aboutsummaryrefslogtreecommitdiffstats
path: root/Documentation/java.txt
diff options
context:
space:
mode:
authorShan Wei <shanwei@cn.fujitsu.com>2010-04-18 12:58:22 -0400
committerDavid S. Miller <davem@davemloft.net>2010-04-22 01:48:26 -0400
commitf2228f785a9d97307aa8ba709088cfda6c3df73f (patch)
tree3440546af96613f8204221128609bf8054a8e733 /Documentation/java.txt
parenta19259c3d589a014e5f47f148f74dfc44422c82b (diff)
ipv6: allow to send packet after receiving ICMPv6 Too Big message with MTU field less than IPV6_MIN_MTU
According to RFC2460, PMTU is set to the IPv6 Minimum Link MTU (1280) and a fragment header should always be included after a node receiving Too Big message reporting PMTU is less than the IPv6 Minimum Link MTU. After receiving a ICMPv6 Too Big message reporting PMTU is less than the IPv6 Minimum Link MTU, sctp *can't* send any data/control chunk that total length including IPv6 head and IPv6 extend head is less than IPV6_MIN_MTU(1280 bytes). The failure occured in p6_fragment(), about reason see following(take SHUTDOWN chunk for example): sctp_packet_transmit (SHUTDOWN chunk, len=16 byte) |------sctp_v6_xmit (local_df=0) |------ip6_xmit |------ip6_output (dst_allfrag is ture) |------ip6_fragment In ip6_fragment(), for local_df=0, drops the the packet and returns EMSGSIZE. The patch fixes it with adding check length of skb->len. In this case, Ipv6 not to fragment upper protocol data, just only add a fragment header before it. Signed-off-by: Shan Wei <shanwei@cn.fujitsu.com> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'Documentation/java.txt')
0 files changed, 0 insertions, 0 deletions