1 /* $NetBSD: ip_gre.c,v 1.29 2003/09/05 23:02:43 itojun Exp $ */
4 * Copyright (c) 1998 The NetBSD Foundation, Inc.
7 * This code is derived from software contributed to The NetBSD Foundation
8 * by Heiko W.Rupp <hwr@pilhuhn.de>
10 * IPv6-over-GRE contributed by Gert Doering <gert@greenie.muc.de>
12 * Redistribution and use in source and binary forms, with or without
13 * modification, are permitted provided that the following conditions
15 * 1. Redistributions of source code must retain the above copyright
16 * notice, this list of conditions and the following disclaimer.
17 * 2. Redistributions in binary form must reproduce the above copyright
18 * notice, this list of conditions and the following disclaimer in the
19 * documentation and/or other materials provided with the distribution.
21 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
22 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
23 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
24 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
25 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
26 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
27 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
28 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
29 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
30 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
31 * POSSIBILITY OF SUCH DAMAGE.
35 * deencapsulate tunneled packets and send them on
36 * output half is in net/if_gre.[ch]
37 * This currently handles IPPROTO_GRE, IPPROTO_MOBILE
40 #include <sys/cdefs.h>
41 __FBSDID("$FreeBSD$");
44 #include "opt_inet6.h"
46 #include <sys/param.h>
47 #include <sys/systm.h>
49 #include <sys/socket.h>
50 #include <sys/socketvar.h>
51 #include <sys/protosw.h>
52 #include <sys/errno.h>
54 #include <sys/kernel.h>
55 #include <sys/syslog.h>
57 #include <net/ethernet.h>
59 #include <net/if_var.h>
60 #include <net/netisr.h>
61 #include <net/route.h>
62 #include <net/raw_cb.h>
65 #include <netinet/in.h>
66 #include <netinet/in_var.h>
67 #include <netinet/in_systm.h>
68 #include <netinet/ip.h>
69 #include <netinet/ip_var.h>
70 #include <netinet/ip_gre.h>
71 #include <machine/in_cksum.h>
73 #error "ip_gre requires INET"
76 /* Needs IP headers. */
77 #include <net/if_gre.h>
79 #include <machine/stdarg.h>
82 void gre_inet_ntoa(struct in_addr in); /* XXX */
85 static struct gre_softc *gre_lookup(struct mbuf *, u_int8_t);
87 static struct mbuf *gre_input2(struct mbuf *, int, u_char);
90 * De-encapsulate a packet and feed it back through ip input (this
91 * routine is called whenever IP gets a packet with proto type
92 * IPPROTO_GRE and a local destination address).
93 * This really is simple
96 gre_input(struct mbuf **mp, int *offp, int proto)
105 m = gre_input2(m, off, proto);
108 * If no matching tunnel that is up is found. We inject
109 * the mbuf to raw ip socket to see if anyone picks it up.
113 rip_input(mp, offp, proto);
115 return (IPPROTO_DONE);
119 * Decapsulate. Does the real work and is called from gre_input()
120 * (above). Returns an mbuf back if packet is not yet processed,
121 * and NULL if it needs no further processing. proto is the protocol
122 * number of the "calling" foo_input() routine.
125 gre_input2(struct mbuf *m ,int hlen, u_char proto)
129 struct gre_softc *sc;
133 if ((sc = gre_lookup(m, proto)) == NULL) {
134 /* No matching tunnel or tunnel is down. */
138 if (m->m_len < sizeof(*gip)) {
139 m = m_pullup(m, sizeof(*gip));
143 gip = mtod(m, struct greip *);
145 if_inc_counter(GRE2IFP(sc), IFCOUNTER_IPACKETS, 1);
146 if_inc_counter(GRE2IFP(sc), IFCOUNTER_IBYTES, m->m_pkthdr.len);
150 hlen += sizeof(struct gre_h);
152 /* process GRE flags as packet can be of variable len */
153 flags = ntohs(gip->gi_flags);
155 /* Checksum & Offset are present */
156 if ((flags & GRE_CP) | (flags & GRE_RP))
158 /* We don't support routing fields (variable length) */
166 switch (ntohs(gip->gi_ptype)) { /* ethertypes */
167 case WCCP_PROTOCOL_TYPE:
168 if (sc->wccp_ver == WCCP_V2)
171 case ETHERTYPE_IP: /* shouldn't need a schednetisr(), */
172 isr = NETISR_IP;/* as we are in ip_input */
182 /* Others not yet supported. */
187 /* Others not yet supported. */
191 if (hlen > m->m_pkthdr.len) {
195 /* Unlike NetBSD, in FreeBSD m_adj() adjusts m->m_pkthdr.len as well */
198 if (bpf_peers_present(GRE2IFP(sc)->if_bpf)) {
199 bpf_mtap2(GRE2IFP(sc)->if_bpf, &af, sizeof(af), m);
202 if ((GRE2IFP(sc)->if_flags & IFF_MONITOR) != 0) {
207 m->m_pkthdr.rcvif = GRE2IFP(sc);
209 netisr_queue(isr, m);
211 /* Packet is done, no further processing needed. */
216 * input routine for IPPRPOTO_MOBILE
217 * This is a little bit diffrent from the other modes, as the
218 * encapsulating header was not prepended, but instead inserted
219 * between IP header and payload
223 gre_mobile_input(struct mbuf **mp, int *offp, int proto)
228 struct gre_softc *sc;
232 if ((sc = gre_lookup(m, IPPROTO_MOBILE)) == NULL) {
233 /* No matching tunnel or tunnel is down. */
235 return (IPPROTO_DONE);
238 if (m->m_len < sizeof(*mip)) {
239 m = m_pullup(m, sizeof(*mip));
241 return (IPPROTO_DONE);
243 ip = mtod(m, struct ip *);
244 mip = mtod(m, struct mobip_h *);
246 if_inc_counter(GRE2IFP(sc), IFCOUNTER_IPACKETS, 1);
247 if_inc_counter(GRE2IFP(sc), IFCOUNTER_IBYTES, m->m_pkthdr.len);
249 if (ntohs(mip->mh.proto) & MOB_H_SBIT) {
251 mip->mi.ip_src.s_addr = mip->mh.osrc;
255 if (m->m_len < (ip->ip_hl << 2) + msiz) {
256 m = m_pullup(m, (ip->ip_hl << 2) + msiz);
258 return (IPPROTO_DONE);
259 ip = mtod(m, struct ip *);
260 mip = mtod(m, struct mobip_h *);
263 mip->mi.ip_dst.s_addr = mip->mh.odst;
264 mip->mi.ip_p = (ntohs(mip->mh.proto) >> 8);
266 if (gre_in_cksum((u_int16_t *)&mip->mh, msiz) != 0) {
268 return (IPPROTO_DONE);
271 bcopy((caddr_t)(ip) + (ip->ip_hl << 2) + msiz, (caddr_t)(ip) +
272 (ip->ip_hl << 2), m->m_len - msiz - (ip->ip_hl << 2));
274 m->m_pkthdr.len -= msiz;
277 * On FreeBSD, rip_input() supplies us with ip->ip_len
278 * decreased by the lengh of IP header, however, ip_input()
279 * expects it to be full size of IP packet, so adjust accordingly.
281 ip->ip_len = htons(ntohs(ip->ip_len) + sizeof(struct ip) - msiz);
284 ip->ip_sum = in_cksum(m, (ip->ip_hl << 2));
286 if (bpf_peers_present(GRE2IFP(sc)->if_bpf)) {
287 u_int32_t af = AF_INET;
288 bpf_mtap2(GRE2IFP(sc)->if_bpf, &af, sizeof(af), m);
291 if ((GRE2IFP(sc)->if_flags & IFF_MONITOR) != 0) {
293 return (IPPROTO_DONE);
296 m->m_pkthdr.rcvif = GRE2IFP(sc);
298 netisr_queue(NETISR_IP, m);
299 return (IPPROTO_DONE);
303 * Find the gre interface associated with our src/dst/proto set.
305 * XXXRW: Need some sort of drain/refcount mechanism so that the softc
306 * reference remains valid after it's returned from gre_lookup(). Right
307 * now, I'm thinking it should be reference-counted with a gre_dropref()
308 * when the caller is done with the softc. This is complicated by how
309 * to handle destroying the gre softc; probably using a gre_drain() in
310 * in_gre.c during destroy.
312 static struct gre_softc *
313 gre_lookup(struct mbuf *m, u_int8_t proto)
315 struct ip *ip = mtod(m, struct ip *);
316 struct gre_softc *sc;
319 for (sc = LIST_FIRST(&V_gre_softc_list); sc != NULL;
320 sc = LIST_NEXT(sc, sc_list)) {
321 if ((sc->g_dst.s_addr == ip->ip_src.s_addr) &&
322 (sc->g_src.s_addr == ip->ip_dst.s_addr) &&
323 (sc->g_proto == proto) &&
324 ((GRE2IFP(sc)->if_flags & IFF_UP) != 0)) {