]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - net/ipv6/xfrm6_policy.c
x86/speculation/mds: Conditionally clear CPU buffers on idle entry
[mirror_ubuntu-bionic-kernel.git] / net / ipv6 / xfrm6_policy.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
1da177e4
LT
2/*
3 * xfrm6_policy.c: based on xfrm4_policy.c
4 *
5 * Authors:
6 * Mitsuru KANDA @USAGI
67ba4152
IM
7 * Kazunori MIYAZAWA @USAGI
8 * Kunihiro Ishiguro <kunihiro@ipinfusion.com>
9 * IPv6 support
10 * YOSHIFUJI Hideaki
11 * Split up af-specific portion
1ab1457c 12 *
1da177e4
LT
13 */
14
66cdb3ca
HX
15#include <linux/err.h>
16#include <linux/kernel.h>
aabc9761
HX
17#include <linux/netdevice.h>
18#include <net/addrconf.h>
45ff5a3f 19#include <net/dst.h>
1da177e4
LT
20#include <net/xfrm.h>
21#include <net/ip.h>
22#include <net/ipv6.h>
23#include <net/ip6_route.h>
385add90 24#include <net/l3mdev.h>
07a93626 25#if IS_ENABLED(CONFIG_IPV6_MIP6)
2ce4272a
MN
26#include <net/mip6.h>
27#endif
1da177e4 28
42a7b32b 29static struct dst_entry *xfrm6_dst_lookup(struct net *net, int tos, int oif,
5e6b930f 30 const xfrm_address_t *saddr,
077fbac4
LC
31 const xfrm_address_t *daddr,
32 u32 mark)
1da177e4 33{
7e1dc7b6 34 struct flowi6 fl6;
66cdb3ca
HX
35 struct dst_entry *dst;
36 int err;
37
7e1dc7b6 38 memset(&fl6, 0, sizeof(fl6));
11d7a0bb 39 fl6.flowi6_oif = l3mdev_master_ifindex_by_index(net, oif);
4148987a 40 fl6.flowi6_flags = FLOWI_FLAG_SKIP_NH_OIF;
077fbac4 41 fl6.flowi6_mark = mark;
7e1dc7b6 42 memcpy(&fl6.daddr, daddr, sizeof(fl6.daddr));
66cdb3ca 43 if (saddr)
7e1dc7b6 44 memcpy(&fl6.saddr, saddr, sizeof(fl6.saddr));
66cdb3ca 45
4c9483b2 46 dst = ip6_route_output(net, NULL, &fl6);
66cdb3ca
HX
47
48 err = dst->error;
49 if (dst->error) {
4251320f 50 dst_release(dst);
66cdb3ca
HX
51 dst = ERR_PTR(err);
52 }
53
54 return dst;
1da177e4
LT
55}
56
42a7b32b 57static int xfrm6_get_saddr(struct net *net, int oif,
077fbac4
LC
58 xfrm_address_t *saddr, xfrm_address_t *daddr,
59 u32 mark)
a1e59abf 60{
66cdb3ca 61 struct dst_entry *dst;
191cd582 62 struct net_device *dev;
66cdb3ca 63
077fbac4 64 dst = xfrm6_dst_lookup(net, 0, oif, NULL, daddr, mark);
66cdb3ca
HX
65 if (IS_ERR(dst))
66 return -EHOSTUNREACH;
67
191cd582 68 dev = ip6_dst_idev(dst)->dev;
15e318bd 69 ipv6_dev_get_saddr(dev_net(dev), dev, &daddr->in6, 0, &saddr->in6);
66cdb3ca
HX
70 dst_release(dst);
71 return 0;
a1e59abf
PM
72}
73
05d84025 74static int xfrm6_get_tos(const struct flowi *fl)
1da177e4 75{
25ee3286
HX
76 return 0;
77}
1da177e4 78
a1b05140
MN
79static int xfrm6_init_path(struct xfrm_dst *path, struct dst_entry *dst,
80 int nfheader_len)
81{
82 if (dst->ops->family == AF_INET6) {
67ba4152 83 struct rt6_info *rt = (struct rt6_info *)dst;
b197df4f 84 path->path_cookie = rt6_get_cookie(rt);
a1b05140
MN
85 }
86
87 path->u.rt6.rt6i_nfheader_len = nfheader_len;
88
89 return 0;
90}
91
87c1e12b 92static int xfrm6_fill_dst(struct xfrm_dst *xdst, struct net_device *dev,
0c7b3eef 93 const struct flowi *fl)
25ee3286 94{
67ba4152 95 struct rt6_info *rt = (struct rt6_info *)xdst->route;
1da177e4 96
25ee3286
HX
97 xdst->u.dst.dev = dev;
98 dev_hold(dev);
1da177e4 99
bc8e4b95 100 xdst->u.rt6.rt6i_idev = in6_dev_get(dev);
84c4a9df
CW
101 if (!xdst->u.rt6.rt6i_idev) {
102 dev_put(dev);
25ee3286 103 return -ENODEV;
84c4a9df 104 }
1da177e4 105
25ee3286
HX
106 /* Sheit... I remember I did this right. Apparently,
107 * it was magically lost, so this code needs audit */
108 xdst->u.rt6.rt6i_flags = rt->rt6i_flags & (RTF_ANYCAST |
109 RTF_LOCAL);
110 xdst->u.rt6.rt6i_metric = rt->rt6i_metric;
111 xdst->u.rt6.rt6i_node = rt->rt6i_node;
b197df4f 112 xdst->route_cookie = rt6_get_cookie(rt);
25ee3286
HX
113 xdst->u.rt6.rt6i_gateway = rt->rt6i_gateway;
114 xdst->u.rt6.rt6i_dst = rt->rt6i_dst;
115 xdst->u.rt6.rt6i_src = rt->rt6i_src;
31a5b09d
XL
116 INIT_LIST_HEAD(&xdst->u.rt6.rt6i_uncached);
117 rt6_uncached_list_add(&xdst->u.rt6);
118 atomic_inc(&dev_net(dev)->ipv6.rt6_stats->fib_rt_uncache);
1da177e4 119
1da177e4 120 return 0;
1da177e4
LT
121}
122
123static inline void
d5422efe 124_decode_session6(struct sk_buff *skb, struct flowi *fl, int reverse)
1da177e4 125{
7e1dc7b6 126 struct flowi6 *fl6 = &fl->u.ip6;
7e3a42a1 127 int onlyproto = 0;
b71d1d42 128 const struct ipv6hdr *hdr = ipv6_hdr(skb);
9adb2bc2 129 u32 offset = sizeof(*hdr);
e3cae904 130 struct ipv6_opt_hdr *exthdr;
d56f90a7 131 const unsigned char *nh = skb_network_header(skb);
f8556919 132 u16 nhoff = IP6CB(skb)->nhoff;
84502b5e 133 int oif = 0;
f8556919
SK
134 u8 nexthdr;
135
136 if (!nhoff)
137 nhoff = offsetof(struct ipv6hdr, nexthdr);
138
139 nexthdr = nh[nhoff];
84502b5e 140
385add90 141 if (skb_dst(skb))
e0d56fdd 142 oif = skb_dst(skb)->dev->ifindex;
1da177e4 143
7e1dc7b6
DM
144 memset(fl6, 0, sizeof(struct flowi6));
145 fl6->flowi6_mark = skb->mark;
84502b5e 146 fl6->flowi6_oif = reverse ? skb->skb_iif : oif;
44b451f1 147
4e3fd7a0
AD
148 fl6->daddr = reverse ? hdr->saddr : hdr->daddr;
149 fl6->saddr = reverse ? hdr->daddr : hdr->saddr;
1da177e4 150
59cae009
WY
151 while (nh + offset + 1 < skb->data ||
152 pskb_may_pull(skb, nh + offset + 1 - skb->data)) {
d56f90a7
ACM
153 nh = skb_network_header(skb);
154 exthdr = (struct ipv6_opt_hdr *)(nh + offset);
e3cae904 155
1da177e4 156 switch (nexthdr) {
7e3a42a1
ND
157 case NEXTHDR_FRAGMENT:
158 onlyproto = 1;
