in_gif.c revision 1.20 1 /* $NetBSD: in_gif.c,v 1.20 2001/05/10 01:37:42 itojun Exp $ */
2 /* $KAME: in_gif.c,v 1.53 2001/05/03 14:51:48 itojun Exp $ */
3
4 /*
5 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of the project nor the names of its contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 * SUCH DAMAGE.
31 */
32
33 #include "opt_inet.h"
34 #include "opt_iso.h"
35
36 #include <sys/param.h>
37 #include <sys/systm.h>
38 #include <sys/socket.h>
39 #include <sys/sockio.h>
40 #include <sys/mbuf.h>
41 #include <sys/errno.h>
42 #include <sys/ioctl.h>
43 #include <sys/syslog.h>
44
45 #include <net/if.h>
46 #include <net/route.h>
47
48 #include <netinet/in.h>
49 #include <netinet/in_systm.h>
50 #include <netinet/ip.h>
51 #include <netinet/ip_var.h>
52 #include <netinet/in_gif.h>
53 #include <netinet/in_var.h>
54 #include <netinet/ip_encap.h>
55 #include <netinet/ip_ecn.h>
56 #ifdef __OpenBSD__
57 #include <netinet/ip_ipsp.h>
58 #endif
59
60 #ifdef INET6
61 #include <netinet/ip6.h>
62 #endif
63
64 #ifdef MROUTING
65 #include <netinet/ip_mroute.h>
66 #endif /* MROUTING */
67
68 #include <net/if_gif.h>
69
70 #include "gif.h"
71
72 #include <machine/stdarg.h>
73
74 #include <net/net_osdep.h>
75
76 #if NGIF > 0
77 int ip_gif_ttl = GIF_TTL;
78 #else
79 int ip_gif_ttl = 0;
80 #endif
81
82 int
83 in_gif_output(ifp, family, m, rt)
84 struct ifnet *ifp;
85 int family;
86 struct mbuf *m;
87 struct rtentry *rt;
88 {
89 struct gif_softc *sc = (struct gif_softc*)ifp;
90 struct sockaddr_in *dst = (struct sockaddr_in *)&sc->gif_ro.ro_dst;
91 struct sockaddr_in *sin_src = (struct sockaddr_in *)sc->gif_psrc;
92 struct sockaddr_in *sin_dst = (struct sockaddr_in *)sc->gif_pdst;
93 struct ip iphdr; /* capsule IP header, host byte ordered */
94 int proto, error;
95 u_int8_t tos;
96
97 if (sin_src == NULL || sin_dst == NULL ||
98 sin_src->sin_family != AF_INET ||
99 sin_dst->sin_family != AF_INET) {
100 m_freem(m);
101 return EAFNOSUPPORT;
102 }
103
104 switch (family) {
105 #ifdef INET
106 case AF_INET:
107 {
108 struct ip *ip;
109
110 proto = IPPROTO_IPV4;
111 if (m->m_len < sizeof(*ip)) {
112 m = m_pullup(m, sizeof(*ip));
113 if (!m)
114 return ENOBUFS;
115 }
116 ip = mtod(m, struct ip *);
117 tos = ip->ip_tos;
118 break;
119 }
120 #endif /*INET*/
121 #ifdef INET6
122 case AF_INET6:
123 {
124 struct ip6_hdr *ip6;
125 proto = IPPROTO_IPV6;
126 if (m->m_len < sizeof(*ip6)) {
127 m = m_pullup(m, sizeof(*ip6));
128 if (!m)
129 return ENOBUFS;
130 }
131 ip6 = mtod(m, struct ip6_hdr *);
132 tos = (ntohl(ip6->ip6_flow) >> 20) & 0xff;
133 break;
134 }
135 #endif /*INET6*/
136 #ifdef ISO
137 case AF_ISO:
138 proto = IPPROTO_EON;
139 tos = 0;
140 break;
141 #endif
142 default:
143 #ifdef DEBUG
144 printf("in_gif_output: warning: unknown family %d passed\n",
145 family);
146 #endif
147 m_freem(m);
148 return EAFNOSUPPORT;
149 }
150
151 bzero(&iphdr, sizeof(iphdr));
152 iphdr.ip_src = sin_src->sin_addr;
153 if (ifp->if_flags & IFF_LINK0) {
154 /* multi-destination mode */
155 if (sin_dst->sin_addr.s_addr != INADDR_ANY)
156 iphdr.ip_dst = sin_dst->sin_addr;
157 else if (rt) {
158 if (family != AF_INET) {
159 m_freem(m);
160 return EINVAL; /*XXX*/
161 }
162 iphdr.ip_dst = ((struct sockaddr_in *)
163 (rt->rt_gateway))->sin_addr;
164 } else {
165 m_freem(m);
166 return ENETUNREACH;
167 }
168 } else {
169 /* bidirectional configured tunnel mode */
170 if (sin_dst->sin_addr.s_addr != INADDR_ANY)
171 iphdr.ip_dst = sin_dst->sin_addr;
172 else {
173 m_freem(m);
174 return ENETUNREACH;
