jamal wrote: > All very valid points. > Yikes, the directionality is not something i thought clearly about or > tested well. I can fix this but this code will only get fuglier. How > about the following approach: > > I add a new callback which is passed in the invocation to walk. > This callback is invoked at the end to signal the end of the walk, sort > of what done() does in netlink. > netlink doesnt use this call but pfkey does. So the burden is then moved > to pfkey to keep track of the stoopid count. > > Thoughts?
I think the complications come from the fact that you remeber two policies, but only one seems necessary. How about this (completely untested) patch? It simply uses increasing sequence numbers for all but the last entry and uses zero for the last one.
diff --git a/net/xfrm/xfrm_policy.c b/net/xfrm/xfrm_policy.c index 64d3938..c790420 100644 --- a/net/xfrm/xfrm_policy.c +++ b/net/xfrm/xfrm_policy.c @@ -860,33 +860,12 @@ EXPORT_SYMBOL(xfrm_policy_flush); int xfrm_policy_walk(u8 type, int (*func)(struct xfrm_policy *, int, int, void*), void *data) { - struct xfrm_policy *pol; + struct xfrm_policy *pol, *last = NULL; struct hlist_node *entry; - int dir, count, error; + int dir, last_dir, count, error; read_lock_bh(&xfrm_policy_lock); count = 0; - for (dir = 0; dir < 2*XFRM_POLICY_MAX; dir++) { - struct hlist_head *table = xfrm_policy_bydst[dir].table; - int i; - - hlist_for_each_entry(pol, entry, - &xfrm_policy_inexact[dir], bydst) { - if (pol->type == type) - count++; - } - for (i = xfrm_policy_bydst[dir].hmask; i >= 0; i--) { - hlist_for_each_entry(pol, entry, table + i, bydst) { - if (pol->type == type) - count++; - } - } - } - - if (count == 0) { - error = -ENOENT; - goto out; - } for (dir = 0; dir < 2*XFRM_POLICY_MAX; dir++) { struct hlist_head *table = xfrm_policy_bydst[dir].table; @@ -894,23 +873,39 @@ int xfrm_policy_walk(u8 type, int (*func hlist_for_each_entry(pol, entry, &xfrm_policy_inexact[dir], bydst) { + if (last) { + error = func(last, last_dir % XFRM_POLICY_MAX, + ++count, data); + if (error) + goto out; + last = NULL; + } if (pol->type != type) continue; - error = func(pol, dir % XFRM_POLICY_MAX, --count, data); - if (error) - goto out; + last = pol; + last_dir = dir; } for (i = xfrm_policy_bydst[dir].hmask; i >= 0; i--) { hlist_for_each_entry(pol, entry, table + i, bydst) { + if (last) { + error = func(last, last_dir % XFRM_POLICY_MAX, + ++count, data); + if (error) + goto out; + last = NULL; + } if (pol->type != type) continue; - error = func(pol, dir % XFRM_POLICY_MAX, --count, data); - if (error) - goto out; + last = pol; + last_dir = dir; } } } - error = 0; + if (count == 0) { + error = -ENOENT; + goto out; + } + error = func(last, last_dir % XFRM_POLICY_MAX, 0, data); out: read_unlock_bh(&xfrm_policy_lock); return error;