xfrm4_output.c 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117
  1. /*
  2. * xfrm4_output.c - Common IPsec encapsulation code for IPv4.
  3. * Copyright (c) 2004 Herbert Xu <herbert@gondor.apana.org.au>
  4. *
  5. * This program is free software; you can redistribute it and/or
  6. * modify it under the terms of the GNU General Public License
  7. * as published by the Free Software Foundation; either version
  8. * 2 of the License, or (at your option) any later version.
  9. */
  10. #include <linux/if_ether.h>
  11. #include <linux/kernel.h>
  12. #include <linux/module.h>
  13. #include <linux/skbuff.h>
  14. #include <linux/netfilter_ipv4.h>
  15. #include <net/dst.h>
  16. #include <net/ip.h>
  17. #include <net/xfrm.h>
  18. #include <net/icmp.h>
  19. static int xfrm4_tunnel_check_size(struct sk_buff *skb)
  20. {
  21. int mtu, ret = 0;
  22. if (IPCB(skb)->flags & IPSKB_XFRM_TUNNEL_SIZE)
  23. goto out;
  24. if (!(ip_hdr(skb)->frag_off & htons(IP_DF)) || skb->ignore_df)
  25. goto out;
  26. mtu = dst_mtu(skb_dst(skb));
  27. if ((!skb_is_gso(skb) && skb->len > mtu) ||
  28. (skb_is_gso(skb) &&
  29. !skb_gso_validate_network_len(skb, ip_skb_dst_mtu(skb->sk, skb)))) {
  30. skb->protocol = htons(ETH_P_IP);
  31. if (skb->sk)
  32. xfrm_local_error(skb, mtu);
  33. else
  34. icmp_send(skb, ICMP_DEST_UNREACH,
  35. ICMP_FRAG_NEEDED, htonl(mtu));
  36. ret = -EMSGSIZE;
  37. }
  38. out:
  39. return ret;
  40. }
  41. int xfrm4_extract_output(struct xfrm_state *x, struct sk_buff *skb)
  42. {
  43. int err;
  44. err = xfrm4_tunnel_check_size(skb);
  45. if (err)
  46. return err;
  47. XFRM_MODE_SKB_CB(skb)->protocol = ip_hdr(skb)->protocol;
  48. return xfrm4_extract_header(skb);
  49. }
  50. int xfrm4_prepare_output(struct xfrm_state *x, struct sk_buff *skb)
  51. {
  52. int err;
  53. err = xfrm_inner_extract_output(x, skb);
  54. if (err)
  55. return err;
  56. IPCB(skb)->flags |= IPSKB_XFRM_TUNNEL_SIZE;
  57. skb->protocol = htons(ETH_P_IP);
  58. return x->outer_mode->output2(x, skb);
  59. }
  60. EXPORT_SYMBOL(xfrm4_prepare_output);
  61. int xfrm4_output_finish(struct sock *sk, struct sk_buff *skb)
  62. {
  63. memset(IPCB(skb), 0, sizeof(*IPCB(skb)));
  64. #ifdef CONFIG_NETFILTER
  65. IPCB(skb)->flags |= IPSKB_XFRM_TRANSFORMED;
  66. #endif
  67. return xfrm_output(sk, skb);
  68. }
  69. static int __xfrm4_output(struct net *net, struct sock *sk, struct sk_buff *skb)
  70. {
  71. struct xfrm_state *x = skb_dst(skb)->xfrm;
  72. #ifdef CONFIG_NETFILTER
  73. if (!x) {
  74. IPCB(skb)->flags |= IPSKB_REROUTED;
  75. return dst_output(net, sk, skb);
  76. }
  77. #endif
  78. return x->outer_mode->afinfo->output_finish(sk, skb);
  79. }
  80. int xfrm4_output(struct net *net, struct sock *sk, struct sk_buff *skb)
  81. {
  82. return NF_HOOK_COND(NFPROTO_IPV4, NF_INET_POST_ROUTING,
  83. net, sk, skb, NULL, skb_dst(skb)->dev,
  84. __xfrm4_output,
  85. !(IPCB(skb)->flags & IPSKB_REROUTED));
  86. }
  87. void xfrm4_local_error(struct sk_buff *skb, u32 mtu)
  88. {
  89. struct iphdr *hdr;
  90. hdr = skb->encapsulation ? inner_ip_hdr(skb) : ip_hdr(skb);
  91. ip_local_error(skb->sk, EMSGSIZE, hdr->daddr,
  92. inet_sk(skb->sk)->inet_dport, mtu);
  93. }