summaryrefslogtreecommitdiff
path: root/tools/perf/scripts/python/net_dropmonitor.py
diff options
context:
space:
mode:
authorEric Dumazet <edumazet@google.com>2025-08-29 18:30:51 +0300
committerJakub Kicinski <kuba@kernel.org>2025-09-01 23:15:14 +0300
commit59f26d86b2a16f1406f3b42025062b6d1fba5dd5 (patch)
treea0a03409153d33787ab2ebdd59912ab1fe75b938 /tools/perf/scripts/python/net_dropmonitor.py
parentec0b1eeece28193e005a6b4b82972565fb5ca2b3 (diff)
downloadlinux-59f26d86b2a16f1406f3b42025062b6d1fba5dd5.tar.xz
inet: ping: check sock_net() in ping_get_port() and ping_lookup()
We need to check socket netns before considering them in ping_get_port(). Otherwise, one malicious netns could 'consume' all ports. Add corresponding check in ping_lookup(). Fixes: c319b4d76b9e ("net: ipv4: add IPPROTO_ICMP socket kind") Signed-off-by: Eric Dumazet <edumazet@google.com> Reviewed-by: David Ahern <dsahern@kernel.org> Reviewed-by: Yue Haibing <yuehaibing@huawei.com> Link: https://patch.msgid.link/20250829153054.474201-2-edumazet@google.com Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Diffstat (limited to 'tools/perf/scripts/python/net_dropmonitor.py')
0 files changed, 0 insertions, 0 deletions