Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp3050093ybi; Tue, 2 Jul 2019 01:08:51 -0700 (PDT) X-Google-Smtp-Source: APXvYqy9+MbdhIHMUiyA1cyF9BO+5PzHcuAhBi6GwDeQxn4naAA85YD430rx3Dh9eDK7RF4GgVKc X-Received: by 2002:a17:90a:1b0c:: with SMTP id q12mr4157519pjq.76.1562054930952; Tue, 02 Jul 2019 01:08:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562054930; cv=none; d=google.com; s=arc-20160816; b=dRlcUtHCz6fvnlAj6/5RmairPhcBfzQA1Cq0mrOt8xyXKxPOrsnBourNqEgzftKRvu ANvJdWN0uJwQhC+bdxpRAo3iYruxdVkTVYWZy99sIClOcenrQJsjaLGQzx/1VWgFTWR+ h8KnBnFJmnIcfrw37avoKYknh2pXwAULdc2mnKlrV0BRZtt4qMPwVM545TjbUUc36bHm /hJxzJP9E/lCDiSzzs6LBgIyZLVpbRAvNTTRW7K+KQbqOFi++9K4V/0oZ1+SLuteKIUv AOl9emO5IBofisXQnNM/Ls1E7jKpw08fE02iK5U3CQwCvpOxU7TsxThiXoH8X3z6JPjD ZssA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=zDFDmmwQ/zMpndtU9Oksbv/gHmoFrTrtsVm2q+y+o7c=; b=cHMAAmvFSmv0eVuRVLi5E7IwZ15D6Hd5p5xxoLcqbPqahN5DQ8rjewx2G8dIFvpyqi 3ZbZS4zrdVDuUOC5KCt5XVAqNivoNnjCA8iwFO/8GNOh7c8XgfeLL5CW+hf0SswsKPu1 za27u45kdban4M3YOwdiydgCNtDE0PaHT2toRUJVPbSkQUUaNILhWE/1TUIJfd0MC+a4 YFz42Xfq5qr9l0zNAC+N8uTS8bXWrRe67DneO1Wvn0YlQSzY9xagWmZI/wRT7m/+a2XG AJiarUoPAtLStvxwOsbvVEK9aDUOiGhnZ62IYRLxunH6a1B5eOe/g7dHVzsUQzojv1oA Waog== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=VIFrvfrT; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d7si11405142pgb.354.2019.07.02.01.08.36; Tue, 02 Jul 2019 01:08:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=VIFrvfrT; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728254AbfGBIH1 (ORCPT + 99 others); Tue, 2 Jul 2019 04:07:27 -0400 Received: from mail.kernel.org ([198.145.29.99]:54626 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727690AbfGBIHZ (ORCPT ); Tue, 2 Jul 2019 04:07:25 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 00B3E21479; Tue, 2 Jul 2019 08:07:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1562054844; bh=+uiyczWvhFtbA6WqY0j5fHfFIoFRThxEQMuXZjIIItc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=VIFrvfrTMTtg2LJHWoG03/OvmHtuAL4YgPEddmLOljX2plzYNpJH6VlAnQPgRfLRq sVzx1JrxX8zctYMnb9hDovlVybI1vrFR3GaEdj+AJWm8vLmz2Zs1AHZSrtXqCEeZ3B jJJ0BRvuz8uLtagetU16C5zMOR006p6J4Szdi+uM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jiri Pirko , YueHaibing , Jiri Pirko , "David S. Miller" Subject: [PATCH 4.19 51/72] bonding: Always enable vlan tx offload Date: Tue, 2 Jul 2019 10:01:52 +0200 Message-Id: <20190702080127.224340525@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190702080124.564652899@linuxfoundation.org> References: <20190702080124.564652899@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: YueHaibing [ Upstream commit 30d8177e8ac776d89d387fad547af6a0f599210e ] We build vlan on top of bonding interface, which vlan offload is off, bond mode is 802.3ad (LACP) and xmit_hash_policy is BOND_XMIT_POLICY_ENCAP34. Because vlan tx offload is off, vlan tci is cleared and skb push the vlan header in validate_xmit_vlan() while sending from vlan devices. Then in bond_xmit_hash, __skb_flow_dissect() fails to get information from protocol headers encapsulated within vlan, because 'nhoff' is points to IP header, so bond hashing is based on layer 2 info, which fails to distribute packets across slaves. This patch always enable bonding's vlan tx offload, pass the vlan packets to the slave devices with vlan tci, let them to handle vlan implementation. Fixes: 278339a42a1b ("bonding: propogate vlan_features to bonding master") Suggested-by: Jiri Pirko Signed-off-by: YueHaibing Acked-by: Jiri Pirko Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/bonding/bond_main.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/net/bonding/bond_main.c +++ b/drivers/net/bonding/bond_main.c @@ -4307,12 +4307,12 @@ void bond_setup(struct net_device *bond_ bond_dev->features |= NETIF_F_NETNS_LOCAL; bond_dev->hw_features = BOND_VLAN_FEATURES | - NETIF_F_HW_VLAN_CTAG_TX | NETIF_F_HW_VLAN_CTAG_RX | NETIF_F_HW_VLAN_CTAG_FILTER; bond_dev->hw_features |= NETIF_F_GSO_ENCAP_ALL | NETIF_F_GSO_UDP_L4; bond_dev->features |= bond_dev->hw_features; + bond_dev->features |= NETIF_F_HW_VLAN_CTAG_TX | NETIF_F_HW_VLAN_STAG_TX; } /* Destroy a bonding device.