lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 28 May 2024 12:59:24 +0200
From: Daniel Borkmann <daniel@...earbox.net>
To: davem@...emloft.net
Cc: kuba@...nel.org,
	pabeni@...hat.com,
	edumazet@...gle.com,
	daniel@...earbox.net,
	ast@...nel.org,
	andrii@...nel.org,
	martin.lau@...ux.dev,
	netdev@...r.kernel.org,
	bpf@...r.kernel.org
Subject: pull-request: bpf-next 2024-05-28

Hi David, hi Jakub, hi Paolo, hi Eric,

The following pull-request contains BPF updates for your *net-next* tree.

We've added 23 non-merge commits during the last 11 day(s) which contain
a total of 45 files changed, 696 insertions(+), 277 deletions(-).

The main changes are:

1) Rename skb's mono_delivery_time to tstamp_type for extensibility and add
   SKB_CLOCK_TAI type support to bpf_skb_set_tstamp(), from Abhishek Chauhan.

2) Add netfilter CT zone ID and direction to bpf_ct_opts so that arbitrary CT zones
   can be used from XDP/tc BPF netfilter CT helper functions, from Brad Cowie.

3) Several tweaks to the instruction-set.rst IETF doc to address the Last Call
   review comments, from Dave Thaler.

4) Small batch of riscv64 BPF JIT optimizations in order to emit more compressed
   instructions to the JITed image for better icache efficiency, from Xiao Wang.

5) Sort bpftool C dump output from BTF, aiming to simplify vmlinux.h diffing and
   forcing more natural type definitions ordering, from Mykyta Yatsenko.

6) Use DEV_STATS_INC() macro in BPF redirect helpers to silence a syzbot/KCSAN
   race report for the tx_errors counter, from Jiang Yunshui.

7) Un-constify bpf_func_info in bpftool to fix compilation with LLVM 17+ which
   started treating const structs as constants and thus breaking full BTF program
   name resolution, from Ivan Babrou.

8) Fix up BPF program numbers in test_sockmap selftest in order to reduce some
   of the test-internal array sizes, from Geliang Tang.

9) Small cleanup in Makefile.btf script to use test-ge check for v1.25-only
   pahole, from Alan Maguire.

10) Fix bpftool's make dependencies for vmlinux.h in order to avoid needless
    rebuilds in some corner cases, from Artem Savkov.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git tags/for-netdev

Thanks a lot!

Also thanks to reporters, reviewers and testers of commits in this pull-request:

Andrew Jones, Andrii Nakryiko, Björn Töpel, Christoph Hellwig, David 
Vernet, Joel Granados, Martin KaFai Lau, Nick Desaulniers, Pu Lehui, 
Quentin Monnet, syzbot, Willem de Bruijn, Yonghong Song

----------------------------------------------------------------

The following changes since commit 4b377b4868ef17b040065bd468668c707d2477a5:

  kprobe/ftrace: fix build error due to bad function definition (2024-05-17 19:17:55 -0700)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git tags/for-netdev

for you to fetch changes up to d9cbd8343b010016fcaabc361c37720dcafddcbe:

  bpf, net: Use DEV_STAT_INC() (2024-05-28 12:04:11 +0200)

----------------------------------------------------------------
bpf-next-for-netdev

----------------------------------------------------------------
Abhishek Chauhan (3):
      net: Rename mono_delivery_time to tstamp_type for scalabilty
      net: Add additional bit to support clockid_t timestamp type
      selftests/bpf: Handle forwarding of UDP CLOCK_TAI packets

Alan Maguire (1):
      kbuild, bpf: Use test-ge check for v1.25-only pahole

Artem Savkov (1):
      bpftool: Fix make dependencies for vmlinux.h

Brad Cowie (2):
      net: netfilter: Make ct zone opts configurable for bpf ct helpers
      selftests/bpf: Update tests for new ct zone opts for nf_conntrack kfuncs

Dave Thaler (6):
      bpf, docs: Move sentence about returning R0 to abi.rst
      bpf, docs: Use RFC 2119 language for ISA requirements
      bpf, docs: clarify sign extension of 64-bit use of 32-bit imm
      bpf, docs: Add table captions
      bpf, docs: Clarify call local offset
      bpf, docs: Fix instruction.rst indentation

Geliang Tang (1):
      selftests/bpf: Fix prog numbers in test_sockmap

Ivan Babrou (1):
      bpftool: Un-const bpf_func_info to fix it for llvm 17 and newer

Martin KaFai Lau (1):
      Merge branch 'Replace mono_delivery_time with tstamp_type'

Mohammad Shehar Yaar Tausif (1):
      bpf: Fix order of args in call to bpf_map_kvcalloc

Mykyta Yatsenko (1):
      bpftool: Introduce btf c dump sorting

Thomas Weißschuh (1):
      bpf: constify member bpf_sysctl_kern:: Table

Xiao Wang (3):
      riscv, bpf: Optimize zextw insn with Zba extension
      riscv, bpf: Use STACK_ALIGN macro for size rounding up
      riscv, bpf: Try RVC for reg move within BPF_CMPXCHG JIT

Ying Zhang (1):
      bpf: Remove unused variable "prev_state"

yunshui (1):
      bpf, net: Use DEV_STAT_INC()

 Documentation/bpf/standardization/abi.rst          |   3 +
 .../bpf/standardization/instruction-set.rst        | 261 ++++++++++++---------
 arch/riscv/Kconfig                                 |  12 +
 arch/riscv/net/bpf_jit.h                           |  18 ++
 arch/riscv/net/bpf_jit_comp64.c                    |  12 +-
 include/linux/filter.h                             |   2 +-
 include/linux/skbuff.h                             |  68 ++++--
 include/net/inet_frag.h                            |   4 +-
 include/uapi/linux/bpf.h                           |  15 +-
 kernel/bpf/bpf_local_storage.c                     |   4 +-
 net/bridge/netfilter/nf_conntrack_bridge.c         |   6 +-
 net/core/dev.c                                     |   2 +-
 net/core/filter.c                                  |  62 ++---
 net/ieee802154/6lowpan/reassembly.c                |   2 +-
 net/ipv4/inet_fragment.c                           |   2 +-
 net/ipv4/ip_fragment.c                             |   2 +-
 net/ipv4/ip_output.c                               |  14 +-
 net/ipv4/raw.c                                     |   2 +-
 net/ipv4/tcp_ipv4.c                                |   2 +
 net/ipv4/tcp_output.c                              |  14 +-
 net/ipv6/ip6_output.c                              |  11 +-
 net/ipv6/netfilter.c                               |   6 +-
 net/ipv6/netfilter/nf_conntrack_reasm.c            |   2 +-
 net/ipv6/raw.c                                     |   2 +-
 net/ipv6/reassembly.c                              |   2 +-
 net/ipv6/tcp_ipv6.c                                |  12 +-
 net/netfilter/nf_conntrack_bpf.c                   |  68 +++++-
 net/packet/af_packet.c                             |   7 +-
 net/sched/act_bpf.c                                |   4 +-
 net/sched/cls_bpf.c                                |   4 +-
 samples/bpf/cpustat_kern.c                         |   3 +-
 scripts/Makefile.btf                               |   4 +-
 tools/bpf/bpftool/Documentation/bpftool-btf.rst    |   6 +-
 tools/bpf/bpftool/Makefile                         |   3 +-
 tools/bpf/bpftool/bash-completion/bpftool          |   3 +
 tools/bpf/bpftool/btf.c                            | 138 ++++++++++-
 tools/bpf/bpftool/common.c                         |   2 +-
 tools/include/uapi/linux/bpf.h                     |  15 +-
 tools/testing/selftests/bpf/config                 |   1 +
 tools/testing/selftests/bpf/prog_tests/bpf_nf.c    |   7 +
 .../testing/selftests/bpf/prog_tests/ctx_rewrite.c |  10 +-
 .../testing/selftests/bpf/prog_tests/tc_redirect.c |   3 -
 tools/testing/selftests/bpf/progs/test_bpf_nf.c    | 108 +++++++++
 tools/testing/selftests/bpf/progs/test_tc_dtime.c  |  39 ++-
 tools/testing/selftests/bpf/test_sockmap.c         |   6 +-
 45 files changed, 696 insertions(+), 277 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