mbox series

pull-request: bpf-next 2023-07-13

Message ID 20230714020910.80794-1-alexei.starovoitov@gmail.com (mailing list archive)
State Accepted
Commit b0b0ab6f013185f25ad0fcd9111802d92d1631dc
Headers show
Series pull-request: bpf-next 2023-07-13 | expand

Pull-request

https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git tags/for-netdev

Checks

Context Check Description
netdev/tree_selection success Pull request for net-next, async
netdev/build_32bit fail Errors and warnings before: 15857 this patch: 15860
netdev/build_clang success Errors and warnings before: 4831 this patch: 4829
netdev/verify_signedoff success Signed-off-by tag matches author and committer
netdev/verify_fixes success Fixes tag looks correct
netdev/build_allmodconfig_warn fail Errors and warnings before: 16894 this patch: 16897

Message

Alexei Starovoitov July 14, 2023, 2:09 a.m. UTC
Hi David, hi Jakub, hi Paolo, hi Eric,

The following pull-request contains BPF updates for your *net-next* tree.

We've added 67 non-merge commits during the last 15 day(s) which contain
a total of 106 files changed, 4444 insertions(+), 619 deletions(-).

The main changes are:

1) Fix bpftool build in presence of stale vmlinux.h, from Alexander Lobakin.

2) Introduce bpf_me_mcache_free_rcu() and fix OOM under stress, from Alexei Starovoitov.

3) Teach verifier actual bounds of bpf_get_smp_processor_id() and fix perf+libbpf issue
   related to custom section handling, from Andrii Nakryiko.

4) Introduce bpf map element count, from Anton Protopopov.

5) Check skb ownership against full socket, from Kui-Feng Lee.

6) Support for up to 12 arguments in BPF trampoline, from Menglong Dong.

7) Export rcu_request_urgent_qs_task, from Paul E. McKenney.

8) Fix BTF walking of unions, from Yafang Shao.

9) Extend link_info for kprobe_multi and perf_event links, from Yafang Shao.

There should be no merge conflicts.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git tags/for-netdev

Thanks a lot!

Also thanks to reporters, reviewers and testers of commits in this pull-request:

Alexei Starovoitov, Andrii Nakryiko, Dan Carpenter, Daniel Xu, David 
Vernet, Fabio M. De Francesco, Hou Tao, Ira Weiny, Jiri Olsa, John 
Fastabend, kernel test robot, Quentin Monnet, Ravi Bangoria, Stanislav 
Fomichev, Toke Høiland-Jørgensen, Yonghong Song

----------------------------------------------------------------

The following changes since commit 3a8a670eeeaa40d87bd38a587438952741980c18:

  Merge tag 'net-next-6.5' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next (2023-06-28 16:43:10 -0700)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git tags/for-netdev

for you to fetch changes up to 1cd0e7715cad848017e48033772791e8b9ee2932:

  selftests/bpf: Add selftest for PTR_UNTRUSTED (2023-07-13 16:24:29 -0700)

----------------------------------------------------------------
for-netdev

----------------------------------------------------------------
Alexander Lobakin (3):
      bpftool: use a local copy of perf_event to fix accessing :: Bpf_cookie
      bpftool: Define a local bpf_perf_link to fix accessing its fields
      bpftool: Use a local bpf_perf_event_value to fix accessing its fields

Alexei Starovoitov (15):
      Merge branch 'bpf: add percpu stats for bpf_map'
      Merge branch 'bpf: Support ->fill_link_info for kprobe_multi and perf_event links'
      bpf: Rename few bpf_mem_alloc fields.
      bpf: Simplify code of destroy_mem_alloc() with kmemdup().
      bpf: Let free_all() return the number of freed elements.
      bpf: Refactor alloc_bulk().
      bpf: Factor out inc/dec of active flag into helpers.
      bpf: Further refactor alloc_bulk().
      bpf: Change bpf_mem_cache draining process.
      bpf: Add a hint to allocated objects.
      bpf: Allow reuse from waiting_for_gp_ttrace list.
      selftests/bpf: Improve test coverage of bpf_mem_alloc.
      bpf: Introduce bpf_mem_free_rcu() similar to kfree_rcu().
      bpf: Convert bpf_cpumask to bpf_mem_cache_free_rcu.
      Merge branch 'bpf-x86-allow-function-arguments-up-to-12-for-tracing'

Andrea Terzolo (1):
      libbpf: Skip modules BTF loading when CAP_SYS_ADMIN is missing

Andrii Nakryiko (6):
      Merge branch 'libbpf: add netfilter link attach helper'
      libbpf: only reset sec_def handler when necessary
      Merge branch 'bpftool: Fix skeletons compilation for older kernels'
      libbpf: Fix realloc API handling in zero-sized edge cases
      bpf: teach verifier actual bounds of bpf_get_smp_processor_id() result
      selftests/bpf: extend existing map resize tests for per-cpu use case

Anton Protopopov (5):
      bpf: add percpu stats for bpf_map elements insertions/deletions
      bpf: add a new kfunc to return current bpf_map elements count
      bpf: populate the per-cpu insertions/deletions counters for hashmaps
      bpf: make preloaded map iterators to display map elements count
      selftests/bpf: test map percpu stats

Björn Töpel (3):
      selftests/bpf: Add F_NEEDS_EFFICIENT_UNALIGNED_ACCESS to some tests
      selftests/bpf: Honor $(O) when figuring out paths
      selftests/bpf: Bump and validate MAX_SYMS

Daniel Borkmann (2):
      selftests/bpf: Fix bpf_nf failure upon test rerun
      Merge branch 'bpf-mem-cache-free-rcu'

Dave Thaler (1):
      bpf, docs: Fix definition of BPF_NEG operation

David Vernet (1):
      bpf,docs: Create new standardization subdirectory

Fangrui Song (1):
      bpf: Replace deprecated -target with --target= for Clang

Florian Westphal (2):
      libbpf: Add netfilter link attach helper
      selftests/bpf: Add bpf_program__attach_netfilter helper test

Hou Tao (3):
      bpf: Remove unnecessary ring buffer size check
      selftests/bpf: Add benchmark for bpf memory allocator
      bpf: Add object leak check.

Jackie Liu (2):
      libbpf: Cross-join available_filter_functions and kallsyms for multi-kprobes
      libbpf: Use available_filter_functions_addrs with multi-kprobes

John Sanpe (1):
      libbpf: Remove HASHMAP_INIT static initialization helper

Kui-Feng Lee (2):
      bpf, net: Check skb ownership against full socket.
      selftests/bpf: Verify that the cgroup_skb filters receive expected packets.

Lu Hongfei (1):
      selftests/bpf: Correct two typos

Menglong Dong (3):
      bpf, x86: save/restore regs with BPF_DW size
      bpf, x86: allow function arguments up to 12 for TRACING
      selftests/bpf: add testcase for TRACING with 6+ arguments

Paul E. McKenney (1):
      rcu: Export rcu_request_urgent_qs_task()

Quentin Monnet (2):
      bpftool: Use a local copy of BPF_LINK_TYPE_PERF_EVENT in pid_iter.bpf.c
      bpftool: Use "fallthrough;" keyword instead of comments

Rong Tao (1):
      samples/bpf: syscall_tp: Aarch64 no open syscall

Stanislav Fomichev (2):
      bpf: Resolve modifiers when walking structs
      selftests/bpf: Add test to exercise typedef walking

Sumitra Sharma (1):
      lib/test_bpf: Call page_address() on page acquired with GFP_KERNEL flag

Yafang Shao (14):
      bpf: Support ->fill_link_info for kprobe_multi
      bpftool: Dump the kernel symbol's module name
      bpftool: Show kprobe_multi link info
      bpf: Protect probed address based on kptr_restrict setting
      bpf: Clear the probe_addr for uprobe
      bpf: Expose symbol's respective address
      bpf: Add a common helper bpf_copy_to_user()
      bpf: Support ->fill_link_info for perf_event
      bpftool: Add perf event names
      bpftool: Show perf link info
      bpf: Fix an error around PTR_UNTRUSTED
      selftests/bpf: Add selftests for nested_trust
      bpf: Fix an error in verifying a field in a union
      selftests/bpf: Add selftest for PTR_UNTRUSTED

