On Mon, Jun 1, 2020 at 8:20 AM John Fastabend <john.fastabend@xxxxxxxxx> wrote: > > > @@ -1793,11 +1795,12 @@ int tls_sw_recvmsg(struct sock *sk, > > > > > > if (to_decrypt <= len && !is_kvec && !is_peek && > > > ctx->control == TLS_RECORD_TYPE_DATA && > > > - prot->version != TLS_1_3_VERSION) > > > + prot->version != TLS_1_3_VERSION && > > > + !sk_psock_strp_enabled(psock)) > > > > Is this recheck of parser state intentional? Or can we test for > > "!bpf_strp_enabled" here also? > > Yes I'll fix it up to use bpf_strp_enabled. Thanks I fixed that bit and applied the set. Thanks!