lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20200115230437.25033-1-daniel@iogearbox.net> Date: Thu, 16 Jan 2020 00:04:37 +0100 From: Daniel Borkmann <daniel@...earbox.net> To: davem@...emloft.net Cc: jakub.kicinski@...ronome.com, daniel@...earbox.net, ast@...nel.org, netdev@...r.kernel.org, bpf@...r.kernel.org Subject: pull-request: bpf 2020-01-15 Hi David, The following pull-request contains BPF updates for your *net* tree. We've added 12 non-merge commits during the last 9 day(s) which contain a total of 13 files changed, 95 insertions(+), 43 deletions(-). The main changes are: 1) Fix refcount leak for TCP time wait and request sockets for socket lookup related BPF helpers, from Lorenz Bauer. 2) Fix wrong verification of ARSH instruction under ALU32, from Daniel Borkmann. 3) Batch of several sockmap and related TLS fixes found while operating more complex BPF programs with Cilium and OpenSSL, from John Fastabend. 4) Fix sockmap to read psock's ingress_msg queue before regular sk_receive_queue() to avoid purging data upon teardown, from Lingpeng Chen. 5) Fix printing incorrect pointer in bpftool's btf_dump_ptr() in order to properly dump a BPF map's value with BTF, from Martin KaFai Lau. Please consider pulling these changes from: git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git Thanks a lot! Also thanks to reporters, reviewers and testers of commits in this pull-request: Anatoly Trosinenko, Arika Chen, Jakub Sitnicki, Jonathan Lemon, Martin KaFai Lau, Quentin Monnet, Song Liu, Yonghong Song ---------------------------------------------------------------- The following changes since commit da29f2d84bd10234df570b7f07cbd0166e738230: net: stmmac: Fixed link does not need MDIO Bus (2020-01-07 13:40:29 -0800) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git for you to fetch changes up to 85ddd9c3173102930c16b0cfe8dbb771af434532: Merge branch 'bpf-sockmap-tls-fixes' (2020-01-15 23:26:23 +0100) ---------------------------------------------------------------- Daniel Borkmann (2): bpf: Fix incorrect verifier simulation of ARSH under ALU32 Merge branch 'bpf-sockmap-tls-fixes' John Fastabend (8): bpf: Sockmap/tls, during free we may call tcp_bpf_unhash() in loop bpf: Sockmap, ensure sock lock held during tear down bpf: Sockmap/tls, push write_space updates through ulp updates bpf: Sockmap, skmsg helper overestimates push, pull, and pop bounds bpf: Sockmap/tls, msg_push_data may leave end mark in place bpf: Sockmap/tls, tls_sw can create a plaintext buf > encrypt buf bpf: Sockmap/tls, skmsg can have wrapped skmsg that needs extra chaining bpf: Sockmap/tls, fix pop data with SK_DROP return code Lingpeng Chen (1): bpf/sockmap: Read psock ingress_msg before sk_receive_queue Lorenz Bauer (1): net: bpf: Don't leak time wait and request sockets Martin KaFai Lau (1): bpftool: Fix printing incorrect pointer in btf_dump_ptr include/linux/skmsg.h | 13 +++++++++---- include/linux/tnum.h | 2 +- include/net/tcp.h | 6 ++++-- kernel/bpf/tnum.c | 9 +++++++-- kernel/bpf/verifier.c | 13 ++++++++++--- net/core/filter.c | 20 ++++++++++---------- net/core/skmsg.c | 2 ++ net/core/sock_map.c | 7 ++++++- net/ipv4/tcp_bpf.c | 17 +++++++---------- net/ipv4/tcp_ulp.c | 6 ++++-- net/tls/tls_main.c | 10 +++++++--- net/tls/tls_sw.c | 31 +++++++++++++++++++++++++++---- tools/bpf/bpftool/btf_dumper.c | 2 +- 13 files changed, 95 insertions(+), 43 deletions(-)
Powered by blists - more mailing lists