if_faith.c revision 131675
195023Ssuz/* $KAME: if_faith.c,v 1.23 2001/12/17 13:55:29 sumikawa Exp $ */ 278064Sume 354263Sshin/* 454263Sshin * Copyright (c) 1982, 1986, 1993 554263Sshin * The Regents of the University of California. All rights reserved. 654263Sshin * 754263Sshin * Redistribution and use in source and binary forms, with or without 854263Sshin * modification, are permitted provided that the following conditions 954263Sshin * are met: 1054263Sshin * 1. Redistributions of source code must retain the above copyright 1154263Sshin * notice, this list of conditions and the following disclaimer. 1254263Sshin * 2. Redistributions in binary form must reproduce the above copyright 1354263Sshin * notice, this list of conditions and the following disclaimer in the 1454263Sshin * documentation and/or other materials provided with the distribution. 1554263Sshin * 4. Neither the name of the University nor the names of its contributors 1654263Sshin * may be used to endorse or promote products derived from this software 1754263Sshin * without specific prior written permission. 1854263Sshin * 1954263Sshin * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 2054263Sshin * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 2154263Sshin * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 2254263Sshin * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 2354263Sshin * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 2454263Sshin * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 2554263Sshin * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 2654263Sshin * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 2754263Sshin * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 2854263Sshin * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 2954263Sshin * SUCH DAMAGE. 3054263Sshin * 3154263Sshin * $FreeBSD: head/sys/net/if_faith.c 131675 2004-07-06 03:34:16Z bms $ 3254263Sshin */ 3354263Sshin/* 3454263Sshin * derived from 3554263Sshin * @(#)if_loop.c 8.1 (Berkeley) 6/10/93 3654263Sshin * Id: if_loop.c,v 1.22 1996/06/19 16:24:10 wollman Exp 3754263Sshin */ 3854263Sshin 3954263Sshin/* 4054263Sshin * Loopback interface driver for protocol testing and timing. 4154263Sshin */ 4278064Sume#include "opt_inet.h" 4378064Sume#include "opt_inet6.h" 4454263Sshin 4554263Sshin#include <sys/param.h> 4654263Sshin#include <sys/systm.h> 4754263Sshin#include <sys/kernel.h> 4854263Sshin#include <sys/mbuf.h> 49129880Sphk#include <sys/module.h> 5054263Sshin#include <sys/socket.h> 5178064Sume#include <sys/errno.h> 5254263Sshin#include <sys/sockio.h> 5378064Sume#include <sys/time.h> 5478064Sume#include <sys/queue.h> 5583934Sbrooks#include <sys/types.h> 5683934Sbrooks#include <sys/malloc.h> 5754263Sshin 5854263Sshin#include <net/if.h> 59130933Sbrooks#include <net/if_clone.h> 6054263Sshin#include <net/if_types.h> 6154263Sshin#include <net/netisr.h> 6254263Sshin#include <net/route.h> 6354263Sshin#include <net/bpf.h> 6454263Sshin 6578064Sume#ifdef INET 6678064Sume#include <netinet/in.h> 6778064Sume#include <netinet/in_systm.h> 6878064Sume#include <netinet/in_var.h> 6978064Sume#include <netinet/ip.h> 7078064Sume#endif 7178064Sume 7278064Sume#ifdef INET6 7378064Sume#ifndef INET 