in_gif.c revision 1.85 1 1.85 ozaki /* $NetBSD: in_gif.c,v 1.85 2016/12/12 03:55:57 ozaki-r Exp $ */
2 1.22 itojun /* $KAME: in_gif.c,v 1.66 2001/07/29 04:46:09 itojun Exp $ */
3 1.3 thorpej
4 1.2 itojun /*
5 1.2 itojun * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
6 1.2 itojun * All rights reserved.
7 1.12 itojun *
8 1.2 itojun * Redistribution and use in source and binary forms, with or without
9 1.2 itojun * modification, are permitted provided that the following conditions
10 1.2 itojun * are met:
11 1.2 itojun * 1. Redistributions of source code must retain the above copyright
12 1.2 itojun * notice, this list of conditions and the following disclaimer.
13 1.2 itojun * 2. Redistributions in binary form must reproduce the above copyright
14 1.2 itojun * notice, this list of conditions and the following disclaimer in the
15 1.2 itojun * documentation and/or other materials provided with the distribution.
16 1.2 itojun * 3. Neither the name of the project nor the names of its contributors
17 1.2 itojun * may be used to endorse or promote products derived from this software
18 1.2 itojun * without specific prior written permission.
19 1.12 itojun *
20 1.2 itojun * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
21 1.2 itojun * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 1.2 itojun * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 1.2 itojun * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
24 1.2 itojun * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 1.2 itojun * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 1.2 itojun * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 1.2 itojun * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 1.2 itojun * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 1.2 itojun * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 1.2 itojun * SUCH DAMAGE.
31 1.2 itojun */
32 1.25 lukem
33 1.25 lukem #include <sys/cdefs.h>
34 1.85 ozaki __KERNEL_RCSID(0, "$NetBSD: in_gif.c,v 1.85 2016/12/12 03:55:57 ozaki-r Exp $");
35 1.2 itojun
36 1.65 pooka #ifdef _KERNEL_OPT
37 1.2 itojun #include "opt_inet.h"
38 1.65 pooka #endif
39 1.2 itojun
40 1.2 itojun #include <sys/param.h>
41 1.2 itojun #include <sys/systm.h>
42 1.2 itojun #include <sys/socket.h>
43 1.2 itojun #include <sys/sockio.h>
44 1.2 itojun #include <sys/mbuf.h>
45 1.2 itojun #include <sys/errno.h>
46 1.2 itojun #include <sys/ioctl.h>
47 1.16 itojun #include <sys/syslog.h>
48 1.45 mlelstv #include <sys/kernel.h>
49 1.12 itojun
50 1.2 itojun #include <net/if.h>
51 1.2 itojun #include <net/route.h>
52 1.2 itojun
53 1.2 itojun #include <netinet/in.h>
54 1.2 itojun #include <netinet/in_systm.h>
55 1.2 itojun #include <netinet/ip.h>
56 1.2 itojun #include <netinet/ip_var.h>
57 1.2 itojun #include <netinet/in_gif.h>
58 1.12 itojun #include <netinet/in_var.h>
59 1.12 itojun #include <netinet/ip_encap.h>
60 1.2 itojun #include <netinet/ip_ecn.h>
61 1.2 itojun
62 1.2 itojun #ifdef INET6
63 1.2 itojun #include <netinet/ip6.h>
64 1.2 itojun #endif
65 1.2 itojun
66 1.27 itojun #include <net/if_gif.h>
67 1.2 itojun
68 1.7 itojun #include <net/net_osdep.h>
69 1.2 itojun
70 1.39 perry static int gif_validate4(const struct ip *, struct gif_softc *,
71 1.39 perry struct ifnet *);
72 1.22 itojun
73 1.4 itojun int ip_gif_ttl = GIF_TTL;
74 1.2 itojun
75 1.74 knakahar static const struct encapsw in_gif_encapsw = {
76 1.74 knakahar .encapsw4 = {
77 1.74 knakahar .pr_input = in_gif_input,
78 1.74 knakahar .pr_ctlinput = NULL,
79 1.74 knakahar }
80 1.26 itojun };
81 1.22 itojun
82 1.2 itojun int
83 1.40 perry in_gif_output(struct ifnet *ifp, int family, struct mbuf *m)
84 1.2 itojun {
85 1.57 dyoung struct rtentry *rt;
86 1.60 dyoung struct gif_softc *sc = ifp->if_softc;
87 1.67 knakahar struct sockaddr_in *sin_src = satosin(sc->gif_psrc);
88 1.67 knakahar struct sockaddr_in *sin_dst = satosin(sc->gif_pdst);
89 1.2 itojun struct ip iphdr; /* capsule IP header, host byte ordered */
90 1.2 itojun int proto, error;
91 1.2 itojun u_int8_t tos;
92 1.56 dyoung union {
93 1.56 dyoung struct sockaddr dst;
94 1.56 dyoung struct sockaddr_in dst4;
95 1.56 dyoung } u;
96 1.2 itojun
97 1.2 itojun if (sin_src == NULL || sin_dst == NULL ||
98 1.2 itojun sin_src->sin_family != AF_INET ||
99 1.2 itojun sin_dst->sin_family != AF_INET) {
100 1.2 itojun m_freem(m);
101 1.2 itojun return EAFNOSUPPORT;
102 1.2 itojun }
103 1.2 itojun
104 1.2 itojun switch (family) {
105 1.2 itojun #ifdef INET
106 1.2 itojun case AF_INET:
107 1.2 itojun {
108 1.48 dyoung const struct ip *ip;
109 1.2 itojun
110 1.2 itojun proto = IPPROTO_IPV4;
111 1.2 itojun if (m->m_len < sizeof(*ip)) {
112 1.2 itojun m = m_pullup(m, sizeof(*ip));
113 1.49 dyoung if (m == NULL)
114 1.2 itojun return ENOBUFS;
115 1.2 itojun }
116 1.48 dyoung ip = mtod(m, const struct ip *);
117 1.2 itojun tos = ip->ip_tos;
118 1.2 itojun break;
119 1.2 itojun }
120 1.26 itojun #endif /* INET */
121 1.2 itojun #ifdef INET6
122 1.2 itojun case AF_INET6:
123 1.2 itojun {
124 1.48 dyoung const struct ip6_hdr *ip6;
125 1.2 itojun proto = IPPROTO_IPV6;
126 1.2 itojun if (m->m_len < sizeof(*ip6)) {
127 1.2 itojun m = m_pullup(m, sizeof(*ip6));
128 1.62 liamjfoy if (m == NULL)
129 1.2 itojun return ENOBUFS;
130 1.2 itojun }
131 1.48 dyoung ip6 = mtod(m, const struct ip6_hdr *);
132 1.2 itojun tos = (ntohl(ip6->ip6_flow) >> 20) & 0xff;
133 1.2 itojun break;
134 1.2 itojun }
135 1.26 itojun #endif /* INET6 */
136 1.2 itojun default:
137 1.9 itojun #ifdef DEBUG
138 1.2 itojun printf("in_gif_output: warning: unknown family %d passed\n",
139 1.2 itojun family);
140 1.2 itojun #endif
141 1.2 itojun m_freem(m);
142 1.2 itojun return EAFNOSUPPORT;
143 1.2 itojun }
144 1.2 itojun
145 1.60 dyoung memset(&iphdr, 0, sizeof(iphdr));
146 1.2 itojun iphdr.ip_src = sin_src->sin_addr;
147 1.21 itojun /* bidirectional configured tunnel mode */
148 1.21 itojun if (sin_dst->sin_addr.s_addr != INADDR_ANY)
149 1.21 itojun iphdr.ip_dst = sin_dst->sin_addr;
150 1.21 itojun else {
151 1.21 itojun m_freem(m);
152 1.21 itojun return ENETUNREACH;
153 1.2 itojun }
154 1.2 itojun iphdr.ip_p = proto;
155 1.2 itojun /* version will be set in ip_output() */
156 1.4 itojun iphdr.ip_ttl = ip_gif_ttl;
157 1.29 itojun iphdr.ip_len = htons(m->m_pkthdr.len + sizeof(struct ip));
158 1.2 itojun if (ifp->if_flags & IFF_LINK1)
159 1.2 itojun ip_ecn_ingress(ECN_ALLOWED, &iphdr.ip_tos, &tos);
160 1.20 itojun else
161 1.20 itojun ip_ecn_ingress(ECN_NOCARE, &iphdr.ip_tos, &tos);
162 1.2 itojun
163 1.2 itojun /* prepend new IP header */
164 1.2 itojun M_PREPEND(m, sizeof(struct ip), M_DONTWAIT);
165 1.48 dyoung /* XXX Is m_pullup really necessary after M_PREPEND? */
166 1.50 dyoung if (m != NULL && M_UNWRITABLE(m, sizeof(struct ip)))
167 1.2 itojun m = m_pullup(m, sizeof(struct ip));
168 1.22 itojun if (m == NULL)
169 1.2 itojun return ENOBUFS;
170 1.12 itojun bcopy(&iphdr, mtod(m, struct ip *), sizeof(struct ip));
171 1.2 itojun
172 1.56 dyoung sockaddr_in_init(&u.dst4, &sin_dst->sin_addr, 0);
173 1.57 dyoung if ((rt = rtcache_lookup(&sc->gif_ro, &u.dst)) == NULL) {
174 1.56 dyoung m_freem(m);
175 1.56 dyoung return ENETUNREACH;
176 1.53 joerg }
177 1.12 itojun
178 1.53 joerg /* If the route constitutes infinite encapsulation, punt. */
179 1.57 dyoung if (rt->rt_ifp == ifp) {
180 1.84 ozaki rtcache_unref(rt, &sc->gif_ro);
181 1.53 joerg rtcache_free(&sc->gif_ro);
182 1.53 joerg m_freem(m);
183 1.53 joerg return ENETUNREACH; /*XXX*/
184 1.2 itojun }
185 1.84 ozaki rtcache_unref(rt, &sc->gif_ro);
186 1.12 itojun
187 1.33 itojun error = ip_output(m, NULL, &sc->gif_ro, 0, NULL, NULL);
188 1.30 itojun return (error);
189 1.2 itojun }
190 1.2 itojun
191 1.2 itojun void
192 1.75 knakahar in_gif_input(struct mbuf *m, int off, int proto)
193 1.2 itojun {
194 1.2 itojun struct ifnet *gifp = NULL;
195 1.49 dyoung const struct ip *ip;
196 1.12 itojun int af;
197 1.2 itojun u_int8_t otos;
198 1.2 itojun
199 1.49 dyoung ip = mtod(m, const struct ip *);
200 1.2 itojun
201 1.12 itojun gifp = (struct ifnet *)encap_getarg(m);
202 1.2 itojun
203 1.77 knakahar if (gifp == NULL || (gifp->if_flags & (IFF_UP|IFF_RUNNING))
204 1.77 knakahar != (IFF_UP|IFF_RUNNING)) {
205 1.2 itojun m_freem(m);
206 1.59 thorpej ip_statinc(IP_STAT_NOGIF);
207 1.2 itojun return;
208 1.2 itojun }
209 1.32 itojun #ifndef GIF_ENCAPCHECK
210 1.66 knakahar struct gif_softc *sc = (struct gif_softc *)gifp->if_softc;
211 1.66 knakahar /* other CPU do delete_tunnel */
212 1.66 knakahar if (sc->gif_psrc == NULL || sc->gif_pdst == NULL) {
213 1.66 knakahar m_freem(m);
214 1.66 knakahar ip_statinc(IP_STAT_NOGIF);
215 1.66 knakahar return;
216 1.66 knakahar }
217 1.66 knakahar
218 1.80 knakahar struct ifnet *rcvif;
219 1.80 knakahar struct psref psref;
220 1.76 ozaki rcvif = m_get_rcvif_psref(m, &psref);
221 1.76 ozaki if (!gif_validate4(ip, sc, rcvif)) {
222 1.76 ozaki m_put_rcvif_psref(rcvif, &psref);
223 1.22 itojun m_freem(m);
224 1.59 thorpej ip_statinc(IP_STAT_NOGIF);
225 1.22 itojun return;
226 1.22 itojun }
227 1.76 ozaki m_put_rcvif_psref(rcvif, &psref);
228 1.22 itojun #endif
229 1.2 itojun otos = ip->ip_tos;
230 1.2 itojun m_adj(m, off);
231 1.2 itojun
232 1.2 itojun switch (proto) {
233 1.2 itojun #ifdef INET
234 1.2 itojun case IPPROTO_IPV4:
235 1.2 itojun {
236 1.42 christos struct ip *xip;
237 1.2 itojun af = AF_INET;
238 1.50 dyoung if (M_UNWRITABLE(m, sizeof(*xip))) {
239 1.49 dyoung if ((m = m_pullup(m, sizeof(*xip))) == NULL)
240 1.2 itojun return;
241 1.2 itojun }
242 1.42 christos xip = mtod(m, struct ip *);
243 1.2 itojun if (gifp->if_flags & IFF_LINK1)
244 1.42 christos ip_ecn_egress(ECN_ALLOWED, &otos, &xip->ip_tos);
245 1.20 itojun else
246 1.42 christos ip_ecn_egress(ECN_NOCARE, &otos, &xip->ip_tos);
247 1.2 itojun break;
248 1.2 itojun }
249 1.2 itojun #endif
250 1.2 itojun #ifdef INET6
251 1.2 itojun case IPPROTO_IPV6:
252 1.2 itojun {
253 1.2 itojun struct ip6_hdr *ip6;
254 1.2 itojun u_int8_t itos;
255 1.2 itojun af = AF_INET6;
256 1.50 dyoung if (M_UNWRITABLE(m, sizeof(*ip6))) {
257 1.49 dyoung if ((m = m_pullup(m, sizeof(*ip6))) == NULL)
