lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20240725153035.808889-1-kuba@kernel.org>
Date: Thu, 25 Jul 2024 08:30:35 -0700
From: Jakub Kicinski <kuba@...nel.org>
To: torvalds@...ux-foundation.org
Cc: kuba@...nel.org,
	davem@...emloft.net,
	netdev@...r.kernel.org,
	linux-kernel@...r.kernel.org,
	pabeni@...hat.com,
	bpf@...r.kernel.org
Subject: [GIT PULL] Networking for v6.11-rc1

Hi Linus!

The following changes since commit d7e78951a8b8b53e4d52c689d927a6887e6cfadf:

  Merge tag 'net-6.11-rc0' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net (2024-07-19 14:58:12 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git tags/net-6.11-rc1

for you to fetch changes up to af65ea42bd1d28d818b74b9b3b4f8da7ada9f88b:

  Merge branch 'tap-tun-harden-by-dropping-short-frame' (2024-07-25 08:07:07 -0700)

----------------------------------------------------------------
A lot of networking people were at a conference last week, busy
catching COVID, so relatively short PR. Including fixes from bpf
and netfilter.

Current release - regressions:

 - tcp: process the 3rd ACK with sk_socket for TFO and MPTCP

Current release - new code bugs:

 - l2tp: protect session IDR and tunnel session list with one lock,
   make sure the state is coherent to avoid a warning

 - eth: bnxt_en: update xdp_rxq_info in queue restart logic

 - eth: airoha: fix location of the MBI_RX_AGE_SEL_MASK field

Previous releases - regressions:

 - xsk: require XDP_UMEM_TX_METADATA_LEN to actuate tx_metadata_len,
   the field reuses previously un-validated pad

Previous releases - always broken:

 - tap/tun: drop short frames to prevent crashes later in the stack

 - eth: ice: add a per-VF limit on number of FDIR filters

 - af_unix: disable MSG_OOB handling for sockets in sockmap/sockhash

Signed-off-by: Jakub Kicinski <kuba@...nel.org>

----------------------------------------------------------------
Ahmed Zaki (1):
      ice: Add a per-VF limit on number of FDIR filters

Andrii Nakryiko (1):
      libbpf: Fix no-args func prototype BTF dumping syntax

Bailey Forrest (1):
      gve: Fix an edge case for TSO skb validity check

Breno Leitao (1):
      net: mediatek: Fix potential NULL pointer dereference in dummy net_device handling

Dan Carpenter (1):
      mISDN: Fix a use after free in hfcmulti_tx()

Donald Hunter (1):
      bpftool: Fix typo in usage help

Dongli Zhang (1):
      tun: add missing verification for short frame

Florian Westphal (1):
      netfilter: nft_set_pipapo_avx2: disable softinterrupts

Fred Li (1):
      bpf: Fix a segment issue when downgrading gso_size

Hangbin Liu (1):
      selftests: forwarding: skip if kernel not support setting bridge fdb learning limit

Hou Tao (1):
      bpf, events: Use prog to emit ksymbol event for main program

Ido Schimmel (1):
      ipv4: Fix incorrect source address in Record Route option

Jakub Kicinski (3):
      MAINTAINERS: make Breno the netconsole maintainer
      Merge tag 'for-netdev' of https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf
      Merge branch 'tap-tun-harden-by-dropping-short-frame'

James Chapman (1):
      l2tp: make session IDR and tunnel session list coherent

Jay Vosburgh (1):
      MAINTAINERS: Update bonding entry

Johannes Berg (1):
      net: bonding: correctly annotate RCU in bond_should_notify_peers()

Liwei Song (1):
      tools/resolve_btfids: Fix comparison of distinct pointer types warning in resolve_btfids

Lorenzo Bianconi (1):
      net: airoha: Fix MBI_RX_AGE_SEL_MASK definition

Matthieu Baerts (NGI0) (1):
      tcp: process the 3rd ACK with sk_socket for TFO/MPTCP

Michal Luczaj (4):
      af_unix: Disable MSG_OOB handling for sockets in sockmap/sockhash
      selftests/bpf: Support SOCK_STREAM in unix_inet_redir_to_connected()
      selftests/bpf: Parametrize AF_UNIX redir functions to accept send() flags
      selftests/bpf: Test sockmap redirect for AF_UNIX MSG_OOB

Naveen N Rao (2):
      MAINTAINERS: Update email address of Naveen
      MAINTAINERS: Update powerpc BPF JIT maintainers

