1 /* 2 * Copyright (c) 1980, 1986, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. All advertising materials mentioning features or use of this software 14 * must display the following acknowledgement: 15 * This product includes software developed by the University of 16 * California, Berkeley and its contributors. 17 * 4. Neither the name of the University nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * @(#)if.c 8.3 (Berkeley) 1/4/94 34 * $FreeBSD: src/sys/net/if.c,v 1.185 2004/03/13 02:35:03 brooks Exp $ 35 * $DragonFly: src/sys/net/if.c,v 1.55 2007/08/27 16:15:42 hasso Exp $ 36 */ 37 38 #include "opt_compat.h" 39 #include "opt_inet6.h" 40 #include "opt_inet.h" 41 #include "opt_polling.h" 42 43 #include <sys/param.h> 44 #include <sys/malloc.h> 45 #include <sys/mbuf.h> 46 #include <sys/systm.h> 47 #include <sys/proc.h> 48 #include <sys/protosw.h> 49 #include <sys/socket.h> 50 #include <sys/socketvar.h> 51 #include <sys/socketops.h> 52 #include <sys/protosw.h> 53 #include <sys/kernel.h> 54 #include <sys/sockio.h> 55 #include <sys/syslog.h> 56 #include <sys/sysctl.h> 57 #include <sys/domain.h> 58 #include <sys/thread.h> 59 #include <sys/serialize.h> 60 61 #include <net/if.h> 62 #include <net/if_arp.h> 63 #include <net/if_dl.h> 64 #include <net/if_types.h> 65 #include <net/if_var.h> 66 #include <net/ifq_var.h> 67 #include <net/radix.h> 68 #include <net/route.h> 69 #include <machine/stdarg.h> 70 71 #include <sys/thread2.h> 72 73 #if defined(INET) || defined(INET6) 74 /*XXX*/ 75 #include <netinet/in.h> 76 #include <netinet/in_var.h> 77 #include <netinet/if_ether.h> 78 #ifdef INET6 79 #include <machine/clock.h> /* XXX: temporal workaround for fxp issue */ 80 #include <netinet6/in6_var.h> 81 #include <netinet6/in6_ifattach.h> 82 #endif 83 #endif 84 85 #if defined(COMPAT_43) 86 #include <emulation/43bsd/43bsd_socket.h> 87 #endif /* COMPAT_43 */ 88 89 /* 90 * Support for non-ALTQ interfaces. 91 */ 92 static int ifq_classic_enqueue(struct ifaltq *, struct mbuf *, 93 struct altq_pktattr *); 94 static struct mbuf * 95 ifq_classic_dequeue(struct ifaltq *, struct mbuf *, int); 96 static int ifq_classic_request(struct ifaltq *, int, void *); 97 98 /* 99 * System initialization 100 */ 101 102 static void if_attachdomain(void *); 103 static void if_attachdomain1(struct ifnet *); 104 static int ifconf (u_long, caddr_t, struct ucred *); 105 static void ifinit (void *); 106 static void if_slowtimo (void *); 107 static void link_rtrequest (int, struct rtentry *, struct rt_addrinfo *); 108 static int if_rtdel (struct radix_node *, void *); 109 110 SYSINIT(interfaces, SI_SUB_PROTO_IF, SI_ORDER_FIRST, ifinit, NULL) 111 112 MALLOC_DEFINE(M_IFADDR, "ifaddr", "interface address"); 113 MALLOC_DEFINE(M_IFMADDR, "ether_multi", "link-level multicast address"); 114 MALLOC_DEFINE(M_CLONE, "clone", "interface cloning framework"); 115 116 int ifqmaxlen = IFQ_MAXLEN; 117 struct ifnethead ifnet; /* depend on static init XXX */ 118 119 #ifdef INET6 120 /* 121 * XXX: declare here to avoid to include many inet6 related files.. 122 * should be more generalized? 123 */ 124 extern void nd6_setmtu (struct ifnet *); 125 #endif 126 127 struct if_clone *if_clone_lookup (const char *, int *); 128 int if_clone_list (struct if_clonereq *); 129 130 LIST_HEAD(, if_clone) if_cloners = LIST_HEAD_INITIALIZER(if_cloners); 131 int if_cloners_count; 132 133 struct callout if_slowtimo_timer; 134 135 /* 136 * Network interface utility routines. 137 * 138 * Routines with ifa_ifwith* names take sockaddr *'s as 139 * parameters. 140 */ 141 /* ARGSUSED*/ 142 void 143 ifinit(void *dummy) 144 { 145 struct ifnet *ifp; 146 147 callout_init(&if_slowtimo_timer); 148 149 crit_enter(); 150 TAILQ_FOREACH(ifp, &ifnet, if_link) { 151 if (ifp->if_snd.ifq_maxlen == 0) { 152 if_printf(ifp, "XXX: driver didn't set ifq_maxlen\n"); 153 ifp->if_snd.ifq_maxlen = ifqmaxlen; 154 } 155 } 156 crit_exit(); 157 158 if_slowtimo(0); 159 } 160 161 int if_index = 0; 162 struct ifnet **ifindex2ifnet = NULL; 163 164 /* 165 * Attach an interface to the list of "active" interfaces. 166 * 167 * The serializer is optional. If non-NULL access to the interface 168 * may be MPSAFE. 169 */ 170 void 171 if_attach(struct ifnet *ifp, lwkt_serialize_t serializer) 172 { 173 unsigned socksize, ifasize; 174 int namelen, masklen; 175 struct sockaddr_dl *sdl; 176 struct ifaddr *ifa; 177 struct ifaltq *ifq; 178 179 static int if_indexlim = 8; 180 static boolean_t inited; 181 182 if (!inited) { 183 TAILQ_INIT(&ifnet); 184 inited = TRUE; 185 } 186 187 /* 188 * The serializer can be passed in from the device, allowing the 189 * same serializer to be used for both the interrupt interlock and 190 * the device queue. If not specified, the netif structure will 191 * use an embedded serializer. 192 */ 193 if (serializer == NULL) { 194 serializer = &ifp->if_default_serializer; 195 lwkt_serialize_init(serializer); 196 } 197 ifp->if_serializer = serializer; 198 199 TAILQ_INSERT_TAIL(&ifnet, ifp, if_link); 200 ifp->if_index = ++if_index; 201 /* 202 * XXX - 203 * The old code would work if the interface passed a pre-existing 204 * chain of ifaddrs to this code. We don't trust our callers to 205 * properly initialize the tailq, however, so we no longer allow 206 * this unlikely case. 207 */ 208 TAILQ_INIT(&ifp->if_addrhead); 209 TAILQ_INIT(&ifp->if_prefixhead); 210 LIST_INIT(&ifp->if_multiaddrs); 211 getmicrotime(&ifp->if_lastchange); 212 if (ifindex2ifnet == NULL || if_index >= if_indexlim) { 213 unsigned int n; 214 struct ifnet **q; 215 216 if_indexlim <<= 1; 217 218 /* grow ifindex2ifnet */ 219 n = if_indexlim * sizeof(*q); 220 q = kmalloc(n, M_IFADDR, M_WAITOK | M_ZERO); 221 if (ifindex2ifnet) { 222 bcopy(ifindex2ifnet, q, n/2); 223 kfree(ifindex2ifnet, M_IFADDR); 224 } 225 ifindex2ifnet = q; 226 } 227 228 ifindex2ifnet[if_index] = ifp; 229 230 /* 231 * create a Link Level name for this device 232 */ 233 namelen = strlen(ifp->if_xname); 234 #define _offsetof(t, m) ((int)((caddr_t)&((t *)0)->m)) 235 masklen = _offsetof(struct sockaddr_dl, sdl_data[0]) + namelen; 236 socksize = masklen + ifp->if_addrlen; 237 #define ROUNDUP(a) (1 + (((a) - 1) | (sizeof(long) - 1))) 238 if (socksize < sizeof(*sdl)) 239 socksize = sizeof(*sdl); 240 socksize = ROUNDUP(socksize); 241 ifasize = sizeof(struct ifaddr) + 2 * socksize; 242 ifa = kmalloc(ifasize, M_IFADDR, M_WAITOK | M_ZERO); 243 sdl = (struct sockaddr_dl *)(ifa + 1); 244 sdl->sdl_len = socksize; 245 sdl->sdl_family = AF_LINK; 246 bcopy(ifp->if_xname, sdl->sdl_data, namelen); 247 sdl->sdl_nlen = namelen; 248 sdl->sdl_index = ifp->if_index; 249 sdl->sdl_type = ifp->if_type; 250 ifp->if_lladdr = ifa; 251 ifa->ifa_ifp = ifp; 252 ifa->ifa_rtrequest = link_rtrequest; 253 ifa->ifa_addr = (struct sockaddr *)sdl; 254 sdl = (struct sockaddr_dl *)(socksize + (caddr_t)sdl); 255 ifa->ifa_netmask = (struct sockaddr *)sdl; 256 sdl->sdl_len = masklen; 257 while (namelen != 0) 258 sdl->sdl_data[--namelen] = 0xff; 259 TAILQ_INSERT_HEAD(&ifp->if_addrhead, ifa, ifa_link); 260 261 EVENTHANDLER_INVOKE(ifnet_attach_event, ifp); 262 263 ifq = &ifp->if_snd; 264 ifq->altq_type = 0; 265 ifq->altq_disc = NULL; 266 ifq->altq_flags &= ALTQF_CANTCHANGE; 267 ifq->altq_tbr = NULL; 268 ifq->altq_ifp = ifp; 269 ifq_set_classic(ifq); 270 271 if (!SLIST_EMPTY(&domains)) 272 if_attachdomain1(ifp); 273 274 /* Announce the interface. */ 275 rt_ifannouncemsg(ifp, IFAN_ARRIVAL); 276 } 277 278 static void 279 if_attachdomain(void *dummy) 280 { 281 struct ifnet *ifp; 282 283 crit_enter(); 284 TAILQ_FOREACH(ifp, &ifnet, if_list) 285 if_attachdomain1(ifp); 286 crit_exit(); 287 } 288 SYSINIT(domainifattach, SI_SUB_PROTO_IFATTACHDOMAIN, SI_ORDER_FIRST, 289 if_attachdomain, NULL); 290 291 static void 292 if_attachdomain1(struct ifnet *ifp) 293 { 294 struct domain *dp; 295 296 crit_enter(); 297 298 /* address family dependent data region */ 299 bzero(ifp->if_afdata, sizeof(ifp->if_afdata)); 300 SLIST_FOREACH(dp, &domains, dom_next) 301 if (dp->dom_ifattach) 302 ifp->if_afdata[dp->dom_family] = 303 (*dp->dom_ifattach)(ifp); 304 crit_exit(); 305 } 306 307 /* 308 * Detach an interface, removing it from the 309 * list of "active" interfaces. 310 */ 311 void 312 if_detach(struct ifnet *ifp) 313 { 314 struct ifaddr *ifa; 315 struct radix_node_head *rnh; 316 int i; 317 int cpu, origcpu; 318 struct domain *dp; 319 320 EVENTHANDLER_INVOKE(ifnet_detach_event, ifp); 321 322 /* 323 * Remove routes and flush queues. 324 */ 325 crit_enter(); 326 #ifdef DEVICE_POLLING 327 if (ifp->if_flags & IFF_POLLING) 328 ether_poll_deregister(ifp); 329 #endif 330 if_down(ifp); 331 332 if (ifq_is_enabled(&ifp->if_snd)) 333 altq_disable(&ifp->if_snd); 334 if (ifq_is_attached(&ifp->if_snd)) 335 altq_detach(&ifp->if_snd); 336 337 /* 338 * Clean up all addresses. 339 */ 340 ifp->if_lladdr = NULL; 341 342 for (ifa = TAILQ_FIRST(&ifp->if_addrhead); ifa; 343 ifa = TAILQ_FIRST(&ifp->if_addrhead)) { 344 #ifdef INET 345 /* XXX: Ugly!! ad hoc just for INET */ 346 if (ifa->ifa_addr && ifa->ifa_addr->sa_family == AF_INET) { 347 struct ifaliasreq ifr; 348 349 bzero(&ifr, sizeof ifr); 350 ifr.ifra_addr = *ifa->ifa_addr; 351 if (ifa->ifa_dstaddr) 352 ifr.ifra_broadaddr = *ifa->ifa_dstaddr; 353 if (in_control(NULL, SIOCDIFADDR, (caddr_t)&ifr, ifp, 354 NULL) == 0) 355 continue; 356 } 357 #endif /* INET */ 358 #ifdef INET6 359 if (ifa->ifa_addr && ifa->ifa_addr->sa_family == AF_INET6) { 360 in6_purgeaddr(ifa); 361 /* ifp_addrhead is already updated */ 362 continue; 363 } 364 #endif /* INET6 */ 365 TAILQ_REMOVE(&ifp->if_addrhead, ifa, ifa_link); 366 IFAFREE(ifa); 367 } 368 369 #ifdef INET 370 /* 371 * Remove all IPv4 kernel structures related to ifp. 372 */ 373 in_ifdetach(ifp); 374 #endif 375 376 #ifdef INET6 377 /* 378 * Remove all IPv6 kernel structs related to ifp. This should be done 379 * before removing routing entries below, since IPv6 interface direct 380 * routes are expected to be removed by the IPv6-specific kernel API. 381 * Otherwise, the kernel will detect some inconsistency and bark it. 382 */ 383 in6_ifdetach(ifp); 384 #endif 385 386 /* 387 * Delete all remaining routes using this interface 388 * Unfortuneatly the only way to do this is to slog through 389 * the entire routing table looking for routes which point 390 * to this interface...oh well... 391 */ 392 origcpu = mycpuid; 393 for (cpu = 0; cpu < ncpus2; cpu++) { 394 lwkt_migratecpu(cpu); 395 for (i = 1; i <= AF_MAX; i++) { 396 if ((rnh = rt_tables[mycpuid][i]) == NULL) 397 continue; 398 rnh->rnh_walktree(rnh, if_rtdel, ifp); 399 } 400 } 401 lwkt_migratecpu(origcpu); 402 403 /* Announce that the interface is gone. */ 404 rt_ifannouncemsg(ifp, IFAN_DEPARTURE); 405 406 SLIST_FOREACH(dp, &domains, dom_next) 407 if (dp->dom_ifdetach && ifp->if_afdata[dp->dom_family]) 408 (*dp->dom_ifdetach)(ifp, 409 ifp->if_afdata[dp->dom_family]); 410 411 /* 412 * Remove interface from ifindex2ifp[] and maybe decrement if_index. 413 */ 414 ifindex2ifnet[ifp->if_index] = NULL; 415 while (if_index > 0 && ifindex2ifnet[if_index] == NULL) 416 if_index--; 417 418 TAILQ_REMOVE(&ifnet, ifp, if_link); 419 crit_exit(); 420 } 421 422 /* 423 * Delete Routes for a Network Interface 424 * 425 * Called for each routing entry via the rnh->rnh_walktree() call above 426 * to delete all route entries referencing a detaching network interface. 427 * 428 * Arguments: 429 * rn pointer to node in the routing table 430 * arg argument passed to rnh->rnh_walktree() - detaching interface 431 * 432 * Returns: 433 * 0 successful 434 * errno failed - reason indicated 435 * 436 */ 437 static int 438 if_rtdel(struct radix_node *rn, void *arg) 439 { 440 struct rtentry *rt = (struct rtentry *)rn; 441 struct ifnet *ifp = arg; 442 int err; 443 444 if (rt->rt_ifp == ifp) { 445 446 /* 447 * Protect (sorta) against walktree recursion problems 448 * with cloned routes 449 */ 450 if (!(rt->rt_flags & RTF_UP)) 451 return (0); 452 453 err = rtrequest(RTM_DELETE, rt_key(rt), rt->rt_gateway, 454 rt_mask(rt), rt->rt_flags, 455 (struct rtentry **) NULL); 456 if (err) { 457 log(LOG_WARNING, "if_rtdel: error %d\n", err); 458 } 459 } 460 461 return (0); 462 } 463 464 /* 465 * Create a clone network interface. 466 */ 467 int 468 if_clone_create(char *name, int len) 469 { 470 struct if_clone *ifc; 471 char *dp; 472 int wildcard, bytoff, bitoff; 473 int unit; 474 int err; 475 476 ifc = if_clone_lookup(name, &unit); 477 if (ifc == NULL) 478 return (EINVAL); 479 480 if (ifunit(name) != NULL) 481 return (EEXIST); 482 483 bytoff = bitoff = 0; 484 wildcard = (unit < 0); 485 /* 486 * Find a free unit if none was given. 