mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git
synced 2024-12-28 16:52:18 +00:00
xfrm: add generic iptfs defines and functionality
Define `XFRM_MODE_IPTFS` and `IPSEC_MODE_IPTFS` constants, and add these to switch case and conditionals adjacent with the existing TUNNEL modes. Signed-off-by: Christian Hopps <chopps@labn.net> Tested-by: Antony Antony <antony.antony@secunet.com> Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
This commit is contained in:
parent
7ac64f4598
commit
d1716d5a44
@ -38,6 +38,7 @@
|
||||
#define XFRM_PROTO_COMP 108
|
||||
#define XFRM_PROTO_IPIP 4
|
||||
#define XFRM_PROTO_IPV6 41
|
||||
#define XFRM_PROTO_IPTFS IPPROTO_AGGFRAG
|
||||
#define XFRM_PROTO_ROUTING IPPROTO_ROUTING
|
||||
#define XFRM_PROTO_DSTOPTS IPPROTO_DSTOPTS
|
||||
|
||||
|
@ -14,7 +14,8 @@ enum {
|
||||
IPSEC_MODE_ANY = 0, /* We do not support this for SA */
|
||||
IPSEC_MODE_TRANSPORT = 1,
|
||||
IPSEC_MODE_TUNNEL = 2,
|
||||
IPSEC_MODE_BEET = 3
|
||||
IPSEC_MODE_BEET = 3,
|
||||
IPSEC_MODE_IPTFS = 4
|
||||
};
|
||||
|
||||
enum {
|
||||
|
@ -339,6 +339,8 @@ enum
|
||||
LINUX_MIB_XFRMACQUIREERROR, /* XfrmAcquireError */
|
||||
LINUX_MIB_XFRMOUTSTATEDIRERROR, /* XfrmOutStateDirError */
|
||||
LINUX_MIB_XFRMINSTATEDIRERROR, /* XfrmInStateDirError */
|
||||
LINUX_MIB_XFRMINIPTFSERROR, /* XfrmInIptfsError */
|
||||
LINUX_MIB_XFRMOUTNOQSPACE, /* XfrmOutNoQueueSpace */
|
||||
__LINUX_MIB_XFRMMAX
|
||||
};
|
||||
|
||||
|
@ -816,7 +816,8 @@ int esp_input_done2(struct sk_buff *skb, int err)
|
||||
}
|
||||
|
||||
skb_pull_rcsum(skb, hlen);
|
||||
if (x->props.mode == XFRM_MODE_TUNNEL)
|
||||
if (x->props.mode == XFRM_MODE_TUNNEL ||
|
||||
x->props.mode == XFRM_MODE_IPTFS)
|
||||
skb_reset_transport_header(skb);
|
||||
else
|
||||
skb_set_transport_header(skb, -ihl);
|
||||
|
@ -859,7 +859,8 @@ int esp6_input_done2(struct sk_buff *skb, int err)
|
||||
skb_postpull_rcsum(skb, skb_network_header(skb),
|
||||
skb_network_header_len(skb));
|
||||
skb_pull_rcsum(skb, hlen);
|
||||
if (x->props.mode == XFRM_MODE_TUNNEL)
|
||||
if (x->props.mode == XFRM_MODE_TUNNEL ||
|
||||
x->props.mode == XFRM_MODE_IPTFS)
|
||||
skb_reset_transport_header(skb);
|
||||
else
|
||||
skb_set_transport_header(skb, -hdr_len);
|
||||
|
@ -112,7 +112,8 @@ static bool xfrm_state_addr_ok(enum nft_xfrm_keys k, u8 family, u8 mode)
|
||||
return true;
|
||||
}
|
||||
|
||||
return mode == XFRM_MODE_BEET || mode == XFRM_MODE_TUNNEL;
|
||||
return mode == XFRM_MODE_BEET || mode == XFRM_MODE_TUNNEL ||
