1 /* SPDX-License-Identifier: BSD-3-Clause
2 * Copyright(c) 2020 Intel Corporation
13 #include <rte_ether.h>
14 #include <ethdev_driver.h>
15 #include <rte_malloc.h>
16 #include <rte_tailq.h>
19 #include "iavf_generic_flow.h"
21 #include "iavf_rxtx.h"
23 #define IAVF_FDIR_MAX_QREGION_SIZE 128
25 #define IAVF_FDIR_IPV6_TC_OFFSET 20
26 #define IAVF_IPV6_TC_MASK (0xFF << IAVF_FDIR_IPV6_TC_OFFSET)
28 #define IAVF_GTPU_EH_DWLINK 0
29 #define IAVF_GTPU_EH_UPLINK 1
31 #define IAVF_FDIR_INSET_ETH (\
34 #define IAVF_FDIR_INSET_ETH_IPV4 (\
35 IAVF_INSET_IPV4_SRC | IAVF_INSET_IPV4_DST | \
36 IAVF_INSET_IPV4_PROTO | IAVF_INSET_IPV4_TOS | \
37 IAVF_INSET_IPV4_TTL | IAVF_INSET_IPV4_ID)
39 #define IAVF_FDIR_INSET_ETH_IPV4_UDP (\
40 IAVF_INSET_IPV4_SRC | IAVF_INSET_IPV4_DST | \
41 IAVF_INSET_IPV4_TOS | IAVF_INSET_IPV4_TTL | \
42 IAVF_INSET_UDP_SRC_PORT | IAVF_INSET_UDP_DST_PORT)
44 #define IAVF_FDIR_INSET_ETH_IPV4_TCP (\
45 IAVF_INSET_IPV4_SRC | IAVF_INSET_IPV4_DST | \
46 IAVF_INSET_IPV4_TOS | IAVF_INSET_IPV4_TTL | \
47 IAVF_INSET_TCP_SRC_PORT | IAVF_INSET_TCP_DST_PORT)
49 #define IAVF_FDIR_INSET_ETH_IPV4_SCTP (\
50 IAVF_INSET_IPV4_SRC | IAVF_INSET_IPV4_DST | \
51 IAVF_INSET_IPV4_TOS | IAVF_INSET_IPV4_TTL | \
52 IAVF_INSET_SCTP_SRC_PORT | IAVF_INSET_SCTP_DST_PORT)
54 #define IAVF_FDIR_INSET_ETH_IPV6 (\
55 IAVF_INSET_IPV6_SRC | IAVF_INSET_IPV6_DST | \
56 IAVF_INSET_IPV6_NEXT_HDR | IAVF_INSET_IPV6_TC | \
57 IAVF_INSET_IPV6_HOP_LIMIT)
59 #define IAVF_FDIR_INSET_ETH_IPV6_FRAG_EXT (\
62 #define IAVF_FDIR_INSET_ETH_IPV6_UDP (\
63 IAVF_INSET_IPV6_SRC | IAVF_INSET_IPV6_DST | \
64 IAVF_INSET_IPV6_TC | IAVF_INSET_IPV6_HOP_LIMIT | \
65 IAVF_INSET_UDP_SRC_PORT | IAVF_INSET_UDP_DST_PORT)
67 #define IAVF_FDIR_INSET_ETH_IPV6_TCP (\
68 IAVF_INSET_IPV6_SRC | IAVF_INSET_IPV6_DST | \
69 IAVF_INSET_IPV6_TC | IAVF_INSET_IPV6_HOP_LIMIT | \
70 IAVF_INSET_TCP_SRC_PORT | IAVF_INSET_TCP_DST_PORT)
72 #define IAVF_FDIR_INSET_ETH_IPV6_SCTP (\
73 IAVF_INSET_IPV6_SRC | IAVF_INSET_IPV6_DST | \
74 IAVF_INSET_IPV6_TC | IAVF_INSET_IPV6_HOP_LIMIT | \
75 IAVF_INSET_SCTP_SRC_PORT | IAVF_INSET_SCTP_DST_PORT)
77 #define IAVF_FDIR_INSET_IPV4_GTPU (\
78 IAVF_INSET_IPV4_SRC | IAVF_INSET_IPV4_DST | \
81 #define IAVF_FDIR_INSET_GTPU_IPV4 (\
82 IAVF_INSET_TUN_IPV4_SRC | IAVF_INSET_TUN_IPV4_DST | \
83 IAVF_INSET_TUN_IPV4_PROTO | IAVF_INSET_TUN_IPV4_TOS | \
84 IAVF_INSET_TUN_IPV4_TTL)
86 #define IAVF_FDIR_INSET_GTPU_IPV4_UDP (\
87 IAVF_FDIR_INSET_GTPU_IPV4 | \
88 IAVF_INSET_TUN_UDP_SRC_PORT | IAVF_INSET_TUN_UDP_DST_PORT)
90 #define IAVF_FDIR_INSET_GTPU_IPV4_TCP (\
91 IAVF_FDIR_INSET_GTPU_IPV4 | \
92 IAVF_INSET_TUN_TCP_SRC_PORT | IAVF_INSET_TUN_TCP_DST_PORT)
94 #define IAVF_FDIR_INSET_IPV4_GTPU_EH (\
95 IAVF_INSET_IPV4_SRC | IAVF_INSET_IPV4_DST | \
96 IAVF_INSET_GTPU_TEID | IAVF_INSET_GTPU_QFI)
98 #define IAVF_FDIR_INSET_IPV6_GTPU (\
99 IAVF_INSET_IPV6_SRC | IAVF_INSET_IPV6_DST | \
100 IAVF_INSET_GTPU_TEID)
102 #define IAVF_FDIR_INSET_GTPU_IPV6 (\
103 IAVF_INSET_TUN_IPV6_SRC | IAVF_INSET_TUN_IPV6_DST | \
104 IAVF_INSET_TUN_IPV6_NEXT_HDR | IAVF_INSET_TUN_IPV6_TC | \
105 IAVF_INSET_TUN_IPV6_HOP_LIMIT)
107 #define IAVF_FDIR_INSET_GTPU_IPV6_UDP (\
108 IAVF_FDIR_INSET_GTPU_IPV6 | \
109 IAVF_INSET_TUN_UDP_SRC_PORT | IAVF_INSET_TUN_UDP_DST_PORT)
111 #define IAVF_FDIR_INSET_GTPU_IPV6_TCP (\
112 IAVF_FDIR_INSET_GTPU_IPV6 | \
113 IAVF_INSET_TUN_TCP_SRC_PORT | IAVF_INSET_TUN_TCP_DST_PORT)
115 #define IAVF_FDIR_INSET_IPV6_GTPU_EH (\
116 IAVF_INSET_IPV6_SRC | IAVF_INSET_IPV6_DST | \
117 IAVF_INSET_GTPU_TEID | IAVF_INSET_GTPU_QFI)
119 #define IAVF_FDIR_INSET_L2TPV3OIP (\
120 IAVF_L2TPV3OIP_SESSION_ID)
122 #define IAVF_FDIR_INSET_IPV4_ESP (\
123 IAVF_INSET_IPV4_SRC | IAVF_INSET_IPV4_DST | \
126 #define IAVF_FDIR_INSET_IPV6_ESP (\
127 IAVF_INSET_IPV6_SRC | IAVF_INSET_IPV6_DST | \
130 #define IAVF_FDIR_INSET_AH (\
133 #define IAVF_FDIR_INSET_IPV4_NATT_ESP (\
134 IAVF_INSET_IPV4_SRC | IAVF_INSET_IPV4_DST | \
137 #define IAVF_FDIR_INSET_IPV6_NATT_ESP (\
138 IAVF_INSET_IPV6_SRC | IAVF_INSET_IPV6_DST | \
141 #define IAVF_FDIR_INSET_PFCP (\
142 IAVF_INSET_PFCP_S_FIELD)
144 #define IAVF_FDIR_INSET_ECPRI (\
147 #define IAVF_FDIR_INSET_GRE_IPV4 (\
148 IAVF_INSET_TUN_IPV4_SRC | IAVF_INSET_TUN_IPV4_DST | \
149 IAVF_INSET_TUN_IPV4_TOS | IAVF_INSET_TUN_IPV4_PROTO)
151 #define IAVF_FDIR_INSET_GRE_IPV4_TCP (\
152 IAVF_FDIR_INSET_GRE_IPV4 | IAVF_INSET_TUN_TCP_SRC_PORT | \
