tcp: Make tcp_update_seqack_wnd()s force_seq parameter explicitly boolean
This parameter is already treated as a boolean internally. Make it a 'bool' type for clarity. Signed-off-by: David Gibson <david@gibson.dropbear.id.au> Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
This commit is contained in:
parent
265b2099c7
commit
bb41901c71
3 changed files with 5 additions and 5 deletions
6
tcp.c
6
tcp.c
|
@ -1020,7 +1020,7 @@ size_t tcp_l2_buf_fill_headers(const struct tcp_tap_conn *conn,
|
||||||
* Return: 1 if sequence or window were updated, 0 otherwise
|
* Return: 1 if sequence or window were updated, 0 otherwise
|
||||||
*/
|
*/
|
||||||
int tcp_update_seqack_wnd(const struct ctx *c, struct tcp_tap_conn *conn,
|
int tcp_update_seqack_wnd(const struct ctx *c, struct tcp_tap_conn *conn,
|
||||||
int force_seq, struct tcp_info *tinfo)
|
bool force_seq, struct tcp_info *tinfo)
|
||||||
{
|
{
|
||||||
uint32_t prev_wnd_to_tap = conn->wnd_to_tap << conn->ws_to_tap;
|
uint32_t prev_wnd_to_tap = conn->wnd_to_tap << conn->ws_to_tap;
|
||||||
uint32_t prev_ack_to_tap = conn->seq_ack_to_tap;
|
uint32_t prev_ack_to_tap = conn->seq_ack_to_tap;
|
||||||
|
@ -1157,7 +1157,7 @@ int tcp_prepare_flags(const struct ctx *c, struct tcp_tap_conn *conn,
|
||||||
if (!(conn->flags & LOCAL))
|
if (!(conn->flags & LOCAL))
|
||||||
tcp_rtt_dst_check(conn, &tinfo);
|
tcp_rtt_dst_check(conn, &tinfo);
|
||||||
|
|
||||||
if (!tcp_update_seqack_wnd(c, conn, flags, &tinfo) && !flags)
|
if (!tcp_update_seqack_wnd(c, conn, !!flags, &tinfo) && !flags)
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
*optlen = 0;
|
*optlen = 0;
|
||||||
|
@ -2240,7 +2240,7 @@ void tcp_sock_handler(const struct ctx *c, union epoll_ref ref,
|
||||||
tcp_data_from_sock(c, conn);
|
tcp_data_from_sock(c, conn);
|
||||||
|
|
||||||
if (events & EPOLLOUT)
|
if (events & EPOLLOUT)
|
||||||
tcp_update_seqack_wnd(c, conn, 0, NULL);
|
tcp_update_seqack_wnd(c, conn, false, NULL);
|
||||||
|
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
|
@ -511,7 +511,7 @@ int tcp_buf_data_from_sock(const struct ctx *c, struct tcp_tap_conn *conn)
|
||||||
last_len = sendlen - (send_bufs - 1) * mss;
|
last_len = sendlen - (send_bufs - 1) * mss;
|
||||||
|
|
||||||
/* Likely, some new data was acked too. */
|
/* Likely, some new data was acked too. */
|
||||||
tcp_update_seqack_wnd(c, conn, 0, NULL);
|
tcp_update_seqack_wnd(c, conn, false, NULL);
|
||||||
|
|
||||||
/* Finally, queue to tap */
|
/* Finally, queue to tap */
|
||||||
dlen = mss;
|
dlen = mss;
|
||||||
|
|
|
@ -93,7 +93,7 @@ size_t tcp_l2_buf_fill_headers(const struct tcp_tap_conn *conn,
|
||||||
struct iovec *iov, size_t dlen,
|
struct iovec *iov, size_t dlen,
|
||||||
const uint16_t *check, uint32_t seq);
|
const uint16_t *check, uint32_t seq);
|
||||||
int tcp_update_seqack_wnd(const struct ctx *c, struct tcp_tap_conn *conn,
|
int tcp_update_seqack_wnd(const struct ctx *c, struct tcp_tap_conn *conn,
|
||||||
int force_seq, struct tcp_info *tinfo);
|
bool force_seq, struct tcp_info *tinfo);
|
||||||
int tcp_prepare_flags(const struct ctx *c, struct tcp_tap_conn *conn, int flags,
|
int tcp_prepare_flags(const struct ctx *c, struct tcp_tap_conn *conn, int flags,
|
||||||
struct tcphdr *th, char *data, size_t *optlen);
|
struct tcphdr *th, char *data, size_t *optlen);
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue