From: Kevin Traynor <ktraynor@redhat.com>
To: Jiawen Wu <jiawenwu@trustnetic.com>
Cc: dpdk stable <stable@dpdk.org>
Subject: patch 'net/txgbe: fix to create FDIR filter for tunnel packet' has been queued to stable release 24.11.3
Date: Fri, 18 Jul 2025 20:31:16 +0100 [thread overview]
Message-ID: <20250718193247.1008129-142-ktraynor@redhat.com> (raw)
In-Reply-To: <20250718193247.1008129-1-ktraynor@redhat.com>
Hi,
FYI, your patch has been queued to stable release 24.11.3
Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet.
It will be pushed if I get no objections before 07/23/25. So please
shout if anyone has objections.
Also note that after the patch there's a diff of the upstream commit vs the
patch applied to the branch. This will indicate if there was any rebasing
needed to apply to the stable branch. If there were code changes for rebasing
(ie: not only metadata diffs), please double check that the rebase was
correctly done.
Queued patches are on a temporary branch at:
https://github.com/kevintraynor/dpdk-stable
This queued commit can be viewed at:
https://github.com/kevintraynor/dpdk-stable/commit/07eee8a0d85b840aff239360a2fcb393dcbcb826
Thanks.
Kevin
---
From 07eee8a0d85b840aff239360a2fcb393dcbcb826 Mon Sep 17 00:00:00 2001
From: Jiawen Wu <jiawenwu@trustnetic.com>
Date: Fri, 13 Jun 2025 16:41:49 +0800
Subject: [PATCH] net/txgbe: fix to create FDIR filter for tunnel packet
[ upstream commit a1851465f8252ee75a26d05b9b2d3dca7023e8f2 ]
Fix to create FDIR rules for VXLAN/GRE/NVGRE/GENEVE packets, they will
match the rules in the inner layers.
Fixes: b973ee26747a ("net/txgbe: parse flow director filter")
Signed-off-by: Jiawen Wu <jiawenwu@trustnetic.com>
---
doc/guides/nics/features/txgbe.ini | 2 +
drivers/net/txgbe/txgbe_ethdev.h | 1 -
drivers/net/txgbe/txgbe_flow.c | 591 +++++++++++++++++++++++------
3 files changed, 481 insertions(+), 113 deletions(-)
diff --git a/doc/guides/nics/features/txgbe.ini b/doc/guides/nics/features/txgbe.ini
index be0af3dfad..ef9f0cfa0a 100644
--- a/doc/guides/nics/features/txgbe.ini
+++ b/doc/guides/nics/features/txgbe.ini
@@ -59,4 +59,6 @@ eth = P
e_tag = Y
fuzzy = Y
+geneve = Y
+gre = Y
ipv4 = Y
ipv6 = Y
diff --git a/drivers/net/txgbe/txgbe_ethdev.h b/drivers/net/txgbe/txgbe_ethdev.h
index 5134c3d99e..288d9a43da 100644
--- a/drivers/net/txgbe/txgbe_ethdev.h
+++ b/drivers/net/txgbe/txgbe_ethdev.h
@@ -91,5 +91,4 @@ struct txgbe_hw_fdir_mask {
uint16_t dst_port_mask;
uint16_t flex_bytes_mask;
- uint8_t mac_addr_byte_mask;
uint8_t pkt_type_mask; /* reversed mask for hw */
};
diff --git a/drivers/net/txgbe/txgbe_flow.c b/drivers/net/txgbe/txgbe_flow.c
index b2a2e35351..7482cbbf63 100644
--- a/drivers/net/txgbe/txgbe_flow.c
+++ b/drivers/net/txgbe/txgbe_flow.c
@@ -2180,39 +2180,27 @@ txgbe_parse_fdir_filter_normal(struct rte_eth_dev *dev __rte_unused,
/**
- * Parse the rule to see if it is a VxLAN or NVGRE flow director rule.
+ * Parse the rule to see if it is a IP tunnel flow director rule.
* And get the flow director filter info BTW.
- * VxLAN PATTERN:
- * The first not void item must be ETH.
- * The second not void item must be IPV4/ IPV6.
- * The third not void item must be NVGRE.
- * The next not void item must be END.
- * NVGRE PATTERN:
- * The first not void item must be ETH.
- * The second not void item must be IPV4/ IPV6.
- * The third not void item must be NVGRE.
+ * PATTERN:
+ * The first not void item can be ETH or IPV4 or IPV6 or UDP or tunnel type.
+ * The second not void item must be IPV4 or IPV6 if the first one is ETH.
+ * The next not void item could be UDP or tunnel type.
+ * The next not void item could be a certain inner layer.
* The next not void item must be END.
* ACTION:
- * The first not void action should be QUEUE or DROP.
- * The second not void optional action should be MARK,
- * mark_id is a uint32_t number.
+ * The first not void action should be QUEUE.
* The next not void action should be END.
- * VxLAN pattern example:
+ * pattern example:
* ITEM Spec Mask
* ETH NULL NULL
- * IPV4/IPV6 NULL NULL
+ * IPV4 NULL NULL
* UDP NULL NULL
- * VxLAN vni{0x00, 0x32, 0x54} {0xFF, 0xFF, 0xFF}
- * MAC VLAN tci 0x2016 0xEFFF
- * END
- * NEGRV pattern example:
- * ITEM Spec Mask
+ * VXLAN NULL NULL
* ETH NULL NULL
- * IPV4/IPV6 NULL NULL
- * NVGRE protocol 0x6558 0xFFFF
- * tni{0x00, 0x32, 0x54} {0xFF, 0xFF, 0xFF}
- * MAC VLAN tci 0x2016 0xEFFF
+ * IPV4 src_addr 192.168.1.20 0xFFFFFFFF
+ * dst_addr 192.167.3.50 0xFFFFFFFF
+ * UDP/TCP/SCTP src_port 80 0xFFFF
+ * dst_port 80 0xFFFF
* END
- * other members in mask and spec should set to 0x00.
- * item->last should be NULL.
*/
static int
@@ -2225,4 +2213,15 @@ txgbe_parse_fdir_filter_tunnel(const struct rte_flow_attr *attr,
const struct rte_flow_item *item;
const struct rte_flow_item_eth *eth_mask;
+ const struct rte_flow_item_ipv4 *ipv4_spec;
+ const struct rte_flow_item_ipv4 *ipv4_mask;
+ const struct rte_flow_item_ipv6 *ipv6_spec;
+ const struct rte_flow_item_ipv6 *ipv6_mask;
+ const struct rte_flow_item_tcp *tcp_spec;
+ const struct rte_flow_item_tcp *tcp_mask;
+ const struct rte_flow_item_udp *udp_spec;
+ const struct rte_flow_item_udp *udp_mask;
+ const struct rte_flow_item_sctp *sctp_spec;
+ const struct rte_flow_item_sctp *sctp_mask;
+ u8 ptid = 0;
uint32_t j;
@@ -2253,10 +2252,12 @@ txgbe_parse_fdir_filter_tunnel(const struct rte_flow_attr *attr,
*/
memset(rule, 0, sizeof(struct txgbe_fdir_rule));
- memset(&rule->mask, 0xFF, sizeof(struct txgbe_hw_fdir_mask));
- rule->mask.vlan_tci_mask = 0;
+ memset(&rule->mask, 0, sizeof(struct txgbe_hw_fdir_mask));
+ rule->mask.pkt_type_mask = TXGBE_ATR_TYPE_MASK_TUN_OUTIP |
+ TXGBE_ATR_TYPE_MASK_L3P |
+ TXGBE_ATR_TYPE_MASK_L4P;
/**
* The first not void item should be
- * MAC or IPv4 or IPv6 or UDP or VxLAN.
+ * MAC or IPv4 or IPv6 or UDP or tunnel.
*/
item = next_no_void_pattern(pattern, NULL);
@@ -2266,5 +2267,7 @@ txgbe_parse_fdir_filter_tunnel(const struct rte_flow_attr *attr,
item->type != RTE_FLOW_ITEM_TYPE_UDP &&
item->type != RTE_FLOW_ITEM_TYPE_VXLAN &&
- item->type != RTE_FLOW_ITEM_TYPE_NVGRE) {
+ item->type != RTE_FLOW_ITEM_TYPE_NVGRE &&
+ item->type != RTE_FLOW_ITEM_TYPE_GRE &&
+ item->type != RTE_FLOW_ITEM_TYPE_GENEVE) {
memset(rule, 0, sizeof(struct txgbe_fdir_rule));
rte_flow_error_set(error, EINVAL,
@@ -2274,5 +2277,6 @@ txgbe_parse_fdir_filter_tunnel(const struct rte_flow_attr *attr,
}
- rule->mode = RTE_FDIR_MODE_PERFECT_TUNNEL;
+ rule->mode = RTE_FDIR_MODE_PERFECT;
+ ptid = TXGBE_PTID_PKT_TUN;
/* Skip MAC. */
@@ -2296,4 +2300,6 @@ txgbe_parse_fdir_filter_tunnel(const struct rte_flow_attr *attr,
/* Check if the next not void item is IPv4 or IPv6. */
item = next_no_void_pattern(pattern, item);
+ if (item->type == RTE_FLOW_ITEM_TYPE_VLAN)
+ item = next_no_fuzzy_pattern(pattern, item);
if (item->type != RTE_FLOW_ITEM_TYPE_IPV4 &&
item->type != RTE_FLOW_ITEM_TYPE_IPV6) {
@@ -2309,4 +2315,6 @@ txgbe_parse_fdir_filter_tunnel(const struct rte_flow_attr *attr,
if (item->type == RTE_FLOW_ITEM_TYPE_IPV4 ||
item->type == RTE_FLOW_ITEM_TYPE_IPV6) {
+ rule->mask.pkt_type_mask &= ~TXGBE_ATR_TYPE_MASK_TUN_OUTIP;
+
/* Only used to describe the protocol stack. */
if (item->spec || item->mask) {
@@ -2325,8 +2333,15 @@ txgbe_parse_fdir_filter_tunnel(const struct rte_flow_attr *attr,
}
- /* Check if the next not void item is UDP or NVGRE. */
+ if (item->type == RTE_FLOW_ITEM_TYPE_IPV6)
+ ptid |= TXGBE_PTID_TUN_IPV6;
+
item = next_no_void_pattern(pattern, item);
- if (item->type != RTE_FLOW_ITEM_TYPE_UDP &&
- item->type != RTE_FLOW_ITEM_TYPE_NVGRE) {
+ if (item->type != RTE_FLOW_ITEM_TYPE_IPV4 &&
+ item->type != RTE_FLOW_ITEM_TYPE_IPV6 &&
+ item->type != RTE_FLOW_ITEM_TYPE_UDP &&
+ item->type != RTE_FLOW_ITEM_TYPE_VXLAN &&
+ item->type != RTE_FLOW_ITEM_TYPE_GRE &&
+ item->type != RTE_FLOW_ITEM_TYPE_NVGRE &&
+ item->type != RTE_FLOW_ITEM_TYPE_GENEVE) {
memset(rule, 0, sizeof(struct txgbe_fdir_rule));
rte_flow_error_set(error, EINVAL,
@@ -2339,4 +2354,29 @@ txgbe_parse_fdir_filter_tunnel(const struct rte_flow_attr *attr,
/* Skip UDP. */
if (item->type == RTE_FLOW_ITEM_TYPE_UDP) {
+ /*Not supported last point for range*/
+ if (item->last) {
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
+ item, "Not supported last point for range");
+ return -rte_errno;
+ }
+
+ /* Check if the next not void item is VxLAN or GENEVE. */
+ item = next_no_void_pattern(pattern, item);
+ if (item->type != RTE_FLOW_ITEM_TYPE_VXLAN &&
+ item->type != RTE_FLOW_ITEM_TYPE_GENEVE) {
+ memset(rule, 0, sizeof(struct txgbe_fdir_rule));
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_ITEM,
+ item, "Not supported by fdir filter");
+ return -rte_errno;
+ }
+ }
+
+ /* Skip tunnel. */
+ if (item->type == RTE_FLOW_ITEM_TYPE_VXLAN ||
+ item->type == RTE_FLOW_ITEM_TYPE_GRE ||
+ item->type == RTE_FLOW_ITEM_TYPE_NVGRE ||
+ item->type == RTE_FLOW_ITEM_TYPE_GENEVE) {
/* Only used to describe the protocol stack. */
if (item->spec || item->mask) {
@@ -2355,7 +2395,13 @@ txgbe_parse_fdir_filter_tunnel(const struct rte_flow_attr *attr,
}
- /* Check if the next not void item is VxLAN. */
+ if (item->type == RTE_FLOW_ITEM_TYPE_GRE)
+ ptid |= TXGBE_PTID_TUN_EIG;
+ else
+ ptid |= TXGBE_PTID_TUN_EIGM;
+
item = next_no_void_pattern(pattern, item);
- if (item->type != RTE_FLOW_ITEM_TYPE_VXLAN) {
+ if (item->type != RTE_FLOW_ITEM_TYPE_ETH &&
+ item->type != RTE_FLOW_ITEM_TYPE_IPV4 &&
+ item->type != RTE_FLOW_ITEM_TYPE_IPV6) {
memset(rule, 0, sizeof(struct txgbe_fdir_rule));
rte_flow_error_set(error, EINVAL,
@@ -2366,98 +2412,419 @@ txgbe_parse_fdir_filter_tunnel(const struct rte_flow_attr *attr,
}
- /* check if the next not void item is MAC */
- item = next_no_void_pattern(pattern, item);
- if (item->type != RTE_FLOW_ITEM_TYPE_ETH) {
- memset(rule, 0, sizeof(struct txgbe_fdir_rule));
- rte_flow_error_set(error, EINVAL,
- RTE_FLOW_ERROR_TYPE_ITEM,
- item, "Not supported by fdir filter");
- return -rte_errno;
- }
+ /* Get the MAC info. */
+ if (item->type == RTE_FLOW_ITEM_TYPE_ETH) {
+ /**
+ * Only support vlan and dst MAC address,
+ * others should be masked.
+ */
+ if (item->spec && !item->mask) {
+ memset(rule, 0, sizeof(struct txgbe_fdir_rule));
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_ITEM,
+ item, "Not supported by fdir filter");
+ return -rte_errno;
+ }
+
+ if (item->mask) {
+ rule->b_mask = TRUE;
+ eth_mask = item->mask;
- /**
- * Only support vlan and dst MAC address,
- * others should be masked.
- */
-
- if (!item->mask) {
- memset(rule, 0, sizeof(struct txgbe_fdir_rule));
- rte_flow_error_set(error, EINVAL,
- RTE_FLOW_ERROR_TYPE_ITEM,
- item, "Not supported by fdir filter");
- return -rte_errno;
+ /* Ether type should be masked. */
+ if (eth_mask->hdr.ether_type) {
+ memset(rule, 0, sizeof(struct txgbe_fdir_rule));
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_ITEM,
+ item, "Not supported by fdir filter");
+ return -rte_errno;
+ }
+
+ /**
+ * src MAC address must be masked,
+ * and don't support dst MAC address mask.
+ */
+ for (j = 0; j < RTE_ETHER_ADDR_LEN; j++) {
+ if (eth_mask->hdr.src_addr.addr_bytes[j] ||
+ eth_mask->hdr.dst_addr.addr_bytes[j] != 0xFF) {
+ memset(rule, 0,
+ sizeof(struct txgbe_fdir_rule));
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_ITEM,
+ item, "Not supported by fdir filter");
+ return -rte_errno;
+ }
+ }
+
+ /* When no VLAN, considered as full mask. */
+ rule->mask.vlan_tci_mask = rte_cpu_to_be_16(0xEFFF);
+ }
+
+ item = next_no_fuzzy_pattern(pattern, item);
+ if (rule->mask.vlan_tci_mask) {
+ if (item->type != RTE_FLOW_ITEM_TYPE_VLAN) {
+ memset(rule, 0, sizeof(struct txgbe_fdir_rule));
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_ITEM,
+ item, "Not supported by fdir filter");
+ return -rte_errno;
+ }
+ } else {
+ if (item->type != RTE_FLOW_ITEM_TYPE_IPV4 &&
+ item->type != RTE_FLOW_ITEM_TYPE_IPV6 &&
+ item->type != RTE_FLOW_ITEM_TYPE_VLAN) {
+ memset(rule, 0, sizeof(struct txgbe_fdir_rule));
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_ITEM,
+ item, "Not supported by fdir filter");
+ return -rte_errno;
+ }
+ }
+ if (item->type == RTE_FLOW_ITEM_TYPE_VLAN) {
+ ptid |= TXGBE_PTID_TUN_EIGMV;
+ item = next_no_fuzzy_pattern(pattern, item);
+ }
}
- /*Not supported last point for range*/
- if (item->last) {
- rte_flow_error_set(error, EINVAL,
- RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
- item, "Not supported last point for range");
- return -rte_errno;
+
+ /* Get the IPV4 info. */
+ if (item->type == RTE_FLOW_ITEM_TYPE_IPV4) {
+ /**
+ * Set the flow type even if there's no content
+ * as we must have a flow type.
+ */
+ rule->input.flow_type = TXGBE_ATR_FLOW_TYPE_IPV4;
+ rule->mask.pkt_type_mask &= ~TXGBE_ATR_TYPE_MASK_L3P;
+
+ /*Not supported last point for range*/
+ if (item->last) {
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
+ item, "Not supported last point for range");
+ return -rte_errno;
+ }
+ /**
+ * Only care about src & dst addresses,
+ * others should be masked.
