2 * Copyright (c) 2000 Apple Computer, Inc. All rights reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * The contents of this file constitute Original Code as defined in and
7 * are subject to the Apple Public Source License Version 1.1 (the
8 * "License"). You may not use this file except in compliance with the
9 * License. Please obtain a copy of the License at
10 * http://www.apple.com/publicsource and read it before using this file.
12 * This Original Code and all software distributed under the License are
13 * distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, EITHER
14 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
15 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
16 * FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT. Please see the
17 * License for the specific language governing rights and limitations
20 * @APPLE_LICENSE_HEADER_END@
23 * Copyright (c) 1980, 1986, 1991, 1993
24 * The Regents of the University of California. All rights reserved.
26 * Redistribution and use in source and binary forms, with or without
27 * modification, are permitted provided that the following conditions
29 * 1. Redistributions of source code must retain the above copyright
30 * notice, this list of conditions and the following disclaimer.
31 * 2. Redistributions in binary form must reproduce the above copyright
32 * notice, this list of conditions and the following disclaimer in the
33 * documentation and/or other materials provided with the distribution.
34 * 3. All advertising materials mentioning features or use of this software
35 * must display the following acknowledgement:
36 * This product includes software developed by the University of
37 * California, Berkeley and its contributors.
38 * 4. Neither the name of the University nor the names of its contributors
39 * may be used to endorse or promote products derived from this software
40 * without specific prior written permission.
42 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
43 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
44 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
45 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
46 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
47 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
48 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
49 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
50 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
51 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
54 * @(#)route.c 8.2 (Berkeley) 11/15/93
55 * $FreeBSD: src/sys/net/route.c,v 1.59.2.3 2001/07/29 19:18:02 ume Exp $
58 #include <sys/param.h>
59 #include <sys/systm.h>
60 #include <sys/malloc.h>
62 #include <sys/socket.h>
63 #include <sys/domain.h>
64 #include <sys/syslog.h>
65 #include <kern/lock.h>
66 #include <kern/zalloc.h>
69 #include <net/route.h>
71 #include <netinet/in.h>
72 #include <netinet/ip_mroute.h>
74 #include <net/if_dl.h>
76 #define SA(p) ((struct sockaddr *)(p))
78 extern struct domain routedomain
;
79 struct route_cb route_cb
;
80 __private_extern__
struct rtstat rtstat
= { 0, 0, 0, 0, 0 };
81 struct radix_node_head
*rt_tables
[AF_MAX
+1];
83 lck_mtx_t
*rt_mtx
; /*### global routing tables mutex for now */
84 lck_attr_t
*rt_mtx_attr
;
85 lck_grp_t
*rt_mtx_grp
;
86 lck_grp_attr_t
*rt_mtx_grp_attr
;
88 lck_mtx_t
*route_domain_mtx
; /*### global routing tables mutex for now */
89 __private_extern__
int rttrash
= 0; /* routes not in table but not freed */
91 static struct zone
*rte_zone
; /* special zone for rtentry */
92 #define RTE_ZONE_MAX 65536 /* maximum elements in zone */
93 #define RTE_ZONE_NAME "rtentry" /* name of rtentry zone */
95 static void rt_maskedcopy(struct sockaddr
*,
96 struct sockaddr
*, struct sockaddr
*);
97 static void rtable_init(void **);
98 static struct rtentry
*rte_alloc(void);
99 static void rte_free(struct rtentry
*);
101 __private_extern__ u_long route_generation
= 0;
102 extern int use_routegenid
;
110 for (dom
= domains
; dom
; dom
= dom
->dom_next
)
111 if (dom
->dom_rtattach
)
112 dom
->dom_rtattach(&table
[dom
->dom_family
],
119 rt_mtx_grp_attr
= lck_grp_attr_alloc_init();
121 rt_mtx_grp
= lck_grp_alloc_init("route", rt_mtx_grp_attr
);
123 rt_mtx_attr
= lck_attr_alloc_init();
125 if ((rt_mtx
= lck_mtx_alloc_init(rt_mtx_grp
, rt_mtx_attr
)) == NULL
) {
126 printf("route_init: can't alloc rt_mtx\n");
130 lck_mtx_lock(rt_mtx
);
131 rn_init(); /* initialize all zeroes, all ones, mask table */
132 lck_mtx_unlock(rt_mtx
);
133 rtable_init((void **)rt_tables
);
134 route_domain_mtx
= routedomain
.dom_mtx
;
136 rte_zone
= zinit(sizeof (struct rtentry
),
137 RTE_ZONE_MAX
* sizeof (struct rtentry
), 0, RTE_ZONE_NAME
);
138 if (rte_zone
== NULL
)
139 panic("route_init: failed allocating rte_zone");
141 zone_change(rte_zone
, Z_EXPAND
, TRUE
);
145 * Packet routing routines.
149 register struct route
*ro
;
151 rtalloc_ign(ro
, 0UL);
155 rtalloc_ign_locked(ro
, ignore
)
156 register struct route
*ro
;
161 if ((rt
= ro
->ro_rt
) != NULL
) {
162 if (rt
->rt_ifp
!= NULL
&& rt
->rt_flags
& RTF_UP
)
164 /* XXX - We are probably always at splnet here already. */
168 ro
->ro_rt
= rtalloc1_locked(&ro
->ro_dst
, 1, ignore
);
170 ro
->ro_rt
->generation_id
= route_generation
;
173 rtalloc_ign(ro
, ignore
)
174 register struct route
*ro
;
177 lck_mtx_assert(rt_mtx
, LCK_MTX_ASSERT_NOTOWNED
);
178 lck_mtx_lock(rt_mtx
);
179 rtalloc_ign_locked(ro
, ignore
);
180 lck_mtx_unlock(rt_mtx
);
184 * Look up the route that matches the address given
185 * Or, at least try.. Create a cloned route if needed.
188 rtalloc1_locked(dst
, report
, ignflags
)
189 const struct sockaddr
*dst
;
193 register struct radix_node_head
*rnh
= rt_tables
[dst
->sa_family
];
194 register struct rtentry
*rt
;
195 register struct radix_node
*rn
;
196 struct rtentry
*newrt
= 0;
197 struct rt_addrinfo info
;
199 int err
= 0, msgtype
= RTM_MISS
;
201 * Look up the address in the table for that Address Family
203 if (rnh
&& (rn
= rnh
->rnh_matchaddr((caddr_t
)dst
, rnh
)) &&
204 ((rn
->rn_flags
& RNF_ROOT
) == 0)) {
206 * If we find it and it's not the root node, then
207 * get a refernce on the rtentry associated.
209 newrt
= rt
= (struct rtentry
*)rn
;
210 nflags
= rt
->rt_flags
& ~ignflags
;
211 if (report
&& (nflags
& (RTF_CLONING
| RTF_PRCLONING
))) {
213 * We are apparently adding (report = 0 in delete).
214 * If it requires that it be cloned, do so.
215 * (This implies it wasn't a HOST route.)
217 err
= rtrequest_locked(RTM_RESOLVE
, dst
, SA(0),
221 * If the cloning didn't succeed, maybe
222 * what we have will do. Return that.
228 if ((rt
= newrt
) && (rt
->rt_flags
& RTF_XRESOLVE
)) {
230 * If the new route specifies it be
231 * externally resolved, then go do that.
233 msgtype
= RTM_RESOLVE
;
240 * Either we hit the root or couldn't find any match,
241 * Which basically means
242 * "caint get there frm here"
244 rtstat
.rts_unreach
++;
247 * If required, report the failure to the supervising
249 * For a delete, this is not an error. (report == 0)
251 bzero((caddr_t
)&info
, sizeof(info
));
252 info
.rti_info
[RTAX_DST
] = dst
;
253 rt_missmsg(msgtype
, &info
, 0, err
);
260 rtalloc1(dst
, report
, ignflags
)
261 register struct sockaddr
*dst
;
265 struct rtentry
* entry
;
266 lck_mtx_assert(rt_mtx
, LCK_MTX_ASSERT_NOTOWNED
);
267 lck_mtx_lock(rt_mtx
);
268 entry
= rtalloc1_locked(dst
, report
, ignflags
);
269 lck_mtx_unlock(rt_mtx
);
274 * Remove a reference count from an rtentry.
275 * If the count gets low enough, take it out of the routing table
279 register struct rtentry
*rt
;
282 * find the tree for that address family
283 * Note: in the case of igmp packets, there might not be an rnh
285 register struct radix_node_head
*rnh
;
287 lck_mtx_assert(rt_mtx
, LCK_MTX_ASSERT_OWNED
);
289 /* See 3582620 - We hit this during the transition from funnels to locks */
291 printf("rtfree - rt is NULL\n");
295 rnh
= rt_tables
[rt_key(rt
)->sa_family
];
298 * decrement the reference count by one and if it reaches 0,
299 * and there is a close function defined, call the close function
302 if(rnh
&& rnh
->rnh_close
&& rt
->rt_refcnt
== 0) {
303 rnh
->rnh_close((struct radix_node
*)rt
, rnh
);
307 * If we are no longer "up" (and ref == 0)
308 * then we can free the resources associated
311 if (rt
->rt_refcnt
<= 0 && (rt
->rt_flags
& RTF_UP
) == 0) {
312 if (rt
->rt_nodes
->rn_flags
& (RNF_ACTIVE
| RNF_ROOT
))
315 * the rtentry must have been removed from the routing table
316 * so it is represented in rttrash.. remove that now.
321 if (rt
->rt_refcnt
< 0) {
322 printf("rtfree: %p not freed (neg refs) cnt=%d\n", rt
, rt
->rt_refcnt
);
328 * release references on items we hold them on..
