if_faith.c revision 123922
1/* $KAME: if_faith.c,v 1.23 2001/12/17 13:55:29 sumikawa Exp $ */ 2 3/* 4 * Copyright (c) 1982, 1986, 1993 5 * The Regents of the University of California. All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 3. All advertising materials mentioning features or use of this software 16 * must display the following acknowledgement: 17 * This product includes software developed by the University of 18 * California, Berkeley and its contributors. 19 * 4. Neither the name of the University nor the names of its contributors 20 * may be used to endorse or promote products derived from this software 21 * without specific prior written permission. 22 * 23 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 26 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33 * SUCH DAMAGE. 34 * 35 * $FreeBSD: head/sys/net/if_faith.c 123922 2003-12-28 03:56:00Z sam $ 36 */ 37/* 38 * derived from 39 * @(#)if_loop.c 8.1 (Berkeley) 6/10/93 40 * Id: if_loop.c,v 1.22 1996/06/19 16:24:10 wollman Exp 41 */ 42 43/* 44 * Loopback interface driver for protocol testing and timing. 45 */ 46#include "opt_inet.h" 47#include "opt_inet6.h" 48 49#include <sys/param.h> 50#include <sys/systm.h> 51#include <sys/kernel.h> 52#include <sys/mbuf.h> 53#include <sys/socket.h> 54#include <sys/errno.h> 55#include <sys/sockio.h> 56#include <sys/time.h> 57#include <sys/queue.h> 58#include <sys/types.h> 59#include <sys/malloc.h> 60 61#include <net/if.h> 62#include <net/if_types.h> 63#include <net/netisr.h> 64#include <net/route.h> 65#include <net/bpf.h> 66 67#ifdef INET 68#include <netinet/in.h> 69#include <netinet/in_systm.h> 70#include <netinet/in_var.h> 71#include <netinet/ip.h> 72#endif 73 74#ifdef INET6 75#ifndef INET 76#include <netinet/in.h> 77#endif 78#include <netinet6/in6_var.h> 79#include <netinet/ip6.h> 80#include <netinet6/ip6_var.h> 81#endif 82 83#include <net/net_osdep.h> 84 85#define FAITHNAME "faith" 86 87struct faith_softc { 88 struct ifnet sc_if; /* must be first */ 89 LIST_ENTRY(faith_softc) sc_list; 90}; 91 92static int faithioctl(struct ifnet *, u_long, caddr_t); 93int faithoutput(struct ifnet *, struct mbuf *, struct sockaddr *, 94 struct rtentry *); 95static void faithrtrequest(int, struct rtentry *, struct rt_addrinfo *); 96#ifdef INET6 97static int faithprefix(struct in6_addr *); 98#endif 99 100static int faithmodevent(module_t, int, void *); 101 102static MALLOC_DEFINE(M_FAITH, FAITHNAME, "Firewall Assisted Tunnel Interface"); 103static LIST_HEAD(, faith_softc) faith_softc_list; 104 105int faith_clone_create(struct if_clone *, int); 106void faith_clone_destroy(struct ifnet *); 107 108struct if_clone faith_cloner = IF_CLONE_INITIALIZER(FAITHNAME, 109 faith_clone_create, faith_clone_destroy, 0, IF_MAXUNIT); 110 111#define FAITHMTU 1500 112 113static int 114faithmodevent(mod, type, data) 115 module_t mod; 116 int type; 117 void *data; 118{ 119 120 switch (type) { 121 case MOD_LOAD: 122 LIST_INIT(&faith_softc_list); 123 if_clone_attach(&faith_cloner); 124 125#ifdef INET6 126 faithprefix_p = faithprefix; 127#endif 128 129 break; 130 case MOD_UNLOAD: 131#ifdef INET6 132 faithprefix_p = NULL; 133#endif 134 135 if_clone_detach(&faith_cloner); 136 137 while (!LIST_EMPTY(&faith_softc_list)) 138 faith_clone_destroy( 139 &LIST_FIRST(&faith_softc_list)->sc_if); 140 141 break; 142 } 143 return 0; 144} 145 146static moduledata_t faith_mod = { 147 "if_faith", 148 faithmodevent, 149 0 150}; 151 152DECLARE_MODULE(if_faith, faith_mod, SI_SUB_PSEUDO, SI_ORDER_ANY); 153MODULE_VERSION(if_faith, 1); 154 155int 156faith_clone_create(ifc, unit) 157 struct if_clone *ifc; 158 int unit; 159{ 160 struct faith_softc *sc; 161 162 sc = malloc(sizeof(struct faith_softc), M_FAITH, M_WAITOK); 163 bzero(sc, sizeof(struct faith_softc)); 164 165 sc->sc_if.if_softc = sc; 166 if_initname(&sc->sc_if, ifc->ifc_name, unit); 167 168 sc->sc_if.if_mtu = FAITHMTU; 169 /* Change to BROADCAST experimentaly to announce its prefix. */ 170 sc->sc_if.if_flags = /* IFF_LOOPBACK */ IFF_BROADCAST | IFF_MULTICAST; 171 sc->sc_if.if_ioctl = faithioctl; 172 sc->sc_if.if_output = faithoutput; 173 sc->sc_if.if_type = IFT_FAITH; 174 sc->sc_if.if_hdrlen = 0; 175 sc->sc_if.if_addrlen = 0; 176 sc->sc_if.if_snd.ifq_maxlen = ifqmaxlen; 177 if_attach(&sc->sc_if); 178 bpfattach(&sc->sc_if, DLT_NULL, sizeof(u_int)); 179 LIST_INSERT_HEAD(&faith_softc_list, sc, sc_list); 180 return (0); 181} 182 183void 184faith_clone_destroy(ifp) 185 struct ifnet *ifp; 186{ 187 struct faith_softc *sc = (void *) ifp; 188 189 LIST_REMOVE(sc, sc_list); 190 bpfdetach(ifp); 191 if_detach(ifp); 192 193 free(sc, M_FAITH); 194} 195 196int 197faithoutput(ifp, m, dst, rt) 198 struct ifnet *ifp; 199 struct mbuf *m; 200 struct sockaddr *dst; 201 struct rtentry *rt; 202{ 203 int isr; 204 205 M_ASSERTPKTHDR(m); 206 207 /* BPF write needs to be handled specially */ 208 if (dst->sa_family == AF_UNSPEC) { 209 dst->sa_family = *(mtod(m, int *)); 210 m->m_len -= sizeof(int); 211 m->m_pkthdr.len -= sizeof(int); 212 m->m_data += sizeof(int); 213 } 214 215 if (ifp->if_bpf) { 216 u_int32_t af = dst->sa_family; 217 bpf_mtap2(ifp->if_bpf, &af, sizeof(af), m); 218 } 219 220 if (rt && rt->rt_flags & (RTF_REJECT|RTF_BLACKHOLE)) { 221 m_freem(m); 222 return (rt->rt_flags & RTF_BLACKHOLE ? 0 : 223 rt->rt_flags & RTF_HOST ? EHOSTUNREACH : ENETUNREACH); 224 } 225 ifp->if_opackets++; 226 ifp->if_obytes += m->m_pkthdr.len; 227 switch (dst->sa_family) { 228#ifdef INET 229 case AF_INET: 230 isr = NETISR_IP; 231 break; 232#endif 233#ifdef INET6 234 case AF_INET6: 235 isr = NETISR_IPV6; 236 break; 237#endif 238 default: 239 m_freem(m); 240 return EAFNOSUPPORT; 241 } 242 243 /* XXX do we need more sanity checks? */ 244 245 m->m_pkthdr.rcvif = ifp; 246 ifp->if_ipackets++; 247 ifp->if_ibytes += m->m_pkthdr.len; 248 netisr_dispatch(isr, m); 249 return (0); 250} 251 252/* ARGSUSED */ 253static void 254faithrtrequest(cmd, rt, info) 255 int cmd; 256 struct rtentry *rt; 257 struct rt_addrinfo *info; 258{ 259 RT_LOCK_ASSERT(rt); 260 if (rt) 261 rt->rt_rmx.rmx_mtu = rt->rt_ifp->if_mtu; 262} 263 264/* 265 * Process an ioctl request. 266 */ 267/* ARGSUSED */ 268static int 269faithioctl(ifp, cmd, data) 270 struct ifnet *ifp; 271 u_long cmd; 272 caddr_t data; 273{ 274 struct ifaddr *ifa; 275 struct ifreq *ifr = (struct ifreq *)data; 276 int error = 0; 277 278 switch (cmd) { 279 280 case SIOCSIFADDR: 281 ifp->if_flags |= IFF_UP | IFF_RUNNING; 282 ifa = (struct ifaddr *)data; 283 ifa->ifa_rtrequest = faithrtrequest; 284 /* 285 * Everything else is done at a higher level. 286 */ 287 break; 288 289 case SIOCADDMULTI: 290 case SIOCDELMULTI: 291 if (ifr == 0) { 292 error = EAFNOSUPPORT; /* XXX */ 293 break; 294 } 295 switch (ifr->ifr_addr.sa_family) { 296#ifdef INET 297 case AF_INET: 298 break; 299#endif 300#ifdef INET6 301 case AF_INET6: 302 break; 303#endif 304 305 default: 306 error = EAFNOSUPPORT; 307 break; 308 } 309 break; 310 311#ifdef SIOCSIFMTU 312 case SIOCSIFMTU: 313 ifp->if_mtu = ifr->ifr_mtu; 314 break; 315#endif 316 317 case SIOCSIFFLAGS: 318 break; 319 320 default: 321 error = EINVAL; 322 } 323 return (error); 324} 325 326#ifdef INET6 327/* 328 * XXX could be slow 329 * XXX could be layer violation to call sys/net from sys/netinet6 330 */ 331static int 332faithprefix(in6) 333 struct in6_addr *in6; 334{ 335 struct rtentry *rt; 336 struct sockaddr_in6 sin6; 337 int ret; 338 339 if (ip6_keepfaith == 0) 340 return 0; 341 342 bzero(&sin6, sizeof(sin6)); 343 sin6.sin6_family = AF_INET6; 344 sin6.sin6_len = sizeof(struct sockaddr_in6); 345 sin6.sin6_addr = *in6; 346 rt = rtalloc1((struct sockaddr *)&sin6, 0, 0UL); 347 if (rt && rt->rt_ifp && rt->rt_ifp->if_type == IFT_FAITH && 348 (rt->rt_ifp->if_flags & IFF_UP) != 0) 349 ret = 1; 350 else 351 ret = 0; 352 if (rt) 353 RTFREE_LOCKED(rt); 354 return ret; 355} 356#endif 357