lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Fri,  4 Nov 2022 01:04:45 +0100
From:   Daniel Borkmann <daniel@...earbox.net>
To:     davem@...emloft.net
Cc:     kuba@...nel.org, pabeni@...hat.com, edumazet@...gle.com,
        daniel@...earbox.net, ast@...nel.org, andrii@...nel.org,
        martin.lau@...ux.dev, netdev@...r.kernel.org, bpf@...r.kernel.org
Subject: pull-request: bpf 2022-11-04

Hi David, hi Jakub, hi Paolo, hi Eric,

The following pull-request contains BPF updates for your *net* tree.

We've added 8 non-merge commits during the last 3 day(s) which contain
a total of 10 files changed, 113 insertions(+), 16 deletions(-).

The main changes are:

1) Fix memory leak upon allocation failure in BPF verifier's stack state
   tracking, from Kees Cook.

2) Fix address leakage when BPF progs release reference to an object, from Youlin Li.

3) Fix BPF CI breakage from buggy in.h uapi header dependency, from Andrii Nakryiko.

4) Fix bpftool pin sub-command's argument parsing, from Pu Lehui.

5) Fix BPF sockmap lockdep warning by cancelling psock work outside of socket
   lock, from Cong Wang.

6) Follow-up for BPF sockmap to fix sk_forward_alloc accounting, from Wang Yufen.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git tags/for-netdev

Thanks a lot!

Also thanks to reporters, reviewers and testers of commits in this pull-request:

Bill Wendling, Jakub Sitnicki, John Fastabend, Kees Cook, Quentin 
Monnet, Stanislav Fomichev, Zhengchao Shao

----------------------------------------------------------------

The following changes since commit 363a5328f4b0517e59572118ccfb7c626d81dca9:

  net: tun: fix bugs for oversize packet when napi frags enabled (2022-10-31 20:04:55 -0700)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git tags/for-netdev

for you to fetch changes up to 475244f5e06beeda7b557d9dde46a5f439bf3379:

  selftests/bpf: Add verifier test for release_reference() (2022-11-04 00:24:29 +0100)

----------------------------------------------------------------
bpf-for-netdev

----------------------------------------------------------------
Andrii Nakryiko (2):
      net/ipv4: Fix linux/in.h header dependencies
      tools/headers: Pull in stddef.h to uapi to fix BPF selftests build in CI

Cong Wang (1):
      bpf, sock_map: Move cancel_work_sync() out of sock lock

Kees Cook (1):
      bpf, verifier: Fix memory leak in array reallocation for stack state

Pu Lehui (1):
      bpftool: Fix NULL pointer dereference when pin {PROG, MAP, LINK} without FILE

Wang Yufen (1):
      bpf, sockmap: Fix the sk->sk_forward_alloc warning of sk_stream_kill_queues

Youlin Li (2):
      bpf: Fix wrong reg type conversion in release_reference()
      selftests/bpf: Add verifier test for release_reference()

 include/linux/skmsg.h                              |  2 +-
 include/uapi/linux/in.h                            |  1 +
 kernel/bpf/verifier.c                              | 17 ++++++--
 net/core/skmsg.c                                   |  7 +---
 net/core/sock_map.c                                |  7 ++--
 net/ipv4/tcp_bpf.c                                 |  8 ++--
 tools/bpf/bpftool/common.c                         |  3 ++
 tools/include/uapi/linux/in.h                      |  1 +
 tools/include/uapi/linux/stddef.h                  | 47 ++++++++++++++++++++++
 .../testing/selftests/bpf/verifier/ref_tracking.c  | 36 +++++++++++++++++
 10 files changed, 113 insertions(+), 16 deletions(-)
 create mode 100644 tools/include/uapi/linux/stddef.h

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