xfrm6_input.c 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140
  1. /*
  2. * xfrm6_input.c: based on net/ipv4/xfrm4_input.c
  3. *
  4. * Authors:
  5. * Mitsuru KANDA @USAGI
  6. * Kazunori MIYAZAWA @USAGI
  7. * Kunihiro Ishiguro <kunihiro@ipinfusion.com>
  8. * YOSHIFUJI Hideaki @USAGI
  9. * IPv6 support
  10. */
  11. #include <linux/module.h>
  12. #include <linux/string.h>
  13. #include <linux/netfilter.h>
  14. #include <linux/netfilter_ipv6.h>
  15. #include <net/ipv6.h>
  16. #include <net/xfrm.h>
  17. int xfrm6_rcv_spi(struct sk_buff *skb, u32 spi)
  18. {
  19. int err;
  20. u32 seq;
  21. struct xfrm_state *xfrm_vec[XFRM_MAX_DEPTH];
  22. struct xfrm_state *x;
  23. int xfrm_nr = 0;
  24. int decaps = 0;
  25. int nexthdr;
  26. unsigned int nhoff;
  27. nhoff = IP6CB(skb)->nhoff;
  28. nexthdr = skb->nh.raw[nhoff];
  29. seq = 0;
  30. if (!spi && (err = xfrm_parse_spi(skb, nexthdr, &spi, &seq)) != 0)
  31. goto drop;
  32. do {
  33. struct ipv6hdr *iph = skb->nh.ipv6h;
  34. if (xfrm_nr == XFRM_MAX_DEPTH)
  35. goto drop;
  36. x = xfrm_state_lookup((xfrm_address_t *)&iph->daddr, spi, nexthdr, AF_INET6);
  37. if (x == NULL)
  38. goto drop;
  39. spin_lock(&x->lock);
  40. if (unlikely(x->km.state != XFRM_STATE_VALID))
  41. goto drop_unlock;
  42. if (x->props.replay_window && xfrm_replay_check(x, seq))
  43. goto drop_unlock;
  44. if (xfrm_state_check_expire(x))
  45. goto drop_unlock;
  46. nexthdr = x->type->input(x, skb);
  47. if (nexthdr <= 0)
  48. goto drop_unlock;
  49. skb->nh.raw[nhoff] = nexthdr;
  50. if (x->props.replay_window)
  51. xfrm_replay_advance(x, seq);
  52. x->curlft.bytes += skb->len;
  53. x->curlft.packets++;
  54. spin_unlock(&x->lock);
  55. xfrm_vec[xfrm_nr++] = x;
  56. if (x->mode->input(x, skb))
  57. goto drop;
  58. if (x->props.mode) { /* XXX */
  59. decaps = 1;
  60. break;
  61. }
  62. if ((err = xfrm_parse_spi(skb, nexthdr, &spi, &seq)) < 0)
  63. goto drop;
  64. } while (!err);
  65. /* Allocate new secpath or COW existing one. */
  66. if (!skb->sp || atomic_read(&skb->sp->refcnt) != 1) {
  67. struct sec_path *sp;
  68. sp = secpath_dup(skb->sp);
  69. if (!sp)
  70. goto drop;
  71. if (skb->sp)
  72. secpath_put(skb->sp);
  73. skb->sp = sp;
  74. }
  75. if (xfrm_nr + skb->sp->len > XFRM_MAX_DEPTH)
  76. goto drop;
  77. memcpy(skb->sp->xvec + skb->sp->len, xfrm_vec,
  78. xfrm_nr * sizeof(xfrm_vec[0]));
  79. skb->sp->len += xfrm_nr;
  80. skb->ip_summed = CHECKSUM_NONE;
  81. nf_reset(skb);
  82. if (decaps) {
  83. if (!(skb->dev->flags&IFF_LOOPBACK)) {
  84. dst_release(skb->dst);
  85. skb->dst = NULL;
  86. }
  87. netif_rx(skb);
  88. return -1;
  89. } else {
  90. #ifdef CONFIG_NETFILTER
  91. skb->nh.ipv6h->payload_len = htons(skb->len);
  92. __skb_push(skb, skb->data - skb->nh.raw);
  93. NF_HOOK(PF_INET6, NF_IP6_PRE_ROUTING, skb, skb->dev, NULL,
  94. ip6_rcv_finish);
  95. return -1;
  96. #else
  97. return 1;
  98. #endif
  99. }
  100. drop_unlock:
  101. spin_unlock(&x->lock);
  102. xfrm_state_put(x);
  103. drop:
  104. while (--xfrm_nr >= 0)
  105. xfrm_state_put(xfrm_vec[xfrm_nr]);
  106. kfree_skb(skb);
  107. return -1;
  108. }
  109. EXPORT_SYMBOL(xfrm6_rcv_spi);
  110. int xfrm6_rcv(struct sk_buff **pskb)
  111. {
  112. return xfrm6_rcv_spi(*pskb, 0);
  113. }