[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <155667629056.4128.14102391877350907561.stgit@john-XPS-13-9360>
Date: Tue, 30 Apr 2019 19:06:42 -0700
From: John Fastabend <john.fastabend@...il.com>
To: jakub.kicinski@...ronome.com, ast@...nel.org, daniel@...earbox.net
Cc: netdev@...r.kernel.org, bpf@...r.kernel.org,
john.fastabend@...il.com
Subject: [bpf-next PATCH v3 0/4] sockmap/ktls fixes
Series of fixes for sockmap and ktls, see patches for descriptions.
v2: fix build issue for CONFIG_TLS_DEVICE and fixup couple comments
from Jakub
v3: fix issue where release could call unhash resulting in a use after
free. Now we detach the ulp pointer before calling into destroy
or unhash. This way if we get a callback into unhash from destroy
path there is no ulp to access. The fallout is we must pass the
ctx into the functions rather than use the sk lookup in each
routine. This is probably better anyways.
@Jakub, I did not fix the hw device case it seems the ulp ptr is
needed for the hardware teardown but this is buggy for sure. Its
not clear to me how to resolve the hw issue at the moment so fix
the sw path why we discuss it.
---
John Fastabend (4):
bpf: tls, implement unhash to avoid transition out of ESTABLISHED
bpf: sockmap remove duplicate queue free
bpf: sockmap fix msg->sg.size account on ingress skb
bpf: sockmap, only stop/flush strp if it was enabled at some point
include/net/tls.h | 24 ++++++++++++---
net/core/skmsg.c | 7 +++-
net/ipv4/tcp_bpf.c | 2 -
net/tls/tls_device.c | 6 ++--
net/tls/tls_main.c | 78 +++++++++++++++++++++++++++++++++-----------------
net/tls/tls_sw.c | 51 ++++++++++++++++-----------------
6 files changed, 103 insertions(+), 65 deletions(-)
--
Signature
Powered by blists - more mailing lists