Jordan Rife <jrife@xxxxxxxxxx> writes: > Recent changes to kernel_connect() and kernel_bind() ensure that > callers are insulated from changes to the address parameter made by BPF > SOCK_ADDR hooks. This patch wraps direct calls to ops->connect() and > ops->bind() with kernel_connect() and kernel_bind() to ensure that SMB > mounts do not see their mount address overwritten in such cases. > > Link: https://lore.kernel.org/netdev/9944248dba1bce861375fcce9de663934d933ba9.camel@xxxxxxxxxx/ > Cc: <stable@xxxxxxxxxxxxxxx> # 6.x.y > Signed-off-by: Jordan Rife <jrife@xxxxxxxxxx> > --- > fs/smb/client/connect.c | 10 +++++----- > 1 file changed, 5 insertions(+), 5 deletions(-) Acked-by: Paulo Alcantara (SUSE) <pc@xxxxxxxxxxxxx>