2 * SPDX-License-Identifier: BSD-3-Clause
4 * Copyright (c) 1980, 1986, 1993
5 * The Regents of the University of California. All rights reserved.
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the University nor the names of its contributors
16 * may be used to endorse or promote products derived from this software
17 * without specific prior written permission.
19 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * @(#)if.c 8.5 (Berkeley) 1/9/95
35 #include "opt_inet6.h"
38 #include <sys/param.h>
40 #include <sys/eventhandler.h>
41 #include <sys/malloc.h>
42 #include <sys/domainset.h>
45 #include <sys/epoch.h>
47 #include <sys/systm.h>
50 #include <sys/socket.h>
51 #include <sys/socketvar.h>
52 #include <sys/protosw.h>
53 #include <sys/kernel.h>
55 #include <sys/refcount.h>
56 #include <sys/module.h>
57 #include <sys/rwlock.h>
58 #include <sys/sockio.h>
59 #include <sys/syslog.h>
60 #include <sys/sysctl.h>
61 #include <sys/sysent.h>
62 #include <sys/taskqueue.h>
63 #include <sys/domain.h>
67 #include <machine/stdarg.h>
71 #include <net/ethernet.h>
73 #include <net/if_arp.h>
74 #include <net/if_clone.h>
75 #include <net/if_dl.h>
76 #include <net/if_types.h>
77 #include <net/if_var.h>
78 #include <net/if_media.h>
79 #include <net/if_vlan_var.h>
80 #include <net/radix.h>
81 #include <net/route.h>
84 #if defined(INET) || defined(INET6)
85 #include <net/ethernet.h>
86 #include <netinet/in.h>
87 #include <netinet/in_var.h>
88 #include <netinet/ip.h>
89 #include <netinet/ip_carp.h>
91 #include <netinet/if_ether.h>
92 #include <netinet/netdump/netdump.h>
95 #include <netinet6/in6_var.h>
96 #include <netinet6/in6_ifattach.h>
98 #endif /* INET || INET6 */
100 #include <security/mac/mac_framework.h>
103 * Consumers of struct ifreq such as tcpdump assume no pad between ifr_name
104 * and ifr_ifru when it is used in SIOCGIFCONF.
106 _Static_assert(sizeof(((struct ifreq *)0)->ifr_name) ==
107 offsetof(struct ifreq, ifr_ifru), "gap between ifr_name and ifr_ifru");
109 __read_mostly epoch_t net_epoch_preempt;
110 __read_mostly epoch_t net_epoch;
111 #ifdef COMPAT_FREEBSD32
112 #include <sys/mount.h>
113 #include <compat/freebsd32/freebsd32.h>
115 struct ifreq_buffer32 {
116 uint32_t length; /* (size_t) */
117 uint32_t buffer; /* (void *) */
121 * Interface request structure used for socket
122 * ioctl's. All interface ioctl's must have parameter
123 * definitions which begin with ifr_name. The
124 * remainder may be interface specific.
127 char ifr_name[IFNAMSIZ]; /* if name, e.g. "en0" */
129 struct sockaddr ifru_addr;
130 struct sockaddr ifru_dstaddr;
131 struct sockaddr ifru_broadaddr;
132 struct ifreq_buffer32 ifru_buffer;
143 u_char ifru_vlan_pcp;
146 CTASSERT(sizeof(struct ifreq) == sizeof(struct ifreq32));
147 CTASSERT(__offsetof(struct ifreq, ifr_ifru) ==
148 __offsetof(struct ifreq32, ifr_ifru));
150 struct ifgroupreq32 {
151 char ifgr_name[IFNAMSIZ];
154 char ifgru_group[IFNAMSIZ];
155 uint32_t ifgru_groups;
159 struct ifmediareq32 {
160 char ifm_name[IFNAMSIZ];
166 uint32_t ifm_ulist; /* (int *) */
168 #define SIOCGIFMEDIA32 _IOC_NEWTYPE(SIOCGIFMEDIA, struct ifmediareq32)
169 #define SIOCGIFXMEDIA32 _IOC_NEWTYPE(SIOCGIFXMEDIA, struct ifmediareq32)
171 #define _CASE_IOC_IFGROUPREQ_32(cmd) \
172 _IOC_NEWTYPE((cmd), struct ifgroupreq32): case
173 #else /* !COMPAT_FREEBSD32 */
174 #define _CASE_IOC_IFGROUPREQ_32(cmd)
175 #endif /* !COMPAT_FREEBSD32 */
177 #define CASE_IOC_IFGROUPREQ(cmd) \
178 _CASE_IOC_IFGROUPREQ_32(cmd) \
183 #ifdef COMPAT_FREEBSD32
184 struct ifreq32 ifr32;
188 union ifgroupreq_union {
189 struct ifgroupreq ifgr;
190 #ifdef COMPAT_FREEBSD32
191 struct ifgroupreq32 ifgr32;
195 SYSCTL_NODE(_net, PF_LINK, link, CTLFLAG_RW, 0, "Link layers");
196 SYSCTL_NODE(_net_link, 0, generic, CTLFLAG_RW, 0, "Generic link-management");
198 SYSCTL_INT(_net_link, OID_AUTO, ifqmaxlen, CTLFLAG_RDTUN,
199 &ifqmaxlen, 0, "max send queue size");
201 /* Log link state change events */
202 static int log_link_state_change = 1;
204 SYSCTL_INT(_net_link, OID_AUTO, log_link_state_change, CTLFLAG_RW,
205 &log_link_state_change, 0,
206 "log interface link state change events");
208 /* Log promiscuous mode change events */
209 static int log_promisc_mode_change = 1;
211 SYSCTL_INT(_net_link, OID_AUTO, log_promisc_mode_change, CTLFLAG_RDTUN,
212 &log_promisc_mode_change, 1,
213 "log promiscuous mode change events");
215 /* Interface description */
216 static unsigned int ifdescr_maxlen = 1024;
217 SYSCTL_UINT(_net, OID_AUTO, ifdescr_maxlen, CTLFLAG_RW,
219 "administrative maximum length for interface description");
221 static MALLOC_DEFINE(M_IFDESCR, "ifdescr", "ifnet descriptions");
223 /* global sx for non-critical path ifdescr */
224 static struct sx ifdescr_sx;
225 SX_SYSINIT(ifdescr_sx, &ifdescr_sx, "ifnet descr");
227 void (*ng_ether_link_state_p)(struct ifnet *ifp, int state);
228 void (*lagg_linkstate_p)(struct ifnet *ifp, int state);
229 /* These are external hooks for CARP. */
230 void (*carp_linkstate_p)(struct ifnet *ifp);
231 void (*carp_demote_adj_p)(int, char *);
232 int (*carp_master_p)(struct ifaddr *);
233 #if defined(INET) || defined(INET6)
234 int (*carp_forus_p)(struct ifnet *ifp, u_char *dhost);
235 int (*carp_output_p)(struct ifnet *ifp, struct mbuf *m,
236 const struct sockaddr *sa);
237 int (*carp_ioctl_p)(struct ifreq *, u_long, struct thread *);
238 int (*carp_attach_p)(struct ifaddr *, int);
239 void (*carp_detach_p)(struct ifaddr *, bool);
242 int (*carp_iamatch_p)(struct ifaddr *, uint8_t **);
245 struct ifaddr *(*carp_iamatch6_p)(struct ifnet *ifp, struct in6_addr *taddr6);
246 caddr_t (*carp_macmatch6_p)(struct ifnet *ifp, struct mbuf *m,
247 const struct in6_addr *taddr);
250 struct mbuf *(*tbr_dequeue_ptr)(struct ifaltq *, int) = NULL;
253 * XXX: Style; these should be sorted alphabetically, and unprototyped
254 * static functions should be prototyped. Currently they are sorted by
257 static void if_attachdomain(void *);
258 static void if_attachdomain1(struct ifnet *);
259 static int ifconf(u_long, caddr_t);
260 static void *if_grow(void);
261 static void if_input_default(struct ifnet *, struct mbuf *);
262 static int if_requestencap_default(struct ifnet *, struct if_encap_req *);
263 static void if_route(struct ifnet *, int flag, int fam);
264 static int if_setflag(struct ifnet *, int, int, int *, int);
265 static int if_transmit(struct ifnet *ifp, struct mbuf *m);
266 static void if_unroute(struct ifnet *, int flag, int fam);
267 static int if_delmulti_locked(struct ifnet *, struct ifmultiaddr *, int);
268 static void do_link_state_change(void *, int);
269 static int if_getgroup(struct ifgroupreq *, struct ifnet *);
270 static int if_getgroupmembers(struct ifgroupreq *);
271 static void if_delgroups(struct ifnet *);
272 static void if_attach_internal(struct ifnet *, int, struct if_clone *);
273 static int if_detach_internal(struct ifnet *, int, struct if_clone **);
275 static void if_vmove(struct ifnet *, struct vnet *);
280 * XXX: declare here to avoid to include many inet6 related files..
281 * should be more generalized?
283 extern void nd6_setmtu(struct ifnet *);
286 /* ipsec helper hooks */
287 VNET_DEFINE(struct hhook_head *, ipsec_hhh_in[HHOOK_IPSEC_COUNT]);
288 VNET_DEFINE(struct hhook_head *, ipsec_hhh_out[HHOOK_IPSEC_COUNT]);
290 VNET_DEFINE(int, if_index);
291 int ifqmaxlen = IFQ_MAXLEN;
292 VNET_DEFINE(struct ifnethead, ifnet); /* depend on static init XXX */
293 VNET_DEFINE(struct ifgrouphead, ifg_head);
295 VNET_DEFINE_STATIC(int, if_indexlim) = 8;
297 /* Table of ifnet by index. */
298 VNET_DEFINE(struct ifnet **, ifindex_table);
300 #define V_if_indexlim VNET(if_indexlim)
301 #define V_ifindex_table VNET(ifindex_table)
304 * The global network interface list (V_ifnet) and related state (such as
305 * if_index, if_indexlim, and ifindex_table) are protected by an sxlock and
306 * an rwlock. Either may be acquired shared to stablize the list, but both
307 * must be acquired writable to modify the list. This model allows us to
308 * both stablize the interface list during interrupt thread processing, but
309 * also to stablize it over long-running ioctls, without introducing priority
310 * inversions and deadlocks.
312 struct rwlock ifnet_rwlock;
313 RW_SYSINIT_FLAGS(ifnet_rw, &ifnet_rwlock, "ifnet_rw", RW_RECURSE);
314 struct sx ifnet_sxlock;
315 SX_SYSINIT_FLAGS(ifnet_sx, &ifnet_sxlock, "ifnet_sx", SX_RECURSE);
318 * The allocation of network interfaces is a rather non-atomic affair; we
319 * need to select an index before we are ready to expose the interface for
320 * use, so will use this pointer value to indicate reservation.
322 #define IFNET_HOLD (void *)(uintptr_t)(-1)
324 static if_com_alloc_t *if_com_alloc[256];
325 static if_com_free_t *if_com_free[256];
327 static MALLOC_DEFINE(M_IFNET, "ifnet", "interface internals");
328 MALLOC_DEFINE(M_IFADDR, "ifaddr", "interface address");
329 MALLOC_DEFINE(M_IFMADDR, "ether_multi", "link-level multicast address");
332 ifnet_byindex_locked(u_short idx)
335 if (idx > V_if_index)
337 if (V_ifindex_table[idx] == IFNET_HOLD)
339 return (V_ifindex_table[idx]);
343 ifnet_byindex(u_short idx)
347 ifp = ifnet_byindex_locked(idx);
352 ifnet_byindex_ref(u_short idx)
354 struct epoch_tracker et;
358 ifp = ifnet_byindex_locked(idx);
359 if (ifp == NULL || (ifp->if_flags & IFF_DYING)) {
369 * Allocate an ifindex array entry; return 0 on success or an error on
373 ifindex_alloc(void **old)
377 IFNET_WLOCK_ASSERT();
379 * Try to find an empty slot below V_if_index. If we fail, take the
382 for (idx = 1; idx <= V_if_index; idx++) {
383 if (V_ifindex_table[idx] == NULL)
387 /* Catch if_index overflow. */
388 if (idx >= V_if_indexlim) {
392 if (idx > V_if_index)
398 ifindex_free_locked(u_short idx)
401 IFNET_WLOCK_ASSERT();
403 V_ifindex_table[idx] = NULL;
404 while (V_if_index > 0 &&
405 V_ifindex_table[V_if_index] == NULL)
410 ifindex_free(u_short idx)
414 ifindex_free_locked(idx);
419 ifnet_setbyindex(u_short idx, struct ifnet *ifp)
422 V_ifindex_table[idx] = ifp;
426 ifaddr_byindex(u_short idx)
428 struct epoch_tracker et;
430 struct ifaddr *ifa = NULL;
433 ifp = ifnet_byindex_locked(idx);
434 if (ifp != NULL && (ifa = ifp->if_addr) != NULL)
441 * Network interface utility routines.
443 * Routines with ifa_ifwith* names take sockaddr *'s as
448 vnet_if_init(const void *unused __unused)
452 CK_STAILQ_INIT(&V_ifnet);
453 CK_STAILQ_INIT(&V_ifg_head);
455 old = if_grow(); /* create initial table */
457 epoch_wait_preempt(net_epoch_preempt);
459 vnet_if_clone_init();
461 VNET_SYSINIT(vnet_if_init, SI_SUB_INIT_IF, SI_ORDER_SECOND, vnet_if_init,
466 vnet_if_uninit(const void *unused __unused)
469 VNET_ASSERT(CK_STAILQ_EMPTY(&V_ifnet), ("%s:%d tailq &V_ifnet=%p "
470 "not empty", __func__, __LINE__, &V_ifnet));
471 VNET_ASSERT(CK_STAILQ_EMPTY(&V_ifg_head), ("%s:%d tailq &V_ifg_head=%p "
472 "not empty", __func__, __LINE__, &V_ifg_head));
474 free((caddr_t)V_ifindex_table, M_IFNET);
476 VNET_SYSUNINIT(vnet_if_uninit, SI_SUB_INIT_IF, SI_ORDER_FIRST,
477 vnet_if_uninit, NULL);
480 vnet_if_return(const void *unused __unused)
482 struct ifnet *ifp, *nifp;
484 /* Return all inherited interfaces to their parent vnets. */
485 CK_STAILQ_FOREACH_SAFE(ifp, &V_ifnet, if_link, nifp) {
486 if (ifp->if_home_vnet != ifp->if_vnet)
487 if_vmove(ifp, ifp->if_home_vnet);
490 VNET_SYSUNINIT(vnet_if_return, SI_SUB_VNET_DONE, SI_ORDER_ANY,
491 vnet_if_return, NULL);
504 IFNET_WLOCK_ASSERT();
505 oldlim = V_if_indexlim;
507 n = (oldlim << 1) * sizeof(*e);
508 e = malloc(n, M_IFNET, M_WAITOK | M_ZERO);
510 if (V_if_indexlim != oldlim) {
514 if (V_ifindex_table != NULL) {
515 memcpy((caddr_t)e, (caddr_t)V_ifindex_table, n/2);
516 old = V_ifindex_table;
524 * Allocate a struct ifnet and an index for an interface. A layer 2
525 * common structure will also be allocated if an allocation routine is
526 * registered for the passed type.
