diff options
author | Sabrina Dubroca <sd@queasysnail.net> | 2020-08-04 11:37:29 +0200 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2020-10-14 10:31:23 +0200 |
commit | a01cb66b26a39062a3cccc6e77b3b53a737c254e (patch) | |
tree | 1949af3d2d4d479466466c397dcf7776c00f5c57 | |
parent | fbe96d5aab1ef3c992b1dd7a0a4a5aeb21093571 (diff) | |
download | linux-stable-a01cb66b26a39062a3cccc6e77b3b53a737c254e.tar.gz linux-stable-a01cb66b26a39062a3cccc6e77b3b53a737c254e.tar.bz2 linux-stable-a01cb66b26a39062a3cccc6e77b3b53a737c254e.zip |
xfrmi: drop ignore_df check before updating pmtu
commit 45a36a18d01907710bad5258d81f76c18882ad88 upstream.
xfrm interfaces currently test for !skb->ignore_df when deciding
whether to update the pmtu on the skb's dst. Because of this, no pmtu
exception is created when we do something like:
ping -s 1438 <dest>
By dropping this check, the pmtu exception will be created and the
next ping attempt will work.
Fixes: f203b76d7809 ("xfrm: Add virtual xfrm interfaces")
Reported-by: Xiumei Mu <xmu@redhat.com>
Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r-- | net/xfrm/xfrm_interface.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/net/xfrm/xfrm_interface.c b/net/xfrm/xfrm_interface.c index 6f00f88adab9..6cc9f6e2dd2b 100644 --- a/net/xfrm/xfrm_interface.c +++ b/net/xfrm/xfrm_interface.c @@ -293,7 +293,7 @@ xfrmi_xmit2(struct sk_buff *skb, struct net_device *dev, struct flowi *fl) } mtu = dst_mtu(dst); - if (!skb->ignore_df && skb->len > mtu) { + if (skb->len > mtu) { skb_dst_update_pmtu_no_confirm(skb, mtu); if (skb->protocol == htons(ETH_P_IPV6)) { |