|
@@ -975,12 +975,22 @@ static int netbk_count_requests(struct xenvif *vif,
|
|
|
|
|
|
memcpy(txp, RING_GET_REQUEST(&vif->tx, cons + slots),
|
|
|
sizeof(*txp));
|
|
|
- if (txp->size > first->size) {
|
|
|
- netdev_err(vif->dev,
|
|
|
- "Invalid tx request, slot size %u > remaining size %u\n",
|
|
|
- txp->size, first->size);
|
|
|
- netbk_fatal_tx_err(vif);
|
|
|
- return -EIO;
|
|
|
+
|
|
|
+ /* If the guest submitted a frame >= 64 KiB then
|
|
|
+ * first->size overflowed and following slots will
|
|
|
+ * appear to be larger than the frame.
|
|
|
+ *
|
|
|
+ * This cannot be fatal error as there are buggy
|
|
|
+ * frontends that do this.
|
|
|
+ *
|
|
|
+ * Consume all slots and drop the packet.
|
|
|
+ */
|
|
|
+ if (!drop_err && txp->size > first->size) {
|
|
|
+ if (net_ratelimit())
|
|
|
+ netdev_dbg(vif->dev,
|
|
|
+ "Invalid tx request, slot size %u > remaining size %u\n",
|
|
|
+ txp->size, first->size);
|
|
|
+ drop_err = -EIO;
|
|
|
}
|
|
|
|
|
|
first->size -= txp->size;
|