blob: cb04f7a16b5e102f2944be051d61511d5645d3f7 [file] [log] [blame]
Herbert Xub59f45d2006-05-27 23:05:54 -07001/*
2 * xfrm6_mode_tunnel.c - Tunnel mode encapsulation for IPv6.
3 *
4 * Copyright (C) 2002 USAGI/WIDE Project
5 * Copyright (c) 2004-2006 Herbert Xu <herbert@gondor.apana.org.au>
6 */
7
Tejun Heo5a0e3ad2010-03-24 17:04:11 +09008#include <linux/gfp.h>
Herbert Xub59f45d2006-05-27 23:05:54 -07009#include <linux/init.h>
10#include <linux/kernel.h>
11#include <linux/module.h>
12#include <linux/skbuff.h>
13#include <linux/stringify.h>
14#include <net/dsfield.h>
15#include <net/dst.h>
16#include <net/inet_ecn.h>
David S. Millerabbf46a2010-12-12 21:14:46 -080017#include <net/ip6_route.h>
Herbert Xub59f45d2006-05-27 23:05:54 -070018#include <net/ipv6.h>
19#include <net/xfrm.h>
20
Steffen Klassert212e5602013-08-19 08:07:34 +020021/* Informational hook. The decap is still done here. */
22static struct xfrm_tunnel_notifier __rcu *rcv_notify_handlers __read_mostly;
23static DEFINE_MUTEX(xfrm6_mode_tunnel_input_mutex);
24
25int xfrm6_mode_tunnel_input_register(struct xfrm_tunnel_notifier *handler)
26{
27 struct xfrm_tunnel_notifier __rcu **pprev;
28 struct xfrm_tunnel_notifier *t;
29 int ret = -EEXIST;
30 int priority = handler->priority;
31
32 mutex_lock(&xfrm6_mode_tunnel_input_mutex);
33
34 for (pprev = &rcv_notify_handlers;
35 (t = rcu_dereference_protected(*pprev,
36 lockdep_is_held(&xfrm6_mode_tunnel_input_mutex))) != NULL;
37 pprev = &t->next) {
38 if (t->priority > priority)
39 break;
40 if (t->priority == priority)
41 goto err;
42
43 }
44
45 handler->next = *pprev;
46 rcu_assign_pointer(*pprev, handler);
47
48 ret = 0;
49
50err:
51 mutex_unlock(&xfrm6_mode_tunnel_input_mutex);
52 return ret;
53}
54EXPORT_SYMBOL_GPL(xfrm6_mode_tunnel_input_register);
55
56int xfrm6_mode_tunnel_input_deregister(struct xfrm_tunnel_notifier *handler)
57{
58 struct xfrm_tunnel_notifier __rcu **pprev;
59 struct xfrm_tunnel_notifier *t;
60 int ret = -ENOENT;
61
62 mutex_lock(&xfrm6_mode_tunnel_input_mutex);
63 for (pprev = &rcv_notify_handlers;
64 (t = rcu_dereference_protected(*pprev,
65 lockdep_is_held(&xfrm6_mode_tunnel_input_mutex))) != NULL;
66 pprev = &t->next) {
67 if (t == handler) {
68 *pprev = handler->next;
69 ret = 0;
70 break;
71 }
72 }
73 mutex_unlock(&xfrm6_mode_tunnel_input_mutex);
74 synchronize_net();
75
76 return ret;
77}
78EXPORT_SYMBOL_GPL(xfrm6_mode_tunnel_input_deregister);
79
Herbert Xub59f45d2006-05-27 23:05:54 -070080static inline void ipip6_ecn_decapsulate(struct sk_buff *skb)
81{
Eric Dumazetb71d1d42011-04-22 04:53:02 +000082 const struct ipv6hdr *outer_iph = ipv6_hdr(skb);
Arnaldo Carvalho de Melo39b89162007-04-10 21:06:25 -070083 struct ipv6hdr *inner_iph = ipipv6_hdr(skb);
Herbert Xub59f45d2006-05-27 23:05:54 -070084
85 if (INET_ECN_is_ce(ipv6_get_dsfield(outer_iph)))
86 IP6_ECN_set_ce(inner_iph);
87}
88
89/* Add encapsulation header.
90 *
Herbert Xuceb1eec82007-10-10 15:45:52 -070091 * The top IP header will be constructed per RFC 2401.
