lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <166274581620.27936.8009091475815991986.git-patchwork-notify@kernel.org> Date: Fri, 09 Sep 2022 17:50:16 +0000 From: patchwork-bot+netdevbpf@...nel.org To: YiFei Zhu <zhuyifei@...gle.com> Cc: bpf@...r.kernel.org, netdev@...r.kernel.org, ast@...nel.org, daniel@...earbox.net, sdf@...gle.com, martin.lau@...ux.dev, john.fastabend@...il.com, jolsa@...nel.org, davem@...emloft.net, yoshfuji@...ux-ipv6.org, dsahern@...nel.org, edumazet@...gle.com, kuba@...nel.org, pabeni@...hat.com Subject: Re: [PATCH v4 bpf-next 0/3] cgroup/connect{4,6} programs for unprivileged ICMP ping Hello: This series was applied to bpf/bpf-next.git (master) by Martin KaFai Lau <martin.lau@...nel.org>: On Fri, 9 Sep 2022 00:49:38 +0000 you wrote: > Usually when a TCP/UDP connection is initiated, we can bind the socket > to a specific IP attached to an interface in a cgroup/connect hook. > But for pings, this is impossible, as the hook is not being called. > > This series adds the invocation for cgroup/connect{4,6} programs to > unprivileged ICMP ping (i.e. ping sockets created with SOCK_DGRAM > IPPROTO_ICMP(V6) as opposed to SOCK_RAW). This also adds a test to > verify that the hooks are being called and invoking bpf_bind() from > within the hook actually binds the socket. > > [...] Here is the summary with links: - [v4,bpf-next,1/3] bpf: Invoke cgroup/connect{4,6} programs for unprivileged ICMP ping https://git.kernel.org/bpf/bpf-next/c/0ffe2412531e - [v4,bpf-next,2/3] selftests/bpf: Deduplicate write_sysctl() to test_progs.c https://git.kernel.org/bpf/bpf-next/c/e42921c3c346 - [v4,bpf-next,3/3] selftests/bpf: Ensure cgroup/connect{4,6} programs can bind unpriv ICMP ping https://git.kernel.org/bpf/bpf-next/c/58c449a96946 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists