diff options
author | David S. Miller <davem@davemloft.net> | 2017-10-22 08:36:53 -0400 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2017-10-22 08:39:14 -0400 |
commit | f8ddadc4db6c7b7029b6d0e0d9af24f74ad27ca2 (patch) | |
tree | 0a6432aba336bae42313613f4c891bcfce02bd4e /tools/include/uapi/linux/bpf.h | |
parent | bdd091bab8c631bd2801af838e344fad34566410 (diff) | |
parent | b5ac3beb5a9f0ef0ea64cd85faf94c0dc4de0e42 (diff) |
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net
There were quite a few overlapping sets of changes here.
Daniel's bug fix for off-by-ones in the new BPF branch instructions,
along with the added allowances for "data_end > ptr + x" forms
collided with the metadata additions.
Along with those three changes came veritifer test cases, which in
their final form I tried to group together properly. If I had just
trimmed GIT's conflict tags as-is, this would have split up the
meta tests unnecessarily.
In the socketmap code, a set of preemption disabling changes
overlapped with the rename of bpf_compute_data_end() to
bpf_compute_data_pointers().
Changes were made to the mv88e6060.c driver set addr method
which got removed in net-next.
The hyperv transport socket layer had a locking change in 'net'
which overlapped with a change of socket state macro usage
in 'net-next'.
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'tools/include/uapi/linux/bpf.h')
-rw-r--r-- | tools/include/uapi/linux/bpf.h | 5 |
1 files changed, 3 insertions, 2 deletions
diff --git a/tools/include/uapi/linux/bpf.h b/tools/include/uapi/linux/bpf.h index fa93033dc521..850a5497dcc3 100644 --- a/tools/include/uapi/linux/bpf.h +++ b/tools/include/uapi/linux/bpf.h | |||
@@ -366,7 +366,7 @@ union bpf_attr { | |||
366 | * jump into another BPF program | 366 | * jump into another BPF program |
367 | * @ctx: context pointer passed to next program | 367 | * @ctx: context pointer passed to next program |
368 | * @prog_array_map: pointer to map which type is BPF_MAP_TYPE_PROG_ARRAY | 368 | * @prog_array_map: pointer to map which type is BPF_MAP_TYPE_PROG_ARRAY |
369 | * @index: index inside array that selects specific program to run | 369 | * @index: 32-bit index inside array that selects specific program to run |
370 | * Return: 0 on success or negative error | 370 | * Return: 0 on success or negative error |
371 | * | 371 | * |
372 | * int bpf_clone_redirect(skb, ifindex, flags) | 372 | * int bpf_clone_redirect(skb, ifindex, flags) |
@@ -623,9 +623,10 @@ union bpf_attr { | |||
623 | * @flags: reserved for future use | 623 | * @flags: reserved for future use |
624 | * Return: 0 on success or negative error code | 624 | * Return: 0 on success or negative error code |
625 | * | 625 | * |
626 | * int bpf_sk_redirect_map(map, key, flags) | 626 | * int bpf_sk_redirect_map(skb, map, key, flags) |
627 | * Redirect skb to a sock in map using key as a lookup key for the | 627 | * Redirect skb to a sock in map using key as a lookup key for the |
628 | * sock in map. | 628 | * sock in map. |
629 | * @skb: pointer to skb | ||
629 | * @map: pointer to sockmap | 630 | * @map: pointer to sockmap |
630 | * @key: key to lookup sock in map | 631 | * @key: key to lookup sock in map |
631 | * @flags: reserved for future use | 632 | * @flags: reserved for future use |