diff options
author | Jakub Kicinski <kuba@kernel.org> | 2023-05-17 03:50:37 +0200 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2023-05-19 09:37:37 +0200 |
commit | 210620ae44a83f25220450bbfcc22e6fe986b25f (patch) | |
tree | b036664e7653b0aac340b40233a9d0116e11d1c1 /net/tls/tls_strp.c | |
parent | tls: rx: device: fix checking decryption status (diff) | |
download | linux-210620ae44a83f25220450bbfcc22e6fe986b25f.tar.xz linux-210620ae44a83f25220450bbfcc22e6fe986b25f.zip |
tls: rx: strp: set the skb->len of detached / CoW'ed skbs
alloc_skb_with_frags() fills in page frag sizes but does not
set skb->len and skb->data_len. Set those correctly otherwise
device offload will most likely generate an empty skb and
hit the BUG() at the end of __skb_nsg().
Fixes: 84c61fe1a75b ("tls: rx: do not use the standard strparser")
Tested-by: Shai Amiram <samiram@nvidia.com>
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Reviewed-by: Simon Horman <simon.horman@corigine.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/tls/tls_strp.c')
-rw-r--r-- | net/tls/tls_strp.c | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/net/tls/tls_strp.c b/net/tls/tls_strp.c index 955ac3e0bf4d..24016c865e00 100644 --- a/net/tls/tls_strp.c +++ b/net/tls/tls_strp.c @@ -56,6 +56,8 @@ static struct sk_buff *tls_strp_msg_make_copy(struct tls_strparser *strp) offset += skb_frag_size(frag); } + skb->len = strp->stm.full_len; + skb->data_len = strp->stm.full_len; skb_copy_header(skb, strp->anchor); rxm = strp_msg(skb); rxm->offset = 0; |