanity checks */
    923  1.119    dyoung 	if (data == NULL || ifp == NULL) {
    924   1.48    itojun 		panic("invalid argument to in_lifaddr_ioctl");
    925   1.48    itojun 		/*NOTRECHED*/
    926   1.48    itojun 	}
    927   1.48    itojun 
    928   1.48    itojun 	switch (cmd) {
    929   1.48    itojun 	case SIOCGLIFADDR:
    930   1.48    itojun 		/* address must be specified on GET with IFLR_PREFIX */
    931   1.48    itojun 		if ((iflr->flags & IFLR_PREFIX) == 0)
    932   1.48    itojun 			break;
    933   1.48    itojun 		/*FALLTHROUGH*/
    934   1.48    itojun 	case SIOCALIFADDR:
    935   1.48    itojun 	case SIOCDLIFADDR:
    936   1.48    itojun 		/* address must be specified on ADD and DELETE */
    937   1.49    itojun 		sa = (struct sockaddr *)&iflr->addr;
    938   1.49    itojun 		if (sa->sa_family != AF_INET)
    939   1.48    itojun 			return EINVAL;
    940   1.49    itojun 		if (sa->sa_len != sizeof(struct sockaddr_in))
    941   1.48    itojun 			return EINVAL;
    942   1.48    itojun 		/* XXX need improvement */
    943   1.49    itojun 		sa = (struct sockaddr *)&iflr->dstaddr;
    944  1.126    dyoung 		if (sa->sa_family != AF_UNSPEC && sa->sa_family != AF_INET)
    945   1.48    itojun 			return EINVAL;
    946  1.126    dyoung 		if (sa->sa_len != 0 && sa->sa_len != sizeof(struct sockaddr_in))
    947   1.48    itojun 			return EINVAL;
    948   1.48    itojun 		break;
    949   1.48    itojun 	default: /*shouldn't happen*/
    950   1.48    itojun #if 0
    951   1.48    itojun 		panic("invalid cmd to in_lifaddr_ioctl");
    952   1.48    itojun 		/*NOTREACHED*/
    953   1.48    itojun #else
    954   1.48    itojun 		return EOPNOTSUPP;
    955   1.48    itojun #endif
    956   1.48    itojun 	}
    957  1.124    dyoung 	if (sizeof(struct in_addr) * NBBY < iflr->prefixlen)
    958   1.48    itojun 		return EINVAL;
    959   1.48    itojun 
    960   1.48    itojun 	switch (cmd) {
    961   1.48    itojun 	case SIOCALIFADDR:
    962   1.48    itojun 	    {
    963   1.48    itojun 		struct in_aliasreq ifra;
    964   1.48    itojun 
    965   1.48    itojun 		if (iflr->flags & IFLR_PREFIX)
    966   1.48    itojun 			return EINVAL;
    967   1.48    itojun 
    968  1.110      elad 		/* copy args to in_aliasreq, perform ioctl(SIOCAIFADDR). */
    969  1.132    cegger 		memset(&ifra, 0, sizeof(ifra));
    970  1.134   tsutsui 		memcpy(ifra.ifra_name, iflr->iflr_name,
    971   1.48    itojun 			sizeof(ifra.ifra_name));
    972   1.48    itojun 
    973  1.134   tsutsui 		memcpy(&ifra.ifra_addr, &iflr->addr,
    974   1.49    itojun 			((struct sockaddr *)&iflr->addr)->sa_len);
    975   1.48    itojun 
    976   1.49    itojun 		if (((struct sockaddr *)&iflr->dstaddr)->sa_family) {	/*XXX*/
    977  1.134   tsutsui 			memcpy(&ifra.ifra_dstaddr, &iflr->dstaddr,
    978   1.49    itojun 				((struct sockaddr *)&iflr->dstaddr)->sa_len);
    979   1.48    itojun 		}
    980   1.48    itojun 
    981   1.48    itojun 		ifra.ifra_mask.sin_family = AF_INET;
    982   1.48    itojun 		ifra.ifra_mask.sin_len = sizeof(struct sockaddr_in);
    983   1.48    itojun 		in_len2mask(&ifra.ifra_mask.sin_addr, iflr->prefixlen);
    984   1.48    itojun 
    985  1.147       rtr 		return in_control(so, SIOCAIFADDR, &ifra, ifp);
    986   1.48    itojun 	    }
    987   1.48    itojun 	case SIOCGLIFADDR:
    988   1.48    itojun 	case SIOCDLIFADDR:
    989   1.48    itojun 	    {
    990   1.48    itojun 		struct in_ifaddr *ia;
    991   1.48    itojun 		struct in_addr mask, candidate, match;
    992   1.48    itojun 		struct sockaddr_in *sin;
    993  1.179     ozaki 		int cmp, s;
    994   1.48    itojun 
    995  1.132    cegger 		memset(&mask, 0, sizeof(mask));
    996  1.132    cegger 		memset(&match, 0, sizeof(match));	/* XXX gcc */
    997   1.48    itojun 		if (iflr->flags & IFLR_PREFIX) {
    998   1.48    itojun 			/* lookup a prefix rather than address. */
    999   1.48    itojun 			in_len2mask(&mask, iflr->prefixlen);
   1000   1.48    itojun 
   1001   1.48    itojun 			sin = (struct sockaddr_in *)&iflr->addr;
   1002   1.48    itojun 			match.s_addr = sin->sin_addr.s_addr;
   1003   1.48    itojun 			match.s_addr &= mask.s_addr;
   1004   1.48    itojun 
   1005   1.48    itojun 			/* if you set extra bits, that's wrong */
   1006   1.48    itojun 			if (match.s_addr != sin->sin_addr.s_addr)
   1007   1.48    itojun 				return EINVAL;
   1008   1.48    itojun 
   1009   1.48    itojun 			cmp = 1;
   1010   1.48    itojun 		} else {
   1011   1.48    itojun 			if (cmd == SIOCGLIFADDR) {
   1012   1.48    itojun 				/* on getting an address, take the 1st match */
   1013   1.48    itojun 				cmp = 0;	/*XXX*/
   1014   1.48    itojun 			} else {
   1015   1.48    itojun 				/* on deleting an address, do exact match */
   1016   1.48    itojun 				in_len2mask(&mask, 32);
   1017   1.48    itojun 				sin = (struct sockaddr_in *)&iflr->addr;
   1018   1.48    itojun 				match.s_addr = sin->sin_addr.s_addr;
   1019   1.48    itojun 
   1020   1.48    itojun 				cmp = 1;
   1021   1.48    itojun 			}
   1022   1.48    itojun 		}
   1023   1.48    itojun 
   1024  1.179     ozaki 		s = pserialize_read_enter();
   1025  1.172     ozaki 		IFADDR_READER_FOREACH(ifa, ifp) {
   1026   1.95    itojun 			if (ifa->ifa_addr->sa_family != AF_INET)
   1027   1.48    itojun 				continue;
   1028  1.119    dyoung 			if (cmp == 0)
   1029   1.48    itojun 				break;
   1030  1.143       gdt 			candidate.s_addr = ((struct sockaddr_in *)ifa->ifa_addr)->sin_addr.s_addr;
   1031   1.48    itojun 			candidate.s_addr &= mask.s_addr;
   1032   1.48    itojun 			if (candidate.s_addr == match.s_addr)
   1033   1.48    itojun 				break;
   1034   1.48    itojun 		}
   1035  1.179     ozaki 		if (ifa == NULL) {
   1036  1.179     ozaki 			pserialize_read_exit(s);
   1037   1.48    itojun 			return EADDRNOTAVAIL;
   1038  1.179     ozaki 		}
   1039   1.48    itojun 		ia = (struct in_ifaddr *)ifa;
   1040   1.48    itojun 
   1041   1.48    itojun 		if (cmd == SIOCGLIFADDR) {
   1042   1.48    itojun 			/* fill in the if_laddrreq structure */
   1043  1.134   tsutsui 			memcpy(&iflr->addr, &ia->ia_addr, ia->ia_addr.sin_len);
   1044   1.48    itojun 
   1045   1.48    itojun 			if ((ifp->if_flags & IFF_POINTOPOINT) != 0) {
   1046  1.134   tsutsui 				memcpy(&iflr->dstaddr, &ia->ia_dstaddr,
   1047   1.48    itojun 					ia->ia_dstaddr.sin_len);
   1048   1.48    itojun 			} else
   1049  1.132    cegger 				memset(&iflr->dstaddr, 0, sizeof(iflr->dstaddr));
   1050   1.48    itojun 
   1051   1.48    itojun 			iflr->prefixlen =
   1052   1.48    itojun 				in_mask2len(&ia->ia_sockmask.sin_addr);
   1053   1.48    itojun 
   1054   1.48    itojun 			iflr->flags = 0;	/*XXX*/
   1055  1.179     ozaki 			pserialize_read_exit(s);
   1056   1.48    itojun 
   1057   1.48    itojun 			return 0;
   1058   1.48    itojun 		} else {
   1059   1.48    itojun 			struct in_aliasreq ifra;
   1060   1.48    itojun 
   1061  1.110      elad 			/* fill in_aliasreq and do ioctl(SIOCDIFADDR) */
   1062  1.132    cegger 			memset(&ifra, 0, sizeof(ifra));
   1063  1.134   tsutsui 			memcpy(ifra.ifra_name, iflr->iflr_name,
   1064   1.48    itojun 				sizeof(ifra.ifra_name));
   1065   1.48    itojun 
   1066  1.134   tsutsui 			memcpy(&ifra.ifra_addr, &ia->ia_addr,
   1067   1.48    itojun 				ia->ia_addr.sin_len);
   1068   1.48    itojun 			if ((ifp->if_flags & IFF_POINTOPOINT) != 0) {
   1069  1.134   tsutsui 				memcpy(&ifra.ifra_dstaddr, &ia->ia_dstaddr,
   1070   1.48    itojun 					ia->ia_dstaddr.sin_len);
   1071   1.48    itojun 			}
   1072  1.134   tsutsui 			memcpy(&ifra.ifra_dstaddr, &ia->ia_sockmask,
   1073   1.48    itojun 				ia->ia_sockmask.sin_len);
   1074  1.179     ozaki 			pserialize_read_exit(s);
   1075   1.48    itojun 
   1076  1.147       rtr 			return in_control(so, SIOCDIFADDR, &ifra, ifp);
   1077   1.48    itojun 		}
   1078   1.48    itojun 	    }
   1079   1.48    itojun 	}
   1080   1.48    itojun 
   1081   1.48    itojun 	return EOPNOTSUPP;	/*just for safety*/
   1082    1.1       cgd }
   1083    1.1       cgd 
   1084    1.1       cgd /*
   1085    1.1       cgd  * Initialize an interface's internet address
   1086    1.1       cgd  * and routing table entry.
   1087    1.1       cgd  */
   1088   1.12   mycroft int
   1089  1.103     perry in_ifinit(struct ifnet *ifp, struct in_ifaddr *ia,
   1090  1.184       roy     const struct sockaddr_in *sin, const struct sockaddr_in *dst, int scrub)
   1091    1.1       cgd {
   1092   1.97   mycroft 	u_int32_t i;
   1093  1.184       roy 	struct sockaddr_in oldaddr, olddst;
   1094  1.182       roy 	int s, oldflags, flags = RTF_UP, error, hostIsNew;
   1095    1.1       cgd 
   1096  1.118    dyoung 	if (sin == NULL)
   1097   1.97   mycroft 		sin = &ia->ia_addr;
   1098  1.184       roy 	if (dst == NULL)
   1099  1.184       roy 		dst = &ia->ia_dstaddr;
   1100   1.97   mycroft 
   1101   1.32   mycroft 	/*
   1102   1.32   mycroft 	 * Set up new addresses.
   1103   1.32   mycroft 	 */
   1104    1.1       cgd 	oldaddr = ia->ia_addr;
   1105  1.184       roy 	olddst = ia->ia_dstaddr;
   1106  1.182       roy 	oldflags = ia->ia4_flags;
   1107    1.1       cgd 	ia->ia_addr = *sin;
   1108  1.184       roy 	ia->ia_dstaddr = *dst;
   1109  1.182       roy 	hostIsNew = oldaddr.sin_family != AF_INET ||
   1110  1.182       roy 	    !in_hosteq(ia->ia_addr.sin_addr, oldaddr.sin_addr);
   1111  1.184       roy 	if (!scrub)
   1112  1.184       roy 		scrub = oldaddr.sin_family != ia->ia_dstaddr.sin_family ||
   1113  1.184       roy 		    !in_hosteq(ia->ia_dstaddr.sin_addr, olddst.sin_addr);
   1114   1.38       tls 
   1115  1.182       roy 	/*
   1116  1.182       roy 	 * Configure address flags.
   1117  1.182       roy 	 * We need to do this early because they maybe adjusted
   1118  1.182       roy 	 * by if_addr_init depending on the address.
   1119  1.182       roy 	 */
   1120  1.182       roy 	if (ia->ia4_flags & IN_IFF_DUPLICATED) {
   1121  1.182       roy 		ia->ia4_flags &= ~IN_IFF_DUPLICATED;
   1122  1.182       roy 		hostIsNew = 1;
   1123  1.182       roy 	}
   1124  1.182       roy 	if (ifp->if_link_state == LINK_STATE_DOWN) {
   1125  1.182       roy 		ia->ia4_flags |= IN_IFF_DETACHED;
   1126  1.182       roy 		ia->ia4_flags &= ~IN_IFF_TENTATIVE;
   1127  1.182       roy 	} else if (hostIsNew && if_do_dad(ifp))
   1128  1.182       roy 		ia->ia4_flags |= IN_IFF_TRYTENTATIVE;
   1129  1.152       roy 
   1130    1.1       cgd 	/*
   1131    1.1       cgd 	 * Give the interface a chance to initialize
   1132    1.1       cgd 	 * if this is its first address,
   1133    1.1       cgd 	 * and to validate the address if necessary.
   1134    1.1       cgd 	 */
   1135  1.182       roy 	s = splnet();
   1136  1.182       roy 	error = if_addr_init(ifp, &ia->ia_ifa, true);
   1137  1.182       roy 	splx(s);
   1138  1.156       roy 	/* Now clear the try tentative flag, it's job is done. */
   1139  1.156       roy 	ia->ia4_flags &= ~IN_IFF_TRYTENTATIVE;
   1140  1.182       roy 	if (error != 0) {
   1141  1.182       roy 		ia->ia_addr = oldaddr;
   1142  1.184       roy 		ia->ia_dstaddr = olddst;
   1143  1.182       roy 		ia->ia4_flags = oldflags;
   1144  1.182       roy 		return error;
   1145  1.182       roy 	}
   1146  1.156       roy 
   1147  1.183       roy 	if (scrub || hostIsNew) {
   1148  1.182       roy 		int newflags = ia->ia4_flags;
   1149  1.182       roy 
   1150   1.21   mycroft 		ia->ia_ifa.ifa_addr = sintosa(&oldaddr);
   1151  1.184       roy 		ia->ia_ifa.ifa_dstaddr = sintosa(&olddst);
   1152  1.182       roy 		ia->ia4_flags = oldflags;
   1153  1.183       roy 		if (hostIsNew)
   1154  1.183       roy 			in_scrubaddr(ia);
   1155  1.183       roy 		else if (scrub)
   1156  1.185       roy 			in_scrubprefix(ia);
   1157   1.21   mycroft 		ia->ia_ifa.ifa_addr = sintosa(&ia->ia_addr);
   1158  1.184       roy 		ia->ia_ifa.ifa_dstaddr = sintosa(&ia->ia_dstaddr);
   1159  1.182       roy 		ia->ia4_flags = newflags;
   1160    1.1       cgd 	}
   1161   1.35   thorpej 
   1162  1.150       roy 	/* Add the local route to the address */
   1163  1.150       roy 	in_ifaddlocal(&ia->ia_ifa);
   1164  1.150       roy 
   1165   1.97   mycroft 	i = ia->ia_addr.sin_addr.s_addr;
   1166  1.186       roy 	if (ifp->if_flags & IFF_POINTOPOINT)
   1167  1.186       roy 		ia->ia_netmask = INADDR_BROADCAST;	/* default to /32 */
   1168  1.186       roy 	else if (IN_CLASSA(i))
   1169    1.1       cgd 		ia->ia_netmask = IN_CLASSA_NET;
   1170    1.1       cgd 	else if (IN_CLASSB(i))
   1171    1.1       cgd 		ia->ia_netmask = IN_CLASSB_NET;
   1172    1.1       cgd 	else
   1173    1.1       cgd 		ia->ia_netmask = IN_CLASSC_NET;
   1174    1.1       cgd 	/*
   1175   1.12   mycroft 	 * The subnet mask usually includes at least the standard network part,
   1176   1.12   mycroft 	 * but may may be smaller in the case of supernetting.
   1177   1.12   mycroft 	 * If it is set, we believe it.
   1178    1.1       cgd 	 */
   1179   1.12   mycroft 	if (ia->ia_subnetmask == 0) {
   1180   1.12   mycroft 		ia->ia_subnetmask = ia->ia_netmask;
   1181   1.20   mycroft 		ia->ia_sockmask.sin_addr.s_addr = ia->ia_subnetmask;
   1182   1.12   mycroft 	} else
   1183   1.12   mycroft 		ia->ia_netmask &= ia->ia_subnetmask;
   1184   1.35   thorpej 
   1185   1.12   mycroft 	ia->ia_net = i & ia->ia_netmask;
   1186    1.1       cgd 	ia->ia_subnet = i & ia->ia_subnetmask;
   1187   1.12   mycroft 	in_socktrim(&ia->ia_sockmask);
   1188   1.35   thorpej 	/* re-calculate the "in_maxmtu" value */
   1189   1.35   thorpej 	in_setmaxmtu();
   1190    1.1       cgd 	/*
   1191    1.1       cgd 	 * Add route for the network.
   1192    1.1       cgd 	 */
   1193   1.12   mycroft 	ia->ia_ifa.ifa_metric = ifp->if_metric;
   1194    1.1       cgd 	if (ifp->if_flags & IFF_BROADCAST) {
   1195   1.12   mycroft 		ia->ia_broadaddr.sin_addr.s_addr =
   1196   1.20   mycroft 			ia->ia_subnet | ~ia->ia_subnetmask;
   1197    1.1       cgd 		ia->ia_netbroadcast.s_addr =
   1198   1.20   mycroft 			ia->ia_net | ~ia->ia_netmask;
   1199    1.1       cgd 	} else if (ifp->if_flags & IFF_LOOPBACK) {
   1200   1.83      onoe 		ia->ia_dstaddr = ia->ia_addr;
   1201    1.1       cgd 		flags |= RTF_HOST;
   1202    1.1       cgd 	} else if (ifp->if_flags & IFF_POINTOPOINT) {
   1203    1.1       cgd 		if (ia->ia_dstaddr.sin_family != AF_INET)
   1204    1.1       cgd 			return (0);
   1205    1.1       cgd 		flags |= RTF_HOST;
   1206    1.1       cgd 	}
   1207   1.67    itojun 	error = in_addprefix(ia, flags);
   1208    1.5   hpeyerl 	/*
   1209    1.5   hpeyerl 	 * If the interface supports multicast, join the "all hosts"
   1210    1.5   hpeyerl 	 * multicast group on that interface.
   1211    1.5   hpeyerl 	 */
   1212   1.65     enami 	if ((ifp->if_flags & IFF_MULTICAST) != 0 && ia->ia_allhosts == NULL) {
   1213    1.5   hpeyerl 		struct in_addr addr;
   1214    1.5   hpeyerl 
   1215   1.20   mycroft 		addr.s_addr = INADDR_ALLHOSTS_GROUP;
   1216   1.65     enami 		ia->ia_allhosts = in_addmulti(&addr, ifp);
   1217    1.5   hpeyerl 	}
   1218  1.152       roy 
   1219  1.182       roy 	if (hostIsNew &&
   1220  1.182       roy 	    ia->ia4_flags & IN_IFF_TENTATIVE &&
   1221  1.182       roy 	    if_do_dad(ifp))
   1222  1.156       roy 		ia->ia_dad_start((struct ifaddr *)ia);
   1223  1.152       roy 
   1224  1.182       roy 	return error;
   1225    1.1       cgd }
   1226   1.67    itojun 
   1227   1.67    itojun #define rtinitflags(x) \
   1228   1.68    itojun 	((((x)->ia_ifp->if_flags & (IFF_LOOPBACK | IFF_POINTOPOINT)) != 0) \
   1229   1.68    itojun 	    ? RTF_HOST : 0)
   1230   1.67    itojun 
   1231   1.67    itojun /*
   1232   1.67    itojun  * add a route to prefix ("connected route" in cisco terminology).
   1233   1.67    itojun  * does nothing if there's some interface address with the same prefix already.
   1234   1.67    itojun  */
   1235   1.67    itojun static int
   1236  1.103     perry in_addprefix(struct in_ifaddr *target, int flags)
   1237   1.67    itojun {
   1238   1.67    itojun 	struct in_ifaddr *ia;
   1239   1.67    itojun 	struct in_addr prefix, mask, p;
   1240   1.67    itojun 	int error;
   1241  1.178     ozaki 	int s;
   1242   1.67    itojun 
   1243   1.67    itojun 	if ((flags & RTF_HOST) != 0)
   1244   1.67    itojun 		prefix = target->ia_dstaddr.sin_addr;
   1245   1.85    itojun 	else {
   1246   1.67    itojun 		prefix = target->ia_addr.sin_addr;
   1247   1.85    itojun 		mask = target->ia_sockmask.sin_addr;
   1248   1.85    itojun 		prefix.s_addr &= mask.s_addr;
   1249   1.85    itojun 	}
   1250   1.67    itojun 
   1251  1.178     ozaki 	s = pserialize_read_enter();
   1252  1.171     ozaki 	IN_ADDRLIST_READER_FOREACH(ia) {
   1253   1.67    itojun 		if (rtinitflags(ia))
   1254   1.67    itojun 			p = ia->ia_dstaddr.sin_addr;
   1255   1.85    itojun 		else {
   1256   1.67    itojun 			p = ia->ia_addr.sin_addr;
   1257   1.85    itojun 			p.s_addr &= ia->ia_sockmask.sin_addr.s_addr;
   1258   1.85    itojun 		}
   1259   1.85    itojun 
   1260   1.67    itojun 		if (prefix.s_addr != p.s_addr)
   1261   1.67    itojun 			continue;
   1262   1.67    itojun 
   1263   1.67    itojun 		/*
   1264   1.67    itojun 		 * if we got a matching prefix route inserted by other
   1265   1.69    martin 		 * interface address, we don't need to bother
   1266  1.114    dyoung 		 *
   1267  1.114    dyoung 		 * XXX RADIX_MPATH implications here? -dyoung
   1268   1.67    itojun 		 */
   1269  1.178     ozaki 		if (ia->ia_flags & IFA_ROUTE) {
   1270  1.178     ozaki 			pserialize_read_exit(s);
   1271   1.67    itojun 			return 0;
   1272  1.178     ozaki 		}
   1273   1.67    itojun 	}
   1274  1.178     ozaki 	pserialize_read_exit(s);
   1275   1.67    itojun 
   1276   1.67    itojun 	/*
   1277   1.67    itojun 	 * noone seem to have prefix route.  insert it.
