[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20220117092733.6627-1-gal@nvidia.com>
Date: Mon, 17 Jan 2022 11:27:31 +0200
From: Gal Pressman <gal@...dia.com>
To: Eric Dumazet <edumazet@...gle.com>,
Jakub Kicinski <kuba@...nel.org>,
"David S. Miller" <davem@...emloft.net>
CC: <netdev@...r.kernel.org>, Tariq Toukan <tariqt@...dia.com>,
Saeed Mahameed <saeedm@...dia.com>,
Gal Pressman <gal@...dia.com>
Subject: [PATCH net 0/2] Couple of skb memory leak fixes
As discussed in:
https://lore.kernel.org/netdev/20220102081253.9123-1-gal@nvidia.com/
These are the two followup suggestions from Eric and Jakub.
Patch #1 adds a sk_defer_free_flush() call to the kTLS splice_read
handler.
Patch #2 verifies the defer list is empty on socket destroy, and calls a
defer free flush as well.
Thanks!
Gal Pressman (2):
net/tls: Fix another skb memory leak when running kTLS traffic
net: Flush deferred skb free on socket destroy
net/core/sock.c | 3 +++
net/tls/tls_sw.c | 1 +
2 files changed, 4 insertions(+)
--
2.25.1
Powered by blists - more mailing lists