xref: /dragonfly/sys/netinet/ip_gre.c (revision 2cd2d2b5)
1 /*
2  * $NetBSD: ip_gre.c,v 1.21 2002/08/14 00:23:30 itojun Exp $
3  * $DragonFly: src/sys/netinet/ip_gre.c,v 1.7 2004/06/03 18:30:03 joerg Exp $
4  *
5  * Copyright (c) 1998 The NetBSD Foundation, Inc.
6  * All rights reserved.
7  *
8  * This code is derived from software contributed to The NetBSD Foundation
9  * by Heiko W.Rupp <hwr@pilhuhn.de>
10  *
11  * Redistribution and use in source and binary forms, with or without
12  * modification, are permitted provided that the following conditions
13  * are met:
14  * 1. Redistributions of source code must retain the above copyright
15  *    notice, this list of conditions and the following disclaimer.
16  * 2. Redistributions in binary form must reproduce the above copyright
17  *    notice, this list of conditions and the following disclaimer in the
18  *    documentation and/or other materials provided with the distribution.
19  * 3. All advertising materials mentioning features or use of this software
20  *    must display the following acknowledgement:
21  *        This product includes software developed by the NetBSD
22  *        Foundation, Inc. and its contributors.
23  * 4. Neither the name of The NetBSD Foundation nor the names of its
24  *    contributors may be used to endorse or promote products derived
25  *    from this software without specific prior written permission.
26  *
27  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
28  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
29  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
30  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
31  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
32  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
33  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
34  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
35  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
36  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
37  * POSSIBILITY OF SUCH DAMAGE.
38  */
39 
40 /*
41  * deencapsulate tunneled packets and send them on
42  * output half is in net/if_gre.[ch]
43  * This currently handles IPPROTO_GRE, IPPROTO_MOBILE
44  */
45 
46 #include "opt_inet.h"
47 #include "opt_ns.h"
48 #include "opt_atalk.h"
49 
50 #include <sys/param.h>
51 #include <sys/systm.h>
52 #include <sys/mbuf.h>
53 #include <sys/socket.h>
54 #include <sys/socketvar.h>
55 #include <sys/protosw.h>
56 #include <sys/errno.h>
57 #include <sys/time.h>
58 #include <sys/kernel.h>
59 #include <sys/syslog.h>
60 #include <sys/in_cksum.h>
61 #include <net/bpf.h>
62 #include <net/ethernet.h>
63 #include <net/if.h>
64 #include <net/netisr.h>
65 #include <net/route.h>
66 #include <net/raw_cb.h>
67 
68 #ifdef INET
69 #include <netinet/in.h>
70 #include <netinet/in_var.h>
71 #include <netinet/in_systm.h>
72 #include <netinet/ip.h>
73 #include <netinet/ip_var.h>
74 #include <netinet/ip_gre.h>
75 #else
76 #error ip_gre input without IP?
77 #endif
78 
79 #ifdef NS
80 #include <netproto/ns/ns.h>
81 #include <netproto/ns/ns_if.h>
82 #endif
83 
84 #ifdef NETATALK
85 #include <netproto/atalk/at.h>
86 #include <netproto/atalk/at_var.h>
87 #include <netproto/atalk/at_extern.h>
88 #endif
89 
90 /* Needs IP headers. */
91 #include <net/gre/if_gre.h>
92 
93 #include <machine/stdarg.h>
94 
95 #if 1
96 void gre_inet_ntoa(struct in_addr in); 	/* XXX */
97 #endif
98 
99 static struct gre_softc *gre_lookup(struct mbuf *, u_int8_t);
100 
101 static int	gre_input2(struct mbuf *, int, u_char);
102 
103 /*
104  * De-encapsulate a packet and feed it back through ip input (this
105  * routine is called whenever IP gets a packet with proto type
106  * IPPROTO_GRE and a local destination address).
107  * This really is simple
108  */
109 void
110 gre_input(struct mbuf *m, ...)
111 {
112 	int ret, off, proto;
113 	__va_list ap;
114 
115 	__va_start(ap, m);
116 	off = __va_arg(ap, int);
117 	__va_end(ap);
118 
119 	proto = (mtod(m, struct ip *))->ip_p;
120 
121 	ret = gre_input2(m, off, proto);
122 	/*
123 	 * ret == 0 : packet not processed, meaning that
124 	 * no matching tunnel that is up is found.
125 	 * we inject it to raw ip socket to see if anyone picks it up.
126 	 */
127 	if (ret == 0)
128 		rip_input(m, off, proto);
129 }
130 
131 /*
132  * decapsulate.
133  * Does the real work and is called from gre_input() (above)
134  * returns 0 if packet is not yet processed
135  * and 1 if it needs no further processing
136  * proto is the protocol number of the "calling" foo_input()
137  * routine.
138  */
139 
140 static int
141 gre_input2(struct mbuf *m ,int hlen, u_char proto)
142 {
143 	struct greip *gip = mtod(m, struct greip *);
144 	int isr;
145 	struct gre_softc *sc;
146 	u_short flags;
147 
148 	if ((sc = gre_lookup(m, proto)) == NULL) {
149 		/* No matching tunnel or tunnel is down. */
150 		return (0);
151 	}
152 
153 	sc->sc_if.if_ipackets++;
154 	sc->sc_if.if_ibytes += m->m_pkthdr.len;
155 
156 	switch (proto) {
157 	case IPPROTO_GRE:
158 		hlen += sizeof (struct gre_h);
159 
160 		/* process GRE flags as packet can be of variable len */
161 		flags = ntohs(gip->gi_flags);
162 
163 		/* Checksum & Offset are present */
164 		if ((flags & GRE_CP) | (flags & GRE_RP))
165 			hlen += 4;
166 		/* We don't support routing fields (variable length) */
167 		if (flags & GRE_RP)
168 			return(0);
169 		if (flags & GRE_KP)
170 			hlen += 4;
171 		if (flags & GRE_SP)
172 			hlen +=4;
173 
174 		switch (ntohs(gip->gi_ptype)) { /* ethertypes */
175 		case ETHERTYPE_IP:
176 		case WCCP_PROTOCOL_TYPE:
177 			isr = NETISR_IP;
178 			break;
179 #ifdef NS
180 		case ETHERTYPE_NS:
181 			isr = NETISR_NS;
182 			break;
183 #endif
184 #ifdef NETATALK
185 		case ETHERTYPE_ATALK:
186 			isr = NETISR_ATALK1;
187 			break;
188 #endif
189 		case ETHERTYPE_IPV6:
190 			/* FALLTHROUGH */
191 		default:	   /* others not yet supported */
192 			return(0);
193 		}
194 		break;
195 	default:
196 		/* others not yet supported */
197 		return(0);
198 	}
199 
200 	m->m_data += hlen;
201 	m->m_len -= hlen;
202 	m->m_pkthdr.len -= hlen;
203 
204 	if (sc->sc_if.if_bpf) {
205 		struct mbuf m0;
206 		u_int32_t af = AF_INET;
207 
208 		m0.m_next = m;
209 		m0.m_len = 4;
210 		m0.m_data = (char *)&af;
211 
212 		bpf_mtap(&(sc->sc_if), &m0);
213 	}
214 
215 	m->m_pkthdr.rcvif = &sc->sc_if;
216 	netisr_dispatch(isr, m);
217 	return(1);	/* packet is done, no further processing needed */
218 }
219 
220 /*
221  * input routine for IPPRPOTO_MOBILE
222  * This is a little bit diffrent from the other modes, as the
223  * encapsulating header was not prepended, but instead inserted
224  * between IP header and payload
225  */
226 
227 void
228 gre_mobile_input(struct mbuf *m, ...)
229 {
230 	struct ip *ip = mtod(m, struct ip *);
231 	struct mobip_h *mip = mtod(m, struct mobip_h *);
232 	struct gre_softc *sc;
233 	u_char osrc = 0;
234 	int msiz, hlen;
235 	__va_list ap;
236 
237 	__va_start(ap, m);
238 	hlen = __va_arg(ap, int);
239 	__va_end(ap);
240 
241 	if ((sc = gre_lookup(m, IPPROTO_MOBILE)) == NULL) {
242 		/* No matching tunnel or tunnel is down. */
243 		m_freem(m);
244 		return;
245 	}
246 
247 	sc->sc_if.if_ipackets++;
248 	sc->sc_if.if_ibytes += m->m_pkthdr.len;
249 
250 	if(ntohs(mip->mh.proto) & MOB_H_SBIT) {
251 		osrc = 1;
252 		msiz = MOB_H_SIZ_L;
253 		mip->mi.ip_src.s_addr = mip->mh.osrc;
254 	} else {
255 		msiz = MOB_H_SIZ_S;
256 	}
257 	mip->mi.ip_dst.s_addr = mip->mh.odst;
258 	mip->mi.ip_p = (ntohs(mip->mh.proto) >> 8);
259 
260 	if (gre_in_cksum((u_short*)&mip->mh,msiz) != 0) {
261 		m_freem(m);
262 		return;
263 	}
264 
265 	bcopy((caddr_t)(ip) + (ip->ip_hl << 2) + msiz, (caddr_t)(ip) +
266 	    (ip->ip_hl << 2), m->m_len - msiz - (ip->ip_hl << 2));
267 	m->m_len -= msiz;
268 	m->m_pkthdr.len -= msiz;
269 
270 	/*
271 	 * On FreeBSD, rip_input() supplies us with ip->ip_len
272 	 * already converted into host byteorder and also decreases
273 	 * it by the lengh of IP header, however, ip_input() expects
274 	 * that this field is in the original format (network byteorder
275 	 * and full size of IP packet), so that adjust accordingly.
276 	 */
277 	ip->ip_len = htons(ip->ip_len + sizeof(struct ip) - msiz);
278 
279 	ip->ip_sum = 0;
280 	ip->ip_sum = in_cksum(m, (ip->ip_hl << 2));
281 
282 	if (sc->sc_if.if_bpf) {
283 		struct mbuf m0;
284 		u_int af = AF_INET;
285 
286 		m0.m_next = m;
287 		m0.m_len = 4;
288 		m0.m_data = (char *)&af;
289 
290 		bpf_mtap(&(sc->sc_if), &m0);
291 	}
292 
293 	m->m_pkthdr.rcvif = &sc->sc_if;
294 
295 	netisr_dispatch(NETISR_IP, m);
296 }
297 
298 /*
299  * Find the gre interface associated with our src/dst/proto set.
300  */
301 static struct gre_softc *
302 gre_lookup(m, proto)
303 	struct mbuf *m;
304 	u_int8_t proto;
305 {
306 	struct ip *ip = mtod(m, struct ip *);
307 	struct gre_softc *sc;
308 
309 	for (sc = LIST_FIRST(&gre_softc_list); sc != NULL;
310 	     sc = LIST_NEXT(sc, sc_list)) {
311 		if ((sc->g_dst.s_addr == ip->ip_src.s_addr) &&
312 		    (sc->g_src.s_addr == ip->ip_dst.s_addr) &&
313 		    (sc->g_proto == proto) &&
314 		    ((sc->sc_if.if_flags & IFF_UP) != 0))
315 			return (sc);
316 	}
317 
318 	return (NULL);
319 }
320