get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/30409/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 30409,
    "url": "https://patches.dpdk.org/api/patches/30409/?format=api",
    "web_url": "https://patches.dpdk.org/project/dpdk/patch/20171014221734.15511-6-akhil.goyal@nxp.com/",
    "project": {
        "id": 1,
        "url": "https://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20171014221734.15511-6-akhil.goyal@nxp.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20171014221734.15511-6-akhil.goyal@nxp.com",
    "date": "2017-10-14T22:17:27",
    "name": "[dpdk-dev,v4,05/12] mbuf: add security crypto flags and mbuf fields",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "31c245b9d6199d1b3da40a9cfc9658c42798d39e",
    "submitter": {
        "id": 517,
        "url": "https://patches.dpdk.org/api/people/517/?format=api",
        "name": "Akhil Goyal",
        "email": "akhil.goyal@nxp.com"
    },
    "delegate": null,
    "mbox": "https://patches.dpdk.org/project/dpdk/patch/20171014221734.15511-6-akhil.goyal@nxp.com/mbox/",
    "series": [],
    "comments": "https://patches.dpdk.org/api/patches/30409/comments/",
    "check": "fail",
    "checks": "https://patches.dpdk.org/api/patches/30409/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@dpdk.org",
        "Delivered-To": "patchwork@dpdk.org",
        "Received": [
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id E88C51B392;\n\tSun, 15 Oct 2017 00:20:55 +0200 (CEST)",
            "from NAM01-SN1-obe.outbound.protection.outlook.com\n\t(mail-sn1nam01on0079.outbound.protection.outlook.com [104.47.32.79])\n\tby dpdk.org (Postfix) with ESMTP id B60D21B392\n\tfor <dev@dpdk.org>; Sun, 15 Oct 2017 00:20:53 +0200 (CEST)",
            "from CY4PR03CA0088.namprd03.prod.outlook.com (10.171.242.157) by\n\tBN3PR03MB2356.namprd03.prod.outlook.com (10.166.74.151) with\n\tMicrosoft SMTP Server (version=TLS1_2,\n\tcipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id\n\t15.20.77.7; Sat, 14 Oct 2017 22:20:52 +0000",
            "from BN1AFFO11FD034.protection.gbl (2a01:111:f400:7c10::109) by\n\tCY4PR03CA0088.outlook.office365.com (2603:10b6:910:4d::29) with\n\tMicrosoft SMTP Server (version=TLS1_2,\n\tcipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id\n\t15.20.77.21 via Frontend Transport; Sat, 14 Oct 2017 22:20:51 +0000",
            "from az84smr01.freescale.net (192.88.158.2) by\n\tBN1AFFO11FD034.mail.protection.outlook.com (10.58.52.158) with\n\tMicrosoft SMTP Server (version=TLS1_0,\n\tcipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.20.77.10\n\tvia Frontend Transport; Sat, 14 Oct 2017 22:20:51 +0000",
            "from netperf2.ap.freescale.net ([10.232.133.164])\n\tby az84smr01.freescale.net (8.14.3/8.14.0) with ESMTP id\n\tv9EMKCMO018714; Sat, 14 Oct 2017 15:20:45 -0700"
        ],
        "Authentication-Results": "spf=fail (sender IP is 192.88.158.2)\n\tsmtp.mailfrom=nxp.com; NXP1.onmicrosoft.com;\n\tdkim=none (message not signed)\n\theader.d=none;NXP1.onmicrosoft.com; dmarc=fail action=none\n\theader.from=nxp.com;",
        "Received-SPF": "Fail (protection.outlook.com: domain of nxp.com does not\n\tdesignate 192.88.158.2 as permitted sender)\n\treceiver=protection.outlook.com; \n\tclient-ip=192.88.158.2; helo=az84smr01.freescale.net;",
        "From": "Akhil Goyal <akhil.goyal@nxp.com>",
        "To": "<dev@dpdk.org>",
        "CC": "<declan.doherty@intel.com>, <pablo.de.lara.guarch@intel.com>,\n\t<hemant.agrawal@nxp.com>, <radu.nicolau@intel.com>,\n\t<borisp@mellanox.com>, \n\t<aviadye@mellanox.com>, <thomas@monjalon.net>, <sandeep.malik@nxp.com>,\n\t<jerin.jacob@caviumnetworks.com>, <john.mcnamara@intel.com>,\n\t<konstantin.ananyev@intel.com>, <shahafs@mellanox.com>,\n\t<olivier.matz@6wind.com>",
        "Date": "Sun, 15 Oct 2017 03:47:27 +0530",
        "Message-ID": "<20171014221734.15511-6-akhil.goyal@nxp.com>",
        "X-Mailer": "git-send-email 2.9.3",
        "In-Reply-To": "<20171014221734.15511-1-akhil.goyal@nxp.com>",
        "References": "<20171006181151.4758-1-akhil.goyal@nxp.com>\n\t<20171014221734.15511-1-akhil.goyal@nxp.com>",
        "X-EOPAttributedMessage": "0",
        "X-Matching-Connectors": "131524932513410327;\n\t(91ab9b29-cfa4-454e-5278-08d120cd25b8); ()",
        "X-Forefront-Antispam-Report": "CIP:192.88.158.2; IPV:NLI; CTRY:US; EFV:NLI;\n\tSFV:NSPM;\n\tSFS:(10009020)(6009001)(336005)(376002)(39860400002)(346002)(39380400002)(2980300002)(1110001)(1109001)(339900001)(199003)(189002)(5660300001)(54906003)(2351001)(69596002)(76176999)(316002)(50986999)(16586007)(77096006)(48376002)(1076002)(7416002)(189998001)(6666003)(105606002)(8656003)(2950100002)(6916009)(50226002)(68736007)(36756003)(47776003)(5003940100001)(50466002)(106466001)(97736004)(498600001)(4326008)(33646002)(53936002)(15650500001)(85426001)(8936002)(305945005)(8676002)(81156014)(81166006)(2906002)(356003)(86362001)(104016004);\n\tDIR:OUT; SFP:1101; SCL:1; SRVR:BN3PR03MB2356;\n\tH:az84smr01.freescale.net; FPR:; \n\tSPF:Fail; PTR:InfoDomainNonexistent; A:1; MX:1; LANG:en; ",
        "X-Microsoft-Exchange-Diagnostics": [
            "1; BN1AFFO11FD034;\n\t1:AWHp9bLtWC/QxqW6pbH8Me5q7Nrcs2oSDAWh0mz6UM3hn48WaAEqLhGHGJKCr67fDTLZU0JKn9lQtPKvaSjzBKc4mZLP5PSZ1k7mWDTtP/5G9l+soXGMvf+eXg9RVr8Y",
            "1; BN3PR03MB2356;\n\t3:Q80LrcAbGbzx8HuNFWe68v3kwMD+p6wYVuLZ1nazVtOG8Y1hTZECSxxe6tf/Bb712Ud4L/NBn9NUEBiivWRPR+kl/q5aRi0m5k/a5V8OJR8JPmAXReNzEtFp9s476mmPj86KJSO7XgDx1KUF/DRSRBXateRChMMLCco5ISyfOoptYsmcvRkXTsVD+w2lANzvrsUnnBR3gBL+eIf6CXwNxrjyC707QH5igyg8XpCedd5Cv7P3r9G1vpieWgaFz0ruFwLHY7PA+apVjdqxckvApNzs80Lz141HxwIFlyVXmNW4431spM2qo3s5Ui8YR/F3agnG6weonTiAWbnzQ5QVYF056gQtL8uqxMCgO4CJDU8=;\n\t25:8deXHauJf3NhikuqeNGhhoZIwoqn7dNClQ/lj+S90V4sd6/yPmX5ALd1K/k4Ud+mbqzLE0epI83MGQROBJu4yEhFeYb2FBSX3WSUqrG4lKoJSZxD3nX0QZ3LhqdJJyEO5aK8i87PvW0tkTYlOUhdypFL2vJCVl99491+zOZBJ+OoyxjfEpyPQ4BeesyjqunSgeaRdYMXpU1Dgf//tMKS0Ny1yotqRGqO92X2SPAYK9AzxNmJi+6LOnOTfeF79ORZoWgqH5zvqyEBW7snpD4CUzkbFsRz6xcphTa78okl8piEmkc3xhHdO6rNwmCVqvZqriArxG205q+YWgQ9XTKbUA==",
            "1; BN3PR03MB2356;\n\t31:32p5f2MGuz0IO4awfJLygJfB5gF7ZvSKx14uA0jS+CMJkb3Ow9fiiBk9Em5XN1jBj/LfuYc0lDswT6yCpr4Uxpp+/ly1r2ZizPLznF8pjQ78WP3tjAgWInCklFnW80U8msOIfYoY6ZFixLKKHFv5i8+N4WFbsUmpxWKdxWWtynNch7e+sofjXsK4bkbMn5bpV22/syFauZZ/e122w6u3OnxIPPkirMw/L8QWAYCF//I=;\n\t4:gs8djRII5Xpbic6yRIz4hEkQS5voO19fFJubwrgzK68juDmH5xNe5ibOr2tqkJ2xZd/TsvnoJte7h1teh6iBAIhNxEn0ZbZsWSZQSLLn+8g9CFt1wlWXalPQqsGyP7zIdgQVj/84LsgF5V1LMem8d00/XjxFIyaSQdpTQqFuHxA0JbCrJbGN29H6KqxzFiW/6PtmI0480pUdAinMiScGL4w45whmti/X9i5+shllaKHn20UtsQr6F8ULKWJbstSzhaatm2aYw/6fxlv61TndTdUQlyXPE7TMfr58feMguWDVm6OVrC8tAdBl3NqJLBsNMxbjEfIRqH2/I2u2P986Bw==",
            "=?us-ascii?Q?1; BN3PR03MB2356;\n\t23:VGIZuItS49sfQcmeFPT/g+WqfOOfo0VrPjXuV/hHD?=\n\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",
            "1; BN3PR03MB2356;\n\t6:Sv4sFMhMqyPoM5sDJ9IMUm3eC+5G7+KqRGu6t81UTTSG+jpdlsHdfFbpPAun/GQiVdBebQlLs0lyOMDwSDujAGg7QeL2mDJ+N2MxpSNhBQXEw03BAd/wlTyBUd9RkSayGOMkn6Hm4pxflkeWbbL0u8ombhS5ptNXf7gj1izckIN7st34YmwHDfz7uKPLcf1DmaX8OcRRnrctCoIfnL5tQgxk1N7fsH3wU/ODw+981dwt1g5mE2axF8CkMJXMLOioQAGHXTg3I38LrEa0UZ+uoKhG1n4oMALzriGY7wTsZlOqyRPrXYXkIQiLzAf8+GwVW11TF3IMrcXZdNvbeXkAIw==;\n\t5:8lvsEG02aHGafTirkSvBJ5wR5v56iQ1keQYXPz2Wz+Gw3BlIOacbLDCRhk96zhSCVDwr83FBO+Xk+QNVvOr1bCrHa5xaEqONgjDjcpsMU6mj3IoYLryFTC+drBBJQ9klR/zVAO3+oany5ymFYZp3Fg==;\n\t24:51z6SFErDLLNsJD0dD80hy9qLY/p0viok2eYfTH125pVFpxmwZUC2e1ykgF6d7hdQcrDq+s6caDPhIQwKpK72cWuw8okjWeXbAcxMCgpF6E=;\n\t7:ZVC6AVGEx6XZVoYxcauaOY+Is/l6s8MBLB/3++JANVuklpIodC9D9cfun0fqqPqqiyXB0PwEIbl+yMZFux/0qUjnw4vXyd0TRRSH8/aUbRtt1Tf8wwtwZR/Cfe3RuwmJHe+cYlUJi7nAkQj8cL4QCxsWoX+o68lZFLaqTS7bZUNhmHNHL9iCi4eQ7HWbJ0Q0j6D86sbgV0K4W0IpfH/4u6vYeyOlIQv/yHqX974Gf3Q="
        ],
        "MIME-Version": "1.0",
        "Content-Type": "text/plain",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-Office365-Filtering-Correlation-Id": "6c7a55bc-c45e-42f4-ea55-08d51351d403",
        "X-Microsoft-Antispam": "UriScan:; BCL:0; PCL:0;\n\tRULEID:(22001)(2017052603199)(201703131430075)(201703131517081);\n\tSRVR:BN3PR03MB2356; ",
        "X-MS-TrafficTypeDiagnostic": "BN3PR03MB2356:",
        "X-Exchange-Antispam-Report-Test": "UriScan:(192374486261705)(228905959029699); ",
        "X-Microsoft-Antispam-PRVS": "<BN3PR03MB2356E8C9F1C938672FA2CF66E6490@BN3PR03MB2356.namprd03.prod.outlook.com>",
        "X-Exchange-Antispam-Report-CFA-Test": "BCL:0; PCL:0;\n\tRULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6095135)(2401047)(8121501046)(5005006)(100000703101)(100105400095)(93006095)(93001095)(10201501046)(3002001)(6055026)(6096035)(20161123565025)(20161123563025)(20161123561025)(20161123556025)(201703131430075)(201703131448075)(201703131433075)(201703161259150)(201703151042153)(20161123559100)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095);\n\tSRVR:BN3PR03MB2356; BCL:0; PCL:0;\n\tRULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(400006)(100000804101)(100110200095)(100000805101)(100110500095);\n\tSRVR:BN3PR03MB2356; ",
        "X-Forefront-PRVS": "046060344D",
        "SpamDiagnosticOutput": "1:99",
        "SpamDiagnosticMetadata": "NSPM",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "14 Oct 2017 22:20:51.0758\n\t(UTC)",
        "X-MS-Exchange-CrossTenant-Id": "5afe0b00-7697-4969-b663-5eab37d5f47e",
        "X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp": "TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e;\n\tIp=[192.88.158.2]; \n\tHelo=[az84smr01.freescale.net]",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "HybridOnPrem",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "BN3PR03MB2356",
        "Subject": "[dpdk-dev] [PATCH v4 05/12] mbuf: add security crypto flags and\n\tmbuf fields",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<http://dpdk.org/ml/options/dev>,\n\t<mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://dpdk.org/ml/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<http://dpdk.org/ml/listinfo/dev>,\n\t<mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "From: Boris Pismenny <borisp@mellanox.com>\n\nAdd security crypto flags and update mbuf fields to support\nIPsec crypto offload for transmitted packets, and to indicate\ncrypto result for received packets.\n\nSigned-off-by: Aviad Yehezkel <aviadye@mellanox.com>\nSigned-off-by: Boris Pismenny <borisp@mellanox.com>\nSigned-off-by: Radu Nicolau <radu.nicolau@intel.com>\n---\n lib/librte_mbuf/rte_mbuf.c       |  6 ++++++\n lib/librte_mbuf/rte_mbuf.h       | 35 ++++++++++++++++++++++++++++++++---\n lib/librte_mbuf/rte_mbuf_ptype.c |  1 +\n lib/librte_mbuf/rte_mbuf_ptype.h | 11 +++++++++++\n 4 files changed, 50 insertions(+), 3 deletions(-)",
    "diff": "diff --git a/lib/librte_mbuf/rte_mbuf.c b/lib/librte_mbuf/rte_mbuf.c\nindex 0e18709..6659261 100644\n--- a/lib/librte_mbuf/rte_mbuf.c\n+++ b/lib/librte_mbuf/rte_mbuf.c\n@@ -324,6 +324,8 @@ const char *rte_get_rx_ol_flag_name(uint64_t mask)\n \tcase PKT_RX_QINQ_STRIPPED: return \"PKT_RX_QINQ_STRIPPED\";\n \tcase PKT_RX_LRO: return \"PKT_RX_LRO\";\n \tcase PKT_RX_TIMESTAMP: return \"PKT_RX_TIMESTAMP\";\n+\tcase PKT_RX_SEC_OFFLOAD: return \"PKT_RX_SEC_OFFLOAD\";\n+\tcase PKT_RX_SEC_OFFLOAD_FAILED: return \"PKT_RX_SEC_OFFLOAD_FAILED\";\n \tdefault: return NULL;\n \t}\n }\n@@ -359,6 +361,8 @@ rte_get_rx_ol_flag_list(uint64_t mask, char *buf, size_t buflen)\n \t\t{ PKT_RX_QINQ_STRIPPED, PKT_RX_QINQ_STRIPPED, NULL },\n \t\t{ PKT_RX_LRO, PKT_RX_LRO, NULL },\n \t\t{ PKT_RX_TIMESTAMP, PKT_RX_TIMESTAMP, NULL },\n+\t\t{ PKT_RX_SEC_OFFLOAD, PKT_RX_SEC_OFFLOAD, NULL },\n+\t\t{ PKT_RX_SEC_OFFLOAD_FAILED, PKT_RX_SEC_OFFLOAD_FAILED, NULL },\n \t};\n \tconst char *name;\n \tunsigned int i;\n@@ -411,6 +415,7 @@ const char *rte_get_tx_ol_flag_name(uint64_t mask)\n \tcase PKT_TX_TUNNEL_GENEVE: return \"PKT_TX_TUNNEL_GENEVE\";\n \tcase PKT_TX_TUNNEL_MPLSINUDP: return \"PKT_TX_TUNNEL_MPLSINUDP\";\n \tcase PKT_TX_MACSEC: return \"PKT_TX_MACSEC\";\n+\tcase PKT_TX_SEC_OFFLOAD: return \"PKT_TX_SEC_OFFLOAD\";\n \tdefault: return NULL;\n \t}\n }\n@@ -444,6 +449,7 @@ rte_get_tx_ol_flag_list(uint64_t mask, char *buf, size_t buflen)\n \t\t{ PKT_TX_TUNNEL_MPLSINUDP, PKT_TX_TUNNEL_MASK,\n \t\t  \"PKT_TX_TUNNEL_NONE\" },\n \t\t{ PKT_TX_MACSEC, PKT_TX_MACSEC, NULL },\n+\t\t{ PKT_TX_SEC_OFFLOAD, PKT_TX_SEC_OFFLOAD, NULL },\n \t};\n \tconst char *name;\n \tunsigned int i;\ndiff --git a/lib/librte_mbuf/rte_mbuf.h b/lib/librte_mbuf/rte_mbuf.h\nindex cc38040..5d478da 100644\n--- a/lib/librte_mbuf/rte_mbuf.h\n+++ b/lib/librte_mbuf/rte_mbuf.h\n@@ -189,11 +189,26 @@ extern \"C\" {\n  */\n #define PKT_RX_TIMESTAMP     (1ULL << 17)\n \n+/**\n+ * Indicate that security offload processing was applied on the RX packet.\n+ */\n+#define PKT_RX_SEC_OFFLOAD\t\t(1ULL << 18)\n+\n+/**\n+ * Indicate that security offload processing failed on the RX packet.\n+ */\n+#define PKT_RX_SEC_OFFLOAD_FAILED  (1ULL << 19)\n+\n /* add new RX flags here */\n \n /* add new TX flags here */\n \n /**\n+ * Request security offload processing on the TX packet.\n+ */\n+#define PKT_TX_SEC_OFFLOAD (1ULL << 43)\n+\n+/**\n  * Offload the MACsec. This flag must be set by the application to enable\n  * this offload feature for a packet to be transmitted.\n  */\n@@ -316,7 +331,8 @@ extern \"C\" {\n \t\tPKT_TX_QINQ_PKT |        \\\n \t\tPKT_TX_VLAN_PKT |        \\\n \t\tPKT_TX_TUNNEL_MASK |\t \\\n-\t\tPKT_TX_MACSEC)\n+\t\tPKT_TX_MACSEC |\t\t \\\n+\t\tPKT_TX_SEC_OFFLOAD)\n \n #define __RESERVED           (1ULL << 61) /**< reserved for future mbuf use */\n \n@@ -456,8 +472,21 @@ struct rte_mbuf {\n \t\t\tuint32_t l3_type:4; /**< (Outer) L3 type. */\n \t\t\tuint32_t l4_type:4; /**< (Outer) L4 type. */\n \t\t\tuint32_t tun_type:4; /**< Tunnel type. */\n-\t\t\tuint32_t inner_l2_type:4; /**< Inner L2 type. */\n-\t\t\tuint32_t inner_l3_type:4; /**< Inner L3 type. */\n+\t\t\tRTE_STD_C11\n+\t\t\tunion {\n+\t\t\t\tuint8_t inner_esp_next_proto;\n+\t\t\t\t/**< ESP next protocol type, valid if\n+\t\t\t\t * RTE_PTYPE_TUNNEL_ESP tunnel type is set\n+\t\t\t\t * on both Tx and Rx.\n+\t\t\t\t */\n+\t\t\t\t__extension__\n+\t\t\t\tstruct {\n+\t\t\t\t\tuint8_t inner_l2_type:4;\n+\t\t\t\t\t/**< Inner L2 type. */\n+\t\t\t\t\tuint8_t inner_l3_type:4;\n+\t\t\t\t\t/**< Inner L3 type. */\n+\t\t\t\t};\n+\t\t\t};\n \t\t\tuint32_t inner_l4_type:4; /**< Inner L4 type. */\n \t\t};\n \t};\ndiff --git a/lib/librte_mbuf/rte_mbuf_ptype.c b/lib/librte_mbuf/rte_mbuf_ptype.c\nindex a450814..a623226 100644\n--- a/lib/librte_mbuf/rte_mbuf_ptype.c\n+++ b/lib/librte_mbuf/rte_mbuf_ptype.c\n@@ -91,6 +91,7 @@ const char *rte_get_ptype_tunnel_name(uint32_t ptype)\n \tcase RTE_PTYPE_TUNNEL_GRENAT: return \"TUNNEL_GRENAT\";\n \tcase RTE_PTYPE_TUNNEL_GTPC: return \"TUNNEL_GTPC\";\n \tcase RTE_PTYPE_TUNNEL_GTPU: return \"TUNNEL_GTPU\";\n+\tcase RTE_PTYPE_TUNNEL_ESP: return \"TUNNEL_ESP\";\n \tdefault: return \"TUNNEL_UNKNOWN\";\n \t}\n }\ndiff --git a/lib/librte_mbuf/rte_mbuf_ptype.h b/lib/librte_mbuf/rte_mbuf_ptype.h\nindex 978c4a2..5c62435 100644\n--- a/lib/librte_mbuf/rte_mbuf_ptype.h\n+++ b/lib/librte_mbuf/rte_mbuf_ptype.h\n@@ -415,6 +415,17 @@ extern \"C\" {\n  */\n #define RTE_PTYPE_TUNNEL_GTPU               0x00008000\n /**\n+ * ESP (IP Encapsulating Security Payload) tunneling packet type.\n+ *\n+ * Packet format:\n+ * <'ether type'=0x0800\n+ * | 'version'=4, 'protocol'=51>\n+ * or,\n+ * <'ether type'=0x86DD\n+ * | 'version'=6, 'next header'=51>\n+ */\n+#define RTE_PTYPE_TUNNEL_ESP                0x00009000\n+/**\n  * Mask of tunneling packet types.\n  */\n #define RTE_PTYPE_TUNNEL_MASK               0x0000f000\n",
    "prefixes": [
        "dpdk-dev",
        "v4",
        "05/12"
    ]
}