1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2006 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 */ 25 26 #pragma ident "%Z%%M% %I% %E% SMI" 27 28 /* 29 * Data-Link Services Module 30 */ 31 32 #include <sys/types.h> 33 #include <sys/stream.h> 34 #include <sys/strsun.h> 35 #include <sys/strsubr.h> 36 #include <sys/sysmacros.h> 37 #include <sys/atomic.h> 38 #include <sys/modhash.h> 39 #include <sys/dlpi.h> 40 #include <sys/ethernet.h> 41 #include <sys/byteorder.h> 42 #include <sys/vlan.h> 43 #include <sys/mac.h> 44 #include <sys/sdt.h> 45 46 #include <sys/dls.h> 47 #include <sys/dld_impl.h> 48 #include <sys/dls_impl.h> 49 50 static kmem_cache_t *i_dls_link_cachep; 51 static mod_hash_t *i_dls_link_hash; 52 static uint_t i_dls_link_count; 53 static krwlock_t i_dls_link_lock; 54 55 #define LINK_HASHSZ 67 /* prime */ 56 #define IMPL_HASHSZ 67 /* prime */ 57 58 /* 59 * Construct a hash key encompassing both DLSAP value and VLAN idenitifier. 60 */ 61 #define MAKE_KEY(_sap, _vid) \ 62 ((mod_hash_key_t)(uintptr_t) \ 63 (((_sap) << VLAN_ID_SIZE) | (_vid) & VLAN_ID_MASK)) 64 65 /* 66 * Extract the DLSAP value from the hash key. 67 */ 68 #define KEY_SAP(_key) \ 69 (((uint32_t)(uintptr_t)(_key)) >> VLAN_ID_SIZE) 70 71 #define DLS_STRIP_PADDING(pktsize, p) { \ 72 if (pktsize != 0) { \ 73 ssize_t delta = pktsize - msgdsize(p); \ 74 \ 75 if (delta < 0) \ 76 (void) adjmsg(p, delta); \ 77 } \ 78 } 79 80 /* 81 * Private functions. 82 */ 83 84 /*ARGSUSED*/ 85 static int 86 i_dls_link_constructor(void *buf, void *arg, int kmflag) 87 { 88 dls_link_t *dlp = buf; 89 char name[MAXNAMELEN]; 90 91 bzero(buf, sizeof (dls_link_t)); 92 93 (void) sprintf(name, "dls_link_t_%p_hash", buf); 94 dlp->dl_impl_hash = mod_hash_create_idhash(name, IMPL_HASHSZ, 95 mod_hash_null_valdtor); 96 97 mutex_init(&dlp->dl_lock, NULL, MUTEX_DEFAULT, NULL); 98 mutex_init(&dlp->dl_promisc_lock, NULL, MUTEX_DEFAULT, NULL); 99 rw_init(&dlp->dl_impl_lock, NULL, RW_DEFAULT, NULL); 100 return (0); 101 } 102 103 /*ARGSUSED*/ 104 static void 105 i_dls_link_destructor(void *buf, void *arg) 106 { 107 dls_link_t *dlp = buf; 108 109 ASSERT(dlp->dl_ref == 0); 110 ASSERT(dlp->dl_mh == NULL); 111 ASSERT(dlp->dl_unknowns == 0); 112 113 mod_hash_destroy_idhash(dlp->dl_impl_hash); 114 dlp->dl_impl_hash = NULL; 115 116 mutex_destroy(&dlp->dl_lock); 117 mutex_destroy(&dlp->dl_promisc_lock); 118 rw_destroy(&dlp->dl_impl_lock); 119 } 120 121 /* 122 * Truncate the chain starting at mp such that all packets in the chain 123 * have identical source and destination addresses, saps, and VLAN tags (if 124 * any). It returns a pointer to the mblk following the chain, NULL if 125 * there is no further packet following the processed chain. The countp 126 * argument is set to the number of valid packets in the chain. It is set 127 * to 0 if the function encountered a problem with the first packet. 128 */ 129 static mblk_t * 130 i_dls_link_subchain(dls_link_t *dlp, mblk_t *mp, mac_header_info_t *mhip, 131 uint16_t *vidp, uint_t *countp) 132 { 133 mblk_t **pp; 134 mblk_t *p; 135 uint_t npacket; 136 size_t addr_size = dlp->dl_mip->mi_addr_length; 137 138 /* 139 * Packets should always be at least 16 bit aligned. 140 */ 141 ASSERT(IS_P2ALIGNED(mp->b_rptr, sizeof (uint16_t))); 142 143 if (dls_link_header_info(dlp, mp, mhip, vidp) != 0) { 144 /* 145 * Something is wrong with the initial header. No chain is 146 * possible. 147 */ 148 p = mp->b_next; 149 mp->b_next = NULL; 150 *countp = 0; 151 return (p); 152 } 153 154 /* 155 * Compare with subsequent headers until we find one that has 156 * differing header information. After checking each packet 157 * strip padding and skip over the header. 158 */ 159 npacket = 1; 160 for (pp = &(mp->b_next); (p = *pp) != NULL; pp = &(p->b_next)) { 161 mac_header_info_t cmhi; 162 uint16_t cvid; 163 164 if (dls_link_header_info(dlp, p, &cmhi, &cvid) != 0) 165 break; 166 167 /* 168 * The source, destination, sap, and vlan id must all match 169 * in a given subchain. 170 */ 171 if (memcmp(mhip->mhi_daddr, cmhi.mhi_daddr, addr_size) != 0 || 172 memcmp(mhip->mhi_saddr, cmhi.mhi_saddr, addr_size) != 0 || 173 mhip->mhi_bindsap != cmhi.mhi_bindsap) { 174 break; 175 } 176 177 if (cvid != *vidp) 178 break; 179 180 DLS_STRIP_PADDING(cmhi.mhi_pktsize, p); 181 p->b_rptr += cmhi.mhi_hdrsize; 182 npacket++; 183 } 184 185 /* 186 * Strip padding and skip over the initial packet's header. 187 */ 188 DLS_STRIP_PADDING(mhip->mhi_pktsize, mp); 189 mp->b_rptr += mhip->mhi_hdrsize; 190 191 /* 192 * Break the chain at this point and return a pointer to the next 193 * sub-chain. 194 */ 195 *pp = NULL; 196 *countp = npacket; 197 return (p); 198 } 199 200 static void 201 i_dls_head_hold(dls_head_t *dhp) 202 { 203 atomic_inc_32(&dhp->dh_ref); 204 } 205 206 static void 207 i_dls_head_rele(dls_head_t *dhp) 208 { 209 atomic_dec_32(&dhp->dh_ref); 210 } 211 212 static dls_head_t * 213 i_dls_head_alloc(mod_hash_key_t key) 214 { 215 dls_head_t *dhp; 216 217 dhp = kmem_zalloc(sizeof (dls_head_t), KM_SLEEP); 218 dhp->dh_key = key; 219 return (dhp); 220 } 221 222 static void 223 i_dls_head_free(dls_head_t *dhp) 224 { 225 ASSERT(dhp->dh_ref == 0); 226 kmem_free(dhp, sizeof (dls_head_t)); 227 } 228 229 static void 230 i_dls_link_rx(void *arg, mac_resource_handle_t mrh, mblk_t *mp) 231 { 232 dls_link_t *dlp = arg; 233 mod_hash_t *hash = dlp->dl_impl_hash; 234 mblk_t *nextp; 235 mac_header_info_t mhi; 236 uint16_t vid; 237 dls_head_t *dhp; 238 dls_impl_t *dip; 239 dls_impl_t *ndip; 240 mblk_t *nmp; 241 mod_hash_key_t key; 242 uint_t npacket; 243 boolean_t accepted; 244 dls_rx_t di_rx, ndi_rx; 245 void *di_rx_arg, *ndi_rx_arg; 246 247 /* 248 * Walk the packet chain. 249 */ 250 while (mp != NULL) { 251 /* 252 * Wipe the accepted state. 253 */ 254 accepted = B_FALSE; 255 256 /* 257 * Grab the longest sub-chain we can process as a single 258 * unit. 259 */ 260 nextp = i_dls_link_subchain(dlp, mp, &mhi, &vid, &npacket); 261 262 if (npacket == 0) { 263 /* 264 * The first packet had an unrecognized header. 265 * Modify npacket so that this stray can be 266 * accounted for. 267 */ 268 npacket = 1; 269 freemsg(mp); 270 goto loop; 271 } 272 273 /* 274 * Construct a hash key from the VLAN identifier and the 275 * DLSAP. 276 */ 277 key = MAKE_KEY(mhi.mhi_bindsap, vid); 278 279 /* 280 * Search the has table for dls_impl_t eligible to receive 281 * a packet chain for this DLSAP/VLAN combination. 282 */ 283 rw_enter(&dlp->dl_impl_lock, RW_READER); 284 if (mod_hash_find(hash, key, (mod_hash_val_t *)&dhp) != 0) { 285 rw_exit(&dlp->dl_impl_lock); 286 freemsgchain(mp); 287 goto loop; 288 } 289 i_dls_head_hold(dhp); 290 rw_exit(&dlp->dl_impl_lock); 291 292 /* 293 * Find the first dls_impl_t that will accept the sub-chain. 294 */ 295 for (dip = dhp->dh_list; dip != NULL; dip = dip->di_nextp) 296 if (dls_accept(dip, &mhi, &di_rx, &di_rx_arg)) 297 break; 298 299 /* 300 * If we did not find any dls_impl_t willing to accept the 301 * sub-chain then throw it away. 302 */ 303 if (dip == NULL) { 304 i_dls_head_rele(dhp); 305 freemsgchain(mp); 306 goto loop; 307 } 308 309 /* 310 * We have at least one acceptor. 311 */ 312 accepted = B_TRUE; 313 for (;;) { 314 /* 315 * Find the next dls_impl_t that will accept the 316 * sub-chain. 317 */ 318 for (ndip = dip->di_nextp; ndip != NULL; 319 ndip = ndip->di_nextp) 320 if (dls_accept(ndip, &mhi, &ndi_rx, 321 &ndi_rx_arg)) 322 break; 323 324 /* 325 * If there are no more dls_impl_t that are willing 326 * to accept the sub-chain then we don't need to dup 327 * it before handing it to the current one. 328 */ 329 if (ndip == NULL) { 330 di_rx(di_rx_arg, mrh, mp, mhi.mhi_hdrsize); 331 332 /* 333 * Since there are no more dls_impl_t, we're 334 * done. 335 */ 336 break; 337 } 338 339 /* 340 * There are more dls_impl_t so dup the sub-chain. 341 */ 342 if ((nmp = copymsgchain(mp)) != NULL) 343 di_rx(di_rx_arg, mrh, nmp, mhi.mhi_hdrsize); 344 345 dip = ndip; 346 di_rx = ndi_rx; 347 di_rx_arg = ndi_rx_arg; 348 } 349 350 /* 351 * Release the hold on the dls_impl_t chain now that we have 352 * finished walking it. 353 */ 354 i_dls_head_rele(dhp); 355 356 loop: 357 /* 358 * If there were no acceptors then add the packet count to the 359 * 'unknown' count. 360 */ 361 if (!accepted) 362 atomic_add_32(&(dlp->dl_unknowns), npacket); 363 364 /* 365 * Move onto the next sub-chain. 366 */ 367 mp = nextp; 368 } 369 } 370 371 static void 372 i_dls_link_rx_promisc(void *arg, mac_resource_handle_t mrh, mblk_t *mp) 373 { 374 dls_link_t *dlp = arg; 375 mod_hash_t *hash = dlp->dl_impl_hash; 376 mblk_t *nextp; 377 mac_header_info_t mhi; 378 uint16_t vid; 379 dls_head_t *dhp; 380 dls_impl_t *dip; 381 dls_impl_t *ndip; 382 mblk_t *nmp; 383 mod_hash_key_t key; 384 uint_t npacket; 385 boolean_t accepted; 386 dls_rx_t di_rx, ndi_rx; 387 void *di_rx_arg, *ndi_rx_arg; 388 389 /* 390 * Walk the packet chain. 391 */ 392 while (mp != NULL) { 393 /* 394 * Wipe the accepted state. 395 */ 396 accepted = B_FALSE; 397 398 /* 399 * Grab the longest sub-chain we can process as a single 400 * unit. 401 */ 402 nextp = i_dls_link_subchain(dlp, mp, &mhi, &vid, &npacket); 403 404 if (npacket == 0) { 405 /* 406 * The first packet had an unrecognized header. 407 * Modify npacket so that this stray can be 408 * accounted for. 409 */ 410 npacket = 1; 411 freemsg(mp); 412 goto loop; 413 } 414 415 /* 416 * Construct a hash key from the VLAN identifier and the 417 * DLSAP that represents dls_impl_t in promiscuous mode. 418 */ 419 key = MAKE_KEY(DLS_SAP_PROMISC, vid); 420 421 /* 422 * Search the has table for dls_impl_t eligible to receive 423 * a packet chain for this DLSAP/VLAN combination. 424 */ 425 rw_enter(&dlp->dl_impl_lock, RW_READER); 426 if (mod_hash_find(hash, key, (mod_hash_val_t *)&dhp) != 0) { 427 rw_exit(&dlp->dl_impl_lock); 428 goto non_promisc; 429 } 430 i_dls_head_hold(dhp); 431 rw_exit(&dlp->dl_impl_lock); 432 433 /* 434 * Find dls_impl_t that will accept the sub-chain. 435 */ 436 for (dip = dhp->dh_list; dip != NULL; dip = dip->di_nextp) { 437 if (!dls_accept(dip, &mhi, &di_rx, &di_rx_arg)) 438 continue; 439 440 /* 441 * We have at least one acceptor. 442 */ 443 accepted = B_TRUE; 444 445 /* 446 * There will normally be at least more dls_impl_t 447 * (since we've yet to check for non-promiscuous 448 * dls_impl_t) so dup the sub-chain. 449 */ 450 if ((nmp = copymsgchain(mp)) != NULL) 451 di_rx(di_rx_arg, mrh, nmp, mhi.mhi_hdrsize); 452 } 453 454 /* 455 * Release the hold on the dls_impl_t chain now that we have 456 * finished walking it. 457 */ 458 i_dls_head_rele(dhp); 459 460 non_promisc: 461 /* 462 * Construct a hash key from the VLAN identifier and the 463 * DLSAP. 