)]}'
{
  "commit": "e9ee9efc0d176512cdce9d27ff8549d7ffa2bfcd",
  "tree": "94b32bfcaa32c3538810330370ed7cd4b07e15e4",
  "parents": [
    "88945f460603ad8909b556c67a9229bb23188d41"
  ],
  "author": {
    "name": "David Miller",
    "email": "davem@davemloft.net",
    "time": "Fri Nov 30 21:08:14 2018 -0800"
  },
  "committer": {
    "name": "Alexei Starovoitov",
    "email": "ast@kernel.org",
    "time": "Fri Nov 30 21:38:48 2018 -0800"
  },
  "message": "bpf: Add BPF_F_ANY_ALIGNMENT.\n\nOften we want to write tests cases that check things like bad context\noffset accesses.  And one way to do this is to use an odd offset on,\nfor example, a 32-bit load.\n\nThis unfortunately triggers the alignment checks first on platforms\nthat do not set CONFIG_EFFICIENT_UNALIGNED_ACCESS.  So the test\ncase see the alignment failure rather than what it was testing for.\n\nIt is often not completely possible to respect the original intention\nof the test, or even test the same exact thing, while solving the\nalignment issue.\n\nAnother option could have been to check the alignment after the\ncontext and other validations are performed by the verifier, but\nthat is a non-trivial change to the verifier.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Alexei Starovoitov \u003cast@kernel.org\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "597afdbc1ab93a7f5e6774dd5dcba035d59f597d",
      "old_mode": 33188,
      "old_path": "include/uapi/linux/bpf.h",
      "new_id": "8050caea74955e0d2b2034d653a3b8f42995aa73",
      "new_mode": 33188,
      "new_path": "include/uapi/linux/bpf.h"
    },
    {
      "type": "modify",
      "old_id": "85cbeec06e50d05ae1612882d4d4b7f9e4338a64",
      "old_mode": 33188,
      "old_path": "kernel/bpf/syscall.c",
      "new_id": "f9554d9a14e18840c61436ce32f58070c88a690f",
      "new_mode": 33188,
      "new_path": "kernel/bpf/syscall.c"
    },
    {
      "type": "modify",
      "old_id": "9584438fa2cc177517fc71d4b95d3883a112da75",
      "old_mode": 33188,
      "old_path": "kernel/bpf/verifier.c",
      "new_id": "71988337ac14e34c5b104b41705e86d82b8fb699",
      "new_mode": 33188,
      "new_path": "kernel/bpf/verifier.c"
    },
    {
      "type": "modify",
      "old_id": "597afdbc1ab93a7f5e6774dd5dcba035d59f597d",
      "old_mode": 33188,
      "old_path": "tools/include/uapi/linux/bpf.h",
      "new_id": "8050caea74955e0d2b2034d653a3b8f42995aa73",
      "new_mode": 33188,
      "new_path": "tools/include/uapi/linux/bpf.h"
    },
    {
      "type": "modify",
      "old_id": "ce182219459003c4079b8a1f5a5692c49887f4f5",
      "old_mode": 33188,
      "old_path": "tools/lib/bpf/bpf.c",
      "new_id": "c19226cccf39f7c52ce3a6eaedcd5db7e3521fb7",
      "new_mode": 33188,
      "new_path": "tools/lib/bpf/bpf.c"
    },
    {
      "type": "modify",
      "old_id": "09e8bbe111d4c39452162b4e91c8c146b0394054",
      "old_mode": 33188,
      "old_path": "tools/lib/bpf/bpf.h",
      "new_id": "60392b70587ca1645479c319dd8552e179153e2f",
      "new_mode": 33188,
      "new_path": "tools/lib/bpf/bpf.h"
    },
    {
      "type": "modify",
      "old_id": "5f377ec53f2f8a1df0fecac7a624f43133c4b8f2",
      "old_mode": 33188,
      "old_path": "tools/testing/selftests/bpf/test_align.c",
      "new_id": "3c789d03b629d222618a18d168883615c0661ec8",
      "new_mode": 33188,
      "new_path": "tools/testing/selftests/bpf/test_align.c"
    },
    {
      "type": "modify",
      "old_id": "5eace1f606fb49eb2da69a8830c78393693236f2",
      "old_mode": 33188,
      "old_path": "tools/testing/selftests/bpf/test_verifier.c",
      "new_id": "78e779c358693322a5ccfbe88efa577464a3cac7",
      "new_mode": 33188,
      "new_path": "tools/testing/selftests/bpf/test_verifier.c"
    }
  ]
}
