mirror of
http://git.haproxy.org/git/haproxy.git/
synced 2025-02-22 05:36:56 +00:00
MINOR: socket: don't ban all custom families from reuseport
The test on ss_family >= AF_MAX is too strict if we want to support new custom families, let's apply this to the real_family instead so that we check that the underlying socket supports reuseport.
This commit is contained in:
parent
2a799b64b0
commit
034974106f
@ -1150,7 +1150,7 @@ int _sock_supports_reuseport(const struct proto_fam *fam, int type, int protocol
|
||||
fd1 = fd2 = -1;
|
||||
|
||||
/* ignore custom sockets */
|
||||
if (!fam || fam->sock_family >= AF_MAX)
|
||||
if (!fam || real_family(fam->sock_family) >= AF_MAX)
|
||||
goto leave;
|
||||
|
||||
fd1 = socket(fam->sock_domain, type, protocol);
|
||||
@ -1162,7 +1162,7 @@ int _sock_supports_reuseport(const struct proto_fam *fam, int type, int protocol
|
||||
|
||||
/* bind to any address assigned by the kernel, we'll then try to do it twice */
|
||||
memset(&ss, 0, sizeof(ss));
|
||||
ss.ss_family = fam->sock_family;
|
||||
ss.ss_family = real_family(fam->sock_family);
|
||||
if (bind(fd1, (struct sockaddr *)&ss, fam->sock_addrlen) < 0)
|
||||
goto leave;
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user