153 IAVF_INSET_TUN_TCP_DST_PORT)
155 #define IAVF_FDIR_INSET_GRE_IPV4_UDP (\
156 IAVF_FDIR_INSET_GRE_IPV4 | IAVF_INSET_TUN_UDP_SRC_PORT | \
157 IAVF_INSET_TUN_UDP_DST_PORT)
159 #define IAVF_FDIR_INSET_GRE_IPV6 (\
160 IAVF_INSET_TUN_IPV6_SRC | IAVF_INSET_TUN_IPV6_DST | \
161 IAVF_INSET_TUN_IPV6_TC | IAVF_INSET_TUN_IPV6_NEXT_HDR)
163 #define IAVF_FDIR_INSET_GRE_IPV6_TCP (\
164 IAVF_FDIR_INSET_GRE_IPV6 | IAVF_INSET_TUN_TCP_SRC_PORT | \
165 IAVF_INSET_TUN_TCP_DST_PORT)
167 #define IAVF_FDIR_INSET_GRE_IPV6_UDP (\
168 IAVF_FDIR_INSET_GRE_IPV6 | IAVF_INSET_TUN_UDP_SRC_PORT | \
169 IAVF_INSET_TUN_UDP_DST_PORT)
171 static struct iavf_pattern_match_item iavf_fdir_pattern[] = {
172 {iavf_pattern_ethertype, IAVF_FDIR_INSET_ETH, IAVF_INSET_NONE},
173 {iavf_pattern_eth_ipv4, IAVF_FDIR_INSET_ETH_IPV4, IAVF_INSET_NONE},
174 {iavf_pattern_eth_ipv4_udp, IAVF_FDIR_INSET_ETH_IPV4_UDP, IAVF_INSET_NONE},
175 {iavf_pattern_eth_ipv4_tcp, IAVF_FDIR_INSET_ETH_IPV4_TCP, IAVF_INSET_NONE},
176 {iavf_pattern_eth_ipv4_sctp, IAVF_FDIR_INSET_ETH_IPV4_SCTP, IAVF_INSET_NONE},
177 {iavf_pattern_eth_ipv6, IAVF_FDIR_INSET_ETH_IPV6, IAVF_INSET_NONE},
178 {iavf_pattern_eth_ipv6_frag_ext, IAVF_FDIR_INSET_ETH_IPV6_FRAG_EXT, IAVF_INSET_NONE},
179 {iavf_pattern_eth_ipv6_udp, IAVF_FDIR_INSET_ETH_IPV6_UDP, IAVF_INSET_NONE},
180 {iavf_pattern_eth_ipv6_tcp, IAVF_FDIR_INSET_ETH_IPV6_TCP, IAVF_INSET_NONE},
181 {iavf_pattern_eth_ipv6_sctp, IAVF_FDIR_INSET_ETH_IPV6_SCTP, IAVF_INSET_NONE},
182 {iavf_pattern_eth_ipv4_gtpu, IAVF_FDIR_INSET_IPV4_GTPU, IAVF_INSET_NONE},
183 {iavf_pattern_eth_ipv4_gtpu_ipv4, IAVF_FDIR_INSET_GTPU_IPV4, IAVF_INSET_NONE},
184 {iavf_pattern_eth_ipv4_gtpu_ipv4_udp, IAVF_FDIR_INSET_GTPU_IPV4_UDP, IAVF_INSET_NONE},
185 {iavf_pattern_eth_ipv4_gtpu_ipv4_tcp, IAVF_FDIR_INSET_GTPU_IPV4_TCP, IAVF_INSET_NONE},
186 {iavf_pattern_eth_ipv4_gtpu_ipv6, IAVF_FDIR_INSET_GTPU_IPV6, IAVF_INSET_NONE},
187 {iavf_pattern_eth_ipv4_gtpu_ipv6_udp, IAVF_FDIR_INSET_GTPU_IPV6_UDP, IAVF_INSET_NONE},
188 {iavf_pattern_eth_ipv4_gtpu_ipv6_tcp, IAVF_FDIR_INSET_GTPU_IPV6_TCP, IAVF_INSET_NONE},
189 {iavf_pattern_eth_ipv4_gtpu_eh, IAVF_FDIR_INSET_IPV4_GTPU_EH, IAVF_INSET_NONE},
190 {iavf_pattern_eth_ipv4_gtpu_eh_ipv4, IAVF_FDIR_INSET_GTPU_IPV4, IAVF_INSET_NONE},
191 {iavf_pattern_eth_ipv4_gtpu_eh_ipv4_udp, IAVF_FDIR_INSET_GTPU_IPV4_UDP, IAVF_INSET_NONE},
192 {iavf_pattern_eth_ipv4_gtpu_eh_ipv4_tcp, IAVF_FDIR_INSET_GTPU_IPV4_TCP, IAVF_INSET_NONE},
193 {iavf_pattern_eth_ipv4_gtpu_eh_ipv6, IAVF_FDIR_INSET_GTPU_IPV6, IAVF_INSET_NONE},
194 {iavf_pattern_eth_ipv4_gtpu_eh_ipv6_udp, IAVF_FDIR_INSET_GTPU_IPV6_UDP, IAVF_INSET_NONE},
195 {iavf_pattern_eth_ipv4_gtpu_eh_ipv6_tcp, IAVF_FDIR_INSET_GTPU_IPV6_TCP, IAVF_INSET_NONE},
196 {iavf_pattern_eth_ipv6_gtpu, IAVF_FDIR_INSET_IPV6_GTPU, IAVF_INSET_NONE},
197 {iavf_pattern_eth_ipv6_gtpu_eh, IAVF_FDIR_INSET_IPV6_GTPU_EH, IAVF_INSET_NONE},
198 {iavf_pattern_eth_ipv4_l2tpv3, IAVF_FDIR_INSET_L2TPV3OIP, IAVF_INSET_NONE},
199 {iavf_pattern_eth_ipv6_l2tpv3, IAVF_FDIR_INSET_L2TPV3OIP, IAVF_INSET_NONE},
200 {iavf_pattern_eth_ipv4_esp, IAVF_FDIR_INSET_IPV4_ESP, IAVF_INSET_NONE},
201 {iavf_pattern_eth_ipv6_esp, IAVF_FDIR_INSET_IPV6_ESP, IAVF_INSET_NONE},
202 {iavf_pattern_eth_ipv4_ah, IAVF_FDIR_INSET_AH, IAVF_INSET_NONE},
203 {iavf_pattern_eth_ipv6_ah, IAVF_FDIR_INSET_AH, IAVF_INSET_NONE},
204 {iavf_pattern_eth_ipv4_udp_esp, IAVF_FDIR_INSET_IPV4_NATT_ESP, IAVF_INSET_NONE},
205 {iavf_pattern_eth_ipv6_udp_esp, IAVF_FDIR_INSET_IPV6_NATT_ESP, IAVF_INSET_NONE},
206 {iavf_pattern_eth_ipv4_pfcp, IAVF_FDIR_INSET_PFCP, IAVF_INSET_NONE},
207 {iavf_pattern_eth_ipv6_pfcp, IAVF_FDIR_INSET_PFCP, IAVF_INSET_NONE},
208 {iavf_pattern_eth_ecpri, IAVF_FDIR_INSET_ECPRI, IAVF_INSET_NONE},
209 {iavf_pattern_eth_ipv4_ecpri, IAVF_FDIR_INSET_ECPRI, IAVF_INSET_NONE},
210 {iavf_pattern_eth_ipv4_gre_ipv4, IAVF_FDIR_INSET_GRE_IPV4, IAVF_INSET_NONE},
211 {iavf_pattern_eth_ipv4_gre_ipv4_tcp, IAVF_FDIR_INSET_GRE_IPV4_TCP, IAVF_INSET_NONE},
212 {iavf_pattern_eth_ipv4_gre_ipv4_udp, IAVF_FDIR_INSET_GRE_IPV4_UDP, IAVF_INSET_NONE},
213 {iavf_pattern_eth_ipv4_gre_ipv6, IAVF_FDIR_INSET_GRE_IPV6, IAVF_INSET_NONE},
214 {iavf_pattern_eth_ipv4_gre_ipv6_tcp, IAVF_FDIR_INSET_GRE_IPV6_TCP, IAVF_INSET_NONE},
215 {iavf_pattern_eth_ipv4_gre_ipv6_udp, IAVF_FDIR_INSET_GRE_IPV6_UDP, IAVF_INSET_NONE},
