1 /* SPDX-License-Identifier: BSD-3-Clause
2 * Copyright 2018-2020 NXP
13 #include <rte_ethdev.h>
15 #include <rte_malloc.h>
16 #include <rte_flow_driver.h>
17 #include <rte_tailq.h>
22 #include <dpaa2_ethdev.h>
23 #include <dpaa2_pmd_logs.h>
25 /* Workaround to discriminate the UDP/TCP/SCTP
26 * with next protocol of l3.
27 * MC/WRIOP are not able to identify
28 * the l4 protocol with l4 ports.
30 int mc_l4_port_identification;
32 static char *dpaa2_flow_control_log;
34 #define FIXED_ENTRY_SIZE 54
36 enum flow_rule_ipaddr_type {
42 struct flow_rule_ipaddr {
43 enum flow_rule_ipaddr_type ipaddr_type;
51 LIST_ENTRY(rte_flow) next; /**< Pointer to the next flow structure. */
52 struct dpni_rule_cfg qos_rule;
53 struct dpni_rule_cfg fs_rule;
54 uint8_t qos_real_key_size;
55 uint8_t fs_real_key_size;
56 uint8_t tc_id; /** Traffic Class ID. */
57 uint8_t tc_index; /** index within this Traffic Class. */
58 enum rte_flow_action_type action;
60 /* Special for IP address to specify the offset
63 struct flow_rule_ipaddr ipaddr_rule;
64 struct dpni_fs_action_cfg action_cfg;
68 enum rte_flow_item_type dpaa2_supported_pattern_type[] = {
69 RTE_FLOW_ITEM_TYPE_END,
70 RTE_FLOW_ITEM_TYPE_ETH,
71 RTE_FLOW_ITEM_TYPE_VLAN,
72 RTE_FLOW_ITEM_TYPE_IPV4,
73 RTE_FLOW_ITEM_TYPE_IPV6,
74 RTE_FLOW_ITEM_TYPE_ICMP,
75 RTE_FLOW_ITEM_TYPE_UDP,
76 RTE_FLOW_ITEM_TYPE_TCP,
77 RTE_FLOW_ITEM_TYPE_SCTP,
78 RTE_FLOW_ITEM_TYPE_GRE,
82 enum rte_flow_action_type dpaa2_supported_action_type[] = {
83 RTE_FLOW_ACTION_TYPE_END,
84 RTE_FLOW_ACTION_TYPE_QUEUE,
85 RTE_FLOW_ACTION_TYPE_RSS
88 /* Max of enum rte_flow_item_type + 1, for both IPv4 and IPv6*/
89 #define DPAA2_FLOW_ITEM_TYPE_GENERIC_IP (RTE_FLOW_ITEM_TYPE_META + 1)
91 enum rte_filter_type dpaa2_filter_type = RTE_ETH_FILTER_NONE;
94 static const struct rte_flow_item_eth dpaa2_flow_item_eth_mask = {
95 .dst.addr_bytes = "\xff\xff\xff\xff\xff\xff",
96 .src.addr_bytes = "\xff\xff\xff\xff\xff\xff",
97 .type = RTE_BE16(0xffff),
100 static const struct rte_flow_item_vlan dpaa2_flow_item_vlan_mask = {
101 .tci = RTE_BE16(0xffff),
104 static const struct rte_flow_item_ipv4 dpaa2_flow_item_ipv4_mask = {
105 .hdr.src_addr = RTE_BE32(0xffffffff),
106 .hdr.dst_addr = RTE_BE32(0xffffffff),
107 .hdr.next_proto_id = 0xff,
110 static const struct rte_flow_item_ipv6 dpaa2_flow_item_ipv6_mask = {
113 "\xff\xff\xff\xff\xff\xff\xff\xff"
114 "\xff\xff\xff\xff\xff\xff\xff\xff",
116 "\xff\xff\xff\xff\xff\xff\xff\xff"
117 "\xff\xff\xff\xff\xff\xff\xff\xff",
122 static const struct rte_flow_item_icmp dpaa2_flow_item_icmp_mask = {
123 .hdr.icmp_type = 0xff,
124 .hdr.icmp_code = 0xff,
127 static const struct rte_flow_item_udp dpaa2_flow_item_udp_mask = {
129 .src_port = RTE_BE16(0xffff),
130 .dst_port = RTE_BE16(0xffff),
134 static const struct rte_flow_item_tcp dpaa2_flow_item_tcp_mask = {
136 .src_port = RTE_BE16(0xffff),
137 .dst_port = RTE_BE16(0xffff),
141 static const struct rte_flow_item_sctp dpaa2_flow_item_sctp_mask = {
143 .src_port = RTE_BE16(0xffff),
144 .dst_port = RTE_BE16(0xffff),
148 static const struct rte_flow_item_gre dpaa2_flow_item_gre_mask = {
149 .protocol = RTE_BE16(0xffff),
154 static inline void dpaa2_prot_field_string(
155 enum net_prot prot, uint32_t field,
158 if (!dpaa2_flow_control_log)
161 if (prot == NET_PROT_ETH) {
162 strcpy(string, "eth");
163 if (field == NH_FLD_ETH_DA)
164 strcat(string, ".dst");
165 else if (field == NH_FLD_ETH_SA)
166 strcat(string, ".src");
167 else if (field == NH_FLD_ETH_TYPE)
168 strcat(string, ".type");
170 strcat(string, ".unknown field");
171 } else if (prot == NET_PROT_VLAN) {
172 strcpy(string, "vlan");
173 if (field == NH_FLD_VLAN_TCI)
174 strcat(string, ".tci");
176 strcat(string, ".unknown field");
177 } else if (prot == NET_PROT_IP) {
178 strcpy(string, "ip");
179 if (field == NH_FLD_IP_SRC)
180 strcat(string, ".src");
181 else if (field == NH_FLD_IP_DST)
182 strcat(string, ".dst");
183 else if (field == NH_FLD_IP_PROTO)
184 strcat(string, ".proto");
186 strcat(string, ".unknown field");
187 } else if (prot == NET_PROT_TCP) {
188 strcpy(string, "tcp");
189 if (field == NH_FLD_TCP_PORT_SRC)
190 strcat(string, ".src");
191 else if (field == NH_FLD_TCP_PORT_DST)
192 strcat(string, ".dst");
194 strcat(string, ".unknown field");
195 } else if (prot == NET_PROT_UDP) {
196 strcpy(string, "udp");
197 if (field == NH_FLD_UDP_PORT_SRC)
198 strcat(string, ".src");
199 else if (field == NH_FLD_UDP_PORT_DST)
200 strcat(string, ".dst");
202 strcat(string, ".unknown field");
203 } else if (prot == NET_PROT_ICMP) {
204 strcpy(string, "icmp");
205 if (field == NH_FLD_ICMP_TYPE)
206 strcat(string, ".type");
207 else if (field == NH_FLD_ICMP_CODE)
208 strcat(string, ".code");
210 strcat(string, ".unknown field");
211 } else if (prot == NET_PROT_SCTP) {
212 strcpy(string, "sctp");
213 if (field == NH_FLD_SCTP_PORT_SRC)
214 strcat(string, ".src");
215 else if (field == NH_FLD_SCTP_PORT_DST)
216 strcat(string, ".dst");
218 strcat(string, ".unknown field");
219 } else if (prot == NET_PROT_GRE) {
220 strcpy(string, "gre");
221 if (field == NH_FLD_GRE_TYPE)
222 strcat(string, ".type");
224 strcat(string, ".unknown field");
226 strcpy(string, "unknown protocol");
230 static inline void dpaa2_flow_qos_table_extracts_log(
231 const struct dpaa2_dev_priv *priv)
236 if (!dpaa2_flow_control_log)
239 printf("Setup QoS table: number of extracts: %d\r\n",
240 priv->extract.qos_key_extract.dpkg.num_extracts);
241 for (idx = 0; idx < priv->extract.qos_key_extract.dpkg.num_extracts;
243 dpaa2_prot_field_string(priv->extract.qos_key_extract.dpkg
244 .extracts[idx].extract.from_hdr.prot,
245 priv->extract.qos_key_extract.dpkg.extracts[idx]
246 .extract.from_hdr.field,
248 printf("%s", string);
249 if ((idx + 1) < priv->extract.qos_key_extract.dpkg.num_extracts)
255 static inline void dpaa2_flow_fs_table_extracts_log(
256 const struct dpaa2_dev_priv *priv, int tc_id)
261 if (!dpaa2_flow_control_log)
264 printf("Setup FS table: number of extracts of TC[%d]: %d\r\n",
265 tc_id, priv->extract.tc_key_extract[tc_id]
267 for (idx = 0; idx < priv->extract.tc_key_extract[tc_id]
268 .dpkg.num_extracts; idx++) {
269 dpaa2_prot_field_string(priv->extract.tc_key_extract[tc_id]
270 .dpkg.extracts[idx].extract.from_hdr.prot,
271 priv->extract.tc_key_extract[tc_id].dpkg.extracts[idx]
272 .extract.from_hdr.field,
274 printf("%s", string);
275 if ((idx + 1) < priv->extract.tc_key_extract[tc_id]
282 static inline void dpaa2_flow_qos_entry_log(
283 const char *log_info, const struct rte_flow *flow, int qos_index)
288 if (!dpaa2_flow_control_log)
291 printf("\r\n%s QoS entry[%d] for TC[%d], extracts size is %d\r\n",
292 log_info, qos_index, flow->tc_id, flow->qos_real_key_size);
294 key = (uint8_t *)(size_t)flow->qos_rule.key_iova;
295 mask = (uint8_t *)(size_t)flow->qos_rule.mask_iova;
298 for (idx = 0; idx < flow->qos_real_key_size; idx++)
299 printf("%02x ", key[idx]);
301 printf("\r\nmask:\r\n");
302 for (idx = 0; idx < flow->qos_real_key_size; idx++)
303 printf("%02x ", mask[idx]);
305 printf("\r\n%s QoS ipsrc: %d, ipdst: %d\r\n", log_info,
306 flow->ipaddr_rule.qos_ipsrc_offset,
307 flow->ipaddr_rule.qos_ipdst_offset);
310 static inline void dpaa2_flow_fs_entry_log(
311 const char *log_info, const struct rte_flow *flow)
316 if (!dpaa2_flow_control_log)
319 printf("\r\n%s FS/TC entry[%d] of TC[%d], extracts size is %d\r\n",
320 log_info, flow->tc_index, flow->tc_id, flow->fs_real_key_size);
322 key = (uint8_t *)(size_t)flow->fs_rule.key_iova;
323 mask = (uint8_t *)(size_t)flow->fs_rule.mask_iova;
326 for (idx = 0; idx < flow->fs_real_key_size; idx++)
327 printf("%02x ", key[idx]);
329 printf("\r\nmask:\r\n");
330 for (idx = 0; idx < flow->fs_real_key_size; idx++)
331 printf("%02x ", mask[idx]);
333 printf("\r\n%s FS ipsrc: %d, ipdst: %d\r\n", log_info,
334 flow->ipaddr_rule.fs_ipsrc_offset,
335 flow->ipaddr_rule.fs_ipdst_offset);
338 static inline void dpaa2_flow_extract_key_set(
339 struct dpaa2_key_info *key_info, int index, uint8_t size)
341 key_info->key_size[index] = size;
343 key_info->key_offset[index] =
344 key_info->key_offset[index - 1] +
345 key_info->key_size[index - 1];
347 key_info->key_offset[index] = 0;
349 key_info->key_total_size += size;
352 static int dpaa2_flow_extract_add(
353 struct dpaa2_key_extract *key_extract,
355 uint32_t field, uint8_t field_size)
357 int index, ip_src = -1, ip_dst = -1;
358 struct dpkg_profile_cfg *dpkg = &key_extract->dpkg;
359 struct dpaa2_key_info *key_info = &key_extract->key_info;
361 if (dpkg->num_extracts >=
362 DPKG_MAX_NUM_OF_EXTRACTS) {
363 DPAA2_PMD_WARN("Number of extracts overflows");
366 /* Before reorder, the IP SRC and IP DST are already last
369 for (index = 0; index < dpkg->num_extracts; index++) {
370 if (dpkg->extracts[index].extract.from_hdr.prot ==
372 if (dpkg->extracts[index].extract.from_hdr.field ==
376 if (dpkg->extracts[index].extract.from_hdr.field ==
384 RTE_ASSERT((ip_src + 2) >= dpkg->num_extracts);
387 RTE_ASSERT((ip_dst + 2) >= dpkg->num_extracts);
389 if (prot == NET_PROT_IP &&
390 (field == NH_FLD_IP_SRC ||
391 field == NH_FLD_IP_DST)) {
392 index = dpkg->num_extracts;
394 if (ip_src >= 0 && ip_dst >= 0)
395 index = dpkg->num_extracts - 2;
396 else if (ip_src >= 0 || ip_dst >= 0)
397 index = dpkg->num_extracts - 1;
399 index = dpkg->num_extracts;
402 dpkg->extracts[index].type = DPKG_EXTRACT_FROM_HDR;
403 dpkg->extracts[index].extract.from_hdr.type = DPKG_FULL_FIELD;
404 dpkg->extracts[index].extract.from_hdr.prot = prot;
405 dpkg->extracts[index].extract.from_hdr.field = field;
406 if (prot == NET_PROT_IP &&
407 (field == NH_FLD_IP_SRC ||
408 field == NH_FLD_IP_DST)) {
409 dpaa2_flow_extract_key_set(key_info, index, 0);
411 dpaa2_flow_extract_key_set(key_info, index, field_size);
414 if (prot == NET_PROT_IP) {
415 if (field == NH_FLD_IP_SRC) {
416 if (key_info->ipv4_dst_offset >= 0) {
417 key_info->ipv4_src_offset =
418 key_info->ipv4_dst_offset +
419 NH_FLD_IPV4_ADDR_SIZE;
421 key_info->ipv4_src_offset =
422 key_info->key_offset[index - 1] +
423 key_info->key_size[index - 1];
425 if (key_info->ipv6_dst_offset >= 0) {
426 key_info->ipv6_src_offset =
427 key_info->ipv6_dst_offset +
428 NH_FLD_IPV6_ADDR_SIZE;
430 key_info->ipv6_src_offset =
431 key_info->key_offset[index - 1] +
432 key_info->key_size[index - 1];
434 } else if (field == NH_FLD_IP_DST) {
435 if (key_info->ipv4_src_offset >= 0) {
436 key_info->ipv4_dst_offset =
437 key_info->ipv4_src_offset +
438 NH_FLD_IPV4_ADDR_SIZE;
440 key_info->ipv4_dst_offset =
441 key_info->key_offset[index - 1] +
442 key_info->key_size[index - 1];
444 if (key_info->ipv6_src_offset >= 0) {
445 key_info->ipv6_dst_offset =
446 key_info->ipv6_src_offset +
447 NH_FLD_IPV6_ADDR_SIZE;
449 key_info->ipv6_dst_offset =
450 key_info->key_offset[index - 1] +
451 key_info->key_size[index - 1];
456 if (index == dpkg->num_extracts) {
457 dpkg->num_extracts++;
463 dpkg->extracts[ip_src].type =
464 DPKG_EXTRACT_FROM_HDR;
465 dpkg->extracts[ip_src].extract.from_hdr.type =
467 dpkg->extracts[ip_src].extract.from_hdr.prot =
469 dpkg->extracts[ip_src].extract.from_hdr.field =
471 dpaa2_flow_extract_key_set(key_info, ip_src, 0);
472 key_info->ipv4_src_offset += field_size;
473 key_info->ipv6_src_offset += field_size;
477 dpkg->extracts[ip_dst].type =
478 DPKG_EXTRACT_FROM_HDR;
479 dpkg->extracts[ip_dst].extract.from_hdr.type =
481 dpkg->extracts[ip_dst].extract.from_hdr.prot =
483 dpkg->extracts[ip_dst].extract.from_hdr.field =
485 dpaa2_flow_extract_key_set(key_info, ip_dst, 0);
486 key_info->ipv4_dst_offset += field_size;
487 key_info->ipv6_dst_offset += field_size;
490 dpkg->num_extracts++;
495 /* Protocol discrimination.
496 * Discriminate IPv4/IPv6/vLan by Eth type.
497 * Discriminate UDP/TCP/ICMP by next proto of IP.
500 dpaa2_flow_proto_discrimination_extract(
501 struct dpaa2_key_extract *key_extract,
502 enum rte_flow_item_type type)
504 if (type == RTE_FLOW_ITEM_TYPE_ETH) {
505 return dpaa2_flow_extract_add(
506 key_extract, NET_PROT_ETH,
509 } else if (type == (enum rte_flow_item_type)
510 DPAA2_FLOW_ITEM_TYPE_GENERIC_IP) {
511 return dpaa2_flow_extract_add(
512 key_extract, NET_PROT_IP,
514 NH_FLD_IP_PROTO_SIZE);
520 static inline int dpaa2_flow_extract_search(
521 struct dpkg_profile_cfg *dpkg,
522 enum net_prot prot, uint32_t field)
526 for (i = 0; i < dpkg->num_extracts; i++) {
527 if (dpkg->extracts[i].extract.from_hdr.prot == prot &&
528 dpkg->extracts[i].extract.from_hdr.field == field) {
536 static inline int dpaa2_flow_extract_key_offset(
537 struct dpaa2_key_extract *key_extract,
538 enum net_prot prot, uint32_t field)
541 struct dpkg_profile_cfg *dpkg = &key_extract->dpkg;
542 struct dpaa2_key_info *key_info = &key_extract->key_info;
544 if (prot == NET_PROT_IPV4 ||
545 prot == NET_PROT_IPV6)
546 i = dpaa2_flow_extract_search(dpkg, NET_PROT_IP, field);
548 i = dpaa2_flow_extract_search(dpkg, prot, field);
551 if (prot == NET_PROT_IPV4 && field == NH_FLD_IP_SRC)
552 return key_info->ipv4_src_offset;
553 else if (prot == NET_PROT_IPV4 && field == NH_FLD_IP_DST)
554 return key_info->ipv4_dst_offset;
555 else if (prot == NET_PROT_IPV6 && field == NH_FLD_IP_SRC)
556 return key_info->ipv6_src_offset;
557 else if (prot == NET_PROT_IPV6 && field == NH_FLD_IP_DST)
558 return key_info->ipv6_dst_offset;
560 return key_info->key_offset[i];
566 struct proto_discrimination {
567 enum rte_flow_item_type type;
575 dpaa2_flow_proto_discrimination_rule(
576 struct dpaa2_dev_priv *priv, struct rte_flow *flow,
577 struct proto_discrimination proto, int group)
587 if (proto.type == RTE_FLOW_ITEM_TYPE_ETH) {
589 field = NH_FLD_ETH_TYPE;
590 } else if (proto.type == DPAA2_FLOW_ITEM_TYPE_GENERIC_IP) {
592 field = NH_FLD_IP_PROTO;
595 "Only Eth and IP support to discriminate next proto.");
599 offset = dpaa2_flow_extract_key_offset(&priv->extract.qos_key_extract,
602 DPAA2_PMD_ERR("QoS prot %d field %d extract failed",
606 key_iova = flow->qos_rule.key_iova + offset;
607 mask_iova = flow->qos_rule.mask_iova + offset;
608 if (proto.type == RTE_FLOW_ITEM_TYPE_ETH) {
609 eth_type = proto.eth_type;
610 memcpy((void *)key_iova, (const void *)(ð_type),
613 memcpy((void *)mask_iova, (const void *)(ð_type),
616 ip_proto = proto.ip_proto;
617 memcpy((void *)key_iova, (const void *)(&ip_proto),
620 memcpy((void *)mask_iova, (const void *)(&ip_proto),
624 offset = dpaa2_flow_extract_key_offset(
625 &priv->extract.tc_key_extract[group],
628 DPAA2_PMD_ERR("FS prot %d field %d extract failed",
632 key_iova = flow->fs_rule.key_iova + offset;
633 mask_iova = flow->fs_rule.mask_iova + offset;
635 if (proto.type == RTE_FLOW_ITEM_TYPE_ETH) {
636 eth_type = proto.eth_type;
637 memcpy((void *)key_iova, (const void *)(ð_type),
640 memcpy((void *)mask_iova, (const void *)(ð_type),
643 ip_proto = proto.ip_proto;
644 memcpy((void *)key_iova, (const void *)(&ip_proto),
647 memcpy((void *)mask_iova, (const void *)(&ip_proto),
655 dpaa2_flow_rule_data_set(
656 struct dpaa2_key_extract *key_extract,
657 struct dpni_rule_cfg *rule,
658 enum net_prot prot, uint32_t field,
659 const void *key, const void *mask, int size)
661 int offset = dpaa2_flow_extract_key_offset(key_extract,
665 DPAA2_PMD_ERR("prot %d, field %d extract failed",
670 memcpy((void *)(size_t)(rule->key_iova + offset), key, size);
671 memcpy((void *)(size_t)(rule->mask_iova + offset), mask, size);
677 _dpaa2_flow_rule_move_ipaddr_tail(
678 struct dpaa2_key_extract *key_extract,
679 struct dpni_rule_cfg *rule, int src_offset,
680 uint32_t field, bool ipv4)
688 char tmp[NH_FLD_IPV6_ADDR_SIZE];
690 if (field != NH_FLD_IP_SRC &&
691 field != NH_FLD_IP_DST) {
692 DPAA2_PMD_ERR("Field of IP addr reorder must be IP SRC/DST");
696 prot = NET_PROT_IPV4;
698 prot = NET_PROT_IPV6;
699 dst_offset = dpaa2_flow_extract_key_offset(key_extract,
701 if (dst_offset < 0) {
702 DPAA2_PMD_ERR("Field %d reorder extract failed", field);
705 key_src = rule->key_iova + src_offset;
706 mask_src = rule->mask_iova + src_offset;
707 key_dst = rule->key_iova + dst_offset;
708 mask_dst = rule->mask_iova + dst_offset;
710 len = sizeof(rte_be32_t);
712 len = NH_FLD_IPV6_ADDR_SIZE;
714 memcpy(tmp, (char *)key_src, len);
715 memset((char *)key_src, 0, len);
716 memcpy((char *)key_dst, tmp, len);
718 memcpy(tmp, (char *)mask_src, len);
719 memset((char *)mask_src, 0, len);
720 memcpy((char *)mask_dst, tmp, len);
726 dpaa2_flow_rule_move_ipaddr_tail(
727 struct rte_flow *flow, struct dpaa2_dev_priv *priv,
733 if (flow->ipaddr_rule.ipaddr_type == FLOW_NONE_IPADDR)
736 if (flow->ipaddr_rule.ipaddr_type == FLOW_IPV4_ADDR)
737 prot = NET_PROT_IPV4;
739 prot = NET_PROT_IPV6;
741 if (flow->ipaddr_rule.qos_ipsrc_offset >= 0) {
742 ret = _dpaa2_flow_rule_move_ipaddr_tail(
743 &priv->extract.qos_key_extract,
745 flow->ipaddr_rule.qos_ipsrc_offset,
746 NH_FLD_IP_SRC, prot == NET_PROT_IPV4);
748 DPAA2_PMD_ERR("QoS src address reorder failed");
751 flow->ipaddr_rule.qos_ipsrc_offset =
752 dpaa2_flow_extract_key_offset(
753 &priv->extract.qos_key_extract,
754 prot, NH_FLD_IP_SRC);
757 if (flow->ipaddr_rule.qos_ipdst_offset >= 0) {
758 ret = _dpaa2_flow_rule_move_ipaddr_tail(
759 &priv->extract.qos_key_extract,
761 flow->ipaddr_rule.qos_ipdst_offset,
762 NH_FLD_IP_DST, prot == NET_PROT_IPV4);
764 DPAA2_PMD_ERR("QoS dst address reorder failed");
767 flow->ipaddr_rule.qos_ipdst_offset =
768 dpaa2_flow_extract_key_offset(
769 &priv->extract.qos_key_extract,
770 prot, NH_FLD_IP_DST);
773 if (flow->ipaddr_rule.fs_ipsrc_offset >= 0) {
774 ret = _dpaa2_flow_rule_move_ipaddr_tail(
775 &priv->extract.tc_key_extract[fs_group],
777 flow->ipaddr_rule.fs_ipsrc_offset,
778 NH_FLD_IP_SRC, prot == NET_PROT_IPV4);
780 DPAA2_PMD_ERR("FS src address reorder failed");
783 flow->ipaddr_rule.fs_ipsrc_offset =
784 dpaa2_flow_extract_key_offset(
785 &priv->extract.tc_key_extract[fs_group],
786 prot, NH_FLD_IP_SRC);
788 if (flow->ipaddr_rule.fs_ipdst_offset >= 0) {
789 ret = _dpaa2_flow_rule_move_ipaddr_tail(
790 &priv->extract.tc_key_extract[fs_group],
792 flow->ipaddr_rule.fs_ipdst_offset,
793 NH_FLD_IP_DST, prot == NET_PROT_IPV4);
795 DPAA2_PMD_ERR("FS dst address reorder failed");
798 flow->ipaddr_rule.fs_ipdst_offset =
799 dpaa2_flow_extract_key_offset(
800 &priv->extract.tc_key_extract[fs_group],
801 prot, NH_FLD_IP_DST);
808 dpaa2_flow_extract_support(
809 const uint8_t *mask_src,
810 enum rte_flow_item_type type)
814 const char *mask_support = 0;
817 case RTE_FLOW_ITEM_TYPE_ETH:
818 mask_support = (const char *)&dpaa2_flow_item_eth_mask;
819 size = sizeof(struct rte_flow_item_eth);
821 case RTE_FLOW_ITEM_TYPE_VLAN:
822 mask_support = (const char *)&dpaa2_flow_item_vlan_mask;
823 size = sizeof(struct rte_flow_item_vlan);
825 case RTE_FLOW_ITEM_TYPE_IPV4:
826 mask_support = (const char *)&dpaa2_flow_item_ipv4_mask;
827 size = sizeof(struct rte_flow_item_ipv4);
829 case RTE_FLOW_ITEM_TYPE_IPV6:
830 mask_support = (const char *)&dpaa2_flow_item_ipv6_mask;
831 size = sizeof(struct rte_flow_item_ipv6);
833 case RTE_FLOW_ITEM_TYPE_ICMP:
834 mask_support = (const char *)&dpaa2_flow_item_icmp_mask;
835 size = sizeof(struct rte_flow_item_icmp);
837 case RTE_FLOW_ITEM_TYPE_UDP:
838 mask_support = (const char *)&dpaa2_flow_item_udp_mask;
839 size = sizeof(struct rte_flow_item_udp);
841 case RTE_FLOW_ITEM_TYPE_TCP:
842 mask_support = (const char *)&dpaa2_flow_item_tcp_mask;
843 size = sizeof(struct rte_flow_item_tcp);
845 case RTE_FLOW_ITEM_TYPE_SCTP:
846 mask_support = (const char *)&dpaa2_flow_item_sctp_mask;
847 size = sizeof(struct rte_flow_item_sctp);
849 case RTE_FLOW_ITEM_TYPE_GRE:
850 mask_support = (const char *)&dpaa2_flow_item_gre_mask;
851 size = sizeof(struct rte_flow_item_gre);
857 memcpy(mask, mask_support, size);
859 for (i = 0; i < size; i++)
860 mask[i] = (mask[i] | mask_src[i]);
862 if (memcmp(mask, mask_support, size))
869 dpaa2_configure_flow_eth(struct rte_flow *flow,
870 struct rte_eth_dev *dev,
871 const struct rte_flow_attr *attr,
872 const struct rte_flow_item *pattern,
873 const struct rte_flow_action actions[] __rte_unused,
874 struct rte_flow_error *error __rte_unused,
875 int *device_configured)
880 const struct rte_flow_item_eth *spec, *mask;
882 /* TODO: Currently upper bound of range parameter is not implemented */
883 const struct rte_flow_item_eth *last __rte_unused;
884 struct dpaa2_dev_priv *priv = dev->data->dev_private;
885 const char zero_cmp[RTE_ETHER_ADDR_LEN] = {0};
889 /* Parse pattern list to get the matching parameters */
890 spec = (const struct rte_flow_item_eth *)pattern->spec;
891 last = (const struct rte_flow_item_eth *)pattern->last;
892 mask = (const struct rte_flow_item_eth *)
893 (pattern->mask ? pattern->mask : &dpaa2_flow_item_eth_mask);
895 /* Don't care any field of eth header,
896 * only care eth protocol.
898 DPAA2_PMD_WARN("No pattern spec for Eth flow, just skip");
902 /* Get traffic class index and flow id to be configured */
904 flow->tc_index = attr->priority;
906 if (dpaa2_flow_extract_support((const uint8_t *)mask,
907 RTE_FLOW_ITEM_TYPE_ETH)) {
908 DPAA2_PMD_WARN("Extract field(s) of ethernet not support.");
913 if (memcmp((const char *)&mask->src, zero_cmp, RTE_ETHER_ADDR_LEN)) {
914 index = dpaa2_flow_extract_search(
915 &priv->extract.qos_key_extract.dpkg,
916 NET_PROT_ETH, NH_FLD_ETH_SA);
918 ret = dpaa2_flow_extract_add(
919 &priv->extract.qos_key_extract,
920 NET_PROT_ETH, NH_FLD_ETH_SA,
923 DPAA2_PMD_ERR("QoS Extract add ETH_SA failed.");
927 local_cfg |= DPAA2_QOS_TABLE_RECONFIGURE;
929 index = dpaa2_flow_extract_search(
930 &priv->extract.tc_key_extract[group].dpkg,
931 NET_PROT_ETH, NH_FLD_ETH_SA);
933 ret = dpaa2_flow_extract_add(
934 &priv->extract.tc_key_extract[group],
935 NET_PROT_ETH, NH_FLD_ETH_SA,
938 DPAA2_PMD_ERR("FS Extract add ETH_SA failed.");
941 local_cfg |= DPAA2_FS_TABLE_RECONFIGURE;
944 ret = dpaa2_flow_rule_move_ipaddr_tail(flow, priv, group);
947 "Move ipaddr before ETH_SA rule set failed");
951 ret = dpaa2_flow_rule_data_set(
952 &priv->extract.qos_key_extract,
956 &spec->src.addr_bytes,
957 &mask->src.addr_bytes,
958 sizeof(struct rte_ether_addr));
960 DPAA2_PMD_ERR("QoS NH_FLD_ETH_SA rule data set failed");
964 ret = dpaa2_flow_rule_data_set(
965 &priv->extract.tc_key_extract[group],
969 &spec->src.addr_bytes,
970 &mask->src.addr_bytes,
971 sizeof(struct rte_ether_addr));
973 DPAA2_PMD_ERR("FS NH_FLD_ETH_SA rule data set failed");
978 if (memcmp((const char *)&mask->dst, zero_cmp, RTE_ETHER_ADDR_LEN)) {
979 index = dpaa2_flow_extract_search(
980 &priv->extract.qos_key_extract.dpkg,
981 NET_PROT_ETH, NH_FLD_ETH_DA);
983 ret = dpaa2_flow_extract_add(
984 &priv->extract.qos_key_extract,
985 NET_PROT_ETH, NH_FLD_ETH_DA,
988 DPAA2_PMD_ERR("QoS Extract add ETH_DA failed.");
992 local_cfg |= DPAA2_QOS_TABLE_RECONFIGURE;
995 index = dpaa2_flow_extract_search(
996 &priv->extract.tc_key_extract[group].dpkg,
997 NET_PROT_ETH, NH_FLD_ETH_DA);
999 ret = dpaa2_flow_extract_add(
1000 &priv->extract.tc_key_extract[group],
1001 NET_PROT_ETH, NH_FLD_ETH_DA,
1002 RTE_ETHER_ADDR_LEN);
1004 DPAA2_PMD_ERR("FS Extract add ETH_DA failed.");
1008 local_cfg |= DPAA2_FS_TABLE_RECONFIGURE;
1011 ret = dpaa2_flow_rule_move_ipaddr_tail(flow, priv, group);
1014 "Move ipaddr before ETH DA rule set failed");
1018 ret = dpaa2_flow_rule_data_set(
1019 &priv->extract.qos_key_extract,
1023 &spec->dst.addr_bytes,
1024 &mask->dst.addr_bytes,
1025 sizeof(struct rte_ether_addr));
1027 DPAA2_PMD_ERR("QoS NH_FLD_ETH_DA rule data set failed");
1031 ret = dpaa2_flow_rule_data_set(
1032 &priv->extract.tc_key_extract[group],
1036 &spec->dst.addr_bytes,
1037 &mask->dst.addr_bytes,
1038 sizeof(struct rte_ether_addr));
1040 DPAA2_PMD_ERR("FS NH_FLD_ETH_DA rule data set failed");
1045 if (memcmp((const char *)&mask->type, zero_cmp, sizeof(rte_be16_t))) {
1046 index = dpaa2_flow_extract_search(
1047 &priv->extract.qos_key_extract.dpkg,
1048 NET_PROT_ETH, NH_FLD_ETH_TYPE);
1050 ret = dpaa2_flow_extract_add(
1051 &priv->extract.qos_key_extract,
1052 NET_PROT_ETH, NH_FLD_ETH_TYPE,
1053 RTE_ETHER_TYPE_LEN);
1055 DPAA2_PMD_ERR("QoS Extract add ETH_TYPE failed.");
1059 local_cfg |= DPAA2_QOS_TABLE_RECONFIGURE;
1061 index = dpaa2_flow_extract_search(
1062 &priv->extract.tc_key_extract[group].dpkg,
1063 NET_PROT_ETH, NH_FLD_ETH_TYPE);
1065 ret = dpaa2_flow_extract_add(
1066 &priv->extract.tc_key_extract[group],
1067 NET_PROT_ETH, NH_FLD_ETH_TYPE,
1068 RTE_ETHER_TYPE_LEN);
1070 DPAA2_PMD_ERR("FS Extract add ETH_TYPE failed.");
1074 local_cfg |= DPAA2_FS_TABLE_RECONFIGURE;
1077 ret = dpaa2_flow_rule_move_ipaddr_tail(flow, priv, group);
1080 "Move ipaddr before ETH TYPE rule set failed");
1084 ret = dpaa2_flow_rule_data_set(
1085 &priv->extract.qos_key_extract,
1091 sizeof(rte_be16_t));
1093 DPAA2_PMD_ERR("QoS NH_FLD_ETH_TYPE rule data set failed");
1097 ret = dpaa2_flow_rule_data_set(
1098 &priv->extract.tc_key_extract[group],
1104 sizeof(rte_be16_t));
1106 DPAA2_PMD_ERR("FS NH_FLD_ETH_TYPE rule data set failed");
1111 (*device_configured) |= local_cfg;
1117 dpaa2_configure_flow_vlan(struct rte_flow *flow,
1118 struct rte_eth_dev *dev,
1119 const struct rte_flow_attr *attr,
1120 const struct rte_flow_item *pattern,
1121 const struct rte_flow_action actions[] __rte_unused,
1122 struct rte_flow_error *error __rte_unused,
1123 int *device_configured)
1128 const struct rte_flow_item_vlan *spec, *mask;
1130 const struct rte_flow_item_vlan *last __rte_unused;
1131 struct dpaa2_dev_priv *priv = dev->data->dev_private;
1133 group = attr->group;
1135 /* Parse pattern list to get the matching parameters */
1136 spec = (const struct rte_flow_item_vlan *)pattern->spec;
1137 last = (const struct rte_flow_item_vlan *)pattern->last;
1138 mask = (const struct rte_flow_item_vlan *)
1139 (pattern->mask ? pattern->mask : &dpaa2_flow_item_vlan_mask);
1141 /* Get traffic class index and flow id to be configured */
1142 flow->tc_id = group;
1143 flow->tc_index = attr->priority;
1146 /* Don't care any field of vlan header,
1147 * only care vlan protocol.
1149 /* Eth type is actually used for vLan classification.
1151 struct proto_discrimination proto;
1153 index = dpaa2_flow_extract_search(
1154 &priv->extract.qos_key_extract.dpkg,
1155 NET_PROT_ETH, NH_FLD_ETH_TYPE);
1157 ret = dpaa2_flow_proto_discrimination_extract(
1158 &priv->extract.qos_key_extract,
1159 RTE_FLOW_ITEM_TYPE_ETH);
1162 "QoS Ext ETH_TYPE to discriminate vLan failed");
1166 local_cfg |= DPAA2_QOS_TABLE_RECONFIGURE;
1169 index = dpaa2_flow_extract_search(
1170 &priv->extract.tc_key_extract[group].dpkg,
1171 NET_PROT_ETH, NH_FLD_ETH_TYPE);
1173 ret = dpaa2_flow_proto_discrimination_extract(
1174 &priv->extract.tc_key_extract[group],
1175 RTE_FLOW_ITEM_TYPE_ETH);
1178 "FS Ext ETH_TYPE to discriminate vLan failed.");
1182 local_cfg |= DPAA2_FS_TABLE_RECONFIGURE;
1185 ret = dpaa2_flow_rule_move_ipaddr_tail(flow, priv, group);
1188 "Move ipaddr before vLan discrimination set failed");
1192 proto.type = RTE_FLOW_ITEM_TYPE_ETH;
1193 proto.eth_type = rte_cpu_to_be_16(RTE_ETHER_TYPE_VLAN);
1194 ret = dpaa2_flow_proto_discrimination_rule(priv, flow,
1197 DPAA2_PMD_ERR("vLan discrimination rule set failed");
1201 (*device_configured) |= local_cfg;
1206 if (dpaa2_flow_extract_support((const uint8_t *)mask,
1207 RTE_FLOW_ITEM_TYPE_VLAN)) {
1208 DPAA2_PMD_WARN("Extract field(s) of vlan not support.");
1216 index = dpaa2_flow_extract_search(
1217 &priv->extract.qos_key_extract.dpkg,
1218 NET_PROT_VLAN, NH_FLD_VLAN_TCI);
1220 ret = dpaa2_flow_extract_add(
1221 &priv->extract.qos_key_extract,
1224 sizeof(rte_be16_t));
1226 DPAA2_PMD_ERR("QoS Extract add VLAN_TCI failed.");
1230 local_cfg |= DPAA2_QOS_TABLE_RECONFIGURE;
1233 index = dpaa2_flow_extract_search(
1234 &priv->extract.tc_key_extract[group].dpkg,
1235 NET_PROT_VLAN, NH_FLD_VLAN_TCI);
1237 ret = dpaa2_flow_extract_add(
1238 &priv->extract.tc_key_extract[group],
1241 sizeof(rte_be16_t));
1243 DPAA2_PMD_ERR("FS Extract add VLAN_TCI failed.");
1247 local_cfg |= DPAA2_FS_TABLE_RECONFIGURE;
1250 ret = dpaa2_flow_rule_move_ipaddr_tail(flow, priv, group);
1253 "Move ipaddr before VLAN TCI rule set failed");
1257 ret = dpaa2_flow_rule_data_set(&priv->extract.qos_key_extract,
1263 sizeof(rte_be16_t));
1265 DPAA2_PMD_ERR("QoS NH_FLD_VLAN_TCI rule data set failed");
1269 ret = dpaa2_flow_rule_data_set(
1270 &priv->extract.tc_key_extract[group],
1276 sizeof(rte_be16_t));
1278 DPAA2_PMD_ERR("FS NH_FLD_VLAN_TCI rule data set failed");
1282 (*device_configured) |= local_cfg;
1288 dpaa2_configure_flow_generic_ip(
1289 struct rte_flow *flow,
1290 struct rte_eth_dev *dev,
1291 const struct rte_flow_attr *attr,
1292 const struct rte_flow_item *pattern,
1293 const struct rte_flow_action actions[] __rte_unused,
1294 struct rte_flow_error *error __rte_unused,
1295 int *device_configured)
1300 const struct rte_flow_item_ipv4 *spec_ipv4 = 0,
1302 const struct rte_flow_item_ipv6 *spec_ipv6 = 0,
1304 const void *key, *mask;
1307 struct dpaa2_dev_priv *priv = dev->data->dev_private;
1308 const char zero_cmp[NH_FLD_IPV6_ADDR_SIZE] = {0};
1311 group = attr->group;
1313 /* Parse pattern list to get the matching parameters */
1314 if (pattern->type == RTE_FLOW_ITEM_TYPE_IPV4) {
1315 spec_ipv4 = (const struct rte_flow_item_ipv4 *)pattern->spec;
1316 mask_ipv4 = (const struct rte_flow_item_ipv4 *)
1317 (pattern->mask ? pattern->mask :
1318 &dpaa2_flow_item_ipv4_mask);
1320 spec_ipv6 = (const struct rte_flow_item_ipv6 *)pattern->spec;
1321 mask_ipv6 = (const struct rte_flow_item_ipv6 *)
1322 (pattern->mask ? pattern->mask :
1323 &dpaa2_flow_item_ipv6_mask);
1326 /* Get traffic class index and flow id to be configured */
1327 flow->tc_id = group;
1328 flow->tc_index = attr->priority;
1330 if (!spec_ipv4 && !spec_ipv6) {
1331 /* Don't care any field of IP header,
1332 * only care IP protocol.
1333 * Example: flow create 0 ingress pattern ipv6 /
1335 /* Eth type is actually used for IP identification.
1337 /* TODO: Current design only supports Eth + IP,
1338 * Eth + vLan + IP needs to add.
1340 struct proto_discrimination proto;
1342 index = dpaa2_flow_extract_search(
1343 &priv->extract.qos_key_extract.dpkg,
1344 NET_PROT_ETH, NH_FLD_ETH_TYPE);
1346 ret = dpaa2_flow_proto_discrimination_extract(
1347 &priv->extract.qos_key_extract,
1348 RTE_FLOW_ITEM_TYPE_ETH);
1351 "QoS Ext ETH_TYPE to discriminate IP failed.");
1355 local_cfg |= DPAA2_QOS_TABLE_RECONFIGURE;
1358 index = dpaa2_flow_extract_search(
1359 &priv->extract.tc_key_extract[group].dpkg,
1360 NET_PROT_ETH, NH_FLD_ETH_TYPE);
1362 ret = dpaa2_flow_proto_discrimination_extract(
1363 &priv->extract.tc_key_extract[group],
1364 RTE_FLOW_ITEM_TYPE_ETH);
1367 "FS Ext ETH_TYPE to discriminate IP failed");
1371 local_cfg |= DPAA2_FS_TABLE_RECONFIGURE;
1374 ret = dpaa2_flow_rule_move_ipaddr_tail(flow, priv, group);
1377 "Move ipaddr before IP discrimination set failed");
1381 proto.type = RTE_FLOW_ITEM_TYPE_ETH;
1382 if (pattern->type == RTE_FLOW_ITEM_TYPE_IPV4)
1383 proto.eth_type = rte_cpu_to_be_16(RTE_ETHER_TYPE_IPV4);
1385 proto.eth_type = rte_cpu_to_be_16(RTE_ETHER_TYPE_IPV6);
1386 ret = dpaa2_flow_proto_discrimination_rule(priv, flow,
1389 DPAA2_PMD_ERR("IP discrimination rule set failed");
1393 (*device_configured) |= local_cfg;
1399 if (dpaa2_flow_extract_support((const uint8_t *)mask_ipv4,
1400 RTE_FLOW_ITEM_TYPE_IPV4)) {
1401 DPAA2_PMD_WARN("Extract field(s) of IPv4 not support.");
1408 if (dpaa2_flow_extract_support((const uint8_t *)mask_ipv6,
1409 RTE_FLOW_ITEM_TYPE_IPV6)) {
1410 DPAA2_PMD_WARN("Extract field(s) of IPv6 not support.");
1416 if (mask_ipv4 && (mask_ipv4->hdr.src_addr ||
1417 mask_ipv4->hdr.dst_addr)) {
1418 flow->ipaddr_rule.ipaddr_type = FLOW_IPV4_ADDR;
1419 } else if (mask_ipv6 &&
1420 (memcmp((const char *)mask_ipv6->hdr.src_addr,
1421 zero_cmp, NH_FLD_IPV6_ADDR_SIZE) ||
1422 memcmp((const char *)mask_ipv6->hdr.dst_addr,
1423 zero_cmp, NH_FLD_IPV6_ADDR_SIZE))) {
1424 flow->ipaddr_rule.ipaddr_type = FLOW_IPV6_ADDR;
1427 if ((mask_ipv4 && mask_ipv4->hdr.src_addr) ||
1429 memcmp((const char *)mask_ipv6->hdr.src_addr,
1430 zero_cmp, NH_FLD_IPV6_ADDR_SIZE))) {
1431 index = dpaa2_flow_extract_search(
1432 &priv->extract.qos_key_extract.dpkg,
1433 NET_PROT_IP, NH_FLD_IP_SRC);
1435 ret = dpaa2_flow_extract_add(
1436 &priv->extract.qos_key_extract,
1441 DPAA2_PMD_ERR("QoS Extract add IP_SRC failed.");
1445 local_cfg |= DPAA2_QOS_TABLE_RECONFIGURE;
1448 index = dpaa2_flow_extract_search(
1449 &priv->extract.tc_key_extract[group].dpkg,
1450 NET_PROT_IP, NH_FLD_IP_SRC);
1452 ret = dpaa2_flow_extract_add(
1453 &priv->extract.tc_key_extract[group],
1458 DPAA2_PMD_ERR("FS Extract add IP_SRC failed.");
1462 local_cfg |= DPAA2_FS_TABLE_RECONFIGURE;
1466 key = &spec_ipv4->hdr.src_addr;
1468 key = &spec_ipv6->hdr.src_addr[0];
1470 mask = &mask_ipv4->hdr.src_addr;
1471 size = NH_FLD_IPV4_ADDR_SIZE;
1472 prot = NET_PROT_IPV4;
1474 mask = &mask_ipv6->hdr.src_addr[0];
1475 size = NH_FLD_IPV6_ADDR_SIZE;
1476 prot = NET_PROT_IPV6;
1479 ret = dpaa2_flow_rule_data_set(
1480 &priv->extract.qos_key_extract,
1482 prot, NH_FLD_IP_SRC,
1485 DPAA2_PMD_ERR("QoS NH_FLD_IP_SRC rule data set failed");
1489 ret = dpaa2_flow_rule_data_set(
1490 &priv->extract.tc_key_extract[group],
1492 prot, NH_FLD_IP_SRC,
1495 DPAA2_PMD_ERR("FS NH_FLD_IP_SRC rule data set failed");
1499 flow->ipaddr_rule.qos_ipsrc_offset =
1500 dpaa2_flow_extract_key_offset(
1501 &priv->extract.qos_key_extract,
1502 prot, NH_FLD_IP_SRC);
1503 flow->ipaddr_rule.fs_ipsrc_offset =
1504 dpaa2_flow_extract_key_offset(
1505 &priv->extract.tc_key_extract[group],
1506 prot, NH_FLD_IP_SRC);
1509 if ((mask_ipv4 && mask_ipv4->hdr.dst_addr) ||
1511 memcmp((const char *)mask_ipv6->hdr.dst_addr,
1512 zero_cmp, NH_FLD_IPV6_ADDR_SIZE))) {
1513 index = dpaa2_flow_extract_search(
1514 &priv->extract.qos_key_extract.dpkg,
1515 NET_PROT_IP, NH_FLD_IP_DST);
1518 size = NH_FLD_IPV4_ADDR_SIZE;
1520 size = NH_FLD_IPV6_ADDR_SIZE;
1521 ret = dpaa2_flow_extract_add(
1522 &priv->extract.qos_key_extract,
1527 DPAA2_PMD_ERR("QoS Extract add IP_DST failed.");
1531 local_cfg |= DPAA2_QOS_TABLE_RECONFIGURE;
1534 index = dpaa2_flow_extract_search(
1535 &priv->extract.tc_key_extract[group].dpkg,
1536 NET_PROT_IP, NH_FLD_IP_DST);
1539 size = NH_FLD_IPV4_ADDR_SIZE;
1541 size = NH_FLD_IPV6_ADDR_SIZE;
1542 ret = dpaa2_flow_extract_add(
1543 &priv->extract.tc_key_extract[group],
1548 DPAA2_PMD_ERR("FS Extract add IP_DST failed.");
1552 local_cfg |= DPAA2_FS_TABLE_RECONFIGURE;
1556 key = &spec_ipv4->hdr.dst_addr;
1558 key = spec_ipv6->hdr.dst_addr;
1560 mask = &mask_ipv4->hdr.dst_addr;
1561 size = NH_FLD_IPV4_ADDR_SIZE;
1562 prot = NET_PROT_IPV4;
1564 mask = &mask_ipv6->hdr.dst_addr[0];
1565 size = NH_FLD_IPV6_ADDR_SIZE;
1566 prot = NET_PROT_IPV6;
1569 ret = dpaa2_flow_rule_data_set(
1570 &priv->extract.qos_key_extract,
1572 prot, NH_FLD_IP_DST,
1575 DPAA2_PMD_ERR("QoS NH_FLD_IP_DST rule data set failed");
1579 ret = dpaa2_flow_rule_data_set(
1580 &priv->extract.tc_key_extract[group],
1582 prot, NH_FLD_IP_DST,
1585 DPAA2_PMD_ERR("FS NH_FLD_IP_DST rule data set failed");
1588 flow->ipaddr_rule.qos_ipdst_offset =
1589 dpaa2_flow_extract_key_offset(
1590 &priv->extract.qos_key_extract,
1591 prot, NH_FLD_IP_DST);
1592 flow->ipaddr_rule.fs_ipdst_offset =
1593 dpaa2_flow_extract_key_offset(
1594 &priv->extract.tc_key_extract[group],
1595 prot, NH_FLD_IP_DST);
1598 if ((mask_ipv4 && mask_ipv4->hdr.next_proto_id) ||
1599 (mask_ipv6 && mask_ipv6->hdr.proto)) {
1600 index = dpaa2_flow_extract_search(
1601 &priv->extract.qos_key_extract.dpkg,
1602 NET_PROT_IP, NH_FLD_IP_PROTO);
1604 ret = dpaa2_flow_extract_add(
1605 &priv->extract.qos_key_extract,
1608 NH_FLD_IP_PROTO_SIZE);
1610 DPAA2_PMD_ERR("QoS Extract add IP_DST failed.");
1614 local_cfg |= DPAA2_QOS_TABLE_RECONFIGURE;
1617 index = dpaa2_flow_extract_search(
1618 &priv->extract.tc_key_extract[group].dpkg,
1619 NET_PROT_IP, NH_FLD_IP_PROTO);
1621 ret = dpaa2_flow_extract_add(
1622 &priv->extract.tc_key_extract[group],
1625 NH_FLD_IP_PROTO_SIZE);
1627 DPAA2_PMD_ERR("FS Extract add IP_DST failed.");
1631 local_cfg |= DPAA2_FS_TABLE_RECONFIGURE;
1634 ret = dpaa2_flow_rule_move_ipaddr_tail(flow, priv, group);
1637 "Move ipaddr after NH_FLD_IP_PROTO rule set failed");
1642 key = &spec_ipv4->hdr.next_proto_id;
1644 key = &spec_ipv6->hdr.proto;
1646 mask = &mask_ipv4->hdr.next_proto_id;
1648 mask = &mask_ipv6->hdr.proto;
1650 ret = dpaa2_flow_rule_data_set(
1651 &priv->extract.qos_key_extract,
1655 key, mask, NH_FLD_IP_PROTO_SIZE);
1657 DPAA2_PMD_ERR("QoS NH_FLD_IP_PROTO rule data set failed");
1661 ret = dpaa2_flow_rule_data_set(
1662 &priv->extract.tc_key_extract[group],
1666 key, mask, NH_FLD_IP_PROTO_SIZE);
1668 DPAA2_PMD_ERR("FS NH_FLD_IP_PROTO rule data set failed");
1673 (*device_configured) |= local_cfg;
1679 dpaa2_configure_flow_icmp(struct rte_flow *flow,
1680 struct rte_eth_dev *dev,
1681 const struct rte_flow_attr *attr,
1682 const struct rte_flow_item *pattern,
1683 const struct rte_flow_action actions[] __rte_unused,
1684 struct rte_flow_error *error __rte_unused,
1685 int *device_configured)
1690 const struct rte_flow_item_icmp *spec, *mask;
1692 const struct rte_flow_item_icmp *last __rte_unused;
1693 struct dpaa2_dev_priv *priv = dev->data->dev_private;
1695 group = attr->group;
1697 /* Parse pattern list to get the matching parameters */
1698 spec = (const struct rte_flow_item_icmp *)pattern->spec;
1699 last = (const struct rte_flow_item_icmp *)pattern->last;
1700 mask = (const struct rte_flow_item_icmp *)
1701 (pattern->mask ? pattern->mask : &dpaa2_flow_item_icmp_mask);
1703 /* Get traffic class index and flow id to be configured */
1704 flow->tc_id = group;
1705 flow->tc_index = attr->priority;
1708 /* Don't care any field of ICMP header,
1709 * only care ICMP protocol.
1710 * Example: flow create 0 ingress pattern icmp /
1712 /* Next proto of Generical IP is actually used
1713 * for ICMP identification.
1715 struct proto_discrimination proto;
1717 index = dpaa2_flow_extract_search(
1718 &priv->extract.qos_key_extract.dpkg,
1719 NET_PROT_IP, NH_FLD_IP_PROTO);
1721 ret = dpaa2_flow_proto_discrimination_extract(
1722 &priv->extract.qos_key_extract,
1723 DPAA2_FLOW_ITEM_TYPE_GENERIC_IP);
1726 "QoS Extract IP protocol to discriminate ICMP failed.");
1730 local_cfg |= DPAA2_QOS_TABLE_RECONFIGURE;
1733 index = dpaa2_flow_extract_search(
1734 &priv->extract.tc_key_extract[group].dpkg,
1735 NET_PROT_IP, NH_FLD_IP_PROTO);
1737 ret = dpaa2_flow_proto_discrimination_extract(
1738 &priv->extract.tc_key_extract[group],
1739 DPAA2_FLOW_ITEM_TYPE_GENERIC_IP);
1742 "FS Extract IP protocol to discriminate ICMP failed.");
1746 local_cfg |= DPAA2_FS_TABLE_RECONFIGURE;
1749 ret = dpaa2_flow_rule_move_ipaddr_tail(flow, priv, group);
1752 "Move IP addr before ICMP discrimination set failed");
1756 proto.type = DPAA2_FLOW_ITEM_TYPE_GENERIC_IP;
1757 proto.ip_proto = IPPROTO_ICMP;
1758 ret = dpaa2_flow_proto_discrimination_rule(priv, flow,
1761 DPAA2_PMD_ERR("ICMP discrimination rule set failed");
1765 (*device_configured) |= local_cfg;
1770 if (dpaa2_flow_extract_support((const uint8_t *)mask,
1771 RTE_FLOW_ITEM_TYPE_ICMP)) {
1772 DPAA2_PMD_WARN("Extract field(s) of ICMP not support.");
1777 if (mask->hdr.icmp_type) {
1778 index = dpaa2_flow_extract_search(
1779 &priv->extract.qos_key_extract.dpkg,
1780 NET_PROT_ICMP, NH_FLD_ICMP_TYPE);
1782 ret = dpaa2_flow_extract_add(
1783 &priv->extract.qos_key_extract,
1786 NH_FLD_ICMP_TYPE_SIZE);
1788 DPAA2_PMD_ERR("QoS Extract add ICMP_TYPE failed.");
1792 local_cfg |= DPAA2_QOS_TABLE_RECONFIGURE;
1795 index = dpaa2_flow_extract_search(
1796 &priv->extract.tc_key_extract[group].dpkg,
1797 NET_PROT_ICMP, NH_FLD_ICMP_TYPE);
1799 ret = dpaa2_flow_extract_add(
1800 &priv->extract.tc_key_extract[group],
1803 NH_FLD_ICMP_TYPE_SIZE);
1805 DPAA2_PMD_ERR("FS Extract add ICMP_TYPE failed.");
1809 local_cfg |= DPAA2_FS_TABLE_RECONFIGURE;
1812 ret = dpaa2_flow_rule_move_ipaddr_tail(flow, priv, group);
1815 "Move ipaddr before ICMP TYPE set failed");
1819 ret = dpaa2_flow_rule_data_set(
1820 &priv->extract.qos_key_extract,
1824 &spec->hdr.icmp_type,
1825 &mask->hdr.icmp_type,
1826 NH_FLD_ICMP_TYPE_SIZE);
1828 DPAA2_PMD_ERR("QoS NH_FLD_ICMP_TYPE rule data set failed");
1832 ret = dpaa2_flow_rule_data_set(
1833 &priv->extract.tc_key_extract[group],
1837 &spec->hdr.icmp_type,
1838 &mask->hdr.icmp_type,
1839 NH_FLD_ICMP_TYPE_SIZE);
1841 DPAA2_PMD_ERR("FS NH_FLD_ICMP_TYPE rule data set failed");
1846 if (mask->hdr.icmp_code) {
1847 index = dpaa2_flow_extract_search(
1848 &priv->extract.qos_key_extract.dpkg,
1849 NET_PROT_ICMP, NH_FLD_ICMP_CODE);
1851 ret = dpaa2_flow_extract_add(
1852 &priv->extract.qos_key_extract,
1855 NH_FLD_ICMP_CODE_SIZE);
1857 DPAA2_PMD_ERR("QoS Extract add ICMP_CODE failed.");
1861 local_cfg |= DPAA2_QOS_TABLE_RECONFIGURE;
1864 index = dpaa2_flow_extract_search(
1865 &priv->extract.tc_key_extract[group].dpkg,
1866 NET_PROT_ICMP, NH_FLD_ICMP_CODE);
1868 ret = dpaa2_flow_extract_add(
1869 &priv->extract.tc_key_extract[group],
1872 NH_FLD_ICMP_CODE_SIZE);
1874 DPAA2_PMD_ERR("FS Extract add ICMP_CODE failed.");
1878 local_cfg |= DPAA2_FS_TABLE_RECONFIGURE;
1881 ret = dpaa2_flow_rule_move_ipaddr_tail(flow, priv, group);
1884 "Move ipaddr after ICMP CODE set failed");
1888 ret = dpaa2_flow_rule_data_set(
1889 &priv->extract.qos_key_extract,
1893 &spec->hdr.icmp_code,
1894 &mask->hdr.icmp_code,
1895 NH_FLD_ICMP_CODE_SIZE);
1897 DPAA2_PMD_ERR("QoS NH_FLD_ICMP_CODE rule data set failed");
1901 ret = dpaa2_flow_rule_data_set(
1902 &priv->extract.tc_key_extract[group],
1906 &spec->hdr.icmp_code,
1907 &mask->hdr.icmp_code,
1908 NH_FLD_ICMP_CODE_SIZE);
1910 DPAA2_PMD_ERR("FS NH_FLD_ICMP_CODE rule data set failed");
1915 (*device_configured) |= local_cfg;
1921 dpaa2_configure_flow_udp(struct rte_flow *flow,
1922 struct rte_eth_dev *dev,
1923 const struct rte_flow_attr *attr,
1924 const struct rte_flow_item *pattern,
1925 const struct rte_flow_action actions[] __rte_unused,
1926 struct rte_flow_error *error __rte_unused,
1927 int *device_configured)
1932 const struct rte_flow_item_udp *spec, *mask;
1934 const struct rte_flow_item_udp *last __rte_unused;
1935 struct dpaa2_dev_priv *priv = dev->data->dev_private;
1937 group = attr->group;
1939 /* Parse pattern list to get the matching parameters */
1940 spec = (const struct rte_flow_item_udp *)pattern->spec;
1941 last = (const struct rte_flow_item_udp *)pattern->last;
1942 mask = (const struct rte_flow_item_udp *)
1943 (pattern->mask ? pattern->mask : &dpaa2_flow_item_udp_mask);
1945 /* Get traffic class index and flow id to be configured */
1946 flow->tc_id = group;
1947 flow->tc_index = attr->priority;
1949 if (!spec || !mc_l4_port_identification) {
1950 struct proto_discrimination proto;
1952 index = dpaa2_flow_extract_search(
1953 &priv->extract.qos_key_extract.dpkg,
1954 NET_PROT_IP, NH_FLD_IP_PROTO);
1956 ret = dpaa2_flow_proto_discrimination_extract(
1957 &priv->extract.qos_key_extract,
1958 DPAA2_FLOW_ITEM_TYPE_GENERIC_IP);
1961 "QoS Extract IP protocol to discriminate UDP failed.");
1965 local_cfg |= DPAA2_QOS_TABLE_RECONFIGURE;
1968 index = dpaa2_flow_extract_search(
1969 &priv->extract.tc_key_extract[group].dpkg,
1970 NET_PROT_IP, NH_FLD_IP_PROTO);
1972 ret = dpaa2_flow_proto_discrimination_extract(
1973 &priv->extract.tc_key_extract[group],
1974 DPAA2_FLOW_ITEM_TYPE_GENERIC_IP);
1977 "FS Extract IP protocol to discriminate UDP failed.");
1981 local_cfg |= DPAA2_FS_TABLE_RECONFIGURE;
1984 ret = dpaa2_flow_rule_move_ipaddr_tail(flow, priv, group);
1987 "Move IP addr before UDP discrimination set failed");
1991 proto.type = DPAA2_FLOW_ITEM_TYPE_GENERIC_IP;
1992 proto.ip_proto = IPPROTO_UDP;
1993 ret = dpaa2_flow_proto_discrimination_rule(priv, flow,
1996 DPAA2_PMD_ERR("UDP discrimination rule set failed");
2000 (*device_configured) |= local_cfg;
2006 if (dpaa2_flow_extract_support((const uint8_t *)mask,
2007 RTE_FLOW_ITEM_TYPE_UDP)) {
2008 DPAA2_PMD_WARN("Extract field(s) of UDP not support.");
2013 if (mask->hdr.src_port) {
2014 index = dpaa2_flow_extract_search(
2015 &priv->extract.qos_key_extract.dpkg,
2016 NET_PROT_UDP, NH_FLD_UDP_PORT_SRC);
2018 ret = dpaa2_flow_extract_add(
2019 &priv->extract.qos_key_extract,
2021 NH_FLD_UDP_PORT_SRC,
2022 NH_FLD_UDP_PORT_SIZE);
2024 DPAA2_PMD_ERR("QoS Extract add UDP_SRC failed.");
2028 local_cfg |= DPAA2_QOS_TABLE_RECONFIGURE;
2031 index = dpaa2_flow_extract_search(
2032 &priv->extract.tc_key_extract[group].dpkg,
2033 NET_PROT_UDP, NH_FLD_UDP_PORT_SRC);
2035 ret = dpaa2_flow_extract_add(
2036 &priv->extract.tc_key_extract[group],
2038 NH_FLD_UDP_PORT_SRC,
2039 NH_FLD_UDP_PORT_SIZE);
2041 DPAA2_PMD_ERR("FS Extract add UDP_SRC failed.");
2045 local_cfg |= DPAA2_FS_TABLE_RECONFIGURE;
2048 ret = dpaa2_flow_rule_move_ipaddr_tail(flow, priv, group);
2051 "Move ipaddr before UDP_PORT_SRC set failed");
2055 ret = dpaa2_flow_rule_data_set(&priv->extract.qos_key_extract,
2058 NH_FLD_UDP_PORT_SRC,
2059 &spec->hdr.src_port,
2060 &mask->hdr.src_port,
2061 NH_FLD_UDP_PORT_SIZE);
2064 "QoS NH_FLD_UDP_PORT_SRC rule data set failed");
2068 ret = dpaa2_flow_rule_data_set(
2069 &priv->extract.tc_key_extract[group],
2072 NH_FLD_UDP_PORT_SRC,
2073 &spec->hdr.src_port,
2074 &mask->hdr.src_port,
2075 NH_FLD_UDP_PORT_SIZE);
2078 "FS NH_FLD_UDP_PORT_SRC rule data set failed");
2083 if (mask->hdr.dst_port) {
2084 index = dpaa2_flow_extract_search(
2085 &priv->extract.qos_key_extract.dpkg,
2086 NET_PROT_UDP, NH_FLD_UDP_PORT_DST);
2088 ret = dpaa2_flow_extract_add(
2089 &priv->extract.qos_key_extract,
2091 NH_FLD_UDP_PORT_DST,
2092 NH_FLD_UDP_PORT_SIZE);
2094 DPAA2_PMD_ERR("QoS Extract add UDP_DST failed.");
2098 local_cfg |= DPAA2_QOS_TABLE_RECONFIGURE;
2101 index = dpaa2_flow_extract_search(
2102 &priv->extract.tc_key_extract[group].dpkg,
2103 NET_PROT_UDP, NH_FLD_UDP_PORT_DST);
2105 ret = dpaa2_flow_extract_add(
2106 &priv->extract.tc_key_extract[group],
2108 NH_FLD_UDP_PORT_DST,
2109 NH_FLD_UDP_PORT_SIZE);
2111 DPAA2_PMD_ERR("FS Extract add UDP_DST failed.");
2115 local_cfg |= DPAA2_FS_TABLE_RECONFIGURE;
2118 ret = dpaa2_flow_rule_move_ipaddr_tail(flow, priv, group);
2121 "Move ipaddr before UDP_PORT_DST set failed");
2125 ret = dpaa2_flow_rule_data_set(
2126 &priv->extract.qos_key_extract,
2129 NH_FLD_UDP_PORT_DST,
2130 &spec->hdr.dst_port,
2131 &mask->hdr.dst_port,
2132 NH_FLD_UDP_PORT_SIZE);
2135 "QoS NH_FLD_UDP_PORT_DST rule data set failed");
2139 ret = dpaa2_flow_rule_data_set(
2140 &priv->extract.tc_key_extract[group],
2143 NH_FLD_UDP_PORT_DST,
2144 &spec->hdr.dst_port,
2145 &mask->hdr.dst_port,
2146 NH_FLD_UDP_PORT_SIZE);
2149 "FS NH_FLD_UDP_PORT_DST rule data set failed");
2154 (*device_configured) |= local_cfg;
2160 dpaa2_configure_flow_tcp(struct rte_flow *flow,
2161 struct rte_eth_dev *dev,
2162 const struct rte_flow_attr *attr,
2163 const struct rte_flow_item *pattern,
2164 const struct rte_flow_action actions[] __rte_unused,
2165 struct rte_flow_error *error __rte_unused,
2166 int *device_configured)
2171 const struct rte_flow_item_tcp *spec, *mask;
2173 const struct rte_flow_item_tcp *last __rte_unused;
2174 struct dpaa2_dev_priv *priv = dev->data->dev_private;
2176 group = attr->group;
2178 /* Parse pattern list to get the matching parameters */
2179 spec = (const struct rte_flow_item_tcp *)pattern->spec;
2180 last = (const struct rte_flow_item_tcp *)pattern->last;
2181 mask = (const struct rte_flow_item_tcp *)
2182 (pattern->mask ? pattern->mask : &dpaa2_flow_item_tcp_mask);
2184 /* Get traffic class index and flow id to be configured */
2185 flow->tc_id = group;
2186 flow->tc_index = attr->priority;
2188 if (!spec || !mc_l4_port_identification) {
2189 struct proto_discrimination proto;
2191 index = dpaa2_flow_extract_search(
2192 &priv->extract.qos_key_extract.dpkg,
2193 NET_PROT_IP, NH_FLD_IP_PROTO);
2195 ret = dpaa2_flow_proto_discrimination_extract(
2196 &priv->extract.qos_key_extract,
2197 DPAA2_FLOW_ITEM_TYPE_GENERIC_IP);
2200 "QoS Extract IP protocol to discriminate TCP failed.");
2204 local_cfg |= DPAA2_QOS_TABLE_RECONFIGURE;
2207 index = dpaa2_flow_extract_search(
2208 &priv->extract.tc_key_extract[group].dpkg,
2209 NET_PROT_IP, NH_FLD_IP_PROTO);
2211 ret = dpaa2_flow_proto_discrimination_extract(
2212 &priv->extract.tc_key_extract[group],
2213 DPAA2_FLOW_ITEM_TYPE_GENERIC_IP);
2216 "FS Extract IP protocol to discriminate TCP failed.");
2220 local_cfg |= DPAA2_FS_TABLE_RECONFIGURE;
2223 ret = dpaa2_flow_rule_move_ipaddr_tail(flow, priv, group);
2226 "Move IP addr before TCP discrimination set failed");
2230 proto.type = DPAA2_FLOW_ITEM_TYPE_GENERIC_IP;
2231 proto.ip_proto = IPPROTO_TCP;
2232 ret = dpaa2_flow_proto_discrimination_rule(priv, flow,
2235 DPAA2_PMD_ERR("TCP discrimination rule set failed");
2239 (*device_configured) |= local_cfg;
2245 if (dpaa2_flow_extract_support((const uint8_t *)mask,
2246 RTE_FLOW_ITEM_TYPE_TCP)) {
2247 DPAA2_PMD_WARN("Extract field(s) of TCP not support.");
2252 if (mask->hdr.src_port) {
2253 index = dpaa2_flow_extract_search(
2254 &priv->extract.qos_key_extract.dpkg,
2255 NET_PROT_TCP, NH_FLD_TCP_PORT_SRC);
2257 ret = dpaa2_flow_extract_add(
2258 &priv->extract.qos_key_extract,
2260 NH_FLD_TCP_PORT_SRC,
2261 NH_FLD_TCP_PORT_SIZE);
2263 DPAA2_PMD_ERR("QoS Extract add TCP_SRC failed.");
2267 local_cfg |= DPAA2_QOS_TABLE_RECONFIGURE;
2270 index = dpaa2_flow_extract_search(
2271 &priv->extract.tc_key_extract[group].dpkg,
2272 NET_PROT_TCP, NH_FLD_TCP_PORT_SRC);
2274 ret = dpaa2_flow_extract_add(
2275 &priv->extract.tc_key_extract[group],
2277 NH_FLD_TCP_PORT_SRC,
2278 NH_FLD_TCP_PORT_SIZE);
2280 DPAA2_PMD_ERR("FS Extract add TCP_SRC failed.");
2284 local_cfg |= DPAA2_FS_TABLE_RECONFIGURE;
2287 ret = dpaa2_flow_rule_move_ipaddr_tail(flow, priv, group);
2290 "Move ipaddr before TCP_PORT_SRC set failed");
2294 ret = dpaa2_flow_rule_data_set(
2295 &priv->extract.qos_key_extract,
2298 NH_FLD_TCP_PORT_SRC,
2299 &spec->hdr.src_port,
2300 &mask->hdr.src_port,
2301 NH_FLD_TCP_PORT_SIZE);
2304 "QoS NH_FLD_TCP_PORT_SRC rule data set failed");
2308 ret = dpaa2_flow_rule_data_set(
2309 &priv->extract.tc_key_extract[group],
2312 NH_FLD_TCP_PORT_SRC,
2313 &spec->hdr.src_port,
2314 &mask->hdr.src_port,
2315 NH_FLD_TCP_PORT_SIZE);
2318 "FS NH_FLD_TCP_PORT_SRC rule data set failed");
2323 if (mask->hdr.dst_port) {
2324 index = dpaa2_flow_extract_search(
2325 &priv->extract.qos_key_extract.dpkg,
2326 NET_PROT_TCP, NH_FLD_TCP_PORT_DST);
2328 ret = dpaa2_flow_extract_add(
2329 &priv->extract.qos_key_extract,
2331 NH_FLD_TCP_PORT_DST,
2332 NH_FLD_TCP_PORT_SIZE);
2334 DPAA2_PMD_ERR("QoS Extract add TCP_DST failed.");
2338 local_cfg |= DPAA2_QOS_TABLE_RECONFIGURE;
2341 index = dpaa2_flow_extract_search(
2342 &priv->extract.tc_key_extract[group].dpkg,
2343 NET_PROT_TCP, NH_FLD_TCP_PORT_DST);
2345 ret = dpaa2_flow_extract_add(
2346 &priv->extract.tc_key_extract[group],
2348 NH_FLD_TCP_PORT_DST,
2349 NH_FLD_TCP_PORT_SIZE);
2351 DPAA2_PMD_ERR("FS Extract add TCP_DST failed.");
2355 local_cfg |= DPAA2_FS_TABLE_RECONFIGURE;
2358 ret = dpaa2_flow_rule_move_ipaddr_tail(flow, priv, group);
2361 "Move ipaddr before TCP_PORT_DST set failed");
2365 ret = dpaa2_flow_rule_data_set(
2366 &priv->extract.qos_key_extract,
2369 NH_FLD_TCP_PORT_DST,
2370 &spec->hdr.dst_port,
2371 &mask->hdr.dst_port,
2372 NH_FLD_TCP_PORT_SIZE);
2375 "QoS NH_FLD_TCP_PORT_DST rule data set failed");
2379 ret = dpaa2_flow_rule_data_set(
2380 &priv->extract.tc_key_extract[group],
2383 NH_FLD_TCP_PORT_DST,
2384 &spec->hdr.dst_port,
2385 &mask->hdr.dst_port,
2386 NH_FLD_TCP_PORT_SIZE);
2389 "FS NH_FLD_TCP_PORT_DST rule data set failed");
2394 (*device_configured) |= local_cfg;
2400 dpaa2_configure_flow_sctp(struct rte_flow *flow,
2401 struct rte_eth_dev *dev,
2402 const struct rte_flow_attr *attr,
2403 const struct rte_flow_item *pattern,
2404 const struct rte_flow_action actions[] __rte_unused,
2405 struct rte_flow_error *error __rte_unused,
2406 int *device_configured)
2411 const struct rte_flow_item_sctp *spec, *mask;
2413 const struct rte_flow_item_sctp *last __rte_unused;
2414 struct dpaa2_dev_priv *priv = dev->data->dev_private;
2416 group = attr->group;
2418 /* Parse pattern list to get the matching parameters */
2419 spec = (const struct rte_flow_item_sctp *)pattern->spec;
2420 last = (const struct rte_flow_item_sctp *)pattern->last;
2421 mask = (const struct rte_flow_item_sctp *)
2422 (pattern->mask ? pattern->mask :
2423 &dpaa2_flow_item_sctp_mask);
2425 /* Get traffic class index and flow id to be configured */
2426 flow->tc_id = group;
2427 flow->tc_index = attr->priority;
2429 if (!spec || !mc_l4_port_identification) {
2430 struct proto_discrimination proto;
2432 index = dpaa2_flow_extract_search(
2433 &priv->extract.qos_key_extract.dpkg,
2434 NET_PROT_IP, NH_FLD_IP_PROTO);
2436 ret = dpaa2_flow_proto_discrimination_extract(
2437 &priv->extract.qos_key_extract,
2438 DPAA2_FLOW_ITEM_TYPE_GENERIC_IP);
2441 "QoS Extract IP protocol to discriminate SCTP failed.");
2445 local_cfg |= DPAA2_QOS_TABLE_RECONFIGURE;
2448 index = dpaa2_flow_extract_search(
2449 &priv->extract.tc_key_extract[group].dpkg,
2450 NET_PROT_IP, NH_FLD_IP_PROTO);
2452 ret = dpaa2_flow_proto_discrimination_extract(
2453 &priv->extract.tc_key_extract[group],
2454 DPAA2_FLOW_ITEM_TYPE_GENERIC_IP);
2457 "FS Extract IP protocol to discriminate SCTP failed.");
2461 local_cfg |= DPAA2_FS_TABLE_RECONFIGURE;
2464 ret = dpaa2_flow_rule_move_ipaddr_tail(flow, priv, group);
2467 "Move ipaddr before SCTP discrimination set failed");
2471 proto.type = DPAA2_FLOW_ITEM_TYPE_GENERIC_IP;
2472 proto.ip_proto = IPPROTO_SCTP;
2473 ret = dpaa2_flow_proto_discrimination_rule(priv, flow,
2476 DPAA2_PMD_ERR("SCTP discrimination rule set failed");
2480 (*device_configured) |= local_cfg;
2486 if (dpaa2_flow_extract_support((const uint8_t *)mask,
2487 RTE_FLOW_ITEM_TYPE_SCTP)) {
2488 DPAA2_PMD_WARN("Extract field(s) of SCTP not support.");
2493 if (mask->hdr.src_port) {
2494 index = dpaa2_flow_extract_search(
2495 &priv->extract.qos_key_extract.dpkg,
2496 NET_PROT_SCTP, NH_FLD_SCTP_PORT_SRC);
2498 ret = dpaa2_flow_extract_add(
2499 &priv->extract.qos_key_extract,
2501 NH_FLD_SCTP_PORT_SRC,
2502 NH_FLD_SCTP_PORT_SIZE);
2504 DPAA2_PMD_ERR("QoS Extract add SCTP_SRC failed.");
2508 local_cfg |= DPAA2_QOS_TABLE_RECONFIGURE;
2511 index = dpaa2_flow_extract_search(
2512 &priv->extract.tc_key_extract[group].dpkg,
2513 NET_PROT_SCTP, NH_FLD_SCTP_PORT_SRC);
2515 ret = dpaa2_flow_extract_add(
2516 &priv->extract.tc_key_extract[group],
2518 NH_FLD_SCTP_PORT_SRC,
2519 NH_FLD_SCTP_PORT_SIZE);
2521 DPAA2_PMD_ERR("FS Extract add SCTP_SRC failed.");
2525 local_cfg |= DPAA2_FS_TABLE_RECONFIGURE;
2528 ret = dpaa2_flow_rule_move_ipaddr_tail(flow, priv, group);
2531 "Move ipaddr before SCTP_PORT_SRC set failed");
2535 ret = dpaa2_flow_rule_data_set(
2536 &priv->extract.qos_key_extract,
2539 NH_FLD_SCTP_PORT_SRC,
2540 &spec->hdr.src_port,
2541 &mask->hdr.src_port,
2542 NH_FLD_SCTP_PORT_SIZE);
2545 "QoS NH_FLD_SCTP_PORT_SRC rule data set failed");
2549 ret = dpaa2_flow_rule_data_set(
2550 &priv->extract.tc_key_extract[group],
2553 NH_FLD_SCTP_PORT_SRC,
2554 &spec->hdr.src_port,
2555 &mask->hdr.src_port,
2556 NH_FLD_SCTP_PORT_SIZE);
2559 "FS NH_FLD_SCTP_PORT_SRC rule data set failed");
2564 if (mask->hdr.dst_port) {
2565 index = dpaa2_flow_extract_search(
2566 &priv->extract.qos_key_extract.dpkg,
2567 NET_PROT_SCTP, NH_FLD_SCTP_PORT_DST);
2569 ret = dpaa2_flow_extract_add(
2570 &priv->extract.qos_key_extract,
2572 NH_FLD_SCTP_PORT_DST,
2573 NH_FLD_SCTP_PORT_SIZE);
2575 DPAA2_PMD_ERR("QoS Extract add SCTP_DST failed.");
2579 local_cfg |= DPAA2_QOS_TABLE_RECONFIGURE;
2582 index = dpaa2_flow_extract_search(
2583 &priv->extract.tc_key_extract[group].dpkg,
2584 NET_PROT_SCTP, NH_FLD_SCTP_PORT_DST);
2586 ret = dpaa2_flow_extract_add(
2587 &priv->extract.tc_key_extract[group],
2589 NH_FLD_SCTP_PORT_DST,
2590 NH_FLD_SCTP_PORT_SIZE);
2592 DPAA2_PMD_ERR("FS Extract add SCTP_DST failed.");
2596 local_cfg |= DPAA2_FS_TABLE_RECONFIGURE;
2599 ret = dpaa2_flow_rule_move_ipaddr_tail(flow, priv, group);
2602 "Move ipaddr before SCTP_PORT_DST set failed");
2606 ret = dpaa2_flow_rule_data_set(
2607 &priv->extract.qos_key_extract,
2610 NH_FLD_SCTP_PORT_DST,
2611 &spec->hdr.dst_port,
2612 &mask->hdr.dst_port,
2613 NH_FLD_SCTP_PORT_SIZE);
2616 "QoS NH_FLD_SCTP_PORT_DST rule data set failed");
2620 ret = dpaa2_flow_rule_data_set(
2621 &priv->extract.tc_key_extract[group],
2624 NH_FLD_SCTP_PORT_DST,
2625 &spec->hdr.dst_port,
2626 &mask->hdr.dst_port,
2627 NH_FLD_SCTP_PORT_SIZE);
2630 "FS NH_FLD_SCTP_PORT_DST rule data set failed");
2635 (*device_configured) |= local_cfg;
2641 dpaa2_configure_flow_gre(struct rte_flow *flow,
2642 struct rte_eth_dev *dev,
2643 const struct rte_flow_attr *attr,
2644 const struct rte_flow_item *pattern,
2645 const struct rte_flow_action actions[] __rte_unused,
2646 struct rte_flow_error *error __rte_unused,
2647 int *device_configured)
2652 const struct rte_flow_item_gre *spec, *mask;
2654 const struct rte_flow_item_gre *last __rte_unused;
2655 struct dpaa2_dev_priv *priv = dev->data->dev_private;
2657 group = attr->group;
2659 /* Parse pattern list to get the matching parameters */
2660 spec = (const struct rte_flow_item_gre *)pattern->spec;
2661 last = (const struct rte_flow_item_gre *)pattern->last;
2662 mask = (const struct rte_flow_item_gre *)
2663 (pattern->mask ? pattern->mask : &dpaa2_flow_item_gre_mask);
2665 /* Get traffic class index and flow id to be configured */
2666 flow->tc_id = group;
2667 flow->tc_index = attr->priority;
2670 struct proto_discrimination proto;
2672 index = dpaa2_flow_extract_search(
2673 &priv->extract.qos_key_extract.dpkg,
2674 NET_PROT_IP, NH_FLD_IP_PROTO);
2676 ret = dpaa2_flow_proto_discrimination_extract(
2677 &priv->extract.qos_key_extract,
2678 DPAA2_FLOW_ITEM_TYPE_GENERIC_IP);
2681 "QoS Extract IP protocol to discriminate GRE failed.");
2685 local_cfg |= DPAA2_QOS_TABLE_RECONFIGURE;
2688 index = dpaa2_flow_extract_search(
2689 &priv->extract.tc_key_extract[group].dpkg,
2690 NET_PROT_IP, NH_FLD_IP_PROTO);
2692 ret = dpaa2_flow_proto_discrimination_extract(
2693 &priv->extract.tc_key_extract[group],
2694 DPAA2_FLOW_ITEM_TYPE_GENERIC_IP);
2697 "FS Extract IP protocol to discriminate GRE failed.");
2701 local_cfg |= DPAA2_FS_TABLE_RECONFIGURE;
2704 ret = dpaa2_flow_rule_move_ipaddr_tail(flow, priv, group);
2707 "Move IP addr before GRE discrimination set failed");
2711 proto.type = DPAA2_FLOW_ITEM_TYPE_GENERIC_IP;
2712 proto.ip_proto = IPPROTO_GRE;
2713 ret = dpaa2_flow_proto_discrimination_rule(priv, flow,
2716 DPAA2_PMD_ERR("GRE discrimination rule set failed");
2720 (*device_configured) |= local_cfg;
2725 if (dpaa2_flow_extract_support((const uint8_t *)mask,
2726 RTE_FLOW_ITEM_TYPE_GRE)) {
2727 DPAA2_PMD_WARN("Extract field(s) of GRE not support.");
2732 if (!mask->protocol)
2735 index = dpaa2_flow_extract_search(
2736 &priv->extract.qos_key_extract.dpkg,
2737 NET_PROT_GRE, NH_FLD_GRE_TYPE);
2739 ret = dpaa2_flow_extract_add(
2740 &priv->extract.qos_key_extract,
2743 sizeof(rte_be16_t));
2745 DPAA2_PMD_ERR("QoS Extract add GRE_TYPE failed.");
2749 local_cfg |= DPAA2_QOS_TABLE_RECONFIGURE;
2752 index = dpaa2_flow_extract_search(
2753 &priv->extract.tc_key_extract[group].dpkg,
2754 NET_PROT_GRE, NH_FLD_GRE_TYPE);
2756 ret = dpaa2_flow_extract_add(
2757 &priv->extract.tc_key_extract[group],
2760 sizeof(rte_be16_t));
2762 DPAA2_PMD_ERR("FS Extract add GRE_TYPE failed.");
2766 local_cfg |= DPAA2_FS_TABLE_RECONFIGURE;
2769 ret = dpaa2_flow_rule_move_ipaddr_tail(flow, priv, group);
2772 "Move ipaddr before GRE_TYPE set failed");
2776 ret = dpaa2_flow_rule_data_set(
2777 &priv->extract.qos_key_extract,
2783 sizeof(rte_be16_t));
2786 "QoS NH_FLD_GRE_TYPE rule data set failed");
2790 ret = dpaa2_flow_rule_data_set(
2791 &priv->extract.tc_key_extract[group],
2797 sizeof(rte_be16_t));
2800 "FS NH_FLD_GRE_TYPE rule data set failed");
2804 (*device_configured) |= local_cfg;
2809 /* The existing QoS/FS entry with IP address(es)
2810 * needs update after
2811 * new extract(s) are inserted before IP
2812 * address(es) extract(s).
2815 dpaa2_flow_entry_update(
2816 struct dpaa2_dev_priv *priv, uint8_t tc_id)
2818 struct rte_flow *curr = LIST_FIRST(&priv->flows);
2819 struct fsl_mc_io *dpni = (struct fsl_mc_io *)priv->hw;
2821 int qos_ipsrc_offset = -1, qos_ipdst_offset = -1;
2822 int fs_ipsrc_offset = -1, fs_ipdst_offset = -1;
2823 struct dpaa2_key_extract *qos_key_extract =
2824 &priv->extract.qos_key_extract;
2825 struct dpaa2_key_extract *tc_key_extract =
2826 &priv->extract.tc_key_extract[tc_id];
2827 char ipsrc_key[NH_FLD_IPV6_ADDR_SIZE];
2828 char ipdst_key[NH_FLD_IPV6_ADDR_SIZE];
2829 char ipsrc_mask[NH_FLD_IPV6_ADDR_SIZE];
2830 char ipdst_mask[NH_FLD_IPV6_ADDR_SIZE];
2831 int extend = -1, extend1, size = -1;
2835 if (curr->ipaddr_rule.ipaddr_type ==
2837 curr = LIST_NEXT(curr, next);
2841 if (curr->ipaddr_rule.ipaddr_type ==
2844 qos_key_extract->key_info.ipv4_src_offset;
2846 qos_key_extract->key_info.ipv4_dst_offset;
2848 tc_key_extract->key_info.ipv4_src_offset;
2850 tc_key_extract->key_info.ipv4_dst_offset;
2851 size = NH_FLD_IPV4_ADDR_SIZE;
2854 qos_key_extract->key_info.ipv6_src_offset;
2856 qos_key_extract->key_info.ipv6_dst_offset;
2858 tc_key_extract->key_info.ipv6_src_offset;
2860 tc_key_extract->key_info.ipv6_dst_offset;
2861 size = NH_FLD_IPV6_ADDR_SIZE;
2864 qos_index = curr->tc_id * priv->fs_entries +
2867 dpaa2_flow_qos_entry_log("Before update", curr, qos_index);
2869 ret = dpni_remove_qos_entry(dpni, CMD_PRI_LOW,
2870 priv->token, &curr->qos_rule);
2872 DPAA2_PMD_ERR("Qos entry remove failed.");
2878 if (curr->ipaddr_rule.qos_ipsrc_offset >= 0) {
2879 RTE_ASSERT(qos_ipsrc_offset >=
2880 curr->ipaddr_rule.qos_ipsrc_offset);
2881 extend1 = qos_ipsrc_offset -
2882 curr->ipaddr_rule.qos_ipsrc_offset;
2884 RTE_ASSERT(extend == extend1);
2888 RTE_ASSERT((size == NH_FLD_IPV4_ADDR_SIZE) ||
2889 (size == NH_FLD_IPV6_ADDR_SIZE));
2892 (char *)(size_t)curr->qos_rule.key_iova +
2893 curr->ipaddr_rule.qos_ipsrc_offset,
2895 memset((char *)(size_t)curr->qos_rule.key_iova +
2896 curr->ipaddr_rule.qos_ipsrc_offset,
2900 (char *)(size_t)curr->qos_rule.mask_iova +
2901 curr->ipaddr_rule.qos_ipsrc_offset,
2903 memset((char *)(size_t)curr->qos_rule.mask_iova +
2904 curr->ipaddr_rule.qos_ipsrc_offset,
2907 curr->ipaddr_rule.qos_ipsrc_offset = qos_ipsrc_offset;
2910 if (curr->ipaddr_rule.qos_ipdst_offset >= 0) {
2911 RTE_ASSERT(qos_ipdst_offset >=
2912 curr->ipaddr_rule.qos_ipdst_offset);
2913 extend1 = qos_ipdst_offset -
2914 curr->ipaddr_rule.qos_ipdst_offset;
2916 RTE_ASSERT(extend == extend1);
2920 RTE_ASSERT((size == NH_FLD_IPV4_ADDR_SIZE) ||
2921 (size == NH_FLD_IPV6_ADDR_SIZE));
2924 (char *)(size_t)curr->qos_rule.key_iova +
2925 curr->ipaddr_rule.qos_ipdst_offset,
2927 memset((char *)(size_t)curr->qos_rule.key_iova +
2928 curr->ipaddr_rule.qos_ipdst_offset,
2932 (char *)(size_t)curr->qos_rule.mask_iova +
2933 curr->ipaddr_rule.qos_ipdst_offset,
2935 memset((char *)(size_t)curr->qos_rule.mask_iova +
2936 curr->ipaddr_rule.qos_ipdst_offset,
2939 curr->ipaddr_rule.qos_ipdst_offset = qos_ipdst_offset;
2942 if (curr->ipaddr_rule.qos_ipsrc_offset >= 0) {
2943 RTE_ASSERT((size == NH_FLD_IPV4_ADDR_SIZE) ||
2944 (size == NH_FLD_IPV6_ADDR_SIZE));
2945 memcpy((char *)(size_t)curr->qos_rule.key_iova +
2946 curr->ipaddr_rule.qos_ipsrc_offset,
2949 memcpy((char *)(size_t)curr->qos_rule.mask_iova +
2950 curr->ipaddr_rule.qos_ipsrc_offset,
2954 if (curr->ipaddr_rule.qos_ipdst_offset >= 0) {
2955 RTE_ASSERT((size == NH_FLD_IPV4_ADDR_SIZE) ||
2956 (size == NH_FLD_IPV6_ADDR_SIZE));
2957 memcpy((char *)(size_t)curr->qos_rule.key_iova +
2958 curr->ipaddr_rule.qos_ipdst_offset,
2961 memcpy((char *)(size_t)curr->qos_rule.mask_iova +
2962 curr->ipaddr_rule.qos_ipdst_offset,
2968 curr->qos_real_key_size += extend;
2970 curr->qos_rule.key_size = FIXED_ENTRY_SIZE;
2972 dpaa2_flow_qos_entry_log("Start update", curr, qos_index);
2974 ret = dpni_add_qos_entry(dpni, CMD_PRI_LOW,
2975 priv->token, &curr->qos_rule,
2976 curr->tc_id, qos_index,
2979 DPAA2_PMD_ERR("Qos entry update failed.");
2983 if (curr->action != RTE_FLOW_ACTION_TYPE_QUEUE) {
2984 curr = LIST_NEXT(curr, next);
2988 dpaa2_flow_fs_entry_log("Before update", curr);
2991 ret = dpni_remove_fs_entry(dpni, CMD_PRI_LOW,
2992 priv->token, curr->tc_id, &curr->fs_rule);
2994 DPAA2_PMD_ERR("FS entry remove failed.");
2998 if (curr->ipaddr_rule.fs_ipsrc_offset >= 0 &&
2999 tc_id == curr->tc_id) {
3000 RTE_ASSERT(fs_ipsrc_offset >=
3001 curr->ipaddr_rule.fs_ipsrc_offset);
3002 extend1 = fs_ipsrc_offset -
3003 curr->ipaddr_rule.fs_ipsrc_offset;
3005 RTE_ASSERT(extend == extend1);
3010 (char *)(size_t)curr->fs_rule.key_iova +
3011 curr->ipaddr_rule.fs_ipsrc_offset,
3013 memset((char *)(size_t)curr->fs_rule.key_iova +
3014 curr->ipaddr_rule.fs_ipsrc_offset,
3018 (char *)(size_t)curr->fs_rule.mask_iova +
3019 curr->ipaddr_rule.fs_ipsrc_offset,
3021 memset((char *)(size_t)curr->fs_rule.mask_iova +
3022 curr->ipaddr_rule.fs_ipsrc_offset,
3025 curr->ipaddr_rule.fs_ipsrc_offset = fs_ipsrc_offset;
3028 if (curr->ipaddr_rule.fs_ipdst_offset >= 0 &&
3029 tc_id == curr->tc_id) {
3030 RTE_ASSERT(fs_ipdst_offset >=
3031 curr->ipaddr_rule.fs_ipdst_offset);
3032 extend1 = fs_ipdst_offset -
3033 curr->ipaddr_rule.fs_ipdst_offset;
3035 RTE_ASSERT(extend == extend1);
3040 (char *)(size_t)curr->fs_rule.key_iova +
3041 curr->ipaddr_rule.fs_ipdst_offset,
3043 memset((char *)(size_t)curr->fs_rule.key_iova +
3044 curr->ipaddr_rule.fs_ipdst_offset,
3048 (char *)(size_t)curr->fs_rule.mask_iova +
3049 curr->ipaddr_rule.fs_ipdst_offset,
3051 memset((char *)(size_t)curr->fs_rule.mask_iova +
3052 curr->ipaddr_rule.fs_ipdst_offset,
3055 curr->ipaddr_rule.fs_ipdst_offset = fs_ipdst_offset;
3058 if (curr->ipaddr_rule.fs_ipsrc_offset >= 0) {
3059 memcpy((char *)(size_t)curr->fs_rule.key_iova +
3060 curr->ipaddr_rule.fs_ipsrc_offset,
3063 memcpy((char *)(size_t)curr->fs_rule.mask_iova +
3064 curr->ipaddr_rule.fs_ipsrc_offset,
3068 if (curr->ipaddr_rule.fs_ipdst_offset >= 0) {
3069 memcpy((char *)(size_t)curr->fs_rule.key_iova +
3070 curr->ipaddr_rule.fs_ipdst_offset,
3073 memcpy((char *)(size_t)curr->fs_rule.mask_iova +
3074 curr->ipaddr_rule.fs_ipdst_offset,
3080 curr->fs_real_key_size += extend;
3081 curr->fs_rule.key_size = FIXED_ENTRY_SIZE;
3083 dpaa2_flow_fs_entry_log("Start update", curr);
3085 ret = dpni_add_fs_entry(dpni, CMD_PRI_LOW,
3086 priv->token, curr->tc_id, curr->tc_index,
3087 &curr->fs_rule, &curr->action_cfg);
3089 DPAA2_PMD_ERR("FS entry update failed.");
3093 curr = LIST_NEXT(curr, next);
3100 dpaa2_flow_verify_attr(
3101 struct dpaa2_dev_priv *priv,
3102 const struct rte_flow_attr *attr)
3104 struct rte_flow *curr = LIST_FIRST(&priv->flows);
3107 if (curr->tc_id == attr->group &&
3108 curr->tc_index == attr->priority) {
3110 "Flow with group %d and priority %d already exists.",
3111 attr->group, attr->priority);
3115 curr = LIST_NEXT(curr, next);
3122 dpaa2_generic_flow_set(struct rte_flow *flow,
3123 struct rte_eth_dev *dev,
3124 const struct rte_flow_attr *attr,
3125 const struct rte_flow_item pattern[],
3126 const struct rte_flow_action actions[],
3127 struct rte_flow_error *error)
3129 const struct rte_flow_action_queue *dest_queue;
3130 const struct rte_flow_action_rss *rss_conf;
3131 int is_keycfg_configured = 0, end_of_list = 0;
3132 int ret = 0, i = 0, j = 0;
3133 struct dpni_rx_tc_dist_cfg tc_cfg;
3134 struct dpni_qos_tbl_cfg qos_cfg;
3135 struct dpni_fs_action_cfg action;
3136 struct dpaa2_dev_priv *priv = dev->data->dev_private;
3137 struct fsl_mc_io *dpni = (struct fsl_mc_io *)priv->hw;
3139 struct rte_flow *curr = LIST_FIRST(&priv->flows);
3142 ret = dpaa2_flow_verify_attr(priv, attr);
3146 /* Parse pattern list to get the matching parameters */
3147 while (!end_of_list) {
3148 switch (pattern[i].type) {
3149 case RTE_FLOW_ITEM_TYPE_ETH:
3150 ret = dpaa2_configure_flow_eth(flow,
3151 dev, attr, &pattern[i], actions, error,
3152 &is_keycfg_configured);
3154 DPAA2_PMD_ERR("ETH flow configuration failed!");
3158 case RTE_FLOW_ITEM_TYPE_VLAN:
3159 ret = dpaa2_configure_flow_vlan(flow,
3160 dev, attr, &pattern[i], actions, error,
3161 &is_keycfg_configured);
3163 DPAA2_PMD_ERR("vLan flow configuration failed!");
3167 case RTE_FLOW_ITEM_TYPE_IPV4:
3168 case RTE_FLOW_ITEM_TYPE_IPV6:
3169 ret = dpaa2_configure_flow_generic_ip(flow,
3170 dev, attr, &pattern[i], actions, error,
3171 &is_keycfg_configured);
3173 DPAA2_PMD_ERR("IP flow configuration failed!");
3177 case RTE_FLOW_ITEM_TYPE_ICMP:
3178 ret = dpaa2_configure_flow_icmp(flow,
3179 dev, attr, &pattern[i], actions, error,
3180 &is_keycfg_configured);
3182 DPAA2_PMD_ERR("ICMP flow configuration failed!");
3186 case RTE_FLOW_ITEM_TYPE_UDP:
3187 ret = dpaa2_configure_flow_udp(flow,
3188 dev, attr, &pattern[i], actions, error,
3189 &is_keycfg_configured);
3191 DPAA2_PMD_ERR("UDP flow configuration failed!");
3195 case RTE_FLOW_ITEM_TYPE_TCP:
3196 ret = dpaa2_configure_flow_tcp(flow,
3197 dev, attr, &pattern[i], actions, error,
3198 &is_keycfg_configured);
3200 DPAA2_PMD_ERR("TCP flow configuration failed!");
3204 case RTE_FLOW_ITEM_TYPE_SCTP:
3205 ret = dpaa2_configure_flow_sctp(flow,
3206 dev, attr, &pattern[i], actions, error,
3207 &is_keycfg_configured);
3209 DPAA2_PMD_ERR("SCTP flow configuration failed!");
3213 case RTE_FLOW_ITEM_TYPE_GRE:
3214 ret = dpaa2_configure_flow_gre(flow,
3215 dev, attr, &pattern[i], actions, error,
3216 &is_keycfg_configured);
3218 DPAA2_PMD_ERR("GRE flow configuration failed!");
3222 case RTE_FLOW_ITEM_TYPE_END:
3224 break; /*End of List*/
3226 DPAA2_PMD_ERR("Invalid action type");
3233 /* Let's parse action on matching traffic */
3235 while (!end_of_list) {
3236 switch (actions[j].type) {
3237 case RTE_FLOW_ACTION_TYPE_QUEUE:
3239 (const struct rte_flow_action_queue *)(actions[j].conf);
3240 flow->flow_id = dest_queue->index;
3241 flow->action = RTE_FLOW_ACTION_TYPE_QUEUE;
3242 memset(&action, 0, sizeof(struct dpni_fs_action_cfg));
3243 action.flow_id = flow->flow_id;
3244 if (is_keycfg_configured & DPAA2_QOS_TABLE_RECONFIGURE) {
3245 dpaa2_flow_qos_table_extracts_log(priv);
3246 if (dpkg_prepare_key_cfg(
3247 &priv->extract.qos_key_extract.dpkg,
3248 (uint8_t *)(size_t)priv->extract.qos_extract_param)
3251 "Unable to prepare extract parameters");
3255 memset(&qos_cfg, 0, sizeof(struct dpni_qos_tbl_cfg));
3256 qos_cfg.discard_on_miss = true;
3257 qos_cfg.keep_entries = true;
3258 qos_cfg.key_cfg_iova =
3259 (size_t)priv->extract.qos_extract_param;
3260 ret = dpni_set_qos_table(dpni, CMD_PRI_LOW,
3261 priv->token, &qos_cfg);
3264 "Distribution cannot be configured.(%d)"
3269 if (is_keycfg_configured & DPAA2_FS_TABLE_RECONFIGURE) {
3270 dpaa2_flow_fs_table_extracts_log(priv, flow->tc_id);
3271 if (dpkg_prepare_key_cfg(
3272 &priv->extract.tc_key_extract[flow->tc_id].dpkg,
3273 (uint8_t *)(size_t)priv->extract
3274 .tc_extract_param[flow->tc_id]) < 0) {
3276 "Unable to prepare extract parameters");
3280 memset(&tc_cfg, 0, sizeof(struct dpni_rx_tc_dist_cfg));
3281 tc_cfg.dist_size = priv->nb_rx_queues / priv->num_rx_tc;
3282 tc_cfg.dist_mode = DPNI_DIST_MODE_FS;
3283 tc_cfg.key_cfg_iova =
3284 (uint64_t)priv->extract.tc_extract_param[flow->tc_id];
3285 tc_cfg.fs_cfg.miss_action = DPNI_FS_MISS_DROP;
3286 tc_cfg.fs_cfg.keep_entries = true;
3287 ret = dpni_set_rx_tc_dist(dpni, CMD_PRI_LOW,
3289 flow->tc_id, &tc_cfg);
3292 "Distribution cannot be configured.(%d)"
3297 /* Configure QoS table first */
3299 action.flow_id = action.flow_id % priv->num_rx_tc;
3301 qos_index = flow->tc_id * priv->fs_entries +
3304 if (qos_index >= priv->qos_entries) {
3305 DPAA2_PMD_ERR("QoS table with %d entries full",
3309 flow->qos_rule.key_size = FIXED_ENTRY_SIZE;
3310 if (flow->ipaddr_rule.ipaddr_type == FLOW_IPV4_ADDR) {
3311 if (flow->ipaddr_rule.qos_ipdst_offset >=
3312 flow->ipaddr_rule.qos_ipsrc_offset) {
3313 flow->qos_real_key_size =
3314 flow->ipaddr_rule.qos_ipdst_offset +
3315 NH_FLD_IPV4_ADDR_SIZE;
3317 flow->qos_real_key_size =
3318 flow->ipaddr_rule.qos_ipsrc_offset +
3319 NH_FLD_IPV4_ADDR_SIZE;
3321 } else if (flow->ipaddr_rule.ipaddr_type ==
3323 if (flow->ipaddr_rule.qos_ipdst_offset >=
3324 flow->ipaddr_rule.qos_ipsrc_offset) {
3325 flow->qos_real_key_size =
3326 flow->ipaddr_rule.qos_ipdst_offset +
3327 NH_FLD_IPV6_ADDR_SIZE;
3329 flow->qos_real_key_size =
3330 flow->ipaddr_rule.qos_ipsrc_offset +
3331 NH_FLD_IPV6_ADDR_SIZE;
3335 flow->qos_rule.key_size = FIXED_ENTRY_SIZE;
3337 dpaa2_flow_qos_entry_log("Start add", flow, qos_index);
3339 ret = dpni_add_qos_entry(dpni, CMD_PRI_LOW,
3340 priv->token, &flow->qos_rule,
3341 flow->tc_id, qos_index,
3345 "Error in addnig entry to QoS table(%d)", ret);
3349 /* Then Configure FS table */
3350 if (flow->tc_index >= priv->fs_entries) {
3351 DPAA2_PMD_ERR("FS table with %d entries full",
3356 flow->fs_real_key_size =
3357 priv->extract.tc_key_extract[flow->tc_id]
3358 .key_info.key_total_size;
3360 if (flow->ipaddr_rule.ipaddr_type ==
3362 if (flow->ipaddr_rule.fs_ipdst_offset >=
3363 flow->ipaddr_rule.fs_ipsrc_offset) {
3364 flow->fs_real_key_size =
3365 flow->ipaddr_rule.fs_ipdst_offset +
3366 NH_FLD_IPV4_ADDR_SIZE;
3368 flow->fs_real_key_size =
3369 flow->ipaddr_rule.fs_ipsrc_offset +
3370 NH_FLD_IPV4_ADDR_SIZE;
3372 } else if (flow->ipaddr_rule.ipaddr_type ==
3374 if (flow->ipaddr_rule.fs_ipdst_offset >=
3375 flow->ipaddr_rule.fs_ipsrc_offset) {
3376 flow->fs_real_key_size =
3377 flow->ipaddr_rule.fs_ipdst_offset +
3378 NH_FLD_IPV6_ADDR_SIZE;
3380 flow->fs_real_key_size =
3381 flow->ipaddr_rule.fs_ipsrc_offset +
3382 NH_FLD_IPV6_ADDR_SIZE;
3386 flow->fs_rule.key_size = FIXED_ENTRY_SIZE;
3388 dpaa2_flow_fs_entry_log("Start add", flow);
3390 ret = dpni_add_fs_entry(dpni, CMD_PRI_LOW, priv->token,
3391 flow->tc_id, flow->tc_index,
3392 &flow->fs_rule, &action);
3395 "Error in adding entry to FS table(%d)", ret);
3398 memcpy(&flow->action_cfg, &action,
3399 sizeof(struct dpni_fs_action_cfg));
3401 case RTE_FLOW_ACTION_TYPE_RSS:
3402 rss_conf = (const struct rte_flow_action_rss *)(actions[j].conf);
3403 for (i = 0; i < (int)rss_conf->queue_num; i++) {
3404 if (rss_conf->queue[i] <
3405 (attr->group * priv->dist_queues) ||
3406 rss_conf->queue[i] >=
3407 ((attr->group + 1) * priv->dist_queues)) {
3409 "Queue/Group combination are not supported\n");
3414 flow->action = RTE_FLOW_ACTION_TYPE_RSS;
3415 ret = dpaa2_distset_to_dpkg_profile_cfg(rss_conf->types,
3416 &priv->extract.tc_key_extract[flow->tc_id].dpkg);
3419 "unable to set flow distribution.please check queue config\n");
3423 /* Allocate DMA'ble memory to write the rules */
3424 param = (size_t)rte_malloc(NULL, 256, 64);
3426 DPAA2_PMD_ERR("Memory allocation failure\n");
3430 if (dpkg_prepare_key_cfg(
3431 &priv->extract.tc_key_extract[flow->tc_id].dpkg,
3432 (uint8_t *)param) < 0) {
3434 "Unable to prepare extract parameters");
3435 rte_free((void *)param);
3439 memset(&tc_cfg, 0, sizeof(struct dpni_rx_tc_dist_cfg));
3440 tc_cfg.dist_size = rss_conf->queue_num;
3441 tc_cfg.dist_mode = DPNI_DIST_MODE_HASH;
3442 tc_cfg.key_cfg_iova = (size_t)param;
3443 tc_cfg.fs_cfg.miss_action = DPNI_FS_MISS_DROP;
3445 ret = dpni_set_rx_tc_dist(dpni, CMD_PRI_LOW,
3446 priv->token, flow->tc_id,
3450 "Distribution cannot be configured: %d\n", ret);
3451 rte_free((void *)param);
3455 rte_free((void *)param);
3456 if (is_keycfg_configured & DPAA2_QOS_TABLE_RECONFIGURE) {
3457 if (dpkg_prepare_key_cfg(
3458 &priv->extract.qos_key_extract.dpkg,
3459 (uint8_t *)(size_t)priv->extract.qos_extract_param) < 0) {
3461 "Unable to prepare extract parameters");
3465 sizeof(struct dpni_qos_tbl_cfg));
3466 qos_cfg.discard_on_miss = true;
3467 qos_cfg.keep_entries = true;
3468 qos_cfg.key_cfg_iova =
3469 (size_t)priv->extract.qos_extract_param;
3470 ret = dpni_set_qos_table(dpni, CMD_PRI_LOW,
3471 priv->token, &qos_cfg);
3474 "Distribution can't be configured %d\n",
3480 /* Add Rule into QoS table */
3481 qos_index = flow->tc_id * priv->fs_entries +
3483 if (qos_index >= priv->qos_entries) {
3484 DPAA2_PMD_ERR("QoS table with %d entries full",
3489 flow->qos_real_key_size =
3490 priv->extract.qos_key_extract.key_info.key_total_size;
3491 flow->qos_rule.key_size = FIXED_ENTRY_SIZE;
3492 ret = dpni_add_qos_entry(dpni, CMD_PRI_LOW, priv->token,
3493 &flow->qos_rule, flow->tc_id,
3497 "Error in entry addition in QoS table(%d)",
3502 case RTE_FLOW_ACTION_TYPE_END:
3506 DPAA2_PMD_ERR("Invalid action type");
3514 if (is_keycfg_configured &
3515 (DPAA2_QOS_TABLE_RECONFIGURE |
3516 DPAA2_FS_TABLE_RECONFIGURE)) {
3517 ret = dpaa2_flow_entry_update(priv, flow->tc_id);
3519 DPAA2_PMD_ERR("Flow entry update failed.");
3524 /* New rules are inserted. */
3526 LIST_INSERT_HEAD(&priv->flows, flow, next);
3528 while (LIST_NEXT(curr, next))
3529 curr = LIST_NEXT(curr, next);
3530 LIST_INSERT_AFTER(curr, flow, next);
3537 dpaa2_dev_verify_attr(struct dpni_attr *dpni_attr,
3538 const struct rte_flow_attr *attr)
3542 if (unlikely(attr->group >= dpni_attr->num_rx_tcs)) {
3543 DPAA2_PMD_ERR("Priority group is out of range\n");
3546 if (unlikely(attr->priority >= dpni_attr->fs_entries)) {
3547 DPAA2_PMD_ERR("Priority within the group is out of range\n");
3550 if (unlikely(attr->egress)) {
3552 "Flow configuration is not supported on egress side\n");
3555 if (unlikely(!attr->ingress)) {
3556 DPAA2_PMD_ERR("Ingress flag must be configured\n");
3563 dpaa2_dev_verify_patterns(const struct rte_flow_item pattern[])
3565 unsigned int i, j, is_found = 0;
3568 for (j = 0; pattern[j].type != RTE_FLOW_ITEM_TYPE_END; j++) {
3569 for (i = 0; i < RTE_DIM(dpaa2_supported_pattern_type); i++) {
3570 if (dpaa2_supported_pattern_type[i]
3571 == pattern[j].type) {
3581 /* Lets verify other combinations of given pattern rules */
3582 for (j = 0; pattern[j].type != RTE_FLOW_ITEM_TYPE_END; j++) {
3583 if (!pattern[j].spec) {
3593 dpaa2_dev_verify_actions(const struct rte_flow_action actions[])
3595 unsigned int i, j, is_found = 0;
3598 for (j = 0; actions[j].type != RTE_FLOW_ACTION_TYPE_END; j++) {
3599 for (i = 0; i < RTE_DIM(dpaa2_supported_action_type); i++) {
3600 if (dpaa2_supported_action_type[i] == actions[j].type) {
3610 for (j = 0; actions[j].type != RTE_FLOW_ACTION_TYPE_END; j++) {
3611 if (actions[j].type != RTE_FLOW_ACTION_TYPE_DROP &&
3619 int dpaa2_flow_validate(struct rte_eth_dev *dev,
3620 const struct rte_flow_attr *flow_attr,
3621 const struct rte_flow_item pattern[],
3622 const struct rte_flow_action actions[],
3623 struct rte_flow_error *error)
3625 struct dpaa2_dev_priv *priv = dev->data->dev_private;
3626 struct dpni_attr dpni_attr;
3627 struct fsl_mc_io *dpni = (struct fsl_mc_io *)priv->hw;
3628 uint16_t token = priv->token;
3631 memset(&dpni_attr, 0, sizeof(struct dpni_attr));
3632 ret = dpni_get_attributes(dpni, CMD_PRI_LOW, token, &dpni_attr);
3635 "Failure to get dpni@%p attribute, err code %d\n",
3637 rte_flow_error_set(error, EPERM,
3638 RTE_FLOW_ERROR_TYPE_ATTR,
3639 flow_attr, "invalid");
3643 /* Verify input attributes */
3644 ret = dpaa2_dev_verify_attr(&dpni_attr, flow_attr);
3647 "Invalid attributes are given\n");
3648 rte_flow_error_set(error, EPERM,
3649 RTE_FLOW_ERROR_TYPE_ATTR,
3650 flow_attr, "invalid");
3651 goto not_valid_params;
3653 /* Verify input pattern list */
3654 ret = dpaa2_dev_verify_patterns(pattern);
3657 "Invalid pattern list is given\n");
3658 rte_flow_error_set(error, EPERM,
3659 RTE_FLOW_ERROR_TYPE_ITEM,
3660 pattern, "invalid");
3661 goto not_valid_params;
3663 /* Verify input action list */
3664 ret = dpaa2_dev_verify_actions(actions);
3667 "Invalid action list is given\n");
3668 rte_flow_error_set(error, EPERM,
3669 RTE_FLOW_ERROR_TYPE_ACTION,
3670 actions, "invalid");
3671 goto not_valid_params;
3678 struct rte_flow *dpaa2_flow_create(struct rte_eth_dev *dev,
3679 const struct rte_flow_attr *attr,
3680 const struct rte_flow_item pattern[],
3681 const struct rte_flow_action actions[],
3682 struct rte_flow_error *error)
3684 struct rte_flow *flow = NULL;
3685 size_t key_iova = 0, mask_iova = 0;
3688 dpaa2_flow_control_log =
3689 getenv("DPAA2_FLOW_CONTROL_LOG");
3691 flow = rte_zmalloc(NULL, sizeof(struct rte_flow), RTE_CACHE_LINE_SIZE);
3693 DPAA2_PMD_ERR("Failure to allocate memory for flow");
3696 /* Allocate DMA'ble memory to write the rules */
3697 key_iova = (size_t)rte_zmalloc(NULL, 256, 64);
3700 "Memory allocation failure for rule configuration\n");
3703 mask_iova = (size_t)rte_zmalloc(NULL, 256, 64);
3706 "Memory allocation failure for rule configuration\n");
3710 flow->qos_rule.key_iova = key_iova;
3711 flow->qos_rule.mask_iova = mask_iova;
3713 /* Allocate DMA'ble memory to write the rules */
3714 key_iova = (size_t)rte_zmalloc(NULL, 256, 64);
3717 "Memory allocation failure for rule configuration\n");
3720 mask_iova = (size_t)rte_zmalloc(NULL, 256, 64);
3723 "Memory allocation failure for rule configuration\n");
3727 flow->fs_rule.key_iova = key_iova;
3728 flow->fs_rule.mask_iova = mask_iova;
3730 flow->ipaddr_rule.ipaddr_type = FLOW_NONE_IPADDR;
3731 flow->ipaddr_rule.qos_ipsrc_offset =
3732 IP_ADDRESS_OFFSET_INVALID;
3733 flow->ipaddr_rule.qos_ipdst_offset =
3734 IP_ADDRESS_OFFSET_INVALID;
3735 flow->ipaddr_rule.fs_ipsrc_offset =
3736 IP_ADDRESS_OFFSET_INVALID;
3737 flow->ipaddr_rule.fs_ipdst_offset =
3738 IP_ADDRESS_OFFSET_INVALID;
3740 switch (dpaa2_filter_type) {
3741 case RTE_ETH_FILTER_GENERIC:
3742 ret = dpaa2_generic_flow_set(flow, dev, attr, pattern,
3745 if (error->type > RTE_FLOW_ERROR_TYPE_ACTION)
3746 rte_flow_error_set(error, EPERM,
3747 RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
3750 "Failure to create flow, return code (%d)", ret);
3751 goto creation_error;
3755 DPAA2_PMD_ERR("Filter type (%d) not supported",
3762 rte_flow_error_set(error, EPERM,
3763 RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
3764 NULL, "memory alloc");
3766 rte_free((void *)flow);
3767 rte_free((void *)key_iova);
3768 rte_free((void *)mask_iova);
3774 int dpaa2_flow_destroy(struct rte_eth_dev *dev,
3775 struct rte_flow *flow,
3776 struct rte_flow_error *error)
3779 struct dpaa2_dev_priv *priv = dev->data->dev_private;
3780 struct fsl_mc_io *dpni = (struct fsl_mc_io *)priv->hw;
3782 switch (flow->action) {
3783 case RTE_FLOW_ACTION_TYPE_QUEUE:
3784 /* Remove entry from QoS table first */
3785 ret = dpni_remove_qos_entry(dpni, CMD_PRI_LOW, priv->token,
3789 "Error in adding entry to QoS table(%d)", ret);
3793 /* Then remove entry from FS table */
3794 ret = dpni_remove_fs_entry(dpni, CMD_PRI_LOW, priv->token,
3795 flow->tc_id, &flow->fs_rule);
3798 "Error in entry addition in FS table(%d)", ret);
3802 case RTE_FLOW_ACTION_TYPE_RSS:
3803 ret = dpni_remove_qos_entry(dpni, CMD_PRI_LOW, priv->token,
3807 "Error in entry addition in QoS table(%d)", ret);
3813 "Action type (%d) is not supported", flow->action);
3818 LIST_REMOVE(flow, next);
3819 rte_free((void *)(size_t)flow->qos_rule.key_iova);
3820 rte_free((void *)(size_t)flow->qos_rule.mask_iova);
3821 rte_free((void *)(size_t)flow->fs_rule.key_iova);
3822 rte_free((void *)(size_t)flow->fs_rule.mask_iova);
3823 /* Now free the flow */
3828 rte_flow_error_set(error, EPERM,
3829 RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
3835 * Destroy user-configured flow rules.
3837 * This function skips internal flows rules.
3839 * @see rte_flow_flush()
3843 dpaa2_flow_flush(struct rte_eth_dev *dev,
3844 struct rte_flow_error *error)
3846 struct dpaa2_dev_priv *priv = dev->data->dev_private;
3847 struct rte_flow *flow = LIST_FIRST(&priv->flows);
3850 struct rte_flow *next = LIST_NEXT(flow, next);
3852 dpaa2_flow_destroy(dev, flow, error);
3859 dpaa2_flow_query(struct rte_eth_dev *dev __rte_unused,
3860 struct rte_flow *flow __rte_unused,
3861 const struct rte_flow_action *actions __rte_unused,
3862 void *data __rte_unused,
3863 struct rte_flow_error *error __rte_unused)
3869 * Clean up all flow rules.
3871 * Unlike dpaa2_flow_flush(), this function takes care of all remaining flow
3872 * rules regardless of whether they are internal or user-configured.
3875 * Pointer to private structure.
3878 dpaa2_flow_clean(struct rte_eth_dev *dev)
3880 struct rte_flow *flow;
3881 struct dpaa2_dev_priv *priv = dev->data->dev_private;
3883 while ((flow = LIST_FIRST(&priv->flows)))
3884 dpaa2_flow_destroy(dev, flow, NULL);
3887 const struct rte_flow_ops dpaa2_flow_ops = {
3888 .create = dpaa2_flow_create,
3889 .validate = dpaa2_flow_validate,
3890 .destroy = dpaa2_flow_destroy,
3891 .flush = dpaa2_flow_flush,
3892 .query = dpaa2_flow_query,