1 // SPDX-License-Identifier: GPL-2.0-or-later
3 * INET An implementation of the TCP/IP protocol suite for the LINUX
4 * operating system. INET is implemented using the BSD Socket
5 * interface as the means of communication with the user level.
7 * IPv4 Forwarding Information Base: policy rules.
9 * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
10 * Thomas Graf <tgraf@suug.ch>
13 * Rani Assaf : local_rule cannot be deleted
14 * Marc Boucher : routing by fwmark
17 #include <linux/types.h>
18 #include <linux/kernel.h>
19 #include <linux/netdevice.h>
20 #include <linux/netlink.h>
21 #include <linux/inetdevice.h>
22 #include <linux/init.h>
23 #include <linux/list.h>
24 #include <linux/rcupdate.h>
25 #include <linux/export.h>
27 #include <net/route.h>
29 #include <net/ip_fib.h>
30 #include <net/nexthop.h>
31 #include <net/fib_rules.h>
32 #include <linux/indirect_call_wrapper.h>
35 struct fib_rule common
;
43 #ifdef CONFIG_IP_ROUTE_CLASSID
48 static bool fib4_rule_matchall(const struct fib_rule
*rule
)
50 struct fib4_rule
*r
= container_of(rule
, struct fib4_rule
, common
);
52 if (r
->dst_len
|| r
->src_len
|| r
->tos
)
54 return fib_rule_matchall(rule
);
57 bool fib4_rule_default(const struct fib_rule
*rule
)
59 if (!fib4_rule_matchall(rule
) || rule
->action
!= FR_ACT_TO_TBL
||
62 if (rule
->table
!= RT_TABLE_LOCAL
&& rule
->table
!= RT_TABLE_MAIN
&&
63 rule
->table
!= RT_TABLE_DEFAULT
)
67 EXPORT_SYMBOL_GPL(fib4_rule_default
);
69 int fib4_rules_dump(struct net
*net
, struct notifier_block
*nb
,
70 struct netlink_ext_ack
*extack
)
72 return fib_rules_dump(net
, nb
, AF_INET
, extack
);
75 unsigned int fib4_rules_seq_read(struct net
*net
)
77 return fib_rules_seq_read(net
, AF_INET
);
80 int __fib_lookup(struct net
*net
, struct flowi4
*flp
,
81 struct fib_result
*res
, unsigned int flags
)
83 struct fib_lookup_arg arg
= {
89 /* update flow if oif or iif point to device enslaved to l3mdev */
90 l3mdev_update_flow(net
, flowi4_to_flowi(flp
));
92 err
= fib_rules_lookup(net
->ipv4
.rules_ops
, flowi4_to_flowi(flp
), 0, &arg
);
93 #ifdef CONFIG_IP_ROUTE_CLASSID
95 res
->tclassid
= ((struct fib4_rule
*)arg
.rule
)->tclassid
;
105 EXPORT_SYMBOL_GPL(__fib_lookup
);
107 INDIRECT_CALLABLE_SCOPE
int fib4_rule_action(struct fib_rule
*rule
,
108 struct flowi
*flp
, int flags
,
109 struct fib_lookup_arg
*arg
)
112 struct fib_table
*tbl
;
115 switch (rule
->action
) {
119 case FR_ACT_UNREACHABLE
:
122 case FR_ACT_PROHIBIT
:
125 case FR_ACT_BLACKHOLE
:
132 tb_id
= fib_rule_get_table(rule
, arg
);
133 tbl
= fib_get_table(rule
->fr_net
, tb_id
);
135 err
= fib_table_lookup(tbl
, &flp
->u
.ip4
,
136 (struct fib_result
*)arg
->result
,
143 INDIRECT_CALLABLE_SCOPE
bool fib4_rule_suppress(struct fib_rule
*rule
,
144 struct fib_lookup_arg
*arg
)
146 struct fib_result
*result
= (struct fib_result
*) arg
->result
;
147 struct net_device
*dev
= NULL
;
150 struct fib_nh_common
*nhc
= fib_info_nhc(result
->fi
, 0);
155 /* do not accept result if the route does
156 * not meet the required prefix length
158 if (result
->prefixlen
<= rule
->suppress_prefixlen
)
161 /* do not accept result if the route uses a device
162 * belonging to a forbidden interface group
164 if (rule
->suppress_ifgroup
!= -1 && dev
&& dev
->group
== rule
->suppress_ifgroup
)
170 if (!(arg
->flags
& FIB_LOOKUP_NOREF
))
171 fib_info_put(result
->fi
);
175 INDIRECT_CALLABLE_SCOPE
int fib4_rule_match(struct fib_rule
*rule
,
176 struct flowi
*fl
, int flags
)
178 struct fib4_rule
*r
= (struct fib4_rule
*) rule
;
179 struct flowi4
*fl4
= &fl
->u
.ip4
;
180 __be32 daddr
= fl4
->daddr
;
181 __be32 saddr
= fl4
->saddr
;
183 if (((saddr
^ r
->src
) & r
->srcmask
) ||
184 ((daddr
^ r
->dst
) & r
->dstmask
))
187 if (r
->tos
&& (r
->tos
!= fl4
->flowi4_tos
))
190 if (rule
->ip_proto
&& (rule
->ip_proto
!= fl4
->flowi4_proto
))
193 if (fib_rule_port_range_set(&rule
->sport_range
) &&
194 !fib_rule_port_inrange(&rule
->sport_range
, fl4
->fl4_sport
))
197 if (fib_rule_port_range_set(&rule
->dport_range
) &&
198 !fib_rule_port_inrange(&rule
->dport_range
, fl4
->fl4_dport
))
204 static struct fib_table
*fib_empty_table(struct net
*net
)
209 if (!fib_get_table(net
, id
))
210 return fib_new_table(net
, id
);
212 if (id
++ == RT_TABLE_MAX
)
218 static const struct nla_policy fib4_rule_policy
[FRA_MAX
+1] = {
220 [FRA_FLOW
] = { .type
= NLA_U32
},
223 static int fib4_rule_configure(struct fib_rule
*rule
, struct sk_buff
*skb
,
224 struct fib_rule_hdr
*frh
,
226 struct netlink_ext_ack
*extack
)
228 struct net
*net
= sock_net(skb
->sk
);
230 struct fib4_rule
*rule4
= (struct fib4_rule
*) rule
;
232 if (frh
->tos
& ~IPTOS_TOS_MASK
) {
233 NL_SET_ERR_MSG(extack
, "Invalid tos");
237 /* split local/main if they are not already split */
238 err
= fib_unmerge(net
);
242 if (rule
->table
== RT_TABLE_UNSPEC
&& !rule
->l3mdev
) {
243 if (rule
->action
== FR_ACT_TO_TBL
) {
244 struct fib_table
*table
;
246 table
= fib_empty_table(net
);
252 rule
->table
= table
->tb_id
;
257 rule4
->src
= nla_get_in_addr(tb
[FRA_SRC
]);
260 rule4
->dst
= nla_get_in_addr(tb
[FRA_DST
]);
262 #ifdef CONFIG_IP_ROUTE_CLASSID
264 rule4
->tclassid
= nla_get_u32(tb
[FRA_FLOW
]);
266 net
->ipv4
.fib_num_tclassid_users
++;
270 if (fib_rule_requires_fldissect(rule
))
271 net
->ipv4
.fib_rules_require_fldissect
++;
273 rule4
->src_len
= frh
->src_len
;
274 rule4
->srcmask
= inet_make_mask(rule4
->src_len
);
275 rule4
->dst_len
= frh
->dst_len
;
276 rule4
->dstmask
= inet_make_mask(rule4
->dst_len
);
277 rule4
->tos
= frh
->tos
;
279 net
->ipv4
.fib_has_custom_rules
= true;
286 static int fib4_rule_delete(struct fib_rule
*rule
)
288 struct net
*net
= rule
->fr_net
;
291 /* split local/main if they are not already split */
292 err
= fib_unmerge(net
);
296 #ifdef CONFIG_IP_ROUTE_CLASSID
297 if (((struct fib4_rule
*)rule
)->tclassid
)
298 net
->ipv4
.fib_num_tclassid_users
--;
300 net
