ipv4: igmp: guard against silly MTU values
IPv4 stack reacts to changes to small MTU, by disabling itself under RTNL. But there is a window where threads not using RTNL can see a wrong device mtu. This can lead to surprises, in igmp code where it is assumed the mtu is suitable. Fix this by reading device mtu once and checking IPv4 minimal MTU. This patch adds missing IPV4_MIN_MTU define, to not abuse ETH_MIN_MTU anymore. Signed-off-by: Eric Dumazet <edumazet@google.com> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:

committed by
David S. Miller

parent
b9b312a7a4
commit
b5476022bb
@@ -34,6 +34,7 @@
|
||||
#include <net/flow_dissector.h>
|
||||
|
||||
#define IPV4_MAX_PMTU 65535U /* RFC 2675, Section 5.1 */
|
||||
#define IPV4_MIN_MTU 68 /* RFC 791 */
|
||||
|
||||
struct sock;
|
||||
|
||||
|
Reference in New Issue
Block a user