ipfw3: 'or' supports more filters
[dragonfly.git] / sys / net / gif / if_gif.c
blobf9d0a10a99bad21bd24631ced9b4e3ed5b43921f
1 /*
2 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
3 * All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. Neither the name of the project nor the names of its contributors
14 * may be used to endorse or promote products derived from this software
15 * without specific prior written permission.
17 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 * SUCH DAMAGE.
29 * $FreeBSD: src/sys/net/if_gif.c,v 1.4.2.15 2002/11/08 16:57:13 ume Exp $
30 * $DragonFly: src/sys/net/gif/if_gif.c,v 1.21 2008/05/14 11:59:23 sephe Exp $
31 * $KAME: if_gif.c,v 1.87 2001/10/19 08:50:27 itojun Exp $
34 #include "opt_inet.h"
35 #include "opt_inet6.h"
37 #include <sys/param.h>
38 #include <sys/systm.h>
39 #include <sys/kernel.h>
40 #include <sys/bus.h>
41 #include <sys/malloc.h>
42 #include <sys/mbuf.h>
43 #include <sys/socket.h>
44 #include <sys/sockio.h>
45 #include <sys/errno.h>
46 #include <sys/time.h>
47 #include <sys/sysctl.h>
48 #include <sys/syslog.h>
49 #include <sys/protosw.h>
50 #include <sys/conf.h>
51 #include <sys/thread2.h>
53 #include <machine/cpu.h>
55 #include <net/if.h>
56 #include <net/if_types.h>
57 #include <net/ifq_var.h>
58 #include <net/netisr.h>
59 #include <net/route.h>
60 #include <net/bpf.h>
61 #include <net/if_clone.h>
63 #include <netinet/in.h>
64 #include <netinet/in_systm.h>
65 #include <netinet/ip.h>
66 #ifdef INET
67 #include <netinet/in_var.h>
68 #include <netinet/in_gif.h>
69 #include <netinet/ip_var.h>
70 #endif /* INET */
72 #ifdef INET6
73 #ifndef INET
74 #include <netinet/in.h>
75 #endif
76 #include <netinet6/in6_var.h>
77 #include <netinet/ip6.h>
78 #include <netinet6/ip6_var.h>
79 #include <netinet6/in6_gif.h>
80 #include <netinet6/ip6protosw.h>
81 #endif /* INET6 */
83 #include <netinet/ip_encap.h>
84 #include "if_gif.h"
86 #include <net/net_osdep.h>
88 #define GIFNAME "gif"
90 static MALLOC_DEFINE(M_GIF, "gif", "Generic Tunnel Interface");
91 LIST_HEAD(, gif_softc) gif_softc_list;
93 int gif_clone_create (struct if_clone *, int, caddr_t);
94 int gif_clone_destroy (struct ifnet *);
96 struct if_clone gif_cloner = IF_CLONE_INITIALIZER("gif", gif_clone_create,
97 gif_clone_destroy, 0, IF_MAXUNIT);
99 static int gifmodevent (module_t, int, void *);
100 static void gif_clear_cache(struct gif_softc *sc);
102 SYSCTL_DECL(_net_link);
103 SYSCTL_NODE(_net_link, IFT_GIF, gif, CTLFLAG_RW, 0,
104 "Generic Tunnel Interface");
105 #ifndef MAX_GIF_NEST
107 * This macro controls the default upper limitation on nesting of gif tunnels.
108 * Since, setting a large value to this macro with a careless configuration
109 * may introduce system crash, we don't allow any nestings by default.
110 * If you need to configure nested gif tunnels, you can define this macro
111 * in your kernel configuration file. However, if you do so, please be
112 * careful to configure the tunnels so that it won't make a loop.
114 #define MAX_GIF_NEST 1
115 #endif
116 static int max_gif_nesting = MAX_GIF_NEST;
117 SYSCTL_INT(_net_link_gif, OID_AUTO, max_nesting, CTLFLAG_RW,
118 &max_gif_nesting, 0, "Max nested tunnels");
121 * By default, we disallow creation of multiple tunnels between the same
122 * pair of addresses. Some applications require this functionality so
123 * we allow control over this check here.
125 #ifdef XBONEHACK
126 static int parallel_tunnels = 1;
127 #else
128 static int parallel_tunnels = 0;
129 #endif
130 SYSCTL_INT(_net_link_gif, OID_AUTO, parallel_tunnels, CTLFLAG_RW,
131 &parallel_tunnels, 0, "Allow parallel tunnels?");
134 gif_clone_create(struct if_clone *ifc, int unit, caddr_t params)
136 struct gif_softc *sc;
138 sc = kmalloc (sizeof(struct gif_softc), M_GIF, M_WAITOK | M_ZERO);
140 sc->gif_if.if_softc = sc;
141 if_initname(&(sc->gif_if), GIFNAME, unit);
143 gifattach0(sc);
145 LIST_INSERT_HEAD(&gif_softc_list, sc, gif_list);
146 return (0);
149 void
150 gifattach0(struct gif_softc *sc)
153 sc->encap_cookie4 = sc->encap_cookie6 = NULL;
155 sc->gif_if.if_addrlen = 0;
156 sc->gif_if.if_mtu = GIF_MTU;
157 sc->gif_if.if_flags = IFF_POINTOPOINT | IFF_MULTICAST;
158 #if 0
159 /* turn off ingress filter */
160 sc->gif_if.if_flags |= IFF_LINK2;
161 #endif
162 sc->gif_if.if_ioctl = gif_ioctl;
163 sc->gif_if.if_output = gif_output;
164 sc->gif_if.if_type = IFT_GIF;
165 ifq_set_maxlen(&sc->gif_if.if_snd, IFQ_MAXLEN);
166 if_attach(&sc->gif_if, NULL);
167 bpfattach(&sc->gif_if, DLT_NULL, sizeof(u_int));
171 gif_clone_destroy(struct ifnet *ifp)
173 struct gif_softc *sc = ifp->if_softc;
174 int err;
176 gif_delete_tunnel(&sc->gif_if);
177 LIST_REMOVE(sc, gif_list);
178 #ifdef INET6
179 if (sc->encap_cookie6 != NULL) {
180 err = encap_detach(sc->encap_cookie6);
181 KASSERT(err == 0, ("Unexpected error detaching encap_cookie6"));
183 #endif
184 #ifdef INET
185 if (sc->encap_cookie4 != NULL) {
186 err = encap_detach(sc->encap_cookie4);
187 KASSERT(err == 0, ("Unexpected error detaching encap_cookie4"));
189 #endif
190 gif_clear_cache(sc);
192 bpfdetach(ifp);
193 if_detach(ifp);
195 kfree(sc, M_GIF);
197 return 0;
200 static void
201 gif_clear_cache(struct gif_softc *sc)
203 struct rtentry *rt;
204 int origcpu;
205 int n;
207 for (n = 0; n < ncpus; ++n) {
208 rt = sc->gif_ro[n].ro_rt;
210 * Routes need to be cleaned up in their CPU so migrate
211 * to it and return to the original CPU after completion.
213 origcpu = mycpuid;
214 if (rt && rt->rt_cpuid != mycpuid)
215 lwkt_migratecpu(rt->rt_cpuid);
216 else
217 origcpu = -1;
219 if (sc->gif_ro[n].ro_rt) {
220 RTFREE(sc->gif_ro[n].ro_rt);
221 sc->gif_ro[n].ro_rt = NULL;
223 #ifdef INET6
224 if (sc->gif_ro6[n].ro_rt) {
225 RTFREE(sc->gif_ro6[n].ro_rt);
226 sc->gif_ro6[n].ro_rt = NULL;
228 #endif
229 if (origcpu >= 0)
230 lwkt_migratecpu(origcpu);
234 static int
235 gifmodevent(module_t mod, int type, void *data)
238 switch (type) {
239 case MOD_LOAD:
240 LIST_INIT(&gif_softc_list);
241 if_clone_attach(&gif_cloner);
243 #ifdef INET6
244 ip6_gif_hlim = GIF_HLIM;
245 #endif
247 break;
248 case MOD_UNLOAD:
249 if_clone_detach(&gif_cloner);
251 while (!LIST_EMPTY(&gif_softc_list))
252 gif_clone_destroy(&LIST_FIRST(&gif_softc_list)->gif_if);
254 #ifdef INET6
255 ip6_gif_hlim = 0;
256 #endif
257 break;
259 return 0;
262 static moduledata_t gif_mod = {
263 "if_gif",
264 gifmodevent,
268 DECLARE_MODULE(if_gif, gif_mod, SI_SUB_PSEUDO, SI_ORDER_ANY);
271 gif_encapcheck(const struct mbuf *m, int off, int proto, void *arg)
273 struct ip ip;
274 struct gif_softc *sc;
276 sc = (struct gif_softc *)arg;
277 if (sc == NULL)
278 return 0;
280 if ((sc->gif_if.if_flags & IFF_UP) == 0)
281 return 0;
283 /* no physical address */
284 if (!sc->gif_psrc || !sc->gif_pdst)
285 return 0;
287 switch (proto) {
288 #ifdef INET
289 case IPPROTO_IPV4:
290 break;
291 #endif
292 #ifdef INET6
293 case IPPROTO_IPV6:
294 break;
295 #endif
296 default:
297 return 0;
300 /* Bail on short packets */
301 if (m->m_pkthdr.len < sizeof(ip))
302 return 0;
304 m_copydata(m, 0, sizeof(ip), (caddr_t)&ip);
306 switch (ip.ip_v) {
307 #ifdef INET
308 case 4:
309 if (sc->gif_psrc->sa_family != AF_INET ||
310 sc->gif_pdst->sa_family != AF_INET)
311 return 0;
312 return gif_encapcheck4(m, off, proto, arg);
313 #endif
314 #ifdef INET6
315 case 6:
316 if (m->m_pkthdr.len < sizeof(struct ip6_hdr))
317 return 0;
318 if (sc->gif_psrc->sa_family != AF_INET6 ||
319 sc->gif_pdst->sa_family != AF_INET6)
320 return 0;
321 return gif_encapcheck6(m, off, proto, arg);
322 #endif
323 default:
324 return 0;
329 * Parameters:
330 * rt: added in net2
332 static int
333 gif_output_serialized(struct ifnet *ifp, struct mbuf *m, struct sockaddr *dst,
334 struct rtentry *rt)
336 struct gif_softc *sc = (struct gif_softc*)ifp;
337 int error = 0;
338 static int called = 0; /* XXX: MUTEX */
341 * gif may cause infinite recursion calls when misconfigured.
342 * We'll prevent this by introducing upper limit.
343 * XXX: this mechanism may introduce another problem about
344 * mutual exclusion of the variable CALLED, especially if we
345 * use kernel thread.
347 if (++called > max_gif_nesting) {
348 log(LOG_NOTICE,
349 "gif_output: recursively called too many times(%d)\n",
350 called);
351 m_freem(m);
352 error = EIO; /* is there better errno? */
353 goto end;
356 m->m_flags &= ~(M_BCAST|M_MCAST);
357 if (!(ifp->if_flags & IFF_UP) ||
358 sc->gif_psrc == NULL || sc->gif_pdst == NULL) {
359 m_freem(m);
360 error = ENETDOWN;
361 goto end;
364 if (ifp->if_bpf) {
365 bpf_gettoken();
366 if (ifp->if_bpf) {
368 * We need to prepend the address family as
369 * a four byte field.
371 uint32_t af = dst->sa_family;
373 bpf_ptap(ifp->if_bpf, m, &af, sizeof(af));
375 bpf_reltoken();
377 IFNET_STAT_INC(ifp, opackets, 1);
378 IFNET_STAT_INC(ifp, obytes, m->m_pkthdr.len);
380 /* inner AF-specific encapsulation */
382 /* XXX should we check if our outer source is legal? */
384 /* dispatch to output logic based on outer AF */
385 switch (sc->gif_psrc->sa_family) {
386 #ifdef INET
387 case AF_INET:
388 error = in_gif_output(ifp, dst->sa_family, m);
389 break;
390 #endif
391 #ifdef INET6
392 case AF_INET6:
393 error = in6_gif_output(ifp, dst->sa_family, m);
394 break;
395 #endif
396 default:
397 m_freem(m);
398 error = ENETDOWN;
399 goto end;
402 end:
403 called = 0; /* reset recursion counter */
404 if (error)
405 IFNET_STAT_INC(ifp, oerrors, 1);
406 return error;
410 gif_output(struct ifnet *ifp, struct mbuf *m, struct sockaddr *dst,
411 struct rtentry *rt)
413 struct ifaltq_subque *ifsq = ifq_get_subq_default(&ifp->if_snd);
414 int error;
416 ifsq_serialize_hw(ifsq);
417 error = gif_output_serialized(ifp, m, dst, rt);
418 ifsq_deserialize_hw(ifsq);
419 return error;
422 void
423 gif_input(struct mbuf *m, int af, struct ifnet *ifp)
425 int isr;
427 if (ifp == NULL) {
428 /* just in case */
429 m_freem(m);
430 return;
433 m->m_pkthdr.rcvif = ifp;
435 if (ifp->if_bpf) {
436 bpf_gettoken();
437 if (ifp->if_bpf) {
439 * We need to prepend the address family as
440 * a four byte field.
442 uint32_t af1 = af;
444 bpf_ptap(ifp->if_bpf, m, &af1, sizeof(af1));
446 bpf_reltoken();
450 * Put the packet to the network layer input queue according to the
451 * specified address family.
452 * Note: older versions of gif_input directly called network layer
453 * input functions, e.g. ip6_input, here. We changed the policy to
454 * prevent too many recursive calls of such input functions, which
455 * might cause kernel panic. But the change may introduce another
456 * problem; if the input queue is full, packets are discarded.
457 * The kernel stack overflow really happened, and we believed
458 * queue-full rarely occurs, so we changed the policy.
460 switch (af) {
461 #ifdef INET
462 case AF_INET:
463 isr = NETISR_IP;
464 break;
465 #endif
466 #ifdef INET6
467 case AF_INET6:
468 isr = NETISR_IPV6;
469 break;
470 #endif
471 default:
472 m_freem(m);
473 return;
476 IFNET_STAT_INC(ifp, ipackets, 1);
477 IFNET_STAT_INC(ifp, ibytes, m->m_pkthdr.len);
478 m->m_flags &= ~M_HASH;
479 netisr_queue(isr, m);
481 return;
484 /* XXX how should we handle IPv6 scope on SIOC[GS]IFPHYADDR? */
486 gif_ioctl(struct ifnet *ifp, u_long cmd, caddr_t data, struct ucred *cr)
488 struct gif_softc *sc = (struct gif_softc*)ifp;
489 struct ifreq *ifr = (struct ifreq*)data;
490 int error = 0, size;
491 struct sockaddr *dst, *src;
492 #ifdef SIOCSIFMTU /* xxx */
493 u_long mtu;
494 #endif
496 switch (cmd) {
497 case SIOCSIFADDR:
498 ifp->if_flags |= IFF_UP;
499 break;
501 case SIOCSIFDSTADDR:
502 break;
504 case SIOCADDMULTI:
505 case SIOCDELMULTI:
506 break;
508 #ifdef SIOCSIFMTU /* xxx */
509 case SIOCGIFMTU:
510 break;
512 case SIOCSIFMTU:
513 mtu = ifr->ifr_mtu;
514 if (mtu < GIF_MTU_MIN || mtu > GIF_MTU_MAX)
515 return (EINVAL);
516 ifp->if_mtu = mtu;
517 break;
518 #endif /* SIOCSIFMTU */
520 #ifdef INET
521 case SIOCSIFPHYADDR:
522 #endif
523 #ifdef INET6
524 case SIOCSIFPHYADDR_IN6:
525 #endif /* INET6 */
526 case SIOCSLIFPHYADDR:
527 switch (cmd) {
528 #ifdef INET
529 case SIOCSIFPHYADDR:
530 src = (struct sockaddr *)
531 &(((struct in_aliasreq *)data)->ifra_addr);
532 dst = (struct sockaddr *)
533 &(((struct in_aliasreq *)data)->ifra_dstaddr);
534 break;
535 #endif
536 #ifdef INET6
537 case SIOCSIFPHYADDR_IN6:
538 src = (struct sockaddr *)
539 &(((struct in6_aliasreq *)data)->ifra_addr);
540 dst = (struct sockaddr *)
541 &(((struct in6_aliasreq *)data)->ifra_dstaddr);
542 break;
543 #endif
544 case SIOCSLIFPHYADDR:
545 src = (struct sockaddr *)
546 &(((struct if_laddrreq *)data)->addr);
547 dst = (struct sockaddr *)
548 &(((struct if_laddrreq *)data)->dstaddr);
549 break;
550 default:
551 return EINVAL;
554 /* sa_family must be equal */
555 if (src->sa_family != dst->sa_family)
556 return EINVAL;
558 /* validate sa_len */
559 switch (src->sa_family) {
560 #ifdef INET
561 case AF_INET:
562 if (src->sa_len != sizeof(struct sockaddr_in))
563 return EINVAL;
564 break;
565 #endif
566 #ifdef INET6
567 case AF_INET6:
568 if (src->sa_len != sizeof(struct sockaddr_in6))
569 return EINVAL;
570 break;
571 #endif
572 default:
573 return EAFNOSUPPORT;
575 switch (dst->sa_family) {
576 #ifdef INET
577 case AF_INET:
578 if (dst->sa_len != sizeof(struct sockaddr_in))
579 return EINVAL;
580 break;
581 #endif
582 #ifdef INET6
583 case AF_INET6:
584 if (dst->sa_len != sizeof(struct sockaddr_in6))
585 return EINVAL;
586 break;
587 #endif
588 default:
589 return EAFNOSUPPORT;
592 /* check sa_family looks sane for the cmd */
593 switch (cmd) {
594 case SIOCSIFPHYADDR:
595 if (src->sa_family == AF_INET)
596 break;
597 return EAFNOSUPPORT;
598 #ifdef INET6
599 case SIOCSIFPHYADDR_IN6:
600 if (src->sa_family == AF_INET6)
601 break;
602 return EAFNOSUPPORT;
603 #endif /* INET6 */
604 case SIOCSLIFPHYADDR:
605 /* checks done in the above */
606 break;
609 error = gif_set_tunnel(&sc->gif_if, src, dst);
610 break;
612 #ifdef SIOCDIFPHYADDR
613 case SIOCDIFPHYADDR:
614 gif_delete_tunnel(&sc->gif_if);
615 break;
616 #endif
618 case SIOCGIFPSRCADDR:
619 #ifdef INET6
620 case SIOCGIFPSRCADDR_IN6:
621 #endif /* INET6 */
622 if (sc->gif_psrc == NULL) {
623 error = EADDRNOTAVAIL;
624 goto bad;
626 src = sc->gif_psrc;
627 switch (cmd) {
628 #ifdef INET
629 case SIOCGIFPSRCADDR:
630 dst = &ifr->ifr_addr;
631 size = sizeof(ifr->ifr_addr);
632 break;
633 #endif /* INET */
634 #ifdef INET6
635 case SIOCGIFPSRCADDR_IN6:
636 dst = (struct sockaddr *)
637 &(((struct in6_ifreq *)data)->ifr_addr);
638 size = sizeof(((struct in6_ifreq *)data)->ifr_addr);
639 break;
640 #endif /* INET6 */
641 default:
642 error = EADDRNOTAVAIL;
643 goto bad;
645 if (src->sa_len > size)
646 return EINVAL;
647 bcopy((caddr_t)src, (caddr_t)dst, src->sa_len);
648 break;
650 case SIOCGIFPDSTADDR:
651 #ifdef INET6
652 case SIOCGIFPDSTADDR_IN6:
653 #endif /* INET6 */
654 if (sc->gif_pdst == NULL) {
655 error = EADDRNOTAVAIL;
656 goto bad;
658 src = sc->gif_pdst;
659 switch (cmd) {
660 #ifdef INET
661 case SIOCGIFPDSTADDR:
662 dst = &ifr->ifr_addr;
663 size = sizeof(ifr->ifr_addr);
664 break;
665 #endif /* INET */
666 #ifdef INET6
667 case SIOCGIFPDSTADDR_IN6:
668 dst = (struct sockaddr *)
669 &(((struct in6_ifreq *)data)->ifr_addr);
670 size = sizeof(((struct in6_ifreq *)data)->ifr_addr);
671 break;
672 #endif /* INET6 */
673 default:
674 error = EADDRNOTAVAIL;
675 goto bad;
677 if (src->sa_len > size)
678 return EINVAL;
679 bcopy((caddr_t)src, (caddr_t)dst, src->sa_len);
680 break;
682 case SIOCGLIFPHYADDR:
683 if (sc->gif_psrc == NULL || sc->gif_pdst == NULL) {
684 error = EADDRNOTAVAIL;
685 goto bad;
688 /* copy src */
689 src = sc->gif_psrc;
690 dst = (struct sockaddr *)
691 &(((struct if_laddrreq *)data)->addr);
692 size = sizeof(((struct if_laddrreq *)data)->addr);
693 if (src->sa_len > size)
694 return EINVAL;
695 bcopy((caddr_t)src, (caddr_t)dst, src->sa_len);
697 /* copy dst */
698 src = sc->gif_pdst;
699 dst = (struct sockaddr *)
700 &(((struct if_laddrreq *)data)->dstaddr);
701 size = sizeof(((struct if_laddrreq *)data)->dstaddr);
702 if (src->sa_len > size)
703 return EINVAL;
704 bcopy((caddr_t)src, (caddr_t)dst, src->sa_len);
705 break;
707 case SIOCSIFFLAGS:
708 /* if_ioctl() takes care of it */
709 break;
711 default:
712 error = EINVAL;
713 break;
715 bad:
716 return error;
720 gif_set_tunnel(struct ifnet *ifp, struct sockaddr *src, struct sockaddr *dst)
722 struct gif_softc *sc = (struct gif_softc *)ifp;
723 struct gif_softc *sc2;
724 struct sockaddr *osrc, *odst, *sa;
725 int error = 0;
727 crit_enter();
729 LIST_FOREACH(sc2, &gif_softc_list, gif_list) {
730 if (sc2 == sc)
731 continue;
732 if (!sc2->gif_pdst || !sc2->gif_psrc)
733 continue;
734 if (sc2->gif_pdst->sa_family != dst->sa_family ||
735 sc2->gif_pdst->sa_len != dst->sa_len ||
736 sc2->gif_psrc->sa_family != src->sa_family ||
737 sc2->gif_psrc->sa_len != src->sa_len)
738 continue;
741 * Disallow parallel tunnels unless instructed
742 * otherwise.
744 if (!parallel_tunnels &&
745 bcmp(sc2->gif_pdst, dst, dst->sa_len) == 0 &&
746 bcmp(sc2->gif_psrc, src, src->sa_len) == 0) {
747 error = EADDRNOTAVAIL;
748 goto bad;
751 /* XXX both end must be valid? (I mean, not 0.0.0.0) */
754 /* XXX we can detach from both, but be polite just in case */
755 if (sc->gif_psrc) {
756 switch (sc->gif_psrc->sa_family) {
757 #ifdef INET
758 case AF_INET:
759 in_gif_detach(sc);
760 break;
761 #endif
762 #ifdef INET6
763 case AF_INET6:
764 in6_gif_detach(sc);
765 break;
766 #endif
768 gif_clear_cache(sc);
771 osrc = sc->gif_psrc;
772 sa = (struct sockaddr *)kmalloc(src->sa_len, M_IFADDR, M_WAITOK);
773 bcopy((caddr_t)src, (caddr_t)sa, src->sa_len);
774 sc->gif_psrc = sa;
776 odst = sc->gif_pdst;
777 sa = (struct sockaddr *)kmalloc(dst->sa_len, M_IFADDR, M_WAITOK);
778 bcopy((caddr_t)dst, (caddr_t)sa, dst->sa_len);
779 sc->gif_pdst = sa;
781 switch (sc->gif_psrc->sa_family) {
782 #ifdef INET
783 case AF_INET:
784 error = in_gif_attach(sc);
785 break;
786 #endif
787 #ifdef INET6
788 case AF_INET6:
789 error = in6_gif_attach(sc);
790 break;
791 #endif
793 if (error) {
794 /* rollback */
795 kfree((caddr_t)sc->gif_psrc, M_IFADDR);
796 kfree((caddr_t)sc->gif_pdst, M_IFADDR);
797 sc->gif_psrc = osrc;
798 sc->gif_pdst = odst;
799 goto bad;
802 if (osrc)
803 kfree((caddr_t)osrc, M_IFADDR);
804 if (odst)
805 kfree((caddr_t)odst, M_IFADDR);
807 if (sc->gif_psrc && sc->gif_pdst)
808 ifp->if_flags |= IFF_RUNNING;
809 else
810 ifp->if_flags &= ~IFF_RUNNING;
811 crit_exit();
813 return 0;
815 bad:
816 if (sc->gif_psrc && sc->gif_pdst)
817 ifp->if_flags |= IFF_RUNNING;
818 else
819 ifp->if_flags &= ~IFF_RUNNING;
820 crit_exit();
822 return error;
825 void
826 gif_delete_tunnel(struct ifnet *ifp)
828 struct gif_softc *sc = (struct gif_softc *)ifp;
830 crit_enter();
832 if (sc->gif_psrc) {
833 kfree((caddr_t)sc->gif_psrc, M_IFADDR);
834 sc->gif_psrc = NULL;
836 if (sc->gif_pdst) {
837 kfree((caddr_t)sc->gif_pdst, M_IFADDR);
838 sc->gif_pdst = NULL;
840 /* it is safe to detach from both */
841 #ifdef INET
842 in_gif_detach(sc);
843 #endif
844 #ifdef INET6
845 in6_gif_detach(sc);
846 #endif
847 gif_clear_cache(sc);
849 if (sc->gif_psrc && sc->gif_pdst)
850 ifp->if_flags |= IFF_RUNNING;
851 else
852 ifp->if_flags &= ~IFF_RUNNING;
853 crit_exit();