Commit | Line | Data |
---|---|---|
b2441318 | 1 | // SPDX-License-Identifier: GPL-2.0 |
1da177e4 LT |
2 | /* |
3 | * xfrm6_state.c: based on xfrm4_state.c | |
4 | * | |
5 | * Authors: | |
6 | * Mitsuru KANDA @USAGI | |
67ba4152 IM |
7 | * Kazunori MIYAZAWA @USAGI |
8 | * Kunihiro Ishiguro <kunihiro@ipinfusion.com> | |
9 | * IPv6 support | |
10 | * YOSHIFUJI Hideaki @USAGI | |
11 | * Split up af-specific portion | |
1ab1457c | 12 | * |
1da177e4 LT |
13 | */ |
14 | ||
15 | #include <net/xfrm.h> | |
16 | #include <linux/pfkeyv2.h> | |
17 | #include <linux/ipsec.h> | |
862b82c6 | 18 | #include <linux/netfilter_ipv6.h> |
bc3b2d7f | 19 | #include <linux/export.h> |
36cf9acf | 20 | #include <net/dsfield.h> |
1da177e4 | 21 | #include <net/ipv6.h> |
ee51b1b6 | 22 | #include <net/addrconf.h> |
1da177e4 | 23 | |
1da177e4 | 24 | static void |
73e5ebb2 | 25 | __xfrm6_init_tempsel(struct xfrm_selector *sel, const struct flowi *fl) |
1da177e4 | 26 | { |
7e1dc7b6 DM |
27 | const struct flowi6 *fl6 = &fl->u.ip6; |
28 | ||
1da177e4 LT |
29 | /* Initialize temporary selector matching only |
30 | * to current session. */ | |
4e3fd7a0 AD |
31 | *(struct in6_addr *)&sel->daddr = fl6->daddr; |
32 | *(struct in6_addr *)&sel->saddr = fl6->saddr; | |
7e1dc7b6 | 33 | sel->dport = xfrm_flowi_dport(fl, &fl6->uli); |
8444cf71 | 34 | sel->dport_mask = htons(0xffff); |
7e1dc7b6 | 35 | sel->sport = xfrm_flowi_sport(fl, &fl6->uli); |
8444cf71 TE |
36 | sel->sport_mask = htons(0xffff); |
37 | sel->family = AF_INET6; | |
38 | sel->prefixlen_d = 128; | |
39 | sel->prefixlen_s = 128; | |
7e1dc7b6 DM |
40 | sel->proto = fl6->flowi6_proto; |
41 | sel->ifindex = fl6->flowi6_oif; | |
8444cf71 TE |
42 | } |
43 | ||
44 | static void | |
19bd6244 DM |
45 | xfrm6_init_temprop(struct xfrm_state *x, const struct xfrm_tmpl *tmpl, |
46 | const xfrm_address_t *daddr, const xfrm_address_t *saddr) | |
8444cf71 | 47 | { |
1da177e4 | 48 | x->id = tmpl->id; |
67ba4152 | 49 | if (ipv6_addr_any((struct in6_addr *)&x->id.daddr)) |
1da177e4 LT |
50 | memcpy(&x->id.daddr, daddr, sizeof(x->sel.daddr)); |
51 | memcpy(&x->props.saddr, &tmpl->saddr, sizeof(x->props.saddr)); | |
67ba4152 | 52 | if (ipv6_addr_any((struct in6_addr *)&x->props.saddr)) |
1da177e4 LT |
53 | memcpy(&x->props.saddr, saddr, sizeof(x->props.saddr)); |
54 | x->props.mode = tmpl->mode; | |
55 | x->props.reqid = tmpl->reqid; | |
56 | x->props.family = AF_INET6; | |
57 | } | |
58 | ||
3b6cdf94 | 59 | /* distribution counting sort function for xfrm_state and xfrm_tmpl */ |
58c949d1 | 60 | static int |
3b6cdf94 | 61 | __xfrm6_sort(void **dst, void **src, int n, int (*cmp)(void *p), int maxclass) |
58c949d1 MN |
62 | { |
63 | int i; | |
3b6cdf94 YH |
64 | int class[XFRM_MAX_DEPTH]; |
65 | int count[maxclass]; | |
58c949d1 | 66 | |
3b6cdf94 | 67 | memset(count, 0, sizeof(count)); |
58c949d1 | 68 | |
64d9fdda | 69 | for (i = 0; i < n; i++) { |
3b6cdf94 YH |
70 | int c; |
71 | class[i] = c = cmp(src[i]); | |
72 | count[c]++; | |
64d9fdda | 73 | } |
58c949d1 | 74 | |
3b6cdf94 YH |
75 | for (i = 2; i < maxclass; i++) |
76 | count[i] += count[i - 1]; | |
58c949d1 | 77 | |
58c949d1 | 78 | for (i = 0; i < n; i++) { |
3b6cdf94 | 79 | dst[count[class[i] - 1]++] = src[i]; |
66da8c52 | 80 | src[i] = NULL; |
58c949d1 | 81 | } |
58c949d1 | 82 | |
58c949d1 MN |
83 | return 0; |
84 | } | |
85 | ||
3b6cdf94 YH |
86 | /* |
87 | * Rule for xfrm_state: | |
88 | * | |
89 | * rule 1: select IPsec transport except AH | |
90 | * rule 2: select MIPv6 RO or inbound trigger | |
91 | * rule 3: select IPsec transport AH | |
92 | * rule 4: select IPsec tunnel | |
93 | * rule 5: others | |
94 | */ | |
95 | static int __xfrm6_state_sort_cmp(void *p) | |
58c949d1 | 96 | { |
3b6cdf94 YH |
97 | struct xfrm_state *v = p; |
98 | ||
99 | switch (v->props.mode) { | |
100 | case XFRM_MODE_TRANSPORT: | |
101 | if (v->id.proto != IPPROTO_AH) | |
102 | return 1; | |
103 | else | |
104 | return 3; | |
07a93626 | 105 | #if IS_ENABLED(CONFIG_IPV6_MIP6) |
3b6cdf94 YH |
106 | case XFRM_MODE_ROUTEOPTIMIZATION: |
107 | case XFRM_MODE_IN_TRIGGER: | |
108 | return 2; | |
64d9fdda | 109 | #endif |
3b6cdf94 YH |
110 | case XFRM_MODE_TUNNEL: |
111 | case XFRM_MODE_BEET: | |
112 | return 4; | |
58c949d1 | 113 | } |
3b6cdf94 YH |
114 | return 5; |
115 | } | |
58c949d1 | 116 | |
3b6cdf94 YH |
117 | static int |
118 | __xfrm6_state_sort(struct xfrm_state **dst, struct xfrm_state **src, int n) | |
119 | { | |
120 | return __xfrm6_sort((void **)dst, (void **)src, n, | |
121 | __xfrm6_state_sort_cmp, 6); | |
122 | } | |
123 | ||
124 | /* | |
125 | * Rule for xfrm_tmpl: | |
126 | * | |
127 | * rule 1: select IPsec transport | |
128 | * rule 2: select MIPv6 RO or inbound trigger | |
129 | * rule 3: select IPsec tunnel | |
130 | * rule 4: others | |
131 | */ | |
132 | static int __xfrm6_tmpl_sort_cmp(void *p) | |
133 | { | |
134 | struct xfrm_tmpl *v = p; | |
135 | switch (v->mode) { | |
136 | case XFRM_MODE_TRANSPORT: | |
137 | return 1; | |
07a93626 | 138 | #if IS_ENABLED(CONFIG_IPV6_MIP6) |
3b6cdf94 YH |
139 | case XFRM_MODE_ROUTEOPTIMIZATION: |
140 | case XFRM_MODE_IN_TRIGGER: | |
141 | return 2; | |
142 | #endif | |
143 | case XFRM_MODE_TUNNEL: | |
144 | case XFRM_MODE_BEET: | |
145 | return 3; | |
58c949d1 | 146 | } |
3b6cdf94 YH |
147 | return 4; |
148 | } | |
58c949d1 | 149 | |
3b6cdf94 YH |
150 | static int |
151 | __xfrm6_tmpl_sort(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, int n) | |
152 | { | |
153 | return __xfrm6_sort((void **)dst, (void **)src, n, | |
154 | __xfrm6_tmpl_sort_cmp, 5); | |
58c949d1 MN |
155 | } |
156 | ||
36cf9acf HX |
157 | int xfrm6_extract_header(struct sk_buff *skb) |
158 | { | |
159 | struct ipv6hdr *iph = ipv6_hdr(skb); | |
160 | ||
732c8bd5 | 161 | XFRM_MODE_SKB_CB(skb)->ihl = sizeof(*iph); |
36cf9acf HX |
162 | XFRM_MODE_SKB_CB(skb)->id = 0; |
163 | XFRM_MODE_SKB_CB(skb)->frag_off = htons(IP_DF); | |
164 | XFRM_MODE_SKB_CB(skb)->tos = ipv6_get_dsfield(iph); | |
165 | XFRM_MODE_SKB_CB(skb)->ttl = iph->hop_limit; | |
732c8bd5 | 166 | XFRM_MODE_SKB_CB(skb)->optlen = 0; |
36cf9acf HX |
167 | memcpy(XFRM_MODE_SKB_CB(skb)->flow_lbl, iph->flow_lbl, |
168 | sizeof(XFRM_MODE_SKB_CB(skb)->flow_lbl)); | |
169 | ||
170 | return 0; | |
171 | } | |
172 | ||
1da177e4 LT |
173 | static struct xfrm_state_afinfo xfrm6_state_afinfo = { |
174 | .family = AF_INET6, | |
36cf9acf | 175 | .proto = IPPROTO_IPV6, |
227620e2 | 176 | .eth_proto = htons(ETH_P_IPV6), |
17c2a42a | 177 | .owner = THIS_MODULE, |
1da177e4 | 178 | .init_tempsel = __xfrm6_init_tempsel, |
8444cf71 | 179 | .init_temprop = xfrm6_init_temprop, |
58c949d1 MN |
180 | .tmpl_sort = __xfrm6_tmpl_sort, |
181 | .state_sort = __xfrm6_state_sort, | |
cdca7265 | 182 | .output = xfrm6_output, |
43a4dea4 | 183 | .output_finish = xfrm6_output_finish, |
227620e2 | 184 | .extract_input = xfrm6_extract_input, |
36cf9acf | 185 | .extract_output = xfrm6_extract_output, |
716062fd | 186 | .transport_finish = xfrm6_transport_finish, |
628e341f | 187 | .local_error = xfrm6_local_error, |
1da177e4 LT |
188 | }; |
189 | ||
0013caba | 190 | int __init xfrm6_state_init(void) |
1da177e4 | 191 | { |
0013caba | 192 | return xfrm_state_register_afinfo(&xfrm6_state_afinfo); |
1da177e4 LT |
193 | } |
194 | ||
195 | void xfrm6_state_fini(void) | |
196 | { | |
197 | xfrm_state_unregister_afinfo(&xfrm6_state_afinfo); | |
198 | } | |
199 |