2 * Copyright (c) 1994, 2010, Oracle and/or its affiliates. All rights reserved.
6 * Copyright (c) 1988, 1991, 1993
7 * The Regents of the University of California. All rights reserved.
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3. All advertising materials mentioning features or use of this software
18 * must display the following acknowledgement:
19 * This product includes software developed by the University of
20 * California, Berkeley and its contributors.
21 * 4. Neither the name of the University nor the names of its contributors
22 * may be used to endorse or promote products derived from this software
23 * without specific prior written permission.
25 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
26 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
27 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
28 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
29 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
30 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
31 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
32 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
33 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
34 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
37 * @(#)rtsock.c 8.6 (Berkeley) 2/11/95
41 * This file contains routines that processes routing socket requests.
44 #include <sys/types.h>
45 #include <sys/stream.h>
46 #include <sys/stropts.h>
48 #include <sys/strsubr.h>
49 #include <sys/cmn_err.h>
50 #include <sys/debug.h>
51 #include <sys/policy.h>
54 #include <sys/systm.h>
55 #include <sys/param.h>
56 #include <sys/socket.h>
57 #include <sys/strsun.h>
59 #include <net/route.h>
60 #include <netinet/in.h>
61 #include <net/if_dl.h>
62 #include <netinet/ip6.h>
64 #include <inet/common.h>
67 #include <inet/ip_if.h>
68 #include <inet/ip_ire.h>
69 #include <inet/ip_ftable.h>
70 #include <inet/ip_rts.h>
72 #include <inet/ipclassifier.h>
74 #include <sys/tsol/tndb.h>
75 #include <sys/tsol/tnet.h>
77 #define RTS_MSG_SIZE(type, rtm_addrs, af, sacnt) \
78 (rts_data_msg_size(rtm_addrs, af, sacnt) + rts_header_msg_size(type))
80 static size_t rts_copyfromsockaddr(struct sockaddr
*sa
, in6_addr_t
*addrp
);
81 static void rts_fill_msg(int type
, int rtm_addrs
, ipaddr_t dst
,
82 ipaddr_t mask
, ipaddr_t gateway
, ipaddr_t src_addr
, ipaddr_t brd_addr
,
83 ipaddr_t author
, ipaddr_t ifaddr
, const ill_t
*ill
, mblk_t
*mp
,
85 static int rts_getaddrs(rt_msghdr_t
*rtm
, in6_addr_t
*dst_addrp
,
86 in6_addr_t
*gw_addrp
, in6_addr_t
*net_maskp
, in6_addr_t
*authorp
,
87 in6_addr_t
*if_addrp
, in6_addr_t
*src_addrp
, ushort_t
*indexp
,
88 sa_family_t
*afp
, tsol_rtsecattr_t
*rtsecattr
, int *error
);
89 static void rts_getifdata(if_data_t
*if_data
, const ipif_t
*ipif
);
90 static int rts_getmetrics(ire_t
*ire
, ill_t
*ill
, rt_metrics_t
*metrics
);
91 static mblk_t
*rts_rtmget(mblk_t
*mp
, ire_t
*ire
, ire_t
*ifire
,
92 const in6_addr_t
*setsrc
, tsol_ire_gw_secattr_t
*attrp
, sa_family_t af
);
93 static void rts_setmetrics(ire_t
*ire
, uint_t which
, rt_metrics_t
*metrics
);
94 static ire_t
*ire_lookup_v4(ipaddr_t dst_addr
, ipaddr_t net_mask
,
95 ipaddr_t gw_addr
, const ill_t
*ill
, zoneid_t zoneid
,
96 const ts_label_t
*tsl
, int match_flags
, ip_stack_t
*ipst
, ire_t
**pifire
,
97 ipaddr_t
*v4setsrcp
, tsol_ire_gw_secattr_t
**gwattrp
);
98 static ire_t
*ire_lookup_v6(const in6_addr_t
*dst_addr_v6
,
99 const in6_addr_t
*net_mask_v6
, const in6_addr_t
*gw_addr_v6
,
100 const ill_t
*ill
, zoneid_t zoneid
, const ts_label_t
*tsl
, int match_flags
,
101 ip_stack_t
*ipst
, ire_t
**pifire
,
102 in6_addr_t
*v6setsrcp
, tsol_ire_gw_secattr_t
**gwattrp
);
105 * Send `mp' to all eligible routing queues. A queue is ineligible if:
107 * 1. SO_USELOOPBACK is off and it is not the originating queue.
108 * 2. RTA_UNDER_IPMP is on and RTSQ_UNDER_IPMP is not set in `flags'.
109 * 3. RTA_UNDER_IPMP is off and RTSQ_NORMAL is not set in `flags'.
110 * 4. It is not the same address family as `af', and `af' isn't AF_UNSPEC.
113 rts_queue_input(mblk_t
*mp
, conn_t
*o_connp
, sa_family_t af
, uint_t flags
,
117 conn_t
*connp
, *next_connp
;
120 * Since we don't have an ill_t here, RTSQ_DEFAULT must already be
121 * resolved to one or more of RTSQ_NORMAL|RTSQ_UNDER_IPMP at this point.
123 ASSERT(!(flags
& RTSQ_DEFAULT
));
125 mutex_enter(&ipst
->ips_rts_clients
->connf_lock
);
126 connp
= ipst
->ips_rts_clients
->connf_head
;
128 for (; connp
!= NULL
; connp
= next_connp
) {
129 next_connp
= connp
->conn_next
;
131 * If there was a family specified when this routing socket was
132 * created and it doesn't match the family of the message to
133 * copy, then continue.
135 if ((connp
->conn_proto
!= AF_UNSPEC
) &&
136 (connp
->conn_proto
!= af
))
140 * Queue the message only if the conn_t and flags match.
142 if (connp
->conn_rtaware
& RTAW_UNDER_IPMP
) {
143 if (!(flags
& RTSQ_UNDER_IPMP
))
146 if (!(flags
& RTSQ_NORMAL
))
150 * For the originating queue, we only copy the message upstream
151 * if loopback is set. For others reading on the routing
152 * socket, we check if there is room upstream for a copy of the
155 if ((o_connp
== connp
) && connp
->conn_useloopback
== 0) {
156 connp
= connp
->conn_next
;
160 mutex_exit(&ipst
->ips_rts_clients
->connf_lock
);
161 /* Pass to rts_input */
162 if (IPCL_IS_NONSTR(connp
) ? !connp
->conn_flow_cntrld
:
163 canputnext(connp
->conn_rq
)) {
167 /* Note that we pass a NULL ira to rts_input */
169 (connp
->conn_recv
)(connp
, mp1
, NULL
, NULL
);
172 mutex_enter(&ipst
->ips_rts_clients
->connf_lock
);
173 /* reload next_connp since conn_next may have changed */
174 next_connp
= connp
->conn_next
;
177 mutex_exit(&ipst
->ips_rts_clients
->connf_lock
);
182 * Takes an ire and sends an ack to all the routing sockets. This
184 * - when a route is created/deleted through the ioctl interface.
185 * - when a stale redirect is deleted
188 ip_rts_rtmsg(int type
, ire_t
*ire
, int error
, ip_stack_t
*ipst
)
192 int rtm_addrs
= (RTA_DST
| RTA_NETMASK
| RTA_GATEWAY
);
194 in6_addr_t gw_addr_v6
;
198 ASSERT(ire
->ire_ipversion
== IPV4_VERSION
||
199 ire
->ire_ipversion
== IPV6_VERSION
);
201 ASSERT(!(ire
->ire_type
& IRE_IF_CLONE
));
203 if (ire
->ire_flags
& RTF_SETSRC
)
204 rtm_addrs
|= RTA_SRC
;
206 switch (ire
->ire_ipversion
) {
209 mp
= rts_alloc_msg(type
, rtm_addrs
, af
, 0);
212 rts_fill_msg(type
, rtm_addrs
, ire
->ire_addr
, ire
->ire_mask
,
213 ire
->ire_gateway_addr
, ire
->ire_setsrc_addr
, 0, 0, 0, NULL
,
218 mp
= rts_alloc_msg(type
, rtm_addrs
, af
, 0);
221 mutex_enter(&ire
->ire_lock
);
222 gw_addr_v6
= ire
->ire_gateway_addr_v6
;
223 mutex_exit(&ire
->ire_lock
);
224 rts_fill_msg_v6(type
, rtm_addrs
, &ire
->ire_addr_v6
,
225 &ire
->ire_mask_v6
, &gw_addr_v6
,
226 &ire
->ire_setsrc_addr_v6
, &ipv6_all_zeros
, &ipv6_all_zeros
,
227 &ipv6_all_zeros
, NULL
, mp
, NULL
);
230 rtm
= (rt_msghdr_t
*)mp
->b_rptr
;
231 mp
->b_wptr
= (uchar_t
*)&mp
->b_rptr
[rtm
->rtm_msglen
];
232 rtm
->rtm_addrs
= rtm_addrs
;
233 rtm
->rtm_flags
= ire
->ire_flags
;
235 rtm
->rtm_errno
= error
;
237 rtm
->rtm_flags
|= RTF_DONE
;
238 rts_queue_input(mp
, NULL
, af
, RTSQ_ALL
, ipst
);
242 * This is a call from the RTS module
243 * indicating that this is a Routing Socket
244 * Stream. Insert this conn_t in routing
245 * socket client list.
248 ip_rts_register(conn_t
*connp
)
250 ip_stack_t
*ipst
= connp
->conn_netstack
->netstack_ip
;
252 connp
->conn_useloopback
= 1;
253 ipcl_hash_insert_wildcard(ipst
->ips_rts_clients
, connp
);
257 * This is a call from the RTS module indicating that it is closing.
260 ip_rts_unregister(conn_t
*connp
)
262 ipcl_hash_remove(connp
);
266 * Processes requests received on a routing socket. It extracts all the
267 * arguments and calls the appropriate function to process the request.
269 * RTA_SRC bit flag requests are sent by 'route -setsrc'.
271 * In general, this function does not consume the message supplied but rather
272 * sends the message upstream with an appropriate UNIX errno.
275 ip_rts_request_common(mblk_t
*mp
, conn_t
*connp
, cred_t
*ioc_cr
)
277 rt_msghdr_t
*rtm
= NULL
;
278 in6_addr_t dst_addr_v6
;
279 in6_addr_t src_addr_v6
;
280 in6_addr_t gw_addr_v6
;
281 in6_addr_t net_mask_v6
;
282 in6_addr_t author_v6
;
283 in6_addr_t if_addr_v6
;
288 in6_addr_t v6setsrc
= ipv6_all_zeros
;
289 tsol_ire_gw_secattr_t
*gwattr
= NULL
;
291 int match_flags
= MATCH_IRE_DSTONLY
;
292 int match_flags_local
= MATCH_IRE_TYPE
| MATCH_IRE_GW
;
300 boolean_t gcgrp_xtraref
= B_FALSE
;
301 tsol_gcgrp_addr_t ga
;
302 tsol_rtsecattr_t rtsecattr
;
303 struct rtsa_s
*rtsap
= NULL
;
304 tsol_gcgrp_t
*gcgrp
= NULL
;
305 tsol_gc_t
*gc
= NULL
;
306 ts_label_t
*tsl
= NULL
;
311 zoneid
= connp
->conn_zoneid
;
312 ipst
= connp
->conn_netstack
->netstack_ip
;
314 if (mp
->b_cont
!= NULL
&& !pullupmsg(mp
, -1)) {
319 if ((mp
->b_wptr
- mp
->b_rptr
) < sizeof (rt_msghdr_t
)) {
326 * Check the routing message for basic consistency including the
327 * version number and that the number of octets written is the same
328 * as specified by the rtm_msglen field.
330 * At this point, an error can be delivered back via rtm_errno.
332 rtm
= (rt_msghdr_t
*)mp
->b_rptr
;
333 if ((mp
->b_wptr
- mp
->b_rptr
) != rtm
->rtm_msglen
) {
337 if (rtm
->rtm_version
!= RTM_VERSION
) {
338 error
= EPROTONOSUPPORT
;
342 /* Only allow RTM_GET or RTM_RESOLVE for unprivileged process */
343 if (rtm
->rtm_type
!= RTM_GET
&&
344 rtm
->rtm_type
!= RTM_RESOLVE
&&
346 secpolicy_ip_config(ioc_cr
, B_FALSE
) != 0)) {
351 found_addrs
= rts_getaddrs(rtm
, &dst_addr_v6
, &gw_addr_v6
, &net_mask_v6
,
352 &author_v6
, &if_addr_v6
, &src_addr_v6
, &index
, &af
, &rtsecattr
,
358 if ((found_addrs
& RTA_DST
) == 0) {
364 * Based on the address family of the destination address, determine
365 * the destination, gateway and netmask and return the appropriate error
366 * if an unknown address family was specified (following the errno
367 * values that 4.4BSD-Lite2 returns.)
371 IN6_V4MAPPED_TO_IPADDR(&dst_addr_v6
, dst_addr
);
372 IN6_V4MAPPED_TO_IPADDR(&src_addr_v6
, src_addr
);
373 IN6_V4MAPPED_TO_IPADDR(&gw_addr_v6
, gw_addr
);
374 if (((found_addrs
& RTA_NETMASK
) == 0) ||
375 (rtm
->rtm_flags
& RTF_HOST
))
376 net_mask
= IP_HOST_MASK
;
378 IN6_V4MAPPED_TO_IPADDR(&net_mask_v6
, net_mask
);
381 if (((found_addrs
& RTA_NETMASK
) == 0) ||
382 (rtm
->rtm_flags
& RTF_HOST
))
383 net_mask_v6
= ipv6_all_ones
;
387 * These errno values are meant to be compatible with
388 * 4.4BSD-Lite2 for the given message types.
390 switch (rtm
->rtm_type
) {
397 error
= EAFNOSUPPORT
;
406 * At this point, the address family must be something known.
408 ASSERT(af
== AF_INET
|| af
== AF_INET6
);
414 ill
= ill_lookup_on_ifindex(index
, af
== AF_INET6
, ipst
);
421 * Since all interfaces in an IPMP group must be equivalent,
422 * we prevent changes to a specific underlying interface's
423 * routing configuration. However, for backward compatibility,
424 * we intepret a request to add a route on an underlying
425 * interface as a request to add a route on its IPMP interface.
427 if (IS_UNDER_IPMP(ill
)) {
428 switch (rtm
->rtm_type
) {
434 index
= ipmp_ill_get_ipmp_ifindex(ill
);
437 ill
= NULL
; /* already refrele'd */
445 match_flags
|= MATCH_IRE_ILL
;
447 * This provides the same zoneid as in Solaris 10
448 * that -ifp picks the zoneid from the first ipif on the ill.
449 * But it might not be useful since the first ipif will always
450 * have the same zoneid as the ill.
452 ipif
= ipif_get_next_ipif(NULL
, ill
);
454 zoneid
= ipif
->ipif_zoneid
;
460 * If a netmask was supplied in the message, then subsequent route
461 * lookups will attempt to match on the netmask as well.
463 if ((found_addrs
& RTA_NETMASK
) != 0)
464 match_flags
|= MATCH_IRE_MASK
;
467 * We only process any passed-in route security attributes for
468 * either RTM_ADD or RTM_CHANGE message; We overload them
469 * to do an RTM_GET as a different label; ignore otherwise.
471 if (rtm
->rtm_type
== RTM_ADD
|| rtm
->rtm_type
== RTM_CHANGE
||
472 rtm
->rtm_type
== RTM_GET
) {
473 ASSERT(rtsecattr
.rtsa_cnt
<= TSOL_RTSA_REQUEST_MAX
);
474 if (rtsecattr
.rtsa_cnt
> 0)
475 rtsap
= &rtsecattr
.rtsa_attr
[0];
478 switch (rtm
->rtm_type
) {
480 /* if we are adding a route, gateway is a must */
481 if ((found_addrs
& RTA_GATEWAY
) == 0) {
486 /* Multirouting does not support net routes. */
487 if ((rtm
->rtm_flags
& (RTF_MULTIRT
| RTF_HOST
)) ==
489 error
= EADDRNOTAVAIL
;
494 * Multirouting and user-specified source addresses
495 * do not support interface based routing.
496 * Assigning a source address to an interface based
497 * route is achievable by plumbing a new ipif and
498 * setting up the interface route via this ipif,
501 if (rtm
->rtm_flags
& (RTF_MULTIRT
| RTF_SETSRC
)) {
502 if ((rtm
->rtm_flags
& RTF_GATEWAY
) == 0) {
503 error
= EADDRNOTAVAIL
;
510 if (src_addr
!= INADDR_ANY
) {
514 * The RTF_SETSRC flag is present, check that
515 * the supplied src address is not the loopback
516 * address. This would produce martian packets.
518 if (src_addr
== htonl(INADDR_LOOPBACK
)) {
523 * Also check that the supplied address is a
524 * valid, local one. Only allow IFF_UP ones
526 type
= ip_type_v4(src_addr
, ipst
);
527 if (!(type
& (IRE_LOCAL
|IRE_LOOPBACK
))) {
528 error
= EADDRNOTAVAIL
;
533 * The RTF_SETSRC modifier must be associated
534 * to a non-null source address.
536 if (rtm
->rtm_flags
& RTF_SETSRC
) {
542 error
= ip_rt_add(dst_addr
, net_mask
, gw_addr
, src_addr
,
543 rtm
->rtm_flags
, ill
, &ire
, B_FALSE
,
544 rtsap
, ipst
, zoneid
);
546 ASSERT(!MUTEX_HELD(&ill
->ill_lock
));
549 if (!IN6_IS_ADDR_UNSPECIFIED(&src_addr_v6
)) {
553 * The RTF_SETSRC flag is present, check that
554 * the supplied src address is not the loopback
555 * address. This would produce martian packets.
557 if (IN6_IS_ADDR_LOOPBACK(&src_addr_v6
)) {
562 * Also check that the supplied address is a
563 * valid, local one. Only allow UP ones.
565 type
= ip_type_v6(&src_addr_v6
, ipst
);
566 if (!(type
& (IRE_LOCAL
|IRE_LOOPBACK
))) {
567 error
= EADDRNOTAVAIL
;
571 error
= ip_rt_add_v6(&dst_addr_v6
, &net_mask_v6
,
572 &gw_addr_v6
, &src_addr_v6
, rtm
->rtm_flags
,
573 ill
, &ire
, rtsap
, ipst
, zoneid
);
577 * The RTF_SETSRC modifier must be associated
578 * to a non-null source address.
580 if (rtm
->rtm_flags
& RTF_SETSRC
) {
584 error
= ip_rt_add_v6(&dst_addr_v6
, &net_mask_v6
,
585 &gw_addr_v6
, NULL
, rtm
->rtm_flags
,
586 ill
, &ire
, rtsap
, ipst
, zoneid
);
588 ASSERT(!MUTEX_HELD(&ill
->ill_lock
));
594 rts_setmetrics(ire
, rtm
->rtm_inits
, &rtm
->rtm_rmx
);
597 /* if we are deleting a route, gateway is a must */
598 if ((found_addrs
& RTA_GATEWAY
) == 0) {
603 * The RTF_SETSRC modifier does not make sense
604 * when deleting a route.
606 if (rtm
->rtm_flags
& RTF_SETSRC
) {
613 error
= ip_rt_delete(dst_addr
, net_mask
, gw_addr
,
614 found_addrs
, rtm
->rtm_flags
, ill
, B_FALSE
,
618 error
= ip_rt_delete_v6(&dst_addr_v6
, &net_mask_v6
,
619 &gw_addr_v6
, found_addrs
, rtm
->rtm_flags
, ill
,
627 * In the case of RTM_GET, the forwarding table should be
628 * searched recursively. Also, if a gateway was
629 * specified then the gateway address must also be matched.
631 * In the case of RTM_CHANGE, the gateway address (if supplied)
632 * is the new gateway address so matching on the gateway address
633 * is not done. This can lead to ambiguity when looking up the
634 * route to change as usually only the destination (and netmask,
635 * if supplied) is used for the lookup. However if a RTA_IFP
636 * sockaddr is also supplied, it can disambiguate which route to
637 * change provided the ambigous routes are tied to distinct
638 * ill's (or interface indices). If the routes are not tied to
639 * any particular interfaces (for example, with traditional
640 * gateway routes), then a RTA_IFP sockaddr will be of no use as
641 * it won't match any such routes.
642 * RTA_SRC is not supported for RTM_GET and RTM_CHANGE,
643 * except when RTM_CHANGE is combined to RTF_SETSRC.
645 if (((found_addrs
& RTA_SRC
) != 0) &&
646 ((rtm
->rtm_type
== RTM_GET
) ||
647 !(rtm
->rtm_flags
& RTF_SETSRC
))) {
652 if (rtm
->rtm_type
== RTM_GET
) {
653 match_flags
|= MATCH_IRE_SECATTR
;
654 match_flags_local
|= MATCH_IRE_SECATTR
;
655 if ((found_addrs
& RTA_GATEWAY
) != 0)
656 match_flags
|= MATCH_IRE_GW
;
658 tsl
= crgetlabel(ioc_cr
);
660 if (rtsa_validate(rtsap
) != 0) {
665 crgetzoneid(ioc_cr
) != GLOBAL_ZONEID
&&
666 (tsl
->tsl_doi
!= rtsap
->rtsa_doi
||
667 !bldominates(&tsl
->tsl_label
,
668 &rtsap
->rtsa_slrange
.lower_bound
))) {
673 &rtsap
->rtsa_slrange
.lower_bound
,
674 rtsap
->rtsa_doi
, KM_NOSLEEP
);
677 if (rtm
->rtm_type
== RTM_CHANGE
) {
678 if ((found_addrs
& RTA_GATEWAY
) &&
679 (rtm
->rtm_flags
& RTF_SETSRC
)) {
681 * Do not want to change the gateway,
682 * but rather the source address.
684 match_flags
|= MATCH_IRE_GW
;
689 * If the netmask is all ones (either as supplied or as derived
690 * above), then first check for an IRE_LOOPBACK or
693 * If we didn't check for or find an IRE_LOOPBACK or IRE_LOCAL
694 * entry, then look for any other type of IRE.
698 if (net_mask
== IP_HOST_MASK
) {
699 ire
= ire_ftable_lookup_v4(dst_addr
, 0, gw_addr
,
700 IRE_LOCAL
| IRE_LOOPBACK
, NULL
, zoneid
,
701 tsl
, match_flags_local
, 0, ipst
, NULL
);
704 ire
= ire_lookup_v4(dst_addr
, net_mask
,
705 gw_addr
, ill
, zoneid
, tsl
, match_flags
,
706 ipst
, &ifire
, &v4setsrc
, &gwattr
);
707 IN6_IPADDR_TO_V4MAPPED(v4setsrc
, &v6setsrc
);
711 if (IN6_ARE_ADDR_EQUAL(&net_mask_v6
, &ipv6_all_ones
)) {
712 ire
= ire_ftable_lookup_v6(&dst_addr_v6
, NULL
,
713 &gw_addr_v6
, IRE_LOCAL
| IRE_LOOPBACK
, NULL
,
714 zoneid
, tsl
, match_flags_local
, 0, ipst
,
718 ire
= ire_lookup_v6(&dst_addr_v6
,
719 &net_mask_v6
, &gw_addr_v6
, ill
, zoneid
,
720 tsl
, match_flags
, ipst
, &ifire
, &v6setsrc
,
725 if (tsl
!= NULL
&& tsl
!= crgetlabel(ioc_cr
))
733 * Want to return failure if we get an IRE_NOROUTE from
734 * ire_route_recursive
736 if (ire
->ire_type
& IRE_NOROUTE
) {
743 /* we know the IRE before we come here */
744 switch (rtm
->rtm_type
) {
746 mp1
= rts_rtmget(mp
, ire
, ifire
, &v6setsrc
, gwattr
, af
);
753 rtm
= (rt_msghdr_t
*)mp
->b_rptr
;
757 * Do not allow to the multirouting state of a route
758 * to be changed. This aims to prevent undesirable
759 * stages where both multirt and non-multirt routes
760 * for the same destination are declared.
762 if ((ire
->ire_flags
& RTF_MULTIRT
) !=
763 (rtm
->rtm_flags
& RTF_MULTIRT
)) {
768 * Note that we do not need to do
769 * ire_flush_cache_*(IRE_FLUSH_ADD) as a change
770 * in metrics or gateway will not affect existing
771 * routes since it does not create a more specific
776 if ((found_addrs
& RTA_GATEWAY
) != 0 &&
777 (ire
->ire_gateway_addr
!= gw_addr
)) {
778 ire
->ire_gateway_addr
= gw_addr
;
783 IN6_IPADDR_TO_V4MAPPED(
784 ire
->ire_gateway_addr
, &ga
.ga_addr
);
786 gcgrp
= gcgrp_lookup(&ga
, B_TRUE
);
793 if ((found_addrs
& RTA_SRC
) != 0 &&
794 (rtm
->rtm_flags
& RTF_SETSRC
) != 0 &&
795 (ire
->ire_setsrc_addr
!= src_addr
)) {
796 if (src_addr
!= INADDR_ANY
) {
800 * The RTF_SETSRC flag is
801 * present, check that the
802 * supplied src address is not
803 * the loopback address. This
804 * would produce martian
808 htonl(INADDR_LOOPBACK
)) {
813 * Also check that the
814 * supplied addr is a valid
817 type
= ip_type_v4(src_addr
,
820 (IRE_LOCAL
|IRE_LOOPBACK
))) {
821 error
= EADDRNOTAVAIL
;
824 ire
->ire_flags
|= RTF_SETSRC
;
825 ire
->ire_setsrc_addr
=
828 ire
->ire_flags
&= ~RTF_SETSRC
;
829 ire
->ire_setsrc_addr
=
833 * Let conn_ixa caching know that
834 * source address selection changed
836 ip_update_source_selection(ipst
);
838 ire_flush_cache_v4(ire
, IRE_FLUSH_GWCHANGE
);
841 mutex_enter(&ire
->ire_lock
);
842 if ((found_addrs
& RTA_GATEWAY
) != 0 &&
844 &ire
->ire_gateway_addr_v6
, &gw_addr_v6
)) {
845 ire
->ire_gateway_addr_v6
= gw_addr_v6
;
847 mutex_exit(&ire
->ire_lock
);
851 mutex_enter(&ire
->ire_lock
);
852 ga
.ga_addr
= ire
->ire_gateway_addr_v6
;
853 mutex_exit(&ire
->ire_lock
);
855 gcgrp
= gcgrp_lookup(&ga
, B_TRUE
);
862 if ((found_addrs
& RTA_SRC
) != 0 &&
863 (rtm
->rtm_flags
& RTF_SETSRC
) != 0 &&
865 &ire
->ire_setsrc_addr_v6
, &src_addr_v6
)) {
866 if (!IN6_IS_ADDR_UNSPECIFIED(
871 * The RTF_SETSRC flag is
872 * present, check that the
873 * supplied src address is not
874 * the loopback address. This
875 * would produce martian
878 if (IN6_IS_ADDR_LOOPBACK(
884 * Also check that the
885 * supplied addr is a valid
888 type
= ip_type_v6(&src_addr_v6
,
891 (IRE_LOCAL
|IRE_LOOPBACK
))) {
892 error
= EADDRNOTAVAIL
;
895 mutex_enter(&ire
->ire_lock
);
896 ire
->ire_flags
|= RTF_SETSRC
;
897 ire
->ire_setsrc_addr_v6
=
899 mutex_exit(&ire
->ire_lock
);
901 mutex_enter(&ire
->ire_lock
);
902 ire
->ire_flags
&= ~RTF_SETSRC
;
903 ire
->ire_setsrc_addr_v6
=
905 mutex_exit(&ire
->ire_lock
);
908 * Let conn_ixa caching know that
909 * source address selection changed
911 ip_update_source_selection(ipst
);
913 ire_flush_cache_v6(ire
, IRE_FLUSH_GWCHANGE
);
918 ASSERT(gcgrp
!= NULL
);
921 * Create and add the security attribute to
922 * prefix IRE; it will add a reference to the
923 * group upon allocating a new entry. If it
924 * finds an already-existing entry for the
925 * security attribute, it simply returns it
926 * and no new group reference is made.
928 gc
= gc_create(rtsap
, gcgrp
, &gcgrp_xtraref
);
930 (error
= tsol_ire_init_gwattr(ire
,
931 ire
->ire_ipversion
, gc
)) != 0) {
935 /* gc_create failed */
941 rts_setmetrics(ire
, rtm
->rtm_inits
, &rtm
->rtm_rmx
);
958 GCGRP_REFRELE(gcgrp
);
961 ASSERT(mp
->b_wptr
<= mp
->b_datap
->db_lim
);
963 rtm
->rtm_errno
= error
;
965 ip1dbg(("ip_rts_request: error %d\n", error
));
967 rtm
->rtm_flags
|= RTF_DONE
;
968 /* OK ACK already set up by caller except this */
969 ip2dbg(("ip_rts_request: OK ACK\n"));
971 rts_queue_input(mp
, connp
, af
, RTSQ_ALL
, ipst
);
977 * Helper function that can do recursive lookups including when
978 * MATCH_IRE_GW and/or MATCH_IRE_MASK is set.
981 ire_lookup_v4(ipaddr_t dst_addr
, ipaddr_t net_mask
, ipaddr_t gw_addr
,
982 const ill_t
*ill
, zoneid_t zoneid
, const ts_label_t
*tsl
,
983 int match_flags
, ip_stack_t
*ipst
, ire_t
**pifire
, ipaddr_t
*v4setsrcp
,
984 tsol_ire_gw_secattr_t
**gwattrp
)
991 *v4setsrcp
= INADDR_ANY
;
994 /* Skip IRE_IF_CLONE */
995 match_flags
|= MATCH_IRE_TYPE
;
996 ire_type
= (IRE_ONLINK
|IRE_OFFLINK
) & ~IRE_IF_CLONE
;
999 * ire_route_recursive can't match gateway or mask thus if they are
1000 * set we have to do two steps of lookups
1002 if (match_flags
& (MATCH_IRE_GW
|MATCH_IRE_MASK
)) {
1003 ire
= ire_ftable_lookup_v4(dst_addr
, net_mask
, gw_addr
,
1004 ire_type
, ill
, zoneid
, tsl
, match_flags
, 0, ipst
, NULL
);
1006 if (ire
== NULL
||(ire
->ire_flags
& (RTF_REJECT
|RTF_BLACKHOLE
)))
1009 if (ire
->ire_type
& IRE_ONLINK
)
1012 if (ire
->ire_flags
& RTF_SETSRC
) {
1013 ASSERT(ire
->ire_setsrc_addr
!= INADDR_ANY
);
1014 *v4setsrcp
= ire
->ire_setsrc_addr
;
1018 /* The first ire_gw_secattr is passed back */
1019 if (ire
->ire_gw_secattr
!= NULL
) {
1020 *gwattrp
= ire
->ire_gw_secattr
;
1024 /* Look for an interface ire recursively based on the gateway */
1025 dst_addr
= ire
->ire_gateway_addr
;
1026 match_flags
&= ~(MATCH_IRE_GW
|MATCH_IRE_MASK
);
1028 * Don't allow anything unusual past the first iteration.
1029 * After the first lookup, we should no longer look for
1030 * (IRE_LOCAL|IRE_LOOPBACK|IRE_BROADCAST) or RTF_INDIRECT
1033 * In addition, after we have found a direct IRE_OFFLINK,
1034 * we should only look for interface or clone routes.
1036 match_flags
|= MATCH_IRE_DIRECT
; /* no more RTF_INDIRECTs */
1038 if ((ire
->ire_type
& IRE_OFFLINK
) &&
1039 !(ire
->ire_flags
& RTF_INDIRECT
)) {
1040 ire_type
= IRE_IF_ALL
;
1043 * no more local, loopback, broadcast routes
1045 if (!(match_flags
& MATCH_IRE_TYPE
))
1046 ire_type
= (IRE_OFFLINK
|IRE_ONLINK
);
1047 ire_type
&= ~(IRE_LOCAL
|IRE_LOOPBACK
|IRE_BROADCAST
);
1049 match_flags
|= MATCH_IRE_TYPE
;
1051 ifire
= ire_route_recursive_v4(dst_addr
, ire_type
, ill
, zoneid
,
1052 tsl
, match_flags
, IRR_INCOMPLETE
, 0, ipst
, v4setsrcp
,
1055 ire
= ire_route_recursive_v4(dst_addr
, ire_type
, ill
, zoneid
,
1056 tsl
, match_flags
, IRR_INCOMPLETE
, 0, ipst
, v4setsrcp
,
1064 ire_lookup_v6(const in6_addr_t
*dst_addr_v6
,
1065 const in6_addr_t
*net_mask_v6
, const in6_addr_t
*gw_addr_v6
,
1066 const ill_t
*ill
, zoneid_t zoneid
, const ts_label_t
*tsl
, int match_flags
,
1067 ip_stack_t
*ipst
, ire_t
**pifire
,
1068 in6_addr_t
*v6setsrcp
, tsol_ire_gw_secattr_t
**gwattrp
)
1071 ire_t
*ifire
= NULL
;
1075 *v6setsrcp
= ipv6_all_zeros
;
1078 /* Skip IRE_IF_CLONE */
1079 match_flags
|= MATCH_IRE_TYPE
;
1080 ire_type
= (IRE_ONLINK
|IRE_OFFLINK
) & ~IRE_IF_CLONE
;
1083 * ire_route_recursive can't match gateway or mask thus if they are
1084 * set we have to do two steps of lookups
1086 if (match_flags
& (MATCH_IRE_GW
|MATCH_IRE_MASK
)) {
1089 ire
= ire_ftable_lookup_v6(dst_addr_v6
, net_mask_v6
,
1090 gw_addr_v6
, ire_type
, ill
, zoneid
, tsl
, match_flags
, 0,
1093 if (ire
== NULL
||(ire
->ire_flags
& (RTF_REJECT
|RTF_BLACKHOLE
)))
1096 if (ire
->ire_type
& IRE_ONLINK
)
1099 if (ire
->ire_flags
& RTF_SETSRC
) {
1100 ASSERT(!IN6_IS_ADDR_UNSPECIFIED(
1101 &ire
->ire_setsrc_addr_v6
));
1102 *v6setsrcp
= ire
->ire_setsrc_addr_v6
;
1106 /* The first ire_gw_secattr is passed back */
1107 if (ire
->ire_gw_secattr
!= NULL
) {
1108 *gwattrp
= ire
->ire_gw_secattr
;
1112 mutex_enter(&ire
->ire_lock
);
1113 dst
= ire
->ire_gateway_addr_v6
;
1114 mutex_exit(&ire
->ire_lock
);
1115 match_flags
&= ~(MATCH_IRE_GW
|MATCH_IRE_MASK
);
1117 * Don't allow anything unusual past the first iteration.
1118 * After the first lookup, we should no longer look for
1119 * (IRE_LOCAL|IRE_LOOPBACK|IRE_BROADCAST) or RTF_INDIRECT
1122 * In addition, after we have found a direct IRE_OFFLINK,
1123 * we should only look for interface or clone routes.
1125 match_flags
|= MATCH_IRE_DIRECT
; /* no more RTF_INDIRECTs */
1127 if ((ire
->ire_type
& IRE_OFFLINK
) &&
1128 !(ire
->ire_flags
& RTF_INDIRECT
)) {
1129 ire_type
= IRE_IF_ALL
;
1132 * no more local, loopback routes
1134 if (!(match_flags
& MATCH_IRE_TYPE
))
1135 ire_type
= (IRE_OFFLINK
|IRE_ONLINK
);
1136 ire_type
&= ~(IRE_LOCAL
|IRE_LOOPBACK
);
1138 match_flags
|= MATCH_IRE_TYPE
;
1140 ifire
= ire_route_recursive_v6(&dst
, ire_type
, ill
, zoneid
, tsl
,
1141 match_flags
, IRR_INCOMPLETE
, 0, ipst
, v6setsrcp
, gwattrp
,
1144 ire
= ire_route_recursive_v6(dst_addr_v6
, ire_type
, ill
, zoneid
,
1145 tsl
, match_flags
, IRR_INCOMPLETE
, 0, ipst
, v6setsrcp
,
1154 * Handle IP_IOC_RTS_REQUEST ioctls
1157 ip_rts_request(queue_t
*q
, mblk_t
*mp
, cred_t
*ioc_cr
)
1159 conn_t
*connp
= Q_TO_CONN(q
);
1160 IOCP iocp
= (IOCP
)mp
->b_rptr
;
1161 mblk_t
*mp1
, *ioc_mp
= mp
;
1165 ipst
= connp
->conn_netstack
->netstack_ip
;
1167 ASSERT(mp
->b_cont
!= NULL
);
1168 /* ioc_mp holds mp */
1172 * The Routing Socket data starts on
1173 * next block. If there is no next block
1174 * this is an indication from routing module
1175 * that it is a routing socket stream queue.
1176 * We need to support that for compatibility with SDP since
1177 * it has a contract private interface to use IP_IOC_RTS_REQUEST.
1178 * Note: SDP no longer uses IP_IOC_RTS_REQUEST - we can remove this.
1180 if (mp
->b_cont
== NULL
) {
1182 * This is a message from SDP
1183 * indicating that this is a Routing Socket
1184 * Stream. Insert this conn_t in routing
1185 * socket client list.
1187 connp
->conn_useloopback
= 1;
1188 ipcl_hash_insert_wildcard(ipst
->ips_rts_clients
, connp
);
1191 mp1
= dupmsg(mp
->b_cont
);
1198 error
= ip_rts_request_common(mp
, connp
, ioc_cr
);
1200 iocp
->ioc_error
= error
;
1201 ioc_mp
->b_datap
->db_type
= M_IOCACK
;
1202 if (iocp
->ioc_error
!= 0)
1203 iocp
->ioc_count
= 0;
1204 /* Note that we pass a NULL ira to rts_input */
1205 (connp
->conn_recv
)(connp
, ioc_mp
, NULL
, NULL
);
1207 /* conn was refheld in ip_wput_ioctl. */
1208 CONN_DEC_IOCTLREF(connp
);
1209 CONN_OPER_PENDING_DONE(connp
);
1215 * Build a reply to the RTM_GET request contained in the given message block
1216 * using the retrieved IRE of the destination address, the parent IRE (if it
1217 * exists) and the address family.
1219 * Returns a pointer to a message block containing the reply if successful,
1220 * otherwise NULL is returned.
1223 rts_rtmget(mblk_t
*mp
, ire_t
*ire
, ire_t
*ifire
, const in6_addr_t
*setsrc
,
1224 tsol_ire_gw_secattr_t
*attrp
, sa_family_t af
)
1227 rt_msghdr_t
*new_rtm
;
1231 tsol_gc_t
*gc
= NULL
;
1232 tsol_gcgrp_t
*gcgrp
= NULL
;
1234 ipif_t
*ipif
= NULL
;
1235 ipaddr_t brdaddr
; /* IFF_POINTOPOINT destination */
1237 in6_addr_t brdaddr6
; /* IFF_POINTOPOINT destination */
1241 rtm
= (rt_msghdr_t
*)mp
->b_rptr
;
1244 * Find the ill used to send packets. This will be NULL in case
1245 * of a reject or blackhole.
1248 ill
= ire_nexthop_ill(ifire
);
1250 ill
= ire_nexthop_ill(ire
);
1252 if (attrp
!= NULL
) {
1253 mutex_enter(&attrp
->igsa_lock
);
1254 if ((gc
= attrp
->igsa_gc
) != NULL
) {
1256 ASSERT(gcgrp
!= NULL
);
1257 rw_enter(&gcgrp
->gcgrp_rwlock
, RW_READER
);
1259 mutex_exit(&attrp
->igsa_lock
);
1263 * Always return RTA_DST, RTA_GATEWAY and RTA_NETMASK.
1265 * The 4.4BSD-Lite2 code (net/rtsock.c) returns both
1266 * RTA_IFP and RTA_IFA if either is defined, and also
1267 * returns RTA_BRD if the appropriate interface is
1270 rtm_addrs
= (RTA_DST
| RTA_GATEWAY
| RTA_NETMASK
);
1271 if ((rtm
->rtm_addrs
& (RTA_IFP
| RTA_IFA
)) && ill
!= NULL
) {
1272 rtm_addrs
|= (RTA_IFP
| RTA_IFA
);
1274 * We associate an IRE with an ILL, hence we don't exactly
1275 * know what might make sense for RTA_IFA and RTA_BRD. We
1276 * pick the first ipif on the ill.
1278 ipif
= ipif_get_next_ipif(NULL
, ill
);
1280 if (ipif
->ipif_isv6
)
1281 ifaddr6
= ipif
->ipif_v6lcl_addr
;
1283 ifaddr
= ipif
->ipif_lcl_addr
;
1284 if (ipif
->ipif_flags
& IPIF_POINTOPOINT
) {
1285 rtm_addrs
|= RTA_BRD
;
1286 if (ipif
->ipif_isv6
)
1287 brdaddr6
= ipif
->ipif_v6pp_dst_addr
;
1289 brdaddr
= ipif
->ipif_pp_dst_addr
;
1295 new_mp
= rts_alloc_msg(RTM_GET
, rtm_addrs
, af
, gc
!= NULL
? 1 : 0);
1296 if (new_mp
== NULL
) {
1298 rw_exit(&gcgrp
->gcgrp_rwlock
);
1305 * We set the destination address, gateway address,
1306 * netmask and flags in the RTM_GET response depending
1307 * on whether we found a parent IRE or not.
1308 * In particular, if we did find a parent IRE during the
1309 * recursive search, use that IRE's gateway address.
1310 * Otherwise, we use the IRE's source address for the
1313 ASSERT(af
== AF_INET
|| af
== AF_INET6
);
1316 IN6_V4MAPPED_TO_IPADDR(setsrc
, v4setsrc
);
1317 if (v4setsrc
!= INADDR_ANY
)
1318 rtm_addrs
|= RTA_SRC
;
1320 rtm_flags
= ire
->ire_flags
;
1321 rts_fill_msg(RTM_GET
, rtm_addrs
, ire
->ire_addr
,
1322 ire
->ire_mask
, ire
->ire_gateway_addr
, v4setsrc
,
1323 brdaddr
, 0, ifaddr
, ill
, new_mp
, gc
);
1326 if (!IN6_IS_ADDR_UNSPECIFIED(setsrc
))
1327 rtm_addrs
|= RTA_SRC
;
1329 rtm_flags
= ire
->ire_flags
;
1330 rts_fill_msg_v6(RTM_GET
, rtm_addrs
, &ire
->ire_addr_v6
,
1331 &ire
->ire_mask_v6
, &ire
->ire_gateway_addr_v6
,
1332 setsrc
, &brdaddr6
, &ipv6_all_zeros
,
1333 &ifaddr6
, ill
, new_mp
, gc
);
1338 rw_exit(&gcgrp
->gcgrp_rwlock
);
1340 new_rtm
= (rt_msghdr_t
*)new_mp
->b_rptr
;
1343 * The rtm_msglen, rtm_version and rtm_type fields in
1344 * RTM_GET response are filled in by rts_fill_msg.
1346 * rtm_addrs and rtm_flags are filled in based on what
1347 * was requested and the state of the IREs looked up
1350 * rtm_inits and rtm_rmx are filled in with metrics
1351 * based on whether a parent IRE was found or not.
1353 * TODO: rtm_index and rtm_use should probably be
1354 * filled in with something resonable here and not just
1355 * copied from the request.
1357 new_rtm
->rtm_index
= rtm
->rtm_index
;
1358 new_rtm
->rtm_pid
= rtm
->rtm_pid
;
1359 new_rtm
->rtm_seq
= rtm
->rtm_seq
;
1360 new_rtm
->rtm_use
= rtm
->rtm_use
;
1361 new_rtm
->rtm_addrs
= rtm_addrs
;
1362 new_rtm
->rtm_flags
= rtm_flags
;
1363 new_rtm
->rtm_inits
= rts_getmetrics(ire
, ill
, &new_rtm
->rtm_rmx
);
1370 * Fill the given if_data_t with interface statistics.
1373 rts_getifdata(if_data_t
*if_data
, const ipif_t
*ipif
)
1375 if_data
->ifi_type
= ipif
->ipif_ill
->ill_type
;
1376 /* ethernet, tokenring, etc */
1377 if_data
->ifi_addrlen
= 0; /* media address length */
1378 if_data
->ifi_hdrlen
= 0; /* media header length */
1379 if_data
->ifi_mtu
= ipif
->ipif_ill
->ill_mtu
; /* mtu */
1380 /* metric (external only) */
1381 if_data
->ifi_metric
= ipif
->ipif_ill
->ill_metric
;
1382 if_data
->ifi_baudrate
= 0; /* linespeed */
1384 if_data
->ifi_ipackets
= 0; /* packets received on if */
1385 if_data
->ifi_ierrors
= 0; /* input errors on interface */
1386 if_data
->ifi_opackets
= 0; /* packets sent on interface */
1387 if_data
->ifi_oerrors
= 0; /* output errors on if */
1388 if_data
->ifi_collisions
= 0; /* collisions on csma if */
1389 if_data
->ifi_ibytes
= 0; /* total number received */
1390 if_data
->ifi_obytes
= 0; /* total number sent */
1391 if_data
->ifi_imcasts
= 0; /* multicast packets received */
1392 if_data
->ifi_omcasts
= 0; /* multicast packets sent */
1393 if_data
->ifi_iqdrops
= 0; /* dropped on input */
1394 if_data
->ifi_noproto
= 0; /* destined for unsupported */
1399 * Set the metrics on a forwarding table route.
1402 rts_setmetrics(ire_t
*ire
, uint_t which
, rt_metrics_t
*metrics
)
1409 in6_addr_t gw_addr_v6
;
1411 /* Need to add back some metrics to the IRE? */
1413 * Bypass obtaining the lock and searching ill_saved_ire_mp in the
1414 * common case of no metrics.
