[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <155746412544.20677.8888193135689886027.stgit@john-XPS-13-9360>
Date: Thu, 09 May 2019 21:57:30 -0700
From: John Fastabend <john.fastabend@...il.com>
To: jakub.kicinski@...ronome.com, ast@...nel.org, daniel@...earbox.net
Cc: netdev@...r.kernel.org, bpf@...r.kernel.org,
john.fastabend@...il.com
Subject: [bpf PATCH v4 0/4] sockmap/ktls fixes
Series of fixes for sockmap and ktls, see patches for descriptions.
v2: fix build issue for CONFIG_TLS_DEVICE and fixup couple comments
from Jakub
v3: fix issue where release could call unhash resulting in a use after
free. Now we detach the ulp pointer before calling into destroy
or unhash. This way if we get a callback into unhash from destroy
path there is no ulp to access. The fallout is we must pass the
ctx into the functions rather than use the sk lookup in each
routine. This is probably better anyways.
v4: move unhash routine to TLS_SW only, hardware offloads need to
keep ctx around long enough to free in-flight context. We will
need a follow up fix for this.
---
John Fastabend (4):
bpf: tls, implement unhash to avoid transition out of ESTABLISHED
bpf: sockmap, only stop/flush strp if it was enabled at some point
bpf: sockmap remove duplicate queue free
bpf: sockmap fix msg->sg.size account on ingress skb
include/net/tls.h | 28 +++++++---
net/core/skmsg.c | 7 ++-
net/ipv4/tcp_bpf.c | 2 -
net/tls/tls_device.c | 10 ++--
net/tls/tls_main.c | 82 ++++++++++++++++++++---------
net/tls/tls_sw.c | 140 +++++++++++++++++++++++++++++---------------------
6 files changed, 166 insertions(+), 103 deletions(-)
--
Signature
Powered by blists - more mailing lists