Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp469298yba; Wed, 15 May 2019 04:40:37 -0700 (PDT) X-Google-Smtp-Source: APXvYqw3kaxWUd9yEaT7IOlG5Ano3/VkitswY0UdgNZp5N3MPSq9wp+j8Nd2Lm7Yo2J1LqEzoR/k X-Received: by 2002:a65:6559:: with SMTP id a25mr19731510pgw.33.1557920437607; Wed, 15 May 2019 04:40:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557920437; cv=none; d=google.com; s=arc-20160816; b=cznOujtNyF6W1jssUnh/CnyLno9Zf/XKXKFMrL0+UZCCZb7u2jCjYV1/l0L45ajnuJ J0p294ygaI8ryF5v5NFHXs8PoVfUhElk5+sFu5l5qyIpyUR0gEuXKdkvQejRO0SELsF9 M9+UlGNOaYJaNOmwGZ2RccJfQ0cUXkUQ5tH5/Sz0r/mYh2i4JaoidGhoaZlK3Y6dmNb5 plDbyQn/fQFiYeOhpIQzJXHdSmSxETDFx9AaaqGAEsGZ/TXheCLXcsmlfZSCic4v6icV yxWcvmsDlWeB/9jBq4cDXcyfnxrt/NyybcqNOM+FmVjpzb4EM744pGsN0bWjVV7A03HD QpgA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=5QXbAYwtvAt7oRAZfQ4IeSIIJi36YLc+CiD9jMBXL/I=; b=HoC8LTsYb2taDKIWdnQknKztzidVk6cMTsDq/ePYJ33Vcpi7+3WqzTLi5vHBlqwVOc LCZ2UhhjiQv4wYqlMq2Yzt6scgX5CP+IKjvVei54ls+fTOqYaZOrirHJkvBSx1Po3Q6E h5KZuIqi96jYhBco+d2E0t99ZYu5d3Yy5q7KlGducTH2uWZiWge2w++RAB6SnMHBF13r z7DmN2jOvsA2wsC4rhtb7NAlpndZu8BSC4SvGjKbcKSeDgVQ5lQo+qzURMLPHoFTAQDe Up/y9kEM/Kkc+EwH3inyfCibGDP16s07v/C88mNMisthI+DQIb30rCfZ0gq3Z6d8aZTR zC5g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="fSf/oJbs"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n16si1593169plp.130.2019.05.15.04.40.23; Wed, 15 May 2019 04:40:37 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="fSf/oJbs"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732826AbfEOLbC (ORCPT + 99 others); Wed, 15 May 2019 07:31:02 -0400 Received: from mail.kernel.org ([198.145.29.99]:42654 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726466AbfEOLbA (ORCPT ); Wed, 15 May 2019 07:31:00 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BFD4B206BF; Wed, 15 May 2019 11:30:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1557919860; bh=GlqbzxP1iKRD9SbG11QnA4E7zsVZc8ZExrGnkid4cR4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=fSf/oJbsX1iWeRMvAk2YIhSbjm9GRiCV9BbT0SWjqD9cPD0by4z2REOPYr3v08Cau 1aw0DrnvQaDDuE+k+9sLTpZkNsxGLVtDf3gSdGy7etekxkULWDptAzC20g8q/vqKlo 1lATqUM5AlDBAdjiDmUY2OQvujNaUyT9SrlilCls= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Stephen Suryaputra , David Ahern , "David S. Miller" Subject: [PATCH 5.0 119/137] vrf: sit mtu should not be updated when vrf netdev is the link Date: Wed, 15 May 2019 12:56:40 +0200 Message-Id: <20190515090702.322044748@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190515090651.633556783@linuxfoundation.org> References: <20190515090651.633556783@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Stephen Suryaputra [ Upstream commit ff6ab32bd4e073976e4d8797b4d514a172cfe6cb ] VRF netdev mtu isn't typically set and have an mtu of 65536. When the link of a tunnel is set, the tunnel mtu is changed from 1480 to the link mtu minus tunnel header. In the case of VRF netdev is the link, then the tunnel mtu becomes 65516. So, fix it by not setting the tunnel mtu in this case. Signed-off-by: Stephen Suryaputra Reviewed-by: David Ahern Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/ipv6/sit.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/net/ipv6/sit.c +++ b/net/ipv6/sit.c @@ -1084,7 +1084,7 @@ static void ipip6_tunnel_bind_dev(struct if (!tdev && tunnel->parms.link) tdev = __dev_get_by_index(tunnel->net, tunnel->parms.link); - if (tdev) { + if (tdev && !netif_is_l3_master(tdev)) { int t_hlen = tunnel->hlen + sizeof(struct iphdr); dev->hard_header_len = tdev->hard_header_len + sizeof(struct iphdr);