1 /* SPDX-License-Identifier: BSD-3-Clause
2 * Copyright(c) 2020 Intel Corporation
13 #include <rte_ether.h>
14 #include <rte_ethdev_driver.h>
15 #include <rte_malloc.h>
16 #include <rte_tailq.h>
19 #include "iavf_generic_flow.h"
21 #include "iavf_rxtx.h"
23 #define IAVF_FDIR_MAX_QREGION_SIZE 128
25 #define IAVF_FDIR_IPV6_TC_OFFSET 20
26 #define IAVF_IPV6_TC_MASK (0xFF << IAVF_FDIR_IPV6_TC_OFFSET)
28 #define IAVF_GTPU_EH_DWLINK 0
29 #define IAVF_GTPU_EH_UPLINK 1
31 #define IAVF_FDIR_INSET_ETH (\
34 #define IAVF_FDIR_INSET_ETH_IPV4 (\
35 IAVF_INSET_IPV4_SRC | IAVF_INSET_IPV4_DST | \
36 IAVF_INSET_IPV4_PROTO | IAVF_INSET_IPV4_TOS | \
39 #define IAVF_FDIR_INSET_ETH_IPV4_UDP (\
40 IAVF_INSET_IPV4_SRC | IAVF_INSET_IPV4_DST | \
41 IAVF_INSET_IPV4_TOS | IAVF_INSET_IPV4_TTL | \
42 IAVF_INSET_UDP_SRC_PORT | IAVF_INSET_UDP_DST_PORT)
44 #define IAVF_FDIR_INSET_ETH_IPV4_TCP (\
45 IAVF_INSET_IPV4_SRC | IAVF_INSET_IPV4_DST | \
46 IAVF_INSET_IPV4_TOS | IAVF_INSET_IPV4_TTL | \
47 IAVF_INSET_TCP_SRC_PORT | IAVF_INSET_TCP_DST_PORT)
49 #define IAVF_FDIR_INSET_ETH_IPV4_SCTP (\
50 IAVF_INSET_IPV4_SRC | IAVF_INSET_IPV4_DST | \
51 IAVF_INSET_IPV4_TOS | IAVF_INSET_IPV4_TTL | \
52 IAVF_INSET_SCTP_SRC_PORT | IAVF_INSET_SCTP_DST_PORT)
54 #define IAVF_FDIR_INSET_ETH_IPV6 (\
55 IAVF_INSET_IPV6_SRC | IAVF_INSET_IPV6_DST | \
56 IAVF_INSET_IPV6_NEXT_HDR | IAVF_INSET_IPV6_TC | \
57 IAVF_INSET_IPV6_HOP_LIMIT)
59 #define IAVF_FDIR_INSET_ETH_IPV6_UDP (\
60 IAVF_INSET_IPV6_SRC | IAVF_INSET_IPV6_DST | \
61 IAVF_INSET_IPV6_TC | IAVF_INSET_IPV6_HOP_LIMIT | \
62 IAVF_INSET_UDP_SRC_PORT | IAVF_INSET_UDP_DST_PORT)
64 #define IAVF_FDIR_INSET_ETH_IPV6_TCP (\
65 IAVF_INSET_IPV6_SRC | IAVF_INSET_IPV6_DST | \
66 IAVF_INSET_IPV6_TC | IAVF_INSET_IPV6_HOP_LIMIT | \
67 IAVF_INSET_TCP_SRC_PORT | IAVF_INSET_TCP_DST_PORT)
69 #define IAVF_FDIR_INSET_ETH_IPV6_SCTP (\
70 IAVF_INSET_IPV6_SRC | IAVF_INSET_IPV6_DST | \
71 IAVF_INSET_IPV6_TC | IAVF_INSET_IPV6_HOP_LIMIT | \
72 IAVF_INSET_SCTP_SRC_PORT | IAVF_INSET_SCTP_DST_PORT)
74 #define IAVF_FDIR_INSET_IPV4_GTPU (\
75 IAVF_INSET_IPV4_SRC | IAVF_INSET_IPV4_DST | \
78 #define IAVF_FDIR_INSET_IPV4_GTPU_EH (\
79 IAVF_INSET_IPV4_SRC | IAVF_INSET_IPV4_DST | \
80 IAVF_INSET_GTPU_TEID | IAVF_INSET_GTPU_QFI)
82 #define IAVF_FDIR_INSET_IPV6_GTPU (\
83 IAVF_INSET_IPV6_SRC | IAVF_INSET_IPV6_DST | \
86 #define IAVF_FDIR_INSET_IPV6_GTPU_EH (\
87 IAVF_INSET_IPV6_SRC | IAVF_INSET_IPV6_DST | \
88 IAVF_INSET_GTPU_TEID | IAVF_INSET_GTPU_QFI)
90 #define IAVF_FDIR_INSET_L2TPV3OIP (\
91 IAVF_L2TPV3OIP_SESSION_ID)
93 #define IAVF_FDIR_INSET_ESP (\
96 #define IAVF_FDIR_INSET_AH (\
99 #define IAVF_FDIR_INSET_IPV4_NATT_ESP (\
100 IAVF_INSET_IPV4_SRC | IAVF_INSET_IPV4_DST | \
103 #define IAVF_FDIR_INSET_IPV6_NATT_ESP (\
104 IAVF_INSET_IPV6_SRC | IAVF_INSET_IPV6_DST | \
107 #define IAVF_FDIR_INSET_PFCP (\
108 IAVF_INSET_PFCP_S_FIELD)
110 #define IAVF_FDIR_INSET_ECPRI (\
113 static struct iavf_pattern_match_item iavf_fdir_pattern[] = {
114 {iavf_pattern_ethertype, IAVF_FDIR_INSET_ETH, IAVF_INSET_NONE},
115 {iavf_pattern_eth_ipv4, IAVF_FDIR_INSET_ETH_IPV4, IAVF_INSET_NONE},
116 {iavf_pattern_eth_ipv4_udp, IAVF_FDIR_INSET_ETH_IPV4_UDP, IAVF_INSET_NONE},
117 {iavf_pattern_eth_ipv4_tcp, IAVF_FDIR_INSET_ETH_IPV4_TCP, IAVF_INSET_NONE},
118 {iavf_pattern_eth_ipv4_sctp, IAVF_FDIR_INSET_ETH_IPV4_SCTP, IAVF_INSET_NONE},
119 {iavf_pattern_eth_ipv6, IAVF_FDIR_INSET_ETH_IPV6, IAVF_INSET_NONE},
120 {iavf_pattern_eth_ipv6_udp, IAVF_FDIR_INSET_ETH_IPV6_UDP, IAVF_INSET_NONE},
121 {iavf_pattern_eth_ipv6_tcp, IAVF_FDIR_INSET_ETH_IPV6_TCP, IAVF_INSET_NONE},
122 {iavf_pattern_eth_ipv6_sctp, IAVF_FDIR_INSET_ETH_IPV6_SCTP, IAVF_INSET_NONE},
123 {iavf_pattern_eth_ipv4_gtpu, IAVF_FDIR_INSET_IPV4_GTPU, IAVF_INSET_NONE},
124 {iavf_pattern_eth_ipv4_gtpu_eh, IAVF_FDIR_INSET_IPV4_GTPU_EH, IAVF_INSET_NONE},
125 {iavf_pattern_eth_ipv6_gtpu, IAVF_FDIR_INSET_IPV6_GTPU, IAVF_INSET_NONE},
126 {iavf_pattern_eth_ipv6_gtpu_eh, IAVF_FDIR_INSET_IPV6_GTPU_EH, IAVF_INSET_NONE},
127 {iavf_pattern_eth_ipv4_l2tpv3, IAVF_FDIR_INSET_L2TPV3OIP, IAVF_INSET_NONE},
128 {iavf_pattern_eth_ipv6_l2tpv3, IAVF_FDIR_INSET_L2TPV3OIP, IAVF_INSET_NONE},
129 {iavf_pattern_eth_ipv4_esp, IAVF_FDIR_INSET_ESP, IAVF_INSET_NONE},
130 {iavf_pattern_eth_ipv6_esp, IAVF_FDIR_INSET_ESP, IAVF_INSET_NONE},
131 {iavf_pattern_eth_ipv4_ah, IAVF_FDIR_INSET_AH, IAVF_INSET_NONE},
132 {iavf_pattern_eth_ipv6_ah, IAVF_FDIR_INSET_AH, IAVF_INSET_NONE},
133 {iavf_pattern_eth_ipv4_udp_esp, IAVF_FDIR_INSET_IPV4_NATT_ESP, IAVF_INSET_NONE},
134 {iavf_pattern_eth_ipv6_udp_esp, IAVF_FDIR_INSET_IPV6_NATT_ESP, IAVF_INSET_NONE},
135 {iavf_pattern_eth_ipv4_pfcp, IAVF_FDIR_INSET_PFCP, IAVF_INSET_NONE},
136 {iavf_pattern_eth_ipv6_pfcp, IAVF_FDIR_INSET_PFCP, IAVF_INSET_NONE},
137 {iavf_pattern_eth_ecpri, IAVF_FDIR_INSET_ECPRI, IAVF_INSET_NONE},
138 {iavf_pattern_eth_ipv4_ecpri, IAVF_FDIR_INSET_ECPRI, IAVF_INSET_NONE},
141 static struct iavf_flow_parser iavf_fdir_parser;
144 iavf_fdir_init(struct iavf_adapter *ad)
146 struct iavf_info *vf = IAVF_DEV_PRIVATE_TO_VF(ad);
147 struct iavf_flow_parser *parser;
152 if (vf->vf_res->vf_cap_flags & VIRTCHNL_VF_OFFLOAD_FDIR_PF)
153 parser = &iavf_fdir_parser;
157 return iavf_register_parser(parser, ad);
161 iavf_fdir_uninit(struct iavf_adapter *ad)
163 iavf_unregister_parser(&iavf_fdir_parser, ad);
167 iavf_fdir_create(struct iavf_adapter *ad,
168 struct rte_flow *flow,
170 struct rte_flow_error *error)
172 struct iavf_fdir_conf *filter = meta;
173 struct iavf_fdir_conf *rule;
176 rule = rte_zmalloc("fdir_entry", sizeof(*rule), 0);
178 rte_flow_error_set(error, ENOMEM,
179 RTE_FLOW_ERROR_TYPE_HANDLE, NULL,
180 "Failed to allocate memory for fdir rule");
184 ret = iavf_fdir_add(ad, filter);
186 rte_flow_error_set(error, -ret,
187 RTE_FLOW_ERROR_TYPE_HANDLE, NULL,
188 "Failed to add filter rule.");
192 if (filter->mark_flag == 1)
193 iavf_fdir_rx_proc_enable(ad, 1);
195 rte_memcpy(rule, filter, sizeof(*rule));
206 iavf_fdir_destroy(struct iavf_adapter *ad,
207 struct rte_flow *flow,
208 struct rte_flow_error *error)
210 struct iavf_fdir_conf *filter;
213 filter = (struct iavf_fdir_conf *)flow->rule;
215 ret = iavf_fdir_del(ad, filter);
217 rte_flow_error_set(error, -ret,
218 RTE_FLOW_ERROR_TYPE_HANDLE, NULL,
219 "Failed to delete filter rule.");
223 if (filter->mark_flag == 1)
224 iavf_fdir_rx_proc_enable(ad, 0);
233 iavf_fdir_validation(struct iavf_adapter *ad,
234 __rte_unused struct rte_flow *flow,
236 struct rte_flow_error *error)
238 struct iavf_fdir_conf *filter = meta;
241 ret = iavf_fdir_check(ad, filter);
243 rte_flow_error_set(error, -ret,
244 RTE_FLOW_ERROR_TYPE_HANDLE, NULL,
245 "Failed to validate filter rule.");
252 static struct iavf_flow_engine iavf_fdir_engine = {
253 .init = iavf_fdir_init,
254 .uninit = iavf_fdir_uninit,
255 .create = iavf_fdir_create,
256 .destroy = iavf_fdir_destroy,
257 .validation = iavf_fdir_validation,
258 .type = IAVF_FLOW_ENGINE_FDIR,
262 iavf_fdir_parse_action_qregion(struct iavf_adapter *ad,
263 struct rte_flow_error *error,
264 const struct rte_flow_action *act,
265 struct virtchnl_filter_action *filter_action)
267 struct iavf_info *vf = IAVF_DEV_PRIVATE_TO_VF(ad);
268 const struct rte_flow_action_rss *rss = act->conf;
271 if (act->type != RTE_FLOW_ACTION_TYPE_RSS) {
272 rte_flow_error_set(error, EINVAL,
273 RTE_FLOW_ERROR_TYPE_ACTION, act,
278 if (rss->queue_num <= 1) {
279 rte_flow_error_set(error, EINVAL,
280 RTE_FLOW_ERROR_TYPE_ACTION, act,
281 "Queue region size can't be 0 or 1.");
285 /* check if queue index for queue region is continuous */
286 for (i = 0; i < rss->queue_num - 1; i++) {
287 if (rss->queue[i + 1] != rss->queue[i] + 1) {
288 rte_flow_error_set(error, EINVAL,
289 RTE_FLOW_ERROR_TYPE_ACTION, act,
290 "Discontinuous queue region");
295 if (rss->queue[rss->queue_num - 1] >= ad->eth_dev->data->nb_rx_queues) {
296 rte_flow_error_set(error, EINVAL,
297 RTE_FLOW_ERROR_TYPE_ACTION, act,
298 "Invalid queue region indexes.");
302 if (!(rte_is_power_of_2(rss->queue_num) &&
303 rss->queue_num <= IAVF_FDIR_MAX_QREGION_SIZE)) {
304 rte_flow_error_set(error, EINVAL,
305 RTE_FLOW_ERROR_TYPE_ACTION, act,
306 "The region size should be any of the following values:"
307 "1, 2, 4, 8, 16, 32, 64, 128 as long as the total number "
308 "of queues do not exceed the VSI allocation.");
312 if (rss->queue_num > vf->max_rss_qregion) {
313 rte_flow_error_set(error, EINVAL,
314 RTE_FLOW_ERROR_TYPE_ACTION, act,
315 "The region size cannot be large than the supported max RSS queue region");
319 filter_action->act_conf.queue.index = rss->queue[0];
320 filter_action->act_conf.queue.region = rte_fls_u32(rss->queue_num) - 1;
326 iavf_fdir_parse_action(struct iavf_adapter *ad,
327 const struct rte_flow_action actions[],
328 struct rte_flow_error *error,
329 struct iavf_fdir_conf *filter)
331 const struct rte_flow_action_queue *act_q;
332 const struct rte_flow_action_mark *mark_spec = NULL;
333 uint32_t dest_num = 0;
334 uint32_t mark_num = 0;
338 struct virtchnl_filter_action *filter_action;
340 for (; actions->type != RTE_FLOW_ACTION_TYPE_END; actions++) {
341 switch (actions->type) {
342 case RTE_FLOW_ACTION_TYPE_VOID:
345 case RTE_FLOW_ACTION_TYPE_PASSTHRU:
348 filter_action = &filter->add_fltr.rule_cfg.action_set.actions[number];
350 filter_action->type = VIRTCHNL_ACTION_PASSTHRU;
352 filter->add_fltr.rule_cfg.action_set.count = ++number;
355 case RTE_FLOW_ACTION_TYPE_DROP:
358 filter_action = &filter->add_fltr.rule_cfg.action_set.actions[number];
360 filter_action->type = VIRTCHNL_ACTION_DROP;
362 filter->add_fltr.rule_cfg.action_set.count = ++number;
365 case RTE_FLOW_ACTION_TYPE_QUEUE:
368 act_q = actions->conf;
369 filter_action = &filter->add_fltr.rule_cfg.action_set.actions[number];
371 filter_action->type = VIRTCHNL_ACTION_QUEUE;
372 filter_action->act_conf.queue.index = act_q->index;
374 if (filter_action->act_conf.queue.index >=
375 ad->eth_dev->data->nb_rx_queues) {
