]> Pileus Git - ~andy/linux/blobdiff - net/ipv6/sit.c
[IPV6]: Use ipv6_addr_equal() instead of !ipv6_addr_cmp().
[~andy/linux] / net / ipv6 / sit.c
index 71433d29d8846e162f0be47bf200768958bb9a44..91e46fbe6ce2e0ec0722ad2af6a91858721dd15b 100644 (file)
@@ -16,6 +16,7 @@
  *     Changes:
  * Roger Venning <r.venning@telstra.com>:      6to4 support
  * Nate Thompson <nate@thebog.net>:            6to4 support
+ * Fred Templin <fred.l.templin@boeing.com>:   isatap support
  */
 
 #include <linux/module.h>
@@ -163,39 +164,212 @@ static struct ip_tunnel * ipip6_tunnel_locate(struct ip_tunnel_parm *parms, int
 
        if (parms->name[0])
                strlcpy(name, parms->name, IFNAMSIZ);
-       else {
-               int i;
-               for (i=1; i<100; i++) {
-                       sprintf(name, "sit%d", i);
-                       if (__dev_get_by_name(&init_net, name) == NULL)
-                               break;
-               }
-               if (i==100)
-                       goto failed;
-       }
+       else
+               sprintf(name, "sit%%d");
 
        dev = alloc_netdev(sizeof(*t), name, ipip6_tunnel_setup);
        if (dev == NULL)
                return NULL;
 
+       if (strchr(name, '%')) {
+               if (dev_alloc_name(dev, name) < 0)
+                       goto failed_free;
+       }
+
        nt = netdev_priv(dev);
        dev->init = ipip6_tunnel_init;
        nt->parms = *parms;
 
-       if (register_netdevice(dev) < 0) {
-               free_netdev(dev);
-               goto failed;
-       }
+       if (parms->i_flags & SIT_ISATAP)
+               dev->priv_flags |= IFF_ISATAP;
+
+       if (register_netdevice(dev) < 0)
+               goto failed_free;
 
        dev_hold(dev);
 
        ipip6_tunnel_link(nt);
        return nt;
 
