lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20231010223610.3984-1-daniel@iogearbox.net>
Date: Wed, 11 Oct 2023 00:36:10 +0200
From: Daniel Borkmann <daniel@...earbox.net>
To: davem@...emloft.net
Cc: kuba@...nel.org,
	pabeni@...hat.com,
	edumazet@...gle.com,
	daniel@...earbox.net,
	ast@...nel.org,
	andrii@...nel.org,
	martin.lau@...ux.dev,
	netdev@...r.kernel.org,
	bpf@...r.kernel.org
Subject: pull-request: bpf 2023-10-11

Hi David, hi Jakub, hi Paolo, hi Eric,

The following pull-request contains BPF updates for your *net* tree.

We've added 14 non-merge commits during the last 5 day(s) which contain
a total of 12 files changed, 398 insertions(+), 104 deletions(-).

The main changes are:

1) Fix s390 JIT backchain issues in the trampoline code generation which
   previously clobbered the caller's backchain, from Ilya Leoshkevich.

2) Fix zero-size allocation warning in xsk sockets when the configured ring
   size was close to SIZE_MAX, from Andrew Kanner.

3) Fixes for bpf_mprog API that were found when implementing support in the
   ebpf-go library along with selftests, from Daniel Borkmann and Lorenz Bauer.

4) Fix riscv JIT to properly sign-extend the return register in programs.
   This fixes various test_progs selftests on riscv, from Björn Töpel.

5) Fix verifier log for async callback return values where the allowed range
   was displayed incorrectly, from David Vernet.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git tags/for-netdev

Thanks a lot!

Also thanks to reporters, reviewers and testers of commits in this pull-request:

Lorenz Bauer, Magnus Karlsson, Martin KaFai Lau, Song Liu

----------------------------------------------------------------

The following changes since commit c4d49196ceec80e30e8d981410d73331b49b7850:

  net: sched: cls_u32: Fix allocation size in u32_init() (2023-10-06 11:43:05 +0100)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git tags/for-netdev

for you to fetch changes up to 5356ba1ff4f2417e1aebcf99aab35c1ea94dd6d7:

  s390/bpf: Fix unwinding past the trampoline (2023-10-11 00:08:46 +0200)

----------------------------------------------------------------
bpf-for-netdev

----------------------------------------------------------------
Andrew Kanner (1):
      xdp: Fix zero-size allocation warning in xskq_create()

Björn Töpel (2):
      riscv, bpf: Sign-extend return values
      riscv, bpf: Track both a0 (RISC-V ABI) and a5 (BPF) return values

Daniel Borkmann (6):
      bpf: Fix BPF_PROG_QUERY last field check
      bpf: Handle bpf_mprog_query with NULL entry
      selftests/bpf: Test bpf_mprog query API via libbpf and raw syscall
      selftests/bpf: Adapt assert_mprog_count to always expect 0 count
      selftests/bpf: Test query on empty mprog and pass revision into attach
      selftests/bpf: Make seen_tc* variable tests more robust

David Vernet (2):
      bpf: Fix verifier log for async callback return values
      selftests/bpf: Add testcase for async callback return value failure

Ilya Leoshkevich (2):
      s390/bpf: Fix clobbering the caller's backchain in the trampoline
      s390/bpf: Fix unwinding past the trampoline

Lorenz Bauer (1):
      bpf: Refuse unused attributes in bpf_prog_{attach,detach}

 arch/riscv/net/bpf_jit_comp64.c                    |  18 +-
 arch/s390/net/bpf_jit_comp.c                       |  25 +-
 kernel/bpf/mprog.c                                 |  10 +-
 kernel/bpf/syscall.c                               |  21 +-
 kernel/bpf/tcx.c                                   |   8 +-
 kernel/bpf/verifier.c                              |   6 +-
 net/xdp/xsk_queue.c                                |  10 +
 .../testing/selftests/bpf/prog_tests/tc_helpers.h  |  16 +-
 tools/testing/selftests/bpf/prog_tests/tc_links.c  |  64 ++---
 tools/testing/selftests/bpf/prog_tests/tc_opts.c   | 271 +++++++++++++++++++--
 tools/testing/selftests/bpf/prog_tests/timer.c     |   6 +-
 tools/testing/selftests/bpf/progs/timer_failure.c  |  47 ++++
 12 files changed, 398 insertions(+), 104 deletions(-)
 create mode 100644 tools/testing/selftests/bpf/progs/timer_failure.c

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