]> git.ipfire.org Git - people/ms/linux.git/blame - net/ipv4/xfrm4_output.c
IB/srp: Fix possible send queue overflow
[people/ms/linux.git] / net / ipv4 / xfrm4_output.c
CommitLineData
1da177e4
LT
1/*
2 * xfrm4_output.c - Common IPsec encapsulation code for IPv4.
3 * Copyright (c) 2004 Herbert Xu <herbert@gondor.apana.org.au>
e905a9ed 4 *
1da177e4
LT
5 * This program is free software; you can redistribute it and/or
6 * modify it under the terms of the GNU General Public License
7 * as published by the Free Software Foundation; either version
8 * 2 of the License, or (at your option) any later version.
9 */
10
09b8f7a9
HX
11#include <linux/if_ether.h>
12#include <linux/kernel.h>
36cf9acf 13#include <linux/module.h>
1da177e4 14#include <linux/skbuff.h>
16a6677f 15#include <linux/netfilter_ipv4.h>
36cf9acf 16#include <net/dst.h>
1da177e4
LT
17#include <net/ip.h>
18#include <net/xfrm.h>
19#include <net/icmp.h>
20
1da177e4
LT
21static int xfrm4_tunnel_check_size(struct sk_buff *skb)
22{
23 int mtu, ret = 0;
1da177e4
LT
24
25 if (IPCB(skb)->flags & IPSKB_XFRM_TUNNEL_SIZE)
26 goto out;
27
60ff7467 28 if (!(ip_hdr(skb)->frag_off & htons(IP_DF)) || skb->ignore_df)
1da177e4
LT
29 goto out;
30
5a25cf1e 31 mtu = dst_mtu(skb_dst(skb));
1da177e4 32 if (skb->len > mtu) {
ca064bd8
SK
33 skb->protocol = htons(ETH_P_IP);
34
b00897b8 35 if (skb->sk)
628e341f 36 xfrm_local_error(skb, mtu);
b00897b8
SK
37 else
38 icmp_send(skb, ICMP_DEST_UNREACH,
39 ICMP_FRAG_NEEDED, htonl(mtu));
1da177e4
LT
40 ret = -EMSGSIZE;
41 }
42out:
43 return ret;
44}
45
36cf9acf
HX
46int xfrm4_extract_output(struct xfrm_state *x, struct sk_buff *skb)
47{
48 int err;
49
50 err = xfrm4_tunnel_check_size(skb);
51 if (err)
52 return err;
53
60d5fcfb
HX
54 XFRM_MODE_SKB_CB(skb)->protocol = ip_hdr(skb)->protocol;
55
36cf9acf
HX
56 return xfrm4_extract_header(skb);
57}
58
59int xfrm4_prepare_output(struct xfrm_state *x, struct sk_buff *skb)
60{
61 int err;
62
df9dcb45 63 err = xfrm_inner_extract_output(x, skb);
36cf9acf
HX
64 if (err)
65 return err;
66
5596732f 67 IPCB(skb)->flags |= IPSKB_XFRM_TUNNEL_SIZE;
044a832a 68 skb->protocol = htons(ETH_P_IP);
36cf9acf
HX
69
70 return x->outer_mode->output2(x, skb);
71}
72EXPORT_SYMBOL(xfrm4_prepare_output);
73
7026b1dd 74int xfrm4_output_finish(struct sock *sk, struct sk_buff *skb)
09b8f7a9 75{
5596732f 76 memset(IPCB(skb), 0, sizeof(*IPCB(skb)));
5596732f
SK
77
78#ifdef CONFIG_NETFILTER
79 IPCB(skb)->flags |= IPSKB_XFRM_TRANSFORMED;
80#endif
81
7026b1dd 82 return xfrm_output(sk, skb);
5596732f
SK
83}
84
0c4b51f0 85static int __xfrm4_output(struct net *net, struct sock *sk, struct sk_buff *skb)
5596732f
SK
86{
87 struct xfrm_state *x = skb_dst(skb)->xfrm;
88
09b8f7a9 89#ifdef CONFIG_NETFILTER
5596732f 90 if (!x) {
09b8f7a9 91 IPCB(skb)->flags |= IPSKB_REROUTED;
13206b6b 92 return dst_output(net, sk, skb);
09b8f7a9 93 }
862b82c6 94#endif
09b8f7a9 95
7026b1dd 96 return x->outer_mode->afinfo->output_finish(sk, skb);
09b8f7a9
HX
97}
98
ede2059d 99int xfrm4_output(struct net *net, struct sock *sk, struct sk_buff *skb)
16a6677f 100{
29a26a56
EB
101 return NF_HOOK_COND(NFPROTO_IPV4, NF_INET_POST_ROUTING,
102 net, sk, skb, NULL, skb_dst(skb)->dev,
103 __xfrm4_output,
48d5cad8 104 !(IPCB(skb)->flags & IPSKB_REROUTED));
16a6677f 105}
628e341f
HFS
106
107void xfrm4_local_error(struct sk_buff *skb, u32 mtu)
108{
109 struct iphdr *hdr;
110
111 hdr = skb->encapsulation ? inner_ip_hdr(skb) : ip_hdr(skb);
112 ip_local_error(skb->sk, EMSGSIZE, hdr->daddr,
113 inet_sk(skb->sk)->inet_dport, mtu);
114}