[IPSEC]: Make callers of xfrm_lookup to use XFRM_LOOKUP_WAIT

2007-12-12 Thread Herbert Xu
On Wed, Dec 12, 2007 at 10:43:42AM -0800, David Miller wrote:

 Begrudgingly, I've applied this, but only to make the merging of your
 work easier.  I think this flag is totally wrong and you need to
 fix this up.

Well I did do a grep to make sure it's safe.  But yeah relying
on ip_route_connect to pass the right value through isn't nice.

[IPSEC]: Make callers of xfrm_lookup to use XFRM_LOOKUP_WAIT

This patch converts all callers of xfrm_lookup that used an
explicit value of 1 to indiciate blocking to use the new flag
XFRM_LOOKUP_WAIT.

Signed-off-by: Herbert Xu [EMAIL PROTECTED]

Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmVHI~} [EMAIL PROTECTED]
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
--
diff --git a/net/dccp/ipv6.c b/net/dccp/ipv6.c
index 87c98fb..a08e2cb 100644
--- a/net/dccp/ipv6.c
+++ b/net/dccp/ipv6.c
@@ -994,7 +994,7 @@ static int dccp_v6_connect(struct sock *sk, struct sockaddr 
*uaddr,
if (final_p)
ipv6_addr_copy(fl.fl6_dst, final_p);
 
-   err = __xfrm_lookup(dst, fl, sk, 1);
+   err = __xfrm_lookup(dst, fl, sk, XFRM_LOOKUP_WAIT);
if (err  0) {
if (err == -EREMOTE)
err = ip6_dst_blackhole(sk, dst, fl);
diff --git a/net/decnet/dn_route.c b/net/decnet/dn_route.c
index eb07df9..62f3ae7 100644
--- a/net/decnet/dn_route.c
+++ b/net/decnet/dn_route.c
@@ -1196,7 +1196,8 @@ int dn_route_output_sock(struct dst_entry **pprt, struct 
flowi *fl, struct sock
 
err = __dn_route_output_key(pprt, fl, flags  MSG_TRYHARD);
if (err == 0  fl-proto) {
-   err = xfrm_lookup(pprt, fl, sk, !(flags  MSG_DONTWAIT));
+   err = xfrm_lookup(pprt, fl, sk, (flags  MSG_DONTWAIT) ?
+   XFRM_LOOKUP_WAIT : 0);
}
return err;
 }
diff --git a/net/ipv4/route.c b/net/ipv4/route.c
index 245f5cf..f00edae 100644
--- a/net/ipv4/route.c
+++ b/net/ipv4/route.c
@@ -2536,7 +2536,8 @@ int ip_route_output_flow(struct rtable **rp, struct flowi 
*flp, struct sock *sk,
flp-fl4_src = (*rp)-rt_src;
if (!flp-fl4_dst)
flp-fl4_dst = (*rp)-rt_dst;
-   err = __xfrm_lookup((struct dst_entry **)rp, flp, sk, flags);
+   err = __xfrm_lookup((struct dst_entry **)rp, flp, sk,
+   flags ? XFRM_LOOKUP_WAIT : 0);
if (err == -EREMOTE)
err = ipv4_dst_blackhole(rp, flp, sk);
 
diff --git a/net/ipv6/datagram.c b/net/ipv6/datagram.c
index 2ed689a..707ba45 100644
--- a/net/ipv6/datagram.c
+++ b/net/ipv6/datagram.c
@@ -177,7 +177,7 @@ ipv4_connected:
if (final_p)
ipv6_addr_copy(fl.fl6_dst, final_p);
 
-   if ((err = __xfrm_lookup(dst, fl, sk, 1))  0) {
+   if ((err = __xfrm_lookup(dst, fl, sk, XFRM_LOOKUP_WAIT))  0) {
if (err == -EREMOTE)
err = ip6_dst_blackhole(sk, dst, fl);
if (err  0)
diff --git a/net/ipv6/raw.c b/net/ipv6/raw.c
index 850b83e..2663fd1 100644
--- a/net/ipv6/raw.c
+++ b/net/ipv6/raw.c
@@ -871,7 +871,7 @@ static int rawv6_sendmsg(struct kiocb *iocb, struct sock 
*sk,
if (final_p)
ipv6_addr_copy(fl.fl6_dst, final_p);
 
-   if ((err = __xfrm_lookup(dst, fl, sk, 1))  0) {
+   if ((err = __xfrm_lookup(dst, fl, sk, XFRM_LOOKUP_WAIT))  0) {
if (err == -EREMOTE)
err = ip6_dst_blackhole(sk, dst, fl);
if (err  0)
diff --git a/net/ipv6/tcp_ipv6.c b/net/ipv6/tcp_ipv6.c
index 0604d9d..d576833 100644
--- a/net/ipv6/tcp_ipv6.c
+++ b/net/ipv6/tcp_ipv6.c
@@ -265,7 +265,7 @@ static int tcp_v6_connect(struct sock *sk, struct sockaddr 
*uaddr,
if (final_p)
ipv6_addr_copy(fl.fl6_dst, final_p);
 
-   if ((err = __xfrm_lookup(dst, fl, sk, 1))  0) {
+   if ((err = __xfrm_lookup(dst, fl, sk, XFRM_LOOKUP_WAIT))  0) {
if (err == -EREMOTE)
err = ip6_dst_blackhole(sk, dst, fl);
if (err  0)
diff --git a/net/ipv6/udp.c b/net/ipv6/udp.c
index 1e3bd39..8cbdcc9 100644
--- a/net/ipv6/udp.c
+++ b/net/ipv6/udp.c
@@ -757,7 +757,7 @@ do_udp_sendmsg:
if (final_p)
ipv6_addr_copy(fl.fl6_dst, final_p);
 
-   if ((err = __xfrm_lookup(dst, fl, sk, 1))  0) {
+   if ((err = __xfrm_lookup(dst, fl, sk, XFRM_LOOKUP_WAIT))  0) {
if (err == -EREMOTE)
err = ip6_dst_blackhole(sk, dst, fl);
if (err  0)
--
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [IPSEC]: Make callers of xfrm_lookup to use XFRM_LOOKUP_WAIT

2007-12-12 Thread David Miller
From: Herbert Xu [EMAIL PROTECTED]
Date: Thu, 13 Dec 2007 09:46:23 +0800

 [IPSEC]: Make callers of xfrm_lookup to use XFRM_LOOKUP_WAIT
 
 This patch converts all callers of xfrm_lookup that used an
 explicit value of 1 to indiciate blocking to use the new flag
 XFRM_LOOKUP_WAIT.
 
 Signed-off-by: Herbert Xu [EMAIL PROTECTED]

Applied, thanks Herbert.
--
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html