Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp680548pxv; Thu, 22 Jul 2021 09:36:33 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw9itWD1gaYzqt/457fypQPJOpefY7SWzZymNa+alCfCLZ0yRFkpgcasOvsEDqfRMi3t7Bz X-Received: by 2002:a05:6638:1383:: with SMTP id w3mr392161jad.32.1626971793002; Thu, 22 Jul 2021 09:36:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626971792; cv=none; d=google.com; s=arc-20160816; b=yZKX9RQUbh0LTuQtmDV3nWtaUIufEuazvXFy5tCo1XyL4Y+U4ikyRoyormo62kWGnj KAeg+kMZ2KjROFR6o+/Gg2rEYy0YHHZd/uWITb4EMclOdHIWjSZn/oQZjHmSh39+PPYi lt5NkcNuYYD6kRaRJvHyrL25IlelUM5nMm12SUyRllNtWtXIMxwQocTEZnDhaM+uz2NI VIgN1AnHmzc4K5dkdkfr24SvHU3xqhZs+YFR5vDaaQulm7HElcBbC76ck5fy6KcHIS2Y cPOzk4RHYpiXL1PMg6DVGQUOo4Xg5ZzwcS2oNLypj72cJv8IyIoL8P+6wvhrhizIZwT5 diAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=d23jk6VWi74iUJ6I2//sQ5XINpYtZruTNOWE9hP2sLQ=; b=1K3Ta083DsasFmd2esoSn/0A0/BsfDHchXMYSliGH/l/VR/pLsEeh9DyWqwp4Bh5O2 KeqWrIM4lNzbYOtfs1oMPW/+yqJmZ79jKFeY/UwV9TGA2iHB1G7D7NoJPZ4FmPA+48p7 eMK13hCAE9q7e84Vx8OjcBY/0VqcequOlFGfgC+gqu/mNvy2dJBdVCEDdMLtIbRNVsip u1mP1+PwbJwPZk4GFV0tuOQGeFJxftLrC10zy2WQvjB9qkR10YXGvUvjzt+nN293MR0a VwubFMxFuKUaprHq9CYj839HkihJtH5n+iezUF4t+4WQRwwo99cGe9V4HiUFXG/3ZhDu eW7A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=vonEJq19; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z13si28231921ile.110.2021.07.22.09.36.21; Thu, 22 Jul 2021 09:36:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=vonEJq19; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232064AbhGVPy1 (ORCPT + 99 others); Thu, 22 Jul 2021 11:54:27 -0400 Received: from mail.kernel.org ([198.145.29.99]:57858 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229739AbhGVPyL (ORCPT ); Thu, 22 Jul 2021 11:54:11 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 76CE660FDA; Thu, 22 Jul 2021 16:34:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626971686; bh=FDKKSz/Ovyn1RrwWP4fwl9j5+VUOc+Gg4j/6gsr60v4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=vonEJq1969ep1PUi6EpokDntnRMgWjwmuEVWCT6ZNltqLNsLExR0tZ5f6E/xSu/eW Gwr8OSc3KLYQb1Mr4al6POoaCxTDJPwcl9AVj88nh7NPLHAbt/prBmBZOLfy1/KPzB eREWTO5xUrj9XMnF+FPOoOLoDBPNrxQvMLV4Fnn0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jianlin Shi , Hangbin Liu , "David S. Miller" Subject: [PATCH 5.4 59/71] net: ip_tunnel: fix mtu calculation for ETHER tunnel devices Date: Thu, 22 Jul 2021 18:31:34 +0200 Message-Id: <20210722155619.870053526@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210722155617.865866034@linuxfoundation.org> References: <20210722155617.865866034@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Hangbin Liu commit 9992a078b1771da354ac1f9737e1e639b687caa2 upstream. Commit 28e104d00281 ("net: ip_tunnel: fix mtu calculation") removed dev->hard_header_len subtraction when calculate MTU for tunnel devices as there is an overhead for device that has header_ops. But there are ETHER tunnel devices, like gre_tap or erspan, which don't have header_ops but set dev->hard_header_len during setup. This makes pkts greater than (MTU - ETH_HLEN) could not be xmited. Fix it by subtracting the ETHER tunnel devices' dev->hard_header_len for MTU calculation. Fixes: 28e104d00281 ("net: ip_tunnel: fix mtu calculation") Reported-by: Jianlin Shi Signed-off-by: Hangbin Liu Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/ipv4/ip_tunnel.c | 18 +++++++++++++++--- 1 file changed, 15 insertions(+), 3 deletions(-) --- a/net/ipv4/ip_tunnel.c +++ b/net/ipv4/ip_tunnel.c @@ -317,7 +317,7 @@ static int ip_tunnel_bind_dev(struct net } dev->needed_headroom = t_hlen + hlen; - mtu -= t_hlen; + mtu -= t_hlen + (dev->type == ARPHRD_ETHER ? dev->hard_header_len : 0); if (mtu < IPV4_MIN_MTU) mtu = IPV4_MIN_MTU; @@ -348,6 +348,9 @@ static struct ip_tunnel *ip_tunnel_creat t_hlen = nt->hlen + sizeof(struct iphdr); dev->min_mtu = ETH_MIN_MTU; dev->max_mtu = IP_MAX_MTU - t_hlen; + if (dev->type == ARPHRD_ETHER) + dev->max_mtu -= dev->hard_header_len; + ip_tunnel_add(itn, nt); return nt; @@ -495,11 +498,14 @@ static int tnl_update_pmtu(struct net_de tunnel_hlen = md ? tunnel_hlen : tunnel->hlen; pkt_size = skb->len - tunnel_hlen; + pkt_size -= dev->type == ARPHRD_ETHER ? dev->hard_header_len : 0; - if (df) + if (df) { mtu = dst_mtu(&rt->dst) - (sizeof(struct iphdr) + tunnel_hlen); - else + mtu -= dev->type == ARPHRD_ETHER ? dev->hard_header_len : 0; + } else { mtu = skb_valid_dst(skb) ? dst_mtu(skb_dst(skb)) : dev->mtu; + } if (skb_valid_dst(skb)) skb_dst_update_pmtu_no_confirm(skb, mtu); @@ -965,6 +971,9 @@ int __ip_tunnel_change_mtu(struct net_de int t_hlen = tunnel->hlen + sizeof(struct iphdr); int max_mtu = IP_MAX_MTU - t_hlen; + if (dev->type == ARPHRD_ETHER) + max_mtu -= dev->hard_header_len; + if (new_mtu < ETH_MIN_MTU) return -EINVAL; @@ -1142,6 +1151,9 @@ int ip_tunnel_newlink(struct net_device if (tb[IFLA_MTU]) { unsigned int max = IP_MAX_MTU - (nt->hlen + sizeof(struct iphdr)); + if (dev->type == ARPHRD_ETHER) + max -= dev->hard_header_len; + mtu = clamp(dev->mtu, (unsigned int)ETH_MIN_MTU, max); }