1 /* $NetBSD: if_gre.c,v 1.49 2003/12/11 00:22:29 itojun Exp $ */ 2 /* $FreeBSD$ */ 3 4 /*- 5 * Copyright (c) 1998 The NetBSD Foundation, Inc. 6 * All rights reserved. 7 * 8 * This code is derived from software contributed to The NetBSD Foundation 9 * by Heiko W.Rupp <hwr@pilhuhn.de> 10 * 11 * IPv6-over-GRE contributed by Gert Doering <gert@greenie.muc.de> 12 * 13 * Redistribution and use in source and binary forms, with or without 14 * modification, are permitted provided that the following conditions 15 * are met: 16 * 1. Redistributions of source code must retain the above copyright 17 * notice, this list of conditions and the following disclaimer. 18 * 2. Redistributions in binary form must reproduce the above copyright 19 * notice, this list of conditions and the following disclaimer in the 20 * documentation and/or other materials provided with the distribution. 21 * 22 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 23 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 24 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 25 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 26 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 27 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 28 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 29 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 30 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 31 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 32 * POSSIBILITY OF SUCH DAMAGE. 33 */ 34 35 /* 36 * Encapsulate L3 protocols into IP 37 * See RFC 2784 (successor of RFC 1701 and 1702) for more details. 38 * If_gre is compatible with Cisco GRE tunnels, so you can 39 * have a NetBSD box as the other end of a tunnel interface of a Cisco 40 * router. See gre(4) for more details. 41 * Also supported: IP in IP encaps (proto 55) as of RFC 2004 42 */ 43 44 #include "opt_atalk.h" 45 #include "opt_inet.h" 46 #include "opt_inet6.h" 47 48 #include <sys/param.h> 49 #include <sys/jail.h> 50 #include <sys/kernel.h> 51 #include <sys/libkern.h> 52 #include <sys/malloc.h> 53 #include <sys/module.h> 54 #include <sys/mbuf.h> 55 #include <sys/priv.h> 56 #include <sys/proc.h> 57 #include <sys/protosw.h> 58 #include <sys/socket.h> 59 #include <sys/sockio.h> 60 #include <sys/sysctl.h> 61 #include <sys/systm.h> 62 63 #include <net/ethernet.h> 64 #include <net/if.h> 65 #include <net/if_var.h> 66 #include <net/if_clone.h> 67 #include <net/if_types.h> 68 #include <net/route.h> 69 #include <net/vnet.h> 70 71 #ifdef INET 72 #include <netinet/in.h> 73 #include <netinet/in_systm.h> 74 #include <netinet/in_var.h> 75 #include <netinet/ip.h> 76 #include <netinet/ip_gre.h> 77 #include <netinet/ip_var.h> 78 #include <netinet/ip_encap.h> 79 #else 80 #error "Huh? if_gre without inet?" 81 #endif 82 83 #include <net/bpf.h> 84 85 #include <net/if_gre.h> 86 87 /* 88 * It is not easy to calculate the right value for a GRE MTU. 89 * We leave this task to the admin and use the same default that 90 * other vendors use. 91 */ 92 #define GREMTU 1476 93 94 #define MTAG_COOKIE_GRE 1307983903 95 #define MTAG_GRE_NESTING 1 96 struct mtag_gre_nesting { 97 uint16_t count; 98 uint16_t max; 99 struct ifnet *ifp[]; 100 }; 101 102 /* 103 * gre_mtx protects all global variables in if_gre.c. 104 * XXX: gre_softc data not protected yet. 105 */ 106 struct mtx gre_mtx; 107 static const char grename[] = "gre"; 108 static MALLOC_DEFINE(M_GRE, grename, "Generic Routing Encapsulation"); 109 110 struct gre_softc_head gre_softc_list; 111 112 static int gre_clone_create(struct if_clone *, int, caddr_t); 113 static void gre_clone_destroy(struct ifnet *); 114 static struct if_clone *gre_cloner; 115 116 static int gre_ioctl(struct ifnet *, u_long, caddr_t); 117 static int gre_output(struct ifnet *, struct mbuf *, 118 const struct sockaddr *, struct route *); 119 120 static int gre_compute_route(struct gre_softc *sc); 121 122 static void greattach(void); 123 124 #ifdef INET 125 extern struct domain inetdomain; 126 static const struct protosw in_gre_protosw = { 127 .pr_type = SOCK_RAW, 128 .pr_domain = &inetdomain, 129 .pr_protocol = IPPROTO_GRE, 130 .pr_flags = PR_ATOMIC|PR_ADDR, 131 .pr_input = gre_input, 132 .pr_output = (pr_output_t *)rip_output, 133 .pr_ctlinput = rip_ctlinput, 134 .pr_ctloutput = rip_ctloutput, 135 .pr_usrreqs = &rip_usrreqs 136 }; 137 static const struct protosw in_mobile_protosw = { 138 .pr_type = SOCK_RAW, 139 .pr_domain = &inetdomain, 140 .pr_protocol = IPPROTO_MOBILE, 141 .pr_flags = PR_ATOMIC|PR_ADDR, 142 .pr_input = gre_mobile_input, 143 .pr_output = (pr_output_t *)rip_output, 144 .pr_ctlinput = rip_ctlinput, 145 .pr_ctloutput = rip_ctloutput, 146 .pr_usrreqs = &rip_usrreqs 147 }; 148 #endif 149 150 SYSCTL_DECL(_net_link); 151 static SYSCTL_NODE(_net_link, IFT_TUNNEL, gre, CTLFLAG_RW, 0, 152 "Generic Routing Encapsulation"); 153 #ifndef MAX_GRE_NEST 154 /* 155 * This macro controls the default upper limitation on nesting of gre tunnels. 156 * Since, setting a large value to this macro with a careless configuration 157 * may introduce system crash, we don't allow any nestings by default. 158 * If you need to configure nested gre tunnels, you can define this macro 159 * in your kernel configuration file. However, if you do so, please be 160 * careful to configure the tunnels so that it won't make a loop. 161 */ 162 #define MAX_GRE_NEST 1 163 #endif 164 static int max_gre_nesting = MAX_GRE_NEST; 165 SYSCTL_INT(_net_link_gre, OID_AUTO, max_nesting, CTLFLAG_RW, 166 &max_gre_nesting, 0, "Max nested tunnels"); 167 168 /* ARGSUSED */ 169 static void 170 greattach(void) 171 { 172 173 mtx_init(&gre_mtx, "gre_mtx", NULL, MTX_DEF); 174 LIST_INIT(&gre_softc_list); 175 gre_cloner = if_clone_simple(grename, gre_clone_create, 176 gre_clone_destroy, 0); 177 } 178 179 static int 180 gre_clone_create(ifc, unit, params) 181 struct if_clone *ifc; 182 int unit; 183 caddr_t params; 184 { 185 struct gre_softc *sc; 186 187 sc = malloc(sizeof(struct gre_softc), M_GRE, M_WAITOK | M_ZERO); 188 189 GRE2IFP(sc) = if_alloc(IFT_TUNNEL); 190 if (GRE2IFP(sc) == NULL) { 191 free(sc, M_GRE); 192 return (ENOSPC); 193 } 194 195 GRE2IFP(sc)->if_softc = sc; 196 if_initname(GRE2IFP(sc), grename, unit); 197 198 GRE2IFP(sc)->if_snd.ifq_maxlen = ifqmaxlen; 199 GRE2IFP(sc)->if_addrlen = 0; 200 GRE2IFP(sc)->if_hdrlen = 24; /* IP + GRE */ 201 GRE2IFP(sc)->if_mtu = GREMTU; 202 GRE2IFP(sc)->if_flags = IFF_POINTOPOINT|IFF_MULTICAST; 203 GRE2IFP(sc)->if_output = gre_output; 204 GRE2IFP(sc)->if_ioctl = gre_ioctl; 205 sc->g_dst.s_addr = sc->g_src.s_addr = INADDR_ANY; 206 sc->g_proto = IPPROTO_GRE; 207 GRE2IFP(sc)->if_flags |= IFF_LINK0; 208 sc->encap = NULL; 209 sc->gre_fibnum = curthread->td_proc->p_fibnum; 210 sc->wccp_ver = WCCP_V1; 211 sc->key = 0; 212 if_attach(GRE2IFP(sc)); 213 bpfattach(GRE2IFP(sc), DLT_NULL, sizeof(u_int32_t)); 214 mtx_lock(&gre_mtx); 215 LIST_INSERT_HEAD(&gre_softc_list, sc, sc_list); 216 mtx_unlock(&gre_mtx); 217 return (0); 218 } 219 220 static void 221 gre_clone_destroy(ifp) 222 struct ifnet *ifp; 223 { 224 struct gre_softc *sc = ifp->if_softc; 225 226 mtx_lock(&gre_mtx); 227 LIST_REMOVE(sc, sc_list); 228 mtx_unlock(&gre_mtx); 229 230 #ifdef INET 231 if (sc->encap != NULL) 232 encap_detach(sc->encap); 233 #endif 234 bpfdetach(ifp); 235 if_detach(ifp); 236 if_free(ifp); 237 free(sc, M_GRE); 238 } 239 240 /* 241 * The output routine. Takes a packet and encapsulates it in the protocol 242 * given by sc->g_proto. See also RFC 1701 and RFC 2004 243 */ 244 static int 245 gre_output(struct ifnet *ifp, struct mbuf *m, const struct sockaddr *dst, 246 struct route *ro) 247 { 248 int error = 0; 249 struct gre_softc *sc = ifp->if_softc; 250 struct greip *gh; 251 struct ip *ip; 252 struct m_tag *mtag; 253 struct mtag_gre_nesting *gt; 254 size_t len; 255 u_short gre_ip_id = 0; 256 uint8_t gre_ip_tos = 0; 257 u_int16_t etype = 0; 258 struct mobile_h mob_h; 259 u_int32_t af; 260 int extra = 0, max; 261 262 /* 263 * gre may cause infinite recursion calls when misconfigured. High 264 * nesting level may cause stack exhaustion. We'll prevent this by 265 * detecting loops and by introducing upper limit. 266 */ 267 mtag = m_tag_locate(m, MTAG_COOKIE_GRE, MTAG_GRE_NESTING, NULL); 268 if (mtag != NULL) { 269 struct ifnet **ifp2; 270 271 gt = (struct mtag_gre_nesting *)(mtag + 1); 272 gt->count++; 273 if (gt->count > min(gt->max,max_gre_nesting)) { 274 printf("%s: hit maximum recursion limit %u on %s\n", 275 __func__, gt->count - 1, ifp->if_xname); 276 m_freem(m); 277 error = EIO; /* is there better errno? */ 278 goto end; 279 } 280 281 ifp2 = gt->ifp; 282 for (max = gt->count - 1; max > 0; max--) { 283 if (*ifp2 == ifp) 284 break; 285 ifp2++; 286 } 287 if (*ifp2 == ifp) { 288 printf("%s: detected loop with nexting %u on %s\n", 289 __func__, gt->count-1, ifp->if_xname); 290 m_freem(m); 291 error = EIO; /* is there better errno? */ 292 goto end; 293 } 294 *ifp2 = ifp; 295 296 } else { 297 /* 298 * Given that people should NOT increase max_gre_nesting beyond 299 * their real needs, we allocate once per packet rather than 300 * allocating an mtag once per passing through gre. 301 * 302 * Note: the sysctl does not actually check for saneness, so we 303 * limit the maximum numbers of possible recursions here. 304 */ 305 max = imin(max_gre_nesting, 256); 306 /* If someone sets the sysctl <= 0, we want at least 1. */ 307 max = imax(max, 1); 308 len = sizeof(struct mtag_gre_nesting) + 309 max * sizeof(struct ifnet *); 310 mtag = m_tag_alloc(MTAG_COOKIE_GRE, MTAG_GRE_NESTING, len, 311 M_NOWAIT); 312 if (mtag == NULL) { 313 m_freem(m); 314 error = ENOMEM; 315 goto end; 316 } 317 gt = (struct mtag_gre_nesting *)(mtag + 1); 318 bzero(gt, len); 319 gt->count = 1; 320 gt->max = max; 321 *gt->ifp = ifp; 322 m_tag_prepend(m, mtag); 323 } 324 325 if (!