-
- Downloads
bpf: Fix wrong copied_seq calculation
[ Upstream commit 36b62df5683c315ba58c950f1a9c771c796c30ec ] 'sk->copied_seq' was updated in the tcp_eat_skb() function when the action of a BPF program was SK_REDIRECT. For other actions, like SK_PASS, the update logic for 'sk->copied_seq' was moved to tcp_bpf_recvmsg_parser() to ensure the accuracy of the 'fionread' feature. It works for a single stream_verdict scenario, as it also modified sk_data_ready->sk_psock_verdict_data_ready->tcp_read_skb to remove updating 'sk->copied_seq'. However, for programs where both stream_parser and stream_verdict are active (strparser purpose), tcp_read_sock() was used instead of tcp_read_skb() (sk_data_ready->strp_data_ready->tcp_read_sock). tcp_read_sock() now still updates 'sk->copied_seq', leading to duplicate updates. In summary, for strparser + SK_PASS, copied_seq is redundantly calculated in both tcp_read_sock() and tcp_bpf_recvmsg_parser(). The issue causes incorrect copied_seq calculations, which prevent correct data reads from the recv() interface in user-land. We do not want to add new proto_ops to implement a new version of tcp_read_sock, as this would introduce code complexity [1]. We could have added noack and copied_seq to desc, and then called ops->read_sock. However, unfortunately, other modules didn’t fully initialize desc to zero. So, for now, we are directly calling tcp_read_sock_noack() in tcp_bpf.c. [1]: https://lore.kernel.org/bpf/20241218053408.437295-1-mrpre@163.com Fixes: e5c6de5f ("bpf, sockmap: Incorrectly handling copied_seq") Suggested-by:Jakub Sitnicki <jakub@cloudflare.com> Signed-off-by:
Jiayuan Chen <mrpre@163.com> Signed-off-by:
Martin KaFai Lau <martin.lau@kernel.org> Reviewed-by:
Jakub Sitnicki <jakub@cloudflare.com> Acked-by:
John Fastabend <john.fastabend@gmail.com> Link: https://patch.msgid.link/20250122100917.49845-3-mrpre@163.com Signed-off-by:
Sasha Levin <sashal@kernel.org>
Showing
- include/linux/skmsg.h 2 additions, 0 deletionsinclude/linux/skmsg.h
- include/net/tcp.h 8 additions, 0 deletionsinclude/net/tcp.h
- net/core/skmsg.c 7 additions, 0 deletionsnet/core/skmsg.c
- net/ipv4/tcp.c 24 additions, 5 deletionsnet/ipv4/tcp.c
- net/ipv4/tcp_bpf.c 36 additions, 0 deletionsnet/ipv4/tcp_bpf.c
Loading
Please register or sign in to comment