diff options
| author | Cong Wang <[email protected]> | 2024-12-10 01:20:38 +0000 |
|---|---|---|
| committer | Daniel Borkmann <[email protected]> | 2024-12-20 16:59:47 +0000 |
| commit | 54f89b3178d5448dd4457afbb98fc1ab99090a65 (patch) | |
| tree | db313b7069a0cf84afe847dfdb5dccd49b98da70 /net/ipv4/tcp_bpf.c | |
| parent | selftests/bpf: Fix compilation error in get_uprobe_offset() (diff) | |
| download | kernel-54f89b3178d5448dd4457afbb98fc1ab99090a65.tar.gz kernel-54f89b3178d5448dd4457afbb98fc1ab99090a65.zip | |
tcp_bpf: Charge receive socket buffer in bpf_tcp_ingress()
When bpf_tcp_ingress() is called, the skmsg is being redirected to the
ingress of the destination socket. Therefore, we should charge its
receive socket buffer, instead of sending socket buffer.
Because sk_rmem_schedule() tests pfmemalloc of skb, we need to
introduce a wrapper and call it for skmsg.
Fixes: 604326b41a6f ("bpf, sockmap: convert to generic sk_msg interface")
Signed-off-by: Cong Wang <[email protected]>
Signed-off-by: Daniel Borkmann <[email protected]>
Reviewed-by: John Fastabend <[email protected]>
Link: https://lore.kernel.org/bpf/[email protected]
Diffstat (limited to 'net/ipv4/tcp_bpf.c')
| -rw-r--r-- | net/ipv4/tcp_bpf.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/net/ipv4/tcp_bpf.c b/net/ipv4/tcp_bpf.c index 99cef92e6290..b21ea634909c 100644 --- a/net/ipv4/tcp_bpf.c +++ b/net/ipv4/tcp_bpf.c @@ -49,7 +49,7 @@ static int bpf_tcp_ingress(struct sock *sk, struct sk_psock *psock, sge = sk_msg_elem(msg, i); size = (apply && apply_bytes < sge->length) ? apply_bytes : sge->length; - if (!sk_wmem_schedule(sk, size)) { + if (!__sk_rmem_schedule(sk, size, false)) { if (!copied) ret = -ENOMEM; break; |