+failed_free:
+       free_netdev(dev);
 failed:
        return NULL;
 }
 
+static struct ip_tunnel_prl_entry *
+__ipip6_tunnel_locate_prl(struct ip_tunnel *t, __be32 addr)
+{
+       struct ip_tunnel_prl_entry *p = (struct ip_tunnel_prl_entry *)NULL;
+
+       for (p = t->prl; p; p = p->next)
+               if (p->addr == addr)
+                       break;
+       return p;
+
+}
+
+static int ipip6_tunnel_get_prl(struct ip_tunnel *t, struct ip_tunnel_prl *a)
+{
+       struct ip_tunnel_prl *kp;
+       struct ip_tunnel_prl_entry *prl;
+       unsigned int cmax, c = 0, ca, len;
+       int ret = 0;
+
+       cmax = a->datalen / sizeof(*a);
+       if (cmax > 1 && a->addr != htonl(INADDR_ANY))
+               cmax = 1;
+
+       /* For simple GET or for root users,
+        * we try harder to allocate.
+        */
+       kp = (cmax <= 1 || capable(CAP_NET_ADMIN)) ?
+               kcalloc(cmax, sizeof(*kp), GFP_KERNEL) :
+               NULL;
+
+       read_lock(&ipip6_lock);
+
+       ca = t->prl_count < cmax ? t->prl_count : cmax;
+
+       if (!kp) {
+               /* We don't try hard to allocate much memory for
+                * non-root users.
+                * For root users, retry allocating enough memory for
+                * the answer.
+                */
+               kp = kcalloc(ca, sizeof(*kp), GFP_ATOMIC);
+               if (!kp) {
+                       ret = -ENOMEM;
+                       goto out;
+               }
+       }
+
+       c = 0;
+       for (prl = t->prl; prl; prl = prl->next) {
+               if (c > cmax)
+                       break;
+               if (a->addr != htonl(INADDR_ANY) && prl->addr != a->addr)
+                       continue;
+               kp[c].addr = prl->addr;
+               kp[c].flags = prl->flags;
+               c++;
+               if (a->addr != htonl(INADDR_ANY))
+                       break;
+       }
+out:
+       read_unlock(&ipip6_lock);
+
+       len = sizeof(*kp) * c;
+       ret = len ? copy_to_user(a->data, kp, len) : 0;
+
+       kfree(kp);
+       if (ret)
+               return -EFAULT;
+
+       a->datalen = len;
+       return 0;
+}
+
+static int
+ipip6_tunnel_add_prl(struct ip_tunnel *t, struct ip_tunnel_prl *a, int chg)
+{
+       struct ip_tunnel_prl_entry *p;
+       int err = 0;
+
+       if (a->addr == htonl(INADDR_ANY))
+               return -EINVAL;
+
+       write_lock(&ipip6_lock);
+
+       for (p = t->prl; p; p = p->next) {
+               if (p->addr == a->addr) {
+                       if (chg)
+                               goto update;
+                       err = -EEXIST;
+                       goto out;
+               }
+       }
+
+       if (chg) {
+               err = -ENXIO;
+               goto out;
+       }
+
+       p = kzalloc(sizeof(struct ip_tunnel_prl_entry), GFP_KERNEL);
+       if (!p) {
+               err = -ENOBUFS;
+               goto out;
+       }
+
+       p->next = t->prl;
+       t->prl = p;
+       t->prl_count++;
+update:
+       p->addr = a->addr;
+       p->flags = a->flags;
+out:
+       write_unlock(&ipip6_lock);
+       return err;
+}
+
+static int
+ipip6_tunnel_del_prl(struct ip_tunnel *t, struct ip_tunnel_prl *a)
+{
+       struct ip_tunnel_prl_entry *x, **p;
+       int err = 0;
+
+       write_lock(&ipip6_lock);
+
+       if (a && a->addr != htonl(INADDR_ANY)) {
+               for (p = &t->prl; *p; p = &(*p)->next) {
+                       if ((*p)->addr == a->addr) {
+                               x = *p;
+                               *p = x->next;
+                               kfree(x);
+                               t->prl_count--;
+                               goto out;
+                       }
+               }
+               err = -ENXIO;
+       } else {
+               while (t->prl) {
+                       x = t->prl;
+                       t->prl = t->prl->next;
+                       kfree(x);
+                       t->prl_count--;
+               }
+       }
+out:
+       write_unlock(&ipip6_lock);
+       return 0;
+}
+
+static int
+isatap_chksrc(struct sk_buff *skb, struct iphdr *iph, struct ip_tunnel *t)
+{
+       struct ip_tunnel_prl_entry *p;
+       int ok = 1;
+
+       read_lock(&ipip6_lock);
+       p = __ipip6_tunnel_locate_prl(t, iph->saddr);
+       if (p) {
+               if (p->flags & PRL_DEFAULT)
+                       skb->ndisc_nodetype = NDISC_NODETYPE_DEFAULT;
+               else
+                       skb->ndisc_nodetype = NDISC_NODETYPE_NODEFAULT;
+       } else {
+               struct in6_addr *addr6 = &ipv6_hdr(skb)->saddr;
+               if (ipv6_addr_is_isatap(addr6) &&
+                   (addr6->s6_addr32[3] == iph->saddr) &&
+                   ipv6_chk_prefix(addr6, t->dev))
+                       skb->ndisc_nodetype = NDISC_NODETYPE_HOST;
+               else
+                       ok = 0;
+       }
+       read_unlock(&ipip6_lock);
+       return ok;
+}
+
 static void ipip6_tunnel_uninit(struct net_device *dev)
 {
        if (dev == ipip6_fb_tunnel_dev) {
@@ -205,6 +379,7 @@ static void ipip6_tunnel_uninit(struct net_device *dev)
                dev_put(dev);
        } else {
                ipip6_tunnel_unlink(netdev_priv(dev));
+               ipip6_tunnel_del_prl(netdev_priv(dev), NULL);
                dev_put(dev);
        }
 }
@@ -338,11 +513,11 @@ out:
        skb_reset_network_header(skb2);
 
        /* Try to guess incoming interface */
-       rt6i = rt6_lookup(&iph6->saddr, NULL, NULL, 0);
+       rt6i = rt6_lookup(&init_net, &iph6->saddr, NULL, NULL, 0);
        if (rt6i && rt6i->rt6i_dev) {
                skb2->dev = rt6i->rt6i_dev;
 
