1 /*- 2 * Copyright (c) 2014, Bryan Venteicher <bryanv@FreeBSD.org> 3 * All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice unmodified, this list of conditions, and the following 10 * disclaimer. 11 * 2. Redistributions in binary form must reproduce the above copyright 12 * notice, this list of conditions and the following disclaimer in the 13 * documentation and/or other materials provided with the distribution. 14 * 15 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 16 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 17 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 18 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 19 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 20 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 21 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 22 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 23 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 24 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 25 */ 26 27 #include "opt_inet.h" 28 #include "opt_inet6.h" 29 30 #include <sys/cdefs.h> 31 __FBSDID("$FreeBSD$"); 32 33 #include <sys/param.h> 34 #include <sys/eventhandler.h> 35 #include <sys/kernel.h> 36 #include <sys/lock.h> 37 #include <sys/hash.h> 38 #include <sys/malloc.h> 39 #include <sys/mbuf.h> 40 #include <sys/module.h> 41 #include <sys/refcount.h> 42 #include <sys/rmlock.h> 43 #include <sys/priv.h> 44 #include <sys/proc.h> 45 #include <sys/queue.h> 46 #include <sys/sbuf.h> 47 #include <sys/socket.h> 48 #include <sys/socketvar.h> 49 #include <sys/sockio.h> 50 #include <sys/sysctl.h> 51 #include <sys/systm.h> 52 53 #include <net/bpf.h> 54 #include <net/ethernet.h> 55 #include <net/if.h> 56 #include <net/if_var.h> 57 #include <net/if_clone.h> 58 #include <net/if_dl.h> 59 #include <net/if_media.h> 60 #include <net/if_types.h> 61 #include <net/if_vxlan.h> 62 #include <net/netisr.h> 63 64 #include <netinet/in.h> 65 #include <netinet/in_systm.h> 66 #include <netinet/in_var.h> 67 #include <netinet/in_pcb.h> 68 #include <netinet/ip.h> 69 #include <netinet/ip6.h> 70 #include <netinet/ip_var.h> 71 #include <netinet/udp.h> 72 #include <netinet/udp_var.h> 73 74 #include <netinet6/ip6_var.h> 75 #include <netinet6/scope6_var.h> 76 77 struct vxlan_softc; 78 LIST_HEAD(vxlan_softc_head, vxlan_softc); 79 80 struct vxlan_socket_mc_info { 81 union vxlan_sockaddr vxlsomc_saddr; 82 union vxlan_sockaddr vxlsomc_gaddr; 83 int vxlsomc_ifidx; 84 int vxlsomc_users; 85 }; 86 87 /* 88 * The maximum MTU of encapsulated ethernet frame within IPv4/UDP packet. 89 */ 90 #define VXLAN_MAX_MTU (IP_MAXPACKET - \ 91 60 /* Maximum IPv4 header len */ - \ 92 sizeof(struct udphdr) - \ 93 sizeof(struct vxlan_header) - \ 94 ETHER_HDR_LEN - ETHER_CRC_LEN - ETHER_VLAN_ENCAP_LEN) 95 96 #define VXLAN_SO_MC_MAX_GROUPS 32 97 98 #define VXLAN_SO_VNI_HASH_SHIFT 6 99 #define VXLAN_SO_VNI_HASH_SIZE (1 << VXLAN_SO_VNI_HASH_SHIFT) 100 #define VXLAN_SO_VNI_HASH(_vni) ((_vni) % VXLAN_SO_VNI_HASH_SIZE) 101 102 struct vxlan_socket { 103 struct socket *vxlso_sock; 104 struct rmlock vxlso_lock; 105 u_int vxlso_refcnt; 106 union vxlan_sockaddr vxlso_laddr; 107 LIST_ENTRY(vxlan_socket) vxlso_entry; 108 struct vxlan_softc_head vxlso_vni_hash[VXLAN_SO_VNI_HASH_SIZE]; 109 struct vxlan_socket_mc_info vxlso_mc[VXLAN_SO_MC_MAX_GROUPS]; 110 }; 111 112 #define VXLAN_SO_RLOCK(_vso, _p) rm_rlock(&(_vso)->vxlso_lock, (_p)) 113 #define VXLAN_SO_RUNLOCK(_vso, _p) rm_runlock(&(_vso)->vxlso_lock, (_p)) 114 #define VXLAN_SO_WLOCK(_vso) rm_wlock(&(_vso)->vxlso_lock) 115 #define VXLAN_SO_WUNLOCK(_vso) rm_wunlock(&(_vso)->vxlso_lock) 116 #define VXLAN_SO_LOCK_ASSERT(_vso) \ 117 rm_assert(&(_vso)->vxlso_lock, RA_LOCKED) 118 #define VXLAN_SO_LOCK_WASSERT(_vso) \ 119 rm_assert(&(_vso)->vxlso_lock, RA_WLOCKED) 120 121 #define VXLAN_SO_ACQUIRE(_vso) refcount_acquire(&(_vso)->vxlso_refcnt) 122 #define VXLAN_SO_RELEASE(_vso) refcount_release(&(_vso)->vxlso_refcnt) 123 124 struct vxlan_ftable_entry { 125 LIST_ENTRY(vxlan_ftable_entry) vxlfe_hash; 126 uint16_t vxlfe_flags; 127 uint8_t vxlfe_mac[ETHER_ADDR_LEN]; 128 union vxlan_sockaddr vxlfe_raddr; 129 time_t vxlfe_expire; 130 }; 131 132 #define VXLAN_FE_FLAG_DYNAMIC 0x01 133 #define VXLAN_FE_FLAG_STATIC 0x02 134 135 #define VXLAN_FE_IS_DYNAMIC(_fe) \ 136 ((_fe)->vxlfe_flags & VXLAN_FE_FLAG_DYNAMIC) 137 138 #define VXLAN_SC_FTABLE_SHIFT 9 139 #define VXLAN_SC_FTABLE_SIZE (1 << VXLAN_SC_FTABLE_SHIFT) 140 #define VXLAN_SC_FTABLE_MASK (VXLAN_SC_FTABLE_SIZE - 1) 141 #define VXLAN_SC_FTABLE_HASH(_sc, _mac) \ 142 (vxlan_mac_hash(_sc, _mac) % VXLAN_SC_FTABLE_SIZE) 143 144 LIST_HEAD(vxlan_ftable_head, vxlan_ftable_entry); 145 146 struct vxlan_statistics { 147 uint32_t ftable_nospace; 148 uint32_t ftable_lock_upgrade_failed; 149 }; 150 151 struct vxlan_softc { 152 struct ifnet *vxl_ifp; 153 struct vxlan_socket *vxl_sock; 154 uint32_t vxl_vni; 155 union vxlan_sockaddr vxl_src_addr; 156 union vxlan_sockaddr vxl_dst_addr; 157 uint32_t vxl_flags; 158 #define VXLAN_FLAG_INIT 0x0001 159 #define VXLAN_FLAG_TEARDOWN 0x0002 160 #define VXLAN_FLAG_LEARN 0x0004 161 162 uint32_t vxl_port_hash_key; 163 uint16_t vxl_min_port; 164 uint16_t vxl_max_port; 165 uint8_t vxl_ttl; 166 167 /* Lookup table from MAC address to forwarding entry. */ 168 uint32_t vxl_ftable_cnt; 169 uint32_t vxl_ftable_max; 170 uint32_t vxl_ftable_timeout; 171 uint32_t vxl_ftable_hash_key; 172 struct vxlan_ftable_head *vxl_ftable; 173 174 /* Derived from vxl_dst_addr. */ 175 struct vxlan_ftable_entry vxl_default_fe; 176 177 struct ip_moptions *vxl_im4o; 178 struct ip6_moptions *vxl_im6o; 179 180 struct rmlock vxl_lock; 181 volatile u_int vxl_refcnt; 182 183 int vxl_unit; 184 int vxl_vso_mc_index; 185 struct vxlan_statistics vxl_stats; 186 struct sysctl_oid *vxl_sysctl_node; 187 struct sysctl_ctx_list vxl_sysctl_ctx; 188 struct callout vxl_callout; 189 struct ether_addr vxl_hwaddr; 190 int vxl_mc_ifindex; 191 struct ifnet *vxl_mc_ifp; 192 struct ifmedia vxl_media; 193 char vxl_mc_ifname[IFNAMSIZ]; 194 LIST_ENTRY(vxlan_softc) vxl_entry; 195 LIST_ENTRY(vxlan_softc) vxl_ifdetach_list; 196 }; 197 198 #define VXLAN_RLOCK(_sc, _p) rm_rlock(&(_sc)->vxl_lock, (_p)) 199 #define VXLAN_RUNLOCK(_sc, _p) rm_runlock(&(_sc)->vxl_lock, (_p)) 200 #define VXLAN_WLOCK(_sc) rm_wlock(&(_sc)->vxl_lock) 201 #define VXLAN_WUNLOCK(_sc) rm_wunlock(&(_sc)->vxl_lock) 202 #define VXLAN_LOCK_WOWNED(_sc) rm_wowned(&(_sc)->vxl_lock) 203 #define VXLAN_LOCK_ASSERT(_sc) rm_assert(&(_sc)->vxl_lock, RA_LOCKED) 204 #define VXLAN_LOCK_WASSERT(_sc) rm_assert(&(_sc)->vxl_lock, RA_WLOCKED) 205 #define VXLAN_UNLOCK(_sc, _p) do { \ 206 if (VXLAN_LOCK_WOWNED(_sc)) \ 207 VXLAN_WUNLOCK(_sc); \ 208 else \ 209 VXLAN_RUNLOCK(_sc, _p); \ 210 } while (0) 211 212 #define VXLAN_ACQUIRE(_sc) refcount_acquire(&(_sc)->vxl_refcnt) 213 #define VXLAN_RELEASE(_sc) refcount_release(&(_sc)->vxl_refcnt) 214 215 #define satoconstsin(sa) ((const struct sockaddr_in *)(sa)) 216 #define satoconstsin6(sa) ((const struct sockaddr_in6 *)(sa)) 217 218 struct vxlanudphdr { 219 struct udphdr vxlh_udp; 220 struct vxlan_header vxlh_hdr; 221 } __packed; 222 223 static int vxlan_ftable_addr_cmp(const uint8_t *, const uint8_t *); 224 static void vxlan_ftable_init(struct vxlan_softc *); 225 static void vxlan_ftable_fini(struct vxlan_softc *); 226 static void vxlan_ftable_flush(struct vxlan_softc *, int); 227 static void vxlan_ftable_expire(struct vxlan_softc *); 228 static int vxlan_ftable_update_locked(struct vxlan_softc *, 229 const union vxlan_sockaddr *, const uint8_t *, 230 struct rm_priotracker *); 231 static int vxlan_ftable_learn(struct vxlan_softc *, 232 const struct sockaddr *, const uint8_t *); 233 static int vxlan_ftable_sysctl_dump(SYSCTL_HANDLER_ARGS); 234 235 static struct vxlan_ftable_entry * 236 vxlan_ftable_entry_alloc(void); 237 static void vxlan_ftable_entry_free(struct vxlan_ftable_entry *); 238 static void vxlan_ftable_entry_init(struct vxlan_softc *, 239 struct vxlan_ftable_entry *, const uint8_t *, 240 const struct sockaddr *, uint32_t); 241 static void vxlan_ftable_entry_destroy(struct vxlan_softc *, 242 struct vxlan_ftable_entry *); 243 static int vxlan_ftable_entry_insert(struct vxlan_softc *, 244 struct vxlan_ftable_entry *); 245 static struct vxlan_ftable_entry * 246 vxlan_ftable_entry_lookup(struct vxlan_softc *, 247 const uint8_t *); 248 static void vxlan_ftable_entry_dump(struct vxlan_ftable_entry *, 249 struct sbuf *); 250 251 static struct vxlan_socket * 252 vxlan_socket_alloc(const union vxlan_sockaddr *); 253 static void vxlan_socket_destroy(struct vxlan_socket *); 254 static void vxlan_socket_release(struct vxlan_socket *); 255 static struct vxlan_socket * 256 vxlan_socket_lookup(union vxlan_sockaddr *vxlsa); 257 static void vxlan_socket_insert(struct vxlan_socket *); 258 static int vxlan_socket_init(struct vxlan_socket *, struct ifnet *); 259 static int vxlan_socket_bind(struct vxlan_socket *, struct ifnet *); 260 static int vxlan_socket_create(struct ifnet *, int, 261 const union vxlan_sockaddr *, struct vxlan_socket **); 262 static void vxlan_socket_ifdetach(struct vxlan_socket *, 263 struct ifnet *, struct vxlan_softc_head *); 264 265 static struct vxlan_socket * 266 vxlan_socket_mc_lookup(const union vxlan_sockaddr *); 267 static int vxlan_sockaddr_mc_info_match( 268 const struct vxlan_socket_mc_info *, 269 const union vxlan_sockaddr *, 270 const union vxlan_sockaddr *, int); 271 static int vxlan_socket_mc_join_group(struct vxlan_socket *, 272 const union vxlan_sockaddr *, const union vxlan_sockaddr *, 273 int *, union vxlan_sockaddr *); 274 static int vxlan_socket_mc_leave_group(struct vxlan_socket *, 275 const union vxlan_sockaddr *, 276 const union vxlan_sockaddr *, int); 277 static int vxlan_socket_mc_add_group(struct vxlan_socket *, 278 const union vxlan_sockaddr *, const union vxlan_sockaddr *, 279 int, int *); 280 static void vxlan_socket_mc_release_group_by_idx(struct vxlan_socket *, 281 int); 282 283 static struct vxlan_softc * 284 vxlan_socket_lookup_softc_locked(struct vxlan_socket *, 285 uint32_t); 286 static struct vxlan_softc * 287 vxlan_socket_lookup_softc(struct vxlan_socket *, uint32_t); 288 static int vxlan_socket_insert_softc(struct vxlan_socket *, 289 struct vxlan_softc *); 290 static void vxlan_socket_remove_softc(struct vxlan_socket *, 291 struct vxlan_softc *); 292 293 static struct ifnet * 294 vxlan_multicast_if_ref(struct vxlan_softc *, int); 295 static void vxlan_free_multicast(struct vxlan_softc *); 296 static int vxlan_setup_multicast_interface(struct vxlan_softc *); 297 298 static int vxlan_setup_multicast(struct vxlan_softc *); 299 static int vxlan_setup_socket(struct vxlan_softc *); 300 static void vxlan_setup_interface(struct vxlan_softc *); 301 static int vxlan_valid_init_config(struct vxlan_softc *); 302 static void vxlan_init_wait(struct vxlan_softc *); 303 static void vxlan_init_complete(struct vxlan_softc *); 304 static void vxlan_init(void *); 305 static void vxlan_release(struct vxlan_softc *); 306 static void vxlan_teardown_wait(struct vxlan_softc *); 307 static void vxlan_teardown_complete(struct vxlan_softc *); 308 static void vxlan_teardown_locked(struct vxlan_softc *); 309 static void vxlan_teardown(struct vxlan_softc *); 310 static void vxlan_ifdetach(struct vxlan_softc *, struct ifnet *, 311 struct vxlan_softc_head *); 312 static void vxlan_timer(void *); 313 314 static int vxlan_ctrl_get_config(struct vxlan_softc *, void *); 315 static int vxlan_ctrl_set_vni(struct vxlan_softc *, void *); 316 static int vxlan_ctrl_set_local_addr(struct vxlan_softc *, void *); 317 static int vxlan_ctrl_set_remote_addr(struct vxlan_softc *, void *); 318 static int vxlan_ctrl_set_local_port(struct vxlan_softc *, void *); 319 static int vxlan_ctrl_set_remote_port(struct vxlan_softc *, void *); 320 static int vxlan_ctrl_set_port_range(struct vxlan_softc *, void *); 321 static int vxlan_ctrl_set_ftable_timeout(struct vxlan_softc *, void *); 322 static int vxlan_ctrl_set_ftable_max(struct vxlan_softc *, void *); 323 static int vxlan_ctrl_set_multicast_if(struct vxlan_softc * , void *); 324 static int vxlan_ctrl_set_ttl(struct vxlan_softc *, void *); 325 static int vxlan_ctrl_set_learn(struct vxlan_softc *, void *); 326 static int vxlan_ctrl_ftable_entry_add(struct vxlan_softc *, void *); 327 static int vxlan_ctrl_ftable_entry_rem(struct vxlan_softc *, void *); 328 static int vxlan_ctrl_flush(struct vxlan_softc *, void *); 329 static int vxlan_ioctl_drvspec(struct vxlan_softc *, 330 struct ifdrv *, int); 331 static int vxlan_ioctl_ifflags(struct vxlan_softc *); 332 static int vxlan_ioctl(struct ifnet *, u_long, caddr_t); 333 334 #if defined(INET) || defined(INET6) 335 static uint16_t vxlan_pick_source_port(struct vxlan_softc *, struct mbuf *); 336 static void vxlan_encap_header(struct vxlan_softc *, struct mbuf *, 337 int, uint16_t, uint16_t); 338 #endif 339 static int vxlan_encap4(struct vxlan_softc *, 340 const union vxlan_sockaddr *, struct mbuf *); 341 static int vxlan_encap6(struct vxlan_softc *, 342 const union vxlan_sockaddr *, struct mbuf *); 343 static int vxlan_transmit(struct ifnet *, struct mbuf *); 344 static void vxlan_qflush(struct ifnet *); 345 static void vxlan_rcv_udp_packet(struct mbuf *, int, struct inpcb *, 346 const struct sockaddr *, void *); 347 static int vxlan_input(struct vxlan_socket *, uint32_t, struct mbuf **, 348 const struct sockaddr *); 349 350 static void vxlan_set_default_config(struct vxlan_softc *); 351 static int vxlan_set_user_config(struct vxlan_softc *, 352 struct ifvxlanparam *); 353 static int vxlan_clone_create(struct if_clone *, int, caddr_t); 354 static void vxlan_clone_destroy(struct ifnet *); 355 356 static uint32_t vxlan_mac_hash(struct vxlan_softc *, const uint8_t *); 357 static int vxlan_media_change(struct ifnet *); 358 static void vxlan_media_status(struct ifnet *, struct ifmediareq *); 359 360 static int vxlan_sockaddr_cmp(const union vxlan_sockaddr *, 361 const struct sockaddr *); 362 static void vxlan_sockaddr_copy(union vxlan_sockaddr *, 363 const struct sockaddr *); 364 static int vxlan_sockaddr_in_equal(const union vxlan_sockaddr *, 365 const struct sockaddr *); 366 static void vxlan_sockaddr_in_copy(union vxlan_sockaddr *, 367 const struct sockaddr *); 368 static int vxlan_sockaddr_supported(const union vxlan_sockaddr *, int); 369 static int vxlan_sockaddr_in_any(const union vxlan_sockaddr *); 370 static int vxlan_sockaddr_in_multicast(const union vxlan_sockaddr *); 371 static int vxlan_sockaddr_in6_embedscope(union vxlan_sockaddr *); 372 373 static int vxlan_can_change_config(struct vxlan_softc *); 374 static int vxlan_check_vni(uint32_t); 375 static int vxlan_check_ttl(int); 376 static int vxlan_check_ftable_timeout(uint32_t); 377 static int vxlan_check_ftable_max(uint32_t); 378 379 static void vxlan_sysctl_setup(struct vxlan_softc *); 380 static void vxlan_sysctl_destroy(struct vxlan_softc *); 381 static int vxlan_tunable_int(struct vxlan_softc *, const char *, int); 382 383 static void vxlan_ifdetach_event(void *, struct ifnet *); 384 static void vxlan_load(void); 385 static void vxlan_unload(void); 386 static int vxlan_modevent(module_t, int, void *); 387 388 static const char vxlan_name[] = "vxlan"; 389 static MALLOC_DEFINE(M_VXLAN, vxlan_name, 390 "Virtual eXtensible LAN Interface"); 391 static struct if_clone *vxlan_cloner; 392 393 static struct mtx vxlan_list_mtx; 394 #define VXLAN_LIST_LOCK() mtx_lock(&vxlan_list_mtx) 395 #define VXLAN_LIST_UNLOCK() mtx_unlock(&vxlan_list_mtx) 396 397 static LIST_HEAD(, vxlan_socket) vxlan_socket_list; 398 399 static eventhandler_tag vxlan_ifdetach_event_tag; 400 401 SYSCTL_DECL(_net_link); 402 SYSCTL_NODE(_net_link, OID_AUTO, vxlan, CTLFLAG_RW | CTLFLAG_MPSAFE, 0, 403 "Virtual eXtensible Local Area Network"); 404 405 static int vxlan_legacy_port = 0; 406 TUNABLE_INT("net.link.vxlan.legacy_port", &vxlan_legacy_port); 407 static int vxlan_reuse_port = 0; 408 TUNABLE_INT("net.link.vxlan.reuse_port", &vxlan_reuse_port); 409 410 /* Default maximum number of addresses in the forwarding table. */ 411 #ifndef VXLAN_FTABLE_MAX 412 #define VXLAN_FTABLE_MAX 2000 413 #endif 414 415 /* Timeout (in seconds) of addresses learned in the forwarding table. */ 416 #ifndef VXLAN_FTABLE_TIMEOUT 417 #define VXLAN_FTABLE_TIMEOUT (20 * 60) 418 #endif 419 420 /* 421 * Maximum timeout (in seconds) of addresses learned in the forwarding 422 * table. 423 */ 424 #ifndef VXLAN_FTABLE_MAX_TIMEOUT 425 #define VXLAN_FTABLE_MAX_TIMEOUT (60 * 60 * 24) 426 #endif 427 428 /* Number of seconds between pruning attempts of the forwarding table. */ 429 #ifndef VXLAN_FTABLE_PRUNE 430 #define VXLAN_FTABLE_PRUNE (5 * 60) 431 #endif 432 433 static int vxlan_ftable_prune_period = VXLAN_FTABLE_PRUNE; 434 435 struct vxlan_control { 436 int (*vxlc_func)(struct vxlan_softc *, void *); 437 int vxlc_argsize; 438 int vxlc_flags; 439 #define VXLAN_CTRL_FLAG_COPYIN 0x01 440 #define VXLAN_CTRL_FLAG_COPYOUT 0x02 441 #define VXLAN_CTRL_FLAG_SUSER 0x04 442 }; 443 444 static const struct vxlan_control vxlan_control_table[] = { 445 [VXLAN_CMD_GET_CONFIG] = 446 { vxlan_ctrl_get_config, sizeof(struct ifvxlancfg), 447 VXLAN_CTRL_FLAG_COPYOUT 448 }, 449 450 [VXLAN_CMD_SET_VNI] = 451 { vxlan_ctrl_set_vni, sizeof(struct ifvxlancmd), 452 VXLAN_CTRL_FLAG_COPYIN | VXLAN_CTRL_FLAG_SUSER, 453 }, 454 455 [VXLAN_CMD_SET_LOCAL_ADDR] = 456 { vxlan_ctrl_set_local_addr, sizeof(struct ifvxlancmd), 457 VXLAN_CTRL_FLAG_COPYIN | VXLAN_CTRL_FLAG_SUSER, 458 }, 459 460 [VXLAN_CMD_SET_REMOTE_ADDR] = 461 { vxlan_ctrl_set_remote_addr, sizeof(struct ifvxlancmd), 462 VXLAN_CTRL_FLAG_COPYIN | VXLAN_CTRL_FLAG_SUSER, 463 }, 464 465 [VXLAN_CMD_SET_LOCAL_PORT] = 466 { vxlan_ctrl_set_local_port, sizeof(struct ifvxlancmd), 467 VXLAN_CTRL_FLAG_COPYIN | VXLAN_CTRL_FLAG_SUSER, 468 }, 469 470 [VXLAN_CMD_SET_REMOTE_PORT] = 471 { vxlan_ctrl_set_remote_port, sizeof(struct ifvxlancmd), 472 VXLAN_CTRL_FLAG_COPYIN | VXLAN_CTRL_FLAG_SUSER, 473 }, 474 475 [VXLAN_CMD_SET_PORT_RANGE] = 476 { vxlan_ctrl_set_port_range, sizeof(struct ifvxlancmd), 477 VXLAN_CTRL_FLAG_COPYIN | VXLAN_CTRL_FLAG_SUSER, 478 }, 479 480 [VXLAN_CMD_SET_FTABLE_TIMEOUT] = 481 { vxlan_ctrl_set_ftable_timeout, sizeof(struct ifvxlancmd), 482 VXLAN_CTRL_FLAG_COPYIN | VXLAN_CTRL_FLAG_SUSER, 483 }, 484 485 [VXLAN_CMD_SET_FTABLE_MAX] = 486 { vxlan_ctrl_set_ftable_max, sizeof(struct ifvxlancmd), 487 VXLAN_CTRL_FLAG_COPYIN | VXLAN_CTRL_FLAG_SUSER, 488 }, 489 490 [VXLAN_CMD_SET_MULTICAST_IF] = 491 { vxlan_ctrl_set_multicast_if, sizeof(struct ifvxlancmd), 492 VXLAN_CTRL_FLAG_COPYIN | VXLAN_CTRL_FLAG_SUSER, 493 }, 494 495 [VXLAN_CMD_SET_TTL] = 496 { vxlan_ctrl_set_ttl, sizeof(struct ifvxlancmd), 497 VXLAN_CTRL_FLAG_COPYIN | VXLAN_CTRL_FLAG_SUSER, 498 }, 499 500 [VXLAN_CMD_SET_LEARN] = 501 { vxlan_ctrl_set_learn, sizeof(struct ifvxlancmd), 502 VXLAN_CTRL_FLAG_COPYIN | VXLAN_CTRL_FLAG_SUSER, 503 }, 504 505 [VXLAN_CMD_FTABLE_ENTRY_ADD] = 506 { vxlan_ctrl_ftable_entry_add, sizeof(struct ifvxlancmd), 507 VXLAN_CTRL_FLAG_COPYIN | VXLAN_CTRL_FLAG_SUSER, 508 }, 509 510 [VXLAN_CMD_FTABLE_ENTRY_REM] = 511 { vxlan_ctrl_ftable_entry_rem, sizeof(struct ifvxlancmd), 512 VXLAN_CTRL_FLAG_COPYIN | VXLAN_CTRL_FLAG_SUSER, 513 }, 514 515 [VXLAN_CMD_FLUSH] = 516 { vxlan_ctrl_flush, sizeof(struct ifvxlancmd), 517 VXLAN_CTRL_FLAG_COPYIN | VXLAN_CTRL_FLAG_SUSER, 518 }, 519 }; 520 521 static const int vxlan_control_table_size = nitems(vxlan_control_table); 522 523 static int 524 vxlan_ftable_addr_cmp(const uint8_t *a, const uint8_t *b) 525 { 526 int i, d; 527 528 for (i = 0, d = 0; i < ETHER_ADDR_LEN && d == 0; i++) 529 d = ((int)a[i]) - ((int)b[i]); 530 531 return (d); 532 } 533 534 static void 535 vxlan_ftable_init(struct vxlan_softc *sc) 536 { 537 int i; 538 539 sc->vxl_ftable = malloc(sizeof(struct vxlan_ftable_head) * 540 VXLAN_SC_FTABLE_SIZE, M_VXLAN, M_ZERO | M_WAITOK); 541 542 for (i = 0; i < VXLAN_SC_FTABLE_SIZE; i++) 543 LIST_INIT(&sc->vxl_ftable[i]); 544 sc->vxl_ftable_hash_key = arc4random(); 545 } 546 547 static void 548 vxlan_ftable_fini(struct vxlan_softc *sc) 549 { 550 int i; 551 552 for (i = 0; i < VXLAN_SC_FTABLE_SIZE; i++) { 553 KASSERT(LIST_EMPTY(&sc->vxl_ftable[i]), 554 ("%s: vxlan %p ftable[%d] not empty", __func__, sc, i)); 555 } 556 MPASS(sc->vxl_ftable_cnt == 0); 557 558 free(sc->vxl_ftable, M_VXLAN); 559 sc->vxl_ftable = NULL; 560 } 561 562 static void 563 vxlan_ftable_flush(struct vxlan_softc *sc, int all) 564 { 565 struct vxlan_ftable_entry *fe, *tfe; 566 int i; 567 568 for (i = 0; i < VXLAN_SC_FTABLE_SIZE; i++) { 569 LIST_FOREACH_SAFE(fe, &sc->vxl_ftable[i], vxlfe_hash, tfe) { 570 if (all || VXLAN_FE_IS_DYNAMIC(fe)) 571 vxlan_ftable_entry_destroy(sc, fe); 572 } 573 } 574 } 575 576 static void 577 vxlan_ftable_expire(struct vxlan_softc *sc) 578 { 579 struct vxlan_ftable_entry *fe, *tfe; 580 int i; 581 582 VXLAN_LOCK_WASSERT(sc); 583 584 for (i = 0; i < VXLAN_SC_FTABLE_SIZE; i++) { 585 LIST_FOREACH_SAFE(fe, &sc->vxl_ftable[i], vxlfe_hash, tfe) { 586 if (VXLAN_FE_IS_DYNAMIC(fe) && 587 time_uptime >= fe->vxlfe_expire) 588 vxlan_ftable_entry_destroy(sc, fe); 589 } 590 } 591 } 592 593 static int 594 vxlan_ftable_update_locked(struct vxlan_softc *sc, 595 const union vxlan_sockaddr *vxlsa, const uint8_t *mac, 596 struct rm_priotracker *tracker) 597 { 598 struct vxlan_ftable_entry *fe; 599 int error __unused; 600 601 VXLAN_LOCK_ASSERT(sc); 602 603 again: 604 /* 605 * A forwarding entry for this MAC address might already exist. If 606 * so, update it, otherwise create a new one. We may have to upgrade 607 * the lock if we have to change or create an entry. 608 */ 609 fe = vxlan_ftable_entry_lookup(sc, mac); 610 if (fe != NULL) { 611 fe->vxlfe_expire = time_uptime + sc->vxl_ftable_timeout; 612 613 if (!VXLAN_FE_IS_DYNAMIC(fe) || 614 vxlan_sockaddr_in_equal(&fe->vxlfe_raddr, &vxlsa->sa)) 615 return (0); 616 if (!VXLAN_LOCK_WOWNED(sc)) { 617 VXLAN_RUNLOCK(sc, tracker); 618 VXLAN_WLOCK(sc); 619 sc->vxl_stats.ftable_lock_upgrade_failed++; 620 goto again; 621 } 622 vxlan_sockaddr_in_copy(&fe->vxlfe_raddr, &vxlsa->sa); 623 return (0); 624 } 625 626 if (!VXLAN_LOCK_WOWNED(sc)) { 627 VXLAN_RUNLOCK(sc, tracker); 628 VXLAN_WLOCK(sc); 629 sc->vxl_stats.ftable_lock_upgrade_failed++; 630 goto again; 631 } 632 633 if (sc->vxl_ftable_cnt >= sc->vxl_ftable_max) { 634 sc->vxl_stats.ftable_nospace++; 635 return (ENOSPC); 636 } 637 638 fe = vxlan_ftable_entry_alloc(); 639 if (fe == NULL) 640 return (ENOMEM); 641 642 vxlan_ftable_entry_init(sc, fe, mac, &vxlsa->sa, VXLAN_FE_FLAG_DYNAMIC); 643 644 /* The prior lookup failed, so the insert should not. */ 645 error = vxlan_ftable_entry_insert(sc, fe); 646 MPASS(error == 0); 647 648 return (0); 649 } 650 651 static int 652 vxlan_ftable_learn(struct vxlan_softc *sc, const struct sockaddr *sa, 653 const uint8_t *mac) 654 { 655 struct rm_priotracker tracker; 656 union vxlan_sockaddr vxlsa; 657 int error; 658 659 /* 660 * The source port may be randomly selected by the remote host, so 661 * use the port of the default destination address. 662 */ 663 vxlan_sockaddr_copy(&vxlsa, sa); 664 vxlsa.in4.sin_port = sc->vxl_dst_addr.in4.sin_port; 665 666 if (VXLAN_SOCKADDR_IS_IPV6(&vxlsa)) { 667 error = vxlan_sockaddr_in6_embedscope(&vxlsa); 668 if (error) 669 return (error); 670 } 671 672 VXLAN_RLOCK(sc, &tracker); 673 error = vxlan_ftable_update_locked(sc, &vxlsa, mac, &tracker); 674 VXLAN_UNLOCK(sc, &tracker); 675 676 return (error); 677 } 678 679 static int 680 vxlan_ftable_sysctl_dump(SYSCTL_HANDLER_ARGS) 681 { 682 struct rm_priotracker tracker; 683 struct sbuf sb; 684 struct vxlan_softc *sc; 685 struct vxlan_ftable_entry *fe; 686 size_t size; 687 int i, error; 688 689 /* 690 * This is mostly intended for debugging during development. It is 691 * not practical to dump an entire large table this way. 692 */ 693 694 sc = arg1; 695 size = PAGE_SIZE; /* Calculate later. */ 696 697 sbuf_new(&sb, NULL, size, SBUF_FIXEDLEN); 698 sbuf_putc(&sb, '\n'); 699 700 VXLAN_RLOCK(sc, &tracker); 701 for (i = 0; i < VXLAN_SC_FTABLE_SIZE; i++) { 702 LIST_FOREACH(fe, &sc->vxl_ftable[i], vxlfe_hash) { 703 if (sbuf_error(&sb) != 0) 704 break; 705 vxlan_ftable_entry_dump(fe, &sb); 706 } 707 } 708 VXLAN_RUNLOCK(sc, &tracker); 709 710 if (sbuf_len(&sb) == 1) 711 sbuf_setpos(&sb, 0); 712 713 sbuf_finish(&sb); 714 error = sysctl_handle_string(oidp, sbuf_data(&sb), sbuf_len(&sb), req); 715 sbuf_delete(&sb); 716 717 return (error); 718 } 719 720 static struct vxlan_ftable_entry * 721 vxlan_ftable_entry_alloc(void) 722 { 723 struct vxlan_ftable_entry *fe; 724 725 fe = malloc(sizeof(*fe), M_VXLAN, M_ZERO | M_NOWAIT); 726 727 return (fe); 728 } 729 730 static void 731 vxlan_ftable_entry_free(struct vxlan_ftable_entry *fe) 732 { 733 734 free(fe, M_VXLAN); 735 } 736 737 static void 738 vxlan_ftable_entry_init(struct vxlan_softc *sc, struct vxlan_ftable_entry *fe, 739 const uint8_t *mac, const struct sockaddr *sa, uint32_t flags) 740 { 741 742 fe->vxlfe_flags = flags; 743 fe->vxlfe_expire = time_uptime + sc->vxl_ftable_timeout; 744 memcpy(fe->vxlfe_mac, mac, ETHER_ADDR_LEN); 745 vxlan_sockaddr_copy(&fe->vxlfe_raddr, sa); 746 } 747 748 static void 749 vxlan_ftable_entry_destroy(struct vxlan_softc *sc, 750 struct vxlan_ftable_entry *fe) 751 { 752 753 sc->vxl_ftable_cnt--; 754 LIST_REMOVE(fe, vxlfe_hash); 755 vxlan_ftable_entry_free(fe); 756 } 757 758 static int 759 vxlan_ftable_entry_insert(struct vxlan_softc *sc, 760 struct vxlan_ftable_entry *fe) 761 { 762 struct vxlan_ftable_entry *lfe; 763 uint32_t hash; 764 int dir; 765 766 VXLAN_LOCK_WASSERT(sc); 767 hash = VXLAN_SC_FTABLE_HASH(sc, fe->vxlfe_mac); 768 769 lfe = LIST_FIRST(&sc->vxl_ftable[hash]); 770 if (lfe == NULL) { 771 LIST_INSERT_HEAD(&sc->vxl_ftable[hash], fe, vxlfe_hash); 772 goto out; 773 } 774 775 do { 776 dir = vxlan_ftable_addr_cmp(fe->vxlfe_mac, lfe->vxlfe_mac); 777 if (dir == 0) 778 return (EEXIST); 779 if (dir > 0) { 780 LIST_INSERT_BEFORE(lfe, fe, vxlfe_hash); 781 goto out; 782 } else if (LIST_NEXT(lfe, vxlfe_hash) == NULL) { 783 LIST_INSERT_AFTER(lfe, fe, vxlfe_hash); 784 goto out; 785 } else 786 lfe = LIST_NEXT(lfe, vxlfe_hash); 787 } while (lfe != NULL); 788 789 out: 790 sc->vxl_ftable_cnt++; 791 792 return (0); 793 } 794 795 static struct vxlan_ftable_entry * 796 vxlan_ftable_entry_lookup(struct vxlan_softc *sc, const uint8_t *mac) 797 { 798 struct vxlan_ftable_entry *fe; 799 uint32_t hash; 800 int dir; 801 802 VXLAN_LOCK_ASSERT(sc); 803 hash = VXLAN_SC_FTABLE_HASH(sc, mac); 804 805 LIST_FOREACH(fe, &sc->vxl_ftable[hash], vxlfe_hash) { 806 dir = vxlan_ftable_addr_cmp(mac, fe->vxlfe_mac); 807 if (dir == 0) 808 return (fe); 809 if (dir > 0) 810 break; 811 } 812 813 return (NULL); 814 } 815 816 static void 817 vxlan_ftable_entry_dump(struct vxlan_ftable_entry *fe, struct sbuf *sb) 818 { 819 char buf[64]; 820 const union vxlan_sockaddr *sa; 821 const void *addr; 822 int i, len, af, width; 823 824 sa = &fe->vxlfe_raddr; 825 af = sa->sa.sa_family; 826 len = sbuf_len(sb); 827 828 sbuf_printf(sb, "%c 0x%02X ", VXLAN_FE_IS_DYNAMIC(fe) ? 'D' : 'S', 829 fe->vxlfe_flags); 830 831 for (i = 0; i < ETHER_ADDR_LEN - 1; i++) 832 sbuf_printf(sb, "%02X:", fe->vxlfe_mac[i]); 833 sbuf_printf(sb, "%02X ", fe->vxlfe_mac[i]); 834 835 if (af == AF_INET) { 836 addr = &sa->in4.sin_addr; 837 width = INET_ADDRSTRLEN - 1; 838 } else { 839 addr = &sa->in6.sin6_addr; 840 width = INET6_ADDRSTRLEN - 1; 841 } 842 inet_ntop(af, addr, buf, sizeof(buf)); 843 sbuf_printf(sb, "%*s ", width, buf); 844 845 sbuf_printf(sb, "%08jd", (intmax_t)fe->vxlfe_expire); 846 847 sbuf_putc(sb, '\n'); 848 849 /* Truncate a partial line. */ 850 if (sbuf_error(sb) != 0) 851 sbuf_setpos(sb, len); 852 } 853 854 static struct vxlan_socket * 855 vxlan_socket_alloc(const union vxlan_sockaddr *sa) 856 { 857 struct vxlan_socket *vso; 858 int i; 859 860 vso = malloc(sizeof(*vso), M_VXLAN, M_WAITOK | M_ZERO); 861 rm_init(&vso->vxlso_lock, "vxlansorm"); 862 refcount_init(&vso->vxlso_refcnt, 0); 863 for (i = 0; i < VXLAN_SO_VNI_HASH_SIZE; i++) 864 LIST_INIT(&vso->vxlso_vni_hash[i]); 865 vso->vxlso_laddr = *sa; 866 867 return (vso); 868 } 869 870 static void 871 vxlan_socket_destroy(struct vxlan_socket *vso) 872 { 873 struct socket *so; 874 #ifdef INVARIANTS 875 int i; 876 struct vxlan_socket_mc_info *mc; 877 878 for (i = 0; i < VXLAN_SO_MC_MAX_GROUPS; i++) { 879 mc = &vso->vxlso_mc[i]; 880 KASSERT(mc->vxlsomc_gaddr.sa.sa_family == AF_UNSPEC, 881 ("%s: socket %p mc[%d] still has address", 882 __func__, vso, i)); 883 } 884 885 for (i = 0; i < VXLAN_SO_VNI_HASH_SIZE; i++) { 886 KASSERT(LIST_EMPTY(&vso->vxlso_vni_hash[i]), 887 ("%s: socket %p vni_hash[%d] not empty", 888 __func__, vso, i)); 889 } 890 #endif 891 so = vso->vxlso_sock; 892 if (so != NULL) { 893 vso->vxlso_sock = NULL; 894 soclose(so); 895 } 896 897 rm_destroy(&vso->vxlso_lock); 898 free(vso, M_VXLAN); 899 } 900 901 static void 902 vxlan_socket_release(struct vxlan_socket *vso) 903 { 904 int destroy; 905 906 VXLAN_LIST_LOCK(); 907 destroy = VXLAN_SO_RELEASE(vso); 908 if (destroy != 0) 909 LIST_REMOVE(vso, vxlso_entry); 910 VXLAN_LIST_UNLOCK(); 911 912 if (destroy != 0) 913 vxlan_socket_destroy(vso); 914 } 915 916 static struct vxlan_socket * 917 vxlan_socket_lookup(union vxlan_sockaddr *vxlsa) 918 { 919 struct vxlan_socket *vso; 920 921 VXLAN_LIST_LOCK(); 922 LIST_FOREACH(vso, &vxlan_socket_list, vxlso_entry) { 923 if (vxlan_sockaddr_cmp(&vso->vxlso_laddr, &vxlsa->sa) == 0) { 924 VXLAN_SO_ACQUIRE(vso); 925 break; 926 } 927 } 928 VXLAN_LIST_UNLOCK(); 929 930 return (vso); 931 } 932 933 static void 934 vxlan_socket_insert(struct vxlan_socket *vso) 935 { 936 937 VXLAN_LIST_LOCK(); 938 VXLAN_SO_ACQUIRE(vso); 939 LIST_INSERT_HEAD(&vxlan_socket_list, vso, vxlso_entry); 940 VXLAN_LIST_UNLOCK(); 941 } 942 943 static int 944 vxlan_socket_init(struct vxlan_socket *vso, struct ifnet *ifp) 945 { 946 struct thread *td; 947 int error; 948 949 td = curthread; 950 951 error = socreate(vso->vxlso_laddr.sa.sa_family, &vso->vxlso_sock, 952 SOCK_DGRAM, IPPROTO_UDP, td->td_ucred, td); 953 if (error) { 954 if_printf(ifp, "cannot create socket: %d\n", error); 955 return (error); 956 } 957 958 error = udp_set_kernel_tunneling(vso->vxlso_sock, 959 vxlan_rcv_udp_packet, NULL, vso); 960 if (error) { 961 if_printf(ifp, "cannot set tunneling function: %d\n", error); 962 return (error); 963 } 964 965 if (vxlan_reuse_port != 0) { 966 struct sockopt sopt; 967 int val = 1; 968 969 bzero(&sopt, sizeof(sopt)); 970 sopt.sopt_dir = SOPT_SET; 971 sopt.sopt_level = IPPROTO_IP; 972 sopt.sopt_name = SO_REUSEPORT; 973 sopt.sopt_val = &val; 974 sopt.sopt_valsize = sizeof(val); 975 error = sosetopt(vso->vxlso_sock, &sopt); 976 if (error) { 977 if_printf(ifp, 978 "cannot set REUSEADDR socket opt: %d\n", error); 979 return (error); 980 } 981 } 982 983 return (0); 984 } 985 986 static int 987 vxlan_socket_bind(struct vxlan_socket *vso, struct ifnet *ifp) 988 { 989 union vxlan_sockaddr laddr; 990 struct thread *td; 991 int error; 992 993 td = curthread; 994 laddr = vso->vxlso_laddr; 995 996 error = sobind(vso->vxlso_sock, &laddr.sa, td); 997 if (error) { 998 if (error != EADDRINUSE) 999 if_printf(ifp, "cannot bind socket: %d\n", error); 1000 return (error); 1001 } 1002 1003 return (0); 1004 } 1005 1006 static int 1007 vxlan_socket_create(struct ifnet *ifp, int multicast, 1008 const union vxlan_sockaddr *saddr, struct vxlan_socket **vsop) 1009 { 1010 union vxlan_sockaddr laddr; 1011 struct vxlan_socket *vso; 1012 int error; 1013 1014 laddr = *saddr; 1015 1016 /* 1017 * If this socket will be multicast, then only the local port 1018 * must be specified when binding. 1019 */ 1020 if (multicast != 0) { 1021 if (VXLAN_SOCKADDR_IS_IPV4(&laddr)) 1022 laddr.in4.sin_addr.s_addr = INADDR_ANY; 1023 #ifdef INET6 1024 else 1025 laddr.in6.sin6_addr = in6addr_any; 1026 #endif 1027 } 1028 1029 vso = vxlan_socket_alloc(&laddr); 1030 if (vso == NULL) 1031 return (ENOMEM); 1032 1033 error = vxlan_socket_init(vso, ifp); 1034 if (error) 1035 goto fail; 1036 1037 error = vxlan_socket_bind(vso, ifp); 1038 if (error) 1039 goto fail; 1040 1041 /* 1042 * There is a small window between the bind completing and 1043 * inserting the socket, so that a concurrent create may fail. 1044 * Let's not worry about that for now. 1045 */ 1046 vxlan_socket_insert(vso); 1047 *vsop = vso; 1048 1049 return (0); 1050 1051 fail: 1052 vxlan_socket_destroy(vso); 1053 1054 return (error); 1055 } 1056 1057 static void 1058 vxlan_socket_ifdetach(struct vxlan_socket *vso, struct ifnet *ifp, 1059 struct vxlan_softc_head *list) 1060 { 1061 struct rm_priotracker tracker; 1062 struct vxlan_softc *sc; 1063 int i; 1064 1065 VXLAN_SO_RLOCK(vso, &tracker); 1066 for (i = 0; i < VXLAN_SO_VNI_HASH_SIZE; i++) { 1067 LIST_FOREACH(sc, &vso->vxlso_vni_hash[i], vxl_entry) 1068 vxlan_ifdetach(sc, ifp, list); 1069 } 1070 VXLAN_SO_RUNLOCK(vso, &tracker); 1071 } 1072 1073 static struct vxlan_socket * 1074 vxlan_socket_mc_lookup(const union vxlan_sockaddr *vxlsa) 1075 { 1076 union vxlan_sockaddr laddr; 1077 struct vxlan_socket *vso; 1078 1079 laddr = *vxlsa; 1080 1081 if (VXLAN_SOCKADDR_IS_IPV4(&laddr)) 1082 laddr.in4.sin_addr.s_addr = INADDR_ANY; 1083 #ifdef INET6 1084 else 1085 laddr.in6.sin6_addr = in6addr_any; 1086 #endif 1087 1088 vso = vxlan_socket_lookup(&laddr); 1089 1090 return (vso); 1091 } 1092 1093 static int 1094 vxlan_sockaddr_mc_info_match(const struct vxlan_socket_mc_info *mc, 1095 const union vxlan_sockaddr *group, const union vxlan_sockaddr *local, 1096 int ifidx) 1097 { 1098 1099 if (!vxlan_sockaddr_in_any(local) && 1100 !vxlan_sockaddr_in_equal(&mc->vxlsomc_saddr, &local->sa)) 1101 return (0); 1102 if (!vxlan_sockaddr_in_equal(&mc->vxlsomc_gaddr, &group->sa)) 1103 return (0); 1104 if (ifidx != 0 && ifidx != mc->vxlsomc_ifidx) 1105 return (0); 1106 1107 return (1); 1108 } 1109 1110 static int 1111 vxlan_socket_mc_join_group(struct vxlan_socket *vso, 1112 const union vxlan_sockaddr *group, const union vxlan_sockaddr *local, 1113 int *ifidx, union vxlan_sockaddr *source) 1114 { 1115 struct sockopt sopt; 1116 int error; 1117 1118 *source = *local; 1119 1120 if (VXLAN_SOCKADDR_IS_IPV4(group)) { 1121 struct ip_mreq mreq; 1122 1123 mreq.imr_multiaddr = group->in4.sin_addr; 1124 mreq.imr_interface = local->in4.sin_addr; 1125 1126 bzero(&sopt, sizeof(sopt)); 1127 sopt.sopt_dir = SOPT_SET; 1128 sopt.sopt_level = IPPROTO_IP; 1129 sopt.sopt_name = IP_ADD_MEMBERSHIP; 1130 sopt.sopt_val = &mreq; 1131 sopt.sopt_valsize = sizeof(mreq); 1132 error = sosetopt(vso->vxlso_sock, &sopt); 1133 if (error) 1134 return (error); 1135 1136 /* 1137 * BMV: Ideally, there would be a formal way for us to get 1138 * the local interface that was selected based on the 1139 * imr_interface address. We could then update *ifidx so 1140 * vxlan_sockaddr_mc_info_match() would return a match for 1141 * later creates that explicitly set the multicast interface. 1142 * 1143 * If we really need to, we can of course look in the INP's 1144 * membership list: 1145 * sotoinpcb(vso->vxlso_sock)->inp_moptions-> 1146 * imo_head[]->imf_inm->inm_ifp 1147 * similarly to imo_match_group(). 1148 */ 1149 source->in4.sin_addr = local->in4.sin_addr; 1150 1151 } else if (VXLAN_SOCKADDR_IS_IPV6(group)) { 1152 struct ipv6_mreq mreq; 1153 1154 mreq.ipv6mr_multiaddr = group->in6.sin6_addr; 1155 mreq.ipv6mr_interface = *ifidx; 1156 1157 bzero(&sopt, sizeof(sopt)); 1158 sopt.sopt_dir = SOPT_SET; 1159 sopt.sopt_level = IPPROTO_IPV6; 1160 sopt.sopt_name = IPV6_JOIN_GROUP; 1161 sopt.sopt_val = &mreq; 1162 sopt.sopt_valsize = sizeof(mreq); 1163 error = sosetopt(vso->vxlso_sock, &sopt); 1164 if (error) 1165 return (error); 1166 1167 /* 1168 * BMV: As with IPv4, we would really like to know what 1169 * interface in6p_lookup_mcast_ifp() selected. 1170 */ 1171 } else 1172 error = EAFNOSUPPORT; 1173 1174 return (error); 1175 } 1176 1177 static int 1178 vxlan_socket_mc_leave_group(struct vxlan_socket *vso, 1179 const union vxlan_sockaddr *group, const union vxlan_sockaddr *source, 1180 int ifidx) 1181 { 1182 struct sockopt sopt; 1183 int error; 1184 1185 bzero(&sopt, sizeof(sopt)); 1186 sopt.sopt_dir = SOPT_SET; 1187 1188 if (VXLAN_SOCKADDR_IS_IPV4(group)) { 1189 struct ip_mreq mreq; 1190 1191 mreq.imr_multiaddr = group->in4.sin_addr; 1192 mreq.imr_interface = source->in4.sin_addr; 1193 1194 sopt.sopt_level = IPPROTO_IP; 1195 sopt.sopt_name = IP_DROP_MEMBERSHIP; 1196 sopt.sopt_val = &mreq; 1197 sopt.sopt_valsize = sizeof(mreq); 1198 error = sosetopt(vso->vxlso_sock, &sopt); 1199 1200 } else if (VXLAN_SOCKADDR_IS_IPV6(group)) { 1201 struct ipv6_mreq mreq; 1202 1203 mreq.ipv6mr_multiaddr = group->in6.sin6_addr; 1204 mreq.ipv6mr_interface = ifidx; 1205 1206 sopt.sopt_level = IPPROTO_IPV6; 1207 sopt.sopt_name = IPV6_LEAVE_GROUP; 1208 sopt.sopt_val = &mreq; 1209 sopt.sopt_valsize = sizeof(mreq); 1210 error = sosetopt(vso->vxlso_sock, &sopt); 1211 1212 } else 1213 error = EAFNOSUPPORT; 1214 1215 return (error); 1216 } 1217 1218 static int 1219 vxlan_socket_mc_add_group(struct vxlan_socket *vso, 1220 const union vxlan_sockaddr *group, const union vxlan_sockaddr *local, 1221 int ifidx, int *idx) 1222 { 1223 union vxlan_sockaddr source; 1224 struct vxlan_socket_mc_info *mc; 1225 int i, empty, error; 1226 1227 /* 1228 * Within a socket, the same multicast group may be used by multiple 1229 * interfaces, each with a different network identifier. But a socket 1230 * may only join a multicast group once, so keep track of the users 1231 * here. 1232 */ 1233 1234 VXLAN_SO_WLOCK(vso); 1235 for (empty = 0, i = 0; i < VXLAN_SO_MC_MAX_GROUPS; i++) { 1236 mc = &vso->vxlso_mc[i]; 1237 1238 if (mc->vxlsomc_gaddr.sa.sa_family == AF_UNSPEC) { 1239 empty++; 1240 continue; 1241 } 1242 1243 if (vxlan_sockaddr_mc_info_match(mc, group, local, ifidx)) 1244 goto out; 1245 } 1246 VXLAN_SO_WUNLOCK(vso); 1247 1248 if (empty == 0) 1249 return (ENOSPC); 1250 1251 error = vxlan_socket_mc_join_group(vso, group, local, &ifidx, &source); 1252 if (error) 1253 return (error); 1254 1255 VXLAN_SO_WLOCK(vso); 1256 for (i = 0; i < VXLAN_SO_MC_MAX_GROUPS; i++) { 1257 mc = &vso->vxlso_mc[i]; 1258 1259 if (mc->vxlsomc_gaddr.sa.sa_family == AF_UNSPEC) { 1260 vxlan_sockaddr_copy(&mc->vxlsomc_gaddr, &group->sa); 1261 vxlan_sockaddr_copy(&mc->vxlsomc_saddr, &source.sa); 1262 mc->vxlsomc_ifidx = ifidx; 1263 goto out; 1264 } 1265 } 1266 VXLAN_SO_WUNLOCK(vso); 1267 1268 error = vxlan_socket_mc_leave_group(vso, group, &source, ifidx); 1269 MPASS(error == 0); 1270 1271 return (ENOSPC); 1272 1273 out: 1274 mc->vxlsomc_users++; 1275 VXLAN_SO_WUNLOCK(vso); 1276 1277 *idx = i; 1278 1279 return (0); 1280 } 1281 1282 static void 1283 vxlan_socket_mc_release_group_by_idx(struct vxlan_socket *vso, int idx) 1284 { 1285 union vxlan_sockaddr group, source; 1286 struct vxlan_socket_mc_info *mc; 1287 int ifidx, leave; 1288 1289 KASSERT(idx >= 0 && idx < VXLAN_SO_MC_MAX_GROUPS, 1290 ("%s: vso %p idx %d out of bounds", __func__, vso, idx)); 1291 1292 leave = 0; 1293 mc = &vso->vxlso_mc[idx]; 1294 1295 VXLAN_SO_WLOCK(vso); 1296 mc->vxlsomc_users--; 1297 if (mc->vxlsomc_users == 0) { 1298 group = mc->vxlsomc_gaddr; 1299 source = mc->vxlsomc_saddr; 1300 ifidx = mc->vxlsomc_ifidx; 1301 bzero(mc, sizeof(*mc)); 1302 leave = 1; 1303 } 1304 VXLAN_SO_WUNLOCK(vso); 1305 1306 if (leave != 0) { 1307 /* 1308 * Our socket's membership in this group may have already 1309 * been removed if we joined through an interface that's 1310 * been detached. 1311 */ 1312 vxlan_socket_mc_leave_group(vso, &group, &source, ifidx); 1313 } 1314 } 1315 1316 static struct vxlan_softc * 1317 vxlan_socket_lookup_softc_locked(struct vxlan_socket *vso, uint32_t vni) 1318 { 1319 struct vxlan_softc *sc; 1320 uint32_t hash; 1321 1322 VXLAN_SO_LOCK_ASSERT(vso); 1323 hash = VXLAN_SO_VNI_HASH(vni); 1324 1325 LIST_FOREACH(sc, &vso->vxlso_vni_hash[hash], vxl_entry) { 1326 if (sc->vxl_vni == vni) { 1327 VXLAN_ACQUIRE(sc); 1328 break; 1329 } 1330 } 1331 1332 return (sc); 1333 } 1334 1335 static struct vxlan_softc * 1336 vxlan_socket_lookup_softc(struct vxlan_socket *vso, uint32_t vni) 1337 { 1338 struct rm_priotracker tracker; 1339 struct vxlan_softc *sc; 1340 1341 VXLAN_SO_RLOCK(vso, &tracker); 1342 sc = vxlan_socket_lookup_softc_locked(vso, vni); 1343 VXLAN_SO_RUNLOCK(vso, &tracker); 1344 1345 return (sc); 1346 } 1347 1348 static int 1349 vxlan_socket_insert_softc(struct vxlan_socket *vso, struct vxlan_softc *sc) 1350 { 1351 struct vxlan_softc *tsc; 1352 uint32_t vni, hash; 1353 1354 vni = sc->vxl_vni; 1355 hash = VXLAN_SO_VNI_HASH(vni); 1356 1357 VXLAN_SO_WLOCK(vso); 1358 tsc = vxlan_socket_lookup_softc_locked(vso, vni); 1359 if (tsc != NULL) { 1360 VXLAN_SO_WUNLOCK(vso); 1361 vxlan_release(tsc); 1362 return (EEXIST); 1363 } 1364 1365 VXLAN_ACQUIRE(sc); 1366 LIST_INSERT_HEAD(&vso->vxlso_vni_hash[hash], sc, vxl_entry); 1367 VXLAN_SO_WUNLOCK(vso); 1368 1369 return (0); 1370 } 1371 1372 static void 1373 vxlan_socket_remove_softc(struct vxlan_socket *vso, struct vxlan_softc *sc) 1374 { 1375 1376 VXLAN_SO_WLOCK(vso); 1377 LIST_REMOVE(sc, vxl_entry); 1378 VXLAN_SO_WUNLOCK(vso); 1379 1380 vxlan_release(sc); 1381 } 1382 1383 static struct ifnet * 1384 vxlan_multicast_if_ref(struct vxlan_softc *sc, int ipv4) 1385 { 1386 struct ifnet *ifp; 1387 1388 VXLAN_LOCK_ASSERT(sc); 1389 1390 if (ipv4 && sc->vxl_im4o != NULL) 1391 ifp = sc->vxl_im4o->imo_multicast_ifp; 1392 else if (!ipv4 && sc->vxl_im6o != NULL) 1393 ifp = sc->vxl_im6o->im6o_multicast_ifp; 1394 else 1395 ifp = NULL; 1396 1397 if (ifp != NULL) 1398 if_ref(ifp); 1399 1400 return (ifp); 1401 } 1402 1403 static void 1404 vxlan_free_multicast(struct vxlan_softc *sc) 1405 { 1406 1407 if (sc->vxl_mc_ifp != NULL) { 1408 if_rele(sc->vxl_mc_ifp); 1409 sc->vxl_mc_ifp = NULL; 1410 sc->vxl_mc_ifindex = 0; 1411 } 1412 1413 if (sc->vxl_im4o != NULL) { 1414 free(sc->vxl_im4o, M_VXLAN); 1415 sc->vxl_im4o = NULL; 1416 } 1417 1418 if (sc->vxl_im6o != NULL) { 1419 free(sc->vxl_im6o, M_VXLAN); 1420 sc->vxl_im6o = NULL; 1421 } 1422 } 1423 1424 static int 1425 vxlan_setup_multicast_interface(struct vxlan_softc *sc) 1426 { 1427 struct ifnet *ifp; 1428 1429 ifp = ifunit_ref(sc->vxl_mc_ifname); 1430 if (ifp == NULL) { 1431 if_printf(sc->vxl_ifp, "multicast interface %s does " 1432 "not exist\n", sc->vxl_mc_ifname); 1433 return (ENOENT); 1434 } 1435 1436 if ((ifp->if_flags & IFF_MULTICAST) == 0) { 1437 if_printf(sc->vxl_ifp, "interface %s does not support " 1438 "multicast\n", sc->vxl_mc_ifname); 1439 if_rele(ifp); 1440 return (ENOTSUP); 1441 } 1442 1443 sc->vxl_mc_ifp = ifp; 1444 sc->vxl_mc_ifindex = ifp->if_index; 1445 1446 return (0); 1447 } 1448 1449 static int 1450 vxlan_setup_multicast(struct vxlan_softc *sc) 1451 { 1452 const union vxlan_sockaddr *group; 1453 int error; 1454 1455 group = &sc->vxl_dst_addr; 1456 error = 0; 1457 1458 if (sc->vxl_mc_ifname[0] != '\0') { 1459 error = vxlan_setup_multicast_interface(sc); 1460 if (error) 1461 return (error); 1462 } 1463 1464 /* 1465 * Initialize an multicast options structure that is sufficiently 1466 * populated for use in the respective IP output routine. This 1467 * structure is typically stored in the socket, but our sockets 1468 * may be shared among multiple interfaces. 1469 */ 1470 if (VXLAN_SOCKADDR_IS_IPV4(group)) { 1471 sc->vxl_im4o = malloc(sizeof(struct ip_moptions), M_VXLAN, 1472 M_ZERO | M_WAITOK); 1473 sc->vxl_im4o->imo_multicast_ifp = sc->vxl_mc_ifp; 1474 sc->vxl_im4o->imo_multicast_ttl = sc->vxl_ttl; 1475 sc->vxl_im4o->imo_multicast_vif = -1; 1476 } else if (VXLAN_SOCKADDR_IS_IPV6(group)) { 1477 sc->vxl_im6o = malloc(sizeof(struct ip6_moptions), M_VXLAN, 1478 M_ZERO | M_WAITOK); 1479 sc->vxl_im6o->im6o_multicast_ifp = sc->vxl_mc_ifp; 1480 sc->vxl_im6o->im6o_multicast_hlim = sc->vxl_ttl; 1481 } 1482 1483 return (error); 1484 } 1485 1486 static int 1487 vxlan_setup_socket(struct vxlan_softc *sc) 1488 { 1489 struct vxlan_socket *vso; 1490 struct ifnet *ifp; 1491 union vxlan_sockaddr *saddr, *daddr; 1492 int multicast, error; 1493 1494 vso = NULL; 1495 ifp = sc->vxl_ifp; 1496 saddr = &sc->vxl_src_addr; 1497 daddr = &sc->vxl_dst_addr; 1498 1499 multicast = vxlan_sockaddr_in_multicast(daddr); 1500 MPASS(multicast != -1); 1501 sc->vxl_vso_mc_index = -1; 1502 1503 /* 1504 * Try to create the socket. If that fails, attempt to use an 1505 * existing socket. 