diff options
-rw-r--r-- | include/net/xfrm.h | 27 | ||||
-rw-r--r-- | net/ipv4/xfrm4_input.c | 7 | ||||
-rw-r--r-- | net/ipv4/xfrm4_mode_beet.c | 67 | ||||
-rw-r--r-- | net/ipv4/xfrm4_mode_tunnel.c | 44 | ||||
-rw-r--r-- | net/ipv4/xfrm4_state.c | 2 | ||||
-rw-r--r-- | net/ipv6/xfrm6_input.c | 7 | ||||
-rw-r--r-- | net/ipv6/xfrm6_mode_beet.c | 36 | ||||
-rw-r--r-- | net/ipv6/xfrm6_mode_tunnel.c | 31 | ||||
-rw-r--r-- | net/ipv6/xfrm6_output.c | 1 | ||||
-rw-r--r-- | net/ipv6/xfrm6_state.c | 5 | ||||
-rw-r--r-- | net/xfrm/xfrm_input.c | 13 |
11 files changed, 141 insertions, 99 deletions
diff --git a/include/net/xfrm.h b/include/net/xfrm.h index 138c1868be1d..a9dbe091ae58 100644 --- a/include/net/xfrm.h +++ b/include/net/xfrm.h | |||
@@ -258,6 +258,7 @@ extern int __xfrm_state_delete(struct xfrm_state *x); | |||
258 | struct xfrm_state_afinfo { | 258 | struct xfrm_state_afinfo { |
259 | unsigned int family; | 259 | unsigned int family; |
260 | unsigned int proto; | 260 | unsigned int proto; |
261 | unsigned int eth_proto; | ||
261 | struct module *owner; | 262 | struct module *owner; |
262 | struct xfrm_type *type_map[IPPROTO_MAX]; | 263 | struct xfrm_type *type_map[IPPROTO_MAX]; |
263 | struct xfrm_mode *mode_map[XFRM_MODE_MAX]; | 264 | struct xfrm_mode *mode_map[XFRM_MODE_MAX]; |
@@ -268,6 +269,8 @@ struct xfrm_state_afinfo { | |||
268 | int (*tmpl_sort)(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, int n); | 269 | int (*tmpl_sort)(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, int n); |
269 | int (*state_sort)(struct xfrm_state **dst, struct xfrm_state **src, int n); | 270 | int (*state_sort)(struct xfrm_state **dst, struct xfrm_state **src, int n); |
270 | int (*output)(struct sk_buff *skb); | 271 | int (*output)(struct sk_buff *skb); |
272 | int (*extract_input)(struct xfrm_state *x, | ||
273 | struct sk_buff *skb); | ||
271 | int (*extract_output)(struct xfrm_state *x, | 274 | int (*extract_output)(struct xfrm_state *x, |
272 | struct sk_buff *skb); | 275 | struct sk_buff *skb); |
273 | }; | 276 | }; |
@@ -302,6 +305,27 @@ extern int xfrm_register_type(struct xfrm_type *type, unsigned short family); | |||
302 | extern int xfrm_unregister_type(struct xfrm_type *type, unsigned short family); | 305 | extern int xfrm_unregister_type(struct xfrm_type *type, unsigned short family); |
303 | 306 | ||
304 | struct xfrm_mode { | 307 | struct xfrm_mode { |
308 | /* | ||
309 | * Remove encapsulation header. | ||
310 | * | ||
311 | * The IP header will be moved over the top of the encapsulation | ||
312 | * header. | ||
313 | * | ||
314 | * On entry, the transport header shall point to where the IP header | ||
315 | * should be and the network header shall be set to where the IP | ||
316 | * header currently is. skb->data shall point to the start of the | ||
317 | * payload. | ||
318 | */ | ||
319 | int (*input2)(struct xfrm_state *x, struct sk_buff *skb); | ||
320 | |||
321 | /* | ||
322 | * This is the actual input entry point. | ||
323 | * | ||
324 | * For transport mode and equivalent this would be identical to | ||
325 | * input2 (which does not need to be set). While tunnel mode | ||
326 | * and equivalent would set this to the tunnel encapsulation function | ||
327 | * xfrm4_prepare_input that would in turn call input2. | ||
328 | */ | ||
305 | int (*input)(struct xfrm_state *x, struct sk_buff *skb); | 329 | int (*input)(struct xfrm_state *x, struct sk_buff *skb); |
306 | 330 | ||
307 | /* | 331 | /* |
@@ -1093,8 +1117,10 @@ extern void xfrm_replay_advance(struct xfrm_state *x, __be32 seq); | |||
1093 | extern void xfrm_replay_notify(struct xfrm_state *x, int event); | 1117 | extern void xfrm_replay_notify(struct xfrm_state *x, int event); |
