]>
Commit | Line | Data |
---|---|---|
b59f45d0 HX |
1 | /* |
2 | * xfrm4_mode_tunnel.c - Tunnel mode encapsulation for IPv4. | |
3 | * | |
4 | * Copyright (c) 2004-2006 Herbert Xu <[email protected]> | |
5 | */ | |
6 | ||
5a0e3ad6 | 7 | #include <linux/gfp.h> |
b59f45d0 HX |
8 | #include <linux/init.h> |
9 | #include <linux/kernel.h> | |
10 | #include <linux/module.h> | |
11 | #include <linux/skbuff.h> | |
12 | #include <linux/stringify.h> | |
13 | #include <net/dst.h> | |
14 | #include <net/inet_ecn.h> | |
15 | #include <net/ip.h> | |
16 | #include <net/xfrm.h> | |
17 | ||
eb8637cd S |
18 | /* Informational hook. The decap is still done here. */ |
19 | static struct xfrm_tunnel __rcu *rcv_notify_handlers __read_mostly; | |
20 | static DEFINE_MUTEX(xfrm4_mode_tunnel_input_mutex); | |
21 | ||
22 | int xfrm4_mode_tunnel_input_register(struct xfrm_tunnel *handler) | |
23 | { | |
24 | struct xfrm_tunnel __rcu **pprev; | |
25 | struct xfrm_tunnel *t; | |
26 | int ret = -EEXIST; | |
27 | int priority = handler->priority; | |
28 | ||
29 | mutex_lock(&xfrm4_mode_tunnel_input_mutex); | |
30 | ||
31 | for (pprev = &rcv_notify_handlers; | |
32 | (t = rcu_dereference_protected(*pprev, | |
33 | lockdep_is_held(&xfrm4_mode_tunnel_input_mutex))) != NULL; | |
34 | pprev = &t->next) { | |
35 | if (t->priority > priority) | |
36 | break; | |
37 | if (t->priority == priority) | |
38 | goto err; | |
39 | ||
40 | } | |
41 | ||
42 | handler->next = *pprev; | |
43 | rcu_assign_pointer(*pprev, handler); | |
44 | ||
45 | ret = 0; | |
46 | ||
47 | err: | |
48 | mutex_unlock(&xfrm4_mode_tunnel_input_mutex); | |
49 | return ret; | |
50 | } | |
51 | EXPORT_SYMBOL_GPL(xfrm4_mode_tunnel_input_register); | |
52 | ||
53 | int xfrm4_mode_tunnel_input_deregister(struct xfrm_tunnel *handler) | |
54 | { | |
55 | struct xfrm_tunnel __rcu **pprev; | |
56 | struct xfrm_tunnel *t; | |
57 | int ret = -ENOENT; | |
58 | ||
59 | mutex_lock(&xfrm4_mode_tunnel_input_mutex); | |
60 | for (pprev = &rcv_notify_handlers; | |
61 | (t = rcu_dereference_protected(*pprev, | |
62 | lockdep_is_held(&xfrm4_mode_tunnel_input_mutex))) != NULL; | |
63 | pprev = &t->next) { | |
64 | if (t == handler) { | |
65 | *pprev = handler->next; | |
66 | ret = 0; | |
67 | break; | |
68 | } | |
69 | } | |
70 | mutex_unlock(&xfrm4_mode_tunnel_input_mutex); | |
71 | synchronize_net(); | |
72 | ||
73 | return ret; | |
74 | } | |
75 | EXPORT_SYMBOL_GPL(xfrm4_mode_tunnel_input_deregister); | |
76 | ||
b59f45d0 HX |
77 | static inline void ipip_ecn_decapsulate(struct sk_buff *skb) |
78 | { | |
b0061ce4 | 79 | struct iphdr *inner_iph = ipip_hdr(skb); |
b59f45d0 | 80 | |
227620e2 | 81 | if (INET_ECN_is_ce(XFRM_MODE_SKB_CB(skb)->tos)) |
b59f45d0 HX |
82 | IP_ECN_set_ce(inner_iph); |
83 | } | |
84 | ||
85 | /* Add encapsulation header. | |
86 | * | |
ceb1eec8 | 87 | * The top IP header will be constructed per RFC 2401. |
b59f45d0 | 88 | */ |
195ad6a3 | 89 | static int xfrm4_mode_tunnel_output(struct xfrm_state *x, struct sk_buff *skb) |
b59f45d0 | 90 | { |
adf30907 | 91 | struct dst_entry *dst = skb_dst(skb); |
36cf9acf | 92 | struct iphdr *top_iph; |
b59f45d0 HX |
93 | int flags; |
94 | ||
7b277b1a | 95 | skb_set_network_header(skb, -x->props.header_len); |
37fedd3a HX |
96 | skb->mac_header = skb->network_header + |
97 | offsetof(struct iphdr, protocol); | |
36cf9acf | 98 | skb->transport_header = skb->network_header + sizeof(*top_iph); |