Paolo Abeni (2):
      Merge branch '100GbE' of git://git.kernel.org/pub/scm/linux/kernel/git/tnguy/net-queue
      Merge tag 'nf-24-07-24' of git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf

Petr Machata (1):
      net: nexthop: Initialize all fields in dumped nexthops

Puranjay Mohan (1):
      selftests/bpf: fexit_sleep: Fix stack allocation for arm64

Shigeru Yoshida (1):
      tipc: Return non-zero value from tipc_udp_addr2str() on error

Si-Wei Liu (1):
      tap: add missing verification for short frame

Simon Horman (1):
      net: stmmac: Correct byte order of perfect_match

Stanislav Fomichev (2):
      xsk: Require XDP_UMEM_TX_METADATA_LEN to actuate tx_metadata_len
      selftests/bpf: Add XDP_UMEM_TX_METADATA_LEN to XSK TX metadata test

Taehee Yoo (1):
      bnxt_en: update xdp_rxq_info in queue restart logic

Wojciech Drewek (1):
      ice: Fix recipe read procedure

 .mailmap                                           |  2 +
 Documentation/networking/xsk-tx-metadata.rst       | 16 ++--
 MAINTAINERS                                        | 19 +++--
 drivers/isdn/hardware/mISDN/hfcmulti.c             |  7 +-
 drivers/net/bonding/bond_main.c                    |  7 +-
 drivers/net/ethernet/broadcom/bnxt/bnxt.c          | 17 +++++
 drivers/net/ethernet/google/gve/gve_tx_dqo.c       | 22 +++++-
 drivers/net/ethernet/intel/ice/ice_ethtool_fdir.c  |  2 +-
 drivers/net/ethernet/intel/ice/ice_fdir.h          |  3 +
 drivers/net/ethernet/intel/ice/ice_switch.c        |  8 +-
 drivers/net/ethernet/intel/ice/ice_virtchnl_fdir.c | 16 ++++
 drivers/net/ethernet/intel/ice/ice_virtchnl_fdir.h |  1 +
 drivers/net/ethernet/mediatek/airoha_eth.c         |  2 +-
 drivers/net/ethernet/mediatek/mtk_eth_soc.c        |  3 +-
 drivers/net/ethernet/stmicro/stmmac/dwmac4_core.c  |  2 +-
 .../net/ethernet/stmicro/stmmac/dwxgmac2_core.c    |  2 +-
 drivers/net/ethernet/stmicro/stmmac/hwif.h         |  2 +-
 drivers/net/ethernet/stmicro/stmmac/stmmac_main.c  |  4 +-
 drivers/net/tap.c                                  |  5 ++
 drivers/net/tun.c                                  |  3 +
 include/uapi/linux/if_xdp.h                        |  4 +
 kernel/events/core.c                               | 26 +++----
 net/core/filter.c                                  | 15 +++-
 net/ipv4/nexthop.c                                 |  7 +-
 net/ipv4/route.c                                   |  2 +-
 net/ipv4/tcp_input.c                               |  3 -
 net/l2tp/l2tp_core.c                               | 32 ++++----
 net/netfilter/nft_set_pipapo_avx2.c                | 12 ++-
 net/tipc/udp_media.c                               |  5 +-
 net/unix/af_unix.c                                 | 41 ++++++++++-
 net/unix/unix_bpf.c                                |  3 +
 net/xdp/xdp_umem.c                                 |  9 ++-
 tools/bpf/bpftool/prog.c                           |  2 +-
 tools/bpf/resolve_btfids/main.c                    |  2 +-
 tools/include/uapi/linux/if_xdp.h                  |  4 +
 tools/lib/bpf/btf_dump.c                           |  8 +-
 tools/testing/selftests/bpf/DENYLIST.aarch64       |  1 -
 .../testing/selftests/bpf/prog_tests/fexit_sleep.c |  8 +-
 .../selftests/bpf/prog_tests/sockmap_listen.c      | 85 +++++++++++++++-------
 .../selftests/bpf/prog_tests/xdp_metadata.c        |  3 +-
 .../bpf/progs/btf_dump_test_case_multidim.c        |  4 +-
 .../bpf/progs/btf_dump_test_case_syntax.c          |  4 +-
 .../net/forwarding/bridge_fdb_learning_limit.sh    | 18 +++++
 43 files changed, 319 insertions(+), 122 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