]>
Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * Copyright (C)2003,2004 USAGI/WIDE Project | |
3 | * | |
4 | * This program is free software; you can redistribute it and/or modify | |
5 | * it under the terms of the GNU General Public License as published by | |
6 | * the Free Software Foundation; either version 2 of the License, or | |
7 | * (at your option) any later version. | |
1ab1457c | 8 | * |
1da177e4 LT |
9 | * This program is distributed in the hope that it will be useful, |
10 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | * GNU General Public License for more details. | |
1ab1457c | 13 | * |
1da177e4 LT |
14 | * You should have received a copy of the GNU General Public License |
15 | * along with this program; if not, write to the Free Software | |
16 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA | |
17 | * | |
18 | * Authors Mitsuru KANDA <mk@linux-ipv6.org> | |
19 | * YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org> | |
20 | * | |
21 | * Based on net/ipv4/xfrm4_tunnel.c | |
22 | * | |
23 | */ | |
1da177e4 LT |
24 | #include <linux/module.h> |
25 | #include <linux/xfrm.h> | |
91cc3bb0 | 26 | #include <linux/rculist.h> |
1da177e4 LT |
27 | #include <net/ip.h> |
28 | #include <net/xfrm.h> | |
29 | #include <net/ipv6.h> | |
1da177e4 LT |
30 | #include <linux/ipv6.h> |
31 | #include <linux/icmpv6.h> | |
4a3e2f71 | 32 | #include <linux/mutex.h> |
a1664773 AD |
33 | #include <net/netns/generic.h> |
34 | ||
35 | #define XFRM6_TUNNEL_SPI_BYADDR_HSIZE 256 | |
36 | #define XFRM6_TUNNEL_SPI_BYSPI_HSIZE 256 | |
37 | ||
38 | #define XFRM6_TUNNEL_SPI_MIN 1 | |
39 | #define XFRM6_TUNNEL_SPI_MAX 0xffffffff | |
40 | ||
41 | struct xfrm6_tunnel_net { | |
42 | struct hlist_head spi_byaddr[XFRM6_TUNNEL_SPI_BYADDR_HSIZE]; | |
43 | struct hlist_head spi_byspi[XFRM6_TUNNEL_SPI_BYSPI_HSIZE]; | |
44 | u32 spi; | |
45 | }; | |
46 | ||
47 | static int xfrm6_tunnel_net_id __read_mostly; | |
48 | static inline struct xfrm6_tunnel_net *xfrm6_tunnel_pernet(struct net *net) | |
49 | { | |
50 | return net_generic(net, xfrm6_tunnel_net_id); | |
51 | } | |
1da177e4 | 52 | |
1da177e4 | 53 | /* |
1ab1457c | 54 | * xfrm_tunnel_spi things are for allocating unique id ("spi") |
1da177e4 LT |
55 | * per xfrm_address_t. |
56 | */ | |
57 | struct xfrm6_tunnel_spi { | |
91cc3bb0 ED |
58 | struct hlist_node list_byaddr; |
59 | struct hlist_node list_byspi; | |
60 | xfrm_address_t addr; | |
61 | u32 spi; | |
62 | atomic_t refcnt; | |
63 | struct rcu_head rcu_head; | |
1da177e4 LT |
64 | }; |
65 | ||
91cc3bb0 | 66 | static DEFINE_SPINLOCK(xfrm6_tunnel_spi_lock); |
