Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4340631pxj; Tue, 8 Jun 2021 11:56:19 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwGpWR0JJZTKBNDQX5QSf56tJFZIJSyNJbH2BxSp0TcMjAYKvlOUC5zCG6gWgwr8jPTJHCb X-Received: by 2002:aa7:da8c:: with SMTP id q12mr23027337eds.368.1623178579352; Tue, 08 Jun 2021 11:56:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623178579; cv=none; d=google.com; s=arc-20160816; b=I91OTYwRz4jONSZFbWE/t2QEnXgD3BWf8Eq5IgqZuhTzHEil0xQOeirOdL76wusO81 2aE/XxgwY9wGdrN9A3KYh0WFksErqYqZSbGrIpbSxqjRoUaPE85MVObSuqnUkPZMhrFG xTdzgICT8V5woDxXDNPi5fY+JF8GUijNDetNfuY/KF/y/hvuI1WvKdeRAV4X27u9aVVA 6cevoP1vPp4cmsVkqsrm5LABnn4hZZ4l9W+aUOKoqi7KsshypXGFNB5feYz8tbyxh38k q878RJezmP36tzC+jrLdMREgZOqn3wYPkyJkJTFDczkzdzZhXQFMhab7yfbr1x54hlyJ FnbQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=P5jH21yqhNgpEcL9rpa8AQcfrO+ArKgtVCHt4nz772Y=; b=r8fI0EDuGRtcBpCpy87vjUiFmUOAzOKL4AW0WZzdQ6bj0lxqiuEboFN/b460Pxjnx2 KOZKbhZbW6aZqB3FkKJbi9pNAIhy3qTtbn4uNBSRvbvhPLgkSgb7Z0fTFqZ+fCKjh7s3 AT7JTKBvMo3H2oKReNhQIzPW46F9uTFizy4nmlTs+uj8CyIiT5TRX55xVwR6HypR+edi tduMnibiYdYiTtQgWZgaTRjYuryc2/3hhZeDcjd7WMl5SXfdqxY2XPP0XGOgT6NVfBqm MdFsGf4/6Q3v1yEooIuB/zU2d9CkuKPXe5eNIPnYpie0cX8G4Q36QdvvCSL217S9ZlTM KXEA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="xU8/qvzC"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b3si370960ejb.219.2021.06.08.11.55.56; Tue, 08 Jun 2021 11:56:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="xU8/qvzC"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236871AbhFHSz1 (ORCPT + 99 others); Tue, 8 Jun 2021 14:55:27 -0400 Received: from mail.kernel.org ([198.145.29.99]:48898 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235878AbhFHStZ (ORCPT ); Tue, 8 Jun 2021 14:49:25 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id CE21961421; Tue, 8 Jun 2021 18:38:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1623177531; bh=p+PHPQ6gKflyziuFLdEsRRGWi8Rdwr30naO7QUZpkd0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=xU8/qvzCZauZdrRiK09Hot4XOJqaWmSa5EHnhWxa66qAX+qAKMwkk3Tbu+8OpKTpN gbH6+hzemTUQG4TiK4+QOVocRe51sE5eQL1IdzAs0/5dJahgBp2Akqbc6KfyrwrMc0 Mo+KaGGM6/OzC1z+UmFT2Qe4Xc5By1nuUBMQF8SY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Kasper Dupont , Thadeu Lima de Souza Cascardo , David Ahern , "David S. Miller" Subject: [PATCH 5.4 78/78] neighbour: allow NUD_NOARP entries to be forced GCed Date: Tue, 8 Jun 2021 20:27:47 +0200 Message-Id: <20210608175937.900254955@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210608175935.254388043@linuxfoundation.org> References: <20210608175935.254388043@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: David Ahern commit 7a6b1ab7475fd6478eeaf5c9d1163e7a18125c8f upstream. IFF_POINTOPOINT interfaces use NUD_NOARP entries for IPv6. It's possible to fill up the neighbour table with enough entries that it will overflow for valid connections after that. This behaviour is more prevalent after commit 58956317c8de ("neighbor: Improve garbage collection") is applied, as it prevents removal from entries that are not NUD_FAILED, unless they are more than 5s old. Fixes: 58956317c8de (neighbor: Improve garbage collection) Reported-by: Kasper Dupont Signed-off-by: Thadeu Lima de Souza Cascardo Signed-off-by: David Ahern Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/core/neighbour.c | 1 + 1 file changed, 1 insertion(+) --- a/net/core/neighbour.c +++ b/net/core/neighbour.c @@ -239,6 +239,7 @@ static int neigh_forced_gc(struct neigh_ write_lock(&n->lock); if ((n->nud_state == NUD_FAILED) || + (n->nud_state == NUD_NOARP) || (tbl->is_multicast && tbl->is_multicast(n->primary_key)) || time_after(tref, n->updated))