xfrm6_input.c 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251
  1. /*
  2. * xfrm6_input.c: based on net/ipv4/xfrm4_input.c
  3. *
  4. * Authors:
  5. * Mitsuru KANDA @USAGI
  6. * Kazunori MIYAZAWA @USAGI
  7. * Kunihiro Ishiguro <kunihiro@ipinfusion.com>
  8. * YOSHIFUJI Hideaki @USAGI
  9. * IPv6 support
  10. */
  11. #include <linux/module.h>
  12. #include <linux/string.h>
  13. #include <linux/netfilter.h>
  14. #include <linux/netfilter_ipv6.h>
  15. #include <net/ipv6.h>
  16. #include <net/xfrm.h>
  17. int xfrm6_rcv_spi(struct sk_buff *skb, __be32 spi)
  18. {
  19. int err;
  20. __be32 seq;
  21. struct xfrm_state *xfrm_vec[XFRM_MAX_DEPTH];
  22. struct xfrm_state *x;
  23. int xfrm_nr = 0;
  24. int decaps = 0;
  25. int nexthdr;
  26. unsigned int nhoff;
  27. nhoff = IP6CB(skb)->nhoff;
  28. nexthdr = skb_network_header(skb)[nhoff];
  29. seq = 0;
  30. if (!spi && (err = xfrm_parse_spi(skb, nexthdr, &spi, &seq)) != 0)
  31. goto drop;
  32. do {
  33. struct ipv6hdr *iph = ipv6_hdr(skb);
  34. if (xfrm_nr == XFRM_MAX_DEPTH)
  35. goto drop;
  36. x = xfrm_state_lookup((xfrm_address_t *)&iph->daddr, spi,
  37. nexthdr != IPPROTO_IPIP ? nexthdr : IPPROTO_IPV6, AF_INET6);
  38. if (x == NULL)
  39. goto drop;
  40. spin_lock(&x->lock);
  41. if (unlikely(x->km.state != XFRM_STATE_VALID))
  42. goto drop_unlock;
  43. if (x->props.replay_window && xfrm_replay_check(x, seq))
  44. goto drop_unlock;
  45. if (xfrm_state_check_expire(x))
  46. goto drop_unlock;
  47. nexthdr = x->type->input(x, skb);
  48. if (nexthdr <= 0)
  49. goto drop_unlock;
  50. skb_network_header(skb)[nhoff] = nexthdr;
  51. if (x->props.replay_window)
  52. xfrm_replay_advance(x, seq);
  53. x->curlft.bytes += skb->len;
  54. x->curlft.packets++;
  55. spin_unlock(&x->lock);
  56. xfrm_vec[xfrm_nr++] = x;
  57. if (x->mode->input(x, skb))
  58. goto drop;
  59. if (x->props.mode == XFRM_MODE_TUNNEL) { /* XXX */
  60. decaps = 1;
  61. break;
  62. }
  63. if ((err = xfrm_parse_spi(skb, nexthdr, &spi, &seq)) < 0)
  64. goto drop;
  65. } while (!err);
  66. /* Allocate new secpath or COW existing one. */
  67. if (!skb->sp || atomic_read(&skb->sp->refcnt) != 1) {
  68. struct sec_path *sp;
  69. sp = secpath_dup(skb->sp);
  70. if (!sp)
  71. goto drop;
  72. if (skb->sp)
  73. secpath_put(skb->sp);
  74. skb->sp = sp;
  75. }
  76. if (xfrm_nr + skb->sp->len > XFRM_MAX_DEPTH)
  77. goto drop;
  78. memcpy(skb->sp->xvec + skb->sp->len, xfrm_vec,
  79. xfrm_nr * sizeof(xfrm_vec[0]));
  80. skb->sp->len += xfrm_nr;
  81. skb->ip_summed = CHECKSUM_NONE;
  82. nf_reset(skb);
  83. if (decaps) {
  84. if (!(skb->dev->flags&IFF_LOOPBACK)) {
  85. dst_release(skb->dst);
  86. skb->dst = NULL;
  87. }
  88. netif_rx(skb);
  89. return -1;
  90. } else {
  91. #ifdef CONFIG_NETFILTER
  92. ipv6_hdr(skb)->payload_len = htons(skb->len);
  93. __skb_push(skb, skb->data - skb_network_header(skb));
  94. NF_HOOK(PF_INET6, NF_IP6_PRE_ROUTING, skb, skb->dev, NULL,
  95. ip6_rcv_finish);
  96. return -1;
  97. #else
  98. return 1;
  99. #endif
  100. }
  101. drop_unlock:
  102. spin_unlock(&x->lock);
  103. xfrm_state_put(x);
  104. drop:
  105. while (--xfrm_nr >= 0)
  106. xfrm_state_put(xfrm_vec[xfrm_nr]);
  107. kfree_skb(skb);
  108. return -1;
  109. }
  110. EXPORT_SYMBOL(xfrm6_rcv_spi);
  111. int xfrm6_rcv(struct sk_buff **pskb)
  112. {
  113. return xfrm6_rcv_spi(*pskb, 0);
  114. }
  115. EXPORT_SYMBOL(xfrm6_rcv);
  116. int xfrm6_input_addr(struct sk_buff *skb, xfrm_address_t *daddr,
  117. xfrm_address_t *saddr, u8 proto)
  118. {
  119. struct xfrm_state *x = NULL;
  120. int wildcard = 0;
  121. xfrm_address_t *xany;
  122. struct xfrm_state *xfrm_vec_one = NULL;
  123. int nh = 0;
  124. int i = 0;
  125. xany = (xfrm_address_t *)&in6addr_any;
  126. for (i = 0; i < 3; i++) {
  127. xfrm_address_t *dst, *src;
  128. switch (i) {
  129. case 0:
  130. dst = daddr;
  131. src = saddr;
  132. break;
  133. case 1:
  134. /* lookup state with wild-card source address */
  135. wildcard = 1;
  136. dst = daddr;
  137. src = xany;
  138. break;
  139. case 2:
  140. default:
  141. /* lookup state with wild-card addresses */
  142. wildcard = 1; /* XXX */
  143. dst = xany;
  144. src = xany;
  145. break;
  146. }
  147. x = xfrm_state_lookup_byaddr(dst, src, proto, AF_INET6);
  148. if (!x)
  149. continue;
  150. spin_lock(&x->lock);
  151. if (wildcard) {
  152. if ((x->props.flags & XFRM_STATE_WILDRECV) == 0) {
  153. spin_unlock(&x->lock);
  154. xfrm_state_put(x);
  155. x = NULL;
  156. continue;
  157. }
  158. }
  159. if (unlikely(x->km.state != XFRM_STATE_VALID)) {
  160. spin_unlock(&x->lock);
  161. xfrm_state_put(x);
  162. x = NULL;
  163. continue;
  164. }
  165. if (xfrm_state_check_expire(x)) {
  166. spin_unlock(&x->lock);
  167. xfrm_state_put(x);
  168. x = NULL;
  169. continue;
  170. }
  171. nh = x->type->input(x, skb);
  172. if (nh <= 0) {
  173. spin_unlock(&x->lock);
  174. xfrm_state_put(x);
  175. x = NULL;
  176. continue;
  177. }
  178. x->curlft.bytes += skb->len;
  179. x->curlft.packets++;
  180. spin_unlock(&x->lock);
  181. xfrm_vec_one = x;
  182. break;
  183. }
  184. if (!xfrm_vec_one)
  185. goto drop;
  186. /* Allocate new secpath or COW existing one. */
  187. if (!skb->sp || atomic_read(&skb->sp->refcnt) != 1) {
  188. struct sec_path *sp;
  189. sp = secpath_dup(skb->sp);
  190. if (!sp)
  191. goto drop;
  192. if (skb->sp)
  193. secpath_put(skb->sp);
  194. skb->sp = sp;
  195. }
  196. if (1 + skb->sp->len > XFRM_MAX_DEPTH)
  197. goto drop;
  198. skb->sp->xvec[skb->sp->len] = xfrm_vec_one;
  199. skb->sp->len ++;
  200. return 1;
  201. drop:
  202. if (xfrm_vec_one)
  203. xfrm_state_put(xfrm_vec_one);
  204. return -1;
  205. }
  206. EXPORT_SYMBOL(xfrm6_input_addr);