From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id 757D6A04DD; Sun, 15 Nov 2020 23:54:58 +0100 (CET) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 92EC9C8DE; Sun, 15 Nov 2020 23:54:03 +0100 (CET) Received: from wnew1-smtp.messagingengine.com (wnew1-smtp.messagingengine.com [64.147.123.26]) by dpdk.org (Postfix) with ESMTP id CCE8E31FC for ; Sun, 15 Nov 2020 23:54:01 +0100 (CET) Received: from compute2.internal (compute2.nyi.internal [10.202.2.42]) by mailnew.west.internal (Postfix) with ESMTP id 02197B81; Sun, 15 Nov 2020 17:53:58 -0500 (EST) Received: from mailfrontend2 ([10.202.2.163]) by compute2.internal (MEProxy); Sun, 15 Nov 2020 17:53:59 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=monjalon.net; h= from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; s=fm2; bh=vDvedAKpoHIie uBQXaKz0ts+1POwdk2gY5Q6pqyQOtc=; b=SvGLG2G88tU5HSMF6yExd53/095/s 30QfnPAT6fzZ5eo3AUYoAb17BH6zvzJ7FVNoGxbR9U4LQWvhOmngYct6OQtpAwA1 srwiXw5YviguMnR9wraYOrJn9XJuenMFzdABfBeWq9h6KUvsgsbs+Lsy9bXnf+J3 t11/mzZCpRL8M7N4vhXG0VVImmImhTbZccsvjJnoHZgkwEotZj/SnOBrj5ChWwEa aqGMWgxkk2cNXUyvi6XCi8QQvrJq1RKofHqxR79Oxusm9krt5oIRR+m4ZFJAOelS OnrNpwQhX65uy57YRZTl/J2JaSp5JpAV5POwyJOCo8Pr5fGkQPmSRxj6Q== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:date:from :in-reply-to:message-id:mime-version:references:subject:to :x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm1; bh=vDvedAKpoHIieuBQXaKz0ts+1POwdk2gY5Q6pqyQOtc=; b=IKTTBlWm q0rPnOWvQD4cNz/mojQ9gWPP2ieoP1pogKgz/yUf3M1hgVQxNm3IL2GhfbdWpmjp attjMpZaEdwLtVH7Bak1LT+oUQmR4YxGHD/aaze019mIhur3z/ziHzNhEQSOefmK SbVI1E5ANLAujkSPY0dQyRH9bJAhKzCK/EgHJxZsHo0Q7fjKlLxJUSWelXzzybj3 ZHyr8wjfV+wvTZQ+4piLzIhfRUXwCWw87vCPJdmn/UZ8coGMEepcibVvJn/e37Vw leeB+VzmaQNvuIn4HqCD/spxgzZL5UIXi6dtB3JPR6VDnSTIYZ+CU2hHqTmZBzrZ PDHDlCvEu1ssCw== X-ME-Sender: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedujedrudeftddgtdegucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne cujfgurhephffvufffkffojghfggfgsedtkeertdertddtnecuhfhrohhmpefvhhhomhgr shcuofhonhhjrghlohhnuceothhhohhmrghssehmohhnjhgrlhhonhdrnhgvtheqnecugg ftrfgrthhtvghrnhepvdehgfeivdejgedtveehfefhteelfefgieevgfffveefjeegtdfg uedthedtgeevnecukfhppeejjedrudefgedrvddtfedrudekgeenucevlhhushhtvghruf hiiigvpeefnecurfgrrhgrmhepmhgrihhlfhhrohhmpehthhhomhgrshesmhhonhhjrghl ohhnrdhnvght X-ME-Proxy: Received: from xps.monjalon.net (184.203.134.77.rev.sfr.net [77.134.203.184]) by mail.messagingengine.com (Postfix) with ESMTPA id 2DB8C3064AAA; Sun, 15 Nov 2020 17:53:57 -0500 (EST) From: Thomas Monjalon To: dev@dpdk.org Cc: stephen@networkplumber.org, david.marchand@redhat.com, bruce.richardson@intel.com, bluca@debian.org, Ajit Khaparde , Somnath Kotur , John Daley , Hyong Youb Kim , Qiming Yang , Qi Zhang , Konstantin Ananyev Date: Sun, 15 Nov 2020 23:53:20 +0100 Message-Id: <20201115225320.68408-5-thomas@monjalon.net> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20201115225320.68408-1-thomas@monjalon.net> References: <20200922143202.8755-1-stephen@networkplumber.org> <20201115225320.68408-1-thomas@monjalon.net> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: [dpdk-dev] [PATCH v11 4/4] doc: replace usage of blacklist/whitelist X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" From: Stephen Hemminger The words blacklist and whitelist are avoided in text about MAC filtering or kernel module. Signed-off-by: Stephen Hemminger Acked-by: Luca Boccassi Signed-off-by: Thomas Monjalon --- doc/guides/nics/bnxt.rst | 10 +++++----- doc/guides/nics/enic.rst | 4 ++-- doc/guides/nics/features.rst | 2 +- doc/guides/nics/ice.rst | 2 +- doc/guides/sample_app_ug/l3_forward_access_ctrl.rst | 2 +- 5 files changed, 10 insertions(+), 10 deletions(-) diff --git a/doc/guides/nics/bnxt.rst b/doc/guides/nics/bnxt.rst index de0c37ce5b..d9a7d87930 100644 --- a/doc/guides/nics/bnxt.rst +++ b/doc/guides/nics/bnxt.rst @@ -258,8 +258,8 @@ The BNXT PMD supports hardware-based packet filtering: Unicast MAC Filter ^^^^^^^^^^^^^^^^^^ -The application adds (or removes) MAC addresses to enable (or disable) -whitelist filtering to accept packets. +The application can add (or remove) MAC addresses to enable (or disable) +filtering on MAC address used to accept packets. .. code-block:: console @@ -269,8 +269,8 @@ whitelist filtering to accept packets. Multicast MAC Filter ^^^^^^^^^^^^^^^^^^^^ -Application adds (or removes) Multicast addresses to enable (or disable) -whitelist filtering to accept packets. +The application can add (or remove) Multicast addresses that enable (or disable) +filtering on multicast MAC address used to accept packets. .. code-block:: console @@ -278,7 +278,7 @@ whitelist filtering to accept packets. testpmd> mcast_addr (add|remove) (port_id) (XX:XX:XX:XX:XX:XX) Application adds (or removes) Multicast addresses to enable (or disable) -whitelist filtering to accept packets. +allowlist filtering to accept packets. Note that the BNXT PMD supports up to 16 MC MAC filters. if the user adds more than 16 MC MACs, the BNXT PMD puts the port into the Allmulticast mode. diff --git a/doc/guides/nics/enic.rst b/doc/guides/nics/enic.rst index 163ae3f47b..5d1cc9f7fa 100644 --- a/doc/guides/nics/enic.rst +++ b/doc/guides/nics/enic.rst @@ -180,7 +180,7 @@ or ``vfio`` in non-IOMMU mode. In the VM, the kernel enic driver may be automatically bound to the VF during boot. Unbinding it currently hangs due to a known issue with the driver. To -work around the issue, blacklist the enic module as follows. +work around the issue, block the enic module as follows. Please see :ref:`Limitations ` for limitations in the use of SR-IOV. @@ -430,7 +430,7 @@ PKT_RX_VLAN_STRIPPED mbuf flags would not be set. This mode is enabled with the - VF devices are not usable directly from the host. They can only be used as assigned devices on VM instances. - Currently, unbind of the ENIC kernel mode driver 'enic.ko' on the VM - instance may hang. As a workaround, enic.ko should be blacklisted or removed + instance may hang. As a workaround, enic.ko should be blocked or removed from the boot process. - pci_generic cannot be used as the uio module in the VM. igb_uio or vfio in non-IOMMU mode can be used. diff --git a/doc/guides/nics/features.rst b/doc/guides/nics/features.rst index a4b288abcf..43f74e02ab 100644 --- a/doc/guides/nics/features.rst +++ b/doc/guides/nics/features.rst @@ -261,7 +261,7 @@ Supports enabling/disabling receiving multicast frames. Unicast MAC filter ------------------ -Supports adding MAC addresses to enable whitelist filtering to accept packets. +Supports adding MAC addresses to enable incoming filtering of packets. * **[implements] eth_dev_ops**: ``mac_addr_set``, ``mac_addr_add``, ``mac_addr_remove``. * **[implements] rte_eth_dev_data**: ``mac_addrs``. diff --git a/doc/guides/nics/ice.rst b/doc/guides/nics/ice.rst index bde78f98e4..c5a76a2a21 100644 --- a/doc/guides/nics/ice.rst +++ b/doc/guides/nics/ice.rst @@ -41,7 +41,7 @@ Runtime Config Options In pipeline mode, a flow can be set at one specific stage by setting parameter ``priority``. Currently, we support two stages: priority = 0 or !0. Flows with priority 0 located at the first pipeline stage which typically be used as a firewall - to drop the packet on a blacklist(we called it permission stage). At this stage, + to drop the packet on a blocklist(we called it permission stage). At this stage, flow rules are created for the device's exact match engine: switch. Flows with priority !0 located at the second stage, typically packets are classified here and be steered to specific queue or queue group (we called it distribution stage), At this stage, flow diff --git a/doc/guides/sample_app_ug/l3_forward_access_ctrl.rst b/doc/guides/sample_app_ug/l3_forward_access_ctrl.rst index 4a96800ec6..eee5d81850 100644 --- a/doc/guides/sample_app_ug/l3_forward_access_ctrl.rst +++ b/doc/guides/sample_app_ug/l3_forward_access_ctrl.rst @@ -18,7 +18,7 @@ The application loads two types of rules at initialization: * Route information rules, which are used for L3 forwarding -* Access Control List (ACL) rules that blacklist (or block) packets with a specific characteristic +* Access Control List (ACL) rules that block packets with a specific characteristic When packets are received from a port, the application extracts the necessary information from the TCP/IP header of the received packet and -- 2.28.0