216 {iavf_pattern_eth_ipv6_gre_ipv4, IAVF_FDIR_INSET_GRE_IPV4, IAVF_INSET_NONE},
217 {iavf_pattern_eth_ipv6_gre_ipv4_tcp, IAVF_FDIR_INSET_GRE_IPV4_TCP, IAVF_INSET_NONE},
218 {iavf_pattern_eth_ipv6_gre_ipv4_udp, IAVF_FDIR_INSET_GRE_IPV4_UDP, IAVF_INSET_NONE},
219 {iavf_pattern_eth_ipv6_gre_ipv6, IAVF_FDIR_INSET_GRE_IPV6, IAVF_INSET_NONE},
220 {iavf_pattern_eth_ipv6_gre_ipv6_tcp, IAVF_FDIR_INSET_GRE_IPV6_TCP, IAVF_INSET_NONE},
221 {iavf_pattern_eth_ipv6_gre_ipv6_udp, IAVF_FDIR_INSET_GRE_IPV6_UDP, IAVF_INSET_NONE},
224 static struct iavf_flow_parser iavf_fdir_parser;
227 iavf_fdir_init(struct iavf_adapter *ad)
229 struct iavf_info *vf = IAVF_DEV_PRIVATE_TO_VF(ad);
230 struct iavf_flow_parser *parser;
235 if (vf->vf_res->vf_cap_flags & VIRTCHNL_VF_OFFLOAD_FDIR_PF)
236 parser = &iavf_fdir_parser;
240 return iavf_register_parser(parser, ad);
244 iavf_fdir_uninit(struct iavf_adapter *ad)
246 iavf_unregister_parser(&iavf_fdir_parser, ad);
250 iavf_fdir_create(struct iavf_adapter *ad,
251 struct rte_flow *flow,
253 struct rte_flow_error *error)
255 struct iavf_fdir_conf *filter = meta;
256 struct iavf_fdir_conf *rule;
259 rule = rte_zmalloc("fdir_entry", sizeof(*rule), 0);
261 rte_flow_error_set(error, ENOMEM,
262 RTE_FLOW_ERROR_TYPE_HANDLE, NULL,
263 "Failed to allocate memory for fdir rule");
267 ret = iavf_fdir_add(ad, filter);
269 rte_flow_error_set(error, -ret,
270 RTE_FLOW_ERROR_TYPE_HANDLE, NULL,
271 "Failed to add filter rule.");
275 if (filter->mark_flag == 1)
276 iavf_fdir_rx_proc_enable(ad, 1);
278 rte_memcpy(rule, filter, sizeof(*rule));
289 iavf_fdir_destroy(struct iavf_adapter *ad,
290 struct rte_flow *flow,
291 struct rte_flow_error *error)
293 struct iavf_fdir_conf *filter;
296 filter = (struct iavf_fdir_conf *)flow->rule;
298 ret = iavf_fdir_del(ad, filter);
300 rte_flow_error_set(error, -ret,
301 RTE_FLOW_ERROR_TYPE_HANDLE, NULL,
302 "Failed to delete filter rule.");
306 if (filter->mark_flag == 1)
307 iavf_fdir_rx_proc_enable(ad, 0);
316 iavf_fdir_validation(struct iavf_adapter *ad,
317 __rte_unused struct rte_flow *flow,
319 struct rte_flow_error *error)
321 struct iavf_fdir_conf *filter = meta;
324 ret = iavf_fdir_check(ad, filter);
326 rte_flow_error_set(error, -ret,
327 RTE_FLOW_ERROR_TYPE_HANDLE, NULL,
328 "Failed to validate filter rule.");
335 static struct iavf_flow_engine iavf_fdir_engine = {
336 .init = iavf_fdir_init,
337 .uninit = iavf_fdir_uninit,
338 .create = iavf_fdir_create,
339 .destroy = iavf_fdir_destroy,
340 .validation = iavf_fdir_validation,
341 .type = IAVF_FLOW_ENGINE_FDIR,
345 iavf_fdir_parse_action_qregion(struct iavf_adapter *ad,
346 struct rte_flow_error *error,
347 const struct rte_flow_action *act,
348 struct virtchnl_filter_action *filter_action)
350 struct iavf_info *vf = IAVF_DEV_PRIVATE_TO_VF(ad);
351 const struct rte_flow_action_rss *rss = act->conf;
354 if (act->type != RTE_FLOW_ACTION_TYPE_RSS) {
355 rte_flow_error_set(error, EINVAL,
356 RTE_FLOW_ERROR_TYPE_ACTION, act,
361 if (rss->queue_num <= 1) {
362 rte_flow_error_set(error, EINVAL,
363 RTE_FLOW_ERROR_TYPE_ACTION, act,
364 "Queue region size can't be 0 or 1.");
368 /* check if queue index for queue region is continuous */
369 for (i = 0; i < rss->queue_num - 1; i++) {
370 if (rss->queue[i + 1] != rss->queue[i] + 1) {
371 rte_flow_error_set(error, EINVAL,
372 RTE_FLOW_ERROR_TYPE_ACTION, act,
373 "Discontinuous queue region");
378 if (rss->queue[rss->queue_num - 1] >= ad->eth_dev->data->nb_rx_queues) {
379 rte_flow_error_set(error, EINVAL,
380 RTE_FLOW_ERROR_TYPE_ACTION, act,
381 "Invalid queue region indexes.");
385 if (!(rte_is_power_of_2(rss->queue_num) &&
386 rss->queue_num <= IAVF_FDIR_MAX_QREGION_SIZE)) {
387 rte_flow_error_set(error, EINVAL,
388 RTE_FLOW_ERROR_TYPE_ACTION, act,
389 "The region size should be any of the following values:"
390 "1, 2, 4, 8, 16, 32, 64, 128 as long as the total number "
391 "of queues do not exceed the VSI allocation.");
395 if (rss->queue_num > vf->max_rss_qregion) {
396 rte_flow_error_set(error, EINVAL,
397 RTE_FLOW_ERROR_TYPE_ACTION, act,
398 "The region size cannot be large than the supported max RSS queue region");
402 filter_action->act_conf.queue.index = rss->queue[0];
403 filter_action->act_conf.queue.region = rte_fls_u32(rss->queue_num) - 1;
409 iavf_fdir_parse_action(struct iavf_adapter *ad,
410 const struct rte_flow_action actions[],
411 struct rte_flow_error *error,
412 struct iavf_fdir_conf *filter)
414 const struct rte_flow_action_queue *act_q;
415 const struct rte_flow_action_mark *mark_spec = NULL;
416 uint32_t dest_num = 0;
417 uint32_t mark_num = 0;
421 struct virtchnl_filter_action *filter_action;
423 for (; actions->type != RTE_FLOW_ACTION_TYPE_END; actions++) {
424 switch (actions->type) {
425 case RTE_FLOW_ACTION_TYPE_VOID:
428 case RTE_FLOW_ACTION_TYPE_PASSTHRU:
431 filter_action = &filter->add_fltr.rule_cfg.action_set.actions[number];
433 filter_action->type = VIRTCHNL_ACTION_PASSTHRU;
435 filter->add_fltr.rule_cfg.action_set.count = ++number;
438 case RTE_FLOW_ACTION_TYPE_DROP:
441 filter_action = &filter->add_fltr.rule_cfg.action_set.actions[number];
443 filter_action->type = VIRTCHNL_ACTION_DROP;
445 filter->add_fltr.rule_cfg.action_set.count = ++number;
448 case RTE_FLOW_ACTION_TYPE_QUEUE:
451 act_q = actions->conf;
452 filter_action = &filter->add_fltr.rule_cfg.action_set.actions[number];
454 filter_action->type = VIRTCHNL_ACTION_QUEUE;
455 filter_action->act_conf.queue.index = act_q->index;
457 if (filter_action->act_conf.queue.index >=
458 ad->eth_dev->data->nb_rx_queues) {
459 rte_flow_error_set(error, EINVAL,
460 RTE_FLOW_ERROR_TYPE_ACTION,
461 actions, "Invalid queue for FDIR.");
465 filter->add_fltr.rule_cfg.action_set.count = ++number;
468 case RTE_FLOW_ACTION_TYPE_RSS:
471 filter_action = &filter->add_fltr.rule_cfg.action_set.actions[number];
473 filter_action->type = VIRTCHNL_ACTION_Q_REGION;
475 ret = iavf_fdir_parse_action_qregion(ad,
476 error, actions, filter_action);
480 filter->add_fltr.rule_cfg.action_set.count = ++number;
483 case RTE_FLOW_ACTION_TYPE_MARK:
486 filter->mark_flag = 1;
487 mark_spec = actions->conf;
488 filter_action = &filter->add_fltr.rule_cfg.action_set.actions[number];
490 filter_action->type = VIRTCHNL_ACTION_MARK;
491 filter_action->act_conf.mark_id = mark_spec->id;
493 filter->add_fltr.rule_cfg.action_set.count = ++number;
497 rte_flow_error_set(error, EINVAL,
498 RTE_FLOW_ERROR_TYPE_ACTION, actions,
504 if (number > VIRTCHNL_MAX_NUM_ACTIONS) {
505 rte_flow_error_set(error, EINVAL,
506 RTE_FLOW_ERROR_TYPE_ACTION, actions,
507 "Action numbers exceed the maximum value");
512 rte_flow_error_set(error, EINVAL,
513 RTE_FLOW_ERROR_TYPE_ACTION, actions,
514 "Unsupported action combination");
519 rte_flow_error_set(error, EINVAL,
520 RTE_FLOW_ERROR_TYPE_ACTION, actions,
521 "Too many mark actions");
525 if (dest_num + mark_num == 0) {
526 rte_flow_error_set(error, EINVAL,
527 RTE_FLOW_ERROR_TYPE_ACTION, actions,
532 /* Mark only is equal to mark + passthru. */
534 filter_action = &filter->add_fltr.rule_cfg.action_set.actions[number];
535 filter_action->type = VIRTCHNL_ACTION_PASSTHRU;
536 filter->add_fltr.rule_cfg.action_set.count = ++number;
543 iavf_fdir_refine_input_set(const uint64_t input_set,
544 const uint64_t input_set_mask,
545 struct iavf_fdir_conf *filter)
547 struct virtchnl_proto_hdr *hdr, *hdr_last;
548 struct rte_flow_item_ipv4 ipv4_spec;
549 struct rte_flow_item_ipv6 ipv6_spec;
553 if (input_set & ~input_set_mask)
558 last_layer = filter->add_fltr.rule_cfg.proto_hdrs.count - 1;
559 /* Last layer of TCP/UDP pattern isn't less than 2. */
562 hdr_last = &filter->add_fltr.rule_cfg.proto_hdrs.proto_hdr[last_layer];
563 if (hdr_last->type == VIRTCHNL_PROTO_HDR_TCP)
565 else if (hdr_last->type == VIRTCHNL_PROTO_HDR_UDP)
570 hdr = &filter->add_fltr.rule_cfg.proto_hdrs.proto_hdr[last_layer - 1];
572 case VIRTCHNL_PROTO_HDR_IPV4:
573 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, IPV4, PROT);
574 memset(&ipv4_spec, 0, sizeof(ipv4_spec));
575 ipv4_spec.hdr.next_proto_id = proto_id;
576 rte_memcpy(hdr->buffer, &ipv4_spec.hdr,
577 sizeof(ipv4_spec.hdr));
579 case VIRTCHNL_PROTO_HDR_IPV6:
580 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, IPV6, PROT);
581 memset(&ipv6_spec, 0, sizeof(ipv6_spec));
582 ipv6_spec.hdr.proto = proto_id;
583 rte_memcpy(hdr->buffer, &ipv6_spec.hdr,
584 sizeof(ipv6_spec.hdr));
592 iavf_fdir_add_fragment_hdr(struct virtchnl_proto_hdrs *hdrs, int layer)
594 struct virtchnl_proto_hdr *hdr1;
595 struct virtchnl_proto_hdr *hdr2;
598 if (layer < 0 || layer > hdrs->count)
601 /* shift headers layer */
602 for (i = hdrs->count; i >= layer; i--) {
603 hdr1 = &hdrs->proto_hdr[i];
604 hdr2 = &hdrs->proto_hdr[i - 1];
608 /* adding dummy fragment header */
609 hdr1 = &hdrs->proto_hdr[layer];
610 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr1, IPV4_FRAG);
611 hdrs->count = ++layer;
615 iavf_fdir_parse_pattern(__rte_unused struct iavf_adapter *ad,
616 const struct rte_flow_item pattern[],
617 const uint64_t input_set_mask,
618 struct rte_flow_error *error,
619 struct iavf_fdir_conf *filter)
621 struct virtchnl_proto_hdrs *hdrs =
622 &filter->add_fltr.rule_cfg.proto_hdrs;
623 enum rte_flow_item_type l3 = RTE_FLOW_ITEM_TYPE_END;
624 const struct rte_flow_item_eth *eth_spec, *eth_mask;
625 const struct rte_flow_item_ipv4 *ipv4_spec, *ipv4_last, *ipv4_mask;
626 const struct rte_flow_item_ipv6 *ipv6_spec, *ipv6_mask;
627 const struct rte_flow_item_ipv6_frag_ext *ipv6_frag_spec;
628 const struct rte_flow_item_ipv6_frag_ext *ipv6_frag_last;
629 const struct rte_flow_item_ipv6_frag_ext *ipv6_frag_mask;
630 const struct rte_flow_item_udp *udp_spec, *udp_mask;
631 const struct rte_flow_item_tcp *tcp_spec, *tcp_mask;
632 const struct rte_flow_item_sctp *sctp_spec, *sctp_mask;
633 const struct rte_flow_item_gtp *gtp_spec, *gtp_mask;
634 const struct rte_flow_item_gtp_psc *gtp_psc_spec, *gtp_psc_mask;
635 const struct rte_flow_item_l2tpv3oip *l2tpv3oip_spec, *l2tpv3oip_mask;
636 const struct rte_flow_item_esp *esp_spec, *esp_mask;
637 const struct rte_flow_item_ah *ah_spec, *ah_mask;
638 const struct rte_flow_item_pfcp *pfcp_spec, *pfcp_mask;
639 const struct rte_flow_item_ecpri *ecpri_spec, *ecpri_mask;
640 const struct rte_flow_item_gre *gre_spec, *gre_mask;
641 const struct rte_flow_item *item = pattern;
642 struct virtchnl_proto_hdr *hdr, *hdr1 = NULL;
643 struct rte_ecpri_common_hdr ecpri_common;
644 uint64_t input_set = IAVF_INSET_NONE;
645 enum rte_flow_item_type item_type;
646 enum rte_flow_item_type next_type;
647 uint8_t tun_inner = 0;
651 uint8_t ipv6_addr_mask[16] = {
652 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
653 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF
656 for (item = pattern; item->type != RTE_FLOW_ITEM_TYPE_END; item++) {
657 item_type = item->type;
659 if (item->last && !(item_type == RTE_FLOW_ITEM_TYPE_IPV4 ||
661 RTE_FLOW_ITEM_TYPE_IPV6_FRAG_EXT)) {
662 rte_flow_error_set(error, EINVAL,
663 RTE_FLOW_ERROR_TYPE_ITEM, item,
664 "Not support range");
668 case RTE_FLOW_ITEM_TYPE_ETH:
669 eth_spec = item->spec;
670 eth_mask = item->mask;
671 next_type = (item + 1)->type;
673 hdr1 = &hdrs->proto_hdr[layer];
675 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr1, ETH);
677 if (next_type == RTE_FLOW_ITEM_TYPE_END &&
678 (!eth_spec || !eth_mask)) {
679 rte_flow_error_set(error, EINVAL,
680 RTE_FLOW_ERROR_TYPE_ITEM,
681 item, "NULL eth spec/mask.");
685 if (eth_spec && eth_mask) {
686 if (!rte_is_zero_ether_addr(ð_mask->src) ||
687 !rte_is_zero_ether_addr(ð_mask->dst)) {
688 rte_flow_error_set(error, EINVAL,
689 RTE_FLOW_ERROR_TYPE_ITEM, item,
690 "Invalid MAC_addr mask.");
695 if (eth_spec && eth_mask && eth_mask->type) {
696 if (eth_mask->type != RTE_BE16(0xffff)) {
697 rte_flow_error_set(error, EINVAL,
698 RTE_FLOW_ERROR_TYPE_ITEM,
699 item, "Invalid type mask.");
703 ether_type = rte_be_to_cpu_16(eth_spec->type);
704 if (ether_type == RTE_ETHER_TYPE_IPV4 ||
705 ether_type == RTE_ETHER_TYPE_IPV6) {
706 rte_flow_error_set(error, EINVAL,
707 RTE_FLOW_ERROR_TYPE_ITEM,
709 "Unsupported ether_type.");
713 input_set |= IAVF_INSET_ETHERTYPE;
714 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr1, ETH,
717 rte_memcpy(hdr1->buffer, eth_spec,
718 sizeof(struct rte_ether_hdr));
721 hdrs->count = ++layer;
724 case RTE_FLOW_ITEM_TYPE_IPV4:
725 l3 = RTE_FLOW_ITEM_TYPE_IPV4;
726 ipv4_spec = item->spec;
727 ipv4_last = item->last;
728 ipv4_mask = item->mask;
729 next_type = (item + 1)->type;
731 hdr = &hdrs->proto_hdr[layer];
733 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, IPV4);
735 if (!(ipv4_spec && ipv4_mask)) {
736 hdrs->count = ++layer;
740 if (ipv4_mask->hdr.version_ihl ||
741 ipv4_mask->hdr.total_length ||
742 ipv4_mask->hdr.hdr_checksum) {
743 rte_flow_error_set(error, EINVAL,
744 RTE_FLOW_ERROR_TYPE_ITEM,
745 item, "Invalid IPv4 mask.");
750 (ipv4_last->hdr.version_ihl ||
751 ipv4_last->hdr.type_of_service ||
752 ipv4_last->hdr.time_to_live ||
753 ipv4_last->hdr.total_length |
754 ipv4_last->hdr.next_proto_id ||
755 ipv4_last->hdr.hdr_checksum ||
756 ipv4_last->hdr.src_addr ||
757 ipv4_last->hdr.dst_addr)) {
758 rte_flow_error_set(error, EINVAL,
759 RTE_FLOW_ERROR_TYPE_ITEM,
760 item, "Invalid IPv4 last.");
764 if (ipv4_mask->hdr.type_of_service ==
766 input_set |= IAVF_INSET_IPV4_TOS;
767 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, IPV4,
771 if (ipv4_mask->hdr.next_proto_id == UINT8_MAX) {
772 input_set |= IAVF_INSET_IPV4_PROTO;
773 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, IPV4,
777 if (ipv4_mask->hdr.time_to_live == UINT8_MAX) {
778 input_set |= IAVF_INSET_IPV4_TTL;
779 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, IPV4,
783 if (ipv4_mask->hdr.src_addr == UINT32_MAX) {
784 input_set |= IAVF_INSET_IPV4_SRC;
785 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, IPV4,
789 if (ipv4_mask->hdr.dst_addr == UINT32_MAX) {
790 input_set |= IAVF_INSET_IPV4_DST;
791 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, IPV4,
796 input_set &= ~IAVF_PROT_IPV4_OUTER;
797 input_set |= IAVF_PROT_IPV4_INNER;
800 rte_memcpy(hdr->buffer, &ipv4_spec->hdr,
801 sizeof(ipv4_spec->hdr));
803 hdrs->count = ++layer;
805 /* only support any packet id for fragment IPv4
807 * spec is 0, last is 0xffff, mask is 0xffff
809 if (ipv4_last && ipv4_spec->hdr.packet_id == 0 &&
810 ipv4_last->hdr.packet_id == UINT16_MAX &&
811 ipv4_mask->hdr.packet_id == UINT16_MAX &&
812 ipv4_mask->hdr.fragment_offset == UINT16_MAX) {
813 /* all IPv4 fragment packet has the same
814 * ethertype, if the spec is for all valid
815 * packet id, set ethertype into input set.
817 input_set |= IAVF_INSET_ETHERTYPE;
818 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr1, ETH,
821 /* add dummy header for IPv4 Fragment */
822 iavf_fdir_add_fragment_hdr(hdrs, layer);
823 } else if (ipv4_mask->hdr.packet_id == UINT16_MAX) {
824 rte_flow_error_set(error, EINVAL,
825 RTE_FLOW_ERROR_TYPE_ITEM,
826 item, "Invalid IPv4 mask.");
832 case RTE_FLOW_ITEM_TYPE_IPV6:
833 l3 = RTE_FLOW_ITEM_TYPE_IPV6;
834 ipv6_spec = item->spec;
835 ipv6_mask = item->mask;
837 hdr = &hdrs->proto_hdr[layer];
839 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, IPV6);
841 if (!(ipv6_spec && ipv6_mask)) {
842 hdrs->count = ++layer;
846 if (ipv6_mask->hdr.payload_len) {
847 rte_flow_error_set(error, EINVAL,
848 RTE_FLOW_ERROR_TYPE_ITEM,
849 item, "Invalid IPv6 mask");
853 if ((ipv6_mask->hdr.vtc_flow &
854 rte_cpu_to_be_32(IAVF_IPV6_TC_MASK))
855 == rte_cpu_to_be_32(IAVF_IPV6_TC_MASK)) {
856 input_set |= IAVF_INSET_IPV6_TC;
857 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, IPV6,
861 if (ipv6_mask->hdr.proto == UINT8_MAX) {
862 input_set |= IAVF_INSET_IPV6_NEXT_HDR;
863 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, IPV6,
867 if (ipv6_mask->hdr.hop_limits == UINT8_MAX) {
868 input_set |= IAVF_INSET_IPV6_HOP_LIMIT;
869 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, IPV6,
873 if (!memcmp(ipv6_mask->hdr.src_addr, ipv6_addr_mask,
874 RTE_DIM(ipv6_mask->hdr.src_addr))) {
875 input_set |= IAVF_INSET_IPV6_SRC;
876 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, IPV6,
879 if (!memcmp(ipv6_mask->hdr.dst_addr, ipv6_addr_mask,
880 RTE_DIM(ipv6_mask->hdr.dst_addr))) {
881 input_set |= IAVF_INSET_IPV6_DST;
882 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, IPV6,
887 input_set &= ~IAVF_PROT_IPV6_OUTER;
888 input_set |= IAVF_PROT_IPV6_INNER;
891 rte_memcpy(hdr->buffer, &ipv6_spec->hdr,
892 sizeof(ipv6_spec->hdr));
894 hdrs->count = ++layer;
897 case RTE_FLOW_ITEM_TYPE_IPV6_FRAG_EXT:
898 ipv6_frag_spec = item->spec;
899 ipv6_frag_last = item->last;
900 ipv6_frag_mask = item->mask;
901 next_type = (item + 1)->type;
903 hdr = &hdrs->proto_hdr[layer];
905 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, IPV6_EH_FRAG);
907 if (!(ipv6_frag_spec && ipv6_frag_mask)) {
908 hdrs->count = ++layer;
912 /* only support any packet id for fragment IPv6
914 * spec is 0, last is 0xffffffff, mask is 0xffffffff
916 if (ipv6_frag_last && ipv6_frag_spec->hdr.id == 0 &&
917 ipv6_frag_last->hdr.id == UINT32_MAX &&
918 ipv6_frag_mask->hdr.id == UINT32_MAX &&
919 ipv6_frag_mask->hdr.frag_data == UINT16_MAX) {
920 /* all IPv6 fragment packet has the same
921 * ethertype, if the spec is for all valid
922 * packet id, set ethertype into input set.
924 input_set |= IAVF_INSET_ETHERTYPE;
925 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr1, ETH,
928 rte_memcpy(hdr->buffer, &ipv6_frag_spec->hdr,
929 sizeof(ipv6_frag_spec->hdr));
930 } else if (ipv6_frag_mask->hdr.id == UINT32_MAX) {
931 rte_flow_error_set(error, EINVAL,
932 RTE_FLOW_ERROR_TYPE_ITEM,
933 item, "Invalid IPv6 mask.");
937 hdrs->count = ++layer;
940 case RTE_FLOW_ITEM_TYPE_UDP:
941 udp_spec = item->spec;
942 udp_mask = item->mask;
944 hdr = &hdrs->proto_hdr[layer];
946 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, UDP);
948 if (udp_spec && udp_mask) {
949 if (udp_mask->hdr.dgram_len ||
950 udp_mask->hdr.dgram_cksum) {
951 rte_flow_error_set(error, EINVAL,
952 RTE_FLOW_ERROR_TYPE_ITEM, item,
957 if (udp_mask->hdr.src_port == UINT16_MAX) {
958 input_set |= IAVF_INSET_UDP_SRC_PORT;
959 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, UDP, SRC_PORT);
961 if (udp_mask->hdr.dst_port == UINT16_MAX) {
962 input_set |= IAVF_INSET_UDP_DST_PORT;
963 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, UDP, DST_PORT);
967 input_set &= ~IAVF_PROT_UDP_OUTER;
968 input_set |= IAVF_PROT_UDP_INNER;
971 if (l3 == RTE_FLOW_ITEM_TYPE_IPV4)
972 rte_memcpy(hdr->buffer,
974 sizeof(udp_spec->hdr));
975 else if (l3 == RTE_FLOW_ITEM_TYPE_IPV6)
976 rte_memcpy(hdr->buffer,
978 sizeof(udp_spec->hdr));
981 hdrs->count = ++layer;
984 case RTE_FLOW_ITEM_TYPE_TCP:
985 tcp_spec = item->spec;
986 tcp_mask = item->mask;
988 hdr = &hdrs->proto_hdr[layer];
990 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, TCP);
992 if (tcp_spec && tcp_mask) {
993 if (tcp_mask->hdr.sent_seq ||
994 tcp_mask->hdr.recv_ack ||
995 tcp_mask->hdr.data_off ||
996 tcp_mask->hdr.tcp_flags ||
997 tcp_mask->hdr.rx_win ||
998 tcp_mask->hdr.cksum ||
999 tcp_mask->hdr.tcp_urp) {
1000 rte_flow_error_set(error, EINVAL,
1001 RTE_FLOW_ERROR_TYPE_ITEM, item,
1002 "Invalid TCP mask");
1006 if (tcp_mask->hdr.src_port == UINT16_MAX) {
1007 input_set |= IAVF_INSET_TCP_SRC_PORT;
1008 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, TCP, SRC_PORT);
1010 if (tcp_mask->hdr.dst_port == UINT16_MAX) {
1011 input_set |= IAVF_INSET_TCP_DST_PORT;
1012 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, TCP, DST_PORT);
1016 input_set &= ~IAVF_PROT_TCP_OUTER;
1017 input_set |= IAVF_PROT_TCP_INNER;
1020 if (l3 == RTE_FLOW_ITEM_TYPE_IPV4)
1021 rte_memcpy(hdr->buffer,
1023 sizeof(tcp_spec->hdr));
1024 else if (l3 == RTE_FLOW_ITEM_TYPE_IPV6)
1025 rte_memcpy(hdr->buffer,
1027 sizeof(tcp_spec->hdr));
1030 hdrs->count = ++layer;
1033 case RTE_FLOW_ITEM_TYPE_SCTP:
1034 sctp_spec = item->spec;
1035 sctp_mask = item->mask;
1037 hdr = &hdrs->proto_hdr[layer];
1039 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, SCTP);
1041 if (sctp_spec && sctp_mask) {
1042 if (sctp_mask->hdr.cksum) {
1043 rte_flow_error_set(error, EINVAL,
1044 RTE_FLOW_ERROR_TYPE_ITEM, item,
1045 "Invalid UDP mask");
1049 if (sctp_mask->hdr.src_port == UINT16_MAX) {
1050 input_set |= IAVF_INSET_SCTP_SRC_PORT;
1051 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, SCTP, SRC_PORT);
1053 if (sctp_mask->hdr.dst_port == UINT16_MAX) {
1054 input_set |= IAVF_INSET_SCTP_DST_PORT;
1055 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, SCTP, DST_PORT);
1058 if (l3 == RTE_FLOW_ITEM_TYPE_IPV4)
1059 rte_memcpy(hdr->buffer,
1061 sizeof(sctp_spec->hdr));
1062 else if (l3 == RTE_FLOW_ITEM_TYPE_IPV6)
1063 rte_memcpy(hdr->buffer,
1065 sizeof(sctp_spec->hdr));
1068 hdrs->count = ++layer;
1071 case RTE_FLOW_ITEM_TYPE_GTPU:
1072 gtp_spec = item->spec;
1073 gtp_mask = item->mask;
1075 hdr = &hdrs->proto_hdr[layer];
1077 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, GTPU_IP);
1079 if (gtp_spec && gtp_mask) {
1080 if (gtp_mask->v_pt_rsv_flags ||
1081 gtp_mask->msg_type ||
1082 gtp_mask->msg_len) {
1083 rte_flow_error_set(error, EINVAL,
1084 RTE_FLOW_ERROR_TYPE_ITEM,
1085 item, "Invalid GTP mask");
1089 if (gtp_mask->teid == UINT32_MAX) {
1090 input_set |= IAVF_INSET_GTPU_TEID;
1091 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, GTPU_IP, TEID);
1094 rte_memcpy(hdr->buffer,
1095 gtp_spec, sizeof(*gtp_spec));
1100 hdrs->count = ++layer;
1103 case RTE_FLOW_ITEM_TYPE_GTP_PSC:
1104 gtp_psc_spec = item->spec;
1105 gtp_psc_mask = item->mask;
1107 hdr = &hdrs->proto_hdr[layer];
1110 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, GTPU_EH);
1111 else if ((gtp_psc_mask->qfi) && !(gtp_psc_mask->pdu_type))
1112 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, GTPU_EH);
1113 else if (gtp_psc_spec->pdu_type == IAVF_GTPU_EH_UPLINK)
1114 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, GTPU_EH_PDU_UP);
1115 else if (gtp_psc_spec->pdu_type == IAVF_GTPU_EH_DWLINK)
1116 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, GTPU_EH_PDU_DWN);
1118 if (gtp_psc_spec && gtp_psc_mask) {
1119 if (gtp_psc_mask->qfi == UINT8_MAX) {
1120 input_set |= IAVF_INSET_GTPU_QFI;
1121 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, GTPU_EH, QFI);
1124 rte_memcpy(hdr->buffer, gtp_psc_spec,
1125 sizeof(*gtp_psc_spec));
1128 hdrs->count = ++layer;
1131 case RTE_FLOW_ITEM_TYPE_L2TPV3OIP:
1132 l2tpv3oip_spec = item->spec;
1133 l2tpv3oip_mask = item->mask;
1135 hdr = &hdrs->proto_hdr[layer];
1137 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, L2TPV3);
1139 if (l2tpv3oip_spec && l2tpv3oip_mask) {
1140 if (l2tpv3oip_mask->session_id == UINT32_MAX) {
1141 input_set |= IAVF_L2TPV3OIP_SESSION_ID;
1142 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, L2TPV3, SESS_ID);
1145 rte_memcpy(hdr->buffer, l2tpv3oip_spec,
1146 sizeof(*l2tpv3oip_spec));
1149 hdrs->count = ++layer;
1152 case RTE_FLOW_ITEM_TYPE_ESP:
1153 esp_spec = item->spec;
1154 esp_mask = item->mask;
1156 hdr = &hdrs->proto_hdr[layer];
1158 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, ESP);
1160 if (esp_spec && esp_mask) {
1161 if (esp_mask->hdr.spi == UINT32_MAX) {
1162 input_set |= IAVF_INSET_ESP_SPI;
1163 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, ESP, SPI);
1166 rte_memcpy(hdr->buffer, &esp_spec->hdr,
1167 sizeof(esp_spec->hdr));
1170 hdrs->count = ++layer;
1173 case RTE_FLOW_ITEM_TYPE_AH:
1174 ah_spec = item->spec;
1175 ah_mask = item->mask;
1177 hdr = &hdrs->proto_hdr[layer];
1179 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, AH);
1181 if (ah_spec && ah_mask) {
1182 if (ah_mask->spi == UINT32_MAX) {
1183 input_set |= IAVF_INSET_AH_SPI;
1184 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, AH, SPI);
1187 rte_memcpy(hdr->buffer, ah_spec,
1191 hdrs->count = ++layer;
1194 case RTE_FLOW_ITEM_TYPE_PFCP:
1195 pfcp_spec = item->spec;
1196 pfcp_mask = item->mask;
1198 hdr = &hdrs->proto_hdr[layer];
1200 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, PFCP);
1202 if (pfcp_spec && pfcp_mask) {
1203 if (pfcp_mask->s_field == UINT8_MAX) {
1204 input_set |= IAVF_INSET_PFCP_S_FIELD;
1205 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, PFCP, S_FIELD);
1208 rte_memcpy(hdr->buffer, pfcp_spec,
1209 sizeof(*pfcp_spec));
1212 hdrs->count = ++layer;
1215 case RTE_FLOW_ITEM_TYPE_ECPRI:
1216 ecpri_spec = item->spec;
1217 ecpri_mask = item->mask;
1219 ecpri_common.u32 = rte_be_to_cpu_32(ecpri_spec->hdr.common.u32);
1221 hdr = &hdrs->proto_hdr[layer];
1223 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, ECPRI);
1225 if (ecpri_spec && ecpri_mask) {
1226 if (ecpri_common.type == RTE_ECPRI_MSG_TYPE_IQ_DATA &&
1227 ecpri_mask->hdr.type0.pc_id == UINT16_MAX) {
1228 input_set |= IAVF_ECPRI_PC_RTC_ID;
1229 VIRTCHNL_ADD_PROTO_HDR_FIELD_BIT(hdr, ECPRI,
1233 rte_memcpy(hdr->buffer, ecpri_spec,
1234 sizeof(*ecpri_spec));
1237 hdrs->count = ++layer;
1240 case RTE_FLOW_ITEM_TYPE_GRE:
1241 gre_spec = item->spec;
1242 gre_mask = item->mask;
1244 hdr = &hdrs->proto_hdr[layer];
1246 VIRTCHNL_SET_PROTO_HDR_TYPE(hdr, GRE);
1248 if (gre_spec && gre_mask) {
1249 rte_memcpy(hdr->buffer, gre_spec,
1255 hdrs->count = ++layer;
1258 case RTE_FLOW_ITEM_TYPE_VOID:
1262 rte_flow_error_set(error, EINVAL,
1263 RTE_FLOW_ERROR_TYPE_ITEM, item,
1264 "Invalid pattern item.");
1269 if (layer > VIRTCHNL_MAX_NUM_PROTO_HDRS) {
1270 rte_flow_error_set(error, EINVAL,
1271 RTE_FLOW_ERROR_TYPE_ITEM, item,
1272 "Protocol header layers exceed the maximum value");
1276 if (!iavf_fdir_refine_input_set(input_set,
1277 input_set_mask | IAVF_INSET_ETHERTYPE,
1279 rte_flow_error_set(error, EINVAL,
1280 RTE_FLOW_ERROR_TYPE_ITEM_SPEC, pattern,
1281 "Invalid input set");
1285 filter->input_set = input_set;
1291 iavf_fdir_parse(struct iavf_adapter *ad,
1292 struct iavf_pattern_match_item *array,
1294 const struct rte_flow_item pattern[],
1295 const struct rte_flow_action actions[],
1297 struct rte_flow_error *error)
1299 struct iavf_info *vf = IAVF_DEV_PRIVATE_TO_VF(ad);
1300 struct iavf_fdir_conf *filter = &vf->fdir.conf;
1301 struct iavf_pattern_match_item *item = NULL;
1304 memset(filter, 0, sizeof(*filter));
1306 item = iavf_search_pattern_match_item(pattern, array, array_len, error);
1310 ret = iavf_fdir_parse_pattern(ad, pattern, item->input_set_mask,
1315 ret = iavf_fdir_parse_action(ad, actions, error, filter);
1327 static struct iavf_flow_parser iavf_fdir_parser = {
1328 .engine = &iavf_fdir_engine,
1329 .array = iavf_fdir_pattern,
1330 .array_len = RTE_DIM(iavf_fdir_pattern),
1331 .parse_pattern_action = iavf_fdir_parse,
1332 .stage = IAVF_FLOW_STAGE_DISTRIBUTOR,
1335 RTE_INIT(iavf_fdir_engine_register)
1337 iavf_register_flow_engine(&iavf_fdir_engine);