blob: 6a74080005cf6acf15fa59d6d3dd14cbf01a1781 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * xfrm6_output.c - Common IPsec encapsulation code for IPv6.
3 * Copyright (C) 2002 USAGI/WIDE Project
4 * Copyright (c) 2004 Herbert Xu <herbert@gondor.apana.org.au>
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09005 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07006 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 */
11
Herbert Xu406ef772007-10-08 17:16:30 -070012#include <linux/if_ether.h>
Herbert Xu36cf9ac2007-11-13 21:40:52 -080013#include <linux/kernel.h>
14#include <linux/module.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070015#include <linux/skbuff.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070016#include <linux/icmpv6.h>
Patrick McHardy16a66772006-01-06 23:01:48 -080017#include <linux/netfilter_ipv6.h>
Herbert Xu36cf9ac2007-11-13 21:40:52 -080018#include <net/dst.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070019#include <net/ipv6.h>
David Stevensad0081e2010-12-17 11:42:42 +000020#include <net/ip6_route.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070021#include <net/xfrm.h>
22
Masahide NAKAMURAaee5adb2006-08-23 17:57:28 -070023int xfrm6_find_1stfragopt(struct xfrm_state *x, struct sk_buff *skb,
24 u8 **prevhdr)
25{
26 return ip6_find_1stfragopt(skb, prevhdr);
27}
YOSHIFUJI Hideaki71590392007-02-22 22:05:40 +090028EXPORT_SYMBOL(xfrm6_find_1stfragopt);
29
Steffen Klassertdd767852011-10-11 01:44:30 +000030static int xfrm6_local_dontfrag(struct sk_buff *skb)
31{
32 int proto;
33 struct sock *sk = skb->sk;
34
35 if (sk) {
Hannes Frederic Sowa628e3412013-08-14 13:05:23 +020036 if (sk->sk_family != AF_INET6)
37 return 0;
Steffen Klassertdd767852011-10-11 01:44:30 +000038
Hannes Frederic Sowa628e3412013-08-14 13:05:23 +020039 proto = sk->sk_protocol;
Steffen Klassertdd767852011-10-11 01:44:30 +000040 if (proto == IPPROTO_UDP || proto == IPPROTO_RAW)
41 return inet6_sk(sk)->dontfrag;
42 }
43
44 return 0;
45}
46
47static void xfrm6_local_rxpmtu(struct sk_buff *skb, u32 mtu)
48{
49 struct flowi6 fl6;
50 struct sock *sk = skb->sk;
51
52 fl6.flowi6_oif = sk->sk_bound_dev_if;
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +000053 fl6.daddr = ipv6_hdr(skb)->daddr;
Steffen Klassertdd767852011-10-11 01:44:30 +000054
55 ipv6_local_rxpmtu(sk, &fl6, mtu);
56}
57
Hannes Frederic Sowa628e3412013-08-14 13:05:23 +020058void xfrm6_local_error(struct sk_buff *skb, u32 mtu)
Steffen Klassertdd767852011-10-11 01:44:30 +000059{
60 struct flowi6 fl6;
Hannes Frederic Sowa5d0ff542013-08-18 13:46:57 +020061 const struct ipv6hdr *hdr;
Steffen Klassertdd767852011-10-11 01:44:30 +000062 struct sock *sk = skb->sk;
63
Hannes Frederic Sowa5d0ff542013-08-18 13:46:57 +020064 hdr = skb->encapsulation ? inner_ipv6_hdr(skb) : ipv6_hdr(skb);
Steffen Klassertdd767852011-10-11 01:44:30 +000065 fl6.fl6_dport = inet_sk(sk)->inet_dport;
Hannes Frederic Sowa5d0ff542013-08-18 13:46:57 +020066 fl6.daddr = hdr->daddr;
Steffen Klassertdd767852011-10-11 01:44:30 +000067
68 ipv6_local_error(sk, EMSGSIZE, &fl6, mtu);
69}
70
Linus Torvalds1da177e2005-04-16 15:20:36 -070071static int xfrm6_tunnel_check_size(struct sk_buff *skb)
72{
73 int mtu, ret = 0;
Eric Dumazetadf30902009-06-02 05:19:30 +000074 struct dst_entry *dst = skb_dst(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -070075
Steffen Klassertd77e38e2017-04-14 10:06:10 +020076 if (skb->ignore_df)
77 goto out;
78
Linus Torvalds1da177e2005-04-16 15:20:36 -070079 mtu = dst_mtu(dst);
80 if (mtu < IPV6_MIN_MTU)
81 mtu = IPV6_MIN_MTU;
82
Steffen Klassertd77e38e2017-04-14 10:06:10 +020083 if ((!skb_is_gso(skb) && skb->len > mtu) ||
84 (skb_is_gso(skb) &&
Daniel Axtens80f59742018-03-01 17:13:39 +110085 !skb_gso_validate_network_len(skb, ip6_skb_dst_mtu(skb)))) {
Herbert Xu180e4252005-05-23 13:11:07 -070086 skb->dev = dst->dev;
Steffen Klassertca064bd2015-10-19 10:30:05 +020087 skb->protocol = htons(ETH_P_IPV6);
Steffen Klassertdd767852011-10-11 01:44:30 +000088
89 if (xfrm6_local_dontfrag(skb))
90 xfrm6_local_rxpmtu(skb, mtu);
91 else if (skb->sk)
Hannes Frederic Sowa628e3412013-08-14 13:05:23 +020092 xfrm_local_error(skb, mtu);
Steffen Klassertdd767852011-10-11 01:44:30 +000093 else
94 icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
Linus Torvalds1da177e2005-04-16 15:20:36 -070095 ret = -EMSGSIZE;
96 }
Steffen Klassertd77e38e2017-04-14 10:06:10 +020097out:
Linus Torvalds1da177e2005-04-16 15:20:36 -070098 return ret;
99}
100
Herbert Xu36cf9ac2007-11-13 21:40:52 -0800101int xfrm6_extract_output(struct xfrm_state *x, struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700102{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700103 int err;
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900104
Herbert Xu36cf9ac2007-11-13 21:40:52 -0800105 err = xfrm6_tunnel_check_size(skb);
106 if (err)
107 return err;
108
Herbert Xu60d5fcf2007-11-19 18:47:58 -0800109 XFRM_MODE_SKB_CB(skb)->protocol = ipv6_hdr(skb)->nexthdr;
110
Herbert Xu36cf9ac2007-11-13 21:40:52 -0800111 return xfrm6_extract_header(skb);
112}
113
114int xfrm6_prepare_output(struct xfrm_state *x, struct sk_buff *skb)
115{
116 int err;
117
Kazunori MIYAZAWAdf9dcb42008-03-24 14:51:51 -0700118 err = xfrm_inner_extract_output(x, skb);
Herbert Xu36cf9ac2007-11-13 21:40:52 -0800119 if (err)
120 return err;
121
WANG Cong60ff7462014-05-04 16:39:18 -0700122 skb->ignore_df = 1;
Steffen Klassert044a8322015-01-12 13:38:49 +0100123 skb->protocol = htons(ETH_P_IPV6);
Herbert Xu36cf9ac2007-11-13 21:40:52 -0800124
125 return x->outer_mode->output2(x, skb);
126}
127EXPORT_SYMBOL(xfrm6_prepare_output);
128
David Miller7026b1d2015-04-05 22:19:04 -0400129int xfrm6_output_finish(struct sock *sk, struct sk_buff *skb)
Herbert Xu09b8f7a2006-06-22 03:08:03 -0700130{
Steffen Klassert55967322014-04-07 08:08:52 +0200131 memset(IP6CB(skb), 0, sizeof(*IP6CB(skb)));
Steffen Klassert55967322014-04-07 08:08:52 +0200132
Herbert Xu862b82c2007-11-13 21:43:11 -0800133#ifdef CONFIG_NETFILTER
134 IP6CB(skb)->flags |= IP6SKB_XFRM_TRANSFORMED;
135#endif
Herbert Xu09b8f7a2006-06-22 03:08:03 -0700136
David Miller7026b1d2015-04-05 22:19:04 -0400137 return xfrm_output(sk, skb);
Herbert Xu09b8f7a2006-06-22 03:08:03 -0700138}
