diff options
author | Steffen Klassert <steffen.klassert@secunet.com> | 2011-06-05 20:48:47 +0000 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2011-06-09 14:49:59 -0700 |
commit | 96d7303e9cfb6a9bc664174a4dfdb6fa689284fe (patch) | |
tree | 5478498eaa5f23f2548930d83b06b3ee1280856d /net | |
parent | e23535ca11525945bd7fca05ac5941efba232498 (diff) | |
download | linux-96d7303e9cfb6a9bc664174a4dfdb6fa689284fe.tar.gz linux-96d7303e9cfb6a9bc664174a4dfdb6fa689284fe.tar.bz2 linux-96d7303e9cfb6a9bc664174a4dfdb6fa689284fe.zip |
ipv4: Fix packet size calculation for raw IPsec packets in __ip_append_data
We assume that transhdrlen is positive on the first fragment
which is wrong for raw packets. So we don't add exthdrlen to the
packet size for raw packets. This leads to a reallocation on IPsec
because we have not enough headroom on the skb to place the IPsec
headers. This patch fixes this by adding exthdrlen to the packet
size whenever the send queue of the socket is empty. This issue was
introduced with git commit 1470ddf7 (inet: Remove explicit write
references to sk/inet in ip_append_data)
Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net')
-rw-r--r-- | net/ipv4/ip_output.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/net/ipv4/ip_output.c b/net/ipv4/ip_output.c index 98af3697c718..a8024eaa0e87 100644 --- a/net/ipv4/ip_output.c +++ b/net/ipv4/ip_output.c @@ -799,7 +799,9 @@ static int __ip_append_data(struct sock *sk, int csummode = CHECKSUM_NONE; struct rtable *rt = (struct rtable *)cork->dst; - exthdrlen = transhdrlen ? rt->dst.header_len : 0; + skb = skb_peek_tail(queue); + + exthdrlen = !skb ? rt->dst.header_len : 0; length += exthdrlen; transhdrlen += exthdrlen; mtu = cork->fragsize; @@ -825,8 +827,6 @@ static int __ip_append_data(struct sock *sk, !exthdrlen) csummode = CHECKSUM_PARTIAL; - skb = skb_peek_tail(queue); - cork->length += length; if (((length > mtu) || (skb && skb_is_gso(skb))) && (sk->sk_protocol == IPPROTO_UDP) && |