xref: /illumos-gate/usr/src/uts/common/inet/ip/ip_ftable.c (revision 134a1f4e)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2010 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 /*
27  * This file contains consumer routines of the IPv4 forwarding engine
28  */
29 
30 #include <sys/types.h>
31 #include <sys/stream.h>
32 #include <sys/stropts.h>
33 #include <sys/strlog.h>
34 #include <sys/dlpi.h>
35 #include <sys/ddi.h>
36 #include <sys/cmn_err.h>
37 #include <sys/policy.h>
38 
39 #include <sys/systm.h>
40 #include <sys/strsun.h>
41 #include <sys/kmem.h>
42 #include <sys/param.h>
43 #include <sys/socket.h>
44 #include <sys/strsubr.h>
45 #include <net/if.h>
46 #include <net/route.h>
47 #include <netinet/in.h>
48 #include <net/if_dl.h>
49 #include <netinet/ip6.h>
50 #include <netinet/icmp6.h>
51 
52 #include <inet/ipsec_impl.h>
53 #include <inet/common.h>
54 #include <inet/mi.h>
55 #include <inet/mib2.h>
56 #include <inet/ip.h>
57 #include <inet/ip_impl.h>
58 #include <inet/ip6.h>
59 #include <inet/ip_ndp.h>
60 #include <inet/arp.h>
61 #include <inet/ip_if.h>
62 #include <inet/ip_ire.h>
63 #include <inet/ip_ftable.h>
64 #include <inet/ip_rts.h>
65 #include <inet/nd.h>
66 
67 #include <net/pfkeyv2.h>
68 #include <inet/sadb.h>
69 #include <inet/tcp.h>
70 #include <inet/ipclassifier.h>
71 #include <sys/zone.h>
72 #include <net/radix.h>
73 #include <sys/tsol/label.h>
74 #include <sys/tsol/tnet.h>
75 
76 #define	IS_DEFAULT_ROUTE(ire)	\
77 	(((ire)->ire_type & IRE_DEFAULT) || \
78 	    (((ire)->ire_type & IRE_INTERFACE) && ((ire)->ire_addr == 0)))
79 
80 #define	IP_SRC_MULTIHOMING(isv6, ipst) 			\
81 	(isv6 ? ipst->ips_ipv6_strict_src_multihoming :	\
82 	ipst->ips_ip_strict_src_multihoming)
83 
84 static ire_t	*route_to_dst(const struct sockaddr *, zoneid_t, ip_stack_t *);
85 static void	ire_del_host_redir(ire_t *, char *);
86 static boolean_t ire_find_best_route(struct radix_node *, void *);
87 
88 /*
89  * Lookup a route in forwarding table. A specific lookup is indicated by
90  * passing the required parameters and indicating the match required in the
91  * flag field.
92  *
93  * Supports IP_BOUND_IF by following the ipif/ill when recursing.
94  */
95 ire_t *
96 ire_ftable_lookup_v4(ipaddr_t addr, ipaddr_t mask, ipaddr_t gateway,
97     int type, const ill_t *ill, zoneid_t zoneid, const ts_label_t *tsl,
98     int flags, uint32_t xmit_hint, ip_stack_t *ipst, uint_t *generationp)
99 {
100 	ire_t *ire;
101 	struct rt_sockaddr rdst, rmask;
102 	struct rt_entry *rt;
103 	ire_ftable_args_t margs;
104 
105 	ASSERT(ill == NULL || !ill->ill_isv6);
106 
107 	/*
108 	 * ire_match_args() will dereference ill if MATCH_IRE_ILL
109 	 * is set.
110 	 */
111 	if ((flags & (MATCH_IRE_ILL|MATCH_IRE_SRC_ILL)) && (ill == NULL))
112 		return (NULL);
113 
114 	bzero(&rdst, sizeof (rdst));
115 	rdst.rt_sin_len = sizeof (rdst);
116 	rdst.rt_sin_family = AF_INET;
117 	rdst.rt_sin_addr.s_addr = addr;
118 
119 	bzero(&rmask, sizeof (rmask));
120 	rmask.rt_sin_len = sizeof (rmask);
121 	rmask.rt_sin_family = AF_INET;
122 	rmask.rt_sin_addr.s_addr = mask;
123 
124 	bzero(&margs, sizeof (margs));
125 	margs.ift_addr = addr;
126 	margs.ift_mask = mask;
127 	margs.ift_gateway = gateway;
128 	margs.ift_type = type;
129 	margs.ift_ill = ill;
130 	margs.ift_zoneid = zoneid;
131 	margs.ift_tsl = tsl;
132 	margs.ift_flags = flags;
133 
134 	/*
135 	 * The flags argument passed to ire_ftable_lookup may cause the
136 	 * search to return, not the longest matching prefix, but the
137 	 * "best matching prefix", i.e., the longest prefix that also
138 	 * satisfies constraints imposed via the permutation of flags
139 	 * passed in. To achieve this, we invoke ire_match_args() on
140 	 * each matching leaf in the  radix tree. ire_match_args is
141 	 * invoked by the callback function ire_find_best_route()
142 	 * We hold the global tree lock in read mode when calling
143 	 * rn_match_args. Before dropping the global tree lock, ensure
144 	 * that the radix node can't be deleted by incrementing ire_refcnt.
145 	 */
146 	RADIX_NODE_HEAD_RLOCK(ipst->ips_ip_ftable);
147 	rt = (struct rt_entry *)ipst->ips_ip_ftable->rnh_matchaddr_args(&rdst,
148 	    ipst->ips_ip_ftable, ire_find_best_route, &margs);
149 	ire = margs.ift_best_ire;
150 	if (rt == NULL) {
151 		RADIX_NODE_HEAD_UNLOCK(ipst->ips_ip_ftable);
152 		return (NULL);
153 	}
154 	ASSERT(ire != NULL);
155 
156 	DTRACE_PROBE2(ire__found, ire_ftable_args_t *, &margs, ire_t *, ire);
157 
158 	/*
159 	 * round-robin only if we have more than one route in the bucket.
160 	 * ips_ip_ecmp_behavior controls when we do ECMP
161 	 *	2:	always
162 	 *	1:	for IRE_DEFAULT and /0 IRE_INTERFACE
163 	 *	0:	never
164 	 */
165 	if (ire->ire_bucket->irb_ire_cnt > 1 && !(flags & MATCH_IRE_GW)) {
166 		if (ipst->ips_ip_ecmp_behavior == 2 ||
167 		    (ipst->ips_ip_ecmp_behavior == 1 &&
168 		    IS_DEFAULT_ROUTE(ire))) {
169 			ire_t	*next_ire;
170 
171 			margs.ift_best_ire = NULL;
172 			next_ire = ire_round_robin(ire->ire_bucket, &margs,
173 			    xmit_hint, ire, ipst);
174 			if (next_ire == NULL) {
175 				/* keep ire if next_ire is null */
176 				goto done;
177 			}
178 			ire_refrele(ire);
179 			ire = next_ire;
180 		}
181 	}
182 
183 done:
184 	/* Return generation before dropping lock */
185 	if (generationp != NULL)
186 		*generationp = ire->ire_generation;
187 
188 	RADIX_NODE_HEAD_UNLOCK(ipst->ips_ip_ftable);
189 
190 	/*
191 	 * For shared-IP zones we need additional checks to what was
192 	 * done in ire_match_args to make sure IRE_LOCALs are handled.
193 	 *
194 	 * When ip_restrict_interzone_loopback is set, then
195 	 * we ensure that IRE_LOCAL are only used for loopback
196 	 * between zones when the logical "Ethernet" would
197 	 * have looped them back. That is, if in the absense of
198 	 * the IRE_LOCAL we would have sent to packet out the
199 	 * same ill.
200 	 */
201 	if ((ire->ire_type & IRE_LOCAL) && zoneid != ALL_ZONES &&
202 	    ire->ire_zoneid != zoneid && ire->ire_zoneid != ALL_ZONES &&
203 	    ipst->ips_ip_restrict_interzone_loopback) {
204 		ire = ire_alt_local(ire, zoneid, tsl, ill, generationp);
205 		ASSERT(ire != NULL);
206 	}
207 	return (ire);
208 }
209 
210 /*
211  * This function is called by
212  * ip_input/ire_route_recursive when doing a route lookup on only the
213  * destination address.
214  *
215  * The optimizations of this function over ire_ftable_lookup are:
216  *	o removing unnecessary flag matching
217  *	o doing longest prefix match instead of overloading it further
218  *	  with the unnecessary "best_prefix_match"
219  *
220  * If no route is found we return IRE_NOROUTE.
221  */
222 ire_t *
223 ire_ftable_lookup_simple_v4(ipaddr_t addr, uint32_t xmit_hint, ip_stack_t *ipst,
224     uint_t *generationp)
225 {
226 	ire_t *ire;
227 	struct rt_sockaddr rdst;
228 	struct rt_entry *rt;
229 	irb_t *irb;
230 
231 	rdst.rt_sin_len = sizeof (rdst);
232 	rdst.rt_sin_family = AF_INET;
233 	rdst.rt_sin_addr.s_addr = addr;
234 
235 	/*
236 	 * This is basically inlining  a simpler version of ire_match_args
237 	 */
238 	RADIX_NODE_HEAD_RLOCK(ipst->ips_ip_ftable);
239 
240 	rt = (struct rt_entry *)ipst->ips_ip_ftable->rnh_matchaddr_args(&rdst,
241 	    ipst->ips_ip_ftable, NULL, NULL);
242 
243 	if (rt == NULL)
244 		goto bad;
245 
246 	irb = &rt->rt_irb;
247 	if (irb->irb_ire_cnt == 0)
248 		goto bad;
249 
250 	rw_enter(&irb->irb_lock, RW_READER);
251 	ire = irb->irb_ire;
252 	if (ire == NULL) {
253 		rw_exit(&irb->irb_lock);
254 		goto bad;
255 	}
256 	while (IRE_IS_CONDEMNED(ire)) {
257 		ire = ire->ire_next;
258 		if (ire == NULL) {
259 			rw_exit(&irb->irb_lock);
260 			goto bad;
261 		}
262 	}
263 
264 	/* we have a ire that matches */
265 	ire_refhold(ire);
266 	rw_exit(&irb->irb_lock);
267 
268 	/*
269 	 * round-robin only if we have more than one route in the bucket.
270 	 * ips_ip_ecmp_behavior controls when we do ECMP
271 	 *	2:	always
272 	 *	1:	for IRE_DEFAULT and /0 IRE_INTERFACE
273 	 *	0:	never
274 	 *
275 	 * Note: if we found an IRE_IF_CLONE we won't look at the bucket with
276 	 * other ECMP IRE_INTERFACEs since the IRE_IF_CLONE is a /128 match
277 	 * and the IRE_INTERFACESs are likely to be shorter matches.
278 	 */
279 	if (ire->ire_bucket->irb_ire_cnt > 1) {
280 		if (ipst->ips_ip_ecmp_behavior == 2 ||
281 		    (ipst->ips_ip_ecmp_behavior == 1 &&
282 		    IS_DEFAULT_ROUTE(ire))) {
283 			ire_t	*next_ire;
284 			ire_ftable_args_t margs;
285 
286 			bzero(&margs, sizeof (margs));
287 			margs.ift_addr = addr;
288 			margs.ift_zoneid = ALL_ZONES;
289 
290 			next_ire = ire_round_robin(ire->ire_bucket, &margs,
291 			    xmit_hint, ire, ipst);
292 			if (next_ire == NULL) {
293 				/* keep ire if next_ire is null */
294 				if (generationp != NULL)
295 					*generationp = ire->ire_generation;
296 				RADIX_NODE_HEAD_UNLOCK(ipst->ips_ip_ftable);
297 				return (ire);
298 			}
299 			ire_refrele(ire);
300 			ire = next_ire;
301 		}
302 	}
303 	/* Return generation before dropping lock */
304 	if (generationp != NULL)
305 		*generationp = ire->ire_generation;
306 
307 	RADIX_NODE_HEAD_UNLOCK(ipst->ips_ip_ftable);
308 
309 	/*
310 	 * Since we only did ALL_ZONES matches there is no special handling
311 	 * of IRE_LOCALs needed here. ire_ftable_lookup_v4 has to handle that.
312 	 */
313 	return (ire);
314 
315 bad:
316 	if (generationp != NULL)
317 		*generationp = IRE_GENERATION_VERIFY;
318 
319 	RADIX_NODE_HEAD_UNLOCK(ipst->ips_ip_ftable);
320 	return (ire_reject(ipst, B_FALSE));
321 }
322 
323 /*
324  * Find the ill matching a multicast group.
325  * Allows different routes for multicast addresses
326  * in the unicast routing table (akin to 224.0.0.0 but could be more specific)
327  * which point at different interfaces. This is used when IP_MULTICAST_IF
328  * isn't specified (when sending) and when IP_ADD_MEMBERSHIP doesn't
329  * specify the interface to join on.
330  *
331  * Supports link-local addresses by using ire_route_recursive which follows
332  * the ill when recursing.
333  *
334  * To handle CGTP, since we don't have a separate IRE_MULTICAST for each group
335  * and the MULTIRT property can be different for different groups, we
336  * extract RTF_MULTIRT from the special unicast route added for a group
337  * with CGTP and pass that back in the multirtp argument.
338  * This is used in ip_set_destination etc to set ixa_postfragfn for multicast.
339  * We have a setsrcp argument for the same reason.
340  */
341 ill_t *
342 ire_lookup_multi_ill_v4(ipaddr_t group, zoneid_t zoneid, ip_stack_t *ipst,
343     boolean_t *multirtp, ipaddr_t *setsrcp)
344 {
345 	ire_t	*ire;
346 	ill_t	*ill;
347 
348 	ire = ire_route_recursive_v4(group, 0, NULL, zoneid, NULL,
349 	    MATCH_IRE_DSTONLY, IRR_NONE, 0, ipst, setsrcp, NULL, NULL);
350 	ASSERT(ire != NULL);
351 	if (ire->ire_flags & (RTF_REJECT|RTF_BLACKHOLE)) {
352 		ire_refrele(ire);
353 		return (NULL);
354 	}
355 
356 	if (multirtp != NULL)
357 		*multirtp = (ire->ire_flags & RTF_MULTIRT) != 0;
358 
359 	ill = ire_nexthop_ill(ire);
360 	ire_refrele(ire);
361 	return (ill);
362 }
363 
364 /*
365  * Delete the passed in ire if the gateway addr matches
366  */
367 void
368 ire_del_host_redir(ire_t *ire, char *gateway)
369 {
370 	if ((ire->ire_flags & RTF_DYNAMIC) &&
371 	    (ire->ire_gateway_addr == *(ipaddr_t *)gateway))
372 		ire_delete(ire);
373 }
374 
375 /*
376  * Search for all IRE_HOST RTF_DYNAMIC (aka redirect) routes that are
377  * pointing at the specified gateway and
378  * delete them. This routine is called only
379  * when a default gateway is going away.
380  */
381 void
382 ire_delete_host_redirects(ipaddr_t gateway, ip_stack_t *ipst)
383 {
384 	struct rtfuncarg rtfarg;
385 
386 	bzero(&rtfarg, sizeof (rtfarg));
387 	rtfarg.rt_func = ire_del_host_redir;
388 	rtfarg.rt_arg = (void *)&gateway;
389 	rtfarg.rt_zoneid = ALL_ZONES;
390 	rtfarg.rt_ipst = ipst;
391 	(void) ipst->ips_ip_ftable->rnh_walktree_mt(ipst->ips_ip_ftable,
392 	    rtfunc, &rtfarg, irb_refhold_rn, irb_refrele_rn);
393 }
394 
395 /*
396  * Obtain the rt_entry and rt_irb for the route to be added to
397  * the ips_ip_ftable.
398  * First attempt to add a node to the radix tree via rn_addroute. If the
399  * route already exists, return the bucket for the existing route.
400  *
401  * Locking notes: Need to hold the global radix tree lock in write mode to
402  * add a radix node. To prevent the node from being deleted, ire_get_bucket()
403  * returns with a ref'ed irb_t. The ire itself is added in ire_add_v4()
404  * while holding the irb_lock, but not the radix tree lock.
405  */
406 irb_t *
407 ire_get_bucket(ire_t *ire)
408 {
409 	struct radix_node *rn;
410 	struct rt_entry *rt;
411 	struct rt_sockaddr rmask, rdst;
412 	irb_t *irb = NULL;
413 	ip_stack_t *ipst = ire->ire_ipst;
414 
415 	ASSERT(ipst->ips_ip_ftable != NULL);
416 
417 	/* first try to see if route exists (based on rtalloc1) */
418 	bzero(&rdst, sizeof (rdst));
419 	rdst.rt_sin_len = sizeof (rdst);
420 	rdst.rt_sin_family = AF_INET;
421 	rdst.rt_sin_addr.s_addr = ire->ire_addr;
422 
423 	bzero(&rmask, sizeof (rmask));
424 	rmask.rt_sin_len = sizeof (rmask);
425 	rmask.rt_sin_family = AF_INET;
426 	rmask.rt_sin_addr.s_addr = ire->ire_mask;
427 
428 	/*
429 	 * add the route. based on BSD's rtrequest1(RTM_ADD)
430 	 */
431 	R_Malloc(rt, rt_entry_cache,  sizeof (*rt));
432 	/* kmem_alloc failed */
433 	if (rt == NULL)
434 		return (NULL);
435 
436 	bzero(rt, sizeof (*rt));
437 	rt->rt_nodes->rn_key = (char *)&rt->rt_dst;
438 	rt->rt_dst = rdst;
439 	irb = &rt->rt_irb;
440 	irb->irb_marks |= IRB_MARK_DYNAMIC; /* dynamically allocated/freed */
441 	irb->irb_ipst = ipst;
442 	rw_init(&irb->irb_lock, NULL, RW_DEFAULT, NULL);
443 	RADIX_NODE_HEAD_WLOCK(ipst->ips_ip_ftable);
444 	rn = ipst->ips_ip_ftable->rnh_addaddr(&rt->rt_dst, &rmask,
445 	    ipst->ips_ip_ftable, (struct radix_node *)rt);
446 	if (rn == NULL) {
447 		RADIX_NODE_HEAD_UNLOCK(ipst->ips_ip_ftable);
448 		Free(rt, rt_entry_cache);
449 		rt = NULL;
450 		irb = NULL;
451 		RADIX_NODE_HEAD_RLOCK(ipst->ips_ip_ftable);
452 		rn = ipst->ips_ip_ftable->rnh_lookup(&rdst, &rmask,
453 		    ipst->ips_ip_ftable);
454 		if (rn != NULL && ((rn->rn_flags & RNF_ROOT) == 0)) {
455 			/* found a non-root match */
456 			rt = (struct rt_entry *)rn;
457 		}
458 	}
459 	if (rt != NULL) {
460 		irb = &rt->rt_irb;
461 		irb_refhold(irb);
462 	}
463 	RADIX_NODE_HEAD_UNLOCK(ipst->ips_ip_ftable);
464 	return (irb);
465 }
466 
467 /*
468  * This function is used when the caller wants to know the outbound
469  * interface for a packet given only the address.
470  * If this is a offlink IP address and there are multiple
471  * routes to this destination, this routine will utilise the
472  * first route it finds to IP address
473  * Return values:
474  * 	0	- FAILURE
475  *	nonzero	- ifindex
476  */
477 uint_t
478 ifindex_lookup(const struct sockaddr *ipaddr, zoneid_t zoneid)
479 {
480 	uint_t ifindex = 0;
481 	ire_t *ire;
482 	ill_t *ill;
483 	netstack_t *ns;
484 	ip_stack_t *ipst;
485 
486 	if (zoneid == ALL_ZONES)
487 		ns = netstack_find_by_zoneid(GLOBAL_ZONEID);
488 	else
489 		ns = netstack_find_by_zoneid(zoneid);
490 	ASSERT(ns != NULL);
491 
492 	/*
493 	 * For exclusive stacks we set the zoneid to zero
494 	 * since IP uses the global zoneid in the exclusive stacks.
495 	 */
496 	if (ns->netstack_stackid != GLOBAL_NETSTACKID)
497 		zoneid = GLOBAL_ZONEID;
498 	ipst = ns->netstack_ip;
499 
500 	ASSERT(ipaddr->sa_family == AF_INET || ipaddr->sa_family == AF_INET6);
501 
502 	if ((ire = route_to_dst(ipaddr, zoneid, ipst)) != NULL) {
503 		ill = ire_nexthop_ill(ire);
504 		if (ill != NULL) {
505 			ifindex = ill->ill_phyint->phyint_ifindex;
506 			ill_refrele(ill);
507 		}
508 		ire_refrele(ire);
509 	}
510 	netstack_rele(ns);
511 	return (ifindex);
512 }
513 
514 /*
515  * Routine to find the route to a destination. If a ifindex is supplied
516  * it tries to match the route to the corresponding ipif for the ifindex
517  */
518 static	ire_t *
519 route_to_dst(const struct sockaddr *dst_addr, zoneid_t zoneid, ip_stack_t *ipst)
520 {
521 	ire_t *ire = NULL;
522 	int match_flags;
523 
524 	match_flags = MATCH_IRE_DSTONLY;
525 
526 	/* XXX pass NULL tsl for now */
527 
528 	if (dst_addr->sa_family == AF_INET) {
529 		ire = ire_route_recursive_v4(
530 		    ((struct sockaddr_in *)dst_addr)->sin_addr.s_addr, 0, NULL,
531 		    zoneid, NULL, match_flags, IRR_ALLOCATE, 0, ipst, NULL,
532 		    NULL, NULL);
533 	} else {
534 		ire = ire_route_recursive_v6(
535 		    &((struct sockaddr_in6 *)dst_addr)->sin6_addr, 0, NULL,
536 		    zoneid, NULL, match_flags, IRR_ALLOCATE, 0, ipst, NULL,
537 		    NULL, NULL);
538 	}
539 	ASSERT(ire != NULL);
540 	if (ire->ire_flags & (RTF_REJECT|RTF_BLACKHOLE)) {
541 		ire_refrele(ire);
542 		return (NULL);
543 	}
544 	return (ire);
545 }
546 
547 /*
548  * This routine is called by IP Filter to send a packet out on the wire
549  * to a specified dstination (which may be onlink or offlink). The ifindex may
550  * or may not be 0. A non-null ifindex indicates IP Filter has stipulated
551  * an outgoing interface and requires the nexthop to be on that interface.
552  * IP WILL NOT DO the following to the data packet before sending it out:
553  *	a. manipulate ttl
554  *	b. ipsec work
555  *	c. fragmentation
556  *
557  * If the packet has been prepared for hardware checksum then it will be
558  * passed off to ip_send_align_cksum() to check that the flags set on the
559  * packet are in alignment with the capabilities of the new outgoing NIC.
560  *
561  * Return values:
562  *	0:		IP was able to send of the data pkt
563  *	ECOMM:		Could not send packet
564  *	ENONET		No route to dst. It is up to the caller
565  *			to send icmp unreachable error message,
566  *	EINPROGRESS	The macaddr of the onlink dst or that
567  *			of the offlink dst's nexthop needs to get
568  *			resolved before packet can be sent to dst.
569  *			Thus transmission is not guaranteed.
570  *			Note: No longer have visibility to the ARP queue
571  *			hence no EINPROGRESS.
572  */
573 int
574 ipfil_sendpkt(const struct sockaddr *dst_addr, mblk_t *mp, uint_t ifindex,
575     zoneid_t zoneid)
576 {
577 	ipaddr_t nexthop;
578 	netstack_t *ns;
579 	ip_stack_t *ipst;
580 	ip_xmit_attr_t ixas;
581 	int error;
582 
583 	ASSERT(mp != NULL);
584 
585 	if (zoneid == ALL_ZONES)
586 		ns = netstack_find_by_zoneid(GLOBAL_ZONEID);
587 	else
588 		ns = netstack_find_by_zoneid(zoneid);
589 	ASSERT(ns != NULL);
590 
591 	/*
592 	 * For exclusive stacks we set the zoneid to zero
593 	 * since IP uses the global zoneid in the exclusive stacks.
594 	 */
595 	if (ns->netstack_stackid != GLOBAL_NETSTACKID)
596 		zoneid = GLOBAL_ZONEID;
597 	ipst = ns->netstack_ip;
598 
599 	ASSERT(dst_addr->sa_family == AF_INET ||
600 	    dst_addr->sa_family == AF_INET6);
601 
602 	bzero(&ixas, sizeof (ixas));
603 	/*
604 	 * No IPsec, no fragmentation, and don't let any hooks see
605 	 * the packet.
606 	 */
607 	ixas.ixa_flags = IXAF_NO_IPSEC | IXAF_DONTFRAG | IXAF_NO_PFHOOK;
608 	ixas.ixa_cred = kcred;
609 	ixas.ixa_cpid = NOPID;
610 	ixas.ixa_tsl = NULL;
611 	ixas.ixa_ipst = ipst;
612 	ixas.ixa_ifindex = ifindex;
613 
614 	if (dst_addr->sa_family == AF_INET) {
615 		ipha_t *ipha = (ipha_t *)mp->b_rptr;
616 
617 		ixas.ixa_flags |= IXAF_IS_IPV4;
618 		nexthop = ((struct sockaddr_in *)dst_addr)->sin_addr.s_addr;
619 		if (nexthop != ipha->ipha_dst) {
620 			ixas.ixa_flags |= IXAF_NEXTHOP_SET;
621 			ixas.ixa_nexthop_v4 = nexthop;
622 		}
623 		ixas.ixa_multicast_ttl = ipha->ipha_ttl;
624 	} else {
625 		ip6_t *ip6h = (ip6_t *)mp->b_rptr;
626 		in6_addr_t *nexthop6;
627 
628 		nexthop6 = &((struct sockaddr_in6 *)dst_addr)->sin6_addr;
629 		if (!IN6_ARE_ADDR_EQUAL(nexthop6, &ip6h->ip6_dst)) {
630 			ixas.ixa_flags |= IXAF_NEXTHOP_SET;
631 			ixas.ixa_nexthop_v6 = *nexthop6;
632 		}
633 		ixas.ixa_multicast_ttl = ip6h->ip6_hops;
634 	}
635 	error = ip_output_simple(mp, &ixas);
636 	ixa_cleanup(&ixas);
637 
638 	netstack_rele(ns);
639 	switch (error) {
640 	case 0:
641 		break;
642 
643 	case EHOSTUNREACH:
644 	case ENETUNREACH:
645 		error = ENONET;
646 		break;
647 
648 	default:
649 		error = ECOMM;
650 		break;
651 	}
652 	return (error);
653 }
654 
655 /*
656  * callback function provided by ire_ftable_lookup when calling
657  * rn_match_args(). Invoke ire_match_args on each matching leaf node in
658  * the radix tree.
659  */
660 boolean_t
661 ire_find_best_route(struct radix_node *rn, void *arg)
662 {
663 	struct rt_entry *rt = (struct rt_entry *)rn;
664 	irb_t *irb_ptr;
665 	ire_t *ire;
666 	ire_ftable_args_t *margs = arg;
667 	ipaddr_t match_mask;
668 
669 	ASSERT(rt != NULL);
670 
671 	irb_ptr = &rt->rt_irb;
672 
673 	if (irb_ptr->irb_ire_cnt == 0)
674 		return (B_FALSE);
675 
676 	rw_enter(&irb_ptr->irb_lock, RW_READER);
677 	for (ire = irb_ptr->irb_ire; ire != NULL; ire = ire->ire_next) {
678 		if (IRE_IS_CONDEMNED(ire))
679 			continue;
680 		ASSERT((margs->ift_flags & MATCH_IRE_SHORTERMASK) == 0);
681 		if (margs->ift_flags & MATCH_IRE_MASK)
682 			match_mask = margs->ift_mask;
683 		else
684 			match_mask = ire->ire_mask;
685 
686 		if (ire_match_args(ire, margs->ift_addr, match_mask,
687 		    margs->ift_gateway, margs->ift_type, margs->ift_ill,
688 		    margs->ift_zoneid, margs->ift_tsl,
689 		    margs->ift_flags)) {
690 			ire_refhold(ire);
691 			rw_exit(&irb_ptr->irb_lock);
692 			margs->ift_best_ire = ire;
693 			return (B_TRUE);
694 		}
695 	}
696 	rw_exit(&irb_ptr->irb_lock);
697 	return (B_FALSE);
698 }
699 
700 /*
701  * ftable irb_t structures are dynamically allocated, and we need to
702  * check if the irb_t (and associated ftable tree attachment) needs to
703  * be cleaned up when the irb_refcnt goes to 0. The conditions that need
704  * be verified are:
705  * - no other walkers of the irebucket, i.e., quiescent irb_refcnt,
706  * - no other threads holding references to ire's in the bucket,
707  *   i.e., irb_nire == 0
708  * - no active ire's in the bucket, i.e., irb_ire_cnt == 0
709  * - need to hold the global tree lock and irb_lock in write mode.
710  */
711 void
712 irb_refrele_ftable(irb_t *irb)
713 {
714 	for (;;) {
715 		rw_enter(&irb->irb_lock, RW_WRITER);
716 		ASSERT(irb->irb_refcnt != 0);
717 		if (irb->irb_refcnt != 1) {
718 			/*
719 			 * Someone has a reference to this radix node
720 			 * or there is some bucket walker.
721 			 */
722 			irb->irb_refcnt--;
723 			rw_exit(&irb->irb_lock);
724 			return;
725 		} else {
726 			/*
727 			 * There is no other walker, nor is there any
728 			 * other thread that holds a direct ref to this
729 			 * radix node. Do the clean up if needed. Call
730 			 * to ire_unlink will clear the IRB_MARK_CONDEMNED flag
731 			 */
732 			if (irb->irb_marks & IRB_MARK_CONDEMNED)  {
733 				ire_t *ire_list;
734 
735 				ire_list = ire_unlink(irb);
736 				rw_exit(&irb->irb_lock);
737 
738 				if (ire_list != NULL)
739 					ire_cleanup(ire_list);
740 				/*
741 				 * more CONDEMNED entries could have
742 				 * been added while we dropped the lock,
743 				 * so we have to re-check.
744 				 */
745 				continue;
746 			}
747 
748 			/*
749 			 * Now check if there are still any ires
750 			 * associated with this radix node.
751 			 */
752 			if (irb->irb_nire != 0) {
753 				/*
754 				 * someone is still holding on
755 				 * to ires in this bucket
756 				 */
757 				irb->irb_refcnt--;
758 				rw_exit(&irb->irb_lock);
759 				return;
760 			} else {
761 				/*
762 				 * Everything is clear. Zero walkers,
763 				 * Zero threads with a ref to this
764 				 * radix node, Zero ires associated with
765 				 * this radix node. Due to lock order,
766 				 * check the above conditions again
767 				 * after grabbing all locks in the right order
768 				 */
769 				rw_exit(&irb->irb_lock);
770 				if (irb_inactive(irb))
771 					return;
772 				/*
773 				 * irb_inactive could not free the irb.
774 				 * See if there are any walkers, if not
775 				 * try to clean up again.
776 				 */
777 			}
778 		}
779 	}
780 }
781 
782 /*
783  * IRE iterator used by ire_ftable_lookup to process multiple equal
784  * routes. Given a starting point in the hash list (hash), walk the IREs
785  * in the bucket skipping deleted entries. We treat the bucket as a circular
786  * list for the purposes of walking it.
787  * Returns the IRE (held) that corresponds to the hash value. If that IRE is
788  * not applicable (ire_match_args failed) then it returns a subsequent one.
789  * If we fail to find an IRE we return NULL.
790  *
791  * Assumes that the caller holds a reference on the IRE bucket and a read lock
792  * on the radix_node_head (for IPv4) or the ip6_ire_head (for IPv6).
793  *
794  * Applies to IPv4 and IPv6.
795  *
796  * For CGTP, where an IRE_BROADCAST and IRE_HOST can exist for the same
797  * address and bucket, we compare against ire_type for the orig_ire. We also
798  * have IRE_BROADCASTs with and without RTF_MULTIRT, with the former being
799  * first in the bucket. Thus we compare that RTF_MULTIRT match the orig_ire.
800  *
801  * Due to shared-IP zones we check that an IRE_OFFLINK has a gateway that is
802  * reachable from the zone i.e., that the ire_gateway_addr is in a subnet
803  * in which the zone has an IP address. We check this for the global zone
804  * even if no shared-IP zones are configured.
805  */
806 ire_t *
807 ire_round_robin(irb_t *irb_ptr, ire_ftable_args_t *margs, uint_t hash,
808     ire_t *orig_ire, ip_stack_t *ipst)
809 {
810 	ire_t		*ire, *maybe_ire = NULL;
811 	uint_t		maybe_badcnt;
812 	uint_t		maxwalk;
813 
814 	/* Fold in more bits from the hint/hash */
815 	hash = hash ^ (hash >> 8) ^ (hash >> 16);
816 
817 	rw_enter(&irb_ptr->irb_lock, RW_WRITER);
818 	maxwalk = irb_ptr->irb_ire_cnt;	/* Excludes condemned */
819 	hash %= maxwalk;
820 	irb_refhold_locked(irb_ptr);
821 	rw_exit(&irb_ptr->irb_lock);
822 
823 	/*
824 	 * Round-robin the routers list looking for a route that
825 	 * matches the passed in parameters.
826 	 * First we skip "hash" number of non-condemned IREs.
827 	 * Then we match the IRE.
828 	 * If we find an ire which has a non-zero ire_badcnt then we remember
829 	 * it and keep on looking for a lower ire_badcnt.
830 	 * If we come to the end of the list we continue (treat the
831 	 * bucket list as a circular list) but we match less than "max"
832 	 * entries.
833 	 */
834 	ire = irb_ptr->irb_ire;
835 	while (maxwalk > 0) {
836 		if (IRE_IS_CONDEMNED(ire))
837 			goto next_ire_skip;
838 
839 		/* Skip the first "hash" entries to do ECMP */
840 		if (hash != 0) {
841 			hash--;
842 			goto next_ire_skip;
843 		}
844 
845 		/* See CGTP comment above */
846 		if (ire->ire_type != orig_ire->ire_type ||
847 		    ((ire->ire_flags ^ orig_ire->ire_flags) & RTF_MULTIRT) != 0)
848 			goto next_ire;
849 
850 		/*
851 		 * Note: Since IPv6 has hash buckets instead of radix
852 		 * buckers we need to explicitly compare the addresses.
853 		 * That makes this less efficient since we will be called
854 		 * even if there is no alternatives just because the
855 		 * bucket has multiple IREs for different addresses.
856 		 */
857 		if (ire->ire_ipversion == IPV6_VERSION) {
858 			if (!IN6_ARE_ADDR_EQUAL(&orig_ire->ire_addr_v6,
859 			    &ire->ire_addr_v6))
860 				goto next_ire;
861 		}
862 
863 		/*
864 		 * For some reason find_best_route uses ire_mask. We do
865 		 * the same.
866 		 */
867 		if (ire->ire_ipversion == IPV4_VERSION ?
868 		    !ire_match_args(ire, margs->ift_addr,
869 		    ire->ire_mask, margs->ift_gateway,
870 		    margs->ift_type, margs->ift_ill, margs->ift_zoneid,
871 		    margs->ift_tsl, margs->ift_flags) :
872 		    !ire_match_args_v6(ire, &margs->ift_addr_v6,
873 		    &ire->ire_mask_v6, &margs->ift_gateway_v6,
874 		    margs->ift_type, margs->ift_ill, margs->ift_zoneid,
875 		    margs->ift_tsl, margs->ift_flags))
876 			goto next_ire;
877 
878 		if (margs->ift_zoneid != ALL_ZONES &&
879 		    (ire->ire_type & IRE_OFFLINK)) {
880 			/*
881 			 * When we're in a zone, we're only
882 			 * interested in routers that are
883 			 * reachable through ipifs within our zone.
884 			 */
885 			if (ire->ire_ipversion == IPV4_VERSION) {
886 				if (!ire_gateway_ok_zone_v4(
887 				    ire->ire_gateway_addr, margs->ift_zoneid,
888 				    ire->ire_ill, margs->ift_tsl, ipst,
889 				    B_TRUE))
890 					goto next_ire;
891 			} else {
892 				if (!ire_gateway_ok_zone_v6(
893 				    &ire->ire_gateway_addr_v6,
894 				    margs->ift_zoneid, ire->ire_ill,
895 				    margs->ift_tsl, ipst, B_TRUE))
896 					goto next_ire;
897 			}
898 		}
899 		mutex_enter(&ire->ire_lock);
900 		/* Look for stale ire_badcnt and clear */
901 		if (ire->ire_badcnt != 0 &&
902 		    (TICK_TO_SEC(ddi_get_lbolt64()) - ire->ire_last_badcnt >
903 		    ipst->ips_ip_ire_badcnt_lifetime))
904 			ire->ire_badcnt = 0;
905 		mutex_exit(&ire->ire_lock);
906 
907 		if (ire->ire_badcnt == 0) {
908 			/* We found one with a zero badcnt; done */
909 			ire_refhold(ire);
910 			/*
911 			 * Care needed since irb_refrele grabs WLOCK to free
912 			 * the irb_t.
913 			 */
914 			if (ire->ire_ipversion == IPV4_VERSION) {
915 				RADIX_NODE_HEAD_UNLOCK(ipst->ips_ip_ftable);
916 				irb_refrele(irb_ptr);
917 				RADIX_NODE_HEAD_RLOCK(ipst->ips_ip_ftable);
918 			} else {
919 				rw_exit(&ipst->ips_ip6_ire_head_lock);
920 				irb_refrele(irb_ptr);
921 				rw_enter(&ipst->ips_ip6_ire_head_lock,
922 				    RW_READER);
923 			}
924 			return (ire);
925 		}
926 		/*
927 		 * keep looking to see if there is a better (lower
928 		 * badcnt) matching IRE, but save this one as a last resort.
929 		 * If we find a lower badcnt pick that one as the last* resort.
930 		 */
931 		if (maybe_ire == NULL) {
932 			maybe_ire = ire;
933 			maybe_badcnt = ire->ire_badcnt;
934 		} else if (ire->ire_badcnt < maybe_badcnt) {
935 			maybe_ire = ire;
936 			maybe_badcnt = ire->ire_badcnt;
937 		}
938 
939 next_ire:
940 		maxwalk--;
941 next_ire_skip:
942 		ire = ire->ire_next;
943 		if (ire == NULL)
944 			ire = irb_ptr->irb_ire;
945 	}
946 	if (maybe_ire != NULL)
947 		ire_refhold(maybe_ire);
948 
949 	/* Care needed since irb_refrele grabs WLOCK to free the irb_t. */
950 	if (ire->ire_ipversion == IPV4_VERSION) {
951 		RADIX_NODE_HEAD_UNLOCK(ipst->ips_ip_ftable);
952 		irb_refrele(irb_ptr);
953 		RADIX_NODE_HEAD_RLOCK(ipst->ips_ip_ftable);
954 	} else {
955 		rw_exit(&ipst->ips_ip6_ire_head_lock);
956 		irb_refrele(irb_ptr);
957 		rw_enter(&ipst->ips_ip6_ire_head_lock, RW_READER);
958 	}
959 	return (maybe_ire);
960 }
961 
962 void
963 irb_refhold_rn(struct radix_node *rn)
964 {
965 	if ((rn->rn_flags & RNF_ROOT) == 0)
966 		irb_refhold(&((rt_t *)(rn))->rt_irb);
967 }
968 
969 void
970 irb_refrele_rn(struct radix_node *rn)
971 {
972 	if ((rn->rn_flags & RNF_ROOT) == 0)
973 		irb_refrele_ftable(&((rt_t *)(rn))->rt_irb);
974 }
975 
976 
977 /*
978  * ip_select_src_ill() is used by ip_select_route() to find the src_ill
979  * to be used for source-aware routing table lookup. This function will
980  * ignore IPIF_UNNUMBERED interface addresses, and will only return a
981  * numbered interface (ipif_lookup_addr_nondup() will ignore UNNUMBERED
982  * interfaces).
983  */
984 static ill_t *
985 ip_select_src_ill(const in6_addr_t *v6src, zoneid_t zoneid, ip_stack_t *ipst)
986 {
987 	ipif_t *ipif;
988 	ill_t *ill;
989 	boolean_t isv6 = !IN6_IS_ADDR_V4MAPPED(v6src);
990 	ipaddr_t v4src;
991 
992 	if (isv6) {
993 		ipif = ipif_lookup_addr_nondup_v6(v6src, NULL, zoneid, ipst);
994 	} else {
995 		IN6_V4MAPPED_TO_IPADDR(v6src, v4src);
996 		ipif = ipif_lookup_addr_nondup(v4src, NULL, zoneid, ipst);
997 	}
998 	if (ipif == NULL)
999 		return (NULL);
1000 	ill = ipif->ipif_ill;
1001 	ill_refhold(ill);
1002 	ipif_refrele(ipif);
1003 	return (ill);
1004 }
1005 
1006 /*
1007  * verify that v6src is configured on ill
1008  */
1009 static boolean_t
1010 ip_verify_src_on_ill(const in6_addr_t v6src, ill_t *ill, zoneid_t zoneid)
1011 {
1012 	ipif_t *ipif;
1013 	ip_stack_t *ipst;
1014 	ipaddr_t v4src;
1015 
1016 	if (ill == NULL)
1017 		return (B_FALSE);
1018 	ipst = ill->ill_ipst;
1019 
1020 	if (ill->ill_isv6) {
1021 		ipif = ipif_lookup_addr_nondup_v6(&v6src, ill, zoneid, ipst);
1022 	} else {
1023 		IN6_V4MAPPED_TO_IPADDR(&v6src, v4src);
1024 		ipif = ipif_lookup_addr_nondup(v4src, ill, zoneid, ipst);
1025 	}
1026 
1027 	if (ipif != NULL) {
1028 		ipif_refrele(ipif);
1029 		return (B_TRUE);
1030 	} else {
1031 		return (B_FALSE);
1032 	}
1033 }
1034 
1035 /*
1036  * Select a route for IPv4 and IPv6. Except for multicast, loopback and reject
1037  * routes this routine sets up a ire_nce_cache as well. The caller needs to
1038  * lookup an nce for the multicast case.
1039  *
1040  * When src_multihoming is set to 2 (strict src multihoming) we use the source
1041  * address to select the interface and route. If IP_BOUND_IF etc are
1042  * specified, we require that they specify an interface on which the
1043  * source address is assigned.
1044  *
1045  * When src_multihoming is set to 1 (preferred src aware route
1046  * selection)  the unicast lookup prefers a matching source
1047  * (i.e., that the route points out an ill on which the source is assigned), but
1048  * if no such route is found we fallback to not considering the source in the
1049  * route lookup.
1050  *
1051  * We skip the src_multihoming check when the source isn't (yet) set, and
1052  * when IXAF_VERIFY_SOURCE is not set. The latter allows RAW sockets to send
1053  * with bogus source addresses as allowed by IP_HDRINCL and IPV6_PKTINFO
1054  * when secpolicy_net_rawaccess().
1055  */
1056 ire_t *
1057 ip_select_route(const in6_addr_t *v6dst, const in6_addr_t v6src,
1058     ip_xmit_attr_t *ixa, uint_t *generationp, in6_addr_t *setsrcp,
1059     int *errorp, boolean_t *multirtp)
1060 {
1061 	uint_t		match_args;
1062 	uint_t		ire_type;
1063 	ill_t		*ill = NULL;
1064 	ire_t		*ire;
1065 	ip_stack_t	*ipst = ixa->ixa_ipst;
1066 	ipaddr_t	v4dst;
1067 	in6_addr_t	v6nexthop;
1068 	iaflags_t	ixaflags = ixa->ixa_flags;
1069 	nce_t		*nce;
1070 	boolean_t	preferred_src_aware = B_FALSE;
1071 	boolean_t	verify_src;
1072 	boolean_t	isv6 = !(ixa->ixa_flags & IXAF_IS_IPV4);
1073 	int		src_multihoming = IP_SRC_MULTIHOMING(isv6, ipst);
1074 
1075 	/*
1076 	 * We only verify that the src has been configured on a selected
1077 	 * interface if the src is not :: or INADDR_ANY, and if the
1078 	 * IXAF_VERIFY_SOURCE flag is set.
1079 	 */
1080 	verify_src = (!V6_OR_V4_INADDR_ANY(v6src) &&
1081 	    (ixa->ixa_flags & IXAF_VERIFY_SOURCE));
1082 
1083 	match_args = MATCH_IRE_SECATTR;
1084 	IN6_V4MAPPED_TO_IPADDR(v6dst, v4dst);
1085 	if (setsrcp != NULL)
1086 		ASSERT(IN6_IS_ADDR_UNSPECIFIED(setsrcp));
1087 	if (errorp != NULL)
1088 		ASSERT(*errorp == 0);
1089 
1090 	/*
1091 	 * The content of the ixa will be different if IP_NEXTHOP,
1092 	 * SO_DONTROUTE, IP_BOUND_IF, IP_PKTINFO etc are set
1093 	 */
1094 
1095 	if (isv6 ? IN6_IS_ADDR_MULTICAST(v6dst) : CLASSD(v4dst)) {
1096 		/* Pick up the IRE_MULTICAST for the ill */
1097 		if (ixa->ixa_multicast_ifindex != 0) {
1098 			ill = ill_lookup_on_ifindex(ixa->ixa_multicast_ifindex,
1099 			    isv6, ipst);
1100 		} else if (ixaflags & IXAF_SCOPEID_SET) {
1101 			/* sin6_scope_id takes precedence over ixa_ifindex */
1102 			ASSERT(ixa->ixa_scopeid != 0);
1103 			ill = ill_lookup_on_ifindex(ixa->ixa_scopeid,
1104 			    isv6, ipst);
1105 		} else if (ixa->ixa_ifindex != 0) {
1106 			/*
1107 			 * In the ipmp case, the ixa_ifindex is set to
1108 			 * point at an under_ill and we would return the
1109 			 * ire_multicast() corresponding to that under_ill.
1110 			 */
1111 			ill = ill_lookup_on_ifindex(ixa->ixa_ifindex,
1112 			    isv6, ipst);
1113 		} else if (src_multihoming != 0 && verify_src) {
1114 			/* Look up the ill based on the source address */
1115 			ill = ip_select_src_ill(&v6src, ixa->ixa_zoneid, ipst);
1116 			/*
1117 			 * Since we looked up the ill from the source there
1118 			 * is no need to verify that the source is on the ill
1119 			 * below.
