Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package trinity for openSUSE:Factory checked 
in at 2021-10-20 20:24:00
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/trinity (Old)
 and      /work/SRC/openSUSE:Factory/.trinity.new.1890 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "trinity"

Wed Oct 20 20:24:00 2021 rev:68 rq:926479 version:1.9+git.20211011

Changes:
--------
--- /work/SRC/openSUSE:Factory/trinity/trinity.changes  2021-09-13 
16:25:23.094803931 +0200
+++ /work/SRC/openSUSE:Factory/.trinity.new.1890/trinity.changes        
2021-10-20 20:24:54.297401063 +0200
@@ -1,0 +2,8 @@
+Wed Oct 20 07:41:28 UTC 2021 - Martin Pluskal <[email protected]>
+
+- Update to version 1.9+git.20211011:
+  * new setsockopts
+  * Add skeletons for a bunch of new syscalls
+  * protect other children's shm from corruption
+
+-------------------------------------------------------------------

Old:
----
  trinity-1.9+git.20210826.obscpio

New:
----
  trinity-1.9+git.20211011.obscpio

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ trinity.spec ++++++
--- /var/tmp/diff_new_pack.wsEv9H/_old  2021-10-20 20:24:54.785401364 +0200
+++ /var/tmp/diff_new_pack.wsEv9H/_new  2021-10-20 20:24:54.789401367 +0200
@@ -17,7 +17,7 @@
 
 
 Name:           trinity
-Version:        1.9+git.20210826
+Version:        1.9+git.20211011
 Release:        0
 Summary:        A Linux System call fuzz tester
 License:        GPL-2.0-only

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.wsEv9H/_old  2021-10-20 20:24:54.833401394 +0200
+++ /var/tmp/diff_new_pack.wsEv9H/_new  2021-10-20 20:24:54.837401396 +0200
@@ -1,4 +1,4 @@
 <servicedata>
 <service name="tar_scm">
                 <param 
name="url">git://github.com/kernelslacker/trinity</param>
-              <param 
name="changesrevision">b1a0aef9978d4a41e7e601c277d4fb1b0cfbed89</param></service></servicedata>
\ No newline at end of file
+              <param 
name="changesrevision">eadc80ef4e2c4035131d7f8a3771833abedf7f49</param></service></servicedata>
\ No newline at end of file

++++++ trinity-1.9+git.20210826.obscpio -> trinity-1.9+git.20211011.obscpio 
++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/trinity-1.9+git.20210826/Makefile 
new/trinity-1.9+git.20211011/Makefile
--- old/trinity-1.9+git.20210826/Makefile       2021-08-26 17:18:27.000000000 
+0200
+++ new/trinity-1.9+git.20211011/Makefile       2021-10-11 21:30:27.000000000 
+0200
@@ -1,4 +1,4 @@
-VERSION="2019.06"
+VERSION="2021.10"
 
 INSTALL_PREFIX ?= $(DESTDIR)
 INSTALL_PREFIX ?= $(HOME)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/trinity-1.9+git.20210826/child.c 
new/trinity-1.9+git.20211011/child.c
--- old/trinity-1.9+git.20210826/child.c        2021-08-26 17:18:27.000000000 
+0200
+++ new/trinity-1.9+git.20211011/child.c        2021-10-11 21:30:27.000000000 
+0200
@@ -189,6 +189,14 @@
 {
        pid_t pid = getpid();
        char childname[17];
+       unsigned int i;
+
+       for_each_child(i) {
+               if (child->num != i)
+                       mprotect(shm->children[i], sizeof(struct childdata), 
PROT_READ);
+       }
+
+       mprotect(pids, max_children * sizeof(int), PROT_READ);
 
        /* Wait for parent to set our childno */
        while (pids[childno] != pid) {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/trinity-1.9+git.20210826/include/compat.h 
new/trinity-1.9+git.20211011/include/compat.h
--- old/trinity-1.9+git.20210826/include/compat.h       2021-08-26 
17:18:27.000000000 +0200
+++ new/trinity-1.9+git.20211011/include/compat.h       2021-10-11 
21:30:27.000000000 +0200
@@ -600,6 +600,13 @@
 #define SO_BUSY_POLL_BUDGET     70
 #endif
 
+#ifndef SO_NETNS_COOKIE
+#define SO_NETNS_COOKIE                71
+#endif
+
+#ifndef SO_BUF_LOCK
+#define SO_BUF_LOCK            72
+#endif
 
 /* linux/tcp.h */
 #ifndef TCP_COOKIE_TRANSACTIONS
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/trinity-1.9+git.20210826/include/syscalls-x86_64.h 
new/trinity-1.9+git.20211011/include/syscalls-x86_64.h
--- old/trinity-1.9+git.20210826/include/syscalls-x86_64.h      2021-08-26 
17:18:27.000000000 +0200
+++ new/trinity-1.9+git.20211011/include/syscalls-x86_64.h      2021-10-11 
21:30:27.000000000 +0200
@@ -454,4 +454,10 @@
        { .entry = &syscall_process_madvise },
        { .entry = &syscall_epoll_pwait2 },
        { .entry = &syscall_mount_setattr },
+       { .entry = &syscall_quotactl_fd },
+       { .entry = &syscall_landlock_create_ruleset },
+       { .entry = &syscall_landlock_add_rule },
+       { .entry = &syscall_landlock_restrict_self },
+       { .entry = &syscall_memfd_secret },
+       { .entry = &syscall_process_mrelease },
 };
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/trinity-1.9+git.20210826/syscalls/landlock_add_rule.c 
new/trinity-1.9+git.20211011/syscalls/landlock_add_rule.c
--- old/trinity-1.9+git.20210826/syscalls/landlock_add_rule.c   1970-01-01 
01:00:00.000000000 +0100
+++ new/trinity-1.9+git.20211011/syscalls/landlock_add_rule.c   2021-10-11 
21:30:27.000000000 +0200
@@ -0,0 +1,33 @@
+/*
+ * SYSCALL_DEFINE4(landlock_add_rule,
+ *                const int, ruleset_fd, const enum landlock_rule_type, 
rule_type,
+ *                const void __user *const, rule_attr, const __u32, flags)
+ */
+#include "sanitise.h"
+
+enum landlock_rule_type {
+       LANDLOCK_RULE_PATH_BENEATH = 1,
+};
+
+static unsigned long landlock_ruletypes[] = {
+       LANDLOCK_RULE_PATH_BENEATH,
+};
+
+// no flags for now
+//static unsigned long landlock_add_rule_flags[] = {
+//     ,
+//};
+
+struct syscallentry syscall_landlock_add_rule = {
+       .name = "landlock_add_rule",
+       .num_args = 4,
+       .arg1name = "ruleset_fd",
+       .arg1type = ARG_FD,
+       .arg2name = "rule_type",
+       .arg2type = ARG_LIST,
+       .arg2list = ARGLIST(landlock_ruletypes),
+       .arg3name = "rule_attr",
+       .arg4name = "flags",
+//     .arg4type = ARG_LIST,
+//     .arg4list = ARGLIST(landlock_add_rule_flags),
+};
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/trinity-1.9+git.20210826/syscalls/landlock_create_ruleset.c 
new/trinity-1.9+git.20211011/syscalls/landlock_create_ruleset.c
--- old/trinity-1.9+git.20210826/syscalls/landlock_create_ruleset.c     
1970-01-01 01:00:00.000000000 +0100
+++ new/trinity-1.9+git.20211011/syscalls/landlock_create_ruleset.c     
2021-10-11 21:30:27.000000000 +0200
@@ -0,0 +1,23 @@
+/*
+ * SYSCALL_DEFINE3(landlock_create_ruleset,
+ *                const struct landlock_ruleset_attr __user *const, attr,
+ *                const size_t, size, const __u32, flags)
+ */
+#include "sanitise.h"
+
+#define LANDLOCK_CREATE_RULESET_VERSION                 (1U << 0)
+
+static unsigned long landlock_create_ruleset_flags[] = {
+       LANDLOCK_CREATE_RULESET_VERSION,
+};
+
+struct syscallentry syscall_landlock_create_ruleset = {
+       .name = "landlock_create_ruleset",
+       .num_args = 3,
+       .arg1name = "attr",
+       .arg2name = "size",
+       .arg2type = ARG_LEN,
+       .arg3name = "flags",
+       .arg3type = ARG_LIST,
+       .arg3list = ARGLIST(landlock_create_ruleset_flags),
+};
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/trinity-1.9+git.20210826/syscalls/landlock_restrict_self.c 
new/trinity-1.9+git.20211011/syscalls/landlock_restrict_self.c
--- old/trinity-1.9+git.20210826/syscalls/landlock_restrict_self.c      
1970-01-01 01:00:00.000000000 +0100
+++ new/trinity-1.9+git.20211011/syscalls/landlock_restrict_self.c      
2021-10-11 21:30:27.000000000 +0200
@@ -0,0 +1,19 @@
+/*
+ * SYSCALL_DEFINE2(landlock_restrict_self,
+ *                const int, ruleset_fd, const __u32, flags)
+ */
+#include "sanitise.h"
+
+//static unsigned long landlock_restrict_self_flags[] = {
+//     ,
+//};
+
+struct syscallentry syscall_landlock_restrict_self = {
+       .name = "landlock_restrict_self",
+       .num_args = 2,
+       .arg1name = "fd",
+       .arg1type = ARG_FD,
+       .arg2name = "flags",
+//     arg2type = ARG_LIST,
+//     arg2list = ARGLIST(landlock_restrict_self_flags),
+};
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/trinity-1.9+git.20210826/syscalls/memfd_secret.c 
new/trinity-1.9+git.20211011/syscalls/memfd_secret.c
--- old/trinity-1.9+git.20210826/syscalls/memfd_secret.c        1970-01-01 
01:00:00.000000000 +0100
+++ new/trinity-1.9+git.20211011/syscalls/memfd_secret.c        2021-10-11 
21:30:27.000000000 +0200
@@ -0,0 +1,19 @@
+/*
+ * SYSCALL_DEFINE1(memfd_secret, unsigned int, flags)
+ */
+
+#include "sanitise.h"
+#include "memfd.h"
+#include "compat.h"
+
+static unsigned long memfd_secret_flags[] = {
+       0,
+};
+
+struct syscallentry syscall_memfd_secret = {
+       .name = "memfd_secret",
+       .num_args = 1,
+       .arg1name = "flag",
+       .arg1type = ARG_LIST,
+       .arg1list = ARGLIST(memfd_secret_flags),
+};
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/trinity-1.9+git.20210826/syscalls/process_mrelease.c 
new/trinity-1.9+git.20211011/syscalls/process_mrelease.c
--- old/trinity-1.9+git.20210826/syscalls/process_mrelease.c    1970-01-01 
01:00:00.000000000 +0100
+++ new/trinity-1.9+git.20211011/syscalls/process_mrelease.c    2021-10-11 
21:30:27.000000000 +0200
@@ -0,0 +1,17 @@
+/*
+ * SYSCALL_DEFINE2(process_mrelease, int, pidfd, unsigned int, flags)
+ */
+#include "sanitise.h"
+
+static unsigned long process_mrelease_flags[] = {
+       0,      // currently no flags defined, mbz
+};
+
+struct syscallentry syscall_process_mrelease = {
+       .name = "process_mrelease",
+       .num_args = 2,
+       .arg1name = "pidfd",
+       .arg2name = "flags",
+       .arg2type = ARG_LIST,
+       .arg2list = ARGLIST(process_mrelease_flags),
+};
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/trinity-1.9+git.20210826/syscalls/quotactl_fd.c 
new/trinity-1.9+git.20211011/syscalls/quotactl_fd.c
--- old/trinity-1.9+git.20210826/syscalls/quotactl_fd.c 1970-01-01 
01:00:00.000000000 +0100
+++ new/trinity-1.9+git.20211011/syscalls/quotactl_fd.c 2021-10-11 
21:30:27.000000000 +0200
@@ -0,0 +1,17 @@
+/*
+ * SYSCALL_DEFINE4(quotactl_fd, unsigned int, fd, unsigned int, cmd,
+        qid_t, id, void __user *, addr)
+ */
+#include "sanitise.h"
+
+struct syscallentry syscall_quotactl_fd = {
+       .name = "quotactl_fd",
+       .num_args = 4,
+       .arg1name = "fd",
+       .arg1type = ARG_FD,
+       .arg2name = "cmd",
+       .arg3name = "id",
+       .arg4name = "addr",
+       .arg4type = ARG_ADDRESS,
+       .group = GROUP_VFS,
+};
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/trinity-1.9+git.20210826/syscalls/setsockopt.c 
new/trinity-1.9+git.20211011/syscalls/setsockopt.c
--- old/trinity-1.9+git.20210826/syscalls/setsockopt.c  2021-08-26 
17:18:27.000000000 +0200
+++ new/trinity-1.9+git.20211011/syscalls/setsockopt.c  2021-10-11 
21:30:27.000000000 +0200
@@ -29,6 +29,7 @@
        SO_TXTIME, SO_BINDTOIFINDEX, SO_TIMESTAMP_NEW, SO_TIMESTAMPNS_NEW,
        SO_TIMESTAMPING_NEW, SO_RCVTIMEO_NEW, SO_SNDTIMEO_NEW,
        SO_DETACH_REUSEPORT_BPF, SO_PREFER_BUSY_POLL, SO_BUSY_POLL_BUDGET,
+       SO_NETNS_COOKIE, SO_BUF_LOCK,
 };
 
 static void socket_setsockopt(struct sockopt *so, __unused__ struct 
socket_triplet *triplet)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/trinity-1.9+git.20210826/syscalls/syscalls.h 
new/trinity-1.9+git.20211011/syscalls/syscalls.h
--- old/trinity-1.9+git.20210826/syscalls/syscalls.h    2021-08-26 
17:18:27.000000000 +0200
+++ new/trinity-1.9+git.20211011/syscalls/syscalls.h    2021-10-11 
21:30:27.000000000 +0200
@@ -407,6 +407,12 @@
 extern struct syscallentry syscall_process_madvise;
 extern struct syscallentry syscall_epoll_pwait2;
 extern struct syscallentry syscall_mount_setattr;
+extern struct syscallentry syscall_quotactl_fd;
+extern struct syscallentry syscall_landlock_create_ruleset;
+extern struct syscallentry syscall_landlock_add_rule;
+extern struct syscallentry syscall_landlock_restrict_self;
+extern struct syscallentry syscall_memfd_secret;
+extern struct syscallentry syscall_process_mrelease;
 
 extern struct syscallentry syscall_runtime_instr;
 extern struct syscallentry syscall_s390_pci_mmio_write;

++++++ trinity.obsinfo ++++++
--- /var/tmp/diff_new_pack.wsEv9H/_old  2021-10-20 20:24:55.077401545 +0200
+++ /var/tmp/diff_new_pack.wsEv9H/_new  2021-10-20 20:24:55.081401547 +0200
@@ -1,5 +1,5 @@
 name: trinity
-version: 1.9+git.20210826
-mtime: 1629991107
-commit: b1a0aef9978d4a41e7e601c277d4fb1b0cfbed89
+version: 1.9+git.20211011
+mtime: 1633980627
+commit: eadc80ef4e2c4035131d7f8a3771833abedf7f49
 

Reply via email to