1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 */ 25 26 /* 27 * Datalink management routines. 28 */ 29 30 #include <sys/types.h> 31 #include <sys/door.h> 32 #include <sys/zone.h> 33 #include <sys/modctl.h> 34 #include <sys/file.h> 35 #include <sys/modhash.h> 36 #include <sys/kstat.h> 37 #include <sys/vnode.h> 38 #include <sys/cmn_err.h> 39 #include <sys/softmac.h> 40 #include <sys/dls.h> 41 #include <sys/dls_impl.h> 42 #include <sys/stropts.h> 43 #include <sys/netstack.h> 44 #include <inet/iptun/iptun_impl.h> 45 46 /* 47 * This vanity name management module is treated as part of the GLD framework 48 * and we don't hold any GLD framework lock across a call to any mac 49 * function that needs to acquire the mac perimeter. The hierarchy is 50 * mac perimeter -> framework locks 51 */ 52 53 typedef struct dls_stack { 54 zoneid_t dlss_zoneid; 55 } dls_stack_t; 56 57 static kmem_cache_t *i_dls_devnet_cachep; 58 static kmutex_t i_dls_mgmt_lock; 59 static krwlock_t i_dls_devnet_lock; 60 static mod_hash_t *i_dls_devnet_id_hash; 61 static mod_hash_t *i_dls_devnet_hash; 62 63 boolean_t devnet_need_rebuild; 64 65 #define VLAN_HASHSZ 67 /* prime */ 66 67 /* 68 * The following macros take a link name without the trailing PPA as input. 69 * Opening a /dev/net node with one of these names causes a tunnel link to be 70 * implicitly created in dls_devnet_hold_by_name() for backward compatibility 71 * with Solaris 10 and prior. 72 */ 73 #define IS_IPV4_TUN(name) (strcmp((name), "ip.tun") == 0) 74 #define IS_IPV6_TUN(name) (strcmp((name), "ip6.tun") == 0) 75 #define IS_6TO4_TUN(name) (strcmp((name), "ip.6to4tun") == 0) 76 #define IS_IPTUN_LINK(name) ( \ 77 IS_IPV4_TUN(name) || IS_IPV6_TUN(name) || IS_6TO4_TUN(name)) 78 79 /* Upcall door handle */ 80 static door_handle_t dls_mgmt_dh = NULL; 81 82 #define DD_CONDEMNED 0x1 83 #define DD_KSTAT_CHANGING 0x2 84 #define DD_IMPLICIT_IPTUN 0x4 /* Implicitly-created ip*.*tun* tunnel */ 85 86 /* 87 * This structure is used to keep the <linkid, macname> mapping. 88 * This structure itself is not protected by the mac perimeter, but is 89 * protected by the dd_mutex and i_dls_devnet_lock. Thus most of the 90 * functions manipulating this structure such as dls_devnet_set/unset etc. 91 * may be called while not holding the mac perimeter. 92 */ 93 typedef struct dls_devnet_s { 94 datalink_id_t dd_linkid; 95 char dd_linkname[MAXLINKNAMELEN]; 96 char dd_mac[MAXNAMELEN]; 97 kstat_t *dd_ksp; /* kstat in owner_zid */ 98 kstat_t *dd_zone_ksp; /* in dd_zid if != owner_zid */ 99 uint32_t dd_ref; 100 kmutex_t dd_mutex; 101 kcondvar_t dd_cv; 102 uint32_t dd_tref; 103 uint_t dd_flags; 104 zoneid_t dd_owner_zid; /* zone where node was created */ 105 zoneid_t dd_zid; /* current zone */ 106 boolean_t dd_prop_loaded; 107 taskqid_t dd_prop_taskid; 108 } dls_devnet_t; 109 110 static int i_dls_devnet_create_iptun(const char *, const char *, 111 datalink_id_t *); 112 static int i_dls_devnet_destroy_iptun(datalink_id_t); 113 static int i_dls_devnet_setzid(dls_devnet_t *, zoneid_t, boolean_t); 114 static int dls_devnet_unset(const char *, datalink_id_t *, boolean_t); 115 116 /*ARGSUSED*/ 117 static int 118 i_dls_devnet_constructor(void *buf, void *arg, int kmflag) 119 { 120 dls_devnet_t *ddp = buf; 121 122 bzero(buf, sizeof (dls_devnet_t)); 123 mutex_init(&ddp->dd_mutex, NULL, MUTEX_DEFAULT, NULL); 124 cv_init(&ddp->dd_cv, NULL, CV_DEFAULT, NULL); 125 return (0); 126 } 127 128 /*ARGSUSED*/ 129 static void 130 i_dls_devnet_destructor(void *buf, void *arg) 131 { 132 dls_devnet_t *ddp = buf; 133 134 ASSERT(ddp->dd_ksp == NULL); 135 ASSERT(ddp->dd_ref == 0); 136 ASSERT(ddp->dd_tref == 0); 137 mutex_destroy(&ddp->dd_mutex); 138 cv_destroy(&ddp->dd_cv); 139 } 140 141 /* ARGSUSED */ 142 static int 143 dls_zone_remove(datalink_id_t linkid, void *arg) 144 { 145 dls_devnet_t *ddp; 146 147 if (dls_devnet_hold_tmp(linkid, &ddp) == 0) { 148 (void) dls_devnet_setzid(ddp, GLOBAL_ZONEID); 149 dls_devnet_rele_tmp(ddp); 150 } 151 return (0); 152 } 153 154 /* ARGSUSED */ 155 static void * 156 dls_stack_init(netstackid_t stackid, netstack_t *ns) 157 { 158 dls_stack_t *dlss; 159 160 dlss = kmem_zalloc(sizeof (*dlss), KM_SLEEP); 161 dlss->dlss_zoneid = netstackid_to_zoneid(stackid); 162 return (dlss); 163 } 164 165 /* ARGSUSED */ 166 static void 167 dls_stack_shutdown(netstackid_t stackid, void *arg) 168 { 169 dls_stack_t *dlss = (dls_stack_t *)arg; 170 171 /* Move remaining datalinks in this zone back to the global zone. */ 172 (void) zone_datalink_walk(dlss->dlss_zoneid, dls_zone_remove, NULL); 173 } 174 175 /* ARGSUSED */ 176 static void 177 dls_stack_fini(netstackid_t stackid, void *arg) 178 { 179 dls_stack_t *dlss = (dls_stack_t *)arg; 180 181 kmem_free(dlss, sizeof (*dlss)); 182 } 183 184 /* 185 * Module initialization and finalization functions. 186 */ 187 void 188 dls_mgmt_init(void) 189 { 190 mutex_init(&i_dls_mgmt_lock, NULL, MUTEX_DEFAULT, NULL); 191 rw_init(&i_dls_devnet_lock, NULL, RW_DEFAULT, NULL); 192 193 /* 194 * Create a kmem_cache of dls_devnet_t structures. 195 */ 196 i_dls_devnet_cachep = kmem_cache_create("dls_devnet_cache", 197 sizeof (dls_devnet_t), 0, i_dls_devnet_constructor, 198 i_dls_devnet_destructor, NULL, NULL, NULL, 0); 199 ASSERT(i_dls_devnet_cachep != NULL); 200 201 /* 202 * Create a hash table, keyed by dd_linkid, of dls_devnet_t. 203 */ 204 i_dls_devnet_id_hash = mod_hash_create_idhash("dls_devnet_id_hash", 205 VLAN_HASHSZ, mod_hash_null_valdtor); 206 207 /* 208 * Create a hash table, keyed by dd_mac 209 */ 210 i_dls_devnet_hash = mod_hash_create_extended("dls_devnet_hash", 211 VLAN_HASHSZ, mod_hash_null_keydtor, mod_hash_null_valdtor, 212 mod_hash_bystr, NULL, mod_hash_strkey_cmp, KM_SLEEP); 213 214 devnet_need_rebuild = B_FALSE; 215 216 netstack_register(NS_DLS, dls_stack_init, dls_stack_shutdown, 217 dls_stack_fini); 218 } 219 220 void 221 dls_mgmt_fini(void) 222 { 223 netstack_unregister(NS_DLS); 224 mod_hash_destroy_hash(i_dls_devnet_hash); 225 mod_hash_destroy_hash(i_dls_devnet_id_hash); 226 kmem_cache_destroy(i_dls_devnet_cachep); 227 rw_destroy(&i_dls_devnet_lock); 228 mutex_destroy(&i_dls_mgmt_lock); 229 } 230 231 int 232 dls_mgmt_door_set(boolean_t start) 233 { 234 int err; 235 236 /* handle daemon restart */ 237 mutex_enter(&i_dls_mgmt_lock); 238 if (dls_mgmt_dh != NULL) { 239 door_ki_rele(dls_mgmt_dh); 240 dls_mgmt_dh = NULL; 241 } 242 243 if (start && ((err = door_ki_open(DLMGMT_DOOR, &dls_mgmt_dh)) != 0)) { 244 mutex_exit(&i_dls_mgmt_lock); 245 return (err); 246 } 247 248 mutex_exit(&i_dls_mgmt_lock); 249 250 /* 251 * Create and associate <link name, linkid> mapping for network devices 252 * which are already attached before the daemon is started. 