Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp5444845imm; Tue, 16 Oct 2018 10:19:13 -0700 (PDT) X-Google-Smtp-Source: ACcGV62rec7xfPdZaLNfbLFsma5e8sYBiYa8eFGqjjvzV+Z/c6r4ae3B9TMtDgKl61QGJexk2kUm X-Received: by 2002:a17:902:7285:: with SMTP id d5-v6mr18119023pll.145.1539710353602; Tue, 16 Oct 2018 10:19:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539710353; cv=none; d=google.com; s=arc-20160816; b=i+4Dz0LInLzaqyvsFbsb7RXKOQPSylQJjDLkAm6zUcnSuYRHNoMInHdFmv7pmSS2JO p7flkqmsbWuNa/tk45LaiQGXF8YfgnWoMFn3A4O5VKO5MmuYaACVKG/pto7KVTkoZTI3 dUv1ZI5NtynWM80Hb/qI/5ySNHdG503wbpR/MQt3an7p5dVOUkcdrnQiB3Y9qphEWdg0 I3ChZzLAxWlCYlVDYvR56ahXyFb/rfWzwiHIEj1IQ0XLYDrRNlfnTqTgpE0s3PqQiSe+ dufO41wXffxYmsarUSKZWy0Tbafu6B9dbTig5jA+E+SfDf2INU6Ruzk1P/WS/iiy3xkJ lXng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=7F6Yj7K69bVHKwCT9Vs9GusidfLcRUhY6tIlLhNxQsU=; b=GKY0nkxEVdHSI4oVdL2yVfjWOXyijJVhqF/tUuGzaYguQ27SnWjLyGT/LdLvHFnuqo 98ZTahfuw6FENfSkQ4ie1MwskSAq5QBr6Md82tmwTxc/yo+IZ8j4R0xvvC+Id3QluFoP frD6/yZIpo+uF6ysQw4tMta4ksFC0eBS+jyCqeHiC4KvGatqlOrysI1FuPmbBHk2fhLY 6jEBf0hhhbM00vdrxIwRqus0UENJ7JL8Pl4yEB7Aqqf1V9as5r3/IeQ7z0U9PtfjAXIz mWU1C44kcv6YeqlMa9rO9SnkQk/T/SXmdJQXZF/mba7I9pp4V2Eu79NCGwYXLm0DY1ZF uHKg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Dq7tDEVm; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x8-v6si14547646pgh.454.2018.10.16.10.18.57; Tue, 16 Oct 2018 10:19:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Dq7tDEVm; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730061AbeJQBJ1 (ORCPT + 99 others); Tue, 16 Oct 2018 21:09:27 -0400 Received: from mail.kernel.org ([198.145.29.99]:54280 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728441AbeJQBJ0 (ORCPT ); Tue, 16 Oct 2018 21:09:26 -0400 Received: from localhost (ip-213-127-77-176.ip.prioritytelecom.net [213.127.77.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 61D1420866; Tue, 16 Oct 2018 17:18:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1539710282; bh=tKYADQEp7Xk73J8KfVcQ1l6Dx1VPKOch1iTr+K0+NyU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Dq7tDEVmKtmJppip25ibXBrEygcR6FtmBXBCuskDQHQ9ArbjiE9yYQvKxhG4wRW7d GjUAy9WxutjQv1wBiiYslhPJpUioPZ4d5DMUwtST88lnYPpNNsdZpeCngUCTNJiBJU sW8Y/opQpiJAriPgG9rHjg5AsIDkaRl/JRgwn2sc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jianfeng Tan , "David S. Miller" Subject: [PATCH 4.14 027/109] net/packet: fix packet drop as of virtio gso Date: Tue, 16 Oct 2018 19:04:55 +0200 Message-Id: <20181016170526.560142909@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181016170524.530541524@linuxfoundation.org> References: <20181016170524.530541524@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Jianfeng Tan [ Upstream commit 9d2f67e43b73e8af7438be219b66a5de0cfa8bd9 ] When we use raw socket as the vhost backend, a packet from virito with gso offloading information, cannot be sent out in later validaton at xmit path, as we did not set correct skb->protocol which is further used for looking up the gso function. To fix this, we set this field according to virito hdr information. Fixes: e858fae2b0b8f4 ("virtio_net: use common code for virtio_net_hdr and skb GSO conversion") Signed-off-by: Jianfeng Tan Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- include/linux/virtio_net.h | 18 ++++++++++++++++++ net/packet/af_packet.c | 11 +++++++---- 2 files changed, 25 insertions(+), 4 deletions(-) --- a/include/linux/virtio_net.h +++ b/include/linux/virtio_net.h @@ -5,6 +5,24 @@ #include #include +static inline int virtio_net_hdr_set_proto(struct sk_buff *skb, + const struct virtio_net_hdr *hdr) +{ + switch (hdr->gso_type & ~VIRTIO_NET_HDR_GSO_ECN) { + case VIRTIO_NET_HDR_GSO_TCPV4: + case VIRTIO_NET_HDR_GSO_UDP: + skb->protocol = cpu_to_be16(ETH_P_IP); + break; + case VIRTIO_NET_HDR_GSO_TCPV6: + skb->protocol = cpu_to_be16(ETH_P_IPV6); + break; + default: + return -EINVAL; + } + + return 0; +} + static inline int virtio_net_hdr_to_skb(struct sk_buff *skb, const struct virtio_net_hdr *hdr, bool little_endian) --- a/net/packet/af_packet.c +++ b/net/packet/af_packet.c @@ -2753,10 +2753,12 @@ tpacket_error: } } - if (po->has_vnet_hdr && virtio_net_hdr_to_skb(skb, vnet_hdr, - vio_le())) { - tp_len = -EINVAL; - goto tpacket_error; + if (po->has_vnet_hdr) { + if (virtio_net_hdr_to_skb(skb, vnet_hdr, vio_le())) { + tp_len = -EINVAL; + goto tpacket_error; + } + virtio_net_hdr_set_proto(skb, vnet_hdr); } skb->destructor = tpacket_destruct_skb; @@ -2952,6 +2954,7 @@ static int packet_snd(struct socket *soc if (err) goto out_free; len += sizeof(vnet_hdr); + virtio_net_hdr_set_proto(skb, &vnet_hdr); } skb_probe_transport_header(skb, reserve);