1. 09 Sep, 2022 1 commit
    • Daniel Borkmann's avatar
      libbpf: Remove gcc support for bpf_tail_call_static for now · 665f5d35
      Daniel Borkmann authored
      This reverts commit 14e5ce79 ("libbpf: Add GCC support for
      bpf_tail_call_static"). Reason is that gcc invented their own BPF asm
      which is not conform with LLVM one, and going forward this would be
      more painful to maintain here and in other areas of the library. Thus
      remove it; ask to gcc folks is to align with LLVM one to use exact
      same syntax.
      
      Fixes: 14e5ce79 ("libbpf: Add GCC support for bpf_tail_call_static")
      Signed-off-by: default avatarDaniel Borkmann <daniel@iogearbox.net>
      Cc: James Hilliard <james.hilliard1@gmail.com>
      Cc: Jose E. Marchesi <jose.marchesi@oracle.com>
      665f5d35
  2. 07 Sep, 2022 23 commits
  3. 06 Sep, 2022 4 commits
    • Paolo Abeni's avatar
      Merge https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next · 2786bcff
      Paolo Abeni authored
      Daniel Borkmann says:
      
      ====================
      pull-request: bpf-next 2022-09-05
      
      The following pull-request contains BPF updates for your *net-next* tree.
      
      We've added 106 non-merge commits during the last 18 day(s) which contain
      a total of 159 files changed, 5225 insertions(+), 1358 deletions(-).
      
      There are two small merge conflicts, resolve them as follows:
      
      1) tools/testing/selftests/bpf/DENYLIST.s390x
      
        Commit 27e23836 ("selftests/bpf: Add lru_bug to s390x deny list") in
        bpf tree was needed to get BPF CI green on s390x, but it conflicted with
        newly added tests on bpf-next. Resolve by adding both hunks, result:
      
        [...]
        lru_bug                                  # prog 'printk': failed to auto-attach: -524
        setget_sockopt                           # attach unexpected error: -524                                               (trampoline)
        cb_refs                                  # expected error message unexpected error: -524                               (trampoline)
        cgroup_hierarchical_stats                # JIT does not support calling kernel function                                (kfunc)
        htab_update                              # failed to attach: ERROR: strerror_r(-524)=22                                (trampoline)
        [...]
      
      2) net/core/filter.c
      
        Commit 1227c177 ("net: Fix data-races around sysctl_[rw]mem_(max|default).")
        from net tree conflicts with commit 29003875 ("bpf: Change bpf_setsockopt(SOL_SOCKET)
        to reuse sk_setsockopt()") from bpf-next tree. Take the code as it is from
        bpf-next tree, result:
      
        [...]
      	if (getopt) {
      		if (optname == SO_BINDTODEVICE)
      			return -EINVAL;
      		return sk_getsockopt(sk, SOL_SOCKET, optname,
      				     KERNEL_SOCKPTR(optval),
      				     KERNEL_SOCKPTR(optlen));
      	}
      
      	return sk_setsockopt(sk, SOL_SOCKET, optname,
      			     KERNEL_SOCKPTR(optval), *optlen);
        [...]
      
      The main changes are:
      
      1) Add any-context BPF specific memory allocator which is useful in particular for BPF
         tracing with bonus of performance equal to full prealloc, from Alexei Starovoitov.
      
      2) Big batch to remove duplicated code from bpf_{get,set}sockopt() helpers as an effort
         to reuse the existing core socket code as much as possible, from Martin KaFai Lau.
      
      3) Extend BPF flow dissector for BPF programs to just augment the in-kernel dissector
         with custom logic. In other words, allow for partial replacement, from Shmulik Ladkani.
      
      4) Add a new cgroup iterator to BPF with different traversal options, from Hao Luo.
      
      5) Support for BPF to collect hierarchical cgroup statistics efficiently through BPF
         integration with the rstat framework, from Yosry Ahmed.
      
      6) Support bpf_{g,s}et_retval() under more BPF cgroup hooks, from Stanislav Fomichev.
      
      7) BPF hash table and local storages fixes under fully preemptible kernel, from Hou Tao.
      
      8) Add various improvements to BPF selftests and libbpf for compilation with gcc BPF
         backend, from James Hilliard.
      
      9) Fix verifier helper permissions and reference state management for synchronous
         callbacks, from Kumar Kartikeya Dwivedi.
      
      10) Add support for BPF selftest's xskxceiver to also be used against real devices that
          support MAC loopback, from Maciej Fijalkowski.
      
      11) Various fixes to the bpf-helpers(7) man page generation script, from Quentin Monnet.
      
      12) Document BPF verifier's tnum_in(tnum_range(), ...) gotchas, from Shung-Hsi Yu.
      
      13) Various minor misc improvements all over the place.
      
      * https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next: (106 commits)
        bpf: Optimize rcu_barrier usage between hash map and bpf_mem_alloc.
        bpf: Remove usage of kmem_cache from bpf_mem_cache.
        bpf: Remove prealloc-only restriction for sleepable bpf programs.
        bpf: Prepare bpf_mem_alloc to be used by sleepable bpf programs.
        bpf: Remove tracing program restriction on map types
        bpf: Convert percpu hash map to per-cpu bpf_mem_alloc.
        bpf: Add percpu allocation support to bpf_mem_alloc.
        bpf: Batch call_rcu callbacks instead of SLAB_TYPESAFE_BY_RCU.
        bpf: Adjust low/high watermarks in bpf_mem_cache
        bpf: Optimize call_rcu in non-preallocated hash map.
        bpf: Optimize element count in non-preallocated hash map.
        bpf: Relax the requirement to use preallocated hash maps in tracing progs.
        samples/bpf: Reduce syscall overhead in map_perf_test.
        selftests/bpf: Improve test coverage of test_maps
        bpf: Convert hash map to bpf_mem_alloc.
        bpf: Introduce any context BPF specific memory allocator.
        selftest/bpf: Add test for bpf_getsockopt()
        bpf: Change bpf_getsockopt(SOL_IPV6) to reuse do_ipv6_getsockopt()
        bpf: Change bpf_getsockopt(SOL_IP) to reuse do_ip_getsockopt()
        bpf: Change bpf_getsockopt(SOL_TCP) to reuse do_tcp_getsockopt()
        ...
      ====================
      
      Link: https://lore.kernel.org/r/20220905161136.9150-1-daniel@iogearbox.netSigned-off-by: default avatarPaolo Abeni <pabeni@redhat.com>
      2786bcff
    • Sergei Antonov's avatar
      net: moxa: fix endianness-related issues from 'sparse' · 03fdb11d
      Sergei Antonov authored
      Sparse checker found two endianness-related issues:
      
      .../moxart_ether.c:34:15: warning: incorrect type in assignment (different base types)
      .../moxart_ether.c:34:15:    expected unsigned int [usertype]
      .../moxart_ether.c:34:15:    got restricted __le32 [usertype]
      
      .../moxart_ether.c:39:16: warning: cast to restricted __le32
      
      Fix them by using __le32 type instead of u32.
      Signed-off-by: default avatarSergei Antonov <saproj@gmail.com>
      Link: https://lore.kernel.org/r/20220902125037.1480268-1-saproj@gmail.comSigned-off-by: default avatarPaolo Abeni <pabeni@redhat.com>
      03fdb11d
    • Sergei Antonov's avatar
      net: ftmac100: fix endianness-related issues from 'sparse' · 9df696b3
      Sergei Antonov authored
      Sparse found a number of endianness-related issues of these kinds:
      
      .../ftmac100.c:192:32: warning: restricted __le32 degrades to integer
      
      .../ftmac100.c:208:23: warning: incorrect type in assignment (different base types)
      .../ftmac100.c:208:23:    expected unsigned int rxdes0
      .../ftmac100.c:208:23:    got restricted __le32 [usertype]
      
      .../ftmac100.c:249:23: warning: invalid assignment: &=
      .../ftmac100.c:249:23:    left side has type unsigned int
      .../ftmac100.c:249:23:    right side has type restricted __le32
      
      .../ftmac100.c:527:16: warning: cast to restricted __le32
      
      Change type of some fields from 'unsigned int' to '__le32' to fix it.
      Signed-off-by: default avatarSergei Antonov <saproj@gmail.com>
      Reviewed-by: default avatarAndrew Lunn <andrew@lunn.ch>
      Link: https://lore.kernel.org/r/20220902113749.1408562-1-saproj@gmail.comSigned-off-by: default avatarPaolo Abeni <pabeni@redhat.com>
      9df696b3
    • Horatiu Vultur's avatar
      net: lan966x: Extend lan966x with RGMII support · d5edc797
      Horatiu Vultur authored
      Extend lan966x with RGMII support. The MAC supports all RGMII_* modes.
      Signed-off-by: default avatarHoratiu Vultur <horatiu.vultur@microchip.com>
      Link: https://lore.kernel.org/r/20220902111548.614525-1-horatiu.vultur@microchip.comSigned-off-by: default avatarPaolo Abeni <pabeni@redhat.com>
      d5edc797
  4. 05 Sep, 2022 12 commits