summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMike Yu <yumike@google.com>2024-07-12 04:51:23 +0200
committerSteffen Klassert <steffen.klassert@secunet.com>2024-07-12 08:43:28 +0200
commita10fb4a84a693891b2e205684456d0825363fc24 (patch)
treeb22dacca9af86f83f75572f69d50e527004eb68e
parentxfrm: Support crypto offload for inbound IPv6 ESP packets not in GRO path (diff)
downloadlinux-a10fb4a84a693891b2e205684456d0825363fc24.tar.xz
linux-a10fb4a84a693891b2e205684456d0825363fc24.zip
xfrm: Allow UDP encapsulation in crypto offload control path
Unblock this limitation so that SAs with encapsulation specified can be passed to HW drivers. HW drivers can still reject the SA in their implementation of xdo_dev_state_add if the encapsulation is not supported. Test: Verified on Android device Signed-off-by: Mike Yu <yumike@google.com> Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
-rw-r--r--net/xfrm/xfrm_device.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/net/xfrm/xfrm_device.c b/net/xfrm/xfrm_device.c
index 2455a76a1cff..9a44d363ba62 100644
--- a/net/xfrm/xfrm_device.c
+++ b/net/xfrm/xfrm_device.c
@@ -261,9 +261,9 @@ int xfrm_dev_state_add(struct net *net, struct xfrm_state *x,
is_packet_offload = xuo->flags & XFRM_OFFLOAD_PACKET;
- /* We don't yet support UDP encapsulation and TFC padding. */
- if ((!is_packet_offload && x->encap) || x->tfcpad) {
- NL_SET_ERR_MSG(extack, "Encapsulation and TFC padding can't be offloaded");
+ /* We don't yet support TFC padding. */
+ if (x->tfcpad) {
+ NL_SET_ERR_MSG(extack, "TFC padding can't be offloaded");
return -EINVAL;
}