ipv6,gre: do not leak info to user-space
[linux-block.git] / net / ipv6 / xfrm6_policy.c
CommitLineData
1da177e4
LT
1/*
2 * xfrm6_policy.c: based on xfrm4_policy.c
3 *
4 * Authors:
5 * Mitsuru KANDA @USAGI
6 * Kazunori MIYAZAWA @USAGI
7 * Kunihiro Ishiguro <kunihiro@ipinfusion.com>
8 * IPv6 support
9 * YOSHIFUJI Hideaki
10 * Split up af-specific portion
1ab1457c 11 *
1da177e4
LT
12 */
13
66cdb3ca
HX
14#include <linux/err.h>
15#include <linux/kernel.h>
aabc9761
HX
16#include <linux/netdevice.h>
17#include <net/addrconf.h>
45ff5a3f 18#include <net/dst.h>
1da177e4
LT
19#include <net/xfrm.h>
20#include <net/ip.h>
21#include <net/ipv6.h>
22#include <net/ip6_route.h>
07a93626 23#if IS_ENABLED(CONFIG_IPV6_MIP6)
2ce4272a
MN
24#include <net/mip6.h>
25#endif
1da177e4 26
1da177e4
LT
27static struct xfrm_policy_afinfo xfrm6_policy_afinfo;
28
c5b3cf46 29static struct dst_entry *xfrm6_dst_lookup(struct net *net, int tos,
5e6b930f
DM
30 const xfrm_address_t *saddr,
31 const xfrm_address_t *daddr)
1da177e4 32{
7e1dc7b6 33 struct flowi6 fl6;
66cdb3ca
HX
34 struct dst_entry *dst;
35 int err;
36
7e1dc7b6
DM
37 memset(&fl6, 0, sizeof(fl6));
38 memcpy(&fl6.daddr, daddr, sizeof(fl6.daddr));
66cdb3ca 39 if (saddr)
7e1dc7b6 40 memcpy(&fl6.saddr, saddr, sizeof(fl6.saddr));
66cdb3ca 41
4c9483b2 42 dst = ip6_route_output(net, NULL, &fl6);
66cdb3ca
HX
43
44 err = dst->error;
45 if (dst->error) {
4251320f 46 dst_release(dst);
66cdb3ca
HX
47 dst = ERR_PTR(err);
48 }
49
50 return dst;
1da177e4
LT
51}
52
fbda33b2
AD
53static int xfrm6_get_saddr(struct net *net,
54 xfrm_address_t *saddr, xfrm_address_t *daddr)
a1e59abf 55{
66cdb3ca 56 struct dst_entry *dst;
191cd582 57 struct net_device *dev;
66cdb3ca 58
fbda33b2 59 dst = xfrm6_dst_lookup(net, 0, NULL, daddr);
66cdb3ca
HX
60 if (IS_ERR(dst))
61 return -EHOSTUNREACH;
62
191cd582
BH
63 dev = ip6_dst_idev(dst)->dev;
64 ipv6_dev_get_saddr(dev_net(dev), dev,
7cbca67c 65 (struct in6_addr *)&daddr->a6, 0,
5e5f3f0f 66 (struct in6_addr *)&saddr->a6);
66cdb3ca
HX
67 dst_release(dst);
68 return 0;
a1e59abf
PM
69}
70
05d84025 71static int xfrm6_get_tos(const struct flowi *fl)
1da177e4 72{
25ee3286
HX
73 return 0;
74}
1da177e4 75
9d7b0fc1
PM
76static void xfrm6_init_dst(struct net *net, struct xfrm_dst *xdst)
77{
78 struct rt6_info *rt = (struct rt6_info *)xdst;
79
80 rt6_init_peer(rt, net->ipv6.peers);
81}
82
a1b05140
MN
83static int xfrm6_init_path(struct xfrm_dst *path, struct dst_entry *dst,
84 int nfheader_len)
85{
86 if (dst->ops->family == AF_INET6) {
87 struct rt6_info *rt = (struct rt6_info*)dst;
88 if (rt->rt6i_node)
89 path->path_cookie = rt->rt6i_node->fn_sernum;
90 }
91
92 path->u.rt6.rt6i_nfheader_len = nfheader_len;
93
94 return 0;
95}
96
87c1e12b 97static int xfrm6_fill_dst(struct xfrm_dst *xdst, struct net_device *dev,
0c7b3eef 98 const struct flowi *fl)
25ee3286
HX
99{
100 struct rt6_info *rt = (struct rt6_info*)xdst->route;
1da177e4 101
25ee3286
HX
102 xdst->u.dst.dev = dev;
103 dev_hold(dev);
1da177e4 104
bc8e4b95 105 xdst->u.rt6.rt6i_idev = in6_dev_get(dev);
25ee3286
HX
106 if (!xdst->u.rt6.rt6i_idev)
107 return -ENODEV;
1da177e4 108
97bab73f 109 rt6_transfer_peer(&xdst->u.rt6, rt);
7cc2edb8 110
25ee3286
HX
111 /* Sheit... I remember I did this right. Apparently,
112 * it was magically lost, so this code needs audit */
113 xdst->u.rt6.rt6i_flags = rt->rt6i_flags & (RTF_ANYCAST |
114 RTF_LOCAL);
115 xdst->u.rt6.rt6i_metric = rt->rt6i_metric;
116 xdst->u.rt6.rt6i_node = rt->rt6i_node;
a1b05140
MN
117 if (rt->rt6i_node)
118 xdst->route_cookie = rt->rt6i_node->fn_sernum;
25ee3286
HX
119 xdst->u.rt6.rt6i_gateway = rt->rt6i_gateway;
120 xdst->u.rt6.rt6i_dst = rt->rt6i_dst;
121 xdst->u.rt6.rt6i_src = rt->rt6i_src;
1da177e4 122
1da177e4 123 return 0;
1da177e4
LT
124}
125
126static inline void
d5422efe 127_decode_session6(struct sk_buff *skb, struct flowi *fl, int reverse)
1da177e4 128{
7e1dc7b6 129 struct flowi6 *fl6 = &fl->u.ip6;
7e3a42a1 130 int onlyproto = 0;
cfe1fc77 131 u16 offset = skb_network_header_len(skb);
b71d1d42 132 const struct ipv6hdr *hdr = ipv6_hdr(skb);
e3cae904 133 struct ipv6_opt_hdr *exthdr;
d56f90a7
ACM
134 const unsigned char *nh = skb_network_header(skb);
135 u8 nexthdr = nh[IP6CB(skb)->nhoff];
1da177e4 136
7e1dc7b6
DM
137 memset(fl6, 0, sizeof(struct flowi6));
138 fl6->flowi6_mark = skb->mark;
44b451f1 139
4e3fd7a0
AD
140 fl6->daddr = reverse ? hdr->saddr : hdr->daddr;
141 fl6->saddr = reverse ? hdr->daddr : hdr->saddr;
1da177e4 142
59cae009
WY
143 while (nh + offset + 1 < skb->data ||
144 pskb_may_pull(skb, nh + offset + 1 - skb->data)) {
d56f90a7
ACM
145 nh = skb_network_header(skb);
146 exthdr = (struct ipv6_opt_hdr *)(nh + offset);
e3cae904 147
1da177e4 148 switch (nexthdr) {
7e3a42a1
ND
149 case NEXTHDR_FRAGMENT:
150 onlyproto = 1;
1da177e4
LT
151 case NEXTHDR_ROUTING:
152 case NEXTHDR_HOP:
153 case NEXTHDR_DEST:
154 offset += ipv6_optlen(exthdr);
155 nexthdr = exthdr->nexthdr;
d56f90a7 156 exthdr = (struct ipv6_opt_hdr *)(nh + offset);
1da177e4
LT
157 break;
158
159 case IPPROTO_UDP:
ba4e58ec 160 case IPPROTO_UDPLITE:
1da177e4
LT
161 case IPPROTO_TCP:
162 case IPPROTO_SCTP:
9e999993 163 case IPPROTO_DCCP:
59cae009
WY
164 if (!onlyproto && (nh + offset + 4 < skb->data ||
165 pskb_may_pull(skb, nh + offset + 4 - skb->data))) {
8c689a6e 166 __be16 *ports = (__be16 *)exthdr;
1da177e4 167
1958b856
DM
168 fl6->fl6_sport = ports[!!reverse];
169 fl6->fl6_dport = ports[!reverse];
1da177e4 170 }
7e1dc7b6 171 fl6->flowi6_proto = nexthdr;
1da177e4
LT
172 return;
173
174 case IPPROTO_ICMPV6:
7e3a42a1 175 if (!onlyproto && pskb_may_pull(skb, nh + offset + 2 - skb->data)) {
1da177e4
LT
176 u8 *icmp = (u8 *)exthdr;
177
1958b856
DM
178 fl6->fl6_icmp_type = icmp[0];
179 fl6->fl6_icmp_code = icmp[1];
1da177e4 180 }
7e1dc7b6 181 fl6->flowi6_proto = nexthdr;
1da177e4
LT
182 return;
183
07a93626 184#if IS_ENABLED(CONFIG_IPV6_MIP6)
2ce4272a 185 case IPPROTO_MH:
7e3a42a1 186 if (!onlyproto && pskb_may_pull(skb, nh + offset + 3 - skb->data)) {
2ce4272a
MN
187 struct ip6_mh *mh;
188 mh = (struct ip6_mh *)exthdr;
189
1958b856 190 fl6->fl6_mh_type = mh->ip6mh_type;
2ce4272a 191 }
7e1dc7b6 192 fl6->flowi6_proto = nexthdr;
2ce4272a
MN
193 return;
194#endif
195
1da177e4
LT
196 /* XXX Why are there these headers? */
197 case IPPROTO_AH:
198 case IPPROTO_ESP:
199 case IPPROTO_COMP:
200 default:
1958b856 201 fl6->fl6_ipsec_spi = 0;
7e1dc7b6 202 fl6->flowi6_proto = nexthdr;
1da177e4 203 return;
3ff50b79 204 }
1da177e4
LT
205 }
206}
207
569d3645 208static inline int xfrm6_garbage_collect(struct dst_ops *ops)
1da177e4 209{
d7c7544c
AD
210 struct net *net = container_of(ops, struct net, xfrm.xfrm6_dst_ops);
211
212 xfrm6_policy_afinfo.garbage_collect(net);
fc66f95c 213 return dst_entries_get_fast(ops) > ops->gc_thresh * 2;
1da177e4
LT
214}
215
6700c270
DM
216static void xfrm6_update_pmtu(struct dst_entry *dst, struct sock *sk,
217 struct sk_buff *skb, u32 mtu)
1da177e4
LT
218{
219 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
220 struct dst_entry *path = xdst->route;
221
6700c270 222 path->ops->update_pmtu(path, sk, skb, mtu);
1da177e4
LT
223}
224
6700c270
DM
225static void xfrm6_redirect(struct dst_entry *dst, struct sock *sk,
226 struct sk_buff *skb)
ec18d9a2
DM
227{
228 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
229 struct dst_entry *path = xdst->route;
230
6700c270 231 path->ops->redirect(path, sk, skb);
ec18d9a2
DM
232}
233
aabc9761
HX
234static void xfrm6_dst_destroy(struct dst_entry *dst)
235{
236 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
237
238 if (likely(xdst->u.rt6.rt6i_idev))
239 in6_dev_put(xdst->u.rt6.rt6i_idev);
62fa8a84 240 dst_destroy_metrics_generic(dst);
97bab73f
DM
241 if (rt6_has_peer(&xdst->u.rt6)) {
242 struct inet_peer *peer = rt6_peer_ptr(&xdst->u.rt6);
243 inet_putpeer(peer);
244 }
aabc9761
HX
245 xfrm_dst_destroy(xdst);
246}
247
248static void xfrm6_dst_ifdown(struct dst_entry *dst, struct net_device *dev,
249 int unregister)
250{
251 struct xfrm_dst *xdst;
252
253 if (!unregister)
254 return;
255
256 xdst = (struct xfrm_dst *)dst;
257 if (xdst->u.rt6.rt6i_idev->dev == dev) {
5a3e55d6 258 struct inet6_dev *loopback_idev =
c346dca1 259 in6_dev_get(dev_net(dev)->loopback_dev);
aabc9761
HX
260 BUG_ON(!loopback_idev);
261
262 do {
263 in6_dev_put(xdst->u.rt6.rt6i_idev);
264 xdst->u.rt6.rt6i_idev = loopback_idev;
265 in6_dev_hold(loopback_idev);
266 xdst = (struct xfrm_dst *)xdst->u.dst.child;
267 } while (xdst->u.dst.xfrm);
268
269 __in6_dev_put(loopback_idev);
270 }
271
272 xfrm_dst_ifdown(dst, dev);
273}
274
1da177e4
LT
275static struct dst_ops xfrm6_dst_ops = {
276 .family = AF_INET6,
09640e63 277 .protocol = cpu_to_be16(ETH_P_IPV6),
1da177e4
LT
278 .gc = xfrm6_garbage_collect,
279 .update_pmtu = xfrm6_update_pmtu,
ec18d9a2 280 .redirect = xfrm6_redirect,
62fa8a84 281 .cow_metrics = dst_cow_metrics_generic,
aabc9761
HX
282 .destroy = xfrm6_dst_destroy,
283 .ifdown = xfrm6_dst_ifdown,
862b82c6 284 .local_out = __ip6_local_out,
1da177e4 285 .gc_thresh = 1024,
1da177e4
LT
286};
287
288static struct xfrm_policy_afinfo xfrm6_policy_afinfo = {
289 .family = AF_INET6,
1da177e4
LT
290 .dst_ops = &xfrm6_dst_ops,
291 .dst_lookup = xfrm6_dst_lookup,
a1e59abf 292 .get_saddr = xfrm6_get_saddr,
1da177e4 293 .decode_session = _decode_session6,
25ee3286 294 .get_tos = xfrm6_get_tos,
9d7b0fc1 295 .init_dst = xfrm6_init_dst,
a1b05140 296 .init_path = xfrm6_init_path,
25ee3286 297 .fill_dst = xfrm6_fill_dst,
2774c131 298 .blackhole_route = ip6_blackhole_route,
1da177e4
LT
299};
300
0013caba 301static int __init xfrm6_policy_init(void)
1da177e4 302{
0013caba 303 return xfrm_policy_register_afinfo(&xfrm6_policy_afinfo);
1da177e4
LT
304}
305
306static void xfrm6_policy_fini(void)
307{
308 xfrm_policy_unregister_afinfo(&xfrm6_policy_afinfo);
309}
310
db71789c 311#ifdef CONFIG_SYSCTL
a44a4a00
NH
312static struct ctl_table xfrm6_policy_table[] = {
313 {
a44a4a00 314 .procname = "xfrm6_gc_thresh",
d7c7544c 315 .data = &init_net.xfrm.xfrm6_dst_ops.gc_thresh,
a44a4a00
NH
316 .maxlen = sizeof(int),
317 .mode = 0644,
318 .proc_handler = proc_dointvec,
319 },
320 { }
321};
322
8d068875
MK
323static int __net_init xfrm6_net_init(struct net *net)
324{
325 struct ctl_table *table;
326 struct ctl_table_header *hdr;
327
328 table = xfrm6_policy_table;
329 if (!net_eq(net, &init_net)) {
330 table = kmemdup(table, sizeof(xfrm6_policy_table), GFP_KERNEL);
331 if (!table)
332 goto err_alloc;
333
334 table[0].data = &net->xfrm.xfrm6_dst_ops.gc_thresh;
335 }
336
337 hdr = register_net_sysctl(net, "net/ipv6", table);
338 if (!hdr)
339 goto err_reg;
340
341 net->ipv6.sysctl.xfrm6_hdr = hdr;
342 return 0;
343
344err_reg:
345 if (!net_eq(net, &init_net))
346 kfree(table);
347err_alloc:
348 return -ENOMEM;
349}
350
351static void __net_exit xfrm6_net_exit(struct net *net)
352{
353 struct ctl_table *table;
354
355 if (net->ipv6.sysctl.xfrm6_hdr == NULL)
356 return;
357
358 table = net->ipv6.sysctl.xfrm6_hdr->ctl_table_arg;
359 unregister_net_sysctl_table(net->ipv6.sysctl.xfrm6_hdr);
360 if (!net_eq(net, &init_net))
361 kfree(table);
362}
363
364static struct pernet_operations xfrm6_net_ops = {
365 .init = xfrm6_net_init,
366 .exit = xfrm6_net_exit,
367};
db71789c 368#endif
a44a4a00 369
0013caba 370int __init xfrm6_init(void)
1da177e4 371{
0013caba 372 int ret;
c3813286 373
fc66f95c 374 dst_entries_init(&xfrm6_dst_ops);
d7c7544c
AD
375
376 ret = xfrm6_policy_init();
fc66f95c
ED
377 if (ret) {
378 dst_entries_destroy(&xfrm6_dst_ops);
d7c7544c 379 goto out;
fc66f95c 380 }
d7c7544c
AD
381 ret = xfrm6_state_init();
382 if (ret)
383 goto out_policy;
384
db71789c 385#ifdef CONFIG_SYSCTL
8d068875 386 register_pernet_subsys(&xfrm6_net_ops);
db71789c 387#endif
0013caba
DL
388out:
389 return ret;
390out_policy:
391 xfrm6_policy_fini();
392 goto out;
1da177e4
LT
393}
394
395void xfrm6_fini(void)
396{
db71789c 397#ifdef CONFIG_SYSCTL
8d068875 398 unregister_pernet_subsys(&xfrm6_net_ops);
db71789c 399#endif
1da177e4
LT
400 xfrm6_policy_fini();
401 xfrm6_state_fini();
fc66f95c 402 dst_entries_destroy(&xfrm6_dst_ops);
1da177e4 403}