From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Google-Smtp-Source: AH8x225xc+cQyRCJ5C6d7xbyK9l6/f/Scy0/BDsHQQIIUsxhoEXpWGJ634+bqPsDWINSyj1AQmlq ARC-Seal: i=1; a=rsa-sha256; t=1517256250; cv=none; d=google.com; s=arc-20160816; b=n3RGZhUkMmt8Kl2QLKqUvChA8+g9Q0UQlwoyDRo1/rAZS9x6dfwuDYiSgiOq7pysvb SDTZKJ8LybZL/v7YMi6FXSUb4U5Y+9Zvb9UmDSad2Ve/Q6et8z1Qb3c7mjAR2jnE/93D bg/fCwFndMtiz57sseMjj6tNoQJ8HAhC6AeSTGWpVidt9CEC4/Wac2EmnAog86+gzoZE jALgaygY5bbf1syIOrioFcHObDtj2uZrpWQlsmy++9l+4pcg3WwAZQSpw2HOAvc+OwVj 6Ag8dItr4lR9sP8ifRr4wwcoR7IW92+o6dPgiHgi9ZcxQ/Arf7vWFKzz3mouOoWL53jr L6lw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:user-agent:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=wJ/2RVNyPnP9YECPfsMfSo/e/DpTK2GwGHFGp20/HNc=; b=00/FPhvNWrgMnGWwjFX9vhmlSqD+W3S/0xM73SzMppBMbbTgROHW8TGyDtX4FS5BTX 8xr0ALK2YPDv6d5ZmFLwuJtgFIzBVx2AvUUlbRpjeBTSY4bLbjWW06lNTSmZtf/QpVMe JS0CzCbQjNTYDE1QktLTgl4hzPsZpT+JVYB8yLiDNFZs2R0jaq3GrLsfVnzLPgyAjicK OYOGgextsn//smPxUiyuA22EfQgO+4+ZR3gFjKwQqzTz2wu60E06UoQwZZ7nWJKBlM1n DzTdwt4e74DY6DQiKxt1+mxJTKaBxtiIh8xCj3P5CSUFk9mtWJpmQP/PbvkaeCgLP8KQ vNcA== ARC-Authentication-Results: i=1; mx.google.com; spf=softfail (google.com: domain of transitioning gregkh@linuxfoundation.org does not designate 90.92.71.90 as permitted sender) smtp.mailfrom=gregkh@linuxfoundation.org Authentication-Results: mx.google.com; spf=softfail (google.com: domain of transitioning gregkh@linuxfoundation.org does not designate 90.92.71.90 as permitted sender) smtp.mailfrom=gregkh@linuxfoundation.org From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Alexey Kodanev , "David S. Miller" Subject: [PATCH 4.14 44/71] ip6_gre: init dev->mtu and dev->hard_header_len correctly Date: Mon, 29 Jan 2018 13:57:12 +0100 Message-Id: <20180129123830.170501306@linuxfoundation.org> X-Mailer: git-send-email 2.16.1 In-Reply-To: <20180129123827.271171825@linuxfoundation.org> References: <20180129123827.271171825@linuxfoundation.org> User-Agent: quilt/0.65 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-LABELS: =?utf-8?b?IlxcU2VudCI=?= X-GMAIL-THRID: =?utf-8?q?1590958490263150740?= X-GMAIL-MSGID: =?utf-8?q?1590958490263150740?= X-Mailing-List: linux-kernel@vger.kernel.org List-ID: 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Alexey Kodanev [ Upstream commit 128bb975dc3c25d00de04e503e2fe0a780d04459 ] Commit b05229f44228 ("gre6: Cleanup GREv6 transmit path, call common GRE functions") moved dev->mtu initialization from ip6gre_tunnel_setup() to ip6gre_tunnel_init(), as a result, the previously set values, before ndo_init(), are reset in the following cases: * rtnl_create_link() can update dev->mtu from IFLA_MTU parameter. * ip6gre_tnl_link_config() is invoked before ndo_init() in netlink and ioctl setup, so ndo_init() can reset MTU adjustments with the lower device MTU as well, dev->mtu and dev->hard_header_len. Not applicable for ip6gretap because it has one more call to ip6gre_tnl_link_config(tunnel, 1) in ip6gre_tap_init(). Fix the first case by updating dev->mtu with 'tb[IFLA_MTU]' parameter if a user sets it manually on a device creation, and fix the second one by moving ip6gre_tnl_link_config() call after register_netdevice(). Fixes: b05229f44228 ("gre6: Cleanup GREv6 transmit path, call common GRE functions") Fixes: db2ec95d1ba4 ("ip6_gre: Fix MTU setting") Signed-off-by: Alexey Kodanev Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/ipv6/ip6_gre.c | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) --- a/net/ipv6/ip6_gre.c +++ b/net/ipv6/ip6_gre.c @@ -337,11 +337,12 @@ static struct ip6_tnl *ip6gre_tunnel_loc nt->dev = dev; nt->net = dev_net(dev); - ip6gre_tnl_link_config(nt, 1); if (register_netdevice(dev) < 0) goto failed_free; + ip6gre_tnl_link_config(nt, 1); + /* Can use a lockless transmit, unless we generate output sequences */ if (!(nt->parms.o_flags & TUNNEL_SEQ)) dev->features |= NETIF_F_LLTX; @@ -1307,7 +1308,6 @@ static void ip6gre_netlink_parms(struct static int ip6gre_tap_init(struct net_device *dev) { - struct ip6_tnl *tunnel; int ret; ret = ip6gre_tunnel_init_common(dev); @@ -1316,10 +1316,6 @@ static int ip6gre_tap_init(struct net_de dev->priv_flags |= IFF_LIVE_ADDR_CHANGE; - tunnel = netdev_priv(dev); - - ip6gre_tnl_link_config(tunnel, 1); - return 0; } @@ -1411,12 +1407,16 @@ static int ip6gre_newlink(struct net *sr nt->dev = dev; nt->net = dev_net(dev); - ip6gre_tnl_link_config(nt, !tb[IFLA_MTU]); err = register_netdevice(dev); if (err) goto out; + ip6gre_tnl_link_config(nt, !tb[IFLA_MTU]); + + if (tb[IFLA_MTU]) + ip6_tnl_change_mtu(dev, nla_get_u32(tb[IFLA_MTU])); + dev_hold(dev); ip6gre_tunnel_link(ign, nt);