From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pf1-f171.google.com (mail-pf1-f171.google.com [209.85.210.171]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D4B7F3ED12A for ; Fri, 8 May 2026 14:43:54 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.210.171 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778251437; cv=none; b=EbF9ejhHBWD0dYXG/CvZh1LjQ5eY+8Pt6yNv8IPNIhFrptv/QP/nRRR+Wyfz3vQmXeyQo9eFtIZLk40EkKbBypTOrYLATAuENUjYYrBi5/1y229YcRUKLP/B60O505MQVnGhADWJsPhqz1kXls9Wm+mO2zntmGUSzSNeU3wp+ok= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778251437; c=relaxed/simple; bh=EyXG+VwrAF+um4XflE0usQdCTWRvEq/i5fmd3Ev8uzE=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=Mn1sjPHIgOsDUn4ghmfxNrJUD4eZnuRT8y0gncVEu3rhul4ikYGHphCRc0a4H7L2mYVHLK+YM7fsu4/9Y0+nPVzwSDTZca4QE1kkwvtyaLdLNqtOlKzOu7Tf1z9fsb7slexNqoRlYsm5t+ecxVfNhglhrJtlaI25R7nT7Ni3h20= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=Dg8HjAmb; arc=none smtp.client-ip=209.85.210.171 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="Dg8HjAmb" Received: by mail-pf1-f171.google.com with SMTP id d2e1a72fcca58-8353ca0f1f1so1075679b3a.1 for ; Fri, 08 May 2026 07:43:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1778251434; x=1778856234; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=a2w1uSP/0twE+5ljaP1rCYoWbGtAjbga1hTtB1LlN6c=; b=Dg8HjAmbjrTgvDXVnmvLLG25cAknvGCWOVEvIZpItXfQt+6YIWNUAP0jI1hNIXzX23 IA4TJzQ9LQRSEcfKZQIgE5RsNd1iV5LBMtBCvx33MWIZmuxOShb7FYvNfAex3lt/+7DL SU4GoxlxwCb5srsbctjt5kYfB1AQLKL1FZWLtJ6z753owcHsQbG1RdpylocU6eofoIB/ 8d5Ig1EvZsJ7B1HsYqNkdXiPPh4+yKll97a0sMeTCDIfsYcN3fJ802iFti7Vu38lMOht VhHJ4+SYpyy5OjpMHI9xZNxZYljgSb3dXY/JncuRaL7kK+OoRPWCiJn0pzveQXJuUn21 bBYw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1778251434; x=1778856234; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=a2w1uSP/0twE+5ljaP1rCYoWbGtAjbga1hTtB1LlN6c=; b=FIeRgLWkDejVo5iuGt0/L+r9DdRCQFeQMVfqui08Bs9aFSZGg3ysU9D7wfFfBplUZD 5r093soP2wcxx4RXAOps6YEDmMvft+MDdRi0YcpqfEmh4+uGBEknWEp6Y2GDx6ty/I3u ySWczfBQmB9UML71KO9eCcTVraRDRbBLxv3YLSswDhbdWv3hgtlAbXG9wG/miP1XE15u CMk6k6AGgnQcsmwy+VkqxHUlpMWKxDcJnTgxQGbERd/5U3cC1b6XX0T9soJlOKFjjTZi 1KR+a03EjO0F46Y1Z//qmJoyaeqDe5NCW1cjh7wvyUJ/YCfD8dfNSj6LyIFd7iTqNIbC VZIw== X-Forwarded-Encrypted: i=1; AFNElJ/gwmC6rwUNifg49gv06AlkL4yBDTDSgZJ5T1Bv+kmsvfzeQHECTLFRPJC9SMVAE3Soki/Ij3wHo6U1iao=@vger.kernel.org X-Gm-Message-State: AOJu0YwxZmcds9NDErSafrsIDVfLqJCS+vYgLMxCi9N8t38tWtbwf3Cn sDrtGW46JwFShAZ6axqmwpcE++/CADj6vWWwzBY7RS8206tG7C1olB6C X-Gm-Gg: Acq92OFH1f2ynAuZhvy8jNFDj9UjY6eQL1Sq9YCR4RdvXax7Ow2pwAR+b+6TW/q25ao HUHXt7PvWMoNmcWqDg/U1i4gJ5s1VNGtRFaPfb/47GALXkz/lZGVTxcfqoUToydE7vy3Nog2UXu Hh5SYLhsrdjJ5vnflI4dT22qXyqfDBhkuee8pvT5O5WHuvg0FrVe/KfywcDLkC7LgucbCvrj4/o 