diff options
author | Kuniyuki Iwashima <kuniyu@amazon.com> | 2022-07-20 09:50:21 -0700 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2022-08-11 12:48:39 +0200 |
commit | 3bf8415f605526a7eea9f3f7d7e30d8867b2cd1e (patch) | |
tree | 50a1a4dc8bd92b345a77f9f79076edc069bb9ab7 | |
parent | 4de663459c66431cff2b0df46ccdef425753bcbd (diff) | |
download | linux-stable-3bf8415f605526a7eea9f3f7d7e30d8867b2cd1e.tar.gz linux-stable-3bf8415f605526a7eea9f3f7d7e30d8867b2cd1e.tar.bz2 linux-stable-3bf8415f605526a7eea9f3f7d7e30d8867b2cd1e.zip |
tcp: Fix a data-race around sysctl_tcp_challenge_ack_limit.
commit db3815a2fa691da145cfbe834584f31ad75df9ff upstream.
While reading sysctl_tcp_challenge_ack_limit, it can be changed
concurrently. Thus, we need to add READ_ONCE() to its reader.
Fixes: 282f23c6ee34 ("tcp: implement RFC 5961 3.2")
Signed-off-by: Kuniyuki Iwashima <kuniyu@amazon.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r-- | net/ipv4/tcp_input.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/net/ipv4/tcp_input.c b/net/ipv4/tcp_input.c index 0f9b91628eea..f2dac14caeb3 100644 --- a/net/ipv4/tcp_input.c +++ b/net/ipv4/tcp_input.c @@ -3468,7 +3468,7 @@ static void tcp_send_challenge_ack(struct sock *sk, const struct sk_buff *skb) /* Then check host-wide RFC 5961 rate limit. */ now = jiffies / HZ; if (now != challenge_timestamp) { - u32 ack_limit = net->ipv4.sysctl_tcp_challenge_ack_limit; + u32 ack_limit = READ_ONCE(net->ipv4.sysctl_tcp_challenge_ack_limit); u32 half = (ack_limit + 1) >> 1; challenge_timestamp = now; |