blob: 9bb8905088c75619ebde66739dd43896a90528fd [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * xfrm4_output.c - Common IPsec encapsulation code for IPv4.
3 * Copyright (c) 2004 Herbert Xu <herbert@gondor.apana.org.au>
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +09004 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07005 * This program is free software; you can redistribute it and/or
6 * modify it under the terms of the GNU General Public License
7 * as published by the Free Software Foundation; either version
8 * 2 of the License, or (at your option) any later version.
9 */
10
Herbert Xu09b8f7a2006-06-22 03:08:03 -070011#include <linux/if_ether.h>
12#include <linux/kernel.h>
Herbert Xu36cf9ac2007-11-13 21:40:52 -080013#include <linux/module.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070014#include <linux/skbuff.h>
Patrick McHardy16a66772006-01-06 23:01:48 -080015#include <linux/netfilter_ipv4.h>
Herbert Xu36cf9ac2007-11-13 21:40:52 -080016#include <net/dst.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070017#include <net/ip.h>
18#include <net/xfrm.h>
19#include <net/icmp.h>
20
Linus Torvalds1da177e2005-04-16 15:20:36 -070021static int xfrm4_tunnel_check_size(struct sk_buff *skb)
22{
23 int mtu, ret = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -070024
25 if (IPCB(skb)->flags & IPSKB_XFRM_TUNNEL_SIZE)
26 goto out;
27
WANG Cong60ff7462014-05-04 16:39:18 -070028 if (!(ip_hdr(skb)->frag_off & htons(IP_DF)) || skb->ignore_df)
Linus Torvalds1da177e2005-04-16 15:20:36 -070029 goto out;
30
Hannes Frederic Sowa5a25cf12013-08-26 12:31:19 +020031 mtu = dst_mtu(skb_dst(skb));
Steffen Klassertd77e38e2017-04-14 10:06:10 +020032 if ((!skb_is_gso(skb) && skb->len > mtu) ||
Daniel Axtens80f59742018-03-01 17:13:39 +110033 (skb_is_gso(skb) &&
34 !skb_gso_validate_network_len(skb, ip_skb_dst_mtu(skb->sk, skb)))) {
Steffen Klassertca064bd2015-10-19 10:30:05 +020035 skb->protocol = htons(ETH_P_IP);
36
Steffen Klassertb00897b82011-06-29 23:20:41 +000037 if (skb->sk)
Hannes Frederic Sowa628e3412013-08-14 13:05:23 +020038 xfrm_local_error(skb, mtu);
Steffen Klassertb00897b82011-06-29 23:20:41 +000039 else
40 icmp_send(skb, ICMP_DEST_UNREACH,
41 ICMP_FRAG_NEEDED, htonl(mtu));
Linus Torvalds1da177e2005-04-16 15:20:36 -070042 ret = -EMSGSIZE;
43 }
44out:
45 return ret;
46}
47
Herbert Xu36cf9ac2007-11-13 21:40:52 -080048int xfrm4_extract_output(struct xfrm_state *x, struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -070049{
Linus Torvalds1da177e2005-04-16 15:20:36 -070050 int err;
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +090051
Herbert Xu36cf9ac2007-11-13 21:40:52 -080052 err = xfrm4_tunnel_check_size(skb);
53 if (err)
54 return err;
55
Herbert Xu60d5fcf2007-11-19 18:47:58 -080056 XFRM_MODE_SKB_CB(skb)->protocol = ip_hdr(skb)->protocol;
57
Herbert Xu36cf9ac2007-11-13 21:40:52 -080058 return xfrm4_extract_header(skb);
59}
60
David Miller7026b1d2015-04-05 22:19:04 -040061int xfrm4_output_finish(struct sock *sk, struct sk_buff *skb)
Herbert Xu09b8f7a2006-06-22 03:08:03 -070062{
Steffen Klassert55967322014-04-07 08:08:52 +020063 memset(IPCB(skb), 0, sizeof(*IPCB(skb)));
Herbert Xu862b82c2007-11-13 21:43:11 -080064
Steffen Klassert55967322014-04-07 08:08:52 +020065#ifdef CONFIG_NETFILTER
Herbert Xu862b82c2007-11-13 21:43:11 -080066 IPCB(skb)->flags |= IPSKB_XFRM_TRANSFORMED;
Herbert Xu09b8f7a2006-06-22 03:08:03 -070067#endif
68
David Miller7026b1d2015-04-05 22:19:04 -040069 return xfrm_output(sk, skb);
Herbert Xu09b8f7a2006-06-22 03:08:03 -070070}
71
Eric W. Biederman0c4b51f2015-09-15 20:04:18 -050072static int __xfrm4_output(struct net *net, struct sock *sk, struct sk_buff *skb)
Steffen Klassert55967322014-04-07 08:08:52 +020073{
74 struct xfrm_state *x = skb_dst(skb)->xfrm;
Florian Westphal733a5fa2019-03-29 21:16:30 +010075 const struct xfrm_state_afinfo *afinfo;
76 int ret = -EAFNOSUPPORT;
Steffen Klassert55967322014-04-07 08:08:52 +020077
78#ifdef CONFIG_NETFILTER
79 if (!x) {
80 IPCB(skb)->flags |= IPSKB_REROUTED;
Eric W. Biederman13206b62015-10-07 16:48:35 -050081 return dst_output(net, sk, skb);
Steffen Klassert55967322014-04-07 08:08:52 +020082 }
83#endif
84
Florian Westphal733a5fa2019-03-29 21:16:30 +010085 rcu_read_lock();
Florian Westphalc9500d72019-03-29 21:16:32 +010086 afinfo = xfrm_state_afinfo_get_rcu(x->outer_mode.family);
Florian Westphal733a5fa2019-03-29 21:16:30 +010087 if (likely(afinfo))
88 ret = afinfo->output_finish(sk, skb);
89 else
90 kfree_skb(skb);
91 rcu_read_unlock();
92
93 return ret;
Steffen Klassert55967322014-04-07 08:08:52 +020094}
95
Eric W. Biedermanede20592015-10-07 16:48:47 -050096int xfrm4_output(struct net *net, struct sock *sk, struct sk_buff *skb)
Patrick McHardy16a66772006-01-06 23:01:48 -080097{
Eric W. Biederman29a26a52015-09-15 20:04:16 -050098 return NF_HOOK_COND(NFPROTO_IPV4, NF_INET_POST_ROUTING,
99 net, sk, skb, NULL, skb_dst(skb)->dev,
100 __xfrm4_output,
Patrick McHardy48d5cad2006-02-15 15:10:22 -0800101 !(IPCB(skb)->flags & IPSKB_REROUTED));
Patrick McHardy16a66772006-01-06 23:01:48 -0800102}
Hannes Frederic Sowa628e3412013-08-14 13:05:23 +0200103
104void xfrm4_local_error(struct sk_buff *skb, u32 mtu)
105{
106 struct iphdr *hdr;
107
108 hdr = skb->encapsulation ? inner_ip_hdr(skb) : ip_hdr(skb);
109 ip_local_error(skb->sk, EMSGSIZE, hdr->daddr,
110 inet_sk(skb->sk)->inet_dport, mtu);
111}