5T35khH/PSPqXaT0izMvIhnu6ASOv1oq0Zy/rA3vSpdGPAw3s7AGUhZ+WEGftJj/YjXQCFasPoM fwYJV4iMnYo0yLQ26VR+tz5Mu9tHiokE+uA4C7jKBOsQiZ8Ga5qLD8GQyph+VljZczpukH8bZvU bHWOeu2C0OilPxd3HCAFunAXgaTS2doHP6TD7ThzowKHkxt14+O77d75ZU/7zankhTaY/diftQb FlFXGc5hKioBfd2im5SssiBc8DdCiEZ4ssbg== X-Received: by 2002:a05:6a00:2304:b0:837:8a0c:8f70 with SMTP id d2e1a72fcca58-83bb8691c49mr6557122b3a.28.1778251434012; Fri, 08 May 2026 07:43:54 -0700 (PDT) Received: from hyj0824TXAir ([110.65.147.186]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-83967dbdda0sm12856887b3a.44.2026.05.08.07.43.48 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 08 May 2026 07:43:53 -0700 (PDT) From: Linpu Yu To: kerneljasonxing@gmail.com, magnus.karlsson@intel.com, maciej.fijalkowski@intel.com, netdev@vger.kernel.org, bpf@vger.kernel.org Cc: sdf@fomichev.me, davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, horms@kernel.org, ast@kernel.org, daniel@iogearbox.net, hawk@kernel.org, john.fastabend@gmail.com, bjorn@kernel.org, linux-kernel@vger.kernel.org, tanyuan98@outlook.com, yifanwucs@gmail.com Subject: [PATCH bpf v4] xskmap: reject TX-only AF_XDP sockets Date: Fri, 8 May 2026 22:43:43 +0800 Message-ID: <20260508144344.694-1-linpu5433@gmail.com> X-Mailer: git-send-email 2.54.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit XSKMAP entries are used as redirect targets for incoming XDP frames. A TX-only AF_XDP socket lacks an Rx ring and cannot handle redirected traffic, but xsk_map_update_elem() currently allows such sockets to be inserted into the map. Redirecting packets to such a socket on the veth generic-XDP path causes a kernel crash in xsk_generic_rcv(). This became possible after xsk_is_setup_for_bpf_map() was removed from the XSKMAP update path, which allowed bound TX-only sockets to be inserted into the map. Reject TX-only sockets during XSKMAP updates to avoid the crash. They remain fully operational for pure Tx purposes outside XSKMAP. Fixes: 968be23ceaca ("xsk: Fix possible segfault at xskmap entry insertion") Reported-by: Juefei Pu Reported-by: Yuan Tan Reported-by: Xin Liu Signed-off-by: Yifan Wu Signed-off-by: Linpu Yu --- Changes in v4: - retarget the patch from bpf-next to bpf - resend after no feedback net/xdp/xskmap.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/net/xdp/xskmap.c b/net/xdp/xskmap.c index afa457506274..3bff346308d0 100644 --- a/net/xdp/xskmap.c +++ b/net/xdp/xskmap.c @@ -184,6 +184,10 @@ static long xsk_map_update_elem(struct bpf_map *map, void *key, void *value, } xs = (struct xdp_sock *)sock->sk; + if (!READ_ONCE(xs->rx)) { + sockfd_put(sock); + return -ENOBUFS; + } map_entry = &m->xsk_map[i]; node = xsk_map_node_alloc(m, map_entry); -- 2.54.0