Skip to content

Commit 7d1c2d5

Browse files
apconolekuba-moo
authored andcommitted
openvswitch: Pass on secpath details for internal port rx.
Clearing the secpath for internal ports will cause packet drops when ipsec offload or early SW ipsec decrypt are used. Systems that rely on these will not be able to actually pass traffic via openvswitch. There is still an open issue for a flow miss packet - this is because we drop the extensions during upcall and there is no facility to restore such data (and it is non-trivial to add such functionality to the upcall interface). That means that when a flow miss occurs, there will still be packet drops. With this patch, when a flow is found then traffic which has an associated xfrm extension will properly flow. Signed-off-by: Aaron Conole <aconole@redhat.com> Acked-by: Eelco Chaudron <echaudro@redhat.com> Link: https://patch.msgid.link/20241101204732.183840-1-aconole@redhat.com Signed-off-by: Jakub Kicinski <kuba@kernel.org>
1 parent 2cd02f2 commit 7d1c2d5

File tree

1 file changed

+0
-1
lines changed

1 file changed

+0
-1
lines changed

net/openvswitch/vport-internal_dev.c

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -195,7 +195,6 @@ static int internal_dev_recv(struct sk_buff *skb)
195195

196196
skb_dst_drop(skb);
197197
nf_reset_ct(skb);
198-
secpath_reset(skb);
199198

200199
skb->pkt_type = PACKET_HOST;
201200
skb->protocol = eth_type_trans(skb, netdev);

0 commit comments

Comments
 (0)