e3a7aa6f56
- Use counter(9) for rt_pksent (former rt_rmx.rmx_pksent). This removes another cache trashing ++ from packet forwarding path. - Create zini/fini methods for the rtentry UMA zone. Via initialize mutex and counter in them. - Fix reporting of rmx_pksent to routing socket. - Fix netstat(1) to report "Use" both in kvm(3) and sysctl(3) mode. The change is mostly targeted for stable/10 merge. For head, rt_pksent is expected to just disappear. Discussed with: melifaro Sponsored by: Netflix Sponsored by: Nginx, Inc.
346 lines
7.5 KiB
C
346 lines
7.5 KiB
C
/* $KAME: if_faith.c,v 1.23 2001/12/17 13:55:29 sumikawa Exp $ */
|
|
|
|
/*-
|
|
* Copyright (c) 1982, 1986, 1993
|
|
* The Regents of the University of California. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
* may be used to endorse or promote products derived from this software
|
|
* without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*
|
|
* $FreeBSD$
|
|
*/
|
|
/*
|
|
* derived from
|
|
* @(#)if_loop.c 8.1 (Berkeley) 6/10/93
|
|
* Id: if_loop.c,v 1.22 1996/06/19 16:24:10 wollman Exp
|
|
*/
|
|
|
|
/*
|
|
* Loopback interface driver for protocol testing and timing.
|
|
*/
|
|
#include "opt_inet.h"
|
|
#include "opt_inet6.h"
|
|
|
|
#include <sys/param.h>
|
|
#include <sys/systm.h>
|
|
#include <sys/kernel.h>
|
|
#include <sys/mbuf.h>
|
|
#include <sys/module.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/errno.h>
|
|
#include <sys/sockio.h>
|
|
#include <sys/time.h>
|
|
#include <sys/queue.h>
|
|
#include <sys/types.h>
|
|
#include <sys/malloc.h>
|
|
|
|
#include <net/if.h>
|
|
#include <net/if_var.h>
|
|
#include <net/if_clone.h>
|
|
#include <net/if_types.h>
|
|
#include <net/netisr.h>
|
|
#include <net/route.h>
|
|
#include <net/bpf.h>
|
|
#include <net/vnet.h>
|
|
|
|
#ifdef INET
|
|
#include <netinet/in.h>
|
|
#include <netinet/in_systm.h>
|
|
#include <netinet/in_var.h>
|
|
#include <netinet/ip.h>
|
|
#endif
|
|
|
|
#ifdef INET6
|
|
#ifndef INET
|
|
#include <netinet/in.h>
|
|
#endif
|
|
#include <netinet6/in6_var.h>
|
|
#include <netinet/ip6.h>
|
|
#include <netinet6/ip6_var.h>
|
|
#endif
|
|
|
|
struct faith_softc {
|
|
struct ifnet *sc_ifp;
|
|
};
|
|
|
|
static int faithioctl(struct ifnet *, u_long, caddr_t);
|
|
static int faithoutput(struct ifnet *, struct mbuf *, const struct sockaddr *,
|
|
struct route *);
|
|
static void faithrtrequest(int, struct rtentry *, struct rt_addrinfo *);
|
|
#ifdef INET6
|
|
static int faithprefix(struct in6_addr *);
|
|
#endif
|
|
|
|
static int faithmodevent(module_t, int, void *);
|
|
|
|
static const char faithname[] = "faith";
|
|
static MALLOC_DEFINE(M_FAITH, faithname, "Firewall Assisted Tunnel Interface");
|
|
|
|
static int faith_clone_create(struct if_clone *, int, caddr_t);
|
|
static void faith_clone_destroy(struct ifnet *);
|
|
static struct if_clone *faith_cloner;
|
|
|
|
#define FAITHMTU 1500
|
|
|
|
static int
|
|
faithmodevent(mod, type, data)
|
|
module_t mod;
|
|
int type;
|
|
void *data;
|
|
{
|
|
|
|
switch (type) {
|
|
case MOD_LOAD:
|
|
faith_cloner = if_clone_simple(faithname, faith_clone_create,
|
|
faith_clone_destroy, 0);
|
|
#ifdef INET6
|
|
faithprefix_p = faithprefix;
|
|
#endif
|
|
|
|
break;
|
|
case MOD_UNLOAD:
|
|
#ifdef INET6
|
|
faithprefix_p = NULL;
|
|
#endif
|
|
|
|
if_clone_detach(faith_cloner);
|
|
break;
|
|
default:
|
|
return EOPNOTSUPP;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static moduledata_t faith_mod = {
|
|
"if_faith",
|
|
faithmodevent,
|
|
0
|
|
};
|
|
|
|
DECLARE_MODULE(if_faith, faith_mod, SI_SUB_PSEUDO, SI_ORDER_ANY);
|
|
MODULE_VERSION(if_faith, 1);
|
|
|
|
static int
|
|
faith_clone_create(ifc, unit, params)
|
|
struct if_clone *ifc;
|
|
int unit;
|
|
caddr_t params;
|
|
{
|
|
struct ifnet *ifp;
|
|
struct faith_softc *sc;
|
|
|
|
sc = malloc(sizeof(struct faith_softc), M_FAITH, M_WAITOK | M_ZERO);
|
|
ifp = sc->sc_ifp = if_alloc(IFT_FAITH);
|
|
if (ifp == NULL) {
|
|
free(sc, M_FAITH);
|
|
return (ENOSPC);
|
|
}
|
|
|
|
ifp->if_softc = sc;
|
|
if_initname(sc->sc_ifp, faithname, unit);
|
|
|
|
ifp->if_mtu = FAITHMTU;
|
|
/* Change to BROADCAST experimentaly to announce its prefix. */
|
|
ifp->if_flags = /* IFF_LOOPBACK */ IFF_BROADCAST | IFF_MULTICAST;
|
|
ifp->if_ioctl = faithioctl;
|
|
ifp->if_output = faithoutput;
|
|
ifp->if_hdrlen = 0;
|
|
ifp->if_addrlen = 0;
|
|
ifp->if_snd.ifq_maxlen = ifqmaxlen;
|
|
if_attach(ifp);
|
|
bpfattach(ifp, DLT_NULL, sizeof(u_int32_t));
|
|
return (0);
|
|
}
|
|
|
|
static void
|
|
faith_clone_destroy(ifp)
|
|
struct ifnet *ifp;
|
|
{
|
|
struct faith_softc *sc = ifp->if_softc;
|
|
|
|
bpfdetach(ifp);
|
|
if_detach(ifp);
|
|
if_free(ifp);
|
|
free(sc, M_FAITH);
|
|
}
|
|
|
|
static int
|
|
faithoutput(struct ifnet *ifp, struct mbuf *m, const struct sockaddr *dst,
|
|
struct route *ro)
|
|
{
|
|
int isr;
|
|
u_int32_t af;
|
|
struct rtentry *rt = NULL;
|
|
|
|
M_ASSERTPKTHDR(m);
|
|
|
|
if (ro != NULL)
|
|
rt = ro->ro_rt;
|
|
/* BPF writes need to be handled specially. */
|
|
if (dst->sa_family == AF_UNSPEC)
|
|
bcopy(dst->sa_data, &af, sizeof(af));
|
|
else
|
|
af = dst->sa_family;
|
|
|
|
if (bpf_peers_present(ifp->if_bpf))
|
|
bpf_mtap2(ifp->if_bpf, &af, sizeof(af), m);
|
|
|
|
if (rt && rt->rt_flags & (RTF_REJECT|RTF_BLACKHOLE)) {
|
|
m_freem(m);
|
|
return (rt->rt_flags & RTF_BLACKHOLE ? 0 :
|
|
rt->rt_flags & RTF_HOST ? EHOSTUNREACH : ENETUNREACH);
|
|
}
|
|
ifp->if_opackets++;
|
|
ifp->if_obytes += m->m_pkthdr.len;
|
|
switch (af) {
|
|
#ifdef INET
|
|
case AF_INET:
|
|
isr = NETISR_IP;
|
|
break;
|
|
#endif
|
|
#ifdef INET6
|
|
case AF_INET6:
|
|
isr = NETISR_IPV6;
|
|
break;
|
|
#endif
|
|
default:
|
|
m_freem(m);
|
|
return EAFNOSUPPORT;
|
|
}
|
|
|
|
/* XXX do we need more sanity checks? */
|
|
|
|
m->m_pkthdr.rcvif = ifp;
|
|
ifp->if_ipackets++;
|
|
ifp->if_ibytes += m->m_pkthdr.len;
|
|
netisr_dispatch(isr, m);
|
|
return (0);
|
|
}
|
|
|
|
/* ARGSUSED */
|
|
static void
|
|
faithrtrequest(cmd, rt, info)
|
|
int cmd;
|
|
struct rtentry *rt;
|
|
struct rt_addrinfo *info;
|
|
{
|
|
RT_LOCK_ASSERT(rt);
|
|
rt->rt_mtu = rt->rt_ifp->if_mtu;
|
|
}
|
|
|
|
/*
|
|
* Process an ioctl request.
