diff options
-rw-r--r-- | include/uapi/linux/bpf.h | 4 | ||||
-rw-r--r-- | kernel/bpf/verifier.c | 4 | ||||
-rw-r--r-- | net/core/filter.c | 10 | ||||
-rw-r--r-- | samples/bpf/bpf_helpers.h | 4 | ||||
-rw-r--r-- | samples/bpf/test_cgrp2_tc_kern.c | 2 |
5 files changed, 12 insertions, 12 deletions
diff --git a/include/uapi/linux/bpf.h b/include/uapi/linux/bpf.h index da218fec6056..9e5fc168c8a3 100644 --- a/include/uapi/linux/bpf.h +++ b/include/uapi/linux/bpf.h | |||
@@ -339,7 +339,7 @@ enum bpf_func_id { | |||
339 | BPF_FUNC_skb_change_type, | 339 | BPF_FUNC_skb_change_type, |
340 | 340 | ||
341 | /** | 341 | /** |
342 | * bpf_skb_in_cgroup(skb, map, index) - Check cgroup2 membership of skb | 342 | * bpf_skb_under_cgroup(skb, map, index) - Check cgroup2 membership of skb |
343 | * @skb: pointer to skb | 343 | * @skb: pointer to skb |
344 | * @map: pointer to bpf_map in BPF_MAP_TYPE_CGROUP_ARRAY type | 344 | * @map: pointer to bpf_map in BPF_MAP_TYPE_CGROUP_ARRAY type |
345 | * @index: index of the cgroup in the bpf_map | 345 | * @index: index of the cgroup in the bpf_map |
@@ -348,7 +348,7 @@ enum bpf_func_id { | |||
348 | * == 1 skb succeeded the cgroup2 descendant test | 348 | * == 1 skb succeeded the cgroup2 descendant test |
349 | * < 0 error | 349 | * < 0 error |
350 | */ | 350 | */ |
351 | BPF_FUNC_skb_in_cgroup, | 351 | BPF_FUNC_skb_under_cgroup, |
352 | 352 | ||
353 | /** | 353 | /** |
354 | * bpf_get_hash_recalc(skb) | 354 | * bpf_get_hash_recalc(skb) |
diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c index 7094c69ac199..daea765d72e6 100644 --- a/kernel/bpf/verifier.c +++ b/kernel/bpf/verifier.c | |||
@@ -1053,7 +1053,7 @@ static int check_map_func_compatibility(struct bpf_map *map, int func_id) | |||
1053 | goto error; | 1053 | goto error; |
1054 | break; | 1054 | break; |
1055 | case BPF_MAP_TYPE_CGROUP_ARRAY: | 1055 | case BPF_MAP_TYPE_CGROUP_ARRAY: |
1056 | if (func_id != BPF_FUNC_skb_in_cgroup) | 1056 | if (func_id != BPF_FUNC_skb_under_cgroup) |
1057 | goto error; | 1057 | goto error; |
1058 | break; | 1058 | break; |
1059 | default: | 1059 | default: |
@@ -1075,7 +1075,7 @@ static int check_map_func_compatibility(struct bpf_map *map, int func_id) | |||
1075 | if (map->map_type != BPF_MAP_TYPE_STACK_TRACE) | 1075 | if (map->map_type != BPF_MAP_TYPE_STACK_TRACE) |
1076 | goto error; | 1076 | goto error; |
1077 | break; | 1077 | break; |
1078 | case BPF_FUNC_skb_in_cgroup: | 1078 | case BPF_FUNC_skb_under_cgroup: |
1079 | if (map->map_type != BPF_MAP_TYPE_CGROUP_ARRAY) | 1079 | if (map->map_type != BPF_MAP_TYPE_CGROUP_ARRAY) |
1080 | goto error; | 1080 | goto error; |
1081 | break; | 1081 | break; |
diff --git a/net/core/filter.c b/net/core/filter.c index b5add4ef0d1d..bd9bf2e5fafa 100644 --- a/net/core/filter.c +++ b/net/core/filter.c | |||
@@ -2317,7 +2317,7 @@ bpf_get_skb_set_tunnel_proto(enum bpf_func_id which) | |||
2317 | } | 2317 | } |
2318 | 2318 | ||
2319 | #ifdef CONFIG_SOCK_CGROUP_DATA | 2319 | #ifdef CONFIG_SOCK_CGROUP_DATA |
2320 | static u64 bpf_skb_in_cgroup(u64 r1, u64 r2, u64 r3, u64 r4, u64 r5) | 2320 | static u64 bpf_skb_under_cgroup(u64 r1, u64 r2, u64 r3, u64 r4, u64 r5) |
2321 | { | 2321 | { |
2322 | struct sk_buff *skb = (struct sk_buff *)(long)r1; | 2322 | struct sk_buff *skb = (struct sk_buff *)(long)r1; |
2323 | struct bpf_map *map = (struct bpf_map *)(long)r2; | 2323 | struct bpf_map *map = (struct bpf_map *)(long)r2; |
@@ -2340,8 +2340,8 @@ static u64 bpf_skb_in_cgroup(u64 r1, u64 r2, u64 r3, u64 r4, u64 r5) | |||
2340 | return cgroup_is_descendant(sock_cgroup_ptr(&sk->sk_cgrp_data), cgrp); | 2340 | return cgroup_is_descendant(sock_cgroup_ptr(&sk->sk_cgrp_data), cgrp); |
2341 | } | 2341 | } |
2342 | 2342 | ||
2343 | static const struct bpf_func_proto bpf_skb_in_cgroup_proto = { | 2343 | static const struct bpf_func_proto bpf_skb_under_cgroup_proto = { |
2344 | .func = bpf_skb_in_cgroup, | 2344 | .func = bpf_skb_under_cgroup, |
2345 | .gpl_only = false, | 2345 | .gpl_only = false, |
2346 | .ret_type = RET_INTEGER, | 2346 | .ret_type = RET_INTEGER, |
2347 | .arg1_type = ARG_PTR_TO_CTX, | 2347 | .arg1_type = ARG_PTR_TO_CTX, |
@@ -2421,8 +2421,8 @@ tc_cls_act_func_proto(enum bpf_func_id func_id) | |||
2421 | case BPF_FUNC_get_smp_processor_id: | 2421 | case BPF_FUNC_get_smp_processor_id: |
2422 | return &bpf_get_smp_processor_id_proto; | 2422 | return &bpf_get_smp_processor_id_proto; |
2423 | #ifdef CONFIG_SOCK_CGROUP_DATA | 2423 | #ifdef CONFIG_SOCK_CGROUP_DATA |
2424 | case BPF_FUNC_skb_in_cgroup: | 2424 | case BPF_FUNC_skb_under_cgroup: |
2425 | return &bpf_skb_in_cgroup_proto; | 2425 | return &bpf_skb_under_cgroup_proto; |
2426 | #endif | 2426 | #endif |
2427 | default: | 2427 | default: |
2428 | return sk_filter_func_proto(func_id); | 2428 | return sk_filter_func_proto(func_id); |
diff --git a/samples/bpf/bpf_helpers.h b/samples/bpf/bpf_helpers.h index 217c8d507f2e..7927a090fa0d 100644 --- a/samples/bpf/bpf_helpers.h +++ b/samples/bpf/bpf_helpers.h | |||
@@ -72,8 +72,8 @@ static int (*bpf_l3_csum_replace)(void *ctx, int off, int from, int to, int flag | |||
72 | (void *) BPF_FUNC_l3_csum_replace; | 72 | (void *) BPF_FUNC_l3_csum_replace; |
73 | static int (*bpf_l4_csum_replace)(void *ctx, int off, int from, int to, int flags) = | 73 | static int (*bpf_l4_csum_replace)(void *ctx, int off, int from, int to, int flags) = |
74 | (void *) BPF_FUNC_l4_csum_replace; | 74 | (void *) BPF_FUNC_l4_csum_replace; |
75 | static int (*bpf_skb_in_cgroup)(void *ctx, void *map, int index) = | 75 | static int (*bpf_skb_under_cgroup)(void *ctx, void *map, int index) = |
76 | (void *) BPF_FUNC_skb_in_cgroup; | 76 | (void *) BPF_FUNC_skb_under_cgroup; |
77 | 77 | ||
78 | #if defined(__x86_64__) | 78 | #if defined(__x86_64__) |
79 | 79 | ||
diff --git a/samples/bpf/test_cgrp2_tc_kern.c b/samples/bpf/test_cgrp2_tc_kern.c index 2732c37c8d5b..10ff73404e3a 100644 --- a/samples/bpf/test_cgrp2_tc_kern.c +++ b/samples/bpf/test_cgrp2_tc_kern.c | |||
@@ -57,7 +57,7 @@ int handle_egress(struct __sk_buff *skb) | |||
57 | bpf_trace_printk(dont_care_msg, sizeof(dont_care_msg), | 57 | bpf_trace_printk(dont_care_msg, sizeof(dont_care_msg), |
58 | eth->h_proto, ip6h->nexthdr); | 58 | eth->h_proto, ip6h->nexthdr); |
59 | return TC_ACT_OK; | 59 | return TC_ACT_OK; |
60 | } else if (bpf_skb_in_cgroup(skb, &test_cgrp2_array_pin, 0) != 1) { | 60 | } else if (bpf_skb_under_cgroup(skb, &test_cgrp2_array_pin, 0) != 1) { |
61 | bpf_trace_printk(pass_msg, sizeof(pass_msg)); | 61 | bpf_trace_printk(pass_msg, sizeof(pass_msg)); |
62 | return TC_ACT_OK; | 62 | return TC_ACT_OK; |
63 | } else { | 63 | } else { |