Thomas Gleixner | a10e763 | 2019-05-31 01:09:32 -0700 | [diff] [blame] | 1 | // SPDX-License-Identifier: GPL-2.0-only |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 2 | /* |
| 3 | * net/ipv6/fib6_rules.c IPv6 Routing Policy Rules |
| 4 | * |
| 5 | * Copyright (C)2003-2006 Helsinki University of Technology |
| 6 | * Copyright (C)2003-2006 USAGI/WIDE Project |
| 7 | * |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 8 | * Authors |
| 9 | * Thomas Graf <tgraf@suug.ch> |
| 10 | * Ville Nuorvala <vnuorval@tcs.hut.fi> |
| 11 | */ |
| 12 | |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 13 | #include <linux/netdevice.h> |
Ido Schimmel | dcb18f7 | 2017-08-03 13:28:18 +0200 | [diff] [blame] | 14 | #include <linux/notifier.h> |
Paul Gortmaker | bc3b2d7 | 2011-07-15 11:47:34 -0400 | [diff] [blame] | 15 | #include <linux/export.h> |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 16 | |
| 17 | #include <net/fib_rules.h> |
| 18 | #include <net/ipv6.h> |
YOSHIFUJI Hideaki | 29f6af7 | 2007-04-06 11:45:39 -0700 | [diff] [blame] | 19 | #include <net/addrconf.h> |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 20 | #include <net/ip6_route.h> |
| 21 | #include <net/netlink.h> |
| 22 | |
Eldad Zack | 911c854 | 2012-04-01 07:49:06 +0000 | [diff] [blame] | 23 | struct fib6_rule { |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 24 | struct fib_rule common; |
| 25 | struct rt6key src; |
| 26 | struct rt6key dst; |
| 27 | u8 tclass; |
| 28 | }; |
| 29 | |
Ido Schimmel | e3ea973 | 2017-08-03 13:28:15 +0200 | [diff] [blame] | 30 | static bool fib6_rule_matchall(const struct fib_rule *rule) |
| 31 | { |
| 32 | struct fib6_rule *r = container_of(rule, struct fib6_rule, common); |
| 33 | |
| 34 | if (r->dst.plen || r->src.plen || r->tclass) |
| 35 | return false; |
| 36 | return fib_rule_matchall(rule); |
| 37 | } |
| 38 | |
| 39 | bool fib6_rule_default(const struct fib_rule *rule) |
| 40 | { |
| 41 | if (!fib6_rule_matchall(rule) || rule->action != FR_ACT_TO_TBL || |
| 42 | rule->l3mdev) |
| 43 | return false; |
| 44 | if (rule->table != RT6_TABLE_LOCAL && rule->table != RT6_TABLE_MAIN) |
| 45 | return false; |
| 46 | return true; |
| 47 | } |
| 48 | EXPORT_SYMBOL_GPL(fib6_rule_default); |
| 49 | |
Ido Schimmel | dcb18f7 | 2017-08-03 13:28:18 +0200 | [diff] [blame] | 50 | int fib6_rules_dump(struct net *net, struct notifier_block *nb) |
| 51 | { |
| 52 | return fib_rules_dump(net, nb, AF_INET6); |
| 53 | } |
| 54 | |
| 55 | unsigned int fib6_rules_seq_read(struct net *net) |
| 56 | { |
| 57 | return fib_rules_seq_read(net, AF_INET6); |
| 58 | } |
| 59 | |
David Ahern | 138118e | 2018-05-09 20:34:23 -0700 | [diff] [blame] | 60 | /* called with rcu lock held; no reference taken on fib6_info */ |
David Ahern | effda4d | 2019-04-16 14:36:10 -0700 | [diff] [blame] | 61 | int fib6_lookup(struct net *net, int oif, struct flowi6 *fl6, |
| 62 | struct fib6_result *res, int flags) |
David Ahern | 138118e | 2018-05-09 20:34:23 -0700 | [diff] [blame] | 63 | { |
David Ahern | 138118e | 2018-05-09 20:34:23 -0700 | [diff] [blame] | 64 | int err; |
| 65 | |
| 66 | if (net->ipv6.fib6_has_custom_rules) { |
| 67 | struct fib_lookup_arg arg = { |
| 68 | .lookup_ptr = fib6_table_lookup, |
| 69 | .lookup_data = &oif, |
David Ahern | effda4d | 2019-04-16 14:36:10 -0700 | [diff] [blame] | 70 | .result = res, |
David Ahern | 138118e | 2018-05-09 20:34:23 -0700 | [diff] [blame] | 71 | .flags = FIB_LOOKUP_NOREF, |
| 72 | }; |
| 73 | |
| 74 | l3mdev_update_flow(net, flowi6_to_flowi(fl6)); |
| 75 | |
| 76 | err = fib_rules_lookup(net->ipv6.fib6_rules_ops, |
| 77 | flowi6_to_flowi(fl6), flags, &arg); |
David Ahern | 138118e | 2018-05-09 20:34:23 -0700 | [diff] [blame] | 78 | } else { |
David Ahern | effda4d | 2019-04-16 14:36:10 -0700 | [diff] [blame] | 79 | err = fib6_table_lookup(net, net->ipv6.fib6_local_tbl, oif, |
| 80 | fl6, res, flags); |
| 81 | if (err || res->f6i == net->ipv6.fib6_null_entry) |
| 82 | err = fib6_table_lookup(net, net->ipv6.fib6_main_tbl, |
| 83 | oif, fl6, res, flags); |
David Ahern | 138118e | 2018-05-09 20:34:23 -0700 | [diff] [blame] | 84 | } |
| 85 | |
David Ahern | effda4d | 2019-04-16 14:36:10 -0700 | [diff] [blame] | 86 | return err; |
David Ahern | 138118e | 2018-05-09 20:34:23 -0700 | [diff] [blame] | 87 | } |
| 88 | |
David S. Miller | 4c9483b | 2011-03-12 16:22:43 -0500 | [diff] [blame] | 89 | struct dst_entry *fib6_rule_lookup(struct net *net, struct flowi6 *fl6, |
David Ahern | b75cc8f | 2018-03-02 08:32:17 -0800 | [diff] [blame] | 90 | const struct sk_buff *skb, |
Daniel Lezcano | 58f09b7 | 2008-03-03 23:25:27 -0800 | [diff] [blame] | 91 | int flags, pol_lookup_t lookup) |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 92 | { |
Vincent Bernat | feca7d8 | 2017-08-08 20:23:49 +0200 | [diff] [blame] | 93 | if (net->ipv6.fib6_has_custom_rules) { |
David Ahern | a65120b | 2019-04-23 18:05:33 -0700 | [diff] [blame] | 94 | struct fib6_result res = {}; |
Vincent Bernat | feca7d8 | 2017-08-08 20:23:49 +0200 | [diff] [blame] | 95 | struct fib_lookup_arg arg = { |
| 96 | .lookup_ptr = lookup, |
David Ahern | b75cc8f | 2018-03-02 08:32:17 -0800 | [diff] [blame] | 97 | .lookup_data = skb, |
David Ahern | a65120b | 2019-04-23 18:05:33 -0700 | [diff] [blame] | 98 | .result = &res, |
Vincent Bernat | feca7d8 | 2017-08-08 20:23:49 +0200 | [diff] [blame] | 99 | .flags = FIB_LOOKUP_NOREF, |
| 100 | }; |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 101 | |
Vincent Bernat | feca7d8 | 2017-08-08 20:23:49 +0200 | [diff] [blame] | 102 | /* update flow if oif or iif point to device enslaved to l3mdev */ |
| 103 | l3mdev_update_flow(net, flowi6_to_flowi(fl6)); |
David Ahern | 9ee0034 | 2016-09-10 12:09:52 -0700 | [diff] [blame] | 104 | |
Vincent Bernat | feca7d8 | 2017-08-08 20:23:49 +0200 | [diff] [blame] | 105 | fib_rules_lookup(net->ipv6.fib6_rules_ops, |
| 106 | flowi6_to_flowi(fl6), flags, &arg); |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 107 | |
David Ahern | a65120b | 2019-04-23 18:05:33 -0700 | [diff] [blame] | 108 | if (res.rt6) |
| 109 | return &res.rt6->dst; |
Vincent Bernat | feca7d8 | 2017-08-08 20:23:49 +0200 | [diff] [blame] | 110 | } else { |
| 111 | struct rt6_info *rt; |
| 112 | |
David Ahern | b75cc8f | 2018-03-02 08:32:17 -0800 | [diff] [blame] | 113 | rt = lookup(net, net->ipv6.fib6_local_tbl, fl6, skb, flags); |
Vincent Bernat | feca7d8 | 2017-08-08 20:23:49 +0200 | [diff] [blame] | 114 | if (rt != net->ipv6.ip6_null_entry && rt->dst.error != -EAGAIN) |
| 115 | return &rt->dst; |
Wei Wang | d64a1f5 | 2019-06-20 17:36:39 -0700 | [diff] [blame] | 116 | ip6_rt_put_flags(rt, flags); |
David Ahern | b75cc8f | 2018-03-02 08:32:17 -0800 | [diff] [blame] | 117 | rt = lookup(net, net->ipv6.fib6_main_tbl, fl6, skb, flags); |
Vincent Bernat | feca7d8 | 2017-08-08 20:23:49 +0200 | [diff] [blame] | 118 | if (rt->dst.error != -EAGAIN) |
| 119 | return &rt->dst; |
Wei Wang | d64a1f5 | 2019-06-20 17:36:39 -0700 | [diff] [blame] | 120 | ip6_rt_put_flags(rt, flags); |
Vincent Bernat | feca7d8 | 2017-08-08 20:23:49 +0200 | [diff] [blame] | 121 | } |
Ville Nuorvala | b142955 | 2006-08-08 16:44:17 -0700 | [diff] [blame] | 122 | |
Wei Wang | d64a1f5 | 2019-06-20 17:36:39 -0700 | [diff] [blame] | 123 | if (!(flags & RT6_LOOKUP_F_DST_NOREF)) |
| 124 | dst_hold(&net->ipv6.ip6_null_entry->dst); |
Serhey Popovych | 07f6155 | 2017-06-20 13:29:25 +0300 | [diff] [blame] | 125 | return &net->ipv6.ip6_null_entry->dst; |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 126 | } |
| 127 | |
David Ahern | cc065a9 | 2018-05-09 20:34:22 -0700 | [diff] [blame] | 128 | static int fib6_rule_saddr(struct net *net, struct fib_rule *rule, int flags, |
| 129 | struct flowi6 *flp6, const struct net_device *dev) |
| 130 | { |
| 131 | struct fib6_rule *r = (struct fib6_rule *)rule; |
| 132 | |
| 133 | /* If we need to find a source address for this traffic, |
| 134 | * we check the result if it meets requirement of the rule. |
| 135 | */ |
| 136 | if ((rule->flags & FIB_RULE_FIND_SADDR) && |
| 137 | r->src.plen && !(flags & RT6_LOOKUP_F_HAS_SADDR)) { |
| 138 | struct in6_addr saddr; |
| 139 | |
| 140 | if (ipv6_dev_get_saddr(net, dev, &flp6->daddr, |
| 141 | rt6_flags2srcprefs(flags), &saddr)) |
| 142 | return -EAGAIN; |
| 143 | |
| 144 | if (!ipv6_prefix_equal(&saddr, &r->src.addr, r->src.plen)) |
| 145 | return -EAGAIN; |
| 146 | |
| 147 | flp6->saddr = saddr; |
| 148 | } |
| 149 | |
| 150 | return 0; |
| 151 | } |
| 152 | |
David Ahern | 138118e | 2018-05-09 20:34:23 -0700 | [diff] [blame] | 153 | static int fib6_rule_action_alt(struct fib_rule *rule, struct flowi *flp, |
| 154 | int flags, struct fib_lookup_arg *arg) |
| 155 | { |
David Ahern | effda4d | 2019-04-16 14:36:10 -0700 | [diff] [blame] | 156 | struct fib6_result *res = arg->result; |
David Ahern | 138118e | 2018-05-09 20:34:23 -0700 | [diff] [blame] | 157 | struct flowi6 *flp6 = &flp->u.ip6; |
| 158 | struct net *net = rule->fr_net; |
| 159 | struct fib6_table *table; |
David Ahern | b2f97f7 | 2019-04-23 18:06:30 -0700 | [diff] [blame] | 160 | int err, *oif; |
David Ahern | 138118e | 2018-05-09 20:34:23 -0700 | [diff] [blame] | 161 | u32 tb_id; |
| 162 | |
| 163 | switch (rule->action) { |
| 164 | case FR_ACT_TO_TBL: |
| 165 | break; |
| 166 | case FR_ACT_UNREACHABLE: |
| 167 | return -ENETUNREACH; |
| 168 | case FR_ACT_PROHIBIT: |
| 169 | return -EACCES; |
| 170 | case FR_ACT_BLACKHOLE: |
| 171 | default: |
| 172 | return -EINVAL; |
| 173 | } |
| 174 | |
| 175 | tb_id = fib_rule_get_table(rule, arg); |
| 176 | table = fib6_get_table(net, tb_id); |
| 177 | if (!table) |
| 178 | return -EAGAIN; |
| 179 | |
| 180 | oif = (int *)arg->lookup_data; |
David Ahern | effda4d | 2019-04-16 14:36:10 -0700 | [diff] [blame] | 181 | err = fib6_table_lookup(net, table, *oif, flp6, res, flags); |
| 182 | if (!err && res->f6i != net->ipv6.fib6_null_entry) |
David Ahern | 138118e | 2018-05-09 20:34:23 -0700 | [diff] [blame] | 183 | err = fib6_rule_saddr(net, rule, flags, flp6, |
David Ahern | effda4d | 2019-04-16 14:36:10 -0700 | [diff] [blame] | 184 | res->nh->fib_nh_dev); |
David Ahern | b2f97f7 | 2019-04-23 18:06:30 -0700 | [diff] [blame] | 185 | else |
| 186 | err = -EAGAIN; |
David Ahern | 138118e | 2018-05-09 20:34:23 -0700 | [diff] [blame] | 187 | |
| 188 | return err; |
| 189 | } |
| 190 | |
| 191 | static int __fib6_rule_action(struct fib_rule *rule, struct flowi *flp, |
| 192 | int flags, struct fib_lookup_arg *arg) |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 193 | { |
David Ahern | a65120b | 2019-04-23 18:05:33 -0700 | [diff] [blame] | 194 | struct fib6_result *res = arg->result; |
David S. Miller | 4c9483b | 2011-03-12 16:22:43 -0500 | [diff] [blame] | 195 | struct flowi6 *flp6 = &flp->u.ip6; |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 196 | struct rt6_info *rt = NULL; |
| 197 | struct fib6_table *table; |
Daniel Lezcano | 8ed6778 | 2008-03-04 13:48:30 -0800 | [diff] [blame] | 198 | struct net *net = rule->fr_net; |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 199 | pol_lookup_t lookup = arg->lookup_ptr; |
Hannes Frederic Sowa | 46b3a42 | 2013-08-01 08:54:47 +0200 | [diff] [blame] | 200 | int err = 0; |
