[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20230113-sockmap-fix-v1-0-d3cad092ee10@cloudflare.com>
Date: Fri, 13 Jan 2023 15:56:20 +0100
From: Jakub Sitnicki <jakub@...udflare.com>
To: netdev@...r.kernel.org
Cc: kernel-team@...udflare.com,
John Fastabend <john.fastabend@...il.com>,
Eric Dumazet <edumazet@...gle.com>,
Daniel Borkmann <daniel@...earbox.net>,
Alexei Starovoitov <ast@...nel.org>,
Andrii Nakryiko <andrii@...nel.org>
Subject: [PATCH bpf 0/3] bpf, sockmap: Fix infinite recursion in sock_map_close
This patch set addresses the syzbot report in [1].
Please see patch #1 for the analysis and the fix.
Patches #2 & #3 add coverage to selftests.
I still need to address Eric's suggestion to break out of sock_map_close when we
detect that sock_map_close is calling itself. Will do it in a separate patch or
the next iteration, if there is any review feedback to address.
[1] https://lore.kernel.org/all/00000000000073b14905ef2e7401@google.com/
To: bpf@...r.kernel.org
Cc: netdev@...r.kernel.org
Cc: kernel-team@...udflare.com
Cc: John Fastabend <john.fastabend@...il.com>
Cc: Eric Dumazet <edumazet@...gle.com>
Cc: Daniel Borkmann <daniel@...earbox.net>
Cc: Alexei Starovoitov <ast@...nel.org>
Cc: Andrii Nakryiko <andrii@...nel.org>
---
Jakub Sitnicki (3):
bpf, sockmap: Check for any of tcp_bpf_prots when cloning a listener
selftests/bpf: Pass BPF skeleton to sockmap_listen ops tests
selftests/bpf: Cover listener cloning with progs attached to sockmap
net/ipv4/tcp_bpf.c | 3 +-
.../selftests/bpf/prog_tests/sockmap_listen.c | 81 +++++++++++++++++-----
2 files changed, 64 insertions(+), 20 deletions(-)
---
base-commit: e7895f017b79410bf4591396a733b876dc1e0e9d
change-id: 20230113-sockmap-fix-83d0359301b7
Best regards,
--
Jakub Sitnicki <jakub@...udflare.com>
Powered by blists - more mailing lists