mirror of https://gitee.com/openkylin/linux.git
netfilter: nft_socket: fix erroneous socket assignment
The socket assignment is wrong, see skb_orphan():
When skb->destructor callback is not set, but skb->sk is set, this hits BUG().
Link: https://bugzilla.redhat.com/show_bug.cgi?id=1651813
Fixes: 554ced0a6e
("netfilter: nf_tables: add support for native socket matching")
Signed-off-by: Fernando Fernandez Mancera <ffmancera@riseup.net>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
This commit is contained in:
parent
48bd0d68cd
commit
039b1f4f24
|
@ -47,9 +47,6 @@ static void nft_socket_eval(const struct nft_expr *expr,
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* So that subsequent socket matching not to require other lookups. */
|
|
||||||
skb->sk = sk;
|
|
||||||
|
|
||||||
switch(priv->key) {
|
switch(priv->key) {
|
||||||
case NFT_SOCKET_TRANSPARENT:
|
case NFT_SOCKET_TRANSPARENT:
|
||||||
nft_reg_store8(dest, inet_sk_transparent(sk));
|
nft_reg_store8(dest, inet_sk_transparent(sk));
|
||||||
|
@ -66,6 +63,9 @@ static void nft_socket_eval(const struct nft_expr *expr,
|
||||||
WARN_ON(1);
|
WARN_ON(1);
|
||||||
regs->verdict.code = NFT_BREAK;
|
regs->verdict.code = NFT_BREAK;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (sk != skb->sk)
|
||||||
|
sock_gen_put(sk);
|
||||||
}
|
}
|
||||||
|
|
||||||
static const struct nla_policy nft_socket_policy[NFTA_SOCKET_MAX + 1] = {
|
static const struct nla_policy nft_socket_policy[NFTA_SOCKET_MAX + 1] = {
|
||||||
|
|
Loading…
Reference in New Issue