]> www.infradead.org Git - users/jedix/linux-maple.git/commitdiff
bpf: Adjust argument names of arch_prepare_bpf_trampoline()
authorSong Liu <song@kernel.org>
Wed, 6 Dec 2023 22:40:49 +0000 (14:40 -0800)
committerAlexei Starovoitov <ast@kernel.org>
Thu, 7 Dec 2023 01:17:20 +0000 (17:17 -0800)
We are using "im" for "struct bpf_tramp_image" and "tr" for "struct
bpf_trampoline" in most of the code base. The only exception is the
prototype and fallback version of arch_prepare_bpf_trampoline(). Update
them to match the rest of the code base.

We mix "orig_call" and "func_addr" for the argument in different versions
of arch_prepare_bpf_trampoline(). s/orig_call/func_addr/g so they match.

Signed-off-by: Song Liu <song@kernel.org>
Acked-by: Ilya Leoshkevich <iii@linux.ibm.com>
Tested-by: Ilya Leoshkevich <iii@linux.ibm.com> # on s390x
Acked-by: Jiri Olsa <jolsa@kernel.org>
Link: https://lore.kernel.org/r/20231206224054.492250-3-song@kernel.org
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
arch/arm64/net/bpf_jit_comp.c
include/linux/bpf.h
kernel/bpf/trampoline.c

index 7d4af64e398286d2036c4cdbfbbab0f6611e12de..d81b886ea4df6c2367e04ac0ce2da3f3d777f280 100644 (file)
@@ -1828,7 +1828,7 @@ static void restore_args(struct jit_ctx *ctx, int args_off, int nregs)
  *
  */
 static int prepare_trampoline(struct jit_ctx *ctx, struct bpf_tramp_image *im,
-                             struct bpf_tramp_links *tlinks, void *orig_call,
+                             struct bpf_tramp_links *tlinks, void *func_addr,
                              int nregs, u32 flags)
 {
        int i;
@@ -1926,7 +1926,7 @@ static int prepare_trampoline(struct jit_ctx *ctx, struct bpf_tramp_image *im,
 
        if (flags & BPF_TRAMP_F_IP_ARG) {
                /* save ip address of the traced function */
-               emit_addr_mov_i64(A64_R(10), (const u64)orig_call, ctx);
+               emit_addr_mov_i64(A64_R(10), (const u64)func_addr, ctx);
                emit(A64_STR64I(A64_R(10), A64_SP, ip_off), ctx);
        }
 
@@ -2029,7 +2029,7 @@ static int prepare_trampoline(struct jit_ctx *ctx, struct bpf_tramp_image *im,
 int arch_prepare_bpf_trampoline(struct bpf_tramp_image *im, void *image,
                                void *image_end, const struct btf_func_model *m,
                                u32 flags, struct bpf_tramp_links *tlinks,
-                               void *orig_call)
+                               void *func_addr)
 {
        int i, ret;
        int nregs = m->nr_args;
@@ -2050,7 +2050,7 @@ int arch_prepare_bpf_trampoline(struct bpf_tramp_image *im, void *image,
        if (nregs > 8)
                return -ENOTSUPP;
 
-       ret = prepare_trampoline(&ctx, im, tlinks, orig_call, nregs, flags);
+       ret = prepare_trampoline(&ctx, im, tlinks, func_addr, nregs, flags);
        if (ret < 0)
                return ret;
 
@@ -2061,7 +2061,7 @@ int arch_prepare_bpf_trampoline(struct bpf_tramp_image *im, void *image,
        ctx.idx = 0;
 
        jit_fill_hole(image, (unsigned int)(image_end - image));
-       ret = prepare_trampoline(&ctx, im, tlinks, orig_call, nregs, flags);
+       ret = prepare_trampoline(&ctx, im, tlinks, func_addr, nregs, flags);
 
        if (ret > 0 && validate_code(&ctx) < 0)
                ret = -EINVAL;
index 7a483f6b6d5f9f18a562f1728831e7da839018e9..17eb6d905204a7b060a3c23204fc9bea9e0eabc8 100644 (file)
@@ -1098,10 +1098,10 @@ struct bpf_tramp_run_ctx;
  *      fexit = a set of program to run after original function
  */
 struct bpf_tramp_image;
-int arch_prepare_bpf_trampoline(struct bpf_tramp_image *tr, void *image, void *image_end,
+int arch_prepare_bpf_trampoline(struct bpf_tramp_image *im, void *image, void *image_end,
                                const struct btf_func_model *m, u32 flags,
                                struct bpf_tramp_links *tlinks,
-                               void *orig_call);
+                               void *func_addr);
 u64 notrace __bpf_prog_enter_sleepable_recur(struct bpf_prog *prog,
                                             struct bpf_tramp_run_ctx *run_ctx);
 void notrace __bpf_prog_exit_sleepable_recur(struct bpf_prog *prog, u64 start,
index e97aeda3a86b55522a73e53279543cb5b4df6919..e114a1c7961ea77886a64ffc405b7a40372d8b7d 100644 (file)
@@ -1032,10 +1032,10 @@ bpf_trampoline_exit_t bpf_trampoline_exit(const struct bpf_prog *prog)
 }
 
 int __weak
-arch_prepare_bpf_trampoline(struct bpf_tramp_image *tr, void *image, void *image_end,
+arch_prepare_bpf_trampoline(struct bpf_tramp_image *im, void *image, void *image_end,
                            const struct btf_func_model *m, u32 flags,
                            struct bpf_tramp_links *tlinks,
-                           void *orig_call)
+                           void *func_addr)
 {
        return -ENOTSUPP;
 }