/* $OpenBSD: ip_gre.c,v 1.7 2001/02/09 19:59:10 angelos Exp $ */ /* $NetBSD: ip_gre.c,v 1.9 1999/10/25 19:18:11 drochner Exp $ */ /* * Copyright (c) 1998 The NetBSD Foundation, Inc. * All rights reserved. * * This code is derived from software contributed to The NetBSD Foundation * by Heiko W.Rupp * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * This product includes software developed by the NetBSD * Foundation, Inc. and its contributors. * 4. Neither the name of The NetBSD Foundation nor the names of its * contributors may be used to endorse or promote products derived * from this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE * POSSIBILITY OF SUCH DAMAGE. */ /* * decapsulate tunneled packets and send them on * output half is in net/if_gre.[ch] * This currently handles IPPROTO_GRE, IPPROTO_MOBILE */ #include "gre.h" #if NGRE > 0 #include #include #include #include #include #include #include #include #include #include #ifdef INET #include #include #include #include #include #include #else #error "ip_gre used without inet" #endif #ifdef NS #include #include #endif #ifdef NETATALK #include #include #include #endif #include "bpfilter.h" /* Needs IP headers. */ #include #include struct gre_softc *gre_lookup __P((struct mbuf *, u_int8_t)); static int gre_input2 __P((struct mbuf *, int, u_char)); /* * Decapsulate. * Does the real work and is called from gre_input() (above) * returns 0 if packet is not yet processed * and 1 if it needs no further processing * proto is the protocol number of the "calling" foo_input() * routine. */ static int gre_input2(m , hlen, proto) struct mbuf *m; int hlen; u_char proto; { register struct greip *gip = mtod(m, struct greip *); register int s; register struct ifqueue *ifq; struct gre_softc *sc; u_short flags; u_int af; if ((sc = gre_lookup(m, proto)) == NULL) { /* No matching tunnel or tunnel is down. */ return (0); } m->m_pkthdr.rcvif = &sc->sc_if; printf("%s\n", sc->sc_if.if_xname); sc->sc_if.if_ipackets++; sc->sc_if.if_ibytes += m->m_pkthdr.len; switch (proto) { case IPPROTO_GRE: hlen += sizeof (struct gre_h); /* process GRE flags as packet can be of variable len */ flags = ntohs(gip->gi_flags); /* Checksum & Offset are present */ if ((flags & GRE_CP) | (flags & GRE_RP)) hlen += 4; /* We don't support routing fields (variable length) */ if (flags & GRE_RP) return (0); if (flags & GRE_KP) hlen += 4; if (flags & GRE_SP) hlen += 4; switch (ntohs(gip->gi_ptype)) { /* ethertypes */ case ETHERTYPE_IP: /* shouldn't need a schednetisr(), as */ ifq = &ipintrq; /* we are in ip_input */ af = AF_INET; break; #ifdef NS case ETHERTYPE_NS: ifq = &nsintrq; schednetisr(NETISR_NS); af = AF_NS; break; #endif #ifdef NETATALK case ETHERTYPE_AT: ifq = &atintrq1; schednetisr(NETISR_ATALK); af = AF_APPLETALK; break; #endif #ifdef INET6 case ETHERTYPE_IPV6: ifq = &ip6intrq; schednetisr(NETISR_IPV6); af = AF_INET6; break; #endif /* INET6 */ default: /* others not yet supported */ return (0); } break; default: /* others not yet supported */ return(0); } m->m_data += hlen; m->m_len -= hlen; m->m_pkthdr.len -= hlen; #if NBPFILTER > 0 if (sc->sc_if.if_bpf) { /* * We need to prepend the address family as * a four byte field. Cons up a fake header * to pacify bpf. This is safe because bpf * will only read from the mbuf (i.e., it won't * try to free it or keep a pointer a to it). */ struct mbuf m0; m0.m_next = m; m0.m_len = 4; m0.m_data = (char *) ⁡ bpf_mtap(sc->sc_if.if_bpf, &m0); } #endif s = splimp(); /* possible */ if (IF_QFULL(ifq)) { IF_DROP(ifq); m_freem(m); } else { IF_ENQUEUE(ifq, m); } splx(s); return (1); /* packet is done, no further processing needed */ } /* * Decapsulate a packet and feed it back through ip_input (this * routine is called whenever IP gets a packet with proto type * IPPROTO_GRE and a local destination address). */ void #if __STDC__ gre_input(struct mbuf *m, ...) #else gre_input(m, va_alist) struct mbuf *m; va_dcl #endif { register int hlen,ret; va_list ap; va_start(ap, m); hlen = va_arg(ap, int); va_end(ap); if (!gre_allow) { m_freem(m); return; } ret = gre_input2(m, hlen, IPPROTO_GRE); /* * ret == 0: packet not processed, but input from here * means no matching tunnel that is up is found, * so we can just free the mbuf and return */ if (!ret) m_freem(m); } /* * Input routine for IPPRPOTO_MOBILE. * This is a little bit diffrent from the other modes, as the * encapsulating header was not prepended, but instead inserted * between IP header and payload. */ void #if __STDC__ gre_mobile_input(struct mbuf *m, ...) #else gre_mobile_input(m, va_alist) struct mbuf *m; va_dcl #endif { register struct ip *ip = mtod(m, struct ip *); register struct mobip_h *mip = mtod(m, struct mobip_h *); register struct ifqueue *ifq; struct gre_softc *sc; register int hlen,s; va_list ap; u_char osrc = 0; int msiz; u_int af = AF_INET; va_start(ap,m); hlen = va_arg(ap, int); va_end(ap); if (!ip_mobile_allow) { m_freem(m); return; } if ((sc = gre_lookup(m, IPPROTO_MOBILE)) == NULL) { /* No matching tunnel or tunnel is down. */ m_freem(m); return; } m->m_pkthdr.rcvif = &sc->sc_if; sc->sc_if.if_ipackets++; sc->sc_if.if_ibytes += m->m_pkthdr.len; if(ntohs(mip->mh.proto) & MOB_H_SBIT) { osrc = 1; msiz = MOB_H_SIZ_L; mip->mi.ip_src.s_addr = mip->mh.osrc; } else { msiz = MOB_H_SIZ_S; } mip->mi.ip_dst.s_addr = mip->mh.odst; mip->mi.ip_p = (ntohs(mip->mh.proto) >> 8); if (gre_in_cksum((u_short*) &mip->mh,msiz) != 0) { m_freem(m); return; } bcopy(ip + (ip->ip_hl << 2) + msiz, ip + (ip->ip_hl << 2), m->m_len - msiz - (ip->ip_hl << 2)); m->m_len -= msiz; ip->ip_len -= msiz; HTONS(ip->ip_len); m->m_pkthdr.len -= msiz; ip->ip_sum = 0; ip->ip_sum = in_cksum(m,(ip->ip_hl << 2)); ifq = &ipintrq; #if NBPFILTER > 0 if (sc->sc_if.if_bpf) { /* * We need to prepend the address family as * a four byte field. Cons up a fake header * to pacify bpf. This is safe because bpf * will only read from the mbuf (i.e., it won't * try to free it or keep a pointer a to it). */ struct mbuf m0; m0.m_next = m; m0.m_len = 4; m0.m_data = (char *) ⁡ bpf_mtap(sc->sc_if.if_bpf, &m0); } #endif s = splimp(); /* possible */ if (IF_QFULL(ifq)) { IF_DROP(ifq); m_freem(m); } else { IF_ENQUEUE(ifq, m); } splx(s); } /* * Find the gre interface associated with our src/dst/proto set. */ struct gre_softc * gre_lookup(m, proto) struct mbuf *m; u_int8_t proto; { struct ip *ip = mtod(m, struct ip *); struct gre_softc *sc; int i; for (i = 0; i < NGRE; i++) { sc = &gre_softc[i]; if ((sc->g_dst.s_addr == ip->ip_src.s_addr) && (sc->g_src.s_addr == ip->ip_dst.s_addr) && (sc->g_proto == proto) && ((sc->sc_if.if_flags & IFF_UP) != 0)) return (sc); } return (NULL); } int gre_sysctl(name, namelen, oldp, oldlenp, newp, newlen) int *name; u_int namelen; void *oldp; size_t *oldlenp; void *newp; size_t newlen; { /* All sysctl names at this level are terminal. */ if (namelen != 1) return (ENOTDIR); switch (name[0]) { case GRECTL_ALLOW: return (sysctl_int(oldp, oldlenp, newp, newlen, &gre_allow)); default: return (ENOPROTOOPT); } /* NOTREACHED */ } int ipmobile_sysctl(name, namelen, oldp, oldlenp, newp, newlen) int *name; u_int namelen; void *oldp; size_t *oldlenp; void *newp; size_t newlen; { /* All sysctl names at this level are terminal. */ if (namelen != 1) return (ENOTDIR); switch (name[0]) { case MOBILEIPCTL_ALLOW: return (sysctl_int(oldp, oldlenp, newp, newlen, &ip_mobile_allow)); default: return (ENOPROTOOPT); } /* NOTREACHED */ } #endif /* if NGRE > 0 */