linux/net/tls
Jakub Kicinski 8a0d57df89 tls: improve lockless access safety of tls_err_abort()
Most protos' poll() methods insert a memory barrier between
writes to sk_err and sk_error_report(). This dates back to
commit a4d258036e ("tcp: Fix race in tcp_poll").

I guess we should do the same thing in TLS, tcp_poll() does
not hold the socket lock.

Fixes: 3c4d755915 ("tls: kernel TLS support")
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Reviewed-by: Simon Horman <simon.horman@corigine.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2023-05-26 10:35:58 +01:00
..
Kconfig net/tls: Select SOCK_RX_QUEUE_MAPPING from TLS_DEVICE 2021-02-11 19:08:06 -08:00
Makefile tls: rx: async: hold onto the input skb 2022-07-18 11:24:11 +01:00
tls_device_fallback.c net/tls: Fix memory leak in tls_enc_skb() and tls_sw_fallback_init() 2022-11-11 20:08:17 -08:00
tls_device.c tls: rx: strp: preserve decryption status of skbs when needed 2023-05-19 08:37:37 +01:00
tls_main.c net: deal with most data-races in sk_wait_event() 2023-05-10 10:03:32 +01:00
tls_proc.c tls: rx: add counter for NoPad violations 2022-07-11 19:48:33 -07:00
tls_strp.c tls: improve lockless access safety of tls_err_abort() 2023-05-26 10:35:58 +01:00
tls_sw.c tls: improve lockless access safety of tls_err_abort() 2023-05-26 10:35:58 +01:00
tls_toe.c tls: create an internal header 2022-07-08 18:38:45 -07:00
tls.h tls: rx: strp: preserve decryption status of skbs when needed 2023-05-19 08:37:37 +01:00
trace.c
trace.h