1. 09 Mar, 2023 36 commits
  2. 08 Mar, 2023 4 commits
    • Jakub Kicinski's avatar
      Merge https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next · ed69e066
      Jakub Kicinski authored
      Andrii Nakryiko says:
      
      ====================
      pull-request: bpf-next 2023-03-08
      
      We've added 23 non-merge commits during the last 2 day(s) which contain
      a total of 28 files changed, 414 insertions(+), 104 deletions(-).
      
      The main changes are:
      
      1) Add more precise memory usage reporting for all BPF map types,
         from Yafang Shao.
      
      2) Add ARM32 USDT support to libbpf, from Puranjay Mohan.
      
      3) Fix BTF_ID_LIST size causing problems in !CONFIG_DEBUG_INFO_BTF,
         from Nathan Chancellor.
      
      4) IMA selftests fix, from Roberto Sassu.
      
      5) libbpf fix in APK support code, from Daniel Müller.
      
      * https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next: (23 commits)
        selftests/bpf: Fix IMA test
        libbpf: USDT arm arg parsing support
        libbpf: Refactor parse_usdt_arg() to re-use code
        libbpf: Fix theoretical u32 underflow in find_cd() function
        bpf: enforce all maps having memory usage callback
        bpf: offload map memory usage
        bpf, net: xskmap memory usage
        bpf, net: sock_map memory usage
        bpf, net: bpf_local_storage memory usage
        bpf: local_storage memory usage
        bpf: bpf_struct_ops memory usage
        bpf: queue_stack_maps memory usage
        bpf: devmap memory usage
        bpf: cpumap memory usage
        bpf: bloom_filter memory usage
        bpf: ringbuf memory usage
        bpf: reuseport_array memory usage
        bpf: stackmap memory usage
        bpf: arraymap memory usage
        bpf: hashtab memory usage
        ...
      ====================
      
      Link: https://lore.kernel.org/r/20230308193533.1671597-1-andrii@kernel.orgSigned-off-by: default avatarJakub Kicinski <kuba@kernel.org>
      ed69e066
    • Roberto Sassu's avatar
      selftests/bpf: Fix IMA test · 12fabae0
      Roberto Sassu authored
      Commit 62622dab ("ima: return IMA digest value only when IMA_COLLECTED
      flag is set") caused bpf_ima_inode_hash() to refuse to give non-fresh
      digests. IMA test #3 assumed the old behavior, that bpf_ima_inode_hash()
      still returned also non-fresh digests.
      
      Correct the test by accepting both cases. If the samples returned are 1,
      assume that the commit above is applied and that the returned digest is
      fresh. If the samples returned are 2, assume that the commit above is not
      applied, and check both the non-fresh and fresh digest.
      
      Fixes: 62622dab ("ima: return IMA digest value only when IMA_COLLECTED flag is set")
      Reported-by: default avatarDavid Vernet <void@manifault.com>
      Signed-off-by: default avatarRoberto Sassu <roberto.sassu@huawei.com>
      Signed-off-by: default avatarAndrii Nakryiko <andrii@kernel.org>
      Reviewed-by: default avatarMatt Bobrowski <mattbobrowski@google.com>
      Link: https://lore.kernel.org/bpf/20230308103713.1681200-1-roberto.sassu@huaweicloud.com
      12fabae0
    • Eric Dumazet's avatar
      net: reclaim skb->scm_io_uring bit · 10369080
      Eric Dumazet authored
      Commit 0091bfc8 ("io_uring/af_unix: defer registered
      files gc to io_uring release") added one bit to struct sk_buff.
      
      This structure is critical for networking, and we try very hard
      to not add bloat on it, unless absolutely required.
      
      For instance, we can use a specific destructor as a wrapper
      around unix_destruct_scm(), to identify skbs that unix_gc()
      has to special case.
      Signed-off-by: default avatarEric Dumazet <edumazet@google.com>
      Cc: Pavel Begunkov <asml.silence@gmail.com>
      Cc: Thadeu Lima de Souza Cascardo <cascardo@canonical.com>
      Cc: Jens Axboe <axboe@kernel.dk>
      Reviewed-by: default avatarJens Axboe <axboe@kernel.dk>
      Reviewed-by: default avatarPavel Begunkov <asml.silence@gmail.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      10369080
    • David S. Miller's avatar
      Merge branch 'sparx5-tc-flower-templates' · b3f4cd07
      David S. Miller authored
      Steen Hegelund says:
      
      ====================
      Add support for TC flower templates in Sparx5
      
      This adds support for the TC template mechanism in the Sparx5 flower filter
      implementation.
      
      Templates are as such handled by the TC framework, but when a template is
      created (using a chain id) there are by definition no filters on this
      chain (an error will be returned if there are any).
      
      If the templates chain id is one that is represented by a VCAP lookup, then
      when the template is created, we know that it is safe to use the keys
      provided in the template to change the keyset configuration for the (port,
      lookup) combination, if this is needed to improve the match on the
      template.
      
      The original port keyset configuration is captured in the template state
      information which is kept per port, so that when the template is deleted
      the port keyset configuration can be restored to its previous setting.
      
      The template also provides the protocol parameter which is the basic
      information that is used to find out which port keyset configuration needs
      to be changed.
      
      The VCAPs and lookups are slightly different when it comes to which keys,
      keysets and protocol are supported and used for selection, so in some
      cases a bit of tweaking is needed to find a useful match.  This is done by
      e.g. removing a key that prevents the best matching keyset from being
      selected.
      
      The debugfs output that is provided for a port allows inspection of the
      currently used keyset in each of the VCAPs lookups.  So when a template has
      been created the debugfs output allows you to verify if the keyset
      configuration has been changed successfully.
      ====================
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      b3f4cd07