529 if_alloc_domain(u_char type, int numa_domain)
535 KASSERT(numa_domain <= IF_NODOM, ("numa_domain too large"));
536 if (numa_domain == IF_NODOM)
537 ifp = malloc(sizeof(struct ifnet), M_IFNET,
540 ifp = malloc_domainset(sizeof(struct ifnet), M_IFNET,
541 DOMAINSET_PREF(numa_domain), M_WAITOK | M_ZERO);
544 idx = ifindex_alloc(&old);
545 if (__predict_false(idx == USHRT_MAX)) {
547 epoch_wait_preempt(net_epoch_preempt);
551 ifnet_setbyindex(idx, IFNET_HOLD);
555 ifp->if_alloctype = type;
556 ifp->if_numa_domain = numa_domain;
558 ifp->if_vnet = curvnet;
560 if (if_com_alloc[type] != NULL) {
561 ifp->if_l2com = if_com_alloc[type](type, ifp);
562 if (ifp->if_l2com == NULL) {
569 IF_ADDR_LOCK_INIT(ifp);
570 TASK_INIT(&ifp->if_linktask, 0, do_link_state_change, ifp);
571 ifp->if_afdata_initialized = 0;
572 IF_AFDATA_LOCK_INIT(ifp);
573 CK_STAILQ_INIT(&ifp->if_addrhead);
574 CK_STAILQ_INIT(&ifp->if_multiaddrs);
575 CK_STAILQ_INIT(&ifp->if_groups);
579 ifq_init(&ifp->if_snd, ifp);
581 refcount_init(&ifp->if_refcount, 1); /* Index reference. */
582 for (int i = 0; i < IFCOUNTERS; i++)
583 ifp->if_counters[i] = counter_u64_alloc(M_WAITOK);
584 ifp->if_get_counter = if_get_counter_default;
585 ifp->if_pcp = IFNET_PCP_NONE;
586 ifnet_setbyindex(ifp->if_index, ifp);
591 if_alloc_dev(u_char type, device_t dev)
595 if (dev == NULL || bus_get_domain(dev, &numa_domain) != 0)
596 return (if_alloc_domain(type, IF_NODOM));
597 return (if_alloc_domain(type, numa_domain));
601 if_alloc(u_char type)
604 return (if_alloc_domain(type, IF_NODOM));
607 * Do the actual work of freeing a struct ifnet, and layer 2 common
608 * structure. This call is made when the last reference to an
609 * interface is released.
612 if_free_internal(struct ifnet *ifp)
615 KASSERT((ifp->if_flags & IFF_DYING),
616 ("if_free_internal: interface not dying"));
618 if (if_com_free[ifp->if_alloctype] != NULL)
619 if_com_free[ifp->if_alloctype](ifp->if_l2com,
623 mac_ifnet_destroy(ifp);
625 IF_AFDATA_DESTROY(ifp);
626 IF_ADDR_LOCK_DESTROY(ifp);
627 ifq_delete(&ifp->if_snd);
629 for (int i = 0; i < IFCOUNTERS; i++)
630 counter_u64_free(ifp->if_counters[i]);
632 free(ifp->if_description, M_IFDESCR);
633 free(ifp->if_hw_addr, M_IFADDR);
634 if (ifp->if_numa_domain == IF_NODOM)
637 free_domain(ifp, M_IFNET);
641 if_destroy(epoch_context_t ctx)
645 ifp = __containerof(ctx, struct ifnet, if_epoch_ctx);
646 if_free_internal(ifp);
650 * Deregister an interface and free the associated storage.
653 if_free(struct ifnet *ifp)
656 ifp->if_flags |= IFF_DYING; /* XXX: Locking */
658 CURVNET_SET_QUIET(ifp->if_vnet);
660 KASSERT(ifp == ifnet_byindex_locked(ifp->if_index),
661 ("%s: freeing unallocated ifnet", ifp->if_xname));
663 ifindex_free_locked(ifp->if_index);
666 if (refcount_release(&ifp->if_refcount))
667 epoch_call(net_epoch_preempt, &ifp->if_epoch_ctx, if_destroy);
672 * Interfaces to keep an ifnet type-stable despite the possibility of the
673 * driver calling if_free(). If there are additional references, we defer
674 * freeing the underlying data structure.
677 if_ref(struct ifnet *ifp)
680 /* We don't assert the ifnet list lock here, but arguably should. */
681 refcount_acquire(&ifp->if_refcount);
685 if_rele(struct ifnet *ifp)
688 if (!refcount_release(&ifp->if_refcount))
690 epoch_call(net_epoch_preempt, &ifp->if_epoch_ctx, if_destroy);
694 ifq_init(struct ifaltq *ifq, struct ifnet *ifp)
697 mtx_init(&ifq->ifq_mtx, ifp->if_xname, "if send queue", MTX_DEF);
699 if (ifq->ifq_maxlen == 0)
700 ifq->ifq_maxlen = ifqmaxlen;
703 ifq->altq_disc = NULL;
704 ifq->altq_flags &= ALTQF_CANTCHANGE;
705 ifq->altq_tbr = NULL;
710 ifq_delete(struct ifaltq *ifq)
712 mtx_destroy(&ifq->ifq_mtx);
716 * Perform generic interface initialization tasks and attach the interface
717 * to the list of "active" interfaces. If vmove flag is set on entry
718 * to if_attach_internal(), perform only a limited subset of initialization
719 * tasks, given that we are moving from one vnet to another an ifnet which
720 * has already been fully initialized.
722 * Note that if_detach_internal() removes group membership unconditionally
723 * even when vmove flag is set, and if_attach_internal() adds only IFG_ALL.
724 * Thus, when if_vmove() is applied to a cloned interface, group membership
725 * is lost while a cloned one always joins a group whose name is
726 * ifc->ifc_name. To recover this after if_detach_internal() and
727 * if_attach_internal(), the cloner should be specified to
728 * if_attach_internal() via ifc. If it is non-NULL, if_attach_internal()
729 * attempts to join a group whose name is ifc->ifc_name.
732 * - The decision to return void and thus require this function to
733 * succeed is questionable.
734 * - We should probably do more sanity checking. For instance we don't
735 * do anything to insure if_xname is unique or non-empty.
738 if_attach(struct ifnet *ifp)
741 if_attach_internal(ifp, 0, NULL);
745 * Compute the least common TSO limit.
748 if_hw_tsomax_common(if_t ifp, struct ifnet_hw_tsomax *pmax)
751 * 1) If there is no limit currently, take the limit from
752 * the network adapter.
754 * 2) If the network adapter has a limit below the current
757 if (pmax->tsomaxbytes == 0 || (ifp->if_hw_tsomax != 0 &&
758 ifp->if_hw_tsomax < pmax->tsomaxbytes)) {
759 pmax->tsomaxbytes = ifp->if_hw_tsomax;
761 if (pmax->tsomaxsegcount == 0 || (ifp->if_hw_tsomaxsegcount != 0 &&
762 ifp->if_hw_tsomaxsegcount < pmax->tsomaxsegcount)) {
763 pmax->tsomaxsegcount = ifp->if_hw_tsomaxsegcount;
765 if (pmax->tsomaxsegsize == 0 || (ifp->if_hw_tsomaxsegsize != 0 &&
766 ifp->if_hw_tsomaxsegsize < pmax->tsomaxsegsize)) {
767 pmax->tsomaxsegsize = ifp->if_hw_tsomaxsegsize;
772 * Update TSO limit of a network adapter.
774 * Returns zero if no change. Else non-zero.
777 if_hw_tsomax_update(if_t ifp, struct ifnet_hw_tsomax *pmax)
780 if (ifp->if_hw_tsomax != pmax->tsomaxbytes) {
781 ifp->if_hw_tsomax = pmax->tsomaxbytes;
784 if (ifp->if_hw_tsomaxsegsize != pmax->tsomaxsegsize) {
785 ifp->if_hw_tsomaxsegsize = pmax->tsomaxsegsize;
788 if (ifp->if_hw_tsomaxsegcount != pmax->tsomaxsegcount) {
789 ifp->if_hw_tsomaxsegcount = pmax->tsomaxsegcount;
796 if_attach_internal(struct ifnet *ifp, int vmove, struct if_clone *ifc)
798 unsigned socksize, ifasize;
799 int namelen, masklen;
800 struct sockaddr_dl *sdl;
803 if (ifp->if_index == 0 || ifp != ifnet_byindex(ifp->if_index))
804 panic ("%s: BUG: if_attach called without if_alloc'd input()\n",
808 ifp->if_vnet = curvnet;
809 if (ifp->if_home_vnet == NULL)
810 ifp->if_home_vnet = curvnet;
813 if_addgroup(ifp, IFG_ALL);
815 /* Restore group membership for cloned interfaces. */
816 if (vmove && ifc != NULL)
817 if_clone_addgroup(ifp, ifc);
819 getmicrotime(&ifp->if_lastchange);
820 ifp->if_epoch = time_uptime;
822 KASSERT((ifp->if_transmit == NULL && ifp->if_qflush == NULL) ||
823 (ifp->if_transmit != NULL && ifp->if_qflush != NULL),
824 ("transmit and qflush must both either be set or both be NULL"));
825 if (ifp->if_transmit == NULL) {
826 ifp->if_transmit = if_transmit;
827 ifp->if_qflush = if_qflush;
829 if (ifp->if_input == NULL)
830 ifp->if_input = if_input_default;
832 if (ifp->if_requestencap == NULL)
833 ifp->if_requestencap = if_requestencap_default;
837 mac_ifnet_create(ifp);
841 * Create a Link Level name for this device.
843 namelen = strlen(ifp->if_xname);
845 * Always save enough space for any possiable name so we
846 * can do a rename in place later.
848 masklen = offsetof(struct sockaddr_dl, sdl_data[0]) + IFNAMSIZ;
849 socksize = masklen + ifp->if_addrlen;
850 if (socksize < sizeof(*sdl))
851 socksize = sizeof(*sdl);
852 socksize = roundup2(socksize, sizeof(long));
853 ifasize = sizeof(*ifa) + 2 * socksize;
854 ifa = ifa_alloc(ifasize, M_WAITOK);
855 sdl = (struct sockaddr_dl *)(ifa + 1);
856 sdl->sdl_len = socksize;
857 sdl->sdl_family = AF_LINK;
858 bcopy(ifp->if_xname, sdl->sdl_data, namelen);
859 sdl->sdl_nlen = namelen;
860 sdl->sdl_index = ifp->if_index;
861 sdl->sdl_type = ifp->if_type;
864 ifa->ifa_addr = (struct sockaddr *)sdl;
865 sdl = (struct sockaddr_dl *)(socksize + (caddr_t)sdl);
866 ifa->ifa_netmask = (struct sockaddr *)sdl;
867 sdl->sdl_len = masklen;
869 sdl->sdl_data[--namelen] = 0xff;
870 CK_STAILQ_INSERT_HEAD(&ifp->if_addrhead, ifa, ifa_link);
871 /* Reliably crash if used uninitialized. */
872 ifp->if_broadcastaddr = NULL;
874 if (ifp->if_type == IFT_ETHER) {
875 ifp->if_hw_addr = malloc(ifp->if_addrlen, M_IFADDR,
879 #if defined(INET) || defined(INET6)
880 /* Use defaults for TSO, if nothing is set */
881 if (ifp->if_hw_tsomax == 0 &&
882 ifp->if_hw_tsomaxsegcount == 0 &&
883 ifp->if_hw_tsomaxsegsize == 0) {
885 * The TSO defaults needs to be such that an
886 * NFS mbuf list of 35 mbufs totalling just
887 * below 64K works and that a chain of mbufs
888 * can be defragged into at most 32 segments:
890 ifp->if_hw_tsomax = min(IP_MAXPACKET, (32 * MCLBYTES) -
891 (ETHER_HDR_LEN + ETHER_VLAN_ENCAP_LEN));
892 ifp->if_hw_tsomaxsegcount = 35;
893 ifp->if_hw_tsomaxsegsize = 2048; /* 2K */
895 /* XXX some drivers set IFCAP_TSO after ethernet attach */
896 if (ifp->if_capabilities & IFCAP_TSO) {
897 if_printf(ifp, "Using defaults for TSO: %u/%u/%u\n",
899 ifp->if_hw_tsomaxsegcount,
900 ifp->if_hw_tsomaxsegsize);
908 * Update the interface index in the link layer address
911 for (ifa = ifp->if_addr; ifa != NULL;
912 ifa = CK_STAILQ_NEXT(ifa, ifa_link)) {
913 if (ifa->ifa_addr->sa_family == AF_LINK) {
914 sdl = (struct sockaddr_dl *)ifa->ifa_addr;
915 sdl->sdl_index = ifp->if_index;
922 CK_STAILQ_INSERT_TAIL(&V_ifnet, ifp, if_link);
924 curvnet->vnet_ifcnt++;
928 if (domain_init_status >= 2)
929 if_attachdomain1(ifp);
931 EVENTHANDLER_INVOKE(ifnet_arrival_event, ifp);
932 if (IS_DEFAULT_VNET(curvnet))
933 devctl_notify("IFNET", ifp->if_xname, "ATTACH", NULL);
935 /* Announce the interface. */
936 rt_ifannouncemsg(ifp, IFAN_ARRIVAL);
940 if_epochalloc(void *dummy __unused)
943 net_epoch_preempt = epoch_alloc(EPOCH_PREEMPT);
944 net_epoch = epoch_alloc(0);
946 SYSINIT(ifepochalloc, SI_SUB_TASKQ + 1, SI_ORDER_ANY,
947 if_epochalloc, NULL);
950 if_attachdomain(void *dummy)
954 CK_STAILQ_FOREACH(ifp, &V_ifnet, if_link)
955 if_attachdomain1(ifp);
957 SYSINIT(domainifattach, SI_SUB_PROTO_IFATTACHDOMAIN, SI_ORDER_SECOND,
958 if_attachdomain, NULL);
961 if_attachdomain1(struct ifnet *ifp)
966 * Since dp->dom_ifattach calls malloc() with M_WAITOK, we
967 * cannot lock ifp->if_afdata initialization, entirely.
970 if (ifp->if_afdata_initialized >= domain_init_status) {
971 IF_AFDATA_UNLOCK(ifp);
972 log(LOG_WARNING, "%s called more than once on %s\n",
973 __func__, ifp->if_xname);
976 ifp->if_afdata_initialized = domain_init_status;
977 IF_AFDATA_UNLOCK(ifp);
979 /* address family dependent data region */
980 bzero(ifp->if_afdata, sizeof(ifp->if_afdata));
981 for (dp = domains; dp; dp = dp->dom_next) {
982 if (dp->dom_ifattach)
983 ifp->if_afdata[dp->dom_family] =
984 (*dp->dom_ifattach)(ifp);
989 * Remove any unicast or broadcast network addresses from an interface.
992 if_purgeaddrs(struct ifnet *ifp)
997 struct epoch_tracker et;
1000 CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
1001 if (ifa->ifa_addr->sa_family != AF_LINK)
1009 /* XXX: Ugly!! ad hoc just for INET */
1010 if (ifa->ifa_addr->sa_family == AF_INET) {
1011 struct ifaliasreq ifr;
1013 bzero(&ifr, sizeof(ifr));
1014 ifr.ifra_addr = *ifa->ifa_addr;
1015 if (ifa->ifa_dstaddr)
1016 ifr.ifra_broadaddr = *ifa->ifa_dstaddr;
1017 if (in_control(NULL, SIOCDIFADDR, (caddr_t)&ifr, ifp,
1023 if (ifa->ifa_addr->sa_family == AF_INET6) {
1025 /* ifp_addrhead is already updated */
1030 CK_STAILQ_REMOVE(&ifp->if_addrhead, ifa, ifaddr, ifa_link);
1031 IF_ADDR_WUNLOCK(ifp);
1037 * Remove any multicast network addresses from an interface when an ifnet
1041 if_purgemaddrs(struct ifnet *ifp)
1043 struct ifmultiaddr *ifma;
1046 while (!CK_STAILQ_EMPTY(&ifp->if_multiaddrs)) {
1047 ifma = CK_STAILQ_FIRST(&ifp->if_multiaddrs);
1048 CK_STAILQ_REMOVE(&ifp->if_multiaddrs, ifma, ifmultiaddr, ifma_link);
1049 if_delmulti_locked(ifp, ifma, 1);
1051 IF_ADDR_WUNLOCK(ifp);
1055 * Detach an interface, removing it from the list of "active" interfaces.
1056 * If vmove flag is set on entry to if_detach_internal(), perform only a
1057 * limited subset of cleanup tasks, given that we are moving an ifnet from
1058 * one vnet to another, where it must be fully operational.
1060 * XXXRW: There are some significant questions about event ordering, and
1061 * how to prevent things from starting to use the interface during detach.
1064 if_detach(struct ifnet *ifp)
1067 CURVNET_SET_QUIET(ifp->if_vnet);
1068 if_detach_internal(ifp, 0, NULL);
1073 * The vmove flag, if set, indicates that we are called from a callpath
1074 * that is moving an interface to a different vnet instance.
1076 * The shutdown flag, if set, indicates that we are called in the
1077 * process of shutting down a vnet instance. Currently only the
1078 * vnet_if_return SYSUNINIT function sets it. Note: we can be called
1079 * on a vnet instance shutdown without this flag being set, e.g., when
1080 * the cloned interfaces are destoyed as first thing of teardown.
1083 if_detach_internal(struct ifnet *ifp, int vmove, struct if_clone **ifcp)
1093 shutdown = (ifp->if_vnet->vnet_state > SI_SUB_VNET &&
1094 ifp->if_vnet->vnet_state < SI_SUB_VNET_DONE) ? 1 : 0;
1097 CK_STAILQ_FOREACH(iter, &V_ifnet, if_link)
1099 CK_STAILQ_REMOVE(&V_ifnet, ifp, ifnet, if_link);
1101 ifp->if_flags |= IFF_DYING;
1108 * While we would want to panic here, we cannot
1109 * guarantee that the interface is indeed still on
1110 * the list given we don't hold locks all the way.
1115 panic("%s: ifp=%p not on the ifnet tailq %p",
1116 __func__, ifp, &V_ifnet);
1118 return; /* XXX this should panic as well? */
1123 * At this point we know the interface still was on the ifnet list
1124 * and we removed it so we are in a stable state.
1127 curvnet->vnet_ifcnt--;
1129 epoch_wait_preempt(net_epoch_preempt);
1132 * Ensure all pending EPOCH(9) callbacks have been executed. This
1133 * fixes issues about late destruction of multicast options
1134 * which lead to leave group calls, which in turn access the
1135 * belonging ifnet structure:
1137 epoch_drain_callbacks(net_epoch_preempt);
1140 * In any case (destroy or vmove) detach us from the groups
1141 * and remove/wait for pending events on the taskq.
1142 * XXX-BZ in theory an interface could still enqueue a taskq change?
1146 taskqueue_drain(taskqueue_swi, &ifp->if_linktask);
1149 * Check if this is a cloned interface or not. Must do even if
1150 * shutting down as a if_vmove_reclaim() would move the ifp and
1151 * the if_clone_addgroup() will have a corrupted string overwise
1152 * from a gibberish pointer.
1154 if (vmove && ifcp != NULL)
1155 *ifcp = if_clone_findifc(ifp);
1161 * On VNET shutdown abort here as the stack teardown will do all
1162 * the work top-down for us.
1165 /* Give interface users the chance to clean up. */
1166 EVENTHANDLER_INVOKE(ifnet_departure_event, ifp);
1169 * In case of a vmove we are done here without error.
1170 * If we would signal an error it would lead to the same
1171 * abort as if we did not find the ifnet anymore.
1172 * if_detach() calls us in void context and does not care
1173 * about an early abort notification, so life is splendid :)
1175 goto finish_vnet_shutdown;
1180 * At this point we are not tearing down a VNET and are either
1181 * going to destroy or vmove the interface and have to cleanup
1186 * Remove routes and flush queues.
1189 if (ALTQ_IS_ENABLED(&ifp->if_snd))
1190 altq_disable(&ifp->if_snd);
1191 if (ALTQ_IS_ATTACHED(&ifp->if_snd))
1192 altq_detach(&ifp->if_snd);
1203 * Remove all IPv6 kernel structs related to ifp. This should be done
1204 * before removing routing entries below, since IPv6 interface direct
1205 * routes are expected to be removed by the IPv6-specific kernel API.
1206 * Otherwise, the kernel will detect some inconsistency and bark it.
1210 if_purgemaddrs(ifp);
1212 /* Announce that the interface is gone. */
1213 rt_ifannouncemsg(ifp, IFAN_DEPARTURE);
1214 EVENTHANDLER_INVOKE(ifnet_departure_event, ifp);
1215 if (IS_DEFAULT_VNET(curvnet))
1216 devctl_notify("IFNET", ifp->if_xname, "DETACH", NULL);
1220 * Prevent further calls into the device driver via ifnet.
1225 * Clean up all addresses.
1228 if (!CK_STAILQ_EMPTY(&ifp->if_addrhead)) {
1229 ifa = CK_STAILQ_FIRST(&ifp->if_addrhead);
1230 CK_STAILQ_REMOVE(&ifp->if_addrhead, ifa, ifaddr, ifa_link);
1231 IF_ADDR_WUNLOCK(ifp);
1234 IF_ADDR_WUNLOCK(ifp);
1237 rt_flushifroutes(ifp);
1240 finish_vnet_shutdown:
1243 * We cannot hold the lock over dom_ifdetach calls as they might
1244 * sleep, for example trying to drain a callout, thus open up the
1245 * theoretical race with re-attaching.
1247 IF_AFDATA_LOCK(ifp);
1248 i = ifp->if_afdata_initialized;
1249 ifp->if_afdata_initialized = 0;
1250 IF_AFDATA_UNLOCK(ifp);
1251 for (dp = domains; i > 0 && dp; dp = dp->dom_next) {
1252 if (dp->dom_ifdetach && ifp->if_afdata[dp->dom_family]) {
1253 (*dp->dom_ifdetach)(ifp,
1254 ifp->if_afdata[dp->dom_family]);
1255 ifp->if_afdata[dp->dom_family] = NULL;
1264 * if_vmove() performs a limited version of if_detach() in current
1265 * vnet and if_attach()es the ifnet to the vnet specified as 2nd arg.
1266 * An attempt is made to shrink if_index in current vnet, find an
1267 * unused if_index in target vnet and calls if_grow() if necessary,
1268 * and finally find an unused if_xname for the target vnet.
1271 if_vmove(struct ifnet *ifp, struct vnet *new_vnet)
1273 struct if_clone *ifc;
1274 u_int bif_dlt, bif_hdrlen;
1279 * if_detach_internal() will call the eventhandler to notify
1280 * interface departure. That will detach if_bpf. We need to
1281 * safe the dlt and hdrlen so we can re-attach it later.
1283 bpf_get_bp_params(ifp->if_bpf, &bif_dlt, &bif_hdrlen);
1286 * Detach from current vnet, but preserve LLADDR info, do not
1287 * mark as dead etc. so that the ifnet can be reattached later.
1288 * If we cannot find it, we lost the race to someone else.
1290 rc = if_detach_internal(ifp, 1, &ifc);
1295 * Unlink the ifnet from ifindex_table[] in current vnet, and shrink
1296 * the if_index for that vnet if possible.
1298 * NOTE: IFNET_WLOCK/IFNET_WUNLOCK() are assumed to be unvirtualized,
1299 * or we'd lock on one vnet and unlock on another.
1302 ifindex_free_locked(ifp->if_index);
1306 * Perform interface-specific reassignment tasks, if provided by
1309 if (ifp->if_reassign != NULL)
1310 ifp->if_reassign(ifp, new_vnet, NULL);
1313 * Switch to the context of the target vnet.
1315 CURVNET_SET_QUIET(new_vnet);
1318 ifp->if_index = ifindex_alloc(&old);
1319 if (__predict_false(ifp->if_index == USHRT_MAX)) {
1321 epoch_wait_preempt(net_epoch_preempt);
1325 ifnet_setbyindex(ifp->if_index, ifp);
1328 if_attach_internal(ifp, 1, ifc);
1330 if (ifp->if_bpf == NULL)
1331 bpfattach(ifp, bif_dlt, bif_hdrlen);
1337 * Move an ifnet to or from another child prison/vnet, specified by the jail id.
1340 if_vmove_loan(struct thread *td, struct ifnet *ifp, char *ifname, int jid)
1346 /* Try to find the prison within our visibility. */
1347 sx_slock(&allprison_lock);
1348 pr = prison_find_child(td->td_ucred->cr_prison, jid);
1349 sx_sunlock(&allprison_lock);
1352 prison_hold_locked(pr);
1353 mtx_unlock(&pr->pr_mtx);
1355 /* Do not try to move the iface from and to the same prison. */
1356 if (pr->pr_vnet == ifp->if_vnet) {
1361 /* Make sure the named iface does not exists in the dst. prison/vnet. */
1362 /* XXX Lock interfaces to avoid races. */
1363 CURVNET_SET_QUIET(pr->pr_vnet);
1364 difp = ifunit(ifname);
1371 /* Make sure the VNET is stable. */
1372 shutdown = (ifp->if_vnet->vnet_state > SI_SUB_VNET &&
1373 ifp->if_vnet->vnet_state < SI_SUB_VNET_DONE) ? 1 : 0;
1381 /* Move the interface into the child jail/vnet. */
1382 if_vmove(ifp, pr->pr_vnet);
1384 /* Report the new if_xname back to the userland. */
1385 sprintf(ifname, "%s", ifp->if_xname);
1392 if_vmove_reclaim(struct thread *td, char *ifname, int jid)
1395 struct vnet *vnet_dst;
1399 /* Try to find the prison within our visibility. */
1400 sx_slock(&allprison_lock);
1401 pr = prison_find_child(td->td_ucred->cr_prison, jid);
1402 sx_sunlock(&allprison_lock);
1405 prison_hold_locked(pr);
1406 mtx_unlock(&pr->pr_mtx);
1408 /* Make sure the named iface exists in the source prison/vnet. */
1409 CURVNET_SET(pr->pr_vnet);
1410 ifp = ifunit(ifname); /* XXX Lock to avoid races. */
1417 /* Do not try to move the iface from and to the same prison. */
1418 vnet_dst = TD_TO_VNET(td);
1419 if (vnet_dst == ifp->if_vnet) {
1425 /* Make sure the VNET is stable. */
1426 shutdown = (ifp->if_vnet->vnet_state > SI_SUB_VNET &&
1427 ifp->if_vnet->vnet_state < SI_SUB_VNET_DONE) ? 1 : 0;
1434 /* Get interface back from child jail/vnet. */
1435 if_vmove(ifp, vnet_dst);
1438 /* Report the new if_xname back to the userland. */
1439 sprintf(ifname, "%s", ifp->if_xname);
1447 * Add a group to an interface
1450 if_addgroup(struct ifnet *ifp, const char *groupname)
1452 struct ifg_list *ifgl;
1453 struct ifg_group *ifg = NULL;
1454 struct ifg_member *ifgm;
1457 if (groupname[0] && groupname[strlen(groupname) - 1] >= '0' &&
1458 groupname[strlen(groupname) - 1] <= '9')
1462 CK_STAILQ_FOREACH(ifgl, &ifp->if_groups, ifgl_next)
1463 if (!strcmp(ifgl->ifgl_group->ifg_group, groupname)) {
1468 if ((ifgl = (struct ifg_list *)malloc(sizeof(struct ifg_list), M_TEMP,
1469 M_NOWAIT)) == NULL) {
1474 if ((ifgm = (struct ifg_member *)malloc(sizeof(struct ifg_member),
1475 M_TEMP, M_NOWAIT)) == NULL) {
1481 CK_STAILQ_FOREACH(ifg, &V_ifg_head, ifg_next)
1482 if (!strcmp(ifg->ifg_group, groupname))
1486 if ((ifg = (struct ifg_group *)malloc(sizeof(struct ifg_group),
1487 M_TEMP, M_NOWAIT)) == NULL) {
1493 strlcpy(ifg->ifg_group, groupname, sizeof(ifg->ifg_group));
1494 ifg->ifg_refcnt = 0;
1495 CK_STAILQ_INIT(&ifg->ifg_members);
1496 CK_STAILQ_INSERT_TAIL(&V_ifg_head, ifg, ifg_next);
1501 ifgl->ifgl_group = ifg;
1502 ifgm->ifgm_ifp = ifp;
1505 CK_STAILQ_INSERT_TAIL(&ifg->ifg_members, ifgm, ifgm_next);
1506 CK_STAILQ_INSERT_TAIL(&ifp->if_groups, ifgl, ifgl_next);
1507 IF_ADDR_WUNLOCK(ifp);
1512 EVENTHANDLER_INVOKE(group_attach_event, ifg);
1513 EVENTHANDLER_INVOKE(group_change_event, groupname);
1519 * Remove a group from an interface
1522 if_delgroup(struct ifnet *ifp, const char *groupname)
1524 struct ifg_list *ifgl;
1525 struct ifg_member *ifgm;
1529 CK_STAILQ_FOREACH(ifgl, &ifp->if_groups, ifgl_next)
1530 if (!strcmp(ifgl->ifgl_group->ifg_group, groupname))
1539 CK_STAILQ_REMOVE(&ifp->if_groups, ifgl, ifg_list, ifgl_next);
1540 IF_ADDR_WUNLOCK(ifp);
1542 CK_STAILQ_FOREACH(ifgm, &ifgl->ifgl_group->ifg_members, ifgm_next)
1543 if (ifgm->ifgm_ifp == ifp)
1547 CK_STAILQ_REMOVE(&ifgl->ifgl_group->ifg_members, ifgm, ifg_member, ifgm_next);
1549 if (--ifgl->ifgl_group->ifg_refcnt == 0) {
1550 CK_STAILQ_REMOVE(&V_ifg_head, ifgl->ifgl_group, ifg_group, ifg_next);
1555 epoch_wait_preempt(net_epoch_preempt);
1557 EVENTHANDLER_INVOKE(group_detach_event, ifgl->ifgl_group);
1558 free(ifgl->ifgl_group, M_TEMP);
1563 EVENTHANDLER_INVOKE(group_change_event, groupname);
1569 * Remove an interface from all groups
1572 if_delgroups(struct ifnet *ifp)
1574 struct ifg_list *ifgl;
1575 struct ifg_member *ifgm;
1576 char groupname[IFNAMSIZ];
1580 while (!CK_STAILQ_EMPTY(&ifp->if_groups)) {
1581 ifgl = CK_STAILQ_FIRST(&ifp->if_groups);
1583 strlcpy(groupname, ifgl->ifgl_group->ifg_group, IFNAMSIZ);
1586 CK_STAILQ_REMOVE(&ifp->if_groups, ifgl, ifg_list, ifgl_next);
1587 IF_ADDR_WUNLOCK(ifp);
1589 CK_STAILQ_FOREACH(ifgm, &ifgl->ifgl_group->ifg_members, ifgm_next)
1590 if (ifgm->ifgm_ifp == ifp)
1594 CK_STAILQ_REMOVE(&ifgl->ifgl_group->ifg_members, ifgm, ifg_member,
1597 if (--ifgl->ifgl_group->ifg_refcnt == 0) {
1598 CK_STAILQ_REMOVE(&V_ifg_head, ifgl->ifgl_group, ifg_group, ifg_next);
1603 epoch_wait_preempt(net_epoch_preempt);
1606 EVENTHANDLER_INVOKE(group_detach_event,
1608 free(ifgl->ifgl_group, M_TEMP);
1610 EVENTHANDLER_INVOKE(group_change_event, groupname);
1618 ifgr_group_get(void *ifgrp)
1620 union ifgroupreq_union *ifgrup;
1623 #ifdef COMPAT_FREEBSD32
1624 if (SV_CURPROC_FLAG(SV_ILP32))
1625 return (&ifgrup->ifgr32.ifgr_ifgru.ifgru_group[0]);
1627 return (&ifgrup->ifgr.ifgr_ifgru.ifgru_group[0]);
1630 static struct ifg_req *
1631 ifgr_groups_get(void *ifgrp)
1633 union ifgroupreq_union *ifgrup;
1636 #ifdef COMPAT_FREEBSD32
1637 if (SV_CURPROC_FLAG(SV_ILP32))
1638 return ((struct ifg_req *)(uintptr_t)
1639 ifgrup->ifgr32.ifgr_ifgru.ifgru_groups);
1641 return (ifgrup->ifgr.ifgr_ifgru.ifgru_groups);
1645 * Stores all groups from an interface in memory pointed to by ifgr.
1648 if_getgroup(struct ifgroupreq *ifgr, struct ifnet *ifp)
1650 struct epoch_tracker et;
1652 struct ifg_list *ifgl;
1653 struct ifg_req ifgrq, *ifgp;
1655 if (ifgr->ifgr_len == 0) {
1656 NET_EPOCH_ENTER(et);
1657 CK_STAILQ_FOREACH(ifgl, &ifp->if_groups, ifgl_next)
1658 ifgr->ifgr_len += sizeof(struct ifg_req);
1663 len = ifgr->ifgr_len;
1664 ifgp = ifgr_groups_get(ifgr);
1666 NET_EPOCH_ENTER(et);
1667 CK_STAILQ_FOREACH(ifgl, &ifp->if_groups, ifgl_next) {
1668 if (len < sizeof(ifgrq)) {
1672 bzero(&ifgrq, sizeof ifgrq);
1673 strlcpy(ifgrq.ifgrq_group, ifgl->ifgl_group->ifg_group,
1674 sizeof(ifgrq.ifgrq_group));
1675 if ((error = copyout(&ifgrq, ifgp, sizeof(struct ifg_req)))) {
1679 len -= sizeof(ifgrq);
1688 * Stores all members of a group in memory pointed to by igfr
1691 if_getgroupmembers(struct ifgroupreq *ifgr)
1693 struct ifg_group *ifg;
1694 struct ifg_member *ifgm;
1695 struct ifg_req ifgrq, *ifgp;
1699 CK_STAILQ_FOREACH(ifg, &V_ifg_head, ifg_next)
1700 if (!strcmp(ifg->ifg_group, ifgr->ifgr_name))
1707 if (ifgr->ifgr_len == 0) {
1708 CK_STAILQ_FOREACH(ifgm, &ifg->ifg_members, ifgm_next)
1709 ifgr->ifgr_len += sizeof(ifgrq);
1714 len = ifgr->ifgr_len;
1715 ifgp = ifgr_groups_get(ifgr);
1716 CK_STAILQ_FOREACH(ifgm, &ifg->ifg_members, ifgm_next) {
1717 if (len < sizeof(ifgrq)) {
1721 bzero(&ifgrq, sizeof ifgrq);
1722 strlcpy(ifgrq.ifgrq_member, ifgm->ifgm_ifp->if_xname,
1723 sizeof(ifgrq.ifgrq_member));
1724 if ((error = copyout(&ifgrq, ifgp, sizeof(struct ifg_req)))) {
1728 len -= sizeof(ifgrq);
1737 * Return counter values from counter(9)s stored in ifnet.
1740 if_get_counter_default(struct ifnet *ifp, ift_counter cnt)
1743 KASSERT(cnt < IFCOUNTERS, ("%s: invalid cnt %d", __func__, cnt));
1745 return (counter_u64_fetch(ifp->if_counters[cnt]));
1749 * Increase an ifnet counter. Usually used for counters shared
1750 * between the stack and a driver, but function supports them all.
1753 if_inc_counter(struct ifnet *ifp, ift_counter cnt, int64_t inc)
1756 KASSERT(cnt < IFCOUNTERS, ("%s: invalid cnt %d", __func__, cnt));
1758 counter_u64_add(ifp->if_counters[cnt], inc);
1762 * Copy data from ifnet to userland API structure if_data.
1765 if_data_copy(struct ifnet *ifp, struct if_data *ifd)
1768 ifd->ifi_type = ifp->if_type;
1769 ifd->ifi_physical = 0;
1770 ifd->ifi_addrlen = ifp->if_addrlen;
1771 ifd->ifi_hdrlen = ifp->if_hdrlen;
1772 ifd->ifi_link_state = ifp->if_link_state;
1774 ifd->ifi_datalen = sizeof(struct if_data);
1775 ifd->ifi_mtu = ifp->if_mtu;
1776 ifd->ifi_metric = ifp->if_metric;
1777 ifd->ifi_baudrate = ifp->if_baudrate;
1778 ifd->ifi_hwassist = ifp->if_hwassist;
1779 ifd->ifi_epoch = ifp->if_epoch;
1780 ifd->ifi_lastchange = ifp->if_lastchange;
1782 ifd->ifi_ipackets = ifp->if_get_counter(ifp, IFCOUNTER_IPACKETS);
1783 ifd->ifi_ierrors = ifp->if_get_counter(ifp, IFCOUNTER_IERRORS);
1784 ifd->ifi_opackets = ifp->if_get_counter(ifp, IFCOUNTER_OPACKETS);
1785 ifd->ifi_oerrors = ifp->if_get_counter(ifp, IFCOUNTER_OERRORS);
1786 ifd->ifi_collisions = ifp->if_get_counter(ifp, IFCOUNTER_COLLISIONS);
1787 ifd->ifi_ibytes = ifp->if_get_counter(ifp, IFCOUNTER_IBYTES);
1788 ifd->ifi_obytes = ifp->if_get_counter(ifp, IFCOUNTER_OBYTES);
1789 ifd->ifi_imcasts = ifp->if_get_counter(ifp, IFCOUNTER_IMCASTS);
1790 ifd->ifi_omcasts = ifp->if_get_counter(ifp, IFCOUNTER_OMCASTS);
1791 ifd->ifi_iqdrops = ifp->if_get_counter(ifp, IFCOUNTER_IQDROPS);
1792 ifd->ifi_oqdrops = ifp->if_get_counter(ifp, IFCOUNTER_OQDROPS);
1793 ifd->ifi_noproto = ifp->if_get_counter(ifp, IFCOUNTER_NOPROTO);
1797 * Wrapper functions for struct ifnet address list locking macros. These are
1798 * used by kernel modules to avoid encoding programming interface or binary
1799 * interface assumptions that may be violated when kernel-internal locking
1800 * approaches change.
1803 if_addr_rlock(struct ifnet *ifp)
1806 epoch_enter_preempt(net_epoch_preempt, curthread->td_et);
1810 if_addr_runlock(struct ifnet *ifp)
1813 epoch_exit_preempt(net_epoch_preempt, curthread->td_et);
1817 if_maddr_rlock(if_t ifp)
1820 epoch_enter_preempt(net_epoch_preempt, curthread->td_et);
1824 if_maddr_runlock(if_t ifp)
1827 epoch_exit_preempt(net_epoch_preempt, curthread->td_et);
1831 * Initialization, destruction and refcounting functions for ifaddrs.
1834 ifa_alloc(size_t size, int flags)
1838 KASSERT(size >= sizeof(struct ifaddr),
1839 ("%s: invalid size %zu", __func__, size));
1841 ifa = malloc(size, M_IFADDR, M_ZERO | flags);
1845 if ((ifa->ifa_opackets = counter_u64_alloc(flags)) == NULL)
1847 if ((ifa->ifa_ipackets = counter_u64_alloc(flags)) == NULL)
1849 if ((ifa->ifa_obytes = counter_u64_alloc(flags)) == NULL)
1851 if ((ifa->ifa_ibytes = counter_u64_alloc(flags)) == NULL)
1854 refcount_init(&ifa->ifa_refcnt, 1);
1859 /* free(NULL) is okay */
1860 counter_u64_free(ifa->ifa_opackets);
1861 counter_u64_free(ifa->ifa_ipackets);
1862 counter_u64_free(ifa->ifa_obytes);
1863 counter_u64_free(ifa->ifa_ibytes);
1864 free(ifa, M_IFADDR);
1870 ifa_ref(struct ifaddr *ifa)
1873 refcount_acquire(&ifa->ifa_refcnt);
1877 ifa_destroy(epoch_context_t ctx)
1881 ifa = __containerof(ctx, struct ifaddr, ifa_epoch_ctx);
1882 counter_u64_free(ifa->ifa_opackets);
1883 counter_u64_free(ifa->ifa_ipackets);
1884 counter_u64_free(ifa->ifa_obytes);
1885 counter_u64_free(ifa->ifa_ibytes);
1886 free(ifa, M_IFADDR);
1890 ifa_free(struct ifaddr *ifa)
1893 if (refcount_release(&ifa->ifa_refcnt))
1894 epoch_call(net_epoch_preempt, &ifa->ifa_epoch_ctx, ifa_destroy);
1899 ifa_maintain_loopback_route(int cmd, const char *otype, struct ifaddr *ifa,
1900 struct sockaddr *ia)
1902 struct epoch_tracker et;
1904 struct rt_addrinfo info;
1905 struct sockaddr_dl null_sdl;
1910 bzero(&info, sizeof(info));
1911 if (cmd != RTM_DELETE)
1912 info.rti_ifp = V_loif;
1913 if (cmd == RTM_ADD) {
1914 /* explicitly specify (loopback) ifa */
1915 if (info.rti_ifp != NULL) {
1916 NET_EPOCH_ENTER(et);
1917 info.rti_ifa = ifaof_ifpforaddr(ifa->ifa_addr, info.rti_ifp);
1918 if (info.rti_ifa != NULL)
1919 ifa_ref(info.rti_ifa);
1923 info.rti_flags = ifa->ifa_flags | RTF_HOST | RTF_STATIC | RTF_PINNED;
1924 info.rti_info[RTAX_DST] = ia;
1925 info.rti_info[RTAX_GATEWAY] = (struct sockaddr *)&null_sdl;
1926 link_init_sdl(ifp, (struct sockaddr *)&null_sdl, ifp->if_type);
1928 error = rtrequest1_fib(cmd, &info, NULL, ifp->if_fib);
1931 !(cmd == RTM_ADD && error == EEXIST) &&
1932 !(cmd == RTM_DELETE && error == ENOENT))
1933 if_printf(ifp, "%s failed: %d\n", otype, error);
1939 ifa_add_loopback_route(struct ifaddr *ifa, struct sockaddr *ia)
1942 return (ifa_maintain_loopback_route(RTM_ADD, "insertion", ifa, ia));
1946 ifa_del_loopback_route(struct ifaddr *ifa, struct sockaddr *ia)
1949 return (ifa_maintain_loopback_route(RTM_DELETE, "deletion", ifa, ia));
1953 ifa_switch_loopback_route(struct ifaddr *ifa, struct sockaddr *ia)
1956 return (ifa_maintain_loopback_route(RTM_CHANGE, "switch", ifa, ia));
1960 * XXX: Because sockaddr_dl has deeper structure than the sockaddr
1961 * structs used to represent other address families, it is necessary
1962 * to perform a different comparison.
1965 #define sa_dl_equal(a1, a2) \
1966 ((((const struct sockaddr_dl *)(a1))->sdl_len == \
1967 ((const struct sockaddr_dl *)(a2))->sdl_len) && \
1968 (bcmp(CLLADDR((const struct sockaddr_dl *)(a1)), \
1969 CLLADDR((const struct sockaddr_dl *)(a2)), \
1970 ((const struct sockaddr_dl *)(a1))->sdl_alen) == 0))
1973 * Locate an interface based on a complete address.
1977 ifa_ifwithaddr(const struct sockaddr *addr)
1982 MPASS(in_epoch(net_epoch_preempt));
1983 CK_STAILQ_FOREACH(ifp, &V_ifnet, if_link) {
1984 CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
1985 if (ifa->ifa_addr->sa_family != addr->sa_family)
1987 if (sa_equal(addr, ifa->ifa_addr)) {
1990 /* IP6 doesn't have broadcast */
1991 if ((ifp->if_flags & IFF_BROADCAST) &&
1992 ifa->ifa_broadaddr &&
1993 ifa->ifa_broadaddr->sa_len != 0 &&
1994 sa_equal(ifa->ifa_broadaddr, addr)) {
2005 ifa_ifwithaddr_check(const struct sockaddr *addr)
2007 struct epoch_tracker et;
2010 NET_EPOCH_ENTER(et);
2011 rc = (ifa_ifwithaddr(addr) != NULL);
2017 * Locate an interface based on the broadcast address.
2021 ifa_ifwithbroadaddr(const struct sockaddr *addr, int fibnum)
2026 MPASS(in_epoch(net_epoch_preempt));
2027 CK_STAILQ_FOREACH(ifp, &V_ifnet, if_link) {
2028 if ((fibnum != RT_ALL_FIBS) && (ifp->if_fib != fibnum))
2030 CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
2031 if (ifa->ifa_addr->sa_family != addr->sa_family)
2033 if ((ifp->if_flags & IFF_BROADCAST) &&
2034 ifa->ifa_broadaddr &&
2035 ifa->ifa_broadaddr->sa_len != 0 &&
2036 sa_equal(ifa->ifa_broadaddr, addr)) {
2047 * Locate the point to point interface with a given destination address.
2051 ifa_ifwithdstaddr(const struct sockaddr *addr, int fibnum)
2056 MPASS(in_epoch(net_epoch_preempt));
2057 CK_STAILQ_FOREACH(ifp, &V_ifnet, if_link) {
2058 if ((ifp->if_flags & IFF_POINTOPOINT) == 0)
2060 if ((fibnum != RT_ALL_FIBS) && (ifp->if_fib != fibnum))
2062 CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
2063 if (ifa->ifa_addr->sa_family != addr->sa_family)
2065 if (ifa->ifa_dstaddr != NULL &&
2066 sa_equal(addr, ifa->ifa_dstaddr)) {
2077 * Find an interface on a specific network. If many, choice
2078 * is most specific found.
2081 ifa_ifwithnet(const struct sockaddr *addr, int ignore_ptp, int fibnum)
2085 struct ifaddr *ifa_maybe = NULL;
2086 u_int af = addr->sa_family;
2087 const char *addr_data = addr->sa_data, *cplim;
2089 MPASS(in_epoch(net_epoch_preempt));
2091 * AF_LINK addresses can be looked up directly by their index number,
2092 * so do that if we can.
2094 if (af == AF_LINK) {
2095 const struct sockaddr_dl *sdl = (const struct sockaddr_dl *)addr;
2096 if (sdl->sdl_index && sdl->sdl_index <= V_if_index)
2097 return (ifaddr_byindex(sdl->sdl_index));
2101 * Scan though each interface, looking for ones that have addresses
2102 * in this address family and the requested fib.
2104 CK_STAILQ_FOREACH(ifp, &V_ifnet, if_link) {
2105 if ((fibnum != RT_ALL_FIBS) && (ifp->if_fib != fibnum))
2107 CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
2108 const char *cp, *cp2, *cp3;
2110 if (ifa->ifa_addr->sa_family != af)
2112 if (af == AF_INET &&
2113 ifp->if_flags & IFF_POINTOPOINT && !ignore_ptp) {
2115 * This is a bit broken as it doesn't
2116 * take into account that the remote end may
2117 * be a single node in the network we are
2119 * The trouble is that we don't know the
2120 * netmask for the remote end.
2122 if (ifa->ifa_dstaddr != NULL &&
2123 sa_equal(addr, ifa->ifa_dstaddr)) {
2128 * Scan all the bits in the ifa's address.
2129 * If a bit dissagrees with what we are
2130 * looking for, mask it with the netmask
2131 * to see if it really matters.
2132 * (A byte at a time)
2134 if (ifa->ifa_netmask == 0)
2137 cp2 = ifa->ifa_addr->sa_data;
2138 cp3 = ifa->ifa_netmask->sa_data;
2139 cplim = ifa->ifa_netmask->sa_len
2140 + (char *)ifa->ifa_netmask;
2142 if ((*cp++ ^ *cp2++) & *cp3++)
2143 goto next; /* next address! */
2145 * If the netmask of what we just found
2146 * is more specific than what we had before
2147 * (if we had one), or if the virtual status
2148 * of new prefix is better than of the old one,
2149 * then remember the new one before continuing
2150 * to search for an even better one.
2152 if (ifa_maybe == NULL ||
2153 ifa_preferred(ifa_maybe, ifa) ||
2154 rn_refines((caddr_t)ifa->ifa_netmask,
2155 (caddr_t)ifa_maybe->ifa_netmask)) {
2168 * Find an interface address specific to an interface best matching
2172 ifaof_ifpforaddr(const struct sockaddr *addr, struct ifnet *ifp)
2175 const char *cp, *cp2, *cp3;
2177 struct ifaddr *ifa_maybe = NULL;
2178 u_int af = addr->sa_family;
2183 MPASS(in_epoch(net_epoch_preempt));
2184 CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
2185 if (ifa->ifa_addr->sa_family != af)
2187 if (ifa_maybe == NULL)
2189 if (ifa->ifa_netmask == 0) {
2190 if (sa_equal(addr, ifa->ifa_addr) ||
2191 (ifa->ifa_dstaddr &&
2192 sa_equal(addr, ifa->ifa_dstaddr)))
2196 if (ifp->if_flags & IFF_POINTOPOINT) {
2197 if (sa_equal(addr, ifa->ifa_dstaddr))
2201 cp2 = ifa->ifa_addr->sa_data;
2202 cp3 = ifa->ifa_netmask->sa_data;
2203 cplim = ifa->ifa_netmask->sa_len + (char *)ifa->ifa_netmask;
2204 for (; cp3 < cplim; cp3++)
2205 if ((*cp++ ^ *cp2++) & *cp3)
2217 * See whether new ifa is better than current one:
2218 * 1) A non-virtual one is preferred over virtual.
2219 * 2) A virtual in master state preferred over any other state.
2221 * Used in several address selecting functions.
2224 ifa_preferred(struct ifaddr *cur, struct ifaddr *next)
2227 return (cur->ifa_carp && (!next->ifa_carp ||
2228 ((*carp_master_p)(next) && !(*carp_master_p)(cur))));
2231 struct sockaddr_dl *
2232 link_alloc_sdl(size_t size, int flags)
2235 return (malloc(size, M_TEMP, flags));
2239 link_free_sdl(struct sockaddr *sa)
2245 * Fills in given sdl with interface basic info.
2246 * Returns pointer to filled sdl.
2248 struct sockaddr_dl *
2249 link_init_sdl(struct ifnet *ifp, struct sockaddr *paddr, u_char iftype)
2251 struct sockaddr_dl *sdl;
2253 sdl = (struct sockaddr_dl *)paddr;
2254 memset(sdl, 0, sizeof(struct sockaddr_dl));
2255 sdl->sdl_len = sizeof(struct sockaddr_dl);
2256 sdl->sdl_family = AF_LINK;
2257 sdl->sdl_index = ifp->if_index;
2258 sdl->sdl_type = iftype;
2264 * Mark an interface down and notify protocols of
2268 if_unroute(struct ifnet *ifp, int flag, int fam)
2272 KASSERT(flag == IFF_UP, ("if_unroute: flag != IFF_UP"));
2274 ifp->if_flags &= ~flag;
2275 getmicrotime(&ifp->if_lastchange);
2276 CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link)
2277 if (fam == PF_UNSPEC || (fam == ifa->ifa_addr->sa_family))
2278 pfctlinput(PRC_IFDOWN, ifa->ifa_addr);
2279 ifp->if_qflush(ifp);
2282 (*carp_linkstate_p)(ifp);
2287 * Mark an interface up and notify protocols of
2291 if_route(struct ifnet *ifp, int flag, int fam)
2295 KASSERT(flag == IFF_UP, ("if_route: flag != IFF_UP"));
2297 ifp->if_flags |= flag;
2298 getmicrotime(&ifp->if_lastchange);
2299 CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link)
2300 if (fam == PF_UNSPEC || (fam == ifa->ifa_addr->sa_family))
2301 pfctlinput(PRC_IFUP, ifa->ifa_addr);
2303 (*carp_linkstate_p)(ifp);
2310 void (*vlan_link_state_p)(struct ifnet *); /* XXX: private from if_vlan */
2311 void (*vlan_trunk_cap_p)(struct ifnet *); /* XXX: private from if_vlan */
2312 struct ifnet *(*vlan_trunkdev_p)(struct ifnet *);
2313 struct ifnet *(*vlan_devat_p)(struct ifnet *, uint16_t);
2314 int (*vlan_tag_p)(struct ifnet *, uint16_t *);
2315 int (*vlan_pcp_p)(struct ifnet *, uint16_t *);
2316 int (*vlan_setcookie_p)(struct ifnet *, void *);
2317 void *(*vlan_cookie_p)(struct ifnet *);
2320 * Handle a change in the interface link state. To avoid LORs
2321 * between driver lock and upper layer locks, as well as possible
2322 * recursions, we post event to taskqueue, and all job
2323 * is done in static do_link_state_change().
2326 if_link_state_change(struct ifnet *ifp, int link_state)
2328 /* Return if state hasn't changed. */
2329 if (ifp->if_link_state == link_state)
2332 ifp->if_link_state = link_state;
2334 taskqueue_enqueue(taskqueue_swi, &ifp->if_linktask);
2338 do_link_state_change(void *arg, int pending)
2340 struct ifnet *ifp = (struct ifnet *)arg;
2341 int link_state = ifp->if_link_state;
2342 CURVNET_SET(ifp->if_vnet);
2344 /* Notify that the link state has changed. */
2346 if (ifp->if_vlantrunk != NULL)
2347 (*vlan_link_state_p)(ifp);
2349 if ((ifp->if_type == IFT_ETHER || ifp->if_type == IFT_L2VLAN) &&
2350 ifp->if_l2com != NULL)
2351 (*ng_ether_link_state_p)(ifp, link_state);
2353 (*carp_linkstate_p)(ifp);
2355 ifp->if_bridge_linkstate(ifp);
2357 (*lagg_linkstate_p)(ifp, link_state);
2359 if (IS_DEFAULT_VNET(curvnet))
2360 devctl_notify("IFNET", ifp->if_xname,
2361 (link_state == LINK_STATE_UP) ? "LINK_UP" : "LINK_DOWN",
2364 if_printf(ifp, "%d link states coalesced\n", pending);
2365 if (log_link_state_change)
2366 if_printf(ifp, "link state changed to %s\n",
2367 (link_state == LINK_STATE_UP) ? "UP" : "DOWN" );
2368 EVENTHANDLER_INVOKE(ifnet_link_event, ifp, link_state);
2373 * Mark an interface down and notify protocols of
2377 if_down(struct ifnet *ifp)
2380 EVENTHANDLER_INVOKE(ifnet_event, ifp, IFNET_EVENT_DOWN);
2381 if_unroute(ifp, IFF_UP, AF_UNSPEC);
2385 * Mark an interface up and notify protocols of
2389 if_up(struct ifnet *ifp)
2392 if_route(ifp, IFF_UP, AF_UNSPEC);
2393 EVENTHANDLER_INVOKE(ifnet_event, ifp, IFNET_EVENT_UP);
2397 * Flush an interface queue.
2400 if_qflush(struct ifnet *ifp)
2408 if (ALTQ_IS_ENABLED(ifq))
2412 while ((m = n) != NULL) {
2423 * Map interface name to interface structure pointer, with or without
2424 * returning a reference.
2427 ifunit_ref(const char *name)
2429 struct epoch_tracker et;
2432 NET_EPOCH_ENTER(et);
2433 CK_STAILQ_FOREACH(ifp, &V_ifnet, if_link) {
2434 if (strncmp(name, ifp->if_xname, IFNAMSIZ) == 0 &&
2435 !(ifp->if_flags & IFF_DYING))
2445 ifunit(const char *name)
2447 struct epoch_tracker et;
2450 NET_EPOCH_ENTER(et);
2451 CK_STAILQ_FOREACH(ifp, &V_ifnet, if_link) {
2452 if (strncmp(name, ifp->if_xname, IFNAMSIZ) == 0)
2460 ifr_buffer_get_buffer(void *data)
2462 union ifreq_union *ifrup;
2465 #ifdef COMPAT_FREEBSD32
2466 if (SV_CURPROC_FLAG(SV_ILP32))
2467 return ((void *)(uintptr_t)
2468 ifrup->ifr32.ifr_ifru.ifru_buffer.buffer);
2470 return (ifrup->ifr.ifr_ifru.ifru_buffer.buffer);
2474 ifr_buffer_set_buffer_null(void *data)
2476 union ifreq_union *ifrup;
2479 #ifdef COMPAT_FREEBSD32
2480 if (SV_CURPROC_FLAG(SV_ILP32))
2481 ifrup->ifr32.ifr_ifru.ifru_buffer.buffer = 0;
2484 ifrup->ifr.ifr_ifru.ifru_buffer.buffer = NULL;
2488 ifr_buffer_get_length(void *data)
2490 union ifreq_union *ifrup;
2493 #ifdef COMPAT_FREEBSD32
2494 if (SV_CURPROC_FLAG(SV_ILP32))
2495 return (ifrup->ifr32.ifr_ifru.ifru_buffer.length);
2497 return (ifrup->ifr.ifr_ifru.ifru_buffer.length);
2501 ifr_buffer_set_length(void *data, size_t len)
2503 union ifreq_union *ifrup;
2506 #ifdef COMPAT_FREEBSD32
2507 if (SV_CURPROC_FLAG(SV_ILP32))
2508 ifrup->ifr32.ifr_ifru.ifru_buffer.length = len;
2511 ifrup->ifr.ifr_ifru.ifru_buffer.length = len;
2515 ifr_data_get_ptr(void *ifrp)
2517 union ifreq_union *ifrup;
2520 #ifdef COMPAT_FREEBSD32
2521 if (SV_CURPROC_FLAG(SV_ILP32))
2522 return ((void *)(uintptr_t)
2523 ifrup->ifr32.ifr_ifru.ifru_data);
2525 return (ifrup->ifr.ifr_ifru.ifru_data);
2529 * Hardware specific interface ioctls.
2532 ifhwioctl(u_long cmd, struct ifnet *ifp, caddr_t data, struct thread *td)
2535 int error = 0, do_ifup = 0;
2536 int new_flags, temp_flags;
2537 size_t namelen, onamelen;
2539 char *descrbuf, *odescrbuf;
2540 char new_name[IFNAMSIZ];
2542 struct sockaddr_dl *sdl;
2544 ifr = (struct ifreq *)data;
2547 ifr->ifr_index = ifp->if_index;
2551 temp_flags = ifp->if_flags | ifp->if_drv_flags;
2552 ifr->ifr_flags = temp_flags & 0xffff;
2553 ifr->ifr_flagshigh = temp_flags >> 16;
2557 ifr->ifr_reqcap = ifp->if_capabilities;
2558 ifr->ifr_curcap = ifp->if_capenable;
2563 error = mac_ifnet_ioctl_get(td->td_ucred, ifr, ifp);
2568 ifr->ifr_metric = ifp->if_metric;
2572 ifr->ifr_mtu = ifp->if_mtu;
2576 /* XXXGL: did this ever worked? */
2582 sx_slock(&ifdescr_sx);
2583 if (ifp->if_description == NULL)
2586 /* space for terminating nul */
2587 descrlen = strlen(ifp->if_description) + 1;
2588 if (ifr_buffer_get_length(ifr) < descrlen)
2589 ifr_buffer_set_buffer_null(ifr);
2591 error = copyout(ifp->if_description,
2592 ifr_buffer_get_buffer(ifr), descrlen);
2593 ifr_buffer_set_length(ifr, descrlen);
2595 sx_sunlock(&ifdescr_sx);
2599 error = priv_check(td, PRIV_NET_SETIFDESCR);
2604 * Copy only (length-1) bytes to make sure that
2605 * if_description is always nul terminated. The
2606 * length parameter is supposed to count the
2607 * terminating nul in.
2609 if (ifr_buffer_get_length(ifr) > ifdescr_maxlen)
2610 return (ENAMETOOLONG);
2611 else if (ifr_buffer_get_length(ifr) == 0)
2614 descrbuf = malloc(ifr_buffer_get_length(ifr),
2615 M_IFDESCR, M_WAITOK | M_ZERO);
2616 error = copyin(ifr_buffer_get_buffer(ifr), descrbuf,
2617 ifr_buffer_get_length(ifr) - 1);
2619 free(descrbuf, M_IFDESCR);
2624 sx_xlock(&ifdescr_sx);
2625 odescrbuf = ifp->if_description;
2626 ifp->if_description = descrbuf;
2627 sx_xunlock(&ifdescr_sx);
2629 getmicrotime(&ifp->if_lastchange);
2630 free(odescrbuf, M_IFDESCR);
2634 ifr->ifr_fib = ifp->if_fib;
2638 error = priv_check(td, PRIV_NET_SETIFFIB);
2641 if (ifr->ifr_fib >= rt_numfibs)
2644 ifp->if_fib = ifr->ifr_fib;
2648 error = priv_check(td, PRIV_NET_SETIFFLAGS);
2652 * Currently, no driver owned flags pass the IFF_CANTCHANGE
2653 * check, so we don't need special handling here yet.
2655 new_flags = (ifr->ifr_flags & 0xffff) |
2656 (ifr->ifr_flagshigh << 16);
2657 if (ifp->if_flags & IFF_UP &&
2658 (new_flags & IFF_UP) == 0) {
2660 } else if (new_flags & IFF_UP &&
2661 (ifp->if_flags & IFF_UP) == 0) {
2664 /* See if permanently promiscuous mode bit is about to flip */
2665 if ((ifp->if_flags ^ new_flags) & IFF_PPROMISC) {
2666 if (new_flags & IFF_PPROMISC)
2667 ifp->if_flags |= IFF_PROMISC;
2668 else if (ifp->if_pcount == 0)
2669 ifp->if_flags &= ~IFF_PROMISC;
2670 if (log_promisc_mode_change)
2671 if_printf(ifp, "permanently promiscuous mode %s\n",
2672 ((new_flags & IFF_PPROMISC) ?
2673 "enabled" : "disabled"));
2675 ifp->if_flags = (ifp->if_flags & IFF_CANTCHANGE) |
2676 (new_flags &~ IFF_CANTCHANGE);
2677 if (ifp->if_ioctl) {
2678 (void) (*ifp->if_ioctl)(ifp, cmd, data);
2682 getmicrotime(&ifp->if_lastchange);
2686 error = priv_check(td, PRIV_NET_SETIFCAP);
2689 if (ifp->if_ioctl == NULL)
2690 return (EOPNOTSUPP);
2691 if (ifr->ifr_reqcap & ~ifp->if_capabilities)
2693 error = (*ifp->if_ioctl)(ifp, cmd, data);
2695 getmicrotime(&ifp->if_lastchange);
2700 error = mac_ifnet_ioctl_set(td->td_ucred, ifr, ifp);
2705 error = priv_check(td, PRIV_NET_SETIFNAME);
2708 error = copyinstr(ifr_data_get_ptr(ifr), new_name, IFNAMSIZ,
2712 if (new_name[0] == '\0')
2714 if (new_name[IFNAMSIZ-1] != '\0') {
2715 new_name[IFNAMSIZ-1] = '\0';
2716 if (strlen(new_name) == IFNAMSIZ-1)
2719 if (ifunit(new_name) != NULL)
2723 * XXX: Locking. Nothing else seems to lock if_flags,
2724 * and there are numerous other races with the
2725 * ifunit() checks not being atomic with namespace
2726 * changes (renames, vmoves, if_attach, etc).
2728 ifp->if_flags |= IFF_RENAMING;
2730 /* Announce the departure of the interface. */
2731 rt_ifannouncemsg(ifp, IFAN_DEPARTURE);
2732 EVENTHANDLER_INVOKE(ifnet_departure_event, ifp);
2734 if_printf(ifp, "changing name to '%s'\n", new_name);
2737 strlcpy(ifp->if_xname, new_name, sizeof(ifp->if_xname));
2739 sdl = (struct sockaddr_dl *)ifa->ifa_addr;
2740 namelen = strlen(new_name);
2741 onamelen = sdl->sdl_nlen;
2743 * Move the address if needed. This is safe because we
2744 * allocate space for a name of length IFNAMSIZ when we
2745 * create this in if_attach().
2747 if (namelen != onamelen) {
2748 bcopy(sdl->sdl_data + onamelen,
2749 sdl->sdl_data + namelen, sdl->sdl_alen);
2751 bcopy(new_name, sdl->sdl_data, namelen);
2752 sdl->sdl_nlen = namelen;
2753 sdl = (struct sockaddr_dl *)ifa->ifa_netmask;
2754 bzero(sdl->sdl_data, onamelen);
2755 while (namelen != 0)
2756 sdl->sdl_data[--namelen] = 0xff;
2757 IF_ADDR_WUNLOCK(ifp);
2759 EVENTHANDLER_INVOKE(ifnet_arrival_event, ifp);
2760 /* Announce the return of the interface. */
2761 rt_ifannouncemsg(ifp, IFAN_ARRIVAL);
2763 ifp->if_flags &= ~IFF_RENAMING;
2768 error = priv_check(td, PRIV_NET_SETIFVNET);
2771 error = if_vmove_loan(td, ifp, ifr->ifr_name, ifr->ifr_jid);
2776 error = priv_check(td, PRIV_NET_SETIFMETRIC);
2779 ifp->if_metric = ifr->ifr_metric;
2780 getmicrotime(&ifp->if_lastchange);
2784 error = priv_check(td, PRIV_NET_SETIFPHYS);
2787 if (ifp->if_ioctl == NULL)
2788 return (EOPNOTSUPP);
2789 error = (*ifp->if_ioctl)(ifp, cmd, data);
2791 getmicrotime(&ifp->if_lastchange);
2796 u_long oldmtu = ifp->if_mtu;
2798 error = priv_check(td, PRIV_NET_SETIFMTU);
2801 if (ifr->ifr_mtu < IF_MINMTU || ifr->ifr_mtu > IF_MAXMTU)
2803 if (ifp->if_ioctl == NULL)
2804 return (EOPNOTSUPP);
2805 error = (*ifp->if_ioctl)(ifp, cmd, data);
2807 getmicrotime(&ifp->if_lastchange);
2810 NETDUMP_REINIT(ifp);
2814 * If the link MTU changed, do network layer specific procedure.
2816 if (ifp->if_mtu != oldmtu) {
2827 if (cmd == SIOCADDMULTI)
2828 error = priv_check(td, PRIV_NET_ADDMULTI);
2830 error = priv_check(td, PRIV_NET_DELMULTI);
2834 /* Don't allow group membership on non-multicast interfaces. */
2835 if ((ifp->if_flags & IFF_MULTICAST) == 0)
2836 return (EOPNOTSUPP);
2838 /* Don't let users screw up protocols' entries. */
2839 if (ifr->ifr_addr.sa_family != AF_LINK)
2842 if (cmd == SIOCADDMULTI) {
2843 struct epoch_tracker et;
2844 struct ifmultiaddr *ifma;
2847 * Userland is only permitted to join groups once
2848 * via the if_addmulti() KPI, because it cannot hold
2849 * struct ifmultiaddr * between calls. It may also
2850 * lose a race while we check if the membership
2853 NET_EPOCH_ENTER(et);
2854 ifma = if_findmulti(ifp, &ifr->ifr_addr);
2859 error = if_addmulti(ifp, &ifr->ifr_addr, &ifma);
2861 error = if_delmulti(ifp, &ifr->ifr_addr);
2864 getmicrotime(&ifp->if_lastchange);
2867 case SIOCSIFPHYADDR:
2868 case SIOCDIFPHYADDR:
2870 case SIOCSIFPHYADDR_IN6:
2873 case SIOCSIFGENERIC:
2874 error = priv_check(td, PRIV_NET_HWIOCTL);
2877 if (ifp->if_ioctl == NULL)
2878 return (EOPNOTSUPP);
2879 error = (*ifp->if_ioctl)(ifp, cmd, data);
2881 getmicrotime(&ifp->if_lastchange);
2885 case SIOCGIFPSRCADDR:
2886 case SIOCGIFPDSTADDR:
2889 case SIOCGIFGENERIC:
2891 case SIOCGIFRSSHASH:
2892 if (ifp->if_ioctl == NULL)
2893 return (EOPNOTSUPP);
2894 error = (*ifp->if_ioctl)(ifp, cmd, data);
2898 error = priv_check(td, PRIV_NET_SETLLADDR);
2901 error = if_setlladdr(ifp,
2902 ifr->ifr_addr.sa_data, ifr->ifr_addr.sa_len);
2906 error = if_gethwaddr(ifp, ifr);
2909 case CASE_IOC_IFGROUPREQ(SIOCAIFGROUP):
2910 error = priv_check(td, PRIV_NET_ADDIFGROUP);
2913 if ((error = if_addgroup(ifp,
2914 ifgr_group_get((struct ifgroupreq *)data))))
2918 case CASE_IOC_IFGROUPREQ(SIOCGIFGROUP):
2919 if ((error = if_getgroup((struct ifgroupreq *)data, ifp)))
2923 case CASE_IOC_IFGROUPREQ(SIOCDIFGROUP):
2924 error = priv_check(td, PRIV_NET_DELIFGROUP);
2927 if ((error = if_delgroup(ifp,
2928 ifgr_group_get((struct ifgroupreq *)data))))
2939 #ifdef COMPAT_FREEBSD32
2947 #define SIOCGIFCONF32 _IOWR('i', 36, struct ifconf32)
2950 #ifdef COMPAT_FREEBSD32
2952 ifmr_init(struct ifmediareq *ifmr, caddr_t data)
2954 struct ifmediareq32 *ifmr32;
2956 ifmr32 = (struct ifmediareq32 *)data;
2957 memcpy(ifmr->ifm_name, ifmr32->ifm_name,
2958 sizeof(ifmr->ifm_name));
2959 ifmr->ifm_current = ifmr32->ifm_current;
2960 ifmr->ifm_mask = ifmr32->ifm_mask;
2961 ifmr->ifm_status = ifmr32->ifm_status;
2962 ifmr->ifm_active = ifmr32->ifm_active;
2963 ifmr->ifm_count = ifmr32->ifm_count;
2964 ifmr->ifm_ulist = (int *)(uintptr_t)ifmr32->ifm_ulist;
2968 ifmr_update(const struct ifmediareq *ifmr, caddr_t data)
2970 struct ifmediareq32 *ifmr32;
2972 ifmr32 = (struct ifmediareq32 *)data;
2973 ifmr32->ifm_current = ifmr->ifm_current;
2974 ifmr32->ifm_mask = ifmr->ifm_mask;
2975 ifmr32->ifm_status = ifmr->ifm_status;
2976 ifmr32->ifm_active = ifmr->ifm_active;
2977 ifmr32->ifm_count = ifmr->ifm_count;
2985 ifioctl(struct socket *so, u_long cmd, caddr_t data, struct thread *td)
2987 #ifdef COMPAT_FREEBSD32
2988 caddr_t saved_data = NULL;
2989 struct ifmediareq ifmr;
2990 struct ifmediareq *ifmrp;
3000 CURVNET_SET(so->so_vnet);
3002 /* Make sure the VNET is stable. */
3003 shutdown = (so->so_vnet->vnet_state > SI_SUB_VNET &&
3004 so->so_vnet->vnet_state < SI_SUB_VNET_DONE) ? 1 : 0;
3014 error = ifconf(cmd, data);
3018 #ifdef COMPAT_FREEBSD32
3021 struct ifconf32 *ifc32;
3024 ifc32 = (struct ifconf32 *)data;
3025 ifc.ifc_len = ifc32->ifc_len;
3026 ifc.ifc_buf = PTRIN(ifc32->ifc_buf);
3028 error = ifconf(SIOCGIFCONF, (void *)&ifc);
3031 ifc32->ifc_len = ifc.ifc_len;
3037 #ifdef COMPAT_FREEBSD32
3040 case SIOCGIFMEDIA32:
3041 case SIOCGIFXMEDIA32:
3043 ifmr_init(ifmrp, data);
3044 cmd = _IOC_NEWTYPE(cmd, struct ifmediareq);
3046 data = (caddr_t)ifmrp;
3050 ifr = (struct ifreq *)data;
3054 error = priv_check(td, PRIV_NET_SETIFVNET);
3056 error = if_vmove_reclaim(td, ifr->ifr_name,
3062 error = priv_check(td, PRIV_NET_IFCREATE);
3064 error = if_clone_create(ifr->ifr_name,
3065 sizeof(ifr->ifr_name), cmd == SIOCIFCREATE2 ?
3066 ifr_data_get_ptr(ifr) : NULL);
3069 error = priv_check(td, PRIV_NET_IFDESTROY);
3071 error = if_clone_destroy(ifr->ifr_name);
3074 case SIOCIFGCLONERS:
3075 error = if_clone_list((struct if_clonereq *)data);
3078 case CASE_IOC_IFGROUPREQ(SIOCGIFGMEMB):
3079 error = if_getgroupmembers((struct ifgroupreq *)data);
3082 #if defined(INET) || defined(INET6)
3085 if (carp_ioctl_p == NULL)
3086 error = EPROTONOSUPPORT;
3088 error = (*carp_ioctl_p)(ifr, cmd, td);
3093 ifp = ifunit_ref(ifr->ifr_name);
3099 error = ifhwioctl(cmd, ifp, data, td);
3100 if (error != ENOIOCTL)
3103 oif_flags = ifp->if_flags;
3104 if (so->so_proto == NULL) {
3110 * Pass the request on to the socket control method, and if the
3111 * latter returns EOPNOTSUPP, directly to the interface.
3113 * Make an exception for the legacy SIOCSIF* requests. Drivers
3114 * trust SIOCSIFADDR et al to come from an already privileged
3115 * layer, and do not perform any credentials checks or input
3118 error = ((*so->so_proto->pr_usrreqs->pru_control)(so, cmd, data,
3120 if (error == EOPNOTSUPP && ifp != NULL && ifp->if_ioctl != NULL &&
3121 cmd != SIOCSIFADDR && cmd != SIOCSIFBRDADDR &&
3122 cmd != SIOCSIFDSTADDR && cmd != SIOCSIFNETMASK)
3123 error = (*ifp->if_ioctl)(ifp, cmd, data);
3125 if ((oif_flags ^ ifp->if_flags) & IFF_UP) {
3127 if (ifp->if_flags & IFF_UP)
3135 #ifdef COMPAT_FREEBSD32
3136 if (ifmrp != NULL) {
3137 KASSERT((cmd == SIOCGIFMEDIA || cmd == SIOCGIFXMEDIA),
3138 ("ifmrp non-NULL, but cmd is not an ifmedia req 0x%lx",
3141 ifmr_update(ifmrp, data);
3149 * The code common to handling reference counted flags,
3150 * e.g., in ifpromisc() and if_allmulti().
3151 * The "pflag" argument can specify a permanent mode flag to check,
3152 * such as IFF_PPROMISC for promiscuous mode; should be 0 if none.
3154 * Only to be used on stack-owned flags, not driver-owned flags.
3157 if_setflag(struct ifnet *ifp, int flag, int pflag, int *refcount, int onswitch)
3161 int oldflags, oldcount;
3163 /* Sanity checks to catch programming errors */
3164 KASSERT((flag & (IFF_DRV_OACTIVE|IFF_DRV_RUNNING)) == 0,
3165 ("%s: setting driver-owned flag %d", __func__, flag));
3168 KASSERT(*refcount >= 0,
3169 ("%s: increment negative refcount %d for flag %d",
3170 __func__, *refcount, flag));
3172 KASSERT(*refcount > 0,
3173 ("%s: decrement non-positive refcount %d for flag %d",
3174 __func__, *refcount, flag));
3176 /* In case this mode is permanent, just touch refcount */
3177 if (ifp->if_flags & pflag) {
3178 *refcount += onswitch ? 1 : -1;
3182 /* Save ifnet parameters for if_ioctl() may fail */
3183 oldcount = *refcount;
3184 oldflags = ifp->if_flags;
3187 * See if we aren't the only and touching refcount is enough.
3188 * Actually toggle interface flag if we are the first or last.
3193 ifp->if_flags |= flag;
3197 ifp->if_flags &= ~flag;
3200 /* Call down the driver since we've changed interface flags */
3201 if (ifp->if_ioctl == NULL) {
3205 ifr.ifr_flags = ifp->if_flags & 0xffff;
3206 ifr.ifr_flagshigh = ifp->if_flags >> 16;
3207 error = (*ifp->if_ioctl)(ifp, SIOCSIFFLAGS, (caddr_t)&ifr);
3210 /* Notify userland that interface flags have changed */
3215 /* Recover after driver error */
3216 *refcount = oldcount;
3217 ifp->if_flags = oldflags;
3222 * Set/clear promiscuous mode on interface ifp based on the truth value
3223 * of pswitch. The calls are reference counted so that only the first
3224 * "on" request actually has an effect, as does the final "off" request.
3225 * Results are undefined if the "off" and "on" requests are not matched.
3228 ifpromisc(struct ifnet *ifp, int pswitch)
3231 int oldflags = ifp->if_flags;
3233 error = if_setflag(ifp, IFF_PROMISC, IFF_PPROMISC,
3234 &ifp->if_pcount, pswitch);
3235 /* If promiscuous mode status has changed, log a message */
3236 if (error == 0 && ((ifp->if_flags ^ oldflags) & IFF_PROMISC) &&
3237 log_promisc_mode_change)
3238 if_printf(ifp, "promiscuous mode %s\n",
3239 (ifp->if_flags & IFF_PROMISC) ? "enabled" : "disabled");
3244 * Return interface configuration
3245 * of system. List may be used
3246 * in later ioctl's (above) to get
3247 * other information.
3251 ifconf(u_long cmd, caddr_t data)
3253 struct ifconf *ifc = (struct ifconf *)data;
3258 int error, full = 0, valid_len, max_len;
3260 /* Limit initial buffer size to MAXPHYS to avoid DoS from userspace. */
3261 max_len = MAXPHYS - 1;
3263 /* Prevent hostile input from being able to crash the system */
3264 if (ifc->ifc_len <= 0)
3268 if (ifc->ifc_len <= max_len) {
3269 max_len = ifc->ifc_len;
3272 sb = sbuf_new(NULL, NULL, max_len + 1, SBUF_FIXEDLEN);
3277 CK_STAILQ_FOREACH(ifp, &V_ifnet, if_link) {
3278 struct epoch_tracker et;
3282 * Zero the ifr to make sure we don't disclose the contents
3285 memset(&ifr, 0, sizeof(ifr));
3287 if (strlcpy(ifr.ifr_name, ifp->if_xname, sizeof(ifr.ifr_name))
3288 >= sizeof(ifr.ifr_name)) {
3291 return (ENAMETOOLONG);
3295 NET_EPOCH_ENTER(et);
3296 CK_STAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
3297 struct sockaddr *sa = ifa->ifa_addr;
3299 if (prison_if(curthread->td_ucred, sa) != 0)
3302 if (sa->sa_len <= sizeof(*sa)) {
3303 if (sa->sa_len < sizeof(*sa)) {
3304 memset(&ifr.ifr_ifru.ifru_addr, 0,
3305 sizeof(ifr.ifr_ifru.ifru_addr));
3306 memcpy(&ifr.ifr_ifru.ifru_addr, sa,
3309 ifr.ifr_ifru.ifru_addr = *sa;
3310 sbuf_bcat(sb, &ifr, sizeof(ifr));
3311 max_len += sizeof(ifr);
3314 offsetof(struct ifreq, ifr_addr));
3315 max_len += offsetof(struct ifreq, ifr_addr);
3316 sbuf_bcat(sb, sa, sa->sa_len);
3317 max_len += sa->sa_len;
3320 if (sbuf_error(sb) == 0)
3321 valid_len = sbuf_len(sb);
3325 sbuf_bcat(sb, &ifr, sizeof(ifr));
3326 max_len += sizeof(ifr);
3328 if (sbuf_error(sb) == 0)
3329 valid_len = sbuf_len(sb);
3335 * If we didn't allocate enough space (uncommon), try again. If
3336 * we have already allocated as much space as we are allowed,
3337 * return what we've got.
3339 if (valid_len != max_len && !full) {
3344 ifc->ifc_len = valid_len;
3346 error = copyout(sbuf_data(sb), ifc->ifc_req, ifc->ifc_len);
3352 * Just like ifpromisc(), but for all-multicast-reception mode.
3355 if_allmulti(struct ifnet *ifp, int onswitch)
3358 return (if_setflag(ifp, IFF_ALLMULTI, 0, &ifp->if_amcount, onswitch));
3361 struct ifmultiaddr *
3362 if_findmulti(struct ifnet *ifp, const struct sockaddr *sa)
3364 struct ifmultiaddr *ifma;
3366 IF_ADDR_LOCK_ASSERT(ifp);
3368 CK_STAILQ_FOREACH(ifma, &ifp->if_multiaddrs, ifma_link) {
3369 if (sa->sa_family == AF_LINK) {
3370 if (sa_dl_equal(ifma->ifma_addr, sa))
3373 if (sa_equal(ifma->ifma_addr, sa))
3382 * Allocate a new ifmultiaddr and initialize based on passed arguments. We
3383 * make copies of passed sockaddrs. The ifmultiaddr will not be added to
3384 * the ifnet multicast address list here, so the caller must do that and
3385 * other setup work (such as notifying the device driver). The reference
3386 * count is initialized to 1.
3388 static struct ifmultiaddr *
3389 if_allocmulti(struct ifnet *ifp, struct sockaddr *sa, struct sockaddr *llsa,
3392 struct ifmultiaddr *ifma;
3393 struct sockaddr *dupsa;
3395 ifma = malloc(sizeof *ifma, M_IFMADDR, mflags |
3400 dupsa = malloc(sa->sa_len, M_IFMADDR, mflags);
3401 if (dupsa == NULL) {
3402 free(ifma, M_IFMADDR);
3405 bcopy(sa, dupsa, sa->sa_len);
3406 ifma->ifma_addr = dupsa;
3408 ifma->ifma_ifp = ifp;
3409 ifma->ifma_refcount = 1;
3410 ifma->ifma_protospec = NULL;
3413 ifma->ifma_lladdr = NULL;
3417 dupsa = malloc(llsa->sa_len, M_IFMADDR, mflags);
3418 if (dupsa == NULL) {
3419 free(ifma->ifma_addr, M_IFMADDR);
3420 free(ifma, M_IFMADDR);
3423 bcopy(llsa, dupsa, llsa->sa_len);
3424 ifma->ifma_lladdr = dupsa;
3430 * if_freemulti: free ifmultiaddr structure and possibly attached related
3431 * addresses. The caller is responsible for implementing reference
3432 * counting, notifying the driver, handling routing messages, and releasing
3433 * any dependent link layer state.
3435 #ifdef MCAST_VERBOSE
3436 extern void kdb_backtrace(void);
3439 if_freemulti_internal(struct ifmultiaddr *ifma)
3442 KASSERT(ifma->ifma_refcount == 0, ("if_freemulti: refcount %d",
3443 ifma->ifma_refcount));
3445 if (ifma->ifma_lladdr != NULL)
3446 free(ifma->ifma_lladdr, M_IFMADDR);
3447 #ifdef MCAST_VERBOSE
3449 printf("%s freeing ifma: %p\n", __func__, ifma);
3451 free(ifma->ifma_addr, M_IFMADDR);
3452 free(ifma, M_IFMADDR);
3456 if_destroymulti(epoch_context_t ctx)
3458 struct ifmultiaddr *ifma;
3460 ifma = __containerof(ctx, struct ifmultiaddr, ifma_epoch_ctx);
3461 if_freemulti_internal(ifma);
3465 if_freemulti(struct ifmultiaddr *ifma)
3467 KASSERT(ifma->ifma_refcount == 0, ("if_freemulti_epoch: refcount %d",
3468 ifma->ifma_refcount));
3470 epoch_call(net_epoch_preempt, &ifma->ifma_epoch_ctx, if_destroymulti);
3475 * Register an additional multicast address with a network interface.
3477 * - If the address is already present, bump the reference count on the
3478 * address and return.
3479 * - If the address is not link-layer, look up a link layer address.
3480 * - Allocate address structures for one or both addresses, and attach to the
3481 * multicast address list on the interface. If automatically adding a link
3482 * layer address, the protocol address will own a reference to the link
3483 * layer address, to be freed when it is freed.
3484 * - Notify the network device driver of an addition to the multicast address
3487 * 'sa' points to caller-owned memory with the desired multicast address.
3489 * 'retifma' will be used to return a pointer to the resulting multicast
3490 * address reference, if desired.
3493 if_addmulti(struct ifnet *ifp, struct sockaddr *sa,
3494 struct ifmultiaddr **retifma)
3496 struct ifmultiaddr *ifma, *ll_ifma;
3497 struct sockaddr *llsa;
3498 struct sockaddr_dl sdl;
3502 IN_MULTI_LIST_UNLOCK_ASSERT();
3505 IN6_MULTI_LIST_UNLOCK_ASSERT();
3508 * If the address is already present, return a new reference to it;
3509 * otherwise, allocate storage and set up a new address.
3512 ifma = if_findmulti(ifp, sa);
3514 ifma->ifma_refcount++;
3515 if (retifma != NULL)
3517 IF_ADDR_WUNLOCK(ifp);
3522 * The address isn't already present; resolve the protocol address
3523 * into a link layer address, and then look that up, bump its
3524 * refcount or allocate an ifma for that also.
3525 * Most link layer resolving functions returns address data which
3526 * fits inside default sockaddr_dl structure. However callback
3527 * can allocate another sockaddr structure, in that case we need to
3532 if (ifp->if_resolvemulti != NULL) {
3533 /* Provide called function with buffer size information */
3534 sdl.sdl_len = sizeof(sdl);
3535 llsa = (struct sockaddr *)&sdl;
3536 error = ifp->if_resolvemulti(ifp, &llsa, sa);
3542 * Allocate the new address. Don't hook it up yet, as we may also
3543 * need to allocate a link layer multicast address.
3545 ifma = if_allocmulti(ifp, sa, llsa, M_NOWAIT);
3552 * If a link layer address is found, we'll need to see if it's
3553 * already present in the address list, or allocate is as well.
3554 * When this block finishes, the link layer address will be on the
3558 ll_ifma = if_findmulti(ifp, llsa);
3559 if (ll_ifma == NULL) {
3560 ll_ifma = if_allocmulti(ifp, llsa, NULL, M_NOWAIT);
3561 if (ll_ifma == NULL) {
3562 --ifma->ifma_refcount;
3567 ll_ifma->ifma_flags |= IFMA_F_ENQUEUED;
3568 CK_STAILQ_INSERT_HEAD(&ifp->if_multiaddrs, ll_ifma,
3571 ll_ifma->ifma_refcount++;
3572 ifma->ifma_llifma = ll_ifma;
3576 * We now have a new multicast address, ifma, and possibly a new or
3577 * referenced link layer address. Add the primary address to the
3578 * ifnet address list.
3580 ifma->ifma_flags |= IFMA_F_ENQUEUED;
3581 CK_STAILQ_INSERT_HEAD(&ifp->if_multiaddrs, ifma, ifma_link);
3583 if (retifma != NULL)
3587 * Must generate the message while holding the lock so that 'ifma'
3588 * pointer is still valid.
3590 rt_newmaddrmsg(RTM_NEWMADDR, ifma);
3591 IF_ADDR_WUNLOCK(ifp);
3594 * We are certain we have added something, so call down to the
3595 * interface to let them know about it.
3597 if (ifp->if_ioctl != NULL) {
3598 (void) (*ifp->if_ioctl)(ifp, SIOCADDMULTI, 0);
3601 if ((llsa != NULL) && (llsa != (struct sockaddr *)&sdl))
3602 link_free_sdl(llsa);
3607 if ((llsa != NULL) && (llsa != (struct sockaddr *)&sdl))
3608 link_free_sdl(llsa);
3611 IF_ADDR_WUNLOCK(ifp);
3616 * Delete a multicast group membership by network-layer group address.
3618 * Returns ENOENT if the entry could not be found. If ifp no longer
3619 * exists, results are undefined. This entry point should only be used
3620 * from subsystems which do appropriate locking to hold ifp for the
3621 * duration of the call.
3622 * Network-layer protocol domains must use if_delmulti_ifma().
3625 if_delmulti(struct ifnet *ifp, struct sockaddr *sa)
3627 struct ifmultiaddr *ifma;
3630 struct epoch_tracker et;
3633 NET_EPOCH_ENTER(et);
3634 CK_STAILQ_FOREACH(oifp, &V_ifnet, if_link)
3641 KASSERT(ifp != NULL, ("%s: ifnet went away", __func__));
3648 ifma = if_findmulti(ifp, sa);
3650 lastref = if_delmulti_locked(ifp, ifma, 0);
3651 IF_ADDR_WUNLOCK(ifp);
3656 if (lastref && ifp->if_ioctl != NULL) {
3657 (void)(*ifp->if_ioctl)(ifp, SIOCDELMULTI, 0);
3664 * Delete all multicast group membership for an interface.
3665 * Should be used to quickly flush all multicast filters.
3668 if_delallmulti(struct ifnet *ifp)
3670 struct ifmultiaddr *ifma;
3671 struct ifmultiaddr *next;
3674 CK_STAILQ_FOREACH_SAFE(ifma, &ifp->if_multiaddrs, ifma_link, next)
3675 if_delmulti_locked(ifp, ifma, 0);
3676 IF_ADDR_WUNLOCK(ifp);
3680 if_delmulti_ifma(struct ifmultiaddr *ifma)
3682 if_delmulti_ifma_flags(ifma, 0);
3686 * Delete a multicast group membership by group membership pointer.
3687 * Network-layer protocol domains must use this routine.
3689 * It is safe to call this routine if the ifp disappeared.
3692 if_delmulti_ifma_flags(struct ifmultiaddr *ifma, int flags)
3696 MCDPRINTF("%s freeing ifma: %p\n", __func__, ifma);
3698 IN_MULTI_LIST_UNLOCK_ASSERT();
3700 ifp = ifma->ifma_ifp;
3703 printf("%s: ifma_ifp seems to be detached\n", __func__);
3705 struct epoch_tracker et;
3708 NET_EPOCH_ENTER(et);
3709 CK_STAILQ_FOREACH(oifp, &V_ifnet, if_link)
3718 * If and only if the ifnet instance exists: Acquire the address lock.
3723 lastref = if_delmulti_locked(ifp, ifma, flags);
3727 * If and only if the ifnet instance exists:
3728 * Release the address lock.
3729 * If the group was left: update the hardware hash filter.
3731 IF_ADDR_WUNLOCK(ifp);
3732 if (lastref && ifp->if_ioctl != NULL) {
3733 (void)(*ifp->if_ioctl)(ifp, SIOCDELMULTI, 0);
3739 * Perform deletion of network-layer and/or link-layer multicast address.
3741 * Return 0 if the reference count was decremented.
3742 * Return 1 if the final reference was released, indicating that the
3743 * hardware hash filter should be reprogrammed.
3746 if_delmulti_locked(struct ifnet *ifp, struct ifmultiaddr *ifma, int detaching)
3748 struct ifmultiaddr *ll_ifma;
3750 if (ifp != NULL && ifma->ifma_ifp != NULL) {
3751 KASSERT(ifma->ifma_ifp == ifp,
3752 ("%s: inconsistent ifp %p", __func__, ifp));
3753 IF_ADDR_WLOCK_ASSERT(ifp);
3756 ifp = ifma->ifma_ifp;
3757 MCDPRINTF("%s freeing %p from %s \n", __func__, ifma, ifp ? ifp->if_xname : "");
3760 * If the ifnet is detaching, null out references to ifnet,
3761 * so that upper protocol layers will notice, and not attempt
3762 * to obtain locks for an ifnet which no longer exists. The
3763 * routing socket announcement must happen before the ifnet
3764 * instance is detached from the system.
3768 printf("%s: detaching ifnet instance %p\n", __func__, ifp);
3771 * ifp may already be nulled out if we are being reentered
3772 * to delete the ll_ifma.
3775 rt_newmaddrmsg(RTM_DELMADDR, ifma);
3776 ifma->ifma_ifp = NULL;
3780 if (--ifma->ifma_refcount > 0)
3783 if (ifp != NULL && detaching == 0 && (ifma->ifma_flags & IFMA_F_ENQUEUED)) {
3784 CK_STAILQ_REMOVE(&ifp->if_multiaddrs, ifma, ifmultiaddr, ifma_link);
3785 ifma->ifma_flags &= ~IFMA_F_ENQUEUED;
3788 * If this ifma is a network-layer ifma, a link-layer ifma may
3789 * have been associated with it. Release it first if so.
3791 ll_ifma = ifma->ifma_llifma;
3792 if (ll_ifma != NULL) {
3793 KASSERT(ifma->ifma_lladdr != NULL,
3794 ("%s: llifma w/o lladdr", __func__));
3796 ll_ifma->ifma_ifp = NULL; /* XXX */
3797 if (--ll_ifma->ifma_refcount == 0) {
3799 if (ll_ifma->ifma_flags & IFMA_F_ENQUEUED) {
3800 CK_STAILQ_REMOVE(&ifp->if_multiaddrs, ll_ifma, ifmultiaddr,
3802 ll_ifma->ifma_flags &= ~IFMA_F_ENQUEUED;
3805 if_freemulti(ll_ifma);
3810 struct ifmultiaddr *ifmatmp;
3812 CK_STAILQ_FOREACH(ifmatmp, &ifp->if_multiaddrs, ifma_link)
3813 MPASS(ifma != ifmatmp);
3818 * The last reference to this instance of struct ifmultiaddr
3819 * was released; the hardware should be notified of this change.
3825 * Set the link layer address on an interface.
3827 * At this time we only support certain types of interfaces,
3828 * and we don't allow the length of the address to change.
3830 * Set noinline to be dtrace-friendly
3833 if_setlladdr(struct ifnet *ifp, const u_char *lladdr, int len)
3835 struct sockaddr_dl *sdl;
3838 struct epoch_tracker et;
3842 NET_EPOCH_ENTER(et);
3849 sdl = (struct sockaddr_dl *)ifa->ifa_addr;
3854 if (len != sdl->sdl_alen) { /* don't allow length to change */
3858 switch (ifp->if_type) {
3863 case IFT_IEEE8023ADLAG:
3864 bcopy(lladdr, LLADDR(sdl), len);
3872 * If the interface is already up, we need
3873 * to re-init it in order to reprogram its
3877 if ((ifp->if_flags & IFF_UP) != 0) {
3878 if (ifp->if_ioctl) {
3879 ifp->if_flags &= ~IFF_UP;
3880 ifr.ifr_flags = ifp->if_flags & 0xffff;
3881 ifr.ifr_flagshigh = ifp->if_flags >> 16;
3882 (*ifp->if_ioctl)(ifp, SIOCSIFFLAGS, (caddr_t)&ifr);
3883 ifp->if_flags |= IFF_UP;
3884 ifr.ifr_flags = ifp->if_flags & 0xffff;
3885 ifr.ifr_flagshigh = ifp->if_flags >> 16;
3886 (*ifp->if_ioctl)(ifp, SIOCSIFFLAGS, (caddr_t)&ifr);
3889 EVENTHANDLER_INVOKE(iflladdr_event, ifp);
3897 * Compat function for handling basic encapsulation requests.
3898 * Not converted stacks (FDDI, IB, ..) supports traditional
3899 * output model: ARP (and other similar L2 protocols) are handled
3900 * inside output routine, arpresolve/nd6_resolve() returns MAC
3901 * address instead of full prepend.
