if_faith.c revision 92725
1/* $KAME: if_faith.c,v 1.21 2001/02/20 07:59:26 itojun Exp $ */ 2 3/* 4 * Copyright (c) 1982, 1986, 1993 5 * The Regents of the University of California. All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 3. All advertising materials mentioning features or use of this software 16 * must display the following acknowledgement: 17 * This product includes software developed by the University of 18 * California, Berkeley and its contributors. 19 * 4. Neither the name of the University nor the names of its contributors 20 * may be used to endorse or promote products derived from this software 21 * without specific prior written permission. 22 * 23 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 26 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33 * SUCH DAMAGE. 34 * 35 * $FreeBSD: head/sys/net/if_faith.c 92725 2002-03-19 21:54:18Z alfred $ 36 */ 37/* 38 * derived from 39 * @(#)if_loop.c 8.1 (Berkeley) 6/10/93 40 * Id: if_loop.c,v 1.22 1996/06/19 16:24:10 wollman Exp 41 */ 42 43/* 44 * Loopback interface driver for protocol testing and timing. 45 */ 46#include "opt_inet.h" 47#include "opt_inet6.h" 48 49#include <sys/param.h> 50#include <sys/systm.h> 51#include <sys/kernel.h> 52#include <sys/mbuf.h> 53#include <sys/socket.h> 54#include <sys/errno.h> 55#include <sys/sockio.h> 56#include <sys/time.h> 57#include <sys/queue.h> 58#include <sys/types.h> 59#include <sys/malloc.h> 60 61#include <net/if.h> 62#include <net/if_types.h> 63#include <net/netisr.h> 64#include <net/route.h> 65#include <net/bpf.h> 66 67#ifdef INET 68#include <netinet/in.h> 69#include <netinet/in_systm.h> 70#include <netinet/in_var.h> 71#include <netinet/ip.h> 72#endif 73 74#ifdef INET6 75#ifndef INET 76#include <netinet/in.h> 77#endif 78#include <netinet6/in6_var.h> 79#include <netinet/ip6.h> 80#include <netinet6/ip6_var.h> 81#endif 82 83#include <net/net_osdep.h> 84 85#define FAITHNAME "faith" 86 87struct faith_softc { 88 struct ifnet sc_if; /* must be first */ 89 LIST_ENTRY(faith_softc) sc_list; 90}; 91 92static int faithioctl(struct ifnet *, u_long, caddr_t); 93int faithoutput(struct ifnet *, struct mbuf *, struct sockaddr *, 94 struct rtentry *); 95static void faithrtrequest(int, struct rtentry *, struct rt_addrinfo *); 96#ifdef INET6 97static int faithprefix(struct in6_addr *); 98#endif 99 100static int faithmodevent(module_t, int, void *); 101 102static MALLOC_DEFINE(M_FAITH, FAITHNAME, "Firewall Assisted Tunnel Interface"); 103static LIST_HEAD(, faith_softc) faith_softc_list; 104 105int faith_clone_create(struct if_clone *, int); 106int faith_clone_destroy(struct ifnet *); 107 108struct if_clone faith_cloner = IF_CLONE_INITIALIZER(FAITHNAME, 109 faith_clone_create, faith_clone_destroy, IF_MAXUNIT); 110 111#define FAITHMTU 1500 112 113static int 114faithmodevent(mod, type, data) 115 module_t