lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20251110232427.3929291-1-martin.lau@linux.dev>
Date: Mon, 10 Nov 2025 15:24:27 -0800
From: Martin KaFai Lau <martin.lau@...ux.dev>
To: David Miller <davem@...emloft.net>,
	Jakub Kicinski <kuba@...nel.org>,
	Eric Dumazet <edumazet@...gle.com>,
	Paolo Abeni <pabeni@...hat.com>
Cc: Alexei Starovoitov <ast@...nel.org>,
	Andrii Nakryiko <andrii@...nel.org>,
	Daniel Borkmann <daniel@...earbox.net>,
	Martin KaFai Lau <martin.lau@...nel.org>,
	netdev@...r.kernel.org,
	bpf@...r.kernel.org
Subject: pull-request: bpf-next 2025-11-10

Hi David, hi Jakub, hi Paolo, hi Eric,

The following pull-request contains BPF updates for your *net-next* tree.

We've added 19 non-merge commits during the last 3 day(s) which contain
a total of 22 files changed, 1345 insertions(+), 197 deletions(-).

The main changes are:

1) Preserve skb metadata after a TC BPF program has changed the skb,
   from Jakub Sitnicki.
   This allows a TC program at the end of a TC filter chain to still see
   the skb metadata, even if another TC program at the front of the chain
   has changed the skb using BPF helpers.

2) Initial af_smc bpf_struct_ops support to control the smc specific
   syn/synack options, from D. Wythe.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git tags/for-netdev

Thanks a lot!

Also thanks to reporters, reviewers and testers of commits in this pull-request:

Dust Li, Saket Kumar Bhaskar, Zhu Yanjun

----------------------------------------------------------------

The following changes since commit a0c3aefb08cd81864b17c23c25b388dba90b9dad:

  Merge branch '40GbE' of git://git.kernel.org/pub/scm/linux/kernel/git/tnguy/next-queue (2025-11-07 19:15:36 -0800)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git tags/for-netdev

for you to fetch changes up to 67f4cfb530150387dedc13bac7e2ab7f1a525d7f:

  Merge branch 'net-smc-introduce-smc_hs_ctrl' (2025-11-10 12:00:47 -0800)

----------------------------------------------------------------
bpf-next-for-netdev

----------------------------------------------------------------
D. Wythe (3):
      bpf: Export necessary symbols for modules with struct_ops
      net/smc: bpf: Introduce generic hook for handshake flow
      bpf/selftests: Add selftest for bpf_smc_hs_ctrl

Jakub Sitnicki (16):
      net: Helper to move packet data and metadata after skb_push/pull
      net: Preserve metadata on pskb_expand_head
      bpf: Unclone skb head on bpf_dynptr_write to skb metadata
      vlan: Make vlan_remove_tag return nothing
      bpf: Make bpf_skb_vlan_pop helper metadata-safe
      bpf: Make bpf_skb_vlan_push helper metadata-safe
      bpf: Make bpf_skb_adjust_room metadata-safe
      bpf: Make bpf_skb_change_proto helper metadata-safe
      bpf: Make bpf_skb_change_head helper metadata-safe
      selftests/bpf: Verify skb metadata in BPF instead of userspace
      selftests/bpf: Dump skb metadata on verification failure
      selftests/bpf: Expect unclone to preserve skb metadata
      selftests/bpf: Cover skb metadata access after vlan push/pop helper
      selftests/bpf: Cover skb metadata access after bpf_skb_adjust_room
      selftests/bpf: Cover skb metadata access after change_head/tail helper
      selftests/bpf: Cover skb metadata access after bpf_skb_change_proto

Martin KaFai Lau (2):
      Merge branch 'make-tc-bpf-helpers-preserve-skb-metadata'
      Merge branch 'net-smc-introduce-smc_hs_ctrl'

 include/linux/filter.h                             |   9 +
 include/linux/if_vlan.h                            |  13 +-
 include/linux/skbuff.h                             |  75 ++++
 include/net/netns/smc.h                            |   3 +
 include/net/smc.h                                  |  53 +++
 kernel/bpf/bpf_struct_ops.c                        |   2 +
 kernel/bpf/helpers.c                               |   6 +-
 kernel/bpf/syscall.c                               |   1 +
 net/core/filter.c                                  |  34 +-
 net/core/skbuff.c                                  |   6 +-
 net/ipv4/tcp_output.c                              |  31 +-
 net/smc/Kconfig                                    |  10 +
 net/smc/Makefile                                   |   1 +
 net/smc/af_smc.c                                   |   9 +
 net/smc/smc_hs_bpf.c                               | 140 ++++++++
 net/smc/smc_hs_bpf.h                               |  31 ++
 net/smc/smc_sysctl.c                               |  91 +++++
 tools/testing/selftests/bpf/config                 |   5 +
 .../selftests/bpf/prog_tests/test_bpf_smc.c        | 390 +++++++++++++++++++++
 .../bpf/prog_tests/xdp_context_test_run.c          | 129 ++++---
 tools/testing/selftests/bpf/progs/bpf_smc.c        | 117 +++++++
 tools/testing/selftests/bpf/progs/test_xdp_meta.c  | 386 ++++++++++++++------
 22 files changed, 1345 insertions(+), 197 deletions(-)
 create mode 100644 net/smc/smc_hs_bpf.c
 create mode 100644 net/smc/smc_hs_bpf.h
 create mode 100644 tools/testing/selftests/bpf/prog_tests/test_bpf_smc.c
 create mode 100644 tools/testing/selftests/bpf/progs/bpf_smc.c

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