net-next: dsa: fix flow dissection
authorJohn Crispin <john@phrozen.org>
Wed, 9 Aug 2017 12:41:19 +0000 (14:41 +0200)
committerDavid S. Miller <davem@davemloft.net>
Thu, 10 Aug 2017 05:51:47 +0000 (22:51 -0700)
commit43e665287f931a167cd2eea3387efda901bff0ce
tree1ad4d07ef9a12ae6fcccde731365c127e6b23ba3
parent2dd592b274861021018446102fb443e24f72fe72
net-next: dsa: fix flow dissection

RPS and probably other kernel features are currently broken on some if not
all DSA devices. The root cause of this is that skb_hash will call the
flow_dissector. At this point the skb still contains the magic switch
header and the skb->protocol field is not set up to the correct 802.3
value yet. By the time the tag specific code is called, removing the header
and properly setting the protocol an invalid hash is already set. In the
case of the mt7530 this will result in all flows always having the same
hash.

Signed-off-by: Muciri Gatimu <muciri@openmesh.com>
Signed-off-by: Shashidhar Lakkavalli <shashidhar.lakkavalli@openmesh.com>
Signed-off-by: John Crispin <john@phrozen.org>
Reviewed-by: Andrew Lunn <andrew@lunn.ch>
Signed-off-by: David S. Miller <davem@davemloft.net>
net/core/flow_dissector.c