1506 */ 1507 error = vxlan_socket_create(ifp, multicast, saddr, &vso); 1508 if (error) { 1509 if (multicast != 0) 1510 vso = vxlan_socket_mc_lookup(saddr); 1511 else 1512 vso = vxlan_socket_lookup(saddr); 1513 1514 if (vso == NULL) { 1515 if_printf(ifp, "cannot create socket (error: %d), " 1516 "and no existing socket found\n", error); 1517 goto out; 1518 } 1519 } 1520 1521 if (multicast != 0) { 1522 error = vxlan_setup_multicast(sc); 1523 if (error) 1524 goto out; 1525 1526 error = vxlan_socket_mc_add_group(vso, daddr, saddr, 1527 sc->vxl_mc_ifindex, &sc->vxl_vso_mc_index); 1528 if (error) 1529 goto out; 1530 } 1531 1532 sc->vxl_sock = vso; 1533 error = vxlan_socket_insert_softc(vso, sc); 1534 if (error) { 1535 sc->vxl_sock = NULL; 1536 if_printf(ifp, "network identifier %d already exists in " 1537 "this socket\n", sc->vxl_vni); 1538 goto out; 1539 } 1540 1541 return (0); 1542 1543 out: 1544 if (vso != NULL) { 1545 if (sc->vxl_vso_mc_index != -1) { 1546 vxlan_socket_mc_release_group_by_idx(vso, 1547 sc->vxl_vso_mc_index); 1548 sc->vxl_vso_mc_index = -1; 1549 } 1550 if (multicast != 0) 1551 vxlan_free_multicast(sc); 1552 vxlan_socket_release(vso); 1553 } 1554 1555 return (error); 1556 } 1557 1558 static void 1559 vxlan_setup_interface(struct vxlan_softc *sc) 1560 { 1561 struct ifnet *ifp; 1562 1563 ifp = sc->vxl_ifp; 1564 ifp->if_hdrlen = ETHER_HDR_LEN + sizeof(struct vxlanudphdr); 1565 1566 if (VXLAN_SOCKADDR_IS_IPV4(&sc->vxl_dst_addr) != 0) 1567 ifp->if_hdrlen += sizeof(struct ip); 1568 else if (VXLAN_SOCKADDR_IS_IPV6(&sc->vxl_dst_addr) != 0) 1569 ifp->if_hdrlen += sizeof(struct ip6_hdr); 1570 } 1571 1572 static int 1573 vxlan_valid_init_config(struct vxlan_softc *sc) 1574 { 1575 const char *reason; 1576 1577 if (vxlan_check_vni(sc->vxl_vni) != 0) { 1578 reason = "invalid virtual network identifier specified"; 1579 goto fail; 1580 } 1581 1582 if (vxlan_sockaddr_supported(&sc->vxl_src_addr, 1) == 0) { 1583 reason = "source address type is not supported"; 1584 goto fail; 1585 } 1586 1587 if (vxlan_sockaddr_supported(&sc->vxl_dst_addr, 0) == 0) { 1588 reason = "destination address type is not supported"; 1589 goto fail; 1590 } 1591 1592 if (vxlan_sockaddr_in_any(&sc->vxl_dst_addr) != 0) { 1593 reason = "no valid destination address specified"; 1594 goto fail; 1595 } 1596 1597 if (vxlan_sockaddr_in_multicast(&sc->vxl_dst_addr) == 0 && 1598 sc->vxl_mc_ifname[0] != '\0') { 1599 reason = "can only specify interface with a group address"; 1600 goto fail; 1601 } 1602 1603 if (vxlan_sockaddr_in_any(&sc->vxl_src_addr) == 0) { 1604 if (VXLAN_SOCKADDR_IS_IPV4(&sc->vxl_src_addr) ^ 1605 VXLAN_SOCKADDR_IS_IPV4(&sc->vxl_dst_addr)) { 1606 reason = "source and destination address must both " 1607 "be either IPv4 or IPv6"; 1608 goto fail; 1609 } 1610 } 1611 1612 if (sc->vxl_src_addr.in4.sin_port == 0) { 1613 reason = "local port not specified"; 1614 goto fail; 1615 } 1616 1617 if (sc->vxl_dst_addr.in4.sin_port == 0) { 1618 reason = "remote port not specified"; 1619 goto fail; 1620 } 1621 1622 return (0); 1623 1624 fail: 1625 if_printf(sc->vxl_ifp, "cannot initialize interface: %s\n", reason); 1626 return (EINVAL); 1627 } 1628 1629 static void 1630 vxlan_init_wait(struct vxlan_softc *sc) 1631 { 1632 1633 VXLAN_LOCK_WASSERT(sc); 1634 while (sc->vxl_flags & VXLAN_FLAG_INIT) 1635 rm_sleep(sc, &sc->vxl_lock, 0, "vxlint", hz); 1636 } 1637 1638 static void 1639 vxlan_init_complete(struct vxlan_softc *sc) 1640 { 1641 1642 VXLAN_WLOCK(sc); 1643 sc->vxl_flags &= ~VXLAN_FLAG_INIT; 1644 wakeup(sc); 1645 VXLAN_WUNLOCK(sc); 1646 } 1647 1648 static void 1649 vxlan_init(void *xsc) 1650 { 1651 static const uint8_t empty_mac[ETHER_ADDR_LEN]; 1652 struct vxlan_softc *sc; 1653 struct ifnet *ifp; 1654 1655 sc = xsc; 1656 ifp = sc->vxl_ifp; 1657 1658 VXLAN_WLOCK(sc); 1659 if (ifp->if_drv_flags & IFF_DRV_RUNNING) { 1660 VXLAN_WUNLOCK(sc); 1661 return; 1662 } 1663 sc->vxl_flags |= VXLAN_FLAG_INIT; 1664 VXLAN_WUNLOCK(sc); 1665 1666 if (vxlan_valid_init_config(sc) != 0) 1667 goto out; 1668 1669 vxlan_setup_interface(sc); 1670 1671 if (vxlan_setup_socket(sc) != 0) 1672 goto out; 1673 1674 /* Initialize the default forwarding entry. */ 1675 vxlan_ftable_entry_init(sc, &sc->vxl_default_fe, empty_mac, 1676 &sc->vxl_dst_addr.sa, VXLAN_FE_FLAG_STATIC); 1677 1678 VXLAN_WLOCK(sc); 1679 ifp->if_drv_flags |= IFF_DRV_RUNNING; 1680 callout_reset(&sc->vxl_callout, vxlan_ftable_prune_period * hz, 1681 vxlan_timer, sc); 1682 VXLAN_WUNLOCK(sc); 1683 1684 if_link_state_change(ifp, LINK_STATE_UP); 1685 out: 1686 vxlan_init_complete(sc); 1687 } 1688 1689 static void 1690 vxlan_release(struct vxlan_softc *sc) 1691 { 1692 1693 /* 1694 * The softc may be destroyed as soon as we release our reference, 1695 * so we cannot serialize the wakeup with the softc lock. We use a 1696 * timeout in our sleeps so a missed wakeup is unfortunate but not 1697 * fatal. 1698 */ 1699 if (VXLAN_RELEASE(sc) != 0) 1700 wakeup(sc); 1701 } 1702 1703 static void 1704 vxlan_teardown_wait(struct vxlan_softc *sc) 1705 { 1706 1707 VXLAN_LOCK_WASSERT(sc); 1708 while (sc->vxl_flags & VXLAN_FLAG_TEARDOWN) 1709 rm_sleep(sc, &sc->vxl_lock, 0, "vxltrn", hz); 1710 } 1711 1712 static void 1713 vxlan_teardown_complete(struct vxlan_softc *sc) 1714 { 1715 1716 VXLAN_WLOCK(sc); 1717 sc->vxl_flags &= ~VXLAN_FLAG_TEARDOWN; 1718 wakeup(sc); 1719 VXLAN_WUNLOCK(sc); 1720 } 1721 1722 static void 1723 vxlan_teardown_locked(struct vxlan_softc *sc) 1724 { 1725 struct ifnet *ifp; 1726 struct vxlan_socket *vso; 1727 1728 ifp = sc->vxl_ifp; 1729 1730 VXLAN_LOCK_WASSERT(sc); 1731 MPASS(sc->vxl_flags & VXLAN_FLAG_TEARDOWN); 1732 1733 ifp->if_flags &= ~IFF_UP; 1734 ifp->if_drv_flags &= ~IFF_DRV_RUNNING; 1735 callout_stop(&sc->vxl_callout); 1736 vso = sc->vxl_sock; 1737 sc->vxl_sock = NULL; 1738 1739 VXLAN_WUNLOCK(sc); 1740 if_link_state_change(ifp, LINK_STATE_DOWN); 1741 1742 if (vso != NULL) { 1743 vxlan_socket_remove_softc(vso, sc); 1744 1745 if (sc->vxl_vso_mc_index != -1) { 1746 vxlan_socket_mc_release_group_by_idx(vso, 1747 sc->vxl_vso_mc_index); 1748 sc->vxl_vso_mc_index = -1; 1749 } 1750 } 1751 1752 VXLAN_WLOCK(sc); 1753 while (sc->vxl_refcnt != 0) 1754 rm_sleep(sc, &sc->vxl_lock, 0, "vxldrn", hz); 1755 VXLAN_WUNLOCK(sc); 1756 1757 callout_drain(&sc->vxl_callout); 1758 1759 vxlan_free_multicast(sc); 1760 if (vso != NULL) 1761 vxlan_socket_release(vso); 1762 1763 vxlan_teardown_complete(sc); 1764 } 1765 1766 static void 1767 vxlan_teardown(struct vxlan_softc *sc) 1768 { 1769 1770 VXLAN_WLOCK(sc); 1771 if (sc->vxl_flags & VXLAN_FLAG_TEARDOWN) { 1772 vxlan_teardown_wait(sc); 1773 VXLAN_WUNLOCK(sc); 1774 return; 1775 } 1776 1777 sc->vxl_flags |= VXLAN_FLAG_TEARDOWN; 1778 vxlan_teardown_locked(sc); 1779 } 1780 1781 static void 1782 vxlan_ifdetach(struct vxlan_softc *sc, struct ifnet *ifp, 1783 struct vxlan_softc_head *list) 1784 { 1785 1786 VXLAN_WLOCK(sc); 1787 1788 if (sc->vxl_mc_ifp != ifp) 1789 goto out; 1790 if (sc->vxl_flags & VXLAN_FLAG_TEARDOWN) 1791 goto out; 1792 1793 sc->vxl_flags |= VXLAN_FLAG_TEARDOWN; 1794 LIST_INSERT_HEAD(list, sc, vxl_ifdetach_list); 1795 1796 out: 1797 VXLAN_WUNLOCK(sc); 1798 } 1799 1800 static void 1801 vxlan_timer(void *xsc) 1802 { 1803 struct vxlan_softc *sc; 1804 1805 sc = xsc; 1806 VXLAN_LOCK_WASSERT(sc); 1807 1808 vxlan_ftable_expire(sc); 1809 callout_schedule(&sc->vxl_callout, vxlan_ftable_prune_period * hz); 1810 } 1811 1812 static int 1813 vxlan_ioctl_ifflags(struct vxlan_softc *sc) 1814 { 1815 struct ifnet *ifp; 1816 1817 ifp = sc->vxl_ifp; 1818 1819 if (ifp->if_flags & IFF_UP) { 1820 if ((ifp->if_drv_flags & IFF_DRV_RUNNING) == 0) 1821 vxlan_init(sc); 1822 } else { 1823 if (ifp->if_drv_flags & IFF_DRV_RUNNING) 1824 vxlan_teardown(sc); 1825 } 1826 1827 return (0); 1828 } 1829 1830 static int 1831 vxlan_ctrl_get_config(struct vxlan_softc *sc, void *arg) 1832 { 1833 struct rm_priotracker tracker; 1834 struct ifvxlancfg *cfg; 1835 1836 cfg = arg; 1837 bzero(cfg, sizeof(*cfg)); 1838 1839 VXLAN_RLOCK(sc, &tracker); 1840 cfg->vxlc_vni = sc->vxl_vni; 1841 memcpy(&cfg->vxlc_local_sa, &sc->vxl_src_addr, 1842 sizeof(union vxlan_sockaddr)); 1843 memcpy(&cfg->vxlc_remote_sa, &sc->vxl_dst_addr, 1844 sizeof(union vxlan_sockaddr)); 1845 cfg->vxlc_mc_ifindex = sc->vxl_mc_ifindex; 1846 cfg->vxlc_ftable_cnt = sc->vxl_ftable_cnt; 1847 cfg->vxlc_ftable_max = sc->vxl_ftable_max; 1848 cfg->vxlc_ftable_timeout = sc->vxl_ftable_timeout; 1849 cfg->vxlc_port_min = sc->vxl_min_port; 1850 cfg->vxlc_port_max = sc->vxl_max_port; 1851 cfg->vxlc_learn = (sc->vxl_flags & VXLAN_FLAG_LEARN) != 0; 1852 cfg->vxlc_ttl = sc->vxl_ttl; 1853 VXLAN_RUNLOCK(sc, &tracker); 1854 1855 #ifdef INET6 1856 if (VXLAN_SOCKADDR_IS_IPV6(&cfg->vxlc_local_sa)) 1857 sa6_recoverscope(&cfg->vxlc_local_sa.in6); 1858 if (VXLAN_SOCKADDR_IS_IPV6(&cfg->vxlc_remote_sa)) 1859 sa6_recoverscope(&cfg->vxlc_remote_sa.in6); 1860 #endif 1861 1862 return (0); 1863 } 1864 1865 static int 1866 vxlan_ctrl_set_vni(struct vxlan_softc *sc, void *arg) 1867 { 1868 struct ifvxlancmd *cmd; 1869 int error; 1870 1871 cmd = arg; 1872 1873 if (vxlan_check_vni(cmd->vxlcmd_vni) != 0) 1874 return (EINVAL); 1875 1876 VXLAN_WLOCK(sc); 1877 if (vxlan_can_change_config(sc)) { 1878 sc->vxl_vni = cmd->vxlcmd_vni; 1879 error = 0; 1880 } else 1881 error = EBUSY; 1882 VXLAN_WUNLOCK(sc); 1883 1884 return (error); 1885 } 1886 1887 static int 1888 vxlan_ctrl_set_local_addr(struct vxlan_softc *sc, void *arg) 1889 { 1890 struct ifvxlancmd *cmd; 1891 union vxlan_sockaddr *vxlsa; 1892 int error; 1893 1894 cmd = arg; 1895 vxlsa = &cmd->vxlcmd_sa; 1896 1897 if (!VXLAN_SOCKADDR_IS_IPV46(vxlsa)) 1898 return (EINVAL); 1899 if (vxlan_sockaddr_in_multicast(vxlsa) != 0) 1900 return (EINVAL); 1901 if (VXLAN_SOCKADDR_IS_IPV6(vxlsa)) { 1902 error = vxlan_sockaddr_in6_embedscope(vxlsa); 1903 if (error) 1904 return (error); 1905 } 1906 1907 VXLAN_WLOCK(sc); 1908 if (vxlan_can_change_config(sc)) { 1909 vxlan_sockaddr_in_copy(&sc->vxl_src_addr, &vxlsa->sa); 1910 error = 0; 1911 } else 1912 error = EBUSY; 1913 VXLAN_WUNLOCK(sc); 1914 1915 return (error); 1916 } 1917 1918 static int 1919 vxlan_ctrl_set_remote_addr(struct vxlan_softc *sc, void *arg) 1920 { 1921 struct ifvxlancmd *cmd; 1922 union vxlan_sockaddr *vxlsa; 1923 int error; 1924 1925 cmd = arg; 1926 vxlsa = &cmd->vxlcmd_sa; 1927 1928 if (!VXLAN_SOCKADDR_IS_IPV46(vxlsa)) 1929 return (EINVAL); 1930 if (VXLAN_SOCKADDR_IS_IPV6(vxlsa)) { 1931 error = vxlan_sockaddr_in6_embedscope(vxlsa); 1932 if (error) 1933 return (error); 1934 } 1935 1936 VXLAN_WLOCK(sc); 1937 if (vxlan_can_change_config(sc)) { 1938 vxlan_sockaddr_in_copy(&sc->vxl_dst_addr, &vxlsa->sa); 1939 error = 0; 1940 } else 1941 error = EBUSY; 1942 VXLAN_WUNLOCK(sc); 1943 1944 return (error); 1945 } 1946 1947 static int 1948 vxlan_ctrl_set_local_port(struct vxlan_softc *sc, void *arg) 1949 { 1950 struct ifvxlancmd *cmd; 1951 int error; 1952 1953 cmd = arg; 1954 1955 if (cmd->vxlcmd_port == 0) 1956 return (EINVAL); 1957 1958 VXLAN_WLOCK(sc); 1959 if (vxlan_can_change_config(sc)) { 1960 sc->vxl_src_addr.in4.sin_port = htons(cmd->vxlcmd_port); 1961 error = 0; 1962 } else 1963 error = EBUSY; 1964 VXLAN_WUNLOCK(sc); 1965 1966 return (error); 1967 } 1968 1969 static int 1970 vxlan_ctrl_set_remote_port(struct vxlan_softc *sc, void *arg) 1971 { 1972 struct ifvxlancmd *cmd; 1973 int error; 1974 1975 cmd = arg; 1976 1977 if (cmd->vxlcmd_port == 0) 1978 return (EINVAL); 1979 1980 VXLAN_WLOCK(sc); 1981 if (vxlan_can_change_config(sc)) { 1982 sc->vxl_dst_addr.in4.sin_port = htons(cmd->vxlcmd_port); 1983 error = 0; 1984 } else 1985 error = EBUSY; 1986 VXLAN_WUNLOCK(sc); 1987 1988 return (error); 1989 } 1990 1991 static int 1992 vxlan_ctrl_set_port_range(struct vxlan_softc *sc, void *arg) 1993 { 1994 struct ifvxlancmd *cmd; 1995 uint16_t min, max; 1996 int error; 1997 1998 cmd = arg; 1999 min = cmd->vxlcmd_port_min; 2000 max = cmd->vxlcmd_port_max; 2001 2002 if (max < min) 2003 return (EINVAL); 2004 2005 VXLAN_WLOCK(sc); 2006 if (vxlan_can_change_config(sc)) { 2007 sc->vxl_min_port = min; 2008 sc->vxl_max_port = max; 2009 error = 0; 2010 } else 2011 error = EBUSY; 2012 VXLAN_WUNLOCK(sc); 2013 2014 return (error); 2015 } 2016 2017 static int 2018 vxlan_ctrl_set_ftable_timeout(struct vxlan_softc *sc, void *arg) 2019 { 2020 struct ifvxlancmd *cmd; 2021 int error; 2022 2023 cmd = arg; 2024 2025 VXLAN_WLOCK(sc); 2026 if (vxlan_check_ftable_timeout(cmd->vxlcmd_ftable_timeout) == 0) { 2027 sc->vxl_ftable_timeout = cmd->vxlcmd_ftable_timeout; 2028 error = 0; 2029 } else 2030 error = EINVAL; 2031 VXLAN_WUNLOCK(sc); 2032 2033 return (error); 2034 } 2035 2036 static int 2037 vxlan_ctrl_set_ftable_max(struct vxlan_softc *sc, void *arg) 2038 { 2039 struct ifvxlancmd *cmd; 2040 int error; 2041 2042 cmd = arg; 2043 2044 VXLAN_WLOCK(sc); 2045 if (vxlan_check_ftable_max(cmd->vxlcmd_ftable_max) == 0) { 2046 sc->vxl_ftable_max = cmd->vxlcmd_ftable_max; 2047 error = 0; 2048 } else 2049 error = EINVAL; 2050 VXLAN_WUNLOCK(sc); 2051 2052 return (error); 2053 } 2054 2055 static int 2056 vxlan_ctrl_set_multicast_if(struct vxlan_softc * sc, void *arg) 2057 { 2058 struct ifvxlancmd *cmd; 2059 int error; 2060 2061 cmd = arg; 2062 2063 VXLAN_WLOCK(sc); 2064 if (vxlan_can_change_config(sc)) { 2065 strlcpy(sc->vxl_mc_ifname, cmd->vxlcmd_ifname, IFNAMSIZ); 2066 error = 0; 2067 } else 2068 error = EBUSY; 2069 VXLAN_WUNLOCK(sc); 2070 2071 return (error); 2072 } 2073 2074 static int 2075 vxlan_ctrl_set_ttl(struct vxlan_softc *sc, void *arg) 2076 { 2077 struct ifvxlancmd *cmd; 2078 int error; 2079 2080 cmd = arg; 2081 2082 VXLAN_WLOCK(sc); 2083 if (vxlan_check_ttl(cmd->vxlcmd_ttl) == 0) { 2084 sc->vxl_ttl = cmd->vxlcmd_ttl; 2085 if (sc->vxl_im4o != NULL) 2086 sc->vxl_im4o->imo_multicast_ttl = sc->vxl_ttl; 2087 if (sc->vxl_im6o != NULL) 2088 sc->vxl_im6o->im6o_multicast_hlim = sc->vxl_ttl; 2089 error = 0; 2090 } else 2091 error = EINVAL; 2092 VXLAN_WUNLOCK(sc); 2093 2094 return (error); 2095 } 2096 2097 static int 2098 vxlan_ctrl_set_learn(struct vxlan_softc *sc, void *arg) 2099 { 2100 struct ifvxlancmd *cmd; 2101 2102 cmd = arg; 2103 2104 VXLAN_WLOCK(sc); 2105 if (cmd->vxlcmd_flags & VXLAN_CMD_FLAG_LEARN) 2106 sc->vxl_flags |= VXLAN_FLAG_LEARN; 2107 else 2108 sc->vxl_flags &= ~VXLAN_FLAG_LEARN; 2109 VXLAN_WUNLOCK(sc); 2110 2111 return (0); 2112 } 2113 2114 static int 2115 vxlan_ctrl_ftable_entry_add(struct vxlan_softc *sc, void *arg) 2116 { 2117 union vxlan_sockaddr vxlsa; 2118 struct ifvxlancmd *cmd; 2119 struct vxlan_ftable_entry *fe; 2120 int error; 2121 2122 cmd = arg; 2123 vxlsa = cmd->vxlcmd_sa; 2124 2125 if (!VXLAN_SOCKADDR_IS_IPV46(&vxlsa)) 2126 return (EINVAL); 2127 if (vxlan_sockaddr_in_any(&vxlsa) != 0) 2128 return (EINVAL); 2129 if (vxlan_sockaddr_in_multicast(&vxlsa) != 0) 2130 return (EINVAL); 2131 /* BMV: We could support both IPv4 and IPv6 later. */ 2132 if (vxlsa.sa.sa_family != sc->vxl_dst_addr.sa.sa_family) 2133 return (EAFNOSUPPORT); 2134 2135 if (VXLAN_SOCKADDR_IS_IPV6(&vxlsa)) { 2136 error = vxlan_sockaddr_in6_embedscope(&vxlsa); 2137 if (error) 2138 return (error); 2139 } 2140 2141 fe = vxlan_ftable_entry_alloc(); 2142 if (fe == NULL) 2143 return (ENOMEM); 2144 2145 if (vxlsa.in4.sin_port == 0) 2146 vxlsa.in4.sin_port = sc->vxl_dst_addr.in4.sin_port; 2147 2148 vxlan_ftable_entry_init(sc, fe, cmd->vxlcmd_mac, &vxlsa.sa, 2149 VXLAN_FE_FLAG_STATIC); 2150 2151 VXLAN_WLOCK(sc); 2152 error = vxlan_ftable_entry_insert(sc, fe); 2153 VXLAN_WUNLOCK(sc); 2154 2155 if (error) 2156 vxlan_ftable_entry_free(fe); 2157 2158 return (error); 2159 } 2160 2161 static int 2162 vxlan_ctrl_ftable_entry_rem(struct vxlan_softc *sc, void *arg) 2163 { 2164 struct ifvxlancmd *cmd; 2165 struct vxlan_ftable_entry *fe; 2166 int error; 2167 2168 cmd = arg; 2169 2170 VXLAN_WLOCK(sc); 2171 fe = vxlan_ftable_entry_lookup(sc, cmd->vxlcmd_mac); 2172 if (fe != NULL) { 2173 vxlan_ftable_entry_destroy(sc, fe); 2174 error = 0; 2175 } else 2176 error = ENOENT; 2177 VXLAN_WUNLOCK(sc); 2178 2179 return (error); 2180 } 2181 2182 static int 2183 vxlan_ctrl_flush(struct vxlan_softc *sc, void *arg) 2184 { 2185 struct ifvxlancmd *cmd; 2186 int all; 2187 2188 cmd = arg; 2189 all = cmd->vxlcmd_flags & VXLAN_CMD_FLAG_FLUSH_ALL; 2190 2191 VXLAN_WLOCK(sc); 2192 vxlan_ftable_flush(sc, all); 2193 VXLAN_WUNLOCK(sc); 2194 2195 return (0); 2196 } 2197 2198 static int 2199 vxlan_ioctl_drvspec(struct vxlan_softc *sc, struct ifdrv *ifd, int get) 2200 { 2201 const struct vxlan_control *vc; 2202 union { 2203 struct ifvxlancfg cfg; 2204 struct ifvxlancmd cmd; 2205 } args; 2206 int out, error; 2207 2208 if (ifd->ifd_cmd >= vxlan_control_table_size) 2209 return (EINVAL); 2210 2211 bzero(&args, sizeof(args)); 2212 vc = &vxlan_control_table[ifd->ifd_cmd]; 2213 out = (vc->vxlc_flags & VXLAN_CTRL_FLAG_COPYOUT) != 0; 2214 2215 if ((get != 0 && out == 0) || (get == 0 && out != 0)) 2216 return (EINVAL); 2217 2218 if (vc->vxlc_flags & VXLAN_CTRL_FLAG_SUSER) { 2219 error = priv_check(curthread, PRIV_NET_VXLAN); 2220 if (error) 2221 return (error); 2222 } 2223 2224 if (ifd->ifd_len != vc->vxlc_argsize || 2225 ifd->ifd_len > sizeof(args)) 2226 return (EINVAL); 2227 2228 if (vc->vxlc_flags & VXLAN_CTRL_FLAG_COPYIN) { 2229 error = copyin(ifd->ifd_data, &args, ifd->ifd_len); 2230 if (error) 2231 return (error); 2232 } 2233 2234 error = vc->vxlc_func(sc, &args); 2235 if (error) 2236 return (error); 2237 2238 if (vc->vxlc_flags & VXLAN_CTRL_FLAG_COPYOUT) { 2239 error = copyout(&args, ifd->ifd_data, ifd->ifd_len); 2240 if (error) 2241 return (error); 2242 } 2243 2244 return (0); 2245 } 2246 2247 static int 2248 vxlan_ioctl(struct ifnet *ifp, u_long cmd, caddr_t data) 2249 { 2250 struct vxlan_softc *sc; 2251 struct ifreq *ifr; 2252 struct ifdrv *ifd; 2253 int error; 2254 2255 sc = ifp->if_softc; 2256 ifr = (struct ifreq *) data; 2257 ifd = (struct ifdrv *) data; 2258 2259 error = 0; 2260 2261 switch (cmd) { 2262 case SIOCADDMULTI: 2263 case SIOCDELMULTI: 2264 break; 2265 2266 case SIOCGDRVSPEC: 2267 case SIOCSDRVSPEC: 2268 error = vxlan_ioctl_drvspec(sc, ifd, cmd == SIOCGDRVSPEC); 2269 break; 2270 2271 case SIOCSIFFLAGS: 2272 error = vxlan_ioctl_ifflags(sc); 2273 break; 2274 2275 case SIOCSIFMEDIA: 2276 case SIOCGIFMEDIA: 2277 error = ifmedia_ioctl(ifp, ifr, &sc->vxl_media, cmd); 2278 break; 2279 2280 case SIOCSIFMTU: 2281 if (ifr->ifr_mtu < ETHERMIN || ifr->ifr_mtu > VXLAN_MAX_MTU) 2282 error = EINVAL; 2283 else 2284 ifp->if_mtu = ifr->ifr_mtu; 2285 break; 2286 2287 default: 2288 error = ether_ioctl(ifp, cmd, data); 2289 break; 2290 } 2291 2292 return (error); 2293 } 2294 2295 #if defined(INET) || defined(INET6) 2296 static uint16_t 2297 vxlan_pick_source_port(struct vxlan_softc *sc, struct mbuf *m) 2298 { 2299 int range; 2300 uint32_t hash; 2301 2302 range = sc->vxl_max_port - sc->vxl_min_port + 1; 2303 2304 if (M_HASHTYPE_ISHASH(m)) 2305 hash = m->m_pkthdr.flowid; 2306 else 2307 hash = jenkins_hash(m->m_data, ETHER_HDR_LEN, 2308 sc->vxl_port_hash_key); 2309 2310 return (sc->vxl_min_port + (hash % range)); 2311 } 2312 2313 static void 2314 vxlan_encap_header(struct vxlan_softc *sc, struct mbuf *m, int ipoff, 2315 uint16_t srcport, uint16_t dstport) 2316 { 2317 struct vxlanudphdr *hdr; 2318 struct udphdr *udph; 2319 struct vxlan_header *vxh; 2320 int len; 2321 2322 len = m->m_pkthdr.len - ipoff; 2323 MPASS(len >= sizeof(struct vxlanudphdr)); 2324 hdr = mtodo(m, ipoff); 2325 2326 udph = &hdr->vxlh_udp; 2327 udph->uh_sport = srcport; 2328 udph->uh_dport = dstport; 2329 udph->uh_ulen = htons(len); 2330 udph->uh_sum = 0; 2331 2332 vxh = &hdr->vxlh_hdr; 2333 vxh->vxlh_flags = htonl(VXLAN_HDR_FLAGS_VALID_VNI); 2334 vxh->vxlh_vni = htonl(sc->vxl_vni << VXLAN_HDR_VNI_SHIFT); 2335 } 2336 #endif 2337 2338 static int 2339 vxlan_encap4(struct vxlan_softc *sc, const union vxlan_sockaddr *fvxlsa, 2340 struct mbuf *m) 2341 { 2342 #ifdef INET 2343 struct ifnet *ifp; 2344 struct ip *ip; 2345 struct in_addr srcaddr, dstaddr; 2346 uint16_t srcport, dstport; 2347 int len, mcast, error; 2348 2349 ifp = sc->vxl_ifp; 2350 srcaddr = sc->vxl_src_addr.in4.sin_addr; 2351 srcport = vxlan_pick_source_port(sc, m); 2352 dstaddr = fvxlsa->in4.sin_addr; 2353 dstport = fvxlsa->in4.sin_port; 2354 2355 M_PREPEND(m, sizeof(struct ip) + sizeof(struct vxlanudphdr), 2356 M_NOWAIT); 2357 if (m == NULL) { 2358 if_inc_counter(ifp, IFCOUNTER_OERRORS, 1); 2359 return (ENOBUFS); 2360 } 2361 2362 len = m->m_pkthdr.len; 2363 2364 ip = mtod(m, struct ip *); 2365 ip->ip_tos = 0; 2366 ip->ip_len = htons(len); 2367 ip->ip_off = 0; 2368 ip->ip_ttl = sc->vxl_ttl; 2369 ip->ip_p = IPPROTO_UDP; 2370 ip->ip_sum = 0; 2371 ip->ip_src = srcaddr; 2372 ip->ip_dst = dstaddr; 2373 2374 vxlan_encap_header(sc, m, sizeof(struct ip), srcport, dstport); 2375 2376 mcast = (m->m_flags & (M_MCAST | M_BCAST)) ? 1 : 0; 2377 m->m_flags &= ~(M_MCAST | M_BCAST); 2378 2379 error = ip_output(m, NULL, NULL, 0, sc->vxl_im4o, NULL); 2380 if (error == 0) { 2381 if_inc_counter(ifp, IFCOUNTER_OPACKETS, 1); 2382 if_inc_counter(ifp, IFCOUNTER_OBYTES, len); 2383 if (mcast != 0) 2384 if_inc_counter(ifp, IFCOUNTER_OMCASTS, 1); 2385 } else 2386 if_inc_counter(ifp, IFCOUNTER_OERRORS, 1); 2387 2388 return (error); 2389 #else 2390 m_freem(m); 2391 return (ENOTSUP); 2392 #endif 2393 } 2394 2395 static int 2396 vxlan_encap6(struct vxlan_softc *sc, const union vxlan_sockaddr *fvxlsa, 2397 struct mbuf *m) 2398 { 2399 #ifdef INET6 2400 struct ifnet *ifp; 2401 struct ip6_hdr *ip6; 2402 const struct in6_addr *srcaddr, *dstaddr; 2403 uint16_t srcport, dstport; 2404 int len, mcast, error; 2405 2406 ifp = sc->vxl_ifp; 2407 srcaddr = &sc->vxl_src_addr.in6.sin6_addr; 2408 srcport = vxlan_pick_source_port(sc, m); 2409 dstaddr = &fvxlsa->in6.sin6_addr; 2410 dstport = fvxlsa->in6.sin6_port; 2411 2412 M_PREPEND(m, sizeof(struct ip6_hdr) + sizeof(struct vxlanudphdr), 2413 M_NOWAIT); 2414 if (m == NULL) { 2415 if_inc_counter(ifp, IFCOUNTER_OERRORS, 1); 2416 return (ENOBUFS); 2417 } 2418 2419 len = m->m_pkthdr.len; 2420 2421 ip6 = mtod(m, struct ip6_hdr *); 2422 ip6->ip6_flow = 0; /* BMV: Keep in forwarding entry? */ 2423 ip6->ip6_vfc = IPV6_VERSION; 2424 ip6->ip6_plen = 0; 2425 ip6->ip6_nxt = IPPROTO_UDP; 2426 ip6->ip6_hlim = sc->vxl_ttl; 2427 ip6->ip6_src = *srcaddr; 2428 ip6->ip6_dst = *dstaddr; 2429 2430 vxlan_encap_header(sc, m, sizeof(struct ip6_hdr), srcport, dstport); 2431 2432 /* 2433 * XXX BMV We need support for RFC6935 before we can send and 2434 * receive IPv6 UDP packets with a zero checksum. 2435 */ 2436 { 2437 struct udphdr *hdr = mtodo(m, sizeof(struct ip6_hdr)); 2438 hdr->uh_sum = in6_cksum_pseudo(ip6, 2439 m->m_pkthdr.len - sizeof(struct ip6_hdr), IPPROTO_UDP, 0); 2440 m->m_pkthdr.csum_flags = CSUM_UDP_IPV6; 2441 m->m_pkthdr.csum_data = offsetof(struct udphdr, uh_sum); 2442 } 2443 2444 mcast = (m->m_flags & (M_MCAST | M_BCAST)) ? 1 : 0; 2445 m->m_flags &= ~(M_MCAST | M_BCAST); 2446 2447 error = ip6_output(m, NULL, NULL, 0, sc->vxl_im6o, NULL, NULL); 2448 if (error == 0) { 2449 if_inc_counter(ifp, IFCOUNTER_OPACKETS, 1); 2450 if_inc_counter(ifp, IFCOUNTER_OBYTES, len); 2451 if (mcast != 0) 2452 if_inc_counter(ifp, IFCOUNTER_OMCASTS, 1); 2453 } else 2454 if_inc_counter(ifp, IFCOUNTER_OERRORS, 1); 2455 2456 return (error); 2457 #else 2458 m_freem(m); 2459 return (ENOTSUP); 2460 #endif 2461 } 2462 2463 static int 2464 vxlan_transmit(struct ifnet *ifp, struct mbuf *m) 2465 { 2466 struct rm_priotracker tracker; 2467 union vxlan_sockaddr vxlsa; 2468 struct vxlan_softc *sc; 2469 struct vxlan_ftable_entry *fe; 2470 struct ifnet *mcifp; 2471 struct ether_header *eh; 2472 int ipv4, error; 2473 2474 sc = ifp->if_softc; 2475 eh = mtod(m, struct ether_header *); 2476 fe = NULL; 2477 mcifp = NULL; 2478 2479 ETHER_BPF_MTAP(ifp, m); 2480 2481 VXLAN_RLOCK(sc, &tracker); 2482 if ((ifp->if_drv_flags & IFF_DRV_RUNNING) == 0) { 2483 VXLAN_RUNLOCK(sc, &tracker); 2484 m_freem(m); 2485 return (ENETDOWN); 2486 } 2487 2488 if ((m->m_flags & (M_BCAST | M_MCAST)) == 0) 2489 fe = vxlan_ftable_entry_lookup(sc, eh->ether_dhost); 2490 if (fe == NULL) 2491 fe = &sc->vxl_default_fe; 2492 vxlan_sockaddr_copy(&vxlsa, &fe->vxlfe_raddr.sa); 2493 2494 ipv4 = VXLAN_SOCKADDR_IS_IPV4(&vxlsa) != 0; 2495 if (vxlan_sockaddr_in_multicast(&vxlsa) != 0) 2496 mcifp = vxlan_multicast_if_ref(sc, ipv4); 2497 2498 VXLAN_ACQUIRE(sc); 2499 VXLAN_RUNLOCK(sc, &tracker); 2500 2501 if (ipv4 != 0) 2502 error = vxlan_encap4(sc, &vxlsa, m); 2503 else 2504 error = vxlan_encap6(sc, &vxlsa, m); 2505 2506 vxlan_release(sc); 2507 if (mcifp != NULL) 2508 if_rele(mcifp); 2509 2510 return (error); 2511 } 2512 2513 static void 2514 vxlan_qflush(struct ifnet *ifp __unused) 2515 { 2516 } 2517 2518 static void 2519 vxlan_rcv_udp_packet(struct mbuf *m, int offset, struct inpcb *inpcb, 2520 const struct sockaddr *srcsa, void *xvso) 2521 { 2522 struct vxlan_socket *vso; 2523 struct vxlan_header *vxh, vxlanhdr; 2524 uint32_t vni; 2525 int error __unused; 2526 2527 M_ASSERTPKTHDR(m); 2528 vso = xvso; 2529 offset += sizeof(struct udphdr); 2530 2531 if (m->m_pkthdr.len < offset + sizeof(struct vxlan_header)) 2532 goto out; 2533 2534 if (__predict_false(m->m_len < offset + sizeof(struct vxlan_header))) { 2535 m_copydata(m, offset, sizeof(struct vxlan_header), 2536 (caddr_t) &vxlanhdr); 2537 vxh = &vxlanhdr; 2538 } else 2539 vxh = mtodo(m, offset); 2540 2541 /* 2542 * Drop if there is a reserved bit set in either the flags or VNI 2543 * fields of the header. This goes against the specification, but 2544 * a bit set may indicate an unsupported new feature. This matches 2545 * the behavior of the Linux implementation. 2546 */ 2547 if (vxh->vxlh_flags != htonl(VXLAN_HDR_FLAGS_VALID_VNI) || 2548 vxh->vxlh_vni & ~VXLAN_VNI_MASK) 2549 goto out; 2550 2551 vni = ntohl(vxh->vxlh_vni) >> VXLAN_HDR_VNI_SHIFT; 2552 /* Adjust to the start of the inner Ethernet frame. */ 2553 m_adj(m, offset + sizeof(struct vxlan_header)); 2554 2555 error = vxlan_input(vso, vni, &m, srcsa); 2556 MPASS(error != 0 || m == NULL); 2557 2558 out: 2559 if (m != NULL) 2560 m_freem(m); 2561 } 2562 2563 static int 2564 vxlan_input(struct vxlan_socket *vso, uint32_t vni, struct mbuf **m0, 2565 const struct sockaddr *sa) 2566 { 2567 struct vxlan_softc *sc; 2568 struct ifnet *ifp; 2569 struct mbuf *m; 2570 struct ether_header *eh; 2571 int error; 2572 2573 sc = vxlan_socket_lookup_softc(vso, vni); 2574 if (sc == NULL) 2575 return (ENOENT); 2576 2577 ifp = sc->vxl_ifp; 2578 m = *m0; 2579 eh = mtod(m, struct ether_header *); 2580 2581 if ((ifp->if_drv_flags & IFF_DRV_RUNNING) == 0) { 2582 error = ENETDOWN; 2583 goto out; 2584 } else if (ifp == m->m_pkthdr.rcvif) { 2585 /* XXX Does not catch more complex loops. */ 2586 error = EDEADLK; 2587 goto out; 2588 } 2589 2590 if (sc->vxl_flags & VXLAN_FLAG_LEARN) 2591 vxlan_ftable_learn(sc, sa, eh->ether_shost); 2592 2593 m_clrprotoflags(m); 2594 m->m_pkthdr.rcvif = ifp; 2595 M_SETFIB(m, ifp->if_fib); 2596 2597 error = netisr_queue_src(NETISR_ETHER, 0, m); 2598 *m0 = NULL; 2599 2600 out: 2601 vxlan_release(sc); 2602 return (error); 2603 } 2604 2605 static void 2606 vxlan_set_default_config(struct vxlan_softc *sc) 2607 { 2608 2609 sc->vxl_flags |= VXLAN_FLAG_LEARN; 2610 2611 sc->vxl_vni = VXLAN_VNI_MAX; 2612 sc->vxl_ttl = IPDEFTTL; 2613 2614 if (!vxlan_tunable_int(sc, "legacy_port", vxlan_legacy_port)) { 2615 sc->vxl_src_addr.in4.sin_port = htons(VXLAN_PORT); 2616 sc->vxl_dst_addr.in4.sin_port = htons(VXLAN_PORT); 2617 } else { 2618 sc->vxl_src_addr.in4.sin_port = htons(VXLAN_LEGACY_PORT); 2619 sc->vxl_dst_addr.in4.sin_port = htons(VXLAN_LEGACY_PORT); 2620 } 2621 2622 sc->vxl_min_port = V_ipport_firstauto; 2623 sc->vxl_max_port = V_ipport_lastauto; 2624 2625 sc->vxl_ftable_max = VXLAN_FTABLE_MAX; 2626 sc->vxl_ftable_timeout = VXLAN_FTABLE_TIMEOUT; 2627 } 2628 2629 static int 2630 vxlan_set_user_config(struct vxlan_softc *sc, struct ifvxlanparam *vxlp) 2631 { 2632 2633 #ifndef INET 2634 if (vxlp->vxlp_with & (VXLAN_PARAM_WITH_LOCAL_ADDR4 | 2635 VXLAN_PARAM_WITH_REMOTE_ADDR4)) 2636 return (EAFNOSUPPORT); 2637 #endif 2638 2639 #ifndef INET6 2640 if (vxlp->vxlp_with & (VXLAN_PARAM_WITH_LOCAL_ADDR6 | 2641 VXLAN_PARAM_WITH_REMOTE_ADDR6)) 2642 return (EAFNOSUPPORT); 2643 #else 2644 if (vxlp->vxlp_with & VXLAN_PARAM_WITH_LOCAL_ADDR6) { 2645 int error = vxlan_sockaddr_in6_embedscope(&vxlp->vxlp_local_sa); 2646 if (error) 2647 return (error); 2648 } 2649 if (vxlp->vxlp_with & VXLAN_PARAM_WITH_REMOTE_ADDR6) { 2650 int error = vxlan_sockaddr_in6_embedscope( 2651 &vxlp->vxlp_remote_sa); 2652 if (error) 2653 return (error); 2654 } 2655 #endif 2656 2657 if (vxlp->vxlp_with & VXLAN_PARAM_WITH_VNI) { 2658 if (vxlan_check_vni(vxlp->vxlp_vni) == 0) 2659 sc->vxl_vni = vxlp->vxlp_vni; 2660 } 2661 2662 if (vxlp->vxlp_with & VXLAN_PARAM_WITH_LOCAL_ADDR4) { 2663 sc->vxl_src_addr.in4.sin_len = sizeof(struct sockaddr_in); 2664 sc->vxl_src_addr.in4.sin_family = AF_INET; 2665 sc->vxl_src_addr.in4.sin_addr = 2666 vxlp->vxlp_local_sa.in4.sin_addr; 2667 } else if (vxlp->vxlp_with & VXLAN_PARAM_WITH_LOCAL_ADDR6) { 2668 sc->vxl_src_addr.in6.sin6_len = sizeof(struct sockaddr_in6); 2669 sc->vxl_src_addr.in6.sin6_family = AF_INET6; 2670 sc->vxl_src_addr.in6.sin6_addr = 2671 vxlp->vxlp_local_sa.in6.sin6_addr; 2672 } 2673 2674 if (vxlp->vxlp_with & VXLAN_PARAM_WITH_REMOTE_ADDR4) { 2675 sc->vxl_dst_addr.in4.sin_len = sizeof(struct sockaddr_in); 2676 sc->vxl_dst_addr.in4.sin_family = AF_INET; 2677 sc->vxl_dst_addr.in4.sin_addr = 2678 vxlp->vxlp_remote_sa.in4.sin_addr; 2679 } else if (vxlp->vxlp_with & VXLAN_PARAM_WITH_REMOTE_ADDR6) { 2680 sc->vxl_dst_addr.in6.sin6_len = sizeof(struct sockaddr_in6); 2681 sc->vxl_dst_addr.in6.sin6_family = AF_INET6; 2682 sc->vxl_dst_addr.in6.sin6_addr = 2683 vxlp->vxlp_remote_sa.in6.sin6_addr; 2684 } 2685 2686 if (vxlp->vxlp_with & VXLAN_PARAM_WITH_LOCAL_PORT) 2687 sc->vxl_src_addr.in4.sin_port = htons(vxlp->vxlp_local_port); 2688 if (vxlp->vxlp_with & VXLAN_PARAM_WITH_REMOTE_PORT) 2689 sc->vxl_dst_addr.in4.sin_port = htons(vxlp->vxlp_remote_port); 2690 2691 if (vxlp->vxlp_with & VXLAN_PARAM_WITH_PORT_RANGE) { 2692 if (vxlp->vxlp_min_port <= vxlp->vxlp_max_port) { 2693 sc->vxl_min_port = vxlp->vxlp_min_port; 2694 sc->vxl_max_port = vxlp->vxlp_max_port; 2695 } 2696 } 2697 2698 if (vxlp->vxlp_with & VXLAN_PARAM_WITH_MULTICAST_IF) 2699 strlcpy(sc->vxl_mc_ifname, vxlp->vxlp_mc_ifname, IFNAMSIZ); 2700 2701 if (vxlp->vxlp_with & VXLAN_PARAM_WITH_FTABLE_TIMEOUT) { 2702 if (vxlan_check_ftable_timeout(vxlp->vxlp_ftable_timeout) == 0) 2703 sc->vxl_ftable_timeout = vxlp->vxlp_ftable_timeout; 2704 } 2705 2706 if (vxlp->vxlp_with & VXLAN_PARAM_WITH_FTABLE_MAX) { 2707 if (vxlan_check_ftable_max(vxlp->vxlp_ftable_max) == 0) 2708 sc->vxl_ftable_max = vxlp->vxlp_ftable_max; 2709 } 2710 2711 if (vxlp->vxlp_with & VXLAN_PARAM_WITH_TTL) { 2712 if (vxlan_check_ttl(vxlp->vxlp_ttl) == 0) 2713 sc->vxl_ttl = vxlp->vxlp_ttl; 2714 } 2715 2716 if (vxlp->vxlp_with & VXLAN_PARAM_WITH_LEARN) { 2717 if (vxlp->vxlp_learn == 0) 2718 sc->vxl_flags &= ~VXLAN_FLAG_LEARN; 2719 } 2720 2721 return (0); 2722 } 2723 2724 static int 2725 vxlan_clone_create(struct if_clone *ifc, int unit, caddr_t params) 2726 { 2727 struct vxlan_softc *sc; 2728 struct ifnet *ifp; 2729 struct ifvxlanparam vxlp; 2730 int error; 2731 2732 sc = malloc(sizeof(struct vxlan_softc), M_VXLAN, M_WAITOK | M_ZERO); 2733 sc->vxl_unit = unit; 2734 vxlan_set_default_config(sc); 2735 2736 if (params != 0) { 2737 error = copyin(params, &vxlp, sizeof(vxlp)); 2738 if (error) 2739 goto fail; 2740 2741 error = vxlan_set_user_config(sc, &vxlp); 2742 if (error) 2743 goto fail; 2744 } 2745 2746 ifp = if_alloc(IFT_ETHER); 2747 if (ifp == NULL) { 2748 error = ENOSPC; 2749 goto fail; 2750 } 2751 2752 sc->vxl_ifp = ifp; 2753 rm_init(&sc->vxl_lock, "vxlanrm"); 2754 callout_init_rw(&sc->vxl_callout, &sc->vxl_lock, 0); 2755 sc->vxl_port_hash_key = arc4random(); 2756 vxlan_ftable_init(sc); 2757 2758 vxlan_sysctl_setup(sc); 2759 2760 ifp->if_softc = sc; 2761 if_initname(ifp, vxlan_name, unit); 2762 ifp->if_flags = IFF_BROADCAST | IFF_SIMPLEX | IFF_MULTICAST; 2763 ifp->if_init = vxlan_init; 2764 ifp->if_ioctl = vxlan_ioctl; 2765 ifp->if_transmit = vxlan_transmit; 2766 ifp->if_qflush = vxlan_qflush; 2767 ifp->if_capabilities |= IFCAP_LINKSTATE | IFCAP_JUMBO_MTU; 2768 ifp->if_capenable |= IFCAP_LINKSTATE | IFCAP_JUMBO_MTU; 2769 2770 ifmedia_init(&sc->vxl_media, 0, vxlan_media_change, vxlan_media_status); 2771 ifmedia_add(&sc->vxl_media, IFM_ETHER | IFM_AUTO, 0, NULL); 2772 ifmedia_set(&sc->vxl_media, IFM_ETHER | IFM_AUTO); 2773 2774 ether_gen_addr(ifp, &sc->vxl_hwaddr); 2775 ether_ifattach(ifp, sc->vxl_hwaddr.octet); 2776 2777 ifp->if_baudrate = 0; 2778 ifp->if_hdrlen = 0; 2779 2780 return (0); 2781 2782 fail: 2783 free(sc, M_VXLAN); 2784 return (error); 2785 } 2786 2787 static void 2788 vxlan_clone_destroy(struct ifnet *ifp) 2789 { 2790 struct vxlan_softc *sc; 2791 2792 sc = ifp->if_softc; 2793 2794 vxlan_teardown(sc); 2795 2796 vxlan_ftable_flush(sc, 1); 2797 2798 ether_ifdetach(ifp); 2799 if_free(ifp); 2800 ifmedia_removeall(&sc->vxl_media); 2801 2802 vxlan_ftable_fini(sc); 2803 2804 vxlan_sysctl_destroy(sc); 2805 rm_destroy(&sc->vxl_lock); 2806 free(sc, M_VXLAN); 2807 } 2808 2809 /* BMV: Taken from if_bridge. */ 2810 static uint32_t 2811 vxlan_mac_hash(struct vxlan_softc *sc, const uint8_t *addr) 2812 { 2813 uint32_t a = 0x9e3779b9, b = 0x9e3779b9, c = sc->vxl_ftable_hash_key; 2814 2815 b += addr[5] << 8; 2816 b += addr[4]; 2817 a += addr[3] << 24; 2818 a += addr[2] << 16; 2819 a += addr[1] << 8; 2820 a += addr[0]; 2821 2822 /* 2823 * The following hash function is adapted from "Hash Functions" by Bob Jenkins 2824 * ("Algorithm Alley", Dr. Dobbs Journal, September 1997). 2825 */ 2826 #define mix(a, b, c) \ 2827 do { \ 2828 a -= b; a -= c; a ^= (c >> 13); \ 2829 b -= c; b -= a; b ^= (a << 8); \ 2830 c -= a; c -= b; c ^= (b >> 13); \ 2831 a -= b; a -= c; a ^= (c >> 12); \ 2832 b -= c; b -= a; b ^= (a << 16); \ 2833 c -= a; c -= b; c ^= (b >> 5); \ 2834 a -= b; a -= c; a ^= (c >> 3); \ 2835 b -= c; b -= a; b ^= (a << 10); \ 2836 c -= a; c -= b; c ^= (b >> 15); \ 2837 } while (0) 2838 2839 mix(a, b, c); 2840 2841 #undef mix 2842 2843 return (c); 2844 } 2845 2846 static int 2847 vxlan_media_change(struct ifnet *ifp) 2848 { 2849 2850 /* Ignore. */ 2851 return (0); 2852 } 2853 2854 static void 2855 vxlan_media_status(struct ifnet *ifp, struct ifmediareq *ifmr) 2856 { 2857 2858 ifmr->ifm_status = IFM_ACTIVE | IFM_AVALID; 2859 ifmr->ifm_active = IFM_ETHER | IFM_FDX; 2860 } 2861 2862 static int 2863 vxlan_sockaddr_cmp(const union vxlan_sockaddr *vxladdr, 2864 const struct sockaddr *sa) 2865 { 2866 2867 return (bcmp(&vxladdr->sa, sa, vxladdr->sa.sa_len)); 2868 } 2869 2870 static void 2871 vxlan_sockaddr_copy(union vxlan_sockaddr *vxladdr, 2872 const struct sockaddr *sa) 2873 { 2874 2875 MPASS(sa->sa_family == AF_INET || sa->sa_family == AF_INET6); 2876 bzero(vxladdr, sizeof(*vxladdr)); 2877 2878 if (sa->sa_family == AF_INET) { 2879 vxladdr->in4 = *satoconstsin(sa); 2880 vxladdr->in4.sin_len = sizeof(struct sockaddr_in); 2881 } else if (sa->sa_family == AF_INET6) { 2882 vxladdr->in6 = *satoconstsin6(sa); 2883 vxladdr->in6.sin6_len = sizeof(struct sockaddr_in6); 2884 } 2885 } 2886 2887 static int 2888 vxlan_sockaddr_in_equal(const union vxlan_sockaddr *vxladdr, 2889 const struct sockaddr *sa) 2890 { 2891 int equal; 2892 2893 if (sa->sa_family == AF_INET) { 2894 const struct in_addr *in4 = &satoconstsin(sa)->sin_addr; 2895 equal = in4->s_addr == vxladdr->in4.sin_addr.s_addr; 2896 } else if (sa->sa_family == AF_INET6) { 2897 const struct in6_addr *in6 = &satoconstsin6(sa)->sin6_addr; 2898 equal = IN6_ARE_ADDR_EQUAL(in6, &vxladdr->in6.sin6_addr); 2899 } else 2900 equal = 0; 2901 2902 return (equal); 2903 } 2904 2905 static void 2906 vxlan_sockaddr_in_copy(union vxlan_sockaddr *vxladdr, 2907 const struct sockaddr *sa) 2908 { 2909 2910 MPASS(sa->sa_family == AF_INET || sa->sa_family == AF_INET6); 2911 2912 if (sa->sa_family == AF_INET) { 2913 const struct in_addr *in4 = &satoconstsin(sa)->sin_addr; 2914 vxladdr->in4.sin_family = AF_INET; 2915 vxladdr->in4.sin_len = sizeof(struct sockaddr_in); 2916 vxladdr->in4.sin_addr = *in4; 2917 } else if (sa->sa_family == AF_INET6) { 2918 const struct in6_addr *in6 = &satoconstsin6(sa)->sin6_addr; 2919 vxladdr->in6.sin6_family = AF_INET6; 2920 vxladdr->in6.sin6_len = sizeof(struct sockaddr_in6); 2921 vxladdr->in6.sin6_addr = *in6; 2922 } 2923 } 2924 2925 static int 2926 vxlan_sockaddr_supported(const union vxlan_sockaddr *vxladdr, int unspec) 2927 { 2928 const struct sockaddr *sa; 2929 int supported; 2930 2931 sa = &vxladdr->sa; 2932 supported = 0; 2933 2934 if (sa->sa_family == AF_UNSPEC && unspec != 0) { 2935 supported = 1; 2936 } else if (sa->sa_family == AF_INET) { 2937 #ifdef INET 2938 supported = 1; 2939 #endif 2940 } else if (sa->sa_family == AF_INET6) { 2941 #ifdef INET6 2942 supported = 1; 2943 #endif 2944 } 2945 2946 return (supported); 2947 } 2948 2949 static int 2950 vxlan_sockaddr_in_any(const union vxlan_sockaddr *vxladdr) 2951 { 2952 const struct sockaddr *sa; 2953 int any; 2954 2955 sa = &vxladdr->sa; 2956 2957 if (sa->sa_family == AF_INET) { 2958 const struct in_addr *in4 = &satoconstsin(sa)->sin_addr; 2959 any = in4->s_addr == INADDR_ANY; 2960 } else if (sa->sa_family == AF_INET6) { 2961 const struct in6_addr *in6 = &satoconstsin6(sa)->sin6_addr; 2962 any = IN6_IS_ADDR_UNSPECIFIED(in6); 2963 } else 2964 any = -1; 2965 2966 return (any); 2967 } 2968 2969 static int 2970 vxlan_sockaddr_in_multicast(const union vxlan_sockaddr *vxladdr) 2971 { 2972 const struct sockaddr *sa; 2973 int mc; 2974 2975 sa = &vxladdr->sa; 2976 2977 if (sa->sa_family == AF_INET) { 2978 const struct in_addr *in4 = &satoconstsin(sa)->sin_addr; 2979 mc = IN_MULTICAST(ntohl(in4->s_addr)); 2980 } else if (sa->sa_family == AF_INET6) { 2981 const struct in6_addr *in6 = &satoconstsin6(sa)->sin6_addr; 2982 mc = IN6_IS_ADDR_MULTICAST(in6); 2983 } else 2984 mc = -1; 2985 2986 return (mc); 2987 } 2988 2989 static int 2990 vxlan_sockaddr_in6_embedscope(union vxlan_sockaddr *vxladdr) 2991 { 2992 int error; 2993 2994 MPASS(VXLAN_SOCKADDR_IS_IPV6(vxladdr)); 2995 #ifdef INET6 2996 error = sa6_embedscope(&vxladdr->in6, V_ip6_use_defzone); 2997 #else 2998 error = EAFNOSUPPORT; 2999 #endif 3000 3001 return (error); 3002 } 3003 3004 static int 3005 vxlan_can_change_config(struct vxlan_softc *sc) 3006 { 3007 struct ifnet *ifp; 3008 3009 ifp = sc->vxl_ifp; 3010 VXLAN_LOCK_ASSERT(sc); 3011 3012 if (ifp->if_drv_flags & IFF_DRV_RUNNING) 3013 return (0); 3014 if (sc->vxl_flags & (VXLAN_FLAG_INIT | VXLAN_FLAG_TEARDOWN)) 3015 return (0); 3016 3017 return (1); 3018 } 3019 3020 static int 3021 vxlan_check_vni(uint32_t vni) 3022 { 3023 3024 return (vni >= VXLAN_VNI_MAX); 3025 } 3026 3027 static int 3028 vxlan_check_ttl(int ttl) 3029 { 3030 3031 return (ttl > MAXTTL); 3032 } 3033 3034 static int 3035 vxlan_check_ftable_timeout(uint32_t timeout) 3036 { 3037 3038 return (timeout > VXLAN_FTABLE_MAX_TIMEOUT); 3039 } 3040 3041 static int 3042 vxlan_check_ftable_max(uint32_t max) 3043 { 3044 3045 return (max > VXLAN_FTABLE_MAX); 3046 } 3047 3048 static void 3049 vxlan_sysctl_setup(struct vxlan_softc *sc) 3050 { 3051 struct sysctl_ctx_list *ctx; 3052 struct sysctl_oid *node; 3053 struct vxlan_statistics *stats; 3054 char namebuf[8]; 3055 3056 ctx = &sc->vxl_sysctl_ctx; 3057 stats = &sc->vxl_stats; 3058 snprintf(namebuf, sizeof(namebuf), "%d", sc->vxl_unit); 3059 3060 sysctl_ctx_init(ctx); 3061 sc->vxl_sysctl_node = SYSCTL_ADD_NODE(ctx, 3062 SYSCTL_STATIC_CHILDREN(_net_link_vxlan), OID_AUTO, namebuf, 3063 CTLFLAG_RD | CTLFLAG_MPSAFE, NULL, ""); 3064 3065 node = SYSCTL_ADD_NODE(ctx, SYSCTL_CHILDREN(sc->vxl_sysctl_node), 3066 OID_AUTO, "ftable", CTLFLAG_RD | CTLFLAG_MPSAFE, NULL, ""); 3067 SYSCTL_ADD_UINT(ctx, SYSCTL_CHILDREN(node), OID_AUTO, "count", 3068 CTLFLAG_RD, &sc->vxl_ftable_cnt, 0, 3069 "Number of entries in fowarding table"); 3070 SYSCTL_ADD_UINT(ctx, SYSCTL_CHILDREN(node), OID_AUTO, "max", 3071 CTLFLAG_RD, &sc->vxl_ftable_max, 0, 3072 "Maximum number of entries allowed in fowarding table"); 3073 SYSCTL_ADD_UINT(ctx, SYSCTL_CHILDREN(node), OID_AUTO, "timeout", 3074 CTLFLAG_RD, &sc->vxl_ftable_timeout, 0, 3075 "Number of seconds between prunes of the forwarding table"); 3076 SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(node), OID_AUTO, "dump", 3077 CTLTYPE_STRING | CTLFLAG_RD | CTLFLAG_MPSAFE | CTLFLAG_SKIP, 3078 sc, 0, vxlan_ftable_sysctl_dump, "A", 3079 "Dump the forwarding table entries"); 3080 3081 node = SYSCTL_ADD_NODE(ctx, SYSCTL_CHILDREN(sc->vxl_sysctl_node), 3082 OID_AUTO, "stats", CTLFLAG_RD | CTLFLAG_MPSAFE, NULL, ""); 3083 SYSCTL_ADD_UINT(ctx, SYSCTL_CHILDREN(node), OID_AUTO, 3084 "ftable_nospace", CTLFLAG_RD, &stats->ftable_nospace, 0, 3085 "Fowarding table reached maximum entries"); 3086 SYSCTL_ADD_UINT(ctx, SYSCTL_CHILDREN(node), OID_AUTO, 3087 "ftable_lock_upgrade_failed", CTLFLAG_RD, 3088 &stats->ftable_lock_upgrade_failed, 0, 3089 "Forwarding table update required lock upgrade"); 3090 } 3091 3092 static void 3093 vxlan_sysctl_destroy(struct vxlan_softc *sc) 3094 { 3095 3096 sysctl_ctx_free(&sc->vxl_sysctl_ctx); 3097 sc->vxl_sysctl_node = NULL; 3098 } 3099 3100 static int 3101 vxlan_tunable_int(struct vxlan_softc *sc, const char *knob, int def) 3102 { 3103 char path[64]; 3104 3105 snprintf(path, sizeof(path), "net.link.vxlan.%d.%s", 3106 sc->vxl_unit, knob); 3107 TUNABLE_INT_FETCH(path, &def); 3108 3109 return (def); 3110 } 3111 3112 static void 3113 vxlan_ifdetach_event(void *arg __unused, struct ifnet *ifp) 3114 { 3115 struct vxlan_softc_head list; 3116 struct vxlan_socket *vso; 3117 struct vxlan_softc *sc, *tsc; 3118 3119 LIST_INIT(&list); 3120 3121 if (ifp->if_flags & IFF_RENAMING) 3122 return; 3123 if ((ifp->if_flags & IFF_MULTICAST) == 0) 3124 return; 3125 3126 VXLAN_LIST_LOCK(); 3127 LIST_FOREACH(vso, &vxlan_socket_list, vxlso_entry) 3128 vxlan_socket_ifdetach(vso, ifp, &list); 3129 VXLAN_LIST_UNLOCK(); 3130 3131 LIST_FOREACH_SAFE(sc, &list, vxl_ifdetach_list, tsc) { 3132 LIST_REMOVE(sc, vxl_ifdetach_list); 3133 3134 VXLAN_WLOCK(sc); 3135 if (sc->vxl_flags & VXLAN_FLAG_INIT) 3136 vxlan_init_wait(sc); 3137 vxlan_teardown_locked(sc); 3138 } 3139 } 3140 3141 static void 3142 vxlan_load(void) 3143 { 3144 3145 mtx_init(&vxlan_list_mtx, "vxlan list", NULL, MTX_DEF); 3146 LIST_INIT(&vxlan_socket_list); 3147 vxlan_ifdetach_event_tag = EVENTHANDLER_REGISTER(ifnet_departure_event, 3148 vxlan_ifdetach_event, NULL, EVENTHANDLER_PRI_ANY); 3149 vxlan_cloner = if_clone_simple(vxlan_name, vxlan_clone_create, 3150 vxlan_clone_destroy, 0); 3151 } 3152 3153 static void 3154 vxlan_unload(void) 3155 { 3156 3157 EVENTHANDLER_DEREGISTER(ifnet_departure_event, 3158 vxlan_ifdetach_event_tag); 3159 if_clone_detach(vxlan_cloner); 3160 mtx_destroy(&vxlan_list_mtx); 3161 MPASS(LIST_EMPTY(&vxlan_socket_list)); 3162 } 3163 3164 static int 3165 vxlan_modevent(module_t mod, int type, void *unused) 3166 { 3167 int error; 3168 3169 error = 0; 3170 3171 switch (type) { 3172 case MOD_LOAD: 3173 vxlan_load(); 3174 break; 3175 case MOD_UNLOAD: 3176 vxlan_unload(); 3177 break; 3178 default: 3179 error = ENOTSUP; 3180 break; 3181 } 3182 3183 return (error); 3184 } 3185 3186 static moduledata_t vxlan_mod = { 3187 "if_vxlan", 3188 vxlan_modevent, 3189 0 3190 }; 3191 3192 DECLARE_MODULE(if_vxlan, vxlan_mod, SI_SUB_PSEUDO, SI_ORDER_ANY); 3193 MODULE_VERSION(if_vxlan, 1); 3194