diff options
author | Thomas Graf <tgraf@suug.ch> | 2007-08-22 17:00:40 -0400 |
---|---|---|
committer | David S. Miller <davem@sunset.davemloft.net> | 2007-10-10 19:48:24 -0400 |
commit | 35a7aa08bf7863dbfdb0eb69122d8aeaedd52748 (patch) | |
tree | 50f9bbc59d77a5d55ecff851d27ae1af80f10491 | |
parent | fab448991df4ecca6c244e23982c70f7e715b864 (diff) |
[XFRM] netlink: Rename attribute array from xfrma[] to attrs[]
Increases readability a lot.
Signed-off-by: Thomas Graf <tgraf@suug.ch>
Signed-off-by: David S. Miller <davem@davemloft.net>
-rw-r--r-- | net/xfrm/xfrm_user.c | 188 |
1 files changed, 94 insertions, 94 deletions
diff --git a/net/xfrm/xfrm_user.c b/net/xfrm/xfrm_user.c index 8c323b187e6a..7319c7f8060d 100644 --- a/net/xfrm/xfrm_user.c +++ b/net/xfrm/xfrm_user.c | |||
@@ -38,9 +38,9 @@ static inline int alg_len(struct xfrm_algo *alg) | |||
38 | return sizeof(*alg) + ((alg->alg_key_len + 7) / 8); | 38 | return sizeof(*alg) + ((alg->alg_key_len + 7) / 8); |
39 | } | 39 | } |
40 | 40 | ||
41 | static int verify_one_alg(struct rtattr **xfrma, enum xfrm_attr_type_t type) | 41 | static int verify_one_alg(struct rtattr **attrs, enum xfrm_attr_type_t type) |
42 | { | 42 | { |
43 | struct rtattr *rt = xfrma[type]; | 43 | struct rtattr *rt = attrs[type]; |
44 | struct xfrm_algo *algp; | 44 | struct xfrm_algo *algp; |
45 | 45 | ||
46 | if (!rt) | 46 | if (!rt) |
@@ -75,18 +75,18 @@ static int verify_one_alg(struct rtattr **xfrma, enum xfrm_attr_type_t type) | |||
75 | return 0; | 75 | return 0; |
76 | } | 76 | } |
77 | 77 | ||
78 | static void verify_one_addr(struct rtattr **xfrma, enum xfrm_attr_type_t type, | 78 | static void verify_one_addr(struct rtattr **attrs, enum xfrm_attr_type_t type, |
79 | xfrm_address_t **addrp) | 79 | xfrm_address_t **addrp) |
80 | { | 80 | { |
81 | struct rtattr *rt = xfrma[type]; | 81 | struct rtattr *rt = attrs[type]; |
82 | 82 | ||
83 | if (rt && addrp) | 83 | if (rt && addrp) |
84 | *addrp = RTA_DATA(rt); | 84 | *addrp = RTA_DATA(rt); |
85 | } | 85 | } |
86 | 86 | ||
87 | static inline int verify_sec_ctx_len(struct rtattr **xfrma) | 87 | static inline int verify_sec_ctx_len(struct rtattr **attrs) |
88 | { | 88 | { |
89 | struct rtattr *rt = xfrma[XFRMA_SEC_CTX]; | 89 | struct rtattr *rt = attrs[XFRMA_SEC_CTX]; |
90 | struct xfrm_user_sec_ctx *uctx; | 90 | struct xfrm_user_sec_ctx *uctx; |
91 | 91 | ||
92 | if (!rt) | 92 | if (!rt) |
@@ -101,7 +101,7 @@ static inline int verify_sec_ctx_len(struct rtattr **xfrma) | |||
101 | 101 | ||
102 | 102 | ||
103 | static int verify_newsa_info(struct xfrm_usersa_info *p, | 103 | static int verify_newsa_info(struct xfrm_usersa_info *p, |
104 | struct rtattr **xfrma) | 104 | struct rtattr **attrs) |
105 | { | 105 | { |
106 | int err; | 106 | int err; |
107 | 107 | ||
@@ -125,35 +125,35 @@ static int verify_newsa_info(struct xfrm_usersa_info *p, | |||
125 | err = -EINVAL; | 125 | err = -EINVAL; |
126 | switch (p->id.proto) { | 126 | switch (p->id.proto) { |
127 | case IPPROTO_AH: | 127 | case IPPROTO_AH: |
128 | if (!xfrma[XFRMA_ALG_AUTH] || | 128 | if (!attrs[XFRMA_ALG_AUTH] || |
129 | xfrma[XFRMA_ALG_CRYPT] || | 129 | attrs[XFRMA_ALG_CRYPT] || |
130 | xfrma[XFRMA_ALG_COMP]) | 130 | attrs[XFRMA_ALG_COMP]) |
131 | goto out; | 131 | goto out; |
132 | break; | 132 | break; |
133 | 133 | ||
134 | case IPPROTO_ESP: | 134 | case IPPROTO_ESP: |
135 | if ((!xfrma[XFRMA_ALG_AUTH] && | 135 | if ((!attrs[XFRMA_ALG_AUTH] && |
136 | !xfrma[XFRMA_ALG_CRYPT]) || | 136 | !attrs[XFRMA_ALG_CRYPT]) || |
137 | xfrma[XFRMA_ALG_COMP]) | 137 | attrs[XFRMA_ALG_COMP]) |
138 | goto out; | 138 | goto out; |
139 | break; | 139 | break; |
140 | 140 | ||
141 | case IPPROTO_COMP: | 141 | case IPPROTO_COMP: |
142 | if (!xfrma[XFRMA_ALG_COMP] || | 142 | if (!attrs[XFRMA_ALG_COMP] || |
143 | xfrma[XFRMA_ALG_AUTH] || | 143 | attrs[XFRMA_ALG_AUTH] || |
144 | xfrma[XFRMA_ALG_CRYPT]) | 144 | attrs[XFRMA_ALG_CRYPT]) |
145 | goto out; | 145 | goto out; |
146 | break; | 146 | break; |
147 | 147 | ||
148 | #if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE) | 148 | #if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE) |
149 | case IPPROTO_DSTOPTS: | 149 | case IPPROTO_DSTOPTS: |
150 | case IPPROTO_ROUTING: | 150 | case IPPROTO_ROUTING: |
151 | if (xfrma[XFRMA_ALG_COMP] || | 151 | if (attrs[XFRMA_ALG_COMP] || |
152 | xfrma[XFRMA_ALG_AUTH] || | 152 | attrs[XFRMA_ALG_AUTH] || |
153 | xfrma[XFRMA_ALG_CRYPT] || | 153 | attrs[XFRMA_ALG_CRYPT] || |
154 | xfrma[XFRMA_ENCAP] || | 154 | attrs[XFRMA_ENCAP] || |
155 | xfrma[XFRMA_SEC_CTX] || | 155 | attrs[XFRMA_SEC_CTX] || |
156 | !xfrma[XFRMA_COADDR]) | 156 | !attrs[XFRMA_COADDR]) |
157 | goto out; | 157 | goto out; |
158 | break; | 158 | break; |
159 | #endif | 159 | #endif |
@@ -162,13 +162,13 @@ static int verify_newsa_info(struct xfrm_usersa_info *p, | |||
162 | goto out; | 162 | goto out; |
163 | } | 163 | } |
164 | 164 | ||
165 | if ((err = verify_one_alg(xfrma, XFRMA_ALG_AUTH))) | 165 | if ((err = verify_one_alg(attrs, XFRMA_ALG_AUTH))) |
166 | goto out; | 166 | goto out; |
167 | if ((err = verify_one_alg(xfrma, XFRMA_ALG_CRYPT))) | 167 | if ((err = verify_one_alg(attrs, XFRMA_ALG_CRYPT))) |
168 | goto out; | 168 | goto out; |
169 | if ((err = verify_one_alg(xfrma, XFRMA_ALG_COMP))) | 169 | if ((err = verify_one_alg(attrs, XFRMA_ALG_COMP))) |
170 | goto out; | 170 | goto out; |
171 | if ((err = verify_sec_ctx_len(xfrma))) | 171 | if ((err = verify_sec_ctx_len(attrs))) |
172 | goto out; | 172 | goto out; |
173 | 173 | ||
174 | err = -EINVAL; | 174 | err = -EINVAL; |
@@ -298,12 +298,12 @@ static void copy_from_user_state(struct xfrm_state *x, struct xfrm_usersa_info * | |||
298 | * somehow made shareable and move it to xfrm_state.c - JHS | 298 | * somehow made shareable and move it to xfrm_state.c - JHS |
299 | * | 299 | * |
300 | */ | 300 | */ |
301 | static void xfrm_update_ae_params(struct xfrm_state *x, struct rtattr **xfrma) | 301 | static void xfrm_update_ae_params(struct xfrm_state *x, struct rtattr **attrs) |
302 | { | 302 | { |
303 | struct rtattr *rp = xfrma[XFRMA_REPLAY_VAL]; | 303 | struct rtattr *rp = attrs[XFRMA_REPLAY_VAL]; |
304 | struct rtattr *lt = xfrma[XFRMA_LTIME_VAL]; | 304 | struct rtattr *lt = attrs[XFRMA_LTIME_VAL]; |
305 | struct rtattr *et = xfrma[XFRMA_ETIMER_THRESH]; | 305 | struct rtattr *et = attrs[XFRMA_ETIMER_THRESH]; |
306 | struct rtattr *rt = xfrma[XFRMA_REPLAY_THRESH]; | 306 | struct rtattr *rt = attrs[XFRMA_REPLAY_THRESH]; |
307 | 307 | ||
308 | if (rp) { | 308 | if (rp) { |
309 | struct xfrm_replay_state *replay; | 309 | struct xfrm_replay_state *replay; |
@@ -329,7 +329,7 @@ static void xfrm_update_ae_params(struct xfrm_state *x, struct rtattr **xfrma) | |||
329 | } | 329 | } |
330 | 330 | ||
331 | static struct xfrm_state *xfrm_state_construct(struct xfrm_usersa_info *p, | 331 | static struct xfrm_state *xfrm_state_construct(struct xfrm_usersa_info *p, |
332 | struct rtattr **xfrma, | 332 | struct rtattr **attrs, |
333 | int *errp) | 333 | int *errp) |
334 | { | 334 | { |
335 | struct xfrm_state *x = xfrm_state_alloc(); | 335 | struct xfrm_state *x = xfrm_state_alloc(); |
@@ -342,25 +342,25 @@ static struct xfrm_state *xfrm_state_construct(struct xfrm_usersa_info *p, | |||
342 | 342 | ||
343 | if ((err = attach_one_algo(&x->aalg, &x->props.aalgo, | 343 | if ((err = attach_one_algo(&x->aalg, &x->props.aalgo, |
344 | xfrm_aalg_get_byname, | 344 | xfrm_aalg_get_byname, |
345 | xfrma[XFRMA_ALG_AUTH]))) | 345 | attrs[XFRMA_ALG_AUTH]))) |
346 | goto error; | 346 | goto error; |
347 | if ((err = attach_one_algo(&x->ealg, &x->props.ealgo, | 347 | if ((err = attach_one_algo(&x->ealg, &x->props.ealgo, |
348 | xfrm_ealg_get_byname, | 348 | xfrm_ealg_get_byname, |
349 | xfrma[XFRMA_ALG_CRYPT]))) | 349 | attrs[XFRMA_ALG_CRYPT]))) |
350 | goto error; | 350 | goto error; |
351 | if ((err = attach_one_algo(&x->calg, &x->props.calgo, | 351 | if ((err = attach_one_algo(&x->calg, &x->props.calgo, |
352 | xfrm_calg_get_byname, | 352 | xfrm_calg_get_byname, |
353 | xfrma[XFRMA_ALG_COMP]))) | 353 | attrs[XFRMA_ALG_COMP]))) |
354 | goto error; | 354 | goto error; |
355 | if ((err = attach_encap_tmpl(&x->encap, xfrma[XFRMA_ENCAP]))) | 355 | if ((err = attach_encap_tmpl(&x->encap, attrs[XFRMA_ENCAP]))) |
356 | goto error; | 356 | goto error; |
357 | if ((err = attach_one_addr(&x->coaddr, xfrma[XFRMA_COADDR]))) | 357 | if ((err = attach_one_addr(&x->coaddr, attrs[XFRMA_COADDR]))) |
358 | goto error; | 358 | goto error; |
359 | err = xfrm_init_state(x); | 359 | err = xfrm_init_state(x); |
360 | if (err) | 360 | if (err) |
361 | goto error; | 361 | goto error; |
362 | 362 | ||
363 | if ((err = attach_sec_ctx(x, xfrma[XFRMA_SEC_CTX]))) | 363 | if ((err = attach_sec_ctx(x, attrs[XFRMA_SEC_CTX]))) |
364 | goto error; | 364 | goto error; |
365 | 365 | ||
366 | x->km.seq = p->seq; | 366 | x->km.seq = p->seq; |
@@ -373,7 +373,7 @@ static struct xfrm_state *xfrm_state_construct(struct xfrm_usersa_info *p, | |||
373 | 373 | ||
374 | /* override default values from above */ | 374 | /* override default values from above */ |
375 | 375 | ||
376 | xfrm_update_ae_params(x, (struct rtattr **)xfrma); | 376 | xfrm_update_ae_params(x, (struct rtattr **)attrs); |
377 | 377 | ||
378 | return x; | 378 | return x; |
379 | 379 | ||
@@ -386,18 +386,18 @@ error_no_put: | |||
386 | } | 386 | } |
387 | 387 | ||
388 | static int xfrm_add_sa(struct sk_buff *skb, struct nlmsghdr *nlh, | 388 | static int xfrm_add_sa(struct sk_buff *skb, struct nlmsghdr *nlh, |
389 | struct rtattr **xfrma) | 389 | struct rtattr **attrs) |
390 | { | 390 | { |
391 | struct xfrm_usersa_info *p = nlmsg_data(nlh); | 391 | struct xfrm_usersa_info *p = nlmsg_data(nlh); |
392 | struct xfrm_state *x; | 392 | struct xfrm_state *x; |
393 | int err; | 393 | int err; |
394 | struct km_event c; | 394 | struct km_event c; |
395 | 395 | ||
396 | err = verify_newsa_info(p, xfrma); | 396 | err = verify_newsa_info(p, attrs); |
397 | if (err) | 397 | if (err) |
398 | return err; | 398 | return err; |
399 | 399 | ||
400 | x = xfrm_state_construct(p, xfrma, &err); | 400 | x = xfrm_state_construct(p, attrs, &err); |
401 | if (!x) | 401 | if (!x) |
402 | return err; | 402 | return err; |
403 | 403 | ||
@@ -427,7 +427,7 @@ out: | |||
427 | } | 427 | } |
428 | 428 | ||
429 | static struct xfrm_state *xfrm_user_state_lookup(struct xfrm_usersa_id *p, | 429 | static struct xfrm_state *xfrm_user_state_lookup(struct xfrm_usersa_id *p, |
430 | struct rtattr **xfrma, | 430 | struct rtattr **attrs, |
431 | int *errp) | 431 | int *errp) |
432 | { | 432 | { |
433 | struct xfrm_state *x = NULL; | 433 | struct xfrm_state *x = NULL; |
@@ -439,7 +439,7 @@ static struct xfrm_state *xfrm_user_state_lookup(struct xfrm_usersa_id *p, | |||
439 | } else { | 439 | } else { |
440 | xfrm_address_t *saddr = NULL; | 440 | xfrm_address_t *saddr = NULL; |
441 | 441 | ||
442 | verify_one_addr(xfrma, XFRMA_SRCADDR, &saddr); | 442 | verify_one_addr(attrs, XFRMA_SRCADDR, &saddr); |
443 | if (!saddr) { | 443 | if (!saddr) { |
444 | err = -EINVAL; | 444 | err = -EINVAL; |
445 | goto out; | 445 | goto out; |
@@ -457,14 +457,14 @@ static struct xfrm_state *xfrm_user_state_lookup(struct xfrm_usersa_id *p, | |||
457 | } | 457 | } |
458 | 458 | ||
459 | static int xfrm_del_sa(struct sk_buff *skb, struct nlmsghdr *nlh, | 459 | static int xfrm_del_sa(struct sk_buff *skb, struct nlmsghdr *nlh, |
460 | struct rtattr **xfrma) | 460 | struct rtattr **attrs) |
461 | { | 461 | { |
462 | struct xfrm_state *x; | 462 | struct xfrm_state *x; |
463 | int err = -ESRCH; | 463 | int err = -ESRCH; |
464 | struct km_event c; | 464 | struct km_event c; |
465 | struct xfrm_usersa_id *p = nlmsg_data(nlh); | 465 | struct xfrm_usersa_id *p = nlmsg_data(nlh); |
466 | 466 | ||
467 | x = xfrm_user_state_lookup(p, xfrma, &err); | 467 | x = xfrm_user_state_lookup(p, attrs, &err); |
468 | if (x == NULL) | 468 | if (x == NULL) |
469 | return err; | 469 | return err; |
470 | 470 | ||
@@ -669,7 +669,7 @@ nla_put_failure: | |||
669 | } | 669 | } |
670 | 670 | ||
671 | static int xfrm_get_spdinfo(struct sk_buff *skb, struct nlmsghdr *nlh, | 671 | static int xfrm_get_spdinfo(struct sk_buff *skb, struct nlmsghdr *nlh, |
672 | struct rtattr **xfrma) | 672 | struct rtattr **attrs) |
673 | { | 673 | { |
674 | struct sk_buff *r_skb; | 674 | struct sk_buff *r_skb; |
675 | u32 *flags = nlmsg_data(nlh); | 675 | u32 *flags = nlmsg_data(nlh); |
@@ -722,7 +722,7 @@ nla_put_failure: | |||
722 | } | 722 | } |
723 | 723 | ||
724 | static int xfrm_get_sadinfo(struct sk_buff *skb, struct nlmsghdr *nlh, | 724 | static int xfrm_get_sadinfo(struct sk_buff *skb, struct nlmsghdr *nlh, |
725 | struct rtattr **xfrma) | 725 | struct rtattr **attrs) |
726 | { | 726 | { |
727 | struct sk_buff *r_skb; | 727 | struct sk_buff *r_skb; |
728 | u32 *flags = nlmsg_data(nlh); | 728 | u32 *flags = nlmsg_data(nlh); |
@@ -740,14 +740,14 @@ static int xfrm_get_sadinfo(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
740 | } | 740 | } |
741 | 741 | ||
742 | static int xfrm_get_sa(struct sk_buff *skb, struct nlmsghdr *nlh, | 742 | static int xfrm_get_sa(struct sk_buff *skb, struct nlmsghdr *nlh, |
743 | struct rtattr **xfrma) | 743 | struct rtattr **attrs) |
744 | { | 744 | { |
745 | struct xfrm_usersa_id *p = nlmsg_data(nlh); | 745 | struct xfrm_usersa_id *p = nlmsg_data(nlh); |
746 | struct xfrm_state *x; | 746 | struct xfrm_state *x; |
747 | struct sk_buff *resp_skb; | 747 | struct sk_buff *resp_skb; |
748 | int err = -ESRCH; | 748 | int err = -ESRCH; |
749 | 749 | ||
750 | x = xfrm_user_state_lookup(p, xfrma, &err); | 750 | x = xfrm_user_state_lookup(p, attrs, &err); |
751 | if (x == NULL) | 751 | if (x == NULL) |
752 | goto out_noput; | 752 | goto out_noput; |
753 | 753 | ||
@@ -786,7 +786,7 @@ static int verify_userspi_info(struct xfrm_userspi_info *p) | |||
786 | } | 786 | } |
787 | 787 | ||
788 | static int xfrm_alloc_userspi(struct sk_buff *skb, struct nlmsghdr *nlh, | 788 | static int xfrm_alloc_userspi(struct sk_buff *skb, struct nlmsghdr *nlh, |
789 | struct rtattr **xfrma) | 789 | struct rtattr **attrs) |
790 | { | 790 | { |
791 | struct xfrm_state *x; | 791 | struct xfrm_state *x; |
792 | struct xfrm_userspi_info *p; | 792 | struct xfrm_userspi_info *p; |
@@ -915,9 +915,9 @@ static int verify_newpolicy_info(struct xfrm_userpolicy_info *p) | |||
915 | return verify_policy_dir(p->dir); | 915 | return verify_policy_dir(p->dir); |
916 | } | 916 | } |
917 | 917 | ||
918 | static int copy_from_user_sec_ctx(struct xfrm_policy *pol, struct rtattr **xfrma) | 918 | static int copy_from_user_sec_ctx(struct xfrm_policy *pol, struct rtattr **attrs) |
919 | { | 919 | { |
920 | struct rtattr *rt = xfrma[XFRMA_SEC_CTX]; | 920 | struct rtattr *rt = attrs[XFRMA_SEC_CTX]; |
921 | struct xfrm_user_sec_ctx *uctx; | 921 | struct xfrm_user_sec_ctx *uctx; |
922 | 922 | ||
923 | if (!rt) | 923 | if (!rt) |
@@ -983,9 +983,9 @@ static int validate_tmpl(int nr, struct xfrm_user_tmpl *ut, u16 family) | |||
983 | return 0; | 983 | return 0; |
984 | } | 984 | } |
985 | 985 | ||
986 | static int copy_from_user_tmpl(struct xfrm_policy *pol, struct rtattr **xfrma) | 986 | static int copy_from_user_tmpl(struct xfrm_policy *pol, struct rtattr **attrs) |
987 | { | 987 | { |
988 | struct rtattr *rt = xfrma[XFRMA_TMPL]; | 988 | struct rtattr *rt = attrs[XFRMA_TMPL]; |
989 | 989 | ||
990 | if (!rt) { | 990 | if (!rt) { |
991 | pol->xfrm_nr = 0; | 991 | pol->xfrm_nr = 0; |
@@ -1003,9 +1003,9 @@ static int copy_from_user_tmpl(struct xfrm_policy *pol, struct rtattr **xfrma) | |||
1003 | return 0; | 1003 | return 0; |
1004 | } | 1004 | } |
