Since we are now doing strict checking of what offloads may access, make sure skb->len is on that list.
Signed-off-by: Jakub Kicinski <jakub.kicin...@netronome.com> --- net/core/filter.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/net/core/filter.c b/net/core/filter.c index a908e5da5ffc..f8cd4d9aeb94 100644 --- a/net/core/filter.c +++ b/net/core/filter.c @@ -3656,6 +3656,8 @@ tc_cls_act_is_valid_access_analyzer(int off, int size, struct bpf_insn_access_aux *info) { switch (off) { + case offsetof(struct sk_buff, len): + return true; case offsetof(struct sk_buff, data): info->reg_type = PTR_TO_PACKET; return true; -- 2.14.1