xfrm6_policy.c 9.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431
  1. // SPDX-License-Identifier: GPL-2.0
  2. /*
  3. * xfrm6_policy.c: based on xfrm4_policy.c
  4. *
  5. * Authors:
  6. * Mitsuru KANDA @USAGI
  7. * Kazunori MIYAZAWA @USAGI
  8. * Kunihiro Ishiguro <kunihiro@ipinfusion.com>
  9. * IPv6 support
  10. * YOSHIFUJI Hideaki
  11. * Split up af-specific portion
  12. *
  13. */
  14. #include <linux/err.h>
  15. #include <linux/kernel.h>
  16. #include <linux/netdevice.h>
  17. #include <net/addrconf.h>
  18. #include <net/dst.h>
  19. #include <net/xfrm.h>
  20. #include <net/ip.h>
  21. #include <net/ipv6.h>
  22. #include <net/ip6_route.h>
  23. #include <net/l3mdev.h>
  24. #if IS_ENABLED(CONFIG_IPV6_MIP6)
  25. #include <net/mip6.h>
  26. #endif
  27. static struct dst_entry *xfrm6_dst_lookup(struct net *net, int tos, int oif,
  28. const xfrm_address_t *saddr,
  29. const xfrm_address_t *daddr,
  30. u32 mark)
  31. {
  32. struct flowi6 fl6;
  33. struct dst_entry *dst;
  34. int err;
  35. memset(&fl6, 0, sizeof(fl6));
  36. fl6.flowi6_oif = l3mdev_master_ifindex_by_index(net, oif);
  37. fl6.flowi6_flags = FLOWI_FLAG_SKIP_NH_OIF;
  38. fl6.flowi6_mark = mark;
  39. memcpy(&fl6.daddr, daddr, sizeof(fl6.daddr));
  40. if (saddr)
  41. memcpy(&fl6.saddr, saddr, sizeof(fl6.saddr));
  42. dst = ip6_route_output(net, NULL, &fl6);
  43. err = dst->error;
  44. if (dst->error) {
  45. dst_release(dst);
  46. dst = ERR_PTR(err);
  47. }
  48. return dst;
  49. }
  50. static int xfrm6_get_saddr(struct net *net, int oif,
  51. xfrm_address_t *saddr, xfrm_address_t *daddr,
  52. u32 mark)
  53. {
  54. struct dst_entry *dst;
  55. struct net_device *dev;
  56. dst = xfrm6_dst_lookup(net, 0, oif, NULL, daddr, mark);
  57. if (IS_ERR(dst))
  58. return -EHOSTUNREACH;
  59. dev = ip6_dst_idev(dst)->dev;
  60. ipv6_dev_get_saddr(dev_net(dev), dev, &daddr->in6, 0, &saddr->in6);
  61. dst_release(dst);
  62. return 0;
  63. }
  64. static int xfrm6_get_tos(const struct flowi *fl)
  65. {
  66. return 0;
  67. }
  68. static int xfrm6_init_path(struct xfrm_dst *path, struct dst_entry *dst,
  69. int nfheader_len)
  70. {
  71. if (dst->ops->family == AF_INET6) {
  72. struct rt6_info *rt = (struct rt6_info *)dst;
  73. path->path_cookie = rt6_get_cookie(rt);
  74. }
  75. path->u.rt6.rt6i_nfheader_len = nfheader_len;
  76. return 0;
  77. }
  78. static int xfrm6_fill_dst(struct xfrm_dst *xdst, struct net_device *dev,
  79. const struct flowi *fl)
  80. {
  81. struct rt6_info *rt = (struct rt6_info *)xdst->route;
  82. xdst->u.dst.dev = dev;
  83. dev_hold(dev);
  84. xdst->u.rt6.rt6i_idev = in6_dev_get(dev);
  85. if (!xdst->u.rt6.rt6i_idev) {
  86. dev_put(dev);
  87. return -ENODEV;
  88. }
  89. /* Sheit... I remember I did this right. Apparently,
  90. * it was magically lost, so this code needs audit */
  91. xdst->u.rt6.rt6i_flags = rt->rt6i_flags & (RTF_ANYCAST |
  92. RTF_LOCAL);
  93. xdst->u.rt6.rt6i_metric = rt->rt6i_metric;
  94. xdst->u.rt6.rt6i_node = rt->rt6i_node;
  95. xdst->route_cookie = rt6_get_cookie(rt);
  96. xdst->u.rt6.rt6i_gateway = rt->rt6i_gateway;
  97. xdst->u.rt6.rt6i_dst = rt->rt6i_dst;
  98. xdst->u.rt6.rt6i_src = rt->rt6i_src;
  99. return 0;
  100. }
  101. static inline void
  102. _decode_session6(struct sk_buff *skb, struct flowi *fl, int reverse)
  103. {
  104. struct flowi6 *fl6 = &fl->u.ip6;
  105. int onlyproto = 0;
  106. const struct ipv6hdr *hdr = ipv6_hdr(skb);
  107. u16 offset = sizeof(*hdr);
  108. struct ipv6_opt_hdr *exthdr;
  109. const unsigned char *nh = skb_network_header(skb);
  110. u16 nhoff = IP6CB(skb)->nhoff;
  111. int oif = 0;
  112. u8 nexthdr;
  113. if (!nhoff)
  114. nhoff = offsetof(struct ipv6hdr, nexthdr);
  115. nexthdr = nh[nhoff];
  116. if (skb_dst(skb))
  117. oif = skb_dst(skb)->dev->ifindex;
  118. memset(fl6, 0, sizeof(struct flowi6));
  119. fl6->flowi6_mark = skb->mark;
  120. fl6->flowi6_oif = reverse ? skb->skb_iif : oif;
  121. fl6->daddr = reverse ? hdr->saddr : hdr->daddr;
  122. fl6->saddr = reverse ? hdr->daddr : hdr->saddr;
  123. while (nh + offset + 1 < skb->data ||
  124. pskb_may_pull(skb, nh + offset + 1 - skb->data)) {
  125. nh = skb_network_header(skb);
  126. exthdr = (struct ipv6_opt_hdr *)(nh + offset);
  127. switch (nexthdr) {
  128. case NEXTHDR_FRAGMENT:
  129. onlyproto = 1;
  130. /* fall through */
  131. case NEXTHDR_ROUTING:
  132. case NEXTHDR_HOP:
  133. case NEXTHDR_DEST:
  134. offset += ipv6_optlen(exthdr);
  135. nexthdr = exthdr->nexthdr;
  136. exthdr = (struct ipv6_opt_hdr *)(nh + offset);
  137. break;
  138. case IPPROTO_UDP:
  139. case IPPROTO_UDPLITE:
  140. case IPPROTO_TCP:
  141. case IPPROTO_SCTP:
  142. case IPPROTO_DCCP:
  143. if (!onlyproto && (nh + offset + 4 < skb->data ||
  144. pskb_may_pull(skb, nh + offset + 4 - skb->data))) {
  145. __be16 *ports;
  146. nh = skb_network_header(skb);
  147. ports = (__be16 *)(nh + offset);
  148. fl6->fl6_sport = ports[!!reverse];
  149. fl6->fl6_dport = ports[!reverse];
  150. }
  151. fl6->flowi6_proto = nexthdr;
  152. return;
  153. case IPPROTO_ICMPV6:
  154. if (!onlyproto && (nh + offset + 2 < skb->data ||
  155. pskb_may_pull(skb, nh + offset + 2 - skb->data))) {
  156. u8 *icmp;
  157. nh = skb_network_header(skb);
  158. icmp = (u8 *)(nh + offset);
  159. fl6->fl6_icmp_type = icmp[0];
  160. fl6->fl6_icmp_code = icmp[1];
  161. }
  162. fl6->flowi6_proto = nexthdr;
  163. return;
  164. #if IS_ENABLED(CONFIG_IPV6_MIP6)
  165. case IPPROTO_MH:
  166. offset += ipv6_optlen(exthdr);
  167. if (!onlyproto && (nh + offset + 3 < skb->data ||
  168. pskb_may_pull(skb, nh + offset + 3 - skb->data))) {
  169. struct ip6_mh *mh;
  170. nh = skb_network_header(skb);
  171. mh = (struct ip6_mh *)(nh + offset);
  172. fl6->fl6_mh_type = mh->ip6mh_type;
  173. }
  174. fl6->flowi6_proto = nexthdr;
  175. return;
  176. #endif
  177. /* XXX Why are there these headers? */
  178. case IPPROTO_AH:
  179. case IPPROTO_ESP:
  180. case IPPROTO_COMP:
  181. default:
  182. fl6->fl6_ipsec_spi = 0;
  183. fl6->flowi6_proto = nexthdr;
  184. return;
  185. }
  186. }
  187. }
  188. static void xfrm6_update_pmtu(struct dst_entry *dst, struct sock *sk,
  189. struct sk_buff *skb, u32 mtu)
  190. {
  191. struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
  192. struct dst_entry *path = xdst->route;
  193. path->ops->update_pmtu(path, sk, skb, mtu);
  194. }
  195. static void xfrm6_redirect(struct dst_entry *dst, struct sock *sk,
  196. struct sk_buff *skb)
  197. {
  198. struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
  199. struct dst_entry *path = xdst->route;
  200. path->ops->redirect(path, sk, skb);
  201. }
  202. static void xfrm6_dst_destroy(struct dst_entry *dst)
  203. {
  204. struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
  205. if (likely(xdst->u.rt6.rt6i_idev))
  206. in6_dev_put(xdst->u.rt6.rt6i_idev);
  207. dst_destroy_metrics_generic(dst);
  208. xfrm_dst_destroy(xdst);
  209. }
  210. static void xfrm6_dst_ifdown(struct dst_entry *dst, struct net_device *dev,
  211. int unregister)
  212. {
  213. struct xfrm_dst *xdst;
  214. if (!unregister)
  215. return;
  216. xdst = (struct xfrm_dst *)dst;
  217. if (xdst->u.rt6.rt6i_idev->dev == dev) {
  218. struct inet6_dev *loopback_idev =
  219. in6_dev_get(dev_net(dev)->loopback_dev);
  220. BUG_ON(!loopback_idev);
  221. do {
  222. in6_dev_put(xdst->u.rt6.rt6i_idev);
  223. xdst->u.rt6.rt6i_idev = loopback_idev;
  224. in6_dev_hold(loopback_idev);
  225. xdst = (struct xfrm_dst *)xfrm_dst_child(&xdst->u.dst);
  226. } while (xdst->u.dst.xfrm);
  227. __in6_dev_put(loopback_idev);
  228. }
  229. xfrm_dst_ifdown(dst, dev);
  230. }
  231. static struct dst_ops xfrm6_dst_ops_template = {
  232. .family = AF_INET6,
  233. .update_pmtu = xfrm6_update_pmtu,
  234. .redirect = xfrm6_redirect,
  235. .cow_metrics = dst_cow_metrics_generic,
  236. .destroy = xfrm6_dst_destroy,
  237. .ifdown = xfrm6_dst_ifdown,
  238. .local_out = __ip6_local_out,
  239. .gc_thresh = 32768,
  240. };
  241. static const struct xfrm_policy_afinfo xfrm6_policy_afinfo = {
  242. .dst_ops = &xfrm6_dst_ops_template,
  243. .dst_lookup = xfrm6_dst_lookup,
  244. .get_saddr = xfrm6_get_saddr,
  245. .decode_session = _decode_session6,
  246. .get_tos = xfrm6_get_tos,
  247. .init_path = xfrm6_init_path,
  248. .fill_dst = xfrm6_fill_dst,
  249. .blackhole_route = ip6_blackhole_route,
  250. };
  251. static int __init xfrm6_policy_init(void)
  252. {
  253. return xfrm_policy_register_afinfo(&xfrm6_policy_afinfo, AF_INET6);
  254. }
  255. static void xfrm6_policy_fini(void)
  256. {
  257. xfrm_policy_unregister_afinfo(&xfrm6_policy_afinfo);
  258. }
