tls: rx: remove the message decrypted tracking
authorJakub Kicinski <kuba@kernel.org>
Fri, 15 Jul 2022 05:22:28 +0000 (22:22 -0700)
committerDavid S. Miller <davem@davemloft.net>
Mon, 18 Jul 2022 10:24:10 +0000 (11:24 +0100)
We no longer allow a decrypted skb to remain linked to ctx->recv_pkt.
Anything on the list is decrypted, anything on ctx->recv_pkt needs
to be decrypted.

Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
include/net/strparser.h
net/tls/tls_sw.c

index 88900b0..41e2ce9 100644 (file)
@@ -72,7 +72,6 @@ struct sk_skb_cb {
        /* strp users' data follows */
        struct tls_msg {
                u8 control;
-               u8 decrypted;
        } tls;
        /* temp_reg is a temporary register used for bpf_convert_data_end_access
         * when dst_reg == src_reg.
index f5f06d1..49cfaa8 100644 (file)
@@ -1563,21 +1563,13 @@ static int decrypt_skb_update(struct sock *sk, struct sk_buff *skb,
        struct tls_context *tls_ctx = tls_get_ctx(sk);
        struct tls_prot_info *prot = &tls_ctx->prot_info;
        struct strp_msg *rxm = strp_msg(skb);
-       struct tls_msg *tlm = tls_msg(skb);
        int pad, err;
 
-       if (tlm->decrypted) {
-               darg->zc = false;
-               darg->async = false;
-               return 0;
-       }
-
        if (tls_ctx->rx_conf == TLS_HW) {
                err = tls_device_decrypted(sk, tls_ctx, skb, rxm);
                if (err < 0)
                        return err;
                if (err > 0) {
-                       tlm->decrypted = 1;
                        darg->zc = false;
                        darg->async = false;
                        goto decrypt_done;
@@ -1610,7 +1602,6 @@ decrypt_done:
        rxm->full_len -= pad;
        rxm->offset += prot->prepend_size;
        rxm->full_len -= prot->overhead_size;
-       tlm->decrypted = 1;
 decrypt_next:
        tls_advance_record_sn(sk, prot, &tls_ctx->rx);
 
@@ -2130,7 +2121,6 @@ static int tls_read_size(struct strparser *strp, struct sk_buff *skb)
        if (ret < 0)
                goto read_failure;
 
-       tlm->decrypted = 0;
        tlm->control = header[0];
 
        data_len = ((header[4] & 0xFF) | (header[3] << 8));