* pull-request: bpf-next 2019-11-02
@ 2019-11-02 20:26 Alexei Starovoitov
2019-11-02 23:10 ` David Miller
0 siblings, 1 reply; 3+ messages in thread
From: Alexei Starovoitov @ 2019-11-02 20:26 UTC (permalink / raw)
To: davem; +Cc: daniel, netdev, bpf, kernel-team
Hi David,
The following pull-request contains BPF updates for your *net-next* tree.
We've added 30 non-merge commits during the last 7 day(s) which contain
a total of 41 files changed, 1864 insertions(+), 474 deletions(-).
The main changes are:
1) Fix long standing user vs kernel access issue by introducing
bpf_probe_read_user() and bpf_probe_read_kernel() helpers, from Daniel.
2) Accelerated xskmap lookup, from Björn and Maciej.
3) Support for automatic map pinning in libbpf, from Toke.
4) Cleanup of BTF-enabled raw tracepoints, from Alexei.
5) Various fixes to libbpf and selftests.
Please consider pulling these changes from:
git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git
Thanks a lot!
Also thanks to reporters, reviewers and testers of commits in this pull-request:
Alexei Starovoitov, Andrey Ignatov, Andrii Nakryiko, Björn Töpel, Eloy
Degen, Ilya Leoshkevich, Jiri Olsa, Jonathan Lemon, Martin KaFai Lau
----------------------------------------------------------------
The following changes since commit 5b7fe93db008ff013db24239136a25f3ac5142ac:
Merge git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next (2019-10-26 22:57:27 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git
for you to fetch changes up to 358fdb456288d48874d44a064a82bfb0d9963fa0:
Merge branch 'bpf_probe_read_user' (2019-11-02 12:45:15 -0700)
----------------------------------------------------------------
Alexei Starovoitov (6):
bpf: Enforce 'return 0' in BTF-enabled raw_tp programs
bpf: Fix bpf jit kallsym access
bpf: Replace prog_raw_tp+btf_id with prog_tracing
libbpf: Add support for prog_tracing
Merge branch 'map-pinning'
Merge branch 'bpf_probe_read_user'
Andrii Nakryiko (2):
libbpf: Fix off-by-one error in ELF sanity check
libbpf: Don't use kernel-side u32 type in xsk.c
Björn Töpel (2):
xsk: Store struct xdp_sock as a flexible array member of the XSKMAP
xsk: Restructure/inline XSKMAP lookup/redirect/flush
Daniel Borkmann (10):
Merge branch 'bpf-cleanup-btf-raw-tp'
Merge branch 'bpf-xskmap-perf-improvements'
uaccess: Add non-pagefault user-space write function
uaccess: Add strict non-pagefault kernel-space read function
bpf: Make use of probe_user_write in probe write helper
bpf: Add probe_read_{user, kernel} and probe_read_{user, kernel}_str helpers
bpf: Switch BPF probe insns to bpf_probe_read_kernel
bpf, samples: Use bpf_probe_read_user where appropriate
bpf, testing: Convert prog tests to probe_read_{user, kernel}{, _str} helper
bpf, testing: Add selftest to read/write sockaddr from user space
Ilya Leoshkevich (4):
selftest/bpf: Use -m{little, big}-endian for clang
selftests/bpf: Restore $(OUTPUT)/test_stub.o rule
selftests/bpf: Test narrow load from bpf_sysctl.write
bpf: Add s390 testing documentation
Jakub Kicinski (1):
Revert "selftests: bpf: Don't try to read files without read permission"
Maciej Fijalkowski (1):
bpf: Implement map_gen_lookup() callback for XSKMAP
Magnus Karlsson (1):
libbpf: Fix compatibility for kernels without need_wakeup
Shmulik Ladkani (2):
bpf, testing: Refactor test_skb_segment() for testing skb_segment() on different skbs
bpf, testing: Introduce 'gso_linear_no_head_frag' skb_segment test
Toke Høiland-Jørgensen (5):
libbpf: Fix error handling in bpf_map__reuse_fd()
libbpf: Store map pin path and status in struct bpf_map
libbpf: Move directory creation into _pin() functions
libbpf: Add auto-pinning of maps when loading BPF objects
selftests: Add tests for automatic map pinning
Documentation/bpf/index.rst | 9 +
Documentation/bpf/s390.rst | 205 +++++++++
arch/x86/mm/Makefile | 2 +-
arch/x86/mm/maccess.c | 43 ++
include/linux/bpf.h | 30 +-
include/linux/bpf_types.h | 1 +
include/linux/uaccess.h | 16 +
include/net/xdp_sock.h | 51 ++-
include/uapi/linux/bpf.h | 124 ++++--
kernel/bpf/core.c | 12 +-
kernel/bpf/syscall.c | 6 +-
kernel/bpf/verifier.c | 39 +-
kernel/bpf/xskmap.c | 112 ++---
kernel/trace/bpf_trace.c | 231 +++++++---
lib/test_bpf.c | 112 ++++-
mm/maccess.c | 70 +++-
net/xdp/xsk.c | 33 +-
samples/bpf/map_perf_test_kern.c | 4 +-
samples/bpf/test_map_in_map_kern.c | 4 +-
samples/bpf/test_probe_write_user_kern.c | 2 +-
tools/include/uapi/linux/bpf.h | 124 ++++--
tools/lib/bpf/bpf.c | 8 +-
tools/lib/bpf/bpf.h | 5 +-
tools/lib/bpf/bpf_helpers.h | 6 +
tools/lib/bpf/libbpf.c | 466 ++++++++++++++++-----
tools/lib/bpf/libbpf.h | 23 +-
tools/lib/bpf/libbpf.map | 5 +
tools/lib/bpf/libbpf_probes.c | 1 +
tools/lib/bpf/xsk.c | 83 +++-
tools/testing/selftests/bpf/Makefile | 16 +-
tools/testing/selftests/bpf/prog_tests/pinning.c | 210 ++++++++++
.../testing/selftests/bpf/prog_tests/probe_user.c | 78 ++++
tools/testing/selftests/bpf/progs/kfree_skb.c | 4 +-
tools/testing/selftests/bpf/progs/pyperf.h | 67 +--
tools/testing/selftests/bpf/progs/strobemeta.h | 36 +-
tools/testing/selftests/bpf/progs/test_pinning.c | 31 ++
.../selftests/bpf/progs/test_pinning_invalid.c | 16 +
.../testing/selftests/bpf/progs/test_probe_user.c | 26 ++
.../testing/selftests/bpf/progs/test_tcp_estats.c | 2 +-
tools/testing/selftests/bpf/test_offload.py | 2 +-
tools/testing/selftests/bpf/test_sysctl.c | 23 +
41 files changed, 1864 insertions(+), 474 deletions(-)
create mode 100644 Documentation/bpf/s390.rst
create mode 100644 arch/x86/mm/maccess.c
create mode 100644 tools/testing/selftests/bpf/prog_tests/pinning.c
create mode 100644 tools/testing/selftests/bpf/prog_tests/probe_user.c
create mode 100644 tools/testing/selftests/bpf/progs/test_pinning.c
create mode 100644 tools/testing/selftests/bpf/progs/test_pinning_invalid.c
create mode 100644 tools/testing/selftests/bpf/progs/test_probe_user.c
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: pull-request: bpf-next 2019-11-02
2019-11-02 20:26 pull-request: bpf-next 2019-11-02 Alexei Starovoitov
@ 2019-11-02 23:10 ` David Miller
2019-11-04 16:34 ` Alexei Starovoitov
0 siblings, 1 reply; 3+ messages in thread
From: David Miller @ 2019-11-02 23:10 UTC (permalink / raw)
To: ast; +Cc: daniel, netdev, bpf, kernel-team
From: Alexei Starovoitov <ast@kernel.org>
Date: Sat, 2 Nov 2019 13:26:32 -0700
> The following pull-request contains BPF updates for your *net-next* tree.
>
> We've added 30 non-merge commits during the last 7 day(s) which contain
> a total of 41 files changed, 1864 insertions(+), 474 deletions(-).
Pulled, please double check my handling of the test_offload.py revert.
Thank you.
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: pull-request: bpf-next 2019-11-02
2019-11-02 23:10 ` David Miller
@ 2019-11-04 16:34 ` Alexei Starovoitov
0 siblings, 0 replies; 3+ messages in thread
From: Alexei Starovoitov @ 2019-11-04 16:34 UTC (permalink / raw)
To: David Miller
Cc: Alexei Starovoitov, Daniel Borkmann, Network Development, bpf,
Kernel Team
On Sat, Nov 2, 2019 at 4:11 PM David Miller <davem@davemloft.net> wrote:
>
> From: Alexei Starovoitov <ast@kernel.org>
> Date: Sat, 2 Nov 2019 13:26:32 -0700
>
> > The following pull-request contains BPF updates for your *net-next* tree.
> >
> > We've added 30 non-merge commits during the last 7 day(s) which contain
> > a total of 41 files changed, 1864 insertions(+), 474 deletions(-).
>
> Pulled, please double check my handling of the test_offload.py revert.
Sorry for delay.
Daniel posted a fix:
https://patchwork.ozlabs.org/patch/1188975/
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2019-11-04 16:34 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-11-02 20:26 pull-request: bpf-next 2019-11-02 Alexei Starovoitov
2019-11-02 23:10 ` David Miller
2019-11-04 16:34 ` Alexei Starovoitov
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).