FreeBSD/Linux Kernel Cross Reference
sys/net/if_faith.c
1 /* $NetBSD: if_faith.c,v 1.30 2004/12/04 18:31:43 peter Exp $ */
2 /* $KAME: if_faith.c,v 1.21 2001/02/20 07:59:26 itojun Exp $ */
3
4 /*
5 * Copyright (c) 1982, 1986, 1993
6 * The Regents of the University of California. All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of the University nor the names of its contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 * SUCH DAMAGE.
31 */
32 /*
33 * derived from
34 * @(#)if_loop.c 8.1 (Berkeley) 6/10/93
35 * Id: if_loop.c,v 1.22 1996/06/19 16:24:10 wollman Exp
36 */
37
38 /*
39 * Loopback interface driver for protocol testing and timing.
40 */
41
42 #include <sys/cdefs.h>
43 __KERNEL_RCSID(0, "$NetBSD: if_faith.c,v 1.30 2004/12/04 18:31:43 peter Exp $");
44
45 #include "opt_inet.h"
46
47 #include <sys/param.h>
48 #include <sys/systm.h>
49 #include <sys/kernel.h>
50 #include <sys/mbuf.h>
51 #include <sys/socket.h>
52 #include <sys/errno.h>
53 #include <sys/ioctl.h>
54 #include <sys/time.h>
55 #include <sys/queue.h>
56
57 #include <machine/cpu.h>
58
59 #include <net/if.h>
60 #include <net/if_types.h>
61 #include <net/netisr.h>
62 #include <net/route.h>
63 #include <net/bpf.h>
64 #include <net/if_faith.h>
65
66 #ifdef INET
67 #include <netinet/in.h>
68 #include <netinet/in_systm.h>
69 #include <netinet/in_var.h>
70 #include <netinet/ip.h>
71 #endif
72
73 #ifdef INET6
74 #ifndef INET
75 #include <netinet/in.h>
76 #endif
77 #include <netinet6/in6_var.h>
78 #include <netinet/ip6.h>
79 #include <netinet6/ip6_var.h>
80 #endif
81
82 #include "bpfilter.h"
83
84 #include <net/net_osdep.h>
85
86 struct faith_softc {
87 struct ifnet sc_if; /* must be first */
88 LIST_ENTRY(faith_softc) sc_list;
89 };
90
91 static int faithioctl __P((struct ifnet *, u_long, caddr_t));
92 int faithoutput __P((struct ifnet *, struct mbuf *, struct sockaddr *,
93 struct rtentry *));
94 static void faithrtrequest __P((int, struct rtentry *, struct rt_addrinfo *));
95
96 void faithattach __P((int));
97
98 LIST_HEAD(, faith_softc) faith_softc_list;
99
100 int faith_clone_create __P((struct if_clone *, int));
101 int faith_clone_destroy __P((struct ifnet *));
102
103 struct if_clone faith_cloner =
104 IF_CLONE_INITIALIZER("faith", faith_clone_create, faith_clone_destroy);
105
106 #define FAITHMTU 1500
107
108 /* ARGSUSED */
109 void
110 faithattach(count)
111 int count;
112 {
113
114 LIST_INIT(&faith_softc_list);
115 if_clone_attach(&faith_cloner);
116 }
117
118 int
119 faith_clone_create(ifc, unit)
120 struct if_clone *ifc;
121 int unit;
122 {
123 struct faith_softc *sc;
124
125 sc = malloc(sizeof(struct faith_softc), M_DEVBUF, M_WAITOK);
126 memset(sc, 0, sizeof(struct faith_softc));
127
128 snprintf(sc->sc_if.if_xname, sizeof(sc->sc_if.if_xname), "%s%d",
129 ifc->ifc_name, unit);
130
131 sc->sc_if.if_mtu = FAITHMTU;
132 /* Change to BROADCAST experimentaly to announce its prefix. */
133 sc->sc_if.if_flags = /* IFF_LOOPBACK */ IFF_BROADCAST | IFF_MULTICAST;
134 sc->sc_if.if_ioctl = faithioctl;
135 sc->sc_if.if_output = faithoutput;
136 sc->sc_if.if_type = IFT_FAITH;
137 sc->sc_if.if_hdrlen = 0;
138 sc->sc_if.if_addrlen = 0;
139 sc->sc_if.if_dlt = DLT_NULL;
140 if_attach(&sc->sc_if);
141 if_alloc_sadl(&sc->sc_if);
142 #if NBPFILTER > 0
143 bpfattach(&sc->sc_if, DLT_NULL, sizeof(u_int));
144 #endif
145 LIST_INSERT_HEAD(&faith_softc_list, sc, sc_list);
146 return (0);
147 }
148
149 int
150 faith_clone_destroy(ifp)
151 struct ifnet *ifp;
152 {
153 struct faith_softc *sc = (void *) ifp;
154
155 LIST_REMOVE(sc, sc_list);
156 #if NBPFILTER > 0
