xfrm6_tunnel.c 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419
  1. /*
  2. * Copyright (C)2003,2004 USAGI/WIDE Project
  3. *
  4. * This program is free software; you can redistribute it and/or modify
  5. * it under the terms of the GNU General Public License as published by
  6. * the Free Software Foundation; either version 2 of the License, or
  7. * (at your option) any later version.
  8. *
  9. * This program is distributed in the hope that it will be useful,
  10. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. * GNU General Public License for more details.
  13. *
  14. * You should have received a copy of the GNU General Public License
  15. * along with this program; if not, write to the Free Software
  16. * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
  17. *
  18. * Authors Mitsuru KANDA <mk@linux-ipv6.org>
  19. * YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
  20. *
  21. * Based on net/ipv4/xfrm4_tunnel.c
  22. *
  23. */
  24. #include <linux/module.h>
  25. #include <linux/xfrm.h>
  26. #include <linux/rculist.h>
  27. #include <net/ip.h>
  28. #include <net/xfrm.h>
  29. #include <net/ipv6.h>
  30. #include <linux/ipv6.h>
  31. #include <linux/icmpv6.h>
  32. #include <linux/mutex.h>
  33. #include <net/netns/generic.h>
  34. #define XFRM6_TUNNEL_SPI_BYADDR_HSIZE 256
  35. #define XFRM6_TUNNEL_SPI_BYSPI_HSIZE 256
  36. #define XFRM6_TUNNEL_SPI_MIN 1
  37. #define XFRM6_TUNNEL_SPI_MAX 0xffffffff
  38. struct xfrm6_tunnel_net {
  39. struct hlist_head spi_byaddr[XFRM6_TUNNEL_SPI_BYADDR_HSIZE];
  40. struct hlist_head spi_byspi[XFRM6_TUNNEL_SPI_BYSPI_HSIZE];
  41. u32 spi;
  42. };
  43. static int xfrm6_tunnel_net_id __read_mostly;
  44. static inline struct xfrm6_tunnel_net *xfrm6_tunnel_pernet(struct net *net)
  45. {
  46. return net_generic(net, xfrm6_tunnel_net_id);
  47. }
  48. /*
  49. * xfrm_tunnel_spi things are for allocating unique id ("spi")
  50. * per xfrm_address_t.
  51. */
  52. struct xfrm6_tunnel_spi {
  53. struct hlist_node list_byaddr;
  54. struct hlist_node list_byspi;
  55. xfrm_address_t addr;
  56. u32 spi;
  57. atomic_t refcnt;
  58. struct rcu_head rcu_head;
  59. };
  60. static DEFINE_SPINLOCK(xfrm6_tunnel_spi_lock);
  61. static struct kmem_cache *xfrm6_tunnel_spi_kmem __read_mostly;
  62. static inline unsigned xfrm6_tunnel_spi_hash_byaddr(xfrm_address_t *addr)
  63. {
  64. unsigned h;
  65. h = (__force u32)(addr->a6[0] ^ addr->a6[1] ^ addr->a6[2] ^ addr->a6[3]);
  66. h ^= h >> 16;
  67. h ^= h >> 8;
  68. h &= XFRM6_TUNNEL_SPI_BYADDR_HSIZE - 1;
  69. return h;
  70. }
  71. static inline unsigned xfrm6_tunnel_spi_hash_byspi(u32 spi)
  72. {
  73. return spi % XFRM6_TUNNEL_SPI_BYSPI_HSIZE;
  74. }
  75. static int __init xfrm6_tunnel_spi_init(void)
  76. {
  77. xfrm6_tunnel_spi_kmem = kmem_cache_create("xfrm6_tunnel_spi",
  78. sizeof(struct xfrm6_tunnel_spi),
  79. 0, SLAB_HWCACHE_ALIGN,
  80. NULL);
  81. if (!xfrm6_tunnel_spi_kmem)
  82. return -ENOMEM;
  83. return 0;
  84. }
  85. static void xfrm6_tunnel_spi_fini(void)
  86. {
  87. kmem_cache_destroy(xfrm6_tunnel_spi_kmem);
  88. }
  89. static struct xfrm6_tunnel_spi *__xfrm6_tunnel_spi_lookup(struct net *net, xfrm_address_t *saddr)
  90. {
  91. struct xfrm6_tunnel_net *xfrm6_tn = xfrm6_tunnel_pernet(net);
  92. struct xfrm6_tunnel_spi *x6spi;
  93. struct hlist_node *pos;
  94. hlist_for_each_entry_rcu(x6spi, pos,
  95. &xfrm6_tn->spi_byaddr[xfrm6_tunnel_spi_hash_byaddr(saddr)],
  96. list_byaddr) {
  97. if (memcmp(&x6spi->addr, saddr, sizeof(x6spi->addr)) == 0)
  98. return x6spi;
  99. }
  100. return NULL;
  101. }
  102. __be32 xfrm6_tunnel_spi_lookup(struct net *net, xfrm_address_t *saddr)
  103. {
  104. struct xfrm6_tunnel_spi *x6spi;
  105. u32 spi;
  106. rcu_read_lock_bh();
  107. x6spi = __xfrm6_tunnel_spi_lookup(net, saddr);
  108. spi = x6spi ? x6spi->spi : 0;
  109. rcu_read_unlock_bh();
  110. return htonl(spi);
  111. }
  112. EXPORT_SYMBOL(xfrm6_tunnel_spi_lookup);
  113. static int __xfrm6_tunnel_spi_check(struct net *net, u32 spi)
  114. {
  115. struct xfrm6_tunnel_net *xfrm6_tn = xfrm6_tunnel_pernet(net);
  116. struct xfrm6_tunnel_spi *x6spi;
  117. int index = xfrm6_tunnel_spi_hash_byspi(spi);
  118. struct hlist_node *pos;
  119. hlist_for_each_entry(x6spi, pos,
  120. &xfrm6_tn->spi_byspi[index],
  121. list_byspi) {
  122. if (x6spi->spi == spi)
  123. return -1;
  124. }
  125. return index;
  126. }
  127. static u32 __xfrm6_tunnel_alloc_spi(struct net *net, xfrm_address_t *saddr)
  128. {
  129. struct xfrm6_tunnel_net *xfrm6_tn = xfrm6_tunnel_pernet(net);
  130. u32 spi;
  131. struct xfrm6_tunnel_spi *x6spi;
  132. int index;
  133. if (xfrm6_tn->spi < XFRM6_TUNNEL_SPI_MIN ||
  134. xfrm6_tn->spi >= XFRM6_TUNNEL_SPI_MAX)
  135. xfrm6_tn->spi = XFRM6_TUNNEL_SPI_MIN;
  136. else
  137. xfrm6_tn->spi++;
  138. for (spi = xfrm6_tn->spi; spi <= XFRM6_TUNNEL_SPI_MAX; spi++) {
  139. index = __xfrm6_tunnel_spi_check(net, spi);
  140. if (index >= 0)
  141. goto alloc_spi;
  142. }
  143. for (spi = XFRM6_TUNNEL_SPI_MIN; spi < xfrm6_tn->spi; spi++) {
  144. index = __xfrm6_tunnel_spi_check(net, spi);
  145. if (index >= 0)
  146. goto alloc_spi;
  147. }
  148. spi = 0;
  149. goto out;
  150. alloc_spi:
  151. xfrm6_tn->spi = spi;
  152. x6spi = kmem_cache_alloc(xfrm6_tunnel_spi_kmem, GFP_ATOMIC);
  153. if (!x6spi)
  154. goto out;
  155. INIT_RCU_HEAD(&x6spi->rcu_head);
  156. memcpy(&x6spi->addr, saddr, sizeof(x6spi->addr));
  157. x6spi->spi = spi;
  158. atomic_set(&x6spi->refcnt, 1);
  159. hlist_add_head_rcu(&x6spi->list_byspi, &xfrm6_tn->spi_byspi[index]);
  160. index = xfrm6_tunnel_spi_hash_byaddr(saddr);
  161. hlist_add_head_rcu(&x6spi->list_byaddr, &xfrm6_tn->spi_byaddr[index]);
  162. out:
  163. return spi;
  164. }
  165. __be32 xfrm6_tunnel_alloc_spi(struct net *net, xfrm_address_t *saddr)
  166. {
  167. struct xfrm6_tunnel_spi *x6spi;
  168. u32 spi;
  169. spin_lock_bh(&xfrm6_tunnel_spi_lock);
  170. x6spi = __xfrm6_tunnel_spi_lookup(net, saddr);
  171. if (x6spi) {
  172. atomic_inc(&x6spi->refcnt);
  173. spi = x6spi->spi;
  174. } else
  175. spi = __xfrm6_tunnel_alloc_spi(net, saddr);
  176. spin_unlock_bh(&xfrm6_tunnel_spi_lock);
  177. return htonl(spi);
  178. }
  179. EXPORT_SYMBOL(xfrm6_tunnel_alloc_spi);
  180. static void x6spi_destroy_rcu(struct rcu_head *head)
  181. {
  182. kmem_cache_free(xfrm6_tunnel_spi_kmem,
  183. container_of(head, struct xfrm6_tunnel_spi, rcu_head));
  184. }
  185. void xfrm6_tunnel_free_spi(struct net *net, xfrm_address_t *saddr)
  186. {
  187. struct xfrm6_tunnel_net *xfrm6_tn = xfrm6_tunnel_pernet(net);
  188. struct xfrm6_tunnel_spi *x6spi;
  189. struct hlist_node *pos, *n;
  190. spin_lock_bh(&xfrm6_tunnel_spi_lock);
  191. hlist_for_each_entry_safe(x6spi, pos, n,
  192. &xfrm6_tn->spi_byaddr[xfrm6_tunnel_spi_hash_byaddr(saddr)],
  193. list_byaddr)
  194. {
  195. if (memcmp(&x6spi->addr, saddr, sizeof(x6spi->addr)) == 0) {
  196. if (atomic_dec_and_test(&x6spi->refcnt)) {
  197. hlist_del_rcu(&x6spi->list_byaddr);
  198. hlist_del_rcu(&x6spi->list_byspi);
  199. call_rcu(&x6spi->rcu_head, x6spi_destroy_rcu);
  200. break;
  201. }
  202. }
  203. }
  204. spin_unlock_bh(&xfrm6_tunnel_spi_lock);
  205. }
  206. EXPORT_SYMBOL(xfrm6_tunnel_free_spi);
  207. static int xfrm6_tunnel_output(struct xfrm_state *x, struct sk_buff *skb)
  208. {
  209. skb_push(skb, -skb_network_offset(skb));
  210. return 0;
  211. }
  212. static int xfrm6_tunnel_input(struct xfrm_state *x, struct sk_buff *skb)
  213. {
  214. return skb_network_header(skb)[IP6CB(skb)->nhoff];
  215. }
  216. static int xfrm6_tunnel_rcv(struct sk_buff *skb)
  217. {
  218. struct net *net = dev_net(skb->dev);
  219. struct ipv6hdr *iph = ipv6_hdr(skb);
  220. __be32 spi;
  221. spi = xfrm6_tunnel_spi_lookup(net, (xfrm_address_t *)&iph->saddr);
  222. return xfrm6_rcv_spi(skb, IPPROTO_IPV6, spi) > 0 ? : 0;
  223. }
  224. static int xfrm6_tunnel_err(struct sk_buff *skb, struct inet6_skb_parm *opt,
  225. u8 type, u8 code, int offset, __be32 info)
  226. {
  227. /* xfrm6_tunnel native err handling */
  228. switch (type) {
  229. case ICMPV6_DEST_UNREACH:
  230. switch (code) {
  231. case ICMPV6_NOROUTE:
  232. case ICMPV6_ADM_PROHIBITED:
  233. case ICMPV6_NOT_NEIGHBOUR:
  234. case ICMPV6_ADDR_UNREACH:
  235. case ICMPV6_PORT_UNREACH:
  236. default:
  237. break;
  238. }
  239. break;
  240. case ICMPV6_PKT_TOOBIG:
  241. break;
  242. case ICMPV6_TIME_EXCEED:
  243. switch (code) {
  244. case ICMPV6_EXC_HOPLIMIT:
  245. break;
  246. case ICMPV6_EXC_FRAGTIME:
  247. default:
  248. break;
  249. }
  250. break;
  251. case ICMPV6_PARAMPROB:
  252. switch (code) {
  253. case ICMPV6_HDR_FIELD: break;
  254. case ICMPV6_UNK_NEXTHDR: break;
  255. case ICMPV6_UNK_OPTION: break;
  256. }
  257. break;
  258. default:
  259. break;
  260. }
  261. return 0;
  262. }
  263. static int xfrm6_tunnel_init_state(struct xfrm_state *x)
  264. {
  265. if (x->props.mode != XFRM_MODE_TUNNEL)
  266. return -EINVAL;
  267. if (x->encap)
  268. return -EINVAL;
  269. x->props.header_len = sizeof(struct ipv6hdr);