1094 | extern int xfrm_state_mtu(struct xfrm_state *x, int mtu); | 1118 | extern int xfrm_state_mtu(struct xfrm_state *x, int mtu); |
1095 | extern int xfrm_init_state(struct xfrm_state *x); | 1119 | extern int xfrm_init_state(struct xfrm_state *x); |
1120 | extern int xfrm_prepare_input(struct xfrm_state *x, struct sk_buff *skb); | ||
1096 | extern int xfrm_output(struct sk_buff *skb); | 1121 | extern int xfrm_output(struct sk_buff *skb); |
1097 | extern int xfrm4_extract_header(struct sk_buff *skb); | 1122 | extern int xfrm4_extract_header(struct sk_buff *skb); |
1123 | extern int xfrm4_extract_input(struct xfrm_state *x, struct sk_buff *skb); | ||
1098 | extern int xfrm4_rcv_encap(struct sk_buff *skb, int nexthdr, __be32 spi, | 1124 | extern int xfrm4_rcv_encap(struct sk_buff *skb, int nexthdr, __be32 spi, |
1099 | int encap_type); | 1125 | int encap_type); |
1100 | extern int xfrm4_rcv(struct sk_buff *skb); | 1126 | extern int xfrm4_rcv(struct sk_buff *skb); |
@@ -1110,6 +1136,7 @@ extern int xfrm4_output(struct sk_buff *skb); | |||
1110 | extern int xfrm4_tunnel_register(struct xfrm_tunnel *handler, unsigned short family); | 1136 | extern int xfrm4_tunnel_register(struct xfrm_tunnel *handler, unsigned short family); |
1111 | extern int xfrm4_tunnel_deregister(struct xfrm_tunnel *handler, unsigned short family); | 1137 | extern int xfrm4_tunnel_deregister(struct xfrm_tunnel *handler, unsigned short family); |
1112 | extern int xfrm6_extract_header(struct sk_buff *skb); | 1138 | extern int xfrm6_extract_header(struct sk_buff *skb); |
1139 | extern int xfrm6_extract_input(struct xfrm_state *x, struct sk_buff *skb); | ||
1113 | extern int xfrm6_rcv_spi(struct sk_buff *skb, int nexthdr, __be32 spi); | 1140 | extern int xfrm6_rcv_spi(struct sk_buff *skb, int nexthdr, __be32 spi); |
1114 | extern int xfrm6_rcv(struct sk_buff *skb); | 1141 | extern int xfrm6_rcv(struct sk_buff *skb); |
1115 | extern int xfrm6_input_addr(struct sk_buff *skb, xfrm_address_t *daddr, | 1142 | extern int xfrm6_input_addr(struct sk_buff *skb, xfrm_address_t *daddr, |
diff --git a/net/ipv4/xfrm4_input.c b/net/ipv4/xfrm4_input.c index 5e95c8a07efb..c0323d05ab69 100644 --- a/net/ipv4/xfrm4_input.c +++ b/net/ipv4/xfrm4_input.c | |||
@@ -16,6 +16,11 @@ | |||
16 | #include <net/ip.h> | 16 | #include <net/ip.h> |
17 | #include <net/xfrm.h> | 17 | #include <net/xfrm.h> |
18 | 18 | ||
19 | int xfrm4_extract_input(struct xfrm_state *x, struct sk_buff *skb) | ||
20 | { | ||
21 | return xfrm4_extract_header(skb); | ||
22 | } | ||
23 | |||
19 | #ifdef CONFIG_NETFILTER | 24 | #ifdef CONFIG_NETFILTER |
20 | static inline int xfrm4_rcv_encap_finish(struct sk_buff *skb) | 25 | static inline int xfrm4_rcv_encap_finish(struct sk_buff *skb) |
21 | { | 26 | { |
@@ -91,7 +96,7 @@ int xfrm4_rcv_encap(struct sk_buff *skb, int nexthdr, __be32 spi, | |||
91 | 96 | ||
92 | xfrm_vec[xfrm_nr++] = x; | 97 | xfrm_vec[xfrm_nr++] = x; |
93 | 98 | ||
94 | if (x->outer_mode->input(x, skb)) | 99 | if (x->inner_mode->input(x, skb)) |
95 | goto drop; | 100 | goto drop; |
96 | 101 | ||
97 | if (x->outer_mode->flags & XFRM_MODE_FLAG_TUNNEL) { | 102 | if (x->outer_mode->flags & XFRM_MODE_FLAG_TUNNEL) { |
diff --git a/net/ipv4/xfrm4_mode_beet.c b/net/ipv4/xfrm4_mode_beet.c index 94842adce144..e093a7b59e18 100644 --- a/net/ipv4/xfrm4_mode_beet.c +++ b/net/ipv4/xfrm4_mode_beet.c | |||
@@ -17,6 +17,21 @@ | |||
17 | #include <net/ip.h> | 17 | #include <net/ip.h> |
18 | #include <net/xfrm.h> | 18 | #include <net/xfrm.h> |
19 | 19 | ||
20 | static void xfrm4_beet_make_header(struct sk_buff *skb) | ||
21 | { | ||
22 | struct iphdr *iph = ip_hdr(skb); | ||
23 | |||
24 | iph->ihl = 5; | ||
25 | iph->version = 4; | ||
26 | |||
27 | iph->protocol = XFRM_MODE_SKB_CB(skb)->protocol; | ||
28 | iph->tos = XFRM_MODE_SKB_CB(skb)->tos; | ||
29 | |||
30 | iph->id = XFRM_MODE_SKB_CB(skb)->id; | ||
31 | iph->frag_off = XFRM_MODE_SKB_CB(skb)->frag_off; | ||
32 | iph->ttl = XFRM_MODE_SKB_CB(skb)->ttl; | ||
33 | } | ||
34 | |||
20 | /* Add encapsulation header. | 35 | /* Add encapsulation header. |
21 | * | 36 | * |
22 | * The top IP header will be constructed per draft-nikander-esp-beet-mode-06.txt. | 37 | * The top IP header will be constructed per draft-nikander-esp-beet-mode-06.txt. |
@@ -40,20 +55,12 @@ static int xfrm4_beet_output(struct xfrm_state *x, struct sk_buff *skb) | |||
40 | offsetof(struct iphdr, protocol); | 55 | offsetof(struct iphdr, protocol); |
41 | skb->transport_header = skb->network_header + sizeof(*iph); | 56 | skb->transport_header = skb->network_header + sizeof(*iph); |
42 | 57 | ||
58 | xfrm4_beet_make_header(skb); | ||
59 | |||
43 | ph = (struct ip_beet_phdr *)__skb_pull(skb, sizeof(*iph) - hdrlen); | 60 | ph = (struct ip_beet_phdr *)__skb_pull(skb, sizeof(*iph) - hdrlen); |
44 | 61 | ||
45 | top_iph = ip_hdr(skb); | 62 | top_iph = ip_hdr(skb); |
46 | 63 | ||
47 | top_iph->ihl = 5; | ||
48 | top_iph->version = 4; | ||
49 | |||
50 | top_iph->protocol = XFRM_MODE_SKB_CB(skb)->protocol; | ||
51 | top_iph->tos = XFRM_MODE_SKB_CB(skb)->tos; | ||
52 | |||
53 | top_iph->id = XFRM_MODE_SKB_CB(skb)->id; | ||
54 | top_iph->frag_off = XFRM_MODE_SKB_CB(skb)->frag_off; | ||
55 | top_iph->ttl = XFRM_MODE_SKB_CB(skb)->ttl; | ||
56 | |||
57 | if (unlikely(optlen)) { | 64 | if (unlikely(optlen)) { |
58 | BUG_ON(optlen < 0); | 65 | BUG_ON(optlen < 0); |
59 | 66 | ||
@@ -75,43 +82,46 @@ static int xfrm4_beet_output(struct xfrm_state *x, struct sk_buff *skb) | |||
75 | 82 | ||
76 | static int xfrm4_beet_input(struct xfrm_state *x, struct sk_buff *skb) | 83 | static int xfrm4_beet_input(struct xfrm_state *x, struct sk_buff *skb) |
77 | { | 84 | { |
78 | struct iphdr *iph = ip_hdr(skb); | 85 | struct iphdr *iph; |
79 | int phlen = 0; | ||
80 | int optlen = 0; | 86 | int optlen = 0; |
81 | u8 ph_nexthdr = 0; | ||
82 | int err = -EINVAL; | 87 | int err = -EINVAL; |
83 | 88 | ||
84 | if (unlikely(iph->protocol == IPPROTO_BEETPH)) { | 89 | if (unlikely(XFRM_MODE_SKB_CB(skb)->protocol == IPPROTO_BEETPH)) { |
85 | struct ip_beet_phdr *ph; | 90 | struct ip_beet_phdr *ph; |
91 | int phlen; | ||
86 | 92 | ||
87 | if (!pskb_may_pull(skb, sizeof(*ph))) | 93 | if (!pskb_may_pull(skb, sizeof(*ph))) |
88 | goto out; | 94 | goto out; |
89 | ph = (struct ip_beet_phdr *)(ipip_hdr(skb) + 1); | 95 | |
96 | ph = (struct ip_beet_phdr *)skb->data; | ||
90 | 97 | ||
91 | phlen = sizeof(*ph) + ph->padlen; | 98 | phlen = sizeof(*ph) + ph->padlen; |
92 | optlen = ph->hdrlen * 8 + (IPV4_BEET_PHMAXLEN - phlen); | 99 | optlen = ph->hdrlen * 8 + (IPV4_BEET_PHMAXLEN - phlen); |
93 | if (optlen < 0 || optlen & 3 || optlen > 250) | 100 | if (optlen < 0 || optlen & 3 || optlen > 250) |
94 | goto out; | 101 | goto out; |
95 | 102 | ||
96 | if (!pskb_may_pull(skb, phlen + optlen)) | 103 | XFRM_MODE_SKB_CB(skb)->protocol = ph->nexthdr; |
97 | goto out; | ||
98 | skb->len -= phlen + optlen; | ||
99 | 104 | ||
100 | ph_nexthdr = ph->nexthdr; | 105 | if (!pskb_may_pull(skb, phlen)); |
106 | goto out; | ||
107 | __skb_pull(skb, phlen); | ||
101 | } | 108 | } |
102 | 109 | ||
103 | skb_set_network_header(skb, phlen - sizeof(*iph)); | 110 | skb_push(skb, sizeof(*iph)); |
104 | memmove(skb_network_header(skb), iph, sizeof(*iph)); | 111 | skb_reset_network_header(skb); |