((ifp->if_flags & IFF_UP) && 326 (ifp->if_drv_flags & IFF_DRV_RUNNING)) || 327 sc->g_src.s_addr == INADDR_ANY || sc->g_dst.s_addr == INADDR_ANY) { 328 m_freem(m); 329 error = ENETDOWN; 330 goto end; 331 } 332 333 gh = NULL; 334 ip = NULL; 335 336 /* BPF writes need to be handled specially. */ 337 if (dst->sa_family == AF_UNSPEC) 338 bcopy(dst->sa_data, &af, sizeof(af)); 339 else 340 af = dst->sa_family; 341 342 if (bpf_peers_present(ifp->if_bpf)) 343 bpf_mtap2(ifp->if_bpf, &af, sizeof(af), m); 344 345 if ((ifp->if_flags & IFF_MONITOR) != 0) { 346 m_freem(m); 347 error = ENETDOWN; 348 goto end; 349 } 350 351 m->m_flags &= ~(M_BCAST|M_MCAST); 352 353 if (sc->g_proto == IPPROTO_MOBILE) { 354 if (af == AF_INET) { 355 struct mbuf *m0; 356 int msiz; 357 358 ip = mtod(m, struct ip *); 359 360 /* 361 * RFC2004 specifies that fragmented diagrams shouldn't 362 * be encapsulated. 363 */ 364 if (ip->ip_off & htons(IP_MF | IP_OFFMASK)) { 365 _IF_DROP(&ifp->if_snd); 366 m_freem(m); 367 error = EINVAL; /* is there better errno? */ 368 goto end; 369 } 370 memset(&mob_h, 0, MOB_H_SIZ_L); 371 mob_h.proto = (ip->ip_p) << 8; 372 mob_h.odst = ip->ip_dst.s_addr; 373 ip->ip_dst.s_addr = sc->g_dst.s_addr; 374 375 /* 376 * If the packet comes from our host, we only change 377 * the destination address in the IP header. 378 * Else we also need to save and change the source 379 */ 380 if (in_hosteq(ip->ip_src, sc->g_src)) { 381 msiz = MOB_H_SIZ_S; 382 } else { 383 mob_h.proto |= MOB_H_SBIT; 384 mob_h.osrc = ip->ip_src.s_addr; 385 ip->ip_src.s_addr = sc->g_src.s_addr; 386 msiz = MOB_H_SIZ_L; 387 } 388 mob_h.proto = htons(mob_h.proto); 389 mob_h.hcrc = gre_in_cksum((u_int16_t *)&mob_h, msiz); 390 391 if ((m->m_data - msiz) < m->m_pktdat) { 392 m0 = m_gethdr(M_NOWAIT, MT_DATA); 393 if (m0 == NULL) { 394 _IF_DROP(&ifp->if_snd); 395 m_freem(m); 396 error = ENOBUFS; 397 goto end; 398 } 399 m0->m_next = m; 400 m->m_data += sizeof(struct ip); 401 m->m_len -= sizeof(struct ip); 402 m0->m_pkthdr.len = m->m_pkthdr.len + msiz; 403 m0->m_len = msiz + sizeof(struct ip); 404 m0->m_data += max_linkhdr; 405 memcpy(mtod(m0, caddr_t), (caddr_t)ip, 406 sizeof(struct ip)); 407 m = m0; 408 } else { /* we have some space left in the old one */ 409 m->m_data -= msiz; 410 m->m_len += msiz; 411 m->m_pkthdr.len += msiz; 412 bcopy(ip, mtod(m, caddr_t), 413 sizeof(struct ip)); 414 } 415 ip = mtod(m, struct ip *); 416 memcpy((caddr_t)(ip + 1), &mob_h, (unsigned)msiz); 417 ip->ip_len = htons(ntohs(ip->ip_len) + msiz); 418 } else { /* AF_INET */ 419 _IF_DROP(&ifp->if_snd); 420 m_freem(m); 421 error = EINVAL; 422 goto end; 423 } 424 } else if (sc->g_proto == IPPROTO_GRE) { 425 switch (af) { 426 case AF_INET: 427 ip = mtod(m, struct ip *); 428 gre_ip_tos = ip->ip_tos; 429 gre_ip_id = ip->ip_id; 430 if (sc->wccp_ver == WCCP_V2) { 431 extra = sizeof(uint32_t); 432 etype = WCCP_PROTOCOL_TYPE; 433 } else { 434 etype = ETHERTYPE_IP; 435 } 436 break; 437 #ifdef