376 rte_flow_error_set(error, EINVAL,
377 RTE_FLOW_ERROR_TYPE_ACTION,
378 actions, "Invalid queue for FDIR.");
382 filter->add_fltr.rule_cfg.action_set.count = ++number;
385 case RTE_FLOW_ACTION_TYPE_RSS:
388 filter_action = &filter->add_fltr.rule_cfg.action_set.actions[number];
390 filter_action->type = VIRTCHNL_ACTION_Q_REGION;
392 ret = iavf_fdir_parse_action_qregion(ad,
393 error, actions, filter_action);
397 filter->add_fltr.rule_cfg.action_set.count = ++number;
400 case RTE_FLOW_ACTION_TYPE_MARK:
403 filter->mark_flag = 1;
404 mark_spec = actions->conf;
405 filter_action = &filter->add_fltr.rule_cfg.action_set.actions[number];
407 filter_action->type = VIRTCHNL_ACTION_MARK;
408 filter_action->act_conf.mark_id = mark_spec->id;
410 filter->add_fltr.rule_cfg.action_set.count = ++number;
414 rte_flow_error_set(error, EINVAL,
415 RTE_FLOW_ERROR_TYPE_ACTION, actions,
421 if (number > VIRTCHNL_MAX_NUM_ACTIONS) {
422 rte_flow_error_set(error, EINVAL,
423 RTE_FLOW_ERROR_TYPE_ACTION, actions,
424 "Action numbers exceed the maximum value");
429 rte_flow_error_set(error, EINVAL,
430 RTE_FLOW_ERROR_TYPE_ACTION, actions,
431 "Unsupported action combination");
436 rte_flow_error_set(error, EINVAL,
437 RTE_FLOW_ERROR_TYPE_ACTION, actions,
438 "Too many mark actions");
442 if (dest_num + mark_num == 0) {
443 rte_flow_error_set(error, EINVAL,
444 RTE_FLOW_ERROR_TYPE_ACTION, actions,
449 /* Mark only is equal to mark + passthru. */
451 filter_action = &filter->add_fltr.rule_cfg.action_set.actions[number];
452 filter_action->type = VIRTCHNL_ACTION_PASSTHRU;
453 filter->add_fltr.rule_cfg.action_set.count = ++number;
460 iavf_fdir_parse_pattern(__rte_unused struct iavf_adapter *ad,
461 const struct rte_flow_item pattern[],
462 struct rte_flow_error *error,
463 struct iavf_fdir_conf *filter)
465 const struct rte_flow_item *item = pattern;
466 enum rte_flow_item_type item_type;
467 enum rte_flow_item_type l3 = RTE_FLOW_ITEM_TYPE_END;
468 const struct rte_flow_item_eth *eth_spec, *eth_mask;
469 const struct rte_flow_item_ipv4 *ipv4_spec, *ipv4_mask;
470 const struct rte_flow_item_ipv6 *ipv6_spec, *ipv6_mask;
471 const struct rte_flow_item_udp *udp_spec, *udp_mask;
472 const struct rte_flow_item_tcp *tcp_spec, *tcp_mask;
473 const struct rte_flow_item_sctp *sctp_spec, *sctp_mask;
474 const struct rte_flow_item_gtp *gtp_spec, *gtp_mask;
475 const struct rte_flow_item_gtp_psc *gtp_psc_spec, *gtp_psc_mask;
476 const struct rte_flow_item_l2tpv3oip *l2tpv3oip_spec, *l2tpv3oip_mask;
477 const struct rte_flow_item_esp *esp_spec, *esp_mask;
478 const struct rte_flow_item_ah *ah_spec, *ah_mask;
479 const struct rte_flow_item_pfcp *pfcp_spec, *pfcp_mask;
480 const struct rte_flow_item_ecpri *ecpri_spec, *ecpri_mask;
481 struct rte_ecpri_common_hdr ecpri_common;
482 uint64_t input_set = IAVF_INSET_NONE;
484 enum rte_flow_item_type next_type;
488 struct virtchnl_proto_hdr *hdr;
490 uint8_t ipv6_addr_mask[16] = {
491 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
492 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF
495 for (item = pattern; item->type != RTE_FLOW_ITEM_TYPE_END; item++) {
497 rte_flow_error_set(error, EINVAL,
498 RTE_FLOW_ERROR_TYPE_ITEM, item,
499 "Not support range");
502 item_type = item->type;
505 case RTE_FLOW_ITEM_TYPE_ETH:
506 eth_spec = item->spec;
507 eth_mask = item->mask;
508 next_type = (item + 1)->type;
510 hdr = &filter->add_fltr.rule_cfg.proto_hdrs.proto_hdr[layer];
512 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, ETH);
514 if (next_type == RTE_FLOW_ITEM_TYPE_END &&
515 (!eth_spec || !eth_mask)) {
516 rte_flow_error_set(error, EINVAL,
517 RTE_FLOW_ERROR_TYPE_ITEM,
518 item, "NULL eth spec/mask.");
522 if (eth_spec && eth_mask) {
523 if (!rte_is_zero_ether_addr(ð_mask->src) ||
524 !rte_is_zero_ether_addr(ð_mask->dst)) {
525 rte_flow_error_set(error, EINVAL,
526 RTE_FLOW_ERROR_TYPE_ITEM, item,
527 "Invalid MAC_addr mask.");
532 if (eth_spec && eth_mask && eth_mask->type) {
533 if (eth_mask->type != RTE_BE16(0xffff)) {
534 rte_flow_error_set(error, EINVAL,
535 RTE_FLOW_ERROR_TYPE_ITEM,
536 item, "Invalid type mask.");
540 ether_type = rte_be_to_cpu_16(eth_spec->type);
541 if (ether_type == RTE_ETHER_TYPE_IPV4 ||
542 ether_type == RTE_ETHER_TYPE_IPV6) {
543 rte_flow_error_set(error, EINVAL,
544 RTE_FLOW_ERROR_TYPE_ITEM,
546 "Unsupported ether_type.");
550 input_set |= IAVF_INSET_ETHERTYPE;
551 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, ETH, ETHERTYPE);
553 rte_memcpy(hdr->buffer,
554 eth_spec, sizeof(struct rte_ether_hdr));
557 filter->add_fltr.rule_cfg.proto_hdrs.count = ++layer;
560 case RTE_FLOW_ITEM_TYPE_IPV4:
561 l3 = RTE_FLOW_ITEM_TYPE_IPV4;
562 ipv4_spec = item->spec;
563 ipv4_mask = item->mask;
565 hdr = &filter->add_fltr.rule_cfg.proto_hdrs.proto_hdr[layer];
567 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, IPV4);
569 if (ipv4_spec && ipv4_mask) {
570 if (ipv4_mask->hdr.version_ihl ||
571 ipv4_mask->hdr.total_length ||
572 ipv4_mask->hdr.packet_id ||
573 ipv4_mask->hdr.fragment_offset ||
574 ipv4_mask->hdr.hdr_checksum) {
575 rte_flow_error_set(error, EINVAL,
576 RTE_FLOW_ERROR_TYPE_ITEM,
577 item, "Invalid IPv4 mask.");
581 if (ipv4_mask->hdr.type_of_service ==
583 input_set |= IAVF_INSET_IPV4_TOS;
584 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, IPV4, DSCP);
586 if (ipv4_mask->hdr.next_proto_id == UINT8_MAX) {
587 input_set |= IAVF_INSET_IPV4_PROTO;
588 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, IPV4, PROT);
590 if (ipv4_mask->hdr.time_to_live == UINT8_MAX) {
591 input_set |= IAVF_INSET_IPV4_TTL;
592 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, IPV4, TTL);
594 if (ipv4_mask->hdr.src_addr == UINT32_MAX) {
595 input_set |= IAVF_INSET_IPV4_SRC;
596 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, IPV4, SRC);
598 if (ipv4_mask->hdr.dst_addr == UINT32_MAX) {
599 input_set |= IAVF_INSET_IPV4_DST;
600 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, IPV4, DST);
603 rte_memcpy(hdr->buffer,
605 sizeof(ipv4_spec->hdr));
608 filter->add_fltr.rule_cfg.proto_hdrs.count = ++layer;
611 case RTE_FLOW_ITEM_TYPE_IPV6:
612 l3 = RTE_FLOW_ITEM_TYPE_IPV6;
613 ipv6_spec = item->spec;
614 ipv6_mask = item->mask;
616 hdr = &filter->add_fltr.rule_cfg.proto_hdrs.proto_hdr[layer];
618 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, IPV6);
620 if (ipv6_spec && ipv6_mask) {
621 if (ipv6_mask->hdr.payload_len) {
622 rte_flow_error_set(error, EINVAL,
623 RTE_FLOW_ERROR_TYPE_ITEM,
624 item, "Invalid IPv6 mask");
628 if ((ipv6_mask->hdr.vtc_flow &
629 rte_cpu_to_be_32(IAVF_IPV6_TC_MASK))
630 == rte_cpu_to_be_32(IAVF_IPV6_TC_MASK)) {
631 input_set |= IAVF_INSET_IPV6_TC;
632 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, IPV6, TC);
634 if (ipv6_mask->hdr.proto == UINT8_MAX) {
635 input_set |= IAVF_INSET_IPV6_NEXT_HDR;
636 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, IPV6, PROT);
638 if (ipv6_mask->hdr.hop_limits == UINT8_MAX) {
639 input_set |= IAVF_INSET_IPV6_HOP_LIMIT;
640 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, IPV6, HOP_LIMIT);
642 if (!memcmp(ipv6_mask->hdr.src_addr,
644 RTE_DIM(ipv6_mask->hdr.src_addr))) {
645 input_set |= IAVF_INSET_IPV6_SRC;
646 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, IPV6, SRC);
648 if (!memcmp(ipv6_mask->hdr.dst_addr,
650 RTE_DIM(ipv6_mask->hdr.dst_addr))) {
651 input_set |= IAVF_INSET_IPV6_DST;
652 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, IPV6, DST);
655 rte_memcpy(hdr->buffer,
657 sizeof(ipv6_spec->hdr));
660 filter->add_fltr.rule_cfg.proto_hdrs.count = ++layer;
663 case RTE_FLOW_ITEM_TYPE_UDP:
664 udp_spec = item->spec;
665 udp_mask = item->mask;
667 hdr = &filter->add_fltr.rule_cfg.proto_hdrs.proto_hdr[layer];
669 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, UDP);
671 if (udp_spec && udp_mask) {
672 if (udp_mask->hdr.dgram_len ||
673 udp_mask->hdr.dgram_cksum) {
674 rte_flow_error_set(error, EINVAL,
675 RTE_FLOW_ERROR_TYPE_ITEM, item,
680 if (udp_mask->hdr.src_port == UINT16_MAX) {
681 input_set |= IAVF_INSET_UDP_SRC_PORT;
682 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, UDP, SRC_PORT);
684 if (udp_mask->hdr.dst_port == UINT16_MAX) {
685 input_set |= IAVF_INSET_UDP_DST_PORT;
686 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, UDP, DST_PORT);
689 if (l3 == RTE_FLOW_ITEM_TYPE_IPV4)
690 rte_memcpy(hdr->buffer,
692 sizeof(udp_spec->hdr));
693 else if (l3 == RTE_FLOW_ITEM_TYPE_IPV6)
694 rte_memcpy(hdr->buffer,
696 sizeof(udp_spec->hdr));
699 filter->add_fltr.rule_cfg.proto_hdrs.count = ++layer;
702 case RTE_FLOW_ITEM_TYPE_TCP:
703 tcp_spec = item->spec;
704 tcp_mask = item->mask;
706 hdr = &filter->add_fltr.rule_cfg.proto_hdrs.proto_hdr[layer];
708 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, TCP);
710 if (tcp_spec && tcp_mask) {
711 if (tcp_mask->hdr.sent_seq ||
712 tcp_mask->hdr.recv_ack ||
713 tcp_mask->hdr.data_off ||
714 tcp_mask->hdr.tcp_flags ||
715 tcp_mask->hdr.rx_win ||
716 tcp_mask->hdr.cksum ||
717 tcp_mask->hdr.tcp_urp) {
718 rte_flow_error_set(error, EINVAL,
719 RTE_FLOW_ERROR_TYPE_ITEM, item,
724 if (tcp_mask->hdr.src_port == UINT16_MAX) {
725 input_set |= IAVF_INSET_TCP_SRC_PORT;
726 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, TCP, SRC_PORT);
728 if (tcp_mask->hdr.dst_port == UINT16_MAX) {
729 input_set |= IAVF_INSET_TCP_DST_PORT;
730 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, TCP, DST_PORT);
733 if (l3 == RTE_FLOW_ITEM_TYPE_IPV4)
734 rte_memcpy(hdr->buffer,
736 sizeof(tcp_spec->hdr));
737 else if (l3 == RTE_FLOW_ITEM_TYPE_IPV6)
738 rte_memcpy(hdr->buffer,
740 sizeof(tcp_spec->hdr));
743 filter->add_fltr.rule_cfg.proto_hdrs.count = ++layer;
746 case RTE_FLOW_ITEM_TYPE_SCTP:
747 sctp_spec = item->spec;
748 sctp_mask = item->mask;
750 hdr = &filter->add_fltr.rule_cfg.proto_hdrs.proto_hdr[layer];
752 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, SCTP);
754 if (sctp_spec && sctp_mask) {
755 if (sctp_mask->hdr.cksum) {
756 rte_flow_error_set(error, EINVAL,
757 RTE_FLOW_ERROR_TYPE_ITEM, item,
762 if (sctp_mask->hdr.src_port == UINT16_MAX) {
763 input_set |= IAVF_INSET_SCTP_SRC_PORT;
764 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, SCTP, SRC_PORT);
766 if (sctp_mask->hdr.dst_port == UINT16_MAX) {
767 input_set |= IAVF_INSET_SCTP_DST_PORT;
768 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, SCTP, DST_PORT);
771 if (l3 == RTE_FLOW_ITEM_TYPE_IPV4)
772 rte_memcpy(hdr->buffer,
774 sizeof(sctp_spec->hdr));
775 else if (l3 == RTE_FLOW_ITEM_TYPE_IPV6)
776 rte_memcpy(hdr->buffer,
778 sizeof(sctp_spec->hdr));
781 filter->add_fltr.rule_cfg.proto_hdrs.count = ++layer;
784 case RTE_FLOW_ITEM_TYPE_GTPU:
785 gtp_spec = item->spec;
786 gtp_mask = item->mask;
788 hdr = &filter->add_fltr.rule_cfg.proto_hdrs.proto_hdr[layer];
790 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, GTPU_IP);
792 if (gtp_spec && gtp_mask) {
793 if (gtp_mask->v_pt_rsv_flags ||
794 gtp_mask->msg_type ||
796 rte_flow_error_set(error, EINVAL,
797 RTE_FLOW_ERROR_TYPE_ITEM,
798 item, "Invalid GTP mask");
802 if (gtp_mask->teid == UINT32_MAX) {
803 input_set |= IAVF_INSET_GTPU_TEID;
804 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, GTPU_IP, TEID);
807 rte_memcpy(hdr->buffer,
808 gtp_spec, sizeof(*gtp_spec));
811 filter->add_fltr.rule_cfg.proto_hdrs.count = ++layer;
814 case RTE_FLOW_ITEM_TYPE_GTP_PSC:
815 gtp_psc_spec = item->spec;
816 gtp_psc_mask = item->mask;
818 hdr = &filter->add_fltr.rule_cfg.proto_hdrs.proto_hdr[layer];
821 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, GTPU_EH);
822 else if ((gtp_psc_mask->qfi) && !(gtp_psc_mask->pdu_type))
823 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, GTPU_EH);
824 else if (gtp_psc_spec->pdu_type == IAVF_GTPU_EH_UPLINK)
825 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, GTPU_EH_PDU_UP);
826 else if (gtp_psc_spec->pdu_type == IAVF_GTPU_EH_DWLINK)
827 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, GTPU_EH_PDU_DWN);
829 if (gtp_psc_spec && gtp_psc_mask) {
830 if (gtp_psc_mask->qfi == UINT8_MAX) {
831 input_set |= IAVF_INSET_GTPU_QFI;
832 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, GTPU_EH, QFI);
835 rte_memcpy(hdr->buffer, gtp_psc_spec,
836 sizeof(*gtp_psc_spec));
839 filter->add_fltr.rule_cfg.proto_hdrs.count = ++layer;
842 case RTE_FLOW_ITEM_TYPE_L2TPV3OIP:
843 l2tpv3oip_spec = item->spec;
844 l2tpv3oip_mask = item->mask;
846 hdr = &filter->add_fltr.rule_cfg.proto_hdrs.proto_hdr[layer];
848 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, L2TPV3);
850 if (l2tpv3oip_spec && l2tpv3oip_mask) {
851 if (l2tpv3oip_mask->session_id == UINT32_MAX) {
852 input_set |= IAVF_L2TPV3OIP_SESSION_ID;
853 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, L2TPV3, SESS_ID);
856 rte_memcpy(hdr->buffer, l2tpv3oip_spec,
857 sizeof(*l2tpv3oip_spec));
860 filter->add_fltr.rule_cfg.proto_hdrs.count = ++layer;
863 case RTE_FLOW_ITEM_TYPE_ESP:
864 esp_spec = item->spec;
865 esp_mask = item->mask;
867 hdr = &filter->add_fltr.rule_cfg.proto_hdrs.proto_hdr[layer];
869 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, ESP);
871 if (esp_spec && esp_mask) {
872 if (esp_mask->hdr.spi == UINT32_MAX) {
873 input_set |= IAVF_INSET_ESP_SPI;
874 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, ESP, SPI);
877 rte_memcpy(hdr->buffer, &esp_spec->hdr,
878 sizeof(esp_spec->hdr));
881 filter->add_fltr.rule_cfg.proto_hdrs.count = ++layer;
884 case RTE_FLOW_ITEM_TYPE_AH:
885 ah_spec = item->spec;
886 ah_mask = item->mask;
888 hdr = &filter->add_fltr.rule_cfg.proto_hdrs.proto_hdr[layer];
890 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, AH);
892 if (ah_spec && ah_mask) {
893 if (ah_mask->spi == UINT32_MAX) {
894 input_set |= IAVF_INSET_AH_SPI;
895 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, AH, SPI);
898 rte_memcpy(hdr->buffer, ah_spec,
902 filter->add_fltr.rule_cfg.proto_hdrs.count = ++layer;
905 case RTE_FLOW_ITEM_TYPE_PFCP:
906 pfcp_spec = item->spec;
907 pfcp_mask = item->mask;
909 hdr = &filter->add_fltr.rule_cfg.proto_hdrs.proto_hdr[layer];
911 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, PFCP);
913 if (pfcp_spec && pfcp_mask) {
914 if (pfcp_mask->s_field == UINT8_MAX) {
915 input_set |= IAVF_INSET_PFCP_S_FIELD;
916 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, PFCP, S_FIELD);
919 rte_memcpy(hdr->buffer, pfcp_spec,
923 filter->add_fltr.rule_cfg.proto_hdrs.count = ++layer;
926 case RTE_FLOW_ITEM_TYPE_ECPRI:
927 ecpri_spec = item->spec;
928 ecpri_mask = item->mask;
930 ecpri_common.u32 = rte_be_to_cpu_32(ecpri_spec->hdr.common.u32);
932 hdr = &filter->add_fltr.rule_cfg.proto_hdrs.proto_hdr[layer];
934 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, ECPRI);
936 if (ecpri_spec && ecpri_mask) {
937 if (ecpri_common.type == RTE_ECPRI_MSG_TYPE_IQ_DATA &&
938 ecpri_mask->hdr.type0.pc_id == UINT16_MAX) {
939 input_set |= IAVF_ECPRI_PC_RTC_ID;
940 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, ECPRI,
944 rte_memcpy(hdr->buffer, ecpri_spec,
945 sizeof(*ecpri_spec));
948 filter->add_fltr.rule_cfg.proto_hdrs.count = ++layer;
951 case RTE_FLOW_ITEM_TYPE_VOID:
955 rte_flow_error_set(error, EINVAL,
956 RTE_FLOW_ERROR_TYPE_ITEM, item,
957 "Invalid pattern item.");
962 if (layer > VIRTCHNL_MAX_NUM_PROTO_HDRS) {
963 rte_flow_error_set(error, EINVAL,
964 RTE_FLOW_ERROR_TYPE_ITEM, item,
965 "Protocol header layers exceed the maximum value");
969 filter->input_set = input_set;
975 iavf_fdir_parse(struct iavf_adapter *ad,
976 struct iavf_pattern_match_item *array,
978 const struct rte_flow_item pattern[],
979 const struct rte_flow_action actions[],
981 struct rte_flow_error *error)
983 struct iavf_info *vf = IAVF_DEV_PRIVATE_TO_VF(ad);
984 struct iavf_fdir_conf *filter = &vf->fdir.conf;
985 struct iavf_pattern_match_item *item = NULL;
989 memset(filter, 0, sizeof(*filter));
991 item = iavf_search_pattern_match_item(pattern, array, array_len, error);
995 ret = iavf_fdir_parse_pattern(ad, pattern, error, filter);
999 input_set = filter->input_set;
1000 if (!input_set || input_set & ~item->input_set_mask) {
1001 rte_flow_error_set(error, EINVAL,
1002 RTE_FLOW_ERROR_TYPE_ITEM_SPEC, pattern,
1003 "Invalid input set");
1008 ret = iavf_fdir_parse_action(ad, actions, error, filter);
1020 static struct iavf_flow_parser iavf_fdir_parser = {
1021 .engine = &iavf_fdir_engine,
1022 .array = iavf_fdir_pattern,
1023 .array_len = RTE_DIM(iavf_fdir_pattern),
1024 .parse_pattern_action = iavf_fdir_parse,
1025 .stage = IAVF_FLOW_STAGE_DISTRIBUTOR,
1028 RTE_INIT(iavf_fdir_engine_register)
1030 iavf_register_flow_engine(&iavf_fdir_engine);