@@ -274,10 +274,10 @@ static struct filterops bpfread_filtops = {
274
274
*
275
275
* 2. An userland application uses ioctl() call to bpf_d descriptor.
276
276
* All such call are serialized with global lock. BPF filters can be
277
- * changed, but pointer to old filter will be freed using epoch_call ().
277
+ * changed, but pointer to old filter will be freed using NET_EPOCH_CALL ().
278
278
* Thus it should be safe for bpf_tap/bpf_mtap* code to do access to
279
279
* filter pointers, even if change will happen during bpf_tap execution.
280
- * Destroying of bpf_d descriptor also is doing using epoch_call ().
280
+ * Destroying of bpf_d descriptor also is doing using NET_EPOCH_CALL ().
281
281
*
282
282
* 3. An userland application can write packets into bpf_d descriptor.
283
283
* There we need to be sure, that ifnet won't disappear during bpfwrite().
@@ -288,7 +288,7 @@ static struct filterops bpfread_filtops = {
288
288
*
289
289
* 5. The kernel invokes bpfdetach() on interface destroying. All lists
290
290
* are modified with global lock held and actual free() is done using
291
- * epoch_call ().
291
+ * NET_EPOCH_CALL ().
292
292
*/
293
293
294
294
static void
@@ -314,7 +314,7 @@ bpfif_rele(struct bpf_if *bp)
314
314
315
315
if (!refcount_release (& bp -> bif_refcnt ))
316
316
return ;
317
- epoch_call ( net_epoch_preempt , & bp -> epoch_ctx , bpfif_free );
317
+ NET_EPOCH_CALL ( bpfif_free , & bp -> epoch_ctx );
318
318
}
319
319
320
320
static void
@@ -330,7 +330,7 @@ bpfd_rele(struct bpf_d *d)
330
330
331
331
if (!refcount_release (& d -> bd_refcnt ))
332
332
return ;
333
- epoch_call ( net_epoch_preempt , & d -> epoch_ctx , bpfd_free );
333
+ NET_EPOCH_CALL ( bpfd_free , & d -> epoch_ctx );
334
334
}
335
335
336
336
static struct bpf_program_buffer *
@@ -2036,8 +2036,7 @@ bpf_setf(struct bpf_d *d, struct bpf_program *fp, u_long cmd)
2036
2036
BPFD_UNLOCK (d );
2037
2037
2038
2038
if (fcode != NULL )
2039
- epoch_call (net_epoch_preempt , & fcode -> epoch_ctx ,
2040
- bpf_program_buffer_free );
2039
+ NET_EPOCH_CALL (bpf_program_buffer_free , & fcode -> epoch_ctx );
2041
2040
2042
2041
if (track_event )
2043
2042
EVENTHANDLER_INVOKE (bpf_track ,
0 commit comments