2 * Copyright (c) 2003 IPNET Internet Communication Company
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 * Author: Ruslan Ermilov <ru@FreeBSD.org>
28 * $FreeBSD: src/sys/netgraph/ng_vlan.c,v 1.5 2007/06/11 15:29:02 imp Exp $
29 * $DragonFly: src/sys/netgraph7/ng_vlan.c,v 1.2 2008/06/26 23:05:35 dillon Exp $
32 #include <sys/param.h>
33 #include <sys/errno.h>
34 #include <sys/kernel.h>
35 #include <sys/malloc.h>
37 #include <sys/queue.h>
38 #include <sys/socket.h>
39 #include <sys/systm.h>
41 #include <net/ethernet.h>
43 #include <net/if_vlan_var.h>
45 #include "ng_message.h"
50 static ng_constructor_t ng_vlan_constructor
;
51 static ng_rcvmsg_t ng_vlan_rcvmsg
;
52 static ng_shutdown_t ng_vlan_shutdown
;
53 static ng_newhook_t ng_vlan_newhook
;
54 static ng_rcvdata_t ng_vlan_rcvdata
;
55 static ng_disconnect_t ng_vlan_disconnect
;
57 /* Parse type for struct ng_vlan_filter. */
58 static const struct ng_parse_struct_field ng_vlan_filter_fields
[] =
59 NG_VLAN_FILTER_FIELDS
;
60 static const struct ng_parse_type ng_vlan_filter_type
= {
61 &ng_parse_struct_type
,
62 &ng_vlan_filter_fields
66 ng_vlan_getTableLength(const struct ng_parse_type
*type
,
67 const u_char
*start
, const u_char
*buf
)
69 const struct ng_vlan_table
*const table
=
70 (const struct ng_vlan_table
*)(buf
- sizeof(u_int32_t
));
75 /* Parse type for struct ng_vlan_table. */
76 static const struct ng_parse_array_info ng_vlan_table_array_info
= {
78 ng_vlan_getTableLength
80 static const struct ng_parse_type ng_vlan_table_array_type
= {
82 &ng_vlan_table_array_info
84 static const struct ng_parse_struct_field ng_vlan_table_fields
[] =
86 static const struct ng_parse_type ng_vlan_table_type
= {
87 &ng_parse_struct_type
,
91 /* List of commands and how to convert arguments to/from ASCII. */
92 static const struct ng_cmdlist ng_vlan_cmdlist
[] = {
104 &ng_parse_hookbuf_type
,
117 static struct ng_type ng_vlan_typestruct
= {
118 .version
= NG_ABI_VERSION
,
119 .name
= NG_VLAN_NODE_TYPE
,
120 .constructor
= ng_vlan_constructor
,
121 .rcvmsg
= ng_vlan_rcvmsg
,
122 .shutdown
= ng_vlan_shutdown
,
123 .newhook
= ng_vlan_newhook
,
124 .rcvdata
= ng_vlan_rcvdata
,
125 .disconnect
= ng_vlan_disconnect
,
126 .cmdlist
= ng_vlan_cmdlist
,
128 NETGRAPH_INIT(vlan
, &ng_vlan_typestruct
);
131 LIST_ENTRY(filter
) next
;
137 #define HASH(id) ((((id) >> 8) ^ ((id) >> 4) ^ (id)) & 0x0f)
138 LIST_HEAD(filterhead
, filter
);
141 hook_p downstream_hook
;
143 struct filterhead hashtable
[HASHSIZE
];
147 static struct filter
*
148 ng_vlan_findentry(priv_p priv
, u_int16_t vlan
)
150 struct filterhead
*chain
= &priv
->hashtable
[HASH(vlan
)];
153 LIST_FOREACH(f
, chain
, next
)
160 ng_vlan_constructor(node_p node
)
165 MALLOC(priv
, priv_p
, sizeof(*priv
), M_NETGRAPH
, M_WAITOK
| M_NULLOK
| M_ZERO
);
168 for (i
= 0; i
< HASHSIZE
; i
++)
169 LIST_INIT(&priv
->hashtable
[i
]);
170 NG_NODE_SET_PRIVATE(node
, priv
);
175 ng_vlan_newhook(node_p node
, hook_p hook
, const char *name
)
177 const priv_p priv
= NG_NODE_PRIVATE(node
);
179 if (strcmp(name
, NG_VLAN_HOOK_DOWNSTREAM
) == 0)
180 priv
->downstream_hook
= hook
;
181 else if (strcmp(name
, NG_VLAN_HOOK_NOMATCH
) == 0)
182 priv
->nomatch_hook
= hook
;
185 * Any other hook name is valid and can
186 * later be associated with a filter rule.
189 NG_HOOK_SET_PRIVATE(hook
, NULL
);
194 ng_vlan_rcvmsg(node_p node
, item_p item
, hook_p lasthook
)
196 const priv_p priv
= NG_NODE_PRIVATE(node
);
198 struct ng_mesg
*msg
, *resp
= NULL
;
199 struct ng_vlan_filter
*vf
;
202 struct ng_vlan_table
*t
;
205 NGI_GET_MSG(item
, msg
);
206 /* Deal with message according to cookie and command. */
207 switch (msg
->header
.typecookie
) {
208 case NGM_VLAN_COOKIE
:
209 switch (msg
->header
.cmd
) {
210 case NGM_VLAN_ADD_FILTER
:
211 /* Check that message is long enough. */
212 if (msg
->header
.arglen
!= sizeof(*vf
)) {
216 vf
= (struct ng_vlan_filter
*)msg
->data
;
217 /* Sanity check the VLAN ID value. */
218 if (vf
->vlan
& ~EVL_VLID_MASK
) {
222 /* Check that a referenced hook exists. */
223 hook
= ng_findhook(node
, vf
->hook
);
228 /* And is not one of the special hooks. */
229 if (hook
== priv
->downstream_hook
||
230 hook
== priv
->nomatch_hook
) {
234 /* And is not already in service. */
235 if (NG_HOOK_PRIVATE(hook
) != NULL
) {
239 /* Check we don't already trap this VLAN. */
240 if (ng_vlan_findentry(priv
, vf
->vlan
)) {
245 MALLOC(f
, struct filter
*, sizeof(*f
),
246 M_NETGRAPH
, M_WAITOK
| M_NULLOK
| M_ZERO
);
251 /* Link filter and hook together. */
254 NG_HOOK_SET_PRIVATE(hook
, f
);
255 /* Register filter in a hash table. */
257 &priv
->hashtable
[HASH(f
->vlan
)], f
, next
);
260 case NGM_VLAN_DEL_FILTER
:
261 /* Check that message is long enough. */
262 if (msg
->header
.arglen
!= NG_HOOKSIZ
) {
266 /* Check that hook exists and is active. */
267 hook
= ng_findhook(node
, (char *)msg
->data
);
269 (f
= NG_HOOK_PRIVATE(hook
)) == NULL
) {
273 /* Purge a rule that refers to this hook. */
274 NG_HOOK_SET_PRIVATE(hook
, NULL
);
275 LIST_REMOVE(f
, next
);
279 case NGM_VLAN_GET_TABLE
:
280 NG_MKRESPONSE(resp
, msg
, sizeof(*t
) +
281 priv
->nent
* sizeof(*t
->filter
), M_WAITOK
| M_NULLOK
);
286 t
= (struct ng_vlan_table
*)resp
->data
;
289 for (i
= 0; i
< HASHSIZE
; i
++) {
290 LIST_FOREACH(f
, &priv
->hashtable
[i
], next
) {
292 strncpy(vf
->hook
, NG_HOOK_NAME(f
->hook
),
298 default: /* Unknown command. */
303 case NGM_FLOW_COOKIE
:
305 struct ng_mesg
*copy
;
306 struct filterhead
*chain
;
310 * Flow control messages should come only
314 if (lasthook
== NULL
)
316 if (lasthook
!= priv
->downstream_hook
)
319 /* Broadcast the event to all uplinks. */
320 for (i
= 0, chain
= priv
->hashtable
; i
< HASHSIZE
;
322 LIST_FOREACH(f
, chain
, next
) {
323 NG_COPYMESSAGE(copy
, msg
, M_WAITOK
| M_NULLOK
);
326 NG_SEND_MSG_HOOK(error
, node
, copy
, f
->hook
, 0);
331 default: /* Unknown type cookie. */
335 NG_RESPOND_MSG(error
, node
, item
, resp
);
341 ng_vlan_rcvdata(hook_p hook
, item_p item
)
343 const priv_p priv
= NG_NODE_PRIVATE(NG_HOOK_NODE(hook
));
344 struct ether_header
*eh
;
345 struct ether_vlan_header
*evl
= NULL
;
351 /* Make sure we have an entire header. */
353 if (m
->m_len
< sizeof(*eh
) &&
354 (m
= m_pullup(m
, sizeof(*eh
))) == NULL
) {
358 eh
= mtod(m
, struct ether_header
*);
359 if (hook
== priv
->downstream_hook
) {
361 * If from downstream, select between a match hook
362 * or the nomatch hook.
