mip6.c 13.2 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
/*
 * Copyright (C)2003-2006 Helsinki University of Technology
 * Copyright (C)2003-2006 USAGI/WIDE Project
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation; either version 2 of the License, or
 * (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
 */
/*
 * Authors:
 *	Noriaki TAKAMIYA @USAGI
 *	Masahide NAKAMURA @USAGI
 */

25 26
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt

27 28
#include <linux/module.h>
#include <linux/skbuff.h>
29
#include <linux/time.h>
30
#include <linux/ipv6.h>
31 32
#include <linux/icmpv6.h>
#include <net/sock.h>
33
#include <net/ipv6.h>
34
#include <net/ip6_checksum.h>
35
#include <net/rawv6.h>
36 37 38
#include <net/xfrm.h>
#include <net/mip6.h>

39 40 41 42 43 44 45 46 47 48
static inline unsigned int calc_padlen(unsigned int len, unsigned int n)
{
	return (n - len + 16) & 0x7;
}

static inline void *mip6_padn(__u8 *data, __u8 padlen)
{
	if (!data)
		return NULL;
	if (padlen == 1) {
49
		data[0] = IPV6_TLV_PAD0;
50
	} else if (padlen > 1) {
51
		data[0] = IPV6_TLV_PADN;
52 53 54 55 56 57 58
		data[1] = padlen - 2;
		if (padlen > 2)
			memset(data+2, 0, data[1]);
	}
	return data + padlen;
}

59
static inline void mip6_param_prob(struct sk_buff *skb, u8 code, int pos)
60
{
61
	icmpv6_send(skb, ICMPV6_PARAMPROB, code, pos);
62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86
}

static int mip6_mh_len(int type)
{
	int len = 0;

	switch (type) {
	case IP6_MH_TYPE_BRR:
		len = 0;
		break;
	case IP6_MH_TYPE_HOTI:
	case IP6_MH_TYPE_COTI:
	case IP6_MH_TYPE_BU:
	case IP6_MH_TYPE_BACK:
		len = 1;
		break;
	case IP6_MH_TYPE_HOT:
	case IP6_MH_TYPE_COT:
	case IP6_MH_TYPE_BERROR:
		len = 2;
		break;
	}
	return len;
}

87
static int mip6_mh_filter(struct sock *sk, struct sk_buff *skb)
88 89 90
{
	struct ip6_mh *mh;

91 92
	if (!pskb_may_pull(skb, (skb_transport_offset(skb)) + 8) ||
	    !pskb_may_pull(skb, (skb_transport_offset(skb) +
93
				 ((skb_transport_header(skb)[1] + 1) << 3))))
94 95
		return -1;

96
	mh = (struct ip6_mh *)skb_transport_header(skb);
97 98 99 100

	if (mh->ip6mh_hdrlen < mip6_mh_len(mh->ip6mh_type)) {
		LIMIT_NETDEBUG(KERN_DEBUG "mip6: MH message too short: %d vs >=%d\n",
			       mh->ip6mh_hdrlen, mip6_mh_len(mh->ip6mh_type));
101 102
		mip6_param_prob(skb, 0, ((&mh->ip6mh_hdrlen) -
					 skb_network_header(skb)));
103 104 105 106 107 108
		return -1;
	}

	if (mh->ip6mh_proto != IPPROTO_NONE) {
		LIMIT_NETDEBUG(KERN_DEBUG "mip6: MH invalid payload proto = %d\n",
			       mh->ip6mh_proto);
109 110
		mip6_param_prob(skb, 0, ((&mh->ip6mh_proto) -
					 skb_network_header(skb)));
111 112 113 114 115 116
		return -1;
	}

	return 0;
}

117 118 119 120 121 122 123 124 125
struct mip6_report_rate_limiter {
	spinlock_t lock;
	struct timeval stamp;
	int iif;
	struct in6_addr src;
	struct in6_addr dst;
};

static struct mip6_report_rate_limiter mip6_report_rl = {
126
	.lock = __SPIN_LOCK_UNLOCKED(mip6_report_rl.lock)
127 128
};

129 130
static int mip6_destopt_input(struct xfrm_state *x, struct sk_buff *skb)
{
131
	const struct ipv6hdr *iph = ipv6_hdr(skb);
132
	struct ipv6_destopt_hdr *destopt = (struct ipv6_destopt_hdr *)skb->data;
133
	int err = destopt->nexthdr;
134

135
	spin_lock(&x->lock);
136 137
	if (!ipv6_addr_equal(&iph->saddr, (struct in6_addr *)x->coaddr) &&
	    !ipv6_addr_any((struct in6_addr *)x->coaddr))
138 139
		err = -ENOENT;
	spin_unlock(&x->lock);
140

141
	return err;
142 143 144 145 146 147 148 149 150 151 152 153 154 155
}

/* Destination Option Header is inserted.
 * IP Header's src address is replaced with Home Address Option in
 * Destination Option Header.
 */
static int mip6_destopt_output(struct xfrm_state *x, struct sk_buff *skb)
{
	struct ipv6hdr *iph;
	struct ipv6_destopt_hdr *dstopt;
	struct ipv6_destopt_hao *hao;
	u8 nexthdr;
	int len;

156
	skb_push(skb, -skb_network_offset(skb));
157
	iph = ipv6_hdr(skb);
158

159 160
	nexthdr = *skb_mac_header(skb);
	*skb_mac_header(skb) = IPPROTO_DSTOPTS;
161

162
	dstopt = (struct ipv6_destopt_hdr *)skb_transport_header(skb);
163 164 165 166 167 168
	dstopt->nexthdr = nexthdr;

	hao = mip6_padn((char *)(dstopt + 1),
			calc_padlen(sizeof(*dstopt), 6));

	hao->type = IPV6_TLV_HAO;
169
	BUILD_BUG_ON(sizeof(*hao) != 18);
170 171 172 173 174
	hao->length = sizeof(*hao) - 2;

	len = ((char *)hao - (char *)dstopt) + sizeof(*hao);

	memcpy(&hao->addr, &iph->saddr, sizeof(hao->addr));
175
	spin_lock_bh(&x->lock);
176
	memcpy(&iph->saddr, x->coaddr, sizeof(iph->saddr));
177
	spin_unlock_bh(&x->lock);
178

179
	WARN_ON(len != x->props.header_len);
180 181 182 183 184
	dstopt->hdrlen = (x->props.header_len >> 3) - 1;

	return 0;
}

185
static inline int mip6_report_rl_allow(struct timeval *stamp,
186 187
				       const struct in6_addr *dst,
				       const struct in6_addr *src, int iif)
188 189 190 191 192 193 194 195 196 197 198 199
{
	int allow = 0;

	spin_lock_bh(&mip6_report_rl.lock);
	if (mip6_report_rl.stamp.tv_sec != stamp->tv_sec ||
	    mip6_report_rl.stamp.tv_usec != stamp->tv_usec ||
	    mip6_report_rl.iif != iif ||
	    !ipv6_addr_equal(&mip6_report_rl.src, src) ||
	    !ipv6_addr_equal(&mip6_report_rl.dst, dst)) {
		mip6_report_rl.stamp.tv_sec = stamp->tv_sec;
		mip6_report_rl.stamp.tv_usec = stamp->tv_usec;
		mip6_report_rl.iif = iif;
A
Alexey Dobriyan 已提交
200 201
		mip6_report_rl.src = *src;
		mip6_report_rl.dst = *dst;
202 203 204 205 206 207
		allow = 1;
	}
	spin_unlock_bh(&mip6_report_rl.lock);
	return allow;
}

208 209
static int mip6_destopt_reject(struct xfrm_state *x, struct sk_buff *skb,
			       const struct flowi *fl)
210
{
211
	struct net *net = xs_net(x);
212
	struct inet6_skb_parm *opt = (struct inet6_skb_parm *)skb->cb;
213
	const struct flowi6 *fl6 = &fl->u.ip6;
214 215 216 217 218 219
	struct ipv6_destopt_hao *hao = NULL;
	struct xfrm_selector sel;
	int offset;
	struct timeval stamp;
	int err = 0;

220
	if (unlikely(fl6->flowi6_proto == IPPROTO_MH &&
221
		     fl6->fl6_mh_type <= IP6_MH_TYPE_MAX))
222 223
		goto out;

224 225 226
	if (likely(opt->dsthao)) {
		offset = ipv6_find_tlv(skb, opt->dsthao, IPV6_TLV_HAO);
		if (likely(offset >= 0))
227 228
			hao = (struct ipv6_destopt_hao *)
					(skb_network_header(skb) + offset);
229 230 231 232
	}

	skb_get_timestamp(skb, &stamp);

233 234
	if (!mip6_report_rl_allow(&stamp, &ipv6_hdr(skb)->daddr,
				  hao ? &hao->addr : &ipv6_hdr(skb)->saddr,
235 236 237 238
				  opt->iif))
		goto out;

	memset(&sel, 0, sizeof(sel));
239
	memcpy(&sel.daddr, (xfrm_address_t *)&ipv6_hdr(skb)->daddr,
240 241
	       sizeof(sel.daddr));
	sel.prefixlen_d = 128;
242
	memcpy(&sel.saddr, (xfrm_address_t *)&ipv6_hdr(skb)->saddr,
243 244 245
	       sizeof(sel.saddr));
	sel.prefixlen_s = 128;
	sel.family = AF_INET6;
246 247
	sel.proto = fl6->flowi6_proto;
	sel.dport = xfrm_flowi_dport(fl, &fl6->uli);
248
	if (sel.dport)
A
Al Viro 已提交
249
		sel.dport_mask = htons(~0);
250
	sel.sport = xfrm_flowi_sport(fl, &fl6->uli);
251
	if (sel.sport)
A
Al Viro 已提交
252
		sel.sport_mask = htons(~0);
253
	sel.ifindex = fl6->flowi6_oif;
254

255
	err = km_report(net, IPPROTO_DSTOPTS, &sel,
256 257 258 259 260 261
			(hao ? (xfrm_address_t *)&hao->addr : NULL));

 out:
	return err;
}

262 263 264 265
static int mip6_destopt_offset(struct xfrm_state *x, struct sk_buff *skb,
			       u8 **nexthdr)
{
	u16 offset = sizeof(struct ipv6hdr);
266 267
	struct ipv6_opt_hdr *exthdr =
				   (struct ipv6_opt_hdr *)(ipv6_hdr(skb) + 1);
268
	const unsigned char *nh = skb_network_header(skb);
269
	unsigned int packet_len = skb->tail - skb->network_header;
270 271
	int found_rhdr = 0;

272
	*nexthdr = &ipv6_hdr(skb)->nexthdr;
273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302

	while (offset + 1 <= packet_len) {

		switch (**nexthdr) {
		case NEXTHDR_HOP:
			break;
		case NEXTHDR_ROUTING:
			found_rhdr = 1;
			break;
		case NEXTHDR_DEST:
			/*
			 * HAO MUST NOT appear more than once.
			 * XXX: It is better to try to find by the end of
			 * XXX: packet if HAO exists.
			 */
			if (ipv6_find_tlv(skb, offset, IPV6_TLV_HAO) >= 0) {
				LIMIT_NETDEBUG(KERN_WARNING "mip6: hao exists already, override\n");
				return offset;
			}

			if (found_rhdr)
				return offset;

			break;
		default:
			return offset;
		}

		offset += ipv6_optlen(exthdr);
		*nexthdr = &exthdr->nexthdr;
303
		exthdr = (struct ipv6_opt_hdr *)(nh + offset);
304 305 306 307 308 309 310 311
	}

	return offset;
}

static int mip6_destopt_init_state(struct xfrm_state *x)
{
	if (x->id.spi) {
312
		pr_info("%s: spi is not 0: %u\n", __func__, x->id.spi);
313 314 315
		return -EINVAL;
	}
	if (x->props.mode != XFRM_MODE_ROUTEOPTIMIZATION) {
316 317
		pr_info("%s: state's mode is not %u: %u\n",
			__func__, XFRM_MODE_ROUTEOPTIMIZATION, x->props.mode);
318 319 320 321 322 323
		return -EINVAL;
	}

	x->props.header_len = sizeof(struct ipv6_destopt_hdr) +
		calc_padlen(sizeof(struct ipv6_destopt_hdr), 6) +
		sizeof(struct ipv6_destopt_hao);
324
	WARN_ON(x->props.header_len != 24);
325 326 327 328 329 330 331 332 333 334 335 336

	return 0;
}

/*
 * Do nothing about destroying since it has no specific operation for
 * destination options header unlike IPsec protocols.
 */
static void mip6_destopt_destroy(struct xfrm_state *x)
{
}

337
static const struct xfrm_type mip6_destopt_type =
338 339 340 341
{
	.description	= "MIP6DESTOPT",
	.owner		= THIS_MODULE,
	.proto	     	= IPPROTO_DSTOPTS,
342
	.flags		= XFRM_TYPE_NON_FRAGMENT | XFRM_TYPE_LOCAL_COADDR,
343 344 345 346
	.init_state	= mip6_destopt_init_state,
	.destructor	= mip6_destopt_destroy,
	.input		= mip6_destopt_input,
	.output		= mip6_destopt_output,
347
	.reject		= mip6_destopt_reject,
348 349 350
	.hdr_offset	= mip6_destopt_offset,
};

351 352
static int mip6_rthdr_input(struct xfrm_state *x, struct sk_buff *skb)
{
353
	const struct ipv6hdr *iph = ipv6_hdr(skb);
354
	struct rt2_hdr *rt2 = (struct rt2_hdr *)skb->data;
355
	int err = rt2->rt_hdr.nexthdr;
356

357
	spin_lock(&x->lock);
358
	if (!ipv6_addr_equal(&iph->daddr, (struct in6_addr *)x->coaddr) &&
359
	    !ipv6_addr_any((struct in6_addr *)x->coaddr))
360 361
		err = -ENOENT;
	spin_unlock(&x->lock);
362

363
	return err;
364 365 366 367 368 369 370 371 372 373 374
}

/* Routing Header type 2 is inserted.
 * IP Header's dst address is replaced with Routing Header's Home Address.
 */
static int mip6_rthdr_output(struct xfrm_state *x, struct sk_buff *skb)
{
	struct ipv6hdr *iph;
	struct rt2_hdr *rt2;
	u8 nexthdr;

375
	skb_push(skb, -skb_network_offset(skb));
376
	iph = ipv6_hdr(skb);
377

378 379
	nexthdr = *skb_mac_header(skb);
	*skb_mac_header(skb) = IPPROTO_ROUTING;
380

381
	rt2 = (struct rt2_hdr *)skb_transport_header(skb);
382 383 384 385 386 387
	rt2->rt_hdr.nexthdr = nexthdr;
	rt2->rt_hdr.hdrlen = (x->props.header_len >> 3) - 1;
	rt2->rt_hdr.type = IPV6_SRCRT_TYPE_2;
	rt2->rt_hdr.segments_left = 1;
	memset(&rt2->reserved, 0, sizeof(rt2->reserved));

388
	WARN_ON(rt2->rt_hdr.hdrlen != 2);
389 390

	memcpy(&rt2->addr, &iph->daddr, sizeof(rt2->addr));
391
	spin_lock_bh(&x->lock);
392
	memcpy(&iph->daddr, x->coaddr, sizeof(iph->daddr));
393
	spin_unlock_bh(&x->lock);
394 395 396 397 398 399 400 401

	return 0;
}

static int mip6_rthdr_offset(struct xfrm_state *x, struct sk_buff *skb,
			     u8 **nexthdr)
{
	u16 offset = sizeof(struct ipv6hdr);
402 403
	struct ipv6_opt_hdr *exthdr =
				   (struct ipv6_opt_hdr *)(ipv6_hdr(skb) + 1);
404
	const unsigned char *nh = skb_network_header(skb);
405
	unsigned int packet_len = skb->tail - skb->network_header;
406 407
	int found_rhdr = 0;

