From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from EUR01-HE1-obe.outbound.protection.outlook.com (mail-he1eur01on0081.outbound.protection.outlook.com [104.47.0.81]) by dpdk.org (Postfix) with ESMTP id 6199C1B48D for ; Wed, 26 Sep 2018 23:01:45 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Mellanox.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=D5gtyCvVga0ueC7mcW87PcdDhWzboHuud7+E64mh/wo=; b=H8/05JdF+o+0xE6t7n5ycUB4aRoOfoI8d7V/bLuwOA/SsDVeWhzPd6EtrrYbOpDbUlnkiXIObZcK94sJ5Xf8TlbUse7wRVqDIKZCYuJ1IxEZdCuCCb5TYFL/Ewcxjg4obpmXG7LNCZA5FZc4S30adfIkHp2ysuBcf8ysoQ+1I24= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=orika@mellanox.com; Received: from mellanox.com (37.142.13.130) by DB6PR05MB3432.eurprd05.prod.outlook.com (2603:10a6:6:1e::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1164.25; Wed, 26 Sep 2018 21:01:41 +0000 From: Ori Kam To: arybchenko@solarflare.com, ferruh.yigit@intel.com, stephen@networkplumber.org, adrien.mazarguil@6wind.com Cc: dev@dpdk.org, dekelp@mellanox.com, thomas@monjalon.net, nelio.laranjeiro@6wind.com, yskoh@mellanox.com, orika@mellanox.com, shahafs@mellanox.com Date: Wed, 26 Sep 2018 21:00:46 +0000 Message-Id: <1537995646-95260-4-git-send-email-orika@mellanox.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1537995646-95260-1-git-send-email-orika@mellanox.com> References: <1537116824-191205-1-git-send-email-orika@mellanox.com> <1537995646-95260-1-git-send-email-orika@mellanox.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [37.142.13.130] X-ClientProxiedBy: AM0PR02CA0018.eurprd02.prod.outlook.com (2603:10a6:208:3e::31) To DB6PR05MB3432.eurprd05.prod.outlook.com (2603:10a6:6:1e::19) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 1f4d262c-e02e-487d-064c-08d623f34334 X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989299)(4534165)(4627221)(201703031133081)(201702281549075)(8990200)(5600074)(711020)(4618075)(2017052603328)(7153060)(7193020); SRVR:DB6PR05MB3432; X-Microsoft-Exchange-Diagnostics: 1; DB6PR05MB3432; 3:J5Ir/9e4aDvABiON6zvtbvn+O/3SXhBn1eAwITUm8Q4GPmfUQivihjxrX6sz0WmgHrtzczR7KuUpHyHFT6BJ2u4K21rrkd2kIIEy/Hlr6bGBvMDs/EvBx5EC3ANp323cXyOWH1eezJ7rMrWGDc4f3I0KPFfcTgFfpSPy04q3Xl240Gayz9ukm3YX6wrrWOOgYarUyyhxy/NmVj++ZJcIukzbBvtA+BCoqo5nk0M/xgOeFvYeLHytfJuCebF9jfn6; 25:r5a5OFdTSAi/omIVwRdJ0G/AHpx7yZU5FvMZKfBiXosBqKBZT/aURhZRBoYKZ/kOKWERLh+LwMmqJ/NiLDMkZ8bUqFDrXXqh0M1dZSELPs6b/EQTZKq6Og72ss7Y4CzuNimgnhJjJ/5LhHJY3G1sChjYu7NE/LQsHb2gESg6FgX3RRZ8hqSIMvLXDO//M0s0ZHTxMiJ0pAWSgaG1jHF5xMg8Ug1zlGU3A8AhpQWBDe8wXn/gLXoljURH+kHRWR0h9Dq2iSNwGw6bKesQOq4lMw1ZlLPBHYaN+4ZSNOmwbPJV+F773zar6m/m3Ho84xt47s2Di71iClubyUpbG9Bf4A==; 