   1278   1.67    itojun 	 */
   1279  1.119    dyoung 	error = rtinit(&target->ia_ifa, RTM_ADD, flags);
   1280  1.119    dyoung 	if (error == 0)
   1281   1.67    itojun 		target->ia_flags |= IFA_ROUTE;
   1282  1.130       roy 	else if (error == EEXIST) {
   1283  1.150       roy 		/*
   1284  1.130       roy 		 * the fact the route already exists is not an error.
   1285  1.150       roy 		 */
   1286  1.130       roy 		error = 0;
   1287  1.130       roy 	}
   1288   1.67    itojun 	return error;
   1289   1.67    itojun }
   1290   1.67    itojun 
   1291   1.67    itojun /*
   1292   1.67    itojun  * remove a route to prefix ("connected route" in cisco terminology).
   1293   1.67    itojun  * re-installs the route by using another interface address, if there's one
   1294   1.67    itojun  * with the same prefix (otherwise we lose the route mistakenly).
   1295   1.67    itojun  */
   1296   1.67    itojun static int
   1297  1.103     perry in_scrubprefix(struct in_ifaddr *target)
   1298   1.67    itojun {
   1299   1.67    itojun 	struct in_ifaddr *ia;
   1300   1.67    itojun 	struct in_addr prefix, mask, p;
   1301   1.67    itojun 	int error;
   1302  1.178     ozaki 	int s;
   1303   1.67    itojun 
   1304  1.183       roy 	/* If we don't have IFA_ROUTE we have nothing to do */
   1305  1.150       roy 	if ((target->ia_flags & IFA_ROUTE) == 0)
   1306   1.67    itojun 		return 0;
   1307   1.67    itojun 
   1308   1.67    itojun 	if (rtinitflags(target))
   1309   1.67    itojun 		prefix = target->ia_dstaddr.sin_addr;
   1310   1.85    itojun 	else {
   1311   1.67    itojun 		prefix = target->ia_addr.sin_addr;
   1312   1.85    itojun 		mask = target->ia_sockmask.sin_addr;
   1313   1.85    itojun 		prefix.s_addr &= mask.s_addr;
   1314   1.85    itojun 	}
   1315   1.67    itojun 
   1316  1.178     ozaki 	s = pserialize_read_enter();
   1317  1.171     ozaki 	IN_ADDRLIST_READER_FOREACH(ia) {
   1318   1.67    itojun 		if (rtinitflags(ia))
   1319   1.67    itojun 			p = ia->ia_dstaddr.sin_addr;
   1320   1.85    itojun 		else {
   1321   1.67    itojun 			p = ia->ia_addr.sin_addr;
   1322   1.85    itojun 			p.s_addr &= ia->ia_sockmask.sin_addr.s_addr;
   1323   1.85    itojun 		}
   1324   1.85    itojun 
   1325   1.67    itojun 		if (prefix.s_addr != p.s_addr)
   1326   1.67    itojun 			continue;
   1327   1.67    itojun 
   1328   1.67    itojun 		/*
   1329   1.67    itojun 		 * if we got a matching prefix route, move IFA_ROUTE to him
   1330   1.67    itojun 		 */
   1331   1.67    itojun 		if ((ia->ia_flags & IFA_ROUTE) == 0) {
   1332  1.178     ozaki 			struct psref psref;
   1333  1.178     ozaki 			int bound = curlwp_bind();
   1334  1.178     ozaki 
   1335  1.178     ozaki 			ia4_acquire(ia, &psref);
   1336  1.178     ozaki 			pserialize_read_exit(s);
   1337  1.178     ozaki 
   1338  1.119    dyoung 			rtinit(&target->ia_ifa, RTM_DELETE,
   1339   1.67    itojun 			    rtinitflags(target));
   1340   1.67    itojun 			target->ia_flags &= ~IFA_ROUTE;
   1341   1.67    itojun 
   1342  1.119    dyoung 			error = rtinit(&ia->ia_ifa, RTM_ADD,
   1343   1.67    itojun 			    rtinitflags(ia) | RTF_UP);
   1344   1.67    itojun 			if (error == 0)
   1345   1.67    itojun 				ia->ia_flags |= IFA_ROUTE;
   1346  1.178     ozaki 
   1347  1.178     ozaki 			ia4_release(ia, &psref);
   1348  1.178     ozaki 			curlwp_bindx(bound);
   1349  1.178     ozaki 
   1350   1.67    itojun 			return error;
   1351   1.67    itojun 		}
   1352   1.67    itojun 	}
   1353  1.178     ozaki 	pserialize_read_exit(s);
   1354   1.67    itojun 
   1355   1.67    itojun 	/*
   1356   1.67    itojun 	 * noone seem to have prefix route.  remove it.
   1357   1.67    itojun 	 */
   1358  1.119    dyoung 	rtinit(&target->ia_ifa, RTM_DELETE, rtinitflags(target));
   1359   1.67    itojun 	target->ia_flags &= ~IFA_ROUTE;
   1360   1.67    itojun 	return 0;
   1361   1.67    itojun }
   1362   1.67    itojun 
   1363   1.67    itojun #undef rtinitflags
   1364    1.1       cgd 
   1365    1.1       cgd /*
   1366    1.1       cgd  * Return 1 if the address might be a local broadcast address.
   1367    1.1       cgd  */
   1368    1.8   mycroft int
   1369  1.103     perry in_broadcast(struct in_addr in, struct ifnet *ifp)
   1370    1.1       cgd {
   1371   1.59  augustss 	struct ifaddr *ifa;
   1372  1.178     ozaki 	int s;
   1373  1.178     ozaki 
   1374  1.178     ozaki 	KASSERT(ifp != NULL);
   1375    1.1       cgd 
   1376   1.12   mycroft 	if (in.s_addr == INADDR_BROADCAST ||
   1377   1.32   mycroft 	    in_nullhost(in))
   1378   1.12   mycroft 		return 1;
   1379   1.12   mycroft 	if ((ifp->if_flags & IFF_BROADCAST) == 0)
   1380   1.12   mycroft 		return 0;
   1381    1.1       cgd 	/*
   1382    1.1       cgd 	 * Look through the list of addresses for a match
   1383    1.1       cgd 	 * with a broadcast address.
   1384    1.1       cgd 	 */
   1385   1.22   mycroft #define ia (ifatoia(ifa))
   1386  1.178     ozaki 	s = pserialize_read_enter();
   1387  1.178     ozaki 	IFADDR_READER_FOREACH(ifa, ifp) {
   1388   1.12   mycroft 		if (ifa->ifa_addr->sa_family == AF_INET &&
   1389   1.75    itojun 		    !in_hosteq(in, ia->ia_addr.sin_addr) &&
   1390   1.32   mycroft 		    (in_hosteq(in, ia->ia_broadaddr.sin_addr) ||
   1391   1.32   mycroft 		     in_hosteq(in, ia->ia_netbroadcast) ||
   1392   1.77    itojun 		     (hostzeroisbroadcast &&
   1393   1.47  sommerfe 		      /*
   1394   1.47  sommerfe 		       * Check for old-style (host 0) broadcast.
   1395   1.47  sommerfe 		       */
   1396   1.47  sommerfe 		      (in.s_addr == ia->ia_subnet ||
   1397  1.178     ozaki 		       in.s_addr == ia->ia_net)))) {
   1398  1.178     ozaki 			pserialize_read_exit(s);
   1399   1.47  sommerfe 			return 1;
   1400  1.178     ozaki 		}
   1401  1.178     ozaki 	}
   1402  1.178     ozaki 	pserialize_read_exit(s);
   1403    1.1       cgd 	return (0);
   1404   1.12   mycroft #undef ia
   1405   1.64    itojun }
   1406   1.64    itojun 
   1407   1.64    itojun /*
   1408  1.152       roy  * perform DAD when interface becomes IFF_UP.
   1409  1.152       roy  */
   1410  1.152       roy void
   1411  1.152       roy in_if_link_up(struct ifnet *ifp)
   1412  1.152       roy {
   1413  1.152       roy 	struct ifaddr *ifa;
   1414  1.152       roy 	struct in_ifaddr *ia;
   1415  1.179     ozaki 	int s, bound;
   1416  1.152       roy 
   1417  1.152       roy 	/* Ensure it's sane to run DAD */
   1418  1.152       roy 	if (ifp->if_link_state == LINK_STATE_DOWN)
   1419  1.152       roy 		return;
   1420  1.152       roy 	if ((ifp->if_flags & (IFF_UP|IFF_RUNNING)) != (IFF_UP|IFF_RUNNING))
   1421  1.152       roy 		return;
   1422  1.152       roy 
   1423  1.179     ozaki 	bound = curlwp_bind();
   1424  1.179     ozaki 	s = pserialize_read_enter();
   1425  1.172     ozaki 	IFADDR_READER_FOREACH(ifa, ifp) {
   1426  1.179     ozaki 		struct psref psref;
   1427  1.179     ozaki 
   1428  1.152       roy 		if (ifa->ifa_addr->sa_family != AF_INET)
   1429  1.152       roy 			continue;
   1430  1.179     ozaki 		ifa_acquire(ifa, &psref);
   1431  1.179     ozaki 		pserialize_read_exit(s);
   1432  1.179     ozaki 
   1433  1.152       roy 		ia = (struct in_ifaddr *)ifa;
   1434  1.152       roy 
   1435  1.152       roy 		/* If detached then mark as tentative */
   1436  1.152       roy 		if (ia->ia4_flags & IN_IFF_DETACHED) {
   1437  1.152       roy 			ia->ia4_flags &= ~IN_IFF_DETACHED;
   1438  1.156       roy 			if (if_do_dad(ifp) && ia->ia_dad_start != NULL)
   1439  1.152       roy 				ia->ia4_flags |= IN_IFF_TENTATIVE;
   1440  1.156       roy 			else if ((ia->ia4_flags & IN_IFF_TENTATIVE) == 0)
   1441  1.152       roy 				rt_newaddrmsg(RTM_NEWADDR, ifa, 0, NULL);
   1442  1.152       roy 		}
   1443  1.152       roy 
   1444  1.152       roy 		if (ia->ia4_flags & IN_IFF_TENTATIVE) {
   1445  1.152       roy 			/* Clear the duplicated flag as we're starting DAD. */
   1446  1.152       roy 			ia->ia4_flags &= ~IN_IFF_DUPLICATED;
   1447  1.156       roy 			ia->ia_dad_start(ifa);
   1448  1.152       roy 		}
   1449  1.179     ozaki 
   1450  1.179     ozaki 		s = pserialize_read_enter();
   1451  1.179     ozaki 		ifa_release(ifa, &psref);
   1452  1.152       roy 	}
   1453  1.179     ozaki 	pserialize_read_exit(s);
   1454  1.179     ozaki 	curlwp_bindx(bound);
   1455  1.152       roy }
   1456  1.152       roy 
   1457  1.152       roy void
   1458  1.152       roy in_if_up(struct ifnet *ifp)
   1459  1.152       roy {
   1460  1.152       roy 
   1461  1.152       roy 	/* interface may not support link state, so bring it up also */
   1462  1.152       roy 	in_if_link_up(ifp);
   1463  1.152       roy }
   1464  1.152       roy 
   1465  1.152       roy /*
   1466  1.152       roy  * Mark all addresses as detached.
   1467  1.152       roy  */
   1468  1.152       roy void
   1469  1.152       roy in_if_link_down(struct ifnet *ifp)
   1470  1.152       roy {
   1471  1.152       roy 	struct ifaddr *ifa;
   1472  1.152       roy 	struct in_ifaddr *ia;
   1473  1.179     ozaki 	int s, bound;
   1474  1.152       roy 
   1475  1.179     ozaki 	bound = curlwp_bind();
   1476  1.179     ozaki 	s = pserialize_read_enter();
   1477  1.172     ozaki 	IFADDR_READER_FOREACH(ifa, ifp) {
   1478  1.179     ozaki 		struct psref psref;
   1479  1.179     ozaki 
   1480  1.152       roy 		if (ifa->ifa_addr->sa_family != AF_INET)
   1481  1.152       roy 			continue;
   1482  1.179     ozaki 		ifa_acquire(ifa, &psref);
   1483  1.179     ozaki 		pserialize_read_exit(s);
   1484  1.179     ozaki 
   1485  1.152       roy 		ia = (struct in_ifaddr *)ifa;
   1486  1.152       roy 
   1487  1.152       roy 		/* Stop DAD processing */
   1488  1.156       roy 		if (ia->ia_dad_stop != NULL)
   1489  1.156       roy 			ia->ia_dad_stop(ifa);
   1490  1.152       roy 
   1491  1.152       roy 		/*
   1492  1.152       roy 		 * Mark the address as detached.
   1493  1.152       roy 		 */
   1494  1.152       roy 		if (!(ia->ia4_flags & IN_IFF_DETACHED)) {
   1495  1.152       roy 			ia->ia4_flags |= IN_IFF_DETACHED;
   1496  1.152       roy 			ia->ia4_flags &=
   1497  1.152       roy 			    ~(IN_IFF_TENTATIVE | IN_IFF_DUPLICATED);
   1498  1.152       roy 			rt_newaddrmsg(RTM_NEWADDR, ifa, 0, NULL);
   1499  1.152       roy 		}
   1500  1.179     ozaki 
   1501  1.179     ozaki 		s = pserialize_read_enter();
   1502  1.179     ozaki 		ifa_release(ifa, &psref);
   1503  1.152       roy 	}
   1504  1.179     ozaki 	pserialize_read_exit(s);
   1505  1.179     ozaki 	curlwp_bindx(bound);
   1506  1.152       roy }
   1507  1.152       roy 
   1508  1.152       roy void
   1509  1.152       roy in_if_down(struct ifnet *ifp)
   1510  1.152       roy {
   1511  1.152       roy 
   1512  1.152       roy 	in_if_link_down(ifp);
   1513  1.152       roy }
   1514  1.152       roy 
   1515  1.152       roy void
   1516  1.152       roy in_if_link_state_change(struct ifnet *ifp, int link_state)
   1517  1.152       roy {
   1518  1.152       roy 
   1519  1.152       roy 	switch (link_state) {
   1520  1.152       roy 	case LINK_STATE_DOWN:
   1521  1.152       roy 		in_if_link_down(ifp);
   1522  1.152       roy 		break;
   1523  1.152       roy 	case LINK_STATE_UP:
   1524  1.152       roy 		in_if_link_up(ifp);
   1525  1.152       roy 		break;
   1526  1.152       roy 	}
   1527  1.152       roy }
   1528  1.152       roy 
   1529  1.152       roy /*
   1530  1.146     rmind  * in_lookup_multi: look up the in_multi record for a given IP
   1531  1.146     rmind  * multicast address on a given interface.  If no matching record is
   1532  1.146     rmind  * found, return NULL.
   1533  1.146     rmind  */
   1534  1.146     rmind struct in_multi *
   1535  1.146     rmind in_lookup_multi(struct in_addr addr, ifnet_t *ifp)
   1536  1.146     rmind {
   1537  1.146     rmind 	struct in_multi *inm;
   1538  1.146     rmind 
   1539  1.146     rmind 	KASSERT(rw_lock_held(&in_multilock));
   1540  1.146     rmind 
   1541  1.146     rmind 	LIST_FOREACH(inm, &IN_MULTI_HASH(addr.s_addr, ifp), inm_list) {
   1542  1.146     rmind 		if (in_hosteq(inm->inm_addr, addr) && inm->inm_ifp == ifp)
   1543  1.146     rmind 			break;
   1544  1.146     rmind 	}
   1545  1.146     rmind 	return inm;
   1546  1.146     rmind }
   1547  1.146     rmind 
   1548  1.146     rmind /*
   1549  1.146     rmind  * in_multi_group: check whether the address belongs to an IP multicast
   1550  1.146     rmind  * group we are joined on this interface.  Returns true or false.
   1551  1.146     rmind  */
   1552  1.146     rmind bool
   1553  1.146     rmind in_multi_group(struct in_addr addr, ifnet_t *ifp, int flags)
   1554  1.146     rmind {
   1555  1.146     rmind 	bool ingroup;
   1556  1.146     rmind 
   1557  1.146     rmind 	if (__predict_true(flags & IP_IGMP_MCAST) == 0) {
   1558  1.146     rmind 		rw_enter(&in_multilock, RW_READER);
   1559  1.146     rmind 		ingroup = in_lookup_multi(addr, ifp) != NULL;
   1560  1.146     rmind 		rw_exit(&in_multilock);
   1561  1.146     rmind 	} else {
   1562  1.146     rmind 		/* XXX Recursive call from ip_output(). */
   1563  1.146     rmind 		KASSERT(rw_lock_held(&in_multilock));
   1564  1.146     rmind 		ingroup = in_lookup_multi(addr, ifp) != NULL;
   1565  1.146     rmind 	}
   1566  1.146     rmind 	return ingroup;
   1567  1.146     rmind }
   1568  1.146     rmind 
   1569  1.146     rmind /*
   1570    1.5   hpeyerl  * Add an address to the list of IP multicast addresses for a given interface.
   1571    1.5   hpeyerl  */
   1572    1.5   hpeyerl struct in_multi *
   1573  1.146     rmind in_addmulti(struct in_addr *ap, ifnet_t *ifp)
   1574    1.5   hpeyerl {
   1575  1.118    dyoung 	struct sockaddr_in sin;
   1576   1.59  augustss 	struct in_multi *inm;
   1577    1.5   hpeyerl 
   1578    1.5   hpeyerl 	/*
   1579    1.5   hpeyerl 	 * See if address already in list.
   1580    1.5   hpeyerl 	 */
   1581  1.146     rmind 	rw_enter(&in_multilock, RW_WRITER);
   1582  1.146     rmind 	inm = in_lookup_multi(*ap, ifp);
   1583    1.5   hpeyerl 	if (inm != NULL) {
   1584    1.5   hpeyerl 		/*
   1585    1.5   hpeyerl 		 * Found it; just increment the reference count.
   1586    1.5   hpeyerl 		 */
   1587  1.146     rmind 		inm->inm_refcount++;
   1588  1.146     rmind 		rw_exit(&in_multilock);
   1589  1.146     rmind 		return inm;
   1590  1.146     rmind 	}
   1591  1.146     rmind 
   1592  1.146     rmind 	/*
   1593  1.146     rmind 	 * New address; allocate a new multicast record.
   1594  1.146     rmind 	 */
   1595  1.146     rmind 	inm = pool_get(&inmulti_pool, PR_NOWAIT);
   1596  1.146     rmind 	if (inm == NULL) {
   1597  1.146     rmind 		rw_exit(&in_multilock);
   1598  1.146     rmind 		return NULL;
   1599  1.146     rmind 	}
   1600  1.146     rmind 	inm->inm_addr = *ap;
   1601  1.146     rmind 	inm->inm_ifp = ifp;
   1602  1.146     rmind 	inm->inm_refcount = 1;
   1603  1.146     rmind 
   1604  1.146     rmind 	/*
   1605  1.146     rmind 	 * Ask the network driver to update its multicast reception
   1606  1.146     rmind 	 * filter appropriately for the new address.
   1607  1.146     rmind 	 */
   1608  1.146     rmind 	sockaddr_in_init(&sin, ap, 0);
   1609  1.146     rmind 	if (if_mcast_op(ifp, SIOCADDMULTI, sintosa(&sin)) != 0) {
   1610  1.146     rmind 		rw_exit(&in_multilock);
   1611  1.146     rmind 		pool_put(&inmulti_pool, inm);
   1612  1.146     rmind 		return NULL;
   1613  1.146     rmind 	}
   1614  1.146     rmind 
   1615  1.146     rmind 	/*
   1616  1.146     rmind 	 * Let IGMP know that we have joined a new IP multicast group.
   1617  1.146     rmind 	 */
   1618  1.146     rmind 	if (igmp_joingroup(inm) != 0) {
   1619  1.146     rmind 		rw_exit(&in_multilock);
   1620  1.146     rmind 		pool_put(&inmulti_pool, inm);
   1621  1.146     rmind 		return NULL;
   1622    1.5   hpeyerl 	}
   1623  1.146     rmind 	LIST_INSERT_HEAD(
   1624  1.146     rmind 	    &IN_MULTI_HASH(inm->inm_addr.s_addr, ifp),
   1625  1.146     rmind 	    inm, inm_list);
   1626  1.146     rmind 	in_multientries++;
   1627  1.146     rmind 	rw_exit(&in_multilock);
   1628  1.146     rmind 
   1629  1.146     rmind 	return inm;
   1630    1.5   hpeyerl }
   1631    1.5   hpeyerl 
   1632    1.5   hpeyerl /*
   1633    1.5   hpeyerl  * Delete a multicast address record.
   1634    1.5   hpeyerl  */
   1635   1.26  christos void
   1636  1.103     perry in_delmulti(struct in_multi *inm)
   1637    1.5   hpeyerl {
   1638  1.118    dyoung 	struct sockaddr_in sin;
   1639    1.5   hpeyerl 
   1640  1.146     rmind 	rw_enter(&in_multilock, RW_WRITER);
   1641  1.146     rmind 	if (--inm->inm_refcount > 0) {
   1642  1.146     rmind 		rw_exit(&in_multilock);
   1643  1.146     rmind 		return;
   1644  1.146     rmind 	}
   1645  1.146     rmind 
   1646  1.146     rmind 	/*
   1647  1.146     rmind 	 * No remaining claims to this record; let IGMP know that
   1648  1.146     rmind 	 * we are leaving the multicast group.
   1649  1.146     rmind 	 */
   1650  1.146     rmind 	igmp_leavegroup(inm);
   1651  1.146     rmind 
   1652  1.146     rmind 	/*
   1653  1.146     rmind 	 * Notify the network driver to update its multicast reception
   1654  1.146     rmind 	 * filter.
   1655  1.146     rmind 	 */
   1656  1.146     rmind 	sockaddr_in_init(&sin, &inm->inm_addr, 0);
   1657  1.146     rmind 	if_mcast_op(inm->inm_ifp, SIOCDELMULTI, sintosa(&sin));
   1658  1.146     rmind 
   1659  1.146     rmind 	/*
   1660  1.146     rmind 	 * Unlink from list.
   1661  1.146     rmind 	 */
   1662  1.146     rmind 	LIST_REMOVE(inm, inm_list);
   1663  1.146     rmind 	in_multientries--;
   1664  1.146     rmind 	rw_exit(&in_multilock);
   1665  1.146     rmind 
   1666  1.146     rmind 	pool_put(&inmulti_pool, inm);
   1667  1.146     rmind }
   1668  1.146     rmind 
   1669  1.146     rmind /*
   1670  1.146     rmind  * in_next_multi: step through all of the in_multi records, one at a time.
   1671  1.146     rmind  * The current position is remembered in "step", which the caller must
   1672  1.146     rmind  * provide.  in_first_multi(), below, must be called to initialize "step"
   1673  1.146     rmind  * and get the first record.  Both macros return a NULL "inm" when there
   1674  1.146     rmind  * are no remaining records.
   1675  1.146     rmind  */
   1676  1.146     rmind struct in_multi *
   1677  1.146     rmind in_next_multi(struct in_multistep *step)
   1678  1.146     rmind {
   1679  1.146     rmind 	struct in_multi *inm;
   1680  1.146     rmind 
   1681  1.146     rmind 	KASSERT(rw_lock_held(&in_multilock));
   1682  1.146     rmind 
   1683  1.146     rmind 	while (step->i_inm == NULL && step->i_n < IN_MULTI_HASH_SIZE) {
   1684  1.146     rmind 		step->i_inm = LIST_FIRST(&in_multihashtbl[++step->i_n]);
   1685  1.146     rmind 	}
   1686  1.146     rmind 	if ((inm = step->i_inm) != NULL) {
   1687  1.146     rmind 		step->i_inm = LIST_NEXT(inm, inm_list);
   1688    1.5   hpeyerl 	}
   1689  1.146     rmind 	return inm;
   1690  1.146     rmind }
   1691  1.146     rmind 
   1692  1.146     rmind struct in_multi *
   1693  1.146     rmind in_first_multi(struct in_multistep *step)
   1694  1.146     rmind {
   1695  1.146     rmind 	KASSERT(rw_lock_held(&in_multilock));
   1696  1.146     rmind 
   1697  1.146     rmind 	step->i_n = 0;
   1698  1.146     rmind 	step->i_inm = LIST_FIRST(&in_multihashtbl[0]);
   1699  1.146     rmind 	return in_next_multi(step);
   1700  1.146     rmind }
   1701  1.146     rmind 
   1702  1.146     rmind void
   1703  1.146     rmind in_multi_lock(int op)
   1704  1.146     rmind {
   1705  1.146     rmind 	rw_enter(&in_multilock, op);
   1706  1.146     rmind }
   1707  1.146     rmind 
   1708  1.146     rmind void
   1709  1.146     rmind in_multi_unlock(void)
   1710  1.146     rmind {
   1711  1.146     rmind 	rw_exit(&in_multilock);
   1712  1.146     rmind }
   1713  1.146     rmind 
   1714  1.146     rmind int
   1715  1.146     rmind in_multi_lock_held(void)
   1716  1.146     rmind {
   1717  1.146     rmind 	return rw_lock_held(&in_multilock);
   1718    1.5   hpeyerl }
   1719  1.145     rmind 
   1720  1.178     ozaki struct in_ifaddr *
   1721  1.145     rmind in_selectsrc(struct sockaddr_in *sin, struct route *ro,
   1722  1.178     ozaki     int soopts, struct ip_moptions *mopts, int *errorp, struct psref *psref)
   1723  1.145     rmind {
   1724  1.145     rmind 	struct rtentry *rt = NULL;
   1725  1.145     rmind 	struct in_ifaddr *ia = NULL;
   1726  1.145     rmind 
   1727  1.178     ozaki 	KASSERT(ISSET(curlwp->l_pflag, LP_BOUND));
   1728  1.145     rmind 	/*
   1729  1.145     rmind          * If route is known or can be allocated now, take the
   1730  1.145     rmind          * source address from the interface.  Otherwise, punt.
   1731  1.145     rmind 	 */
   1732  1.145     rmind 	if ((soopts & SO_DONTROUTE) != 0)
   1733  1.145     rmind 		rtcache_free(ro);
   1734  1.145     rmind 	else {
   1735  1.145     rmind 		union {
   1736  1.145     rmind 			struct sockaddr		dst;
   1737  1.145     rmind 			struct sockaddr_in	dst4;
   1738  1.145     rmind 		} u;
   1739  1.145     rmind 
   1740  1.145     rmind 		sockaddr_in_init(&u.dst4, &sin->sin_addr, 0);
   1741  1.145     rmind 		rt = rtcache_lookup(ro, &u.dst);
   1742  1.145     rmind 	}
   1743  1.145     rmind 	/*
   1744  1.145     rmind 	 * If we found a route, use the address
   1745  1.145     rmind 	 * corresponding to the outgoing interface
   1746  1.145     rmind 	 * unless it is the loopback (in case a route
   1747  1.145     rmind 	 * to our address on another net goes to loopback).
   1748  1.145     rmind 	 *
   1749  1.145     rmind 	 * XXX Is this still true?  Do we care?
   1750  1.145     rmind 	 */
   1751  1.178     ozaki 	if (rt != NULL && (rt->rt_ifp->if_flags & IFF_LOOPBACK) == 0) {
   1752  1.178     ozaki 		int s;
   1753  1.178     ozaki 		struct ifaddr *ifa;
   1754  1.178     ozaki 		/*
   1755  1.178     ozaki 		 * Just in case. May not need to do this workaround.
   1756  1.178     ozaki 		 * Revisit when working on rtentry MP-ification.
   1757  1.178     ozaki 		 */
   1758  1.178     ozaki 		s = pserialize_read_enter();
   1759  1.178     ozaki 		IFADDR_READER_FOREACH(ifa, rt->rt_ifp) {
   1760  1.178     ozaki 			if (ifa == rt->rt_ifa)
   1761  1.178     ozaki 				break;
   1762  1.178     ozaki 		}
   1763  1.178     ozaki 		if (ifa != NULL)
   1764  1.178     ozaki 			ifa_acquire(ifa, psref);
   1765  1.178     ozaki 		pserialize_read_exit(s);
   1766  1.178     ozaki 
   1767  1.178     ozaki 		ia = ifatoia(ifa);
   1768  1.178     ozaki 	}
   1769  1.145     rmind 	if (ia == NULL) {
   1770  1.145     rmind 		u_int16_t fport = sin->sin_port;
   1771  1.178     ozaki 		struct ifaddr *ifa;
   1772  1.178     ozaki 		int s;
   1773  1.145     rmind 
   1774  1.145     rmind 		sin->sin_port = 0;
   1775  1.178     ozaki 		ifa = ifa_ifwithladdr_psref(sintosa(sin), psref);
   1776  1.145     rmind 		sin->sin_port = fport;
   1777  1.178     ozaki 		if (ifa == NULL) {
   1778  1.145     rmind 			/* Find 1st non-loopback AF_INET address */
   1779  1.178     ozaki 			s = pserialize_read_enter();
   1780  1.171     ozaki 			IN_ADDRLIST_READER_FOREACH(ia) {
   1781  1.145     rmind 				if (!(ia->ia_ifp->if_flags & IFF_LOOPBACK))
   1782  1.145     rmind 					break;
   1783  1.145     rmind 			}
   1784  1.178     ozaki 			if (ia != NULL)
   1785  1.178     ozaki 				ia4_acquire(ia, psref);
   1786  1.178     ozaki 			pserialize_read_exit(s);
   1787  1.178     ozaki 		} else {
   1788  1.178     ozaki 			/* ia is already referenced by psref */
   1789  1.178     ozaki 			ia = ifatoia(ifa);
   1790  1.145     rmind 		}
   1791  1.145     rmind 		if (ia == NULL) {
   1792  1.145     rmind 			*errorp = EADDRNOTAVAIL;
   1793  1.190     ozaki 			goto out;
   1794  1.145     rmind 		}
   1795  1.145     rmind 	}
   1796  1.145     rmind 	/*
   1797  1.145     rmind 	 * If the destination address is multicast and an outgoing
   1798  1.145     rmind 	 * interface has been set as a multicast option, use the
   1799  1.145     rmind 	 * address of that interface as our source address.
   1800  1.145     rmind 	 */
   1801  1.145     rmind 	if (IN_MULTICAST(sin->sin_addr.s_addr) && mopts != NULL) {
   1802  1.145     rmind 		struct ip_moptions *imo;
   1803  1.145     rmind 
   1804  1.145     rmind 		imo = mopts;
   1805  1.167     ozaki 		if (imo->imo_multicast_if_index != 0) {
   1806  1.167     ozaki 			struct ifnet *ifp;
   1807  1.178     ozaki 			int s;
   1808  1.167     ozaki 
   1809  1.178     ozaki 			if (ia != NULL)
   1810  1.178     ozaki 				ia4_release(ia, psref);
   1811  1.178     ozaki 			s = pserialize_read_enter();
   1812  1.167     ozaki 			ifp = if_byindex(imo->imo_multicast_if_index);
   1813  1.167     ozaki 			if (ifp != NULL) {
   1814  1.178     ozaki 				/* XXX */
   1815  1.178     ozaki 				ia = in_get_ia_from_ifp_psref(ifp, psref);
   1816  1.167     ozaki 			} else
   1817  1.167     ozaki 				ia = NULL;
   1818  1.167     ozaki 			if (ia == NULL || ia->ia4_flags & IN_IFF_NOTREADY) {
   1819  1.167     ozaki 				pserialize_read_exit(s);
   1820  1.178     ozaki 				if (ia != NULL)
   1821  1.178     ozaki 					ia4_release(ia, psref);
   1822  1.145     rmind 				*errorp = EADDRNOTAVAIL;
   1823  1.190     ozaki 				ia = NULL;
   1824  1.190     ozaki 				goto out;
   1825  1.145     rmind 			}
   1826  1.167     ozaki 			pserialize_read_exit(s);
   1827  1.145     rmind 		}
   1828  1.145     rmind 	}
   1829  1.145     rmind 	if (ia->ia_ifa.ifa_getifa != NULL) {
   1830  1.145     rmind 		ia = ifatoia((*ia->ia_ifa.ifa_getifa)(&ia->ia_ifa,
   1831  1.145     rmind 		                                      sintosa(sin)));
   1832  1.152       roy 		if (ia == NULL) {
   1833  1.152       roy 			*errorp = EADDRNOTAVAIL;
   1834  1.190     ozaki 			goto out;
   1835  1.152       roy 		}
   1836  1.178     ozaki 		/* FIXME NOMPSAFE */
   1837  1.178     ozaki 		ia4_acquire(ia, psref);
   1838  1.145     rmind 	}
   1839  1.145     rmind #ifdef GETIFA_DEBUG
   1840  1.145     rmind 	else
   1841  1.145     rmind 		printf("%s: missing ifa_getifa\n", __func__);
   1842  1.145     rmind #endif
   1843  1.190     ozaki out:
   1844  1.190     ozaki 	rtcache_unref(rt, ro);
   1845  1.178     ozaki 	return ia;
   1846  1.145     rmind }
   1847  1.145     rmind 
   1848  1.163     ozaki #if NARP > 0
   1849  1.161     ozaki 
   1850  1.158     ozaki struct in_llentry {
   1851  1.158     ozaki 	struct llentry		base;
   1852  1.158     ozaki };
   1853  1.158     ozaki 
   1854  1.158     ozaki #define	IN_LLTBL_DEFAULT_HSIZE	32
   1855  1.158     ozaki #define	IN_LLTBL_HASH(k, h) \
   1856  1.158     ozaki 	(((((((k >> 8) ^ k) >> 8) ^ k) >> 8) ^ k) & ((h) - 1))
   1857  1.158     ozaki 
   1858  1.158     ozaki /*
   1859  1.158     ozaki  * Do actual deallocation of @lle.
