netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* pull-request: bpf 2024-05-27
@ 2024-05-27 20:35 Daniel Borkmann
  2024-05-27 23:40 ` patchwork-bot+netdevbpf
  0 siblings, 1 reply; 2+ messages in thread
From: Daniel Borkmann @ 2024-05-27 20:35 UTC (permalink / raw)
  To: davem; +Cc: kuba, pabeni, edumazet, daniel, ast, andrii, martin.lau, netdev,
	bpf

Hi David, hi Jakub, hi Paolo, hi Eric,

The following pull-request contains BPF updates for your *net* tree.

We've added 15 non-merge commits during the last 7 day(s) which contain
a total of 18 files changed, 583 insertions(+), 55 deletions(-).

The main changes are:

1) Fix broken BPF multi-uprobe PID filtering logic which filtered by thread while
   the promise was to filter by process, from Andrii Nakryiko.

2) Fix the recent influx of syzkaller reports to sockmap which triggered a
   locking rule violation by performing a map_delete, from Jakub Sitnicki.

3) Fixes to netkit driver in particular on skb->pkt_type override upon pass
   verdict, from Daniel Borkmann.

4) Fix an integer overflow in resolve_btfids which can wrongly trigger build
   failures, from Friedrich Vock.

5) Follow-up fixes for ARC JIT reported by static analyzers, from Shahab Vahedi.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git tags/for-netdev

Thanks a lot!

Also thanks to reporters, reviewers and testers of commits in this pull-request:

Daniel Borkmann, Hengqi Chen, Jiri Olsa, John Fastabend, kernel test 
robot, Nikolay Aleksandrov, Stanislav Fomichev, Tetsuo Handa

----------------------------------------------------------------

The following changes since commit 30a92c9e3d6b073932762bef2ac66f4ee784c657:

  openvswitch: Set the skbuff pkt_type for proper pmtud support. (2024-05-21 15:34:04 +0200)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git tags/for-netdev

for you to fetch changes up to a63bf556160fb19591183383da6757f52119981d:

  selftests/bpf: Cover verifier checks for mutating sockmap/sockhash (2024-05-27 19:34:26 +0200)

----------------------------------------------------------------
bpf-for-netdev

----------------------------------------------------------------
Alexei Starovoitov (1):
      Merge branch 'fix-bpf-multi-uprobe-pid-filtering-logic'

Andrii Nakryiko (5):
      bpf: fix multi-uprobe PID filtering logic
      bpf: remove unnecessary rcu_read_{lock,unlock}() in multi-uprobe attach logic
      libbpf: detect broken PID filtering logic for multi-uprobe
      selftests/bpf: extend multi-uprobe tests with child thread case
      selftests/bpf: extend multi-uprobe tests with USDTs

Daniel Borkmann (4):
      netkit: Fix setting mac address in l2 mode
      netkit: Fix pkt_type override upon netkit pass verdict
      selftests/bpf: Add netkit tests for mac address
      selftests/bpf: Add netkit test for pkt_type

Friedrich Vock (1):
      bpf: Fix potential integer overflow in resolve_btfids

Jakub Sitnicki (3):
      bpf: Allow delete from sockmap/sockhash only if update is allowed
      Revert "bpf, sockmap: Prevent lock inversion deadlock in map delete elem"
      selftests/bpf: Cover verifier checks for mutating sockmap/sockhash

Shahab Vahedi (1):
      ARC, bpf: Fix issues reported by the static analyzers

Xu Kuohai (1):
      MAINTAINERS: Add myself as reviewer of ARM64 BPF JIT

 MAINTAINERS                                        |   1 +
 arch/arc/net/bpf_jit.h                             |   2 +-
 arch/arc/net/bpf_jit_arcv2.c                       |  10 +-
 arch/arc/net/bpf_jit_core.c                        |  22 +--
 drivers/net/netkit.c                               |  30 +++-
 include/linux/etherdevice.h                        |   8 +
 kernel/bpf/verifier.c                              |  10 +-
 kernel/trace/bpf_trace.c                           |  10 +-
 net/core/sock_map.c                                |   6 -
 net/ethernet/eth.c                                 |   4 +-
 tools/bpf/resolve_btfids/main.c                    |   2 +-
 tools/lib/bpf/features.c                           |  31 +++-
 tools/testing/selftests/bpf/prog_tests/tc_netkit.c |  94 +++++++++++
 .../selftests/bpf/prog_tests/uprobe_multi_test.c   | 134 ++++++++++++++-
 tools/testing/selftests/bpf/prog_tests/verifier.c  |   2 +
 tools/testing/selftests/bpf/progs/test_tc_link.c   |  35 +++-
 tools/testing/selftests/bpf/progs/uprobe_multi.c   |  50 +++++-
 .../selftests/bpf/progs/verifier_sockmap_mutate.c  | 187 +++++++++++++++++++++
 18 files changed, 583 insertions(+), 55 deletions(-)
 create mode 100644 tools/testing/selftests/bpf/progs/verifier_sockmap_mutate.c

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: pull-request: bpf 2024-05-27
  2024-05-27 20:35 pull-request: bpf 2024-05-27 Daniel Borkmann
@ 2024-05-27 23:40 ` patchwork-bot+netdevbpf
  0 siblings, 0 replies; 2+ messages in thread
From: patchwork-bot+netdevbpf @ 2024-05-27 23:40 UTC (permalink / raw)
  To: Daniel Borkmann
  Cc: davem, kuba, pabeni, edumazet, ast, andrii, martin.lau, netdev,
	bpf

Hello:

This pull request was applied to netdev/net.git (main)
by Jakub Kicinski <kuba@kernel.org>:

On Mon, 27 May 2024 22:35:51 +0200 you wrote:
> Hi David, hi Jakub, hi Paolo, hi Eric,
> 
> The following pull-request contains BPF updates for your *net* tree.
> 
> We've added 15 non-merge commits during the last 7 day(s) which contain
> a total of 18 files changed, 583 insertions(+), 55 deletions(-).
> 
> [...]

Here is the summary with links:
  - pull-request: bpf 2024-05-27
    https://git.kernel.org/netdev/net/c/2786ae339ef5

You are awesome, thank you!
-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html



^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2024-05-27 23:40 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-05-27 20:35 pull-request: bpf 2024-05-27 Daniel Borkmann
2024-05-27 23:40 ` patchwork-bot+netdevbpf

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).