blob: a6f13fab963f7070bfc935a534a72d2c326c1c94 [file] [log] [blame]
b.liue9582032025-04-17 19:18:16 +08001// SPDX-License-Identifier: GPL-2.0-or-later
2/*
3 * xfrm6_output.c - Common IPsec encapsulation code for IPv6.
4 * Copyright (C) 2002 USAGI/WIDE Project
5 * Copyright (c) 2004 Herbert Xu <herbert@gondor.apana.org.au>
6 */
7
8#include <linux/if_ether.h>
9#include <linux/kernel.h>
10#include <linux/module.h>
11#include <linux/skbuff.h>
12#include <linux/icmpv6.h>
13#include <linux/netfilter_ipv6.h>
14#include <net/dst.h>
15#include <net/ipv6.h>
16#include <net/ip6_route.h>
17#include <net/xfrm.h>
18
19int xfrm6_find_1stfragopt(struct xfrm_state *x, struct sk_buff *skb,
20 u8 **prevhdr)
21{
22 return ip6_find_1stfragopt(skb, prevhdr);
23}
24EXPORT_SYMBOL(xfrm6_find_1stfragopt);
25
26static int xfrm6_local_dontfrag(struct sk_buff *skb)
27{
28 int proto;
29 struct sock *sk = skb->sk;
30
31 if (sk) {
32 if (sk->sk_family != AF_INET6)
33 return 0;
34
35 proto = sk->sk_protocol;
36 if (proto == IPPROTO_UDP || proto == IPPROTO_RAW)
37 return inet6_sk(sk)->dontfrag;
38 }
39
40 return 0;
41}
42
43static void xfrm6_local_rxpmtu(struct sk_buff *skb, u32 mtu)
44{
45 struct flowi6 fl6;
46 struct sock *sk = skb->sk;
47
48 fl6.flowi6_oif = sk->sk_bound_dev_if;
49 fl6.daddr = ipv6_hdr(skb)->daddr;
50
51 ipv6_local_rxpmtu(sk, &fl6, mtu);
52}
53
54void xfrm6_local_error(struct sk_buff *skb, u32 mtu)
55{
56 struct flowi6 fl6;
57 const struct ipv6hdr *hdr;
58 struct sock *sk = skb->sk;
59
60 hdr = skb->encapsulation ? inner_ipv6_hdr(skb) : ipv6_hdr(skb);
61 fl6.fl6_dport = inet_sk(sk)->inet_dport;
62 fl6.daddr = hdr->daddr;
63
64 ipv6_local_error(sk, EMSGSIZE, &fl6, mtu);
65}
66
67static int xfrm6_tunnel_check_size(struct sk_buff *skb)
68{
69 int mtu, ret = 0;
70 struct dst_entry *dst = skb_dst(skb);
71
72 if (skb->ignore_df)
73 goto out;
74
75 mtu = dst_mtu(dst);
76 if (mtu < IPV6_MIN_MTU)
77 mtu = IPV6_MIN_MTU;
78
79 if ((!skb_is_gso(skb) && skb->len > mtu) ||
80 (skb_is_gso(skb) &&
81 !skb_gso_validate_network_len(skb, ip6_skb_dst_mtu(skb)))) {
82 skb->dev = dst->dev;
83 skb->protocol = htons(ETH_P_IPV6);
84
85 if (xfrm6_local_dontfrag(skb))
86 xfrm6_local_rxpmtu(skb, mtu);
87 else if (skb->sk)
88 xfrm_local_error(skb, mtu);
89 else
90 icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
91 ret = -EMSGSIZE;
92 }
93out:
94 return ret;
95}
96
97int xfrm6_extract_output(struct xfrm_state *x, struct sk_buff *skb)
98{
99 int err;
100
101 err = xfrm6_tunnel_check_size(skb);
102 if (err)
103 return err;
104
105 XFRM_MODE_SKB_CB(skb)->protocol = ipv6_hdr(skb)->nexthdr;
106
107 return xfrm6_extract_header(skb);
