Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net
There were quite a few overlapping sets of changes here. Daniel's bug fix for off-by-ones in the new BPF branch instructions, along with the added allowances for "data_end > ptr + x" forms collided with the metadata additions. Along with those three changes came veritifer test cases, which in their final form I tried to group together properly. If I had just trimmed GIT's conflict tags as-is, this would have split up the meta tests unnecessarily. In the socketmap code, a set of preemption disabling changes overlapped with the rename of bpf_compute_data_end() to bpf_compute_data_pointers(). Changes were made to the mv88e6060.c driver set addr method which got removed in net-next. The hyperv transport socket layer had a locking change in 'net' which overlapped with a change of socket state macro usage in 'net-next'. Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
@@ -2307,6 +2307,7 @@ void netlink_ack(struct sk_buff *in_skb, struct nlmsghdr *nlh, int err,
|
||||
size_t tlvlen = 0;
|
||||
struct netlink_sock *nlk = nlk_sk(NETLINK_CB(in_skb).sk);
|
||||
unsigned int flags = 0;
|
||||
bool nlk_has_extack = nlk->flags & NETLINK_F_EXT_ACK;
|
||||
|
||||
/* Error messages get the original request appened, unless the user
|
||||
* requests to cap the error message, and get extra error data if
|
||||
@@ -2317,7 +2318,7 @@ void netlink_ack(struct sk_buff *in_skb, struct nlmsghdr *nlh, int err,
|
||||
payload += nlmsg_len(nlh);
|
||||
else
|
||||
flags |= NLM_F_CAPPED;
|
||||
if (nlk->flags & NETLINK_F_EXT_ACK && extack) {
|
||||
if (nlk_has_extack && extack) {
|
||||
if (extack->_msg)
|
||||
tlvlen += nla_total_size(strlen(extack->_msg) + 1);
|
||||
if (extack->bad_attr)
|
||||
@@ -2326,8 +2327,7 @@ void netlink_ack(struct sk_buff *in_skb, struct nlmsghdr *nlh, int err,
|
||||
} else {
|
||||
flags |= NLM_F_CAPPED;
|
||||
|
||||
if (nlk->flags & NETLINK_F_EXT_ACK &&
|
||||
extack && extack->cookie_len)
|
||||
if (nlk_has_extack && extack && extack->cookie_len)
|
||||
tlvlen += nla_total_size(extack->cookie_len);
|
||||
}
|
||||
|
||||
@@ -2347,7 +2347,7 @@ void netlink_ack(struct sk_buff *in_skb, struct nlmsghdr *nlh, int err,
|
||||
errmsg->error = err;
|
||||
memcpy(&errmsg->msg, nlh, payload > sizeof(*errmsg) ? nlh->nlmsg_len : sizeof(*nlh));
|
||||
|
||||
if (nlk->flags & NETLINK_F_EXT_ACK && extack) {
|
||||
if (nlk_has_extack && extack) {
|
||||
if (err) {
|
||||
if (extack->_msg)
|
||||
WARN_ON(nla_put_string(skb, NLMSGERR_ATTR_MSG,
|
||||
|
Reference in New Issue
Block a user