From: Xu Kuohai <xukuohai@xxxxxxxxxx> What function sock_map_get_from_fd does is to attach a bpf prog to a sock map, so rename it to sock_map_prog_attach to make it more readable. Signed-off-by: Xu Kuohai <xukuohai@xxxxxxxxxx> --- include/linux/bpf.h | 2 +- kernel/bpf/syscall.c | 2 +- net/core/sock_map.c | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/include/linux/bpf.h b/include/linux/bpf.h index 12596af59c00..7a0c801f2795 100644 --- a/include/linux/bpf.h +++ b/include/linux/bpf.h @@ -2799,7 +2799,7 @@ int bpf_prog_test_run_syscall(struct bpf_prog *prog, const union bpf_attr *kattr, union bpf_attr __user *uattr); -int sock_map_get_from_fd(const union bpf_attr *attr, struct bpf_prog *prog); +int sock_map_prog_attach(const union bpf_attr *attr, struct bpf_prog *prog); int sock_map_prog_detach(const union bpf_attr *attr, enum bpf_prog_type ptype); int sock_map_update_elem_sys(struct bpf_map *map, void *key, void *value, u64 flags); int sock_map_bpf_prog_query(const union bpf_attr *attr, diff --git a/kernel/bpf/syscall.c b/kernel/bpf/syscall.c index ebeb0695305a..087a097d74d4 100644 --- a/kernel/bpf/syscall.c +++ b/kernel/bpf/syscall.c @@ -3822,7 +3822,7 @@ static int bpf_prog_attach(const union bpf_attr *attr) switch (ptype) { case BPF_PROG_TYPE_SK_SKB: case BPF_PROG_TYPE_SK_MSG: - ret = sock_map_get_from_fd(attr, prog); + ret = sock_map_prog_attach(attr, prog); break; case BPF_PROG_TYPE_LIRC_MODE2: ret = lirc_prog_attach(attr, prog); diff --git a/net/core/sock_map.c b/net/core/sock_map.c index 8f07fea39d9e..26706b667f44 100644 --- a/net/core/sock_map.c +++ b/net/core/sock_map.c @@ -57,7 +57,7 @@ static struct bpf_map *sock_map_alloc(union bpf_attr *attr) return &stab->map; } -int sock_map_get_from_fd(const union bpf_attr *attr, struct bpf_prog *prog) +int sock_map_prog_attach(const union bpf_attr *attr, struct bpf_prog *prog) { u32 ufd = attr->target_fd; struct bpf_map *map; -- 2.30.2