From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3BB7E33F5BC; Mon, 20 Apr 2026 16:02:01 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1776700921; cv=none; b=vEuP2BiX7abXoYfd6oissqW6bx43Vu+7u2l/MFsNq9VPHLwqLV+u733latMRg6Mma3OjXT+8JPHspp8gq63ol9bu/HbnvR22MI/uyGLGfmW8jUrXCCFHV/XS9gP174u9/o9EFwOEgUhUKT0Lwa/JPiJCdqzotAMKujNFzfX8m1Y= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1776700921; c=relaxed/simple; bh=slaXQf7S/oqhzY5I+2Q/0pxspxxF5RDl1O83f1F4eu8=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=u1Ha0OA7OYxciCP25qc/8OV286yHjyS+uvqTAjG6e0/hrREk6PWyYXLWBkaE8o56MiQxLUrkq0swYfo992Y6IFjTq2uwmUUSDEiiGLqjBPQB+yWrDfkitCVDEvs6EoccMYDwFP+SV8BDRWEMZJB4TX68jrewv6NjBolvXgXzecE= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=d3erhsxT; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="d3erhsxT" Received: by smtp.kernel.org (Postfix) with ESMTPSA id C5C03C2BCB4; Mon, 20 Apr 2026 16:02:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1776700921; bh=slaXQf7S/oqhzY5I+2Q/0pxspxxF5RDl1O83f1F4eu8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=d3erhsxTmeBlBC3ddysatc0CEbUcWa/9Qt4zhYbQ5lP0OYCAEr3vMP+V3fsKOhHrm NwusoxFrqeUDZL6Mfa9p0M7rLRHwo3rIksn63mN3iQXEmkiICQCOdIe7Hl23TygM+C YjAJ/OLQD9atP8bquB3bNcEjsMRFQt+UzjzRHvVU= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Chris J Arges , Jakub Kicinski , Sasha Levin Subject: [PATCH 6.18 079/198] net: increase IP_TUNNEL_RECURSION_LIMIT to 5 Date: Mon, 20 Apr 2026 17:40:58 +0200 Message-ID: <20260420153938.453482819@linuxfoundation.org> X-Mailer: git-send-email 2.53.0 In-Reply-To: <20260420153935.605963767@linuxfoundation.org> References: <20260420153935.605963767@linuxfoundation.org> User-Agent: quilt/0.69 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: patches@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit 6.18-stable review patch. If anyone has any objections, please let me know. ------------------ From: Chris J Arges [ Upstream commit 77facb35227c421467cdb49268de433168c2dcef ] In configurations with multiple tunnel layers and MPLS lwtunnel routing, a single tunnel hop can increment the counter beyond this limit. This causes packets to be dropped with the "Dead loop on virtual device" message even when a routing loop doesn't exist. Increase IP_TUNNEL_RECURSION_LIMIT from 4 to 5 to handle this use-case. Fixes: 6f1a9140ecda ("net: add xmit recursion limit to tunnel xmit functions") Link: https://lore.kernel.org/netdev/88deb91b-ef1b-403c-8eeb-0f971f27e34f@redhat.com/ Signed-off-by: Chris J Arges Link: https://patch.msgid.link/20260402222401.3408368-1-carges@cloudflare.com Signed-off-by: Jakub Kicinski Signed-off-by: Sasha Levin --- include/net/ip_tunnels.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/include/net/ip_tunnels.h b/include/net/ip_tunnels.h index 80662f8120803..253ed3930f6ef 100644 --- a/include/net/ip_tunnels.h +++ b/include/net/ip_tunnels.h @@ -32,7 +32,7 @@ * recursion involves route lookups and full IP output, consuming much * more stack per level, so a lower limit is needed. */ -#define IP_TUNNEL_RECURSION_LIMIT 4 +#define IP_TUNNEL_RECURSION_LIMIT 5 /* Keep error state on tunnel for 30 sec */ #define IPTUNNEL_ERR_TIMEO (30*HZ) -- 2.53.0