Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp104051imu; Wed, 21 Nov 2018 16:13:10 -0800 (PST) X-Google-Smtp-Source: AJdET5eQH/oftDQrhloeLbFR3tLy9bTwWH6VrOfgVrdA6RRKcCVTP2CmYmTiIEdsFSYc7Db1XWtq X-Received: by 2002:a62:d2c1:: with SMTP id c184mr9089855pfg.248.1542845590372; Wed, 21 Nov 2018 16:13:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542845590; cv=none; d=google.com; s=arc-20160816; b=MB/+EVTYehwlZejR0mTxYnzEOc1Qb/6x+nHXtSDgMJndqY9dCHDwUKpFmF2Mfv5pOZ tegddWD8uUnFP6/sAhu951UV9k3BYs5ZavpFr/0shcm84K0/hzbC0RmrU8W3nkDv6XZy ZKMHeG/nQMieUXv4vFuIzNwzTClnwd8XB7JF063KizDEnrYx/RaWVS4q1iOafLfFcVPU x7FsHtm3jJ2IotMSv0XyxZqowZGcOlhcnLjZ/JeckNqE5u0oOi4l813UvEM+Ww8A0B0Y h17HD/2nwEpkpSFgZVpeiPLcjCooqXMV7FLx8hOKBhUoqfL3i8h8Hcssi00omlLGX2Ps ++tQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=EWmyrZTsF6boihIZ85niIcHXDZ5CQFj76zlwy73wr5Y=; b=kjM8qcojBmzZM8quEvvylPmPDkQ8KQCiZPs+lt2D7oSL3Vz9PnAF4hRzXApmeRt0WE naMlP2peMvPC7hh57TaxCbEjvCGXiF7yuHFQWxk1jnKEGdVPFLbqxoQvQieJcxGUXL/Q JbM93MBeW8sUX3d4Uu7V97WBQWSdewIoqmQGaJuGf2miiTAeaW8nXKZ8UmUlmeGm2rQ+ /6fjPn3Awh9PM8nTpjLU/h1vOOjtpFk/cU3QadXWkddu+Gklf0ExK1Fpm2clnU4vITDF QdkIiwdx51lGqQm4RvknUWTSKVraZgJggNw1WeOZAkLHeaXwiXu1irTRL1wEw8pclpF8 0X4Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Ie+qF3ub; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p6-v6si46336883plk.429.2018.11.21.16.12.55; Wed, 21 Nov 2018 16:13:10 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Ie+qF3ub; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388386AbeKVFo5 (ORCPT + 99 others); Thu, 22 Nov 2018 00:44:57 -0500 Received: from mail.kernel.org ([198.145.29.99]:39644 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732102AbeKVFo4 (ORCPT ); Thu, 22 Nov 2018 00:44:56 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4FEB52151B; Wed, 21 Nov 2018 19:09:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1542827363; bh=2YFwkuhScewqe8aBtyleyHBQTNGxa2yBKZ8rPd+7ZWA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Ie+qF3ubEKWqSW1lsTRJDSJjwlHmER6FEn92abqSXdhvTuLez6mQPl7lBCfkMVFnt YfZ5BlXOx3WJPWQN6cBnXqLk0XugXPvRCB20KNO46GaP3+fy7bZ4qvjHS8Z4AIrtvL 4jqIwiR0xbXDvOcj3xPI5HSODFMR6diModIivwpI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sabrina Dubroca , Stefano Brivio , "David S. Miller" Subject: [PATCH 4.14 03/21] ip_tunnel: dont force DF when MTU is locked Date: Wed, 21 Nov 2018 20:06:47 +0100 Message-Id: <20181121183422.241348200@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181121183422.103826775@linuxfoundation.org> References: <20181121183422.103826775@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Sabrina Dubroca [ Upstream commit 16f7eb2b77b55da816c4e207f3f9440a8cafc00a ] The various types of tunnels running over IPv4 can ask to set the DF bit to do PMTU discovery. However, PMTU discovery is subject to the threshold set by the net.ipv4.route.min_pmtu sysctl, and is also disabled on routes with "mtu lock". In those cases, we shouldn't set the DF bit. This patch makes setting the DF bit conditional on the route's MTU locking state. This issue seems to be older than git history. Signed-off-by: Sabrina Dubroca Reviewed-by: Stefano Brivio Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/ipv4/ip_tunnel_core.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/net/ipv4/ip_tunnel_core.c +++ b/net/ipv4/ip_tunnel_core.c @@ -80,7 +80,7 @@ void iptunnel_xmit(struct sock *sk, stru iph->version = 4; iph->ihl = sizeof(struct iphdr) >> 2; - iph->frag_off = df; + iph->frag_off = ip_mtu_locked(&rt->dst) ? 0 : df; iph->protocol = proto; iph->tos = tos; iph->daddr = dst;