> -----Original Message----- > From: Intel-wired-lan [mailto:[email protected]] On > Behalf Of Shannon Nelson > Sent: Thursday, October 4, 2018 4:29 PM > To: [email protected]; Kirsher, Jeffrey T > <[email protected]> > Cc: [email protected] > Subject: [Intel-wired-lan] [PATCH] ixgbe: allow IPsec Tx offload in VEPA > mode > > When it's possible that the PF might end up trying to send a packet to one of > its own VFs, we have to forbid IPsec offload because the device drops the > packets into a black hole. > See commit 47b6f50077e6 ("ixgbe: disallow IPsec Tx offload when in SR-IOV > mode") for more info. > > This really is only necessary when the device is in the default VEB mode. If > instead the device is running in VEPA mode, the packets will go through the > encryption engine and out the MAC/PHY as normal, and get "hairpinned" as > needed by the switch. > > So let's not block IPsec offload when in VEPA mode. To get there with the > ixgbe device, use the handy 'bridge' command: > bridge link set dev eth1 hwmode vepa > > Signed-off-by: Shannon Nelson <[email protected]> > --- > drivers/net/ethernet/intel/ixgbe/ixgbe_ipsec.c | 4 +++- > 1 file changed, 3 insertions(+), 1 deletion(-)
Tested-by: Andrew Bowers <[email protected]>
