]>
Commit | Line | Data |
---|---|---|
b59f45d0 HX |
1 | /* |
2 | * xfrm4_mode_tunnel.c - Tunnel mode encapsulation for IPv4. | |
3 | * | |
4 | * Copyright (c) 2004-2006 Herbert Xu <[email protected]> | |
5 | */ | |
6 | ||
5a0e3ad6 | 7 | #include <linux/gfp.h> |
b59f45d0 HX |
8 | #include <linux/init.h> |
9 | #include <linux/kernel.h> | |
10 | #include <linux/module.h> | |
11 | #include <linux/skbuff.h> | |
12 | #include <linux/stringify.h> | |
13 | #include <net/dst.h> | |
14 | #include <net/inet_ecn.h> | |
15 | #include <net/ip.h> | |
16 | #include <net/xfrm.h> | |
17 | ||
18 | static inline void ipip_ecn_decapsulate(struct sk_buff *skb) | |
19 | { | |
b0061ce4 | 20 | struct iphdr *inner_iph = ipip_hdr(skb); |
b59f45d0 | 21 | |
227620e2 | 22 | if (INET_ECN_is_ce(XFRM_MODE_SKB_CB(skb)->tos)) |
b59f45d0 HX |
23 | IP_ECN_set_ce(inner_iph); |
24 | } | |
25 | ||
26 | /* Add encapsulation header. | |
27 | * | |
ceb1eec8 | 28 | * The top IP header will be constructed per RFC 2401. |
b59f45d0 | 29 | */ |
195ad6a3 | 30 | static int xfrm4_mode_tunnel_output(struct xfrm_state *x, struct sk_buff *skb) |
b59f45d0 | 31 | { |
adf30907 | 32 | struct dst_entry *dst = skb_dst(skb); |
36cf9acf | 33 | struct iphdr *top_iph; |
b59f45d0 HX |
34 | int flags; |
35 | ||
f1bd7d65 IT |
36 | skb_set_inner_network_header(skb, skb_network_offset(skb)); |
37 | skb_set_inner_transport_header(skb, skb_transport_offset(skb)); | |
38 | ||
7b277b1a | 39 | skb_set_network_header(skb, -x->props.header_len); |
37fedd3a HX |
40 | skb->mac_header = skb->network_header + |
41 | offsetof(struct iphdr, protocol); | |
36cf9acf | 42 | skb->transport_header = skb->network_header + sizeof(*top_iph); |
eddc9ec5 | 43 | top_iph = ip_hdr(skb); |
b59f45d0 HX |
44 | |
45 | top_iph->ihl = 5; | |
46 | top_iph->version = 4; | |
47 | ||
adf30907 | 48 | top_iph->protocol = xfrm_af2proto(skb_dst(skb)->ops->family); |
c82f963e | 49 | |
a947b0a9 ND |
50 | /* DS disclosing depends on XFRM_SA_XFLAG_DONT_ENCAP_DSCP */ |
51 | if (x->props.extra_flags & XFRM_SA_XFLAG_DONT_ENCAP_DSCP) | |
52 | top_iph->tos = 0; | |
53 | else | |
54 | top_iph->tos = XFRM_MODE_SKB_CB(skb)->tos; | |
55 | top_iph->tos = INET_ECN_encapsulate(top_iph->tos, | |
36cf9acf | 56 | XFRM_MODE_SKB_CB(skb)->tos); |
b59f45d0 | 57 | |
36cf9acf | 58 | flags = x->props.flags; |
b59f45d0 HX |
59 | if (flags & XFRM_STATE_NOECN) |
60 | IP_ECN_clear(top_iph); | |
61 | ||
36cf9acf | 62 | top_iph->frag_off = (flags & XFRM_STATE_NOPMTUDISC) ? |
fe833fca | 63 | 0 : (XFRM_MODE_SKB_CB(skb)->frag_off & htons(IP_DF)); |
b59f45d0 | 64 | |
323e126f | 65 | top_iph->ttl = ip4_dst_hoplimit(dst->child); |
b59f45d0 HX |
66 | |
67 | top_iph->saddr = x->props.saddr.a4; | |
68 | top_iph->daddr = x->id.daddr.a4; | |
b6a7719a | 69 | ip_select_ident(dev_net(dst->dev), skb, NULL); |
b59f45d0 | 70 | |
b59f45d0 HX |
71 | return 0; |
72 | } | |
73 | ||
195ad6a3 | 74 | static int xfrm4_mode_tunnel_input(struct xfrm_state *x, struct sk_buff *skb) |
b59f45d0 | 75 | { |
b59f45d0 HX |
76 | int err = -EINVAL; |
77 | ||
227620e2 HX |
78 | if (XFRM_MODE_SKB_CB(skb)->protocol != IPPROTO_IPIP) |
79 | goto out; | |
c82f963e | 80 | |
b59f45d0 HX |
81 | if (!pskb_may_pull(skb, sizeof(struct iphdr))) |
82 | goto out; | |
83 | ||
9aac22de | 84 | err = skb_unclone(skb, GFP_ATOMIC); |
85 | if (err) | |
b59f45d0 HX |
86 | goto out; |
87 | ||
227620e2 HX |
88 | if (x->props.flags & XFRM_STATE_DECAP_DSCP) |
89 | ipv4_copy_dscp(XFRM_MODE_SKB_CB(skb)->tos, ipip_hdr(skb)); | |
90 | if (!(x->props.flags & XFRM_STATE_NOECN)) | |
91 | ipip_ecn_decapsulate(skb); | |
92 | ||
c1d2bbe1 | 93 | skb_reset_network_header(skb); |
03606895 ED |
94 | skb_mac_header_rebuild(skb); |
95 | ||
b59f45d0 HX |
96 | err = 0; |
97 | ||
98 | out: | |
99 | return err; | |
100 | } | |
101 | ||
c35fe410 SK |
102 | static struct sk_buff *xfrm4_mode_tunnel_gso_segment(struct xfrm_state *x, |
103 | struct sk_buff *skb, | |
104 | netdev_features_t features) | |
105 | { | |
106 | __skb_push(skb, skb->mac_len); | |
107 | return skb_mac_gso_segment(skb, features); | |
108 | ||
109 | } | |
110 | ||
111 | static void xfrm4_mode_tunnel_xmit(struct xfrm_state *x, struct sk_buff *skb) | |
112 | { | |
113 | struct xfrm_offload *xo = xfrm_offload(skb); | |
114 | ||
115 | if (xo->flags & XFRM_GSO_SEGMENT) { | |
116 | skb->network_header = skb->network_header - x->props.header_len; | |
117 | skb->transport_header = skb->network_header + | |
118 | sizeof(struct iphdr); | |
119 | } | |
120 | ||
121 | skb_reset_mac_len(skb); | |
122 | pskb_pull(skb, skb->mac_len + x->props.header_len); | |
123 | } | |
124 | ||
b59f45d0 | 125 | static struct xfrm_mode xfrm4_tunnel_mode = { |
195ad6a3 | 126 | .input2 = xfrm4_mode_tunnel_input, |
227620e2 | 127 | .input = xfrm_prepare_input, |
195ad6a3 | 128 | .output2 = xfrm4_mode_tunnel_output, |
36cf9acf | 129 | .output = xfrm4_prepare_output, |
c35fe410 SK |
130 | .gso_segment = xfrm4_mode_tunnel_gso_segment, |
131 | .xmit = xfrm4_mode_tunnel_xmit, | |
b59f45d0 HX |
132 | .owner = THIS_MODULE, |
133 | .encap = XFRM_MODE_TUNNEL, | |
1bfcb10f | 134 | .flags = XFRM_MODE_FLAG_TUNNEL, |
b59f45d0 HX |
135 | }; |
136 | ||
195ad6a3 | 137 | static int __init xfrm4_mode_tunnel_init(void) |
b59f45d0 HX |
138 | { |
139 | return xfrm_register_mode(&xfrm4_tunnel_mode, AF_INET); | |
140 | } | |
141 | ||
195ad6a3 | 142 | static void __exit xfrm4_mode_tunnel_exit(void) |
b59f45d0 HX |
143 | { |
144 | int err; | |
145 | ||
146 | err = xfrm_unregister_mode(&xfrm4_tunnel_mode, AF_INET); | |
147 | BUG_ON(err); | |
148 | } | |
149 | ||
195ad6a3 HX |
150 | module_init(xfrm4_mode_tunnel_init); |
151 | module_exit(xfrm4_mode_tunnel_exit); | |
b59f45d0 HX |
152 | MODULE_LICENSE("GPL"); |
153 | MODULE_ALIAS_XFRM_MODE(AF_INET, XFRM_MODE_TUNNEL); |