-               rt6i = rt6_lookup(&iph6->daddr, &iph6->saddr, NULL, 0);
+               rt6i = rt6_lookup(&init_net, &iph6->daddr, &iph6->saddr, NULL, 0);
 
                if (rt6i && rt6i->rt6i_dev && rt6i->rt6i_dev->type == ARPHRD_SIT) {
                        struct ip_tunnel *t = netdev_priv(rt6i->rt6i_dev);
@@ -382,6 +557,14 @@ static int ipip6_rcv(struct sk_buff *skb)
                IPCB(skb)->flags = 0;
                skb->protocol = htons(ETH_P_IPV6);
                skb->pkt_type = PACKET_HOST;
+
+               if ((tunnel->dev->priv_flags & IFF_ISATAP) &&
+                   !isatap_chksrc(skb, iph, tunnel)) {
+                       tunnel->stat.rx_errors++;
+                       read_unlock(&ipip6_lock);
+                       kfree_skb(skb);
+                       return 0;
+               }
                tunnel->stat.rx_packets++;
                tunnel->stat.rx_bytes += skb->len;
                skb->dev = tunnel->dev;
@@ -444,6 +627,29 @@ static int ipip6_tunnel_xmit(struct sk_buff *skb, struct net_device *dev)
        if (skb->protocol != htons(ETH_P_IPV6))
                goto tx_error;
 
+       /* ISATAP (RFC4214) - must come before 6to4 */
+       if (dev->priv_flags & IFF_ISATAP) {
+               struct neighbour *neigh = NULL;
+
+               if (skb->dst)
+                       neigh = skb->dst->neighbour;
+
+               if (neigh == NULL) {
+                       if (net_ratelimit())
+                               printk(KERN_DEBUG "sit: nexthop == NULL\n");
+                       goto tx_error;
+               }
+
+               addr6 = (struct in6_addr*)&neigh->primary_key;
+               addr_type = ipv6_addr_type(addr6);
+
+               if ((addr_type & IPV6_ADDR_UNICAST) &&
+                    ipv6_addr_is_isatap(addr6))
+                       dst = addr6->s6_addr32[3];
+               else
+                       goto tx_error;
+       }
+
        if (!dst)
                dst = try_6to4(&iph6->daddr);
 
@@ -480,7 +686,7 @@ static int ipip6_tunnel_xmit(struct sk_buff *skb, struct net_device *dev)
                                                .tos = RT_TOS(tos) } },
                                    .oif = tunnel->parms.link,
                                    .proto = IPPROTO_IPV6 };
-               if (ip_route_output_key(&rt, &fl)) {
+               if (ip_route_output_key(&init_net, &rt, &fl)) {
                        tunnel->stat.tx_carrier_errors++;
                        goto tx_error_icmp;
                }
@@ -592,11 +798,48 @@ tx_error:
        return 0;
 }
 
+static void ipip6_tunnel_bind_dev(struct net_device *dev)
+{
+       struct net_device *tdev = NULL;
+       struct ip_tunnel *tunnel;
+       struct iphdr *iph;
+
+       tunnel = netdev_priv(dev);
+       iph = &tunnel->parms.iph;
+
+       if (iph->daddr) {
+               struct flowi fl = { .nl_u = { .ip4_u =
+                                             { .daddr = iph->daddr,
+                                               .saddr = iph->saddr,
+                                               .tos = RT_TOS(iph->tos) } },
+                                   .oif = tunnel->parms.link,
+                                   .proto = IPPROTO_IPV6 };
+               struct rtable *rt;
+               if (!ip_route_output_key(&init_net, &rt, &fl)) {
+                       tdev = rt->u.dst.dev;
+                       ip_rt_put(rt);
+               }
+               dev->flags |= IFF_POINTOPOINT;
+       }
+
+       if (!tdev && tunnel->parms.link)
+               tdev = __dev_get_by_index(&init_net, tunnel->parms.link);
+
+       if (tdev) {
+               dev->hard_header_len = tdev->hard_header_len + sizeof(struct iphdr);
+               dev->mtu = tdev->mtu - sizeof(struct iphdr);
+               if (dev->mtu < IPV6_MIN_MTU)
+                       dev->mtu = IPV6_MIN_MTU;
+       }
+       dev->iflink = tunnel->parms.link;
+}
+
 static int
 ipip6_tunnel_ioctl (struct net_device *dev, struct ifreq *ifr, int cmd)
 {
        int err = 0;
        struct ip_tunnel_parm p;
+       struct ip_tunnel_prl prl;
        struct ip_tunnel *t;
 
        switch (cmd) {
@@ -663,6 +906,11 @@ ipip6_tunnel_ioctl (struct net_device *dev, struct ifreq *ifr, int cmd)
                        if (cmd == SIOCCHGTUNNEL) {
                                t->parms.iph.ttl = p.iph.ttl;
                                t->parms.iph.tos = p.iph.tos;
+                               if (t->parms.link != p.link) {
+                                       t->parms.link = p.link;
+                                       ipip6_tunnel_bind_dev(dev);
+                                       netdev_state_change(dev);
+                               }
                        }
                        if (copy_to_user(ifr->ifr_ifru.ifru_data, &t->parms, sizeof(p)))
                                err = -EFAULT;
@@ -691,6 +939,42 @@ ipip6_tunnel_ioctl (struct net_device *dev, struct ifreq *ifr, int cmd)
                err = 0;
                break;
 
+       case SIOCGETPRL:
+       case SIOCADDPRL:
+       case SIOCDELPRL:
+       case SIOCCHGPRL:
+               err = -EPERM;
+               if (cmd != SIOCGETPRL && !capable(CAP_NET_ADMIN))
+                       goto done;
+               err = -EINVAL;
+               if (dev == ipip6_fb_tunnel_dev)
+                       goto done;
+               err = -EFAULT;
+               if (copy_from_user(&prl, ifr->ifr_ifru.ifru_data, sizeof(prl)))
+                       goto done;
+               err = -ENOENT;
+               if (!(t = netdev_priv(dev)))
+                       goto done;
+
+               switch (cmd) {
+               case SIOCGETPRL:
+                       err = ipip6_tunnel_get_prl(t, &prl);
+                       if (!err && copy_to_user(ifr->ifr_ifru.ifru_data,
+                                                &prl, sizeof(prl)))
+                               err = -EFAULT;
+                       break;
+               case SIOCDELPRL:
+                       err = ipip6_tunnel_del_prl(t, &prl);
+                       break;
+               case SIOCADDPRL:
+               case SIOCCHGPRL:
+                       err = ipip6_tunnel_add_prl(t, &prl, cmd == SIOCCHGPRL);
+                       break;
+               }
+               if (cmd != SIOCGETPRL)
+                       netdev_state_change(dev);
+               break;
+
        default:
                err = -EINVAL;
        }
@@ -731,12 +1015,9 @@ static void ipip6_tunnel_setup(struct net_device *dev)
 
 static int ipip6_tunnel_init(struct net_device *dev)
 {
-       struct net_device *tdev = NULL;
        struct ip_tunnel *tunnel;
-       struct iphdr *iph;
 
        tunnel = netdev_priv(dev);
-       iph = &tunnel->parms.iph;
 
        tunnel->dev = dev;
        strcpy(tunnel->parms.name, dev->name);
@@ -744,31 +1025,7 @@ static int ipip6_tunnel_init(struct net_device *dev)
        memcpy(dev->dev_addr, &tunnel->parms.iph.saddr, 4);
        memcpy(dev->broadcast, &tunnel->parms.iph.daddr, 4);
 
-       if (iph->daddr) {
-               struct flowi fl = { .nl_u = { .ip4_u =
-                                             { .daddr = iph->daddr,
-                                               .saddr = iph->saddr,
-                                               .tos = RT_TOS(iph->tos) } },
-                                   .oif = tunnel->parms.link,
-                                   .proto = IPPROTO_IPV6 };
-               struct rtable *rt;
-               if (!ip_route_output_key(&rt, &fl)) {
-                       tdev = rt->u.dst.dev;
-                       ip_rt_put(rt);
-               }
-               dev->flags |= IFF_POINTOPOINT;
-       }
-
-       if (!tdev && tunnel->parms.link)
-               tdev = __dev_get_by_index(&init_net, tunnel->parms.link);
-
-       if (tdev) {
-               dev->hard_header_len = tdev->hard_header_len + sizeof(struct iphdr);
-               dev->mtu = tdev->mtu - sizeof(struct iphdr);
-               if (dev->mtu < IPV6_MIN_MTU)
-                       dev->mtu = IPV6_MIN_MTU;
-       }
-       dev->iflink = tunnel->parms.link;
+       ipip6_tunnel_bind_dev(dev);
 
        return 0;
 }