275757e6 159 /* fall through */
1da177e4
LT
160 case NEXTHDR_ROUTING:
161 case NEXTHDR_HOP:
162 case NEXTHDR_DEST:
163 offset += ipv6_optlen(exthdr);
164 nexthdr = exthdr->nexthdr;
d56f90a7 165 exthdr = (struct ipv6_opt_hdr *)(nh + offset);
1da177e4
LT
166 break;
167
168 case IPPROTO_UDP:
ba4e58ec 169 case IPPROTO_UDPLITE:
1da177e4
LT
170 case IPPROTO_TCP:
171 case IPPROTO_SCTP:
9e999993 172 case IPPROTO_DCCP:
59cae009
WY
173 if (!onlyproto && (nh + offset + 4 < skb->data ||
174 pskb_may_pull(skb, nh + offset + 4 - skb->data))) {
789f2023 175 __be16 *ports;
1da177e4 176
789f2023
LR
177 nh = skb_network_header(skb);
178 ports = (__be16 *)(nh + offset);
1958b856
DM
179 fl6->fl6_sport = ports[!!reverse];
180 fl6->fl6_dport = ports[!reverse];
1da177e4 181 }
7e1dc7b6 182 fl6->flowi6_proto = nexthdr;
1da177e4
LT
183 return;
184
185 case IPPROTO_ICMPV6:
04a6b8bf
MK
186 if (!onlyproto && (nh + offset + 2 < skb->data ||
187 pskb_may_pull(skb, nh + offset + 2 - skb->data))) {
789f2023 188 u8 *icmp;
1da177e4 189
789f2023
LR
190 nh = skb_network_header(skb);
191 icmp = (u8 *)(nh + offset);
1958b856
DM
192 fl6->fl6_icmp_type = icmp[0];
193 fl6->fl6_icmp_code = icmp[1];
1da177e4 194 }
7e1dc7b6 195 fl6->flowi6_proto = nexthdr;
1da177e4
LT
196 return;
197
07a93626 198#if IS_ENABLED(CONFIG_IPV6_MIP6)
2ce4272a 199 case IPPROTO_MH:
cd3bafc7 200 offset += ipv6_optlen(exthdr);
04a6b8bf
MK
201 if (!onlyproto && (nh + offset + 3 < skb->data ||
202 pskb_may_pull(skb, nh + offset + 3 - skb->data))) {
2ce4272a 203 struct ip6_mh *mh;
2ce4272a 204
789f2023
LR
205 nh = skb_network_header(skb);
206 mh = (struct ip6_mh *)(nh + offset);
1958b856 207 fl6->fl6_mh_type = mh->ip6mh_type;
2ce4272a 208 }
7e1dc7b6 209 fl6->flowi6_proto = nexthdr;
2ce4272a
MN
210 return;
211#endif
212
1da177e4
LT
213 /* XXX Why are there these headers? */
214 case IPPROTO_AH:
215 case IPPROTO_ESP:
216 case IPPROTO_COMP:
217 default:
1958b856 218 fl6->fl6_ipsec_spi = 0;
7e1dc7b6 219 fl6->flowi6_proto = nexthdr;
1da177e4 220 return;
3ff50b79 221 }
1da177e4
LT
222 }
223}
224
6700c270
DM
225static void xfrm6_update_pmtu(struct dst_entry *dst, struct sock *sk,
226 struct sk_buff *skb, u32 mtu)
1da177e4
LT
227{
228 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
229 struct dst_entry *path = xdst->route;
230
6700c270 231 path->ops->update_pmtu(path, sk, skb, mtu);
1da177e4
LT
232}
233
6700c270
DM
234static void xfrm6_redirect(struct dst_entry *dst, struct sock *sk,
235 struct sk_buff *skb)
ec18d9a2
DM
236{
237 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
238 struct dst_entry *path = xdst->route;
239
6700c270 240 path->ops->redirect(path, sk, skb);
