From d301396577b14043b0e0f0e6a905b12607b8c01a Mon Sep 17 00:00:00 2001 From: Kishore Padmanabha Date: Wed, 15 Jul 2020 19:20:34 +0530 Subject: [PATCH] net/bnxt: ignore IPv4 TOS mask This is a work around for the OVS setting offload rules that are passing ipv4 tos mask as wild card and currently we do not support. Signed-off-by: Kishore Padmanabha Signed-off-by: Somnath Kotur Reviewed-by: Ajit Khaparde --- drivers/net/bnxt/tf_ulp/ulp_rte_parser.c | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c b/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c index b943465977..63f4c172e8 100644 --- a/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c +++ b/drivers/net/bnxt/tf_ulp/ulp_rte_parser.c @@ -704,9 +704,19 @@ ulp_rte_ipv4_hdr_handler(const struct rte_flow_item *item, ulp_rte_prsr_mask_copy(params, &idx, &ipv4_mask->hdr.version_ihl, sizeof(ipv4_mask->hdr.version_ihl)); +#ifdef ULP_DONT_IGNORE_TOS ulp_rte_prsr_mask_copy(params, &idx, &ipv4_mask->hdr.type_of_service, sizeof(ipv4_mask->hdr.type_of_service)); +#else + /* + * The tos field is ignored since OVS is setting it as wild card + * match and it is not supported. This is a work around and + * shall be addressed in the future. + */ + idx += 1; +#endif + ulp_rte_prsr_mask_copy(params, &idx, &ipv4_mask->hdr.total_length, sizeof(ipv4_mask->hdr.total_length)); -- 2.20.1