xfrm4_input.c 6.0 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3 4 5 6 7 8
/*
 * xfrm4_input.c
 *
 * Changes:
 *	YOSHIFUJI Hideaki @USAGI
 *		Split up af-specific portion
 *	Derek Atkins <derek@ihtfp.com>
 *		Add Encapsulation support
9
 *
L
Linus Torvalds 已提交
10 11 12 13
 */

#include <linux/module.h>
#include <linux/string.h>
14 15
#include <linux/netfilter.h>
#include <linux/netfilter_ipv4.h>
L
Linus Torvalds 已提交
16 17 18
#include <net/ip.h>
#include <net/xfrm.h>

A
Al Viro 已提交
19
static int xfrm4_parse_spi(struct sk_buff *skb, u8 nexthdr, __be32 *spi, __be32 *seq)
L
Linus Torvalds 已提交
20 21 22
{
	switch (nexthdr) {
	case IPPROTO_IPIP:
23
	case IPPROTO_IPV6:
24
		*spi = ip_hdr(skb)->saddr;
L
Linus Torvalds 已提交
25 26 27 28 29 30 31
		*seq = 0;
		return 0;
	}

	return xfrm_parse_spi(skb, nexthdr, spi, seq);
}

32 33 34 35
#ifdef CONFIG_NETFILTER
static inline int xfrm4_rcv_encap_finish(struct sk_buff *skb)
{
	if (skb->dst == NULL) {
36 37
		const struct iphdr *iph = ip_hdr(skb);

38
		if (ip_route_input(skb, iph->daddr, iph->saddr, iph->tos,
39
				   skb->dev))
40 41 42 43 44 45 46 47 48
			goto drop;
	}
	return dst_input(skb);
drop:
	kfree_skb(skb);
	return NET_RX_DROP;
}
#endif

49
static int xfrm4_rcv_encap(struct sk_buff *skb, __u16 encap_type)
L
Linus Torvalds 已提交
50
{
A
Al Viro 已提交
51
	__be32 spi, seq;
52
	struct xfrm_state *xfrm_vec[XFRM_MAX_DEPTH];
L
Linus Torvalds 已提交
53 54 55
	struct xfrm_state *x;
	int xfrm_nr = 0;
	int decaps = 0;
56
	int err = xfrm4_parse_spi(skb, ip_hdr(skb)->protocol, &spi, &seq);
L
Linus Torvalds 已提交
57

58
	if (err != 0)
L
Linus Torvalds 已提交
59 60 61
		goto drop;

	do {
62
		const struct iphdr *iph = ip_hdr(skb);
L
Linus Torvalds 已提交
63 64 65 66

		if (xfrm_nr == XFRM_MAX_DEPTH)
			goto drop;

67 68
		x = xfrm_state_lookup((xfrm_address_t *)&iph->daddr, spi,
				iph->protocol != IPPROTO_IPV6 ? iph->protocol : IPPROTO_IPIP, AF_INET);
L
Linus Torvalds 已提交
69 70 71 72 73 74 75
		if (x == NULL)
			goto drop;

		spin_lock(&x->lock);
		if (unlikely(x->km.state != XFRM_STATE_VALID))
			goto drop_unlock;

76
		if ((x->encap ? x->encap->encap_type : 0) != encap_type)
77 78
			goto drop_unlock;

L
Linus Torvalds 已提交
79 80 81 82 83 84
		if (x->props.replay_window && xfrm_replay_check(x, seq))
			goto drop_unlock;

		if (xfrm_state_check_expire(x))
			goto drop_unlock;

85
		if (x->type->input(x, skb))
L
Linus Torvalds 已提交
86 87 88 89 90 91 92 93 94 95 96 97 98
			goto drop_unlock;

		/* only the first xfrm gets the encap type */
		encap_type = 0;

		if (x->props.replay_window)
			xfrm_replay_advance(x, seq);

		x->curlft.bytes += skb->len;
		x->curlft.packets++;

		spin_unlock(&x->lock);

99
		xfrm_vec[xfrm_nr++] = x;
L
Linus Torvalds 已提交
100

101 102
		if (x->mode->input(x, skb))
			goto drop;
L
Linus Torvalds 已提交
103

104
		if (x->props.mode == XFRM_MODE_TUNNEL) {
L
Linus Torvalds 已提交
105 106 107 108
			decaps = 1;
			break;
		}

109 110
		err = xfrm_parse_spi(skb, ip_hdr(skb)->protocol, &spi, &seq);
		if (err < 0)
L
Linus Torvalds 已提交
111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127
			goto drop;
	} while (!err);

	/* Allocate new secpath or COW existing one. */

	if (!skb->sp || atomic_read(&skb->sp->refcnt) != 1) {
		struct sec_path *sp;
		sp = secpath_dup(skb->sp);
		if (!sp)
			goto drop;
		if (skb->sp)
			secpath_put(skb->sp);
		skb->sp = sp;
	}
	if (xfrm_nr + skb->sp->len > XFRM_MAX_DEPTH)
		goto drop;

