]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
net/ip6_tunnel: Prevent perpetual tunnel growth
authorDmitry Safonov <dima@arista.com>
Thu, 9 Oct 2025 15:02:19 +0000 (16:02 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Wed, 29 Oct 2025 12:59:56 +0000 (13:59 +0100)
[ Upstream commit 21f4d45eba0b2dcae5dbc9e5e0ad08735c993f16 ]

Similarly to ipv4 tunnel, ipv6 version updates dev->needed_headroom, too.
While ipv4 tunnel headroom adjustment growth was limited in
commit 5ae1e9922bbd ("net: ip_tunnel: prevent perpetual headroom growth"),
ipv6 tunnel yet increases the headroom without any ceiling.

Reflect ipv4 tunnel headroom adjustment limit on ipv6 version.

Credits to Francesco Ruggeri, who was originally debugging this issue
and wrote local Arista-specific patch and a reproducer.

Fixes: 8eb30be0352d ("ipv6: Create ip6_tnl_xmit")
Cc: Florian Westphal <fw@strlen.de>
Cc: Francesco Ruggeri <fruggeri05@gmail.com>
Signed-off-by: Dmitry Safonov <dima@arista.com>
Link: https://patch.msgid.link/20251009-ip6_tunnel-headroom-v2-1-8e4dbd8f7e35@arista.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
include/net/ip_tunnels.h
net/ipv4/ip_tunnel.c
net/ipv6/ip6_tunnel.c

index 3a04e2ccfb39364561850b29196db38e472a5494..d2945ec5aba2158ebce4304924bcc069ecef3d5d 100644 (file)
@@ -454,6 +454,21 @@ void iptunnel_xmit(struct sock *sk, struct rtable *rt, struct sk_buff *skb,
 struct metadata_dst *iptunnel_metadata_reply(struct metadata_dst *md,
                                             gfp_t flags);
 
+static inline void ip_tunnel_adj_headroom(struct net_device *dev,
+                                         unsigned int headroom)
+{
+       /* we must cap headroom to some upperlimit, else pskb_expand_head
+        * will overflow header offsets in skb_headers_offset_update().
+        */
+       const unsigned int max_allowed = 512;
+
+       if (headroom > max_allowed)
+               headroom = max_allowed;
+
+       if (headroom > READ_ONCE(dev->needed_headroom))
+               WRITE_ONCE(dev->needed_headroom, headroom);
+}
+
 int iptunnel_handle_offloads(struct sk_buff *skb, int gso_type_mask);
 
 static inline int iptunnel_pull_offloads(struct sk_buff *skb)
index 906c37c7f80d579a8495a2a3fd28296e48d22fdd..38cace81bfa2dcc96558bcadca71ea6b285abd71 100644 (file)
@@ -560,20 +560,6 @@ static int tnl_update_pmtu(struct net_device *dev, struct sk_buff *skb,
        return 0;
 }
 
-static void ip_tunnel_adj_headroom(struct net_device *dev, unsigned int headroom)
-{
-       /* we must cap headroom to some upperlimit, else pskb_expand_head
-        * will overflow header offsets in skb_headers_offset_update().
-        */
-       static const unsigned int max_allowed = 512;
-
-       if (headroom > max_allowed)
-               headroom = max_allowed;
-
-       if (headroom > READ_ONCE(dev->needed_headroom))
-               WRITE_ONCE(dev->needed_headroom, headroom);
-}
-
 void ip_md_tunnel_xmit(struct sk_buff *skb, struct net_device *dev,
                       u8 proto, int tunnel_hlen)
 {
index 5319093d9aa6299ddbd691c03026108f6c7f746c..c79e6c032b3008b972c529f5ec0753de45ad0c25 100644 (file)
@@ -1201,8 +1201,7 @@ route_lookup:
         */
        max_headroom = LL_RESERVED_SPACE(dst->dev) + sizeof(struct ipv6hdr)
                        + dst->header_len + t->hlen;
-       if (max_headroom > READ_ONCE(dev->needed_headroom))
-               WRITE_ONCE(dev->needed_headroom, max_headroom);
+       ip_tunnel_adj_headroom(dev, max_headroom);
 
        err = ip6_tnl_encap(skb, t, &proto, fl6);
        if (err)