From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-16.7 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,INCLUDES_CR_TRAILER,MAILING_LIST_MULTI, MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 320A7C4338F for ; Wed, 4 Aug 2021 22:50:09 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 0A7CC60F41 for ; Wed, 4 Aug 2021 22:50:09 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235260AbhHDWuU (ORCPT ); Wed, 4 Aug 2021 18:50:20 -0400 Received: from mail.kernel.org ([198.145.29.99]:34612 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229775AbhHDWuS (ORCPT ); Wed, 4 Aug 2021 18:50:18 -0400 Received: by mail.kernel.org (Postfix) with ESMTPS id 767D661008; Wed, 4 Aug 2021 22:50:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1628117405; bh=+cXz/rOvQSGw8tu/6sxQ4BKvpQtXXmU5qTfkfz7dRgQ=; h=Subject:From:Date:References:In-Reply-To:To:Cc:From; b=jDkGYmEjZlRgvZuQDCG/KUu5rN5iXERGT5vt0BzBW8G5BQklmDb2KaOC8zYAyl+W7 N6XHoX+kzawuxum+kKivE3XGfyR+AxY5o3uUHeZ79qAQTzBCydyAVOp80mDhJnMq4h QvskNTDNTsaailWpZ4FqS5pc14TtZDM3j99W5BOMAF3IqNwbJFePWI9JBX4lsENqeD 8MqzzYv7evr7zNw8NFSB4RU7Qn2JVYGV9l8flzjoOZ4Ej/jDkM7M/s9I17nK42tt8t ESF3RIJQWzNVYLDfBPiXiyFfxyLsGvfqn9UITLKWyyySNec7R9j1QlPmZqzE2GU1Ea vhVz7IQWQ1Nug== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: Re: [PATCH bpf-next] samples/bpf: xdp_redirect_cpu: Add mprog-disable to optstring. From: patchwork-bot+netdevbpf@kernel.org Message-Id: <162811740542.13655.7097622991414354603.git-patchwork-notify@kernel.org> Date: Wed, 04 Aug 2021 22:50:05 +0000 References: <20210731005632.13228-1-matthew.cover@stackpath.com> In-Reply-To: <20210731005632.13228-1-matthew.cover@stackpath.com> To: Matt Cover Cc: ast@kernel.org, daniel@iogearbox.net, davem@davemloft.net, jakub.kicinski@netronome.com, hawk@kernel.org, john.fastabend@gmail.com, andrii@kernel.org, kafai@fb.com, songliubraving@fb.com, yhs@fb.com, kpsingh@kernel.org, lorenzo@kernel.org, matthew.cover@stackpath.com, netdev@vger.kernel.org, bpf@vger.kernel.org, linux-kernel@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello: This patch was applied to bpf/bpf-next.git (refs/heads/master): On Fri, 30 Jul 2021 17:56:32 -0700 you wrote: > Commit ce4dade7f12a ("samples/bpf: xdp_redirect_cpu: Load a eBPF program > on cpumap") added the following option, but missed adding it to optstring: > - mprog-disable: disable loading XDP program on cpumap entries > > Add the missing option character. > > Fixes: ce4dade7f12a ("samples/bpf: xdp_redirect_cpu: Load a eBPF program on cpumap") > Signed-off-by: Matthew Cover > > [...] Here is the summary with links: - [bpf-next] samples/bpf: xdp_redirect_cpu: Add mprog-disable to optstring. https://git.kernel.org/bpf/bpf-next/c/34ad6d9d8c27 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html