Searched hist:fd31f3996af2627106e22a9f8072764fede51161 (Results 1 – 2 of 2) sorted by relevance
/openbmc/linux/net/tls/ |
H A D | tls.h | diff fd31f3996af2627106e22a9f8072764fede51161 Fri Jul 15 00:22:35 CDT 2022 Jakub Kicinski <kuba@kernel.org> tls: rx: decrypt into a fresh skb
We currently CoW Rx skbs whenever we can't decrypt to a user space buffer. The skbs can be enormous (64kB) and CoW does a linear alloc which has a strong chance of failing under memory pressure. Or even without, skb_cow_data() assumes GFP_ATOMIC.
Allocate a new frag'd skb and decrypt into it. We finally take advantage of the decrypted skb getting returned via darg.
Signed-off-by: Jakub Kicinski <kuba@kernel.org> Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | tls_sw.c | diff fd31f3996af2627106e22a9f8072764fede51161 Fri Jul 15 00:22:35 CDT 2022 Jakub Kicinski <kuba@kernel.org> tls: rx: decrypt into a fresh skb
We currently CoW Rx skbs whenever we can't decrypt to a user space buffer. The skbs can be enormous (64kB) and CoW does a linear alloc which has a strong chance of failing under memory pressure. Or even without, skb_cow_data() assumes GFP_ATOMIC.
Allocate a new frag'd skb and decrypt into it. We finally take advantage of the decrypted skb getting returned via darg.
Signed-off-by: Jakub Kicinski <kuba@kernel.org> Signed-off-by: David S. Miller <davem@davemloft.net>
|