]> www.infradead.org Git - users/hch/dma-mapping.git/commit
tcp: Don't flag tcp_sk(sk)->rx_opt.saw_unknown for TCP AO.
authorKuniyuki Iwashima <kuniyu@amazon.com>
Wed, 3 Jul 2024 03:35:08 +0000 (20:35 -0700)
committerPaolo Abeni <pabeni@redhat.com>
Thu, 4 Jul 2024 09:56:12 +0000 (11:56 +0200)
commit4b74726c01b7a0b5e1029e1e9247fd81590da726
tree61acac47111feb419d2b48c0a20e86925cc6f4e8
parentaa09b7e0c12e8d7a5e098fa8a45015beb00f5c20
tcp: Don't flag tcp_sk(sk)->rx_opt.saw_unknown for TCP AO.

When we process segments with TCP AO, we don't check it in
tcp_parse_options().  Thus, opt_rx->saw_unknown is set to 1,
which unconditionally triggers the BPF TCP option parser.

Let's avoid the unnecessary BPF invocation.

Fixes: 0a3a809089eb ("net/tcp: Verify inbound TCP-AO signed segments")
Signed-off-by: Kuniyuki Iwashima <kuniyu@amazon.com>
Reviewed-by: Eric Dumazet <edumazet@google.com>
Acked-by: Dmitry Safonov <0x7f454c46@gmail.com>
Link: https://patch.msgid.link/20240703033508.6321-1-kuniyu@amazon.com
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
net/ipv4/tcp_input.c