FreeBSD/Linux Kernel Cross Reference
sys/net/if_faith.c
1 /* $KAME: if_faith.c,v 1.23 2001/12/17 13:55:29 sumikawa Exp $ */
2
3 /*
4 * Copyright (c) 1982, 1986, 1993
5 * The Regents of the University of California. All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. All advertising materials mentioning features or use of this software
16 * must display the following acknowledgement:
17 * This product includes software developed by the University of
18 * California, Berkeley and its contributors.
19 * 4. Neither the name of the University nor the names of its contributors
20 * may be used to endorse or promote products derived from this software
21 * without specific prior written permission.
22 *
23 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * SUCH DAMAGE.
34 *
35 * $FreeBSD: releng/5.2/sys/net/if_faith.c 122922 2003-11-20 20:07:39Z andre $
36 */
37 /*
38 * derived from
39 * @(#)if_loop.c 8.1 (Berkeley) 6/10/93
40 * Id: if_loop.c,v 1.22 1996/06/19 16:24:10 wollman Exp
41 */
42
43 /*
44 * Loopback interface driver for protocol testing and timing.
45 */
46 #include "opt_inet.h"
47 #include "opt_inet6.h"
48
49 #include <sys/param.h>
50 #include <sys/systm.h>
51 #include <sys/kernel.h>
52 #include <sys/mbuf.h>
53 #include <sys/socket.h>
54 #include <sys/errno.h>
55 #include <sys/sockio.h>
56 #include <sys/time.h>
57 #include <sys/queue.h>
58 #include <sys/types.h>
59 #include <sys/malloc.h>
60
61 #include <net/if.h>
62 #include <net/if_types.h>
63 #include <net/netisr.h>
64 #include <net/route.h>
65 #include <net/bpf.h>
66
67 #ifdef INET
68 #include <netinet/in.h>
69 #include <netinet/in_systm.h>
70 #include <netinet/in_var.h>
71 #include <netinet/ip.h>
72 #endif
73
74 #ifdef INET6
75 #ifndef INET
76 #include <netinet/in.h>
77 #endif
78 #include <netinet6/in6_var.h>
79 #include <netinet/ip6.h>
80 #include <netinet6/ip6_var.h>
81 #endif
82
83 #include <net/net_osdep.h>
84
85 #define FAITHNAME "faith"
86
87 struct faith_softc {
88 struct ifnet sc_if; /* must be first */
89 LIST_ENTRY(faith_softc) sc_list;
90 };
91
92 static int faithioctl(struct ifnet *, u_long, caddr_t);
93 int faithoutput(struct ifnet *, struct mbuf *, struct sockaddr *,
94 struct rtentry *);
95 static void faithrtrequest(int, struct rtentry *, struct rt_addrinfo *);
96 #ifdef INET6
97 static int faithprefix(struct in6_addr *);
98 #endif
99
100 static int faithmodevent(module_t, int, void *);
101
102 static MALLOC_DEFINE(M_FAITH, FAITHNAME, "Firewall Assisted Tunnel Interface");
103 static LIST_HEAD(, faith_softc) faith_softc_list;
104
105 int faith_clone_create(struct if_clone *, int);
106 void faith_clone_destroy(struct ifnet *);
107
108 struct if_clone faith_cloner = IF_CLONE_INITIALIZER(FAITHNAME,
109 faith_clone_create, faith_clone_destroy, 0, IF_MAXUNIT);
110
111 #define FAITHMTU 1500
112
113 static int
114 faithmodevent(mod, type, data)
115 module_t mod;
116 int type;
117 void *data;
118 {
119
120 switch (type) {
121 case MOD_LOAD:
122 LIST_INIT(&faith_softc_list);
123 if_clone_attach(&faith_cloner);
124
125 #ifdef INET6
126 faithprefix_p = faithprefix;
127 #endif
128
129 break;
130 case MOD_UNLOAD:
131 #ifdef INET6
132 faithprefix_p = NULL;
133 #endif
134
135 if_clone_detach(&faith_cloner);
136
137 while (!LIST_EMPTY(&faith_softc_list))
138 faith_clone_destroy(
139 &LIST_FIRST(&faith_softc_list)->sc_if);
140
141 break;
142 }
143 return 0;
144 }
145
146 static moduledata_t faith_mod = {
147 "if_faith",
148 faithmodevent,
149 0
150 };
151
152 DECLARE_MODULE(if_faith, faith_mod, SI_SUB_PSEUDO, SI_ORDER_ANY);
153 MODULE_VERSION(if_faith, 1);
154
155 int
156 faith_clone_create(ifc, unit)
157 struct if_clone *ifc;
158 int unit;
159 {
160 struct faith_softc *sc;
161
162 sc = malloc(sizeof(struct faith_softc), M_FAITH, M_WAITOK);
163 bzero(sc, sizeof(struct faith_softc));
164
165 sc->sc_if.if_softc = sc;
166 if_initname(&sc->sc_if, ifc->ifc_name, unit);
167
168 sc->sc_if.if_mtu = FAITHMTU;
169 /* Change to BROADCAST experimentaly to announce its prefix. */
170 sc->sc_if.if_flags = /* IFF_LOOPBACK */ IFF_BROADCAST | IFF_MULTICAST;
171 sc->sc_if.if_ioctl = faithioctl;
172 sc->sc_if.if_output = faithoutput;
173 sc->sc_if.if_type = IFT_FAITH;
174 sc->sc_if.if_hdrlen = 0;
175 sc->sc_if.if_addrlen = 0;
176 sc->sc_if.if_snd.ifq_maxlen = ifqmaxlen;
177 if_attach(&sc->sc_if);
178 bpfattach(&sc->sc_if, DLT_NULL, sizeof(u_int));
179 LIST_INSERT_HEAD(&faith_softc_list, sc, sc_list);
180 return (0);
181 }
182
183 void
184 faith_clone_destroy(ifp)
185 struct ifnet *ifp;
186 {
187 struct faith_softc *sc = (void *) ifp;
188
189 LIST_REMOVE(sc, sc_list);
190 bpfdetach(ifp);
191 if_detach(ifp);
192
193 free(sc, M_FAITH);
194 }
195
196 int
197 faithoutput(ifp, m, dst, rt)
198 struct ifnet *ifp;
199 struct mbuf *m;
200 struct sockaddr *dst;
201 struct rtentry *rt;
202 {
203 int isr;
204
205 M_ASSERTPKTHDR(m);
206
207 /* BPF write needs to be handled specially */
208 if (dst->sa_family == AF_UNSPEC) {
209 dst->sa_family = *(mtod(m, int *));
210 m->m_len -= sizeof(int);
211 m->m_pkthdr.len -= sizeof(int);
212 m->m_data += sizeof(int);
213 }
214
215 if (ifp->if_bpf) {
216 /*
217 * We need to prepend the address family as
218 * a four byte field. Cons up a faith header
219 * to pacify bpf. This is safe because bpf
220 * will only read from the mbuf (i.e., it won't
221 * try to free it or keep a pointer a to it).
222 */
223 struct mbuf m0;
224 u_int32_t af = dst->sa_family;
225
226 m0.m_next = m;
227 m0.m_len = 4;
228 m0.m_data = (char *)⁡
229
230 BPF_MTAP(ifp, &m0);
231 }
232
233 if (rt && rt->rt_flags & (RTF_REJECT|RTF_BLACKHOLE)) {
234 m_freem(m);
235 return (rt->rt_flags & RTF_BLACKHOLE ? 0 :
236 rt->rt_flags & RTF_HOST ? EHOSTUNREACH : ENETUNREACH);
237 }
238 ifp->if_opackets++;
239 ifp->if_obytes += m->m_pkthdr.len;
240 switch (dst->sa_family) {
241 #ifdef INET
242 case AF_INET:
243 isr = NETISR_IP;
244 break;
245 #endif
246 #ifdef INET6
247 case AF_INET6:
248 isr = NETISR_IPV6;
249 break;
250 #endif
251 default:
252 m_freem(m);
253 return EAFNOSUPPORT;
254 }
255
256 /* XXX do we need more sanity checks? */
257
258 m->m_pkthdr.rcvif = ifp;
259 ifp->if_ipackets++;
260 ifp->if_ibytes += m->m_pkthdr.len;
261 netisr_dispatch(isr, m);
262 return (0);
263 }
264
265 /* ARGSUSED */
266 static void
267 faithrtrequest(cmd, rt, info)
268 int cmd;
269 struct rtentry *rt;
270 struct rt_addrinfo *info;
271 {
272 RT_LOCK_ASSERT(rt);
273 if (rt)
274 rt->rt_rmx.rmx_mtu = rt->rt_ifp->if_mtu;
275 }
276
277 /*
278 * Process an ioctl request.
279 */
280 /* ARGSUSED */
281 static int
282 faithioctl(ifp, cmd, data)
283 struct ifnet *ifp;
284 u_long cmd;
285 caddr_t data;
286 {
287 struct ifaddr *ifa;
288 struct ifreq *ifr = (struct ifreq *)data;
289 int error = 0;
290
291 switch (cmd) {
292
293 case SIOCSIFADDR:
294 ifp->if_flags |= IFF_UP | IFF_RUNNING;
295 ifa = (struct ifaddr *)data;
296 ifa->ifa_rtrequest = faithrtrequest;
297 /*
298 * Everything else is done at a higher level.
299 */
300 break;
301
302 case SIOCADDMULTI:
303 case SIOCDELMULTI:
304 if (ifr == 0) {
305 error = EAFNOSUPPORT; /* XXX */
306 break;
307 }
308 switch (ifr->ifr_addr.sa_family) {
309 #ifdef INET
310 case AF_INET:
311 break;
312 #endif
313 #ifdef INET6
314 case AF_INET6:
315 break;
316 #endif
317
318 default:
319 error = EAFNOSUPPORT;
320 break;
321 }
322 break;
323
324 #ifdef SIOCSIFMTU
325 case SIOCSIFMTU:
326 ifp->if_mtu = ifr->ifr_mtu;
327 break;
328 #endif
329
330 case SIOCSIFFLAGS:
331 break;
332
333 default:
334 error = EINVAL;
335 }
336 return (error);
337 }
338
339 #ifdef INET6
340 /*
341 * XXX could be slow
342 * XXX could be layer violation to call sys/net from sys/netinet6
343 */
344 static int
345 faithprefix(in6)
346 struct in6_addr *in6;
347 {
348 struct rtentry *rt;
349 struct sockaddr_in6 sin6;
350 int ret;
351
352 if (ip6_keepfaith == 0)
353 return 0;
354
355 bzero(&sin6, sizeof(sin6));
356 sin6.sin6_family = AF_INET6;
357 sin6.sin6_len = sizeof(struct sockaddr_in6);
358 sin6.sin6_addr = *in6;
359 rt = rtalloc1((struct sockaddr *)&sin6, 0, 0UL);
360 if (rt && rt->rt_ifp && rt->rt_ifp->if_type == IFT_FAITH &&
361 (rt->rt_ifp->if_flags & IFF_UP) != 0)
362 ret = 1;
363 else
364 ret = 0;
365 if (rt)
366 RTFREE_LOCKED(rt);
367 return ret;
368 }
369 #endif
Cache object: a64b49bc110f7f914253d59472fc2b03
|