Home
last modified time | relevance | path

Searched hist:"49 d16b23cd1e61c028ee088c5a64e9ac6a9c6147" (Results 1 – 2 of 2) sorted by relevance

/openbmc/linux/include/net/
H A Dip.hdiff 49d16b23cd1e61c028ee088c5a64e9ac6a9c6147 Fri May 15 16:15:37 CDT 2015 Andy Zhou <azhou@nicira.com> bridge_netfilter: No ICMP packet on IPv4 fragmentation error

When bridge netfilter re-fragments an IP packet for output, all
packets that can not be re-fragmented to their original input size
should be silently discarded.

However, current bridge netfilter output path generates an ICMP packet
with 'size exceeded MTU' message for such packets, this is a bug.

This patch refactors the ip_fragment() API to allow two separate
use cases. The bridge netfilter user case will not
send ICMP, the routing output will, as before.

Signed-off-by: Andy Zhou <azhou@nicira.com>
Acked-by: Florian Westphal <fw@strlen.de>
Signed-off-by: David S. Miller <davem@davemloft.net>
/openbmc/linux/net/ipv4/
H A Dip_output.cdiff 49d16b23cd1e61c028ee088c5a64e9ac6a9c6147 Fri May 15 16:15:37 CDT 2015 Andy Zhou <azhou@nicira.com> bridge_netfilter: No ICMP packet on IPv4 fragmentation error

When bridge netfilter re-fragments an IP packet for output, all
packets that can not be re-fragmented to their original input size
should be silently discarded.

However, current bridge netfilter output path generates an ICMP packet
with 'size exceeded MTU' message for such packets, this is a bug.

This patch refactors the ip_fragment() API to allow two separate
use cases. The bridge netfilter user case will not
send ICMP, the routing output will, as before.

Signed-off-by: Andy Zhou <azhou@nicira.com>
Acked-by: Florian Westphal <fw@strlen.de>
Signed-off-by: David S. Miller <davem@davemloft.net>