lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20240527203551.29712-1-daniel@iogearbox.net>
Date: Mon, 27 May 2024 22:35:51 +0200
From: Daniel Borkmann <daniel@...earbox.net>
To: davem@...emloft.net
Cc: kuba@...nel.org,
	pabeni@...hat.com,
	edumazet@...gle.com,
	daniel@...earbox.net,
	ast@...nel.org,
	andrii@...nel.org,
	martin.lau@...ux.dev,
	netdev@...r.kernel.org,
	bpf@...r.kernel.org
Subject: pull-request: bpf 2024-05-27

Hi David, hi Jakub, hi Paolo, hi Eric,

The following pull-request contains BPF updates for your *net* tree.

We've added 15 non-merge commits during the last 7 day(s) which contain
a total of 18 files changed, 583 insertions(+), 55 deletions(-).

The main changes are:

1) Fix broken BPF multi-uprobe PID filtering logic which filtered by thread while
   the promise was to filter by process, from Andrii Nakryiko.

2) Fix the recent influx of syzkaller reports to sockmap which triggered a
   locking rule violation by performing a map_delete, from Jakub Sitnicki.

3) Fixes to netkit driver in particular on skb->pkt_type override upon pass
   verdict, from Daniel Borkmann.

4) Fix an integer overflow in resolve_btfids which can wrongly trigger build
   failures, from Friedrich Vock.

5) Follow-up fixes for ARC JIT reported by static analyzers, from Shahab Vahedi.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git tags/for-netdev

Thanks a lot!

Also thanks to reporters, reviewers and testers of commits in this pull-request:

Daniel Borkmann, Hengqi Chen, Jiri Olsa, John Fastabend, kernel test 
robot, Nikolay Aleksandrov, Stanislav Fomichev, Tetsuo Handa

----------------------------------------------------------------

The following changes since commit 30a92c9e3d6b073932762bef2ac66f4ee784c657:

  openvswitch: Set the skbuff pkt_type for proper pmtud support. (2024-05-21 15:34:04 +0200)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git tags/for-netdev

for you to fetch changes up to a63bf556160fb19591183383da6757f52119981d:

  selftests/bpf: Cover verifier checks for mutating sockmap/sockhash (2024-05-27 19:34:26 +0200)

----------------------------------------------------------------
bpf-for-netdev

----------------------------------------------------------------
Alexei Starovoitov (1):
      Merge branch 'fix-bpf-multi-uprobe-pid-filtering-logic'

Andrii Nakryiko (5):
      bpf: fix multi-uprobe PID filtering logic
      bpf: remove unnecessary rcu_read_{lock,unlock}() in multi-uprobe attach logic
      libbpf: detect broken PID filtering logic for multi-uprobe
      selftests/bpf: extend multi-uprobe tests with child thread case
      selftests/bpf: extend multi-uprobe tests with USDTs

Daniel Borkmann (4):
      netkit: Fix setting mac address in l2 mode
      netkit: Fix pkt_type override upon netkit pass verdict
      selftests/bpf: Add netkit tests for mac address
      selftests/bpf: Add netkit test for pkt_type

Friedrich Vock (1):
      bpf: Fix potential integer overflow in resolve_btfids

Jakub Sitnicki (3):
      bpf: Allow delete from sockmap/sockhash only if update is allowed
      Revert "bpf, sockmap: Prevent lock inversion deadlock in map delete elem"
      selftests/bpf: Cover verifier checks for mutating sockmap/sockhash

Shahab Vahedi (1):
      ARC, bpf: Fix issues reported by the static analyzers

Xu Kuohai (1):
      MAINTAINERS: Add myself as reviewer of ARM64 BPF JIT

 MAINTAINERS                                        |   1 +
 arch/arc/net/bpf_jit.h                             |   2 +-
 arch/arc/net/bpf_jit_arcv2.c                       |  10 +-
 arch/arc/net/bpf_jit_core.c                        |  22 +--
 drivers/net/netkit.c                               |  30 +++-
 include/linux/etherdevice.h                        |   8 +
 kernel/bpf/verifier.c                              |  10 +-
 kernel/trace/bpf_trace.c                           |  10 +-
 net/core/sock_map.c                                |   6 -
 net/ethernet/eth.c                                 |   4 +-
 tools/bpf/resolve_btfids/main.c                    |   2 +-
 tools/lib/bpf/features.c                           |  31 +++-
 tools/testing/selftests/bpf/prog_tests/tc_netkit.c |  94 +++++++++++
 .../selftests/bpf/prog_tests/uprobe_multi_test.c   | 134 ++++++++++++++-
 tools/testing/selftests/bpf/prog_tests/verifier.c  |   2 +
 tools/testing/selftests/bpf/progs/test_tc_link.c   |  35 +++-
 tools/testing/selftests/bpf/progs/uprobe_multi.c   |  50 +++++-
 .../selftests/bpf/progs/verifier_sockmap_mutate.c  | 187 +++++++++++++++++++++
 18 files changed, 583 insertions(+), 55 deletions(-)
 create mode 100644 tools/testing/selftests/bpf/progs/verifier_sockmap_mutate.c

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