Test methodology performed on 3.19 kernel with patch applied: Host A: fd01:2222::1/64 direct connect to host C
ip addr add fd01:2222::1/64 dev eth0 Host B: fd01:2222::2/64 direct connect to host C ip addr add fd01:2222::2/64 dev eth0 host C: direct connect interfaces for Hosts A & B bridged together: brctl addbr testbr0 brctl addif testbr0 eth1 brctl addif testbr0 eth5 ip link set dev eth1 up ip link set dev eth5 up ip link set dev testbr0 up ip addr add fd01:2222::99/64 dev testbr0 host A: continuous ping6 to host C's address beyond the bridge, using size large enough to generate fragmented IPv6 datagrams for mtu setting of 1500: ping6 -s 4000 fd01:2222::2 host C: load ip6tables_nat: ip6tables -t nat -Ln Observe on host A that ping continues uninterrupted Inspect eth1 and eth5 interfaces on host C with tcpdump to confirm traffic passes through the bridge -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1463911 Title: IPV6 fragmentation and mtu issue To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1463911/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs