The Xen checksum offload feature attempts to insert a TCP/UDP
authorkaf24@firebug.cl.cam.ac.uk <kaf24@firebug.cl.cam.ac.uk>
Sat, 22 Apr 2006 09:41:53 +0000 (10:41 +0100)
committerkaf24@firebug.cl.cam.ac.uk <kaf24@firebug.cl.cam.ac.uk>
Sat, 22 Apr 2006 09:41:53 +0000 (10:41 +0100)
commit65fbb3b646de3c7c7613832ce90cdc7f998438ac
tree20bf4a62bfa61d8ac1abfd93947bc6e355a74f33
parentac9595600a2a517d2ae3e8eba2ca7bece020acb8
The Xen checksum offload feature attempts to insert a TCP/UDP
checksums into already encrypted packets (esp4) in dom0.  Obviously,
it is not possible to insert a checksum into an already encrypted
packet, so this patch inserts the checksum prior to encrypting
packets in net/ipv4/xfrm4_output.c.

To do this cleanly, the TCP/UDP header pointers need to be pointed to
the correct spot, so this functionality has been abstracted into a new
function.

This patch fixes bug 143 (verified by Jim Dykman).  Earlier version
verified by Jon McCune.

Signed-off-by: James Dykman <dykman@us.ibm.com>
Signed-off-by: Jon Mason <jdmason@us.ibm.com>
linux-2.6-xen-sparse/net/core/dev.c
patches/linux-2.6.16/net-csum.patch