1 // SPDX-License-Identifier: GPL-2.0
2 /*
3  *	XFRM virtual interface
4  *
5  *	Copyright (C) 2018 secunet Security Networks AG
6  *
7  *	Author:
8  *	Steffen Klassert <steffen.klassert@secunet.com>
9  */
10 
11 #include <linux/module.h>
12 #include <linux/capability.h>
13 #include <linux/errno.h>
14 #include <linux/types.h>
15 #include <linux/sockios.h>
16 #include <linux/icmp.h>
17 #include <linux/if.h>
18 #include <linux/in.h>
19 #include <linux/ip.h>
20 #include <linux/net.h>
21 #include <linux/in6.h>
22 #include <linux/netdevice.h>
23 #include <linux/if_link.h>
24 #include <linux/if_arp.h>
25 #include <linux/icmpv6.h>
26 #include <linux/init.h>
27 #include <linux/route.h>
28 #include <linux/rtnetlink.h>
29 #include <linux/netfilter_ipv6.h>
30 #include <linux/slab.h>
31 #include <linux/hash.h>
32 
33 #include <linux/uaccess.h>
34 #include <linux/atomic.h>
35 
36 #include <net/icmp.h>
37 #include <net/ip.h>
38 #include <net/ipv6.h>
39 #include <net/ip6_route.h>
40 #include <net/ip_tunnels.h>
41 #include <net/addrconf.h>
42 #include <net/xfrm.h>
43 #include <net/net_namespace.h>
44 #include <net/netns/generic.h>
45 #include <linux/etherdevice.h>
46 
47 static int xfrmi_dev_init(struct net_device *dev);
48 static void xfrmi_dev_setup(struct net_device *dev);
49 static struct rtnl_link_ops xfrmi_link_ops __read_mostly;
50 static unsigned int xfrmi_net_id __read_mostly;
51 static const struct net_device_ops xfrmi_netdev_ops;
52 
53 #define XFRMI_HASH_BITS	8
54 #define XFRMI_HASH_SIZE	BIT(XFRMI_HASH_BITS)
55 
56 struct xfrmi_net {
57 	/* lists for storing interfaces in use */
58 	struct xfrm_if __rcu *xfrmi[XFRMI_HASH_SIZE];
59 };
60 
61 #define for_each_xfrmi_rcu(start, xi) \
62 	for (xi = rcu_dereference(start); xi; xi = rcu_dereference(xi->next))
63 
xfrmi_hash(u32 if_id)64 static u32 xfrmi_hash(u32 if_id)
65 {
66 	return hash_32(if_id, XFRMI_HASH_BITS);
67 }
68 
xfrmi_lookup(struct net *net, struct xfrm_state *x)69 static struct xfrm_if *xfrmi_lookup(struct net *net, struct xfrm_state *x)
70 {
71 	struct xfrmi_net *xfrmn = net_generic(net, xfrmi_net_id);
72 	struct xfrm_if *xi;
73 
74 	for_each_xfrmi_rcu(xfrmn->xfrmi[xfrmi_hash(x->if_id)], xi) {
75 		if (x->if_id == xi->p.if_id &&
76 		    (xi->dev->flags & IFF_UP))
77 			return xi;
78 	}
79 
80 	return NULL;
81 }
82 
xfrmi_decode_session(struct sk_buff *skb, unsigned short family)83 static struct xfrm_if *xfrmi_decode_session(struct sk_buff *skb,
84 					    unsigned short family)
85 {
86 	struct net_device *dev;
87 	int ifindex = 0;
88 
89 	if (!secpath_exists(skb) || !skb->dev)
90 		return NULL;
91 
92 	switch (family) {
93 	case AF_INET6:
94 		ifindex = inet6_sdif(skb);
95 		break;
96 	case AF_INET:
97 		ifindex = inet_sdif(skb);
98 		break;
99 	}
100 
101 	if (ifindex) {
102 		struct net *net = xs_net(xfrm_input_state(skb));
103 
104 		dev = dev_get_by_index_rcu(net, ifindex);
105 	} else {
106 		dev = skb->dev;
107 	}
108 
109 	if (!dev || !(dev->flags & IFF_UP))
110 		return NULL;
111 	if (dev->netdev_ops != &xfrmi_netdev_ops)
112 		return NULL;
113 
114 	return netdev_priv(dev);
115 }
116 
xfrmi_link(struct xfrmi_net *xfrmn, struct xfrm_if *xi)117 static void xfrmi_link(struct xfrmi_net *xfrmn, struct xfrm_if *xi)
118 {
119 	struct xfrm_if __rcu **xip = &xfrmn->xfrmi[xfrmi_hash(xi->p.if_id)];
120 
121 	rcu_assign_pointer(xi->next , rtnl_dereference(*xip));
122 	rcu_assign_pointer(*xip, xi);
123 }
124 
xfrmi_unlink(struct xfrmi_net *xfrmn, struct xfrm_if *xi)125 static void xfrmi_unlink(struct xfrmi_net *xfrmn, struct xfrm_if *xi)
126 {
127 	struct xfrm_if __rcu **xip;
128 	struct xfrm_if *iter;
129 
130 	for (xip = &xfrmn->xfrmi[xfrmi_hash(xi->p.if_id)];
131 	     (iter = rtnl_dereference(*xip)) != NULL;
132 	     xip = &iter->next) {
133 		if (xi == iter) {
134 			rcu_assign_pointer(*xip, xi->next);
135 			break;
136 		}
137 	}
138 }
139 
xfrmi_dev_free(struct net_device *dev)140 static void xfrmi_dev_free(struct net_device *dev)
141 {
142 	struct xfrm_if *xi = netdev_priv(dev);
143 
144 	gro_cells_destroy(&xi->gro_cells);
145 	free_percpu(dev->tstats);
146 }
147 
xfrmi_create(struct net_device *dev)148 static int xfrmi_create(struct net_device *dev)
149 {
150 	struct xfrm_if *xi = netdev_priv(dev);
151 	struct net *net = dev_net(dev);
152 	struct xfrmi_net *xfrmn = net_generic(net, xfrmi_net_id);
153 	int err;
154 
155 	dev->rtnl_link_ops = &xfrmi_link_ops;
156 	err = register_netdevice(dev);
157 	if (err < 0)
158 		goto out;
159 
160 	xfrmi_link(xfrmn, xi);
161 
162 	return 0;
163 
164 out:
165 	return err;
166 }
167 
xfrmi_locate(struct net *net, struct xfrm_if_parms *p)168 static struct xfrm_if *xfrmi_locate(struct net *net, struct xfrm_if_parms *p)
169 {
170 	struct xfrm_if __rcu **xip;
171 	struct xfrm_if *xi;
172 	struct xfrmi_net *xfrmn = net_generic(net, xfrmi_net_id);
173 
174 	for (xip = &xfrmn->xfrmi[xfrmi_hash(p->if_id)];
175 	     (xi = rtnl_dereference(*xip)) != NULL;
176 	     xip = &xi->next)
177 		if (xi->p.if_id == p->if_id)
178 			return xi;
179 
180 	return NULL;
181 }
182 
xfrmi_dev_uninit(struct net_device *dev)183 static void xfrmi_dev_uninit(struct net_device *dev)
184 {
185 	struct xfrm_if *xi = netdev_priv(dev);
186 	struct xfrmi_net *xfrmn = net_generic(xi->net, xfrmi_net_id);
187 
188 	xfrmi_unlink(xfrmn, xi);
189 }
190 
xfrmi_scrub_packet(struct sk_buff *skb, bool xnet)191 static void xfrmi_scrub_packet(struct sk_buff *skb, bool xnet)
192 {
193 	skb->tstamp = 0;
194 	skb->pkt_type = PACKET_HOST;
195 	skb->skb_iif = 0;
196 	skb->ignore_df = 0;
197 	skb_dst_drop(skb);
198 	nf_reset_ct(skb);
199 	nf_reset_trace(skb);
200 
201 	if (!xnet)
202 		return;
203 
204 	ipvs_reset(skb);
205 	secpath_reset(skb);
206 	skb_orphan(skb);
207 	skb->mark = 0;
208 }
209 
xfrmi_input(struct sk_buff *skb, int nexthdr, __be32 spi, int encap_type, unsigned short family)210 static int xfrmi_input(struct sk_buff *skb, int nexthdr, __be32 spi,
211 		       int encap_type, unsigned short family)
212 {
213 	struct sec_path *sp;
214 
215 	sp = skb_sec_path(skb);
216 	if (sp && (sp->len || sp->olen) &&
217 	    !xfrm_policy_check(NULL, XFRM_POLICY_IN, skb, family))
218 		goto discard;
219 
220 	XFRM_SPI_SKB_CB(skb)->family = family;
221 	if (family == AF_INET) {
222 		XFRM_SPI_SKB_CB(skb)->daddroff = offsetof(struct iphdr, daddr);
223 		XFRM_TUNNEL_SKB_CB(skb)->tunnel.ip4 = NULL;
224 	} else {
225 		XFRM_SPI_SKB_CB(skb)->daddroff = offsetof(struct ipv6hdr, daddr);
226 		XFRM_TUNNEL_SKB_CB(skb)->tunnel.ip6 = NULL;
227 	}
228 
229 	return xfrm_input(skb, nexthdr, spi, encap_type);
230 discard:
231 	kfree_skb(skb);
232 	return 0;
233 }
234 
xfrmi4_rcv(struct sk_buff *skb)235 static int xfrmi4_rcv(struct sk_buff *skb)
236 {
237 	return xfrmi_input(skb, ip_hdr(skb)->protocol, 0, 0, AF_INET);
238 }
239 
xfrmi6_rcv(struct sk_buff *skb)240 static int xfrmi6_rcv(struct sk_buff *skb)
241 {
242 	return xfrmi_input(skb, skb_network_header(skb)[IP6CB(skb)->nhoff],
243 			   0, 0, AF_INET6);
244 }
245 
xfrmi4_input(struct sk_buff *skb, int nexthdr, __be32 spi, int encap_type)246 static int xfrmi4_input(struct sk_buff *skb, int nexthdr, __be32 spi, int encap_type)
247 {
248 	return xfrmi_input(skb, nexthdr, spi, encap_type, AF_INET);
249 }
250 
xfrmi6_input(struct sk_buff *skb, int nexthdr, __be32 spi, int encap_type)251 static int xfrmi6_input(struct sk_buff *skb, int nexthdr, __be32 spi, int encap_type)
252 {
253 	return xfrmi_input(skb, nexthdr, spi, encap_type, AF_INET6);
254 }
255 
xfrmi_rcv_cb(struct sk_buff *skb, int err)256 static int xfrmi_rcv_cb(struct sk_buff *skb, int err)
257 {
258 	const struct xfrm_mode *inner_mode;
259 	struct net_device *dev;
260 	struct xfrm_state *x;
261 	struct xfrm_if *xi;
262 	bool xnet;
263 
264 	if (err && !secpath_exists(skb))
265 		return 0;
266 
267 	x = xfrm_input_state(skb);
268 
269 	xi = xfrmi_lookup(xs_net(x), x);
270 	if (!xi)
271 		return 1;
272 
273 	dev = xi->dev;
274 	skb->dev = dev;
275 
276 	if (err) {
277 		DEV_STATS_INC(dev, rx_errors);
278 		DEV_STATS_INC(dev, rx_dropped);
279 
280 		return 0;
281 	}
282 
283 	xnet = !net_eq(xi->net, dev_net(skb->dev));
284 
285 	if (xnet) {
286 		inner_mode = &x->inner_mode;
287 
288 		if (x->sel.family == AF_UNSPEC) {
289 			inner_mode = xfrm_ip2inner_mode(x, XFRM_MODE_SKB_CB(skb)->protocol);
290 			if (inner_mode == NULL) {
291 				XFRM_INC_STATS(dev_net(skb->dev),
292 					       LINUX_MIB_XFRMINSTATEMODEERROR);
293 				return -EINVAL;
294 			}
295 		}
296 
297 		if (!xfrm_policy_check(NULL, XFRM_POLICY_IN, skb,
298 				       inner_mode->family))
299 			return -EPERM;
300 	}
301 
302 	xfrmi_scrub_packet(skb, xnet);
303 	dev_sw_netstats_rx_add(dev, skb->len);
304 
305 	return 0;
306 }
307 
308 static int
xfrmi_xmit2(struct sk_buff *skb, struct net_device *dev, struct flowi *fl)309 xfrmi_xmit2(struct sk_buff *skb, struct net_device *dev, struct flowi *fl)
310 {
311 	struct xfrm_if *xi = netdev_priv(dev);
312 	struct dst_entry *dst = skb_dst(skb);
313 	unsigned int length = skb->len;
314 	struct net_device *tdev;
315 	struct xfrm_state *x;
316 	int err = -1;
317 	int mtu;
318 
319 	dst_hold(dst);
320 	dst = xfrm_lookup_with_ifid(xi->net, dst, fl, NULL, 0, xi->p.if_id);
321 	if (IS_ERR(dst)) {
322 		err = PTR_ERR(dst);
323 		dst = NULL;
324 		goto tx_err_link_failure;
325 	}
326 
327 	x = dst->xfrm;
328 	if (!x)
329 		goto tx_err_link_failure;
330 
331 	if (x->if_id != xi->p.if_id)
332 		goto tx_err_link_failure;
333 
334 	tdev = dst->dev;
335 
336 	if (tdev == dev) {
337 		DEV_STATS_INC(dev, collisions);
338 		net_warn_ratelimited("%s: Local routing loop detected!\n",
339 				     dev->name);
340 		goto tx_err_dst_release;
341 	}
342 
343 	mtu = dst_mtu(dst);
344 	if (skb->len > mtu) {
345 		skb_dst_update_pmtu_no_confirm(skb, mtu);
346 
347 		if (skb->protocol == htons(ETH_P_IPV6)) {
348 			if (mtu < IPV6_MIN_MTU)
349 				mtu = IPV6_MIN_MTU;
350 
351 			if (skb->len > 1280)
352 				icmpv6_ndo_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
353 			else
354 				goto xmit;
355 		} else {
356 			if (!(ip_hdr(skb)->frag_off & htons(IP_DF)))
357 				goto xmit;
358 			icmp_ndo_send(skb, ICMP_DEST_UNREACH, ICMP_FRAG_NEEDED,
359 				      htonl(mtu));
360 		}
361 
362 		dst_release(dst);
363 		return -EMSGSIZE;
364 	}
365 
366 xmit:
367 	xfrmi_scrub_packet(skb, !net_eq(xi->net, dev_net(dev)));
368 	skb_dst_set(skb, dst);
369 	skb->dev = tdev;
370 
371 	err = dst_output(xi->net, skb->sk, skb);
372 	if (net_xmit_eval(err) == 0) {
373 		struct pcpu_sw_netstats *tstats = this_cpu_ptr(dev->tstats);
374 
375 		u64_stats_update_begin(&tstats->syncp);
376 		tstats->tx_bytes += length;
377 		tstats->tx_packets++;
378 		u64_stats_update_end(&tstats->syncp);
379 	} else {
380 		DEV_STATS_INC(dev, tx_errors);
381 		DEV_STATS_INC(dev, tx_aborted_errors);
382 	}
383 
384 	return 0;
385 tx_err_link_failure:
386 	DEV_STATS_INC(dev, tx_carrier_errors);
387 	dst_link_failure(skb);
388 tx_err_dst_release:
389 	dst_release(dst);
390 	return err;
391 }
392 
xfrmi_xmit(struct sk_buff *skb, struct net_device *dev)393 static netdev_tx_t xfrmi_xmit(struct sk_buff *skb, struct net_device *dev)
394 {
395 	struct xfrm_if *xi = netdev_priv(dev);
396 	struct dst_entry *dst = skb_dst(skb);
397 	struct flowi fl;
398 	int ret;
399 
400 	memset(&fl, 0, sizeof(fl));
401 
402 	switch (skb->protocol) {
403 	case htons(ETH_P_IPV6):
404 		memset(IP6CB(skb), 0, sizeof(*IP6CB(skb)));
405 		xfrm_decode_session(skb, &fl, AF_INET6);
406 		if (!dst) {
407 			fl.u.ip6.flowi6_oif = dev->ifindex;
408 			fl.u.ip6.flowi6_flags |= FLOWI_FLAG_ANYSRC;
409 			dst = ip6_route_output(dev_net(dev), NULL, &fl.u.ip6);
410 			if (dst->error) {
411 				dst_release(dst);
412 				DEV_STATS_INC(dev, tx_carrier_errors);
413 				goto tx_err;
414 			}
415 			skb_dst_set(skb, dst);
416 		}
417 		break;
418 	case htons(ETH_P_IP):
419 		memset(IPCB(skb), 0, sizeof(*IPCB(skb)));
420 		xfrm_decode_session(skb, &fl, AF_INET);
421 		if (!dst) {
422 			struct rtable *rt;
423 
424 			fl.u.ip4.flowi4_oif = dev->ifindex;
425 			fl.u.ip4.flowi4_flags |= FLOWI_FLAG_ANYSRC;
426 			rt = __ip_route_output_key(dev_net(dev), &fl.u.ip4);
427 			if (IS_ERR(rt)) {
428 				DEV_STATS_INC(dev, tx_carrier_errors);
429 				goto tx_err;
430 			}
431 			skb_dst_set(skb, &rt->dst);
432 		}
433 		break;
434 	default:
435 		goto tx_err;
436 	}
437 
438 	fl.flowi_oif = xi->p.link;
439 
440 	ret = xfrmi_xmit2(skb, dev, &fl);
441 	if (ret < 0)
442 		goto tx_err;
443 
444 	return NETDEV_TX_OK;
445 
446 tx_err:
447 	DEV_STATS_INC(dev, tx_errors);
448 	DEV_STATS_INC(dev, tx_dropped);
449 	kfree_skb(skb);
450 	return NETDEV_TX_OK;
451 }
452 
xfrmi4_err(struct sk_buff *skb, u32 info)453 static int xfrmi4_err(struct sk_buff *skb, u32 info)
454 {
455 	const struct iphdr *iph = (const struct iphdr *)skb->data;
456 	struct net *net = dev_net(skb->dev);
457 	int protocol = iph->protocol;
458 	struct ip_comp_hdr *ipch;
459 	struct ip_esp_hdr *esph;
460 	struct ip_auth_hdr *ah ;
461 	struct xfrm_state *x;
462 	struct xfrm_if *xi;
463 	__be32 spi;
464 
465 	switch (protocol) {
466 	case IPPROTO_ESP:
467 		esph = (struct ip_esp_hdr *)(skb->data+(iph->ihl<<2));
468 		spi = esph->spi;
469 		break;
470 	case IPPROTO_AH:
471 		ah = (struct ip_auth_hdr *)(skb->data+(iph->ihl<<2));
472 		spi = ah->spi;
473 		break;
474 	case IPPROTO_COMP:
475 		ipch = (struct ip_comp_hdr *)(skb->data+(iph->ihl<<2));
476 		spi = htonl(ntohs(ipch->cpi));
477 		break;
478 	default:
479 		return 0;
480 	}
481 
482 	switch (icmp_hdr(skb)->type) {
483 	case ICMP_DEST_UNREACH:
484 		if (icmp_hdr(skb)->code != ICMP_FRAG_NEEDED)
485 			return 0;
486 	case ICMP_REDIRECT:
487 		break;
488 	default:
489 		return 0;
490 	}
491 
492 	x = xfrm_state_lookup(net, skb->mark, (const xfrm_address_t *)&iph->daddr,
493 			      spi, protocol, AF_INET);
494 	if (!x)
495 		return 0;
496 
497 	xi = xfrmi_lookup(net, x);
498 	if (!xi) {
499 		xfrm_state_put(x);
500 		return -1;
501 	}
502 
503 	if (icmp_hdr(skb)->type == ICMP_DEST_UNREACH)
504 		ipv4_update_pmtu(skb, net, info, 0, protocol);
505 	else
506 		ipv4_redirect(skb, net, 0, protocol);
507 	xfrm_state_put(x);
508 
509 	return 0;
510 }
511 
xfrmi6_err(struct sk_buff *skb, struct inet6_skb_parm *opt, u8 type, u8 code, int offset, __be32 info)512 static int xfrmi6_err(struct sk_buff *skb, struct inet6_skb_parm *opt,
513 		    u8 type, u8 code, int offset, __be32 info)
514 {
515 	const struct ipv6hdr *iph = (const struct ipv6hdr *)skb->data;
516 	struct net *net = dev_net(skb->dev);
517 	int protocol = iph->nexthdr;
518 	struct ip_comp_hdr *ipch;
519 	struct ip_esp_hdr *esph;
520 	struct ip_auth_hdr *ah;
521 	struct xfrm_state *x;
522 	struct xfrm_if *xi;
523 	__be32 spi;
524 
525 	switch (protocol) {
526 	case IPPROTO_ESP:
527 		esph = (struct ip_esp_hdr *)(skb->data + offset);
528 		spi = esph->spi;
529 		break;
530 	case IPPROTO_AH:
531 		ah = (struct ip_auth_hdr *)(skb->data + offset);
532 		spi = ah->spi;
533 		break;
534 	case IPPROTO_COMP:
535 		ipch = (struct ip_comp_hdr *)(skb->data + offset);
536 		spi = htonl(ntohs(ipch->cpi));
537 		break;
538 	default:
539 		return 0;
540 	}
541 
542 	if (type != ICMPV6_PKT_TOOBIG &&
543 	    type != NDISC_REDIRECT)
544 		return 0;
545 
546 	x = xfrm_state_lookup(net, skb->mark, (const xfrm_address_t *)&iph->daddr,
547 			      spi, protocol, AF_INET6);
548 	if (!x)
549 		return 0;
550 
551 	xi = xfrmi_lookup(net, x);
552 	if (!xi) {
553 		xfrm_state_put(x);
554 		return -1;
555 	}
556 
557 	if (type == NDISC_REDIRECT)
558 		ip6_redirect(skb, net, skb->dev->ifindex, 0,
559 			     sock_net_uid(net, NULL));
560 	else
561 		ip6_update_pmtu(skb, net, info, 0, 0, sock_net_uid(net, NULL));
562 	xfrm_state_put(x);
563 
564 	return 0;
565 }
566 