105 | skb_set_transport_header(skb, phlen + optlen); | 112 | |
106 | skb->data = skb_transport_header(skb); | 113 | memmove(skb->data - skb->mac_len, skb_mac_header(skb), |
114 | skb->mac_len); | ||
115 | skb_set_mac_header(skb, -skb->mac_len); | ||
116 | |||
117 | xfrm4_beet_make_header(skb); | ||
107 | 118 | ||
108 | iph = ip_hdr(skb); | 119 | iph = ip_hdr(skb); |
109 | iph->ihl = (sizeof(*iph) + optlen) / 4; | 120 | |
110 | iph->tot_len = htons(skb->len + iph->ihl * 4); | 121 | iph->ihl += optlen / 4; |
122 | iph->tot_len = htons(skb->len); | ||
111 | iph->daddr = x->sel.daddr.a4; | 123 | iph->daddr = x->sel.daddr.a4; |
112 | iph->saddr = x->sel.saddr.a4; | 124 | iph->saddr = x->sel.saddr.a4; |
113 | if (ph_nexthdr) | ||
114 | iph->protocol = ph_nexthdr; | ||
115 | iph->check = 0; | 125 | iph->check = 0; |
116 | iph->check = ip_fast_csum(skb_network_header(skb), iph->ihl); | 126 | iph->check = ip_fast_csum(skb_network_header(skb), iph->ihl); |
117 | err = 0; | 127 | err = 0; |
@@ -120,7 +130,8 @@ out: | |||
120 | } | 130 | } |
121 | 131 | ||
122 | static struct xfrm_mode xfrm4_beet_mode = { | 132 | static struct xfrm_mode xfrm4_beet_mode = { |
123 | .input = xfrm4_beet_input, | 133 | .input2 = xfrm4_beet_input, |
134 | .input = xfrm_prepare_input, | ||
124 | .output2 = xfrm4_beet_output, | 135 | .output2 = xfrm4_beet_output, |
125 | .output = xfrm4_prepare_output, | 136 | .output = xfrm4_prepare_output, |
126 | .owner = THIS_MODULE, | 137 | .owner = THIS_MODULE, |
diff --git a/net/ipv4/xfrm4_mode_tunnel.c b/net/ipv4/xfrm4_mode_tunnel.c index cc8bbb274e37..aa335dba8ffa 100644 --- a/net/ipv4/xfrm4_mode_tunnel.c +++ b/net/ipv4/xfrm4_mode_tunnel.c | |||
@@ -16,19 +16,12 @@ | |||
16 | 16 | ||
17 | static inline void ipip_ecn_decapsulate(struct sk_buff *skb) | 17 | static inline void ipip_ecn_decapsulate(struct sk_buff *skb) |
18 | { | 18 | { |
19 | struct iphdr *outer_iph = ip_hdr(skb); | ||
20 | struct iphdr *inner_iph = ipip_hdr(skb); | 19 | struct iphdr *inner_iph = ipip_hdr(skb); |
21 | 20 | ||
22 | if (INET_ECN_is_ce(outer_iph->tos)) | 21 | if (INET_ECN_is_ce(XFRM_MODE_SKB_CB(skb)->tos)) |
23 | IP_ECN_set_ce(inner_iph); | 22 | IP_ECN_set_ce(inner_iph); |
24 | } | 23 | } |
25 | 24 | ||
26 | static inline void ipip6_ecn_decapsulate(struct iphdr *iph, struct sk_buff *skb) | ||
27 | { | ||
28 | if (INET_ECN_is_ce(iph->tos)) | ||
29 | IP6_ECN_set_ce(ipv6_hdr(skb)); | ||
30 | } | ||
31 | |||
32 | /* Add encapsulation header. | 25 | /* Add encapsulation header. |
33 | * | 26 | * |
34 | * The top IP header will be constructed per RFC 2401. | 27 | * The top IP header will be constructed per RFC 2401. |
@@ -72,20 +65,11 @@ static int xfrm4_tunnel_output(struct xfrm_state *x, struct sk_buff *skb) | |||
72 | 65 | ||
73 | static int xfrm4_tunnel_input(struct xfrm_state *x, struct sk_buff *skb) | 66 | static int xfrm4_tunnel_input(struct xfrm_state *x, struct sk_buff *skb) |
74 | { | 67 | { |
75 | struct iphdr *iph = ip_hdr(skb); | ||
76 | const unsigned char *old_mac; | 68 | const unsigned char *old_mac; |
77 | int err = -EINVAL; | 69 | int err = -EINVAL; |
78 | 70 | ||
79 | switch (iph->protocol){ | 71 | if (XFRM_MODE_SKB_CB(skb)->protocol != IPPROTO_IPIP) |
80 | case IPPROTO_IPIP: | 72 | goto out; |
81 | break; | ||
82 | #if defined(CONFIG_IPV6) || defined (CONFIG_IPV6_MODULE) | ||
83 | case IPPROTO_IPV6: | ||
84 | break; | ||
85 | #endif | ||
86 | default: | ||
87 | goto out; | ||
88 | } | ||
89 | 73 | ||
90 | if (!pskb_may_pull(skb, sizeof(struct iphdr))) | 74 | if (!pskb_may_pull(skb, sizeof(struct iphdr))) |
91 | goto out; | 75 | goto out; |
@@ -94,20 +78,11 @@ static int xfrm4_tunnel_input(struct xfrm_state *x, struct sk_buff *skb) | |||
94 | (err = pskb_expand_head(skb, 0, 0, GFP_ATOMIC))) | 78 | (err = pskb_expand_head(skb, 0, 0, GFP_ATOMIC))) |
95 | goto out; | 79 | goto out; |
96 | 80 | ||
97 | iph = ip_hdr(skb); | 81 | if (x->props.flags & XFRM_STATE_DECAP_DSCP) |
98 | if (iph->protocol == IPPROTO_IPIP) { | 82 | ipv4_copy_dscp(XFRM_MODE_SKB_CB(skb)->tos, ipip_hdr(skb)); |
99 | if (x->props.flags & XFRM_STATE_DECAP_DSCP) | 83 | if (!(x->props.flags & XFRM_STATE_NOECN)) |
100 | ipv4_copy_dscp(ipv4_get_dsfield(iph), ipip_hdr(skb)); | 84 | ipip_ecn_decapsulate(skb); |
101 | if (!(x->props.flags & XFRM_STATE_NOECN)) | 85 | |
102 | ipip_ecn_decapsulate(skb); | ||
103 | } | ||
104 | #if defined(CONFIG_IPV6) || defined (CONFIG_IPV6_MODULE) | ||
105 | else { | ||
106 | if (!(x->props.flags & XFRM_STATE_NOECN)) | ||
107 | ipip6_ecn_decapsulate(iph, skb); | ||
108 | skb->protocol = htons(ETH_P_IPV6); | ||
109 | } | ||
110 | #endif | ||
111 | old_mac = skb_mac_header(skb); | 86 | old_mac = skb_mac_header(skb); |
112 | skb_set_mac_header(skb, -skb->mac_len); | 87 | skb_set_mac_header(skb, -skb->mac_len); |
113 | memmove(skb_mac_header(skb), old_mac, skb->mac_len); | 88 | memmove(skb_mac_header(skb), old_mac, skb->mac_len); |
@@ -119,7 +94,8 @@ out: | |||
119 | } | 94 | } |
120 | 95 | ||
121 | static struct xfrm_mode xfrm4_tunnel_mode = { | 96 | static struct xfrm_mode xfrm4_tunnel_mode = { |
122 | .input = xfrm4_tunnel_input, | 97 | .input2 = xfrm4_tunnel_input, |
98 | .input = xfrm_prepare_input, | ||
123 | .output2 = xfrm4_tunnel_output, | 99 | .output2 = xfrm4_tunnel_output, |
124 | .output = xfrm4_prepare_output, | 100 | .output = xfrm4_prepare_output, |
125 | .owner = THIS_MODULE, | 101 | .owner = THIS_MODULE, |
diff --git a/net/ipv4/xfrm4_state.c b/net/ipv4/xfrm4_state.c index e6030e74ff65..85f04b7b237f 100644 --- a/net/ipv4/xfrm4_state.c +++ b/net/ipv4/xfrm4_state.c | |||
@@ -65,10 +65,12 @@ int xfrm4_extract_header(struct sk_buff *skb) | |||
65 | static struct xfrm_state_afinfo xfrm4_state_afinfo = { | 65 | static struct xfrm_state_afinfo xfrm4_state_afinfo = { |
66 | .family = AF_INET, | 66 | .family = AF_INET, |
67 | .proto = IPPROTO_IPIP, | 67 | .proto = IPPROTO_IPIP, |
68 | .eth_proto = htons(ETH_P_IP), | ||
68 | .owner = THIS_MODULE, | 69 | .owner = THIS_MODULE, |
69 | .init_flags = xfrm4_init_flags, | 70 | .init_flags = xfrm4_init_flags, |
70 | .init_tempsel = __xfrm4_init_tempsel, | 71 | .init_tempsel = __xfrm4_init_tempsel, |
71 | .output = xfrm4_output, | 72 | .output = xfrm4_output, |
73 | .extract_input = xfrm4_extract_input, | ||
72 | .extract_output = xfrm4_extract_output, | 74 | .extract_output = xfrm4_extract_output, |
73 | }; | 75 | }; |
74 | 76 | ||
diff --git a/net/ipv6/xfrm6_input.c b/net/ipv6/xfrm6_input.c index 515783707e86..c458d0a2e684 100644 --- a/net/ipv6/xfrm6_input.c +++ b/net/ipv6/xfrm6_input.c | |||
@@ -16,6 +16,11 @@ | |||
16 | #include <net/ipv6.h> | 16 | #include <net/ipv6.h> |
17 | #include <net/xfrm.h> | 17 | #include <net/xfrm.h> |
18 | 18 | ||
19 | int xfrm6_extract_input(struct xfrm_state *x, struct sk_buff *skb) | ||
20 | { | ||
21 | return xfrm6_extract_header(skb); | ||
22 | } | ||
23 | |||
19 | int xfrm6_rcv_spi(struct sk_buff *skb, int nexthdr, __be32 spi) | 24 | int xfrm6_rcv_spi(struct sk_buff *skb, int nexthdr, __be32 spi) |
20 | { | 25 | { |
21 | int err; | 26 | int err; |
@@ -68,7 +73,7 @@ int xfrm6_rcv_spi(struct sk_buff *skb, int nexthdr, __be32 spi) | |||
68 | 73 | ||
69 | xfrm_vec[xfrm_nr++] = x; | 74 | xfrm_vec[xfrm_nr++] = x; |
70 | 75 | ||
71 | if (x->outer_mode->input(x, skb)) | 76 | if (x->inner_mode->input(x, skb)) |
