All of lore.kernel.org
 help / color / mirror / Atom feed
From: Daniel Borkmann <daniel@iogearbox.net>
To: davem@davemloft.net
Cc: kuba@kernel.org, daniel@iogearbox.net, ast@kernel.org,
	andrii@kernel.org, netdev@vger.kernel.org, bpf@vger.kernel.org
Subject: pull-request: bpf 2021-12-16
Date: Thu, 16 Dec 2021 22:00:05 +0100	[thread overview]
Message-ID: <20211216210005.13815-1-daniel@iogearbox.net> (raw)

Hi David, hi Jakub,

The following pull-request contains BPF updates for your *net* tree.

We've added 15 non-merge commits during the last 7 day(s) which contain
a total of 12 files changed, 434 insertions(+), 30 deletions(-).

The main changes are:

1) Fix incorrect verifier state pruning behavior for <8B register spill/fill,
   from Paul Chaignon.

2) Fix x86-64 JIT's extable handling for fentry/fexit when return pointer
   is an ERR_PTR(), from Alexei Starovoitov.

3) Fix 3 different possibilities that BPF verifier missed where unprivileged
   could leak kernel addresses, from Daniel Borkmann.

4) Fix xsk's poll behavior under need_wakeup flag, from Magnus Karlsson.

5) Fix an oob-write in test_verifier due to a missed MAX_NR_MAPS bump,
   from Kumar Kartikeya Dwivedi.

6) Fix a race in test_btf_skc_cls_ingress selftest, from Martin KaFai Lau.

Please consider pulling these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git

Thanks a lot!

Also thanks to reporters, reviewers and testers of commits in this pull-request:

Alexei Starovoitov, Andrii Nakryiko, Brendan Jackman, Daniel Borkmann, 
John Fastabend, Keith Wiles, Kuee K1r0a, Lorenzo Fontana, Maciej 
Fijalkowski, Ryota Shiga (Flatt Security)

----------------------------------------------------------------

The following changes since commit ab443c53916730862cec202078d36fd4008bea79:

  sch_cake: do not call cake_destroy() from cake_init() (2021-12-10 08:11:36 -0800)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git 

for you to fetch changes up to c2fcbf81c332b42382a0c439bfe2414a241e4f5b:

  bpf, selftests: Fix racing issue in btf_skc_cls_ingress test (2021-12-16 21:41:18 +0100)

----------------------------------------------------------------
Alexei Starovoitov (3):
      bpf: Fix extable fixup offset.
      bpf: Fix extable address check.
      selftest/bpf: Add a test that reads various addresses.

Daniel Borkmann (7):
      bpf: Fix kernel address leakage in atomic fetch
      bpf, selftests: Add test case for atomic fetch on spilled pointer
      bpf: Fix kernel address leakage in atomic cmpxchg's r0 aux reg
      bpf, selftests: Update test case for atomic cmpxchg on r0 with pointer
      bpf: Fix signed bounds propagation after mov32
      bpf: Make 32->64 bounds propagation slightly more robust
      bpf, selftests: Add test case trying to taint map value pointer

Kumar Kartikeya Dwivedi (1):
      selftests/bpf: Fix OOB write in test_verifier

Magnus Karlsson (1):
      xsk: Do not sleep in poll() when need_wakeup set

Martin KaFai Lau (1):
      bpf, selftests: Fix racing issue in btf_skc_cls_ingress test

Paul Chaignon (2):
      bpf: Fix incorrect state pruning for <8B spill/fill
      selftests/bpf: Tests for state pruning with u32 spill/fill

 arch/x86/net/bpf_jit_comp.c                        | 51 ++++++++++--
 kernel/bpf/verifier.c                              | 53 ++++++++----
 net/xdp/xsk.c                                      |  4 +-
 .../selftests/bpf/bpf_testmod/bpf_testmod.c        | 20 +++++
 .../selftests/bpf/prog_tests/btf_skc_cls_ingress.c | 16 +++-
 .../selftests/bpf/progs/test_module_attach.c       | 12 +++
 tools/testing/selftests/bpf/test_verifier.c        |  2 +-
 .../selftests/bpf/verifier/atomic_cmpxchg.c        | 86 ++++++++++++++++++++
 .../testing/selftests/bpf/verifier/atomic_fetch.c  | 94 ++++++++++++++++++++++
 .../selftests/bpf/verifier/search_pruning.c        | 71 ++++++++++++++++
 tools/testing/selftests/bpf/verifier/spill_fill.c  | 32 ++++++++
 .../selftests/bpf/verifier/value_ptr_arith.c       | 23 ++++++
 12 files changed, 434 insertions(+), 30 deletions(-)

             reply	other threads:[~2021-12-16 21:00 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-12-16 21:00 Daniel Borkmann [this message]
2021-12-16 21:10 ` pull-request: bpf 2021-12-16 patchwork-bot+netdevbpf

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20211216210005.13815-1-daniel@iogearbox.net \
    --to=daniel@iogearbox.net \
    --cc=andrii@kernel.org \
    --cc=ast@kernel.org \
    --cc=bpf@vger.kernel.org \
    --cc=davem@davemloft.net \
    --cc=kuba@kernel.org \
    --cc=netdev@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.