]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - net/ipv6/xfrm6_policy.c
License cleanup: add SPDX GPL-2.0 license identifier to files with no license
[mirror_ubuntu-bionic-kernel.git] / net / ipv6 / xfrm6_policy.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
1da177e4
LT
2/*
3 * xfrm6_policy.c: based on xfrm4_policy.c
4 *
5 * Authors:
6 * Mitsuru KANDA @USAGI
67ba4152
IM
7 * Kazunori MIYAZAWA @USAGI
8 * Kunihiro Ishiguro <kunihiro@ipinfusion.com>
9 * IPv6 support
10 * YOSHIFUJI Hideaki
11 * Split up af-specific portion
1ab1457c 12 *
1da177e4
LT
13 */
14
66cdb3ca
HX
15#include <linux/err.h>
16#include <linux/kernel.h>
aabc9761
HX
17#include <linux/netdevice.h>
18#include <net/addrconf.h>
45ff5a3f 19#include <net/dst.h>
1da177e4
LT
20#include <net/xfrm.h>
21#include <net/ip.h>
22#include <net/ipv6.h>
23#include <net/ip6_route.h>
385add90 24#include <net/l3mdev.h>
07a93626 25#if IS_ENABLED(CONFIG_IPV6_MIP6)
2ce4272a
MN
26#include <net/mip6.h>
27#endif
1da177e4 28
42a7b32b 29static struct dst_entry *xfrm6_dst_lookup(struct net *net, int tos, int oif,
5e6b930f 30 const xfrm_address_t *saddr,
077fbac4
LC
31 const xfrm_address_t *daddr,
32 u32 mark)
1da177e4 33{
7e1dc7b6 34 struct flowi6 fl6;
66cdb3ca
HX
35 struct dst_entry *dst;
36 int err;
37
7e1dc7b6 38 memset(&fl6, 0, sizeof(fl6));
11d7a0bb 39 fl6.flowi6_oif = l3mdev_master_ifindex_by_index(net, oif);
4148987a 40 fl6.flowi6_flags = FLOWI_FLAG_SKIP_NH_OIF;
077fbac4 41 fl6.flowi6_mark = mark;
7e1dc7b6 42 memcpy(&fl6.daddr, daddr, sizeof(fl6.daddr));
66cdb3ca 43 if (saddr)
7e1dc7b6 44 memcpy(&fl6.saddr, saddr, sizeof(fl6.saddr));
66cdb3ca 45
4c9483b2 46 dst = ip6_route_output(net, NULL, &fl6);
66cdb3ca
HX
47
48 err = dst->error;
49 if (dst->error) {
4251320f 50 dst_release(dst);
66cdb3ca
HX
51 dst = ERR_PTR(err);
52 }
53
54 return dst;
1da177e4
LT
55}
56
42a7b32b 57static int xfrm6_get_saddr(struct net *net, int oif,
077fbac4
LC
58 xfrm_address_t *saddr, xfrm_address_t *daddr,
59 u32 mark)
a1e59abf 60{
66cdb3ca 61 struct dst_entry *dst;
191cd582 62 struct net_device *dev;
66cdb3ca 63
077fbac4 64 dst = xfrm6_dst_lookup(net, 0, oif, NULL, daddr, mark);
66cdb3ca
HX
65 if (IS_ERR(dst))
66 return -EHOSTUNREACH;
67
191cd582 68 dev = ip6_dst_idev(dst)->dev;
15e318bd 69 ipv6_dev_get_saddr(dev_net(dev), dev, &daddr->in6, 0, &saddr->in6);
66cdb3ca
HX
70 dst_release(dst);
71 return 0;
a1e59abf
PM
72}
73
05d84025 74static int xfrm6_get_tos(const struct flowi *fl)
1da177e4 75{
25ee3286
HX
76 return 0;
77}
1da177e4 78
a1b05140
MN
79static int xfrm6_init_path(struct xfrm_dst *path, struct dst_entry *dst,