xfrmi_change(struct xfrm_if *xi, const struct xfrm_if_parms *p)567 static int xfrmi_change(struct xfrm_if *xi, const struct xfrm_if_parms *p)
568 {
569 	if (xi->p.link != p->link)
570 		return -EINVAL;
571 
572 	xi->p.if_id = p->if_id;
573 
574 	return 0;
575 }
576 
xfrmi_update(struct xfrm_if *xi, struct xfrm_if_parms *p)577 static int xfrmi_update(struct xfrm_if *xi, struct xfrm_if_parms *p)
578 {
579 	struct net *net = xi->net;
580 	struct xfrmi_net *xfrmn = net_generic(net, xfrmi_net_id);
581 	int err;
582 
583 	xfrmi_unlink(xfrmn, xi);
584 	synchronize_net();
585 	err = xfrmi_change(xi, p);
586 	xfrmi_link(xfrmn, xi);
587 	netdev_state_change(xi->dev);
588 	return err;
589 }
590 
xfrmi_get_stats64(struct net_device *dev, struct rtnl_link_stats64 *s)591 static void xfrmi_get_stats64(struct net_device *dev,
592 			       struct rtnl_link_stats64 *s)
593 {
594 	dev_fetch_sw_netstats(s, dev->tstats);
595 
596 	s->rx_dropped = dev->stats.rx_dropped;
597 	s->tx_dropped = dev->stats.tx_dropped;
598 }
599 
xfrmi_get_iflink(const struct net_device *dev)600 static int xfrmi_get_iflink(const struct net_device *dev)
601 {
602 	struct xfrm_if *xi = netdev_priv(dev);
603 
604 	return xi->p.link;
605 }
606 
607 
608 static const struct net_device_ops xfrmi_netdev_ops = {
609 	.ndo_init	= xfrmi_dev_init,
610 	.ndo_uninit	= xfrmi_dev_uninit,
611 	.ndo_start_xmit = xfrmi_xmit,
612 	.ndo_get_stats64 = xfrmi_get_stats64,
613 	.ndo_get_iflink = xfrmi_get_iflink,
614 };
615 
xfrmi_dev_setup(struct net_device *dev)616 static void xfrmi_dev_setup(struct net_device *dev)
617 {
618 	dev->netdev_ops 	= &xfrmi_netdev_ops;
619 	dev->header_ops		= &ip_tunnel_header_ops;
620 	dev->type		= ARPHRD_NONE;
621 	dev->mtu		= ETH_DATA_LEN;
622 	dev->min_mtu		= ETH_MIN_MTU;
623 	dev->max_mtu		= IP_MAX_MTU;
624 	dev->flags 		= IFF_NOARP;
625 	dev->needs_free_netdev	= true;
626 	dev->priv_destructor	= xfrmi_dev_free;
627 	netif_keep_dst(dev);
628 
629 	eth_broadcast_addr(dev->broadcast);
630 }
631 
xfrmi_dev_init(struct net_device *dev)632 static int xfrmi_dev_init(struct net_device *dev)
633 {
634 	struct xfrm_if *xi = netdev_priv(dev);
635 	struct net_device *phydev = __dev_get_by_index(xi->net, xi->p.link);
636 	int err;
637 
638 	dev->tstats = netdev_alloc_pcpu_stats(struct pcpu_sw_netstats);
639 	if (!dev->tstats)
640 		return -ENOMEM;
641 
642 	err = gro_cells_init(&xi->gro_cells, dev);
643 	if (err) {
644 		free_percpu(dev->tstats);
645 		return err;
646 	}
647 
648 	dev->features |= NETIF_F_LLTX;
649 
650 	if (phydev) {
651 		dev->needed_headroom = phydev->needed_headroom;
652 		dev->needed_tailroom = phydev->needed_tailroom;
653 
654 		if (is_zero_ether_addr(dev->dev_addr))
655 			eth_hw_addr_inherit(dev, phydev);
656 		if (is_zero_ether_addr(dev->broadcast))
657 			memcpy(dev->broadcast, phydev->broadcast,
658 			       dev->addr_len);
659 	} else {
660 		eth_hw_addr_random(dev);
661 		eth_broadcast_addr(dev->broadcast);
662 	}
663 
664 	return 0;
665 }
666 
xfrmi_validate(struct nlattr *tb[], struct nlattr *data[], struct netlink_ext_ack *extack)667 static int xfrmi_validate(struct nlattr *tb[], struct nlattr *data[],
668 			 struct netlink_ext_ack *extack)
669 {
670 	return 0;
671 }
672 
xfrmi_netlink_parms(struct nlattr *data[], struct xfrm_if_parms *parms)673 static void xfrmi_netlink_parms(struct nlattr *data[],
674 			       struct xfrm_if_parms *parms)
675 {
676 	memset(parms, 0, sizeof(*parms));
677 
678 	if (!data)
679 		return;
680 
681 	if (data[IFLA_XFRM_LINK])
682 		parms->link = nla_get_u32(data[IFLA_XFRM_LINK]);
683 
684 	if (data[IFLA_XFRM_IF_ID])
685 		parms->if_id = nla_get_u32(data[IFLA_XFRM_IF_ID]);
686 }
687 
xfrmi_newlink(struct net *src_net, struct net_device *dev, struct nlattr *tb[], struct nlattr *data[], struct netlink_ext_ack *extack)688 static int xfrmi_newlink(struct net *src_net, struct net_device *dev,
689 			struct nlattr *tb[], struct nlattr *data[],
690 			struct netlink_ext_ack *extack)
691 {
692 	struct net *net = dev_net(dev);
693 	struct xfrm_if_parms p = {};
694 	struct xfrm_if *xi;
695 	int err;
696 
697 	xfrmi_netlink_parms(data, &p);
698 	if (!p.if_id) {
699 		NL_SET_ERR_MSG(extack, "if_id must be non zero");
700 		return -EINVAL;
701 	}
702 
703 	xi = xfrmi_locate(net, &p);
704 	if (xi)
705 		return -EEXIST;
706 
707 	xi = netdev_priv(dev);
708 	xi->p = p;
709 	xi->net = net;
710 	xi->dev = dev;
711 
712 	err = xfrmi_create(dev);
713 	return err;
714 }
715 
xfrmi_dellink(struct net_device *dev, struct list_head *head)716 static void xfrmi_dellink(struct net_device *dev, struct list_head *head)
717 {
718 	unregister_netdevice_queue(dev, head);
719 }
720 
xfrmi_changelink(struct net_device *dev, struct nlattr *tb[], struct nlattr *data[], struct netlink_ext_ack *extack)721 static int xfrmi_changelink(struct net_device *dev, struct nlattr *tb[],
722 			   struct nlattr *data[],
723 			   struct netlink_ext_ack *extack)
724 {
725 	struct xfrm_if *xi = netdev_priv(dev);
726 	struct net *net = xi->net;
727 	struct xfrm_if_parms p = {};
728 
729 	xfrmi_netlink_parms(data, &p);
730 	if (!p.if_id) {
731 		NL_SET_ERR_MSG(extack, "if_id must be non zero");
732 		return -EINVAL;
733 	}
734 
735 	xi = xfrmi_locate(net, &p);
736 	if (!xi) {
737 		xi = netdev_priv(dev);
738 	} else {
739 		if (xi->dev != dev)
740 			return -EEXIST;
741 	}
742 
743 	return xfrmi_update(xi, &p);
744 }
745 
xfrmi_get_size(const struct net_device *dev)746 static size_t xfrmi_get_size(const struct net_device *dev)
747 {
748 	return
749 		/* IFLA_XFRM_LINK */
750 		nla_total_size(4) +
751 		/* IFLA_XFRM_IF_ID */
752 		nla_total_size(4) +
753 		0;
754 }
755 
xfrmi_fill_info(struct sk_buff *skb, const struct net_device *dev)756 static int xfrmi_fill_info(struct sk_buff *skb, const struct net_device *dev)
757 {
758 	struct xfrm_if *xi = netdev_priv(dev);
759 	struct xfrm_if_parms *parm = &xi->p;
760 
761 	if (nla_put_u32(skb, IFLA_XFRM_LINK, parm->link) ||
762 	    nla_put_u32(skb, IFLA_XFRM_IF_ID, parm->if_id))
763 		goto nla_put_failure;
764 	return 0;
765 
766 nla_put_failure:
767 	return -EMSGSIZE;
768 }
769 
xfrmi_get_link_net(const struct net_device *dev)770 static struct net *xfrmi_get_link_net(const struct net_device *dev)
771 {
772 	struct xfrm_if *xi = netdev_priv(dev);
773 
774 	return xi->net;
775 }
776 
777 static const struct nla_policy xfrmi_policy[IFLA_XFRM_MAX + 1] = {
778 	[IFLA_XFRM_LINK]	= { .type = NLA_U32 },
779 	[IFLA_XFRM_IF_ID]	= { .type = NLA_U32 },
780 };
781 
782 static struct rtnl_link_ops xfrmi_link_ops __read_mostly = {
783 	.kind		= "xfrm",
784 	.maxtype	= IFLA_XFRM_MAX,
785 	.policy		= xfrmi_policy,
786 	.priv_size	= sizeof(struct xfrm_if),
787 	.setup		= xfrmi_dev_setup,
788 	.validate	= xfrmi_validate,
789 	.newlink	= xfrmi_newlink,
790 	.dellink	= xfrmi_dellink,
791 	.changelink	= xfrmi_changelink,
792 	.get_size	= xfrmi_get_size,
793 	.fill_info	= xfrmi_fill_info,
794 	.get_link_net	= xfrmi_get_link_net,
795 };
796 
xfrmi_exit_batch_net(struct list_head *net_exit_list)797 static void __net_exit xfrmi_exit_batch_net(struct list_head *net_exit_list)
798 {
799 	struct net *net;
800 	LIST_HEAD(list);
801 
802 	rtnl_lock();
803 	list_for_each_entry(net, net_exit_list, exit_list) {
804 		struct xfrmi_net *xfrmn = net_generic(net, xfrmi_net_id);
805 		struct xfrm_if __rcu **xip;
806 		struct xfrm_if *xi;
807 		int i;
808 
809 		for (i = 0; i < XFRMI_HASH_SIZE; i++) {
810 			for (xip = &xfrmn->xfrmi[i];
811 			     (xi = rtnl_dereference(*xip)) != NULL;
812 			     xip = &xi->next)
813 				unregister_netdevice_queue(xi->dev, &list);
814 		}
815 	}
816 	unregister_netdevice_many(&list);
817 	rtnl_unlock();
818 }
819 
820 static struct pernet_operations xfrmi_net_ops = {
821 	.exit_batch = xfrmi_exit_batch_net,
822 	.id   = &xfrmi_net_id,
823 	.size = sizeof(struct xfrmi_net),
824 };
825 