  270. return 0;
  271. }
  272. static void xfrm6_tunnel_destroy(struct xfrm_state *x)
  273. {
  274. struct net *net = xs_net(x);
  275. xfrm6_tunnel_free_spi(net, (xfrm_address_t *)&x->props.saddr);
  276. }
  277. static const struct xfrm_type xfrm6_tunnel_type = {
  278. .description = "IP6IP6",
  279. .owner = THIS_MODULE,
  280. .proto = IPPROTO_IPV6,
  281. .init_state = xfrm6_tunnel_init_state,
  282. .destructor = xfrm6_tunnel_destroy,
  283. .input = xfrm6_tunnel_input,
  284. .output = xfrm6_tunnel_output,
  285. };
  286. static struct xfrm6_tunnel xfrm6_tunnel_handler = {
  287. .handler = xfrm6_tunnel_rcv,
  288. .err_handler = xfrm6_tunnel_err,
  289. .priority = 2,
  290. };
  291. static struct xfrm6_tunnel xfrm46_tunnel_handler = {
  292. .handler = xfrm6_tunnel_rcv,
  293. .err_handler = xfrm6_tunnel_err,
  294. .priority = 2,
  295. };
  296. static int __net_init xfrm6_tunnel_net_init(struct net *net)
  297. {
  298. struct xfrm6_tunnel_net *xfrm6_tn = xfrm6_tunnel_pernet(net);
  299. unsigned int i;
  300. for (i = 0; i < XFRM6_TUNNEL_SPI_BYADDR_HSIZE; i++)
  301. INIT_HLIST_HEAD(&xfrm6_tn->spi_byaddr[i]);
  302. for (i = 0; i < XFRM6_TUNNEL_SPI_BYSPI_HSIZE; i++)
  303. INIT_HLIST_HEAD(&xfrm6_tn->spi_byspi[i]);
  304. xfrm6_tn->spi = 0;
  305. return 0;
  306. }
  307. static void __net_exit xfrm6_tunnel_net_exit(struct net *net)
  308. {
  309. }
  310. static struct pernet_operations xfrm6_tunnel_net_ops = {
  311. .init = xfrm6_tunnel_net_init,
  312. .exit = xfrm6_tunnel_net_exit,
  313. .id = &xfrm6_tunnel_net_id,
  314. .size = sizeof(struct xfrm6_tunnel_net),
  315. };
  316. static int __init xfrm6_tunnel_init(void)
  317. {
  318. int rv;
  319. rv = xfrm_register_type(&xfrm6_tunnel_type, AF_INET6);
  320. if (rv < 0)
  321. goto err;
  322. rv = xfrm6_tunnel_register(&xfrm6_tunnel_handler, AF_INET6);
  323. if (rv < 0)
  324. goto unreg;
  325. rv = xfrm6_tunnel_register(&xfrm46_tunnel_handler, AF_INET);
  326. if (rv < 0)
  327. goto dereg6;
  328. rv = xfrm6_tunnel_spi_init();
  329. if (rv < 0)
  330. goto dereg46;
  331. rv = register_pernet_subsys(&xfrm6_tunnel_net_ops);
  332. if (rv < 0)
  333. goto deregspi;
  334. return 0;
  335. deregspi:
  336. xfrm6_tunnel_spi_fini();
  337. dereg46:
  338. xfrm6_tunnel_deregister(&xfrm46_tunnel_handler, AF_INET);
  339. dereg6:
  340. xfrm6_tunnel_deregister(&xfrm6_tunnel_handler, AF_INET6);
  341. unreg:
  342. xfrm_unregister_type(&xfrm6_tunnel_type, AF_INET6);
  343. err:
  344. return rv;
  345. }
  346. static void __exit xfrm6_tunnel_fini(void)
  347. {
  348. unregister_pernet_subsys(&xfrm6_tunnel_net_ops);
  349. xfrm6_tunnel_spi_fini();
  350. xfrm6_tunnel_deregister(&xfrm46_tunnel_handler, AF_INET);
  351. xfrm6_tunnel_deregister(&xfrm6_tunnel_handler, AF_INET6);
  352. xfrm_unregister_type(&xfrm6_tunnel_type, AF_INET6);
  353. }
  354. module_init(xfrm6_tunnel_init);
  355. module_exit(xfrm6_tunnel_fini);
  356. MODULE_LICENSE("GPL");
  357. MODULE_ALIAS_XFRM_TYPE(AF_INET6, XFRM_PROTO_IPV6);