xref: /titanic_50/usr/src/uts/common/io/neti_impl.c (revision 174bc6499d233e329ecd3d98a880a7b07df16bfa)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 #include <sys/param.h>
27 #include <sys/atomic.h>
28 #include <sys/kmem.h>
29 #include <sys/rwlock.h>
30 #include <sys/errno.h>
31 #include <sys/queue.h>
32 #include <inet/common.h>
33 #include <inet/led.h>
34 #include <inet/ip.h>
35 #include <sys/neti.h>
36 #include <sys/zone.h>
37 
38 static net_handle_t net_find(const char *protocol, neti_stack_t *ns);
39 
40 static net_handle_t
41 net_find(const char *protocol, neti_stack_t *nts)
42 {
43 	struct net_data *n;
44 
45 	ASSERT(protocol != NULL);
46 	ASSERT(nts != NULL);
47 
48 	LIST_FOREACH(n, &nts->nts_netd_head, netd_list) {
49 		ASSERT(n->netd_info.netp_name != NULL);
50 		/*
51 		 * If they're trying to find a protocol that is being
52 		 * shutdown, just ignore it..
53 		 */
54 		if (n->netd_condemned != 0)
55 			continue;
56 		if (strcmp(n->netd_info.netp_name, protocol) == 0) {
57 			break;
58 		}
59 	}
60 
61 	return (n);
62 }
63 
64 net_handle_t
65 net_protocol_register(netid_t id, const net_protocol_t *info)
66 {
67 	struct net_data *n, *new;
68 	neti_stack_t *nts;
69 
70 	ASSERT(info != NULL);
71 
72 	nts = net_getnetistackbyid(id);
73 	if (nts == NULL)
74 		return (NULL);
75 
76 	new = kmem_alloc(sizeof (*new), KM_SLEEP);
77 	new->netd_refcnt = 1;
78 	new->netd_hooks = NULL;
79 	new->netd_info = *info;
80 	new->netd_stack = nts;
81 	new->netd_condemned = 0;
82 
83 	mutex_enter(&nts->nts_lock);
84 	n = net_find(info->netp_name, nts);
85 	if (n != NULL) {
86 		mutex_exit(&nts->nts_lock);
87 		kmem_free(new, sizeof (*new));
88 		return (NULL);
89 	}
90 
91 	if (LIST_EMPTY(&nts->nts_netd_head)) {
92 		LIST_INSERT_HEAD(&nts->nts_netd_head, new, netd_list);
93 	} else {
94 		LIST_INSERT_AFTER(LIST_FIRST(&nts->nts_netd_head),
95 		    new, netd_list);
96 	}
97 	mutex_exit(&nts->nts_lock);
98 
99 	return (new);
100 }
101 
102 int
103 net_protocol_unregister(net_handle_t info)
104 {
105 	neti_stack_t *nts;
106 
107 	ASSERT(info != NULL);
108 
109 	nts = info->netd_stack;
110 	ASSERT(nts != NULL);
111 
112 	mutex_enter(&nts->nts_lock);
113 	LIST_REMOVE(info, netd_list);
114 	info->netd_stack = NULL;
115 	mutex_exit(&nts->nts_lock);
116 
117 	(void) net_protocol_release(info);
118 
119 	return (0);
120 }
121 
122 net_handle_t
123 net_protocol_lookup(netid_t netid, const char *protocol)
124 {
125 	neti_stack_t *nts;
126 	net_handle_t nd;
127 
128 	ASSERT(protocol != NULL);
129 
130 	nts = net_getnetistackbyid(netid);
131 	if (nts == NULL)
132 		return (NULL);
133 
134 	mutex_enter(&nts->nts_lock);
135 	nd = net_find(protocol, nts);
136 	if (nd != NULL)
137 		atomic_inc_32((uint_t *)&nd->netd_refcnt);
138 	mutex_exit(&nts->nts_lock);
139 	return (nd);
140 }
141 
142 /*
143  * Note: the man page specifies "returns -1 if the value passed in is unknown
144  * to this framework".  We are not doing a lookup in this function, just a
145  * simply add to the netd_refcnt of the net_handle_t passed in, so -1 is never a
146  * return value.
147  */
148 int
149 net_protocol_release(net_handle_t info)
150 {
151 
152 	ASSERT(info->netd_refcnt > 0);
153 	/*
154 	 * Is this safe? No hold on nts_lock? Consider that if the caller
155 	 * of net_protocol_release() is going to free this structure then
156 	 * it is now the only owner (refcnt==1) and it will have been
157 	 * removed from the nts_netd_head list on the neti_stack_t from a
158 	 * call to net_protocol_unregister already, so it is thus an orphan.
159 	 */
160 	if (atomic_dec_32_nv((uint_t *)&info->netd_refcnt) == 0) {
161 		ASSERT(info->netd_hooks == NULL);
162 		ASSERT(info->netd_stack == NULL);
163 		kmem_free(info, sizeof (struct net_data));
164 	}
165 
166 	return (0);
167 }
168 
169 net_handle_t
170 net_protocol_walk(netid_t netid, net_handle_t info)
171 {
172 	struct net_data *n = NULL;
173 	boolean_t found = B_FALSE;
174 	neti_stack_t *nts;
175 
176 	nts = net_getnetistackbyid(netid);
177 	ASSERT(nts != NULL);
178 
179 	if (info == NULL)
180 		found = B_TRUE;
181 
182 	mutex_enter(&nts->nts_lock);
183 	LIST_FOREACH(n, &nts->nts_netd_head, netd_list) {
184 		if (found) {
185 			/*
186 			 * We are only interested in finding protocols that
187 			 * are not in some sort of shutdown state.  There is
188 			 * no need to check for netd_stack==NULL because
189 			 * that implies it is no longer on this list.
190 			 */
191 			if (n->netd_condemned == 0)
192 				continue;
193 			break;
194 		}
195 
196 		if (n == info)
197 			found = B_TRUE;
198 	}
199 
200 	if (info != NULL)
201 		(void) net_protocol_release(info);
202 
203 	if (n != NULL)
204 		atomic_inc_32((uint_t *)&n->netd_refcnt);
205 
206 	mutex_exit(&nts->nts_lock);
207 
208 	return (n);
209 }
210 
211 /*
212  * Public accessor functions
213  */
214 int
215 net_getifname(net_handle_t info, phy_if_t nic, char *buffer,
216     const size_t buflen)
217 {
218 
219 	ASSERT(info != NULL);
220 
221 	if (info->netd_condemned != 0 || info->netd_stack == NULL)
222 		return (-1);
223 
224 	return (info->netd_info.netp_getifname(info, nic, buffer, buflen));
225 }
226 
227 int
228 net_getmtu(net_handle_t info, phy_if_t nic, lif_if_t ifdata)
229 {
230 
231 	ASSERT(info != NULL);
232 
233 	if (info->netd_condemned != 0 || info->netd_stack == NULL)
234 		return (-1);
235 
236 	return (info->netd_info.netp_getmtu(info, nic, ifdata));
237 }
238 
239 int
240 net_getpmtuenabled(net_handle_t info)
241 {
242 
243 	ASSERT(info != NULL);
244 
245 	if (info->netd_condemned != 0 || info->netd_stack == NULL)
246 		return (-1);
247 
248 	return (info->netd_info.netp_getpmtuenabled(info));
249 }
250 
251 int
252 net_getlifaddr(net_handle_t info, phy_if_t nic, lif_if_t ifdata,
253     int nelem, net_ifaddr_t type[], void *storage)
254 {
255 
256 	ASSERT(info != NULL);
257 
258 	if (info->netd_condemned != 0 || info->netd_stack == NULL)
259 		return (-1);
260 
261 	return (info->netd_info.netp_getlifaddr(info, nic, ifdata,
262 	    nelem, type, storage));
263 }
264 
265 int
266 net_getlifzone(net_handle_t info, phy_if_t phy_ifdata, lif_if_t ifdata,
267     zoneid_t *zoneid)
268 {
269 	ASSERT(info != NULL);
270 
271 	if (info->netd_condemned != 0 || info->netd_stack == NULL)
272 		return (-1);
273 
274 	return (info->netd_info.neti_getlifzone(info, phy_ifdata, ifdata,
275 	    zoneid));
276 }
277 
278 int
279 net_getlifflags(net_handle_t info, phy_if_t phy_ifdata, lif_if_t ifdata,
