blob: d7494845efbf9af96e955243f41fea0dcbb6c614 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * xfrm6_policy.c: based on xfrm4_policy.c
3 *
4 * Authors:
5 * Mitsuru KANDA @USAGI
6 * Kazunori MIYAZAWA @USAGI
7 * Kunihiro Ishiguro <kunihiro@ipinfusion.com>
8 * IPv6 support
9 * YOSHIFUJI Hideaki
10 * Split up af-specific portion
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +090011 *
Linus Torvalds1da177e2005-04-16 15:20:36 -070012 */
13
Herbert Xu66cdb3c2007-11-13 21:37:28 -080014#include <linux/err.h>
15#include <linux/kernel.h>
Herbert Xuaabc9762005-05-03 16:27:10 -070016#include <linux/netdevice.h>
17#include <net/addrconf.h>
Herbert Xu45ff5a32007-11-13 21:35:32 -080018#include <net/dst.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070019#include <net/xfrm.h>
20#include <net/ip.h>
21#include <net/ipv6.h>
22#include <net/ip6_route.h>
Masahide NAKAMURA59fbb3a62007-06-26 23:56:32 -070023#if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
Masahide NAKAMURA2ce42722006-08-23 20:39:03 -070024#include <net/mip6.h>
25#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -070026
Linus Torvalds1da177e2005-04-16 15:20:36 -070027static struct xfrm_policy_afinfo xfrm6_policy_afinfo;
28
Alexey Dobriyanc5b3cf42008-11-25 17:51:25 -080029static struct dst_entry *xfrm6_dst_lookup(struct net *net, int tos,
David S. Miller5e6b9302011-02-24 00:14:45 -050030 const xfrm_address_t *saddr,
31 const xfrm_address_t *daddr)
Linus Torvalds1da177e2005-04-16 15:20:36 -070032{
David S. Miller7e1dc7b2011-03-12 02:42:11 -050033 struct flowi6 fl6;
Herbert Xu66cdb3c2007-11-13 21:37:28 -080034 struct dst_entry *dst;
35 int err;
36
David S. Miller7e1dc7b2011-03-12 02:42:11 -050037 memset(&fl6, 0, sizeof(fl6));
38 memcpy(&fl6.daddr, daddr, sizeof(fl6.daddr));
Herbert Xu66cdb3c2007-11-13 21:37:28 -080039 if (saddr)
David S. Miller7e1dc7b2011-03-12 02:42:11 -050040 memcpy(&fl6.saddr, saddr, sizeof(fl6.saddr));
Herbert Xu66cdb3c2007-11-13 21:37:28 -080041
David S. Miller4c9483b2011-03-12 16:22:43 -050042 dst = ip6_route_output(net, NULL, &fl6);
Herbert Xu66cdb3c2007-11-13 21:37:28 -080043
44 err = dst->error;
45 if (dst->error) {
Ville Nuorvala42513202006-10-16 22:10:05 -070046 dst_release(dst);
Herbert Xu66cdb3c2007-11-13 21:37:28 -080047 dst = ERR_PTR(err);
48 }
49
50 return dst;
Linus Torvalds1da177e2005-04-16 15:20:36 -070051}
52
Alexey Dobriyanfbda33b2008-11-25 17:56:49 -080053static int xfrm6_get_saddr(struct net *net,
54 xfrm_address_t *saddr, xfrm_address_t *daddr)
Patrick McHardya1e59ab2006-09-19 12:57:34 -070055{
Herbert Xu66cdb3c2007-11-13 21:37:28 -080056 struct dst_entry *dst;
Brian Haley191cd582008-08-14 15:33:21 -070057 struct net_device *dev;
Patrick McHardya1e59ab2006-09-19 12:57:34 -070058
Alexey Dobriyanfbda33b2008-11-25 17:56:49 -080059 dst = xfrm6_dst_lookup(net, 0, NULL, daddr);
Herbert Xu66cdb3c2007-11-13 21:37:28 -080060 if (IS_ERR(dst))
61 return -EHOSTUNREACH;
62
Brian Haley191cd582008-08-14 15:33:21 -070063 dev = ip6_dst_idev(dst)->dev;
64 ipv6_dev_get_saddr(dev_net(dev), dev,
YOSHIFUJI Hideaki7cbca672008-03-25 09:37:42 +090065 (struct in6_addr *)&daddr->a6, 0,
YOSHIFUJI Hideaki5e5f3f02008-03-03 21:44:34 +090066 (struct in6_addr *)&saddr->a6);
Herbert Xu66cdb3c2007-11-13 21:37:28 -080067 dst_release(dst);
68 return 0;
Patrick McHardya1e59ab2006-09-19 12:57:34 -070069}
70
David S. Miller05d84022011-02-22 17:47:10 -080071static int xfrm6_get_tos(const struct flowi *fl)
Linus Torvalds1da177e2005-04-16 15:20:36 -070072{
Linus Torvalds1da177e2005-04-16 15:20:36 -070073 return 0;
Herbert Xu25ee3282007-12-11 09:32:34 -080074}
Linus Torvalds1da177e2005-04-16 15:20:36 -070075
Masahide NAKAMURAa1b05142007-12-20 20:41:12 -080076static int xfrm6_init_path(struct xfrm_dst *path, struct dst_entry *dst,
77 int nfheader_len)
78{
79 if (dst->ops->family == AF_INET6) {
80 struct rt6_info *rt = (struct rt6_info*)dst;
81 if (rt->rt6i_node)
82 path->path_cookie = rt->rt6i_node->fn_sernum;
83 }
84
85 path->u.rt6.rt6i_nfheader_len = nfheader_len;
86
87 return 0;
88}
89
Herbert Xu87c1e122010-03-02 02:51:56 +000090static int xfrm6_fill_dst(struct xfrm_dst *xdst, struct net_device *dev,
David S. Miller0c7b3ee2011-02-22 17:48:57 -080091 const struct flowi *fl)
Herbert Xu25ee3282007-12-11 09:32:34 -080092{
93 struct rt6_info *rt = (struct rt6_info*)xdst->route;
94
95 xdst->u.dst.dev = dev;
96 dev_hold(dev);
97
Nicolas Dichtelbc8e4b92010-04-21 16:25:30 -070098 xdst->u.rt6.rt6i_idev = in6_dev_get(dev);
Herbert Xu25ee3282007-12-11 09:32:34 -080099 if (!xdst->u.rt6.rt6i_idev)
100 return -ENODEV;
101
David S. Miller97bab732012-06-09 22:36:36 -0700102 rt6_transfer_peer(&xdst->u.rt6, rt);
David S. Miller7cc2edb2011-01-26 13:41:03 -0800103
Herbert Xu25ee3282007-12-11 09:32:34 -0800104 /* Sheit... I remember I did this right. Apparently,
105 * it was magically lost, so this code needs audit */
106 xdst->u.rt6.rt6i_flags = rt->rt6i_flags & (RTF_ANYCAST |
107 RTF_LOCAL);
108 xdst->u.rt6.rt6i_metric = rt->rt6i_metric;
109 xdst->u.rt6.rt6i_node = rt->rt6i_node;
Masahide NAKAMURAa1b05142007-12-20 20:41:12 -0800110 if (rt->rt6i_node)
111 xdst->route_cookie = rt->rt6i_node->fn_sernum;
Herbert Xu25ee3282007-12-11 09:32:34 -0800112 xdst->u.rt6.rt6i_gateway = rt->rt6i_gateway;
113 xdst->u.rt6.rt6i_dst = rt->rt6i_dst;
114 xdst->u.rt6.rt6i_src = rt->rt6i_src;
115
116 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700117}
118
119static inline void
Herbert Xud5422ef2007-12-12 10:44:16 -0800120_decode_session6(struct sk_buff *skb, struct flowi *fl, int reverse)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700121{
David S. Miller7e1dc7b2011-03-12 02:42:11 -0500122 struct flowi6 *fl6 = &fl->u.ip6;
Nicolas Dichtel7e3a42a2008-11-01 21:12:07 -0700123 int onlyproto = 0;
Arnaldo Carvalho de Melocfe1fc72007-03-16 17:26:39 -0300124 u16 offset = skb_network_header_len(skb);
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000125 const struct ipv6hdr *hdr = ipv6_hdr(skb);
YOSHIFUJI Hideakie3cae902006-04-18 14:46:52 -0700126 struct ipv6_opt_hdr *exthdr;
Arnaldo Carvalho de Melod56f90a2007-04-10 20:50:43 -0700127 const unsigned char *nh = skb_network_header(skb);
128 u8 nexthdr = nh[IP6CB(skb)->nhoff];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700129
David S. Miller7e1dc7b2011-03-12 02:42:11 -0500130 memset(fl6, 0, sizeof(struct flowi6));
131 fl6->flowi6_mark = skb->mark;
Peter Kosyh44b451f2010-07-02 07:47:55 +0000132
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000133 fl6->daddr = reverse ? hdr->saddr : hdr->daddr;
134 fl6->saddr = reverse ? hdr->daddr : hdr->saddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700135
Wei Yongjun59cae002009-07-02 16:59:49 +0000136 while (nh + offset + 1 < skb->data ||
137 pskb_may_pull(skb, nh + offset + 1 - skb->data)) {
Arnaldo Carvalho de Melod56f90a2007-04-10 20:50:43 -0700138 nh = skb_network_header(skb);
139 exthdr = (struct ipv6_opt_hdr *)(nh + offset);
YOSHIFUJI Hideakie3cae902006-04-18 14:46:52 -0700140
Linus Torvalds1da177e2005-04-16 15:20:36 -0700141 switch (nexthdr) {
Nicolas Dichtel7e3a42a2008-11-01 21:12:07 -0700142 case NEXTHDR_FRAGMENT:
143 onlyproto = 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700144 case NEXTHDR_ROUTING:
145 case NEXTHDR_HOP:
146 case NEXTHDR_DEST:
147 offset += ipv6_optlen(exthdr);
148 nexthdr = exthdr->nexthdr;
Arnaldo Carvalho de Melod56f90a2007-04-10 20:50:43 -0700149 exthdr = (struct ipv6_opt_hdr *)(nh + offset);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700150 break;
151
152 case IPPROTO_UDP:
Gerrit Renkerba4e58e2006-11-27 11:10:57 -0800153 case IPPROTO_UDPLITE:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700154 case IPPROTO_TCP:
155 case IPPROTO_SCTP:
Patrick McHardy9e999992005-12-19 14:03:46 -0800156 case IPPROTO_DCCP:
Wei Yongjun59cae002009-07-02 16:59:49 +0000157 if (!onlyproto && (nh + offset + 4 < skb->data ||
158 pskb_may_pull(skb, nh + offset + 4 - skb->data))) {
Al Viro8c689a62006-11-08 00:20:21 -0800159 __be16 *ports = (__be16 *)exthdr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700160
David S. Miller1958b852011-03-12 16:36:19 -0500161 fl6->fl6_sport = ports[!!reverse];
162 fl6->fl6_dport = ports[!reverse];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700163 }
David S. Miller7e1dc7b2011-03-12 02:42:11 -0500164 fl6->flowi6_proto = nexthdr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700165 return;
166
167 case IPPROTO_ICMPV6:
Nicolas Dichtel7e3a42a2008-11-01 21:12:07 -0700168 if (!onlyproto && pskb_may_pull(skb, nh + offset + 2 - skb->data)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700169 u8 *icmp = (u8 *)exthdr;
170
David S. Miller1958b852011-03-12 16:36:19 -0500171 fl6->fl6_icmp_type = icmp[0];
172 fl6->fl6_icmp_code = icmp[1];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700173 }
David S. Miller7e1dc7b2011-03-12 02:42:11 -0500174 fl6->flowi6_proto = nexthdr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700175 return;
176
Masahide NAKAMURA59fbb3a62007-06-26 23:56:32 -0700177#if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
Masahide NAKAMURA2ce42722006-08-23 20:39:03 -0700178 case IPPROTO_MH:
Nicolas Dichtel7e3a42a2008-11-01 21:12:07 -0700179 if (!onlyproto && pskb_may_pull(skb, nh + offset + 3 - skb->data)) {
Masahide NAKAMURA2ce42722006-08-23 20:39:03 -0700180 struct ip6_mh *mh;
181 mh = (struct ip6_mh *)exthdr;
182
David S. Miller1958b852011-03-12 16:36:19 -0500183 fl6->fl6_mh_type = mh->ip6mh_type;
Masahide NAKAMURA2ce42722006-08-23 20:39:03 -0700184 }
David S. Miller7e1dc7b2011-03-12 02:42:11 -0500185 fl6->flowi6_proto = nexthdr;
Masahide NAKAMURA2ce42722006-08-23 20:39:03 -0700186 return;
187#endif
188
Linus Torvalds1da177e2005-04-16 15:20:36 -0700189 /* XXX Why are there these headers? */
190 case IPPROTO_AH:
191 case IPPROTO_ESP:
192 case IPPROTO_COMP:
193 default:
David S. Miller1958b852011-03-12 16:36:19 -0500194 fl6->fl6_ipsec_spi = 0;
David S. Miller7e1dc7b2011-03-12 02:42:11 -0500195 fl6->flowi6_proto = nexthdr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700196 return;
Stephen Hemminger3ff50b72007-04-20 17:09:22 -0700197 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700198 }
199}
200
Daniel Lezcano569d3642008-01-18 03:56:57 -0800201static inline int xfrm6_garbage_collect(struct dst_ops *ops)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700202{
Alexey Dobriyand7c75442010-01-24 22:47:53 -0800203 struct net *net = container_of(ops, struct net, xfrm.xfrm6_dst_ops);
204
205 xfrm6_policy_afinfo.garbage_collect(net);
Eric Dumazetfc66f952010-10-08 06:37:34 +0000206 return dst_entries_get_fast(ops) > ops->gc_thresh * 2;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700207}
208
209static void xfrm6_update_pmtu(struct dst_entry *dst, u32 mtu)
210{
211 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
212 struct dst_entry *path = xdst->route;
213
214 path->ops->update_pmtu(path, mtu);
215}
216
Herbert Xuaabc9762005-05-03 16:27:10 -0700217static void xfrm6_dst_destroy(struct dst_entry *dst)
218{
219 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
220
221 if (likely(xdst->u.rt6.rt6i_idev))
222 in6_dev_put(xdst->u.rt6.rt6i_idev);
David S. Miller62fa8a82011-01-26 20:51:05 -0800223 dst_destroy_metrics_generic(dst);
David S. Miller97bab732012-06-09 22:36:36 -0700224 if (rt6_has_peer(&xdst->u.rt6)) {
225 struct inet_peer *peer = rt6_peer_ptr(&xdst->u.rt6);
226 inet_putpeer(peer);
227 }
Herbert Xuaabc9762005-05-03 16:27:10 -0700228 xfrm_dst_destroy(xdst);
229}
230
231static void xfrm6_dst_ifdown(struct dst_entry *dst, struct net_device *dev,
232 int unregister)
233{
234 struct xfrm_dst *xdst;
235
236 if (!unregister)
237 return;
238
239 xdst = (struct xfrm_dst *)dst;
240 if (xdst->u.rt6.rt6i_idev->dev == dev) {
Denis V. Lunev5a3e55d2007-12-07 00:38:10 -0800241 struct inet6_dev *loopback_idev =
YOSHIFUJI Hideakic346dca2008-03-25 21:47:49 +0900242 in6_dev_get(dev_net(dev)->loopback_dev);
Herbert Xuaabc9762005-05-03 16:27:10 -0700243 BUG_ON(!loopback_idev);
244
245 do {
246 in6_dev_put(xdst->u.rt6.rt6i_idev);
247 xdst->u.rt6.rt6i_idev = loopback_idev;
248 in6_dev_hold(loopback_idev);
249 xdst = (struct xfrm_dst *)xdst->u.dst.child;
250 } while (xdst->u.dst.xfrm);
251
252 __in6_dev_put(loopback_idev);
253 }
254
255 xfrm_dst_ifdown(dst, dev);
256}
257
Linus Torvalds1da177e2005-04-16 15:20:36 -0700258static struct dst_ops xfrm6_dst_ops = {
259 .family = AF_INET6,
Harvey Harrison09640e62009-02-01 00:45:17 -0800260 .protocol = cpu_to_be16(ETH_P_IPV6),
Linus Torvalds1da177e2005-04-16 15:20:36 -0700261 .gc = xfrm6_garbage_collect,
262 .update_pmtu = xfrm6_update_pmtu,
David S. Miller62fa8a82011-01-26 20:51:05 -0800263 .cow_metrics = dst_cow_metrics_generic,
Herbert Xuaabc9762005-05-03 16:27:10 -0700264 .destroy = xfrm6_dst_destroy,
265 .ifdown = xfrm6_dst_ifdown,
Herbert Xu862b82c2007-11-13 21:43:11 -0800266 .local_out = __ip6_local_out,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700267 .gc_thresh = 1024,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700268};
269
270static struct xfrm_policy_afinfo xfrm6_policy_afinfo = {
271 .family = AF_INET6,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700272 .dst_ops = &xfrm6_dst_ops,
273 .dst_lookup = xfrm6_dst_lookup,
Patrick McHardya1e59ab2006-09-19 12:57:34 -0700274 .get_saddr = xfrm6_get_saddr,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700275 .decode_session = _decode_session6,
Herbert Xu25ee3282007-12-11 09:32:34 -0800276 .get_tos = xfrm6_get_tos,
Masahide NAKAMURAa1b05142007-12-20 20:41:12 -0800277 .init_path = xfrm6_init_path,
Herbert Xu25ee3282007-12-11 09:32:34 -0800278 .fill_dst = xfrm6_fill_dst,
David S. Miller2774c132011-03-01 14:59:04 -0800279 .blackhole_route = ip6_blackhole_route,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700280};
281
Daniel Lezcano0013cab2007-12-07 00:42:11 -0800282static int __init xfrm6_policy_init(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700283{
Daniel Lezcano0013cab2007-12-07 00:42:11 -0800284 return xfrm_policy_register_afinfo(&xfrm6_policy_afinfo);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700285}
286
287static void xfrm6_policy_fini(void)
288{
289 xfrm_policy_unregister_afinfo(&xfrm6_policy_afinfo);
290}
291
David S. Millerdb717892009-08-04 20:32:16 -0700292#ifdef CONFIG_SYSCTL
Neil Hormana44a4a02009-07-27 08:22:46 +0000293static struct ctl_table xfrm6_policy_table[] = {
294 {
Neil Hormana44a4a02009-07-27 08:22:46 +0000295 .procname = "xfrm6_gc_thresh",
Alexey Dobriyand7c75442010-01-24 22:47:53 -0800296 .data = &init_net.xfrm.xfrm6_dst_ops.gc_thresh,
Neil Hormana44a4a02009-07-27 08:22:46 +0000297 .maxlen = sizeof(int),
298 .mode = 0644,
299 .proc_handler = proc_dointvec,
300 },
301 { }
302};
303
304static struct ctl_table_header *sysctl_hdr;
David S. Millerdb717892009-08-04 20:32:16 -0700305#endif
Neil Hormana44a4a02009-07-27 08:22:46 +0000306
Daniel Lezcano0013cab2007-12-07 00:42:11 -0800307int __init xfrm6_init(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700308{
Daniel Lezcano0013cab2007-12-07 00:42:11 -0800309 int ret;
Neil Hormana33bc5c2009-07-30 18:52:15 -0700310 unsigned int gc_thresh;
Daniel Lezcano0013cab2007-12-07 00:42:11 -0800311
Neil Hormana33bc5c2009-07-30 18:52:15 -0700312 /*
313 * We need a good default value for the xfrm6 gc threshold.
314 * In ipv4 we set it to the route hash table size * 8, which
315 * is half the size of the maximaum route cache for ipv4. It
316 * would be good to do the same thing for v6, except the table is
317 * constructed differently here. Here each table for a net namespace
318 * can have FIB_TABLE_HASHSZ entries, so lets go with the same
319 * computation that we used for ipv4 here. Also, lets keep the initial
320 * gc_thresh to a minimum of 1024, since, the ipv6 route cache defaults
321 * to that as a minimum as well
322 */
323 gc_thresh = FIB6_TABLE_HASHSZ * 8;
324 xfrm6_dst_ops.gc_thresh = (gc_thresh < 1024) ? 1024 : gc_thresh;
Eric Dumazetfc66f952010-10-08 06:37:34 +0000325 dst_entries_init(&xfrm6_dst_ops);
Alexey Dobriyand7c75442010-01-24 22:47:53 -0800326
327 ret = xfrm6_policy_init();
Eric Dumazetfc66f952010-10-08 06:37:34 +0000328 if (ret) {
329 dst_entries_destroy(&xfrm6_dst_ops);
Alexey Dobriyand7c75442010-01-24 22:47:53 -0800330 goto out;
Eric Dumazetfc66f952010-10-08 06:37:34 +0000331 }
Alexey Dobriyand7c75442010-01-24 22:47:53 -0800332 ret = xfrm6_state_init();
333 if (ret)
334 goto out_policy;
335
David S. Millerdb717892009-08-04 20:32:16 -0700336#ifdef CONFIG_SYSCTL
Eric W. Biedermanec8f23c2012-04-19 13:44:49 +0000337 sysctl_hdr = register_net_sysctl(&init_net, "net/ipv6",
338 xfrm6_policy_table);
David S. Millerdb717892009-08-04 20:32:16 -0700339#endif
Daniel Lezcano0013cab2007-12-07 00:42:11 -0800340out:
341 return ret;
342out_policy:
343 xfrm6_policy_fini();
344 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700345}
346
347void xfrm6_fini(void)
348{
David S. Millerdb717892009-08-04 20:32:16 -0700349#ifdef CONFIG_SYSCTL
Neil Hormana44a4a02009-07-27 08:22:46 +0000350 if (sysctl_hdr)
351 unregister_net_sysctl_table(sysctl_hdr);
David S. Millerdb717892009-08-04 20:32:16 -0700352#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700353 //xfrm6_input_fini();
354 xfrm6_policy_fini();
355 xfrm6_state_fini();
Eric Dumazetfc66f952010-10-08 06:37:34 +0000356 dst_entries_destroy(&xfrm6_dst_ops);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700357}