]> git.baikalelectronics.ru Git - kernel.git/commitdiff
xfrm: state: remove extract_input indirection from xfrm_state_afinfo
authorFlorian Westphal <fw@strlen.de>
Mon, 4 May 2020 08:06:04 +0000 (10:06 +0200)
committerSteffen Klassert <steffen.klassert@secunet.com>
Wed, 6 May 2020 07:40:08 +0000 (09:40 +0200)
In order to keep CONFIG_IPV6=m working, xfrm6_extract_header needs to be
duplicated.  It will be removed again in a followup change when the
remaining caller is moved to net/xfrm as well.

Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
include/net/xfrm.h
net/ipv4/xfrm4_input.c
net/ipv4/xfrm4_state.c
net/ipv6/xfrm6_input.c
net/ipv6/xfrm6_output.c
net/ipv6/xfrm6_state.c
net/xfrm/xfrm_inout.h
net/xfrm/xfrm_input.c

index 397007324abd9fa4e5b302c9f88431853c09599b..a21c1dea534025bda54cf1bad4dcd51ce60e8324 100644 (file)
@@ -362,8 +362,6 @@ struct xfrm_state_afinfo {
 
        int                     (*output)(struct net *net, struct sock *sk, struct sk_buff *skb);
        int                     (*output_finish)(struct sock *sk, struct sk_buff *skb);
-       int                     (*extract_input)(struct xfrm_state *x,
-                                                struct sk_buff *skb);
        int                     (*extract_output)(struct xfrm_state *x,
                                                  struct sk_buff *skb);
        int                     (*transport_finish)(struct sk_buff *skb,
@@ -1587,7 +1585,6 @@ int xfrm4_protocol_deregister(struct xfrm4_protocol *handler, unsigned char prot
 int xfrm4_tunnel_register(struct xfrm_tunnel *handler, unsigned short family);
 int xfrm4_tunnel_deregister(struct xfrm_tunnel *handler, unsigned short family);
 void xfrm4_local_error(struct sk_buff *skb, u32 mtu);
-int xfrm6_extract_header(struct sk_buff *skb);
 int xfrm6_extract_input(struct xfrm_state *x, struct sk_buff *skb);
 int xfrm6_rcv_spi(struct sk_buff *skb, int nexthdr, __be32 spi,
                  struct ip6_tnl *t);
index f8de2482a52923709ed58c401785a6ac60771932..ad2afeef4f106b713d659bb94e7215b6e9226f9b 100644 (file)
 #include <net/ip.h>
 #include <net/xfrm.h>
 
-int xfrm4_extract_input(struct xfrm_state *x, struct sk_buff *skb)
-{
-       return xfrm4_extract_header(skb);
-}
-
 static int xfrm4_rcv_encap_finish2(struct net *net, struct sock *sk,
                                   struct sk_buff *skb)
 {
index d7c200779e4fbea2001b8c89282cc58741ae6a68..521fc1bc069c7080a291018512f58470f35c6b60 100644 (file)
@@ -36,7 +36,6 @@ static struct xfrm_state_afinfo xfrm4_state_afinfo = {
        .proto                  = IPPROTO_IPIP,
        .output                 = xfrm4_output,
        .output_finish          = xfrm4_output_finish,
-       .extract_input          = xfrm4_extract_input,
        .transport_finish       = xfrm4_transport_finish,
        .local_error            = xfrm4_local_error,
 };
index 56f52353b324b990c7d557e4743bca0ed0c7d8d7..04cbeefd8982898e690a12a9eff9a966d77c08e7 100644 (file)
 #include <net/ipv6.h>
 #include <net/xfrm.h>
 
-int xfrm6_extract_input(struct xfrm_state *x, struct sk_buff *skb)
-{
-       return xfrm6_extract_header(skb);
-}
-
 int xfrm6_rcv_spi(struct sk_buff *skb, int nexthdr, __be32 spi,
                  struct ip6_tnl *t)
 {
index fbe51d40bd7e9f8b50bc3ba1c1d41710a162e29d..855078a43fc7d0f1230ced23f7eed8620e9d5234 100644 (file)
@@ -94,6 +94,20 @@ out:
        return ret;
 }
 
+static void __xfrm6_extract_header(struct sk_buff *skb)
+{
+       struct ipv6hdr *iph = ipv6_hdr(skb);
+
+       XFRM_MODE_SKB_CB(skb)->ihl = sizeof(*iph);
+       XFRM_MODE_SKB_CB(skb)->id = 0;
+       XFRM_MODE_SKB_CB(skb)->frag_off = htons(IP_DF);
+       XFRM_MODE_SKB_CB(skb)->tos = ipv6_get_dsfield(iph);
+       XFRM_MODE_SKB_CB(skb)->ttl = iph->hop_limit;
+       XFRM_MODE_SKB_CB(skb)->optlen = 0;
+       memcpy(XFRM_MODE_SKB_CB(skb)->flow_lbl, iph->flow_lbl,
+              sizeof(XFRM_MODE_SKB_CB(skb)->flow_lbl));
+}
+
 int xfrm6_extract_output(struct xfrm_state *x, struct sk_buff *skb)
 {
        int err;
@@ -104,7 +118,8 @@ int xfrm6_extract_output(struct xfrm_state *x, struct sk_buff *skb)
 
        XFRM_MODE_SKB_CB(skb)->protocol = ipv6_hdr(skb)->nexthdr;
 
-       return xfrm6_extract_header(skb);
+       __xfrm6_extract_header(skb);
+       return 0;
 }
 
 int xfrm6_output_finish(struct sock *sk, struct sk_buff *skb)
index 78daadecbdef5f0beabaa4acc2ce9b4a8a189d6a..8fbf5a68ee6e8c57e989e419610486bc9d9b7a62 100644 (file)
  */
 
 #include <net/xfrm.h>
-#include <linux/pfkeyv2.h>
-#include <linux/ipsec.h>
-#include <linux/netfilter_ipv6.h>
-#include <linux/export.h>
-#include <net/dsfield.h>
-#include <net/ipv6.h>
-#include <net/addrconf.h>
-
-int xfrm6_extract_header(struct sk_buff *skb)
-{
-       struct ipv6hdr *iph = ipv6_hdr(skb);
-
-       XFRM_MODE_SKB_CB(skb)->ihl = sizeof(*iph);
-       XFRM_MODE_SKB_CB(skb)->id = 0;
-       XFRM_MODE_SKB_CB(skb)->frag_off = htons(IP_DF);
-       XFRM_MODE_SKB_CB(skb)->tos = ipv6_get_dsfield(iph);
-       XFRM_MODE_SKB_CB(skb)->ttl = iph->hop_limit;
-       XFRM_MODE_SKB_CB(skb)->optlen = 0;
-       memcpy(XFRM_MODE_SKB_CB(skb)->flow_lbl, iph->flow_lbl,
-              sizeof(XFRM_MODE_SKB_CB(skb)->flow_lbl));
-
-       return 0;
-}
 
 static struct xfrm_state_afinfo xfrm6_state_afinfo = {
        .family                 = AF_INET6,
        .proto                  = IPPROTO_IPV6,
        .output                 = xfrm6_output,
        .output_finish          = xfrm6_output_finish,
-       .extract_input          = xfrm6_extract_input,
        .extract_output         = xfrm6_extract_output,
        .transport_finish       = xfrm6_transport_finish,
        .local_error            = xfrm6_local_error,
index c7b0318938e227b8d69f84959bcbcaeb7512ddcb..e24abac92dc282205b985e7a88e464a5d1d1e333 100644 (file)
@@ -6,6 +6,24 @@
 #ifndef XFRM_INOUT_H
 #define XFRM_INOUT_H 1
 
+static inline void xfrm6_extract_header(struct sk_buff *skb)
+{
+#if IS_ENABLED(CONFIG_IPV6)
+       struct ipv6hdr *iph = ipv6_hdr(skb);
+
+       XFRM_MODE_SKB_CB(skb)->ihl = sizeof(*iph);
+       XFRM_MODE_SKB_CB(skb)->id = 0;
+       XFRM_MODE_SKB_CB(skb)->frag_off = htons(IP_DF);
+       XFRM_MODE_SKB_CB(skb)->tos = ipv6_get_dsfield(iph);
+       XFRM_MODE_SKB_CB(skb)->ttl = iph->hop_limit;
+       XFRM_MODE_SKB_CB(skb)->optlen = 0;
+       memcpy(XFRM_MODE_SKB_CB(skb)->flow_lbl, iph->flow_lbl,
+              sizeof(XFRM_MODE_SKB_CB(skb)->flow_lbl));
+#else
+       WARN_ON_ONCE(1);
+#endif
+}
+
 static inline void xfrm6_beet_make_header(struct sk_buff *skb)
 {
        struct ipv6hdr *iph = ipv6_hdr(skb);
index aa35f23c491292f362858660e14d9a9e786c7445..6db266a0cb2d31a9030fefe1421321ebb9e40047 100644 (file)
@@ -353,17 +353,18 @@ xfrm_inner_mode_encap_remove(struct xfrm_state *x,
 static int xfrm_prepare_input(struct xfrm_state *x, struct sk_buff *skb)
 {
        const struct xfrm_mode *inner_mode = &x->inner_mode;
-       const struct xfrm_state_afinfo *afinfo;
-       int err = -EAFNOSUPPORT;
-
-       rcu_read_lock();
-       afinfo = xfrm_state_afinfo_get_rcu(x->outer_mode.family);
-       if (likely(afinfo))
-               err = afinfo->extract_input(x, skb);
-       rcu_read_unlock();
 
-       if (err)
-               return err;
+       switch (x->outer_mode.family) {
+       case AF_INET:
+               xfrm4_extract_header(skb);
+               break;
+       case AF_INET6:
+               xfrm6_extract_header(skb);
+               break;
+       default:
+               WARN_ON_ONCE(1);
+               return -EAFNOSUPPORT;
+       }
 
        if (x->sel.family == AF_UNSPEC) {
                inner_mode = xfrm_ip2inner_mode(x, XFRM_MODE_SKB_CB(skb)->protocol);