From: David Gibson <david(a)gibson.dropbear.id.au> TCP code needs to do different things depending on whether SO_PEEK_OFF is enabled on the socket, and it assumes it is already set if it is supported. However, we didn't re-enable it on sockets created for an incoming migration. Signed-off-by: David Gibson <david(a)gibson.dropbear.id.au> --- tcp.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/tcp.c b/tcp.c index f0d4a96..0f05011 100644 --- a/tcp.c +++ b/tcp.c @@ -3093,6 +3093,7 @@ int tcp_flow_migrate_target_ext(struct ctx *c, union flow *flow, int fd) { struct tcp_tap_conn *conn = &flow->tcp; struct tcp_tap_transfer_ext t; + uint32_t peek_offset; int s = conn->sock; if (read_all_buf(fd, &t, sizeof(t))) @@ -3121,5 +3122,9 @@ int tcp_flow_migrate_target_ext(struct ctx *c, union flow *flow, int fd) tcp_flow_repair_off(c, conn); + peek_offset = conn->seq_to_tap - conn->seq_ack_from_tap; + if (tcp_set_peek_offset(conn->sock, peek_offset)) + tcp_rst(c, conn); + return 0; } -- 2.43.0