[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20230623211256.8409-1-daniel@iogearbox.net>
Date: Fri, 23 Jun 2023 23:12:56 +0200
From: Daniel Borkmann <daniel@...earbox.net>
To: davem@...emloft.net
Cc: kuba@...nel.org,
pabeni@...hat.com,
edumazet@...gle.com,
daniel@...earbox.net,
ast@...nel.org,
andrii@...nel.org,
martin.lau@...ux.dev,
netdev@...r.kernel.org,
bpf@...r.kernel.org
Subject: pull-request: bpf-next 2023-06-23
Hi David, hi Jakub, hi Paolo, hi Eric,
The following pull-request contains BPF updates for your *net-next* tree.
We've added 49 non-merge commits during the last 24 day(s) which contain
a total of 70 files changed, 1935 insertions(+), 442 deletions(-).
The main changes are:
1) Extend bpf_fib_lookup helper to allow passing the route table ID, from Louis DeLosSantos.
2) Fix regsafe() in verifier to call check_ids() for scalar registers, from Eduard Zingerman.
3) Extend the set of cpumask kfuncs with bpf_cpumask_first_and() and a rework of
bpf_cpumask_any*() kfuncs. Additionally, add selftests, from David Vernet.
4) Fix socket lookup BPF helpers for tc/XDP to respect VRF bindings, from Gilad Sever.
5) Change bpf_link_put() to use workqueue unconditionally to fix it under PREEMPT_RT,
from Sebastian Andrzej Siewior.
6) Follow-ups to address issues in the bpf_refcount shared ownership implementation,
from Dave Marchevsky.
7) A few general refactorings to BPF map and program creation permissions checks which
were part of the BPF token series, from Andrii Nakryiko.
8) Various fixes for benchmark framework and add a new benchmark for BPF memory
allocator to BPF selftests, from Hou Tao.
9) Documentation improvements around iterators and trusted pointers, from Anton Protopopov.
10) Small cleanup in verifier to improve allocated object check, from Daniel T. Lee.
11) Improve performance of bpf_xdp_pointer() by avoiding access to shared_info when
XDP packet does not have frags, from Jesper Dangaard Brouer.
12) Silence a harmless syzbot-reported warning in btf_type_id_size(), from Yonghong Song.
13) Remove duplicate bpfilter_umh_cleanup in favor of umd_cleanup_helper, from Jarkko Sakkinen.
14) Fix BPF selftests build for resolve_btfids under custom HOSTCFLAGS, from Viktor Malik.
Please consider pulling these changes from:
git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git tags/for-netdev
Thanks a lot!
Also thanks to reporters, reviewers and testers of commits in this pull-request:
Andrii Nakryiko, Dan Carpenter, Eyal Birger, Jiri Olsa, Kees Cook,
kernel test robot, Kumar Kartikeya Dwivedi, Lorenzo Bianconi, Maciej
Fijalkowski, Shmulik Ladkani, Simon Horman, Stanislav Fomichev, Tariq
Toukan, Toke Høiland-Jørgensen, Yonghong Song
----------------------------------------------------------------
The following changes since commit bc590b47549225a03c6b36bbc1aede75c917767b:
r8169: check for PCI read error in probe (2023-05-30 13:14:53 +0200)
are available in the Git repository at:
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git tags/for-netdev
for you to fetch changes up to fbc5669de62a452fb3a26a4560668637d5c9e7b5:
bpf, docs: Document existing macros instead of deprecated (2023-06-22 19:47:32 +0200)
----------------------------------------------------------------
bpf-next-for-netdev
----------------------------------------------------------------
Andrii Nakryiko (5):
Merge branch 'verify scalar ids mapping in regsafe()'
bpf: Move unprivileged checks into map_create() and bpf_prog_load()
bpf: Inline map creation logic in map_create() function
bpf: Centralize permissions checks for all BPF map types
bpf: Keep BPF_PROG_LOAD permission checks clear of validations
Anton Protopopov (2):
bpf, docs: BPF Iterator Document
bpf, docs: Document existing macros instead of deprecated
Arnd Bergmann (1):
bpf: Hide unused bpf_patch_call_args
Azeem Shaikh (1):
bpf: Replace all non-returning strlcpy with strscpy
Daniel T. Lee (1):
bpf: Replace open code with for allocated object check
Dave Marchevsky (3):
bpf: Set kptr_struct_meta for node param to list and rbtree insert funcs
bpf: Fix __bpf_{list,rbtree}_add's beginning-of-node calculation
bpf: Make bpf_refcount_acquire fallible for non-owning refs
David Vernet (8):
bpf: Teach verifier that trusted PTR_TO_BTF_ID pointers are non-NULL
selftests/bpf: Add test for non-NULLable PTR_TO_BTF_IDs
selftests/bpf: Add missing selftests kconfig options
bpf: Add bpf_cpumask_first_and() kfunc
selftests/bpf: Add test for new bpf_cpumask_first_and() kfunc
bpf: Replace bpf_cpumask_any* with bpf_cpumask_any_distribute*
selftests/bpf: Update bpf_cpumask_any* tests to use bpf_cpumask_any_distribute*
bpf/docs: Update documentation for new cpumask kfuncs
Eduard Zingerman (5):
selftests/bpf: Fix invalid pointer check in get_xlated_program()
bpf: Use scalar ids in mark_chain_precision()
selftests/bpf: Check if mark_chain_precision() follows scalar ids
bpf: Verify scalar ids mapping in regsafe() using check_ids()
selftests/bpf: Verify that check_ids() is used for scalars in regsafe()
Gilad Sever (4):
bpf: Factor out socket lookup functions for the TC hookpoint.
bpf: Call __bpf_sk_lookup()/__bpf_skc_lookup() directly via TC hookpoint
bpf: Fix bpf socket lookup from tc/xdp to respect socket VRF bindings
selftests/bpf: Add vrf_socket_lookup tests
Hou Tao (5):
bpf: Factor out a common helper free_all()
selftests/bpf: Use producer_cnt to allocate local counter array
selftests/bpf: Output the correct error code for pthread APIs
selftests/bpf: Ensure that next_cpu() returns a valid CPU number
selftests/bpf: Set the default value of consumer_cnt as 0
Jarkko Sakkinen (1):
net: Use umd_cleanup_helper()
Jesper Dangaard Brouer (3):
samples/bpf: xdp1 and xdp2 reduce XDPBUFSIZE to 60
bpf/xdp: optimize bpf_xdp_pointer to avoid reading sinfo
selftests/bpf: Fix check_mtu using wrong variable type
Jiri Olsa (1):
selftests/bpf: Add missing prototypes for several test kfuncs
Louis DeLosSantos (2):
bpf: Add table ID to bpf_fib_lookup BPF helper
selftests/bpf: Test table ID fib lookup BPF helper
Ruiqi Gong (1):
bpf: Cleanup unused function declaration
Sebastian Andrzej Siewior (1):
bpf: Remove in_atomic() from bpf_link_put().
Su Hui (1):
bpf/tests: Use struct_size()
Viktor Malik (1):
tools/resolve_btfids: Fix setting HOSTCFLAGS
Yonghong Song (3):
bpf: Silence a warning in btf_type_id_size()
selftests/bpf: Add a test where map key_type_id with decl_tag type
selftests/bpf: Fix compilation failure for prog vrf_socket_lookup
YueHaibing (1):
xsk: Remove unused inline function xsk_buff_discard()
Documentation/bpf/bpf_iterators.rst | 7 +-
Documentation/bpf/cpumasks.rst | 5 +-
Documentation/bpf/kfuncs.rst | 38 +-
include/linux/bpf_verifier.h | 25 +-
include/linux/bpfilter.h | 1 -
include/linux/filter.h | 1 -
include/linux/netdevice.h | 9 +
include/net/xdp_sock_drv.h | 4 -
include/uapi/linux/bpf.h | 21 +-
kernel/bpf/bloom_filter.c | 3 -
kernel/bpf/bpf_local_storage.c | 3 -
kernel/bpf/bpf_struct_ops.c | 3 -
kernel/bpf/btf.c | 19 +-
kernel/bpf/core.c | 8 +-
kernel/bpf/cpumap.c | 4 -
kernel/bpf/cpumask.c | 38 +-
kernel/bpf/devmap.c | 3 -
kernel/bpf/hashtab.c | 6 -
kernel/bpf/helpers.c | 12 +-
kernel/bpf/lpm_trie.c | 3 -
kernel/bpf/memalloc.c | 31 +-
kernel/bpf/preload/bpf_preload_kern.c | 4 +-
kernel/bpf/queue_stack_maps.c | 4 -
kernel/bpf/reuseport_array.c | 3 -
kernel/bpf/stackmap.c | 3 -
kernel/bpf/syscall.c | 184 +++---
kernel/bpf/verifier.c | 248 ++++++--
lib/test_bpf.c | 3 +-
net/bpfilter/bpfilter_kern.c | 2 +-
net/core/filter.c | 147 ++++-
net/core/sock_map.c | 4 -
net/ipv4/bpfilter/sockopt.c | 11 +-
net/xdp/xskmap.c | 4 -
samples/bpf/xdp1_kern.c | 2 +-
samples/bpf/xdp2_kern.c | 2 +-
tools/bpf/resolve_btfids/Makefile | 4 +-
tools/include/uapi/linux/bpf.h | 21 +-
tools/testing/selftests/bpf/bench.c | 15 +-
tools/testing/selftests/bpf/bench.h | 1 +
.../selftests/bpf/benchs/bench_bloom_filter_map.c | 14 +-
.../bpf/benchs/bench_bpf_hashmap_full_update.c | 10 +-
.../bpf/benchs/bench_bpf_hashmap_lookup.c | 10 +-
.../testing/selftests/bpf/benchs/bench_bpf_loop.c | 10 +-
tools/testing/selftests/bpf/benchs/bench_count.c | 14 +-
.../selftests/bpf/benchs/bench_local_storage.c | 12 +-
.../bpf/benchs/bench_local_storage_create.c | 8 +-
.../benchs/bench_local_storage_rcu_tasks_trace.c | 10 +-
tools/testing/selftests/bpf/benchs/bench_rename.c | 15 +-
.../testing/selftests/bpf/benchs/bench_ringbufs.c | 2 +-
tools/testing/selftests/bpf/benchs/bench_strncmp.c | 11 +-
tools/testing/selftests/bpf/benchs/bench_trigger.c | 21 +-
.../selftests/bpf/benchs/run_bench_ringbufs.sh | 26 +-
.../selftests/bpf/bpf_testmod/bpf_testmod.c | 16 +-
.../selftests/bpf/bpf_testmod/bpf_testmod_kfunc.h | 7 +
tools/testing/selftests/bpf/config | 4 +
tools/testing/selftests/bpf/prog_tests/btf.c | 40 ++
tools/testing/selftests/bpf/prog_tests/check_mtu.c | 2 +-
tools/testing/selftests/bpf/prog_tests/cpumask.c | 2 +
.../testing/selftests/bpf/prog_tests/fib_lookup.c | 61 +-
.../selftests/bpf/prog_tests/unpriv_bpf_disabled.c | 6 +-
tools/testing/selftests/bpf/prog_tests/verifier.c | 2 +
.../selftests/bpf/prog_tests/vrf_socket_lookup.c | 312 ++++++++++
tools/testing/selftests/bpf/progs/cpumask_common.h | 6 +-
.../testing/selftests/bpf/progs/cpumask_success.c | 64 +-
.../testing/selftests/bpf/progs/refcounted_kptr.c | 2 +
.../selftests/bpf/progs/refcounted_kptr_fail.c | 4 +-
.../selftests/bpf/progs/verifier_scalar_ids.c | 659 +++++++++++++++++++++
.../selftests/bpf/progs/vrf_socket_lookup.c | 89 +++
tools/testing/selftests/bpf/test_verifier.c | 24 +-
tools/testing/selftests/bpf/verifier/precise.c | 8 +-
70 files changed, 1935 insertions(+), 442 deletions(-)
create mode 100644 tools/testing/selftests/bpf/prog_tests/vrf_socket_lookup.c
create mode 100644 tools/testing/selftests/bpf/progs/verifier_scalar_ids.c
create mode 100644 tools/testing/selftests/bpf/progs/vrf_socket_lookup.c
Powered by blists - more mailing lists