31:lKjL4CImTrzFegs+1vibe+jTK1poPhn0tKlQuSxMHmgX0c6rP5hCjD4+tPxr5XBPyKf1hqy2sjQ3ZlzHsI1QbB0zOdmQeykoic2lImmB8Ged47I5DoI1w7S7NJo/rrTQbUefe7wphz+SYyzBkVycDBsYdXZd4x2DhwZL6RDeA2QrTs/zEELS33mahSpg73F74h1jg9eojB73eIfCfobYfO4jNhY41HKKO+k6I/NeRnc= X-MS-TrafficTypeDiagnostic: DB6PR05MB3432: X-LD-Processed: a652971c-7d2e-4d9b-a6a4-d149256f461b,ExtAddr X-Microsoft-Exchange-Diagnostics: 1; DB6PR05MB3432; 20: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; 4:IJQAc9uq+jvxsUZYln2y68OR1rquU24UOQ9tSaTfS2zRwxAqetyTgKHvDFoReOQXk2w55ZpXpC/ndDJ4Huiq+SqrDbhQFMAPjJsDXENyqlTomQo2aihP5MieNNJxnjdJzca9mKapfv3lhtKFbzq6/SpLK/Jfi6tmYHlBvfFGqrf4O5vrtvDWv2wBuYTVJRjyHwRaiteKTz3J4CaIc721xb3y6XiOJI8UJ0AnUQCJHXNCN9Sc8g2IgE0yugSbtAw2HRvGlVnKhYKpDVTRw3rfuA== X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:; X-MS-Exchange-SenderADCheck: 1 X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(93006095)(93001095)(3002001)(10201501046)(3231355)(944501410)(52105095)(6055026)(149066)(150057)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(20161123558120)(20161123564045)(20161123560045)(201708071742011)(7699051); SRVR:DB6PR05MB3432; BCL:0; PCL:0; RULEID:; SRVR:DB6PR05MB3432; X-Forefront-PRVS: 08076ABC99 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(376002)(396003)(39860400002)(136003)(346002)(366004)(199004)(189003)(305945005)(50226002)(478600001)(2906002)(16586007)(48376002)(386003)(4720700003)(55016002)(8936002)(486006)(7696005)(51416003)(53936002)(81156014)(5660300001)(7736002)(8676002)(81166006)(50466002)(52116002)(76176011)(69596002)(8886007)(97736004)(186003)(16526019)(446003)(105586002)(36756003)(14444005)(34290500001)(107886003)(316002)(25786009)(106356001)(68736007)(66066001)(6116002)(11346002)(956004)(3846002)(86362001)(33026002)(47776003)(26005)(4326008)(476003)(2616005)(21086003); DIR:OUT; SFP:1101; SCL:1; SRVR:DB6PR05MB3432; H:mellanox.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; Received-SPF: None (protection.outlook.com: mellanox.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; DB6PR05MB3432; 23:ENxvB6gH0b5lv1LpdME8EcWCj39rIIRMaooXnirX6?= =?us-ascii?Q?kHBnVpFSHKEJovz52wB5XqvhO7H/7Vb+EnDD2/7HTlSguo6qW/A+EZV3keqP?= =?us-ascii?Q?JqTiPNHHCjtUeb3v1jwNHHbj5SFIMTx3XG/ofgktVkG9qlf0SjcnKvoq2sA/?= =?us-ascii?Q?o9iEYm/fAyUHQn84jX6ujF6lad2INYWefPZIGBjVdXx8t9l6mYthOVVBD4eB?= =?us-ascii?Q?bvdfGvXQ7TTTrTmLCJC5pa30kFCp2gU/yfy0OP4SLz8aONuj0CmjfIYZbDim?= =?us-ascii?Q?g5Cd7oLFwLXRcBTLgfhcDraC9OJewzB2Ecbvid2sEwfpF4u9vHC66zmCm6Pt?= =?us-ascii?Q?+OpCzheab7FLv2bF4p25oXvAMz7X7HI2iqVe23XxHfCngtIq1zzTXSF+aFzM?= =?us-ascii?Q?Pa7qUPnWCGjj+2XC77OWgmmgDAJOQFRFAPkQicWrIbq0EWCRgivuhIpgolS6?= =?us-ascii?Q?/z7YZES0TW7p+8jrEGBhC1gleMgmohTsa3n+E7vNKifdbQBTYbYamv2rcf11?= =?us-ascii?Q?DtAGMBC9hGTQIW/jplzeWvLale5d4zJhMrUADOrwwJuDoLwiitkzUH1Z2es0?= =?us-ascii?Q?MCcr3q5NTd0en50Cc3eEBqv6MX4Fz2v6EA2VNB4lp4FQkkKyqCxAOB/kFkEM?= =?us-ascii?Q?jo43rhVoXX/IU14mgg1vWIWs+bTQ+sMWv10opy/xswbga1r+wcJtAsRZnohW?= =?us-ascii?Q?7Li9QJ+HPqMxJlSRELThV+Jq74tM9eNmjhuky5BbTP0/8WZ6ZOfWVd6mCrlJ?= =?us-ascii?Q?aXQIKfCI1pg6gajI0jAFT7E8obxeWrHZnOax7MR8zKbyvWoolbKERMrm2Xjx?= =?us-ascii?Q?VZa8I1hHvOERuEkvcSuZmV09OQq0exUiZwTtH/MR++RQoi5/t3+L37DVozb5?= =?us-ascii?Q?bs0yzyXCc8F0ytiBMhYGxBqopLE6kF8BQJyB9KJ6g3BW1X2ZOE+f96wcR6fz?= =?us-ascii?Q?EjvrfH3wpeOanx8StEwLhiZshmuGslTfeyyZsHBmL8iMMWHYxxy+6KdnZDj8?= =?us-ascii?Q?zI+wPtelmHOhEezRkNbtR5gVMkitphQDtgH8KjCedZ2E9LHcpcH7N1SsT/h5?= =?us-ascii?Q?ZF9KkjIbTb78fo4F+AYhw64N/eTOqAf6ou4ebBrDnapaYvj3xKT2HAhTMpjT?= =?us-ascii?Q?YMMV4Lu2YXs6A4/3Wc1azu0+EncVYDceOGOuxfKB3yOzQc/upotz18XdnUO3?= =?us-ascii?Q?MxDdvZye4DdV4JygFGxBiMmyi91VnrGISZ8/8gdvLYwkRXYy66DnZ4OxTOQT?= =?us-ascii?Q?PVEyYV9vqKmAIH8w593WOjZ1Wf9vOyojNtFhfO3bICAz9XQucWEHpdvFDcnN?= =?us-ascii?B?Zz09?= X-Microsoft-Antispam-Message-Info: Q0q6YhrMAN5ni38zeRahrH4UNggm6tdZYkchshq65fq06HV3xx4FwINuTUcx0EsSFK5K2Z1jKZDc5uzc6iKne852EkmYlEoOf8eKjIAEeC7VjVncyIi69btwZ4pb5+mPPEu17sgSAdLCloSELai5eggHbOdIqY4kv889+iCchyfWgGHSqrEv25jeTx4aAbwYQEJlmlqmoVOaFaC7vBwbHltaHl9ytdHfVxu8FxryB/1lE6d/qZ/fgLy1nVhYmXF2AHvEwnDjZM3WIXU4F40CKkeQFM7Yo0HE66wUa+J3dA4ch7Z0w77ibmw3VkDnxabUux7E8IyZgWH8SLP3qoInRBMz4pvWg+oKr7qiezeHM5M= X-Microsoft-Exchange-Diagnostics: 1; DB6PR05MB3432; 6:LnlVGVqJXS9vHMDhaqsXoIsbKzK8gCu4ZuCQR728k/gLflxIjQvAC7ihUdMiLL9wU5xSIVvRjYAbg2/Nailz9uCf/GzB9ePL5CsE69Ox0eWu3muQ0n7R/W7TGkHFVYIMAh5ngR7Uv/xCTnz95oIUBeaaM9f8BlAoMbHMFjc6/WmkcuzKIp4fBH5ajow2nw+n5IijRxGmPS/XJYGtLSJ0PZGFCiNWMzh9ATiGq1j8FGKQT/TXFk6OnFWe+1xrKlNfzP1z4FpQQ42FlSTHYu8e0JvLW3AeNz4oaxFB53WB4NmI3PKKkjo/UfM2HvO2cH5ZTaPYD9lC0Mh7bCe9tqT9kOWuEvTHtpJrFq84U2zJDGrzim5egqCWTzq9B9IH6GHuySCGymkbOIPgYuNJyi7yB3aUJ3hvq4omj3aYgRs99qcQuH1dyOe6j7y1dNrbGTp9frUyghhP+qVTwHGQ3GW8TQ==; 5:8y+pk5+IOcy1XCcJ9XdHWPE6mXYFlUoBf2l0c9mVqjZBt7RaS2F3C2dIuk+yBFLpHp5uluQH+nVGDksFvqhZO2qQq9qJWMCyzKc+FtvXsTGWjXVyOIwAvDiXUpi0NIbqGIfVOIRFGDa1boaPPdRObIwxQkgcHsjgVocwK9QFQJ8=; 7:PKSJcQQgov/xiO+BcRU2mTNorgS1AfTFi+KUw6Ano2Cp+I9aIrvUMw88yjX09vLgxK3zlk6B/8QJPoDdI4sXbI7r7hpzD7LvWfHbE2hnwkF00hcOCIPWVT1T/DbOxIZNKloNgDac3/nhEaxYGLkIs7K07SeSh2d/40alkttJaekxHu8FEiaryunAbvQ2YGAKPncYVIZg5LNTex7j4ou0hkInTEoyYXOb5tpRzadR8dFlGgkBZTO57oYFSFBd+tuj SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-OriginatorOrg: Mellanox.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Sep 2018 21:01:41.5390 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 1f4d262c-e02e-487d-064c-08d623f34334 X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: a652971c-7d2e-4d9b-a6a4-d149256f461b X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR05MB3432 Subject: [dpdk-dev] [PATCH v2 3/3] ethdev: remove vxlan and nvgre encapsulation commands X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 26 Sep 2018 21:01:46 -0000 This patch removes the VXLAN and NVGRE encapsulation commands. Those commands are subset of the TUNNEL_ENCAP command so there is no need to keep both versions. Signed-off-by: Ori Kam --- doc/guides/prog_guide/rte_flow.rst | 107 ------------------------------------- lib/librte_ethdev/rte_flow.h | 103 ----------------------------------- 2 files changed, 210 deletions(-) diff --git a/doc/guides/prog_guide/rte_flow.rst b/doc/guides/prog_guide/rte_flow.rst index 3ba8018..9e739f3 100644 --- a/doc/guides/prog_guide/rte_flow.rst +++ b/doc/guides/prog_guide/rte_flow.rst @@ -1969,113 +1969,6 @@ Implements ``OFPAT_PUSH_MPLS`` ("push a new MPLS tag") as defined by the | ``ethertype`` | EtherType | +---------------+-----------+ -Action: ``VXLAN_ENCAP`` -^^^^^^^^^^^^^^^^^^^^^^^ - -Performs a VXLAN encapsulation action by encapsulating the matched flow in the -VXLAN tunnel as defined in the``rte_flow_action_vxlan_encap`` flow items -definition. - -This action modifies the payload of matched flows. The flow definition specified -in the ``rte_flow_action_tunnel_encap`` action structure must define a valid -VLXAN network overlay which conforms with RFC 7348 (Virtual eXtensible Local -Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks -over Layer 3 Networks). The pattern must be terminated with the -RTE_FLOW_ITEM_TYPE_END item type. - -.. _table_rte_flow_action_vxlan_encap: - -.. table:: VXLAN_ENCAP - - +----------------+-------------------------------------+ - | Field | Value | - +================+=====================================+ - | ``definition`` | Tunnel end-point overlay definition | - +----------------+-------------------------------------+ - -.. _table_rte_flow_action_vxlan_encap_example: - -.. table:: IPv4 VxLAN flow pattern example. - - +-------+----------+ - | Index | Item | - +=======+==========+ - | 0 | Ethernet | - +-------+----------+ - | 1 | IPv4 | - +-------+----------+ - | 2 | UDP | - +-------+----------+ - | 3 | VXLAN | - +-------+----------+ - | 4 | END | - +-------+----------+ - -Action: ``VXLAN_DECAP`` -^^^^^^^^^^^^^^^^^^^^^^^ - -Performs a decapsulation action by stripping all headers of the VXLAN tunnel -network overlay from the matched flow. - -The flow items pattern defined for the flow rule with which a ``VXLAN_DECAP`` -action is specified, must define a valid VXLAN tunnel as per RFC7348. If the -flow pattern does not specify a valid VXLAN tunnel then a -RTE_FLOW_ERROR_TYPE_ACTION error should be returned. - -This action modifies the payload of matched flows. - -Action: ``NVGRE_ENCAP`` -^^^^^^^^^^^^^^^^^^^^^^^ - -Performs a NVGRE encapsulation action by encapsulating the matched flow in the -NVGRE tunnel as defined in the``rte_flow_action_tunnel_encap`` flow item -definition. - -This action modifies the payload of matched flows. The flow definition specified -in the ``rte_flow_action_tunnel_encap`` action structure must defined a valid -NVGRE network overlay which conforms with RFC 7637 (NVGRE: Network -Virtualization Using Generic Routing Encapsulation). The pattern must be -terminated with the RTE_FLOW_ITEM_TYPE_END item type. - -.. _table_rte_flow_action_nvgre_encap: - -.. table:: NVGRE_ENCAP - - +----------------+-------------------------------------+ - | Field | Value | - +================+=====================================+ - | ``definition`` | NVGRE end-point overlay definition | - +----------------+-------------------------------------+ - -.. _table_rte_flow_action_nvgre_encap_example: - -.. table:: IPv4 NVGRE flow pattern example. - - +-------+----------+ - | Index | Item | - +=======+==========+ - | 0 | Ethernet | - +-------+----------+ - | 1 | IPv4 | - +-------+----------+ - | 2 | NVGRE | - +-------+----------+ - | 3 | END | - +-------+----------+ - -Action: ``NVGRE_DECAP`` -^^^^^^^^^^^^^^^^^^^^^^^ - -Performs a decapsulation action by stripping all headers of the NVGRE tunnel -network overlay from the matched flow. - -The flow items pattern defined for the flow rule with which a ``NVGRE_DECAP`` -action is specified, must define a valid NVGRE tunnel as per RFC7637. If the -flow pattern does not specify a valid NVGRE tunnel then a -RTE_FLOW_ERROR_TYPE_ACTION error should be returned. - -This action modifies the payload of matched flows. - Action: ``TUNNEL_ENCAP`` ^^^^^^^^^^^^^^^^^^^^^^^^ diff --git a/lib/librte_ethdev/rte_flow.h b/lib/librte_ethdev/rte_flow.h index e29c561..55521e3 100644 --- a/lib/librte_ethdev/rte_flow.h +++ b/lib/librte_ethdev/rte_flow.h @@ -1473,40 +1473,6 @@ enum rte_flow_action_type { RTE_FLOW_ACTION_TYPE_OF_PUSH_MPLS, /** - * Encapsulate flow in VXLAN tunnel as defined in - * rte_flow_action_vxlan_encap action structure. - * - * See struct rte_flow_action_vxlan_encap. - */ - RTE_FLOW_ACTION_TYPE_VXLAN_ENCAP, - - /** - * Decapsulate outer most VXLAN tunnel from matched flow. - * - * If flow pattern does not define a valid VXLAN tunnel (as specified by - * RFC7348) then the PMD should return a RTE_FLOW_ERROR_TYPE_ACTION - * error. - */ - RTE_FLOW_ACTION_TYPE_VXLAN_DECAP, - - /** - * Encapsulate flow in NVGRE tunnel defined in the - * rte_flow_action_nvgre_encap action structure. - * - * See struct rte_flow_action_nvgre_encap. - */ - RTE_FLOW_ACTION_TYPE_NVGRE_ENCAP, - - /** - * Decapsulate outer most NVGRE tunnel from matched flow. - * - * If flow pattern does not define a valid NVGRE tunnel (as specified by - * RFC7637) then the PMD should return a RTE_FLOW_ERROR_TYPE_ACTION - * error. - */ - RTE_FLOW_ACTION_TYPE_NVGRE_DECAP, - - /** * Encapsulate the packet with tunnel header as defined in * rte_flow_action_tunnel_encap action structure. * @@ -1837,75 +1803,6 @@ struct rte_flow_action_of_push_mpls { * @warning * @b EXPERIMENTAL: this structure may change without prior notice * - * RTE_FLOW_ACTION_TYPE_VXLAN_ENCAP - * - * VXLAN tunnel end-point encapsulation data definition - * - * The tunnel definition is provided through the flow item pattern, the - * provided pattern must conform to RFC7348 for the tunnel specified. The flow - * definition must be provided in order from the RTE_FLOW_ITEM_TYPE_ETH - * definition up the end item which is specified by RTE_FLOW_ITEM_TYPE_END. - * - * The mask field allows user to specify which fields in the flow item - * definitions can be ignored and which have valid data and can be used - * verbatim. - * - * Note: the last field is not used in the definition of a tunnel and can be - * ignored. - * - * Valid flow definition for RTE_FLOW_ACTION_TYPE_VXLAN_ENCAP include: - * - * - ETH / IPV4 / UDP / VXLAN / END - * - ETH / IPV6 / UDP / VXLAN / END - * - ETH / VLAN / IPV4 / UDP / VXLAN / END - * - */ -struct rte_flow_action_vxlan_encap { - /** - * Encapsulating vxlan tunnel definition - * (terminated by the END pattern item). - */ - struct rte_flow_item *definition; -}; - -/** - * @warning - * @b EXPERIMENTAL: this structure may change without prior notice - * - * RTE_FLOW_ACTION_TYPE_NVGRE_ENCAP - * - * NVGRE tunnel end-point encapsulation data definition - * - * The tunnel definition is provided through the flow item pattern the - * provided pattern must conform with RFC7637. The flow definition must be - * provided in order from the RTE_FLOW_ITEM_TYPE_ETH definition up the end item - * which is specified by RTE_FLOW_ITEM_TYPE_END. - * - * The mask field allows user to specify which fields in the flow item - * definitions can be ignored and which have valid data and can be used - * verbatim. - * - * Note: the last field is not used in the definition of a tunnel and can be - * ignored. - * - * Valid flow definition for RTE_FLOW_ACTION_TYPE_NVGRE_ENCAP include: - * - * - ETH / IPV4 / NVGRE / END - * - ETH / VLAN / IPV6 / NVGRE / END - * - */ -struct rte_flow_action_nvgre_encap { - /** - * Encapsulating vxlan tunnel definition - * (terminated by the END pattern item). - */ - struct rte_flow_item *definition; -}; - -/** - * @warning - * @b EXPERIMENTAL: this structure may change without prior notice - * * RTE_FLOW_ACTION_TYPE_TUNNEL_ENCAP * * Tunnel end-point encapsulation data definition -- 1.8.3.1