1. 25 5月, 2019 2 次提交
  2. 13 5月, 2019 1 次提交
  3. 28 4月, 2019 1 次提交
  4. 27 4月, 2019 1 次提交
  5. 16 4月, 2019 1 次提交
  6. 13 4月, 2019 2 次提交
  7. 12 4月, 2019 1 次提交
  8. 11 4月, 2019 1 次提交
  9. 10 4月, 2019 1 次提交
  10. 23 3月, 2019 1 次提交
  11. 22 3月, 2019 1 次提交
  12. 15 3月, 2019 1 次提交
  13. 14 3月, 2019 1 次提交
  14. 03 3月, 2019 1 次提交
  15. 28 2月, 2019 1 次提交
  16. 14 2月, 2019 1 次提交
  17. 11 2月, 2019 1 次提交
  18. 02 2月, 2019 2 次提交
  19. 27 1月, 2019 1 次提交
  20. 24 1月, 2019 1 次提交
  21. 19 12月, 2018 1 次提交
  22. 18 12月, 2018 1 次提交
  23. 13 12月, 2018 1 次提交
  24. 12 12月, 2018 1 次提交
  25. 11 12月, 2018 1 次提交
  26. 10 12月, 2018 2 次提交
  27. 06 12月, 2018 1 次提交
  28. 05 12月, 2018 1 次提交
  29. 04 12月, 2018 1 次提交
  30. 01 12月, 2018 4 次提交
    • D
      bpf: Add BPF_F_ANY_ALIGNMENT. · e9ee9efc
      David Miller 提交于
      Often we want to write tests cases that check things like bad context
      offset accesses.  And one way to do this is to use an odd offset on,
      for example, a 32-bit load.
      
      This unfortunately triggers the alignment checks first on platforms
      that do not set CONFIG_EFFICIENT_UNALIGNED_ACCESS.  So the test
      case see the alignment failure rather than what it was testing for.
      
      It is often not completely possible to respect the original intention
      of the test, or even test the same exact thing, while solving the
      alignment issue.
      
      Another option could have been to check the alignment after the
      context and other validations are performed by the verifier, but
      that is a non-trivial change to the verifier.
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      Signed-off-by: NAlexei Starovoitov <ast@kernel.org>
      e9ee9efc
    • J
      bpf: Improve socket lookup reuseport documentation · d74286d2
      Joe Stringer 提交于
      Improve the wording around socket lookup for reuseport sockets, and
      ensure that both bpf.h headers are in sync.
      Signed-off-by: NJoe Stringer <joe@wand.net.nz>
      Signed-off-by: NAlexei Starovoitov <ast@kernel.org>
      d74286d2
    • J
      bpf: Support sk lookup in netns with id 0 · f71c6143
      Joe Stringer 提交于
      David Ahern and Nicolas Dichtel report that the handling of the netns id
      0 is incorrect for the BPF socket lookup helpers: rather than finding
      the netns with id 0, it is resolving to the current netns. This renders
      the netns_id 0 inaccessible.
      
      To fix this, adjust the API for the netns to treat all negative s32
      values as a lookup in the current netns (including u64 values which when
      truncated to s32 become negative), while any values with a positive
      value in the signed 32-bit integer space would result in a lookup for a
      socket in the netns corresponding to that id. As before, if the netns
      with that ID does not exist, no socket will be found. Any netns outside
      of these ranges will fail to find a corresponding socket, as those
      values are reserved for future usage.
      Signed-off-by: NJoe Stringer <joe@wand.net.nz>
      Acked-by: NNicolas Dichtel <nicolas.dichtel@6wind.com>
      Acked-by: NJoey Pabalinas <joeypabalinas@gmail.com>
      Signed-off-by: NAlexei Starovoitov <ast@kernel.org>
      f71c6143
    • D
      bpf: fix pointer offsets in context for 32 bit · b7df9ada
      Daniel Borkmann 提交于
      Currently, pointer offsets in three BPF context structures are
      broken in two scenarios: i) 32 bit compiled applications running
      on 64 bit kernels, and ii) LLVM compiled BPF programs running
      on 32 bit kernels. The latter is due to BPF target machine being
      strictly 64 bit. So in each of the cases the offsets will mismatch
      in verifier when checking / rewriting context access. Fix this by
      providing a helper macro __bpf_md_ptr() that will enforce padding
      up to 64 bit and proper alignment, and for context access a macro
      bpf_ctx_range_ptr() which will cover full 64 bit member range on
      32 bit archs. For flow_keys, we additionally need to force the
      size check to sizeof(__u64) as with other pointer types.
      
      Fixes: d58e468b ("flow_dissector: implements flow dissector BPF hook")
      Fixes: 4f738adb ("bpf: create tcp_bpf_ulp allowing BPF to monitor socket TX/RX data")
      Fixes: 2dbb9b9e ("bpf: Introduce BPF_PROG_TYPE_SK_REUSEPORT")
      Reported-by: NDavid S. Miller <davem@davemloft.net>
      Signed-off-by: NDaniel Borkmann <daniel@iogearbox.net>
      Acked-by: NDavid S. Miller <davem@davemloft.net>
      Tested-by: NDavid S. Miller <davem@davemloft.net>
      Signed-off-by: NAlexei Starovoitov <ast@kernel.org>
      b7df9ada
  31. 29 11月, 2018 1 次提交
  32. 23 11月, 2018 1 次提交
  33. 21 11月, 2018 1 次提交