* [PATCH] ip6_tunnel: Clear IP6CB(skb)->frag_max_size in ip4ip6_tnl_xmit()
@ 2016-10-24 15:07 Eli Cooper
2016-10-27 20:25 ` David Miller
0 siblings, 1 reply; 2+ messages in thread
From: Eli Cooper @ 2016-10-24 15:07 UTC (permalink / raw)
To: netdev, David S . Miller
skb->cb may contain data from previous layers, as shown in 5146d1f1511
("tunnel: Clear IPCB(skb)->opt before dst_link_failure called").
However, for ipip6 tunnels, clearing IPCB(skb)->opt alone is not enough,
because skb->cb is later misinterpreted as IP6CB(skb)->frag_max_size.
In the observed scenario, the garbage data made the max fragment size so
so small that packets sent through the tunnel are mistakenly fragmented.
This patch clears IP6CB(skb)->frag_max_size for ipip6 tunnels.
Signed-off-by: Eli Cooper <elicooper@gmx.com>
---
net/ipv6/ip6_tunnel.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/net/ipv6/ip6_tunnel.c b/net/ipv6/ip6_tunnel.c
index 202d16a..4110562 100644
--- a/net/ipv6/ip6_tunnel.c
+++ b/net/ipv6/ip6_tunnel.c
@@ -1205,6 +1205,7 @@ ip4ip6_tnl_xmit(struct sk_buff *skb, struct net_device *dev)
int err;
memset(&(IPCB(skb)->opt), 0, sizeof(IPCB(skb)->opt));
+ IP6CB(skb)->frag_max_size = 0;
tproto = ACCESS_ONCE(t->parms.proto);
if (tproto != IPPROTO_IPIP && tproto != 0)
--
2.10.1
^ permalink raw reply related [flat|nested] 2+ messages in thread
* Re: [PATCH] ip6_tunnel: Clear IP6CB(skb)->frag_max_size in ip4ip6_tnl_xmit()
2016-10-24 15:07 [PATCH] ip6_tunnel: Clear IP6CB(skb)->frag_max_size in ip4ip6_tnl_xmit() Eli Cooper
@ 2016-10-27 20:25 ` David Miller
0 siblings, 0 replies; 2+ messages in thread
From: David Miller @ 2016-10-27 20:25 UTC (permalink / raw)
To: elicooper; +Cc: netdev
From: Eli Cooper <elicooper@gmx.com>
Date: Mon, 24 Oct 2016 23:07:12 +0800
> diff --git a/net/ipv6/ip6_tunnel.c b/net/ipv6/ip6_tunnel.c
> index 202d16a..4110562 100644
> --- a/net/ipv6/ip6_tunnel.c
> +++ b/net/ipv6/ip6_tunnel.c
> @@ -1205,6 +1205,7 @@ ip4ip6_tnl_xmit(struct sk_buff *skb, struct net_device *dev)
> int err;
>
> memset(&(IPCB(skb)->opt), 0, sizeof(IPCB(skb)->opt));
> + IP6CB(skb)->frag_max_size = 0;
>
> tproto = ACCESS_ONCE(t->parms.proto);
> if (tproto != IPPROTO_IPIP && tproto != 0)
This doesn't look right at all.
Either skb->cb is interpreted as IPCB() past this point, or
it is interpreted as IP6CB().
So pick which structure is used, and simply clear that specific
structure.
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2016-10-27 20:25 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2016-10-24 15:07 [PATCH] ip6_tunnel: Clear IP6CB(skb)->frag_max_size in ip4ip6_tnl_xmit() Eli Cooper
2016-10-27 20:25 ` David Miller
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).