2 * Copyright (c) 2003-2020 Apple Inc. All rights reserved.
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
29 * Copyright 1998 Massachusetts Institute of Technology
31 * Permission to use, copy, modify, and distribute this software and
32 * its documentation for any purpose and without fee is hereby
33 * granted, provided that both the above copyright notice and this
34 * permission notice appear in all copies, that both the above
35 * copyright notice and this permission notice appear in all
36 * supporting documentation, and that the name of M.I.T. not be used
37 * in advertising or publicity pertaining to distribution of the
38 * software without specific, written prior permission. M.I.T. makes
39 * no representations about the suitability of this software for any
40 * purpose. It is provided "as is" without express or implied
43 * THIS SOFTWARE IS PROVIDED BY M.I.T. ``AS IS''. M.I.T. DISCLAIMS
44 * ALL EXPRESS OR IMPLIED WARRANTIES WITH REGARD TO THIS SOFTWARE,
45 * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
46 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
47 * SHALL M.I.T. BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
48 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
49 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
50 * USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
51 * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
52 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
53 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
56 * $FreeBSD: src/sys/net/if_vlan.c,v 1.54 2003/10/31 18:32:08 brooks Exp $
60 * if_vlan.c - pseudo-device driver for IEEE 802.1Q virtual LANs.
61 * Might be extended some day to also handle IEEE 802.1p priority
62 * tagging. This is sort of sneaky in the implementation, since
63 * we need to pretend to be enough of an Ethernet implementation
64 * to make arp work. The way we do this is by telling everyone
65 * that we are an Ethernet, and then catch the packets that
66 * ether_output() left on our output queue when it calls
67 * if_start(), rewrite them for use by the real outgoing interface,
68 * and ask it to send them.
72 #include <sys/param.h>
73 #include <sys/kernel.h>
74 #include <sys/malloc.h>
76 #include <sys/queue.h>
77 #include <sys/socket.h>
78 #include <sys/sockio.h>
79 #include <sys/sysctl.h>
80 #include <sys/systm.h>
81 #include <sys/kern_event.h>
82 #include <sys/mcache.h>
85 #include <net/ethernet.h>
87 #include <net/if_arp.h>
88 #include <net/if_dl.h>
89 #include <net/if_ether.h>
90 #include <net/if_types.h>
91 #include <net/if_vlan_var.h>
92 #include <libkern/OSAtomic.h>
96 #include <net/kpi_interface.h>
97 #include <net/kpi_protocol.h>
99 #include <kern/locks.h>
100 #include <kern/zalloc.h>
103 #include <netinet/in.h>
104 #include <netinet/if_ether.h>
107 #include <net/if_media.h>
108 #include <net/multicast_list.h>
109 #include <net/ether_if_module.h>
111 #define VLANNAME "vlan"
116 static __inline__ lck_grp_t
*
117 my_lck_grp_alloc_init(const char * grp_name
)
120 lck_grp_attr_t
* grp_attrs
;
122 grp_attrs
= lck_grp_attr_alloc_init();
123 grp
= lck_grp_alloc_init(grp_name
, grp_attrs
);
124 lck_grp_attr_free(grp_attrs
);
128 static __inline__ lck_mtx_t
*
129 my_lck_mtx_alloc_init(lck_grp_t
* lck_grp
)
131 lck_attr_t
* lck_attrs
;
134 lck_attrs
= lck_attr_alloc_init();
135 lck_mtx
= lck_mtx_alloc_init(lck_grp
, lck_attrs
);
136 lck_attr_free(lck_attrs
);
140 static lck_mtx_t
* vlan_lck_mtx
;
142 static __inline__
void
145 lck_grp_t
* vlan_lck_grp
;
147 vlan_lck_grp
= my_lck_grp_alloc_init("if_vlan");
148 vlan_lck_mtx
= my_lck_mtx_alloc_init(vlan_lck_grp
);
151 static __inline__
void
152 vlan_assert_lock_held(void)
154 LCK_MTX_ASSERT(vlan_lck_mtx
, LCK_MTX_ASSERT_OWNED
);
158 static __inline__
void
159 vlan_assert_lock_not_held(void)
161 LCK_MTX_ASSERT(vlan_lck_mtx
, LCK_MTX_ASSERT_NOTOWNED
);
165 static __inline__
void
168 lck_mtx_lock(vlan_lck_mtx
);
172 static __inline__
void
175 lck_mtx_unlock(vlan_lck_mtx
);
180 ** vlan structures, types
183 LIST_HEAD(vlan_parent_list
, vlan_parent
);
185 LIST_HEAD(ifvlan_list
, ifvlan
);
187 typedef LIST_ENTRY(vlan_parent
)
189 typedef LIST_ENTRY(ifvlan
)
192 #define VLP_SIGNATURE 0xfaceface
193 typedef struct vlan_parent
{
194 vlan_parent_entry vlp_parent_list
;/* list of parents */
195 struct ifnet
* vlp_ifp
; /* interface */
196 struct ifvlan_list vlp_vlan_list
;/* list of VLAN's */
197 #define VLPF_SUPPORTS_VLAN_MTU 0x00000001
198 #define VLPF_CHANGE_IN_PROGRESS 0x00000002
199 #define VLPF_DETACHING 0x00000004
200 #define VLPF_LINK_EVENT_REQUIRED 0x00000008
202 u_int32_t vlp_event_code
;
203 struct ifdevmtu vlp_devmtu
;
204 int32_t vlp_retain_count
;
205 u_int32_t vlp_signature
;/* VLP_SIGNATURE */
206 } vlan_parent
, * vlan_parent_ref
;
208 #define IFV_SIGNATURE 0xbeefbeef
210 ifvlan_entry ifv_vlan_list
;
211 char ifv_name
[IFNAMSIZ
];/* our unique id */
212 struct ifnet
* ifv_ifp
; /* our interface */
213 vlan_parent_ref ifv_vlp
; /* parent information */
215 u_int16_t ifvm_encaplen
;/* encapsulation length */
216 u_int16_t ifvm_mtufudge
;/* MTU fudged by this much */
217 u_int16_t ifvm_proto
; /* encapsulation ethertype */
218 u_int16_t ifvm_tag
; /* tag to apply on packets leaving if */
220 struct multicast_list ifv_multicast
;
221 #define IFVF_PROMISC 0x1 /* promiscuous mode enabled */
222 #define IFVF_DETACHING 0x2 /* interface is detaching */
223 #define IFVF_READY 0x4 /* interface is ready */
225 int32_t ifv_retain_count
;
226 u_int32_t ifv_signature
;/* IFV_SIGNATURE */
229 typedef struct ifvlan
* ifvlan_ref
;
231 typedef struct vlan_globals_s
{
232 struct vlan_parent_list parent_list
;
234 } * vlan_globals_ref
;
236 static vlan_globals_ref g_vlan
;
238 #define ifv_tag ifv_mib.ifvm_tag
239 #define ifv_encaplen ifv_mib.ifvm_encaplen
240 #define ifv_mtufudge ifv_mib.ifvm_mtufudge
243 vlan_parent_retain(vlan_parent_ref vlp
);
246 vlan_parent_release(vlan_parent_ref vlp
);
249 ** vlan_parent_ref vlp_flags in-lines
251 static __inline__
int
252 vlan_parent_flags_supports_vlan_mtu(vlan_parent_ref vlp
)
254 return (vlp
->vlp_flags
& VLPF_SUPPORTS_VLAN_MTU
) != 0;
257 static __inline__
void
258 vlan_parent_flags_set_supports_vlan_mtu(vlan_parent_ref vlp
)
260 vlp
->vlp_flags
|= VLPF_SUPPORTS_VLAN_MTU
;
264 static __inline__
int
265 vlan_parent_flags_change_in_progress(vlan_parent_ref vlp
)
267 return (vlp
->vlp_flags
& VLPF_CHANGE_IN_PROGRESS
) != 0;
270 static __inline__
void
271 vlan_parent_flags_set_change_in_progress(vlan_parent_ref vlp
