diff --git a/src/core/bpf-firewall.c b/src/core/bpf-firewall.c index e0cbe16463..fce885da87 100644 --- a/src/core/bpf-firewall.c +++ b/src/core/bpf-firewall.c @@ -547,9 +547,9 @@ int bpf_firewall_compile(Unit *u) { if (!cc) return -EINVAL; - crt = unit_setup_cgroup_runtime(u); + crt = unit_get_cgroup_runtime(u); if (!crt) - return -ENOMEM; + return -ESTALE; if (bpf_program_supported() <= 0) return log_unit_debug_errno(u, SYNTHETIC_ERRNO(EOPNOTSUPP), diff --git a/src/test/test-bpf-firewall.c b/src/test/test-bpf-firewall.c index f431529ff6..7f06589907 100644 --- a/src/test/test-bpf-firewall.c +++ b/src/test/test-bpf-firewall.c @@ -49,7 +49,8 @@ int main(int argc, char *argv[]) { if (!can_memlock()) return log_tests_skipped("Can't use mlock()"); - r = enter_cgroup_subroot(NULL); + _cleanup_free_ char *cgroup_path = NULL; + r = enter_cgroup_subroot(&cgroup_path); if (r == -ENOMEDIUM) return log_tests_skipped("cgroupfs not available"); @@ -128,6 +129,8 @@ int main(int argc, char *argv[]) { SERVICE(u)->type = SERVICE_ONESHOT; u->load_state = UNIT_LOADED; + CGroupRuntime *crt = ASSERT_PTR(unit_setup_cgroup_runtime(u)); + unit_dump(u, stdout, NULL); r = bpf_firewall_compile(u); @@ -135,7 +138,6 @@ int main(int argc, char *argv[]) { return log_tests_skipped("Kernel doesn't support the necessary bpf bits (masked out via seccomp?)"); ASSERT_OK(r); - CGroupRuntime *crt = ASSERT_PTR(unit_get_cgroup_runtime(u)); ASSERT_NOT_NULL(crt->ip_bpf_ingress); ASSERT_NOT_NULL(crt->ip_bpf_egress);