[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20171221025747.5071-1-daniel@iogearbox.net>
Date: Thu, 21 Dec 2017 03:57:47 +0100
From: Daniel Borkmann <daniel@...earbox.net>
To: davem@...emloft.net
Cc: daniel@...earbox.net, ast@...nel.org, netdev@...r.kernel.org
Subject: pull-request: bpf 2017-12-21
Hi David,
The following pull-request contains BPF updates for your *net* tree.
The main changes are:
1) Fix multiple security issues in the BPF verifier mostly related
to the value and min/max bounds tracking rework in 4.14. Issues
range from incorrect bounds calculation in some BPF_RSH cases,
to improper sign extension and reg size handling on 32 bit
ALU ops, missing strict alignment checks on stack pointers, and
several others that got fixed, from Jann, Alexei and Edward.
2) Fix various build failures in BPF selftests on sparc64. More
specifically, librt needed to be added to the libs to link
against and few format string fixups for sizeof, from David.
3) Fix one last remaining issue from BPF selftest build that was
still occuring on s390x from the asm/bpf_perf_event.h include
which could not find the asm/ptrace.h copy, from Hendrik.
Please consider pulling these changes from:
git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git
Thanks a lot!
----------------------------------------------------------------
The following changes since commit ab14436065c8066c265540312742390d6d07ddd2:
net: phy: xgene: disable clk on error paths (2017-12-18 15:09:42 -0500)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git
for you to fetch changes up to 82abbf8d2fc46d79611ab58daa7c608df14bb3ee:
bpf: do not allow root to mangle valid pointers (2017-12-21 02:26:29 +0100)
----------------------------------------------------------------
Alexei Starovoitov (2):
bpf: fix integer overflows
bpf: do not allow root to mangle valid pointers
Daniel Borkmann (1):
Merge branch 'bpf-verifier-sec-fixes'
David Miller (1):
bpf: Fix tools and testing build.
Edward Cree (1):
bpf/verifier: fix bounds calculation on BPF_RSH
Hendrik Brueckner (1):
bpf: fix broken BPF selftest build on s390
Jann Horn (7):
bpf: fix incorrect sign extension in check_alu_op()
bpf: fix incorrect tracking of register size truncation
bpf: fix 32-bit ALU op verification
bpf: fix missing error return in check_stack_boundary()
bpf: force strict alignment checks for stack pointers
bpf: don't prune branches when a scalar is replaced with a pointer
selftests/bpf: add tests for recent bugfixes
include/linux/bpf_verifier.h | 4 +-
kernel/bpf/verifier.c | 277 +++++-----
tools/arch/s390/include/uapi/asm/bpf_perf_event.h | 2 +-
tools/testing/selftests/bpf/Makefile | 2 +-
tools/testing/selftests/bpf/test_progs.c | 8 +-
tools/testing/selftests/bpf/test_verifier.c | 605 ++++++++++++++++++++--
6 files changed, 730 insertions(+), 168 deletions(-)
Powered by blists - more mailing lists