1998-09-12 22:07:47 +00:00
|
|
|
/*
|
2001-01-22 22:34:53 +00:00
|
|
|
* Copyright (c) 1998-2001 Luigi Rizzo
|
1998-09-12 22:07:47 +00:00
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
1999-09-11 18:54:41 +00:00
|
|
|
* $FreeBSD$
|
1998-09-12 22:07:47 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This code implements bridging in FreeBSD. It only acts on ethernet
|
|
|
|
* type of interfaces (others are still usable for routing).
|
|
|
|
* A bridging table holds the source MAC address/dest. interface for each
|
|
|
|
* known node. The table is indexed using an hash of the source address.
|
|
|
|
*
|
2000-05-14 02:18:43 +00:00
|
|
|
* Input packets are tapped near the beginning of ether_input(), and
|
|
|
|
* analysed by calling bridge_in(). Depending on the result, the packet
|
1998-09-12 22:07:47 +00:00
|
|
|
* can be forwarded to one or more output interfaces using bdg_forward(),
|
|
|
|
* and/or sent to the upper layer (e.g. in case of multicast).
|
|
|
|
*
|
|
|
|
* Output packets are intercepted near the end of ether_output(),
|
2001-02-02 00:19:25 +00:00
|
|
|
* the correct destination is selected calling bridge_dst_lookup(),
|
1998-09-12 22:07:47 +00:00
|
|
|
* and then forwarding is done using bdg_forward().
|
|
|
|
* Bridging is controlled by the sysctl variable net.link.ether.bridge
|
|
|
|
*
|
|
|
|
* The arp code is also modified to let a machine answer to requests
|
|
|
|
* irrespective of the port the request came from.
|
|
|
|
*
|
|
|
|
* In case of loops in the bridging topology, the bridge detects this
|
|
|
|
* event and temporarily mutes output bridging on one of the ports.
|
2000-02-08 14:53:55 +00:00
|
|
|
* Periodically, interfaces are unmuted by bdg_timeout().
|
|
|
|
* Muting is only implemented as a safety measure, and also as
|
1998-09-12 22:07:47 +00:00
|
|
|
* a mechanism to support a user-space implementation of the spanning
|
|
|
|
* tree algorithm. In the final release, unmuting will only occur
|
|
|
|
* because of explicit action of the user-level daemon.
|
|
|
|
*
|
|
|
|
* To build a bridging kernel, use the following option
|
|
|
|
* option BRIDGE
|
|
|
|
* and then at runtime set the sysctl variable to enable bridging.
|
|
|
|
*
|
|
|
|
* Only one interface is supposed to have addresses set (but
|
|
|
|
* there are no problems in practice if you set addresses for more
|
|
|
|
* than one interface).
|
|
|
|
* Bridging will act before routing, but nothing prevents a machine
|
|
|
|
* from doing both (modulo bugs in the implementation...).
|
|
|
|
*
|
|
|
|
* THINGS TO REMEMBER
|
|
|
|
* - bridging is incompatible with multicast routing on the same
|
|
|
|
* machine. There is not an easy fix to this.
|
|
|
|
* - loop detection is still not very robust.
|
|
|
|
* - the interface of bdg_forward() could be improved.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/mbuf.h>
|
1998-12-14 17:58:05 +00:00
|
|
|
#include <sys/malloc.h>
|
1998-09-12 22:07:47 +00:00
|
|
|
#include <sys/systm.h>
|
|
|
|
#include <sys/socket.h> /* for net/if.h */
|
|
|
|
#include <sys/kernel.h>
|
|
|
|
#include <sys/sysctl.h>
|
|
|
|
|
|
|
|
#include <net/if.h>
|
|
|
|
#include <net/if_types.h>
|
2001-02-10 00:10:18 +00:00
|
|
|
#include <net/if_var.h>
|
1998-09-12 22:07:47 +00:00
|
|
|
|
|
|
|
#include <netinet/in.h> /* for struct arpcom */
|
1999-03-30 23:45:14 +00:00
|
|
|
#include <netinet/in_systm.h>
|
|
|
|
#include <netinet/in_var.h>
|
|
|
|
#include <netinet/ip.h>
|
1998-09-12 22:07:47 +00:00
|
|
|
#include <netinet/if_ether.h> /* for struct arpcom */
|
|
|
|
|
|
|
|
#include "opt_ipfw.h"
|
1998-12-14 17:58:05 +00:00
|
|
|
#include "opt_ipdn.h"
|
1998-09-12 22:07:47 +00:00
|
|
|
|
1999-04-21 18:23:00 +00:00
|
|
|
#if defined(IPFIREWALL)
|
1998-09-12 22:07:47 +00:00
|
|
|
#include <net/route.h>
|
1998-12-14 17:58:05 +00:00
|
|
|
#include <netinet/ip_fw.h>
|
1999-04-21 18:23:00 +00:00
|
|
|
#if defined(DUMMYNET)
|
1998-09-12 22:07:47 +00:00
|
|
|
#include <netinet/ip_dummynet.h>
|
|
|
|
#endif
|
1999-04-21 18:23:00 +00:00
|
|
|
#endif
|
1998-09-12 22:07:47 +00:00
|
|
|
|
|
|
|
#include <net/bridge.h>
|
|
|
|
|
|
|
|
/*
|
|
|
|
* For debugging, you can use the following macros.
|
|
|
|
* remember, rdtsc() only works on Pentium-class machines
|
|
|
|
|
|
|
|
quad_t ticks;
|
|
|
|
DDB(ticks = rdtsc();)
|
|
|
|
... interesting code ...
|
|
|
|
DDB(bdg_fw_ticks += (u_long)(rdtsc() - ticks) ; bdg_fw_count++ ;)
|
|
|
|
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
#define DDB(x) x
|
|
|
|
#define DEB(x)
|
|
|
|
|
|
|
|
static void bdginit(void *);
|
|
|
|
static void flush_table(void);
|
2000-02-08 14:53:55 +00:00
|
|
|
static void bdg_promisc_on(void);
|
|
|
|
static void parse_bdg_cfg(void);
|
1998-09-12 22:07:47 +00:00
|
|
|
|
2000-07-29 02:00:12 +00:00
|
|
|
static int bdg_initialized = 0;
|
|
|
|
|
1998-09-12 22:07:47 +00:00
|
|
|
static int bdg_ipfw = 0 ;
|
|
|
|
int do_bridge = 0;
|
|
|
|
bdg_hash_table *bdg_table = NULL ;
|
|
|
|
|
|
|
|
/*
|
2000-02-08 14:53:55 +00:00
|
|
|
* System initialization
|
|
|
|
*/
|
|
|
|
|
|
|
|
SYSINIT(interfaces, SI_SUB_PROTO_IF, SI_ORDER_FIRST, bdginit, NULL)
|
|
|
|
|
|
|
|
static struct bdg_stats bdg_stats ;
|
2001-02-02 00:19:25 +00:00
|
|
|
struct bdg_softc *ifp2sc = NULL ;
|
2000-02-08 14:53:55 +00:00
|
|
|
/* XXX make it static of size BDG_MAX_PORTS */
|
|
|
|
|
|
|
|
#define IFP_CHK(ifp, x) \
|
|
|
|
if (ifp2sc[ifp->if_index].magic != 0xDEADBEEF) { x ; }
|
|
|
|
|
|
|
|
/*
|
2001-02-02 00:19:25 +00:00
|
|
|
* turn off promisc mode, optionally clear the IFF_USED flag.
|
|
|
|
* The flag is turned on by parse_bdg_config
|
2000-02-08 14:53:55 +00:00
|
|
|
*/
|
|
|
|
static void
|
|
|
|
bdg_promisc_off(int clear_used)
|
|
|
|
{
|
|
|
|
struct ifnet *ifp ;
|
2001-02-04 13:13:25 +00:00
|
|
|
TAILQ_FOREACH(ifp, &ifnet, if_link) {
|
2000-02-08 14:53:55 +00:00
|
|
|
if ( (ifp2sc[ifp->if_index].flags & IFF_BDG_PROMISC) ) {
|
|
|
|
int s, ret ;
|
|
|
|
s = splimp();
|
|
|
|
ret = ifpromisc(ifp, 0);
|
|
|
|
splx(s);
|
|
|
|
ifp2sc[ifp->if_index].flags &= ~(IFF_BDG_PROMISC|IFF_MUTE) ;
|
2001-02-10 00:10:18 +00:00
|
|
|
DEB(printf(">> now %s%d promisc OFF if_flags 0x%x bdg_flags 0x%x\n",
|
2000-02-08 14:53:55 +00:00
|
|
|
ifp->if_name, ifp->if_unit,
|
2001-02-10 00:10:18 +00:00
|
|
|
ifp->if_flags, ifp2sc[ifp->if_index].flags);)
|
2000-02-08 14:53:55 +00:00
|
|
|
}
|
2001-02-02 00:19:25 +00:00
|
|
|
if (clear_used) {
|
|
|
|
ifp2sc[ifp->if_index].flags &= ~(IFF_USED) ;
|
|
|
|
bdg_stats.s[ifp->if_index].name[0] = '\0';
|
|
|
|
}
|
2000-02-08 14:53:55 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* set promisc mode on the interfaces we use.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
bdg_promisc_on()
|
|
|
|
{
|
|
|
|
struct ifnet *ifp ;
|
|
|
|
int s ;
|
|
|
|
|
2001-02-04 13:13:25 +00:00
|
|
|
TAILQ_FOREACH(ifp, &ifnet, if_link) {
|
2001-02-02 00:19:25 +00:00
|
|
|
if ( !BDG_USED(ifp) )
|
2000-02-08 14:53:55 +00:00
|
|
|
continue ;
|
|
|
|
if ( 0 == ( ifp->if_flags & IFF_UP) ) {
|
|
|
|
s = splimp();
|
|
|
|
if_up(ifp);
|
|
|
|
splx(s);
|
|
|
|
}
|
|
|
|
if ( !(ifp2sc[ifp->if_index].flags & IFF_BDG_PROMISC) ) {
|
|
|
|
int ret ;
|
|
|
|
s = splimp();
|
|
|
|
ret = ifpromisc(ifp, 1);
|
|
|
|
splx(s);
|
|
|
|
ifp2sc[ifp->if_index].flags |= IFF_BDG_PROMISC ;
|
|
|
|
printf(">> now %s%d promisc ON if_flags 0x%x bdg_flags 0x%x\n",
|
|
|
|
ifp->if_name, ifp->if_unit,
|
|
|
|
ifp->if_flags, ifp2sc[ifp->if_index].flags);
|
|
|
|
}
|
2001-02-02 00:19:25 +00:00
|
|
|
if (BDG_MUTED(ifp)) {
|
2000-02-08 14:53:55 +00:00
|
|
|
printf(">> unmuting %s%d\n", ifp->if_name, ifp->if_unit);
|
2001-02-02 00:19:25 +00:00
|
|
|
BDG_UNMUTE(ifp) ;
|
2000-02-08 14:53:55 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
1998-09-12 22:07:47 +00:00
|
|
|
|
|
|
|
static int
|
2000-07-04 11:25:35 +00:00
|
|
|
sysctl_bdg(SYSCTL_HANDLER_ARGS)
|
1998-09-12 22:07:47 +00:00
|
|
|
{
|
|
|
|
int error, oldval = do_bridge ;
|
|
|
|
|
|
|
|
error = sysctl_handle_int(oidp,
|
|
|
|
oidp->oid_arg1, oidp->oid_arg2, req);
|
2000-02-08 14:53:55 +00:00
|
|
|
DEB( printf("called sysctl for bridge name %s arg2 %d val %d->%d\n",
|
1998-09-12 22:07:47 +00:00
|
|
|
oidp->oid_name, oidp->oid_arg2,
|
2000-02-08 14:53:55 +00:00
|
|
|
oldval, do_bridge); )
|
|
|
|
|
1998-09-12 22:07:47 +00:00
|
|
|
if (bdg_table == NULL)
|
|
|
|
do_bridge = 0 ;
|
|
|
|
if (oldval != do_bridge) {
|
2001-02-02 00:19:25 +00:00
|
|
|
bdg_promisc_off( 1 ); /* reset previously used interfaces */
|
1998-09-12 22:07:47 +00:00
|
|
|
flush_table();
|
2001-02-02 00:19:25 +00:00
|
|
|
if (do_bridge) {
|
|
|
|
parse_bdg_cfg();
|
2000-02-08 14:53:55 +00:00
|
|
|
bdg_promisc_on();
|
2001-02-02 00:19:25 +00:00
|
|
|
}
|
2000-02-08 14:53:55 +00:00
|
|
|
}
|
|
|
|
return error ;
|
|
|
|
}
|
|
|
|
|
|
|
|
static char bridge_cfg[256] = { "" } ;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* parse the config string, set IFF_USED, name and cluster_id
|
|
|
|
* for all interfaces found.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
parse_bdg_cfg()
|
|
|
|
{
|
|
|
|
char *p, *beg ;
|
|
|
|
int i, l, cluster;
|
|
|
|
struct bdg_softc *b;
|
|
|
|
|
|
|
|
for (p= bridge_cfg; *p ; p++) {
|
|
|
|
/* interface names begin with [a-z] and continue up to ':' */
|
|
|
|
if (*p < 'a' || *p > 'z')
|
|
|
|
continue ;
|
|
|
|
for ( beg = p ; *p && *p != ':' ; p++ )
|
|
|
|
;
|
|
|
|
if (*p == 0) /* end of string, ':' not found */
|
|
|
|
return ;
|
|
|
|
l = p - beg ; /* length of name string */
|
|
|
|
p++ ;
|
2001-02-10 00:10:18 +00:00
|
|
|
DEB(printf("-- match beg(%d) <%s> p <%s>\n", l, beg, p);)
|
2000-02-08 14:53:55 +00:00
|
|
|
for (cluster = 0 ; *p && *p >= '0' && *p <= '9' ; p++)
|
|
|
|
cluster = cluster*10 + (*p -'0');
|
|
|
|
/*
|
|
|
|
* now search in bridge strings
|
|
|
|
*/
|
|
|
|
for (i=0, b = ifp2sc ; i < if_index ; i++, b++) {
|
|
|
|
char buf[32];
|
|
|
|
struct ifnet *ifp = b->ifp ;
|
|
|
|
|
|
|
|
if (ifp == NULL)
|
|
|
|
continue;
|
|
|
|
sprintf(buf, "%s%d", ifp->if_name, ifp->if_unit);
|
|
|
|
if (!strncmp(beg, buf, l)) { /* XXX not correct for >10 if! */
|
|
|
|
b->cluster_id = htons(cluster) ;
|
|
|
|
b->flags |= IFF_USED ;
|
2001-01-22 22:34:53 +00:00
|
|
|
sprintf(bdg_stats.s[ifp->if_index].name,
|
|
|
|
"%s%d:%d", ifp->if_name, ifp->if_unit, cluster);
|
2000-02-08 14:53:55 +00:00
|
|
|
|
2001-02-10 00:10:18 +00:00
|
|
|
DEB(printf("--++ found %s\n",
|
2000-02-08 14:53:55 +00:00
|
|
|
bdg_stats.s[ifp->if_index].name);)
|
|
|
|
break ;
|
|
|
|
}
|
|
|
|
}
|
2001-01-22 22:34:53 +00:00
|
|
|
if (*p == '\0')
|
|
|
|
break ;
|
2000-02-08 14:53:55 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2000-07-04 11:25:35 +00:00
|
|
|
sysctl_bdg_cfg(SYSCTL_HANDLER_ARGS)
|
2000-02-08 14:53:55 +00:00
|
|
|
{
|
|
|
|
int error = 0 ;
|
|
|
|
char oldval[256] ;
|
|
|
|
|
|
|
|
strcpy(oldval, bridge_cfg) ;
|
|
|
|
|
|
|
|
error = sysctl_handle_string(oidp,
|
|
|
|
bridge_cfg, oidp->oid_arg2, req);
|
|
|
|
DEB(
|
|
|
|
printf("called sysctl for bridge name %s arg2 %d err %d val %s->%s\n",
|
|
|
|
oidp->oid_name, oidp->oid_arg2,
|
|
|
|
error,
|
|
|
|
oldval, bridge_cfg);
|
|
|
|
)
|
|
|
|
if (strcmp(oldval, bridge_cfg)) {
|
|
|
|
bdg_promisc_off( 1 ); /* reset previously-used interfaces */
|
|
|
|
flush_table();
|
|
|
|
parse_bdg_cfg(); /* and set new ones... */
|
|
|
|
if (do_bridge)
|
|
|
|
bdg_promisc_on(); /* re-enable interfaces */
|
1998-09-12 22:07:47 +00:00
|
|
|
}
|
|
|
|
return error ;
|
|
|
|
}
|
|
|
|
|
2000-07-20 17:07:06 +00:00
|
|
|
static int
|
2000-07-20 17:57:20 +00:00
|
|
|
sysctl_refresh(SYSCTL_HANDLER_ARGS)
|
2000-07-20 17:07:06 +00:00
|
|
|
{
|
|
|
|
if (req->newptr)
|
|
|
|
bdgtakeifaces();
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
SYSCTL_DECL(_net_link_ether);
|
2000-02-08 14:53:55 +00:00
|
|
|
SYSCTL_PROC(_net_link_ether, OID_AUTO, bridge_cfg, CTLTYPE_STRING|CTLFLAG_RW,
|
|
|
|
&bridge_cfg, sizeof(bridge_cfg), &sysctl_bdg_cfg, "A",
|
|
|
|
"Bridge configuration");
|
|
|
|
|
1998-09-12 22:07:47 +00:00
|
|
|
SYSCTL_PROC(_net_link_ether, OID_AUTO, bridge, CTLTYPE_INT|CTLFLAG_RW,
|
2000-02-08 14:53:55 +00:00
|
|
|
&do_bridge, 0, &sysctl_bdg, "I", "Bridging");
|
|
|
|
|
|
|
|
SYSCTL_INT(_net_link_ether, OID_AUTO, bridge_ipfw, CTLFLAG_RW,
|
|
|
|
&bdg_ipfw,0,"Pass bridged pkts through firewall");
|
|
|
|
|
2001-01-26 19:43:54 +00:00
|
|
|
#define SY(parent, var, comment) \
|
|
|
|
static int var ; \
|
2001-01-26 06:47:19 +00:00
|
|
|
SYSCTL_INT(parent, OID_AUTO, var, CTLFLAG_RW, &(var), 0, comment);
|
|
|
|
|
2000-02-08 14:53:55 +00:00
|
|
|
int bdg_ipfw_drops;
|
|
|
|
SYSCTL_INT(_net_link_ether, OID_AUTO, bridge_ipfw_drop,
|
|
|
|
CTLFLAG_RW, &bdg_ipfw_drops,0,"");
|
|
|
|
|
|
|
|
int bdg_ipfw_colls;
|
|
|
|
SYSCTL_INT(_net_link_ether, OID_AUTO, bridge_ipfw_collisions,
|
|
|
|
CTLFLAG_RW, &bdg_ipfw_colls,0,"");
|
1998-09-12 22:07:47 +00:00
|
|
|
|
2000-07-20 17:07:06 +00:00
|
|
|
SYSCTL_PROC(_net_link_ether, OID_AUTO, bridge_refresh, CTLTYPE_INT|CTLFLAG_WR,
|
|
|
|
NULL, 0, &sysctl_refresh, "I", "iface refresh");
|
|
|
|
|
1998-09-12 22:07:47 +00:00
|
|
|
#if 1 /* diagnostic vars */
|
2001-01-26 06:47:19 +00:00
|
|
|
|
2001-02-02 00:19:25 +00:00
|
|
|
SY(_net_link_ether, verbose, "Be verbose");
|
2001-01-26 19:43:54 +00:00
|
|
|
SY(_net_link_ether, bdg_split_pkts, "Packets split in bdg_forward");
|
2001-01-26 06:47:19 +00:00
|
|
|
|
2001-01-26 19:43:54 +00:00
|
|
|
SY(_net_link_ether, bdg_thru, "Packets through bridge");
|
2001-01-26 06:47:19 +00:00
|
|
|
|
2001-01-26 19:43:54 +00:00
|
|
|
SY(_net_link_ether, bdg_copied, "Packets copied in bdg_forward");
|
2001-01-26 06:47:19 +00:00
|
|
|
|
|
|
|
SY(_net_link_ether, bdg_copy, "Force copy in bdg_forward");
|
|
|
|
SY(_net_link_ether, bdg_predict, "Correctly predicted header location");
|
|
|
|
|
|
|
|
SY(_net_link_ether, bdg_fw_avg, "Cycle counter avg");
|
|
|
|
SY(_net_link_ether, bdg_fw_ticks, "Cycle counter item");
|
|
|
|
SY(_net_link_ether, bdg_fw_count, "Cycle counter count");
|
1998-09-12 22:07:47 +00:00
|
|
|
#endif
|
2000-02-08 14:53:55 +00:00
|
|
|
|
1998-09-12 22:07:47 +00:00
|
|
|
SYSCTL_STRUCT(_net_link_ether, PF_BDG, bdgstats,
|
|
|
|
CTLFLAG_RD, &bdg_stats , bdg_stats, "bridge statistics");
|
|
|
|
|
|
|
|
static int bdg_loops ;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* completely flush the bridge table.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
flush_table()
|
|
|
|
{
|
|
|
|
int s,i;
|
|
|
|
|
|
|
|
if (bdg_table == NULL)
|
|
|
|
return ;
|
|
|
|
s = splimp();
|
|
|
|
for (i=0; i< HASH_SIZE; i++)
|
|
|
|
bdg_table[i].name= NULL; /* clear table */
|
|
|
|
splx(s);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* called periodically to flush entries etc.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
bdg_timeout(void *dummy)
|
|
|
|
{
|
|
|
|
static int slowtimer = 0 ;
|
|
|
|
|
|
|
|
if (do_bridge) {
|
|
|
|
static int age_index = 0 ; /* index of table position to age */
|
|
|
|
int l = age_index + HASH_SIZE/4 ;
|
|
|
|
/*
|
|
|
|
* age entries in the forwarding table.