826 static struct xfrm6_protocol xfrmi_esp6_protocol __read_mostly = {
827 	.handler	=	xfrmi6_rcv,
828 	.input_handler	=	xfrmi6_input,
829 	.cb_handler	=	xfrmi_rcv_cb,
830 	.err_handler	=	xfrmi6_err,
831 	.priority	=	10,
832 };
833 
834 static struct xfrm6_protocol xfrmi_ah6_protocol __read_mostly = {
835 	.handler	=	xfrm6_rcv,
836 	.input_handler	=	xfrm_input,
837 	.cb_handler	=	xfrmi_rcv_cb,
838 	.err_handler	=	xfrmi6_err,
839 	.priority	=	10,
840 };
841 
842 static struct xfrm6_protocol xfrmi_ipcomp6_protocol __read_mostly = {
843 	.handler	=	xfrm6_rcv,
844 	.input_handler	=	xfrm_input,
845 	.cb_handler	=	xfrmi_rcv_cb,
846 	.err_handler	=	xfrmi6_err,
847 	.priority	=	10,
848 };
849 
850 #if IS_REACHABLE(CONFIG_INET6_XFRM_TUNNEL)
xfrmi6_rcv_tunnel(struct sk_buff *skb)851 static int xfrmi6_rcv_tunnel(struct sk_buff *skb)
852 {
853 	const xfrm_address_t *saddr;
854 	__be32 spi;
855 
856 	saddr = (const xfrm_address_t *)&ipv6_hdr(skb)->saddr;
857 	spi = xfrm6_tunnel_spi_lookup(dev_net(skb->dev), saddr);
858 
859 	return xfrm6_rcv_spi(skb, IPPROTO_IPV6, spi, NULL);
860 }
861 
862 static struct xfrm6_tunnel xfrmi_ipv6_handler __read_mostly = {
863 	.handler	=	xfrmi6_rcv_tunnel,
864 	.cb_handler	=	xfrmi_rcv_cb,
865 	.err_handler	=	xfrmi6_err,
866 	.priority	=	2,
867 };
868 
869 static struct xfrm6_tunnel xfrmi_ip6ip_handler __read_mostly = {
870 	.handler	=	xfrmi6_rcv_tunnel,
871 	.cb_handler	=	xfrmi_rcv_cb,
872 	.err_handler	=	xfrmi6_err,
873 	.priority	=	2,
874 };
875 #endif
876 
877 static struct xfrm4_protocol xfrmi_esp4_protocol __read_mostly = {
878 	.handler	=	xfrmi4_rcv,
879 	.input_handler	=	xfrmi4_input,
880 	.cb_handler	=	xfrmi_rcv_cb,
881 	.err_handler	=	xfrmi4_err,
882 	.priority	=	10,
883 };
884 
885 static struct xfrm4_protocol xfrmi_ah4_protocol __read_mostly = {
886 	.handler	=	xfrm4_rcv,
887 	.input_handler	=	xfrm_input,
888 	.cb_handler	=	xfrmi_rcv_cb,
889 	.err_handler	=	xfrmi4_err,
890 	.priority	=	10,
891 };
892 
893 static struct xfrm4_protocol xfrmi_ipcomp4_protocol __read_mostly = {
894 	.handler	=	xfrm4_rcv,
895 	.input_handler	=	xfrm_input,
896 	.cb_handler	=	xfrmi_rcv_cb,
897 	.err_handler	=	xfrmi4_err,
898 	.priority	=	10,
899 };
900 
901 #if IS_REACHABLE(CONFIG_INET_XFRM_TUNNEL)
xfrmi4_rcv_tunnel(struct sk_buff *skb)902 static int xfrmi4_rcv_tunnel(struct sk_buff *skb)
903 {
904 	return xfrm4_rcv_spi(skb, IPPROTO_IPIP, ip_hdr(skb)->saddr);
905 }
906 
907 static struct xfrm_tunnel xfrmi_ipip_handler __read_mostly = {
908 	.handler	=	xfrmi4_rcv_tunnel,
909 	.cb_handler	=	xfrmi_rcv_cb,
910 	.err_handler	=	xfrmi4_err,
911 	.priority	=	3,
912 };
913 
914 static struct xfrm_tunnel xfrmi_ipip6_handler __read_mostly = {
915 	.handler	=	xfrmi4_rcv_tunnel,
916 	.cb_handler	=	xfrmi_rcv_cb,
917 	.err_handler	=	xfrmi4_err,
918 	.priority	=	2,
919 };
920 #endif
921 
xfrmi4_init(void)922 static int __init xfrmi4_init(void)
923 {
924 	int err;
925 
926 	err = xfrm4_protocol_register(&xfrmi_esp4_protocol, IPPROTO_ESP);
927 	if (err < 0)
928 		goto xfrm_proto_esp_failed;
929 	err = xfrm4_protocol_register(&xfrmi_ah4_protocol, IPPROTO_AH);
930 	if (err < 0)
931 		goto xfrm_proto_ah_failed;
932 	err = xfrm4_protocol_register(&xfrmi_ipcomp4_protocol, IPPROTO_COMP);
933 	if (err < 0)
934 		goto xfrm_proto_comp_failed;
935 #if IS_REACHABLE(CONFIG_INET_XFRM_TUNNEL)
936 	err = xfrm4_tunnel_register(&xfrmi_ipip_handler, AF_INET);
937 	if (err < 0)
938 		goto xfrm_tunnel_ipip_failed;
939 	err = xfrm4_tunnel_register(&xfrmi_ipip6_handler, AF_INET6);
940 	if (err < 0)
941 		goto xfrm_tunnel_ipip6_failed;
942 #endif
943 
944 	return 0;
945 
946 #if IS_REACHABLE(CONFIG_INET_XFRM_TUNNEL)
947 xfrm_tunnel_ipip6_failed:
948 	xfrm4_tunnel_deregister(&xfrmi_ipip_handler, AF_INET);
949 xfrm_tunnel_ipip_failed:
950 	xfrm4_protocol_deregister(&xfrmi_ipcomp4_protocol, IPPROTO_COMP);
951 #endif
952 xfrm_proto_comp_failed:
953 	xfrm4_protocol_deregister(&xfrmi_ah4_protocol, IPPROTO_AH);
954 xfrm_proto_ah_failed:
955 	xfrm4_protocol_deregister(&xfrmi_esp4_protocol, IPPROTO_ESP);
956 xfrm_proto_esp_failed:
957 	return err;
958 }
959 
xfrmi4_fini(void)960 static void xfrmi4_fini(void)
961 {
962 #if IS_REACHABLE(CONFIG_INET_XFRM_TUNNEL)
963 	xfrm4_tunnel_deregister(&xfrmi_ipip6_handler, AF_INET6);
964 	xfrm4_tunnel_deregister(&xfrmi_ipip_handler, AF_INET);
965 #endif
966 	xfrm4_protocol_deregister(&xfrmi_ipcomp4_protocol, IPPROTO_COMP);
967 	xfrm4_protocol_deregister(&xfrmi_ah4_protocol, IPPROTO_AH);
968 	xfrm4_protocol_deregister(&xfrmi_esp4_protocol, IPPROTO_ESP);
969 }
970 
xfrmi6_init(void)971 static int __init xfrmi6_init(void)
972 {
973 	int err;
974 
975 	err = xfrm6_protocol_register(&xfrmi_esp6_protocol, IPPROTO_ESP);
976 	if (err < 0)
977 		goto xfrm_proto_esp_failed;
978 	err = xfrm6_protocol_register(&xfrmi_ah6_protocol, IPPROTO_AH);
979 	if (err < 0)
980 		goto xfrm_proto_ah_failed;
981 	err = xfrm6_protocol_register(&xfrmi_ipcomp6_protocol, IPPROTO_COMP);
982 	if (err < 0)
983 		goto xfrm_proto_comp_failed;
984 #if IS_REACHABLE(CONFIG_INET6_XFRM_TUNNEL)
985 	err = xfrm6_tunnel_register(&xfrmi_ipv6_handler, AF_INET6);
986 	if (err < 0)
987 		goto xfrm_tunnel_ipv6_failed;
988 	err = xfrm6_tunnel_register(&xfrmi_ip6ip_handler, AF_INET);
989 	if (err < 0)
990 		goto xfrm_tunnel_ip6ip_failed;
991 #endif
992 
993 	return 0;
994 
995 #if IS_REACHABLE(CONFIG_INET6_XFRM_TUNNEL)
996 xfrm_tunnel_ip6ip_failed:
997 	xfrm6_tunnel_deregister(&xfrmi_ipv6_handler, AF_INET6);
998 xfrm_tunnel_ipv6_failed:
999 	xfrm6_protocol_deregister(&xfrmi_ipcomp6_protocol, IPPROTO_COMP);
1000 #endif
1001 xfrm_proto_comp_failed:
1002 	xfrm6_protocol_deregister(&xfrmi_ah6_protocol, IPPROTO_AH);
1003 xfrm_proto_ah_failed:
1004 	xfrm6_protocol_deregister(&xfrmi_esp6_protocol, IPPROTO_ESP);
1005 xfrm_proto_esp_failed:
1006 	return err;
1007 }
1008 
xfrmi6_fini(void)1009 static void xfrmi6_fini(void)
1010 {
1011 #if IS_REACHABLE(CONFIG_INET6_XFRM_TUNNEL)
1012 	xfrm6_tunnel_deregister(&xfrmi_ip6ip_handler, AF_INET);
1013 	xfrm6_tunnel_deregister(&xfrmi_ipv6_handler, AF_INET6);
1014 #endif
1015 	xfrm6_protocol_deregister(&xfrmi_ipcomp6_protocol, IPPROTO_COMP);
1016 	xfrm6_protocol_deregister(&xfrmi_ah6_protocol, IPPROTO_AH);
1017 	xfrm6_protocol_deregister(&xfrmi_esp6_protocol, IPPROTO_ESP);
1018 }
1019 
1020 static const struct xfrm_if_cb xfrm_if_cb = {
1021 	.decode_session =	xfrmi_decode_session,
1022 };
1023 
xfrmi_init(void)1024 static int __init xfrmi_init(void)
1025 {
1026 	const char *msg;
1027 	int err;
1028 
1029 	pr_info("IPsec XFRM device driver\n");
1030 
1031 	msg = "tunnel device";
1032 	err = register_pernet_device(&xfrmi_net_ops);
1033 	if (err < 0)
1034 		goto pernet_dev_failed;
1035 
1036 	msg = "xfrm4 protocols";
1037 	err = xfrmi4_init();
1038 	if (err < 0)
1039 		goto xfrmi4_failed;
1040 
1041 	msg = "xfrm6 protocols";
1042 	err = xfrmi6_init();
1043 	if (err < 0)
1044 		goto xfrmi6_failed;
1045 
1046 
1047 	msg = "netlink interface";
1048 	err = rtnl_link_register(&xfrmi_link_ops);
1049 	if (err < 0)
1050 		goto rtnl_link_failed;
1051 
1052 	xfrm_if_register_cb(&xfrm_if_cb);
1053 
1054 	return err;
1055 
1056 rtnl_link_failed:
1057 	xfrmi6_fini();
1058 xfrmi6_failed:
1059 	xfrmi4_fini();
1060 xfrmi4_failed:
1061 	unregister_pernet_device(&xfrmi_net_ops);
1062 pernet_dev_failed:
1063 	pr_err("xfrmi init: failed to register %s\n", msg);
1064 	return err;
1065 }
1066 
xfrmi_fini(void)1067 static void __exit xfrmi_fini(void)
1068 {
1069 	xfrm_if_unregister_cb();
1070 	rtnl_link_unregister(&xfrmi_link_ops);
1071 	xfrmi4_fini();
1072 	xfrmi6_fini();
1073 	unregister_pernet_device(&xfrmi_net_ops);
1074 }
1075 
1076 module_init(xfrmi_init);
1077 module_exit(xfrmi_fini);
1078 MODULE_LICENSE("GPL");
1079 MODULE_ALIAS_RTNL_LINK("xfrm");
1080 MODULE_ALIAS_NETDEV("xfrm0");
1081 MODULE_AUTHOR("Steffen Klassert");
1082 MODULE_DESCRIPTION("XFRM virtual interface");
1083