if_l2tp.c revision 1.11.6.2 1 1.11.6.2 skrll /* $NetBSD: if_l2tp.c,v 1.11.6.2 2017/08/28 17:53:11 skrll Exp $ */
2 1.11.6.2 skrll
3 1.11.6.2 skrll /*
4 1.11.6.2 skrll * Copyright (c) 2017 Internet Initiative Japan Inc.
5 1.11.6.2 skrll * All rights reserved.
6 1.11.6.2 skrll *
7 1.11.6.2 skrll * Redistribution and use in source and binary forms, with or without
8 1.11.6.2 skrll * modification, are permitted provided that the following conditions
9 1.11.6.2 skrll * are met:
10 1.11.6.2 skrll * 1. Redistributions of source code must retain the above copyright
11 1.11.6.2 skrll * notice, this list of conditions and the following disclaimer.
12 1.11.6.2 skrll * 2. Redistributions in binary form must reproduce the above copyright
13 1.11.6.2 skrll * notice, this list of conditions and the following disclaimer in the
14 1.11.6.2 skrll * documentation and/or other materials provided with the distribution.
15 1.11.6.2 skrll *
16 1.11.6.2 skrll * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17 1.11.6.2 skrll * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18 1.11.6.2 skrll * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19 1.11.6.2 skrll * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20 1.11.6.2 skrll * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21 1.11.6.2 skrll * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22 1.11.6.2 skrll * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23 1.11.6.2 skrll * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24 1.11.6.2 skrll * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25 1.11.6.2 skrll * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26 1.11.6.2 skrll * POSSIBILITY OF SUCH DAMAGE.
27 1.11.6.2 skrll */
28 1.11.6.2 skrll
29 1.11.6.2 skrll /*
30 1.11.6.2 skrll * L2TPv3 kernel interface
31 1.11.6.2 skrll */
32 1.11.6.2 skrll
33 1.11.6.2 skrll #include <sys/cdefs.h>
34 1.11.6.2 skrll __KERNEL_RCSID(0, "$NetBSD: if_l2tp.c,v 1.11.6.2 2017/08/28 17:53:11 skrll Exp $");
35 1.11.6.2 skrll
36 1.11.6.2 skrll #ifdef _KERNEL_OPT
37 1.11.6.2 skrll #include "opt_inet.h"
38 1.11.6.2 skrll #endif
39 1.11.6.2 skrll
40 1.11.6.2 skrll #include <sys/param.h>
41 1.11.6.2 skrll #include <sys/systm.h>
42 1.11.6.2 skrll #include <sys/kernel.h>
43 1.11.6.2 skrll #include <sys/mbuf.h>
44 1.11.6.2 skrll #include <sys/socket.h>
45 1.11.6.2 skrll #include <sys/sockio.h>
46 1.11.6.2 skrll #include <sys/errno.h>
47 1.11.6.2 skrll #include <sys/ioctl.h>
48 1.11.6.2 skrll #include <sys/time.h>
49 1.11.6.2 skrll #include <sys/syslog.h>
50 1.11.6.2 skrll #include <sys/proc.h>
51 1.11.6.2 skrll #include <sys/conf.h>
52 1.11.6.2 skrll #include <sys/kauth.h>
53 1.11.6.2 skrll #include <sys/cpu.h>
54 1.11.6.2 skrll #include <sys/cprng.h>
55 1.11.6.2 skrll #include <sys/intr.h>
56 1.11.6.2 skrll #include <sys/kmem.h>
57 1.11.6.2 skrll #include <sys/mutex.h>
58 1.11.6.2 skrll #include <sys/atomic.h>
59 1.11.6.2 skrll #include <sys/pserialize.h>
60 1.11.6.2 skrll #include <sys/device.h>
61 1.11.6.2 skrll #include <sys/module.h>
62 1.11.6.2 skrll
63 1.11.6.2 skrll #include <net/if.h>
64 1.11.6.2 skrll #include <net/if_dl.h>
65 1.11.6.2 skrll #include <net/if_ether.h>
66 1.11.6.2 skrll #include <net/if_types.h>
67 1.11.6.2 skrll #include <net/netisr.h>
68 1.11.6.2 skrll #include <net/route.h>
69 1.11.6.2 skrll #include <net/bpf.h>
70 1.11.6.2 skrll #include <net/if_vlanvar.h>
71 1.11.6.2 skrll
72 1.11.6.2 skrll #include <netinet/in.h>
73 1.11.6.2 skrll #include <netinet/in_systm.h>
74 1.11.6.2 skrll #include <netinet/ip.h>
75 1.11.6.2 skrll #include <netinet/ip_encap.h>
76 1.11.6.2 skrll #ifdef INET
77 1.11.6.2 skrll #include <netinet/in_var.h>
78 1.11.6.2 skrll #include <netinet/in_l2tp.h>
79 1.11.6.2 skrll #endif /* INET */
80 1.11.6.2 skrll #ifdef INET6
81 1.11.6.2 skrll #include <netinet6/in6_l2tp.h>
82 1.11.6.2 skrll #endif
83 1.11.6.2 skrll
84 1.11.6.2 skrll #include <net/if_l2tp.h>
85 1.11.6.2 skrll
86 1.11.6.2 skrll #include <net/if_vlanvar.h>
87 1.11.6.2 skrll
88 1.11.6.2 skrll /* TODO: IP_TCPMSS support */
89 1.11.6.2 skrll #undef IP_TCPMSS
90 1.11.6.2 skrll #ifdef IP_TCPMSS
91 1.11.6.2 skrll #include <netinet/ip_tcpmss.h>
92 1.11.6.2 skrll #endif
93 1.11.6.2 skrll
94 1.11.6.2 skrll #include <net/bpf.h>
95 1.11.6.2 skrll #include <net/net_osdep.h>
96 1.11.6.2 skrll
97 1.11.6.2 skrll /*
98 1.11.6.2 skrll * l2tp global variable definitions
99 1.11.6.2 skrll */
100 1.11.6.2 skrll LIST_HEAD(l2tp_sclist, l2tp_softc);
101 1.11.6.2 skrll static struct {
102 1.11.6.2 skrll struct l2tp_sclist list;
103 1.11.6.2 skrll kmutex_t lock;
104 1.11.6.2 skrll } l2tp_softcs __cacheline_aligned;
105 1.11.6.2 skrll
106 1.11.6.2 skrll
107 1.11.6.2 skrll #if !defined(L2TP_ID_HASH_SIZE)
108 1.11.6.2 skrll #define L2TP_ID_HASH_SIZE 64
109 1.11.6.2 skrll #endif
110 1.11.6.2 skrll static struct {
111 1.11.6.2 skrll kmutex_t lock;
112 1.11.6.2 skrll struct pslist_head *lists;
113 1.11.6.2 skrll u_long mask;
114 1.11.6.2 skrll } l2tp_hash __cacheline_aligned = {
115 1.11.6.2 skrll .lists = NULL,
116 1.11.6.2 skrll };
117 1.11.6.2 skrll
118 1.11.6.2 skrll pserialize_t l2tp_psz __read_mostly;
119 1.11.6.2 skrll struct psref_class *lv_psref_class __read_mostly;
120 1.11.6.2 skrll
121 1.11.6.2 skrll static void l2tp_ro_init_pc(void *, void *, struct cpu_info *);
122 1.11.6.2 skrll static void l2tp_ro_fini_pc(void *, void *, struct cpu_info *);
123 1.11.6.2 skrll
124 1.11.6.2 skrll static int l2tp_clone_create(struct if_clone *, int);
125 1.11.6.2 skrll static int l2tp_clone_destroy(struct ifnet *);
126 1.11.6.2 skrll
127 1.11.6.2 skrll struct if_clone l2tp_cloner =
128 1.11.6.2 skrll IF_CLONE_INITIALIZER("l2tp", l2tp_clone_create, l2tp_clone_destroy);
129 1.11.6.2 skrll
130 1.11.6.2 skrll static int l2tp_output(struct ifnet *, struct mbuf *,
131 1.11.6.2 skrll const struct sockaddr *, const struct rtentry *);
132 1.11.6.2 skrll static void l2tpintr(struct l2tp_variant *);
133 1.11.6.2 skrll
134 1.11.6.2 skrll static void l2tp_hash_init(void);
135 1.11.6.2 skrll static int l2tp_hash_fini(void);
136 1.11.6.2 skrll
137 1.11.6.2 skrll static void l2tp_start(struct ifnet *);
138 1.11.6.2 skrll static int l2tp_transmit(struct ifnet *, struct mbuf *);
139 1.11.6.2 skrll
140 1.11.6.2 skrll static int l2tp_set_tunnel(struct ifnet *, struct sockaddr *,
141 1.11.6.2 skrll struct sockaddr *);
142 1.11.6.2 skrll static void l2tp_delete_tunnel(struct ifnet *);
143 1.11.6.2 skrll
144 1.11.6.2 skrll static int id_hash_func(uint32_t, u_long);
145 1.11.6.2 skrll
146 1.11.6.2 skrll static void l2tp_variant_update(struct l2tp_softc *, struct l2tp_variant *);
147 1.11.6.2 skrll static int l2tp_set_session(struct l2tp_softc *, uint32_t, uint32_t);
148 1.11.6.2 skrll static int l2tp_clear_session(struct l2tp_softc *);
149 1.11.6.2 skrll static int l2tp_set_cookie(struct l2tp_softc *, uint64_t, u_int, uint64_t, u_int);
150 1.11.6.2 skrll static void l2tp_clear_cookie(struct l2tp_softc *);
151 1.11.6.2 skrll static void l2tp_set_state(struct l2tp_softc *, int);
152 1.11.6.2 skrll static int l2tp_encap_attach(struct l2tp_variant *);
153 1.11.6.2 skrll static int l2tp_encap_detach(struct l2tp_variant *);
154 1.11.6.2 skrll
155 1.11.6.2 skrll #ifndef MAX_L2TP_NEST
156 1.11.6.2 skrll /*
157 1.11.6.2 skrll * This macro controls the upper limitation on nesting of l2tp tunnels.
158 1.11.6.2 skrll * Since, setting a large value to this macro with a careless configuration
159 1.11.6.2 skrll * may introduce system crash, we don't allow any nestings by default.
160 1.11.6.2 skrll * If you need to configure nested l2tp tunnels, you can define this macro
161 1.11.6.2 skrll * in your kernel configuration file. However, if you do so, please be
162 1.11.6.2 skrll * careful to configure the tunnels so that it won't make a loop.
163 1.11.6.2 skrll */
164 1.11.6.2 skrll /*
165 1.11.6.2 skrll * XXX
166 1.11.6.2 skrll * Currently, if in_l2tp_output recursively calls, it causes locking against
167 1.11.6.2 skrll * myself of struct l2tp_ro->lr_lock. So, nested l2tp tunnels is prohibited.
168 1.11.6.2 skrll */
169 1.11.6.2 skrll #define MAX_L2TP_NEST 0
170 1.11.6.2 skrll #endif
171 1.11.6.2 skrll
172 1.11.6.2 skrll static int max_l2tp_nesting = MAX_L2TP_NEST;
173 1.11.6.2 skrll
174 1.11.6.2 skrll /* ARGSUSED */
175 1.11.6.2 skrll void
176 1.11.6.2 skrll l2tpattach(int count)
177 1.11.6.2 skrll {
178 1.11.6.2 skrll /*
179 1.11.6.2 skrll * Nothing to do here, initialization is handled by the
180 1.11.6.2 skrll * module initialization code in l2tpinit() below).
