mirror of
				https://github.com/torvalds/linux.git
				synced 2025-11-04 10:40:15 +02:00 
			
		
		
		
	bpf: Fix use of sk->sk_reuseport from sk_assign
In testing, we found that for request sockets the sk->sk_reuseport field
may yet be uninitialized, which caused bpf_sk_assign() to randomly
succeed or return -ESOCKTNOSUPPORT when handling the forward ACK in a
three-way handshake.
Fix it by only applying the reuseport check for full sockets.
Fixes: cf7fbe660f ("bpf: Add socket assign support")
Signed-off-by: Joe Stringer <joe@wand.net.nz>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Martin KaFai Lau <kafai@fb.com>
Link: https://lore.kernel.org/bpf/20200408033540.10339-1-joe@wand.net.nz
			
			
This commit is contained in:
		
							parent
							
								
									eb203f4b89
								
							
						
					
					
						commit
						8e368dc72e
					
				
					 1 changed files with 1 additions and 1 deletions
				
			
		| 
						 | 
					@ -5925,7 +5925,7 @@ BPF_CALL_3(bpf_sk_assign, struct sk_buff *, skb, struct sock *, sk, u64, flags)
 | 
				
			||||||
		return -EOPNOTSUPP;
 | 
							return -EOPNOTSUPP;
 | 
				
			||||||
	if (unlikely(dev_net(skb->dev) != sock_net(sk)))
 | 
						if (unlikely(dev_net(skb->dev) != sock_net(sk)))
 | 
				
			||||||
		return -ENETUNREACH;
 | 
							return -ENETUNREACH;
 | 
				
			||||||
	if (unlikely(sk->sk_reuseport))
 | 
						if (unlikely(sk_fullsock(sk) && sk->sk_reuseport))
 | 
				
			||||||
		return -ESOCKTNOSUPPORT;
 | 
							return -ESOCKTNOSUPPORT;
 | 
				
			||||||
	if (sk_is_refcounted(sk) &&
 | 
						if (sk_is_refcounted(sk) &&
 | 
				
			||||||
	    unlikely(!refcount_inc_not_zero(&sk->sk_refcnt)))
 | 
						    unlikely(!refcount_inc_not_zero(&sk->sk_refcnt)))
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
		Loading…
	
		Reference in a new issue