1 // SPDX-License-Identifier: GPL-2.0-only
3 * net/ipv6/fib6_rules.c IPv6 Routing Policy Rules
5 * Copyright (C)2003-2006 Helsinki University of Technology
6 * Copyright (C)2003-2006 USAGI/WIDE Project
9 * Thomas Graf <tgraf@suug.ch>
10 * Ville Nuorvala <vnuorval@tcs.hut.fi>
13 #include <linux/netdevice.h>
14 #include <linux/notifier.h>
15 #include <linux/export.h>
16 #include <linux/indirect_call_wrapper.h>
18 #include <net/fib_rules.h>
19 #include <net/inet_dscp.h>
21 #include <net/addrconf.h>
22 #include <net/ip6_route.h>
23 #include <net/netlink.h>
26 struct fib_rule common
;
30 u8 dscp_full
:1; /* DSCP or TOS selector */
33 static bool fib6_rule_matchall(const struct fib_rule
*rule
)
35 struct fib6_rule
*r
= container_of(rule
, struct fib6_rule
, common
);
37 if (r
->dst
.plen
|| r
->src
.plen
|| r
->dscp
)
39 return fib_rule_matchall(rule
);
42 bool fib6_rule_default(const struct fib_rule
*rule
)
44 if (!fib6_rule_matchall(rule
) || rule
->action
!= FR_ACT_TO_TBL
||
47 if (rule
->table
!= RT6_TABLE_LOCAL
&& rule
->table
!= RT6_TABLE_MAIN
)
51 EXPORT_SYMBOL_GPL(fib6_rule_default
);
53 int fib6_rules_dump(struct net
*net
, struct notifier_block
*nb
,
54 struct netlink_ext_ack
*extack
)
56 return fib_rules_dump(net
, nb
, AF_INET6
, extack
);
59 unsigned int fib6_rules_seq_read(const struct net
*net
)
61 return fib_rules_seq_read(net
, AF_INET6
);
64 /* called with rcu lock held; no reference taken on fib6_info */
65 int fib6_lookup(struct net
*net
, int oif
, struct flowi6
*fl6
,
66 struct fib6_result
*res
, int flags
)
70 if (net
->ipv6
.fib6_has_custom_rules
) {
71 struct fib_lookup_arg arg
= {
72 .lookup_ptr
= fib6_table_lookup
,
75 .flags
= FIB_LOOKUP_NOREF
,
78 l3mdev_update_flow(net
, flowi6_to_flowi(fl6
));
80 err
= fib_rules_lookup(net
->ipv6
.fib6_rules_ops
,
81 flowi6_to_flowi(fl6
), flags
, &arg
);
83 err
= fib6_table_lookup(net
, net
->ipv6
.fib6_local_tbl
, oif
,
85 if (err
|| res
->f6i
== net
->ipv6
.fib6_null_entry
)
86 err
= fib6_table_lookup(net
, net
->ipv6
.fib6_main_tbl
,
87 oif
, fl6
, res
, flags
);
93 struct dst_entry
*fib6_rule_lookup(struct net
*net
, struct flowi6
*fl6
,
94 const struct sk_buff
*skb
,
95 int flags
, pol_lookup_t lookup
)
97 if (net
->ipv6
.fib6_has_custom_rules
) {
98 struct fib6_result res
= {};
99 struct fib_lookup_arg arg
= {
100 .lookup_ptr
= lookup
,
103 .flags
= FIB_LOOKUP_NOREF
,
106 /* update flow if oif or iif point to device enslaved to l3mdev */
107 l3mdev_update_flow(net
, flowi6_to_flowi(fl6
));
109 fib_rules_lookup(net
->ipv6
.fib6_rules_ops
,
110 flowi6_to_flowi(fl6
), flags
, &arg
);
113 return &res
.rt6
->dst
;
117 rt
= pol_lookup_func(lookup
,
118 net
, net
->ipv6
.fib6_local_tbl
, fl6
, skb
, flags
);
119 if (rt
!= net
->ipv6
.ip6_null_entry
&& rt
->dst
.error
!= -EAGAIN
)
121 ip6_rt_put_flags(rt
, flags
);
122 rt
= pol_lookup_func(lookup
,
123 net
, net
->ipv6
.fib6_main_tbl
, fl6
, skb
, flags
);
124 if (rt
->dst
.error
!= -EAGAIN
)
126 ip6_rt_put_flags(rt
, flags
);
129 if (!(flags
& RT6_LOOKUP_F_DST_NOREF
))
130 dst_hold(&net
->ipv6
.ip6_null_entry
->dst
);
131 return &net
->ipv6
.ip6_null_entry
->dst
;
134 static int fib6_rule_saddr(struct net
*net
, struct fib_rule
*rule
, int flags
,
135 struct flowi6
*flp6
, const struct net_device
*dev
)
137 struct fib6_rule
*r
= (struct fib6_rule
*)rule
;
139 /* If we need to find a source address for this traffic,
140 * we check the result if it meets requirement of the rule.
142 if ((rule
->flags
& FIB_RULE_FIND_SADDR
) &&
143 r
->src
.plen
&& !(flags
& RT6_LOOKUP_F_HAS_SADDR
)) {
144 struct in6_addr saddr
;
146 if (ipv6_dev_get_saddr(net
, dev
, &flp6
->daddr
,
147 rt6_flags2srcprefs(flags
), &saddr
))
150 if (!ipv6_prefix_equal(&saddr
, &r
->src
.addr
, r
->src
.plen
))
159 static int fib6_rule_action_alt(struct fib_rule
*rule
, struct flowi
*flp
,
160 int flags
, struct fib_lookup_arg
*arg
)
162 struct fib6_result
*res
= arg
->result
;
163 struct flowi6
*flp6
= &flp
->u
.ip6
;
164 struct net
*net
= rule
->fr_net
;
165 struct fib6_table
*table
;
169 switch (rule
->action
) {
172 case FR_ACT_UNREACHABLE
:
174 case FR_ACT_PROHIBIT
:
176 case FR_ACT_BLACKHOLE
:
181 tb_id
= fib_rule_get_table(rule
, arg
);
182 table
= fib6_get_table(net
, tb_id
);
186 oif
= (int *)arg
->lookup_data
;
187 err
= fib6_table_lookup(net
, table
, *oif
, flp6
, res
, flags
);
188 if (!err
&& res
->f6i
!= net
->ipv6
.fib6_null_entry
)
189 err
= fib6_rule_saddr(net
, rule
, flags
, flp6
,
190 res
->nh
->fib_nh_dev
);
197 static int __fib6_rule_action(struct fib_rule
*rule
, struct flowi
*flp
,
198 int flags
, struct fib_lookup_arg
*arg
)
200 struct fib6_result
*res
= arg
->result
;
201 struct flowi6
*flp6
= &flp
->u
.ip6
;
202 struct rt6_info
*rt
= NULL
;
203 struct fib6_table
*table
;
204 struct net
*net
= rule
->fr_net
;
205 pol_lookup_t lookup
= arg
->lookup_ptr
;
209 switch (rule
->action
) {
212 case FR_ACT_UNREACHABLE
:
214 rt
= net
->ipv6
.ip6_null_entry
;
217 case FR_ACT_BLACKHOLE
:
219 rt
= net
->ipv6
.ip6_blk_hole_entry
;
221 case FR_ACT_PROHIBIT
:
223 rt
= net
->ipv6
.ip6_prohibit_entry
;
227 tb_id
= fib_rule_get_table(rule
, arg
);
228 table
= fib6_get_table(net
, tb_id
);
234 rt
= pol_lookup_func(lookup
,
235 net
, table
, flp6
, arg
->lookup_data
, flags
);
236 if (rt
!= net
->ipv6
.ip6_null_entry
) {
237 struct inet6_dev
*idev
= ip6_dst_idev(&rt
->dst
);
241 err
= fib6_rule_saddr(net
, rule
, flags
, flp6
,
252 ip6_rt_put_flags(rt
, flags
);
258 if (!(flags
& RT6_LOOKUP_F_DST_NOREF
))
265 INDIRECT_CALLABLE_SCOPE
int fib6_rule_action(struct fib_rule
*rule
,
266 struct flowi
*flp
, int flags
,
267 struct fib_lookup_arg
*arg
)
269 if (arg
->lookup_ptr
== fib6_table_lookup
)
270 return fib6_rule_action_alt(rule
, flp
, flags
, arg
);
272 return __fib6_rule_action(rule
, flp
, flags
, arg
);
275 INDIRECT_CALLABLE_SCOPE
bool fib6_rule_suppress(struct fib_rule
*rule
,
277 struct fib_lookup_arg
*arg
)
279 struct fib6_result
*res
= arg
->result
;
280 struct rt6_info
*rt
= res
->rt6
;
281 struct net_device
*dev
= NULL
;
287 dev
= rt
->rt6i_idev
->dev
;
289 /* do not accept result if the route does
290 * not meet the required prefix length
292 if (rt
->rt6i_dst
.plen
<= rule
->suppress_prefixlen
)
295 /* do not accept result if the route uses a device
296 * belonging to a forbidden interface group
298 if (rule
->suppress_ifgroup
!= -1 && dev
&& dev
->group
== rule
->suppress_ifgroup
)
304 ip6_rt_put_flags(rt
, flags
);
308 INDIRECT_CALLABLE_SCOPE
int fib6_rule_match(struct fib_rule
*rule
,
309 struct flowi
*fl
, int flags
)
311 struct fib6_rule
*r
= (struct fib6_rule
*) rule
;
312 struct flowi6
*fl6
= &fl
->u
.ip6
;
315 !ipv6_prefix_equal(&fl6
->daddr
, &r
->dst
.addr
, r
->dst
.plen
))
319 * If FIB_RULE_FIND_SADDR is set and we do not have a
320 * source address for the traffic, we defer check for
324 if (flags
& RT6_LOOKUP_F_HAS_SADDR
) {
325 if (!ipv6_prefix_equal(&fl6
->saddr
, &r
->src
.addr
,
328 } else if (!(r
->common
.flags
& FIB_RULE_FIND_SADDR
))
332 if (r
->dscp
&& r
->dscp
!= ip6_dscp(fl6
->flowlabel
))
335 if (rule
->ip_proto
&& (rule
->ip_proto
!= fl6
->flowi6_proto
))
338 if (fib_rule_port_range_set(&rule
->sport_range
) &&
339 !fib_rule_port_inrange(&rule
->sport_range
, fl6
->fl6_sport
))
342 if (fib_rule_port_range_set(&rule
->dport_range
) &&
343 !fib_rule_port_inrange(&rule
->dport_range
, fl6
->fl6_dport
))
349 static int fib6_nl2rule_dscp(const struct nlattr
*nla
, struct fib6_rule
*rule6
,
350 struct netlink_ext_ack
*extack
)
353 NL_SET_ERR_MSG(extack
, "Cannot specify both TOS and DSCP");
357 rule6
->dscp
= inet_dsfield_to_dscp(nla_get_u8(nla
) << 2);
358 rule6
->dscp_full
= true;
363 static int fib6_rule_configure(struct fib_rule
*rule
, struct sk_buff
*skb
,
364 struct fib_rule_hdr
*frh
,
366 struct netlink_ext_ack
*extack
)
369 struct net
*net
= sock_net(skb
->sk
);
370 struct fib6_rule
*rule6
= (struct fib6_rule
*) rule
;
372 if (!inet_validate_dscp(frh
->tos
)) {
373 NL_SET_ERR_MSG(extack
,
374 "Invalid dsfield (tos): ECN bits must be 0");
377 rule6
->dscp
= inet_dsfield_to_dscp(frh
->tos
);
379 if (tb
[FRA_DSCP
] && fib6_nl2rule_dscp(tb
[FRA_DSCP
], rule6
, extack
) < 0)
382 if (rule
->action
== FR_ACT_TO_TBL
&& !rule
->l3mdev
) {
383 if (rule
->table
== RT6_TABLE_UNSPEC
) {
384 NL_SET_ERR_MSG(extack
, "Invalid table");
388 if (fib6_new_table(net
, rule
->table
) == NULL
) {
395 rule6
->src
.addr
= nla_get_in6_addr(tb
[FRA_SRC
]);
398 rule6
->dst
.addr
= nla_get_in6_addr(tb
[FRA_DST
]);
400 rule6
->src
.plen
= frh
->src_len
;
401 rule6
->dst
.plen
= frh
->dst_len
;
403 if (fib_rule_requires_fldissect(rule
))
404 net
->ipv6
.fib6_rules_require_fldissect
++;
406 net
->ipv6
.fib6_has_custom_rules
= true;
412 static int fib6_rule_delete(struct fib_rule
*rule
)
414 struct net
*net
= rule
->fr_net
;
416 if (net
->ipv6
.fib6_rules_require_fldissect
&&
417 fib_rule_requires_fldissect(rule
))
418 net
->ipv6
.fib6_rules_require_fldissect
--;
423 static int fib6_rule_compare(struct fib_rule
*rule
, struct fib_rule_hdr
*frh
,
426 struct fib6_rule
*rule6
= (struct fib6_rule
*) rule
;
428 if (frh
->src_len
&& (rule6
->src
.plen
!= frh
->src_len
))
431 if (frh
