Module Name: src Committed By: ozaki-r Date: Wed Jul 12 07:00:40 UTC 2017
Modified Files: src/sys/netipsec: ipsec.c ipsec_input.c ipsec_output.c key.c xform_ipip.c Log Message: Omit unnecessary NULL checks for sav->sah To generate a diff of this commit: cvs rdiff -u -r1.101 -r1.102 src/sys/netipsec/ipsec.c cvs rdiff -u -r1.47 -r1.48 src/sys/netipsec/ipsec_input.c cvs rdiff -u -r1.50 -r1.51 src/sys/netipsec/ipsec_output.c \ src/sys/netipsec/xform_ipip.c cvs rdiff -u -r1.178 -r1.179 src/sys/netipsec/key.c Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/sys/netipsec/ipsec.c diff -u src/sys/netipsec/ipsec.c:1.101 src/sys/netipsec/ipsec.c:1.102 --- src/sys/netipsec/ipsec.c:1.101 Fri Jul 7 01:37:34 2017 +++ src/sys/netipsec/ipsec.c Wed Jul 12 07:00:40 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: ipsec.c,v 1.101 2017/07/07 01:37:34 ozaki-r Exp $ */ +/* $NetBSD: ipsec.c,v 1.102 2017/07/12 07:00:40 ozaki-r Exp $ */ /* $FreeBSD: /usr/local/www/cvsroot/FreeBSD/src/sys/netipsec/ipsec.c,v 1.2.2.2 2003/07/01 01:38:13 sam Exp $ */ /* $KAME: ipsec.c,v 1.103 2001/05/24 07:14:18 sakane Exp $ */ @@ -32,7 +32,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: ipsec.c,v 1.101 2017/07/07 01:37:34 ozaki-r Exp $"); +__KERNEL_RCSID(0, "$NetBSD: ipsec.c,v 1.102 2017/07/12 07:00:40 ozaki-r Exp $"); /* * IPsec controller part. @@ -832,7 +832,7 @@ ipsec4_forward(struct mbuf *m, int *dest /* * Find the correct route for outer IPv4 header, compute tunnel MTU. */ - if (sp->req && sp->req->sav && sp->req->sav->sah) { + if (sp->req && sp->req->sav) { struct route *ro; struct rtentry *rt; Index: src/sys/netipsec/ipsec_input.c diff -u src/sys/netipsec/ipsec_input.c:1.47 src/sys/netipsec/ipsec_input.c:1.48 --- src/sys/netipsec/ipsec_input.c:1.47 Fri Jul 7 01:37:34 2017 +++ src/sys/netipsec/ipsec_input.c Wed Jul 12 07:00:40 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: ipsec_input.c,v 1.47 2017/07/07 01:37:34 ozaki-r Exp $ */ +/* $NetBSD: ipsec_input.c,v 1.48 2017/07/12 07:00:40 ozaki-r Exp $ */ /* $FreeBSD: /usr/local/www/cvsroot/FreeBSD/src/sys/netipsec/ipsec_input.c,v 1.2.4.2 2003/03/28 20:32:53 sam Exp $ */ /* $OpenBSD: ipsec_input.c,v 1.63 2003/02/20 18:35:43 deraadt Exp $ */ @@ -39,7 +39,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: ipsec_input.c,v 1.47 2017/07/07 01:37:34 ozaki-r Exp $"); +__KERNEL_RCSID(0, "$NetBSD: ipsec_input.c,v 1.48 2017/07/12 07:00:40 ozaki-r Exp $"); /* * IPsec input processing. @@ -332,7 +332,6 @@ ipsec4_common_input_cb(struct mbuf *m, s KASSERT(m != NULL); KASSERT(sav != NULL); - KASSERT(sav->sah != NULL); saidx = &sav->sah->saidx; af = saidx->dst.sa.sa_family; KASSERTMSG(af == AF_INET, "unexpected af %u", af); @@ -574,7 +573,6 @@ ipsec6_common_input_cb(struct mbuf *m, s KASSERT(m != NULL); KASSERT(sav != NULL); - KASSERT(sav->sah != NULL); saidx = &sav->sah->saidx; af = saidx->dst.sa.sa_family; KASSERTMSG(af == AF_INET6, "unexpected af %u", af); Index: src/sys/netipsec/ipsec_output.c diff -u src/sys/netipsec/ipsec_output.c:1.50 src/sys/netipsec/ipsec_output.c:1.51 --- src/sys/netipsec/ipsec_output.c:1.50 Thu Jul 6 09:49:46 2017 +++ src/sys/netipsec/ipsec_output.c Wed Jul 12 07:00:40 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: ipsec_output.c,v 1.50 2017/07/06 09:49:46 ozaki-r Exp $ */ +/* $NetBSD: ipsec_output.c,v 1.51 2017/07/12 07:00:40 ozaki-r Exp $ */ /*- * Copyright (c) 2002, 2003 Sam Leffler, Errno Consulting @@ -29,7 +29,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: ipsec_output.c,v 1.50 2017/07/06 09:49:46 ozaki-r Exp $"); +__KERNEL_RCSID(0, "$NetBSD: ipsec_output.c,v 1.51 2017/07/12 07:00:40 ozaki-r Exp $"); /* * IPsec output processing. @@ -164,7 +164,6 @@ ipsec_process_done(struct mbuf *m, struc KASSERT(isr != NULL); sav = isr->sav; KASSERT(sav != NULL); - KASSERT(sav->sah != NULL); saidx = &sav->sah->saidx; Index: src/sys/netipsec/xform_ipip.c diff -u src/sys/netipsec/xform_ipip.c:1.50 src/sys/netipsec/xform_ipip.c:1.51 --- src/sys/netipsec/xform_ipip.c:1.50 Thu Jun 29 07:13:41 2017 +++ src/sys/netipsec/xform_ipip.c Wed Jul 12 07:00:40 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: xform_ipip.c,v 1.50 2017/06/29 07:13:41 ozaki-r Exp $ */ +/* $NetBSD: xform_ipip.c,v 1.51 2017/07/12 07:00:40 ozaki-r Exp $ */ /* $FreeBSD: src/sys/netipsec/xform_ipip.c,v 1.3.2.1 2003/01/24 05:11:36 sam Exp $ */ /* $OpenBSD: ip_ipip.c,v 1.25 2002/06/10 18:04:55 itojun Exp $ */ @@ -39,7 +39,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: xform_ipip.c,v 1.50 2017/06/29 07:13:41 ozaki-r Exp $"); +__KERNEL_RCSID(0, "$NetBSD: xform_ipip.c,v 1.51 2017/07/12 07:00:40 ozaki-r Exp $"); /* * IP-inside-IP processing @@ -419,7 +419,6 @@ ipip_output( KASSERT(isr->sav != NULL); sav = isr->sav; - KASSERT(sav->sah != NULL); /* XXX Deal with empty TDB source/destination addresses. */ Index: src/sys/netipsec/key.c diff -u src/sys/netipsec/key.c:1.178 src/sys/netipsec/key.c:1.179 --- src/sys/netipsec/key.c:1.178 Wed Jul 12 03:59:32 2017 +++ src/sys/netipsec/key.c Wed Jul 12 07:00:40 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: key.c,v 1.178 2017/07/12 03:59:32 ozaki-r Exp $ */ +/* $NetBSD: key.c,v 1.179 2017/07/12 07:00:40 ozaki-r Exp $ */ /* $FreeBSD: src/sys/netipsec/key.c,v 1.3.2.3 2004/02/14 22:23:23 bms Exp $ */ /* $KAME: key.c,v 1.191 2001/06/27 10:46:49 sakane Exp $ */ @@ -32,7 +32,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: key.c,v 1.178 2017/07/12 03:59:32 ozaki-r Exp $"); +__KERNEL_RCSID(0, "$NetBSD: key.c,v 1.179 2017/07/12 07:00:40 ozaki-r Exp $"); /* * This code is referd to RFC 2367 @@ -866,8 +866,6 @@ key_checkrequest(struct ipsecrequest *is * SADB_SASTATE_DEAD. The SA for outbound must be the oldest. */ if (isr->sav != NULL) { - if (isr->sav->sah == NULL) - panic("key_checkrequest: sah is null"); if (isr->sav == (struct secasvar *)LIST_FIRST( &isr->sav->sah->savtree[SADB_SASTATE_DEAD])) { KEY_FREESAV(&isr->sav); @@ -6768,7 +6766,6 @@ key_expire(struct secasvar *sav) s = splsoftnet(); /*called from softclock()*/ KASSERT(sav != NULL); - KASSERT(sav->sah != NULL); satype = key_proto2satype(sav->sah->saidx.proto); KASSERTMSG(satype != 0, "invalid proto is passed"); @@ -7694,8 +7691,6 @@ key_checktunnelsanity( ) { - KASSERT(sav->sah != NULL); - /* XXX: check inner IP header */ return 1;