mirror of
https://github.com/Fishwaldo/Star64_linux.git
synced 2025-07-06 14:31:46 +00:00
netlink: Rename pid to portid to avoid confusion
It is a frequent mistake to confuse the netlink port identifier with a process identifier. Try to reduce this confusion by renaming fields that hold port identifiers portid instead of pid. I have carefully avoided changing the structures exported to userspace to avoid changing the userspace API. I have successfully built an allyesconfig kernel with this change. Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com> Acked-by: Stephen Hemminger <shemminger@vyatta.com> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
parent
9f00d9776b
commit
15e473046c
75 changed files with 728 additions and 728 deletions
|
@ -644,7 +644,7 @@ errout:
|
|||
}
|
||||
|
||||
static int
|
||||
tca_get_fill(struct sk_buff *skb, struct tc_action *a, u32 pid, u32 seq,
|
||||
tca_get_fill(struct sk_buff *skb, struct tc_action *a, u32 portid, u32 seq,
|
||||
u16 flags, int event, int bind, int ref)
|
||||
{
|
||||
struct tcamsg *t;
|
||||
|
@ -652,7 +652,7 @@ tca_get_fill(struct sk_buff *skb, struct tc_action *a, u32 pid, u32 seq,
|
|||
unsigned char *b = skb_tail_pointer(skb);
|
||||
struct nlattr *nest;
|
||||
|
||||
nlh = nlmsg_put(skb, pid, seq, event, sizeof(*t), flags);
|
||||
nlh = nlmsg_put(skb, portid, seq, event, sizeof(*t), flags);
|
||||
if (!nlh)
|
||||
goto out_nlmsg_trim;
|
||||
t = nlmsg_data(nlh);
|
||||
|
@ -678,7 +678,7 @@ out_nlmsg_trim:
|
|||
}
|
||||
|
||||
static int
|
||||
act_get_notify(struct net *net, u32 pid, struct nlmsghdr *n,
|
||||
act_get_notify(struct net *net, u32 portid, struct nlmsghdr *n,
|
||||
struct tc_action *a, int event)
|
||||
{
|
||||
struct sk_buff *skb;
|
||||
|
@ -686,16 +686,16 @@ act_get_notify(struct net *net, u32 pid, struct nlmsghdr *n,
|
|||
skb = alloc_skb(NLMSG_GOODSIZE, GFP_KERNEL);
|
||||
if (!skb)
|
||||
return -ENOBUFS;
|
||||
if (tca_get_fill(skb, a, pid, n->nlmsg_seq, 0, event, 0, 0) <= 0) {
|
||||
if (tca_get_fill(skb, a, portid, n->nlmsg_seq, 0, event, 0, 0) <= 0) {
|
||||
kfree_skb(skb);
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
return rtnl_unicast(skb, net, pid);
|
||||
return rtnl_unicast(skb, net, portid);
|
||||
}
|
||||
|
||||
static struct tc_action *
|
||||
tcf_action_get_1(struct nlattr *nla, struct nlmsghdr *n, u32 pid)
|
||||
tcf_action_get_1(struct nlattr *nla, struct nlmsghdr *n, u32 portid)
|
||||
{
|
||||
struct nlattr *tb[TCA_ACT_MAX + 1];
|
||||
struct tc_action *a;
|
||||
|
@ -762,7 +762,7 @@ static struct tc_action *create_a(int i)
|
|||
}
|
||||
|
||||
static int tca_action_flush(struct net *net, struct nlattr *nla,
|
||||
struct nlmsghdr *n, u32 pid)
|
||||
struct nlmsghdr *n, u32 portid)
|
||||
{
|
||||
struct sk_buff *skb;
|
||||
unsigned char *b;
|
||||
|
@ -799,7 +799,7 @@ static int tca_action_flush(struct net *net, struct nlattr *nla,
|
|||
if (a->ops == NULL)
|
||||
goto err_out;
|
||||
|
||||
nlh = nlmsg_put(skb, pid, n->nlmsg_seq, RTM_DELACTION, sizeof(*t), 0);
