[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20201210222501.72430-1-alexei.starovoitov@gmail.com>
Date: Thu, 10 Dec 2020 14:25:01 -0800
From: Alexei Starovoitov <alexei.starovoitov@...il.com>
To: davem@...emloft.net
Cc: daniel@...earbox.net, kuba@...nel.org, netdev@...r.kernel.org,
bpf@...r.kernel.org, kernel-team@...com
Subject: pull-request: bpf 2020-12-10
Hi David, hi Jakub,
The following pull-request contains BPF updates for your *net* tree.
We've added 21 non-merge commits during the last 12 day(s) which contain
a total of 21 files changed, 163 insertions(+), 88 deletions(-).
The main changes are:
1) Fix propagation of 32-bit signed bounds from 64-bit bounds, from Alexei.
2) Fix ring_buffer__poll() return value, from Andrii.
3) Fix race in lwt_bpf, from Cong.
4) Fix test_offload, from Toke.
5) Various xsk fixes.
Please consider pulling these changes from:
git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git
Thanks a lot!
Also thanks to reporters, reviewers and testers of commits in this pull-request:
Cong Wang, Hulk Robot, Jakub Kicinski, Jean-Philippe Brucker, John
Fastabend, Magnus Karlsson, Maxim Mikityanskiy, Yonghong Song
----------------------------------------------------------------
The following changes since commit 4d521943f76bd0d1e68ea5e02df7aadd30b2838a:
dt-bindings: net: correct interrupt flags in examples (2020-11-28 14:47:56 -0800)
are available in the Git repository at:
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git
for you to fetch changes up to 3615bdf6d9b19db12b1589861609b4f1c6a8d303:
selftests/bpf: Fix "dubious pointer arithmetic" test (2020-12-10 13:11:30 -0800)
----------------------------------------------------------------
Alexei Starovoitov (1):
bpf: Fix propagation of 32-bit signed bounds from 64-bit bounds.
Andrii Nakryiko (3):
libbpf: Fix ring_buffer__poll() to return number of consumed samples
selftests/bpf: Drain ringbuf samples at the end of test
tools/bpftool: Fix PID fetching with a lot of results
Björn Töpel (1):
xdp: Handle MEM_TYPE_XSK_BUFF_POOL correctly in xdp_return_buff()
Cong Wang (1):
lwt_bpf: Replace preempt_disable() with migrate_disable()
Daniel Borkmann (1):
Merge branch 'bpf-xdp-offload-fixes'
Dongdong Wang (1):
lwt: Disable BH too in run_lwt_bpf()
Jean-Philippe Brucker (3):
selftests/bpf: Add test for signed 32-bit bound check bug
selftests/bpf: Fix array access with signed variable test
selftests/bpf: Fix "dubious pointer arithmetic" test
KP Singh (1):
bpf, doc: Update KP's email in MAINTAINERS
Toke Høiland-Jørgensen (7):
xdp: Remove the xdp_attachment_flags_ok() callback
selftests/bpf/test_offload.py: Remove check for program load flags match
netdevsim: Add debugfs toggle to reject BPF programs in verifier
selftests/bpf/test_offload.py: Only check verifier log on verification fails
selftests/bpf/test_offload.py: Fix expected case of extack messages
selftests/bpf/test_offload.py: Reset ethtool features after failed setting
selftests/bpf/test_offload.py: Filter bpftool internal map when counting maps
Xuan Zhuo (2):
xsk: Replace datagram_poll by sock_poll_wait
xsk: Change the tx writeable condition
Zhang Changzhong (1):
xsk: Return error code if force_zc is set
MAINTAINERS | 4 +-
.../net/ethernet/netronome/nfp/nfp_net_common.c | 6 ---
drivers/net/ethernet/ti/cpsw_priv.c | 3 --
drivers/net/netdevsim/bpf.c | 15 ++++--
drivers/net/netdevsim/netdevsim.h | 1 +
include/net/xdp.h | 2 -
kernel/bpf/verifier.c | 10 ++--
net/core/dev.c | 22 ++++++++-
net/core/lwt_bpf.c | 12 ++---
net/core/xdp.c | 29 ++++--------
net/xdp/xsk.c | 20 ++++++--
net/xdp/xsk_buff_pool.c | 1 +
net/xdp/xsk_queue.h | 6 +++
tools/bpf/bpftool/pids.c | 4 +-
tools/lib/bpf/ringbuf.c | 2 +-
tools/testing/selftests/bpf/prog_tests/align.c | 8 ++--
tools/testing/selftests/bpf/prog_tests/ringbuf.c | 8 +++-
.../selftests/bpf/prog_tests/ringbuf_multi.c | 2 +-
tools/testing/selftests/bpf/test_offload.py | 53 ++++++++++++----------
.../testing/selftests/bpf/verifier/array_access.c | 2 +-
tools/testing/selftests/bpf/verifier/bounds.c | 41 +++++++++++++++++
21 files changed, 163 insertions(+), 88 deletions(-)
Powered by blists - more mailing lists