408
	*nexthdr = &ipv6_hdr(skb)->nexthdr;
409 410 411 412 413 414 415 416 417

	while (offset + 1 <= packet_len) {

		switch (**nexthdr) {
		case NEXTHDR_HOP:
			break;
		case NEXTHDR_ROUTING:
			if (offset + 3 <= packet_len) {
				struct ipv6_rt_hdr *rt;
418
				rt = (struct ipv6_rt_hdr *)(nh + offset);
419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437
				if (rt->type != 0)
					return offset;
			}
			found_rhdr = 1;
			break;
		case NEXTHDR_DEST:
			if (ipv6_find_tlv(skb, offset, IPV6_TLV_HAO) >= 0)
				return offset;

			if (found_rhdr)
				return offset;

			break;
		default:
			return offset;
		}

		offset += ipv6_optlen(exthdr);
		*nexthdr = &exthdr->nexthdr;
438
		exthdr = (struct ipv6_opt_hdr *)(nh + offset);
439 440 441 442 443 444 445 446
	}

	return offset;
}

static int mip6_rthdr_init_state(struct xfrm_state *x)
{
	if (x->id.spi) {
447
		pr_info("%s: spi is not 0: %u\n", __func__, x->id.spi);
448 449 450
		return -EINVAL;
	}
	if (x->props.mode != XFRM_MODE_ROUTEOPTIMIZATION) {
451 452
		pr_info("%s: state's mode is not %u: %u\n",
			__func__, XFRM_MODE_ROUTEOPTIMIZATION, x->props.mode);
453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468
		return -EINVAL;
	}

	x->props.header_len = sizeof(struct rt2_hdr);

	return 0;
}

/*
 * Do nothing about destroying since it has no specific operation for routing
 * header type 2 unlike IPsec protocols.
 */
static void mip6_rthdr_destroy(struct xfrm_state *x)
{
}

469
static const struct xfrm_type mip6_rthdr_type =
470 471 472 473
{
	.description	= "MIP6RT",
	.owner		= THIS_MODULE,
	.proto	     	= IPPROTO_ROUTING,
474
	.flags		= XFRM_TYPE_NON_FRAGMENT | XFRM_TYPE_REMOTE_COADDR,
475 476 477 478 479 480 481
	.init_state	= mip6_rthdr_init_state,
	.destructor	= mip6_rthdr_destroy,
	.input		= mip6_rthdr_input,
	.output		= mip6_rthdr_output,
	.hdr_offset	= mip6_rthdr_offset,
};

482
static int __init mip6_init(void)
483
{
484
	pr_info("Mobile IPv6\n");
485

486
	if (xfrm_register_type(&mip6_destopt_type, AF_INET6) < 0) {
487
		pr_info("%s: can't add xfrm type(destopt)\n", __func__);
488 489
		goto mip6_destopt_xfrm_fail;
	}
490
	if (xfrm_register_type(&mip6_rthdr_type, AF_INET6) < 0) {
491
		pr_info("%s: can't add xfrm type(rthdr)\n", __func__);
492 493
		goto mip6_rthdr_xfrm_fail;
	}
494
	if (rawv6_mh_filter_register(mip6_mh_filter) < 0) {
495
		pr_info("%s: can't add rawv6 mh filter\n", __func__);
496 497 498 499
		goto mip6_rawv6_mh_fail;
	}


500 501
	return 0;

502 503
 mip6_rawv6_mh_fail:
	xfrm_unregister_type(&mip6_rthdr_type, AF_INET6);
504
 mip6_rthdr_xfrm_fail:
505 506
	xfrm_unregister_type(&mip6_destopt_type, AF_INET6);
 mip6_destopt_xfrm_fail:
507 508 509
	return -EAGAIN;
}

510
static void __exit mip6_fini(void)
511
{
512
	if (rawv6_mh_filter_unregister(mip6_mh_filter) < 0)
513
		pr_info("%s: can't remove rawv6 mh filter\n", __func__);
514
	if (xfrm_unregister_type(&mip6_rthdr_type, AF_INET6) < 0)
515
		pr_info("%s: can't remove xfrm type(rthdr)\n", __func__);
516
	if (xfrm_unregister_type(&mip6_destopt_type, AF_INET6) < 0)
517
		pr_info("%s: can't remove xfrm type(destopt)\n", __func__);
518
}
519 520 521 522 523

module_init(mip6_init);
module_exit(mip6_fini);

MODULE_LICENSE("GPL");
524 525
MODULE_ALIAS_XFRM_TYPE(AF_INET6, XFRM_PROTO_DSTOPTS);
MODULE_ALIAS_XFRM_TYPE(AF_INET6, XFRM_PROTO_ROUTING);