[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID:
<PAXPR04MB8510844B724FB984FB67E9138899A@PAXPR04MB8510.eurprd04.prod.outlook.com>
Date: Thu, 5 Feb 2026 06:16:08 +0000
From: Wei Fang <wei.fang@....com>
To: Jakub Kicinski <kuba@...nel.org>
CC: "ast@...nel.org" <ast@...nel.org>, "andrew+netdev@...n.ch"
<andrew+netdev@...n.ch>, "davem@...emloft.net" <davem@...emloft.net>,
"pabeni@...hat.com" <pabeni@...hat.com>, Clark Wang <xiaoning.wang@....com>,
"john.fastabend@...il.com" <john.fastabend@...il.com>, "daniel@...earbox.net"
<daniel@...earbox.net>, "sdf@...ichev.me" <sdf@...ichev.me>, Frank Li
<frank.li@....com>, "linux-kernel@...r.kernel.org"
<linux-kernel@...r.kernel.org>, "hawk@...nel.org" <hawk@...nel.org>,
"horms@...nel.org" <horms@...nel.org>, "bpf@...r.kernel.org"
<bpf@...r.kernel.org>, "edumazet@...gle.com" <edumazet@...gle.com>,
"netdev@...r.kernel.org" <netdev@...r.kernel.org>, "imx@...ts.linux.dev"
<imx@...ts.linux.dev>, Shenwei Wang <shenwei.wang@....com>
Subject: RE: [v6,net-next,06/15] net: fec: add fec_enet_rx_queue_xdp() for XDP
path
> > +static int fec_enet_rx_queue_xdp(struct fec_enet_private *fep, int queue,
> > + int budget, struct bpf_prog *prog)
> > +{
>
> [ ... ]
>
> > + switch (act) {
> > + case XDP_PASS:
> > + rxq->stats[RX_XDP_PASS]++;
> > + /* The packet length includes FCS, but we don't want to
> > + * include that when passing upstream as it messes up
> > + * bridging applications.
> > + */
> > + skb = fec_build_skb(fep, rxq, bdp, page, pkt_len);
> > + if (!skb)
> > + trace_xdp_exception(ndev, prog, XDP_PASS);
> > + else
> > + napi_gro_receive(&fep->napi, skb);
> > +
> > + break;
> > + case XDP_REDIRECT:
> > + rxq->stats[RX_XDP_REDIRECT]++;
> > + err = xdp_do_redirect(ndev, &xdp, prog);
> > + if (unlikely(err)) {
> > + fec_xdp_drop(rxq, &xdp, sync);
> > + trace_xdp_exception(ndev, prog, XDP_REDIRECT);
> > + } else {
> > + xdp_res |= FEC_ENET_XDP_REDIR;
> > + }
> > + break;
> > + case XDP_TX:
> > + rxq->stats[RX_XDP_TX]++;
> > + err = fec_enet_xdp_tx_xmit(fep, cpu, &xdp, sync);
> > + if (unlikely(err)) {
> > + rxq->stats[RX_XDP_TX_ERRORS]++;
> > + fec_xdp_drop(rxq, &xdp, sync);
> > + trace_xdp_exception(ndev, prog, XDP_TX);
> > + }
> > + break;
> > + default:
> > + bpf_warn_invalid_xdp_action(ndev, prog, act);
> > + fallthrough;
> > + case XDP_ABORTED:
> > + /* handle aborts by dropping packet */
> > + fallthrough;
> > + case XDP_DROP:
> > + rxq->stats[RX_XDP_DROP]++;
> > + fec_xdp_drop(rxq, &xdp, sync);
> > + break;
>
> Are XDP_ABORTED and invalid XDP actions being traced properly? In the
I will fix it, thanks.
Powered by blists - more mailing lists