1da177e4 | 67 | |
e18b890b | 68 | static struct kmem_cache *xfrm6_tunnel_spi_kmem __read_mostly; |
1da177e4 | 69 | |
b6f99a21 | 70 | static inline unsigned xfrm6_tunnel_spi_hash_byaddr(xfrm_address_t *addr) |
1da177e4 LT |
71 | { |
72 | unsigned h; | |
73 | ||
8c689a6e | 74 | h = (__force u32)(addr->a6[0] ^ addr->a6[1] ^ addr->a6[2] ^ addr->a6[3]); |
1da177e4 LT |
75 | h ^= h >> 16; |
76 | h ^= h >> 8; | |
77 | h &= XFRM6_TUNNEL_SPI_BYADDR_HSIZE - 1; | |
78 | ||
1da177e4 LT |
79 | return h; |
80 | } | |
81 | ||
b6f99a21 | 82 | static inline unsigned xfrm6_tunnel_spi_hash_byspi(u32 spi) |
1da177e4 LT |
83 | { |
84 | return spi % XFRM6_TUNNEL_SPI_BYSPI_HSIZE; | |
85 | } | |
86 | ||
87 | ||
a1664773 | 88 | static int __init xfrm6_tunnel_spi_init(void) |
1da177e4 | 89 | { |
1da177e4 LT |
90 | xfrm6_tunnel_spi_kmem = kmem_cache_create("xfrm6_tunnel_spi", |
91 | sizeof(struct xfrm6_tunnel_spi), | |
92 | 0, SLAB_HWCACHE_ALIGN, | |
20c2df83 | 93 | NULL); |
a922ba55 | 94 | if (!xfrm6_tunnel_spi_kmem) |
1da177e4 | 95 | return -ENOMEM; |
1da177e4 LT |
96 | return 0; |
97 | } | |
98 | ||
99 | static void xfrm6_tunnel_spi_fini(void) | |
100 | { | |
1da177e4 | 101 | kmem_cache_destroy(xfrm6_tunnel_spi_kmem); |
1da177e4 LT |
102 | } |
103 | ||
a1664773 | 104 | static struct xfrm6_tunnel_spi *__xfrm6_tunnel_spi_lookup(struct net *net, xfrm_address_t *saddr) |
1da177e4 | 105 | { |
a1664773 | 106 | struct xfrm6_tunnel_net *xfrm6_tn = xfrm6_tunnel_pernet(net); |
1da177e4 LT |
107 | struct xfrm6_tunnel_spi *x6spi; |
108 | struct hlist_node *pos; | |
109 | ||
91cc3bb0 | 110 | hlist_for_each_entry_rcu(x6spi, pos, |
a1664773 | 111 | &xfrm6_tn->spi_byaddr[xfrm6_tunnel_spi_hash_byaddr(saddr)], |
1da177e4 | 112 | list_byaddr) { |
a922ba55 | 113 | if (memcmp(&x6spi->addr, saddr, sizeof(x6spi->addr)) == 0) |
1da177e4 | 114 | return x6spi; |
1da177e4 LT |
115 | } |
116 | ||
1da177e4 LT |
117 | return NULL; |
118 | } | |
119 | ||
a1664773 | 120 | __be32 xfrm6_tunnel_spi_lookup(struct net *net, xfrm_address_t *saddr) |
1da177e4 LT |
121 | { |
122 | struct xfrm6_tunnel_spi *x6spi; | |
123 | u32 spi; | |
124 | ||
91cc3bb0 | 125 | rcu_read_lock_bh(); |
a1664773 | 126 | x6spi = __xfrm6_tunnel_spi_lookup(net, saddr); |
1da177e4 | 127 | spi = x6spi ? x6spi->spi : 0; |
91cc3bb0 | 128 | rcu_read_unlock_bh(); |
5b122545 | 129 | return htonl(spi); |
1da177e4 LT |
130 | } |
131 | ||
132 | EXPORT_SYMBOL(xfrm6_tunnel_spi_lookup); | |
133 | ||
a1664773 | 134 | static int __xfrm6_tunnel_spi_check(struct net *net, u32 spi) |
df8ea19b | 135 | { |
a1664773 | 136 | struct xfrm6_tunnel_net *xfrm6_tn = xfrm6_tunnel_pernet(net); |
df8ea19b YH |
137 | struct xfrm6_tunnel_spi *x6spi; |
138 | int index = xfrm6_tunnel_spi_hash_byspi(spi); | |
139 | struct hlist_node *pos; | |
140 | ||
141 | hlist_for_each_entry(x6spi, pos, | |
a1664773 | 142 | &xfrm6_tn->spi_byspi[index], |
df8ea19b YH |
143 | list_byspi) { |
144 | if (x6spi->spi == spi) | |
145 | return -1; | |
146 | } | |
147 | return index; | |
148 | } | |
149 | ||
a1664773 | 150 | static u32 __xfrm6_tunnel_alloc_spi(struct net *net, xfrm_address_t *saddr) |
1da177e4 | 151 | { |
a1664773 | 152 | struct xfrm6_tunnel_net *xfrm6_tn = xfrm6_tunnel_pernet(net); |
1da177e4 LT |
153 | u32 spi; |
154 | struct xfrm6_tunnel_spi *x6spi; | |
df8ea19b | 155 | int index; |
1da177e4 | 156 | |
a1664773 AD |
157 | if (xfrm6_tn->spi < XFRM6_TUNNEL_SPI_MIN || |
158 | xfrm6_tn->spi >= XFRM6_TUNNEL_SPI_MAX) | |
159 | xfrm6_tn->spi = XFRM6_TUNNEL_SPI_MIN; | |
1da177e4 | 160 | else |
a1664773 | 161 | xfrm6_tn->spi++; |
1da177e4 | 162 | |
a1664773 AD |
163 | for (spi = xfrm6_tn->spi; spi <= XFRM6_TUNNEL_SPI_MAX; spi++) { |
164 | index = __xfrm6_tunnel_spi_check(net, spi); | |
df8ea19b YH |
165 | if (index >= 0) |
166 | goto alloc_spi; | |
1da177e4 | 167 | } |
a1664773 AD |
168 | for (spi = XFRM6_TUNNEL_SPI_MIN; spi < xfrm6_tn->spi; spi++) { |
169 | index = __xfrm6_tunnel_spi_check(net, spi); | |
df8ea19b YH |
170 | if (index >= 0) |
171 | goto alloc_spi; | |
1da177e4 LT |
172 | } |
173 | spi = 0; | |
174 | goto out; | |
175 | alloc_spi: | |
a1664773 | 176 | xfrm6_tn->spi = spi; |
54e6ecb2 | 177 | x6spi = kmem_cache_alloc(xfrm6_tunnel_spi_kmem, GFP_ATOMIC); |
a922ba55 | 178 | if (!x6spi) |
1da177e4 | 179 | goto out; |
a922ba55 | 180 | |
91cc3bb0 | 181 | INIT_RCU_HEAD(&x6spi->rcu_head); |
1da177e4 LT |
182 | memcpy(&x6spi->addr, saddr, sizeof(x6spi->addr)); |
183 | x6spi->spi = spi; | |
184 | atomic_set(&x6spi->refcnt, 1); | |
185 | ||
a1664773 | 186 | hlist_add_head_rcu(&x6spi->list_byspi, &xfrm6_tn->spi_byspi[index]); |
1da177e4 LT |
187 | |
188 | index = xfrm6_tunnel_spi_hash_byaddr(saddr); | |
a1664773 | 189 | hlist_add_head_rcu(&x6spi->list_byaddr, &xfrm6_tn->spi_byaddr[index]); |
1da177e4 | 190 | out: |
1da177e4 LT |
191 | return spi; |
192 | } | |
193 | ||
a1664773 | 194 | __be32 xfrm6_tunnel_alloc_spi(struct net *net, xfrm_address_t *saddr) |
1da177e4 LT |
195 | { |
196 | struct xfrm6_tunnel_spi *x6spi; | |
197 | u32 spi; | |
198 | ||
91cc3bb0 | 199 | spin_lock_bh(&xfrm6_tunnel_spi_lock); |
a1664773 | 200 | x6spi = __xfrm6_tunnel_spi_lookup(net, saddr); |
1da177e4 LT |
201 | if (x6spi) { |
202 | atomic_inc(&x6spi->refcnt); | |
203 | spi = x6spi->spi; | |
204 | } else | |
a1664773 | 205 | spi = __xfrm6_tunnel_alloc_spi(net, saddr); |
91cc3bb0 | 206 | spin_unlock_bh(&xfrm6_tunnel_spi_lock); |
1da177e4 | 207 | |
5b122545 | 208 | return htonl(spi); |
1da177e4 LT |
209 | } |
210 | ||
211 | EXPORT_SYMBOL(xfrm6_tunnel_alloc_spi); | |
212 | ||
91cc3bb0 ED |
213 | static void x6spi_destroy_rcu(struct rcu_head *head) |
214 | { | |
215 | kmem_cache_free(xfrm6_tunnel_spi_kmem, | |
216 | container_of(head, struct xfrm6_tunnel_spi, rcu_head)); | |
217 | } | |
218 | ||
a1664773 | 219 | void xfrm6_tunnel_free_spi(struct net *net, xfrm_address_t *saddr) |
1da177e4 | 220 | { |
a1664773 | 221 | struct xfrm6_tunnel_net *xfrm6_tn = xfrm6_tunnel_pernet(net); |
1da177e4 LT |
222 | struct xfrm6_tunnel_spi *x6spi; |
223 | struct hlist_node *pos, *n; | |
224 | ||
91cc3bb0 | 225 | spin_lock_bh(&xfrm6_tunnel_spi_lock); |
1da177e4 | 226 | |
1ab1457c | 227 | hlist_for_each_entry_safe(x6spi, pos, n, |
a1664773 | 228 | &xfrm6_tn->spi_byaddr[xfrm6_tunnel_spi_hash_byaddr(saddr)], |
1da177e4 LT |
229 | list_byaddr) |
230 | { | |
231 | if (memcmp(&x6spi->addr, saddr, sizeof(x6spi->addr)) == 0) { | |
1da177e4 | 232 | if (atomic_dec_and_test(&x6spi->refcnt)) { |
91cc3bb0 ED |
233 | hlist_del_rcu(&x6spi->list_byaddr); |
234 | hlist_del_rcu(&x6spi->list_byspi); | |
235 | call_rcu(&x6spi->rcu_head, x6spi_destroy_rcu); | |
1da177e4 LT |
236 | break; |
237 | } | |
238 | } | |
239 | } | |
91cc3bb0 | 240 | spin_unlock_bh(&xfrm6_tunnel_spi_lock); |
1da177e4 LT |
241 | } |
242 | ||
243 | EXPORT_SYMBOL(xfrm6_tunnel_free_spi); | |
244 | ||
245 | static int xfrm6_tunnel_output(struct xfrm_state *x, struct sk_buff *skb) | |
246 | { | |
7b277b1a | 247 | skb_push(skb, -skb_network_offset(skb)); |
1da177e4 LT |
248 | return 0; |
249 | } | |
250 | ||
e695633e | 251 | static int xfrm6_tunnel_input(struct xfrm_state *x, struct sk_buff *skb) |
1da177e4 | 252 | { |
04663d0b | 253 | return skb_network_header(skb)[IP6CB(skb)->nhoff]; |
1da177e4 LT |
254 | } |
255 | ||
d2acc347 | 256 | static int xfrm6_tunnel_rcv(struct sk_buff *skb) |
1da177e4 | 257 | { |
a1664773 | 258 | struct net *net = dev_net(skb->dev); |
0660e03f | 259 | struct ipv6hdr *iph = ipv6_hdr(skb); |
a252cc23 | 260 | __be32 spi; |
1da177e4 | 261 | |
a1664773 | 262 | spi = xfrm6_tunnel_spi_lookup(net, (xfrm_address_t *)&iph->saddr); |
33b5ecb8 | 263 | return xfrm6_rcv_spi(skb, IPPROTO_IPV6, spi) > 0 ? : 0; |
1da177e4 LT |
264 | } |
265 | ||
d2acc347 | 266 | static int xfrm6_tunnel_err(struct sk_buff *skb, struct inet6_skb_parm *opt, |
d5fdd6ba | 267 | u8 type, u8 code, int offset, __be32 info) |
1da177e4 | 268 | { |
1da177e4 LT |
269 | /* xfrm6_tunnel native err handling */ |
270 | switch (type) { | |
1ab1457c | 271 | case ICMPV6_DEST_UNREACH: |
1da177e4 | 272 | switch (code) { |
1ab1457c | 273 | case ICMPV6_NOROUTE: |
1da177e4 LT |
274 | case ICMPV6_ADM_PROHIBITED: |
275 | case ICMPV6_NOT_NEIGHBOUR: | |
276 | case ICMPV6_ADDR_UNREACH: | |
277 | case ICMPV6_PORT_UNREACH: | |
278 | default: | |
1da177e4 LT |
279 | break; |
280 | } | |
281 | break; | |
282 | case ICMPV6_PKT_TOOBIG: | |
1da177e4 LT |
283 | break; |
284 | case ICMPV6_TIME_EXCEED: | |
285 | switch (code) { | |
286 | case ICMPV6_EXC_HOPLIMIT: | |
1da177e4 LT |
287 | break; |
288 | case ICMPV6_EXC_FRAGTIME: | |
1ab1457c | 289 | default: |
1da177e4 LT |
290 | break; |
291 | } | |
292 | break; | |
293 | case ICMPV6_PARAMPROB: | |
294 | switch (code) { | |
295 | case ICMPV6_HDR_FIELD: break; | |
296 | case ICMPV6_UNK_NEXTHDR: break; | |
297 | case ICMPV6_UNK_OPTION: break; | |
298 | } | |
299 | break; | |
300 | default: | |
301 | break; | |
302 | } | |
d2acc347 HX |
303 | |
304 | return 0; | |
1da177e4 LT |
305 | } |
306 | ||
72cb6962 | 307 | static int xfrm6_tunnel_init_state(struct xfrm_state *x) |
1da177e4 | 308 | { |
7e49e6de | 309 | if (x->props.mode != XFRM_MODE_TUNNEL) |
1da177e4 LT |
310 | return -EINVAL; |
311 | ||
312 | if (x->encap) | |
313 | return -EINVAL; | |
314 | ||
315 | x->props.header_len = sizeof(struct ipv6hdr); | |
316 | ||
317 | return 0; | |
318 | } | |
319 | ||
320 | static void xfrm6_tunnel_destroy(struct xfrm_state *x) | |
321 | { | |
a1664773 AD |
322 | struct net *net = xs_net(x); |
323 | ||
324 | xfrm6_tunnel_free_spi(net, (xfrm_address_t *)&x->props.saddr); | |
1da177e4 LT |
325 | } |
326 | ||
533cb5b0 | 327 | static const struct xfrm_type xfrm6_tunnel_type = { |
1da177e4 LT |
328 | .description = "IP6IP6", |
329 | .owner = THIS_MODULE, | |
330 | .proto = IPPROTO_IPV6, | |
331 | .init_state = xfrm6_tunnel_init_state, | |
332 | .destructor = xfrm6_tunnel_destroy, | |
333 | .input = xfrm6_tunnel_input, | |
334 | .output = xfrm6_tunnel_output, | |
335 | }; | |
336 | ||
d2acc347 | 337 | static struct xfrm6_tunnel xfrm6_tunnel_handler = { |
1da177e4 | 338 | .handler = xfrm6_tunnel_rcv, |
d2acc347 HX |
339 | .err_handler = xfrm6_tunnel_err, |
340 | .priority = 2, | |
1da177e4 LT |
341 | }; |
342 | ||
73d605d1 KM |
343 | static struct xfrm6_tunnel xfrm46_tunnel_handler = { |
344 | .handler = xfrm6_tunnel_rcv, | |
345 | .err_handler = xfrm6_tunnel_err, | |
346 | .priority = 2, | |
347 | }; | |
348 | ||
a1664773 AD |
349 | static int __net_init xfrm6_tunnel_net_init(struct net *net) |
