Ooops, cache_inval_vp_nonblock() was being called too late, after the
[dragonfly.git] / sys / net / if.c
... / ...
CommitLineData
1/*
2 * Copyright (c) 1980, 1986, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 *
33 * @(#)if.c 8.3 (Berkeley) 1/4/94
34 * $FreeBSD: src/sys/net/if.c,v 1.185 2004/03/13 02:35:03 brooks Exp $
35 * $DragonFly: src/sys/net/if.c,v 1.50 2007/03/24 05:57:49 sephe Exp $
36 */
37
38#include "opt_compat.h"
39#include "opt_inet6.h"
40#include "opt_inet.h"
41#include "opt_polling.h"
42
43#include <sys/param.h>
44#include <sys/malloc.h>
45#include <sys/mbuf.h>
46#include <sys/systm.h>
47#include <sys/proc.h>
48#include <sys/protosw.h>
49#include <sys/socket.h>
50#include <sys/socketvar.h>
51#include <sys/socketops.h>
52#include <sys/protosw.h>
53#include <sys/kernel.h>
54#include <sys/sockio.h>
55#include <sys/syslog.h>
56#include <sys/sysctl.h>
57#include <sys/domain.h>
58#include <sys/thread.h>
59#include <sys/serialize.h>
60
61#include <net/if.h>
62#include <net/if_arp.h>
63#include <net/if_dl.h>
64#include <net/if_types.h>
65#include <net/if_var.h>
66#include <net/ifq_var.h>
67#include <net/radix.h>
68#include <net/route.h>
69#include <machine/stdarg.h>
70
71#include <sys/thread2.h>
72
73#if defined(INET) || defined(INET6)
74/*XXX*/
75#include <netinet/in.h>
76#include <netinet/in_var.h>
77#include <netinet/if_ether.h>
78#ifdef INET6
79#include <machine/clock.h> /* XXX: temporal workaround for fxp issue */
80#include <netinet6/in6_var.h>
81#include <netinet6/in6_ifattach.h>
82#endif
83#endif
84
85#if defined(COMPAT_43)
86#include <emulation/43bsd/43bsd_socket.h>
87#endif /* COMPAT_43 */
88
89/*
90 * Support for non-ALTQ interfaces.
91 */
92static int ifq_classic_enqueue(struct ifaltq *, struct mbuf *,
93 struct altq_pktattr *);
94static struct mbuf *
95 ifq_classic_dequeue(struct ifaltq *, struct mbuf *, int);
96static int ifq_classic_request(struct ifaltq *, int, void *);
97
98/*
99 * System initialization
100 */
101
102static void if_attachdomain(void *);
103static void if_attachdomain1(struct ifnet *);
104static int ifconf (u_long, caddr_t, struct ucred *);
105static void ifinit (void *);
106static void if_slowtimo (void *);
107static void link_rtrequest (int, struct rtentry *, struct rt_addrinfo *);
108static int if_rtdel (struct radix_node *, void *);
109
110SYSINIT(interfaces, SI_SUB_PROTO_IF, SI_ORDER_FIRST, ifinit, NULL)
111
112MALLOC_DEFINE(M_IFADDR, "ifaddr", "interface address");
113MALLOC_DEFINE(M_IFMADDR, "ether_multi", "link-level multicast address");
114MALLOC_DEFINE(M_CLONE, "clone", "interface cloning framework");
115
116int ifqmaxlen = IFQ_MAXLEN;
117struct ifnethead ifnet; /* depend on static init XXX */
118
119#ifdef INET6
120/*
121 * XXX: declare here to avoid to include many inet6 related files..
122 * should be more generalized?
123 */
124extern void nd6_setmtu (struct ifnet *);
125#endif
126
127struct if_clone *if_clone_lookup (const char *, int *);
128int if_clone_list (struct if_clonereq *);
129
130LIST_HEAD(, if_clone) if_cloners = LIST_HEAD_INITIALIZER(if_cloners);
131int if_cloners_count;
132
133struct callout if_slowtimo_timer;
134
135/*
136 * Network interface utility routines.
137 *
138 * Routines with ifa_ifwith* names take sockaddr *'s as
139 * parameters.
140 */
141/* ARGSUSED*/
142void
143ifinit(void *dummy)
144{
145 struct ifnet *ifp;
146
147 callout_init(&if_slowtimo_timer);
148
149 crit_enter();
150 TAILQ_FOREACH(ifp, &ifnet, if_link) {
151 if (ifp->if_snd.ifq_maxlen == 0) {
152 if_printf(ifp, "XXX: driver didn't set ifq_maxlen\n");
153 ifp->if_snd.ifq_maxlen = ifqmaxlen;
154 }
155 }
156 crit_exit();
157
158 if_slowtimo(0);
159}
160
161int if_index = 0;
162struct ifnet **ifindex2ifnet = NULL;
163
164/*
165 * Attach an interface to the list of "active" interfaces.
166 *
167 * The serializer is optional. If non-NULL access to the interface
168 * may be MPSAFE.
169 */
170void
171if_attach(struct ifnet *ifp, lwkt_serialize_t serializer)
172{
173 unsigned socksize, ifasize;
174 int namelen, masklen;
175 struct sockaddr_dl *sdl;
176 struct ifaddr *ifa;
177 struct ifaltq *ifq;
178
179 static int if_indexlim = 8;
180 static boolean_t inited;
181
182 if (!inited) {
183 TAILQ_INIT(&ifnet);
184 inited = TRUE;
185 }
186
187 /*
188 * The serializer can be passed in from the device, allowing the
189 * same serializer to be used for both the interrupt interlock and
190 * the device queue. If not specified, the netif structure will
191 * use an embedded serializer.
192 */
193 if (serializer == NULL) {
194 serializer = &ifp->if_default_serializer;
195 lwkt_serialize_init(serializer);
196 }
197 ifp->if_serializer = serializer;
198
199 TAILQ_INSERT_TAIL(&ifnet, ifp, if_link);
200 ifp->if_index = ++if_index;
201 /*
202 * XXX -
203 * The old code would work if the interface passed a pre-existing
204 * chain of ifaddrs to this code. We don't trust our callers to
205 * properly initialize the tailq, however, so we no longer allow
206 * this unlikely case.
207 */
208 TAILQ_INIT(&ifp->if_addrhead);
209 TAILQ_INIT(&ifp->if_prefixhead);
210 LIST_INIT(&ifp->if_multiaddrs);
211 getmicrotime(&ifp->if_lastchange);
212 if (ifindex2ifnet == NULL || if_index >= if_indexlim) {
213 unsigned int n;
214 struct ifnet **q;
215
216 if_indexlim <<= 1;
217
218 /* grow ifindex2ifnet */
219 n = if_indexlim * sizeof(*q);
220 q = kmalloc(n, M_IFADDR, M_WAITOK | M_ZERO);
221 if (ifindex2ifnet) {
222 bcopy(ifindex2ifnet, q, n/2);
223 kfree(ifindex2ifnet, M_IFADDR);
224 }
225 ifindex2ifnet = q;
226 }
227
228 ifindex2ifnet[if_index] = ifp;
229
230 /*
231 * create a Link Level name for this device
232 */
233 namelen = strlen(ifp->if_xname);
234#define _offsetof(t, m) ((int)((caddr_t)&((t *)0)->m))
235 masklen = _offsetof(struct sockaddr_dl, sdl_data[0]) + namelen;
236 socksize = masklen + ifp->if_addrlen;
237#define ROUNDUP(a) (1 + (((a) - 1) | (sizeof(long) - 1)))
238 if (socksize < sizeof(*sdl))
239 socksize = sizeof(*sdl);
240 socksize = ROUNDUP(socksize);
241 ifasize = sizeof(struct ifaddr) + 2 * socksize;
242 ifa = kmalloc(ifasize, M_IFADDR, M_WAITOK | M_ZERO);
243 sdl = (struct sockaddr_dl *)(ifa + 1);
244 sdl->sdl_len = socksize;
245 sdl->sdl_family = AF_LINK;
246 bcopy(ifp->if_xname, sdl->sdl_data, namelen);
247 sdl->sdl_nlen = namelen;
248 sdl->sdl_index = ifp->if_index;
249 sdl->sdl_type = ifp->if_type;
250 ifp->if_lladdr = ifa;
251 ifa->ifa_ifp = ifp;
252 ifa->ifa_rtrequest = link_rtrequest;
253 ifa->ifa_addr = (struct sockaddr *)sdl;
254 sdl = (struct sockaddr_dl *)(socksize + (caddr_t)sdl);
255 ifa->ifa_netmask = (struct sockaddr *)sdl;
256 sdl->sdl_len = masklen;
257 while (namelen != 0)
258 sdl->sdl_data[--namelen] = 0xff;
259 TAILQ_INSERT_HEAD(&ifp->if_addrhead, ifa, ifa_link);
260
261 EVENTHANDLER_INVOKE(ifnet_attach_event, ifp);
262
263 ifq = &ifp->if_snd;
264 ifq->altq_type = 0;
265 ifq->altq_disc = NULL;
266 ifq->altq_flags &= ALTQF_CANTCHANGE;
267 ifq->altq_tbr = NULL;
268 ifq->altq_ifp = ifp;
269 ifq_set_classic(ifq);
270
271 if (!SLIST_EMPTY(&domains))
272 if_attachdomain1(ifp);
273
274 /* Announce the interface. */
275 rt_ifannouncemsg(ifp, IFAN_ARRIVAL);
276}
277
278static void
279if_attachdomain(void *dummy)
280{
281 struct ifnet *ifp;
282
283 crit_enter();
284 TAILQ_FOREACH(ifp, &ifnet, if_list)
285 if_attachdomain1(ifp);
286 crit_exit();
287}
288SYSINIT(domainifattach, SI_SUB_PROTO_IFATTACHDOMAIN, SI_ORDER_FIRST,
289 if_attachdomain, NULL);
290
291static void
292if_attachdomain1(struct ifnet *ifp)
293{
294 struct domain *dp;
295
296 crit_enter();
297
298 /* address family dependent data region */
299 bzero(ifp->if_afdata, sizeof(ifp->if_afdata));
300 SLIST_FOREACH(dp, &domains, dom_next)
301 if (dp->dom_ifattach)
302 ifp->if_afdata[dp->dom_family] =
303 (*dp->dom_ifattach)(ifp);
304 crit_exit();
305}
306
307/*
308 * Detach an interface, removing it from the
309 * list of "active" interfaces.
310 */
311void
312if_detach(struct ifnet *ifp)
313{
314 struct ifaddr *ifa;
315 struct radix_node_head *rnh;
316 int i;
317 int cpu, origcpu;
318 struct domain *dp;
319
320 EVENTHANDLER_INVOKE(ifnet_detach_event, ifp);
321
322 /*
323 * Remove routes and flush queues.
324 */
325 crit_enter();
326#ifdef DEVICE_POLLING
327 if (ifp->if_flags & IFF_POLLING)
328 ether_poll_deregister(ifp);
329#endif
330 if_down(ifp);
331
332 if (ifq_is_enabled(&ifp->if_snd))
333 altq_disable(&ifp->if_snd);
334 if (ifq_is_attached(&ifp->if_snd))
335 altq_detach(&ifp->if_snd);
336
337 /*
338 * Clean up all addresses.
339 */
340 ifp->if_lladdr = NULL;
341
342 for (ifa = TAILQ_FIRST(&ifp->if_addrhead); ifa;
343 ifa = TAILQ_FIRST(&ifp->if_addrhead)) {
344#ifdef INET
345 /* XXX: Ugly!! ad hoc just for INET */
346 if (ifa->ifa_addr && ifa->ifa_addr->sa_family == AF_INET) {
347 struct ifaliasreq ifr;
348
349 bzero(&ifr, sizeof ifr);
350 ifr.ifra_addr = *ifa->ifa_addr;
351 if (ifa->ifa_dstaddr)
352 ifr.ifra_broadaddr = *ifa->ifa_dstaddr;
353 if (in_control(NULL, SIOCDIFADDR, (caddr_t)&ifr, ifp,
354 NULL) == 0)
355 continue;
356 }
357#endif /* INET */
358#ifdef INET6
359 if (ifa->ifa_addr && ifa->ifa_addr->sa_family == AF_INET6) {
360 in6_purgeaddr(ifa);
361 /* ifp_addrhead is already updated */
362 continue;
363 }
364#endif /* INET6 */
365 TAILQ_REMOVE(&ifp->if_addrhead, ifa, ifa_link);
366 IFAFREE(ifa);
367 }
368
369#ifdef INET
370 /*
371 * Remove all IPv4 kernel structures related to ifp.
372 */
373 in_ifdetach(ifp);
374#endif
375
376#ifdef INET6
377 /*
378 * Remove all IPv6 kernel structs related to ifp. This should be done
379 * before removing routing entries below, since IPv6 interface direct
380 * routes are expected to be removed by the IPv6-specific kernel API.
381 * Otherwise, the kernel will detect some inconsistency and bark it.
382 */
383 in6_ifdetach(ifp);
384#endif
385
386 /*
387 * Delete all remaining routes using this interface
388 * Unfortuneatly the only way to do this is to slog through
389 * the entire routing table looking for routes which point
390 * to this interface...oh well...
391 */
392 origcpu = mycpuid;
393 for (cpu = 0; cpu < ncpus2; cpu++) {
394 lwkt_migratecpu(cpu);
395 for (i = 1; i <= AF_MAX; i++) {
396 if ((rnh = rt_tables[mycpuid][i]) == NULL)
397 continue;
398 rnh->rnh_walktree(rnh, if_rtdel, ifp);
399 }
400 }
401 lwkt_migratecpu(origcpu);
402
403 /* Announce that the interface is gone. */
404 rt_ifannouncemsg(ifp, IFAN_DEPARTURE);
405
406 SLIST_FOREACH(dp, &domains, dom_next)
407 if (dp->dom_ifdetach && ifp->if_afdata[dp->dom_family])
408 (*dp->dom_ifdetach)(ifp,
409 ifp->if_afdata[dp->dom_family]);
410
411 /*
412 * Remove interface from ifindex2ifp[] and maybe decrement if_index.
413 */
414 ifindex2ifnet[ifp->if_index] = NULL;
415 while (if_index > 0 && ifindex2ifnet[if_index] == NULL)
416 if_index--;
417
418 TAILQ_REMOVE(&ifnet, ifp, if_link);
419 crit_exit();
420}
421
422/*
423 * Delete Routes for a Network Interface
424 *
425 * Called for each routing entry via the rnh->rnh_walktree() call above
426 * to delete all route entries referencing a detaching network interface.
427 *
428 * Arguments:
429 * rn pointer to node in the routing table
430 * arg argument passed to rnh->rnh_walktree() - detaching interface
431 *
432 * Returns:
433 * 0 successful
434 * errno failed - reason indicated
435 *
436 */
437static int
438if_rtdel(struct radix_node *rn, void *arg)
439{
440 struct rtentry *rt = (struct rtentry *)rn;
441 struct ifnet *ifp = arg;
442 int err;
443
444 if (rt->rt_ifp == ifp) {
445
446 /*
447 * Protect (sorta) against walktree recursion problems
448 * with cloned routes
449 */
450 if (!(rt->rt_flags & RTF_UP))
451 return (0);
452
453 err = rtrequest(RTM_DELETE, rt_key(rt), rt->rt_gateway,
454 rt_mask(rt), rt->rt_flags,
455 (struct rtentry **) NULL);
456 if (err) {
457 log(LOG_WARNING, "if_rtdel: error %d\n", err);
458 }
459 }
460
461 return (0);
462}
463
464/*
465 * Create a clone network interface.
466 */
467int
468if_clone_create(char *name, int len)
469{
470 struct if_clone *ifc;
471 char *dp;
472 int wildcard, bytoff, bitoff;
473 int unit;
474 int err;
475
476 ifc = if_clone_lookup(name, &unit);
477 if (ifc == NULL)
478 return (EINVAL);
479
480 if (ifunit(name) != NULL)
481 return (EEXIST);
482
483 bytoff = bitoff = 0;
484 wildcard = (unit < 0);
485 /*
486 * Find a free unit if none was given.
487 */
488 if (wildcard) {
489 while (bytoff < ifc->ifc_bmlen &&
490 ifc->ifc_units[bytoff] == 0xff)
491 bytoff++;
492 if (bytoff >= ifc->ifc_bmlen)
493 return (ENOSPC);
494 while ((ifc->ifc_units[bytoff] & (1 << bitoff)) != 0)
495 bitoff++;
496 unit = (bytoff << 3) + bitoff;
497 }
498
499 if (unit > ifc->ifc_maxunit)
500 return (ENXIO);
501
502 err = (*ifc->ifc_create)(ifc, unit);
503 if (err != 0)
504 return (err);
505
506 if (!wildcard) {
507 bytoff = unit >> 3;
508 bitoff = unit - (bytoff << 3);
509 }
510
511 /*
512 * Allocate the unit in the bitmap.
513 */
514 KASSERT((ifc->ifc_units[bytoff] & (1 << bitoff)) == 0,
515 ("%s: bit is already set", __func__));
516 ifc->ifc_units[bytoff] |= (1 << bitoff);
517
518 /* In the wildcard case, we need to update the name. */
519 if (wildcard) {
520 for (dp = name; *dp != '\0'; dp++);
521 if (ksnprintf(dp, len - (dp-name), "%d", unit) >
522 len - (dp-name) - 1) {
523 /*
524 * This can only be a programmer error and
525 * there's no straightforward way to recover if
526 * it happens.
527 */
528 panic("if_clone_create(): interface name too long");
529 }
530
531 }
532
533 EVENTHANDLER_INVOKE(if_clone_event, ifc);
534
535 return (0);
536}
537
538/*
539 * Destroy a clone network interface.
540 */
541int
542if_clone_destroy(const char *name)
543{
544 struct if_clone *ifc;
545 struct ifnet *ifp;
546 int bytoff, bitoff;
547 int unit;
548
549 ifc = if_clone_lookup(name, &unit);
550 if (ifc == NULL)
551 return (EINVAL);
552
553 if (unit < ifc->ifc_minifs)
554 return (EINVAL);
555
556 ifp = ifunit(name);
557 if (ifp == NULL)
558 return (ENXIO);
559
560 if (ifc->ifc_destroy == NULL)
561 return (EOPNOTSUPP);
562
563 (*ifc->ifc_destroy)(ifp);
564
565 /*
566 * Compute offset in the bitmap and deallocate the unit.
567 */
568 bytoff = unit >> 3;
569 bitoff = unit - (bytoff << 3);
570 KASSERT((ifc->ifc_units[bytoff] & (1 << bitoff)) != 0,
571 ("%s: bit is already cleared", __func__));
572 ifc->ifc_units[bytoff] &= ~(1 << bitoff);
573 return (0);
574}
575
576/*
577 * Look up a network interface cloner.
578 */
579struct if_clone *
580if_clone_lookup(const char *name, int *unitp)
581{
582 struct if_clone *ifc;
583 const char *cp;
584 int i;
585
586 for (ifc = LIST_FIRST(&if_cloners); ifc != NULL;) {
587 for (cp = name, i = 0; i < ifc->ifc_namelen; i++, cp++) {
588 if (ifc->ifc_name[i] != *cp)
589 goto next_ifc;
590 }
591 goto found_name;
592 next_ifc:
593 ifc = LIST_NEXT(ifc, ifc_list);
594 }
595
596 /* No match. */
597 return ((struct if_clone *)NULL);
598
599 found_name:
600 if (*cp == '\0') {
601 i = -1;
602 } else {
603 for (i = 0; *cp != '\0'; cp++) {
604 if (*cp < '0' || *cp > '9') {
605 /* Bogus unit number. */
606 return (NULL);
607 }
608 i = (i * 10) + (*cp - '0');
609 }
610 }
611
612 if (unitp != NULL)
613 *unitp = i;
614 return (ifc);
615}
616
617/*
618 * Register a network interface cloner.
619 */
620void
621if_clone_attach(struct if_clone *ifc)
622{
623 int bytoff, bitoff;
624 int err;
625 int len, maxclone;
626 int unit;
627
628 KASSERT(ifc->ifc_minifs - 1 <= ifc->ifc_maxunit,
629 ("%s: %s requested more units then allowed (%d > %d)",
630 __func__, ifc->ifc_name, ifc->ifc_minifs,
631 ifc->ifc_maxunit + 1));
632 /*
633 * Compute bitmap size and allocate it.
634 */
635 maxclone = ifc->ifc_maxunit + 1;
636 len = maxclone >> 3;
637 if ((len << 3) < maxclone)
638 len++;
639 ifc->ifc_units = kmalloc(len, M_CLONE, M_WAITOK | M_ZERO);
640 ifc->ifc_bmlen = len;
641
642 LIST_INSERT_HEAD(&if_cloners, ifc, ifc_list);
643 if_cloners_count++;
644
645 for (unit = 0; unit < ifc->ifc_minifs; unit++) {
646 err = (*ifc->ifc_create)(ifc, unit);
647 KASSERT(err == 0,
648 ("%s: failed to create required interface %s%d",
649 __func__, ifc->ifc_name, unit));
650
651 /* Allocate the unit in the bitmap. */
652 bytoff = unit >> 3;
653 bitoff = unit - (bytoff << 3);
654 ifc->ifc_units[bytoff] |= (1 << bitoff);
655 }
656}
657
658/*
659 * Unregister a network interface cloner.
660 */
661void
662if_clone_detach(struct if_clone *ifc)
663{
664
665 LIST_REMOVE(ifc, ifc_list);
666 kfree(ifc->ifc_units, M_CLONE);
667 if_cloners_count--;
668}
669
670/*
671 * Provide list of interface cloners to userspace.
672 */
673int
674if_clone_list(struct if_clonereq *ifcr)
675{
676 char outbuf[IFNAMSIZ], *dst;
677 struct if_clone *ifc;
678 int count, error = 0;
679
680 ifcr->ifcr_total = if_cloners_count;
681 if ((dst = ifcr->ifcr_buffer) == NULL) {
682 /* Just asking how many there are. */
683 return (0);
684 }
685
686 if (ifcr->ifcr_count < 0)
687 return (EINVAL);
688
689 count = (if_cloners_count < ifcr->ifcr_count) ?
690 if_cloners_count : ifcr->ifcr_count;
691
692 for (ifc = LIST_FIRST(&if_cloners); ifc != NULL && count != 0;
693 ifc = LIST_NEXT(ifc, ifc_list), count--, dst += IFNAMSIZ) {
694 strlcpy(outbuf, ifc->ifc_name, IFNAMSIZ);
695 error = copyout(outbuf, dst, IFNAMSIZ);
696 if (error)
697 break;
698 }
699
700 return (error);
701}
702
703/*
704 * Locate an interface based on a complete address.
705 */
706struct ifaddr *
707ifa_ifwithaddr(struct sockaddr *addr)
708{
709 struct ifnet *ifp;
710 struct ifaddr *ifa;
711
712 TAILQ_FOREACH(ifp, &ifnet, if_link)
713 TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
714 if (ifa->ifa_addr->sa_family != addr->sa_family)
715 continue;
716 if (sa_equal(addr, ifa->ifa_addr))
717 return (ifa);
718 if ((ifp->if_flags & IFF_BROADCAST) && ifa->ifa_broadaddr &&
719 /* IPv6 doesn't have broadcast */
720 ifa->ifa_broadaddr->sa_len != 0 &&
721 sa_equal(ifa->ifa_broadaddr, addr))
722 return (ifa);
723 }
724 return ((struct ifaddr *)NULL);
725}
726/*
727 * Locate the point to point interface with a given destination address.
728 */
729struct ifaddr *
730ifa_ifwithdstaddr(struct sockaddr *addr)
731{
732 struct ifnet *ifp;
733 struct ifaddr *ifa;
734
735 TAILQ_FOREACH(ifp, &ifnet, if_link)
736 if (ifp->if_flags & IFF_POINTOPOINT)
737 TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
738 if (ifa->ifa_addr->sa_family != addr->sa_family)
739 continue;
740 if (ifa->ifa_dstaddr &&
741 sa_equal(addr, ifa->ifa_dstaddr))
742 return (ifa);
743 }
744 return ((struct ifaddr *)NULL);
745}
746
747/*
748 * Find an interface on a specific network. If many, choice
749 * is most specific found.
750 */
751struct ifaddr *
752ifa_ifwithnet(struct sockaddr *addr)
753{
754 struct ifnet *ifp;
755 struct ifaddr *ifa;
756 struct ifaddr *ifa_maybe = (struct ifaddr *) 0;
757 u_int af = addr->sa_family;
758 char *addr_data = addr->sa_data, *cplim;
759
760 /*
761 * AF_LINK addresses can be looked up directly by their index number,
762 * so do that if we can.
763 */
764 if (af == AF_LINK) {
765 struct sockaddr_dl *sdl = (struct sockaddr_dl *)addr;
766
767 if (sdl->sdl_index && sdl->sdl_index <= if_index)
768 return (ifindex2ifnet[sdl->sdl_index]->if_lladdr);
769 }
770
771 /*
772 * Scan though each interface, looking for ones that have
773 * addresses in this address family.
774 */
775 TAILQ_FOREACH(ifp, &ifnet, if_link) {
776 TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
777 char *cp, *cp2, *cp3;
778
779 if (ifa->ifa_addr->sa_family != af)
780next: continue;
781 if (af == AF_INET && ifp->if_flags & IFF_POINTOPOINT) {
782 /*
783 * This is a bit broken as it doesn't
784 * take into account that the remote end may
785 * be a single node in the network we are
786 * looking for.
787 * The trouble is that we don't know the
788 * netmask for the remote end.
789 */
790 if (ifa->ifa_dstaddr != NULL &&
791 sa_equal(addr, ifa->ifa_dstaddr))
792 return (ifa);
793 } else {
794 /*
795 * if we have a special address handler,
796 * then use it instead of the generic one.
797 */
798 if (ifa->ifa_claim_addr) {
799 if ((*ifa->ifa_claim_addr)(ifa, addr)) {
800 return (ifa);
801 } else {
802 continue;
803 }
804 }
805
806 /*
807 * Scan all the bits in the ifa's address.
808 * If a bit dissagrees with what we are
809 * looking for, mask it with the netmask
810 * to see if it really matters.
811 * (A byte at a time)
812 */
813 if (ifa->ifa_netmask == 0)
814 continue;
815 cp = addr_data;
816 cp2 = ifa->ifa_addr->sa_data;
817 cp3 = ifa->ifa_netmask->sa_data;
818 cplim = ifa->ifa_netmask->sa_len +
819 (char *)ifa->ifa_netmask;
820 while (cp3 < cplim)
821 if ((*cp++ ^ *cp2++) & *cp3++)
822 goto next; /* next address! */
823 /*
824 * If the netmask of what we just found
825 * is more specific than what we had before
826 * (if we had one) then remember the new one
827 * before continuing to search
828 * for an even better one.
829 */
830 if (ifa_maybe == 0 ||
831 rn_refines((char *)ifa->ifa_netmask,
832 (char *)ifa_maybe->ifa_netmask))
833 ifa_maybe = ifa;
834 }
835 }
836 }
837 return (ifa_maybe);
838}
839
840/*
841 * Find an interface address specific to an interface best matching
842 * a given address.
843 */
844struct ifaddr *
845ifaof_ifpforaddr(struct sockaddr *addr, struct ifnet *ifp)
846{
847 struct ifaddr *ifa;
848 char *cp, *cp2, *cp3;
849 char *cplim;
850 struct ifaddr *ifa_maybe = 0;
851 u_int af = addr->sa_family;
852
853 if (af >= AF_MAX)
854 return (0);
855 TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
856 if (ifa->ifa_addr->sa_family != af)
857 continue;
858 if (ifa_maybe == 0)
859 ifa_maybe = ifa;
860 if (ifa->ifa_netmask == NULL) {
861 if (sa_equal(addr, ifa->ifa_addr) ||
862 (ifa->ifa_dstaddr != NULL &&
863 sa_equal(addr, ifa->ifa_dstaddr)))
864 return (ifa);
865 continue;
866 }
867 if (ifp->if_flags & IFF_POINTOPOINT) {
868 if (sa_equal(addr, ifa->ifa_dstaddr))
869 return (ifa);
870 } else {
871 cp = addr->sa_data;
872 cp2 = ifa->ifa_addr->sa_data;
873 cp3 = ifa->ifa_netmask->sa_data;
874 cplim = ifa->ifa_netmask->sa_len + (char *)ifa->ifa_netmask;
875 for (; cp3 < cplim; cp3++)
876 if ((*cp++ ^ *cp2++) & *cp3)
877 break;
878 if (cp3 == cplim)
879 return (ifa);
880 }
881 }
882 return (ifa_maybe);
883}
884
885#include <net/route.h>
886
887/*
888 * Default action when installing a route with a Link Level gateway.
889 * Lookup an appropriate real ifa to point to.
890 * This should be moved to /sys/net/link.c eventually.
891 */
892static void
893link_rtrequest(int cmd, struct rtentry *rt, struct rt_addrinfo *info)
894{
895 struct ifaddr *ifa;
896 struct sockaddr *dst;
897 struct ifnet *ifp;
898
899 if (cmd != RTM_ADD || (ifa = rt->rt_ifa) == NULL ||
900 (ifp = ifa->ifa_ifp) == NULL || (dst = rt_key(rt)) == NULL)
901 return;
902 ifa = ifaof_ifpforaddr(dst, ifp);
903 if (ifa != NULL) {
904 IFAFREE(rt->rt_ifa);
905 IFAREF(ifa);
906 rt->rt_ifa = ifa;
907 if (ifa->ifa_rtrequest && ifa->ifa_rtrequest != link_rtrequest)
908 ifa->ifa_rtrequest(cmd, rt, info);
909 }
910}
911
912/*
913 * Mark an interface down and notify protocols of
914 * the transition.
915 * NOTE: must be called at splnet or eqivalent.
916 */
917void
918if_unroute(struct ifnet *ifp, int flag, int fam)
919{
920 struct ifaddr *ifa;
921
922 ifp->if_flags &= ~flag;
923 getmicrotime(&ifp->if_lastchange);
924 TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link)
925 if (fam == PF_UNSPEC || (fam == ifa->ifa_addr->sa_family))
926 pfctlinput(PRC_IFDOWN, ifa->ifa_addr);
927 ifq_purge(&ifp->if_snd);
928 rt_ifmsg(ifp);
929}
930
931/*
932 * Mark an interface up and notify protocols of
933 * the transition.
934 * NOTE: must be called at splnet or eqivalent.
935 */
936void
937if_route(struct ifnet *ifp, int flag, int fam)
938{
939 struct ifaddr *ifa;
940
941 ifp->if_flags |= flag;
942 getmicrotime(&ifp->if_lastchange);
943 TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link)
944 if (fam == PF_UNSPEC || (fam == ifa->ifa_addr->sa_family))
945 pfctlinput(PRC_IFUP, ifa->ifa_addr);
946 rt_ifmsg(ifp);
947#ifdef INET6
948 in6_if_up(ifp);
949#endif
950}
951
952/*
953 * Mark an interface down and notify protocols of the transition. An
954 * interface going down is also considered to be a synchronizing event.
955 * We must ensure that all packet processing related to the interface
956 * has completed before we return so e.g. the caller can free the ifnet
957 * structure that the mbufs may be referencing.
958 *
959 * NOTE: must be called at splnet or eqivalent.
960 */
961void
962if_down(struct ifnet *ifp)
963{
964 if_unroute(ifp, IFF_UP, AF_UNSPEC);
965 netmsg_service_sync();
966}
967
968/*
969 * Mark an interface up and notify protocols of
970 * the transition.
971 * NOTE: must be called at splnet or eqivalent.
972 */
973void
974if_up(struct ifnet *ifp)
975{
976
977 if_route(ifp, IFF_UP, AF_UNSPEC);
978}
979
980/*
981 * Process a link state change.
982 * NOTE: must be called at splsoftnet or equivalent.
983 */
984void
985if_link_state_change(struct ifnet *ifp)
986{
987 rt_ifmsg(ifp);
988}
989
990/*
991 * Handle interface watchdog timer routines. Called
992 * from softclock, we decrement timers (if set) and
993 * call the appropriate interface routine on expiration.
994 */
995static void
996if_slowtimo(void *arg)
997{
998 struct ifnet *ifp;
999
1000 crit_enter();
1001
1002 TAILQ_FOREACH(ifp, &ifnet, if_link) {
1003 if (ifp->if_timer == 0 || --ifp->if_timer)
1004 continue;
1005 if (ifp->if_watchdog) {
1006 if (lwkt_serialize_try(ifp->if_serializer)) {
1007 (*ifp->if_watchdog)(ifp);
1008 lwkt_serialize_exit(ifp->if_serializer);
1009 } else {
1010 /* try again next timeout */
1011 ++ifp->if_timer;
1012 }
1013 }
1014 }
1015
1016 crit_exit();
1017
1018 callout_reset(&if_slowtimo_timer, hz / IFNET_SLOWHZ, if_slowtimo, NULL);
1019}
1020
1021/*
1022 * Map interface name to
1023 * interface structure pointer.
1024 */
1025struct ifnet *
1026ifunit(const char *name)
1027{
1028 struct ifnet *ifp;
1029
1030 /*
1031 * Search all the interfaces for this name/number
1032 */
1033
1034 TAILQ_FOREACH(ifp, &ifnet, if_link) {
1035 if (strncmp(ifp->if_xname, name, IFNAMSIZ) == 0)
1036 break;
1037 }
1038 return (ifp);
1039}
1040
1041
1042/*
1043 * Map interface name in a sockaddr_dl to
1044 * interface structure pointer.
1045 */
1046struct ifnet *
1047if_withname(struct sockaddr *sa)
1048{
1049 char ifname[IFNAMSIZ+1];
1050 struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa;
1051
1052 if ( (sa->sa_family != AF_LINK) || (sdl->sdl_nlen == 0) ||
1053 (sdl->sdl_nlen > IFNAMSIZ) )
1054 return NULL;
1055
1056 /*
1057 * ifunit wants a null-terminated name. It may not be null-terminated
1058 * in the sockaddr. We don't want to change the caller's sockaddr,
1059 * and there might not be room to put the trailing null anyway, so we
1060 * make a local copy that we know we can null terminate safely.
1061 */
1062
1063 bcopy(sdl->sdl_data, ifname, sdl->sdl_nlen);
1064 ifname[sdl->sdl_nlen] = '\0';
1065 return ifunit(ifname);
1066}
1067
1068
1069/*
1070 * Interface ioctls.
1071 */
1072int
1073ifioctl(struct socket *so, u_long cmd, caddr_t data, struct ucred *cred)
1074{
1075 struct ifnet *ifp;
1076 struct ifreq *ifr;
1077 struct ifstat *ifs;
1078 int error;
1079 short oif_flags;
1080 int new_flags;
1081 size_t namelen, onamelen;
1082 char new_name[IFNAMSIZ];
1083 struct ifaddr *ifa;
1084 struct sockaddr_dl *sdl;
1085
1086 switch (cmd) {
1087
1088 case SIOCGIFCONF:
1089 case OSIOCGIFCONF:
1090 return (ifconf(cmd, data, cred));
1091 }
1092 ifr = (struct ifreq *)data;
1093
1094 switch (cmd) {
1095 case SIOCIFCREATE:
1096 case SIOCIFDESTROY:
1097 if ((error = suser_cred(cred, 0)) != 0)
1098 return (error);
1099 return ((cmd == SIOCIFCREATE) ?
1100 if_clone_create(ifr->ifr_name, sizeof(ifr->ifr_name)) :
1101 if_clone_destroy(ifr->ifr_name));
1102
1103 case SIOCIFGCLONERS:
1104 return (if_clone_list((struct if_clonereq *)data));
1105 }
1106
1107 ifp = ifunit(ifr->ifr_name);
1108 if (ifp == 0)
1109 return (ENXIO);
1110 switch (cmd) {
1111
1112 case SIOCGIFFLAGS:
1113 ifr->ifr_flags = ifp->if_flags;
1114 ifr->ifr_flagshigh = ifp->if_flags >> 16;
1115 break;
1116
1117 case SIOCGIFCAP:
1118 ifr->ifr_reqcap = ifp->if_capabilities;
1119 ifr->ifr_curcap = ifp->if_capenable;
1120 break;
1121
1122 case SIOCGIFMETRIC:
1123 ifr->ifr_metric = ifp->if_metric;
1124 break;
1125
1126 case SIOCGIFMTU:
1127 ifr->ifr_mtu = ifp->if_mtu;
1128 break;
1129
1130 case SIOCGIFPHYS:
1131 ifr->ifr_phys = ifp->if_physical;
1132 break;
1133
1134 case SIOCSIFFLAGS:
1135 error = suser_cred(cred, 0);
1136 if (error)
1137 return (error);
1138 new_flags = (ifr->ifr_flags & 0xffff) |
1139 (ifr->ifr_flagshigh << 16);
1140 if (ifp->if_flags & IFF_SMART) {
1141 /* Smart drivers twiddle their own routes */
1142 } else if (ifp->if_flags & IFF_UP &&
1143 (new_flags & IFF_UP) == 0) {
1144 crit_enter();
1145 if_down(ifp);
1146 crit_exit();
1147 } else if (new_flags & IFF_UP &&
1148 (ifp->if_flags & IFF_UP) == 0) {
1149 crit_enter();
1150 if_up(ifp);
1151 crit_exit();
1152 }
1153
1154#ifdef DEVICE_POLLING
1155 if ((new_flags ^ ifp->if_flags) & IFF_POLLING) {
1156 if (new_flags & IFF_POLLING) {
1157 ether_poll_register(ifp);
1158 } else {
1159 ether_poll_deregister(ifp);
1160 }
1161 }
1162#endif
1163
1164 ifp->if_flags = (ifp->if_flags & IFF_CANTCHANGE) |
1165 (new_flags &~ IFF_CANTCHANGE);
1166 if (new_flags & IFF_PPROMISC) {
1167 /* Permanently promiscuous mode requested */
1168 ifp->if_flags |= IFF_PROMISC;
1169 } else if (ifp->if_pcount == 0) {
1170 ifp->if_flags &= ~IFF_PROMISC;
1171 }
1172 if (ifp->if_ioctl) {
1173 lwkt_serialize_enter(ifp->if_serializer);
1174 ifp->if_ioctl(ifp, cmd, data, cred);
1175 lwkt_serialize_exit(ifp->if_serializer);
1176 }
1177 getmicrotime(&ifp->if_lastchange);
1178 break;
1179
1180 case SIOCSIFCAP:
1181 error = suser_cred(cred, 0);
1182 if (error)
1183 return (error);
1184 if (ifr->ifr_reqcap & ~ifp->if_capabilities)
1185 return (EINVAL);
1186 lwkt_serialize_enter(ifp->if_serializer);
1187 ifp->if_ioctl(ifp, cmd, data, cred);
1188 lwkt_serialize_exit(ifp->if_serializer);
1189 break;
1190
1191 case SIOCSIFNAME:
1192 error = suser_cred(cred, 0);
1193 if (error != 0)
1194 return (error);
1195 error = copyinstr(ifr->ifr_data, new_name, IFNAMSIZ, NULL);
1196 if (error != 0)
1197 return (error);
1198 if (new_name[0] == '\0')
1199 return (EINVAL);
1200 if (ifunit(new_name) != NULL)
1201 return (EEXIST);
1202
1203 EVENTHANDLER_INVOKE(ifnet_detach_event, ifp);
1204
1205 /* Announce the departure of the interface. */
1206 rt_ifannouncemsg(ifp, IFAN_DEPARTURE);
1207
1208 strlcpy(ifp->if_xname, new_name, sizeof(ifp->if_xname));
1209 ifa = TAILQ_FIRST(&ifp->if_addrhead);
1210 /* XXX IFA_LOCK(ifa); */
1211 sdl = (struct sockaddr_dl *)ifa->ifa_addr;
1212 namelen = strlen(new_name);
1213 onamelen = sdl->sdl_nlen;
1214 /*
1215 * Move the address if needed. This is safe because we
1216 * allocate space for a name of length IFNAMSIZ when we
1217 * create this in if_attach().
1218 */
1219 if (namelen != onamelen) {
1220 bcopy(sdl->sdl_data + onamelen,
1221 sdl->sdl_data + namelen, sdl->sdl_alen);
1222 }
1223 bcopy(new_name, sdl->sdl_data, namelen);
1224 sdl->sdl_nlen = namelen;
1225 sdl = (struct sockaddr_dl *)ifa->ifa_netmask;
1226 bzero(sdl->sdl_data, onamelen);
1227 while (namelen != 0)
1228 sdl->sdl_data[--namelen] = 0xff;
1229 /* XXX IFA_UNLOCK(ifa) */
1230
1231 EVENTHANDLER_INVOKE(ifnet_attach_event, ifp);
1232
1233 /* Announce the return of the interface. */
1234 rt_ifannouncemsg(ifp, IFAN_ARRIVAL);
1235 break;
1236
1237 case SIOCSIFMETRIC:
1238 error = suser_cred(cred, 0);
1239 if (error)
1240 return (error);
1241 ifp->if_metric = ifr->ifr_metric;
1242 getmicrotime(&ifp->if_lastchange);
1243 break;
1244
1245 case SIOCSIFPHYS:
1246 error = suser_cred(cred, 0);
1247 if (error)
1248 return error;
1249 if (!ifp->if_ioctl)
1250 return EOPNOTSUPP;
1251 lwkt_serialize_enter(ifp->if_serializer);
1252 error = ifp->if_ioctl(ifp, cmd, data, cred);
1253 lwkt_serialize_exit(ifp->if_serializer);
1254 if (error == 0)
1255 getmicrotime(&ifp->if_lastchange);
1256 return (error);
1257
1258 case SIOCSIFMTU:
1259 {
1260 u_long oldmtu = ifp->if_mtu;
1261
1262 error = suser_cred(cred, 0);
1263 if (error)
1264 return (error);
1265 if (ifp->if_ioctl == NULL)
1266 return (EOPNOTSUPP);
1267 if (ifr->ifr_mtu < IF_MINMTU || ifr->ifr_mtu > IF_MAXMTU)
1268 return (EINVAL);
1269 lwkt_serialize_enter(ifp->if_serializer);
1270 error = ifp->if_ioctl(ifp, cmd, data, cred);
1271 lwkt_serialize_exit(ifp->if_serializer);
1272 if (error == 0) {
1273 getmicrotime(&ifp->if_lastchange);
1274 rt_ifmsg(ifp);
1275 }
1276 /*
1277 * If the link MTU changed, do network layer specific procedure.
1278 */
1279 if (ifp->if_mtu != oldmtu) {
1280#ifdef INET6
1281 nd6_setmtu(ifp);
1282#endif
1283 }
1284 return (error);
1285 }
1286
1287 case SIOCADDMULTI:
1288 case SIOCDELMULTI:
1289 error = suser_cred(cred, 0);
1290 if (error)
1291 return (error);
1292
1293 /* Don't allow group membership on non-multicast interfaces. */
1294 if ((ifp->if_flags & IFF_MULTICAST) == 0)
1295 return EOPNOTSUPP;
1296
1297 /* Don't let users screw up protocols' entries. */
1298 if (ifr->ifr_addr.sa_family != AF_LINK)
1299 return EINVAL;
1300
1301 if (cmd == SIOCADDMULTI) {
1302 struct ifmultiaddr *ifma;
1303 error = if_addmulti(ifp, &ifr->ifr_addr, &ifma);
1304 } else {
1305 error = if_delmulti(ifp, &ifr->ifr_addr);
1306 }
1307 if (error == 0)
1308 getmicrotime(&ifp->if_lastchange);
1309 return error;
1310
1311 case SIOCSIFPHYADDR:
1312 case SIOCDIFPHYADDR:
1313#ifdef INET6
1314 case SIOCSIFPHYADDR_IN6:
1315#endif
1316 case SIOCSLIFPHYADDR:
1317 case SIOCSIFMEDIA:
1318 case SIOCSIFGENERIC:
1319 error = suser_cred(cred, 0);
1320 if (error)
1321 return (error);
1322 if (ifp->if_ioctl == 0)
1323 return (EOPNOTSUPP);
1324 lwkt_serialize_enter(ifp->if_serializer);
1325 error = ifp->if_ioctl(ifp, cmd, data, cred);
1326 lwkt_serialize_exit(ifp->if_serializer);
1327 if (error == 0)
1328 getmicrotime(&ifp->if_lastchange);
1329 return error;
1330
1331 case SIOCGIFSTATUS:
1332 ifs = (struct ifstat *)data;
1333 ifs->ascii[0] = '\0';
1334
1335 case SIOCGIFPSRCADDR:
1336 case SIOCGIFPDSTADDR:
1337 case SIOCGLIFPHYADDR:
1338 case SIOCGIFMEDIA:
1339 case SIOCGIFGENERIC:
1340 if (ifp->if_ioctl == NULL)
1341 return (EOPNOTSUPP);
1342 lwkt_serialize_enter(ifp->if_serializer);
1343 error = ifp->if_ioctl(ifp, cmd, data, cred);
1344 lwkt_serialize_exit(ifp->if_serializer);
1345 return (error);
1346
1347 case SIOCSIFLLADDR:
1348 error = suser_cred(cred, 0);
1349 if (error)
1350 return (error);
1351 return if_setlladdr(ifp,
1352 ifr->ifr_addr.sa_data, ifr->ifr_addr.sa_len);
1353
1354 default:
1355 oif_flags = ifp->if_flags;
1356 if (so->so_proto == 0)
1357 return (EOPNOTSUPP);
1358#ifndef COMPAT_43
1359 error = so_pru_control(so, cmd, data, ifp);
1360#else
1361 {
1362 int ocmd = cmd;
1363
1364 switch (cmd) {
1365
1366 case SIOCSIFDSTADDR:
1367 case SIOCSIFADDR:
1368 case SIOCSIFBRDADDR:
1369 case SIOCSIFNETMASK:
1370#if BYTE_ORDER != BIG_ENDIAN
1371 if (ifr->ifr_addr.sa_family == 0 &&
1372 ifr->ifr_addr.sa_len < 16) {
1373 ifr->ifr_addr.sa_family = ifr->ifr_addr.sa_len;
1374 ifr->ifr_addr.sa_len = 16;
1375 }
1376#else
1377 if (ifr->ifr_addr.sa_len == 0)
1378 ifr->ifr_addr.sa_len = 16;
1379#endif
1380 break;
1381
1382 case OSIOCGIFADDR:
1383 cmd = SIOCGIFADDR;
1384 break;
1385
1386 case OSIOCGIFDSTADDR:
1387 cmd = SIOCGIFDSTADDR;
1388 break;
1389
1390 case OSIOCGIFBRDADDR:
1391 cmd = SIOCGIFBRDADDR;
1392 break;
1393
1394 case OSIOCGIFNETMASK:
1395 cmd = SIOCGIFNETMASK;
1396 }
1397 error = so_pru_control(so, cmd, data, ifp);
1398 switch (ocmd) {
1399
1400 case OSIOCGIFADDR:
1401 case OSIOCGIFDSTADDR:
1402 case OSIOCGIFBRDADDR:
1403 case OSIOCGIFNETMASK:
1404 *(u_short *)&ifr->ifr_addr = ifr->ifr_addr.sa_family;
1405
1406 }
1407 }
1408#endif /* COMPAT_43 */
1409
1410 if ((oif_flags ^ ifp->if_flags) & IFF_UP) {
1411#ifdef INET6
1412 DELAY(100);/* XXX: temporary workaround for fxp issue*/
1413 if (ifp->if_flags & IFF_UP) {
1414 crit_enter();
1415 in6_if_up(ifp);
1416 crit_exit();
1417 }
1418#endif
1419 }
1420 return (error);
1421
1422 }
1423 return (0);
1424}
1425
1426/*
1427 * Set/clear promiscuous mode on interface ifp based on the truth value
1428 * of pswitch. The calls are reference counted so that only the first
1429 * "on" request actually has an effect, as does the final "off" request.
1430 * Results are undefined if the "off" and "on" requests are not matched.
1431 */
1432int
1433ifpromisc(struct ifnet *ifp, int pswitch)
1434{
1435 struct ifreq ifr;
1436 int error;
1437 int oldflags;
1438
1439 oldflags = ifp->if_flags;
1440 if (ifp->if_flags & IFF_PPROMISC) {
1441 /* Do nothing if device is in permanently promiscuous mode */
1442 ifp->if_pcount += pswitch ? 1 : -1;
1443 return (0);
1444 }
1445 if (pswitch) {
1446 /*
1447 * If the device is not configured up, we cannot put it in
1448 * promiscuous mode.
1449 */
1450 if ((ifp->if_flags & IFF_UP) == 0)
1451 return (ENETDOWN);
1452 if (ifp->if_pcount++ != 0)
1453 return (0);
1454 ifp->if_flags |= IFF_PROMISC;
1455 log(LOG_INFO, "%s: promiscuous mode enabled\n",
1456 ifp->if_xname);
1457 } else {
1458 if (--ifp->if_pcount > 0)
1459 return (0);
1460 ifp->if_flags &= ~IFF_PROMISC;
1461 log(LOG_INFO, "%s: promiscuous mode disabled\n",
1462 ifp->if_xname);
1463 }
1464 ifr.ifr_flags = ifp->if_flags;
1465 ifr.ifr_flagshigh = ifp->if_flags >> 16;
1466 lwkt_serialize_enter(ifp->if_serializer);
1467 error = ifp->if_ioctl(ifp, SIOCSIFFLAGS, (caddr_t)&ifr,
1468 (struct ucred *)NULL);
1469 lwkt_serialize_exit(ifp->if_serializer);
1470 if (error == 0)
1471 rt_ifmsg(ifp);
1472 else
1473 ifp->if_flags = oldflags;
1474 return error;
1475}
1476
1477/*
1478 * Return interface configuration
1479 * of system. List may be used
1480 * in later ioctl's (above) to get
1481 * other information.
1482 */
1483static int
1484ifconf(u_long cmd, caddr_t data, struct ucred *cred)
1485{
1486 struct ifconf *ifc = (struct ifconf *)data;
1487 struct ifnet *ifp;
1488 struct ifaddr *ifa;
1489 struct sockaddr *sa;
1490 struct ifreq ifr, *ifrp;
1491 int space = ifc->ifc_len, error = 0;
1492
1493 ifrp = ifc->ifc_req;
1494 TAILQ_FOREACH(ifp, &ifnet, if_link) {
1495 int addrs;
1496
1497 if (space <= sizeof ifr)
1498 break;
1499
1500 /*
1501 * Zero the stack declared structure first to prevent
1502 * memory disclosure.
1503 */
1504 bzero(&ifr, sizeof(ifr));
1505 if (strlcpy(ifr.ifr_name, ifp->if_xname, sizeof(ifr.ifr_name))
1506 >= sizeof(ifr.ifr_name)) {
1507 error = ENAMETOOLONG;
1508 break;
1509 }
1510
1511 addrs = 0;
1512 TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
1513 if (space <= sizeof ifr)
1514 break;
1515 sa = ifa->ifa_addr;
1516 if (cred->cr_prison &&
1517 prison_if(cred, sa))
1518 continue;
1519 addrs++;
1520#ifdef COMPAT_43
1521 if (cmd == OSIOCGIFCONF) {
1522 struct osockaddr *osa =
1523 (struct osockaddr *)&ifr.ifr_addr;
1524 ifr.ifr_addr = *sa;
1525 osa->sa_family = sa->sa_family;
1526 error = copyout(&ifr, ifrp, sizeof ifr);
1527 ifrp++;
1528 } else
1529#endif
1530 if (sa->sa_len <= sizeof(*sa)) {
1531 ifr.ifr_addr = *sa;
1532 error = copyout(&ifr, ifrp, sizeof ifr);
1533 ifrp++;
1534 } else {
1535 if (space < (sizeof ifr) + sa->sa_len -
1536 sizeof(*sa))
1537 break;
1538 space -= sa->sa_len - sizeof(*sa);
1539 error = copyout(&ifr, ifrp,
1540 sizeof ifr.ifr_name);
1541 if (error == 0)
1542 error = copyout(sa, &ifrp->ifr_addr,
1543 sa->sa_len);
1544 ifrp = (struct ifreq *)
1545 (sa->sa_len + (caddr_t)&ifrp->ifr_addr);
1546 }
1547 if (error)
1548 break;
1549 space -= sizeof ifr;
1550 }
1551 if (error)
1552 break;
1553 if (!addrs) {
1554 bzero(&ifr.ifr_addr, sizeof ifr.ifr_addr);
1555 error = copyout(&ifr, ifrp, sizeof ifr);
1556 if (error)
1557 break;
1558 space -= sizeof ifr;
1559 ifrp++;
1560 }
1561 }
1562 ifc->ifc_len -= space;
1563 return (error);
1564}
1565
1566/*
1567 * Just like if_promisc(), but for all-multicast-reception mode.
1568 */
1569int
1570if_allmulti(struct ifnet *ifp, int onswitch)
1571{
1572 int error = 0;
1573 struct ifreq ifr;
1574
1575 crit_enter();
1576
1577 if (onswitch) {
1578 if (ifp->if_amcount++ == 0) {
1579 ifp->if_flags |= IFF_ALLMULTI;
1580 ifr.ifr_flags = ifp->if_flags;
1581 ifr.ifr_flagshigh = ifp->if_flags >> 16;
1582 lwkt_serialize_enter(ifp->if_serializer);
1583 error = ifp->if_ioctl(ifp, SIOCSIFFLAGS, (caddr_t)&ifr,
1584 (struct ucred *)NULL);
1585 lwkt_serialize_exit(ifp->if_serializer);
1586 }
1587 } else {
1588 if (ifp->if_amcount > 1) {
1589 ifp->if_amcount--;
1590 } else {
1591 ifp->if_amcount = 0;
1592 ifp->if_flags &= ~IFF_ALLMULTI;
1593 ifr.ifr_flags = ifp->if_flags;
1594 ifr.ifr_flagshigh = ifp->if_flags >> 16;
1595 lwkt_serialize_enter(ifp->if_serializer);
1596 error = ifp->if_ioctl(ifp, SIOCSIFFLAGS, (caddr_t)&ifr,
1597 (struct ucred *)NULL);
1598 lwkt_serialize_exit(ifp->if_serializer);
1599 }
1600 }
1601
1602 crit_exit();
1603
1604 if (error == 0)
1605 rt_ifmsg(ifp);
1606 return error;
1607}
1608
1609/*
1610 * Add a multicast listenership to the interface in question.
1611 * The link layer provides a routine which converts
1612 */
1613int
1614if_addmulti(
1615 struct ifnet *ifp, /* interface to manipulate */
1616 struct sockaddr *sa, /* address to add */
1617 struct ifmultiaddr **retifma)
1618{
1619 struct sockaddr *llsa, *dupsa;
1620 int error;
1621 struct ifmultiaddr *ifma;
1622
1623 /*
1624 * If the matching multicast address already exists
1625 * then don't add a new one, just add a reference
1626 */
1627 LIST_FOREACH(ifma, &ifp->if_multiaddrs, ifma_link) {
1628 if (sa_equal(sa, ifma->ifma_addr)) {
1629 ifma->ifma_refcount++;
1630 if (retifma)
1631 *retifma = ifma;
1632 return 0;
1633 }
1634 }
1635
1636 /*
1637 * Give the link layer a chance to accept/reject it, and also
1638 * find out which AF_LINK address this maps to, if it isn't one
1639 * already.
1640 */
1641 if (ifp->if_resolvemulti) {
1642 lwkt_serialize_enter(ifp->if_serializer);
1643 error = ifp->if_resolvemulti(ifp, &llsa, sa);
1644 lwkt_serialize_exit(ifp->if_serializer);
1645 if (error)
1646 return error;
1647 } else {
1648 llsa = 0;
1649 }
1650
1651 MALLOC(ifma, struct ifmultiaddr *, sizeof *ifma, M_IFMADDR, M_WAITOK);
1652 MALLOC(dupsa, struct sockaddr *, sa->sa_len, M_IFMADDR, M_WAITOK);
1653 bcopy(sa, dupsa, sa->sa_len);
1654
1655 ifma->ifma_addr = dupsa;
1656 ifma->ifma_lladdr = llsa;
1657 ifma->ifma_ifp = ifp;
1658 ifma->ifma_refcount = 1;
1659 ifma->ifma_protospec = 0;
1660 rt_newmaddrmsg(RTM_NEWMADDR, ifma);
1661
1662 /*
1663 * Some network interfaces can scan the address list at
1664 * interrupt time; lock them out.
1665 */
1666 crit_enter();
1667 LIST_INSERT_HEAD(&ifp->if_multiaddrs, ifma, ifma_link);
1668 crit_exit();
1669 *retifma = ifma;
1670
1671 if (llsa != 0) {
1672 LIST_FOREACH(ifma, &ifp->if_multiaddrs, ifma_link) {
1673 if (sa_equal(ifma->ifma_addr, llsa))
1674 break;
1675 }
1676 if (ifma) {
1677 ifma->ifma_refcount++;
1678 } else {
1679 MALLOC(ifma, struct ifmultiaddr *, sizeof *ifma,
1680 M_IFMADDR, M_WAITOK);
1681 MALLOC(dupsa, struct sockaddr *, llsa->sa_len,
1682 M_IFMADDR, M_WAITOK);
1683 bcopy(llsa, dupsa, llsa->sa_len);
1684 ifma->ifma_addr = dupsa;
1685 ifma->ifma_ifp = ifp;
1686 ifma->ifma_refcount = 1;
1687 crit_enter();
1688 LIST_INSERT_HEAD(&ifp->if_multiaddrs, ifma, ifma_link);
1689 crit_exit();
1690 }
1691 }
1692 /*
1693 * We are certain we have added something, so call down to the
1694 * interface to let them know about it.
1695 */
1696 crit_enter();
1697 lwkt_serialize_enter(ifp->if_serializer);
1698 ifp->if_ioctl(ifp, SIOCADDMULTI, 0, (struct ucred *)NULL);
1699 lwkt_serialize_exit(ifp->if_serializer);
1700 crit_exit();
1701
1702 return 0;
1703}
1704
1705/*
1706 * Remove a reference to a multicast address on this interface. Yell
1707 * if the request does not match an existing membership.
1708 */
1709int
1710if_delmulti(struct ifnet *ifp, struct sockaddr *sa)
1711{
1712 struct ifmultiaddr *ifma;
1713
1714 LIST_FOREACH(ifma, &ifp->if_multiaddrs, ifma_link)
1715 if (sa_equal(sa, ifma->ifma_addr))
1716 break;
1717 if (ifma == 0)
1718 return ENOENT;
1719
1720 if (ifma->ifma_refcount > 1) {
1721 ifma->ifma_refcount--;
1722 return 0;
1723 }
1724
1725 rt_newmaddrmsg(RTM_DELMADDR, ifma);
1726 sa = ifma->ifma_lladdr;
1727 crit_enter();
1728 LIST_REMOVE(ifma, ifma_link);
1729 /*
1730 * Make sure the interface driver is notified
1731 * in the case of a link layer mcast group being left.
1732 */
1733 if (ifma->ifma_addr->sa_family == AF_LINK && sa == 0) {
1734 lwkt_serialize_enter(ifp->if_serializer);
1735 ifp->if_ioctl(ifp, SIOCDELMULTI, 0, (struct ucred *)NULL);
1736 lwkt_serialize_exit(ifp->if_serializer);
1737 }
1738 crit_exit();
1739 kfree(ifma->ifma_addr, M_IFMADDR);
1740 kfree(ifma, M_IFMADDR);
1741 if (sa == 0)
1742 return 0;
1743
1744 /*
1745 * Now look for the link-layer address which corresponds to
1746 * this network address. It had been squirreled away in
1747 * ifma->ifma_lladdr for this purpose (so we don't have
1748 * to call ifp->if_resolvemulti() again), and we saved that
1749 * value in sa above. If some nasty deleted the
1750 * link-layer address out from underneath us, we can deal because
1751 * the address we stored was is not the same as the one which was
1752 * in the record for the link-layer address. (So we don't complain
1753 * in that case.)
1754 */
1755 LIST_FOREACH(ifma, &ifp->if_multiaddrs, ifma_link)
1756 if (sa_equal(sa, ifma->ifma_addr))
1757 break;
1758 if (ifma == 0)
1759 return 0;
1760
1761 if (ifma->ifma_refcount > 1) {
1762 ifma->ifma_refcount--;
1763 return 0;
1764 }
1765
1766 crit_enter();
1767 lwkt_serialize_enter(ifp->if_serializer);
1768 LIST_REMOVE(ifma, ifma_link);
1769 ifp->if_ioctl(ifp, SIOCDELMULTI, 0, (struct ucred *)NULL);
1770 lwkt_serialize_exit(ifp->if_serializer);
1771 crit_exit();
1772 kfree(ifma->ifma_addr, M_IFMADDR);
1773 kfree(sa, M_IFMADDR);
1774 kfree(ifma, M_IFMADDR);
1775
1776 return 0;
1777}
1778
1779/*
1780 * Set the link layer address on an interface.
1781 *
1782 * At this time we only support certain types of interfaces,
1783 * and we don't allow the length of the address to change.
1784 */
1785int
1786if_setlladdr(struct ifnet *ifp, const u_char *lladdr, int len)
1787{
1788 struct sockaddr_dl *sdl;
1789 struct ifaddr *ifa;
1790 struct ifreq ifr;
1791
1792 sdl = IF_LLSOCKADDR(ifp);
1793 if (sdl == NULL)
1794 return (EINVAL);
1795 if (len != sdl->sdl_alen) /* don't allow length to change */
1796 return (EINVAL);
1797 switch (ifp->if_type) {
1798 case IFT_ETHER: /* these types use struct arpcom */
1799 case IFT_FDDI:
1800 case IFT_XETHER:
1801 case IFT_ISO88025:
1802 case IFT_L2VLAN:
1803 bcopy(lladdr, ((struct arpcom *)ifp->if_softc)->ac_enaddr, len);
1804 /* FALLTHROUGH */
1805 case IFT_ARCNET:
1806 bcopy(lladdr, LLADDR(sdl), len);
1807 break;
1808 default:
1809 return (ENODEV);
1810 }
1811 /*
1812 * If the interface is already up, we need
1813 * to re-init it in order to reprogram its
1814 * address filter.
1815 */
1816 lwkt_serialize_enter(ifp->if_serializer);
1817 if ((ifp->if_flags & IFF_UP) != 0) {
1818 ifp->if_flags &= ~IFF_UP;
1819 ifr.ifr_flags = ifp->if_flags;
1820 ifr.ifr_flagshigh = ifp->if_flags >> 16;
1821 ifp->if_ioctl(ifp, SIOCSIFFLAGS, (caddr_t)&ifr,
1822 (struct ucred *)NULL);
1823 ifp->if_flags |= IFF_UP;
1824 ifr.ifr_flags = ifp->if_flags;
1825 ifr.ifr_flagshigh = ifp->if_flags >> 16;
1826 ifp->if_ioctl(ifp, SIOCSIFFLAGS, (caddr_t)&ifr,
1827 (struct ucred *)NULL);
1828#ifdef INET
1829 /*
1830 * Also send gratuitous ARPs to notify other nodes about
1831 * the address change.
1832 */
1833 TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
1834 if (ifa->ifa_addr != NULL &&
1835 ifa->ifa_addr->sa_family == AF_INET)
1836 arp_ifinit(ifp, ifa);
1837 }
1838#endif
1839 }
1840 lwkt_serialize_exit(ifp->if_serializer);
1841 return (0);
1842}
1843
1844struct ifmultiaddr *
1845ifmaof_ifpforaddr(struct sockaddr *sa, struct ifnet *ifp)
1846{
1847 struct ifmultiaddr *ifma;
1848
1849 LIST_FOREACH(ifma, &ifp->if_multiaddrs, ifma_link)
1850 if (sa_equal(ifma->ifma_addr, sa))
1851 break;
1852
1853 return ifma;
1854}
1855
1856/*
1857 * The name argument must be a pointer to storage which will last as
1858 * long as the interface does. For physical devices, the result of
1859 * device_get_name(dev) is a good choice and for pseudo-devices a
1860 * static string works well.
1861 */
1862void
1863if_initname(struct ifnet *ifp, const char *name, int unit)
1864{
1865 ifp->if_dname = name;
1866 ifp->if_dunit = unit;
1867 if (unit != IF_DUNIT_NONE)
1868 ksnprintf(ifp->if_xname, IFNAMSIZ, "%s%d", name, unit);
1869 else
1870 strlcpy(ifp->if_xname, name, IFNAMSIZ);
1871}
1872
1873int
1874if_printf(struct ifnet *ifp, const char *fmt, ...)
1875{
1876 __va_list ap;
1877 int retval;
1878
1879 retval = kprintf("%s: ", ifp->if_xname);
1880 __va_start(ap, fmt);
1881 retval += kvprintf(fmt, ap);
1882 __va_end(ap);
1883 return (retval);
1884}
1885
1886SYSCTL_NODE(_net, PF_LINK, link, CTLFLAG_RW, 0, "Link layers");
1887SYSCTL_NODE(_net_link, 0, generic, CTLFLAG_RW, 0, "Generic link-management");
1888
1889void
1890ifq_set_classic(struct ifaltq *ifq)
1891{
1892 ifq->altq_enqueue = ifq_classic_enqueue;
1893 ifq->altq_dequeue = ifq_classic_dequeue;
1894 ifq->altq_request = ifq_classic_request;
1895}
1896
1897static int
1898ifq_classic_enqueue(struct ifaltq *ifq, struct mbuf *m,
1899 struct altq_pktattr *pa __unused)
1900{
1901 crit_enter();
1902 if (IF_QFULL(ifq)) {
1903 m_freem(m);
1904 crit_exit();
1905 return(ENOBUFS);
1906 } else {
1907 IF_ENQUEUE(ifq, m);
1908 crit_exit();
1909 return(0);
1910 }
1911}
1912
1913static struct mbuf *
1914ifq_classic_dequeue(struct ifaltq *ifq, struct mbuf *mpolled, int op)
1915{
1916 struct mbuf *m;
1917
1918 crit_enter();
1919 switch (op) {
1920 case ALTDQ_POLL:
1921 IF_POLL(ifq, m);
1922 break;
1923 case ALTDQ_REMOVE:
1924 IF_DEQUEUE(ifq, m);
1925 break;
1926 default:
1927 panic("unsupported ALTQ dequeue op: %d", op);
1928 }
1929 crit_exit();
1930 KKASSERT(mpolled == NULL || mpolled == m);
1931 return(m);
1932}
1933
1934static int
1935ifq_classic_request(struct ifaltq *ifq, int req, void *arg)
1936{
1937 crit_enter();
1938 switch (req) {
1939 case ALTRQ_PURGE:
1940 IF_DRAIN(ifq);
1941 break;
1942 default:
1943 panic("unspported ALTQ request: %d", req);
1944 }
1945 crit_exit();
1946 return(0);
1947}
1948