lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20230306215944.11981-1-daniel@iogearbox.net>
Date:   Mon,  6 Mar 2023 22:59:44 +0100
From:   Daniel Borkmann <daniel@...earbox.net>
To:     davem@...emloft.net
Cc:     kuba@...nel.org, pabeni@...hat.com, edumazet@...gle.com,
        daniel@...earbox.net, ast@...nel.org, andrii@...nel.org,
        martin.lau@...ux.dev, netdev@...r.kernel.org, bpf@...r.kernel.org
Subject: pull-request: bpf 2023-03-06

Hi David, hi Jakub, hi Paolo, hi Eric,

The following pull-request contains BPF updates for your *net* tree.

We've added 8 non-merge commits during the last 7 day(s) which contain
a total of 9 files changed, 64 insertions(+), 18 deletions(-).

The main changes are:

1) Fix BTF resolver for DATASEC sections when a VAR points at a modifier, that
   is, keep resolving such instances instead of bailing out, from Lorenz Bauer.

2) Fix BPF test framework with regards to xdp_frame info misplacement in the
   "live packet" code, from Alexander Lobakin.

3) Fix an infinite loop in BPF sockmap code for TCP/UDP/AF_UNIX, from Liu Jian.

4) Fix a build error for riscv BPF JIT under PERF_EVENTS=n, from Randy Dunlap.

5) Several BPF doc fixes with either broken links or external instead of internal
   doc links, from Bagas Sanjaya.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git tags/for-netdev

Thanks a lot!

Also thanks to reporters, reviewers and testers of commits in this pull-request:

Björn Töpel, John Fastabend, kernel test robot, Pu Lehui, Ross Zwisler, 
Toke Høiland-Jørgensen

----------------------------------------------------------------

The following changes since commit 580f98cc33a260bb8c6a39ae2921b29586b84fdf:

  tcp: tcp_check_req() can be called from process context (2023-02-27 11:59:29 -0800)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git tags/for-netdev

for you to fetch changes up to 32dfc59e43019e43deab7afbfff37a2f9f17a222:

  Merge branch 'fix resolving VAR after DATASEC' (2023-03-06 11:44:14 -0800)

----------------------------------------------------------------
bpf-for-netdev

----------------------------------------------------------------
Alexander Lobakin (1):
      bpf, test_run: fix &xdp_frame misplacement for LIVE_FRAMES

Bagas Sanjaya (3):
      bpf, docs: Fix link to BTF doc
      bpf, doc: Do not link to docs.kernel.org for kselftest link
      bpf, doc: Link to submitting-patches.rst for general patch submission info

Liu Jian (1):
      bpf, sockmap: Fix an infinite loop error when len is 0 in tcp_bpf_recvmsg_parser()

Lorenz Bauer (2):
      btf: fix resolving BTF_KIND_VAR after ARRAY, STRUCT, UNION, PTR
      selftests/bpf: check that modifier resolves after pointer

Martin KaFai Lau (1):
      Merge branch 'fix resolving VAR after DATASEC'

Randy Dunlap (1):
      riscv, bpf: Fix patch_text implicit declaration

 Documentation/bpf/bpf_devel_QA.rst                 | 14 ++++-------
 arch/riscv/net/bpf_jit_comp64.c                    |  1 +
 kernel/bpf/btf.c                                   |  1 +
 net/bpf/test_run.c                                 | 19 ++++++++++-----
 net/ipv4/tcp_bpf.c                                 |  6 +++++
 net/ipv4/udp_bpf.c                                 |  3 +++
 net/unix/unix_bpf.c                                |  3 +++
 tools/testing/selftests/bpf/prog_tests/btf.c       | 28 ++++++++++++++++++++++
 .../selftests/bpf/prog_tests/xdp_do_redirect.c     |  7 +++---
 9 files changed, 64 insertions(+), 18 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