   1860  1.158     ozaki  * Called by LLE_FREE_LOCKED when number of references
   1861  1.158     ozaki  * drops to zero.
   1862  1.158     ozaki  */
   1863  1.158     ozaki static void
   1864  1.158     ozaki in_lltable_destroy_lle(struct llentry *lle)
   1865  1.158     ozaki {
   1866  1.158     ozaki 
   1867  1.158     ozaki 	LLE_WUNLOCK(lle);
   1868  1.158     ozaki 	LLE_LOCK_DESTROY(lle);
   1869  1.158     ozaki 	kmem_intr_free(lle, sizeof(*lle));
   1870  1.158     ozaki }
   1871  1.158     ozaki 
   1872  1.158     ozaki static struct llentry *
   1873  1.158     ozaki in_lltable_new(struct in_addr addr4, u_int flags)
   1874  1.158     ozaki {
   1875  1.158     ozaki 	struct in_llentry *lle;
   1876  1.158     ozaki 
   1877  1.158     ozaki 	lle = kmem_intr_zalloc(sizeof(*lle), KM_NOSLEEP);
   1878  1.158     ozaki 	if (lle == NULL)		/* NB: caller generates msg */
   1879  1.158     ozaki 		return NULL;
   1880  1.158     ozaki 
   1881  1.158     ozaki 	/*
   1882  1.158     ozaki 	 * For IPv4 this will trigger "arpresolve" to generate
   1883  1.158     ozaki 	 * an ARP request.
   1884  1.158     ozaki 	 */
   1885  1.158     ozaki 	lle->base.la_expire = time_uptime; /* mark expired */
   1886  1.158     ozaki 	lle->base.r_l3addr.addr4 = addr4;
   1887  1.158     ozaki 	lle->base.lle_refcnt = 1;
   1888  1.158     ozaki 	lle->base.lle_free = in_lltable_destroy_lle;
   1889  1.158     ozaki 	LLE_LOCK_INIT(&lle->base);
   1890  1.159     ozaki 	callout_init(&lle->base.la_timer, CALLOUT_MPSAFE);
   1891  1.158     ozaki 
   1892  1.158     ozaki 	return (&lle->base);
   1893  1.158     ozaki }
   1894  1.158     ozaki 
   1895  1.158     ozaki #define IN_ARE_MASKED_ADDR_EQUAL(d, a, m)	(			\
   1896  1.158     ozaki 	    (((ntohl((d).s_addr) ^ (a)->sin_addr.s_addr) & (m)->sin_addr.s_addr)) == 0 )
   1897  1.158     ozaki 
   1898  1.158     ozaki static int
   1899  1.158     ozaki in_lltable_match_prefix(const struct sockaddr *prefix,
   1900  1.158     ozaki     const struct sockaddr *mask, u_int flags, struct llentry *lle)
   1901  1.158     ozaki {
   1902  1.158     ozaki 	const struct sockaddr_in *pfx = (const struct sockaddr_in *)prefix;
   1903  1.158     ozaki 	const struct sockaddr_in *msk = (const struct sockaddr_in *)mask;
   1904  1.158     ozaki 
   1905  1.158     ozaki 	/*
   1906  1.158     ozaki 	 * (flags & LLE_STATIC) means deleting all entries
   1907  1.158     ozaki 	 * including static ARP entries.
   1908  1.158     ozaki 	 */
   1909  1.158     ozaki 	if (IN_ARE_MASKED_ADDR_EQUAL(lle->r_l3addr.addr4, pfx, msk) &&
   1910  1.158     ozaki 	    ((flags & LLE_STATIC) || !(lle->la_flags & LLE_STATIC)))
   1911  1.158     ozaki 		return (1);
   1912  1.158     ozaki 
   1913  1.158     ozaki 	return (0);
   1914  1.158     ozaki }
   1915  1.158     ozaki 
   1916  1.158     ozaki static void
   1917  1.158     ozaki in_lltable_free_entry(struct lltable *llt, struct llentry *lle)
   1918  1.158     ozaki {
   1919  1.160     ozaki 	struct ifnet *ifp __diagused;
   1920  1.158     ozaki 	size_t pkts_dropped;
   1921  1.158     ozaki 
   1922  1.158     ozaki 	LLE_WLOCK_ASSERT(lle);
   1923  1.158     ozaki 	KASSERT(llt != NULL);
   1924  1.158     ozaki 
   1925  1.158     ozaki 	/* Unlink entry from table if not already */
   1926  1.158     ozaki 	if ((lle->la_flags & LLE_LINKED) != 0) {
   1927  1.158     ozaki 		ifp = llt->llt_ifp;
   1928  1.158     ozaki 		IF_AFDATA_WLOCK_ASSERT(ifp);
   1929  1.158     ozaki 		lltable_unlink_entry(llt, lle);
   1930  1.158     ozaki 	}
   1931  1.158     ozaki 
   1932  1.158     ozaki 	/* cancel timer */
   1933  1.164     ozaki 	if (callout_halt(&lle->lle_timer, &lle->lle_lock))
   1934  1.158     ozaki 		LLE_REMREF(lle);
   1935  1.158     ozaki 
   1936  1.158     ozaki 	/* Drop hold queue */
   1937  1.158     ozaki 	pkts_dropped = llentry_free(lle);
   1938  1.159     ozaki 	arp_stat_add(ARP_STAT_DFRDROPPED, (uint64_t)pkts_dropped);
   1939  1.158     ozaki }
   1940  1.158     ozaki 
   1941  1.158     ozaki static int
   1942  1.158     ozaki in_lltable_rtcheck(struct ifnet *ifp, u_int flags, const struct sockaddr *l3addr)
   1943  1.158     ozaki {
   1944  1.158     ozaki 	struct rtentry *rt;
   1945  1.158     ozaki 	int error = EINVAL;
   1946  1.158     ozaki 
   1947  1.158     ozaki 	KASSERTMSG(l3addr->sa_family == AF_INET,
   1948  1.158     ozaki 	    "sin_family %d", l3addr->sa_family);
   1949  1.158     ozaki 
   1950  1.158     ozaki 	rt = rtalloc1(l3addr, 0);
   1951  1.158     ozaki 	if (rt == NULL)
   1952  1.158     ozaki 		return error;
   1953  1.158     ozaki 
   1954  1.158     ozaki 	/*
   1955  1.158     ozaki 	 * If the gateway for an existing host route matches the target L3
   1956  1.158     ozaki 	 * address, which is a special route inserted by some implementation
   1957  1.158     ozaki 	 * such as MANET, and the interface is of the correct type, then
   1958  1.158     ozaki 	 * allow for ARP to proceed.
   1959  1.158     ozaki 	 */
   1960  1.158     ozaki 	if (rt->rt_flags & RTF_GATEWAY) {
   1961  1.158     ozaki 		if (!(rt->rt_flags & RTF_HOST) || !rt->rt_ifp ||
   1962  1.158     ozaki 		    rt->rt_ifp->if_type != IFT_ETHER ||
   1963  1.158     ozaki #ifdef __FreeBSD__
   1964  1.158     ozaki 		    (rt->rt_ifp->if_flags & (IFF_NOARP | IFF_STATICARP)) != 0 ||
   1965  1.159     ozaki #else
   1966  1.158     ozaki 		    (rt->rt_ifp->if_flags & IFF_NOARP) != 0 ||
   1967  1.158     ozaki #endif
   1968  1.158     ozaki 		    memcmp(rt->rt_gateway->sa_data, l3addr->sa_data,
   1969  1.158     ozaki 		    sizeof(in_addr_t)) != 0) {
   1970  1.158     ozaki 			goto error;
   1971  1.158     ozaki 		}
   1972  1.158     ozaki 	}
   1973  1.158     ozaki 
   1974  1.158     ozaki 	/*
   1975  1.158     ozaki 	 * Make sure that at least the destination address is covered
   1976  1.158     ozaki 	 * by the route. This is for handling the case where 2 or more
   1977  1.158     ozaki 	 * interfaces have the same prefix. An incoming packet arrives
   1978  1.158     ozaki 	 * on one interface and the corresponding outgoing packet leaves
   1979  1.158     ozaki 	 * another interface.
   1980  1.158     ozaki 	 */
   1981  1.158     ozaki 	if (!(rt->rt_flags & RTF_HOST) && rt->rt_ifp != ifp) {
   1982  1.158     ozaki 		const char *sa, *mask, *addr, *lim;
   1983  1.158     ozaki 		int len;
   1984  1.158     ozaki 
   1985  1.158     ozaki 		mask = (const char *)rt_mask(rt);
   1986  1.158     ozaki 		/*
   1987  1.158     ozaki 		 * Just being extra cautious to avoid some custom
   1988  1.158     ozaki 		 * code getting into trouble.
