Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net
Conflicts:
drivers/net/ethernet/emulex/benet/be_main.c
drivers/net/ethernet/intel/igb/igb_main.c
drivers/net/wireless/brcm80211/brcmsmac/mac80211_if.c
include/net/scm.h
net/batman-adv/routing.c
net/ipv4/tcp_input.c
The e{uid,gid} --> {uid,gid} credentials fix conflicted with the
cleanup in net-next to now pass cred structs around.
The be2net driver had a bug fix in 'net' that overlapped with the VLAN
interface changes by Patrick McHardy in net-next.
An IGB conflict existed because in 'net' the build_skb() support was
reverted, and in 'net-next' there was a comment style fix within that
code.
Several batman-adv conflicts were resolved by making sure that all
calls to batadv_is_my_mac() are changed to have a new bat_priv first
argument.
Eric Dumazet's TS ECR fix in TCP in 'net' conflicted with the F-RTO
rewrite in 'net-next', mostly overlapping changes.
Thanks to Stephen Rothwell and Antonio Quartulli for help with several
of these merge resolutions.
Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
@@ -291,6 +291,7 @@ ip_set_hash_destroy(struct ip_set *set)
|
||||
#define type_pf_data_tlist TOKEN(TYPE, PF, _data_tlist)
|
||||
#define type_pf_data_next TOKEN(TYPE, PF, _data_next)
|
||||
#define type_pf_data_flags TOKEN(TYPE, PF, _data_flags)
|
||||
#define type_pf_data_reset_flags TOKEN(TYPE, PF, _data_reset_flags)
|
||||
#ifdef IP_SET_HASH_WITH_NETS
|
||||
#define type_pf_data_match TOKEN(TYPE, PF, _data_match)
|
||||
#else
|
||||
@@ -385,9 +386,9 @@ type_pf_resize(struct ip_set *set, bool retried)
|
||||
struct ip_set_hash *h = set->data;
|
||||
struct htable *t, *orig = h->table;
|
||||
u8 htable_bits = orig->htable_bits;
|
||||
const struct type_pf_elem *data;
|
||||
struct type_pf_elem *data;
|
||||
struct hbucket *n, *m;
|
||||
u32 i, j;
|
||||
u32 i, j, flags = 0;
|
||||
int ret;
|
||||
|
||||
retry:
|
||||
@@ -412,9 +413,16 @@ retry:
|
||||
n = hbucket(orig, i);
|
||||
for (j = 0; j < n->pos; j++) {
|
||||
data = ahash_data(n, j);
|
||||
#ifdef IP_SET_HASH_WITH_NETS
|
||||
flags = 0;
|
||||
type_pf_data_reset_flags(data, &flags);
|
||||
#endif
|
||||
m = hbucket(t, HKEY(data, h->initval, htable_bits));
|
||||
ret = type_pf_elem_add(m, data, AHASH_MAX(h), 0);
|
||||
ret = type_pf_elem_add(m, data, AHASH_MAX(h), flags);
|
||||
if (ret < 0) {
|
||||
#ifdef IP_SET_HASH_WITH_NETS
|
||||
type_pf_data_flags(data, flags);
|
||||
#endif
|
||||
read_unlock_bh(&set->lock);
|
||||
ahash_destroy(t);
|
||||
if (ret == -EAGAIN)
|
||||
@@ -836,9 +844,9 @@ type_pf_tresize(struct ip_set *set, bool retried)
|
||||
struct ip_set_hash *h = set->data;
|
||||
struct htable *t, *orig = h->table;
|
||||
u8 htable_bits = orig->htable_bits;
|
||||
const struct type_pf_elem *data;
|
||||
struct type_pf_elem *data;
|
||||
struct hbucket *n, *m;
|
||||
u32 i, j;
|
||||
u32 i, j, flags = 0;
|
||||
int ret;
|
||||
|
||||
/* Try to cleanup once */
|
||||
@@ -873,10 +881,17 @@ retry:
|
||||
n = hbucket(orig, i);
|
||||
for (j = 0; j < n->pos; j++) {
|
||||
data = ahash_tdata(n, j);
|
||||
#ifdef IP_SET_HASH_WITH_NETS
|
||||
flags = 0;
|
||||
type_pf_data_reset_flags(data, &flags);
|
||||
#endif
|
||||
m = hbucket(t, HKEY(data, h->initval, htable_bits));
|
||||
ret = type_pf_elem_tadd(m, data, AHASH_MAX(h), 0,
|
||||
ip_set_timeout_get(type_pf_data_timeout(data)));
|
||||
ret = type_pf_elem_tadd(m, data, AHASH_MAX(h), flags,
|
||||
ip_set_timeout_get(type_pf_data_timeout(data)));
|
||||
if (ret < 0) {
|
||||
#ifdef IP_SET_HASH_WITH_NETS
|
||||
type_pf_data_flags(data, flags);
|
||||
#endif
|
||||
read_unlock_bh(&set->lock);
|
||||
ahash_destroy(t);
|
||||
if (ret == -EAGAIN)
|
||||
@@ -1187,6 +1202,7 @@ type_pf_gc_init(struct ip_set *set)
|
||||
#undef type_pf_data_tlist
|
||||
#undef type_pf_data_next
|
||||
#undef type_pf_data_flags
|
||||
#undef type_pf_data_reset_flags
|
||||
#undef type_pf_data_match
|
||||
|
||||
#undef type_pf_elem
|
||||
|
||||
Reference in New Issue
Block a user