Home | History | Annotate | Line # | Download | only in net
if_ipsec.c revision 1.3.4.4
      1  1.3.4.4  pgoyette /*	$NetBSD: if_ipsec.c,v 1.3.4.4 2018/06/25 07:26:06 pgoyette Exp $  */
      2      1.1  knakahar 
      3      1.1  knakahar /*
      4      1.1  knakahar  * Copyright (c) 2017 Internet Initiative Japan Inc.
      5      1.1  knakahar  * All rights reserved.
      6      1.1  knakahar  *
      7      1.1  knakahar  * Redistribution and use in source and binary forms, with or without
      8      1.1  knakahar  * modification, are permitted provided that the following conditions
      9      1.1  knakahar  * are met:
     10      1.1  knakahar  * 1. Redistributions of source code must retain the above copyright
     11      1.1  knakahar  *    notice, this list of conditions and the following disclaimer.
     12      1.1  knakahar  * 2. Redistributions in binary form must reproduce the above copyright
     13      1.1  knakahar  *    notice, this list of conditions and the following disclaimer in the
     14      1.1  knakahar  *    documentation and/or other materials provided with the distribution.
     15      1.1  knakahar  *
     16      1.1  knakahar  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     17      1.1  knakahar  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     18      1.1  knakahar  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     19      1.1  knakahar  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     20      1.1  knakahar  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     21      1.1  knakahar  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     22      1.1  knakahar  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     23      1.1  knakahar  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     24      1.1  knakahar  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     25      1.1  knakahar  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     26      1.1  knakahar  * POSSIBILITY OF SUCH DAMAGE.
     27      1.1  knakahar  */
     28      1.1  knakahar 
     29      1.1  knakahar #include <sys/cdefs.h>
     30  1.3.4.4  pgoyette __KERNEL_RCSID(0, "$NetBSD: if_ipsec.c,v 1.3.4.4 2018/06/25 07:26:06 pgoyette Exp $");
     31      1.1  knakahar 
     32      1.1  knakahar #ifdef _KERNEL_OPT
     33      1.1  knakahar #include "opt_inet.h"
     34      1.1  knakahar #endif
     35      1.1  knakahar 
     36      1.1  knakahar #include <sys/param.h>
     37      1.1  knakahar #include <sys/systm.h>
     38      1.1  knakahar #include <sys/kernel.h>
     39      1.1  knakahar #include <sys/mbuf.h>
     40      1.1  knakahar #include <sys/socket.h>
     41      1.1  knakahar #include <sys/sockio.h>
     42      1.1  knakahar #include <sys/errno.h>
     43      1.1  knakahar #include <sys/ioctl.h>
     44      1.1  knakahar #include <sys/time.h>
     45      1.1  knakahar #include <sys/syslog.h>
     46      1.1  knakahar #include <sys/cpu.h>
     47      1.1  knakahar #include <sys/kmem.h>
     48      1.1  knakahar #include <sys/mutex.h>
     49      1.1  knakahar #include <sys/pserialize.h>
     50      1.1  knakahar #include <sys/psref.h>
     51      1.1  knakahar 
     52      1.1  knakahar #include <net/if.h>
     53      1.1  knakahar #include <net/if_types.h>
     54      1.1  knakahar #include <net/route.h>
     55      1.1  knakahar #include <net/bpf.h>
     56      1.1  knakahar #include <net/pfkeyv2.h>
     57      1.1  knakahar 
     58      1.1  knakahar #include <netinet/in.h>
     59      1.1  knakahar #include <netinet/in_systm.h>
     60      1.1  knakahar #include <netinet/ip.h>
     61      1.1  knakahar #ifdef	INET
     62      1.1  knakahar #include <netinet/in_var.h>
     63      1.1  knakahar #endif	/* INET */
     64      1.1  knakahar 
     65      1.1  knakahar #ifdef INET6
     66      1.1  knakahar #include <netinet6/in6_var.h>
     67      1.1  knakahar #include <netinet/ip6.h>
     68      1.1  knakahar #include <netinet6/ip6_var.h>
     69      1.1  knakahar #endif /* INET6 */
     70      1.1  knakahar 
     71      1.1  knakahar #include <netinet/ip_encap.h>
     72      1.1  knakahar 
     73      1.1  knakahar #include <net/if_ipsec.h>
     74      1.1  knakahar 
     75      1.1  knakahar #include <net/raw_cb.h>
     76      1.1  knakahar #include <net/pfkeyv2.h>
     77      1.1  knakahar 
     78      1.1  knakahar #include <netipsec/key.h>
     79  1.3.4.2  pgoyette #include <netipsec/keydb.h> /* for union sockaddr_union */
     80      1.1  knakahar #include <netipsec/ipsec.h>
     81      1.1  knakahar #include <netipsec/ipsecif.h>
     82      1.1  knakahar 
     83      1.1  knakahar static void if_ipsec_ro_init_pc(void *, void *, struct cpu_info *);
     84      1.1  knakahar static void if_ipsec_ro_fini_pc(void *, void *, struct cpu_info *);
     85      1.1  knakahar 
     86      1.1  knakahar static int if_ipsec_clone_create(struct if_clone *, int);
     87      1.1  knakahar static int if_ipsec_clone_destroy(struct ifnet *);
     88      1.1  knakahar 
     89      1.1  knakahar static inline int if_ipsec_out_direct(struct ipsec_variant *, struct mbuf *, int);
     90      1.1  knakahar static inline void if_ipsec_in_enqueue(struct mbuf *, int, struct ifnet *);
     91      1.1  knakahar 
     92      1.1  knakahar static int if_ipsec_encap_attach(struct ipsec_variant *);
     93      1.1  knakahar static int if_ipsec_encap_detach(struct ipsec_variant *);
     94      1.1  knakahar static int if_ipsec_set_tunnel(struct ifnet *,
     95      1.1  knakahar     struct sockaddr *, struct sockaddr *);
     96      1.1  knakahar static void if_ipsec_delete_tunnel(struct ifnet *);
     97      1.1  knakahar static int if_ipsec_ensure_flags(struct ifnet *, short);
     98      1.1  knakahar static void if_ipsec_attach0(struct ipsec_softc *);
     99      1.1  knakahar 
    100      1.1  knakahar static int if_ipsec_update_variant(struct ipsec_softc *,
    101      1.1  knakahar     struct ipsec_variant *, struct ipsec_variant *);
    102      1.1  knakahar 
    103      1.1  knakahar /* sadb_msg */
    104      1.1  knakahar static inline void if_ipsec_add_mbuf(struct mbuf *, void *, size_t);
    105      1.1  knakahar static inline void if_ipsec_add_pad(struct mbuf *, size_t);
    106      1.1  knakahar static inline size_t if_ipsec_set_sadb_addr(struct sadb_address *,
    107      1.1  knakahar     struct sockaddr *, int, uint16_t);
    108      1.1  knakahar static inline size_t if_ipsec_set_sadb_src(struct sadb_address *,
    109      1.1  knakahar     struct sockaddr *, int);
    110      1.1  knakahar static inline size_t if_ipsec_set_sadb_dst(struct sadb_address *,
    111      1.1  knakahar     struct sockaddr *, int);
    112      1.1  knakahar static inline size_t if_ipsec_set_sadb_x_policy(struct sadb_x_policy *,
    113  1.3.4.1  pgoyette     struct sadb_x_ipsecrequest *, uint16_t, uint8_t, uint32_t, uint8_t,
    114  1.3.4.1  pgoyette     struct sockaddr *, struct sockaddr *);
    115      1.1  knakahar static inline void if_ipsec_set_sadb_msg(struct sadb_msg *, uint16_t, uint8_t);
    116      1.1  knakahar static inline void if_ipsec_set_sadb_msg_add(struct sadb_msg *, uint16_t);
    117      1.1  knakahar static inline void if_ipsec_set_sadb_msg_del(struct sadb_msg *, uint16_t);
    118      1.1  knakahar /* SPD */
    119      1.1  knakahar static int if_ipsec_share_sp(struct ipsec_variant *);
    120      1.1  knakahar static int if_ipsec_unshare_sp(struct ipsec_variant *);
    121      1.1  knakahar static inline struct secpolicy *if_ipsec_add_sp0(struct sockaddr *,
    122      1.1  knakahar     in_port_t, struct sockaddr *, in_port_t, int, int, int, u_int);
    123      1.1  knakahar static inline int if_ipsec_del_sp0(struct secpolicy *);
    124      1.1  knakahar static int if_ipsec_add_sp(struct ipsec_variant *,
    125      1.1  knakahar     struct sockaddr *, in_port_t, struct sockaddr *, in_port_t);
    126      1.1  knakahar static void if_ipsec_del_sp(struct ipsec_variant *);
    127      1.1  knakahar static int if_ipsec_replace_sp(struct ipsec_softc *, struct ipsec_variant *,
    128      1.1  knakahar     struct ipsec_variant *);
    129      1.1  knakahar 
    130      1.1  knakahar static int if_ipsec_set_addr_port(struct sockaddr *, struct sockaddr *,
    131      1.1  knakahar     in_port_t);
    132      1.1  knakahar #define IF_IPSEC_GATHER_PSRC_ADDR_PORT(var, target)			\
    133      1.1  knakahar 	if_ipsec_set_addr_port(target, (var)->iv_psrc, (var)->iv_sport)
    134      1.1  knakahar #define IF_IPSEC_GATHER_PDST_ADDR_PORT(var, target)			\
    135      1.1  knakahar 	if_ipsec_set_addr_port(target, (var)->iv_pdst, (var)->iv_dport)
    136      1.1  knakahar 
    137      1.1  knakahar /*
    138      1.1  knakahar  * ipsec global variable definitions
    139      1.1  knakahar  */
    140      1.1  knakahar 
    141      1.1  knakahar /* This list is used in ioctl context only. */
    142      1.1  knakahar LIST_HEAD(ipsec_sclist, ipsec_softc);
    143      1.1  knakahar static struct {
    144      1.1  knakahar 	struct ipsec_sclist list;
    145      1.1  knakahar 	kmutex_t lock;
    146      1.1  knakahar } ipsec_softcs __cacheline_aligned;
    147      1.1  knakahar 
    148      1.1  knakahar pserialize_t ipsec_psz __read_mostly;
    149      1.1  knakahar struct psref_class *iv_psref_class __read_mostly;
    150      1.1  knakahar 
    151      1.1  knakahar struct if_clone ipsec_cloner =
    152      1.1  knakahar     IF_CLONE_INITIALIZER("ipsec", if_ipsec_clone_create, if_ipsec_clone_destroy);
    153      1.1  knakahar static int max_ipsec_nesting = MAX_IPSEC_NEST;
    154      1.1  knakahar 
    155      1.1  knakahar /* ARGSUSED */
    156      1.1  knakahar void
    157      1.1  knakahar ipsecifattach(int count)
    158      1.1  knakahar {
    159      1.1  knakahar 
    160      1.1  knakahar 	mutex_init(&ipsec_softcs.lock, MUTEX_DEFAULT, IPL_NONE);
    161      1.1  knakahar 	LIST_INIT(&ipsec_softcs.list);
    162      1.1  knakahar 
    163      1.1  knakahar 	ipsec_psz = pserialize_create();
    164      1.1  knakahar 	iv_psref_class = psref_class_create("ipsecvar", IPL_SOFTNET);
    165      1.1  knakahar 
    166      1.1  knakahar 	if_clone_attach(&ipsec_cloner);
    167      1.1  knakahar }
    168      1.1  knakahar 
    169      1.1  knakahar static int
    170      1.1  knakahar if_ipsec_clone_create(struct if_clone *ifc, int unit)
    171      1.1  knakahar {
    172      1.1  knakahar 	struct ipsec_softc *sc;
    173      1.1  knakahar 	struct ipsec_variant *var;
    174      1.1  knakahar 
    175      1.1  knakahar 	sc = kmem_zalloc(sizeof(*sc), KM_SLEEP);
    176      1.1  knakahar 
    177      1.1  knakahar 	if_initname(&sc->ipsec_if, ifc->ifc_name, unit);
    178      1.1  knakahar 
    179      1.1  knakahar 	if_ipsec_attach0(sc);
    180      1.1  knakahar 
    181      1.1  knakahar 	var = kmem_zalloc(sizeof(*var), KM_SLEEP);
    182      1.1  knakahar 	var->iv_softc = sc;
    183      1.1  knakahar 	psref_target_init(&var->iv_psref, iv_psref_class);
    184      1.1  knakahar 
    185      1.1  knakahar 	sc->ipsec_var = var;
    186      1.1  knakahar 	mutex_init(&sc->ipsec_lock, MUTEX_DEFAULT, IPL_NONE);
    187      1.1  knakahar 	sc->ipsec_ro_percpu = percpu_alloc(sizeof(struct ipsec_ro));
    188      1.1  knakahar 	percpu_foreach(sc->ipsec_ro_percpu, if_ipsec_ro_init_pc, NULL);
    189      1.1  knakahar 
    190      1.1  knakahar 	mutex_enter(&ipsec_softcs.lock);
    191      1.1  knakahar 	LIST_INSERT_HEAD(&ipsec_softcs.list, sc, ipsec_list);
    192      1.1  knakahar 	mutex_exit(&ipsec_softcs.lock);
    193      1.1  knakahar 	return 0;
    194      1.1  knakahar }
    195      1.1  knakahar 
    196      1.1  knakahar static void
    197      1.1  knakahar if_ipsec_attach0(struct ipsec_softc *sc)
    198      1.1  knakahar {
    199      1.1  knakahar 
    200      1.1  knakahar 	sc->ipsec_if.if_addrlen = 0;
    201      1.1  knakahar 	sc->ipsec_if.if_mtu    = IPSEC_MTU;
    202      1.1  knakahar 	sc->ipsec_if.if_flags  = IFF_POINTOPOINT | IFF_MULTICAST;
    203      1.1  knakahar 	/* set ipsec(4) specific default flags. */
    204      1.1  knakahar 	sc->ipsec_if.if_flags  |= IFF_FWD_IPV6;
    205      1.1  knakahar 	sc->ipsec_if.if_extflags = IFEF_NO_LINK_STATE_CHANGE | IFEF_MPSAFE;
    206      1.1  knakahar 	sc->ipsec_if.if_ioctl  = if_ipsec_ioctl;
    207      1.1  knakahar 	sc->ipsec_if.if_output = if_ipsec_output;
    208      1.1  knakahar 	sc->ipsec_if.if_type   = IFT_IPSEC;
    209      1.1  knakahar 	sc->ipsec_if.if_dlt    = DLT_NULL;
    210      1.1  knakahar 	sc->ipsec_if.if_softc  = sc;
    211      1.1  knakahar 	IFQ_SET_READY(&sc->ipsec_if.if_snd);
    212      1.1  knakahar 	if_initialize(&sc->ipsec_if);
    213      1.1  knakahar 	if_alloc_sadl(&sc->ipsec_if);
    214      1.1  knakahar 	bpf_attach(&sc->ipsec_if, DLT_NULL, sizeof(u_int));
    215      1.1  knakahar 	if_register(&sc->ipsec_if);
    216      1.1  knakahar }
    217      1.1  knakahar 
    218      1.1  knakahar static void
    219      1.1  knakahar if_ipsec_ro_init_pc(void *p, void *arg __unused, struct cpu_info *ci __unused)
    220      1.1  knakahar {
    221      1.1  knakahar 	struct ipsec_ro *iro = p;
    222      1.1  knakahar 
    223  1.3.4.3  pgoyette 	iro->ir_lock = mutex_obj_alloc(MUTEX_DEFAULT, IPL_NONE);
    224      1.1  knakahar }
    225      1.1  knakahar 
    226      1.1  knakahar static void
    227      1.1  knakahar if_ipsec_ro_fini_pc(void *p, void *arg __unused, struct cpu_info *ci __unused)
    228      1.1  knakahar {
    229      1.1  knakahar 	struct ipsec_ro *iro = p;
    230      1.1  knakahar 
    231      1.1  knakahar 	rtcache_free(&iro->ir_ro);
    232      1.1  knakahar 
    233  1.3.4.3  pgoyette 	mutex_obj_free(iro->ir_lock);
    234      1.1  knakahar }
    235      1.1  knakahar 
    236      1.1  knakahar static int
    237      1.1  knakahar if_ipsec_clone_destroy(struct ifnet *ifp)
    238      1.1  knakahar {
    239      1.1  knakahar 	struct ipsec_softc *sc = ifp->if_softc;
    240      1.1  knakahar 	struct ipsec_variant *var;
    241      1.1  knakahar 	int bound;
    242      1.1  knakahar 
    243      1.1  knakahar 	mutex_enter(&ipsec_softcs.lock);
    244      1.1  knakahar 	LIST_REMOVE(sc, ipsec_list);
    245      1.1  knakahar 	mutex_exit(&ipsec_softcs.lock);
    246      1.1  knakahar 
    247      1.1  knakahar 	bound = curlwp_bind();
    248      1.1  knakahar 	if_ipsec_delete_tunnel(&sc->ipsec_if);
    249      1.1  knakahar 	curlwp_bindx(bound);
    250      1.1  knakahar 
    251      1.1  knakahar 	bpf_detach(ifp);
    252      1.1  knakahar 	if_detach(ifp);
    253      1.1  knakahar 
    254      1.1  knakahar 	percpu_foreach(sc->ipsec_ro_percpu, if_ipsec_ro_fini_pc, NULL);
    255      1.1  knakahar 	percpu_free(sc->ipsec_ro_percpu, sizeof(struct ipsec_ro));
    256      1.1  knakahar 
    257      1.1  knakahar 	mutex_destroy(&sc->ipsec_lock);
    258      1.1  knakahar 
    259      1.1  knakahar 	var = sc->ipsec_var;
    260      1.1  knakahar 	kmem_free(var, sizeof(*var));
    261      1.1  knakahar 	kmem_free(sc, sizeof(*sc));
    262      1.1  knakahar 
    263      1.1  knakahar 	return 0;
    264      1.1  knakahar }
    265      1.1  knakahar 
    266      1.1  knakahar static inline bool
    267      1.1  knakahar if_ipsec_nat_t(struct ipsec_softc *sc)
    268      1.1  knakahar {
    269      1.1  knakahar 
    270      1.1  knakahar 	return (sc->ipsec_if.if_flags & IFF_NAT_T) != 0;
    271      1.1  knakahar }
    272      1.1  knakahar 
    273      1.1  knakahar static inline bool
    274      1.1  knakahar if_ipsec_fwd_ipv6(struct ipsec_softc *sc)
    275      1.1  knakahar {
    276      1.1  knakahar 
    277      1.1  knakahar 	return (sc->ipsec_if.if_flags & IFF_FWD_IPV6) != 0;
    278      1.1  knakahar }
    279      1.1  knakahar 
    280      1.1  knakahar int
    281      1.1  knakahar if_ipsec_encap_func(struct mbuf *m, int off, int proto, void *arg)
    282      1.1  knakahar {
    283  1.3.4.2  pgoyette 	uint8_t v;
    284      1.1  knakahar 	struct ipsec_softc *sc;
    285      1.1  knakahar 	struct ipsec_variant *var = NULL;
    286      1.1  knakahar 	struct psref psref;
    287      1.1  knakahar 	int ret = 0;
    288      1.1  knakahar 
    289      1.1  knakahar 	sc = arg;
    290      1.1  knakahar 	KASSERT(sc != NULL);
    291      1.1  knakahar 
    292      1.1  knakahar 	if ((sc->ipsec_if.if_flags & IFF_UP) == 0)
    293      1.1  knakahar 		goto out;
    294      1.1  knakahar 
    295      1.1  knakahar 	var = if_ipsec_getref_variant(sc, &psref);
    296      1.1  knakahar 	if (if_ipsec_variant_is_unconfigured(var))
    297      1.1  knakahar 		goto out;
    298      1.1  knakahar 
    299      1.1  knakahar 	switch (proto) {
    300      1.1  knakahar 	case IPPROTO_IPV4:
    301      1.1  knakahar 	case IPPROTO_IPV6:
    302      1.1  knakahar 		break;
    303      1.1  knakahar 	default:
    304      1.1  knakahar 		goto out;
    305      1.1  knakahar 	}
    306      1.1  knakahar 
    307  1.3.4.2  pgoyette 	m_copydata(m, 0, sizeof(v), &v);
    308  1.3.4.2  pgoyette 	v = (v >> 4) & 0xff;  /* Get the IP version number. */
    309      1.1  knakahar 
    310  1.3.4.2  pgoyette 	switch (v) {
    311      1.1  knakahar #ifdef INET
    312  1.3.4.2  pgoyette 	case IPVERSION: {
    313  1.3.4.2  pgoyette 		struct ip ip;
    314  1.3.4.2  pgoyette 
    315  1.3.4.2  pgoyette 		if (m->m_pkthdr.len < sizeof(ip))
    316  1.3.4.2  pgoyette 			goto out;
    317  1.3.4.2  pgoyette 
    318  1.3.4.2  pgoyette 		m_copydata(m, 0, sizeof(ip), &ip);
    319      1.1  knakahar 		if (var->iv_psrc->sa_family != AF_INET ||
    320      1.1  knakahar 		    var->iv_pdst->sa_family != AF_INET)
    321      1.1  knakahar 			goto out;
    322      1.1  knakahar 		ret = ipsecif4_encap_func(m, &ip, var);
    323      1.1  knakahar 		break;
    324  1.3.4.2  pgoyette 	}
    325  1.3.4.2  pgoyette #endif
    326  1.3.4.2  pgoyette #ifdef INET6
    327  1.3.4.2  pgoyette 	case (IPV6_VERSION >> 4): {
    328  1.3.4.2  pgoyette 		struct ip6_hdr ip6;
    329  1.3.4.2  pgoyette 
    330  1.3.4.2  pgoyette 		if (m->m_pkthdr.len < sizeof(ip6))
    331  1.3.4.2  pgoyette 			goto out;
    332  1.3.4.2  pgoyette 
    333  1.3.4.2  pgoyette 		m_copydata(m, 0, sizeof(ip6), &ip6);
    334  1.3.4.2  pgoyette 		if (var->iv_psrc->sa_family != AF_INET6 ||
    335  1.3.4.2  pgoyette 		    var->iv_pdst->sa_family != AF_INET6)
    336  1.3.4.2  pgoyette 			goto out;
    337  1.3.4.2  pgoyette 		ret = ipsecif6_encap_func(m, &ip6, var);
    338  1.3.4.2  pgoyette 		break;
    339  1.3.4.2  pgoyette 	}
    340      1.1  knakahar #endif
    341      1.1  knakahar 	default:
    342      1.1  knakahar 		goto out;
    343      1.1  knakahar 	}
    344      1.1  knakahar 
    345      1.1  knakahar out:
    346      1.1  knakahar 	if (var != NULL)
    347      1.1  knakahar 		if_ipsec_putref_variant(var, &psref);
    348      1.1  knakahar 	return ret;
    349      1.1  knakahar }
    350      1.1  knakahar 
    351      1.1  knakahar /*
    352      1.1  knakahar  * ipsec(4) I/F may cause infinite recursion calls when misconfigured.
    353      1.1  knakahar  * We'll prevent this by introducing upper limit.
    354      1.1  knakahar  */
    355      1.1  knakahar static int
    356      1.1  knakahar if_ipsec_check_nesting(struct ifnet *ifp, struct mbuf *m)
    357      1.1  knakahar {
    358      1.1  knakahar 
    359      1.1  knakahar 	return if_tunnel_check_nesting(ifp, m, max_ipsec_nesting);
    360      1.1  knakahar }
    361      1.1  knakahar 
    362      1.1  knakahar int
    363      1.1  knakahar if_ipsec_output(struct ifnet *ifp, struct mbuf *m, const struct sockaddr *dst,
    364      1.1  knakahar     const struct rtentry *rt)
    365      1.1  knakahar {
    366      1.1  knakahar 	struct ipsec_softc *sc = ifp->if_softc;
    367      1.1  knakahar 	struct ipsec_variant *var;
    368      1.1  knakahar 	struct psref psref;
    369      1.1  knakahar 	int error;
    370      1.1  knakahar 	int bound;
    371      1.1  knakahar 
    372      1.1  knakahar 	IFQ_CLASSIFY(&ifp->if_snd, m, dst->sa_family);
    373      1.1  knakahar 
    374      1.1  knakahar 	error = if_ipsec_check_nesting(ifp, m);
    375      1.1  knakahar 	if (error) {
    376      1.1  knakahar 		m_freem(m);
    377      1.1  knakahar 		goto noref_end;
    378      1.1  knakahar 	}
    379      1.1  knakahar 
    380      1.1  knakahar 	if ((ifp->if_flags & IFF_UP) == 0) {
    381      1.1  knakahar 		m_freem(m);
    382      1.1  knakahar 		error = ENETDOWN;
    383      1.1  knakahar 		goto noref_end;
    384      1.1  knakahar 	}
    385      1.1  knakahar 
    386      1.1  knakahar 
    387      1.1  knakahar 	bound = curlwp_bind();
    388      1.1  knakahar 	var = if_ipsec_getref_variant(sc, &psref);
    389      1.1  knakahar 	if (if_ipsec_variant_is_unconfigured(var)) {
    390      1.1  knakahar 		m_freem(m);
    391      1.1  knakahar 		error = ENETDOWN;
    392      1.1  knakahar 		goto end;
    393      1.1  knakahar 	}
    394      1.1  knakahar 
    395      1.1  knakahar 	m->m_flags &= ~(M_BCAST|M_MCAST);
    396      1.1  knakahar 
    397      1.1  knakahar 	/* use DLT_NULL encapsulation here to pass inner af type */
    398      1.1  knakahar 	M_PREPEND(m, sizeof(int), M_DONTWAIT);
    399      1.1  knakahar 	if (!m) {
    400      1.1  knakahar 		error = ENOBUFS;
    401      1.1  knakahar 		goto end;
    402      1.1  knakahar 	}
    403      1.1  knakahar 	*mtod(m, int *) = dst->sa_family;
    404      1.1  knakahar 
    405      1.1  knakahar #if INET6
    406      1.1  knakahar 	/* drop IPv6 packet if IFF_FWD_IPV6 is not set */
    407      1.1  knakahar 	if (dst->sa_family == AF_INET6 &&
    408      1.1  knakahar 	    !if_ipsec_fwd_ipv6(sc)) {
    409      1.1  knakahar 		/*
    410      1.1  knakahar 		 * IPv6 packet is not allowed to forward,that is not error.
    411      1.1  knakahar 		 */
    412      1.1  knakahar 		error = 0;
    413      1.1  knakahar 		IF_DROP(&ifp->if_snd);
    414      1.1  knakahar 		m_freem(m);
    415      1.1  knakahar 		goto end;
    416      1.1  knakahar 	}
    417      1.1  knakahar #endif
    418      1.1  knakahar 
    419      1.1  knakahar 	error = if_ipsec_out_direct(var, m, dst->sa_family);
    420      1.1  knakahar 
    421      1.1  knakahar end:
    422      1.1  knakahar 	if_ipsec_putref_variant(var, &psref);
    423      1.1  knakahar 	curlwp_bindx(bound);
    424      1.1  knakahar noref_end:
    425      1.1  knakahar 	if (error)
    426      1.1  knakahar 		ifp->if_oerrors++;
    427      1.1  knakahar 
    428      1.1  knakahar 	return error;
    429      1.1  knakahar }
    430      1.1  knakahar 
    431      1.1  knakahar static inline int
    432      1.1  knakahar if_ipsec_out_direct(struct ipsec_variant *var, struct mbuf *m, int family)
    433      1.1  knakahar {
    434      1.1  knakahar 	struct ifnet *ifp = &var->iv_softc->ipsec_if;
    435      1.1  knakahar 	int error;
    436      1.1  knakahar 	int len;
    437      1.1  knakahar 
    438      1.1  knakahar 	KASSERT(if_ipsec_heldref_variant(var));
    439      1.1  knakahar 	KASSERT(var->iv_output != NULL);
    440      1.1  knakahar 
    441      1.1  knakahar 	len = m->m_pkthdr.len;
    442      1.1  knakahar 
    443      1.1  knakahar 	/* input DLT_NULL frame to BPF */
    444      1.1  knakahar 	bpf_mtap(ifp, m);
    445      1.1  knakahar 
    446      1.1  knakahar 	/* grab and chop off inner af type */
    447      1.1  knakahar 	/* XXX need pullup? */
    448      1.1  knakahar 	m_adj(m, sizeof(int));
    449      1.1  knakahar 
    450      1.1  knakahar 	error = var->iv_output(var, family, m);
    451      1.1  knakahar 	if (error)
    452      1.1  knakahar 		return error;
    453      1.1  knakahar 
    454      1.1  knakahar 	ifp->if_opackets++;
    455      1.1  knakahar 	ifp->if_obytes += len;
    456      1.1  knakahar 
    457      1.1  knakahar 	return 0;
    458      1.1  knakahar }
    459      1.1  knakahar 
    460      1.1  knakahar void
    461      1.1  knakahar if_ipsec_input(struct mbuf *m, int af, struct ifnet *ifp)
    462      1.1  knakahar {
    463      1.1  knakahar 
    464      1.1  knakahar 	KASSERT(ifp != NULL);
    465      1.1  knakahar 
    466      1.1  knakahar 	m_set_rcvif(m, ifp);
    467      1.1  knakahar 
    468      1.1  knakahar 	bpf_mtap_af(ifp, af, m);
    469      1.1  knakahar 
    470      1.1  knakahar 	if_ipsec_in_enqueue(m, af, ifp);
    471      1.1  knakahar 
    472      1.1  knakahar 	return;
    473      1.1  knakahar }
    474      1.1  knakahar 
    475      1.1  knakahar static inline void
    476      1.1  knakahar if_ipsec_in_enqueue(struct mbuf *m, int af, struct ifnet *ifp)
    477      1.1  knakahar {
    478      1.1  knakahar 	pktqueue_t *pktq;
    479      1.1  knakahar 	int pktlen;
    480      1.1  knakahar 
    481      1.1  knakahar 	/*
    482      1.1  knakahar 	 * Put the packet to the network layer input queue according to the
    483      1.1  knakahar 	 * specified address family.
    484      1.1  knakahar 	 */
    485      1.1  knakahar 	switch (af) {
    486      1.1  knakahar #ifdef INET
    487      1.1  knakahar 	case AF_INET:
    488      1.1  knakahar 		pktq = ip_pktq;
    489      1.1  knakahar 		break;
    490      1.1  knakahar #endif
    491      1.1  knakahar #ifdef INET6
    492      1.1  knakahar 	case AF_INET6:
    493      1.1  knakahar 		pktq = ip6_pktq;
    494      1.1  knakahar 		break;
    495      1.1  knakahar #endif
    496      1.1  knakahar 	default:
    497      1.1  knakahar 		ifp->if_ierrors++;
    498      1.1  knakahar 		m_freem(m);
    499      1.1  knakahar 		return;
    500      1.1  knakahar 	}
    501      1.1  knakahar 
    502      1.1  knakahar #if 1
    503      1.1  knakahar 	const u_int h = curcpu()->ci_index;
    504      1.1  knakahar #else
    505      1.1  knakahar 	const uint32_t h = pktq_rps_hash(m);
    506      1.1  knakahar #endif
    507      1.1  knakahar 	pktlen = m->m_pkthdr.len;
    508      1.1  knakahar 	if (__predict_true(pktq_enqueue(pktq, m, h))) {
    509      1.1  knakahar 		ifp->if_ibytes += pktlen;
    510      1.1  knakahar 		ifp->if_ipackets++;
    511      1.1  knakahar 	} else {
    512      1.1  knakahar 		m_freem(m);
    513      1.1  knakahar 	}
    514      1.1  knakahar 
    515      1.1  knakahar 	return;
    516      1.1  knakahar }
    517      1.1  knakahar 
    518      1.1  knakahar static inline int
    519      1.1  knakahar if_ipsec_check_salen(struct sockaddr *addr)
    520      1.1  knakahar {
    521      1.1  knakahar 
    522      1.1  knakahar 	switch (addr->sa_family) {
    523      1.1  knakahar #ifdef INET
    524      1.1  knakahar 	case AF_INET:
    525      1.1  knakahar 		if (addr->sa_len != sizeof(struct sockaddr_in))
    526      1.1  knakahar 			return EINVAL;
    527      1.1  knakahar 		break;
    528      1.1  knakahar #endif /* INET */
    529      1.1  knakahar #ifdef INET6
    530      1.1  knakahar 	case AF_INET6:
    531      1.1  knakahar 		if (addr->sa_len != sizeof(struct sockaddr_in6))
    532      1.1  knakahar 			return EINVAL;
    533      1.1  knakahar 		break;
    534      1.1  knakahar #endif /* INET6 */
    535      1.1  knakahar 	default:
    536      1.1  knakahar 		return EAFNOSUPPORT;
    537      1.1  knakahar 	}
    538      1.1  knakahar 
    539      1.1  knakahar 	return 0;
    540      1.1  knakahar }
    541      1.1  knakahar 
    542      1.1  knakahar /* XXX how should we handle IPv6 scope on SIOC[GS]IFPHYADDR? */
    543      1.1  knakahar int
    544      1.1  knakahar if_ipsec_ioctl(struct ifnet *ifp, u_long cmd, void *data)
    545      1.1  knakahar {
    546      1.1  knakahar 	struct ipsec_softc *sc  = ifp->if_softc;
    547      1.1  knakahar 	struct ipsec_variant *var = NULL;
    548      1.1  knakahar 	struct ifreq     *ifr = (struct ifreq*)data;
    549      1.1  knakahar 	struct ifaddr    *ifa = (struct ifaddr*)data;
    550      1.1  knakahar 	int error = 0, size;
    551      1.1  knakahar 	struct sockaddr *dst, *src;
    552      1.1  knakahar 	u_long mtu;
    553      1.1  knakahar 	short oflags = ifp->if_flags;
    554      1.1  knakahar 	int bound;
    555      1.1  knakahar 	struct psref psref;
    556      1.1  knakahar 
    557      1.1  knakahar 	switch (cmd) {
    558      1.1  knakahar 	case SIOCINITIFADDR:
    559      1.1  knakahar 		ifp->if_flags |= IFF_UP;
    560      1.1  knakahar 		ifa->ifa_rtrequest = p2p_rtrequest;
    561      1.1  knakahar 		break;
    562      1.1  knakahar 
    563      1.1  knakahar 	case SIOCSIFDSTADDR:
    564      1.1  knakahar 		break;
    565      1.1  knakahar 
    566      1.1  knakahar 	case SIOCADDMULTI:
    567      1.1  knakahar 	case SIOCDELMULTI:
    568      1.1  knakahar 		switch (ifr->ifr_addr.sa_family) {
    569      1.1  knakahar #ifdef INET
    570      1.1  knakahar 		case AF_INET:	/* IP supports Multicast */
    571      1.1  knakahar 			break;
    572      1.1  knakahar #endif /* INET */
    573      1.1  knakahar #ifdef INET6
    574      1.1  knakahar 		case AF_INET6:	/* IP6 supports Multicast */
    575      1.1  knakahar 			break;
    576      1.1  knakahar #endif /* INET6 */
    577      1.1  knakahar 		default:  /* Other protocols doesn't support Multicast */
    578      1.1  knakahar 			error = EAFNOSUPPORT;
    579      1.1  knakahar 			break;
    580      1.1  knakahar 		}
    581      1.1  knakahar 		break;
    582      1.1  knakahar 
    583      1.1  knakahar 	case SIOCSIFMTU:
    584      1.1  knakahar 		mtu = ifr->ifr_mtu;
    585      1.1  knakahar 		if (mtu < IPSEC_MTU_MIN || mtu > IPSEC_MTU_MAX)
    586      1.1  knakahar 			return EINVAL;
    587      1.1  knakahar 		else if ((error = ifioctl_common(ifp, cmd, data)) == ENETRESET)
    588      1.1  knakahar 			error = 0;
    589      1.1  knakahar 		break;
    590      1.1  knakahar 
    591      1.1  knakahar #ifdef INET
    592      1.1  knakahar 	case SIOCSIFPHYADDR:
    593      1.1  knakahar #endif
    594      1.1  knakahar #ifdef INET6
    595      1.1  knakahar 	case SIOCSIFPHYADDR_IN6:
    596      1.1  knakahar #endif /* INET6 */
    597      1.1  knakahar 	case SIOCSLIFPHYADDR:
    598      1.1  knakahar 		switch (cmd) {
    599      1.1  knakahar #ifdef INET
    600      1.1  knakahar 		case SIOCSIFPHYADDR:
    601      1.1  knakahar 			src = (struct sockaddr *)
    602      1.1  knakahar 				&(((struct in_aliasreq *)data)->ifra_addr);
    603      1.1  knakahar 			dst = (struct sockaddr *)
    604      1.1  knakahar 				&(((struct in_aliasreq *)data)->ifra_dstaddr);
    605      1.1  knakahar 			break;
    606      1.1  knakahar #endif /* INET */
    607      1.1  knakahar #ifdef INET6
    608      1.1  knakahar 		case SIOCSIFPHYADDR_IN6:
    609      1.1  knakahar 			src = (struct sockaddr *)
    610      1.1  knakahar 				&(((struct in6_aliasreq *)data)->ifra_addr);
    611      1.1  knakahar 			dst = (struct sockaddr *)
    612      1.1  knakahar 				&(((struct in6_aliasreq *)data)->ifra_dstaddr);
    613      1.1  knakahar 			break;
    614      1.1  knakahar #endif /* INET6 */
    615      1.1  knakahar 		case SIOCSLIFPHYADDR:
    616      1.1  knakahar 			src = (struct sockaddr *)
    617      1.1  knakahar 				&(((struct if_laddrreq *)data)->addr);
    618      1.1  knakahar 			dst = (struct sockaddr *)
    619      1.1  knakahar 				&(((struct if_laddrreq *)data)->dstaddr);
    620      1.1  knakahar 			break;
    621      1.1  knakahar 		default:
    622      1.1  knakahar 			return EINVAL;
    623      1.1  knakahar 		}
    624      1.1  knakahar 
    625      1.1  knakahar 		/* sa_family must be equal */
    626      1.1  knakahar 		if (src->sa_family != dst->sa_family)
    627      1.1  knakahar 			return EINVAL;
    628      1.1  knakahar 
    629      1.1  knakahar 		error = if_ipsec_check_salen(src);
    630      1.1  knakahar 		if (error)
    631      1.1  knakahar 			return error;
    632      1.1  knakahar 		error = if_ipsec_check_salen(dst);
    633      1.1  knakahar 		if (error)
    634      1.1  knakahar 			return error;
    635      1.1  knakahar 
    636      1.1  knakahar 		/* check sa_family looks sane for the cmd */
    637      1.1  knakahar 		switch (cmd) {
    638      1.1  knakahar #ifdef INET
    639      1.1  knakahar 		case SIOCSIFPHYADDR:
    640      1.1  knakahar 			if (src->sa_family == AF_INET)
    641      1.1  knakahar 				break;
    642      1.1  knakahar 			return EAFNOSUPPORT;
    643      1.1  knakahar #endif /* INET */
    644      1.1  knakahar #ifdef INET6
    645      1.1  knakahar 		case SIOCSIFPHYADDR_IN6:
    646      1.1  knakahar 			if (src->sa_family == AF_INET6)
    647      1.1  knakahar 				break;
    648      1.1  knakahar 			return EAFNOSUPPORT;
    649      1.1  knakahar #endif /* INET6 */
    650      1.1  knakahar 		case SIOCSLIFPHYADDR:
    651      1.1  knakahar 			/* checks done in the above */
    652      1.1  knakahar 			break;
    653      1.1  knakahar 		}
    654      1.1  knakahar 		/*
    655      1.1  knakahar 		 * calls if_ipsec_getref_variant() for other softcs to check
    656      1.1  knakahar 		 * address pair duplicattion
    657      1.1  knakahar 		 */
    658      1.1  knakahar 		bound = curlwp_bind();
    659      1.1  knakahar 		error = if_ipsec_set_tunnel(&sc->ipsec_if, src, dst);
    660      1.1  knakahar 		if (error)
    661      1.1  knakahar 			goto bad;
    662  1.3.4.2  pgoyette 		curlwp_bindx(bound);
    663      1.1  knakahar 		break;
    664      1.1  knakahar 
    665      1.1  knakahar 	case SIOCDIFPHYADDR:
    666      1.1  knakahar 		bound = curlwp_bind();
    667      1.1  knakahar 		if_ipsec_delete_tunnel(&sc->ipsec_if);
    668      1.1  knakahar 		curlwp_bindx(bound);
    669      1.1  knakahar 		break;
    670      1.1  knakahar 
    671      1.1  knakahar 	case SIOCGIFPSRCADDR:
    672      1.1  knakahar #ifdef INET6
    673      1.1  knakahar 	case SIOCGIFPSRCADDR_IN6:
    674      1.1  knakahar #endif /* INET6 */
    675      1.1  knakahar 		bound = curlwp_bind();
    676      1.1  knakahar 		var = if_ipsec_getref_variant(sc, &psref);
    677      1.1  knakahar 		if (var->iv_psrc == NULL) {
    678      1.1  knakahar 			error = EADDRNOTAVAIL;
    679      1.1  knakahar 			goto bad;
    680      1.1  knakahar 		}
    681      1.1  knakahar 		src = var->iv_psrc;
    682      1.1  knakahar 		switch (cmd) {
    683      1.1  knakahar #ifdef INET
    684      1.1  knakahar 		case SIOCGIFPSRCADDR:
    685      1.1  knakahar 			dst = &ifr->ifr_addr;
    686      1.1  knakahar 			size = sizeof(ifr->ifr_addr);
    687      1.1  knakahar 			break;
    688      1.1  knakahar #endif /* INET */
    689      1.1  knakahar #ifdef INET6
    690      1.1  knakahar 		case SIOCGIFPSRCADDR_IN6:
    691      1.1  knakahar 			dst = (struct sockaddr *)
    692      1.1  knakahar 				&(((struct in6_ifreq *)data)->ifr_addr);
    693      1.1  knakahar 			size = sizeof(((struct in6_ifreq *)data)->ifr_addr);
    694      1.1  knakahar 			break;
    695      1.1  knakahar #endif /* INET6 */
    696      1.1  knakahar 		default:
    697      1.1  knakahar 			error = EADDRNOTAVAIL;
    698      1.1  knakahar 			goto bad;
    699      1.1  knakahar 		}
    700      1.1  knakahar 		if (src->sa_len > size) {
    701      1.1  knakahar 			error = EINVAL;
    702      1.1  knakahar 			goto bad;
    703      1.1  knakahar 		}
    704      1.1  knakahar 		error = IF_IPSEC_GATHER_PSRC_ADDR_PORT(var, dst);
    705      1.1  knakahar 		if (error)
    706      1.1  knakahar 			goto bad;
    707      1.1  knakahar 		if_ipsec_putref_variant(var, &psref);
    708      1.1  knakahar 		curlwp_bindx(bound);
    709      1.1  knakahar 		break;
    710      1.1  knakahar 
    711      1.1  knakahar 	case SIOCGIFPDSTADDR:
    712      1.1  knakahar #ifdef INET6
    713      1.1  knakahar 	case SIOCGIFPDSTADDR_IN6:
    714      1.1  knakahar #endif /* INET6 */
    715      1.1  knakahar 		bound = curlwp_bind();
    716      1.1  knakahar 		var = if_ipsec_getref_variant(sc, &psref);
    717      1.1  knakahar 		if (var->iv_pdst == NULL) {
    718      1.1  knakahar 			error = EADDRNOTAVAIL;
    719      1.1  knakahar 			goto bad;
    720      1.1  knakahar 		}
    721      1.1  knakahar 		src = var->iv_pdst;
    722      1.1  knakahar 		switch (cmd) {
    723      1.1  knakahar #ifdef INET
    724      1.1  knakahar 		case SIOCGIFPDSTADDR:
    725      1.1  knakahar 			dst = &ifr->ifr_addr;
    726      1.1  knakahar 			size = sizeof(ifr->ifr_addr);
    727      1.1  knakahar 			break;
    728      1.1  knakahar #endif /* INET */
    729      1.1  knakahar #ifdef INET6
    730      1.1  knakahar 		case SIOCGIFPDSTADDR_IN6:
    731      1.1  knakahar 			dst = (struct sockaddr *)
    732      1.1  knakahar 				&(((struct in6_ifreq *)data)->ifr_addr);
    733      1.1  knakahar 			size = sizeof(((struct in6_ifreq *)data)->ifr_addr);
    734      1.1  knakahar 			break;
    735      1.1  knakahar #endif /* INET6 */
    736      1.1  knakahar 		default:
    737      1.1  knakahar 			error = EADDRNOTAVAIL;
    738      1.1  knakahar 			goto bad;
    739      1.1  knakahar 		}
    740      1.1  knakahar 		if (src->sa_len > size) {
    741      1.1  knakahar 			error = EINVAL;
    742      1.1  knakahar 			goto bad;
    743      1.1  knakahar 		}
    744      1.1  knakahar 		error = IF_IPSEC_GATHER_PDST_ADDR_PORT(var, dst);
    745      1.1  knakahar 		if (error)
    746      1.1  knakahar 			goto bad;
    747      1.1  knakahar 		if_ipsec_putref_variant(var, &psref);
    748      1.1  knakahar 		curlwp_bindx(bound);
    749      1.1  knakahar 		break;
    750      1.1  knakahar 
    751      1.1  knakahar 	case SIOCGLIFPHYADDR:
    752      1.1  knakahar 		bound = curlwp_bind();
    753      1.1  knakahar 		var = if_ipsec_getref_variant(sc, &psref);
    754      1.1  knakahar 		if (if_ipsec_variant_is_unconfigured(var)) {
    755      1.1  knakahar 			error = EADDRNOTAVAIL;
    756      1.1  knakahar 			goto bad;
    757      1.1  knakahar 		}
    758      1.1  knakahar 
    759      1.1  knakahar 		/* copy src */
    760      1.1  knakahar 		src = var->iv_psrc;
    761      1.1  knakahar 		dst = (struct sockaddr *)
    762      1.1  knakahar 			&(((struct if_laddrreq *)data)->addr);
    763      1.1  knakahar 		size = sizeof(((struct if_laddrreq *)data)->addr);
    764      1.1  knakahar 		if (src->sa_len > size) {
    765      1.1  knakahar 			error = EINVAL;
    766      1.1  knakahar 			goto bad;
    767      1.1  knakahar 		}
    768      1.1  knakahar 		error = IF_IPSEC_GATHER_PSRC_ADDR_PORT(var, dst);
    769      1.1  knakahar 		if (error)
    770      1.1  knakahar 			goto bad;
    771      1.1  knakahar 
    772      1.1  knakahar 		/* copy dst */
    773      1.1  knakahar 		src = var->iv_pdst;
    774      1.1  knakahar 		dst = (struct sockaddr *)
    775      1.1  knakahar 			&(((struct if_laddrreq *)data)->dstaddr);
    776      1.1  knakahar 		size = sizeof(((struct if_laddrreq *)data)->dstaddr);
    777      1.1  knakahar 		if (src->sa_len > size) {
    778      1.1  knakahar 			error = EINVAL;
    779      1.1  knakahar 			goto bad;
    780      1.1  knakahar 		}
    781      1.1  knakahar 		error = IF_IPSEC_GATHER_PDST_ADDR_PORT(var, dst);
    782      1.1  knakahar 		if (error)
    783      1.1  knakahar 			goto bad;
    784      1.1  knakahar 		if_ipsec_putref_variant(var, &psref);
    785      1.1  knakahar 		curlwp_bindx(bound);
    786      1.1  knakahar 		break;
    787      1.1  knakahar 
    788      1.1  knakahar 	default:
    789      1.1  knakahar 		error = ifioctl_common(ifp, cmd, data);
    790      1.1  knakahar 		if (!error) {
    791      1.1  knakahar 			bound = curlwp_bind();
    792      1.1  knakahar 			error = if_ipsec_ensure_flags(&sc->ipsec_if, oflags);
    793      1.1  knakahar 			if (error)
    794      1.1  knakahar 				goto bad;
    795  1.3.4.2  pgoyette 			curlwp_bindx(bound);
    796      1.1  knakahar 		}
    797      1.1  knakahar 		break;
    798      1.1  knakahar 	}
    799      1.1  knakahar 	return error;
    800      1.1  knakahar 
    801      1.1  knakahar bad:
    802      1.1  knakahar 	if (var != NULL)
    803      1.1  knakahar 		if_ipsec_putref_variant(var, &psref);
    804      1.1  knakahar 	curlwp_bindx(bound);
    805      1.1  knakahar 
    806      1.1  knakahar 	return error;
    807      1.1  knakahar }
    808      1.1  knakahar 
    809      1.1  knakahar struct encap_funcs {
    810      1.3       mrg #ifdef INET
    811      1.1  knakahar 	int (*ef_inet)(struct ipsec_variant *);
    812      1.3       mrg #endif
    813      1.3       mrg #ifdef INET6
    814      1.1  knakahar 	int (*ef_inet6)(struct ipsec_variant *);
    815      1.3       mrg #endif
    816      1.1  knakahar };
    817      1.1  knakahar 
    818      1.1  knakahar static struct encap_funcs ipsec_encap_attach = {
    819      1.3       mrg #ifdef INET
    820      1.1  knakahar 	.ef_inet = ipsecif4_attach,
    821      1.3       mrg #endif
    822      1.3       mrg #ifdef INET6
    823      1.1  knakahar 	.ef_inet6 = &ipsecif6_attach,
    824      1.3       mrg #endif
    825      1.1  knakahar };
    826      1.1  knakahar 
    827      1.1  knakahar static struct encap_funcs ipsec_encap_detach = {
    828      1.3       mrg #ifdef INET
    829      1.1  knakahar 	.ef_inet = ipsecif4_detach,
    830      1.3       mrg #endif
    831      1.3       mrg #ifdef INET6
    832      1.1  knakahar 	.ef_inet6 = &ipsecif6_detach,
    833      1.3       mrg #endif
    834      1.1  knakahar };
    835      1.1  knakahar 
    836      1.1  knakahar static int
    837      1.1  knakahar if_ipsec_encap_common(struct ipsec_variant *var, struct encap_funcs *funcs)
    838      1.1  knakahar {
    839      1.1  knakahar 	int error;
    840      1.1  knakahar 
    841      1.1  knakahar 	KASSERT(var != NULL);
    842      1.1  knakahar 	KASSERT(if_ipsec_variant_is_configured(var));
    843      1.1  knakahar 
    844      1.1  knakahar 	switch (var->iv_psrc->sa_family) {
    845      1.1  knakahar #ifdef INET
    846      1.1  knakahar 	case AF_INET:
    847      1.1  knakahar 		error = (funcs->ef_inet)(var);
    848      1.1  knakahar 		break;
    849      1.1  knakahar #endif /* INET */
    850      1.1  knakahar #ifdef INET6
    851      1.1  knakahar 	case AF_INET6:
    852      1.1  knakahar 		error = (funcs->ef_inet6)(var);
    853      1.1  knakahar 		break;
    854      1.1  knakahar #endif /* INET6 */
    855      1.1  knakahar 	default:
    856      1.1  knakahar 		error = EINVAL;
    857      1.1  knakahar 		break;
    858      1.1  knakahar 	}
    859      1.1  knakahar 
    860      1.1  knakahar 	return error;
    861      1.1  knakahar }
    862      1.1  knakahar 
    863      1.1  knakahar static int
    864      1.1  knakahar if_ipsec_encap_attach(struct ipsec_variant *var)
    865      1.1  knakahar {
    866      1.1  knakahar 
    867      1.1  knakahar 	return if_ipsec_encap_common(var, &ipsec_encap_attach);
    868      1.1  knakahar }
    869      1.1  knakahar 
    870      1.1  knakahar static int
    871      1.1  knakahar if_ipsec_encap_detach(struct ipsec_variant *var)
    872      1.1  knakahar {
    873      1.1  knakahar 
    874      1.1  knakahar 	return if_ipsec_encap_common(var, &ipsec_encap_detach);
    875      1.1  knakahar }
    876      1.1  knakahar 
    877      1.1  knakahar /*
    878      1.1  knakahar  * Validate and set ipsec(4) I/F configurations.
    879      1.1  knakahar  *     (1) validate
    880      1.1  knakahar  *         (1-1) Check the argument src and dst address pair will change
    881      1.1  knakahar  *               configuration from current src and dst address pair.
    882      1.1  knakahar  *         (1-2) Check any ipsec(4) I/F uses duplicated src and dst address pair
    883      1.1  knakahar  *               with argument src and dst address pair, except for NAT-T shared
    884      1.1  knakahar  *               tunnels.
    885      1.1  knakahar  *     (2) set
    886      1.1  knakahar  *         (2-1) Create variant for new configuration.
    887      1.1  knakahar  *         (2-2) Create temporary "null" variant used to avoid to access
    888      1.1  knakahar  *               dangling variant while SPs are deleted and added.
    889      1.1  knakahar  *         (2-3) Swap variant include its SPs.
    890      1.1  knakahar  *         (2-4) Cleanup last configurations.
    891      1.1  knakahar  */
    892      1.1  knakahar static int
    893      1.1  knakahar if_ipsec_set_tunnel(struct ifnet *ifp,
    894      1.1  knakahar     struct sockaddr *src, struct sockaddr *dst)
    895      1.1  knakahar {
    896      1.1  knakahar 	struct ipsec_softc *sc = ifp->if_softc;
    897      1.1  knakahar 	struct ipsec_softc *sc2;
    898      1.1  knakahar 	struct ipsec_variant *ovar, *nvar, *nullvar;
    899      1.1  knakahar 	struct sockaddr *osrc, *odst;
    900      1.1  knakahar 	struct sockaddr *nsrc, *ndst;
    901      1.1  knakahar 	in_port_t nsport = 0, ndport = 0;
    902      1.1  knakahar 	int error;
    903      1.1  knakahar 
    904      1.1  knakahar 	error = encap_lock_enter();
    905      1.1  knakahar 	if (error)
    906      1.1  knakahar 		return error;
    907      1.1  knakahar 
    908      1.1  knakahar 	nsrc = sockaddr_dup(src, M_WAITOK);
    909      1.1  knakahar 	ndst = sockaddr_dup(dst, M_WAITOK);
    910      1.1  knakahar 	nvar = kmem_zalloc(sizeof(*nvar), KM_SLEEP);
    911      1.1  knakahar 	nullvar = kmem_zalloc(sizeof(*nullvar), KM_SLEEP);
    912      1.1  knakahar 
    913      1.1  knakahar 	mutex_enter(&sc->ipsec_lock);
    914      1.1  knakahar 
    915      1.1  knakahar 	ovar = sc->ipsec_var;
    916      1.1  knakahar 
    917      1.1  knakahar 	switch(nsrc->sa_family) {
    918      1.1  knakahar #ifdef INET
    919      1.1  knakahar 	case AF_INET:
    920  1.3.4.1  pgoyette 		nsport = satosin(src)->sin_port;
    921      1.1  knakahar 		/*
    922      1.1  knakahar 		 * avoid confuse SP when NAT-T disabled,
    923      1.1  knakahar 		 * e.g.
    924      1.1  knakahar 		 *     expected: 10.0.1.2[any] 10.0.1.1[any] 4(ipv4)
    925      1.1  knakahar 		 *     confuse : 10.0.1.2[600] 10.0.1.1[600] 4(ipv4)
    926      1.1  knakahar 		 */
    927      1.1  knakahar 		satosin(nsrc)->sin_port = 0;
    928  1.3.4.1  pgoyette 		ndport = satosin(dst)->sin_port;
    929      1.1  knakahar 		satosin(ndst)->sin_port = 0;
    930      1.1  knakahar 		break;
    931      1.1  knakahar #endif /* INET */
    932      1.1  knakahar #ifdef INET6
    933      1.1  knakahar 	case AF_INET6:
    934  1.3.4.1  pgoyette 		nsport = satosin6(src)->sin6_port;
    935      1.1  knakahar 		satosin6(nsrc)->sin6_port = 0;
    936  1.3.4.1  pgoyette 		ndport = satosin6(dst)->sin6_port;
    937      1.1  knakahar 		satosin6(ndst)->sin6_port = 0;
    938      1.1  knakahar 		break;
    939      1.1  knakahar #endif /* INET6 */
    940      1.1  knakahar 	default:
    941      1.1  knakahar 		log(LOG_DEBUG,
    942      1.1  knakahar 		    "%s: Invalid address family: %d.\n",
    943      1.1  knakahar 		    __func__, src->sa_family);
    944      1.1  knakahar 		error = EINVAL;
    945      1.1  knakahar 		goto out;
    946      1.1  knakahar 	}
    947      1.1  knakahar 
    948      1.1  knakahar 	/*
    949      1.1  knakahar 	 * (1-1) Check the argument src and dst address pair will change
    950      1.1  knakahar 	 *       configuration from current src and dst address pair.