253 */ 254 if (start) 255 softmac_recreate(); 256 return (0); 257 } 258 259 static boolean_t 260 i_dls_mgmt_door_revoked(door_handle_t dh) 261 { 262 struct door_info info; 263 extern int sys_shutdown; 264 265 ASSERT(dh != NULL); 266 267 if (sys_shutdown) { 268 cmn_err(CE_NOTE, "dls_mgmt_door: shutdown observed\n"); 269 return (B_TRUE); 270 } 271 272 if (door_ki_info(dh, &info) != 0) 273 return (B_TRUE); 274 275 return ((info.di_attributes & DOOR_REVOKED) != 0); 276 } 277 278 /* 279 * Upcall to the datalink management daemon (dlmgmtd). 280 */ 281 static int 282 i_dls_mgmt_upcall(void *arg, size_t asize, void *rbuf, size_t rsize) 283 { 284 door_arg_t darg, save_arg; 285 door_handle_t dh; 286 int err; 287 int retry = 0; 288 289 #define MAXRETRYNUM 3 290 291 ASSERT(arg); 292 darg.data_ptr = arg; 293 darg.data_size = asize; 294 darg.desc_ptr = NULL; 295 darg.desc_num = 0; 296 darg.rbuf = rbuf; 297 darg.rsize = rsize; 298 save_arg = darg; 299 300 retry: 301 mutex_enter(&i_dls_mgmt_lock); 302 dh = dls_mgmt_dh; 303 if ((dh == NULL) || i_dls_mgmt_door_revoked(dh)) { 304 mutex_exit(&i_dls_mgmt_lock); 305 return (EBADF); 306 } 307 door_ki_hold(dh); 308 mutex_exit(&i_dls_mgmt_lock); 309 310 for (;;) { 311 retry++; 312 if ((err = door_ki_upcall_limited(dh, &darg, zone_kcred(), 313 SIZE_MAX, 0)) == 0) 314 break; 315 316 /* 317 * handle door call errors 318 */ 319 darg = save_arg; 320 switch (err) { 321 case EINTR: 322 /* 323 * If the operation which caused this door upcall gets 324 * interrupted, return directly. 325 */ 326 goto done; 327 case EAGAIN: 328 /* 329 * Repeat upcall if the maximum attempt limit has not 330 * been reached. 331 */ 332 if (retry < MAXRETRYNUM) { 333 delay(2 * hz); 334 break; 335 } 336 cmn_err(CE_WARN, "dls: dlmgmtd fatal error %d\n", err); 337 goto done; 338 default: 339 /* A fatal door error */ 340 if (i_dls_mgmt_door_revoked(dh)) { 341 cmn_err(CE_NOTE, 342 "dls: dlmgmtd door service revoked\n"); 343 344 if (retry < MAXRETRYNUM) { 345 door_ki_rele(dh); 346 goto retry; 347 } 348 } 349 cmn_err(CE_WARN, "dls: dlmgmtd fatal error %d\n", err); 350 goto done; 351 } 352 } 353 354 if (darg.rbuf != rbuf) { 355 /* 356 * The size of the input rbuf was not big enough, so the 357 * upcall allocated the rbuf itself. If this happens, assume 358 * that this was an invalid door call request. 359 */ 360 kmem_free(darg.rbuf, darg.rsize); 361 err = ENOSPC; 362 goto done; 363 } 364 365 if (darg.rsize != rsize) { 366 err = EINVAL; 367 goto done; 368 } 369 370 err = ((dlmgmt_retval_t *)rbuf)->lr_err; 371 372 done: 373 door_ki_rele(dh); 374 return (err); 375 } 376 377 /* 378 * Request the datalink management daemon to create a link with the attributes 379 * below. Upon success, zero is returned and linkidp contains the linkid for 380 * the new link; otherwise, an errno is returned. 381 * 382 * - dev physical dev_t. required for all physical links, 383 * including GLDv3 links. It will be used to force the 384 * attachment of a physical device, hence the 385 * registration of its mac 386 * - class datalink class 387 * - media type media type; DL_OTHER means unknown 388 * - persist whether to persist the datalink 389 */ 390 int 391 dls_mgmt_create(const char *devname, dev_t dev, datalink_class_t class, 392 uint32_t media, boolean_t persist, datalink_id_t *linkidp) 393 { 394 dlmgmt_upcall_arg_create_t create; 395 dlmgmt_create_retval_t retval; 396 int err; 397 398 create.ld_cmd = DLMGMT_CMD_DLS_CREATE; 399 create.ld_class = class; 400 create.ld_media = media; 401 create.ld_phymaj = getmajor(dev); 402 create.ld_phyinst = getminor(dev); 403 create.ld_persist = persist; 404 if (strlcpy(create.ld_devname, devname, sizeof (create.ld_devname)) >= 405 sizeof (create.ld_devname)) 406 return (EINVAL); 407 408 if ((err = i_dls_mgmt_upcall(&create, sizeof (create), &retval, 409 sizeof (retval))) == 0) { 410 *linkidp = retval.lr_linkid; 411 } 412 return (err); 413 } 414 415 /* 416 * Request the datalink management daemon to destroy the specified link. 417 * Returns zero upon success, or an errno upon failure. 418 */ 419 int 420 dls_mgmt_destroy(datalink_id_t linkid, boolean_t persist) 421 { 422 dlmgmt_upcall_arg_destroy_t destroy; 423 dlmgmt_destroy_retval_t retval; 424 425 destroy.ld_cmd = DLMGMT_CMD_DLS_DESTROY; 426 destroy.ld_linkid = linkid; 427 destroy.ld_persist = persist; 428 429 return (i_dls_mgmt_upcall(&destroy, sizeof (destroy), 430 &retval, sizeof (retval))); 431 } 432 433 /* 434 * Request the datalink management daemon to verify/update the information 435 * for a physical link. Upon success, get its linkid. 436 * 437 * - media type media type 438 * - novanity whether this physical datalink supports vanity naming. 439 * physical links that do not use the GLDv3 MAC plugin 440 * cannot suport vanity naming 441 * 442 * This function could fail with ENOENT or EEXIST. Two cases return EEXIST: 443 * 444 * 1. A link with devname already exists, but the media type does not match. 445 * In this case, mediap will bee set to the media type of the existing link. 446 * 2. A link with devname already exists, but its link name does not match 447 * the device name, although this link does not support vanity naming. 448 */ 449 int 450 dls_mgmt_update(const char *devname, uint32_t media, boolean_t novanity, 451 uint32_t *mediap, datalink_id_t *linkidp) 452 { 453 dlmgmt_upcall_arg_update_t update; 454 dlmgmt_update_retval_t retval; 455 int err; 456 457 update.ld_cmd = DLMGMT_CMD_DLS_UPDATE; 458 459 if (strlcpy(update.ld_devname, devname, sizeof (update.ld_devname)) >= 460 sizeof (update.ld_devname)) 461 return (EINVAL); 462 463 update.ld_media = media; 464 update.ld_novanity = novanity; 465 466 if ((err = i_dls_mgmt_upcall(&update, sizeof (update), &retval, 467 sizeof (retval))) == EEXIST) { 468 *linkidp = retval.lr_linkid; 469 *mediap = retval.lr_media; 470 } else if (err == 0) { 471 *linkidp = retval.lr_linkid; 472 } 473 474 return (err); 475 } 476 477 /* 478 * Request the datalink management daemon to get the information for a link. 479 * Returns zero upon success, or an errno upon failure. 480 * 481 * Only fills in information for argument pointers that are non-NULL. 482 * Note that the link argument is expected to be MAXLINKNAMELEN bytes. 483 */ 484 int 485 dls_mgmt_get_linkinfo(datalink_id_t linkid, char *link, 486 datalink_class_t *classp, uint32_t *mediap, uint32_t *flagsp) 487 { 488 dlmgmt_door_getname_t getname; 489 dlmgmt_getname_retval_t retval; 490 int err, len; 491 492 getname.ld_cmd = DLMGMT_CMD_GETNAME; 493 getname.ld_linkid = linkid; 494 495 if ((err = i_dls_mgmt_upcall(&getname, sizeof (getname), &retval, 496 sizeof (retval))) != 0) { 497 return (err); 498 } 499 500 len = strlen(retval.lr_link); 501 if (len <= 1 || len >= MAXLINKNAMELEN) 502 return (EINVAL); 503 504 if (link != NULL) 505 (void) strlcpy(link, retval.lr_link, MAXLINKNAMELEN); 506 if (classp != NULL) 507 *classp = retval.lr_class; 508 if (mediap != NULL) 509 *mediap = retval.lr_media; 510 if (flagsp != NULL) 511 *flagsp = retval.lr_flags; 512 return (0); 513 } 514 515 /* 516 * Request the datalink management daemon to get the linkid for a link. 517 * Returns a non-zero error code on failure. The linkid argument is only 518 * set on success (when zero is returned.) 519 */ 520 int 521 dls_mgmt_get_linkid(const char *link, datalink_id_t *linkid) 522 { 523 dlmgmt_door_getlinkid_t getlinkid; 524 dlmgmt_getlinkid_retval_t retval; 525 int err; 526 527 getlinkid.ld_cmd = DLMGMT_CMD_GETLINKID; 528 (void) strlcpy(getlinkid.ld_link, link, MAXLINKNAMELEN); 529 530 if ((err = i_dls_mgmt_upcall(&getlinkid, sizeof (getlinkid), &retval, 531 sizeof (retval))) == 0) { 532 *linkid = retval.lr_linkid; 533 } 534 return (err); 535 } 536 537 datalink_id_t 538 dls_mgmt_get_next(datalink_id_t linkid, datalink_class_t class, 539 datalink_media_t dmedia, uint32_t flags) 540 { 541 dlmgmt_door_getnext_t getnext; 542 dlmgmt_getnext_retval_t retval; 543 544 getnext.ld_cmd = DLMGMT_CMD_GETNEXT; 545 getnext.ld_class = class; 546 getnext.ld_dmedia = dmedia; 547 getnext.ld_flags = flags; 548 getnext.ld_linkid = linkid; 549 550 if (i_dls_mgmt_upcall(&getnext, sizeof (getnext), &retval, 551 sizeof (retval)) != 0) { 552 return (DATALINK_INVALID_LINKID); 553 } 554 555 return (retval.lr_linkid); 556 } 557 558 static int 559 i_dls_mgmt_get_linkattr(const datalink_id_t linkid, const char *attr, 560 void *attrval, size_t *attrszp) 561 { 562 dlmgmt_upcall_arg_getattr_t getattr; 563 dlmgmt_getattr_retval_t retval; 564 int err; 565 566 getattr.ld_cmd = DLMGMT_CMD_DLS_GETATTR; 567 getattr.ld_linkid = linkid; 568 (void) strlcpy(getattr.ld_attr, attr, MAXLINKATTRLEN); 569 570 if ((err = i_dls_mgmt_upcall(&getattr, sizeof (getattr), &retval, 571 sizeof (retval))) == 0) { 572 if (*attrszp < retval.lr_attrsz) 573 return (EINVAL); 574 *attrszp = retval.lr_attrsz; 575 bcopy(retval.lr_attrval, attrval, retval.lr_attrsz); 576 } 577 578 return (err); 579 } 580 581 /* 582 * Note that this function can only get devp successfully for non-VLAN link. 583 */ 584 int 585 dls_mgmt_get_phydev(datalink_id_t linkid, dev_t *devp) 586 { 587 uint64_t maj, inst; 588 size_t attrsz = sizeof (uint64_t); 589 590 if (i_dls_mgmt_get_linkattr(linkid, FPHYMAJ, &maj, &attrsz) != 0 || 591 attrsz != sizeof (uint64_t) || 592 i_dls_mgmt_get_linkattr(linkid, FPHYINST, &inst, &attrsz) != 0 || 593 attrsz != sizeof (uint64_t)) { 594 return (EINVAL); 595 } 596 597 *devp = makedevice((major_t)maj, (minor_t)inst); 598 return (0); 599 } 600 601 /* 602 * Request the datalink management daemon to push in 603 * all properties associated with the link. 604 * Returns a non-zero error code on failure. 605 */ 606 int 607 dls_mgmt_linkprop_init(datalink_id_t linkid) 608 { 609 dlmgmt_door_linkprop_init_t li; 610 dlmgmt_linkprop_init_retval_t retval; 611 int err; 612 613 li.ld_cmd = DLMGMT_CMD_LINKPROP_INIT; 614 li.ld_linkid = linkid; 615 616 err = i_dls_mgmt_upcall(&li, sizeof (li), &retval, sizeof (retval)); 617 return (err); 618 } 619 620 static void 621 dls_devnet_prop_task(void *arg) 622 { 623 dls_devnet_t *ddp = arg; 624 625 (void) dls_mgmt_linkprop_init(ddp->dd_linkid); 626 627 mutex_enter(&ddp->dd_mutex); 628 ddp->dd_prop_loaded = B_TRUE; 629 ddp->dd_prop_taskid = NULL; 630 cv_broadcast(&ddp->dd_cv); 631 mutex_exit(&ddp->dd_mutex); 632 } 633 634 /* 635 * Ensure property loading task is completed. 636 */ 637 void 638 dls_devnet_prop_task_wait(dls_dl_handle_t ddp) 639 { 640 mutex_enter(&ddp->dd_mutex); 641 while (ddp->dd_prop_taskid != NULL) 642 cv_wait(&ddp->dd_cv, &ddp->dd_mutex); 643 mutex_exit(&ddp->dd_mutex); 644 } 645 646 void 647 dls_devnet_rele_tmp(dls_dl_handle_t dlh) 648 { 649 dls_devnet_t *ddp = dlh; 650 651 mutex_enter(&ddp->dd_mutex); 652 ASSERT(ddp->dd_tref != 0); 653 if (--ddp->dd_tref == 0) 654 cv_signal(&ddp->dd_cv); 655 mutex_exit(&ddp->dd_mutex); 656 } 657 658 int 659 dls_devnet_hold_link(datalink_id_t linkid, dls_dl_handle_t *ddhp, 660 dls_link_t **dlpp) 661 { 662 dls_dl_handle_t dlh; 663 dls_link_t *dlp; 664 int err; 665 666 if ((err = dls_devnet_hold_tmp(linkid, &dlh)) != 0) 667 return (err); 668 669 if ((err = dls_link_hold(dls_devnet_mac(dlh), &dlp)) != 0) { 670 dls_devnet_rele_tmp(dlh); 671 return (err); 672 } 673 674 ASSERT(MAC_PERIM_HELD(dlp->dl_mh)); 675 676 *ddhp = dlh; 677 *dlpp = dlp; 678 return (0); 679 } 680 681 void 682 dls_devnet_rele_link(dls_dl_handle_t dlh, dls_link_t *dlp) 683 { 684 ASSERT(MAC_PERIM_HELD(dlp->dl_mh)); 685 686 dls_link_rele(dlp); 687 dls_devnet_rele_tmp(dlh); 688 } 689 690 /* 691 * "link" kstats related functions. 692 */ 693 694 /* 695 * Query the "link" kstats. 696 * 697 * We may be called from the kstat subsystem in an arbitrary context. 698 * If the caller is the stack, the context could be an upcall data 699 * thread. Hence we can't acquire the mac perimeter in this function 700 * for fear of deadlock. 