Daniel Borkmann says: ==================== pull-request: bpf 2021-10-26 We've added 12 non-merge commits during the last 7 day(s) which contain a total of 23 files changed, 118 insertions(+), 98 deletions(-). The main changes are: 1) Fix potential race window in BPF tail call compatibility check, from Toke Høiland-Jørgensen. 2) Fix memory leak in cgroup fs due to missing cgroup_bpf_offline(), from Quanyang Wang. 3) Fix file descriptor reference counting in generic_map_update_batch(), from Xu Kuohai. 4) Fix bpf_jit_limit knob to the max supported limit by the arch's JIT, from Lorenz Bauer. 5) Fix BPF sockmap ->poll callbacks for UDP and AF_UNIX sockets, from Cong Wang and Yucong Sun. 6) Fix BPF sockmap concurrency issue in TCP on non-blocking sendmsg calls, from Liu Jian. 7) Fix build failure of INODE_STORAGE and TASK_STORAGE maps on !CONFIG_NET, from Tejun Heo. * https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf: bpf: Fix potential race in tail call compatibility check bpf: Move BPF_MAP_TYPE for INODE_STORAGE and TASK_STORAGE outside of CONFIG_NET selftests/bpf: Use recv_timeout() instead of retries net: Implement ->sock_is_readable() for UDP and AF_UNIX skmsg: Extract and reuse sk_msg_is_readable() net: Rename ->stream_memory_read to ->sock_is_readable tcp_bpf: Fix one concurrency problem in the tcp_bpf_send_verdict function cgroup: Fix memory leak caused by missing cgroup_bpf_offline bpf: Fix error usage of map_fd and fdget() in generic_map_update_batch() bpf: Prevent increasing bpf_jit_limit above max bpf: Define bpf_jit_alloc_exec_limit for arm64 JIT bpf: Define bpf_jit_alloc_exec_limit for riscv JIT ==================== Link: https://lore.kernel.org/r/20211026201920.11296-1-daniel@iogearbox.net Signed-off-by:Jakub Kicinski <kuba@kernel.org>
Showing
- arch/arm64/net/bpf_jit_comp.c 5 additions, 0 deletionsarch/arm64/net/bpf_jit_comp.c
- arch/riscv/net/bpf_jit_core.c 5 additions, 0 deletionsarch/riscv/net/bpf_jit_core.c
- include/linux/bpf.h 5 additions, 2 deletionsinclude/linux/bpf.h
- include/linux/bpf_types.h 4 additions, 4 deletionsinclude/linux/bpf_types.h
- include/linux/filter.h 1 addition, 0 deletionsinclude/linux/filter.h
- include/linux/skmsg.h 1 addition, 0 deletionsinclude/linux/skmsg.h
- include/net/sock.h 7 additions, 1 deletioninclude/net/sock.h
- include/net/tls.h 1 addition, 1 deletioninclude/net/tls.h
- kernel/bpf/arraymap.c 1 addition, 0 deletionskernel/bpf/arraymap.c
- kernel/bpf/core.c 16 additions, 8 deletionskernel/bpf/core.c
- kernel/bpf/syscall.c 7 additions, 4 deletionskernel/bpf/syscall.c
- kernel/cgroup/cgroup.c 3 additions, 1 deletionkernel/cgroup/cgroup.c
- net/core/skmsg.c 14 additions, 0 deletionsnet/core/skmsg.c
- net/core/sysctl_net_core.c 1 addition, 1 deletionnet/core/sysctl_net_core.c
- net/ipv4/tcp.c 1 addition, 4 deletionsnet/ipv4/tcp.c
- net/ipv4/tcp_bpf.c 13 additions, 14 deletionsnet/ipv4/tcp_bpf.c
- net/ipv4/udp.c 3 additions, 0 deletionsnet/ipv4/udp.c
- net/ipv4/udp_bpf.c 1 addition, 0 deletionsnet/ipv4/udp_bpf.c
- net/tls/tls_main.c 2 additions, 2 deletionsnet/tls/tls_main.c
- net/tls/tls_sw.c 1 addition, 1 deletionnet/tls/tls_sw.c
Loading
Please register or sign in to comment