diff options
author | silby <silby@FreeBSD.org> | 2003-11-11 17:58:36 +0000 |
---|---|---|
committer | silby <silby@FreeBSD.org> | 2003-11-11 17:58:36 +0000 |
commit | be846dcb4f915daba6661bf1dec627055eb22c0c (patch) | |
tree | ea3cf13ec4f75dbd6c49e6a6b39f013fc1aa849e /sys/net | |
parent | 8a2a14a55f653c024428bc2f1267bf1e1771de20 (diff) | |
download | FreeBSD-src-be846dcb4f915daba6661bf1dec627055eb22c0c.zip FreeBSD-src-be846dcb4f915daba6661bf1dec627055eb22c0c.tar.gz |
Remove the m_defrag call from if_loop; testing with m_fragment
has shown that the IPv6 stack can clearly handle fragmented
mbuf chains without a problem.
MFC after: 1 week
Diffstat (limited to 'sys/net')
-rw-r--r-- | sys/net/if_loop.c | 27 |
1 files changed, 0 insertions, 27 deletions
diff --git a/sys/net/if_loop.c b/sys/net/if_loop.c index 357862d..afe0a73 100644 --- a/sys/net/if_loop.c +++ b/sys/net/if_loop.c @@ -191,10 +191,6 @@ looutput(ifp, m, dst, rt) struct sockaddr *dst; register struct rtentry *rt; { -#ifdef INET6 - struct mbuf *n; -#endif - M_ASSERTPKTHDR(m); /* check if we have the packet header */ if (rt && rt->rt_flags & (RTF_REJECT|RTF_BLACKHOLE)) { @@ -202,29 +198,6 @@ looutput(ifp, m, dst, rt) return (rt->rt_flags & RTF_BLACKHOLE ? 0 : rt->rt_flags & RTF_HOST ? EHOSTUNREACH : ENETUNREACH); } -#ifdef INET6 - /* - * KAME requires that the packet to be contiguous on the - * mbuf. We need to make that sure. - * this kind of code should be avoided. - * - * XXX: KAME may no longer need contiguous packets. Once - * that has been verified, the following code _should_ be - * removed. - */ - - if (m && m->m_next != NULL) { - - n = m_defrag(m, M_DONTWAIT); - - if (n == NULL) { - m_freem(m); - return (ENOBUFS); - } else { - m = n; - } - } -#endif ifp->if_opackets++; ifp->if_obytes += m->m_pkthdr.len; |