From mboxrd@z Thu Jan 1 00:00:00 1970 From: jamal Subject: [PATCH] pktgen IPSEC 3/4: Introduce xfrm SAD only lookup Date: Tue, 12 Jun 2007 08:03:11 -0400 Message-ID: <1181649791.4060.59.camel@localhost> References: <1181649373.4060.50.camel@localhost> <1181649628.4060.54.camel@localhost> <1181649715.4060.56.camel@localhost> Reply-To: hadi@cyberus.ca Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="=-n0gssH4TB2iA3CleqhRV" Cc: David Miller , Herbert Xu , netdev@vger.kernel.org, James Morris To: Robert Olsson Return-path: Received: from py-out-1112.google.com ([64.233.166.178]:44669 "EHLO py-out-1112.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754144AbXFLMDP (ORCPT ); Tue, 12 Jun 2007 08:03:15 -0400 Received: by py-out-1112.google.com with SMTP id a29so3196046pyi for ; Tue, 12 Jun 2007 05:03:15 -0700 (PDT) In-Reply-To: <1181649715.4060.56.camel@localhost> Sender: netdev-owner@vger.kernel.org List-Id: netdev.vger.kernel.org --=-n0gssH4TB2iA3CleqhRV Content-Type: text/plain Content-Transfer-Encoding: 7bit 3 of 4 .. cheers, jamal --=-n0gssH4TB2iA3CleqhRV Content-Disposition: attachment; filename=pg-xfrm2 Content-Type: text/plain; name=pg-xfrm2; charset=us-ascii Content-Transfer-Encoding: 7bit commit 677f1c1459218919f5aa2622625dc8709c2a98ce Author: Jamal Hadi Salim Date: Tue Jun 12 07:28:59 2007 -0400 [XFRM] Introduce standalone SAD lookup This allows other in-kernel functions to do SAD lookups. The only known user at the moment is pktgen. Signed-off-by: Jamal Hadi Salim diff --git a/include/net/xfrm.h b/include/net/xfrm.h index 311f25a..79d2c37 100644 --- a/include/net/xfrm.h +++ b/include/net/xfrm.h @@ -920,6 +920,10 @@ extern struct xfrm_state *xfrm_state_find(xfrm_address_t *daddr, xfrm_address_t struct flowi *fl, struct xfrm_tmpl *tmpl, struct xfrm_policy *pol, int *err, unsigned short family); +extern struct xfrm_state * xfrm_stateonly_find(xfrm_address_t *daddr, + xfrm_address_t *saddr, + unsigned short family, + u8 mode, u8 proto, u32 reqid); extern int xfrm_state_check_expire(struct xfrm_state *x); extern void xfrm_state_insert(struct xfrm_state *x); extern int xfrm_state_add(struct xfrm_state *x); diff --git a/net/xfrm/xfrm_state.c b/net/xfrm/xfrm_state.c index 85f3f43..b8562e4 100644 --- a/net/xfrm/xfrm_state.c +++ b/net/xfrm/xfrm_state.c @@ -686,6 +686,41 @@ out: return x; } +struct xfrm_state * +xfrm_stateonly_find(xfrm_address_t *daddr, xfrm_address_t *saddr, + unsigned short family, u8 mode, u8 proto, u32 reqid) +{ + unsigned int h = xfrm_dst_hash(daddr, saddr, reqid, family); + struct xfrm_state *rx = NULL, *x = NULL; + struct hlist_node *entry; + + spin_lock(&xfrm_state_lock); + hlist_for_each_entry(x, entry, xfrm_state_bydst+h, bydst) { + if (x->props.family == family && + x->props.reqid == reqid && + !(x->props.flags & XFRM_STATE_WILDRECV) && + xfrm_state_addr_check(x, daddr, saddr, family) && + mode == x->props.mode && + proto == x->id.proto) { + + if (x->km.state != XFRM_STATE_VALID) + continue; + else { + rx = x; + break; + } + } + } + + if (rx) + xfrm_state_hold(rx); + spin_unlock(&xfrm_state_lock); + + + return rx; +} +EXPORT_SYMBOL(xfrm_stateonly_find); + static void __xfrm_state_insert(struct xfrm_state *x) { unsigned int h; --=-n0gssH4TB2iA3CleqhRV--