lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20240605091525.22628-1-daniel@iogearbox.net>
Date: Wed,  5 Jun 2024 11:15:25 +0200
From: Daniel Borkmann <daniel@...earbox.net>
To: davem@...emloft.net
Cc: kuba@...nel.org,
	pabeni@...hat.com,
	edumazet@...gle.com,
	daniel@...earbox.net,
	ast@...nel.org,
	andrii@...nel.org,
	martin.lau@...ux.dev,
	netdev@...r.kernel.org,
	bpf@...r.kernel.org
Subject: pull-request: bpf 2024-06-05

Hi David, hi Jakub, hi Paolo, hi Eric,

The following pull-request contains BPF updates for your *net* tree.

We've added 8 non-merge commits during the last 6 day(s) which contain
a total of 9 files changed, 34 insertions(+), 35 deletions(-).

The main changes are:

1) Fix a potential use-after-free in bpf_link_free when the link uses
   dealloc_deferred to free the link object but later still tests for
   presence of link->ops->dealloc, from Cong Wang.

2) Fix BPF test infra to set the run context for rawtp test_run callback
   where syzbot reported a crash, from Jiri Olsa.

3) Fix bpf_session_cookie BTF_ID in the special_kfunc_set list to exclude
   it for the case of !CONFIG_FPROBE, also from Jiri Olsa.

4) Fix a Coverity static analysis report to not close() a link_fd of -1 in
   the multi-uprobe feature detector, from Andrii Nakryiko.

5) Revert support for redirect to any xsk socket bound to the same umem
   as it can result in corrupted ring state which can lead to a crash when
   flushing rings. A different approach will be pursued for bpf-next to
   address it safely, from Magnus Karlsson.

6) Fix inet_csk_accept prototype in test_sk_storage_tracing.c which caused
   BPF CI failure after the last tree fast forwarding, from Andrii Nakryiko.

7) Fix a coccicheck warning in BPF devmap that iterator variable cannot
   be NULL, from Thorsten Blum.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git tags/for-netdev

Thanks a lot!

Also thanks to reporters, reviewers and testers of commits in this pull-request:

Jiri Olsa, Sebastian Andrzej Siewior, Toke Høiland-Jørgensen, Yuval 
El-Hanany

----------------------------------------------------------------

The following changes since commit d8ec19857b095b39d114ae299713bd8ea6c1e66a:

  Merge tag 'net-6.10-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net (2024-05-30 08:33:04 -0700)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git tags/for-netdev

for you to fetch changes up to 03e38d315f3c5258270ad50f2ae784b6372e87c3:

  Revert "xsk: Document ability to redirect to any socket bound to the same umem" (2024-06-05 09:43:05 +0200)

----------------------------------------------------------------
bpf-for-netdev

----------------------------------------------------------------
Andrii Nakryiko (2):
      selftests/bpf: fix inet_csk_accept prototype in test_sk_storage_tracing.c
      libbpf: don't close(-1) in multi-uprobe feature detector

Cong Wang (1):
      bpf: Fix a potential use-after-free in bpf_link_free()

Jiri Olsa (2):
      bpf: Fix bpf_session_cookie BTF_ID in special_kfunc_set list
      bpf: Set run context for rawtp test_run callback

Magnus Karlsson (2):
      Revert "xsk: Support redirect to any socket bound to the same umem"
      Revert "xsk: Document ability to redirect to any socket bound to the same umem"

Thorsten Blum (1):
      bpf, devmap: Remove unnecessary if check in for loop

 Documentation/networking/af_xdp.rst                | 33 +++++++++-------------
 kernel/bpf/devmap.c                                |  3 --
 kernel/bpf/syscall.c                               | 11 ++++----
 kernel/bpf/verifier.c                              |  4 +++
 kernel/trace/bpf_trace.c                           |  2 --
 net/bpf/test_run.c                                 |  6 ++++
 net/xdp/xsk.c                                      |  5 +---
 tools/lib/bpf/features.c                           |  3 +-
 .../selftests/bpf/progs/test_sk_storage_tracing.c  |  2 +-
 9 files changed, 34 insertions(+), 35 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