Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp2837391pxv; Mon, 12 Jul 2021 03:10:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwr0gFdt87D4nsZmULh0zVL62uOpyc3epNGUwn9uRffeuHff7hFdIHk7ZSZI2GUEbWG/tAg X-Received: by 2002:a02:a595:: with SMTP id b21mr8469839jam.122.1626084631227; Mon, 12 Jul 2021 03:10:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626084631; cv=none; d=google.com; s=arc-20160816; b=CIQdMiAzm6hOLM3Gz6cHXfOAQAxhIsk4nF7Iu5AC313XV0iDCwJxmDTAbxbYK9C2kT paE9t/6pTVkoc5eD3qh7umv8hyg1R03+GpHrrhpdONMg6wG9RqMSpkiGUcPdNF4MGIWF W+rsPe+Fw0jk+n1LjYydAI2+PbezVey//Wewb2Rh7ZbM893A8rgy4e1uwOtutWS/6N12 XvP6chxNyxfvTdYzrps8uuhW2+M6WHOxBtbtVst5GXgQ2MenPP/56LkfS6kdJS+13fzm cgSLtodTo4hXaXmT8lVAaDH1Xl/JLwgPCTehLivCNTAbIYHPYUQX3K106fxc6IigUJsT CZ+A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=NKKrIXNt7WZaU2boQu39+T53LtG1o2RxRapBFkLbG9M=; b=ny50WIonw8+qnZziW5DesOp4egiWPbFzoO3u7G9HEXMiZQ6NEuY1ziOFtG05MFVCsO BC9aaNnZdzKV7TcPGuIG/vbBEoonuIM7BLpFrKoiSFS/VRD1ZLE8ZnHOI0cJUznO9a25 eBcM846AyjKBN59bnTgx5BvK0ay4fbODP8tLcvQR94hf/qBjsjKUKFtiuFdzFQsMjEyG dVzTA8s/CKzLRBJ8c1lqe7ttMzTlbELkXKEs+B1ac+6fUv1nW+pTkIeU57yVtDLTszeJ lCmBpImtixxWPESd3OUTEMY+FEtgFN9btRIb4u7qvIgh6o/ly+0gv17N9QLK5MfP3w91 xpBQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=dWM1JhE2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k14si16428450ion.22.2021.07.12.03.10.20; Mon, 12 Jul 2021 03:10:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=dWM1JhE2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1347927AbhGLH5X (ORCPT + 99 others); Mon, 12 Jul 2021 03:57:23 -0400 Received: from mail.kernel.org ([198.145.29.99]:58128 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1343909AbhGLHUL (ORCPT ); Mon, 12 Jul 2021 03:20:11 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id BF8ED61153; Mon, 12 Jul 2021 07:17:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626074243; bh=PE8xFI6WzVQ7/79bXIRloO3MbpWYU7O2UOJVNT41eak=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=dWM1JhE2XZaMej/G48elAoydVH4D8aZki28aOW0vATaxTHRzHwey9/Z2FPVR3rTt3 eXkUY5/jnPBsm/Hku4HwxDtKrd2lfkst9lzL+ALnZE15CzLNj//E8uB9E4bOKysvvB 5m22UeFARzhaSC7x7TkD3X3xHbl5ta6lpxZMf8R0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, David Ahern , Vadim Fedorenko , David Ahern , "David S. Miller" , Sasha Levin Subject: [PATCH 5.12 513/700] net: lwtunnel: handle MTU calculation in forwading Date: Mon, 12 Jul 2021 08:09:56 +0200 Message-Id: <20210712061031.126154253@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210712060924.797321836@linuxfoundation.org> References: <20210712060924.797321836@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Vadim Fedorenko [ Upstream commit fade56410c22cacafb1be9f911a0afd3701d8366 ] Commit 14972cbd34ff ("net: lwtunnel: Handle fragmentation") moved fragmentation logic away from lwtunnel by carry encap headroom and use it in output MTU calculation. But the forwarding part was not covered and created difference in MTU for output and forwarding and further to silent drops on ipv4 forwarding path. Fix it by taking into account lwtunnel encap headroom. The same commit also introduced difference in how to treat RTAX_MTU in IPv4 and IPv6 where latter explicitly removes lwtunnel encap headroom from route MTU. Make IPv4 version do the same. Fixes: 14972cbd34ff ("net: lwtunnel: Handle fragmentation") Suggested-by: David Ahern Signed-off-by: Vadim Fedorenko Reviewed-by: David Ahern Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- include/net/ip.h | 12 ++++++++---- include/net/ip6_route.h | 16 ++++++++++++---- net/ipv4/route.c | 3 ++- 3 files changed, 22 insertions(+), 9 deletions(-) diff --git a/include/net/ip.h b/include/net/ip.h index e20874059f82..d9683bef8684 100644 --- a/include/net/ip.h +++ b/include/net/ip.h @@ -31,6 +31,7 @@ #include #include #include +#include #define IPV4_MAX_PMTU 65535U /* RFC 2675, Section 5.1 */ #define IPV4_MIN_MTU 68 /* RFC 791 */ @@ -445,22 +446,25 @@ static inline unsigned int ip_dst_mtu_maybe_forward(const struct dst_entry *dst, /* 'forwarding = true' case should always honour route mtu */ mtu = dst_metric_raw(dst, RTAX_MTU); - if (mtu) - return mtu; + if (!mtu) + mtu = min(READ_ONCE(dst->dev->mtu), IP_MAX_MTU); - return min(READ_ONCE(dst->dev->mtu), IP_MAX_MTU); + return mtu - lwtunnel_headroom(dst->lwtstate, mtu); } static inline unsigned int ip_skb_dst_mtu(struct sock *sk, const struct sk_buff *skb) { + unsigned int mtu; + if (!sk || !sk_fullsock(sk) || ip_sk_use_pmtu(sk)) { bool forwarding = IPCB(skb)->flags & IPSKB_FORWARDED; return ip_dst_mtu_maybe_forward(skb_dst(skb), forwarding); } - return min(READ_ONCE(skb_dst(skb)->dev->mtu), IP_MAX_MTU); + mtu = min(READ_ONCE(skb_dst(skb)->dev->mtu), IP_MAX_MTU); + return mtu - lwtunnel_headroom(skb_dst(skb)->lwtstate, mtu); } struct dst_metrics *ip_fib_metrics_init(struct net *net, struct nlattr *fc_mx, diff --git a/include/net/ip6_route.h b/include/net/ip6_route.h index f51a118bfce8..f14149df5a65 100644 --- a/include/net/ip6_route.h +++ b/include/net/ip6_route.h @@ -265,11 +265,18 @@ int ip6_fragment(struct net *net, struct sock *sk, struct sk_buff *skb, static inline int ip6_skb_dst_mtu(struct sk_buff *skb) { + int mtu; + struct ipv6_pinfo *np = skb->sk && !dev_recursion_level() ? inet6_sk(skb->sk) : NULL; - return (np && np->pmtudisc >= IPV6_PMTUDISC_PROBE) ? - skb_dst(skb)->dev->mtu : dst_mtu(skb_dst(skb)); + if (np && np->pmtudisc >= IPV6_PMTUDISC_PROBE) { + mtu = READ_ONCE(skb_dst(skb)->dev->mtu); + mtu -= lwtunnel_headroom(skb_dst(skb)->lwtstate, mtu); + } else + mtu = dst_mtu(skb_dst(skb)); + + return mtu; } static inline bool ip6_sk_accept_pmtu(const struct sock *sk) @@ -317,7 +324,7 @@ static inline unsigned int ip6_dst_mtu_forward(const struct dst_entry *dst) if (dst_metric_locked(dst, RTAX_MTU)) { mtu = dst_metric_raw(dst, RTAX_MTU); if (mtu) - return mtu; + goto out; } mtu = IPV6_MIN_MTU; @@ -327,7 +334,8 @@ static inline unsigned int ip6_dst_mtu_forward(const struct dst_entry *dst) mtu = idev->cnf.mtu6; rcu_read_unlock(); - return mtu; +out: + return mtu - lwtunnel_headroom(dst->lwtstate, mtu); } u32 ip6_mtu_from_fib6(const struct fib6_result *res, diff --git a/net/ipv4/route.c b/net/ipv4/route.c index 09506203156d..484064daa95a 100644 --- a/net/ipv4/route.c +++ b/net/ipv4/route.c @@ -1331,7 +1331,7 @@ INDIRECT_CALLABLE_SCOPE unsigned int ipv4_mtu(const struct dst_entry *dst) mtu = dst_metric_raw(dst, RTAX_MTU); if (mtu) - return mtu; + goto out; mtu = READ_ONCE(dst->dev->mtu); @@ -1340,6 +1340,7 @@ INDIRECT_CALLABLE_SCOPE unsigned int ipv4_mtu(const struct dst_entry *dst) mtu = 576; } +out: mtu = min_t(unsigned int, mtu, IP_MAX_MTU); return mtu - lwtunnel_headroom(dst->lwtstate, mtu); -- 2.30.2