701 */ 702 static int 703 dls_devnet_stat_update(kstat_t *ksp, int rw) 704 { 705 dls_devnet_t *ddp = ksp->ks_private; 706 dls_link_t *dlp; 707 int err; 708 709 /* 710 * Check the link is being renamed or if the link is going away 711 * before incrementing dd_tref which in turn prevents the link 712 * from being renamed or deleted until we finish. 713 */ 714 mutex_enter(&ddp->dd_mutex); 715 if (ddp->dd_flags & (DD_CONDEMNED | DD_KSTAT_CHANGING)) { 716 mutex_exit(&ddp->dd_mutex); 717 return (ENOENT); 718 } 719 ddp->dd_tref++; 720 mutex_exit(&ddp->dd_mutex); 721 722 /* 723 * If a device detach happens at this time, it will block in 724 * dls_devnet_unset since the dd_tref has been bumped up above. So the 725 * access to 'dlp' is safe even though we don't hold the mac perimeter. 726 */ 727 if (mod_hash_find(i_dls_link_hash, (mod_hash_key_t)ddp->dd_mac, 728 (mod_hash_val_t *)&dlp) != 0) { 729 dls_devnet_rele_tmp(ddp); 730 return (ENOENT); 731 } 732 733 err = dls_stat_update(ksp, dlp, rw); 734 735 dls_devnet_rele_tmp(ddp); 736 return (err); 737 } 738 739 /* 740 * Create the "link" kstats. 741 */ 742 static void 743 dls_devnet_stat_create(dls_devnet_t *ddp, zoneid_t zoneid) 744 { 745 kstat_t *ksp; 746 747 if (dls_stat_create("link", 0, ddp->dd_linkname, zoneid, 748 dls_devnet_stat_update, ddp, &ksp) == 0) { 749 ASSERT(ksp != NULL); 750 if (zoneid == ddp->dd_owner_zid) { 751 ASSERT(ddp->dd_ksp == NULL); 752 ddp->dd_ksp = ksp; 753 } else { 754 ASSERT(ddp->dd_zone_ksp == NULL); 755 ddp->dd_zone_ksp = ksp; 756 } 757 } 758 } 759 760 /* 761 * Destroy the "link" kstats. 762 */ 763 static void 764 dls_devnet_stat_destroy(dls_devnet_t *ddp, zoneid_t zoneid) 765 { 766 if (zoneid == ddp->dd_owner_zid) { 767 if (ddp->dd_ksp != NULL) { 768 kstat_delete(ddp->dd_ksp); 769 ddp->dd_ksp = NULL; 770 } 771 } else { 772 if (ddp->dd_zone_ksp != NULL) { 773 kstat_delete(ddp->dd_zone_ksp); 774 ddp->dd_zone_ksp = NULL; 775 } 776 } 777 } 778 779 /* 780 * The link has been renamed. Destroy the old non-legacy kstats ("link kstats") 781 * and create the new set using the new name. 782 */ 783 static void 784 dls_devnet_stat_rename(dls_devnet_t *ddp) 785 { 786 if (ddp->dd_ksp != NULL) { 787 kstat_delete(ddp->dd_ksp); 788 ddp->dd_ksp = NULL; 789 } 790 /* We can't rename a link while it's assigned to a non-global zone. */ 791 ASSERT(ddp->dd_zone_ksp == NULL); 792 dls_devnet_stat_create(ddp, ddp->dd_owner_zid); 793 } 794 795 /* 796 * Associate a linkid with a given link (identified by macname) 797 */ 798 static int 799 dls_devnet_set(const char *macname, datalink_id_t linkid, zoneid_t zoneid, 800 dls_devnet_t **ddpp) 801 { 802 dls_devnet_t *ddp = NULL; 803 datalink_class_t class; 804 int err; 805 boolean_t stat_create = B_FALSE; 806 char linkname[MAXLINKNAMELEN]; 807 808 rw_enter(&i_dls_devnet_lock, RW_WRITER); 809 810 /* 811 * Don't allow callers to set a link name with a linkid that already 812 * has a name association (that's what rename is for). 813 */ 814 if (linkid != DATALINK_INVALID_LINKID) { 815 if (mod_hash_find(i_dls_devnet_id_hash, 816 (mod_hash_key_t)(uintptr_t)linkid, 817 (mod_hash_val_t *)&ddp) == 0) { 818 err = EEXIST; 819 goto done; 820 } 821 if ((err = dls_mgmt_get_linkinfo(linkid, linkname, &class, 822 NULL, NULL)) != 0) 823 goto done; 824 } 825 826 if ((err = mod_hash_find(i_dls_devnet_hash, 827 (mod_hash_key_t)macname, (mod_hash_val_t *)&ddp)) == 0) { 828 if (ddp->dd_linkid != DATALINK_INVALID_LINKID) { 829 err = EEXIST; 830 goto done; 831 } 832 833 /* 834 * This might be a physical link that has already 835 * been created, but which does not have a linkid 836 * because dlmgmtd was not running when it was created. 837 */ 838 if (linkid == DATALINK_INVALID_LINKID || 839 class != DATALINK_CLASS_PHYS) { 840 err = EINVAL; 841 goto done; 842 } 843 } else { 844 ddp = kmem_cache_alloc(i_dls_devnet_cachep, KM_SLEEP); 845 ddp->dd_tref = 0; 846 ddp->dd_ref++; 847 ddp->dd_owner_zid = zoneid; 848 (void) strlcpy(ddp->dd_mac, macname, sizeof (ddp->dd_mac)); 849 VERIFY(mod_hash_insert(i_dls_devnet_hash, 850 (mod_hash_key_t)ddp->dd_mac, (mod_hash_val_t)ddp) == 0); 851 } 852 853 if (linkid != DATALINK_INVALID_LINKID) { 854 ddp->dd_linkid = linkid; 855 (void) strlcpy(ddp->dd_linkname, linkname, 856 sizeof (ddp->dd_linkname)); 857 VERIFY(mod_hash_insert(i_dls_devnet_id_hash, 858 (mod_hash_key_t)(uintptr_t)linkid, 859 (mod_hash_val_t)ddp) == 0); 860 devnet_need_rebuild = B_TRUE; 861 stat_create = B_TRUE; 862 mutex_enter(&ddp->dd_mutex); 863 if (!ddp->dd_prop_loaded && (ddp->dd_prop_taskid == NULL)) { 864 ddp->dd_prop_taskid = taskq_dispatch(system_taskq, 865 dls_devnet_prop_task, ddp, TQ_SLEEP); 866 } 867 mutex_exit(&ddp->dd_mutex); 868 } 869 err = 0; 870 done: 871 /* 872 * It is safe to drop the i_dls_devnet_lock at this point. In the case 873 * of physical devices, the softmac framework will fail the device 874 * detach based on the smac_state or smac_hold_cnt. Other cases like 875 * vnic and aggr use their own scheme to serialize creates and deletes 876 * and ensure that *ddp is valid. 877 */ 878 rw_exit(&i_dls_devnet_lock); 879 if (err == 0) { 880 if (zoneid != GLOBAL_ZONEID && 881 (err = i_dls_devnet_setzid(ddp, zoneid, B_FALSE)) != 0) 882 (void) dls_devnet_unset(macname, &linkid, B_TRUE); 883 /* 884 * The kstat subsystem holds its own locks (rather perimeter) 885 * before calling the ks_update (dls_devnet_stat_update) entry 886 * point which in turn grabs the i_dls_devnet_lock. So the 887 * lock hierarchy is kstat locks -> i_dls_devnet_lock. 888 */ 889 if (stat_create) 890 dls_devnet_stat_create(ddp, zoneid); 891 if (ddpp != NULL) 892 *ddpp = ddp; 893 } 894 return (err); 895 } 896 897 /* 898 * Disassociate a linkid with a given link (identified by macname) 899 * This waits until temporary references to the dls_devnet_t are gone. 900 */ 901 static int 902 dls_devnet_unset(const char *macname, datalink_id_t *id, boolean_t wait) 903 { 904 dls_devnet_t *ddp; 905 int err; 906 mod_hash_val_t val; 907 908 rw_enter(&i_dls_devnet_lock, RW_WRITER); 909 if ((err = mod_hash_find(i_dls_devnet_hash, 910 (mod_hash_key_t)macname, (mod_hash_val_t *)&ddp)) != 0) { 911 ASSERT(err == MH_ERR_NOTFOUND); 912 rw_exit(&i_dls_devnet_lock); 913 return (ENOENT); 914 } 915 916 mutex_enter(&ddp->dd_mutex); 917 918 /* 919 * Make sure downcalls into softmac_create or softmac_destroy from 920 * devfs don't cv_wait on any devfs related condition for fear of 921 * deadlock. Return EBUSY if the asynchronous thread started for 922 * property loading as part of the post attach hasn't yet completed. 