1 /* 2 * xfrm6_policy.c: based on xfrm4_policy.c 3 * 4 * Authors: 5 * Mitsuru KANDA @USAGI 6 * Kazunori MIYAZAWA @USAGI 7 * Kunihiro Ishiguro <kunihiro@ipinfusion.com> 8 * IPv6 support 9 * YOSHIFUJI Hideaki 10 * Split up af-specific portion 11 * 12 */ 13 14 #include <linux/err.h> 15 #include <linux/kernel.h> 16 #include <linux/netdevice.h> 17 #include <net/addrconf.h> 18 #include <net/dst.h> 19 #include <net/xfrm.h> 20 #include <net/ip.h> 21 #include <net/ipv6.h> 22 #include <net/ip6_route.h> 23 #if IS_ENABLED(CONFIG_IPV6_MIP6) 24 #include <net/mip6.h> 25 #endif 26 27 static struct xfrm_policy_afinfo xfrm6_policy_afinfo; 28 29 static struct dst_entry *xfrm6_dst_lookup(struct net *net, int tos, 30 const xfrm_address_t *saddr, 31 const xfrm_address_t *daddr) 32 { 33 struct flowi6 fl6; 34 struct dst_entry *dst; 35 int err; 36 37 memset(&fl6, 0, sizeof(fl6)); 38 memcpy(&fl6.daddr, daddr, sizeof(fl6.daddr)); 39 if (saddr) 40 memcpy(&fl6.saddr, saddr, sizeof(fl6.saddr)); 41 42 dst = ip6_route_output(net, NULL, &fl6); 43 44 err = dst->error; 45 if (dst->error) { 46 dst_release(dst); 47 dst = ERR_PTR(err); 48 } 49 50 return dst; 51 } 52 53 static int xfrm6_get_saddr(struct net *net, 54 xfrm_address_t *saddr, xfrm_address_t *daddr) 55 { 56 struct dst_entry *dst; 57 struct net_device *dev; 58 59 dst = xfrm6_dst_lookup(net, 0, NULL, daddr); 60 if (IS_ERR(dst)) 61 return -EHOSTUNREACH; 62 63 dev = ip6_dst_idev(dst)->dev; 64 ipv6_dev_get_saddr(dev_net(dev), dev, 65 (struct in6_addr *)&daddr->a6, 0, 66 (struct in6_addr *)&saddr->a6); 67 dst_release(dst); 68 return 0; 69 } 70 71 static int xfrm6_get_tos(const struct flowi *fl) 72 { 73 return 0; 74 } 75 76 static void xfrm6_init_dst(struct net *net, struct xfrm_dst *xdst) 77 { 78 struct rt6_info *rt = (struct rt6_info *)xdst; 79 80 rt6_init_peer(rt, net->ipv6.peers); 81 } 82 83 static int xfrm6_init_path(struct xfrm_dst *path, struct dst_entry *dst, 84 int nfheader_len) 85 { 86 if (dst->ops->family == AF_INET6) { 87 struct rt6_info *rt = (struct rt6_info*)dst; 88 if (rt->rt6i_node) 89 path->path_cookie = rt->rt6i_node->fn_sernum; 90 } 91 92 path->u.rt6.rt6i_nfheader_len = nfheader_len; 93 94 return 0; 95 } 96 97 static int xfrm6_fill_dst(struct xfrm_dst *xdst, struct net_device *dev, 98 const struct flowi *fl) 99 { 100 struct rt6_info *rt = (struct rt6_info*)xdst->route; 101 102 xdst->u.dst.dev = dev; 103 dev_hold(dev); 104 105 xdst->u.rt6.rt6i_idev = in6_dev_get(dev); 106 if (!xdst->u.rt6.rt6i_idev) { 107 dev_put(dev); 108 return -ENODEV; 109 } 110 111 rt6_transfer_peer(&xdst->u.rt6, rt); 112 113 /* Sheit... I remember I did this right. Apparently, 114 * it was magically lost, so this code needs audit */ 115 xdst->u.rt6.rt6i_flags = rt->rt6i_flags & (RTF_ANYCAST | 116 RTF_LOCAL); 117 xdst->u.rt6.rt6i_metric = rt->rt6i_metric; 118 xdst->u.rt6.rt6i_node = rt->rt6i_node; 119 if (rt->rt6i_node) 120 xdst->route_cookie = rt->rt6i_node->fn_sernum; 121 xdst->u.rt6.rt6i_gateway = rt->rt6i_gateway; 122 xdst->u.rt6.rt6i_dst = rt->rt6i_dst; 123 xdst->u.rt6.rt6i_src = rt->rt6i_src; 124 125 return 0; 126 } 127 128 static inline void 129 _decode_session6(struct sk_buff *skb, struct flowi *fl, int reverse) 130 { 131 struct flowi6 *fl6 = &fl->u.ip6; 132 int onlyproto = 0; 133 u16 offset = skb_network_header_len(skb); 134 const struct ipv6hdr *hdr = ipv6_hdr(skb); 135 struct ipv6_opt_hdr *exthdr; 136 const unsigned char *nh = skb_network_header(skb); 137 u8 nexthdr = nh[IP6CB(skb)->nhoff]; 138 139 memset(fl6, 0, sizeof(struct flowi6)); 140 fl6->flowi6_mark = skb->mark; 141 fl6->flowi6_oif = skb_dst(skb)->dev->ifindex; 142 143 fl6->daddr = reverse ? hdr->saddr : hdr->daddr; 144 fl6->saddr = reverse ? hdr->daddr : hdr->saddr; 145 146 while (nh + offset + 1 < skb->data || 147 pskb_may_pull(skb, nh + offset + 1 - skb->data)) { 148 nh = skb_network_header(skb); 149 exthdr = (struct ipv6_opt_hdr *)(nh + offset); 150 151 switch (nexthdr) { 152 case NEXTHDR_FRAGMENT: 153 onlyproto = 1; 154 case NEXTHDR_ROUTING: 155 case NEXTHDR_HOP: 156 case NEXTHDR_DEST: 157 offset += ipv6_optlen(exthdr); 158 nexthdr = exthdr->nexthdr; 159 exthdr = (struct ipv6_opt_hdr *)(nh + offset); 160 break; 161 162 case IPPROTO_UDP: 163 case IPPROTO_UDPLITE: 164 case IPPROTO_TCP: 165 case IPPROTO_SCTP: 166 case IPPROTO_DCCP: 167 if (!onlyproto && (nh + offset + 4 < skb->data || 168 pskb_may_pull(skb, nh + offset + 4 - skb->data))) { 169 __be16 *ports = (__be16 *)exthdr; 170 171 fl6->fl6_sport = ports[!!reverse]; 172 fl6->fl6_dport = ports[!reverse]; 173 } 174 fl6->flowi6_proto = nexthdr; 175 return; 176 177 case IPPROTO_ICMPV6: 178 if (!onlyproto && pskb_may_pull(skb, nh + offset + 2 - skb->data)) { 179 u8 *icmp = (u8 *)exthdr; 180 181 fl6->fl6_icmp_type = icmp[0]; 182 fl6->fl6_icmp_code = icmp[1]; 183 } 184 fl6->flowi6_proto = nexthdr; 185 return; 186 187 #if IS_ENABLED(CONFIG_IPV6_MIP6) 188 case IPPROTO_MH: 189 if (!onlyproto && pskb_may_pull(skb, nh + offset + 3 - skb->data)) { 190 struct ip6_mh *mh; 191 mh = (struct ip6_mh *)exthdr; 192 193 fl6->fl6_mh_type = mh->ip6mh_type; 194 } 195 fl6->flowi6_proto = nexthdr; 196 return; 197 #endif 198 199 /* XXX Why are there these headers? */ 200 case IPPROTO_AH: 201 case IPPROTO_ESP: 202 case IPPROTO_COMP: 203 default: 204 fl6->fl6_ipsec_spi = 0; 205 fl6->flowi6_proto = nexthdr; 206 return; 207 } 208 } 209 } 210 211 static inline int xfrm6_garbage_collect(struct dst_ops *ops) 212 { 213 struct net *net = container_of(ops, struct net, xfrm.xfrm6_dst_ops); 214 215 xfrm6_policy_afinfo.garbage_collect(net); 216 return dst_entries_get_fast(ops) > ops->gc_thresh * 2; 217 } 218 219 static void xfrm6_update_pmtu(struct dst_entry *dst, struct sock *sk, 220 struct sk_buff *skb, u32 mtu) 221 { 222 struct xfrm_dst *xdst = (struct xfrm_dst *)dst; 223 struct dst_entry *path = xdst->route; 224 225 path->ops->update_pmtu(path, sk, skb, mtu); 226 } 227 228 static void xfrm6_redirect(struct dst_entry *dst, struct sock *sk, 229 struct sk_buff *skb) 230 { 231 struct xfrm_dst *xdst = (struct xfrm_dst *)dst; 232 struct dst_entry *path = xdst->route; 233 234 path->ops->redirect(path, sk, skb); 235 } 236 237 static void xfrm6_dst_destroy(struct dst_entry *dst) 238 { 239 struct xfrm_dst *xdst = (struct xfrm_dst *)dst; 240 241 if (likely(xdst->u.rt6.rt6i_idev)) 242 in6_dev_put(xdst->u.rt6.rt6i_idev); 243 dst_destroy_metrics_generic(dst); 244 if (rt6_has_peer(&xdst->u.rt6)) { 245 struct inet_peer *peer = rt6_peer_ptr(&xdst->u.rt6); 246 inet_putpeer(peer); 247 } 248 xfrm_dst_destroy(xdst); 249 } 250 251 static void xfrm6_dst_ifdown(struct dst_entry *dst, struct net_device *dev, 252 int unregister) 253 { 254 struct xfrm_dst *xdst; 255 256 if (!unregister) 257 return; 258 259 xdst = (struct xfrm_dst *)dst; 260 if (xdst->u.rt6.rt6i_idev->dev == dev) { 261 struct inet6_dev *loopback_idev = 262 in6_dev_get(dev_net(dev)->loopback_dev); 263 BUG_ON(!loopback_idev); 264 265 do { 266 in6_dev_put(xdst->u.rt6.rt6i_idev); 267 xdst->u.rt6.rt6i_idev = loopback_idev; 268 in6_dev_hold(loopback_idev); 269 xdst = (struct xfrm_dst *)xdst->u.dst.child; 270 } while (xdst->u.dst.xfrm); 271 272 __in6_dev_put(loopback_idev); 273 } 274 275 xfrm_dst_ifdown(dst, dev); 276 } 277 278 static struct dst_ops xfrm6_dst_ops = { 279 .family = AF_INET6, 280 .protocol = cpu_to_be16(ETH_P_IPV6), 281 .gc = xfrm6_garbage_collect, 282 .update_pmtu = xfrm6_update_pmtu, 283 .redirect = xfrm6_redirect, 284 .cow_metrics = dst_cow_metrics_generic, 285 .destroy = xfrm6_dst_destroy, 286 .ifdown = xfrm6_dst_ifdown, 287 .local_out = __ip6_local_out, 288 .gc_thresh = 1024, 289 }; 290 291 static struct xfrm_policy_afinfo xfrm6_policy_afinfo = { 292 .family = AF_INET6, 293 .dst_ops = &xfrm6_dst_ops, 294 .dst_lookup = xfrm6_dst_lookup, 295 .get_saddr = xfrm6_get_saddr, 296 .decode_session = _decode_session6, 297 .get_tos = xfrm6_get_tos, 298 .init_dst = xfrm6_init_dst, 299 .init_path = xfrm6_init_path, 300 .fill_dst = xfrm6_fill_dst, 301 .blackhole_route = ip6_blackhole_route, 302 }; 303 304 static int __init xfrm6_policy_init(void) 305 { 306 return xfrm_policy_register_afinfo(&xfrm6_policy_afinfo); 307 } 308 309 static void xfrm6_policy_fini(void) 310 { 311 xfrm_policy_unregister_afinfo(&xfrm6_policy_afinfo); 312 } 313 314 #ifdef CONFIG_SYSCTL 315 static struct ctl_table xfrm6_policy_table[] = { 316 { 317 .procname = "xfrm6_gc_thresh", 318 .data = &init_net.xfrm.xfrm6_dst_ops.gc_thresh, 319 .maxlen = sizeof(int), 320 .mode = 0644, 321 .proc_handler = proc_dointvec, 322 }, 323 { } 324 }; 325 326 static int __net_init xfrm6_net_init(struct net *net) 327 { 328 struct ctl_table *table; 329 struct ctl_table_header *hdr; 330 331 table = xfrm6_policy_table; 332 if (!net_eq(net, &init_net)) { 333 table = kmemdup(table, sizeof(xfrm6_policy_table), GFP_KERNEL); 334 if (!table) 335 goto err_alloc; 336 337 table[0].data = &net->xfrm.xfrm6_dst_ops.gc_thresh; 338 } 339 340 hdr = register_net_sysctl(net, "net/ipv6", table); 341 if (!hdr) 342 goto err_reg; 343 344 net->ipv6.sysctl.xfrm6_hdr = hdr; 345 return 0; 346 347 err_reg: 348 if (!net_eq(net, &init_net)) 349 kfree(table); 350 err_alloc: 351 return -ENOMEM; 352 } 353 354 static void __net_exit xfrm6_net_exit(struct net *net) 355 { 356 struct ctl_table *table; 357 358 if (net->ipv6.sysctl.xfrm6_hdr == NULL) 359 return; 360 361 table = net->ipv6.sysctl.xfrm6_hdr->ctl_table_arg; 362 unregister_net_sysctl_table(net->ipv6.sysctl.xfrm6_hdr); 363 if (!net_eq(net, &init_net)) 364 kfree(table); 365 } 366 367 static struct pernet_operations xfrm6_net_ops = { 368 .init = xfrm6_net_init, 369 .exit = xfrm6_net_exit, 370 }; 371 #endif 372 373 int __init xfrm6_init(void) 374 { 375 int ret; 376 377 dst_entries_init(&xfrm6_dst_ops); 378 379 ret = xfrm6_policy_init(); 380 if (ret) { 381 dst_entries_destroy(&xfrm6_dst_ops); 382 goto out; 383 } 384 ret = xfrm6_state_init(); 385 if (ret) 386 goto out_policy; 387 388 #ifdef CONFIG_SYSCTL 389 register_pernet_subsys(&xfrm6_net_ops); 390 #endif 391 out: 392 return ret; 393 out_policy: 394 xfrm6_policy_fini(); 395 goto out; 396 } 397 398 void xfrm6_fini(void) 399 { 400 #ifdef CONFIG_SYSCTL 401 unregister_pernet_subsys(&xfrm6_net_ops); 402 #endif 403 xfrm6_policy_fini(); 404 xfrm6_state_fini(); 405 dst_entries_destroy(&xfrm6_dst_ops); 406 } 407