diff options
author | Eric Dumazet <[email protected]> | 2022-03-02 08:17:22 -0800 |
---|---|---|
committer | Jakub Kicinski <[email protected]> | 2022-03-02 22:49:03 -0800 |
commit | 60ce37b03917e593d8e5d8bcc7ec820773daf81d (patch) | |
tree | 9f4db2b6e73ce9cca1e0197b5ee97d02e15433e4 /net/unix/af_unix.c | |
parent | 1dba41c9d2e2dc94b543394974f63d55aa195bfe (diff) |
bpf, sockmap: Do not ignore orig_len parameter
Currently, sk_psock_verdict_recv() returns skb->len
This is problematic because tcp_read_sock() might have
passed orig_len < skb->len, due to the presence of TCP urgent data.
This causes an infinite loop from tcp_read_sock()
Followup patch will make tcp_read_sock() more robust vs bad actors.
Fixes: ef5659280eb1 ("bpf, sockmap: Allow skipping sk_skb parser program")
Reported-by: syzbot <[email protected]>
Signed-off-by: Eric Dumazet <[email protected]>
Acked-by: John Fastabend <[email protected]>
Acked-by: Jakub Sitnicki <[email protected]>
Tested-by: Jakub Sitnicki <[email protected]>
Acked-by: Daniel Borkmann <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
Signed-off-by: Jakub Kicinski <[email protected]>
Diffstat (limited to 'net/unix/af_unix.c')
0 files changed, 0 insertions, 0 deletions