181 1.11.6.2 skrll */
182 1.11.6.2 skrll }
183 1.11.6.2 skrll
184 1.11.6.2 skrll static void
185 1.11.6.2 skrll l2tpinit(void)
186 1.11.6.2 skrll {
187 1.11.6.2 skrll
188 1.11.6.2 skrll mutex_init(&l2tp_softcs.lock, MUTEX_DEFAULT, IPL_NONE);
189 1.11.6.2 skrll LIST_INIT(&l2tp_softcs.list);
190 1.11.6.2 skrll
191 1.11.6.2 skrll mutex_init(&l2tp_hash.lock, MUTEX_DEFAULT, IPL_NONE);
192 1.11.6.2 skrll l2tp_psz = pserialize_create();
193 1.11.6.2 skrll lv_psref_class = psref_class_create("l2tpvar", IPL_SOFTNET);
194 1.11.6.2 skrll if_clone_attach(&l2tp_cloner);
195 1.11.6.2 skrll
196 1.11.6.2 skrll l2tp_hash_init();
197 1.11.6.2 skrll }
198 1.11.6.2 skrll
199 1.11.6.2 skrll static int
200 1.11.6.2 skrll l2tpdetach(void)
201 1.11.6.2 skrll {
202 1.11.6.2 skrll int error;
203 1.11.6.2 skrll
204 1.11.6.2 skrll mutex_enter(&l2tp_softcs.lock);
205 1.11.6.2 skrll if (!LIST_EMPTY(&l2tp_softcs.list)) {
206 1.11.6.2 skrll mutex_exit(&l2tp_softcs.lock);
207 1.11.6.2 skrll return EBUSY;
208 1.11.6.2 skrll }
209 1.11.6.2 skrll mutex_exit(&l2tp_softcs.lock);
210 1.11.6.2 skrll
211 1.11.6.2 skrll error = l2tp_hash_fini();
212 1.11.6.2 skrll if (error)
213 1.11.6.2 skrll return error;
214 1.11.6.2 skrll
215 1.11.6.2 skrll if_clone_detach(&l2tp_cloner);
216 1.11.6.2 skrll psref_class_destroy(lv_psref_class);
217 1.11.6.2 skrll pserialize_destroy(l2tp_psz);
218 1.11.6.2 skrll mutex_destroy(&l2tp_hash.lock);
219 1.11.6.2 skrll
220 1.11.6.2 skrll mutex_destroy(&l2tp_softcs.lock);
221 1.11.6.2 skrll
222 1.11.6.2 skrll return error;
223 1.11.6.2 skrll }
224 1.11.6.2 skrll
225 1.11.6.2 skrll static int
226 1.11.6.2 skrll l2tp_clone_create(struct if_clone *ifc, int unit)
227 1.11.6.2 skrll {
228 1.11.6.2 skrll struct l2tp_softc *sc;
229 1.11.6.2 skrll struct l2tp_variant *var;
230 1.11.6.2 skrll
231 1.11.6.2 skrll sc = kmem_zalloc(sizeof(struct l2tp_softc), KM_SLEEP);
232 1.11.6.2 skrll var = kmem_zalloc(sizeof(struct l2tp_variant), KM_SLEEP);
233 1.11.6.2 skrll
234 1.11.6.2 skrll var->lv_softc = sc;
235 1.11.6.2 skrll var->lv_state = L2TP_STATE_DOWN;
236 1.11.6.2 skrll var->lv_use_cookie = L2TP_COOKIE_OFF;
237 1.11.6.2 skrll psref_target_init(&var->lv_psref, lv_psref_class);
238 1.11.6.2 skrll
239 1.11.6.2 skrll sc->l2tp_var = var;
240 1.11.6.2 skrll mutex_init(&sc->l2tp_lock, MUTEX_DEFAULT, IPL_NONE);
241 1.11.6.2 skrll PSLIST_ENTRY_INIT(sc, l2tp_hash);
242 1.11.6.2 skrll
243 1.11.6.2 skrll if_initname(&sc->l2tp_ec.ec_if, ifc->ifc_name, unit);
244 1.11.6.2 skrll
245 1.11.6.2 skrll l2tpattach0(sc);
246 1.11.6.2 skrll
247 1.11.6.2 skrll sc->l2tp_ro_percpu = percpu_alloc(sizeof(struct l2tp_ro));
248 1.11.6.2 skrll percpu_foreach(sc->l2tp_ro_percpu, l2tp_ro_init_pc, NULL);
249 1.11.6.2 skrll
250 1.11.6.2 skrll mutex_enter(&l2tp_softcs.lock);
251 1.11.6.2 skrll LIST_INSERT_HEAD(&l2tp_softcs.list, sc, l2tp_list);
252 1.11.6.2 skrll mutex_exit(&l2tp_softcs.lock);
253 1.11.6.2 skrll
254 1.11.6.2 skrll return (0);
255 1.11.6.2 skrll }
256 1.11.6.2 skrll
257 1.11.6.2 skrll void
258 1.11.6.2 skrll l2tpattach0(struct l2tp_softc *sc)
259 1.11.6.2 skrll {
260 1.11.6.2 skrll
261 1.11.6.2 skrll sc->l2tp_ec.ec_if.if_addrlen = 0;
262 1.11.6.2 skrll sc->l2tp_ec.ec_if.if_mtu = L2TP_MTU;
263 1.11.6.2 skrll sc->l2tp_ec.ec_if.if_flags = IFF_POINTOPOINT|IFF_MULTICAST|IFF_SIMPLEX;
264 1.11.6.2 skrll sc->l2tp_ec.ec_if.if_extflags = IFEF_OUTPUT_MPSAFE|IFEF_START_MPSAFE;
265 1.11.6.2 skrll sc->l2tp_ec.ec_if.if_ioctl = l2tp_ioctl;
266 1.11.6.2 skrll sc->l2tp_ec.ec_if.if_output = l2tp_output;
267 1.11.6.2 skrll sc->l2tp_ec.ec_if.if_type = IFT_L2TP;
268 1.11.6.2 skrll sc->l2tp_ec.ec_if.if_dlt = DLT_NULL;
269 1.11.6.2 skrll sc->l2tp_ec.ec_if.if_start = l2tp_start;
270 1.11.6.2 skrll sc->l2tp_ec.ec_if.if_transmit = l2tp_transmit;
271 1.11.6.2 skrll sc->l2tp_ec.ec_if._if_input = ether_input;
272 1.11.6.2 skrll IFQ_SET_READY(&sc->l2tp_ec.ec_if.if_snd);
273 1.11.6.2 skrll if_attach(&sc->l2tp_ec.ec_if);
274 1.11.6.2 skrll if_alloc_sadl(&sc->l2tp_ec.ec_if);
275 1.11.6.2 skrll bpf_attach(&sc->l2tp_ec.ec_if, DLT_EN10MB, sizeof(struct ether_header));
276 1.11.6.2 skrll }
277 1.11.6.2 skrll
278 1.11.6.2 skrll void
279 1.11.6.2 skrll l2tp_ro_init_pc(void *p, void *arg __unused, struct cpu_info *ci __unused)
280 1.11.6.2 skrll {
281 1.11.6.2 skrll struct l2tp_ro *lro = p;
282 1.11.6.2 skrll
283 1.11.6.2 skrll mutex_init(&lro->lr_lock, MUTEX_DEFAULT, IPL_NONE);
284 1.11.6.2 skrll }
285 1.11.6.2 skrll
286 1.11.6.2 skrll void
287 1.11.6.2 skrll l2tp_ro_fini_pc(void *p, void *arg __unused, struct cpu_info *ci __unused)
288 1.11.6.2 skrll {
289 1.11.6.2 skrll struct l2tp_ro *lro = p;
290 1.11.6.2 skrll
291 1.11.6.2 skrll rtcache_free(&lro->lr_ro);
292 1.11.6.2 skrll
293 1.11.6.2 skrll mutex_destroy(&lro->lr_lock);
294 1.11.6.2 skrll }
295 1.11.6.2 skrll
296 1.11.6.2 skrll static int
297 1.11.6.2 skrll l2tp_clone_destroy(struct ifnet *ifp)
298 1.11.6.2 skrll {
299 1.11.6.2 skrll struct l2tp_variant *var;
300 1.11.6.2 skrll struct l2tp_softc *sc = container_of(ifp, struct l2tp_softc,
301 1.11.6.2 skrll l2tp_ec.ec_if);
302 1.11.6.2 skrll
303 1.11.6.2 skrll l2tp_clear_session(sc);
304 1.11.6.2 skrll l2tp_delete_tunnel(&sc->l2tp_ec.ec_if);
305 1.11.6.2 skrll /*
306 1.11.6.2 skrll * To avoid for l2tp_transmit() to access sc->l2tp_var after free it.
307 1.11.6.2 skrll */
308 1.11.6.2 skrll mutex_enter(&sc->l2tp_lock);
309 1.11.6.2 skrll var = sc->l2tp_var;
310 1.11.6.2 skrll l2tp_variant_update(sc, NULL);
311 1.11.6.2 skrll mutex_exit(&sc->l2tp_lock);
312 1.11.6.2 skrll
313 1.11.6.2 skrll mutex_enter(&l2tp_softcs.lock);
314 1.11.6.2 skrll LIST_REMOVE(sc, l2tp_list);
315 1.11.6.2 skrll mutex_exit(&l2tp_softcs.lock);
316 1.11.6.2 skrll
317 1.11.6.2 skrll bpf_detach(ifp);
318 1.11.6.2 skrll
319 1.11.6.2 skrll if_detach(ifp);
320 1.11.6.2 skrll
321 1.11.6.2 skrll percpu_foreach(sc->l2tp_ro_percpu, l2tp_ro_fini_pc, NULL);
322 1.11.6.2 skrll percpu_free(sc->l2tp_ro_percpu, sizeof(struct l2tp_ro));
323 1.11.6.2 skrll
324 1.11.6.2 skrll kmem_free(var, sizeof(struct l2tp_variant));
325 1.11.6.2 skrll mutex_destroy(&sc->l2tp_lock);
326 1.11.6.2 skrll kmem_free(sc, sizeof(struct l2tp_softc));
327 1.11.6.2 skrll
328 1.11.6.2 skrll return 0;
329 1.11.6.2 skrll }
330 1.11.6.2 skrll
331 1.11.6.2 skrll static int
332 1.11.6.2 skrll l2tp_output(struct ifnet *ifp, struct mbuf *m, const struct sockaddr *dst,
333 1.11.6.2 skrll const struct rtentry *rt)
334 1.11.6.2 skrll {
335 1.11.6.2 skrll struct l2tp_softc *sc = container_of(ifp, struct l2tp_softc,
336 1.11.6.2 skrll l2tp_ec.ec_if);
337 1.11.6.2 skrll struct l2tp_variant *var;
338 1.11.6.2 skrll struct psref psref;
339 1.11.6.2 skrll int error = 0;
340 1.11.6.2 skrll
341 1.11.6.2 skrll var = l2tp_getref_variant(sc, &psref);
342 1.11.6.2 skrll if (var == NULL) {
343 1.11.6.2 skrll m_freem(m);
344 1.11.6.2 skrll return ENETDOWN;
345 1.11.6.2 skrll }
346 1.11.6.2 skrll
347 1.11.6.2 skrll IFQ_CLASSIFY(&ifp->if_snd, m, dst->sa_family);
348 1.11.6.2 skrll
349 1.11.6.2 skrll m->m_flags &= ~(M_BCAST|M_MCAST);
350 1.11.6.2 skrll
351 1.11.6.2 skrll if ((ifp->if_flags & IFF_UP) == 0) {
352 1.11.6.2 skrll m_freem(m);
353 1.11.6.2 skrll error = ENETDOWN;
354 1.11.6.2 skrll goto end;
355 1.11.6.2 skrll }
356 1.11.6.2 skrll
357 1.11.6.2 skrll if (var->lv_psrc == NULL || var->lv_pdst == NULL) {
358 1.11.6.2 skrll m_freem(m);
359 1.11.6.2 skrll error = ENETDOWN;
360 1.11.6.2 skrll goto end;
361 1.11.6.2 skrll }
362 1.11.6.2 skrll
363 1.11.6.2 skrll /* XXX should we check if our outer source is legal? */
364 1.11.6.2 skrll
365 1.11.6.2 skrll /* use DLT_NULL encapsulation here to pass inner af type */
