aboutsummaryrefslogtreecommitdiff
path: root/tools/perf/util/scripting-engines/trace-event-python.c
diff options
context:
space:
mode:
authorEric Dumazet <[email protected]>2012-05-18 11:02:15 +0000
committerDavid S. Miller <[email protected]>2012-05-18 23:49:33 -0400
commit72e843bb09d4533208aa5573861a983c46914019 (patch)
tree989fec0c30d80aef7e036c01aa12c24977f50488 /tools/perf/util/scripting-engines/trace-event-python.c
parent6fba180ee8b1c86b03d33013b4c2fc54fc5fc248 (diff)
ipv6: ip6_fragment() should check CHECKSUM_PARTIAL
Quoting Tore Anderson from : If the allfrag feature has been set on a host route (due to an ICMPv6 Packet Too Big received indicating a MTU of less than 1280), TCP SYN/ACK packets to that destination appears to get an incorrect TCP checksum. This in turn means they are thrown away as invalid. In the case of an IPv4 client behind a link with a MTU of less than 1260, accessing an IPv6 server through a stateless translator, this means that the client can only download a single large file from the server, because once it is in the server's routing cache with the allfrag feature set, new TCP connections can no longer be established. </endquote> It appears ip6_fragment() doesn't handle CHECKSUM_PARTIAL properly. As network drivers are not prepared to fetch correct transport header, a safe fix is to call skb_checksum_help() before fragmenting packet. Reported-by: Tore Anderson <[email protected]> Signed-off-by: Eric Dumazet <[email protected]> Tested-by: Tore Anderson <[email protected]> Signed-off-by: David S. Miller <[email protected]>
Diffstat (limited to 'tools/perf/util/scripting-engines/trace-event-python.c')
0 files changed, 0 insertions, 0 deletions