lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 16 Jan 2020 00:04:37 +0100
From:   Daniel Borkmann <daniel@...earbox.net>
To:     davem@...emloft.net
Cc:     jakub.kicinski@...ronome.com, daniel@...earbox.net, ast@...nel.org,
        netdev@...r.kernel.org, bpf@...r.kernel.org
Subject: pull-request: bpf 2020-01-15

Hi David,

The following pull-request contains BPF updates for your *net* tree.

We've added 12 non-merge commits during the last 9 day(s) which contain
a total of 13 files changed, 95 insertions(+), 43 deletions(-).

The main changes are:

1) Fix refcount leak for TCP time wait and request sockets for socket lookup
   related BPF helpers, from Lorenz Bauer.

2) Fix wrong verification of ARSH instruction under ALU32, from Daniel Borkmann.

3) Batch of several sockmap and related TLS fixes found while operating
   more complex BPF programs with Cilium and OpenSSL, from John Fastabend.

4) Fix sockmap to read psock's ingress_msg queue before regular sk_receive_queue()
   to avoid purging data upon teardown, from Lingpeng Chen.

5) Fix printing incorrect pointer in bpftool's btf_dump_ptr() in order to properly
   dump a BPF map's value with BTF, from Martin KaFai Lau.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git

Thanks a lot!

Also thanks to reporters, reviewers and testers of commits in this pull-request:

Anatoly Trosinenko, Arika Chen, Jakub Sitnicki, Jonathan Lemon, Martin 
KaFai Lau, Quentin Monnet, Song Liu, Yonghong Song

----------------------------------------------------------------

The following changes since commit da29f2d84bd10234df570b7f07cbd0166e738230:

  net: stmmac: Fixed link does not need MDIO Bus (2020-01-07 13:40:29 -0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git 

for you to fetch changes up to 85ddd9c3173102930c16b0cfe8dbb771af434532:

  Merge branch 'bpf-sockmap-tls-fixes' (2020-01-15 23:26:23 +0100)

----------------------------------------------------------------
Daniel Borkmann (2):
      bpf: Fix incorrect verifier simulation of ARSH under ALU32
      Merge branch 'bpf-sockmap-tls-fixes'

John Fastabend (8):
      bpf: Sockmap/tls, during free we may call tcp_bpf_unhash() in loop
      bpf: Sockmap, ensure sock lock held during tear down
      bpf: Sockmap/tls, push write_space updates through ulp updates
      bpf: Sockmap, skmsg helper overestimates push, pull, and pop bounds
      bpf: Sockmap/tls, msg_push_data may leave end mark in place
      bpf: Sockmap/tls, tls_sw can create a plaintext buf > encrypt buf
      bpf: Sockmap/tls, skmsg can have wrapped skmsg that needs extra chaining
      bpf: Sockmap/tls, fix pop data with SK_DROP return code

Lingpeng Chen (1):
      bpf/sockmap: Read psock ingress_msg before sk_receive_queue

Lorenz Bauer (1):
      net: bpf: Don't leak time wait and request sockets

Martin KaFai Lau (1):
      bpftool: Fix printing incorrect pointer in btf_dump_ptr

 include/linux/skmsg.h          | 13 +++++++++----
 include/linux/tnum.h           |  2 +-
 include/net/tcp.h              |  6 ++++--
 kernel/bpf/tnum.c              |  9 +++++++--
 kernel/bpf/verifier.c          | 13 ++++++++++---
 net/core/filter.c              | 20 ++++++++++----------
 net/core/skmsg.c               |  2 ++
 net/core/sock_map.c            |  7 ++++++-
 net/ipv4/tcp_bpf.c             | 17 +++++++----------
 net/ipv4/tcp_ulp.c             |  6 ++++--
 net/tls/tls_main.c             | 10 +++++++---
 net/tls/tls_sw.c               | 31 +++++++++++++++++++++++++++----
 tools/bpf/bpftool/btf_dumper.c |  2 +-
 13 files changed, 95 insertions(+), 43 deletions(-)

Powered by blists - more mailing lists