diff options
author | Herbert Xu <herbert@gondor.apana.org.au> | 2010-05-27 16:14:30 -0700 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@suse.de> | 2011-11-07 12:31:51 -0800 |
commit | 71c6bd5af2d984fadd81611ad643bda52e82ad79 (patch) | |
tree | dff93f6b895e1f205c62b464ce6193238934d696 | |
parent | 3b454d6b495fa853304741503db0b23f0542e3ef (diff) | |
download | linux-stable-71c6bd5af2d984fadd81611ad643bda52e82ad79.tar.gz linux-stable-71c6bd5af2d984fadd81611ad643bda52e82ad79.tar.bz2 linux-stable-71c6bd5af2d984fadd81611ad643bda52e82ad79.zip |
ipv6: Add GSO support on forwarding path
commit 0aa68271510ae2b221d4b60892103837be63afe4 upstream.
Currently we disallow GSO packets on the IPv6 forward path.
This patch fixes this.
Note that I discovered that our existing GSO MTU checks (e.g.,
IPv4 forwarding) are buggy in that they skip the check altogether,
when they really should be checking gso_size + header instead.
I have also been lazy here in that I haven't bothered to segment
the GSO packet by hand before generating an ICMP message. Someone
should add that to be 100% correct.
Reported-by: Ralf Baechle <ralf@linux-mips.org>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Apollon Oikonomopoulos <apoikos@gmail.com>
Signed-off-by: Faidon Liambotis <paravoid@debian.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-rw-r--r-- | net/ipv6/ip6_output.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/net/ipv6/ip6_output.c b/net/ipv6/ip6_output.c index eca3ef77f227..9ad57923440f 100644 --- a/net/ipv6/ip6_output.c +++ b/net/ipv6/ip6_output.c @@ -510,7 +510,7 @@ int ip6_forward(struct sk_buff *skb) } } - if (skb->len > dst_mtu(dst)) { + if (skb->len > dst_mtu(dst) && !skb_is_gso(skb)) { /* Again, force OUTPUT device used as source address */ skb->dev = dst->dev; icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, dst_mtu(dst), skb->dev); |