lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 15 Nov 2023 13:49:49 -0800
From: Alexei Starovoitov <alexei.starovoitov@...il.com>
To: davem@...emloft.net
Cc: kuba@...nel.org,
	edumazet@...gle.com,
	pabeni@...hat.com,
	daniel@...earbox.net,
	andrii@...nel.org,
	netdev@...r.kernel.org,
	bpf@...r.kernel.org,
	kernel-team@...com
Subject: pull-request: bpf 2023-11-15

Hi David, hi Jakub, hi Paolo, hi Eric,

The following pull-request contains BPF updates for your *net* tree.

We've added 7 non-merge commits during the last 6 day(s) which contain
a total of 9 files changed, 200 insertions(+), 49 deletions(-).

The main changes are:

1) Do not allocate bpf specific percpu memory unconditionally, from Yonghong.

2) Fix precision backtracking instruction iteration, from Andrii.

3) Fix control flow graph checking, from Andrii.

4) Fix xskxceiver selftest build, from Anders.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git 

Thanks a lot!

Also thanks to reporters, reviewers and testers of commits in this pull-request:

Eduard Zingerman, Hao Sun, Hou Tao

----------------------------------------------------------------

The following changes since commit 89cdf9d556016a54ff6ddd62324aa5ec790c05cc:

  Merge tag 'net-6.7-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net (2023-11-09 17:09:35 -0800)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git 

for you to fetch changes up to 1fda5bb66ad8fb24ecb3858e61a13a6548428898:

  bpf: Do not allocate percpu memory at init stage (2023-11-15 07:51:06 -0800)

----------------------------------------------------------------
Alexei Starovoitov (1):
      Merge branch 'bpf-control-flow-graph-and-precision-backtrack-fixes'

Anders Roxell (1):
      selftests: bpf: xskxceiver: ksft_print_msg: fix format type error

Andrii Nakryiko (5):
      bpf: handle ldimm64 properly in check_cfg()
      bpf: fix precision backtracking instruction iteration
      selftests/bpf: add edge case backtracking logic test
      bpf: fix control-flow graph checking in privileged mode
      selftests/bpf: add more test cases for check_cfg()

Yonghong Song (1):
      bpf: Do not allocate percpu memory at init stage

 include/linux/bpf.h                                | 10 ++-
 kernel/bpf/core.c                                  |  8 +-
 kernel/bpf/verifier.c                              | 87 ++++++++++++++++------
 tools/testing/selftests/bpf/progs/verifier_cfg.c   | 62 +++++++++++++++
 .../testing/selftests/bpf/progs/verifier_loops1.c  |  9 ++-
 .../selftests/bpf/progs/verifier_precision.c       | 40 ++++++++++
 tools/testing/selftests/bpf/verifier/calls.c       |  6 +-
 tools/testing/selftests/bpf/verifier/ld_imm64.c    |  8 +-
 tools/testing/selftests/bpf/xskxceiver.c           | 19 +++--
 9 files changed, 200 insertions(+), 49 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