24 Feb, 2020

1 commit

  • [ Upstream commit 450278977acbf494a20367c22fbb38729772d1fc ]

    It seems Clang can in some cases turn on stack protection by default, which
    doesn't work with BPF. This was reported once before[0], but it seems the
    flag to explicitly turn off the stack protector wasn't added to the
    Makefile, so do that now.

    The symptom of this is compile errors like the following:

    error: :0:0: in function bpf_prog1 i32 (%struct.__sk_buff*): A call to built-in function '__stack_chk_fail' is not supported.

    [0] https://www.spinics.net/lists/netdev/msg556400.html

    Signed-off-by: Toke Høiland-Jørgensen
    Signed-off-by: Alexei Starovoitov
    Link: https://lore.kernel.org/bpf/20191216103819.359535-1-toke@redhat.com
    Signed-off-by: Sasha Levin

    Toke Høiland-Jørgensen
     

11 Feb, 2020

2 commits

  • commit f9e6bfdbaf0cf304d72c70a05d81acac01a04f48 upstream.

    When sample xdp_redirect_cpu was converted to use libbpf, the
    tracepoints used by this sample were not getting attached automatically
    like with bpf_load.c. The BPF-maps was still getting loaded, thus
    nobody notice that the tracepoints were not updating these maps.

    This fix doesn't use the new skeleton code, as this bug was introduced
    in v5.1 and stable might want to backport this. E.g. Red Hat QA uses
    this sample as part of their testing.

    Fixes: bbaf6029c49c ("samples/bpf: Convert XDP samples to libbpf usage")
    Signed-off-by: Jesper Dangaard Brouer
    Signed-off-by: Alexei Starovoitov
    Acked-by: Andrii Nakryiko
    Link: https://lore.kernel.org/bpf/157685877642.26195.2798780195186786841.stgit@firesoul
    Signed-off-by: Greg Kroah-Hartman

    Jesper Dangaard Brouer
     
  • commit b2e5e93ae8af6a34bca536cdc4b453ab1e707b8b upstream.

    The 'clean' rule in the samples/bpf Makefile tries to remove backup
    files (ending in ~). However, if no such files exist, it will instead try
    to remove the user's home directory. While the attempt is mostly harmless,
    it does lead to a somewhat scary warning like this:

    rm: cannot remove '~': Is a directory

    Fix this by using find instead of shell expansion to locate any actual
    backup files that need to be removed.

    Fixes: b62a796c109c ("samples/bpf: allow make to be run from samples/bpf/ directory")
    Signed-off-by: Toke Høiland-Jørgensen
    Signed-off-by: Alexei Starovoitov
    Acked-by: Jesper Dangaard Brouer
    Link: https://lore.kernel.org/bpf/157952560126.1683545.7273054725976032511.stgit@toke.dk
    Signed-off-by: Greg Kroah-Hartman

    Toke Høiland-Jørgensen
     

26 Jan, 2020

2 commits

  • commit edbca120a8cdfa5a5793707e33497aa5185875ca upstream.

    In the days of using bpf_load.c the order in which the 'maps' sections
    were defines in BPF side (*_kern.c) file, were used by userspace side
    to identify the map via using the map order as an index. In effect the
    order-index is created based on the order the maps sections are stored
    in the ELF-object file, by the LLVM compiler.

    This have also carried over in libbpf via API bpf_map__next(NULL, obj)
    to extract maps in the order libbpf parsed the ELF-object file.

    When BTF based maps were introduced a new section type ".maps" were
    created. I found that the LLVM compiler doesn't create the ".maps"
    sections in the order they are defined in the C-file. The order in the
    ELF file is based on the order the map pointer is referenced in the code.

    This combination of changes lead to xdp_rxq_info mixing up the map
    file-descriptors in userspace, resulting in very broken behaviour, but
    without warning the user.

    This patch fix issue by instead using bpf_object__find_map_by_name()
    to find maps via their names. (Note, this is the ELF name, which can
    be longer than the name the kernel retains).

    Fixes: be5bca44aa6b ("samples: bpf: convert some XDP samples from bpf_load to libbpf")
    Fixes: 451d1dc886b5 ("samples: bpf: update map definition to new syntax BTF-defined map")
    Signed-off-by: Jesper Dangaard Brouer
    Signed-off-by: Alexei Starovoitov
    Acked-by: Toke Høiland-Jørgensen
    Acked-by: Andrii Nakryiko
    Link: https://lore.kernel.org/bpf/157529025128.29832.5953245340679936909.stgit@firesoul
    Signed-off-by: Greg Kroah-Hartman

    Jesper Dangaard Brouer
     
  • commit 451d1dc886b548d6e18c933adca326c1307023c9 upstream.

    Since, the new syntax of BTF-defined map has been introduced,
    the syntax for using maps under samples directory are mixed up.
    For example, some are already using the new syntax, and some are using
    existing syntax by calling them as 'legacy'.

    As stated at commit abd29c931459 ("libbpf: allow specifying map
    definitions using BTF"), the BTF-defined map has more compatablility
    with extending supported map definition features.

    The commit doesn't replace all of the map to new BTF-defined map,
    because some of the samples still use bpf_load instead of libbpf, which
    can't properly create BTF-defined map.

    This will only updates the samples which uses libbpf API for loading bpf
    program. (ex. bpf_prog_load_xattr)

    Signed-off-by: Daniel T. Lee
    Acked-by: Andrii Nakryiko
    Signed-off-by: Alexei Starovoitov
    Signed-off-by: Greg Kroah-Hartman

    Daniel T. Lee
     

12 Jan, 2020

2 commits

  • [ Upstream commit fe3300897cbfd76c6cb825776e5ac0ca50a91ca4 ]

    Currently, open() is called from the user program and it calls the syscall
    'sys_openat', not the 'sys_open'. This leads to an error of the program
    of user side, due to the fact that the counter maps are zero since no
    function such 'sys_open' is called.

    This commit adds the kernel bpf program which are attached to the
    tracepoint 'sys_enter_openat' and 'sys_enter_openat'.

    Fixes: 1da236b6be963 ("bpf: add a test case for syscalls/sys_{enter|exit}_* tracepoints")
    Signed-off-by: Daniel T. Lee
    Signed-off-by: Alexei Starovoitov
    Signed-off-by: Sasha Levin

    Daniel T. Lee
     
  • [ Upstream commit bba1b2a890253528c45aa66cf856f289a215bfbc ]

    Previously, when this sample is added, commit 1c47910ef8013
    ("samples/bpf: add perf_event+bpf example"), a symbol 'sys_read' and
    'sys_write' has been used without no prefixes. But currently there are
    no exact symbols with these under kallsyms and this leads to failure.

    This commit changes exact compare to substring compare to keep compatible
    with exact symbol or prefixed symbol.

    Fixes: 1c47910ef8013 ("samples/bpf: add perf_event+bpf example")
    Signed-off-by: Daniel T. Lee
    Signed-off-by: Alexei Starovoitov
    Link: https://lore.kernel.org/bpf/20191205080114.19766-2-danieltimlee@gmail.com
    Signed-off-by: Sasha Levin

    Daniel T. Lee
     

09 Jan, 2020

2 commits

  • commit 01f36a554e3ef32f9fc4b81a4437cf08fd0e4742 upstream.

    trace_printk schedules work via irq_work_queue(), but doesn't
    wait until it was processed. The kprobe_module.tc testcase does:

    :;: "Load module again, which means the event1 should be recorded";:
    modprobe trace-printk
    grep "event1:" trace

    so the grep which checks the trace file might run before the irq work
    was processed. Fix this by adding a irq_work_sync().

    Link: http://lore.kernel.org/linux-trace-devel/20191218074427.96184-3-svens@linux.ibm.com

    Cc: stable@vger.kernel.org
    Fixes: af2a0750f3749 ("selftests/ftrace: Improve kprobe on module testcase to load/unload module")
    Signed-off-by: Sven Schnelle
    Signed-off-by: Steven Rostedt (VMware)
    Signed-off-by: Greg Kroah-Hartman

    Sven Schnelle
     
  • commit 771b894f2f3dfedc2ba5561731fffa0e39b1bbb6 upstream.

    The sizes by which seccomp_notif and seccomp_notif_resp are allocated are
    based on the SECCOMP_GET_NOTIF_SIZES ioctl. This allows for graceful
    extension of these datastructures. If userspace zeroes out the
    datastructure based on its version, and it is lagging behind the kernel's
    version, it will end up sending trailing garbage. On the other hand,
    if it is ahead of the kernel version, it will write extra zero space,
    and potentially cause corruption.

    Signed-off-by: Sargun Dhillon
    Suggested-by: Tycho Andersen
    Link: https://lore.kernel.org/r/20191230203503.4925-1-sargun@sargun.me
    Fixes: fec7b6690541 ("samples: add an example of seccomp user trap")
    Cc: stable@vger.kernel.org
    Signed-off-by: Kees Cook
    Signed-off-by: Greg Kroah-Hartman

    Sargun Dhillon
     

31 Dec, 2019

1 commit

  • [ Upstream commit 3cad8f911575191fb3b81d8ed0e061e30f922223 ]

    Currently, proc_cmd is used to dispatch command to 'pg_ctrl', 'pg_thread',
    'pg_set'. proc_cmd is designed to check command result with grep the
    "Result:", but this might fail since this string is only shown in
    'pg_thread' and 'pg_set'.

    This commit fixes this logic by grep-ing the "Result:" string only when
    the command is not for 'pg_ctrl'.

    For clarity of an execution flow, 'errexit' flag has been set.

    To cleanup pktgen on exit, trap has been added for EXIT signal.

    Signed-off-by: Daniel T. Lee
    Acked-by: Jesper Dangaard Brouer
    Signed-off-by: David S. Miller
    Signed-off-by: Sasha Levin

    Daniel T. Lee
     

01 Nov, 2019

1 commit

  • To remove that test_attr__{enabled/open} are used by perf-sys.h, we
    set HAVE_ATTR_TEST to zero.

    Signed-off-by: Björn Töpel
    Tested-by: KP Singh
    Acked-by: Song Liu
    Cc: Adrian Hunter
    Cc: Alexei Starovoitov
    Cc: Jiri Olsa
    Cc: Namhyung Kim
    Cc: bpf@vger.kernel.org
    Cc: netdev@vger.kernel.org
    Signed-off-by: Arnaldo Carvalho de Melo
    Signed-off-by: Daniel Borkmann
    Link: http://lore.kernel.org/bpf/20191001113307.27796-3-bjorn.topel@gmail.com

    Björn Töpel
     

03 Oct, 2019

2 commits

  • This was added in commit eb111869301e ("compiler-types.h: add asm_inline
    definition") and breaks samples/bpf as clang does not support asm __inline.

    Fixes: eb111869301e ("compiler-types.h: add asm_inline definition")
    Co-developed-by: Florent Revest
    Signed-off-by: Florent Revest
    Signed-off-by: KP Singh
    Signed-off-by: Daniel Borkmann
    Acked-by: Song Liu
    Acked-by: Andrii Nakryiko
    Link: https://lore.kernel.org/bpf/20191002191652.11432-1-kpsingh@chromium.org

    KP Singh
     
  • Add missing include for which was removed from
    perf-sys.h in commit 91854f9a077e ("perf tools: Move everything
    related to sys_perf_event_open() to perf-sys.h").

    Fixes: 91854f9a077e ("perf tools: Move everything related to sys_perf_event_open() to perf-sys.h")
    Reported-by: KP Singh
    Reported-by: Florent Revest
    Signed-off-by: Björn Töpel
    Signed-off-by: Daniel Borkmann
    Tested-by: KP Singh
    Acked-by: Song Liu
    Link: https://lore.kernel.org/bpf/20191001112249.27341-1-bjorn.topel@gmail.com

    Björn Töpel
     

23 Sep, 2019

1 commit

  • Pull rpmsg updates from Bjorn Andersson:
    "This contains updates to make the rpmsg sample driver more useful,
    fixes the naming of GLINK devices to avoid naming collisions and a few
    minor bug fixes. It also updates MAINTAINERS to reflect the move to
    kernel.org"

    * tag 'rpmsg-v5.4' of git://git.kernel.org/pub/scm/linux/kernel/git/andersson/remoteproc:
    rpmsg: glink-smem: Name the edge based on parent remoteproc
    rpmsg: glink: Use struct_size() helper
    rpmsg: virtio_rpmsg_bus: replace "%p" with "%pK"
    MAINTAINERS: rpmsg: fix git tree location
    rpmsg: core: fix comments
    samples/rpmsg: Introduce a module parameter for message count
    samples/rpmsg: Replace print_hex_dump() with print_hex_dump_debug()

    Linus Torvalds
     

21 Sep, 2019

1 commit

  • Pull VFIO updates from Alex Williamson:

    - Fix spapr iommu error case case (Alexey Kardashevskiy)

    - Consolidate region type definitions (Cornelia Huck)

    - Restore saved original PCI state on release (hexin)

    - Simplify mtty sample driver interrupt path (Parav Pandit)

    - Support for reporting valid IOVA regions to user (Shameer Kolothum)

    * tag 'vfio-v5.4-rc1' of git://github.com/awilliam/linux-vfio:
    vfio_pci: Restore original state on release
    vfio/type1: remove duplicate retrieval of reserved regions
    vfio/type1: Add IOVA range capability support
    vfio/type1: check dma map request is within a valid iova range
    vfio/spapr_tce: Fix incorrect tce_iommu_group memory free
    vfio-mdev/mtty: Simplify interrupt generation
    vfio: re-arrange vfio region definitions
    vfio/type1: Update iova list on detach
    vfio/type1: Check reserved region conflict and update iova list
    vfio/type1: Introduce iova list and add iommu aperture validity check

    Linus Torvalds
     

16 Sep, 2019

1 commit

  • Preserve the offset of the address of the received descriptor, and include
    it in the address set for the tx descriptor, so the kernel can correctly
    locate the start of the packet data.

    Fixes: 03895e63ff97 ("samples/bpf: add buffer recycling for unaligned chunks to xdpsock")
    Signed-off-by: Ciara Loftus
    Signed-off-by: Daniel Borkmann

    Ciara Loftus
     

06 Sep, 2019

1 commit

  • Daniel Borkmann says:

    ====================
    The following pull-request contains BPF updates for your *net-next* tree.

    The main changes are:

    1) Add the ability to use unaligned chunks in the AF_XDP umem. By
    relaxing where the chunks can be placed, it allows to use an
    arbitrary buffer size and place whenever there is a free
    address in the umem. Helps more seamless DPDK AF_XDP driver
    integration. Support for i40e, ixgbe and mlx5e, from Kevin and
    Maxim.

    2) Addition of a wakeup flag for AF_XDP tx and fill rings so the
    application can wake up the kernel for rx/tx processing which
    avoids busy-spinning of the latter, useful when app and driver
    is located on the same core. Support for i40e, ixgbe and mlx5e,
    from Magnus and Maxim.

    3) bpftool fixes for printf()-like functions so compiler can actually
    enforce checks, bpftool build system improvements for custom output
    directories, and addition of 'bpftool map freeze' command, from Quentin.

    4) Support attaching/detaching XDP programs from 'bpftool net' command,
    from Daniel.

    5) Automatic xskmap cleanup when AF_XDP socket is released, and several
    barrier/{read,write}_once fixes in AF_XDP code, from Björn.

    6) Relicense of bpf_helpers.h/bpf_endian.h for future libbpf
    inclusion as well as libbpf versioning improvements, from Andrii.

    7) Several new BPF kselftests for verifier precision tracking, from Alexei.

    8) Several BPF kselftest fixes wrt endianess to run on s390x, from Ilya.

    9) And more BPF kselftest improvements all over the place, from Stanislav.

    10) Add simple BPF map op cache for nfp driver to batch dumps, from Jakub.

    11) AF_XDP socket umem mapping improvements for 32bit archs, from Ivan.

    12) Add BPF-to-BPF call and BTF line info support for s390x JIT, from Yauheni.

    13) Small optimization in arm64 JIT to spare 1 insns for BPF_MOD, from Jerin.

    14) Fix an error check in bpf_tcp_gen_syncookie() helper, from Petar.

    15) Various minor fixes and cleanups, from Nathan, Masahiro, Masanari,
    Peter, Wei, Yue.
    ====================

    Signed-off-by: David S. Miller

    David S. Miller
     

31 Aug, 2019

3 commits

  • This patch modifies xdpsock to use mmap instead of posix_memalign. With
    this change, we can use hugepages when running the application in unaligned
    chunks mode. Using hugepages makes it more likely that we have physically
    contiguous memory, which supports the unaligned chunk mode better.

    Signed-off-by: Kevin Laatz
    Acked-by: Jonathan Lemon
    Signed-off-by: Daniel Borkmann

    Kevin Laatz
     
  • This patch adds buffer recycling support for unaligned buffers. Since we
    don't mask the addr to 2k at umem_reg in unaligned mode, we need to make
    sure we give back the correct (original) addr to the fill queue. We achieve
    this using the new descriptor format and associated masks. The new format
    uses the upper 16-bits for the offset and the lower 48-bits for the addr.
    Since we have a field for the offset, we no longer need to modify the
    actual address. As such, all we have to do to get back the original address
    is mask for the lower 48 bits (i.e. strip the offset and we get the address
    on it's own).

    Signed-off-by: Kevin Laatz
    Signed-off-by: Bruce Richardson
    Acked-by: Jonathan Lemon
    Signed-off-by: Daniel Borkmann

    Kevin Laatz
     
  • This patch adds support for the unaligned chunks mode. The addition of the
    unaligned chunks option will allow users to run the application with more
    relaxed chunk placement in the XDP umem.

    Unaligned chunks mode can be used with the '-u' or '--unaligned' command
    line options.

    Signed-off-by: Kevin Laatz
    Signed-off-by: Ciara Loftus
    Acked-by: Jonathan Lemon
    Signed-off-by: Daniel Borkmann

    Kevin Laatz
     

27 Aug, 2019

2 commits


21 Aug, 2019

1 commit


20 Aug, 2019

2 commits


18 Aug, 2019

1 commit

  • This commit adds using the need_wakeup flag to the xdpsock sample
    application. It is turned on by default as we think it is a feature
    that seems to always produce a performance benefit, if the application
    has been written taking advantage of it. It can be turned off in the
    sample app by using the '-m' command line option.

    The txpush and l2fwd sub applications have also been updated to
    support poll() with multiple sockets.

    Signed-off-by: Magnus Karlsson
    Acked-by: Jonathan Lemon
    Signed-off-by: Daniel Borkmann

    Magnus Karlsson
     

14 Aug, 2019

1 commit

  • Daniel Borkmann says:

    ====================
    The following pull-request contains BPF updates for your *net-next* tree.

    There is a small merge conflict in libbpf (Cc Andrii so he's in the loop
    as well):

    for (i = 1; i info = BTF_INFO_ENC(BTF_KIND_INT, 0, 0);
    <<<<<<< HEAD
    /*
    * using size = 1 is the safest choice, 4 will be too
    * big and cause kernel BTF validation failure if
    * original variable took less than 4 bytes
    */
    t->size = 1;
    *(int *)(t+1) = BTF_INT_ENC(0, 0, 8);
    } else if (!has_datasec && kind == BTF_KIND_DATASEC) {
    =======
    t->size = sizeof(int);
    *(int *)(t + 1) = BTF_INT_ENC(0, 0, 32);
    } else if (!has_datasec && btf_is_datasec(t)) {
    >>>>>>> 72ef80b5ee131e96172f19e74b4f98fa3404efe8
    /* replace DATASEC with STRUCT */

    Conflict is between the two commits 1d4126c4e119 ("libbpf: sanitize VAR to
    conservative 1-byte INT") and b03bc6853c0e ("libbpf: convert libbpf code to
    use new btf helpers"), so we need to pick the sanitation fixup as well as
    use the new btf_is_datasec() helper and the whitespace cleanup. Looks like
    the following:

    [...]
    if (!has_datasec && btf_is_var(t)) {
    /* replace VAR with INT */
    t->info = BTF_INFO_ENC(BTF_KIND_INT, 0, 0);
    /*
    * using size = 1 is the safest choice, 4 will be too
    * big and cause kernel BTF validation failure if
    * original variable took less than 4 bytes
    */
    t->size = 1;
    *(int *)(t + 1) = BTF_INT_ENC(0, 0, 8);
    } else if (!has_datasec && btf_is_datasec(t)) {
    /* replace DATASEC with STRUCT */
    [...]

    The main changes are:

    1) Addition of core parts of compile once - run everywhere (co-re) effort,
    that is, relocation of fields offsets in libbpf as well as exposure of
    kernel's own BTF via sysfs and loading through libbpf, from Andrii.

    More info on co-re: http://vger.kernel.org/bpfconf2019.html#session-2
    and http://vger.kernel.org/lpc-bpf2018.html#session-2

    2) Enable passing input flags to the BPF flow dissector to customize parsing
    and allowing it to stop early similar to the C based one, from Stanislav.

    3) Add a BPF helper function that allows generating SYN cookies from XDP and
    tc BPF, from Petar.

    4) Add devmap hash-based map type for more flexibility in device lookup for
    redirects, from Toke.

    5) Improvements to XDP forwarding sample code now utilizing recently enabled
    devmap lookups, from Jesper.

    6) Add support for reporting the effective cgroup progs in bpftool, from Jakub
    and Takshak.

    7) Fix reading kernel config from bpftool via /proc/config.gz, from Peter.

    8) Fix AF_XDP umem pages mapping for 32 bit architectures, from Ivan.

    9) Follow-up to add two more BPF loop tests for the selftest suite, from Alexei.

    10) Add perf event output helper also for other skb-based program types, from Allan.

    11) Fix a co-re related compilation error in selftests, from Yonghong.
    ====================

    Signed-off-by: Jakub Kicinski

    Jakub Kicinski
     

10 Aug, 2019

3 commits

  • Make it clear that this XDP program depend on the network
    stack to do the ARP resolution. This is connected with the
    BPF_FIB_LKUP_RET_NO_NEIGH return code from bpf_fib_lookup().

    Another common mistake (seen via XDP-tutorial) is that users
    don't realize that sysctl net.ipv{4,6}.conf.all.forwarding
    setting is honored by bpf_fib_lookup.

    Reported-by: Anton Protopopov
    Signed-off-by: Jesper Dangaard Brouer
    Reviewed-by: David Ahern
    Acked-by: Yonghong Song
    Reviewed-by: Toke Høiland-Jørgensen
    Signed-off-by: Daniel Borkmann

    Jesper Dangaard Brouer
     
  • This address the TODO in samples/bpf/xdp_fwd_kern.c, which points out
    that the chosen egress index should be checked for existence in the
    devmap. This can now be done via taking advantage of Toke's work in
    commit 0cdbb4b09a06 ("devmap: Allow map lookups from eBPF").

    This change makes xdp_fwd more practically usable, as this allows for
    a mixed environment, where IP-forwarding fallback to network stack, if
    the egress device isn't configured to use XDP.

    Signed-off-by: Jesper Dangaard Brouer
    Reviewed-by: David Ahern
    Reviewed-by: Toke Høiland-Jørgensen
    Acked-by: Yonghong Song
    Signed-off-by: Daniel Borkmann

    Jesper Dangaard Brouer
     
  • The devmap name 'tx_port' came from a copy-paste from xdp_redirect_map
    which only have a single TX port. Change name to xdp_tx_ports
    to make it more descriptive.

    Signed-off-by: Jesper Dangaard Brouer
    Reviewed-by: David Ahern
    Acked-by: Yonghong Song
    Reviewed-by: Toke Høiland-Jørgensen
    Signed-off-by: Daniel Borkmann

    Jesper Dangaard Brouer
     

09 Aug, 2019

1 commit


25 Jul, 2019

1 commit

  • The "WITH Linux-syscall-note" exception exists for headers exported to
    user space. It is strange to add it to non-exported headers.

    Commit 687a3e4d8e61 ("treewide: remove SPDX "WITH Linux-syscall-note"
    from kernel-space headers") did cleanups some months ago, but it looks
    like we need to do this periodically.

    This patch was generated by the following script:

    git grep -l -e Linux-syscall-note \
    -- :*.h :^arch/*/include/uapi/asm/*.h :^include/uapi/ :^tools |
    while read file
    do
    sed -i -e 's/(\(GPL-[^[:space:]]*\) WITH Linux-syscall-note)/\1/g' \
    -e 's/ WITH Linux-syscall-note//g' $file
    done

    I did not commit drivers/staging/android/uapi/ion.h . This header is
    not currently exported, but somebody may plan to move it to include/uapi/
    when the time comes. I am not sure. Anyway, it will be better to check
    the license inconsistency in drivers/staging/android/uapi/.

    Signed-off-by: Masahiro Yamada
    Reviewed-by: Thomas Gleixner
    Signed-off-by: Greg Kroah-Hartman

    Masahiro Yamada
     

24 Jul, 2019

2 commits


20 Jul, 2019

1 commit

  • Pull networking fixes from David Miller:

    1) Fix AF_XDP cq entry leak, from Ilya Maximets.

    2) Fix handling of PHY power-down on RTL8411B, from Heiner Kallweit.

    3) Add some new PCI IDs to iwlwifi, from Ihab Zhaika.

    4) Fix handling of neigh timers wrt. entries added by userspace, from
    Lorenzo Bianconi.

    5) Various cases of missing of_node_put(), from Nishka Dasgupta.

    6) The new NET_ACT_CT needs to depend upon NF_NAT, from Yue Haibing.

    7) Various RDS layer fixes, from Gerd Rausch.

    8) Fix some more fallout from TCQ_F_CAN_BYPASS generalization, from
    Cong Wang.

    9) Fix FIB source validation checks over loopback, also from Cong Wang.

    10) Use promisc for unsupported number of filters, from Justin Chen.

    11) Missing sibling route unlink on failure in ipv6, from Ido Schimmel.

    * git://git.kernel.org/pub/scm/linux/kernel/git/davem/net: (90 commits)
    tcp: fix tcp_set_congestion_control() use from bpf hook
    ag71xx: fix return value check in ag71xx_probe()
    ag71xx: fix error return code in ag71xx_probe()
    usb: qmi_wwan: add D-Link DWM-222 A2 device ID
    bnxt_en: Fix VNIC accounting when enabling aRFS on 57500 chips.
    net: dsa: sja1105: Fix missing unlock on error in sk_buff()
    gve: replace kfree with kvfree
    selftests/bpf: fix test_xdp_noinline on s390
    selftests/bpf: fix "valid read map access into a read-only array 1" on s390
    net/mlx5: Replace kfree with kvfree
    MAINTAINERS: update netsec driver
    ipv6: Unlink sibling route in case of failure
    liquidio: Replace vmalloc + memset with vzalloc
    udp: Fix typo in net/ipv4/udp.c
    net: bcmgenet: use promisc for unsupported filters
    ipv6: rt6_check should return NULL if 'from' is NULL
    tipc: initialize 'validated' field of received packets
    selftests: add a test case for rp_filter
    fib: relax source validation check for loopback packets
    mlxsw: spectrum: Do not process learned records with a dummy FID
    ...

    Linus Torvalds
     

19 Jul, 2019

1 commit

  • Alexei Starovoitov says:

    ====================
    pull-request: bpf 2019-07-18

    The following pull-request contains BPF updates for your *net* tree.

    The main changes are:

    1) verifier precision propagation fix, from Andrii.

    2) BTF size fix for typedefs, from Andrii.

    3) a bunch of big endian fixes, from Ilya.

    4) wide load from bpf_sock_addr fixes, from Stanislav.

    5) a bunch of misc fixes from a number of developers.
    ====================

    Signed-off-by: David S. Miller

    David S. Miller
     

18 Jul, 2019

1 commit

  • Pull VFIO updates from Alex Williamson:

    - Static symbol cleanup in mdev samples (Kefeng Wang)

    - Use vma help in nvlink code (Peng Hao)

    - Remove unused code in mbochs sample (YueHaibing)

    - Send uevents around mdev registration (Alex Williamson)

    * tag 'vfio-v5.3-rc1' of git://github.com/awilliam/linux-vfio:
    mdev: Send uevents around parent device registration
    sample/mdev/mbochs: remove set but not used variable 'mdev_state'
    vfio: vfio_pci_nvlink2: use a vma helper function
    vfio-mdev/samples: make some symbols static

    Linus Torvalds
     

16 Jul, 2019

1 commit

  • While $ARCH can be relatively flexible (see Makefile and
    tools/scripts/Makefile.arch), $SRCARCH always corresponds to a directory
    name under arch/.

    Therefore, build samples with -D__TARGET_ARCH_$(SRCARCH), since that
    matches the expectations of bpf_helpers.h.

    Signed-off-by: Ilya Leoshkevich
    Acked-by: Vasily Gorbik
    Acked-by: Andrii Nakryiko
    Signed-off-by: Daniel Borkmann

    Ilya Leoshkevich
     

15 Jul, 2019

2 commits

  • There are lots of documents under Documentation/*.txt and a few other
    orphan documents elsehwere that belong to the driver-API book.

    Move them to their right place.

    Reviewed-by: Cornelia Huck # vfio-related parts
    Acked-by: Logan Gunthorpe # switchtec
    Signed-off-by: Mauro Carvalho Chehab

    Mauro Carvalho Chehab
     
  • As it has some function definitions, move them to connector.h.

    The remaining conversion is actually:
    - add blank lines and identation in order to identify paragraphs;
    - fix tables markups;
    - add some lists markups;
    - mark literal blocks;
    - adjust title markups.

    At its new index.rst, let's add a :orphan: while this is not linked to
    the main index.rst file, in order to avoid build warnings.

    Signed-off-by: Mauro Carvalho Chehab

    Mauro Carvalho Chehab