lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20220825230033.3051-1-daniel@iogearbox.net>
Date:   Fri, 26 Aug 2022 01:00:33 +0200
From:   Daniel Borkmann <daniel@...earbox.net>
To:     davem@...emloft.net
Cc:     kuba@...nel.org, pabeni@...hat.com, edumazet@...gle.com,
        daniel@...earbox.net, ast@...nel.org, andrii@...nel.org,
        netdev@...r.kernel.org, bpf@...r.kernel.org
Subject: pull-request: bpf 2022-08-26

Hi David, hi Jakub, hi Paolo, hi Eric,

The following pull-request contains BPF updates for your *net* tree.

We've added 11 non-merge commits during the last 14 day(s) which contain
a total of 13 files changed, 61 insertions(+), 24 deletions(-).

The main changes are:

1) Fix BPF verifier's precision tracking around BPF ring buffer, from Kumar Kartikeya Dwivedi.

2) Fix regression in tunnel key infra when passing FLOWI_FLAG_ANYSRC, from Eyal Birger.

3) Fix insufficient permissions for bpf_sys_bpf() helper, from YiFei Zhu.

4) Fix splat from hitting BUG when purging effective cgroup programs, from Pu Lehui.

5) Fix range tracking for array poke descriptors, from Daniel Borkmann.

6) Fix corrupted packets for XDP_SHARED_UMEM in aligned mode, from Magnus Karlsson.

7) Fix NULL pointer splat in BPF sockmap sk_msg_recvmsg(), from Liu Jian.

8) Add READ_ONCE() to bpf_jit_limit when reading from sysctl, from Kuniyuki Iwashima.

9) Add BPF selftest lru_bug check to s390x deny list, from Daniel Müller.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git

Thanks a lot!

Also thanks to reporters, reviewers and testers of commits in this pull-request:

Alasdair McWilliam, Alexei Starovoitov, Andrii Nakryiko, Dave 
Marchevsky, Hsin-Wei Hung, Intrusion Shield Team, Jakub Sitnicki, John 
Fastabend, Maciej Fijalkowski, Mykola Lysenko, Paul Chaignon

----------------------------------------------------------------

The following changes since commit 40b4ac880e21d917da7f3752332fa57564a4c202:

  net: lan966x: fix checking for return value of platform_get_irq_byname() (2022-08-12 11:29:46 +0100)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git 

for you to fetch changes up to a657182a5c5150cdfacb6640aad1d2712571a409:

  bpf: Don't use tnum_range on array range checking for poke descriptors (2022-08-25 14:58:30 -0700)

----------------------------------------------------------------
Alexei Starovoitov (1):
      Merge branch 'Fix incorrect pruning for ARG_CONST_ALLOC_SIZE_OR_ZERO'

Daniel Borkmann (2):
      bpf: Partially revert flexible-array member replacement
      bpf: Don't use tnum_range on array range checking for poke descriptors

Daniel Müller (1):
      selftests/bpf: Add lru_bug to s390x deny list

Eyal Birger (1):
      ip_tunnel: Respect tunnel key's "flow_flags" in IP tunnels

Kumar Kartikeya Dwivedi (2):
      bpf: Do mark_chain_precision for ARG_CONST_ALLOC_SIZE_OR_ZERO
      selftests/bpf: Add regression test for pruning fix

Kuniyuki Iwashima (1):
      bpf: Fix a data-race around bpf_jit_limit.

Liu Jian (1):
      skmsg: Fix wrong last sg check in sk_msg_recvmsg()

Magnus Karlsson (1):
      xsk: Fix corrupted packets for XDP_SHARED_UMEM

Pu Lehui (1):
      bpf, cgroup: Fix kernel BUG in purge_effective_progs

YiFei Zhu (1):
      bpf: Restrict bpf_sys_bpf to CAP_PERFMON

 .../net/ethernet/mellanox/mlxsw/spectrum_span.c    |  3 ++-
 include/net/ip_tunnels.h                           |  4 +++-
 include/uapi/linux/bpf.h                           |  2 +-
 kernel/bpf/cgroup.c                                |  4 +++-
 kernel/bpf/core.c                                  |  2 +-
 kernel/bpf/syscall.c                               |  2 +-
 kernel/bpf/verifier.c                              | 13 +++++------
 net/core/skmsg.c                                   |  4 ++--
 net/ipv4/ip_gre.c                                  |  2 +-
 net/ipv4/ip_tunnel.c                               |  7 +++---
 net/xdp/xsk_buff_pool.c                            | 16 ++++++++------
 tools/testing/selftests/bpf/DENYLIST.s390x         |  1 +
 tools/testing/selftests/bpf/verifier/precise.c     | 25 ++++++++++++++++++++++
 13 files changed, 61 insertions(+), 24 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