280     uint64_t *flags)
281 {
282 	ASSERT(info != NULL);
283 
284 	if (info->netd_condemned != 0 || info->netd_stack == NULL)
285 		return (-1);
286 
287 	return (info->netd_info.neti_getlifflags(info, phy_ifdata, ifdata,
288 	    flags));
289 }
290 
291 phy_if_t
292 net_phygetnext(net_handle_t info, phy_if_t nic)
293 {
294 
295 	ASSERT(info != NULL);
296 
297 	if (info->netd_condemned != 0 || info->netd_stack == NULL)
298 		return ((phy_if_t)-1);
299 
300 	return (info->netd_info.netp_phygetnext(info, nic));
301 }
302 
303 phy_if_t
304 net_phylookup(net_handle_t info, const char *name)
305 {
306 
307 	ASSERT(info != NULL);
308 
309 	if (info->netd_condemned != 0 || info->netd_stack == NULL)
310 		return ((phy_if_t)-1);
311 
312 	return (info->netd_info.netp_phylookup(info, name));
313 }
314 
315 lif_if_t
316 net_lifgetnext(net_handle_t info, phy_if_t ifidx, lif_if_t ifdata)
317 {
318 
319 	ASSERT(info != NULL);
320 
321 	if (info->netd_condemned != 0 || info->netd_stack == NULL)
322 		return ((lif_if_t)-1);
323 
324 	return (info->netd_info.netp_lifgetnext(info, ifidx, ifdata));
325 }
326 
327 int
328 net_inject(net_handle_t info, inject_t style, net_inject_t *packet)
329 {
330 
331 	ASSERT(info != NULL);
332 
333 	if (info->netd_condemned != 0 || info->netd_stack == NULL)
334 		return (-1);
335 
336 	return (info->netd_info.netp_inject(info, style, packet));
337 }
338 
339 phy_if_t
340 net_routeto(net_handle_t info, struct sockaddr *address, struct sockaddr *next)
341 {
342 
343 	ASSERT(info != NULL);
344 
345 	if (info->netd_condemned != 0 || info->netd_stack == NULL)
346 		return ((phy_if_t)-1);
347 
348 	return (info->netd_info.netp_routeto(info, address, next));
349 }
350 
351 int
352 net_ispartialchecksum(net_handle_t info, mblk_t *mp)
353 {
354 
355 	ASSERT(info != NULL);
356 	ASSERT(mp != NULL);
357 
358 	if (info->netd_condemned != 0 || info->netd_stack == NULL)
359 		return (-1);
360 
361 	return (info->netd_info.netp_ispartialchecksum(info, mp));
362 }
363 
364 int
365 net_isvalidchecksum(net_handle_t info, mblk_t *mp)
366 {
367 
368 	ASSERT(info != NULL);
369 	ASSERT(mp != NULL);
370 
371 	if (info->netd_condemned != 0 || info->netd_stack == NULL)
372 		return (-1);
373 
374 	return (info->netd_info.netp_isvalidchecksum(info, mp));
375 }
376 
377 /*
378  * Hooks related functions
379  */
380 
381 /*
382  * Function:	net_family_register
383  * Returns:	int - 0 = Succ, Else = Fail
384  * Parameters:	info(I) - protocol
385  *		hf(I) - family pointer
386  *
387  * Call hook_family_add to register family
388  *
389  * There is no need to bump netd_refcnt in the two functions
390  * net_family_register and net_family_unregister because the caller of these
391  * two functions is assumed to "own" a reference on 'info' via an earlier
392  * call to net_protocol_register().  Thus the owner is expected to do a
393  * call to net_protocol_unregister() after having done a
394  * net_family_unregister() to make sure things are properly cleaned up.
395  * Passing a pointer to info->netd_hooks into hook_family_add is required
396  * so that this can be set before the notify functions are called. If this
397  * does not happen, the notify function may do something that seems fine,
398  * like add a notify function to the family but cause a panic because
399  * netd_hooks is NULL when we get to hook_family_notify_register.
