From patchwork Sat Mar 9 00:08:08 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Daniel Borkmann X-Patchwork-Id: 1053767 X-Patchwork-Delegate: davem@davemloft.net Return-Path: X-Original-To: patchwork-incoming-netdev@ozlabs.org Delivered-To: patchwork-incoming-netdev@ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=vger.kernel.org (client-ip=209.132.180.67; helo=vger.kernel.org; envelope-from=netdev-owner@vger.kernel.org; receiver=) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=iogearbox.net Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 44GPpR0KCKz9s5c for ; Sat, 9 Mar 2019 11:08:15 +1100 (AEDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726610AbfCIAIN (ORCPT ); Fri, 8 Mar 2019 19:08:13 -0500 Received: from www62.your-server.de ([213.133.104.62]:56850 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726313AbfCIAIM (ORCPT ); Fri, 8 Mar 2019 19:08:12 -0500 Received: from [178.197.249.29] (helo=localhost) by www62.your-server.de with esmtpsa (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.89_1) (envelope-from ) id 1h2PX7-0004dq-Bw; Sat, 09 Mar 2019 01:08:09 +0100 From: Daniel Borkmann To: davem@davemloft.net Cc: daniel@iogearbox.net, ast@kernel.org, netdev@vger.kernel.org, bpf@vger.kernel.org Subject: pull-request: bpf 2019-03-09 Date: Sat, 9 Mar 2019 01:08:08 +0100 Message-Id: <20190309000808.12713-1-daniel@iogearbox.net> X-Mailer: git-send-email 2.9.5 MIME-Version: 1.0 X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.100.2/25382/Fri Mar 8 09:55:42 2019) Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org Hi David, The following pull-request contains BPF updates for your *net* tree. The main changes are: 1) Fix a crash in AF_XDP's xsk_diag_put_ring() which was passing wrong queue argument, from Eric. 2) Fix a regression due to wrong test for TCP GSO packets used in various BPF helpers like NAT64, from Willem. 3) Fix a sk_msg strparser warning which asserts that strparser must be stopped first, from Jakub. 4) Fix rejection of invalid options/bind flags in AF_XDP, from Björn. 5) Fix GSO in bpf_lwt_push_ip_encap() which must properly set inner headers and inner protocol, from Peter. 6) Fix a libbpf leak when kernel does not support BTF, from Nikita. 7) Various BPF selftest and libbpf build fixes to make out-of-tree compilation work and to properly resolve dependencies via fixdep target, from Stanislav. 8) Fix rejection of invalid ldimm64 imm field, from Daniel. 9) Fix bpf stats sysctl compile warning of unused helper function proc_dointvec_minmax_bpf_stats() under some configs, from Arnd. 10) Fix couple of warnings about using plain integer as NULL, from Bo. 11) Fix some BPF sample spelling mistakes, from Colin. Please consider pulling these changes from: git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git Thanks a lot! ---------------------------------------------------------------- The following changes since commit a10674bf2406afc2554f9c7d31b2dc65d6a27fd9: tcp: detecting the misuse of .sendpage for Slab objects (2019-03-06 10:48:31 -0800) are available in the git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git for you to fetch changes up to 71b91a506bb05f9aef3acd57af2e835d85721942: bpf: fix warning about using plain integer as NULL (2019-03-08 21:17:07 +0100) ---------------------------------------------------------------- Arnd Bergmann (1): bpf: fix sysctl.c warning Björn Töpel (2): xsk: fix to reject invalid flags in xsk_bind xsk: fix to reject invalid options in Tx descriptor Bo YU (1): bpf: fix warning about using plain integer as NULL Colin Ian King (1): bpf: hbm: fix spelling mistake "deault" -> "default" Daniel Borkmann (1): bpf: fix replace_map_fd_with_map_ptr's ldimm64 second imm field Eric Dumazet (1): xsk: fix potential crash in xsk_diag_put_umem() Jakub Sitnicki (1): bpf: Stop the psock parser before canceling its work Nikita V. Shirokov (1): bpf, libbpf: fixing leak when kernel does not support btf Peter Oskolkov (2): net: fix GSO in bpf_lwt_push_ip_encap selftests/bpf: test that GSO works in lwt_ip_encap Stanislav Fomichev (3): selftests: bpf: fix compilation with out-of-tree $(OUTPUT) libbpf: force fixdep compilation at the start of the build selftests: bpf: test_progs: initialize duration in singal_pending test Willem de Bruijn (1): bpf: only test gso type on gso packets include/linux/bpf-cgroup.h | 2 +- include/linux/skbuff.h | 4 +- kernel/bpf/verifier.c | 10 ++-- kernel/sysctl.c | 2 +- net/bpf/test_run.c | 2 +- net/core/filter.c | 8 ++-- net/core/lwt_bpf.c | 2 + net/core/skmsg.c | 1 + net/xdp/xsk.c | 5 +- net/xdp/xsk_diag.c | 4 +- net/xdp/xsk_queue.h | 4 +- samples/bpf/hbm.c | 4 +- tools/lib/bpf/Makefile | 3 +- tools/lib/bpf/libbpf.c | 2 + tools/testing/selftests/bpf/Makefile | 33 +++++++++---- .../selftests/bpf/prog_tests/signal_pending.c | 2 +- tools/testing/selftests/bpf/test_lwt_ip_encap.sh | 54 +++++++++++++++++++++- tools/testing/selftests/bpf/verifier/ld_imm64.c | 15 +++++- 18 files changed, 121 insertions(+), 36 deletions(-)