->dst_len
&& (rule6
->dst
.plen
!= frh
->dst_len
))
436 inet_dscp_to_dsfield(rule6
->dscp
) != frh
->tos
))
442 dscp
= inet_dsfield_to_dscp(nla_get_u8(tb
[FRA_DSCP
]) << 2);
443 if (!rule6
->dscp_full
|| rule6
->dscp
!= dscp
)
448 nla_memcmp(tb
[FRA_SRC
], &rule6
->src
.addr
, sizeof(struct in6_addr
)))
452 nla_memcmp(tb
[FRA_DST
], &rule6
->dst
.addr
, sizeof(struct in6_addr
)))
458 static int fib6_rule_fill(struct fib_rule
*rule
, struct sk_buff
*skb
,
459 struct fib_rule_hdr
*frh
)
461 struct fib6_rule
*rule6
= (struct fib6_rule
*) rule
;
463 frh
->dst_len
= rule6
->dst
.plen
;
464 frh
->src_len
= rule6
->src
.plen
;
466 if (rule6
->dscp_full
) {
468 if (nla_put_u8(skb
, FRA_DSCP
,
469 inet_dscp_to_dsfield(rule6
->dscp
) >> 2))
470 goto nla_put_failure
;
472 frh
->tos
= inet_dscp_to_dsfield(rule6
->dscp
);
475 if ((rule6
->dst
.plen
&&
476 nla_put_in6_addr(skb
, FRA_DST
, &rule6
->dst
.addr
)) ||
478 nla_put_in6_addr(skb
, FRA_SRC
, &rule6
->src
.addr
)))
479 goto nla_put_failure
;
486 static size_t fib6_rule_nlmsg_payload(struct fib_rule
*rule
)
488 return nla_total_size(16) /* dst */
489 + nla_total_size(16) /* src */
490 + nla_total_size(1); /* dscp */
493 static void fib6_rule_flush_cache(struct fib_rules_ops
*ops
)
495 rt_genid_bump_ipv6(ops
->fro_net
);
498 static const struct fib_rules_ops __net_initconst fib6_rules_ops_template
= {
500 .rule_size
= sizeof(struct fib6_rule
),
501 .addr_size
= sizeof(struct in6_addr
),
502 .action
= fib6_rule_action
,
503 .match
= fib6_rule_match
,
504 .suppress
= fib6_rule_suppress
,
505 .configure
= fib6_rule_configure
,
506 .delete = fib6_rule_delete
,
507 .compare
= fib6_rule_compare
,
508 .fill
= fib6_rule_fill
,
509 .nlmsg_payload
= fib6_rule_nlmsg_payload
,
510 .flush_cache
= fib6_rule_flush_cache
,
511 .nlgroup
= RTNLGRP_IPV6_RULE
,
512 .owner
= THIS_MODULE
,
513 .fro_net
= &init_net
,
516 static int __net_init
fib6_rules_net_init(struct net
*net
)
518 struct fib_rules_ops
*ops
;
521 ops
= fib_rules_register(&fib6_rules_ops_template
, net
);
525 err
= fib_default_rule_add(ops
, 0, RT6_TABLE_LOCAL
);
527 goto out_fib6_rules_ops
;
529 err
= fib_default_rule_add(ops
, 0x7FFE, RT6_TABLE_MAIN
);
531 goto out_fib6_rules_ops
;
533 net
->ipv6
.fib6_rules_ops
= ops
;
534 net
->ipv6
.fib6_rules_require_fldissect
= 0;
539 fib_rules_unregister(ops
);
543 static void __net_exit
fib6_rules_net_exit_batch(struct list_head
*net_list
)
548 list_for_each_entry(net
, net_list
, exit_list
) {
549 fib_rules_unregister(net
->ipv6
.fib6_rules_ops
);
555 static struct pernet_operations fib6_rules_net_ops
= {
556 .init
= fib6_rules_net_init
,
557 .exit_batch
= fib6_rules_net_exit_batch
,
560 int __init
fib6_rules_init(void)
562 return register_pernet_subsys(&fib6_rules_net_ops
);
566 void fib6_rules_cleanup(void)
568 unregister_pernet_subsys(&fib6_rules_net_ops
);