Netdev Archive on
help / color / mirror / Atom feed
* pull-request: bpf 2021-07-15
@ 2021-07-15 21:06 Andrii Nakryiko
  0 siblings, 0 replies; only message in thread
From: Andrii Nakryiko @ 2021-07-15 21:06 UTC (permalink / raw)
  To: davem; +Cc: kuba, daniel, ast, netdev, bpf, andrii

Hi David, hi Jakub,

The following pull-request contains BPF updates for your *net* tree.

We've added 9 non-merge commits during the last 5 day(s) which contain
a total of 9 files changed, 37 insertions(+), 15 deletions(-).

The main changes are:

1) Fix NULL pointer dereference in BPF_TEST_RUN for BPF_XDP_DEVMAP and
   BPF_XDP_CPUMAP programs, from Xuan Zhuo.

2) Fix use-after-free of net_device in XDP bpf_link, from Xuan Zhuo.

3) Follow-up fix to subprog poke descriptor use-after-free problem, from
   Daniel Borkmann and John Fastabend.

4) Fix out-of-range array access in s390 BPF JIT backend, from Colin Ian King.

5) Fix memory leak in BPF sockmap, from John Fastabend.

6) Fix for sockmap to prevent proc stats reporting bug, from John Fastabend
   and Jakub Sitnicki.

7) Fix NULL pointer dereference in bpftool, from Tobias Klauser.

8) AF_XDP documentation fixes, from Baruch Siach.

Please consider pulling these changes from:


Thanks a lot!

Also thanks to reporters, reviewers and testers of commits in this pull-request:

Abaci, Andrii Nakryiko, Cong Wang, David Ahern, Dust Li, Ilya 
Leoshkevich, Jesper Dangaard Brouer, John Fastabend, Maciej Fijalkowski, 
Magnus Karlsson, Quentin Monnet, Roman Gushchin, Song Liu


The following changes since commit a5de4be0aaaa66a2fa98e8a33bdbed3bd0682804:

  net: phy: marvell10g: fix differentiation of 88X3310 from 88X3340 (2021-07-11 10:02:33 -0700)

are available in the Git repository at: 

for you to fetch changes up to d444b06e40855219ef38b5e9286db16d435f06dc:

  bpftool: Check malloc return value in mount_bpffs_for_pin (2021-07-15 20:01:36 +0200)

Baruch Siach (1):
      doc, af_xdp: Fix bind flags option typo

Colin Ian King (1):
      s390/bpf: Perform r1 range checking before accessing jit->seen_reg[r1]

Daniel Borkmann (1):
      bpf: Fix tail_call_reachable rejection for interpreter when jit failed

Jakub Sitnicki (1):
      bpf, sockmap, udp: sk_prot needs inuse_idx set for proc stats

John Fastabend (2):
      bpf, sockmap: Fix potential memory leak on unlikely error case
      bpf, sockmap, tcp: sk_prot needs inuse_idx set for proc stats

Tobias Klauser (1):
      bpftool: Check malloc return value in mount_bpffs_for_pin

Xuan Zhuo (2):
      bpf, test: fix NULL pointer dereference on invalid expected_attach_type
      xdp, net: Fix use-after-free in bpf_xdp_link_release

 Documentation/networking/af_xdp.rst |  6 +++---
 arch/s390/net/bpf_jit_comp.c        |  2 +-
 kernel/bpf/verifier.c               |  2 ++
 net/bpf/test_run.c                  |  3 +++
 net/core/dev.c                      | 14 ++++++++++----
 net/core/skmsg.c                    | 16 +++++++++++-----
 net/ipv4/tcp_bpf.c                  |  2 +-
 net/ipv4/udp_bpf.c                  |  2 +-
 tools/bpf/bpftool/common.c          |  5 +++++
 9 files changed, 37 insertions(+), 15 deletions(-)

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2021-07-15 21:06 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-07-15 21:06 pull-request: bpf 2021-07-15 Andrii Nakryiko

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).