329 * e.g other routes and ifaddrs.
332 rtfree_locked(rt
->rt_parent
);
340 * The key is separatly alloc'd so free it (see rt_setgate()).
341 * This also frees the gateway, as they are always malloc'd
347 * and the rtentry itself of course
355 register struct rtentry
*rt
;
357 lck_mtx_assert(rt_mtx
, LCK_MTX_ASSERT_NOTOWNED
);
358 lck_mtx_lock(rt_mtx
);
360 lck_mtx_unlock(rt_mtx
);
364 * Decrements the refcount but does not free the route when
365 * the refcount reaches zero. Unless you have really good reason,
366 * use rtfree not rtunref.
369 rtunref(struct rtentry
* rt
)
371 lck_mtx_assert(rt_mtx
, LCK_MTX_ASSERT_OWNED
);
377 if (rt
->rt_refcnt
<= 0 && (rt
->rt_flags
& RTF_UP
) == 0)
378 printf("rtunref - if rtfree were called, we would have freed route\n");
383 * Add a reference count from an rtentry.
386 rtref(struct rtentry
* rt
)
388 lck_mtx_assert(rt_mtx
, LCK_MTX_ASSERT_OWNED
);
397 rtsetifa(struct rtentry
*rt
, struct ifaddr
* ifa
)
402 if (rt
->rt_ifa
== ifa
)
405 /* Release the old ifa */
412 /* Take a reference to the ifa */
419 register struct ifaddr
*ifa
;
422 u_char
*ptr
= (u_char
*)ifa
;
427 oldval
= OSAddAtomic(-1, &ifa
->ifa_refcnt
);
430 if ((ifa
->ifa_flags
& IFA_ATTACHED
) != 0) {
431 panic("ifa attached to ifp is being freed\n");
438 ifaref(struct ifaddr
*ifa
)
443 if (OSAddAtomic(1, &ifa
->ifa_refcnt
) == 0xffffffff)
444 panic("ifaref - reference count rolled over!");
448 * Force a routing table entry to the specified
449 * destination to go through the given gateway.
450 * Normally called as a result of a routing redirect
451 * message from the network layer.
453 * N.B.: must be called at splnet
457 rtredirect(dst
, gateway
, netmask
, flags
, src
, rtp
)
458 struct sockaddr
*dst
, *gateway
, *netmask
, *src
;
460 struct rtentry
**rtp
;
462 register struct rtentry
*rt
;
465 struct rt_addrinfo info
;
466 struct ifaddr
*ifa
= NULL
;
468 lck_mtx_assert(rt_mtx
, LCK_MTX_ASSERT_NOTOWNED
);
469 lck_mtx_lock(rt_mtx
);
471 /* verify the gateway is directly reachable */
472 if ((ifa
= ifa_ifwithnet(gateway
)) == 0) {
477 rt
= rtalloc1_locked(dst
, 0, 0UL);
479 * If the redirect isn't from our current router for this dst,
480 * it's either old or wrong. If it redirects us to ourselves,
481 * we have a routing loop, perhaps as a result of an interface
482 * going down recently.
484 #define equal(a1, a2) (bcmp((caddr_t)(a1), (caddr_t)(a2), (a1)->sa_len) == 0)
485 if (!(flags
& RTF_DONE
) && rt
&&
486 (!equal(src
, rt
->rt_gateway
) || rt
->rt_ifa
!= ifa
))
490 if ((ifa
= ifa_ifwithaddr(gateway
))) {
493 error
= EHOSTUNREACH
;
505 * Create a new entry if we just got back a wildcard entry
506 * or the the lookup failed. This is necessary for hosts
507 * which use routing redirects generated by smart gateways
508 * to dynamically build the routing tables.
510 if ((rt
== 0) || (rt_mask(rt
) && rt_mask(rt
)->sa_len
< 2))
513 * Don't listen to the redirect if it's
514 * for a route to an interface.
516 if (rt
->rt_flags
& RTF_GATEWAY
) {
517 if (((rt
->rt_flags
& RTF_HOST
) == 0) && (flags
& RTF_HOST
)) {
519 * Changing from route to net => route to host.
520 * Create new route, rather than smashing route to net.
523 flags
|= RTF_GATEWAY
| RTF_DYNAMIC
;
524 error
= rtrequest_locked((int)RTM_ADD
, dst
, gateway
,
526 (struct rtentry
**)0);
527 stat
= &rtstat
.rts_dynamic
;
530 * Smash the current notion of the gateway to
531 * this destination. Should check about netmask!!!
533 rt
->rt_flags
|= RTF_MODIFIED
;
534 flags
|= RTF_MODIFIED
;
535 stat
= &rtstat
.rts_newgateway
;
537 * add the key and gateway (in one malloc'd chunk).
539 rt_setgate(rt
, rt_key(rt
), gateway
);
542 error
= EHOSTUNREACH
;
552 rtstat
.rts_badredirect
++;
553 else if (stat
!= NULL
)
555 bzero((caddr_t
)&info
, sizeof(info
));
556 info
.rti_info
[RTAX_DST
] = dst
;
557 info
.rti_info
[RTAX_GATEWAY
] = gateway
;
558 info
.rti_info
[RTAX_NETMASK
] = netmask
;
559 info
.rti_info
[RTAX_AUTHOR
] = src
;
560 rt_missmsg(RTM_REDIRECT
, &info
, flags
, error
);
561 lck_mtx_unlock(rt_mtx
);
565 * Routing table ioctl interface.
568 rtioctl(req
, data
, p
)
574 /* Multicast goop, grrr... */
576 return mrt_ioctl(req
, data
);
578 return mrt_ioctl(req
, data
, p
);
588 const struct sockaddr
*dst
,
589 const struct sockaddr
*gateway
)
592 lck_mtx_assert(rt_mtx
, LCK_MTX_ASSERT_OWNED
);
594 struct ifaddr
*ifa
= 0;
595 if ((flags
& RTF_GATEWAY
) == 0) {
597 * If we are adding a route to an interface,
598 * and the interface is a pt to pt link
599 * we should search for the destination
600 * as our clue to the interface. Otherwise
601 * we can use the local address.
603 if (flags
& RTF_HOST
) {
604 ifa
= ifa_ifwithdstaddr(dst
);
607 ifa
= ifa_ifwithaddr(gateway
);
610 * If we are adding a route to a remote net
611 * or host, the gateway may still be on the
612 * other end of a pt to pt link.
614 ifa
= ifa_ifwithdstaddr(gateway
);
617 ifa
= ifa_ifwithnet(gateway
);
619 struct rtentry
*rt
= rtalloc1_locked(dst
, 0, 0UL);
629 if (ifa
->ifa_addr
->sa_family
!= dst
->sa_family
) {
630 struct ifaddr
*newifa
;
631 newifa
= ifaof_ifpforaddr(dst
, ifa
->ifa_ifp
);
640 #define ROUNDUP(a) (a>0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
642 static int rt_fixdelete
__P((struct radix_node
*, void *));
643 static int rt_fixchange
__P((struct radix_node
*, void *));
647 struct radix_node_head
*rnh
;
651 * Do appropriate manipulations of a routing tree given
652 * all the bits of info needed
656 struct sockaddr
*dst
,
657 struct sockaddr
*gateway
,
658 struct sockaddr
*netmask
,
660 struct rtentry
**ret_nrt
)
663 register struct rtentry
*rt
;
664 register struct radix_node
*rn
;
665 register struct radix_node_head
*rnh
;
666 struct ifaddr
*ifa
= NULL
;
667 struct sockaddr
*ndst
;
668 #define senderr(x) { error = x ; goto bad; }
670 lck_mtx_assert(rt_mtx
, LCK_MTX_ASSERT_OWNED
);
672 * Find the correct routing tree to use for this Address Family
674 if ((rnh
= rt_tables
[dst
->sa_family
]) == 0)
677 * If we are adding a host route then we don't want to put
678 * a netmask in the tree
680 if (flags
& RTF_HOST
)
685 * Remove the item from the tree and return it.
686 * Complain if it is not there and do no more processing.
688 if ((rn
= rnh
->rnh_deladdr(dst
, netmask
, rnh
)) == 0)
690 if (rn
->rn_flags
& (RNF_ACTIVE
| RNF_ROOT
))
691 panic ("rtrequest delete");
692 rt
= (struct rtentry
*)rn
;
695 * Now search what's left of the subtree for any cloned
696 * routes which might have been formed from this node.
698 if ((rt
->rt_flags
& (RTF_CLONING
| RTF_PRCLONING
)) &&
700 rnh
->rnh_walktree_from(rnh
, dst
, rt_mask(rt
),
705 * Remove any external references we may have.
706 * This might result in another rtentry being freed if
707 * we held its last reference.
709 if (rt
->rt_gwroute
) {
712 (rt
= (struct rtentry
*)rn
)->rt_gwroute
= 0;
716 * NB: RTF_UP must be set during the search above,
717 * because we might delete the last ref, causing
718 * rt to get freed prematurely.
719 * eh? then why not just add a reference?
720 * I'm not sure how RTF_UP helps matters. (JRE)
722 rt
->rt_flags
&= ~RTF_UP
;
725 * give the protocol a chance to keep things in sync.
727 if ((ifa
= rt
->rt_ifa
) && ifa
->ifa_rtrequest
)
728 ifa
->ifa_rtrequest(RTM_DELETE
, rt
, SA(0));
732 * one more rtentry floating around that is not
733 * linked to the routing table.