|
||||
nlh = nlmsg_put(skb, portid, n->nlmsg_seq, RTM_DELACTION, sizeof(*t), 0);
|
||||
if (!nlh)
|
||||
goto out_module_put;
|
||||
t = nlmsg_data(nlh);
|
||||
|
@ -823,7 +823,7 @@ static int tca_action_flush(struct net *net, struct nlattr *nla,
|
|||
nlh->nlmsg_flags |= NLM_F_ROOT;
|
||||
module_put(a->ops->owner);
|
||||
kfree(a);
|
||||
err = rtnetlink_send(skb, net, pid, RTNLGRP_TC,
|
||||
err = rtnetlink_send(skb, net, portid, RTNLGRP_TC,
|
||||
n->nlmsg_flags & NLM_F_ECHO);
|
||||
if (err > 0)
|
||||
return 0;
|
||||
|
@ -841,7 +841,7 @@ noflush_out:
|
|||
|
||||
static int
|
||||
tca_action_gd(struct net *net, struct nlattr *nla, struct nlmsghdr *n,
|
||||
u32 pid, int event)
|
||||
u32 portid, int event)
|
||||
{
|
||||
int i, ret;
|
||||
struct nlattr *tb[TCA_ACT_MAX_PRIO + 1];
|
||||
|
@ -853,13 +853,13 @@ tca_action_gd(struct net *net, struct nlattr *nla, struct nlmsghdr *n,
|
|||
|
||||
if (event == RTM_DELACTION && n->nlmsg_flags & NLM_F_ROOT) {
|
||||
if (tb[1] != NULL)
|
||||
return tca_action_flush(net, tb[1], n, pid);
|
||||
return tca_action_flush(net, tb[1], n, portid);
|
||||
else
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
for (i = 1; i <= TCA_ACT_MAX_PRIO && tb[i]; i++) {
|
||||
act = tcf_action_get_1(tb[i], n, pid);
|
||||
act = tcf_action_get_1(tb[i], n, portid);
|
||||
if (IS_ERR(act)) {
|
||||
ret = PTR_ERR(act);
|
||||
goto err;
|
||||
|
@ -874,7 +874,7 @@ tca_action_gd(struct net *net, struct nlattr *nla, struct nlmsghdr *n,
|
|||
}
|
||||
|
||||
if (event == RTM_GETACTION)
|
||||
ret = act_get_notify(net, pid, n, head, event);
|
||||
ret = act_get_notify(net, portid, n, head, event);
|
||||
else { /* delete */
|
||||
struct sk_buff *skb;
|
||||
|
||||
|
@ -884,7 +884,7 @@ tca_action_gd(struct net *net, struct nlattr *nla, struct nlmsghdr *n,
|
|||
goto err;
|
||||
}
|
||||
|
||||
if (tca_get_fill(skb, head, pid, n->nlmsg_seq, 0, event,
|
||||
if (tca_get_fill(skb, head, portid, n->nlmsg_seq, 0, event,
|
||||
0, 1) <= 0) {
|
||||
kfree_skb(skb);
|
||||
ret = -EINVAL;
|
||||
|
@ -893,7 +893,7 @@ tca_action_gd(struct net *net, struct nlattr *nla, struct nlmsghdr *n,
|
|||
|
||||
/* now do the delete */
|
||||
tcf_action_destroy(head, 0);
|
||||
ret = rtnetlink_send(skb, net, pid, RTNLGRP_TC,
|
||||
ret = rtnetlink_send(skb, net, portid, RTNLGRP_TC,
|
||||
n->nlmsg_flags & NLM_F_ECHO);
|
||||
if (ret > 0)
|
||||
return 0;
|
||||
|
@ -905,7 +905,7 @@ err:
|
|||
}
|
||||
|
||||
static int tcf_add_notify(struct net *net, struct tc_action *a,
|
||||
u32 pid, u32 seq, int event, u16 flags)
|
||||
u32 portid, u32 seq, int event, u16 flags)
|
||||
{
|
||||
struct tcamsg *t;
|
||||
struct nlmsghdr *nlh;
|
||||
|
@ -920,7 +920,7 @@ static int tcf_add_notify(struct net *net, struct tc_action *a,
|
|||
|
||||
b = skb_tail_pointer(skb);
|
||||
|
||||
nlh = nlmsg_put(skb, pid, seq, event, sizeof(*t), flags);
|
||||
nlh = nlmsg_put(skb, portid, seq, event, sizeof(*t), flags);
|
||||
if (!nlh)
|
||||
goto out_kfree_skb;
|
||||
t = nlmsg_data(nlh);
|
||||
|
@ -940,7 +940,7 @@ static int tcf_add_notify(struct net *net, struct tc_action *a,
|
|||
nlh->nlmsg_len = skb_tail_pointer(skb) - b;
|
||||
NETLINK_CB(skb).dst_group = RTNLGRP_TC;
|
||||
|
||||
err = rtnetlink_send(skb, net, pid, RTNLGRP_TC, flags & NLM_F_ECHO);
|
||||
err = rtnetlink_send(skb, net, portid, RTNLGRP_TC, flags & NLM_F_ECHO);
|
||||
if (err > 0)
|
||||
err = 0;
|
||||
return err;
|
||||
|
@ -953,7 +953,7 @@ out_kfree_skb:
|
|||
|
||||
static int
|
||||
tcf_action_add(struct net *net, struct nlattr *nla, struct nlmsghdr *n,
|
||||
u32 pid, int ovr)
|
||||
u32 portid, int ovr)
|
||||
{
|
||||
int ret = 0;
|
||||
struct tc_action *act;
|
||||
|
@ -971,7 +971,7 @@ tcf_action_add(struct net *net, struct nlattr *nla, struct nlmsghdr *n,
|
|||
/* dump then free all the actions after update; inserted policy
|
||||
* stays intact
|
||||
*/
|
||||
ret = tcf_add_notify(net, act, pid, seq, RTM_NEWACTION, n->nlmsg_flags);
|
||||
ret = tcf_add_notify(net, act, portid, seq, RTM_NEWACTION, n->nlmsg_flags);
|
||||
for (a = act; a; a = act) {
|
||||
act = a->next;
|
||||
kfree(a);
|
||||
|
@ -984,7 +984,7 @@ static int tc_ctl_action(struct sk_buff *skb, struct nlmsghdr *n, void *arg)
|
|||
{
|
||||
struct net *net = sock_net(skb->sk);
|
||||
struct nlattr *tca[TCA_ACT_MAX + 1];
|
||||
u32 pid = skb ? NETLINK_CB(skb).pid : 0;
|
||||
u32 portid = skb ? NETLINK_CB(skb).portid : 0;
|
||||
int ret = 0, ovr = 0;
|
||||
|
||||
ret = nlmsg_parse(n, sizeof(struct tcamsg), tca, TCA_ACT_MAX, NULL);
|
||||
|
@ -1008,17 +1008,17 @@ static int tc_ctl_action(struct sk_buff *skb, struct nlmsghdr *n, void *arg)
|
|||
if (n->nlmsg_flags & NLM_F_REPLACE)
|
||||
ovr = 1;
|
||||
replay:
|
||||
ret = tcf_action_add(net, tca[TCA_ACT_TAB], n, pid, ovr);
|
||||
ret = tcf_action_add(net, tca[TCA_ACT_TAB], n, portid, ovr);
|
||||
if (ret == -EAGAIN)
|
||||
goto replay;
|
||||
break;
|
||||
case RTM_DELACTION:
|
||||
ret = tca_action_gd(net, tca[TCA_ACT_TAB], n,
|
||||
pid, RTM_DELACTION);
|
||||
portid, RTM_DELACTION);
|
||||
break;
|
||||
case RTM_GETACTION:
|
||||
ret = tca_action_gd(net, tca[TCA_ACT_TAB], n,
|
||||
pid, RTM_GETACTION);
|
||||
portid, RTM_GETACTION);
|
||||
break;
|
||||
default:
|
||||
BUG();
|
||||
|
@ -1085,7 +1085,7 @@ tc_dump_action(struct sk_buff *skb, struct netlink_callback *cb)
|
|||
goto out_module_put;
|
||||
}
|
||||
|
||||
nlh = nlmsg_put(skb, NETLINK_CB(cb->skb).pid, cb->nlh->nlmsg_seq,
|
||||
nlh = nlmsg_put(skb, NETLINK_CB(cb->skb).portid, cb->nlh->nlmsg_seq,
|
||||
cb->nlh->nlmsg_type, sizeof(*t), 0);
|
||||
if (!nlh)
|
||||
goto out_module_put;
|
||||
|
@ -1109,7 +1109,7 @@ tc_dump_action(struct sk_buff *skb, struct netlink_callback *cb)
|
|||
nla_nest_cancel(skb, nest);
|
||||
|
||||
nlh->nlmsg_len = skb_tail_pointer(skb) - b;
|
||||
if (NETLINK_CB(cb->skb).pid && ret)
|
||||
if (NETLINK_CB(cb->skb).portid && ret)
|
||||
nlh->nlmsg_flags |= NLM_F_MULTI;
|
||||
module_put(a_o->owner);
|
||||
return skb->len;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue