Test methodology performed on 3.19 kernel with patch applied: Host A: fd01:2222::1/64 direct connect to host C
ip addr add fd01:2222::1/64 dev eth0 Host B: fd01:2222::2/64 direct connect to host C ip addr add fd01:2222::2/64 dev eth0 host C: direct connect interfaces for Hosts A & B bridged together: brctl addbr testbr0 brctl addif testbr0 eth1 brctl addif testbr0 eth5 ip link set dev eth1 up ip link set dev eth5 up ip link set dev testbr0 up ip addr add fd01:2222::99/64 dev testbr0 host A: continuous ping6 to host C's address beyond the bridge, using size large enough to generate fragmented IPv6 datagrams for mtu setting of 1500: ping6 -s 4000 fd01:2222::2 host C: load ip6tables_nat: ip6tables -t nat -Ln Observe on host A that ping continues uninterrupted Inspect eth1 and eth5 interfaces on host C with tcpdump to confirm traffic passes through the bridge -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1463911 Title: IPV6 fragmentation and mtu issue Status in neutron: Confirmed Status in OpenStack Compute (nova): Confirmed Status in linux package in Ubuntu: Confirmed Bug description: Fragmented IPv6 packets are REJECTED by ip6tables on compute nodes. The traffic is goign through an intra-VM network and the packet loss is hurting the system. There is a patch for this issue: http://patchwork.ozlabs.org/patch/434957/ I would like to know is there any bug report or official release date for this issue ? This is pretty critical for my deployment. Thanks in advance, BR, Gyula To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1463911/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : [email protected] Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp

