lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20240614203223.26500-1-daniel@iogearbox.net>
Date: Fri, 14 Jun 2024 22:32:23 +0200
From: Daniel Borkmann <daniel@...earbox.net>
To: davem@...emloft.net
Cc: kuba@...nel.org,
	pabeni@...hat.com,
	edumazet@...gle.com,
	daniel@...earbox.net,
	ast@...nel.org,
	andrii@...nel.org,
	martin.lau@...ux.dev,
	netdev@...r.kernel.org,
	bpf@...r.kernel.org
Subject: pull-request: bpf 2024-06-14

Hi David, hi Jakub, hi Paolo, hi Eric,

The following pull-request contains BPF updates for your *net* tree.

We've added 8 non-merge commits during the last 2 day(s) which contain
a total of 9 files changed, 92 insertions(+), 11 deletions(-).

The main changes are:

1) Silence a syzkaller splat under CONFIG_DEBUG_NET=y in pskb_pull_reason()
   triggered via __bpf_try_make_writable(), from Florian Westphal.

2) Fix removal of kfuncs during linking phase which then throws a kernel build
   warning via resolve_btfids about unresolved symbols, from Tony Ambardar.

3) Fix a UML x86_64 compilation failure from BPF as pcpu_hot symbol is not
   available on User Mode Linux, from Maciej Żenczykowski.

4) Fix a register corruption in reg_set_min_max triggering an invariant
   violation in BPF verifier, from Daniel Borkmann.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git tags/for-netdev

Thanks a lot!

Also thanks to reporters, reviewers and testers of commits in this pull-request:

Daniel Borkmann, Eric Dumazet, Jiri Olsa, John Fastabend, Juan José 
López Jaimez, kernel test robot

----------------------------------------------------------------

The following changes since commit 14a20e5b4ad998793c5f43b0330d9e1388446cf3:

  net/ipv6: Fix the RT cache flush via sysctl using a previous delay (2024-06-12 17:51:35 -0700)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git tags/for-netdev

for you to fetch changes up to 7bdcedd5c8fb88e7176b93812b139eca5fe0aa46:

  bpf: Harden __bpf_kfunc tag against linker kfunc removal (2024-06-14 19:14:37 +0200)

----------------------------------------------------------------
bpf-for-netdev

----------------------------------------------------------------
Daniel Borkmann (3):
      bpf: Fix reg_set_min_max corruption of fake_reg
      bpf: Reduce stack consumption in check_stack_write_fixed_off
      selftests/bpf: Add test coverage for reg_set_min_max handling

Florian Westphal (1):
      bpf: Avoid splat in pskb_pull_reason

Maciej Żenczykowski (1):
      bpf: fix UML x86_64 compile failure

Stanislav Fomichev (1):
      MAINTAINERS: mailmap: Update Stanislav's email address

Tony Ambardar (2):
      compiler_types.h: Define __retain for __attribute__((__retain__))
      bpf: Harden __bpf_kfunc tag against linker kfunc removal

 .mailmap                                           |  1 +
 MAINTAINERS                                        |  2 +-
 include/linux/bpf_verifier.h                       |  2 ++
 include/linux/btf.h                                |  2 +-
 include/linux/compiler_types.h                     | 23 ++++++++++++
 kernel/bpf/verifier.c                              | 25 ++++++++-----
 net/core/filter.c                                  |  5 +++
 tools/testing/selftests/bpf/prog_tests/verifier.c  |  2 ++
 .../selftests/bpf/progs/verifier_or_jmp32_k.c      | 41 ++++++++++++++++++++++
 9 files changed, 92 insertions(+), 11 deletions(-)
 create mode 100644 tools/testing/selftests/bpf/progs/verifier_or_jmp32_k.c

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