All of lore.kernel.org
 help / color / mirror / Atom feed
From: Daniel Borkmann <daniel@iogearbox.net>
To: davem@davemloft.net
Cc: kuba@kernel.org, daniel@iogearbox.net, ast@kernel.org,
	andrii.nakryiko@gmail.com, netdev@vger.kernel.org,
	bpf@vger.kernel.org
Subject: pull-request: bpf 2021-10-26
Date: Tue, 26 Oct 2021 22:19:20 +0200	[thread overview]
Message-ID: <20211026201920.11296-1-daniel@iogearbox.net> (raw)

Hi David, hi Jakub,

The following pull-request contains BPF updates for your *net* tree.

We've added 12 non-merge commits during the last 7 day(s) which contain
a total of 23 files changed, 118 insertions(+), 98 deletions(-).

The main changes are:

1) Fix potential race window in BPF tail call compatibility check, from Toke Høiland-Jørgensen.

2) Fix memory leak in cgroup fs due to missing cgroup_bpf_offline(), from Quanyang Wang.

3) Fix file descriptor reference counting in generic_map_update_batch(), from Xu Kuohai.

4) Fix bpf_jit_limit knob to the max supported limit by the arch's JIT, from Lorenz Bauer.

5) Fix BPF sockmap ->poll callbacks for UDP and AF_UNIX sockets, from Cong Wang and Yucong Sun.

6) Fix BPF sockmap concurrency issue in TCP on non-blocking sendmsg calls, from Liu Jian.

7) Fix build failure of INODE_STORAGE and TASK_STORAGE maps on !CONFIG_NET, from Tejun Heo.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git

Thanks a lot!

Also thanks to reporters, reviewers and testers of commits in this pull-request:

Björn Töpel, John Fastabend, kernel test robot, Lorenzo Bianconi, Luke 
Nelson, Martin KaFai Lau, Roman Gushchin, Yucong Sun

----------------------------------------------------------------

The following changes since commit 4225fea1cb28370086e17e82c0f69bec2779dca0:

  ptp: Fix possible memory leak in ptp_clock_register() (2021-10-20 14:44:33 +0100)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git 

for you to fetch changes up to 54713c85f536048e685258f880bf298a74c3620d:

  bpf: Fix potential race in tail call compatibility check (2021-10-26 12:37:28 -0700)

----------------------------------------------------------------
Alexei Starovoitov (2):
      Merge branch 'Fix up bpf_jit_limit some more'
      Merge branch 'sock_map: fix ->poll() and update selftests'

Cong Wang (3):
      net: Rename ->stream_memory_read to ->sock_is_readable
      skmsg: Extract and reuse sk_msg_is_readable()
      net: Implement ->sock_is_readable() for UDP and AF_UNIX

Liu Jian (1):
      tcp_bpf: Fix one concurrency problem in the tcp_bpf_send_verdict function

Lorenz Bauer (3):
      bpf: Define bpf_jit_alloc_exec_limit for riscv JIT
      bpf: Define bpf_jit_alloc_exec_limit for arm64 JIT
      bpf: Prevent increasing bpf_jit_limit above max

Quanyang Wang (1):
      cgroup: Fix memory leak caused by missing cgroup_bpf_offline

Tejun Heo (1):
      bpf: Move BPF_MAP_TYPE for INODE_STORAGE and TASK_STORAGE outside of CONFIG_NET

Toke Høiland-Jørgensen (1):
      bpf: Fix potential race in tail call compatibility check

Xu Kuohai (1):
      bpf: Fix error usage of map_fd and fdget() in generic_map_update_batch()

Yucong Sun (1):
      selftests/bpf: Use recv_timeout() instead of retries

 arch/arm64/net/bpf_jit_comp.c                      |  5 ++
 arch/riscv/net/bpf_jit_core.c                      |  5 ++
 include/linux/bpf.h                                |  7 +-
 include/linux/bpf_types.h                          |  8 +--
 include/linux/filter.h                             |  1 +
 include/linux/skmsg.h                              |  1 +
 include/net/sock.h                                 |  8 ++-
 include/net/tls.h                                  |  2 +-
 kernel/bpf/arraymap.c                              |  1 +
 kernel/bpf/core.c                                  | 24 ++++---
 kernel/bpf/syscall.c                               | 11 ++--
 kernel/cgroup/cgroup.c                             |  4 +-
 net/core/skmsg.c                                   | 14 ++++
 net/core/sysctl_net_core.c                         |  2 +-
 net/ipv4/tcp.c                                     |  5 +-
 net/ipv4/tcp_bpf.c                                 | 27 ++++----
 net/ipv4/udp.c                                     |  3 +
 net/ipv4/udp_bpf.c                                 |  1 +
 net/tls/tls_main.c                                 |  4 +-
 net/tls/tls_sw.c                                   |  2 +-
 net/unix/af_unix.c                                 |  4 ++
 net/unix/unix_bpf.c                                |  2 +
 .../selftests/bpf/prog_tests/sockmap_listen.c      | 75 ++++++----------------
 23 files changed, 118 insertions(+), 98 deletions(-)

             reply	other threads:[~2021-10-26 20:19 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-10-26 20:19 Daniel Borkmann [this message]
2021-10-26 23:40 ` pull-request: bpf 2021-10-26 patchwork-bot+netdevbpf
2021-10-27 22:03 ` Toke Høiland-Jørgensen
2021-10-27 22:13   ` Daniel Borkmann
2021-10-28  9:17     ` Toke Høiland-Jørgensen

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20211026201920.11296-1-daniel@iogearbox.net \
    --to=daniel@iogearbox.net \
    --cc=andrii.nakryiko@gmail.com \
    --cc=ast@kernel.org \
    --cc=bpf@vger.kernel.org \
    --cc=davem@davemloft.net \
    --cc=kuba@kernel.org \
    --cc=netdev@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.