Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp4630161ybl; Wed, 22 Jan 2020 01:36:39 -0800 (PST) X-Google-Smtp-Source: APXvYqwOFbF10m2n1LKUvHsBxjI59MwpJKupos/moIGqn3M57bx0ccjenc78hHYZ2g51kloP1BcW X-Received: by 2002:a9d:7342:: with SMTP id l2mr6765611otk.98.1579685799564; Wed, 22 Jan 2020 01:36:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579685799; cv=none; d=google.com; s=arc-20160816; b=LJqZYtdRd6KvGeoPEUpuBXu+88DGvgZ2c3Jh9Vh1IKnS4FtExkz60X2nxW2e3dKW4w 8urHHD+YM3iYf7hIXYoXZjrdJoRcvwdfPSvc/vLVNYi4yr69zQAMhhe3zgvxby63DJiO d1w9YUzYMtnz65PN79+xDzyDtkLCxNX1YZg7qBGOxz8355mlmV5N2lSYOZMuz2pcfSrZ 7HwhkZ9gy8FlrNKDGD3+T//ASv+2pqCwk6hBQ6flzdhtauSL+EjyfhaXREMhkTqaA83b 0jrd67YiWe9fottTgqAaylDK/xKiyiY/pLDzHtWtBPdAwGZxXzb3UYym9hVsA9iV/7mo xvLQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=RVw0vO3mby+sdL84ml46kPf3CZimR6UH5ApPW7r/H/A=; b=Pi+nIXdoknffGqMyE5LjMJxczDJ0P7DUZfiPhQOzNJT2d/X3XwqLiA8mzndUUgL59G E92f0cV3fNpvS7/WjR2QsBxM2m8Jjbz0PFINBlQgKBX6JoEg9/DKINBeq70iB1caqZ4u kuIz/ZE/bQSBdtkA6NqtHFCV1wVhLecN7fHD4TkDEpBXv520sc9pbb0xe1KAUb6nX/MK rLNYgMI3JmPGjNMIL8vpvf44XVmjqopDBPChQJb5hGjMyLkRf/TVD1nNOKcdmmpB8OVl ukSM/4WbL8wsQj5wr5eloGWr5teMfTYKumvEwLXzcApO1//qrzisEOyt3H2F6A8sc9aO CB6A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wqOd7aYc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z4si19038605oix.48.2020.01.22.01.36.27; Wed, 22 Jan 2020 01:36:39 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wqOd7aYc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730775AbgAVJeM (ORCPT + 99 others); Wed, 22 Jan 2020 04:34:12 -0500 Received: from mail.kernel.org ([198.145.29.99]:48476 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730748AbgAVJeI (ORCPT ); Wed, 22 Jan 2020 04:34:08 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9970724673; Wed, 22 Jan 2020 09:34:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1579685648; bh=b2E0N1KPoxZfp6rZUdHInQxIfr6Q843GZncSMzOssY8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=wqOd7aYctkI0170Jf3w7gRoJe5tEd4TJsX6BitRhLvkmA9CF89SP+2aWR3AQZfAjv L+NyYx1l5nROM8lzR0zFjcozxj0Ss7aVUbCJevFgABmq66RuAqTrrKQuHO2ZQaWwA5 ig5sQR/ymtFyZp61RdXrX2MagyhTu/5EJJit9iXY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Taehee Yoo , "David S. Miller" Subject: [PATCH 4.9 23/97] hsr: reset network header when supervision frame is created Date: Wed, 22 Jan 2020 10:28:27 +0100 Message-Id: <20200122092759.868505148@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200122092755.678349497@linuxfoundation.org> References: <20200122092755.678349497@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Taehee Yoo commit 3ed0a1d563903bdb4b4c36c58c4d9c1bcb23a6e6 upstream. The supervision frame is L2 frame. When supervision frame is created, hsr module doesn't set network header. If tap routine is enabled, dev_queue_xmit_nit() is called and it checks network_header. If network_header pointer wasn't set(or invalid), it resets network_header and warns. In order to avoid unnecessary warning message, resetting network_header is needed. Test commands: ip netns add nst ip link add veth0 type veth peer name veth1 ip link add veth2 type veth peer name veth3 ip link set veth1 netns nst ip link set veth3 netns nst ip link set veth0 up ip link set veth2 up ip link add hsr0 type hsr slave1 veth0 slave2 veth2 ip a a 192.168.100.1/24 dev hsr0 ip link set hsr0 up ip netns exec nst ip link set veth1 up ip netns exec nst ip link set veth3 up ip netns exec nst ip link add hsr1 type hsr slave1 veth1 slave2 veth3 ip netns exec nst ip a a 192.168.100.2/24 dev hsr1 ip netns exec nst ip link set hsr1 up tcpdump -nei veth0 Splat looks like: [ 175.852292][ C3] protocol 88fb is buggy, dev veth0 Fixes: f421436a591d ("net/hsr: Add support for the High-availability Seamless Redundancy protocol (HSRv0)") Signed-off-by: Taehee Yoo Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/hsr/hsr_device.c | 2 ++ 1 file changed, 2 insertions(+) --- a/net/hsr/hsr_device.c +++ b/net/hsr/hsr_device.c @@ -281,6 +281,8 @@ static void send_hsr_supervision_frame(s skb->dev->dev_addr, skb->len) <= 0) goto out; skb_reset_mac_header(skb); + skb_reset_network_header(skb); + skb_reset_transport_header(skb); if (hsrVer > 0) { hsr_tag = (typeof(hsr_tag)) skb_put(skb, sizeof(struct hsr_tag));