128 129
	memcpy(skb->sp->xvec + skb->sp->len, xfrm_vec,
	       xfrm_nr * sizeof(xfrm_vec[0]));
L
Linus Torvalds 已提交
130 131
	skb->sp->len += xfrm_nr;

132 133
	nf_reset(skb);

L
Linus Torvalds 已提交
134
	if (decaps) {
135 136
		dst_release(skb->dst);
		skb->dst = NULL;
L
Linus Torvalds 已提交
137 138 139
		netif_rx(skb);
		return 0;
	} else {
140
#ifdef CONFIG_NETFILTER
141
		__skb_push(skb, skb->data - skb_network_header(skb));
142 143
		ip_hdr(skb)->tot_len = htons(skb->len);
		ip_send_check(ip_hdr(skb));
144 145

		NF_HOOK(PF_INET, NF_IP_PRE_ROUTING, skb, skb->dev, NULL,
146
			xfrm4_rcv_encap_finish);
147 148
		return 0;
#else
149
		return -ip_hdr(skb)->protocol;
150
#endif
L
Linus Torvalds 已提交
151 152 153 154 155 156 157
	}

drop_unlock:
	spin_unlock(&x->lock);
	xfrm_state_put(x);
drop:
	while (--xfrm_nr >= 0)
158
		xfrm_state_put(xfrm_vec[xfrm_nr]);
L
Linus Torvalds 已提交
159 160 161 162

	kfree_skb(skb);
	return 0;
}
163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267

/* If it's a keepalive packet, then just eat it.
 * If it's an encapsulated packet, then pass it to the
 * IPsec xfrm input.
 * Returns 0 if skb passed to xfrm or was dropped.
 * Returns >0 if skb should be passed to UDP.
 * Returns <0 if skb should be resubmitted (-ret is protocol)
 */
int xfrm4_udp_encap_rcv(struct sock *sk, struct sk_buff *skb)
{
	struct udp_sock *up = udp_sk(sk);
	struct udphdr *uh;
	struct iphdr *iph;
	int iphlen, len;
	int ret;

	__u8 *udpdata;
	__be32 *udpdata32;
	__u16 encap_type = up->encap_type;

	/* if this is not encapsulated socket, then just return now */
	if (!encap_type)
		return 1;

	/* If this is a paged skb, make sure we pull up
	 * whatever data we need to look at. */
	len = skb->len - sizeof(struct udphdr);
	if (!pskb_may_pull(skb, sizeof(struct udphdr) + min(len, 8)))
		return 1;

	/* Now we can get the pointers */
	uh = udp_hdr(skb);
	udpdata = (__u8 *)uh + sizeof(struct udphdr);
	udpdata32 = (__be32 *)udpdata;

	switch (encap_type) {
	default:
	case UDP_ENCAP_ESPINUDP:
		/* Check if this is a keepalive packet.  If so, eat it. */
		if (len == 1 && udpdata[0] == 0xff) {
			goto drop;
		} else if (len > sizeof(struct ip_esp_hdr) && udpdata32[0] != 0) {
			/* ESP Packet without Non-ESP header */
			len = sizeof(struct udphdr);
		} else
			/* Must be an IKE packet.. pass it through */
			return 1;
		break;
	case UDP_ENCAP_ESPINUDP_NON_IKE:
		/* Check if this is a keepalive packet.  If so, eat it. */
		if (len == 1 && udpdata[0] == 0xff) {
			goto drop;
		} else if (len > 2 * sizeof(u32) + sizeof(struct ip_esp_hdr) &&
			   udpdata32[0] == 0 && udpdata32[1] == 0) {

			/* ESP Packet with Non-IKE marker */
			len = sizeof(struct udphdr) + 2 * sizeof(u32);
		} else
			/* Must be an IKE packet.. pass it through */
			return 1;
		break;
	}

	/* At this point we are sure that this is an ESPinUDP packet,
	 * so we need to remove 'len' bytes from the packet (the UDP
	 * header and optional ESP marker bytes) and then modify the
	 * protocol to ESP, and then call into the transform receiver.
	 */
	if (skb_cloned(skb) && pskb_expand_head(skb, 0, 0, GFP_ATOMIC))
		goto drop;

	/* Now we can update and verify the packet length... */
	iph = ip_hdr(skb);
	iphlen = iph->ihl << 2;
	iph->tot_len = htons(ntohs(iph->tot_len) - len);
	if (skb->len < iphlen + len) {
		/* packet is too small!?! */
		goto drop;
	}

	/* pull the data buffer up to the ESP header and set the
	 * transport header to point to ESP.  Keep UDP on the stack
	 * for later.
	 */
	__skb_pull(skb, len);
	skb_reset_transport_header(skb);

	/* modify the protocol (it's ESP!) */
	iph->protocol = IPPROTO_ESP;

	/* process ESP */
	ret = xfrm4_rcv_encap(skb, encap_type);
	return ret;

drop:
	kfree_skb(skb);
	return 0;
}

int xfrm4_rcv(struct sk_buff *skb)
{
	return xfrm4_rcv_encap(skb, 0);
}

EXPORT_SYMBOL(xfrm4_rcv);