summaryrefslogtreecommitdiff
path: root/include
diff options
context:
space:
mode:
authorJordan Rife <jrife@google.com>2023-11-06 15:24:38 -0600
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-01-31 16:17:10 -0800
commite11dea8f503341507018b60906c4a9e7332f3663 (patch)
treec133cf224df711bf083012444573f582b4196f69 /include
parentfd7c2ffa0ea4941adf7b6af068c66bb21bbb7ab5 (diff)
downloadlinux-e11dea8f503341507018b60906c4a9e7332f3663.tar.gz
linux-e11dea8f503341507018b60906c4a9e7332f3663.tar.bz2
linux-e11dea8f503341507018b60906c4a9e7332f3663.zip
dlm: use kernel_connect() and kernel_bind()
[ Upstream commit e9cdebbe23f1aa9a1caea169862f479ab3fa2773 ] Recent changes to kernel_connect() and kernel_bind() ensure that callers are insulated from changes to the address parameter made by BPF SOCK_ADDR hooks. This patch wraps direct calls to ops->connect() and ops->bind() with kernel_connect() and kernel_bind() to protect callers in such cases. Link: https://lore.kernel.org/netdev/9944248dba1bce861375fcce9de663934d933ba9.camel@redhat.com/ Fixes: d74bad4e74ee ("bpf: Hooks for sys_connect") Fixes: 4fbac77d2d09 ("bpf: Hooks for sys_bind") Cc: stable@vger.kernel.org Signed-off-by: Jordan Rife <jrife@google.com> Signed-off-by: David Teigland <teigland@redhat.com> Signed-off-by: Sasha Levin <sashal@kernel.org>
Diffstat (limited to 'include')
0 files changed, 0 insertions, 0 deletions