1 // SPDX-License-Identifier: GPL-2.0
3 * xfrm6_input.c: based on net/ipv4/xfrm4_input.c
7 * Kazunori MIYAZAWA @USAGI
8 * Kunihiro Ishiguro <kunihiro@ipinfusion.com>
9 * YOSHIFUJI Hideaki @USAGI
13 #include <linux/module.h>
14 #include <linux/string.h>
15 #include <linux/netfilter.h>
16 #include <linux/netfilter_ipv6.h>
19 #include <net/protocol.h>
22 int xfrm6_rcv_spi(struct sk_buff
*skb
, int nexthdr
, __be32 spi
,
25 XFRM_TUNNEL_SKB_CB(skb
)->tunnel
.ip6
= t
;
26 XFRM_SPI_SKB_CB(skb
)->family
= AF_INET6
;
27 XFRM_SPI_SKB_CB(skb
)->daddroff
= offsetof(struct ipv6hdr
, daddr
);
28 return xfrm_input(skb
, nexthdr
, spi
, 0);
30 EXPORT_SYMBOL(xfrm6_rcv_spi
);
32 static int xfrm6_transport_finish2(struct net
*net
, struct sock
*sk
,
35 if (xfrm_trans_queue(skb
, ip6_rcv_finish
)) {
43 int xfrm6_transport_finish(struct sk_buff
*skb
, int async
)
45 struct xfrm_offload
*xo
= xfrm_offload(skb
);
46 int nhlen
= -skb_network_offset(skb
);
48 skb_network_header(skb
)[IP6CB(skb
)->nhoff
] =
49 XFRM_MODE_SKB_CB(skb
)->protocol
;
51 #ifndef CONFIG_NETFILTER
56 __skb_push(skb
, nhlen
);
57 ipv6_hdr(skb
)->payload_len
= htons(skb
->len
- sizeof(struct ipv6hdr
));
58 skb_postpush_rcsum(skb
, skb_network_header(skb
), nhlen
);
60 if (xo
&& (xo
->flags
& XFRM_GRO
)) {
61 /* The full l2 header needs to be preserved so that re-injecting the packet at l2
62 * works correctly in the presence of vlan tags.
64 skb_mac_header_rebuild_full(skb
, xo
->orig_mac_len
);
65 skb_reset_network_header(skb
);
66 skb_reset_transport_header(skb
);
70 NF_HOOK(NFPROTO_IPV6
, NF_INET_PRE_ROUTING
,
71 dev_net(skb
->dev
), NULL
, skb
, skb
->dev
, NULL
,
72 xfrm6_transport_finish2
);
76 static int __xfrm6_udp_encap_rcv(struct sock
*sk
, struct sk_buff
*skb
, bool pull
)
78 struct udp_sock
*up
= udp_sk(sk
);
82 int ip6hlen
= sizeof(struct ipv6hdr
);
87 encap_type
= READ_ONCE(up
->encap_type
);
88 /* if this is not encapsulated socket, then just return now */
92 /* If this is a paged skb, make sure we pull up
93 * whatever data we need to look at. */
94 len
= skb
->len
- sizeof(struct udphdr
);
95 if (!pskb_may_pull(skb
, sizeof(struct udphdr
) + min(len
, 8)))
98 /* Now we can get the pointers */
100 udpdata
= (__u8
*)uh
+ sizeof(struct udphdr
);
101 udpdata32
= (__be32
*)udpdata
;
103 switch (encap_type
) {
105 case UDP_ENCAP_ESPINUDP
:
106 /* Check if this is a keepalive packet. If so, eat it. */
107 if (len
== 1 && udpdata
[0] == 0xff) {
109 } else if (len
> sizeof(struct ip_esp_hdr
) && udpdata32
[0] != 0) {
110 /* ESP Packet without Non-ESP header */
111 len
= sizeof(struct udphdr
);
113 /* Must be an IKE packet.. pass it through */
118 /* At this point we are sure that this is an ESPinUDP packet,
119 * so we need to remove 'len' bytes from the packet (the UDP
120 * header and optional ESP marker bytes) and then modify the
121 * protocol to ESP, and then call into the transform receiver.
123 if (skb_unclone(skb
, GFP_ATOMIC
))
126 /* Now we can update and verify the packet length... */
127 ip6h
= ipv6_hdr(skb
);
128 ip6h
->payload_len
= htons(ntohs(ip6h
->payload_len
) - len
);
129 if (skb
->len
< ip6hlen
+ len
) {
130 /* packet is too small!?! */
134 /* pull the data buffer up to the ESP header and set the
135 * transport header to point to ESP. Keep UDP on the stack
139 __skb_pull(skb
, len
);
140 skb_reset_transport_header(skb
);
142 skb_set_transport_header(skb
, len
);
149 /* If it's a keepalive packet, then just eat it.
150 * If it's an encapsulated packet, then pass it to the
152 * Returns 0 if skb passed to xfrm or was dropped.
153 * Returns >0 if skb should be passed to UDP.
154 * Returns <0 if skb should be resubmitted (-ret is protocol)
156 int xfrm6_udp_encap_rcv(struct sock
*sk
, struct sk_buff
*skb
)
160 if (skb
->protocol
== htons(ETH_P_IP
))
161 return xfrm4_udp_encap_rcv(sk
, skb
);
163 ret
= __xfrm6_udp_encap_rcv(sk
, skb
, true);
165 return xfrm6_rcv_encap(skb
, IPPROTO_ESP
, 0,
166 udp_sk(sk
)->encap_type
);
176 struct sk_buff
*xfrm6_gro_udp_encap_rcv(struct sock
*sk
, struct list_head
*head
,
179 int offset
= skb_gro_offset(skb
);
180 const struct net_offload
*ops
;
181 struct sk_buff
*pp
= NULL
;
184 if (skb
->protocol
== htons(ETH_P_IP
))
185 return xfrm4_gro_udp_encap_rcv(sk
, head
, skb
);
187 offset
= offset
- sizeof(struct udphdr
);
189 if (!pskb_pull(skb
, offset
))
193 ops
= rcu_dereference(inet6_offloads
[IPPROTO_ESP
]);
194 if (!ops
|| !ops
->callbacks
.gro_receive
)
197 ret
= __xfrm6_udp_encap_rcv(sk
, skb
, false);
201 skb_push(skb
, offset
);
202 NAPI_GRO_CB(skb
)->proto
= IPPROTO_UDP
;
204 pp
= call_gro_receive(ops
->callbacks
.gro_receive
, head
, skb
);
211 skb_push(skb
, offset
);
212 NAPI_GRO_CB(skb
)->same_flow
= 0;
213 NAPI_GRO_CB(skb
)->flush
= 1;
218 int xfrm6_rcv_tnl(struct sk_buff
*skb
, struct ip6_tnl
*t
)
220 return xfrm6_rcv_spi(skb
, skb_network_header(skb
)[IP6CB(skb
)->nhoff
],
223 EXPORT_SYMBOL(xfrm6_rcv_tnl
);
225 int xfrm6_rcv(struct sk_buff
*skb
)
227 return xfrm6_rcv_tnl(skb
, NULL
);
229 EXPORT_SYMBOL(xfrm6_rcv
);
230 int xfrm6_input_addr(struct sk_buff
*skb
, xfrm_address_t
*daddr
,
231 xfrm_address_t
*saddr
, u8 proto
)
233 struct net
*net
= dev_net(skb
->dev
);
234 struct xfrm_state
*x
= NULL
;
238 sp
= secpath_set(skb
);
240 XFRM_INC_STATS(net
, LINUX_MIB_XFRMINERROR
);
244 if (1 + sp
->len
== XFRM_MAX_DEPTH
) {
245 XFRM_INC_STATS(net
, LINUX_MIB_XFRMINBUFFERERROR
);
249 for (i
= 0; i
< 3; i
++) {
250 xfrm_address_t
*dst
, *src
;
258 /* lookup state with wild-card source address */
260 src
= (xfrm_address_t
*)&in6addr_any
;
263 /* lookup state with wild-card addresses */
264 dst
= (xfrm_address_t
*)&in6addr_any
;
265 src
= (xfrm_address_t
*)&in6addr_any
;
269 x
= xfrm_state_lookup_byaddr(net
, skb
->mark
, dst
, src
, proto
, AF_INET6
);
273 if (unlikely(x
->dir
&& x
->dir
!= XFRM_SA_DIR_IN
)) {
274 XFRM_INC_STATS(net
, LINUX_MIB_XFRMINSTATEDIRERROR
);
282 if ((!i
|| (x
->props
.flags
& XFRM_STATE_WILDRECV
)) &&
283 likely(x
->km
.state
== XFRM_STATE_VALID
) &&
284 !xfrm_state_check_expire(x
)) {
285 spin_unlock(&x
->lock
);
286 if (x
->type
->input(x
, skb
) > 0) {
287 /* found a valid state */
291 spin_unlock(&x
->lock
);
298 XFRM_INC_STATS(net
, LINUX_MIB_XFRMINNOSTATES
);
299 xfrm_audit_state_notfound_simple(skb
, AF_INET6
);
303 sp
->xvec
[sp
->len
++] = x
;
307 x
->curlft
.bytes
+= skb
->len
;
310 spin_unlock(&x
->lock
);
317 EXPORT_SYMBOL(xfrm6_input_addr
);