Loading...
1// SPDX-License-Identifier: GPL-2.0-or-later
2/*
3 * xfrm6_output.c - Common IPsec encapsulation code for IPv6.
4 * Copyright (C) 2002 USAGI/WIDE Project
5 * Copyright (c) 2004 Herbert Xu <herbert@gondor.apana.org.au>
6 */
7
8#include <linux/if_ether.h>
9#include <linux/kernel.h>
10#include <linux/module.h>
11#include <linux/skbuff.h>
12#include <linux/icmpv6.h>
13#include <linux/netfilter_ipv6.h>
14#include <net/dst.h>
15#include <net/ipv6.h>
16#include <net/ip6_route.h>
17#include <net/xfrm.h>
18
19void xfrm6_local_rxpmtu(struct sk_buff *skb, u32 mtu)
20{
21 struct flowi6 fl6;
22 struct sock *sk = skb->sk;
23
24 fl6.flowi6_oif = sk->sk_bound_dev_if;
25 fl6.daddr = ipv6_hdr(skb)->daddr;
26
27 ipv6_local_rxpmtu(sk, &fl6, mtu);
28}
29
30void xfrm6_local_error(struct sk_buff *skb, u32 mtu)
31{
32 struct flowi6 fl6;
33 const struct ipv6hdr *hdr;
34 struct sock *sk = skb->sk;
35
36 hdr = skb->encapsulation ? inner_ipv6_hdr(skb) : ipv6_hdr(skb);
37 fl6.fl6_dport = inet_sk(sk)->inet_dport;
38 fl6.daddr = hdr->daddr;
39
40 ipv6_local_error(sk, EMSGSIZE, &fl6, mtu);
41}
42
43static int __xfrm6_output_finish(struct net *net, struct sock *sk, struct sk_buff *skb)
44{
45 return xfrm_output(sk, skb);
46}
47
48static int xfrm6_noneed_fragment(struct sk_buff *skb)
49{
50 struct frag_hdr *fh;
51 u8 prevhdr = ipv6_hdr(skb)->nexthdr;
52
53 if (prevhdr != NEXTHDR_FRAGMENT)
54 return 0;
55 fh = (struct frag_hdr *)(skb->data + sizeof(struct ipv6hdr));
56 if (fh->nexthdr == NEXTHDR_ESP || fh->nexthdr == NEXTHDR_AUTH)
57 return 1;
58 return 0;
59}
60
61static int __xfrm6_output(struct net *net, struct sock *sk, struct sk_buff *skb)
62{
63 struct dst_entry *dst = skb_dst(skb);
64 struct xfrm_state *x = dst->xfrm;
65 unsigned int mtu;
66 bool toobig;
67
68#ifdef CONFIG_NETFILTER
69 if (!x) {
70 IP6CB(skb)->flags |= IP6SKB_REROUTED;
71 return dst_output(net, sk, skb);
72 }
73#endif
74
75 if (x->props.mode != XFRM_MODE_TUNNEL)
76 goto skip_frag;
77
78 if (skb->protocol == htons(ETH_P_IPV6))
79 mtu = ip6_skb_dst_mtu(skb);
80 else
81 mtu = dst_mtu(skb_dst(skb));
82
83 toobig = skb->len > mtu && !skb_is_gso(skb);
84
85 if (toobig && xfrm6_local_dontfrag(skb->sk)) {
86 xfrm6_local_rxpmtu(skb, mtu);
87 kfree_skb(skb);
88 return -EMSGSIZE;
89 } else if (toobig && xfrm6_noneed_fragment(skb)) {
90 skb->ignore_df = 1;
91 goto skip_frag;
92 } else if (!skb->ignore_df && toobig && skb->sk) {
93 xfrm_local_error(skb, mtu);
94 kfree_skb(skb);
95 return -EMSGSIZE;
96 }
97
98 if (toobig)
99 return ip6_fragment(net, sk, skb,
100 __xfrm6_output_finish);
101
102skip_frag:
103 return xfrm_output(sk, skb);
104}
105
106int xfrm6_output(struct net *net, struct sock *sk, struct sk_buff *skb)
107{
108 return NF_HOOK_COND(NFPROTO_IPV6, NF_INET_POST_ROUTING,
109 net, sk, skb, skb->dev, skb_dst(skb)->dev,
110 __xfrm6_output,
111 !(IP6CB(skb)->flags & IP6SKB_REROUTED));
112}
1// SPDX-License-Identifier: GPL-2.0-or-later
2/*
3 * xfrm6_output.c - Common IPsec encapsulation code for IPv6.
4 * Copyright (C) 2002 USAGI/WIDE Project
5 * Copyright (c) 2004 Herbert Xu <herbert@gondor.apana.org.au>
6 */
7
8#include <linux/if_ether.h>
9#include <linux/kernel.h>
10#include <linux/module.h>
11#include <linux/skbuff.h>
12#include <linux/icmpv6.h>
13#include <linux/netfilter_ipv6.h>
14#include <net/dst.h>
15#include <net/ipv6.h>
16#include <net/ip6_route.h>
17#include <net/xfrm.h>
18
19int xfrm6_find_1stfragopt(struct xfrm_state *x, struct sk_buff *skb,
20 u8 **prevhdr)
21{
22 return ip6_find_1stfragopt(skb, prevhdr);
23}
24EXPORT_SYMBOL(xfrm6_find_1stfragopt);
25
26static int xfrm6_local_dontfrag(struct sk_buff *skb)
27{
28 int proto;
29 struct sock *sk = skb->sk;
30
31 if (sk) {
32 if (sk->sk_family != AF_INET6)
33 return 0;
34
35 proto = sk->sk_protocol;
36 if (proto == IPPROTO_UDP || proto == IPPROTO_RAW)
37 return inet6_sk(sk)->dontfrag;
38 }
39
40 return 0;
41}
42
43static void xfrm6_local_rxpmtu(struct sk_buff *skb, u32 mtu)
44{
45 struct flowi6 fl6;
46 struct sock *sk = skb->sk;
47
48 fl6.flowi6_oif = sk->sk_bound_dev_if;
49 fl6.daddr = ipv6_hdr(skb)->daddr;
50
51 ipv6_local_rxpmtu(sk, &fl6, mtu);
52}
53
54void xfrm6_local_error(struct sk_buff *skb, u32 mtu)
55{
56 struct flowi6 fl6;
57 const struct ipv6hdr *hdr;
58 struct sock *sk = skb->sk;
59
60 hdr = skb->encapsulation ? inner_ipv6_hdr(skb) : ipv6_hdr(skb);
61 fl6.fl6_dport = inet_sk(sk)->inet_dport;
62 fl6.daddr = hdr->daddr;
63
64 ipv6_local_error(sk, EMSGSIZE, &fl6, mtu);
65}
66
67static int xfrm6_tunnel_check_size(struct sk_buff *skb)
68{
69 int mtu, ret = 0;
70 struct dst_entry *dst = skb_dst(skb);
71
72 if (skb->ignore_df)
73 goto out;
74
75 mtu = dst_mtu(dst);
76 if (mtu < IPV6_MIN_MTU)
77 mtu = IPV6_MIN_MTU;
78
79 if ((!skb_is_gso(skb) && skb->len > mtu) ||
80 (skb_is_gso(skb) &&
81 !skb_gso_validate_network_len(skb, ip6_skb_dst_mtu(skb)))) {
82 skb->dev = dst->dev;
83 skb->protocol = htons(ETH_P_IPV6);
84
85 if (xfrm6_local_dontfrag(skb))
86 xfrm6_local_rxpmtu(skb, mtu);
87 else if (skb->sk)
88 xfrm_local_error(skb, mtu);
89 else
90 icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
91 ret = -EMSGSIZE;
92 }
93out:
94 return ret;
95}
96
97int xfrm6_extract_output(struct xfrm_state *x, struct sk_buff *skb)
98{
99 int err;
100
101 err = xfrm6_tunnel_check_size(skb);
102 if (err)
103 return err;
104
105 XFRM_MODE_SKB_CB(skb)->protocol = ipv6_hdr(skb)->nexthdr;
106
107 return xfrm6_extract_header(skb);
108}
109
110int xfrm6_output_finish(struct sock *sk, struct sk_buff *skb)
111{
112 memset(IP6CB(skb), 0, sizeof(*IP6CB(skb)));
113
114#ifdef CONFIG_NETFILTER
115 IP6CB(skb)->flags |= IP6SKB_XFRM_TRANSFORMED;
116#endif
117
118 return xfrm_output(sk, skb);
119}
120
121static int __xfrm6_output_state_finish(struct xfrm_state *x, struct sock *sk,
122 struct sk_buff *skb)
123{
124 const struct xfrm_state_afinfo *afinfo;
125 int ret = -EAFNOSUPPORT;
126
127 rcu_read_lock();
128 afinfo = xfrm_state_afinfo_get_rcu(x->outer_mode.family);
129 if (likely(afinfo))
130 ret = afinfo->output_finish(sk, skb);
131 else
132 kfree_skb(skb);
133 rcu_read_unlock();
134
135 return ret;
136}
137
138static int __xfrm6_output_finish(struct net *net, struct sock *sk, struct sk_buff *skb)
139{
140 struct xfrm_state *x = skb_dst(skb)->xfrm;
141
142 return __xfrm6_output_state_finish(x, sk, skb);
143}
144
145static int __xfrm6_output(struct net *net, struct sock *sk, struct sk_buff *skb)
146{
147 struct dst_entry *dst = skb_dst(skb);
148 struct xfrm_state *x = dst->xfrm;
149 int mtu;
150 bool toobig;
151
152#ifdef CONFIG_NETFILTER
153 if (!x) {
154 IP6CB(skb)->flags |= IP6SKB_REROUTED;
155 return dst_output(net, sk, skb);
156 }
157#endif
158
159 if (x->props.mode != XFRM_MODE_TUNNEL)
160 goto skip_frag;
161
162 if (skb->protocol == htons(ETH_P_IPV6))
163 mtu = ip6_skb_dst_mtu(skb);
164 else
165 mtu = dst_mtu(skb_dst(skb));
166
167 toobig = skb->len > mtu && !skb_is_gso(skb);
168
169 if (toobig && xfrm6_local_dontfrag(skb)) {
170 xfrm6_local_rxpmtu(skb, mtu);
171 kfree_skb(skb);
172 return -EMSGSIZE;
173 } else if (!skb->ignore_df && toobig && skb->sk) {
174 xfrm_local_error(skb, mtu);
175 kfree_skb(skb);
176 return -EMSGSIZE;
177 }
178
179 if (toobig || dst_allfrag(skb_dst(skb)))
180 return ip6_fragment(net, sk, skb,
181 __xfrm6_output_finish);
182
183skip_frag:
184 return __xfrm6_output_state_finish(x, sk, skb);
185}
186
187int xfrm6_output(struct net *net, struct sock *sk, struct sk_buff *skb)
188{
189 return NF_HOOK_COND(NFPROTO_IPV6, NF_INET_POST_ROUTING,
190 net, sk, skb, NULL, skb_dst(skb)->dev,
191 __xfrm6_output,
192 !(IP6CB(skb)->flags & IP6SKB_REROUTED));
193}