diff options
author | Jordan Rife <jrife@google.com> | 2023-11-06 15:24:38 -0600 |
---|---|---|
committer | David Teigland <teigland@redhat.com> | 2023-11-16 11:58:42 -0600 |
commit | e9cdebbe23f1aa9a1caea169862f479ab3fa2773 (patch) | |
tree | b27945908a655317eb50fbb3b459dc45b63eb686 /scripts/gdb/linux/utils.py | |
parent | b85ea95d086471afb4ad062012a4d73cd328fa86 (diff) |
dlm: use kernel_connect() and kernel_bind()
Recent changes to kernel_connect() and kernel_bind() ensure that
callers are insulated from changes to the address parameter made by BPF
SOCK_ADDR hooks. This patch wraps direct calls to ops->connect() and
ops->bind() with kernel_connect() and kernel_bind() to protect callers
in such cases.
Link: https://lore.kernel.org/netdev/9944248dba1bce861375fcce9de663934d933ba9.camel@redhat.com/
Fixes: d74bad4e74ee ("bpf: Hooks for sys_connect")
Fixes: 4fbac77d2d09 ("bpf: Hooks for sys_bind")
Cc: stable@vger.kernel.org
Signed-off-by: Jordan Rife <jrife@google.com>
Signed-off-by: David Teigland <teigland@redhat.com>
Diffstat (limited to 'scripts/gdb/linux/utils.py')
0 files changed, 0 insertions, 0 deletions