923 */ 924 ASSERT(ddp->dd_ref != 0); 925 if ((ddp->dd_ref != 1) || (!wait && 926 (ddp->dd_tref != 0 || ddp->dd_prop_taskid != NULL))) { 927 mutex_exit(&ddp->dd_mutex); 928 rw_exit(&i_dls_devnet_lock); 929 return (EBUSY); 930 } 931 932 ddp->dd_flags |= DD_CONDEMNED; 933 ddp->dd_ref--; 934 *id = ddp->dd_linkid; 935 936 if (ddp->dd_zid != GLOBAL_ZONEID) 937 (void) i_dls_devnet_setzid(ddp, GLOBAL_ZONEID, B_FALSE); 938 939 /* 940 * Remove this dls_devnet_t from the hash table. 941 */ 942 VERIFY(mod_hash_remove(i_dls_devnet_hash, 943 (mod_hash_key_t)ddp->dd_mac, &val) == 0); 944 945 if (ddp->dd_linkid != DATALINK_INVALID_LINKID) { 946 VERIFY(mod_hash_remove(i_dls_devnet_id_hash, 947 (mod_hash_key_t)(uintptr_t)ddp->dd_linkid, &val) == 0); 948 949 devnet_need_rebuild = B_TRUE; 950 } 951 rw_exit(&i_dls_devnet_lock); 952 953 if (wait) { 954 /* 955 * Wait until all temporary references are released. 956 */ 957 while ((ddp->dd_tref != 0) || (ddp->dd_prop_taskid != NULL)) 958 cv_wait(&ddp->dd_cv, &ddp->dd_mutex); 959 } else { 960 ASSERT(ddp->dd_tref == 0 && ddp->dd_prop_taskid == NULL); 961 } 962 963 if (ddp->dd_linkid != DATALINK_INVALID_LINKID) 964 dls_devnet_stat_destroy(ddp, ddp->dd_owner_zid); 965 966 ddp->dd_prop_loaded = B_FALSE; 967 ddp->dd_linkid = DATALINK_INVALID_LINKID; 968 ddp->dd_flags = 0; 969 mutex_exit(&ddp->dd_mutex); 970 kmem_cache_free(i_dls_devnet_cachep, ddp); 971 972 return (0); 973 } 974 975 static int 976 dls_devnet_hold_common(datalink_id_t linkid, dls_devnet_t **ddpp, 977 boolean_t tmp_hold) 978 { 979 dls_devnet_t *ddp; 980 dev_t phydev = 0; 981 dls_dev_handle_t ddh = NULL; 982 int err; 983 984 /* 985 * Hold this link to prevent it being detached in case of a 986 * physical link. 987 */ 988 if (dls_mgmt_get_phydev(linkid, &phydev) == 0) 989 (void) softmac_hold_device(phydev, &ddh); 990 991 rw_enter(&i_dls_devnet_lock, RW_WRITER); 992 if ((err = mod_hash_find(i_dls_devnet_id_hash, 993 (mod_hash_key_t)(uintptr_t)linkid, (mod_hash_val_t *)&ddp)) != 0) { 994 ASSERT(err == MH_ERR_NOTFOUND); 995 rw_exit(&i_dls_devnet_lock); 996 softmac_rele_device(ddh); 997 return (ENOENT); 998 } 999 1000 mutex_enter(&ddp->dd_mutex); 1001 ASSERT(ddp->dd_ref > 0); 1002 if (ddp->dd_flags & DD_CONDEMNED) { 1003 mutex_exit(&ddp->dd_mutex); 1004 rw_exit(&i_dls_devnet_lock); 1005 softmac_rele_device(ddh); 1006 return (ENOENT); 1007 } 1008 if (tmp_hold) 1009 ddp->dd_tref++; 1010 else 1011 ddp->dd_ref++; 1012 mutex_exit(&ddp->dd_mutex); 1013 rw_exit(&i_dls_devnet_lock); 1014 1015 softmac_rele_device(ddh); 1016 1017 *ddpp = ddp; 1018 return (0); 1019 } 1020 1021 int 1022 dls_devnet_hold(datalink_id_t linkid, dls_devnet_t **ddpp) 1023 { 1024 return (dls_devnet_hold_common(linkid, ddpp, B_FALSE)); 1025 } 1026 1027 /* 1028 * Hold the vanity naming structure (dls_devnet_t) temporarily. The request to 1029 * delete the dls_devnet_t will wait until the temporary reference is released. 1030 */ 1031 int 1032 dls_devnet_hold_tmp(datalink_id_t linkid, dls_devnet_t **ddpp) 1033 { 1034 return (dls_devnet_hold_common(linkid, ddpp, B_TRUE)); 1035 } 1036 1037 /* 1038 * This funtion is called when a DLS client tries to open a device node. 1039 * This dev_t could a result of a /dev/net node access (returned by 1040 * devnet_create_rvp->dls_devnet_open()) or a direct /dev node access. 1041 * In both cases, this function bumps up the reference count of the 1042 * dls_devnet_t structure. The reference is held as long as the device node 1043 * is open. In the case of /dev/net while it is true that the initial reference 1044 * is held when the devnet_create_rvp->dls_devnet_open call happens, this 1045 * initial reference is released immediately in devnet_inactive_callback -> 1046 * dls_devnet_close(). (Note that devnet_inactive_callback() is called right 1047 * after dld_open completes, not when the /dev/net node is being closed). 1048 * To undo this function, call dls_devnet_rele() 1049 */ 1050 int 1051 dls_devnet_hold_by_dev(dev_t dev, dls_dl_handle_t *ddhp) 1052 { 1053 char name[MAXNAMELEN]; 1054 char *drv; 1055 dls_dev_handle_t ddh = NULL; 1056 dls_devnet_t *ddp; 1057 int err; 1058 1059 if ((drv = ddi_major_to_name(getmajor(dev))) == NULL) 1060 return (EINVAL); 1061 1062 (void) snprintf(name, sizeof (name), "%s%d", drv, 1063 DLS_MINOR2INST(getminor(dev))); 1064 1065 /* 1066 * Hold this link to prevent it being detached in case of a 1067 * GLDv3 physical link. 1068 */ 1069 if (DLS_MINOR2INST(getminor(dev)) <= DLS_MAX_PPA) 1070 (void) softmac_hold_device(dev, &ddh); 1071 1072 rw_enter(&i_dls_devnet_lock, RW_WRITER); 1073 if ((err = mod_hash_find(i_dls_devnet_hash, 1074 (mod_hash_key_t)name, (mod_hash_val_t *)&ddp)) != 0) { 1075 ASSERT(err == MH_ERR_NOTFOUND); 1076 rw_exit(&i_dls_devnet_lock); 1077 softmac_rele_device(ddh); 1078 return (ENOENT); 1079 } 1080 mutex_enter(&ddp->dd_mutex); 1081 ASSERT(ddp->dd_ref > 0); 1082 if (ddp->dd_flags & DD_CONDEMNED) { 1083 mutex_exit(&ddp->dd_mutex); 1084 rw_exit(&i_dls_devnet_lock); 1085 softmac_rele_device(ddh); 1086 return (ENOENT); 1087 } 1088 ddp->dd_ref++; 1089 mutex_exit(&ddp->dd_mutex); 1090 rw_exit(&i_dls_devnet_lock); 1091 1092 softmac_rele_device(ddh); 1093 1094 *ddhp = ddp; 1095 return (0); 1096 } 1097 1098 void 1099 dls_devnet_rele(dls_devnet_t *ddp) 1100 { 1101 mutex_enter(&ddp->dd_mutex); 1102 ASSERT(ddp->dd_ref > 1); 1103 ddp->dd_ref--; 1104 if ((ddp->dd_flags & DD_IMPLICIT_IPTUN) && ddp->dd_ref == 1) { 1105 mutex_exit(&ddp->dd_mutex); 1106 if (i_dls_devnet_destroy_iptun(ddp->dd_linkid) != 0) 1107 ddp->dd_flags |= DD_IMPLICIT_IPTUN; 1108 return; 1109 } 1110 mutex_exit(&ddp->dd_mutex); 1111 } 1112 1113 static int 1114 dls_devnet_hold_by_name(const char *link, dls_devnet_t **ddpp) 1115 { 1116 char drv[MAXLINKNAMELEN]; 1117 uint_t ppa; 1118 major_t major; 1119 dev_t phy_dev, tmp_dev; 1120 datalink_id_t linkid; 1121 dls_dev_handle_t ddh; 1122 int err; 1123 1124 if ((err = dls_mgmt_get_linkid(link, &linkid)) == 0) 1125 return (dls_devnet_hold(linkid, ddpp)); 1126 1127 /* 1128 * If we failed to get the link's linkid because the dlmgmtd daemon 1129 * has not been started, return ENOENT so that the application can 1130 * fallback to open the /dev node. 1131 */ 1132 if (err == EBADF) 1133 return (ENOENT); 1134 1135 if (err != ENOENT) 1136 return (err); 1137 1138 if (ddi_parse(link, drv, &ppa) != DDI_SUCCESS) 1139 return (ENOENT); 1140 1141 if (IS_IPTUN_LINK(drv)) { 1142 if ((err = i_dls_devnet_create_iptun(link, drv, &linkid)) != 0) 1143 return (err); 1144 /* 1145 * At this point, an IP tunnel MAC has registered, which 1146 * resulted in a link being created. 1147 */ 1148 err = dls_devnet_hold(linkid, ddpp); 1149 ASSERT(err == 0); 1150 if (err != 0) { 1151 VERIFY(i_dls_devnet_destroy_iptun(linkid) == 0); 1152 return (err); 1153 } 1154 /* 1155 * dls_devnet_rele() will know to destroy the implicit IP 1156 * tunnel on last reference release if DD_IMPLICIT_IPTUN is 1157 * set. 1158 */ 1159 (*ddpp)->dd_flags |= DD_IMPLICIT_IPTUN; 1160 return (0); 1161 } 1162 1163 /* 1164 * If this link: 1165 * (a) is a physical device, (b) this is the first boot, (c) the MAC 1166 * is not registered yet, and (d) we cannot find its linkid, then the 1167 * linkname is the same as the devname. 1168 * 1169 * First filter out invalid names. 1170 */ 1171 if ((major = ddi_name_to_major(drv)) == (major_t)-1) 1172 return (ENOENT); 1173 1174 phy_dev = makedevice(major, DLS_PPA2MINOR(ppa)); 1175 if (softmac_hold_device(phy_dev, &ddh) != 0) 1176 return (ENOENT); 1177 1178 /* 1179 * At this time, the MAC should be registered, check its phy_dev using 1180 * the given name. 1181 */ 1182 if ((err = dls_mgmt_get_linkid(link, &linkid)) != 0 || 1183 (err = dls_mgmt_get_phydev(linkid, &tmp_dev)) != 0) { 1184 softmac_rele_device(ddh); 1185 return (err); 1186 } 1187 if (tmp_dev != phy_dev) { 1188 softmac_rele_device(ddh); 1189 return (ENOENT); 1190 } 1191 1192 err = dls_devnet_hold(linkid, ddpp); 1193 softmac_rele_device(ddh); 1194 return (err); 1195 } 1196 1197 int 1198 dls_devnet_macname2linkid(const char *macname, datalink_id_t *linkidp) 1199 { 1200 dls_devnet_t *ddp; 1201 1202 rw_enter(&i_dls_devnet_lock, RW_READER); 1203 if (mod_hash_find(i_dls_devnet_hash, (mod_hash_key_t)macname, 1204 (mod_hash_val_t *)&ddp) != 0) { 1205 rw_exit(&i_dls_devnet_lock); 1206 return (ENOENT); 1207 } 1208 1209 *linkidp = ddp->dd_linkid; 1210 rw_exit(&i_dls_devnet_lock); 1211 return (0); 1212 } 1213 1214 /* 1215 * Get linkid for the given dev. 1216 */ 1217 int 1218 dls_devnet_dev2linkid(dev_t dev, datalink_id_t *linkidp) 1219 { 1220 char macname[MAXNAMELEN]; 1221 char *drv; 1222 1223 if ((drv = ddi_major_to_name(getmajor(dev))) == NULL) 1224 return (EINVAL); 1225 1226 (void) snprintf(macname, sizeof (macname), "%s%d", drv, 1227 DLS_MINOR2INST(getminor(dev))); 1228 return (dls_devnet_macname2linkid(macname, linkidp)); 1229 } 1230 1231 /* 1232 * Get the link's physical dev_t. It this is a VLAN, get the dev_t of the 1233 * link this VLAN is created on. 1234 */ 1235 int 1236 dls_devnet_phydev(datalink_id_t vlanid, dev_t *devp) 1237 { 1238 dls_devnet_t *ddp; 1239 int err; 1240 1241 if ((err = dls_devnet_hold_tmp(vlanid, &ddp)) != 0) 1242 return (err); 1243 1244 err = dls_mgmt_get_phydev(ddp->dd_linkid, devp); 1245 dls_devnet_rele_tmp(ddp); 1246 return (err); 1247 } 1248 1249 /* 1250 * Handle the renaming requests. There are two rename cases: 1251 * 1252 * 1. Request to rename a valid link (id1) to an non-existent link name 1253 * (id2). In this case id2 is DATALINK_INVALID_LINKID. Just check whether 1254 * id1 is held by any applications. 1255 * 1256 * In this case, the link's kstats need to be updated using the given name. 1257 * 1258 * 2. Request to rename a valid link (id1) to the name of a REMOVED 1259 * physical link (id2). In this case, check that id1 and its associated 1260 * mac is not held by any application, and update the link's linkid to id2. 1261 * 1262 * This case does not change the <link name, linkid> mapping, so the link's 1263 * kstats need to be updated with using name associated the given id2. 1264 */ 1265 int 1266 dls_devnet_rename(datalink_id_t id1, datalink_id_t id2, const char *link) 1267 { 1268 dls_dev_handle_t ddh = NULL; 1269 int err = 0; 1270 dev_t phydev = 0; 1271 dls_devnet_t *ddp; 1272 mac_perim_handle_t mph = NULL; 1273 mac_handle_t mh; 1274 mod_hash_val_t val; 1275 boolean_t clear_dd_flag = B_FALSE; 1276 1277 /* 1278 * In the second case, id2 must be a REMOVED physical link. 1279 */ 1280 if ((id2 != DATALINK_INVALID_LINKID) && 1281 (dls_mgmt_get_phydev(id2, &phydev) == 0) && 1282 softmac_hold_device(phydev, &ddh) == 0) { 1283 softmac_rele_device(ddh); 1284 return (EEXIST); 1285 } 1286 1287 /* 1288 * Hold id1 to prevent it from being detached (if a physical link). 1289 */ 1290 if (dls_mgmt_get_phydev(id1, &phydev) == 0) 1291 (void) softmac_hold_device(phydev, &ddh); 1292 1293 /* 1294 * The framework does not hold hold locks across calls to the 1295 * mac perimeter, hence enter the perimeter first. This also waits 1296 * for the property loading to finish. 1297 */ 1298 if ((err = mac_perim_enter_by_linkid(id1, &mph)) != 0) { 1299 softmac_rele_device(ddh); 1300 return (err); 1301 } 1302 1303 rw_enter(&i_dls_devnet_lock, RW_WRITER); 1304 if ((err = mod_hash_find(i_dls_devnet_id_hash, 1305 (mod_hash_key_t)(uintptr_t)id1, (mod_hash_val_t *)&ddp)) != 0) { 1306 ASSERT(err == MH_ERR_NOTFOUND); 1307 err = ENOENT; 1308 goto done; 1309 } 1310 1311 /* 1312 * Return EBUSY if any applications have this link open, if any thread 1313 * is currently accessing the link kstats, or if the link is on-loan 1314 * to a non-global zone. Then set the DD_KSTAT_CHANGING flag to 1315 * prevent any access to the kstats while we delete and recreate 1316 * kstats below. 1317 */ 1318 mutex_enter(&ddp->dd_mutex); 1319 if (ddp->dd_ref > 1) { 1320 mutex_exit(&ddp->dd_mutex); 1321 err = EBUSY; 1322 goto done; 1323 } 1324 1325 ddp->dd_flags |= DD_KSTAT_CHANGING; 1326 clear_dd_flag = B_TRUE; 1327 mutex_exit(&ddp->dd_mutex); 1328 1329 if (id2 == DATALINK_INVALID_LINKID) { 1330 (void) strlcpy(ddp->dd_linkname, link, 1331 sizeof (ddp->dd_linkname)); 1332 1333 /* rename mac client name and its flow if exists */ 1334 if ((err = mac_open(ddp->dd_mac, &mh)) != 0) 1335 goto done; 1336 (void) mac_rename_primary(mh, link); 1337 mac_close(mh); 1338 goto done; 1339 } 1340 1341 /* 1342 * The second case, check whether the MAC is used by any MAC 1343 * user. This must be a physical link so ddh must not be NULL. 1344 */ 1345 if (ddh == NULL) { 1346 err = EINVAL; 1347 goto done; 1348 } 1349 1350 if ((err = mac_open(ddp->dd_mac, &mh)) != 0) 1351 goto done; 1352 1353 /* 1354 * We release the reference of the MAC which mac_open() is 1355 * holding. Note that this mac will not be unregistered 1356 * because the physical device is held. 1357 */ 1358 mac_close(mh); 1359 1360 /* 1361 * Check if there is any other MAC clients, if not, hold this mac 1362 * exclusively until we are done. 1363 */ 1364 if ((err = mac_mark_exclusive(mh)) != 0) 1365 goto done; 1366 1367 /* 1368 * Update the link's linkid. 1369 */ 1370 if ((err = mod_hash_find(i_dls_devnet_id_hash, 1371 (mod_hash_key_t)(uintptr_t)id2, &val)) != MH_ERR_NOTFOUND) { 1372 mac_unmark_exclusive(mh); 1373 err = EEXIST; 1374 goto done; 1375 } 1376 1377 err = dls_mgmt_get_linkinfo(id2, ddp->dd_linkname, NULL, NULL, NULL); 1378 if (err != 0) { 1379 mac_unmark_exclusive(mh); 1380 goto done; 1381 } 1382 1383 (void) mod_hash_remove(i_dls_devnet_id_hash, 1384 (mod_hash_key_t)(uintptr_t)id1, &val); 1385 1386 ddp->dd_linkid = id2; 1387 (void) mod_hash_insert(i_dls_devnet_id_hash, 1388 (mod_hash_key_t)(uintptr_t)ddp->dd_linkid, (mod_hash_val_t)ddp); 1389 1390 mac_unmark_exclusive(mh); 1391 1392 /* load properties for new id */ 1393 mutex_enter(&ddp->dd_mutex); 1394 ddp->dd_prop_loaded = B_FALSE; 1395 ddp->dd_prop_taskid = taskq_dispatch(system_taskq, 1396 dls_devnet_prop_task, ddp, TQ_SLEEP); 1397 mutex_exit(&ddp->dd_mutex); 1398 1399 done: 1400 /* 1401 * Change the name of the kstat based on the new link name. 1402 * We can't hold the i_dls_devnet_lock across calls to the kstat 1403 * subsystem. Instead the DD_KSTAT_CHANGING flag set above in this 1404 * function prevents any access to the dd_ksp while we delete and 1405 * recreate it below. 1406 */ 1407 rw_exit(&i_dls_devnet_lock); 1408 if (err == 0) 1409 dls_devnet_stat_rename(ddp); 1410 1411 if (clear_dd_flag) { 1412 mutex_enter(&ddp->dd_mutex); 1413 ddp->dd_flags &= ~DD_KSTAT_CHANGING; 1414 mutex_exit(&ddp->dd_mutex); 1415 } 1416 1417 if (mph != NULL) 1418 mac_perim_exit(mph); 1419 softmac_rele_device(ddh); 1420 return (err); 1421 } 1422 1423 static int 1424 i_dls_devnet_setzid(dls_devnet_t *ddp, zoneid_t new_zoneid, boolean_t setprop) 1425 { 1426 int err; 1427 mac_perim_handle_t mph; 1428 boolean_t upcall_done = B_FALSE; 1429 datalink_id_t linkid = ddp->dd_linkid; 1430 zoneid_t old_zoneid = ddp->dd_zid; 1431 dlmgmt_door_setzoneid_t setzid; 1432 dlmgmt_setzoneid_retval_t retval; 1433 1434 if (old_zoneid == new_zoneid) 1435 return (0); 1436 1437 if ((err = mac_perim_enter_by_macname(ddp->dd_mac, &mph)) != 0) 1438 return (err); 1439 1440 /* 1441 * When changing the zoneid of an existing link, we need to tell 1442 * dlmgmtd about it. dlmgmtd already knows the zoneid associated with 1443 * newly created links. 1444 */ 1445 if (setprop) { 1446 setzid.ld_cmd = DLMGMT_CMD_SETZONEID; 1447 setzid.ld_linkid = linkid; 1448 setzid.ld_zoneid = new_zoneid; 1449 err = i_dls_mgmt_upcall(&setzid, sizeof (setzid), &retval, 1450 sizeof (retval)); 1451 if (err != 0) 1452 goto done; 1453 upcall_done = B_TRUE; 1454 } 1455 if ((err = dls_link_setzid(ddp->dd_mac, new_zoneid)) == 0) { 1456 ddp->dd_zid = new_zoneid; 1457 devnet_need_rebuild = B_TRUE; 1458 } 1459 1460 done: 1461 if (err != 0 && upcall_done) { 1462 setzid.ld_zoneid = old_zoneid; 1463 (void) i_dls_mgmt_upcall(&setzid, sizeof (setzid), &retval, 1464 sizeof (retval)); 1465 } 1466 mac_perim_exit(mph); 1467 return (err); 1468 } 1469 1470 int 1471 dls_devnet_setzid(dls_dl_handle_t ddh, zoneid_t new_zid) 1472 { 1473 dls_devnet_t *ddp; 1474 int err; 1475 zoneid_t old_zid; 1476 boolean_t refheld = B_FALSE; 1477 1478 old_zid = ddh->dd_zid; 1479 1480 if (old_zid == new_zid) 1481 return (0); 1482 1483 /* 1484 * Acquire an additional reference to the link if it is being assigned 1485 * to a non-global zone from the global zone. 1486 */ 1487 if (old_zid == GLOBAL_ZONEID && new_zid != GLOBAL_ZONEID) { 1488 if ((err = dls_devnet_hold(ddh->dd_linkid, &ddp)) != 0) 1489 return (err); 1490 refheld = B_TRUE; 1491 } 1492 1493 if ((err = i_dls_devnet_setzid(ddh, new_zid, B_TRUE)) != 0) { 1494 if (refheld) 1495 dls_devnet_rele(ddp); 1496 return (err); 1497 } 1498 1499 /* 1500 * Release the additional reference if the link is returning to the 1501 * global zone from a non-global zone. 1502 */ 1503 if (old_zid != GLOBAL_ZONEID && new_zid == GLOBAL_ZONEID) 1504 dls_devnet_rele(ddh); 1505 1506 /* Re-create kstats in the appropriate zones. */ 1507 if (old_zid != GLOBAL_ZONEID) 1508 dls_devnet_stat_destroy(ddh, old_zid); 1509 if (new_zid != GLOBAL_ZONEID) 1510 dls_devnet_stat_create(ddh, new_zid); 1511 1512 return (0); 1513 } 1514 1515 zoneid_t 1516 dls_devnet_getzid(dls_dl_handle_t ddh) 1517 { 1518 return (((dls_devnet_t *)ddh)->dd_zid); 1519 } 1520 1521 zoneid_t 1522 dls_devnet_getownerzid(dls_dl_handle_t ddh) 1523 { 1524 return (((dls_devnet_t *)ddh)->dd_owner_zid); 1525 } 1526 1527 /* 1528 * Is linkid visible from zoneid? A link is visible if it was created in the 1529 * zone, or if it is currently assigned to the zone. 1530 */ 1531 boolean_t 1532 dls_devnet_islinkvisible(datalink_id_t linkid, zoneid_t zoneid) 1533 { 1534 dls_devnet_t *ddp; 1535 boolean_t result; 1536 1537 if (dls_devnet_hold_tmp(linkid, &ddp) != 0) 1538 return (B_FALSE); 1539 result = (ddp->dd_owner_zid == zoneid || ddp->dd_zid == zoneid); 1540 dls_devnet_rele_tmp(ddp); 1541 return (result); 1542 } 1543 1544 /* 1545 * Access a vanity naming node. 1546 */ 1547 int 1548 dls_devnet_open(const char *link, dls_dl_handle_t *dhp, dev_t *devp) 1549 { 1550 dls_devnet_t *ddp; 1551 dls_link_t *dlp; 1552 zoneid_t zid = getzoneid(); 1553 int err; 1554 mac_perim_handle_t mph; 1555 1556 if ((err = dls_devnet_hold_by_name(link, &ddp)) != 0) 1557 return (err); 1558 1559 dls_devnet_prop_task_wait(ddp); 1560 1561 /* 1562 * Opening a link that does not belong to the current non-global zone 1563 * is not allowed. 