364 if (m
->m_flags
& M_VLANTAG
||
365 eh
->ether_type
== htons(ETHERTYPE_VLAN
)) {
366 if (m
->m_flags
& M_VLANTAG
) {
368 * Packet is tagged, m contains a normal
369 * Ethernet frame; tag is stored out-of-band.
371 vlan
= EVL_VLANOFTAG(m
->m_pkthdr
.ether_vtag
);
373 if (m
->m_len
< sizeof(*evl
) &&
374 (m
= m_pullup(m
, sizeof(*evl
))) == NULL
) {
378 evl
= mtod(m
, struct ether_vlan_header
*);
379 vlan
= EVL_VLANOFTAG(ntohs(evl
->evl_tag
));
381 if ((f
= ng_vlan_findentry(priv
, vlan
)) != NULL
) {
382 if (m
->m_flags
& M_VLANTAG
) {
383 m
->m_pkthdr
.ether_vtag
= 0;
384 m
->m_flags
&= ~M_VLANTAG
;
386 evl
->evl_encap_proto
= evl
->evl_proto
;
387 bcopy(mtod(m
, caddr_t
),
389 ETHER_VLAN_ENCAP_LEN
,
391 m_adj(m
, ETHER_VLAN_ENCAP_LEN
);
397 NG_FWD_NEW_DATA(error
, item
, f
->hook
, m
);
399 NG_FWD_NEW_DATA(error
, item
, priv
->nomatch_hook
, m
);
402 * It is heading towards the downstream.
403 * If from nomatch, pass it unmodified.
404 * Otherwise, do the VLAN encapsulation.
406 if (hook
!= priv
->nomatch_hook
) {
407 if ((f
= NG_HOOK_PRIVATE(hook
)) == NULL
) {
412 M_PREPEND(m
, ETHER_VLAN_ENCAP_LEN
, MB_DONTWAIT
);
413 /* M_PREPEND takes care of m_len and m_pkthdr.len. */
414 if (m
== NULL
|| (m
->m_len
< sizeof(*evl
) &&
415 (m
= m_pullup(m
, sizeof(*evl
))) == NULL
)) {
420 * Transform the Ethernet header into an Ethernet header
421 * with 802.1Q encapsulation.
423 bcopy(mtod(m
, char *) + ETHER_VLAN_ENCAP_LEN
,
424 mtod(m
, char *), ETHER_HDR_LEN
);
425 evl
= mtod(m
, struct ether_vlan_header
*);
426 evl
->evl_proto
= evl
->evl_encap_proto
;
427 evl
->evl_encap_proto
= htons(ETHERTYPE_VLAN
);
428 evl
->evl_tag
= htons(f
->vlan
);
430 NG_FWD_NEW_DATA(error
, item
, priv
->downstream_hook
, m
);
436 ng_vlan_shutdown(node_p node
)
438 const priv_p priv
= NG_NODE_PRIVATE(node
);
440 NG_NODE_SET_PRIVATE(node
, NULL
);
442 FREE(priv
, M_NETGRAPH
);
447 ng_vlan_disconnect(hook_p hook
)
449 const priv_p priv
= NG_NODE_PRIVATE(NG_HOOK_NODE(hook
));
452 if (hook
== priv
->downstream_hook
)
453 priv
->downstream_hook
= NULL
;
454 else if (hook
== priv
->nomatch_hook
)
455 priv
->nomatch_hook
= NULL
;
457 /* Purge a rule that refers to this hook. */
458 if ((f
= NG_HOOK_PRIVATE(hook
)) != NULL
) {
459 LIST_REMOVE(f
, next
);
464 NG_HOOK_SET_PRIVATE(hook
, NULL
);
465 if ((NG_NODE_NUMHOOKS(NG_HOOK_NODE(hook
)) == 0) &&
466 (NG_NODE_IS_VALID(NG_HOOK_NODE(hook
))))
467 ng_rmnode_self(NG_HOOK_NODE(hook
));