lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20190916102630.14491-1-daniel@iogearbox.net>
Date:   Mon, 16 Sep 2019 12:26:30 +0200
From:   Daniel Borkmann <daniel@...earbox.net>
To:     davem@...emloft.net
Cc:     daniel@...earbox.net, ast@...nel.org, netdev@...r.kernel.org,
        bpf@...r.kernel.org
Subject: pull-request: bpf-next 2019-09-16

Hi David,

The following pull-request contains BPF updates for your *net-next* tree.

The main changes are:

1) Now that initial BPF backend for gcc has been merged upstream, enable
   BPF kselftest suite for bpf-gcc. Also fix a BE issue with access to
   bpf_sysctl.file_pos, from Ilya.

2) Follow-up fix for link-vmlinux.sh to remove bash-specific extensions
   related to recent work on exposing BTF info through sysfs, from Andrii.

3) AF_XDP zero copy fixes for i40e and ixgbe driver which caused umem
   headroom to be added twice, from Ciara.

4) Refactoring work to convert sock opt tests into test_progs framework
   in BPF kselftests, from Stanislav.

5) Fix a general protection fault in dev_map_hash_update_elem(), from Toke.

6) Cleanup to use BPF_PROG_RUN() macro in KCM, from Sami.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git

Thanks a lot!

----------------------------------------------------------------

The following changes since commit 1e46c09ec10049a9e366153b32e41cc557383fdb:

  Merge git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next (2019-09-06 16:49:17 +0200)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git 

for you to fetch changes up to d895a0f16fadb26d22ab531c49768f7642ae5c3e:

  bpf: fix accessing bpf_sysctl.file_pos on s390 (2019-09-16 11:44:05 +0200)

----------------------------------------------------------------
Alexei Starovoitov (1):
      Merge branch 'move-sockopt-tests'

Andrii Nakryiko (1):
      kbuild: replace BASH-specific ${@:2} with shift and ${@}

Ciara Loftus (3):
      i40e: fix xdp handle calculations
      ixgbe: fix xdp handle calculations
      samples/bpf: fix xdpsock l2fwd tx for unaligned mode

Daniel Borkmann (1):
      Merge branch 'bpf-af-xdp-unaligned-fixes'

Ilya Leoshkevich (2):
      selftests/bpf: add bpf-gcc support
      bpf: fix accessing bpf_sysctl.file_pos on s390

Sami Tolvanen (1):
      kcm: use BPF_PROG_RUN

Stanislav Fomichev (6):
      selftests/bpf: test_progs: add test__join_cgroup helper
      selftests/bpf: test_progs: convert test_sockopt
      selftests/bpf: test_progs: convert test_sockopt_sk
      selftests/bpf: test_progs: convert test_sockopt_multi
      selftests/bpf: test_progs: convert test_sockopt_inherit
      selftests/bpf: test_progs: convert test_tcp_rtt

Toke Høiland-Jørgensen (1):
      xdp: Fix race in dev_map_hash_update_elem() when replacing element

 drivers/net/ethernet/intel/i40e/i40e_xsk.c         |   4 +-
 drivers/net/ethernet/intel/ixgbe/ixgbe_xsk.c       |   4 +-
 include/linux/filter.h                             |   8 +-
 kernel/bpf/cgroup.c                                |  10 +-
 kernel/bpf/devmap.c                                |  17 +++-
 kernel/bpf/verifier.c                              |   4 +-
 net/kcm/kcmsock.c                                  |   2 +-
 samples/bpf/xdpsock_user.c                         |   2 +-
 scripts/link-vmlinux.sh                            |  16 +++-
 tools/testing/selftests/bpf/.gitignore             |   5 -
 tools/testing/selftests/bpf/Makefile               |  77 +++++++++++-----
 tools/testing/selftests/bpf/bpf_helpers.h          |  24 +++--
 .../bpf/{test_sockopt.c => prog_tests/sockopt.c}   |  50 ++--------
 .../sockopt_inherit.c}                             | 102 +++++++++------------
 .../sockopt_multi.c}                               |  62 ++-----------
 .../{test_sockopt_sk.c => prog_tests/sockopt_sk.c} |  60 +++---------
 .../bpf/{test_tcp_rtt.c => prog_tests/tcp_rtt.c}   |  83 ++++++-----------
 tools/testing/selftests/bpf/progs/test_tc_edt.c    |   1 +
 tools/testing/selftests/bpf/test_progs.c           |  38 ++++++++
 tools/testing/selftests/bpf/test_progs.h           |   4 +-
 tools/testing/selftests/bpf/test_sysctl.c          |   9 +-
 21 files changed, 260 insertions(+), 322 deletions(-)
 rename tools/testing/selftests/bpf/{test_sockopt.c => prog_tests/sockopt.c} (96%)
 rename tools/testing/selftests/bpf/{test_sockopt_inherit.c => prog_tests/sockopt_inherit.c} (72%)
 rename tools/testing/selftests/bpf/{test_sockopt_multi.c => prog_tests/sockopt_multi.c} (83%)
 rename tools/testing/selftests/bpf/{test_sockopt_sk.c => prog_tests/sockopt_sk.c} (79%)
 rename tools/testing/selftests/bpf/{test_tcp_rtt.c => prog_tests/tcp_rtt.c} (76%)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