From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pf1-f176.google.com (mail-pf1-f176.google.com [209.85.210.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 1DFB82EAB83 for ; Mon, 15 Sep 2025 08:37:52 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.210.176 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1757925474; cv=none; b=dXCgWpNU8CeDujvC7/R/VOzcNjlv2Zgj/M4Zz1W4m4ChdXVBAy5DyOCVd3F9zIqk2jMfRD7CLwayf+KJ6ARF9rRls73LMsV+laLz9wWC2XYLLPipPUEAtzWrl+Gp6K6vtZg2eHbqarfHFjevRMHXlTLWOECAfUb+1I7D5kIPLSw= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1757925474; c=relaxed/simple; bh=IoXoMYGD+smW4KRtMQddL3etVmp1OCzVgb5FFVRsI1c=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=azmwIvhUO3uhmFaMwjBjR+mRK+ISX78Q03qgTZpjHR/2u+Q1N8ErTLH14fREERqIx8Wv2mNEdhw5nTk/nqVKEQyQqx5laTZNGzKB44KS18C7DkX96258pi6ZBr3PSd1GnJfLSRofeSzf5kqVVILAhTu3uUHBbOhwwoUS/1pJA1I= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=e2sJIy8z; arc=none smtp.client-ip=209.85.210.176 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="e2sJIy8z" Received: by mail-pf1-f176.google.com with SMTP id d2e1a72fcca58-7728815e639so2664433b3a.1 for ; Mon, 15 Sep 2025 01:37:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1757925472; x=1758530272; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=fTDZRc9WfTfrlcFQUerwoODqglE8lQQ10ruQLsCza5E=; b=e2sJIy8zJmYUhOCW+jpnt7NMFw+SZ1jZFts/n595W6HGiND++ygDv4HiIOAY6LWAIL dr+bUxr5a3ao8JEWe9wV9PU/stZtHlEI6U6Uq1EVazwsEeWky87c6znVIXpYg/XjdI0O FPmXTar3VZKM9tBkQFP8pnFspPgLcTPs3Qes7dLqGveM3QbANlaowRohM2Y3/Qswg/o8 eOS00d6h3v7A1M1tDRRRhdHmk0/2c21aB7R66qOq7w4UIaohCZ4GlbJkmXZzfkAqOUa8 C9YDCvIfqikbn24Riy+qYyKUhcL0uadV2b/+YTr2Qmzsk8YH4Qg1z6lD2Ztc/0OrUK3n SWKA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1757925472; x=1758530272; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=fTDZRc9WfTfrlcFQUerwoODqglE8lQQ10ruQLsCza5E=; b=X49AOBNdq0ZlbmpfDNRUOV1AXbk17ShCwXTIMvoTkmGgSc0dFAvF6z/gGWhCgfK/6B hdFbXqfwV19j6buklrJeaVQFXmSuQgZOpsVQFB16Ho2j8skgfNbUbANCk0bJcIPNfa3B +aM/RsrCW6MiCdht5cGQjqQbyrlratI2rOKqgDmyZWkkDKqbDYhNYYxYW3ARdQw2q3x4 jT8EZUk1JSfgJL5AOha9nEmVqSnBmM0kMTIjFvUrTD7rKALzX0W3NJbB76taItZEr6mE QyYPRvwWNvuo7iU7eBPtpqMqoNwiwhQE7w/fivrLWvB1T+xcxgOGWtQU+KH3NH1RWljR NjFQ== X-Forwarded-Encrypted: i=1; AJvYcCUCoWWv5yb4YcFGEpLO+CnbDgJoFX2uDrv4i4xNIVlmKNHJGW6DoBlFnnRHYFMkYoZRIp/lyWHpNwt+5k7BcEI=@vger.kernel.org X-Gm-Message-State: AOJu0Yz0K8qFxj1LSqACNLgPqWIoa/JMtnkGpvw+tsPBwnzR7AdRcB5X XHfcRFGKw6NiSvLYkDMjbTC08V0V7vppycSDuGxGd4Cg2YoJTbRbkaT/ X-Gm-Gg: ASbGncugKnpM7Phy6Yrt6JHXAYqZwEedTVfsuEee1jNQ3JXuMCD4o5lpL02ojjs8YBB aDgBZ3mYz4ovs6JdOWdRCNlTWbbL5cQnoNUhn8dcrfDHQZ+YhmRWgpouETYfrpwFdYXMDc3/dMM /WoOjTdUneTy6wc0WS01VhckM2dnfHBoaQUnPYCJIOLdd3NKNckBvexC9zrADyWgB3i1eksbRYx 7ppDdqZU+9vm/7S8BdtNbTNJw9m7zc2j4z5p9cu2+kjgJuTqBLRVEb7HPOeCHtom3YPgmAStTrQ HqpmxOtUEbAcDCw2VH+J0Wv2cNAzXEUd6H+Ql5irmqHFhv8SCn5/QoWrweywpEz6CUU+XAsC9rL g5Fx/oJHxmojUbuuTs05pqUl3cYDtw+P8vHaCS25ovg== X-Google-Smtp-Source: AGHT+IHMQRChdT9odsmheH7egJCC4/DPJO3OX7FlwDrV3iyyRGI4Io9Ex6QozyJocQpSdCghkAkn9w== X-Received: by 2002:a05:6a00:1ad4:b0:772:871c:1e49 with SMTP id d2e1a72fcca58-7761219836dmr13358955b3a.29.1757925472305; Mon, 15 Sep 2025 01:37:52 -0700 (PDT) Received: from fedora.redhat.com ([209.132.188.88]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-77607b1a031sm12901974b3a.57.2025.09.15.01.37.47 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 15 Sep 2025 01:37:51 -0700 (PDT) From: Hangbin Liu To: netdev@vger.kernel.org Cc: Jay Vosburgh , Andrew Lunn , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Simon Horman , Shuah Khan , Petr Machata , linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, Hangbin Liu Subject: [PATCH 1/2] bonding: fix xfrm offload feature setup on active-backup mode Date: Mon, 15 Sep 2025 08:37:41 +0000 Message-ID: <20250915083742.423741-1-liuhangbin@gmail.com> X-Mailer: git-send-email 2.50.1 Precedence: bulk X-Mailing-List: linux-kselftest@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit The active-backup bonding mode supports XFRM ESP offload. However, when a bond is added using command like `ip link add bond0 type bond mode 1 miimon 100`, the `ethtool -k` command shows that the XFRM ESP offload is disabled. This occurs because, in bond_newlink(), we change bond link first and register bond device later. So the XFRM feature update in bond_option_mode_set() is not called as the bond device is not yet registered, leading to the offload feature not being set successfully. To resolve this issue, we can modify the code order in bond_newlink() to ensure that the bond device is registered first before changing the bond link parameters. This change will allow the XFRM ESP offload feature to be correctly enabled. Fixes: 007ab5345545 ("bonding: fix feature flag setting at init time") Signed-off-by: Hangbin Liu --- drivers/net/bonding/bond_main.c | 2 +- drivers/net/bonding/bond_netlink.c | 16 +++++++++------- include/net/bonding.h | 1 + 3 files changed, 11 insertions(+), 8 deletions(-) diff --git a/drivers/net/bonding/bond_main.c b/drivers/net/bonding/bond_main.c index 257333c88710..2182b34226ca 100644 --- a/drivers/net/bonding/bond_main.c +++ b/drivers/net/bonding/bond_main.c @@ -4411,7 +4411,7 @@ void bond_work_init_all(struct bonding *bond) INIT_DELAYED_WORK(&bond->slave_arr_work, bond_slave_arr_handler); } -static void bond_work_cancel_all(struct bonding *bond) +void bond_work_cancel_all(struct bonding *bond) { cancel_delayed_work_sync(&bond->mii_work); cancel_delayed_work_sync(&bond->arp_work); diff --git a/drivers/net/bonding/bond_netlink.c b/drivers/net/bonding/bond_netlink.c index 57fff2421f1b..7a9d73ec8e91 100644 --- a/drivers/net/bonding/bond_netlink.c +++ b/drivers/net/bonding/bond_netlink.c @@ -579,20 +579,22 @@ static int bond_newlink(struct net_device *bond_dev, struct rtnl_newlink_params *params, struct netlink_ext_ack *extack) { + struct bonding *bond = netdev_priv(bond_dev); struct nlattr **data = params->data; struct nlattr **tb = params->tb; int err; - err = bond_changelink(bond_dev, tb, data, extack); - if (err < 0) + err = register_netdevice(bond_dev); + if (err) return err; - err = register_netdevice(bond_dev); - if (!err) { - struct bonding *bond = netdev_priv(bond_dev); + netif_carrier_off(bond_dev); + bond_work_init_all(bond); - netif_carrier_off(bond_dev); - bond_work_init_all(bond); + err = bond_changelink(bond_dev, tb, data, extack); + if (err) { + bond_work_cancel_all(bond); + unregister_netdevice(bond_dev); } return err; diff --git a/include/net/bonding.h b/include/net/bonding.h index e06f0d63b2c1..bd56ad976cfb 100644 --- a/include/net/bonding.h +++ b/include/net/bonding.h @@ -711,6 +711,7 @@ struct bond_vlan_tag *bond_verify_device_path(struct net_device *start_dev, int bond_update_slave_arr(struct bonding *bond, struct slave *skipslave); void bond_slave_arr_work_rearm(struct bonding *bond, unsigned long delay); void bond_work_init_all(struct bonding *bond); +void bond_work_cancel_all(struct bonding *bond); #ifdef CONFIG_PROC_FS void bond_create_proc_entry(struct bonding *bond); -- 2.50.1