d503b30bd6
Assigning a socket in timewait state to skb->sk can trigger kernel oops, e.g. in nfnetlink_log, which does: if (skb->sk) { read_lock_bh(&skb->sk->sk_callback_lock); if (skb->sk->sk_socket && skb->sk->sk_socket->file) ... in the timewait case, accessing sk->sk_callback_lock and sk->sk_socket is invalid. Either all of these spots will need to add a test for sk->sk_state != TCP_TIME_WAIT, or xt_TPROXY must not assign a timewait socket to skb->sk. This does the latter. If a TW socket is found, assign the tproxy nfmark, but skip the skb->sk assignment, thus mimicking behaviour of a '-m socket .. -j MARK/ACCEPT' re-routing rule. The 'SYN to TW socket' case is left unchanged -- we try to redirect to the listener socket. Cc: Balazs Scheidler <bazsi@balabit.hu> Cc: KOVACS Krisztian <hidden@balabit.hu> Signed-off-by: Florian Westphal <fwestphal@astaro.com> Signed-off-by: Patrick McHardy <kaber@trash.net> |
||
---|---|---|
.. | ||
ipv4 | ||
ipv6 | ||
nf_conntrack.h | ||
nf_conntrack_acct.h | ||
nf_conntrack_core.h | ||
nf_conntrack_ecache.h | ||
nf_conntrack_expect.h | ||
nf_conntrack_extend.h | ||
nf_conntrack_helper.h | ||
nf_conntrack_l3proto.h | ||
nf_conntrack_l4proto.h | ||
nf_conntrack_tuple.h | ||
nf_conntrack_zones.h | ||
nf_log.h | ||
nf_nat.h | ||
nf_nat_core.h | ||
nf_nat_helper.h | ||
nf_nat_protocol.h | ||
nf_nat_rule.h | ||
nf_queue.h | ||
nf_tproxy_core.h | ||
nfnetlink_log.h | ||
xt_log.h | ||
xt_rateest.h |