From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-13.7 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PULL_REQUEST,MAILING_LIST_MULTI, MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 18641CA9EB9 for ; Sat, 26 Oct 2019 22:40:20 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id E5F8521655 for ; Sat, 26 Oct 2019 22:40:19 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726473AbfJZWkT (ORCPT ); Sat, 26 Oct 2019 18:40:19 -0400 Received: from www62.your-server.de ([213.133.104.62]:43546 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726263AbfJZWkT (ORCPT ); Sat, 26 Oct 2019 18:40:19 -0400 Received: from 33.249.197.178.dynamic.dsl-lte-bonding.lssmb00p-msn.res.cust.swisscom.ch ([178.197.249.33] helo=localhost) by www62.your-server.de with esmtpsa (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.89_1) (envelope-from ) id 1iOUj9-0008Jp-Dk; Sun, 27 Oct 2019 00:40:07 +0200 From: Daniel Borkmann To: davem@davemloft.net Cc: jakub.kicinski@netronome.com, daniel@iogearbox.net, ast@kernel.org, netdev@vger.kernel.org, bpf@vger.kernel.org Subject: pull-request: bpf 2019-10-27 Date: Sun, 27 Oct 2019 00:40:06 +0200 Message-Id: <20191026224006.18149-1-daniel@iogearbox.net> X-Mailer: git-send-email 2.21.0 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.101.4/25614/Sat Oct 26 11:04:41 2019) Sender: bpf-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: bpf@vger.kernel.org Hi David, The following pull-request contains BPF updates for your *net* tree. We've added 7 non-merge commits during the last 11 day(s) which contain a total of 7 files changed, 66 insertions(+), 16 deletions(-). The main changes are: 1) Fix two use-after-free bugs in relation to RCU in jited symbol exposure to kallsyms, from Daniel Borkmann. 2) Fix NULL pointer dereference in AF_XDP rx-only sockets, from Magnus Karlsson. 3) Fix hang in netdev unregister for hash based devmap as well as another overflow bug on 32 bit archs in memlock cost calculation, from Toke Høiland-Jørgensen. 4) Fix wrong memory access in LWT BPF programs on reroute due to invalid dst. Also fix BPF selftests to use more compatible nc options, from Jiri Benc. Please consider pulling these changes from: git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git Thanks a lot! Also thanks to reporters, reviewers and testers of commits in this pull-request: Jonathan Lemon, Kal Cutter Conley, Martin KaFai Lau, Peter Oskolkov, Tetsuo Handa, Yonghong Song ---------------------------------------------------------------- The following changes since commit 33902b4a4227877896dd9368ac10f4ca0d100de5: netdevsim: Fix error handling in nsim_fib_init and nsim_fib_exit (2019-10-13 11:30:14 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git for you to fetch changes up to 2afd23f78f39da84937006ecd24aa664a4ab052b: xsk: Fix registration of Rx-only sockets (2019-10-23 20:22:11 -0700) ---------------------------------------------------------------- Daniel Borkmann (2): bpf: Fix use after free in subprog's jited symbol removal bpf: Fix use after free in bpf_get_prog_name Jiri Benc (2): bpf: lwtunnel: Fix reroute supplying invalid dst selftests/bpf: More compatible nc options in test_tc_edt Magnus Karlsson (1): xsk: Fix registration of Rx-only sockets Toke Høiland-Jørgensen (2): xdp: Prevent overflow in devmap_hash cost calculation for 32-bit builds xdp: Handle device unregister for devmap_hash map type include/linux/filter.h | 1 - kernel/bpf/core.c | 2 +- kernel/bpf/devmap.c | 33 +++++++++++++++++++++++++++++- kernel/bpf/syscall.c | 31 ++++++++++++++++++---------- net/core/lwt_bpf.c | 7 ++++++- net/xdp/xdp_umem.c | 6 ++++++ tools/testing/selftests/bpf/test_tc_edt.sh | 2 +- 7 files changed, 66 insertions(+), 16 deletions(-)