Herbert Xub59f45d2006-05-27 23:05:54 -070092 */
Herbert Xu195ad6a2007-12-20 13:53:40 -080093static int xfrm6_mode_tunnel_output(struct xfrm_state *x, struct sk_buff *skb)
Herbert Xub59f45d2006-05-27 23:05:54 -070094{
Eric Dumazetadf30902009-06-02 05:19:30 +000095 struct dst_entry *dst = skb_dst(skb);
Herbert Xu36cf9ac2007-11-13 21:40:52 -080096 struct ipv6hdr *top_iph;
Herbert Xub59f45d2006-05-27 23:05:54 -070097 int dsfield;
98
Herbert Xu7b277b12007-10-10 15:44:06 -070099 skb_set_network_header(skb, -x->props.header_len);
Herbert Xu37fedd32007-10-10 15:44:44 -0700100 skb->mac_header = skb->network_header +
101 offsetof(struct ipv6hdr, nexthdr);
Herbert Xu36cf9ac2007-11-13 21:40:52 -0800102 skb->transport_header = skb->network_header + sizeof(*top_iph);
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700103 top_iph = ipv6_hdr(skb);
Herbert Xub59f45d2006-05-27 23:05:54 -0700104
105 top_iph->version = 6;
Herbert Xu36cf9ac2007-11-13 21:40:52 -0800106
107 memcpy(top_iph->flow_lbl, XFRM_MODE_SKB_CB(skb)->flow_lbl,
108 sizeof(top_iph->flow_lbl));
Eric Dumazetadf30902009-06-02 05:19:30 +0000109 top_iph->nexthdr = xfrm_af2proto(skb_dst(skb)->ops->family);
Herbert Xu36cf9ac2007-11-13 21:40:52 -0800110
Nicolas Dichtela947b0a2013-02-22 10:54:54 +0100111 if (x->props.extra_flags & XFRM_SA_XFLAG_DONT_ENCAP_DSCP)
112 dsfield = 0;
113 else
114 dsfield = XFRM_MODE_SKB_CB(skb)->tos;
115 dsfield = INET_ECN_encapsulate(dsfield, XFRM_MODE_SKB_CB(skb)->tos);
Herbert Xub59f45d2006-05-27 23:05:54 -0700116 if (x->props.flags & XFRM_STATE_NOECN)
117 dsfield &= ~INET_ECN_MASK;
118 ipv6_change_dsfield(top_iph, 0, dsfield);
David S. Millerabbf46a2010-12-12 21:14:46 -0800119 top_iph->hop_limit = ip6_dst_hoplimit(dst->child);
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000120 top_iph->saddr = *(struct in6_addr *)&x->props.saddr;
121 top_iph->daddr = *(struct in6_addr *)&x->id.daddr;
Herbert Xub59f45d2006-05-27 23:05:54 -0700122 return 0;
123}
124
Steffen Klassert212e5602013-08-19 08:07:34 +0200125#define for_each_input_rcu(head, handler) \
126 for (handler = rcu_dereference(head); \
127 handler != NULL; \
128 handler = rcu_dereference(handler->next))
129
130
Herbert Xu195ad6a2007-12-20 13:53:40 -0800131static int xfrm6_mode_tunnel_input(struct xfrm_state *x, struct sk_buff *skb)
Herbert Xub59f45d2006-05-27 23:05:54 -0700132{
Steffen Klassert212e5602013-08-19 08:07:34 +0200133 struct xfrm_tunnel_notifier *handler;
Herbert Xub59f45d2006-05-27 23:05:54 -0700134 int err = -EINVAL;
135
Herbert Xu227620e2007-11-13 21:41:28 -0800136 if (XFRM_MODE_SKB_CB(skb)->protocol != IPPROTO_IPV6)
Herbert Xub59f45d2006-05-27 23:05:54 -0700137 goto out;
138 if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
139 goto out;
140
Steffen Klassert212e5602013-08-19 08:07:34 +0200141 for_each_input_rcu(rcv_notify_handlers, handler)
142 handler->handler(skb);
143
stephen hemminger0d4bfa22013-02-16 07:38:15 +0000144 err = skb_unclone(skb, GFP_ATOMIC);
145 if (err)
Herbert Xub59f45d2006-05-27 23:05:54 -0700146 goto out;
147
Herbert Xu227620e2007-11-13 21:41:28 -0800148 if (x->props.flags & XFRM_STATE_DECAP_DSCP)
149 ipv6_copy_dscp(ipv6_get_dsfield(ipv6_hdr(skb)),
150 ipipv6_hdr(skb));
151 if (!(x->props.flags & XFRM_STATE_NOECN))
152 ipip6_ecn_decapsulate(skb);
153
Arnaldo Carvalho de Meloc1d2bbe2007-04-10 20:45:18 -0700154 skb_reset_network_header(skb);
Eric Dumazet03606892012-02-23 10:55:02 +0000155 skb_mac_header_rebuild(skb);
156
Herbert Xub59f45d2006-05-27 23:05:54 -0700157 err = 0;
158
159out:
160 return err;
161}
162
163static struct xfrm_mode xfrm6_tunnel_mode = {
Herbert Xu195ad6a2007-12-20 13:53:40 -0800164 .input2 = xfrm6_mode_tunnel_input,
Herbert Xu227620e2007-11-13 21:41:28 -0800165 .input = xfrm_prepare_input,
Herbert Xu195ad6a2007-12-20 13:53:40 -0800166 .output2 = xfrm6_mode_tunnel_output,
Herbert Xu36cf9ac2007-11-13 21:40:52 -0800167 .output = xfrm6_prepare_output,
Herbert Xub59f45d2006-05-27 23:05:54 -0700168 .owner = THIS_MODULE,
169 .encap = XFRM_MODE_TUNNEL,
Herbert Xu1bfcb102007-10-17 21:31:50 -0700170 .flags = XFRM_MODE_FLAG_TUNNEL,
Herbert Xub59f45d2006-05-27 23:05:54 -0700171};
172
Herbert Xu195ad6a2007-12-20 13:53:40 -0800173static int __init xfrm6_mode_tunnel_init(void)
Herbert Xub59f45d2006-05-27 23:05:54 -0700174{
175 return xfrm_register_mode(&xfrm6_tunnel_mode, AF_INET6);
176}
177
Herbert Xu195ad6a2007-12-20 13:53:40 -0800178static void __exit xfrm6_mode_tunnel_exit(void)
Herbert Xub59f45d2006-05-27 23:05:54 -0700179{
180 int err;
181
182 err = xfrm_unregister_mode(&xfrm6_tunnel_mode, AF_INET6);
183 BUG_ON(err);
184}
185
Herbert Xu195ad6a2007-12-20 13:53:40 -0800186module_init(xfrm6_mode_tunnel_init);
187module_exit(xfrm6_mode_tunnel_exit);
Herbert Xub59f45d2006-05-27 23:05:54 -0700188MODULE_LICENSE("GPL");
189MODULE_ALIAS_XFRM_MODE(AF_INET6, XFRM_MODE_TUNNEL);