Patch "tcp: fix sock skb accounting in tcp_read_skb()" has been added to the 5.15-stable tree

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



This is a note to let you know that I've just added the patch titled

    tcp: fix sock skb accounting in tcp_read_skb()

to the 5.15-stable tree which can be found at:
    http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary

The filename of the patch is:
     tcp-fix-sock-skb-accounting-in-tcp_read_skb.patch
and it can be found in the queue-5.15 subdirectory.

If you, or anyone else, feels it should not be added to the stable tree,
please let <stable@xxxxxxxxxxxxxxx> know about it.



commit 4920db06394f041b049e3d13016d15577051471d
Author: Cong Wang <cong.wang@xxxxxxxxxxxxx>
Date:   Wed Aug 17 12:54:42 2022 -0700

    tcp: fix sock skb accounting in tcp_read_skb()
    
    [ Upstream commit e9c6e79760265f019cde39d3f2c443dfbc1395b0 ]
    
    Before commit 965b57b469a5 ("net: Introduce a new proto_ops
    ->read_skb()"), skb was not dequeued from receive queue hence
    when we close TCP socket skb can be just flushed synchronously.
    
    After this commit, we have to uncharge skb immediately after being
    dequeued, otherwise it is still charged in the original sock. And we
    still need to retain skb->sk, as eBPF programs may extract sock
    information from skb->sk. Therefore, we have to call
    skb_set_owner_sk_safe() here.
    
    Fixes: 965b57b469a5 ("net: Introduce a new proto_ops ->read_skb()")
    Reported-and-tested-by: syzbot+a0e6f8738b58f7654417@xxxxxxxxxxxxxxxxxxxxxxxxx
    Tested-by: Stanislav Fomichev <sdf@xxxxxxxxxx>
    Cc: Eric Dumazet <edumazet@xxxxxxxxxx>
    Cc: John Fastabend <john.fastabend@xxxxxxxxx>
    Cc: Jakub Sitnicki <jakub@xxxxxxxxxxxxxx>
    Signed-off-by: Cong Wang <cong.wang@xxxxxxxxxxxxx>
    Signed-off-by: Jakub Kicinski <kuba@xxxxxxxxxx>
    Signed-off-by: Sasha Levin <sashal@xxxxxxxxxx>

diff --git a/net/ipv4/tcp.c b/net/ipv4/tcp.c
index 3fd4de1961a62..c826db961fc08 100644
--- a/net/ipv4/tcp.c
+++ b/net/ipv4/tcp.c
@@ -1720,6 +1720,7 @@ int tcp_read_skb(struct sock *sk, skb_read_actor_t recv_actor)
 		int used;
 
 		__skb_unlink(skb, &sk->sk_receive_queue);
+		WARN_ON(!skb_set_owner_sk_safe(skb, sk));
 		used = recv_actor(sk, skb);
 		if (used <= 0) {
 			if (!copied)




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux