Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp877148pxk; Thu, 24 Sep 2020 23:30:02 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzT3hB01ThY8WndT0nfkn1Ls9QV41iN+s1p7zDZLsP118NUPxKOM0sGKKPoOdvoADMQED3p X-Received: by 2002:aa7:cd90:: with SMTP id x16mr2403303edv.302.1601015402200; Thu, 24 Sep 2020 23:30:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601015402; cv=none; d=google.com; s=arc-20160816; b=g9B/Q8BaEuxSTQTCloDCmX0sM7LrNs9kuhZvKE2jTP5PTMYc12cDVSG6Sw0amhEdd7 4rmD3owetio1tiAsPYLjqfusSL9rDoafyJ6zv6x9stb1tEFKyN6uwq9FsrjEAkaZ8jkd 9DH2j35WpaEiU3fSn8tf+gvXGF0c5OC6GWGmfL6YfTcezTUtzpt5fsbSeX751bfxO4QN rYtRRsOjE94uBIYdeJnyob1WBLKKhxHomOYdvV5ZYCZJOHwcSy23GjZu+XG/ThvBtL5n jTQ4ukMrfQ9kRn+I7eSSP5HqLjZbabeyGHixmhIi3JA3ElOWJBL5FMDkrnHbTz/OA6ra adIQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:subject:cc:to:from; bh=soGfIDK53g79A8sLuwWp3x0hhg4L7F90ytI4KXttywk=; b=FNvQj777E6usml3pG12DjxApB3Cn2hGdy15NTNWMVwK7Z66jblnOAvjbLbjqddyFkN 8kPLJWcXqYq9/yM05FSleeaY9/+bkE4Cf5lQkcr9nltgMsklsLjLsTdviyNQgFpHnmVb 8G85ktCLEcCcLQeU3soe2zHAVfTT6SxNOul/TF30YV058iHXJcR2Fmwk9Y/0+yt4Hw9t 5vpFgx/JcZW6GuMNsiU6NbGSGFoy8JSOdJmy7cQnPVIKitXxRDSzska4VPHREsX8vPks 7Fn8fVLRRuphV+Sxe5hqMexfpvi1Dg4JkhDfNaLlrrHRlef3IBo4mgAUGwB1owYBhnSl ZShQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=vmware.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c8si1230308ejx.605.2020.09.24.23.29.38; Thu, 24 Sep 2020 23:30:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=vmware.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727172AbgIYG0r (ORCPT + 99 others); Fri, 25 Sep 2020 02:26:47 -0400 Received: from ex13-edg-ou-001.vmware.com ([208.91.0.189]:57931 "EHLO EX13-EDG-OU-001.vmware.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726925AbgIYG0r (ORCPT ); Fri, 25 Sep 2020 02:26:47 -0400 X-Greylist: delayed 900 seconds by postgrey-1.27 at vger.kernel.org; Fri, 25 Sep 2020 02:26:46 EDT Received: from sc9-mailhost1.vmware.com (10.113.161.71) by EX13-EDG-OU-001.vmware.com (10.113.208.155) with Microsoft SMTP Server id 15.0.1156.6; Thu, 24 Sep 2020 23:11:41 -0700 Received: from ubuntu.eng.vmware.com (unknown [10.20.113.240]) by sc9-mailhost1.vmware.com (Postfix) with ESMTP id C95B42026A; Thu, 24 Sep 2020 23:11:45 -0700 (PDT) From: Ronak Doshi To: CC: Ronak Doshi , "VMware, Inc." , "David S. Miller" , Jakub Kicinski , open list Subject: [PATCH net] vmxnet3: fix cksum offload issues for non-udp tunnels Date: Thu, 24 Sep 2020 23:11:29 -0700 Message-ID: <20200925061130.9017-1-doshir@vmware.com> X-Mailer: git-send-email 2.11.0 MIME-Version: 1.0 Content-Type: text/plain Received-SPF: None (EX13-EDG-OU-001.vmware.com: doshir@vmware.com does not designate permitted sender hosts) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Commit dacce2be3312 ("vmxnet3: add geneve and vxlan tunnel offload support") added support for encapsulation offload. However, the inner offload capability is to be restrictued to UDP tunnels. This patch fixes the issue for non-udp tunnels by adding features check capability and filtering appropriate features for non-udp tunnels. Fixes: dacce2be3312 ("vmxnet3: add geneve and vxlan tunnel offload support") Signed-off-by: Ronak Doshi --- drivers/net/vmxnet3/vmxnet3_drv.c | 5 ++--- drivers/net/vmxnet3/vmxnet3_ethtool.c | 28 ++++++++++++++++++++++++++++ drivers/net/vmxnet3/vmxnet3_int.h | 4 ++++ 3 files changed, 34 insertions(+), 3 deletions(-) diff --git a/drivers/net/vmxnet3/vmxnet3_drv.c b/drivers/net/vmxnet3/vmxnet3_drv.c index 2818015324b8..336504b7531d 100644 --- a/drivers/net/vmxnet3/vmxnet3_drv.c +++ b/drivers/net/vmxnet3/vmxnet3_drv.c @@ -1032,7 +1032,6 @@ vmxnet3_tq_xmit(struct sk_buff *skb, struct vmxnet3_tx_queue *tq, /* Use temporary descriptor to avoid touching bits multiple times */ union Vmxnet3_GenericDesc tempTxDesc; #endif - struct udphdr *udph; count = txd_estimate(skb); @@ -1135,8 +1134,7 @@ vmxnet3_tq_xmit(struct sk_buff *skb, struct vmxnet3_tx_queue *tq, gdesc->txd.om = VMXNET3_OM_ENCAP; gdesc->txd.msscof = ctx.mss; - udph = udp_hdr(skb); - if (udph->check) + if (skb_shinfo(skb)->gso_type & SKB_GSO_UDP_TUNNEL_CSUM) gdesc->txd.oco = 1; } else { gdesc->txd.hlen = ctx.l4_offset + ctx.l4_hdr_size; @@ -3371,6 +3369,7 @@ vmxnet3_probe_device(struct pci_dev *pdev, .ndo_change_mtu = vmxnet3_change_mtu, .ndo_fix_features = vmxnet3_fix_features, .ndo_set_features = vmxnet3_set_features, + .ndo_features_check = vmxnet3_features_check, .ndo_get_stats64 = vmxnet3_get_stats64, .ndo_tx_timeout = vmxnet3_tx_timeout, .ndo_set_rx_mode = vmxnet3_set_mc, diff --git a/drivers/net/vmxnet3/vmxnet3_ethtool.c b/drivers/net/vmxnet3/vmxnet3_ethtool.c index 1014693a5ceb..7ec8652f2c26 100644 --- a/drivers/net/vmxnet3/vmxnet3_ethtool.c +++ b/drivers/net/vmxnet3/vmxnet3_ethtool.c @@ -267,6 +267,34 @@ netdev_features_t vmxnet3_fix_features(struct net_device *netdev, return features; } +netdev_features_t vmxnet3_features_check(struct sk_buff *skb, + struct net_device *netdev, + netdev_features_t features) +{ + struct vmxnet3_adapter *adapter = netdev_priv(netdev); + + /* Validate if the tunneled packet is being offloaded by the device */ + if (VMXNET3_VERSION_GE_4(adapter) && + skb->encapsulation && skb->ip_summed == CHECKSUM_PARTIAL) { + u8 l4_proto = 0; + + switch (vlan_get_protocol(skb)) { + case htons(ETH_P_IP): + l4_proto = ip_hdr(skb)->protocol; + break; + case htons(ETH_P_IPV6): + l4_proto = ipv6_hdr(skb)->nexthdr; + break; + default: + return features & ~(NETIF_F_CSUM_MASK | NETIF_F_GSO_MASK); + } + + if (l4_proto != IPPROTO_UDP) + return features & ~(NETIF_F_CSUM_MASK | NETIF_F_GSO_MASK); + } + return features; +} + static void vmxnet3_enable_encap_offloads(struct net_device *netdev) { struct vmxnet3_adapter *adapter = netdev_priv(netdev); diff --git a/drivers/net/vmxnet3/vmxnet3_int.h b/drivers/net/vmxnet3/vmxnet3_int.h index 5d2b062215a2..d958b92c9429 100644 --- a/drivers/net/vmxnet3/vmxnet3_int.h +++ b/drivers/net/vmxnet3/vmxnet3_int.h @@ -470,6 +470,10 @@ vmxnet3_rq_destroy_all(struct vmxnet3_adapter *adapter); netdev_features_t vmxnet3_fix_features(struct net_device *netdev, netdev_features_t features); +netdev_features_t +vmxnet3_features_check(struct sk_buff *skb, + struct net_device *netdev, netdev_features_t features); + int vmxnet3_set_features(struct net_device *netdev, netdev_features_t features); -- 2.11.0