 Documentation/bpf/bpf_devel_QA.rst                 |  10 +-
 Documentation/bpf/btf.rst                          |   4 +-
 Documentation/bpf/index.rst                        |   3 +-
 Documentation/bpf/llvm_reloc.rst                   |   6 +-
 Documentation/bpf/standardization/index.rst        |  18 +
 .../bpf/{ => standardization}/instruction-set.rst  |   2 +-
 .../bpf/{ => standardization}/linux-notes.rst      |   3 +-
 MAINTAINERS                                        |   2 +-
 arch/x86/net/bpf_jit_comp.c                        | 246 ++++++++--
 drivers/hid/bpf/entrypoints/Makefile               |   2 +-
 include/linux/bpf-cgroup.h                         |   4 +-
 include/linux/bpf.h                                |  30 ++
 include/linux/bpf_mem_alloc.h                      |   2 +
 include/linux/rcutiny.h                            |   2 +
 include/linux/rcutree.h                            |   1 +
 include/linux/trace_events.h                       |   3 +-
 include/uapi/linux/bpf.h                           |  40 ++
 kernel/bpf/btf.c                                   |  24 +-
 kernel/bpf/cpumask.c                               |  20 +-
 kernel/bpf/hashtab.c                               |  22 +-
 kernel/bpf/map_iter.c                              |  39 +-
 kernel/bpf/memalloc.c                              | 378 +++++++++++----
 kernel/bpf/preload/iterators/Makefile              |   2 +-
 kernel/bpf/preload/iterators/iterators.bpf.c       |   9 +-
 .../iterators/iterators.lskel-little-endian.h      | 526 +++++++++++----------
 kernel/bpf/ringbuf.c                               |  26 +-
 kernel/bpf/syscall.c                               | 180 ++++++-
 kernel/bpf/verifier.c                              |  42 +-
 kernel/rcu/rcu.h                                   |   2 -
 kernel/trace/bpf_trace.c                           |  49 +-
 kernel/trace/trace_kprobe.c                        |  13 +-
 kernel/trace/trace_uprobe.c                        |   3 +-
 lib/test_bpf.c                                     |  12 +-
 net/bpf/test_run.c                                 |  18 +-
 samples/bpf/Makefile                               |   6 +-
 samples/bpf/gnu/stubs.h                            |   2 +-
 samples/bpf/syscall_tp_kern.c                      |   4 +
 samples/bpf/test_lwt_bpf.sh                        |   2 +-
 samples/hid/Makefile                               |   6 +-
 tools/bpf/bpftool/Documentation/bpftool-gen.rst    |   4 +-
 tools/bpf/bpftool/Makefile                         |   2 +-
 tools/bpf/bpftool/btf_dumper.c                     |   2 +-
 tools/bpf/bpftool/feature.c                        |   2 +-
 tools/bpf/bpftool/link.c                           | 432 ++++++++++++++++-
 tools/bpf/bpftool/skeleton/pid_iter.bpf.c          |  26 +-
 tools/bpf/bpftool/skeleton/profiler.bpf.c          |  27 +-
 tools/bpf/bpftool/xlated_dumper.c                  |   6 +-
 tools/bpf/bpftool/xlated_dumper.h                  |   2 +
 tools/bpf/runqslower/Makefile                      |   2 +-
 tools/build/feature/Makefile                       |   2 +-
 tools/include/uapi/linux/bpf.h                     |  40 ++
 tools/lib/bpf/bpf.c                                |   8 +
 tools/lib/bpf/bpf.h                                |   6 +
 tools/lib/bpf/hashmap.h                            |  10 -
 tools/lib/bpf/libbpf.c                             | 258 +++++++++-
 tools/lib/bpf/libbpf.h                             |  15 +
 tools/lib/bpf/libbpf.map                           |   1 +
 tools/lib/bpf/usdt.c                               |   5 +-
 tools/testing/selftests/bpf/DENYLIST.aarch64       |   2 +
 tools/testing/selftests/bpf/Makefile               |  13 +-
 tools/testing/selftests/bpf/bench.c                |   4 +
 .../testing/selftests/bpf/benchs/bench_htab_mem.c  | 350 ++++++++++++++
 .../testing/selftests/bpf/benchs/bench_ringbufs.c  |   2 +-
 .../selftests/bpf/benchs/run_bench_htab_mem.sh     |  40 ++
 .../selftests/bpf/bpf_testmod/bpf_testmod.c        |  49 +-
 tools/testing/selftests/bpf/cgroup_helpers.c       |  12 +
 tools/testing/selftests/bpf/cgroup_helpers.h       |   1 +
 tools/testing/selftests/bpf/cgroup_tcp_skb.h       |  35 ++
 tools/testing/selftests/bpf/gnu/stubs.h            |   2 +-
 .../selftests/bpf/map_tests/map_percpu_stats.c     | 447 +++++++++++++++++
 tools/testing/selftests/bpf/prog_tests/bpf_nf.c    |   5 +-
 .../selftests/bpf/prog_tests/cgroup_tcp_skb.c      | 402 ++++++++++++++++
 .../testing/selftests/bpf/prog_tests/fentry_test.c |  43 +-
 .../testing/selftests/bpf/prog_tests/fexit_test.c  |  43 +-
 .../selftests/bpf/prog_tests/get_func_args_test.c  |   4 +-
 .../selftests/bpf/prog_tests/global_map_resize.c   |  14 +-
 .../selftests/bpf/prog_tests/modify_return.c       |  10 +-
 .../bpf/prog_tests/netfilter_link_attach.c         |  86 ++++
 .../selftests/bpf/prog_tests/ptr_untrusted.c       |  36 ++
 .../selftests/bpf/prog_tests/tcp_hdr_options.c     |   2 +-
 .../selftests/bpf/prog_tests/tracing_struct.c      |  19 +
 .../selftests/bpf/prog_tests/trampoline_count.c    |   4 +-
 tools/testing/selftests/bpf/prog_tests/verifier.c  |   2 +
 tools/testing/selftests/bpf/progs/cgroup_tcp_skb.c | 382 +++++++++++++++
 .../testing/selftests/bpf/progs/fentry_many_args.c |  39 ++
 .../testing/selftests/bpf/progs/fexit_many_args.c  |  40 ++
 tools/testing/selftests/bpf/progs/htab_mem_bench.c | 105 ++++
 tools/testing/selftests/bpf/progs/linked_list.c    |   2 +-
 .../testing/selftests/bpf/progs/map_percpu_stats.c |  24 +
 tools/testing/selftests/bpf/progs/modify_return.c  |  40 ++
 .../selftests/bpf/progs/nested_trust_failure.c     |  16 +
 .../selftests/bpf/progs/nested_trust_success.c     |  15 +
 .../selftests/bpf/progs/test_global_map_resize.c   |   8 +-
 .../bpf/progs/test_netfilter_link_attach.c         |  14 +
 .../selftests/bpf/progs/test_ptr_untrusted.c       |  29 ++
 tools/testing/selftests/bpf/progs/tracing_struct.c |  54 +++
 .../testing/selftests/bpf/progs/verifier_typedef.c |  23 +
 tools/testing/selftests/bpf/trace_helpers.c        |   5 +-
 .../selftests/bpf/verifier/atomic_cmpxchg.c        |   1 +
 tools/testing/selftests/bpf/verifier/ctx_skb.c     |   2 +
 tools/testing/selftests/bpf/verifier/jmp32.c       |   8 +
 tools/testing/selftests/bpf/verifier/map_kptr.c    |   2 +
 tools/testing/selftests/bpf/verifier/precise.c     |   2 +-
 tools/testing/selftests/hid/Makefile               |   6 +-
 tools/testing/selftests/net/Makefile               |   4 +-
 tools/testing/selftests/tc-testing/Makefile        |   2 +-
 106 files changed, 4444 insertions(+), 619 deletions(-)
 create mode 100644 Documentation/bpf/standardization/index.rst
 rename Documentation/bpf/{ => standardization}/instruction-set.rst (99%)
 rename Documentation/bpf/{ => standardization}/linux-notes.rst (96%)
 create mode 100644 tools/testing/selftests/bpf/benchs/bench_htab_mem.c
 create mode 100755 tools/testing/selftests/bpf/benchs/run_bench_htab_mem.sh
 create mode 100644 tools/testing/selftests/bpf/cgroup_tcp_skb.h
 create mode 100644 tools/testing/selftests/bpf/map_tests/map_percpu_stats.c
 create mode 100644 tools/testing/selftests/bpf/prog_tests/cgroup_tcp_skb.c
 create mode 100644 tools/testing/selftests/bpf/prog_tests/netfilter_link_attach.c
 create mode 100644 tools/testing/selftests/bpf/prog_tests/ptr_untrusted.c
 create mode 100644 tools/testing/selftests/bpf/progs/cgroup_tcp_skb.c
 create mode 100644 tools/testing/selftests/bpf/progs/fentry_many_args.c
 create mode 100644 tools/testing/selftests/bpf/progs/fexit_many_args.c
 create mode 100644 tools/testing/selftests/bpf/progs/htab_mem_bench.c
 create mode 100644 tools/testing/selftests/bpf/progs/map_percpu_stats.c
 create mode 100644 tools/testing/selftests/bpf/progs/test_netfilter_link_attach.c
 create mode 100644 tools/testing/selftests/bpf/progs/test_ptr_untrusted.c
 create mode 100644 tools/testing/selftests/bpf/progs/verifier_typedef.c

Comments

patchwork-bot+netdevbpf@kernel.org July 14, 2023, 2:21 a.m. UTC | #1
Hello:

This pull request was applied to netdev/net-next.git (main)
by Jakub Kicinski <kuba@kernel.org>:

On Thu, 13 Jul 2023 19:09:10 -0700 you wrote:
> Hi David, hi Jakub, hi Paolo, hi Eric,
> 
> The following pull-request contains BPF updates for your *net-next* tree.
> 
> We've added 67 non-merge commits during the last 15 day(s) which contain
> a total of 106 files changed, 4444 insertions(+), 619 deletions(-).
> 
> [...]

Here is the summary with links:
  - pull-request: bpf-next 2023-07-13
    https://git.kernel.org/netdev/net-next/c/b0b0ab6f0131

You are awesome, thank you!