eddc9ec5 | 99 | top_iph = ip_hdr(skb); |
b59f45d0 HX |
100 | |
101 | top_iph->ihl = 5; | |
102 | top_iph->version = 4; | |
103 | ||
adf30907 | 104 | top_iph->protocol = xfrm_af2proto(skb_dst(skb)->ops->family); |
c82f963e | 105 | |
b59f45d0 | 106 | /* DS disclosed */ |
36cf9acf HX |
107 | top_iph->tos = INET_ECN_encapsulate(XFRM_MODE_SKB_CB(skb)->tos, |
108 | XFRM_MODE_SKB_CB(skb)->tos); | |
b59f45d0 | 109 | |
36cf9acf | 110 | flags = x->props.flags; |
b59f45d0 HX |
111 | if (flags & XFRM_STATE_NOECN) |
112 | IP_ECN_clear(top_iph); | |
113 | ||
36cf9acf | 114 | top_iph->frag_off = (flags & XFRM_STATE_NOPMTUDISC) ? |
fe833fca | 115 | 0 : (XFRM_MODE_SKB_CB(skb)->frag_off & htons(IP_DF)); |
36cf9acf | 116 | ip_select_ident(top_iph, dst->child, NULL); |
b59f45d0 | 117 | |
323e126f | 118 | top_iph->ttl = ip4_dst_hoplimit(dst->child); |
b59f45d0 HX |
119 | |
120 | top_iph->saddr = x->props.saddr.a4; | |
121 | top_iph->daddr = x->id.daddr.a4; | |
b59f45d0 | 122 | |
b59f45d0 HX |
123 | return 0; |
124 | } | |
125 | ||
eb8637cd S |
126 | #define for_each_input_rcu(head, handler) \ |
127 | for (handler = rcu_dereference(head); \ | |
128 | handler != NULL; \ | |
129 | handler = rcu_dereference(handler->next)) | |
130 | ||
195ad6a3 | 131 | static int xfrm4_mode_tunnel_input(struct xfrm_state *x, struct sk_buff *skb) |
b59f45d0 | 132 | { |
eb8637cd | 133 | struct xfrm_tunnel *handler; |
b59f45d0 HX |
134 | int err = -EINVAL; |
135 | ||
227620e2 HX |
136 | if (XFRM_MODE_SKB_CB(skb)->protocol != IPPROTO_IPIP) |
137 | goto out; | |
c82f963e | 138 | |
b59f45d0 HX |
139 | if (!pskb_may_pull(skb, sizeof(struct iphdr))) |
140 | goto out; | |
141 | ||
eb8637cd S |
142 | for_each_input_rcu(rcv_notify_handlers, handler) |
143 | handler->handler(skb); | |
144 | ||
b59f45d0 HX |
145 | if (skb_cloned(skb) && |
146 | (err = pskb_expand_head(skb, 0, 0, GFP_ATOMIC))) | |
147 | goto out; | |
148 | ||
227620e2 HX |
149 | if (x->props.flags & XFRM_STATE_DECAP_DSCP) |
150 | ipv4_copy_dscp(XFRM_MODE_SKB_CB(skb)->tos, ipip_hdr(skb)); | |
151 | if (!(x->props.flags & XFRM_STATE_NOECN)) | |
152 | ipip_ecn_decapsulate(skb); | |
153 | ||
c1d2bbe1 | 154 | skb_reset_network_header(skb); |
03606895 ED |
155 | skb_mac_header_rebuild(skb); |
156 | ||
b59f45d0 HX |
157 | err = 0; |
158 | ||
159 | out: | |
160 | return err; | |
161 | } | |
162 | ||
163 | static struct xfrm_mode xfrm4_tunnel_mode = { | |
195ad6a3 | 164 | .input2 = xfrm4_mode_tunnel_input, |
227620e2 | 165 | .input = xfrm_prepare_input, |
195ad6a3 | 166 | .output2 = xfrm4_mode_tunnel_output, |
36cf9acf | 167 | .output = xfrm4_prepare_output, |
b59f45d0 HX |
168 | .owner = THIS_MODULE, |
169 | .encap = XFRM_MODE_TUNNEL, | |
1bfcb10f | 170 | .flags = XFRM_MODE_FLAG_TUNNEL, |
b59f45d0 HX |
171 | }; |
172 | ||
195ad6a3 | 173 | static int __init xfrm4_mode_tunnel_init(void) |
b59f45d0 HX |
174 | { |
175 | return xfrm_register_mode(&xfrm4_tunnel_mode, AF_INET); | |
176 | } | |
177 | ||
195ad6a3 | 178 | static void __exit xfrm4_mode_tunnel_exit(void) |
b59f45d0 HX |
179 | { |
180 | int err; | |
181 | ||
182 | err = xfrm_unregister_mode(&xfrm4_tunnel_mode, AF_INET); | |
183 | BUG_ON(err); | |
184 | } | |
185 | ||
195ad6a3 HX |
186 | module_init(xfrm4_mode_tunnel_init); |
187 | module_exit(xfrm4_mode_tunnel_exit); | |
b59f45d0 HX |
188 | MODULE_LICENSE("GPL"); |
189 | MODULE_ALIAS_XFRM_MODE(AF_INET, XFRM_MODE_TUNNEL); |