if_faith.c revision 123922
1/*	$KAME: if_faith.c,v 1.23 2001/12/17 13:55:29 sumikawa Exp $	*/
2
3/*
4 * Copyright (c) 1982, 1986, 1993
5 *	The Regents of the University of California.  All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 *    notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 *    notice, this list of conditions and the following disclaimer in the
14 *    documentation and/or other materials provided with the distribution.
15 * 3. All advertising materials mentioning features or use of this software
16 *    must display the following acknowledgement:
17 *	This product includes software developed by the University of
18 *	California, Berkeley and its contributors.
19 * 4. Neither the name of the University nor the names of its contributors
20 *    may be used to endorse or promote products derived from this software
21 *    without specific prior written permission.
22 *
23 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * SUCH DAMAGE.
34 *
35 * $FreeBSD: head/sys/net/if_faith.c 123922 2003-12-28 03:56:00Z sam $
36 */
37/*
38 * derived from
39 *	@(#)if_loop.c	8.1 (Berkeley) 6/10/93
40 * Id: if_loop.c,v 1.22 1996/06/19 16:24:10 wollman Exp
41 */
42
43/*
44 * Loopback interface driver for protocol testing and timing.
45 */
46#include "opt_inet.h"
47#include "opt_inet6.h"
48
49#include <sys/param.h>
50#include <sys/systm.h>
51#include <sys/kernel.h>
52#include <sys/mbuf.h>
53#include <sys/socket.h>
54#include <sys/errno.h>
55#include <sys/sockio.h>
56#include <sys/time.h>
57#include <sys/queue.h>
58#include <sys/types.h>
59#include <sys/malloc.h>
60
61#include <net/if.h>
62#include <net/if_types.h>
63#include <net/netisr.h>
64#include <net/route.h>
65#include <net/bpf.h>
66
67#ifdef	INET
68#include <netinet/in.h>
69#include <netinet/in_systm.h>
70#include <netinet/in_var.h>
71#include <netinet/ip.h>
72#endif
73
74#ifdef INET6
75#ifndef INET
76#include <netinet/in.h>
77#endif
78#include <netinet6/in6_var.h>
79#include <netinet/ip6.h>
80#include <netinet6/ip6_var.h>
81#endif
82
83#include <net/net_osdep.h>
84
85#define FAITHNAME	"faith"
86
87struct faith_softc {
88	struct ifnet sc_if;	/* must be first */
89	LIST_ENTRY(faith_softc) sc_list;
90};
91
92static int faithioctl(struct ifnet *, u_long, caddr_t);
93int faithoutput(struct ifnet *, struct mbuf *, struct sockaddr *,
94	struct rtentry *);
95static void faithrtrequest(int, struct rtentry *, struct rt_addrinfo *);
96#ifdef INET6
97static int faithprefix(struct in6_addr *);
98#endif
99
100static int faithmodevent(module_t, int, void *);
101
102static MALLOC_DEFINE(M_FAITH, FAITHNAME, "Firewall Assisted Tunnel Interface");
103static LIST_HEAD(, faith_softc) faith_softc_list;
104
105int	faith_clone_create(struct if_clone *, int);
106void	faith_clone_destroy(struct ifnet *);
107
108struct if_clone faith_cloner = IF_CLONE_INITIALIZER(FAITHNAME,
109    faith_clone_create, faith_clone_destroy, 0, IF_MAXUNIT);
110
111#define	FAITHMTU	1500
112
113static int
114faithmodevent(mod, type, data)
115	module_t mod;
116	int type;
117	void *data;
118{
119
120	switch (type) {
121	case MOD_LOAD:
122		LIST_INIT(&faith_softc_list);
123		if_clone_attach(&faith_cloner);
124
125#ifdef INET6
126		faithprefix_p = faithprefix;
127#endif
128
129		break;
130	case MOD_UNLOAD:
131#ifdef INET6
132		faithprefix_p = NULL;
133#endif
134
135		if_clone_detach(&faith_cloner);
136
137		while (!LIST_EMPTY(&faith_softc_list))
138			faith_clone_destroy(
139			    &LIST_FIRST(&faith_softc_list)->sc_if);
140
141		break;
142	}
143	return 0;
144}
145
146static moduledata_t faith_mod = {
147	"if_faith",
148	faithmodevent,
149	0
150};
151
152DECLARE_MODULE(if_faith, faith_mod, SI_SUB_PSEUDO, SI_ORDER_ANY);
153MODULE_VERSION(if_faith, 1);
154
155int
156faith_clone_create(ifc, unit)
157	struct if_clone *ifc;
158	int unit;
159{
160	struct faith_softc *sc;
161
162	sc = malloc(sizeof(struct faith_softc), M_FAITH, M_WAITOK);
163	bzero(sc, sizeof(struct faith_softc));
164
165	sc->sc_if.if_softc = sc;
166	if_initname(&sc->sc_if, ifc->ifc_name, unit);
