in_gif.c revision 1.89 1 1.89 knakahar /* $NetBSD: in_gif.c,v 1.89 2017/11/15 10:42:41 knakahara Exp $ */
2 1.22 itojun /* $KAME: in_gif.c,v 1.66 2001/07/29 04:46:09 itojun Exp $ */
3 1.3 thorpej
4 1.2 itojun /*
5 1.2 itojun * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
6 1.2 itojun * All rights reserved.
7 1.12 itojun *
8 1.2 itojun * Redistribution and use in source and binary forms, with or without
9 1.2 itojun * modification, are permitted provided that the following conditions
10 1.2 itojun * are met:
11 1.2 itojun * 1. Redistributions of source code must retain the above copyright
12 1.2 itojun * notice, this list of conditions and the following disclaimer.
13 1.2 itojun * 2. Redistributions in binary form must reproduce the above copyright
14 1.2 itojun * notice, this list of conditions and the following disclaimer in the
15 1.2 itojun * documentation and/or other materials provided with the distribution.
16 1.2 itojun * 3. Neither the name of the project nor the names of its contributors
17 1.2 itojun * may be used to endorse or promote products derived from this software
18 1.2 itojun * without specific prior written permission.
19 1.12 itojun *
20 1.2 itojun * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
21 1.2 itojun * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 1.2 itojun * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 1.2 itojun * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
24 1.2 itojun * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 1.2 itojun * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 1.2 itojun * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 1.2 itojun * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 1.2 itojun * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 1.2 itojun * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 1.2 itojun * SUCH DAMAGE.
31 1.2 itojun */
32 1.25 lukem
33 1.25 lukem #include <sys/cdefs.h>
34 1.89 knakahar __KERNEL_RCSID(0, "$NetBSD: in_gif.c,v 1.89 2017/11/15 10:42:41 knakahara Exp $");
35 1.2 itojun
36 1.65 pooka #ifdef _KERNEL_OPT
37 1.2 itojun #include "opt_inet.h"
38 1.65 pooka #endif
39 1.2 itojun
40 1.2 itojun #include <sys/param.h>
41 1.2 itojun #include <sys/systm.h>
42 1.2 itojun #include <sys/socket.h>
43 1.2 itojun #include <sys/sockio.h>
44 1.2 itojun #include <sys/mbuf.h>
45 1.2 itojun #include <sys/errno.h>
46 1.2 itojun #include <sys/ioctl.h>
47 1.16 itojun #include <sys/syslog.h>
48 1.45 mlelstv #include <sys/kernel.h>
49 1.12 itojun
50 1.2 itojun #include <net/if.h>
51 1.2 itojun #include <net/route.h>
52 1.2 itojun
53 1.2 itojun #include <netinet/in.h>
54 1.2 itojun #include <netinet/in_systm.h>
55 1.2 itojun #include <netinet/ip.h>
56 1.2 itojun #include <netinet/ip_var.h>
57 1.2 itojun #include <netinet/in_gif.h>
58 1.12 itojun #include <netinet/in_var.h>
59 1.12 itojun #include <netinet/ip_encap.h>
60 1.2 itojun #include <netinet/ip_ecn.h>
61 1.2 itojun
62 1.2 itojun #ifdef INET6
63 1.2 itojun #include <netinet/ip6.h>
64 1.2 itojun #endif
65 1.2 itojun
66 1.27 itojun #include <net/if_gif.h>
67 1.2 itojun
68 1.7 itojun #include <net/net_osdep.h>
69 1.2 itojun
70 1.39 perry static int gif_validate4(const struct ip *, struct gif_softc *,
71 1.39 perry struct ifnet *);
72 1.22 itojun
73 1.4 itojun int ip_gif_ttl = GIF_TTL;
74 1.2 itojun
75 1.74 knakahar static const struct encapsw in_gif_encapsw = {
76 1.74 knakahar .encapsw4 = {
77 1.74 knakahar .pr_input = in_gif_input,
78 1.74 knakahar .pr_ctlinput = NULL,
79 1.74 knakahar }
80 1.26 itojun };
81 1.22 itojun
82 1.2 itojun int
83 1.40 perry in_gif_output(struct ifnet *ifp, int family, struct mbuf *m)
84 1.2 itojun {
85 1.57 dyoung struct rtentry *rt;
86 1.86 knakahar struct route *ro;
87 1.88 knakahar struct gif_ro *gro;
88 1.60 dyoung struct gif_softc *sc = ifp->if_softc;
89 1.67 knakahar struct sockaddr_in *sin_src = satosin(sc->gif_psrc);
90 1.67 knakahar struct sockaddr_in *sin_dst = satosin(sc->gif_pdst);
91 1.2 itojun struct ip iphdr; /* capsule IP header, host byte ordered */
92 1.2 itojun int proto, error;
93 1.2 itojun u_int8_t tos;
94 1.2 itojun
95 1.2 itojun if (sin_src == NULL || sin_dst == NULL ||
96 1.2 itojun sin_src->sin_family != AF_INET ||
97 1.2 itojun sin_dst->sin_family != AF_INET) {
98 1.2 itojun m_freem(m);
99 1.2 itojun return EAFNOSUPPORT;
100 1.2 itojun }
101 1.2 itojun
102 1.2 itojun switch (family) {
103 1.2 itojun #ifdef INET
104 1.2 itojun case AF_INET:
105 1.2 itojun {
106 1.48 dyoung const struct ip *ip;
107 1.2 itojun
108 1.2 itojun proto = IPPROTO_IPV4;
109 1.2 itojun if (m->m_len < sizeof(*ip)) {
110 1.2 itojun m = m_pullup(m, sizeof(*ip));
111 1.49 dyoung if (m == NULL)
112 1.2 itojun return ENOBUFS;
113 1.2 itojun }
114 1.48 dyoung ip = mtod(m, const struct ip *);
115 1.2 itojun tos = ip->ip_tos;
116 1.2 itojun break;
117 1.2 itojun }
118 1.26 itojun #endif /* INET */
119 1.2 itojun #ifdef INET6
120 1.2 itojun case AF_INET6:
121 1.2 itojun {
122 1.48 dyoung const struct ip6_hdr *ip6;
123 1.2 itojun proto = IPPROTO_IPV6;
124 1.2 itojun if (m->m_len < sizeof(*ip6)) {
125 1.2 itojun m = m_pullup(m, sizeof(*ip6));
126 1.62 liamjfoy if (m == NULL)
127 1.2 itojun return ENOBUFS;
128 1.2 itojun }
129 1.48 dyoung ip6 = mtod(m, const struct ip6_hdr *);
130 1.2 itojun tos = (ntohl(ip6->ip6_flow) >> 20) & 0xff;
131 1.2 itojun break;
132 1.2 itojun }
133 1.26 itojun #endif /* INET6 */
134 1.2 itojun default:
135 1.9 itojun #ifdef DEBUG
136 1.2 itojun printf("in_gif_output: warning: unknown family %d passed\n",
137 1.2 itojun family);
138 1.2 itojun #endif
139 1.2 itojun m_freem(m);
140 1.2 itojun return EAFNOSUPPORT;
141 1.2 itojun }
142 1.2 itojun
143 1.60 dyoung memset(&iphdr, 0, sizeof(iphdr));
144 1.2 itojun iphdr.ip_src = sin_src->sin_addr;
145 1.21 itojun /* bidirectional configured tunnel mode */
146 1.21 itojun if (sin_dst->sin_addr.s_addr != INADDR_ANY)
147 1.21 itojun iphdr.ip_dst = sin_dst->sin_addr;
148 1.21 itojun else {
149 1.21 itojun m_freem(m);
150 1.21 itojun return ENETUNREACH;
151 1.2 itojun }
152 1.2 itojun iphdr.ip_p = proto;
153 1.2 itojun /* version will be set in ip_output() */
154 1.4 itojun iphdr.ip_ttl = ip_gif_ttl;
155 1.29 itojun iphdr.ip_len = htons(m->m_pkthdr.len + sizeof(struct ip));
156 1.2 itojun if (ifp->if_flags & IFF_LINK1)
157 1.2 itojun ip_ecn_ingress(ECN_ALLOWED, &iphdr.ip_tos, &tos);
158 1.20 itojun else
159 1.20 itojun ip_ecn_ingress(ECN_NOCARE, &iphdr.ip_tos, &tos);
160 1.2 itojun
161 1.2 itojun /* prepend new IP header */
162 1.2 itojun M_PREPEND(m, sizeof(struct ip), M_DONTWAIT);
163 1.48 dyoung /* XXX Is m_pullup really necessary after M_PREPEND? */
164 1.50 dyoung if (m != NULL && M_UNWRITABLE(m, sizeof(struct ip)))
165 1.2 itojun m = m_pullup(m, sizeof(struct ip));
166 1.22 itojun if (m == NULL)
167 1.2 itojun return ENOBUFS;
168 1.12 itojun bcopy(&iphdr, mtod(m, struct ip *), sizeof(struct ip));
169 1.2 itojun
170 1.88 knakahar gro = percpu_getref(sc->gif_ro_percpu);
171 1.88 knakahar mutex_enter(&gro->gr_lock);
172 1.88 knakahar ro = &gro->gr_ro;
173 1.87 knakahar if ((rt = rtcache_lookup(ro, sc->gif_pdst)) == NULL) {
174 1.88 knakahar mutex_exit(&gro->gr_lock);
175 1.86 knakahar percpu_putref(sc->gif_ro_percpu);
176 1.56 dyoung m_freem(m);
177 1.56 dyoung return ENETUNREACH;
178 1.53 joerg }
179 1.12 itojun
180 1.53 joerg /* If the route constitutes infinite encapsulation, punt. */
181 1.57 dyoung if (rt->rt_ifp == ifp) {
182 1.86 knakahar rtcache_unref(rt, ro);
183 1.86 knakahar rtcache_free(ro);
184 1.88 knakahar mutex_exit(&gro->gr_lock);
185 1.86 knakahar percpu_putref(sc->gif_ro_percpu);
186 1.53 joerg m_freem(m);
187 1.53 joerg return ENETUNREACH; /*XXX*/
188 1.2 itojun }
189 1.86 knakahar rtcache_unref(rt, ro);
190 1.12 itojun
191 1.86 knakahar error = ip_output(m, NULL, ro, 0, NULL, NULL);
192 1.88 knakahar mutex_exit(&gro->gr_lock);
193 1.86 knakahar percpu_putref(sc->gif_ro_percpu);
194 1.30 itojun return (error);
195 1.2 itojun }
196 1.2 itojun
197 1.2 itojun void
198 1.89 knakahar in_gif_input(struct mbuf *m, int off, int proto, void *eparg)
199 1.2 itojun {
200 1.89 knakahar struct ifnet *gifp = eparg;
201 1.49 dyoung const struct ip *ip;
202 1.12 itojun int af;
203 1.2 itojun u_int8_t otos;
204 1.2 itojun
205 1.89 knakahar KASSERT(gifp != NULL);
206 1.89 knakahar
207 1.49 dyoung ip = mtod(m, const struct ip *);
208 1.2 itojun
209 1.89 knakahar if ((gifp->if_flags & (IFF_UP|IFF_RUNNING)) != (IFF_UP|IFF_RUNNING)) {
210 1.2 itojun m_freem(m);
211 1.59 thorpej ip_statinc(IP_STAT_NOGIF);
212 1.2 itojun return;
213 1.2 itojun }
214 1.32 itojun #ifndef GIF_ENCAPCHECK
215 1.66 knakahar struct gif_softc *sc = (struct gif_softc *)gifp->if_softc;
216 1.66 knakahar /* other CPU do delete_tunnel */
217 1.66 knakahar if (sc->gif_psrc == NULL || sc->gif_pdst == NULL) {
218 1.66 knakahar m_freem(m);
219 1.66 knakahar ip_statinc(IP_STAT_NOGIF);
220 1.66 knakahar return;
221 1.66 knakahar }
222 1.66 knakahar
223 1.80 knakahar struct ifnet *rcvif;
224 1.80 knakahar struct psref psref;
225 1.76 ozaki rcvif = m_get_rcvif_psref(m, &psref);
226 1.76 ozaki if (!gif_validate4(ip, sc, rcvif)) {
227 1.76 ozaki m_put_rcvif_psref(rcvif, &psref);
228 1.22 itojun m_freem(m);
229 1.59 thorpej ip_statinc(IP_STAT_NOGIF);
230 1.22 itojun return;
231 1.22 itojun }
232 1.76 ozaki m_put_rcvif_psref(rcvif, &psref);
233 1.22 itojun #endif
234 1.2 itojun otos = ip->ip_tos;
235 1.2 itojun m_adj(m, off);
236 1.2 itojun
237 1.2 itojun switch (proto) {
238 1.2 itojun #ifdef INET
239 1.2 itojun case IPPROTO_IPV4:
240 1.2 itojun {
241 1.42 christos struct ip *xip;
242 1.2 itojun af = AF_INET;
243 1.50 dyoung if (M_UNWRITABLE(m, sizeof(*xip))) {
244 1.49 dyoung if ((m = m_pullup(m, sizeof(*xip))) == NULL)
245 1.2 itojun return;
246 1.2 itojun }
247 1.42 christos xip = mtod(m, struct ip *);
248 1.2 itojun if (gifp->if_flags & IFF_LINK1)
249 1.42 christos ip_ecn_egress(ECN_ALLOWED, &otos, &xip->ip_tos);
250 1.20 itojun else
251 1.42 christos ip_ecn_egress(ECN_NOCARE, &otos, &xip->ip_tos);
252 1.2 itojun break;
253 1.2 itojun }
254 1.2 itojun #endif
255 1.2 itojun #ifdef INET6
256 1.2 itojun case IPPROTO_IPV6:
257 1.2 itojun {
258 1.2 itojun struct ip6_hdr *ip6;
259 1.2 itojun u_int8_t itos;
260 1.2 itojun af = AF_INET6;
261 1.50 dyoung if (M_UNWRITABLE(m, sizeof(*ip6))) {
