[rtems-libbsd commit] Use static inline functions for jail and prison
Sebastian Huber
sebh at rtems.org
Mon May 13 07:44:50 UTC 2019
Module: rtems-libbsd
Branch: 5-freebsd-12
Commit: 49c75e331edb496a0ff258b17236bdbc35bfc333
Changeset: http://git.rtems.org/rtems-libbsd/commit/?id=49c75e331edb496a0ff258b17236bdbc35bfc333
Author: Sebastian Huber <sebastian.huber at embedded-brains.de>
Date: Fri May 10 15:59:04 2019 +0200
Use static inline functions for jail and prison
This helps the compiler to optimize away dead code.
---
freebsd/sys/sys/jail.h | 202 ++++++++++++++++++++++++++++++++
rtemsbsd/rtems/rtems-kernel-jail.c | 230 -------------------------------------
2 files changed, 202 insertions(+), 230 deletions(-)
diff --git a/freebsd/sys/sys/jail.h b/freebsd/sys/sys/jail.h
index c9f24bd..b772e91 100644
--- a/freebsd/sys/sys/jail.h
+++ b/freebsd/sys/sys/jail.h
@@ -362,15 +362,56 @@ struct mount;
struct sockaddr;
struct statfs;
struct vfsconf;
+#ifndef __rtems__
int jailed(struct ucred *cred);
+#else /* __rtems__ */
+static inline int
+jailed(struct ucred *cred)
+{
+
+ (void)cred;
+ return (0);
+}
+#endif /* __rtems__ */
+#ifndef __rtems__
int jailed_without_vnet(struct ucred *);
+#else /* __rtems__ */
+static inline int
+jailed_without_vnet(struct ucred *cred)
+{
+
+ (void)cred;
+ return (0);
+}
+#endif /* __rtems__ */
void getcredhostname(struct ucred *, char *, size_t);
void getcreddomainname(struct ucred *, char *, size_t);
void getcredhostuuid(struct ucred *, char *, size_t);
+#ifndef __rtems__
void getcredhostid(struct ucred *, unsigned long *);
+#else /* __rtems__ */
+static inline void
+getcredhostid(struct ucred *cred, unsigned long *hostid)
+{
+
+ (void)cred;
+ *hostid = 0;
+}
+#endif /* __rtems__ */
void prison0_init(void);
int prison_allow(struct ucred *, unsigned);
+#ifndef __rtems__
int prison_check(struct ucred *cred1, struct ucred *cred2);
+#else /* __rtems__ */
+static inline int
+prison_check(struct ucred *cred1, struct ucred *cred2)
+{
+
+ (void)cred1;
+ (void)cred2;
+ return (0);
+}
+#endif /* __rtems__ */
int prison_owns_vnet(struct ucred *);
int prison_canseemount(struct ucred *cred, struct mount *mp);
void prison_enforce_statfs(struct ucred *cred, struct mount *mp,
@@ -378,10 +419,38 @@ void prison_enforce_statfs(struct ucred *cred, struct mount *mp,
struct prison *prison_find(int prid);
struct prison *prison_find_child(struct prison *, int);
struct prison *prison_find_name(struct prison *, const char *);
+#ifndef __rtems__
int prison_flag(struct ucred *, unsigned);
+#else /* __rtems__ */
+static inline int
+prison_flag(struct ucred *cred, unsigned flag)
+{
+
+ (void)cred;
+ return (prison0.pr_flags & flag);
+}
+#endif /* __rtems__ */
+#ifndef __rtems__
void prison_free(struct prison *pr);
+#else /* __rtems__ */
+static inline void
+prison_free(struct prison *pr)
+{
+
+ (void)pr;
+}
+#endif /* __rtems__ */
void prison_free_locked(struct prison *pr);
+#ifndef __rtems__
void prison_hold(struct prison *pr);
+#else /* __rtems__ */
+static inline void
+prison_hold(struct prison *pr)
+{
+
+ (void)pr;
+}
+#endif /* __rtems__ */
void prison_hold_locked(struct prison *pr);
void prison_proc_hold(struct prison *);
