e1000: Add device IDs of blade version of the 82571 quad port
[pv_ops_mirror.git] / net / ipv6 / xfrm6_policy.c
blob3ec0c4770ee35346693bc52ea35d434aea28d815
1 /*
2 * xfrm6_policy.c: based on xfrm4_policy.c
4 * Authors:
5 * Mitsuru KANDA @USAGI
6 * Kazunori MIYAZAWA @USAGI
7 * Kunihiro Ishiguro <kunihiro@ipinfusion.com>
8 * IPv6 support
9 * YOSHIFUJI Hideaki
10 * Split up af-specific portion
14 #include <linux/compiler.h>
15 #include <linux/netdevice.h>
16 #include <net/addrconf.h>
17 #include <net/xfrm.h>
18 #include <net/ip.h>
19 #include <net/ipv6.h>
20 #include <net/ip6_route.h>
21 #if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
22 #include <net/mip6.h>
23 #endif
25 static struct dst_ops xfrm6_dst_ops;
26 static struct xfrm_policy_afinfo xfrm6_policy_afinfo;
28 static int xfrm6_dst_lookup(struct xfrm_dst **xdst, struct flowi *fl)
30 struct dst_entry *dst = ip6_route_output(NULL, fl);
31 int err = dst->error;
32 if (!err)
33 *xdst = (struct xfrm_dst *) dst;
34 else
35 dst_release(dst);
36 return err;
39 static int xfrm6_get_saddr(xfrm_address_t *saddr, xfrm_address_t *daddr)
41 struct rt6_info *rt;
42 struct flowi fl_tunnel = {
43 .nl_u = {
44 .ip6_u = {
45 .daddr = *(struct in6_addr *)&daddr->a6,
50 if (!xfrm6_dst_lookup((struct xfrm_dst **)&rt, &fl_tunnel)) {
51 ipv6_get_saddr(&rt->u.dst, (struct in6_addr *)&daddr->a6,
52 (struct in6_addr *)&saddr->a6);
53 dst_release(&rt->u.dst);
54 return 0;
56 return -EHOSTUNREACH;
59 static struct dst_entry *
60 __xfrm6_find_bundle(struct flowi *fl, struct xfrm_policy *policy)
62 struct dst_entry *dst;
64 /* Still not clear if we should set fl->fl6_{src,dst}... */
65 read_lock_bh(&policy->lock);
66 for (dst = policy->bundles; dst; dst = dst->next) {
67 struct xfrm_dst *xdst = (struct xfrm_dst*)dst;
68 struct in6_addr fl_dst_prefix, fl_src_prefix;
70 ipv6_addr_prefix(&fl_dst_prefix,
71 &fl->fl6_dst,
72 xdst->u.rt6.rt6i_dst.plen);
73 ipv6_addr_prefix(&fl_src_prefix,
74 &fl->fl6_src,
75 xdst->u.rt6.rt6i_src.plen);
76 if (ipv6_addr_equal(&xdst->u.rt6.rt6i_dst.addr, &fl_dst_prefix) &&
77 ipv6_addr_equal(&xdst->u.rt6.rt6i_src.addr, &fl_src_prefix) &&
78 xfrm_bundle_ok(policy, xdst, fl, AF_INET6,
79 (xdst->u.rt6.rt6i_dst.plen != 128 ||
80 xdst->u.rt6.rt6i_src.plen != 128))) {
81 dst_clone(dst);
82 break;
85 read_unlock_bh(&policy->lock);
86 return dst;
89 static inline struct in6_addr*
90 __xfrm6_bundle_addr_remote(struct xfrm_state *x, struct in6_addr *addr)
92 return (x->type->remote_addr) ?
93 (struct in6_addr*)x->type->remote_addr(x, (xfrm_address_t *)addr) :
94 (struct in6_addr*)&x->id.daddr;
97 static inline struct in6_addr*
98 __xfrm6_bundle_addr_local(struct xfrm_state *x, struct in6_addr *addr)
100 return (x->type->local_addr) ?
101 (struct in6_addr*)x->type->local_addr(x, (xfrm_address_t *)addr) :
102 (struct in6_addr*)&x->props.saddr;
105 static inline void
106 __xfrm6_bundle_len_inc(int *len, int *nflen, struct xfrm_state *x)
108 if (x->type->flags & XFRM_TYPE_NON_FRAGMENT)
109 *nflen += x->props.header_len;
110 else
111 *len += x->props.header_len;
114 static inline void
115 __xfrm6_bundle_len_dec(int *len, int *nflen, struct xfrm_state *x)
117 if (x->type->flags & XFRM_TYPE_NON_FRAGMENT)
118 *nflen -= x->props.header_len;
119 else
120 *len -= x->props.header_len;
123 /* Allocate chain of dst_entry's, attach known xfrm's, calculate
124 * all the metrics... Shortly, bundle a bundle.
127 static int
128 __xfrm6_bundle_create(struct xfrm_policy *policy, struct xfrm_state **xfrm, int nx,
129 struct flowi *fl, struct dst_entry **dst_p)
131 struct dst_entry *dst, *dst_prev;
132 struct rt6_info *rt0 = (struct rt6_info*)(*dst_p);
133 struct rt6_info *rt = rt0;
134 struct flowi fl_tunnel = {
135 .nl_u = {
136 .ip6_u = {
137 .saddr = fl->fl6_src,
138 .daddr = fl->fl6_dst,
142 int i;
143 int err = 0;
144 int header_len = 0;
145 int nfheader_len = 0;
146 int trailer_len = 0;
148 dst = dst_prev = NULL;
149 dst_hold(&rt->u.dst);
151 for (i = 0; i < nx; i++) {
152 struct dst_entry *dst1 = dst_alloc(&xfrm6_dst_ops);
153 struct xfrm_dst *xdst;
155 if (unlikely(dst1 == NULL)) {
156 err = -ENOBUFS;
157 dst_release(&rt->u.dst);
158 goto error;
161 if (!dst)
162 dst = dst1;
163 else {
164 dst_prev->child = dst1;
165 dst1->flags |= DST_NOHASH;
166 dst_clone(dst1);
169 xdst = (struct xfrm_dst *)dst1;
170 xdst->route = &rt->u.dst;
171 xdst->genid = xfrm[i]->genid;
172 if (rt->rt6i_node)
173 xdst->route_cookie = rt->rt6i_node->fn_sernum;
175 dst1->next = dst_prev;
176 dst_prev = dst1;
178 __xfrm6_bundle_len_inc(&header_len, &nfheader_len, xfrm[i]);
179 trailer_len += xfrm[i]->props.trailer_len;
181 if (xfrm[i]->props.mode == XFRM_MODE_TUNNEL ||
182 xfrm[i]->props.mode == XFRM_MODE_ROUTEOPTIMIZATION) {
183 unsigned short encap_family = xfrm[i]->props.family;
184 switch(encap_family) {
185 case AF_INET:
186 fl_tunnel.fl4_dst = xfrm[i]->id.daddr.a4;
187 fl_tunnel.fl4_src = xfrm[i]->props.saddr.a4;
188 break;
189 case AF_INET6:
190 ipv6_addr_copy(&fl_tunnel.fl6_dst, __xfrm6_bundle_addr_remote(xfrm[i], &fl->fl6_dst));
192 ipv6_addr_copy(&fl_tunnel.fl6_src, __xfrm6_bundle_addr_local(xfrm[i], &fl->fl6_src));
193 break;
194 default:
195 BUG_ON(1);
198 err = xfrm_dst_lookup((struct xfrm_dst **) &rt,
199 &fl_tunnel, encap_family);
200 if (err)
201 goto error;
202 } else
203 dst_hold(&rt->u.dst);
206 dst_prev->child = &rt->u.dst;
207 dst->path = &rt->u.dst;
208 if (rt->rt6i_node)
209 ((struct xfrm_dst *)dst)->path_cookie = rt->rt6i_node->fn_sernum;
211 *dst_p = dst;
212 dst = dst_prev;
214 dst_prev = *dst_p;
215 i = 0;
216 for (; dst_prev != &rt->u.dst; dst_prev = dst_prev->child) {
217 struct xfrm_dst *x = (struct xfrm_dst*)dst_prev;
218 struct xfrm_state_afinfo *afinfo;
220 dst_prev->xfrm = xfrm[i++];
221 dst_prev->dev = rt->u.dst.dev;
222 if (rt->u.dst.dev)
223 dev_hold(rt->u.dst.dev);
224 dst_prev->obsolete = -1;
225 dst_prev->flags |= DST_HOST;
226 dst_prev->lastuse = jiffies;
227 dst_prev->header_len = header_len;
228 dst_prev->nfheader_len = nfheader_len;
229 dst_prev->trailer_len = trailer_len;
230 memcpy(&dst_prev->metrics, &x->route->metrics, sizeof(dst_prev->metrics));
232 /* Copy neighbour for reachability confirmation */
233 dst_prev->neighbour = neigh_clone(rt->u.dst.neighbour);
234 dst_prev->input = rt->u.dst.input;
235 /* XXX: When IPv4 is implemented as module and can be unloaded,
236 * we should manage reference to xfrm4_output in afinfo->output.
237 * Miyazawa
239 afinfo = xfrm_state_get_afinfo(dst_prev->xfrm->props.family);
240 if (!afinfo) {
241 dst = *dst_p;
242 goto error;
245 dst_prev->output = afinfo->output;
246 xfrm_state_put_afinfo(afinfo);
247 /* Sheit... I remember I did this right. Apparently,
248 * it was magically lost, so this code needs audit */
249 x->u.rt6.rt6i_flags = rt0->rt6i_flags&(RTCF_BROADCAST|RTCF_MULTICAST|RTCF_LOCAL);
250 x->u.rt6.rt6i_metric = rt0->rt6i_metric;
251 x->u.rt6.rt6i_node = rt0->rt6i_node;
252 x->u.rt6.rt6i_gateway = rt0->rt6i_gateway;
253 memcpy(&x->u.rt6.rt6i_gateway, &rt0->rt6i_gateway, sizeof(x->u.rt6.rt6i_gateway));
254 x->u.rt6.rt6i_dst = rt0->rt6i_dst;
255 x->u.rt6.rt6i_src = rt0->rt6i_src;
256 x->u.rt6.rt6i_idev = rt0->rt6i_idev;
257 in6_dev_hold(rt0->rt6i_idev);
258 __xfrm6_bundle_len_dec(&header_len, &nfheader_len, x->u.dst.xfrm);
259 trailer_len -= x->u.dst.xfrm->props.trailer_len;
262 xfrm_init_pmtu(dst);
263 return 0;
265 error:
266 if (dst)
267 dst_free(dst);
268 return err;
271 static inline void
272 _decode_session6(struct sk_buff *skb, struct flowi *fl)
274 u16 offset = skb_network_header_len(skb);
275 struct ipv6hdr *hdr = ipv6_hdr(skb);
276 struct ipv6_opt_hdr *exthdr;
277 const unsigned char *nh = skb_network_header(skb);
278 u8 nexthdr = nh[IP6CB(skb)->nhoff];
280 memset(fl, 0, sizeof(struct flowi));
281 ipv6_addr_copy(&fl->fl6_dst, &hdr->daddr);
282 ipv6_addr_copy(&fl->fl6_src, &hdr->saddr);
284 while (pskb_may_pull(skb, nh + offset + 1 - skb->data)) {
285 nh = skb_network_header(skb);
286 exthdr = (struct ipv6_opt_hdr *)(nh + offset);
288 switch (nexthdr) {
289 case NEXTHDR_ROUTING:
290 case NEXTHDR_HOP:
291 case NEXTHDR_DEST:
292 offset += ipv6_optlen(exthdr);
293 nexthdr = exthdr->nexthdr;
294 exthdr = (struct ipv6_opt_hdr *)(nh + offset);
295 break;
297 case IPPROTO_UDP:
298 case IPPROTO_UDPLITE:
299 case IPPROTO_TCP:
300 case IPPROTO_SCTP:
301 case IPPROTO_DCCP:
302 if (pskb_may_pull(skb, nh + offset + 4 - skb->data)) {
303 __be16 *ports = (__be16 *)exthdr;
305 fl->fl_ip_sport = ports[0];
306 fl->fl_ip_dport = ports[1];
308 fl->proto = nexthdr;
309 return;
311 case IPPROTO_ICMPV6:
312 if (pskb_may_pull(skb, nh + offset + 2 - skb->data)) {
313 u8 *icmp = (u8 *)exthdr;
315 fl->fl_icmp_type = icmp[0];
316 fl->fl_icmp_code = icmp[1];
318 fl->proto = nexthdr;
319 return;
321 #if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
322 case IPPROTO_MH:
323 if (pskb_may_pull(skb, nh + offset + 3 - skb->data)) {
324 struct ip6_mh *mh;