)
273 vlp
->vlp_flags
|= VLPF_CHANGE_IN_PROGRESS
;
277 static __inline__
void
278 vlan_parent_flags_clear_change_in_progress(vlan_parent_ref vlp
)
280 vlp
->vlp_flags
&= ~VLPF_CHANGE_IN_PROGRESS
;
284 static __inline__
int
285 vlan_parent_flags_detaching(struct vlan_parent
* vlp
)
287 return (vlp
->vlp_flags
& VLPF_DETACHING
) != 0;
290 static __inline__
void
291 vlan_parent_flags_set_detaching(struct vlan_parent
* vlp
)
293 vlp
->vlp_flags
|= VLPF_DETACHING
;
297 static __inline__
int
298 vlan_parent_flags_link_event_required(vlan_parent_ref vlp
)
300 return (vlp
->vlp_flags
& VLPF_LINK_EVENT_REQUIRED
) != 0;
303 static __inline__
void
304 vlan_parent_flags_set_link_event_required(vlan_parent_ref vlp
)
306 vlp
->vlp_flags
|= VLPF_LINK_EVENT_REQUIRED
;
310 static __inline__
void
311 vlan_parent_flags_clear_link_event_required(vlan_parent_ref vlp
)
313 vlp
->vlp_flags
&= ~VLPF_LINK_EVENT_REQUIRED
;
319 ** ifvlan_flags in-lines routines
321 static __inline__
int
322 ifvlan_flags_promisc(ifvlan_ref ifv
)
324 return (ifv
->ifv_flags
& IFVF_PROMISC
) != 0;
327 static __inline__
void
328 ifvlan_flags_set_promisc(ifvlan_ref ifv
)
330 ifv
->ifv_flags
|= IFVF_PROMISC
;
334 static __inline__
void
335 ifvlan_flags_clear_promisc(ifvlan_ref ifv
)
337 ifv
->ifv_flags
&= ~IFVF_PROMISC
;
341 static __inline__
int
342 ifvlan_flags_ready(ifvlan_ref ifv
)
344 return (ifv
->ifv_flags
& IFVF_READY
) != 0;
347 static __inline__
void
348 ifvlan_flags_set_ready(ifvlan_ref ifv
)
350 ifv
->ifv_flags
|= IFVF_READY
;
354 static __inline__
int
355 ifvlan_flags_detaching(ifvlan_ref ifv
)
357 return (ifv
->ifv_flags
& IFVF_DETACHING
) != 0;
360 static __inline__
void
361 ifvlan_flags_set_detaching(ifvlan_ref ifv
)
363 ifv
->ifv_flags
|= IFVF_DETACHING
;
368 SYSCTL_DECL(_net_link
);
369 SYSCTL_NODE(_net_link
, IFT_L2VLAN
, vlan
, CTLFLAG_RW
| CTLFLAG_LOCKED
, 0, "IEEE 802.1Q VLAN");
370 SYSCTL_NODE(_net_link_vlan
, PF_LINK
, link
, CTLFLAG_RW
| CTLFLAG_LOCKED
, 0, "for consistency");
373 #define VLAN_UNITMAX IF_MAXUNIT
374 #define VLAN_ZONE_MAX_ELEM MIN(IFNETS_MAX, VLAN_UNITMAX)
375 #define M_VLAN M_DEVBUF
377 static int vlan_clone_create(struct if_clone
*, u_int32_t
, void *);
378 static int vlan_clone_destroy(struct ifnet
*);
379 static int vlan_input(ifnet_t ifp
, protocol_family_t protocol
,
380 mbuf_t m
, char *frame_header
);
381 static int vlan_output(struct ifnet
*ifp
, struct mbuf
*m
);
382 static int vlan_ioctl(ifnet_t ifp
, u_long cmd
, void * addr
);
383 static int vlan_attach_protocol(struct ifnet
*ifp
);
384 static int vlan_detach_protocol(struct ifnet
*ifp
);
385 static int vlan_setmulti(struct ifnet
*ifp
);
386 static int vlan_unconfig(ifvlan_ref ifv
, int need_to_wait
);
387 static int vlan_config(struct ifnet
* ifp
, struct ifnet
* p
, int tag
);
388 static void vlan_if_free(struct ifnet
* ifp
);
389 static int vlan_remove(ifvlan_ref ifv
, int need_to_wait
);
391 static struct if_clone vlan_cloner
= IF_CLONE_INITIALIZER(VLANNAME
,
397 sizeof(struct ifvlan
));
398 static void interface_link_event(struct ifnet
* ifp
, u_int32_t event_code
);
399 static void vlan_parent_link_event(struct ifnet
* p
,
400 u_int32_t event_code
);
402 static int ifvlan_new_mtu(ifvlan_ref ifv
, int mtu
);
405 ** ifvlan_ref routines
408 ifvlan_retain(ifvlan_ref ifv
)
410 if (ifv
->ifv_signature
!= IFV_SIGNATURE
) {
411 panic("ifvlan_retain: bad signature\n");
413 if (ifv
->ifv_retain_count
== 0) {
414 panic("ifvlan_retain: retain count is 0\n");
416 OSIncrementAtomic(&ifv
->ifv_retain_count
);
420 ifvlan_release(ifvlan_ref ifv
)
422 u_int32_t old_retain_count
;
424 if (ifv
->ifv_signature
!= IFV_SIGNATURE
) {
425 panic("ifvlan_release: bad signature\n");
427 old_retain_count
= OSDecrementAtomic(&ifv
->ifv_retain_count
);
428 switch (old_retain_count
) {
430 panic("ifvlan_release: retain count is 0\n");
433 if (g_vlan
->verbose
) {
434 printf("ifvlan_release(%s)\n", ifv
->ifv_name
);
436 ifv
->ifv_signature
= 0;
437 if_clone_softc_deallocate(&vlan_cloner
, ifv
);
445 static vlan_parent_ref
446 ifvlan_get_vlan_parent_retained(ifvlan_ref ifv
)
448 vlan_parent_ref vlp
= ifv
->ifv_vlp
;
450 if (vlp
== NULL
|| vlan_parent_flags_detaching(vlp
)) {
453 vlan_parent_retain(vlp
);
462 ifnet_get_ifvlan(struct ifnet
* ifp
)
466 ifv
= (ifvlan_ref
)ifnet_softc(ifp
);
471 ifnet_get_ifvlan_retained(struct ifnet
* ifp
)
475 ifv
= ifnet_get_ifvlan(ifp
);
479 if (ifvlan_flags_detaching(ifv
)) {
487 ifnet_ifvlan_vlan_parent_ok(struct ifnet
* ifp
, ifvlan_ref ifv
,
490 ifvlan_ref check_ifv
;
492 check_ifv
= ifnet_get_ifvlan(ifp
);
493 if (check_ifv
!= ifv
|| ifvlan_flags_detaching(ifv
)) {
494 /* ifvlan_ref no longer valid */
497 if (ifv
->ifv_vlp
!= vlp
) {
498 /* vlan_parent no longer valid */
501 if (vlan_parent_flags_detaching(vlp
)) {
502 /* parent is detaching */
509 ** vlan, etc. routines
513 vlan_globals_init(void)
517 vlan_assert_lock_not_held();
519 if (g_vlan
!= NULL
) {
522 v
= _MALLOC(sizeof(*v
), M_VLAN
, M_WAITOK
);
524 LIST_INIT(&v
->parent_list
);
528 if (g_vlan
!= NULL
) {
544 siocgifdevmtu(struct ifnet
* ifp
, struct ifdevmtu
* ifdm_p
)
549 bzero(&ifr
, sizeof(ifr
));
550 error
= ifnet_ioctl(ifp
, 0, SIOCGIFDEVMTU
, &ifr
);
552 *ifdm_p
= ifr
.ifr_devmtu
;
558 siocsifaltmtu(struct ifnet
* ifp
, int mtu
)
562 bzero(&ifr
, sizeof(ifr
));
564 return ifnet_ioctl(ifp
, 0, SIOCSIFALTMTU
, &ifr
);
568 ** vlan_parent synchronization routines
571 vlan_parent_retain(vlan_parent_ref vlp
)
573 if (vlp
->vlp_signature
!= VLP_SIGNATURE
) {
574 panic("vlan_parent_retain: signature is bad\n");
576 if (vlp
->vlp_retain_count
== 0) {
577 panic("vlan_parent_retain: retain count is 0\n");
579 OSIncrementAtomic(&vlp
->vlp_retain_count
);
583 vlan_parent_release(vlan_parent_ref vlp
)
585 u_int32_t old_retain_count
;
587 if (vlp
->vlp_signature
!= VLP_SIGNATURE
) {
588 panic("vlan_parent_release: signature is bad\n");
590 old_retain_count
= OSDecrementAtomic(&vlp
->vlp_retain_count
);
591 switch (old_retain_count
) {
593 panic("vlan_parent_release: retain count is 0\n");
596 if (g_vlan
->verbose
) {
597 struct ifnet
* ifp
= vlp
->vlp_ifp
;
598 printf("vlan_parent_release(%s%d)\n", ifnet_name(ifp
),
601 vlp
->vlp_signature
= 0;
611 * Function: vlan_parent_wait
613 * Allows a single thread to gain exclusive access to the vlan_parent
614 * data structure. Some operations take a long time to complete,
615 * and some have side-effects that we can't predict. Holding the
616 * vlan_lock() across such operations is not possible.
619 * Before calling, you must be holding the vlan_lock and have taken
620 * a reference on the vlan_parent_ref.
623 vlan_parent_wait(vlan_parent_ref vlp
, const char * msg
)
627 /* other add/remove/multicast-change in progress */
628 while (vlan_parent_flags_change_in_progress(vlp
)) {
629 if (g_vlan
->verbose
) {
630 struct ifnet
* ifp
= vlp
->vlp_ifp
;
632 printf("%s%d: %s msleep\n", ifnet_name(ifp
), ifnet_unit(ifp
), msg
);
635 (void)msleep(vlp
, vlan_lck_mtx
, PZERO
, msg
, 0);
637 /* prevent other vlan parent remove/add from taking place */
638 vlan_parent_flags_set_change_in_progress(vlp
);
639 if (g_vlan
->verbose
&& waited
) {
640 struct ifnet
* ifp
= vlp
->vlp_ifp
;
642 printf("%s%d: %s woke up\n", ifnet_name(ifp
), ifnet_unit(ifp
), msg
);
648 * Function: vlan_parent_signal
650 * Allows the thread that previously invoked vlan_parent_wait() to
651 * give up exclusive access to the vlan_parent data structure, and wake up
652 * any other threads waiting to access
654 * Before calling, you must be holding the vlan_lock and have taken
655 * a reference on the vlan_parent_ref.
658 vlan_parent_signal(vlan_parent_ref vlp
, const char * msg
)
660 struct ifnet
* vlp_ifp
= vlp
->vlp_ifp
;
662 if (vlan_parent_flags_link_event_required(vlp
)) {
663 vlan_parent_flags_clear_link_event_required(vlp
);
664 if (!vlan_parent_flags_detaching(vlp
)) {
665 u_int32_t event_code
= vlp
->vlp_event_code
;
670 /* we can safely walk the list unlocked */
671 LIST_FOREACH(ifv
, &vlp
->vlp_vlan_list
, ifv_vlan_list
) {
672 struct ifnet
* ifp
= ifv
->ifv_ifp
;
674 interface_link_event(ifp
, event_code
);
676 if (g_vlan
->verbose
) {
677 printf("%s%d: propagated link event to vlans\n",
678 ifnet_name(vlp_ifp
), ifnet_unit(vlp_ifp
));
683 vlan_parent_flags_clear_change_in_progress(vlp
);
684 wakeup((caddr_t
)vlp
);
685 if (g_vlan
->verbose
) {
686 printf("%s%d: %s wakeup\n",
687 ifnet_name(vlp_ifp
), ifnet_unit(vlp_ifp
), msg
);
693 * Program our multicast filter. What we're actually doing is
694 * programming the multicast filter of the parent. This has the
695 * side effect of causing the parent interface to receive multicast
696 * traffic that it doesn't really want, which ends up being discarded
697 * later by the upper protocol layers. Unfortunately, there's no way
698 * to avoid this: there really is only one physical interface.
701 vlan_setmulti(struct ifnet
* ifp
)
706 vlan_parent_ref vlp
= NULL
;
709 ifv
= ifnet_get_ifvlan_retained(ifp
);
713 vlp
= ifvlan_get_vlan_parent_retained(ifv
);
715 /* no parent, no need to program the multicast filter */
718 vlan_parent_wait(vlp
, "vlan_setmulti");
720 /* check again, things could have changed */
721 if (ifnet_ifvlan_vlan_parent_ok(ifp
, ifv
, vlp
) == FALSE
) {
727 /* update parent interface with our multicast addresses */
728 error
= multicast_list_program(&ifv
->ifv_multicast
, ifp
, p
);
733 vlan_parent_signal(vlp
, "vlan_setmulti");
741 vlan_parent_release(vlp
);
747 ** vlan_parent list manipulation/lookup routines
749 static vlan_parent_ref
750 parent_list_lookup(struct ifnet
* p
)
754 LIST_FOREACH(vlp
, &g_vlan
->parent_list
, vlp_parent_list
) {
755 if (vlp
->vlp_ifp
== p
) {
763 vlan_parent_lookup_tag(vlan_parent_ref vlp
, int tag
)
767 LIST_FOREACH(ifv
, &vlp
->vlp_vlan_list
, ifv_vlan_list
) {
768 if (tag
== ifv
->ifv_tag
) {
776 vlan_lookup_parent_and_tag(struct ifnet
* p
, int tag
)
780 vlp
= parent_list_lookup(p
);
782 return vlan_parent_lookup_tag(vlp
, tag
);
788 vlan_parent_find_max_mtu(vlan_parent_ref vlp
, ifvlan_ref exclude_ifv
)
793 LIST_FOREACH(ifv
, &vlp
->vlp_vlan_list
, ifv_vlan_list
) {
796 if (exclude_ifv
== ifv
) {
799 req_mtu
= ifnet_mtu(ifv
->ifv_ifp
) + ifv
->ifv_mtufudge
;
800 if (req_mtu
> max_mtu
) {
808 * Function: vlan_parent_create
810 * Create a vlan_parent structure to hold the VLAN's for the given
811 * interface. Add it to the list of VLAN parents.
814 vlan_parent_create(struct ifnet
* p
, vlan_parent_ref
* ret_vlp
)
820 vlp
= _MALLOC(sizeof(*vlp
), M_VLAN
, M_WAITOK
| M_ZERO
);
824 error
= siocgifdevmtu(p
, &vlp
->vlp_devmtu
);
826 printf("vlan_parent_create (%s%d): siocgifdevmtu failed, %d\n",
827 ifnet_name(p
), ifnet_unit(p
), error
);
831 LIST_INIT(&vlp
->vlp_vlan_list
);
833 vlp
->vlp_retain_count
= 1;
834 vlp
->vlp_signature
= VLP_SIGNATURE
;
836 & (IF_HWASSIST_VLAN_MTU
| IF_HWASSIST_VLAN_TAGGING
)) {
837 vlan_parent_flags_set_supports_vlan_mtu(vlp
);
844 vlan_parent_remove_all_vlans(struct ifnet
* p
)
847 int need_vlp_release
= 0;
852 vlp
= parent_list_lookup(p
);
853 if (vlp
== NULL
|| vlan_parent_flags_detaching(vlp
)) {
858 vlan_parent_flags_set_detaching(vlp
);
859 vlan_parent_retain(vlp
);
860 vlan_parent_wait(vlp
, "vlan_parent_remove_all_vlans");
864 if (parent_list_lookup(p
) != vlp
) {
868 for (ifv
= LIST_FIRST(&vlp
->vlp_vlan_list
); ifv
!= NULL
; ifv
= next
) {
869 struct ifnet
* ifp
= ifv
->ifv_ifp
;
872 next
= LIST_NEXT(ifv
, ifv_vlan_list
);
873 removed
= vlan_remove(ifv
, FALSE
);
881 /* the vlan parent has no more VLAN's */
882 if_clear_eflags(p
, IFEF_VLAN
); /* clear IFEF_VLAN */
884 LIST_REMOVE(vlp
, vlp_parent_list
);
885 need_vlp_release
++; /* one for being in the list */
886 need_vlp_release
++; /* final reference */
889 vlan_parent_signal(vlp
, "vlan_parent_remove_all_vlans");
892 while (need_vlp_release
--) {
893 vlan_parent_release(vlp
);
898 static __inline__
int
899 vlan_parent_no_vlans(vlan_parent_ref vlp
)
901 return LIST_EMPTY(&vlp
->vlp_vlan_list
);
905 vlan_parent_add_vlan(vlan_parent_ref vlp
, ifvlan_ref ifv
, int tag
)
907 LIST_INSERT_HEAD(&vlp
->vlp_vlan_list
, ifv
, ifv_vlan_list
);
914 vlan_parent_remove_vlan(__unused vlan_parent_ref vlp
, ifvlan_ref ifv
)
917 LIST_REMOVE(ifv
, ifv_vlan_list
);
922 vlan_clone_attach(void)
926 error
= if_clone_attach(&vlan_cloner
);
935 vlan_clone_create(struct if_clone
*ifc
, u_int32_t unit
, __unused
void *params
)
940 struct ifnet_init_eparams vlan_init
;
942 error
= vlan_globals_init();
946 ifv
= if_clone_softc_allocate(&vlan_cloner
);
950 ifv
->ifv_retain_count
= 1;
951 ifv
->ifv_signature
= IFV_SIGNATURE
;
952 multicast_list_init(&ifv
->ifv_multicast
);
954 /* use the interface name as the unique id for ifp recycle */
956 snprintf(ifv
->ifv_name
, sizeof(ifv
->ifv_name
), "%s%d",
957 ifc
->ifc_name
, unit
) >= sizeof(ifv
->ifv_name
)) {
962 bzero(&vlan_init
, sizeof(vlan_init
));
963 vlan_init
.ver
= IFNET_INIT_CURRENT_VERSION
;
964 vlan_init
.len
= sizeof(vlan_init
);
965 vlan_init
.flags
= IFNET_INIT_LEGACY
;
966 vlan_init
.uniqueid
= ifv
->ifv_name
;
967 vlan_init
.uniqueid_len
= strlen(ifv
->ifv_name
);
968 vlan_init
.name
= ifc
->ifc_name
;
969 vlan_init
.unit
= unit
;
970 vlan_init
.family
= IFNET_FAMILY_VLAN
;
971 vlan_init
.type
= IFT_L2VLAN
;
972 vlan_init
.output
= vlan_output
;
973 vlan_init
.demux
= ether_demux
;
974 vlan_init
.add_proto
= ether_add_proto
;
975 vlan_init
.del_proto
= ether_del_proto
;
976 vlan_init
.check_multi
= ether_check_multi
;
977 vlan_init
.framer_extended
= ether_frameout_extended
;
978 vlan_init
.softc
= ifv
;
979 vlan_init
.ioctl
= vlan_ioctl
;
980 vlan_init
.set_bpf_tap
= NULL
;
981 vlan_init
.detach
= vlan_if_free
;
982 vlan_init
.broadcast_addr
= etherbroadcastaddr
;
983 vlan_init
.broadcast_len
= ETHER_ADDR_LEN
;
984 error
= ifnet_allocate_extended(&vlan_init
, &ifp
);
991 ifnet_set_offload(ifp
, 0);
992 ifnet_set_addrlen(ifp
, ETHER_ADDR_LEN
); /* XXX ethernet specific */
993 ifnet_set_baudrate(ifp
, 0);
994 ifnet_set_hdrlen(ifp
, ETHER_VLAN_ENCAP_LEN
);
995 ifnet_set_mtu(ifp
, ETHERMTU
);
997 error
= ifnet_attach(ifp
, NULL
);
1000 ifvlan_release(ifv
);
1005 /* attach as ethernet */
1006 bpfattach(ifp
, DLT_EN10MB
, sizeof(struct ether_header
));
1011 vlan_remove(ifvlan_ref ifv
, int need_to_wait
)
1013 vlan_assert_lock_held();
1014 if (ifvlan_flags_detaching(ifv
)) {
1017 ifvlan_flags_set_detaching(ifv
);
1018 vlan_unconfig(ifv
, need_to_wait
);
1024 vlan_clone_destroy(struct ifnet
*ifp
)
1029 ifv
= ifnet_get_ifvlan_retained(ifp
);
1034 if (vlan_remove(ifv
, TRUE
) == 0) {
1036 ifvlan_release(ifv
);
1040 ifvlan_release(ifv
);
1047 vlan_output(struct ifnet
* ifp
, struct mbuf
* m
)
1049 struct ether_vlan_header
* evl
;
1055 vlan_parent_ref vlp
= NULL
;
1057 struct flowadv adv
= { .code
= FADV_SUCCESS
};
1062 if ((m
->m_flags
& M_PKTHDR
) == 0) {
1067 ifv
= ifnet_get_ifvlan_retained(ifp
);
1068 if (ifv
== NULL
|| ifvlan_flags_ready(ifv
) == 0) {
1071 vlp
= ifvlan_get_vlan_parent_retained(ifv
);
1076 (void)ifnet_stat_increment_out(ifp
, 1, m
->m_pkthdr
.len
, 0);
1077 soft_vlan
= (ifnet_offload(p
) & IF_HWASSIST_VLAN_TAGGING
) == 0;
1079 encaplen
= ifv
->ifv_encaplen
;
1082 ifvlan_release(ifv
);
1083 vlan_parent_release(vlp
);
1085 bpf_tap_out(ifp
, DLT_EN10MB
, m
, NULL
, 0);
1087 /* do not run parent's if_output() if the parent is not up */
1088 if ((ifnet_flags(p
) & (IFF_UP
| IFF_RUNNING
)) != (IFF_UP
| IFF_RUNNING
)) {
1090 atomic_add_64(&ifp
->if_collisions
, 1);
1094 * If underlying interface can do VLAN tag insertion itself,
1095 * just pass the packet along. However, we need some way to
1096 * tell the interface where the packet came from so that it
1097 * knows how to find the VLAN tag to use. We use a field in
1098 * the mbuf header to store the VLAN tag, and a bit in the
1099 * csum_flags field to mark the field as valid.
1101 if (soft_vlan
== 0) {
1102 m
->m_pkthdr
.csum_flags
|= CSUM_VLAN_TAG_VALID
;
1103 m
->m_pkthdr
.vlan_tag
= tag
;
1105 M_PREPEND(m
, encaplen
, M_DONTWAIT
, 1);
1107 printf("%s%d: unable to prepend VLAN header\n", ifnet_name(ifp
),
1109 atomic_add_64(&ifp
->if_oerrors
, 1);
1112 /* M_PREPEND takes care of m_len, m_pkthdr.len for us */
1113 if (m
->m_len
< (int)sizeof(*evl
)) {
1114 m
= m_pullup(m
, sizeof(*evl
));
1116 printf("%s%d: unable to pullup VLAN header\n", ifnet_name(ifp
),
1118 atomic_add_64(&ifp
->if_oerrors
, 1);
1124 * Transform the Ethernet header into an Ethernet header
1125 * with 802.1Q encapsulation.
1127 bcopy(mtod(m
, char *) + encaplen
,
1128 mtod(m
, char *), ETHER_HDR_LEN
);
1129 evl
= mtod(m
, struct ether_vlan_header
*);
1130 evl
->evl_proto
= evl
->evl_encap_proto
;
1131 evl
->evl_encap_proto
= htons(ETHERTYPE_VLAN
);
1132 evl
->evl_tag
= htons(tag
);
1134 /* adjust partial checksum offload offsets */
1135 if ((m
->m_pkthdr
.csum_flags
& (CSUM_DATA_VALID
|
1136 CSUM_PARTIAL
)) == (CSUM_DATA_VALID
| CSUM_PARTIAL
)) {
1137 m
->m_pkthdr
.csum_tx_start
+= ETHER_VLAN_ENCAP_LEN
;
1138 m
->m_pkthdr
.csum_tx_stuff
+= ETHER_VLAN_ENCAP_LEN
;
1142 err
= dlil_output(p
, PF_VLAN
, m
, NULL
, NULL
, 1, &adv
);
1145 if (adv
.code
== FADV_FLOW_CONTROLLED
) {
1147 } else if (adv
.code
== FADV_SUSPENDED
) {
1157 ifvlan_release(ifv
);
1160 vlan_parent_release(vlp
);
1167 vlan_input(ifnet_t p
, __unused protocol_family_t protocol
,
1168 mbuf_t m
, char *frame_header
)
1170 struct ether_vlan_header
* evl
;
1171 struct ifnet
* ifp
= NULL
;
1175 if (m
->m_pkthdr
.csum_flags
& CSUM_VLAN_TAG_VALID
) {
1177 * Packet is tagged, m contains a normal
1178 * Ethernet frame; the tag is stored out-of-band.
1180 m
->m_pkthdr
.csum_flags
&= ~CSUM_VLAN_TAG_VALID
;
1181 tag
= EVL_VLANOFTAG(m
->m_pkthdr
.vlan_tag
);
1182 m
->m_pkthdr
.vlan_tag
= 0;
1185 switch (ifnet_type(p
)) {
1187 case IFT_IEEE8023ADLAG
:
1188 if (m
->m_len
< ETHER_VLAN_ENCAP_LEN
) {
1192 evl
= (struct ether_vlan_header
*)(void *)frame_header
;
1193 if (ntohs(evl
->evl_proto
) == ETHERTYPE_VLAN
) {
1194 /* don't allow VLAN within VLAN */
1198 tag
= EVL_VLANOFTAG(ntohs(evl
->evl_tag
));
1201 * Restore the original ethertype. We'll remove
1202 * the encapsulation after we've found the vlan
1203 * interface corresponding to the tag.
1205 evl
->evl_encap_proto
= evl
->evl_proto
;
1208 printf("vlan_demux: unsupported if type %u",
1217 if ((ifnet_eflags(p
) & IFEF_VLAN
) == 0) {
1218 /* don't bother looking through the VLAN list */
1223 ifv
= vlan_lookup_parent_and_tag(p
, tag
);
1228 || ifvlan_flags_ready(ifv
) == 0
1229 || (ifnet_flags(ifp
) & IFF_UP
) == 0) {
1238 * Packet had an in-line encapsulation header;
1239 * remove it. The original header has already
1240 * been fixed up above.
1242 m
->m_len
-= ETHER_VLAN_ENCAP_LEN
;
1243 m
->m_data
+= ETHER_VLAN_ENCAP_LEN
;
1244 m
->m_pkthdr
.len
-= ETHER_VLAN_ENCAP_LEN
;
1245 m
->m_pkthdr
.csum_flags
= 0; /* can't trust hardware checksum */
1248 m
->m_pkthdr
.rcvif
= ifp
;
1249 m
->m_pkthdr
.pkt_hdr
= frame_header
;
1250 (void)ifnet_stat_increment_in(ifp
, 1,
1251 m
->m_pkthdr
.len
+ ETHER_HDR_LEN
, 0);
1252 bpf_tap_in(ifp
, DLT_EN10MB
, m
, frame_header
, ETHER_HDR_LEN
);
1253 /* We found a vlan interface, inject on that interface. */
1254 dlil_input_packet_list(ifp
, m
);
1256 m
->m_pkthdr
.pkt_hdr
= frame_header
;
1257 /* Send priority-tagged packet up through the parent */
1258 dlil_input_packet_list(p
, m
);
1264 vlan_config(struct ifnet
* ifp
, struct ifnet
* p
, int tag
)
1268 int first_vlan
= FALSE
;
1269 ifvlan_ref ifv
= NULL
;
1270 int ifv_added
= FALSE
;
1271 int need_vlp_release
= 0;
1272 vlan_parent_ref new_vlp
= NULL
;
1273 ifnet_offload_t offload
;
1274 u_int16_t parent_flags
;
1275 vlan_parent_ref vlp
= NULL
;
1277 /* pre-allocate space for vlan_parent, in case we're first */
1278 error
= vlan_parent_create(p
, &new_vlp
);
1284 ifv
= ifnet_get_ifvlan_retained(ifp
);
1285 if (ifv
== NULL
|| ifv
->ifv_vlp
!= NULL
) {
1288 ifvlan_release(ifv
);
1290 vlan_parent_release(new_vlp
);
1293 vlp
= parent_list_lookup(p
);
1295 vlan_parent_retain(vlp
);
1297 if (vlan_parent_lookup_tag(vlp
, tag
) != NULL
) {
1298 /* already a VLAN with that tag on this interface */
1303 /* one for being in the list */
1304 vlan_parent_retain(new_vlp
);
1306 /* we're the first VLAN on this interface */
1307 LIST_INSERT_HEAD(&g_vlan
->parent_list
, new_vlp
, vlp_parent_list
);
1310 vlan_parent_retain(vlp
);
1314 /* need to wait to ensure no one else is trying to add/remove */
1315 vlan_parent_wait(vlp
, "vlan_config");
1317 if (ifnet_get_ifvlan(ifp
) != ifv
) {
1322 /* check again because someone might have gotten in */
1323 if (parent_list_lookup(p
) != vlp
) {
1328 if (vlan_parent_flags_detaching(vlp
)
1329 || ifvlan_flags_detaching(ifv
) || ifv
->ifv_vlp
!= NULL
) {
1334 /* check again because someone might have gotten the tag */
1335 if (vlan_parent_lookup_tag(vlp
, tag
) != NULL
) {
1336 /* already a VLAN with that tag on this interface */
1341 if (vlan_parent_no_vlans(vlp
)) {
1344 vlan_parent_add_vlan(vlp
, ifv
, tag
);
1345 ifvlan_retain(ifv
); /* parent references ifv */
1348 /* don't allow VLAN on interface that's part of a bond */
1349 if ((ifnet_eflags(p
) & IFEF_BOND
) != 0) {
1353 /* mark it as in use by VLAN */
1354 eflags
= if_set_eflags(p
, IFEF_VLAN
);
1355 if ((eflags
& IFEF_BOND
) != 0) {
1356 /* bond got in ahead of us */
1357 if_clear_eflags(p
, IFEF_VLAN
);
1364 /* attach our VLAN "protocol" to the interface */
1365 error
= vlan_attach_protocol(p
);
1372 /* configure parent to receive our multicast addresses */
1373 error
= multicast_list_program(&ifv
->ifv_multicast
, ifp
, p
);
1376 (void)vlan_detach_protocol(p
);
1382 /* set our ethernet address to that of the parent */
1383 ifnet_set_lladdr_and_type(ifp
, IF_LLADDR(p
), ETHER_ADDR_LEN
, IFT_ETHER
);
1385 /* no failures past this point */
1388 ifv
->ifv_encaplen
= ETHER_VLAN_ENCAP_LEN
;
1390 if (vlan_parent_flags_supports_vlan_mtu(vlp
)) {
1391 ifv
->ifv_mtufudge
= 0;
1394 * Fudge the MTU by the encapsulation size. This
1395 * makes us incompatible with strictly compliant
1396 * 802.1Q implementations, but allows us to use
1397 * the feature with other NetBSD implementations,
1398 * which might still be useful.
