linux/net/xfrm
Herbert Xu 68325d3b12 [XFRM] user: Move attribute copying code into copy_to_user_state_extra
Here's a good example of code duplication leading to code rot.  The
notification patch did its own netlink message creation for xfrm states.
It duplicated code that was already in dump_one_state.  Guess what, the
next time (and the time after) when someone updated dump_one_state the
notification path got zilch.

This patch moves that code from dump_one_state to copy_to_user_state_extra
and uses it in xfrm_notify_sa too.  Unfortunately whoever updates this
still needs to update xfrm_sa_len since the notification path wants to
know the exact size for allocation.

At least I've added a comment saying so and if someone still forgest, we'll
have a WARN_ON telling us so.

I also changed the security size calculation to use xfrm_user_sec_ctx since
that's what we actually put into the skb.  However it makes no practical
difference since it has the same size as xfrm_sec_ctx.

Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-10-10 16:55:02 -07:00
..
Kconfig [PFKEYV2]: CONFIG_NET_KEY_MIGRATE option 2007-02-08 13:15:05 -08:00
Makefile [IPSEC]: Move common output code to xfrm_output 2007-10-10 16:54:53 -07:00
xfrm_algo.c [IPSEC]: Fix warnings with casting int to pointer 2007-05-22 16:12:26 -07:00
xfrm_hash.c [IPSEC]: Don't warn if high-order hash resize fails 2007-05-14 02:19:11 -07:00
xfrm_hash.h [XFRM] STATE: Use destination address for src hash. 2006-10-04 00:31:02 -07:00
xfrm_input.c mm: Remove slab destructors from kmem_cache_create(). 2007-07-20 10:11:58 +09:00
xfrm_output.c [IPSEC]: Store IPv6 nh pointer in mac_header on output 2007-10-10 16:55:00 -07:00
xfrm_policy.c [IPSEC]: Remove bogus ref count in xfrm_secpath_reject 2007-10-10 16:54:59 -07:00
xfrm_state.c [IPSEC]: Move common code into xfrm_alloc_spi 2007-10-10 16:55:01 -07:00
xfrm_user.c [XFRM] user: Move attribute copying code into copy_to_user_state_extra 2007-10-10 16:55:02 -07:00