Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp2733999pxv; Mon, 12 Jul 2021 00:12:16 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzslE+57tlqEYpHt8SYOIB1VhRhPao/qk7QFYbFpA9UgeC1lgR82y6MUV7+li/gryLu86p7 X-Received: by 2002:a92:c651:: with SMTP id 17mr36615751ill.44.1626073821284; Mon, 12 Jul 2021 00:10:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626073821; cv=none; d=google.com; s=arc-20160816; b=wY+KE9+KacAASyK1aaAOtqOxm/y1QAF+uINhMZtji+JDmay+GZB4EsBQjcyv/rQUkm xpsrr0HdR4/9WV5oevRUDLkFMCQiPNZJOQZktjBxqdfeBdsWKl7E0k6IdgtERNDoiVeX +srM6qzbW5DUwGR1AKVFgdztkVDGTIGT6KXHXLkYf98L5aNyL4h4bi+ZnqBHAroX/XGK sI9J8FWkFx5f7e3qzy8SJyKKO/+ud6DjM6ZZZHLj9lfi4sMXxXnjj8M1S8Hxmrn+dMTD lqByjKaH3D6gctmPK0ML12DK8eHz8/SKH6PFeoB7aT7VjvPu2aNkPucXKGZeSz9ts2uk yU/g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=EjAHGbTWsn84UwfnSzJxlvZa4nEriNhIG9clsmZp5jY=; b=FHnz5SIqlcW7eftKY5sVzZQZ0Ed01Q5RW/HPtc+WW0/xhQnfAPobtrbcjrsPXgYmR+ +BJbn6+WBMD5xVAeddsdVoZsAwp9O4i2dHm2w4ZXgPCLa+/GOVUlZrUdzQ2QuMQP9ZVX B70Cp+Fcl5v/I8nPlfwi6HCZus2S2M5Fk5/Kbg959LEGiBxfDr+HHx8y+uoqHXK4Jt1B ZSk1NeRBpoLtzsng0Sw2rVfCIfKHRAyjftXXUYZePqG1xXB8BKPpJjilw4cc5YdRtWU6 wrq4VeFRCBTlsj3m6HXWrk2K1UT0P2dxCCh046HMplEAfSfY1fMsqkmOJbYIUzfHaOyp tHrw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Vz8agWNX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l3si14608082ils.48.2021.07.12.00.10.09; Mon, 12 Jul 2021 00:10:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Vz8agWNX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244440AbhGLHKv (ORCPT + 99 others); Mon, 12 Jul 2021 03:10:51 -0400 Received: from mail.kernel.org ([198.145.29.99]:44286 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238622AbhGLGs5 (ORCPT ); Mon, 12 Jul 2021 02:48:57 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id CCF5C60FE3; Mon, 12 Jul 2021 06:44:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626072276; bh=x4JNba6xjjfVLQxm/JV0FfLpvnEaE+SAqmEXK4EIb5Q=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Vz8agWNXFRVVcPGc3iAMcx9PbdhBb+fNTiB4HbCZH5Z1qHLcDN1aoGmfCuj/+EzSV fYfGBai9JPz/oF3MrgKBvKiVTCiJHXfuaoUNEkLLZdIA9JPzo3qpe1tJT2eRf7lgRh S2c3/hS3I49EtZFSQm2k+03ke0kMfD7yy46WXg/Y= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, David Ahern , Vadim Fedorenko , David Ahern , "David S. Miller" , Sasha Levin Subject: [PATCH 5.10 427/593] net: lwtunnel: handle MTU calculation in forwading Date: Mon, 12 Jul 2021 08:09:47 +0200 Message-Id: <20210712060935.386975841@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210712060843.180606720@linuxfoundation.org> References: <20210712060843.180606720@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Vadim Fedorenko [ Upstream commit fade56410c22cacafb1be9f911a0afd3701d8366 ] Commit 14972cbd34ff ("net: lwtunnel: Handle fragmentation") moved fragmentation logic away from lwtunnel by carry encap headroom and use it in output MTU calculation. But the forwarding part was not covered and created difference in MTU for output and forwarding and further to silent drops on ipv4 forwarding path. Fix it by taking into account lwtunnel encap headroom. The same commit also introduced difference in how to treat RTAX_MTU in IPv4 and IPv6 where latter explicitly removes lwtunnel encap headroom from route MTU. Make IPv4 version do the same. Fixes: 14972cbd34ff ("net: lwtunnel: Handle fragmentation") Suggested-by: David Ahern Signed-off-by: Vadim Fedorenko Reviewed-by: David Ahern Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- include/net/ip.h | 12 ++++++++---- include/net/ip6_route.h | 16 ++++++++++++---- net/ipv4/route.c | 3 ++- 3 files changed, 22 insertions(+), 9 deletions(-) diff --git a/include/net/ip.h b/include/net/ip.h index 2d6b985d11cc..5538e54d4620 100644 --- a/include/net/ip.h +++ b/include/net/ip.h @@ -31,6 +31,7 @@ #include #include #include +#include #define IPV4_MAX_PMTU 65535U /* RFC 2675, Section 5.1 */ #define IPV4_MIN_MTU 68 /* RFC 791 */ @@ -445,22 +446,25 @@ static inline unsigned int ip_dst_mtu_maybe_forward(const struct dst_entry *dst, /* 'forwarding = true' case should always honour route mtu */ mtu = dst_metric_raw(dst, RTAX_MTU); - if (mtu) - return mtu; + if (!mtu) + mtu = min(READ_ONCE(dst->dev->mtu), IP_MAX_MTU); - return min(READ_ONCE(dst->dev->mtu), IP_MAX_MTU); + return mtu - lwtunnel_headroom(dst->lwtstate, mtu); } static inline unsigned int ip_skb_dst_mtu(struct sock *sk, const struct sk_buff *skb) { + unsigned int mtu; + if (!sk || !sk_fullsock(sk) || ip_sk_use_pmtu(sk)) { bool forwarding = IPCB(skb)->flags & IPSKB_FORWARDED; return ip_dst_mtu_maybe_forward(skb_dst(skb), forwarding); } - return min(READ_ONCE(skb_dst(skb)->dev->mtu), IP_MAX_MTU); + mtu = min(READ_ONCE(skb_dst(skb)->dev->mtu), IP_MAX_MTU); + return mtu - lwtunnel_headroom(skb_dst(skb)->lwtstate, mtu); } struct dst_metrics *ip_fib_metrics_init(struct net *net, struct nlattr *fc_mx, diff --git a/include/net/ip6_route.h b/include/net/ip6_route.h index 2a5277758379..37a7fb1969d6 100644 --- a/include/net/ip6_route.h +++ b/include/net/ip6_route.h @@ -264,11 +264,18 @@ int ip6_fragment(struct net *net, struct sock *sk, struct sk_buff *skb, static inline int ip6_skb_dst_mtu(struct sk_buff *skb) { + int mtu; + struct ipv6_pinfo *np = skb->sk && !dev_recursion_level() ? inet6_sk(skb->sk) : NULL; - return (np && np->pmtudisc >= IPV6_PMTUDISC_PROBE) ? - skb_dst(skb)->dev->mtu : dst_mtu(skb_dst(skb)); + if (np && np->pmtudisc >= IPV6_PMTUDISC_PROBE) { + mtu = READ_ONCE(skb_dst(skb)->dev->mtu); + mtu -= lwtunnel_headroom(skb_dst(skb)->lwtstate, mtu); + } else + mtu = dst_mtu(skb_dst(skb)); + + return mtu; } static inline bool ip6_sk_accept_pmtu(const struct sock *sk) @@ -316,7 +323,7 @@ static inline unsigned int ip6_dst_mtu_forward(const struct dst_entry *dst) if (dst_metric_locked(dst, RTAX_MTU)) { mtu = dst_metric_raw(dst, RTAX_MTU); if (mtu) - return mtu; + goto out; } mtu = IPV6_MIN_MTU; @@ -326,7 +333,8 @@ static inline unsigned int ip6_dst_mtu_forward(const struct dst_entry *dst) mtu = idev->cnf.mtu6; rcu_read_unlock(); - return mtu; +out: + return mtu - lwtunnel_headroom(dst->lwtstate, mtu); } u32 ip6_mtu_from_fib6(const struct fib6_result *res, diff --git a/net/ipv4/route.c b/net/ipv4/route.c index e968bb47d5bd..e15c1d8b7c8d 100644 --- a/net/ipv4/route.c +++ b/net/ipv4/route.c @@ -1327,7 +1327,7 @@ static unsigned int ipv4_mtu(const struct dst_entry *dst) mtu = dst_metric_raw(dst, RTAX_MTU); if (mtu) - return mtu; + goto out; mtu = READ_ONCE(dst->dev->mtu); @@ -1336,6 +1336,7 @@ static unsigned int ipv4_mtu(const struct dst_entry *dst) mtu = 576; } +out: mtu = min_t(unsigned int, mtu, IP_MAX_MTU); return mtu - lwtunnel_headroom(dst->lwtstate, mtu); -- 2.30.2