Skip to content

Commit

Permalink
[IPSEC]: Handle GSO packets
Browse files Browse the repository at this point in the history
This patch segments GSO packets received by the IPsec stack.  This can
happen when a NIC driver injects GSO packets into the stack which are
then forwarded to another host.

The primary application of this is going to be Xen where its backend
driver may inject GSO packets into dom0.

Of course this also can be used by other virtualisation schemes such as
VMWare or UML since the tap device could be modified to inject GSO packets
received through splice.

Signed-off-by: Herbert Xu <[email protected]>
Signed-off-by: David S. Miller <[email protected]>
  • Loading branch information
herbertx authored and David S. Miller committed Jun 23, 2006
1 parent 37c3185 commit 09b8f7a
Show file tree
Hide file tree
Showing 2 changed files with 83 additions and 10 deletions.
54 changes: 46 additions & 8 deletions net/ipv4/xfrm4_output.c
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,8 @@
*/

#include <linux/compiler.h>
#include <linux/if_ether.h>
#include <linux/kernel.h>
#include <linux/skbuff.h>
#include <linux/spinlock.h>
#include <linux/netfilter_ipv4.h>
Expand Down Expand Up @@ -97,16 +99,10 @@ static int xfrm4_output_one(struct sk_buff *skb)
goto out_exit;
}

static int xfrm4_output_finish(struct sk_buff *skb)
static int xfrm4_output_finish2(struct sk_buff *skb)
{
int err;

#ifdef CONFIG_NETFILTER
if (!skb->dst->xfrm) {
IPCB(skb)->flags |= IPSKB_REROUTED;
return dst_output(skb);
}
#endif
while (likely((err = xfrm4_output_one(skb)) == 0)) {
nf_reset(skb);

Expand All @@ -119,14 +115,56 @@ static int xfrm4_output_finish(struct sk_buff *skb)
return dst_output(skb);

err = nf_hook(PF_INET, NF_IP_POST_ROUTING, &skb, NULL,
skb->dst->dev, xfrm4_output_finish);
skb->dst->dev, xfrm4_output_finish2);
if (unlikely(err != 1))
break;
}

return err;
}

static int xfrm4_output_finish(struct sk_buff *skb)
{
struct sk_buff *segs;

#ifdef CONFIG_NETFILTER
if (!skb->dst->xfrm) {
IPCB(skb)->flags |= IPSKB_REROUTED;
return dst_output(skb);
}
#endif

if (!skb_shinfo(skb)->gso_size)
return xfrm4_output_finish2(skb);

skb->protocol = htons(ETH_P_IP);
segs = skb_gso_segment(skb, 0);
kfree_skb(skb);
if (unlikely(IS_ERR(segs)))
return PTR_ERR(segs);

do {
struct sk_buff *nskb = segs->next;
int err;

segs->next = NULL;
err = xfrm4_output_finish2(segs);

if (unlikely(err)) {
while ((segs = nskb)) {
nskb = segs->next;
segs->next = NULL;
kfree_skb(segs);
}
return err;
}

segs = nskb;
} while (segs);

return 0;
}

int xfrm4_output(struct sk_buff *skb)
{
return NF_HOOK_COND(PF_INET, NF_IP_POST_ROUTING, skb, NULL, skb->dst->dev,
Expand Down
39 changes: 37 additions & 2 deletions net/ipv6/xfrm6_output.c
Original file line number Diff line number Diff line change
Expand Up @@ -94,7 +94,7 @@ static int xfrm6_output_one(struct sk_buff *skb)
goto out_exit;
}

static int xfrm6_output_finish(struct sk_buff *skb)
static int xfrm6_output_finish2(struct sk_buff *skb)
{
int err;

Expand All @@ -110,14 +110,49 @@ static int xfrm6_output_finish(struct sk_buff *skb)
return dst_output(skb);

err = nf_hook(PF_INET6, NF_IP6_POST_ROUTING, &skb, NULL,
skb->dst->dev, xfrm6_output_finish);
skb->dst->dev, xfrm6_output_finish2);
if (unlikely(err != 1))
break;
}

return err;
}

static int xfrm6_output_finish(struct sk_buff *skb)
{
struct sk_buff *segs;

if (!skb_shinfo(skb)->gso_size)
return xfrm6_output_finish2(skb);

skb->protocol = htons(ETH_P_IP);
segs = skb_gso_segment(skb, 0);
kfree_skb(skb);
if (unlikely(IS_ERR(segs)))
return PTR_ERR(segs);

do {
struct sk_buff *nskb = segs->next;
int err;

segs->next = NULL;
err = xfrm6_output_finish2(segs);

if (unlikely(err)) {
while ((segs = nskb)) {
nskb = segs->next;
segs->next = NULL;
kfree_skb(segs);
}
return err;
}

segs = nskb;
} while (segs);

return 0;
}

int xfrm6_output(struct sk_buff *skb)
{
return NF_HOOK(PF_INET6, NF_IP6_POST_ROUTING, skb, NULL, skb->dst->dev,
Expand Down

0 comments on commit 09b8f7a

Please sign in to comment.