1. 28 Dec, 2017 3 commits
    • kbuild test robot's avatar
      net: hns3: hns3_get_channels() can be static · 836df24a
      kbuild test robot authored
      Fixes: 482d2e9c ("net: hns3: add support to query tqps number")
      Signed-off-by: default avatarFengguang Wu <fengguang.wu@intel.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      836df24a
    • David S. Miller's avatar
      Merge git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next · fcffe2ed
      David S. Miller authored
      Daniel Borkmann says:
      
      ====================
      pull-request: bpf-next 2017-12-28
      
      The following pull-request contains BPF updates for your *net-next* tree.
      
      The main changes are:
      
      1) Fix incorrect state pruning related to recognition of zero initialized
         stack slots, where stacksafe exploration would mistakenly return a
         positive pruning verdict too early ignoring other slots, from Gianluca.
      
      2) Various BPF to BPF calls related follow-up fixes. Fix an off-by-one
         in maximum call depth check, and rework maximum stack depth tracking
         logic to fix a bypass of the total stack size check reported by Jann.
         Also fix a bug in arm64 JIT where prog->jited_len was uninitialized.
         Addition of various test cases to BPF selftests, from Alexei.
      
      3) Addition of a BPF selftest to test_verifier that is related to BPF to
         BPF calls which demonstrates a late caller stack size increase and
         thus out of bounds access. Fixed above in 2). Test case from Jann.
      
      4) Addition of correlating BPF helper calls, BPF to BPF calls as well
         as BPF maps to bpftool xlated dump in order to allow for better
         BPF program introspection and debugging, from Daniel.
      
      5) Fixing several bugs in BPF to BPF calls kallsyms handling in order
         to get it actually to work for subprogs, from Daniel.
      
      6) Extending sparc64 JIT support for BPF to BPF calls and fix a couple
         of build errors for libbpf on sparc64, from David.
      
      7) Allow narrower context access for BPF dev cgroup typed programs in
         order to adapt to LLVM code generation. Also adjust memlock rlimit
         in the test_dev_cgroup BPF selftest, from Yonghong.
      
      8) Add netdevsim Kconfig entry to BPF selftests since test_offload.py
         relies on netdevsim device being available, from Jakub.
      
      9) Reduce scope of xdp_do_generic_redirect_map() to being static,
         from Xiongwei.
      
      10) Minor cleanups and spelling fixes in BPF verifier, from Colin.
      ====================
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      fcffe2ed
    • Jakub Kicinski's avatar
      nfp: bpf: allocate vNIC priv for keeping track of the offloaded program · 4f83435a
      Jakub Kicinski authored
      After TC offloads were converted to callbacks we have no choice
      but keep track of the offloaded filter in the driver.
      
      Since this change came a little late in the release cycle
      there were a number of conflicts and allocation of vNIC priv
      structure seems to have slipped away in linux-next.
      Signed-off-by: default avatarJakub Kicinski <jakub.kicinski@netronome.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      4f83435a
  2. 27 Dec, 2017 37 commits