72 | goto drop; | 77 | goto drop; |
73 | 78 | ||
74 | if (x->outer_mode->flags & XFRM_MODE_FLAG_TUNNEL) { | 79 | if (x->outer_mode->flags & XFRM_MODE_FLAG_TUNNEL) { |
diff --git a/net/ipv6/xfrm6_mode_beet.c b/net/ipv6/xfrm6_mode_beet.c index 4988ed9c76c6..0527d11c1ae3 100644 --- a/net/ipv6/xfrm6_mode_beet.c +++ b/net/ipv6/xfrm6_mode_beet.c | |||
@@ -19,6 +19,20 @@ | |||
19 | #include <net/ipv6.h> | 19 | #include <net/ipv6.h> |
20 | #include <net/xfrm.h> | 20 | #include <net/xfrm.h> |
21 | 21 | ||
22 | static void xfrm6_beet_make_header(struct sk_buff *skb) | ||
23 | { | ||
24 | struct ipv6hdr *iph = ipv6_hdr(skb); | ||
25 | |||
26 | iph->version = 6; | ||
27 | |||
28 | memcpy(iph->flow_lbl, XFRM_MODE_SKB_CB(skb)->flow_lbl, | ||
29 | sizeof(iph->flow_lbl)); | ||
30 | iph->nexthdr = XFRM_MODE_SKB_CB(skb)->protocol; | ||
31 | |||
32 | ipv6_change_dsfield(iph, 0, XFRM_MODE_SKB_CB(skb)->tos); | ||
33 | iph->hop_limit = XFRM_MODE_SKB_CB(skb)->ttl; | ||
34 | } | ||
35 | |||
22 | /* Add encapsulation header. | 36 | /* Add encapsulation header. |
23 | * | 37 | * |
24 | * The top IP header will be constructed per draft-nikander-esp-beet-mode-06.txt. | 38 | * The top IP header will be constructed per draft-nikander-esp-beet-mode-06.txt. |
@@ -31,16 +45,11 @@ static int xfrm6_beet_output(struct xfrm_state *x, struct sk_buff *skb) | |||
31 | skb->mac_header = skb->network_header + | 45 | skb->mac_header = skb->network_header + |
32 | offsetof(struct ipv6hdr, nexthdr); | 46 | offsetof(struct ipv6hdr, nexthdr); |
33 | skb->transport_header = skb->network_header + sizeof(*top_iph); | 47 | skb->transport_header = skb->network_header + sizeof(*top_iph); |
34 | top_iph = ipv6_hdr(skb); | ||
35 | 48 | ||
36 | top_iph->version = 6; | 49 | xfrm6_beet_make_header(skb); |
37 | 50 | ||
38 | memcpy(top_iph->flow_lbl, XFRM_MODE_SKB_CB(skb)->flow_lbl, | 51 | top_iph = ipv6_hdr(skb); |
39 | sizeof(top_iph->flow_lbl)); | ||
40 | top_iph->nexthdr = XFRM_MODE_SKB_CB(skb)->protocol; | ||
41 | 52 | ||
42 | ipv6_change_dsfield(top_iph, 0, XFRM_MODE_SKB_CB(skb)->tos); | ||
43 | top_iph->hop_limit = XFRM_MODE_SKB_CB(skb)->ttl; | ||
44 | ipv6_addr_copy(&top_iph->saddr, (struct in6_addr *)&x->props.saddr); | 53 | ipv6_addr_copy(&top_iph->saddr, (struct in6_addr *)&x->props.saddr); |
45 | ipv6_addr_copy(&top_iph->daddr, (struct in6_addr *)&x->id.daddr); | 54 | ipv6_addr_copy(&top_iph->daddr, (struct in6_addr *)&x->id.daddr); |
46 | return 0; | 55 | return 0; |
@@ -51,19 +60,21 @@ static int xfrm6_beet_input(struct xfrm_state *x, struct sk_buff *skb) | |||
51 | struct ipv6hdr *ip6h; | 60 | struct ipv6hdr *ip6h; |
52 | const unsigned char *old_mac; | 61 | const unsigned char *old_mac; |
53 | int size = sizeof(struct ipv6hdr); | 62 | int size = sizeof(struct ipv6hdr); |
54 | int err = -EINVAL; | 63 | int err; |
55 | 64 | ||
56 | if (!pskb_may_pull(skb, sizeof(struct ipv6hdr))) | 65 | err = skb_cow_head(skb, size + skb->mac_len); |
66 | if (err) | ||
57 | goto out; | 67 | goto out; |
58 | 68 | ||
59 | skb_push(skb, size); | 69 | __skb_push(skb, size); |
60 | memmove(skb->data, skb_network_header(skb), size); | ||
61 | skb_reset_network_header(skb); | 70 | skb_reset_network_header(skb); |
62 | 71 | ||
63 | old_mac = skb_mac_header(skb); | 72 | old_mac = skb_mac_header(skb); |
64 | skb_set_mac_header(skb, -skb->mac_len); | 73 | skb_set_mac_header(skb, -skb->mac_len); |
65 | memmove(skb_mac_header(skb), old_mac, skb->mac_len); | 74 | memmove(skb_mac_header(skb), old_mac, skb->mac_len); |
66 | 75 | ||
76 | xfrm6_beet_make_header(skb); | ||
77 | |||
67 | ip6h = ipv6_hdr(skb); | 78 | ip6h = ipv6_hdr(skb); |
