diff options
author | Eric Dumazet <eric.dumazet@gmail.com> | 2009-11-20 18:35:04 -0500 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2009-11-20 18:35:04 -0500 |
commit | 8964be4a9a5ca8cab1219bb046db2f6d1936227c (patch) | |
tree | 8838c73a03cc69c010b55928fce3725d17bc26a9 | |
parent | fa9a6fed87df1b50804405e700f8d30251d3aaf1 (diff) |
net: rename skb->iif to skb->skb_iif
To help grep games, rename iif to skb_iif
Signed-off-by: Eric Dumazet <eric.dumazet@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
-rw-r--r-- | drivers/ieee802154/fakehard.c | 2 | ||||
-rw-r--r-- | drivers/net/ifb.c | 6 | ||||
-rw-r--r-- | include/linux/skbuff.h | 4 | ||||
-rw-r--r-- | include/net/pkt_cls.h | 4 | ||||
-rw-r--r-- | net/core/dev.c | 6 | ||||
-rw-r--r-- | net/core/skbuff.c | 2 | ||||
-rw-r--r-- | net/netlabel/netlabel_unlabeled.c | 2 | ||||
-rw-r--r-- | net/sched/act_mirred.c | 2 | ||||
-rw-r--r-- | net/sched/cls_flow.c | 2 | ||||
-rw-r--r-- | security/selinux/hooks.c | 6 | ||||
-rw-r--r-- | security/smack/smack_lsm.c | 4 |
11 files changed, 20 insertions, 20 deletions
diff --git a/drivers/ieee802154/fakehard.c b/drivers/ieee802154/fakehard.c index f877f13e3ab3..617549f30ef9 100644 --- a/drivers/ieee802154/fakehard.c +++ b/drivers/ieee802154/fakehard.c | |||
@@ -282,7 +282,7 @@ static int ieee802154_fake_close(struct net_device *dev) | |||
282 | static netdev_tx_t ieee802154_fake_xmit(struct sk_buff *skb, | 282 | static netdev_tx_t ieee802154_fake_xmit(struct sk_buff *skb, |
283 | struct net_device *dev) | 283 | struct net_device *dev) |
284 | { | 284 | { |
285 | skb->iif = dev->ifindex; | 285 | skb->skb_iif = dev->ifindex; |
286 | skb->dev = dev; | 286 | skb->dev = dev; |
287 | dev->stats.tx_packets++; | 287 | dev->stats.tx_packets++; |
288 | dev->stats.tx_bytes += skb->len; | 288 | dev->stats.tx_bytes += skb->len; |
diff --git a/drivers/net/ifb.c b/drivers/net/ifb.c index 69c25668dd63..f4081c0a2d9c 100644 --- a/drivers/net/ifb.c +++ b/drivers/net/ifb.c | |||
@@ -99,7 +99,7 @@ static void ri_tasklet(unsigned long dev) | |||
99 | stats->tx_bytes +=skb->len; | 99 | stats->tx_bytes +=skb->len; |
100 | 100 | ||
101 | rcu_read_lock(); | 101 | rcu_read_lock(); |
102 | skb->dev = dev_get_by_index_rcu(&init_net, skb->iif); | 102 | skb->dev = dev_get_by_index_rcu(&init_net, skb->skb_iif); |
103 | if (!skb->dev) { | 103 | if (!skb->dev) { |
104 | rcu_read_unlock(); | 104 | rcu_read_unlock(); |
105 | dev_kfree_skb(skb); | 105 | dev_kfree_skb(skb); |
@@ -107,7 +107,7 @@ static void ri_tasklet(unsigned long dev) | |||
107 | break; | 107 | break; |
108 | } | 108 | } |
109 | rcu_read_unlock(); | 109 | rcu_read_unlock(); |
110 | skb->iif = _dev->ifindex; | 110 | skb->skb_iif = _dev->ifindex; |
111 | 111 | ||
112 | if (from & AT_EGRESS) { | 112 | if (from & AT_EGRESS) { |
113 | dp->st_rx_frm_egr++; | 113 | dp->st_rx_frm_egr++; |
@@ -172,7 +172,7 @@ static netdev_tx_t ifb_xmit(struct sk_buff *skb, struct net_device *dev) | |||
172 | stats->rx_packets++; | 172 | stats->rx_packets++; |
173 | stats->rx_bytes+=skb->len; | 173 | stats->rx_bytes+=skb->len; |
174 | 174 | ||
175 | if (!(from & (AT_INGRESS|AT_EGRESS)) || !skb->iif) { | 175 | if (!(from & (AT_INGRESS|AT_EGRESS)) || !skb->skb_iif) { |
176 | dev_kfree_skb(skb); | 176 | dev_kfree_skb(skb); |
177 | stats->rx_dropped++; | 177 | stats->rx_dropped++; |
178 | return NETDEV_TX_OK; | 178 | return NETDEV_TX_OK; |
diff --git a/include/linux/skbuff.h b/include/linux/skbuff.h index 63f47426977a..89eed8cdd318 100644 --- a/include/linux/skbuff.h +++ b/include/linux/skbuff.h | |||
@@ -299,7 +299,7 @@ typedef unsigned char *sk_buff_data_t; | |||
299 | * @nfctinfo: Relationship of this skb to the connection | 299 | * @nfctinfo: Relationship of this skb to the connection |
300 | * @nfct_reasm: netfilter conntrack re-assembly pointer | 300 | * @nfct_reasm: netfilter conntrack re-assembly pointer |
301 | * @nf_bridge: Saved data about a bridged frame - see br_netfilter.c | 301 | * @nf_bridge: Saved data about a bridged frame - see br_netfilter.c |
302 | * @iif: ifindex of device we arrived on | 302 | * @skb_iif: ifindex of device we arrived on |
303 | * @queue_mapping: Queue mapping for multiqueue devices | 303 | * @queue_mapping: Queue mapping for multiqueue devices |
304 | * @tc_index: Traffic control index | 304 | * @tc_index: Traffic control index |
305 | * @tc_verd: traffic control verdict | 305 | * @tc_verd: traffic control verdict |
@@ -366,7 +366,7 @@ struct sk_buff { | |||
366 | struct nf_bridge_info *nf_bridge; | 366 | struct nf_bridge_info *nf_bridge; |
367 | #endif | 367 | #endif |
368 | 368 | ||
369 | int iif; | 369 | int skb_iif; |
370 | #ifdef CONFIG_NET_SCHED | 370 | #ifdef CONFIG_NET_SCHED |
371 | __u16 tc_index; /* traffic control index */ | 371 | __u16 tc_index; /* traffic control index */ |
372 | #ifdef CONFIG_NET_CLS_ACT | 372 | #ifdef CONFIG_NET_CLS_ACT |
diff --git a/include/net/pkt_cls.h b/include/net/pkt_cls.h index 3dd210d073ca..dd3031aed9d5 100644 --- a/include/net/pkt_cls.h +++ b/include/net/pkt_cls.h | |||
@@ -343,9 +343,9 @@ tcf_match_indev(struct sk_buff *skb, char *indev) | |||
343 | struct net_device *dev; | 343 | struct net_device *dev; |
344 | 344 | ||
345 | if (indev[0]) { | 345 | if (indev[0]) { |
346 | if (!skb->iif) | 346 | if (!skb->skb_iif) |
347 | return 0; | 347 | return 0; |
348 | dev = __dev_get_by_index(dev_net(skb->dev), skb->iif); | 348 | dev = __dev_get_by_index(dev_net(skb->dev), skb->skb_iif); |
349 | if (!dev || strcmp(indev, dev->name)) | 349 | if (!dev || strcmp(indev, dev->name)) |
350 | return 0; | 350 | return 0; |
351 | } | 351 | } |
diff --git a/net/core/dev.c b/net/core/dev.c index 9977288583b8..09f3d6b9c0c8 100644 --- a/net/core/dev.c +++ b/net/core/dev.c | |||
@@ -2287,7 +2287,7 @@ static int ing_filter(struct sk_buff *skb) | |||
2287 | if (MAX_RED_LOOP < ttl++) { | 2287 | if (MAX_RED_LOOP < ttl++) { |
2288 | printk(KERN_WARNING | 2288 | printk(KERN_WARNING |
2289 | "Redir loop detected Dropping packet (%d->%d)\n", | 2289 | "Redir loop detected Dropping packet (%d->%d)\n", |
2290 | skb->iif, dev->ifindex); | 2290 | skb->skb_iif, dev->ifindex); |
2291 | return TC_ACT_SHOT; | 2291 | return TC_ACT_SHOT; |
2292 | } | 2292 | } |
2293 | 2293 | ||
@@ -2395,8 +2395,8 @@ int netif_receive_skb(struct sk_buff *skb) | |||
2395 | if (netpoll_receive_skb(skb)) | 2395 | if (netpoll_receive_skb(skb)) |
2396 | return NET_RX_DROP; | 2396 | return NET_RX_DROP; |
2397 | 2397 | ||
2398 | if (!skb->iif) | 2398 | if (!skb->skb_iif) |
2399 | skb->iif = skb->dev->ifindex; | 2399 | skb->skb_iif = skb->dev->ifindex; |
2400 | 2400 | ||
2401 | null_or_orig = NULL; | 2401 | null_or_orig = NULL; |
2402 | orig_dev = skb->dev; | 2402 | orig_dev = skb->dev; |
diff --git a/net/core/skbuff.c b/net/core/skbuff.c index 739b8f4dd327..bfa3e7865a8c 100644 --- a/net/core/skbuff.c +++ b/net/core/skbuff.c | |||
@@ -549,7 +549,7 @@ static void __copy_skb_header(struct sk_buff *new, const struct sk_buff *old) | |||
549 | #endif | 549 | #endif |
550 | new->protocol = old->protocol; | 550 | new->protocol = old->protocol; |
551 | new->mark = old->mark; | 551 | new->mark = old->mark; |
552 | new->iif = old->iif; | 552 | new->skb_iif = old->skb_iif; |
553 | __nf_copy(new, old); | 553 | __nf_copy(new, old); |
554 | #if defined(CONFIG_NETFILTER_XT_TARGET_TRACE) || \ | 554 | #if defined(CONFIG_NETFILTER_XT_TARGET_TRACE) || \ |
555 | defined(CONFIG_NETFILTER_XT_TARGET_TRACE_MODULE) | 555 | defined(CONFIG_NETFILTER_XT_TARGET_TRACE_MODULE) |
diff --git a/net/netlabel/netlabel_unlabeled.c b/net/netlabel/netlabel_unlabeled.c index 3dfe2bac8623..98ed22ee2ff4 100644 --- a/net/netlabel/netlabel_unlabeled.c +++ b/net/netlabel/netlabel_unlabeled.c | |||
@@ -1550,7 +1550,7 @@ int netlbl_unlabel_getattr(const struct sk_buff *skb, | |||
1550 | struct netlbl_unlhsh_iface *iface; | 1550 | struct netlbl_unlhsh_iface *iface; |
1551 | 1551 | ||
1552 | rcu_read_lock(); | 1552 | rcu_read_lock(); |
1553 | iface = netlbl_unlhsh_search_iface_def(skb->iif); | 1553 | iface = netlbl_unlhsh_search_iface_def(skb->skb_iif); |
1554 | if (iface == NULL) | 1554 | if (iface == NULL) |
1555 | goto unlabel_getattr_nolabel; | 1555 | goto unlabel_getattr_nolabel; |
1556 | switch (family) { | 1556 | switch (family) { |
diff --git a/net/sched/act_mirred.c b/net/sched/act_mirred.c index 797479369881..d329170243cb 100644 --- a/net/sched/act_mirred.c +++ b/net/sched/act_mirred.c | |||
@@ -185,7 +185,7 @@ static int tcf_mirred(struct sk_buff *skb, struct tc_action *a, | |||
185 | skb2->tc_verd = SET_TC_FROM(skb2->tc_verd, at); | 185 | skb2->tc_verd = SET_TC_FROM(skb2->tc_verd, at); |
186 | 186 | ||
187 | skb2->dev = dev; | 187 | skb2->dev = dev; |
188 | skb2->iif = skb->dev->ifindex; | 188 | skb2->skb_iif = skb->dev->ifindex; |
189 | dev_queue_xmit(skb2); | 189 | dev_queue_xmit(skb2); |
190 | err = 0; | 190 | err = 0; |
191 | 191 | ||
diff --git a/net/sched/cls_flow.c b/net/sched/cls_flow.c index 9402a7fd3785..e054c62857e1 100644 --- a/net/sched/cls_flow.c +++ b/net/sched/cls_flow.c | |||
@@ -171,7 +171,7 @@ static u32 flow_get_proto_dst(const struct sk_buff *skb) | |||
171 | 171 | ||
172 | static u32 flow_get_iif(const struct sk_buff *skb) | 172 | static u32 flow_get_iif(const struct sk_buff *skb) |
173 | { | 173 | { |
174 | return skb->iif; | 174 | return skb->skb_iif; |
175 | } | 175 | } |
176 | 176 | ||
177 | static u32 flow_get_priority(const struct sk_buff *skb) | 177 | static u32 flow_get_priority(const struct sk_buff *skb) |
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index bb230d5d7085..83a4aada0b4c 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c | |||
@@ -4085,7 +4085,7 @@ static int selinux_sock_rcv_skb_compat(struct sock *sk, struct sk_buff *skb, | |||
4085 | char *addrp; | 4085 | char *addrp; |
4086 | 4086 | ||
4087 | COMMON_AUDIT_DATA_INIT(&ad, NET); | 4087 | COMMON_AUDIT_DATA_INIT(&ad, NET); |
4088 | ad.u.net.netif = skb->iif; | 4088 | ad.u.net.netif = skb->skb_iif; |
4089 | ad.u.net.family = family; | 4089 | ad.u.net.family = family; |
4090 | err = selinux_parse_skb(skb, &ad, &addrp, 1, NULL); | 4090 | err = selinux_parse_skb(skb, &ad, &addrp, 1, NULL); |
4091 | if (err) | 4091 | if (err) |
@@ -4147,7 +4147,7 @@ static int selinux_socket_sock_rcv_skb(struct sock *sk, struct sk_buff *skb) | |||
4147 | return 0; | 4147 | return 0; |
4148 | 4148 | ||
4149 | COMMON_AUDIT_DATA_INIT(&ad, NET); | 4149 | COMMON_AUDIT_DATA_INIT(&ad, NET); |
4150 | ad.u.net.netif = skb->iif; | 4150 | ad.u.net.netif = skb->skb_iif; |
4151 | ad.u.net.family = family; | 4151 | ad.u.net.family = family; |
4152 | err = selinux_parse_skb(skb, &ad, &addrp, 1, NULL); | 4152 | err = selinux_parse_skb(skb, &ad, &addrp, 1, NULL); |
4153 | if (err) | 4153 | if (err) |
@@ -4159,7 +4159,7 @@ static int selinux_socket_sock_rcv_skb(struct sock *sk, struct sk_buff *skb) | |||
4159 | err = selinux_skb_peerlbl_sid(skb, family, &peer_sid); | 4159 | err = selinux_skb_peerlbl_sid(skb, family, &peer_sid); |
4160 | if (err) | 4160 | if (err) |
4161 | return err; | 4161 | return err; |
4162 | err = selinux_inet_sys_rcv_skb(skb->iif, addrp, family, | 4162 | err = selinux_inet_sys_rcv_skb(skb->skb_iif, addrp, family, |
4163 | peer_sid, &ad); | 4163 | peer_sid, &ad); |
4164 | if (err) { | 4164 | if (err) { |
4165 | selinux_netlbl_err(skb, err, 0); | 4165 | selinux_netlbl_err(skb, err, 0); |
diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c index c33b6bb9b6dd..529c9ca65878 100644 --- a/security/smack/smack_lsm.c +++ b/security/smack/smack_lsm.c | |||
@@ -2602,7 +2602,7 @@ static int smack_socket_sock_rcv_skb(struct sock *sk, struct sk_buff *skb) | |||
2602 | #ifdef CONFIG_AUDIT | 2602 | #ifdef CONFIG_AUDIT |
2603 | smk_ad_init(&ad, __func__, LSM_AUDIT_DATA_NET); | 2603 | smk_ad_init(&ad, __func__, LSM_AUDIT_DATA_NET); |
2604 | ad.a.u.net.family = sk->sk_family; | 2604 | ad.a.u.net.family = sk->sk_family; |
2605 | ad.a.u.net.netif = skb->iif; | 2605 | ad.a.u.net.netif = skb->skb_iif; |
2606 | ipv4_skb_to_auditdata(skb, &ad.a, NULL); | 2606 | ipv4_skb_to_auditdata(skb, &ad.a, NULL); |
2607 | #endif | 2607 | #endif |
2608 | /* | 2608 | /* |
@@ -2757,7 +2757,7 @@ static int smack_inet_conn_request(struct sock *sk, struct sk_buff *skb, | |||
2757 | #ifdef CONFIG_AUDIT | 2757 | #ifdef CONFIG_AUDIT |
2758 | smk_ad_init(&ad, __func__, LSM_AUDIT_DATA_NET); | 2758 | smk_ad_init(&ad, __func__, LSM_AUDIT_DATA_NET); |
2759 | ad.a.u.net.family = family; | 2759 | ad.a.u.net.family = family; |
2760 | ad.a.u.net.netif = skb->iif; | 2760 | ad.a.u.net.netif = skb->skb_iif; |
2761 | ipv4_skb_to_auditdata(skb, &ad.a, NULL); | 2761 | ipv4_skb_to_auditdata(skb, &ad.a, NULL); |
2762 | #endif | 2762 | #endif |
2763 | /* | 2763 | /* |