+ */
+ if (item->spec && !item->mask) {
+ memset(rule, 0, sizeof(struct txgbe_fdir_rule));
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_ITEM,
+ item, "Not supported by fdir filter");
+ return -rte_errno;
+ }
+ if (item->mask) {
+ rule->b_mask = TRUE;
+ ipv4_mask = item->mask;
+ if (ipv4_mask->hdr.version_ihl ||
+ ipv4_mask->hdr.type_of_service ||
+ ipv4_mask->hdr.total_length ||
+ ipv4_mask->hdr.packet_id ||
+ ipv4_mask->hdr.fragment_offset ||
+ ipv4_mask->hdr.time_to_live ||
+ ipv4_mask->hdr.next_proto_id ||
+ ipv4_mask->hdr.hdr_checksum) {
+ memset(rule, 0, sizeof(struct txgbe_fdir_rule));
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_ITEM,
+ item, "Not supported by fdir filter");
+ return -rte_errno;
+ }
+ rule->mask.dst_ipv4_mask = ipv4_mask->hdr.dst_addr;
+ rule->mask.src_ipv4_mask = ipv4_mask->hdr.src_addr;
+ }
+ if (item->spec) {
+ rule->b_spec = TRUE;
+ ipv4_spec = item->spec;
+ rule->input.dst_ip[0] =
+ ipv4_spec->hdr.dst_addr;
+ rule->input.src_ip[0] =
+ ipv4_spec->hdr.src_addr;
+ }
+
+ /**
+ * Check if the next not void item is
+ * TCP or UDP or SCTP or END.
+ */
+ item = next_no_fuzzy_pattern(pattern, item);
+ if (item->type != RTE_FLOW_ITEM_TYPE_TCP &&
+ item->type != RTE_FLOW_ITEM_TYPE_UDP &&
+ item->type != RTE_FLOW_ITEM_TYPE_SCTP &&
+ item->type != RTE_FLOW_ITEM_TYPE_END) {
+ memset(rule, 0, sizeof(struct txgbe_fdir_rule));
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_ITEM,
+ item, "Not supported by fdir filter");
+ return -rte_errno;
+ }
}
- rule->b_mask = TRUE;
- eth_mask = item->mask;
-
- /* Ether type should be masked. */
- if (eth_mask->hdr.ether_type) {
- memset(rule, 0, sizeof(struct txgbe_fdir_rule));
- rte_flow_error_set(error, EINVAL,
- RTE_FLOW_ERROR_TYPE_ITEM,
- item, "Not supported by fdir filter");
- return -rte_errno;
+
+ /* Get the IPV6 info. */
+ if (item->type == RTE_FLOW_ITEM_TYPE_IPV6) {
+ /**
+ * Set the flow type even if there's no content
+ * as we must have a flow type.
+ */
+ rule->input.flow_type = TXGBE_ATR_FLOW_TYPE_IPV6;
+ rule->mask.pkt_type_mask &= ~TXGBE_ATR_TYPE_MASK_L3P;
+
+ if (item->last) {
+ memset(rule, 0, sizeof(struct txgbe_fdir_rule));
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
+ item, "Not supported last point for range");
+ return -rte_errno;
+ }
+ if (item->spec && !item->mask) {
+ memset(rule, 0, sizeof(struct txgbe_fdir_rule));
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_ITEM,
+ item, "Not supported by fdir filter");
+ return -rte_errno;
+ }
+ if (item->mask) {
+ rule->b_mask = TRUE;
+ ipv6_mask = item->mask;
+ if (ipv6_mask->hdr.vtc_flow ||
+ ipv6_mask->hdr.payload_len ||
+ ipv6_mask->hdr.proto ||
+ ipv6_mask->hdr.hop_limits) {
+ memset(rule, 0, sizeof(struct txgbe_fdir_rule));
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_ITEM,
+ item, "Not supported by fdir filter");
+ return -rte_errno;
+ }
+
+ /* check src addr mask */
+ for (j = 0; j < 16; j++) {
+ if (ipv6_mask->hdr.src_addr.a[j] == UINT8_MAX) {
+ rule->mask.src_ipv6_mask |= 1 << j;
+ } else if (ipv6_mask->hdr.src_addr.a[j] != 0) {
+ memset(rule, 0, sizeof(struct txgbe_fdir_rule));
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_ITEM,
+ item, "Not supported by fdir filter");
+ return -rte_errno;
+ }
+ }
+
+ /* check dst addr mask */
+ for (j = 0; j < 16; j++) {
+ if (ipv6_mask->hdr.dst_addr.a[j] == UINT8_MAX) {
+ rule->mask.dst_ipv6_mask |= 1 << j;
+ } else if (ipv6_mask->hdr.dst_addr.a[j] != 0) {
+ memset(rule, 0, sizeof(struct txgbe_fdir_rule));
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_ITEM,
+ item, "Not supported by fdir filter");
+ return -rte_errno;
+ }
+ }
+ }
+ if (item->spec) {
+ rule->b_spec = TRUE;
+ ipv6_spec = item->spec;
+ rte_memcpy(rule->input.src_ip,
+ &ipv6_spec->hdr.src_addr, 16);
+ rte_memcpy(rule->input.dst_ip,
+ &ipv6_spec->hdr.dst_addr, 16);
+ }
+
+ /**
+ * Check if the next not void item is
+ * TCP or UDP or SCTP or END.
+ */
+ item = next_no_fuzzy_pattern(pattern, item);
+ if (item->type != RTE_FLOW_ITEM_TYPE_TCP &&
+ item->type != RTE_FLOW_ITEM_TYPE_UDP &&
+ item->type != RTE_FLOW_ITEM_TYPE_SCTP &&
+ item->type != RTE_FLOW_ITEM_TYPE_END) {
+ memset(rule, 0, sizeof(struct txgbe_fdir_rule));
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_ITEM,
+ item, "Not supported by fdir filter");
+ return -rte_errno;
+ }
}
- /* src MAC address should be masked. */
- for (j = 0; j < RTE_ETHER_ADDR_LEN; j++) {
- if (eth_mask->hdr.src_addr.addr_bytes[j]) {
- memset(rule, 0,
- sizeof(struct txgbe_fdir_rule));
+ /* Get the TCP info. */
+ if (item->type == RTE_FLOW_ITEM_TYPE_TCP) {
+ /**
+ * Set the flow type even if there's no content
+ * as we must have a flow type.
+ */
+ rule->input.flow_type |= TXGBE_ATR_L4TYPE_TCP;
+ rule->mask.pkt_type_mask &= ~TXGBE_ATR_TYPE_MASK_L4P;
+
+ /*Not supported last point for range*/
+ if (item->last) {
rte_flow_error_set(error, EINVAL,
- RTE_FLOW_ERROR_TYPE_ITEM,
- item, "Not supported by fdir filter");
+ RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
+ item, "Not supported last point for range");
+ return -rte_errno;
+ }
+ /**
+ * Only care about src & dst ports,
+ * others should be masked.
+ */
+ if (!item->mask) {
+ memset(rule, 0, sizeof(struct txgbe_fdir_rule));
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_ITEM,
+ item, "Not supported by fdir filter");
return -rte_errno;
}
+ rule->b_mask = TRUE;
+ tcp_mask = item->mask;
+ if (tcp_mask->hdr.sent_seq ||
+ tcp_mask->hdr.recv_ack ||
+ tcp_mask->hdr.data_off ||
+ tcp_mask->hdr.tcp_flags ||
+ tcp_mask->hdr.rx_win ||
+ tcp_mask->hdr.cksum ||
+ tcp_mask->hdr.tcp_urp) {
+ memset(rule, 0, sizeof(struct txgbe_fdir_rule));
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_ITEM,
+ item, "Not supported by fdir filter");
+ return -rte_errno;
+ }
+ rule->mask.src_port_mask = tcp_mask->hdr.src_port;
+ rule->mask.dst_port_mask = tcp_mask->hdr.dst_port;
+
+ if (item->spec) {
+ rule->b_spec = TRUE;
+ tcp_spec = item->spec;
+ rule->input.src_port =
+ tcp_spec->hdr.src_port;
+ rule->input.dst_port =
+ tcp_spec->hdr.dst_port;
+ }
}
- rule->mask.mac_addr_byte_mask = 0;
- for (j = 0; j < ETH_ADDR_LEN; j++) {
- /* It's a per byte mask. */
- if (eth_mask->hdr.dst_addr.addr_bytes[j] == 0xFF) {
- rule->mask.mac_addr_byte_mask |= 0x1 << j;
- } else if (eth_mask->hdr.dst_addr.addr_bytes[j]) {
+
+ /* Get the UDP info */
+ if (item->type == RTE_FLOW_ITEM_TYPE_UDP) {
+ /**
+ * Set the flow type even if there's no content
+ * as we must have a flow type.
+ */
+ rule->input.flow_type |= TXGBE_ATR_L4TYPE_UDP;
+ rule->mask.pkt_type_mask &= ~TXGBE_ATR_TYPE_MASK_L4P;
+ /*Not supported last point for range*/
+ if (item->last) {
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
+ item, "Not supported last point for range");
+ return -rte_errno;
+ }
+ /**
+ * Only care about src & dst ports,
+ * others should be masked.
+ */
+ if (!item->mask) {
memset(rule, 0, sizeof(struct txgbe_fdir_rule));
rte_flow_error_set(error, EINVAL,
- RTE_FLOW_ERROR_TYPE_ITEM,
- item, "Not supported by fdir filter");
+ RTE_FLOW_ERROR_TYPE_ITEM,
+ item, "Not supported by fdir filter");
return -rte_errno;
}
+ rule->b_mask = TRUE;
+ udp_mask = item->mask;
+ if (udp_mask->hdr.dgram_len ||
+ udp_mask->hdr.dgram_cksum) {
+ memset(rule, 0, sizeof(struct txgbe_fdir_rule));
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_ITEM,
+ item, "Not supported by fdir filter");
+ return -rte_errno;
+ }
+ rule->mask.src_port_mask = udp_mask->hdr.src_port;
+ rule->mask.dst_port_mask = udp_mask->hdr.dst_port;
+
+ if (item->spec) {
+ rule->b_spec = TRUE;
+ udp_spec = item->spec;
+ rule->input.src_port =
+ udp_spec->hdr.src_port;
+ rule->input.dst_port =
+ udp_spec->hdr.dst_port;
+ }
}
- /* When no vlan, considered as full mask. */
- rule->mask.vlan_tci_mask = rte_cpu_to_be_16(0xEFFF);
-
- /**
- * Check if the next not void item is vlan or ipv4.
- * IPv6 is not supported.
- */
- item = next_no_void_pattern(pattern, item);
- if (item->type != RTE_FLOW_ITEM_TYPE_VLAN &&
- item->type != RTE_FLOW_ITEM_TYPE_IPV4) {
- memset(rule, 0, sizeof(struct txgbe_fdir_rule));
- rte_flow_error_set(error, EINVAL,
- RTE_FLOW_ERROR_TYPE_ITEM,
- item, "Not supported by fdir filter");
- return -rte_errno;
+ /* Get the SCTP info */
+ if (item->type == RTE_FLOW_ITEM_TYPE_SCTP) {
+ /**
+ * Set the flow type even if there's no content
+ * as we must have a flow type.
+ */
+ rule->input.flow_type |= TXGBE_ATR_L4TYPE_SCTP;
+ rule->mask.pkt_type_mask &= ~TXGBE_ATR_TYPE_MASK_L4P;
+
+ /*Not supported last point for range*/
+ if (item->last) {
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
+ item, "Not supported last point for range");
+ return -rte_errno;
+ }
+
+ /**
+ * Only care about src & dst ports,
+ * others should be masked.
+ */
+ if (!item->mask) {
+ memset(rule, 0, sizeof(struct txgbe_fdir_rule));
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_ITEM,
+ item, "Not supported by fdir filter");
+ return -rte_errno;
+ }
+ rule->b_mask = TRUE;
+ sctp_mask = item->mask;
+ if (sctp_mask->hdr.tag || sctp_mask->hdr.cksum) {
+ memset(rule, 0, sizeof(struct txgbe_fdir_rule));
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_ITEM,
+ item, "Not supported by fdir filter");
+ return -rte_errno;
+ }
+ rule->mask.src_port_mask = sctp_mask->hdr.src_port;
+ rule->mask.dst_port_mask = sctp_mask->hdr.dst_port;
+
+ if (item->spec) {
+ rule->b_spec = TRUE;
+ sctp_spec = item->spec;
+ rule->input.src_port =
+ sctp_spec->hdr.src_port;
+ rule->input.dst_port =
+ sctp_spec->hdr.dst_port;
+ }
+ /* others even sctp port is not supported */
+ sctp_mask = item->mask;
+ if (sctp_mask &&
+ (sctp_mask->hdr.src_port ||
+ sctp_mask->hdr.dst_port ||
+ sctp_mask->hdr.tag ||
+ sctp_mask->hdr.cksum)) {
+ memset(rule, 0, sizeof(struct txgbe_fdir_rule));
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_ITEM,
+ item, "Not supported by fdir filter");
+ return -rte_errno;
+ }
}
- /*Not supported last point for range*/
- if (item->last) {
- rte_flow_error_set(error, EINVAL,
- RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
- item, "Not supported last point for range");
- return -rte_errno;
+
+ if (item->type != RTE_FLOW_ITEM_TYPE_END) {
+ /* check if the next not void item is END */
+ item = next_no_fuzzy_pattern(pattern, item);
+ if (item->type != RTE_FLOW_ITEM_TYPE_END) {
+ memset(rule, 0, sizeof(struct txgbe_fdir_rule));
+ rte_flow_error_set(error, EINVAL,
+ RTE_FLOW_ERROR_TYPE_ITEM,
+ item, "Not supported by fdir filter");
+ return -rte_errno;
+ }
}
- /**
- * If the tags is 0, it means don't care about the VLAN.
- * Do nothing.
- */
+ txgbe_fdir_parse_flow_type(&rule->input, ptid, true);
return txgbe_parse_fdir_act_attr(attr, actions, rule, error);
--
2.50.0
---
Diff of the applied patch vs upstream commit (please double-check if non-empty:
---
--- - 2025-07-18 20:29:16.009429124 +0100
+++ 0142-net-txgbe-fix-to-create-FDIR-filter-for-tunnel-packe.patch 2025-07-18 20:29:11.111907886 +0100
@@ -1 +1 @@
-From a1851465f8252ee75a26d05b9b2d3dca7023e8f2 Mon Sep 17 00:00:00 2001
+From 07eee8a0d85b840aff239360a2fcb393dcbcb826 Mon Sep 17 00:00:00 2001
@@ -5,0 +6,2 @@
+[ upstream commit a1851465f8252ee75a26d05b9b2d3dca7023e8f2 ]
+
@@ -10 +11,0 @@
-Cc: stable@dpdk.org
@@ -31 +32 @@
-index 01e8a9fc05..c2d0950d2c 100644
+index 5134c3d99e..288d9a43da 100644
@@ -41 +42 @@
-index 145ee8a452..99a76daca0 100644
+index b2a2e35351..7482cbbf63 100644
next prev parent reply other threads:[~2025-07-18 19:37 UTC|newest]
Thread overview: 176+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-07-18 19:28 patch 'net/fm10k/base: fix compilation warnings' " Kevin Traynor
2025-07-18 19:28 ` patch 'net/ixgbe/base: correct definition of endianness macro' " Kevin Traynor
2025-07-18 19:28 ` patch 'net/ixgbe/base: fix compilation warnings' " Kevin Traynor
2025-07-18 19:28 ` patch 'net/i40e/base: fix unused value " Kevin Traynor
2025-07-18 19:28 ` patch 'net/i40e/base: fix compiler " Kevin Traynor
2025-07-18 19:29 ` patch 'acl: fix build with GCC 15 on aarch64' " Kevin Traynor
2025-07-18 19:29 ` patch 'eal/linux: improve ASLR check' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/idpf: fix truncation of constant value' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/e1000: fix EEPROM dump' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/ixgbe: enable ethertype filter for E610' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/ixgbe: fix port mask default value in filter' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/e1000: fix igb Tx queue offloads capability' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/ice: fix flow creation failure' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/ice: fix support for 3 scheduler levels' " Kevin Traynor
2025-07-18 19:29 ` patch 'vhost: fix wrapping on control virtqueue rings' " Kevin Traynor
2025-07-18 19:29 ` patch 'vhost/crypto: fix cipher data length' " Kevin Traynor
2025-07-18 19:29 ` patch 'crypto/virtio: fix cipher data source " Kevin Traynor
2025-07-18 19:29 ` patch 'event/cnxk: fix missing HW state checks' " Kevin Traynor
2025-07-18 19:29 ` patch 'crypto/cnxk: fix uninitialized variable' " Kevin Traynor
2025-07-18 19:29 ` patch 'crypto/cnxk: fix out-of-bounds access in SM2' " Kevin Traynor
2025-07-18 19:29 ` patch 'app/crypto-perf: fix AAD offset alignment' " Kevin Traynor
2025-07-18 19:29 ` patch 'crypto/qat: fix out-of-place header bytes in AEAD raw API' " Kevin Traynor
2025-07-18 19:29 ` patch 'crypto/qat: fix out-of-place chain/cipher/auth headers' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/mlx5: fix header modify action on group 0' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/mlx5: validate GTP PSC QFI width' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/mlx5: fix counter pool init error propagation' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/mlx5: fix counter service cleanup on init failure' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/mlx5: fix validation for GENEVE options' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/mlx5: fix GRE flow item validation' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/mlx5/hws: fix send queue drain on FW WQE destroy' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/mlx5: fix flex tunnel flow validation' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/mlx5: remove unsupported flow meter action in HWS' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/mlx5: fix error notification for large flow patterns' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/mlx5: fix mark action with shared Rx queue' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/mlx5: align PF and VF/SF MAC address handling' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/sfc: fix action order on start failure' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/nfp: fix crash with null RSS hash key' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/nfp: fix hash key length logic' " Kevin Traynor
2025-07-18 19:29 ` patch 'app/testpmd: fix RSS hash key update' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/af_xdp: fix use after free in zero-copy Tx' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/hns3: fix integer overflow in interrupt unmap' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/hns3: fix memory leak on failure' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/hns3: fix extra wait for link up' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/hns3: fix memory leak for indirect flow action' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/hns3: fix interrupt rollback' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/hns3: fix divide by zero' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/hns3: fix resources release on reset' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/nfp: fix flow rule freeing' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/nfp: fix control message overflow' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/nfp: standardize NFDk Tx descriptor endianness' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/qede: fix use after free' " Kevin Traynor
2025-07-18 19:29 ` patch 'bus/fslmc: " Kevin Traynor
2025-07-18 19:29 ` patch 'net/null: fix packet copy' " Kevin Traynor
2025-07-18 19:29 ` patch 'bus/vmbus: use Hyper-V page size' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/netvsc: " Kevin Traynor
2025-07-18 19:29 ` patch 'net/netvsc: add stats counters from VF' " Kevin Traynor
2025-07-18 19:29 ` patch 'app/testpmd: relax number of TCs in DCB command' " Kevin Traynor
2025-07-18 19:29 ` patch 'app/testpmd: fix flow random item token' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/mana: check vendor ID when probing RDMA device' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/ntnic: avoid divide by zero' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/ntnic: fix ring queue operation' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/hns3: fix CRC data segment' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/tap: fix qdisc add failure handling' " Kevin Traynor
2025-07-18 19:29 ` patch 'net/mlx5: fix VLAN stripping on hairpin queue' " Kevin Traynor
2025-07-18 19:29 ` patch 'mem: fix lockup on address space shortage' " Kevin Traynor
2025-07-18 19:30 ` patch 'test/malloc: improve resiliency' " Kevin Traynor
2025-07-18 19:30 ` patch 'trace: fix overflow in per-lcore trace buffer' " Kevin Traynor
2025-07-18 19:30 ` patch 'net/octeon_ep: fix buffer refill' " Kevin Traynor
2025-07-18 19:30 ` patch 'common/cnxk: fix aura offset' " Kevin Traynor
2025-07-18 19:30 ` patch 'common/cnxk: fix E-tag pattern parsing' " Kevin Traynor
2025-07-18 19:30 ` patch 'common/cnxk: fix CQ tail drop' " Kevin Traynor
2025-07-18 19:30 ` patch 'net/cnxk: fix descriptor count update on reconfig' " Kevin Traynor
2025-07-18 19:30 ` patch 'ethdev: fix error struct in flow configure' " Kevin Traynor
2025-07-18 19:30 ` patch 'net/ice/base: fix type conversion' " Kevin Traynor
2025-07-18 19:30 ` patch 'net/ice/base: fix media type check' " Kevin Traynor
2025-07-18 19:30 ` patch 'net/ice/base: fix integer overflow' " Kevin Traynor
2025-07-18 19:30 ` patch 'net/ice/base: fix typo in device ID description' " Kevin Traynor
2025-07-18 19:30 ` patch 'common/dpaax: fix PDCP key command race condition' " Kevin Traynor
2025-07-18 19:30 ` patch 'common/dpaax: fix PDCP AES only 12-bit SN' " Kevin Traynor
2025-07-18 19:30 ` patch 'crypto/dpaa2_sec: fix uninitialized variable' " Kevin Traynor
2025-07-18 19:30 ` patch 'crypto/cnxk: update SG list population' " Kevin Traynor
2025-07-18 19:30 ` patch 'crypto/cnxk: fix QP stats' " Kevin Traynor
2025-07-18 19:30 ` patch 'crypto/virtio: fix driver cleanup' " Kevin Traynor
2025-07-18 19:30 ` patch 'eal: fix return value of lcore role' " Kevin Traynor
2025-07-18 19:30 ` patch 'eal: warn if no lcore is available' " Kevin Traynor
2025-07-18 19:30 ` patch 'test/lcore: fix race in per-lcore test' " Kevin Traynor
2025-07-18 19:30 ` patch 'bus: cleanup device lists' " Kevin Traynor
2025-07-18 19:30 ` patch 'eal/linux: unregister alarm callback before free' " Kevin Traynor
2025-07-18 19:30 ` patch 'eal/freebsd: " Kevin Traynor
2025-07-18 19:30 ` patch 'bus/pci/bsd: fix device existence check' " Kevin Traynor
2025-07-18 19:30 ` patch 'power/intel_uncore: fix crash closing uninitialized driver' " Kevin Traynor
2025-07-18 19:30 ` patch 'net: fix IPv6 check for IPv4 compat' " Kevin Traynor
2025-07-18 19:30 ` patch 'pcapng: fix null dereference in close' " Kevin Traynor
2025-07-18 19:30 ` patch 'crypto/qat: fix size calculation for memset' " Kevin Traynor
2025-07-18 19:30 ` patch 'net/mlx5: fix link on Windows' " Kevin Traynor
2025-07-18 19:30 ` patch 'net/mlx5: avoid setting kernel MTU if not needed' " Kevin Traynor
2025-07-18 19:30 ` patch 'net/mlx5: fix hypervisor detection in VLAN workaround' " Kevin Traynor
2025-07-18 19:30 ` patch 'net/mlx5: fix template flow rule identification' " Kevin Traynor
2025-07-18 19:30 ` patch 'net/ixgbe/base: fix link status for E610' " Kevin Traynor
2025-07-18 19:30 ` patch 'net/hns3: check requirement for hardware GRO' " Kevin Traynor
2025-07-18 19:30 ` patch 'net/hns3: allow Tx vector when fast free not enabled' " Kevin Traynor
2025-07-18 19:30 ` patch 'common/mlx5: fix dependency detection on Windows' " Kevin Traynor
2025-07-18 19:30 ` patch 'net/mlx5: fix crash in HWS counter pool destroy' " Kevin Traynor
2025-07-18 19:30 ` patch 'net/mlx5: fix access to auxiliary flow data' " Kevin Traynor
2025-07-18 19:30 ` patch 'common/mlx5: fix extraction of auxiliary device name' " Kevin Traynor
2025-07-18 19:30 ` patch 'net/mlx5: fix crash on age query with indirect conntrack' " Kevin Traynor
2025-07-18 19:30 ` patch 'net/mlx5: fix WQE size calculation for Tx queue' " Kevin Traynor
2025-07-18 19:30 ` patch 'eal/x86: fix C++ build' " Kevin Traynor
2025-07-18 19:30 ` patch 'net/ixgbe: fix indentation' " Kevin Traynor
2025-07-18 19:30 ` patch 'net/ice: fix querying RSS hash for DCF' " Kevin Traynor
2025-07-18 19:30 ` patch 'net/ice: fix handling empty DCF RSS hash' " Kevin Traynor
2025-07-18 19:30 ` patch 'net/iavf: fix VLAN strip setting after enabling filter' " Kevin Traynor
2025-07-18 19:30 ` patch 'vhost: search virtqueues driver data in read-only area' " Kevin Traynor
2025-07-18 19:30 ` patch 'vhost: fix net control virtqueue used length' " Kevin Traynor
2025-07-18 19:30 ` patch 'eal/unix: fix log message for madvise failure' " Kevin Traynor
2025-07-18 19:30 ` patch 'buildtools/test: scan muti-line registrations' " Kevin Traynor
2025-07-18 19:30 ` patch 'crypto/cnxk: fix includes' " Kevin Traynor
2025-07-18 19:30 ` patch 'common/cnxk: fix qsize in CPT iq enable' " Kevin Traynor
2025-07-18 19:30 ` patch 'crypto/qat: fix out-of-place chain/cipher/auth headers' " Kevin Traynor
2025-07-18 19:30 ` patch 'examples/ipsec-secgw: fix crash with IPv6' " Kevin Traynor
2025-07-18 19:30 ` patch 'examples/ipsec-secgw: fix crash in event vector mode' " Kevin Traynor
2025-07-18 19:30 ` patch 'test/crypto: fix auth and cipher case IV length' " Kevin Traynor
2025-07-18 19:30 ` patch 'test/crypto: set to null after freeing operation' " Kevin Traynor
2025-07-18 19:30 ` patch 'crypto/openssl: include private exponent in RSA session' " Kevin Traynor
2025-07-18 19:30 ` patch 'test/crypto: fix RSA vector as per RFC 8017' " Kevin Traynor
2025-07-18 19:31 ` patch 'test/crypto: fix RSA decrypt validation' " Kevin Traynor
2025-07-18 19:31 ` patch 'test/crypto: fix EdDSA vector description' " Kevin Traynor
2025-07-18 19:31 ` patch 'event/dlb2: fix dequeue with CQ depth <= 16' " Kevin Traynor
2025-07-18 19:31 ` patch 'event/dlb2: fix validaton of LDB port COS ID arguments' " Kevin Traynor
2025-07-18 19:31 ` patch 'event/dlb2: fix num single link ports for DLB2.5' " Kevin Traynor
2025-07-18 19:31 ` patch 'event/dlb2: fix QID depth xstat' " Kevin Traynor
2025-07-18 19:31 ` patch 'event/dlb2: fix default credits based on HW version' " Kevin Traynor
2025-07-18 19:31 ` patch 'event/dlb2: fix public symbol namespace' " Kevin Traynor
2025-07-18 19:31 ` patch 'app/eventdev: fix number of releases sent during cleanup' " Kevin Traynor
2025-07-18 19:31 ` patch 'eventdev: fix flag types consistency' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/ntnic: unmap DMA during queue release' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/txgbe: fix ntuple filter parsing' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/txgbe: fix raw pattern match for FDIR rule' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/txgbe: fix packet type for FDIR filter' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/txgbe: fix to create FDIR filter for SCTP packet' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/txgbe: fix FDIR perfect mode for IPv6' " Kevin Traynor
2025-07-18 19:31 ` Kevin Traynor [this message]
2025-07-18 19:31 ` patch 'net/txgbe: fix reserved extra FDIR headroom' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/txgbe: fix MAC control frame forwarding' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/ngbe: " Kevin Traynor
2025-07-18 19:31 ` patch 'net/txgbe: fix device statistics' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/ngbe: " Kevin Traynor
2025-07-18 19:31 ` patch 'net/txgbe: restrict VLAN strip configuration on VF' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/txgbe: add LRO flag in mbuf when enabled' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/hns3: fix queue TC configuration on VF' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/bonding: avoid RSS RETA update in flow isolation mode' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/iavf: fix VLAN strip disabling for ADQ v2 capability' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/i40e: fix RSS on plain IPv4' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/octeon_ep: increase mailbox timeout' " Kevin Traynor
2025-07-18 19:31 ` patch 'bus/auxiliary: fix crash in cleanup' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/mlx5: fix masked indirect age action validation' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/mlx5: fix out-of-order completions in ordinary Rx burst' " Kevin Traynor
2025-07-18 19:31 ` patch 'examples/ntb: check more heap allocations' " Kevin Traynor
2025-07-18 19:31 ` patch 'examples/ipsec-secgw: fix number of queue pairs' " Kevin Traynor
2025-07-18 19:31 ` patch 'dts: fix deterministic doc' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/e1000: fix xstats name' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/mlx5: fix maximal queue size query' " Kevin Traynor
2025-07-18 19:31 ` patch 'bus/vmbus: align ring buffer data to page boundary' " Kevin Traynor
2025-07-18 19:31 ` patch 'crypto/virtio: add request check on request side' " Kevin Traynor
2025-07-18 19:31 ` patch 'ethdev: keep promiscuous/allmulti value before disabling' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/ixgbe/base: fix lock checker errors' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/nfp: standardize Rx descriptor endianness' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/nfp: standardize NFD3 Tx " Kevin Traynor
2025-07-18 19:31 ` patch 'doc: add kernel options required for mlx5' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/ixgbe: remove VLAs' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/ixgbe: skip MACsec stats for E610' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/cnxk: fix lock for security session operations' " Kevin Traynor
2025-07-18 19:31 ` patch 'doc: fix missing feature matrix for event device' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/ena: fix control path interrupt mode' " Kevin Traynor
2025-07-18 19:31 ` patch 'net/ena: fix aenq timeout with low poll interval' " Kevin Traynor
2025-07-18 19:31 ` patch 'examples/flow_filtering: fix make clean' " Kevin Traynor
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20250718193247.1008129-142-ktraynor@redhat.com \
--to=ktraynor@redhat.com \
--cc=jiawenwu@trustnetic.com \
--cc=stable@dpdk.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).