diff options
author | Daniel Axtens <dja@axtens.net> | 2018-03-01 07:13:37 +0100 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2018-03-04 23:49:17 +0100 |
commit | 779b7931b27bfa80bac46d0115d229259aef580b (patch) | |
tree | 387a59875c8aac450234a701a52fd5da695f0f66 /net/ipv4/ip_forward.c | |
parent | Merge tag 'batadv-net-for-davem-20180302' of git://git.open-mesh.org/linux-merge (diff) | |
download | linux-779b7931b27bfa80bac46d0115d229259aef580b.tar.xz linux-779b7931b27bfa80bac46d0115d229259aef580b.zip |
net: rename skb_gso_validate_mtu -> skb_gso_validate_network_len
If you take a GSO skb, and split it into packets, will the network
length (L3 headers + L4 headers + payload) of those packets be small
enough to fit within a given MTU?
skb_gso_validate_mtu gives you the answer to that question. However,
we recently added to add a way to validate the MAC length of a split GSO
skb (L2+L3+L4+payload), and the names get confusing, so rename
skb_gso_validate_mtu to skb_gso_validate_network_len
Signed-off-by: Daniel Axtens <dja@axtens.net>
Reviewed-by: Marcelo Ricardo Leitner <marcelo.leitner@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/ipv4/ip_forward.c')
-rw-r--r-- | net/ipv4/ip_forward.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/net/ipv4/ip_forward.c b/net/ipv4/ip_forward.c index 2dd21c3281a1..b54b948b0596 100644 --- a/net/ipv4/ip_forward.c +++ b/net/ipv4/ip_forward.c @@ -55,7 +55,7 @@ static bool ip_exceeds_mtu(const struct sk_buff *skb, unsigned int mtu) if (skb->ignore_df) return false; - if (skb_is_gso(skb) && skb_gso_validate_mtu(skb, mtu)) + if (skb_is_gso(skb) && skb_gso_validate_network_len(skb, mtu)) return false; return true; |