|
|
|
|
*/
|
|
|
|
if (l > HASH_SIZE)
|
|
|
|
l = HASH_SIZE ;
|
|
|
|
for (; age_index < l ; age_index++)
|
|
|
|
if (bdg_table[age_index].used)
|
|
|
|
bdg_table[age_index].used = 0 ;
|
|
|
|
else if (bdg_table[age_index].name) {
|
|
|
|
/* printf("xx flushing stale entry %d\n", age_index); */
|
|
|
|
bdg_table[age_index].name = NULL ;
|
|
|
|
}
|
|
|
|
if (age_index >= HASH_SIZE)
|
|
|
|
age_index = 0 ;
|
|
|
|
|
|
|
|
if (--slowtimer <= 0 ) {
|
|
|
|
slowtimer = 5 ;
|
|
|
|
|
2000-02-08 14:53:55 +00:00
|
|
|
bdg_promisc_on() ; /* we just need unmute, really */
|
1998-09-12 22:07:47 +00:00
|
|
|
bdg_loops = 0 ;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
timeout(bdg_timeout, (void *)0, 2*hz );
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* local MAC addresses are held in a small array. This makes comparisons
|
|
|
|
* much faster.
|
|
|
|
*/
|
2001-02-02 00:19:25 +00:00
|
|
|
bdg_addr bdg_addresses[BDG_MAX_PORTS];
|
1998-09-12 22:07:47 +00:00
|
|
|
int bdg_ports ;
|
|
|
|
|
|
|
|
/*
|
2000-02-08 14:53:55 +00:00
|
|
|
* initialization of bridge code. This needs to be done after all
|
|
|
|
* interfaces have been configured.
|
1998-09-12 22:07:47 +00:00
|
|
|
*/
|
|
|
|
static void
|
2000-02-08 14:53:55 +00:00
|
|
|
bdginit(void *dummy)
|
1998-09-12 22:07:47 +00:00
|
|
|
{
|
1999-04-26 09:00:47 +00:00
|
|
|
|
2000-07-29 02:00:12 +00:00
|
|
|
bdg_initialized++;
|
1998-09-12 22:07:47 +00:00
|
|
|
if (bdg_table == NULL)
|
|
|
|
bdg_table = (struct hash_table *)
|
|
|
|
malloc(HASH_SIZE * sizeof(struct hash_table),
|
|
|
|
M_IFADDR, M_WAITOK);
|
|
|
|
flush_table();
|
|
|
|
|
2000-02-08 14:53:55 +00:00
|
|
|
ifp2sc = malloc(BDG_MAX_PORTS * sizeof(struct bdg_softc),
|
2000-12-08 21:51:06 +00:00
|
|
|
M_IFADDR, M_WAITOK | M_ZERO);
|
1998-09-12 22:07:47 +00:00
|
|
|
|
|
|
|
bzero(&bdg_stats, sizeof(bdg_stats) );
|
2000-07-20 17:07:06 +00:00
|
|
|
bdgtakeifaces();
|
|
|
|
bdg_timeout(0);
|
|
|
|
do_bridge=0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
bdgtakeifaces(void)
|
|
|
|
{
|
|
|
|
int i ;
|
|
|
|
struct ifnet *ifp;
|
|
|
|
struct arpcom *ac ;
|
2001-02-02 00:19:25 +00:00
|
|
|
bdg_addr *p = bdg_addresses ;
|
2000-07-20 17:07:06 +00:00
|
|
|
struct bdg_softc *bp;
|
|
|
|
|
2000-07-29 02:00:12 +00:00
|
|
|
if (!bdg_initialized)
|
|
|
|
return;
|
|
|
|
|
1998-09-12 22:07:47 +00:00
|
|
|
bdg_ports = 0 ;
|
2000-07-20 17:07:06 +00:00
|
|
|
*bridge_cfg = '\0';
|
1998-09-12 22:07:47 +00:00
|
|
|
|
2001-02-02 00:19:25 +00:00
|
|
|
printf("BRIDGE 010131, have %d interfaces\n", if_index);
|
2001-02-03 11:46:35 +00:00
|
|
|
for (i = 0 , ifp = TAILQ_FIRST(&ifnet) ; i < if_index ;
|
|
|
|
i++, ifp = TAILQ_NEXT(ifp, if_link))
|
1998-09-12 22:07:47 +00:00
|
|
|
if (ifp->if_type == IFT_ETHER) { /* ethernet ? */
|
2000-02-08 14:53:55 +00:00
|
|
|
bp = &ifp2sc[ifp->if_index] ;
|
1998-09-12 22:07:47 +00:00
|
|
|
ac = (struct arpcom *)ifp;
|
2000-02-08 14:53:55 +00:00
|
|
|
sprintf(bridge_cfg + strlen(bridge_cfg),
|
|
|
|
"%s%d:1,", ifp->if_name, ifp->if_unit);
|
|
|
|
printf("-- index %d %s type %d phy %d addrl %d addr %6D\n",
|
|
|
|
ifp->if_index,
|
|
|
|
bdg_stats.s[ifp->if_index].name,
|
|
|
|
(int)ifp->if_type, (int) ifp->if_physical,
|
|
|
|
(int)ifp->if_addrlen,
|
|
|
|
ac->ac_enaddr, "." );
|
2001-02-02 00:19:25 +00:00
|
|
|
bcopy(ac->ac_enaddr, p->etheraddr, 6);
|
|
|
|
p++ ;
|
2000-02-08 14:53:55 +00:00
|
|
|
bp->ifp = ifp ;
|
|
|
|
bp->flags = IFF_USED ;
|
|
|
|
bp->cluster_id = htons(1) ;
|
|
|
|
bp->magic = 0xDEADBEEF ;
|
|
|
|
|
|
|
|
sprintf(bdg_stats.s[ifp->if_index].name,
|
|
|
|
"%s%d:%d", ifp->if_name, ifp->if_unit,
|
|
|
|
ntohs(bp->cluster_id));
|
|
|
|
bdg_ports ++ ;
|
|
|
|
}
|
|
|
|
|
1998-09-12 22:07:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* bridge_in() is invoked to perform bridging decision on input packets.
|
2000-05-14 02:18:43 +00:00
|
|
|
*
|
1998-09-12 22:07:47 +00:00
|
|
|
* On Input:
|
2000-05-14 02:18:43 +00:00
|
|
|
* eh Ethernet header of the incoming packet.
|
1998-09-12 22:07:47 +00:00
|
|
|
*
|
|
|
|
* On Return: destination of packet, one of
|
|
|
|
* BDG_BCAST broadcast
|
|
|
|
* BDG_MCAST multicast
|
|
|
|
* BDG_LOCAL is only for a local address (do not forward)
|
|
|
|
* BDG_DROP drop the packet
|
|
|
|
* ifp ifp of the destination interface.
|
|
|
|
*
|
|
|
|
* Forwarding is not done directly to give a chance to some drivers
|
|
|
|
* to fetch more of the packet, or simply drop it completely.
|
|
|
|
*/
|
|
|
|
|
|
|
|
struct ifnet *
|
2000-05-14 02:18:43 +00:00
|
|
|
bridge_in(struct ifnet *ifp, struct ether_header *eh)
|
1998-09-12 22:07:47 +00:00
|
|
|
{
|
|
|
|
int index;
|
2000-05-14 02:18:43 +00:00
|
|
|
struct ifnet *dst , *old ;
|
2001-02-02 00:19:25 +00:00
|
|
|
int dropit = BDG_MUTED(ifp) ;
|
1998-09-12 22:07:47 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* hash the source address
|
|
|
|
*/
|
|
|
|
index= HASH_FN(eh->ether_shost);
|
|
|
|
bdg_table[index].used = 1 ;
|
|
|
|
old = bdg_table[index].name ;
|
|
|
|
if ( old ) { /* the entry is valid. */
|
2000-02-08 14:53:55 +00:00
|
|
|
IFP_CHK(old, printf("bridge_in-- reading table\n") );
|
|
|
|
|
1998-09-12 22:07:47 +00:00
|
|
|
if (!BDG_MATCH( eh->ether_shost, bdg_table[index].etheraddr) ) {
|
2000-02-08 14:53:55 +00:00
|
|
|
bdg_ipfw_colls++ ;
|
1998-09-12 22:07:47 +00:00
|
|
|
bdg_table[index].name = NULL ;
|
|
|
|
} else if (old != ifp) {
|
|
|
|
/*
|
|
|
|
* found a loop. Either a machine has moved, or there
|
|
|
|
* is a misconfiguration/reconfiguration of the network.
|
|
|
|
* First, do not forward this packet!
|
|
|
|
* Record the relocation anyways; then, if loops persist,
|
|
|
|
* suspect a reconfiguration and disable forwarding
|
|
|
|
* from the old interface.
|
|
|
|
*/
|
|
|
|
bdg_table[index].name = ifp ; /* relocate address */
|
|
|
|
printf("-- loop (%d) %6D to %s%d from %s%d (%s)\n",
|
|
|
|
bdg_loops, eh->ether_shost, ".",
|
|
|
|
ifp->if_name, ifp->if_unit,
|
|
|
|
old->if_name, old->if_unit,
|
2001-02-02 00:19:25 +00:00
|
|
|
BDG_MUTED(old) ? "muted":"active");
|
1998-09-12 22:07:47 +00:00
|
|
|
dropit = 1 ;
|
2001-02-02 00:19:25 +00:00
|
|
|
if ( !BDG_MUTED(old) ) {
|
1998-09-12 22:07:47 +00:00
|
|
|
if (++bdg_loops > 10)
|
2001-02-02 00:19:25 +00:00
|
|
|
BDG_MUTE(old) ;
|
1998-09-12 22:07:47 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* now write the source address into the table
|
|
|
|
*/
|
|
|
|
if (bdg_table[index].name == NULL) {
|
|
|
|
DEB(printf("new addr %6D at %d for %s%d\n",
|
|
|
|
eh->ether_shost, ".", index, ifp->if_name, ifp->if_unit);)
|
|
|
|
bcopy(eh->ether_shost, bdg_table[index].etheraddr, 6);
|
|
|
|
bdg_table[index].name = ifp ;
|
|
|
|
}
|
2000-05-14 02:18:43 +00:00
|
|
|
dst = bridge_dst_lookup(eh);
|
1998-09-12 22:07:47 +00:00
|
|
|
/* Return values:
|
|
|
|
* BDG_BCAST, BDG_MCAST, BDG_LOCAL, BDG_UNKNOWN, BDG_DROP, ifp.
|
|
|
|
* For muted interfaces, the first 3 are changed in BDG_LOCAL,
|
|
|
|
* and others to BDG_DROP. Also, for incoming packets, ifp is changed
|
|
|
|
* to BDG_DROP in case ifp == src . These mods are not necessary
|
|
|
|
* for outgoing packets from ether_output().
|
|
|
|
*/
|
|
|
|
BDG_STAT(ifp, BDG_IN);
|
|
|
|
switch ((int)dst) {
|
|
|
|
case (int)BDG_BCAST:
|
|
|
|
case (int)BDG_MCAST:
|
|
|
|
case (int)BDG_LOCAL:
|
|
|
|
case (int)BDG_UNKNOWN:
|
|
|
|
case (int)BDG_DROP:
|
|
|
|
BDG_STAT(ifp, dst);
|
|
|
|
break ;
|
|
|
|
default :
|
|
|
|
if (dst == ifp || dropit )
|
|
|
|
BDG_STAT(ifp, BDG_DROP);
|
|
|
|
else
|
|
|
|
BDG_STAT(ifp, BDG_FORWARD);
|
|
|
|
break ;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ( dropit ) {
|
|
|
|
if (dst == BDG_BCAST || dst == BDG_MCAST || dst == BDG_LOCAL)
|
|
|
|
return BDG_LOCAL ;
|
|
|
|
else
|
|
|
|
return BDG_DROP ;
|
|
|
|
} else {
|
|
|
|
return (dst == ifp ? BDG_DROP : dst ) ;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2000-02-08 14:53:55 +00:00
|
|
|
* Forward to dst, excluding src port and muted interfaces.
|
2001-02-10 00:10:18 +00:00
|
|
|
* If src == NULL, the pkt comes from ether_output, and dst is the real
|
|
|
|
* interface the packet is originally sent to. In this case we must forward
|
|
|
|
* it to the whole cluster. We never call bdg_forward ether_output on
|
|
|
|
* interfaces which are not part of a cluster.
|
|
|
|
*
|
2000-02-08 14:53:55 +00:00
|
|
|
* The packet is freed if possible (i.e. surely not of interest for
|
|
|
|
* the upper layer), otherwise a copy is left for use by the caller
|
2001-02-02 00:19:25 +00:00
|
|
|
* (pointer in m0).
|
2000-02-08 14:53:55 +00:00
|
|
|
*
|
|
|
|
* It would be more efficient to make bdg_forward() always consume
|
|
|
|
* the packet, leaving to the caller the task to check if it needs a copy
|
|
|
|
* and get one in case. As it is now, bdg_forward() can sometimes make
|
|
|
|
* a copy whereas it is not necessary.
|
|
|
|
*
|
2001-01-26 06:47:19 +00:00
|
|
|
* XXX be careful about eh, it can be a pointer into *m
|
1998-09-12 22:07:47 +00:00
|
|
|
*/
|
2001-02-02 00:19:25 +00:00
|
|
|
struct mbuf *
|
|
|
|
bdg_forward(struct mbuf *m0, struct ether_header *const eh, struct ifnet *dst)
|
1998-09-12 22:07:47 +00:00
|
|
|
{
|
2001-02-02 00:19:25 +00:00
|
|
|
struct ifnet *src = m0->m_pkthdr.rcvif; /* could be NULL in output */
|
2000-02-08 14:53:55 +00:00
|
|
|
struct ifnet *ifp, *last = NULL ;
|
2001-02-02 00:19:25 +00:00
|
|
|
int s ;
|
|
|
|
int shared = bdg_copy ; /* someone else is using the mbuf */
|
2000-02-08 14:53:55 +00:00
|
|
|
int once = 0; /* loop only once */
|
2001-02-10 00:10:18 +00:00
|
|
|
struct ifnet *real_dst = dst ; /* real dst from ether_output */
|
|
|
|
#ifdef IPFIREWALL
|
|
|
|
struct ip_fw_chain *rule = NULL ; /* did we match a firewall rule ? */
|
|
|
|
#endif
|
2001-01-26 06:47:19 +00:00
|
|
|
|
|
|
|
/*
|
2001-02-02 00:19:25 +00:00
|
|
|
* XXX eh is usually a pointer within the mbuf (some ethernet drivers
|
2001-01-26 06:47:19 +00:00
|
|
|
* do that), so we better copy it before doing anything with the mbuf,
|
|
|
|
* or we might corrupt the header.
|
|
|
|
*/
|
|
|
|
struct ether_header save_eh = *eh ;
|
|
|
|
|
2001-01-26 19:43:54 +00:00
|
|
|
DEB(quad_t ticks; ticks = rdtsc();)
|
2001-02-10 00:10:18 +00:00
|
|
|
|
|
|
|
#if defined(IPFIREWALL) && defined(DUMMYNET)
|
|
|
|
if (m0->m_type == MT_DUMMYNET) {
|
|
|
|
/* extract info from dummynet header */
|
|
|
|
rule = (struct ip_fw_chain *)(m0->m_data) ;
|
|
|
|
m0 = m0->m_next ;
|
|
|
|
src = m0->m_pkthdr.rcvif;
|
|
|
|
shared = 0 ; /* For sure this is our own mbuf. */
|
|
|
|
} else
|
|
|
|
#endif
|
|
|
|
bdg_thru++; /* only count once */
|
|
|
|
|
|
|
|
if (src == NULL) /* packet from ether_output */
|
|
|
|
dst = bridge_dst_lookup(eh);
|
2000-02-08 14:53:55 +00:00
|
|
|
|
1998-09-12 22:07:47 +00:00
|
|
|
if (dst == BDG_DROP) { /* this should not happen */
|
2000-02-08 14:53:55 +00:00
|
|
|
printf("xx bdg_forward for BDG_DROP\n");
|
2001-02-10 00:10:18 +00:00
|
|
|
m_freem(m0);
|
2001-02-02 00:19:25 +00:00
|
|
|
return NULL;
|
1998-09-12 22:07:47 +00:00
|
|
|
}
|
|
|
|
if (dst == BDG_LOCAL) { /* this should not happen as well */
|
|
|
|
printf("xx ouch, bdg_forward for local pkt\n");
|
2001-02-02 00:19:25 +00:00
|
|
|
return m0;
|
1998-09-12 22:07:47 +00:00
|
|
|
}
|
|
|
|
if (dst == BDG_BCAST || dst == BDG_MCAST || dst == BDG_UNKNOWN) {
|
2001-02-03 11:46:35 +00:00
|
|
|
ifp = TAILQ_FIRST(&ifnet) ; /* scan all ports */
|
1998-09-12 22:07:47 +00:00
|
|
|
once = 0 ;
|
2000-02-08 14:53:55 +00:00
|
|
|
if (dst != BDG_UNKNOWN) /* need a copy for the local stack */
|
2001-02-02 00:19:25 +00:00
|
|
|
shared = 1 ;
|
1998-09-12 22:07:47 +00:00
|
|
|
} else {
|
|
|
|
ifp = dst ;
|
2000-02-08 14:53:55 +00:00
|
|
|
once = 1 ;
|
1998-09-12 22:07:47 +00:00
|
|
|
}
|
2000-02-08 14:53:55 +00:00
|
|
|
if ( (u_int)(ifp) <= (u_int)BDG_FORWARD )
|
|
|
|
panic("bdg_forward: bad dst");
|
|
|
|
|
1999-04-21 18:23:00 +00:00
|
|
|
#ifdef IPFIREWALL
|
1998-09-12 22:07:47 +00:00
|
|
|
/*
|
2001-02-10 00:10:18 +00:00
|
|
|
* Do filtering in a very similar way to what is done in ip_output.
|
|
|
|
* Only if firewall is loaded, enabled, and the packet is not
|
|
|
|
* from ether_output() (src==NULL, or we would filter it twice).
|
|
|
|
* Additional restrictions may apply e.g. non-IP, short packets,
|
|
|
|
* and pkts already gone through a pipe.
|
1998-09-12 22:07:47 +00:00
|
|
|
*/
|
2001-02-10 00:10:18 +00:00
|
|
|
if (ip_fw_chk_ptr && bdg_ipfw != 0 && src != NULL) {
|
2000-02-08 14:53:55 +00:00
|
|
|
struct ip *ip ;
|
2001-02-02 00:19:25 +00:00
|
|
|
int i;
|
1998-09-12 22:07:47 +00:00
|
|
|
|
2001-02-10 00:10:18 +00:00
|
|
|
if (rule != NULL) /* dummynet packet, already partially processed */
|
2000-02-08 14:53:55 +00:00
|
|
|
goto forward; /* HACK! I should obey the fw_one_pass */
|
2001-01-26 06:47:19 +00:00
|
|
|
if (ntohs(save_eh.ether_type) != ETHERTYPE_IP)
|
2000-06-02 22:47:53 +00:00
|
|
|
goto forward ; /* not an IP packet, ipfw is not appropriate */
|
2001-02-02 00:19:25 +00:00
|
|
|
if (m0->m_pkthdr.len < sizeof(struct ip) )
|
2001-01-26 06:47:19 +00:00
|
|
|
goto forward ; /* header too short for an IP pkt, cannot filter */
|
2000-02-08 14:53:55 +00:00
|
|
|
/*
|
2001-02-02 00:19:25 +00:00
|
|
|
* i need some amt of data to be contiguous, and in case others need
|
|
|
|
* the packet (shared==1) also better be in the first mbuf.
|
2000-02-08 14:53:55 +00:00
|
|
|
*/
|
2001-02-02 00:19:25 +00:00
|
|
|
i = min(m0->m_pkthdr.len, max_protohdr) ;
|
|
|
|
if ( shared || m0->m_len < i) {
|
|
|
|
m0 = m_pullup(m0, i) ;
|
|
|
|
if (m0 == NULL) {
|
2000-02-08 14:53:55 +00:00
|
|
|
printf("-- bdg: pullup failed.\n") ;
|
2001-02-02 00:19:25 +00:00
|
|
|
return NULL ;
|
2000-02-08 14:53:55 +00:00
|
|
|
}
|
1998-09-12 22:07:47 +00:00
|
|
|
}
|
2000-02-08 14:53:55 +00:00
|
|
|
|
1999-03-30 23:45:14 +00:00
|
|
|
/*
|
|
|
|
* before calling the firewall, swap fields the same as IP does.
|
|
|
|
* here we assume the pkt is an IP one and the header is contiguous
|
|
|
|
*/
|
2001-02-02 00:19:25 +00:00
|
|
|
ip = mtod(m0, struct ip *);
|
1999-03-30 23:45:14 +00:00
|
|
|
NTOHS(ip->ip_len);
|
|
|
|
NTOHS(ip->ip_off);
|
|
|
|
|
|
|
|
/*
|
2001-02-02 00:19:25 +00:00
|
|
|
* The third parameter to the firewall code is the dst. interface.
|
1999-03-30 23:45:14 +00:00
|
|
|
* Since we apply checks only on input pkts we use NULL.
|
2001-01-26 06:47:19 +00:00
|
|
|
* The firewall knows this is a bridged packet as the cookie ptr
|
|
|
|
* is NULL.
|
1999-03-30 23:45:14 +00:00
|
|
|
*/
|
2001-02-02 00:19:25 +00:00
|
|
|
i = (*ip_fw_chk_ptr)(&ip, 0, NULL, NULL /* cookie */, &m0, &rule, NULL);
|
2001-02-10 00:10:18 +00:00
|
|
|
if ( (i & IP_FW_PORT_DENY_FLAG) || m0 == NULL) /* drop */
|
|
|
|
return m0 ;
|
1999-03-30 23:45:14 +00:00
|
|
|
/*
|
2001-02-10 00:10:18 +00:00
|
|
|
* If we get here, the firewall has passed the pkt, but the mbuf
|
|
|
|
* pointer might have changed. Restore ip and the fields NTOHS()'d.
|
1999-03-30 23:45:14 +00:00
|
|
|
*/
|
2001-02-10 00:10:18 +00:00
|
|
|
ip = mtod(m0, struct ip *);
|
1999-03-30 23:45:14 +00:00
|
|
|
HTONS(ip->ip_len);
|
|
|
|
HTONS(ip->ip_off);
|
2000-02-08 14:53:55 +00:00
|
|
|
|
2001-02-02 00:19:25 +00:00
|
|
|
if (i == 0) /* a PASS rule. */
|
1998-09-12 22:07:47 +00:00
|
|
|
goto forward ;
|
|
|
|
#ifdef DUMMYNET
|
2001-02-10 00:10:18 +00:00
|
|
|
if (i & IP_FW_PORT_DYNT_FLAG) {
|
1998-09-12 22:07:47 +00:00
|
|
|
/*
|
2001-02-10 00:10:18 +00:00
|
|
|
* Pass the pkt to dummynet, which consumes it.
|
|
|
|
* If shared, make a copy and keep the original.
|
2001-02-02 00:19:25 +00:00
|
|
|
* Need to prepend the ethernet header, optimize the common
|
|
|
|
* case of eh pointing already into the original mbuf.
|
1998-09-12 22:07:47 +00:00
|
|
|
*/
|
2001-02-02 00:19:25 +00:00
|
|
|
struct mbuf *m ;
|
|
|
|
if (shared) {
|
|
|
|
m = m_copypacket(m0, M_DONTWAIT);
|
|
|
|
if (m == NULL) {
|
|
|
|
printf("bdg_fwd: copy(1) failed\n");
|
|
|
|
return m0;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
m = m0 ; /* pass the original to dummynet */
|
|
|
|
m0 = NULL ; /* and nothing back to the caller */
|
|
|
|
}
|
|
|
|
if ( (void *)(eh + 1) == (void *)m->m_data) {
|
2001-01-26 06:47:19 +00:00
|
|
|
m->m_data -= ETHER_HDR_LEN ;
|
|
|
|
m->m_len += ETHER_HDR_LEN ;
|
|
|
|
m->m_pkthdr.len += ETHER_HDR_LEN ;
|
|
|
|
bdg_predict++;
|
|
|
|
} else {
|
|
|
|
M_PREPEND(m, ETHER_HDR_LEN, M_DONTWAIT);
|
2001-02-02 00:19:25 +00:00
|
|
|
if (!m && verbose) printf("M_PREPEND failed\n");
|
|
|
|
if (m == NULL) /* nope... */
|
|
|
|
return m0 ;
|
2001-01-26 06:47:19 +00:00
|
|
|
bcopy(&save_eh, mtod(m, struct ether_header *), ETHER_HDR_LEN);
|
2000-11-23 22:25:03 +00:00
|
|
|
}
|
2001-02-10 00:10:18 +00:00
|
|
|
dummynet_io((i & 0xffff),DN_TO_BDG_FWD,m,real_dst,NULL,0,rule,0);
|
2001-02-02 00:19:25 +00:00
|
|
|
return m0 ;
|
1998-09-12 22:07:47 +00:00
|
|
|
}
|
|
|
|
#endif
|
2000-02-08 14:53:55 +00:00
|
|
|
/*
|
|
|
|
* XXX add divert/forward actions...
|
|
|
|
*/
|
1998-09-12 22:07:47 +00:00
|
|
|
/* if none of the above matches, we have to drop the pkt */
|
2000-02-08 14:53:55 +00:00
|
|
|
bdg_ipfw_drops++ ;
|
2000-09-24 04:08:38 +00:00
|
|
|
printf("bdg_forward: No rules match, so dropping packet!\n");
|
2001-02-02 00:19:25 +00:00
|
|
|
return m0 ;
|
1998-09-12 22:07:47 +00:00
|
|
|
}
|
|
|
|
forward:
|
1999-04-21 18:23:00 +00:00
|
|
|
#endif /* IPFIREWALL */
|
2000-02-08 14:53:55 +00:00
|
|
|
/*
|
2001-02-02 00:19:25 +00:00
|
|
|
* Again, bring up the headers in case of shared bufs to avoid
|
|
|
|
* corruptions in the future.
|
2000-02-08 14:53:55 +00:00
|
|
|
*/
|
2001-02-02 00:19:25 +00:00
|
|
|
if ( shared ) {
|
|
|
|
int i = min(m0->m_pkthdr.len, max_protohdr) ;
|
|
|
|
|
|
|
|
m0 = m_pullup(m0, i) ;
|
|
|
|
if (m0 == NULL) {
|
|
|
|
printf("-- bdg: pullup2 failed.\n") ;
|
|
|
|
return NULL ;
|
2000-02-08 14:53:55 +00:00
|
|
|
}
|
|
|
|
}
|
2001-02-10 00:10:18 +00:00
|
|
|
/* now real_dst is used to determine the cluster where to forward */
|
|
|
|
if (src != NULL) /* pkt comes from ether_input */
|
|
|
|
real_dst = src ;
|
2000-02-08 14:53:55 +00:00
|
|
|
for (;;) {
|
2001-02-10 00:10:18 +00:00
|
|
|
if (last) { /* need to forward packet leftover from previous loop */
|
2001-01-26 06:47:19 +00:00
|
|
|
struct mbuf *m ;
|
2001-02-02 00:19:25 +00:00
|
|
|
if (shared == 0 && once ) { /* no need to copy */
|
|
|
|
m = m0 ;
|
|
|
|
m0 = NULL ; /* original is gone */
|
|
|
|
} else {
|
|
|
|
m = m_copypacket(m0, M_DONTWAIT);
|
|
|
|
if (m == NULL) {
|
|
|
|
printf("bdg_forward: sorry, m_copypacket failed!\n");
|
|
|
|
return m0 ; /* the original is still there... */
|
|
|
|
}
|
1998-09-12 22:07:47 +00:00
|
|
|
}
|
|
|
|
/*
|
2001-02-10 00:10:18 +00:00
|
|
|
* Add header (optimized for the common case of eh pointing
|
|
|
|
* already into the mbuf) and execute last part of ether_output:
|
|
|
|
* queue pkt and start output if interface not yet active.
|
2001-01-26 06:47:19 +00:00
|
|
|
*/
|
2001-02-02 00:19:25 +00:00
|
|
|
if ( (void *)(eh + 1) == (void *)m->m_data) {
|
2001-01-26 06:47:19 +00:00
|
|
|
m->m_data -= ETHER_HDR_LEN ;
|
|
|
|
m->m_len += ETHER_HDR_LEN ;
|
|
|
|
m->m_pkthdr.len += ETHER_HDR_LEN ;
|
|
|
|
bdg_predict++;
|
|
|
|
} else {
|
|
|
|
M_PREPEND(m, ETHER_HDR_LEN, M_DONTWAIT);
|
2001-02-02 00:19:25 +00:00
|
|
|
if (!m && verbose) printf("M_PREPEND failed\n");
|
2001-01-26 06:47:19 +00:00
|
|
|
if (m == NULL)
|
2001-02-02 00:19:25 +00:00
|
|
|
return m0;
|
2001-01-26 06:47:19 +00:00
|
|
|
bcopy(&save_eh, mtod(m, struct ether_header *), ETHER_HDR_LEN);
|
|
|
|
}
|
Lock down the network interface queues. The queue mutex must be obtained
before adding/removing packets from the queue. Also, the if_obytes and
if_omcasts fields should only be manipulated under protection of the mutex.
IF_ENQUEUE, IF_PREPEND, and IF_DEQUEUE perform all necessary locking on
the queue. An IF_LOCK macro is provided, as well as the old (mutex-less)
versions of the macros in the form _IF_ENQUEUE, _IF_QFULL, for code which
needs them, but their use is discouraged.
Two new macros are introduced: IF_DRAIN() to drain a queue, and IF_HANDOFF,
which takes care of locking/enqueue, and also statistics updating/start
if necessary.
2000-11-25 07:35:38 +00:00
|
|
|
if (! IF_HANDOFF(&last->if_snd, m, last)) {
|
2000-02-08 14:53:55 +00:00
|
|
|
#if 0
|
2001-02-02 00:19:25 +00:00
|
|
|
BDG_MUTE(last); /* should I also mute ? */
|
2000-02-08 14:53:55 +00:00
|
|
|
#endif
|
1998-09-12 22:07:47 +00:00
|
|
|
}
|
2000-02-08 14:53:55 +00:00
|
|
|
BDG_STAT(last, BDG_OUT);
|
|
|
|
last = NULL ;
|
|
|
|
if (once)
|
|
|
|
break ;
|
1998-09-12 22:07:47 +00:00
|
|
|
}
|
2000-02-08 14:53:55 +00:00
|
|
|
if (ifp == NULL)
|
1998-09-12 22:07:47 +00:00
|
|
|
break ;
|
2001-02-10 00:10:18 +00:00
|
|
|
/*
|
|
|
|
* If the interface is used for bridging, not muted, not full,
|
|
|
|
* up and running, is not the source interface, and belongs to
|
|
|
|
* the same cluster as the 'real_dst', then send here.
|
|
|
|
*/
|
|
|
|
if ( BDG_USED(ifp) && !BDG_MUTED(ifp) && !_IF_QFULL(&ifp->if_snd) &&
|
|
|
|
(ifp->if_flags & (IFF_UP|IFF_RUNNING)) == (IFF_UP|IFF_RUNNING) &&
|
|
|
|
ifp != src && BDG_SAMECLUSTER(ifp, real_dst) )
|
2000-02-08 14:53:55 +00:00
|
|
|
last = ifp ;
|
2001-02-03 11:46:35 +00:00
|
|
|
ifp = TAILQ_NEXT(ifp, if_link) ;
|
2000-02-08 14:53:55 +00:00
|
|
|
if (ifp == NULL)
|
|
|
|
once = 1 ;
|
1998-09-12 22:07:47 +00:00
|
|
|
}
|
2001-01-26 19:43:54 +00:00
|
|
|
DEB(bdg_fw_ticks += (u_long)(rdtsc() - ticks) ; bdg_fw_count++ ;
|
2001-01-26 06:47:19 +00:00
|
|
|
if (bdg_fw_count != 0) bdg_fw_avg = bdg_fw_ticks/bdg_fw_count; )
|
2001-02-02 00:19:25 +00:00
|
|
|
return m0 ;
|
1998-09-12 22:07:47 +00:00
|
|
|
}
|