lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20190718210025.21557-1-ast@kernel.org>
Date:   Thu, 18 Jul 2019 14:00:25 -0700
From:   Alexei Starovoitov <ast@...nel.org>
To:     <davem@...emloft.net>
CC:     <daniel@...earbox.net>, <netdev@...r.kernel.org>,
        <bpf@...r.kernel.org>, <kernel-team@...com>
Subject: pull-request: bpf 2019-07-18

Hi David,

The following pull-request contains BPF updates for your *net* tree.

The main changes are:

1) verifier precision propagation fix, from Andrii.

2) BTF size fix for typedefs, from Andrii.

3) a bunch of big endian fixes, from Ilya.

4) wide load from bpf_sock_addr fixes, from Stanislav.

5) a bunch of misc fixes from a number of developers.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git

Thanks a lot!

----------------------------------------------------------------

The following changes since commit 114a5c3240155fdb01bf821c9d326d7bb05bd464:

  Merge tag 'mlx5-fixes-2019-07-11' of git://git.kernel.org/pub/scm/linux/kernel/git/saeed/linux (2019-07-11 15:06:37 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git 

for you to fetch changes up to 59fd3486c3dd5678bc2fcac75e14466775465c3e:

  selftests/bpf: fix test_xdp_noinline on s390 (2019-07-18 13:54:54 -0700)

----------------------------------------------------------------
Andrii Nakryiko (9):
      bpf: fix precision bit propagation for BPF_ST instructions
      libbpf: fix ptr to u64 conversion warning on 32-bit platforms
      bpf: fix BTF verifier size resolution logic
      selftests/bpf: add trickier size resolution tests
      selftests/bpf: use typedef'ed arrays as map values
      selftests/bpf: remove logic duplication in test_verifier
      libbpf: fix another GCC8 warning for strncpy
      selftests/bpf: fix test_verifier/test_maps make dependencies
      selftests/bpf: structure test_{progs, maps, verifier} test runners uniformly

Daniel Borkmann (2):
      Merge branch 'bpf-btf-size-verification-fix'
      Merge branch 'bpf-fix-wide-loads-sockaddr'

Daniel T. Lee (1):
      tools: bpftool: add raw_tracepoint_writable prog type to header

Gustavo A. R. Silva (1):
      bpf: verifier: avoid fall-through warnings

Ilya Leoshkevich (15):
      selftests/bpf: fix bpf_target_sparc check
      selftests/bpf: do not ignore clang failures
      selftests/bpf: compile progs with -D__TARGET_ARCH_$(SRCARCH)
      selftests/bpf: fix s930 -> s390 typo
      selftests/bpf: make PT_REGS_* work in userspace
      selftests/bpf: fix compiling loop{1, 2, 3}.c on s390
      selftests/bpf: fix attach_probe on s390
      selftests/bpf: make directory prerequisites order-only
      selftests/bpf: put test_stub.o into $(OUTPUT)
      samples/bpf: build with -D__TARGET_ARCH_$(SRCARCH)
      selftests/bpf: fix "alu with different scalars 1" on s390
      selftests/bpf: skip nmi test when perf hw events are disabled
      selftests/bpf: fix perf_buffer on s390
      selftests/bpf: fix "valid read map access into a read-only array 1" on s390
      selftests/bpf: fix test_xdp_noinline on s390

Ilya Maximets (2):
      xdp: fix possible cq entry leak
      xdp: fix potential deadlock on socket mutex

Stanislav Fomichev (5):
      bpf: rename bpf_ctx_wide_store_ok to bpf_ctx_wide_access_ok
      bpf: allow wide aligned loads for bpf_sock_addr user_ip6 and msg_src_ip6
      selftests/bpf: rename verifier/wide_store.c to verifier/wide_access.c
      selftests/bpf: add selftests for wide loads
      bpf: sync bpf.h to tools/

Vasily Gorbik (1):
      MAINTAINERS: update BPF JIT S390 maintainers

 MAINTAINERS                                        |  2 +-
 include/linux/filter.h                             |  2 +-
 include/uapi/linux/bpf.h                           |  4 +-
 kernel/bpf/btf.c                                   | 19 +++--
 kernel/bpf/verifier.c                              | 13 ++--
 net/core/filter.c                                  | 24 ++++--
 net/xdp/xdp_umem.c                                 | 16 ++--
 net/xdp/xsk.c                                      | 13 ++--
 samples/bpf/Makefile                               |  2 +-
 tools/bpf/bpftool/main.h                           |  1 +
 tools/include/uapi/linux/bpf.h                     |  4 +-
 tools/lib/bpf/libbpf.c                             |  4 +-
 tools/lib/bpf/xsk.c                                |  3 +-
 tools/testing/selftests/bpf/Makefile               | 64 ++++++++--------
 tools/testing/selftests/bpf/bpf_helpers.h          | 89 +++++++++++++++-------
 .../selftests/bpf/prog_tests/attach_probe.c        | 10 +--
 .../testing/selftests/bpf/prog_tests/perf_buffer.c |  8 +-
 .../testing/selftests/bpf/prog_tests/send_signal.c | 33 +++++++-
 tools/testing/selftests/bpf/progs/loop1.c          |  2 +-
 tools/testing/selftests/bpf/progs/loop2.c          |  2 +-
 tools/testing/selftests/bpf/progs/loop3.c          |  2 +-
 .../selftests/bpf/progs/test_get_stack_rawtp.c     |  3 +-
 .../selftests/bpf/progs/test_stacktrace_build_id.c |  3 +-
 .../selftests/bpf/progs/test_stacktrace_map.c      |  2 +-
 .../selftests/bpf/progs/test_xdp_noinline.c        | 17 +++--
 tools/testing/selftests/bpf/test_btf.c             | 88 +++++++++++++++++++++
 tools/testing/selftests/bpf/test_progs.h           |  8 ++
 tools/testing/selftests/bpf/test_verifier.c        | 35 ++++-----
 .../testing/selftests/bpf/verifier/array_access.c  |  2 +-
 .../selftests/bpf/verifier/value_ptr_arith.c       |  2 +-
 tools/testing/selftests/bpf/verifier/wide_access.c | 73 ++++++++++++++++++
 tools/testing/selftests/bpf/verifier/wide_store.c  | 36 ---------
 32 files changed, 391 insertions(+), 195 deletions(-)
 create mode 100644 tools/testing/selftests/bpf/verifier/wide_access.c
 delete mode 100644 tools/testing/selftests/bpf/verifier/wide_store.c

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