487 */ 488 if (wildcard) { 489 while (bytoff < ifc->ifc_bmlen && 490 ifc->ifc_units[bytoff] == 0xff) 491 bytoff++; 492 if (bytoff >= ifc->ifc_bmlen) 493 return (ENOSPC); 494 while ((ifc->ifc_units[bytoff] & (1 << bitoff)) != 0) 495 bitoff++; 496 unit = (bytoff << 3) + bitoff; 497 } 498 499 if (unit > ifc->ifc_maxunit) 500 return (ENXIO); 501 502 err = (*ifc->ifc_create)(ifc, unit); 503 if (err != 0) 504 return (err); 505 506 if (!wildcard) { 507 bytoff = unit >> 3; 508 bitoff = unit - (bytoff << 3); 509 } 510 511 /* 512 * Allocate the unit in the bitmap. 513 */ 514 KASSERT((ifc->ifc_units[bytoff] & (1 << bitoff)) == 0, 515 ("%s: bit is already set", __func__)); 516 ifc->ifc_units[bytoff] |= (1 << bitoff); 517 518 /* In the wildcard case, we need to update the name. */ 519 if (wildcard) { 520 for (dp = name; *dp != '\0'; dp++); 521 if (ksnprintf(dp, len - (dp-name), "%d", unit) > 522 len - (dp-name) - 1) { 523 /* 524 * This can only be a programmer error and 525 * there's no straightforward way to recover if 526 * it happens. 527 */ 528 panic("if_clone_create(): interface name too long"); 529 } 530 531 } 532 533 EVENTHANDLER_INVOKE(if_clone_event, ifc); 534 535 return (0); 536 } 537 538 /* 539 * Destroy a clone network interface. 540 */ 541 int 542 if_clone_destroy(const char *name) 543 { 544 struct if_clone *ifc; 545 struct ifnet *ifp; 546 int bytoff, bitoff; 547 int unit; 548 549 ifc = if_clone_lookup(name, &unit); 550 if (ifc == NULL) 551 return (EINVAL); 552 553 if (unit < ifc->ifc_minifs) 554 return (EINVAL); 555 556 ifp = ifunit(name); 557 if (ifp == NULL) 558 return (ENXIO); 559 560 if (ifc->ifc_destroy == NULL) 561 return (EOPNOTSUPP); 562 563 (*ifc->ifc_destroy)(ifp); 564 565 /* 566 * Compute offset in the bitmap and deallocate the unit. 567 */ 568 bytoff = unit >> 3; 569 bitoff = unit - (bytoff << 3); 570 KASSERT((ifc->ifc_units[bytoff] & (1 << bitoff)) != 0, 571 ("%s: bit is already cleared", __func__)); 572 ifc->ifc_units[bytoff] &= ~(1 << bitoff); 573 return (0); 574 } 575 576 /* 577 * Look up a network interface cloner. 578 */ 579 struct if_clone * 580 if_clone_lookup(const char *name, int *unitp) 581 { 582 struct if_clone *ifc; 583 const char *cp; 584 int i; 585 586 for (ifc = LIST_FIRST(&if_cloners); ifc != NULL;) { 587 for (cp = name, i = 0; i < ifc->ifc_namelen; i++, cp++) { 588 if (ifc->ifc_name[i] != *cp) 589 goto next_ifc; 590 } 591 goto found_name; 592 next_ifc: 593 ifc = LIST_NEXT(ifc, ifc_list); 594 } 595 596 /* No match. */ 597 return ((struct if_clone *)NULL); 598 599 found_name: 600 if (*cp == '\0') { 601 i = -1; 602 } else { 603 for (i = 0; *cp != '\0'; cp++) { 604 if (*cp < '0' || *cp > '9') { 605 /* Bogus unit number. */ 606 return (NULL); 607 } 608 i = (i * 10) + (*cp - '0'); 609 } 610 } 611 612 if (unitp != NULL) 613 *unitp = i; 614 return (ifc); 615 } 616 617 /* 618 * Register a network interface cloner. 619 */ 620 void 621 if_clone_attach(struct if_clone *ifc) 622 { 623 int bytoff, bitoff; 624 int err; 625 int len, maxclone; 626 int unit; 627 628 KASSERT(ifc->ifc_minifs - 1 <= ifc->ifc_maxunit, 629 ("%s: %s requested more units then allowed (%d > %d)", 630 __func__, ifc->ifc_name, ifc->ifc_minifs, 631 ifc->ifc_maxunit + 1)); 632 /* 633 * Compute bitmap size and allocate it. 634 */ 635 maxclone = ifc->ifc_maxunit + 1; 636 len = maxclone >> 3; 637 if ((len << 3) < maxclone) 638 len++; 639 ifc->ifc_units = kmalloc(len, M_CLONE, M_WAITOK | M_ZERO); 640 ifc->ifc_bmlen = len; 641 642 LIST_INSERT_HEAD(&if_cloners, ifc, ifc_list); 643 if_cloners_count++; 644 645 for (unit = 0; unit < ifc->ifc_minifs; unit++) { 646 err = (*ifc->ifc_create)(ifc, unit); 647 KASSERT(err == 0, 648 ("%s: failed to create required interface %s%d", 649 __func__, ifc->ifc_name, unit)); 650 651 /* Allocate the unit in the bitmap. */ 652 bytoff = unit >> 3; 653 bitoff = unit - (bytoff << 3); 654 ifc->ifc_units[bytoff] |= (1 << bitoff); 655 } 656 } 657 658 /* 659 * Unregister a network interface cloner. 660 */ 661 void 662 if_clone_detach(struct if_clone *ifc) 663 { 664 665 LIST_REMOVE(ifc, ifc_list); 666 kfree(ifc->ifc_units, M_CLONE); 667 if_cloners_count--; 668 } 669 670 /* 671 * Provide list of interface cloners to userspace. 672 */ 673 int 674 if_clone_list(struct if_clonereq *ifcr) 675 { 676 char outbuf[IFNAMSIZ], *dst; 677 struct if_clone *ifc; 678 int count, error = 0; 679 680 ifcr->ifcr_total = if_cloners_count; 681 if ((dst = ifcr->ifcr_buffer) == NULL) { 682 /* Just asking how many there are. */ 683 return (0); 684 } 685 686 if (ifcr->ifcr_count < 0) 687 return (EINVAL); 688 689 count = (if_cloners_count < ifcr->ifcr_count) ? 690 if_cloners_count : ifcr->ifcr_count; 691 692 for (ifc = LIST_FIRST(&if_cloners); ifc != NULL && count != 0; 693 ifc = LIST_NEXT(ifc, ifc_list), count--, dst += IFNAMSIZ) { 694 strlcpy(outbuf, ifc->ifc_name, IFNAMSIZ); 695 error = copyout(outbuf, dst, IFNAMSIZ); 696 if (error) 697 break; 698 } 699 700 return (error); 701 } 702 703 /* 704 * Locate an interface based on a complete address. 705 */ 706 struct ifaddr * 707 ifa_ifwithaddr(struct sockaddr *addr) 708 { 709 struct ifnet *ifp; 710 struct ifaddr *ifa; 711 712 TAILQ_FOREACH(ifp, &ifnet, if_link) 713 TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) { 714 if (ifa->ifa_addr->sa_family != addr->sa_family) 715 continue; 716 if (sa_equal(addr, ifa->ifa_addr)) 717 return (ifa); 718 if ((ifp->if_flags & IFF_BROADCAST) && ifa->ifa_broadaddr && 719 /* IPv6 doesn't have broadcast */ 720 ifa->ifa_broadaddr->sa_len != 0 && 721 sa_equal(ifa->ifa_broadaddr, addr)) 722 return (ifa); 723 } 724 return ((struct ifaddr *)NULL); 725 } 726 /* 727 * Locate the point to point interface with a given destination address. 728 */ 729 struct ifaddr * 730 ifa_ifwithdstaddr(struct sockaddr *addr) 731 { 732 struct ifnet *ifp; 733 struct ifaddr *ifa; 734 735 TAILQ_FOREACH(ifp, &ifnet, if_link) 736 if (ifp->if_flags & IFF_POINTOPOINT) 737 TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) { 738 if (ifa->ifa_addr->sa_family != addr->sa_family) 739 continue; 740 if (ifa->ifa_dstaddr && 741 sa_equal(addr, ifa->ifa_dstaddr)) 742 return (ifa); 743 } 744 return ((struct ifaddr *)NULL); 745 } 746 747 /* 748 * Find an interface on a specific network. If many, choice 749 * is most specific found. 750 */ 751 struct ifaddr * 752 ifa_ifwithnet(struct sockaddr *addr) 753 { 754 struct ifnet *ifp; 755 struct ifaddr *ifa; 756 struct ifaddr *ifa_maybe = (struct ifaddr *) 0; 757 u_int af = addr->sa_family; 758 char *addr_data = addr->sa_data, *cplim; 759 760 /* 761 * AF_LINK addresses can be looked up directly by their index number, 762 * so do that if we can. 763 */ 764 if (af == AF_LINK) { 765 struct sockaddr_dl *sdl = (struct sockaddr_dl *)addr; 766 767 if (sdl->sdl_index && sdl->sdl_index <= if_index) 768 return (ifindex2ifnet[sdl->sdl_index]->if_lladdr); 769 } 770 771 /* 772 * Scan though each interface, looking for ones that have 773 * addresses in this address family. 774 */ 775 TAILQ_FOREACH(ifp, &ifnet, if_link) { 776 TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) { 777 char *cp, *cp2, *cp3; 778 779 if (ifa->ifa_addr->sa_family != af) 780 next: continue; 781 if (af == AF_INET && ifp->if_flags & IFF_POINTOPOINT) { 782 /* 783 * This is a bit broken as it doesn't 784 * take into account that the remote end may 785 * be a single node in the network we are 786 * looking for. 787 * The trouble is that we don't know the 788 * netmask for the remote end. 789 */ 790 if (ifa->ifa_dstaddr != NULL && 791 sa_equal(addr, ifa->ifa_dstaddr)) 792 return (ifa); 793 } else { 794 /* 795 * if we have a special address handler, 796 * then use it instead of the generic one. 797 */ 798 if (ifa->ifa_claim_addr) { 799 if ((*ifa->ifa_claim_addr)(ifa, addr)) { 800 return (ifa); 801 } else { 802 continue; 803 } 804 } 805 806 /* 807 * Scan all the bits in the ifa's address. 808 * If a bit dissagrees with what we are 809 * looking for, mask it with the netmask 810 * to see if it really matters. 811 * (A byte at a time) 812 */ 813 if (ifa->ifa_netmask == 0) 814 continue; 815 cp = addr_data; 816 cp2 = ifa->ifa_addr->sa_data; 817 cp3 = ifa->ifa_netmask->sa_data; 818 cplim = ifa->ifa_netmask->sa_len + 819 (char *)ifa->ifa_netmask; 820 while (cp3 < cplim) 821 if ((*cp++ ^ *cp2++) & *cp3++) 822 goto next; /* next address! */ 823 /* 824 * If the netmask of what we just found 825 * is more specific than what we had before 826 * (if we had one) then remember the new one 827 * before continuing to search 828 * for an even better one. 829 */ 830 if (ifa_maybe == 0 || 831 rn_refines((char *)ifa->ifa_netmask, 832 (char *)ifa_maybe->ifa_netmask)) 833 ifa_maybe = ifa; 834 } 835 } 836 } 837 return (ifa_maybe); 838 } 839 840 /* 841 * Find an interface address specific to an interface best matching 842 * a given address. 843 */ 844 struct ifaddr * 845 ifaof_ifpforaddr(struct sockaddr *addr, struct ifnet *ifp) 846 { 847 struct ifaddr *ifa; 848 char *cp, *cp2, *cp3; 849 char *cplim; 850 struct ifaddr *ifa_maybe = 0; 851 u_int af = addr->sa_family; 852 853 if (af >= AF_MAX) 854 return (0); 855 TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) { 856 if (ifa->ifa_addr->sa_family != af) 857 continue; 858 if (ifa_maybe == 0) 859 ifa_maybe = ifa; 860 if (ifa->ifa_netmask == NULL) { 861 if (sa_equal(addr, ifa->ifa_addr) || 862 (ifa->ifa_dstaddr != NULL && 863 sa_equal(addr, ifa->ifa_dstaddr))) 864 return (ifa); 865 continue; 866 } 867 if (ifp->if_flags & IFF_POINTOPOINT) { 868 if (sa_equal(addr, ifa->ifa_dstaddr)) 869 return (ifa); 870 } else { 871 cp = addr->sa_data; 872 cp2 = ifa->ifa_addr->sa_data; 873 cp3 = ifa->ifa_netmask->sa_data; 874 cplim = ifa->ifa_netmask->sa_len + (char *)ifa->ifa_netmask; 875 for (; cp3 < cplim; cp3++) 876 if ((*cp++ ^ *cp2++) & *cp3) 877 break; 878 if (cp3 == cplim) 879 return (ifa); 880 } 881 } 882 return (ifa_maybe); 883 } 884 885 #include <net/route.h> 886 887 /* 888 * Default action when installing a route with a Link Level gateway. 889 * Lookup an appropriate real ifa to point to. 890 * This should be moved to /sys/net/link.c eventually. 891 */ 892 static void 893 link_rtrequest(int cmd, struct rtentry *rt, struct rt_addrinfo *info) 894 { 895 struct ifaddr *ifa; 896 struct sockaddr *dst; 897 struct ifnet *ifp; 898 899 if (cmd != RTM_ADD || (ifa = rt->rt_ifa) == NULL || 900 (ifp = ifa->ifa_ifp) == NULL || (dst = rt_key(rt)) == NULL) 901 return; 902 ifa = ifaof_ifpforaddr(dst, ifp); 903 if (ifa != NULL) { 904 IFAFREE(rt->rt_ifa); 905 IFAREF(ifa); 906 rt->rt_ifa = ifa; 907 if (ifa->ifa_rtrequest && ifa->ifa_rtrequest != link_rtrequest) 908 ifa->ifa_rtrequest(cmd, rt, info); 909 } 910 } 911 912 /* 913 * Mark an interface down and notify protocols of 914 * the transition. 915 * NOTE: must be called at splnet or eqivalent. 916 */ 917 void 918 if_unroute(struct ifnet *ifp, int flag, int fam) 919 { 920 struct ifaddr *ifa; 921 922 ifp->if_flags &= ~flag; 923 getmicrotime(&ifp->if_lastchange); 924 TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) 925 if (fam == PF_UNSPEC || (fam == ifa->ifa_addr->sa_family)) 926 pfctlinput(PRC_IFDOWN, ifa->ifa_addr); 927 ifq_purge(&ifp->if_snd); 928 rt_ifmsg(ifp); 929 } 930 931 /* 932 * Mark an interface up and notify protocols of 933 * the transition. 934 * NOTE: must be called at splnet or eqivalent. 935 */ 936 void 937 if_route(struct ifnet *ifp, int flag, int fam) 938 { 939 struct ifaddr *ifa; 940 941 ifp->if_flags |= flag; 942 getmicrotime(&ifp->if_lastchange); 943 TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) 944 if (fam == PF_UNSPEC || (fam == ifa->ifa_addr->sa_family)) 945 pfctlinput(PRC_IFUP, ifa->ifa_addr); 946 rt_ifmsg(ifp); 947 #ifdef INET6 948 in6_if_up(ifp); 949 #endif 950 } 951 952 /* 953 * Mark an interface down and notify protocols of the transition. An 954 * interface going down is also considered to be a synchronizing event. 955 * We must ensure that all packet processing related to the interface 956 * has completed before we return so e.g. the caller can free the ifnet 957 * structure that the mbufs may be referencing. 958 * 959 * NOTE: must be called at splnet or eqivalent. 960 */ 961 void 962 if_down(struct ifnet *ifp) 963 { 964 if_unroute(ifp, IFF_UP, AF_UNSPEC); 965 netmsg_service_sync(); 966 } 967 968 /* 969 * Mark an interface up and notify protocols of 970 * the transition. 971 * NOTE: must be called at splnet or eqivalent. 972 */ 973 void 974 if_up(struct ifnet *ifp) 975 { 976 977 if_route(ifp, IFF_UP, AF_UNSPEC); 978 } 979 980 /* 981 * Process a link state change. 982 * NOTE: must be called at splsoftnet or equivalent. 983 */ 984 void 985 if_link_state_change(struct ifnet *ifp) 986 { 987 rt_ifmsg(ifp); 988 } 989 990 /* 991 * Handle interface watchdog timer routines. Called 992 * from softclock, we decrement timers (if set) and 993 * call the appropriate interface routine on expiration. 