262 1.49 dyoung if ((m = m_pullup(m, sizeof(*ip6))) == NULL)
263 1.2 itojun return;
264 1.2 itojun }
265 1.2 itojun ip6 = mtod(m, struct ip6_hdr *);
266 1.2 itojun itos = (ntohl(ip6->ip6_flow) >> 20) & 0xff;
267 1.2 itojun if (gifp->if_flags & IFF_LINK1)
268 1.2 itojun ip_ecn_egress(ECN_ALLOWED, &otos, &itos);
269 1.20 itojun else
270 1.20 itojun ip_ecn_egress(ECN_NOCARE, &otos, &itos);
271 1.2 itojun ip6->ip6_flow &= ~htonl(0xff << 20);
272 1.2 itojun ip6->ip6_flow |= htonl((u_int32_t)itos << 20);
273 1.2 itojun break;
274 1.2 itojun }
275 1.2 itojun #endif /* INET6 */
276 1.2 itojun default:
277 1.59 thorpej ip_statinc(IP_STAT_NOGIF);
278 1.2 itojun m_freem(m);
279 1.2 itojun return;
280 1.2 itojun }
281 1.2 itojun gif_input(m, af, gifp);
282 1.2 itojun return;
283 1.12 itojun }
284 1.12 itojun
285 1.12 itojun /*
286 1.22 itojun * validate outer address.
287 1.12 itojun */
288 1.22 itojun static int
289 1.40 perry gif_validate4(const struct ip *ip, struct gif_softc *sc, struct ifnet *ifp)
290 1.12 itojun {
291 1.12 itojun struct sockaddr_in *src, *dst;
292 1.12 itojun struct in_ifaddr *ia4;
293 1.82 ozaki int s;
294 1.12 itojun
295 1.67 knakahar src = satosin(sc->gif_psrc);
296 1.67 knakahar dst = satosin(sc->gif_pdst);
297 1.12 itojun
298 1.12 itojun /* check for address match */
299 1.22 itojun if (src->sin_addr.s_addr != ip->ip_dst.s_addr ||
300 1.22 itojun dst->sin_addr.s_addr != ip->ip_src.s_addr)
301 1.12 itojun return 0;
302 1.12 itojun
303 1.12 itojun /* martian filters on outer source - NOT done in ip_input! */
304 1.22 itojun if (IN_MULTICAST(ip->ip_src.s_addr))
305 1.12 itojun return 0;
306 1.22 itojun switch ((ntohl(ip->ip_src.s_addr) & 0xff000000) >> 24) {
307 1.12 itojun case 0: case 127: case 255:
308 1.12 itojun return 0;
309 1.12 itojun }
310 1.12 itojun /* reject packets with broadcast on source */
311 1.82 ozaki s = pserialize_read_enter();
312 1.81 ozaki IN_ADDRLIST_READER_FOREACH(ia4) {
313 1.12 itojun if ((ia4->ia_ifa.ifa_ifp->if_flags & IFF_BROADCAST) == 0)
314 1.12 itojun continue;
315 1.82 ozaki if (ip->ip_src.s_addr == ia4->ia_broadaddr.sin_addr.s_addr) {
316 1.82 ozaki pserialize_read_exit(s);
317 1.12 itojun return 0;
318 1.82 ozaki }
319 1.12 itojun }
320 1.82 ozaki pserialize_read_exit(s);
321 1.12 itojun
322 1.12 itojun /* ingress filters on outer source */
323 1.22 itojun if ((sc->gif_if.if_flags & IFF_LINK2) == 0 && ifp) {
324 1.60 dyoung union {
325 1.60 dyoung struct sockaddr sa;
326 1.60 dyoung struct sockaddr_in sin;
327 1.60 dyoung } u;
328 1.12 itojun struct rtentry *rt;
329 1.12 itojun
330 1.60 dyoung sockaddr_in_init(&u.sin, &ip->ip_src, 0);
331 1.60 dyoung rt = rtalloc1(&u.sa, 0);
332 1.60 dyoung if (rt == NULL || rt->rt_ifp != ifp) {
333 1.16 itojun #if 0
334 1.16 itojun log(LOG_WARNING, "%s: packet from 0x%x dropped "
335 1.16 itojun "due to ingress filter\n", if_name(&sc->gif_if),
336 1.60 dyoung (u_int32_t)ntohl(u.sin.sin_addr.s_addr));
337 1.16 itojun #endif
338 1.60 dyoung if (rt != NULL)
339 1.85 ozaki rt_unref(rt);
340 1.12 itojun return 0;
341 1.12 itojun }
342 1.85 ozaki rt_unref(rt);
343 1.12 itojun }
344 1.12 itojun
345 1.21 itojun return 32 * 2;
346 1.22 itojun }
347 1.22 itojun
348 1.32 itojun #ifdef GIF_ENCAPCHECK
349 1.22 itojun /*
350 1.22 itojun * we know that we are in IFF_UP, outer address available, and outer family
351 1.22 itojun * matched the physical addr family. see gif_encapcheck().
