lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 3 Jan 2019 14:43:18 -0800 From: Andrey Ignatov <rdna@...com> To: <netdev@...r.kernel.org> CC: Andrey Ignatov <rdna@...com>, <ast@...nel.org>, <daniel@...earbox.net>, <nitin.rawat@...el.com>, <kernel-team@...com> Subject: [PATCH bpf 0/2] bpf: Fix [::] -> [::1] rewrite in sys_sendmsg The patch set fixes BSD'ism in sys_sendmsg to rewrite unspecified destination IPv6 for unconnected UDP sockets in sys_sendmsg with [::1] in case when either CONFIG_CGROUP_BPF is enabled or when sys_sendmsg BPF hook sets destination IPv6 to [::]. Patch 1 is the fix and provides more details. Patch 2 adds two test cases to verify the fix. Andrey Ignatov (2): bpf: Fix [::] -> [::1] rewrite in sys_sendmsg selftests/bpf: Test [::] -> [::1] rewrite in sys_sendmsg in test_sock_addr net/ipv6/udp.c | 8 +-- tools/testing/selftests/bpf/test_sock_addr.c | 53 ++++++++++++++++++-- 2 files changed, 54 insertions(+), 7 deletions(-) -- 2.17.1
Powered by blists - more mailing lists