BPF updates 05
This is issue 05 of the regular newsletter around BPF written by Alexander Alemayhu. It summarizes ongoing development, presentations, videos and other information related to BPF and XDP. It is released roughly once a week.
Linux 4.12-rc3 was released last week. One usual [GIT] Networking
pull request with some BPF fixes made it in. You can read all the highlights in 26th May. Also the release email briefly mentions BPF
Anyway, rc3 has a little bit of everything. The biggest single change is actually just a documentation update (the intel pstate docs were converted to rst format), so the diffstat actually looks a bit odd with a wuarter just being documentation. There's also some tooling updates (perf and some bpf selftest).
More interesting highlights
- ARM 32-bit eBPF JIT saw a v2.
- MIPS eBPF JIT is in the works.
- The stack depth tracking, one step closer BPF to BPF functions.
Checkout the patches section for all the links.
Videos
Open-NFP - Transparent eBPF Offload: Playing Nice with the Linux Kernel
Introductory webinar on eBPF and XDP. It's mostly basic, so great talk for someone new to eBPF.
In case you missed it
Further Reading
The Cilium BPF and XDP reference guide has a growing collection of links to BPF content all around the web.
Patches
- Daniel Borkmann, [PATCH net v2 0/5] Various BPF fixes
- [PATCH net v2 1/5] bpf: fix incorrect pruning decision when alignment must be tracked
- [PATCH net v2 2/5] bpf: properly reset caller saved regs after helper call and ld_abs/ind
- [PATCH net v2 3/5] bpf: add
bpf_clone_redirect
tobpf_helper_changes_pkt_data
- [PATCH net v2 4/5] bpf: fix wrong exposure of map_flags into fdinfo for lpm
- [PATCH net v2 5/5] bpf: add various verifier test cases
- David Daney, [PATCH]
test_bpf
: Add a couple of tests forBPF_JSGE
- David Daney, [PATCH 0/5] MIPS: Implement eBPF JIT
- Teng Qin, [PATCH v2 net-next 0/3] bpf: Add BPF support to all perf_event
- Yonghong Song, [llvm] r304043 - [bpf] disallow global_addr+off folding
- Jesper Dangaard Brouer, [PATCH net] samples/bpf:
bpf_load.c
order ofprog_fd[]
should correspond with ELF order - Jesper Dangaard Brouer, [PATCH RFC] bpf: handle XDP features for bpf tail calls
- Shubham Bansal, [PATCH v2] arm: eBPF JIT compiler
- Alexei Starovoitov, [PATCH net-next 0/9] bpf: stack depth tracking
- [PATCH net-next 1/9] bpf: free up
BPF_JMP
|BPF_CALL
|BPF_X
opcode - [PATCH net-next 2/9] bpf: split bpf core interpreter
- [PATCH net-next 3/9] bpf: teach verifier to track stack depth
- [PATCH net-next 4/9] bpf: reconcile
bpf_tail_call
and stack_depth - [PATCH net-next 5/9] bpf: track stack depth of classic bpf programs
- [PATCH net-next 6/9] bpf: fix
stack_depth
usage bytest_bpf.ko
- [PATCH net-next 7/9] bpf: use different interpreter depending on required stack size
- [PATCH net-next 8/9] bpf: change x86 JITed program stack layout
- [PATCH net-next 9/9] bpf: take advantage of stack_depth tracking in x64 JIT
- [PATCH net-next 1/9] bpf: free up
- Martin KaFai Lau, [PATCH net-next 0/8] Introduce bpf ID
- [PATCH net-next 1/8] bpf: Introduce bpf_prog ID
- [PATCH net-next 2/8] bpf: Introduce bpf_map ID
- [PATCH net-next 3/8] bpf: Add
BPF_(PROG|MAP)_GET_NEXT_ID
command - [PATCH net-next 4/8] bpf: Add
BPF_PROG_GET_FD_BY_ID
- [PATCH net-next 5/8] bpf: Add
BPF_MAP_GET_FD_BY_ID
- [PATCH net-next 6/8] bpf: Add
jited_len
to structbpf_prog
- [PATCH net-next 7/8] bpf: Add
BPF_OBJ_GET_INFO_BY_FD
- [PATCH net-next 8/8] bpf: Test for bpf ID
- Jakub Kicinski, [PATCH net-next 0/9] nfp: move BPF offload code into app
- [PATCH net-next 1/9] sched: add helper for updating statistics on all actions
- [PATCH net-next 2/9] nfp: add missing fall through statements
- [PATCH net-next 3/9] nfp: turn reading PCIe RTsym parameters into a helper
- [PATCH net-next 4/9] nfp: move port init to apps
- [PATCH net-next 5/9] nfp: report app name in ethtool -i
- [PATCH net-next 6/9] nfp: move eBPF offload files to BPF app directory
- [PATCH net-next 7/9] nfp: move bpf offload code to the BPF app
- [PATCH net-next 8/9] nfp: move basic eBPF stats to app-specific code
- [PATCH net-next 9/9] nfp: fix memory leak on FW load error
Please note that netdev receives a lot of patches and the list above is not meant to be comprehensive.
Happy eBPF hacking!