Blame SOURCES/0018-Update-kernel-headers.patch

359b1d
From 98f0c643a333ff630407828f4141131502edc6f9 Mon Sep 17 00:00:00 2001
359b1d
From: Andrea Claudi <aclaudi@redhat.com>
359b1d
Date: Thu, 4 Jun 2020 19:26:50 +0200
359b1d
Subject: [PATCH] Update kernel headers
359b1d
359b1d
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1812207
359b1d
Upstream Status: unknown commit 3d72f125c300d
359b1d
359b1d
commit 3d72f125c300dd261a5151cf1cac7cfa152376b2
359b1d
Author: David Ahern <dsahern@gmail.com>
359b1d
Date:   Sun Sep 15 10:32:58 2019 -0700
359b1d
359b1d
    Update kernel headers
359b1d
359b1d
    Update kernel headers to commit:
359b1d
        aa2eaa8c272a ("Merge git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net")
359b1d
359b1d
    Signed-off-by: David Ahern <dsahern@gmail.com>
359b1d
---
359b1d
 include/uapi/linux/bpf.h       | 15 ++++++++++++---
359b1d
 include/uapi/linux/can.h       | 20 +++++++++++++++++++-
359b1d
 include/uapi/linux/devlink.h   | 11 +++++++++++
359b1d
 include/uapi/linux/inet_diag.h |  9 +++++++++
359b1d
 include/uapi/linux/pkt_cls.h   |  2 ++
359b1d
 include/uapi/linux/sctp.h      |  3 +++
359b1d
 6 files changed, 56 insertions(+), 4 deletions(-)
359b1d
359b1d
diff --git a/include/uapi/linux/bpf.h b/include/uapi/linux/bpf.h
359b1d
index 3e195ff43fa01..6d55239a4cc0f 100644
359b1d
--- a/include/uapi/linux/bpf.h
359b1d
+++ b/include/uapi/linux/bpf.h
359b1d
@@ -106,6 +106,7 @@ enum bpf_cmd {
359b1d
 	BPF_TASK_FD_QUERY,
359b1d
 	BPF_MAP_LOOKUP_AND_DELETE_ELEM,
359b1d
 	BPF_MAP_FREEZE,
359b1d
+	BPF_BTF_GET_NEXT_ID,
359b1d
 };
359b1d
 
359b1d
 enum bpf_map_type {
359b1d
@@ -284,6 +285,9 @@ enum bpf_attach_type {
359b1d
  */
359b1d
 #define BPF_F_TEST_RND_HI32	(1U << 2)
359b1d
 
359b1d
+/* The verifier internal test flag. Behavior is undefined */
359b1d
+#define BPF_F_TEST_STATE_FREQ	(1U << 3)
359b1d
+
359b1d
 /* When BPF ldimm64's insn[0].src_reg != 0 then this can have
359b1d
  * two extensions:
359b1d
  *
359b1d
@@ -337,6 +341,9 @@ enum bpf_attach_type {
359b1d
 #define BPF_F_RDONLY_PROG	(1U << 7)
359b1d
 #define BPF_F_WRONLY_PROG	(1U << 8)
359b1d
 
359b1d
+/* Clone map from listener for newly accepted socket */
359b1d
+#define BPF_F_CLONE		(1U << 9)
359b1d
+
359b1d
 /* flags for BPF_PROG_QUERY */
359b1d
 #define BPF_F_QUERY_EFFECTIVE	(1U << 0)
359b1d
 
359b1d
@@ -577,6 +584,8 @@ union bpf_attr {
359b1d
  * 		limited to five).
359b1d
  *
359b1d
  * 		Each time the helper is called, it appends a line to the trace.
359b1d
+ * 		Lines are discarded while *\/sys/kernel/debug/tracing/trace* is
359b1d
+ * 		open, use *\/sys/kernel/debug/tracing/trace_pipe* to avoid this.
359b1d
  * 		The format of the trace is customizable, and the exact output
359b1d
  * 		one will get depends on the options set in
359b1d
  * 		*\/sys/kernel/debug/tracing/trace_options* (see also the
359b1d
@@ -1015,7 +1024,7 @@ union bpf_attr {
359b1d
  * 		The realm of the route for the packet associated to *skb*, or 0
359b1d
  * 		if none was found.
359b1d
  *
359b1d
- * int bpf_perf_event_output(struct pt_reg *ctx, struct bpf_map *map, u64 flags, void *data, u64 size)
359b1d
+ * int bpf_perf_event_output(struct pt_regs *ctx, struct bpf_map *map, u64 flags, void *data, u64 size)
359b1d
  * 	Description
359b1d
  * 		Write raw *data* blob into a special BPF perf event held by
359b1d
  * 		*map* of type **BPF_MAP_TYPE_PERF_EVENT_ARRAY**. This perf
359b1d
@@ -1077,7 +1086,7 @@ union bpf_attr {
359b1d
  * 	Return
359b1d
  * 		0 on success, or a negative error in case of failure.
359b1d
  *
359b1d
- * int bpf_get_stackid(struct pt_reg *ctx, struct bpf_map *map, u64 flags)
359b1d
+ * int bpf_get_stackid(struct pt_regs *ctx, struct bpf_map *map, u64 flags)
359b1d
  * 	Description
359b1d
  * 		Walk a user or a kernel stack and return its id. To achieve
359b1d
  * 		this, the helper needs *ctx*, which is a pointer to the context
359b1d
@@ -1726,7 +1735,7 @@ union bpf_attr {
359b1d
  * 	Return
359b1d
  * 		0 on success, or a negative error in case of failure.
359b1d
  *
359b1d
- * int bpf_override_return(struct pt_reg *regs, u64 rc)
359b1d
+ * int bpf_override_return(struct pt_regs *regs, u64 rc)
359b1d
  * 	Description
359b1d
  * 		Used for error injection, this helper uses kprobes to override
359b1d
  * 		the return value of the probed function, and to set it to *rc*.
359b1d
diff --git a/include/uapi/linux/can.h b/include/uapi/linux/can.h
359b1d
index 9009f0b6505cf..c61cdc7ad5cc6 100644
359b1d
--- a/include/uapi/linux/can.h
359b1d
+++ b/include/uapi/linux/can.h
359b1d
@@ -157,7 +157,8 @@ struct canfd_frame {
359b1d
 #define CAN_TP20	4 /* VAG Transport Protocol v2.0 */
359b1d
 #define CAN_MCNET	5 /* Bosch MCNet */
359b1d
 #define CAN_ISOTP	6 /* ISO 15765-2 Transport Protocol */
359b1d
-#define CAN_NPROTO	7
359b1d
+#define CAN_J1939	7 /* SAE J1939 */
359b1d
+#define CAN_NPROTO	8
359b1d
 
359b1d
 #define SOL_CAN_BASE 100
359b1d
 
359b1d
@@ -174,6 +175,23 @@ struct sockaddr_can {
359b1d
 		/* transport protocol class address information (e.g. ISOTP) */
359b1d
 		struct { canid_t rx_id, tx_id; } tp;
359b1d
 
359b1d
+		/* J1939 address information */
359b1d
+		struct {
359b1d
+			/* 8 byte name when using dynamic addressing */
359b1d
+			__u64 name;
359b1d
+
359b1d
+			/* pgn:
359b1d
+			 * 8 bit: PS in PDU2 case, else 0
359b1d
+			 * 8 bit: PF
359b1d
+			 * 1 bit: DP
359b1d
+			 * 1 bit: reserved
359b1d
+			 */
359b1d
+			__u32 pgn;
359b1d
+
359b1d
+			/* 1 byte address */
359b1d
+			__u8 addr;
359b1d
+		} j1939;
359b1d
+
359b1d
 		/* reserved for future CAN protocols address information */
359b1d
 	} can_addr;
359b1d
 };
359b1d
diff --git a/include/uapi/linux/devlink.h b/include/uapi/linux/devlink.h
359b1d
index 3fb683bee6ba1..79e1405db67cc 100644
359b1d
--- a/include/uapi/linux/devlink.h
359b1d
+++ b/include/uapi/linux/devlink.h
359b1d
@@ -202,6 +202,15 @@ enum devlink_param_cmode {
359b1d
 enum devlink_param_fw_load_policy_value {
359b1d
 	DEVLINK_PARAM_FW_LOAD_POLICY_VALUE_DRIVER,
359b1d
 	DEVLINK_PARAM_FW_LOAD_POLICY_VALUE_FLASH,
359b1d
+	DEVLINK_PARAM_FW_LOAD_POLICY_VALUE_DISK,
359b1d
+	DEVLINK_PARAM_FW_LOAD_POLICY_VALUE_UNKNOWN,
359b1d
+};
359b1d
+
359b1d
+enum devlink_param_reset_dev_on_drv_probe_value {
359b1d
+	DEVLINK_PARAM_RESET_DEV_ON_DRV_PROBE_VALUE_UNKNOWN,
359b1d
+	DEVLINK_PARAM_RESET_DEV_ON_DRV_PROBE_VALUE_ALWAYS,
359b1d
+	DEVLINK_PARAM_RESET_DEV_ON_DRV_PROBE_VALUE_NEVER,
359b1d
+	DEVLINK_PARAM_RESET_DEV_ON_DRV_PROBE_VALUE_DISK,
359b1d
 };
359b1d
 