    951      1.1  knakahar 	 */
    952      1.1  knakahar 	if ((ovar->iv_pdst && sockaddr_cmp(ovar->iv_pdst, dst) == 0) &&
    953      1.1  knakahar 	    (ovar->iv_psrc && sockaddr_cmp(ovar->iv_psrc, src) == 0) &&
    954      1.1  knakahar 	    (ovar->iv_sport == nsport && ovar->iv_dport == ndport)) {
    955      1.1  knakahar 		/* address and port pair not changed. */
    956      1.1  knakahar 		error = 0;
    957      1.1  knakahar 		goto out;
    958      1.1  knakahar 	}
    959      1.1  knakahar 
    960      1.1  knakahar 	/*
    961      1.1  knakahar 	 * (1-2) Check any ipsec(4) I/F uses duplicated src and dst address pair
    962      1.1  knakahar 	 *       with argument src and dst address pair, except for NAT-T shared
    963      1.1  knakahar 	 *       tunnels.
    964      1.1  knakahar 	 */
    965      1.1  knakahar 	mutex_enter(&ipsec_softcs.lock);
    966      1.1  knakahar 	LIST_FOREACH(sc2, &ipsec_softcs.list, ipsec_list) {
    967      1.1  knakahar 		struct ipsec_variant *var2;
    968      1.1  knakahar 		struct psref psref;
    969      1.1  knakahar 
    970      1.1  knakahar 		if (sc2 == sc)
    971      1.1  knakahar 			continue;
    972      1.1  knakahar 		var2 = if_ipsec_getref_variant(sc2, &psref);
    973      1.1  knakahar 		if (if_ipsec_variant_is_unconfigured(var2)) {
    974      1.1  knakahar 			if_ipsec_putref_variant(var2, &psref);
    975      1.1  knakahar 			continue;
    976      1.1  knakahar 		}
    977      1.1  knakahar 		if (if_ipsec_nat_t(sc) || if_ipsec_nat_t(sc2)) {
    978      1.1  knakahar 			if_ipsec_putref_variant(var2, &psref);
    979      1.1  knakahar 			continue; /* NAT-T shared tunnel */
    980      1.1  knakahar 		}
    981      1.1  knakahar 		if (sockaddr_cmp(var2->iv_pdst, dst) == 0 &&
    982      1.1  knakahar 		    sockaddr_cmp(var2->iv_psrc, src) == 0) {
    983      1.1  knakahar 			if_ipsec_putref_variant(var2, &psref);
    984      1.1  knakahar 			mutex_exit(&ipsec_softcs.lock);
    985      1.1  knakahar 			error = EADDRNOTAVAIL;
    986      1.1  knakahar 			goto out;
    987      1.1  knakahar 		}
    988      1.1  knakahar 
    989      1.1  knakahar 		if_ipsec_putref_variant(var2, &psref);
    990      1.1  knakahar 		/* XXX both end must be valid? (I mean, not 0.0.0.0) */
    991      1.1  knakahar 	}
    992      1.1  knakahar 	mutex_exit(&ipsec_softcs.lock);
    993      1.1  knakahar 
    994      1.1  knakahar 
    995      1.1  knakahar 	osrc = ovar->iv_psrc;
    996      1.1  knakahar 	odst = ovar->iv_pdst;
    997      1.1  knakahar 
    998      1.1  knakahar 	/*
    999      1.1  knakahar 	 * (2-1) Create ipsec_variant for new configuration.
   1000      1.1  knakahar 	 */
   1001      1.1  knakahar 	if_ipsec_copy_variant(nvar, ovar);
   1002      1.1  knakahar 	nvar->iv_psrc = nsrc;
   1003      1.1  knakahar 	nvar->iv_pdst = ndst;
   1004      1.1  knakahar 	nvar->iv_sport = nsport;
   1005      1.1  knakahar 	nvar->iv_dport = ndport;
   1006      1.1  knakahar 	nvar->iv_encap_cookie4 = NULL;
   1007      1.1  knakahar 	nvar->iv_encap_cookie6 = NULL;
   1008      1.1  knakahar 	psref_target_init(&nvar->iv_psref, iv_psref_class);
   1009      1.1  knakahar 	error = if_ipsec_encap_attach(nvar);
   1010      1.1  knakahar 	if (error)
   1011      1.1  knakahar 		goto out;
   1012      1.1  knakahar 
   1013      1.1  knakahar 	/*
   1014      1.1  knakahar 	 * (2-2) Create temporary "null" variant.
   1015      1.1  knakahar 	 */
   1016      1.1  knakahar 	if_ipsec_copy_variant(nullvar, ovar);
   1017      1.1  knakahar 	if_ipsec_clear_config(nullvar);
   1018      1.1  knakahar 	psref_target_init(&nullvar->iv_psref, iv_psref_class);
   1019      1.1  knakahar 	membar_producer();
   1020      1.1  knakahar 	/*
   1021      1.1  knakahar 	 * (2-3) Swap variant include its SPs.
   1022      1.1  knakahar 	 */
   1023      1.1  knakahar 	error = if_ipsec_update_variant(sc, nvar, nullvar);
   1024      1.1  knakahar 	if (error) {
   1025      1.1  knakahar 		if_ipsec_encap_detach(nvar);
   1026      1.1  knakahar 		goto out;
   1027      1.1  knakahar 	}
   1028      1.1  knakahar 
   1029      1.1  knakahar 	mutex_exit(&sc->ipsec_lock);
   1030      1.1  knakahar 
   1031      1.1  knakahar 	/*
   1032      1.1  knakahar 	 * (2-4) Cleanup last configurations.
   1033      1.1  knakahar 	 */
   1034      1.1  knakahar 	if (if_ipsec_variant_is_configured(ovar))
   1035      1.1  knakahar 		if_ipsec_encap_detach(ovar);
   1036      1.1  knakahar 	encap_lock_exit();
   1037      1.1  knakahar 
   1038      1.1  knakahar 	if (osrc != NULL)
   1039      1.1  knakahar 		sockaddr_free(osrc);
   1040      1.1  knakahar 	if (odst != NULL)
   1041      1.1  knakahar 		sockaddr_free(odst);
   1042      1.1  knakahar 	kmem_free(ovar, sizeof(*ovar));
   1043      1.1  knakahar 	kmem_free(nullvar, sizeof(*nullvar));
   1044      1.1  knakahar 
   1045      1.1  knakahar 	return 0;
   1046      1.1  knakahar 
   1047      1.1  knakahar out:
   1048      1.1  knakahar 	mutex_exit(&sc->ipsec_lock);
   1049      1.1  knakahar 	encap_lock_exit();
   1050      1.1  knakahar 
   1051      1.1  knakahar 	sockaddr_free(nsrc);
   1052      1.1  knakahar 	sockaddr_free(ndst);
   1053      1.1  knakahar 	kmem_free(nvar, sizeof(*nvar));
   1054      1.1  knakahar 	kmem_free(nullvar, sizeof(*nullvar));
   1055      1.1  knakahar 
   1056      1.1  knakahar 	return error;
   1057      1.1  knakahar }
   1058      1.1  knakahar 
   1059      1.1  knakahar /*
   1060      1.1  knakahar  * Validate and delete ipsec(4) I/F configurations.
   1061      1.1  knakahar  *     (1) validate
   1062      1.1  knakahar  *         (1-1) Check current src and dst address pair are null,
   1063      1.1  knakahar  *               which means the ipsec(4) I/F is already done deletetunnel.
   1064      1.1  knakahar  *     (2) delete
   1065      1.1  knakahar  *         (2-1) Create variant for deleted status.
   1066      1.1  knakahar  *         (2-2) Create temporary "null" variant used to avoid to access
   1067      1.1  knakahar  *               dangling variant while SPs are deleted and added.
   1068      1.1  knakahar  *               NOTE:
   1069      1.1  knakahar  *               The contents of temporary "null" variant equal to the variant
   1070      1.1  knakahar  *               of (2-1), however two psref_target_destroy() synchronization
   1071      1.1  knakahar  *               points are necessary to avoid to access dangling variant
   1072      1.1  knakahar  *               while SPs are deleted and added. To implement that simply,
   1073      1.1  knakahar  *               we use the same manner as if_ipsec_set_tunnel(), that is,
   1074      1.1  knakahar  *               create extra "null" variant and use it temporarily.
   1075      1.1  knakahar  *         (2-3) Swap variant include its SPs.
   1076      1.1  knakahar  *         (2-4) Cleanup last configurations.
   1077      1.1  knakahar  */
   1078      1.1  knakahar static void
   1079      1.1  knakahar if_ipsec_delete_tunnel(struct ifnet *ifp)
   1080      1.1  knakahar {
   1081      1.1  knakahar 	struct ipsec_softc *sc = ifp->if_softc;
   1082      1.1  knakahar 	struct ipsec_variant *ovar, *nvar, *nullvar;
   1083      1.1  knakahar 	struct sockaddr *osrc, *odst;
   1084      1.1  knakahar 	int error;
   1085      1.1  knakahar 
   1086      1.1  knakahar 	error = encap_lock_enter();
   1087      1.1  knakahar 	if (error)
   1088      1.1  knakahar 		return;
   1089      1.1  knakahar 
   1090      1.1  knakahar 	nvar = kmem_zalloc(sizeof(*nvar), KM_SLEEP);
   1091      1.1  knakahar 	nullvar = kmem_zalloc(sizeof(*nullvar), KM_SLEEP);
   1092      1.1  knakahar 
   1093      1.1  knakahar 	mutex_enter(&sc->ipsec_lock);
   1094      1.1  knakahar 
   1095      1.1  knakahar 	ovar = sc->ipsec_var;
   1096      1.1  knakahar 	osrc = ovar->iv_psrc;
   1097      1.1  knakahar 	odst = ovar->iv_pdst;
   1098      1.1  knakahar 	/*
   1099      1.1  knakahar 	 * (1-1) Check current src and dst address pair are null,
   1100      1.1  knakahar 	 *       which means the ipsec(4) I/F is already done deletetunnel.
   1101      1.1  knakahar 	 */
   1102      1.1  knakahar 	if (osrc == NULL || odst == NULL) {
   1103      1.1  knakahar 		/* address pair not changed. */
   1104      1.1  knakahar 		mutex_exit(&sc->ipsec_lock);
   1105      1.1  knakahar 		encap_lock_exit();
   1106      1.1  knakahar 		kmem_free(nvar, sizeof(*nvar));
   1107      1.1  knakahar 		return;
   1108      1.1  knakahar 	}
   1109      1.1  knakahar 
   1110      1.1  knakahar 	/*
   1111      1.1  knakahar 	 * (2-1) Create variant for deleted status.
   1112      1.1  knakahar 	 */
   1113      1.1  knakahar 	if_ipsec_copy_variant(nvar, ovar);
   1114      1.1  knakahar 	if_ipsec_clear_config(nvar);
   1115      1.1  knakahar 	psref_target_init(&nvar->iv_psref, iv_psref_class);
   1116      1.1  knakahar 
   1117      1.1  knakahar 	/*
   1118      1.1  knakahar 	 * (2-2) Create temporary "null" variant used to avoid to access
   1119      1.1  knakahar 	 *       dangling variant while SPs are deleted and added.
   1120      1.1  knakahar 	 */
   1121      1.1  knakahar 	if_ipsec_copy_variant(nullvar, ovar);
   1122      1.1  knakahar 	if_ipsec_clear_config(nullvar);
   1123      1.1  knakahar 	psref_target_init(&nullvar->iv_psref, iv_psref_class);
   1124      1.1  knakahar 	membar_producer();
   1125      1.1  knakahar 	/*
   1126      1.1  knakahar 	 * (2-3) Swap variant include its SPs.
   1127      1.1  knakahar 	 */
   1128      1.1  knakahar 	/* if_ipsec_update_variant() does not fail when delete SP only. */
   1129      1.1  knakahar 	(void)if_ipsec_update_variant(sc, nvar, nullvar);
   1130      1.1  knakahar 
   1131      1.1  knakahar 	mutex_exit(&sc->ipsec_lock);
   1132      1.1  knakahar 
   1133      1.1  knakahar 	/*
   1134      1.1  knakahar 	 * (2-4) Cleanup last configurations.
   1135      1.1  knakahar 	 */
   1136      1.1  knakahar 	if (if_ipsec_variant_is_configured(ovar))
   1137      1.1  knakahar 		if_ipsec_encap_detach(ovar);
   1138      1.1  knakahar 	encap_lock_exit();
   1139      1.1  knakahar 
   1140      1.1  knakahar 	sockaddr_free(osrc);
   1141      1.1  knakahar 	sockaddr_free(odst);
   1142      1.1  knakahar 	kmem_free(ovar, sizeof(*ovar));
   1143      1.1  knakahar 	kmem_free(nullvar, sizeof(*nullvar));
   1144      1.1  knakahar }
   1145      1.1  knakahar 
   1146      1.1  knakahar /*
   1147      1.1  knakahar  * Check IFF_NAT_T and IFF_FWD_IPV6 flags, therefore update SPs if needed.
   1148      1.1  knakahar  *     (1) check
   1149      1.1  knakahar  *         (1-1) Check flags are changed.
   1150      1.1  knakahar  *         (1-2) Check current src and dst address pair. If they are null,
   1151      1.1  knakahar  *               that means the ipsec(4) I/F is deletetunnel'ed, so it is
   1152      1.1  knakahar  *               not needed to update.
   1153      1.1  knakahar  *     (2) update
   1154      1.1  knakahar  *         (2-1) Create variant for new SPs.
   1155      1.1  knakahar  *         (2-2) Create temporary "null" variant used to avoid to access
   1156      1.1  knakahar  *               dangling variant while SPs are deleted and added.
   1157      1.1  knakahar  *               NOTE:
   1158      1.1  knakahar  *               There is the same problem as if_ipsec_delete_tunnel().
   1159      1.1  knakahar  *         (2-3) Swap variant include its SPs.
   1160      1.1  knakahar  *         (2-4) Cleanup unused configurations.
   1161      1.1  knakahar  *               NOTE: use the same encap_cookies.
   1162      1.1  knakahar  */
   1163      1.1  knakahar static int
   1164      1.1  knakahar if_ipsec_ensure_flags(struct ifnet *ifp, short oflags)
   1165      1.1  knakahar {
   1166      1.1  knakahar 	struct ipsec_softc *sc = ifp->if_softc;
   1167      1.1  knakahar 	struct ipsec_variant *ovar, *nvar, *nullvar;
   1168      1.1  knakahar 	int error;
   1169      1.1  knakahar 
   1170      1.1  knakahar 	/*
   1171      1.1  knakahar 	 * (1) Check flags are changed.
   1172      1.1  knakahar 	 */
   1173      1.1  knakahar 	if ((oflags & (IFF_NAT_T|IFF_FWD_IPV6)) ==
   1174      1.1  knakahar 	    (ifp->if_flags & (IFF_NAT_T|IFF_FWD_IPV6)))
   1175      1.1  knakahar 		return 0; /* flags not changed. */
   1176      1.1  knakahar 
   1177      1.1  knakahar 	error = encap_lock_enter();
   1178      1.1  knakahar 	if (error)
   1179      1.1  knakahar 		return error;
   1180      1.1  knakahar 
   1181      1.1  knakahar 	nvar = kmem_zalloc(sizeof(*nvar), KM_SLEEP);
   1182      1.1  knakahar 	nullvar = kmem_zalloc(sizeof(*nullvar), KM_SLEEP);
   1183      1.1  knakahar 
   1184      1.1  knakahar 	mutex_enter(&sc->ipsec_lock);
   1185      1.1  knakahar 
   1186      1.1  knakahar 	ovar = sc->ipsec_var;
   1187      1.1  knakahar 	/*
   1188      1.1  knakahar 	 * (1-2) Check current src and dst address pair.
   1189      1.1  knakahar 	 */
   1190      1.1  knakahar 	if (if_ipsec_variant_is_unconfigured(ovar)) {
   1191      1.1  knakahar 		/* nothing to do */
   1192      1.1  knakahar 		mutex_exit(&sc->ipsec_lock);
   1193  1.3.4.2  pgoyette 		encap_lock_exit();
   1194      1.1  knakahar 		return 0;
   1195      1.1  knakahar 	}
   1196      1.1  knakahar 
   1197      1.1  knakahar 	/*
   1198      1.1  knakahar 	 * (2-1) Create variant for new SPs.
   1199      1.1  knakahar 	 */
   1200      1.1  knakahar 	if_ipsec_copy_variant(nvar, ovar);
   1201      1.1  knakahar 	psref_target_init(&nvar->iv_psref, iv_psref_class);
   1202      1.1  knakahar 	/*
   1203      1.1  knakahar 	 * (2-2) Create temporary "null" variant used to avoid to access
   1204      1.1  knakahar 	 *       dangling variant while SPs are deleted and added.
   1205      1.1  knakahar 	 */
   1206      1.1  knakahar 	if_ipsec_copy_variant(nullvar, ovar);
   1207      1.1  knakahar 	if_ipsec_clear_config(nullvar);
   1208      1.1  knakahar 	psref_target_init(&nullvar->iv_psref, iv_psref_class);
   1209      1.1  knakahar 	membar_producer();
   1210      1.1  knakahar 	/*
   1211      1.1  knakahar 	 * (2-3) Swap variant include its SPs.
   1212      1.1  knakahar 	 */
   1213      1.1  knakahar 	error = if_ipsec_update_variant(sc, nvar, nullvar);
   1214      1.1  knakahar 
   1215      1.1  knakahar 	mutex_exit(&sc->ipsec_lock);
   1216      1.1  knakahar 	encap_lock_exit();
   1217      1.1  knakahar 
   1218      1.1  knakahar 	/*
   1219      1.1  knakahar 	 * (2-4) Cleanup unused configurations.
   1220      1.1  knakahar 	 */
   1221      1.1  knakahar 	if (!error)
   1222      1.1  knakahar 		kmem_free(ovar, sizeof(*ovar));
   1223      1.1  knakahar 	else
   1224      1.1  knakahar 		kmem_free(nvar, sizeof(*ovar));
   1225      1.1  knakahar 	kmem_free(nullvar, sizeof(*nullvar));
   1226      1.1  knakahar 
   1227      1.1  knakahar 	return error;
   1228      1.1  knakahar }
   1229      1.1  knakahar 
   1230      1.1  knakahar /*
   1231      1.1  knakahar  * SPD management
   1232      1.1  knakahar  */
   1233      1.1  knakahar 
   1234      1.1  knakahar /*
   1235      1.1  knakahar  * Share SP set with other NAT-T ipsec(4) I/F(s).
   1236      1.1  knakahar  *     Return 1, when "var" shares SP set.
   1237      1.1  knakahar  *     Return 0, when "var" cannot share SP set.
   1238      1.1  knakahar  *
   1239      1.1  knakahar  * NOTE:
   1240      1.1  knakahar  * if_ipsec_share_sp() and if_ipsec_unshare_sp() would require global lock
   1241      1.1  knakahar  * to exclude other ipsec(4) I/Fs set_tunnel/delete_tunnel. E.g. when ipsec0
   1242      1.1  knakahar  * and ipsec1 can share SP set, running ipsec0's set_tunnel and ipsec1's
   1243      1.1  knakahar  * set_tunnel causes race.
   1244      1.1  knakahar  * Currently, (fortunately) encap_lock works as this global lock.
   1245      1.1  knakahar  */
   1246      1.1  knakahar static int
   1247      1.1  knakahar if_ipsec_share_sp(struct ipsec_variant *var)
   1248      1.1  knakahar {
   1249      1.1  knakahar 	struct ipsec_softc *sc = var->iv_softc;
   1250      1.1  knakahar 	struct ipsec_softc *sc2;
   1251      1.1  knakahar 	struct ipsec_variant *var2;
   1252      1.1  knakahar 	struct psref psref;
   1253      1.1  knakahar 
   1254      1.1  knakahar 	KASSERT(encap_lock_held());
   1255      1.2  knakahar 	KASSERT(var->iv_psrc != NULL && var->iv_pdst != NULL);
   1256      1.1  knakahar 
   1257      1.1  knakahar 	mutex_enter(&ipsec_softcs.lock);
   1258      1.1  knakahar 	LIST_FOREACH(sc2, &ipsec_softcs.list, ipsec_list) {
   1259      1.1  knakahar 		if (sc2 == sc)
   1260      1.1  knakahar 			continue;
   1261      1.1  knakahar 		var2 = if_ipsec_getref_variant(sc2, &psref);
   1262      1.1  knakahar 		if (if_ipsec_variant_is_unconfigured(var2)) {
   1263      1.1  knakahar 			if_ipsec_putref_variant(var2, &psref);
   1264      1.1  knakahar 			continue;
   1265      1.1  knakahar 		}
   1266      1.1  knakahar 		if (sockaddr_cmp(var2->iv_pdst, var->iv_pdst) != 0 ||
   1267      1.1  knakahar 		    sockaddr_cmp(var2->iv_psrc, var->iv_psrc) != 0) {
   1268      1.1  knakahar 			if_ipsec_putref_variant(var2, &psref);
   1269      1.1  knakahar 			continue;
   1270      1.1  knakahar 		}
   1271      1.1  knakahar 
   1272      1.1  knakahar 		break;
   1273      1.1  knakahar 	}
   1274      1.1  knakahar 	mutex_exit(&ipsec_softcs.lock);
   1275      1.1  knakahar 	if (sc2 == NULL)
   1276      1.1  knakahar 		return 0; /* not shared */
   1277      1.1  knakahar 
   1278      1.1  knakahar 	IV_SP_IN(var) = IV_SP_IN(var2);
   1279      1.1  knakahar 	IV_SP_IN6(var) = IV_SP_IN6(var2);
   1280      1.1  knakahar 	IV_SP_OUT(var) = IV_SP_OUT(var2);
   1281      1.1  knakahar 	IV_SP_OUT6(var) = IV_SP_OUT6(var2);
   1282      1.1  knakahar 
   1283      1.1  knakahar 	if_ipsec_putref_variant(var2, &psref);
   1284      1.1  knakahar 	return 1; /* shared */
   1285      1.1  knakahar }
   1286      1.1  knakahar 
   1287      1.1  knakahar /*
   1288      1.1  knakahar  * Unshare SP set with other NAT-T ipsec(4) I/F(s).
   1289      1.1  knakahar  *     Return 1, when "var" shared SP set, and then unshare them.
   1290      1.1  knakahar  *     Return 0, when "var" did not share SP set.
   1291      1.1  knakahar  *
   1292      1.1  knakahar  * NOTE:
   1293      1.1  knakahar  * See if_ipsec_share_sp()'s note.
   1294      1.1  knakahar  */
   1295      1.1  knakahar static int
   1296      1.1  knakahar if_ipsec_unshare_sp(struct ipsec_variant *var)
   1297      1.1  knakahar {
   1298      1.1  knakahar 	struct ipsec_softc *sc = var->iv_softc;
   1299      1.1  knakahar 	struct ipsec_softc *sc2;
   1300      1.1  knakahar 	struct ipsec_variant *var2;
   1301      1.1  knakahar 	struct psref psref;
   1302      1.1  knakahar 
   1303      1.1  knakahar 	KASSERT(encap_lock_held());
   1304      1.1  knakahar 
   1305      1.1  knakahar 	if (!var->iv_pdst || !var->iv_psrc)
   1306      1.1  knakahar 		return 0;
   1307      1.1  knakahar 
   1308      1.1  knakahar 	mutex_enter(&ipsec_softcs.lock);
   1309      1.1  knakahar 	LIST_FOREACH(sc2, &ipsec_softcs.list, ipsec_list) {
   1310      1.1  knakahar 		if (sc2 == sc)
   1311      1.1  knakahar 			continue;
   1312      1.1  knakahar 		var2 = if_ipsec_getref_variant(sc2, &psref);
   1313      1.1  knakahar 		if (!var2->iv_pdst || !var2->iv_psrc) {
   1314      1.1  knakahar 			if_ipsec_putref_variant(var2, &psref);
   1315      1.1  knakahar 			continue;
   1316      1.1  knakahar 		}
   1317      1.1  knakahar 		if (sockaddr_cmp(var2->iv_pdst, var->iv_pdst) != 0 ||
   1318      1.1  knakahar 		    sockaddr_cmp(var2->iv_psrc, var->iv_psrc) != 0) {
   1319      1.1  knakahar 			if_ipsec_putref_variant(var2, &psref);
   1320      1.1  knakahar 			continue;
   1321      1.1  knakahar 		}
   1322      1.1  knakahar 
   1323      1.1  knakahar 		break;
   1324      1.1  knakahar 	}
   1325      1.1  knakahar 	mutex_exit(&ipsec_softcs.lock);
   1326      1.1  knakahar 	if (sc2 == NULL)
   1327      1.1  knakahar 		return 0; /* not shared */
   1328      1.1  knakahar 
   1329      1.1  knakahar 	IV_SP_IN(var) = NULL;
   1330      1.1  knakahar 	IV_SP_IN6(var) = NULL;
   1331      1.1  knakahar 	IV_SP_OUT(var) = NULL;
   1332      1.1  knakahar 	IV_SP_OUT6(var) = NULL;
   1333      1.1  knakahar 	if_ipsec_putref_variant(var2, &psref);
   1334      1.1  knakahar 	return 1; /* shared */
   1335      1.1  knakahar }
   1336      1.1  knakahar 
   1337      1.1  knakahar static inline void
   1338  1.3.4.1  pgoyette if_ipsec_add_mbuf_optalign(struct mbuf *m0, void *data, size_t len, bool align)
   1339      1.1  knakahar {
   1340      1.1  knakahar 	struct mbuf *m;
   1341      1.1  knakahar 
   1342  1.3.4.3  pgoyette 	MGET(m, M_WAIT, MT_DATA);
   1343  1.3.4.3  pgoyette 	if (align) {
   1344  1.3.4.1  pgoyette 		m->m_len = PFKEY_ALIGN8(len);
   1345  1.3.4.3  pgoyette 		memset(mtod(m, void *), 0, m->m_len);
   1346  1.3.4.3  pgoyette 	} else
   1347  1.3.4.1  pgoyette 		m->m_len = len;
   1348      1.1  knakahar 	m_copyback(m, 0, len, data);
   1349      1.1  knakahar 	m_cat(m0, m);
   1350      1.1  knakahar }
   1351      1.1  knakahar 
   1352      1.1  knakahar static inline void
   1353  1.3.4.1  pgoyette if_ipsec_add_mbuf(struct mbuf *m0, void *data, size_t len)
   1354  1.3.4.1  pgoyette {
   1355  1.3.4.1  pgoyette 
   1356  1.3.4.1  pgoyette 	if_ipsec_add_mbuf_optalign(m0, data, len, true);
   1357  1.3.4.1  pgoyette }
   1358  1.3.4.1  pgoyette 
   1359  1.3.4.1  pgoyette static inline void
   1360  1.3.4.1  pgoyette if_ipsec_add_mbuf_addr_port(struct mbuf *m0, struct sockaddr *addr, in_port_t port, bool align)
   1361  1.3.4.1  pgoyette {
   1362  1.3.4.1  pgoyette 
   1363  1.3.4.1  pgoyette 	if (port == 0) {
   1364  1.3.4.1  pgoyette 		if_ipsec_add_mbuf_optalign(m0, addr, addr->sa_len, align);
   1365  1.3.4.1  pgoyette 	} else {
   1366  1.3.4.2  pgoyette 		union sockaddr_union addrport_u;
   1367  1.3.4.2  pgoyette 		struct sockaddr *addrport = &addrport_u.sa;
   1368  1.3.4.1  pgoyette 
   1369  1.3.4.2  pgoyette 		if_ipsec_set_addr_port(addrport, addr, port);
   1370  1.3.4.2  pgoyette 		if_ipsec_add_mbuf_optalign(m0, addrport, addrport->sa_len, align);
   1371  1.3.4.1  pgoyette 	}
   1372  1.3.4.1  pgoyette }
   1373  1.3.4.1  pgoyette 
   1374  1.3.4.1  pgoyette static inline void
   1375      1.1  knakahar if_ipsec_add_pad(struct mbuf *m0, size_t len)
   1376      1.1  knakahar {
   1377      1.1  knakahar 	struct mbuf *m;
   1378      1.1  knakahar 
   1379      1.1  knakahar 	if (len == 0)
   1380      1.1  knakahar 		return;
   1381      1.1  knakahar 
   1382  1.3.4.3  pgoyette 	MGET(m, M_WAIT, MT_DATA);
   1383      1.1  knakahar 	m->m_len = len;
   1384  1.3.4.3  pgoyette 	memset(mtod(m, void *), 0, m->m_len);
   1385      1.1  knakahar 	m_cat(m0, m);
   1386      1.1  knakahar }
   1387      1.1  knakahar 
   1388      1.1  knakahar static inline size_t
   1389      1.1  knakahar if_ipsec_set_sadb_addr(struct sadb_address *saaddr, struct sockaddr *addr,
   1390      1.1  knakahar     int proto, uint16_t exttype)
   1391      1.1  knakahar {
   1392      1.1  knakahar 	size_t size;
   1393      1.1  knakahar 
   1394      1.1  knakahar 	KASSERT(saaddr != NULL);
   1395      1.1  knakahar 	KASSERT(addr != NULL);
   1396      1.1  knakahar 
   1397      1.1  knakahar 	size = sizeof(*saaddr) + PFKEY_ALIGN8(addr->sa_len);
   1398      1.1  knakahar 	saaddr->sadb_address_len = PFKEY_UNIT64(size);
   1399      1.1  knakahar 	saaddr->sadb_address_exttype = exttype;
   1400      1.1  knakahar 	saaddr->sadb_address_proto = proto;
   1401      1.1  knakahar 	switch (addr->sa_family) {
   1402      1.1  knakahar #ifdef INET
   1403      1.1  knakahar 	case AF_INET:
   1404      1.1  knakahar 		saaddr->sadb_address_prefixlen = sizeof(struct in_addr) << 3;
   1405      1.1  knakahar 		break;
   1406      1.1  knakahar #endif /* INET */
   1407      1.1  knakahar #ifdef INET6
   1408      1.1  knakahar 	case AF_INET6:
   1409      1.1  knakahar 		saaddr->sadb_address_prefixlen = sizeof(struct in6_addr) << 3;
   1410      1.1  knakahar 		break;
   1411      1.1  knakahar #endif /* INET6 */
   1412      1.1  knakahar 	default:
   1413      1.1  knakahar 		log(LOG_DEBUG,
   1414      1.1  knakahar 		    "%s: Invalid address family: %d.\n",
   1415      1.1  knakahar 		    __func__, addr->sa_family);
   1416      1.1  knakahar 		break;
   1417      1.1  knakahar 	}
   1418      1.1  knakahar 	saaddr->sadb_address_reserved = 0;
   1419      1.1  knakahar 
   1420      1.1  knakahar 	return size;
   1421      1.1  knakahar }
   1422      1.1  knakahar 
   1423      1.1  knakahar static inline size_t
   1424      1.1  knakahar if_ipsec_set_sadb_src(struct sadb_address *sasrc, struct sockaddr *src,
   1425      1.1  knakahar     int proto)
   1426      1.1  knakahar {
   1427      1.1  knakahar 
   1428      1.1  knakahar 	return if_ipsec_set_sadb_addr(sasrc, src, proto,
   1429      1.1  knakahar 	    SADB_EXT_ADDRESS_SRC);
   1430      1.1  knakahar }
   1431      1.1  knakahar 
   1432      1.1  knakahar static inline size_t
   1433      1.1  knakahar if_ipsec_set_sadb_dst(struct sadb_address *sadst, struct sockaddr *dst,
   1434      1.1  knakahar     int proto)
   1435      1.1  knakahar {
   1436      1.1  knakahar 
   1437      1.1  knakahar 	return if_ipsec_set_sadb_addr(sadst, dst, proto,
   1438      1.1  knakahar 	    SADB_EXT_ADDRESS_DST);
   1439      1.1  knakahar }
   1440      1.1  knakahar 
   1441      1.1  knakahar static inline size_t
   1442      1.1  knakahar if_ipsec_set_sadb_x_policy(struct sadb_x_policy *xpl,
   1443      1.1  knakahar     struct sadb_x_ipsecrequest *xisr, uint16_t policy, uint8_t dir, uint32_t id,
   1444  1.3.4.1  pgoyette     uint8_t level, struct sockaddr *src, struct sockaddr *dst)
   1445      1.1  knakahar {
   1446      1.1  knakahar 	size_t size;
   1447      1.1  knakahar 
   1448      1.1  knakahar 	KASSERT(policy != IPSEC_POLICY_IPSEC || xisr != NULL);
   1449      1.1  knakahar 
   1450      1.1  knakahar 	size = sizeof(*xpl);
   1451      1.1  knakahar 	if (policy == IPSEC_POLICY_IPSEC) {
   1452      1.1  knakahar 		size += PFKEY_ALIGN8(sizeof(*xisr));
   1453  1.3.4.1  pgoyette 		if (src != NULL && dst != NULL)
   1454  1.3.4.1  pgoyette 			size += PFKEY_ALIGN8(src->sa_len + dst->sa_len);
   1455      1.1  knakahar 	}
   1456      1.1  knakahar 	xpl->sadb_x_policy_len = PFKEY_UNIT64(size);
   1457      1.1  knakahar 	xpl->sadb_x_policy_exttype = SADB_X_EXT_POLICY;
   1458      1.1  knakahar 	xpl->sadb_x_policy_type = policy;
   1459      1.1  knakahar 	xpl->sadb_x_policy_dir = dir;
   1460      1.1  knakahar 	xpl->sadb_x_policy_reserved = 0;
   1461      1.1  knakahar 	xpl->sadb_x_policy_id = id;
   1462      1.1  knakahar 	xpl->sadb_x_policy_reserved2 = 0;
   1463      1.1  knakahar 
   1464      1.1  knakahar 	if (policy == IPSEC_POLICY_IPSEC) {
   1465      1.1  knakahar 		xisr->sadb_x_ipsecrequest_len = PFKEY_ALIGN8(sizeof(*xisr));
   1466  1.3.4.1  pgoyette 		if (src != NULL && dst != NULL)
   1467  1.3.4.1  pgoyette 			xisr->sadb_x_ipsecrequest_len +=
   1468  1.3.4.1  pgoyette 				PFKEY_ALIGN8(src->sa_len + dst->sa_len);
   1469      1.1  knakahar 		xisr->sadb_x_ipsecrequest_proto = IPPROTO_ESP;
   1470      1.1  knakahar 		xisr->sadb_x_ipsecrequest_mode = IPSEC_MODE_TRANSPORT;
   1471      1.1  knakahar 		xisr->sadb_x_ipsecrequest_level = level;
   1472      1.1  knakahar 		xisr->sadb_x_ipsecrequest_reqid = key_newreqid();
   1473      1.1  knakahar 	}
   1474      1.1  knakahar 
   1475      1.1  knakahar 	return size;
   1476      1.1  knakahar }
   1477      1.1  knakahar 
   1478      1.1  knakahar static inline void
   1479      1.1  knakahar if_ipsec_set_sadb_msg(struct sadb_msg *msg, uint16_t extlen, uint8_t msgtype)
   1480      1.1  knakahar {
   1481      1.1  knakahar 
   1482      1.1  knakahar 	KASSERT(msg != NULL);
   1483      1.1  knakahar 
   1484      1.1  knakahar 	msg->sadb_msg_version = PF_KEY_V2;
   1485      1.1  knakahar 	msg->sadb_msg_type = msgtype;
   1486      1.1  knakahar 	msg->sadb_msg_errno = 0;
   1487      1.1  knakahar 	msg->sadb_msg_satype = SADB_SATYPE_UNSPEC;
   1488      1.1  knakahar 	msg->sadb_msg_len = PFKEY_UNIT64(sizeof(*msg)) + extlen;
   1489      1.1  knakahar 	msg->sadb_msg_reserved = 0;
   1490      1.1  knakahar 	msg->sadb_msg_seq = 0; /* XXXX */
   1491      1.1  knakahar 	msg->sadb_msg_pid = 0; /* XXXX */
   1492      1.1  knakahar }
   1493      1.1  knakahar 
   1494      1.1  knakahar static inline void
   1495      1.1  knakahar if_ipsec_set_sadb_msg_add(struct sadb_msg *msg, uint16_t extlen)
   1496      1.1  knakahar {
   1497      1.1  knakahar 
   1498      1.1  knakahar 	if_ipsec_set_sadb_msg(msg, extlen, SADB_X_SPDADD);
   1499      1.1  knakahar }
   1500      1.1  knakahar 
   1501      1.1  knakahar static inline void
   1502      1.1  knakahar if_ipsec_set_sadb_msg_del(struct sadb_msg *msg, uint16_t extlen)
   1503      1.1  knakahar {
   1504      1.1  knakahar 
   1505      1.1  knakahar 	if_ipsec_set_sadb_msg(msg, extlen, SADB_X_SPDDELETE2);
   1506      1.1  knakahar }
   1507      1.1  knakahar 
   1508      1.1  knakahar static int
   1509      1.1  knakahar if_ipsec_set_addr_port(struct sockaddr *addrport, struct sockaddr *addr,
   1510      1.1  knakahar     in_port_t port)
   1511      1.1  knakahar {
   1512      1.1  knakahar 	int error = 0;
   1513      1.1  knakahar 
   1514      1.1  knakahar 	sockaddr_copy(addrport, addr->sa_len, addr);
   1515      1.1  knakahar 
   1516      1.1  knakahar 	switch (addr->sa_family) {
   1517      1.1  knakahar #ifdef INET
   1518      1.1  knakahar 	case AF_INET: {
   1519      1.1  knakahar 		struct sockaddr_in *sin = satosin(addrport);
   1520  1.3.4.1  pgoyette 		sin->sin_port = port;
   1521      1.1  knakahar 		break;
   1522      1.1  knakahar 	}
   1523      1.1  knakahar #endif /* INET */
   1524      1.1  knakahar #ifdef INET6
   1525      1.1  knakahar 	case AF_INET6: {
   1526      1.1  knakahar 		struct sockaddr_in6 *sin6 = satosin6(addrport);
   1527  1.3.4.1  pgoyette 		sin6->sin6_port = port;
   1528      1.1  knakahar 		break;
   1529      1.1  knakahar 	}
   1530      1.1  knakahar #endif /* INET6 */
   1531      1.1  knakahar 	default:
   1532      1.1  knakahar 		log(LOG_DEBUG,
   1533      1.1  knakahar 		    "%s: Invalid address family: %d.\n",
   1534      1.1  knakahar 		    __func__, addr->sa_family);
   1535      1.1  knakahar 		error = EINVAL;
   1536      1.1  knakahar 	}
   1537      1.1  knakahar 
   1538      1.1  knakahar 	return error;
   1539      1.1  knakahar }
   1540      1.1  knakahar 
   1541      1.1  knakahar static struct secpolicy *
   1542      1.1  knakahar if_ipsec_add_sp0(struct sockaddr *src, in_port_t sport,
   1543      1.1  knakahar     struct sockaddr *dst, in_port_t dport,
   1544      1.1  knakahar     int dir, int proto, int level, u_int policy)
   1545      1.1  knakahar {
   1546      1.1  knakahar 	struct sadb_msg msg;
   1547      1.1  knakahar 	struct sadb_address xsrc, xdst;
   1548      1.1  knakahar 	struct sadb_x_policy xpl;
   1549      1.1  knakahar 	struct sadb_x_ipsecrequest xisr;
   1550      1.1  knakahar 	size_t size;
   1551      1.1  knakahar 	size_t padlen;
   1552      1.1  knakahar 	uint16_t ext_msg_len = 0;
   1553      1.1  knakahar 	struct mbuf *m;
   1554      1.1  knakahar 
   1555      1.1  knakahar 	memset(&msg, 0, sizeof(msg));
   1556      1.1  knakahar 	memset(&xsrc, 0, sizeof(xsrc));
   1557      1.1  knakahar 	memset(&xdst, 0, sizeof(xdst));
   1558      1.1  knakahar 	memset(&xpl, 0, sizeof(xpl));
   1559      1.1  knakahar 	memset(&xisr, 0, sizeof(xisr));
   1560      1.1  knakahar 
   1561  1.3.4.3  pgoyette 	MGETHDR(m, M_WAIT, MT_DATA);
   1562      1.1  knakahar 
   1563      1.1  knakahar 	size = if_ipsec_set_sadb_src(&xsrc, src, proto);
   1564      1.1  knakahar 	ext_msg_len += PFKEY_UNIT64(size);
   1565      1.1  knakahar 	size = if_ipsec_set_sadb_dst(&xdst, dst, proto);
   1566      1.1  knakahar 	ext_msg_len += PFKEY_UNIT64(size);
   1567  1.3.4.1  pgoyette 	size = if_ipsec_set_sadb_x_policy(&xpl, &xisr, policy, dir, 0, level, src, dst);
   1568      1.1  knakahar 	ext_msg_len += PFKEY_UNIT64(size);
   1569      1.1  knakahar 	if_ipsec_set_sadb_msg_add(&msg, ext_msg_len);
   1570      1.1  knakahar 
   1571      1.1  knakahar 	/* build PF_KEY message */
   1572      1.1  knakahar 
   1573      1.1  knakahar 	m->m_len = sizeof(msg);
   1574      1.1  knakahar 	m_copyback(m, 0, sizeof(msg), &msg);
   1575      1.1  knakahar 
   1576      1.1  knakahar 	if_ipsec_add_mbuf(m, &xsrc, sizeof(xsrc));
   1577  1.3.4.4  pgoyette 	/*
   1578  1.3.4.4  pgoyette 	 * secpolicy.spidx.{src, dst} must not be set port number,
   1579  1.3.4.4  pgoyette 	 * even if it is used for NAT-T.
   1580  1.3.4.4  pgoyette 	 */
   1581  1.3.4.4  pgoyette 	if_ipsec_add_mbuf_addr_port(m, src, 0, true);
   1582      1.1  knakahar 	padlen = PFKEY_UNUNIT64(xsrc.sadb_address_len)
   1583      1.1  knakahar 		- (sizeof(xsrc) + PFKEY_ALIGN8(src->sa_len));
   1584      1.1  knakahar 	if_ipsec_add_pad(m, padlen);
   1585      1.1  knakahar 
   1586      1.1  knakahar 	if_ipsec_add_mbuf(m, &xdst, sizeof(xdst));
   1587  1.3.4.4  pgoyette 	/* ditto */
   1588  1.3.4.4  pgoyette 	if_ipsec_add_mbuf_addr_port(m, dst, 0, true);
   1589      1.1  knakahar 	padlen = PFKEY_UNUNIT64(xdst.sadb_address_len)
   1590      1.1  knakahar 		- (sizeof(xdst) + PFKEY_ALIGN8(dst->sa_len));
   1591      1.1  knakahar 	if_ipsec_add_pad(m, padlen);
   1592      1.1  knakahar 
   1593      1.1  knakahar 	if_ipsec_add_mbuf(m, &xpl, sizeof(xpl));
   1594  1.3.4.4  pgoyette 	padlen = PFKEY_UNUNIT64(xpl.sadb_x_policy_len) - sizeof(xpl);
   1595  1.3.4.1  pgoyette 	if (policy == IPSEC_POLICY_IPSEC) {
   1596      1.1  knakahar 		if_ipsec_add_mbuf(m, &xisr, sizeof(xisr));
   1597  1.3.4.4  pgoyette 		/*
   1598  1.3.4.4  pgoyette 		 * secpolicy.req->saidx.{src, dst} must be set port number,
   1599  1.3.4.4  pgoyette 		 * when it is used for NAT-T.
