From patchwork Wed Aug 19 19:27:23 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jakub Kicinski X-Patchwork-Id: 1347982 X-Patchwork-Delegate: bpf@iogearbox.net Return-Path: X-Original-To: patchwork-incoming-netdev@ozlabs.org Delivered-To: patchwork-incoming-netdev@ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org (client-ip=23.128.96.18; helo=vger.kernel.org; envelope-from=netdev-owner@vger.kernel.org; receiver=) Authentication-Results: ozlabs.org; dmarc=pass (p=none dis=none) header.from=kernel.org Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256 header.s=default header.b=NY2jzr+0; dkim-atps=neutral Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by ozlabs.org (Postfix) with ESMTP id 4BWyWd3h30z9sRK for ; Thu, 20 Aug 2020 05:29:01 +1000 (AEST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726868AbgHST26 (ORCPT ); Wed, 19 Aug 2020 15:28:58 -0400 Received: from mail.kernel.org ([198.145.29.99]:37410 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726435AbgHST25 (ORCPT ); Wed, 19 Aug 2020 15:28:57 -0400 Received: from kicinski-fedora-PC1C0HJN.thefacebook.com (unknown [163.114.132.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E17712078D; Wed, 19 Aug 2020 19:28:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1597865337; bh=Fi3+BUE5A4mXbTiMqGBNYNQ6dnKXtOhLvcPzHlq40Y4=; h=From:To:Cc:Subject:Date:From; b=NY2jzr+0+YkeoePQDcog1D8FiUOpX2wtpImRgPqE05cvDqC3usRZ8xtMkXqb0Fg7y a2seXfIOXkuNo3o81Cv/vMR4mfy2hJkspDhZAfb3T2nNSsMemUiiwVsN4zePnNxSig U+viYjmFMu30l7KA2G1nBQ8toiowx5CEa5FIf5ck= From: Jakub Kicinski To: bpf@vger.kernel.org Cc: netdev@vger.kernel.org, Jakub Kicinski Subject: [PATCH bpf] bpf: refer to struct xdp_md in user space comments Date: Wed, 19 Aug 2020 12:27:23 -0700 Message-Id: <20200819192723.838228-1-kuba@kernel.org> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org uAPI uses xdp_md, not xdp_buff. Fix comments. Signed-off-by: Jakub Kicinski Acked-by: Yonghong Song --- include/uapi/linux/bpf.h | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/include/uapi/linux/bpf.h b/include/uapi/linux/bpf.h index 0480f893facd..cc3553a102d0 100644 --- a/include/uapi/linux/bpf.h +++ b/include/uapi/linux/bpf.h @@ -1554,7 +1554,7 @@ union bpf_attr { * Return * 0 on success, or a negative error in case of failure. * - * long bpf_xdp_adjust_head(struct xdp_buff *xdp_md, int delta) + * long bpf_xdp_adjust_head(struct xdp_md *xdp_md, int delta) * Description * Adjust (move) *xdp_md*\ **->data** by *delta* bytes. Note that * it is possible to use a negative value for *delta*. This helper @@ -1752,7 +1752,7 @@ union bpf_attr { * Return * 0 on success, or a negative error in case of failure. * - * long bpf_xdp_adjust_meta(struct xdp_buff *xdp_md, int delta) + * long bpf_xdp_adjust_meta(struct xdp_md *xdp_md, int delta) * Description * Adjust the address pointed by *xdp_md*\ **->data_meta** by * *delta* (which can be positive or negative). Note that this @@ -2051,7 +2051,7 @@ union bpf_attr { * Return * 0 on success, or a negative error in case of failure. * - * long bpf_xdp_adjust_tail(struct xdp_buff *xdp_md, int delta) + * long bpf_xdp_adjust_tail(struct xdp_md *xdp_md, int delta) * Description * Adjust (move) *xdp_md*\ **->data_end** by *delta* bytes. It is * possible to both shrink and grow the packet tail. @@ -3049,7 +3049,7 @@ union bpf_attr { * The value to write, of *size*, is passed through eBPF stack and * pointed by *data*. * - * *ctx* is a pointer to in-kernel struct xdp_buff. + * *ctx* is a pointer to in-kernel struct xdp_md. * * This helper is similar to **bpf_perf_eventoutput**\ () but * restricted to raw_tracepoint bpf programs.