Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp133790ybc; Mon, 18 Nov 2019 21:54:50 -0800 (PST) X-Google-Smtp-Source: APXvYqylTERTJwPodYgLqwacvmT8e9PylODc2PBUO933XYO4eXtrMIk0NPAmqCUl8XUQvjDCq2BW X-Received: by 2002:a17:906:c293:: with SMTP id r19mr32111800ejz.69.1574142890577; Mon, 18 Nov 2019 21:54:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574142890; cv=none; d=google.com; s=arc-20160816; b=IEDEu5fIm8FZ8oTTzmFimrVfaQiQh/0u0mQrmbgmCNhqitfKUtRYZCg9Lg9pSu56Vb /AThI9z87uigu3LbqbbHJPDaXo4cDsYj+stW0P8pHjKJwKeBxjk9E+sKodmqOavFZpvX lj5LzZejmu/7twydAUF79R9cQka5AK6Zeo1xNWQNMBEzTPpbrD6XpC83kCSt9MRtOZWC boZbdWvhZ4y990HmoLHkBV5AN8EkbSoeY5YrgyKx4n9AxT6waawZQdmfCrq619QEong2 OyUCupba/Z9yXlMX2y4XIVOshuldKwNF7t4pPIK+/IiD5GjkNDO9YPDwBbPSBnN+cbtX vTgQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=K0BSeIDV0zhLgm7/miutKf+As4rjUzqHDf57cbnvUf0=; b=dW4N67yidZu3r04UKPgGXoWJcmYh1TFaNNXo3uzJrLjPiBewwaEIsOCMBmQKs+pI+k YWpvGQK5lpZ+sdqDSSWttvwygTogkIkbq8VW/Xmw6Ikxqi4fQOu15Xu0Q8pqDaSw7Q8c wivyfd1vjBaMRPt3KRVLOECDYpyQ+UjLPVcADvwCBh5YmEVn5b7ihqgUL8yTdlSzTma0 xjfF9HmuLsDRm5SWAhJ82lfcBRTEBkPkbxSKgugZrNFRHgliH6rV+17gbwUgYCVBjM8C txxFLT2qhCy91XPIsXsUeXnyG81oSYFu2RWobwlwlEkwfs2ga++cWVVw1wKhBS1PTjK0 bynA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Cz52qiPO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id qc22si10698035ejb.151.2019.11.18.21.54.25; Mon, 18 Nov 2019 21:54:50 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Cz52qiPO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731968AbfKSFxF (ORCPT + 99 others); Tue, 19 Nov 2019 00:53:05 -0500 Received: from mail.kernel.org ([198.145.29.99]:50916 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731036AbfKSFxD (ORCPT ); Tue, 19 Nov 2019 00:53:03 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E31B921823; Tue, 19 Nov 2019 05:53:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1574142782; bh=46aynxYa1blruQAizaAJje0TP9KsL3W8yOgn6Hl7da0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Cz52qiPOPC1pdgtLuhJrUscOot2CW9PZu/qZ8ThGCjO0Vnt7pxIBnHvZTyHdjLzKs UQBZQIYt+mEjgJc47l1OsGjjxS/8nJs4NLccdgMy9ZGiay4FLIYjCKcd1EUO3YJpBi MvTH6/PEwITC22uYE4czGVBwsjpt/whNf9J22CfM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Prashant Bhole , Song Liu , Daniel Borkmann , Sasha Levin Subject: [PATCH 4.14 171/239] samples/bpf: fix compilation failure Date: Tue, 19 Nov 2019 06:19:31 +0100 Message-Id: <20191119051333.987386908@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191119051255.850204959@linuxfoundation.org> References: <20191119051255.850204959@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Prashant Bhole [ Upstream commit 32c009798385ce21080beaa87a9b95faad3acd1e ] following commit: commit d58e468b1112 ("flow_dissector: implements flow dissector BPF hook") added struct bpf_flow_keys which conflicts with the struct with same name in sockex2_kern.c and sockex3_kern.c similar to commit: commit 534e0e52bc23 ("samples/bpf: fix a compilation failure") we tried the rename it "flow_keys" but it also conflicted with struct having same name in include/net/flow_dissector.h. Hence renaming the struct to "flow_key_record". Also, this commit doesn't fix the compilation error completely because the similar struct is present in sockex3_kern.c. Hence renaming it in both files sockex3_user.c and sockex3_kern.c Signed-off-by: Prashant Bhole Acked-by: Song Liu Signed-off-by: Daniel Borkmann Signed-off-by: Sasha Levin --- samples/bpf/sockex2_kern.c | 11 ++++++----- samples/bpf/sockex3_kern.c | 8 ++++---- samples/bpf/sockex3_user.c | 4 ++-- 3 files changed, 12 insertions(+), 11 deletions(-) diff --git a/samples/bpf/sockex2_kern.c b/samples/bpf/sockex2_kern.c index f58acfc925561..f2f9dbc021b0d 100644 --- a/samples/bpf/sockex2_kern.c +++ b/samples/bpf/sockex2_kern.c @@ -14,7 +14,7 @@ struct vlan_hdr { __be16 h_vlan_encapsulated_proto; }; -struct bpf_flow_keys { +struct flow_key_record { __be32 src; __be32 dst; union { @@ -59,7 +59,7 @@ static inline __u32 ipv6_addr_hash(struct __sk_buff *ctx, __u64 off) } static inline __u64 parse_ip(struct __sk_buff *skb, __u64 nhoff, __u64 *ip_proto, - struct bpf_flow_keys *flow) + struct flow_key_record *flow) { __u64 verlen; @@ -83,7 +83,7 @@ static inline __u64 parse_ip(struct __sk_buff *skb, __u64 nhoff, __u64 *ip_proto } static inline __u64 parse_ipv6(struct __sk_buff *skb, __u64 nhoff, __u64 *ip_proto, - struct bpf_flow_keys *flow) + struct flow_key_record *flow) { *ip_proto = load_byte(skb, nhoff + offsetof(struct ipv6hdr, nexthdr)); @@ -96,7 +96,8 @@ static inline __u64 parse_ipv6(struct __sk_buff *skb, __u64 nhoff, __u64 *ip_pro return nhoff; } -static inline bool flow_dissector(struct __sk_buff *skb, struct bpf_flow_keys *flow) +static inline bool flow_dissector(struct __sk_buff *skb, + struct flow_key_record *flow) { __u64 nhoff = ETH_HLEN; __u64 ip_proto; @@ -198,7 +199,7 @@ struct bpf_map_def SEC("maps") hash_map = { SEC("socket2") int bpf_prog2(struct __sk_buff *skb) { - struct bpf_flow_keys flow = {}; + struct flow_key_record flow = {}; struct pair *value; u32 key; diff --git a/samples/bpf/sockex3_kern.c b/samples/bpf/sockex3_kern.c index 95907f8d2b17d..c527b57d3ec8a 100644 --- a/samples/bpf/sockex3_kern.c +++ b/samples/bpf/sockex3_kern.c @@ -61,7 +61,7 @@ struct vlan_hdr { __be16 h_vlan_encapsulated_proto; }; -struct bpf_flow_keys { +struct flow_key_record { __be32 src; __be32 dst; union { @@ -88,7 +88,7 @@ static inline __u32 ipv6_addr_hash(struct __sk_buff *ctx, __u64 off) } struct globals { - struct bpf_flow_keys flow; + struct flow_key_record flow; }; struct bpf_map_def SEC("maps") percpu_map = { @@ -114,14 +114,14 @@ struct pair { struct bpf_map_def SEC("maps") hash_map = { .type = BPF_MAP_TYPE_HASH, - .key_size = sizeof(struct bpf_flow_keys), + .key_size = sizeof(struct flow_key_record), .value_size = sizeof(struct pair), .max_entries = 1024, }; static void update_stats(struct __sk_buff *skb, struct globals *g) { - struct bpf_flow_keys key = g->flow; + struct flow_key_record key = g->flow; struct pair *value; value = bpf_map_lookup_elem(&hash_map, &key); diff --git a/samples/bpf/sockex3_user.c b/samples/bpf/sockex3_user.c index 4d75674bee35e..741b899b693f3 100644 --- a/samples/bpf/sockex3_user.c +++ b/samples/bpf/sockex3_user.c @@ -13,7 +13,7 @@ #define PARSE_IP_PROG_FD (prog_fd[0]) #define PROG_ARRAY_FD (map_fd[0]) -struct flow_keys { +struct flow_key_record { __be32 src; __be32 dst; union { @@ -64,7 +64,7 @@ int main(int argc, char **argv) (void) f; for (i = 0; i < 5; i++) { - struct flow_keys key = {}, next_key; + struct flow_key_record key = {}, next_key; struct pair value; sleep(1); -- 2.20.1