Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp697136pxv; Thu, 22 Jul 2021 09:58:06 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyG5qpN3LMKerD69q3WDPrw+8AiUwU7M7xX3TRSmEJxhL0DauIag1hr2gVnVfNjANr9fhu4 X-Received: by 2002:a17:906:4410:: with SMTP id x16mr856709ejo.44.1626973086511; Thu, 22 Jul 2021 09:58:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626973086; cv=none; d=google.com; s=arc-20160816; b=LT63aPzlXvbJJKNQWLbF61Mu4QaZj2zELE3uslFr1J0bNMo43WBuBNQVzuhGr3h1oA LZGBtFT7lIs6tOGu3sOU6zwEjmONNDOnDN9kpGZ/CRkHq1Vq3LBh/q/ihShaozBcsppj RmKWhOwI+dH0fB9fl/Z9ntyViMsuGjT/GAVAxrKH50m1dEEeTz4bLYVQ07FmpYU6BcSz uJTH0vBpgLoHYoLfkg5QONEFe5PHhrnkEI/IQeEbkvZWsd5nYCOFjiXJY5lIInJ3zndA lFUcvASCmfuKN2YKCJU4JlpAt4Jcd83YkTI5GT4ct+5oU/6/SqX3JCkDS9Z5RRR3cm7n uC3Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=vclWNpkH1C3Ep2uFd3ISoZzJRya1Dk+PXv0UfnuMhEs=; b=IsK4ynKcE8cxvZ5UXfZOUXMXrVXQLXtM6xL2VVMVGPYk/u5UI5dwYxK2J1m1oWDLfi I3OpJOQB2PDTaDBmYpNGtGTARM127eg+w7Iym2Vvdhv/gYRDlVdp4CBGvXj3CwjtYuFb E8GpoM6tEnOqIW5MNWYBlkyWqf3hso+EIpAvdwpQKe4LkneYSLCKkxBu7dC213EKylVl g+u0lVZzjmuX2maBNYCLeKA82NwmZtIWyCuRO2UIjdYvG+YjcZecFddRJP9K54x+sm3+ b8wzrCscfqfM421ZGOc4GH85evFwq0EOS6J+MPNCHPPrlnq5T1eyLWOJFpCqU2r4+eXS hxiQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=rgyXXWDN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d9si30286753ede.533.2021.07.22.09.57.43; Thu, 22 Jul 2021 09:58:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=rgyXXWDN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235722AbhGVQLw (ORCPT + 99 others); Thu, 22 Jul 2021 12:11:52 -0400 Received: from mail.kernel.org ([198.145.29.99]:51984 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233150AbhGVQHK (ORCPT ); Thu, 22 Jul 2021 12:07:10 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 54EA961D30; Thu, 22 Jul 2021 16:47:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626972464; bh=KVJQDHg+koXl4QxZHfvKYjYa/TXmNjwLGPHmjBZWMHk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=rgyXXWDNmR+cIdxs1Gh3XP9fToUzIU0+UPluwwGclqIPfqOCypr0j6jsMxbPERSVK P+OWY556xVo66z7+oj86OerNZKmzFQ0+sW14pougzdgoWXzXDk4geMo5JlQmKjI2B6 kMsSbFcoxFmMo30DWvb8RMDAvDMYqyMCGC0MU9FU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jianlin Shi , Hangbin Liu , "David S. Miller" Subject: [PATCH 5.13 125/156] net: ip_tunnel: fix mtu calculation for ETHER tunnel devices Date: Thu, 22 Jul 2021 18:31:40 +0200 Message-Id: <20210722155632.403279861@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210722155628.371356843@linuxfoundation.org> References: <20210722155628.371356843@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Hangbin Liu commit 9992a078b1771da354ac1f9737e1e639b687caa2 upstream. Commit 28e104d00281 ("net: ip_tunnel: fix mtu calculation") removed dev->hard_header_len subtraction when calculate MTU for tunnel devices as there is an overhead for device that has header_ops. But there are ETHER tunnel devices, like gre_tap or erspan, which don't have header_ops but set dev->hard_header_len during setup. This makes pkts greater than (MTU - ETH_HLEN) could not be xmited. Fix it by subtracting the ETHER tunnel devices' dev->hard_header_len for MTU calculation. Fixes: 28e104d00281 ("net: ip_tunnel: fix mtu calculation") Reported-by: Jianlin Shi Signed-off-by: Hangbin Liu Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/ipv4/ip_tunnel.c | 18 +++++++++++++++--- 1 file changed, 15 insertions(+), 3 deletions(-) --- a/net/ipv4/ip_tunnel.c +++ b/net/ipv4/ip_tunnel.c @@ -317,7 +317,7 @@ static int ip_tunnel_bind_dev(struct net } dev->needed_headroom = t_hlen + hlen; - mtu -= t_hlen; + mtu -= t_hlen + (dev->type == ARPHRD_ETHER ? dev->hard_header_len : 0); if (mtu < IPV4_MIN_MTU) mtu = IPV4_MIN_MTU; @@ -348,6 +348,9 @@ static struct ip_tunnel *ip_tunnel_creat t_hlen = nt->hlen + sizeof(struct iphdr); dev->min_mtu = ETH_MIN_MTU; dev->max_mtu = IP_MAX_MTU - t_hlen; + if (dev->type == ARPHRD_ETHER) + dev->max_mtu -= dev->hard_header_len; + ip_tunnel_add(itn, nt); return nt; @@ -489,11 +492,14 @@ static int tnl_update_pmtu(struct net_de tunnel_hlen = md ? tunnel_hlen : tunnel->hlen; pkt_size = skb->len - tunnel_hlen; + pkt_size -= dev->type == ARPHRD_ETHER ? dev->hard_header_len : 0; - if (df) + if (df) { mtu = dst_mtu(&rt->dst) - (sizeof(struct iphdr) + tunnel_hlen); - else + mtu -= dev->type == ARPHRD_ETHER ? dev->hard_header_len : 0; + } else { mtu = skb_valid_dst(skb) ? dst_mtu(skb_dst(skb)) : dev->mtu; + } if (skb_valid_dst(skb)) skb_dst_update_pmtu_no_confirm(skb, mtu); @@ -972,6 +978,9 @@ int __ip_tunnel_change_mtu(struct net_de int t_hlen = tunnel->hlen + sizeof(struct iphdr); int max_mtu = IP_MAX_MTU - t_hlen; + if (dev->type == ARPHRD_ETHER) + max_mtu -= dev->hard_header_len; + if (new_mtu < ETH_MIN_MTU) return -EINVAL; @@ -1149,6 +1158,9 @@ int ip_tunnel_newlink(struct net_device if (tb[IFLA_MTU]) { unsigned int max = IP_MAX_MTU - (nt->hlen + sizeof(struct iphdr)); + if (dev->type == ARPHRD_ETHER) + max -= dev->hard_header_len; + mtu = clamp(dev->mtu, (unsigned int)ETH_MIN_MTU, max); }