lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 29 Oct 2022 21:09:50 +0800 From: menglong8.dong@...il.com To: edumazet@...gle.com, kuba@...nel.org Cc: davem@...emloft.net, pabeni@...hat.com, yoshfuji@...ux-ipv6.org, dsahern@...nel.org, imagedong@...cent.com, kafai@...com, asml.silence@...il.com, keescook@...omium.org, linux-kernel@...r.kernel.org, netdev@...r.kernel.org Subject: [PATCH net-next 2/9] net: tcp: add 'drop_reason' field to struct tcp_skb_cb From: Menglong Dong <imagedong@...cent.com> Because of the long call chain on processing skb in TCP protocol, it's hard to pass the drop reason to the code where the skb is freed. Therefore, we can store the drop reason to skb->cb, and pass it to kfree_skb_reason(). I'm lucky, the struct tcp_skb_cb still has 4 bytes spare space for this purpose. Signed-off-by: Menglong Dong <imagedong@...cent.com> --- include/net/tcp.h | 3 +++ 1 file changed, 3 insertions(+) diff --git a/include/net/tcp.h b/include/net/tcp.h index 14d45661a84d..0b6e39ca83b4 100644 --- a/include/net/tcp.h +++ b/include/net/tcp.h @@ -888,6 +888,7 @@ struct tcp_skb_cb { has_rxtstamp:1, /* SKB has a RX timestamp */ unused:5; __u32 ack_seq; /* Sequence number ACK'd */ + enum skb_drop_reason drop_reason; /* Why skb is dropped */ union { struct { #define TCPCB_DELIVERED_CE_MASK ((1U<<20) - 1) @@ -912,6 +913,8 @@ struct tcp_skb_cb { }; #define TCP_SKB_CB(__skb) ((struct tcp_skb_cb *)&((__skb)->cb[0])) +#define TCP_SKB_DR(__skb, reason) \ + (TCP_SKB_CB(__skb)->drop_reason = SKB_DROP_REASON_##reason) extern const struct inet_connection_sock_af_ops ipv4_specific; -- 2.37.2
Powered by blists - more mailing lists