From: Alexei Starovoitov <ast@kernel.org>
To: <davem@davemloft.net>
Cc: <daniel@iogearbox.net>, <netdev@vger.kernel.org>,
<bpf@vger.kernel.org>, <kernel-team@fb.com>
Subject: pull-request: bpf 2019-06-15
Date: Sat, 15 Jun 2019 16:41:38 -0700 [thread overview]
Message-ID: <20190615234138.3313038-1-ast@kernel.org> (raw)
Hi David,
The following pull-request contains BPF updates for your *net* tree.
The main changes are:
1) fix stack layout of JITed x64 bpf code, from Alexei.
2) fix out of bounds memory access in bpf_sk_storage, from Arthur.
3) fix lpm trie walk, from Jonathan.
4) fix nested bpf_perf_event_output, from Matt.
5) and several other fixes.
Please consider pulling these changes from:
git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git
Thanks a lot!
----------------------------------------------------------------
The following changes since commit dce5ccccd1231c6eaec5ede80bce85f2ae536826:
nfp: ensure skb network header is set for packet redirect (2019-06-09 20:08:09 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git
for you to fetch changes up to 9594dc3c7e71b9f52bee1d7852eb3d4e3aea9e99:
bpf: fix nested bpf tracepoints with per-cpu data (2019-06-15 16:33:35 -0700)
----------------------------------------------------------------
Alexei Starovoitov (1):
bpf, x64: fix stack layout of JITed bpf code
Arthur Fabre (1):
bpf: Fix out of bounds memory access in bpf_sk_storage
Daniel Borkmann (1):
Merge branch 'bpf-ppc-div-fix'
Ilya Maximets (1):
xdp: check device pointer before clearing
Jonathan Lemon (1):
bpf: lpm_trie: check left child of last leftmost node for NULL
Martin KaFai Lau (1):
bpf: net: Set sk_bpf_storage back to NULL for cloned sk
Martynas Pumputis (2):
bpf: simplify definition of BPF_FIB_LOOKUP related flags
bpf: sync BPF_FIB_LOOKUP flag changes with BPF uapi
Matt Mullins (1):
bpf: fix nested bpf tracepoints with per-cpu data
Naveen N. Rao (2):
bpf: fix div64 overflow tests to properly detect errors
powerpc/bpf: use unsigned division instruction for 64-bit operations
Toshiaki Makita (3):
bpf, devmap: Fix premature entry free on destroying map
bpf, devmap: Add missing bulk queue free
bpf, devmap: Add missing RCU read lock on flush
arch/powerpc/include/asm/ppc-opcode.h | 1 +
arch/powerpc/net/bpf_jit.h | 2 +-
arch/powerpc/net/bpf_jit_comp64.c | 8 +-
arch/x86/net/bpf_jit_comp.c | 74 +++++----------
include/uapi/linux/bpf.h | 4 +-
kernel/bpf/devmap.c | 9 +-
kernel/bpf/lpm_trie.c | 9 +-
kernel/trace/bpf_trace.c | 100 +++++++++++++++++----
net/core/bpf_sk_storage.c | 3 +-
net/core/sock.c | 3 +
net/xdp/xdp_umem.c | 11 +--
tools/include/uapi/linux/bpf.h | 4 +-
tools/testing/selftests/bpf/test_lpm_map.c | 41 ++++++++-
.../testing/selftests/bpf/verifier/div_overflow.c | 14 ++-
14 files changed, 188 insertions(+), 95 deletions(-)
next reply other threads:[~2019-06-15 23:41 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-06-15 23:41 Alexei Starovoitov [this message]
2019-06-16 1:22 ` pull-request: bpf 2019-06-15 David Miller
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20190615234138.3313038-1-ast@kernel.org \
--to=ast@kernel.org \
--cc=bpf@vger.kernel.org \
--cc=daniel@iogearbox.net \
--cc=davem@davemloft.net \
--cc=kernel-team@fb.com \
--cc=netdev@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).