INET6 438 case AF_INET6: 439 gre_ip_id = ip_newid(); 440 etype = ETHERTYPE_IPV6; 441 break; 442 #endif 443 #ifdef NETATALK 444 case AF_APPLETALK: 445 etype = ETHERTYPE_ATALK; 446 break; 447 #endif 448 default: 449 _IF_DROP(&ifp->if_snd); 450 m_freem(m); 451 error = EAFNOSUPPORT; 452 goto end; 453 } 454 455 /* Reserve space for GRE header + optional GRE key */ 456 int hdrlen = sizeof(struct greip) + extra; 457 if (sc->key) 458 hdrlen += sizeof(uint32_t); 459 M_PREPEND(m, hdrlen, M_NOWAIT); 460 } else { 461 _IF_DROP(&ifp->if_snd); 462 m_freem(m); 463 error = EINVAL; 464 goto end; 465 } 466 467 if (m == NULL) { /* mbuf allocation failed */ 468 _IF_DROP(&ifp->if_snd); 469 error = ENOBUFS; 470 goto end; 471 } 472 473 M_SETFIB(m, sc->gre_fibnum); /* The envelope may use a different FIB */ 474 475 gh = mtod(m, struct greip *); 476 if (sc->g_proto == IPPROTO_GRE) { 477 uint32_t *options = gh->gi_options; 478 479 memset((void *)gh, 0, sizeof(struct greip) + extra); 480 gh->gi_ptype = htons(etype); 481 gh->gi_flags = 0; 482 483 /* Add key option */ 484 if (sc->key) 485 { 486 gh->gi_flags |= htons(GRE_KP); 487 *(options++) = htonl(sc->key); 488 } 489 } 490 491 gh->gi_pr = sc->g_proto; 492 if (sc->g_proto != IPPROTO_MOBILE) { 493 gh->gi_src = sc->g_src; 494 gh->gi_dst = sc->g_dst; 495 ((struct ip*)gh)->ip_v = IPPROTO_IPV4; 496 ((struct ip*)gh)->ip_hl = (sizeof(struct ip)) >> 2; 497 ((struct ip*)gh)->ip_ttl = GRE_TTL; 498 ((struct ip*)gh)->ip_tos = gre_ip_tos; 499 ((struct ip*)gh)->ip_id = gre_ip_id; 500 gh->gi_len = htons(m->m_pkthdr.len); 501 } 502 503 ifp->if_opackets++; 504 ifp->if_obytes += m->m_pkthdr.len; 505 /* 506 * Send it off and with IP_FORWARD flag to prevent it from 507 * overwriting the ip_id again. ip_id is already set to the 508 * ip_id of the encapsulated packet. 509 */ 510 error = ip_output(m, NULL, &sc->route, IP_FORWARDING, 511 (struct ip_moptions *)NULL, (struct inpcb *)NULL); 512 end: 513 if (error) 514 ifp->if_oerrors++; 515 return (error); 516 } 517 518 static int 519 gre_ioctl(struct ifnet *ifp, u_long cmd, caddr_t data) 520 { 521 struct ifreq *ifr = (struct ifreq *)data; 522 struct in_aliasreq *aifr = (struct in_aliasreq *)data; 523 struct gre_softc *sc = ifp->if_softc; 524 struct sockaddr_in si; 525 struct sockaddr *sa = NULL; 526 int error, adj; 527 struct sockaddr_in sp, sm, dp, dm; 528 uint32_t key; 529 530 error = 0; 531 adj = 0; 532 533 switch (cmd) { 534 case SIOCSIFADDR: 535 ifp->if_flags |= IFF_UP; 536 break; 537 case SIOCSIFFLAGS: 538 /* 539 * XXXRW: Isn't this priv_check() redundant to the ifnet 540 * layer check? 541 */ 542 if ((error = priv_check(curthread, PRIV_NET_SETIFFLAGS)) != 0) 543 break; 544 if ((ifr->ifr_flags & IFF_LINK0) != 0) 545 sc->g_proto = IPPROTO_GRE; 546 else 547 sc->g_proto = IPPROTO_MOBILE; 548 if ((ifr->ifr_flags & IFF_LINK2) != 0) 549 sc->wccp_ver = WCCP_V2; 550 else 551 sc->wccp_ver = WCCP_V1; 552 goto recompute; 553 case SIOCSIFMTU: 554 /* 555 * XXXRW: Isn't this priv_check() redundant to the ifnet 556 * layer check? 