xfrm6_input.c 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253
  1. /*
  2. * xfrm6_input.c: based on net/ipv4/xfrm4_input.c
  3. *
  4. * Authors:
  5. * Mitsuru KANDA @USAGI
  6. * Kazunori MIYAZAWA @USAGI
  7. * Kunihiro Ishiguro <kunihiro@ipinfusion.com>
  8. * YOSHIFUJI Hideaki @USAGI
  9. * IPv6 support
  10. */
  11. #include <linux/module.h>
  12. #include <linux/string.h>
  13. #include <linux/netfilter.h>
  14. #include <linux/netfilter_ipv6.h>
  15. #include <net/ipv6.h>
  16. #include <net/xfrm.h>
  17. int xfrm6_rcv_spi(struct sk_buff *skb, __be32 spi)
  18. {
  19. int err;
  20. __be32 seq;
  21. struct xfrm_state *xfrm_vec[XFRM_MAX_DEPTH];
  22. struct xfrm_state *x;
  23. int xfrm_nr = 0;
  24. int decaps = 0;
  25. int nexthdr;
  26. unsigned int nhoff;
  27. nhoff = IP6CB(skb)->nhoff;
  28. nexthdr = skb->nh.raw[nhoff];
  29. seq = 0;
  30. if (!spi && (err = xfrm_parse_spi(skb, nexthdr, &spi, &seq)) != 0)
  31. goto drop;
  32. do {
  33. struct ipv6hdr *iph = skb->nh.ipv6h;
  34. if (xfrm_nr == XFRM_MAX_DEPTH)
  35. goto drop;
  36. x = xfrm_state_lookup((xfrm_address_t *)&iph->daddr, spi,
  37. nexthdr != IPPROTO_IPIP ? nexthdr : IPPROTO_IPV6, AF_INET6);
  38. if (x == NULL)
  39. goto drop;
  40. spin_lock(&x->lock);
  41. if (unlikely(x->km.state != XFRM_STATE_VALID))
  42. goto drop_unlock;
  43. if (x->props.replay_window && xfrm_replay_check(x, seq))
  44. goto drop_unlock;
  45. if (xfrm_state_check_expire(x))
  46. goto drop_unlock;
  47. nexthdr = x->type->input(x, skb);
  48. if (nexthdr <= 0)
  49. goto drop_unlock;
  50. skb->nh.raw[nhoff] = nexthdr;
  51. if (x->props.replay_window)
  52. xfrm_replay_advance(x, seq);
  53. x->curlft.bytes += skb->len;
  54. x->curlft.packets++;
  55. spin_unlock(&x->lock);
  56. xfrm_vec[xfrm_nr++] = x;
  57. if (x->mode->input(x, skb))
  58. goto drop;
  59. if (x->props.mode == XFRM_MODE_TUNNEL) { /* XXX */
  60. decaps = 1;
  61. break;
  62. }
  63. if ((err = xfrm_parse_spi(skb, nexthdr, &spi, &seq)) < 0)
  64. goto drop;
  65. } while (!err);
  66. /* Allocate new secpath or COW existing one. */
  67. if (!skb->sp || atomic_read(&skb->sp->refcnt) != 1) {
  68. struct sec_path *sp;
  69. sp = secpath_dup(skb->sp);
  70. if (!sp)
  71. goto drop;
  72. if (skb->sp)
  73. secpath_put(skb->sp);
  74. skb->sp = sp;
  75. }
  76. if (xfrm_nr + skb->sp->len > XFRM_MAX_DEPTH)
  77. goto drop;
  78. memcpy(skb->sp->xvec + skb->sp->len, xfrm_vec,
  79. xfrm_nr * sizeof(xfrm_vec[0]));
  80. skb->sp->len += xfrm_nr;
  81. skb->ip_summed = CHECKSUM_NONE;
  82. nf_reset(skb);
  83. if (decaps) {
  84. if (!(skb->dev->flags&IFF_LOOPBACK)) {
  85. dst_release(skb->dst);
  86. skb->dst = NULL;
  87. }
  88. netif_rx(skb);
  89. return -1;
  90. } else {
  91. #ifdef CONFIG_NETFILTER
  92. skb->nh.ipv6h->payload_len = htons(skb->len);
  93. __skb_push(skb, skb->data - skb->nh.raw);
  94. NF_HOOK(PF_INET6, NF_IP6_PRE_ROUTING, skb, skb->dev, NULL,
  95. ip6_rcv_finish);
  96. return -1;
  97. #else
  98. return 1;
  99. #endif
  100. }
  101. drop_unlock:
  102. spin_unlock(&x->lock);
  103. xfrm_state_put(x);
  104. drop:
  105. while (--xfrm_nr >= 0)
  106. xfrm_state_put(xfrm_vec[xfrm_nr]);
  107. kfree_skb(skb);
  108. return -1;
  109. }
  110. EXPORT_SYMBOL(xfrm6_rcv_spi);
  111. int xfrm6_rcv(struct sk_buff **pskb)
  112. {
  113. return xfrm6_rcv_spi(*pskb, 0);
  114. }
  115. EXPORT_SYMBOL(xfrm6_rcv);
  116. int xfrm6_input_addr(struct sk_buff *skb, xfrm_address_t *daddr,
  117. xfrm_address_t *saddr, u8 proto)
  118. {
  119. struct xfrm_state *x = NULL;
  120. int wildcard = 0;
  121. struct in6_addr any;
  122. xfrm_address_t *xany;
  123. struct xfrm_state *xfrm_vec_one = NULL;
  124. int nh = 0;
  125. int i = 0;
  126. ipv6_addr_set(&any, 0, 0, 0, 0);
  127. xany = (xfrm_address_t *)&any;
  128. for (i = 0; i < 3; i++) {
  129. xfrm_address_t *dst, *src;
  130. switch (i) {
  131. case 0:
  132. dst = daddr;
  133. src = saddr;
  134. break;
  135. case 1:
  136. /* lookup state with wild-card source address */
  137. wildcard = 1;
  138. dst = daddr;
  139. src = xany;
  140. break;
  141. case 2:
  142. default:
  143. /* lookup state with wild-card addresses */
  144. wildcard = 1; /* XXX */
  145. dst = xany;
  146. src = xany;
  147. break;
  148. }
  149. x = xfrm_state_lookup_byaddr(dst, src, proto, AF_INET6);
  150. if (!x)
  151. continue;
  152. spin_lock(&x->lock);
  153. if (wildcard) {
  154. if ((x->props.flags & XFRM_STATE_WILDRECV) == 0) {
  155. spin_unlock(&x->lock);
  156. xfrm_state_put(x);
  157. x = NULL;
  158. continue;
  159. }
  160. }
  161. if (unlikely(x->km.state != XFRM_STATE_VALID)) {
  162. spin_unlock(&x->lock);
  163. xfrm_state_put(x);
  164. x = NULL;
  165. continue;
  166. }
  167. if (xfrm_state_check_expire(x)) {
  168. spin_unlock(&x->lock);
  169. xfrm_state_put(x);
  170. x = NULL;
  171. continue;
  172. }
  173. nh = x->type->input(x, skb);
  174. if (nh <= 0) {
  175. spin_unlock(&x->lock);
  176. xfrm_state_put(x);
  177. x = NULL;
  178. continue;
  179. }
  180. x->curlft.bytes += skb->len;
  181. x->curlft.packets++;
  182. spin_unlock(&x->lock);
  183. xfrm_vec_one = x;
  184. break;
  185. }
  186. if (!xfrm_vec_one)
  187. goto drop;
  188. /* Allocate new secpath or COW existing one. */
  189. if (!skb->sp || atomic_read(&skb->sp->refcnt) != 1) {
  190. struct sec_path *sp;
  191. sp = secpath_dup(skb->sp);
  192. if (!sp)
  193. goto drop;
  194. if (skb->sp)
  195. secpath_put(skb->sp);
  196. skb->sp = sp;
  197. }
  198. if (1 + skb->sp->len > XFRM_MAX_DEPTH)
  199. goto drop;
  200. skb->sp->xvec[skb->sp->len] = xfrm_vec_one;
  201. skb->sp->len ++;
  202. return 1;
  203. drop:
  204. if (xfrm_vec_one)
  205. xfrm_state_put(xfrm_vec_one);
  206. return -1;
  207. }
  208. EXPORT_SYMBOL(xfrm6_input_addr);