400  */
401 int
402 net_family_register(net_handle_t info, hook_family_t *hf)
403 {
404 	netstack_t *ns;
405 
406 	ASSERT(info != NULL);
407 	ASSERT(hf != NULL);
408 
409 	if (info->netd_condemned != 0 || info->netd_stack == NULL)
410 		return (ESHUTDOWN);
411 
412 	if (info->netd_hooks != NULL)
413 		return (EEXIST);
414 
415 	ns = info->netd_stack->nts_netstack;
416 	ASSERT(ns != NULL);
417 	if (hook_family_add(hf, ns->netstack_hook,
418 	    (void **)&info->netd_hooks) == NULL)
419 		return (EEXIST);
420 
421 	return (0);
422 }
423 
424 /*
425  * Function:	net_family_unregister
426  * Returns:	int - transparent value, explained by caller
427  * Parameters:	info(I) - protocol
428  *		hf(I) - family pointer
429  *
430  * Call hook_family_remove to unregister family
431  */
432 int
433 net_family_unregister(net_handle_t info, hook_family_t *hf)
434 {
435 	int ret;
436 
437 	ASSERT(info != NULL);
438 	ASSERT(hf != NULL);
439 
440 	if (info->netd_hooks == NULL)
441 		return (ENXIO);
442 
443 	if (strcmp(info->netd_hooks->hfi_family.hf_name,
444 	    hf->hf_name) != 0)
445 		return (EINVAL);
446 
447 	ret = hook_family_remove(info->netd_hooks);
448 	if (ret == 0)
449 		info->netd_hooks = NULL;
450 
451 	return (ret);
452 }
453 
454 int
455 net_family_shutdown(net_handle_t info, hook_family_t *hf)
456 {
457 
458 	ASSERT(info != NULL);
459 	ASSERT(hf != NULL);
460 
461 	if (info->netd_hooks == NULL)
462 		return (ENXIO);
463 
464 	if (strcmp(info->netd_hooks->hfi_family.hf_name,
465 	    hf->hf_name) != 0)
466 		return (EINVAL);
467 
468 	return (hook_family_shutdown(info->netd_hooks));
469 }
470 
471 /*
472  * Function:	net_event_register
473  * Returns:	internal event pointer - NULL = Fail
474  * Parameters:	info(I) - protocol
475  *		he(I) - event pointer
476  *
477  * Call hook_event_add to register event on specific family
478  * 	Internal event pointer is returned so caller can get
479  * 	handle to run hooks
480  */
481 hook_event_token_t
482 net_event_register(net_handle_t info, hook_event_t *he)
483 {
484 	hook_event_int_t *hei;
485 
486 	ASSERT(info != NULL);
487 	ASSERT(he != NULL);
488 
489 	if (info->netd_hooks == NULL || info->netd_condemned != 0 ||
490 	    info->netd_stack == NULL)
491 		return (NULL);
492 
493 	hei = hook_event_add(info->netd_hooks, he);
494 	return ((hook_event_token_t)hei);
495 }
496 
497 /*
498  * Function:	net_event_unregister
499  * Returns:	int - transparent value, explained by caller
500  * Parameters:	info(I) - protocol
501  *		he(I) - event pointer
502  *
503  * Call hook_event_remove to unregister event on specific family
504  */
505 int
506 net_event_unregister(net_handle_t info, hook_event_t *he)
507 {
508 
509 	ASSERT(info != NULL);
510 	ASSERT(he != NULL);
511 
512 	if (info->netd_hooks == NULL)
513 		return (ENXIO);
514 
515 	return (hook_event_remove(info->netd_hooks, he));
516 }
517 
518 int
519 net_event_shutdown(net_handle_t info, hook_event_t *he)
520 {
521 
522 	ASSERT(info != NULL);
523 	ASSERT(he != NULL);
524 
525 	if (info->netd_hooks == NULL)
526 		return (ENXIO);
527 
528 	return (hook_event_shutdown(info->netd_hooks, he));
529 }
530 
531 /*
532  * Function:	net_hook_register
533  * Returns:	int - transparent value, explained by caller
534  * Parameters:	info(I) - protocol
535  *		event(I) - event name
536  *		h(I) - hook pointer
537  *
