Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * Copyright (C)2003,2004 USAGI/WIDE Project | |
3 | * | |
4 | * This program is free software; you can redistribute it and/or modify | |
5 | * it under the terms of the GNU General Public License as published by | |
6 | * the Free Software Foundation; either version 2 of the License, or | |
7 | * (at your option) any later version. | |
1ab1457c | 8 | * |
1da177e4 LT |
9 | * This program is distributed in the hope that it will be useful, |
10 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | * GNU General Public License for more details. | |
1ab1457c | 13 | * |
1da177e4 LT |
14 | * You should have received a copy of the GNU General Public License |
15 | * along with this program; if not, write to the Free Software | |
16 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA | |
17 | * | |
18 | * Authors Mitsuru KANDA <mk@linux-ipv6.org> | |
19 | * YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org> | |
20 | * | |
21 | * Based on net/ipv4/xfrm4_tunnel.c | |
22 | * | |
23 | */ | |
1da177e4 LT |
24 | #include <linux/module.h> |
25 | #include <linux/xfrm.h> | |
26 | #include <linux/list.h> | |
27 | #include <net/ip.h> | |
28 | #include <net/xfrm.h> | |
29 | #include <net/ipv6.h> | |
1da177e4 LT |
30 | #include <linux/ipv6.h> |
31 | #include <linux/icmpv6.h> | |
4a3e2f71 | 32 | #include <linux/mutex.h> |
1da177e4 | 33 | |
1da177e4 | 34 | /* |
1ab1457c | 35 | * xfrm_tunnel_spi things are for allocating unique id ("spi") |
1da177e4 LT |
36 | * per xfrm_address_t. |
37 | */ | |
38 | struct xfrm6_tunnel_spi { | |
39 | struct hlist_node list_byaddr; | |
40 | struct hlist_node list_byspi; | |
41 | xfrm_address_t addr; | |
42 | u32 spi; | |
43 | atomic_t refcnt; | |
1da177e4 LT |
44 | }; |
45 | ||
1da177e4 LT |
46 | static DEFINE_RWLOCK(xfrm6_tunnel_spi_lock); |
47 | ||
48 | static u32 xfrm6_tunnel_spi; | |
49 | ||
50 | #define XFRM6_TUNNEL_SPI_MIN 1 | |
51 | #define XFRM6_TUNNEL_SPI_MAX 0xffffffff | |
52 | ||
e18b890b | 53 | static struct kmem_cache *xfrm6_tunnel_spi_kmem __read_mostly; |
1da177e4 LT |
54 | |
55 | #define XFRM6_TUNNEL_SPI_BYADDR_HSIZE 256 | |
56 | #define XFRM6_TUNNEL_SPI_BYSPI_HSIZE 256 | |
57 | ||
58 | static struct hlist_head xfrm6_tunnel_spi_byaddr[XFRM6_TUNNEL_SPI_BYADDR_HSIZE]; | |
59 | static struct hlist_head xfrm6_tunnel_spi_byspi[XFRM6_TUNNEL_SPI_BYSPI_HSIZE]; | |
60 | ||
b6f99a21 | 61 | static inline unsigned xfrm6_tunnel_spi_hash_byaddr(xfrm_address_t *addr) |
1da177e4 LT |
62 | { |
63 | unsigned h; | |
64 | ||
8c689a6e | 65 | h = (__force u32)(addr->a6[0] ^ addr->a6[1] ^ addr->a6[2] ^ addr->a6[3]); |
1da177e4 LT |
66 | h ^= h >> 16; |
67 | h ^= h >> 8; | |
68 | h &= XFRM6_TUNNEL_SPI_BYADDR_HSIZE - 1; | |
69 | ||
1da177e4 LT |
70 | return h; |
71 | } | |
72 | ||
b6f99a21 | 73 | static inline unsigned xfrm6_tunnel_spi_hash_byspi(u32 spi) |
1da177e4 LT |
74 | { |
75 | return spi % XFRM6_TUNNEL_SPI_BYSPI_HSIZE; | |
76 | } | |
77 | ||
78 | ||
79 | static int xfrm6_tunnel_spi_init(void) | |
80 | { | |
81 | int i; | |
82 | ||
1da177e4 LT |
83 | xfrm6_tunnel_spi = 0; |
84 | xfrm6_tunnel_spi_kmem = kmem_cache_create("xfrm6_tunnel_spi", | |
85 | sizeof(struct xfrm6_tunnel_spi), | |
86 | 0, SLAB_HWCACHE_ALIGN, | |
20c2df83 | 87 | NULL); |
a922ba55 | 88 | if (!xfrm6_tunnel_spi_kmem) |
1da177e4 | 89 | return -ENOMEM; |
1da177e4 LT |
90 | |
91 | for (i = 0; i < XFRM6_TUNNEL_SPI_BYADDR_HSIZE; i++) | |
92 | INIT_HLIST_HEAD(&xfrm6_tunnel_spi_byaddr[i]); | |
93 | for (i = 0; i < XFRM6_TUNNEL_SPI_BYSPI_HSIZE; i++) | |
94 | INIT_HLIST_HEAD(&xfrm6_tunnel_spi_byspi[i]); | |
95 | return 0; | |
96 | } | |
97 | ||
98 | static void xfrm6_tunnel_spi_fini(void) | |
99 | { | |
100 | int i; | |
101 | ||
1da177e4 LT |
102 | for (i = 0; i < XFRM6_TUNNEL_SPI_BYADDR_HSIZE; i++) { |
103 | if (!hlist_empty(&xfrm6_tunnel_spi_byaddr[i])) | |
a922ba55 | 104 | return; |
1da177e4 LT |
105 | } |
106 | for (i = 0; i < XFRM6_TUNNEL_SPI_BYSPI_HSIZE; i++) { | |
107 | if (!hlist_empty(&xfrm6_tunnel_spi_byspi[i])) | |
a922ba55 | 108 | return; |
1da177e4 LT |
109 | } |
110 | kmem_cache_destroy(xfrm6_tunnel_spi_kmem); | |
111 | xfrm6_tunnel_spi_kmem = NULL; | |
1da177e4 LT |
112 | } |
113 | ||
114 | static struct xfrm6_tunnel_spi *__xfrm6_tunnel_spi_lookup(xfrm_address_t *saddr) | |
115 | { | |
116 | struct xfrm6_tunnel_spi *x6spi; | |
117 | struct hlist_node *pos; | |
118 | ||
1da177e4 LT |
119 | hlist_for_each_entry(x6spi, pos, |
120 | &xfrm6_tunnel_spi_byaddr[xfrm6_tunnel_spi_hash_byaddr(saddr)], | |
121 | list_byaddr) { | |
a922ba55 | 122 | if (memcmp(&x6spi->addr, saddr, sizeof(x6spi->addr)) == 0) |
1da177e4 | 123 | return x6spi; |
1da177e4 LT |
124 | } |
125 | ||
1da177e4 LT |
126 | return NULL; |
127 | } | |
128 | ||
8c689a6e | 129 | __be32 xfrm6_tunnel_spi_lookup(xfrm_address_t *saddr) |
1da177e4 LT |
130 | { |
131 | struct xfrm6_tunnel_spi *x6spi; | |
132 | u32 spi; | |
133 | ||
1da177e4 LT |
134 | read_lock_bh(&xfrm6_tunnel_spi_lock); |
135 | x6spi = __xfrm6_tunnel_spi_lookup(saddr); | |
136 | spi = x6spi ? x6spi->spi : 0; | |
137 | read_unlock_bh(&xfrm6_tunnel_spi_lock); | |
5b122545 | 138 | return htonl(spi); |
1da177e4 LT |
139 | } |
140 | ||
141 | EXPORT_SYMBOL(xfrm6_tunnel_spi_lookup); | |
142 | ||
df8ea19b YH |
143 | static int __xfrm6_tunnel_spi_check(u32 spi) |
144 | { | |
145 | struct xfrm6_tunnel_spi *x6spi; | |
146 | int index = xfrm6_tunnel_spi_hash_byspi(spi); | |
147 | struct hlist_node *pos; | |
148 | ||
149 | hlist_for_each_entry(x6spi, pos, | |
150 | &xfrm6_tunnel_spi_byspi[index], | |
151 | list_byspi) { | |
152 | if (x6spi->spi == spi) | |
153 | return -1; | |
154 | } | |
155 | return index; | |
156 | } | |
157 | ||
1da177e4 LT |
158 | static u32 __xfrm6_tunnel_alloc_spi(xfrm_address_t *saddr) |
159 | { | |
160 | u32 spi; | |
161 | struct xfrm6_tunnel_spi *x6spi; | |
df8ea19b | 162 | int index; |
1da177e4 | 163 | |
1da177e4 LT |
164 | if (xfrm6_tunnel_spi < XFRM6_TUNNEL_SPI_MIN || |
165 | xfrm6_tunnel_spi >= XFRM6_TUNNEL_SPI_MAX) | |
166 | xfrm6_tunnel_spi = XFRM6_TUNNEL_SPI_MIN; | |
167 | else | |
168 | xfrm6_tunnel_spi++; | |
169 | ||
170 | for (spi = xfrm6_tunnel_spi; spi <= XFRM6_TUNNEL_SPI_MAX; spi++) { | |
df8ea19b YH |
171 | index = __xfrm6_tunnel_spi_check(spi); |
172 | if (index >= 0) | |
173 | goto alloc_spi; | |
1da177e4 LT |
174 | } |
175 | for (spi = XFRM6_TUNNEL_SPI_MIN; spi < xfrm6_tunnel_spi; spi++) { | |
df8ea19b YH |
176 | index = __xfrm6_tunnel_spi_check(spi); |
177 | if (index >= 0) | |
178 | goto alloc_spi; | |
1da177e4 LT |
179 | } |
180 | spi = 0; | |
181 | goto out; | |
182 | alloc_spi: | |
df8ea19b | 183 | xfrm6_tunnel_spi = spi; |
54e6ecb2 | 184 | x6spi = kmem_cache_alloc(xfrm6_tunnel_spi_kmem, GFP_ATOMIC); |
a922ba55 | 185 | if (!x6spi) |
1da177e4 | 186 | goto out; |
a922ba55 | 187 | |
1da177e4 LT |
188 | memcpy(&x6spi->addr, saddr, sizeof(x6spi->addr)); |
189 | x6spi->spi = spi; | |
190 | atomic_set(&x6spi->refcnt, 1); | |
191 | ||
192 | hlist_add_head(&x6spi->list_byspi, &xfrm6_tunnel_spi_byspi[index]); | |
193 | ||
194 | index = xfrm6_tunnel_spi_hash_byaddr(saddr); | |
195 | hlist_add_head(&x6spi->list_byaddr, &xfrm6_tunnel_spi_byaddr[index]); | |
1da177e4 | 196 | out: |
1da177e4 LT |
197 | return spi; |
198 | } | |
199 | ||
8c689a6e | 200 | __be32 xfrm6_tunnel_alloc_spi(xfrm_address_t *saddr) |
1da177e4 LT |
201 | { |
202 | struct xfrm6_tunnel_spi *x6spi; | |
203 | u32 spi; | |
204 | ||
1da177e4 LT |
205 | write_lock_bh(&xfrm6_tunnel_spi_lock); |
206 | x6spi = __xfrm6_tunnel_spi_lookup(saddr); | |
207 | if (x6spi) { | |
208 | atomic_inc(&x6spi->refcnt); | |
209 | spi = x6spi->spi; | |
210 | } else | |
211 | spi = __xfrm6_tunnel_alloc_spi(saddr); | |
212 | write_unlock_bh(&xfrm6_tunnel_spi_lock); | |
213 | ||
5b122545 | 214 | return htonl(spi); |
1da177e4 LT |
215 | } |
216 | ||
217 | EXPORT_SYMBOL(xfrm6_tunnel_alloc_spi); | |
218 | ||
219 | void xfrm6_tunnel_free_spi(xfrm_address_t *saddr) | |
220 | { | |
221 | struct xfrm6_tunnel_spi *x6spi; | |
222 | struct hlist_node *pos, *n; | |
223 | ||
1da177e4 LT |
224 | write_lock_bh(&xfrm6_tunnel_spi_lock); |
225 | ||
1ab1457c | 226 | hlist_for_each_entry_safe(x6spi, pos, n, |
1da177e4 LT |
227 | &xfrm6_tunnel_spi_byaddr[xfrm6_tunnel_spi_hash_byaddr(saddr)], |
