|
@@ -1462,10 +1462,16 @@ static void smap_destroy_psock(struct rcu_head *rcu)
|
|
|
schedule_work(&psock->gc_work);
|
|
|
}
|
|
|
|
|
|
+static bool psock_is_smap_sk(struct sock *sk)
|
|
|
+{
|
|
|
+ return inet_csk(sk)->icsk_ulp_ops == &bpf_tcp_ulp_ops;
|
|
|
+}
|
|
|
+
|
|
|
static void smap_release_sock(struct smap_psock *psock, struct sock *sock)
|
|
|
{
|
|
|
if (refcount_dec_and_test(&psock->refcnt)) {
|
|
|
- tcp_cleanup_ulp(sock);
|
|
|
+ if (psock_is_smap_sk(sock))
|
|
|
+ tcp_cleanup_ulp(sock);
|
|
|
write_lock_bh(&sock->sk_callback_lock);
|
|
|
smap_stop_sock(psock, sock);
|
|
|
write_unlock_bh(&sock->sk_callback_lock);
|
|
@@ -1892,6 +1898,10 @@ static int __sock_map_ctx_update_elem(struct bpf_map *map,
|
|
|
* doesn't update user data.
|
|
|
*/
|
|
|
if (psock) {
|
|
|
+ if (!psock_is_smap_sk(sock)) {
|
|
|
+ err = -EBUSY;
|
|
|
+ goto out_progs;
|
|
|
+ }
|
|
|
if (READ_ONCE(psock->bpf_parse) && parse) {
|
|
|
err = -EBUSY;
|
|
|
goto out_progs;
|