Hello: This patch was applied to netdev/net-next.git (main) by Jakub Kicinski <k...@kernel.org>:
On Fri, 1 Nov 2024 16:47:32 -0400 you wrote: > Clearing the secpath for internal ports will cause packet drops when > ipsec offload or early SW ipsec decrypt are used. Systems that rely > on these will not be able to actually pass traffic via openvswitch. > > There is still an open issue for a flow miss packet - this is because > we drop the extensions during upcall and there is no facility to > restore such data (and it is non-trivial to add such functionality > to the upcall interface). That means that when a flow miss occurs, > there will still be packet drops. With this patch, when a flow is > found then traffic which has an associated xfrm extension will > properly flow. > > [...] Here is the summary with links: - [net-next] openvswitch: Pass on secpath details for internal port rx. https://git.kernel.org/netdev/net-next/c/7d1c2d517f50 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html _______________________________________________ dev mailing list d...@openvswitch.org https://mail.openvswitch.org/mailman/listinfo/ovs-dev