Message ID | 20230113-sockmap-fix-v2-0-1e0ee7ac2f90@cloudflare.com (mailing list archive) |
---|---|
Headers | show |
Series | bpf, sockmap: Fix infinite recursion in sock_map_close | expand |
Hello: This series was applied to bpf/bpf.git (master) by Alexei Starovoitov <ast@kernel.org>: On Sat, 21 Jan 2023 13:41:42 +0100 you wrote: > This patch set addresses the syzbot report in [1]. > > Patch #1 has been suggested by Eric [2]. I extended it to cover the rest of > sock_map proto callbacks. Otherwise we would still overflow the stack. > > Patch #2 contains the actual fix and bug analysis. > Patches #3 & #4 add coverage to selftests to trigger the bug. > > [...] Here is the summary with links: - [bpf,v2,1/4] bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself https://git.kernel.org/bpf/bpf/c/5b4a79ba65a1 - [bpf,v2,2/4] bpf, sockmap: Check for any of tcp_bpf_prots when cloning a listener https://git.kernel.org/bpf/bpf/c/ddce1e091757 - [bpf,v2,3/4] selftests/bpf: Pass BPF skeleton to sockmap_listen ops tests https://git.kernel.org/bpf/bpf/c/b4ea530d024c - [bpf,v2,4/4] selftests/bpf: Cover listener cloning with progs attached to sockmap https://git.kernel.org/bpf/bpf/c/c88ea16a8f89 You are awesome, thank you!