From mboxrd@z Thu Jan 1 00:00:00 1970 From: Alexei Starovoitov Subject: pull-request: bpf 2019-01-02 Date: Wed, 2 Jan 2019 16:11:07 -0800 Message-ID: <20190103001107.432675-1-ast@kernel.org> Mime-Version: 1.0 Content-Type: text/plain Cc: , , To: "David S . Miller" Return-path: Received: from mx0a-00082601.pphosted.com ([67.231.145.42]:37312 "EHLO mx0a-00082601.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727147AbfACALW (ORCPT ); Wed, 2 Jan 2019 19:11:22 -0500 Received: from pps.filterd (m0044012.ppops.net [127.0.0.1]) by mx0a-00082601.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x03061Lx011836 for ; Wed, 2 Jan 2019 16:11:22 -0800 Received: from maileast.thefacebook.com ([199.201.65.23]) by mx0a-00082601.pphosted.com with ESMTP id 2ps4gs0h9n-2 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT) for ; Wed, 02 Jan 2019 16:11:22 -0800 Sender: netdev-owner@vger.kernel.org List-ID: Hi David, The following pull-request contains BPF updates for your *net* tree. The main changes are: 1) prevent out of bounds speculation on pointer arithmetic, from Daniel. 2) typo fix, from Xiaozhou. Please consider pulling these changes from: git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git Thanks a lot! ---------------------------------------------------------------- The following changes since commit 756af9c642329d54f048bac2a62f829b391f6944: ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (2018-12-31 15:40:11 -0800) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git for you to fetch changes up to a67825f5195145f840939d0f85fc40b6b1077329: Merge branch 'prevent-oob-under-speculation' (2019-01-02 16:01:25 -0800) ---------------------------------------------------------------- Alexei Starovoitov (1): Merge branch 'prevent-oob-under-speculation' Daniel Borkmann (9): bpf: move {prev_,}insn_idx into verifier env bpf: move tmp variable into ax register in interpreter bpf: enable access to ax register also from verifier rewrite bpf: restrict map value pointer arithmetic for unprivileged bpf: restrict stack pointer arithmetic for unprivileged bpf: restrict unknown scalars of mixed signed bounds for unprivileged bpf: fix check_map_access smin_value test when pointer contains offset bpf: prevent out of bounds speculation on pointer arithmetic bpf: add various test cases to selftests Xiaozhou Liu (1): selftests/bpf: fix error printing in test_devmap() include/linux/bpf_verifier.h | 12 + include/linux/filter.h | 10 +- kernel/bpf/core.c | 54 +- kernel/bpf/verifier.c | 336 ++++++-- tools/testing/selftests/bpf/test_maps.c | 2 +- tools/testing/selftests/bpf/test_verifier.c | 1146 ++++++++++++++++++++++++++- 6 files changed, 1452 insertions(+), 108 deletions(-)