/* * Interface between the IPSEC code and the radix (radij) tree code * Copyright (C) 1996, 1997 John Ioannidis. * Copyright (C) 1998, 1999, 2000, 2001 Richard Guy Briggs. * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation; either version 2 of the License, or (at your * option) any later version. See . * * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * for more details. * * RCSID $Id: ipsec_radij.c,v 1.5 2005/04/10 21:38:32 as Exp $ */ #include #include #include /* printk() */ #include "freeswan/ipsec_param.h" #ifdef MALLOC_SLAB # include /* kmalloc() */ #else /* MALLOC_SLAB */ # include /* kmalloc() */ #endif /* MALLOC_SLAB */ #include /* error codes */ #include /* size_t */ #include /* mark_bh */ #include /* struct device, struct net_device_stats and other headers */ #include /* eth_type_trans */ #include /* struct iphdr */ #include #include #ifdef SPINLOCK # ifdef SPINLOCK_23 # include /* *lock* */ # else /* 23_SPINLOCK */ # include /* *lock* */ # endif /* 23_SPINLOCK */ #endif /* SPINLOCK */ #ifdef NET_21 # include # include #endif #include #include #include "freeswan/ipsec_eroute.h" #include "freeswan/ipsec_sa.h" #include "freeswan/radij.h" #include "freeswan/ipsec_encap.h" #include "freeswan/radij.h" #include "freeswan/ipsec_encap.h" #include "freeswan/ipsec_radij.h" #include "freeswan/ipsec_tunnel.h" /* struct ipsecpriv */ #include "freeswan/ipsec_xform.h" #include #include #include "freeswan/ipsec_proto.h" #ifdef CONFIG_IPSEC_DEBUG int debug_radij = 0; #endif /* CONFIG_IPSEC_DEBUG */ struct radij_node_head *rnh = NULL; #ifdef SPINLOCK spinlock_t eroute_lock = SPIN_LOCK_UNLOCKED; #else /* SPINLOCK */ spinlock_t eroute_lock; #endif /* SPINLOCK */ int ipsec_radijinit(void) { maj_keylen = sizeof (struct sockaddr_encap); rj_init(); if (rj_inithead((void **)&rnh, /*16*/offsetof(struct sockaddr_encap, sen_type) * sizeof(__u8)) == 0) /* 16 is bit offset of sen_type */ return -1; return 0; } int ipsec_radijcleanup(void) { int error; spin_lock_bh(&eroute_lock); error = radijcleanup(); spin_unlock_bh(&eroute_lock); return error; } int ipsec_cleareroutes(void) { int error; spin_lock_bh(&eroute_lock); error = radijcleartree(); spin_unlock_bh(&eroute_lock); return error; } int ipsec_breakroute(struct sockaddr_encap *eaddr, struct sockaddr_encap *emask, struct sk_buff **first, struct sk_buff **last) { struct eroute *ro; struct radij_node *rn; int error; #ifdef CONFIG_IPSEC_DEBUG if (debug_eroute) { char buf1[SUBNETTOA_BUF], buf2[SUBNETTOA_BUF]; subnettoa(eaddr->sen_ip_src, emask->sen_ip_src, 0, buf1, sizeof(buf1)); subnettoa(eaddr->sen_ip_dst, emask->sen_ip_dst, 0, buf2, sizeof(buf2)); KLIPS_PRINT(debug_eroute, "klips_debug:ipsec_breakroute: " "attempting to delete eroute for %s:%d->%s:%d %d\n", buf1, ntohs(eaddr->sen_sport), buf2, ntohs(eaddr->sen_dport), eaddr->sen_proto); } #endif /* CONFIG_IPSEC_DEBUG */ spin_lock_bh(&eroute_lock); if ((error = rj_delete(eaddr, emask, rnh, &rn)) != 0) { spin_unlock_bh(&eroute_lock); KLIPS_PRINT(debug_eroute, "klips_debug:ipsec_breakroute: " "node not found, eroute delete failed.\n"); return error; } spin_unlock_bh(&eroute_lock); ro = (struct eroute *)rn; KLIPS_PRINT(debug_eroute, "klips_debug:ipsec_breakroute: " "deleted eroute=0p%p, ident=0p%p->0p%p, first=0p%p, last=0p%p\n", ro, ro->er_ident_s.data, ro->er_ident_d.data, ro->er_first, ro->er_last); if (ro->er_ident_s.data != NULL) { kfree(ro->er_ident_s.data); } if (ro->er_ident_d.data != NULL) { kfree(ro->er_ident_d.data); } if (ro->er_first != NULL) { #if 0 struct net_device_stats *stats = (struct net_device_stats *) &(((struct ipsecpriv *)(ro->er_first->dev->priv))->mystats); stats->tx_dropped--; #endif *first = ro->er_first; } if (ro->er_last != NULL) { #if 0 struct net_device_stats *stats = (struct net_device_stats *) &(((struct ipsecpriv *)(ro->er_last->dev->priv))->mystats); stats->tx_dropped--; #endif *last = ro->er_last; } if (rn->rj_flags & (RJF_ACTIVE | RJF_ROOT)) panic ("ipsec_breakroute RMT_DELEROUTE root or active node\n"); memset((caddr_t)rn, 0, sizeof (struct eroute)); kfree(rn); return 0; } int ipsec_makeroute(struct sockaddr_encap *eaddr, struct sockaddr_encap *emask, struct sa_id said, uint32_t pid, struct sk_buff *skb, struct ident *ident_s, struct ident *ident_d) { struct eroute *retrt; int error; char sa[SATOA_BUF]; size_t sa_len; #ifdef CONFIG_IPSEC_DEBUG if (debug_eroute) { { char buf1[SUBNETTOA_BUF], buf2[SUBNETTOA_BUF]; subnettoa(eaddr->sen_ip_src, emask->sen_ip_src, 0, buf1, sizeof(buf1)); subnettoa(eaddr->sen_ip_dst, emask->sen_ip_dst, 0, buf2, sizeof(buf2)); sa_len = satoa(said, 0, sa, SATOA_BUF); KLIPS_PRINT(debug_eroute, "klips_debug:ipsec_makeroute: " "attempting to allocate %lu bytes to insert eroute for %s:%d->%s:%d %d, SA: %s, PID:%d, skb=0p%p, ident:%s->%s\n", (unsigned long) sizeof(struct eroute), buf1, ntohs(eaddr->sen_sport), buf2, ntohs(eaddr->sen_dport), eaddr->sen_proto, sa_len ? sa : " (error)", pid, skb, (ident_s ? (ident_s->data ? ident_s->data : "NULL") : "NULL"), (ident_d ? (ident_d->data ? ident_d->data : "NULL") : "NULL")); } { char buf1[sizeof(struct sockaddr_encap)*2 + 1]; char buf2[sizeof(struct sockaddr_encap)*2 + 1]; int i; unsigned char *b1 = buf1, *b2 = buf2, *ea = (unsigned char *)eaddr, *em = (unsigned char *)emask; for (i=0; ier_eaddr = *eaddr; retrt->er_emask = *emask; retrt->er_said = said; retrt->er_pid = pid; retrt->er_count = 0; retrt->er_lasttime = jiffies/HZ; { struct sockaddr_encap **rkeyp = (struct sockaddr_encap**)&((retrt->er_rjt).rd_nodes->rj_key); *rkeyp = &(retrt->er_eaddr); } if (ident_s && ident_s->type != SADB_IDENTTYPE_RESERVED) { int data_len = ident_s->len * IPSEC_PFKEYv2_ALIGN - sizeof(struct sadb_ident); retrt->er_ident_s.type = ident_s->type; retrt->er_ident_s.id = ident_s->id; retrt->er_ident_s.len = ident_s->len; if(data_len) { KLIPS_PRINT(debug_eroute, "klips_debug:ipsec_makeroute: " "attempting to allocate %u bytes for ident_s.\n", data_len); if(!(retrt->er_ident_s.data = kmalloc(data_len, GFP_KERNEL))) { kfree(retrt); printk("klips_error:ipsec_makeroute: not able to allocate kernel memory (%d)\n", data_len); return ENOMEM; } memcpy(retrt->er_ident_s.data, ident_s->data, data_len); } else { retrt->er_ident_s.data = NULL; } } if (ident_d && ident_d->type != SADB_IDENTTYPE_RESERVED) { int data_len = ident_d->len * IPSEC_PFKEYv2_ALIGN - sizeof(struct sadb_ident); retrt->er_ident_d.type = ident_d->type; retrt->er_ident_d.id = ident_d->id; retrt->er_ident_d.len = ident_d->len; if(data_len) { KLIPS_PRINT(debug_eroute, "klips_debug:ipsec_makeroute: " "attempting to allocate %u bytes for ident_d.\n", data_len); if(!(retrt->er_ident_d.data = kmalloc(data_len, GFP_KERNEL))) { if (retrt->er_ident_s.data) kfree(retrt->er_ident_s.data); kfree(retrt); printk("klips_error:ipsec_makeroute: not able to allocate kernel memory (%d)\n", data_len); return ENOMEM; } memcpy(retrt->er_ident_d.data, ident_d->data, data_len); } else { retrt->er_ident_d.data = NULL; } } retrt->er_first = skb; retrt->er_last = NULL; KLIPS_PRINT(debug_eroute, "klips_debug:ipsec_makeroute: " "calling rj_addroute now\n"); spin_lock_bh(&eroute_lock); error = rj_addroute(&(retrt->er_eaddr), &(retrt->er_emask), rnh, retrt->er_rjt.rd_nodes); spin_unlock_bh(&eroute_lock); if(error) { sa_len = satoa(said, 0, sa, SATOA_BUF); KLIPS_PRINT(debug_eroute, "klips_debug:ipsec_makeroute: " "rj_addroute not able to insert eroute for SA:%s (error:%d)\n", sa_len ? sa : " (error)", error); if (retrt->er_ident_s.data) kfree(retrt->er_ident_s.data); if (retrt->er_ident_d.data) kfree(retrt->er_ident_d.data); kfree(retrt); return error; } #ifdef CONFIG_IPSEC_DEBUG if (debug_eroute) { char buf1[SUBNETTOA_BUF], buf2[SUBNETTOA_BUF]; /* subnettoa(eaddr->sen_ip_src, emask->sen_ip_src, 0, buf1, sizeof(buf1)); subnettoa(eaddr->sen_ip_dst, emask->sen_ip_dst, 0, buf2, sizeof(buf2)); */ subnettoa(rd_key((&(retrt->er_rjt)))->sen_ip_src, rd_mask((&(retrt->er_rjt)))->sen_ip_src, 0, buf1, sizeof(buf1)); subnettoa(rd_key((&(retrt->er_rjt)))->sen_ip_dst, rd_mask((&(retrt->er_rjt)))->sen_ip_dst, 0, buf2, sizeof(buf2)); sa_len = satoa(retrt->er_said, 0, sa, SATOA_BUF); KLIPS_PRINT(debug_eroute, "klips_debug:ipsec_makeroute: " "pid=%05d " "count=%10d " "lasttime=%6d " "%-18s -> %-18s => %s\n", retrt->er_pid, retrt->er_count, (int)(jiffies/HZ - retrt->er_lasttime), buf1, buf2, sa_len ? sa : " (error)"); } #endif /* CONFIG_IPSEC_DEBUG */ KLIPS_PRINT(debug_eroute, "klips_debug:ipsec_makeroute: " "succeeded.\n"); return 0; } struct eroute * ipsec_findroute(struct sockaddr_encap *eaddr) { struct radij_node *rn; #ifdef CONFIG_IPSEC_DEBUG char buf1[ADDRTOA_BUF], buf2[ADDRTOA_BUF]; if (debug_radij & DB_RJ_FINDROUTE) { addrtoa(eaddr->sen_ip_src, 0, buf1, sizeof(buf1)); addrtoa(eaddr->sen_ip_dst, 0, buf2, sizeof(buf2)); KLIPS_PRINT(debug_eroute, "klips_debug:ipsec_findroute: " "%s:%d->%s:%d %d\n", buf1, ntohs(eaddr->sen_sport), buf2, ntohs(eaddr->sen_dport), eaddr->sen_proto); } #endif /* CONFIG_IPSEC_DEBUG */ rn = rj_match((caddr_t)eaddr, rnh); if(rn) { KLIPS_PRINT(debug_eroute && sysctl_ipsec_debug_verbose, "klips_debug:ipsec_findroute: " "found, points to proto=%d, spi=%x, dst=%x.\n", ((struct eroute*)rn)->er_said.proto, ntohl(((struct eroute*)rn)->er_said.spi), ntohl(((struct eroute*)rn)->er_said.dst.s_addr)); } return (struct eroute *)rn; } #ifdef CONFIG_PROC_FS /** ipsec_rj_walker_procprint: print one line of eroute table output. * * Theoretical BUG: if w->length is less than the length * of some line we should produce, that line will never * be finished. In effect, the "file" will stop part way * through that line. */ int ipsec_rj_walker_procprint(struct radij_node *rn, void *w0) { struct eroute *ro = (struct eroute *)rn; struct rjtentry *rd = (struct rjtentry *)rn; struct wsbuf *w = (struct wsbuf *)w0; char buf1[SUBNETTOA_BUF], buf2[SUBNETTOA_BUF]; char buf3[16]; char sa[SATOA_BUF]; size_t sa_len, buf_len; struct sockaddr_encap *key, *mask; KLIPS_PRINT(debug_radij, "klips_debug:ipsec_rj_walker_procprint: " "rn=0p%p, w0=0p%p\n", rn, w0); if (rn->rj_b >= 0) { return 0; } key = rd_key(rd); mask = rd_mask(rd); if (key == NULL || mask == NULL) { return 0; } buf_len = subnettoa(key->sen_ip_src, mask->sen_ip_src, 0, buf1, sizeof(buf1)); if(key->sen_sport != 0) { sprintf(buf1+buf_len-1, ":%d", ntohs(key->sen_sport)); } buf_len = subnettoa(key->sen_ip_dst, mask->sen_ip_dst, 0, buf2, sizeof(buf2)); if(key->sen_dport != 0) { sprintf(buf2+buf_len-1, ":%d", ntohs(key->sen_dport)); } buf3[0]='\0'; if(key->sen_proto != 0) { sprintf(buf3, ":%d", key->sen_proto); } sa_len = satoa(ro->er_said, 0, sa, SATOA_BUF); w->len += ipsec_snprintf(w->buffer + w->len, w->length - w->len, "%-10d " "%-18s -> %-18s => %s%s\n", ro->er_count, buf1, buf2, sa_len ? sa : " (error)", buf3); { /* snprintf can only fill the last character with NUL * so the maximum useful character is w->length-1. * However, if w->length == 0, we cannot go back. * (w->length surely cannot be negative.) */ int max_content = w->length > 0? w->length-1 : 0; if (w->len >= max_content) { /* we've done all that can fit -- stop treewalking */ w->len = max_content; /* truncate crap */ return -ENOBUFS; } else { const off_t pos = w->begin + w->len; /* file position of end of what we've generated */ if (pos <= w->offset) { /* all is before first interesting character: * discard, but note where we are. */ w->len = 0; w->begin = pos; } return 0; } } } #endif /* CONFIG_PROC_FS */ int ipsec_rj_walker_delete(struct radij_node *rn, void *w0) { struct eroute *ro; struct rjtentry *rd = (struct rjtentry *)rn; struct radij_node *rn2; int error; struct sockaddr_encap *key, *mask; key = rd_key(rd); mask = rd_mask(rd); if(!key || !mask) { return -ENODATA; } #ifdef CONFIG_IPSEC_DEBUG if(debug_radij) { char buf1[SUBNETTOA_BUF], buf2[SUBNETTOA_BUF]; subnettoa(key->sen_ip_src, mask->sen_ip_src, 0, buf1, sizeof(buf1)); subnettoa(key->sen_ip_dst, mask->sen_ip_dst, 0, buf2, sizeof(buf2)); KLIPS_PRINT(debug_radij, "klips_debug:ipsec_rj_walker_delete: " "deleting: %s -> %s\n", buf1, buf2); } #endif /* CONFIG_IPSEC_DEBUG */ if((error = rj_delete(key, mask, rnh, &rn2))) { KLIPS_PRINT(debug_radij, "klips_debug:ipsec_rj_walker_delete: " "rj_delete failed with error=%d.\n", error); return error; } if(rn2 != rn) { printk("klips_debug:ipsec_rj_walker_delete: " "tried to delete a different node?!? This should never happen!\n"); } ro = (struct eroute *)rn; if (ro->er_ident_s.data) kfree(ro->er_ident_s.data); if (ro->er_ident_d.data) kfree(ro->er_ident_d.data); memset((caddr_t)rn, 0, sizeof (struct eroute)); kfree(rn); return 0; }