1120 			 */
1121 			verify_src = B_FALSE;
1122 			if (ill != NULL && IS_VNI(ill)) {
1123 				ill_t *usesrc = ill;
1124 
1125 				ill = ill_lookup_usesrc(usesrc);
1126 				ill_refrele(usesrc);
1127 			}
1128 		} else if (!isv6) {
1129 			ipaddr_t	v4setsrc = INADDR_ANY;
1130 
1131 			ill = ill_lookup_group_v4(v4dst, ixa->ixa_zoneid,
1132 			    ipst, multirtp, &v4setsrc);
1133 			if (setsrcp != NULL)
1134 				IN6_IPADDR_TO_V4MAPPED(v4setsrc, setsrcp);
1135 		} else {
1136 			ill = ill_lookup_group_v6(v6dst, ixa->ixa_zoneid,
1137 			    ipst, multirtp, setsrcp);
1138 		}
1139 		if (ill != NULL && IS_VNI(ill)) {
1140 			ill_refrele(ill);
1141 			ill = NULL;
1142 		}
1143 		if (ill == NULL) {
1144 			if (errorp != NULL)
1145 				*errorp = ENXIO;
1146 			/* Get a hold on the IRE_NOROUTE */
1147 			ire = ire_reject(ipst, isv6);
1148 			return (ire);
1149 		}
1150 		if (!(ill->ill_flags & ILLF_MULTICAST)) {
1151 			ill_refrele(ill);
1152 			if (errorp != NULL)
1153 				*errorp = EHOSTUNREACH;
1154 			/* Get a hold on the IRE_NOROUTE */
1155 			ire = ire_reject(ipst, isv6);
1156 			return (ire);
1157 		}
1158 		/*
1159 		 * If we are doing the strictest src_multihoming, then
1160 		 * we check that IP_MULTICAST_IF, IP_BOUND_IF, etc specify
1161 		 * an interface that is consistent with the source address.
1162 		 */
1163 		if (verify_src && src_multihoming == 2 &&
1164 		    !ip_verify_src_on_ill(v6src, ill, ixa->ixa_zoneid)) {
1165 			if (errorp != NULL)
1166 				*errorp = EADDRNOTAVAIL;
1167 			ill_refrele(ill);
1168 			/* Get a hold on the IRE_NOROUTE */
1169 			ire = ire_reject(ipst, isv6);
1170 			return (ire);
1171 		}
1172 		/* Get a refcnt on the single IRE_MULTICAST per ill */
1173 		ire = ire_multicast(ill);
1174 		ill_refrele(ill);
1175 		if (generationp != NULL)
1176 			*generationp = ire->ire_generation;
1177 		if (errorp != NULL &&
1178 		    (ire->ire_flags & (RTF_REJECT|RTF_BLACKHOLE))) {
1179 			*errorp = EHOSTUNREACH;
1180 		}
1181 		return (ire);
1182 	}
1183 
1184 	/* Now for unicast */
1185 	if (ixa->ixa_ifindex != 0 || (ixaflags & IXAF_SCOPEID_SET)) {
1186 		if (ixaflags & IXAF_SCOPEID_SET) {
1187 			/* sin6_scope_id takes precedence over ixa_ifindex */
1188 			ASSERT(ixa->ixa_scopeid != 0);
1189 			ill = ill_lookup_on_ifindex(ixa->ixa_scopeid,
1190 			    isv6, ipst);
1191 		} else {
1192 			ASSERT(ixa->ixa_ifindex != 0);
1193 			ill = ill_lookup_on_ifindex(ixa->ixa_ifindex,
1194 			    isv6, ipst);
1195 		}
1196 		if (ill != NULL && IS_VNI(ill)) {
1197 			ill_refrele(ill);
1198 			ill = NULL;
1199 		}
1200 		if (ill == NULL) {
1201 			if (errorp != NULL)
1202 				*errorp = ENXIO;
1203 			/* Get a hold on the IRE_NOROUTE */
1204 			ire = ire_reject(ipst, isv6);
1205 			return (ire);
1206 		}
1207 
1208 		match_args |= MATCH_IRE_ILL;
1209 
1210 		/*
1211 		 * icmp_send_reply_v6 uses scopeid, and mpathd sets IP*_BOUND_IF
1212 		 * so for both of them we need to be able look for an under
1213 		 * interface.
1214 		 */
1215 		if (IS_UNDER_IPMP(ill))
1216 			match_args |= MATCH_IRE_TESTHIDDEN;
1217 
1218 		/*
1219 		 * If we are doing the strictest src_multihoming, then
1220 		 * we check that IP_BOUND_IF, IP_PKTINFO, etc specify
1221 		 * an interface that is consistent with the source address.
1222 		 */
1223 		if (src_multihoming == 2 &&
1224 		    !ip_verify_src_on_ill(v6src, ill, ixa->ixa_zoneid)) {
1225 			if (errorp != NULL)
1226 				*errorp = EADDRNOTAVAIL;
1227 			ill_refrele(ill);
1228 			/* Get a hold on the IRE_NOROUTE */
1229 			ire = ire_reject(ipst, isv6);
1230 			return (ire);
1231 		}
1232 	} else if (src_multihoming != 0 && verify_src) {
1233 		/* Look up the ill based on the source address */
1234 		ill = ip_select_src_ill(&v6src, ixa->ixa_zoneid, ipst);
1235 		if (ill == NULL) {
1236 			char addrbuf[INET6_ADDRSTRLEN];
1237 
1238 			ip3dbg(("%s not a valid src for unicast",
1239 			    inet_ntop(AF_INET6, &v6src, addrbuf,
1240 			    sizeof (addrbuf))));
1241 			if (errorp != NULL)
1242 				*errorp = EADDRNOTAVAIL;
1243 			/* Get a hold on the IRE_NOROUTE */
1244 			ire = ire_reject(ipst, isv6);
1245 			return (ire);
1246 		}
1247 		match_args |= MATCH_IRE_SRC_ILL;
1248 		preferred_src_aware = (src_multihoming == 1);
1249 	}
1250 
1251 	if (ixaflags & IXAF_NEXTHOP_SET) {
1252 		/* IP_NEXTHOP was set */
1253 		v6nexthop = ixa->ixa_nexthop_v6;
1254 	} else {
1255 		v6nexthop = *v6dst;
1256 	}
1257 
1258 	ire_type = 0;
1259 
1260 	/*
1261 	 * If SO_DONTROUTE is set or if IP_NEXTHOP is set, then
1262 	 * we only look for an onlink IRE.
1263 	 */
1264 	if (ixaflags & (IXAF_DONTROUTE|IXAF_NEXTHOP_SET)) {
1265 		match_args |= MATCH_IRE_TYPE;
1266 		ire_type = IRE_ONLINK;
1267 	}
1268 
1269 retry:
1270 	if (!isv6) {
1271 		ipaddr_t	v4nexthop;
1272 		ipaddr_t	v4setsrc = INADDR_ANY;
1273 
1274 		IN6_V4MAPPED_TO_IPADDR(&v6nexthop, v4nexthop);
1275 		ire = ire_route_recursive_v4(v4nexthop, ire_type, ill,
1276 		    ixa->ixa_zoneid, ixa->ixa_tsl, match_args, IRR_ALLOCATE,
1277 		    ixa->ixa_xmit_hint, ipst, &v4setsrc, NULL, generationp);
1278 		if (setsrcp != NULL)
1279 			IN6_IPADDR_TO_V4MAPPED(v4setsrc, setsrcp);
1280 	} else {
1281 		ire = ire_route_recursive_v6(&v6nexthop, ire_type, ill,
1282 		    ixa->ixa_zoneid, ixa->ixa_tsl, match_args, IRR_ALLOCATE,
1283 		    ixa->ixa_xmit_hint, ipst, setsrcp, NULL, generationp);
1284 	}
1285 
1286 #ifdef DEBUG
1287 	if (match_args & MATCH_IRE_TESTHIDDEN) {
1288 		ip3dbg(("looking for hidden; dst %x ire %p\n",
1289 		    v4dst, (void *)ire));
1290 	}
1291 #endif
1292 	if (ill != NULL) {
1293 		ill_refrele(ill);
1294 		ill = NULL;
1295 	}
1296 	if ((ire->ire_flags & (RTF_REJECT|RTF_BLACKHOLE)) ||
1297 	    (ire->ire_type & IRE_MULTICAST)) {
1298 		if (preferred_src_aware) {
1299 			/*
1300 			 * "Preferred Source Aware" send mode. If we cannot
1301 			 * find an ire whose ire_ill had the desired source
1302 			 * address retry after relaxing the ill matching
1303 			 * constraint.
1304 			 */
1305 			ire_refrele(ire);
1306 			preferred_src_aware = B_FALSE;
1307 			match_args &= ~MATCH_IRE_SRC_ILL;
1308 			goto retry;
1309 		}
1310 		/* No ire_nce_cache */
1311 		return (ire);
1312 	}
1313 
1314 	/* Setup ire_nce_cache if it doesn't exist or is condemned. */
1315 	mutex_enter(&ire->ire_lock);
1316 	nce = ire->ire_nce_cache;
1317 	if (nce == NULL || nce->nce_is_condemned) {
1318 		mutex_exit(&ire->ire_lock);
1319 		(void) ire_revalidate_nce(ire);
1320 	} else {
1321 		mutex_exit(&ire->ire_lock);
1322 	}
1323 	return (ire);
1324 }
1325 
1326 /*
1327  * Find a route given some xmit attributes and a packet.