167
168	sc->sc_if.if_mtu = FAITHMTU;
169	/* Change to BROADCAST experimentaly to announce its prefix. */
170	sc->sc_if.if_flags = /* IFF_LOOPBACK */ IFF_BROADCAST | IFF_MULTICAST;
171	sc->sc_if.if_ioctl = faithioctl;
172	sc->sc_if.if_output = faithoutput;
173	sc->sc_if.if_type = IFT_FAITH;
174	sc->sc_if.if_hdrlen = 0;
175	sc->sc_if.if_addrlen = 0;
176	sc->sc_if.if_snd.ifq_maxlen = ifqmaxlen;
177	if_attach(&sc->sc_if);
178	bpfattach(&sc->sc_if, DLT_NULL, sizeof(u_int));
179	LIST_INSERT_HEAD(&faith_softc_list, sc, sc_list);
180	return (0);
181}
182
183void
184faith_clone_destroy(ifp)
185	struct ifnet *ifp;
186{
187	struct faith_softc *sc = (void *) ifp;
188
189	LIST_REMOVE(sc, sc_list);
190	bpfdetach(ifp);
191	if_detach(ifp);
192
193	free(sc, M_FAITH);
194}
195
196int
197faithoutput(ifp, m, dst, rt)
198	struct ifnet *ifp;
199	struct mbuf *m;
200	struct sockaddr *dst;
201	struct rtentry *rt;
202{
203	int isr;
204
205	M_ASSERTPKTHDR(m);
206
207	/* BPF write needs to be handled specially */
208	if (dst->sa_family == AF_UNSPEC) {
209		dst->sa_family = *(mtod(m, int *));
210		m->m_len -= sizeof(int);
211		m->m_pkthdr.len -= sizeof(int);
212		m->m_data += sizeof(int);
213	}
214
215	if (ifp->if_bpf) {
216		u_int32_t af = dst->sa_family;
217		bpf_mtap2(ifp->if_bpf, &af, sizeof(af), m);
218	}
219
220	if (rt && rt->rt_flags & (RTF_REJECT|RTF_BLACKHOLE)) {
221		m_freem(m);
222		return (rt->rt_flags & RTF_BLACKHOLE ? 0 :
223		        rt->rt_flags & RTF_HOST ? EHOSTUNREACH : ENETUNREACH);
224	}
225	ifp->if_opackets++;
226	ifp->if_obytes += m->m_pkthdr.len;
227	switch (dst->sa_family) {
228#ifdef INET
229	case AF_INET:
230		isr = NETISR_IP;
231		break;
232#endif
233#ifdef INET6
234	case AF_INET6:
235		isr = NETISR_IPV6;
236		break;
237#endif
238	default:
239		m_freem(m);
240		return EAFNOSUPPORT;
241	}
242
243	/* XXX do we need more sanity checks? */
244
245	m->m_pkthdr.rcvif = ifp;
246	ifp->if_ipackets++;
247	ifp->if_ibytes += m->m_pkthdr.len;
248	netisr_dispatch(isr, m);
249	return (0);
250}
251
252/* ARGSUSED */
253static void
254faithrtrequest(cmd, rt, info)
255	int cmd;
256	struct rtentry *rt;
257	struct rt_addrinfo *info;
258{
259	RT_LOCK_ASSERT(rt);
260	if (rt)
261		rt->rt_rmx.rmx_mtu = rt->rt_ifp->if_mtu;
262}
263
264/*
265 * Process an ioctl request.
266 */
267/* ARGSUSED */
268static int
269faithioctl(ifp, cmd, data)
270	struct ifnet *ifp;
271	u_long cmd;
272	caddr_t data;
273{
274	struct ifaddr *ifa;
275	struct ifreq *ifr = (struct ifreq *)data;
276	int error = 0;
277
278	switch (cmd) {
279
280	case SIOCSIFADDR:
281		ifp->if_flags |= IFF_UP | IFF_RUNNING;
282		ifa = (struct ifaddr *)data;
283		ifa->ifa_rtrequest = faithrtrequest;
284		/*
285		 * Everything else is done at a higher level.
286		 */
287		break;
288
289	case SIOCADDMULTI:
290	case SIOCDELMULTI:
291		if (ifr == 0) {
292			error = EAFNOSUPPORT;		/* XXX */
293			break;
294		}
295		switch (ifr->ifr_addr.sa_family) {
296#ifdef INET
297		case AF_INET:
298			break;
299#endif
300#ifdef INET6
301		case AF_INET6:
302			break;
303#endif
304
305		default:
306			error = EAFNOSUPPORT;
307			break;
308		}
309		break;
310
311#ifdef SIOCSIFMTU
312	case SIOCSIFMTU:
313		ifp->if_mtu = ifr->ifr_mtu;
314		break;
315#endif
316
317	case SIOCSIFFLAGS:
318		break;
319
320	default:
321		error = EINVAL;
322	}
323	return (error);
324}
325
326#ifdef INET6
327/*
328 * XXX could be slow
329 * XXX could be layer violation to call sys/net from sys/netinet6
330 */
331static int
332faithprefix(in6)
333	struct in6_addr *in6;
334{
335	struct rtentry *rt;
336	struct sockaddr_in6 sin6;
337	int ret;
338
339	if (ip6_keepfaith == 0)
340		return 0;
341
342	bzero(&sin6, sizeof(sin6));
343	sin6.sin6_family = AF_INET6;
344	sin6.sin6_len = sizeof(struct sockaddr_in6);
345	sin6.sin6_addr = *in6;
346	rt = rtalloc1((struct sockaddr *)&sin6, 0, 0UL);
347	if (rt && rt->rt_ifp && rt->rt_ifp->if_type == IFT_FAITH &&
348	    (rt->rt_ifp->if_flags & IFF_UP) != 0)
349		ret = 1;
350	else
351		ret = 0;
352	if (rt)
353		RTFREE_LOCKED(rt);
354	return ret;
355}
356#endif
357