diff options
author | Jakub Kicinski <jakub.kicinski@netronome.com> | 2019-08-02 00:36:01 +0300 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2019-08-05 23:15:30 +0300 |
commit | 5d92e631b8be8965a90c144320f06e096081a551 (patch) | |
tree | 41e1a228876173203fce25c0dd5affc20557e683 /Documentation | |
parent | 4130741736d4bc27add2ab4f7e53bc401846ce27 (diff) | |
download | linux-5d92e631b8be8965a90c144320f06e096081a551.tar.xz |
net/tls: partially revert fix transition through disconnect with close
Looks like we were slightly overzealous with the shutdown()
cleanup. Even though the sock->sk_state can reach CLOSED again,
socket->state will not got back to SS_UNCONNECTED once
connections is ESTABLISHED. Meaning we will see EISCONN if
we try to reconnect, and EINVAL if we try to listen.
Only listen sockets can be shutdown() and reused, but since
ESTABLISHED sockets can never be re-connected() or used for
listen() we don't need to try to clean up the ULP state early.
Fixes: 32857cf57f92 ("net/tls: fix transition through disconnect with close")
Signed-off-by: Jakub Kicinski <jakub.kicinski@netronome.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'Documentation')
-rw-r--r-- | Documentation/networking/tls-offload.rst | 6 |
1 files changed, 0 insertions, 6 deletions
diff --git a/Documentation/networking/tls-offload.rst b/Documentation/networking/tls-offload.rst index 2d9f9ebf4117..b70b70dc4524 100644 --- a/Documentation/networking/tls-offload.rst +++ b/Documentation/networking/tls-offload.rst @@ -524,9 +524,3 @@ Redirects leak clear text In the RX direction, if segment has already been decrypted by the device and it gets redirected or mirrored - clear text will be transmitted out. - -shutdown() doesn't clear TLS state ----------------------------------- - -shutdown() system call allows for a TLS socket to be reused as a different -connection. Offload doesn't currently handle that. |