xfrm4_input.c 5.8 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3 4 5 6 7 8
/*
 * xfrm4_input.c
 *
 * Changes:
 *	YOSHIFUJI Hideaki @USAGI
 *		Split up af-specific portion
 *	Derek Atkins <derek@ihtfp.com>
 *		Add Encapsulation support
9
 *
L
Linus Torvalds 已提交
10 11 12 13
 */

#include <linux/module.h>
#include <linux/string.h>
14 15
#include <linux/netfilter.h>
#include <linux/netfilter_ipv4.h>
L
Linus Torvalds 已提交
16 17 18
#include <net/ip.h>
#include <net/xfrm.h>

19 20 21 22
#ifdef CONFIG_NETFILTER
static inline int xfrm4_rcv_encap_finish(struct sk_buff *skb)
{
	if (skb->dst == NULL) {
23 24
		const struct iphdr *iph = ip_hdr(skb);

25
		if (ip_route_input(skb, iph->daddr, iph->saddr, iph->tos,
26
				   skb->dev))
27 28 29 30 31 32 33 34 35
			goto drop;
	}
	return dst_input(skb);
drop:
	kfree_skb(skb);
	return NET_RX_DROP;
}
#endif

36 37
int xfrm4_rcv_encap(struct sk_buff *skb, int nexthdr, __be32 spi,
		    int encap_type)
L
Linus Torvalds 已提交
38
{
39 40
	int err;
	__be32 seq;
41
	struct xfrm_state *xfrm_vec[XFRM_MAX_DEPTH];
L
Linus Torvalds 已提交
42 43 44
	struct xfrm_state *x;
	int xfrm_nr = 0;
	int decaps = 0;
45
	unsigned int nhoff = offsetof(struct iphdr, protocol);
L
Linus Torvalds 已提交
46

47 48
	seq = 0;
	if (!spi && (err = xfrm_parse_spi(skb, nexthdr, &spi, &seq)) != 0)
L
Linus Torvalds 已提交
49 50 51
		goto drop;

	do {
52
		const struct iphdr *iph = ip_hdr(skb);
L
Linus Torvalds 已提交
53 54 55 56

		if (xfrm_nr == XFRM_MAX_DEPTH)
			goto drop;

57
		x = xfrm_state_lookup((xfrm_address_t *)&iph->daddr, spi,
58
				      nexthdr, AF_INET);
L
Linus Torvalds 已提交
59 60 61 62 63 64 65
		if (x == NULL)
			goto drop;

		spin_lock(&x->lock);
		if (unlikely(x->km.state != XFRM_STATE_VALID))
			goto drop_unlock;

66
		if ((x->encap ? x->encap->encap_type : 0) != encap_type)
67 68
			goto drop_unlock;

L
Linus Torvalds 已提交
69 70 71 72 73 74
		if (x->props.replay_window && xfrm_replay_check(x, seq))
			goto drop_unlock;

		if (xfrm_state_check_expire(x))
			goto drop_unlock;

75 76
		nexthdr = x->type->input(x, skb);
		if (nexthdr <= 0)
L
Linus Torvalds 已提交
77 78
			goto drop_unlock;

79 80
		skb_network_header(skb)[nhoff] = nexthdr;

L
Linus Torvalds 已提交
81 82 83 84 85 86 87 88 89 90 91
		/* only the first xfrm gets the encap type */
		encap_type = 0;

		if (x->props.replay_window)
			xfrm_replay_advance(x, seq);

		x->curlft.bytes += skb->len;
		x->curlft.packets++;

		spin_unlock(&x->lock);

92
		xfrm_vec[xfrm_nr++] = x;
L
Linus Torvalds 已提交
93

94
		if (x->outer_mode->input(x, skb))
95
			goto drop;
L
Linus Torvalds 已提交
96

97
		if (x->outer_mode->flags & XFRM_MODE_FLAG_TUNNEL) {
L
Linus Torvalds 已提交
98 99 100 101
			decaps = 1;
			break;
		}

102
		err = xfrm_parse_spi(skb, nexthdr, &spi, &seq);
103
		if (err < 0)
L
Linus Torvalds 已提交
104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120
			goto drop;
	} while (!err);

	/* Allocate new secpath or COW existing one. */

	if (!skb->sp || atomic_read(&skb->sp->refcnt) != 1) {
		struct sec_path *sp;
		sp = secpath_dup(skb->sp);
		if (!sp)
			goto drop;
		if (skb->sp)
			secpath_put(skb->sp);
		skb->sp = sp;
	}
	if (xfrm_nr + skb->sp->len > XFRM_MAX_DEPTH)
		goto drop;

121 122
	memcpy(skb->sp->xvec + skb->sp->len, xfrm_vec,
	       xfrm_nr * sizeof(xfrm_vec[0]));
L
Linus Torvalds 已提交
123 124
	skb->sp->len += xfrm_nr;

125 126
	nf_reset(skb);