258 1.2 itojun return;
259 1.2 itojun }
260 1.2 itojun ip6 = mtod(m, struct ip6_hdr *);
261 1.2 itojun itos = (ntohl(ip6->ip6_flow) >> 20) & 0xff;
262 1.2 itojun if (gifp->if_flags & IFF_LINK1)
263 1.2 itojun ip_ecn_egress(ECN_ALLOWED, &otos, &itos);
264 1.20 itojun else
265 1.20 itojun ip_ecn_egress(ECN_NOCARE, &otos, &itos);
266 1.2 itojun ip6->ip6_flow &= ~htonl(0xff << 20);
267 1.2 itojun ip6->ip6_flow |= htonl((u_int32_t)itos << 20);
268 1.2 itojun break;
269 1.2 itojun }
270 1.2 itojun #endif /* INET6 */
271 1.2 itojun default:
272 1.59 thorpej ip_statinc(IP_STAT_NOGIF);
273 1.2 itojun m_freem(m);
274 1.2 itojun return;
275 1.2 itojun }
276 1.2 itojun gif_input(m, af, gifp);
277 1.2 itojun return;
278 1.12 itojun }
279 1.12 itojun
280 1.12 itojun /*
281 1.22 itojun * validate outer address.
282 1.12 itojun */
283 1.22 itojun static int
284 1.40 perry gif_validate4(const struct ip *ip, struct gif_softc *sc, struct ifnet *ifp)
285 1.12 itojun {
286 1.12 itojun struct sockaddr_in *src, *dst;
287 1.12 itojun struct in_ifaddr *ia4;
288 1.82 ozaki int s;
289 1.12 itojun
290 1.67 knakahar src = satosin(sc->gif_psrc);
291 1.67 knakahar dst = satosin(sc->gif_pdst);
292 1.12 itojun
293 1.12 itojun /* check for address match */
294 1.22 itojun if (src->sin_addr.s_addr != ip->ip_dst.s_addr ||
295 1.22 itojun dst->sin_addr.s_addr != ip->ip_src.s_addr)
296 1.12 itojun return 0;
297 1.12 itojun
298 1.12 itojun /* martian filters on outer source - NOT done in ip_input! */
299 1.22 itojun if (IN_MULTICAST(ip->ip_src.s_addr))
300 1.12 itojun return 0;
301 1.22 itojun switch ((ntohl(ip->ip_src.s_addr) & 0xff000000) >> 24) {
302 1.12 itojun case 0: case 127: case 255:
303 1.12 itojun return 0;
304 1.12 itojun }
305 1.12 itojun /* reject packets with broadcast on source */
306 1.82 ozaki s = pserialize_read_enter();
307 1.81 ozaki IN_ADDRLIST_READER_FOREACH(ia4) {
308 1.12 itojun if ((ia4->ia_ifa.ifa_ifp->if_flags & IFF_BROADCAST) == 0)
309 1.12 itojun continue;
310 1.82 ozaki if (ip->ip_src.s_addr == ia4->ia_broadaddr.sin_addr.s_addr) {
311 1.82 ozaki pserialize_read_exit(s);
312 1.12 itojun return 0;
313 1.82 ozaki }
314 1.12 itojun }
315 1.82 ozaki pserialize_read_exit(s);
316 1.12 itojun
317 1.12 itojun /* ingress filters on outer source */
318 1.22 itojun if ((sc->gif_if.if_flags & IFF_LINK2) == 0 && ifp) {
319 1.60 dyoung union {
320 1.60 dyoung struct sockaddr sa;
321 1.60 dyoung struct sockaddr_in sin;
322 1.60 dyoung } u;
323 1.12 itojun struct rtentry *rt;
324 1.12 itojun
325 1.60 dyoung sockaddr_in_init(&u.sin, &ip->ip_src, 0);
326 1.60 dyoung rt = rtalloc1(&u.sa, 0);
327 1.60 dyoung if (rt == NULL || rt->rt_ifp != ifp) {
328 1.16 itojun #if 0
329 1.16 itojun log(LOG_WARNING, "%s: packet from 0x%x dropped "
330 1.16 itojun "due to ingress filter\n", if_name(&sc->gif_if),
331 1.60 dyoung (u_int32_t)ntohl(u.sin.sin_addr.s_addr));
332 1.16 itojun #endif
333 1.60 dyoung if (rt != NULL)
334 1.85 ozaki rt_unref(rt);
335 1.12 itojun return 0;
336 1.12 itojun }
337 1.85 ozaki rt_unref(rt);
338 1.12 itojun }
339 1.12 itojun
340 1.21 itojun return 32 * 2;
341 1.22 itojun }
342 1.22 itojun
343 1.32 itojun #ifdef GIF_ENCAPCHECK
344 1.22 itojun /*
345 1.22 itojun * we know that we are in IFF_UP, outer address available, and outer family
346 1.22 itojun * matched the physical addr family. see gif_encapcheck().
