Received: by 2002:a25:f815:0:0:0:0:0 with SMTP id u21csp944277ybd; Wed, 26 Jun 2019 08:30:05 -0700 (PDT) X-Google-Smtp-Source: APXvYqww2as3viUxvJIeG9FCswcxkukNIfjnZsUPHh0IEC162YXsTpUjQeA9iDzg+HQ5GSFLgILZ X-Received: by 2002:a17:90a:ba94:: with SMTP id t20mr5651909pjr.116.1561563005458; Wed, 26 Jun 2019 08:30:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561563005; cv=none; d=google.com; s=arc-20160816; b=ChZDojH96t9kxPiVR25HERCKsYqLJ32vnaF/gUT/013Ng4FGdoe9xs/oAQGyrNjWh2 dQDYZB0UeaeES36OsYCxMc6z5DfZeozhPMNlgViRkcIT8JjOEWYpBtfjAO4jHW36eFaX d6p5vhuTX77PVcCoi+qsdCqH0uQ2Se6rOddlj2Y4+MlniIKjuSNKIekuYjuB0Yw+H5fQ mggYlTk0FpbQSJNVui2vuqbbtIThYwV0mX+fr7Tf3/SDeB//4x0ZGn+qXUScc90hVqMH gOQ2ydbnzuIKgUFXjZN3UXB7AVK8GlQCgBQdn7+b7W470tHKbvaIQHvVn9QabaJ5N05A aOLw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:cc:references:to :subject; bh=o9vChCu0ad9ulK3vivzQMGAkSHcgDLX+HPr8XTa63iw=; b=SqSgQ0FDeT1fYRlvRxZ0qmcKOpVD5ZXIHpCPHH0wrmmc+fFRGLcBBcaO/wBKfLI6uL dprAE/q7J0jwDoIfZo0oDKAxuT/BSwqMZZxq8aTrN2K2rz0eJdCq1M0bQ7OZlDE5AwSQ +dI2jS/jX5Df/9a+SjU6rXhrqsuIIbHRSQZO2BfnWxVHy/RttfEFtkZPs2gBMc90rh61 tgiRQAx0g5Uu1/zBfzx2mUVatcKV/EIGpfkGzbEZAoLgK/CkZJwm7FH6xCacPgx4htLu xpwHmrv88Y7ANpTWjJ77FG7l2LXyaxjXiwk0XnPr37FSroI9CshplD7o0BckTR2BywNN G8Lg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o6si3492261pls.251.2019.06.26.08.29.48; Wed, 26 Jun 2019 08:30:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728187AbfFZP3o (ORCPT + 99 others); Wed, 26 Jun 2019 11:29:44 -0400 Received: from szxga05-in.huawei.com ([45.249.212.191]:19116 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725958AbfFZP3o (ORCPT ); Wed, 26 Jun 2019 11:29:44 -0400 Received: from DGGEMS402-HUB.china.huawei.com (unknown [172.30.72.60]) by Forcepoint Email with ESMTP id 4A8C8D118A354417CDE0; Wed, 26 Jun 2019 23:29:37 +0800 (CST) Received: from [127.0.0.1] (10.133.213.239) by DGGEMS402-HUB.china.huawei.com (10.3.19.202) with Microsoft SMTP Server id 14.3.439.0; Wed, 26 Jun 2019 23:29:31 +0800 Subject: Re: [PATCH] bonding: Always enable vlan tx offload To: Jiri Pirko References: <20190624135007.GA17673@nanopsycho> <20190626080844.20796-1-yuehaibing@huawei.com> <20190626152505.GB2424@nanopsycho> CC: , , , , , , , , , , , From: Yuehaibing Message-ID: <498bf1cb-1fb8-05a8-482a-79f37bf812dc@huawei.com> Date: Wed, 26 Jun 2019 23:29:30 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.2.0 MIME-Version: 1.0 In-Reply-To: <20190626152505.GB2424@nanopsycho> Content-Type: text/plain; charset="windows-1252" Content-Transfer-Encoding: 7bit X-Originating-IP: [10.133.213.239] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2019/6/26 23:25, Jiri Pirko wrote: > Wed, Jun 26, 2019 at 10:08:44AM CEST, yuehaibing@huawei.com wrote: >> We build vlan on top of bonding interface, which vlan offload >> is off, bond mode is 802.3ad (LACP) and xmit_hash_policy is >> BOND_XMIT_POLICY_ENCAP34. >> >> Because vlan tx offload is off, vlan tci is cleared and skb push >> the vlan header in validate_xmit_vlan() while sending from vlan >> devices. Then in bond_xmit_hash, __skb_flow_dissect() fails to >> get information from protocol headers encapsulated within vlan, >> because 'nhoff' is points to IP header, so bond hashing is based >> on layer 2 info, which fails to distribute packets across slaves. >> >> This patch always enable bonding's vlan tx offload, pass the vlan >> packets to the slave devices with vlan tci, let them to handle >> vlan implementation. >> >> Fixes: 278339a42a1b ("bonding: propogate vlan_features to bonding master") >> Suggested-by: Jiri Pirko >> Signed-off-by: YueHaibing > > Acked-by: Jiri Pirko > > Could you please do the same for team? Thanks! Sure, will send it, thank you! > > . >