464 */ 465 key = MAKE_KEY(mhi.mhi_bindsap, vid); 466 467 /* 468 * Search the has table for dls_impl_t eligible to receive 469 * a packet chain for this DLSAP/VLAN combination. 470 */ 471 rw_enter(&dlp->dl_impl_lock, RW_READER); 472 if (mod_hash_find(hash, key, (mod_hash_val_t *)&dhp) != 0) { 473 rw_exit(&dlp->dl_impl_lock); 474 freemsgchain(mp); 475 goto loop; 476 } 477 i_dls_head_hold(dhp); 478 rw_exit(&dlp->dl_impl_lock); 479 480 /* 481 * Find the first dls_impl_t that will accept the sub-chain. 482 */ 483 for (dip = dhp->dh_list; dip != NULL; dip = dip->di_nextp) 484 if (dls_accept(dip, &mhi, &di_rx, &di_rx_arg)) 485 break; 486 487 /* 488 * If we did not find any dls_impl_t willing to accept the 489 * sub-chain then throw it away. 490 */ 491 if (dip == NULL) { 492 i_dls_head_rele(dhp); 493 freemsgchain(mp); 494 goto loop; 495 } 496 497 /* 498 * We have at least one acceptor. 499 */ 500 accepted = B_TRUE; 501 for (;;) { 502 /* 503 * Find the next dls_impl_t that will accept the 504 * sub-chain. 505 */ 506 for (ndip = dip->di_nextp; ndip != NULL; 507 ndip = ndip->di_nextp) 508 if (dls_accept(ndip, &mhi, &ndi_rx, 509 &ndi_rx_arg)) 510 break; 511 512 /* 513 * If there are no more dls_impl_t that are willing 514 * to accept the sub-chain then we don't need to dup 515 * it before handing it to the current one. 516 */ 517 if (ndip == NULL) { 518 di_rx(di_rx_arg, mrh, mp, mhi.mhi_hdrsize); 519 520 /* 521 * Since there are no more dls_impl_t, we're 522 * done. 523 */ 524 break; 525 } 526 527 /* 528 * There are more dls_impl_t so dup the sub-chain. 529 */ 530 if ((nmp = copymsgchain(mp)) != NULL) 531 di_rx(di_rx_arg, mrh, nmp, mhi.mhi_hdrsize); 532 533 dip = ndip; 534 di_rx = ndi_rx; 535 di_rx_arg = ndi_rx_arg; 536 } 537 538 /* 539 * Release the hold on the dls_impl_t chain now that we have 540 * finished walking it. 541 */ 542 i_dls_head_rele(dhp); 543 544 loop: 545 /* 546 * If there were no acceptors then add the packet count to the 547 * 'unknown' count. 548 */ 549 if (!accepted) 550 atomic_add_32(&(dlp->dl_unknowns), npacket); 551 552 /* 553 * Move onto the next sub-chain. 554 */ 555 mp = nextp; 556 } 557 } 558 559 static void 560 i_dls_link_txloop(void *arg, mblk_t *mp) 561 { 562 dls_link_t *dlp = arg; 563 mod_hash_t *hash = dlp->dl_impl_hash; 564 mblk_t *nextp; 565 mac_header_info_t mhi; 566 uint16_t vid; 567 dls_head_t *dhp; 568 dls_impl_t *dip; 569 dls_impl_t *ndip; 570 mblk_t *nmp; 571 mod_hash_key_t key; 572 uint_t npacket; 573 dls_rx_t di_rx, ndi_rx; 574 void *di_rx_arg, *ndi_rx_arg; 575 576 /* 577 * Walk the packet chain. 578 */ 579 while (mp != NULL) { 580 /* 581 * Grab the longest sub-chain we can process as a single 582 * unit. 583 */ 584 nextp = i_dls_link_subchain(dlp, mp, &mhi, &vid, &npacket); 585 586 if (npacket == 0) { 587 freemsg(mp); 588 goto loop; 589 } 590 591 /* 592 * Construct a hash key from the VLAN identifier and the 593 * DLSAP. 594 */ 595 key = MAKE_KEY(mhi.mhi_bindsap, vid); 596 597 /* 598 * Search the has table for dls_impl_t eligible to receive 599 * a packet chain for this DLSAP/VLAN combination. 600 */ 601 rw_enter(&dlp->dl_impl_lock, RW_READER); 602 if (mod_hash_find(hash, key, (mod_hash_val_t *)&dhp) != 0) { 603 rw_exit(&dlp->dl_impl_lock); 604 goto promisc; 605 } 606 i_dls_head_hold(dhp); 607 rw_exit(&dlp->dl_impl_lock); 608 609 /* 610 * Find dls_impl_t that will accept the sub-chain. 