1328  * Generic for IPv4 and IPv6
1329  *
1330  * This never returns NULL. But when it returns the IRE_NOROUTE
1331  * it might set errorp.
1332  */
1333 ire_t *
1334 ip_select_route_pkt(mblk_t *mp, ip_xmit_attr_t *ixa, uint_t *generationp,
1335     int *errorp, boolean_t *multirtp)
1336 {
1337 	if (ixa->ixa_flags & IXAF_IS_IPV4) {
1338 		ipha_t		*ipha = (ipha_t *)mp->b_rptr;
1339 		in6_addr_t	v6dst, v6src;
1340 
1341 		IN6_IPADDR_TO_V4MAPPED(ipha->ipha_dst, &v6dst);
1342 		IN6_IPADDR_TO_V4MAPPED(ipha->ipha_src, &v6src);
1343 
1344 		return (ip_select_route(&v6dst, v6src, ixa, generationp,
1345 		    NULL, errorp, multirtp));
1346 	} else {
1347 		ip6_t	*ip6h = (ip6_t *)mp->b_rptr;
1348 
1349 		return (ip_select_route(&ip6h->ip6_dst, ip6h->ip6_src,
1350 		    ixa, generationp, NULL, errorp, multirtp));
1351 	}
1352 }
1353 
1354 ire_t *
1355 ip_select_route_v4(ipaddr_t dst, ipaddr_t src, ip_xmit_attr_t *ixa,
1356     uint_t *generationp, ipaddr_t *v4setsrcp, int *errorp, boolean_t *multirtp)
1357 {
1358 	in6_addr_t	v6dst, v6src;
1359 	ire_t		*ire;
1360 	in6_addr_t	setsrc;
1361 
1362 	ASSERT(ixa->ixa_flags & IXAF_IS_IPV4);
1363 
1364 	IN6_IPADDR_TO_V4MAPPED(dst, &v6dst);
1365 	IN6_IPADDR_TO_V4MAPPED(src, &v6src);
1366 
1367 	setsrc = ipv6_all_zeros;
1368 	ire = ip_select_route(&v6dst, v6src, ixa, generationp, &setsrc, errorp,
1369 	    multirtp);
1370 	if (v4setsrcp != NULL)
1371 		IN6_V4MAPPED_TO_IPADDR(&setsrc, *v4setsrcp);
1372 	return (ire);
1373 }
1374 
1375 /*
1376  * Recursively look for a route to the destination. Can also match on
1377  * the zoneid, ill, and label. Used for the data paths. See also
1378  * ire_route_recursive.
1379  *
1380  * If IRR_ALLOCATE is not set then we will only inspect the existing IREs; never
1381  * create an IRE_IF_CLONE. This is used on the receive side when we are not
1382  * forwarding.
1383  * If IRR_INCOMPLETE is set then we return the IRE even if we can't correctly
1384  * resolve the gateway.
1385  *
1386  * Note that this function never returns NULL. It returns an IRE_NOROUTE
1387  * instead.
1388  *
1389  * If we find any IRE_LOCAL|BROADCAST etc past the first iteration it
1390  * is an error.
1391  * Allow at most one RTF_INDIRECT.
1392  */
1393 ire_t *
1394 ire_route_recursive_impl_v4(ire_t *ire,
1395     ipaddr_t nexthop, uint_t ire_type, const ill_t *ill_arg,
1396     zoneid_t zoneid, const ts_label_t *tsl, uint_t match_args,
1397     uint_t irr_flags, uint32_t xmit_hint, ip_stack_t *ipst, ipaddr_t *setsrcp,
1398     tsol_ire_gw_secattr_t **gwattrp, uint_t *generationp)
1399 {
1400 	int		i, j;
1401 	ire_t		*ires[MAX_IRE_RECURSION];
1402 	uint_t		generation;
1403 	uint_t		generations[MAX_IRE_RECURSION];
1404 	boolean_t	need_refrele = B_FALSE;
1405 	boolean_t	invalidate = B_FALSE;
1406 	ill_t		*ill = NULL;
1407 	uint_t		maskoff = (IRE_LOCAL|IRE_LOOPBACK|IRE_BROADCAST);
1408 
1409 	if (setsrcp != NULL)
1410 		ASSERT(*setsrcp == INADDR_ANY);
1411 	if (gwattrp != NULL)
1412 		ASSERT(*gwattrp == NULL);
1413 
1414 	/*
1415 	 * We iterate up to three times to resolve a route, even though
1416 	 * we have four slots in the array. The extra slot is for an
1417 	 * IRE_IF_CLONE we might need to create.
1418 	 */
1419 	i = 0;
1420 	while (i < MAX_IRE_RECURSION - 1) {
1421 		/* ire_ftable_lookup handles round-robin/ECMP */
1422 		if (ire == NULL) {
1423 			ire = ire_ftable_lookup_v4(nexthop, 0, 0, ire_type,
1424 			    (ill != NULL? ill : ill_arg), zoneid, tsl,
1425 			    match_args, xmit_hint, ipst, &generation);
1426 		} else {
1427 			/* Caller passed it; extra hold since we will rele */
1428 			ire_refhold(ire);
1429 			if (generationp != NULL)
1430 				generation = *generationp;
1431 			else
1432 				generation = IRE_GENERATION_VERIFY;
1433 		}
1434 		if (ire == NULL) {
1435 			if (i > 0 && (irr_flags & IRR_INCOMPLETE)) {
1436 				ire = ires[0];
1437 				ire_refhold(ire);
1438 			} else {
1439 				ire = ire_reject(ipst, B_FALSE);
1440 			}
1441 			goto error;
1442 		}
1443 
1444 		/* Need to return the ire with RTF_REJECT|BLACKHOLE */
1445 		if (ire->ire_flags & (RTF_REJECT|RTF_BLACKHOLE))
1446 			goto error;
1447 
1448 		ASSERT(!(ire->ire_type & IRE_MULTICAST)); /* Not in ftable */
1449 
1450 		/*
1451 		 * Don't allow anything unusual past the first iteration.
1452 		 * After the first lookup, we should no longer look for
1453 		 * (IRE_LOCAL|IRE_LOOPBACK|IRE_BROADCAST) or RTF_INDIRECT
1454 		 * routes.
1455 		 *
1456 		 * In addition, after we have found a direct IRE_OFFLINK,
1457 		 * we should only look for interface or clone routes.
1458 		 */
1459 		match_args |= MATCH_IRE_DIRECT; /* no more RTF_INDIRECTs */
1460 
1461 		if ((ire->ire_type & IRE_OFFLINK) &&
1462 		    !(ire->ire_flags & RTF_INDIRECT)) {
1463 			ire_type = IRE_IF_ALL;
1464 		} else {
1465 			/*
1466 			 * no more local, loopback, broadcast routes
1467 			 */
1468 			if (!(match_args & MATCH_IRE_TYPE))
1469 				ire_type = (IRE_OFFLINK|IRE_ONLINK);
1470 			ire_type &= ~maskoff;
1471 		}
1472 		match_args |= MATCH_IRE_TYPE;
1473 
1474 		/* We have a usable IRE */
1475 		ires[i] = ire;
1476 		generations[i] = generation;
1477 		i++;
1478 
1479 		/* The first RTF_SETSRC address is passed back if setsrcp */
1480 		if ((ire->ire_flags & RTF_SETSRC) &&
1481 		    setsrcp != NULL && *setsrcp == INADDR_ANY) {
1482 			ASSERT(ire->ire_setsrc_addr != INADDR_ANY);
1483 			*setsrcp = ire->ire_setsrc_addr;
1484 		}
1485 
1486 		/* The first ire_gw_secattr is passed back if gwattrp */
1487 		if (ire->ire_gw_secattr != NULL &&
1488 		    gwattrp != NULL && *gwattrp == NULL)
1489 			*gwattrp = ire->ire_gw_secattr;
1490 
1491 		/*
1492 		 * Check if we have a short-cut pointer to an IRE for this
1493 		 * destination, and that the cached dependency isn't stale.
1494 		 * In that case we've rejoined an existing tree towards a
1495 		 * parent, thus we don't need to continue the loop to
1496 		 * discover the rest of the tree.
1497 		 */
1498 		mutex_enter(&ire->ire_lock);
1499 		if (ire->ire_dep_parent != NULL &&
1500 		    ire->ire_dep_parent->ire_generation ==
1501 		    ire->ire_dep_parent_generation) {
1502 			mutex_exit(&ire->ire_lock);
1503 			ire = NULL;
1504 			goto done;
1505 		}
1506 		mutex_exit(&ire->ire_lock);
1507 
1508 		/*
1509 		 * If this type should have an ire_nce_cache (even if it
1510 		 * doesn't yet have one) then we are done. Includes
1511 		 * IRE_INTERFACE with a full 32 bit mask.
1512 		 */
1513 		if (ire->ire_nce_capable) {
1514 			ire = NULL;
1515 			goto done;
1516 		}
1517 		ASSERT(!(ire->ire_type & IRE_IF_CLONE));
1518 		/*
1519 		 * For an IRE_INTERFACE we create an IRE_IF_CLONE for this
1520 		 * particular destination
1521 		 */
1522 		if (ire->ire_type & IRE_INTERFACE) {
1523 			in6_addr_t	v6nexthop;
1524 			ire_t		*clone;
1525 
1526 			ASSERT(ire->ire_masklen != IPV4_ABITS);
1527 
1528 			/*
1529 			 * In the case of ip_input and ILLF_FORWARDING not
1530 			 * being set, and in the case of RTM_GET, there is
1531 			 * no point in allocating an IRE_IF_CLONE. We return
1532 			 * the IRE_INTERFACE. Note that !IRR_ALLOCATE can
1533 			 * result in a ire_dep_parent which is IRE_IF_*
1534 			 * without an IRE_IF_CLONE.
1535 			 * We recover from that when we need to send packets
1536 			 * by ensuring that the generations become
1537 			 * IRE_GENERATION_VERIFY in this case.
1538 			 */
1539 			if (!(irr_flags & IRR_ALLOCATE)) {
1540 				invalidate = B_TRUE;
1541 				ire = NULL;
1542 				goto done;
1543 			}
1544 
1545 			IN6_IPADDR_TO_V4MAPPED(nexthop, &v6nexthop);
1546 
1547 			clone = ire_create_if_clone(ire, &v6nexthop,
1548 			    &generation);
1549 			if (clone == NULL) {
1550 				/*
1551 				 * Temporary failure - no memory.
1552 				 * Don't want caller to cache IRE_NOROUTE.
1553 				 */
1554 				invalidate = B_TRUE;
1555 				ire = ire_blackhole(ipst, B_FALSE);
1556 				goto error;
1557 			}
1558 			/*
1559 			 * Make clone next to last entry and the
1560 			 * IRE_INTERFACE the last in the dependency
1561 			 * chain since the clone depends on the
1562 			 * IRE_INTERFACE.
1563 			 */
1564 			ASSERT(i >= 1);
1565 			ASSERT(i < MAX_IRE_RECURSION);
1566 
1567 			ires[i] = ires[i-1];
1568 			generations[i] = generations[i-1];
1569 			ires[i-1] = clone;
1570 			generations[i-1] = generation;
1571 			i++;
1572 
1573 			ire = NULL;
1574 			goto done;
1575 		}
1576 
1577 		/*
1578 		 * We only match on the type and optionally ILL when
1579 		 * recursing. The type match is used by some callers
1580 		 * to exclude certain types (such as IRE_IF_CLONE or
1581 		 * IRE_LOCAL|IRE_LOOPBACK).
1582 		 *
1583 		 * In the MATCH_IRE_SRC_ILL case, ill_arg may be the 'srcof'
1584 		 * ire->ire_ill, and we want to find the IRE_INTERFACE for
1585 		 * ire_ill, so we set ill to the ire_ill;
1586 		 */
1587 		match_args &= (MATCH_IRE_TYPE | MATCH_IRE_DIRECT);
1588 		nexthop = ire->ire_gateway_addr;
1589 		if (ill == NULL && ire->ire_ill != NULL) {
1590 			ill = ire->ire_ill;
1591 			need_refrele = B_TRUE;
1592 			ill_refhold(ill);
1593 			match_args |= MATCH_IRE_ILL;
1594 		}
1595 		ire = NULL;
1596 	}
1597 	ASSERT(ire == NULL);
1598 	ire = ire_reject(ipst, B_FALSE);
1599 
1600 error:
1601 	ASSERT(ire != NULL);
1602 	if (need_refrele)
1603 		ill_refrele(ill);
1604 
1605 	/*
1606 	 * In the case of MULTIRT we want to try a different IRE the next
1607 	 * time. We let the next packet retry in that case.
1608 	 */
1609 	if (i > 0 && (ires[0]->ire_flags & RTF_MULTIRT))
1610 		(void) ire_no_good(ires[0]);
1611 
1612 cleanup:
1613 	/* cleanup ires[i] */
1614 	ire_dep_unbuild(ires, i);
1615 	for (j = 0; j < i; j++)
1616 		ire_refrele(ires[j]);
1617 
1618 	ASSERT((ire->ire_flags & (RTF_REJECT|RTF_BLACKHOLE)) ||
1619 	    (irr_flags & IRR_INCOMPLETE));
1620 	/*
1621 	 * Use IRE_GENERATION_VERIFY to ensure that ip_output will redo the
1622 	 * ip_select_route since the reject or lack of memory might be gone.
1623 	 */
1624 	if (generationp != NULL)
1625 		*generationp = IRE_GENERATION_VERIFY;
1626 	return (ire);
1627 
1628 done:
1629 	ASSERT(ire == NULL);
1630 	if (need_refrele) {
1631 		ill_refrele(ill);
1632 		ill = NULL;
1633 	}
1634 
1635 	/* Build dependencies */
1636 	if (i > 1 && !ire_dep_build(ires, generations, i)) {
1637 		/* Something in chain was condemned; tear it apart */
1638 		ire = ire_reject(ipst, B_FALSE);
1639 		goto cleanup;
1640 	}
1641 
1642 	/*
1643 	 * Release all refholds except the one for ires[0] that we
1644 	 * will return to the caller.
1645 	 */
1646 	for (j = 1; j < i; j++)
1647 		ire_refrele(ires[j]);
1648 
1649 	if (invalidate) {
1650 		/*
1651 		 * Since we needed to allocate but couldn't we need to make
1652 		 * sure that the dependency chain is rebuilt the next time.
1653 		 */
1654 		ire_dep_invalidate_generations(ires[0]);
1655 		generation = IRE_GENERATION_VERIFY;
1656 	} else {
1657 		/*
1658 		 * IREs can have been added or deleted while we did the
1659 		 * recursive lookup and we can't catch those until we've built
1660 		 * the dependencies. We verify the stored
1661 		 * ire_dep_parent_generation to catch any such changes and
1662 		 * return IRE_GENERATION_VERIFY (which will cause
1663 		 * ip_select_route to be called again so we can redo the
1664 		 * recursive lookup next time we send a packet.
1665 		 */
1666 		if (ires[0]->ire_dep_parent == NULL)
1667 			generation = ires[0]->ire_generation;
1668 		else
1669 			generation = ire_dep_validate_generations(ires[0]);
1670 		if (generations[0] != ires[0]->ire_generation) {
1671 			/* Something changed at the top */
1672 			generation = IRE_GENERATION_VERIFY;
1673 		}
1674 	}
1675 	if (generationp != NULL)
1676 		*generationp = generation;
1677 
1678 	return (ires[0]);
1679 }
1680 
1681 ire_t *
1682 ire_route_recursive_v4(ipaddr_t nexthop, uint_t ire_type, const ill_t *ill,
1683     zoneid_t zoneid, const ts_label_t *tsl, uint_t match_args,
1684     uint_t irr_flags, uint32_t xmit_hint, ip_stack_t *ipst, ipaddr_t *setsrcp,
1685     tsol_ire_gw_secattr_t **gwattrp, uint_t *generationp)
1686 {
1687 	return (ire_route_recursive_impl_v4(NULL, nexthop, ire_type, ill,
1688 	    zoneid, tsl, match_args, irr_flags, xmit_hint, ipst, setsrcp,
1689 	    gwattrp, generationp));
1690 }
1691 
1692 /*
1693  * Recursively look for a route to the destination.
1694  * We only handle a destination match here, yet we have the same arguments
1695  * as the full match to allow function pointers to select between the two.
1696  *
1697  * Note that this function never returns NULL. It returns an IRE_NOROUTE
1698  * instead.
1699  *
1700  * If we find any IRE_LOCAL|BROADCAST etc past the first iteration it
1701  * is an error.
1702  * Allow at most one RTF_INDIRECT.
1703  */
1704 ire_t *
1705 ire_route_recursive_dstonly_v4(ipaddr_t nexthop, uint_t irr_flags,
1706     uint32_t xmit_hint, ip_stack_t *ipst)
1707 {
1708 	ire_t	*ire;
1709 	ire_t	*ire1;
1710 	uint_t	generation;
1711 
1712 	/* ire_ftable_lookup handles round-robin/ECMP */
1713 	ire = ire_ftable_lookup_simple_v4(nexthop, xmit_hint, ipst,
1714 	    &generation);
1715 	ASSERT(ire != NULL);
1716 
1717 	/*
1718 	 * If this type should have an ire_nce_cache (even if it
1719 	 * doesn't yet have one) then we are done. Includes
1720 	 * IRE_INTERFACE with a full 32 bit mask.
1721 	 */
1722 	if (ire->ire_nce_capable)
1723 		return (ire);
1724 
1725 	/*
1726 	 * If the IRE has a current cached parent we know that the whole
1727 	 * parent chain is current, hence we don't need to discover and
1728 	 * build any dependencies by doing a recursive lookup.
1729 	 */
1730 	mutex_enter(&ire->ire_lock);
1731 	if (ire->ire_dep_parent != NULL &&
1732 	    ire->ire_dep_parent->ire_generation ==
1733 	    ire->ire_dep_parent_generation) {
1734 		mutex_exit(&ire->ire_lock);
1735 		return (ire);
1736 	}
1737 	mutex_exit(&ire->ire_lock);
1738 
1739 	/*
1740 	 * Fallback to loop in the normal code starting with the ire
1741 	 * we found. Normally this would return the same ire.
1742 	 */
1743 	ire1 = ire_route_recursive_impl_v4(ire, nexthop, 0, NULL, ALL_ZONES,
1744 	    NULL, MATCH_IRE_DSTONLY, irr_flags, xmit_hint, ipst, NULL, NULL,
1745 	    &generation);
1746 	ire_refrele(ire);
1747 	return (ire1);
1748 }
1749