   1989  1.158     ozaki 		 */
   1990  1.158     ozaki 		if (mask == NULL)
   1991  1.158     ozaki 			goto error;
   1992  1.158     ozaki 
   1993  1.158     ozaki 		sa = (const char *)rt_getkey(rt);
   1994  1.158     ozaki 		addr = (const char *)l3addr;
   1995  1.158     ozaki 		len = ((const struct sockaddr_in *)l3addr)->sin_len;
   1996  1.158     ozaki 		lim = addr + len;
   1997  1.158     ozaki 
   1998  1.158     ozaki 		for ( ; addr < lim; sa++, mask++, addr++) {
   1999  1.158     ozaki 			if ((*sa ^ *addr) & *mask) {
   2000  1.158     ozaki #ifdef DIAGNOSTIC
   2001  1.158     ozaki 				log(LOG_INFO, "IPv4 address: \"%s\" is not on the network\n",
   2002  1.158     ozaki 				    inet_ntoa(((const struct sockaddr_in *)l3addr)->sin_addr));
   2003  1.158     ozaki #endif
   2004  1.158     ozaki 				goto error;
   2005  1.158     ozaki 			}
   2006  1.158     ozaki 		}
   2007  1.158     ozaki 	}
   2008  1.158     ozaki 
   2009  1.158     ozaki 	error = 0;
   2010  1.158     ozaki error:
   2011  1.191     ozaki 	rt_unref(rt);
   2012  1.158     ozaki 	return error;
   2013  1.158     ozaki }
   2014  1.158     ozaki 
   2015  1.158     ozaki static inline uint32_t
   2016  1.158     ozaki in_lltable_hash_dst(const struct in_addr dst, uint32_t hsize)
   2017  1.158     ozaki {
   2018  1.158     ozaki 
   2019  1.158     ozaki 	return (IN_LLTBL_HASH(dst.s_addr, hsize));
   2020  1.158     ozaki }
   2021  1.158     ozaki 
   2022  1.158     ozaki static uint32_t
   2023  1.158     ozaki in_lltable_hash(const struct llentry *lle, uint32_t hsize)
   2024  1.158     ozaki {
   2025  1.158     ozaki 
   2026  1.158     ozaki 	return (in_lltable_hash_dst(lle->r_l3addr.addr4, hsize));
   2027  1.158     ozaki }
   2028  1.158     ozaki 
   2029  1.158     ozaki static void
   2030  1.158     ozaki in_lltable_fill_sa_entry(const struct llentry *lle, struct sockaddr *sa)
   2031  1.158     ozaki {
   2032  1.158     ozaki 	struct sockaddr_in *sin;
   2033  1.158     ozaki 
   2034  1.158     ozaki 	sin = (struct sockaddr_in *)sa;
   2035  1.158     ozaki 	memset(sin, 0, sizeof(*sin));
   2036  1.158     ozaki 	sin->sin_family = AF_INET;
   2037  1.158     ozaki 	sin->sin_len = sizeof(*sin);
   2038  1.158     ozaki 	sin->sin_addr = lle->r_l3addr.addr4;
   2039  1.158     ozaki }
   2040  1.158     ozaki 
   2041  1.158     ozaki static inline struct llentry *
   2042  1.158     ozaki in_lltable_find_dst(struct lltable *llt, struct in_addr dst)
   2043  1.158     ozaki {
   2044  1.158     ozaki 	struct llentry *lle;
   2045  1.158     ozaki 	struct llentries *lleh;
   2046  1.158     ozaki 	u_int hashidx;
   2047  1.158     ozaki 
   2048  1.158     ozaki 	hashidx = in_lltable_hash_dst(dst, llt->llt_hsize);
   2049  1.158     ozaki 	lleh = &llt->lle_head[hashidx];
   2050  1.158     ozaki 	LIST_FOREACH(lle, lleh, lle_next) {
   2051  1.158     ozaki 		if (lle->la_flags & LLE_DELETED)
   2052  1.158     ozaki 			continue;
   2053  1.158     ozaki 		if (lle->r_l3addr.addr4.s_addr == dst.s_addr)
   2054  1.158     ozaki 			break;
   2055  1.158     ozaki 	}
   2056  1.158     ozaki 
   2057  1.158     ozaki 	return (lle);
   2058  1.158     ozaki }
   2059  1.158     ozaki 
   2060  1.158     ozaki static int
   2061  1.158     ozaki in_lltable_delete(struct lltable *llt, u_int flags,
   2062  1.158     ozaki     const struct sockaddr *l3addr)
   2063  1.158     ozaki {
   2064  1.158     ozaki 	const struct sockaddr_in *sin = (const struct sockaddr_in *)l3addr;
   2065  1.160     ozaki 	struct ifnet *ifp __diagused = llt->llt_ifp;
   2066  1.158     ozaki 	struct llentry *lle;
   2067  1.158     ozaki 
   2068  1.158     ozaki 	IF_AFDATA_WLOCK_ASSERT(ifp);
   2069  1.158     ozaki 	KASSERTMSG(l3addr->sa_family == AF_INET,
   2070  1.158     ozaki 	    "sin_family %d", l3addr->sa_family);
   2071  1.158     ozaki 
   2072  1.158     ozaki 	lle = in_lltable_find_dst(llt, sin->sin_addr);
   2073  1.158     ozaki 	if (lle == NULL) {
   2074  1.158     ozaki #ifdef DIAGNOSTIC
   2075  1.158     ozaki 		log(LOG_INFO, "interface address is missing from cache = %p  in delete\n", lle);
   2076  1.158     ozaki #endif
   2077  1.158     ozaki 		return (ENOENT);
   2078  1.158     ozaki 	}
   2079  1.158     ozaki 
   2080  1.165     ozaki 	LLE_WLOCK(lle);
   2081  1.165     ozaki 	lle->la_flags |= LLE_DELETED;
   2082  1.158     ozaki #ifdef DIAGNOSTIC
   2083  1.165     ozaki 	log(LOG_INFO, "ifaddr cache = %p is deleted\n", lle);
   2084  1.158     ozaki #endif
   2085  1.165     ozaki 	if ((lle->la_flags & (LLE_STATIC | LLE_IFADDR)) == LLE_STATIC)
   2086  1.165     ozaki 		llentry_free(lle);
   2087  1.165     ozaki 	else
   2088  1.165     ozaki 		LLE_WUNLOCK(lle);
   2089  1.158     ozaki 
   2090  1.158     ozaki 	return (0);
   2091  1.158     ozaki }
   2092  1.158     ozaki 
   2093  1.158     ozaki static struct llentry *
   2094  1.158     ozaki in_lltable_create(struct lltable *llt, u_int flags, const struct sockaddr *l3addr)
   2095  1.158     ozaki {
   2096  1.158     ozaki 	const struct sockaddr_in *sin = (const struct sockaddr_in *)l3addr;
   2097  1.158     ozaki 	struct ifnet *ifp = llt->llt_ifp;
   2098  1.158     ozaki 	struct llentry *lle;
   2099  1.158     ozaki 
   2100  1.158     ozaki 	IF_AFDATA_WLOCK_ASSERT(ifp);
   2101  1.158     ozaki 	KASSERTMSG(l3addr->sa_family == AF_INET,
   2102  1.158     ozaki 	    "sin_family %d", l3addr->sa_family);
   2103  1.158     ozaki 
   2104  1.158     ozaki 	lle = in_lltable_find_dst(llt, sin->sin_addr);
   2105  1.158     ozaki 
   2106  1.158     ozaki 	if (lle != NULL) {
   2107  1.158     ozaki 		LLE_WLOCK(lle);
   2108  1.158     ozaki 		return (lle);
   2109  1.158     ozaki 	}
   2110  1.158     ozaki 
   2111  1.158     ozaki 	/* no existing record, we need to create new one */
   2112  1.158     ozaki 
   2113  1.158     ozaki 	/*
   2114  1.158     ozaki 	 * A route that covers the given address must have
   2115  1.158     ozaki 	 * been installed 1st because we are doing a resolution,
   2116  1.158     ozaki 	 * verify this.
   2117  1.158     ozaki 	 */
   2118  1.158     ozaki 	if (!(flags & LLE_IFADDR) &&
   2119  1.158     ozaki 	    in_lltable_rtcheck(ifp, flags, l3addr) != 0)
   2120  1.158     ozaki 		return (NULL);
   2121  1.158     ozaki 
   2122  1.158     ozaki 	lle = in_lltable_new(sin->sin_addr, flags);
   2123  1.158     ozaki 	if (lle == NULL) {
   2124  1.158     ozaki 		log(LOG_INFO, "lla_lookup: new lle malloc failed\n");
   2125  1.158     ozaki 		return (NULL);
   2126  1.158     ozaki 	}
   2127  1.158     ozaki 	lle->la_flags = flags;
   2128  1.158     ozaki 	if ((flags & LLE_IFADDR) == LLE_IFADDR) {
   2129  1.158     ozaki 		memcpy(&lle->ll_addr, CLLADDR(ifp->if_sadl), ifp->if_addrlen);
   2130  1.158     ozaki 		lle->la_flags |= (LLE_VALID | LLE_STATIC);
   2131  1.158     ozaki 	}
   2132  1.158     ozaki 
   2133  1.158     ozaki 	lltable_link_entry(llt, lle);
   2134  1.158     ozaki 	LLE_WLOCK(lle);
   2135  1.158     ozaki 
   2136  1.158     ozaki 	return (lle);
   2137  1.158     ozaki }
   2138  1.158     ozaki 
   2139  1.158     ozaki /*
   2140  1.158     ozaki  * Return NULL if not found or marked for deletion.
   2141  1.158     ozaki  * If found return lle read locked.