611 */ 612 for (dip = dhp->dh_list; dip != NULL; dip = dip->di_nextp) { 613 if (!dls_accept_loopback(dip, &di_rx, &di_rx_arg)) 614 continue; 615 616 /* 617 * There should be at least more dls_impl_t (since 618 * we've yet to check for dls_impl_t in promiscuous 619 * mode) so dup the sub-chain. 620 */ 621 if ((nmp = copymsgchain(mp)) != NULL) 622 di_rx(di_rx_arg, NULL, nmp, mhi.mhi_hdrsize); 623 } 624 625 /* 626 * Release the hold on the dls_impl_t chain now that we have 627 * finished walking it. 628 */ 629 i_dls_head_rele(dhp); 630 631 promisc: 632 /* 633 * Construct a hash key from the VLAN identifier and the 634 * DLSAP that represents dls_impl_t in promiscuous mode. 635 */ 636 key = MAKE_KEY(DLS_SAP_PROMISC, vid); 637 638 /* 639 * Search the has table for dls_impl_t eligible to receive 640 * a packet chain for this DLSAP/VLAN combination. 641 */ 642 rw_enter(&dlp->dl_impl_lock, RW_READER); 643 if (mod_hash_find(hash, key, (mod_hash_val_t *)&dhp) != 0) { 644 rw_exit(&dlp->dl_impl_lock); 645 freemsgchain(mp); 646 goto loop; 647 } 648 i_dls_head_hold(dhp); 649 rw_exit(&dlp->dl_impl_lock); 650 651 /* 652 * Find the first dls_impl_t that will accept the sub-chain. 653 */ 654 for (dip = dhp->dh_list; dip != NULL; dip = dip->di_nextp) 655 if (dls_accept_loopback(dip, &di_rx, &di_rx_arg)) 656 break; 657 658 /* 659 * If we did not find any dls_impl_t willing to accept the 660 * sub-chain then throw it away. 661 */ 662 if (dip == NULL) { 663 i_dls_head_rele(dhp); 664 freemsgchain(mp); 665 goto loop; 666 } 667 668 for (;;) { 669 /* 670 * Find the next dls_impl_t that will accept the 671 * sub-chain. 672 */ 673 for (ndip = dip->di_nextp; ndip != NULL; 674 ndip = ndip->di_nextp) 675 if (dls_accept_loopback(ndip, &ndi_rx, 676 &ndi_rx_arg)) { 677 break; 678 } 679 680 /* 681 * If there are no more dls_impl_t that are willing 682 * to accept the sub-chain then we don't need to dup 683 * it before handing it to the current one. 684 */ 685 if (ndip == NULL) { 686 di_rx(di_rx_arg, NULL, mp, mhi.mhi_hdrsize); 687 688 /* 689 * Since there are no more dls_impl_t, we're 690 * done. 691 */ 692 break; 693 } 694 695 /* 696 * There are more dls_impl_t so dup the sub-chain. 697 */ 698 if ((nmp = copymsgchain(mp)) != NULL) 699 di_rx(di_rx_arg, NULL, nmp, mhi.mhi_hdrsize); 700 701 dip = ndip; 702 di_rx = ndi_rx; 703 di_rx_arg = ndi_rx_arg; 704 } 705 706 /* 707 * Release the hold on the dls_impl_t chain now that we have 708 * finished walking it. 709 */ 710 i_dls_head_rele(dhp); 711 712 loop: 713 /* 714 * Move onto the next sub-chain. 715 */ 716 mp = nextp; 717 } 718 } 719 720 /*ARGSUSED*/ 721 static uint_t 722 i_dls_link_walk(mod_hash_key_t key, mod_hash_val_t *val, void *arg) 723 { 724 boolean_t *promiscp = arg; 725 uint32_t sap = KEY_SAP(key); 726 727 if (sap == DLS_SAP_PROMISC) { 728 *promiscp = B_TRUE; 729 return (MH_WALK_TERMINATE); 730 } 731 732 return (MH_WALK_CONTINUE); 733 } 734 735 static int 736 i_dls_link_create(const char *name, uint_t ddi_instance, dls_link_t **dlpp) 737 { 738 dls_link_t *dlp; 739 740 /* 741 * Allocate a new dls_link_t structure. 742 */ 743 dlp = kmem_cache_alloc(i_dls_link_cachep, KM_SLEEP); 744 745 /* 746 * Name the dls_link_t after the MAC interface it represents. 747 */ 748 (void) strlcpy(dlp->dl_name, name, sizeof (dlp->dl_name)); 749 dlp->dl_ddi_instance = ddi_instance; 750 751 /* 752 * Set the packet loopback function for use when the MAC is in 753 * promiscuous mode, and initialize promiscuous bookeeping fields. 