3903 * This function creates calculated header==MAC for IPv4/IPv6 and
3904 * returns EAFNOSUPPORT (which is then handled in ARP code) for other
3908 if_requestencap_default(struct ifnet *ifp, struct if_encap_req *req)
3911 if (req->rtype != IFENCAP_LL)
3912 return (EOPNOTSUPP);
3914 if (req->bufsize < req->lladdr_len)
3917 switch (req->family) {
3922 return (EAFNOSUPPORT);
3925 /* Copy lladdr to storage as is */
3926 memmove(req->buf, req->lladdr, req->lladdr_len);
3927 req->bufsize = req->lladdr_len;
3928 req->lladdr_off = 0;
3934 * Tunnel interfaces can nest, also they may cause infinite recursion
3935 * calls when misconfigured. We'll prevent this by detecting loops.
3936 * High nesting level may cause stack exhaustion. We'll prevent this
3937 * by introducing upper limit.
3939 * Return 0, if tunnel nesting count is equal or less than limit.
3942 if_tunnel_check_nesting(struct ifnet *ifp, struct mbuf *m, uint32_t cookie,
3950 while ((mtag = m_tag_locate(m, cookie, 0, mtag)) != NULL) {
3951 if (*(struct ifnet **)(mtag + 1) == ifp) {
3952 log(LOG_NOTICE, "%s: loop detected\n", if_name(ifp));
3957 if (count > limit) {
3959 "%s: if_output recursively called too many times(%d)\n",
3960 if_name(ifp), count);
3963 mtag = m_tag_alloc(cookie, 0, sizeof(struct ifnet *), M_NOWAIT);
3966 *(struct ifnet **)(mtag + 1) = ifp;
3967 m_tag_prepend(m, mtag);
3972 * Get the link layer address that was read from the hardware at attach.
3974 * This is only set by Ethernet NICs (IFT_ETHER), but laggX interfaces re-type
3975 * their component interfaces as IFT_IEEE8023ADLAG.
3978 if_gethwaddr(struct ifnet *ifp, struct ifreq *ifr)
3981 if (ifp->if_hw_addr == NULL)
3984 switch (ifp->if_type) {
3986 case IFT_IEEE8023ADLAG:
3987 bcopy(ifp->if_hw_addr, ifr->ifr_addr.sa_data, ifp->if_addrlen);
3995 * The name argument must be a pointer to storage which will last as
3996 * long as the interface does. For physical devices, the result of
3997 * device_get_name(dev) is a good choice and for pseudo-devices a
3998 * static string works well.
4001 if_initname(struct ifnet *ifp, const char *name, int unit)
4003 ifp->if_dname = name;
4004 ifp->if_dunit = unit;
4005 if (unit != IF_DUNIT_NONE)
4006 snprintf(ifp->if_xname, IFNAMSIZ, "%s%d", name, unit);
4008 strlcpy(ifp->if_xname, name, IFNAMSIZ);
4012 if_printf(struct ifnet *ifp, const char *fmt, ...)
4017 snprintf(if_fmt, sizeof(if_fmt), "%s: %s", ifp->if_xname, fmt);
4019 vlog(LOG_INFO, if_fmt, ap);
4025 if_start(struct ifnet *ifp)
4028 (*(ifp)->if_start)(ifp);
4032 * Backwards compatibility interface for drivers
4033 * that have not implemented it
4036 if_transmit(struct ifnet *ifp, struct mbuf *m)
4040 IFQ_HANDOFF(ifp, m, error);
4045 if_input_default(struct ifnet *ifp __unused, struct mbuf *m)
4052 if_handoff(struct ifqueue *ifq, struct mbuf *m, struct ifnet *ifp, int adjust)
4057 if (_IF_QFULL(ifq)) {
4059 if_inc_counter(ifp, IFCOUNTER_OQDROPS, 1);
4064 if_inc_counter(ifp, IFCOUNTER_OBYTES, m->m_pkthdr.len + adjust);
4065 if (m->m_flags & (M_BCAST|M_MCAST))
4066 if_inc_counter(ifp, IFCOUNTER_OMCASTS, 1);
4067 active = ifp->if_drv_flags & IFF_DRV_OACTIVE;
4069 _IF_ENQUEUE(ifq, m);
4071 if (ifp != NULL && !active)
4072 (*(ifp)->if_start)(ifp);
4077 if_register_com_alloc(u_char type,
4078 if_com_alloc_t *a, if_com_free_t *f)
4081 KASSERT(if_com_alloc[type] == NULL,
4082 ("if_register_com_alloc: %d already registered", type));
4083 KASSERT(if_com_free[type] == NULL,
4084 ("if_register_com_alloc: %d free already registered", type));
4086 if_com_alloc[type] = a;
4087 if_com_free[type] = f;
4091 if_deregister_com_alloc(u_char type)
4094 KASSERT(if_com_alloc[type] != NULL,
4095 ("if_deregister_com_alloc: %d not registered", type));
4096 KASSERT(if_com_free[type] != NULL,
4097 ("if_deregister_com_alloc: %d free not registered", type));
4098 if_com_alloc[type] = NULL;
4099 if_com_free[type] = NULL;
4102 /* API for driver access to network stack owned ifnet.*/
4104 if_setbaudrate(struct ifnet *ifp, uint64_t baudrate)
4108 oldbrate = ifp->if_baudrate;
4109 ifp->if_baudrate = baudrate;
4114 if_getbaudrate(if_t ifp)
4117 return (((struct ifnet *)ifp)->if_baudrate);
4121 if_setcapabilities(if_t ifp, int capabilities)
4123 ((struct ifnet *)ifp)->if_capabilities = capabilities;
4128 if_setcapabilitiesbit(if_t ifp, int setbit, int clearbit)
4130 ((struct ifnet *)ifp)->if_capabilities |= setbit;
4131 ((struct ifnet *)ifp)->if_capabilities &= ~clearbit;
4137 if_getcapabilities(if_t ifp)
4139 return ((struct ifnet *)ifp)->if_capabilities;
4143 if_setcapenable(if_t ifp, int capabilities)
4145 ((struct ifnet *)ifp)->if_capenable = capabilities;
4150 if_setcapenablebit(if_t ifp, int setcap, int clearcap)
4153 ((struct ifnet *)ifp)->if_capenable |= setcap;
4155 ((struct ifnet *)ifp)->if_capenable &= ~clearcap;
4161 if_getdname(if_t ifp)
4163 return ((struct ifnet *)ifp)->if_dname;
4167 if_togglecapenable(if_t ifp, int togglecap)
4169 ((struct ifnet *)ifp)->if_capenable ^= togglecap;
4174 if_getcapenable(if_t ifp)
4176 return ((struct ifnet *)ifp)->if_capenable;
4180 * This is largely undesirable because it ties ifnet to a device, but does
4181 * provide flexiblity for an embedded product vendor. Should be used with
4182 * the understanding that it violates the interface boundaries, and should be
4183 * a last resort only.
4186 if_setdev(if_t ifp, void *dev)
4192 if_setdrvflagbits(if_t ifp, int set_flags, int clear_flags)
4194 ((struct ifnet *)ifp)->if_drv_flags |= set_flags;
4195 ((struct ifnet *)ifp)->if_drv_flags &= ~clear_flags;
4201 if_getdrvflags(if_t ifp)
4203 return ((struct ifnet *)ifp)->if_drv_flags;
4207 if_setdrvflags(if_t ifp, int flags)
4209 ((struct ifnet *)ifp)->if_drv_flags = flags;
4215 if_setflags(if_t ifp, int flags)
4217 ((struct ifnet *)ifp)->if_flags = flags;
4222 if_setflagbits(if_t ifp, int set, int clear)
4224 ((struct ifnet *)ifp)->if_flags |= set;
4225 ((struct ifnet *)ifp)->if_flags &= ~clear;
4231 if_getflags(if_t ifp)
4233 return ((struct ifnet *)ifp)->if_flags;
4237 if_clearhwassist(if_t ifp)
4239 ((struct ifnet *)ifp)->if_hwassist = 0;
4244 if_sethwassistbits(if_t ifp, int toset, int toclear)
4246 ((struct ifnet *)ifp)->if_hwassist |= toset;
4247 ((struct ifnet *)ifp)->if_hwassist &= ~toclear;
4253 if_sethwassist(if_t ifp, int hwassist_bit)
4255 ((struct ifnet *)ifp)->if_hwassist = hwassist_bit;
4260 if_gethwassist(if_t ifp)
4262 return ((struct ifnet *)ifp)->if_hwassist;
4266 if_setmtu(if_t ifp, int mtu)
4268 ((struct ifnet *)ifp)->if_mtu = mtu;
4275 return ((struct ifnet *)ifp)->if_mtu;
4279 if_getmtu_family(if_t ifp, int family)
4283 for (dp = domains; dp; dp = dp->dom_next) {
4284 if (dp->dom_family == family && dp->dom_ifmtu != NULL)
4285 return (dp->dom_ifmtu((struct ifnet *)ifp));
4288 return (((struct ifnet *)ifp)->if_mtu);
4292 if_setsoftc(if_t ifp, void *softc)
4294 ((struct ifnet *)ifp)->if_softc = softc;
4299 if_getsoftc(if_t ifp)
4301 return ((struct ifnet *)ifp)->if_softc;
4305 if_setrcvif(struct mbuf *m, if_t ifp)
4308 MPASS((m->m_pkthdr.csum_flags & CSUM_SND_TAG) == 0);
4309 m->m_pkthdr.rcvif = (struct ifnet *)ifp;
4313 if_setvtag(struct mbuf *m, uint16_t tag)
4315 m->m_pkthdr.ether_vtag = tag;
4319 if_getvtag(struct mbuf *m)
4322 return (m->m_pkthdr.ether_vtag);
4326 if_sendq_empty(if_t ifp)
4328 return IFQ_DRV_IS_EMPTY(&((struct ifnet *)ifp)->if_snd);
4332 if_getifaddr(if_t ifp)
4334 return ((struct ifnet *)ifp)->if_addr;
4338 if_getamcount(if_t ifp)
4340 return ((struct ifnet *)ifp)->if_amcount;
4345 if_setsendqready(if_t ifp)
4347 IFQ_SET_READY(&((struct ifnet *)ifp)->if_snd);
4352 if_setsendqlen(if_t ifp, int tx_desc_count)
4354 IFQ_SET_MAXLEN(&((struct ifnet *)ifp)->if_snd, tx_desc_count);
4355 ((struct ifnet *)ifp)->if_snd.ifq_drv_maxlen = tx_desc_count;
4361 if_vlantrunkinuse(if_t ifp)
4363 return ((struct ifnet *)ifp)->if_vlantrunk != NULL?1:0;
4367 if_input(if_t ifp, struct mbuf* sendmp)
4369 (*((struct ifnet *)ifp)->if_input)((struct ifnet *)ifp, sendmp);
4375 #ifndef ETH_ADDR_LEN
4376 #define ETH_ADDR_LEN 6
4380 if_setupmultiaddr(if_t ifp, void *mta, int *cnt, int max)
4382 struct ifmultiaddr *ifma;
4383 uint8_t *lmta = (uint8_t *)mta;
4386 CK_STAILQ_FOREACH(ifma, &((struct ifnet *)ifp)->if_multiaddrs, ifma_link) {
4387 if (ifma->ifma_addr->sa_family != AF_LINK)
4393 bcopy(LLADDR((struct sockaddr_dl *)ifma->ifma_addr),
4394 &lmta[mcnt * ETH_ADDR_LEN], ETH_ADDR_LEN);
4403 if_multiaddr_array(if_t ifp, void *mta, int *cnt, int max)
4407 if_maddr_rlock(ifp);
4408 error = if_setupmultiaddr(ifp, mta, cnt, max);
4409 if_maddr_runlock(ifp);
4414 if_multiaddr_count(if_t ifp, int max)
4416 struct ifmultiaddr *ifma;
4420 if_maddr_rlock(ifp);
4421 CK_STAILQ_FOREACH(ifma, &((struct ifnet *)ifp)->if_multiaddrs, ifma_link) {
4422 if (ifma->ifma_addr->sa_family != AF_LINK)
4428 if_maddr_runlock(ifp);
4433 if_multi_apply(struct ifnet *ifp, int (*filter)(void *, struct ifmultiaddr *, int), void *arg)
4435 struct ifmultiaddr *ifma;
4438 if_maddr_rlock(ifp);
4439 CK_STAILQ_FOREACH(ifma, &ifp->if_multiaddrs, ifma_link)
4440 cnt += filter(arg, ifma, cnt);
4441 if_maddr_runlock(ifp);
4446 if_dequeue(if_t ifp)
4449 IFQ_DRV_DEQUEUE(&((struct ifnet *)ifp)->if_snd, m);
4455 if_sendq_prepend(if_t ifp, struct mbuf *m)
4457 IFQ_DRV_PREPEND(&((struct ifnet *)ifp)->if_snd, m);
4462 if_setifheaderlen(if_t ifp, int len)
4464 ((struct ifnet *)ifp)->if_hdrlen = len;
4469 if_getlladdr(if_t ifp)
4471 return (IF_LLADDR((struct ifnet *)ifp));
4475 if_gethandle(u_char type)
4477 return (if_alloc(type));
4481 if_bpfmtap(if_t ifh, struct mbuf *m)
4483 struct ifnet *ifp = (struct ifnet *)ifh;
4489 if_etherbpfmtap(if_t ifh, struct mbuf *m)
4491 struct ifnet *ifp = (struct ifnet *)ifh;
4493 ETHER_BPF_MTAP(ifp, m);
4497 if_vlancap(if_t ifh)
4499 struct ifnet *ifp = (struct ifnet *)ifh;
4500 VLAN_CAPABILITIES(ifp);
4504 if_sethwtsomax(if_t ifp, u_int if_hw_tsomax)
4507 ((struct ifnet *)ifp)->if_hw_tsomax = if_hw_tsomax;
4512 if_sethwtsomaxsegcount(if_t ifp, u_int if_hw_tsomaxsegcount)
4515 ((struct ifnet *)ifp)->if_hw_tsomaxsegcount = if_hw_tsomaxsegcount;
4520 if_sethwtsomaxsegsize(if_t ifp, u_int if_hw_tsomaxsegsize)
4523 ((struct ifnet *)ifp)->if_hw_tsomaxsegsize = if_hw_tsomaxsegsize;
4528 if_gethwtsomax(if_t ifp)
4531 return (((struct ifnet *)ifp)->if_hw_tsomax);
4535 if_gethwtsomaxsegcount(if_t ifp)
4538 return (((struct ifnet *)ifp)->if_hw_tsomaxsegcount);
4542 if_gethwtsomaxsegsize(if_t ifp)
4545 return (((struct ifnet *)ifp)->if_hw_tsomaxsegsize);
4549 if_setinitfn(if_t ifp, void (*init_fn)(void *))
4551 ((struct ifnet *)ifp)->if_init = init_fn;
4555 if_setioctlfn(if_t ifp, int (*ioctl_fn)(if_t, u_long, caddr_t))
4557 ((struct ifnet *)ifp)->if_ioctl = (void *)ioctl_fn;
4561 if_setstartfn(if_t ifp, void (*start_fn)(if_t))
4563 ((struct ifnet *)ifp)->if_start = (void *)start_fn;
4567 if_settransmitfn(if_t ifp, if_transmit_fn_t start_fn)
4569 ((struct ifnet *)ifp)->if_transmit = start_fn;
4572 void if_setqflushfn(if_t ifp, if_qflush_fn_t flush_fn)
4574 ((struct ifnet *)ifp)->if_qflush = flush_fn;
4579 if_setgetcounterfn(if_t ifp, if_get_counter_t fn)
4582 ifp->if_get_counter = fn;
4585 /* Revisit these - These are inline functions originally. */
4587 drbr_inuse_drv(if_t ifh, struct buf_ring *br)
4589 return drbr_inuse(ifh, br);
4593 drbr_dequeue_drv(if_t ifh, struct buf_ring *br)
4595 return drbr_dequeue(ifh, br);
4599 drbr_needs_enqueue_drv(if_t ifh, struct buf_ring *br)
4601 return drbr_needs_enqueue(ifh, br);
4605 drbr_enqueue_drv(if_t ifh, struct buf_ring *br, struct mbuf *m)
4607 return drbr_enqueue(ifh, br, m);