diff options
author | Cong Wang <cong.wang@bytedance.com> | 2024-12-10 02:20:38 +0100 |
---|---|---|
committer | Daniel Borkmann <daniel@iogearbox.net> | 2024-12-20 17:59:47 +0100 |
commit | 54f89b3178d5448dd4457afbb98fc1ab99090a65 (patch) | |
tree | db313b7069a0cf84afe847dfdb5dccd49b98da70 /net | |
parent | selftests/bpf: Fix compilation error in get_uprobe_offset() (diff) | |
download | linux-54f89b3178d5448dd4457afbb98fc1ab99090a65.tar.xz linux-54f89b3178d5448dd4457afbb98fc1ab99090a65.zip |
tcp_bpf: Charge receive socket buffer in bpf_tcp_ingress()
When bpf_tcp_ingress() is called, the skmsg is being redirected to the
ingress of the destination socket. Therefore, we should charge its
receive socket buffer, instead of sending socket buffer.
Because sk_rmem_schedule() tests pfmemalloc of skb, we need to
introduce a wrapper and call it for skmsg.
Fixes: 604326b41a6f ("bpf, sockmap: convert to generic sk_msg interface")
Signed-off-by: Cong Wang <cong.wang@bytedance.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Reviewed-by: John Fastabend <john.fastabend@gmail.com>
Link: https://lore.kernel.org/bpf/20241210012039.1669389-2-zijianzhang@bytedance.com
Diffstat (limited to 'net')
-rw-r--r-- | net/ipv4/tcp_bpf.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/net/ipv4/tcp_bpf.c b/net/ipv4/tcp_bpf.c index 99cef92e6290..b21ea634909c 100644 --- a/net/ipv4/tcp_bpf.c +++ b/net/ipv4/tcp_bpf.c @@ -49,7 +49,7 @@ static int bpf_tcp_ingress(struct sock *sk, struct sk_psock *psock, sge = sk_msg_elem(msg, i); size = (apply && apply_bytes < sge->length) ? apply_bytes : sge->length; - if (!sk_wmem_schedule(sk, size)) { + if (!__sk_rmem_schedule(sk, size, false)) { if (!copied) ret = -ENOMEM; break; |