557 */ 558 if ((error = priv_check(curthread, PRIV_NET_SETIFMTU)) != 0) 559 break; 560 if (ifr->ifr_mtu < 576) { 561 error = EINVAL; 562 break; 563 } 564 ifp->if_mtu = ifr->ifr_mtu; 565 break; 566 case SIOCGIFMTU: 567 ifr->ifr_mtu = GRE2IFP(sc)->if_mtu; 568 break; 569 case SIOCADDMULTI: 570 /* 571 * XXXRW: Isn't this priv_checkr() redundant to the ifnet 572 * layer check? 573 */ 574 if ((error = priv_check(curthread, PRIV_NET_ADDMULTI)) != 0) 575 break; 576 if (ifr == 0) { 577 error = EAFNOSUPPORT; 578 break; 579 } 580 switch (ifr->ifr_addr.sa_family) { 581 #ifdef INET 582 case AF_INET: 583 break; 584 #endif 585 #ifdef INET6 586 case AF_INET6: 587 break; 588 #endif 589 default: 590 error = EAFNOSUPPORT; 591 break; 592 } 593 break; 594 case SIOCDELMULTI: 595 /* 596 * XXXRW: Isn't this priv_check() redundant to the ifnet 597 * layer check? 598 */ 599 if ((error = priv_check(curthread, PRIV_NET_DELIFGROUP)) != 0) 600 break; 601 if (ifr == 0) { 602 error = EAFNOSUPPORT; 603 break; 604 } 605 switch (ifr->ifr_addr.sa_family) { 606 #ifdef INET 607 case AF_INET: 608 break; 609 #endif 610 #ifdef INET6 611 case AF_INET6: 612 break; 613 #endif 614 default: 615 error = EAFNOSUPPORT; 616 break; 617 } 618 break; 619 case GRESPROTO: 620 /* 621 * XXXRW: Isn't this priv_check() redundant to the ifnet 622 * layer check? 623 */ 624 if ((error = priv_check(curthread, PRIV_NET_GRE)) != 0) 625 break; 626 sc->g_proto = ifr->ifr_flags; 627 switch (sc->g_proto) { 628 case IPPROTO_GRE: 629 ifp->if_flags |= IFF_LINK0; 630 break; 631 case IPPROTO_MOBILE: 632 ifp->if_flags &= ~IFF_LINK0; 633 break; 634 default: 635 error = EPROTONOSUPPORT; 636 break; 637 } 638 goto recompute; 639 case GREGPROTO: 640 ifr->ifr_flags = sc->g_proto; 641 break; 642 case GRESADDRS: 643 case GRESADDRD: 644 error = priv_check(curthread, PRIV_NET_GRE); 645 if (error) 646 return (error); 647 /* 648 * set tunnel endpoints, compute a less specific route 649 * to the remote end and mark if as up 650 */ 651 sa = &ifr->ifr_addr; 652 if (cmd == GRESADDRS) 653 sc->g_src = (satosin(sa))->sin_addr; 654 if (cmd == GRESADDRD) 655 sc->g_dst = (satosin(sa))->sin_addr; 656 recompute: 657 #ifdef INET 658 if (sc->encap != NULL) { 659 encap_detach(sc->encap); 660 sc->encap = NULL; 661 } 662 #endif 663 if ((sc->g_src.s_addr != INADDR_ANY) && 664 (sc->g_dst.s_addr != INADDR_ANY)) { 665 bzero(&sp, sizeof(sp)); 666 bzero(&sm, sizeof(sm)); 667 bzero(&dp, sizeof(dp)); 668 bzero(&dm, sizeof(dm)); 669 sp.sin_len = sm.sin_len = dp.sin_len = dm.sin_len = 670 sizeof(struct sockaddr_in); 671 sp.sin_family = sm.sin_family = dp.sin_family = 672 dm.sin_family = AF_INET; 673 sp.sin_addr = sc->g_src; 674 dp.sin_addr = sc->g_dst; 675 sm.sin_addr.s_addr = dm.sin_addr.s_addr = 676 INADDR_BROADCAST; 677 #ifdef INET 678 sc->encap = encap_attach(AF_INET, sc->g_proto, 679 sintosa(&sp), sintosa(&sm), sintosa(&dp), 680 sintosa(&dm), (sc->g_proto == IPPROTO_GRE) ? 681 &in_gre_protosw : &in_mobile_protosw, sc); 682 if (sc->encap == NULL) 683 printf("%s: unable to attach encap\n", 684 if_name(GRE2IFP(sc))); 685 #endif 686 if (sc->route.ro_rt != 0) /* free old route */ 687 RTFREE(sc->route.ro_rt); 688 if (gre_compute_route(sc) == 0) 689 ifp->if_drv_flags |= IFF_DRV_RUNNING; 690 else 691 ifp->if_drv_flags &= ~IFF_DRV_RUNNING; 692 } 693 break; 694 case GREGADDRS: 695 memset(&si, 0, sizeof(si)); 696 si.sin_family = AF_INET; 697 si.sin_len = sizeof(struct sockaddr_in); 698 si.sin_addr.s_addr = sc->g_src.s_addr; 699 sa = sintosa(&si); 700 error = prison_if(curthread->td_ucred, sa); 701 if (error != 0) 702 break; 703 ifr->ifr_addr = *sa; 704 break; 705 case GREGADDRD: 706 memset(&si, 0, sizeof(si)); 707 si.sin_family = AF_INET; 708 si.sin_len = sizeof(struct sockaddr_in); 709 si.sin_addr.s_addr = sc->g_dst.s_addr; 710 sa = sintosa(&si); 711 error = prison_if(curthread->td_ucred, sa); 712 if (error != 0) 713 break; 714 ifr->ifr_addr = *sa; 715 break; 716 case SIOCSIFPHYADDR: 717 /* 718 * XXXRW: Isn't this priv_check() redundant to the ifnet 719 * layer check? 720 */ 721 if ((error = priv_check(curthread, PRIV_NET_SETIFPHYS)) != 0) 722 break; 723 if (aifr->ifra_addr.sin_family != AF_INET || 724 aifr->ifra_dstaddr.sin_family != AF_INET) { 725 error = EAFNOSUPPORT; 726 break; 727 } 728 if (aifr->ifra_addr.sin_len != sizeof(si) || 729 aifr->ifra_dstaddr.sin_len != sizeof(si)) { 730 error = EINVAL; 731 break; 732 } 733 sc->g_src = aifr->ifra_addr.sin_addr; 734 sc->g_dst = aifr->ifra_dstaddr.sin_addr; 735 goto recompute; 736 case SIOCDIFPHYADDR: 737 /* 738 * XXXRW: Isn't this priv_check() redundant to the ifnet 739 * layer check? 740 */ 741 if ((error = priv_check(curthread, PRIV_NET_SETIFPHYS)) != 0) 742 break; 743 sc->g_src.s_addr = INADDR_ANY; 744 sc->g_dst.s_addr = INADDR_ANY; 745 goto recompute; 746 case SIOCGIFPSRCADDR: 747 #ifdef INET6 748 case SIOCGIFPSRCADDR_IN6: 749 #endif 750 if (sc->g_src.s_addr == INADDR_ANY) { 751 error = EADDRNOTAVAIL; 752 break; 753 } 754 memset(&si, 0, sizeof(si)); 755 si.sin_family = AF_INET; 756 si.sin_len = sizeof(struct sockaddr_in); 757 si.sin_addr.s_addr = sc->g_src.s_addr; 758 error = prison_if(curthread->td_ucred, (struct sockaddr *)&si); 759 if (error != 0) 760 break; 761 bcopy(&si, &ifr->ifr_addr, sizeof(ifr->ifr_addr)); 762 break; 763 case SIOCGIFPDSTADDR: 764 #ifdef INET6 765 case SIOCGIFPDSTADDR_IN6: 766 #endif 767 if (sc->g_dst.s_addr == INADDR_ANY) { 768 error = EADDRNOTAVAIL; 769 break; 770 } 771 memset(&si, 0, sizeof(si)); 772 si.sin_family = AF_INET; 773 si.sin_len = sizeof(struct sockaddr_in); 774 si.sin_addr.s_addr = sc->g_dst.s_addr; 775 error = prison_if(curthread->td_ucred, (struct sockaddr *)&si); 776 if (error != 0) 777 break; 778 bcopy(&si, &ifr->ifr_addr, sizeof(ifr->ifr_addr)); 779 break; 780 case GRESKEY: 781 error = priv_check(curthread, PRIV_NET_GRE); 782 if (error) 783 break; 784 error = copyin(ifr->ifr_data, &key, sizeof(key)); 785 if (error) 786 break; 787 /* adjust MTU for option header */ 788 if (key == 0 && sc->key != 0) /* clear */ 789 adj += sizeof(key); 790 else if (key != 0 && sc->key == 0) /* set */ 791 adj -= sizeof(key); 792 793 if (ifp->if_mtu + adj < 576) { 794 error = EINVAL; 795 break; 796 } 797 ifp->if_mtu += adj; 798 sc->key = key; 799 break; 800 case GREGKEY: 801 error = copyout(&sc->key, ifr->ifr_data, sizeof(sc->key)); 802 break; 803 804 default: 805 error = EINVAL; 806 break; 807 } 808 809 return (error); 810 } 811 812 /* 813 * computes a route to our destination that is not the one 814 * which would be taken by ip_output(), as this one will loop back to 815 * us. If the interface is p2p as a--->b, then a routing entry exists 816 * If we now send a packet to b (e.g. ping b), this will come down here 817 * gets src=a, dst=b tacked on and would from ip_output() sent back to 818 * if_gre. 819 * Goal here is to compute a route to b that is less specific than 820 * a-->b. We know that this one exists as in normal operation we have 821 * at least a default route which matches. 822 */ 823 static int 824 gre_compute_route(struct gre_softc *sc) 825 { 826 struct route *ro; 827 828 ro = &sc->route; 829 830 memset(ro, 0, sizeof(struct route)); 831 ((struct sockaddr_in *)&ro->ro_dst)->sin_addr = sc->g_dst; 832 ro->ro_dst.sa_family = AF_INET; 833 ro->ro_dst.sa_len = sizeof(ro->ro_dst); 834 835 /* 836 * toggle last bit, so our interface is not found, but a less 837 * specific route. I'd rather like to specify a shorter mask, 838 * but this is not possible. Should work though. XXX 839 * XXX MRT Use a different FIB for the tunnel to solve this problem. 840 */ 841 if ((GRE2IFP(sc)->if_flags & IFF_LINK1) == 0) { 842 ((struct sockaddr_in *)&ro->ro_dst)->sin_addr.s_addr ^= 843 htonl(0x01); 844 } 845 846 #ifdef DIAGNOSTIC 847 printf("%s: searching for a route to %s", if_name(GRE2IFP(sc)), 848 inet_ntoa(((struct sockaddr_in *)&ro->ro_dst)->sin_addr)); 849 #endif 850 851 rtalloc_fib(ro, sc->gre_fibnum); 852 853 /* 854 * check if this returned a route at all and this route is no 855 * recursion to ourself 856 */ 857 if (ro->ro_rt == NULL || ro->ro_rt->rt_ifp->if_softc == sc) { 858 #ifdef DIAGNOSTIC 859 if (ro->ro_rt == NULL) 860 printf(" - no route found!\n"); 861 else 862 printf(" - route loops back to ourself!\n"); 863 #endif 864 return EADDRNOTAVAIL; 865 } 866 867 /* 868 * now change it back - else ip_output will just drop 869 * the route and search one to this interface ... 870 */ 871 if ((GRE2IFP(sc)->if_flags & IFF_LINK1) == 0) 872 ((struct sockaddr_in *)&ro->ro_dst)->sin_addr = sc->g_dst; 873 874 #ifdef DIAGNOSTIC 875 printf(", choosing %s with gateway %s", if_name(ro->ro_rt->rt_ifp), 876 inet_ntoa(((struct sockaddr_in *)(ro->ro_rt->rt_gateway))->sin_addr)); 877 printf("\n"); 878 #endif 879 880 return 0; 881 } 882 883 /* 884 * do a checksum of a buffer - much like in_cksum, which operates on 885 * mbufs. 886 */ 887 u_int16_t 888 gre_in_cksum(u_int16_t *p, u_int len) 889 { 890 u_int32_t sum = 0; 891 int nwords = len >> 1; 892 893 while (nwords-- != 0) 894 sum += *p++; 895 896 if (len & 1) { 897 union { 898 u_short w; 899 u_char c[2]; 900 } u; 901 u.c[0] = *(u_char *)p; 902 u.c[1] = 0; 903 sum += u.w; 904 } 905 906 /* end-around-carry */ 907 sum = (sum >> 16) + (sum & 0xffff); 908 sum += (sum >> 16); 909 return (~sum); 910 } 911 912 static int 913 gremodevent(module_t mod, int type, void *data) 914 { 915 916 switch (type) { 917 case MOD_LOAD: 918 greattach(); 919 break; 920 case MOD_UNLOAD: 921 if_clone_detach(gre_cloner); 922 mtx_destroy(&gre_mtx); 923 break; 924 default: 925 return EOPNOTSUPP; 926 } 927 return 0; 928 } 929 930 static moduledata_t gre_mod = { 931 "if_gre", 932 gremodevent, 933 0 934 }; 935 936 DECLARE_MODULE(if_gre, gre_mod, SI_SUB_PSEUDO, SI_ORDER_ANY); 937 MODULE_VERSION(if_gre, 1); 938