diff options
author | Herbert Xu <herbert@gondor.apana.org.au> | 2007-11-14 00:45:58 -0500 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2008-01-28 17:53:52 -0500 |
commit | 0ebea8ef3559b545c37b016f44e84c3b33e47c39 (patch) | |
tree | 7a47787c1b830084ac2d36371490b9e2574e2472 /net/ipv6/ah6.c | |
parent | 668dc8af3150f837f7f0461001bbbc0ce25d7bdf (diff) |
[IPSEC]: Move state lock into x->type->input
This patch releases the lock on the state before calling
x->type->input. It also adds the lock to the spots where they're
currently needed.
Most of those places (all except mip6) are expected to disappear with
async crypto.
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/ipv6/ah6.c')
-rw-r--r-- | net/ipv6/ah6.c | 9 |
1 files changed, 7 insertions, 2 deletions
diff --git a/net/ipv6/ah6.c b/net/ipv6/ah6.c index d4b59ecb0b57..1b51d1eedbde 100644 --- a/net/ipv6/ah6.c +++ b/net/ipv6/ah6.c | |||
@@ -370,6 +370,7 @@ static int ah6_input(struct xfrm_state *x, struct sk_buff *skb) | |||
370 | ip6h->flow_lbl[2] = 0; | 370 | ip6h->flow_lbl[2] = 0; |
371 | ip6h->hop_limit = 0; | 371 | ip6h->hop_limit = 0; |
372 | 372 | ||
373 | spin_lock(&x->lock); | ||
373 | { | 374 | { |
374 | u8 auth_data[MAX_AH_AUTH_LEN]; | 375 | u8 auth_data[MAX_AH_AUTH_LEN]; |
375 | 376 | ||
@@ -378,13 +379,17 @@ static int ah6_input(struct xfrm_state *x, struct sk_buff *skb) | |||
378 | skb_push(skb, hdr_len); | 379 | skb_push(skb, hdr_len); |
379 | err = ah_mac_digest(ahp, skb, ah->auth_data); | 380 | err = ah_mac_digest(ahp, skb, ah->auth_data); |
380 | if (err) | 381 | if (err) |
381 | goto free_out; | 382 | goto unlock; |
382 | if (memcmp(ahp->work_icv, auth_data, ahp->icv_trunc_len)) { | 383 | if (memcmp(ahp->work_icv, auth_data, ahp->icv_trunc_len)) { |
383 | LIMIT_NETDEBUG(KERN_WARNING "ipsec ah authentication error\n"); | 384 | LIMIT_NETDEBUG(KERN_WARNING "ipsec ah authentication error\n"); |
384 | err = -EBADMSG; | 385 | err = -EBADMSG; |
385 | goto free_out; | ||
386 | } | 386 | } |
387 | } | 387 | } |
388 | unlock: | ||
389 | spin_unlock(&x->lock); | ||
390 | |||
391 | if (err) | ||
392 | goto free_out; | ||
388 | 393 | ||
389 | skb->network_header += ah_hlen; | 394 | skb->network_header += ah_hlen; |
390 | memcpy(skb_network_header(skb), tmp_hdr, hdr_len); | 395 | memcpy(skb_network_header(skb), tmp_hdr, hdr_len); |