Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp3866582pxb; Tue, 17 Nov 2020 05:45:35 -0800 (PST) X-Google-Smtp-Source: ABdhPJwUEGUG7tpvs5jECmZZ3yHzWUWIVwdljnA4PHx85/oTOnMlD/1Iqby7hxOyR6dlkigxioIG X-Received: by 2002:aa7:c74e:: with SMTP id c14mr861700eds.202.1605620735311; Tue, 17 Nov 2020 05:45:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605620735; cv=none; d=google.com; s=arc-20160816; b=nsAfWS1hD3MVyFGkxI8MDeXpmh7qJMw3ABhTMNnGk+taLeuNeJj+ycXZ8IrhaU90Ss 10msdLGOUNZ6v1/92fMB9LM7VA+1CaOyXtZr+Dcx1QRLA/kjCxvd6VAuir2JoJuc1T9U L3NeQ8ckQZELXXRSneQCWlB93VLayKnogaqz2Ch/HEYq8Fs7f6nH6wkVONWfgtEmAkjw 9QuElqHmBFpFMknhpyERtmNKjhvBdRyR1YbEV6whqx8O/4CnuvxX0IZ2Et/1GbFXX7Kv mH1RVPpgx8vYnbamr/+HyRaFZ/mlrYrss8cshmKClHEVaHgYAAqrS/926zdq00jILp38 rhKg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=J0PjSErET6TvSPCB+NjorSn3/TvNM6zWNjXJqQFZM0A=; b=YyYuq9Y2euuVTFAC2KVhiXN9Bv4soDSJOHye3VBZvNUPLBGWPWhVjGeRNN9glVfptu vh+kHaDu2e+HpK1YQdJpt3rkrjVrSMKJRmHli0nb6rFV3EotnFy2FZQ035yq48g+sflW ALK+cJGaRNUcAAJu6KNn+OulzHcby2CmKIPwNBL+dwqGgBv/oJ6H02RRCkuAX3pG9yO8 tKE/15C6gt5GqumPggWW37svLUAYhtIawjdeX0qJ6e/dnHLOj40fG5SR2kgvLY0EAf3/ kMxpLkiYPRAfbrDCq3k4QPNMzMnG6yZSudu9PT5oI9omAR1mcinCCNOd9E4zfdI+CP+B Lu2g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=X7KVqIVH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c35si14059158edf.528.2020.11.17.05.45.11; Tue, 17 Nov 2020 05:45:35 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=X7KVqIVH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732992AbgKQNl4 (ORCPT + 99 others); Tue, 17 Nov 2020 08:41:56 -0500 Received: from mail.kernel.org ([198.145.29.99]:54134 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1733210AbgKQNlm (ORCPT ); Tue, 17 Nov 2020 08:41:42 -0500 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9423F20729; Tue, 17 Nov 2020 13:41:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1605620501; bh=3s4Wta/dkaG3ZHbuAVV7wYqbnSAqBaQwhuh88JfwO2I=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=X7KVqIVHey5GEdZhGmr1/cYsISZ/GANjDdofe42r1sHBmqPZgeBLVNZBdjSdpbwGG 7LGnGx2dOrtRxeZmdoD7BkspTUgiD7hf/3X17KooGjA7LbcK/C/7TmsMqqZQxclPiR A5T1pxxvdaqwq/IFELxa+BYE/Secr8tqOQCfXe1M= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Oliver Herms , Willem de Bruijn , Jakub Kicinski Subject: [PATCH 5.9 240/255] IPv6: Set SIT tunnel hard_header_len to zero Date: Tue, 17 Nov 2020 14:06:20 +0100 Message-Id: <20201117122150.616688936@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201117122138.925150709@linuxfoundation.org> References: <20201117122138.925150709@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Oliver Herms [ Upstream commit 8ef9ba4d666614497a057d09b0a6eafc1e34eadf ] Due to the legacy usage of hard_header_len for SIT tunnels while already using infrastructure from net/ipv4/ip_tunnel.c the calculation of the path MTU in tnl_update_pmtu is incorrect. This leads to unnecessary creation of MTU exceptions for any flow going over a SIT tunnel. As SIT tunnels do not have a header themsevles other than their transport (L3, L2) headers we're leaving hard_header_len set to zero as tnl_update_pmtu is already taking care of the transport headers sizes. This will also help avoiding unnecessary IPv6 GC runs and spinlock contention seen when using SIT tunnels and for more than net.ipv6.route.gc_thresh flows. Fixes: c54419321455 ("GRE: Refactor GRE tunneling code.") Signed-off-by: Oliver Herms Acked-by: Willem de Bruijn Link: https://lore.kernel.org/r/20201103104133.GA1573211@tws Signed-off-by: Jakub Kicinski Signed-off-by: Greg Kroah-Hartman --- net/ipv6/sit.c | 2 -- 1 file changed, 2 deletions(-) --- a/net/ipv6/sit.c +++ b/net/ipv6/sit.c @@ -1128,7 +1128,6 @@ static void ipip6_tunnel_bind_dev(struct if (tdev && !netif_is_l3_master(tdev)) { int t_hlen = tunnel->hlen + sizeof(struct iphdr); - dev->hard_header_len = tdev->hard_header_len + sizeof(struct iphdr); dev->mtu = tdev->mtu - t_hlen; if (dev->mtu < IPV6_MIN_MTU) dev->mtu = IPV6_MIN_MTU; @@ -1426,7 +1425,6 @@ static void ipip6_tunnel_setup(struct ne dev->priv_destructor = ipip6_dev_free; dev->type = ARPHRD_SIT; - dev->hard_header_len = LL_MAX_HEADER + t_hlen; dev->mtu = ETH_DATA_LEN - t_hlen; dev->min_mtu = IPV6_MIN_MTU; dev->max_mtu = IP6_MAX_MTU - t_hlen;