1 /* $KAME: if_faith.c,v 1.23 2001/12/17 13:55:29 sumikawa Exp $ */
4 * Copyright (c) 1982, 1986, 1993
5 * The Regents of the University of California. All rights reserved.
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the University nor the names of its contributors
16 * may be used to endorse or promote products derived from this software
17 * without specific prior written permission.
19 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * $FreeBSD: src/sys/net/if_faith.c,v 1.3.2.6 2002/04/28 05:40:25 suz Exp $
35 * @(#)if_loop.c 8.1 (Berkeley) 6/10/93
36 * Id: if_loop.c,v 1.22 1996/06/19 16:24:10 wollman Exp
40 * Loopback interface driver for protocol testing and timing.
43 #include "use_faith.h"
46 #include "opt_inet6.h"
48 #include <sys/param.h>
49 #include <sys/systm.h>
50 #include <sys/kernel.h>
53 #include <sys/socket.h>
54 #include <sys/errno.h>
55 #include <sys/sockio.h>
57 #include <sys/queue.h>
58 #include <sys/types.h>
59 #include <sys/malloc.h>
62 #include <net/if_types.h>
63 #include <net/ifq_var.h>
64 #include <net/netisr.h>
65 #include <net/route.h>
67 #include <net/if_clone.h>
70 #include <netinet/in.h>
71 #include <netinet/in_systm.h>
72 #include <netinet/in_var.h>
73 #include <netinet/ip.h>
78 #include <netinet/in.h>
80 #include <netinet6/in6_var.h>
81 #include <netinet/ip6.h>
82 #include <netinet6/ip6_var.h>
85 #include <net/net_osdep.h>
87 #define FAITHNAME "faith"
90 struct ifnet sc_if; /* must be first */
91 LIST_ENTRY(faith_softc) sc_list;
94 static int faithioctl (struct ifnet *, u_long, caddr_t, struct ucred *);
95 int faithoutput (struct ifnet *, struct mbuf *, struct sockaddr *,
97 static void faithrtrequest (int, struct rtentry *);
99 static int faithprefix (struct in6_addr *);
102 static int faithmodevent (module_t, int, void *);
104 static MALLOC_DEFINE(M_FAITH, FAITHNAME, "Firewall Assisted Tunnel Interface");
105 LIST_HEAD(, faith_softc) faith_softc_list;
107 int faith_clone_create (struct if_clone *, int, caddr_t);
108 int faith_clone_destroy (struct ifnet *);
110 struct if_clone faith_cloner = IF_CLONE_INITIALIZER(FAITHNAME,
111 faith_clone_create, faith_clone_destroy, NFAITH, IF_MAXUNIT);
113 #define FAITHMTU 1500
116 faithmodevent(module_t mod, int type, void *data)
121 LIST_INIT(&faith_softc_list);
122 if_clone_attach(&faith_cloner);
125 faithprefix_p = faithprefix;
131 faithprefix_p = NULL;
134 if_clone_detach(&faith_cloner);
136 while (!LIST_EMPTY(&faith_softc_list))
138 &LIST_FIRST(&faith_softc_list)->sc_if);
145 static moduledata_t faith_mod = {
151 DECLARE_MODULE(if_faith, faith_mod, SI_SUB_PSEUDO, SI_ORDER_ANY);
152 MODULE_VERSION(if_faith, 1);
155 faith_clone_create(struct if_clone *ifc, int unit, caddr_t param __unused)
157 struct faith_softc *sc;
159 sc = kmalloc(sizeof(struct faith_softc), M_FAITH, M_WAITOK | M_ZERO);
161 sc->sc_if.if_softc = sc;
162 if_initname(&(sc->sc_if), FAITHNAME, unit);
164 sc->sc_if.if_mtu = FAITHMTU;
165 /* Change to BROADCAST experimentaly to announce its prefix. */
166 sc->sc_if.if_flags = /* IFF_LOOPBACK */ IFF_BROADCAST | IFF_MULTICAST;
167 sc->sc_if.if_ioctl = faithioctl;
168 sc->sc_if.if_output = faithoutput;
169 sc->sc_if.if_type = IFT_FAITH;
170 sc->sc_if.if_hdrlen = 0;
171 sc->sc_if.if_addrlen = 0;
172 ifq_set_maxlen(&sc->sc_if.if_snd, ifqmaxlen);
173 if_attach(&sc->sc_if, NULL);
174 bpfattach(&sc->sc_if, DLT_NULL, sizeof(u_int));
175 LIST_INSERT_HEAD(&faith_softc_list, sc, sc_list);
180 faith_clone_destroy(struct ifnet *ifp)
182 struct faith_softc *sc = (struct faith_softc *) ifp;
184 LIST_REMOVE(sc, sc_list);
194 faithoutput(struct ifnet *ifp, struct mbuf *m, struct sockaddr *dst,
199 if ((m->m_flags & M_PKTHDR) == 0)
200 panic("faithoutput no HDR");
202 /* BPF write needs to be handled specially */
203 if (dst->sa_family == AF_UNSPEC) {
204 dst->sa_family = *(mtod(m, int *));
205 m->m_len -= sizeof(int);
206 m->m_pkthdr.len -= sizeof(int);
207 m->m_data += sizeof(int);
210 if (ifp->if_bpf != NULL) {
212 if (ifp->if_bpf != NULL) {
214 * We need to prepend the address family as
217 uint32_t af = dst->sa_family;
219 bpf_ptap(ifp->if_bpf, m, &af, sizeof(af));
224 if (rt && rt->rt_flags & (RTF_REJECT|RTF_BLACKHOLE)) {
226 return (rt->rt_flags & RTF_BLACKHOLE ? 0 :
227 rt->rt_flags & RTF_HOST ? EHOSTUNREACH : ENETUNREACH);
229 IFNET_STAT_INC(ifp, opackets, 1);
230 IFNET_STAT_INC(ifp, obytes, m->m_pkthdr.len);
231 switch (dst->sa_family) {
247 /* XXX do we need more sanity checks? */
249 m->m_pkthdr.rcvif = ifp;
250 m->m_flags &= ~M_HASH;
251 IFNET_STAT_INC(ifp, ipackets, 1);
252 IFNET_STAT_INC(ifp, ibytes, m->m_pkthdr.len);
253 netisr_queue(isr, m);
259 faithrtrequest(int cmd, struct rtentry *rt)
262 rt->rt_rmx.rmx_mtu = rt->rt_ifp->if_mtu; /* for ISO */
264 * For optimal performance, the send and receive buffers
265 * should be at least twice the MTU plus a little more for
268 rt->rt_rmx.rmx_recvpipe =
269 rt->rt_rmx.rmx_sendpipe = 3 * FAITHMTU;
274 * Process an ioctl request.
278 faithioctl(struct ifnet *ifp, u_long cmd, caddr_t data, struct ucred *cr)
281 struct ifreq *ifr = (struct ifreq *)data;
287 ifp->if_flags |= IFF_UP | IFF_RUNNING;
288 ifa = (struct ifaddr *)data;
289 ifa->ifa_rtrequest = faithrtrequest;
291 * Everything else is done at a higher level.
298 error = EAFNOSUPPORT; /* XXX */
301 switch (ifr->ifr_addr.sa_family) {
312 error = EAFNOSUPPORT;
319 ifp->if_mtu = ifr->ifr_mtu;
335 * XXX could be layer violation to call sys/net from sys/netinet6
338 faithprefix(struct in6_addr *in6)
341 struct sockaddr_in6 sin6;
344 if (ip6_keepfaith == 0)
347 bzero(&sin6, sizeof sin6);
348 sin6.sin6_family = AF_INET6;
349 sin6.sin6_len = sizeof(struct sockaddr_in6);
350 sin6.sin6_addr = *in6;
351 rt = rtpurelookup((struct sockaddr *)&sin6);
352 if (rt != NULL && rt->rt_ifp && rt->rt_ifp->if_type == IFT_FAITH &&
353 (rt->rt_ifp->if_flags & IFF_UP))