From: Christian Heusel <christian@xxxxxxxxx>
Date: Wed, 11 Jun 2025 13:46:01 +0200
On 25/06/10 09:22PM, Jacek Łuczak wrote:
Reverting entire SO_PASSRIGHTS fixes the issue.
Thanks for the report.
Could you test the diff below ?
look like some programs start listen()ing before setting
SO_PASSCRED or SO_PASSPIDFD and there's a small race window.
---8<---
diff --git a/net/unix/af_unix.c b/net/unix/af_unix.c
index fd6b5e17f6c4..87439d7f965d 100644
--- a/net/unix/af_unix.c
+++ b/net/unix/af_unix.c
@@ -1971,7 +1971,8 @@ static void unix_maybe_add_creds(struct sk_buff *skb, const struct sock *sk,
if (UNIXCB(skb).pid)
return;
- if (unix_may_passcred(sk) || unix_may_passcred(other)) {
+ if (unix_may_passcred(sk) || unix_may_passcred(other) ||
+ !other->sk_socket) {
UNIXCB(skb).pid = get_pid(task_tgid(current));
current_uid_gid(&UNIXCB(skb).uid, &UNIXCB(skb).gid);
}
---8<---