diff options
author | Jordan Rife <[email protected]> | 2023-11-06 15:24:38 -0600 |
---|---|---|
committer | David Teigland <[email protected]> | 2023-11-16 11:58:42 -0600 |
commit | e9cdebbe23f1aa9a1caea169862f479ab3fa2773 (patch) | |
tree | b27945908a655317eb50fbb3b459dc45b63eb686 /lib/test_fortify/write_overflow-strncpy-src.c | |
parent | b85ea95d086471afb4ad062012a4d73cd328fa86 (diff) |
dlm: use kernel_connect() and kernel_bind()
Recent changes to kernel_connect() and kernel_bind() ensure that
callers are insulated from changes to the address parameter made by BPF
SOCK_ADDR hooks. This patch wraps direct calls to ops->connect() and
ops->bind() with kernel_connect() and kernel_bind() to protect callers
in such cases.
Link: https://lore.kernel.org/netdev/[email protected]/
Fixes: d74bad4e74ee ("bpf: Hooks for sys_connect")
Fixes: 4fbac77d2d09 ("bpf: Hooks for sys_bind")
Cc: [email protected]
Signed-off-by: Jordan Rife <[email protected]>
Signed-off-by: David Teigland <[email protected]>
Diffstat (limited to 'lib/test_fortify/write_overflow-strncpy-src.c')
0 files changed, 0 insertions, 0 deletions