lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20230515225603.27027-1-daniel@iogearbox.net>
Date: Tue, 16 May 2023 00:56:03 +0200
From: Daniel Borkmann <daniel@...earbox.net>
To: davem@...emloft.net
Cc: kuba@...nel.org,
	pabeni@...hat.com,
	edumazet@...gle.com,
	daniel@...earbox.net,
	ast@...nel.org,
	andrii@...nel.org,
	martin.lau@...ux.dev,
	netdev@...r.kernel.org,
	bpf@...r.kernel.org
Subject: pull-request: bpf-next 2023-05-16

Hi David, hi Jakub, hi Paolo, hi Eric,

The following pull-request contains BPF updates for your *net-next* tree.

We've added 57 non-merge commits during the last 19 day(s) which contain
a total of 63 files changed, 3293 insertions(+), 690 deletions(-).

The main changes are:

1) Add precision propagation to verifier for subprogs and callbacks, from Andrii Nakryiko.

2) Improve BPF's {g,s}setsockopt() handling with wrong option lengths, from Stanislav Fomichev.

3) Utilize pahole v1.25 for the kernel's BTF generation to filter out inconsistent
   function prototypes, from Alan Maguire.

4) Various dyn-pointer verifier improvements to relax restrictions, from Daniel Rosenberg.

5) Add a new bpf_task_under_cgroup() kfunc for designated task, from Feng Zhou.

6) Unblock tests for arm64 BPF CI after ftrace supporting direct call, from Florent Revest.

7) Add XDP hint kfunc metadata for RX hash/timestamp for igc, from Jesper Dangaard Brouer.

8) Add several new dyn-pointer kfuncs to ease their usability, from Joanne Koong.

9) Add in-depth LRU internals description and dot function graph, from Joe Stringer.

10) Fix KCSAN report on bpf_lru_list when accessing node->ref, from Martin KaFai Lau.

11) Only dump unprivileged_bpf_disabled log warning upon write, from Kui-Feng Lee.

12) Extend test_progs to directly passing allow/denylist file, from Stephen Veiss.

13) Fix BPF trampoline memleak upon failure attaching to fentry, from Yafang Shao.

14) Fix emitting struct bpf_tcp_sock type in vmlinux BTF, from Yonghong Song.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git tags/for-netdev

Thanks a lot!

Also thanks to reporters, reviewers and testers of commits in this pull-request:

Alexei Starovoitov, Andrii Nakryiko, Bagas Sanjaya, Jiri Olsa, John 
Fastabend, Lennart Poettering, Magnus Karlsson, Manu Bretelle, Nicky 
Veitch, Quentin Monnet, Song Liu, Song Yoong Siang, Stanislav Fomichev, 
Xuan Zhuo, Xu Kuohai, Yonghong Song

----------------------------------------------------------------

The following changes since commit 6e98b09da931a00bf4e0477d0fa52748bf28fcce:

  Merge tag 'net-next-6.4' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next (2023-04-26 16:07:23 -0700)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git tags/for-netdev

for you to fetch changes up to 108598c39eefbedc9882273ac0df96127a629220:

  bpf: Fix memleak due to fentry attach failure (2023-05-15 23:41:59 +0200)

----------------------------------------------------------------
bpf-next-for-netdev

----------------------------------------------------------------
Alan Maguire (2):
      bpf: Add --skip_encoding_btf_inconsistent_proto, --btf_gen_optimized to pahole flags for v1.25
      bpftool: JIT limited misreported as negative value on aarch64

Alexei Starovoitov (3):
      Merge branch 'Add precision propagation for subprogs and callbacks'
      Merge branch 'Introduce a new kfunc of bpf_task_under_cgroup'
      Merge branch 'Dynptr Verifier Adjustments'

Andrii Nakryiko (13):
      Merge branch 'selftests/bpf: test_progs can read test lists from file'
      veristat: add -t flag for adding BPF_F_TEST_STATE_FREQ program flag
      bpf: mark relevant stack slots scratched for register read instructions
      bpf: encapsulate precision backtracking bookkeeping
      bpf: improve precision backtrack logging
      bpf: maintain bitmasks across all active frames in __mark_chain_precision
      bpf: fix propagate_precision() logic for inner frames
      bpf: fix mark_all_scalars_precise use in mark_chain_precision
      bpf: support precision propagation in the presence of subprogs
      selftests/bpf: add precision propagation tests in the presence of subprogs
      selftests/bpf: revert iter test subprog precision workaround
      libbpf: fix offsetof() and container_of() to work with CO-RE
      bpf: fix calculation of subseq_idx during precision backtracking

Daniel Borkmann (1):
      selftests/bpf: Add test case to assert precise scalar path pruning

Daniel Rosenberg (5):
      bpf: Allow NULL buffers in bpf_dynptr_slice(_rw)
      selftests/bpf: Test allowing NULL buffer in dynptr slice
      selftests/bpf: Check overflow in optional buffer
      bpf: verifier: Accept dynptr mem as mem in helpers
      selftests/bpf: Accept mem from dynptr in helper funcs

Dave Marchevsky (1):
      bpf: Remove anonymous union in bpf_kfunc_call_arg_meta

Feng Zhou (2):
      bpf: Add bpf_task_under_cgroup() kfunc
      selftests/bpf: Add testcase for bpf_task_under_cgroup

Florent Revest (2):
      selftests/bpf: Update the aarch64 tests deny list
      bpf, arm64: Support struct arguments in the BPF trampoline

Jesper Dangaard Brouer (5):
      igc: Enable and fix RX hash usage by netstack
      igc: Add igc_xdp_buff wrapper for xdp_buff in driver
      igc: Add XDP hints kfuncs for RX hash
      igc: Add XDP hints kfuncs for RX timestamp
      selftests/bpf: xdp_hw_metadata track more timestamps

Joanne Koong (5):
      bpf: Add bpf_dynptr_adjust
      bpf: Add bpf_dynptr_is_null and bpf_dynptr_is_rdonly
      bpf: Add bpf_dynptr_size
      bpf: Add bpf_dynptr_clone
      selftests/bpf: Add tests for dynptr convenience helpers

Joe Stringer (2):
      docs/bpf: Add table to describe LRU properties
      docs/bpf: Add LRU internals description and graph

Kal Conley (1):
      xsk: Use pool->dma_pages to check for DMA

Kenjiro Nakayama (1):
      libbpf: Fix comment about arc and riscv arch in bpf_tracing.h

Kui-Feng Lee (2):
      bpftool: Show map IDs along with struct_ops links.
      bpf: Print a warning only if writing to unprivileged_bpf_disabled.

Martin KaFai Lau (4):
      selftests/bpf: Add fexit_sleep to DENYLIST.aarch64
      libbpf: btf_dump_type_data_check_overflow needs to consider BTF_MEMBER_BITFIELD_SIZE
      bpf: Address KCSAN report on bpf_lru_list
      Merge branch 'bpf: Don't EFAULT for {g,s}setsockopt with wrong optlen'

Pengcheng Yang (1):
      samples/bpf: Fix buffer overflow in tcp_basertt

Stanislav Fomichev (4):
      bpf: Don't EFAULT for {g,s}setsockopt with wrong optlen
      selftests/bpf: Update EFAULT {g,s}etsockopt selftests
      selftests/bpf: Correctly handle optlen > 4096
      bpf: Document EFAULT changes for sockopt

Stephen Veiss (2):
      selftests/bpf: Extract insert_test from parse_test_list
      selftests/bpf: Test_progs can read test lists from file

Will Hawkins (1):
      bpf, docs: Update llvm_relocs.rst with typo fixes

Xueming Feng (1):
      bpftool: Dump map id instead of value for map_of_maps types

Yafang Shao (2):
      bpf: Remove bpf trampoline selector
      bpf: Fix memleak due to fentry attach failure

Yonghong Song (2):
      selftests/bpf: Fix selftest test_global_funcs/global_func1 failure with latest clang
      bpf: Emit struct bpf_tcp_sock type in vmlinux BTF

 Documentation/bpf/kfuncs.rst                       |  23 +-
 Documentation/bpf/llvm_reloc.rst                   |  18 +-
 Documentation/bpf/map_hash.rst                     |  53 +-
 Documentation/bpf/map_lru_hash_update.dot          | 172 +++++
 Documentation/bpf/prog_cgroup_sockopt.rst          |  57 +-
 arch/arm64/net/bpf_jit_comp.c                      |  55 +-
 drivers/net/ethernet/intel/igc/igc.h               |  35 +
 drivers/net/ethernet/intel/igc/igc_main.c          | 116 ++-
 include/linux/bpf.h                                |   3 +-
 include/linux/bpf_verifier.h                       |  27 +-
 include/linux/skbuff.h                             |   2 +-
 include/net/xsk_buff_pool.h                        |   2 +-
 kernel/bpf/bpf_lru_list.c                          |  21 +-
 kernel/bpf/bpf_lru_list.h                          |   7 +-
 kernel/bpf/cgroup.c                                |  15 +
 kernel/bpf/helpers.c                               | 123 +++-
 kernel/bpf/syscall.c                               |   3 +-
 kernel/bpf/trampoline.c                            |  32 +-
 kernel/bpf/verifier.c                              | 787 ++++++++++++++++-----
 kernel/trace/bpf_trace.c                           |   4 +-
 net/core/filter.c                                  |   2 +
 net/xdp/xsk_buff_pool.c                            |   7 +-
 samples/bpf/tcp_basertt_kern.c                     |   2 +-
 scripts/pahole-flags.sh                            |   3 +
 tools/bpf/bpftool/feature.c                        |  24 +-
 tools/bpf/bpftool/link.c                           |  10 +-
 tools/bpf/bpftool/map.c                            |  12 +-
 tools/lib/bpf/bpf_helpers.h                        |  15 +-
 tools/lib/bpf/bpf_tracing.h                        |   3 +-
 tools/lib/bpf/btf_dump.c                           |  22 +-
 tools/testing/selftests/bpf/DENYLIST.aarch64       |  83 +--
 tools/testing/selftests/bpf/DENYLIST.s390x         |   1 +
 tools/testing/selftests/bpf/bpf_kfuncs.h           |   6 +
 .../testing/selftests/bpf/prog_tests/arg_parsing.c |  68 ++
 .../bpf/prog_tests/cgroup_getset_retval.c          |  20 +
 tools/testing/selftests/bpf/prog_tests/dynptr.c    |   8 +
 tools/testing/selftests/bpf/prog_tests/sockopt.c   |  96 ++-
 .../selftests/bpf/prog_tests/sockopt_inherit.c     |  59 +-
 .../selftests/bpf/prog_tests/sockopt_multi.c       | 108 +--
 .../selftests/bpf/prog_tests/sockopt_qos_to_cc.c   |   2 +
 .../selftests/bpf/prog_tests/task_under_cgroup.c   |  53 ++
 tools/testing/selftests/bpf/prog_tests/verifier.c  |   2 +
 tools/testing/selftests/bpf/progs/bpf_misc.h       |   4 +
 .../bpf/progs/cgroup_getset_retval_getsockopt.c    |  13 +
 .../bpf/progs/cgroup_getset_retval_setsockopt.c    |  17 +
 tools/testing/selftests/bpf/progs/dynptr_fail.c    | 307 ++++++++
 tools/testing/selftests/bpf/progs/dynptr_success.c | 336 +++++++++
 tools/testing/selftests/bpf/progs/iters.c          |  26 +-
 .../testing/selftests/bpf/progs/sockopt_inherit.c  |  18 +-
 tools/testing/selftests/bpf/progs/sockopt_multi.c  |  26 +-
 .../selftests/bpf/progs/sockopt_qos_to_cc.c        |  10 +-
 tools/testing/selftests/bpf/progs/sockopt_sk.c     |  25 +-
 .../selftests/bpf/progs/test_global_func1.c        |   2 +
 .../selftests/bpf/progs/test_task_under_cgroup.c   |  51 ++
 .../bpf/progs/verifier_subprog_precision.c         | 536 ++++++++++++++
 .../testing/selftests/bpf/progs/xdp_hw_metadata.c  |   4 +-
 tools/testing/selftests/bpf/test_progs.c           |  37 +-
 tools/testing/selftests/bpf/testing_helpers.c      | 207 ++++--
 tools/testing/selftests/bpf/testing_helpers.h      |   3 +
 tools/testing/selftests/bpf/verifier/precise.c     | 143 ++--
 tools/testing/selftests/bpf/veristat.c             |   9 +
 tools/testing/selftests/bpf/xdp_hw_metadata.c      |  47 +-
 tools/testing/selftests/bpf/xdp_metadata.h         |   1 +
 63 files changed, 3293 insertions(+), 690 deletions(-)
 create mode 100644 Documentation/bpf/map_lru_hash_update.dot
 create mode 100644 tools/testing/selftests/bpf/prog_tests/task_under_cgroup.c
 create mode 100644 tools/testing/selftests/bpf/progs/test_task_under_cgroup.c
 create mode 100644 tools/testing/selftests/bpf/progs/verifier_subprog_precision.c

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