366 1.11.6.2 skrll M_PREPEND(m, sizeof(int), M_DONTWAIT);
367 1.11.6.2 skrll if (!m) {
368 1.11.6.2 skrll error = ENOBUFS;
369 1.11.6.2 skrll goto end;
370 1.11.6.2 skrll }
371 1.11.6.2 skrll *mtod(m, int *) = dst->sa_family;
372 1.11.6.2 skrll
373 1.11.6.2 skrll IFQ_ENQUEUE(&ifp->if_snd, m, error);
374 1.11.6.2 skrll if (error)
375 1.11.6.2 skrll goto end;
376 1.11.6.2 skrll
377 1.11.6.2 skrll /*
378 1.11.6.2 skrll * direct call to avoid infinite loop at l2tpintr()
379 1.11.6.2 skrll */
380 1.11.6.2 skrll l2tpintr(var);
381 1.11.6.2 skrll
382 1.11.6.2 skrll error = 0;
383 1.11.6.2 skrll
384 1.11.6.2 skrll end:
385 1.11.6.2 skrll l2tp_putref_variant(var, &psref);
386 1.11.6.2 skrll if (error)
387 1.11.6.2 skrll ifp->if_oerrors++;
388 1.11.6.2 skrll
389 1.11.6.2 skrll return error;
390 1.11.6.2 skrll }
391 1.11.6.2 skrll
392 1.11.6.2 skrll static void
393 1.11.6.2 skrll l2tpintr(struct l2tp_variant *var)
394 1.11.6.2 skrll {
395 1.11.6.2 skrll struct l2tp_softc *sc;
396 1.11.6.2 skrll struct ifnet *ifp;
397 1.11.6.2 skrll struct mbuf *m;
398 1.11.6.2 skrll int error;
399 1.11.6.2 skrll
400 1.11.6.2 skrll KASSERT(psref_held(&var->lv_psref, lv_psref_class));
401 1.11.6.2 skrll
402 1.11.6.2 skrll sc = var->lv_softc;
403 1.11.6.2 skrll ifp = &sc->l2tp_ec.ec_if;
404 1.11.6.2 skrll
405 1.11.6.2 skrll /* output processing */
406 1.11.6.2 skrll if (var->lv_my_sess_id == 0 || var->lv_peer_sess_id == 0) {
407 1.11.6.2 skrll IFQ_PURGE(&ifp->if_snd);
408 1.11.6.2 skrll return;
409 1.11.6.2 skrll }
410 1.11.6.2 skrll
411 1.11.6.2 skrll for (;;) {
412 1.11.6.2 skrll IFQ_DEQUEUE(&ifp->if_snd, m);
413 1.11.6.2 skrll if (m == NULL)
414 1.11.6.2 skrll break;
415 1.11.6.2 skrll m->m_flags &= ~(M_BCAST|M_MCAST);
416 1.11.6.2 skrll bpf_mtap(ifp, m);
417 1.11.6.2 skrll switch (var->lv_psrc->sa_family) {
418 1.11.6.2 skrll #ifdef INET
419 1.11.6.2 skrll case AF_INET:
420 1.11.6.2 skrll error = in_l2tp_output(var, m);
421 1.11.6.2 skrll break;
422 1.11.6.2 skrll #endif
423 1.11.6.2 skrll #ifdef INET6
424 1.11.6.2 skrll case AF_INET6:
425 1.11.6.2 skrll error = in6_l2tp_output(var, m);
426 1.11.6.2 skrll break;
427 1.11.6.2 skrll #endif
428 1.11.6.2 skrll default:
429 1.11.6.2 skrll m_freem(m);
430 1.11.6.2 skrll error = ENETDOWN;
431 1.11.6.2 skrll break;
432 1.11.6.2 skrll }
433 1.11.6.2 skrll
434 1.11.6.2 skrll if (error)
435 1.11.6.2 skrll ifp->if_oerrors++;
436 1.11.6.2 skrll else {
437 1.11.6.2 skrll ifp->if_opackets++;
438 1.11.6.2 skrll /*
439 1.11.6.2 skrll * obytes is incremented at ether_output() or
440 1.11.6.2 skrll * bridge_enqueue().
441 1.11.6.2 skrll */
442 1.11.6.2 skrll }
443 1.11.6.2 skrll }
444 1.11.6.2 skrll
445 1.11.6.2 skrll }
446 1.11.6.2 skrll
447 1.11.6.2 skrll void
448 1.11.6.2 skrll l2tp_input(struct mbuf *m, struct ifnet *ifp)
449 1.11.6.2 skrll {
450 1.11.6.2 skrll
451 1.11.6.2 skrll KASSERT(ifp != NULL);
452 1.11.6.2 skrll
453 1.11.6.2 skrll if (0 == (mtod(m, u_long) & 0x03)) {
454 1.11.6.2 skrll /* copy and align head of payload */
455 1.11.6.2 skrll struct mbuf *m_head;
456 1.11.6.2 skrll int copy_length;
457 1.11.6.2 skrll
458 1.11.6.2 skrll #define L2TP_COPY_LENGTH 60
459 1.11.6.2 skrll #define L2TP_LINK_HDR_ROOM (MHLEN - L2TP_COPY_LENGTH - 4/*round4(2)*/)
460 1.11.6.2 skrll
461 1.11.6.2 skrll if (m->m_pkthdr.len < L2TP_COPY_LENGTH) {
462 1.11.6.2 skrll copy_length = m->m_pkthdr.len;
463 1.11.6.2 skrll } else {
464 1.11.6.2 skrll copy_length = L2TP_COPY_LENGTH;
465 1.11.6.2 skrll }
466 1.11.6.2 skrll
467 1.11.6.2 skrll if (m->m_len < copy_length) {
468 1.11.6.2 skrll m = m_pullup(m, copy_length);
469 1.11.6.2 skrll if (m == NULL)
470 1.11.6.2 skrll return;
471 1.11.6.2 skrll }
472 1.11.6.2 skrll
473 1.11.6.2 skrll MGETHDR(m_head, M_DONTWAIT, MT_HEADER);
474 1.11.6.2 skrll if (m_head == NULL) {
475 1.11.6.2 skrll m_freem(m);
476 1.11.6.2 skrll return;
477 1.11.6.2 skrll }
478 1.11.6.2 skrll M_COPY_PKTHDR(m_head, m);
479 1.11.6.2 skrll
480 1.11.6.2 skrll m_head->m_data += 2 /* align */ + L2TP_LINK_HDR_ROOM;
481 1.11.6.2 skrll memcpy(m_head->m_data, m->m_data, copy_length);
482 1.11.6.2 skrll m_head->m_len = copy_length;
483 1.11.6.2 skrll m->m_data += copy_length;
484 1.11.6.2 skrll m->m_len -= copy_length;
485 1.11.6.2 skrll
486 1.11.6.2 skrll /* construct chain */
487 1.11.6.2 skrll if (m->m_len == 0) {
488 1.11.6.2 skrll m_head->m_next = m_free(m); /* not m_freem */
489 1.11.6.2 skrll } else {
490 1.11.6.2 skrll /*
491 1.11.6.2 skrll * copyed mtag in previous call M_COPY_PKTHDR
492 1.11.6.2 skrll * but don't delete mtag in case cutt of M_PKTHDR flag
493 1.11.6.2 skrll */
494 1.11.6.2 skrll m_tag_delete_chain(m, NULL);
495 1.11.6.2 skrll m->m_flags &= ~M_PKTHDR;
496 1.11.6.2 skrll m_head->m_next = m;
497 1.11.6.2 skrll }
498 1.11.6.2 skrll
499 1.11.6.2 skrll /* override m */
500 1.11.6.2 skrll m = m_head;
501 1.11.6.2 skrll }
502 1.11.6.2 skrll
503 1.11.6.2 skrll m_set_rcvif(m, ifp);
504 1.11.6.2 skrll
505 1.11.6.2 skrll /*
506 1.11.6.2 skrll * bpf_mtap() and ifp->if_ipackets++ is done in if_input()
507 1.11.6.2 skrll *
508 1.11.6.2 skrll * obytes is incremented at ether_output() or bridge_enqueue().
509 1.11.6.2 skrll */
510 1.11.6.2 skrll if_percpuq_enqueue(ifp->if_percpuq, m);
511 1.11.6.2 skrll }
512 1.11.6.2 skrll
513 1.11.6.2 skrll void
514 1.11.6.2 skrll l2tp_start(struct ifnet *ifp)
515 1.11.6.2 skrll {
516 1.11.6.2 skrll struct psref psref;
517 1.11.6.2 skrll struct l2tp_variant *var;
518 1.11.6.2 skrll struct l2tp_softc *sc = container_of(ifp, struct l2tp_softc,
519 1.11.6.2 skrll l2tp_ec.ec_if);
520 1.11.6.2 skrll
521 1.11.6.2 skrll var = l2tp_getref_variant(sc, &psref);
522 1.11.6.2 skrll if (var == NULL)
523 1.11.6.2 skrll return;
524 1.11.6.2 skrll
525 1.11.6.2 skrll if (var->lv_psrc == NULL || var->lv_pdst == NULL)
526 1.11.6.2 skrll return;
527 1.11.6.2 skrll
528 1.11.6.2 skrll l2tpintr(var);
529 1.11.6.2 skrll l2tp_putref_variant(var, &psref);
530 1.11.6.2 skrll }
531 1.11.6.2 skrll
532 1.11.6.2 skrll int
533 1.11.6.2 skrll l2tp_transmit(struct ifnet *ifp, struct mbuf *m)
534 1.11.6.2 skrll {
535 1.11.6.2 skrll int error;
536 1.11.6.2 skrll struct psref psref;
537 1.11.6.2 skrll struct l2tp_variant *var;
538 1.11.6.2 skrll struct l2tp_softc *sc = container_of(ifp, struct l2tp_softc,
539 1.11.6.2 skrll l2tp_ec.ec_if);
540 1.11.6.2 skrll
541 1.11.6.2 skrll var = l2tp_getref_variant(sc, &psref);
542 1.11.6.2 skrll if (var == NULL) {
543 1.11.6.2 skrll m_freem(m);
544 1.11.6.2 skrll return ENETDOWN;
545 1.11.6.2 skrll }
546 1.11.6.2 skrll
547 1.11.6.2 skrll if (var->lv_psrc == NULL || var->lv_pdst == NULL) {
548 1.11.6.2 skrll m_freem(m);
549 1.11.6.2 skrll error = ENETDOWN;
550 1.11.6.2 skrll goto out;
551 1.11.6.2 skrll }
552 1.11.6.2 skrll
553 1.11.6.2 skrll m->m_flags &= ~(M_BCAST|M_MCAST);
554 1.11.6.2 skrll bpf_mtap(ifp, m);
555 1.11.6.2 skrll switch (var->lv_psrc->sa_family) {
556 1.11.6.2 skrll #ifdef INET
557 1.11.6.2 skrll case AF_INET:
558 1.11.6.2 skrll error = in_l2tp_output(var, m);
559 1.11.6.2 skrll break;
560 1.11.6.2 skrll #endif
561 1.11.6.2 skrll #ifdef INET6
562 1.11.6.2 skrll case AF_INET6:
563 1.11.6.2 skrll error = in6_l2tp_output(var, m);
564 1.11.6.2 skrll break;
565 1.11.6.2 skrll #endif
566 1.11.6.2 skrll default:
567 1.11.6.2 skrll m_freem(m);
568 1.11.6.2 skrll error = ENETDOWN;
569 1.11.6.2 skrll break;
570 1.11.6.2 skrll }
571 1.11.6.2 skrll
572 1.11.6.2 skrll if (error)
573 1.11.6.2 skrll ifp->if_oerrors++;
574 1.11.6.2 skrll else {
575 1.11.6.2 skrll ifp->if_opackets++;
576 1.11.6.2 skrll /*
577 1.11.6.2 skrll * obytes is incremented at ether_output() or bridge_enqueue().