350 | { | |
351 | struct xfrm6_tunnel_net *xfrm6_tn = xfrm6_tunnel_pernet(net); | |
352 | unsigned int i; | |
353 | ||
354 | for (i = 0; i < XFRM6_TUNNEL_SPI_BYADDR_HSIZE; i++) | |
355 | INIT_HLIST_HEAD(&xfrm6_tn->spi_byaddr[i]); | |
356 | for (i = 0; i < XFRM6_TUNNEL_SPI_BYSPI_HSIZE; i++) | |
357 | INIT_HLIST_HEAD(&xfrm6_tn->spi_byspi[i]); | |
358 | xfrm6_tn->spi = 0; | |
359 | ||
360 | return 0; | |
361 | } | |
362 | ||
363 | static void __net_exit xfrm6_tunnel_net_exit(struct net *net) | |
364 | { | |
365 | } | |
366 | ||
367 | static struct pernet_operations xfrm6_tunnel_net_ops = { | |
368 | .init = xfrm6_tunnel_net_init, | |
369 | .exit = xfrm6_tunnel_net_exit, | |
370 | .id = &xfrm6_tunnel_net_id, | |
371 | .size = sizeof(struct xfrm6_tunnel_net), | |
372 | }; | |
373 | ||
1da177e4 LT |
374 | static int __init xfrm6_tunnel_init(void) |
375 | { | |
e924960d AD |
376 | int rv; |
377 | ||
378 | rv = xfrm_register_type(&xfrm6_tunnel_type, AF_INET6); | |
379 | if (rv < 0) | |
5ce1bbb9 | 380 | goto err; |
e924960d AD |
381 | rv = xfrm6_tunnel_register(&xfrm6_tunnel_handler, AF_INET6); |
382 | if (rv < 0) | |
5ce1bbb9 | 383 | goto unreg; |
e924960d AD |
384 | rv = xfrm6_tunnel_register(&xfrm46_tunnel_handler, AF_INET); |
385 | if (rv < 0) | |
5ce1bbb9 | 386 | goto dereg6; |
e924960d AD |
387 | rv = xfrm6_tunnel_spi_init(); |
388 | if (rv < 0) | |
5ce1bbb9 | 389 | goto dereg46; |
a1664773 AD |
390 | rv = register_pernet_subsys(&xfrm6_tunnel_net_ops); |
391 | if (rv < 0) | |
392 | goto deregspi; | |
1da177e4 | 393 | return 0; |
5ce1bbb9 | 394 | |
a1664773 AD |
395 | deregspi: |
396 | xfrm6_tunnel_spi_fini(); | |
5ce1bbb9 IJ |
397 | dereg46: |
398 | xfrm6_tunnel_deregister(&xfrm46_tunnel_handler, AF_INET); | |
399 | dereg6: | |
400 | xfrm6_tunnel_deregister(&xfrm6_tunnel_handler, AF_INET6); | |
401 | unreg: | |
402 | xfrm_unregister_type(&xfrm6_tunnel_type, AF_INET6); | |
403 | err: | |
e924960d | 404 | return rv; |
1da177e4 LT |
405 | } |
406 | ||
407 | static void __exit xfrm6_tunnel_fini(void) | |
408 | { | |
a1664773 | 409 | unregister_pernet_subsys(&xfrm6_tunnel_net_ops); |
1da177e4 | 410 | xfrm6_tunnel_spi_fini(); |
73d605d1 KM |
411 | xfrm6_tunnel_deregister(&xfrm46_tunnel_handler, AF_INET); |
412 | xfrm6_tunnel_deregister(&xfrm6_tunnel_handler, AF_INET6); | |
a922ba55 | 413 | xfrm_unregister_type(&xfrm6_tunnel_type, AF_INET6); |
1da177e4 LT |
414 | } |
415 | ||
416 | module_init(xfrm6_tunnel_init); | |
417 | module_exit(xfrm6_tunnel_fini); | |
418 | MODULE_LICENSE("GPL"); | |
d3d6dd3a | 419 | MODULE_ALIAS_XFRM_TYPE(AF_INET6, XFRM_PROTO_IPV6); |