80 int nfheader_len)
81{
82 if (dst->ops->family == AF_INET6) {
67ba4152 83 struct rt6_info *rt = (struct rt6_info *)dst;
b197df4f 84 path->path_cookie = rt6_get_cookie(rt);
a1b05140
MN
85 }
86
87 path->u.rt6.rt6i_nfheader_len = nfheader_len;
88
89 return 0;
90}
91
87c1e12b 92static int xfrm6_fill_dst(struct xfrm_dst *xdst, struct net_device *dev,
0c7b3eef 93 const struct flowi *fl)
25ee3286 94{
67ba4152 95 struct rt6_info *rt = (struct rt6_info *)xdst->route;
1da177e4 96
25ee3286
HX
97 xdst->u.dst.dev = dev;
98 dev_hold(dev);
1da177e4 99
bc8e4b95 100 xdst->u.rt6.rt6i_idev = in6_dev_get(dev);
84c4a9df
CW
101 if (!xdst->u.rt6.rt6i_idev) {
102 dev_put(dev);
25ee3286 103 return -ENODEV;
84c4a9df 104 }
1da177e4 105
25ee3286
HX
106 /* Sheit... I remember I did this right. Apparently,
107 * it was magically lost, so this code needs audit */
108 xdst->u.rt6.rt6i_flags = rt->rt6i_flags & (RTF_ANYCAST |
109 RTF_LOCAL);
110 xdst->u.rt6.rt6i_metric = rt->rt6i_metric;
111 xdst->u.rt6.rt6i_node = rt->rt6i_node;
b197df4f 112 xdst->route_cookie = rt6_get_cookie(rt);
25ee3286
HX
113 xdst->u.rt6.rt6i_gateway = rt->rt6i_gateway;
114 xdst->u.rt6.rt6i_dst = rt->rt6i_dst;
115 xdst->u.rt6.rt6i_src = rt->rt6i_src;
1da177e4 116
1da177e4 117 return 0;
1da177e4
LT
118}
119
120static inline void
d5422efe 121_decode_session6(struct sk_buff *skb, struct flowi *fl, int reverse)
1da177e4 122{
7e1dc7b6 123 struct flowi6 *fl6 = &fl->u.ip6;
7e3a42a1 124 int onlyproto = 0;
b71d1d42 125 const struct ipv6hdr *hdr = ipv6_hdr(skb);
de3b7a06 126 u16 offset = sizeof(*hdr);
e3cae904 127 struct ipv6_opt_hdr *exthdr;
d56f90a7 128 const unsigned char *nh = skb_network_header(skb);
f8556919 129 u16 nhoff = IP6CB(skb)->nhoff;
84502b5e 130 int oif = 0;
f8556919
SK
131 u8 nexthdr;
132
133 if (!nhoff)
134 nhoff = offsetof(struct ipv6hdr, nexthdr);
135
136 nexthdr = nh[nhoff];
84502b5e 137
385add90 138 if (skb_dst(skb))
e0d56fdd 139 oif = skb_dst(skb)->dev->ifindex;
1da177e4 140
7e1dc7b6
DM
141 memset(fl6, 0, sizeof(struct flowi6));
142 fl6->flowi6_mark = skb->mark;
84502b5e 143 fl6->flowi6_oif = reverse ? skb->skb_iif : oif;
44b451f1 144
4e3fd7a0
AD
145 fl6->daddr = reverse ? hdr->saddr : hdr->daddr;
146 fl6->saddr = reverse ? hdr->daddr : hdr->saddr;
1da177e4 147
59cae009
WY
148 while (nh + offset + 1 < skb->data ||
149 pskb_may_pull(skb, nh + offset + 1 - skb->data)) {
d56f90a7
ACM
150 nh = skb_network_header(skb);
151 exthdr = (struct ipv6_opt_hdr *)(nh + offset);
e3cae904 152
1da177e4 153 switch (nexthdr) {
7e3a42a1
ND
154 case NEXTHDR_FRAGMENT:
155 onlyproto = 1;
1da177e4
LT
156 case NEXTHDR_ROUTING:
157 case NEXTHDR_HOP:
158 case NEXTHDR_DEST:
159 offset += ipv6_optlen(exthdr);
160 nexthdr = exthdr->nexthdr;
d56f90a7 161 exthdr = (struct ipv6_opt_hdr *)(nh + offset);
1da177e4
LT
162 break;
163
164 case IPPROTO_UDP:
ba4e58ec 165 case IPPROTO_UDPLITE:
1da177e4
LT
166 case IPPROTO_TCP:
167 case IPPROTO_SCTP:
9e999993 168 case IPPROTO_DCCP:
59cae009
WY
169 if (!onlyproto && (nh + offset + 4 < skb->data ||
170 pskb_may_pull(skb, nh + offset + 4 - skb->data))) {
789f2023 171 __be16 *ports;
1da177e4 172
789f2023
LR
173 nh = skb_network_header(skb);
174 ports = (__be16 *)(nh + offset);
1958b856
DM
175 fl6->fl6_sport = ports[!!reverse];
176 fl6->fl6_dport = ports[!reverse];
1da177e4 177 }
7e1dc7b6 178 fl6->flowi6_proto = nexthdr;
1da177e4
LT
179 return;
180
181 case IPPROTO_ICMPV6:
04a6b8bf
MK
182 if (!onlyproto && (nh + offset + 2 < skb->data ||
183 pskb_may_pull(skb, nh + offset + 2 - skb->data))) {
789f2023 184 u8 *icmp;
1da177e4 185
789f2023
LR
186 nh = skb_network_header(skb);
187 icmp = (u8 *)(nh + offset);
1958b856
DM
188 fl6->fl6_icmp_type = icmp[0];
189 fl6->fl6_icmp_code = icmp[1];
1da177e4 190 }
7e1dc7b6 191 fl6->flowi6_proto = nexthdr;
1da177e4
LT
192 return;
193
07a93626 194#if IS_ENABLED(CONFIG_IPV6_MIP6)
2ce4272a 195 case IPPROTO_MH:
cd3bafc7 196 offset += ipv6_optlen(exthdr);
04a6b8bf
MK
197 if (!onlyproto && (nh + offset + 3 < skb->data ||
198 pskb_may_pull(skb, nh + offset + 3 - skb->data))) {
2ce4272a 199 struct ip6_mh *mh;
2ce4272a 200
789f2023
LR
201 nh = skb_network_header(skb);
202 mh = (struct ip6_mh *)(nh + offset);
1958b856 203 fl6->fl6_mh_type = mh->ip6mh_type;
2ce4272a 204 }
7e1dc7b6 205 fl6->flowi6_proto = nexthdr;
2ce4272a
MN
206 return;
207#endif
208
1da177e4
LT
209 /* XXX Why are there these headers? */
210 case IPPROTO_AH:
211 case IPPROTO_ESP:
212 case IPPROTO_COMP:
213 default:
1958b856 214 fl6->fl6_ipsec_spi = 0;
7e1dc7b6 215 fl6->flowi6_proto = nexthdr;
1da177e4 216 return;
3ff50b79 217 }
1da177e4
LT
218 }
219}
220
6700c270
DM
221static void xfrm6_update_pmtu(struct dst_entry *dst, struct sock *sk,
222 struct sk_buff *skb, u32 mtu)
1da177e4
LT
223{
224 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
225 struct dst_entry *path = xdst->route;
226
6700c270 227 path->ops->update_pmtu(path, sk, skb, mtu);
1da177e4
LT
228}
229
6700c270
DM
230static void xfrm6_redirect(struct dst_entry *dst, struct sock *sk,
231 struct sk_buff *skb)
ec18d9a2
DM
232{
233 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
234 struct dst_entry *path = xdst->route;
235
6700c270 236 path->ops->redirect(path, sk, skb);
ec18d9a2
DM
237}
238
aabc9761
HX
239static void xfrm6_dst_destroy(struct dst_entry *dst)
240{
241 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
242
243 if (likely(xdst->u.rt6.rt6i_idev))
244 in6_dev_put(xdst->u.rt6.rt6i_idev);
62fa8a84 245 dst_destroy_metrics_generic(dst);
aabc9761
HX
246 xfrm_dst_destroy(xdst);
247}
248
249static void xfrm6_dst_ifdown(struct dst_entry *dst, struct net_device *dev,
250 int unregister)
251{
252 struct xfrm_dst *xdst;
253
254 if (!unregister)
255 return;
256
257 xdst = (struct xfrm_dst *)dst;
258 if (xdst->u.rt6.rt6i_idev->dev == dev) {
5a3e55d6 259 struct inet6_dev *loopback_idev =
c346dca1 260 in6_dev_get(dev_net(dev)->loopback_dev);
aabc9761
HX
261 BUG_ON(!loopback_idev);
262
263 do {
264 in6_dev_put(xdst->u.rt6.rt6i_idev);
265 xdst->u.rt6.rt6i_idev = loopback_idev;
266 in6_dev_hold(loopback_idev);
267 xdst = (struct xfrm_dst *)xdst->u.dst.child;
268 } while (xdst->u.dst.xfrm);
269
270 __in6_dev_put(loopback_idev);
271 }
272
273 xfrm_dst_ifdown(dst, dev);
274}
275
a8a572a6 276static struct dst_ops xfrm6_dst_ops_template = {
1da177e4 277 .family = AF_INET6,
1da177e4 278 .update_pmtu = xfrm6_update_pmtu,
ec18d9a2 279 .redirect = xfrm6_redirect,
62fa8a84 280 .cow_metrics = dst_cow_metrics_generic,
aabc9761
HX
281 .destroy = xfrm6_dst_destroy,
282 .ifdown = xfrm6_dst_ifdown,
862b82c6 283 .local_out = __ip6_local_out,
3c2a89dd 284 .gc_thresh = 32768,
1da177e4
LT
285};
286
37b10383 287static const struct xfrm_policy_afinfo xfrm6_policy_afinfo = {
a8a572a6 288 .dst_ops = &xfrm6_dst_ops_template,
1da177e4 289 .dst_lookup = xfrm6_dst_lookup,
67ba4152 290 .get_saddr = xfrm6_get_saddr,
1da177e4 291 .decode_session = _decode_session6,
25ee3286 292 .get_tos = xfrm6_get_tos,
a1b05140 293 .init_path = xfrm6_init_path,
25ee3286 294 .fill_dst = xfrm6_fill_dst,
2774c131 295 .blackhole_route = ip6_blackhole_route,
1da177e4
LT
296};
297
0013caba 298static int __init xfrm6_policy_init(void)
1da177e4 299{
a2817d8b 300 return xfrm_policy_register_afinfo(&xfrm6_policy_afinfo, AF_INET6);
1da177e4
LT
301}
302
303static void xfrm6_policy_fini(void)
304{
305 xfrm_policy_unregister_afinfo(&xfrm6_policy_afinfo);
306}
307
db71789c 308#ifdef CONFIG_SYSCTL
a44a4a00
NH
309static struct ctl_table xfrm6_policy_table[] = {
310 {
a44a4a00 311 .procname = "xfrm6_gc_thresh",
67ba4152
IM
312 .data = &init_net.xfrm.xfrm6_dst_ops.gc_thresh,
313 .maxlen = sizeof(int),
314 .mode = 0644,
a44a4a00
NH
315 .proc_handler = proc_dointvec,
316 },
317 { }
318};
319
a8a572a6 320static int __net_init xfrm6_net_sysctl_init(struct net *net)
8d068875
MK
321{
322 struct ctl_table *table;
323 struct ctl_table_header *hdr;
324
325 table = xfrm6_policy_table;
326 if (!net_eq(net, &init_net)) {
327 table = kmemdup(table, sizeof(xfrm6_policy_table), GFP_KERNEL);
328 if (!table)
329 goto err_alloc;
330
331 table[0].data = &net->xfrm.xfrm6_dst_ops.gc_thresh;
332 }
333
334 hdr = register_net_sysctl(net, "net/ipv6", table);
335 if (!hdr)
336 goto err_reg;
337
338 net->ipv6.sysctl.xfrm6_hdr = hdr;
339 return 0;
340
341err_reg:
342 if (!net_eq(net, &init_net))
343 kfree(table);
344err_alloc:
345 return -ENOMEM;
346}
347
a8a572a6 348static void __net_exit xfrm6_net_sysctl_exit(struct net *net)
8d068875
MK
349{
350 struct ctl_table *table;
351
63159f29 352 if (!net->ipv6.sysctl.xfrm6_hdr)
8d068875
MK
353 return;
354
355 table = net->ipv6.sysctl.xfrm6_hdr->ctl_table_arg;
356 unregister_net_sysctl_table(net->ipv6.sysctl.xfrm6_hdr);
357 if (!net_eq(net, &init_net))
358 kfree(table);
359}
a8a572a6 360#else /* CONFIG_SYSCTL */
318d3cc0 361static inline int xfrm6_net_sysctl_init(struct net *net)
a8a572a6
DS
362{
363 return 0;
364}
365
318d3cc0 366static inline void xfrm6_net_sysctl_exit(struct net *net)
a8a572a6
DS
367{
368}
369#endif
370
371static int __net_init xfrm6_net_init(struct net *net)
372{
373 int ret;
374
375 memcpy(&net->xfrm.xfrm6_dst_ops, &xfrm6_dst_ops_template,
376 sizeof(xfrm6_dst_ops_template));
377 ret = dst_entries_init(&net->xfrm.xfrm6_dst_ops);
378 if (ret)
379 return ret;
380
381 ret = xfrm6_net_sysctl_init(net);
382 if (ret)
383 dst_entries_destroy(&net->xfrm.xfrm6_dst_ops);
384
385 return ret;
386}
387
388static void __net_exit xfrm6_net_exit(struct net *net)
389{
390 xfrm6_net_sysctl_exit(net);
391 dst_entries_destroy(&net->xfrm.xfrm6_dst_ops);
392}
8d068875
MK
393
394static struct pernet_operations xfrm6_net_ops = {
395 .init = xfrm6_net_init,
396 .exit = xfrm6_net_exit,
397};
a44a4a00 398
0013caba 399int __init xfrm6_init(void)
1da177e4 400{
0013caba 401 int ret;
c3813286 402
d7c7544c 403 ret = xfrm6_policy_init();
a8a572a6 404 if (ret)
d7c7544c 405 goto out;
d7c7544c
AD
406 ret = xfrm6_state_init();
407 if (ret)
408 goto out_policy;
409
7e14ea15
SK
410 ret = xfrm6_protocol_init();
411 if (ret)
412 goto out_state;
413
8d068875 414 register_pernet_subsys(&xfrm6_net_ops);
0013caba
DL
415out:
416 return ret;
7e14ea15
SK
417out_state:
418 xfrm6_state_fini();
0013caba
DL
419out_policy:
420 xfrm6_policy_fini();
421 goto out;
1da177e4
LT
422}
423
424void xfrm6_fini(void)
425{
8d068875 426 unregister_pernet_subsys(&xfrm6_net_ops);
7e14ea15 427 xfrm6_protocol_fini();
1da177e4
LT
428 xfrm6_policy_fini();
429 xfrm6_state_fini();
430}