[IPSEC]: Separate inner/outer mode processing on input
With inter-family transforms the inner mode differs from the outer mode. Attempting to handle both sides from the same function means that it needs to handle both IPv4 and IPv6 which creates duplication and confusion. This patch separates the two parts on the input path so that each function deals with one family only. In particular, the functions xfrm4_extract_inut/xfrm6_extract_inut moves the pertinent fields from the IPv4/IPv6 IP headers into a neutral format stored in skb->cb. This is then used by the inner mode input functions to modify the inner IP header. In this way the input function no longer has to know about the outer address family. Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> Signed-off-by: David S. Miller <davem@davemloft.net>
这个提交包含在:
@@ -19,6 +19,20 @@
|
||||
#include <net/ipv6.h>
|
||||
#include <net/xfrm.h>
|
||||
|
||||
static void xfrm6_beet_make_header(struct sk_buff *skb)
|
||||
{
|
||||
struct ipv6hdr *iph = ipv6_hdr(skb);
|
||||
|
||||
iph->version = 6;
|
||||
|
||||
memcpy(iph->flow_lbl, XFRM_MODE_SKB_CB(skb)->flow_lbl,
|
||||
sizeof(iph->flow_lbl));
|
||||
iph->nexthdr = XFRM_MODE_SKB_CB(skb)->protocol;
|
||||
|
||||
ipv6_change_dsfield(iph, 0, XFRM_MODE_SKB_CB(skb)->tos);
|
||||
iph->hop_limit = XFRM_MODE_SKB_CB(skb)->ttl;
|
||||
}
|
||||
|
||||
/* Add encapsulation header.
|
||||
*
|
||||
* The top IP header will be constructed per draft-nikander-esp-beet-mode-06.txt.
|
||||
@@ -31,16 +45,11 @@ static int xfrm6_beet_output(struct xfrm_state *x, struct sk_buff *skb)
|
||||
skb->mac_header = skb->network_header +
|
||||
offsetof(struct ipv6hdr, nexthdr);
|
||||
skb->transport_header = skb->network_header + sizeof(*top_iph);
|
||||
|
||||
xfrm6_beet_make_header(skb);
|
||||
|
||||
top_iph = ipv6_hdr(skb);
|
||||
|
||||
top_iph->version = 6;
|
||||
|
||||
memcpy(top_iph->flow_lbl, XFRM_MODE_SKB_CB(skb)->flow_lbl,
|
||||
sizeof(top_iph->flow_lbl));
|
||||
top_iph->nexthdr = XFRM_MODE_SKB_CB(skb)->protocol;
|
||||
|
||||
ipv6_change_dsfield(top_iph, 0, XFRM_MODE_SKB_CB(skb)->tos);
|
||||
top_iph->hop_limit = XFRM_MODE_SKB_CB(skb)->ttl;
|
||||
ipv6_addr_copy(&top_iph->saddr, (struct in6_addr *)&x->props.saddr);
|
||||
ipv6_addr_copy(&top_iph->daddr, (struct in6_addr *)&x->id.daddr);
|
||||
return 0;
|
||||
@@ -51,19 +60,21 @@ static int xfrm6_beet_input(struct xfrm_state *x, struct sk_buff *skb)
|
||||
struct ipv6hdr *ip6h;
|
||||
const unsigned char *old_mac;
|
||||
int size = sizeof(struct ipv6hdr);
|
||||
int err = -EINVAL;
|
||||
int err;
|
||||
|
||||
if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
|
||||
err = skb_cow_head(skb, size + skb->mac_len);
|
||||
if (err)
|
||||
goto out;
|
||||
|
||||
skb_push(skb, size);
|
||||
memmove(skb->data, skb_network_header(skb), size);
|
||||
__skb_push(skb, size);
|
||||
skb_reset_network_header(skb);
|
||||
|
||||
old_mac = skb_mac_header(skb);
|
||||
skb_set_mac_header(skb, -skb->mac_len);
|
||||
memmove(skb_mac_header(skb), old_mac, skb->mac_len);
|
||||
|
||||
xfrm6_beet_make_header(skb);
|
||||
|
||||
ip6h = ipv6_hdr(skb);
|
||||
ip6h->payload_len = htons(skb->len - size);
|
||||
ipv6_addr_copy(&ip6h->daddr, (struct in6_addr *) &x->sel.daddr.a6);
|
||||
@@ -74,7 +85,8 @@ out:
|
||||
}
|
||||
|
||||
static struct xfrm_mode xfrm6_beet_mode = {
|
||||
.input = xfrm6_beet_input,
|
||||
.input2 = xfrm6_beet_input,
|
||||
.input = xfrm_prepare_input,
|
||||
.output2 = xfrm6_beet_output,
|
||||
.output = xfrm6_prepare_output,
|
||||
.owner = THIS_MODULE,
|
||||
|
在新工单中引用
屏蔽一个用户