mirror of
https://github.com/torvalds/linux.git
synced 2024-12-28 22:02:28 +00:00
xfrm: Introduce xfrm_input_afinfo to access the the callbacks properly
IPv6 can be build as a module, so we need mechanism to access the address family dependent callback functions properly. Therefore we introduce xfrm_input_afinfo, similar to that what we have for the address family dependent part of policies and states. Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
This commit is contained in:
parent
870a2df4ca
commit
2f32b51b60
@ -349,6 +349,16 @@ int xfrm_state_unregister_afinfo(struct xfrm_state_afinfo *afinfo);
|
||||
struct xfrm_state_afinfo *xfrm_state_get_afinfo(unsigned int family);
|
||||
void xfrm_state_put_afinfo(struct xfrm_state_afinfo *afinfo);
|
||||
|
||||
struct xfrm_input_afinfo {
|
||||
unsigned int family;
|
||||
struct module *owner;
|
||||
int (*callback)(struct sk_buff *skb, u8 protocol,
|
||||
int err);
|
||||
};
|
||||
|
||||
int xfrm_input_register_afinfo(struct xfrm_input_afinfo *afinfo);
|
||||
int xfrm_input_unregister_afinfo(struct xfrm_input_afinfo *afinfo);
|
||||
|
||||
void xfrm_state_delete_tunnel(struct xfrm_state *x);
|
||||
|
||||
struct xfrm_type {
|
||||
@ -1392,6 +1402,7 @@ void xfrm4_init(void);
|
||||
int xfrm_state_init(struct net *net);
|
||||
void xfrm_state_fini(struct net *net);
|
||||
void xfrm4_state_init(void);
|
||||
void xfrm4_protocol_init(void);
|
||||
#ifdef CONFIG_XFRM
|
||||
int xfrm6_init(void);
|
||||
void xfrm6_fini(void);
|
||||
@ -1773,18 +1784,6 @@ static inline int xfrm_mark_put(struct sk_buff *skb, const struct xfrm_mark *m)
|
||||
return ret;
|
||||
}
|
||||
|
||||
static inline int xfrm_rcv_cb(struct sk_buff *skb, unsigned int family,
|
||||
u8 protocol, int err)
|
||||
{
|
||||
switch(family) {
|
||||
#ifdef CONFIG_INET
|
||||
case AF_INET:
|
||||
return xfrm4_rcv_cb(skb, protocol, err);
|
||||
#endif
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
static inline int xfrm_tunnel_check(struct sk_buff *skb, struct xfrm_state *x,
|
||||
unsigned int family)
|
||||
{
|
||||
|
@ -325,6 +325,7 @@ void __init xfrm4_init(void)
|
||||
|
||||
xfrm4_state_init();
|
||||
xfrm4_policy_init();
|
||||
xfrm4_protocol_init();
|
||||
#ifdef CONFIG_SYSCTL
|
||||
register_pernet_subsys(&xfrm4_net_ops);
|
||||
#endif
|
||||
|
@ -179,6 +179,12 @@ static const struct net_protocol ipcomp4_protocol = {
|
||||
.netns_ok = 1,
|
||||
};
|
||||
|
||||
static struct xfrm_input_afinfo xfrm4_input_afinfo = {
|
||||
.family = AF_INET,
|
||||
.owner = THIS_MODULE,
|
||||
.callback = xfrm4_rcv_cb,
|
||||
};
|
||||
|
||||
static inline const struct net_protocol *netproto(unsigned char protocol)
|
||||
{
|
||||
switch (protocol) {
|
||||
@ -199,7 +205,6 @@ int xfrm4_protocol_register(struct xfrm4_protocol *handler,
|
||||
struct xfrm4_protocol __rcu **pprev;
|
||||
struct xfrm4_protocol *t;
|
||||
bool add_netproto = false;
|
||||
|
||||
int ret = -EEXIST;
|
||||
int priority = handler->priority;
|
||||
|
||||
@ -273,3 +278,9 @@ int xfrm4_protocol_deregister(struct xfrm4_protocol *handler,
|
||||
return ret;
|
||||
}
|
||||
EXPORT_SYMBOL(xfrm4_protocol_deregister);
|
||||
|
||||
void __init xfrm4_protocol_init(void)
|
||||
{
|
||||
xfrm_input_register_afinfo(&xfrm4_input_afinfo);
|
||||
}
|
||||
EXPORT_SYMBOL(xfrm4_protocol_init);
|
||||
|
@ -16,6 +16,81 @@
|
||||
|
||||
static struct kmem_cache *secpath_cachep __read_mostly;
|
||||
|
||||
static DEFINE_SPINLOCK(xfrm_input_afinfo_lock);
|
||||
static struct xfrm_input_afinfo __rcu *xfrm_input_afinfo[NPROTO];
|
||||
|
||||
int xfrm_input_register_afinfo(struct xfrm_input_afinfo *afinfo)
|
||||
{
|
||||
int err = 0;
|
||||
|
||||
if (unlikely(afinfo == NULL))
|
||||
return -EINVAL;
|
||||
if (unlikely(afinfo->family >= NPROTO))
|
||||
return -EAFNOSUPPORT;
|
||||
spin_lock_bh(&xfrm_input_afinfo_lock);
|
||||
if (unlikely(xfrm_input_afinfo[afinfo->family] != NULL))
|
||||
err = -ENOBUFS;
|
||||
else
|
||||
rcu_assign_pointer(xfrm_input_afinfo[afinfo->family], afinfo);
|
||||
spin_unlock_bh(&xfrm_input_afinfo_lock);
|
||||
return err;
|
||||
}
|
||||
EXPORT_SYMBOL(xfrm_input_register_afinfo);
|
||||
|
||||
int xfrm_input_unregister_afinfo(struct xfrm_input_afinfo *afinfo)
|
||||
{
|
||||
int err = 0;
|
||||
|
||||
if (unlikely(afinfo == NULL))
|
||||
return -EINVAL;
|
||||
if (unlikely(afinfo->family >= NPROTO))
|
||||
return -EAFNOSUPPORT;
|
||||
spin_lock_bh(&xfrm_input_afinfo_lock);
|
||||
if (likely(xfrm_input_afinfo[afinfo->family] != NULL)) {
|
||||
if (unlikely(xfrm_input_afinfo[afinfo->family] != afinfo))
|
||||
err = -EINVAL;
|
||||
else
|
||||
RCU_INIT_POINTER(xfrm_input_afinfo[afinfo->family], NULL);
|
||||
}
|
||||
spin_unlock_bh(&xfrm_input_afinfo_lock);
|
||||
synchronize_rcu();
|
||||
return err;
|
||||
}
|
||||
EXPORT_SYMBOL(xfrm_input_unregister_afinfo);
|
||||
|
||||
static struct xfrm_input_afinfo *xfrm_input_get_afinfo(unsigned int family)
|
||||
{
|
||||
struct xfrm_input_afinfo *afinfo;
|
||||
|
||||
if (unlikely(family >= NPROTO))
|
||||
return NULL;
|
||||
rcu_read_lock();
|
||||
afinfo = rcu_dereference(xfrm_input_afinfo[family]);
|
||||
if (unlikely(!afinfo))
|
||||
rcu_read_unlock();
|
||||
return afinfo;
|
||||
}
|
||||
|
||||
static void xfrm_input_put_afinfo(struct xfrm_input_afinfo *afinfo)
|
||||
{
|
||||
rcu_read_unlock();
|
||||
}
|
||||
|
||||
static int xfrm_rcv_cb(struct sk_buff *skb, unsigned int family, u8 protocol,
|
||||
int err)
|
||||
{
|
||||
int ret;
|
||||
struct xfrm_input_afinfo *afinfo = xfrm_input_get_afinfo(family);
|
||||
|
||||
if (!afinfo)
|
||||
return -EAFNOSUPPORT;
|
||||
|
||||
ret = afinfo->callback(skb, protocol, err);
|
||||
xfrm_input_put_afinfo(afinfo);
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
void __secpath_destroy(struct sec_path *sp)
|
||||
{
|
||||
int i;
|
||||
|
Loading…
Reference in New Issue
Block a user