578 1.11.6.2 skrll */
579 1.11.6.2 skrll }
580 1.11.6.2 skrll
581 1.11.6.2 skrll out:
582 1.11.6.2 skrll l2tp_putref_variant(var, &psref);
583 1.11.6.2 skrll return error;
584 1.11.6.2 skrll }
585 1.11.6.2 skrll
586 1.11.6.2 skrll /* XXX how should we handle IPv6 scope on SIOC[GS]IFPHYADDR? */
587 1.11.6.2 skrll int
588 1.11.6.2 skrll l2tp_ioctl(struct ifnet *ifp, u_long cmd, void *data)
589 1.11.6.2 skrll {
590 1.11.6.2 skrll struct l2tp_softc *sc = container_of(ifp, struct l2tp_softc,
591 1.11.6.2 skrll l2tp_ec.ec_if);
592 1.11.6.2 skrll struct l2tp_variant *var, *var_tmp;
593 1.11.6.2 skrll struct ifreq *ifr = data;
594 1.11.6.2 skrll int error = 0, size;
595 1.11.6.2 skrll struct sockaddr *dst, *src;
596 1.11.6.2 skrll struct l2tp_req l2tpr;
597 1.11.6.2 skrll u_long mtu;
598 1.11.6.2 skrll int bound;
599 1.11.6.2 skrll struct psref psref;
600 1.11.6.2 skrll
601 1.11.6.2 skrll switch (cmd) {
602 1.11.6.2 skrll case SIOCSIFADDR:
603 1.11.6.2 skrll ifp->if_flags |= IFF_UP;
604 1.11.6.2 skrll break;
605 1.11.6.2 skrll
606 1.11.6.2 skrll case SIOCSIFDSTADDR:
607 1.11.6.2 skrll break;
608 1.11.6.2 skrll
609 1.11.6.2 skrll case SIOCADDMULTI:
610 1.11.6.2 skrll case SIOCDELMULTI:
611 1.11.6.2 skrll switch (ifr->ifr_addr.sa_family) {
612 1.11.6.2 skrll #ifdef INET
613 1.11.6.2 skrll case AF_INET: /* IP supports Multicast */
614 1.11.6.2 skrll break;
615 1.11.6.2 skrll #endif /* INET */
616 1.11.6.2 skrll #ifdef INET6
617 1.11.6.2 skrll case AF_INET6: /* IP6 supports Multicast */
618 1.11.6.2 skrll break;
619 1.11.6.2 skrll #endif /* INET6 */
620 1.11.6.2 skrll default: /* Other protocols doesn't support Multicast */
621 1.11.6.2 skrll error = EAFNOSUPPORT;
622 1.11.6.2 skrll break;
623 1.11.6.2 skrll }
624 1.11.6.2 skrll break;
625 1.11.6.2 skrll
626 1.11.6.2 skrll case SIOCSIFMTU:
627 1.11.6.2 skrll mtu = ifr->ifr_mtu;
628 1.11.6.2 skrll if (mtu < L2TP_MTU_MIN || mtu > L2TP_MTU_MAX)
629 1.11.6.2 skrll return (EINVAL);
630 1.11.6.2 skrll ifp->if_mtu = mtu;
631 1.11.6.2 skrll break;
632 1.11.6.2 skrll
633 1.11.6.2 skrll #ifdef INET
634 1.11.6.2 skrll case SIOCSIFPHYADDR:
635 1.11.6.2 skrll src = (struct sockaddr *)
636 1.11.6.2 skrll &(((struct in_aliasreq *)data)->ifra_addr);
637 1.11.6.2 skrll dst = (struct sockaddr *)
638 1.11.6.2 skrll &(((struct in_aliasreq *)data)->ifra_dstaddr);
639 1.11.6.2 skrll if (src->sa_family != AF_INET || dst->sa_family != AF_INET)
640 1.11.6.2 skrll return EAFNOSUPPORT;
641 1.11.6.2 skrll else if (src->sa_len != sizeof(struct sockaddr_in)
642 1.11.6.2 skrll || dst->sa_len != sizeof(struct sockaddr_in))
643 1.11.6.2 skrll return EINVAL;
644 1.11.6.2 skrll
645 1.11.6.2 skrll error = l2tp_set_tunnel(&sc->l2tp_ec.ec_if, src, dst);
646 1.11.6.2 skrll break;
647 1.11.6.2 skrll
648 1.11.6.2 skrll #endif /* INET */
649 1.11.6.2 skrll #ifdef INET6
650 1.11.6.2 skrll case SIOCSIFPHYADDR_IN6:
651 1.11.6.2 skrll src = (struct sockaddr *)
652 1.11.6.2 skrll &(((struct in6_aliasreq *)data)->ifra_addr);
653 1.11.6.2 skrll dst = (struct sockaddr *)
654 1.11.6.2 skrll &(((struct in6_aliasreq *)data)->ifra_dstaddr);
655 1.11.6.2 skrll if (src->sa_family != AF_INET6 || dst->sa_family != AF_INET6)
656 1.11.6.2 skrll return EAFNOSUPPORT;
657 1.11.6.2 skrll else if (src->sa_len != sizeof(struct sockaddr_in6)
658 1.11.6.2 skrll || dst->sa_len != sizeof(struct sockaddr_in6))
659 1.11.6.2 skrll return EINVAL;
660 1.11.6.2 skrll
661 1.11.6.2 skrll error = l2tp_set_tunnel(&sc->l2tp_ec.ec_if, src, dst);
662 1.11.6.2 skrll break;
663 1.11.6.2 skrll
664 1.11.6.2 skrll #endif /* INET6 */
665 1.11.6.2 skrll case SIOCSLIFPHYADDR:
666 1.11.6.2 skrll src = (struct sockaddr *)
667 1.11.6.2 skrll &(((struct if_laddrreq *)data)->addr);
668 1.11.6.2 skrll dst = (struct sockaddr *)
669 1.11.6.2 skrll &(((struct if_laddrreq *)data)->dstaddr);
670 1.11.6.2 skrll if (src->sa_family != dst->sa_family)
671 1.11.6.2 skrll return EINVAL;
672 1.11.6.2 skrll else if (src->sa_family == AF_INET
673 1.11.6.2 skrll && src->sa_len != sizeof(struct sockaddr_in))
674 1.11.6.2 skrll return EINVAL;
675 1.11.6.2 skrll else if (src->sa_family == AF_INET6
676 1.11.6.2 skrll && src->sa_len != sizeof(struct sockaddr_in6))
677 1.11.6.2 skrll return EINVAL;
678 1.11.6.2 skrll else if (dst->sa_family == AF_INET
679 1.11.6.2 skrll && dst->sa_len != sizeof(struct sockaddr_in))
680 1.11.6.2 skrll return EINVAL;
681 1.11.6.2 skrll else if (dst->sa_family == AF_INET6
682 1.11.6.2 skrll && dst->sa_len != sizeof(struct sockaddr_in6))
683 1.11.6.2 skrll return EINVAL;
684 1.11.6.2 skrll
685 1.11.6.2 skrll error = l2tp_set_tunnel(&sc->l2tp_ec.ec_if, src, dst);
686 1.11.6.2 skrll break;
687 1.11.6.2 skrll
688 1.11.6.2 skrll case SIOCDIFPHYADDR:
689 1.11.6.2 skrll l2tp_delete_tunnel(&sc->l2tp_ec.ec_if);
690 1.11.6.2 skrll break;
691 1.11.6.2 skrll
692 1.11.6.2 skrll case SIOCGIFPSRCADDR:
693 1.11.6.2 skrll #ifdef INET6
694 1.11.6.2 skrll case SIOCGIFPSRCADDR_IN6:
695 1.11.6.2 skrll #endif /* INET6 */
696 1.11.6.2 skrll bound = curlwp_bind();
697 1.11.6.2 skrll var = l2tp_getref_variant(sc, &psref);
698 1.11.6.2 skrll if (var == NULL) {
699 1.11.6.2 skrll curlwp_bindx(bound);
700 1.11.6.2 skrll error = EADDRNOTAVAIL;
701 1.11.6.2 skrll goto bad;
702 1.11.6.2 skrll }
703 1.11.6.2 skrll if (var->lv_psrc == NULL) {
704 1.11.6.2 skrll l2tp_putref_variant(var, &psref);
705 1.11.6.2 skrll curlwp_bindx(bound);
706 1.11.6.2 skrll error = EADDRNOTAVAIL;
707 1.11.6.2 skrll goto bad;
708 1.11.6.2 skrll }
709 1.11.6.2 skrll src = var->lv_psrc;
710 1.11.6.2 skrll switch (cmd) {
711 1.11.6.2 skrll #ifdef INET
712 1.11.6.2 skrll case SIOCGIFPSRCADDR:
713 1.11.6.2 skrll dst = &ifr->ifr_addr;
714 1.11.6.2 skrll size = sizeof(ifr->ifr_addr);
715 1.11.6.2 skrll break;
716 1.11.6.2 skrll #endif /* INET */
717 1.11.6.2 skrll #ifdef INET6
718 1.11.6.2 skrll case SIOCGIFPSRCADDR_IN6:
719 1.11.6.2 skrll dst = (struct sockaddr *)
720 1.11.6.2 skrll &(((struct in6_ifreq *)data)->ifr_addr);
721 1.11.6.2 skrll size = sizeof(((struct in6_ifreq *)data)->ifr_addr);
722 1.11.6.2 skrll break;
723 1.11.6.2 skrll #endif /* INET6 */
724 1.11.6.2 skrll default:
725 1.11.6.2 skrll l2tp_putref_variant(var, &psref);
726 1.11.6.2 skrll curlwp_bindx(bound);
727 1.11.6.2 skrll error = EADDRNOTAVAIL;
728 1.11.6.2 skrll goto bad;
729 1.11.6.2 skrll }
730 1.11.6.2 skrll if (src->sa_len > size) {
731 1.11.6.2 skrll l2tp_putref_variant(var, &psref);
732 1.11.6.2 skrll curlwp_bindx(bound);
733 1.11.6.2 skrll return EINVAL;
734 1.11.6.2 skrll }
735 1.11.6.2 skrll sockaddr_copy(dst, src->sa_len, src);
736 1.11.6.2 skrll l2tp_putref_variant(var, &psref);
737 1.11.6.2 skrll curlwp_bindx(bound);
738 1.11.6.2 skrll break;
739 1.11.6.2 skrll
740 1.11.6.2 skrll case SIOCGIFPDSTADDR:
741 1.11.6.2 skrll #ifdef INET6
742 1.11.6.2 skrll case SIOCGIFPDSTADDR_IN6:
743 1.11.6.2 skrll #endif /* INET6 */
744 1.11.6.2 skrll bound = curlwp_bind();
745 1.11.6.2 skrll var = l2tp_getref_variant(sc, &psref);
746 1.11.6.2 skrll if (var == NULL) {
747 1.11.6.2 skrll curlwp_bindx(bound);
748 1.11.6.2 skrll error = EADDRNOTAVAIL;
749 1.11.6.2 skrll goto bad;
750 1.11.6.2 skrll }
751 1.11.6.2 skrll if (var->lv_pdst == NULL) {
752 1.11.6.2 skrll l2tp_putref_variant(var, &psref);
753 1.11.6.2 skrll curlwp_bindx(bound);
754 1.11.6.2 skrll error = EADDRNOTAVAIL;
755 1.11.6.2 skrll goto bad;
756 1.11.6.2 skrll }
757 1.11.6.2 skrll src = var->lv_pdst;
758 1.11.6.2 skrll switch (cmd) {
759 1.11.6.2 skrll #ifdef INET
760 1.11.6.2 skrll case SIOCGIFPDSTADDR:
761 1.11.6.2 skrll dst = &ifr->ifr_addr;
762 1.11.6.2 skrll size = sizeof(ifr->ifr_addr);
763 1.11.6.2 skrll break;
764 1.11.6.2 skrll #endif /* INET */
765 1.11.6.2 skrll #ifdef INET6
766 1.11.6.2 skrll case SIOCGIFPDSTADDR_IN6:
767 1.11.6.2 skrll dst = (struct sockaddr *)
768 1.11.6.2 skrll &(((struct in6_ifreq *)data)->ifr_addr);
769 1.11.6.2 skrll size = sizeof(((struct in6_ifreq *)data)->ifr_addr);
770 1.11.6.2 skrll break;
771 1.11.6.2 skrll #endif /* INET6 */
772 1.11.6.2 skrll default:
773 1.11.6.2 skrll l2tp_putref_variant(var, &psref);
774 1.11.6.2 skrll curlwp_bindx(bound);
775 1.11.6.2 skrll error = EADDRNOTAVAIL;
776 1.11.6.2 skrll goto bad;
777 1.11.6.2 skrll }
778 1.11.6.2 skrll if (src->sa_len > size) {
779 1.11.6.2 skrll l2tp_putref_variant(var, &psref);
780 1.11.6.2 skrll curlwp_bindx(bound);
781 1.11.6.2 skrll return EINVAL;
782 1.11.6.2 skrll }
783 1.11.6.2 skrll sockaddr_copy(dst, src->sa_len, src);
784 1.11.6.2 skrll l2tp_putref_variant(var, &psref);
785 1.11.6.2 skrll curlwp_bindx(bound);
786 1.11.6.2 skrll break;
787 1.11.6.2 skrll
788 1.11.6.2 skrll case SIOCGLIFPHYADDR:
789 1.11.6.2 skrll bound = curlwp_bind();
790 1.11.6.2 skrll var = l2tp_getref_variant(sc, &psref);
791 1.11.6.2 skrll if (var == NULL) {
792 1.11.6.2 skrll curlwp_bindx(bound);
793 1.11.6.2 skrll error = EADDRNOTAVAIL;
794 1.11.6.2 skrll goto bad;
795 1.11.6.2 skrll }
796 1.11.6.2 skrll if (var->lv_psrc == NULL || var->lv_pdst == NULL) {
797 1.11.6.2 skrll l2tp_putref_variant(var, &psref);
798 1.11.6.2 skrll curlwp_bindx(bound);
799 1.11.6.2 skrll error = EADDRNOTAVAIL;
800 1.11.6.2 skrll goto bad;
801 1.11.6.2 skrll }
802 1.11.6.2 skrll
803 1.11.6.2 skrll /* copy src */
804 1.11.6.2 skrll src = var->lv_psrc;
805 1.11.6.2 skrll dst = (struct sockaddr *)
806 1.11.6.2 skrll &(((struct if_laddrreq *)data)->addr);
807 1.11.6.2 skrll size = sizeof(((struct if_laddrreq *)data)->addr);
808 1.11.6.2 skrll if (src->sa_len > size) {
809 1.11.6.2 skrll l2tp_putref_variant(var, &psref);
810 1.11.6.2 skrll curlwp_bindx(bound);
811 1.11.6.2 skrll return EINVAL;
812 1.11.6.2 skrll }
813 1.11.6.2 skrll sockaddr_copy(dst, src->sa_len, src);
814 1.11.6.2 skrll
815 1.11.6.2 skrll /* copy dst */
816 1.11.6.2 skrll src = var->lv_pdst;
817 1.11.6.2 skrll dst = (struct sockaddr *)
818 1.11.6.2 skrll &(((struct if_laddrreq *)data)->dstaddr);
819 1.11.6.2 skrll size = sizeof(((struct if_laddrreq *)data)->dstaddr);
820 1.11.6.2 skrll if (src->sa_len > size) {
821 1.11.6.2 skrll l2tp_putref_variant(var, &psref);
822 1.11.6.2 skrll curlwp_bindx(bound);
823 1.11.6.2 skrll return EINVAL;
824 1.11.6.2 skrll }
825 1.11.6.2 skrll sockaddr_copy(dst, src->sa_len, src);
826 1.11.6.2 skrll l2tp_putref_variant(var, &psref);
827 1.11.6.2 skrll curlwp_bindx(bound);
828 1.11.6.2 skrll break;
829 1.11.6.2 skrll
830 1.11.6.2 skrll case SIOCSL2TPSESSION:
831 1.11.6.2 skrll if ((error = copyin(ifr->ifr_data, &l2tpr, sizeof(l2tpr))) != 0)
832 1.11.6.2 skrll break;
833 1.11.6.2 skrll
834 1.11.6.2 skrll /* session id must not zero */
835 1.11.6.2 skrll if (l2tpr.my_sess_id == 0 || l2tpr.peer_sess_id == 0)
836 1.11.6.2 skrll return EINVAL;
837 1.11.6.2 skrll
838 1.11.6.2 skrll bound = curlwp_bind();
839 1.11.6.2 skrll var_tmp = l2tp_lookup_session_ref(l2tpr.my_sess_id, &psref);
840 1.11.6.2 skrll if (var_tmp != NULL) {
841 1.11.6.2 skrll /* duplicate session id */
842 1.11.6.2 skrll log(LOG_WARNING, "%s: duplicate session id %" PRIu32 " of %s\n",
843 1.11.6.2 skrll sc->l2tp_ec.ec_if.if_xname, l2tpr.my_sess_id,
844 1.11.6.2 skrll var_tmp->lv_softc->l2tp_ec.ec_if.if_xname);
845 1.11.6.2 skrll psref_release(&psref, &var_tmp->lv_psref,
846 1.11.6.2 skrll lv_psref_class);
847 1.11.6.2 skrll curlwp_bindx(bound);
848 1.11.6.2 skrll return EINVAL;
849 1.11.6.2 skrll }
850 1.11.6.2 skrll curlwp_bindx(bound);
851 1.11.6.2 skrll
852 1.11.6.2 skrll error = l2tp_set_session(sc, l2tpr.my_sess_id, l2tpr.peer_sess_id);
853 1.11.6.2 skrll break;
854 1.11.6.2 skrll case SIOCDL2TPSESSION:
855 1.11.6.2 skrll l2tp_clear_session(sc);
856 1.11.6.2 skrll break;
857 1.11.6.2 skrll case SIOCSL2TPCOOKIE:
858 1.11.6.2 skrll if ((error = copyin(ifr->ifr_data, &l2tpr, sizeof(l2tpr))) != 0)
859 1.11.6.2 skrll break;
860 1.11.6.2 skrll
861 1.11.6.2 skrll error = l2tp_set_cookie(sc, l2tpr.my_cookie, l2tpr.my_cookie_len,
862 1.11.6.2 skrll l2tpr.peer_cookie, l2tpr.peer_cookie_len);
863 1.11.6.2 skrll break;
864 1.11.6.2 skrll case SIOCDL2TPCOOKIE:
865 1.11.6.2 skrll l2tp_clear_cookie(sc);
866 1.11.6.2 skrll break;
867 1.11.6.2 skrll case SIOCSL2TPSTATE:
868 1.11.6.2 skrll if ((error = copyin(ifr->ifr_data, &l2tpr, sizeof(l2tpr))) != 0)
869 1.11.6.2 skrll break;
870 1.11.6.2 skrll
871 1.11.6.2 skrll l2tp_set_state(sc, l2tpr.state);
872 1.11.6.2 skrll break;
873 1.11.6.2 skrll case SIOCGL2TP:
874 1.11.6.2 skrll /* get L2TPV3 session info */
875 1.11.6.2 skrll memset(&l2tpr, 0, sizeof(l2tpr));
876 1.11.6.2 skrll
877 1.11.6.2 skrll bound = curlwp_bind();
878 1.11.6.2 skrll var = l2tp_getref_variant(sc, &psref);
879 1.11.6.2 skrll if (var == NULL) {
880 1.11.6.2 skrll curlwp_bindx(bound);
881 1.11.6.2 skrll error = EADDRNOTAVAIL;
882 1.11.6.2 skrll goto bad;
883 1.11.6.2 skrll }
884 1.11.6.2 skrll
885 1.11.6.2 skrll l2tpr.state = var->lv_state;
886 1.11.6.2 skrll l2tpr.my_sess_id = var->lv_my_sess_id;
887 1.11.6.2 skrll l2tpr.peer_sess_id = var->lv_peer_sess_id;
888 1.11.6.2 skrll l2tpr.my_cookie = var->lv_my_cookie;
889 1.11.6.2 skrll l2tpr.my_cookie_len = var->lv_my_cookie_len;
890 1.11.6.2 skrll l2tpr.peer_cookie = var->lv_peer_cookie;
891 1.11.6.2 skrll l2tpr.peer_cookie_len = var->lv_peer_cookie_len;
892 1.11.6.2 skrll l2tp_putref_variant(var, &psref);
893 1.11.6.2 skrll curlwp_bindx(bound);
894 1.11.6.2 skrll
895 1.11.6.2 skrll error = copyout(&l2tpr, ifr->ifr_data, sizeof(l2tpr));
896 1.11.6.2 skrll break;
897 1.11.6.2 skrll
898 1.11.6.2 skrll default:
899 1.11.6.2 skrll error = ifioctl_common(ifp, cmd, data);
900 1.11.6.2 skrll break;
901 1.11.6.2 skrll }
902 1.11.6.2 skrll bad:
903 1.11.6.2 skrll return error;
904 1.11.6.2 skrll }
905 1.11.6.2 skrll
906 1.11.6.2 skrll static int
907 1.11.6.2 skrll l2tp_set_tunnel(struct ifnet *ifp, struct sockaddr *src, struct sockaddr *dst)
908 1.11.6.2 skrll {
909 1.11.6.2 skrll struct l2tp_softc *sc = container_of(ifp, struct l2tp_softc,
910 1.11.6.2 skrll l2tp_ec.ec_if);
911 1.11.6.2 skrll struct sockaddr *osrc, *odst;
912 1.11.6.2 skrll struct sockaddr *nsrc, *ndst;
913 1.11.6.2 skrll struct l2tp_variant *ovar, *nvar;
914 1.11.6.2 skrll int error;
915 1.11.6.2 skrll
916 1.11.6.2 skrll nsrc = sockaddr_dup(src, M_WAITOK);
917 1.11.6.2 skrll ndst = sockaddr_dup(dst, M_WAITOK);
918 1.11.6.2 skrll
919 1.11.6.2 skrll nvar = kmem_alloc(sizeof(*nvar), KM_SLEEP);
920 1.11.6.2 skrll
921 1.11.6.2 skrll error = encap_lock_enter();
922 1.11.6.2 skrll if (error)
923 1.11.6.2 skrll goto error;
924 1.11.6.2 skrll
925 1.11.6.2 skrll mutex_enter(&sc->l2tp_lock);
926 1.11.6.2 skrll
927 1.11.6.2 skrll ovar = sc->l2tp_var;
928 1.11.6.2 skrll osrc = ovar->lv_psrc;
929 1.11.6.2 skrll odst = ovar->lv_pdst;
930 1.11.6.2 skrll *nvar = *ovar;
931 1.11.6.2 skrll psref_target_init(&nvar->lv_psref, lv_psref_class);
932 1.11.6.2 skrll nvar->lv_psrc = nsrc;
933 1.11.6.2 skrll nvar->lv_pdst = ndst;
934 1.11.6.2 skrll error = l2tp_encap_attach(nvar);
935 1.11.6.2 skrll if (error) {
936 1.11.6.2 skrll mutex_exit(&sc->l2tp_lock);
937 1.11.6.2 skrll encap_lock_exit();
938 1.11.6.2 skrll goto error;
939 1.11.6.2 skrll }
940 1.11.6.2 skrll membar_producer();
941 1.11.6.2 skrll l2tp_variant_update(sc, nvar);
942 1.11.6.2 skrll
943 1.11.6.2 skrll mutex_exit(&sc->l2tp_lock);
944 1.11.6.2 skrll
945 1.11.6.2 skrll (void)l2tp_encap_detach(ovar);
946 1.11.6.2 skrll encap_lock_exit();
947 1.11.6.2 skrll
948 1.11.6.2 skrll if (osrc)
949 1.11.6.2 skrll sockaddr_free(osrc);
950 1.11.6.2 skrll if (odst)
951 1.11.6.2 skrll sockaddr_free(odst);
952 1.11.6.2 skrll kmem_free(ovar, sizeof(*ovar));
953 1.11.6.2 skrll
954 1.11.6.2 skrll return 0;
955 1.11.6.2 skrll
956 1.11.6.2 skrll error:
957 1.11.6.2 skrll sockaddr_free(nsrc);
958 1.11.6.2 skrll sockaddr_free(ndst);
959 1.11.6.2 skrll kmem_free(nvar, sizeof(*nvar));
960 1.11.6.2 skrll
961 1.11.6.2 skrll return error;
962 1.11.6.2 skrll }
963 1.11.6.2 skrll
964 1.11.6.2 skrll static void
965 1.11.6.2 skrll l2tp_delete_tunnel(struct ifnet *ifp)
966 1.11.6.2 skrll {
967 1.11.6.2 skrll struct l2tp_softc *sc = container_of(ifp, struct l2tp_softc,
968 1.11.6.2 skrll l2tp_ec.ec_if);
969 1.11.6.2 skrll struct sockaddr *osrc, *odst;
970 1.11.6.2 skrll struct l2tp_variant *ovar, *nvar;
971 1.11.6.2 skrll int error;
972 1.11.6.2 skrll
973 1.11.6.2 skrll nvar = kmem_alloc(sizeof(*nvar), KM_SLEEP);
974 1.11.6.2 skrll
975 1.11.6.2 skrll error = encap_lock_enter();
976 1.11.6.2 skrll if (error) {
977 1.11.6.2 skrll kmem_free(nvar, sizeof(*nvar));
978 1.11.6.2 skrll return;
979 1.11.6.2 skrll }
980 1.11.6.2 skrll mutex_enter(&sc->l2tp_lock);
981 1.11.6.2 skrll
982 1.11.6.2 skrll ovar = sc->l2tp_var;
983 1.11.6.2 skrll osrc = ovar->lv_psrc;
984 1.11.6.2 skrll odst = ovar->lv_pdst;
985 1.11.6.2 skrll *nvar = *ovar;
986 1.11.6.2 skrll psref_target_init(&nvar->lv_psref, lv_psref_class);
987 1.11.6.2 skrll nvar->lv_psrc = NULL;
988 1.11.6.2 skrll nvar->lv_pdst = NULL;
989 1.11.6.2 skrll membar_producer();
990 1.11.6.2 skrll l2tp_variant_update(sc, nvar);
991 1.11.6.2 skrll
992 1.11.6.2 skrll mutex_exit(&sc->l2tp_lock);
993 1.11.6.2 skrll
994 1.11.6.2 skrll (void)l2tp_encap_detach(ovar);
995 1.11.6.2 skrll encap_lock_exit();
996 1.11.6.2 skrll
997 1.11.6.2 skrll if (osrc)
998 1.11.6.2 skrll sockaddr_free(osrc);
999 1.11.6.2 skrll if (odst)
1000 1.11.6.2 skrll sockaddr_free(odst);
1001 1.11.6.2 skrll kmem_free(ovar, sizeof(*ovar));
1002 1.11.6.2 skrll }
1003 1.11.6.2 skrll
1004 1.11.6.2 skrll static int
1005 1.11.6.2 skrll id_hash_func(uint32_t id, u_long mask)
1006 1.11.6.2 skrll {
1007 1.11.6.2 skrll uint32_t hash;
1008 1.11.6.2 skrll
1009 1.11.6.2 skrll hash = (id >> 16) ^ id;
1010 1.11.6.2 skrll hash = (hash >> 4) ^ hash;
1011 1.11.6.2 skrll
1012 1.11.6.2 skrll return hash & mask;
1013 1.11.6.2 skrll }
1014 1.11.6.2 skrll
1015 1.11.6.2 skrll static void
1016 1.11.6.2 skrll l2tp_hash_init(void)
1017 1.11.6.2 skrll {
1018 1.11.6.2 skrll
1019 1.11.6.2 skrll l2tp_hash.lists = hashinit(L2TP_ID_HASH_SIZE, HASH_PSLIST, true,
1020 1.11.6.2 skrll &l2tp_hash.mask);
1021 1.11.6.2 skrll }
1022 1.11.6.2 skrll
1023 1.11.6.2 skrll static int
1024 1.11.6.2 skrll l2tp_hash_fini(void)
1025 1.11.6.2 skrll {
1026 1.11.6.2 skrll int i;
1027 1.11.6.2 skrll
1028 1.11.6.2 skrll mutex_enter(&l2tp_hash.lock);
1029 1.11.6.2 skrll
1030 1.11.6.2 skrll for (i = 0; i < l2tp_hash.mask + 1; i++) {
1031 1.11.6.2 skrll if (PSLIST_WRITER_FIRST(&l2tp_hash.lists[i], struct l2tp_softc,
1032 1.11.6.2 skrll l2tp_hash) != NULL) {
1033 1.11.6.2 skrll mutex_exit(&l2tp_hash.lock);
1034 1.11.6.2 skrll return EBUSY;
1035 1.11.6.2 skrll }
1036 1.11.6.2 skrll }
1037 1.11.6.2 skrll for (i = 0; i < l2tp_hash.mask + 1; i++)
1038 1.11.6.2 skrll PSLIST_DESTROY(&l2tp_hash.lists[i]);
1039 1.11.6.2 skrll
1040 1.11.6.2 skrll mutex_exit(&l2tp_hash.lock);
1041 1.11.6.2 skrll
1042 1.11.6.2 skrll hashdone(l2tp_hash.lists, HASH_PSLIST, l2tp_hash.mask);
1043 1.11.6.2 skrll
1044 1.11.6.2 skrll return 0;
1045 1.11.6.2 skrll }
1046 1.11.6.2 skrll
1047 1.11.6.2 skrll static int
1048 1.11.6.2 skrll l2tp_set_session(struct l2tp_softc *sc, uint32_t my_sess_id,
1049 1.11.6.2 skrll uint32_t peer_sess_id)
1050 1.11.6.2 skrll {
1051 1.11.6.2 skrll uint32_t idx;
1052 1.11.6.2 skrll struct l2tp_variant *nvar;
1053 1.11.6.2 skrll struct l2tp_variant *ovar;
1054 1.11.6.2 skrll struct ifnet *ifp = &sc->l2tp_ec.ec_if;
1055 1.11.6.2 skrll
1056 1.11.6.2 skrll nvar = kmem_alloc(sizeof(*nvar), KM_SLEEP);
1057 1.11.6.2 skrll
1058 1.11.6.2 skrll mutex_enter(&sc->l2tp_lock);
1059 1.11.6.2 skrll ovar = sc->l2tp_var;
1060 1.11.6.2 skrll *nvar = *ovar;
1061 1.11.6.2 skrll psref_target_init(&nvar->lv_psref, lv_psref_class);
1062 1.11.6.2 skrll nvar->lv_my_sess_id = my_sess_id;
1063 1.11.6.2 skrll nvar->lv_peer_sess_id = peer_sess_id;
1064 1.11.6.2 skrll membar_producer();
1065 1.11.6.2 skrll
1066 1.11.6.2 skrll mutex_enter(&l2tp_hash.lock);
1067 1.11.6.2 skrll if (ovar->lv_my_sess_id > 0 && ovar->lv_peer_sess_id > 0) {
1068 1.11.6.2 skrll PSLIST_WRITER_REMOVE(sc, l2tp_hash);
1069 1.11.6.2 skrll pserialize_perform(l2tp_psz);
1070 1.11.6.2 skrll }
1071 1.11.6.2 skrll mutex_exit(&l2tp_hash.lock);
1072 1.11.6.2 skrll
1073 1.11.6.2 skrll l2tp_variant_update(sc, nvar);
1074 1.11.6.2 skrll mutex_exit(&sc->l2tp_lock);
1075 1.11.6.2 skrll
1076 1.11.6.2 skrll idx = id_hash_func(nvar->lv_my_sess_id, l2tp_hash.mask);
1077 1.11.6.2 skrll if ((ifp->if_flags & IFF_DEBUG) != 0)
1078 1.11.6.2 skrll log(LOG_DEBUG, "%s: add hash entry: sess_id=%" PRIu32 ", idx=%" PRIu32 "\n",
1079 1.11.6.2 skrll sc->l2tp_ec.ec_if.if_xname, nvar->lv_my_sess_id, idx);
1080 1.11.6.2 skrll
1081 1.11.6.2 skrll mutex_enter(&l2tp_hash.lock);
1082 1.11.6.2 skrll PSLIST_WRITER_INSERT_HEAD(&l2tp_hash.lists[idx], sc, l2tp_hash);
1083 1.11.6.2 skrll mutex_exit(&l2tp_hash.lock);
1084 1.11.6.2 skrll
1085 1.11.6.2 skrll kmem_free(ovar, sizeof(*ovar));
1086 1.11.6.2 skrll return 0;
1087 1.11.6.2 skrll }
1088 1.11.6.2 skrll
1089 1.11.6.2 skrll static int
1090 1.11.6.2 skrll l2tp_clear_session(struct l2tp_softc *sc)
1091 1.11.6.2 skrll {
1092 1.11.6.2 skrll struct l2tp_variant *nvar;
1093 1.11.6.2 skrll struct l2tp_variant *ovar;
1094 1.11.6.2 skrll
1095 1.11.6.2 skrll nvar = kmem_alloc(sizeof(*nvar), KM_SLEEP);
1096 1.11.6.2 skrll
1097 1.11.6.2 skrll mutex_enter(&sc->l2tp_lock);
1098 1.11.6.2 skrll ovar = sc->l2tp_var;
1099 1.11.6.2 skrll *nvar = *ovar;
1100 1.11.6.2 skrll psref_target_init(&nvar->lv_psref, lv_psref_class);
1101 1.11.6.2 skrll nvar->lv_my_sess_id = 0;
1102 1.11.6.2 skrll nvar->lv_peer_sess_id = 0;
1103 1.11.6.2 skrll membar_producer();
1104 1.11.6.2 skrll
1105 1.11.6.2 skrll mutex_enter(&l2tp_hash.lock);
1106 1.11.6.2 skrll if (ovar->lv_my_sess_id > 0 && ovar->lv_peer_sess_id > 0) {
1107 1.11.6.2 skrll PSLIST_WRITER_REMOVE(sc, l2tp_hash);
1108 1.11.6.2 skrll pserialize_perform(l2tp_psz);
1109 1.11.6.2 skrll }
1110 1.11.6.2 skrll mutex_exit(&l2tp_hash.lock);
1111 1.11.6.2 skrll
1112 1.11.6.2 skrll l2tp_variant_update(sc, nvar);
1113 1.11.6.2 skrll mutex_exit(&sc->l2tp_lock);
1114 1.11.6.2 skrll kmem_free(ovar, sizeof(*ovar));
1115 1.11.6.2 skrll return 0;
1116 1.11.6.2 skrll }
1117 1.11.6.2 skrll
1118 1.11.6.2 skrll struct l2tp_variant *
1119 1.11.6.2 skrll l2tp_lookup_session_ref(uint32_t id, struct psref *psref)
1120 1.11.6.2 skrll {
1121 1.11.6.2 skrll int idx;
1122 1.11.6.2 skrll int s;
1123 1.11.6.2 skrll struct l2tp_softc *sc;
1124 1.11.6.2 skrll
1125 1.11.6.2 skrll idx = id_hash_func(id, l2tp_hash.mask);
1126 1.11.6.2 skrll
1127 1.11.6.2 skrll s = pserialize_read_enter();
1128 1.11.6.2 skrll PSLIST_READER_FOREACH(sc, &l2tp_hash.lists[idx], struct l2tp_softc,
1129 1.11.6.2 skrll l2tp_hash) {
1130 1.11.6.2 skrll struct l2tp_variant *var = sc->l2tp_var;
1131 1.11.6.2 skrll if (var == NULL)
1132 1.11.6.2 skrll continue;
1133 1.11.6.2 skrll if (var->lv_my_sess_id != id)
1134 1.11.6.2 skrll continue;
1135 1.11.6.2 skrll psref_acquire(psref, &var->lv_psref, lv_psref_class);
1136 1.11.6.2 skrll pserialize_read_exit(s);
1137 1.11.6.2 skrll return var;
1138 1.11.6.2 skrll }
1139 1.11.6.2 skrll pserialize_read_exit(s);
1140 1.11.6.2 skrll return NULL;
1141 1.11.6.2 skrll }
1142 1.11.6.2 skrll
1143 1.11.6.2 skrll /*
1144 1.11.6.2 skrll * l2tp_variant update API.
1145 1.11.6.2 skrll *
1146 1.11.6.2 skrll * Assumption:
1147 1.11.6.2 skrll * reader side dereferences sc->l2tp_var in reader critical section only,
1148 1.11.6.2 skrll * that is, all of reader sides do not reader the sc->l2tp_var after
1149 1.11.6.2 skrll * pserialize_perform().
1150 1.11.6.2 skrll */
1151 1.11.6.2 skrll static void
1152 1.11.6.2 skrll l2tp_variant_update(struct l2tp_softc *sc, struct l2tp_variant *nvar)
1153 1.11.6.2 skrll {
1154 1.11.6.2 skrll struct ifnet *ifp = &sc->l2tp_ec.ec_if;
1155 1.11.6.2 skrll struct l2tp_variant *ovar = sc->l2tp_var;
1156 1.11.6.2 skrll
1157 1.11.6.2 skrll KASSERT(mutex_owned(&sc->l2tp_lock));
1158 1.11.6.2 skrll
1159 1.11.6.2 skrll sc->l2tp_var = nvar;
1160 1.11.6.2 skrll pserialize_perform(l2tp_psz);
1161 1.11.6.2 skrll psref_target_destroy(&ovar->lv_psref, lv_psref_class);
1162 1.11.6.2 skrll
1163 1.11.6.2 skrll /*
1164 1.11.6.2 skrll * In the manual of atomic_swap_ptr(3), there is no mention if 2nd
1165 1.11.6.2 skrll * argument is rewrite or not. So, use sc->l2tp_var instead of nvar.
1166 1.11.6.2 skrll */
1167 1.11.6.2 skrll if (sc->l2tp_var != NULL) {
1168 1.11.6.2 skrll if (sc->l2tp_var->lv_psrc != NULL
1169 1.11.6.2 skrll && sc->l2tp_var->lv_pdst != NULL)
1170 1.11.6.2 skrll ifp->if_flags |= IFF_RUNNING;
1171 1.11.6.2 skrll else
1172 1.11.6.2 skrll ifp->if_flags &= ~IFF_RUNNING;
1173 1.11.6.2 skrll }
1174 1.11.6.2 skrll }
1175 1.11.6.2 skrll
1176 1.11.6.2 skrll static int
1177 1.11.6.2 skrll l2tp_set_cookie(struct l2tp_softc *sc, uint64_t my_cookie, u_int my_cookie_len,
1178 1.11.6.2 skrll uint64_t peer_cookie, u_int peer_cookie_len)
1179 1.11.6.2 skrll {
1180 1.11.6.2 skrll struct l2tp_variant *nvar;
1181 1.11.6.2 skrll
1182 1.11.6.2 skrll if (my_cookie == 0 || peer_cookie == 0)
1183 1.11.6.2 skrll return EINVAL;
1184 1.11.6.2 skrll
1185 1.11.6.2 skrll if (my_cookie_len != 4 && my_cookie_len != 8
1186 1.11.6.2 skrll && peer_cookie_len != 4 && peer_cookie_len != 8)
1187 1.11.6.2 skrll return EINVAL;
1188 1.11.6.2 skrll
1189 1.11.6.2 skrll nvar = kmem_alloc(sizeof(*nvar), KM_SLEEP);
1190 1.11.6.2 skrll
1191 1.11.6.2 skrll mutex_enter(&sc->l2tp_lock);
1192 1.11.6.2 skrll
1193 1.11.6.2 skrll *nvar = *sc->l2tp_var;
1194 1.11.6.2 skrll psref_target_init(&nvar->lv_psref, lv_psref_class);
1195 1.11.6.2 skrll nvar->lv_my_cookie = my_cookie;
1196 1.11.6.2 skrll nvar->lv_my_cookie_len = my_cookie_len;
1197 1.11.6.2 skrll nvar->lv_peer_cookie = peer_cookie;
1198 1.11.6.2 skrll nvar->lv_peer_cookie_len = peer_cookie_len;
1199 1.11.6.2 skrll nvar->lv_use_cookie = L2TP_COOKIE_ON;
1200 1.11.6.2 skrll membar_producer();
1201 1.11.6.2 skrll l2tp_variant_update(sc, nvar);
1202 1.11.6.2 skrll
1203 1.11.6.2 skrll mutex_exit(&sc->l2tp_lock);
1204 1.11.6.2 skrll
1205 1.11.6.2 skrll struct ifnet *ifp = &sc->l2tp_ec.ec_if;
1206 1.11.6.2 skrll if ((ifp->if_flags & IFF_DEBUG) != 0) {
1207 1.11.6.2 skrll log(LOG_DEBUG,
1208 1.11.6.2 skrll "%s: set cookie: "
1209 1.11.6.2 skrll "local cookie_len=%u local cookie=%" PRIu64 ", "
1210 1.11.6.2 skrll "remote cookie_len=%u remote cookie=%" PRIu64 "\n",
1211 1.11.6.2 skrll ifp->if_xname, my_cookie_len, my_cookie,
1212 1.11.6.2 skrll peer_cookie_len, peer_cookie);
1213 1.11.6.2 skrll }
1214 1.11.6.2 skrll
1215 1.11.6.2 skrll return 0;
1216 1.11.6.2 skrll }
1217 1.11.6.2 skrll
1218 1.11.6.2 skrll static void
1219 1.11.6.2 skrll l2tp_clear_cookie(struct l2tp_softc *sc)
1220 1.11.6.2 skrll {
1221 1.11.6.2 skrll struct l2tp_variant *nvar;
1222 1.11.6.2 skrll
1223 1.11.6.2 skrll nvar = kmem_alloc(sizeof(*nvar), KM_SLEEP);
1224 1.11.6.2 skrll
1225 1.11.6.2 skrll mutex_enter(&sc->l2tp_lock);
1226 1.11.6.2 skrll
1227 1.11.6.2 skrll *nvar = *sc->l2tp_var;
1228 1.11.6.2 skrll psref_target_init(&nvar->lv_psref, lv_psref_class);
1229 1.11.6.2 skrll nvar->lv_my_cookie = 0;
1230 1.11.6.2 skrll nvar->lv_my_cookie_len = 0;
1231 1.11.6.2 skrll nvar->lv_peer_cookie = 0;
1232 1.11.6.2 skrll nvar->lv_peer_cookie_len = 0;
1233 1.11.6.2 skrll nvar->lv_use_cookie = L2TP_COOKIE_OFF;
1234 1.11.6.2 skrll membar_producer();
1235 1.11.6.2 skrll l2tp_variant_update(sc, nvar);
1236 1.11.6.2 skrll
1237 1.11.6.2 skrll mutex_exit(&sc->l2tp_lock);
1238 1.11.6.2 skrll }
1239 1.11.6.2 skrll
1240 1.11.6.2 skrll static void
1241 1.11.6.2 skrll l2tp_set_state(struct l2tp_softc *sc, int state)
1242 1.11.6.2 skrll {
1243 1.11.6.2 skrll struct ifnet *ifp = &sc->l2tp_ec.ec_if;
1244 1.11.6.2 skrll struct l2tp_variant *nvar;
1245 1.11.6.2 skrll
1246 1.11.6.2 skrll nvar = kmem_alloc(sizeof(*nvar), KM_SLEEP);
1247 1.11.6.2 skrll
1248 1.11.6.2 skrll mutex_enter(&sc->l2tp_lock);
1249 1.11.6.2 skrll
1250 1.11.6.2 skrll *nvar = *sc->l2tp_var;
1251 1.11.6.2 skrll psref_target_init(&nvar->lv_psref, lv_psref_class);
1252 1.11.6.2 skrll nvar->lv_state = state;
1253 1.11.6.2 skrll membar_producer();
1254 1.11.6.2 skrll l2tp_variant_update(sc, nvar);
1255 1.11.6.2 skrll
1256 1.11.6.2 skrll if (nvar->lv_state == L2TP_STATE_UP) {
1257 1.11.6.2 skrll ifp->if_link_state = LINK_STATE_UP;
1258 1.11.6.2 skrll } else {
1259 1.11.6.2 skrll ifp->if_link_state = LINK_STATE_DOWN;
1260 1.11.6.2 skrll }
1261 1.11.6.2 skrll
1262 1.11.6.2 skrll mutex_exit(&sc->l2tp_lock);
1263 1.11.6.2 skrll
1264 1.11.6.2 skrll #ifdef NOTYET
1265 1.11.6.2 skrll vlan_linkstate_notify(ifp, ifp->if_link_state);
1266 1.11.6.2 skrll #endif
1267 1.11.6.2 skrll }
1268 1.11.6.2 skrll
1269 1.11.6.2 skrll static int
1270 1.11.6.2 skrll l2tp_encap_attach(struct l2tp_variant *var)
1271 1.11.6.2 skrll {
1272 1.11.6.2 skrll int error;
1273 1.11.6.2 skrll
1274 1.11.6.2 skrll if (var == NULL || var->lv_psrc == NULL)
1275 1.11.6.2 skrll return EINVAL;
1276 1.11.6.2 skrll
1277 1.11.6.2 skrll switch (var->lv_psrc->sa_family) {
1278 1.11.6.2 skrll #ifdef INET
1279 1.11.6.2 skrll case AF_INET:
1280 1.11.6.2 skrll error = in_l2tp_attach(var);
1281 1.11.6.2 skrll break;
1282 1.11.6.2 skrll #endif
1283 1.11.6.2 skrll #ifdef INET6
1284 1.11.6.2 skrll case AF_INET6:
1285 1.11.6.2 skrll error = in6_l2tp_attach(var);
1286 1.11.6.2 skrll break;
1287 1.11.6.2 skrll #endif
1288 1.11.6.2 skrll default:
1289 1.11.6.2 skrll error = EINVAL;
1290 1.11.6.2 skrll break;
1291 1.11.6.2 skrll }
1292 1.11.6.2 skrll
1293 1.11.6.2 skrll return error;
1294 1.11.6.2 skrll }
1295 1.11.6.2 skrll
1296 1.11.6.2 skrll static int
1297 1.11.6.2 skrll l2tp_encap_detach(struct l2tp_variant *var)
1298 1.11.6.2 skrll {
1299 1.11.6.2 skrll int error;
1300 1.11.6.2 skrll
1301 1.11.6.2 skrll if (var == NULL || var->lv_psrc == NULL)
1302 1.11.6.2 skrll return EINVAL;
1303 1.11.6.2 skrll
1304 1.11.6.2 skrll switch (var->lv_psrc->sa_family) {
1305 1.11.6.2 skrll #ifdef INET
1306 1.11.6.2 skrll case AF_INET:
1307 1.11.6.2 skrll error = in_l2tp_detach(var);
1308 1.11.6.2 skrll break;
1309 1.11.6.2 skrll #endif
1310 1.11.6.2 skrll #ifdef INET6
1311 1.11.6.2 skrll case AF_INET6:
1312 1.11.6.2 skrll error = in6_l2tp_detach(var);
1313 1.11.6.2 skrll break;
1314 1.11.6.2 skrll #endif
1315 1.11.6.2 skrll default:
1316 1.11.6.2 skrll error = EINVAL;
1317 1.11.6.2 skrll break;
1318 1.11.6.2 skrll }
1319 1.11.6.2 skrll
1320 1.11.6.2 skrll return error;
1321 1.11.6.2 skrll }
1322 1.11.6.2 skrll
1323 1.11.6.2 skrll /*
1324 1.11.6.2 skrll * TODO:
1325 1.11.6.2 skrll * unify with gif_check_nesting().
1326 1.11.6.2 skrll */
1327 1.11.6.2 skrll int
1328 1.11.6.2 skrll l2tp_check_nesting(struct ifnet *ifp, struct mbuf *m)
1329 1.11.6.2 skrll {
1330 1.11.6.2 skrll struct m_tag *mtag;
1331 1.11.6.2 skrll int *count;
1332 1.11.6.2 skrll
1333 1.11.6.2 skrll mtag = m_tag_find(m, PACKET_TAG_TUNNEL_INFO, NULL);
1334 1.11.6.2 skrll if (mtag != NULL) {
1335 1.11.6.2 skrll count = (int *)(mtag + 1);
1336 1.11.6.2 skrll if (++(*count) > max_l2tp_nesting) {
1337 1.11.6.2 skrll log(LOG_NOTICE,
1338 1.11.6.2 skrll "%s: recursively called too many times(%d)\n",
1339 1.11.6.2 skrll if_name(ifp),
1340 1.11.6.2 skrll *count);
1341 1.11.6.2 skrll return EIO;
1342 1.11.6.2 skrll }
1343 1.11.6.2 skrll } else {
1344 1.11.6.2 skrll mtag = m_tag_get(PACKET_TAG_TUNNEL_INFO, sizeof(*count),
1345 1.11.6.2 skrll M_NOWAIT);
1346 1.11.6.2 skrll if (mtag != NULL) {
1347 1.11.6.2 skrll m_tag_prepend(m, mtag);
1348 1.11.6.2 skrll count = (int *)(mtag + 1);
1349 1.11.6.2 skrll *count = 0;
1350 1.11.6.2 skrll }
1351 1.11.6.2 skrll #ifdef L2TP_DEBUG
1352 1.11.6.2 skrll else {
1353 1.11.6.2 skrll log(LOG_DEBUG,
1354 1.11.6.2 skrll "%s: m_tag_get() failed, recursion calls are not prevented.\n",
1355 1.11.6.2 skrll if_name(ifp));
1356 1.11.6.2 skrll }
1357 1.11.6.2 skrll #endif
1358 1.11.6.2 skrll }
1359 1.11.6.2 skrll
1360 1.11.6.2 skrll return 0;
1361 1.11.6.2 skrll }
1362 1.11.6.2 skrll
1363 1.11.6.2 skrll /*
1364 1.11.6.2 skrll * Module infrastructure
1365 1.11.6.2 skrll */
1366 1.11.6.2 skrll #include "if_module.h"
1367 1.11.6.2 skrll
1368 1.11.6.2 skrll IF_MODULE(MODULE_CLASS_DRIVER, l2tp, "")
1369 1.11.6.2 skrll
1370 1.11.6.2 skrll
1371 1.11.6.2 skrll /* TODO: IP_TCPMSS support */
1372 1.11.6.2 skrll #ifdef IP_TCPMSS
1373 1.11.6.2 skrll static int l2tp_need_tcpmss_clamp(struct ifnet *);
1374 1.11.6.2 skrll #ifdef INET
1375 1.11.6.2 skrll static struct mbuf *l2tp_tcpmss4_clamp(struct ifnet *, struct mbuf *);
1376 1.11.6.2 skrll #endif
1377 1.11.6.2 skrll #ifdef INET6
1378 1.11.6.2 skrll static struct mbuf *l2tp_tcpmss6_clamp(struct ifnet *, struct mbuf *);
1379 1.11.6.2 skrll #endif
1380 1.11.6.2 skrll
1381 1.11.6.2 skrll struct mbuf *
1382 1.11.6.2 skrll l2tp_tcpmss_clamp(struct ifnet *ifp, struct mbuf *m)
1383 1.11.6.2 skrll {
1384 1.11.6.2 skrll
1385 1.11.6.2 skrll if (l2tp_need_tcpmss_clamp(ifp)) {
1386 1.11.6.2 skrll struct ether_header *eh;
1387 1.11.6.2 skrll struct ether_vlan_header evh;
1388 1.11.6.2 skrll
1389 1.11.6.2 skrll /* save ether header */
1390 1.11.6.2 skrll m_copydata(m, 0, sizeof(evh), (void *)&evh);
1391 1.11.6.2 skrll eh = (struct ether_header *)&evh;
1392 1.11.6.2 skrll
1393 1.11.6.2 skrll switch (ntohs(eh->ether_type)) {
1394 1.11.6.2 skrll case ETHERTYPE_VLAN: /* Ether + VLAN */
1395 1.11.6.2 skrll if (m->m_pkthdr.len <= sizeof(struct ether_vlan_header))
1396 1.11.6.2 skrll break;
1397 1.11.6.2 skrll m_adj(m, sizeof(struct ether_vlan_header));
1398 1.11.6.2 skrll switch (ntohs(evh.evl_proto)) {
1399 1.11.6.2 skrll #ifdef INET
1400 1.11.6.2 skrll case ETHERTYPE_IP: /* Ether + VLAN + IPv4 */
1401 1.11.6.2 skrll m = l2tp_tcpmss4_clamp(ifp, m);
1402 1.11.6.2 skrll if (m == NULL)
1403 1.11.6.2 skrll return NULL;
1404 1.11.6.2 skrll break;
1405 1.11.6.2 skrll #endif /* INET */
1406 1.11.6.2 skrll #ifdef INET6
1407 1.11.6.2 skrll case ETHERTYPE_IPV6: /* Ether + VLAN + IPv6 */
1408 1.11.6.2 skrll m = l2tp_tcpmss6_clamp(ifp, m);
1409 1.11.6.2 skrll if (m == NULL)
1410 1.11.6.2 skrll return NULL;
1411 1.11.6.2 skrll break;
1412 1.11.6.2 skrll #endif /* INET6 */
1413 1.11.6.2 skrll default:
1414 1.11.6.2 skrll break;
1415 1.11.6.2 skrll }
1416 1.11.6.2 skrll /* restore ether header */
1417 1.11.6.2 skrll M_PREPEND(m, sizeof(struct ether_vlan_header),
1418 1.11.6.2 skrll M_DONTWAIT);
1419 1.11.6.2 skrll if (m == NULL)
1420 1.11.6.2 skrll return NULL;
1421 1.11.6.2 skrll *mtod(m, struct ether_vlan_header *) = evh;
1422 1.11.6.2 skrll break;
1423 1.11.6.2 skrll #ifdef INET
1424 1.11.6.2 skrll case ETHERTYPE_IP: /* Ether + IPv4 */
1425 1.11.6.2 skrll if (m->m_pkthdr.len <= sizeof(struct ether_header))
1426 1.11.6.2 skrll break;
1427 1.11.6.2 skrll m_adj(m, sizeof(struct ether_header));
1428 1.11.6.2 skrll m = l2tp_tcpmss4_clamp(ifp, m);
1429 1.11.6.2 skrll if (m == NULL)
1430 1.11.6.2 skrll return NULL;
1431 1.11.6.2 skrll /* restore ether header */
1432 1.11.6.2 skrll M_PREPEND(m, sizeof(struct ether_header), M_DONTWAIT);
1433 1.11.6.2 skrll if (m == NULL)
1434 1.11.6.2 skrll return NULL;
1435 1.11.6.2 skrll *mtod(m, struct ether_header *) = *eh;
1436 1.11.6.2 skrll break;
1437 1.11.6.2 skrll #endif /* INET */
1438 1.11.6.2 skrll #ifdef INET6
1439 1.11.6.2 skrll case ETHERTYPE_IPV6: /* Ether + IPv6 */
1440 1.11.6.2 skrll if (m->m_pkthdr.len <= sizeof(struct ether_header))
1441 1.11.6.2 skrll break;
1442 1.11.6.2 skrll m_adj(m, sizeof(struct ether_header));
1443 1.11.6.2 skrll m = l2tp_tcpmss6_clamp(ifp, m);
1444 1.11.6.2 skrll if (m == NULL)
1445 1.11.6.2 skrll return NULL;
1446 1.11.6.2 skrll /* restore ether header */
1447 1.11.6.2 skrll M_PREPEND(m, sizeof(struct ether_header), M_DONTWAIT);
1448 1.11.6.2 skrll if (m == NULL)
1449 1.11.6.2 skrll return NULL;
1450 1.11.6.2 skrll *mtod(m, struct ether_header *) = *eh;
1451 1.11.6.2 skrll break;
1452 1.11.6.2 skrll #endif /* INET6 */
1453 1.11.6.2 skrll default:
1454 1.11.6.2 skrll break;
1455 1.11.6.2 skrll }
1456 1.11.6.2 skrll }
1457 1.11.6.2 skrll
1458 1.11.6.2 skrll return m;
1459 1.11.6.2 skrll }
1460 1.11.6.2 skrll
1461 1.11.6.2 skrll static int
1462 1.11.6.2 skrll l2tp_need_tcpmss_clamp(struct ifnet *ifp)
1463 1.11.6.2 skrll {
1464 1.11.6.2 skrll int ret = 0;
1465 1.11.6.2 skrll
1466 1.11.6.2 skrll #ifdef INET
1467 1.11.6.2 skrll if (ifp->if_tcpmss != 0)
1468 1.11.6.2 skrll ret = 1;
1469 1.11.6.2 skrll #endif /* INET */
1470 1.11.6.2 skrll
1471 1.11.6.2 skrll #ifdef INET6
1472 1.11.6.2 skrll if (ifp->if_tcpmss6 != 0)
1473 1.11.6.2 skrll ret = 1;
1474 1.11.6.2 skrll #endif /* INET6 */
1475 1.11.6.2 skrll
1476 1.11.6.2 skrll return ret;
1477 1.11.6.2 skrll }
1478 1.11.6.2 skrll
1479 1.11.6.2 skrll #ifdef INET
1480 1.11.6.2 skrll static struct mbuf *
1481 1.11.6.2 skrll l2tp_tcpmss4_clamp(struct ifnet *ifp, struct mbuf *m)
1482 1.11.6.2 skrll {
1483 1.11.6.2 skrll
1484 1.11.6.2 skrll if (ifp->if_tcpmss != 0) {
1485 1.11.6.2 skrll return ip_tcpmss(m, (ifp->if_tcpmss < 0) ?
1486 1.11.6.2 skrll ifp->if_mtu - IP_TCPMSS_EXTLEN :
1487 1.11.6.2 skrll ifp->if_tcpmss);
1488 1.11.6.2 skrll }
1489 1.11.6.2 skrll return m;
1490 1.11.6.2 skrll }
1491 1.11.6.2 skrll #endif /* INET */
1492 1.11.6.2 skrll
1493 1.11.6.2 skrll #ifdef INET6
1494 1.11.6.2 skrll static struct mbuf *
1495 1.11.6.2 skrll l2tp_tcpmss6_clamp(struct ifnet *ifp, struct mbuf *m)
1496 1.11.6.2 skrll {
1497 1.11.6.2 skrll int ip6hdrlen;
1498 1.11.6.2 skrll
1499 1.11.6.2 skrll if (ifp->if_tcpmss6 != 0 &&
1500 1.11.6.2 skrll ip6_tcpmss_applicable(m, &ip6hdrlen)) {
1501 1.11.6.2 skrll return ip6_tcpmss(m, ip6hdrlen,
1502 1.11.6.2 skrll (ifp->if_tcpmss6 < 0) ?
1503 1.11.6.2 skrll ifp->if_mtu - IP6_TCPMSS_EXTLEN :
1504 1.11.6.2 skrll ifp->if_tcpmss6);
1505 1.11.6.2 skrll }
1506 1.11.6.2 skrll return m;
1507 1.11.6.2 skrll }
1508 1.11.6.2 skrll #endif /* INET6 */
1509 1.11.6.2 skrll
1510 1.11.6.2 skrll #endif /* IP_TCPMSS */
1511