On Tue, Jun 20, 2006 at 06:23:50PM +0000, Venkat Yekkirala wrote:
>
> --- linux-2.6.16.vanilla/include/net/sock.h   2006-06-19 
> 17:02:23.000000000 -0500
> +++ linux-2.6.16/include/net/sock.h   2006-06-19 19:48:24.000000000 -0500
> @@ -964,6 +964,15 @@ static inline void sock_graft(struct soc
>       write_unlock_bh(&sk->sk_callback_lock);
> }
> 
> +static inline void sock_copy(struct sock *nsk, const struct sock *osk)
> +{
> +     void *sptr = nsk->sk_security;
> +
> +     memcpy(nsk, osk, osk->sk_prot->obj_size);
> +     nsk->sk_security = sptr;

I don't get it.  Why do you put sk_security away and then set it back.
Doesn't memcpy already do this for you?
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <[EMAIL PROTECTED]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to