remarkable-linux/net/xfrm
Herbert Xu 050f009e16 [IPSEC]: Lock state when copying non-atomic fields to user-space
This patch adds locking so that when we're copying non-atomic fields such as
life-time or coaddr to user-space we don't get a partial result.

For af_key I've changed every instance of pfkey_xfrm_state2msg apart from
expiration notification to include the keys and life-times.  This is in-line
with XFRM behaviour.

The actual cases affected are:

* pfkey_getspi: No change as we don't have any keys to copy.
* key_notify_sa:
	+ ADD/UPD: This wouldn't work otherwise.
	+ DEL: It can't hurt.

Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-10-10 16:55:02 -07:00
..
Kconfig [PFKEYV2]: CONFIG_NET_KEY_MIGRATE option 2007-02-08 13:15:05 -08:00
Makefile [IPSEC]: Move common output code to xfrm_output 2007-10-10 16:54:53 -07:00
xfrm_algo.c [IPSEC]: Fix warnings with casting int to pointer 2007-05-22 16:12:26 -07:00
xfrm_hash.c [IPSEC]: Don't warn if high-order hash resize fails 2007-05-14 02:19:11 -07:00
xfrm_hash.h
xfrm_input.c mm: Remove slab destructors from kmem_cache_create(). 2007-07-20 10:11:58 +09:00
xfrm_output.c [IPSEC]: Store IPv6 nh pointer in mac_header on output 2007-10-10 16:55:00 -07:00
xfrm_policy.c [IPSEC]: Remove bogus ref count in xfrm_secpath_reject 2007-10-10 16:54:59 -07:00
xfrm_state.c [IPSEC]: Move common code into xfrm_alloc_spi 2007-10-10 16:55:01 -07:00
xfrm_user.c [IPSEC]: Lock state when copying non-atomic fields to user-space 2007-10-10 16:55:02 -07:00