diff options
author | David S. Miller <davem@davemloft.net> | 2012-06-10 11:04:12 +0400 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2012-06-11 13:08:59 +0400 |
commit | 46517008e1168dc926cf2c47d529efc07eca85c0 (patch) | |
tree | 98e9cf1917c9b8f1c6c2d8121746fd4f8e414f45 /net/rxrpc/ar-error.c | |
parent | 97bab73f987e2781129cd6f4b6379bf44d808cc6 (diff) | |
download | linux-46517008e1168dc926cf2c47d529efc07eca85c0.tar.xz |
ipv4: Kill ip_rt_frag_needed().
There is zero point to this function.
It's only real substance is to perform an extremely outdated BSD4.2
ICMP check, which we can safely remove. If you really have a MTU
limited link being routed by a BSD4.2 derived system, here's a nickel
go buy yourself a real router.
The other actions of ip_rt_frag_needed(), checking and conditionally
updating the peer, are done by the per-protocol handlers of the ICMP
event.
TCP, UDP, et al. have a handler which will receive this event and
transmit it back into the associated route via dst_ops->update_pmtu().
This simplification is important, because it eliminates the one place
where we do not have a proper route context in which to make an
inetpeer lookup.
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/rxrpc/ar-error.c')
-rw-r--r-- | net/rxrpc/ar-error.c | 4 |
1 files changed, 0 insertions, 4 deletions
diff --git a/net/rxrpc/ar-error.c b/net/rxrpc/ar-error.c index 5d6b572a6704..a9206087b4d7 100644 --- a/net/rxrpc/ar-error.c +++ b/net/rxrpc/ar-error.c @@ -81,10 +81,6 @@ void rxrpc_UDP_error_report(struct sock *sk) _net("I/F MTU %u", mtu); } - /* ip_rt_frag_needed() may have eaten the info */ - if (mtu == 0) - mtu = ntohs(icmp_hdr(skb)->un.frag.mtu); - if (mtu == 0) { /* they didn't give us a size, estimate one */ if (mtu > 1500) { |