lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Tue,  9 Nov 2021 13:57:02 -0800
From:   Alexei Starovoitov <alexei.starovoitov@...il.com>
To:     davem@...emloft.net
Cc:     daniel@...earbox.net, kuba@...nel.org, andrii@...nel.org,
        netdev@...r.kernel.org, bpf@...r.kernel.org, kernel-team@...com
Subject: pull-request: bpf 2021-11-09

Hi David, hi Jakub,

The following pull-request contains BPF updates for your *net* tree.

We've added 7 non-merge commits during the last 3 day(s) which contain
a total of 10 files changed, 174 insertions(+), 48 deletions(-).

The main changes are:

1) Various sockmap fixes, from John and Jussi.

2) Fix out-of-bound issue with bpf_pseudo_func, from Martin.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git

Thanks a lot!

Also thanks to reporters, reviewers and testers of commits in this pull-request:

Jakub Sitnicki, Jussi Maki

----------------------------------------------------------------

The following changes since commit 70bf363d7adb3a428773bc905011d0ff923ba747:

  ipv6: remove useless assignment to newinet in tcp_v6_syn_recv_sock() (2021-11-05 19:49:40 -0700)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git 

for you to fetch changes up to b2c4618162ec615a15883a804cce7e27afecfa58:

  bpf, sockmap: sk_skb data_end access incorrect when src_reg = dst_reg (2021-11-09 01:05:34 +0100)

----------------------------------------------------------------
Alexei Starovoitov (1):
      Merge branch 'bpf: Fix out-of-bound issue when jit-ing bpf_pseudo_func'

John Fastabend (4):
      bpf, sockmap: Use stricter sk state checks in sk_lookup_assign
      bpf, sockmap: Remove unhash handler for BPF sockmap usage
      bpf, sockmap: Fix race in ingress receive verdict with redirect to self
      bpf: sockmap, strparser, and tls are reusing qdisc_skb_cb and colliding

Jussi Maki (1):
      bpf, sockmap: sk_skb data_end access incorrect when src_reg = dst_reg

Martin KaFai Lau (2):
      bpf: Stop caching subprog index in the bpf_pseudo_func insn
      bpf: selftest: Trigger a DCE on the whole subprog

 include/linux/bpf.h                                |  6 ++
 include/linux/skmsg.h                              | 12 ++++
 include/net/strparser.h                            | 20 ++++++-
 kernel/bpf/core.c                                  |  7 +++
 kernel/bpf/verifier.c                              | 37 +++++--------
 net/core/filter.c                                  | 64 +++++++++++++++++++---
 net/core/sock_map.c                                |  6 --
 net/ipv4/tcp_bpf.c                                 | 48 +++++++++++++++-
 net/strparser/strparser.c                          | 10 +---
 .../selftests/bpf/progs/for_each_array_map_elem.c  | 12 ++++
 10 files changed, 174 insertions(+), 48 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