359b1d
 enum {
359b1d
@@ -410,6 +419,8 @@ enum devlink_attr {
359b1d
 	DEVLINK_ATTR_TRAP_METADATA,			/* nested */
359b1d
 	DEVLINK_ATTR_TRAP_GROUP_NAME,			/* string */
359b1d
 
359b1d
+	DEVLINK_ATTR_RELOAD_FAILED,			/* u8 0 or 1 */
359b1d
+
359b1d
 	/* add new attributes above here, update the policy in devlink.c */
359b1d
 
359b1d
 	__DEVLINK_ATTR_MAX,
359b1d
diff --git a/include/uapi/linux/inet_diag.h b/include/uapi/linux/inet_diag.h
359b1d
index f3bcd7ee82771..3dff6841486a4 100644
359b1d
--- a/include/uapi/linux/inet_diag.h
359b1d
+++ b/include/uapi/linux/inet_diag.h
359b1d
@@ -153,11 +153,20 @@ enum {
359b1d
 	INET_DIAG_BBRINFO,	/* request as INET_DIAG_VEGASINFO */
359b1d
 	INET_DIAG_CLASS_ID,	/* request as INET_DIAG_TCLASS */
359b1d
 	INET_DIAG_MD5SIG,
359b1d
+	INET_DIAG_ULP_INFO,
359b1d
 	__INET_DIAG_MAX,
359b1d
 };
359b1d
 
359b1d
 #define INET_DIAG_MAX (__INET_DIAG_MAX - 1)
359b1d
 
359b1d
+enum {
359b1d
+	INET_ULP_INFO_UNSPEC,
359b1d
+	INET_ULP_INFO_NAME,
359b1d
+	INET_ULP_INFO_TLS,
359b1d
+	__INET_ULP_INFO_MAX,
359b1d
+};
359b1d
+#define INET_ULP_INFO_MAX (__INET_ULP_INFO_MAX - 1)
359b1d
+
359b1d
 /* INET_DIAG_MEM */
359b1d
 
359b1d
 struct inet_diag_meminfo {
359b1d
diff --git a/include/uapi/linux/pkt_cls.h b/include/uapi/linux/pkt_cls.h
359b1d
index 0a9ab625cba7b..c6ad22f76edee 100644
359b1d
--- a/include/uapi/linux/pkt_cls.h
359b1d
+++ b/include/uapi/linux/pkt_cls.h
359b1d
@@ -165,6 +165,8 @@ enum {
359b1d
 	TCA_POLICE_RESULT,
359b1d
 	TCA_POLICE_TM,
359b1d
 	TCA_POLICE_PAD,
359b1d
+	TCA_POLICE_RATE64,
359b1d
+	TCA_POLICE_PEAKRATE64,
359b1d
 	__TCA_POLICE_MAX
359b1d
 #define TCA_POLICE_RESULT TCA_POLICE_RESULT
359b1d
 };
359b1d
diff --git a/include/uapi/linux/sctp.h b/include/uapi/linux/sctp.h
359b1d
index c4bce0a2011c1..0d4c1507a169d 100644
359b1d
--- a/include/uapi/linux/sctp.h
359b1d
+++ b/include/uapi/linux/sctp.h
359b1d
@@ -134,6 +134,9 @@ typedef __s32 sctp_assoc_t;
359b1d
 #define SCTP_INTERLEAVING_SUPPORTED	125
359b1d
 #define SCTP_SENDMSG_CONNECT	126
359b1d
 #define SCTP_EVENT	127
359b1d
+#define SCTP_ASCONF_SUPPORTED	128
359b1d
+#define SCTP_AUTH_SUPPORTED	129
359b1d
+#define SCTP_ECN_SUPPORTED	130
359b1d
 
359b1d
 /* PR-SCTP policies */
359b1d
 #define SCTP_PR_SCTP_NONE	0x0000
359b1d
-- 
359b1d
2.26.2
359b1d