2 * net/ipv6/fib6_rules.c IPv6 Routing Policy Rules
4 * Copyright (C)2003-2006 Helsinki University of Technology
5 * Copyright (C)2003-2006 USAGI/WIDE Project
7 * This program is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU General Public License as
9 * published by the Free Software Foundation, version 2.
12 * Thomas Graf <tgraf@suug.ch>
13 * Ville Nuorvala <vnuorval@tcs.hut.fi>
16 #include <linux/netdevice.h>
17 #include <linux/notifier.h>
18 #include <linux/export.h>
20 #include <net/fib_rules.h>
22 #include <net/addrconf.h>
23 #include <net/ip6_route.h>
24 #include <net/netlink.h>
27 struct fib_rule common
;
33 static bool fib6_rule_matchall(const struct fib_rule
*rule
)
35 struct fib6_rule
*r
= container_of(rule
, struct fib6_rule
, common
);
37 if (r
->dst
.plen
|| r
->src
.plen
|| r
->tclass
)
39 return fib_rule_matchall(rule
);
42 bool fib6_rule_default(const struct fib_rule
*rule
)
44 if (!fib6_rule_matchall(rule
) || rule
->action
!= FR_ACT_TO_TBL
||
47 if (rule
->table
!= RT6_TABLE_LOCAL
&& rule
->table
!= RT6_TABLE_MAIN
)
51 EXPORT_SYMBOL_GPL(fib6_rule_default
);
53 int fib6_rules_dump(struct net
*net
, struct notifier_block
*nb
)
55 return fib_rules_dump(net
, nb
, AF_INET6
);
58 unsigned int fib6_rules_seq_read(struct net
*net
)
60 return fib_rules_seq_read(net
, AF_INET6
);
63 struct dst_entry
*fib6_rule_lookup(struct net
*net
, struct flowi6
*fl6
,
64 const struct sk_buff
*skb
,
65 int flags
, pol_lookup_t lookup
)
67 if (net
->ipv6
.fib6_has_custom_rules
) {
68 struct fib_lookup_arg arg
= {
71 .flags
= FIB_LOOKUP_NOREF
,
74 /* update flow if oif or iif point to device enslaved to l3mdev */
75 l3mdev_update_flow(net
, flowi6_to_flowi(fl6
));
77 fib_rules_lookup(net
->ipv6
.fib6_rules_ops
,
78 flowi6_to_flowi(fl6
), flags
, &arg
);
85 rt
= lookup(net
, net
->ipv6
.fib6_local_tbl
, fl6
, skb
, flags
);
86 if (rt
!= net
->ipv6
.ip6_null_entry
&& rt
->dst
.error
!= -EAGAIN
)
89 rt
= lookup(net
, net
->ipv6
.fib6_main_tbl
, fl6
, skb
, flags
);
90 if (rt
->dst
.error
!= -EAGAIN
)
95 dst_hold(&net
->ipv6
.ip6_null_entry
->dst
);
96 return &net
->ipv6
.ip6_null_entry
->dst
;
99 static int fib6_rule_action(struct fib_rule
*rule
, struct flowi
*flp
,
100 int flags
, struct fib_lookup_arg
*arg
)
102 struct flowi6
*flp6
= &flp
->u
.ip6
;
103 struct rt6_info
*rt
= NULL
;
104 struct fib6_table
*table
;
105 struct net
*net
= rule
->fr_net
;
106 pol_lookup_t lookup
= arg
->lookup_ptr
;
110 switch (rule
->action
) {
113 case FR_ACT_UNREACHABLE
:
115 rt
= net
->ipv6
.ip6_null_entry
;
118 case FR_ACT_BLACKHOLE
:
120 rt
= net
->ipv6
.ip6_blk_hole_entry
;
122 case FR_ACT_PROHIBIT
:
124 rt
= net
->ipv6
.ip6_prohibit_entry
;
128 tb_id
= fib_rule_get_table(rule
, arg
);
129 table
= fib6_get_table(net
, tb_id
);
135 rt
= lookup(net
, table
, flp6
, arg
->lookup_data
, flags
);
136 if (rt
!= net
->ipv6
.ip6_null_entry
) {
137 struct fib6_rule
*r
= (struct fib6_rule
*)rule
;
140 * If we need to find a source address for this traffic,
141 * we check the result if it meets requirement of the rule.
143 if ((rule
->flags
& FIB_RULE_FIND_SADDR
) &&
144 r
->src
.plen
&& !(flags
& RT6_LOOKUP_F_HAS_SADDR
)) {
145 struct in6_addr saddr
;
147 if (ipv6_dev_get_saddr(net
,
148 ip6_dst_idev(&rt
->dst
)->dev
,
150 rt6_flags2srcprefs(flags
),
153 if (!ipv6_prefix_equal(&saddr
, &r
->src
.addr
,
175 static bool fib6_rule_suppress(struct fib_rule
*rule
, struct fib_lookup_arg
*arg
)
177 struct rt6_info
*rt
= (struct rt6_info
*) arg
->result
;
178 struct net_device
*dev
= NULL
;
181 dev
= rt
->rt6i_idev
->dev
;
183 /* do not accept result if the route does
184 * not meet the required prefix length
186 if (rt
->rt6i_dst
.plen
<= rule
->suppress_prefixlen
)
189 /* do not accept result if the route uses a device
190 * belonging to a forbidden interface group
192 if (rule
->suppress_ifgroup
!= -1 && dev
&& dev
->group
== rule
->suppress_ifgroup
)
202 static int fib6_rule_match(struct fib_rule
*rule
, struct flowi
*fl
, int flags
)
204 struct fib6_rule
*r
= (struct fib6_rule
*) rule
;
205 struct flowi6
*fl6
= &fl
->u
.ip6
;
208 !ipv6_prefix_equal(&fl6
->daddr
, &r
->dst
.addr
, r
->dst
.plen
))
212 * If FIB_RULE_FIND_SADDR is set and we do not have a
213 * source address for the traffic, we defer check for
217 if (flags
& RT6_LOOKUP_F_HAS_SADDR
) {
218 if (!ipv6_prefix_equal(&fl6
->saddr
, &r
->src
.addr
,
221 } else if (!(r
->common
.flags
& FIB_RULE_FIND_SADDR
))
225 if (r
->tclass
&& r
->tclass
!= ip6_tclass(fl6
->flowlabel
))
228 if (rule
->ip_proto
&& (rule
->ip_proto
!= fl6
->flowi6_proto
))
231 if (fib_rule_port_range_set(&rule
->sport_range
) &&
232 !fib_rule_port_inrange(&rule
->sport_range
, fl6
->fl6_sport
))
235 if (fib_rule_port_range_set(&rule
->dport_range
) &&
236 !fib_rule_port_inrange(&rule
->dport_range
, fl6
->fl6_dport
))
242 static const struct nla_policy fib6_rule_policy
[FRA_MAX
+1] = {
246 static int fib6_rule_configure(struct fib_rule
*rule
, struct sk_buff
*skb
,
247 struct fib_rule_hdr
*frh
,
251 struct net
*net
= sock_net(skb
->sk
);
252 struct fib6_rule
*rule6
= (struct fib6_rule
*) rule
;
254 if (rule
->action
== FR_ACT_TO_TBL
&& !rule
->l3mdev
) {
255 if (rule
->table
== RT6_TABLE_UNSPEC
)
258 if (fib6_new_table(net
, rule
->table
) == NULL
) {
265 rule6
->src
.addr
= nla_get_in6_addr(tb
[FRA_SRC
]);
268 rule6
->dst
.addr
= nla_get_in6_addr(tb
[FRA_DST
]);
270 rule6
->src
.plen
= frh
->src_len
;
271 rule6
->dst
.plen
= frh
->dst_len
;
272 rule6
->tclass
= frh
->tos
;
274 if (fib_rule_requires_fldissect(rule
))
275 net
->ipv6
.fib6_rules_require_fldissect
++;
277 net
->ipv6
.fib6_has_custom_rules
= true;
283 static int fib6_rule_delete(struct fib_rule
*rule
)
285 struct net
*net
= rule
->fr_net
;
287 if (net
->ipv6
.fib6_rules_require_fldissect
&&
288 fib_rule_requires_fldissect(rule
))
289 net
->ipv6
.fib6_rules_require_fldissect
--;
294 static int fib6_rule_compare(struct fib_rule
*rule
, struct fib_rule_hdr
*frh
,
297 struct fib6_rule
*rule6
= (struct fib6_rule
*) rule
;
299 if (frh
->src_len
&& (rule6
->src
.plen
!= frh
->src_len
))
302 if (frh
->dst_len
&& (rule6
->dst
.plen
!= frh
->dst_len
))
305 if (frh
->tos
&& (rule6
->tclass
!= frh
->tos
))
309 nla_memcmp(tb
[FRA_SRC
], &rule6
->src
.addr
, sizeof(struct in6_addr
)))
313 nla_memcmp(tb
[FRA_DST
], &rule6
->dst
.addr
, sizeof(struct in6_addr
)))
319 static int fib6_rule_fill(struct fib_rule
*rule
, struct sk_buff
*skb
,
320 struct fib_rule_hdr
*frh
)
322 struct fib6_rule
*rule6
= (struct fib6_rule
*) rule
;
324 frh
->dst_len
= rule6
->dst
.plen
;
325 frh
->src_len
= rule6
->src
.plen
;
326 frh
->tos
= rule6
->tclass
;
328 if ((rule6
->dst
.plen
&&
329 nla_put_in6_addr(skb
, FRA_DST
, &rule6
->dst
.addr
)) ||
331 nla_put_in6_addr(skb
, FRA_SRC
, &rule6
->src
.addr
)))
332 goto nla_put_failure
;
339 static size_t fib6_rule_nlmsg_payload(struct fib_rule
*rule
)
341 return nla_total_size(16) /* dst */
342 + nla_total_size(16); /* src */
345 static const struct fib_rules_ops __net_initconst fib6_rules_ops_template
= {
347 .rule_size
= sizeof(struct fib6_rule
),
348 .addr_size
= sizeof(struct in6_addr
),
349 .action
= fib6_rule_action
,
350 .match
= fib6_rule_match
,
351 .suppress
= fib6_rule_suppress
,
352 .configure
= fib6_rule_configure
,
353 .delete = fib6_rule_delete
,
354 .compare
= fib6_rule_compare
,
355 .fill
= fib6_rule_fill
,
356 .nlmsg_payload
= fib6_rule_nlmsg_payload
,
357 .nlgroup
= RTNLGRP_IPV6_RULE
,
358 .policy
= fib6_rule_policy
,
359 .owner
= THIS_MODULE
,
360 .fro_net
= &init_net
,
363 static int __net_init
fib6_rules_net_init(struct net
*net
)
365 struct fib_rules_ops
*ops
;
368 ops
= fib_rules_register(&fib6_rules_ops_template
, net
);
372 err
= fib_default_rule_add(ops
, 0, RT6_TABLE_LOCAL
, 0);
374 goto out_fib6_rules_ops
;
376 err
= fib_default_rule_add(ops
, 0x7FFE, RT6_TABLE_MAIN
, 0);
378 goto out_fib6_rules_ops
;
380 net
->ipv6
.fib6_rules_ops
= ops
;
381 net
->ipv6
.fib6_rules_require_fldissect
= 0;
386 fib_rules_unregister(ops
);
390 static void __net_exit
fib6_rules_net_exit(struct net
*net
)
393 fib_rules_unregister(net
->ipv6
.fib6_rules_ops
);
397 static struct pernet_operations fib6_rules_net_ops
= {
398 .init
= fib6_rules_net_init
,
399 .exit
= fib6_rules_net_exit
,
402 int __init
fib6_rules_init(void)
404 return register_pernet_subsys(&fib6_rules_net_ops
);
408 void fib6_rules_cleanup(void)
410 unregister_pernet_subsys(&fib6_rules_net_ops
);