7478064Sume#include <netinet/in.h> 7578064Sume#endif 7678064Sume#include <netinet6/in6_var.h> 7778064Sume#include <netinet/ip6.h> 7878064Sume#include <netinet6/ip6_var.h> 7978064Sume#endif 8078064Sume 8171991Speter#include <net/net_osdep.h> 8271991Speter 8383934Sbrooks#define FAITHNAME "faith" 8483934Sbrooks 8583934Sbrooksstruct faith_softc { 8683934Sbrooks struct ifnet sc_if; /* must be first */ 8783934Sbrooks LIST_ENTRY(faith_softc) sc_list; 8883934Sbrooks}; 8983934Sbrooks 9092725Salfredstatic int faithioctl(struct ifnet *, u_long, caddr_t); 9192725Salfredint faithoutput(struct ifnet *, struct mbuf *, struct sockaddr *, 9292725Salfred struct rtentry *); 9392725Salfredstatic void faithrtrequest(int, struct rtentry *, struct rt_addrinfo *); 9491317Sdillon#ifdef INET6 9592725Salfredstatic int faithprefix(struct in6_addr *); 9691317Sdillon#endif 9754263Sshin 9892725Salfredstatic int faithmodevent(module_t, int, void *); 9978064Sume 100126781Srwatsonstatic struct mtx faith_mtx; 10183934Sbrooksstatic MALLOC_DEFINE(M_FAITH, FAITHNAME, "Firewall Assisted Tunnel Interface"); 10289065Smsmithstatic LIST_HEAD(, faith_softc) faith_softc_list; 10354263Sshin 104128209Sbrooksstatic int faith_clone_create(struct if_clone *, int); 105128209Sbrooksstatic void faith_clone_destroy(struct ifnet *); 106126781Srwatsonstatic void faith_destroy(struct faith_softc *); 10783934Sbrooks 108130933SbrooksIFC_SIMPLE_DECLARE(faith, 0); 10983934Sbrooks 11054263Sshin#define FAITHMTU 1500 11154263Sshin 11283934Sbrooksstatic int 11383934Sbrooksfaithmodevent(mod, type, data) 11483934Sbrooks module_t mod; 11583934Sbrooks int type; 11683934Sbrooks void *data; 11754263Sshin{ 118126781Srwatson struct faith_softc *sc; 11954263Sshin 12083934Sbrooks switch (type) { 12183934Sbrooks case MOD_LOAD: 122126781Srwatson mtx_init(&faith_mtx, "faith_mtx", NULL, MTX_DEF); 12383934Sbrooks LIST_INIT(&faith_softc_list); 12483934Sbrooks if_clone_attach(&faith_cloner); 12583934Sbrooks 12683934Sbrooks#ifdef INET6 12783934Sbrooks faithprefix_p = faithprefix; 12878064Sume#endif 12983934Sbrooks 13083934Sbrooks break; 13183934Sbrooks case MOD_UNLOAD: 13283934Sbrooks#ifdef INET6 13383934Sbrooks faithprefix_p = NULL; 13478064Sume#endif 13583934Sbrooks 13683934Sbrooks if_clone_detach(&faith_cloner); 13783934Sbrooks 138126781Srwatson mtx_lock(&faith_mtx); 139126781Srwatson while ((sc = LIST_FIRST(&faith_softc_list)) != NULL) { 140126781Srwatson LIST_REMOVE(sc, sc_list); 141126781Srwatson mtx_unlock(&faith_mtx); 142126781Srwatson faith_destroy(sc); 143126781Srwatson mtx_lock(&faith_mtx); 144126781Srwatson } 145126781Srwatson mtx_unlock(&faith_mtx); 146126781Srwatson mtx_destroy(&faith_mtx); 14783934Sbrooks break; 14854263Sshin } 14983934Sbrooks return 0; 15054263Sshin} 15178064Sume 15283934Sbrooksstatic moduledata_t faith_mod = { 15383934Sbrooks "if_faith", 15483934Sbrooks faithmodevent, 15583934Sbrooks 0 15683934Sbrooks}; 15783934Sbrooks 15883934SbrooksDECLARE_MODULE(if_faith, faith_mod, SI_SUB_PSEUDO, SI_ORDER_ANY); 15983934SbrooksMODULE_VERSION(if_faith, 1); 16083934Sbrooks 161128209Sbrooksstatic int 16283934Sbrooksfaith_clone_create(ifc, unit) 16383934Sbrooks struct if_clone *ifc; 16492081Smux int unit; 16583934Sbrooks{ 