David Ahern | 96c63fa | 2016-06-08 10:55:39 -0700 | [diff] [blame] | 201 | u32 tb_id; |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 202 | |
| 203 | switch (rule->action) { |
| 204 | case FR_ACT_TO_TBL: |
| 205 | break; |
| 206 | case FR_ACT_UNREACHABLE: |
Hannes Frederic Sowa | 46b3a42 | 2013-08-01 08:54:47 +0200 | [diff] [blame] | 207 | err = -ENETUNREACH; |
Daniel Lezcano | 8ed6778 | 2008-03-04 13:48:30 -0800 | [diff] [blame] | 208 | rt = net->ipv6.ip6_null_entry; |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 209 | goto discard_pkt; |
| 210 | default: |
| 211 | case FR_ACT_BLACKHOLE: |
Hannes Frederic Sowa | 46b3a42 | 2013-08-01 08:54:47 +0200 | [diff] [blame] | 212 | err = -EINVAL; |
Daniel Lezcano | 8ed6778 | 2008-03-04 13:48:30 -0800 | [diff] [blame] | 213 | rt = net->ipv6.ip6_blk_hole_entry; |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 214 | goto discard_pkt; |
| 215 | case FR_ACT_PROHIBIT: |
Hannes Frederic Sowa | 46b3a42 | 2013-08-01 08:54:47 +0200 | [diff] [blame] | 216 | err = -EACCES; |
Daniel Lezcano | 8ed6778 | 2008-03-04 13:48:30 -0800 | [diff] [blame] | 217 | rt = net->ipv6.ip6_prohibit_entry; |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 218 | goto discard_pkt; |
| 219 | } |
| 220 | |
David Ahern | 96c63fa | 2016-06-08 10:55:39 -0700 | [diff] [blame] | 221 | tb_id = fib_rule_get_table(rule, arg); |
| 222 | table = fib6_get_table(net, tb_id); |
Hannes Frederic Sowa | 46b3a42 | 2013-08-01 08:54:47 +0200 | [diff] [blame] | 223 | if (!table) { |
| 224 | err = -EAGAIN; |
| 225 | goto out; |
| 226 | } |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 227 | |
David Ahern | b75cc8f | 2018-03-02 08:32:17 -0800 | [diff] [blame] | 228 | rt = lookup(net, table, flp6, arg->lookup_data, flags); |
Daniel Lezcano | 8ed6778 | 2008-03-04 13:48:30 -0800 | [diff] [blame] | 229 | if (rt != net->ipv6.ip6_null_entry) { |
David Ahern | cc065a9 | 2018-05-09 20:34:22 -0700 | [diff] [blame] | 230 | err = fib6_rule_saddr(net, rule, flags, flp6, |
| 231 | ip6_dst_idev(&rt->dst)->dev); |
YOSHIFUJI Hideaki | 29f6af7 | 2007-04-06 11:45:39 -0700 | [diff] [blame] | 232 | |
David Ahern | cc065a9 | 2018-05-09 20:34:22 -0700 | [diff] [blame] | 233 | if (err == -EAGAIN) |
| 234 | goto again; |
YOSHIFUJI Hideaki | 7cbca67 | 2008-03-25 09:37:42 +0900 | [diff] [blame] | 235 | |
Steven Barth | 73ba57b | 2015-03-19 16:16:04 +0100 | [diff] [blame] | 236 | err = rt->dst.error; |
Serhey Popovych | 07f6155 | 2017-06-20 13:29:25 +0300 | [diff] [blame] | 237 | if (err != -EAGAIN) |
| 238 | goto out; |
YOSHIFUJI Hideaki | 29f6af7 | 2007-04-06 11:45:39 -0700 | [diff] [blame] | 239 | } |
| 240 | again: |
Wei Wang | d64a1f5 | 2019-06-20 17:36:39 -0700 | [diff] [blame] | 241 | ip6_rt_put_flags(rt, flags); |
Hannes Frederic Sowa | 46b3a42 | 2013-08-01 08:54:47 +0200 | [diff] [blame] | 242 | err = -EAGAIN; |
Patrick McHardy | 3226f688 | 2006-08-06 22:24:08 -0700 | [diff] [blame] | 243 | rt = NULL; |
| 244 | goto out; |
| 245 | |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 246 | discard_pkt: |
Wei Wang | d64a1f5 | 2019-06-20 17:36:39 -0700 | [diff] [blame] | 247 | if (!(flags & RT6_LOOKUP_F_DST_NOREF)) |
| 248 | dst_hold(&rt->dst); |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 249 | out: |
David Ahern | a65120b | 2019-04-23 18:05:33 -0700 | [diff] [blame] | 250 | res->rt6 = rt; |
Hannes Frederic Sowa | 46b3a42 | 2013-08-01 08:54:47 +0200 | [diff] [blame] | 251 | return err; |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 252 | } |
| 253 | |
David Ahern | 138118e | 2018-05-09 20:34:23 -0700 | [diff] [blame] | 254 | static int fib6_rule_action(struct fib_rule *rule, struct flowi *flp, |
| 255 | int flags, struct fib_lookup_arg *arg) |
| 256 | { |
| 257 | if (arg->lookup_ptr == fib6_table_lookup) |
| 258 | return fib6_rule_action_alt(rule, flp, flags, arg); |
| 259 | |
| 260 | return __fib6_rule_action(rule, flp, flags, arg); |
| 261 | } |
| 262 | |
Stefan Tomanek | 7764a45 | 2013-08-01 02:17:15 +0200 | [diff] [blame] | 263 | static bool fib6_rule_suppress(struct fib_rule *rule, struct fib_lookup_arg *arg) |
| 264 | { |
David Ahern | a65120b | 2019-04-23 18:05:33 -0700 | [diff] [blame] | 265 | struct fib6_result *res = arg->result; |
| 266 | struct rt6_info *rt = res->rt6; |
Stefan Tomanek | 673498b | 2013-12-10 23:21:25 +0100 | [diff] [blame] | 267 | struct net_device *dev = NULL; |
| 268 | |
David Ahern | a65120b | 2019-04-23 18:05:33 -0700 | [diff] [blame] | 269 | if (!rt) |
| 270 | return false; |
| 271 | |
Stefan Tomanek | 673498b | 2013-12-10 23:21:25 +0100 | [diff] [blame] | 272 | if (rt->rt6i_idev) |
| 273 | dev = rt->rt6i_idev->dev; |
| 274 | |
Stefan Tomanek | 7764a45 | 2013-08-01 02:17:15 +0200 | [diff] [blame] | 275 | /* do not accept result if the route does |
| 276 | * not meet the required prefix length |
| 277 | */ |
Stefan Tomanek | 73f5698 | 2013-08-03 14:14:43 +0200 | [diff] [blame] | 278 | if (rt->rt6i_dst.plen <= rule->suppress_prefixlen) |
Stefan Tomanek | 6ef94cf | 2013-08-02 17:19:56 +0200 | [diff] [blame] | 279 | goto suppress_route; |
| 280 | |
| 281 | /* do not accept result if the route uses a device |
| 282 | * belonging to a forbidden interface group |
| 283 | */ |
| 284 | if (rule->suppress_ifgroup != -1 && dev && dev->group == rule->suppress_ifgroup) |
| 285 | goto suppress_route; |
| 286 | |
| 287 | return false; |
| 288 | |
| 289 | suppress_route: |
Jason A. Donenfeld | ca7a03c | 2019-09-24 16:01:28 +0200 | [diff] [blame^] | 290 | if (!(arg->flags & FIB_LOOKUP_NOREF)) |
| 291 | ip6_rt_put(rt); |
Stefan Tomanek | 04f0888 | 2013-09-08 17:09:43 +0200 | [diff] [blame] | 292 | return true; |
Stefan Tomanek | 7764a45 | 2013-08-01 02:17:15 +0200 | [diff] [blame] | 293 | } |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 294 | |
| 295 | static int fib6_rule_match(struct fib_rule *rule, struct flowi *fl, int flags) |
| 296 | { |
| 297 | struct fib6_rule *r = (struct fib6_rule *) rule; |
David S. Miller | 4c9483b | 2011-03-12 16:22:43 -0500 | [diff] [blame] | 298 | struct flowi6 *fl6 = &fl->u.ip6; |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 299 | |
Thomas Graf | adaa70b | 2006-10-13 15:01:03 -0700 | [diff] [blame] | 300 | if (r->dst.plen && |
David S. Miller | 4c9483b | 2011-03-12 16:22:43 -0500 | [diff] [blame] | 301 | !ipv6_prefix_equal(&fl6->daddr, &r->dst.addr, r->dst.plen)) |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 302 | return 0; |
| 303 | |
YOSHIFUJI Hideaki | 29f6af7 | 2007-04-06 11:45:39 -0700 | [diff] [blame] | 304 | /* |
| 305 | * If FIB_RULE_FIND_SADDR is set and we do not have a |
| 306 | * source address for the traffic, we defer check for |
| 307 | * source address. |
| 308 | */ |
Thomas Graf | adaa70b | 2006-10-13 15:01:03 -0700 | [diff] [blame] | 309 | if (r->src.plen) { |
YOSHIFUJI Hideaki | 29f6af7 | 2007-04-06 11:45:39 -0700 | [diff] [blame] | 310 | if (flags & RT6_LOOKUP_F_HAS_SADDR) { |
David S. Miller | 4c9483b | 2011-03-12 16:22:43 -0500 | [diff] [blame] | 311 | if (!ipv6_prefix_equal(&fl6->saddr, &r->src.addr, |
YOSHIFUJI Hideaki | 29f6af7 | 2007-04-06 11:45:39 -0700 | [diff] [blame] | 312 | r->src.plen)) |
| 313 | return 0; |
| 314 | } else if (!(r->common.flags & FIB_RULE_FIND_SADDR)) |
Thomas Graf | adaa70b | 2006-10-13 15:01:03 -0700 | [diff] [blame] | 315 | return 0; |
| 316 | } |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 317 | |
