]> www.infradead.org Git - users/hch/xfs.git/commitdiff
mptcp: prevent excessive coalescing on receive
authorPaolo Abeni <pabeni@redhat.com>
Mon, 30 Dec 2024 18:12:32 +0000 (19:12 +0100)
committerJakub Kicinski <kuba@kernel.org>
Fri, 3 Jan 2025 02:44:03 +0000 (18:44 -0800)
Currently the skb size after coalescing is only limited by the skb
layout (the skb must not carry frag_list). A single coalesced skb
covering several MSS can potentially fill completely the receive
buffer. In such a case, the snd win will zero until the receive buffer
will be empty again, affecting tput badly.

Fixes: 8268ed4c9d19 ("mptcp: introduce and use mptcp_try_coalesce()")
Cc: stable@vger.kernel.org # please delay 2 weeks after 6.13-final release
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Reviewed-by: Mat Martineau <martineau@kernel.org>
Signed-off-by: Matthieu Baerts (NGI0) <matttbe@kernel.org>
Link: https://patch.msgid.link/20241230-net-mptcp-rbuf-fixes-v1-3-8608af434ceb@kernel.org
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
net/mptcp/protocol.c

index 5307fff9d995309591ed742801350078db519f79..1b2e7cbb577fc26280f31e58adceb36987112f54 100644 (file)
@@ -136,6 +136,7 @@ static bool mptcp_try_coalesce(struct sock *sk, struct sk_buff *to,
        int delta;
 
        if (MPTCP_SKB_CB(from)->offset ||
+           ((to->len + from->len) > (sk->sk_rcvbuf >> 3)) ||
            !skb_try_coalesce(to, from, &fragstolen, &delta))
                return false;