325 mh = (struct ip6_mh *)exthdr;
327 fl->fl_mh_type = mh->ip6mh_type;
329 fl->proto = nexthdr;
330 return;
331 #endif
333 /* XXX Why are there these headers? */
334 case IPPROTO_AH:
335 case IPPROTO_ESP:
336 case IPPROTO_COMP:
337 default:
338 fl->fl_ipsec_spi = 0;
339 fl->proto = nexthdr;
340 return;
345 static inline int xfrm6_garbage_collect(void)
347 xfrm6_policy_afinfo.garbage_collect();
348 return (atomic_read(&xfrm6_dst_ops.entries) > xfrm6_dst_ops.gc_thresh*2);
351 static void xfrm6_update_pmtu(struct dst_entry *dst, u32 mtu)
353 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
354 struct dst_entry *path = xdst->route;
356 path->ops->update_pmtu(path, mtu);
359 static void xfrm6_dst_destroy(struct dst_entry *dst)
361 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
363 if (likely(xdst->u.rt6.rt6i_idev))
364 in6_dev_put(xdst->u.rt6.rt6i_idev);
365 xfrm_dst_destroy(xdst);
368 static void xfrm6_dst_ifdown(struct dst_entry *dst, struct net_device *dev,
369 int unregister)
371 struct xfrm_dst *xdst;
373 if (!unregister)
374 return;
376 xdst = (struct xfrm_dst *)dst;
377 if (xdst->u.rt6.rt6i_idev->dev == dev) {
378 struct inet6_dev *loopback_idev = in6_dev_get(&loopback_dev);
379 BUG_ON(!loopback_idev);
381 do {
382 in6_dev_put(xdst->u.rt6.rt6i_idev);
383 xdst->u.rt6.rt6i_idev = loopback_idev;
384 in6_dev_hold(loopback_idev);
385 xdst = (struct xfrm_dst *)xdst->u.dst.child;
386 } while (xdst->u.dst.xfrm);
388 __in6_dev_put(loopback_idev);
391 xfrm_dst_ifdown(dst, dev);
394 static struct dst_ops xfrm6_dst_ops = {
395 .family = AF_INET6,
396 .protocol = __constant_htons(ETH_P_IPV6),
397 .gc = xfrm6_garbage_collect,
398 .update_pmtu = xfrm6_update_pmtu,
399 .destroy = xfrm6_dst_destroy,
400 .ifdown = xfrm6_dst_ifdown,
401 .gc_thresh = 1024,
402 .entry_size = sizeof(struct xfrm_dst),
405 static struct xfrm_policy_afinfo xfrm6_policy_afinfo = {
406 .family = AF_INET6,
407 .dst_ops = &xfrm6_dst_ops,
408 .dst_lookup = xfrm6_dst_lookup,
409 .get_saddr = xfrm6_get_saddr,
410 .find_bundle = __xfrm6_find_bundle,
411 .bundle_create = __xfrm6_bundle_create,
412 .decode_session = _decode_session6,
415 static void __init xfrm6_policy_init(void)
417 xfrm_policy_register_afinfo(&xfrm6_policy_afinfo);
420 static void xfrm6_policy_fini(void)
422 xfrm_policy_unregister_afinfo(&xfrm6_policy_afinfo);
425 void __init xfrm6_init(void)
427 xfrm6_policy_init();
428 xfrm6_state_init();
431 void xfrm6_fini(void)
433 //xfrm6_input_fini();
434 xfrm6_policy_fini();
435 xfrm6_state_fini();