ec18d9a2
DM
241}
242
aabc9761
HX
243static void xfrm6_dst_destroy(struct dst_entry *dst)
244{
245 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
246
247 if (likely(xdst->u.rt6.rt6i_idev))
248 in6_dev_put(xdst->u.rt6.rt6i_idev);
62fa8a84 249 dst_destroy_metrics_generic(dst);
31a5b09d
XL
250 if (xdst->u.rt6.rt6i_uncached_list)
251 rt6_uncached_list_del(&xdst->u.rt6);
aabc9761
HX
252 xfrm_dst_destroy(xdst);
253}
254
255static void xfrm6_dst_ifdown(struct dst_entry *dst, struct net_device *dev,
256 int unregister)
257{
258 struct xfrm_dst *xdst;
259
260 if (!unregister)
261 return;
262
263 xdst = (struct xfrm_dst *)dst;
264 if (xdst->u.rt6.rt6i_idev->dev == dev) {
5a3e55d6 265 struct inet6_dev *loopback_idev =
c346dca1 266 in6_dev_get(dev_net(dev)->loopback_dev);
aabc9761
HX
267 BUG_ON(!loopback_idev);
268
269 do {
270 in6_dev_put(xdst->u.rt6.rt6i_idev);
271 xdst->u.rt6.rt6i_idev = loopback_idev;
272 in6_dev_hold(loopback_idev);
273 xdst = (struct xfrm_dst *)xdst->u.dst.child;
274 } while (xdst->u.dst.xfrm);
275
276 __in6_dev_put(loopback_idev);
277 }
278
279 xfrm_dst_ifdown(dst, dev);
280}
281
a8a572a6 282static struct dst_ops xfrm6_dst_ops_template = {
1da177e4 283 .family = AF_INET6,
1da177e4 284 .update_pmtu = xfrm6_update_pmtu,
ec18d9a2 285 .redirect = xfrm6_redirect,
62fa8a84 286 .cow_metrics = dst_cow_metrics_generic,
aabc9761
HX
287 .destroy = xfrm6_dst_destroy,
288 .ifdown = xfrm6_dst_ifdown,
862b82c6 289 .local_out = __ip6_local_out,
3c2a89dd 290 .gc_thresh = 32768,
1da177e4
LT
291};
292
37b10383 293static const struct xfrm_policy_afinfo xfrm6_policy_afinfo = {
a8a572a6 294 .dst_ops = &xfrm6_dst_ops_template,
1da177e4 295 .dst_lookup = xfrm6_dst_lookup,
67ba4152 296 .get_saddr = xfrm6_get_saddr,
1da177e4 297 .decode_session = _decode_session6,
25ee3286 298 .get_tos = xfrm6_get_tos,
a1b05140 299 .init_path = xfrm6_init_path,
25ee3286 300 .fill_dst = xfrm6_fill_dst,
2774c131 301 .blackhole_route = ip6_blackhole_route,
1da177e4
LT
302};
303
0013caba 304static int __init xfrm6_policy_init(void)
1da177e4 305{
a2817d8b 306 return xfrm_policy_register_afinfo(&xfrm6_policy_afinfo, AF_INET6);
1da177e4
LT
307}
308
309static void xfrm6_policy_fini(void)
310{
311 xfrm_policy_unregister_afinfo(&xfrm6_policy_afinfo);
312}
313
db71789c 314#ifdef CONFIG_SYSCTL
a44a4a00
NH
315static struct ctl_table xfrm6_policy_table[] = {
316 {
a44a4a00 317 .procname = "xfrm6_gc_thresh",
67ba4152
IM
318 .data = &init_net.xfrm.xfrm6_dst_ops.gc_thresh,
319 .maxlen = sizeof(int),
320 .mode = 0644,
a44a4a00
NH
321 .proc_handler = proc_dointvec,
322 },
323 { }
324};
325
a8a572a6 326static int __net_init xfrm6_net_sysctl_init(struct net *net)
8d068875
MK
327{
328 struct ctl_table *table;
329 struct ctl_table_header *hdr;
330
331 table = xfrm6_policy_table;
332 if (!net_eq(net, &init_net)) {
333 table = kmemdup(table, sizeof(xfrm6_policy_table), GFP_KERNEL);
334 if (!table)
335 goto err_alloc;
336
337 table[0].data = &net->xfrm.xfrm6_dst_ops.gc_thresh;
338 }
339
340 hdr = register_net_sysctl(net, "net/ipv6", table);
341 if (!hdr)
342 goto err_reg;
343
344 net->ipv6.sysctl.xfrm6_hdr = hdr;
345 return 0;
346
347err_reg:
348 if (!net_eq(net, &init_net))
349 kfree(table);
350err_alloc:
351 return -ENOMEM;
352}
353
a8a572a6 354static void __net_exit xfrm6_net_sysctl_exit(struct net *net)
8d068875
MK
355{
356 struct ctl_table *table;
357
63159f29 358 if (!net->ipv6.sysctl.xfrm6_hdr)
8d068875
MK
359 return;
360
361 table = net->ipv6.sysctl.xfrm6_hdr->ctl_table_arg;
362 unregister_net_sysctl_table(net->ipv6.sysctl.xfrm6_hdr);
363 if (!net_eq(net, &init_net))
364 kfree(table);
365}
a8a572a6 366#else /* CONFIG_SYSCTL */
318d3cc0 367static inline int xfrm6_net_sysctl_init(struct net *net)
a8a572a6
DS
368{
369 return 0;
370}
371
318d3cc0 372static inline void xfrm6_net_sysctl_exit(struct net *net)
a8a572a6
DS
373{
374}
375#endif
376
377static int __net_init xfrm6_net_init(struct net *net)
378{
379 int ret;
380
381 memcpy(&net->xfrm.xfrm6_dst_ops, &xfrm6_dst_ops_template,
382 sizeof(xfrm6_dst_ops_template));
383 ret = dst_entries_init(&net->xfrm.xfrm6_dst_ops);
384 if (ret)
385 return ret;
386
387 ret = xfrm6_net_sysctl_init(net);
388 if (ret)
389 dst_entries_destroy(&net->xfrm.xfrm6_dst_ops);
390
391 return ret;
392}
393
394static void __net_exit xfrm6_net_exit(struct net *net)
395{
396 xfrm6_net_sysctl_exit(net);
397 dst_entries_destroy(&net->xfrm.xfrm6_dst_ops);
398}
8d068875
MK
399
400static struct pernet_operations xfrm6_net_ops = {
401 .init = xfrm6_net_init,
402 .exit = xfrm6_net_exit,
403};
a44a4a00 404
0013caba 405int __init xfrm6_init(void)
1da177e4 406{
0013caba 407 int ret;
c3813286 408
d7c7544c 409 ret = xfrm6_policy_init();
a8a572a6 410 if (ret)
d7c7544c 411 goto out;
d7c7544c
AD
412 ret = xfrm6_state_init();
413 if (ret)
414 goto out_policy;
415
7e14ea15
SK
416 ret = xfrm6_protocol_init();
417 if (ret)
418 goto out_state;
419
8d068875 420 register_pernet_subsys(&xfrm6_net_ops);
0013caba
DL
421out:
422 return ret;
7e14ea15
SK
423out_state:
424 xfrm6_state_fini();
0013caba
DL
425out_policy:
426 xfrm6_policy_fini();
427 goto out;
1da177e4
LT
428}
429
430void xfrm6_fini(void)
431{
8d068875 432 unregister_pernet_subsys(&xfrm6_net_ops);
7e14ea15 433 xfrm6_protocol_fini();
1da177e4
LT
434 xfrm6_policy_fini();
435 xfrm6_state_fini();
436}