1 /*- 2 * SPDX-License-Identifier: BSD-3-Clause 3 * 4 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. 5 * Copyright (c) 2018 Andrey V. Elsukov <ae@FreeBSD.org> 6 * All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 3. Neither the name of the project nor the names of its contributors 17 * may be used to endorse or promote products derived from this software 18 * without specific prior written permission. 19 * 20 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND 21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE 24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30 * SUCH DAMAGE. 31 * 32 * $KAME: if_gif.c,v 1.87 2001/10/19 08:50:27 itojun Exp $ 33 */ 34 35 #include <sys/cdefs.h> 36 #include "opt_inet.h" 37 #include "opt_inet6.h" 38 39 #include <sys/param.h> 40 #include <sys/systm.h> 41 #include <sys/kernel.h> 42 #include <sys/lock.h> 43 #include <sys/malloc.h> 44 #include <sys/mbuf.h> 45 #include <sys/module.h> 46 #include <sys/rmlock.h> 47 #include <sys/socket.h> 48 #include <sys/sockio.h> 49 #include <sys/sx.h> 50 #include <sys/errno.h> 51 #include <sys/time.h> 52 #include <sys/sysctl.h> 53 #include <sys/syslog.h> 54 #include <sys/priv.h> 55 #include <sys/proc.h> 56 #include <sys/conf.h> 57 #include <machine/cpu.h> 58 59 #include <net/if.h> 60 #include <net/if_var.h> 61 #include <net/if_private.h> 62 #include <net/if_clone.h> 63 #include <net/if_types.h> 64 #include <net/netisr.h> 65 #include <net/route.h> 66 #include <net/bpf.h> 67 #include <net/vnet.h> 68 69 #include <netinet/in.h> 70 #include <netinet/in_systm.h> 71 #include <netinet/ip.h> 72 #include <netinet/ip_ecn.h> 73 #ifdef INET 74 #include <netinet/in_var.h> 75 #include <netinet/ip_var.h> 76 #endif /* INET */ 77 78 #ifdef INET6 79 #ifndef INET 80 #include <netinet/in.h> 81 #endif 82 #include <netinet6/in6_var.h> 83 #include <netinet/ip6.h> 84 #include <netinet6/ip6_ecn.h> 85 #include <netinet6/ip6_var.h> 86 #endif /* INET6 */ 87 88 #include <netinet/ip_encap.h> 89 #include <net/ethernet.h> 90 #include <net/if_bridgevar.h> 91 #include <net/if_gif.h> 92 93 #include <security/mac/mac_framework.h> 94 95 static const char gifname[] = "gif"; 96 97 MALLOC_DEFINE(M_GIF, "gif", "Generic Tunnel Interface"); 98 static struct sx gif_ioctl_sx; 99 SX_SYSINIT(gif_ioctl_sx, &gif_ioctl_sx, "gif_ioctl"); 100 101 void (*ng_gif_input_p)(struct ifnet *ifp, struct mbuf **mp, int af); 102 void (*ng_gif_input_orphan_p)(struct ifnet *ifp, struct mbuf *m, int af); 103 void (*ng_gif_attach_p)(struct ifnet *ifp); 104 void (*ng_gif_detach_p)(struct ifnet *ifp); 105 106 #ifdef VIMAGE 107 static void gif_reassign(struct ifnet *, struct vnet *, char *); 108 #endif 109 static void gif_delete_tunnel(struct gif_softc *); 110 static int gif_ioctl(struct ifnet *, u_long, caddr_t); 111 static int gif_transmit(struct ifnet *, struct mbuf *); 112 static void gif_qflush(struct ifnet *); 113 static int gif_clone_create(struct if_clone *, int, caddr_t); 114 static void gif_clone_destroy(struct ifnet *); 115 VNET_DEFINE_STATIC(struct if_clone *, gif_cloner); 116 #define V_gif_cloner VNET(gif_cloner) 117 118 SYSCTL_DECL(_net_link); 119 static SYSCTL_NODE(_net_link, IFT_GIF, gif, CTLFLAG_RW | CTLFLAG_MPSAFE, 0, 120 "Generic Tunnel Interface"); 121 #ifndef MAX_GIF_NEST 122 /* 123 * This macro controls the default upper limitation on nesting of gif tunnels. 