2005-04-16 15:20:36 -07:00
/*
* xfrm4_output . c - Common IPsec encapsulation code for IPv4 .
* Copyright ( c ) 2004 Herbert Xu < herbert @ gondor . apana . org . au >
2007-02-09 23:24:47 +09:00
*
2005-04-16 15:20:36 -07:00
* This program is free software ; you can redistribute it and / or
* modify it under the terms of the GNU General Public License
* as published by the Free Software Foundation ; either version
* 2 of the License , or ( at your option ) any later version .
*/
2006-01-06 23:01:48 -08:00
# include <linux/compiler.h>
2006-06-22 03:08:03 -07:00
# include <linux/if_ether.h>
# include <linux/kernel.h>
2005-04-16 15:20:36 -07:00
# include <linux/skbuff.h>
2006-01-06 23:01:48 -08:00
# include <linux/netfilter_ipv4.h>
2005-04-16 15:20:36 -07:00
# include <net/ip.h>
# include <net/xfrm.h>
# include <net/icmp.h>
static int xfrm4_tunnel_check_size ( struct sk_buff * skb )
{
int mtu , ret = 0 ;
struct dst_entry * dst ;
if ( IPCB ( skb ) - > flags & IPSKB_XFRM_TUNNEL_SIZE )
goto out ;
IPCB ( skb ) - > flags | = IPSKB_XFRM_TUNNEL_SIZE ;
2007-02-09 23:24:47 +09:00
2007-04-20 22:47:35 -07:00
if ( ! ( ip_hdr ( skb ) - > frag_off & htons ( IP_DF ) ) | | skb - > local_df )
2005-04-16 15:20:36 -07:00
goto out ;
dst = skb - > dst ;
mtu = dst_mtu ( dst ) ;
if ( skb - > len > mtu ) {
icmp_send ( skb , ICMP_DEST_UNREACH , ICMP_FRAG_NEEDED , htonl ( mtu ) ) ;
ret = - EMSGSIZE ;
}
out :
return ret ;
}
2007-10-08 17:16:30 -07:00
static inline int xfrm4_output_one ( struct sk_buff * skb )
2005-04-16 15:20:36 -07:00
{
struct dst_entry * dst = skb - > dst ;
struct xfrm_state * x = dst - > xfrm ;
int err ;
2007-02-09 23:24:47 +09:00
2006-09-22 15:05:15 -07:00
if ( x - > props . mode = = XFRM_MODE_TUNNEL ) {
2005-04-16 15:20:36 -07:00
err = xfrm4_tunnel_check_size ( skb ) ;
if ( err )
goto error_nolock ;
}
2007-10-08 17:16:30 -07:00
err = xfrm_output ( skb ) ;
if ( err )
goto error_nolock ;
2006-01-06 23:01:48 -08:00
2006-01-06 23:04:54 -08:00
IPCB ( skb ) - > flags | = IPSKB_XFRM_TRANSFORMED ;
2006-01-06 23:01:48 -08:00
err = 0 ;
2005-04-16 15:20:36 -07:00
out_exit :
return err ;
error_nolock :
kfree_skb ( skb ) ;
goto out_exit ;
}
2006-01-06 23:01:48 -08:00
2006-06-22 03:08:03 -07:00
static int xfrm4_output_finish2 ( struct sk_buff * skb )
2006-01-06 23:01:48 -08:00
{
int err ;
while ( likely ( ( err = xfrm4_output_one ( skb ) ) = = 0 ) ) {
nf_reset ( skb ) ;
err = nf_hook ( PF_INET , NF_IP_LOCAL_OUT , & skb , NULL ,
skb - > dst - > dev , dst_output ) ;
if ( unlikely ( err ! = 1 ) )
break ;
if ( ! skb - > dst - > xfrm )
return dst_output ( skb ) ;
err = nf_hook ( PF_INET , NF_IP_POST_ROUTING , & skb , NULL ,
2006-06-22 03:08:03 -07:00
skb - > dst - > dev , xfrm4_output_finish2 ) ;
2006-01-06 23:01:48 -08:00
if ( unlikely ( err ! = 1 ) )
break ;
}
return err ;
}
2006-06-22 03:08:03 -07:00
static int xfrm4_output_finish ( struct sk_buff * skb )
{
struct sk_buff * segs ;
# ifdef CONFIG_NETFILTER
if ( ! skb - > dst - > xfrm ) {
IPCB ( skb ) - > flags | = IPSKB_REROUTED ;
return dst_output ( skb ) ;
}
# endif
2006-07-08 13:34:32 -07:00
if ( ! skb_is_gso ( skb ) )
2006-06-22 03:08:03 -07:00
return xfrm4_output_finish2 ( skb ) ;
skb - > protocol = htons ( ETH_P_IP ) ;
segs = skb_gso_segment ( skb , 0 ) ;
kfree_skb ( skb ) ;
if ( unlikely ( IS_ERR ( segs ) ) )
return PTR_ERR ( segs ) ;
do {
struct sk_buff * nskb = segs - > next ;
int err ;
segs - > next = NULL ;
err = xfrm4_output_finish2 ( segs ) ;
if ( unlikely ( err ) ) {
while ( ( segs = nskb ) ) {
nskb = segs - > next ;
segs - > next = NULL ;
kfree_skb ( segs ) ;
}
return err ;
}
segs = nskb ;
} while ( segs ) ;
return 0 ;
}
2006-01-06 23:01:48 -08:00
int xfrm4_output ( struct sk_buff * skb )
{
2006-02-15 15:10:22 -08:00
return NF_HOOK_COND ( PF_INET , NF_IP_POST_ROUTING , skb , NULL , skb - > dst - > dev ,
xfrm4_output_finish ,
! ( IPCB ( skb ) - > flags & IPSKB_REROUTED ) ) ;
2006-01-06 23:01:48 -08:00
}