Skip to content

Commit 7e68dd7

Browse files
committed
Merge tag 'net-next-6.2' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next
Pull networking updates from Paolo Abeni: "Core: - Allow live renaming when an interface is up - Add retpoline wrappers for tc, improving considerably the performances of complex queue discipline configurations - Add inet drop monitor support - A few GRO performance improvements - Add infrastructure for atomic dev stats, addressing long standing data races - De-duplicate common code between OVS and conntrack offloading infrastructure - A bunch of UBSAN_BOUNDS/FORTIFY_SOURCE improvements - Netfilter: introduce packet parser for tunneled packets - Replace IPVS timer-based estimators with kthreads to scale up the workload with the number of available CPUs - Add the helper support for connection-tracking OVS offload BPF: - Support for user defined BPF objects: the use case is to allocate own objects, build own object hierarchies and use the building blocks to build own data structures flexibly, for example, linked lists in BPF - Make cgroup local storage available to non-cgroup attached BPF programs - Avoid unnecessary deadlock detection and failures wrt BPF task storage helpers - A relevant bunch of BPF verifier fixes and improvements - Veristat tool improvements to support custom filtering, sorting, and replay of results - Add LLVM disassembler as default library for dumping JITed code - Lots of new BPF documentation for various BPF maps - Add bpf_rcu_read_{,un}lock() support for sleepable programs - Add RCU grace period chaining to BPF to wait for the completion of access from both sleepable and non-sleepable BPF programs - Add support storing struct task_struct objects as kptrs in maps - Improve helper UAPI by explicitly defining BPF_FUNC_xxx integer values - Add libbpf *_opts API-variants for bpf_*_get_fd_by_id() functions Protocols: - TCP: implement Protective Load Balancing across switch links - TCP: allow dynamically disabling TCP-MD5 static key, reverting back to fast[er]-path - UDP: Introduce optional per-netns hash lookup table - IPv6: simplify and cleanup sockets disposal - Netlink: support different type policies for each generic netlink operation - MPTCP: add MSG_FASTOPEN and FastOpen listener side support - MPTCP: add netlink notification support for listener sockets events - SCTP: add VRF support, allowing sctp sockets binding to VRF devices - Add bridging MAC Authentication Bypass (MAB) support - Extensions for Ethernet VPN bridging implementation to better support multicast scenarios - More work for Wi-Fi 7 support, comprising conversion of all the existing drivers to internal TX queue usage - IPSec: introduce a new offload type (packet offload) allowing complete header processing and crypto offloading - IPSec: extended ack support for more descriptive XFRM error reporting - RXRPC: increase SACK table size and move processing into a per-local endpoint kernel thread, reducing considerably the required locking - IEEE 802154: synchronous send frame and extended filtering support, initial support for scanning available 15.4 networks - Tun: bump the link speed from 10Mbps to 10Gbps - Tun/VirtioNet: implement UDP segmentation offload support Driver API: - PHY/SFP: improve power level switching between standard level 1 and the higher power levels - New API for netdev <-> devlink_port linkage - PTP: convert existing drivers to new frequency adjustment implementation - DSA: add support for rx offloading - Autoload DSA tagging driver when dynamically changing protocol - Add new PCP and APPTRUST attributes to Data Center Bridging - Add configuration support for 800Gbps link speed - Add devlink port function attribute to enable/disable RoCE and migratable - Extend devlink-rate to support strict prioriry and weighted fair queuing - Add devlink support to directly reading from region memory - New device tree helper to fetch MAC address from nvmem - New big TCP helper to simplify temporary header stripping New hardware / drivers: - Ethernet: - Marvel Octeon CNF95N and CN10KB Ethernet Switches - Marvel Prestera AC5X Ethernet Switch - WangXun 10 Gigabit NIC - Motorcomm yt8521 Gigabit Ethernet - Microchip ksz9563 Gigabit Ethernet Switch - Microsoft Azure Network Adapter - Linux Automation 10Base-T1L adapter - PHY: - Aquantia AQR112 and AQR412 - Motorcomm YT8531S - PTP: - Orolia ART-CARD - WiFi: - MediaTek Wi-Fi 7 (802.11be) devices - RealTek rtw8821cu, rtw8822bu, rtw8822cu and rtw8723du USB devices - Bluetooth: - Broadcom BCM4377/4378/4387 Bluetooth chipsets - Realtek RTL8852BE and RTL8723DS - Cypress.CYW4373A0 WiFi + Bluetooth combo device Drivers: - CAN: - gs_usb: bus error reporting support - kvaser_usb: listen only and bus error reporting support - Ethernet NICs: - Intel (100G): - extend action skbedit to RX queue mapping - implement devlink-rate support - support direct read from memory - nVidia/Mellanox (mlx5): - SW steering improvements, increasing rules update rate - Support for enhanced events compression - extend H/W offload packet manipulation capabilities - implement IPSec packet offload mode - nVidia/Mellanox (mlx4): - better big TCP support - Netronome Ethernet NICs (nfp): - IPsec offload support - add support for multicast filter - Broadcom: - RSS and PTP support improvements - AMD/SolarFlare: - netlink extened ack improvements - add basic flower matches to offload, and related stats - Virtual NICs: - ibmvnic: introduce affinity hint support - small / embedded: - FreeScale fec: add initial XDP support - Marvel mv643xx_eth: support MII/GMII/RGMII modes for Kirkwood - TI am65-cpsw: add suspend/resume support - Mediatek MT7986: add RX wireless wthernet dispatch support - Realtek 8169: enable GRO software interrupt coalescing per default - Ethernet high-speed switches: - Microchip (sparx5): - add support for Sparx5 TC/flower H/W offload via VCAP - Mellanox mlxsw: - add 802.1X and MAC Authentication Bypass offload support - add ip6gre support - Embedded Ethernet switches: - Mediatek (mtk_eth_soc): - improve PCS implementation, add DSA untag support - enable flow offload support - Renesas: - add rswitch R-Car Gen4 gPTP support - Microchip (lan966x): - add full XDP support - add TC H/W offload via VCAP - enable PTP on bridge interfaces - Microchip (ksz8): - add MTU support for KSZ8 series - Qualcomm 802.11ax WiFi (ath11k): - support configuring channel dwell time during scan - MediaTek WiFi (mt76): - enable Wireless Ethernet Dispatch (WED) offload support - add ack signal support - enable coredump support - remain_on_channel support - Intel WiFi (iwlwifi): - enable Wi-Fi 7 Extremely High Throughput (EHT) PHY capabilities - 320 MHz channels support - RealTek WiFi (rtw89): - new dynamic header firmware format support - wake-over-WLAN support" * tag 'net-next-6.2' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next: (2002 commits) ipvs: fix type warning in do_div() on 32 bit net: lan966x: Remove a useless test in lan966x_ptp_add_trap() net: ipa: add IPA v4.7 support dt-bindings: net: qcom,ipa: Add SM6350 compatible bnxt: Use generic HBH removal helper in tx path IPv6/GRO: generic helper to remove temporary HBH/jumbo header in driver selftests: forwarding: Add bridge MDB test selftests: forwarding: Rename bridge_mdb test bridge: mcast: Support replacement of MDB port group entries bridge: mcast: Allow user space to specify MDB entry routing protocol bridge: mcast: Allow user space to add (*, G) with a source list and filter mode bridge: mcast: Add support for (*, G) with a source list and filter mode bridge: mcast: Avoid arming group timer when (S, G) corresponds to a source bridge: mcast: Add a flag for user installed source entries bridge: mcast: Expose __br_multicast_del_group_src() bridge: mcast: Expose br_multicast_new_group_src() bridge: mcast: Add a centralized error path bridge: mcast: Place netlink policy before validation functions bridge: mcast: Split (*, G) and (S, G) addition into different functions bridge: mcast: Do not derive entry type from its filter mode ...
2 parents 1ca06f1 + 7c4a630 commit 7e68dd7

File tree

2,013 files changed

+165982
-34401
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,013 files changed

+165982
-34401
lines changed

Documentation/bpf/bpf_design_QA.rst

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -298,3 +298,48 @@ A: NO.
298298

299299
The BTF_ID macro does not cause a function to become part of the ABI
300300
any more than does the EXPORT_SYMBOL_GPL macro.
301+
302+
Q: What is the compatibility story for special BPF types in map values?
303+
-----------------------------------------------------------------------
304+
Q: Users are allowed to embed bpf_spin_lock, bpf_timer fields in their BPF map
305+
values (when using BTF support for BPF maps). This allows to use helpers for
306+
such objects on these fields inside map values. Users are also allowed to embed
307+
pointers to some kernel types (with __kptr and __kptr_ref BTF tags). Will the
308+
kernel preserve backwards compatibility for these features?
309+
310+
A: It depends. For bpf_spin_lock, bpf_timer: YES, for kptr and everything else:
311+
NO, but see below.
312+
313+
For struct types that have been added already, like bpf_spin_lock and bpf_timer,
314+
the kernel will preserve backwards compatibility, as they are part of UAPI.
315+
316+
For kptrs, they are also part of UAPI, but only with respect to the kptr
317+
mechanism. The types that you can use with a __kptr and __kptr_ref tagged
318+
pointer in your struct are NOT part of the UAPI contract. The supported types can
319+
and will change across kernel releases. However, operations like accessing kptr
320+
fields and bpf_kptr_xchg() helper will continue to be supported across kernel
321+
releases for the supported types.
322+
323+
For any other supported struct type, unless explicitly stated in this document
324+
and added to bpf.h UAPI header, such types can and will arbitrarily change their
325+
size, type, and alignment, or any other user visible API or ABI detail across
326+
kernel releases. The users must adapt their BPF programs to the new changes and
327+
update them to make sure their programs continue to work correctly.
328+
329+
NOTE: BPF subsystem specially reserves the 'bpf\_' prefix for type names, in
330+
order to introduce more special fields in the future. Hence, user programs must
331+
avoid defining types with 'bpf\_' prefix to not be broken in future releases.
332+
In other words, no backwards compatibility is guaranteed if one using a type
333+
in BTF with 'bpf\_' prefix.
334+
335+
Q: What is the compatibility story for special BPF types in allocated objects?
336+
------------------------------------------------------------------------------
337+
Q: Same as above, but for allocated objects (i.e. objects allocated using
338+
bpf_obj_new for user defined types). Will the kernel preserve backwards
339+
compatibility for these features?
340+
341+
A: NO.
342+
343+
Unlike map value types, there are no stability guarantees for this case. The
344+
whole API to work with allocated objects and any support for special fields
345+
inside them is unstable (since it is exposed through kfuncs).

Documentation/bpf/bpf_devel_QA.rst

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,33 @@ is a guarantee that the reported issue will be overlooked.**
4444
Submitting patches
4545
==================
4646

47+
Q: How do I run BPF CI on my changes before sending them out for review?
48+
------------------------------------------------------------------------
49+
A: BPF CI is GitHub based and hosted at https://github.com/kernel-patches/bpf.
50+
While GitHub also provides a CLI that can be used to accomplish the same
51+
results, here we focus on the UI based workflow.
52+
53+
The following steps lay out how to start a CI run for your patches:
54+
55+
- Create a fork of the aforementioned repository in your own account (one time
56+
action)
57+
58+
- Clone the fork locally, check out a new branch tracking either the bpf-next
59+
or bpf branch, and apply your to-be-tested patches on top of it
60+
61+
- Push the local branch to your fork and create a pull request against
62+
kernel-patches/bpf's bpf-next_base or bpf_base branch, respectively
63+
64+
Shortly after the pull request has been created, the CI workflow will run. Note
65+
that capacity is shared with patches submitted upstream being checked and so
66+
depending on utilization the run can take a while to finish.
67+
68+
Note furthermore that both base branches (bpf-next_base and bpf_base) will be
69+
updated as patches are pushed to the respective upstream branches they track. As
70+
such, your patch set will automatically (be attempted to) be rebased as well.
71+
This behavior can result in a CI run being aborted and restarted with the new
72+
base line.
73+
4774
Q: To which mailing list do I need to submit my BPF patches?
4875
------------------------------------------------------------
4976
A: Please submit your BPF patches to the bpf kernel mailing list:

0 commit comments

Comments
 (0)