124 * Since, setting a large value to this macro with a careless configuration 125 * may introduce system crash, we don't allow any nestings by default. 126 * If you need to configure nested gif tunnels, you can define this macro 127 * in your kernel configuration file. However, if you do so, please be 128 * careful to configure the tunnels so that it won't make a loop. 129 */ 130 #define MAX_GIF_NEST 1 131 #endif 132 VNET_DEFINE_STATIC(int, max_gif_nesting) = MAX_GIF_NEST; 133 #define V_max_gif_nesting VNET(max_gif_nesting) 134 SYSCTL_INT(_net_link_gif, OID_AUTO, max_nesting, CTLFLAG_VNET | CTLFLAG_RW, 135 &VNET_NAME(max_gif_nesting), 0, "Max nested tunnels"); 136 137 static int 138 gif_clone_create(struct if_clone *ifc, int unit, caddr_t params) 139 { 140 struct gif_softc *sc; 141 142 sc = malloc(sizeof(struct gif_softc), M_GIF, M_WAITOK | M_ZERO); 143 sc->gif_fibnum = curthread->td_proc->p_fibnum; 144 GIF2IFP(sc) = if_alloc(IFT_GIF); 145 GIF2IFP(sc)->if_softc = sc; 146 if_initname(GIF2IFP(sc), gifname, unit); 147 148 GIF2IFP(sc)->if_addrlen = 0; 149 GIF2IFP(sc)->if_mtu = GIF_MTU; 150 GIF2IFP(sc)->if_flags = IFF_POINTOPOINT | IFF_MULTICAST; 151 GIF2IFP(sc)->if_ioctl = gif_ioctl; 152 GIF2IFP(sc)->if_transmit = gif_transmit; 153 GIF2IFP(sc)->if_qflush = gif_qflush; 154 GIF2IFP(sc)->if_output = gif_output; 155 #ifdef VIMAGE 156 GIF2IFP(sc)->if_reassign = gif_reassign; 157 #endif 158 GIF2IFP(sc)->if_capabilities |= IFCAP_LINKSTATE; 159 GIF2IFP(sc)->if_capenable |= IFCAP_LINKSTATE; 160 if_attach(GIF2IFP(sc)); 161 bpfattach(GIF2IFP(sc), DLT_NULL, sizeof(u_int32_t)); 162 if (ng_gif_attach_p != NULL) 163 (*ng_gif_attach_p)(GIF2IFP(sc)); 164 165 return (0); 166 } 167 168 #ifdef VIMAGE 169 static void 170 gif_reassign(struct ifnet *ifp, struct vnet *new_vnet __unused, 171 char *unused __unused) 172 { 173 struct gif_softc *sc; 174 175 sx_xlock(&gif_ioctl_sx); 176 sc = ifp->if_softc; 177 if (sc != NULL) 178 gif_delete_tunnel(sc); 179 sx_xunlock(&gif_ioctl_sx); 180 } 181 #endif /* VIMAGE */ 182 183 static void 184 gif_clone_destroy(struct ifnet *ifp) 185 { 186 struct gif_softc *sc; 187 188 sx_xlock(&gif_ioctl_sx); 189 sc = ifp->if_softc; 190 gif_delete_tunnel(sc); 191 if (ng_gif_detach_p != NULL) 192 (*ng_gif_detach_p)(ifp); 193 bpfdetach(ifp); 194 if_detach(ifp); 195 ifp->if_softc = NULL; 196 sx_xunlock(&gif_ioctl_sx); 197 198 GIF_WAIT(); 199 if_free(ifp); 200 free(sc, M_GIF); 201 } 202 203 static void 204 vnet_gif_init(const void *unused __unused) 205 { 206 207 V_gif_cloner = if_clone_simple(gifname, gif_clone_create, 208 gif_clone_destroy, 0); 209 #ifdef INET 210 in_gif_init(); 211 #endif 212 #ifdef INET6 213 in6_gif_init(); 214 #endif 215 } 216 VNET_SYSINIT(vnet_gif_init, SI_SUB_PSEUDO, SI_ORDER_ANY, 217 vnet_gif_init, NULL); 218 219 static void 220 vnet_gif_uninit(const void *unused __unused) 221 { 222 223 if_clone_detach(V_gif_cloner); 224 #ifdef INET 225 in_gif_uninit(); 226 #endif 227 #ifdef INET6 228 in6_gif_uninit(); 229 #endif 230 } 231 VNET_SYSUNINIT(vnet_gif_uninit, SI_SUB_PSEUDO, SI_ORDER_ANY, 232 vnet_gif_uninit, NULL); 233 234 static int 235 gifmodevent(module_t mod, int type, void *data) 236 { 237 238 switch (type) { 239 case MOD_LOAD: 240 case MOD_UNLOAD: 241 break; 242 default: 243 return (EOPNOTSUPP); 244 } 245 return (0); 246 } 247 248 static moduledata_t gif_mod = { 249 "if_gif", 250 gifmodevent, 251 0 252 }; 253 254 DECLARE_MODULE(if_gif, gif_mod, SI_SUB_PSEUDO, SI_ORDER_ANY); 255 MODULE_VERSION(if_gif, 1); 256 257 struct gif_list * 258 gif_hashinit(void) 259 { 260 struct gif_list *hash; 261 int i; 262 263 hash = malloc(sizeof(struct gif_list) * GIF_HASH_SIZE, 264 M_GIF, M_WAITOK); 265 for (i = 0; i < GIF_HASH_SIZE; i++) 266 CK_LIST_INIT(&hash[i]); 267 268 return (hash); 269 } 270 271 void 272 gif_hashdestroy(struct gif_list *hash) 273 { 274 275 free(hash, M_GIF); 276 } 277 278 #define MTAG_GIF 1080679712 279 static int 280 gif_transmit(struct ifnet *ifp, struct mbuf *m) 281 { 282 struct gif_softc *sc; 283 struct etherip_header *eth; 284 #ifdef INET 285 struct ip *ip; 286 #endif 287 #ifdef INET6 288 struct ip6_hdr *ip6; 289 uint32_t t; 290 #endif 291 uint32_t af; 292 uint8_t proto, ecn; 293 int error; 294 295 NET_EPOCH_ASSERT(); 296 #ifdef MAC 297 error = mac_ifnet_check_transmit(ifp, m); 298 if (error) { 299 m_freem(m); 300 goto err; 301 } 302 #endif 303 error = ENETDOWN; 304 sc = ifp->if_softc; 305 if ((ifp->if_flags & IFF_MONITOR) != 0 || 306 (ifp->if_flags & IFF_UP) == 0 || 307 (ifp->if_drv_flags & IFF_DRV_RUNNING) == 0 || 308 sc->gif_family == 0 || 309 (error = if_tunnel_check_nesting(ifp, m, MTAG_GIF, 310 V_max_gif_nesting)) != 0) { 311 m_freem(m); 312 goto err; 313 } 314 /* Now pull back the af that we stashed in the csum_data. */ 315 af = m->m_pkthdr.csum_data; 316 m->m_flags &= ~(M_BCAST|M_MCAST); 317 M_SETFIB(m, sc->gif_fibnum); 318 BPF_MTAP2(ifp, &af, sizeof(af), m); 319 if_inc_counter(ifp, IFCOUNTER_OPACKETS, 1); 320 if_inc_counter(ifp, IFCOUNTER_OBYTES, m->m_pkthdr.len); 321 /* inner AF-specific encapsulation */ 322 ecn = 0; 323 switch (af) { 324 #ifdef INET 325 case AF_INET: 326 proto = IPPROTO_IPV4; 327 if (m->m_len < sizeof(struct ip)) 328 m = m_pullup(m, sizeof(struct ip)); 329 if (m == NULL) { 330 error = ENOBUFS; 331 goto err; 332 } 333 ip = mtod(m, struct ip *); 334 ip_ecn_ingress((ifp->if_flags & IFF_LINK1) ? ECN_ALLOWED: 335 ECN_NOCARE, &ecn, &ip->ip_tos); 336 break; 337 #endif 338 #ifdef INET6 339 case AF_INET6: 340 proto = IPPROTO_IPV6; 341 if (m->m_len < sizeof(struct ip6_hdr)) 342 m = m_pullup(m, sizeof(struct ip6_hdr)); 343 if (m == NULL) { 344 error = ENOBUFS; 345 goto err; 346 } 347 t = 0; 348 ip6 = mtod(m, struct ip6_hdr *); 349 ip6_ecn_ingress((ifp->if_flags & IFF_LINK1) ? ECN_ALLOWED: 350 ECN_NOCARE, &t, &ip6->ip6_flow); 351 ecn = (ntohl(t) >> 20) & 0xff; 352 break; 353 #endif 354 case AF_LINK: 355 KASSERT(ifp->if_bridge != NULL, 356 ("%s: bridge not attached", __func__)); 357 proto = IPPROTO_ETHERIP; 358 M_PREPEND(m, sizeof(struct etherip_header), M_NOWAIT); 359 if (m == NULL) { 360 error = ENOBUFS; 361 goto err; 362 } 363 eth = mtod(m, struct etherip_header *); 364 eth->eip_resvh = 0; 365 eth->eip_ver = ETHERIP_VERSION; 366 eth->eip_resvl = 0; 367 break; 368 default: 369 error = EAFNOSUPPORT; 370 m_freem(m); 371 goto err; 372 } 373 /* XXX should we check if our outer source is legal? */ 374 /* dispatch to output logic based on outer AF */ 375 switch (sc->gif_family) { 376 #ifdef INET 377 case AF_INET: 378 error = in_gif_output(ifp, m, proto, ecn); 379 break; 380 #endif 381 #ifdef INET6 382 case AF_INET6: 383 error = in6_gif_output(ifp, m, proto, ecn); 384 break; 385 #endif 386 default: 387 m_freem(m); 388 } 389 err: 390 if (error) 391 if_inc_counter(ifp, IFCOUNTER_OERRORS, 1); 392 return (error); 393 } 394 395 static void 396 gif_qflush(struct ifnet *ifp __unused) 397 { 398 399 } 400 401 int 402 gif_output(struct ifnet *ifp, struct mbuf *m, const struct sockaddr *dst, 403 struct route *ro) 404 { 405 uint32_t af; 406 407 /* BPF writes need to be handled specially. */ 408 if (dst->sa_family == AF_UNSPEC || dst->sa_family == pseudo_AF_HDRCMPLT) 409 memcpy(&af, dst->sa_data, sizeof(af)); 410 else 411 af = RO_GET_FAMILY(ro, dst); 412 /* 413 * Now save the af in the inbound pkt csum data, this is a cheat since 414 * we are using the inbound csum_data field to carry the af over to 415 * the gif_transmit() routine, avoiding using yet another mtag. 416 */ 417 m->m_pkthdr.csum_data = af; 418 return (ifp->if_transmit(ifp, m)); 419 } 420 421 void 422 gif_input(struct mbuf *m, struct ifnet *ifp, int proto, uint8_t ecn) 423 { 424 struct etherip_header *eip; 425 #ifdef INET 426 struct ip *ip; 427 #endif 428 #ifdef INET6 429 struct ip6_hdr *ip6; 430 uint32_t t; 431 #endif 432 struct ether_header *eh; 433 struct ifnet *oldifp; 434 int isr, n, af; 435 436 NET_EPOCH_ASSERT(); 437 438 if (ifp == NULL) { 439 /* just in case */ 440 m_freem(m); 441 return; 442 } 443 m->m_pkthdr.rcvif = ifp; 444 m_clrprotoflags(m); 445 switch (proto) { 446 #ifdef INET 447 case IPPROTO_IPV4: 448 af = AF_INET; 449 if (m->m_len < sizeof(struct ip)) 450 m = m_pullup(m, sizeof(struct ip)); 451 if (m == NULL) 452 goto drop; 453 ip = mtod(m, struct ip *); 454 if (ip_ecn_egress((ifp->if_flags & IFF_LINK1) ? ECN_ALLOWED: 455 ECN_NOCARE, &ecn, &ip->ip_tos) == 0) { 456 m_freem(m); 457 goto drop; 458 } 459 break; 460 #endif 461 #ifdef INET6 462 case IPPROTO_IPV6: 463 af = AF_INET6; 464 if (m->m_len < sizeof(struct ip6_hdr)) 465 m = m_pullup(m, sizeof(struct ip6_hdr)); 466 if (m == NULL) 467 goto drop; 468 t = htonl((uint32_t)ecn << 20); 469 ip6 = mtod(m, struct ip6_hdr *); 470 if (ip6_ecn_egress((ifp->if_flags & IFF_LINK1) ? ECN_ALLOWED: 471 ECN_NOCARE, &t, &ip6->ip6_flow) == 0) { 472 m_freem(m); 473 goto drop; 474 } 475 break; 476 #endif 477 case IPPROTO_ETHERIP: 478 af = AF_LINK; 479 break; 480 default: 481 m_freem(m); 482 goto drop; 483 } 484 485 #ifdef MAC 486 mac_ifnet_create_mbuf(ifp, m); 487 #endif 488 489 if (bpf_peers_present(ifp->if_bpf)) { 490 uint32_t af1 = af; 491 bpf_mtap2(ifp->if_bpf, &af1, sizeof(af1), m); 492 } 493 494 if ((ifp->if_flags & IFF_MONITOR) != 0) { 495 if_inc_counter(ifp, IFCOUNTER_IPACKETS, 1); 496 if_inc_counter(ifp, IFCOUNTER_IBYTES, m->m_pkthdr.len); 497 m_freem(m); 498 return; 499 } 500 501 if (ng_gif_input_p != NULL) { 502 (*ng_gif_input_p)(ifp, &m, af); 503 if (m == NULL) 504 goto drop; 505 } 506 507 /* 508 * Put the packet to the network layer input queue according to the 509 * specified address family. 510 * Note: older versions of gif_input directly called network layer 511 * input functions, e.g. ip6_input, here. We changed the policy to 512 * prevent too many recursive calls of such input functions, which 513 * might cause kernel panic. But the change may introduce another 514 * problem; if the input queue is full, packets are discarded. 515 * The kernel stack overflow really happened, and we believed 516 * queue-full rarely occurs, so we changed the policy. 517 */ 518 switch (af) { 519 #ifdef INET 520 case AF_INET: 521 isr = NETISR_IP; 522 break; 523 #endif 524 #ifdef INET6 525 case AF_INET6: 526 isr = NETISR_IPV6; 527 break; 528 #endif 529 case AF_LINK: 530 n = sizeof(struct etherip_header) + 531 sizeof(struct ether_header); 532 if (n > m->m_len) 533 m = m_pullup(m, n); 534 if (m == NULL) 535 goto drop; 536 eip = mtod(m, struct etherip_header *); 537 if (eip->eip_ver != ETHERIP_VERSION) { 538 /* discard unknown versions */ 539 m_freem(m); 540 goto drop; 541 } 542 543 m_adj_decap(m, sizeof(struct etherip_header)); 544 545 m->m_flags &= ~(M_BCAST|M_MCAST); 546 m->m_pkthdr.rcvif = ifp; 547 548 if (ifp->if_bridge) { 549 oldifp = ifp; 550 eh = mtod(m, struct ether_header *); 551 if (ETHER_IS_MULTICAST(eh->ether_dhost)) { 552 if (ETHER_IS_BROADCAST(eh->ether_dhost)) 553 m->m_flags |= M_BCAST; 554 else 555 m->m_flags |= M_MCAST; 556 if_inc_counter(ifp, IFCOUNTER_IMCASTS, 1); 557 } 558 BRIDGE_INPUT(ifp, m); 559 560 if (m != NULL && ifp != oldifp) { 561 /* 562 * The bridge gave us back itself or one of the 563 * members for which the frame is addressed. 564 */ 565 ether_demux(ifp, m); 566 return; 567 } 568 } 569 if (m != NULL) 570 m_freem(m); 571 return; 572 573 default: 574 if (ng_gif_input_orphan_p != NULL) 575 (*ng_gif_input_orphan_p)(ifp, m, af); 576 else 577 m_freem(m); 578 return; 579 } 580 581 if_inc_counter(ifp, IFCOUNTER_IPACKETS, 1); 582 if_inc_counter(ifp, IFCOUNTER_IBYTES, m->m_pkthdr.len); 583 M_SETFIB(m, ifp->if_fib); 584 netisr_dispatch(isr, m); 585 return; 586 drop: 587 if_inc_counter(ifp, IFCOUNTER_IERRORS, 1); 588 } 589 590 static int 591 gif_ioctl(struct ifnet *ifp, u_long cmd, caddr_t data) 592 { 593 struct ifreq *ifr = (struct ifreq*)data; 594 struct gif_softc *sc; 595 u_int options; 596 int error; 597 598 switch (cmd) { 599 case SIOCSIFADDR: 600 ifp->if_flags |= IFF_UP; 601 case SIOCADDMULTI: 602 case SIOCDELMULTI: 603 case SIOCGIFMTU: 604 case SIOCSIFFLAGS: 605 return (0); 606 case SIOCSIFMTU: 607 if (ifr->ifr_mtu < GIF_MTU_MIN || 608 ifr->ifr_mtu > GIF_MTU_MAX) 609 return (EINVAL); 610 else 611 ifp->if_mtu = ifr->ifr_mtu; 612 return (0); 613 } 614 sx_xlock(&gif_ioctl_sx); 615 sc = ifp->if_softc; 616 if (sc == NULL) { 617 error = ENXIO; 618 goto bad; 619 } 620 error = 0; 621 switch (cmd) { 622 case SIOCDIFPHYADDR: 623 if (sc->gif_family == 0) 624 break; 625 gif_delete_tunnel(sc); 626 break; 627 #ifdef INET 628 case SIOCSIFPHYADDR: 629 case SIOCGIFPSRCADDR: 630 case SIOCGIFPDSTADDR: 631 error = in_gif_ioctl(sc, cmd, data); 632 break; 633 #endif 634 #ifdef INET6 635 case SIOCSIFPHYADDR_IN6: 636 case SIOCGIFPSRCADDR_IN6: 637 case SIOCGIFPDSTADDR_IN6: 638 error = in6_gif_ioctl(sc, cmd, data); 639 break; 640 #endif 641 case SIOCGTUNFIB: 642 ifr->ifr_fib = sc->gif_fibnum; 643 break; 644 case SIOCSTUNFIB: 645 if ((error = priv_check(curthread, PRIV_NET_GIF)) != 0) 646 break; 647 if (ifr->ifr_fib >= rt_numfibs) 648 error = EINVAL; 649 else 650 sc->gif_fibnum = ifr->ifr_fib; 651 break; 652 case GIFGOPTS: 653 options = sc->gif_options; 654 error = copyout(&options, ifr_data_get_ptr(ifr), 655 sizeof(options)); 656 break; 657 case GIFSOPTS: 658 if ((error = priv_check(curthread, PRIV_NET_GIF)) != 0) 659 break; 660 error = copyin(ifr_data_get_ptr(ifr), &options, 661 sizeof(options)); 662 if (error) 663 break; 664 if (options & ~GIF_OPTMASK) { 665 error = EINVAL; 666 break; 667 } 668 if (sc->gif_options != options) { 669 switch (sc->gif_family) { 670 #ifdef INET 671 case AF_INET: 672 error = in_gif_setopts(sc, options); 673 break; 674 #endif 675 #ifdef INET6 676 case AF_INET6: 677 error = in6_gif_setopts(sc, options); 678 break; 679 #endif 680 default: 681 /* No need to invoke AF-handler */ 682 sc->gif_options = options; 683 } 684 } 685 break; 686 default: 687 error = EINVAL; 688 break; 689 } 690 if (error == 0 && sc->gif_family != 0) { 691 if ( 692 #ifdef INET 693 cmd == SIOCSIFPHYADDR || 694 #endif 695 #ifdef INET6 696 cmd == SIOCSIFPHYADDR_IN6 || 697 #endif 698 0) { 699 if_link_state_change(ifp, LINK_STATE_UP); 700 } 701 } 702 bad: 703 sx_xunlock(&gif_ioctl_sx); 704 return (error); 705 } 706 707 static void 708 gif_delete_tunnel(struct gif_softc *sc) 709 { 710 711 sx_assert(&gif_ioctl_sx, SA_XLOCKED); 712 if (sc->gif_family != 0) { 713 CK_LIST_REMOVE(sc, srchash); 714 CK_LIST_REMOVE(sc, chain); 715 /* Wait until it become safe to free gif_hdr */ 716 GIF_WAIT(); 717 free(sc->gif_hdr, M_GIF); 718 } 719 sc->gif_family = 0; 720 GIF2IFP(sc)->if_drv_flags &= ~IFF_DRV_RUNNING; 721 if_link_state_change(GIF2IFP(sc), LINK_STATE_DOWN); 722 } 723