|
||||
mode == XFRM_MODE_IPTFS;
|
||||
}
|
||||
|
||||
static void nft_xfrm_state_get_key(const struct nft_xfrm *priv,
|
||||
|
@ -69,6 +69,7 @@ static void __xfrm_mode_beet_prep(struct xfrm_state *x, struct sk_buff *skb,
|
||||
static void xfrm_outer_mode_prep(struct xfrm_state *x, struct sk_buff *skb)
|
||||
{
|
||||
switch (x->outer_mode.encap) {
|
||||
case XFRM_MODE_IPTFS:
|
||||
case XFRM_MODE_TUNNEL:
|
||||
if (x->outer_mode.family == AF_INET)
|
||||
return __xfrm_mode_tunnel_prep(x, skb,
|
||||
|
@ -677,6 +677,10 @@ static void xfrm_get_inner_ipproto(struct sk_buff *skb, struct xfrm_state *x)
|
||||
|
||||
return;
|
||||
}
|
||||
if (x->outer_mode.encap == XFRM_MODE_IPTFS) {
|
||||
xo->inner_ipproto = IPPROTO_AGGFRAG;
|
||||
return;
|
||||
}
|
||||
|
||||
/* non-Tunnel Mode */
|
||||
if (!skb->encapsulation)
|
||||
|
@ -2497,6 +2497,7 @@ xfrm_tmpl_resolve_one(struct xfrm_policy *policy, const struct flowi *fl,
|
||||
struct xfrm_tmpl *tmpl = &policy->xfrm_vec[i];
|
||||
|
||||
if (tmpl->mode == XFRM_MODE_TUNNEL ||
|
||||
tmpl->mode == XFRM_MODE_IPTFS ||
|
||||
tmpl->mode == XFRM_MODE_BEET) {
|
||||
remote = &tmpl->id.daddr;
|
||||
local = &tmpl->saddr;
|
||||
@ -3294,7 +3295,8 @@ struct dst_entry *xfrm_lookup_with_ifid(struct net *net,
|
||||
ok:
|
||||
xfrm_pols_put(pols, drop_pols);
|
||||
if (dst && dst->xfrm &&
|
||||
dst->xfrm->props.mode == XFRM_MODE_TUNNEL)
|
||||
(dst->xfrm->props.mode == XFRM_MODE_TUNNEL ||
|
||||
dst->xfrm->props.mode == XFRM_MODE_IPTFS))
|
||||
dst->flags |= DST_XFRM_TUNNEL;
|
||||
return dst;
|
||||
|
||||
@ -4523,6 +4525,7 @@ static int migrate_tmpl_match(const struct xfrm_migrate *m, const struct xfrm_tm
|
||||
switch (t->mode) {
|
||||
case XFRM_MODE_TUNNEL:
|
||||
case XFRM_MODE_BEET:
|
||||
case XFRM_MODE_IPTFS:
|
||||
if (xfrm_addr_equal(&t->id.daddr, &m->old_daddr,
|
||||
m->old_family) &&
|
||||
xfrm_addr_equal(&t->saddr, &m->old_saddr,
|
||||
@ -4565,7 +4568,8 @@ static int xfrm_policy_migrate(struct xfrm_policy *pol,
|
||||
continue;
|
||||
n++;
|
||||
if (pol->xfrm_vec[i].mode != XFRM_MODE_TUNNEL &&
|
||||
pol->xfrm_vec[i].mode != XFRM_MODE_BEET)
|
||||
pol->xfrm_vec[i].mode != XFRM_MODE_BEET &&
|
||||
pol->xfrm_vec[i].mode != XFRM_MODE_IPTFS)
|
||||
continue;
|
||||
/* update endpoints */
|
||||
memcpy(&pol->xfrm_vec[i].id.daddr, &mp->new_daddr,
|
||||
|
@ -43,6 +43,8 @@ static const struct snmp_mib xfrm_mib_list[] = {
|
||||
SNMP_MIB_ITEM("XfrmAcquireError", LINUX_MIB_XFRMACQUIREERROR),
|
||||
SNMP_MIB_ITEM("XfrmOutStateDirError", LINUX_MIB_XFRMOUTSTATEDIRERROR),
|
||||
SNMP_MIB_ITEM("XfrmInStateDirError", LINUX_MIB_XFRMINSTATEDIRERROR),
|
||||
SNMP_MIB_ITEM("XfrmInIptfsError", LINUX_MIB_XFRMINIPTFSERROR),
|
||||
SNMP_MIB_ITEM("XfrmOutNoQueueSpace", LINUX_MIB_XFRMOUTNOQSPACE),
|
||||
SNMP_MIB_SENTINEL
|
||||
};
|
||||
|
||||
|
@ -467,6 +467,11 @@ static const struct xfrm_mode xfrm4_mode_map[XFRM_MODE_MAX] = {
|
||||
.flags = XFRM_MODE_FLAG_TUNNEL,
|
||||
.family = AF_INET,
|
||||
},
|
||||
[XFRM_MODE_IPTFS] = {
|
||||
.encap = XFRM_MODE_IPTFS,
|
||||
.flags = XFRM_MODE_FLAG_TUNNEL,
|
||||
.family = AF_INET,
|
||||
},
|
||||
};
|
||||
|
||||
static const struct xfrm_mode xfrm6_mode_map[XFRM_MODE_MAX] = {
|
||||
@ -488,6 +493,11 @@ static const struct xfrm_mode xfrm6_mode_map[XFRM_MODE_MAX] = {
|
||||
.flags = XFRM_MODE_FLAG_TUNNEL,
|
||||
.family = AF_INET6,
|
||||
},
|
||||
[XFRM_MODE_IPTFS] = {
|
||||
.encap = XFRM_MODE_IPTFS,
|
||||
.flags = XFRM_MODE_FLAG_TUNNEL,
|
||||
.family = AF_INET6,
|
||||
},
|
||||
};
|
||||
|
||||
static const struct xfrm_mode *xfrm_get_mode(unsigned int encap, int family)
|
||||
@ -2334,6 +2344,7 @@ static int __xfrm6_state_sort_cmp(const void *p)
|
||||
#endif
|
||||
case XFRM_MODE_TUNNEL:
|
||||
case XFRM_MODE_BEET:
|
||||
case XFRM_MODE_IPTFS:
|
||||
return 4;
|
||||
}
|
||||
return 5;
|
||||
@ -2360,6 +2371,7 @@ static int __xfrm6_tmpl_sort_cmp(const void *p)
|
||||
#endif
|
||||
case XFRM_MODE_TUNNEL:
|
||||
case XFRM_MODE_BEET:
|
||||
case XFRM_MODE_IPTFS:
|
||||
return 3;
|
||||
}
|
||||
return 4;
|
||||
|
@ -383,6 +383,16 @@ static int verify_newsa_info(struct xfrm_usersa_info *p,
|
||||
case XFRM_MODE_ROUTEOPTIMIZATION:
|
||||
case XFRM_MODE_BEET:
|
||||
break;
|
||||
case XFRM_MODE_IPTFS:
|
||||
if (p->id.proto != IPPROTO_ESP) {
|
||||
NL_SET_ERR_MSG(extack, "IP-TFS mode only supported with ESP");
|
||||
goto out;
|
||||
}
|
||||
if (sa_dir == 0) {
|
||||
NL_SET_ERR_MSG(extack, "IP-TFS mode requires in or out direction attribute");
|
||||
goto out;
|
||||
}
|
||||
break;
|
||||
|
||||
default:
|
||||
NL_SET_ERR_MSG(extack, "Unsupported mode");
|
||||
@ -2014,6 +2024,8 @@ static int validate_tmpl(int nr, struct xfrm_user_tmpl *ut, u16 family,
|
||||
return -EINVAL;
|
||||
}
|
||||
break;
|
||||
case XFRM_MODE_IPTFS:
|
||||
break;
|
||||
default:
|
||||
if (ut[i].family != prev_family) {
|
||||
NL_SET_ERR_MSG(extack, "Mode in template doesn't support a family change");
|
||||
|
Loading…
Reference in New Issue
Block a user