^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1) // SPDX-License-Identifier: GPL-2.0-or-later
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3) * Copyright (C)2003,2004 USAGI/WIDE Project
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 4) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 5) * Authors Mitsuru KANDA <mk@linux-ipv6.org>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 6) * YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 7) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 8) * Based on net/ipv4/xfrm4_tunnel.c
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 9) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 10) #include <linux/module.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 11) #include <linux/xfrm.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 12) #include <linux/slab.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 13) #include <linux/rculist.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 14) #include <net/ip.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 15) #include <net/xfrm.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 16) #include <net/ipv6.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 17) #include <linux/ipv6.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 18) #include <linux/icmpv6.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 19) #include <linux/mutex.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 20) #include <net/netns/generic.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 21)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 22) #define XFRM6_TUNNEL_SPI_BYADDR_HSIZE 256
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 23) #define XFRM6_TUNNEL_SPI_BYSPI_HSIZE 256
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 24)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 25) #define XFRM6_TUNNEL_SPI_MIN 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 26) #define XFRM6_TUNNEL_SPI_MAX 0xffffffff
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 27)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 28) struct xfrm6_tunnel_net {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 29) struct hlist_head spi_byaddr[XFRM6_TUNNEL_SPI_BYADDR_HSIZE];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 30) struct hlist_head spi_byspi[XFRM6_TUNNEL_SPI_BYSPI_HSIZE];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 31) u32 spi;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 32) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 33)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 34) static unsigned int xfrm6_tunnel_net_id __read_mostly;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 35) static inline struct xfrm6_tunnel_net *xfrm6_tunnel_pernet(struct net *net)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 36) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 37) return net_generic(net, xfrm6_tunnel_net_id);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 38) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 39)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 40) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 41) * xfrm_tunnel_spi things are for allocating unique id ("spi")
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 42) * per xfrm_address_t.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 43) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 44) struct xfrm6_tunnel_spi {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 45) struct hlist_node list_byaddr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 46) struct hlist_node list_byspi;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 47) xfrm_address_t addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 48) u32 spi;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 49) refcount_t refcnt;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 50) struct rcu_head rcu_head;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 51) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 52)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 53) static DEFINE_SPINLOCK(xfrm6_tunnel_spi_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 54)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 55) static struct kmem_cache *xfrm6_tunnel_spi_kmem __read_mostly;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 56)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 57) static inline unsigned int xfrm6_tunnel_spi_hash_byaddr(const xfrm_address_t *addr)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 58) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 59) unsigned int h;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 60)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 61) h = ipv6_addr_hash((const struct in6_addr *)addr);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 62) h ^= h >> 16;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 63) h ^= h >> 8;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 64) h &= XFRM6_TUNNEL_SPI_BYADDR_HSIZE - 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 65)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 66) return h;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 67) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 68)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 69) static inline unsigned int xfrm6_tunnel_spi_hash_byspi(u32 spi)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 70) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 71) return spi % XFRM6_TUNNEL_SPI_BYSPI_HSIZE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 72) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 73)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 74) static struct xfrm6_tunnel_spi *__xfrm6_tunnel_spi_lookup(struct net *net, const xfrm_address_t *saddr)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 75) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 76) struct xfrm6_tunnel_net *xfrm6_tn = xfrm6_tunnel_pernet(net);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 77) struct xfrm6_tunnel_spi *x6spi;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 78)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 79) hlist_for_each_entry_rcu(x6spi,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 80) &xfrm6_tn->spi_byaddr[xfrm6_tunnel_spi_hash_byaddr(saddr)],
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 81) list_byaddr, lockdep_is_held(&xfrm6_tunnel_spi_lock)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 82) if (xfrm6_addr_equal(&x6spi->addr, saddr))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 83) return x6spi;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 84) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 85)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 86) return NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 87) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 88)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 89) __be32 xfrm6_tunnel_spi_lookup(struct net *net, const xfrm_address_t *saddr)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 90) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 91) struct xfrm6_tunnel_spi *x6spi;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 92) u32 spi;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 93)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 94) rcu_read_lock_bh();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 95) x6spi = __xfrm6_tunnel_spi_lookup(net, saddr);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 96) spi = x6spi ? x6spi->spi : 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 97) rcu_read_unlock_bh();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 98) return htonl(spi);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 99) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 100) EXPORT_SYMBOL(xfrm6_tunnel_spi_lookup);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 101)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 102) static int __xfrm6_tunnel_spi_check(struct net *net, u32 spi)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 103) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 104) struct xfrm6_tunnel_net *xfrm6_tn = xfrm6_tunnel_pernet(net);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 105) struct xfrm6_tunnel_spi *x6spi;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 106) int index = xfrm6_tunnel_spi_hash_byspi(spi);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 107)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 108) hlist_for_each_entry(x6spi,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 109) &xfrm6_tn->spi_byspi[index],
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 110) list_byspi) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 111) if (x6spi->spi == spi)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 112) return -1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 113) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 114) return index;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 115) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 116)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 117) static u32 __xfrm6_tunnel_alloc_spi(struct net *net, xfrm_address_t *saddr)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 118) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 119) struct xfrm6_tunnel_net *xfrm6_tn = xfrm6_tunnel_pernet(net);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 120) u32 spi;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 121) struct xfrm6_tunnel_spi *x6spi;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 122) int index;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 123)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 124) if (xfrm6_tn->spi < XFRM6_TUNNEL_SPI_MIN ||
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 125) xfrm6_tn->spi >= XFRM6_TUNNEL_SPI_MAX)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 126) xfrm6_tn->spi = XFRM6_TUNNEL_SPI_MIN;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 127) else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 128) xfrm6_tn->spi++;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 129)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 130) for (spi = xfrm6_tn->spi; spi <= XFRM6_TUNNEL_SPI_MAX; spi++) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 131) index = __xfrm6_tunnel_spi_check(net, spi);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 132) if (index >= 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 133) goto alloc_spi;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 134)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 135) if (spi == XFRM6_TUNNEL_SPI_MAX)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 136) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 137) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 138) for (spi = XFRM6_TUNNEL_SPI_MIN; spi < xfrm6_tn->spi; spi++) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 139) index = __xfrm6_tunnel_spi_check(net, spi);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 140) if (index >= 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 141) goto alloc_spi;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 142) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 143) spi = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 144) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 145) alloc_spi:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 146) xfrm6_tn->spi = spi;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 147) x6spi = kmem_cache_alloc(xfrm6_tunnel_spi_kmem, GFP_ATOMIC);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 148) if (!x6spi)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 149) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 150)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 151) memcpy(&x6spi->addr, saddr, sizeof(x6spi->addr));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 152) x6spi->spi = spi;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 153) refcount_set(&x6spi->refcnt, 1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 154)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 155) hlist_add_head_rcu(&x6spi->list_byspi, &xfrm6_tn->spi_byspi[index]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 156)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 157) index = xfrm6_tunnel_spi_hash_byaddr(saddr);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 158) hlist_add_head_rcu(&x6spi->list_byaddr, &xfrm6_tn->spi_byaddr[index]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 159) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 160) return spi;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 161) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 162)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 163) __be32 xfrm6_tunnel_alloc_spi(struct net *net, xfrm_address_t *saddr)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 164) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 165) struct xfrm6_tunnel_spi *x6spi;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 166) u32 spi;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 167)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 168) spin_lock_bh(&xfrm6_tunnel_spi_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 169) x6spi = __xfrm6_tunnel_spi_lookup(net, saddr);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 170) if (x6spi) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 171) refcount_inc(&x6spi->refcnt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 172) spi = x6spi->spi;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 173) } else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 174) spi = __xfrm6_tunnel_alloc_spi(net, saddr);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 175) spin_unlock_bh(&xfrm6_tunnel_spi_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 176)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 177) return htonl(spi);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 178) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 179) EXPORT_SYMBOL(xfrm6_tunnel_alloc_spi);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 180)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 181) static void x6spi_destroy_rcu(struct rcu_head *head)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 182) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 183) kmem_cache_free(xfrm6_tunnel_spi_kmem,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 184) container_of(head, struct xfrm6_tunnel_spi, rcu_head));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 185) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 186)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 187) static void xfrm6_tunnel_free_spi(struct net *net, xfrm_address_t *saddr)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 188) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 189) struct xfrm6_tunnel_net *xfrm6_tn = xfrm6_tunnel_pernet(net);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 190) struct xfrm6_tunnel_spi *x6spi;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 191) struct hlist_node *n;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 192)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 193) spin_lock_bh(&xfrm6_tunnel_spi_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 194)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 195) hlist_for_each_entry_safe(x6spi, n,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 196) &xfrm6_tn->spi_byaddr[xfrm6_tunnel_spi_hash_byaddr(saddr)],
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 197) list_byaddr)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 198) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 199) if (xfrm6_addr_equal(&x6spi->addr, saddr)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 200) if (refcount_dec_and_test(&x6spi->refcnt)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 201) hlist_del_rcu(&x6spi->list_byaddr);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 202) hlist_del_rcu(&x6spi->list_byspi);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 203) call_rcu(&x6spi->rcu_head, x6spi_destroy_rcu);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 204) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 205) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 206) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 207) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 208) spin_unlock_bh(&xfrm6_tunnel_spi_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 209) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 210)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 211) static int xfrm6_tunnel_output(struct xfrm_state *x, struct sk_buff *skb)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 212) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 213) skb_push(skb, -skb_network_offset(skb));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 214) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 215) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 216)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 217) static int xfrm6_tunnel_input(struct xfrm_state *x, struct sk_buff *skb)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 218) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 219) return skb_network_header(skb)[IP6CB(skb)->nhoff];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 220) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 221)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 222) static int xfrm6_tunnel_rcv(struct sk_buff *skb)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 223) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 224) struct net *net = dev_net(skb->dev);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 225) const struct ipv6hdr *iph = ipv6_hdr(skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 226) __be32 spi;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 227)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 228) spi = xfrm6_tunnel_spi_lookup(net, (const xfrm_address_t *)&iph->saddr);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 229) return xfrm6_rcv_spi(skb, IPPROTO_IPV6, spi, NULL);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 230) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 231)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 232) static int xfrm6_tunnel_err(struct sk_buff *skb, struct inet6_skb_parm *opt,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 233) u8 type, u8 code, int offset, __be32 info)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 234) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 235) /* xfrm6_tunnel native err handling */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 236) switch (type) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 237) case ICMPV6_DEST_UNREACH:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 238) switch (code) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 239) case ICMPV6_NOROUTE:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 240) case ICMPV6_ADM_PROHIBITED:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 241) case ICMPV6_NOT_NEIGHBOUR:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 242) case ICMPV6_ADDR_UNREACH:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 243) case ICMPV6_PORT_UNREACH:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 244) default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 245) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 246) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 247) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 248) case ICMPV6_PKT_TOOBIG:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 249) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 250) case ICMPV6_TIME_EXCEED:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 251) switch (code) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 252) case ICMPV6_EXC_HOPLIMIT:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 253) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 254) case ICMPV6_EXC_FRAGTIME:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 255) default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 256) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 257) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 258) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 259) case ICMPV6_PARAMPROB:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 260) switch (code) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 261) case ICMPV6_HDR_FIELD: break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 262) case ICMPV6_UNK_NEXTHDR: break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 263) case ICMPV6_UNK_OPTION: break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 264) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 265) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 266) default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 267) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 268) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 269)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 270) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 271) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 272)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 273) static int xfrm6_tunnel_init_state(struct xfrm_state *x)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 274) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 275) if (x->props.mode != XFRM_MODE_TUNNEL)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 276) return -EINVAL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 277)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 278) if (x->encap)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 279) return -EINVAL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 280)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 281) x->props.header_len = sizeof(struct ipv6hdr);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 282)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 283) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 284) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 285)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 286) static void xfrm6_tunnel_destroy(struct xfrm_state *x)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 287) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 288) struct net *net = xs_net(x);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 289)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 290) xfrm6_tunnel_free_spi(net, (xfrm_address_t *)&x->props.saddr);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 291) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 292)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 293) static const struct xfrm_type xfrm6_tunnel_type = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 294) .description = "IP6IP6",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 295) .owner = THIS_MODULE,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 296) .proto = IPPROTO_IPV6,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 297) .init_state = xfrm6_tunnel_init_state,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 298) .destructor = xfrm6_tunnel_destroy,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 299) .input = xfrm6_tunnel_input,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 300) .output = xfrm6_tunnel_output,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 301) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 302)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 303) static struct xfrm6_tunnel xfrm6_tunnel_handler __read_mostly = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 304) .handler = xfrm6_tunnel_rcv,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 305) .err_handler = xfrm6_tunnel_err,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 306) .priority = 3,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 307) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 308)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 309) static struct xfrm6_tunnel xfrm46_tunnel_handler __read_mostly = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 310) .handler = xfrm6_tunnel_rcv,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 311) .err_handler = xfrm6_tunnel_err,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 312) .priority = 3,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 313) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 314)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 315) static int __net_init xfrm6_tunnel_net_init(struct net *net)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 316) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 317) struct xfrm6_tunnel_net *xfrm6_tn = xfrm6_tunnel_pernet(net);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 318) unsigned int i;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 319)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 320) for (i = 0; i < XFRM6_TUNNEL_SPI_BYADDR_HSIZE; i++)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 321) INIT_HLIST_HEAD(&xfrm6_tn->spi_byaddr[i]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 322) for (i = 0; i < XFRM6_TUNNEL_SPI_BYSPI_HSIZE; i++)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 323) INIT_HLIST_HEAD(&xfrm6_tn->spi_byspi[i]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 324) xfrm6_tn->spi = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 325)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 326) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 327) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 328)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 329) static void __net_exit xfrm6_tunnel_net_exit(struct net *net)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 330) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 331) struct xfrm6_tunnel_net *xfrm6_tn = xfrm6_tunnel_pernet(net);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 332) unsigned int i;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 333)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 334) xfrm_flush_gc();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 335) xfrm_state_flush(net, 0, false, true);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 336)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 337) for (i = 0; i < XFRM6_TUNNEL_SPI_BYADDR_HSIZE; i++)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 338) WARN_ON_ONCE(!hlist_empty(&xfrm6_tn->spi_byaddr[i]));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 339)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 340) for (i = 0; i < XFRM6_TUNNEL_SPI_BYSPI_HSIZE; i++)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 341) WARN_ON_ONCE(!hlist_empty(&xfrm6_tn->spi_byspi[i]));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 342) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 343)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 344) static struct pernet_operations xfrm6_tunnel_net_ops = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 345) .init = xfrm6_tunnel_net_init,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 346) .exit = xfrm6_tunnel_net_exit,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 347) .id = &xfrm6_tunnel_net_id,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 348) .size = sizeof(struct xfrm6_tunnel_net),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 349) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 350)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 351) static int __init xfrm6_tunnel_init(void)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 352) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 353) int rv;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 354)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 355) xfrm6_tunnel_spi_kmem = kmem_cache_create("xfrm6_tunnel_spi",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 356) sizeof(struct xfrm6_tunnel_spi),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 357) 0, SLAB_HWCACHE_ALIGN,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 358) NULL);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 359) if (!xfrm6_tunnel_spi_kmem)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 360) return -ENOMEM;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 361) rv = register_pernet_subsys(&xfrm6_tunnel_net_ops);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 362) if (rv < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 363) goto out_pernet;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 364) rv = xfrm_register_type(&xfrm6_tunnel_type, AF_INET6);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 365) if (rv < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 366) goto out_type;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 367) rv = xfrm6_tunnel_register(&xfrm6_tunnel_handler, AF_INET6);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 368) if (rv < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 369) goto out_xfrm6;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 370) rv = xfrm6_tunnel_register(&xfrm46_tunnel_handler, AF_INET);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 371) if (rv < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 372) goto out_xfrm46;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 373) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 374)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 375) out_xfrm46:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 376) xfrm6_tunnel_deregister(&xfrm6_tunnel_handler, AF_INET6);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 377) out_xfrm6:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 378) xfrm_unregister_type(&xfrm6_tunnel_type, AF_INET6);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 379) out_type:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 380) unregister_pernet_subsys(&xfrm6_tunnel_net_ops);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 381) out_pernet:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 382) kmem_cache_destroy(xfrm6_tunnel_spi_kmem);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 383) return rv;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 384) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 385)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 386) static void __exit xfrm6_tunnel_fini(void)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 387) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 388) xfrm6_tunnel_deregister(&xfrm46_tunnel_handler, AF_INET);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 389) xfrm6_tunnel_deregister(&xfrm6_tunnel_handler, AF_INET6);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 390) xfrm_unregister_type(&xfrm6_tunnel_type, AF_INET6);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 391) unregister_pernet_subsys(&xfrm6_tunnel_net_ops);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 392) /* Someone maybe has gotten the xfrm6_tunnel_spi.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 393) * So need to wait it.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 394) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 395) rcu_barrier();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 396) kmem_cache_destroy(xfrm6_tunnel_spi_kmem);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 397) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 398)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 399) module_init(xfrm6_tunnel_init);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 400) module_exit(xfrm6_tunnel_fini);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 401) MODULE_LICENSE("GPL");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 402) MODULE_ALIAS_XFRM_TYPE(AF_INET6, XFRM_PROTO_IPV6);