diff options
author | Sabrina Dubroca <sd@queasysnail.net> | 2025-04-25 16:32:55 +0200 |
---|---|---|
committer | Steffen Klassert <steffen.klassert@secunet.com> | 2025-04-30 08:08:16 +0200 |
commit | 417fae2c40896f0a67ce7fa7d9b8c6056ec36dd9 (patch) | |
tree | ddee8145d74b866de6226628fc0d165630564853 /scripts/bpf_doc.py | |
parent | e3fd0577768584ece824c8b661c40fb3d912812a (diff) |
xfrm: ipcomp: fix truesize computation on receive
ipcomp_post_acomp currently drops all frags (via pskb_trim_unique(skb,
0)), and then subtracts the old skb->data_len from truesize. This
adjustment has already be done during trimming (in skb_condense), so
we don't need to do it again.
This shows up for example when running fragmented traffic over ipcomp,
we end up hitting the WARN_ON_ONCE in skb_try_coalesce.
Fixes: eb2953d26971 ("xfrm: ipcomp: Use crypto_acomp interface")
Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
Acked-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
Diffstat (limited to 'scripts/bpf_doc.py')
0 files changed, 0 insertions, 0 deletions