Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
openeuler
Kernel
提交
3b6cdf94
K
Kernel
项目概览
openeuler
/
Kernel
接近 2 年 前同步成功
通知
8
Star
0
Fork
0
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
DevOps
流水线
流水线任务
计划
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
K
Kernel
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
DevOps
DevOps
流水线
流水线任务
计划
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
流水线任务
提交
Issue看板
提交
3b6cdf94
编写于
2月 19, 2008
作者:
Y
YOSHIFUJI Hideaki
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
[XFRM] IPV6: Use distribution counting sort for xfrm_state/xfrm_tmpl chain.
Signed-off-by:
N
YOSHIFUJI Hideaki
<
yoshfuji@linux-ipv6.org
>
上级
92f1fecb
变更
1
隐藏空白更改
内联
并排
Showing
1 changed file
with
74 addition
and
97 deletion
+74
-97
net/ipv6/xfrm6_state.c
net/ipv6/xfrm6_state.c
+74
-97
未找到文件。
net/ipv6/xfrm6_state.c
浏览文件 @
3b6cdf94
...
...
@@ -49,125 +49,102 @@ __xfrm6_init_tempsel(struct xfrm_state *x, struct flowi *fl,
x
->
props
.
family
=
AF_INET6
;
}
/* distribution counting sort function for xfrm_state and xfrm_tmpl */
static
int
__xfrm6_s
tate_sort
(
struct
xfrm_state
**
dst
,
struct
xfrm_state
**
src
,
int
n
)
__xfrm6_s
ort
(
void
**
dst
,
void
**
src
,
int
n
,
int
(
*
cmp
)(
void
*
p
),
int
maxclass
)
{
int
i
;
int
j
=
0
;
int
class
[
XFRM_MAX_DEPTH
];
int
count
[
maxclass
];
/* Rule 1: select IPsec transport except AH */
for
(
i
=
0
;
i
<
n
;
i
++
)
{
if
(
src
[
i
]
->
props
.
mode
==
XFRM_MODE_TRANSPORT
&&
src
[
i
]
->
id
.
proto
!=
IPPROTO_AH
)
{
dst
[
j
++
]
=
src
[
i
];
src
[
i
]
=
NULL
;
}
}
if
(
j
==
n
)
goto
end
;
memset
(
count
,
0
,
sizeof
(
count
));
/* Rule 2: select MIPv6 RO or inbound trigger */
#if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
for
(
i
=
0
;
i
<
n
;
i
++
)
{
if
(
src
[
i
]
&&
(
src
[
i
]
->
props
.
mode
==
XFRM_MODE_ROUTEOPTIMIZATION
||
src
[
i
]
->
props
.
mode
==
XFRM_MODE_IN_TRIGGER
))
{
dst
[
j
++
]
=
src
[
i
];
src
[
i
]
=
NULL
;
}
int
c
;
class
[
i
]
=
c
=
cmp
(
src
[
i
]);
count
[
c
]
++
;
}
if
(
j
==
n
)
goto
end
;
#endif
/* Rule 3: select IPsec transport AH */
for
(
i
=
0
;
i
<
n
;
i
++
)
{
if
(
src
[
i
]
&&
src
[
i
]
->
props
.
mode
==
XFRM_MODE_TRANSPORT
&&
src
[
i
]
->
id
.
proto
==
IPPROTO_AH
)
{
dst
[
j
++
]
=
src
[
i
];
src
[
i
]
=
NULL
;
}
}
if
(
j
==
n
)
goto
end
;
for
(
i
=
2
;
i
<
maxclass
;
i
++
)
count
[
i
]
+=
count
[
i
-
1
];
/* Rule 4: select IPsec tunnel */
for
(
i
=
0
;
i
<
n
;
i
++
)
{
if
(
src
[
i
]
&&
(
src
[
i
]
->
props
.
mode
==
XFRM_MODE_TUNNEL
||
src
[
i
]
->
props
.
mode
==
XFRM_MODE_BEET
))
{
dst
[
j
++
]
=
src
[
i
];
src
[
i
]
=
NULL
;
}
dst
[
count
[
class
[
i
]
-
1
]
++
]
=
src
[
i
];
src
[
i
]
=
0
;
}
if
(
likely
(
j
==
n
))
goto
end
;
/* Final rule */
for
(
i
=
0
;
i
<
n
;
i
++
)
{
if
(
src
[
i
])
{
dst
[
j
++
]
=
src
[
i
];
src
[
i
]
=
NULL
;
}
}
end:
return
0
;
}
static
int
__xfrm6_tmpl_sort
(
struct
xfrm_tmpl
**
dst
,
struct
xfrm_tmpl
**
src
,
int
n
)
/*
* Rule for xfrm_state:
*
* rule 1: select IPsec transport except AH
* rule 2: select MIPv6 RO or inbound trigger
* rule 3: select IPsec transport AH
* rule 4: select IPsec tunnel
* rule 5: others
*/
static
int
__xfrm6_state_sort_cmp
(
void
*
p
)
{
int
i
;
int
j
=
0
;
/* Rule 1: select IPsec transport */
for
(
i
=
0
;
i
<
n
;
i
++
)
{
if
(
src
[
i
]
->
mode
==
XFRM_MODE_TRANSPORT
)
{
dst
[
j
++
]
=
src
[
i
];
src
[
i
]
=
NULL
;
}
}
if
(
j
==
n
)
goto
end
;
/* Rule 2: select MIPv6 RO or inbound trigger */
struct
xfrm_state
*
v
=
p
;
switch
(
v
->
props
.
mode
)
{
case
XFRM_MODE_TRANSPORT
:
if
(
v
->
id
.
proto
!=
IPPROTO_AH
)
return
1
;
else
return
3
;
#if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
for
(
i
=
0
;
i
<
n
;
i
++
)
{
if
(
src
[
i
]
&&
(
src
[
i
]
->
mode
==
XFRM_MODE_ROUTEOPTIMIZATION
||
src
[
i
]
->
mode
==
XFRM_MODE_IN_TRIGGER
))
{
dst
[
j
++
]
=
src
[
i
];
src
[
i
]
=
NULL
;
}
}
if
(
j
==
n
)
goto
end
;
case
XFRM_MODE_ROUTEOPTIMIZATION
:
case
XFRM_MODE_IN_TRIGGER
:
return
2
;
#endif
/* Rule 3: select IPsec tunnel */
for
(
i
=
0
;
i
<
n
;
i
++
)
{
if
(
src
[
i
]
&&
(
src
[
i
]
->
mode
==
XFRM_MODE_TUNNEL
||
src
[
i
]
->
mode
==
XFRM_MODE_BEET
))
{
dst
[
j
++
]
=
src
[
i
];
src
[
i
]
=
NULL
;
}
case
XFRM_MODE_TUNNEL
:
case
XFRM_MODE_BEET
:
return
4
;
}
if
(
likely
(
j
==
n
))
goto
end
;
return
5
;
}
/* Final rule */
for
(
i
=
0
;
i
<
n
;
i
++
)
{
if
(
src
[
i
])
{
dst
[
j
++
]
=
src
[
i
];
src
[
i
]
=
NULL
;
}
static
int
__xfrm6_state_sort
(
struct
xfrm_state
**
dst
,
struct
xfrm_state
**
src
,
int
n
)
{
return
__xfrm6_sort
((
void
**
)
dst
,
(
void
**
)
src
,
n
,
__xfrm6_state_sort_cmp
,
6
);
}
/*
* Rule for xfrm_tmpl:
*
* rule 1: select IPsec transport
* rule 2: select MIPv6 RO or inbound trigger
* rule 3: select IPsec tunnel
* rule 4: others
*/
static
int
__xfrm6_tmpl_sort_cmp
(
void
*
p
)
{
struct
xfrm_tmpl
*
v
=
p
;
switch
(
v
->
mode
)
{
case
XFRM_MODE_TRANSPORT
:
return
1
;
#if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
case
XFRM_MODE_ROUTEOPTIMIZATION
:
case
XFRM_MODE_IN_TRIGGER
:
return
2
;
#endif
case
XFRM_MODE_TUNNEL
:
case
XFRM_MODE_BEET
:
return
3
;
}
return
4
;
}
end:
return
0
;
static
int
__xfrm6_tmpl_sort
(
struct
xfrm_tmpl
**
dst
,
struct
xfrm_tmpl
**
src
,
int
n
)
{
return
__xfrm6_sort
((
void
**
)
dst
,
(
void
**
)
src
,
n
,
__xfrm6_tmpl_sort_cmp
,
5
);
}
int
xfrm6_extract_header
(
struct
sk_buff
*
skb
)
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录