mirror of
https://github.com/openvswitch/ovs
synced 2025-10-29 15:28:56 +00:00
tc: handle packet mark of zero
Openstack may set an skb mark of 0 in tunnel rules. This is considered to be an unused/unset value. However, it prevents the rule from being offloaded. Check if the key value of the skb mark is 0 when it is in use (mask is set to all ones). If it is then ignore the field and continue with TC offload. Only the exact-match case is covered by this patch as it addresses the Openstack use-case and seems most robust against feature evolution: f.e. in future there may exist hardware offload scenarios where an operation, such as a BPF offload, sets the SKB mark before proceeding tho the in-HW OVS. datapath. Signed-off-by: John Hurley <john.hurley@netronome.com> Co-Authored-by: Simon Horman <simon.horman@netronome.com> Signed-off-by: Simon Horman <simon.horman@netronome.com> Acked-by: Aaron Conole <aconole@redhat.com>
This commit is contained in:
committed by
Simon Horman
parent
34b00fd272
commit
56c8027b5f
@@ -1620,6 +1620,11 @@ netdev_tc_flow_put(struct netdev *netdev, struct match *match,
|
||||
mask->ct_label = OVS_U128_ZERO;
|
||||
}
|
||||
|
||||
/* ignore exact match on skb_mark of 0. */
|
||||
if (mask->pkt_mark == UINT32_MAX && !key->pkt_mark) {
|
||||
mask->pkt_mark = 0;
|
||||
}
|
||||
|
||||
err = test_key_and_mask(match);
|
||||
if (err) {
|
||||
return err;
|
||||
|
||||
Reference in New Issue
Block a user