On Tue, Jun 20, 2006 at 06:23:50PM +0000, Venkat Yekkirala wrote:
>
> --- linux-2.6.16.vanilla/include/net/sock.h 2006-06-19
> 17:02:23.000000000 -0500
> +++ linux-2.6.16/include/net/sock.h 2006-06-19 19:48:24.000000000 -0500
> @@ -964,6 +964,15 @@ static inline void sock_graft(struct soc
> write_unlock_bh(&sk->sk_callback_lock);
> }
>
> +static inline void sock_copy(struct sock *nsk, const struct sock *osk)
> +{
> + void *sptr = nsk->sk_security;
> +
> + memcpy(nsk, osk, osk->sk_prot->obj_size);
> + nsk->sk_security = sptr;
I don't get it. Why do you put sk_security away and then set it back.
Doesn't memcpy already do this for you?
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <[EMAIL PROTECTED]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html