aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorHerbert Xu <herbert@gondor.apana.org.au>2007-10-08 20:25:53 -0400
committerDavid S. Miller <davem@sunset.davemloft.net>2007-10-10 19:54:54 -0400
commit436a0a402203d5a47d2edf7e4dde6c08a7257983 (patch)
treeb47e73326a2ff7dbf8ac3fbcb6c4acea5c06619d
parent83815dea47cf3e98ccbb6aecda08cba1ba91208f (diff)
[IPSEC]: Move output replay code into xfrm_output
The replay counter is one of only two remaining things in the output code that requires a lock on the xfrm state (the other being the crypto). This patch moves it into the generic xfrm_output so we can remove the lock from the transforms themselves. Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> Signed-off-by: David S. Miller <davem@davemloft.net>
-rw-r--r--include/net/xfrm.h20
-rw-r--r--net/ipv4/ah4.c4
-rw-r--r--net/ipv4/esp4.c4
-rw-r--r--net/ipv6/ah6.c4
-rw-r--r--net/ipv6/esp6.c4
-rw-r--r--net/xfrm/xfrm_output.c5
6 files changed, 32 insertions, 9 deletions
diff --git a/include/net/xfrm.h b/include/net/xfrm.h
index bb9193434eb3..a267725f9753 100644
--- a/include/net/xfrm.h
+++ b/include/net/xfrm.h
@@ -2,7 +2,6 @@
2#define _NET_XFRM_H 2#define _NET_XFRM_H
3 3
4#include <linux/compiler.h> 4#include <linux/compiler.h>
5#include <linux/in.h>
6#include <linux/xfrm.h> 5#include <linux/xfrm.h>
7#include <linux/spinlock.h> 6#include <linux/spinlock.h>
8#include <linux/list.h> 7#include <linux/list.h>
@@ -16,6 +15,7 @@
16 15
17#include <net/sock.h> 16#include <net/sock.h>
18#include <net/dst.h> 17#include <net/dst.h>
18#include <net/ip.h>
19#include <net/route.h> 19#include <net/route.h>
20#include <net/ipv6.h> 20#include <net/ipv6.h>
21#include <net/ip6_fib.h> 21#include <net/ip6_fib.h>
@@ -279,6 +279,7 @@ struct xfrm_type
279 __u8 proto; 279 __u8 proto;
280 __u8 flags; 280 __u8 flags;
281#define XFRM_TYPE_NON_FRAGMENT 1 281#define XFRM_TYPE_NON_FRAGMENT 1
282#define XFRM_TYPE_REPLAY_PROT 2
282 283
283 int (*init_state)(struct xfrm_state *x); 284 int (*init_state)(struct xfrm_state *x);
284 void (*destructor)(struct xfrm_state *); 285 void (*destructor)(struct xfrm_state *);
@@ -419,6 +420,23 @@ extern int xfrm_unregister_km(struct xfrm_mgr *km);
419 420
420extern unsigned int xfrm_policy_count[XFRM_POLICY_MAX*2]; 421extern unsigned int xfrm_policy_count[XFRM_POLICY_MAX*2];
421 422
423/*
424 * This structure is used for the duration where packets are being
425 * transformed by IPsec. As soon as the packet leaves IPsec the
426 * area beyond the generic IP part may be overwritten.
427 */
428struct xfrm_skb_cb {
429 union {
430 struct inet_skb_parm h4;
431 struct inet6_skb_parm h6;
432 } header;
433
434 /* Sequence number for replay protection. */
435 u64 seq;
436};
437
438#define XFRM_SKB_CB(__skb) ((struct xfrm_skb_cb *)&((__skb)->cb[0]))
439
422/* Audit Information */ 440/* Audit Information */
423struct xfrm_audit 441struct xfrm_audit
424{ 442{
diff --git a/net/ipv4/ah4.c b/net/ipv4/ah4.c
index dc1d8e871b24..58af298e1941 100644
--- a/net/ipv4/ah4.c
+++ b/net/ipv4/ah4.c
@@ -96,8 +96,7 @@ static int ah_output(struct xfrm_state *x, struct sk_buff *skb)
96 96
97 ah->reserved = 0; 97 ah->reserved = 0;
98 ah->spi = x->id.spi; 98 ah->spi = x->id.spi;
99 ah->seq_no = htonl(++x->replay.oseq); 99 ah->seq_no = htonl(XFRM_SKB_CB(skb)->seq);
100 xfrm_aevent_doreplay(x);
101 err = ah_mac_digest(ahp, skb, ah->auth_data); 100 err = ah_mac_digest(ahp, skb, ah->auth_data);
102 if (err) 101 if (err)
103 goto error; 102 goto error;
@@ -297,6 +296,7 @@ static struct xfrm_type ah_type =
297 .description = "AH4", 296 .description = "AH4",
298 .owner = THIS_MODULE, 297 .owner = THIS_MODULE,
299 .proto = IPPROTO_AH, 298 .proto = IPPROTO_AH,
299 .flags = XFRM_TYPE_REPLAY_PROT,
300 .init_state = ah_init_state, 300 .init_state = ah_init_state,
301 .destructor = ah_destroy, 301 .destructor = ah_destroy,
302 .input = ah_input, 302 .input = ah_input,
diff --git a/net/ipv4/esp4.c b/net/ipv4/esp4.c
index d233e2e62500..0f62af9a7f15 100644
--- a/net/ipv4/esp4.c
+++ b/net/ipv4/esp4.c
@@ -95,8 +95,7 @@ static int esp_output(struct xfrm_state *x, struct sk_buff *skb)
95 top_iph->protocol = IPPROTO_ESP; 95 top_iph->protocol = IPPROTO_ESP;
96 96
97 esph->spi = x->id.spi; 97 esph->spi = x->id.spi;
98 esph->seq_no = htonl(++x->replay.oseq); 98 esph->seq_no = htonl(XFRM_SKB_CB(skb)->seq);
99 xfrm_aevent_doreplay(x);
100 99
101 if (esp->conf.ivlen) { 100 if (esp->conf.ivlen) {
102 if (unlikely(!esp->conf.ivinitted)) { 101 if (unlikely(!esp->conf.ivinitted)) {
@@ -437,6 +436,7 @@ static struct xfrm_type esp_type =
437 .description = "ESP4", 436 .description = "ESP4",
438 .owner = THIS_MODULE, 437 .owner = THIS_MODULE,
439 .proto = IPPROTO_ESP, 438 .proto = IPPROTO_ESP,
439 .flags = XFRM_TYPE_REPLAY_PROT,
440 .init_state = esp_init_state, 440 .init_state = esp_init_state,
441 .destructor = esp_destroy, 441 .destructor = esp_destroy,
442 .get_mtu = esp4_get_mtu, 442 .get_mtu = esp4_get_mtu,
diff --git a/net/ipv6/ah6.c b/net/ipv6/ah6.c
index 69a2030407b8..ae68a900f605 100644
--- a/net/ipv6/ah6.c
+++ b/net/ipv6/ah6.c
@@ -283,8 +283,7 @@ static int ah6_output(struct xfrm_state *x, struct sk_buff *skb)
283 283
284 ah->reserved = 0; 284 ah->reserved = 0;
285 ah->spi = x->id.spi; 285 ah->spi = x->id.spi;
286 ah->seq_no = htonl(++x->replay.oseq); 286 ah->seq_no = htonl(XFRM_SKB_CB(skb)->seq);
287 xfrm_aevent_doreplay(x);
288 err = ah_mac_digest(ahp, skb, ah->auth_data); 287 err = ah_mac_digest(ahp, skb, ah->auth_data);
289 if (err) 288 if (err)
290 goto error_free_iph; 289 goto error_free_iph;
@@ -506,6 +505,7 @@ static struct xfrm_type ah6_type =
506 .description = "AH6", 505 .description = "AH6",
507 .owner = THIS_MODULE, 506 .owner = THIS_MODULE,
508 .proto = IPPROTO_AH, 507 .proto = IPPROTO_AH,
508 .flags = XFRM_TYPE_REPLAY_PROT,
509 .init_state = ah6_init_state, 509 .init_state = ah6_init_state,
510 .destructor = ah6_destroy, 510 .destructor = ah6_destroy,
511 .input = ah6_input, 511 .input = ah6_input,
diff --git a/net/ipv6/esp6.c b/net/ipv6/esp6.c
index 77281068d0f9..0c5fb81451b7 100644
--- a/net/ipv6/esp6.c
+++ b/net/ipv6/esp6.c
@@ -95,8 +95,7 @@ static int esp6_output(struct xfrm_state *x, struct sk_buff *skb)
95 *skb_network_header(skb) = IPPROTO_ESP; 95 *skb_network_header(skb) = IPPROTO_ESP;
96 96
97 esph->spi = x->id.spi; 97 esph->spi = x->id.spi;
98 esph->seq_no = htonl(++x->replay.oseq); 98 esph->seq_no = htonl(XFRM_SKB_CB(skb)->seq);
99 xfrm_aevent_doreplay(x);
100 99
101 if (esp->conf.ivlen) { 100 if (esp->conf.ivlen) {
102 if (unlikely(!esp->conf.ivinitted)) { 101 if (unlikely(!esp->conf.ivinitted)) {
@@ -373,6 +372,7 @@ static struct xfrm_type esp6_type =
373 .description = "ESP6", 372 .description = "ESP6",
374 .owner = THIS_MODULE, 373 .owner = THIS_MODULE,
375 .proto = IPPROTO_ESP, 374 .proto = IPPROTO_ESP,
375 .flags = XFRM_TYPE_REPLAY_PROT,
376 .init_state = esp6_init_state, 376 .init_state = esp6_init_state,
377 .destructor = esp6_destroy, 377 .destructor = esp6_destroy,
378 .get_mtu = esp6_get_mtu, 378 .get_mtu = esp6_get_mtu,
diff --git a/net/xfrm/xfrm_output.c b/net/xfrm/xfrm_output.c
index 5b1c978a323c..20e789d8c63e 100644
--- a/net/xfrm/xfrm_output.c
+++ b/net/xfrm/xfrm_output.c
@@ -58,6 +58,11 @@ int xfrm_output(struct sk_buff *skb)
58 if (err) 58 if (err)
59 goto error; 59 goto error;
60 60
61 if (x->type->flags & XFRM_TYPE_REPLAY_PROT) {
62 XFRM_SKB_CB(skb)->seq = ++x->replay.oseq;
63 xfrm_aevent_doreplay(x);
64 }
65
61 err = x->mode->output(x, skb); 66 err = x->mode->output(x, skb);
62 if (err) 67 if (err)
63 goto error; 68 goto error;