Merge tag 'dma-mapping-6.6-2023-09-09' of git://git.infradead.org/users/hch/dma-mapping
[linux-block.git] / net / ipv4 / xfrm4_policy.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
e905a9ed 2/*
1da177e4
LT
3 * xfrm4_policy.c
4 *
5 * Changes:
6 * Kazunori MIYAZAWA @USAGI
7 * YOSHIFUJI Hideaki @USAGI
8 * Split up af-specific portion
e905a9ed 9 *
1da177e4
LT
10 */
11
66cdb3ca
HX
12#include <linux/err.h>
13#include <linux/kernel.h>
aabc9761 14#include <linux/inetdevice.h>
45ff5a3f 15#include <net/dst.h>
1da177e4
LT
16#include <net/xfrm.h>
17#include <net/ip.h>
385add90 18#include <net/l3mdev.h>
1da177e4 19
8f01cb08 20static struct dst_entry *__xfrm4_dst_lookup(struct net *net, struct flowi4 *fl4,
42a7b32b 21 int tos, int oif,
8f01cb08 22 const xfrm_address_t *saddr,
077fbac4
LC
23 const xfrm_address_t *daddr,
24 u32 mark)
1da177e4 25{
66cdb3ca 26 struct rtable *rt;
a1e59abf 27
8f01cb08
DM
28 memset(fl4, 0, sizeof(*fl4));
29 fl4->daddr = daddr->a4;
30 fl4->flowi4_tos = tos;
40867d74 31 fl4->flowi4_l3mdev = l3mdev_master_ifindex_by_index(net, oif);
077fbac4 32 fl4->flowi4_mark = mark;
66cdb3ca 33 if (saddr)
8f01cb08 34 fl4->saddr = saddr->a4;
66cdb3ca 35
8f01cb08 36 rt = __ip_route_output_key(net, fl4);
b23dd4fe
DM
37 if (!IS_ERR(rt))
38 return &rt->dst;
39
40 return ERR_CAST(rt);
66cdb3ca
HX
41}
42
42a7b32b 43static struct dst_entry *xfrm4_dst_lookup(struct net *net, int tos, int oif,
8f01cb08 44 const xfrm_address_t *saddr,
077fbac4
LC
45 const xfrm_address_t *daddr,
46 u32 mark)
8f01cb08
DM
47{
48 struct flowi4 fl4;
49
077fbac4 50 return __xfrm4_dst_lookup(net, &fl4, tos, oif, saddr, daddr, mark);
8f01cb08
DM
51}
52
42a7b32b 53static int xfrm4_get_saddr(struct net *net, int oif,
077fbac4
LC
54 xfrm_address_t *saddr, xfrm_address_t *daddr,
55 u32 mark)
66cdb3ca
HX
56{
57 struct dst_entry *dst;
8f01cb08 58 struct flowi4 fl4;
66cdb3ca 59
077fbac4 60 dst = __xfrm4_dst_lookup(net, &fl4, 0, oif, NULL, daddr, mark);
66cdb3ca
HX
61 if (IS_ERR(dst))
62 return -EHOSTUNREACH;
63
8f01cb08 64 saddr->a4 = fl4.saddr;
66cdb3ca
HX
65 dst_release(dst);
66 return 0;
a1e59abf
PM
67}
68
87c1e12b 69static int xfrm4_fill_dst(struct xfrm_dst *xdst, struct net_device *dev,
0c7b3eef 70 const struct flowi *fl)
25ee3286
HX
71{
72 struct rtable *rt = (struct rtable *)xdst->route;
7e1dc7b6 73 const struct flowi4 *fl4 = &fl->u.ip4;
1da177e4 74
b7323396 75 xdst->u.rt.rt_iif = fl4->flowi4_iif;
1da177e4 76
25ee3286 77 xdst->u.dst.dev = dev;
d62607c3 78 netdev_hold(dev, &xdst->u.dst.dev_tracker, GFP_ATOMIC);
43372262 79
25ee3286
HX
80 /* Sheit... I remember I did this right. Apparently,
81 * it was magically lost, so this code needs audit */
9917e1e8 82 xdst->u.rt.rt_is_input = rt->rt_is_input;
25ee3286
HX
83 xdst->u.rt.rt_flags = rt->rt_flags & (RTCF_BROADCAST | RTCF_MULTICAST |
84 RTCF_LOCAL);
85 xdst->u.rt.rt_type = rt->rt_type;
77d5bc7e 86 xdst->u.rt.rt_uses_gateway = rt->rt_uses_gateway;
1550c171
DA
87 xdst->u.rt.rt_gw_family = rt->rt_gw_family;
88 if (rt->rt_gw_family == AF_INET)
89 xdst->u.rt.rt_gw4 = rt->rt_gw4;
0f5f7d7b
DA
90 else if (rt->rt_gw_family == AF_INET6)
91 xdst->u.rt.rt_gw6 = rt->rt_gw6;
5943634f 92 xdst->u.rt.rt_pmtu = rt->rt_pmtu;
d52e5a7e 93 xdst->u.rt.rt_mtu_locked = rt->rt_mtu_locked;
510c321b 94 rt_add_uncached_list(&xdst->u.rt);
1da177e4 95
1da177e4 96 return 0;
1da177e4
LT
97}
98
6700c270 99static void xfrm4_update_pmtu(struct dst_entry *dst, struct sock *sk,
bd085ef6
HL
100 struct sk_buff *skb, u32 mtu,
101 bool confirm_neigh)
1da177e4
LT
102{
103 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
104 struct dst_entry *path = xdst->route;
105
bd085ef6 106 path->ops->update_pmtu(path, sk, skb, mtu, confirm_neigh);
1da177e4
LT
107}
108
6700c270
DM
109static void xfrm4_redirect(struct dst_entry *dst, struct sock *sk,
110 struct sk_buff *skb)
55be7a9c
DM
111{
112 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
113 struct dst_entry *path = xdst->route;
114
6700c270 115 path->ops->redirect(path, sk, skb);
55be7a9c
DM
116}
117
aabc9761
HX
118static void xfrm4_dst_destroy(struct dst_entry *dst)
119{
120 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
121
62fa8a84 122 dst_destroy_metrics_generic(dst);
418a7307 123 rt_del_uncached_list(&xdst->u.rt);
aabc9761
HX
124 xfrm_dst_destroy(xdst);
125}
126
a8a572a6 127static struct dst_ops xfrm4_dst_ops_template = {
1da177e4 128 .family = AF_INET,
1da177e4 129 .update_pmtu = xfrm4_update_pmtu,
55be7a9c 130 .redirect = xfrm4_redirect,
62fa8a84 131 .cow_metrics = dst_cow_metrics_generic,
aabc9761 132 .destroy = xfrm4_dst_destroy,
43c28172 133 .ifdown = xfrm_dst_ifdown,
862b82c6 134 .local_out = __ip_local_out,
3c2a89dd 135 .gc_thresh = 32768,
1da177e4
LT
136};
137
37b10383 138static const struct xfrm_policy_afinfo xfrm4_policy_afinfo = {
a8a572a6 139 .dst_ops = &xfrm4_dst_ops_template,
1da177e4 140 .dst_lookup = xfrm4_dst_lookup,
a1e59abf 141 .get_saddr = xfrm4_get_saddr,
25ee3286 142 .fill_dst = xfrm4_fill_dst,
2774c131 143 .blackhole_route = ipv4_blackhole_route,
1da177e4
LT
144};
145
f816700a 146#ifdef CONFIG_SYSCTL
a44a4a00
NH
147static struct ctl_table xfrm4_policy_table[] = {
148 {
a44a4a00 149 .procname = "xfrm4_gc_thresh",
d7c7544c 150 .data = &init_net.xfrm.xfrm4_dst_ops.gc_thresh,
a44a4a00
NH
151 .maxlen = sizeof(int),
152 .mode = 0644,
153 .proc_handler = proc_dointvec,
154 },
155 { }
156};
157
318d3cc0 158static __net_init int xfrm4_net_sysctl_init(struct net *net)
8d068875
MK
159{
160 struct ctl_table *table;
161 struct ctl_table_header *hdr;
162
163 table = xfrm4_policy_table;
164 if (!net_eq(net, &init_net)) {
165 table = kmemdup(table, sizeof(xfrm4_policy_table), GFP_KERNEL);
166 if (!table)
167 goto err_alloc;
168
169 table[0].data = &net->xfrm.xfrm4_dst_ops.gc_thresh;
170 }
171
c899710f
JG
172 hdr = register_net_sysctl_sz(net, "net/ipv4", table,
173 ARRAY_SIZE(xfrm4_policy_table));
8d068875
MK
174 if (!hdr)
175 goto err_reg;
176
177 net->ipv4.xfrm4_hdr = hdr;
178 return 0;
179
180err_reg:
181 if (!net_eq(net, &init_net))
182 kfree(table);
183err_alloc:
184 return -ENOMEM;
185}
186
318d3cc0 187static __net_exit void xfrm4_net_sysctl_exit(struct net *net)
8d068875
MK
188{
189 struct ctl_table *table;
190
51456b29 191 if (!net->ipv4.xfrm4_hdr)
8d068875
MK
192 return;
193
194 table = net->ipv4.xfrm4_hdr->ctl_table_arg;
195 unregister_net_sysctl_table(net->ipv4.xfrm4_hdr);
196 if (!net_eq(net, &init_net))
197 kfree(table);
198}
a8a572a6 199#else /* CONFIG_SYSCTL */
318d3cc0 200static inline int xfrm4_net_sysctl_init(struct net *net)
a8a572a6
DS
201{
202 return 0;
203}
204
318d3cc0 205static inline void xfrm4_net_sysctl_exit(struct net *net)
a8a572a6
DS
206{
207}
208#endif
209
210static int __net_init xfrm4_net_init(struct net *net)
211{
212 int ret;
213
214 memcpy(&net->xfrm.xfrm4_dst_ops, &xfrm4_dst_ops_template,
215 sizeof(xfrm4_dst_ops_template));
216 ret = dst_entries_init(&net->xfrm.xfrm4_dst_ops);
217 if (ret)
218 return ret;
219
220 ret = xfrm4_net_sysctl_init(net);
221 if (ret)
222 dst_entries_destroy(&net->xfrm.xfrm4_dst_ops);
223
224 return ret;
225}
226
227static void __net_exit xfrm4_net_exit(struct net *net)
228{
229 xfrm4_net_sysctl_exit(net);
230 dst_entries_destroy(&net->xfrm.xfrm4_dst_ops);
231}
8d068875
MK
232
233static struct pernet_operations __net_initdata xfrm4_net_ops = {
234 .init = xfrm4_net_init,
235 .exit = xfrm4_net_exit,
236};
a44a4a00 237
1da177e4
LT
238static void __init xfrm4_policy_init(void)
239{
a2817d8b 240 xfrm_policy_register_afinfo(&xfrm4_policy_afinfo, AF_INET);
1da177e4
LT
241}
242
703fb94e 243void __init xfrm4_init(void)
1da177e4 244{
d7c7544c
AD
245 xfrm4_state_init();
246 xfrm4_policy_init();
2f32b51b 247 xfrm4_protocol_init();
8d068875 248 register_pernet_subsys(&xfrm4_net_ops);
1da177e4 249}