diff options
| author | Jakub Kicinski <kuba@kernel.org> | 2022-07-15 08:22:35 +0300 |
|---|---|---|
| committer | David S. Miller <davem@davemloft.net> | 2022-07-18 13:24:11 +0300 |
| commit | fd31f3996af2627106e22a9f8072764fede51161 (patch) | |
| tree | 9f364a6ce7ecb7b5b94daba90002b6cfee8dc4c8 /include/linux/timerqueue.h | |
| parent | cbbdee9918a2662914f411aa999f2f80bf044a30 (diff) | |
| download | linux-fd31f3996af2627106e22a9f8072764fede51161.tar.xz | |
tls: rx: decrypt into a fresh skb
We currently CoW Rx skbs whenever we can't decrypt to a user
space buffer. The skbs can be enormous (64kB) and CoW does
a linear alloc which has a strong chance of failing under
memory pressure. Or even without, skb_cow_data() assumes
GFP_ATOMIC.
Allocate a new frag'd skb and decrypt into it. We finally
take advantage of the decrypted skb getting returned via
darg.
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'include/linux/timerqueue.h')
0 files changed, 0 insertions, 0 deletions
