Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp3053285ybi; Tue, 2 Jul 2019 01:12:43 -0700 (PDT) X-Google-Smtp-Source: APXvYqwhgeZHX226bn9BUKTQOa9zwxTz/6C3rrMeJ2PI3FHaXrTyG70Reoes+aNgwc/rWsuGOwmM X-Received: by 2002:a17:90a:9b8a:: with SMTP id g10mr4067044pjp.66.1562055163527; Tue, 02 Jul 2019 01:12:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562055163; cv=none; d=google.com; s=arc-20160816; b=OizFLJAQnhSzCUgHBoYK4KEm5aJ+4m+kfV4tWSdf+IqB4GlFlRzBX0lygLSitj4san PFfa/MpAfdZdcLMVh50mkRcEBUoykgj6vl8eW1aDSV/9BpolB/1yX33SN1mf4ox/OToA CtMQm1GaZlvzZyXt0/E/nokb9kDe0SgAegRv9rkeRHuwxaLFHelictJvcf7EO0FWMvcd 0skhb21+hg/kyLC9IN7PNa59yfiakIJyi5OqNr8Tu9cydk068P7Y+5alJliZMLmRooZ0 E7NcCbSX7QkKb79Rq4M08G8MZTIIGj+MppHHVxEAUkL3r4uFAKUQ3WEyERAfgzN5cG6S Cptw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=gADrFRIZHjExxmmG7qYD9NSPqfj3LqskxA2FW3X2gRY=; b=ebumkOdBTXS6bIi1t9cQqoB4+gLT4vAiapFoIYikAslBncFXbcnTxw0idNFceeVajR 5VLW3CNugyipB3cEWaAkBDs+pjOkMbcPkBaX8xRBHU57wG4/s5rB9ND3utLNMMJDABDw Qf7v8vwi1dRi5HWiOYfNHBOycalopGbXontXxpo10bwPdebCcQNsMJjLtQQFYoVBQhVT 65y6fPfYwP/Al2io6vGm+56lM2YzipdzOCu+Z5u7tMskHYlycLKcQhvGJNDGIMHB9LNA keQp1PXrNxWPvUgDZnU/+9wiU0H7bT7YSJisS+ezynCCpeyGnShQXg5gLzIPOfYCGkF9 SGAw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=qLPgW5Qg; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i18si13589028pfa.23.2019.07.02.01.12.29; Tue, 02 Jul 2019 01:12:43 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=qLPgW5Qg; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728801AbfGBIKK (ORCPT + 99 others); Tue, 2 Jul 2019 04:10:10 -0400 Received: from mail.kernel.org ([198.145.29.99]:58382 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727872AbfGBIKK (ORCPT ); Tue, 2 Jul 2019 04:10:10 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A225C206A2; Tue, 2 Jul 2019 08:10:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1562055009; bh=9F41Uw358U6b9xDY0d2/ZLC9406PWjfjUm/+VxHks+8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=qLPgW5QgENIFeBrYkb5dyQeXXLy64kvbGCe8T7SZbiful7WUQy0lilgbgoMCnG9ib Dm/od61SjwD/PzQYF2B/9/ACfgVea88cLh2fiASz4C6bTklhrRWFfMdFyxgMwT/A/B 4jr33Ee1pzubkcE/d8sy7xYcPl/9nG0HUiWMsQdY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jiri Pirko , YueHaibing , Jiri Pirko , "David S. Miller" Subject: [PATCH 4.14 37/43] bonding: Always enable vlan tx offload Date: Tue, 2 Jul 2019 10:02:17 +0200 Message-Id: <20190702080125.835700006@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190702080123.904399496@linuxfoundation.org> References: <20190702080123.904399496@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: YueHaibing [ Upstream commit 30d8177e8ac776d89d387fad547af6a0f599210e ] We build vlan on top of bonding interface, which vlan offload is off, bond mode is 802.3ad (LACP) and xmit_hash_policy is BOND_XMIT_POLICY_ENCAP34. Because vlan tx offload is off, vlan tci is cleared and skb push the vlan header in validate_xmit_vlan() while sending from vlan devices. Then in bond_xmit_hash, __skb_flow_dissect() fails to get information from protocol headers encapsulated within vlan, because 'nhoff' is points to IP header, so bond hashing is based on layer 2 info, which fails to distribute packets across slaves. This patch always enable bonding's vlan tx offload, pass the vlan packets to the slave devices with vlan tci, let them to handle vlan implementation. Fixes: 278339a42a1b ("bonding: propogate vlan_features to bonding master") Suggested-by: Jiri Pirko Signed-off-by: YueHaibing Acked-by: Jiri Pirko Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/bonding/bond_main.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/net/bonding/bond_main.c +++ b/drivers/net/bonding/bond_main.c @@ -4263,12 +4263,12 @@ void bond_setup(struct net_device *bond_ bond_dev->features |= NETIF_F_NETNS_LOCAL; bond_dev->hw_features = BOND_VLAN_FEATURES | - NETIF_F_HW_VLAN_CTAG_TX | NETIF_F_HW_VLAN_CTAG_RX | NETIF_F_HW_VLAN_CTAG_FILTER; bond_dev->hw_features |= NETIF_F_GSO_ENCAP_ALL; bond_dev->features |= bond_dev->hw_features; + bond_dev->features |= NETIF_F_HW_VLAN_CTAG_TX; } /* Destroy a bonding device.