Message ID | 20230926200505.2804266-1-jrife@google.com (mailing list archive) |
---|---|
Headers | show |
Series | Insulate Kernel Space From SOCK_ADDR Hooks | expand |
Hello: This series was applied to netdev/net.git (main) by David S. Miller <davem@davemloft.net>: On Tue, 26 Sep 2023 15:05:02 -0500 you wrote: > ==OVERVIEW== > > The sock_sendmsg(), kernel_connect(), and kernel_bind() functions > provide kernel space equivalents to the sendmsg(), connect(), and bind() > system calls. > > When used in conjunction with BPF SOCK_ADDR hooks that rewrite the send, > connect, or bind address, callers may observe that the address passed to > the call is modified. This is a problem not just in theory, but in > practice, with uninsulated calls to kernel_connect() causing issues with > broken NFS and CIFS mounts. > > [...] Here is the summary with links: - [net,v6,1/3] net: replace calls to sock->ops->connect() with kernel_connect() https://git.kernel.org/netdev/net/c/26297b4ce1ce - [net,v6,2/3] net: prevent rewrite of msg_name and msg_namelen in sock_sendmsg() (no matching commit) - [net,v6,3/3] net: prevent address rewrite in kernel_bind() https://git.kernel.org/netdev/net/c/c889a99a21bf You are awesome, thank you!