Searched hist:"49 d16b23cd1e61c028ee088c5a64e9ac6a9c6147" (Results 1 – 2 of 2) sorted by relevance
/openbmc/linux/include/net/ |
H A D | ip.h | diff 49d16b23cd1e61c028ee088c5a64e9ac6a9c6147 Fri May 15 16:15:37 CDT 2015 Andy Zhou <azhou@nicira.com> bridge_netfilter: No ICMP packet on IPv4 fragmentation error
When bridge netfilter re-fragments an IP packet for output, all packets that can not be re-fragmented to their original input size should be silently discarded.
However, current bridge netfilter output path generates an ICMP packet with 'size exceeded MTU' message for such packets, this is a bug.
This patch refactors the ip_fragment() API to allow two separate use cases. The bridge netfilter user case will not send ICMP, the routing output will, as before.
Signed-off-by: Andy Zhou <azhou@nicira.com> Acked-by: Florian Westphal <fw@strlen.de> Signed-off-by: David S. Miller <davem@davemloft.net>
|
/openbmc/linux/net/ipv4/ |
H A D | ip_output.c | diff 49d16b23cd1e61c028ee088c5a64e9ac6a9c6147 Fri May 15 16:15:37 CDT 2015 Andy Zhou <azhou@nicira.com> bridge_netfilter: No ICMP packet on IPv4 fragmentation error
When bridge netfilter re-fragments an IP packet for output, all packets that can not be re-fragmented to their original input size should be silently discarded.
However, current bridge netfilter output path generates an ICMP packet with 'size exceeded MTU' message for such packets, this is a bug.
This patch refactors the ip_fragment() API to allow two separate use cases. The bridge netfilter user case will not send ICMP, the routing output will, as before.
Signed-off-by: Andy Zhou <azhou@nicira.com> Acked-by: Florian Westphal <fw@strlen.de> Signed-off-by: David S. Miller <davem@davemloft.net>
|