Searched hist:"248 f346ffe9508dee0039db4ac839cb31ba3bdec" (Results 1 – 3 of 3) sorted by relevance
/linux/kernel/bpf/ |
H A D | syscall.c | diff 248f346ffe9508dee0039db4ac839cb31ba3bdec Fri Nov 03 21:56:20 CET 2017 Jakub Kicinski <jakub.kicinski@netronome.com> xdp: allow attaching programs loaded for specific device
Pass the netdev pointer to bpf_prog_get_type(). This way BPF code can decide whether the device matches what the code was loaded/translated for.
Signed-off-by: Jakub Kicinski <jakub.kicinski@netronome.com> Reviewed-by: Simon Horman <simon.horman@netronome.com> Reviewed-by: Quentin Monnet <quentin.monnet@netronome.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|
/linux/include/linux/ |
H A D | bpf.h | diff 248f346ffe9508dee0039db4ac839cb31ba3bdec Fri Nov 03 21:56:20 CET 2017 Jakub Kicinski <jakub.kicinski@netronome.com> xdp: allow attaching programs loaded for specific device
Pass the netdev pointer to bpf_prog_get_type(). This way BPF code can decide whether the device matches what the code was loaded/translated for.
Signed-off-by: Jakub Kicinski <jakub.kicinski@netronome.com> Reviewed-by: Simon Horman <simon.horman@netronome.com> Reviewed-by: Quentin Monnet <quentin.monnet@netronome.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|
/linux/net/core/ |
H A D | dev.c | diff 248f346ffe9508dee0039db4ac839cb31ba3bdec Fri Nov 03 21:56:20 CET 2017 Jakub Kicinski <jakub.kicinski@netronome.com> xdp: allow attaching programs loaded for specific device
Pass the netdev pointer to bpf_prog_get_type(). This way BPF code can decide whether the device matches what the code was loaded/translated for.
Signed-off-by: Jakub Kicinski <jakub.kicinski@netronome.com> Reviewed-by: Simon Horman <simon.horman@netronome.com> Reviewed-by: Quentin Monnet <quentin.monnet@netronome.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|