From: Jason Wang <jasowang@redhat.com>
To: Willem de Bruijn <willemdebruijn.kernel@gmail.com>,
netdev@vger.kernel.org
Cc: davem@davemloft.net, mkubecek@suse.cz,
Willem de Bruijn <willemb@google.com>
Subject: Re: [PATCH net] net: accept UFO datagrams from tuntap and packet
Date: Mon, 20 Nov 2017 11:03:54 +0800 [thread overview]
Message-ID: <4cbf298f-7ee3-bab7-f512-e5eee2fa7b07@redhat.com> (raw)
In-Reply-To: <20171117225913.46812-1-willemdebruijn.kernel@gmail.com>
On 2017年11月18日 06:59, Willem de Bruijn wrote:
> From: Willem de Bruijn<willemb@google.com>
>
> Tuntap and similar devices can inject GSO packets. Accept type
> VIRTIO_NET_HDR_GSO_UDP, even though not generating UFO natively.
>
> Processes are expected to use feature negotiation such as TUNSETOFFLOAD
> to detect supported offload types and refrain from injecting other
> packets. This process breaks down with live migration: guest kernels
> do not renegotiate flags, so destination hosts need to expose all
> features that the source host does.
>
> Partially revert the UFO removal from 182e0b6b5846~1..d9d30adf5677.
> This patch introduces nearly(*) no new code to simplify verification.
> It brings back verbatim tuntap UFO negotiation, VIRTIO_NET_HDR_GSO_UDP
> insertion and software UFO segmentation.
>
> It does not reinstate protocol stack support, hardware offload
> (NETIF_F_UFO), SKB_GSO_UDP tunneling in SKB_GSO_SOFTWARE or reception
> of VIRTIO_NET_HDR_GSO_UDP packets in tuntap.
>
> To support SKB_GSO_UDP reappearing in the stack, also reinstate
> logic in act_csum and openvswitch. Achieve equivalence with v4.13 HEAD
> by squashing in commit 939912216fa8 ("net: skb_needs_check() removes
> CHECKSUM_UNNECESSARY check for tx.") and reverting commit 8d63bee643f1
> ("net: avoid skb_warn_bad_offload false positives on UFO").
>
> (*) To avoid having to bring back skb_shinfo(skb)->ip6_frag_id,
> ipv6_proxy_select_ident is changed to return a __be32, which is
> assigned directly to the frag_hdr. Also, SKB_GSO_UDP is inserted
> at the end of the enum to minimize code churn.
>
> Link:http://lkml.kernel.org/r/<CAF=yD-LuUeDuL9YWPJD9ykOZ0QCjNeznPDr6whqZ9NGMNF12Mw@mail.gmail.com>
> Fixes: fb652fdfe837 ("macvlan/macvtap: Remove NETIF_F_UFO advertisement.")
> Reported-by: Michal Kubecek<mkubecek@suse.cz>
> Signed-off-by: Willem de Bruijn<willemb@google.com>
Looks good to me. The only concern is that whether or not stable can
accept this patch:
stable-kernel-rules.rst said:
"
- It cannot be bigger than 100 lines, with context.
"
Otherwise we may consider the things like doing segmentation in
tun_get_user() mentioned in another thread by you.
Thanks
next prev parent reply other threads:[~2017-11-20 3:03 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-11-17 22:59 [PATCH net] net: accept UFO datagrams from tuntap and packet Willem de Bruijn
2017-11-18 1:42 ` David Miller
2017-11-19 0:58 ` Willem de Bruijn
2017-11-20 3:03 ` Jason Wang [this message]
2017-11-20 5:51 ` David Miller
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4cbf298f-7ee3-bab7-f512-e5eee2fa7b07@redhat.com \
--to=jasowang@redhat.com \
--cc=davem@davemloft.net \
--cc=mkubecek@suse.cz \
--cc=netdev@vger.kernel.org \
--cc=willemb@google.com \
--cc=willemdebruijn.kernel@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).