xref: /freebsd/sys/net/if_gif.c (revision 88ff5695c1e53c3398142ea10e3f041ff4b5a03f)
1686cdd19SJun-ichiro itojun Hagino /*	$FreeBSD$	*/
288ff5695SSUZUKI Shinsuke /*	$KAME: if_gif.c,v 1.87 2001/10/19 08:50:27 itojun Exp $	*/
3686cdd19SJun-ichiro itojun Hagino 
4cfa1ca9dSYoshinobu Inoue /*
5cfa1ca9dSYoshinobu Inoue  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
6cfa1ca9dSYoshinobu Inoue  * All rights reserved.
7cfa1ca9dSYoshinobu Inoue  *
8cfa1ca9dSYoshinobu Inoue  * Redistribution and use in source and binary forms, with or without
9cfa1ca9dSYoshinobu Inoue  * modification, are permitted provided that the following conditions
10cfa1ca9dSYoshinobu Inoue  * are met:
11cfa1ca9dSYoshinobu Inoue  * 1. Redistributions of source code must retain the above copyright
12cfa1ca9dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer.
13cfa1ca9dSYoshinobu Inoue  * 2. Redistributions in binary form must reproduce the above copyright
14cfa1ca9dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer in the
15cfa1ca9dSYoshinobu Inoue  *    documentation and/or other materials provided with the distribution.
16cfa1ca9dSYoshinobu Inoue  * 3. Neither the name of the project nor the names of its contributors
17cfa1ca9dSYoshinobu Inoue  *    may be used to endorse or promote products derived from this software
18cfa1ca9dSYoshinobu Inoue  *    without specific prior written permission.
19cfa1ca9dSYoshinobu Inoue  *
20cfa1ca9dSYoshinobu Inoue  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
21cfa1ca9dSYoshinobu Inoue  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22cfa1ca9dSYoshinobu Inoue  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23cfa1ca9dSYoshinobu Inoue  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
24cfa1ca9dSYoshinobu Inoue  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25cfa1ca9dSYoshinobu Inoue  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26cfa1ca9dSYoshinobu Inoue  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27cfa1ca9dSYoshinobu Inoue  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28cfa1ca9dSYoshinobu Inoue  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29cfa1ca9dSYoshinobu Inoue  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30cfa1ca9dSYoshinobu Inoue  * SUCH DAMAGE.
31cfa1ca9dSYoshinobu Inoue  */
32cfa1ca9dSYoshinobu Inoue 
33cfa1ca9dSYoshinobu Inoue #include "opt_inet.h"
34cfa1ca9dSYoshinobu Inoue #include "opt_inet6.h"
35cfa1ca9dSYoshinobu Inoue 
36cfa1ca9dSYoshinobu Inoue #include <sys/param.h>
37cfa1ca9dSYoshinobu Inoue #include <sys/systm.h>
38cfa1ca9dSYoshinobu Inoue #include <sys/kernel.h>
39cfa1ca9dSYoshinobu Inoue #include <sys/malloc.h>
40cfa1ca9dSYoshinobu Inoue #include <sys/mbuf.h>
41cfa1ca9dSYoshinobu Inoue #include <sys/socket.h>
42cfa1ca9dSYoshinobu Inoue #include <sys/sockio.h>
43cfa1ca9dSYoshinobu Inoue #include <sys/errno.h>
44cfa1ca9dSYoshinobu Inoue #include <sys/time.h>
45872f786aSBrooks Davis #include <sys/sysctl.h>
46cfa1ca9dSYoshinobu Inoue #include <sys/syslog.h>
47686cdd19SJun-ichiro itojun Hagino #include <sys/protosw.h>
4853dab5feSBrooks Davis #include <sys/conf.h>
49cfa1ca9dSYoshinobu Inoue #include <machine/cpu.h>
50cfa1ca9dSYoshinobu Inoue 
51cfa1ca9dSYoshinobu Inoue #include <net/if.h>
52cfa1ca9dSYoshinobu Inoue #include <net/if_types.h>
53cfa1ca9dSYoshinobu Inoue #include <net/netisr.h>
54cfa1ca9dSYoshinobu Inoue #include <net/route.h>
55cfa1ca9dSYoshinobu Inoue #include <net/bpf.h>
56cfa1ca9dSYoshinobu Inoue 
57cfa1ca9dSYoshinobu Inoue #include <netinet/in.h>
58cfa1ca9dSYoshinobu Inoue #include <netinet/in_systm.h>
59cfa1ca9dSYoshinobu Inoue #include <netinet/ip.h>
6033841545SHajimu UMEMOTO #ifdef	INET
6133841545SHajimu UMEMOTO #include <netinet/in_var.h>
62cfa1ca9dSYoshinobu Inoue #include <netinet/in_gif.h>
6353dab5feSBrooks Davis #include <netinet/ip_var.h>
64cfa1ca9dSYoshinobu Inoue #endif	/* INET */
65cfa1ca9dSYoshinobu Inoue 
66cfa1ca9dSYoshinobu Inoue #ifdef INET6
67cfa1ca9dSYoshinobu Inoue #ifndef INET
68cfa1ca9dSYoshinobu Inoue #include <netinet/in.h>
69cfa1ca9dSYoshinobu Inoue #endif
70cfa1ca9dSYoshinobu Inoue #include <netinet6/in6_var.h>
71cfa1ca9dSYoshinobu Inoue #include <netinet/ip6.h>
72cfa1ca9dSYoshinobu Inoue #include <netinet6/ip6_var.h>
73cfa1ca9dSYoshinobu Inoue #include <netinet6/in6_gif.h>
74686cdd19SJun-ichiro itojun Hagino #include <netinet6/ip6protosw.h>
75cfa1ca9dSYoshinobu Inoue #endif /* INET6 */
76cfa1ca9dSYoshinobu Inoue 
77686cdd19SJun-ichiro itojun Hagino #include <netinet/ip_encap.h>
78cfa1ca9dSYoshinobu Inoue #include <net/if_gif.h>
79cfa1ca9dSYoshinobu Inoue 
80cfa1ca9dSYoshinobu Inoue #include <net/net_osdep.h>
81cfa1ca9dSYoshinobu Inoue 
8253dab5feSBrooks Davis #define GIFNAME		"gif"
83686cdd19SJun-ichiro itojun Hagino 
8453dab5feSBrooks Davis static MALLOC_DEFINE(M_GIF, "gif", "Generic Tunnel Interface");
85e8783c4dSMike Smith static LIST_HEAD(, gif_softc) gif_softc_list;
8653dab5feSBrooks Davis 
8794408d94SBrooks Davis void	(*ng_gif_input_p)(struct ifnet *ifp, struct mbuf **mp, int af);
8894408d94SBrooks Davis void	(*ng_gif_input_orphan_p)(struct ifnet *ifp, struct mbuf *m, int af);
8994408d94SBrooks Davis void	(*ng_gif_attach_p)(struct ifnet *ifp);
9094408d94SBrooks Davis void	(*ng_gif_detach_p)(struct ifnet *ifp);
9194408d94SBrooks Davis 
92929ddbbbSAlfred Perlstein int	gif_clone_create(struct if_clone *, int);
93929ddbbbSAlfred Perlstein int	gif_clone_destroy(struct ifnet *);
9453dab5feSBrooks Davis 
953b16e7b2SMaxime Henrion struct if_clone gif_cloner = IF_CLONE_INITIALIZER("gif",
963b16e7b2SMaxime Henrion     gif_clone_create, gif_clone_destroy, IF_MAXUNIT);
9753dab5feSBrooks Davis 
98929ddbbbSAlfred Perlstein static int gifmodevent(module_t, int, void *);
99929ddbbbSAlfred Perlstein void gif_delete_tunnel(struct gif_softc *);
100929ddbbbSAlfred Perlstein static int gif_encapcheck(const struct mbuf *, int, int, void *);
10153dab5feSBrooks Davis 
102686cdd19SJun-ichiro itojun Hagino #ifdef INET
10353dab5feSBrooks Davis extern  struct domain inetdomain;
104f0ffb944SJulian Elischer struct protosw in_gif_protosw =
10553dab5feSBrooks Davis { SOCK_RAW,	&inetdomain,	0/*IPPROTO_IPV[46]*/,	PR_ATOMIC|PR_ADDR,
1066f4ded3aSBrooks Davis   in_gif_input,	(pr_output_t*)rip_output, 0,		rip_ctloutput,
10753dab5feSBrooks Davis   0,
10853dab5feSBrooks Davis   0,		0,		0,		0,
10953dab5feSBrooks Davis   &rip_usrreqs
11053dab5feSBrooks Davis };
111686cdd19SJun-ichiro itojun Hagino #endif
112686cdd19SJun-ichiro itojun Hagino #ifdef INET6
1136f4ded3aSBrooks Davis extern  struct domain inet6domain;
11453dab5feSBrooks Davis struct ip6protosw in6_gif_protosw =
11553dab5feSBrooks Davis { SOCK_RAW,	&inet6domain,	0/*IPPROTO_IPV[46]*/,	PR_ATOMIC|PR_ADDR,
11653dab5feSBrooks Davis   in6_gif_input, rip6_output,	0,		rip6_ctloutput,
11753dab5feSBrooks Davis   0,
11853dab5feSBrooks Davis   0,		0,		0,		0,
11953dab5feSBrooks Davis   &rip6_usrreqs
12053dab5feSBrooks Davis };
121686cdd19SJun-ichiro itojun Hagino #endif
122cfa1ca9dSYoshinobu Inoue 
123872f786aSBrooks Davis SYSCTL_DECL(_net_link);
124872f786aSBrooks Davis SYSCTL_NODE(_net_link, IFT_GIF, gif, CTLFLAG_RW, 0,
125872f786aSBrooks Davis     "Generic Tunnel Interface");
126686cdd19SJun-ichiro itojun Hagino #ifndef MAX_GIF_NEST
127686cdd19SJun-ichiro itojun Hagino /*
128872f786aSBrooks Davis  * This macro controls the default upper limitation on nesting of gif tunnels.
129686cdd19SJun-ichiro itojun Hagino  * Since, setting a large value to this macro with a careless configuration
130686cdd19SJun-ichiro itojun Hagino  * may introduce system crash, we don't allow any nestings by default.
131686cdd19SJun-ichiro itojun Hagino  * If you need to configure nested gif tunnels, you can define this macro
132686cdd19SJun-ichiro itojun Hagino  * in your kernel configuration file.  However, if you do so, please be
133686cdd19SJun-ichiro itojun Hagino  * careful to configure the tunnels so that it won't make a loop.
134686cdd19SJun-ichiro itojun Hagino  */
135686cdd19SJun-ichiro itojun Hagino #define MAX_GIF_NEST 1
136686cdd19SJun-ichiro itojun Hagino #endif
137686cdd19SJun-ichiro itojun Hagino static int max_gif_nesting = MAX_GIF_NEST;
138872f786aSBrooks Davis SYSCTL_INT(_net_link_gif, OID_AUTO, max_nesting, CTLFLAG_RW,
139872f786aSBrooks Davis     &max_gif_nesting, 0, "Max nested tunnels");
140872f786aSBrooks Davis 
141872f786aSBrooks Davis /*
142872f786aSBrooks Davis  * By default, we disallow creation of multiple tunnels between the same
143872f786aSBrooks Davis  * pair of addresses.  Some applications require this functionality so
144872f786aSBrooks Davis  * we allow control over this check here.
145872f786aSBrooks Davis  */
146872f786aSBrooks Davis #ifdef XBONEHACK
147872f786aSBrooks Davis static int parallel_tunnels = 1;
148872f786aSBrooks Davis #else
149872f786aSBrooks Davis static int parallel_tunnels = 0;
150872f786aSBrooks Davis #endif
151872f786aSBrooks Davis SYSCTL_INT(_net_link_gif, OID_AUTO, parallel_tunnels, CTLFLAG_RW,
152872f786aSBrooks Davis     &parallel_tunnels, 0, "Allow parallel tunnels?");
153cfa1ca9dSYoshinobu Inoue 
15453dab5feSBrooks Davis int
15553dab5feSBrooks Davis gif_clone_create(ifc, unit)
15653dab5feSBrooks Davis 	struct if_clone *ifc;
1573b16e7b2SMaxime Henrion 	int unit;
158cfa1ca9dSYoshinobu Inoue {
15933841545SHajimu UMEMOTO 	struct gif_softc *sc;
160cfa1ca9dSYoshinobu Inoue 
16153dab5feSBrooks Davis 	sc = malloc (sizeof(struct gif_softc), M_GIF, M_WAITOK);
16253dab5feSBrooks Davis 	bzero(sc, sizeof(struct gif_softc));
16353dab5feSBrooks Davis 
16453dab5feSBrooks Davis 	sc->gif_if.if_softc = sc;
16553dab5feSBrooks Davis 	sc->gif_if.if_name = GIFNAME;
1663b16e7b2SMaxime Henrion 	sc->gif_if.if_unit = unit;
167686cdd19SJun-ichiro itojun Hagino 
168686cdd19SJun-ichiro itojun Hagino 	sc->encap_cookie4 = sc->encap_cookie6 = NULL;
169686cdd19SJun-ichiro itojun Hagino #ifdef INET
170686cdd19SJun-ichiro itojun Hagino 	sc->encap_cookie4 = encap_attach_func(AF_INET, -1,
17153dab5feSBrooks Davis 	    gif_encapcheck, (struct protosw*)&in_gif_protosw, sc);
172686cdd19SJun-ichiro itojun Hagino 	if (sc->encap_cookie4 == NULL) {
17353dab5feSBrooks Davis 		printf("%s: unable to attach encap4\n", if_name(&sc->gif_if));
17453dab5feSBrooks Davis 		free(sc, M_GIF);
17553dab5feSBrooks Davis 		return (EIO);	/* XXX */
176686cdd19SJun-ichiro itojun Hagino 	}
177686cdd19SJun-ichiro itojun Hagino #endif
178686cdd19SJun-ichiro itojun Hagino #ifdef INET6
179686cdd19SJun-ichiro itojun Hagino 	sc->encap_cookie6 = encap_attach_func(AF_INET6, -1,
180686cdd19SJun-ichiro itojun Hagino 	    gif_encapcheck, (struct protosw *)&in6_gif_protosw, sc);
181686cdd19SJun-ichiro itojun Hagino 	if (sc->encap_cookie6 == NULL) {
182686cdd19SJun-ichiro itojun Hagino 		if (sc->encap_cookie4) {
183686cdd19SJun-ichiro itojun Hagino 			encap_detach(sc->encap_cookie4);
184686cdd19SJun-ichiro itojun Hagino 			sc->encap_cookie4 = NULL;
185686cdd19SJun-ichiro itojun Hagino 		}
18653dab5feSBrooks Davis 		printf("%s: unable to attach encap6\n", if_name(&sc->gif_if));
18753dab5feSBrooks Davis 		free(sc, M_GIF);
18853dab5feSBrooks Davis 		return (EIO);	/* XXX */
189686cdd19SJun-ichiro itojun Hagino 	}
190686cdd19SJun-ichiro itojun Hagino #endif
191686cdd19SJun-ichiro itojun Hagino 
192cfa1ca9dSYoshinobu Inoue 	sc->gif_if.if_mtu    = GIF_MTU;
193cfa1ca9dSYoshinobu Inoue 	sc->gif_if.if_flags  = IFF_POINTOPOINT | IFF_MULTICAST;
19433841545SHajimu UMEMOTO #if 0
19533841545SHajimu UMEMOTO 	/* turn off ingress filter */
19633841545SHajimu UMEMOTO 	sc->gif_if.if_flags  |= IFF_LINK2;
19733841545SHajimu UMEMOTO #endif
198cfa1ca9dSYoshinobu Inoue 	sc->gif_if.if_ioctl  = gif_ioctl;
199cfa1ca9dSYoshinobu Inoue 	sc->gif_if.if_output = gif_output;
200cfa1ca9dSYoshinobu Inoue 	sc->gif_if.if_type   = IFT_GIF;
201686cdd19SJun-ichiro itojun Hagino 	sc->gif_if.if_snd.ifq_maxlen = IFQ_MAXLEN;
202cfa1ca9dSYoshinobu Inoue 	if_attach(&sc->gif_if);
203cfa1ca9dSYoshinobu Inoue 	bpfattach(&sc->gif_if, DLT_NULL, sizeof(u_int));
20494408d94SBrooks Davis 	if (ng_gif_attach_p != NULL)
20594408d94SBrooks Davis 		(*ng_gif_attach_p)(&sc->gif_if);
20620af0ffaSBrooks Davis 	LIST_INSERT_HEAD(&gif_softc_list, sc, gif_link);
20753dab5feSBrooks Davis 	return (0);
208cfa1ca9dSYoshinobu Inoue }
209cfa1ca9dSYoshinobu Inoue 
210b75496feSBrooks Davis int
21153dab5feSBrooks Davis gif_clone_destroy(ifp)
21253dab5feSBrooks Davis 	struct ifnet *ifp;
21353dab5feSBrooks Davis {
21453dab5feSBrooks Davis 	int err;
21553dab5feSBrooks Davis 	struct gif_softc *sc = ifp->if_softc;
21653dab5feSBrooks Davis 
21753dab5feSBrooks Davis 	gif_delete_tunnel(sc);
21820af0ffaSBrooks Davis 	LIST_REMOVE(sc, gif_link);
21953dab5feSBrooks Davis 	if (sc->encap_cookie4 != NULL) {
22053dab5feSBrooks Davis 		err = encap_detach(sc->encap_cookie4);
22153dab5feSBrooks Davis 		KASSERT(err == 0, ("Unexpected error detaching encap_cookie4"));
22253dab5feSBrooks Davis 	}
22353dab5feSBrooks Davis 	if (sc->encap_cookie6 != NULL) {
22453dab5feSBrooks Davis 		err = encap_detach(sc->encap_cookie6);
22553dab5feSBrooks Davis 		KASSERT(err == 0, ("Unexpected error detaching encap_cookie6"));
22653dab5feSBrooks Davis 	}
22753dab5feSBrooks Davis 
22894408d94SBrooks Davis 	if (ng_gif_detach_p != NULL)
22994408d94SBrooks Davis 		(*ng_gif_detach_p)(ifp);
23053dab5feSBrooks Davis 	bpfdetach(ifp);
23153dab5feSBrooks Davis 	if_detach(ifp);
23253dab5feSBrooks Davis 
23353dab5feSBrooks Davis 	free(sc, M_GIF);
234b75496feSBrooks Davis 	return (0);
23553dab5feSBrooks Davis }
23653dab5feSBrooks Davis 
23753dab5feSBrooks Davis static int
23853dab5feSBrooks Davis gifmodevent(mod, type, data)
23953dab5feSBrooks Davis 	module_t mod;
24053dab5feSBrooks Davis 	int type;
24153dab5feSBrooks Davis 	void *data;
24253dab5feSBrooks Davis {
24353dab5feSBrooks Davis 
24453dab5feSBrooks Davis 	switch (type) {
24553dab5feSBrooks Davis 	case MOD_LOAD:
24620af0ffaSBrooks Davis 		LIST_INIT(&gif_softc_list);
24753dab5feSBrooks Davis 		if_clone_attach(&gif_cloner);
24853dab5feSBrooks Davis 
24953dab5feSBrooks Davis #ifdef INET6
25053dab5feSBrooks Davis 		ip6_gif_hlim = GIF_HLIM;
25153dab5feSBrooks Davis #endif
25253dab5feSBrooks Davis 
25353dab5feSBrooks Davis 		break;
25453dab5feSBrooks Davis 	case MOD_UNLOAD:
25553dab5feSBrooks Davis 		if_clone_detach(&gif_cloner);
25653dab5feSBrooks Davis 
25720af0ffaSBrooks Davis 		while (!LIST_EMPTY(&gif_softc_list))
25820af0ffaSBrooks Davis 			gif_clone_destroy(&LIST_FIRST(&gif_softc_list)->gif_if);
25953dab5feSBrooks Davis 
26053dab5feSBrooks Davis #ifdef INET6
26153dab5feSBrooks Davis 		ip6_gif_hlim = 0;
26253dab5feSBrooks Davis #endif
26353dab5feSBrooks Davis 		break;
26453dab5feSBrooks Davis 	}
26553dab5feSBrooks Davis 	return 0;
26653dab5feSBrooks Davis }
26753dab5feSBrooks Davis 
26853dab5feSBrooks Davis static moduledata_t gif_mod = {
26953dab5feSBrooks Davis 	"if_gif",
27053dab5feSBrooks Davis 	gifmodevent,
27153dab5feSBrooks Davis 	0
27253dab5feSBrooks Davis };
27353dab5feSBrooks Davis 
27453dab5feSBrooks Davis DECLARE_MODULE(if_gif, gif_mod, SI_SUB_PSEUDO, SI_ORDER_ANY);
27520af0ffaSBrooks Davis MODULE_VERSION(if_gif, 1);
276cfa1ca9dSYoshinobu Inoue 
277686cdd19SJun-ichiro itojun Hagino static int
278686cdd19SJun-ichiro itojun Hagino gif_encapcheck(m, off, proto, arg)
279686cdd19SJun-ichiro itojun Hagino 	const struct mbuf *m;
280686cdd19SJun-ichiro itojun Hagino 	int off;
281686cdd19SJun-ichiro itojun Hagino 	int proto;
282686cdd19SJun-ichiro itojun Hagino 	void *arg;
283686cdd19SJun-ichiro itojun Hagino {
284686cdd19SJun-ichiro itojun Hagino 	struct ip ip;
285686cdd19SJun-ichiro itojun Hagino 	struct gif_softc *sc;
286686cdd19SJun-ichiro itojun Hagino 
287686cdd19SJun-ichiro itojun Hagino 	sc = (struct gif_softc *)arg;
288686cdd19SJun-ichiro itojun Hagino 	if (sc == NULL)
289686cdd19SJun-ichiro itojun Hagino 		return 0;
290686cdd19SJun-ichiro itojun Hagino 
291686cdd19SJun-ichiro itojun Hagino 	if ((sc->gif_if.if_flags & IFF_UP) == 0)
292686cdd19SJun-ichiro itojun Hagino 		return 0;
293686cdd19SJun-ichiro itojun Hagino 
294686cdd19SJun-ichiro itojun Hagino 	/* no physical address */
295686cdd19SJun-ichiro itojun Hagino 	if (!sc->gif_psrc || !sc->gif_pdst)
296686cdd19SJun-ichiro itojun Hagino 		return 0;
297686cdd19SJun-ichiro itojun Hagino 
298686cdd19SJun-ichiro itojun Hagino 	switch (proto) {
299686cdd19SJun-ichiro itojun Hagino #ifdef INET
300686cdd19SJun-ichiro itojun Hagino 	case IPPROTO_IPV4:
301686cdd19SJun-ichiro itojun Hagino 		break;
302686cdd19SJun-ichiro itojun Hagino #endif
303686cdd19SJun-ichiro itojun Hagino #ifdef INET6
304686cdd19SJun-ichiro itojun Hagino 	case IPPROTO_IPV6:
305686cdd19SJun-ichiro itojun Hagino 		break;
306686cdd19SJun-ichiro itojun Hagino #endif
307686cdd19SJun-ichiro itojun Hagino 	default:
308686cdd19SJun-ichiro itojun Hagino 		return 0;
309686cdd19SJun-ichiro itojun Hagino 	}
310686cdd19SJun-ichiro itojun Hagino 
3116f4ded3aSBrooks Davis 	m_copydata(m, 0, sizeof(ip), (caddr_t)&ip);
312686cdd19SJun-ichiro itojun Hagino 
313686cdd19SJun-ichiro itojun Hagino 	switch (ip.ip_v) {
314686cdd19SJun-ichiro itojun Hagino #ifdef INET
315686cdd19SJun-ichiro itojun Hagino 	case 4:
316686cdd19SJun-ichiro itojun Hagino 		if (sc->gif_psrc->sa_family != AF_INET ||
317686cdd19SJun-ichiro itojun Hagino 		    sc->gif_pdst->sa_family != AF_INET)
318686cdd19SJun-ichiro itojun Hagino 			return 0;
319686cdd19SJun-ichiro itojun Hagino 		return gif_encapcheck4(m, off, proto, arg);
320686cdd19SJun-ichiro itojun Hagino #endif
321686cdd19SJun-ichiro itojun Hagino #ifdef INET6
322686cdd19SJun-ichiro itojun Hagino 	case 6:
323686cdd19SJun-ichiro itojun Hagino 		if (sc->gif_psrc->sa_family != AF_INET6 ||
324686cdd19SJun-ichiro itojun Hagino 		    sc->gif_pdst->sa_family != AF_INET6)
325686cdd19SJun-ichiro itojun Hagino 			return 0;
326686cdd19SJun-ichiro itojun Hagino 		return gif_encapcheck6(m, off, proto, arg);
327686cdd19SJun-ichiro itojun Hagino #endif
328686cdd19SJun-ichiro itojun Hagino 	default:
329686cdd19SJun-ichiro itojun Hagino 		return 0;
330686cdd19SJun-ichiro itojun Hagino 	}
331686cdd19SJun-ichiro itojun Hagino }
332686cdd19SJun-ichiro itojun Hagino 
333cfa1ca9dSYoshinobu Inoue int
334cfa1ca9dSYoshinobu Inoue gif_output(ifp, m, dst, rt)
335cfa1ca9dSYoshinobu Inoue 	struct ifnet *ifp;
336cfa1ca9dSYoshinobu Inoue 	struct mbuf *m;
337cfa1ca9dSYoshinobu Inoue 	struct sockaddr *dst;
338cfa1ca9dSYoshinobu Inoue 	struct rtentry *rt;	/* added in net2 */
339cfa1ca9dSYoshinobu Inoue {
34033841545SHajimu UMEMOTO 	struct gif_softc *sc = (struct gif_softc*)ifp;
341cfa1ca9dSYoshinobu Inoue 	int error = 0;
342cfa1ca9dSYoshinobu Inoue 	static int called = 0;	/* XXX: MUTEX */
343cfa1ca9dSYoshinobu Inoue 
344cfa1ca9dSYoshinobu Inoue 	/*
345cfa1ca9dSYoshinobu Inoue 	 * gif may cause infinite recursion calls when misconfigured.
346cfa1ca9dSYoshinobu Inoue 	 * We'll prevent this by introducing upper limit.
347cfa1ca9dSYoshinobu Inoue 	 * XXX: this mechanism may introduce another problem about
348cfa1ca9dSYoshinobu Inoue 	 *      mutual exclusion of the variable CALLED, especially if we
349cfa1ca9dSYoshinobu Inoue 	 *      use kernel thread.
350cfa1ca9dSYoshinobu Inoue 	 */
351686cdd19SJun-ichiro itojun Hagino 	if (++called > max_gif_nesting) {
352cfa1ca9dSYoshinobu Inoue 		log(LOG_NOTICE,
353cfa1ca9dSYoshinobu Inoue 		    "gif_output: recursively called too many times(%d)\n",
354cfa1ca9dSYoshinobu Inoue 		    called);
355cfa1ca9dSYoshinobu Inoue 		m_freem(m);
356cfa1ca9dSYoshinobu Inoue 		error = EIO;	/* is there better errno? */
357cfa1ca9dSYoshinobu Inoue 		goto end;
358cfa1ca9dSYoshinobu Inoue 	}
359686cdd19SJun-ichiro itojun Hagino 
360cfa1ca9dSYoshinobu Inoue 	m->m_flags &= ~(M_BCAST|M_MCAST);
361cfa1ca9dSYoshinobu Inoue 	if (!(ifp->if_flags & IFF_UP) ||
362cfa1ca9dSYoshinobu Inoue 	    sc->gif_psrc == NULL || sc->gif_pdst == NULL) {
363cfa1ca9dSYoshinobu Inoue 		m_freem(m);
364cfa1ca9dSYoshinobu Inoue 		error = ENETDOWN;
365cfa1ca9dSYoshinobu Inoue 		goto end;
366cfa1ca9dSYoshinobu Inoue 	}
367cfa1ca9dSYoshinobu Inoue 
368cfa1ca9dSYoshinobu Inoue 	if (ifp->if_bpf) {
369cfa1ca9dSYoshinobu Inoue 		/*
370cfa1ca9dSYoshinobu Inoue 		 * We need to prepend the address family as
371cfa1ca9dSYoshinobu Inoue 		 * a four byte field.  Cons up a dummy header
372cfa1ca9dSYoshinobu Inoue 		 * to pacify bpf.  This is safe because bpf
373cfa1ca9dSYoshinobu Inoue 		 * will only read from the mbuf (i.e., it won't
374cfa1ca9dSYoshinobu Inoue 		 * try to free it or keep a pointer a to it).
375cfa1ca9dSYoshinobu Inoue 		 */
376cfa1ca9dSYoshinobu Inoue 		struct mbuf m0;
37733841545SHajimu UMEMOTO 		u_int32_t af = dst->sa_family;
378cfa1ca9dSYoshinobu Inoue 
379cfa1ca9dSYoshinobu Inoue 		m0.m_next = m;
380cfa1ca9dSYoshinobu Inoue 		m0.m_len = 4;
381cfa1ca9dSYoshinobu Inoue 		m0.m_data = (char *)&af;
382cfa1ca9dSYoshinobu Inoue 
383cfa1ca9dSYoshinobu Inoue 		bpf_mtap(ifp, &m0);
384cfa1ca9dSYoshinobu Inoue 	}
385cfa1ca9dSYoshinobu Inoue 	ifp->if_opackets++;
386cfa1ca9dSYoshinobu Inoue 	ifp->if_obytes += m->m_pkthdr.len;
387cfa1ca9dSYoshinobu Inoue 
38833841545SHajimu UMEMOTO 	/* inner AF-specific encapsulation */
38933841545SHajimu UMEMOTO 
390686cdd19SJun-ichiro itojun Hagino 	/* XXX should we check if our outer source is legal? */
391686cdd19SJun-ichiro itojun Hagino 
39233841545SHajimu UMEMOTO 	/* dispatch to output logic based on outer AF */
393cfa1ca9dSYoshinobu Inoue 	switch (sc->gif_psrc->sa_family) {
394cfa1ca9dSYoshinobu Inoue #ifdef INET
395cfa1ca9dSYoshinobu Inoue 	case AF_INET:
396cfa1ca9dSYoshinobu Inoue 		error = in_gif_output(ifp, dst->sa_family, m, rt);
397cfa1ca9dSYoshinobu Inoue 		break;
398cfa1ca9dSYoshinobu Inoue #endif
399cfa1ca9dSYoshinobu Inoue #ifdef INET6
400cfa1ca9dSYoshinobu Inoue 	case AF_INET6:
401cfa1ca9dSYoshinobu Inoue 		error = in6_gif_output(ifp, dst->sa_family, m, rt);
402cfa1ca9dSYoshinobu Inoue 		break;
403cfa1ca9dSYoshinobu Inoue #endif
404cfa1ca9dSYoshinobu Inoue 	default:
405cfa1ca9dSYoshinobu Inoue 		m_freem(m);
406cfa1ca9dSYoshinobu Inoue 		error = ENETDOWN;
40733841545SHajimu UMEMOTO 		goto end;
408cfa1ca9dSYoshinobu Inoue 	}
409cfa1ca9dSYoshinobu Inoue 
410cfa1ca9dSYoshinobu Inoue   end:
411cfa1ca9dSYoshinobu Inoue 	called = 0;		/* reset recursion counter */
41233841545SHajimu UMEMOTO 	if (error)
41333841545SHajimu UMEMOTO 		ifp->if_oerrors++;
414cfa1ca9dSYoshinobu Inoue 	return error;
415cfa1ca9dSYoshinobu Inoue }
416cfa1ca9dSYoshinobu Inoue 
417cfa1ca9dSYoshinobu Inoue void
418cfa1ca9dSYoshinobu Inoue gif_input(m, af, gifp)
419cfa1ca9dSYoshinobu Inoue 	struct mbuf *m;
420cfa1ca9dSYoshinobu Inoue 	int af;
421cfa1ca9dSYoshinobu Inoue 	struct ifnet *gifp;
422cfa1ca9dSYoshinobu Inoue {
423df5e1987SJonathan Lemon 	int isr;
42433841545SHajimu UMEMOTO 	struct ifqueue *ifq = 0;
425cfa1ca9dSYoshinobu Inoue 
426cfa1ca9dSYoshinobu Inoue 	if (gifp == NULL) {
427cfa1ca9dSYoshinobu Inoue 		/* just in case */
428cfa1ca9dSYoshinobu Inoue 		m_freem(m);
429cfa1ca9dSYoshinobu Inoue 		return;
430cfa1ca9dSYoshinobu Inoue 	}
431cfa1ca9dSYoshinobu Inoue 
432cfa1ca9dSYoshinobu Inoue 	m->m_pkthdr.rcvif = gifp;
433cfa1ca9dSYoshinobu Inoue 
434cfa1ca9dSYoshinobu Inoue 	if (gifp->if_bpf) {
435cfa1ca9dSYoshinobu Inoue 		/*
436cfa1ca9dSYoshinobu Inoue 		 * We need to prepend the address family as
437cfa1ca9dSYoshinobu Inoue 		 * a four byte field.  Cons up a dummy header
438cfa1ca9dSYoshinobu Inoue 		 * to pacify bpf.  This is safe because bpf
439cfa1ca9dSYoshinobu Inoue 		 * will only read from the mbuf (i.e., it won't
440cfa1ca9dSYoshinobu Inoue 		 * try to free it or keep a pointer a to it).
441cfa1ca9dSYoshinobu Inoue 		 */
442cfa1ca9dSYoshinobu Inoue 		struct mbuf m0;
44333841545SHajimu UMEMOTO 		u_int32_t af1 = af;
444cfa1ca9dSYoshinobu Inoue 
445cfa1ca9dSYoshinobu Inoue 		m0.m_next = m;
446cfa1ca9dSYoshinobu Inoue 		m0.m_len = 4;
44733841545SHajimu UMEMOTO 		m0.m_data = (char *)&af1;
448cfa1ca9dSYoshinobu Inoue 
449cfa1ca9dSYoshinobu Inoue 		bpf_mtap(gifp, &m0);
450cfa1ca9dSYoshinobu Inoue 	}
451cfa1ca9dSYoshinobu Inoue 
45294408d94SBrooks Davis 	if (ng_gif_input_p != NULL) {
45394408d94SBrooks Davis 		(*ng_gif_input_p)(gifp, &m, af);
45494408d94SBrooks Davis 		if (m == NULL)
45594408d94SBrooks Davis 			return;
45694408d94SBrooks Davis 	}
45794408d94SBrooks Davis 
458cfa1ca9dSYoshinobu Inoue 	/*
459cfa1ca9dSYoshinobu Inoue 	 * Put the packet to the network layer input queue according to the
460cfa1ca9dSYoshinobu Inoue 	 * specified address family.
461cfa1ca9dSYoshinobu Inoue 	 * Note: older versions of gif_input directly called network layer
462cfa1ca9dSYoshinobu Inoue 	 * input functions, e.g. ip6_input, here.  We changed the policy to
463cfa1ca9dSYoshinobu Inoue 	 * prevent too many recursive calls of such input functions, which
464cfa1ca9dSYoshinobu Inoue 	 * might cause kernel panic.  But the change may introduce another
465cfa1ca9dSYoshinobu Inoue 	 * problem; if the input queue is full, packets are discarded.
46688ff5695SSUZUKI Shinsuke 	 * The kernel stack overflow really happened, and we believed
46788ff5695SSUZUKI Shinsuke 	 * queue-full rarely occurs, so we changed the policy.
468cfa1ca9dSYoshinobu Inoue 	 */
469cfa1ca9dSYoshinobu Inoue 	switch (af) {
470cfa1ca9dSYoshinobu Inoue #ifdef INET
471cfa1ca9dSYoshinobu Inoue 	case AF_INET:
472cfa1ca9dSYoshinobu Inoue 		ifq = &ipintrq;
473cfa1ca9dSYoshinobu Inoue 		isr = NETISR_IP;
474cfa1ca9dSYoshinobu Inoue 		break;
475cfa1ca9dSYoshinobu Inoue #endif
476cfa1ca9dSYoshinobu Inoue #ifdef INET6
477cfa1ca9dSYoshinobu Inoue 	case AF_INET6:
478cfa1ca9dSYoshinobu Inoue 		ifq = &ip6intrq;
479cfa1ca9dSYoshinobu Inoue 		isr = NETISR_IPV6;
480cfa1ca9dSYoshinobu Inoue 		break;
481cfa1ca9dSYoshinobu Inoue #endif
482cfa1ca9dSYoshinobu Inoue 	default:
48394408d94SBrooks Davis 		if (ng_gif_input_orphan_p != NULL)
48494408d94SBrooks Davis 			(*ng_gif_input_orphan_p)(gifp, m, af);
48594408d94SBrooks Davis 		else
486cfa1ca9dSYoshinobu Inoue 			m_freem(m);
487cfa1ca9dSYoshinobu Inoue 		return;
488cfa1ca9dSYoshinobu Inoue 	}
489cfa1ca9dSYoshinobu Inoue 
490cfa1ca9dSYoshinobu Inoue 	gifp->if_ipackets++;
491cfa1ca9dSYoshinobu Inoue 	gifp->if_ibytes += m->m_pkthdr.len;
492df5e1987SJonathan Lemon 	(void) IF_HANDOFF(ifq, m, NULL);
493df5e1987SJonathan Lemon 	/* we need schednetisr since the address family may change */
494df5e1987SJonathan Lemon 	schednetisr(isr);
495cfa1ca9dSYoshinobu Inoue 
496cfa1ca9dSYoshinobu Inoue 	return;
497cfa1ca9dSYoshinobu Inoue }
498cfa1ca9dSYoshinobu Inoue 
499686cdd19SJun-ichiro itojun Hagino /* XXX how should we handle IPv6 scope on SIOC[GS]IFPHYADDR? */
500cfa1ca9dSYoshinobu Inoue int
501cfa1ca9dSYoshinobu Inoue gif_ioctl(ifp, cmd, data)
502cfa1ca9dSYoshinobu Inoue 	struct ifnet *ifp;
503cfa1ca9dSYoshinobu Inoue 	u_long cmd;
504cfa1ca9dSYoshinobu Inoue 	caddr_t data;
505cfa1ca9dSYoshinobu Inoue {
506cfa1ca9dSYoshinobu Inoue 	struct gif_softc *sc  = (struct gif_softc*)ifp;
507cfa1ca9dSYoshinobu Inoue 	struct ifreq     *ifr = (struct ifreq*)data;
508cfa1ca9dSYoshinobu Inoue 	int error = 0, size;
509686cdd19SJun-ichiro itojun Hagino 	struct sockaddr *dst, *src;
510686cdd19SJun-ichiro itojun Hagino 	struct sockaddr *sa;
511a98dc5e6SYaroslav Tykhiy 	int s;
51253dab5feSBrooks Davis 	struct ifnet *ifp2;
513686cdd19SJun-ichiro itojun Hagino 	struct gif_softc *sc2;
514cfa1ca9dSYoshinobu Inoue 
515cfa1ca9dSYoshinobu Inoue 	switch (cmd) {
516cfa1ca9dSYoshinobu Inoue 	case SIOCSIFADDR:
517cfa1ca9dSYoshinobu Inoue 		break;
518cfa1ca9dSYoshinobu Inoue 
519cfa1ca9dSYoshinobu Inoue 	case SIOCSIFDSTADDR:
520cfa1ca9dSYoshinobu Inoue 		break;
521cfa1ca9dSYoshinobu Inoue 
522cfa1ca9dSYoshinobu Inoue 	case SIOCADDMULTI:
523cfa1ca9dSYoshinobu Inoue 	case SIOCDELMULTI:
524cfa1ca9dSYoshinobu Inoue 		break;
525cfa1ca9dSYoshinobu Inoue 
526686cdd19SJun-ichiro itojun Hagino #ifdef	SIOCSIFMTU /* xxx */
527cfa1ca9dSYoshinobu Inoue 	case SIOCGIFMTU:
528cfa1ca9dSYoshinobu Inoue 		break;
529686cdd19SJun-ichiro itojun Hagino 
530cfa1ca9dSYoshinobu Inoue 	case SIOCSIFMTU:
531cfa1ca9dSYoshinobu Inoue 		{
532cfa1ca9dSYoshinobu Inoue 			u_long mtu;
533cfa1ca9dSYoshinobu Inoue 			mtu = ifr->ifr_mtu;
534cfa1ca9dSYoshinobu Inoue 			if (mtu < GIF_MTU_MIN || mtu > GIF_MTU_MAX) {
535cfa1ca9dSYoshinobu Inoue 				return (EINVAL);
536cfa1ca9dSYoshinobu Inoue 			}
537cfa1ca9dSYoshinobu Inoue 			ifp->if_mtu = mtu;
538cfa1ca9dSYoshinobu Inoue 		}
539cfa1ca9dSYoshinobu Inoue 		break;
540686cdd19SJun-ichiro itojun Hagino #endif /* SIOCSIFMTU */
541cfa1ca9dSYoshinobu Inoue 
542cfa1ca9dSYoshinobu Inoue 	case SIOCSIFPHYADDR:
543cfa1ca9dSYoshinobu Inoue #ifdef INET6
544cfa1ca9dSYoshinobu Inoue 	case SIOCSIFPHYADDR_IN6:
545cfa1ca9dSYoshinobu Inoue #endif /* INET6 */
54633841545SHajimu UMEMOTO 	case SIOCSLIFPHYADDR:
547686cdd19SJun-ichiro itojun Hagino 		switch (cmd) {
54833841545SHajimu UMEMOTO #ifdef INET
549686cdd19SJun-ichiro itojun Hagino 		case SIOCSIFPHYADDR:
550cfa1ca9dSYoshinobu Inoue 			src = (struct sockaddr *)
551cfa1ca9dSYoshinobu Inoue 				&(((struct in_aliasreq *)data)->ifra_addr);
552cfa1ca9dSYoshinobu Inoue 			dst = (struct sockaddr *)
553cfa1ca9dSYoshinobu Inoue 				&(((struct in_aliasreq *)data)->ifra_dstaddr);
554cfa1ca9dSYoshinobu Inoue 			break;
55533841545SHajimu UMEMOTO #endif
556cfa1ca9dSYoshinobu Inoue #ifdef INET6
557686cdd19SJun-ichiro itojun Hagino 		case SIOCSIFPHYADDR_IN6:
558cfa1ca9dSYoshinobu Inoue 			src = (struct sockaddr *)
559cfa1ca9dSYoshinobu Inoue 				&(((struct in6_aliasreq *)data)->ifra_addr);
560cfa1ca9dSYoshinobu Inoue 			dst = (struct sockaddr *)
561cfa1ca9dSYoshinobu Inoue 				&(((struct in6_aliasreq *)data)->ifra_dstaddr);
562686cdd19SJun-ichiro itojun Hagino 			break;
563686cdd19SJun-ichiro itojun Hagino #endif
56433841545SHajimu UMEMOTO 		case SIOCSLIFPHYADDR:
56533841545SHajimu UMEMOTO 			src = (struct sockaddr *)
56633841545SHajimu UMEMOTO 				&(((struct if_laddrreq *)data)->addr);
56733841545SHajimu UMEMOTO 			dst = (struct sockaddr *)
56833841545SHajimu UMEMOTO 				&(((struct if_laddrreq *)data)->dstaddr);
5696f4ded3aSBrooks Davis 		default:
5706f4ded3aSBrooks Davis 			error = EADDRNOTAVAIL;
5716f4ded3aSBrooks Davis 			goto bad;
57233841545SHajimu UMEMOTO 		}
57333841545SHajimu UMEMOTO 
57433841545SHajimu UMEMOTO 		/* sa_family must be equal */
57533841545SHajimu UMEMOTO 		if (src->sa_family != dst->sa_family)
57633841545SHajimu UMEMOTO 			return EINVAL;
57733841545SHajimu UMEMOTO 
57833841545SHajimu UMEMOTO 		/* validate sa_len */
57933841545SHajimu UMEMOTO 		switch (src->sa_family) {
58033841545SHajimu UMEMOTO #ifdef INET
58133841545SHajimu UMEMOTO 		case AF_INET:
58233841545SHajimu UMEMOTO 			if (src->sa_len != sizeof(struct sockaddr_in))
58333841545SHajimu UMEMOTO 				return EINVAL;
58433841545SHajimu UMEMOTO 			break;
58533841545SHajimu UMEMOTO #endif
58633841545SHajimu UMEMOTO #ifdef INET6
58733841545SHajimu UMEMOTO 		case AF_INET6:
58833841545SHajimu UMEMOTO 			if (src->sa_len != sizeof(struct sockaddr_in6))
58933841545SHajimu UMEMOTO 				return EINVAL;
59033841545SHajimu UMEMOTO 			break;
59133841545SHajimu UMEMOTO #endif
59233841545SHajimu UMEMOTO 		default:
59333841545SHajimu UMEMOTO 			return EAFNOSUPPORT;
59433841545SHajimu UMEMOTO 		}
59533841545SHajimu UMEMOTO 		switch (dst->sa_family) {
59633841545SHajimu UMEMOTO #ifdef INET
59733841545SHajimu UMEMOTO 		case AF_INET:
59833841545SHajimu UMEMOTO 			if (dst->sa_len != sizeof(struct sockaddr_in))
59933841545SHajimu UMEMOTO 				return EINVAL;
60033841545SHajimu UMEMOTO 			break;
60133841545SHajimu UMEMOTO #endif
60233841545SHajimu UMEMOTO #ifdef INET6
60333841545SHajimu UMEMOTO 		case AF_INET6:
60433841545SHajimu UMEMOTO 			if (dst->sa_len != sizeof(struct sockaddr_in6))
60533841545SHajimu UMEMOTO 				return EINVAL;
60633841545SHajimu UMEMOTO 			break;
60733841545SHajimu UMEMOTO #endif
60833841545SHajimu UMEMOTO 		default:
60933841545SHajimu UMEMOTO 			return EAFNOSUPPORT;
61033841545SHajimu UMEMOTO 		}
61133841545SHajimu UMEMOTO 
61233841545SHajimu UMEMOTO 		/* check sa_family looks sane for the cmd */
61333841545SHajimu UMEMOTO 		switch (cmd) {
61433841545SHajimu UMEMOTO 		case SIOCSIFPHYADDR:
61533841545SHajimu UMEMOTO 			if (src->sa_family == AF_INET)
61633841545SHajimu UMEMOTO 				break;
61733841545SHajimu UMEMOTO 			return EAFNOSUPPORT;
61833841545SHajimu UMEMOTO #ifdef INET6
61933841545SHajimu UMEMOTO 		case SIOCSIFPHYADDR_IN6:
62033841545SHajimu UMEMOTO 			if (src->sa_family == AF_INET6)
62133841545SHajimu UMEMOTO 				break;
62233841545SHajimu UMEMOTO 			return EAFNOSUPPORT;
62333841545SHajimu UMEMOTO #endif /* INET6 */
62433841545SHajimu UMEMOTO 		case SIOCSLIFPHYADDR:
62533841545SHajimu UMEMOTO 			/* checks done in the above */
62633841545SHajimu UMEMOTO 			break;
627686cdd19SJun-ichiro itojun Hagino 		}
628cfa1ca9dSYoshinobu Inoue 
62953dab5feSBrooks Davis 		TAILQ_FOREACH(ifp2, &ifnet, if_link) {
63053dab5feSBrooks Davis 			if (strcmp(ifp2->if_name, GIFNAME) != 0)
63153dab5feSBrooks Davis 				continue;
63253dab5feSBrooks Davis 			sc2 = ifp2->if_softc;
633686cdd19SJun-ichiro itojun Hagino 			if (sc2 == sc)
634686cdd19SJun-ichiro itojun Hagino 				continue;
635686cdd19SJun-ichiro itojun Hagino 			if (!sc2->gif_pdst || !sc2->gif_psrc)
636686cdd19SJun-ichiro itojun Hagino 				continue;
637686cdd19SJun-ichiro itojun Hagino 			if (sc2->gif_pdst->sa_family != dst->sa_family ||
638686cdd19SJun-ichiro itojun Hagino 			    sc2->gif_pdst->sa_len != dst->sa_len ||
639686cdd19SJun-ichiro itojun Hagino 			    sc2->gif_psrc->sa_family != src->sa_family ||
640686cdd19SJun-ichiro itojun Hagino 			    sc2->gif_psrc->sa_len != src->sa_len)
641686cdd19SJun-ichiro itojun Hagino 				continue;
642872f786aSBrooks Davis 
643872f786aSBrooks Davis 			/*
644872f786aSBrooks Davis 			 * Disallow parallel tunnels unless instructed
645872f786aSBrooks Davis 			 * otherwise.
646872f786aSBrooks Davis 			 */
647872f786aSBrooks Davis 			if (!parallel_tunnels &&
648872f786aSBrooks Davis 			    bcmp(sc2->gif_pdst, dst, dst->sa_len) == 0 &&
649686cdd19SJun-ichiro itojun Hagino 			    bcmp(sc2->gif_psrc, src, src->sa_len) == 0) {
650cfa1ca9dSYoshinobu Inoue 				error = EADDRNOTAVAIL;
651cfa1ca9dSYoshinobu Inoue 				goto bad;
652cfa1ca9dSYoshinobu Inoue 			}
653686cdd19SJun-ichiro itojun Hagino 
654686cdd19SJun-ichiro itojun Hagino 			/* can't configure multiple multi-dest interfaces */
655686cdd19SJun-ichiro itojun Hagino #define multidest(x) \
656686cdd19SJun-ichiro itojun Hagino 	(((struct sockaddr_in *)(x))->sin_addr.s_addr == INADDR_ANY)
657686cdd19SJun-ichiro itojun Hagino #ifdef INET6
658686cdd19SJun-ichiro itojun Hagino #define multidest6(x) \
659686cdd19SJun-ichiro itojun Hagino 	(IN6_IS_ADDR_UNSPECIFIED(&((struct sockaddr_in6 *)(x))->sin6_addr))
660686cdd19SJun-ichiro itojun Hagino #endif
661686cdd19SJun-ichiro itojun Hagino 			if (dst->sa_family == AF_INET &&
662686cdd19SJun-ichiro itojun Hagino 			    multidest(dst) && multidest(sc2->gif_pdst)) {
663686cdd19SJun-ichiro itojun Hagino 				error = EADDRNOTAVAIL;
664686cdd19SJun-ichiro itojun Hagino 				goto bad;
665cfa1ca9dSYoshinobu Inoue 			}
666686cdd19SJun-ichiro itojun Hagino #ifdef INET6
667686cdd19SJun-ichiro itojun Hagino 			if (dst->sa_family == AF_INET6 &&
668686cdd19SJun-ichiro itojun Hagino 			    multidest6(dst) && multidest6(sc2->gif_pdst)) {
669686cdd19SJun-ichiro itojun Hagino 				error = EADDRNOTAVAIL;
670686cdd19SJun-ichiro itojun Hagino 				goto bad;
671cfa1ca9dSYoshinobu Inoue 			}
672686cdd19SJun-ichiro itojun Hagino #endif
673686cdd19SJun-ichiro itojun Hagino 		}
674686cdd19SJun-ichiro itojun Hagino 
675686cdd19SJun-ichiro itojun Hagino 		if (sc->gif_psrc)
676686cdd19SJun-ichiro itojun Hagino 			free((caddr_t)sc->gif_psrc, M_IFADDR);
67733841545SHajimu UMEMOTO 		sa = (struct sockaddr *)malloc(src->sa_len, M_IFADDR, M_WAITOK);
67833841545SHajimu UMEMOTO 		bcopy((caddr_t)src, (caddr_t)sa, src->sa_len);
679cfa1ca9dSYoshinobu Inoue 		sc->gif_psrc = sa;
680cfa1ca9dSYoshinobu Inoue 
681686cdd19SJun-ichiro itojun Hagino 		if (sc->gif_pdst)
682686cdd19SJun-ichiro itojun Hagino 			free((caddr_t)sc->gif_pdst, M_IFADDR);
68333841545SHajimu UMEMOTO 		sa = (struct sockaddr *)malloc(dst->sa_len, M_IFADDR, M_WAITOK);
68433841545SHajimu UMEMOTO 		bcopy((caddr_t)dst, (caddr_t)sa, dst->sa_len);
685cfa1ca9dSYoshinobu Inoue 		sc->gif_pdst = sa;
686cfa1ca9dSYoshinobu Inoue 
687a98dc5e6SYaroslav Tykhiy 		ifp->if_flags |= IFF_RUNNING;
688a98dc5e6SYaroslav Tykhiy 		s = splimp();
689a98dc5e6SYaroslav Tykhiy 		if_up(ifp);	/* mark interface UP and send up RTM_IFINFO */
690a98dc5e6SYaroslav Tykhiy 		splx(s);
691cfa1ca9dSYoshinobu Inoue 
692686cdd19SJun-ichiro itojun Hagino 		error = 0;
693cfa1ca9dSYoshinobu Inoue 		break;
694cfa1ca9dSYoshinobu Inoue 
695686cdd19SJun-ichiro itojun Hagino #ifdef SIOCDIFPHYADDR
696686cdd19SJun-ichiro itojun Hagino 	case SIOCDIFPHYADDR:
697686cdd19SJun-ichiro itojun Hagino 		if (sc->gif_psrc) {
698686cdd19SJun-ichiro itojun Hagino 			free((caddr_t)sc->gif_psrc, M_IFADDR);
699686cdd19SJun-ichiro itojun Hagino 			sc->gif_psrc = NULL;
700686cdd19SJun-ichiro itojun Hagino 		}
701686cdd19SJun-ichiro itojun Hagino 		if (sc->gif_pdst) {
702686cdd19SJun-ichiro itojun Hagino 			free((caddr_t)sc->gif_pdst, M_IFADDR);
703686cdd19SJun-ichiro itojun Hagino 			sc->gif_pdst = NULL;
704686cdd19SJun-ichiro itojun Hagino 		}
70533841545SHajimu UMEMOTO 		/* change the IFF_{UP, RUNNING} flag as well? */
706686cdd19SJun-ichiro itojun Hagino 		break;
707686cdd19SJun-ichiro itojun Hagino #endif
708686cdd19SJun-ichiro itojun Hagino 
709cfa1ca9dSYoshinobu Inoue 	case SIOCGIFPSRCADDR:
710cfa1ca9dSYoshinobu Inoue #ifdef INET6
711cfa1ca9dSYoshinobu Inoue 	case SIOCGIFPSRCADDR_IN6:
712cfa1ca9dSYoshinobu Inoue #endif /* INET6 */
713cfa1ca9dSYoshinobu Inoue 		if (sc->gif_psrc == NULL) {
714cfa1ca9dSYoshinobu Inoue 			error = EADDRNOTAVAIL;
715cfa1ca9dSYoshinobu Inoue 			goto bad;
716cfa1ca9dSYoshinobu Inoue 		}
717cfa1ca9dSYoshinobu Inoue 		src = sc->gif_psrc;
71833841545SHajimu UMEMOTO 		switch (cmd) {
719cfa1ca9dSYoshinobu Inoue #ifdef INET
72033841545SHajimu UMEMOTO 		case SIOCGIFPSRCADDR:
721cfa1ca9dSYoshinobu Inoue 			dst = &ifr->ifr_addr;
72233841545SHajimu UMEMOTO 			size = sizeof(ifr->ifr_addr);
723cfa1ca9dSYoshinobu Inoue 			break;
724cfa1ca9dSYoshinobu Inoue #endif /* INET */
725cfa1ca9dSYoshinobu Inoue #ifdef INET6
72633841545SHajimu UMEMOTO 		case SIOCGIFPSRCADDR_IN6:
727cfa1ca9dSYoshinobu Inoue 			dst = (struct sockaddr *)
728cfa1ca9dSYoshinobu Inoue 				&(((struct in6_ifreq *)data)->ifr_addr);
72933841545SHajimu UMEMOTO 			size = sizeof(((struct in6_ifreq *)data)->ifr_addr);
730cfa1ca9dSYoshinobu Inoue 			break;
731cfa1ca9dSYoshinobu Inoue #endif /* INET6 */
732cfa1ca9dSYoshinobu Inoue 		default:
733cfa1ca9dSYoshinobu Inoue 			error = EADDRNOTAVAIL;
734cfa1ca9dSYoshinobu Inoue 			goto bad;
735cfa1ca9dSYoshinobu Inoue 		}
73633841545SHajimu UMEMOTO 		if (src->sa_len > size)
73733841545SHajimu UMEMOTO 			return EINVAL;
73833841545SHajimu UMEMOTO 		bcopy((caddr_t)src, (caddr_t)dst, src->sa_len);
739cfa1ca9dSYoshinobu Inoue 		break;
740cfa1ca9dSYoshinobu Inoue 
741cfa1ca9dSYoshinobu Inoue 	case SIOCGIFPDSTADDR:
742cfa1ca9dSYoshinobu Inoue #ifdef INET6
743cfa1ca9dSYoshinobu Inoue 	case SIOCGIFPDSTADDR_IN6:
744cfa1ca9dSYoshinobu Inoue #endif /* INET6 */
745cfa1ca9dSYoshinobu Inoue 		if (sc->gif_pdst == NULL) {
746cfa1ca9dSYoshinobu Inoue 			error = EADDRNOTAVAIL;
747cfa1ca9dSYoshinobu Inoue 			goto bad;
748cfa1ca9dSYoshinobu Inoue 		}
749cfa1ca9dSYoshinobu Inoue 		src = sc->gif_pdst;
75033841545SHajimu UMEMOTO 		switch (cmd) {
751cfa1ca9dSYoshinobu Inoue #ifdef INET
75233841545SHajimu UMEMOTO 		case SIOCGIFPDSTADDR:
753cfa1ca9dSYoshinobu Inoue 			dst = &ifr->ifr_addr;
75433841545SHajimu UMEMOTO 			size = sizeof(ifr->ifr_addr);
755cfa1ca9dSYoshinobu Inoue 			break;
756cfa1ca9dSYoshinobu Inoue #endif /* INET */
757cfa1ca9dSYoshinobu Inoue #ifdef INET6
75833841545SHajimu UMEMOTO 		case SIOCGIFPDSTADDR_IN6:
759cfa1ca9dSYoshinobu Inoue 			dst = (struct sockaddr *)
760cfa1ca9dSYoshinobu Inoue 				&(((struct in6_ifreq *)data)->ifr_addr);
76133841545SHajimu UMEMOTO 			size = sizeof(((struct in6_ifreq *)data)->ifr_addr);
762cfa1ca9dSYoshinobu Inoue 			break;
763cfa1ca9dSYoshinobu Inoue #endif /* INET6 */
764cfa1ca9dSYoshinobu Inoue 		default:
765cfa1ca9dSYoshinobu Inoue 			error = EADDRNOTAVAIL;
766cfa1ca9dSYoshinobu Inoue 			goto bad;
767cfa1ca9dSYoshinobu Inoue 		}
76833841545SHajimu UMEMOTO 		if (src->sa_len > size)
76933841545SHajimu UMEMOTO 			return EINVAL;
77033841545SHajimu UMEMOTO 		bcopy((caddr_t)src, (caddr_t)dst, src->sa_len);
77133841545SHajimu UMEMOTO 		break;
77233841545SHajimu UMEMOTO 
77333841545SHajimu UMEMOTO 	case SIOCGLIFPHYADDR:
77433841545SHajimu UMEMOTO 		if (sc->gif_psrc == NULL || sc->gif_pdst == NULL) {
77533841545SHajimu UMEMOTO 			error = EADDRNOTAVAIL;
77633841545SHajimu UMEMOTO 			goto bad;
77733841545SHajimu UMEMOTO 		}
77833841545SHajimu UMEMOTO 
77933841545SHajimu UMEMOTO 		/* copy src */
78033841545SHajimu UMEMOTO 		src = sc->gif_psrc;
78133841545SHajimu UMEMOTO 		dst = (struct sockaddr *)
78233841545SHajimu UMEMOTO 			&(((struct if_laddrreq *)data)->addr);
78333841545SHajimu UMEMOTO 		size = sizeof(((struct if_laddrreq *)data)->addr);
78433841545SHajimu UMEMOTO 		if (src->sa_len > size)
78533841545SHajimu UMEMOTO 			return EINVAL;
78633841545SHajimu UMEMOTO 		bcopy((caddr_t)src, (caddr_t)dst, src->sa_len);
78733841545SHajimu UMEMOTO 
78833841545SHajimu UMEMOTO 		/* copy dst */
78933841545SHajimu UMEMOTO 		src = sc->gif_pdst;
79033841545SHajimu UMEMOTO 		dst = (struct sockaddr *)
79133841545SHajimu UMEMOTO 			&(((struct if_laddrreq *)data)->dstaddr);
79233841545SHajimu UMEMOTO 		size = sizeof(((struct if_laddrreq *)data)->dstaddr);
79333841545SHajimu UMEMOTO 		if (src->sa_len > size)
79433841545SHajimu UMEMOTO 			return EINVAL;
79533841545SHajimu UMEMOTO 		bcopy((caddr_t)src, (caddr_t)dst, src->sa_len);
796cfa1ca9dSYoshinobu Inoue 		break;
797cfa1ca9dSYoshinobu Inoue 
798cfa1ca9dSYoshinobu Inoue 	case SIOCSIFFLAGS:
799686cdd19SJun-ichiro itojun Hagino 		/* if_ioctl() takes care of it */
800cfa1ca9dSYoshinobu Inoue 		break;
801cfa1ca9dSYoshinobu Inoue 
802cfa1ca9dSYoshinobu Inoue 	default:
803cfa1ca9dSYoshinobu Inoue 		error = EINVAL;
804cfa1ca9dSYoshinobu Inoue 		break;
805cfa1ca9dSYoshinobu Inoue 	}
806cfa1ca9dSYoshinobu Inoue  bad:
807cfa1ca9dSYoshinobu Inoue 	return error;
808cfa1ca9dSYoshinobu Inoue }
80953dab5feSBrooks Davis 
81053dab5feSBrooks Davis void
81153dab5feSBrooks Davis gif_delete_tunnel(sc)
81253dab5feSBrooks Davis 	struct gif_softc *sc;
81353dab5feSBrooks Davis {
81453dab5feSBrooks Davis 	/* XXX: NetBSD protects this function with splsoftnet() */
81553dab5feSBrooks Davis 
81653dab5feSBrooks Davis 	if (sc->gif_psrc) {
81753dab5feSBrooks Davis 		free((caddr_t)sc->gif_psrc, M_IFADDR);
81853dab5feSBrooks Davis 		sc->gif_psrc = NULL;
81953dab5feSBrooks Davis 	}
82053dab5feSBrooks Davis 	if (sc->gif_pdst) {
82153dab5feSBrooks Davis 		free((caddr_t)sc->gif_pdst, M_IFADDR);
82253dab5feSBrooks Davis 		sc->gif_pdst = NULL;
82353dab5feSBrooks Davis 	}
82453dab5feSBrooks Davis 	/* change the IFF_UP flag as well? */
82553dab5feSBrooks Davis }
826