Hi David, The following pull-request contains BPF updates for your *net* tree.
The main changes are: 1) Fix BPF sockmap and tls where we get a hang in do_tcp_sendpages() when sndbuf is full due to missing calls into underlying socket's sk_write_space(), from John. 2) Two BPF sockmap fixes to reject invalid parameters on map creation and to fix a map element miscount on allocation failure. Another fix for BPF hash tables to use per hash table salt for jhash(), from Daniel. 3) Fix for bpftool's command line parsing in order to terminate on bad arguments instead of keeping looping in some border cases, from Quentin. 4) Fix error value of xdp_umem_assign_dev() in order to comply with expected bind ops error codes, from Prashant. Please consider pulling these changes from: git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git Thanks a lot! ---------------------------------------------------------------- The following changes since commit b93c1b5ac8643cc08bb74fa8ae21d6c63dfcb23d: hv_netvsc: ignore devices that are not PCI (2018-08-21 12:02:11 -0700) are available in the git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git for you to fetch changes up to 785e76d7a2051a9e28b9134d5388a45b16f5eb72: tools: bpftool: return from do_event_pipe() on bad arguments (2018-08-23 20:17:57 +0200) ---------------------------------------------------------------- Daniel Borkmann (3): bpf, sockmap: fix sock_hash_alloc and reject zero-sized keys bpf, sockmap: fix sock hash count in alloc_sock_hash_elem bpf: use per htab salt for bucket hash John Fastabend (2): tls: possible hang when do_tcp_sendpages hits sndbuf is full case bpf: sockmap: write_space events need to be passed to TCP handler Prashant Bhole (1): xsk: fix return value of xdp_umem_assign_dev() Quentin Monnet (1): tools: bpftool: return from do_event_pipe() on bad arguments kernel/bpf/hashtab.c | 23 +++++++++++++---------- kernel/bpf/sockmap.c | 11 +++++++++-- net/tls/tls_main.c | 9 +++++++-- net/xdp/xdp_umem.c | 4 ++-- tools/bpf/bpftool/map_perf_ring.c | 5 ++++- 5 files changed, 35 insertions(+), 17 deletions(-)