738 * If the caller wants it, then it can have it,
739 * but it's up to it to free the rtentry as we won't be
744 else if (rt
->rt_refcnt
<= 0) {
745 rt
->rt_refcnt
++; /* make a 1->0 transition */
751 if (ret_nrt
== 0 || (rt
= *ret_nrt
) == 0)
755 flags
= rt
->rt_flags
&
756 ~(RTF_CLONING
| RTF_PRCLONING
| RTF_STATIC
);
757 flags
|= RTF_WASCLONED
;
758 gateway
= rt
->rt_gateway
;
759 if ((netmask
= rt
->rt_genmask
) == 0)
764 if ((flags
& RTF_GATEWAY
) && !gateway
)
765 panic("rtrequest: GATEWAY but no gateway");
767 if ((ifa
= ifa_ifwithroute(flags
, dst
, gateway
)) == 0)
768 senderr(ENETUNREACH
);
771 if ((rt
= rte_alloc()) == NULL
)
773 Bzero(rt
, sizeof(*rt
));
774 rt
->rt_flags
= RTF_UP
| flags
;
776 * Add the gateway. Possibly re-malloc-ing the storage for it
777 * also add the rt_gwroute if possible.
779 if ((error
= rt_setgate(rt
, dst
, gateway
)) != 0) {
785 * point to the (possibly newly malloc'd) dest address.
790 * make sure it contains the value we want (masked if needed).
793 rt_maskedcopy(dst
, ndst
, netmask
);
795 Bcopy(dst
, ndst
, dst
->sa_len
);
798 * Note that we now have a reference to the ifa.
799 * This moved from below so that rnh->rnh_addaddr() can
800 * examine the ifa and ifa->ifa_ifp if it so desires.
803 rt
->rt_ifp
= rt
->rt_ifa
->ifa_ifp
;
805 /* XXX mtu manipulation will be done in rnh_addaddr -- itojun */
807 rn
= rnh
->rnh_addaddr((caddr_t
)ndst
, (caddr_t
)netmask
,
812 * Uh-oh, we already have one of these in the tree.
813 * We do a special hack: if the route that's already
814 * there was generated by the protocol-cloning
815 * mechanism, then we just blow it away and retry
816 * the insertion of the new one.
818 rt2
= rtalloc1_locked(dst
, 0, RTF_PRCLONING
);
819 if (rt2
&& rt2
->rt_parent
) {
820 rtrequest_locked(RTM_DELETE
,
821 (struct sockaddr
*)rt_key(rt2
),
823 rt_mask(rt2
), rt2
->rt_flags
, 0);
825 rn
= rnh
->rnh_addaddr((caddr_t
)ndst
,
829 /* undo the extra ref we got */
835 * If it still failed to go into the tree,
836 * then un-make it (this should be a function)
840 rtfree_locked(rt
->rt_gwroute
);
852 * If we got here from RESOLVE, then we are cloning
853 * so clone the rest, and note that we
854 * are a clone (and increment the parent's references)
856 if (req
== RTM_RESOLVE
) {
857 rt
->rt_rmx
= (*ret_nrt
)->rt_rmx
; /* copy metrics */
858 if ((*ret_nrt
)->rt_flags
& (RTF_CLONING
| RTF_PRCLONING
)) {
859 rt
->rt_parent
= (*ret_nrt
);
865 * if this protocol has something to add to this then
866 * allow it to do that as well.
868 if (ifa
->ifa_rtrequest
)
869 ifa
->ifa_rtrequest(req
, rt
, SA(ret_nrt
? *ret_nrt
: 0));
874 * We repeat the same procedure from rt_setgate() here because
875 * it doesn't fire when we call it there because the node
876 * hasn't been added to the tree yet.
878 if (!(rt
->rt_flags
& RTF_HOST
) && rt_mask(rt
) != 0) {
882 rnh
->rnh_walktree_from(rnh
, rt_key(rt
), rt_mask(rt
),
887 * actually return a resultant rtentry and
888 * give the caller a single reference.
905 struct sockaddr
*dst
,
906 struct sockaddr
*gateway
,
907 struct sockaddr
*netmask
,
909 struct rtentry
**ret_nrt
)
912 lck_mtx_assert(rt_mtx
, LCK_MTX_ASSERT_NOTOWNED
);
913 lck_mtx_lock(rt_mtx
);
914 error
= rtrequest_locked(req
, dst
, gateway
, netmask
, flags
, ret_nrt
);
915 lck_mtx_unlock(rt_mtx
);
919 * Called from rtrequest(RTM_DELETE, ...) to fix up the route's ``family''
920 * (i.e., the routes related to it by the operation of cloning). This
921 * routine is iterated over all potential former-child-routes by way of
922 * rnh->rnh_walktree_from() above, and those that actually are children of
923 * the late parent (passed in as VP here) are themselves deleted.