108}
109
110int xfrm6_output_finish(struct sock *sk, struct sk_buff *skb)
111{
112 memset(IP6CB(skb), 0, sizeof(*IP6CB(skb)));
113
114 IP6CB(skb)->flags |= IP6SKB_XFRM_TRANSFORMED;
115
116 return xfrm_output(sk, skb);
117}
118
119static int __xfrm6_output_state_finish(struct xfrm_state *x, struct sock *sk,
120 struct sk_buff *skb)
121{
122 const struct xfrm_state_afinfo *afinfo;
123 int ret = -EAFNOSUPPORT;
124
125 rcu_read_lock();
126 afinfo = xfrm_state_afinfo_get_rcu(x->outer_mode.family);
127 if (likely(afinfo))
128 ret = afinfo->output_finish(sk, skb);
129 else
130 kfree_skb(skb);
131 rcu_read_unlock();
132
133 return ret;
134}
135
136static int __xfrm6_output_finish(struct net *net, struct sock *sk, struct sk_buff *skb)
137{
138 struct xfrm_state *x = skb_dst(skb)->xfrm;
139
140 return __xfrm6_output_state_finish(x, sk, skb);
141}
142
143static int xfrm6_noneed_fragment(struct sk_buff *skb)
144{
145 struct frag_hdr *fh;
146 u8 prevhdr = ipv6_hdr(skb)->nexthdr;
147
148 if (prevhdr != NEXTHDR_FRAGMENT)
149 return 0;
150 fh = (struct frag_hdr *)(skb->data + sizeof(struct ipv6hdr));
151 if (fh->nexthdr == NEXTHDR_ESP || fh->nexthdr == NEXTHDR_AUTH)
152 return 1;
153 return 0;
154}
155
156static int __xfrm6_output(struct net *net, struct sock *sk, struct sk_buff *skb)
157{
158 struct dst_entry *dst = skb_dst(skb);
159 struct xfrm_state *x = dst->xfrm;
160 unsigned int mtu;
161 bool toobig;
162
163#ifdef CONFIG_NETFILTER
164 if (!x) {
165 IP6CB(skb)->flags |= IP6SKB_REROUTED;
166 return dst_output(net, sk, skb);
167 }
168#endif
169
170 if (x->props.mode != XFRM_MODE_TUNNEL)
171 goto skip_frag;
172
173 if (skb->protocol == htons(ETH_P_IPV6))
174 mtu = ip6_skb_dst_mtu(skb);
175 else
176 mtu = dst_mtu(skb_dst(skb));
177
178 toobig = skb->len > mtu && !skb_is_gso(skb);
179
180 if (toobig && xfrm6_local_dontfrag(skb)) {
181 xfrm6_local_rxpmtu(skb, mtu);
182 kfree_skb(skb);
183 return -EMSGSIZE;
184 } else if (toobig && xfrm6_noneed_fragment(skb)) {
185 skb->ignore_df = 1;
186 goto skip_frag;
187 } else if (!skb->ignore_df && toobig && skb->sk) {
188 xfrm_local_error(skb, mtu);
189 kfree_skb(skb);
190 return -EMSGSIZE;
191 }
192
193 if (toobig || dst_allfrag(skb_dst(skb)))
194 return ip6_fragment(net, sk, skb,
195 __xfrm6_output_finish);
196
197skip_frag:
198 return __xfrm6_output_state_finish(x, sk, skb);
199}
200
201int xfrm6_output(struct net *net, struct sock *sk, struct sk_buff *skb)
202{
203 return NF_HOOK_COND(NFPROTO_IPV6, NF_INET_POST_ROUTING,
204 net, sk, skb, NULL, skb_dst(skb)->dev,
205 __xfrm6_output,
206 !(IP6CB(skb)->flags & IP6SKB_REROUTED));
207}