From nobody Mon Feb 9 10:24:04 2026 Received: from mail-wr1-f49.google.com (mail-wr1-f49.google.com [209.85.221.49]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 88F7962173 for ; Wed, 13 Mar 2024 18:38:10 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.221.49 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710355093; cv=none; b=ptoxgyYbxKuvd10cXDr3my68QeAllfZxJPzXzyVUnMTIYVMkp4qcS8lnLREddlxohQ5BWeJ7KxLCrb3ys8gFuO1GejgkaVZkpNeINPg7T5Bo7Q6isnQp7Owk3l+3dtr2FrGj4bZbfURnOtyYSlOt4uiDKkrT7gEQ4rQvG95XLGY= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710355093; c=relaxed/simple; bh=LYGpyaWqI4OQkRsCPAAXmseCCeLi0JUL+iyC+D7H+Ow=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version:Content-Type; b=Tc4vgNirs4C6Q98BoFXLhbAB0PW6K979oAWZpZfMHdmJi0oBeo4iaUb5qdAsFJZOxDkTdHORvN3GqzJ7YQSD5AGMRLX0LA4gNt67ENZbgyaQoQEG8bAqJ/uMc5+CIrF0ALlB+nSX39lMVnqjo1OUk3L+HSLKnCVUHHtYnyiay2g= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=cloudflare.com; spf=pass smtp.mailfrom=cloudflare.com; dkim=pass (2048-bit key) header.d=cloudflare.com header.i=@cloudflare.com header.b=CQYFQ+Yz; arc=none smtp.client-ip=209.85.221.49 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=cloudflare.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=cloudflare.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=cloudflare.com header.i=@cloudflare.com header.b="CQYFQ+Yz" Received: by mail-wr1-f49.google.com with SMTP id ffacd0b85a97d-33e76d653b5so73383f8f.3 for ; Wed, 13 Mar 2024 11:38:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cloudflare.com; s=google09082023; t=1710355089; x=1710959889; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=0c0sFhJjgBhsQMOE20vyPSAZJsUFrGi6WAMxacs9oBQ=; b=CQYFQ+Yzxn6pLmxLnhJwOaeXB/BG1n06YQgDQa4MJqgCNLfXu4zr2cVktNIkPbGZu9 rryinNnPHuLaeMMuWpcVOUao+mA0UtYsraepeFsVPecUAdU/k2qdw70opMxG82ln0PIG Nrvc0eRPPuKzghDjromGgxoPk2ZbHT/B3k/y6FksuE5YAVvRLbrbA+ng+aQjDGwkxeq6 rfUDW2SbtWNS7qKhqXb9IOqxXzu4ie1R/7z+CDf4z3L6+9xojvQmwlk6/VDNkCF3jQcI jZdT5TqH+ZDC7cnnqquuXQETxSDcDvQAgGhK7lG467XMr3BFoJsSBXpfR+2JgnH6tHjO /dsw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1710355089; x=1710959889; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=0c0sFhJjgBhsQMOE20vyPSAZJsUFrGi6WAMxacs9oBQ=; b=w6FhesBv1RwYmuVX+ZeCQOiLdgomPmoT5TblnnG97RF1ZXBskUhZQnjyC+A6TGmhyx ZG4K/vI6geUcfXUd5yU5EdQ+nyM/ofcv9WW7EMNUHXVRorVGPE5KS1i0UbRF5eG31R+c IXA7dBlr0AHr5VRNYXSzxpWelFbahWdCK4lXO5UwkNYw61CGItzYPA8wqm2Ig51bjTrd XRMXzVfprG/hKyInigzk1kWw9QMSpjc1IbmMM9j/bhD8ULw/ZNABuc0Lqe5h0PHBKLha qMU+a/XizNN/xyhKwDHyaflUDEiFqUTndgh/uDUMcnTEU96eh9xELU7EJwXMVkM6tMHi Vgxw== X-Forwarded-Encrypted: i=1; AJvYcCUno1OUDrlyAofWrzcoCwZpuUHd7H9aBxFqoimDmOHVadxZB1JpYKFKmZN/dcKkcy5/nxFWbCzEzb03qnYb415Ny6ycZblkfnKFWsB8 X-Gm-Message-State: AOJu0YwWucSKmi1MlhZOlchl+UIy4Xh+9BMAxRcIGUfPwVJpvueeoXOu Jb1K+S75oget0sgVag5L2bLQuC/SSAvb1dvevchFhGuOH7H9VVD4d9PrNRjBCsM= X-Google-Smtp-Source: AGHT+IGvZdVzX7cZUBTQWk4I9lu5wA25oxEffhaDZlKzbZvau8rDsJLNNubcHLpAMZooVioyfMNW4A== X-Received: by 2002:a5d:4a87:0:b0:33d:679d:a033 with SMTP id o7-20020a5d4a87000000b0033d679da033mr1940524wrq.36.1710355089303; Wed, 13 Mar 2024 11:38:09 -0700 (PDT) Received: from localhost.localdomain ([104.28.192.85]) by smtp.gmail.com with ESMTPSA id az19-20020adfe193000000b0033e9d9f891csm7089876wrb.58.2024.03.13.11.38.07 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256); Wed, 13 Mar 2024 11:38:08 -0700 (PDT) From: Ignat Korchagin To: "David S . Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , netdev@vger.kernel.org, linux-kernel@vger.kernel.org Cc: kernel-team@cloudflare.com, Ignat Korchagin , =?UTF-8?q?Toke=20H=C3=B8iland-J=C3=B8rgensen?= Subject: [PATCH net v3 1/2] net: veth: do not manipulate GRO when using XDP Date: Wed, 13 Mar 2024 19:37:58 +0100 Message-Id: <20240313183759.87923-2-ignat@cloudflare.com> X-Mailer: git-send-email 2.39.3 (Apple Git-146) In-Reply-To: <20240313183759.87923-1-ignat@cloudflare.com> References: <20240313183759.87923-1-ignat@cloudflare.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Commit d3256efd8e8b ("veth: allow enabling NAPI even without XDP") tried to= fix the fact that GRO was not possible without XDP, because veth did not use NA= PI without XDP. However, it also introduced the behaviour that GRO is always enabled, when XDP is enabled. While it might be desired for most cases, it is confusing for the user at b= est as the GRO flag suddenly changes, when an XDP program is attached. It also introduces some complexities in state management as was partially addressed= in commit fe9f801355f0 ("net: veth: clear GRO when clearing XDP even when down= "). But the biggest problem is that it is not possible to disable GRO at all, w= hen an XDP program is attached, which might be needed for some use cases. Fix this by not touching the GRO flag on XDP enable/disable as the code alr= eady supports switching to NAPI if either GRO or XDP is requested. Link: https://lore.kernel.org/lkml/20240311124015.38106-1-ignat@cloudflare.= com/ Fixes: d3256efd8e8b ("veth: allow enabling NAPI even without XDP") Fixes: fe9f801355f0 ("net: veth: clear GRO when clearing XDP even when down= ") Signed-off-by: Ignat Korchagin Reviewed-by: Toke H=C3=B8iland-J=C3=B8rgensen --- drivers/net/veth.c | 18 ------------------ 1 file changed, 18 deletions(-) diff --git a/drivers/net/veth.c b/drivers/net/veth.c index 13d902462d8e..bcdfbf61eb66 100644 --- a/drivers/net/veth.c +++ b/drivers/net/veth.c @@ -1464,8 +1464,6 @@ static netdev_features_t veth_fix_features(struct net= _device *dev, if (peer_priv->_xdp_prog) features &=3D ~NETIF_F_GSO_SOFTWARE; } - if (priv->_xdp_prog) - features |=3D NETIF_F_GRO; =20 return features; } @@ -1569,14 +1567,6 @@ static int veth_xdp_set(struct net_device *dev, stru= ct bpf_prog *prog, } =20 if (!old_prog) { - if (!veth_gro_requested(dev)) { - /* user-space did not require GRO, but adding - * XDP is supposed to get GRO working - */ - dev->features |=3D NETIF_F_GRO; - netdev_features_change(dev); - } - peer->hw_features &=3D ~NETIF_F_GSO_SOFTWARE; peer->max_mtu =3D max_mtu; } @@ -1592,14 +1582,6 @@ static int veth_xdp_set(struct net_device *dev, stru= ct bpf_prog *prog, if (dev->flags & IFF_UP) veth_disable_xdp(dev); =20 - /* if user-space did not require GRO, since adding XDP - * enabled it, clear it now - */ - if (!veth_gro_requested(dev)) { - dev->features &=3D ~NETIF_F_GRO; - netdev_features_change(dev); - } - if (peer) { peer->hw_features |=3D NETIF_F_GSO_SOFTWARE; peer->max_mtu =3D ETH_MAX_MTU; --=20 2.39.2