Skip to content

bpf: Add kfuncs for PKCS#7 signature verification #993

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
wants to merge 1 commit into from

Conversation

kernel-patches-bot
Copy link

Pull request for series with
subject: bpf: Add kfuncs for PKCS#7 signature verification
version: 13
url: https://patchwork.kernel.org/project/netdevbpf/list/?series=670322

@kernel-patches-bot
Copy link
Author

Master branch: 0947ae1
series: https://patchwork.kernel.org/project/netdevbpf/list/?series=670322
version: 13

Pull request is NOT updated. Failed to apply https://patchwork.kernel.org/project/netdevbpf/list/?series=670322
error message:

Cmd('git') failed due to: exit code(128)
  cmdline: git am -3
  stdout: 'Applying: bpf: Allow kfuncs to be used in LSM programs
Applying: btf: Handle dynamic pointer parameter in kfuncs
Using index info to reconstruct a base tree...
M	include/linux/btf.h
M	kernel/bpf/btf.c
M	kernel/bpf/verifier.c
Falling back to patching base and 3-way merge...
Auto-merging kernel/bpf/verifier.c
Auto-merging kernel/bpf/btf.c
Auto-merging include/linux/btf.h
Applying: bpf: Export bpf_dynptr_get_size()
Applying: KEYS: Move KEY_LOOKUP_ to include/linux/key.h
Applying: bpf: Add bpf_lookup_*_key() and bpf_key_put() kfuncs
Applying: bpf: Add bpf_verify_pkcs7_signature() kfunc
Applying: selftests/bpf: Compile kernel with everything as built-in
Using index info to reconstruct a base tree...
M	tools/testing/selftests/bpf/config
Falling back to patching base and 3-way merge...
Auto-merging tools/testing/selftests/bpf/config
Applying: selftests/bpf: Add verifier tests for bpf_lookup_*_key() and bpf_key_put()
Applying: selftests/bpf: Add additional tests for bpf_lookup_*_key()
Using index info to reconstruct a base tree...
M	tools/testing/selftests/bpf/DENYLIST.s390x
Falling back to patching base and 3-way merge...
Auto-merging tools/testing/selftests/bpf/DENYLIST.s390x
CONFLICT (content): Merge conflict in tools/testing/selftests/bpf/DENYLIST.s390x
Patch failed at 0009 selftests/bpf: Add additional tests for bpf_lookup_*_key()
When you have resolved this problem, run "git am --continue".
If you prefer to skip this patch, run "git am --skip" instead.
To restore the original branch and stop patching, run "git am --abort".'
  stderr: 'error: Failed to merge in the changes.
hint: Use 'git am --show-current-patch=diff' to see the failed patch'

conflict:

diff --cc tools/testing/selftests/bpf/DENYLIST.s390x
index db9810611788,585ed5d43da8..000000000000
--- a/tools/testing/selftests/bpf/DENYLIST.s390x
+++ b/tools/testing/selftests/bpf/DENYLIST.s390x
@@@ -65,4 -65,5 +65,9 @@@ send_signa
  select_reuseport                         # intermittently fails on new s390x setup
  xdp_synproxy                             # JIT does not support calling kernel function                                (kfunc)
  unpriv_bpf_disabled                      # fentry
++<<<<<<< HEAD
 +lru_bug                                  # prog 'printk': failed to auto-attach: -524
++=======
+ setget_sockopt                           # attach unexpected error: -524                                               (trampoline)
+ lookup_key                               # JIT does not support calling kernel function                                (kfunc)
++>>>>>>> selftests/bpf: Add additional tests for bpf_lookup_*_key()

@kernel-patches-bot
Copy link
Author

At least one diff in series https://patchwork.kernel.org/project/netdevbpf/list/?series=670322 expired. Closing PR.

@kernel-patches-bot kernel-patches-bot deleted the series/666296=>bpf branch August 31, 2022 18:30
kernel-patches-daemon-bpf-rc bot pushed a commit that referenced this pull request Jun 26, 2025
Add a macro CRYPTO_MD5_STATESIZE for the Crypto API export state
size of md5 and use that in dm-crypt instead of relying on the
size of struct md5_state (the latter is currently undergoing a
transition and may shrink).

This commit fixes a crash on 32-bit machines:
Oops: Oops: 0000 [#1] SMP
CPU: 1 UID: 0 PID: 12 Comm: kworker/u16:0 Not tainted 6.16.0-rc2+ #993 PREEMPT(full)
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
Workqueue: kcryptd-254:0-1 kcryptd_crypt [dm_crypt]
EIP: __crypto_shash_export+0xf/0x90
Code: 4a c1 c7 40 20 a0 b4 4a c1 81 cf 0e 00 04 08 89 78 50 e9 2b ff ff ff 8d 74 26 00 55 89 e5 57 56 53 89 c3 89 d6 8b 00 8b 40 14 <8b> 50 fc f6 40 13 01 74 04 4a 2b 50 14 85 c9 74 10 89 f2 89 d8 ff
EAX: 303a3435 EBX: c3007c90 ECX: 00000000 EDX: c3007c38
ESI: c3007c38 EDI: c3007c90 EBP: c3007bfc ESP: c3007bf0
DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010216
CR0: 80050033 CR2: 303a3431 CR3: 04fbe000 CR4: 00350e90
Call Trace:
 crypto_shash_export+0x65/0xc0
 crypt_iv_lmk_one+0x106/0x1a0 [dm_crypt]

Fixes: efd62c8 ("crypto: md5-generic - Use API partial block handling")
Reported-by: Milan Broz <[email protected]>
Signed-off-by: Herbert Xu <[email protected]>
Tested-by: Milan Broz <[email protected]>
Closes: https://lore.kernel.org/linux-crypto/[email protected]/T/
Signed-off-by: Mikulas Patocka <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant