Loading net/tls/tls_sw.c +5 −5 Original line number Diff line number Diff line Loading @@ -1709,7 +1709,7 @@ static int process_rx_list(struct tls_sw_context_rx *ctx, next_skb = skb_peek_next(skb, &ctx->rx_list); if (!is_peek) { skb_unlink(skb, &ctx->rx_list); __skb_unlink(skb, &ctx->rx_list); consume_skb(skb); } Loading Loading @@ -1824,7 +1824,7 @@ int tls_sw_recvmsg(struct sock *sk, ctx->recv_pkt = NULL; __strp_unpause(&ctx->strp); skb_queue_tail(&ctx->rx_list, skb); __skb_queue_tail(&ctx->rx_list, skb); if (async) { /* TLS 1.2-only, to_decrypt must be text length */ Loading @@ -1845,7 +1845,7 @@ int tls_sw_recvmsg(struct sock *sk, if (err != __SK_PASS) { rxm->offset = rxm->offset + rxm->full_len; rxm->full_len = 0; skb_unlink(skb, &ctx->rx_list); __skb_unlink(skb, &ctx->rx_list); if (err == __SK_DROP) consume_skb(skb); continue; Loading Loading @@ -1873,7 +1873,7 @@ int tls_sw_recvmsg(struct sock *sk, decrypted += chunk; len -= chunk; skb_unlink(skb, &ctx->rx_list); __skb_unlink(skb, &ctx->rx_list); consume_skb(skb); /* Return full control message to userspace before trying Loading Loading @@ -2173,7 +2173,7 @@ void tls_sw_release_resources_rx(struct sock *sk) if (ctx->aead_recv) { kfree_skb(ctx->recv_pkt); ctx->recv_pkt = NULL; skb_queue_purge(&ctx->rx_list); __skb_queue_purge(&ctx->rx_list); crypto_free_aead(ctx->aead_recv); strp_stop(&ctx->strp); /* If tls_sw_strparser_arm() was not called (cleanup paths) Loading Loading
net/tls/tls_sw.c +5 −5 Original line number Diff line number Diff line Loading @@ -1709,7 +1709,7 @@ static int process_rx_list(struct tls_sw_context_rx *ctx, next_skb = skb_peek_next(skb, &ctx->rx_list); if (!is_peek) { skb_unlink(skb, &ctx->rx_list); __skb_unlink(skb, &ctx->rx_list); consume_skb(skb); } Loading Loading @@ -1824,7 +1824,7 @@ int tls_sw_recvmsg(struct sock *sk, ctx->recv_pkt = NULL; __strp_unpause(&ctx->strp); skb_queue_tail(&ctx->rx_list, skb); __skb_queue_tail(&ctx->rx_list, skb); if (async) { /* TLS 1.2-only, to_decrypt must be text length */ Loading @@ -1845,7 +1845,7 @@ int tls_sw_recvmsg(struct sock *sk, if (err != __SK_PASS) { rxm->offset = rxm->offset + rxm->full_len; rxm->full_len = 0; skb_unlink(skb, &ctx->rx_list); __skb_unlink(skb, &ctx->rx_list); if (err == __SK_DROP) consume_skb(skb); continue; Loading Loading @@ -1873,7 +1873,7 @@ int tls_sw_recvmsg(struct sock *sk, decrypted += chunk; len -= chunk; skb_unlink(skb, &ctx->rx_list); __skb_unlink(skb, &ctx->rx_list); consume_skb(skb); /* Return full control message to userspace before trying Loading Loading @@ -2173,7 +2173,7 @@ void tls_sw_release_resources_rx(struct sock *sk) if (ctx->aead_recv) { kfree_skb(ctx->recv_pkt); ctx->recv_pkt = NULL; skb_queue_purge(&ctx->rx_list); __skb_queue_purge(&ctx->rx_list); crypto_free_aead(ctx->aead_recv); strp_stop(&ctx->strp); /* If tls_sw_strparser_arm() was not called (cleanup paths) Loading