  259. #ifdef CONFIG_SYSCTL
  260. static struct ctl_table xfrm6_policy_table[] = {
  261. {
  262. .procname = "xfrm6_gc_thresh",
  263. .data = &init_net.xfrm.xfrm6_dst_ops.gc_thresh,
  264. .maxlen = sizeof(int),
  265. .mode = 0644,
  266. .proc_handler = proc_dointvec,
  267. },
  268. { }
  269. };
  270. static int __net_init xfrm6_net_sysctl_init(struct net *net)
  271. {
  272. struct ctl_table *table;
  273. struct ctl_table_header *hdr;
  274. table = xfrm6_policy_table;
  275. if (!net_eq(net, &init_net)) {
  276. table = kmemdup(table, sizeof(xfrm6_policy_table), GFP_KERNEL);
  277. if (!table)
  278. goto err_alloc;
  279. table[0].data = &net->xfrm.xfrm6_dst_ops.gc_thresh;
  280. }
  281. hdr = register_net_sysctl(net, "net/ipv6", table);
  282. if (!hdr)
  283. goto err_reg;
  284. net->ipv6.sysctl.xfrm6_hdr = hdr;
  285. return 0;
  286. err_reg:
  287. if (!net_eq(net, &init_net))
  288. kfree(table);
  289. err_alloc:
  290. return -ENOMEM;
  291. }
  292. static void __net_exit xfrm6_net_sysctl_exit(struct net *net)
  293. {
  294. struct ctl_table *table;
  295. if (!net->ipv6.sysctl.xfrm6_hdr)
  296. return;
  297. table = net->ipv6.sysctl.xfrm6_hdr->ctl_table_arg;
  298. unregister_net_sysctl_table(net->ipv6.sysctl.xfrm6_hdr);
  299. if (!net_eq(net, &init_net))
  300. kfree(table);
  301. }
  302. #else /* CONFIG_SYSCTL */
  303. static inline int xfrm6_net_sysctl_init(struct net *net)
  304. {
  305. return 0;
  306. }
  307. static inline void xfrm6_net_sysctl_exit(struct net *net)
  308. {
  309. }
  310. #endif
  311. static int __net_init xfrm6_net_init(struct net *net)
  312. {
  313. int ret;
  314. memcpy(&net->xfrm.xfrm6_dst_ops, &xfrm6_dst_ops_template,
  315. sizeof(xfrm6_dst_ops_template));
  316. ret = dst_entries_init(&net->xfrm.xfrm6_dst_ops);
  317. if (ret)
  318. return ret;
  319. ret = xfrm6_net_sysctl_init(net);
  320. if (ret)
  321. dst_entries_destroy(&net->xfrm.xfrm6_dst_ops);
  322. return ret;
  323. }
  324. static void __net_exit xfrm6_net_exit(struct net *net)
  325. {
  326. xfrm6_net_sysctl_exit(net);
  327. dst_entries_destroy(&net->xfrm.xfrm6_dst_ops);
  328. }
  329. static struct pernet_operations xfrm6_net_ops = {
  330. .init = xfrm6_net_init,
  331. .exit = xfrm6_net_exit,
  332. };
  333. int __init xfrm6_init(void)
  334. {
  335. int ret;
  336. ret = xfrm6_policy_init();
  337. if (ret)
  338. goto out;
  339. ret = xfrm6_state_init();
  340. if (ret)
  341. goto out_policy;
  342. ret = xfrm6_protocol_init();
  343. if (ret)
  344. goto out_state;
  345. register_pernet_subsys(&xfrm6_net_ops);
  346. out:
  347. return ret;
  348. out_state:
  349. xfrm6_state_fini();
  350. out_policy:
  351. xfrm6_policy_fini();
  352. goto out;
  353. }
  354. void xfrm6_fini(void)
  355. {
  356. unregister_pernet_subsys(&xfrm6_net_ops);
  357. xfrm6_protocol_fini();
  358. xfrm6_policy_fini();
  359. xfrm6_state_fini();
  360. }