157 bpfdetach(ifp);
158 #endif
159 if_detach(ifp);
160 free(sc, M_DEVBUF);
161
162 return (0);
163 }
164
165 int
166 faithoutput(ifp, m, dst, rt)
167 struct ifnet *ifp;
168 struct mbuf *m;
169 struct sockaddr *dst;
170 struct rtentry *rt;
171 {
172 int s, isr;
173 struct ifqueue *ifq = 0;
174
175 if ((m->m_flags & M_PKTHDR) == 0)
176 panic("faithoutput no HDR");
177 #if NBPFILTER > 0
178 /* BPF write needs to be handled specially */
179 if (dst->sa_family == AF_UNSPEC) {
180 dst->sa_family = *(mtod(m, int *));
181 m->m_len -= sizeof(int);
182 m->m_pkthdr.len -= sizeof(int);
183 m->m_data += sizeof(int);
184 }
185
186 if (ifp->if_bpf)
187 bpf_mtap_af(ifp->if_bpf, dst->sa_family, m);
188 #endif
189
190 if (rt && rt->rt_flags & (RTF_REJECT|RTF_BLACKHOLE)) {
191 m_freem(m);
192 return (rt->rt_flags & RTF_BLACKHOLE ? 0 :
193 rt->rt_flags & RTF_HOST ? EHOSTUNREACH : ENETUNREACH);
194 }
195 ifp->if_opackets++;
196 ifp->if_obytes += m->m_pkthdr.len;
197 switch (dst->sa_family) {
198 #ifdef INET
199 case AF_INET:
200 ifq = &ipintrq;
201 isr = NETISR_IP;
202 break;
203 #endif
204 #ifdef INET6
205 case AF_INET6:
206 ifq = &ip6intrq;
207 isr = NETISR_IPV6;
208 break;
209 #endif
210 default:
211 m_freem(m);
212 return EAFNOSUPPORT;
213 }
214
215 /* XXX do we need more sanity checks? */
216
217 m->m_pkthdr.rcvif = ifp;
218 s = splnet();
219 if (IF_QFULL(ifq)) {
220 IF_DROP(ifq);
221 m_freem(m);
222 splx(s);
223 return (ENOBUFS);
224 }
225 IF_ENQUEUE(ifq, m);
226 schednetisr(isr);
227 ifp->if_ipackets++;
228 ifp->if_ibytes += m->m_pkthdr.len;
229 splx(s);
230 return (0);
231 }
232
233 /* ARGSUSED */
234 static void
235 faithrtrequest(cmd, rt, info)
236 int cmd;
237 struct rtentry *rt;
238 struct rt_addrinfo *info;
239 {
240 if (rt)
241 rt->rt_rmx.rmx_mtu = rt->rt_ifp->if_mtu; /* for ISO */
242 }
243
244 /*
245 * Process an ioctl request.
246 */
247 /* ARGSUSED */
248 static int
249 faithioctl(ifp, cmd, data)
250 struct ifnet *ifp;
251 u_long cmd;
252 caddr_t data;
253 {
254 struct ifaddr *ifa;
255 struct ifreq *ifr = (struct ifreq *)data;
256 int error = 0;
257
258 switch (cmd) {
259
260 case SIOCSIFADDR:
261 ifp->if_flags |= IFF_UP | IFF_RUNNING;
262 ifa = (struct ifaddr *)data;
263 ifa->ifa_rtrequest = faithrtrequest;
264 /*
265 * Everything else is done at a higher level.
266 */
267 break;
268
269 case SIOCADDMULTI:
270 case SIOCDELMULTI:
271 if (ifr == 0) {
272 error = EAFNOSUPPORT; /* XXX */
273 break;
274 }
275 switch (ifr->ifr_addr.sa_family) {
276 #ifdef INET
277 case AF_INET:
278 break;
279 #endif
280 #ifdef INET6
281 case AF_INET6:
282 break;
283 #endif
284
285 default:
286 error = EAFNOSUPPORT;
287 break;
288 }
289 break;
290
291 #ifdef SIOCSIFMTU
292 case SIOCSIFMTU:
293 ifp->if_mtu = ifr->ifr_mtu;
294 break;
295 #endif
296
297 case SIOCSIFFLAGS:
298 break;
299
300 default:
301 error = EINVAL;
302 }
303 return (error);
304 }
305
306 /*
307 * XXX could be slow
308 * XXX could be layer violation to call sys/net from sys/netinet6
309 */
310 int
311 faithprefix(in6)
312 struct in6_addr *in6;
313 {
314 struct rtentry *rt;
315 struct sockaddr_in6 sin6;
316 int ret;
317
318 if (ip6_keepfaith == 0)
319 return 0;
320
321 memset(&sin6, 0, sizeof(sin6));
322 sin6.sin6_family = AF_INET6;
323 sin6.sin6_len = sizeof(struct sockaddr_in6);
324 sin6.sin6_addr = *in6;
325 rt = rtalloc1((struct sockaddr *)&sin6, 0);
326 if (rt && rt->rt_ifp && rt->rt_ifp->if_type == IFT_FAITH &&
327 (rt->rt_ifp->if_flags & IFF_UP) != 0)
328 ret = 1;
329 else
330 ret = 0;
331 if (rt)
332 RTFREE(rt);
333 return ret;
334 }
Cache object: 9c68f7662c82603c1a5766b5cd081bde
|