Xen-netback: Fix issue caused by using gso_type wrongly
authorAnnie Li <annie.li@oracle.com>
Mon, 10 Mar 2014 14:58:34 +0000 (22:58 +0800)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 14 Apr 2014 13:47:19 +0000 (06:47 -0700)
commit66295293f1c89b83290dc610db9f8fc555f5a92b
tree71cb00848de81f25ee6a3086ce5d293d1920b580
parenteafe827b3bff6faf6c108a7b24e4bb6a025bd514
Xen-netback: Fix issue caused by using gso_type wrongly

[ Upstream commit 5bd076708664313f2bdbbc1cf71093313b7774a1 ]

Current netback uses gso_type to check whether the skb contains
gso offload, and this is wrong. Gso_size is the right one to
check gso existence, and gso_type is only used to check gso type.

Some skbs contains nonzero gso_type and zero gso_size, current
netback would treat these skbs as gso and create wrong response
for this. This also causes ssh failure to domu from other server.

V2: use skb_is_gso function as Paul Durrant suggested

Signed-off-by: Annie Li <annie.li@oracle.com>
Acked-by: Wei Liu <wei.liu2@citrix.com>
Reviewed-by: Paul Durrant <paul.durrant@citrix.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
drivers/net/xen-netback/netback.c