Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp1191838ybn; Wed, 2 Oct 2019 12:12:39 -0700 (PDT) X-Google-Smtp-Source: APXvYqw9Tp5pYnpxkMTjjyIvRi/UNyA6wLwJvtiJrIBEKFxEMXdknk9zOGXVT6stmh3AUFaCwrBx X-Received: by 2002:a17:907:207a:: with SMTP id qp26mr34477ejb.12.1570043559059; Wed, 02 Oct 2019 12:12:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570043559; cv=none; d=google.com; s=arc-20160816; b=G+DG5EyN28HD/9vk3naIXOEMmnkpT5FVYErUoGJ5a0HCFiwur5DIRsVbUG0BQsppaK 0Nzzm0ACco3agVMDg7YaYwLD/UQpidpu8cSgraWgI6AgwBcw/hcef/nVHS89oXY8DsPe Lbe7aRnvJrG6hwHaYgrTc6Q4MbBAZJJUUqdVDJgpmf2qs6Or1xybWQX3N6V8+l5H+y9t CLX52X09yUj0bdmRd/03P47WSUjTgxArHNnIOTJ8posx28CfWRiSndLSTIECzZGgrW7i lvdPQdZ4yam85qz1xAPR31PcKIbq16fGkdr29EG64aW6d43CuJOSX1yfB2C0RXTeUfXz qLeQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:subject:message-id:date:cc:to :from:mime-version:content-transfer-encoding:content-disposition; bh=ZE7EpRE1btsCWOkF3fmn4Mro6HoefxxLq5/4OezOuw8=; b=zbbIs6fcxiVdfd1UPuH3xLiyVwUIcxf7BAvXX3N4cT02aGMijR307MN7/igzu4VKxY s/+kh/Cu9n/V8P1KEtAyrq2Whmdlxi3GIwT4eub2fAu9nFVUJaB+Dc0M+hbGuhfyQFo4 lAp7lBVBa9BViXaGWWqqWhngT6hAqm/K5kh6KBctQXHC8xCaCRWMYeCDvP9huqHBbrnt Igc+vj3O8lKDxzvIvXb5ZViyvV/e6G1mcJ3lt5OemtAELL2Z4KwKc5FpME8iB1sfoTMY 6IRHsUfiofcpYowW25t3S5+f65Pyto6wz5smRXxz+eNaprLn7FGbiFyLElrG/OdixRUR vTFw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j12si2510ejx.282.2019.10.02.12.12.14; Wed, 02 Oct 2019 12:12:39 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729970AbfJBTLH (ORCPT + 99 others); Wed, 2 Oct 2019 15:11:07 -0400 Received: from shadbolt.e.decadent.org.uk ([88.96.1.126]:35764 "EHLO shadbolt.e.decadent.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729294AbfJBTIP (ORCPT ); Wed, 2 Oct 2019 15:08:15 -0400 Received: from [192.168.4.242] (helo=deadeye) by shadbolt.decadent.org.uk with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from ) id 1iFjyu-00035v-Ea; Wed, 02 Oct 2019 20:08:12 +0100 Received: from ben by deadeye with local (Exim 4.92.1) (envelope-from ) id 1iFjyq-0003gN-BF; Wed, 02 Oct 2019 20:08:08 +0100 Content-Type: text/plain; charset="UTF-8" Content-Disposition: inline Content-Transfer-Encoding: 8bit MIME-Version: 1.0 From: Ben Hutchings To: linux-kernel@vger.kernel.org, stable@vger.kernel.org CC: akpm@linux-foundation.org, Denis Kirjanov , "David S. Miller" , "YueHaibing" , "Jay Vosburgh" Date: Wed, 02 Oct 2019 20:06:51 +0100 Message-ID: X-Mailer: LinuxStableQueue (scripts by bwh) X-Patchwork-Hint: ignore Subject: [PATCH 3.16 81/87] bonding: Add vlan tx offload to hw_enc_features In-Reply-To: X-SA-Exim-Connect-IP: 192.168.4.242 X-SA-Exim-Mail-From: ben@decadent.org.uk X-SA-Exim-Scanned: No (on shadbolt.decadent.org.uk); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.16.75-rc1 review patch. If anyone has any objections, please let me know. ------------------ From: YueHaibing commit d595b03de2cb0bdf9bcdf35ff27840cc3a37158f upstream. As commit 30d8177e8ac7 ("bonding: Always enable vlan tx offload") said, we should always enable bonding's vlan tx offload, pass the vlan packets to the slave devices with vlan tci, let them to handle vlan implementation. Now if encapsulation protocols like VXLAN is used, skb->encapsulation may be set, then the packet is passed to vlan device which based on bonding device. However in netif_skb_features(), the check of hw_enc_features: if (skb->encapsulation) features &= dev->hw_enc_features; clears NETIF_F_HW_VLAN_CTAG_TX/NETIF_F_HW_VLAN_STAG_TX. This results in same issue in commit 30d8177e8ac7 like this: vlan_dev_hard_start_xmit -->dev_queue_xmit -->validate_xmit_skb -->netif_skb_features //NETIF_F_HW_VLAN_CTAG_TX is cleared -->validate_xmit_vlan -->__vlan_hwaccel_push_inside //skb->tci is cleared ... --> bond_start_xmit --> bond_xmit_hash //BOND_XMIT_POLICY_ENCAP34 --> __skb_flow_dissect // nhoff point to IP header --> case htons(ETH_P_8021Q) // skb_vlan_tag_present is false, so vlan = __skb_header_pointer(skb, nhoff, sizeof(_vlan), //vlan point to ip header wrongly Fixes: b2a103e6d0af ("bonding: convert to ndo_fix_features") Signed-off-by: YueHaibing Acked-by: Jay Vosburgh Signed-off-by: David S. Miller [bwh: Backported to 3.16: adjust context] Signed-off-by: Ben Hutchings --- --- a/drivers/net/bonding/bond_main.c +++ b/drivers/net/bonding/bond_main.c @@ -1083,7 +1083,9 @@ static void bond_compute_features(struct done: bond_dev->vlan_features = vlan_features; - bond_dev->hw_enc_features = enc_features; + bond_dev->hw_enc_features = enc_features | + NETIF_F_HW_VLAN_CTAG_TX | + NETIF_F_HW_VLAN_STAG_TX; bond_dev->hard_header_len = max_hard_header_len; bond_dev->gso_max_segs = gso_max_segs; netif_set_gso_max_size(bond_dev, gso_max_size);