lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20220701230121.10354-1-daniel@iogearbox.net>
Date:   Sat,  2 Jul 2022 01:01:21 +0200
From:   Daniel Borkmann <daniel@...earbox.net>
To:     davem@...emloft.net
Cc:     kuba@...nel.org, pabeni@...hat.com, edumazet@...gle.com,
        daniel@...earbox.net, ast@...nel.org, andrii@...nel.org,
        netdev@...r.kernel.org, bpf@...r.kernel.org
Subject: pull-request: bpf 2022-07-02

Hi David, hi Jakub, hi Paolo, hi Eric,

The following pull-request contains BPF updates for your *net* tree.

We've added 7 non-merge commits during the last 14 day(s) which contain
a total of 6 files changed, 193 insertions(+), 86 deletions(-).

The main changes are:

1) Fix clearing of page contiguity when unmapping XSK pool, from Ivan Malov.

2) Two verifier fixes around bounds data propagation, from Daniel Borkmann.

3) Fix fprobe sample module's parameter descriptions, from Masami Hiramatsu.

4) General BPF maintainer entry revamp to better scale patch reviews.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git

Thanks a lot!

Also thanks to reporters, reviewers and testers of commits in this pull-request:

Hao Luo, Jiri Olsa, John Fastabend, KP Singh, Kuee K1r0a, Magnus 
Karlsson, Martin KaFai Lau, Mykola Lysenko, Quentin Monnet, Song Liu, 
Stanislav Fomichev, Yonghong Song

----------------------------------------------------------------

The following changes since commit a2b1a5d40bd12b44322c2ccd40bb0ec1699708b6:

  net/sched: sch_netem: Fix arithmetic in netem_dump() for 32-bit platforms (2022-06-17 20:29:38 -0700)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git 

for you to fetch changes up to a49b8ce7306cf8031361a6a4f7f6bc7a775a39c8:

  bpf, selftests: Add verifier test case for jmp32's jeq/jne (2022-07-01 12:56:27 -0700)

----------------------------------------------------------------
Alexei Starovoitov (1):
      bpf, docs: Better scale maintenance of BPF subsystem

Daniel Borkmann (4):
      bpf: Fix incorrect verifier simulation around jmp32's jeq/jne
      bpf: Fix insufficient bounds propagation from adjust_scalar_min_max_vals
      bpf, selftests: Add verifier test case for imm=0,umin=0,umax=1 scalar
      bpf, selftests: Add verifier test case for jmp32's jeq/jne

Ivan Malov (1):
      xsk: Clear page contiguity bit when unmapping pool

Masami Hiramatsu (Google) (1):
      fprobe, samples: Add module parameter descriptions

 MAINTAINERS                                  | 115 ++++++++++++++++++++++-----
 kernel/bpf/verifier.c                        | 113 +++++++++++---------------
 net/xdp/xsk_buff_pool.c                      |   1 +
 samples/fprobe/fprobe_example.c              |   7 ++
 tools/testing/selftests/bpf/verifier/jmp32.c |  21 +++++
 tools/testing/selftests/bpf/verifier/jump.c  |  22 +++++
 6 files changed, 193 insertions(+), 86 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