175 }
176 }
177 iphdr.ip_p = proto;
178 /* version will be set in ip_output() */
179 iphdr.ip_ttl = ip_gif_ttl;
180 iphdr.ip_len = m->m_pkthdr.len + sizeof(struct ip);
181 if (ifp->if_flags & IFF_LINK1)
182 ip_ecn_ingress(ECN_ALLOWED, &iphdr.ip_tos, &tos);
183 else
184 ip_ecn_ingress(ECN_NOCARE, &iphdr.ip_tos, &tos);
185
186 /* prepend new IP header */
187 M_PREPEND(m, sizeof(struct ip), M_DONTWAIT);
188 if (m && m->m_len < sizeof(struct ip))
189 m = m_pullup(m, sizeof(struct ip));
190 if (m == NULL) {
191 printf("ENOBUFS in in_gif_output %d\n", __LINE__);
192 return ENOBUFS;
193 }
194 bcopy(&iphdr, mtod(m, struct ip *), sizeof(struct ip));
195
196 if (dst->sin_family != sin_dst->sin_family ||
197 dst->sin_addr.s_addr != sin_dst->sin_addr.s_addr) {
198 /* cache route doesn't match */
199 dst->sin_family = sin_dst->sin_family;
200 dst->sin_len = sizeof(struct sockaddr_in);
201 dst->sin_addr = sin_dst->sin_addr;
202 if (sc->gif_ro.ro_rt) {
203 RTFREE(sc->gif_ro.ro_rt);
204 sc->gif_ro.ro_rt = NULL;
205 }
206 #if 0
207 sc->gif_if.if_mtu = GIF_MTU;
208 #endif
209 }
210
211 if (sc->gif_ro.ro_rt == NULL) {
212 rtalloc(&sc->gif_ro);
213 if (sc->gif_ro.ro_rt == NULL) {
214 m_freem(m);
215 return ENETUNREACH;
216 }
217
218 /* if it constitutes infinite encapsulation, punt. */
219 if (sc->gif_ro.ro_rt->rt_ifp == ifp) {
220 m_freem(m);
221 return ENETUNREACH; /*XXX*/
222 }
223 #if 0
224 ifp->if_mtu = sc->gif_ro.ro_rt->rt_ifp->if_mtu
225 - sizeof(struct ip);
226 #endif
227 }
228
229 error = ip_output(m, NULL, &sc->gif_ro, 0, NULL);
230 return(error);
231 }
232
233 void
234 #if __STDC__
235 in_gif_input(struct mbuf *m, ...)
236 #else
237 in_gif_input(m, va_alist)
238 struct mbuf *m;
239 va_dcl
240 #endif
241 {
242 int off, proto;
243 struct ifnet *gifp = NULL;
244 struct ip *ip;
245 va_list ap;
246 int af;
247 u_int8_t otos;
248
249 va_start(ap, m);
250 off = va_arg(ap, int);
251 proto = va_arg(ap, int);
252 va_end(ap);
253
254 ip = mtod(m, struct ip *);
255
256 gifp = (struct ifnet *)encap_getarg(m);
257
258 if (gifp == NULL || (gifp->if_flags & IFF_UP) == 0) {
259 m_freem(m);
260 ipstat.ips_nogif++;
261 return;
262 }
263
264 otos = ip->ip_tos;
265 m_adj(m, off);
266
267 switch (proto) {
268 #ifdef INET
269 case IPPROTO_IPV4:
270 {
271 struct ip *ip;
272 af = AF_INET;
273 if (m->m_len < sizeof(*ip)) {
274 m = m_pullup(m, sizeof(*ip));
275 if (!m)
276 return;
277 }
278 ip = mtod(m, struct ip *);
279 if (gifp->if_flags & IFF_LINK1)
280 ip_ecn_egress(ECN_ALLOWED, &otos, &ip->ip_tos);
281 else
282 ip_ecn_egress(ECN_NOCARE, &otos, &ip->ip_tos);
283 break;
284 }
285 #endif
286 #ifdef INET6
287 case IPPROTO_IPV6:
288 {
289 struct ip6_hdr *ip6;
290 u_int8_t itos;
291 af = AF_INET6;
292 if (m->m_len < sizeof(*ip6)) {
293 m = m_pullup(m, sizeof(*ip6));
294 if (!m)
295 return;
296 }
297 ip6 = mtod(m, struct ip6_hdr *);
298 itos = (ntohl(ip6->ip6_flow) >> 20) & 0xff;
299 if (gifp->if_flags & IFF_LINK1)
300 ip_ecn_egress(ECN_ALLOWED, &otos, &itos);
301 else
302 ip_ecn_egress(ECN_NOCARE, &otos, &itos);
303 ip6->ip6_flow &= ~htonl(0xff << 20);
304 ip6->ip6_flow |= htonl((u_int32_t)itos << 20);
305 break;
306 }
307 #endif /* INET6 */
308 #ifdef ISO
309 case IPPROTO_EON:
310 af = AF_ISO;
311 break;
312 #endif
313 default:
314 ipstat.ips_nogif++;
315 m_freem(m);
316 return;
317 }
318 gif_input(m, af, gifp);
319 return;
320 }
321
322 /*
323 * we know that we are in IFF_UP, outer address available, and outer family
324 * matched the physical addr family. see gif_encapcheck().
325 */
326 int
327 gif_encapcheck4(m, off, proto, arg)
328 const struct mbuf *m;
329 int off;
330 int proto;
331 void *arg;
332 {
333 struct ip ip;
334 struct gif_softc *sc;
335 struct sockaddr_in *src, *dst;
336 int addrmatch;
337 struct in_ifaddr *ia4;
338
339 /* sanity check done in caller */
340 sc = (struct gif_softc *)arg;
341 src = (struct sockaddr_in *)sc->gif_psrc;
342 dst = (struct sockaddr_in *)sc->gif_pdst;
343
344 /* LINTED const cast */
345 m_copydata((struct mbuf *)m, 0, sizeof(ip), (caddr_t)&ip);
346
347 /* check for address match */
348 addrmatch = 0;
349 if (src->sin_addr.s_addr == ip.ip_dst.s_addr)
350 addrmatch |= 1;
351 if (dst->sin_addr.s_addr == ip.ip_src.s_addr)
352 addrmatch |= 2;
353 else if ((sc->gif_if.if_flags & IFF_LINK0) != 0 &&
354 dst->sin_addr.s_addr == INADDR_ANY) {
355 addrmatch |= 2; /* we accept any source */
356 }
357 if (addrmatch != 3)
358 return 0;
359
360 /* martian filters on outer source - NOT done in ip_input! */
361 if (IN_MULTICAST(ip.ip_src.s_addr))
362 return 0;
363 switch ((ntohl(ip.ip_src.s_addr) & 0xff000000) >> 24) {
364 case 0: case 127: case 255:
365 return 0;
366 }
367 /* reject packets with broadcast on source */
368 for (ia4 = in_ifaddr.tqh_first; ia4; ia4 = ia4->ia_list.tqe_next)
369 {
370 if ((ia4->ia_ifa.ifa_ifp->if_flags & IFF_BROADCAST) == 0)
371 continue;
372 if (ip.ip_src.s_addr == ia4->ia_broadaddr.sin_addr.s_addr)
373 return 0;
374 }
375
376 /* ingress filters on outer source */
377 if ((sc->gif_if.if_flags & IFF_LINK2) == 0 &&
378 (m->m_flags & M_PKTHDR) != 0 && m->m_pkthdr.rcvif) {
379 struct sockaddr_in sin;
380 struct rtentry *rt;
381
382 bzero(&sin, sizeof(sin));
383 sin.sin_family = AF_INET;
384 sin.sin_len = sizeof(struct sockaddr_in);
385 sin.sin_addr = ip.ip_src;
386 rt = rtalloc1((struct sockaddr *)&sin, 0);
387 if (!rt || rt->rt_ifp != m->m_pkthdr.rcvif) {
388 #if 0
389 log(LOG_WARNING, "%s: packet from 0x%x dropped "
390 "due to ingress filter\n", if_name(&sc->gif_if),
391 (u_int32_t)ntohl(sin.sin_addr.s_addr));
392 #endif
393 if (rt)
394 rtfree(rt);
395 return 0;
396 }
397 rtfree(rt);
398 }
399
400 /* prioritize: IFF_LINK0 mode is less preferred */
401 return (sc->gif_if.if_flags & IFF_LINK0) ? 32 : 32 * 2;
402 }
403