Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp5474716imm; Tue, 16 Oct 2018 10:47:48 -0700 (PDT) X-Google-Smtp-Source: ACcGV62VRmvnQ6pTH/gQQ4Dv/dSDvdq1agIkE+puWl0rRNQDuH9JE8zAkjPJkeoQy/nqs5CdEXKB X-Received: by 2002:a17:902:a585:: with SMTP id az5-v6mr22017197plb.197.1539712067961; Tue, 16 Oct 2018 10:47:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539712067; cv=none; d=google.com; s=arc-20160816; b=ewyTNnr8x1XMk3yZNVmrafvUt9xSvJPpzb2LlX3cpoMhsZ93dSB7Abs+6JErU10Uff xnS89gJj8xd+wE6aPrJ2dQJS/4dZxqvvY+8whYyO/Vqt4HU6zz/wbtOcVidh3GQgnG2W t8tljqcoXLyED4PacaXL+w9hOpG0tTaVLRvUx2s5vs4Vu9LmdDU6nOhnKHcsF+CwoAg+ DrKV/wA40Ul7Gw0bGOiA9KCT423sizPcqH0qNetRBLBSXYUnFANyOrS9QBucvr6GXeFl 2dmBrg8wzZoQ5imugqGGalIuHYXOJpkXu8P1xEahnD3WdYBlyHYZuYOUTXHj0pCI61BV Jj0w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=HxK8Qu5YIJD5XuyeAEUnOIDK0KgJVgVYNZ7Qd8Bko70=; b=zZwZlVFFoGWDCSiZmi7WehGMEn4UFpL6GZ8IxHj2wW9bOiSlRMomXuF1kprT24GcOI j43ruzstj3W4/Ft5MfN0NVVzSlJrD3O7UvIi1u4BxVpxzN6yfJTOya8mTje4CGkwwVQa wkf5tvPXNg/E3738mLs3mO/s7oYfg6Q6WhBrmmrhh3Z4kyxy+YFckqwQaSrd8s6PcmTz E9RNNknBiTXQSxf/1O7WC0RUSNPpDrH5Ed/BfEVKxuvoO0dtqSSJhqeNmqTQI76HzebC Mwcy521IhBxif4nfU2ASSf9a69Xqvr4dM2aToYVXoKDNwNfGSWail0RomPuQIuzmZ0FS zvyA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=nJg4guWz; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 62-v6si14151682ply.340.2018.10.16.10.47.32; Tue, 16 Oct 2018 10:47:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=nJg4guWz; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728268AbeJQBDH (ORCPT + 99 others); Tue, 16 Oct 2018 21:03:07 -0400 Received: from mail.kernel.org ([198.145.29.99]:44946 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727246AbeJQBDF (ORCPT ); Tue, 16 Oct 2018 21:03:05 -0400 Received: from localhost (ip-213-127-77-176.ip.prioritytelecom.net [213.127.77.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4AB402098A; Tue, 16 Oct 2018 17:11:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1539709903; bh=sq7o5lKFdorBXv09dH4SpoSm+AniY+F0y7JJ6nvf+yI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=nJg4guWze9cdnnO2+KDSCLecFYJq2kViyJE/ucJtNUNnEoncwPv7+ugidmoah7xye ZE8pvJ2bDTi4a7c4cH51vaQ03g8Di0YpctK4FgRzTPbHGiMSXWUKIZmw31uuRrMRev PHgi6iVsTbf8h0ko2UvYjdSzTtrq44R8+PzQzwIM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jianfeng Tan , "David S. Miller" Subject: [PATCH 4.18 034/135] net/packet: fix packet drop as of virtio gso Date: Tue, 16 Oct 2018 19:04:24 +0200 Message-Id: <20181016170517.343252259@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181016170515.447235311@linuxfoundation.org> References: <20181016170515.447235311@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.18-stable review patch. If anyone has any objections, please let me know. ------------------ From: Jianfeng Tan [ Upstream commit 9d2f67e43b73e8af7438be219b66a5de0cfa8bd9 ] When we use raw socket as the vhost backend, a packet from virito with gso offloading information, cannot be sent out in later validaton at xmit path, as we did not set correct skb->protocol which is further used for looking up the gso function. To fix this, we set this field according to virito hdr information. Fixes: e858fae2b0b8f4 ("virtio_net: use common code for virtio_net_hdr and skb GSO conversion") Signed-off-by: Jianfeng Tan Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- include/linux/virtio_net.h | 18 ++++++++++++++++++ net/packet/af_packet.c | 11 +++++++---- 2 files changed, 25 insertions(+), 4 deletions(-) --- a/include/linux/virtio_net.h +++ b/include/linux/virtio_net.h @@ -5,6 +5,24 @@ #include #include +static inline int virtio_net_hdr_set_proto(struct sk_buff *skb, + const struct virtio_net_hdr *hdr) +{ + switch (hdr->gso_type & ~VIRTIO_NET_HDR_GSO_ECN) { + case VIRTIO_NET_HDR_GSO_TCPV4: + case VIRTIO_NET_HDR_GSO_UDP: + skb->protocol = cpu_to_be16(ETH_P_IP); + break; + case VIRTIO_NET_HDR_GSO_TCPV6: + skb->protocol = cpu_to_be16(ETH_P_IPV6); + break; + default: + return -EINVAL; + } + + return 0; +} + static inline int virtio_net_hdr_to_skb(struct sk_buff *skb, const struct virtio_net_hdr *hdr, bool little_endian) --- a/net/packet/af_packet.c +++ b/net/packet/af_packet.c @@ -2712,10 +2712,12 @@ tpacket_error: } } - if (po->has_vnet_hdr && virtio_net_hdr_to_skb(skb, vnet_hdr, - vio_le())) { - tp_len = -EINVAL; - goto tpacket_error; + if (po->has_vnet_hdr) { + if (virtio_net_hdr_to_skb(skb, vnet_hdr, vio_le())) { + tp_len = -EINVAL; + goto tpacket_error; + } + virtio_net_hdr_set_proto(skb, vnet_hdr); } skb->destructor = tpacket_destruct_skb; @@ -2911,6 +2913,7 @@ static int packet_snd(struct socket *soc if (err) goto out_free; len += sizeof(vnet_hdr); + virtio_net_hdr_set_proto(skb, &vnet_hdr); } skb_probe_transport_header(skb, reserve);