1418 ire
->ire_metrics
.iulp_set
= B_TRUE
;
1421 * iulp_rtt and iulp_rtt_sd are in milliseconds, but 4.4BSD-Lite2's
1422 * <net/route.h> says: rmx_rtt and rmx_rttvar are stored as
1425 if (which
& RTV_RTT
)
1426 rtt
= metrics
->rmx_rtt
/ 1000;
1427 if (which
& RTV_RTTVAR
)
1428 rtt_sd
= metrics
->rmx_rttvar
/ 1000;
1431 * Update the metrics in the IRE itself.
1433 mutex_enter(&ire
->ire_lock
);
1434 if (which
& RTV_MTU
)
1435 ire
->ire_metrics
.iulp_mtu
= metrics
->rmx_mtu
;
1436 if (which
& RTV_RTT
)
1437 ire
->ire_metrics
.iulp_rtt
= rtt
;
1438 if (which
& RTV_SSTHRESH
)
1439 ire
->ire_metrics
.iulp_ssthresh
= metrics
->rmx_ssthresh
;
1440 if (which
& RTV_RTTVAR
)
1441 ire
->ire_metrics
.iulp_rtt_sd
= rtt_sd
;
1442 if (which
& RTV_SPIPE
)
1443 ire
->ire_metrics
.iulp_spipe
= metrics
->rmx_sendpipe
;
1444 if (which
& RTV_RPIPE
)
1445 ire
->ire_metrics
.iulp_rpipe
= metrics
->rmx_recvpipe
;
1446 mutex_exit(&ire
->ire_lock
);
1449 * Search through the ifrt_t chain hanging off the ILL in order to
1450 * reflect the metric change there.
1455 ASSERT((ill
->ill_isv6
&& ire
->ire_ipversion
== IPV6_VERSION
) ||
1456 ((!ill
->ill_isv6
&& ire
->ire_ipversion
== IPV4_VERSION
)));
1457 if (ill
->ill_isv6
) {
1458 mutex_enter(&ire
->ire_lock
);
1459 gw_addr_v6
= ire
->ire_gateway_addr_v6
;
1460 mutex_exit(&ire
->ire_lock
);
1462 mutex_enter(&ill
->ill_saved_ire_lock
);
1463 for (mp
= ill
->ill_saved_ire_mp
; mp
!= NULL
; mp
= mp
->b_cont
) {
1465 * On a given ill, the tuple of address, gateway, mask,
1466 * ire_type and zoneid unique for each saved IRE.
1468 ifrt
= (ifrt_t
*)mp
->b_rptr
;
1469 if (ill
->ill_isv6
) {
1470 if (!IN6_ARE_ADDR_EQUAL(&ifrt
->ifrt_v6addr
,
1471 &ire
->ire_addr_v6
) ||
1472 !IN6_ARE_ADDR_EQUAL(&ifrt
->ifrt_v6gateway_addr
,
1474 !IN6_ARE_ADDR_EQUAL(&ifrt
->ifrt_v6mask
,
1478 if (ifrt
->ifrt_addr
!= ire
->ire_addr
||
1479 ifrt
->ifrt_gateway_addr
!= ire
->ire_gateway_addr
||
1480 ifrt
->ifrt_mask
!= ire
->ire_mask
)
1483 if (ifrt
->ifrt_zoneid
!= ire
->ire_zoneid
||
1484 ifrt
->ifrt_type
!= ire
->ire_type
)
1487 if (which
& RTV_MTU
)
1488 ifrt
->ifrt_metrics
.iulp_mtu
= metrics
->rmx_mtu
;
1489 if (which
& RTV_RTT
)
1490 ifrt
->ifrt_metrics
.iulp_rtt
= rtt
;
1491 if (which
& RTV_SSTHRESH
) {
1492 ifrt
->ifrt_metrics
.iulp_ssthresh
=
1493 metrics
->rmx_ssthresh
;
1495 if (which
& RTV_RTTVAR
)
1496 ifrt
->ifrt_metrics
.iulp_rtt_sd
= metrics
->rmx_rttvar
;
1497 if (which
& RTV_SPIPE
)
1498 ifrt
->ifrt_metrics
.iulp_spipe
= metrics
->rmx_sendpipe
;
1499 if (which
& RTV_RPIPE
)
1500 ifrt
->ifrt_metrics
.iulp_rpipe
= metrics
->rmx_recvpipe
;
1503 mutex_exit(&ill
->ill_saved_ire_lock
);
1506 * Update any IRE_IF_CLONE hanging created from this IRE_IF so they
1507 * get any new iulp_mtu.
1508 * We do that by deleting them; ire_create_if_clone will pick
1509 * up the new metrics.
1511 if ((ire
->ire_type
& IRE_INTERFACE
) && ire
->ire_dep_children
!= 0)
1512 ire_dep_delete_if_clone(ire
);
1516 * Get the metrics from a forwarding table route.
1519 rts_getmetrics(ire_t
*ire
, ill_t
*ill
, rt_metrics_t
*metrics
)
1521 int metrics_set
= 0;
1523 bzero(metrics
, sizeof (rt_metrics_t
));
1526 * iulp_rtt and iulp_rtt_sd are in milliseconds, but 4.4BSD-Lite2's
1527 * <net/route.h> says: rmx_rtt and rmx_rttvar are stored as
1530 metrics
->rmx_rtt
= ire
->ire_metrics
.iulp_rtt
* 1000;
1531 metrics_set
|= RTV_RTT
;
1532 if (ire
->ire_metrics
.iulp_mtu
!= 0) {
1533 metrics
->rmx_mtu
= ire
->ire_metrics
.iulp_mtu
;
1534 metrics_set
|= RTV_MTU
;
1535 } else if (ill
!= NULL
) {
1536 metrics
->rmx_mtu
= ill
->ill_mtu
;
1537 metrics_set
|= RTV_MTU
;
1539 metrics
->rmx_ssthresh
= ire
->ire_metrics
.iulp_ssthresh
;
1540 metrics_set
|= RTV_SSTHRESH
;
1541 metrics
->rmx_rttvar
= ire
->ire_metrics
.iulp_rtt_sd
* 1000;
1542 metrics_set
|= RTV_RTTVAR
;
1543 metrics
->rmx_sendpipe
= ire
->ire_metrics
.iulp_spipe
;
1544 metrics_set
|= RTV_SPIPE
;
1545 metrics
->rmx_recvpipe
= ire
->ire_metrics
.iulp_rpipe
;
1546 metrics_set
|= RTV_RPIPE
;
1547 return (metrics_set
);
1551 * Given two sets of metrics (src and dst), use the dst values if they are
1552 * set. If a dst value is not set but the src value is set, then we use
1554 * dst is updated with the new values.
1555 * This is used to merge information from a dce_t and ire_metrics, where the
1556 * dce values takes precedence.
1559 rts_merge_metrics(iulp_t
*dst
, const iulp_t
*src
)
1564 if (dst
->iulp_ssthresh
== 0)
1565 dst
->iulp_ssthresh
= src
->iulp_ssthresh
;
1566 if (dst
->iulp_rtt
== 0)
1567 dst
->iulp_rtt
= src
->iulp_rtt
;
1568 if (dst
->iulp_rtt_sd
== 0)
1569 dst
->iulp_rtt_sd
= src
->iulp_rtt_sd
;
1570 if (dst
->iulp_spipe
== 0)
1571 dst
->iulp_spipe
= src
->iulp_spipe
;
1572 if (dst
->iulp_rpipe
== 0)
1573 dst
->iulp_rpipe
= src
->iulp_rpipe
;
1574 if (dst
->iulp_rtomax
== 0)
1575 dst
->iulp_rtomax
= src
->iulp_rtomax
;
1576 if (dst
->iulp_sack
== 0)
1577 dst
->iulp_sack
= src
->iulp_sack
;
1578 if (dst
->iulp_tstamp_ok
== 0)
1579 dst
->iulp_tstamp_ok
= src
->iulp_tstamp_ok
;
1580 if (dst
->iulp_wscale_ok
== 0)
1581 dst
->iulp_wscale_ok
= src
->iulp_wscale_ok
;
1582 if (dst
->iulp_ecn_ok
== 0)
1583 dst
->iulp_ecn_ok
= src
->iulp_ecn_ok
;
1584 if (dst
->iulp_pmtud_ok
== 0)
1585 dst
->iulp_pmtud_ok
= src
->iulp_pmtud_ok
;
1586 if (dst
->iulp_mtu
== 0)
1587 dst
->iulp_mtu
= src
->iulp_mtu
;
1592 * Takes a pointer to a routing message and extracts necessary info by looking
1593 * at the rtm->rtm_addrs bits and store the requested sockaddrs in the pointers
1594 * passed (all of which must be valid).
1596 * The bitmask of sockaddrs actually found in the message is returned, or zero
1597 * is returned in the case of an error.
1600 rts_getaddrs(rt_msghdr_t
*rtm
, in6_addr_t
*dst_addrp
, in6_addr_t
*gw_addrp
,
1601 in6_addr_t
*net_maskp
, in6_addr_t
*authorp
, in6_addr_t
*if_addrp
,
1602 in6_addr_t
*in_src_addrp
, ushort_t
*indexp
, sa_family_t
*afp
,
1603 tsol_rtsecattr_t
*rtsecattr
, int *error
)
1605 struct sockaddr
*sa
;
1609 int found_addrs
= 0;
1612 struct sockaddr_dl
*sdl
;
1614 *dst_addrp
= ipv6_all_zeros
;
1615 *gw_addrp
= ipv6_all_zeros
;
1616 *net_maskp
= ipv6_all_zeros
;
1617 *authorp
= ipv6_all_zeros
;
1618 *if_addrp
= ipv6_all_zeros
;
1619 *in_src_addrp
= ipv6_all_zeros
;
1622 rtsecattr
->rtsa_cnt
= 0;
1626 * At present we handle only RTA_DST, RTA_GATEWAY, RTA_NETMASK, RTA_IFP,
1627 * RTA_IFA and RTA_AUTHOR. The rest will be added as we need them.
