On Tue, Jun 20, 2006 at 06:23:50PM +0000, Venkat Yekkirala wrote: > > --- linux-2.6.16.vanilla/include/net/sock.h 2006-06-19 > 17:02:23.000000000 -0500 > +++ linux-2.6.16/include/net/sock.h 2006-06-19 19:48:24.000000000 -0500 > @@ -964,6 +964,15 @@ static inline void sock_graft(struct soc > write_unlock_bh(&sk->sk_callback_lock); > } > > +static inline void sock_copy(struct sock *nsk, const struct sock *osk) > +{ > + void *sptr = nsk->sk_security; > + > + memcpy(nsk, osk, osk->sk_prot->obj_size); > + nsk->sk_security = sptr;
I don't get it. Why do you put sk_security away and then set it back. Doesn't memcpy already do this for you? -- Visit Openswan at http://www.openswan.org/ Email: Herbert Xu ~{PmV>HI~} <[EMAIL PROTECTED]> Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html