From: Jakub Sitnicki <j...@redhat.com> Date: Wed, 26 Oct 2016 11:21:14 +0200
> Similar to commit c146066ab802 ("ipv4: Don't use ufo handling on later > transformed packets"), don't perform UFO on packets that will be IPsec > transformed. To detect it we rely on the fact that headerlen in > dst_entry is non-zero only for transformation bundles (xfrm_dst > objects). > > Unwanted segmentation can be observed with a NETIF_F_UFO capable device, > such as a dummy device: > > DEV=dum0 LEN=1493 > > ip li add $DEV type dummy > ip addr add fc00::1/64 dev $DEV nodad > ip link set $DEV up > ip xfrm policy add dir out src fc00::1 dst fc00::2 \ > tmpl src fc00::1 dst fc00::2 proto esp spi 1 > ip xfrm state add src fc00::1 dst fc00::2 \ > proto esp spi 1 enc 'aes' 0x0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b > > tcpdump -n -nn -i $DEV -t & > socat /dev/zero,readbytes=$LEN udp6:[fc00::2]:$LEN > > tcpdump output before: > > IP6 fc00::1 > fc00::2: frag (0|1448) ESP(spi=0x00000001,seq=0x1), length > 1448 > IP6 fc00::1 > fc00::2: frag (1448|48) > IP6 fc00::1 > fc00::2: ESP(spi=0x00000001,seq=0x2), length 88 > > ... and after: > > IP6 fc00::1 > fc00::2: frag (0|1448) ESP(spi=0x00000001,seq=0x1), length > 1448 > IP6 fc00::1 > fc00::2: frag (1448|80) > > Fixes: e89e9cf539a2 ("[IPv4/IPv6]: UFO Scatter-gather approach") > > Signed-off-by: Jakub Sitnicki <j...@redhat.com> > Acked-by: Hannes Frederic Sowa <han...@stressinduktion.org> Applied, thank you.