u32 *dest,
const struct nft_pktinfo *pkt)
{
- struct sock *sk = skb_to_full_sk(pkt->skb);
- struct socket *sock;
+ const struct sock *sk = skb_to_full_sk(pkt->skb);
+ const struct socket *sock;
+ const struct file *file;
if (!sk || !sk_fullsock(sk) || !net_eq(nft_net(pkt), sock_net(sk)))
return false;
- read_lock_bh(&sk->sk_callback_lock);
- sock = sk->sk_socket;
- if (!sock || !sock->file) {
- read_unlock_bh(&sk->sk_callback_lock);
+ /* The sk pointer remains valid as long as the skb is. The sk_socket and
+ * file pointer may become NULL if the socket is closed. Both structures
+ * (including file->cred) are RCU freed which means they can be accessed
+ * within a RCU read section.
+ */
+ sock = READ_ONCE(sk->sk_socket);
+ file = sock ? READ_ONCE(sock->file) : NULL;
+ if (!file)
return false;
- }
switch (key) {
case NFT_META_SKUID:
*dest = from_kuid_munged(sock_net(sk)->user_ns,
- sock->file->f_cred->fsuid);
+ file->f_cred->fsuid);
break;
case NFT_META_SKGID:
*dest = from_kgid_munged(sock_net(sk)->user_ns,
- sock->file->f_cred->fsgid);
+ file->f_cred->fsgid);
break;
default:
break;
}
- read_unlock_bh(&sk->sk_callback_lock);
return true;
}