]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
tcp_bpf: Charge receive socket buffer in bpf_tcp_ingress()
authorCong Wang <cong.wang@bytedance.com>
Tue, 10 Dec 2024 01:20:38 +0000 (01:20 +0000)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 9 Jan 2025 12:24:56 +0000 (13:24 +0100)
[ Upstream commit 54f89b3178d5448dd4457afbb98fc1ab99090a65 ]

When bpf_tcp_ingress() is called, the skmsg is being redirected to the
ingress of the destination socket. Therefore, we should charge its
receive socket buffer, instead of sending socket buffer.

Because sk_rmem_schedule() tests pfmemalloc of skb, we need to
introduce a wrapper and call it for skmsg.

Fixes: 604326b41a6f ("bpf, sockmap: convert to generic sk_msg interface")
Signed-off-by: Cong Wang <cong.wang@bytedance.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Reviewed-by: John Fastabend <john.fastabend@gmail.com>
Link: https://lore.kernel.org/bpf/20241210012039.1669389-2-zijianzhang@bytedance.com
Signed-off-by: Sasha Levin <sashal@kernel.org>
include/net/sock.h
net/ipv4/tcp_bpf.c

index c45958a68978e104ef8ea18742e7f80a4c678e8c..548f9aab9aa105fca90493f47b15761b510850b2 100644 (file)
@@ -1525,7 +1525,7 @@ static inline bool sk_wmem_schedule(struct sock *sk, int size)
 }
 
 static inline bool
-sk_rmem_schedule(struct sock *sk, struct sk_buff *skb, int size)
+__sk_rmem_schedule(struct sock *sk, int size, bool pfmemalloc)
 {
        int delta;
 
@@ -1533,7 +1533,13 @@ sk_rmem_schedule(struct sock *sk, struct sk_buff *skb, int size)
                return true;
        delta = size - sk->sk_forward_alloc;
        return delta <= 0 || __sk_mem_schedule(sk, delta, SK_MEM_RECV) ||
-               skb_pfmemalloc(skb);
+              pfmemalloc;
+}
+
+static inline bool
+sk_rmem_schedule(struct sock *sk, struct sk_buff *skb, int size)
+{
+       return __sk_rmem_schedule(sk, size, skb_pfmemalloc(skb));
 }
 
 static inline void sk_mem_reclaim(struct sock *sk)
index 85ae2c310148da9124625e74bd8fce85a0313ed2..804464beb34396ee0d059679d6f5b9283f4453ad 100644 (file)
@@ -111,7 +111,7 @@ static int bpf_tcp_ingress(struct sock *sk, struct sk_psock *psock,
                sge = sk_msg_elem(msg, i);
                size = (apply && apply_bytes < sge->length) ?
                        apply_bytes : sge->length;
-               if (!sk_wmem_schedule(sk, size)) {
+               if (!__sk_rmem_schedule(sk, size, false)) {
                        if (!copied)
                                ret = -ENOMEM;
                        break;