lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 12 Jul 2023 15:30:45 -0700
From: Alexei Starovoitov <alexei.starovoitov@...il.com>
To: davem@...emloft.net
Cc: kuba@...nel.org,
	edumazet@...gle.com,
	pabeni@...hat.com,
	daniel@...earbox.net,
	andrii@...nel.org,
	netdev@...r.kernel.org,
	bpf@...r.kernel.org,
	kernel-team@...com
Subject: pull-request: bpf 2023-07-12

Hi David, hi Jakub, hi Paolo, hi Eric,

The following pull-request contains BPF updates for your *net* tree.

We've added 5 non-merge commits during the last 7 day(s) which contain
a total of 7 files changed, 93 insertions(+), 28 deletions(-).

The main changes are:

1) Fix max stack depth check for async callbacks, from Kumar.

2) Fix inconsistent JIT image generation, from Björn.

3) Use trusted arguments in XDP hints kfuncs, from Larysa.

4) Fix memory leak in cpu_map_update_elem, from Pu.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git tags/for-netdev

Thanks a lot!

Also thanks to reporters, reviewers and testers of commits in this pull-request:

Hou Tao, Jesper Dangaard Brouer, Stanislav Fomichev

----------------------------------------------------------------

The following changes since commit 6843306689aff3aea608e4d2630b2a5a0137f827:

  Merge tag 'net-6.5-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net (2023-07-05 15:44:45 -0700)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git tags/for-netdev

for you to fetch changes up to 2e06c57d66d3f6c26faa5f5b479fb3add34ce85a:

  xdp: use trusted arguments in XDP hints kfuncs (2023-07-11 20:04:50 -0700)

----------------------------------------------------------------
for-netdev

----------------------------------------------------------------
Alexei Starovoitov (1):
      Merge branch 'Fix for check_max_stack_depth'

Björn Töpel (1):
      riscv, bpf: Fix inconsistent JIT image generation

Kumar Kartikeya Dwivedi (2):
      bpf: Fix max stack depth check for async callbacks
      selftests/bpf: Add selftest for check_stack_max_depth bug

Larysa Zaremba (1):
      xdp: use trusted arguments in XDP hints kfuncs

Pu Lehui (1):
      bpf: cpumap: Fix memory leak in cpu_map_update_elem

 arch/riscv/net/bpf_jit.h                           |  6 ++--
 arch/riscv/net/bpf_jit_core.c                      | 19 ++++++----
 kernel/bpf/cpumap.c                                | 40 +++++++++++++---------
 kernel/bpf/verifier.c                              |  5 +--
 net/core/xdp.c                                     |  2 +-
 .../selftests/bpf/prog_tests/async_stack_depth.c   |  9 +++++
 .../selftests/bpf/progs/async_stack_depth.c        | 40 ++++++++++++++++++++++
 7 files changed, 93 insertions(+), 28 deletions(-)
 create mode 100644 tools/testing/selftests/bpf/prog_tests/async_stack_depth.c
 create mode 100644 tools/testing/selftests/bpf/progs/async_stack_depth.c

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