xref: /dragonfly/sys/net/vlan/if_vlan.c (revision 8d1e479a)
1 /*
2  * Copyright 1998 Massachusetts Institute of Technology
3  *
4  * Permission to use, copy, modify, and distribute this software and
5  * its documentation for any purpose and without fee is hereby
6  * granted, provided that both the above copyright notice and this
7  * permission notice appear in all copies, that both the above
8  * copyright notice and this permission notice appear in all
9  * supporting documentation, and that the name of M.I.T. not be used
10  * in advertising or publicity pertaining to distribution of the
11  * software without specific, written prior permission.  M.I.T. makes
12  * no representations about the suitability of this software for any
13  * purpose.  It is provided "as is" without express or implied
14  * warranty.
15  *
16  * THIS SOFTWARE IS PROVIDED BY M.I.T. ``AS IS''.  M.I.T. DISCLAIMS
17  * ALL EXPRESS OR IMPLIED WARRANTIES WITH REGARD TO THIS SOFTWARE,
18  * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
19  * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
20  * SHALL M.I.T. BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
21  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
22  * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
23  * USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
24  * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
25  * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
26  * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27  * SUCH DAMAGE.
28  *
29  * $FreeBSD: src/sys/net/if_vlan.c,v 1.15.2.13 2003/02/14 22:25:58 fenner Exp $
30  */
31 
32 /*
33  * if_vlan.c - pseudo-device driver for IEEE 802.1Q virtual LANs.
34  * Might be extended some day to also handle IEEE 802.1p priority
35  * tagging.  This is sort of sneaky in the implementation, since
36  * we need to pretend to be enough of an Ethernet implementation
37  * to make arp work.  The way we do this is by telling everyone
38  * that we are an Ethernet, and then catch the packets that
39  * ether_output() left on our output queue queue when it calls
40  * if_start(), rewrite them for use by the real outgoing interface,
41  * and ask it to send them.
42  *
43  *
44  * Note about vlan's MP safe approach:
45  *
46  * - All configuration operation, e.g. config, unconfig and change flags,
47  *   is serialized by netisr0; not by vlan's serializer
48  *
49  * - Parent interface's trunk and vlans are linked in the following
50  *   fashion:
51  *                     CPU0     CPU1     CPU2     CPU3
52  *   +--------------+--------+--------+--------+--------+
53  *   | parent ifnet |trunk[0]|trunk[1]|trunk[2]|trunk[3]|
54  *   +--------------+--------+--------+--------+--------+
55  *                       |        |        |        |
56  *                       V        V        V        V
57  *   +--------------+--------+--------+--------+--------+
58  *   |   vlan ifnet |entry[0]|entry[1]|entry[2]|entry[3]|
59  *   +--------------+--------+--------+--------+--------+
60  *                       |        |        |        |
61  *                       V        V        V        V
62  *   +--------------+--------+--------+--------+--------+
63  *   |   vlan ifnet |entry[0]|entry[1]|entry[2]|entry[3]|
64  *   +--------------+--------+--------+--------+--------+
65  *
66  * - Vlan is linked/unlinked onto parent interface's trunk using following
67  *   way:
68  *
69  *       CPU0             CPU1              CPU2              CPU3
70  *
71  *      netisr0 <----------------------------------------------+
72  *  (config/unconfig)                                          |
73  *         |                                                   |
74  *         | domsg                                             | replymsg
75  *         : (link/unlink)                                     |
76  *         :                                                   |
77  *         :   fwdmsg             fwdmsg            fwdmsg     |
78  *         :-----------> netisr1 --------> netisr2 --------> netisr3
79  *                    (link/unlink)     (link/unlink)     (link/unlink)
80  *
81  * - Parent interface's trunk is destroyed in the following lockless way:
82  *
83  *     old_trunk = ifp->if_vlantrunks;
84  *     ifp->if_vlantrunks = NULL;
85  *     netmsg_service_sync();
86  *     (*)
87  *     free(old_trunk);
88  *
89  *   Since all of the accessing of if_vlantrunks only happens in network
90  *   threads (percpu netisr and ifnet threads), after netmsg_service_sync()
91  *   the network threads are promised to see only NULL if_vlantrunks; we
92  *   are safe to free the "to be destroyed" parent interface's trunk
93  *   afterwards.
94  */
95 
96 #ifndef NVLAN
97 #include "use_vlan.h"
98 #endif
99 #include "opt_inet.h"
100 
101 #include <sys/param.h>
102 #include <sys/systm.h>
103 #include <sys/kernel.h>
104 #include <sys/malloc.h>
105 #include <sys/mbuf.h>
106 #include <sys/module.h>
107 #include <sys/queue.h>
108 #include <sys/socket.h>
109 #include <sys/sockio.h>
110 #include <sys/sysctl.h>
111 #include <sys/bus.h>
112 #include <sys/thread2.h>
113 
114 #include <net/bpf.h>
115 #include <net/ethernet.h>
116 #include <net/if.h>
117 #include <net/if_arp.h>
118 #include <net/if_dl.h>
119 #include <net/if_types.h>
120 #include <net/ifq_var.h>
121 #include <net/if_clone.h>
122 #include <net/netmsg2.h>
123 #include <net/netisr2.h>
124 
125 #ifdef INET
126 #include <netinet/in.h>
127 #include <netinet/if_ether.h>
128 #endif
129 
130 #include <net/vlan/if_vlan_var.h>
131 #include <net/vlan/if_vlan_ether.h>
132 
133 struct ifvlan;
134 
135 struct vlan_mc_entry {
136 	struct ether_addr		mc_addr;
137 	SLIST_ENTRY(vlan_mc_entry)	mc_entries;
138 };
139 
140 struct vlan_entry {
141 	struct ifvlan		*ifv;
142 	LIST_ENTRY(vlan_entry)	ifv_link;
143 };
144 
145 struct	ifvlan {
146 	struct	arpcom ifv_ac;	/* make this an interface */
147 	struct	ifnet *ifv_p;	/* parent inteface of this vlan */
148 	int ifv_pflags;		/* special flags we have set on parent */
149 	struct	ifv_linkmib {
150 		int	ifvm_parent;
151 		uint16_t ifvm_proto; /* encapsulation ethertype */
152 		uint16_t ifvm_tag; /* tag to apply on packets leaving if */
153 	}	ifv_mib;
154 	SLIST_HEAD(, vlan_mc_entry) vlan_mc_listhead;
155 	LIST_ENTRY(ifvlan) ifv_list;
156 	struct vlan_entry ifv_entries[1];
157 };
158 #define	ifv_if	ifv_ac.ac_if
159 #define	ifv_tag	ifv_mib.ifvm_tag
160 
161 struct vlan_trunk {
162 	LIST_HEAD(, vlan_entry) vlan_list;
163 };
164 
165 struct netmsg_vlan {
166 	struct netmsg_base base;
167 	struct ifvlan	*nv_ifv;
168 	struct ifnet	*nv_ifp_p;
169 	const char	*nv_parent_name;
170 	uint16_t	nv_vlantag;
171 };
172 
173 #define VLANNAME	"vlan"
174 
175 SYSCTL_DECL(_net_link);
176 SYSCTL_NODE(_net_link, IFT_L2VLAN, vlan, CTLFLAG_RW, 0, "IEEE 802.1Q VLAN");
177 SYSCTL_NODE(_net_link_vlan, PF_LINK, link, CTLFLAG_RW, 0, "for consistency");
178 
179 static MALLOC_DEFINE(M_VLAN, "vlan", "802.1Q Virtual LAN Interface");
180 static LIST_HEAD(, ifvlan) ifv_list;
181 
182 static int	vlan_clone_create(struct if_clone *, int, caddr_t, caddr_t);
183 static int	vlan_clone_destroy(struct ifnet *);
184 static void	vlan_ifdetach(void *, struct ifnet *);
185 
186 static void	vlan_init(void *);
187 static void	vlan_start(struct ifnet *, struct ifaltq_subque *);
188 static int	vlan_ioctl(struct ifnet *, u_long, caddr_t, struct ucred *);
189 static void	vlan_input(struct mbuf *);
190 
191 static int	vlan_setflags(struct ifvlan *, struct ifnet *, int);
192 static int	vlan_setflag(struct ifvlan *, struct ifnet *, int, int,
193 			     int (*)(struct ifnet *, int));
194 static int	vlan_config_flags(struct ifvlan *ifv);
195 static void	vlan_clrmulti(struct ifvlan *, struct ifnet *);
196 static int	vlan_setmulti(struct ifvlan *, struct ifnet *);
197 static int	vlan_config_multi(struct ifvlan *);
198 static int	vlan_config(struct ifvlan *, const char *, uint16_t);
199 static int	vlan_unconfig(struct ifvlan *);
200 static void	vlan_link(struct ifvlan *, struct ifnet *);
201 static void	vlan_unlink(struct ifvlan *, struct ifnet *);
202 
203 static void	vlan_config_dispatch(netmsg_t);
204 static void	vlan_unconfig_dispatch(netmsg_t);
205 static void	vlan_link_dispatch(netmsg_t);
206 static void	vlan_unlink_dispatch(netmsg_t);
207 static void	vlan_multi_dispatch(netmsg_t);
208 static void	vlan_flags_dispatch(netmsg_t);
209 static void	vlan_ifdetach_dispatch(netmsg_t);
210 
211 /* Special flags we should propagate to parent */
212 static struct {
213 	int flag;
214 	int (*func)(struct ifnet *, int);
215 } vlan_pflags[] = {
216 	{ IFF_PROMISC, ifpromisc },
217 	{ IFF_ALLMULTI, if_allmulti },
218 	{ 0, NULL }
219 };
220 
221 static eventhandler_tag vlan_ifdetach_cookie;
222 static struct if_clone vlan_cloner =
223 	IF_CLONE_INITIALIZER("vlan", vlan_clone_create, vlan_clone_destroy,
224 			     NVLAN, IF_MAXUNIT);
225 
226 /*
227  * Handle IFF_* flags that require certain changes on the parent:
228  * if "set" is true, update parent's flags respective to our if_flags;
229  * if "set" is false, forcedly clear the flags set on parent.
230  */
231 static int
232 vlan_setflags(struct ifvlan *ifv, struct ifnet *ifp_p, int set)
233 {
234 	int error, i;
235 
236 	ASSERT_IFNET_NOT_SERIALIZED_ALL(&ifv->ifv_if);
237 
238 	for (i = 0; vlan_pflags[i].func != NULL; i++) {
239 		error = vlan_setflag(ifv, ifp_p, vlan_pflags[i].flag,
240 				     set, vlan_pflags[i].func);
241 		if (error)
242 			return error;
243 	}
244 	return 0;
245 }
246 
247 /* Handle a reference counted flag that should be set on the parent as well */
248 static int
249 vlan_setflag(struct ifvlan *ifv, struct ifnet *ifp_p, int flag, int set,
250 	     int (*func)(struct ifnet *, int))
251 {
252 	struct ifnet *ifp = &ifv->ifv_if;
253 	int error, ifv_flag;
254 
255 	ASSERT_IFNET_NOT_SERIALIZED_ALL(ifp);
256 
257 	ifv_flag = set ? (ifp->if_flags & flag) : 0;
258 
259 	/*
260 	 * See if recorded parent's status is different from what
261 	 * we want it to be.  If it is, flip it.  We record parent's
262 	 * status in ifv_pflags so that we won't clear parent's flag
263 	 * we haven't set.  In fact, we don't clear or set parent's
264 	 * flags directly, but get or release references to them.