754 */ 755 dlp->dl_txloop = i_dls_link_txloop; 756 dlp->dl_npromisc = 0; 757 dlp->dl_mth = NULL; 758 759 *dlpp = dlp; 760 return (0); 761 } 762 763 static void 764 i_dls_link_destroy(dls_link_t *dlp) 765 { 766 ASSERT(dlp->dl_npromisc == 0); 767 ASSERT(dlp->dl_nactive == 0); 768 ASSERT(dlp->dl_mth == NULL); 769 ASSERT(dlp->dl_macref == 0); 770 ASSERT(dlp->dl_mh == NULL); 771 ASSERT(dlp->dl_mip == NULL); 772 ASSERT(dlp->dl_impl_count == 0); 773 ASSERT(dlp->dl_mrh == NULL); 774 775 /* 776 * Free the structure back to the cache. 777 */ 778 dlp->dl_unknowns = 0; 779 kmem_cache_free(i_dls_link_cachep, dlp); 780 } 781 782 /* 783 * Module initialization functions. 784 */ 785 786 void 787 dls_link_init(void) 788 { 789 /* 790 * Create a kmem_cache of dls_link_t structures. 791 */ 792 i_dls_link_cachep = kmem_cache_create("dls_link_cache", 793 sizeof (dls_link_t), 0, i_dls_link_constructor, 794 i_dls_link_destructor, NULL, NULL, NULL, 0); 795 ASSERT(i_dls_link_cachep != NULL); 796 797 /* 798 * Create a dls_link_t hash table and associated lock. 799 */ 800 i_dls_link_hash = mod_hash_create_extended("dls_link_hash", 801 IMPL_HASHSZ, mod_hash_null_keydtor, mod_hash_null_valdtor, 802 mod_hash_bystr, NULL, mod_hash_strkey_cmp, KM_SLEEP); 803 rw_init(&i_dls_link_lock, NULL, RW_DEFAULT, NULL); 804 i_dls_link_count = 0; 805 } 806 807 int 808 dls_link_fini(void) 809 { 810 if (i_dls_link_count > 0) 811 return (EBUSY); 812 813 /* 814 * Destroy the kmem_cache. 815 */ 816 kmem_cache_destroy(i_dls_link_cachep); 817 818 /* 819 * Destroy the hash table and associated lock. 820 */ 821 mod_hash_destroy_hash(i_dls_link_hash); 822 rw_destroy(&i_dls_link_lock); 823 return (0); 824 } 825 826 /* 827 * Exported functions. 828 */ 829 830 int 831 dls_link_hold(const char *name, uint_t ddi_instance, dls_link_t **dlpp) 832 { 833 dls_link_t *dlp; 834 int err; 835 836 /* 837 * Look up a dls_link_t corresponding to the given mac_handle_t 838 * in the global hash table. We need to hold i_dls_link_lock in 839 * order to atomically find and insert a dls_link_t into the 840 * hash table. 841 */ 842 rw_enter(&i_dls_link_lock, RW_WRITER); 843 if ((err = mod_hash_find(i_dls_link_hash, (mod_hash_key_t)name, 844 (mod_hash_val_t *)&dlp)) == 0) 845 goto done; 846 847 ASSERT(err == MH_ERR_NOTFOUND); 848 849 /* 850 * We didn't find anything so we need to create one. 851 */ 852 if ((err = i_dls_link_create(name, ddi_instance, &dlp)) != 0) { 853 rw_exit(&i_dls_link_lock); 854 return (err); 855 } 856 857 /* 858 * Insert the dls_link_t. 859 */ 860 err = mod_hash_insert(i_dls_link_hash, (mod_hash_key_t)name, 861 (mod_hash_val_t)dlp); 862 ASSERT(err == 0); 863 864 i_dls_link_count++; 865 ASSERT(i_dls_link_count != 0); 866 867 done: 868 /* 869 * Bump the reference count and hand back the reference. 870 */ 871 dlp->dl_ref++; 872 *dlpp = dlp; 873 rw_exit(&i_dls_link_lock); 874 return (0); 875 } 876 877 void 878 dls_link_rele(dls_link_t *dlp) 879 { 880 mod_hash_val_t val; 881 882 rw_enter(&i_dls_link_lock, RW_WRITER); 883 884 /* 885 * Check if there are any more references. 886 */ 887 if (--dlp->dl_ref != 0) { 888 /* 889 * There are more references so there's nothing more to do. 890 */ 891 goto done; 892 } 893 894 (void) mod_hash_remove(i_dls_link_hash, 895 (mod_hash_key_t)dlp->dl_name, &val); 896 ASSERT(dlp == (dls_link_t *)val); 897 898 /* 899 * Destroy the dls_link_t. 900 */ 901 i_dls_link_destroy(dlp); 902 ASSERT(i_dls_link_count > 0); 903 i_dls_link_count--; 904 done: 905 rw_exit(&i_dls_link_lock); 906 } 907 908 int 909 dls_mac_hold(dls_link_t *dlp) 910 { 911 int err = 0; 912 913 mutex_enter(&dlp->dl_lock); 914 915 ASSERT(IMPLY(dlp->dl_macref != 0, dlp->dl_mh != NULL)); 916 ASSERT(IMPLY(dlp->dl_macref == 0, dlp->dl_mh == NULL)); 917 918 if (dlp->dl_macref == 0) { 919 /* 920 * First reference; hold open the MAC interface. 