lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20221125001034.29473-1-daniel@iogearbox.net>
Date:   Fri, 25 Nov 2022 01:10:34 +0100
From:   Daniel Borkmann <daniel@...earbox.net>
To:     davem@...emloft.net
Cc:     kuba@...nel.org, pabeni@...hat.com, edumazet@...gle.com,
        daniel@...earbox.net, ast@...nel.org, andrii@...nel.org,
        martin.lau@...ux.dev, netdev@...r.kernel.org, bpf@...r.kernel.org
Subject: pull-request: bpf 2022-11-25

Hi David, hi Jakub, hi Paolo, hi Eric,

Happy Thanksgiving!

The following pull-request contains BPF updates for your *net* tree.

We've added 10 non-merge commits during the last 8 day(s) which contain
a total of 7 files changed, 48 insertions(+), 30 deletions(-).

The main changes are:

1) Several libbpf ringbuf fixes related to probing for its availability, size
   overflows when mmaping a 2G ringbuf and rejection of invalid reservation
   sizes, from Hou Tao.

2) Fix a buggy return pointer in libbpf for attach_raw_tp function, from Jiri Olsa.

3) Fix a local storage BPF map bug where the value's spin lock field can get
   initialized incorrectly, from Xu Kuohai.

4) Two follow-up fixes in kprobe_multi BPF selftests for BPF CI, from Jiri Olsa.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git tags/for-netdev

Thanks a lot!

Also thanks to reporters, reviewers and testers of commits in this pull-request:

Alexei Starovoitov, Jiri Olsa

----------------------------------------------------------------

The following changes since commit ed1fe1bebe18884b11e5536b5ac42e3a48960835:

  net: dsa: make dsa_master_ioctl() see through port_hwtstamp_get() shims (2022-11-14 11:30:49 +0000)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git tags/for-netdev

for you to fetch changes up to 8be602dadb2febb5e4cb367bff1162205bcf9905:

  selftests/bpf: Make test_bench_attach serial (2022-11-21 11:52:01 -0800)

----------------------------------------------------------------
bpf-for-netdev

----------------------------------------------------------------
Alexei Starovoitov (1):
      Merge branch 'Bug fix and test case for special map value field '

Andrii Nakryiko (1):
      Merge branch 'libbpf: Fixes for ring buffer'

Hou Tao (5):
      bpf, perf: Use subprog name when reporting subprog ksymbol
      libbpf: Use page size as max_entries when probing ring buffer map
      libbpf: Handle size overflow for ringbuf mmap
      libbpf: Handle size overflow for user ringbuf mmap
      libbpf: Check the validity of size in user_ring_buffer__reserve()

Jiri Olsa (3):
      libbpf: Use correct return pointer in attach_raw_tp
      selftests/bpf: Filter out default_idle from kprobe_multi bench
      selftests/bpf: Make test_bench_attach serial

Xu Kuohai (2):
      bpf: Do not copy spin lock field from user in bpf_selem_alloc
      bpf: Set and check spin lock value in sk_storage_map_test

 kernel/bpf/bpf_local_storage.c                     |  2 +-
 kernel/events/core.c                               |  2 +-
 tools/lib/bpf/libbpf.c                             |  2 +-
 tools/lib/bpf/libbpf_probes.c                      |  2 +-
 tools/lib/bpf/ringbuf.c                            | 26 ++++++++++++----
 .../selftests/bpf/map_tests/sk_storage_map.c       | 36 ++++++++++++----------
 .../selftests/bpf/prog_tests/kprobe_multi_test.c   |  8 ++---
 7 files changed, 48 insertions(+), 30 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