16683934Sbrooks struct faith_softc *sc; 16783934Sbrooks 168131675Sbms sc = malloc(sizeof(struct faith_softc), M_FAITH, M_WAITOK | M_ZERO); 16983934Sbrooks 17083934Sbrooks sc->sc_if.if_softc = sc; 171121816Sbrooks if_initname(&sc->sc_if, ifc->ifc_name, unit); 17283934Sbrooks 17383934Sbrooks sc->sc_if.if_mtu = FAITHMTU; 17483934Sbrooks /* Change to BROADCAST experimentaly to announce its prefix. */ 17583934Sbrooks sc->sc_if.if_flags = /* IFF_LOOPBACK */ IFF_BROADCAST | IFF_MULTICAST; 17683934Sbrooks sc->sc_if.if_ioctl = faithioctl; 17783934Sbrooks sc->sc_if.if_output = faithoutput; 17883934Sbrooks sc->sc_if.if_type = IFT_FAITH; 17983934Sbrooks sc->sc_if.if_hdrlen = 0; 18083934Sbrooks sc->sc_if.if_addrlen = 0; 18188034Sbrooks sc->sc_if.if_snd.ifq_maxlen = ifqmaxlen; 18283934Sbrooks if_attach(&sc->sc_if); 18383934Sbrooks bpfattach(&sc->sc_if, DLT_NULL, sizeof(u_int)); 184126781Srwatson mtx_lock(&faith_mtx); 18583934Sbrooks LIST_INSERT_HEAD(&faith_softc_list, sc, sc_list); 186126781Srwatson mtx_unlock(&faith_mtx); 18783934Sbrooks return (0); 18883934Sbrooks} 18983934Sbrooks 190126781Srwatsonstatic void 191126781Srwatsonfaith_destroy(struct faith_softc *sc) 192126781Srwatson{ 193126781Srwatson 194126781Srwatson bpfdetach(&sc->sc_if); 195126781Srwatson if_detach(&sc->sc_if); 196126781Srwatson free(sc, M_FAITH); 197126781Srwatson} 198126781Srwatson 199128209Sbrooksstatic void 20083934Sbrooksfaith_clone_destroy(ifp) 20183934Sbrooks struct ifnet *ifp; 20283934Sbrooks{ 20383934Sbrooks struct faith_softc *sc = (void *) ifp; 20483934Sbrooks 205126781Srwatson mtx_lock(&faith_mtx); 20683934Sbrooks LIST_REMOVE(sc, sc_list); 207126781Srwatson mtx_unlock(&faith_mtx); 20883934Sbrooks 209126781Srwatson faith_destroy(sc); 21083934Sbrooks} 21183934Sbrooks 21283934Sbrooksint 21378064Sumefaithoutput(ifp, m, dst, rt) 21478064Sume struct ifnet *ifp; 21578064Sume struct mbuf *m; 21678064Sume struct sockaddr *dst; 21778064Sume struct rtentry *rt; 21878064Sume{ 21978064Sume int isr; 22078064Sume 221113255Sdes M_ASSERTPKTHDR(m); 22283934Sbrooks 22378064Sume /* BPF write needs to be handled specially */ 22478064Sume if (dst->sa_family == AF_UNSPEC) { 22578064Sume dst->sa_family = *(mtod(m, int *)); 22678064Sume m->m_len -= sizeof(int); 22778064Sume m->m_pkthdr.len -= sizeof(int); 22878064Sume m->m_data += sizeof(int); 22978064Sume } 23078064Sume 23178064Sume if (ifp->if_bpf) { 23278064Sume u_int32_t af = dst->sa_family; 233123922Ssam bpf_mtap2(ifp->if_bpf, &af, sizeof(af), m); 23478064Sume } 23578064Sume 23678064Sume if (rt && rt->rt_flags & (RTF_REJECT|RTF_BLACKHOLE)) { 23778064Sume m_freem(m); 23878064Sume return (rt->rt_flags & RTF_BLACKHOLE ? 0 : 23978064Sume rt->rt_flags & RTF_HOST ? EHOSTUNREACH : ENETUNREACH); 24078064Sume } 24178064Sume ifp->if_opackets++; 24278064Sume ifp->if_obytes += m->m_pkthdr.len; 24378064Sume switch (dst->sa_family) { 24478064Sume#ifdef INET 24578064Sume case AF_INET: 24678064Sume isr = NETISR_IP; 24778064Sume break; 24878064Sume#endif 24978064Sume#ifdef INET6 25078064Sume case AF_INET6: 25178064Sume isr = NETISR_IPV6; 25278064Sume break; 25378064Sume#endif 25478064Sume default: 25578064Sume m_freem(m); 25678064Sume return EAFNOSUPPORT; 25778064Sume } 25878064Sume 25978064Sume /* XXX do we need more sanity checks? */ 26078064Sume 26178064Sume m->m_pkthdr.rcvif = ifp; 26278064Sume ifp->if_ipackets++; 26378064Sume ifp->if_ibytes += m->m_pkthdr.len; 264111888Sjlemon netisr_dispatch(isr, m); 26578064Sume return (0); 26678064Sume} 26778064Sume 26878064Sume/* ARGSUSED */ 26978064Sumestatic void 27085074Srufaithrtrequest(cmd, rt, info) 27178064Sume int cmd; 27278064Sume struct rtentry *rt; 27385074Sru struct rt_addrinfo *info; 27478064Sume{ 275120727Ssam RT_LOCK_ASSERT(rt); 276122922Sandre if (rt) 277122922Sandre rt->rt_rmx.rmx_mtu = rt->rt_ifp->if_mtu; 27878064Sume} 27978064Sume 28078064Sume/* 28178064Sume * Process an ioctl request. 28278064Sume */ 28378064Sume/* ARGSUSED */ 28478064Sumestatic int 28578064Sumefaithioctl(ifp, cmd, data) 28678064Sume struct ifnet *ifp; 28778064Sume u_long cmd; 28878064Sume caddr_t data; 28978064Sume{ 29078064Sume struct ifaddr *ifa; 29178064Sume struct ifreq *ifr = (struct ifreq *)data; 29278064Sume int error = 0; 29378064Sume 29478064Sume switch (cmd) { 29578064Sume 29678064Sume case SIOCSIFADDR: 29778064Sume ifp->if_flags |= IFF_UP | IFF_RUNNING; 29878064Sume ifa = (struct ifaddr *)data; 29978064Sume ifa->ifa_rtrequest = faithrtrequest; 30078064Sume /* 30178064Sume * Everything else is done at a higher level. 30278064Sume */ 30378064Sume break; 30478064Sume 30578064Sume case SIOCADDMULTI: 30678064Sume case SIOCDELMULTI: 30778064Sume if (ifr == 0) { 30878064Sume error = EAFNOSUPPORT; /* XXX */ 30978064Sume break; 31078064Sume } 31178064Sume switch (ifr->ifr_addr.sa_family) { 31278064Sume#ifdef INET 31378064Sume case AF_INET: 31478064Sume break; 31578064Sume#endif 31678064Sume#ifdef INET6 31778064Sume case AF_INET6: 31878064Sume break; 31978064Sume#endif 32078064Sume 32178064Sume default: 32278064Sume error = EAFNOSUPPORT; 32378064Sume break; 32478064Sume } 32578064Sume break; 32678064Sume 32778064Sume#ifdef SIOCSIFMTU 32878064Sume case SIOCSIFMTU: 32978064Sume ifp->if_mtu = ifr->ifr_mtu; 33078064Sume break; 33178064Sume#endif 33278064Sume 33378064Sume case SIOCSIFFLAGS: 33478064Sume break; 33578064Sume 33678064Sume default: 33778064Sume error = EINVAL; 33878064Sume } 33978064Sume return (error); 34078064Sume} 34178064Sume 34279326Sume#ifdef INET6 34378064Sume/* 34478064Sume * XXX could be slow 34578064Sume * XXX could be layer violation to call sys/net from sys/netinet6 34678064Sume */ 34783934Sbrooksstatic int 34878064Sumefaithprefix(in6) 34978064Sume struct in6_addr *in6; 35078064Sume{ 35178064Sume struct rtentry *rt; 35278064Sume struct sockaddr_in6 sin6; 35378064Sume int ret; 35478064Sume 35578064Sume if (ip6_keepfaith == 0) 35678064Sume return 0; 35778064Sume 35878064Sume bzero(&sin6, sizeof(sin6)); 35978064Sume sin6.sin6_family = AF_INET6; 36078064Sume sin6.sin6_len = sizeof(struct sockaddr_in6); 36178064Sume sin6.sin6_addr = *in6; 36278064Sume rt = rtalloc1((struct sockaddr *)&sin6, 0, 0UL); 36378064Sume if (rt && rt->rt_ifp && rt->rt_ifp->if_type == IFT_FAITH && 36478064Sume (rt->rt_ifp->if_flags & IFF_UP) != 0) 36578064Sume ret = 1; 36678064Sume else 36778064Sume ret = 0; 36878064Sume if (rt) 369120727Ssam RTFREE_LOCKED(rt); 37078064Sume return ret; 37178064Sume} 37279326Sume#endif 373