diff options
author | Ole Troan <ot@cisco.com> | 2018-08-16 22:08:49 +0200 |
---|---|---|
committer | John Lo <loj@cisco.com> | 2018-08-17 21:38:47 +0000 |
commit | b3655e5592e3e8e48eb087632f3fa71915891a9f (patch) | |
tree | 9d73bb5fa359ed1a5c27f20d829494e2c302310a /src/vnet/ip/ip6_forward.c | |
parent | ee4efa7c39c914eb908e7fd629b18585cfa70b4a (diff) |
VPP-1392: VXLAN fails with IP fragmentation
Not only is it wasteful to send all fragments back through ip4-lookup, but
it doesn't work with tunnel mechanisms that don't have IP enabled on their
payload side.
Change-Id: Ic92d95982dddaa70969a2a6ea2f98edec7614425
Signed-off-by: Ole Troan <ot@cisco.com>
Diffstat (limited to 'src/vnet/ip/ip6_forward.c')
-rw-r--r-- | src/vnet/ip/ip6_forward.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/vnet/ip/ip6_forward.c b/src/vnet/ip/ip6_forward.c index efd5e0d106a..5abbba59617 100644 --- a/src/vnet/ip/ip6_forward.c +++ b/src/vnet/ip/ip6_forward.c @@ -1567,7 +1567,7 @@ ip6_mtu_check (vlib_buffer_t * b, u16 packet_bytes, { /* IP fragmentation */ ip_frag_set_vnet_buffer (b, 0, adj_packet_bytes, - IP6_FRAG_NEXT_IP6_LOOKUP, 0); + IP6_FRAG_NEXT_IP6_REWRITE, 0); *next = IP6_REWRITE_NEXT_FRAGMENT; } else |