[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <160677420568.31377.5525835460046675997.git-patchwork-notify@kernel.org>
Date: Mon, 30 Nov 2020 22:10:05 +0000
From: patchwork-bot+netdevbpf@...nel.org
To: Björn Töpel <bjorn.topel@...il.com>@ci.codeaurora.org
Cc: ast@...nel.org, daniel@...earbox.net, netdev@...r.kernel.org,
bpf@...r.kernel.org, bjorn.topel@...el.com,
jonathan.lemon@...il.com, magnus.karlsson@...el.com,
maximmi@...dia.com
Subject: Re: [PATCH bpf] xdp: Handle MEM_TYPE_XSK_BUFF_POOL correctly in
xdp_return_buff()
Hello:
This patch was applied to bpf/bpf.git (refs/heads/master):
On Fri, 27 Nov 2020 18:17:26 +0100 you wrote:
> From: Björn Töpel <bjorn.topel@...el.com>
>
> It turns out that it does exist a path where xdp_return_buff() is
> being passed an XDP buffer of type MEM_TYPE_XSK_BUFF_POOL. This path
> is when AF_XDP zero-copy mode is enabled, and a buffer is redirected
> to a DEVMAP with an attached XDP program that drops the buffer.
>
> [...]
Here is the summary with links:
- [bpf] xdp: Handle MEM_TYPE_XSK_BUFF_POOL correctly in xdp_return_buff()
https://git.kernel.org/bpf/bpf/c/ed1182dc004d
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists