lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20190316004356.9472-1-daniel@iogearbox.net>
Date:   Sat, 16 Mar 2019 01:43:56 +0100
From:   Daniel Borkmann <daniel@...earbox.net>
To:     davem@...emloft.net
Cc:     daniel@...earbox.net, ast@...nel.org, netdev@...r.kernel.org,
        bpf@...r.kernel.org
Subject: pull-request: bpf 2019-03-16

Hi David,

The following pull-request contains BPF updates for your *net* tree.

The main changes are:

1) Fix a umem memory leak on cleanup in AF_XDP, from Björn.

2) Fix BTF to properly resolve forward-declared enums into their corresponding
   full enum definition types during deduplication, from Andrii.

3) Fix libbpf to reject invalid flags in xsk_socket__create(), from Magnus.

4) Fix accessing invalid pointer returned from bpf_tcp_sock() and
   bpf_sk_fullsock() after bpf_sk_release() was called, from Martin.

5) Fix generation of load/store DW instructions in PPC JIT, from Naveen.

6) Various fixes in BPF helper function documentation in bpf.h UAPI header
   used to bpf-helpers(7) man page, from Quentin.

7) Fix segfault in BPF test_progs when prog loading failed, from Yonghong.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git

Thanks a lot!

----------------------------------------------------------------

The following changes since commit 2a5ff07a0eb945f291e361aa6f6becca8340ba46:

  gro_cells: make sure device is up in gro_cells_receive() (2019-03-10 11:07:14 -0700)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git 

for you to fetch changes up to 86be36f6502c52ddb4b85938145324fd07332da1:

  powerpc: bpf: Fix generation of load/store DW instructions (2019-03-16 01:28:22 +0100)

----------------------------------------------------------------
Alexei Starovoitov (3):
      Merge branch 'fix-fullsock-access-after-bpf_sk_release'
      Merge branch 'fix-fwd-enum-resolution'
      Merge branch 'fix-bpf-docs'

Andrii Nakryiko (3):
      libbpf: handle BTF parsing and loading properly
      btf: resolve enum fwds in btf_dedup
      selftests/bpf: add fwd enum resolution test for btf_dedup

Björn Töpel (1):
      xsk: fix umem memory leak on cleanup

Magnus Karlsson (1):
      libbpf: fix to reject unknown flags in xsk_socket__create()

Martin KaFai Lau (5):
      bpf: Fix bpf_tcp_sock and bpf_sk_fullsock issue related to bpf_sk_release
      bpf: Add bpf_get_listener_sock(struct bpf_sock *sk) helper
      bpf: Sync bpf.h to tools/
      bpf: Test ref release issue in bpf_tcp_sock and bpf_sk_fullsock
      bpf: Add an example for bpf_get_listener_sock

Naveen N. Rao (1):
      powerpc: bpf: Fix generation of load/store DW instructions

Quentin Monnet (3):
      bpf: fix documentation for eBPF helpers
      bpf: add documentation for helpers bpf_spin_lock(), bpf_spin_unlock()
      tools: bpf: synchronise BPF UAPI header with tools

Yonghong Song (1):
      selftests/bpf: fix segfault of test_progs when prog loading failed

 arch/powerpc/include/asm/ppc-opcode.h              |   2 +
 arch/powerpc/net/bpf_jit.h                         |  17 +-
 arch/powerpc/net/bpf_jit32.h                       |   4 +
 arch/powerpc/net/bpf_jit64.h                       |  20 +++
 arch/powerpc/net/bpf_jit_comp64.c                  |  12 +-
 include/linux/bpf.h                                |   1 -
 include/linux/bpf_verifier.h                       |  40 +++++
 include/net/xdp_sock.h                             |   1 -
 include/uapi/linux/bpf.h                           | 188 ++++++++++++++-------
 kernel/bpf/verifier.c                              | 131 +++++++-------
 net/core/filter.c                                  |  27 ++-
 net/xdp/xdp_umem.c                                 |  19 +--
 tools/include/uapi/linux/bpf.h                     | 188 ++++++++++++++-------
 tools/lib/bpf/btf.c                                |  51 ++++--
 tools/lib/bpf/libbpf.c                             |  13 +-
 tools/lib/bpf/xsk.c                                |  15 +-
 tools/testing/selftests/bpf/bpf_helpers.h          |   2 +
 tools/testing/selftests/bpf/prog_tests/map_lock.c  |   2 +-
 tools/testing/selftests/bpf/prog_tests/spinlock.c  |   2 +-
 .../selftests/bpf/progs/test_sock_fields_kern.c    |  88 ++++++++--
 tools/testing/selftests/bpf/test_btf.c             |  44 +++++
 tools/testing/selftests/bpf/test_sock_fields.c     | 134 ++++++++++++---
 .../testing/selftests/bpf/verifier/ref_tracking.c  | 168 ++++++++++++++++++
 tools/testing/selftests/bpf/verifier/sock.c        |   4 +-
 24 files changed, 883 insertions(+), 290 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