139
Eric W. Biederman7d8c6e32015-06-12 22:12:04 -0500140static int __xfrm6_output_finish(struct net *net, struct sock *sk, struct sk_buff *skb)
141{
142 struct xfrm_state *x = skb_dst(skb)->xfrm;
Eric W. Biedermanb1842ff2015-10-01 11:41:42 -0500143
Eric W. Biederman7d8c6e32015-06-12 22:12:04 -0500144 return x->outer_mode->afinfo->output_finish(sk, skb);
145}
146
Eric W. Biederman0c4b51f2015-09-15 20:04:18 -0500147static int __xfrm6_output(struct net *net, struct sock *sk, struct sk_buff *skb)
David Stevensad0081e2010-12-17 11:42:42 +0000148{
149 struct dst_entry *dst = skb_dst(skb);
150 struct xfrm_state *x = dst->xfrm;
Hannes Frederic Sowa5a25cf12013-08-26 12:31:19 +0200151 int mtu;
Herbert Xu93efac32015-09-04 13:21:06 +0800152 bool toobig;
Hannes Frederic Sowa0ea9d5e2013-08-13 04:35:58 +0200153
Steffen Klassert55967322014-04-07 08:08:52 +0200154#ifdef CONFIG_NETFILTER
155 if (!x) {
156 IP6CB(skb)->flags |= IP6SKB_REROUTED;
Eric W. Biederman13206b62015-10-07 16:48:35 -0500157 return dst_output(net, sk, skb);
Steffen Klassert55967322014-04-07 08:08:52 +0200158 }
159#endif
160
Herbert Xu93efac32015-09-04 13:21:06 +0800161 if (x->props.mode != XFRM_MODE_TUNNEL)
162 goto skip_frag;
163
Hannes Frederic Sowa5a25cf12013-08-26 12:31:19 +0200164 if (skb->protocol == htons(ETH_P_IPV6))
165 mtu = ip6_skb_dst_mtu(skb);
166 else
167 mtu = dst_mtu(skb_dst(skb));
Steffen Klassertdd767852011-10-11 01:44:30 +0000168
Herbert Xu93efac32015-09-04 13:21:06 +0800169 toobig = skb->len > mtu && !skb_is_gso(skb);
170
171 if (toobig && xfrm6_local_dontfrag(skb)) {
Steffen Klassertdd767852011-10-11 01:44:30 +0000172 xfrm6_local_rxpmtu(skb, mtu);
Thadeu Lima de Souza Cascardo215ab0f2018-08-31 08:38:49 -0300173 kfree_skb(skb);
Steffen Klassertdd767852011-10-11 01:44:30 +0000174 return -EMSGSIZE;
Herbert Xu93efac32015-09-04 13:21:06 +0800175 } else if (!skb->ignore_df && toobig && skb->sk) {
Hannes Frederic Sowa628e3412013-08-14 13:05:23 +0200176 xfrm_local_error(skb, mtu);
Thadeu Lima de Souza Cascardo215ab0f2018-08-31 08:38:49 -0300177 kfree_skb(skb);
Steffen Klassertdd767852011-10-11 01:44:30 +0000178 return -EMSGSIZE;
179 }
David Stevensad0081e2010-12-17 11:42:42 +0000180
Herbert Xu93efac32015-09-04 13:21:06 +0800181 if (toobig || dst_allfrag(skb_dst(skb)))
Eric W. Biederman7d8c6e32015-06-12 22:12:04 -0500182 return ip6_fragment(net, sk, skb,
183 __xfrm6_output_finish);
Herbert Xu93efac32015-09-04 13:21:06 +0800184
185skip_frag:
David Miller7026b1d2015-04-05 22:19:04 -0400186 return x->outer_mode->afinfo->output_finish(sk, skb);
David Stevensad0081e2010-12-17 11:42:42 +0000187}
188
Eric W. Biedermanede20592015-10-07 16:48:47 -0500189int xfrm6_output(struct net *net, struct sock *sk, struct sk_buff *skb)
Patrick McHardy16a66772006-01-06 23:01:48 -0800190{
Eric W. Biederman29a26a52015-09-15 20:04:16 -0500191 return NF_HOOK_COND(NFPROTO_IPV6, NF_INET_POST_ROUTING,
192 net, sk, skb, NULL, skb_dst(skb)->dev,
193 __xfrm6_output,
Steffen Klassert55967322014-04-07 08:08:52 +0200194 !(IP6CB(skb)->flags & IP6SKB_REROUTED));
Patrick McHardy16a66772006-01-06 23:01:48 -0800195}