Li RongQing | d76ed22 | 2014-01-15 17:03:30 +0800 | [diff] [blame] | 318 | if (r->tclass && r->tclass != ip6_tclass(fl6->flowlabel)) |
YOSHIFUJI Hideaki | 2cc67cc | 2006-08-21 19:18:57 +0900 | [diff] [blame] | 319 | return 0; |
| 320 | |
Roopa Prabhu | bb0ad19 | 2018-02-28 22:41:37 -0500 | [diff] [blame] | 321 | if (rule->ip_proto && (rule->ip_proto != fl6->flowi6_proto)) |
| 322 | return 0; |
| 323 | |
| 324 | if (fib_rule_port_range_set(&rule->sport_range) && |
| 325 | !fib_rule_port_inrange(&rule->sport_range, fl6->fl6_sport)) |
| 326 | return 0; |
| 327 | |
| 328 | if (fib_rule_port_range_set(&rule->dport_range) && |
| 329 | !fib_rule_port_inrange(&rule->dport_range, fl6->fl6_dport)) |
| 330 | return 0; |
| 331 | |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 332 | return 1; |
| 333 | } |
| 334 | |
Patrick McHardy | ef7c79e | 2007-06-05 12:38:30 -0700 | [diff] [blame] | 335 | static const struct nla_policy fib6_rule_policy[FRA_MAX+1] = { |
Thomas Graf | 1f6c955 | 2006-11-09 15:22:48 -0800 | [diff] [blame] | 336 | FRA_GENERIC_POLICY, |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 337 | }; |
| 338 | |
| 339 | static int fib6_rule_configure(struct fib_rule *rule, struct sk_buff *skb, |
Rami Rosen | 8b3521e | 2009-05-11 05:52:49 +0000 | [diff] [blame] | 340 | struct fib_rule_hdr *frh, |
Roopa Prabhu | b16fb41 | 2018-04-21 09:41:31 -0700 | [diff] [blame] | 341 | struct nlattr **tb, |
| 342 | struct netlink_ext_ack *extack) |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 343 | { |
| 344 | int err = -EINVAL; |
YOSHIFUJI Hideaki | 3b1e0a6 | 2008-03-26 02:26:21 +0900 | [diff] [blame] | 345 | struct net *net = sock_net(skb->sk); |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 346 | struct fib6_rule *rule6 = (struct fib6_rule *) rule; |
| 347 | |
David Ahern | 96c63fa | 2016-06-08 10:55:39 -0700 | [diff] [blame] | 348 | if (rule->action == FR_ACT_TO_TBL && !rule->l3mdev) { |
Roopa Prabhu | b16fb41 | 2018-04-21 09:41:31 -0700 | [diff] [blame] | 349 | if (rule->table == RT6_TABLE_UNSPEC) { |
| 350 | NL_SET_ERR_MSG(extack, "Invalid table"); |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 351 | goto errout; |
Roopa Prabhu | b16fb41 | 2018-04-21 09:41:31 -0700 | [diff] [blame] | 352 | } |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 353 | |
Daniel Lezcano | dcabb81 | 2008-03-03 23:33:08 -0800 | [diff] [blame] | 354 | if (fib6_new_table(net, rule->table) == NULL) { |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 355 | err = -ENOBUFS; |
| 356 | goto errout; |
| 357 | } |
| 358 | } |
| 359 | |
Thomas Graf | e1701c6 | 2007-03-24 12:46:02 -0700 | [diff] [blame] | 360 | if (frh->src_len) |
Jiri Benc | 67b61f6 | 2015-03-29 16:59:26 +0200 | [diff] [blame] | 361 | rule6->src.addr = nla_get_in6_addr(tb[FRA_SRC]); |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 362 | |
Thomas Graf | e1701c6 | 2007-03-24 12:46:02 -0700 | [diff] [blame] | 363 | if (frh->dst_len) |
Jiri Benc | 67b61f6 | 2015-03-29 16:59:26 +0200 | [diff] [blame] | 364 | rule6->dst.addr = nla_get_in6_addr(tb[FRA_DST]); |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 365 | |
| 366 | rule6->src.plen = frh->src_len; |
| 367 | rule6->dst.plen = frh->dst_len; |
| 368 | rule6->tclass = frh->tos; |
| 369 | |
Roopa Prabhu | 5e5d6fe | 2018-02-28 22:43:22 -0500 | [diff] [blame] | 370 | if (fib_rule_requires_fldissect(rule)) |
| 371 | net->ipv6.fib6_rules_require_fldissect++; |
| 372 | |
Vincent Bernat | feca7d8 | 2017-08-08 20:23:49 +0200 | [diff] [blame] | 373 | net->ipv6.fib6_has_custom_rules = true; |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 374 | err = 0; |
| 375 | errout: |
| 376 | return err; |
| 377 | } |
| 378 | |
Roopa Prabhu | 5e5d6fe | 2018-02-28 22:43:22 -0500 | [diff] [blame] | 379 | static int fib6_rule_delete(struct fib_rule *rule) |
| 380 | { |
| 381 | struct net *net = rule->fr_net; |
| 382 | |
| 383 | if (net->ipv6.fib6_rules_require_fldissect && |
| 384 | fib_rule_requires_fldissect(rule)) |
| 385 | net->ipv6.fib6_rules_require_fldissect--; |
| 386 | |
| 387 | return 0; |
| 388 | } |
| 389 | |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 390 | static int fib6_rule_compare(struct fib_rule *rule, struct fib_rule_hdr *frh, |
| 391 | struct nlattr **tb) |
| 392 | { |
| 393 | struct fib6_rule *rule6 = (struct fib6_rule *) rule; |
| 394 | |
| 395 | if (frh->src_len && (rule6->src.plen != frh->src_len)) |
| 396 | return 0; |
| 397 | |
| 398 | if (frh->dst_len && (rule6->dst.plen != frh->dst_len)) |
| 399 | return 0; |
| 400 | |
| 401 | if (frh->tos && (rule6->tclass != frh->tos)) |
| 402 | return 0; |
| 403 | |
Thomas Graf | e1701c6 | 2007-03-24 12:46:02 -0700 | [diff] [blame] | 404 | if (frh->src_len && |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 405 | nla_memcmp(tb[FRA_SRC], &rule6->src.addr, sizeof(struct in6_addr))) |
| 406 | return 0; |
| 407 | |
Thomas Graf | e1701c6 | 2007-03-24 12:46:02 -0700 | [diff] [blame] | 408 | if (frh->dst_len && |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 409 | nla_memcmp(tb[FRA_DST], &rule6->dst.addr, sizeof(struct in6_addr))) |
| 410 | return 0; |
| 411 | |
| 412 | return 1; |
| 413 | } |
| 414 | |
| 415 | static int fib6_rule_fill(struct fib_rule *rule, struct sk_buff *skb, |
Rami Rosen | 04af8cf | 2009-05-20 17:26:23 -0700 | [diff] [blame] | 416 | struct fib_rule_hdr *frh) |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 417 | { |
| 418 | struct fib6_rule *rule6 = (struct fib6_rule *) rule; |
| 419 | |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 420 | frh->dst_len = rule6->dst.plen; |
| 421 | frh->src_len = rule6->src.plen; |
| 422 | frh->tos = rule6->tclass; |
| 423 | |
David S. Miller | c78679e | 2012-04-01 20:27:33 -0400 | [diff] [blame] | 424 | if ((rule6->dst.plen && |
Jiri Benc | 930345e | 2015-03-29 16:59:25 +0200 | [diff] [blame] | 425 | nla_put_in6_addr(skb, FRA_DST, &rule6->dst.addr)) || |
David S. Miller | c78679e | 2012-04-01 20:27:33 -0400 | [diff] [blame] | 426 | (rule6->src.plen && |
Jiri Benc | 930345e | 2015-03-29 16:59:25 +0200 | [diff] [blame] | 427 | nla_put_in6_addr(skb, FRA_SRC, &rule6->src.addr))) |
David S. Miller | c78679e | 2012-04-01 20:27:33 -0400 | [diff] [blame] | 428 | goto nla_put_failure; |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 429 | return 0; |
| 430 | |
| 431 | nla_put_failure: |
| 432 | return -ENOBUFS; |
| 433 | } |
| 434 | |
Thomas Graf | 339bf98 | 2006-11-10 14:10:15 -0800 | [diff] [blame] | 435 | static size_t fib6_rule_nlmsg_payload(struct fib_rule *rule) |
| 436 | { |
| 437 | return nla_total_size(16) /* dst */ |
| 438 | + nla_total_size(16); /* src */ |
| 439 | } |
| 440 | |
Andi Kleen | 04a6f82 | 2012-10-04 17:12:11 -0700 | [diff] [blame] | 441 | static const struct fib_rules_ops __net_initconst fib6_rules_ops_template = { |
Patrick McHardy | 25239ce | 2010-04-26 16:02:05 +0200 | [diff] [blame] | 442 | .family = AF_INET6, |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 443 | .rule_size = sizeof(struct fib6_rule), |
Thomas Graf | e1701c6 | 2007-03-24 12:46:02 -0700 | [diff] [blame] | 444 | .addr_size = sizeof(struct in6_addr), |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 445 | .action = fib6_rule_action, |
| 446 | .match = fib6_rule_match, |
Stefan Tomanek | 7764a45 | 2013-08-01 02:17:15 +0200 | [diff] [blame] | 447 | .suppress = fib6_rule_suppress, |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 448 | .configure = fib6_rule_configure, |
Roopa Prabhu | 5e5d6fe | 2018-02-28 22:43:22 -0500 | [diff] [blame] | 449 | .delete = fib6_rule_delete, |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 450 | .compare = fib6_rule_compare, |
| 451 | .fill = fib6_rule_fill, |
Thomas Graf | 339bf98 | 2006-11-10 14:10:15 -0800 | [diff] [blame] | 452 | .nlmsg_payload = fib6_rule_nlmsg_payload, |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 453 | .nlgroup = RTNLGRP_IPV6_RULE, |
| 454 | .policy = fib6_rule_policy, |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 455 | .owner = THIS_MODULE, |
Denis V. Lunev | 0359238 | 2008-01-20 16:46:01 -0800 | [diff] [blame] | 456 | .fro_net = &init_net, |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 457 | }; |
| 458 | |
Alexey Dobriyan | 2c8c1e7 | 2010-01-17 03:35:32 +0000 | [diff] [blame] | 459 | static int __net_init fib6_rules_net_init(struct net *net) |
Denis V. Lunev | 2994c638 | 2007-11-10 22:12:03 -0800 | [diff] [blame] | 460 | { |
Eric W. Biederman | e9c5158 | 2009-12-03 12:22:55 -0800 | [diff] [blame] | 461 | struct fib_rules_ops *ops; |
Daniel Lezcano | dcabb81 | 2008-03-03 23:33:08 -0800 | [diff] [blame] | 462 | int err = -ENOMEM; |
Denis V. Lunev | 2994c638 | 2007-11-10 22:12:03 -0800 | [diff] [blame] | 463 | |
Eric W. Biederman | e9c5158 | 2009-12-03 12:22:55 -0800 | [diff] [blame] | 464 | ops = fib_rules_register(&fib6_rules_ops_template, net); |
| 465 | if (IS_ERR(ops)) |
| 466 | return PTR_ERR(ops); |
WANG Cong | 85b99092 | 2015-03-25 14:45:02 -0700 | [diff] [blame] | 467 | |
| 468 | err = fib_default_rule_add(ops, 0, RT6_TABLE_LOCAL, 0); |
| 469 | if (err) |
| 470 | goto out_fib6_rules_ops; |
| 471 | |
| 472 | err = fib_default_rule_add(ops, 0x7FFE, RT6_TABLE_MAIN, 0); |
| 473 | if (err) |
| 474 | goto out_fib6_rules_ops; |
| 475 | |
Eric W. Biederman | e9c5158 | 2009-12-03 12:22:55 -0800 | [diff] [blame] | 476 | net->ipv6.fib6_rules_ops = ops; |
Roopa Prabhu | 5e5d6fe | 2018-02-28 22:43:22 -0500 | [diff] [blame] | 477 | net->ipv6.fib6_rules_require_fldissect = 0; |
Daniel Lezcano | dcabb81 | 2008-03-03 23:33:08 -0800 | [diff] [blame] | 478 | out: |
| 479 | return err; |
| 480 | |
Daniel Lezcano | dcabb81 | 2008-03-03 23:33:08 -0800 | [diff] [blame] | 481 | out_fib6_rules_ops: |
Eric W. Biederman | e9c5158 | 2009-12-03 12:22:55 -0800 | [diff] [blame] | 482 | fib_rules_unregister(ops); |
Daniel Lezcano | 9eb87f3 | 2007-12-07 00:42:52 -0800 | [diff] [blame] | 483 | goto out; |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 484 | } |
| 485 | |
Alexey Dobriyan | 2c8c1e7 | 2010-01-17 03:35:32 +0000 | [diff] [blame] | 486 | static void __net_exit fib6_rules_net_exit(struct net *net) |
Daniel Lezcano | dcabb81 | 2008-03-03 23:33:08 -0800 | [diff] [blame] | 487 | { |
WANG Cong | 419df12 | 2015-03-31 11:01:46 -0700 | [diff] [blame] | 488 | rtnl_lock(); |
Daniel Lezcano | dcabb81 | 2008-03-03 23:33:08 -0800 | [diff] [blame] | 489 | fib_rules_unregister(net->ipv6.fib6_rules_ops); |
WANG Cong | 419df12 | 2015-03-31 11:01:46 -0700 | [diff] [blame] | 490 | rtnl_unlock(); |
Daniel Lezcano | dcabb81 | 2008-03-03 23:33:08 -0800 | [diff] [blame] | 491 | } |
| 492 | |
| 493 | static struct pernet_operations fib6_rules_net_ops = { |
| 494 | .init = fib6_rules_net_init, |
| 495 | .exit = fib6_rules_net_exit, |
| 496 | }; |
| 497 | |
| 498 | int __init fib6_rules_init(void) |
| 499 | { |
| 500 | return register_pernet_subsys(&fib6_rules_net_ops); |
| 501 | } |
| 502 | |
| 503 | |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 504 | void fib6_rules_cleanup(void) |
| 505 | { |
YOSHIFUJI Hideaki | ff4e1fb | 2008-04-10 15:41:28 +0900 | [diff] [blame] | 506 | unregister_pernet_subsys(&fib6_rules_net_ops); |
Thomas Graf | 101367c | 2006-08-04 03:39:02 -0700 | [diff] [blame] | 507 | } |