From: Eric Dumazet Date: Tue, 12 Feb 2019 20:26:27 +0000 (-0800) Subject: net: fix possible overflow in __sk_mem_raise_allocated() X-Git-Tag: v4.19.88~86 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=d1dde4137a041ff4c928e3879cb95b300d901e9e;p=thirdparty%2Fkernel%2Fstable.git net: fix possible overflow in __sk_mem_raise_allocated() [ Upstream commit 5bf325a53202b8728cf7013b72688c46071e212e ] With many active TCP sockets, fat TCP sockets could fool __sk_mem_raise_allocated() thanks to an overflow. They would increase their share of the memory, instead of decreasing it. Signed-off-by: Eric Dumazet Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- diff --git a/include/net/sock.h b/include/net/sock.h index 0252c0d003104..4545a9ecc2193 100644 --- a/include/net/sock.h +++ b/include/net/sock.h @@ -1272,7 +1272,7 @@ static inline void sk_sockets_allocated_inc(struct sock *sk) percpu_counter_inc(sk->sk_prot->sockets_allocated); } -static inline int +static inline u64 sk_sockets_allocated_read_positive(struct sock *sk) { return percpu_counter_read_positive(sk->sk_prot->sockets_allocated); diff --git a/net/core/sock.c b/net/core/sock.c index ba4f843cdd1d1..bbde5f6a7dc91 100644 --- a/net/core/sock.c +++ b/net/core/sock.c @@ -2435,7 +2435,7 @@ int __sk_mem_raise_allocated(struct sock *sk, int size, int amt, int kind) } if (sk_has_memory_pressure(sk)) { - int alloc; + u64 alloc; if (!sk_under_memory_pressure(sk)) return 1;