aboutsummaryrefslogtreecommitdiffstats
path: root/tools/include/uapi/linux/bpf.h
diff options
context:
space:
mode:
authorDavid S. Miller <davem@davemloft.net>2017-10-22 08:36:53 -0400
committerDavid S. Miller <davem@davemloft.net>2017-10-22 08:39:14 -0400
commitf8ddadc4db6c7b7029b6d0e0d9af24f74ad27ca2 (patch)
tree0a6432aba336bae42313613f4c891bcfce02bd4e /tools/include/uapi/linux/bpf.h
parentbdd091bab8c631bd2801af838e344fad34566410 (diff)
parentb5ac3beb5a9f0ef0ea64cd85faf94c0dc4de0e42 (diff)
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net
There were quite a few overlapping sets of changes here. Daniel's bug fix for off-by-ones in the new BPF branch instructions, along with the added allowances for "data_end > ptr + x" forms collided with the metadata additions. Along with those three changes came veritifer test cases, which in their final form I tried to group together properly. If I had just trimmed GIT's conflict tags as-is, this would have split up the meta tests unnecessarily. In the socketmap code, a set of preemption disabling changes overlapped with the rename of bpf_compute_data_end() to bpf_compute_data_pointers(). Changes were made to the mv88e6060.c driver set addr method which got removed in net-next. The hyperv transport socket layer had a locking change in 'net' which overlapped with a change of socket state macro usage in 'net-next'. Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'tools/include/uapi/linux/bpf.h')
-rw-r--r--tools/include/uapi/linux/bpf.h5
1 files changed, 3 insertions, 2 deletions
diff --git a/tools/include/uapi/linux/bpf.h b/tools/include/uapi/linux/bpf.h
index fa93033dc521..850a5497dcc3 100644
--- a/tools/include/uapi/linux/bpf.h
+++ b/tools/include/uapi/linux/bpf.h
@@ -366,7 +366,7 @@ union bpf_attr {
366 * jump into another BPF program 366 * jump into another BPF program
367 * @ctx: context pointer passed to next program 367 * @ctx: context pointer passed to next program
368 * @prog_array_map: pointer to map which type is BPF_MAP_TYPE_PROG_ARRAY 368 * @prog_array_map: pointer to map which type is BPF_MAP_TYPE_PROG_ARRAY
369 * @index: index inside array that selects specific program to run 369 * @index: 32-bit index inside array that selects specific program to run
370 * Return: 0 on success or negative error 370 * Return: 0 on success or negative error
371 * 371 *
372 * int bpf_clone_redirect(skb, ifindex, flags) 372 * int bpf_clone_redirect(skb, ifindex, flags)
@@ -623,9 +623,10 @@ union bpf_attr {
623 * @flags: reserved for future use 623 * @flags: reserved for future use
624 * Return: 0 on success or negative error code 624 * Return: 0 on success or negative error code
625 * 625 *
626 * int bpf_sk_redirect_map(map, key, flags) 626 * int bpf_sk_redirect_map(skb, map, key, flags)
627 * Redirect skb to a sock in map using key as a lookup key for the 627 * Redirect skb to a sock in map using key as a lookup key for the
628 * sock in map. 628 * sock in map.
629 * @skb: pointer to skb
629 * @map: pointer to sockmap 630 * @map: pointer to sockmap
630 * @key: key to lookup sock in map 631 * @key: key to lookup sock in map
631 * @flags: reserved for future use 632 * @flags: reserved for future use