diff options
| author | Thomas Gleixner <tglx@linutronix.de> | 2019-02-14 22:26:50 +0100 | 
|---|---|---|
| committer | Thomas Gleixner <tglx@linutronix.de> | 2019-02-14 22:26:50 +0100 | 
| commit | d869f86645fc07dc83b89b68f1a22d91ebe29439 (patch) | |
| tree | a3c2c1167bb34c8d0367d77e1a5734fc842d9f30 /tools/lib/bpf/bpf.c | |
| parent | 030fc443aef663df71cd834331fd8f1ec10c30c0 (diff) | |
| parent | 74e96711e3379fc66630f2a1d184947f80cf2c48 (diff) | |
Merge branch 'linus' into irq/core
Pick up upstream changes to avoid conflicts for pending patches.
Diffstat (limited to 'tools/lib/bpf/bpf.c')
| -rw-r--r-- | tools/lib/bpf/bpf.c | 19 | 
1 files changed, 15 insertions, 4 deletions
diff --git a/tools/lib/bpf/bpf.c b/tools/lib/bpf/bpf.c index 3caaa3428774..88cbd110ae58 100644 --- a/tools/lib/bpf/bpf.c +++ b/tools/lib/bpf/bpf.c @@ -65,6 +65,17 @@ static inline int sys_bpf(enum bpf_cmd cmd, union bpf_attr *attr,  	return syscall(__NR_bpf, cmd, attr, size);  } +static inline int sys_bpf_prog_load(union bpf_attr *attr, unsigned int size) +{ +	int fd; + +	do { +		fd = sys_bpf(BPF_PROG_LOAD, attr, size); +	} while (fd < 0 && errno == EAGAIN); + +	return fd; +} +  int bpf_create_map_xattr(const struct bpf_create_map_attr *create_attr)  {  	__u32 name_len = create_attr->name ? strlen(create_attr->name) : 0; @@ -232,7 +243,7 @@ int bpf_load_program_xattr(const struct bpf_load_program_attr *load_attr,  	memcpy(attr.prog_name, load_attr->name,  	       min(name_len, BPF_OBJ_NAME_LEN - 1)); -	fd = sys_bpf(BPF_PROG_LOAD, &attr, sizeof(attr)); +	fd = sys_bpf_prog_load(&attr, sizeof(attr));  	if (fd >= 0)  		return fd; @@ -269,7 +280,7 @@ int bpf_load_program_xattr(const struct bpf_load_program_attr *load_attr,  			break;  		} -		fd = sys_bpf(BPF_PROG_LOAD, &attr, sizeof(attr)); +		fd = sys_bpf_prog_load(&attr, sizeof(attr));  		if (fd >= 0)  			goto done; @@ -283,7 +294,7 @@ int bpf_load_program_xattr(const struct bpf_load_program_attr *load_attr,  	attr.log_size = log_buf_sz;  	attr.log_level = 1;  	log_buf[0] = 0; -	fd = sys_bpf(BPF_PROG_LOAD, &attr, sizeof(attr)); +	fd = sys_bpf_prog_load(&attr, sizeof(attr));  done:  	free(finfo);  	free(linfo); @@ -328,7 +339,7 @@ int bpf_verify_program(enum bpf_prog_type type, const struct bpf_insn *insns,  	attr.kern_version = kern_version;  	attr.prog_flags = prog_flags; -	return sys_bpf(BPF_PROG_LOAD, &attr, sizeof(attr)); +	return sys_bpf_prog_load(&attr, sizeof(attr));  }  int bpf_map_update_elem(int fd, const void *key, const void *value,  | 
