lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 16 Dec 2022 18:45:40 +0100
From:   Daniel Borkmann <daniel@...earbox.net>
To:     davem@...emloft.net
Cc:     kuba@...nel.org, pabeni@...hat.com, edumazet@...gle.com,
        daniel@...earbox.net, ast@...nel.org, andrii@...nel.org,
        martin.lau@...ux.dev, netdev@...r.kernel.org, bpf@...r.kernel.org
Subject: pull-request: bpf 2022-12-16

Hi David, hi Jakub, hi Paolo, hi Eric,

The following pull-request contains BPF updates for your *net* tree.

We've added 7 non-merge commits during the last 2 day(s) which contain
a total of 9 files changed, 119 insertions(+), 36 deletions(-).

The main changes are:

1) Fix for recent syzkaller XDP dispatcher update splat, from Jiri Olsa.

2) Fix BPF program refcount leak in LSM attachment failure path, from Milan Landaverde.

3) Fix BPF program type in map compatibility check for fext, from Toke Høiland-Jørgensen.

4) Fix a BPF selftest compilation error under !CONFIG_SMP config, from Yonghong Song.

5) Fix CI to enable CONFIG_FUNCTION_ERROR_INJECTION after it got changed to a prompt, from Song Liu.

6) Various BPF documentation fixes for socket local storage, from Donald Hunter.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git tags/for-netdev

Thanks a lot!

Also thanks to reporters, reviewers and testers of commits in this pull-request:

Andrii Nakryiko, Daniel Müller, David Vernet, Hao Sun, kernel test 
robot, Martin KaFai Lau, Paul E. McKenney, Stanislav Fomichev, Yonghong 
Song

----------------------------------------------------------------

The following changes since commit 7ae9888d6e1ce4062d27367a28e46a26270a3e52:

  Merge git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf (2022-12-13 19:32:53 -0800)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git tags/for-netdev

for you to fetch changes up to f506439ec3dee11e0e77b0a1f3fb3eec22c97873:

  selftests/bpf: Add a test for using a cpumap from an freplace-to-XDP program (2022-12-14 21:30:40 -0800)

----------------------------------------------------------------
bpf-for-netdev

----------------------------------------------------------------
Donald Hunter (1):
      docs/bpf: Reword docs for BPF_MAP_TYPE_SK_STORAGE

Jiri Olsa (1):
      bpf: Synchronize dispatcher update with bpf_dispatcher_xdp_func

Milan Landaverde (1):
      bpf: prevent leak of lsm program after failed attach

Song Liu (1):
      selftests/bpf: Select CONFIG_FUNCTION_ERROR_INJECTION

Toke Høiland-Jørgensen (2):
      bpf: Resolve fext program type when checking map compatibility
      selftests/bpf: Add a test for using a cpumap from an freplace-to-XDP program

Yonghong Song (1):
      selftests/bpf: Fix a selftest compilation error with CONFIG_SMP=n

 Documentation/bpf/map_sk_storage.rst               | 56 ++++++++++++----------
 kernel/bpf/core.c                                  |  5 +-
 kernel/bpf/dispatcher.c                            |  5 ++
 kernel/bpf/syscall.c                               |  6 +--
 tools/testing/selftests/bpf/config                 |  1 +
 .../selftests/bpf/prog_tests/fexit_bpf2bpf.c       | 48 +++++++++++++++++++
 .../testing/selftests/bpf/progs/freplace_progmap.c | 24 ++++++++++
 tools/testing/selftests/bpf/progs/rcu_read_lock.c  |  8 ++--
 .../selftests/bpf/progs/task_kfunc_failure.c       |  2 +-
 9 files changed, 119 insertions(+), 36 deletions(-)
 create mode 100644 tools/testing/selftests/bpf/progs/freplace_progmap.c

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