->ipv4
.fib_has_custom_rules
= true;
302 if (net
->ipv4
.fib_rules_require_fldissect
&&
303 fib_rule_requires_fldissect(rule
))
304 net
->ipv4
.fib_rules_require_fldissect
--;
309 static int fib4_rule_compare(struct fib_rule
*rule
, struct fib_rule_hdr
*frh
,
312 struct fib4_rule
*rule4
= (struct fib4_rule
*) rule
;
314 if (frh
->src_len
&& (rule4
->src_len
!= frh
->src_len
))
317 if (frh
->dst_len
&& (rule4
->dst_len
!= frh
->dst_len
))
320 if (frh
->tos
&& (rule4
->tos
!= frh
->tos
))
323 #ifdef CONFIG_IP_ROUTE_CLASSID
324 if (tb
[FRA_FLOW
] && (rule4
->tclassid
!= nla_get_u32(tb
[FRA_FLOW
])))
328 if (frh
->src_len
&& (rule4
->src
!= nla_get_in_addr(tb
[FRA_SRC
])))
331 if (frh
->dst_len
&& (rule4
->dst
!= nla_get_in_addr(tb
[FRA_DST
])))
337 static int fib4_rule_fill(struct fib_rule
*rule
, struct sk_buff
*skb
,
338 struct fib_rule_hdr
*frh
)
340 struct fib4_rule
*rule4
= (struct fib4_rule
*) rule
;
342 frh
->dst_len
= rule4
->dst_len
;
343 frh
->src_len
= rule4
->src_len
;
344 frh
->tos
= rule4
->tos
;
346 if ((rule4
->dst_len
&&
347 nla_put_in_addr(skb
, FRA_DST
, rule4
->dst
)) ||
349 nla_put_in_addr(skb
, FRA_SRC
, rule4
->src
)))
350 goto nla_put_failure
;
351 #ifdef CONFIG_IP_ROUTE_CLASSID
352 if (rule4
->tclassid
&&
353 nla_put_u32(skb
, FRA_FLOW
, rule4
->tclassid
))
354 goto nla_put_failure
;
362 static size_t fib4_rule_nlmsg_payload(struct fib_rule
*rule
)
364 return nla_total_size(4) /* dst */
365 + nla_total_size(4) /* src */
366 + nla_total_size(4); /* flow */
369 static void fib4_rule_flush_cache(struct fib_rules_ops
*ops
)
371 rt_cache_flush(ops
->fro_net
);
374 static const struct fib_rules_ops __net_initconst fib4_rules_ops_template
= {
376 .rule_size
= sizeof(struct fib4_rule
),
377 .addr_size
= sizeof(u32
),
378 .action
= fib4_rule_action
,
379 .suppress
= fib4_rule_suppress
,
380 .match
= fib4_rule_match
,
381 .configure
= fib4_rule_configure
,
382 .delete = fib4_rule_delete
,
383 .compare
= fib4_rule_compare
,
384 .fill
= fib4_rule_fill
,
385 .nlmsg_payload
= fib4_rule_nlmsg_payload
,
386 .flush_cache
= fib4_rule_flush_cache
,
387 .nlgroup
= RTNLGRP_IPV4_RULE
,
388 .policy
= fib4_rule_policy
,
389 .owner
= THIS_MODULE
,
392 static int fib_default_rules_init(struct fib_rules_ops
*ops
)
396 err
= fib_default_rule_add(ops
, 0, RT_TABLE_LOCAL
, 0);
399 err
= fib_default_rule_add(ops
, 0x7FFE, RT_TABLE_MAIN
, 0);
402 err
= fib_default_rule_add(ops
, 0x7FFF, RT_TABLE_DEFAULT
, 0);
408 int __net_init
fib4_rules_init(struct net
*net
)
411 struct fib_rules_ops
*ops
;
413 ops
= fib_rules_register(&fib4_rules_ops_template
, net
);
417 err
= fib_default_rules_init(ops
);
420 net
->ipv4
.rules_ops
= ops
;
421 net
->ipv4
.fib_has_custom_rules
= false;
422 net
->ipv4
.fib_rules_require_fldissect
= 0;
426 /* also cleans all rules already added */
427 fib_rules_unregister(ops
);
431 void __net_exit
fib4_rules_exit(struct net
*net
)
433 fib_rules_unregister(net
->ipv4
.rules_ops
);