From mboxrd@z Thu Jan 1 00:00:00 1970 From: John Fastabend Subject: [bpf PATCH 0/2] tls, sockmap, fixes for sk_wait_event Date: Wed, 22 Aug 2018 08:37:27 -0700 Message-ID: <20180822153314.27968.72499.stgit@john-Precision-Tower-5810> Mime-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Cc: netdev@vger.kernel.org, john.fastabend@gmail.com, davem@davemloft.net To: ast@kernel.org, daniel@iogearbox.net, davejwatson@fb.com Return-path: Received: from [184.63.162.180] ([184.63.162.180]:44138 "EHLO john-Precision-Tower-5810" rhost-flags-FAIL-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1728903AbeHVTJ6 (ORCPT ); Wed, 22 Aug 2018 15:09:58 -0400 Sender: netdev-owner@vger.kernel.org List-ID: I have been testing ktls and sockmap lately and noticed that neither was handling sk_write_space events correctly. We need to ensure these events are pushed down to the lower layer in all cases to handle the case where the lower layer sendpage call has called sk_wait_event and needs to be woken up. Without this I see occosional stalls of sndtimeo length while we wait for the timeout value even though space is available. Two fixes below. Thanks. --- John Fastabend (2): tls: possible hang when do_tcp_sendpages hits sndbuf is full case bpf: sockmap: write_space events need to be passed to TCP handler kernel/bpf/sockmap.c | 3 +++ net/tls/tls_main.c | 9 +++++++-- 2 files changed, 10 insertions(+), 2 deletions(-)