diff options
author | Vakul Garg <vakul.garg@nxp.com> | 2018-12-21 15:16:52 +0000 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2018-12-21 10:26:54 -0800 |
commit | 65a10e28aee72903a41670170cd5330ad73c490e (patch) | |
tree | 2d84674e27f79bdc7cabcfb63167db3edf892b72 /net/compat.c | |
parent | cbb49697d5512ce9e61b45ce75d3ee43d7ea5524 (diff) |
tls: Do not call sk_memcopy_from_iter with zero length
In some conditions e.g. when tls_clone_plaintext_msg() returns -ENOSPC,
the number of bytes to be copied using subsequent function
sk_msg_memcopy_from_iter() becomes zero. This causes function
sk_msg_memcopy_from_iter() to fail which in turn causes tls_sw_sendmsg()
to return failure. To prevent it, do not call sk_msg_memcopy_from_iter()
when number of bytes to copy (indicated by 'try_to_copy') is zero.
Fixes: d829e9c4112b ("tls: convert to generic sk_msg interface")
Signed-off-by: Vakul Garg <vakul.garg@nxp.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/compat.c')
0 files changed, 0 insertions, 0 deletions