bpf_verifer_log =>
bpf_verifier_log

Signed-off-by: Martin KaFai Lau <ka...@fb.com>
Acked-by: Alexei Starovoitov <a...@fb.com>
---
 include/linux/bpf_verifier.h | 6 +++---
 kernel/bpf/verifier.c        | 4 ++--
 2 files changed, 5 insertions(+), 5 deletions(-)

diff --git a/include/linux/bpf_verifier.h b/include/linux/bpf_verifier.h
index 6b66cd1aa0b9..c30668414b22 100644
--- a/include/linux/bpf_verifier.h
+++ b/include/linux/bpf_verifier.h
@@ -153,7 +153,7 @@ struct bpf_insn_aux_data {
 
 #define BPF_VERIFIER_TMP_LOG_SIZE      1024
 
-struct bpf_verifer_log {
+struct bpf_verifier_log {
        u32 level;
        char kbuf[BPF_VERIFIER_TMP_LOG_SIZE];
        char __user *ubuf;
@@ -161,7 +161,7 @@ struct bpf_verifer_log {
        u32 len_total;
 };
 
-static inline bool bpf_verifier_log_full(const struct bpf_verifer_log *log)
+static inline bool bpf_verifier_log_full(const struct bpf_verifier_log *log)
 {
        return log->len_used >= log->len_total - 1;
 }
@@ -185,7 +185,7 @@ struct bpf_verifier_env {
        bool allow_ptr_leaks;
        bool seen_direct_write;
        struct bpf_insn_aux_data *insn_aux_data; /* array of per-insn state */
-       struct bpf_verifer_log log;
+       struct bpf_verifier_log log;
        u32 subprog_starts[BPF_MAX_SUBPROGS];
        /* computes the stack depth of each bpf function */
        u16 subprog_stack_depth[BPF_MAX_SUBPROGS + 1];
diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c
index e93a6e48641b..1e84e02ff733 100644
--- a/kernel/bpf/verifier.c
+++ b/kernel/bpf/verifier.c
@@ -171,7 +171,7 @@ static DEFINE_MUTEX(bpf_verifier_lock);
 static void log_write(struct bpf_verifier_env *env, const char *fmt,
                      va_list args)
 {
-       struct bpf_verifer_log *log = &env->log;
+       struct bpf_verifier_log *log = &env->log;
        unsigned int n;
 
        if (!log->level || !log->ubuf || bpf_verifier_log_full(log))
@@ -5611,7 +5611,7 @@ static void free_states(struct bpf_verifier_env *env)
 int bpf_check(struct bpf_prog **prog, union bpf_attr *attr)
 {
        struct bpf_verifier_env *env;
-       struct bpf_verifer_log *log;
+       struct bpf_verifier_log *log;
        int ret = -EINVAL;
 
        /* no program is valid */
-- 
2.9.5

Reply via email to