if_faith.c revision 122922
1/* $KAME: if_faith.c,v 1.23 2001/12/17 13:55:29 sumikawa Exp $ */ 2 3/* 4 * Copyright (c) 1982, 1986, 1993 5 * The Regents of the University of California. All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 3. All advertising materials mentioning features or use of this software 16 * must display the following acknowledgement: 17 * This product includes software developed by the University of 18 * California, Berkeley and its contributors. 19 * 4. Neither the name of the University nor the names of its contributors 20 * may be used to endorse or promote products derived from this software 21 * without specific prior written permission. 22 * 23 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 26 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33 * SUCH DAMAGE. 34 * 35 * $FreeBSD: head/sys/net/if_faith.c 122922 2003-11-20 20:07:39Z andre $ 36 */ 37/* 38 * derived from 39 * @(#)if_loop.c 8.1 (Berkeley) 6/10/93 40 * Id: if_loop.c,v 1.22 1996/06/19 16:24:10 wollman Exp 41 */ 42 43/* 44 * Loopback interface driver for protocol testing and timing. 45 */ 46#include "opt_inet.h" 47#include "opt_inet6.h" 48 49#include <sys/param.h> 50#include <sys/systm.h> 51#include <sys/kernel.h> 52#include <sys/mbuf.h> 53#include <sys/socket.h> 54#include <sys/errno.h> 55#include <sys/sockio.h> 56#include <sys/time.h> 57#include <sys/queue.h> 58#include <sys/types.h> 59#include <sys/malloc.h> 60 61#include <net/if.h> 62#include <net/if_types.h> 63#include <net/netisr.h> 64#include <net/route.h> 65#include <net/bpf.h> 66 67#ifdef INET 68#include <netinet/in.h> 69#include <netinet/in_systm.h> 70#include <netinet/in_var.h> 71#include <netinet/ip.h> 72#endif 73 74#ifdef INET6 75#ifndef INET 76#include <netinet/in.h> 77#endif 78#include <netinet6/in6_var.h> 79#include <netinet/ip6.h> 80#include <netinet6/ip6_var.h> 81#endif 82 83#include <net/net_osdep.h> 84 85#define FAITHNAME "faith" 86 87struct faith_softc { 88 struct ifnet sc_if; /* must be first */ 89 LIST_ENTRY(faith_softc) sc_list; 90}; 91 92static int faithioctl(struct ifnet *, u_long, caddr_t); 93int faithoutput(struct ifnet *, struct mbuf *, struct sockaddr *, 94 struct rtentry *); 95static void faithrtrequest(int, struct rtentry *, struct rt_addrinfo *); 96#ifdef INET6 97static int faithprefix(struct in6_addr *); 98#endif 99 100static int faithmodevent(module_t, int, void *); 101 102static MALLOC_DEFINE(M_FAITH, FAITHNAME, "Firewall Assisted Tunnel Interface"); 103static LIST_HEAD(, faith_softc) faith_softc_list; 104 105int faith_clone_create(struct if_clone *, int); 106void faith_clone_destroy(struct ifnet *); 107 108struct if_clone faith_cloner = IF_CLONE_INITIALIZER(FAITHNAME, 109 faith_clone_create, faith_clone_destroy, 0, IF_MAXUNIT); 110 111#define FAITHMTU 1500 112 113static int 114faithmodevent(mod, type, data) 115 module_t mod; 116 int type; 117 void *data; 118{ 119 120 switch (type) { 121 case MOD_LOAD: 122 LIST_INIT(&faith_softc_list); 123 if_clone_attach(&faith_cloner); 124 125#ifdef INET6 126 faithprefix_p = faithprefix; 127#endif 128 129 break; 130 case MOD_UNLOAD: 131#ifdef INET6 132 faithprefix_p = NULL; 133#endif 134 135 if_clone_detach(&faith_cloner); 136 137 while (!LIST_EMPTY(&faith_softc_list)) 138 faith_clone_destroy( 139 &LIST_FIRST(&faith_softc_list)->sc_if); 140 141 break; 142 } 143 return 0; 144} 145 146static moduledata_t faith_mod = { 147 "if_faith", 148 faithmodevent, 149 0 150}; 151 152DECLARE_MODULE(if_faith, faith_mod, SI_SUB_PSEUDO, SI_ORDER_ANY); 153MODULE_VERSION(if_faith, 1); 154 155int 156faith_clone_create(ifc, unit) 157 struct if_clone *ifc; 158 int unit; 159{ 160 struct faith_softc *sc; 161 162 sc = malloc(sizeof(struct faith_softc), M_FAITH, M_WAITOK); 163 bzero(sc, sizeof(struct faith_softc)); 164 165 sc->sc_if.if_softc = sc; 166 if_initname(&sc->sc_if, ifc->ifc_name, unit); 167 168 sc->sc_if.if_mtu = FAITHMTU; 169 /* Change to BROADCAST experimentaly to announce its prefix. */ 170 sc->sc_if.if_flags = /* IFF_LOOPBACK */ IFF_BROADCAST | IFF_MULTICAST; 171 sc->sc_if.if_ioctl = faithioctl; 172 sc->sc_if.if_output = faithoutput; 173 sc->sc_if.if_type = IFT_FAITH; 174 sc->sc_if.if_hdrlen = 0; 175 sc->sc_if.if_addrlen = 0; 176 sc->sc_if.if_snd.ifq_maxlen = ifqmaxlen; 177 if_attach(&sc->sc_if); 178 bpfattach(&sc->sc_if, DLT_NULL, sizeof(u_int)); 179 LIST_INSERT_HEAD(&faith_softc_list, sc, sc_list); 180 return (0); 181} 182 183void 184faith_clone_destroy(ifp) 185 struct ifnet *ifp; 186{ 187 struct faith_softc *sc = (void *) ifp; 188 189 LIST_REMOVE(sc, sc_list); 190 bpfdetach(ifp); 191 if_detach(ifp); 192 193 free(sc, M_FAITH); 194} 195 196int 197faithoutput(ifp, m, dst, rt) 198 struct ifnet *ifp; 199 struct mbuf *m; 200 struct sockaddr *dst; 201 struct rtentry *rt; 202{ 203 int isr; 204 205 M_ASSERTPKTHDR(m); 206 207 /* BPF write needs to be handled specially */ 208 if (dst->sa_family == AF_UNSPEC) { 209 dst->sa_family = *(mtod(m, int *)); 210 m->m_len -= sizeof(int); 211 m->m_pkthdr.len -= sizeof(int); 212 m->m_data += sizeof(int); 213 } 214 215 if (ifp->if_bpf) { 216 /* 217 * We need to prepend the address family as 218 * a four byte field. Cons up a faith header 219 * to pacify bpf. This is safe because bpf 220 * will only read from the mbuf (i.e., it won't 221 * try to free it or keep a pointer a to it). 222 */ 223 struct mbuf m0; 224 u_int32_t af = dst->sa_family; 225 226 m0.m_next = m; 227 m0.m_len = 4; 228 m0.m_data = (char *)⁡ 229 230 BPF_MTAP(ifp, &m0); 231 } 232 233 if (rt && rt->rt_flags & (RTF_REJECT|RTF_BLACKHOLE)) { 234 m_freem(m); 235 return (rt->rt_flags & RTF_BLACKHOLE ? 0 : 236 rt->rt_flags & RTF_HOST ? EHOSTUNREACH : ENETUNREACH); 237 } 238 ifp->if_opackets++; 239 ifp->if_obytes += m->m_pkthdr.len; 240 switch (dst->sa_family) { 241#ifdef INET 242 case AF_INET: 243 isr = NETISR_IP; 244 break; 245#endif 246#ifdef INET6 247 case AF_INET6: 248 isr = NETISR_IPV6; 249 break; 250#endif 251 default: 252 m_freem(m); 253 return EAFNOSUPPORT; 254 } 255 256 /* XXX do we need more sanity checks? */ 257 258 m->m_pkthdr.rcvif = ifp; 259 ifp->if_ipackets++; 260 ifp->if_ibytes += m->m_pkthdr.len; 261 netisr_dispatch(isr, m); 262 return (0); 263} 264 265/* ARGSUSED */ 266static void 267faithrtrequest(cmd, rt, info) 268 int cmd; 269 struct rtentry *rt; 270 struct rt_addrinfo *info; 271{ 272 RT_LOCK_ASSERT(rt); 273 if (rt) 274 rt->rt_rmx.rmx_mtu = rt->rt_ifp->if_mtu; 275} 276 277/* 278 * Process an ioctl request. 279 */ 280/* ARGSUSED */ 281static int 282faithioctl(ifp, cmd, data) 283 struct ifnet *ifp; 284 u_long cmd; 285 caddr_t data; 286{ 287 struct ifaddr *ifa; 288 struct ifreq *ifr = (struct ifreq *)data; 289 int error = 0; 290 291 switch (cmd) { 292 293 case SIOCSIFADDR: 294 ifp->if_flags |= IFF_UP | IFF_RUNNING; 295 ifa = (struct ifaddr *)data; 296 ifa->ifa_rtrequest = faithrtrequest; 297 /* 298 * Everything else is done at a higher level. 299 */ 300 break; 301 302 case SIOCADDMULTI: 303 case SIOCDELMULTI: 304 if (ifr == 0) { 305 error = EAFNOSUPPORT; /* XXX */ 306 break; 307 } 308 switch (ifr->ifr_addr.sa_family) { 309#ifdef INET 310 case AF_INET: 311 break; 312#endif 313#ifdef INET6 314 case AF_INET6: 315 break; 316#endif 317 318 default: 319 error = EAFNOSUPPORT; 320 break; 321 } 322 break; 323 324#ifdef SIOCSIFMTU 325 case SIOCSIFMTU: 326 ifp->if_mtu = ifr->ifr_mtu; 327 break; 328#endif 329 330 case SIOCSIFFLAGS: 331 break; 332 333 default: 334 error = EINVAL; 335 } 336 return (error); 337} 338 339#ifdef INET6 340/* 341 * XXX could be slow 342 * XXX could be layer violation to call sys/net from sys/netinet6 343 */ 344static int 345faithprefix(in6) 346 struct in6_addr *in6; 347{ 348 struct rtentry *rt; 349 struct sockaddr_in6 sin6; 350 int ret; 351 352 if (ip6_keepfaith == 0) 353 return 0; 354 355 bzero(&sin6, sizeof(sin6)); 356 sin6.sin6_family = AF_INET6; 357 sin6.sin6_len = sizeof(struct sockaddr_in6); 358 sin6.sin6_addr = *in6; 359 rt = rtalloc1((struct sockaddr *)&sin6, 0, 0UL); 360 if (rt && rt->rt_ifp && rt->rt_ifp->if_type == IFT_FAITH && 361 (rt->rt_ifp->if_flags & IFF_UP) != 0) 362 ret = 1; 363 else 364 ret = 0; 365 if (rt) 366 RTFREE_LOCKED(rt); 367 return ret; 368} 369#endif 370