* pull-request: bpf 2019-12-05
@ 2019-12-06 6:18 Alexei Starovoitov
2019-12-06 8:04 ` David Miller
0 siblings, 1 reply; 2+ messages in thread
From: Alexei Starovoitov @ 2019-12-06 6:18 UTC (permalink / raw)
To: davem; +Cc: daniel, netdev, bpf, kernel-team
Hi David,
The following pull-request contains BPF updates for your *net* tree.
We've added 6 non-merge commits during the last 1 day(s) which contain
a total of 14 files changed, 116 insertions(+), 37 deletions(-).
The main changes are:
1) three selftests fixes, from Stanislav.
2) one samples fix, from Jesper.
3) one verifier fix, from Yonghong.
Please consider pulling these changes from:
git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git
Thanks a lot!
Also thanks to reporters, reviewers and testers of commits in this pull-request:
Andrii Nakryiko, Eelco Chaudron, Toke Høiland-Jørgensen
----------------------------------------------------------------
The following changes since commit 099ffd7eddfe03b9b5b43e1f4ffece99121dd7ba:
NFC: NCI: use new `delay` structure for SPI transfer delays (2019-12-04 17:00:58 -0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git
for you to fetch changes up to 8f9081c92523328aa569d09051add79a6c0ae9ff:
selftests/bpf: Add a fexit/bpf2bpf test with target bpf prog no callees (2019-12-04 21:34:42 -0800)
----------------------------------------------------------------
Jesper Dangaard Brouer (1):
samples/bpf: Fix broken xdp_rxq_info due to map order assumptions
Stanislav Fomichev (3):
selftests/bpf: Don't hard-code root cgroup id
selftests/bpf: Bring back c++ include/link test
selftests/bpf: De-flake test_tcpbpf
Yonghong Song (2):
bpf: Fix a bug when getting subprog 0 jited image in check_attach_btf_id
selftests/bpf: Add a fexit/bpf2bpf test with target bpf prog no callees
kernel/bpf/verifier.c | 5 +-
samples/bpf/xdp_rxq_info_user.c | 6 +-
tools/lib/bpf/.gitignore | 1 -
tools/lib/bpf/Makefile | 5 +-
tools/testing/selftests/bpf/.gitignore | 1 +
tools/testing/selftests/bpf/Makefile | 6 +-
.../selftests/bpf/prog_tests/fexit_bpf2bpf.c | 70 ++++++++++++++++------
.../selftests/bpf/progs/fexit_bpf2bpf_simple.c | 26 ++++++++
.../selftests/bpf/progs/test_pkt_md_access.c | 4 +-
.../testing/selftests/bpf/progs/test_tcpbpf_kern.c | 1 +
.../selftests/bpf/test_cpp.cpp} | 0
.../selftests/bpf/test_skb_cgroup_id_user.c | 2 +-
tools/testing/selftests/bpf/test_tcpbpf.h | 1 +
tools/testing/selftests/bpf/test_tcpbpf_user.c | 25 +++++---
14 files changed, 116 insertions(+), 37 deletions(-)
create mode 100644 tools/testing/selftests/bpf/progs/fexit_bpf2bpf_simple.c
rename tools/{lib/bpf/test_libbpf.c => testing/selftests/bpf/test_cpp.cpp} (100%)
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: pull-request: bpf 2019-12-05
2019-12-06 6:18 pull-request: bpf 2019-12-05 Alexei Starovoitov
@ 2019-12-06 8:04 ` David Miller
0 siblings, 0 replies; 2+ messages in thread
From: David Miller @ 2019-12-06 8:04 UTC (permalink / raw)
To: ast; +Cc: daniel, netdev, bpf, kernel-team
From: Alexei Starovoitov <ast@kernel.org>
Date: Thu, 5 Dec 2019 22:18:57 -0800
> The following pull-request contains BPF updates for your *net* tree.
>
> We've added 6 non-merge commits during the last 1 day(s) which contain
> a total of 14 files changed, 116 insertions(+), 37 deletions(-).
>
> The main changes are:
>
> 1) three selftests fixes, from Stanislav.
>
> 2) one samples fix, from Jesper.
>
> 3) one verifier fix, from Yonghong.
>
> Please consider pulling these changes from:
>
> git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git
Pulled, thanks Alexei.
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2019-12-06 8:04 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-12-06 6:18 pull-request: bpf 2019-12-05 Alexei Starovoitov
2019-12-06 8:04 ` David Miller
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).