diff options
author | Jordan Rife <jrife@google.com> | 2023-11-06 15:24:38 -0600 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2024-01-31 16:17:10 -0800 |
commit | e11dea8f503341507018b60906c4a9e7332f3663 (patch) | |
tree | c133cf224df711bf083012444573f582b4196f69 /include | |
parent | fd7c2ffa0ea4941adf7b6af068c66bb21bbb7ab5 (diff) | |
download | linux-e11dea8f503341507018b60906c4a9e7332f3663.tar.gz linux-e11dea8f503341507018b60906c4a9e7332f3663.tar.bz2 linux-e11dea8f503341507018b60906c4a9e7332f3663.zip |
dlm: use kernel_connect() and kernel_bind()
[ Upstream commit e9cdebbe23f1aa9a1caea169862f479ab3fa2773 ]
Recent changes to kernel_connect() and kernel_bind() ensure that
callers are insulated from changes to the address parameter made by BPF
SOCK_ADDR hooks. This patch wraps direct calls to ops->connect() and
ops->bind() with kernel_connect() and kernel_bind() to protect callers
in such cases.
Link: https://lore.kernel.org/netdev/9944248dba1bce861375fcce9de663934d933ba9.camel@redhat.com/
Fixes: d74bad4e74ee ("bpf: Hooks for sys_connect")
Fixes: 4fbac77d2d09 ("bpf: Hooks for sys_bind")
Cc: stable@vger.kernel.org
Signed-off-by: Jordan Rife <jrife@google.com>
Signed-off-by: David Teigland <teigland@redhat.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
Diffstat (limited to 'include')
0 files changed, 0 insertions, 0 deletions