void prison_proc_free(struct prison *);
@@ -391,12 +460,67 @@ int prison_equal_ip4(struct prison *, struct prison *);
#else /* __rtems__ */
#define prison_equal_ip4(p1, p2) 1
#endif /* __rtems__ */
+#ifndef __rtems__
int prison_get_ip4(struct ucred *cred, struct in_addr *ia);
+#else /* __rtems__ */
+static inline int
+prison_get_ip4(struct ucred *cred, struct in_addr *ia)
+{
+
+ (void)cred;
+ (void)ia;
+ return (EAFNOSUPPORT);
+}
+#endif /* __rtems__ */
+#ifndef __rtems__
int prison_local_ip4(struct ucred *cred, struct in_addr *ia);
+#else /* __rtems__ */
+static inline int
+prison_local_ip4(struct ucred *cred, struct in_addr *ia)
+{
+
+ (void)cred;
+ (void)ia;
+ return (0);
+}
+#endif /* __rtems__ */
+#ifndef __rtems__
int prison_remote_ip4(struct ucred *cred, struct in_addr *ia);
+#else /* __rtems__ */
+static inline int
+prison_remote_ip4(struct ucred *cred, struct in_addr *ia)
+{
+
+ (void)cred;
+ (void)ia;
+ return (0);
+}
+#endif /* __rtems__ */
+#ifndef __rtems__
int prison_check_ip4(const struct ucred *, const struct in_addr *);
+#else /* __rtems__ */
+static inline int
+prison_check_ip4(const struct ucred *cred, const struct in_addr *ia)
+{
+
+ (void)cred;
+ (void)ia;
+ return (0);
+}
+#endif /* __rtems__ */
int prison_check_ip4_locked(const struct prison *, const struct in_addr *);
+#ifndef __rtems__
int prison_saddrsel_ip4(struct ucred *, struct in_addr *);
+#else /* __rtems__ */
+static inline int
+prison_saddrsel_ip4(struct ucred *cred, struct in_addr *ia)
+{
+
+ (void)cred;
+ (void)ia;
+ return (1);
+}
+#endif /* __rtems__ */
int prison_restrict_ip4(struct prison *, struct in_addr *);
int prison_qcmp_v4(const void *, const void *);
#ifdef INET6
@@ -405,17 +529,95 @@ int prison_equal_ip6(struct prison *, struct prison *);
#else /* __rtems__ */
#define prison_equal_ip6(p1, p2) 1
#endif /* __rtems__ */
+#ifndef __rtems__
int prison_get_ip6(struct ucred *, struct in6_addr *);
+#else /* __rtems__ */
+static inline int
+prison_get_ip6(struct ucred *cred, struct in6_addr *ia6)
+{
+
+ (void)cred;
+ (void)ia6;
+ return (EAFNOSUPPORT);
+}
+#endif /* __rtems__ */
+#ifndef __rtems__
int prison_local_ip6(struct ucred *, struct in6_addr *, int);
+#else /* __rtems__ */
+static inline int
+prison_local_ip6(struct ucred *cred, struct in6_addr *ia6, int v6only)
+{
+
+ (void)cred;
+ (void)ia6;
+ (void)v6only;
+ return (0);
+}
+#endif /* __rtems__ */
+#ifndef __rtems__
int prison_remote_ip6(struct ucred *, struct in6_addr *);
+#else /* __rtems__ */
+static inline int
+prison_remote_ip6(struct ucred *cred, struct in6_addr *ia6)
+{
+
+ (void)cred;
+ (void)ia6;
+ return (0);
+}
+#endif /* __rtems__ */
+#ifndef __rtems__
int prison_check_ip6(const struct ucred *, const struct in6_addr *);
+#else /* __rtems__ */
+static inline int
+prison_check_ip6(const struct ucred *cred, const struct in6_addr *ia6)
+{
+
+ (void)cred;
+ (void)ia6;
+ return (0);
+}
+#endif /* __rtems__ */
int prison_check_ip6_locked(const struct prison *, const struct in6_addr *);
+#ifndef __rtems__
int prison_saddrsel_ip6(struct ucred *, struct in6_addr *);
+#else /* __rtems__ */
+static inline int
+prison_saddrsel_ip6(struct ucred *cred, struct in6_addr *ia6)
+{
+
+ (void)cred;
+ (void)ia6;
+ return (EAFNOSUPPORT);
+}
+#endif /* __rtems__ */
int prison_restrict_ip6(struct prison *, struct in6_addr *);
int prison_qcmp_v6(const void *, const void *);
#endif
+#ifndef __rtems__
int prison_check_af(struct ucred *cred, int af);
+#else /* __rtems__ */
+static inline int
+prison_check_af(struct ucred *cred, int af)
+{
+
+ (void)cred;
+ (void)af;
+ return (0);
+}
+#endif /* __rtems__ */
+#ifndef __rtems__
int prison_if(struct ucred *cred, struct sockaddr *sa);
+#else /* __rtems__ */
+static inline int
+prison_if(struct ucred *cred, struct sockaddr *sa)
+{
+
+ (void)cred;
+ (void)sa;
+ return (0);
+}
+#endif /* __rtems__ */
char *prison_name(struct prison *, struct prison *);
int prison_priv_check(struct ucred *cred, int priv);
int sysctl_jail_param(SYSCTL_HANDLER_ARGS);
diff --git a/rtemsbsd/rtems/rtems-kernel-jail.c b/rtemsbsd/rtems/rtems-kernel-jail.c
index d6ce1dd..59068ed 100644
--- a/rtemsbsd/rtems/rtems-kernel-jail.c
+++ b/rtemsbsd/rtems/rtems-kernel-jail.c
@@ -106,233 +106,3 @@ struct prison prison0 = {
.pr_allow = PR_ALLOW_ALL_STATIC
};
MTX_SYSINIT(prison0, &prison0.pr_mtx, "jail mutex", MTX_DEF);
-
-/*
- * See if a prison has the specific flag set.
- */
-int
-prison_flag(struct ucred *cred, unsigned flag)
-{
- /* This is an atomic read, so no locking is necessary. */
- return (prison0.pr_flags & flag);
-}
-
-void
-prison_free(struct prison *pr)
-{
-}
-
-void
-prison_hold(struct prison *pr)
-{
-}
-
-/*
- * Check if given address belongs to the jail referenced by cred (wrapper to
- * prison_check_ip[46]).
- *
- * Returns 0 if jail doesn't restrict the address family or if address belongs
- * to jail, EADDRNOTAVAIL if the address doesn't belong, or EAFNOSUPPORT if
- * the jail doesn't allow the address family. IPv4 Address passed in in NBO.
- */
-int
-prison_if(struct ucred *cred, struct sockaddr *sa)
-{
- return 0;
-}
-
-/*
- * Return 1 if we should do proper source address selection or are not jailed.
- * We will return 0 if we should bypass source address selection in favour
- * of the primary jail IPv6 address. Only in this case *ia will be updated and
- * returned in NBO.
- * Return EAFNOSUPPORT, in case this jail does not allow IPv6.
- */
-int
-prison_saddrsel_ip6(struct ucred *cred, struct in6_addr *ia6)
-{
- return EAFNOSUPPORT;
-}
-
-/*
- * Check if given address belongs to the jail referenced by cred/prison.
- *
- * Returns 0 if jail doesn't restrict IPv4 or if address belongs to jail,
- * EADDRNOTAVAIL if the address doesn't belong, or EAFNOSUPPORT if the jail
- * doesn't allow IPv4. Address passed in in NBO.
- */
-int
-prison_check_ip4(const struct ucred *cred, const struct in_addr *ia)
-{
- return 0;
-}
-
-/*
- * Assuming 0 means no restrictions.
- *
- * NOTE: RTEMS does not restrict via a jail so return 0.
- */
-int
-prison_check_ip6(const struct ucred *cred, const struct in6_addr *ia6)
-{
- return 0;
-}
-
-/*
- * Make sure our (source) address is set to something meaningful to this
- * jail.
- *
- * Returns 0 if jail doesn't restrict IPv4 or if address belongs to jail,
- * EADDRNOTAVAIL if the address doesn't belong, or EAFNOSUPPORT if the jail
- * doesn't allow IPv4. Address passed in in NBO and returned in NBO.
- */
-int
-prison_local_ip4(struct ucred *cred, struct in_addr *ia)
-{
- return 0;
-}
-
-/*
- * Rewrite destination address in case we will connect to loopback address.
- *
- * Returns 0 on success, EAFNOSUPPORT if the jail doesn't allow IPv4.
- * Address passed in in NBO and returned in NBO.
- */
-int
-prison_remote_ip4(struct ucred *cred, struct in_addr *ia)
-{
- return 0;
-}
-
-/*
- * Make sure our (source) address is set to something meaningful to this jail.
- *
- * v6only should be set based on (inp->inp_flags & IN6P_IPV6_V6ONLY != 0)
- * when needed while binding.
- *
- * Returns 0 if jail doesn't restrict IPv6 or if address belongs to jail,
- * EADDRNOTAVAIL if the address doesn't belong, or EAFNOSUPPORT if the jail
- * doesn't allow IPv6.
- *
- * NOTE: RTEMS does not restrict via a jail so return 0.
- */
-int
-prison_local_ip6(struct ucred *cred, struct in6_addr *ia6, int v6only)
-{
- return 0;
-}
-
-/*
- * Rewrite destination address in case we will connect to loopback address.
- *
- * Returns 0 on success, EAFNOSUPPORT if the jail doesn't allow IPv6.
- *
- * NOTE: RTEMS does not restrict via a jail so return 0.
- */
-int
-prison_remote_ip6(struct ucred *cred, struct in6_addr *ia6)
-{
- return 0;
-}
-
-/*
- * Return 1 if we should do proper source address selection or are not jailed.
- * We will return 0 if we should bypass source address selection in favour
- * of the primary jail IPv4 address. Only in this case *ia will be updated and
- * returned in NBO.
- * Return EAFNOSUPPORT, in case this jail does not allow IPv4.
- */
-int
-prison_saddrsel_ip4(struct ucred *cred, struct in_addr *ia)
-{
- return 1;
-}
-
-/*
- * Pass back primary IPv4 address of this jail.
- *
- * If not restricted return success but do not alter the address. Caller has
- * to make sure to initialize it correctly (e.g. INADDR_ANY).
- *
- * Returns 0 on success, EAFNOSUPPORT if the jail doesn't allow IPv4.
- * Address returned in NBO.
- */
-int
-prison_get_ip4(struct ucred *cred, struct in_addr *ia)
-{
- return 0;
-}
-
-/*
- * Return 1 if the passed credential is in a jail and that jail does not
- * have its own virtual network stack, otherwise 0.
- */
-int
-jailed_without_vnet(struct ucred *cred)
-{
- return 0;
-}
-
-/*
- * Pass back primary IPv6 address for this jail.
- *
- * If not restricted return success but do not alter the address. Caller has
- * to make sure to initialize it correctly (e.g. IN6ADDR_ANY_INIT).
- *
- * Returns 0 on success, EAFNOSUPPORT if the jail doesn't allow IPv6.
- */
-int
-prison_get_ip6(struct ucred *cred, struct in6_addr *ia6)
-{
- return 0;
-}
-/*
- * Return 0 if jails permit p1 to frob p2, otherwise ESRCH.
- */
-int
-prison_check(struct ucred *cred1, struct ucred *cred2)
-{
- return 0;
-}
-
-/*
- * Check if a jail supports the given address family.
- *
- * Returns 0 if not jailed or the address family is supported, EAFNOSUPPORT
- * if not.
- */
-int
-prison_check_af(struct ucred *cred, int af)
-{
- return 0;
-}
-
-/*
- * Return the correct hostname (domainname, et al) for the passed credential.
- */
-void
-getcredhostname(struct ucred *cred, char *buf, size_t size)
-{
- gethostname(buf, size);
-}
-
-void
-getcreddomainname(struct ucred *cred, char *buf, size_t size)
-{
- getdomainname(buf, size);
-}
-
-void
-getcredhostid(struct ucred *cred, unsigned long *hostid)
-{
- *hostid = 0;
-}
-
-/*
- * Return 1 if the passed credential is in a jail, otherwise 0.
- */
-int
-jailed(struct ucred *cred)
-{
- return 0;
-}
More information about the vc
mailing list