|
|
*/
|
|
/* ARGSUSED */
|
|
static int
|
|
faithioctl(ifp, cmd, data)
|
|
struct ifnet *ifp;
|
|
u_long cmd;
|
|
caddr_t data;
|
|
{
|
|
struct ifaddr *ifa;
|
|
struct ifreq *ifr = (struct ifreq *)data;
|
|
int error = 0;
|
|
|
|
switch (cmd) {
|
|
|
|
case SIOCSIFADDR:
|
|
ifp->if_flags |= IFF_UP;
|
|
ifp->if_drv_flags |= IFF_DRV_RUNNING;
|
|
ifa = (struct ifaddr *)data;
|
|
ifa->ifa_rtrequest = faithrtrequest;
|
|
/*
|
|
* Everything else is done at a higher level.
|
|
*/
|
|
break;
|
|
|
|
case SIOCADDMULTI:
|
|
case SIOCDELMULTI:
|
|
if (ifr == 0) {
|
|
error = EAFNOSUPPORT; /* XXX */
|
|
break;
|
|
}
|
|
switch (ifr->ifr_addr.sa_family) {
|
|
#ifdef INET
|
|
case AF_INET:
|
|
break;
|
|
#endif
|
|
#ifdef INET6
|
|
case AF_INET6:
|
|
break;
|
|
#endif
|
|
|
|
default:
|
|
error = EAFNOSUPPORT;
|
|
break;
|
|
}
|
|
break;
|
|
|
|
#ifdef SIOCSIFMTU
|
|
case SIOCSIFMTU:
|
|
ifp->if_mtu = ifr->ifr_mtu;
|
|
break;
|
|
#endif
|
|
|
|
case SIOCSIFFLAGS:
|
|
break;
|
|
|
|
default:
|
|
error = EINVAL;
|
|
}
|
|
return (error);
|
|
}
|
|
|
|
#ifdef INET6
|
|
/*
|
|
* XXX could be slow
|
|
* XXX could be layer violation to call sys/net from sys/netinet6
|
|
*/
|
|
static int
|
|
faithprefix(in6)
|
|
struct in6_addr *in6;
|
|
{
|
|
struct rtentry *rt;
|
|
struct sockaddr_in6 sin6;
|
|
int ret;
|
|
|
|
if (V_ip6_keepfaith == 0)
|
|
return 0;
|
|
|
|
bzero(&sin6, sizeof(sin6));
|
|
sin6.sin6_family = AF_INET6;
|
|
sin6.sin6_len = sizeof(struct sockaddr_in6);
|
|
sin6.sin6_addr = *in6;
|
|
rt = in6_rtalloc1((struct sockaddr *)&sin6, 0, 0UL, RT_DEFAULT_FIB);
|
|
if (rt && rt->rt_ifp && rt->rt_ifp->if_type == IFT_FAITH &&
|
|
(rt->rt_ifp->if_flags & IFF_UP) != 0)
|
|
ret = 1;
|
|
else
|
|
ret = 0;
|
|
if (rt)
|
|
RTFREE_LOCKED(rt);
|
|
return ret;
|
|
}
|
|
#endif
|