summaryrefslogtreecommitdiff
path: root/mm/ksm.c
diff options
context:
space:
mode:
authorRohit Maheshwari <rohitm@chelsio.com>2020-02-19 09:40:22 +0530
committerDavid S. Miller <davem@davemloft.net>2020-02-19 16:32:06 -0800
commit06f5201c6392f998a49ca9c9173e2930c8eb51d8 (patch)
tree6baee5284ee029e9082e843ac434d667fbdf60ef /mm/ksm.c
parent33c4acbe2f4e8f2866914b1fb90ce74fc7216c21 (diff)
downloadlinux-next-06f5201c6392f998a49ca9c9173e2930c8eb51d8.tar.gz
net/tls: Fix to avoid gettig invalid tls record
Current code doesn't check if tcp sequence number is starting from (/after) 1st record's start sequnce number. It only checks if seq number is before 1st record's end sequnce number. This problem will always be a possibility in re-transmit case. If a record which belongs to a requested seq number is already deleted, tls_get_record will start looking into list and as per the check it will look if seq number is before the end seq of 1st record, which will always be true and will return 1st record always, it should in fact return NULL. As part of the fix, start looking each record only if the sequence number lies in the list else return NULL. There is one more check added, driver look for the start marker record to handle tcp packets which are before the tls offload start sequence number, hence return 1st record if the record is tls start marker and seq number is before the 1st record's starting sequence number. Fixes: e8f69799810c ("net/tls: Add generic NIC offload infrastructure") Signed-off-by: Rohit Maheshwari <rohitm@chelsio.com> Reviewed-by: Jakub Kicinski <kuba@kernel.org> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'mm/ksm.c')
0 files changed, 0 insertions, 0 deletions