Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package trinity for openSUSE:Factory checked in at 2021-10-20 20:24:00 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/trinity (Old) and /work/SRC/openSUSE:Factory/.trinity.new.1890 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "trinity" Wed Oct 20 20:24:00 2021 rev:68 rq:926479 version:1.9+git.20211011 Changes: -------- --- /work/SRC/openSUSE:Factory/trinity/trinity.changes 2021-09-13 16:25:23.094803931 +0200 +++ /work/SRC/openSUSE:Factory/.trinity.new.1890/trinity.changes 2021-10-20 20:24:54.297401063 +0200 @@ -1,0 +2,8 @@ +Wed Oct 20 07:41:28 UTC 2021 - Martin Pluskal <[email protected]> + +- Update to version 1.9+git.20211011: + * new setsockopts + * Add skeletons for a bunch of new syscalls + * protect other children's shm from corruption + +------------------------------------------------------------------- Old: ---- trinity-1.9+git.20210826.obscpio New: ---- trinity-1.9+git.20211011.obscpio ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ trinity.spec ++++++ --- /var/tmp/diff_new_pack.wsEv9H/_old 2021-10-20 20:24:54.785401364 +0200 +++ /var/tmp/diff_new_pack.wsEv9H/_new 2021-10-20 20:24:54.789401367 +0200 @@ -17,7 +17,7 @@ Name: trinity -Version: 1.9+git.20210826 +Version: 1.9+git.20211011 Release: 0 Summary: A Linux System call fuzz tester License: GPL-2.0-only ++++++ _servicedata ++++++ --- /var/tmp/diff_new_pack.wsEv9H/_old 2021-10-20 20:24:54.833401394 +0200 +++ /var/tmp/diff_new_pack.wsEv9H/_new 2021-10-20 20:24:54.837401396 +0200 @@ -1,4 +1,4 @@ <servicedata> <service name="tar_scm"> <param name="url">git://github.com/kernelslacker/trinity</param> - <param name="changesrevision">b1a0aef9978d4a41e7e601c277d4fb1b0cfbed89</param></service></servicedata> \ No newline at end of file + <param name="changesrevision">eadc80ef4e2c4035131d7f8a3771833abedf7f49</param></service></servicedata> \ No newline at end of file ++++++ trinity-1.9+git.20210826.obscpio -> trinity-1.9+git.20211011.obscpio ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/trinity-1.9+git.20210826/Makefile new/trinity-1.9+git.20211011/Makefile --- old/trinity-1.9+git.20210826/Makefile 2021-08-26 17:18:27.000000000 +0200 +++ new/trinity-1.9+git.20211011/Makefile 2021-10-11 21:30:27.000000000 +0200 @@ -1,4 +1,4 @@ -VERSION="2019.06" +VERSION="2021.10" INSTALL_PREFIX ?= $(DESTDIR) INSTALL_PREFIX ?= $(HOME) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/trinity-1.9+git.20210826/child.c new/trinity-1.9+git.20211011/child.c --- old/trinity-1.9+git.20210826/child.c 2021-08-26 17:18:27.000000000 +0200 +++ new/trinity-1.9+git.20211011/child.c 2021-10-11 21:30:27.000000000 +0200 @@ -189,6 +189,14 @@ { pid_t pid = getpid(); char childname[17]; + unsigned int i; + + for_each_child(i) { + if (child->num != i) + mprotect(shm->children[i], sizeof(struct childdata), PROT_READ); + } + + mprotect(pids, max_children * sizeof(int), PROT_READ); /* Wait for parent to set our childno */ while (pids[childno] != pid) { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/trinity-1.9+git.20210826/include/compat.h new/trinity-1.9+git.20211011/include/compat.h --- old/trinity-1.9+git.20210826/include/compat.h 2021-08-26 17:18:27.000000000 +0200 +++ new/trinity-1.9+git.20211011/include/compat.h 2021-10-11 21:30:27.000000000 +0200 @@ -600,6 +600,13 @@ #define SO_BUSY_POLL_BUDGET 70 #endif +#ifndef SO_NETNS_COOKIE +#define SO_NETNS_COOKIE 71 +#endif + +#ifndef SO_BUF_LOCK +#define SO_BUF_LOCK 72 +#endif /* linux/tcp.h */ #ifndef TCP_COOKIE_TRANSACTIONS diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/trinity-1.9+git.20210826/include/syscalls-x86_64.h new/trinity-1.9+git.20211011/include/syscalls-x86_64.h --- old/trinity-1.9+git.20210826/include/syscalls-x86_64.h 2021-08-26 17:18:27.000000000 +0200 +++ new/trinity-1.9+git.20211011/include/syscalls-x86_64.h 2021-10-11 21:30:27.000000000 +0200 @@ -454,4 +454,10 @@ { .entry = &syscall_process_madvise }, { .entry = &syscall_epoll_pwait2 }, { .entry = &syscall_mount_setattr }, + { .entry = &syscall_quotactl_fd }, + { .entry = &syscall_landlock_create_ruleset }, + { .entry = &syscall_landlock_add_rule }, + { .entry = &syscall_landlock_restrict_self }, + { .entry = &syscall_memfd_secret }, + { .entry = &syscall_process_mrelease }, }; diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/trinity-1.9+git.20210826/syscalls/landlock_add_rule.c new/trinity-1.9+git.20211011/syscalls/landlock_add_rule.c --- old/trinity-1.9+git.20210826/syscalls/landlock_add_rule.c 1970-01-01 01:00:00.000000000 +0100 +++ new/trinity-1.9+git.20211011/syscalls/landlock_add_rule.c 2021-10-11 21:30:27.000000000 +0200 @@ -0,0 +1,33 @@ +/* + * SYSCALL_DEFINE4(landlock_add_rule, + * const int, ruleset_fd, const enum landlock_rule_type, rule_type, + * const void __user *const, rule_attr, const __u32, flags) + */ +#include "sanitise.h" + +enum landlock_rule_type { + LANDLOCK_RULE_PATH_BENEATH = 1, +}; + +static unsigned long landlock_ruletypes[] = { + LANDLOCK_RULE_PATH_BENEATH, +}; + +// no flags for now +//static unsigned long landlock_add_rule_flags[] = { +// , +//}; + +struct syscallentry syscall_landlock_add_rule = { + .name = "landlock_add_rule", + .num_args = 4, + .arg1name = "ruleset_fd", + .arg1type = ARG_FD, + .arg2name = "rule_type", + .arg2type = ARG_LIST, + .arg2list = ARGLIST(landlock_ruletypes), + .arg3name = "rule_attr", + .arg4name = "flags", +// .arg4type = ARG_LIST, +// .arg4list = ARGLIST(landlock_add_rule_flags), +}; diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/trinity-1.9+git.20210826/syscalls/landlock_create_ruleset.c new/trinity-1.9+git.20211011/syscalls/landlock_create_ruleset.c --- old/trinity-1.9+git.20210826/syscalls/landlock_create_ruleset.c 1970-01-01 01:00:00.000000000 +0100 +++ new/trinity-1.9+git.20211011/syscalls/landlock_create_ruleset.c 2021-10-11 21:30:27.000000000 +0200 @@ -0,0 +1,23 @@ +/* + * SYSCALL_DEFINE3(landlock_create_ruleset, + * const struct landlock_ruleset_attr __user *const, attr, + * const size_t, size, const __u32, flags) + */ +#include "sanitise.h" + +#define LANDLOCK_CREATE_RULESET_VERSION (1U << 0) + +static unsigned long landlock_create_ruleset_flags[] = { + LANDLOCK_CREATE_RULESET_VERSION, +}; + +struct syscallentry syscall_landlock_create_ruleset = { + .name = "landlock_create_ruleset", + .num_args = 3, + .arg1name = "attr", + .arg2name = "size", + .arg2type = ARG_LEN, + .arg3name = "flags", + .arg3type = ARG_LIST, + .arg3list = ARGLIST(landlock_create_ruleset_flags), +}; diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/trinity-1.9+git.20210826/syscalls/landlock_restrict_self.c new/trinity-1.9+git.20211011/syscalls/landlock_restrict_self.c --- old/trinity-1.9+git.20210826/syscalls/landlock_restrict_self.c 1970-01-01 01:00:00.000000000 +0100 +++ new/trinity-1.9+git.20211011/syscalls/landlock_restrict_self.c 2021-10-11 21:30:27.000000000 +0200 @@ -0,0 +1,19 @@ +/* + * SYSCALL_DEFINE2(landlock_restrict_self, + * const int, ruleset_fd, const __u32, flags) + */ +#include "sanitise.h" + +//static unsigned long landlock_restrict_self_flags[] = { +// , +//}; + +struct syscallentry syscall_landlock_restrict_self = { + .name = "landlock_restrict_self", + .num_args = 2, + .arg1name = "fd", + .arg1type = ARG_FD, + .arg2name = "flags", +// arg2type = ARG_LIST, +// arg2list = ARGLIST(landlock_restrict_self_flags), +}; diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/trinity-1.9+git.20210826/syscalls/memfd_secret.c new/trinity-1.9+git.20211011/syscalls/memfd_secret.c --- old/trinity-1.9+git.20210826/syscalls/memfd_secret.c 1970-01-01 01:00:00.000000000 +0100 +++ new/trinity-1.9+git.20211011/syscalls/memfd_secret.c 2021-10-11 21:30:27.000000000 +0200 @@ -0,0 +1,19 @@ +/* + * SYSCALL_DEFINE1(memfd_secret, unsigned int, flags) + */ + +#include "sanitise.h" +#include "memfd.h" +#include "compat.h" + +static unsigned long memfd_secret_flags[] = { + 0, +}; + +struct syscallentry syscall_memfd_secret = { + .name = "memfd_secret", + .num_args = 1, + .arg1name = "flag", + .arg1type = ARG_LIST, + .arg1list = ARGLIST(memfd_secret_flags), +}; diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/trinity-1.9+git.20210826/syscalls/process_mrelease.c new/trinity-1.9+git.20211011/syscalls/process_mrelease.c --- old/trinity-1.9+git.20210826/syscalls/process_mrelease.c 1970-01-01 01:00:00.000000000 +0100 +++ new/trinity-1.9+git.20211011/syscalls/process_mrelease.c 2021-10-11 21:30:27.000000000 +0200 @@ -0,0 +1,17 @@ +/* + * SYSCALL_DEFINE2(process_mrelease, int, pidfd, unsigned int, flags) + */ +#include "sanitise.h" + +static unsigned long process_mrelease_flags[] = { + 0, // currently no flags defined, mbz +}; + +struct syscallentry syscall_process_mrelease = { + .name = "process_mrelease", + .num_args = 2, + .arg1name = "pidfd", + .arg2name = "flags", + .arg2type = ARG_LIST, + .arg2list = ARGLIST(process_mrelease_flags), +}; diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/trinity-1.9+git.20210826/syscalls/quotactl_fd.c new/trinity-1.9+git.20211011/syscalls/quotactl_fd.c --- old/trinity-1.9+git.20210826/syscalls/quotactl_fd.c 1970-01-01 01:00:00.000000000 +0100 +++ new/trinity-1.9+git.20211011/syscalls/quotactl_fd.c 2021-10-11 21:30:27.000000000 +0200 @@ -0,0 +1,17 @@ +/* + * SYSCALL_DEFINE4(quotactl_fd, unsigned int, fd, unsigned int, cmd, + qid_t, id, void __user *, addr) + */ +#include "sanitise.h" + +struct syscallentry syscall_quotactl_fd = { + .name = "quotactl_fd", + .num_args = 4, + .arg1name = "fd", + .arg1type = ARG_FD, + .arg2name = "cmd", + .arg3name = "id", + .arg4name = "addr", + .arg4type = ARG_ADDRESS, + .group = GROUP_VFS, +}; diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/trinity-1.9+git.20210826/syscalls/setsockopt.c new/trinity-1.9+git.20211011/syscalls/setsockopt.c --- old/trinity-1.9+git.20210826/syscalls/setsockopt.c 2021-08-26 17:18:27.000000000 +0200 +++ new/trinity-1.9+git.20211011/syscalls/setsockopt.c 2021-10-11 21:30:27.000000000 +0200 @@ -29,6 +29,7 @@ SO_TXTIME, SO_BINDTOIFINDEX, SO_TIMESTAMP_NEW, SO_TIMESTAMPNS_NEW, SO_TIMESTAMPING_NEW, SO_RCVTIMEO_NEW, SO_SNDTIMEO_NEW, SO_DETACH_REUSEPORT_BPF, SO_PREFER_BUSY_POLL, SO_BUSY_POLL_BUDGET, + SO_NETNS_COOKIE, SO_BUF_LOCK, }; static void socket_setsockopt(struct sockopt *so, __unused__ struct socket_triplet *triplet) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/trinity-1.9+git.20210826/syscalls/syscalls.h new/trinity-1.9+git.20211011/syscalls/syscalls.h --- old/trinity-1.9+git.20210826/syscalls/syscalls.h 2021-08-26 17:18:27.000000000 +0200 +++ new/trinity-1.9+git.20211011/syscalls/syscalls.h 2021-10-11 21:30:27.000000000 +0200 @@ -407,6 +407,12 @@ extern struct syscallentry syscall_process_madvise; extern struct syscallentry syscall_epoll_pwait2; extern struct syscallentry syscall_mount_setattr; +extern struct syscallentry syscall_quotactl_fd; +extern struct syscallentry syscall_landlock_create_ruleset; +extern struct syscallentry syscall_landlock_add_rule; +extern struct syscallentry syscall_landlock_restrict_self; +extern struct syscallentry syscall_memfd_secret; +extern struct syscallentry syscall_process_mrelease; extern struct syscallentry syscall_runtime_instr; extern struct syscallentry syscall_s390_pci_mmio_write; ++++++ trinity.obsinfo ++++++ --- /var/tmp/diff_new_pack.wsEv9H/_old 2021-10-20 20:24:55.077401545 +0200 +++ /var/tmp/diff_new_pack.wsEv9H/_new 2021-10-20 20:24:55.081401547 +0200 @@ -1,5 +1,5 @@ name: trinity -version: 1.9+git.20210826 -mtime: 1629991107 -commit: b1a0aef9978d4a41e7e601c277d4fb1b0cfbed89 +version: 1.9+git.20211011 +mtime: 1633980627 +commit: eadc80ef4e2c4035131d7f8a3771833abedf7f49