265 	 * That's why we can be sure that recorded flags still are
266 	 * in accord with actual parent's flags.
267 	 */
268 	if (ifv_flag != (ifv->ifv_pflags & flag)) {
269 		error = func(ifp_p, ifv_flag);
270 		if (error)
271 			return error;
272 		ifv->ifv_pflags &= ~flag;
273 		ifv->ifv_pflags |= ifv_flag;
274 	}
275 	return 0;
276 }
277 
278 /*
279  * Program our multicast filter. What we're actually doing is
280  * programming the multicast filter of the parent. This has the
281  * side effect of causing the parent interface to receive multicast
282  * traffic that it doesn't really want, which ends up being discarded
283  * later by the upper protocol layers. Unfortunately, there's no way
284  * to avoid this: there really is only one physical interface.
285  */
286 static int
287 vlan_setmulti(struct ifvlan *ifv, struct ifnet *ifp_p)
288 {
289 	struct ifmultiaddr *ifma;
290 	struct vlan_mc_entry *mc = NULL;
291 	struct sockaddr_dl sdl;
292 	struct ifnet *ifp = &ifv->ifv_if;
293 
294 	ASSERT_IFNET_NOT_SERIALIZED_ALL(ifp);
295 
296 	/*
297 	 * First, remove any existing filter entries.
298 	 */
299 	vlan_clrmulti(ifv, ifp_p);
300 
301 	/*
302 	 * Save the filter entries to be added to parent.
303 	 *
304 	 * TODO: need ifnet_serialize_main
305 	 */
306 	ifnet_serialize_all(ifp);
307 	TAILQ_FOREACH(ifma, &ifp->if_multiaddrs, ifma_link) {
308 		if (ifma->ifma_addr->sa_family != AF_LINK)
309 			continue;
310 
311 		/* Save a copy */
312 		mc = kmalloc(sizeof(struct vlan_mc_entry), M_VLAN, M_WAITOK);
313 		bcopy(LLADDR((struct sockaddr_dl *)ifma->ifma_addr),
314 		      &mc->mc_addr, ETHER_ADDR_LEN);
315 		SLIST_INSERT_HEAD(&ifv->vlan_mc_listhead, mc, mc_entries);
316 	}
317 	ifnet_deserialize_all(ifp);
318 
319 	/*
320 	 * Now program new ones.
321 	 */
322 	bzero(&sdl, sizeof(sdl));
323 	sdl.sdl_len = sizeof(sdl);
324 	sdl.sdl_family = AF_LINK;
325 	sdl.sdl_index = ifp_p->if_index;
326 	sdl.sdl_type = IFT_ETHER;
327 	sdl.sdl_alen = ETHER_ADDR_LEN;
328 
329 	/*
330 	 * Program the parent multicast filter
331 	 */
332 	SLIST_FOREACH(mc, &ifv->vlan_mc_listhead, mc_entries) {
333 		int error;
334 
335 		bcopy(&mc->mc_addr, LLADDR(&sdl), ETHER_ADDR_LEN);
336 		error = if_addmulti(ifp_p, (struct sockaddr *)&sdl, NULL);
337 		if (error) {
338 			/* XXX probably should keep going */
339 			return error;
340 		}
341 	}
342 	return 0;
343 }
344 
345 static void
346 vlan_clrmulti(struct ifvlan *ifv, struct ifnet *ifp_p)
347 {
348 	struct vlan_mc_entry *mc;
349 	struct sockaddr_dl sdl;
350 
351 	ASSERT_IFNET_NOT_SERIALIZED_ALL(&ifv->ifv_if);
352 
353 	bzero(&sdl, sizeof(sdl));
354 	sdl.sdl_len = sizeof(sdl);
355 	sdl.sdl_family = AF_LINK;
356 	sdl.sdl_index = ifp_p->if_index;
357 	sdl.sdl_type = IFT_ETHER;
358 	sdl.sdl_alen = ETHER_ADDR_LEN;
359 
360 	while ((mc = SLIST_FIRST(&ifv->vlan_mc_listhead)) != NULL) {
361 		bcopy(&mc->mc_addr, LLADDR(&sdl), ETHER_ADDR_LEN);
362 		if_delmulti(ifp_p, (struct sockaddr *)&sdl); /* ignore error */
363 
364 		SLIST_REMOVE_HEAD(&ifv->vlan_mc_listhead, mc_entries);
365 		kfree(mc, M_VLAN);
366 	}
367 }
368 
369 static int
370 vlan_modevent(module_t mod, int type, void *data)
371 {
372 	switch (type) {
373 	case MOD_LOAD:
374 		LIST_INIT(&ifv_list);
375 		vlan_input_p = vlan_input;
376 		vlan_ifdetach_cookie =
377 		EVENTHANDLER_REGISTER(ifnet_detach_event,
378 				      vlan_ifdetach, NULL,
379 				      EVENTHANDLER_PRI_ANY);
380 		if_clone_attach(&vlan_cloner);
381 		break;
382 
383 	case MOD_UNLOAD:
384 		if_clone_detach(&vlan_cloner);
385 
386 		vlan_input_p = NULL;
387 		/*
388 		 * Make sure that all protocol threads see vlan_input_p change.
389 		 */
390 		netmsg_service_sync();
391 
392 		EVENTHANDLER_DEREGISTER(ifnet_detach_event,
393 					vlan_ifdetach_cookie);
394 		while (!LIST_EMPTY(&ifv_list))
395 			vlan_clone_destroy(&LIST_FIRST(&ifv_list)->ifv_if);
396 		break;
397 	}
398 	return 0;
399 }
400 
401 static moduledata_t vlan_mod = {
402 	"if_vlan",
403 	vlan_modevent,
404 	0
405 };
406 
407 DECLARE_MODULE(if_vlan, vlan_mod, SI_SUB_PSEUDO, SI_ORDER_ANY);
408 
409 static void
410 vlan_ifdetach_dispatch(netmsg_t msg)
411 {
412 	struct netmsg_vlan *vmsg = (struct netmsg_vlan *)msg;
413 	struct ifnet *ifp_p = vmsg->nv_ifp_p;
414 	struct vlan_trunk *vlantrunks, *trunk;
415 	struct vlan_entry *ifve;
416 
417 	vlantrunks = ifp_p->if_vlantrunks;
418 	if (vlantrunks == NULL)
419 		goto reply;
420 	trunk = &vlantrunks[mycpuid];
421 
422 	while (ifp_p->if_vlantrunks &&
423 	       (ifve = LIST_FIRST(&trunk->vlan_list)) != NULL)
424 	{
425 		vlan_unconfig(ifve->ifv);
426 	}
427 reply:
428 	lwkt_replymsg(&vmsg->base.lmsg, 0);
429 }
430 
431 static void
432 vlan_ifdetach(void *arg __unused, struct ifnet *ifp)
433 {
434 	struct netmsg_vlan vmsg;
435 
436 	ASSERT_IFNET_NOT_SERIALIZED_ALL(ifp);
437 
438 	bzero(&vmsg, sizeof(vmsg));
439 
440 	netmsg_init(&vmsg.base, NULL, &curthread->td_msgport,
441 		    0, vlan_ifdetach_dispatch);
442 	vmsg.nv_ifp_p = ifp;
443 
444 	lwkt_domsg(netisr_cpuport(0), &vmsg.base.lmsg, 0);
445 }
446 
447 static int
448 vlan_clone_create(struct if_clone *ifc, int unit,
449 		  caddr_t params __unused, caddr_t data __unused)
450 {
451 	struct ifvlan *ifv;
452 	struct ifnet *ifp;
453 	int vlan_size, i;
454 
455 	vlan_size = sizeof(struct ifvlan)
456 		  + ((netisr_ncpus - 1) * sizeof(struct vlan_entry));
457 	ifv = kmalloc(vlan_size, M_VLAN, M_WAITOK | M_ZERO);
458 	SLIST_INIT(&ifv->vlan_mc_listhead);
459 	for (i = 0; i < netisr_ncpus; ++i)
460 		ifv->ifv_entries[i].ifv = ifv;
461 
462 	crit_enter();	/* XXX not MP safe */
463 	LIST_INSERT_HEAD(&ifv_list, ifv, ifv_list);
464 	crit_exit();
465 
466 	ifp = &ifv->ifv_if;
467 	ifp->if_softc = ifv;
468 	if_initname(ifp, "vlan", unit);
469 	/* NB: flags are not set here */
470 	ifp->if_linkmib = &ifv->ifv_mib;
471 	ifp->if_linkmiblen = sizeof ifv->ifv_mib;
472 	/* NB: mtu is not set here */
473 
474 	ifp->if_init = vlan_init;
475 	ifp->if_start = vlan_start;
476 	ifp->if_ioctl = vlan_ioctl;
477 	ifq_set_maxlen(&ifp->if_snd, ifqmaxlen);
478 	ifq_set_ready(&ifp->if_snd);
479 	ether_ifattach(ifp, ifv->ifv_ac.ac_enaddr, NULL);
480 	/* Now undo some of the damage... */
481 	ifp->if_data.ifi_type = IFT_L2VLAN;
482 	ifp->if_data.ifi_hdrlen = EVL_ENCAPLEN;
483 
484 	return (0);
485 }
486 
487 static int
488 vlan_clone_destroy(struct ifnet *ifp)
489 {
490 	struct ifvlan *ifv = ifp->if_softc;
491 
492 	crit_enter();	/* XXX not MP safe */
493 	LIST_REMOVE(ifv, ifv_list);
494 	crit_exit();
495 
496 	vlan_unconfig(ifv);
497 	ether_ifdetach(ifp);
498 
499 	kfree(ifv, M_VLAN);
500 
501 	return 0;
502 }
503 
504 static void
505 vlan_init(void *xsc)
506 {
507 	struct ifvlan *ifv = xsc;
508 	struct ifnet *ifp = &ifv->ifv_if;
509 
510 	ASSERT_IFNET_SERIALIZED_ALL(ifp);
511 
512 	if (ifv->ifv_p != NULL)
513 		ifp->if_flags |= IFF_RUNNING;
514 }
515 
516 static void
517 vlan_start(struct ifnet *ifp, struct ifaltq_subque *ifsq)
518 {
519 	struct ifvlan *ifv = ifp->if_softc;
520 	struct ifnet *ifp_p = ifv->ifv_p;
521 	struct mbuf *m;
522 	lwkt_port_t p_port;
523 
524 	ASSERT_ALTQ_SQ_DEFAULT(ifp, ifsq);
525 	ASSERT_ALTQ_SQ_SERIALIZED_HW(ifsq);
526 
527 	if (ifp_p == NULL) {
528 		ifsq_purge(ifsq);
529 		return;
530 	}
531 
532 	if ((ifp->if_flags & IFF_RUNNING) == 0)
533 		return;
534 
535 	p_port = netisr_cpuport(
536 	    ifsq_get_cpuid(ifq_get_subq_default(&ifp_p->if_snd)));
537 	for (;;) {
538 		struct netmsg_packet *nmp;
539 
540 		m = ifsq_dequeue(ifsq);
541 		if (m == NULL)
542 			break;
543 		BPF_MTAP(ifp, m);
544 
545 		/*
546 		 * Do not run parent's if_start() if the parent is not up,
547 		 * or parent's driver will cause a system crash.
548 		 */
549 		if ((ifp_p->if_flags & (IFF_UP | IFF_RUNNING)) !=
550 		    (IFF_UP | IFF_RUNNING)) {
551 			m_freem(m);
552 			IFNET_STAT_INC(ifp, collisions, 1);
553 			continue;
554 		}
555 
556 		/*
557 		 * We need some way to tell the interface where the packet
558 		 * came from so that it knows how to find the VLAN tag to
559 		 * use, so we set the ether_vlantag in the mbuf packet header
560 		 * to our vlan tag.  We also set the M_VLANTAG flag in the
561 		 * mbuf to let the parent driver know that the ether_vlantag
562 		 * is really valid.
563 		 */
564 		m->m_pkthdr.ether_vlantag = ifv->ifv_tag;
565 		m->m_flags |= M_VLANTAG;
566 
567 		nmp = &m->m_hdr.mh_netmsg;
568 
569 		netmsg_init(&nmp->base, NULL, &netisr_apanic_rport,
570 			    0, vlan_start_dispatch);
571 		nmp->nm_packet = m;
572 		nmp->base.lmsg.u.ms_resultp = ifp_p;
573 
574 		lwkt_sendmsg(p_port, &nmp->base.lmsg);
575 		IFNET_STAT_INC(ifp, opackets, 1);
576 	}
577 }
578 
579 static void
580 vlan_input(struct mbuf *m)
581 {
582 	struct ifvlan *ifv = NULL;
583 	struct ifnet *rcvif;
584 	struct vlan_trunk *vlantrunks;
585 	struct vlan_entry *entry;
586 	int cpuid = mycpuid;
587 
588 	ASSERT_NETISR_NCPUS(cpuid);
589 
590 	rcvif = m->m_pkthdr.rcvif;
591 	KKASSERT(m->m_flags & M_VLANTAG);
592 
593 	/* Make sure 'vlantrunks' is really used. */
594 	vlantrunks = rcvif->if_vlantrunks;
595 	cpu_ccfence();
596 	if (vlantrunks == NULL) {
597 		IFNET_STAT_INC(rcvif, noproto, 1);
598 		m_freem(m);
599 		return;
600 	}
601 
602 	/*
603 	 * Locate the associated vlan
604 	 */
605 	LIST_FOREACH(entry, &vlantrunks[cpuid].vlan_list, ifv_link) {
606 		if (entry->ifv->ifv_tag ==
607 		    EVL_VLANOFTAG(m->m_pkthdr.ether_vlantag))
608 		{
609 			ifv = entry->ifv;
610 			break;
611 		}
612 	}
613 
614 	/*
615 	 * Discard packets to unknown vlans, if the vlan interface is
616 	 * not completely initialized yet, or it is being destroyed.
617 	 */
618 	if (ifv == NULL || ifv->ifv_p != rcvif) {
619 		IFNET_STAT_INC(rcvif, noproto, 1);
620 		m_freem(m);
621 		return;
622 	}
623 
624 	/*
625 	 * Clear M_VLANTAG, then hand the vlan-stripped packet to the
626 	 * vlan(4) interface.
627 	 */
628 	m->m_flags &= ~M_VLANTAG;
629 
630 	ether_reinput_oncpu(&ifv->ifv_if, m, REINPUT_RUNBPF);
631 }
632 
633 static void
634 vlan_link_dispatch(netmsg_t msg)
635 {
636 	struct netmsg_vlan *vmsg = (struct netmsg_vlan *)msg;
637 	struct ifvlan *ifv = vmsg->nv_ifv;
638 	struct ifnet *ifp_p = vmsg->nv_ifp_p;
639 	struct vlan_entry *entry;
640 	struct vlan_trunk *vlantrunks, *trunk;
641 	int cpu = mycpuid;
642 
643 	vlantrunks = ifp_p->if_vlantrunks;
644 	KASSERT(vlantrunks != NULL,
645 		("vlan trunk has not been initialized yet"));
646 
647 	entry = &ifv->ifv_entries[cpu];
648 	trunk = &vlantrunks[cpu];
649 
650 	/*
651 	 * Critical section protects per-cpu list
652 	 */
653 	crit_enter();
654 	LIST_INSERT_HEAD(&trunk->vlan_list, entry, ifv_link);
655 	crit_exit();
656 
657 	netisr_forwardmsg(&vmsg->base, cpu + 1);
658 }
659 
660 static void
661 vlan_link(struct ifvlan *ifv, struct ifnet *ifp_p)
662 {
663 	struct netmsg_vlan vmsg;
664 
665 	/* Assert in netisr0 */
666 	ASSERT_IFNET_NOT_SERIALIZED_ALL(&ifv->ifv_if);
667 
668 	if (ifp_p->if_vlantrunks == NULL) {
669 		struct vlan_trunk *vlantrunks;
670 		int i;
671 
672 		vlantrunks = kmalloc(sizeof(*vlantrunks) * netisr_ncpus,
673 				     M_VLAN,
674 				     M_WAITOK | M_ZERO);
675 		for (i = 0; i < netisr_ncpus; ++i)
676 			LIST_INIT(&vlantrunks[i].vlan_list);
677 
678 		ifp_p->if_vlantrunks = vlantrunks;
679 	}
680 
681 	bzero(&vmsg, sizeof(vmsg));
682 
683 	netmsg_init(&vmsg.base, NULL, &curthread->td_msgport,
684 		    0, vlan_link_dispatch);
685 	vmsg.nv_ifv = ifv;
686 	vmsg.nv_ifp_p = ifp_p;
687 
688 	netisr_domsg(&vmsg.base, 0);
689 }
690 
691 static void
692 vlan_config_dispatch(netmsg_t msg)
693 {
694 	struct netmsg_vlan *vmsg = (struct netmsg_vlan *)msg;
695 	struct ifvlan *ifv;
696 	struct ifnet *ifp_p, *ifp;
697 	struct sockaddr_dl *sdl1, *sdl2;
698 	int error;
699 
700 	/* Assert in netisr0 */
701 
702 	ifp_p = ifunit_netisr(vmsg->nv_parent_name);
703 	if (ifp_p == NULL) {
704 		error = ENOENT;
705 		goto reply;
706 	}
707 
708 	if (ifp_p->if_data.ifi_type != IFT_ETHER) {
709 		error = EPROTONOSUPPORT;
710 		goto reply;
711 	}
712 
713 	ifv = vmsg->nv_ifv;
714 	ifp = &ifv->ifv_if;
715 
716 	if (ifv->ifv_p) {
717 		error = EBUSY;
718 		goto reply;
719 	}
720 
721 	/* Link vlan into parent's vlantrunk */
722 	vlan_link(ifv, ifp_p);
723 
724 	ifnet_serialize_all(ifp);
725 
726 	ifv->ifv_tag = vmsg->nv_vlantag;
727 	if (ifp_p->if_capenable & IFCAP_VLAN_MTU)
728 		ifp->if_mtu = ifp_p->if_mtu;
729 	else
730 		ifp->if_mtu = ifp_p->if_data.ifi_mtu - EVL_ENCAPLEN;
731 
732 	/*
733 	 * Copy only a selected subset of flags from the parent.
734 	 * Other flags are none of our business.
735 	 */
736 #define VLAN_INHERIT_FLAGS	(IFF_BROADCAST | IFF_MULTICAST | \
737 				 IFF_SIMPLEX | IFF_POINTOPOINT)
738 
739 	ifp->if_flags &= ~VLAN_INHERIT_FLAGS;
740 	ifp->if_flags |= (ifp_p->if_flags & VLAN_INHERIT_FLAGS);
741 
742 #undef VLAN_INHERIT_FLAGS
743 
744 	/*
745 	 * Set up our ``Ethernet address'' to reflect the underlying
746 	 * physical interface's.
747 	 */
748 	sdl1 = IF_LLSOCKADDR(ifp);
749 	sdl2 = IF_LLSOCKADDR(ifp_p);
750 	sdl1->sdl_type = IFT_ETHER;
751 	sdl1->sdl_alen = ETHER_ADDR_LEN;
752 	bcopy(LLADDR(sdl2), LLADDR(sdl1), ETHER_ADDR_LEN);
753 	bcopy(LLADDR(sdl2), ifv->ifv_ac.ac_enaddr, ETHER_ADDR_LEN);
754 
755 	/*
756 	 * Release vlan's serializer before reprogramming parent's
757 	 * multicast filter to avoid possible dead lock.
758 	 */
759 	ifnet_deserialize_all(ifp);
760 
761 	/*
762 	 * Configure multicast addresses that may already be
763 	 * joined on the vlan device.
764 	 */
765 	vlan_setmulti(ifv, ifp_p);
766 
767 	/*
768 	 * Set flags on the parent, if necessary.
769 	 */
770 	vlan_setflags(ifv, ifp_p, 1);
771 
772 	/*
773 	 * Connect to parent after everything have been set up,
774 	 * so input/output could know that vlan is ready to go
775 	 */
776 	ifv->ifv_p = ifp_p;
777 	error = 0;
778 reply:
779 	lwkt_replymsg(&vmsg->base.lmsg, error);
780 }
781 
782 static int
783 vlan_config(struct ifvlan *ifv, const char *parent_name, uint16_t vlantag)
784 {
785 	struct netmsg_vlan vmsg;
786 
787 	ASSERT_IFNET_NOT_SERIALIZED_ALL(&ifv->ifv_if);
788 
789 	bzero(&vmsg, sizeof(vmsg));
790 
791 	netmsg_init(&vmsg.base, NULL, &curthread->td_msgport,
792 		    0, vlan_config_dispatch);
793 	vmsg.nv_ifv = ifv;
794 	vmsg.nv_parent_name = parent_name;
795 	vmsg.nv_vlantag = vlantag;
796 
797 	return lwkt_domsg(netisr_cpuport(0), &vmsg.base.lmsg, 0);
798 }
799 
800 static void
801 vlan_unlink_dispatch(netmsg_t msg)
802 {
803 	struct netmsg_vlan *vmsg = (struct netmsg_vlan *)msg;
804 	struct ifvlan *ifv = vmsg->nv_ifv;
805 	struct vlan_entry *entry;
806 	int cpu = mycpuid;
807 
808 	KASSERT(vmsg->nv_ifp_p->if_vlantrunks != NULL,
809 		("vlan trunk has not been initialized yet"));
810 	entry = &ifv->ifv_entries[cpu];
811 
812 	crit_enter();
813 	LIST_REMOVE(entry, ifv_link);
814 	crit_exit();
815 
816 	netisr_forwardmsg(&vmsg->base, cpu + 1);
817 }
818 
819 static void
820 vlan_unlink(struct ifvlan *ifv, struct ifnet *ifp_p)
821 {
822 	struct vlan_trunk *vlantrunks = ifp_p->if_vlantrunks;
823 	struct netmsg_vlan vmsg;
824 
825 	/* Assert in netisr0 */
826 	ASSERT_IFNET_NOT_SERIALIZED_ALL(&ifv->ifv_if);
827 
828 	KASSERT(ifp_p->if_vlantrunks != NULL,
829 		("vlan trunk has not been initialized yet"));
830 
831 	bzero(&vmsg, sizeof(vmsg));
832 
833 	netmsg_init(&vmsg.base, NULL, &curthread->td_msgport,
834 		    0, vlan_unlink_dispatch);
835 	vmsg.nv_ifv = ifv;
836 	vmsg.nv_ifp_p = ifp_p;
837 
838 	netisr_domsg(&vmsg.base, 0);
839 
840 	crit_enter();
841 	if (LIST_EMPTY(&vlantrunks[mycpuid].vlan_list)) {
842 		ifp_p->if_vlantrunks = NULL;
843 
844 		/*
845 		 * Make sure that all protocol threads see if_vlantrunks change.
846 		 */
847 		netmsg_service_sync();
848 		kfree(vlantrunks, M_VLAN);
849 	}
850 	crit_exit();
851 }
852 
853 static void
854 vlan_unconfig_dispatch(netmsg_t msg)
855 {
856 	struct netmsg_vlan *vmsg = (struct netmsg_vlan *)msg;
857 	struct sockaddr_dl *sdl;
858 	struct ifvlan *ifv;
859 	struct ifnet *ifp_p, *ifp;
860 	int error;
861 
862 	/* Assert in netisr0 */
863 
864 	ifv = vmsg->nv_ifv;
865 	ifp = &ifv->ifv_if;
866 
867 	if (ifp->if_flags & IFF_UP)
868 		if_down(ifp);
869 
870 	ifnet_serialize_all(ifp);
871 
872 	ifp->if_flags &= ~IFF_RUNNING;
873 
874 	/*
875 	 * Save parent ifnet pointer and disconnect from parent.
876 	 *
877 	 * This is done early in this function, so input/output could
878 	 * know that we are disconnecting.
879 	 */
880 	ifp_p = ifv->ifv_p;
881 	ifv->ifv_p = NULL;
882 
883 	/*
884 	 * Release vlan's serializer before reprogramming parent's
885 	 * multicast filter to avoid possible dead lock.
886 	 */
887 	ifnet_deserialize_all(ifp);
888 
889 	if (ifp_p) {
890 		/*
891 		 * Since the interface is being unconfigured, we need to
892 		 * empty the list of multicast groups that we may have joined
893 		 * while we were alive from the parent's list.
894 		 */
895 		vlan_clrmulti(ifv, ifp_p);
896 
897 		/* Clear parent's flags which was set by us. */
898 		vlan_setflags(ifv, ifp_p, 0);
899 	}
900 
901 	ifnet_serialize_all(ifp);
902 
903 	ifp->if_mtu = ETHERMTU;
904 
905 	/* Clear our MAC address. */
906 	sdl = IF_LLSOCKADDR(ifp);
907 	sdl->sdl_type = IFT_ETHER;
908 	sdl->sdl_alen = ETHER_ADDR_LEN;
909 	bzero(LLADDR(sdl), ETHER_ADDR_LEN);
910 	bzero(ifv->ifv_ac.ac_enaddr, ETHER_ADDR_LEN);
911 
912 	ifnet_deserialize_all(ifp);
913 
914 	/* Unlink vlan from parent's vlantrunk */
915 	if (ifp_p != NULL && ifp_p->if_vlantrunks != NULL)
916 		vlan_unlink(ifv, ifp_p);
917 
918 	error = 0;
919 	lwkt_replymsg(&vmsg->base.lmsg, error);
920 }
921 
922 static int
923 vlan_unconfig(struct ifvlan *ifv)
924 {
925 	struct netmsg_vlan vmsg;
926 
927 	ASSERT_IFNET_NOT_SERIALIZED_ALL(&ifv->ifv_if);
928 
929 	bzero(&vmsg, sizeof(vmsg));
930 
931 	netmsg_init(&vmsg.base, NULL, &curthread->td_msgport,
932 		    0, vlan_unconfig_dispatch);
933 	vmsg.nv_ifv = ifv;
934 
935 	return lwkt_domsg(netisr_cpuport(0), &vmsg.base.lmsg, 0);
936 }
937 
938 static int
939 vlan_ioctl(struct ifnet *ifp, u_long cmd, caddr_t data, struct ucred *cr)
940 {
941 	struct ifvlan *ifv = ifp->if_softc;
942 	struct ifreq *ifr = (struct ifreq *)data;
943 	struct ifnet *ifp_p;
944 	struct vlanreq vlr;
945 	int error = 0;
946 
947 	ASSERT_IFNET_SERIALIZED_ALL(ifp);
948 
949 	switch (cmd) {
950 	case SIOCGIFMEDIA:
951 		ifp_p = ifv->ifv_p;
952 		if (ifp_p != NULL) {
953 			/*
954 			 * Release vlan interface's serializer to void
955 			 * possible dead lock.
956 			 */
957 			ifnet_deserialize_all(ifp);
958 
959 			ifnet_serialize_all(ifp_p);
960 			error = ifp_p->if_ioctl(ifp_p, SIOCGIFMEDIA, data, cr);
961 			ifnet_deserialize_all(ifp_p);
962 
963 			ifnet_serialize_all(ifp);
964 
965 			if (ifv->ifv_p == NULL || ifv->ifv_p != ifp_p) {
966 				/*
967 				 * We are disconnected from the original
968 				 * parent interface or the parent interface
969 				 * is changed, after vlan interface's
970 				 * serializer is released.
971 				 */
972 				error = EINVAL;
973 			}
974 
975 			/* Limit the result to the parent's current config. */
976 			if (error == 0) {
977 				struct ifmediareq *ifmr;
978 
979 				ifmr = (struct ifmediareq *) data;
980 				if (ifmr->ifm_count >= 1 && ifmr->ifm_ulist) {
981 					ifmr->ifm_count = 1;
982 					error = copyout(&ifmr->ifm_current,
983 						ifmr->ifm_ulist,
984 						sizeof(int));
985 				}
986 			}
987 		} else {
988 			error = EINVAL;
989 		}
990 		break;
991 
992 	case SIOCSIFMEDIA:
993 		error = EINVAL;
994 		break;
995 
996 	case SIOCSETVLAN:
997 		error = copyin(ifr->ifr_data, &vlr, sizeof vlr);
998 		if (error)
999 			break;
1000 
1001 		ifnet_deserialize_all(ifp);
1002 		if (vlr.vlr_parent[0] == '\0')
1003 			error = vlan_unconfig(ifv);
1004 		else
1005 			error = vlan_config(ifv, vlr.vlr_parent, vlr.vlr_tag);
1006 		ifnet_serialize_all(ifp);
1007 		break;
1008 
1009 	case SIOCGETVLAN:
1010 		bzero(&vlr, sizeof(vlr));
1011 		if (ifv->ifv_p) {
1012 			strlcpy(vlr.vlr_parent, ifv->ifv_p->if_xname,
1013 			    sizeof(vlr.vlr_parent));
1014 			vlr.vlr_tag = ifv->ifv_tag;
1015 		}
1016 		error = copyout(&vlr, ifr->ifr_data, sizeof vlr);
1017 		break;
1018 
1019 	case SIOCSIFFLAGS:
1020 		if (ifp->if_flags & IFF_UP)
1021 			ifp->if_init(ifp);
1022 		else
1023 			ifp->if_flags &= ~IFF_RUNNING;
1024 
1025 		/*
1026 		 * We should propagate selected flags to the parent,
1027 		 * e.g., promiscuous mode.
1028 		 */
1029 		ifnet_deserialize_all(ifp);
1030 		error = vlan_config_flags(ifv);
1031 		ifnet_serialize_all(ifp);
1032 		break;
1033 
1034 	case SIOCADDMULTI:
1035 	case SIOCDELMULTI:
1036 		ifnet_deserialize_all(ifp);
1037 		error = vlan_config_multi(ifv);
1038 		ifnet_serialize_all(ifp);
1039 		break;
1040 
1041 	default:
1042 		error = ether_ioctl(ifp, cmd, data);
1043 		break;
1044 	}
1045 	return error;
1046 }
1047 
1048 static void
1049 vlan_multi_dispatch(netmsg_t msg)
1050 {
1051 	struct netmsg_vlan *vmsg = (struct netmsg_vlan *)msg;
1052 	struct ifvlan *ifv = vmsg->nv_ifv;
1053 	int error = 0;
1054 
1055 	/*
1056 	 * If we don't have a parent, just remember the membership for
1057 	 * when we do.
1058 	 */
1059 	if (ifv->ifv_p != NULL)
1060 		error = vlan_setmulti(ifv, ifv->ifv_p);
1061 	lwkt_replymsg(&vmsg->base.lmsg, error);
1062 }
1063 
1064 static int
1065 vlan_config_multi(struct ifvlan *ifv)
1066 {
1067 	struct netmsg_vlan vmsg;
1068 
1069 	ASSERT_IFNET_NOT_SERIALIZED_ALL(&ifv->ifv_if);
1070 
1071 	bzero(&vmsg, sizeof(vmsg));
1072 
1073 	netmsg_init(&vmsg.base, NULL, &curthread->td_msgport,
1074 		    0, vlan_multi_dispatch);
1075 	vmsg.nv_ifv = ifv;
1076 
1077 	return lwkt_domsg(netisr_cpuport(0), &vmsg.base.lmsg, 0);
1078 }
1079 
1080 static void
1081 vlan_flags_dispatch(netmsg_t msg)
1082 {
1083 	struct netmsg_vlan *vmsg = (struct netmsg_vlan *)msg;
1084 	struct ifvlan *ifv = vmsg->nv_ifv;
1085 	int error = 0;
1086 
1087 	/*
1088 	 * If we don't have a parent, just remember the flags for
1089 	 * when we do.
1090 	 */
1091 	if (ifv->ifv_p != NULL)
1092 		error = vlan_setflags(ifv, ifv->ifv_p, 1);
1093 	lwkt_replymsg(&vmsg->base.lmsg, error);
1094 }
1095 
1096 static int
1097 vlan_config_flags(struct ifvlan *ifv)
1098 {
1099 	struct netmsg_vlan vmsg;
1100 
1101 	ASSERT_IFNET_NOT_SERIALIZED_ALL(&ifv->ifv_if);
1102 
1103 	bzero(&vmsg, sizeof(vmsg));
1104 
1105 	netmsg_init(&vmsg.base, NULL, &curthread->td_msgport,
1106 		    0, vlan_flags_dispatch);
1107 	vmsg.nv_ifv = ifv;
1108 
1109 	return lwkt_domsg(netisr_cpuport(0), &vmsg.base.lmsg, 0);
1110 }
1111