* pull-request: bpf 2018-08-24
@ 2018-08-23 23:09 Daniel Borkmann
2018-08-24 5:42 ` David Miller
0 siblings, 1 reply; 2+ messages in thread
From: Daniel Borkmann @ 2018-08-23 23:09 UTC (permalink / raw)
To: davem; +Cc: daniel, ast, netdev
Hi David,
The following pull-request contains BPF updates for your *net* tree.
The main changes are:
1) Fix BPF sockmap and tls where we get a hang in do_tcp_sendpages()
when sndbuf is full due to missing calls into underlying socket's
sk_write_space(), from John.
2) Two BPF sockmap fixes to reject invalid parameters on map creation
and to fix a map element miscount on allocation failure. Another fix
for BPF hash tables to use per hash table salt for jhash(), from Daniel.
3) Fix for bpftool's command line parsing in order to terminate on bad
arguments instead of keeping looping in some border cases, from Quentin.
4) Fix error value of xdp_umem_assign_dev() in order to comply with
expected bind ops error codes, from Prashant.
Please consider pulling these changes from:
git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git
Thanks a lot!
----------------------------------------------------------------
The following changes since commit b93c1b5ac8643cc08bb74fa8ae21d6c63dfcb23d:
hv_netvsc: ignore devices that are not PCI (2018-08-21 12:02:11 -0700)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git
for you to fetch changes up to 785e76d7a2051a9e28b9134d5388a45b16f5eb72:
tools: bpftool: return from do_event_pipe() on bad arguments (2018-08-23 20:17:57 +0200)
----------------------------------------------------------------
Daniel Borkmann (3):
bpf, sockmap: fix sock_hash_alloc and reject zero-sized keys
bpf, sockmap: fix sock hash count in alloc_sock_hash_elem
bpf: use per htab salt for bucket hash
John Fastabend (2):
tls: possible hang when do_tcp_sendpages hits sndbuf is full case
bpf: sockmap: write_space events need to be passed to TCP handler
Prashant Bhole (1):
xsk: fix return value of xdp_umem_assign_dev()
Quentin Monnet (1):
tools: bpftool: return from do_event_pipe() on bad arguments
kernel/bpf/hashtab.c | 23 +++++++++++++----------
kernel/bpf/sockmap.c | 11 +++++++++--
net/tls/tls_main.c | 9 +++++++--
net/xdp/xdp_umem.c | 4 ++--
tools/bpf/bpftool/map_perf_ring.c | 5 ++++-
5 files changed, 35 insertions(+), 17 deletions(-)
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: pull-request: bpf 2018-08-24
2018-08-23 23:09 pull-request: bpf 2018-08-24 Daniel Borkmann
@ 2018-08-24 5:42 ` David Miller
0 siblings, 0 replies; 2+ messages in thread
From: David Miller @ 2018-08-24 5:42 UTC (permalink / raw)
To: daniel; +Cc: ast, netdev
From: Daniel Borkmann <daniel@iogearbox.net>
Date: Fri, 24 Aug 2018 01:09:29 +0200
> The following pull-request contains BPF updates for your *net* tree.
Pulled, thanks Daniel.
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2018-08-24 9:15 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2018-08-23 23:09 pull-request: bpf 2018-08-24 Daniel Borkmann
2018-08-24 5:42 ` David Miller
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).