lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon,  2 Oct 2023 13:34:17 +0200
From: Daniel Borkmann <daniel@...earbox.net>
To: davem@...emloft.net
Cc: kuba@...nel.org,
	pabeni@...hat.com,
	edumazet@...gle.com,
	daniel@...earbox.net,
	ast@...nel.org,
	andrii@...nel.org,
	martin.lau@...ux.dev,
	netdev@...r.kernel.org,
	bpf@...r.kernel.org
Subject: pull-request: bpf 2023-10-02

Hi David, hi Jakub, hi Paolo, hi Eric,

The following pull-request contains BPF updates for your *net* tree.

We've added 11 non-merge commits during the last 12 day(s) which contain
a total of 12 files changed, 176 insertions(+), 41 deletions(-).

The main changes are:

1) Fix BPF verifier to reset backtrack_state masks on global function exit as
   otherwise subsequent precision tracking would reuse them, from Andrii Nakryiko.

2) Several sockmap fixes for available bytes accounting, from John Fastabend.

3) Reject sk_msg egress redirects to non-TCP sockets given this is only
   supported for TCP sockets today, from Jakub Sitnicki.

4) Fix a syzkaller splat in bpf_mprog when hitting maximum program limits with
   BPF_F_BEFORE directive, from Daniel Borkmann and Nikolay Aleksandrov.

5) Fix BPF memory allocator to use kmalloc_size_roundup() to adjust
   size_index for selecting a bpf_mem_cache, from Hou Tao.

6) Fix arch_prepare_bpf_trampoline return code for s390 JIT, from Song Liu.

7) Fix bpf_trampoline_get when CONFIG_BPF_JIT is turned off, from Leon Hwang.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git tags/for-netdev

Thanks a lot!

Also thanks to reporters, reviewers and testers of commits in this pull-request:

Chris Mason, Dan Carpenter, Emil Renner Berthing, Ilya Leoshkevich, 
Jakub Sitnicki, John Fastabend, kernel test robot, Nathan Chancellor

----------------------------------------------------------------

The following changes since commit 8070274b472e2e9f5f67a990f5e697634c415708:

  net: stmmac: fix incorrect rxq|txq_stats reference (2023-09-19 10:21:15 +0200)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git tags/for-netdev

for you to fetch changes up to 9077fc228f09c9f975c498c55f5d2e882cd0da59:

  bpf: Use kmalloc_size_roundup() to adjust size_index (2023-09-30 09:39:28 -0700)

----------------------------------------------------------------
bpf-for-netdev

----------------------------------------------------------------
Alexei Starovoitov (1):
      Merge branch 's390-bpf-fix-arch_prepare_bpf_trampoline'

Andrii Nakryiko (1):
      bpf: unconditionally reset backtrack_state masks on global func exit

Daniel Borkmann (2):
      bpf, mprog: Fix maximum program check on mprog attachment
      selftest/bpf: Add various selftests for program limits

Hou Tao (1):
      bpf: Use kmalloc_size_roundup() to adjust size_index

Jakub Sitnicki (1):
      bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets

John Fastabend (3):
      bpf: tcp_read_skb needs to pop skb regardless of seq
      bpf, sockmap: Do not inc copied_seq when PEEK flag set
      bpf, sockmap: Add tests for MSG_F_PEEK

Leon Hwang (1):
      bpf: Fix tr dereferencing

Song Liu (2):
      s390/bpf: Let arch_prepare_bpf_trampoline return program size
      selftests/bpf: Check bpf_cubic_acked() is called via struct_ops

 arch/s390/net/bpf_jit_comp.c                       |  2 +-
 include/linux/bpf.h                                |  2 +-
 kernel/bpf/memalloc.c                              | 44 +++++-------
 kernel/bpf/mprog.c                                 |  3 +
 kernel/bpf/verifier.c                              |  8 +--
 net/core/sock_map.c                                |  4 ++
 net/ipv4/tcp.c                                     | 10 +--
 net/ipv4/tcp_bpf.c                                 |  4 +-
 .../testing/selftests/bpf/prog_tests/bpf_tcp_ca.c  |  2 +
 .../selftests/bpf/prog_tests/sockmap_basic.c       | 51 +++++++++++++
 tools/testing/selftests/bpf/prog_tests/tc_opts.c   | 84 ++++++++++++++++++++++
 tools/testing/selftests/bpf/progs/bpf_cubic.c      |  3 +
 12 files changed, 176 insertions(+), 41 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