1400 ifv
->ifv_mtufudge
= ifv
->ifv_encaplen
;
1402 ifnet_set_mtu(ifp
, ETHERMTU
- ifv
->ifv_mtufudge
);
1405 * Copy only a selected subset of flags from the parent.
1406 * Other flags are none of our business.
1408 parent_flags
= ifnet_flags(p
)
1409 & (IFF_BROADCAST
| IFF_MULTICAST
| IFF_SIMPLEX
);
1410 ifnet_set_flags(ifp
, parent_flags
,
1411 IFF_BROADCAST
| IFF_MULTICAST
| IFF_SIMPLEX
);
1413 /* use hwassist bits from parent interface, but exclude VLAN bits */
1414 offload
= ifnet_offload(p
) & ~(IFNET_VLAN_TAGGING
| IFNET_VLAN_MTU
);
1415 ifnet_set_offload(ifp
, offload
);
1417 ifnet_set_flags(ifp
, IFF_RUNNING
, IFF_RUNNING
);
1418 ifvlan_flags_set_ready(ifv
);
1419 vlan_parent_signal(vlp
, "vlan_config");
1421 if (new_vlp
!= vlp
) {
1422 /* throw it away, it wasn't needed */
1423 vlan_parent_release(new_vlp
);
1426 ifvlan_release(ifv
);
1429 /* mark the parent interface up */
1430 ifnet_set_flags(p
, IFF_UP
, IFF_UP
);
1431 (void)ifnet_ioctl(p
, 0, SIOCSIFFLAGS
, (caddr_t
)NULL
);
1436 vlan_assert_lock_held();
1439 vlan_parent_remove_vlan(vlp
, ifv
);
1440 if (!vlan_parent_flags_detaching(vlp
) && vlan_parent_no_vlans(vlp
)) {
1441 /* the vlan parent has no more VLAN's */
1442 if_clear_eflags(p
, IFEF_VLAN
);
1443 LIST_REMOVE(vlp
, vlp_parent_list
);
1444 /* release outside of the lock below */
1447 /* one for being in the list */
1451 vlan_parent_signal(vlp
, "vlan_config");
1456 while (need_vlp_release
--) {
1457 vlan_parent_release(vlp
);
1459 if (new_vlp
!= vlp
) {
1460 vlan_parent_release(new_vlp
);
1464 ifvlan_release(ifv
);
1466 ifvlan_release(ifv
);
1472 vlan_link_event(struct ifnet
* ifp
, struct ifnet
* p
)
1474 struct ifmediareq ifmr
;
1476 /* generate a link event based on the state of the underlying interface */
1477 bzero(&ifmr
, sizeof(ifmr
));
1478 snprintf(ifmr
.ifm_name
, sizeof(ifmr
.ifm_name
),
1479 "%s%d", ifnet_name(p
), ifnet_unit(p
));
1480 if (ifnet_ioctl(p
, 0, SIOCGIFMEDIA
, &ifmr
) == 0
1481 && ifmr
.ifm_count
> 0 && ifmr
.ifm_status
& IFM_AVALID
) {
1484 event
= (ifmr
.ifm_status
& IFM_ACTIVE
)
1485 ? KEV_DL_LINK_ON
: KEV_DL_LINK_OFF
;
1486 interface_link_event(ifp
, event
);
1492 vlan_unconfig(ifvlan_ref ifv
, int need_to_wait
)
1494 struct ifnet
* ifp
= ifv
->ifv_ifp
;
1495 int last_vlan
= FALSE
;
1496 int need_ifv_release
= 0;
1497 int need_vlp_release
= 0;
1499 vlan_parent_ref vlp
;
1501 vlan_assert_lock_held();
1508 vlan_parent_retain(vlp
);
1509 vlan_parent_wait(vlp
, "vlan_unconfig");
1511 /* check again because another thread could be in vlan_unconfig */
1512 if (ifv
!= ifnet_get_ifvlan(ifp
)) {
1515 if (ifv
->ifv_vlp
!= vlp
) {
1516 /* vlan parent changed */
1521 /* ifv has a reference on vlp, need to remove it */
1525 /* remember whether we're the last VLAN on the parent */
1526 if (LIST_NEXT(LIST_FIRST(&vlp
->vlp_vlan_list
), ifv_vlan_list
) == NULL
) {
1527 if (g_vlan
->verbose
) {
1528 printf("vlan_unconfig: last vlan on %s%d\n",
1529 ifnet_name(p
), ifnet_unit(p
));
1534 /* back-out any effect our mtu might have had on the parent */
1535 (void)ifvlan_new_mtu(ifv
, ETHERMTU
- ifv
->ifv_mtufudge
);
1539 /* un-join multicast on parent interface */
1540 (void)multicast_list_remove(&ifv
->ifv_multicast
);
1542 /* Clear our MAC address. */
1543 ifnet_set_lladdr_and_type(ifp
, NULL
, 0, IFT_L2VLAN
);
1545 /* detach VLAN "protocol" */
1547 (void)vlan_detach_protocol(p
);
1552 /* return to the state we were in before SIFVLAN */
1553 ifnet_set_mtu(ifp
, ETHERMTU
);
1554 ifnet_set_flags(ifp
, 0,
1555 IFF_BROADCAST
| IFF_MULTICAST
| IFF_SIMPLEX
| IFF_RUNNING
);
1556 ifnet_set_offload(ifp
, 0);
1557 ifv
->ifv_mtufudge
= 0;
1559 /* Disconnect from parent. */
1560 vlan_parent_remove_vlan(vlp
, ifv
);
1563 /* vlan_parent has reference to ifv, remove it */
1566 /* from this point on, no more referencing ifv */
1567 if (last_vlan
&& !vlan_parent_flags_detaching(vlp
)) {
1568 /* the vlan parent has no more VLAN's */
1569 if_clear_eflags(p
, IFEF_VLAN
);
1570 LIST_REMOVE(vlp
, vlp_parent_list
);
1572 /* one for being in the list */
1575 /* release outside of the lock below */
1581 vlan_parent_signal(vlp
, "vlan_unconfig");
1584 while (need_ifv_release
--) {
1585 ifvlan_release(ifv
);
1587 while (need_vlp_release
--) { /* references to vlp */
1588 vlan_parent_release(vlp
);
1595 vlan_set_promisc(struct ifnet
* ifp
)