1564 */ 1565 if (zid != GLOBAL_ZONEID && ddp->dd_zid != zid) { 1566 dls_devnet_rele(ddp); 1567 return (ENOENT); 1568 } 1569 1570 err = mac_perim_enter_by_macname(ddp->dd_mac, &mph); 1571 if (err != 0) { 1572 dls_devnet_rele(ddp); 1573 return (err); 1574 } 1575 1576 err = dls_link_hold_create(ddp->dd_mac, &dlp); 1577 mac_perim_exit(mph); 1578 1579 if (err != 0) { 1580 dls_devnet_rele(ddp); 1581 return (err); 1582 } 1583 1584 *dhp = ddp; 1585 *devp = dls_link_dev(dlp); 1586 return (0); 1587 } 1588 1589 /* 1590 * Close access to a vanity naming node. 1591 */ 1592 void 1593 dls_devnet_close(dls_dl_handle_t dlh) 1594 { 1595 dls_devnet_t *ddp = dlh; 1596 dls_link_t *dlp; 1597 mac_perim_handle_t mph; 1598 1599 VERIFY(mac_perim_enter_by_macname(ddp->dd_mac, &mph) == 0); 1600 VERIFY(dls_link_hold(ddp->dd_mac, &dlp) == 0); 1601 1602 /* 1603 * One rele for the hold placed in dls_devnet_open, another for 1604 * the hold done just above 1605 */ 1606 dls_link_rele(dlp); 1607 dls_link_rele(dlp); 1608 mac_perim_exit(mph); 1609 1610 dls_devnet_rele(ddp); 1611 } 1612 1613 /* 1614 * This is used by /dev/net to rebuild the nodes for readdir(). It is not 1615 * critical and no protection is needed. 1616 */ 1617 boolean_t 1618 dls_devnet_rebuild() 1619 { 1620 boolean_t updated = devnet_need_rebuild; 1621 1622 devnet_need_rebuild = B_FALSE; 1623 return (updated); 1624 } 1625 1626 int 1627 dls_devnet_create(mac_handle_t mh, datalink_id_t linkid, zoneid_t zoneid) 1628 { 1629 dls_link_t *dlp; 1630 dls_devnet_t *ddp; 1631 int err; 1632 mac_perim_handle_t mph; 1633 1634 /* 1635 * Holding the mac perimeter ensures that the downcall from the 1636 * dlmgmt daemon which does the property loading does not proceed 1637 * until we relinquish the perimeter. 1638 */ 1639 mac_perim_enter_by_mh(mh, &mph); 1640 /* 1641 * Make this association before we call dls_link_hold_create as 1642 * we need to use the linkid to get the user name for the link 1643 * when we create the MAC client. 1644 */ 1645 if ((err = dls_devnet_set(mac_name(mh), linkid, zoneid, &ddp)) == 0) { 1646 if ((err = dls_link_hold_create(mac_name(mh), &dlp)) != 0) { 1647 mac_perim_exit(mph); 1648 (void) dls_devnet_unset(mac_name(mh), &linkid, B_TRUE); 1649 return (err); 1650 } 1651 } 1652 mac_perim_exit(mph); 1653 return (err); 1654 } 1655 1656 /* 1657 * Set the linkid of the dls_devnet_t and add it into the i_dls_devnet_id_hash. 1658 * This is called in the case that the dlmgmtd daemon is started later than 1659 * the physical devices get attached, and the linkid is only known after the 1660 * daemon starts. 1661 */ 1662 int 1663 dls_devnet_recreate(mac_handle_t mh, datalink_id_t linkid) 1664 { 1665 ASSERT(linkid != DATALINK_INVALID_LINKID); 1666 return (dls_devnet_set(mac_name(mh), linkid, GLOBAL_ZONEID, NULL)); 1667 } 1668 1669 int 1670 dls_devnet_destroy(mac_handle_t mh, datalink_id_t *idp, boolean_t wait) 1671 { 1672 int err; 1673 mac_perim_handle_t mph; 1674 1675 *idp = DATALINK_INVALID_LINKID; 1676 err = dls_devnet_unset(mac_name(mh), idp, wait); 1677 if (err != 0 && err != ENOENT) 1678 return (err); 1679 1680 mac_perim_enter_by_mh(mh, &mph); 1681 err = dls_link_rele_by_name(mac_name(mh)); 1682 mac_perim_exit(mph); 1683 1684 if (err != 0) { 1685 /* 1686 * XXX It is a general GLDv3 bug that dls_devnet_set() has to 1687 * be called to re-set the link when destroy fails. The 1688 * zoneid below will be incorrect if this function is ever 1689 * called from kernel context or from a zone other than that 1690 * which initially created the link. 1691 */ 1692 (void) dls_devnet_set(mac_name(mh), *idp, crgetzoneid(CRED()), 1693 NULL); 1694 } 1695 return (err); 1696 } 1697 1698 /* 1699 * Implicitly create an IP tunnel link. 1700 */ 1701 static int 1702 i_dls_devnet_create_iptun(const char *linkname, const char *drvname, 1703 datalink_id_t *linkid) 1704 { 1705 int err; 1706 iptun_kparams_t ik; 1707 uint32_t media; 1708 netstack_t *ns; 1709 major_t iptun_major; 1710 dev_info_t *iptun_dip; 1711 1712 /* First ensure that the iptun device is attached. */ 1713 if ((iptun_major = ddi_name_to_major(IPTUN_DRIVER_NAME)) == (major_t)-1) 1714 return (EINVAL); 1715 if ((iptun_dip = ddi_hold_devi_by_instance(iptun_major, 0, 0)) == NULL) 1716 return (EINVAL); 1717 1718 if (IS_IPV4_TUN(drvname)) { 1719 ik.iptun_kparam_type = IPTUN_TYPE_IPV4; 1720 media = DL_IPV4; 1721 } else if (IS_6TO4_TUN(drvname)) { 1722 ik.iptun_kparam_type = IPTUN_TYPE_6TO4; 1723 media = DL_6TO4; 1724 } else if (IS_IPV6_TUN(drvname)) { 1725 ik.iptun_kparam_type = IPTUN_TYPE_IPV6; 1726 media = DL_IPV6; 1727 } 1728 ik.iptun_kparam_flags = (IPTUN_KPARAM_TYPE | IPTUN_KPARAM_IMPLICIT); 1729 1730 /* Obtain a datalink id for this tunnel. */ 1731 err = dls_mgmt_create((char *)linkname, 0, DATALINK_CLASS_IPTUN, media, 1732 B_FALSE, &ik.iptun_kparam_linkid); 1733 if (err != 0) { 1734 ddi_release_devi(iptun_dip); 1735 return (err); 1736 } 1737 1738 ns = netstack_get_current(); 1739 err = iptun_create(&ik, CRED()); 1740 netstack_rele(ns); 1741 1742 if (err != 0) 1743 VERIFY(dls_mgmt_destroy(ik.iptun_kparam_linkid, B_FALSE) == 0); 1744 else 1745 *linkid = ik.iptun_kparam_linkid; 1746 1747 ddi_release_devi(iptun_dip); 1748 return (err); 1749 } 1750 1751 static int 1752 i_dls_devnet_destroy_iptun(datalink_id_t linkid) 1753 { 1754 int err; 1755 1756 /* 1757 * Note the use of zone_kcred() here as opposed to CRED(). This is 1758 * because the process that does the last close of this /dev/net node 1759 * may not have necessary privileges to delete this IP tunnel, but the 1760 * tunnel must always be implicitly deleted on last close. 1761 */ 1762 if ((err = iptun_delete(linkid, zone_kcred())) == 0) 1763 (void) dls_mgmt_destroy(linkid, B_FALSE); 1764 return (err); 1765 } 1766 1767 const char * 1768 dls_devnet_mac(dls_dl_handle_t ddh) 1769 { 1770 return (ddh->dd_mac); 1771 } 1772 1773 datalink_id_t 1774 dls_devnet_linkid(dls_dl_handle_t ddh) 1775 { 1776 return (ddh->dd_linkid); 1777 } 1778