Author: kp
Date: Tue Apr  7 20:29:03 2015
New Revision: 281234
URL: https://svnweb.freebsd.org/changeset/base/281234

Log:
  Evaluate packet size after the firewall had its chance
  
  Defer the packet size check until after the firewall has had a look at it. 
This
  means that the firewall now has the opportunity to (re-)fragment an oversized
  packet.
  
  Differential Revision:        https://reviews.freebsd.org/D1815
  Reviewed by:  ae
  Approved by:  gnn (mentor)

Modified:
  head/sys/netinet6/ip6_forward.c

Modified: head/sys/netinet6/ip6_forward.c
==============================================================================
--- head/sys/netinet6/ip6_forward.c     Tue Apr  7 20:21:23 2015        
(r281233)
+++ head/sys/netinet6/ip6_forward.c     Tue Apr  7 20:29:03 2015        
(r281234)
@@ -413,39 +413,6 @@ again2:
                goto bad;
        }
 
-       if (m->m_pkthdr.len > IN6_LINKMTU(rt->rt_ifp)) {
-               in6_ifstat_inc(rt->rt_ifp, ifs6_in_toobig);
-               if (mcopy) {
-                       u_long mtu;
-#ifdef IPSEC
-                       size_t ipsechdrsiz;
-#endif /* IPSEC */
-
-                       mtu = IN6_LINKMTU(rt->rt_ifp);
-#ifdef IPSEC
-                       /*
-                        * When we do IPsec tunnel ingress, we need to play
-                        * with the link value (decrement IPsec header size
-                        * from mtu value).  The code is much simpler than v4
-                        * case, as we have the outgoing interface for
-                        * encapsulated packet as "rt->rt_ifp".
-                        */
-                       ipsechdrsiz = ipsec_hdrsiz(mcopy, IPSEC_DIR_OUTBOUND,
-                           NULL);
-                       if (ipsechdrsiz < mtu)
-                               mtu -= ipsechdrsiz;
-                       /*
-                        * if mtu becomes less than minimum MTU,
-                        * tell minimum MTU (and I'll need to fragment it).
-                        */
-                       if (mtu < IPV6_MMTU)
-                               mtu = IPV6_MMTU;
-#endif /* IPSEC */
-                       icmp6_error(mcopy, ICMP6_PACKET_TOO_BIG, 0, mtu);
-               }
-               goto bad;
-       }
-
        if (rt->rt_flags & RTF_GATEWAY)
                dst = (struct sockaddr_in6 *)rt->rt_gateway;
 
@@ -571,6 +538,40 @@ again2:
        }
 
 pass:
+       /* See if the size was changed by the packet filter. */
+       if (m->m_pkthdr.len > IN6_LINKMTU(rt->rt_ifp)) {
+               in6_ifstat_inc(rt->rt_ifp, ifs6_in_toobig);
+               if (mcopy) {
+                       u_long mtu;
+#ifdef IPSEC
+                       size_t ipsechdrsiz;
+#endif /* IPSEC */
+
+                       mtu = IN6_LINKMTU(rt->rt_ifp);
+#ifdef IPSEC
+                       /*
+                        * When we do IPsec tunnel ingress, we need to play
+                        * with the link value (decrement IPsec header size
+                        * from mtu value).  The code is much simpler than v4
+                        * case, as we have the outgoing interface for
+                        * encapsulated packet as "rt->rt_ifp".
+                        */
+                       ipsechdrsiz = ipsec_hdrsiz(mcopy, IPSEC_DIR_OUTBOUND,
+                           NULL);
+                       if (ipsechdrsiz < mtu)
+                               mtu -= ipsechdrsiz;
+                       /*
+                        * if mtu becomes less than minimum MTU,
+                        * tell minimum MTU (and I'll need to fragment it).
+                        */
+                       if (mtu < IPV6_MMTU)
+                               mtu = IPV6_MMTU;
+#endif /* IPSEC */
+                       icmp6_error(mcopy, ICMP6_PACKET_TOO_BIG, 0, mtu);
+               }
+               goto bad;
+       }
+
        error = nd6_output(rt->rt_ifp, origifp, m, dst, rt);
        if (error) {
                in6_ifstat_inc(rt->rt_ifp, ifs6_out_discard);
_______________________________________________
svn-src-all@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/svn-src-all
To unsubscribe, send any mail to "svn-src-all-unsubscr...@freebsd.org"

Reply via email to