994 */ 995 static void 996 if_slowtimo(void *arg) 997 { 998 struct ifnet *ifp; 999 1000 crit_enter(); 1001 1002 TAILQ_FOREACH(ifp, &ifnet, if_link) { 1003 if (ifp->if_timer == 0 || --ifp->if_timer) 1004 continue; 1005 if (ifp->if_watchdog) { 1006 if (lwkt_serialize_try(ifp->if_serializer)) { 1007 (*ifp->if_watchdog)(ifp); 1008 lwkt_serialize_exit(ifp->if_serializer); 1009 } else { 1010 /* try again next timeout */ 1011 ++ifp->if_timer; 1012 } 1013 } 1014 } 1015 1016 crit_exit(); 1017 1018 callout_reset(&if_slowtimo_timer, hz / IFNET_SLOWHZ, if_slowtimo, NULL); 1019 } 1020 1021 /* 1022 * Map interface name to 1023 * interface structure pointer. 1024 */ 1025 struct ifnet * 1026 ifunit(const char *name) 1027 { 1028 struct ifnet *ifp; 1029 1030 /* 1031 * Search all the interfaces for this name/number 1032 */ 1033 1034 TAILQ_FOREACH(ifp, &ifnet, if_link) { 1035 if (strncmp(ifp->if_xname, name, IFNAMSIZ) == 0) 1036 break; 1037 } 1038 return (ifp); 1039 } 1040 1041 1042 /* 1043 * Map interface name in a sockaddr_dl to 1044 * interface structure pointer. 1045 */ 1046 struct ifnet * 1047 if_withname(struct sockaddr *sa) 1048 { 1049 char ifname[IFNAMSIZ+1]; 1050 struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa; 1051 1052 if ( (sa->sa_family != AF_LINK) || (sdl->sdl_nlen == 0) || 1053 (sdl->sdl_nlen > IFNAMSIZ) ) 1054 return NULL; 1055 1056 /* 1057 * ifunit wants a null-terminated name. It may not be null-terminated 1058 * in the sockaddr. We don't want to change the caller's sockaddr, 1059 * and there might not be room to put the trailing null anyway, so we 1060 * make a local copy that we know we can null terminate safely. 1061 */ 1062 1063 bcopy(sdl->sdl_data, ifname, sdl->sdl_nlen); 1064 ifname[sdl->sdl_nlen] = '\0'; 1065 return ifunit(ifname); 1066 } 1067 1068 1069 /* 1070 * Interface ioctls. 1071 */ 1072 int 1073 ifioctl(struct socket *so, u_long cmd, caddr_t data, struct ucred *cred) 1074 { 1075 struct ifnet *ifp; 1076 struct ifreq *ifr; 1077 struct ifstat *ifs; 1078 int error; 1079 short oif_flags; 1080 int new_flags; 1081 size_t namelen, onamelen; 1082 char new_name[IFNAMSIZ]; 1083 struct ifaddr *ifa; 1084 struct sockaddr_dl *sdl; 1085 1086 switch (cmd) { 1087 1088 case SIOCGIFCONF: 1089 case OSIOCGIFCONF: 1090 return (ifconf(cmd, data, cred)); 1091 } 1092 ifr = (struct ifreq *)data; 1093 1094 switch (cmd) { 1095 case SIOCIFCREATE: 1096 case SIOCIFDESTROY: 1097 if ((error = suser_cred(cred, 0)) != 0) 1098 return (error); 1099 return ((cmd == SIOCIFCREATE) ? 1100 if_clone_create(ifr->ifr_name, sizeof(ifr->ifr_name)) : 1101 if_clone_destroy(ifr->ifr_name)); 1102 1103 case SIOCIFGCLONERS: 1104 return (if_clone_list((struct if_clonereq *)data)); 1105 } 1106 1107 ifp = ifunit(ifr->ifr_name); 1108 if (ifp == 0) 1109 return (ENXIO); 1110 switch (cmd) { 1111 1112 case SIOCGIFFLAGS: 1113 ifr->ifr_flags = ifp->if_flags; 1114 ifr->ifr_flagshigh = ifp->if_flags >> 16; 1115 break; 1116 1117 case SIOCGIFCAP: 1118 ifr->ifr_reqcap = ifp->if_capabilities; 1119 ifr->ifr_curcap = ifp->if_capenable; 1120 break; 1121 1122 case SIOCGIFMETRIC: 1123 ifr->ifr_metric = ifp->if_metric; 1124 break; 1125 1126 case SIOCGIFMTU: 1127 ifr->ifr_mtu = ifp->if_mtu; 1128 break; 1129 1130 case SIOCGIFPHYS: 1131 ifr->ifr_phys = ifp->if_physical; 1132 break; 1133 1134 case SIOCSIFFLAGS: 1135 error = suser_cred(cred, 0); 1136 if (error) 1137 return (error); 1138 new_flags = (ifr->ifr_flags & 0xffff) | 1139 (ifr->ifr_flagshigh << 16); 1140 if (ifp->if_flags & IFF_SMART) { 1141 /* Smart drivers twiddle their own routes */ 1142 } else if (ifp->if_flags & IFF_UP && 1143 (new_flags & IFF_UP) == 0) { 1144 crit_enter(); 1145 if_down(ifp); 1146 crit_exit(); 1147 } else if (new_flags & IFF_UP && 1148 (ifp->if_flags & IFF_UP) == 0) { 1149 crit_enter(); 1150 if_up(ifp); 1151 crit_exit(); 1152 } 1153 1154 #ifdef DEVICE_POLLING 1155 if ((new_flags ^ ifp->if_flags) & IFF_POLLING) { 1156 if (new_flags & IFF_POLLING) { 1157 ether_poll_register(ifp); 1158 } else { 1159 ether_poll_deregister(ifp); 1160 } 1161 } 1162 #endif 1163 1164 ifp->if_flags = (ifp->if_flags & IFF_CANTCHANGE) | 1165 (new_flags &~ IFF_CANTCHANGE); 1166 if (new_flags & IFF_PPROMISC) { 1167 /* Permanently promiscuous mode requested */ 1168 ifp->if_flags |= IFF_PROMISC; 1169 } else if (ifp->if_pcount == 0) { 1170 ifp->if_flags &= ~IFF_PROMISC; 1171 } 1172 if (ifp->if_ioctl) { 1173 lwkt_serialize_enter(ifp->if_serializer); 1174 ifp->if_ioctl(ifp, cmd, data, cred); 1175 lwkt_serialize_exit(ifp->if_serializer); 1176 } 1177 getmicrotime(&ifp->if_lastchange); 1178 break; 1179 1180 case SIOCSIFCAP: 1181 error = suser_cred(cred, 0); 1182 if (error) 1183 return (error); 1184 if (ifr->ifr_reqcap & ~ifp->if_capabilities) 1185 return (EINVAL); 1186 lwkt_serialize_enter(ifp->if_serializer); 1187 ifp->if_ioctl(ifp, cmd, data, cred); 1188 lwkt_serialize_exit(ifp->if_serializer); 1189 break; 1190 1191 case SIOCSIFNAME: 1192 error = suser_cred(cred, 0); 1193 if (error != 0) 1194 return (error); 1195 error = copyinstr(ifr->ifr_data, new_name, IFNAMSIZ, NULL); 1196 if (error != 0) 1197 return (error); 1198 if (new_name[0] == '\0') 1199 return (EINVAL); 1200 if (ifunit(new_name) != NULL) 1201 return (EEXIST); 1202 1203 EVENTHANDLER_INVOKE(ifnet_detach_event, ifp); 1204 1205 /* Announce the departure of the interface. */ 1206 rt_ifannouncemsg(ifp, IFAN_DEPARTURE); 1207 1208 strlcpy(ifp->if_xname, new_name, sizeof(ifp->if_xname)); 1209 ifa = TAILQ_FIRST(&ifp->if_addrhead); 1210 /* XXX IFA_LOCK(ifa); */ 1211 sdl = (struct sockaddr_dl *)ifa->ifa_addr; 1212 namelen = strlen(new_name); 1213 onamelen = sdl->sdl_nlen; 1214 /* 1215 * Move the address if needed. This is safe because we 1216 * allocate space for a name of length IFNAMSIZ when we 1217 * create this in if_attach(). 1218 */ 1219 if (namelen != onamelen) { 1220 bcopy(sdl->sdl_data + onamelen, 1221 sdl->sdl_data + namelen, sdl->sdl_alen); 1222 } 1223 bcopy(new_name, sdl->sdl_data, namelen); 1224 sdl->sdl_nlen = namelen; 1225 sdl = (struct sockaddr_dl *)ifa->ifa_netmask; 1226 bzero(sdl->sdl_data, onamelen); 1227 while (namelen != 0) 1228 sdl->sdl_data[--namelen] = 0xff; 1229 /* XXX IFA_UNLOCK(ifa) */ 1230 1231 EVENTHANDLER_INVOKE(ifnet_attach_event, ifp); 1232 1233 /* Announce the return of the interface. */ 1234 rt_ifannouncemsg(ifp, IFAN_ARRIVAL); 1235 break; 1236 1237 case SIOCSIFMETRIC: 1238 error = suser_cred(cred, 0); 1239 if (error) 1240 return (error); 1241 ifp->if_metric = ifr->ifr_metric; 1242 getmicrotime(&ifp->if_lastchange); 1243 break; 1244 1245 case SIOCSIFPHYS: 1246 error = suser_cred(cred, 0); 1247 if (error) 1248 return error; 1249 if (!ifp->if_ioctl) 1250 return EOPNOTSUPP; 1251 lwkt_serialize_enter(ifp->if_serializer); 1252 error = ifp->if_ioctl(ifp, cmd, data, cred); 1253 lwkt_serialize_exit(ifp->if_serializer); 1254 if (error == 0) 1255 getmicrotime(&ifp->if_lastchange); 1256 return (error); 1257 1258 case SIOCSIFMTU: 1259 { 1260 u_long oldmtu = ifp->if_mtu; 1261 1262 error = suser_cred(cred, 0); 1263 if (error) 1264 return (error); 1265 if (ifp->if_ioctl == NULL) 1266 return (EOPNOTSUPP); 1267 if (ifr->ifr_mtu < IF_MINMTU || ifr->ifr_mtu > IF_MAXMTU) 1268 return (EINVAL); 1269 lwkt_serialize_enter(ifp->if_serializer); 1270 error = ifp->if_ioctl(ifp, cmd, data, cred); 1271 lwkt_serialize_exit(ifp->if_serializer); 1272 if (error == 0) { 1273 getmicrotime(&ifp->if_lastchange); 1274 rt_ifmsg(ifp); 1275 } 1276 /* 1277 * If the link MTU changed, do network layer specific procedure. 1278 */ 1279 if (ifp->if_mtu != oldmtu) { 1280 #ifdef INET6 1281 nd6_setmtu(ifp); 1282 #endif 1283 } 1284 return (error); 1285 } 1286 1287 case SIOCADDMULTI: 1288 case SIOCDELMULTI: 1289 error = suser_cred(cred, 0); 1290 if (error) 1291 return (error); 1292 1293 /* Don't allow group membership on non-multicast interfaces. */ 1294 if ((ifp->if_flags & IFF_MULTICAST) == 0) 1295 return EOPNOTSUPP; 1296 1297 /* Don't let users screw up protocols' entries. */ 1298 if (ifr->ifr_addr.sa_family != AF_LINK) 1299 return EINVAL; 1300 1301 if (cmd == SIOCADDMULTI) { 1302 struct ifmultiaddr *ifma; 1303 error = if_addmulti(ifp, &ifr->ifr_addr, &ifma); 1304 } else { 1305 error = if_delmulti(ifp, &ifr->ifr_addr); 1306 } 1307 if (error == 0) 1308 getmicrotime(&ifp->if_lastchange); 1309 return error; 1310 1311 case SIOCSIFPHYADDR: 1312 case SIOCDIFPHYADDR: 1313 #ifdef INET6 1314 case SIOCSIFPHYADDR_IN6: 1315 #endif 1316 case SIOCSLIFPHYADDR: 1317 case SIOCSIFMEDIA: 1318 case SIOCSIFGENERIC: 1319 error = suser_cred(cred, 0); 1320 if (error) 1321 return (error); 1322 if (ifp->if_ioctl == 0) 1323 return (EOPNOTSUPP); 1324 lwkt_serialize_enter(ifp->if_serializer); 1325 error = ifp->if_ioctl(ifp, cmd, data, cred); 1326 lwkt_serialize_exit(ifp->if_serializer); 1327 if (error == 0) 1328 getmicrotime(&ifp->if_lastchange); 1329 return error; 1330 1331 case SIOCGIFSTATUS: 1332 ifs = (struct ifstat *)data; 1333 ifs->ascii[0] = '\0'; 1334 1335 case SIOCGIFPSRCADDR: 1336 case SIOCGIFPDSTADDR: 1337 case SIOCGLIFPHYADDR: 1338 case SIOCGIFMEDIA: 1339 case SIOCGIFGENERIC: 1340 if (ifp->if_ioctl == NULL) 1341 return (EOPNOTSUPP); 1342 lwkt_serialize_enter(ifp->if_serializer); 1343 error = ifp->if_ioctl(ifp, cmd, data, cred); 1344 lwkt_serialize_exit(ifp->if_serializer); 1345 return (error); 1346 1347 case SIOCSIFLLADDR: 1348 error = suser_cred(cred, 0); 1349 if (error) 1350 return (error); 1351 return if_setlladdr(ifp, 1352 ifr->ifr_addr.sa_data, ifr->ifr_addr.sa_len); 1353 1354 default: 1355 oif_flags = ifp->if_flags; 1356 if (so->so_proto == 0) 1357 return (EOPNOTSUPP); 1358 #ifndef COMPAT_43 1359 error = so_pru_control(so, cmd, data, ifp); 1360 #else 1361 { 1362 int ocmd = cmd; 1363 1364 switch (cmd) { 1365 1366 case SIOCSIFDSTADDR: 1367 case SIOCSIFADDR: 1368 case SIOCSIFBRDADDR: 1369 case SIOCSIFNETMASK: 1370 #if BYTE_ORDER != BIG_ENDIAN 1371 if (ifr->ifr_addr.sa_family == 0 && 1372 ifr->ifr_addr.sa_len < 16) { 1373 ifr->ifr_addr.sa_family = ifr->ifr_addr.sa_len; 1374 ifr->ifr_addr.sa_len = 16; 1375 } 1376 #else 1377 if (ifr->ifr_addr.sa_len == 0) 1378 ifr->ifr_addr.sa_len = 16; 1379 #endif 1380 break; 1381 1382 case OSIOCGIFADDR: 1383 cmd = SIOCGIFADDR; 1384 break; 1385 1386 case OSIOCGIFDSTADDR: 1387 cmd = SIOCGIFDSTADDR; 1388 break; 1389 1390 case OSIOCGIFBRDADDR: 1391 cmd = SIOCGIFBRDADDR; 1392 break; 1393 1394 case OSIOCGIFNETMASK: 1395 cmd = SIOCGIFNETMASK; 1396 } 1397 error = so_pru_control(so, cmd, data, ifp); 1398 switch (ocmd) { 1399 1400 case OSIOCGIFADDR: 1401 case OSIOCGIFDSTADDR: 1402 case OSIOCGIFBRDADDR: 1403 case OSIOCGIFNETMASK: 1404 *(u_short *)&ifr->ifr_addr = ifr->ifr_addr.sa_family; 1405 1406 } 1407 } 1408 #endif /* COMPAT_43 */ 1409 1410 if ((oif_flags ^ ifp->if_flags) & IFF_UP) { 1411 #ifdef INET6 1412 DELAY(100);/* XXX: temporary workaround for fxp issue*/ 1413 if (ifp->if_flags & IFF_UP) { 1414 crit_enter(); 1415 in6_if_up(ifp); 1416 crit_exit(); 1417 } 1418 #endif 1419 } 1420 return (error); 1421 1422 } 1423 return (0); 1424 } 1425 1426 /* 1427 * Set/clear promiscuous mode on interface ifp based on the truth value 1428 * of pswitch. The calls are reference counted so that only the first 1429 * "on" request actually has an effect, as does the final "off" request. 1430 * Results are undefined if the "off" and "on" requests are not matched. 1431 */ 1432 int 1433 ifpromisc(struct ifnet *ifp, int pswitch) 1434 { 1435 struct ifreq ifr; 1436 int error; 1437 int oldflags; 1438 1439 oldflags = ifp->if_flags; 1440 if (ifp->if_flags & IFF_PPROMISC) { 1441 /* Do nothing if device is in permanently promiscuous mode */ 1442 ifp->if_pcount += pswitch ? 1 : -1; 1443 return (0); 1444 } 1445 if (pswitch) { 1446 /* 1447 * If the device is not configured up, we cannot put it in 1448 * promiscuous mode. 1449 */ 1450 if ((ifp->if_flags & IFF_UP) == 0) 1451 return (ENETDOWN); 1452 if (ifp->if_pcount++ != 0) 1453 return (0); 1454 ifp->if_flags |= IFF_PROMISC; 1455 log(LOG_INFO, "%s: promiscuous mode enabled\n", 1456 ifp->if_xname); 1457 } else { 1458 if (--ifp->if_pcount > 0) 1459 return (0); 1460 ifp->if_flags &= ~IFF_PROMISC; 1461 log(LOG_INFO, "%s: promiscuous mode disabled\n", 1462 ifp->if_xname); 1463 } 1464 ifr.ifr_flags = ifp->if_flags; 1465 ifr.ifr_flagshigh = ifp->if_flags >> 16; 1466 lwkt_serialize_enter(ifp->if_serializer); 1467 error = ifp->if_ioctl(ifp, SIOCSIFFLAGS, (caddr_t)&ifr, 1468 (struct ucred *)NULL); 1469 lwkt_serialize_exit(ifp->if_serializer); 1470 if (error == 0) 1471 rt_ifmsg(ifp); 1472 else 1473 ifp->if_flags = oldflags; 1474 return error; 1475 } 1476 1477 /* 1478 * Return interface configuration 1479 * of system. List may be used 1480 * in later ioctl's (above) to get 1481 * other information. 1482 */ 1483 static int 1484 ifconf(u_long cmd, caddr_t data, struct ucred *cred) 1485 { 1486 struct ifconf *ifc = (struct ifconf *)data; 1487 struct ifnet *ifp; 1488 struct ifaddr *ifa; 1489 struct sockaddr *sa; 1490 struct ifreq ifr, *ifrp; 1491 int space = ifc->ifc_len, error = 0; 1492 1493 ifrp = ifc->ifc_req; 1494 TAILQ_FOREACH(ifp, &ifnet, if_link) { 1495 int addrs; 1496 1497 if (space <= sizeof ifr) 1498 break; 1499 1500 /* 1501 * Zero the stack declared structure first to prevent 1502 * memory disclosure. 1503 */ 1504 bzero(&ifr, sizeof(ifr)); 1505 if (strlcpy(ifr.ifr_name, ifp->if_xname, sizeof(ifr.ifr_name)) 1506 >= sizeof(ifr.ifr_name)) { 1507 error = ENAMETOOLONG; 1508 break; 1509 } 1510 1511 addrs = 0; 1512 TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) { 1513 if (space <= sizeof ifr) 1514 break; 1515 sa = ifa->ifa_addr; 1516 if (cred->cr_prison && 1517 prison_if(cred, sa)) 1518 continue; 1519 addrs++; 1520 #ifdef COMPAT_43 1521 if (cmd == OSIOCGIFCONF) { 1522 struct osockaddr *osa = 1523 (struct osockaddr *)&ifr.ifr_addr; 1524 ifr.ifr_addr = *sa; 1525 osa->sa_family = sa->sa_family; 1526 error = copyout(&ifr, ifrp, sizeof ifr); 1527 ifrp++; 1528 } else 1529 #endif 1530 if (sa->sa_len <= sizeof(*sa)) { 1531 ifr.ifr_addr = *sa; 1532 error = copyout(&ifr, ifrp, sizeof ifr); 1533 ifrp++; 1534 } else { 1535 if (space < (sizeof ifr) + sa->sa_len - 1536 sizeof(*sa)) 1537 break; 1538 space -= sa->sa_len - sizeof(*sa); 1539 error = copyout(&ifr, ifrp, 1540 sizeof ifr.ifr_name); 1541 if (error == 0) 1542 error = copyout(sa, &ifrp->ifr_addr, 1543 sa->sa_len); 1544 ifrp = (struct ifreq *) 1545 (sa->sa_len + (caddr_t)&ifrp->ifr_addr); 1546 } 1547 if (error) 1548 break; 1549 space -= sizeof ifr; 1550 } 1551 if (error) 1552 break; 1553 if (!addrs) { 1554 bzero(&ifr.ifr_addr, sizeof ifr.ifr_addr); 1555 error = copyout(&ifr, ifrp, sizeof ifr); 1556 if (error) 1557 break; 1558 space -= sizeof ifr; 1559 ifrp++; 1560 } 1561 } 1562 ifc->ifc_len -= space; 1563 return (error); 1564 } 1565 1566 /* 1567 * Just like if_promisc(), but for all-multicast-reception mode. 1568 */ 1569 int 1570 if_allmulti(struct ifnet *ifp, int onswitch) 1571 { 1572 int error = 0; 1573 struct ifreq ifr; 1574 1575 crit_enter(); 1576 1577 if (onswitch) { 1578 if (ifp->if_amcount++ == 0) { 1579 ifp->if_flags |= IFF_ALLMULTI; 1580 ifr.ifr_flags = ifp->if_flags; 1581 ifr.ifr_flagshigh = ifp->if_flags >> 16; 1582 lwkt_serialize_enter(ifp->if_serializer); 1583 error = ifp->if_ioctl(ifp, SIOCSIFFLAGS, (caddr_t)&ifr, 1584 (struct ucred *)NULL); 1585 lwkt_serialize_exit(ifp->if_serializer); 1586 } 1587 } else { 1588 if (ifp->if_amcount > 1) { 1589 ifp->if_amcount--; 1590 } else { 1591 ifp->if_amcount = 0; 1592 ifp->if_flags &= ~IFF_ALLMULTI; 1593 ifr.ifr_flags = ifp->if_flags; 1594 ifr.ifr_flagshigh = ifp->if_flags >> 16; 1595 lwkt_serialize_enter(ifp->if_serializer); 1596 error = ifp->if_ioctl(ifp, SIOCSIFFLAGS, (caddr_t)&ifr, 1597 (struct ucred *)NULL); 1598 lwkt_serialize_exit(ifp->if_serializer); 1599 } 1600 } 1601 1602 crit_exit(); 1603 1604 if (error == 0) 1605 rt_ifmsg(ifp); 1606 return error; 1607 } 1608 1609 /* 1610 * Add a multicast listenership to the interface in question. 1611 * The link layer provides a routine which converts 1612 */ 1613 int 1614 if_addmulti( 1615 struct ifnet *ifp, /* interface to manipulate */ 1616 struct sockaddr *sa, /* address to add */ 1617 struct ifmultiaddr **retifma) 1618 { 1619 struct sockaddr *llsa, *dupsa; 1620 int error; 1621 struct ifmultiaddr *ifma; 1622 1623 /* 1624 * If the matching multicast address already exists 1625 * then don't add a new one, just add a reference 1626 */ 1627 LIST_FOREACH(ifma, &ifp->if_multiaddrs, ifma_link) { 1628 if (sa_equal(sa, ifma->ifma_addr)) { 1629 ifma->ifma_refcount++; 1630 if (retifma) 1631 *retifma = ifma; 1632 return 0; 1633 } 1634 } 1635 1636 /* 1637 * Give the link layer a chance to accept/reject it, and also 1638 * find out which AF_LINK address this maps to, if it isn't one 1639 * already. 1640 */ 1641 if (ifp->if_resolvemulti) { 1642 lwkt_serialize_enter(ifp->if_serializer); 1643 error = ifp->if_resolvemulti(ifp, &llsa, sa); 1644 lwkt_serialize_exit(ifp->if_serializer); 1645 if (error) 1646 return error; 1647 } else { 1648 llsa = 0; 1649 } 1650 1651 MALLOC(ifma, struct ifmultiaddr *, sizeof *ifma, M_IFMADDR, M_WAITOK); 1652 MALLOC(dupsa, struct sockaddr *, sa->sa_len, M_IFMADDR, M_WAITOK); 1653 bcopy(sa, dupsa, sa->sa_len); 1654 1655 ifma->ifma_addr = dupsa; 1656 ifma->ifma_lladdr = llsa; 1657 ifma->ifma_ifp = ifp; 1658 ifma->ifma_refcount = 1; 1659 ifma->ifma_protospec = 0; 1660 rt_newmaddrmsg(RTM_NEWMADDR, ifma); 1661 1662 /* 1663 * Some network interfaces can scan the address list at 1664 * interrupt time; lock them out. 1665 */ 1666 crit_enter(); 1667 LIST_INSERT_HEAD(&ifp->if_multiaddrs, ifma, ifma_link); 1668 crit_exit(); 1669 *retifma = ifma; 1670 1671 if (llsa != 0) { 1672 LIST_FOREACH(ifma, &ifp->if_multiaddrs, ifma_link) { 1673 if (sa_equal(ifma->ifma_addr, llsa)) 1674 break; 1675 } 1676 if (ifma) { 1677 ifma->ifma_refcount++; 1678 } else { 1679 MALLOC(ifma, struct ifmultiaddr *, sizeof *ifma, 1680 M_IFMADDR, M_WAITOK); 1681 MALLOC(dupsa, struct sockaddr *, llsa->sa_len, 1682 M_IFMADDR, M_WAITOK); 1683 bcopy(llsa, dupsa, llsa->sa_len); 1684 ifma->ifma_addr = dupsa; 1685 ifma->ifma_ifp = ifp; 1686 ifma->ifma_refcount = 1; 1687 crit_enter(); 1688 LIST_INSERT_HEAD(&ifp->if_multiaddrs, ifma, ifma_link); 1689 crit_exit(); 1690 } 1691 } 1692 /* 1693 * We are certain we have added something, so call down to the 1694 * interface to let them know about it. 1695 */ 1696 crit_enter(); 1697 lwkt_serialize_enter(ifp->if_serializer); 1698 ifp->if_ioctl(ifp, SIOCADDMULTI, 0, (struct ucred *)NULL); 1699 lwkt_serialize_exit(ifp->if_serializer); 1700 crit_exit(); 1701 1702 return 0; 1703 } 1704 1705 /* 1706 * Remove a reference to a multicast address on this interface. Yell 1707 * if the request does not match an existing membership. 