The Design and Implementation of the FreeBSD Operating System, Second Edition
Now available: The Design and Implementation of the FreeBSD Operating System (Second Edition)


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]

FreeBSD/Linux Kernel Cross Reference
sys/net/if_faith.c

Version: -  FREEBSD  -  FREEBSD-13-STABLE  -  FREEBSD-13-0  -  FREEBSD-12-STABLE  -  FREEBSD-12-0  -  FREEBSD-11-STABLE  -  FREEBSD-11-0  -  FREEBSD-10-STABLE  -  FREEBSD-10-0  -  FREEBSD-9-STABLE  -  FREEBSD-9-0  -  FREEBSD-8-STABLE  -  FREEBSD-8-0  -  FREEBSD-7-STABLE  -  FREEBSD-7-0  -  FREEBSD-6-STABLE  -  FREEBSD-6-0  -  FREEBSD-5-STABLE  -  FREEBSD-5-0  -  FREEBSD-4-STABLE  -  FREEBSD-3-STABLE  -  FREEBSD22  -  l41  -  OPENBSD  -  linux-2.6  -  MK84  -  PLAN9  -  xnu-8792 
SearchContext: -  none  -  3  -  10 

    1 /*      $KAME: if_faith.c,v 1.23 2001/12/17 13:55:29 sumikawa Exp $     */
    2 
    3 /*
    4  * Copyright (c) 1982, 1986, 1993
    5  *      The Regents of the University of California.  All rights reserved.
    6  *
    7  * Redistribution and use in source and binary forms, with or without
    8  * modification, are permitted provided that the following conditions
    9  * are met:
   10  * 1. Redistributions of source code must retain the above copyright
   11  *    notice, this list of conditions and the following disclaimer.
   12  * 2. Redistributions in binary form must reproduce the above copyright
   13  *    notice, this list of conditions and the following disclaimer in the
   14  *    documentation and/or other materials provided with the distribution.
   15  * 3. All advertising materials mentioning features or use of this software
   16  *    must display the following acknowledgement:
   17  *      This product includes software developed by the University of
   18  *      California, Berkeley and its contributors.
   19  * 4. Neither the name of the University nor the names of its contributors
   20  *    may be used to endorse or promote products derived from this software
   21  *    without specific prior written permission.
   22  *
   23  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
   24  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
   25  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
   26  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
   27  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
   28  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
   29  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
   30  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
   31  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
   32  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
   33  * SUCH DAMAGE.
   34  *
   35  * $FreeBSD: releng/5.2/sys/net/if_faith.c 122922 2003-11-20 20:07:39Z andre $
   36  */
   37 /*
   38  * derived from
   39  *      @(#)if_loop.c   8.1 (Berkeley) 6/10/93
   40  * Id: if_loop.c,v 1.22 1996/06/19 16:24:10 wollman Exp
   41  */
   42 
   43 /*
   44  * Loopback interface driver for protocol testing and timing.
   45  */
   46 #include "opt_inet.h"
   47 #include "opt_inet6.h"
   48 
   49 #include <sys/param.h>
   50 #include <sys/systm.h>
   51 #include <sys/kernel.h>
   52 #include <sys/mbuf.h>
   53 #include <sys/socket.h>
   54 #include <sys/errno.h>
   55 #include <sys/sockio.h>
   56 #include <sys/time.h>
   57 #include <sys/queue.h>
   58 #include <sys/types.h>
   59 #include <sys/malloc.h>
   60 
   61 #include <net/if.h>
   62 #include <net/if_types.h>
   63 #include <net/netisr.h>
   64 #include <net/route.h>
   65 #include <net/bpf.h>
   66 
   67 #ifdef  INET
   68 #include <netinet/in.h>
   69 #include <netinet/in_systm.h>
   70 #include <netinet/in_var.h>
   71 #include <netinet/ip.h>
   72 #endif
   73 
   74 #ifdef INET6
   75 #ifndef INET
   76 #include <netinet/in.h>
   77 #endif
   78 #include <netinet6/in6_var.h>
   79 #include <netinet/ip6.h>
   80 #include <netinet6/ip6_var.h>
   81 #endif
   82 
   83 #include <net/net_osdep.h>
   84 
   85 #define FAITHNAME       "faith"
   86 
   87 struct faith_softc {
   88         struct ifnet sc_if;     /* must be first */
   89         LIST_ENTRY(faith_softc) sc_list;
   90 };
   91 
   92 static int faithioctl(struct ifnet *, u_long, caddr_t);
   93 int faithoutput(struct ifnet *, struct mbuf *, struct sockaddr *,
   94         struct rtentry *);
   95 static void faithrtrequest(int, struct rtentry *, struct rt_addrinfo *);
   96 #ifdef INET6
   97 static int faithprefix(struct in6_addr *);
   98 #endif
   99 
  100 static int faithmodevent(module_t, int, void *);
  101 
  102 static MALLOC_DEFINE(M_FAITH, FAITHNAME, "Firewall Assisted Tunnel Interface");
  103 static LIST_HEAD(, faith_softc) faith_softc_list;
  104 
  105 int     faith_clone_create(struct if_clone *, int);
  106 void    faith_clone_destroy(struct ifnet *);
  107 
  108 struct if_clone faith_cloner = IF_CLONE_INITIALIZER(FAITHNAME,
  109     faith_clone_create, faith_clone_destroy, 0, IF_MAXUNIT);
  110 
  111 #define FAITHMTU        1500
  112 
  113 static int
  114 faithmodevent(mod, type, data)
  115         module_t mod;
  116         int type;
  117         void *data;
  118 {
  119 
  120         switch (type) {
  121         case MOD_LOAD:
  122                 LIST_INIT(&faith_softc_list);
  123                 if_clone_attach(&faith_cloner);
  124 
  125 #ifdef INET6
  126                 faithprefix_p = faithprefix;
  127 #endif
  128 
  129                 break;
  130         case MOD_UNLOAD:
  131 #ifdef INET6
  132                 faithprefix_p = NULL;
  133 #endif
  134 
  135                 if_clone_detach(&faith_cloner);
  136 
  137                 while (!LIST_EMPTY(&faith_softc_list))
  138                         faith_clone_destroy(
  139                             &LIST_FIRST(&faith_softc_list)->sc_if);
  140 
  141                 break;
  142         }
  143         return 0;
  144 }
  145 
  146 static moduledata_t faith_mod = {
  147         "if_faith",
  148         faithmodevent,
  149         0
  150 };
  151 
  152 DECLARE_MODULE(if_faith, faith_mod, SI_SUB_PSEUDO, SI_ORDER_ANY);
  153 MODULE_VERSION(if_faith, 1);
  154 
  155 int
  156 faith_clone_create(ifc, unit)
  157         struct if_clone *ifc;
  158         int unit;
  159 {
  160         struct faith_softc *sc;
  161 
  162         sc = malloc(sizeof(struct faith_softc), M_FAITH, M_WAITOK);
  163         bzero(sc, sizeof(struct faith_softc));
  164 
  165         sc->sc_if.if_softc = sc;
  166         if_initname(&sc->sc_if, ifc->ifc_name, unit);
  167 
  168         sc->sc_if.if_mtu = FAITHMTU;
  169         /* Change to BROADCAST experimentaly to announce its prefix. */
  170         sc->sc_if.if_flags = /* IFF_LOOPBACK */ IFF_BROADCAST | IFF_MULTICAST;
  171         sc->sc_if.if_ioctl = faithioctl;
  172         sc->sc_if.if_output = faithoutput;
  173         sc->sc_if.if_type = IFT_FAITH;
  174         sc->sc_if.if_hdrlen = 0;
  175         sc->sc_if.if_addrlen = 0;
  176         sc->sc_if.if_snd.ifq_maxlen = ifqmaxlen;
  177         if_attach(&sc->sc_if);
  178         bpfattach(&sc->sc_if, DLT_NULL, sizeof(u_int));
  179         LIST_INSERT_HEAD(&faith_softc_list, sc, sc_list);
  180         return (0);
  181 }
  182 
  183 void
  184 faith_clone_destroy(ifp)
  185         struct ifnet *ifp;
  186 {
  187         struct faith_softc *sc = (void *) ifp;
  188 
  189         LIST_REMOVE(sc, sc_list);
  190         bpfdetach(ifp);
  191         if_detach(ifp);
  192 
  193         free(sc, M_FAITH);
  194 }
  195 
  196 int
  197 faithoutput(ifp, m, dst, rt)
  198         struct ifnet *ifp;
  199         struct mbuf *m;
  200         struct sockaddr *dst;
  201         struct rtentry *rt;
  202 {
  203         int isr;
  204 
  205         M_ASSERTPKTHDR(m);
  206 
  207         /* BPF write needs to be handled specially */
  208         if (dst->sa_family == AF_UNSPEC) {
  209                 dst->sa_family = *(mtod(m, int *));
  210                 m->m_len -= sizeof(int);
  211                 m->m_pkthdr.len -= sizeof(int);
  212                 m->m_data += sizeof(int);
  213         }
  214 
  215         if (ifp->if_bpf) {
  216                 /*
  217                  * We need to prepend the address family as
  218                  * a four byte field.  Cons up a faith header
  219                  * to pacify bpf.  This is safe because bpf
  220                  * will only read from the mbuf (i.e., it won't
  221                  * try to free it or keep a pointer a to it).
  222                  */
  223                 struct mbuf m0;
  224                 u_int32_t af = dst->sa_family;
  225 
  226                 m0.m_next = m;
  227                 m0.m_len = 4;
  228                 m0.m_data = (char *)&af;
  229 
  230                 BPF_MTAP(ifp, &m0);
  231         }
  232 
  233         if (rt && rt->rt_flags & (RTF_REJECT|RTF_BLACKHOLE)) {
  234                 m_freem(m);
  235                 return (rt->rt_flags & RTF_BLACKHOLE ? 0 :
  236                         rt->rt_flags & RTF_HOST ? EHOSTUNREACH : ENETUNREACH);
  237         }
  238         ifp->if_opackets++;
  239         ifp->if_obytes += m->m_pkthdr.len;
  240         switch (dst->sa_family) {
  241 #ifdef INET
  242         case AF_INET:
  243                 isr = NETISR_IP;
  244                 break;
  245 #endif
  246 #ifdef INET6
  247         case AF_INET6:
  248                 isr = NETISR_IPV6;
  249                 break;
  250 #endif
  251         default:
  252                 m_freem(m);
  253                 return EAFNOSUPPORT;
  254         }
  255 
  256         /* XXX do we need more sanity checks? */
  257 
  258         m->m_pkthdr.rcvif = ifp;
  259         ifp->if_ipackets++;
  260         ifp->if_ibytes += m->m_pkthdr.len;
  261         netisr_dispatch(isr, m);
  262         return (0);
  263 }
  264 
  265 /* ARGSUSED */
  266 static void
  267 faithrtrequest(cmd, rt, info)
  268         int cmd;
  269         struct rtentry *rt;
  270         struct rt_addrinfo *info;
  271 {
  272         RT_LOCK_ASSERT(rt);
  273         if (rt)
  274                 rt->rt_rmx.rmx_mtu = rt->rt_ifp->if_mtu;
  275 }
  276 
  277 /*
  278  * Process an ioctl request.
  279  */
  280 /* ARGSUSED */
  281 static int
  282 faithioctl(ifp, cmd, data)
  283         struct ifnet *ifp;
  284         u_long cmd;
  285         caddr_t data;
  286 {
  287         struct ifaddr *ifa;
  288         struct ifreq *ifr = (struct ifreq *)data;
  289         int error = 0;
  290 
  291         switch (cmd) {
  292 
  293         case SIOCSIFADDR:
  294                 ifp->if_flags |= IFF_UP | IFF_RUNNING;
  295                 ifa = (struct ifaddr *)data;
  296                 ifa->ifa_rtrequest = faithrtrequest;
  297                 /*
  298                  * Everything else is done at a higher level.
  299                  */
  300                 break;
  301 
  302         case SIOCADDMULTI:
  303         case SIOCDELMULTI:
  304                 if (ifr == 0) {
  305                         error = EAFNOSUPPORT;           /* XXX */
  306                         break;
  307                 }
  308                 switch (ifr->ifr_addr.sa_family) {
  309 #ifdef INET
  310                 case AF_INET:
  311                         break;
  312 #endif
  313 #ifdef INET6
  314                 case AF_INET6:
  315                         break;
  316 #endif
  317 
  318                 default:
  319                         error = EAFNOSUPPORT;
  320                         break;
  321                 }
  322                 break;
  323 
  324 #ifdef SIOCSIFMTU
  325         case SIOCSIFMTU:
  326                 ifp->if_mtu = ifr->ifr_mtu;
  327                 break;
  328 #endif
  329 
  330         case SIOCSIFFLAGS:
  331                 break;
  332 
  333         default:
  334                 error = EINVAL;
  335         }
  336         return (error);
  337 }
  338 
  339 #ifdef INET6
  340 /*
  341  * XXX could be slow
  342  * XXX could be layer violation to call sys/net from sys/netinet6
  343  */
  344 static int
  345 faithprefix(in6)
  346         struct in6_addr *in6;
  347 {
  348         struct rtentry *rt;
  349         struct sockaddr_in6 sin6;
  350         int ret;
  351 
  352         if (ip6_keepfaith == 0)
  353                 return 0;
  354 
  355         bzero(&sin6, sizeof(sin6));
  356         sin6.sin6_family = AF_INET6;
  357         sin6.sin6_len = sizeof(struct sockaddr_in6);
  358         sin6.sin6_addr = *in6;
  359         rt = rtalloc1((struct sockaddr *)&sin6, 0, 0UL);
  360         if (rt && rt->rt_ifp && rt->rt_ifp->if_type == IFT_FAITH &&
  361             (rt->rt_ifp->if_flags & IFF_UP) != 0)
  362                 ret = 1;
  363         else
  364                 ret = 0;
  365         if (rt)
  366                 RTFREE_LOCKED(rt);
  367         return ret;
  368 }
  369 #endif

Cache object: a64b49bc110f7f914253d59472fc2b03


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]


This page is part of the FreeBSD/Linux Linux Kernel Cross-Reference, and was automatically generated using a modified version of the LXR engine.