kernel/netgraph7: Replace usage of MALLOC/FREE with kmalloc/kfree here too.
[dragonfly.git] / sys / netgraph7 / ng_vlan.c
CommitLineData
b06ebda0
MD
1/*-
2 * Copyright (c) 2003 IPNET Internet Communication Company
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 *
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24 * SUCH DAMAGE.
25 *
26 * Author: Ruslan Ermilov <ru@FreeBSD.org>
27 *
28 * $FreeBSD: src/sys/netgraph/ng_vlan.c,v 1.5 2007/06/11 15:29:02 imp Exp $
5a975a3d 29 * $DragonFly: src/sys/netgraph7/ng_vlan.c,v 1.2 2008/06/26 23:05:35 dillon Exp $
b06ebda0
MD
30 */
31
32#include <sys/param.h>
33#include <sys/errno.h>
34#include <sys/kernel.h>
35#include <sys/malloc.h>
36#include <sys/mbuf.h>
37#include <sys/queue.h>
38#include <sys/socket.h>
39#include <sys/systm.h>
40
41#include <net/ethernet.h>
42#include <net/if.h>
43#include <net/if_vlan_var.h>
44
5a975a3d
MD
45#include "ng_message.h"
46#include "ng_parse.h"
47#include "ng_vlan.h"
48#include "netgraph.h"
b06ebda0
MD
49
50static ng_constructor_t ng_vlan_constructor;
51static ng_rcvmsg_t ng_vlan_rcvmsg;
52static ng_shutdown_t ng_vlan_shutdown;
53static ng_newhook_t ng_vlan_newhook;
54static ng_rcvdata_t ng_vlan_rcvdata;
55static ng_disconnect_t ng_vlan_disconnect;
56
57/* Parse type for struct ng_vlan_filter. */
58static const struct ng_parse_struct_field ng_vlan_filter_fields[] =
59 NG_VLAN_FILTER_FIELDS;
60static const struct ng_parse_type ng_vlan_filter_type = {
61 &ng_parse_struct_type,
62 &ng_vlan_filter_fields
63};
64
65static int
66ng_vlan_getTableLength(const struct ng_parse_type *type,
67 const u_char *start, const u_char *buf)
68{
69 const struct ng_vlan_table *const table =
70 (const struct ng_vlan_table *)(buf - sizeof(u_int32_t));
71
72 return table->n;
73}
74
75/* Parse type for struct ng_vlan_table. */
76static const struct ng_parse_array_info ng_vlan_table_array_info = {
77 &ng_vlan_filter_type,
78 ng_vlan_getTableLength
79};
80static const struct ng_parse_type ng_vlan_table_array_type = {
81 &ng_parse_array_type,
82 &ng_vlan_table_array_info
83};
84static const struct ng_parse_struct_field ng_vlan_table_fields[] =
85 NG_VLAN_TABLE_FIELDS;
86static const struct ng_parse_type ng_vlan_table_type = {
87 &ng_parse_struct_type,
88 &ng_vlan_table_fields
89};
90
91/* List of commands and how to convert arguments to/from ASCII. */
92static const struct ng_cmdlist ng_vlan_cmdlist[] = {
93 {
94 NGM_VLAN_COOKIE,
95 NGM_VLAN_ADD_FILTER,
96 "addfilter",
97 &ng_vlan_filter_type,
98 NULL
99 },
100 {
101 NGM_VLAN_COOKIE,
102 NGM_VLAN_DEL_FILTER,
103 "delfilter",
104 &ng_parse_hookbuf_type,
105 NULL
106 },
107 {
108 NGM_VLAN_COOKIE,
109 NGM_VLAN_GET_TABLE,
110 "gettable",
111 NULL,
112 &ng_vlan_table_type
113 },
114 { 0 }
115};
116
117static struct ng_type ng_vlan_typestruct = {
118 .version = NG_ABI_VERSION,
119 .name = NG_VLAN_NODE_TYPE,
120 .constructor = ng_vlan_constructor,
121 .rcvmsg = ng_vlan_rcvmsg,
122 .shutdown = ng_vlan_shutdown,
123 .newhook = ng_vlan_newhook,
124 .rcvdata = ng_vlan_rcvdata,
125 .disconnect = ng_vlan_disconnect,
126 .cmdlist = ng_vlan_cmdlist,
127};
128NETGRAPH_INIT(vlan, &ng_vlan_typestruct);
129
130struct filter {
131 LIST_ENTRY(filter) next;
132 u_int16_t vlan;
133 hook_p hook;
134};
135
136#define HASHSIZE 16
137#define HASH(id) ((((id) >> 8) ^ ((id) >> 4) ^ (id)) & 0x0f)
138LIST_HEAD(filterhead, filter);
139
140typedef struct {
141 hook_p downstream_hook;
142 hook_p nomatch_hook;
143 struct filterhead hashtable[HASHSIZE];
144 u_int32_t nent;
145} *priv_p;
146
147static struct filter *
148ng_vlan_findentry(priv_p priv, u_int16_t vlan)
149{
150 struct filterhead *chain = &priv->hashtable[HASH(vlan)];
151 struct filter *f;
152
153 LIST_FOREACH(f, chain, next)
154 if (f->vlan == vlan)
155 return (f);
156 return (NULL);
157}
158
159static int
160ng_vlan_constructor(node_p node)
161{
162 priv_p priv;
163 int i;
164
fc025606
SW
165 priv = kmalloc(sizeof(*priv), M_NETGRAPH,
166 M_WAITOK | M_NULLOK | M_ZERO);
b06ebda0
MD
167 if (priv == NULL)
168 return (ENOMEM);
169 for (i = 0; i < HASHSIZE; i++)
170 LIST_INIT(&priv->hashtable[i]);
171 NG_NODE_SET_PRIVATE(node, priv);
172 return (0);
173}
174
175static int
176ng_vlan_newhook(node_p node, hook_p hook, const char *name)
177{
178 const priv_p priv = NG_NODE_PRIVATE(node);
179
180 if (strcmp(name, NG_VLAN_HOOK_DOWNSTREAM) == 0)
181 priv->downstream_hook = hook;
182 else if (strcmp(name, NG_VLAN_HOOK_NOMATCH) == 0)
183 priv->nomatch_hook = hook;
184 else {
185 /*
186 * Any other hook name is valid and can
187 * later be associated with a filter rule.
188 */
189 }
190 NG_HOOK_SET_PRIVATE(hook, NULL);
191 return (0);
192}
193
194static int
195ng_vlan_rcvmsg(node_p node, item_p item, hook_p lasthook)
196{
197 const priv_p priv = NG_NODE_PRIVATE(node);
198 int error = 0;
199 struct ng_mesg *msg, *resp = NULL;
200 struct ng_vlan_filter *vf;
201 struct filter *f;
202 hook_p hook;
203 struct ng_vlan_table *t;
204 int i;
205
206 NGI_GET_MSG(item, msg);
207 /* Deal with message according to cookie and command. */
208 switch (msg->header.typecookie) {
209 case NGM_VLAN_COOKIE:
210 switch (msg->header.cmd) {
211 case NGM_VLAN_ADD_FILTER:
212 /* Check that message is long enough. */
213 if (msg->header.arglen != sizeof(*vf)) {
214 error = EINVAL;
215 break;
216 }
217 vf = (struct ng_vlan_filter *)msg->data;
218 /* Sanity check the VLAN ID value. */
219 if (vf->vlan & ~EVL_VLID_MASK) {
220 error = EINVAL;
221 break;
222 }
223 /* Check that a referenced hook exists. */
224 hook = ng_findhook(node, vf->hook);
225 if (hook == NULL) {
226 error = ENOENT;
227 break;
228 }
229 /* And is not one of the special hooks. */
230 if (hook == priv->downstream_hook ||
231 hook == priv->nomatch_hook) {
232 error = EINVAL;
233 break;
234 }
235 /* And is not already in service. */
236 if (NG_HOOK_PRIVATE(hook) != NULL) {
237 error = EEXIST;
238 break;
239 }
240 /* Check we don't already trap this VLAN. */
241 if (ng_vlan_findentry(priv, vf->vlan)) {
242 error = EEXIST;
243 break;
244 }
245 /* Create filter. */
fc025606
SW
246 f = kmalloc(sizeof(*f), M_NETGRAPH,
247 M_WAITOK | M_NULLOK | M_ZERO);
b06ebda0
MD
248 if (f == NULL) {
249 error = ENOMEM;
250 break;
251 }
252 /* Link filter and hook together. */
253 f->hook = hook;
254 f->vlan = vf->vlan;
255 NG_HOOK_SET_PRIVATE(hook, f);
256 /* Register filter in a hash table. */
257 LIST_INSERT_HEAD(
258 &priv->hashtable[HASH(f->vlan)], f, next);
259 priv->nent++;
260 break;
261 case NGM_VLAN_DEL_FILTER:
262 /* Check that message is long enough. */
263 if (msg->header.arglen != NG_HOOKSIZ) {
264 error = EINVAL;
265 break;
266 }
267 /* Check that hook exists and is active. */
268 hook = ng_findhook(node, (char *)msg->data);
269 if (hook == NULL ||
270 (f = NG_HOOK_PRIVATE(hook)) == NULL) {
271 error = ENOENT;
272 break;
273 }
274 /* Purge a rule that refers to this hook. */
275 NG_HOOK_SET_PRIVATE(hook, NULL);
276 LIST_REMOVE(f, next);
277 priv->nent--;
fc025606 278 kfree(f, M_NETGRAPH);
b06ebda0
MD
279 break;
280 case NGM_VLAN_GET_TABLE:
281 NG_MKRESPONSE(resp, msg, sizeof(*t) +
5a975a3d 282 priv->nent * sizeof(*t->filter), M_WAITOK | M_NULLOK);
b06ebda0
MD
283 if (resp == NULL) {
284 error = ENOMEM;
285 break;
286 }
287 t = (struct ng_vlan_table *)resp->data;
288 t->n = priv->nent;
289 vf = &t->filter[0];
290 for (i = 0; i < HASHSIZE; i++) {
291 LIST_FOREACH(f, &priv->hashtable[i], next) {
292 vf->vlan = f->vlan;
293 strncpy(vf->hook, NG_HOOK_NAME(f->hook),
294 NG_HOOKSIZ);
295 vf++;
296 }
297 }
298 break;
299 default: /* Unknown command. */
300 error = EINVAL;
301 break;
302 }
303 break;
304 case NGM_FLOW_COOKIE:
305 {
306 struct ng_mesg *copy;
307 struct filterhead *chain;
308 struct filter *f;
309
310 /*
311 * Flow control messages should come only
312 * from downstream.
313 */
314
315 if (lasthook == NULL)
316 break;
317 if (lasthook != priv->downstream_hook)
318 break;
319
320 /* Broadcast the event to all uplinks. */
321 for (i = 0, chain = priv->hashtable; i < HASHSIZE;
322 i++, chain++)
323 LIST_FOREACH(f, chain, next) {
5a975a3d 324 NG_COPYMESSAGE(copy, msg, M_WAITOK | M_NULLOK);
b06ebda0
MD
325 if (copy == NULL)
326 continue;
327 NG_SEND_MSG_HOOK(error, node, copy, f->hook, 0);
328 }
329
330 break;
331 }
332 default: /* Unknown type cookie. */
333 error = EINVAL;
334 break;
335 }
336 NG_RESPOND_MSG(error, node, item, resp);
337 NG_FREE_MSG(msg);
338 return (error);
339}
340
341static int
342ng_vlan_rcvdata(hook_p hook, item_p item)
343{
344 const priv_p priv = NG_NODE_PRIVATE(NG_HOOK_NODE(hook));
345 struct ether_header *eh;
346 struct ether_vlan_header *evl = NULL;
347 int error;
348 u_int16_t vlan;
349 struct mbuf *m;
350 struct filter *f;
351
352 /* Make sure we have an entire header. */
353 NGI_GET_M(item, m);
354 if (m->m_len < sizeof(*eh) &&
355 (m = m_pullup(m, sizeof(*eh))) == NULL) {
356 NG_FREE_ITEM(item);
357 return (EINVAL);
358 }
359 eh = mtod(m, struct ether_header *);
360 if (hook == priv->downstream_hook) {
361 /*
362 * If from downstream, select between a match hook
363 * or the nomatch hook.
364 */
365 if (m->m_flags & M_VLANTAG ||
366 eh->ether_type == htons(ETHERTYPE_VLAN)) {
367 if (m->m_flags & M_VLANTAG) {
368 /*
369 * Packet is tagged, m contains a normal
370 * Ethernet frame; tag is stored out-of-band.
371 */
372 vlan = EVL_VLANOFTAG(m->m_pkthdr.ether_vtag);
373 } else {
374 if (m->m_len < sizeof(*evl) &&
375 (m = m_pullup(m, sizeof(*evl))) == NULL) {
376 NG_FREE_ITEM(item);
377 return (EINVAL);
378 }
379 evl = mtod(m, struct ether_vlan_header *);
380 vlan = EVL_VLANOFTAG(ntohs(evl->evl_tag));
381 }
382 if ((f = ng_vlan_findentry(priv, vlan)) != NULL) {
383 if (m->m_flags & M_VLANTAG) {
384 m->m_pkthdr.ether_vtag = 0;
385 m->m_flags &= ~M_VLANTAG;
386 } else {
387 evl->evl_encap_proto = evl->evl_proto;
388 bcopy(mtod(m, caddr_t),
389 mtod(m, caddr_t) +
390 ETHER_VLAN_ENCAP_LEN,
391 ETHER_HDR_LEN);
392 m_adj(m, ETHER_VLAN_ENCAP_LEN);
393 }
394 }
395 } else
396 f = NULL;
397 if (f != NULL)
398 NG_FWD_NEW_DATA(error, item, f->hook, m);
399 else
400 NG_FWD_NEW_DATA(error, item, priv->nomatch_hook, m);
401 } else {
402 /*
403 * It is heading towards the downstream.
404 * If from nomatch, pass it unmodified.
405 * Otherwise, do the VLAN encapsulation.
406 */
407 if (hook != priv->nomatch_hook) {
408 if ((f = NG_HOOK_PRIVATE(hook)) == NULL) {
409 NG_FREE_ITEM(item);
410 NG_FREE_M(m);
411 return (EOPNOTSUPP);
412 }
5a975a3d 413 M_PREPEND(m, ETHER_VLAN_ENCAP_LEN, MB_DONTWAIT);
b06ebda0
MD
414 /* M_PREPEND takes care of m_len and m_pkthdr.len. */
415 if (m == NULL || (m->m_len < sizeof(*evl) &&
416 (m = m_pullup(m, sizeof(*evl))) == NULL)) {
417 NG_FREE_ITEM(item);
418 return (ENOMEM);
419 }
420 /*
421 * Transform the Ethernet header into an Ethernet header
422 * with 802.1Q encapsulation.
423 */
424 bcopy(mtod(m, char *) + ETHER_VLAN_ENCAP_LEN,
425 mtod(m, char *), ETHER_HDR_LEN);
426 evl = mtod(m, struct ether_vlan_header *);
427 evl->evl_proto = evl->evl_encap_proto;
428 evl->evl_encap_proto = htons(ETHERTYPE_VLAN);
429 evl->evl_tag = htons(f->vlan);
430 }
431 NG_FWD_NEW_DATA(error, item, priv->downstream_hook, m);
432 }
433 return (error);
434}
435
436static int
437ng_vlan_shutdown(node_p node)
438{
439 const priv_p priv = NG_NODE_PRIVATE(node);
440
441 NG_NODE_SET_PRIVATE(node, NULL);
442 NG_NODE_UNREF(node);
fc025606 443 kfree(priv, M_NETGRAPH);
b06ebda0
MD
444 return (0);
445}
446
447static int
448ng_vlan_disconnect(hook_p hook)
449{
450 const priv_p priv = NG_NODE_PRIVATE(NG_HOOK_NODE(hook));
451 struct filter *f;
452
453 if (hook == priv->downstream_hook)
454 priv->downstream_hook = NULL;
455 else if (hook == priv->nomatch_hook)
456 priv->nomatch_hook = NULL;
457 else {
458 /* Purge a rule that refers to this hook. */
459 if ((f = NG_HOOK_PRIVATE(hook)) != NULL) {
460 LIST_REMOVE(f, next);
461 priv->nent--;
fc025606 462 kfree(f, M_NETGRAPH);
b06ebda0
MD
463 }
464 }
465 NG_HOOK_SET_PRIVATE(hook, NULL);
466 if ((NG_NODE_NUMHOOKS(NG_HOOK_NODE(hook)) == 0) &&
467 (NG_NODE_IS_VALID(NG_HOOK_NODE(hook))))
468 ng_rmnode_self(NG_HOOK_NODE(hook));
469 return (0);
470}