1629 cp
= (caddr_t
)&rtm
[1];
1630 length
= rtm
->rtm_msglen
;
1631 for (i
= 0; (i
< RTA_NUMBITS
) && ((cp
- (caddr_t
)rtm
) < length
); i
++) {
1633 * The address family we are working with starts out as
1634 * AF_UNSPEC, but is set to the one specified with the
1635 * destination address.
1637 * If the "working" address family that has been set to
1638 * something other than AF_UNSPEC, then the address family of
1639 * subsequent sockaddrs must either be AF_UNSPEC (for
1640 * compatibility with older programs) or must be the same as our
1643 * This code assumes that RTA_DST (1) comes first in the loop.
1645 sa
= (struct sockaddr
*)cp
;
1646 addr_bits
= (rtm
->rtm_addrs
& (1 << i
));
1649 switch (addr_bits
) {
1651 size
= rts_copyfromsockaddr(sa
, dst_addrp
);
1652 *afp
= sa
->sa_family
;
1655 if (sa
->sa_family
!= *afp
&& sa
->sa_family
!= AF_UNSPEC
)
1657 size
= rts_copyfromsockaddr(sa
, gw_addrp
);
1660 if (sa
->sa_family
!= *afp
&& sa
->sa_family
!= AF_UNSPEC
)
1662 size
= rts_copyfromsockaddr(sa
, net_maskp
);
1665 if (sa
->sa_family
!= AF_LINK
&&
1666 sa
->sa_family
!= AF_UNSPEC
)
1668 sdl
= (struct sockaddr_dl
*)cp
;
1669 *indexp
= sdl
->sdl_index
;
1670 size
= sizeof (struct sockaddr_dl
);
1673 /* Source address of the incoming packet */
1674 size
= rts_copyfromsockaddr(sa
, in_src_addrp
);
1675 *afp
= sa
->sa_family
;
1678 if (sa
->sa_family
!= *afp
&& sa
->sa_family
!= AF_UNSPEC
)
1680 size
= rts_copyfromsockaddr(sa
, if_addrp
);
1683 if (sa
->sa_family
!= *afp
&& sa
->sa_family
!= AF_UNSPEC
)
1685 size
= rts_copyfromsockaddr(sa
, authorp
);
1693 found_addrs
|= addr_bits
;
1697 * Parse the routing message and look for any security-
1698 * related attributes for the route. For each valid
1699 * attribute, allocate/obtain the corresponding kernel
1700 * route security attributes.
1702 if (((cp
- (caddr_t
)rtm
) < length
) && is_system_labeled()) {
1703 *error
= tsol_rtsa_init(rtm
, rtsecattr
, cp
);
1704 ASSERT(rtsecattr
->rtsa_cnt
<= TSOL_RTSA_REQUEST_MAX
);
1707 return (found_addrs
);
1711 * Fills the message with the given info.
1714 rts_fill_msg(int type
, int rtm_addrs
, ipaddr_t dst
, ipaddr_t mask
,
1715 ipaddr_t gateway
, ipaddr_t src_addr
, ipaddr_t brd_addr
, ipaddr_t author
,
1716 ipaddr_t ifaddr
, const ill_t
*ill
, mblk_t
*mp
,
1717 const tsol_gc_t
*gc
)
1721 size_t data_size
, header_size
;
1727 * First find the type of the message
1730 header_size
= rts_header_msg_size(type
);
1732 * Now find the size of the data
1733 * that follows the message header.
1735 data_size
= rts_data_msg_size(rtm_addrs
, AF_INET
, gc
!= NULL
? 1 : 0);
1737 rtm
= (rt_msghdr_t
*)mp
->b_rptr
;
1738 mp
->b_wptr
= &mp
->b_rptr
[header_size
];
1740 bzero(cp
, data_size
);
1741 for (i
= 0; i
< RTA_NUMBITS
; i
++) {
1743 switch (rtm_addrs
& (1 << i
)) {
1745 sin
->sin_addr
.s_addr
= dst
;
1746 sin
->sin_family
= AF_INET
;
1747 cp
+= sizeof (sin_t
);
1750 sin
->sin_addr
.s_addr
= gateway
;
1751 sin
->sin_family
= AF_INET
;
1752 cp
+= sizeof (sin_t
);
1755 sin
->sin_addr
.s_addr
= mask
;
1756 sin
->sin_family
= AF_INET
;
1757 cp
+= sizeof (sin_t
);
1760 cp
+= ill_dls_info((struct sockaddr_dl
*)cp
, ill
);
1763 sin
->sin_addr
.s_addr
= ifaddr
;
1764 sin
->sin_family
= AF_INET
;
1765 cp
+= sizeof (sin_t
);
1768 sin
->sin_addr
.s_addr
= src_addr
;
1769 sin
->sin_family
= AF_INET
;
1770 cp
+= sizeof (sin_t
);
1773 sin
->sin_addr
.s_addr
= author
;
1774 sin
->sin_family
= AF_INET
;
1775 cp
+= sizeof (sin_t
);
1779 * RTA_BRD is used typically to specify a point-to-point
1780 * destination address.
1782 sin
->sin_addr
.s_addr
= brd_addr
;
1783 sin
->sin_family
= AF_INET
;
1784 cp
+= sizeof (sin_t
);
1791 struct rtsa_s
*rp_dst
;
1792 tsol_rtsecattr_t
*rsap
;
1794 ASSERT(gc
->gc_grp
!= NULL
);
1795 ASSERT(RW_LOCK_HELD(&gc
->gc_grp
->gcgrp_rwlock
));
1797 rtm_ext
= (rtm_ext_t
*)cp
;
1798 rtm_ext
->rtmex_type
= RTMEX_GATEWAY_SECATTR
;
1799 rtm_ext
->rtmex_len
= TSOL_RTSECATTR_SIZE(1);
1801 rsap
= (tsol_rtsecattr_t
*)(rtm_ext
+ 1);
1803 rp_dst
= rsap
->rtsa_attr
;
1805 ASSERT(gc
->gc_db
!= NULL
);
1806 bcopy(&gc
->gc_db
->gcdb_attr
, rp_dst
, sizeof (*rp_dst
));
1807 cp
= (uchar_t
*)rp_dst
;
1813 * set the fields that are common to
1814 * to different messages.
1816 rtm
->rtm_msglen
= (short)(header_size
+ data_size
);
1817 rtm
->rtm_version
= RTM_VERSION
;
1818 rtm
->rtm_type
= (uchar_t
)type
;
1822 * Allocates and initializes a routing socket message.
1823 * Note that sacnt is either zero or one.
1826 rts_alloc_msg(int type
, int rtm_addrs
, sa_family_t af
, uint_t sacnt
)
1831 length
= RTS_MSG_SIZE(type
, rtm_addrs
, af
, sacnt
);
1832 mp
= allocb(length
, BPRI_MED
);
1835 bzero(mp
->b_rptr
, length
);
1840 * Returns the size of the routing
1841 * socket message header size.
1844 rts_header_msg_size(int type
)
1851 return (sizeof (ifa_msghdr_t
));
1853 return (sizeof (if_msghdr_t
));
1855 return (sizeof (rt_msghdr_t
));
1860 * Returns the size of the message needed with the given rtm_addrs and family.
1862 * It is assumed that all of the sockaddrs (with the exception of RTA_IFP) are
1863 * of the same family (currently either AF_INET or AF_INET6).
1866 rts_data_msg_size(int rtm_addrs
, sa_family_t af
, uint_t sacnt
)
1871 for (i
= 0; i
< RTA_NUMBITS
; i
++) {
1872 switch (rtm_addrs
& (1 << i
)) {
1874 length
+= sizeof (struct sockaddr_dl
);
1883 ASSERT(af
== AF_INET
|| af
== AF_INET6
);
1886 length
+= sizeof (sin_t
);
1889 length
+= sizeof (sin6_t
);
1896 length
+= sizeof (rtm_ext_t
) + TSOL_RTSECATTR_SIZE(sacnt
);
1902 * This routine is called to generate a message to the routing
1903 * socket indicating that a redirect has occured, a routing lookup
1904 * has failed, or that a protocol has detected timeouts to a particular
1905 * destination. This routine is called for message types RTM_LOSING,
1906 * RTM_REDIRECT, and RTM_MISS.
1909 ip_rts_change(int type
, ipaddr_t dst_addr
, ipaddr_t gw_addr
, ipaddr_t net_mask
,
1910 ipaddr_t source
, ipaddr_t author
, int flags
, int error
, int rtm_addrs
,
1918 mp
= rts_alloc_msg(type
, rtm_addrs
, AF_INET
, 0);
1921 rts_fill_msg(type
, rtm_addrs
, dst_addr
, net_mask
, gw_addr
, source
, 0,
1922 author
, 0, NULL
, mp
, NULL
);
1923 rtm
= (rt_msghdr_t
*)mp
->b_rptr
;
1924 rtm
->rtm_flags
= flags
;
1925 rtm
->rtm_errno
= error
;
1926 rtm
->rtm_flags
|= RTF_DONE
;
1927 rtm
->rtm_addrs
= rtm_addrs
;
1928 rts_queue_input(mp
, NULL
, AF_INET
, RTSQ_ALL
, ipst
);
1932 * This routine is called to generate a message to the routing
1933 * socket indicating that the status of a network interface has changed.
1934 * Message type generated RTM_IFINFO.
1937 ip_rts_ifmsg(const ipif_t
*ipif
, uint_t flags
)
1939 ip_rts_xifmsg(ipif
, 0, 0, flags
);
1943 ip_rts_xifmsg(const ipif_t
*ipif
, uint64_t set
, uint64_t clear
, uint_t flags
)
1948 ip_stack_t
*ipst
= ipif
->ipif_ill
->ill_ipst
;
1951 * This message should be generated only
1952 * when the physical device is changing
1955 if (ipif
->ipif_id
!= 0)
1957 if (ipif
->ipif_isv6
) {
1959 mp
= rts_alloc_msg(RTM_IFINFO
, RTA_IFP
, af
, 0);
1962 rts_fill_msg_v6(RTM_IFINFO
, RTA_IFP
, &ipv6_all_zeros
,
1963 &ipv6_all_zeros
, &ipv6_all_zeros
, &ipv6_all_zeros
,
1964 &ipv6_all_zeros
, &ipv6_all_zeros
, &ipv6_all_zeros
,
1965 ipif
->ipif_ill
, mp
, NULL
);
1968 mp
= rts_alloc_msg(RTM_IFINFO
, RTA_IFP
, af
, 0);
1971 rts_fill_msg(RTM_IFINFO
, RTA_IFP
, 0, 0, 0, 0, 0, 0, 0,
1972 ipif
->ipif_ill
, mp
, NULL
);
1974 ifm
= (if_msghdr_t
*)mp
->b_rptr
;
1975 ifm
->ifm_index
= ipif
->ipif_ill
->ill_phyint
->phyint_ifindex
;
1976 ifm
->ifm_flags
= (ipif
->ipif_flags
| ipif
->ipif_ill
->ill_flags
|
1977 ipif
->ipif_ill
->ill_phyint
->phyint_flags
| set
) & ~clear
;
1978 rts_getifdata(&ifm
->ifm_data
, ipif
);
1979 ifm
->ifm_addrs
= RTA_IFP
;
1981 if (flags
& RTSQ_DEFAULT
) {
1984 * If this message is for an underlying interface, prevent
1985 * "normal" (IPMP-unaware) routing sockets from seeing it.
1987 if (IS_UNDER_IPMP(ipif
->ipif_ill
))
1988 flags
&= ~RTSQ_NORMAL
;
1991 rts_queue_input(mp
, NULL
, af
, flags
, ipst
);
1995 * If cmd is RTM_ADD or RTM_DELETE, generate the rt_msghdr_t message;
1996 * otherwise (RTM_NEWADDR, RTM_DELADDR, RTM_CHGADDR and RTM_FREEADDR)
1997 * generate the ifa_msghdr_t message.
2000 rts_new_rtsmsg(int cmd
, int error
, const ipif_t
*ipif
, uint_t flags
)
2007 ip_stack_t
*ipst
= ipif
->ipif_ill
->ill_ipst
;
2010 * Do not report unspecified address if this is the RTM_CHGADDR or
2011 * RTM_FREEADDR message.
2013 if (cmd
== RTM_CHGADDR
|| cmd
== RTM_FREEADDR
) {
2014 if (!ipif
->ipif_isv6
) {
2015 if (ipif
->ipif_lcl_addr
== INADDR_ANY
)
2017 } else if (IN6_IS_ADDR_UNSPECIFIED(&ipif
->ipif_v6lcl_addr
)) {
2022 if (ipif
->ipif_isv6
)
2027 if (cmd
== RTM_ADD
|| cmd
== RTM_DELETE
)
2028 rtm_addrs
= (RTA_DST
| RTA_NETMASK
);
2030 rtm_addrs
= (RTA_IFA
| RTA_NETMASK
| RTA_BRD
| RTA_IFP
);
2032 mp
= rts_alloc_msg(cmd
, rtm_addrs
, af
, 0);
2036 if (cmd
!= RTM_ADD
&& cmd
!= RTM_DELETE
) {
2039 rts_fill_msg(cmd
, rtm_addrs
, 0,
2040 ipif
->ipif_net_mask
, 0, ipif
->ipif_lcl_addr
,
2041 ipif
->ipif_pp_dst_addr
, 0,
2042 ipif
->ipif_lcl_addr
, ipif
->ipif_ill
,
2046 rts_fill_msg_v6(cmd
, rtm_addrs
,
2047 &ipv6_all_zeros
, &ipif
->ipif_v6net_mask
,
2048 &ipv6_all_zeros
, &ipif
->ipif_v6lcl_addr
,
2049 &ipif
->ipif_v6pp_dst_addr
, &ipv6_all_zeros
,
2050 &ipif
->ipif_v6lcl_addr
, ipif
->ipif_ill
,
2054 ifam
= (ifa_msghdr_t
*)mp
->b_rptr
;
2056 ipif
->ipif_ill
->ill_phyint
->phyint_ifindex
;
2057 ifam
->ifam_metric
= ipif
->ipif_ill
->ill_metric
;
2058 ifam
->ifam_flags
= ((cmd
== RTM_NEWADDR
) ? RTF_UP
: 0);
2059 ifam
->ifam_addrs
= rtm_addrs
;
2063 rts_fill_msg(cmd
, rtm_addrs
,
2064 ipif
->ipif_lcl_addr
, ipif
->ipif_net_mask
, 0,
2065 0, 0, 0, 0, NULL
, mp
, NULL
);
2068 rts_fill_msg_v6(cmd
, rtm_addrs
,
2069 &ipif
->ipif_v6lcl_addr
,
2070 &ipif
->ipif_v6net_mask
, &ipv6_all_zeros
,
2071 &ipv6_all_zeros
, &ipv6_all_zeros
,
2072 &ipv6_all_zeros
, &ipv6_all_zeros
,
2076 rtm
= (rt_msghdr_t
*)mp
->b_rptr
;
2078 ipif
->ipif_ill
->ill_phyint
->phyint_ifindex
;
2079 rtm
->rtm_flags
= ((cmd
== RTM_ADD
) ? RTF_UP
: 0);
2080 rtm
->rtm_errno
= error
;
2082 rtm
->rtm_flags
|= RTF_DONE
;
2083 rtm
->rtm_addrs
= rtm_addrs
;
2085 rts_queue_input(mp
, NULL
, af
, flags
, ipst
);
2089 * This is called to generate messages to the routing socket
2090 * indicating a network interface has had addresses associated with it.
2091 * The structure of the code is based on the 4.4BSD-Lite2 <net/rtsock.c>.
2094 ip_rts_newaddrmsg(int cmd
, int error
, const ipif_t
*ipif
, uint_t flags
)
2096 ip_stack_t
*ipst
= ipif
->ipif_ill
->ill_ipst
;
2098 if (flags
& RTSQ_DEFAULT
) {
2101 * If this message is for an underlying interface, prevent
2102 * "normal" (IPMP-unaware) routing sockets from seeing it.
2104 if (IS_UNDER_IPMP(ipif
->ipif_ill
))
2105 flags
&= ~RTSQ_NORMAL
;
2109 * Let conn_ixa caching know that source address selection
2112 if (cmd
== RTM_ADD
|| cmd
== RTM_DELETE
)
2113 ip_update_source_selection(ipst
);
2116 * If the request is DELETE, send RTM_DELETE and RTM_DELADDR.
2117 * if the request is ADD, send RTM_NEWADDR and RTM_ADD.
2118 * otherwise simply send the request.
2122 rts_new_rtsmsg(RTM_NEWADDR
, error
, ipif
, flags
);
2123 rts_new_rtsmsg(RTM_ADD
, error
, ipif
, flags
);
2126 rts_new_rtsmsg(RTM_DELETE
, error
, ipif
, flags
);
2127 rts_new_rtsmsg(RTM_DELADDR
, error
, ipif
, flags
);
2130 rts_new_rtsmsg(cmd
, error
, ipif
, flags
);
2136 * Based on the address family specified in a sockaddr, copy the address field
2137 * into an in6_addr_t.
2139 * In the case of AF_UNSPEC, we assume the family is actually AF_INET for
2140 * compatibility with programs that leave the family cleared in the sockaddr.
2141 * Callers of rts_copyfromsockaddr should check the family themselves if they
2142 * wish to verify its value.
2144 * In the case of AF_INET6, a check is made to ensure that address is not an
2145 * IPv4-mapped address.
2148 rts_copyfromsockaddr(struct sockaddr
*sa
, in6_addr_t
*addrp
)
2150 switch (sa
->sa_family
) {
2153 IN6_IPADDR_TO_V4MAPPED(((sin_t
*)sa
)->sin_addr
.s_addr
, addrp
);
2154 return (sizeof (sin_t
));
2156 *addrp
= ((sin6_t
*)sa
)->sin6_addr
;
2157 if (IN6_IS_ADDR_V4MAPPED(addrp
))
2159 return (sizeof (sin6_t
));