mod; 116 int type; 117 void *data; 118{ 119 120 switch (type) { 121 case MOD_LOAD: 122 LIST_INIT(&faith_softc_list); 123 if_clone_attach(&faith_cloner); 124 125#ifdef INET6 126 faithprefix_p = faithprefix; 127#endif 128 129 break; 130 case MOD_UNLOAD: 131#ifdef INET6 132 faithprefix_p = NULL; 133#endif 134 135 if_clone_detach(&faith_cloner); 136 137 while (!LIST_EMPTY(&faith_softc_list)) 138 faith_clone_destroy( 139 &LIST_FIRST(&faith_softc_list)->sc_if); 140 141 break; 142 } 143 return 0; 144} 145 146static moduledata_t faith_mod = { 147 "if_faith", 148 faithmodevent, 149 0 150}; 151 152DECLARE_MODULE(if_faith, faith_mod, SI_SUB_PSEUDO, SI_ORDER_ANY); 153MODULE_VERSION(if_faith, 1); 154 155int 156faith_clone_create(ifc, unit) 157 struct if_clone *ifc; 158 int unit; 159{ 160 struct faith_softc *sc; 161 162 sc = malloc(sizeof(struct faith_softc), M_FAITH, M_WAITOK); 163 bzero(sc, sizeof(struct faith_softc)); 164 165 sc->sc_if.if_softc = sc; 166 sc->sc_if.if_name = FAITHNAME; 167 sc->sc_if.if_unit = unit; 168 169 sc->sc_if.if_mtu = FAITHMTU; 170 /* Change to BROADCAST experimentaly to announce its prefix. */ 171 sc->sc_if.if_flags = /* IFF_LOOPBACK */ IFF_BROADCAST | IFF_MULTICAST; 172 sc->sc_if.if_ioctl = faithioctl; 173 sc->sc_if.if_output = faithoutput; 174 sc->sc_if.if_type = IFT_FAITH; 175 sc->sc_if.if_hdrlen = 0; 176 sc->sc_if.if_addrlen = 0; 177 sc->sc_if.if_snd.ifq_maxlen = ifqmaxlen; 178 if_attach(&sc->sc_if); 179 bpfattach(&sc->sc_if, DLT_NULL, sizeof(u_int)); 180 LIST_INSERT_HEAD(&faith_softc_list, sc, sc_list); 181 return (0); 182} 183 184int 185faith_clone_destroy(ifp) 186 struct ifnet *ifp; 187{ 188 struct faith_softc *sc = (void *) ifp; 189 190 LIST_REMOVE(sc, sc_list); 191 bpfdetach(ifp); 192 if_detach(ifp); 193 194 free(sc, M_FAITH); 195 return (0); 196} 197 198int 199faithoutput(ifp, m, dst, rt) 200 struct ifnet *ifp; 201 struct mbuf *m; 202 struct sockaddr *dst; 203 struct rtentry *rt; 204{ 205 int isr; 206 struct ifqueue *ifq = 0; 207 208 if ((m->m_flags & M_PKTHDR) == 0) 209 panic("faithoutput no HDR"); 210 211 /* BPF write needs to be handled specially */ 212 if (dst->sa_family == AF_UNSPEC) { 213 dst->sa_family = *(mtod(m, int *)); 214 m->m_len -= sizeof(int); 215 m->m_pkthdr.len -= sizeof(int); 216 m->m_data += sizeof(int); 217 } 218 219 if (ifp->if_bpf) { 220 /* 221 * We need to prepend the address family as 222 * a four byte field. Cons up a faith header 223 * to pacify bpf. This is safe because bpf 224 * will only read from the mbuf (i.e., it won't 225 * try to free it or keep a pointer a to it). 226 */ 227 struct mbuf m0; 228 u_int32_t af = dst->sa_family; 229 230 m0.m_next = m; 231 m0.m_len = 4; 232 m0.m_data = (char *)⁡ 233 234 bpf_mtap(ifp, &m0); 235 } 236 237 if (rt && rt->rt_flags & (RTF_REJECT|RTF_BLACKHOLE)) { 238 m_freem(m); 239 return (rt->rt_flags & RTF_BLACKHOLE ? 0 : 240 rt->rt_flags & RTF_HOST ? EHOSTUNREACH : ENETUNREACH); 241 } 242 ifp->if_opackets++; 243 ifp->if_obytes += m->m_pkthdr.len; 244 switch (dst->sa_family) { 245#ifdef INET 246 case AF_INET: 247 ifq = &ipintrq; 248 isr = NETISR_IP; 249 break; 250#endif 251#ifdef INET6 252 case AF_INET6: 253 ifq = &ip6intrq; 254 isr = NETISR_IPV6; 255 break; 256#endif 257 default: 258 m_freem(m); 259 return EAFNOSUPPORT; 260 } 261 262 /* XXX do we need more sanity checks? */ 263 264 m->m_pkthdr.rcvif = ifp; 265 ifp->if_ipackets++; 266 ifp->if_ibytes += m->m_pkthdr.len; 267 (void) IF_HANDOFF(ifq, m, NULL); 268 schednetisr(isr); 269 return (0); 270} 271 272/* ARGSUSED */ 273static void 274faithrtrequest(cmd, rt, info) 275 int cmd; 276 struct rtentry *rt; 277 struct rt_addrinfo *info; 278{ 279 if (rt) { 280 rt->rt_rmx.rmx_mtu = rt->rt_ifp->if_mtu; /* for ISO */ 281 /* 282 * For optimal performance, the send and receive buffers 283 * should be at least twice the MTU plus a little more for 284 * overhead. 285 */ 286 rt->rt_rmx.rmx_recvpipe = 287 rt->rt_rmx.rmx_sendpipe = 3 * FAITHMTU; 288 } 289} 290 291/* 292 * Process an ioctl request. 293 */ 294/* ARGSUSED */ 295static int 296faithioctl(ifp, cmd, data) 297 struct ifnet *ifp; 298 u_long cmd; 299 caddr_t data; 300{ 301 struct ifaddr *ifa; 302 struct ifreq *ifr = (struct ifreq *)data; 303 int error = 0; 304 305 switch (cmd) { 306 307 case SIOCSIFADDR: 308 ifp->if_flags |= IFF_UP | IFF_RUNNING; 309 ifa = (struct ifaddr *)data; 310 ifa->ifa_rtrequest = faithrtrequest; 311 /* 312 * Everything else is done at a higher level. 313 */ 314 break; 315 316 case SIOCADDMULTI: 317 case SIOCDELMULTI: 318 if (ifr == 0) { 319 error = EAFNOSUPPORT; /* XXX */ 320 break; 321 } 322 switch (ifr->ifr_addr.sa_family) { 323#ifdef INET 324 case AF_INET: 325 break; 326#endif 327#ifdef INET6 328 case AF_INET6: 329 break; 330#endif 331 332 default: 333 error = EAFNOSUPPORT; 334 break; 335 } 336 break; 337 338#ifdef SIOCSIFMTU 339 case SIOCSIFMTU: 340 ifp->if_mtu = ifr->ifr_mtu; 341 break; 342#endif 343 344 case SIOCSIFFLAGS: 345 break; 346 347 default: 348 error = EINVAL; 349 } 350 return (error); 351} 352 353#ifdef INET6 354/* 355 * XXX could be slow 356 * XXX could be layer violation to call sys/net from sys/netinet6 357 */ 358static int 359faithprefix(in6) 360 struct in6_addr *in6; 361{ 362 struct rtentry *rt; 363 struct sockaddr_in6 sin6; 364 int ret; 365 366 if (ip6_keepfaith == 0) 367 return 0; 368 369 bzero(&sin6, sizeof(sin6)); 370 sin6.sin6_family = AF_INET6; 371 sin6.sin6_len = sizeof(struct sockaddr_in6); 372 sin6.sin6_addr = *in6; 373 rt = rtalloc1((struct sockaddr *)&sin6, 0, 0UL); 374 if (rt && rt->rt_ifp && rt->rt_ifp->if_type == IFT_FAITH && 375 (rt->rt_ifp->if_flags & IFF_UP) != 0) 376 ret = 1; 377 else 378 ret = 0; 379 if (rt) 380 RTFREE(rt); 381 return ret; 382} 383#endif 384