Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp2420397iog; Sun, 19 Jun 2022 17:26:19 -0700 (PDT) X-Google-Smtp-Source: AGRyM1ugxFcddd208G8rjelWGzKsN0efkdl4+SG2LimJQm9RYZGJUMGBCtzudu8/qggxjaFLMc7i X-Received: by 2002:a05:6402:278e:b0:431:73ab:49b9 with SMTP id b14-20020a056402278e00b0043173ab49b9mr26260948ede.415.1655684779537; Sun, 19 Jun 2022 17:26:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655684779; cv=none; d=google.com; s=arc-20160816; b=lj/Lz5M8cVmcVD7uJHCGnbEc8bKS8fngGu2Ouvf4Xvr4il+qX353YDxW0qBk76z6NL rRa+eXrQBaQ4IsOqDRLzbbLdtobek/NAFUEcwc9S6aZc4k4Kd+pWFS4jWsAQWnQIOCkU 7Opz3eYkGISvXmlUBvX3evRh0oqIs3HpTgMqPnZtvy1r/Ev9bhXkdksos5ZvZ8pGkRo1 aih3spPsP9WCpS1zSFFPbDI+K4ScCW3nmtWCDkuu6RRiNoHXrY1fe/mK+DhfRPBc8YxF r16efQyUQalpOkRTLb2V24oSeS9MxqS+iXT/+B/G/peJp94R0xC7OMUA+by9bDQxqEr0 54tA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:subject:cc:to:from :dkim-signature; bh=WgE4jC6uoXiOarh99EjXMspYkBqjSPnVZsFaU6AfPZ0=; b=G3EejZNlPNGFTDI0WzRavO0ERsViRcZZwKIZ9NtUI2M2tAjxCGtXyjC/291adOeyO4 HbjzLhx17/f8LsQLxDVw7rAfqWcFPEnzizlsSI9L5d6xSjmgZJWRZvG8oSo0w3wH8NCb 2M7rGkG05G3o/EskHecpTJVqT2AlAPeV7PK3KhVZ03YjbC/8/qF0P0Dm2fYOag5WZhV8 ncSPwP5ILNRf5pnOycUaC4VoshK0ui+xLZ7mQQLf8MGdP/dR2uYe1NVTFb2xuiDHhmRm QyzMj1EOvNO/I5AuX8KHLXSbIdorAgkYwn4MH8mvAJfNcvKcmmkcNMNXaisSi/nnxUO1 SKUw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@vmware.com header.s=s1024 header.b=ThEKLKt+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=vmware.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f1-20020a056402194100b004356ff5483esi7001812edz.554.2022.06.19.17.25.54; Sun, 19 Jun 2022 17:26:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@vmware.com header.s=s1024 header.b=ThEKLKt+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=vmware.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236971AbiFTAKn (ORCPT + 99 others); Sun, 19 Jun 2022 20:10:43 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56862 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236615AbiFTAKm (ORCPT ); Sun, 19 Jun 2022 20:10:42 -0400 Received: from EX-PRD-EDGE01.vmware.com (EX-PRD-EDGE01.vmware.com [208.91.3.33]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6416BDC0; Sun, 19 Jun 2022 17:10:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; s=s1024; d=vmware.com; h=from:to:cc:subject:date:message-id:mime-version:content-type; bh=WgE4jC6uoXiOarh99EjXMspYkBqjSPnVZsFaU6AfPZ0=; b=ThEKLKt+hqXlbanLxgseYsNMMrQ1uexq/ZguFk+BCcjuSlJGxEbr4meKZnBsyi gyUgQ1DyzYKappHBzy346Alf8W4p5W/czXa9HjLLgNL5HAvtWRwYRTw9kuV0pT i5hMnhEiNYgtwfDum2P+heVP4oRgiXZAM9D+2LrL7z3l//4= Received: from sc9-mailhost2.vmware.com (10.113.161.72) by EX-PRD-EDGE01.vmware.com (10.188.245.6) with Microsoft SMTP Server id 15.1.2308.20; Sun, 19 Jun 2022 17:10:13 -0700 Received: from htb-1n-eng-dhcp122.eng.vmware.com (unknown [10.20.114.216]) by sc9-mailhost2.vmware.com (Postfix) with ESMTP id 8F2D32023C; Sun, 19 Jun 2022 17:10:35 -0700 (PDT) Received: by htb-1n-eng-dhcp122.eng.vmware.com (Postfix, from userid 0) id 5474EAA489; Sun, 19 Jun 2022 17:10:35 -0700 (PDT) From: Ronak Doshi To: CC: Ronak Doshi , VMware PV-Drivers Reviewers , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Guolin Yang , open list Subject: [PATCH net-next] vmxnet3: disable overlay offloads if UPT device does not support Date: Sun, 19 Jun 2022 17:10:13 -0700 Message-ID: <20220620001014.27048-1-doshir@vmware.com> X-Mailer: git-send-email 2.11.0 MIME-Version: 1.0 Content-Type: text/plain Received-SPF: None (EX-PRD-EDGE01.vmware.com: doshir@vmware.com does not designate permitted sender hosts) X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 'Commit 6f91f4ba046e ("vmxnet3: add support for capability registers")' added support for capability registers. These registers are used to advertize capabilities of the device. The patch updated the dev_caps to disable outer checksum offload if PTCR register does not support it. However, it missed to update other overlay offloads. This patch fixes this issue. Fixes: 6f91f4ba046e ("vmxnet3: add support for capability registers") Signed-off-by: Ronak Doshi --- drivers/net/vmxnet3/vmxnet3_drv.c | 9 ++++++++- drivers/net/vmxnet3/vmxnet3_ethtool.c | 6 ++++++ 2 files changed, 14 insertions(+), 1 deletion(-) diff --git a/drivers/net/vmxnet3/vmxnet3_drv.c b/drivers/net/vmxnet3/vmxnet3_drv.c index 1565e1808a19..19c414733747 100644 --- a/drivers/net/vmxnet3/vmxnet3_drv.c +++ b/drivers/net/vmxnet3/vmxnet3_drv.c @@ -3365,10 +3365,17 @@ vmxnet3_declare_features(struct vmxnet3_adapter *adapter) adapter->dev_caps[0] = VMXNET3_READ_BAR1_REG(adapter, VMXNET3_REG_CMD); spin_unlock_irqrestore(&adapter->cmd_lock, flags); + if (!(adapter->dev_caps[0] & (1UL << VMXNET3_CAP_GENEVE_CHECKSUM_OFFLOAD)) && + !(adapter->dev_caps[0] & (1UL << VMXNET3_CAP_VXLAN_CHECKSUM_OFFLOAD)) && + !(adapter->dev_caps[0] & (1UL << VMXNET3_CAP_GENEVE_TSO)) && + !(adapter->dev_caps[0] & (1UL << VMXNET3_CAP_VXLAN_TSO))) { + netdev->hw_enc_features &= ~NETIF_F_GSO_UDP_TUNNEL; + netdev->hw_features &= ~NETIF_F_GSO_UDP_TUNNEL; + } if (!(adapter->dev_caps[0] & (1UL << VMXNET3_CAP_GENEVE_OUTER_CHECKSUM_OFFLOAD)) && !(adapter->dev_caps[0] & (1UL << VMXNET3_CAP_VXLAN_OUTER_CHECKSUM_OFFLOAD))) { netdev->hw_enc_features &= ~NETIF_F_GSO_UDP_TUNNEL_CSUM; - netdev->features &= ~NETIF_F_GSO_UDP_TUNNEL_CSUM; + netdev->hw_features &= ~NETIF_F_GSO_UDP_TUNNEL_CSUM; } } diff --git a/drivers/net/vmxnet3/vmxnet3_ethtool.c b/drivers/net/vmxnet3/vmxnet3_ethtool.c index ce3993282c0f..c3eaf1b864ed 100644 --- a/drivers/net/vmxnet3/vmxnet3_ethtool.c +++ b/drivers/net/vmxnet3/vmxnet3_ethtool.c @@ -346,6 +346,12 @@ static void vmxnet3_enable_encap_offloads(struct net_device *netdev, netdev_feat adapter->dev_caps[0] = VMXNET3_READ_BAR1_REG(adapter, VMXNET3_REG_CMD); spin_unlock_irqrestore(&adapter->cmd_lock, flags); + if (!(adapter->dev_caps[0] & (1UL << VMXNET3_CAP_GENEVE_CHECKSUM_OFFLOAD)) && + !(adapter->dev_caps[0] & (1UL << VMXNET3_CAP_VXLAN_CHECKSUM_OFFLOAD)) && + !(adapter->dev_caps[0] & (1UL << VMXNET3_CAP_GENEVE_TSO)) && + !(adapter->dev_caps[0] & (1UL << VMXNET3_CAP_VXLAN_TSO))) { + netdev->hw_enc_features &= ~NETIF_F_GSO_UDP_TUNNEL; + } if (!(adapter->dev_caps[0] & (1UL << VMXNET3_CAP_GENEVE_OUTER_CHECKSUM_OFFLOAD)) && !(adapter->dev_caps[0] & (1UL << VMXNET3_CAP_VXLAN_OUTER_CHECKSUM_OFFLOAD))) { netdev->hw_enc_features &= ~NETIF_F_GSO_UDP_TUNNEL_CSUM; -- 2.11.0