Blame view

kernel/linux-imx6_3.14.28/net/ipv4/xfrm4_output.c 2.42 KB
6b13f685e   김민수   BSP 최초 추가
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
  /*
   * xfrm4_output.c - Common IPsec encapsulation code for IPv4.
   * Copyright (c) 2004 Herbert Xu <herbert@gondor.apana.org.au>
   *
   * This program is free software; you can redistribute it and/or
   * modify it under the terms of the GNU General Public License
   * as published by the Free Software Foundation; either version
   * 2 of the License, or (at your option) any later version.
   */
  
  #include <linux/if_ether.h>
  #include <linux/kernel.h>
  #include <linux/module.h>
  #include <linux/skbuff.h>
  #include <linux/netfilter_ipv4.h>
  #include <net/dst.h>
  #include <net/ip.h>
  #include <net/xfrm.h>
  #include <net/icmp.h>
  
  static int xfrm4_tunnel_check_size(struct sk_buff *skb)
  {
  	int mtu, ret = 0;
  
  	if (IPCB(skb)->flags & IPSKB_XFRM_TUNNEL_SIZE)
  		goto out;
  
  	if (!(ip_hdr(skb)->frag_off & htons(IP_DF)) || skb->local_df)
  		goto out;
  
  	mtu = dst_mtu(skb_dst(skb));
  	if (skb->len > mtu) {
  		if (skb->sk)
  			xfrm_local_error(skb, mtu);
  		else
  			icmp_send(skb, ICMP_DEST_UNREACH,
  				  ICMP_FRAG_NEEDED, htonl(mtu));
  		ret = -EMSGSIZE;
  	}
  out:
  	return ret;
  }
  
  int xfrm4_extract_output(struct xfrm_state *x, struct sk_buff *skb)
  {
  	int err;
  
  	err = xfrm4_tunnel_check_size(skb);
  	if (err)
  		return err;
  
  	XFRM_MODE_SKB_CB(skb)->protocol = ip_hdr(skb)->protocol;
  
  	return xfrm4_extract_header(skb);
  }
  
  int xfrm4_prepare_output(struct xfrm_state *x, struct sk_buff *skb)
  {
  	int err;
  
  	err = xfrm_inner_extract_output(x, skb);
  	if (err)
  		return err;
  
  	memset(IPCB(skb), 0, sizeof(*IPCB(skb)));
  	IPCB(skb)->flags |= IPSKB_XFRM_TUNNEL_SIZE | IPSKB_XFRM_TRANSFORMED;
  
  	skb->protocol = htons(ETH_P_IP);
  
  	return x->outer_mode->output2(x, skb);
  }
  EXPORT_SYMBOL(xfrm4_prepare_output);
  
  int xfrm4_output_finish(struct sk_buff *skb)
  {
  #ifdef CONFIG_NETFILTER
  	if (!skb_dst(skb)->xfrm) {
  		IPCB(skb)->flags |= IPSKB_REROUTED;
  		return dst_output(skb);
  	}
  
  	IPCB(skb)->flags |= IPSKB_XFRM_TRANSFORMED;
  #endif
  
  	skb->protocol = htons(ETH_P_IP);
  	return xfrm_output(skb);
  }
  
  int xfrm4_output(struct sk_buff *skb)
  {
  	struct dst_entry *dst = skb_dst(skb);
  	struct xfrm_state *x = dst->xfrm;
  
  	return NF_HOOK_COND(NFPROTO_IPV4, NF_INET_POST_ROUTING, skb,
  			    NULL, dst->dev,
  			    x->outer_mode->afinfo->output_finish,
  			    !(IPCB(skb)->flags & IPSKB_REROUTED));
  }
  
  void xfrm4_local_error(struct sk_buff *skb, u32 mtu)
  {
  	struct iphdr *hdr;
  
  	hdr = skb->encapsulation ? inner_ip_hdr(skb) : ip_hdr(skb);
  	ip_local_error(skb->sk, EMSGSIZE, hdr->daddr,
  		       inet_sk(skb->sk)->inet_dport, mtu);
  }