These 3 places in bridge netfilter are called on RX path after GRO
and IPv4 TCP GSO packets may come through, so replace iph tot_len
accessing with skb_ip_totlen() in there.
Signed-off-by: Xin Long <lucien.xin@gmail.com>
Reviewed-by: Nikolay Aleksandrov <razor@blackwall.org>
Reviewed-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
        if (unlikely(ip_fast_csum((u8 *)iph, iph->ihl)))
                goto csum_error;
 
-       len = ntohs(iph->tot_len);
+       len = skb_ip_totlen(skb);
        if (skb->len < len) {
                __IP_INC_STATS(net, IPSTATS_MIB_INTRUNCATEDPKTS);
                goto drop;
 
            iph->version != 4)
                return -1;
 
-       len = ntohs(iph->tot_len);
+       len = skb_ip_totlen(skb);
        if (skb->len < nhoff + len ||
            len < (iph->ihl * 4))
                 return -1;
                if (!pskb_may_pull(skb, sizeof(struct iphdr)))
                        return NF_ACCEPT;
 
-               len = ntohs(ip_hdr(skb)->tot_len);
+               len = skb_ip_totlen(skb);
                if (pskb_trim_rcsum(skb, len))
                        return NF_ACCEPT;