Message ID | 20220302161723.3910001-1-eric.dumazet@gmail.com (mailing list archive) |
---|---|
State | Accepted |
Commit | 60ce37b03917e593d8e5d8bcc7ec820773daf81d |
Delegated to: | Netdev Maintainers |
Headers | show |
Series | [net,1/2] bpf, sockmap: Do not ignore orig_len parameter | expand |
Hello: This series was applied to netdev/net.git (master) by Jakub Kicinski <kuba@kernel.org>: On Wed, 2 Mar 2022 08:17:22 -0800 you wrote: > From: Eric Dumazet <edumazet@google.com> > > Currently, sk_psock_verdict_recv() returns skb->len > > This is problematic because tcp_read_sock() might have > passed orig_len < skb->len, due to the presence of TCP urgent data. > > [...] Here is the summary with links: - [net,1/2] bpf, sockmap: Do not ignore orig_len parameter https://git.kernel.org/netdev/net/c/60ce37b03917 - [net,2/2] tcp: make tcp_read_sock() more robust https://git.kernel.org/netdev/net/c/e3d5ea2c011e You are awesome, thank you!
diff --git a/net/core/skmsg.c b/net/core/skmsg.c index 8eb671c827f90f1f3d2514163fc82998c9906cb6..929a2b096b04e01b85bff0a69209413abe86102d 100644 --- a/net/core/skmsg.c +++ b/net/core/skmsg.c @@ -1153,7 +1153,7 @@ static int sk_psock_verdict_recv(read_descriptor_t *desc, struct sk_buff *skb, struct sk_psock *psock; struct bpf_prog *prog; int ret = __SK_DROP; - int len = skb->len; + int len = orig_len; /* clone here so sk_eat_skb() in tcp_read_sock does not drop our data */ skb = skb_clone(skb, GFP_ATOMIC);