diff options
| author | Paolo Bonzini <pbonzini@redhat.com> | 2017-02-09 18:01:23 +0300 | 
|---|---|---|
| committer | Paolo Bonzini <pbonzini@redhat.com> | 2017-02-09 18:01:23 +0300 | 
| commit | 2e751dfb5ffd20d1a31837dbc9718741df69bffe (patch) | |
| tree | 8b7e0e47cf0ef4efda0f1090f0ccbbeb17e5a085 /include/linux/filter.h | |
| parent | a0e136d436ded817c0aade72efdefa56a00b4e5e (diff) | |
| parent | 7b6b46311a8562fb3a9e035ed6ffab6d49c28886 (diff) | |
| download | linux-2e751dfb5ffd20d1a31837dbc9718741df69bffe.tar.xz | |
Merge tag 'kvmarm-for-4.11' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD
kvmarm updates for 4.11
- GICv3 save restore
- Cache flushing fixes
- MSI injection fix for GICv3 ITS
- Physical timer emulation support
Diffstat (limited to 'include/linux/filter.h')
| -rw-r--r-- | include/linux/filter.h | 6 | 
1 files changed, 4 insertions, 2 deletions
| diff --git a/include/linux/filter.h b/include/linux/filter.h index a0934e6c9bab..e4eb2546339a 100644 --- a/include/linux/filter.h +++ b/include/linux/filter.h @@ -57,6 +57,8 @@ struct bpf_prog_aux;  /* BPF program can access up to 512 bytes of stack space. */  #define MAX_BPF_STACK	512 +#define BPF_TAG_SIZE	8 +  /* Helper macros for filter block array initializers. */  /* ALU ops on registers, bpf_add|sub|...: dst_reg += src_reg */ @@ -408,7 +410,7 @@ struct bpf_prog {  	kmemcheck_bitfield_end(meta);  	enum bpf_prog_type	type;		/* Type of BPF program */  	u32			len;		/* Number of filter blocks */ -	u32			digest[SHA_DIGEST_WORDS]; /* Program digest */ +	u8			tag[BPF_TAG_SIZE];  	struct bpf_prog_aux	*aux;		/* Auxiliary fields */  	struct sock_fprog_kern	*orig_prog;	/* Original BPF program */  	unsigned int		(*bpf_func)(const void *ctx, @@ -519,7 +521,7 @@ static inline u32 bpf_prog_insn_size(const struct bpf_prog *prog)  	return prog->len * sizeof(struct bpf_insn);  } -static inline u32 bpf_prog_digest_scratch_size(const struct bpf_prog *prog) +static inline u32 bpf_prog_tag_scratch_size(const struct bpf_prog *prog)  {  	return round_up(bpf_prog_insn_size(prog) +  			sizeof(__be64) + 1, SHA_MESSAGE_BYTES); | 
