xfrm: prefer secpath_set over secpath_dup
secpath_set is a wrapper for secpath_dup that will not perform an allocation if the secpath attached to the skb has a reference count of one, i.e., it doesn't need to be COW'ed. Also, secpath_dup doesn't attach the secpath to the skb, it leaves this to the caller. Use secpath_set in places that immediately assign the return value to skb. This allows to remove skb->sp without touching these spots again. secpath_dup can eventually be removed in followup patch. Signed-off-by: Florian Westphal <fw@strlen.de> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:

committed by
David S. Miller

parent
a053c86649
commit
a84e3f5333
@@ -548,6 +548,7 @@ void ixgbevf_ipsec_rx(struct ixgbevf_ring *rx_ring,
|
||||
struct xfrm_state *xs = NULL;
|
||||
struct ipv6hdr *ip6 = NULL;
|
||||
struct iphdr *ip4 = NULL;
|
||||
struct sec_path *sp;
|
||||
void *daddr;
|
||||
__be32 spi;
|
||||
u8 *c_hdr;
|
||||
@@ -587,12 +588,12 @@ void ixgbevf_ipsec_rx(struct ixgbevf_ring *rx_ring,
|
||||
if (unlikely(!xs))
|
||||
return;
|
||||
|
||||
skb->sp = secpath_dup(skb->sp);
|
||||
if (unlikely(!skb->sp))
|
||||
sp = secpath_set(skb);
|
||||
if (unlikely(!sp))
|
||||
return;
|
||||
|
||||
skb->sp->xvec[skb->sp->len++] = xs;
|
||||
skb->sp->olen++;
|
||||
sp->xvec[sp->len++] = xs;
|
||||
sp->olen++;
|
||||
xo = xfrm_offload(skb);
|
||||
xo->flags = CRYPTO_DONE;
|
||||
xo->status = CRYPTO_SUCCESS;
|
||||
|
Reference in New Issue
Block a user