From patchwork Wed Jul 3 04:58:06 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Eli Britstein X-Patchwork-Id: 1126619 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (mailfrom) smtp.mailfrom=openvswitch.org (client-ip=140.211.169.12; helo=mail.linuxfoundation.org; envelope-from=ovs-dev-bounces@openvswitch.org; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=mellanox.com Received: from mail.linuxfoundation.org (mail.linuxfoundation.org [140.211.169.12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 45dpm03QXLz9s00 for ; Wed, 3 Jul 2019 14:58:39 +1000 (AEST) Received: from mail.linux-foundation.org (localhost [127.0.0.1]) by mail.linuxfoundation.org (Postfix) with ESMTP id 116BAF46; Wed, 3 Jul 2019 04:58:36 +0000 (UTC) X-Original-To: dev@openvswitch.org Delivered-To: ovs-dev@mail.linuxfoundation.org Received: from smtp1.linuxfoundation.org (smtp1.linux-foundation.org [172.17.192.35]) by mail.linuxfoundation.org (Postfix) with ESMTPS id D74C4F3B for ; Wed, 3 Jul 2019 04:58:34 +0000 (UTC) X-Greylist: domain auto-whitelisted by SQLgrey-1.7.6 Received: from mellanox.co.il (mail-il-dmz.mellanox.com [193.47.165.129]) by smtp1.linuxfoundation.org (Postfix) with ESMTP id F05DF70D for ; Wed, 3 Jul 2019 04:58:33 +0000 (UTC) Received: from Internal Mail-Server by MTLPINE2 (envelope-from elibr@mellanox.com) with ESMTPS (AES256-SHA encrypted); 3 Jul 2019 07:58:30 +0300 Received: from dev-r-vrt-214.mtr.labs.mlnx. (dev-r-vrt-214.mtr.labs.mlnx [10.212.214.1]) by labmailer.mlnx (8.13.8/8.13.8) with ESMTP id x634wUs4020708; Wed, 3 Jul 2019 07:58:30 +0300 From: Eli Britstein To: dev@openvswitch.org, Ben Pfaff Date: Wed, 3 Jul 2019 04:58:06 +0000 Message-Id: <20190703045806.5357-1-elibr@mellanox.com> X-Mailer: git-send-email 2.17.2 X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, RCVD_IN_DNSWL_NONE, UNPARSEABLE_RELAY autolearn=ham version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on smtp1.linux-foundation.org Cc: Simon Horman , Eli Britstein Subject: [ovs-dev] [PATCH V2 1/1] dpif-netlink: Log eth type 0x1234 not offloadable X-BeenThere: ovs-dev@openvswitch.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Sender: ovs-dev-bounces@openvswitch.org Errors-To: ovs-dev-bounces@openvswitch.org Ethernet type 0x1234 is used for testing and not being offloadable. For testing offloadable features, log about using this value. Signed-off-by: Eli Britstein Acked-by: Roi Dayan Signed-off-by: Eli Britstein Acked-by: Ben Pfaff --- lib/dpif-netlink.c | 1 + 1 file changed, 1 insertion(+) diff --git a/lib/dpif-netlink.c b/lib/dpif-netlink.c index ba80a0079..a0d51ae61 100644 --- a/lib/dpif-netlink.c +++ b/lib/dpif-netlink.c @@ -2007,6 +2007,7 @@ parse_flow_put(struct dpif_netlink *dpif, struct dpif_flow_put *put) /* When we try to install a dummy flow from a probed feature. */ if (match.flow.dl_type == htons(0x1234)) { + VLOG_INFO_RL(&rl, "eth 0x1234 is special and not offloadable"); return EOPNOTSUPP; }