Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp8604796ybl; Thu, 16 Jan 2020 20:44:00 -0800 (PST) X-Google-Smtp-Source: APXvYqww+zO6dRI2/gSDaciu0l0t83dRQQyFHl2rtn++/hvqKD9pI+Wx5aar9UQ7jtAZi99tod3j X-Received: by 2002:a9d:3cf:: with SMTP id f73mr4848486otf.11.1579236239994; Thu, 16 Jan 2020 20:43:59 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579236239; cv=none; d=google.com; s=arc-20160816; b=mCPK07vlPXPD6mspkgMiWE7Qnn/+FoLdJ0hWra6fuK/ZNWWUlHuPkgSRS7mjdUjlT9 pQkRMaxNqZFqXIhB0v4A3cLOksgGNty9KUbrKAZGUPqi9a4E2J27vXWc6Zw5uhkckSho hbfx1D3cwsbFPfyI274aoWfoSOer7xxSdLYt5V/NSvRjogIGQI0eJuuWZYtOxrldyDjb W+NdkwxCCfjvYnGFx9oJCbr+2P16Ov7h+WsV4Gy7kyxwTt/s6dFukmSz6zVgPH23vpDT FQ9LqK0rgHOmiYRnsbXXNnXN1XNkRT0xDad6AYusHw/syziNLJWbGcpBUBGMozn/7RJb 1yQw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=9Z/d44c3qqAbWrfQTFyg0KPy1byg8QKE/eke2WHZ3VU=; b=yK5tH/7HNyv8u70hfDrjf7HOqM+vajmo0ylqppo5edC9aB3sVcRmeBXo7ruc3ySqQo tONTFNjsUxHAXSfaJPeKVFXuxGFiyTxnFgp2sksuG/Y640NQNxS59OHCaDMgySLt+Q5g e1U6HqDtomvHQoMv4rDxzF2ijFeTnmk7xBXBH8hO9PdU06ZyAmpr81OORoctTqhTuTBa OgdLMieG6HMIetNxrUeQDqWp8wbthA7Jr2B87YM6dCReQZtUhfX7w3+TOpZFQUvJ/TY1 Py5m9Bk2ZVfqv2cG3IdzNokYgvJCtWA0dsfZ6Va4/4BaLFsvvwTB6Bjm6emBMS0IOAh1 pCSw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="JMd/C9uH"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q2si14751203otn.220.2020.01.16.20.43.47; Thu, 16 Jan 2020 20:43:59 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="JMd/C9uH"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390802AbgAPXjT (ORCPT + 99 others); Thu, 16 Jan 2020 18:39:19 -0500 Received: from mail.kernel.org ([198.145.29.99]:33046 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389017AbgAPX2Y (ORCPT ); Thu, 16 Jan 2020 18:28:24 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3FD642072E; Thu, 16 Jan 2020 23:28:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1579217303; bh=X/RhwB3ltoFu/o5xwb831LGVLfW0AvB+9BD9HsiGhGs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=JMd/C9uHfx7dUnS6BP0klwVYnfFFiX6U6tEMZ1EzL9WoL1L5bKAKTX31EYvLWjUOK eDq+Ehr0TYmNKo9ldSTniUSZBRovlsvsYzZwBAtm7QrwAfQiGAx4fD+FXG6X1Eg3+Y t1RIE9/7vfICA5SiMJylXhcUdhCiAddCKMAycMM8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Taehee Yoo , "David S. Miller" Subject: [PATCH 4.19 27/84] hsr: reset network header when supervision frame is created Date: Fri, 17 Jan 2020 00:18:01 +0100 Message-Id: <20200116231716.864291308@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200116231713.087649517@linuxfoundation.org> References: <20200116231713.087649517@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Taehee Yoo commit 3ed0a1d563903bdb4b4c36c58c4d9c1bcb23a6e6 upstream. The supervision frame is L2 frame. When supervision frame is created, hsr module doesn't set network header. If tap routine is enabled, dev_queue_xmit_nit() is called and it checks network_header. If network_header pointer wasn't set(or invalid), it resets network_header and warns. In order to avoid unnecessary warning message, resetting network_header is needed. Test commands: ip netns add nst ip link add veth0 type veth peer name veth1 ip link add veth2 type veth peer name veth3 ip link set veth1 netns nst ip link set veth3 netns nst ip link set veth0 up ip link set veth2 up ip link add hsr0 type hsr slave1 veth0 slave2 veth2 ip a a 192.168.100.1/24 dev hsr0 ip link set hsr0 up ip netns exec nst ip link set veth1 up ip netns exec nst ip link set veth3 up ip netns exec nst ip link add hsr1 type hsr slave1 veth1 slave2 veth3 ip netns exec nst ip a a 192.168.100.2/24 dev hsr1 ip netns exec nst ip link set hsr1 up tcpdump -nei veth0 Splat looks like: [ 175.852292][ C3] protocol 88fb is buggy, dev veth0 Fixes: f421436a591d ("net/hsr: Add support for the High-availability Seamless Redundancy protocol (HSRv0)") Signed-off-by: Taehee Yoo Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/hsr/hsr_device.c | 2 ++ 1 file changed, 2 insertions(+) --- a/net/hsr/hsr_device.c +++ b/net/hsr/hsr_device.c @@ -281,6 +281,8 @@ static void send_hsr_supervision_frame(s skb->dev->dev_addr, skb->len) <= 0) goto out; skb_reset_mac_header(skb); + skb_reset_network_header(skb); + skb_reset_transport_header(skb); if (hsrVer > 0) { hsr_tag = skb_put(skb, sizeof(struct hsr_tag));