921 */ 922 err = mac_open(dlp->dl_name, dlp->dl_ddi_instance, &dlp->dl_mh); 923 if (err != 0) 924 goto done; 925 926 dlp->dl_mip = mac_info(dlp->dl_mh); 927 } 928 929 dlp->dl_macref++; 930 done: 931 mutex_exit(&dlp->dl_lock); 932 return (err); 933 } 934 935 void 936 dls_mac_rele(dls_link_t *dlp) 937 { 938 mutex_enter(&dlp->dl_lock); 939 ASSERT(dlp->dl_mh != NULL); 940 941 if (--dlp->dl_macref == 0) { 942 mac_close(dlp->dl_mh); 943 dlp->dl_mh = NULL; 944 dlp->dl_mip = NULL; 945 } 946 mutex_exit(&dlp->dl_lock); 947 } 948 949 void 950 dls_link_add(dls_link_t *dlp, uint32_t sap, dls_impl_t *dip) 951 { 952 dls_vlan_t *dvp = dip->di_dvp; 953 mod_hash_t *hash = dlp->dl_impl_hash; 954 mod_hash_key_t key; 955 dls_head_t *dhp; 956 dls_impl_t *p; 957 mac_rx_t rx; 958 int err; 959 boolean_t promisc = B_FALSE; 960 961 /* 962 * Generate a hash key based on the sap and the VLAN id. 963 */ 964 key = MAKE_KEY(sap, dvp->dv_id); 965 966 /* 967 * We need dl_lock here because we want to be able to walk 968 * the hash table *and* set the mac rx func atomically. if 969 * these two operations are separate, someone else could 970 * insert/remove dls_impl_t from the hash table after we 971 * drop the hash lock and this could cause our chosen rx 972 * func to be incorrect. note that we cannot call mac_rx_add 973 * when holding the hash lock because this can cause deadlock. 974 */ 975 mutex_enter(&dlp->dl_lock); 976 977 /* 978 * Search the table for a list head with this key. 979 */ 980 rw_enter(&dlp->dl_impl_lock, RW_WRITER); 981 982 if ((err = mod_hash_find(hash, key, (mod_hash_val_t *)&dhp)) != 0) { 983 ASSERT(err == MH_ERR_NOTFOUND); 984 985 dhp = i_dls_head_alloc(key); 986 err = mod_hash_insert(hash, key, (mod_hash_val_t)dhp); 987 ASSERT(err == 0); 988 } 989 990 /* 991 * Add the dls_impl_t to the head of the list. 992 */ 993 ASSERT(dip->di_nextp == NULL); 994 p = dhp->dh_list; 995 dip->di_nextp = p; 996 dhp->dh_list = dip; 997 998 /* 999 * Save a pointer to the list head. 1000 */ 1001 dip->di_headp = dhp; 1002 dlp->dl_impl_count++; 1003 1004 /* 1005 * Walk the bound dls_impl_t to see if there are any 1006 * in promiscuous 'all sap' mode. 1007 */ 1008 mod_hash_walk(hash, i_dls_link_walk, (void *)&promisc); 1009 rw_exit(&dlp->dl_impl_lock); 1010 1011 /* 1012 * If there are then we need to use a receive routine 1013 * which will route packets to those dls_impl_t as well 1014 * as ones bound to the DLSAP of the packet. 1015 */ 1016 if (promisc) 1017 rx = i_dls_link_rx_promisc; 1018 else 1019 rx = i_dls_link_rx; 1020 1021 /* Replace the existing receive function if there is one. */ 1022 if (dlp->dl_mrh != NULL) 1023 mac_rx_remove(dlp->dl_mh, dlp->dl_mrh); 1024 dlp->dl_mrh = mac_rx_add(dlp->dl_mh, rx, (void *)dlp); 1025 mutex_exit(&dlp->dl_lock); 1026 } 1027 1028 void 1029 dls_link_remove(dls_link_t *dlp, dls_impl_t *dip) 1030 { 1031 mod_hash_t *hash = dlp->dl_impl_hash; 1032 dls_impl_t **pp; 1033 dls_impl_t *p; 1034 dls_head_t *dhp; 1035 mac_rx_t rx; 1036 1037 /* 1038 * We need dl_lock here because we want to be able to walk 1039 * the hash table *and* set the mac rx func atomically. if 1040 * these two operations are separate, someone else could 1041 * insert/remove dls_impl_t from the hash table after we 1042 * drop the hash lock and this could cause our chosen rx 1043 * func to be incorrect. note that we cannot call mac_rx_add 1044 * when holding the hash lock because this can cause deadlock. 1045 */ 1046 mutex_enter(&dlp->dl_lock); 1047 rw_enter(&dlp->dl_impl_lock, RW_WRITER); 1048 1049 /* 1050 * Poll the hash table entry until all references have been dropped. 1051 * We need to drop all locks before sleeping because we don't want 1052 * the interrupt handler to block. We set di_removing here to 1053 * tell the receive callbacks not to pass up packets anymore. 1054 * This is only a hint to quicken the decrease of the refcnt so 1055 * the assignment need not be protected by any lock. 1056 */ 1057 dhp = dip->di_headp; 1058 dip->di_removing = B_TRUE; 1059 while (dhp->dh_ref != 0) { 1060 rw_exit(&dlp->dl_impl_lock); 1061 mutex_exit(&dlp->dl_lock); 1062 delay(drv_usectohz(1000)); /* 1ms delay */ 1063 mutex_enter(&dlp->dl_lock); 1064 rw_enter(&dlp->dl_impl_lock, RW_WRITER); 1065 } 1066 1067 /* 1068 * Walk the list and remove the dls_impl_t. 1069 */ 1070 for (pp = &dhp->dh_list; (p = *pp) != NULL; pp = &(p->di_nextp)) { 1071 if (p == dip) 1072 break; 1073 } 1074 ASSERT(p != NULL); 1075 *pp = p->di_nextp; 1076 p->di_nextp = NULL; 1077 1078 ASSERT(dlp->dl_impl_count > 0); 1079 dlp->dl_impl_count--; 1080 1081 if (dhp->dh_list == NULL) { 1082 mod_hash_val_t val = NULL; 1083 1084 /* 1085 * The list is empty so remove the hash table entry. 1086 */ 1087 (void) mod_hash_remove(hash, dhp->dh_key, &val); 1088 ASSERT(dhp == (dls_head_t *)val); 1089 i_dls_head_free(dhp); 1090 } 1091 dip->di_removing = B_FALSE; 1092 1093 /* 1094 * If there are no dls_impl_t then there's no need to register a 1095 * receive function with the mac. 1096 */ 1097 if (dlp->dl_impl_count == 0) { 1098 rw_exit(&dlp->dl_impl_lock); 1099 mac_rx_remove(dlp->dl_mh, dlp->dl_mrh); 1100 dlp->dl_mrh = NULL; 1101 } else { 1102 boolean_t promisc = B_FALSE; 1103 1104 /* 1105 * Walk the bound dls_impl_t to see if there are any 1106 * in promiscuous 'all sap' mode. 1107 */ 1108 mod_hash_walk(hash, i_dls_link_walk, (void *)&promisc); 1109 rw_exit(&dlp->dl_impl_lock); 1110 1111 /* 1112 * If there are then we need to use a receive routine 1113 * which will route packets to those dls_impl_t as well 1114 * as ones bound to the DLSAP of the packet. 1115 */ 1116 if (promisc) 1117 rx = i_dls_link_rx_promisc; 1118 else 1119 rx = i_dls_link_rx; 1120 1121 mac_rx_remove(dlp->dl_mh, dlp->dl_mrh); 1122 dlp->dl_mrh = mac_rx_add(dlp->dl_mh, rx, (void *)dlp); 1123 } 1124 mutex_exit(&dlp->dl_lock); 1125 } 1126 1127 int 1128 dls_link_header_info(dls_link_t *dlp, mblk_t *mp, mac_header_info_t *mhip, 1129 uint16_t *vidp) 1130 { 1131 boolean_t is_ethernet = (dlp->dl_mip->mi_media == DL_ETHER); 1132 int err = 0; 1133 1134 if ((err = mac_header_info(dlp->dl_mh, mp, mhip)) != 0) 1135 return (err); 1136 1137 /* 1138 * If this is a VLAN-tagged Ethernet packet, then the SAP in the 1139 * mac_header_info_t as returned by mac_header_info() is VLAN_TPID. 1140 * We need to grab the ethertype from the VLAN header. 1141 */ 1142 if (is_ethernet && (mhip->mhi_bindsap == VLAN_TPID)) { 1143 struct ether_vlan_header *evhp; 1144 uint16_t sap; 1145 1146 evhp = (struct ether_vlan_header *)mp->b_rptr; 1147 sap = ntohs(evhp->ether_type); 1148 (void) mac_sap_verify(dlp->dl_mh, sap, &mhip->mhi_bindsap); 1149 mhip->mhi_hdrsize = sizeof (struct ether_vlan_header); 1150 if (vidp != NULL) 1151 *vidp = VLAN_ID(ntohs(evhp->ether_tci)); 1152 } else if (vidp != NULL) { 1153 *vidp = VLAN_ID_NONE; 1154 } 1155 return (0); 1156 } 1157