[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1497035857-9927-1-git-send-email-chenbofeng.kernel@gmail.com>
Date: Fri, 9 Jun 2017 12:17:37 -0700
From: Chenbo Feng <chenbofeng.kernel@...il.com>
To: netdev@...r.kernel.org, David Miller <davem@...emloft.net>
Cc: Lorenzo Colitti <lorenzo@...gle.com>,
Eric Dumazet <edumazet@...gle.com>,
Chenbo Feng <fengc@...gle.com>
Subject: [PATCH net-next] bpf: Remove duplicate tcp_filter hook in ipv6
From: Chenbo Feng <fengc@...gle.com>
There are two tcp_filter hooks in tcp_ipv6 ingress path currently.
One is at tcp_v6_rcv and another is in tcp_v6_do_rcv. It seems the
tcp_filter() call inside tcp_v6_do_rcv is redundent and some packet
will be filtered twice in this situation. This will cause trouble
when using eBPF filters to account traffic data.
Signed-off-by: Chenbo Feng <fengc@...gle.com>
Acked-by: Eric Dumazet <edumazet@...gle.com>
---
net/ipv6/tcp_ipv6.c | 3 ---
1 file changed, 3 deletions(-)
diff --git a/net/ipv6/tcp_ipv6.c b/net/ipv6/tcp_ipv6.c
index 0840543..84ad502 100644
--- a/net/ipv6/tcp_ipv6.c
+++ b/net/ipv6/tcp_ipv6.c
@@ -1249,9 +1249,6 @@ static int tcp_v6_do_rcv(struct sock *sk, struct sk_buff *skb)
if (skb->protocol == htons(ETH_P_IP))
return tcp_v4_do_rcv(sk, skb);
- if (tcp_filter(sk, skb))
- goto discard;
-
/*
* socket locking is here for SMP purposes as backlog rcv
* is currently called with bh processing disabled.
--
2.7.4
Powered by blists - more mailing lists