352 1.22 itojun */
353 1.22 itojun int
354 1.44 tron gif_encapcheck4(struct mbuf *m, int off, int proto, void *arg)
355 1.22 itojun {
356 1.22 itojun struct ip ip;
357 1.22 itojun struct gif_softc *sc;
358 1.79 ozaki struct ifnet *ifp = NULL;
359 1.79 ozaki int r;
360 1.79 ozaki struct psref psref;
361 1.22 itojun
362 1.22 itojun /* sanity check done in caller */
363 1.60 dyoung sc = arg;
364 1.22 itojun
365 1.60 dyoung m_copydata(m, 0, sizeof(ip), &ip);
366 1.79 ozaki if ((m->m_flags & M_PKTHDR) != 0)
367 1.79 ozaki ifp = m_get_rcvif_psref(m, &psref);
368 1.79 ozaki
369 1.79 ozaki r = gif_validate4(&ip, sc, ifp);
370 1.22 itojun
371 1.79 ozaki m_put_rcvif_psref(ifp, &psref);
372 1.79 ozaki return r;
373 1.22 itojun }
374 1.32 itojun #endif
375 1.22 itojun
376 1.22 itojun int
377 1.40 perry in_gif_attach(struct gif_softc *sc)
378 1.22 itojun {
379 1.32 itojun #ifndef GIF_ENCAPCHECK
380 1.22 itojun struct sockaddr_in mask4;
381 1.22 itojun
382 1.60 dyoung memset(&mask4, 0, sizeof(mask4));
383 1.22 itojun mask4.sin_len = sizeof(struct sockaddr_in);
384 1.22 itojun mask4.sin_addr.s_addr = ~0;
385 1.22 itojun
386 1.22 itojun if (!sc->gif_psrc || !sc->gif_pdst)
387 1.22 itojun return EINVAL;
388 1.22 itojun sc->encap_cookie4 = encap_attach(AF_INET, -1, sc->gif_psrc,
389 1.22 itojun (struct sockaddr *)&mask4, sc->gif_pdst, (struct sockaddr *)&mask4,
390 1.74 knakahar &in_gif_encapsw, sc);
391 1.22 itojun #else
392 1.22 itojun sc->encap_cookie4 = encap_attach_func(AF_INET, -1, gif_encapcheck,
393 1.74 knakahar &in_gif_encapsw, sc);
394 1.22 itojun #endif
395 1.22 itojun if (sc->encap_cookie4 == NULL)
396 1.22 itojun return EEXIST;
397 1.22 itojun return 0;
398 1.22 itojun }
399 1.22 itojun
400 1.22 itojun int
401 1.73 riastrad in_gif_detach(struct gif_softc *sc)
402 1.22 itojun {
403 1.22 itojun int error;
404 1.22 itojun
405 1.78 knakahar error = in_gif_pause(sc);
406 1.78 knakahar
407 1.86 knakahar percpu_foreach(sc->gif_ro_percpu, gif_rtcache_free_pc, NULL);
408 1.78 knakahar
409 1.78 knakahar return error;
410 1.78 knakahar }
411 1.78 knakahar
412 1.78 knakahar int
413 1.78 knakahar in_gif_pause(struct gif_softc *sc)
414 1.78 knakahar {
415 1.78 knakahar int error;
416 1.78 knakahar
417 1.22 itojun error = encap_detach(sc->encap_cookie4);
418 1.22 itojun if (error == 0)
419 1.22 itojun sc->encap_cookie4 = NULL;
420 1.45 mlelstv
421 1.73 riastrad return error;
422 1.2 itojun }
423