From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-13.8 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PULL_REQUEST,MAILING_LIST_MULTI, MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 00D86C432C0 for ; Mon, 25 Nov 2019 23:24:27 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id D11DE20409 for ; Mon, 25 Nov 2019 23:24:26 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725945AbfKYXY0 (ORCPT ); Mon, 25 Nov 2019 18:24:26 -0500 Received: from www62.your-server.de ([213.133.104.62]:42048 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725912AbfKYXY0 (ORCPT ); Mon, 25 Nov 2019 18:24:26 -0500 Received: from 11.248.197.178.dynamic.dsl-lte-bonding.zhbmb00p-msn.res.cust.swisscom.ch ([178.197.248.11] helo=localhost) by www62.your-server.de with esmtpsa (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.89_1) (envelope-from ) id 1iZNiL-0000Z2-7M; Tue, 26 Nov 2019 00:24:17 +0100 From: Daniel Borkmann To: davem@davemloft.net Cc: jakub.kicinski@netronome.com, daniel@iogearbox.net, ast@kernel.org, netdev@vger.kernel.org, bpf@vger.kernel.org Subject: pull-request: bpf-next 2019-11-26 Date: Tue, 26 Nov 2019 00:24:16 +0100 Message-Id: <20191125232416.4287-1-daniel@iogearbox.net> X-Mailer: git-send-email 2.21.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.101.4/25644/Mon Nov 25 10:54:22 2019) Sender: bpf-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: bpf@vger.kernel.org Hi David, The following pull-request contains BPF updates for your *net-next* tree. We've added 2 non-merge commits during the last 1 day(s) which contain a total of 2 files changed, 14 insertions(+), 3 deletions(-). The main changes, 2 small fixes are: 1) Fix libbpf out of tree compilation which complained about unknown u32 type used in libbpf_find_vmlinux_btf_id() which needs to be __u32 instead, from Andrii Nakryiko. 2) Follow-up fix for the prior BPF mmap series where kbuild bot complained about missing vmalloc_user_node_flags() for no-MMU, also from Andrii Nakryiko. Please consider pulling these changes from: git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git Thanks a lot! Also thanks to reporters, reviewers and testers of commits in this pull-request: Johannes Weiner, John Fastabend, kbuild test robot ---------------------------------------------------------------- The following changes since commit c431047c4efe7903fb1c5a23e0f3f8eb1efc89f9: enetc: add support Credit Based Shaper(CBS) for hardware offload (2019-11-25 10:53:15 -0800) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git for you to fetch changes up to b615e5a1e067dcb327482d1af7463268b89b1629: libbpf: Fix usage of u32 in userspace code (2019-11-25 13:52:01 -0800) ---------------------------------------------------------------- Andrii Nakryiko (2): mm: Implement no-MMU variant of vmalloc_user_node_flags libbpf: Fix usage of u32 in userspace code mm/nommu.c | 15 +++++++++++++-- tools/lib/bpf/libbpf.c | 2 +- 2 files changed, 14 insertions(+), 3 deletions(-)