xfrm6_input.c 3.1 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3 4 5 6 7 8 9 10 11 12 13
/*
 * xfrm6_input.c: based on net/ipv4/xfrm4_input.c
 *
 * Authors:
 *	Mitsuru KANDA @USAGI
 * 	Kazunori MIYAZAWA @USAGI
 * 	Kunihiro Ishiguro <kunihiro@ipinfusion.com>
 *	YOSHIFUJI Hideaki @USAGI
 *		IPv6 support
 */

#include <linux/module.h>
#include <linux/string.h>
14 15
#include <linux/netfilter.h>
#include <linux/netfilter_ipv6.h>
L
Linus Torvalds 已提交
16 17 18
#include <net/ipv6.h>
#include <net/xfrm.h>

19 20 21 22 23
int xfrm6_extract_input(struct xfrm_state *x, struct sk_buff *skb)
{
	return xfrm6_extract_header(skb);
}

24
int xfrm6_rcv_spi(struct sk_buff *skb, int nexthdr, __be32 spi)
L
Linus Torvalds 已提交
25
{
26 27 28 29 30
	XFRM_SPI_SKB_CB(skb)->nhoff = IP6CB(skb)->nhoff;
	XFRM_SPI_SKB_CB(skb)->daddroff = offsetof(struct ipv6hdr, daddr);
	return xfrm_input(skb, nexthdr, spi, 0);
}
EXPORT_SYMBOL(xfrm6_rcv_spi);
31

32 33
int xfrm6_transport_finish(struct sk_buff *skb, int async)
{
34
#ifdef CONFIG_NETFILTER
35 36
	ipv6_hdr(skb)->payload_len = htons(skb->len);
	__skb_push(skb, skb->data - skb_network_header(skb));
37

38 39 40
	NF_HOOK(PF_INET6, NF_IP6_PRE_ROUTING, skb, skb->dev, NULL,
		ip6_rcv_finish);
	return -1;
41
#else
42
	return 1;
43
#endif
L
Linus Torvalds 已提交
44 45
}

46
int xfrm6_rcv(struct sk_buff *skb)
L
Linus Torvalds 已提交
47
{
48 49
	return xfrm6_rcv_spi(skb, skb_network_header(skb)[IP6CB(skb)->nhoff],
			     0);
L
Linus Torvalds 已提交
50
}
51

52 53
EXPORT_SYMBOL(xfrm6_rcv);

54 55 56
int xfrm6_input_addr(struct sk_buff *skb, xfrm_address_t *daddr,
		     xfrm_address_t *saddr, u8 proto)
{
57 58
	struct xfrm_state *x = NULL;
	int wildcard = 0;
59 60
	xfrm_address_t *xany;
	struct xfrm_state *xfrm_vec_one = NULL;
61
	int nh = 0;
62 63
	int i = 0;

64
	xany = (xfrm_address_t *)&in6addr_any;
65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80

	for (i = 0; i < 3; i++) {
		xfrm_address_t *dst, *src;
		switch (i) {
		case 0:
			dst = daddr;
			src = saddr;
			break;
		case 1:
			/* lookup state with wild-card source address */
			wildcard = 1;
			dst = daddr;
			src = xany;
			break;
		case 2:
		default:
81
			/* lookup state with wild-card addresses */
82 83 84 85
			wildcard = 1; /* XXX */
			dst = xany;
			src = xany;
			break;
86
		}
87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105

		x = xfrm_state_lookup_byaddr(dst, src, proto, AF_INET6);
		if (!x)
			continue;

		spin_lock(&x->lock);

		if (wildcard) {
			if ((x->props.flags & XFRM_STATE_WILDRECV) == 0) {
				spin_unlock(&x->lock);
				xfrm_state_put(x);
				x = NULL;
				continue;
			}
		}

		if (unlikely(x->km.state != XFRM_STATE_VALID)) {
			spin_unlock(&x->lock);
			xfrm_state_put(x);
106 107
			x = NULL;
			continue;
108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158
		}
		if (xfrm_state_check_expire(x)) {
			spin_unlock(&x->lock);
			xfrm_state_put(x);
			x = NULL;
			continue;
		}

		nh = x->type->input(x, skb);
		if (nh <= 0) {
			spin_unlock(&x->lock);
			xfrm_state_put(x);
			x = NULL;
			continue;
		}

		x->curlft.bytes += skb->len;
		x->curlft.packets++;

		spin_unlock(&x->lock);

		xfrm_vec_one = x;
		break;
	}

	if (!xfrm_vec_one)
		goto drop;

	/* Allocate new secpath or COW existing one. */
	if (!skb->sp || atomic_read(&skb->sp->refcnt) != 1) {
		struct sec_path *sp;
		sp = secpath_dup(skb->sp);
		if (!sp)
			goto drop;
		if (skb->sp)
			secpath_put(skb->sp);
		skb->sp = sp;
	}

	if (1 + skb->sp->len > XFRM_MAX_DEPTH)
		goto drop;

	skb->sp->xvec[skb->sp->len] = xfrm_vec_one;
	skb->sp->len ++;

	return 1;
drop:
	if (xfrm_vec_one)
		xfrm_state_put(xfrm_vec_one);
	return -1;
}
159 160

EXPORT_SYMBOL(xfrm6_input_addr);