Steffen Klassert <steffen.klass...@secunet.com> wrote:
> Commit 94579ac3f6d0 ("xfrm: Fix double ESP trailer insertion in IPsec
> crypto offload.") added a XFRM_XMIT flag to avoid duplicate ESP trailer
> insertion on HW offload. This flag is set on the secpath that is shared
> amongst segments. This lead to a situation where some segments are
> not transformed correctly when segmentation happens at layer 3.
> 
> Fix this by using private skb extensions for segmented and hw offloaded
> ESP packets.
> 
> Fixes: 94579ac3f6d0 ("xfrm: Fix double ESP trailer insertion in IPsec crypto 
> offload.")
> Signed-off-by: Steffen Klassert <steffen.klass...@secunet.com>
> ---
>  include/linux/skbuff.h  |  1 +
>  net/core/skbuff.c       | 23 ++++++++++++++++++-----
>  net/ipv4/esp4_offload.c | 16 +++++++++++++++-
>  net/ipv6/esp6_offload.c | 16 +++++++++++++++-
>  net/xfrm/xfrm_device.c  |  2 --
>  5 files changed, 49 insertions(+), 9 deletions(-)
> 
> -     if (hw_offload)
> +     if (hw_offload) {
> +             ext = skb_ext_cow(skb->extensions, skb->active_extensions);

It should be possible to do

        if (hw_offload) {
                if (!skb_ext_add(skb, SKB_EXT_SECPATH);
                        return -ENOMEM;

                xo = xfrm_offload(skb);
                ....

without need for a new 'cow' function.
skb_ext_add() will auto-COW if the extension area has a refcount > 1.

Reply via email to