1708 */ 1709 int 1710 if_delmulti(struct ifnet *ifp, struct sockaddr *sa) 1711 { 1712 struct ifmultiaddr *ifma; 1713 1714 LIST_FOREACH(ifma, &ifp->if_multiaddrs, ifma_link) 1715 if (sa_equal(sa, ifma->ifma_addr)) 1716 break; 1717 if (ifma == 0) 1718 return ENOENT; 1719 1720 if (ifma->ifma_refcount > 1) { 1721 ifma->ifma_refcount--; 1722 return 0; 1723 } 1724 1725 rt_newmaddrmsg(RTM_DELMADDR, ifma); 1726 sa = ifma->ifma_lladdr; 1727 crit_enter(); 1728 LIST_REMOVE(ifma, ifma_link); 1729 /* 1730 * Make sure the interface driver is notified 1731 * in the case of a link layer mcast group being left. 1732 */ 1733 if (ifma->ifma_addr->sa_family == AF_LINK && sa == 0) { 1734 lwkt_serialize_enter(ifp->if_serializer); 1735 ifp->if_ioctl(ifp, SIOCDELMULTI, 0, (struct ucred *)NULL); 1736 lwkt_serialize_exit(ifp->if_serializer); 1737 } 1738 crit_exit(); 1739 kfree(ifma->ifma_addr, M_IFMADDR); 1740 kfree(ifma, M_IFMADDR); 1741 if (sa == 0) 1742 return 0; 1743 1744 /* 1745 * Now look for the link-layer address which corresponds to 1746 * this network address. It had been squirreled away in 1747 * ifma->ifma_lladdr for this purpose (so we don't have 1748 * to call ifp->if_resolvemulti() again), and we saved that 1749 * value in sa above. If some nasty deleted the 1750 * link-layer address out from underneath us, we can deal because 1751 * the address we stored was is not the same as the one which was 1752 * in the record for the link-layer address. (So we don't complain 1753 * in that case.) 1754 */ 1755 LIST_FOREACH(ifma, &ifp->if_multiaddrs, ifma_link) 1756 if (sa_equal(sa, ifma->ifma_addr)) 1757 break; 1758 if (ifma == 0) 1759 return 0; 1760 1761 if (ifma->ifma_refcount > 1) { 1762 ifma->ifma_refcount--; 1763 return 0; 1764 } 1765 1766 crit_enter(); 1767 lwkt_serialize_enter(ifp->if_serializer); 1768 LIST_REMOVE(ifma, ifma_link); 1769 ifp->if_ioctl(ifp, SIOCDELMULTI, 0, (struct ucred *)NULL); 1770 lwkt_serialize_exit(ifp->if_serializer); 1771 crit_exit(); 1772 kfree(ifma->ifma_addr, M_IFMADDR); 1773 kfree(sa, M_IFMADDR); 1774 kfree(ifma, M_IFMADDR); 1775 1776 return 0; 1777 } 1778 1779 /* 1780 * Set the link layer address on an interface. 1781 * 1782 * At this time we only support certain types of interfaces, 1783 * and we don't allow the length of the address to change. 1784 */ 1785 int 1786 if_setlladdr(struct ifnet *ifp, const u_char *lladdr, int len) 1787 { 1788 struct sockaddr_dl *sdl; 1789 struct ifaddr *ifa; 1790 struct ifreq ifr; 1791 1792 sdl = IF_LLSOCKADDR(ifp); 1793 if (sdl == NULL) 1794 return (EINVAL); 1795 if (len != sdl->sdl_alen) /* don't allow length to change */ 1796 return (EINVAL); 1797 switch (ifp->if_type) { 1798 case IFT_ETHER: /* these types use struct arpcom */ 1799 case IFT_XETHER: 1800 case IFT_L2VLAN: 1801 bcopy(lladdr, ((struct arpcom *)ifp->if_softc)->ac_enaddr, len); 1802 bcopy(lladdr, LLADDR(sdl), len); 1803 break; 1804 default: 1805 return (ENODEV); 1806 } 1807 /* 1808 * If the interface is already up, we need 1809 * to re-init it in order to reprogram its 1810 * address filter. 1811 */ 1812 lwkt_serialize_enter(ifp->if_serializer); 1813 if ((ifp->if_flags & IFF_UP) != 0) { 1814 ifp->if_flags &= ~IFF_UP; 1815 ifr.ifr_flags = ifp->if_flags; 1816 ifr.ifr_flagshigh = ifp->if_flags >> 16; 1817 ifp->if_ioctl(ifp, SIOCSIFFLAGS, (caddr_t)&ifr, 1818 (struct ucred *)NULL); 1819 ifp->if_flags |= IFF_UP; 1820 ifr.ifr_flags = ifp->if_flags; 1821 ifr.ifr_flagshigh = ifp->if_flags >> 16; 1822 ifp->if_ioctl(ifp, SIOCSIFFLAGS, (caddr_t)&ifr, 1823 (struct ucred *)NULL); 1824 #ifdef INET 1825 /* 1826 * Also send gratuitous ARPs to notify other nodes about 1827 * the address change. 1828 */ 1829 TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) { 1830 if (ifa->ifa_addr != NULL && 1831 ifa->ifa_addr->sa_family == AF_INET) 1832 arp_ifinit(ifp, ifa); 1833 } 1834 #endif 1835 } 1836 lwkt_serialize_exit(ifp->if_serializer); 1837 return (0); 1838 } 1839 1840 struct ifmultiaddr * 1841 ifmaof_ifpforaddr(struct sockaddr *sa, struct ifnet *ifp) 1842 { 1843 struct ifmultiaddr *ifma; 1844 1845 LIST_FOREACH(ifma, &ifp->if_multiaddrs, ifma_link) 1846 if (sa_equal(ifma->ifma_addr, sa)) 1847 break; 1848 1849 return ifma; 1850 } 1851 1852 /* 1853 * This function locates the first real ethernet MAC from a network 1854 * card and loads it into node, returning 0 on success or ENOENT if 1855 * no suitable interfaces were found. It is used by the uuid code to 1856 * generate a unique 6-byte number. 1857 */ 1858 int 1859 if_getanyethermac(uint16_t *node, int minlen) 1860 { 1861 struct ifnet *ifp; 1862 struct sockaddr_dl *sdl; 1863 1864 TAILQ_FOREACH(ifp, &ifnet, if_link) { 1865 if (ifp->if_type != IFT_ETHER) 1866 continue; 1867 sdl = IF_LLSOCKADDR(ifp); 1868 if (sdl->sdl_alen < minlen) 1869 continue; 1870 bcopy(((struct arpcom *)ifp->if_softc)->ac_enaddr, node, 1871 minlen); 1872 return(0); 1873 } 1874 return (ENOENT); 1875 } 1876 1877 /* 1878 * The name argument must be a pointer to storage which will last as 1879 * long as the interface does. For physical devices, the result of 1880 * device_get_name(dev) is a good choice and for pseudo-devices a 1881 * static string works well. 1882 */ 1883 void 1884 if_initname(struct ifnet *ifp, const char *name, int unit) 1885 { 1886 ifp->if_dname = name; 1887 ifp->if_dunit = unit; 1888 if (unit != IF_DUNIT_NONE) 1889 ksnprintf(ifp->if_xname, IFNAMSIZ, "%s%d", name, unit); 1890 else 1891 strlcpy(ifp->if_xname, name, IFNAMSIZ); 1892 } 1893 1894 int 1895 if_printf(struct ifnet *ifp, const char *fmt, ...) 1896 { 1897 __va_list ap; 1898 int retval; 1899 1900 retval = kprintf("%s: ", ifp->if_xname); 1901 __va_start(ap, fmt); 1902 retval += kvprintf(fmt, ap); 1903 __va_end(ap); 1904 return (retval); 1905 } 1906 1907 SYSCTL_NODE(_net, PF_LINK, link, CTLFLAG_RW, 0, "Link layers"); 1908 SYSCTL_NODE(_net_link, 0, generic, CTLFLAG_RW, 0, "Generic link-management"); 1909 1910 void 1911 ifq_set_classic(struct ifaltq *ifq) 1912 { 1913 ifq->altq_enqueue = ifq_classic_enqueue; 1914 ifq->altq_dequeue = ifq_classic_dequeue; 1915 ifq->altq_request = ifq_classic_request; 1916 } 1917 1918 static int 1919 ifq_classic_enqueue(struct ifaltq *ifq, struct mbuf *m, 1920 struct altq_pktattr *pa __unused) 1921 { 1922 crit_enter(); 1923 if (IF_QFULL(ifq)) { 1924 m_freem(m); 1925 crit_exit(); 1926 return(ENOBUFS); 1927 } else { 1928 IF_ENQUEUE(ifq, m); 1929 crit_exit(); 1930 return(0); 1931 } 1932 } 1933 1934 static struct mbuf * 1935 ifq_classic_dequeue(struct ifaltq *ifq, struct mbuf *mpolled, int op) 1936 { 1937 struct mbuf *m; 1938 1939 crit_enter(); 1940 switch (op) { 1941 case ALTDQ_POLL: 1942 IF_POLL(ifq, m); 1943 break; 1944 case ALTDQ_REMOVE: 1945 IF_DEQUEUE(ifq, m); 1946 break; 1947 default: 1948 panic("unsupported ALTQ dequeue op: %d", op); 1949 } 1950 crit_exit(); 1951 KKASSERT(mpolled == NULL || mpolled == m); 1952 return(m); 1953 } 1954 1955 static int 1956 ifq_classic_request(struct ifaltq *ifq, int req, void *arg) 1957 { 1958 crit_enter(); 1959 switch (req) { 1960 case ALTRQ_PURGE: 1961 IF_DRAIN(ifq); 1962 break; 1963 default: 1964 panic("unsupported ALTQ request: %d", req); 1965 } 1966 crit_exit(); 1967 return(0); 1968 } 1969 1970