xfrm6_input.c 3.1 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3 4 5 6 7 8 9 10 11 12 13
/*
 * xfrm6_input.c: based on net/ipv4/xfrm4_input.c
 *
 * Authors:
 *	Mitsuru KANDA @USAGI
 * 	Kazunori MIYAZAWA @USAGI
 * 	Kunihiro Ishiguro <kunihiro@ipinfusion.com>
 *	YOSHIFUJI Hideaki @USAGI
 *		IPv6 support
 */

#include <linux/module.h>
#include <linux/string.h>
14 15
#include <linux/netfilter.h>
#include <linux/netfilter_ipv6.h>
L
Linus Torvalds 已提交
16 17 18
#include <net/ipv6.h>
#include <net/xfrm.h>

19 20 21 22 23
int xfrm6_extract_input(struct xfrm_state *x, struct sk_buff *skb)
{
	return xfrm6_extract_header(skb);
}

24
int xfrm6_rcv_spi(struct sk_buff *skb, int nexthdr, __be32 spi)
L
Linus Torvalds 已提交
25
{
26 27 28 29
	XFRM_SPI_SKB_CB(skb)->daddroff = offsetof(struct ipv6hdr, daddr);
	return xfrm_input(skb, nexthdr, spi, 0);
}
EXPORT_SYMBOL(xfrm6_rcv_spi);
30

31 32
int xfrm6_transport_finish(struct sk_buff *skb, int async)
{
33 34 35
	skb_network_header(skb)[IP6CB(skb)->nhoff] =
		XFRM_MODE_SKB_CB(skb)->protocol;

36
#ifdef CONFIG_NETFILTER
37 38
	ipv6_hdr(skb)->payload_len = htons(skb->len);
	__skb_push(skb, skb->data - skb_network_header(skb));
39

40 41 42
	NF_HOOK(PF_INET6, NF_IP6_PRE_ROUTING, skb, skb->dev, NULL,
		ip6_rcv_finish);
	return -1;
43
#else
44 45 46
	if (async)
		return ip6_rcv_finish(skb);

47
	return 1;
48
#endif
L
Linus Torvalds 已提交
49 50
}

51
int xfrm6_rcv(struct sk_buff *skb)
L
Linus Torvalds 已提交
52
{
53 54
	return xfrm6_rcv_spi(skb, skb_network_header(skb)[IP6CB(skb)->nhoff],
			     0);
L
Linus Torvalds 已提交
55
}
56

57 58
EXPORT_SYMBOL(xfrm6_rcv);

59 60 61
int xfrm6_input_addr(struct sk_buff *skb, xfrm_address_t *daddr,
		     xfrm_address_t *saddr, u8 proto)
{
62 63
	struct xfrm_state *x = NULL;
	int wildcard = 0;
64 65
	xfrm_address_t *xany;
	struct xfrm_state *xfrm_vec_one = NULL;
66
	int nh = 0;
67 68
	int i = 0;

69
	xany = (xfrm_address_t *)&in6addr_any;
70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85

	for (i = 0; i < 3; i++) {
		xfrm_address_t *dst, *src;
		switch (i) {
		case 0:
			dst = daddr;
			src = saddr;
			break;
		case 1:
			/* lookup state with wild-card source address */
			wildcard = 1;
			dst = daddr;
			src = xany;
			break;
		case 2:
		default:
86
			/* lookup state with wild-card addresses */
87 88 89 90
			wildcard = 1; /* XXX */
			dst = xany;
			src = xany;
			break;
91
		}
92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110

		x = xfrm_state_lookup_byaddr(dst, src, proto, AF_INET6);
		if (!x)
			continue;

		spin_lock(&x->lock);

		if (wildcard) {
			if ((x->props.flags & XFRM_STATE_WILDRECV) == 0) {
				spin_unlock(&x->lock);
				xfrm_state_put(x);
				x = NULL;
				continue;
			}
		}

		if (unlikely(x->km.state != XFRM_STATE_VALID)) {
			spin_unlock(&x->lock);
			xfrm_state_put(x);
111 112
			x = NULL;
			continue;
113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163
		}
		if (xfrm_state_check_expire(x)) {
			spin_unlock(&x->lock);
			xfrm_state_put(x);
			x = NULL;
			continue;
		}

		nh = x->type->input(x, skb);
		if (nh <= 0) {
			spin_unlock(&x->lock);
			xfrm_state_put(x);
			x = NULL;
			continue;
		}

		x->curlft.bytes += skb->len;
		x->curlft.packets++;

		spin_unlock(&x->lock);

		xfrm_vec_one = x;
		break;
	}

	if (!xfrm_vec_one)
		goto drop;

	/* Allocate new secpath or COW existing one. */
	if (!skb->sp || atomic_read(&skb->sp->refcnt) != 1) {
		struct sec_path *sp;
		sp = secpath_dup(skb->sp);
		if (!sp)
			goto drop;
		if (skb->sp)
			secpath_put(skb->sp);
		skb->sp = sp;
	}

	if (1 + skb->sp->len > XFRM_MAX_DEPTH)
		goto drop;

	skb->sp->xvec[skb->sp->len] = xfrm_vec_one;
	skb->sp->len ++;

	return 1;
drop:
	if (xfrm_vec_one)
		xfrm_state_put(xfrm_vec_one);
	return -1;
}
164 165

EXPORT_SYMBOL(xfrm6_input_addr);