1599 vlan_parent_ref vlp
;
1602 ifv
= ifnet_get_ifvlan_retained(ifp
);
1612 if ((ifnet_flags(ifp
) & IFF_PROMISC
) != 0) {
1613 if (!ifvlan_flags_promisc(ifv
)) {
1614 error
= ifnet_set_promiscuous(vlp
->vlp_ifp
, 1);
1616 ifvlan_flags_set_promisc(ifv
);
1620 if (ifvlan_flags_promisc(ifv
)) {
1621 error
= ifnet_set_promiscuous(vlp
->vlp_ifp
, 0);
1623 ifvlan_flags_clear_promisc(ifv
);
1630 ifvlan_release(ifv
);
1636 ifvlan_new_mtu(ifvlan_ref ifv
, int mtu
)
1638 struct ifdevmtu
* devmtu_p
;
1640 struct ifnet
* ifp
= ifv
->ifv_ifp
;
1644 vlan_parent_ref vlp
;
1646 vlan_assert_lock_held();
1648 devmtu_p
= &vlp
->vlp_devmtu
;
1649 req_mtu
= mtu
+ ifv
->ifv_mtufudge
;
1650 if (req_mtu
> devmtu_p
->ifdm_max
|| req_mtu
< devmtu_p
->ifdm_min
) {
1653 max_mtu
= vlan_parent_find_max_mtu(vlp
, ifv
);
1654 if (req_mtu
> max_mtu
) {
1656 } else if (max_mtu
< devmtu_p
->ifdm_current
) {
1660 struct ifnet
* p
= vlp
->vlp_ifp
;
1662 error
= siocsifaltmtu(p
, new_mtu
);
1667 devmtu_p
->ifdm_current
= new_mtu
;
1669 ifnet_set_mtu(ifp
, mtu
);
1675 vlan_set_mtu(struct ifnet
* ifp
, int mtu
)
1679 vlan_parent_ref vlp
;
1681 if (mtu
< IF_MINMTU
) {
1685 ifv
= ifnet_get_ifvlan_retained(ifp
);
1690 vlp
= ifvlan_get_vlan_parent_retained(ifv
);
1693 ifvlan_release(ifv
);
1699 vlan_parent_wait(vlp
, "vlan_set_mtu");
1701 /* check again, something might have changed */
1702 if (ifnet_get_ifvlan(ifp
) != ifv
1703 || ifvlan_flags_detaching(ifv
)) {
1707 if (ifv
->ifv_vlp
!= vlp
) {
1708 /* vlan parent changed */
1711 if (vlan_parent_flags_detaching(vlp
)) {
1717 error
= ifvlan_new_mtu(ifv
, mtu
);
1720 vlan_parent_signal(vlp
, "vlan_set_mtu");
1722 vlan_parent_release(vlp
);
1723 ifvlan_release(ifv
);
1729 vlan_ioctl(ifnet_t ifp
, u_long cmd
, void * data
)
1731 struct ifdevmtu
* devmtu_p
;
1733 struct ifaddr
* ifa
;
1734 struct ifmediareq
*ifmr
;
1739 user_addr_t user_addr
;
1740 vlan_parent_ref vlp
;
1743 if (ifnet_type(ifp
) != IFT_L2VLAN
) {
1746 ifr
= (struct ifreq
*)data
;
1747 ifa
= (struct ifaddr
*)data
;
1751 ifnet_set_flags(ifp
, IFF_UP
, IFF_UP
);
1754 case SIOCGIFMEDIA32
:
1755 case SIOCGIFMEDIA64
:
1757 ifv
= (ifvlan_ref
)ifnet_softc(ifp
);
1758 if (ifv
== NULL
|| ifvlan_flags_detaching(ifv
)) {
1760 return ifv
== NULL
? EOPNOTSUPP
: EBUSY
;
1762 p
= (ifv
->ifv_vlp
== NULL
) ? NULL
: ifv
->ifv_vlp
->vlp_ifp
;
1764 ifmr
= (struct ifmediareq
*)data
;
1765 user_addr
= (cmd
== SIOCGIFMEDIA64
) ?
1766 ((struct ifmediareq64
*)ifmr
)->ifmu_ulist
:
1767 CAST_USER_ADDR_T(((struct ifmediareq32
*)ifmr
)->ifmu_ulist
);
1769 struct ifmediareq p_ifmr
;
1771 bzero(&p_ifmr
, sizeof(p_ifmr
));
1772 error
= ifnet_ioctl(p
, 0, SIOCGIFMEDIA
, &p_ifmr
);
1774 ifmr
->ifm_active
= p_ifmr
.ifm_active
;
1775 ifmr
->ifm_current
= p_ifmr
.ifm_current
;
1776 ifmr
->ifm_mask
= p_ifmr
.ifm_mask
;
1777 ifmr
->ifm_status
= p_ifmr
.ifm_status
;
1778 ifmr
->ifm_count
= p_ifmr
.ifm_count
;
1779 /* Limit the result to the parent's current config. */
1780 if (ifmr
->ifm_count
>= 1 && user_addr
!= USER_ADDR_NULL
) {
1781 ifmr
->ifm_count
= 1;
1782 error
= copyout(&ifmr
->ifm_current
, user_addr
,
1787 ifmr
->ifm_active
= ifmr
->ifm_current
= IFM_NONE
;
1789 ifmr
->ifm_status
= IFM_AVALID
;
1790 ifmr
->ifm_count
= 1;
1791 if (user_addr
!= USER_ADDR_NULL
) {
1792 error
= copyout(&ifmr
->ifm_current
, user_addr
, sizeof(int));
1803 ifv
= (ifvlan_ref
)ifnet_softc(ifp
);
1804 if (ifv
== NULL
|| ifvlan_flags_detaching(ifv
)) {
1806 return ifv
== NULL
? EOPNOTSUPP
: EBUSY
;
1810 int min_mtu
= vlp
->vlp_devmtu
.ifdm_min
- ifv
->ifv_mtufudge
;
1811 devmtu_p
= &ifr
->ifr_devmtu
;
1812 devmtu_p
->ifdm_current
= ifnet_mtu(ifp
);
1813 devmtu_p
->ifdm_min
= max(min_mtu
, IF_MINMTU
);
1814 devmtu_p
->ifdm_max
= vlp
->vlp_devmtu
.ifdm_max
- ifv
->ifv_mtufudge
;
1816 devmtu_p
= &ifr
->ifr_devmtu
;
1817 devmtu_p
->ifdm_current
= 0;
1818 devmtu_p
->ifdm_min
= 0;
1819 devmtu_p
->ifdm_max
= 0;
1825 error
= vlan_set_mtu(ifp
, ifr
->ifr_mtu
);
1829 user_addr
= proc_is64bit(current_proc())
1830 ? ifr
->ifr_data64
: CAST_USER_ADDR_T(ifr
->ifr_data
);
1831 error
= copyin(user_addr
, &vlr
, sizeof(vlr
));
1836 /* ensure nul termination */
1837 vlr
.vlr_parent
[IFNAMSIZ
- 1] = '\0';
1838 if (vlr
.vlr_parent
[0] != '\0') {
1839 if (vlr
.vlr_tag
& ~EVL_VLID_MASK
) {
1841 * Don't let the caller set up a VLAN tag with
1842 * anything except VLID bits.
1847 p
= ifunit(vlr
.vlr_parent
);
1852 if (IFNET_IS_INTCOPROC(p
)) {
1857 /* can't do VLAN over anything but ethernet or ethernet aggregate */
1858 if (ifnet_type(p
) != IFT_ETHER
1859 && ifnet_type(p
) != IFT_IEEE8023ADLAG
) {
1860 error
= EPROTONOSUPPORT
;
1863 error
= vlan_config(ifp
, p
, vlr
.vlr_tag
);
1868 /* Update promiscuous mode, if necessary. */
1869 (void)vlan_set_promisc(ifp
);
1871 /* generate a link event based on the state of the parent */
1872 vlan_link_event(ifp
, p
);
1874 int need_link_event
= FALSE
;
1877 ifv
= (ifvlan_ref
)ifnet_softc(ifp
);
1878 if (ifv
== NULL
|| ifvlan_flags_detaching(ifv
)) {
1880 error
= (ifv
== NULL
? EOPNOTSUPP
: EBUSY
);
1883 need_link_event
= (ifv
->ifv_vlp
!= NULL
);
1884 vlan_unconfig(ifv
, TRUE
);
1886 if (need_link_event
) {
1887 interface_link_event(ifp
, KEV_DL_LINK_OFF
);
1893 bzero(&vlr
, sizeof vlr
);
1895 ifv
= (ifvlan_ref
)ifnet_softc(ifp
);
1896 if (ifv
== NULL
|| ifvlan_flags_detaching(ifv
)) {
1898 return ifv
== NULL
? EOPNOTSUPP
: EBUSY
;
1900 p
= (ifv
->ifv_vlp
== NULL
) ? NULL
: ifv
->ifv_vlp
->vlp_ifp
;
1904 snprintf(vlr
.vlr_parent
, sizeof(vlr
.vlr_parent
),
1905 "%s%d", ifnet_name(p
), ifnet_unit(p
));
1908 user_addr
= proc_is64bit(current_proc())
1909 ? ifr
->ifr_data64
: CAST_USER_ADDR_T(ifr
->ifr_data
);
1910 error
= copyout(&vlr
, user_addr
, sizeof(vlr
));
1915 * For promiscuous mode, we enable promiscuous mode on
1916 * the parent if we need promiscuous on the VLAN interface.
1918 error
= vlan_set_promisc(ifp
);
1923 error
= vlan_setmulti(ifp
);
1932 vlan_if_free(struct ifnet
* ifp
)
1939 ifv
= (ifvlan_ref
)ifnet_softc(ifp
);
1943 ifvlan_release(ifv
);
1949 vlan_event(struct ifnet
* p
, __unused protocol_family_t protocol
,
1950 const struct kev_msg
* event
)
1954 /* Check if the interface we are attached to is being detached */
1955 if (event
->vendor_code
!= KEV_VENDOR_APPLE
1956 || event
->kev_class
!= KEV_NETWORK_CLASS
1957 || event
->kev_subclass
!= KEV_DL_SUBCLASS
) {
1960 event_code
= event
->event_code
;
1961 switch (event_code
) {
1962 case KEV_DL_LINK_OFF
:
1963 case KEV_DL_LINK_ON
:
1964 vlan_parent_link_event(p
, event_code
);
1973 vlan_detached(ifnet_t p
, __unused protocol_family_t protocol
)
1975 if (ifnet_is_attached(p
, 0) == 0) {
1976 /* if the parent isn't attached, remove all VLANs */
1977 vlan_parent_remove_all_vlans(p
);
1983 interface_link_event(struct ifnet
* ifp
, u_int32_t event_code
)
1986 u_int32_t ifnet_family
;
1988 char if_name
[IFNAMSIZ
];
1990 _Alignas(struct kern_event_msg
) char message
[sizeof(struct kern_event_msg
) + sizeof(struct event
)] = { 0 };
1991 struct kern_event_msg
*header
= (struct kern_event_msg
*)message
;
1992 struct event
*data
= (struct event
*)(header
+ 1);
1994 header
->total_size
= sizeof(message
);
1995 header
->vendor_code
= KEV_VENDOR_APPLE
;
1996 header
->kev_class
= KEV_NETWORK_CLASS
;
1997 header
->kev_subclass
= KEV_DL_SUBCLASS
;
1998 header
->event_code
= event_code
;
1999 data
->ifnet_family
= ifnet_family(ifp
);
2000 data
->unit
= (u_int32_t
)ifnet_unit(ifp
);
2001 strlcpy(data
->if_name
, ifnet_name(ifp
), IFNAMSIZ
);
2002 ifnet_event(ifp
, header
);
2006 vlan_parent_link_event(struct ifnet
* p
, u_int32_t event_code
)
2008 vlan_parent_ref vlp
;
2011 if ((ifnet_eflags(p
) & IFEF_VLAN
) == 0) {
2016 vlp
= parent_list_lookup(p
);
2022 vlan_parent_flags_set_link_event_required(vlp
);
2023 vlp
->vlp_event_code
= event_code
;
2024 if (vlan_parent_flags_change_in_progress(vlp
)) {
2025 /* don't block waiting to generate an event */
2029 vlan_parent_retain(vlp
);
2030 vlan_parent_wait(vlp
, "vlan_parent_link_event");
2031 vlan_parent_signal(vlp
, "vlan_parent_link_event");
2033 vlan_parent_release(vlp
);
2038 * Function: vlan_attach_protocol
2040 * Attach a DLIL protocol to the interface, using the ETHERTYPE_VLAN
2043 * The ethernet demux actually special cases VLAN to support hardware.
2044 * The demux here isn't used. The demux will return PF_VLAN for the
2045 * appropriate packets and our vlan_input function will be called.
2048 vlan_attach_protocol(struct ifnet
*ifp
)
2051 struct ifnet_attach_proto_param reg
;
2053 bzero(®
, sizeof(reg
));
2054 reg
.input
= vlan_input
;
2055 reg
.event
= vlan_event
;
2056 reg
.detached
= vlan_detached
;
2057 error
= ifnet_attach_protocol(ifp
, PF_VLAN
, ®
);
2059 printf("vlan_proto_attach(%s%d) ifnet_attach_protocol failed, %d\n",
2060 ifnet_name(ifp
), ifnet_unit(ifp
), error
);
2066 * Function: vlan_detach_protocol
2068 * Detach our DLIL protocol from an interface
2071 vlan_detach_protocol(struct ifnet
*ifp
)
2075 error
= ifnet_detach_protocol(ifp
, PF_VLAN
);
2077 printf("vlan_proto_detach(%s%d) ifnet_detach_protocol failed, %d\n",
2078 ifnet_name(ifp
), ifnet_unit(ifp
), error
);
2085 * DLIL interface family functions
2086 * We use the ethernet plumb functions, since that's all we support.
2087 * If we wanted to handle multiple LAN types (tokenring, etc.), we'd
2088 * call the appropriate routines for that LAN type instead of hard-coding
2092 vlan_attach_inet(struct ifnet
*ifp
, protocol_family_t protocol_family
)
2094 return ether_attach_inet(ifp
, protocol_family
);
2098 vlan_detach_inet(struct ifnet
*ifp
, protocol_family_t protocol_family
)
2100 ether_detach_inet(ifp
, protocol_family
);
2104 vlan_attach_inet6(struct ifnet
*ifp
, protocol_family_t protocol_family
)
2106 return ether_attach_inet6(ifp
, protocol_family
);
2110 vlan_detach_inet6(struct ifnet
*ifp
, protocol_family_t protocol_family
)
2112 ether_detach_inet6(ifp
, protocol_family
);
2115 __private_extern__
int
2116 vlan_family_init(void)
2120 error
= proto_register_plumber(PF_INET
, IFNET_FAMILY_VLAN
,
2121 vlan_attach_inet
, vlan_detach_inet
);
2123 printf("proto_register_plumber failed for AF_INET error=%d\n",
2127 error
= proto_register_plumber(PF_INET6
, IFNET_FAMILY_VLAN
,
2128 vlan_attach_inet6
, vlan_detach_inet6
);
2130 printf("proto_register_plumber failed for AF_INET6 error=%d\n",
2134 error
= vlan_clone_attach();
2136 printf("proto_register_plumber failed vlan_clone_attach error=%d\n",