1005 | 1005 | ||
1006 | static int copy_from_user_policy_type(u8 *tp, struct rtattr **xfrma) | 1006 | static int copy_from_user_policy_type(u8 *tp, struct rtattr **attrs) |
1007 | { | 1007 | { |
1008 | struct rtattr *rt = xfrma[XFRMA_POLICY_TYPE]; | 1008 | struct rtattr *rt = attrs[XFRMA_POLICY_TYPE]; |
1009 | struct xfrm_userpolicy_type *upt; | 1009 | struct xfrm_userpolicy_type *upt; |
1010 | u8 type = XFRM_POLICY_TYPE_MAIN; | 1010 | u8 type = XFRM_POLICY_TYPE_MAIN; |
1011 | int err; | 1011 | int err; |
@@ -1049,7 +1049,7 @@ static void copy_to_user_policy(struct xfrm_policy *xp, struct xfrm_userpolicy_i | |||
1049 | p->share = XFRM_SHARE_ANY; /* XXX xp->share */ | 1049 | p->share = XFRM_SHARE_ANY; /* XXX xp->share */ |
1050 | } | 1050 | } |
1051 | 1051 | ||
1052 | static struct xfrm_policy *xfrm_policy_construct(struct xfrm_userpolicy_info *p, struct rtattr **xfrma, int *errp) | 1052 | static struct xfrm_policy *xfrm_policy_construct(struct xfrm_userpolicy_info *p, struct rtattr **attrs, int *errp) |
1053 | { | 1053 | { |
1054 | struct xfrm_policy *xp = xfrm_policy_alloc(GFP_KERNEL); | 1054 | struct xfrm_policy *xp = xfrm_policy_alloc(GFP_KERNEL); |
1055 | int err; | 1055 | int err; |
@@ -1061,12 +1061,12 @@ static struct xfrm_policy *xfrm_policy_construct(struct xfrm_userpolicy_info *p, | |||
1061 | 1061 | ||
1062 | copy_from_user_policy(xp, p); | 1062 | copy_from_user_policy(xp, p); |
1063 | 1063 | ||
1064 | err = copy_from_user_policy_type(&xp->type, xfrma); | 1064 | err = copy_from_user_policy_type(&xp->type, attrs); |
1065 | if (err) | 1065 | if (err) |
1066 | goto error; | 1066 | goto error; |
1067 | 1067 | ||
1068 | if (!(err = copy_from_user_tmpl(xp, xfrma))) | 1068 | if (!(err = copy_from_user_tmpl(xp, attrs))) |
1069 | err = copy_from_user_sec_ctx(xp, xfrma); | 1069 | err = copy_from_user_sec_ctx(xp, attrs); |
1070 | if (err) | 1070 | if (err) |
1071 | goto error; | 1071 | goto error; |
1072 | 1072 | ||
@@ -1078,7 +1078,7 @@ static struct xfrm_policy *xfrm_policy_construct(struct xfrm_userpolicy_info *p, | |||
1078 | } | 1078 | } |
1079 | 1079 | ||
1080 | static int xfrm_add_policy(struct sk_buff *skb, struct nlmsghdr *nlh, | 1080 | static int xfrm_add_policy(struct sk_buff *skb, struct nlmsghdr *nlh, |
1081 | struct rtattr **xfrma) | 1081 | struct rtattr **attrs) |
1082 | { | 1082 | { |
1083 | struct xfrm_userpolicy_info *p = nlmsg_data(nlh); | 1083 | struct xfrm_userpolicy_info *p = nlmsg_data(nlh); |
1084 | struct xfrm_policy *xp; | 1084 | struct xfrm_policy *xp; |
@@ -1089,11 +1089,11 @@ static int xfrm_add_policy(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
1089 | err = verify_newpolicy_info(p); | 1089 | err = verify_newpolicy_info(p); |
1090 | if (err) | 1090 | if (err) |
1091 | return err; | 1091 | return err; |
1092 | err = verify_sec_ctx_len(xfrma); | 1092 | err = verify_sec_ctx_len(attrs); |
1093 | if (err) | 1093 | if (err) |
1094 | return err; | 1094 | return err; |
1095 | 1095 | ||
1096 | xp = xfrm_policy_construct(p, xfrma, &err); | 1096 | xp = xfrm_policy_construct(p, attrs, &err); |
1097 | if (!xp) | 1097 | if (!xp) |
1098 | return err; | 1098 | return err; |
1099 | 1099 | ||
@@ -1271,7 +1271,7 @@ static struct sk_buff *xfrm_policy_netlink(struct sk_buff *in_skb, | |||
1271 | } | 1271 | } |
1272 | 1272 | ||
1273 | static int xfrm_get_policy(struct sk_buff *skb, struct nlmsghdr *nlh, | 1273 | static int xfrm_get_policy(struct sk_buff *skb, struct nlmsghdr *nlh, |
1274 | struct rtattr **xfrma) | 1274 | struct rtattr **attrs) |
1275 | { | 1275 | { |
1276 | struct xfrm_policy *xp; | 1276 | struct xfrm_policy *xp; |
1277 | struct xfrm_userpolicy_id *p; | 1277 | struct xfrm_userpolicy_id *p; |
@@ -1283,7 +1283,7 @@ static int xfrm_get_policy(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
1283 | p = nlmsg_data(nlh); | 1283 | p = nlmsg_data(nlh); |
1284 | delete = nlh->nlmsg_type == XFRM_MSG_DELPOLICY; | 1284 | delete = nlh->nlmsg_type == XFRM_MSG_DELPOLICY; |
1285 | 1285 | ||
1286 | err = copy_from_user_policy_type(&type, xfrma); | 1286 | err = copy_from_user_policy_type(&type, attrs); |
1287 | if (err) | 1287 | if (err) |
1288 | return err; | 1288 | return err; |
1289 | 1289 | ||
@@ -1294,10 +1294,10 @@ static int xfrm_get_policy(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
1294 | if (p->index) | 1294 | if (p->index) |
1295 | xp = xfrm_policy_byid(type, p->dir, p->index, delete, &err); | 1295 | xp = xfrm_policy_byid(type, p->dir, p->index, delete, &err); |
1296 | else { | 1296 | else { |
1297 | struct rtattr *rt = xfrma[XFRMA_SEC_CTX]; | 1297 | struct rtattr *rt = attrs[XFRMA_SEC_CTX]; |
1298 | struct xfrm_policy tmp; | 1298 | struct xfrm_policy tmp; |
1299 | 1299 | ||
1300 | err = verify_sec_ctx_len(xfrma); | 1300 | err = verify_sec_ctx_len(attrs); |
1301 | if (err) | 1301 | if (err) |
1302 | return err; | 1302 | return err; |
1303 | 1303 | ||
@@ -1345,7 +1345,7 @@ out: | |||
1345 | } | 1345 | } |
1346 | 1346 | ||
1347 | static int xfrm_flush_sa(struct sk_buff *skb, struct nlmsghdr *nlh, | 1347 | static int xfrm_flush_sa(struct sk_buff *skb, struct nlmsghdr *nlh, |
1348 | struct rtattr **xfrma) | 1348 | struct rtattr **attrs) |
1349 | { | 1349 | { |
1350 | struct km_event c; | 1350 | struct km_event c; |
1351 | struct xfrm_usersa_flush *p = nlmsg_data(nlh); | 1351 | struct xfrm_usersa_flush *p = nlmsg_data(nlh); |
@@ -1411,7 +1411,7 @@ nla_put_failure: | |||
1411 | } | 1411 | } |
1412 | 1412 | ||
1413 | static int xfrm_get_ae(struct sk_buff *skb, struct nlmsghdr *nlh, | 1413 | static int xfrm_get_ae(struct sk_buff *skb, struct nlmsghdr *nlh, |
1414 | struct rtattr **xfrma) | 1414 | struct rtattr **attrs) |
1415 | { | 1415 | { |
1416 | struct xfrm_state *x; | 1416 | struct xfrm_state *x; |
1417 | struct sk_buff *r_skb; | 1417 | struct sk_buff *r_skb; |
@@ -1449,14 +1449,14 @@ static int xfrm_get_ae(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
1449 | } | 1449 | } |
1450 | 1450 | ||
1451 | static int xfrm_new_ae(struct sk_buff *skb, struct nlmsghdr *nlh, | 1451 | static int xfrm_new_ae(struct sk_buff *skb, struct nlmsghdr *nlh, |
1452 | struct rtattr **xfrma) | 1452 | struct rtattr **attrs) |
1453 | { | 1453 | { |
1454 | struct xfrm_state *x; | 1454 | struct xfrm_state *x; |
1455 | struct km_event c; | 1455 | struct km_event c; |
1456 | int err = - EINVAL; | 1456 | int err = - EINVAL; |
1457 | struct xfrm_aevent_id *p = nlmsg_data(nlh); | 1457 | struct xfrm_aevent_id *p = nlmsg_data(nlh); |
1458 | struct rtattr *rp = xfrma[XFRMA_REPLAY_VAL]; | 1458 | struct rtattr *rp = attrs[XFRMA_REPLAY_VAL]; |
1459 | struct rtattr *lt = xfrma[XFRMA_LTIME_VAL]; | 1459 | struct rtattr *lt = attrs[XFRMA_LTIME_VAL]; |
1460 | 1460 | ||
1461 | if (!lt && !rp) | 1461 | if (!lt && !rp) |
1462 | return err; | 1462 | return err; |
@@ -1473,7 +1473,7 @@ static int xfrm_new_ae(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
1473 | goto out; | 1473 | goto out; |
1474 | 1474 | ||
1475 | spin_lock_bh(&x->lock); | 1475 | spin_lock_bh(&x->lock); |
1476 | xfrm_update_ae_params(x, xfrma); | 1476 | xfrm_update_ae_params(x, attrs); |
1477 | spin_unlock_bh(&x->lock); | 1477 | spin_unlock_bh(&x->lock); |
1478 | 1478 | ||
1479 | c.event = nlh->nlmsg_type; | 1479 | c.event = nlh->nlmsg_type; |
@@ -1488,14 +1488,14 @@ out: | |||
1488 | } | 1488 | } |
1489 | 1489 | ||
1490 | static int xfrm_flush_policy(struct sk_buff *skb, struct nlmsghdr *nlh, | 1490 | static int xfrm_flush_policy(struct sk_buff *skb, struct nlmsghdr *nlh, |
1491 | struct rtattr **xfrma) | 1491 | struct rtattr **attrs) |
1492 | { | 1492 | { |
1493 | struct km_event c; | 1493 | struct km_event c; |
1494 | u8 type = XFRM_POLICY_TYPE_MAIN; | 1494 | u8 type = XFRM_POLICY_TYPE_MAIN; |
1495 | int err; | 1495 | int err; |
1496 | struct xfrm_audit audit_info; | 1496 | struct xfrm_audit audit_info; |
1497 | 1497 | ||
1498 | err = copy_from_user_policy_type(&type, xfrma); | 1498 | err = copy_from_user_policy_type(&type, attrs); |
1499 | if (err) | 1499 | if (err) |
1500 | return err; | 1500 | return err; |
1501 | 1501 | ||
@@ -1513,7 +1513,7 @@ static int xfrm_flush_policy(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
1513 | } | 1513 | } |
1514 | 1514 | ||
1515 | static int xfrm_add_pol_expire(struct sk_buff *skb, struct nlmsghdr *nlh, | 1515 | static int xfrm_add_pol_expire(struct sk_buff *skb, struct nlmsghdr *nlh, |
1516 | struct rtattr **xfrma) | 1516 | struct rtattr **attrs) |
1517 | { | 1517 | { |
1518 | struct xfrm_policy *xp; | 1518 | struct xfrm_policy *xp; |
1519 | struct xfrm_user_polexpire *up = nlmsg_data(nlh); | 1519 | struct xfrm_user_polexpire *up = nlmsg_data(nlh); |
@@ -1521,17 +1521,17 @@ static int xfrm_add_pol_expire(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
1521 | u8 type = XFRM_POLICY_TYPE_MAIN; | 1521 | u8 type = XFRM_POLICY_TYPE_MAIN; |
1522 | int err = -ENOENT; | 1522 | int err = -ENOENT; |
1523 | 1523 | ||
1524 | err = copy_from_user_policy_type(&type, xfrma); | 1524 | err = copy_from_user_policy_type(&type, attrs); |
1525 | if (err) | 1525 | if (err) |
1526 | return err; | 1526 | return err; |
1527 | 1527 | ||
1528 | if (p->index) | 1528 | if (p->index) |
1529 | xp = xfrm_policy_byid(type, p->dir, p->index, 0, &err); | 1529 | xp = xfrm_policy_byid(type, p->dir, p->index, 0, &err); |
1530 | else { | 1530 | else { |
1531 | struct rtattr *rt = xfrma[XFRMA_SEC_CTX]; | 1531 | struct rtattr *rt = attrs[XFRMA_SEC_CTX]; |
1532 | struct xfrm_policy tmp; | 1532 | struct xfrm_policy tmp; |
1533 | 1533 | ||
1534 | err = verify_sec_ctx_len(xfrma); | 1534 | err = verify_sec_ctx_len(attrs); |
1535 | if (err) | 1535 | if (err) |
1536 | return err; | 1536 | return err; |
1537 | 1537 | ||
@@ -1574,7 +1574,7 @@ out: | |||
1574 | } | 1574 | } |
1575 | 1575 | ||
1576 | static int xfrm_add_sa_expire(struct sk_buff *skb, struct nlmsghdr *nlh, | 1576 | static int xfrm_add_sa_expire(struct sk_buff *skb, struct nlmsghdr *nlh, |
1577 | struct rtattr **xfrma) | 1577 | struct rtattr **attrs) |
1578 | { | 1578 | { |
1579 | struct xfrm_state *x; | 1579 | struct xfrm_state *x; |
1580 | int err; | 1580 | int err; |
@@ -1606,12 +1606,12 @@ out: | |||
1606 | } | 1606 | } |
1607 | 1607 | ||
1608 | static int xfrm_add_acquire(struct sk_buff *skb, struct nlmsghdr *nlh, | 1608 | static int xfrm_add_acquire(struct sk_buff *skb, struct nlmsghdr *nlh, |
1609 | struct rtattr **xfrma) | 1609 | struct rtattr **attrs) |
1610 | { | 1610 | { |
1611 | struct xfrm_policy *xp; | 1611 | struct xfrm_policy *xp; |
1612 | struct xfrm_user_tmpl *ut; | 1612 | struct xfrm_user_tmpl *ut; |
1613 | int i; | 1613 | int i; |
1614 | struct rtattr *rt = xfrma[XFRMA_TMPL]; | 1614 | struct rtattr *rt = attrs[XFRMA_TMPL]; |
1615 | 1615 | ||
1616 | struct xfrm_user_acquire *ua = nlmsg_data(nlh); | 1616 | struct xfrm_user_acquire *ua = nlmsg_data(nlh); |
1617 | struct xfrm_state *x = xfrm_state_alloc(); | 1617 | struct xfrm_state *x = xfrm_state_alloc(); |
@@ -1628,7 +1628,7 @@ static int xfrm_add_acquire(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
1628 | } | 1628 | } |
1629 | 1629 | ||
1630 | /* build an XP */ | 1630 | /* build an XP */ |
1631 | xp = xfrm_policy_construct(&ua->policy, (struct rtattr **) xfrma, &err); | 1631 | xp = xfrm_policy_construct(&ua->policy, (struct rtattr **) attrs, &err); |
1632 | if (!xp) { | 1632 | if (!xp) { |
1633 | kfree(x); | 1633 | kfree(x); |
1634 | return err; | 1634 | return err; |
@@ -1661,9 +1661,9 @@ static int xfrm_add_acquire(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
1661 | 1661 | ||
1662 | #ifdef CONFIG_XFRM_MIGRATE | 1662 | #ifdef CONFIG_XFRM_MIGRATE |
1663 | static int copy_from_user_migrate(struct xfrm_migrate *ma, | 1663 | static int copy_from_user_migrate(struct xfrm_migrate *ma, |
1664 | struct rtattr **xfrma, int *num) | 1664 | struct rtattr **attrs, int *num) |
1665 | { | 1665 | { |
1666 | struct rtattr *rt = xfrma[XFRMA_MIGRATE]; | 1666 | struct rtattr *rt = attrs[XFRMA_MIGRATE]; |
1667 | struct xfrm_user_migrate *um; | 1667 | struct xfrm_user_migrate *um; |
1668 | int i, num_migrate; | 1668 | int i, num_migrate; |
1669 | 1669 | ||
@@ -1692,7 +1692,7 @@ static int copy_from_user_migrate(struct xfrm_migrate *ma, | |||
1692 | } | 1692 | } |
1693 | 1693 | ||
1694 | static int xfrm_do_migrate(struct sk_buff *skb, struct nlmsghdr *nlh, | 1694 | static int xfrm_do_migrate(struct sk_buff *skb, struct nlmsghdr *nlh, |
1695 | struct rtattr **xfrma) | 1695 | struct rtattr **attrs) |
1696 | { | 1696 | { |
1697 | struct xfrm_userpolicy_id *pi = nlmsg_data(nlh); | 1697 | struct xfrm_userpolicy_id *pi = nlmsg_data(nlh); |
1698 | struct xfrm_migrate m[XFRM_MAX_DEPTH]; | 1698 | struct xfrm_migrate m[XFRM_MAX_DEPTH]; |
@@ -1700,15 +1700,15 @@ static int xfrm_do_migrate(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
1700 | int err; | 1700 | int err; |
1701 | int n = 0; | 1701 | int n = 0; |
1702 | 1702 | ||
1703 | if (xfrma[XFRMA_MIGRATE] == NULL) | 1703 | if (attrs[XFRMA_MIGRATE] == NULL) |
1704 | return -EINVAL; | 1704 | return -EINVAL; |
1705 | 1705 | ||
1706 | err = copy_from_user_policy_type(&type, (struct rtattr **)xfrma); | 1706 | err = copy_from_user_policy_type(&type, (struct rtattr **)attrs); |
1707 | if (err) | 1707 | if (err) |
1708 | return err; | 1708 | return err; |
1709 | 1709 | ||
1710 | err = copy_from_user_migrate((struct xfrm_migrate *)m, | 1710 | err = copy_from_user_migrate((struct xfrm_migrate *)m, |
1711 | (struct rtattr **)xfrma, &n); | 1711 | (struct rtattr **)attrs, &n); |
1712 | if (err) | 1712 | if (err) |
1713 | return err; | 1713 | return err; |
1714 | 1714 | ||
@@ -1721,7 +1721,7 @@ static int xfrm_do_migrate(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
1721 | } | 1721 | } |
1722 | #else | 1722 | #else |
1723 | static int xfrm_do_migrate(struct sk_buff *skb, struct nlmsghdr *nlh, | 1723 | static int xfrm_do_migrate(struct sk_buff *skb, struct nlmsghdr *nlh, |
1724 | struct rtattr **xfrma) | 1724 | struct rtattr **attrs) |
1725 | { | 1725 | { |
1726 | return -ENOPROTOOPT; | 1726 | return -ENOPROTOOPT; |
1727 | } | 1727 | } |
@@ -1882,7 +1882,7 @@ static struct xfrm_link { | |||
1882 | 1882 | ||
1883 | static int xfrm_user_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | 1883 | static int xfrm_user_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh) |
1884 | { | 1884 | { |
1885 | struct nlattr *xfrma[XFRMA_MAX+1]; | 1885 | struct nlattr *attrs[XFRMA_MAX+1]; |
1886 | struct xfrm_link *link; | 1886 | struct xfrm_link *link; |
1887 | int type, err; | 1887 | int type, err; |
1888 | 1888 | ||
@@ -1906,7 +1906,7 @@ static int xfrm_user_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | |||
1906 | return netlink_dump_start(xfrm_nl, skb, nlh, link->dump, NULL); | 1906 | return netlink_dump_start(xfrm_nl, skb, nlh, link->dump, NULL); |
1907 | } | 1907 | } |
1908 | 1908 | ||
1909 | err = nlmsg_parse(nlh, xfrm_msg_min[type], xfrma, XFRMA_MAX, | 1909 | err = nlmsg_parse(nlh, xfrm_msg_min[type], attrs, XFRMA_MAX, |
1910 | xfrma_policy); | 1910 | xfrma_policy); |
1911 | if (err < 0) | 1911 | if (err < 0) |
1912 | return err; | 1912 | return err; |
@@ -1914,7 +1914,7 @@ static int xfrm_user_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | |||
1914 | if (link->doit == NULL) | 1914 | if (link->doit == NULL) |
1915 | return -EINVAL; | 1915 | return -EINVAL; |
1916 | 1916 | ||
1917 | return link->doit(skb, nlh, (struct rtattr **) xfrma); | 1917 | return link->doit(skb, nlh, (struct rtattr **) attrs); |
1918 | } | 1918 | } |
1919 | 1919 | ||
1920 | static void xfrm_netlink_rcv(struct sock *sk, int len) | 1920 | static void xfrm_netlink_rcv(struct sock *sk, int len) |