lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Sat, 18 Aug 2018 01:29:20 +0200
From:   Daniel Borkmann <daniel@...earbox.net>
To:     davem@...emloft.net
Cc:     daniel@...earbox.net, ast@...nel.org, netdev@...r.kernel.org
Subject: pull-request: bpf 2018-08-18

Hi David,

The following pull-request contains BPF updates for your *net* tree.

The main changes are:

1) Fix a BPF selftest failure in test_cgroup_storage due to rlimit
   restrictions, from Yonghong.

2) Fix a suspicious RCU rcu_dereference_check() warning triggered
   from removing a device's XDP memory allocator by using the correct
   rhashtable lookup function, from Tariq.

3) A batch of BPF sockmap and ULP fixes mainly fixing leaks and races
   as well as enforcing module aliases for ULPs. Another fix for BPF
   map redirect to make them work again with tail calls, from Daniel.

4) Fix XDP BPF samples to unload their programs upon SIGTERM, from Jesper.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git

Thanks a lot!

----------------------------------------------------------------

The following changes since commit 9a76aba02a37718242d7cdc294f0a3901928aa57:

  Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next (2018-08-15 15:04:25 -0700)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git 

for you to fetch changes up to f6069b9aa9934ede26f41ac0781fce241279ad43:

  bpf: fix redirect to map under tail calls (2018-08-17 15:56:23 -0700)

----------------------------------------------------------------
Alexei Starovoitov (1):
      Merge branch 'sockmap-ulp-fixes'

Daniel Borkmann (6):
      tcp, ulp: add alias for all ulp modules
      tcp, ulp: fix leftover icsk_ulp_ops preventing sock from reattach
      bpf, sockmap: fix leakage of smap_psock_map_entry
      bpf, sockmap: fix map elem deletion race with smap_stop_sock
      bpf, sockmap: fix sock_map_ctx_update_elem race with exist/noexist
      bpf: fix redirect to map under tail calls

Jesper Dangaard Brouer (1):
      samples/bpf: all XDP samples should unload xdp/bpf prog on SIGTERM

Tariq Toukan (1):
      net/xdp: Fix suspicious RCU usage warning

Yonghong Song (2):
      bpf: fix a rcu usage warning in bpf_prog_array_copy_core()
      tools/bpf: fix bpf selftest test_cgroup_storage failure

 include/linux/filter.h                            |   3 +-
 include/net/tcp.h                                 |   4 +
 include/trace/events/xdp.h                        |   5 +-
 kernel/bpf/core.c                                 |   2 +-
 kernel/bpf/cpumap.c                               |   2 +
 kernel/bpf/devmap.c                               |   1 +
 kernel/bpf/sockmap.c                              | 120 ++++++++++++----------
 kernel/bpf/verifier.c                             |  21 ----
 kernel/bpf/xskmap.c                               |   1 +
 net/core/filter.c                                 |  68 ++++++------
 net/core/xdp.c                                    |  14 +--
 net/ipv4/tcp_ulp.c                                |   4 +-
 net/tls/tls_main.c                                |   1 +
 samples/bpf/xdp_redirect_cpu_user.c               |   3 +-
 samples/bpf/xdp_rxq_info_user.c                   |   3 +-
 tools/testing/selftests/bpf/test_cgroup_storage.c |   1 +
 16 files changed, 123 insertions(+), 130 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