538  * Call hook_register to add hook on specific family/event
539  */
540 int
541 net_hook_register(net_handle_t info, char *event, hook_t *h)
542 {
543 
544 	ASSERT(info != NULL);
545 	ASSERT(event != NULL);
546 	ASSERT(h != NULL);
547 
548 	if (info->netd_condemned != 0 || info->netd_stack == NULL)
549 		return (ESHUTDOWN);
550 
551 	if (info->netd_hooks == NULL)
552 		return (ENXIO);
553 
554 	return (hook_register(info->netd_hooks, event, h));
555 }
556 
557 /*
558  * Function:	net_hook_unregister
559  * Returns:	int - transparent value, explained by caller
560  * Parameters:	info(I) - protocol
561  *		event(I) - event name
562  *		h(I) - hook pointer
563  *
564  * Call hook_unregister to remove hook on specific family/event
565  */
566 int
567 net_hook_unregister(net_handle_t info, char *event, hook_t *h)
568 {
569 
570 	ASSERT(info != NULL);
571 	ASSERT(event != NULL);
572 	ASSERT(h != NULL);
573 
574 	if (info->netd_hooks == NULL)
575 		return (ENXIO);
576 
577 	return (hook_unregister(info->netd_hooks, event, h));
578 }
579 
580 netid_t
581 net_getnetid(net_handle_t netd)
582 {
583 
584 	if (netd->netd_stack == NULL)
585 		return (-1);
586 	return (netd->netd_stack->nts_id);
587 }
588 
589 net_inject_t *
590 net_inject_alloc(const int version)
591 {
592 	net_inject_t *ni;
593 
594 	ni = kmem_zalloc(sizeof (*ni), KM_NOSLEEP);
595 	if (ni == NULL)
596 		return (NULL);
597 
598 	ni->ni_version = version;
599 	return (ni);
600 }
601 
602 void
603 net_inject_free(net_inject_t *ni)
604 {
605 	kmem_free(ni, sizeof (*ni));
606 }
607 
608 kstat_t *
609 net_kstat_create(netid_t netid, char *module, int instance, char *name,
610     char *class, uchar_t type, ulong_t ndata, uchar_t ks_flag)
611 {
612 	netstackid_t stackid = net_getnetstackidbynetid(netid);
613 
614 	if (stackid == -1)
615 		return (NULL);
616 
617 	return (kstat_create_netstack(module, instance, name, class, type,
618 	    ndata, ks_flag, stackid));
619 }
620 
621 void
622 net_kstat_delete(netid_t netid, kstat_t *ks)
623 {
624 	netstackid_t stackid = net_getnetstackidbynetid(netid);
625 
626 	if (stackid != -1)
627 		kstat_delete_netstack(ks, stackid);
628 }
629 
630 int
631 net_event_notify_register(net_handle_t family, char *event,
632     hook_notify_fn_t callback, void *arg)
633 {
634 	int error;
635 
636 	if (family->netd_condemned != 0 || family->netd_stack == NULL)
637 		return (ESHUTDOWN);
638 
639 	error = hook_event_notify_register(family->netd_hooks, event,
640 	    callback, arg);
641 
642 	return (error);
643 }
644 
645 int
646 net_event_notify_unregister(net_handle_t family, char *event,
647     hook_notify_fn_t callback)
648 {
649 	int error;
650 
651 	error = hook_event_notify_unregister(family->netd_hooks, event,
652 	    callback);
653 
654 	return (error);
655 }
656 
657 int
658 net_protocol_notify_register(net_handle_t family, hook_notify_fn_t callback,
659     void *arg)
660 {
661 	int error;
662 
663 	if (family->netd_condemned != 0 || family->netd_stack == NULL)
664 		return (ESHUTDOWN);
665 
666 	error = hook_family_notify_register(family->netd_hooks, callback,
667 	    arg);
668 
669 	return (error);
670 }
671 
672 int
673 net_protocol_notify_unregister(net_handle_t family, hook_notify_fn_t callback)
674 {
675 	int error;
676 
677 	error = hook_family_notify_unregister(family->netd_hooks, callback);
678 
679 	return (error);
680 }
681