   1600  1.3.4.4  pgoyette 		 */
   1601  1.3.4.1  pgoyette 		if_ipsec_add_mbuf_addr_port(m, src, sport, false);
   1602  1.3.4.1  pgoyette 		if_ipsec_add_mbuf_addr_port(m, dst, dport, false);
   1603  1.3.4.4  pgoyette 		padlen -= PFKEY_ALIGN8(sizeof(xisr));
   1604  1.3.4.1  pgoyette 		padlen -= PFKEY_ALIGN8(src->sa_len + dst->sa_len);
   1605  1.3.4.4  pgoyette 	}
   1606  1.3.4.1  pgoyette 	if_ipsec_add_pad(m, padlen);
   1607      1.1  knakahar 
   1608      1.1  knakahar 	/* key_kpi_spdadd() has already done KEY_SP_REF(). */
   1609      1.1  knakahar 	return key_kpi_spdadd(m);
   1610      1.1  knakahar }
   1611      1.1  knakahar 
   1612      1.1  knakahar static int
   1613      1.1  knakahar if_ipsec_add_sp(struct ipsec_variant *var,
   1614      1.1  knakahar     struct sockaddr *src, in_port_t sport,
   1615      1.1  knakahar     struct sockaddr *dst, in_port_t dport)
   1616      1.1  knakahar {
   1617      1.1  knakahar 	struct ipsec_softc *sc = var->iv_softc;
   1618      1.1  knakahar 	int level;
   1619      1.1  knakahar 	u_int v6policy;
   1620      1.1  knakahar 
   1621      1.1  knakahar 	/*
   1622      1.1  knakahar 	 * must delete sp before add it.
   1623      1.1  knakahar 	 */
   1624      1.1  knakahar 	KASSERT(IV_SP_IN(var) == NULL);
   1625      1.1  knakahar 	KASSERT(IV_SP_OUT(var) == NULL);
   1626      1.1  knakahar 	KASSERT(IV_SP_IN6(var) == NULL);
   1627      1.1  knakahar 	KASSERT(IV_SP_OUT6(var) == NULL);
   1628      1.1  knakahar 
   1629      1.1  knakahar 	/*
   1630      1.1  knakahar 	 * can be shared?
   1631      1.1  knakahar 	 */
   1632      1.1  knakahar 	if (if_ipsec_share_sp(var))
   1633      1.1  knakahar 		return 0;
   1634      1.1  knakahar 
   1635      1.1  knakahar 	if (if_ipsec_nat_t(sc))
   1636      1.1  knakahar 		level = IPSEC_LEVEL_REQUIRE;
   1637      1.1  knakahar 	else
   1638      1.1  knakahar 		level = IPSEC_LEVEL_UNIQUE;
   1639      1.1  knakahar 
   1640      1.1  knakahar 	if (if_ipsec_fwd_ipv6(sc))
   1641      1.1  knakahar 		v6policy = IPSEC_POLICY_IPSEC;
   1642      1.1  knakahar 	else
   1643      1.1  knakahar 		v6policy = IPSEC_POLICY_DISCARD;
   1644      1.1  knakahar 
   1645      1.1  knakahar 	IV_SP_IN(var) = if_ipsec_add_sp0(dst, dport, src, sport,
   1646      1.1  knakahar 	    IPSEC_DIR_INBOUND, IPPROTO_IPIP, level, IPSEC_POLICY_IPSEC);
   1647      1.1  knakahar 	if (IV_SP_IN(var) == NULL)
   1648      1.1  knakahar 		goto fail;
   1649      1.1  knakahar 	IV_SP_OUT(var) = if_ipsec_add_sp0(src, sport, dst, dport,
   1650      1.1  knakahar 	    IPSEC_DIR_OUTBOUND, IPPROTO_IPIP, level, IPSEC_POLICY_IPSEC);
   1651      1.1  knakahar 	if (IV_SP_OUT(var) == NULL)
   1652      1.1  knakahar 		goto fail;
   1653      1.1  knakahar 	IV_SP_IN6(var) = if_ipsec_add_sp0(dst, dport, src, sport,
   1654      1.1  knakahar 	    IPSEC_DIR_INBOUND, IPPROTO_IPV6, level, v6policy);
   1655      1.1  knakahar 	if (IV_SP_IN6(var) == NULL)
   1656      1.1  knakahar 		goto fail;
   1657      1.1  knakahar 	IV_SP_OUT6(var) = if_ipsec_add_sp0(src, sport, dst, dport,
   1658      1.1  knakahar 	    IPSEC_DIR_OUTBOUND, IPPROTO_IPV6, level, v6policy);
   1659      1.1  knakahar 	if (IV_SP_OUT6(var) == NULL)
   1660      1.1  knakahar 		goto fail;
   1661      1.1  knakahar 
   1662      1.1  knakahar 	return 0;
   1663      1.1  knakahar 
   1664      1.1  knakahar fail:
   1665      1.1  knakahar 	if (IV_SP_IN6(var) != NULL) {
   1666      1.1  knakahar 		if_ipsec_del_sp0(IV_SP_IN6(var));
   1667      1.1  knakahar 		IV_SP_IN6(var) = NULL;
   1668      1.1  knakahar 	}
   1669      1.1  knakahar 	if (IV_SP_OUT(var) != NULL) {
   1670      1.1  knakahar 		if_ipsec_del_sp0(IV_SP_OUT(var));
   1671      1.1  knakahar 		IV_SP_OUT(var) = NULL;
   1672      1.1  knakahar 	}
   1673      1.1  knakahar 	if (IV_SP_IN(var) != NULL) {
   1674      1.1  knakahar 		if_ipsec_del_sp0(IV_SP_IN(var));
   1675      1.1  knakahar 		IV_SP_IN(var) = NULL;
   1676      1.1  knakahar 	}
   1677      1.1  knakahar 
   1678      1.1  knakahar 	return EEXIST;
   1679      1.1  knakahar }
   1680      1.1  knakahar 
   1681      1.1  knakahar static int
   1682      1.1  knakahar if_ipsec_del_sp0(struct secpolicy *sp)
   1683      1.1  knakahar {
   1684      1.1  knakahar 	struct sadb_msg msg;
   1685      1.1  knakahar 	struct sadb_x_policy xpl;
   1686      1.1  knakahar 	size_t size;
   1687      1.1  knakahar 	uint16_t ext_msg_len = 0;
   1688      1.1  knakahar 	int error;
   1689      1.1  knakahar 	struct mbuf *m;
   1690      1.1  knakahar 
   1691      1.1  knakahar 	if (sp == NULL)
   1692      1.1  knakahar 		return 0;
   1693      1.1  knakahar 
   1694      1.1  knakahar 	memset(&msg, 0, sizeof(msg));
   1695      1.1  knakahar 	memset(&xpl, 0, sizeof(xpl));
   1696      1.1  knakahar 
   1697  1.3.4.3  pgoyette 	MGETHDR(m, M_WAIT, MT_DATA);
   1698      1.1  knakahar 
   1699  1.3.4.1  pgoyette 	size = if_ipsec_set_sadb_x_policy(&xpl, NULL, 0, 0, sp->id, 0, NULL, NULL);
   1700      1.1  knakahar 	ext_msg_len += PFKEY_UNIT64(size);
   1701      1.1  knakahar 
   1702      1.1  knakahar 	if_ipsec_set_sadb_msg_del(&msg, ext_msg_len);
   1703      1.1  knakahar 
   1704      1.1  knakahar 	m->m_len = sizeof(msg);
   1705      1.1  knakahar 	m_copyback(m, 0, sizeof(msg), &msg);
   1706      1.1  knakahar 
   1707      1.1  knakahar 	if_ipsec_add_mbuf(m, &xpl, sizeof(xpl));
   1708      1.1  knakahar 
   1709      1.1  knakahar 	/*  unreference correspond to key_kpi_spdadd(). */
   1710      1.1  knakahar 	KEY_SP_UNREF(&sp);
   1711      1.1  knakahar 	error = key_kpi_spddelete2(m);
   1712      1.1  knakahar 	if (error != 0) {
   1713      1.1  knakahar 		log(LOG_ERR, "%s: cannot delete SP(ID=%u) (error=%d).\n",
   1714      1.1  knakahar 		    __func__, sp->id, error);
   1715      1.1  knakahar 	}
   1716      1.1  knakahar 	return error;
   1717      1.1  knakahar }
   1718      1.1  knakahar 
   1719      1.1  knakahar static void
   1720      1.1  knakahar if_ipsec_del_sp(struct ipsec_variant *var)
   1721      1.1  knakahar {
   1722      1.1  knakahar 
   1723      1.1  knakahar 	/* are the SPs shared? */
   1724      1.1  knakahar 	if (if_ipsec_unshare_sp(var))
   1725      1.1  knakahar 		return;
   1726      1.1  knakahar 
   1727      1.1  knakahar 	(void)if_ipsec_del_sp0(IV_SP_OUT(var));
   1728      1.1  knakahar 	(void)if_ipsec_del_sp0(IV_SP_IN(var));
   1729      1.1  knakahar 	(void)if_ipsec_del_sp0(IV_SP_OUT6(var));
   1730      1.1  knakahar 	(void)if_ipsec_del_sp0(IV_SP_IN6(var));
   1731      1.1  knakahar 	IV_SP_IN(var) = NULL;
   1732      1.1  knakahar 	IV_SP_IN6(var) = NULL;
   1733      1.1  knakahar 	IV_SP_OUT(var) = NULL;
   1734      1.1  knakahar 	IV_SP_OUT6(var) = NULL;
   1735      1.1  knakahar }
   1736      1.1  knakahar 
   1737      1.1  knakahar static int
   1738      1.1  knakahar if_ipsec_replace_sp(struct ipsec_softc *sc, struct ipsec_variant *ovar,
   1739      1.1  knakahar     struct ipsec_variant *nvar)
   1740      1.1  knakahar {
   1741      1.1  knakahar 	in_port_t src_port = 0;
   1742      1.1  knakahar 	in_port_t dst_port = 0;
   1743      1.1  knakahar 	struct sockaddr *src;
   1744      1.1  knakahar 	struct sockaddr *dst;
   1745      1.1  knakahar 	int error = 0;
   1746      1.1  knakahar 
   1747      1.1  knakahar 	KASSERT(mutex_owned(&sc->ipsec_lock));
   1748      1.1  knakahar 
   1749      1.1  knakahar 	if_ipsec_del_sp(ovar);
   1750      1.1  knakahar 
   1751      1.1  knakahar 	src = nvar->iv_psrc;
   1752      1.1  knakahar 	dst = nvar->iv_pdst;
   1753      1.1  knakahar 	if (if_ipsec_nat_t(sc)) {
   1754      1.1  knakahar 		/* NAT-T enabled */
   1755      1.1  knakahar 		src_port = nvar->iv_sport;
   1756      1.1  knakahar 		dst_port = nvar->iv_dport;
   1757      1.1  knakahar 	}
   1758      1.1  knakahar 	if (src && dst)
   1759      1.1  knakahar 		error = if_ipsec_add_sp(nvar, src, src_port, dst, dst_port);
   1760      1.1  knakahar 
   1761      1.1  knakahar 	return error;
   1762      1.1  knakahar }
   1763      1.1  knakahar 
   1764      1.1  knakahar /*
   1765      1.1  knakahar  * ipsec_variant and its SPs update API.
   1766      1.1  knakahar  *
   1767      1.1  knakahar  * Assumption:
   1768      1.1  knakahar  * reader side dereferences sc->ipsec_var in reader critical section only,
   1769      1.1  knakahar  * that is, all of reader sides do not reader the sc->ipsec_var after
   1770      1.1  knakahar  * pserialize_perform().
   1771      1.1  knakahar  */
   1772      1.1  knakahar static int
   1773      1.1  knakahar if_ipsec_update_variant(struct ipsec_softc *sc, struct ipsec_variant *nvar,
   1774      1.1  knakahar     struct ipsec_variant *nullvar)
   1775      1.1  knakahar {
   1776      1.1  knakahar 	struct ifnet *ifp = &sc->ipsec_if;
   1777      1.1  knakahar 	struct ipsec_variant *ovar = sc->ipsec_var;
   1778      1.1  knakahar 	int error;
   1779      1.1  knakahar 
   1780      1.1  knakahar 	KASSERT(mutex_owned(&sc->ipsec_lock));
   1781      1.1  knakahar 
   1782      1.1  knakahar 	/*
   1783      1.1  knakahar 	 * To keep consistency between ipsec(4) I/F settings and SPs,
   1784      1.1  knakahar 	 * we stop packet processing while replacing SPs, that is, we set
   1785      1.1  knakahar 	 * "null" config variant to sc->ipsec_var.
   1786      1.1  knakahar 	 */
   1787      1.1  knakahar 	sc->ipsec_var = nullvar;
   1788      1.1  knakahar 	pserialize_perform(ipsec_psz);
   1789      1.1  knakahar 	psref_target_destroy(&ovar->iv_psref, iv_psref_class);
   1790      1.1  knakahar 
   1791      1.1  knakahar 	error = if_ipsec_replace_sp(sc, ovar, nvar);
   1792      1.1  knakahar 	if (!error)
   1793      1.1  knakahar 		sc->ipsec_var = nvar;
   1794      1.1  knakahar 	else {
   1795      1.1  knakahar 		sc->ipsec_var = ovar; /* rollback */
   1796      1.1  knakahar 		psref_target_init(&ovar->iv_psref, iv_psref_class);
   1797      1.1  knakahar 	}
   1798      1.1  knakahar 
   1799      1.1  knakahar 	pserialize_perform(ipsec_psz);
   1800      1.1  knakahar 	psref_target_destroy(&nullvar->iv_psref, iv_psref_class);
   1801      1.1  knakahar 
   1802      1.1  knakahar 	if (if_ipsec_variant_is_configured(sc->ipsec_var))
   1803      1.1  knakahar 		ifp->if_flags |= IFF_RUNNING;
   1804      1.1  knakahar 	else
   1805      1.1  knakahar 		ifp->if_flags &= ~IFF_RUNNING;
   1806      1.1  knakahar 
   1807      1.1  knakahar 	return error;
   1808      1.1  knakahar }
   1809