On 08/24/2018 01:08 PM, Daniel Borkmann wrote: > In bpf_tcp_recvmsg() we first took a reference on the psock, however > once we find that there are skbs in the normal socket's receive queue > we return with processing them through tcp_recvmsg(). Problem is that > we leak the taken reference on the psock in that path. Given we don't > really do anything with the psock at this point, move the skb_queue_empty() > test before we fetch the psock to fix this case. > > Fixes: 8934ce2fd081 ("bpf: sockmap redirect ingress support") > Signed-off-by: Daniel Borkmann <dan...@iogearbox.net> > ---
Oops. Thanks for catching this, all of our use cases and tests to this point either always did redirect or normal receive and I missed the mixed case. I'll write a tests for bpf-next to also ensure we catch anything else. Thanks. Acked-by: John Fastabend <john.fastab...@gmail.com>