228 | list_byaddr) | |
229 | { | |
230 | if (memcmp(&x6spi->addr, saddr, sizeof(x6spi->addr)) == 0) { | |
1da177e4 LT |
231 | if (atomic_dec_and_test(&x6spi->refcnt)) { |
232 | hlist_del(&x6spi->list_byaddr); | |
233 | hlist_del(&x6spi->list_byspi); | |
234 | kmem_cache_free(xfrm6_tunnel_spi_kmem, x6spi); | |
235 | break; | |
236 | } | |
237 | } | |
238 | } | |
239 | write_unlock_bh(&xfrm6_tunnel_spi_lock); | |
240 | } | |
241 | ||
242 | EXPORT_SYMBOL(xfrm6_tunnel_free_spi); | |
243 | ||
244 | static int xfrm6_tunnel_output(struct xfrm_state *x, struct sk_buff *skb) | |
245 | { | |
7b277b1a | 246 | skb_push(skb, -skb_network_offset(skb)); |
1da177e4 LT |
247 | return 0; |
248 | } | |
249 | ||
e695633e | 250 | static int xfrm6_tunnel_input(struct xfrm_state *x, struct sk_buff *skb) |
1da177e4 | 251 | { |
04663d0b | 252 | return skb_network_header(skb)[IP6CB(skb)->nhoff]; |
1da177e4 LT |
253 | } |
254 | ||
d2acc347 | 255 | static int xfrm6_tunnel_rcv(struct sk_buff *skb) |
1da177e4 | 256 | { |
0660e03f | 257 | struct ipv6hdr *iph = ipv6_hdr(skb); |
a252cc23 | 258 | __be32 spi; |
1da177e4 | 259 | |
1da177e4 | 260 | spi = xfrm6_tunnel_spi_lookup((xfrm_address_t *)&iph->saddr); |
33b5ecb8 | 261 | return xfrm6_rcv_spi(skb, IPPROTO_IPV6, spi) > 0 ? : 0; |
1da177e4 LT |
262 | } |
263 | ||
d2acc347 | 264 | static int xfrm6_tunnel_err(struct sk_buff *skb, struct inet6_skb_parm *opt, |
04ce6909 | 265 | int type, int code, int offset, __be32 info) |
1da177e4 | 266 | { |
1da177e4 LT |
267 | /* xfrm6_tunnel native err handling */ |
268 | switch (type) { | |
1ab1457c | 269 | case ICMPV6_DEST_UNREACH: |
1da177e4 | 270 | switch (code) { |
1ab1457c | 271 | case ICMPV6_NOROUTE: |
1da177e4 LT |
272 | case ICMPV6_ADM_PROHIBITED: |
273 | case ICMPV6_NOT_NEIGHBOUR: | |
274 | case ICMPV6_ADDR_UNREACH: | |
275 | case ICMPV6_PORT_UNREACH: | |
276 | default: | |
1da177e4 LT |
277 | break; |
278 | } | |
279 | break; | |
280 | case ICMPV6_PKT_TOOBIG: | |
1da177e4 LT |
281 | break; |
282 | case ICMPV6_TIME_EXCEED: | |
283 | switch (code) { | |
284 | case ICMPV6_EXC_HOPLIMIT: | |
1da177e4 LT |
285 | break; |
286 | case ICMPV6_EXC_FRAGTIME: | |
1ab1457c | 287 | default: |
1da177e4 LT |
288 | break; |
289 | } | |
290 | break; | |
291 | case ICMPV6_PARAMPROB: | |
292 | switch (code) { | |
293 | case ICMPV6_HDR_FIELD: break; | |
294 | case ICMPV6_UNK_NEXTHDR: break; | |
295 | case ICMPV6_UNK_OPTION: break; | |
296 | } | |
297 | break; | |
298 | default: | |
299 | break; | |
300 | } | |
d2acc347 HX |
301 | |
302 | return 0; | |
1da177e4 LT |
303 | } |
304 | ||
72cb6962 | 305 | static int xfrm6_tunnel_init_state(struct xfrm_state *x) |
1da177e4 | 306 | { |
7e49e6de | 307 | if (x->props.mode != XFRM_MODE_TUNNEL) |
1da177e4 LT |
308 | return -EINVAL; |
309 | ||
310 | if (x->encap) | |
311 | return -EINVAL; | |
312 | ||
313 | x->props.header_len = sizeof(struct ipv6hdr); | |
314 | ||
315 | return 0; | |
316 | } | |
317 | ||
318 | static void xfrm6_tunnel_destroy(struct xfrm_state *x) | |
319 | { | |
320 | xfrm6_tunnel_free_spi((xfrm_address_t *)&x->props.saddr); | |
321 | } | |
322 | ||
533cb5b0 | 323 | static const struct xfrm_type xfrm6_tunnel_type = { |
1da177e4 LT |
324 | .description = "IP6IP6", |
325 | .owner = THIS_MODULE, | |
326 | .proto = IPPROTO_IPV6, | |
327 | .init_state = xfrm6_tunnel_init_state, | |
328 | .destructor = xfrm6_tunnel_destroy, | |
329 | .input = xfrm6_tunnel_input, | |
330 | .output = xfrm6_tunnel_output, | |
331 | }; | |
332 | ||
d2acc347 | 333 | static struct xfrm6_tunnel xfrm6_tunnel_handler = { |
1da177e4 | 334 | .handler = xfrm6_tunnel_rcv, |
d2acc347 HX |
335 | .err_handler = xfrm6_tunnel_err, |
336 | .priority = 2, | |
1da177e4 LT |
337 | }; |
338 | ||
73d605d1 KM |
339 | static struct xfrm6_tunnel xfrm46_tunnel_handler = { |
340 | .handler = xfrm6_tunnel_rcv, | |
341 | .err_handler = xfrm6_tunnel_err, | |
342 | .priority = 2, | |
343 | }; | |
344 | ||
1da177e4 LT |
345 | static int __init xfrm6_tunnel_init(void) |
346 | { | |
a922ba55 | 347 | if (xfrm_register_type(&xfrm6_tunnel_type, AF_INET6) < 0) |
1da177e4 | 348 | return -EAGAIN; |
a922ba55 | 349 | |
73d605d1 KM |
350 | if (xfrm6_tunnel_register(&xfrm6_tunnel_handler, AF_INET6)) { |
351 | xfrm_unregister_type(&xfrm6_tunnel_type, AF_INET6); | |
352 | return -EAGAIN; | |
353 | } | |
354 | if (xfrm6_tunnel_register(&xfrm46_tunnel_handler, AF_INET)) { | |
355 | xfrm6_tunnel_deregister(&xfrm6_tunnel_handler, AF_INET6); | |
1da177e4 LT |
356 | xfrm_unregister_type(&xfrm6_tunnel_type, AF_INET6); |
357 | return -EAGAIN; | |
358 | } | |
359 | if (xfrm6_tunnel_spi_init() < 0) { | |
73d605d1 KM |
360 | xfrm6_tunnel_deregister(&xfrm46_tunnel_handler, AF_INET); |
361 | xfrm6_tunnel_deregister(&xfrm6_tunnel_handler, AF_INET6); | |
1da177e4 LT |
362 | xfrm_unregister_type(&xfrm6_tunnel_type, AF_INET6); |
363 | return -EAGAIN; | |
364 | } | |
365 | return 0; | |
366 | } | |
367 | ||
368 | static void __exit xfrm6_tunnel_fini(void) | |
369 | { | |
1da177e4 | 370 | xfrm6_tunnel_spi_fini(); |
73d605d1 KM |
371 | xfrm6_tunnel_deregister(&xfrm46_tunnel_handler, AF_INET); |
372 | xfrm6_tunnel_deregister(&xfrm6_tunnel_handler, AF_INET6); | |
a922ba55 | 373 | xfrm_unregister_type(&xfrm6_tunnel_type, AF_INET6); |
1da177e4 LT |
374 | } |
375 | ||
376 | module_init(xfrm6_tunnel_init); | |
377 | module_exit(xfrm6_tunnel_fini); | |
378 | MODULE_LICENSE("GPL"); | |
d3d6dd3a | 379 | MODULE_ALIAS_XFRM_TYPE(AF_INET6, XFRM_PROTO_IPV6); |