diff options
| author | Eric Dumazet <[email protected]> | 2013-08-18 19:08:07 -0700 |
|---|---|---|
| committer | David S. Miller <[email protected]> | 2013-08-20 15:05:04 -0700 |
| commit | 734d2725db879f3f6fcdc2b1d2a5deae105f5e95 (patch) | |
| tree | 44648101fe8a2960add4c7d3b690f3fbcaac8841 /tools/perf/scripts/python/check-perf-trace.py | |
| parent | 35596b2796713c6a9dc05759837fa9f0e156a200 (diff) | |
ipv4: raise IP_MAX_MTU to theoretical limit
As discussed last year [1], there is no compelling reason
to limit IPv4 MTU to 0xFFF0, while real limit is 0xFFFF
[1] : http://marc.info/?l=linux-netdev&m=135607247609434&w=2
Willem raised this issue again because some of our internal
regression tests broke after lo mtu being set to 65536.
IP_MTU reports 0xFFF0, and the test attempts to send a RAW datagram of
mtu + 1 bytes, expecting the send() to fail, but it does not.
Alexey raised interesting points about TCP MSS, that should be addressed
in follow-up patches in TCP stack if needed, as someone could also set
an odd mtu anyway.
Signed-off-by: Eric Dumazet <[email protected]>
Cc: Alexey Kuznetsov <[email protected]>
Cc: Willem de Bruijn <[email protected]>
Signed-off-by: David S. Miller <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/check-perf-trace.py')
0 files changed, 0 insertions, 0 deletions