-
Notifications
You must be signed in to change notification settings - Fork 150
bpf, sockmap: Fix tp->copied_seq update in, tcp_bpf_strp_read_sock #10227
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: bpf-next_base
Are you sure you want to change the base?
Conversation
|
Upstream branch: b54a8e1 |
f6af497 to
baaa336
Compare
|
Upstream branch: 6f1f4c1 |
fb13f95 to
8745e32
Compare
baaa336 to
b6555d5
Compare
|
Upstream branch: f8c67d8 |
8745e32 to
13996fd
Compare
b6555d5 to
910d3ce
Compare
|
Upstream branch: 026bcf9 |
13996fd to
381f5d0
Compare
910d3ce to
50dc55d
Compare
|
Upstream branch: f1d8c65 |
381f5d0 to
1f4339e
Compare
50dc55d to
f882b4c
Compare
|
Upstream branch: 93ce3be |
1f4339e to
677546b
Compare
f882b4c to
4752827
Compare
|
Upstream branch: 93ce3be |
677546b to
3ecd7c9
Compare
4752827 to
05f2f03
Compare
|
Upstream branch: c1da3df |
3ecd7c9 to
a1ba8ed
Compare
05f2f03 to
c343f72
Compare
|
Upstream branch: e5d2e34 |
a1ba8ed to
41affe9
Compare
c343f72 to
6a32d09
Compare
|
Upstream branch: fea3f5e |
41affe9 to
6576052
Compare
6a32d09 to
b967d93
Compare
|
Upstream branch: 63066b7 |
6576052 to
85c1261
Compare
b967d93 to
250c35a
Compare
|
Upstream branch: c133390 |
85c1261 to
155236b
Compare
250c35a to
5630fb8
Compare
|
Upstream branch: ef2c0b2 |
155236b to
61da126
Compare
5630fb8 to
f815251
Compare
|
Upstream branch: a4d31f4 |
61da126 to
de88ed9
Compare
f815251 to
eb66b0c
Compare
|
Upstream branch: 4f7bc83 |
de88ed9 to
473c380
Compare
eb66b0c to
bfad2ee
Compare
|
Upstream branch: 6cc73f3 |
473c380 to
302d0ae
Compare
bfad2ee to
4a6b8b7
Compare
|
Upstream branch: 4722981 |
In the tcp_read_sock_noack function, received packets may be destined for either the current sk or another sk. In my test case, the first packet of the connection is sent to the current sk, while subsequent packets are sent to another sk. When the first packet is forwarded, tp->copied_seq is updated in tcp_bpf_recvmsg_parser. However, since psock->copied_seq accumulates the length of every processed packet, using psock->copied_seq to update tp->copied_seq when processing the second packet would lead to incorrect behavior. Therefore, we only need to update tp->copied_seq in cases where packets are forwarded to another sk. Signed-off-by: GuoYong Zheng <[email protected]>
302d0ae to
1273690
Compare
Pull request for series with
subject: bpf, sockmap: Fix tp->copied_seq update in, tcp_bpf_strp_read_sock
version: 1
url: https://patchwork.kernel.org/project/netdevbpf/list/?series=1020412