68 | ip6h->payload_len = htons(skb->len - size); | 79 | ip6h->payload_len = htons(skb->len - size); |
69 | ipv6_addr_copy(&ip6h->daddr, (struct in6_addr *) &x->sel.daddr.a6); | 80 | ipv6_addr_copy(&ip6h->daddr, (struct in6_addr *) &x->sel.daddr.a6); |
@@ -74,7 +85,8 @@ out: | |||
74 | } | 85 | } |
75 | 86 | ||
76 | static struct xfrm_mode xfrm6_beet_mode = { | 87 | static struct xfrm_mode xfrm6_beet_mode = { |
77 | .input = xfrm6_beet_input, | 88 | .input2 = xfrm6_beet_input, |
89 | .input = xfrm_prepare_input, | ||
78 | .output2 = xfrm6_beet_output, | 90 | .output2 = xfrm6_beet_output, |
79 | .output = xfrm6_prepare_output, | 91 | .output = xfrm6_prepare_output, |
80 | .owner = THIS_MODULE, | 92 | .owner = THIS_MODULE, |
diff --git a/net/ipv6/xfrm6_mode_tunnel.c b/net/ipv6/xfrm6_mode_tunnel.c index d45ce5d44197..f7d0d6612650 100644 --- a/net/ipv6/xfrm6_mode_tunnel.c +++ b/net/ipv6/xfrm6_mode_tunnel.c | |||
@@ -25,12 +25,6 @@ static inline void ipip6_ecn_decapsulate(struct sk_buff *skb) | |||
25 | IP6_ECN_set_ce(inner_iph); | 25 | IP6_ECN_set_ce(inner_iph); |
26 | } | 26 | } |
27 | 27 | ||
28 | static inline void ip6ip_ecn_decapsulate(struct sk_buff *skb) | ||
29 | { | ||
30 | if (INET_ECN_is_ce(ipv6_get_dsfield(ipv6_hdr(skb)))) | ||
31 | IP_ECN_set_ce(ipip_hdr(skb)); | ||
32 | } | ||
33 | |||
34 | /* Add encapsulation header. | 28 | /* Add encapsulation header. |
35 | * | 29 | * |
36 | * The top IP header will be constructed per RFC 2401. | 30 | * The top IP header will be constructed per RFC 2401. |
@@ -68,10 +62,8 @@ static int xfrm6_tunnel_input(struct xfrm_state *x, struct sk_buff *skb) | |||
68 | { | 62 | { |
69 | int err = -EINVAL; | 63 | int err = -EINVAL; |
70 | const unsigned char *old_mac; | 64 | const unsigned char *old_mac; |
71 | const unsigned char *nh = skb_network_header(skb); | ||
72 | 65 | ||
73 | if (nh[IP6CB(skb)->nhoff] != IPPROTO_IPV6 && | 66 | if (XFRM_MODE_SKB_CB(skb)->protocol != IPPROTO_IPV6) |
74 | nh[IP6CB(skb)->nhoff] != IPPROTO_IPIP) | ||
75 | goto out; | 67 | goto out; |
76 | if (!pskb_may_pull(skb, sizeof(struct ipv6hdr))) | 68 | if (!pskb_may_pull(skb, sizeof(struct ipv6hdr))) |
77 | goto out; | 69 | goto out; |
@@ -80,18 +72,12 @@ static int xfrm6_tunnel_input(struct xfrm_state *x, struct sk_buff *skb) | |||
80 | (err = pskb_expand_head(skb, 0, 0, GFP_ATOMIC))) | 72 | (err = pskb_expand_head(skb, 0, 0, GFP_ATOMIC))) |
81 | goto out; | 73 | goto out; |
82 | 74 | ||
83 | nh = skb_network_header(skb); | 75 | if (x->props.flags & XFRM_STATE_DECAP_DSCP) |
84 | if (nh[IP6CB(skb)->nhoff] == IPPROTO_IPV6) { | 76 | ipv6_copy_dscp(ipv6_get_dsfield(ipv6_hdr(skb)), |
85 | if (x->props.flags & XFRM_STATE_DECAP_DSCP) | 77 | ipipv6_hdr(skb)); |
86 | ipv6_copy_dscp(ipv6_get_dsfield(ipv6_hdr(skb)), | 78 | if (!(x->props.flags & XFRM_STATE_NOECN)) |
87 | ipipv6_hdr(skb)); | 79 | ipip6_ecn_decapsulate(skb); |
88 | if (!(x->props.flags & XFRM_STATE_NOECN)) | 80 | |
89 | ipip6_ecn_decapsulate(skb); | ||
90 | } else { | ||
91 | if (!(x->props.flags & XFRM_STATE_NOECN)) | ||
92 | ip6ip_ecn_decapsulate(skb); | ||
93 | skb->protocol = htons(ETH_P_IP); | ||
94 | } | ||
95 | old_mac = skb_mac_header(skb); | 81 | old_mac = skb_mac_header(skb); |
96 | skb_set_mac_header(skb, -skb->mac_len); | 82 | skb_set_mac_header(skb, -skb->mac_len); |
97 | memmove(skb_mac_header(skb), old_mac, skb->mac_len); | 83 | memmove(skb_mac_header(skb), old_mac, skb->mac_len); |
@@ -103,7 +89,8 @@ out: | |||
103 | } | 89 | } |
104 | 90 | ||
105 | static struct xfrm_mode xfrm6_tunnel_mode = { | 91 | static struct xfrm_mode xfrm6_tunnel_mode = { |
106 | .input = xfrm6_tunnel_input, | 92 | .input2 = xfrm6_tunnel_input, |
93 | .input = xfrm_prepare_input, | ||
107 | .output2 = xfrm6_tunnel_output, | 94 | .output2 = xfrm6_tunnel_output, |
108 | .output = xfrm6_prepare_output, | 95 | .output = xfrm6_prepare_output, |
109 | .owner = THIS_MODULE, | 96 | .owner = THIS_MODULE, |
diff --git a/net/ipv6/xfrm6_output.c b/net/ipv6/xfrm6_output.c index bc2e80e3b0b1..c45050cfe72b 100644 --- a/net/ipv6/xfrm6_output.c +++ b/net/ipv6/xfrm6_output.c | |||
@@ -53,6 +53,7 @@ int xfrm6_extract_output(struct xfrm_state *x, struct sk_buff *skb) | |||
53 | if (err) | 53 | if (err) |
54 | return err; | 54 | return err; |
55 | 55 | ||
56 | IP6CB(skb)->nhoff = offsetof(struct ipv6hdr, nexthdr); | ||
56 | return xfrm6_extract_header(skb); | 57 | return xfrm6_extract_header(skb); |
57 | } | 58 | } |
58 | 59 | ||
diff --git a/net/ipv6/xfrm6_state.c b/net/ipv6/xfrm6_state.c index 98b05f472322..90fef0a4726f 100644 --- a/net/ipv6/xfrm6_state.c +++ b/net/ipv6/xfrm6_state.c | |||
@@ -177,7 +177,8 @@ int xfrm6_extract_header(struct sk_buff *skb) | |||
177 | XFRM_MODE_SKB_CB(skb)->frag_off = htons(IP_DF); | 177 | XFRM_MODE_SKB_CB(skb)->frag_off = htons(IP_DF); |
178 | XFRM_MODE_SKB_CB(skb)->tos = ipv6_get_dsfield(iph); | 178 | XFRM_MODE_SKB_CB(skb)->tos = ipv6_get_dsfield(iph); |
179 | XFRM_MODE_SKB_CB(skb)->ttl = iph->hop_limit; | 179 | XFRM_MODE_SKB_CB(skb)->ttl = iph->hop_limit; |
180 | XFRM_MODE_SKB_CB(skb)->protocol = iph->nexthdr; | 180 | XFRM_MODE_SKB_CB(skb)->protocol = |
181 | skb_network_header(skb)[IP6CB(skb)->nhoff]; | ||
181 | memcpy(XFRM_MODE_SKB_CB(skb)->flow_lbl, iph->flow_lbl, | 182 | memcpy(XFRM_MODE_SKB_CB(skb)->flow_lbl, iph->flow_lbl, |
182 | sizeof(XFRM_MODE_SKB_CB(skb)->flow_lbl)); | 183 | sizeof(XFRM_MODE_SKB_CB(skb)->flow_lbl)); |
183 | 184 | ||
@@ -187,11 +188,13 @@ int xfrm6_extract_header(struct sk_buff *skb) | |||
187 | static struct xfrm_state_afinfo xfrm6_state_afinfo = { | 188 | static struct xfrm_state_afinfo xfrm6_state_afinfo = { |
188 | .family = AF_INET6, | 189 | .family = AF_INET6, |
189 | .proto = IPPROTO_IPV6, | 190 | .proto = IPPROTO_IPV6, |
191 | .eth_proto = htons(ETH_P_IPV6), | ||
190 | .owner = THIS_MODULE, | 192 | .owner = THIS_MODULE, |
191 | .init_tempsel = __xfrm6_init_tempsel, | 193 | .init_tempsel = __xfrm6_init_tempsel, |
192 | .tmpl_sort = __xfrm6_tmpl_sort, | 194 | .tmpl_sort = __xfrm6_tmpl_sort, |
193 | .state_sort = __xfrm6_state_sort, | 195 | .state_sort = __xfrm6_state_sort, |
194 | .output = xfrm6_output, | 196 | .output = xfrm6_output, |
197 | .extract_input = xfrm6_extract_input, | ||
195 | .extract_output = xfrm6_extract_output, | 198 | .extract_output = xfrm6_extract_output, |
196 | }; | 199 | }; |
197 | 200 | ||
diff --git a/net/xfrm/xfrm_input.c b/net/xfrm/xfrm_input.c index cb97fda1b6df..4c803f7e74e5 100644 --- a/net/xfrm/xfrm_input.c +++ b/net/xfrm/xfrm_input.c | |||
@@ -81,6 +81,19 @@ int xfrm_parse_spi(struct sk_buff *skb, u8 nexthdr, __be32 *spi, __be32 *seq) | |||
81 | } | 81 | } |
82 | EXPORT_SYMBOL(xfrm_parse_spi); | 82 | EXPORT_SYMBOL(xfrm_parse_spi); |
83 | 83 | ||
84 | int xfrm_prepare_input(struct xfrm_state *x, struct sk_buff *skb) | ||
85 | { | ||
86 | int err; | ||
87 | |||
88 | err = x->outer_mode->afinfo->extract_input(x, skb); | ||
89 | if (err) | ||
90 | return err; | ||
91 | |||
92 | skb->protocol = x->inner_mode->afinfo->eth_proto; | ||
93 | return x->inner_mode->input2(x, skb); | ||
94 | } | ||
95 | EXPORT_SYMBOL(xfrm_prepare_input); | ||
96 | |||
84 | void __init xfrm_input_init(void) | 97 | void __init xfrm_input_init(void) |
85 | { | 98 | { |
86 | secpath_cachep = kmem_cache_create("secpath_cache", | 99 | secpath_cachep = kmem_cache_create("secpath_cache", |