From patchwork Fri Aug 6 23:50:52 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Daniel Borkmann X-Patchwork-Id: 12424059 X-Patchwork-Delegate: kuba@kernel.org Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-21.8 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,INCLUDES_PULL_REQUEST, MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id AF1ECC4338F for ; Fri, 6 Aug 2021 23:50:59 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 830E660F43 for ; Fri, 6 Aug 2021 23:50:59 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229865AbhHFXvP (ORCPT ); Fri, 6 Aug 2021 19:51:15 -0400 Received: from www62.your-server.de ([213.133.104.62]:60630 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229773AbhHFXvO (ORCPT ); Fri, 6 Aug 2021 19:51:14 -0400 Received: from 65.47.5.85.dynamic.wline.res.cust.swisscom.ch ([85.5.47.65] helo=localhost) by www62.your-server.de with esmtpsa (TLSv1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.92.3) (envelope-from ) id 1mC9c5-0005bv-JB; Sat, 07 Aug 2021 01:50:53 +0200 From: Daniel Borkmann To: davem@davemloft.net Cc: kuba@kernel.org, daniel@iogearbox.net, ast@kernel.org, andrii.nakryiko@gmail.com, netdev@vger.kernel.org, bpf@vger.kernel.org Subject: pull-request: bpf 2021-08-07 Date: Sat, 7 Aug 2021 01:50:52 +0200 Message-Id: <20210806235052.16379-1-daniel@iogearbox.net> X-Mailer: git-send-email 2.21.0 MIME-Version: 1.0 X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.103.2/26255/Fri Aug 6 10:24:06 2021) Precedence: bulk List-ID: X-Mailing-List: bpf@vger.kernel.org Hi David, hi Jakub, The following pull-request contains BPF updates for your *net* tree. We've added 4 non-merge commits during the last 9 day(s) which contain a total of 4 files changed, 8 insertions(+), 7 deletions(-). The main changes are: 1) Fix integer overflow in htab's lookup + delete batch op, from Tatsuhiko Yasumatsu. 2) Fix invalid fd 0 close in libbpf if BTF parsing failed, from Daniel Xu. 3) Fix libbpf feature probe for BPF_PROG_TYPE_CGROUP_SOCKOPT, from Robin Gögge. 4) Fix minor libbpf doc warning regarding code-block language, from Randy Dunlap. Please consider pulling these changes from: git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git Thanks a lot! Also thanks to reporters, reviewers and testers of commits in this pull-request: Quentin Monnet, Yonghong Song ---------------------------------------------------------------- The following changes since commit fc16a5322ee6c30ea848818722eee5d352f8d127: Merge git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf (2021-07-29 00:53:32 +0100) are available in the Git repository at: https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git for you to fetch changes up to c4eb1f403243fc7bbb7de644db8587c03de36da6: bpf: Fix integer overflow involving bucket_size (2021-08-07 01:39:22 +0200) ---------------------------------------------------------------- Daniel Xu (1): libbpf: Do not close un-owned FD 0 on errors Randy Dunlap (1): libbpf, doc: Eliminate warnings in libbpf_naming_convention Robin Gögge (1): libbpf: Fix probe for BPF_PROG_TYPE_CGROUP_SOCKOPT Tatsuhiko Yasumatsu (1): bpf: Fix integer overflow involving bucket_size Documentation/bpf/libbpf/libbpf_naming_convention.rst | 4 ++-- kernel/bpf/hashtab.c | 4 ++-- tools/lib/bpf/btf.c | 3 +-- tools/lib/bpf/libbpf_probes.c | 4 +++- 4 files changed, 8 insertions(+), 7 deletions(-)