lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <ZULRxX9eIbFiVi7v@hog> Date: Wed, 1 Nov 2023 23:31:33 +0100 From: Sabrina Dubroca <sd@...asysnail.net> To: Rahul Rameshbabu <rrameshbabu@...dia.com> Cc: netdev@...r.kernel.org, Jakub Kicinski <kuba@...nel.org>, Paolo Abeni <pabeni@...hat.com>, Eric Dumazet <edumazet@...gle.com>, "David S. Miller" <davem@...emloft.net>, Saeed Mahameed <saeed@...nel.org> Subject: Re: [PATCH net] macsec: Abort MACSec Rx offload datapath when skb is not marked with MACSec metadata 2023-11-01, 13:02:17 -0700, Rahul Rameshbabu wrote: > When MACSec is configured on an outer netdev, traffic received directly > through the underlying netdev should not be processed by the MACSec Rx > datapath. When using MACSec offload on an outer netdev, traffic with no > metadata indicator in the skb is mistakenly considered as MACSec traffic > and incorrectly handled in the handle_not_macsec function. Treat skbs with > no metadata type as non-MACSec packets rather than assuming they are MACSec > packets. What about the other drivers? mlx5 is the only driver that sets md_dst on its macsec skbs, so their offloaded packets just get dropped now? -- Sabrina
Powered by blists - more mailing lists