From: Daniel Borkmann <daniel@iogearbox.net>
To: davem@davemloft.net
Cc: kuba@kernel.org, daniel@iogearbox.net, ast@kernel.org,
andrii.nakryiko@gmail.com, netdev@vger.kernel.org,
bpf@vger.kernel.org
Subject: pull-request: bpf 2021-05-04
Date: Tue, 4 May 2021 00:47:31 +0200 [thread overview]
Message-ID: <20210503224731.6963-1-daniel@iogearbox.net> (raw)
Hi David, hi Jakub,
The following pull-request contains BPF updates for your *net* tree.
We've added 5 non-merge commits during the last 4 day(s) which contain
a total of 6 files changed, 52 insertions(+), 30 deletions(-).
The main changes are:
1) Fix libbpf overflow when processing BPF ring buffer in case of extreme
application behavior, from Brendan Jackman.
2) Fix potential data leakage of uninitialized BPF stack under speculative
execution, from Daniel Borkmann.
3) Fix off-by-one when validating xsk pool chunks, from Xuan Zhuo.
4) Fix snprintf BPF selftest with a pid filter to avoid racing its output
test buffer, from Florent Revest.
Please consider pulling these changes from:
git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git
Thanks a lot!
Also thanks to reporters, reviewers and testers of commits in this pull-request:
Alexei Starovoitov, Andrii Nakryiko, John Fastabend, Magnus Karlsson,
Piotr Krysiuk
----------------------------------------------------------------
The following changes since commit d4eecfb28b963493a8701f271789ff04e92ae205:
net: dsa: ksz: ksz8863_smi_probe: set proper return value for ksz_switch_alloc() (2021-04-29 15:54:35 -0700)
are available in the Git repository at:
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git
for you to fetch changes up to ac31565c21937eee9117e43c9cd34f557f6f1cb8:
xsk: Fix for xp_aligned_validate_desc() when len == chunk_size (2021-05-04 00:28:06 +0200)
----------------------------------------------------------------
Brendan Jackman (1):
libbpf: Fix signed overflow in ringbuf_process_ring
Daniel Borkmann (2):
bpf: Fix masking negation logic upon negative dst register
bpf: Fix leakage of uninitialized bpf stack under speculation
Florent Revest (1):
selftests/bpf: Fix the snprintf test
Xuan Zhuo (1):
xsk: Fix for xp_aligned_validate_desc() when len == chunk_size
include/linux/bpf_verifier.h | 5 ++--
kernel/bpf/verifier.c | 33 ++++++++++++-----------
net/xdp/xsk_queue.h | 7 +++--
tools/lib/bpf/ringbuf.c | 30 ++++++++++++++-------
tools/testing/selftests/bpf/prog_tests/snprintf.c | 2 ++
tools/testing/selftests/bpf/progs/test_snprintf.c | 5 ++++
6 files changed, 52 insertions(+), 30 deletions(-)
reply other threads:[~2021-05-03 22:47 UTC|newest]
Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20210503224731.6963-1-daniel@iogearbox.net \
--to=daniel@iogearbox.net \
--cc=andrii.nakryiko@gmail.com \
--cc=ast@kernel.org \
--cc=bpf@vger.kernel.org \
--cc=davem@davemloft.net \
--cc=kuba@kernel.org \
--cc=netdev@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox