Michal Luczaj 75e072a390 bpf, sockmap: Fix update element with same
Consider a sockmap entry being updated with the same socket:

	osk = stab->sks[idx];
	sock_map_add_link(psock, link, map, &stab->sks[idx]);
	stab->sks[idx] = sk;
	if (osk)
		sock_map_unref(osk, &stab->sks[idx]);

Due to sock_map_unref(), which invokes sock_map_del_link(), all the
psock's links for stab->sks[idx] are torn:

	list_for_each_entry_safe(link, tmp, &psock->link, list) {
		if (link->link_raw == link_raw) {
			...
			list_del(&link->list);
			sk_psock_free_link(link);
		}
	}

And that includes the new link sock_map_add_link() added just before
the unref.

This results in a sockmap holding a socket, but without the respective
link. This in turn means that close(sock) won't trigger the cleanup,
i.e. a closed socket will not be automatically removed from the sockmap.

Stop tearing the links when a matching link_raw is found.

Fixes: 604326b41a6f ("bpf, sockmap: convert to generic sk_msg interface")
Signed-off-by: Michal Luczaj <mhal@rbox.co>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Reviewed-by: John Fastabend <john.fastabend@gmail.com>
Link: https://lore.kernel.org/bpf/20241202-sockmap-replace-v1-1-1e88579e7bd5@rbox.co
2024-12-10 17:37:02 +01:00
..
2024-11-11 10:32:06 -08:00
2024-10-04 12:42:32 +01:00
2024-06-14 19:08:50 -07:00
2024-10-08 15:33:49 -07:00
2024-10-15 18:52:26 -07:00
2024-11-03 10:36:34 -08:00
2024-12-06 15:07:48 -08:00
2024-11-21 08:28:08 -08:00
2024-11-18 11:52:49 +00:00
2024-10-10 08:30:21 -07:00
2024-10-08 15:16:59 +02:00
2024-10-10 08:30:21 -07:00
2024-11-21 08:28:08 -08:00