347 1.22 itojun */
348 1.22 itojun int
349 1.44 tron gif_encapcheck4(struct mbuf *m, int off, int proto, void *arg)
350 1.22 itojun {
351 1.22 itojun struct ip ip;
352 1.22 itojun struct gif_softc *sc;
353 1.79 ozaki struct ifnet *ifp = NULL;
354 1.79 ozaki int r;
355 1.79 ozaki struct psref psref;
356 1.22 itojun
357 1.22 itojun /* sanity check done in caller */
358 1.60 dyoung sc = arg;
359 1.22 itojun
360 1.60 dyoung m_copydata(m, 0, sizeof(ip), &ip);
361 1.79 ozaki if ((m->m_flags & M_PKTHDR) != 0)
362 1.79 ozaki ifp = m_get_rcvif_psref(m, &psref);
363 1.79 ozaki
364 1.79 ozaki r = gif_validate4(&ip, sc, ifp);
365 1.22 itojun
366 1.79 ozaki m_put_rcvif_psref(ifp, &psref);
367 1.79 ozaki return r;
368 1.22 itojun }
369 1.32 itojun #endif
370 1.22 itojun
371 1.22 itojun int
372 1.40 perry in_gif_attach(struct gif_softc *sc)
373 1.22 itojun {
374 1.32 itojun #ifndef GIF_ENCAPCHECK
375 1.22 itojun struct sockaddr_in mask4;
376 1.22 itojun
377 1.60 dyoung memset(&mask4, 0, sizeof(mask4));
378 1.22 itojun mask4.sin_len = sizeof(struct sockaddr_in);
379 1.22 itojun mask4.sin_addr.s_addr = ~0;
380 1.22 itojun
381 1.22 itojun if (!sc->gif_psrc || !sc->gif_pdst)
382 1.22 itojun return EINVAL;
383 1.22 itojun sc->encap_cookie4 = encap_attach(AF_INET, -1, sc->gif_psrc,
384 1.22 itojun (struct sockaddr *)&mask4, sc->gif_pdst, (struct sockaddr *)&mask4,
385 1.74 knakahar &in_gif_encapsw, sc);
386 1.22 itojun #else
387 1.22 itojun sc->encap_cookie4 = encap_attach_func(AF_INET, -1, gif_encapcheck,
388 1.74 knakahar &in_gif_encapsw, sc);
389 1.22 itojun #endif
390 1.22 itojun if (sc->encap_cookie4 == NULL)
391 1.22 itojun return EEXIST;
392 1.22 itojun return 0;
393 1.22 itojun }
394 1.22 itojun
395 1.22 itojun int
396 1.73 riastrad in_gif_detach(struct gif_softc *sc)
397 1.22 itojun {
398 1.22 itojun int error;
399 1.22 itojun
400 1.78 knakahar error = in_gif_pause(sc);
401 1.78 knakahar
402 1.78 knakahar rtcache_free(&sc->gif_ro);
403 1.78 knakahar
404 1.78 knakahar return error;
405 1.78 knakahar }
406 1.78 knakahar
407 1.78 knakahar int
408 1.78 knakahar in_gif_pause(struct gif_softc *sc)
409 1.78 knakahar {
410 1.78 knakahar int error;
411 1.78 knakahar
412 1.22 itojun error = encap_detach(sc->encap_cookie4);
413 1.22 itojun if (error == 0)
414 1.22 itojun sc->encap_cookie4 = NULL;
415 1.45 mlelstv
416 1.73 riastrad return error;
417 1.2 itojun }
418