diff options
author | Daniel Borkmann | 2019-07-15 23:02:17 +0200 |
---|---|---|
committer | Daniel Borkmann | 2019-07-15 23:02:17 +0200 |
commit | 896bcc908a2f422acf604ad0717aee593f3e823f (patch) | |
tree | dcc396b062456daa3af5a598587dfbc604aa7c8c /crypto/xor.c | |
parent | af3c24e0e2ed25177b03b60ada9117bb596e8d95 (diff) | |
parent | 8981e56fa17282598571958ae6a29cbc3209a6cb (diff) |
Merge branch 'bpf-btf-size-verification-fix'
Andrii Nakryiko says:
====================
BTF size resolution logic isn't always resolving type size correctly, leading
to erroneous map creation failures due to value size mismatch.
This patch set:
1. fixes the issue (patch #1);
2. adds tests for trickier cases (patch #2);
3. and converts few test cases utilizing BTF-defined maps, that previously
couldn't use typedef'ed arrays due to kernel bug (patch #3).
====================
Acked-by: Yonghong Song <yhs@fb.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Diffstat (limited to 'crypto/xor.c')
0 files changed, 0 insertions, 0 deletions