927 struct radix_node
*rn
;
930 struct rtentry
*rt
= (struct rtentry
*)rn
;
931 struct rtentry
*rt0
= vp
;
933 lck_mtx_assert(rt_mtx
, LCK_MTX_ASSERT_OWNED
);
935 if (rt
->rt_parent
== rt0
&& !(rt
->rt_flags
& RTF_PINNED
)) {
936 return rtrequest_locked(RTM_DELETE
, rt_key(rt
),
937 (struct sockaddr
*)0, rt_mask(rt
),
938 rt
->rt_flags
, (struct rtentry
**)0);
944 * This routine is called from rt_setgate() to do the analogous thing for
945 * adds and changes. There is the added complication in this case of a
946 * middle insert; i.e., insertion of a new network route between an older
947 * network route and (cloned) host routes. For this reason, a simple check
948 * of rt->rt_parent is insufficient; each candidate route must be tested
949 * against the (mask, value) of the new route (passed as before in vp)
950 * to see if the new route matches it.
952 * XXX - it may be possible to do fixdelete() for changes and reserve this
953 * routine just for adds. I'm not sure why I thought it was necessary to do
957 static int rtfcdebug
= 0;
962 struct radix_node
*rn
;
965 struct rtentry
*rt
= (struct rtentry
*)rn
;
966 struct rtfc_arg
*ap
= vp
;
967 struct rtentry
*rt0
= ap
->rt0
;
968 struct radix_node_head
*rnh
= ap
->rnh
;
969 u_char
*xk1
, *xm1
, *xk2
, *xmp
;
974 printf("rt_fixchange: rt %p, rt0 %p\n", rt
, rt0
);
977 lck_mtx_assert(rt_mtx
, LCK_MTX_ASSERT_OWNED
);
979 if (!rt
->rt_parent
|| (rt
->rt_flags
& RTF_PINNED
)) {
981 if(rtfcdebug
) printf("no parent or pinned\n");
986 if (rt
->rt_parent
== rt0
) {
988 if(rtfcdebug
) printf("parent match\n");
990 return rtrequest_locked(RTM_DELETE
, rt_key(rt
),
991 (struct sockaddr
*)0, rt_mask(rt
),
992 rt
->rt_flags
, (struct rtentry
**)0);
996 * There probably is a function somewhere which does this...
997 * if not, there should be.
999 len
= imin(((struct sockaddr
*)rt_key(rt0
))->sa_len
,
1000 ((struct sockaddr
*)rt_key(rt
))->sa_len
);
1002 xk1
= (u_char
*)rt_key(rt0
);
1003 xm1
= (u_char
*)rt_mask(rt0
);
1004 xk2
= (u_char
*)rt_key(rt
);
1006 /* avoid applying a less specific route */
1007 xmp
= (u_char
*)rt_mask(rt
->rt_parent
);
1008 mlen
= ((struct sockaddr
*)rt_key(rt
->rt_parent
))->sa_len
;
1009 if (mlen
> ((struct sockaddr
*)rt_key(rt0
))->sa_len
) {
1012 printf("rt_fixchange: inserting a less "
1013 "specific route\n");
1017 for (i
= rnh
->rnh_treetop
->rn_offset
; i
< mlen
; i
++) {
1018 if ((xmp
[i
] & ~(xmp
[i
] ^ xm1
[i
])) != xmp
[i
]) {
1021 printf("rt_fixchange: inserting a less "
1022 "specific route\n");
1028 for (i
= rnh
->rnh_treetop
->rn_offset
; i
< len
; i
++) {
1029 if ((xk2
[i
] & xm1
[i
]) != xk1
[i
]) {
1031 if(rtfcdebug
) printf("no match\n");
1038 * OK, this node is a clone, and matches the node currently being
1039 * changed/added under the node's mask. So, get rid of it.
1042 if(rtfcdebug
) printf("deleting\n");
1044 return rtrequest_locked(RTM_DELETE
, rt_key(rt
), (struct sockaddr
*)0,
1045 rt_mask(rt
), rt
->rt_flags
, (struct rtentry
**)0);
1049 rt_setgate(rt0
, dst
, gate
)
1050 struct rtentry
*rt0
;
1051 struct sockaddr
*dst
, *gate
;
1054 int dlen
= ROUNDUP(dst
->sa_len
), glen
= ROUNDUP(gate
->sa_len
);
1055 register struct rtentry
*rt
= rt0
;
1056 struct radix_node_head
*rnh
= rt_tables
[dst
->sa_family
];
1057 extern void kdp_set_gateway_mac (void *gatewaymac
);
1059 * A host route with the destination equal to the gateway
1060 * will interfere with keeping LLINFO in the routing
1061 * table, so disallow it.
1064 lck_mtx_assert(rt_mtx
, LCK_MTX_ASSERT_OWNED
);
1066 if (((rt0
->rt_flags
& (RTF_HOST
|RTF_GATEWAY
|RTF_LLINFO
)) ==
1067 (RTF_HOST
|RTF_GATEWAY
)) &&
1068 (dst
->sa_len
== gate
->sa_len
) &&
1069 (bcmp(dst
, gate
, dst
->sa_len
) == 0)) {
1071 * The route might already exist if this is an RTM_CHANGE
1072 * or a routing redirect, so try to delete it.
1075 rtrequest_locked(RTM_DELETE
, (struct sockaddr
*)rt_key(rt0
),
1076 rt0
->rt_gateway
, rt_mask(rt0
), rt0
->rt_flags
, 0);
1077 return EADDRNOTAVAIL
;
1081 * Both dst and gateway are stored in the same malloc'd chunk
1082 * (If I ever get my hands on....)
1083 * if we need to malloc a new chunk, then keep the old one around
1084 * till we don't need it any more.
1086 if (rt
->rt_gateway
== 0 || glen
> ROUNDUP(rt
->rt_gateway
->sa_len
)) {
1087 old
= (caddr_t
)rt_key(rt
);
1088 R_Malloc(new, caddr_t
, dlen
+ glen
);
1091 rt
->rt_nodes
->rn_key
= new;
1094 * otherwise just overwrite the old one
1096 new = rt
->rt_nodes
->rn_key
;
1101 * copy the new gateway value into the memory chunk
1103 Bcopy(gate
, (rt
->rt_gateway
= (struct sockaddr
*)(new + dlen
)), glen
);
1106 * if we are replacing the chunk (or it's new) we need to
1107 * replace the dst as well
1110 Bcopy(dst
, new, dlen
);
1115 * If there is already a gwroute, it's now almost definitly wrong
1118 if (rt
->rt_gwroute
) {
1119 rt
= rt
->rt_gwroute
; rtfree_locked(rt
);
1120 rt
= rt0
; rt
->rt_gwroute
= 0;
1123 * Cloning loop avoidance:
1124 * In the presence of protocol-cloning and bad configuration,
1125 * it is possible to get stuck in bottomless mutual recursion
1126 * (rtrequest rt_setgate rtalloc1). We avoid this by not allowing
1127 * protocol-cloning to operate for gateways (which is probably the
1128 * correct choice anyway), and avoid the resulting reference loops
1129 * by disallowing any route to run through itself as a gateway.
1130 * This is obviously mandatory when we get rt->rt_output().
1132 if (rt
->rt_flags
& RTF_GATEWAY
) {
1133 rt
->rt_gwroute
= rtalloc1_locked(gate
, 1, RTF_PRCLONING
);
1134 if (rt
->rt_gwroute
== rt
) {
1135 rtfree_locked(rt
->rt_gwroute
);
1137 return EDQUOT
; /* failure */
1139 /* Tell the kernel debugger about the new default gateway */
1140 if ((AF_INET
== rt
->rt_gateway
->sa_family
) &&
1141 rt
->rt_gwroute
&& rt
->rt_gwroute
->rt_gateway
&&
1142 (AF_LINK
== rt
->rt_gwroute
->rt_gateway
->sa_family
)) {
1143 kdp_set_gateway_mac(((struct sockaddr_dl
*)rt0
->rt_gwroute
->rt_gateway
)->sdl_data
);
1148 * This isn't going to do anything useful for host routes, so
1149 * don't bother. Also make sure we have a reasonable mask
1150 * (we don't yet have one during adds).
1152 if (!(rt
->rt_flags
& RTF_HOST
) && rt_mask(rt
) != 0) {
1153 struct rtfc_arg arg
;
1156 rnh
->rnh_walktree_from(rnh
, rt_key(rt
), rt_mask(rt
),
1157 rt_fixchange
, &arg
);
1164 rt_maskedcopy(src
, dst
, netmask
)
1165 struct sockaddr
*src
, *dst
, *netmask
;
1167 register u_char
*cp1
= (u_char
*)src
;
1168 register u_char
*cp2
= (u_char
*)dst
;
1169 register u_char
*cp3
= (u_char
*)netmask
;
1170 u_char
*cplim
= cp2
+ *cp3
;
1171 u_char
*cplim2
= cp2
+ *cp1
;
1173 *cp2
++ = *cp1
++; *cp2
++ = *cp1
++; /* copies sa_len & sa_family */
1178 *cp2
++ = *cp1
++ & *cp3
++;
1180 bzero((caddr_t
)cp2
, (unsigned)(cplim2
- cp2
));
1184 * Set up a routing table entry, normally
1188 rtinit(ifa
, cmd
, flags
)
1189 register struct ifaddr
*ifa
;
1193 lck_mtx_assert(rt_mtx
, LCK_MTX_ASSERT_NOTOWNED
);
1194 lck_mtx_lock(rt_mtx
);
1195 error
= rtinit_locked(ifa
, cmd
, flags
);
1196 lck_mtx_unlock(rt_mtx
);
1201 rtinit_locked(ifa
, cmd
, flags
)
1202 register struct ifaddr
*ifa
;
1205 register struct rtentry
*rt
;
1206 register struct sockaddr
*dst
;
1207 register struct sockaddr
*deldst
;
1209 struct rtentry
*nrt
= 0;
1212 dst
= flags
& RTF_HOST
? ifa
->ifa_dstaddr
: ifa
->ifa_addr
;
1214 * If it's a delete, check that if it exists, it's on the correct
1215 * interface or we might scrub a route to another ifa which would
1216 * be confusing at best and possibly worse.
1218 if (cmd
== RTM_DELETE
) {
1220 * It's a delete, so it should already exist..
1221 * If it's a net, mask off the host bits
1222 * (Assuming we have a mask)
1224 if ((flags
& RTF_HOST
) == 0 && ifa
->ifa_netmask
) {
1225 m
= m_get(M_DONTWAIT
, MT_SONAME
);
1229 deldst
= mtod(m
, struct sockaddr
*);
1230 rt_maskedcopy(dst
, deldst
, ifa
->ifa_netmask
);
1234 * Get an rtentry that is in the routing tree and
1235 * contains the correct info. (if this fails, can't get there).
1236 * We set "report" to FALSE so that if it doesn't exist,
1237 * it doesn't report an error or clone a route, etc. etc.
1239 rt
= rtalloc1_locked(dst
, 0, 0UL);
1242 * Ok so we found the rtentry. it has an extra reference
1243 * for us at this stage. we won't need that so
1247 if (rt
->rt_ifa
!= ifa
) {
1249 * If the interface in the rtentry doesn't match
1250 * the interface we are using, then we don't
1251 * want to delete it, so return an error.
1252 * This seems to be the only point of
1253 * this whole RTM_DELETE clause.
1257 return (flags
& RTF_HOST
? EHOSTUNREACH
1265 * One would think that as we are deleting, and we know
1266 * it doesn't exist, we could just return at this point
1267 * with an "ELSE" clause, but apparently not..
1269 lck_mtx_unlock(rt_mtx
);
1270 return (flags
& RTF_HOST
? EHOSTUNREACH
1276 * Do the actual request
1278 error
= rtrequest_locked(cmd
, dst
, ifa
->ifa_addr
, ifa
->ifa_netmask
,
1279 flags
| ifa
->ifa_flags
, &nrt
);
1283 * If we are deleting, and we found an entry, then
1284 * it's been removed from the tree.. now throw it away.
1286 if (cmd
== RTM_DELETE
&& error
== 0 && (rt
= nrt
)) {
1288 * notify any listenning routing agents of the change
1290 rt_newaddrmsg(cmd
, ifa
, error
, nrt
);
1293 if (rt
->rt_refcnt
<= 0) {
1294 rt
->rt_refcnt
++; /* need a 1->0 transition to free */
1300 * We are adding, and we have a returned routing entry.
1301 * We need to sanity check the result.
1303 if (cmd
== RTM_ADD
&& error
== 0 && (rt
= nrt
)) {
1305 * We just wanted to add it.. we don't actually need a reference
1309 * If it came back with an unexpected interface, then it must
1310 * have already existed or something. (XXX)
1312 if (rt
->rt_ifa
!= ifa
) {
1313 if (!(rt
->rt_ifa
->ifa_ifp
->if_flags
&
1314 (IFF_POINTOPOINT
|IFF_LOOPBACK
)))
1315 printf("rtinit: wrong ifa (%p) was (%p)\n",
1318 * Ask that the protocol in question
1319 * remove anything it has associated with
1320 * this route and ifaddr.
1322 if (rt
->rt_ifa
->ifa_rtrequest
)
1323 rt
->rt_ifa
->ifa_rtrequest(RTM_DELETE
, rt
, SA(0));
1325 * Set the route's ifa.
1329 * And substitute in references to the ifaddr
1332 rt
->rt_ifp
= ifa
->ifa_ifp
;
1333 rt
->rt_rmx
.rmx_mtu
= ifa
->ifa_ifp
->if_mtu
; /*XXX*/
1335 * Now ask the protocol to check if it needs
1336 * any special processing in its new form.
1338 if (ifa
->ifa_rtrequest
)
1339 ifa
->ifa_rtrequest(RTM_ADD
, rt
, SA(0));
1342 * notify any listenning routing agents of the change
1344 rt_newaddrmsg(cmd
, ifa
, error
, nrt
);
1351 static struct rtentry
*
1354 return ((struct rtentry
*)zalloc(rte_zone
));
1358 rte_free(struct rtentry
*p
)
1360 if (p
->rt_refcnt
!= 0)
1361 panic("rte_free: rte=%p refcnt=%d non-zero\n", p
, p
->rt_refcnt
);
1363 bzero((caddr_t
)p
, sizeof (*p
));