   2142  1.158     ozaki  */
   2143  1.158     ozaki static struct llentry *
   2144  1.158     ozaki in_lltable_lookup(struct lltable *llt, u_int flags, const struct sockaddr *l3addr)
   2145  1.158     ozaki {
   2146  1.158     ozaki 	const struct sockaddr_in *sin = (const struct sockaddr_in *)l3addr;
   2147  1.158     ozaki 	struct llentry *lle;
   2148  1.158     ozaki 
   2149  1.158     ozaki 	IF_AFDATA_LOCK_ASSERT(llt->llt_ifp);
   2150  1.158     ozaki 	KASSERTMSG(l3addr->sa_family == AF_INET,
   2151  1.158     ozaki 	    "sin_family %d", l3addr->sa_family);
   2152  1.158     ozaki 
   2153  1.158     ozaki 	lle = in_lltable_find_dst(llt, sin->sin_addr);
   2154  1.158     ozaki 
   2155  1.158     ozaki 	if (lle == NULL)
   2156  1.158     ozaki 		return NULL;
   2157  1.158     ozaki 
   2158  1.158     ozaki 	if (flags & LLE_EXCLUSIVE)
   2159  1.158     ozaki 		LLE_WLOCK(lle);
   2160  1.158     ozaki 	else
   2161  1.158     ozaki 		LLE_RLOCK(lle);
   2162  1.158     ozaki 
   2163  1.158     ozaki 	return lle;
   2164  1.158     ozaki }
   2165  1.158     ozaki 
   2166  1.165     ozaki static int
   2167  1.165     ozaki in_lltable_dump_entry(struct lltable *llt, struct llentry *lle,
   2168  1.165     ozaki     struct rt_walkarg *w)
   2169  1.165     ozaki {
   2170  1.165     ozaki 	struct sockaddr_in sin;
   2171  1.165     ozaki 
   2172  1.165     ozaki 	LLTABLE_LOCK_ASSERT();
   2173  1.165     ozaki 
   2174  1.165     ozaki 	/* skip deleted entries */
   2175  1.165     ozaki 	if (lle->la_flags & LLE_DELETED)
   2176  1.165     ozaki 		return 0;
   2177  1.165     ozaki 
   2178  1.165     ozaki 	sockaddr_in_init(&sin, &lle->r_l3addr.addr4, 0);
   2179  1.165     ozaki 
   2180  1.165     ozaki 	return lltable_dump_entry(llt, lle, w, sintosa(&sin));
   2181  1.165     ozaki }
   2182  1.165     ozaki 
   2183  1.163     ozaki #endif /* NARP > 0 */
   2184  1.161     ozaki 
   2185  1.175  christos static int
   2186  1.175  christos in_multicast_sysctl(SYSCTLFN_ARGS)
   2187  1.175  christos {
   2188  1.175  christos 	struct ifnet *ifp;
   2189  1.175  christos 	struct ifaddr *ifa;
   2190  1.175  christos 	struct in_ifaddr *ifa4;
   2191  1.175  christos 	struct in_multi *inm;
   2192  1.175  christos 	uint32_t tmp;
   2193  1.175  christos 	int error;
   2194  1.175  christos 	size_t written;
   2195  1.175  christos 	struct psref psref;
   2196  1.175  christos 	int bound;
   2197  1.175  christos 
   2198  1.175  christos 	if (namelen != 1)
   2199  1.175  christos 		return EINVAL;
   2200  1.175  christos 
   2201  1.175  christos 	bound = curlwp_bind();
   2202  1.175  christos 	ifp = if_get_byindex(name[0], &psref);
   2203  1.175  christos 	if (ifp == NULL) {
   2204  1.175  christos 		curlwp_bindx(bound);
   2205  1.175  christos 		return ENODEV;
   2206  1.175  christos 	}
   2207  1.175  christos 
   2208  1.175  christos 	if (oldp == NULL) {
   2209  1.175  christos 		*oldlenp = 0;
   2210  1.175  christos 		IFADDR_FOREACH(ifa, ifp) {
   2211  1.175  christos 			if (ifa->ifa_addr->sa_family != AF_INET)
   2212  1.175  christos 				continue;
   2213  1.175  christos 			ifa4 = (void *)ifa;
   2214  1.175  christos 			LIST_FOREACH(inm, &ifa4->ia_multiaddrs, inm_list) {
   2215  1.175  christos 				*oldlenp += 2 * sizeof(struct in_addr) +
   2216  1.175  christos 				    sizeof(uint32_t);
   2217  1.175  christos 			}
   2218  1.175  christos 		}
   2219  1.175  christos 		if_put(ifp, &psref);
   2220  1.175  christos 		curlwp_bindx(bound);
   2221  1.175  christos 		return 0;
   2222  1.175  christos 	}
   2223  1.175  christos 
   2224  1.175  christos 	error = 0;
   2225  1.175  christos 	written = 0;
   2226  1.175  christos 	IFADDR_FOREACH(ifa, ifp) {
   2227  1.175  christos 		if (ifa->ifa_addr->sa_family != AF_INET)
   2228  1.175  christos 			continue;
   2229  1.175  christos 		ifa4 = (void *)ifa;
   2230  1.175  christos 		LIST_FOREACH(inm, &ifa4->ia_multiaddrs, inm_list) {
   2231  1.175  christos 			if (written + 2 * sizeof(struct in_addr) +
   2232  1.175  christos 			    sizeof(uint32_t) > *oldlenp)
   2233  1.175  christos 				goto done;
   2234  1.175  christos 			error = sysctl_copyout(l, &ifa4->ia_addr.sin_addr,
   2235  1.175  christos 			    oldp, sizeof(struct in_addr));
   2236  1.175  christos 			if (error)
   2237  1.175  christos 				goto done;
   2238  1.175  christos 			oldp = (char *)oldp + sizeof(struct in_addr);
   2239  1.175  christos 			written += sizeof(struct in_addr);
   2240  1.175  christos 			error = sysctl_copyout(l, &inm->inm_addr,
   2241  1.175  christos 			    oldp, sizeof(struct in_addr));
   2242  1.175  christos 			if (error)
   2243  1.175  christos 				goto done;
   2244  1.175  christos 			oldp = (char *)oldp + sizeof(struct in_addr);
   2245  1.175  christos 			written += sizeof(struct in_addr);
   2246  1.175  christos 			tmp = inm->inm_refcount;
   2247  1.175  christos 			error = sysctl_copyout(l, &tmp, oldp, sizeof(tmp));
   2248  1.175  christos 			if (error)
   2249  1.175  christos 				goto done;
   2250  1.175  christos 			oldp = (char *)oldp + sizeof(tmp);
   2251  1.175  christos 			written += sizeof(tmp);
   2252  1.175  christos 		}
   2253  1.175  christos 	}
   2254  1.175  christos done:
   2255  1.175  christos 	if_put(ifp, &psref);
   2256  1.175  christos 	curlwp_bindx(bound);
   2257  1.175  christos 	*oldlenp = written;
   2258  1.175  christos 	return error;
   2259  1.175  christos }
   2260  1.175  christos 
   2261  1.145     rmind static void
   2262  1.145     rmind in_sysctl_init(struct sysctllog **clog)
   2263  1.145     rmind {
   2264  1.145     rmind 	sysctl_createv(clog, 0, NULL, NULL,
   2265  1.145     rmind 		       CTLFLAG_PERMANENT,
   2266  1.145     rmind 		       CTLTYPE_NODE, "inet",
   2267  1.145     rmind 		       SYSCTL_DESCR("PF_INET related settings"),
   2268  1.145     rmind 		       NULL, 0, NULL, 0,
   2269  1.145     rmind 		       CTL_NET, PF_INET, CTL_EOL);
   2270  1.145     rmind 	sysctl_createv(clog, 0, NULL, NULL,
   2271  1.145     rmind 		       CTLFLAG_PERMANENT,
   2272  1.175  christos 		       CTLTYPE_NODE, "multicast",
   2273  1.175  christos 		       SYSCTL_DESCR("Multicast information"),
   2274  1.175  christos 		       in_multicast_sysctl, 0, NULL, 0,
   2275  1.175  christos 		       CTL_NET, PF_INET, CTL_CREATE, CTL_EOL);
   2276  1.175  christos 	sysctl_createv(clog, 0, NULL, NULL,
   2277  1.175  christos 		       CTLFLAG_PERMANENT,
   2278  1.145     rmind 		       CTLTYPE_NODE, "ip",
   2279  1.145     rmind 		       SYSCTL_DESCR("IPv4 related settings"),
   2280  1.145     rmind 		       NULL, 0, NULL, 0,
   2281  1.145     rmind 		       CTL_NET, PF_INET, IPPROTO_IP, CTL_EOL);
   2282  1.145     rmind 
   2283  1.145     rmind 	sysctl_createv(clog, 0, NULL, NULL,
   2284  1.145     rmind 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   2285  1.145     rmind 		       CTLTYPE_INT, "subnetsarelocal",
   2286  1.145     rmind 		       SYSCTL_DESCR("Whether logical subnets are considered "
   2287  1.145     rmind 				    "local"),
   2288  1.145     rmind 		       NULL, 0, &subnetsarelocal, 0,
   2289  1.145     rmind 		       CTL_NET, PF_INET, IPPROTO_IP,
   2290  1.145     rmind 		       IPCTL_SUBNETSARELOCAL, CTL_EOL);
   2291  1.145     rmind 	sysctl_createv(clog, 0, NULL, NULL,
   2292  1.145     rmind 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   2293  1.145     rmind 		       CTLTYPE_INT, "hostzerobroadcast",
   2294  1.145     rmind 		       SYSCTL_DESCR("All zeroes address is broadcast address"),
   2295  1.145     rmind 		       NULL, 0, &hostzeroisbroadcast, 0,
   2296  1.145     rmind 		       CTL_NET, PF_INET, IPPROTO_IP,
   2297  1.145     rmind 		       IPCTL_HOSTZEROBROADCAST, CTL_EOL);
   2298  1.145     rmind }
   2299  1.158     ozaki 
   2300  1.163     ozaki #if NARP > 0
   2301  1.163     ozaki 
   2302  1.158     ozaki static struct lltable *
   2303  1.158     ozaki in_lltattach(struct ifnet *ifp)
   2304  1.158     ozaki {
   2305  1.158     ozaki 	struct lltable *llt;
   2306  1.158     ozaki 
   2307  1.158     ozaki 	llt = lltable_allocate_htbl(IN_LLTBL_DEFAULT_HSIZE);
   2308  1.158     ozaki 	llt->llt_af = AF_INET;
   2309  1.158     ozaki 	llt->llt_ifp = ifp;
   2310  1.158     ozaki 
   2311  1.158     ozaki 	llt->llt_lookup = in_lltable_lookup;
   2312  1.158     ozaki 	llt->llt_create = in_lltable_create;
   2313  1.158     ozaki 	llt->llt_delete = in_lltable_delete;
   2314  1.158     ozaki 	llt->llt_dump_entry = in_lltable_dump_entry;
   2315  1.158     ozaki 	llt->llt_hash = in_lltable_hash;
   2316  1.158     ozaki 	llt->llt_fill_sa_entry = in_lltable_fill_sa_entry;
   2317  1.158     ozaki 	llt->llt_free_entry = in_lltable_free_entry;
   2318  1.158     ozaki 	llt->llt_match_prefix = in_lltable_match_prefix;
   2319  1.158     ozaki 	lltable_link(llt);
   2320  1.158     ozaki 
   2321  1.158     ozaki 	return (llt);
   2322  1.158     ozaki }
   2323  1.163     ozaki 
   2324  1.163     ozaki #endif /* NARP > 0 */
   2325  1.158     ozaki 
   2326  1.158     ozaki void *
   2327  1.158     ozaki in_domifattach(struct ifnet *ifp)
   2328  1.158     ozaki {
   2329  1.158     ozaki 	struct in_ifinfo *ii;
   2330  1.158     ozaki 
   2331  1.158     ozaki 	ii = kmem_zalloc(sizeof(struct in_ifinfo), KM_SLEEP);
   2332  1.158     ozaki 	KASSERT(ii != NULL);
   2333  1.158     ozaki 
   2334  1.163     ozaki #if NARP > 0
   2335  1.158     ozaki 	ii->ii_llt = in_lltattach(ifp);
   2336  1.161     ozaki #endif
   2337  1.158     ozaki 
   2338  1.158     ozaki #ifdef IPSELSRC
   2339  1.158     ozaki 	ii->ii_selsrc = in_selsrc_domifattach(ifp);
   2340  1.158     ozaki 	KASSERT(ii->ii_selsrc != NULL);
   2341  1.158     ozaki #endif
   2342  1.158     ozaki 
   2343  1.158     ozaki 	return ii;
   2344  1.158     ozaki }
   2345  1.158     ozaki 
   2346  1.158     ozaki void
   2347  1.158     ozaki in_domifdetach(struct ifnet *ifp, void *aux)
   2348  1.158     ozaki {
   2349  1.158     ozaki 	struct in_ifinfo *ii = aux;
   2350  1.158     ozaki 
   2351  1.158     ozaki #ifdef IPSELSRC
   2352  1.158     ozaki 	in_selsrc_domifdetach(ifp, ii->ii_selsrc);
   2353  1.158     ozaki #endif
   2354  1.163     ozaki #if NARP > 0
   2355  1.158     ozaki 	lltable_free(ii->ii_llt);
   2356  1.161     ozaki #endif
   2357  1.158     ozaki 	kmem_free(ii, sizeof(struct in_ifinfo));
   2358  1.158     ozaki }
   2359