L
Linus Torvalds 已提交
127
	if (decaps) {
128 129
		dst_release(skb->dst);
		skb->dst = NULL;
L
Linus Torvalds 已提交
130 131 132
		netif_rx(skb);
		return 0;
	} else {
133
#ifdef CONFIG_NETFILTER
134
		__skb_push(skb, skb->data - skb_network_header(skb));
135 136
		ip_hdr(skb)->tot_len = htons(skb->len);
		ip_send_check(ip_hdr(skb));
137 138

		NF_HOOK(PF_INET, NF_IP_PRE_ROUTING, skb, skb->dev, NULL,
139
			xfrm4_rcv_encap_finish);
140 141
		return 0;
#else
142
		return -ip_hdr(skb)->protocol;
143
#endif
L
Linus Torvalds 已提交
144 145 146 147 148 149 150
	}

drop_unlock:
	spin_unlock(&x->lock);
	xfrm_state_put(x);
drop:
	while (--xfrm_nr >= 0)
151
		xfrm_state_put(xfrm_vec[xfrm_nr]);
L
Linus Torvalds 已提交
152 153 154 155

	kfree_skb(skb);
	return 0;
}
156
EXPORT_SYMBOL(xfrm4_rcv_encap);
157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244

/* If it's a keepalive packet, then just eat it.
 * If it's an encapsulated packet, then pass it to the
 * IPsec xfrm input.
 * Returns 0 if skb passed to xfrm or was dropped.
 * Returns >0 if skb should be passed to UDP.
 * Returns <0 if skb should be resubmitted (-ret is protocol)
 */
int xfrm4_udp_encap_rcv(struct sock *sk, struct sk_buff *skb)
{
	struct udp_sock *up = udp_sk(sk);
	struct udphdr *uh;
	struct iphdr *iph;
	int iphlen, len;
	int ret;

	__u8 *udpdata;
	__be32 *udpdata32;
	__u16 encap_type = up->encap_type;

	/* if this is not encapsulated socket, then just return now */
	if (!encap_type)
		return 1;

	/* If this is a paged skb, make sure we pull up
	 * whatever data we need to look at. */
	len = skb->len - sizeof(struct udphdr);
	if (!pskb_may_pull(skb, sizeof(struct udphdr) + min(len, 8)))
		return 1;

	/* Now we can get the pointers */
	uh = udp_hdr(skb);
	udpdata = (__u8 *)uh + sizeof(struct udphdr);
	udpdata32 = (__be32 *)udpdata;

	switch (encap_type) {
	default:
	case UDP_ENCAP_ESPINUDP:
		/* Check if this is a keepalive packet.  If so, eat it. */
		if (len == 1 && udpdata[0] == 0xff) {
			goto drop;
		} else if (len > sizeof(struct ip_esp_hdr) && udpdata32[0] != 0) {
			/* ESP Packet without Non-ESP header */
			len = sizeof(struct udphdr);
		} else
			/* Must be an IKE packet.. pass it through */
			return 1;
		break;
	case UDP_ENCAP_ESPINUDP_NON_IKE:
		/* Check if this is a keepalive packet.  If so, eat it. */
		if (len == 1 && udpdata[0] == 0xff) {
			goto drop;
		} else if (len > 2 * sizeof(u32) + sizeof(struct ip_esp_hdr) &&
			   udpdata32[0] == 0 && udpdata32[1] == 0) {

			/* ESP Packet with Non-IKE marker */
			len = sizeof(struct udphdr) + 2 * sizeof(u32);
		} else
			/* Must be an IKE packet.. pass it through */
			return 1;
		break;
	}

	/* At this point we are sure that this is an ESPinUDP packet,
	 * so we need to remove 'len' bytes from the packet (the UDP
	 * header and optional ESP marker bytes) and then modify the
	 * protocol to ESP, and then call into the transform receiver.
	 */
	if (skb_cloned(skb) && pskb_expand_head(skb, 0, 0, GFP_ATOMIC))
		goto drop;

	/* Now we can update and verify the packet length... */
	iph = ip_hdr(skb);
	iphlen = iph->ihl << 2;
	iph->tot_len = htons(ntohs(iph->tot_len) - len);
	if (skb->len < iphlen + len) {
		/* packet is too small!?! */
		goto drop;
	}

	/* pull the data buffer up to the ESP header and set the
	 * transport header to point to ESP.  Keep UDP on the stack
	 * for later.
	 */
	__skb_pull(skb, len);
	skb_reset_transport_header(skb);

	/* process ESP */
245
	ret = xfrm4_rcv_encap(skb, IPPROTO_ESP, 0, encap_type);
246 247 248 249 250 251 252 253 254
	return ret;

drop:
	kfree_skb(skb);
	return 0;
}

int xfrm4_rcv(struct sk_buff *skb)
{
255
	return xfrm4_rcv_spi(skb, ip_hdr(skb)->protocol, 0);
256 257 258
}

EXPORT_SYMBOL(xfrm4_rcv);