Linux assumes that skbs marked for GSO are longer than MSS. In
particular tcp_tso_segment assumes that skb_segment will return a
chain of at least 2 skbs.
Both netfront and back should therefor not pass such a packet up the
stack.
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
skb_shinfo(skb)->frags[0].page = (void *)~0UL;
}
+ if (skb->data_len < skb_shinfo(skb)->gso_size) {
+ skb_shinfo(skb)->gso_size = 0;
+ skb_shinfo(skb)->gso_type = 0;
+ }
+
__skb_queue_tail(&tx_queue, skb);
pending_cons++;
np->stats.rx_packets++;
np->stats.rx_bytes += skb->len;
+#if HAVE_TSO
+ if (skb->data_len < skb_shinfo(skb)->gso_size) {
+ skb_shinfo(skb)->gso_size = 0;
+#if HAVE_GSO
+ skb_shinfo(skb)->gso_type = 0;
+#endif
+ }
+#endif
__skb_queue_tail(&rxq, skb);
np->rx.rsp_cons = ++i;