162306a36Sopenharmony_ci// SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
262306a36Sopenharmony_ci/* Copyright (C) 2017-2018 Netronome Systems, Inc. */
362306a36Sopenharmony_ci
462306a36Sopenharmony_ci#include <linux/bitfield.h>
562306a36Sopenharmony_ci#include <linux/mpls.h>
662306a36Sopenharmony_ci#include <net/pkt_cls.h>
762306a36Sopenharmony_ci#include <net/tc_act/tc_csum.h>
862306a36Sopenharmony_ci#include <net/tc_act/tc_gact.h>
962306a36Sopenharmony_ci#include <net/tc_act/tc_mirred.h>
1062306a36Sopenharmony_ci#include <net/tc_act/tc_mpls.h>
1162306a36Sopenharmony_ci#include <net/tc_act/tc_pedit.h>
1262306a36Sopenharmony_ci#include <net/tc_act/tc_vlan.h>
1362306a36Sopenharmony_ci#include <net/tc_act/tc_tunnel_key.h>
1462306a36Sopenharmony_ci
1562306a36Sopenharmony_ci#include "cmsg.h"
1662306a36Sopenharmony_ci#include "main.h"
1762306a36Sopenharmony_ci#include "../nfp_net_repr.h"
1862306a36Sopenharmony_ci
1962306a36Sopenharmony_ci/* The kernel versions of TUNNEL_* are not ABI and therefore vulnerable
2062306a36Sopenharmony_ci * to change. Such changes will break our FW ABI.
2162306a36Sopenharmony_ci */
2262306a36Sopenharmony_ci#define NFP_FL_TUNNEL_CSUM			cpu_to_be16(0x01)
2362306a36Sopenharmony_ci#define NFP_FL_TUNNEL_KEY			cpu_to_be16(0x04)
2462306a36Sopenharmony_ci#define NFP_FL_TUNNEL_GENEVE_OPT		cpu_to_be16(0x0800)
2562306a36Sopenharmony_ci#define NFP_FL_SUPPORTED_TUNNEL_INFO_FLAGS	(IP_TUNNEL_INFO_TX | \
2662306a36Sopenharmony_ci						 IP_TUNNEL_INFO_IPV6)
2762306a36Sopenharmony_ci#define NFP_FL_SUPPORTED_UDP_TUN_FLAGS		(NFP_FL_TUNNEL_CSUM | \
2862306a36Sopenharmony_ci						 NFP_FL_TUNNEL_KEY | \
2962306a36Sopenharmony_ci						 NFP_FL_TUNNEL_GENEVE_OPT)
3062306a36Sopenharmony_ci
3162306a36Sopenharmony_cistatic int
3262306a36Sopenharmony_cinfp_fl_push_mpls(struct nfp_fl_push_mpls *push_mpls,
3362306a36Sopenharmony_ci		 const struct flow_action_entry *act,
3462306a36Sopenharmony_ci		 struct netlink_ext_ack *extack)
3562306a36Sopenharmony_ci{
3662306a36Sopenharmony_ci	size_t act_size = sizeof(struct nfp_fl_push_mpls);
3762306a36Sopenharmony_ci	u32 mpls_lse = 0;
3862306a36Sopenharmony_ci
3962306a36Sopenharmony_ci	push_mpls->head.jump_id = NFP_FL_ACTION_OPCODE_PUSH_MPLS;
4062306a36Sopenharmony_ci	push_mpls->head.len_lw = act_size >> NFP_FL_LW_SIZ;
4162306a36Sopenharmony_ci
4262306a36Sopenharmony_ci	/* BOS is optional in the TC action but required for offload. */
4362306a36Sopenharmony_ci	if (act->mpls_push.bos != ACT_MPLS_BOS_NOT_SET) {
4462306a36Sopenharmony_ci		mpls_lse |= act->mpls_push.bos << MPLS_LS_S_SHIFT;
4562306a36Sopenharmony_ci	} else {
4662306a36Sopenharmony_ci		NL_SET_ERR_MSG_MOD(extack, "unsupported offload: BOS field must explicitly be set for MPLS push");
4762306a36Sopenharmony_ci		return -EOPNOTSUPP;
4862306a36Sopenharmony_ci	}
4962306a36Sopenharmony_ci
5062306a36Sopenharmony_ci	/* Leave MPLS TC as a default value of 0 if not explicitly set. */
5162306a36Sopenharmony_ci	if (act->mpls_push.tc != ACT_MPLS_TC_NOT_SET)
5262306a36Sopenharmony_ci		mpls_lse |= act->mpls_push.tc << MPLS_LS_TC_SHIFT;
5362306a36Sopenharmony_ci
5462306a36Sopenharmony_ci	/* Proto, label and TTL are enforced and verified for MPLS push. */
5562306a36Sopenharmony_ci	mpls_lse |= act->mpls_push.label << MPLS_LS_LABEL_SHIFT;
5662306a36Sopenharmony_ci	mpls_lse |= act->mpls_push.ttl << MPLS_LS_TTL_SHIFT;
5762306a36Sopenharmony_ci	push_mpls->ethtype = act->mpls_push.proto;
5862306a36Sopenharmony_ci	push_mpls->lse = cpu_to_be32(mpls_lse);
5962306a36Sopenharmony_ci
6062306a36Sopenharmony_ci	return 0;
6162306a36Sopenharmony_ci}
6262306a36Sopenharmony_ci
6362306a36Sopenharmony_cistatic void
6462306a36Sopenharmony_cinfp_fl_pop_mpls(struct nfp_fl_pop_mpls *pop_mpls,
6562306a36Sopenharmony_ci		const struct flow_action_entry *act)
6662306a36Sopenharmony_ci{
6762306a36Sopenharmony_ci	size_t act_size = sizeof(struct nfp_fl_pop_mpls);
6862306a36Sopenharmony_ci
6962306a36Sopenharmony_ci	pop_mpls->head.jump_id = NFP_FL_ACTION_OPCODE_POP_MPLS;
7062306a36Sopenharmony_ci	pop_mpls->head.len_lw = act_size >> NFP_FL_LW_SIZ;
7162306a36Sopenharmony_ci	pop_mpls->ethtype = act->mpls_pop.proto;
7262306a36Sopenharmony_ci}
7362306a36Sopenharmony_ci
7462306a36Sopenharmony_cistatic void
7562306a36Sopenharmony_cinfp_fl_set_mpls(struct nfp_fl_set_mpls *set_mpls,
7662306a36Sopenharmony_ci		const struct flow_action_entry *act)
7762306a36Sopenharmony_ci{
7862306a36Sopenharmony_ci	size_t act_size = sizeof(struct nfp_fl_set_mpls);
7962306a36Sopenharmony_ci	u32 mpls_lse = 0, mpls_mask = 0;
8062306a36Sopenharmony_ci
8162306a36Sopenharmony_ci	set_mpls->head.jump_id = NFP_FL_ACTION_OPCODE_SET_MPLS;
8262306a36Sopenharmony_ci	set_mpls->head.len_lw = act_size >> NFP_FL_LW_SIZ;
8362306a36Sopenharmony_ci
8462306a36Sopenharmony_ci	if (act->mpls_mangle.label != ACT_MPLS_LABEL_NOT_SET) {
8562306a36Sopenharmony_ci		mpls_lse |= act->mpls_mangle.label << MPLS_LS_LABEL_SHIFT;
8662306a36Sopenharmony_ci		mpls_mask |= MPLS_LS_LABEL_MASK;
8762306a36Sopenharmony_ci	}
8862306a36Sopenharmony_ci	if (act->mpls_mangle.tc != ACT_MPLS_TC_NOT_SET) {
8962306a36Sopenharmony_ci		mpls_lse |= act->mpls_mangle.tc << MPLS_LS_TC_SHIFT;
9062306a36Sopenharmony_ci		mpls_mask |= MPLS_LS_TC_MASK;
9162306a36Sopenharmony_ci	}
9262306a36Sopenharmony_ci	if (act->mpls_mangle.bos != ACT_MPLS_BOS_NOT_SET) {
9362306a36Sopenharmony_ci		mpls_lse |= act->mpls_mangle.bos << MPLS_LS_S_SHIFT;
9462306a36Sopenharmony_ci		mpls_mask |= MPLS_LS_S_MASK;
9562306a36Sopenharmony_ci	}
9662306a36Sopenharmony_ci	if (act->mpls_mangle.ttl) {
9762306a36Sopenharmony_ci		mpls_lse |= act->mpls_mangle.ttl << MPLS_LS_TTL_SHIFT;
9862306a36Sopenharmony_ci		mpls_mask |= MPLS_LS_TTL_MASK;
9962306a36Sopenharmony_ci	}
10062306a36Sopenharmony_ci
10162306a36Sopenharmony_ci	set_mpls->lse = cpu_to_be32(mpls_lse);
10262306a36Sopenharmony_ci	set_mpls->lse_mask = cpu_to_be32(mpls_mask);
10362306a36Sopenharmony_ci}
10462306a36Sopenharmony_ci
10562306a36Sopenharmony_cistatic void nfp_fl_pop_vlan(struct nfp_fl_pop_vlan *pop_vlan)
10662306a36Sopenharmony_ci{
10762306a36Sopenharmony_ci	size_t act_size = sizeof(struct nfp_fl_pop_vlan);
10862306a36Sopenharmony_ci
10962306a36Sopenharmony_ci	pop_vlan->head.jump_id = NFP_FL_ACTION_OPCODE_POP_VLAN;
11062306a36Sopenharmony_ci	pop_vlan->head.len_lw = act_size >> NFP_FL_LW_SIZ;
11162306a36Sopenharmony_ci	pop_vlan->reserved = 0;
11262306a36Sopenharmony_ci}
11362306a36Sopenharmony_ci
11462306a36Sopenharmony_cistatic void
11562306a36Sopenharmony_cinfp_fl_push_vlan(struct nfp_fl_push_vlan *push_vlan,
11662306a36Sopenharmony_ci		 const struct flow_action_entry *act)
11762306a36Sopenharmony_ci{
11862306a36Sopenharmony_ci	size_t act_size = sizeof(struct nfp_fl_push_vlan);
11962306a36Sopenharmony_ci	u16 tmp_push_vlan_tci;
12062306a36Sopenharmony_ci
12162306a36Sopenharmony_ci	push_vlan->head.jump_id = NFP_FL_ACTION_OPCODE_PUSH_VLAN;
12262306a36Sopenharmony_ci	push_vlan->head.len_lw = act_size >> NFP_FL_LW_SIZ;
12362306a36Sopenharmony_ci	push_vlan->reserved = 0;
12462306a36Sopenharmony_ci	push_vlan->vlan_tpid = act->vlan.proto;
12562306a36Sopenharmony_ci
12662306a36Sopenharmony_ci	tmp_push_vlan_tci =
12762306a36Sopenharmony_ci		FIELD_PREP(NFP_FL_PUSH_VLAN_PRIO, act->vlan.prio) |
12862306a36Sopenharmony_ci		FIELD_PREP(NFP_FL_PUSH_VLAN_VID, act->vlan.vid);
12962306a36Sopenharmony_ci	push_vlan->vlan_tci = cpu_to_be16(tmp_push_vlan_tci);
13062306a36Sopenharmony_ci}
13162306a36Sopenharmony_ci
13262306a36Sopenharmony_cistatic int
13362306a36Sopenharmony_cinfp_fl_pre_lag(struct nfp_app *app, const struct flow_action_entry *act,
13462306a36Sopenharmony_ci	       struct nfp_fl_payload *nfp_flow, int act_len,
13562306a36Sopenharmony_ci	       struct netlink_ext_ack *extack)
13662306a36Sopenharmony_ci{
13762306a36Sopenharmony_ci	size_t act_size = sizeof(struct nfp_fl_pre_lag);
13862306a36Sopenharmony_ci	struct nfp_fl_pre_lag *pre_lag;
13962306a36Sopenharmony_ci	struct net_device *out_dev;
14062306a36Sopenharmony_ci	int err;
14162306a36Sopenharmony_ci
14262306a36Sopenharmony_ci	out_dev = act->dev;
14362306a36Sopenharmony_ci	if (!out_dev || !netif_is_lag_master(out_dev))
14462306a36Sopenharmony_ci		return 0;
14562306a36Sopenharmony_ci
14662306a36Sopenharmony_ci	if (act_len + act_size > NFP_FL_MAX_A_SIZ) {
14762306a36Sopenharmony_ci		NL_SET_ERR_MSG_MOD(extack, "unsupported offload: maximum allowed action list size exceeded at LAG action");
14862306a36Sopenharmony_ci		return -EOPNOTSUPP;
14962306a36Sopenharmony_ci	}
15062306a36Sopenharmony_ci
15162306a36Sopenharmony_ci	/* Pre_lag action must be first on action list.
15262306a36Sopenharmony_ci	 * If other actions already exist they need to be pushed forward.
15362306a36Sopenharmony_ci	 */
15462306a36Sopenharmony_ci	if (act_len)
15562306a36Sopenharmony_ci		memmove(nfp_flow->action_data + act_size,
15662306a36Sopenharmony_ci			nfp_flow->action_data, act_len);
15762306a36Sopenharmony_ci
15862306a36Sopenharmony_ci	pre_lag = (struct nfp_fl_pre_lag *)nfp_flow->action_data;
15962306a36Sopenharmony_ci	err = nfp_flower_lag_populate_pre_action(app, out_dev, pre_lag, extack);
16062306a36Sopenharmony_ci	if (err)
16162306a36Sopenharmony_ci		return err;
16262306a36Sopenharmony_ci
16362306a36Sopenharmony_ci	pre_lag->head.jump_id = NFP_FL_ACTION_OPCODE_PRE_LAG;
16462306a36Sopenharmony_ci	pre_lag->head.len_lw = act_size >> NFP_FL_LW_SIZ;
16562306a36Sopenharmony_ci
16662306a36Sopenharmony_ci	nfp_flow->meta.shortcut = cpu_to_be32(NFP_FL_SC_ACT_NULL);
16762306a36Sopenharmony_ci
16862306a36Sopenharmony_ci	return act_size;
16962306a36Sopenharmony_ci}
17062306a36Sopenharmony_ci
17162306a36Sopenharmony_cistatic int
17262306a36Sopenharmony_cinfp_fl_output(struct nfp_app *app, struct nfp_fl_output *output,
17362306a36Sopenharmony_ci	      const struct flow_action_entry *act,
17462306a36Sopenharmony_ci	      struct nfp_fl_payload *nfp_flow,
17562306a36Sopenharmony_ci	      bool last, struct net_device *in_dev,
17662306a36Sopenharmony_ci	      enum nfp_flower_tun_type tun_type, int *tun_out_cnt,
17762306a36Sopenharmony_ci	      bool pkt_host, struct netlink_ext_ack *extack)
17862306a36Sopenharmony_ci{
17962306a36Sopenharmony_ci	size_t act_size = sizeof(struct nfp_fl_output);
18062306a36Sopenharmony_ci	struct nfp_flower_priv *priv = app->priv;
18162306a36Sopenharmony_ci	struct net_device *out_dev;
18262306a36Sopenharmony_ci	u16 tmp_flags;
18362306a36Sopenharmony_ci
18462306a36Sopenharmony_ci	output->head.jump_id = NFP_FL_ACTION_OPCODE_OUTPUT;
18562306a36Sopenharmony_ci	output->head.len_lw = act_size >> NFP_FL_LW_SIZ;
18662306a36Sopenharmony_ci
18762306a36Sopenharmony_ci	out_dev = act->dev;
18862306a36Sopenharmony_ci	if (!out_dev) {
18962306a36Sopenharmony_ci		NL_SET_ERR_MSG_MOD(extack, "unsupported offload: invalid egress interface for mirred action");
19062306a36Sopenharmony_ci		return -EOPNOTSUPP;
19162306a36Sopenharmony_ci	}
19262306a36Sopenharmony_ci
19362306a36Sopenharmony_ci	tmp_flags = last ? NFP_FL_OUT_FLAGS_LAST : 0;
19462306a36Sopenharmony_ci
19562306a36Sopenharmony_ci	if (tun_type) {
19662306a36Sopenharmony_ci		/* Verify the egress netdev matches the tunnel type. */
19762306a36Sopenharmony_ci		if (!nfp_fl_netdev_is_tunnel_type(out_dev, tun_type)) {
19862306a36Sopenharmony_ci			NL_SET_ERR_MSG_MOD(extack, "unsupported offload: egress interface does not match the required tunnel type");
19962306a36Sopenharmony_ci			return -EOPNOTSUPP;
20062306a36Sopenharmony_ci		}
20162306a36Sopenharmony_ci
20262306a36Sopenharmony_ci		if (*tun_out_cnt) {
20362306a36Sopenharmony_ci			NL_SET_ERR_MSG_MOD(extack, "unsupported offload: cannot offload more than one tunnel mirred output per filter");
20462306a36Sopenharmony_ci			return -EOPNOTSUPP;
20562306a36Sopenharmony_ci		}
20662306a36Sopenharmony_ci		(*tun_out_cnt)++;
20762306a36Sopenharmony_ci
20862306a36Sopenharmony_ci		output->flags = cpu_to_be16(tmp_flags |
20962306a36Sopenharmony_ci					    NFP_FL_OUT_FLAGS_USE_TUN);
21062306a36Sopenharmony_ci		output->port = cpu_to_be32(NFP_FL_PORT_TYPE_TUN | tun_type);
21162306a36Sopenharmony_ci	} else if (netif_is_lag_master(out_dev) &&
21262306a36Sopenharmony_ci		   priv->flower_en_feats & NFP_FL_ENABLE_LAG) {
21362306a36Sopenharmony_ci		int gid;
21462306a36Sopenharmony_ci
21562306a36Sopenharmony_ci		output->flags = cpu_to_be16(tmp_flags);
21662306a36Sopenharmony_ci		gid = nfp_flower_lag_get_output_id(app, out_dev);
21762306a36Sopenharmony_ci		if (gid < 0) {
21862306a36Sopenharmony_ci			NL_SET_ERR_MSG_MOD(extack, "invalid entry: cannot find group id for LAG action");
21962306a36Sopenharmony_ci			return gid;
22062306a36Sopenharmony_ci		}
22162306a36Sopenharmony_ci		output->port = cpu_to_be32(NFP_FL_LAG_OUT | gid);
22262306a36Sopenharmony_ci	} else if (nfp_flower_internal_port_can_offload(app, out_dev)) {
22362306a36Sopenharmony_ci		if (!(priv->flower_ext_feats & NFP_FL_FEATS_PRE_TUN_RULES) &&
22462306a36Sopenharmony_ci		    !(priv->flower_ext_feats & NFP_FL_FEATS_DECAP_V2)) {
22562306a36Sopenharmony_ci			NL_SET_ERR_MSG_MOD(extack, "unsupported offload: pre-tunnel rules not supported in loaded firmware");
22662306a36Sopenharmony_ci			return -EOPNOTSUPP;
22762306a36Sopenharmony_ci		}
22862306a36Sopenharmony_ci
22962306a36Sopenharmony_ci		if (nfp_flow->pre_tun_rule.dev || !pkt_host) {
23062306a36Sopenharmony_ci			NL_SET_ERR_MSG_MOD(extack, "unsupported offload: pre-tunnel rules require single egress dev and ptype HOST action");
23162306a36Sopenharmony_ci			return -EOPNOTSUPP;
23262306a36Sopenharmony_ci		}
23362306a36Sopenharmony_ci
23462306a36Sopenharmony_ci		nfp_flow->pre_tun_rule.dev = out_dev;
23562306a36Sopenharmony_ci
23662306a36Sopenharmony_ci		return 0;
23762306a36Sopenharmony_ci	} else {
23862306a36Sopenharmony_ci		/* Set action output parameters. */
23962306a36Sopenharmony_ci		output->flags = cpu_to_be16(tmp_flags);
24062306a36Sopenharmony_ci
24162306a36Sopenharmony_ci		if (nfp_netdev_is_nfp_repr(in_dev)) {
24262306a36Sopenharmony_ci			/* Confirm ingress and egress are on same device. */
24362306a36Sopenharmony_ci			if (!netdev_port_same_parent_id(in_dev, out_dev)) {
24462306a36Sopenharmony_ci				NL_SET_ERR_MSG_MOD(extack, "unsupported offload: ingress and egress interfaces are on different devices");
24562306a36Sopenharmony_ci				return -EOPNOTSUPP;
24662306a36Sopenharmony_ci			}
24762306a36Sopenharmony_ci		}
24862306a36Sopenharmony_ci
24962306a36Sopenharmony_ci		if (!nfp_netdev_is_nfp_repr(out_dev)) {
25062306a36Sopenharmony_ci			NL_SET_ERR_MSG_MOD(extack, "unsupported offload: egress interface is not an nfp port");
25162306a36Sopenharmony_ci			return -EOPNOTSUPP;
25262306a36Sopenharmony_ci		}
25362306a36Sopenharmony_ci
25462306a36Sopenharmony_ci		output->port = cpu_to_be32(nfp_repr_get_port_id(out_dev));
25562306a36Sopenharmony_ci		if (!output->port) {
25662306a36Sopenharmony_ci			NL_SET_ERR_MSG_MOD(extack, "unsupported offload: invalid port id for egress interface");
25762306a36Sopenharmony_ci			return -EOPNOTSUPP;
25862306a36Sopenharmony_ci		}
25962306a36Sopenharmony_ci	}
26062306a36Sopenharmony_ci	nfp_flow->meta.shortcut = output->port;
26162306a36Sopenharmony_ci
26262306a36Sopenharmony_ci	return 0;
26362306a36Sopenharmony_ci}
26462306a36Sopenharmony_ci
26562306a36Sopenharmony_cistatic bool
26662306a36Sopenharmony_cinfp_flower_tun_is_gre(struct flow_rule *rule, int start_idx)
26762306a36Sopenharmony_ci{
26862306a36Sopenharmony_ci	struct flow_action_entry *act = rule->action.entries;
26962306a36Sopenharmony_ci	int num_act = rule->action.num_entries;
27062306a36Sopenharmony_ci	int act_idx;
27162306a36Sopenharmony_ci
27262306a36Sopenharmony_ci	/* Preparse action list for next mirred or redirect action */
27362306a36Sopenharmony_ci	for (act_idx = start_idx + 1; act_idx < num_act; act_idx++)
27462306a36Sopenharmony_ci		if (act[act_idx].id == FLOW_ACTION_REDIRECT ||
27562306a36Sopenharmony_ci		    act[act_idx].id == FLOW_ACTION_MIRRED)
27662306a36Sopenharmony_ci			return netif_is_gretap(act[act_idx].dev) ||
27762306a36Sopenharmony_ci			       netif_is_ip6gretap(act[act_idx].dev);
27862306a36Sopenharmony_ci
27962306a36Sopenharmony_ci	return false;
28062306a36Sopenharmony_ci}
28162306a36Sopenharmony_ci
28262306a36Sopenharmony_cistatic enum nfp_flower_tun_type
28362306a36Sopenharmony_cinfp_fl_get_tun_from_act(struct nfp_app *app,
28462306a36Sopenharmony_ci			struct flow_rule *rule,
28562306a36Sopenharmony_ci			const struct flow_action_entry *act, int act_idx)
28662306a36Sopenharmony_ci{
28762306a36Sopenharmony_ci	const struct ip_tunnel_info *tun = act->tunnel;
28862306a36Sopenharmony_ci	struct nfp_flower_priv *priv = app->priv;
28962306a36Sopenharmony_ci
29062306a36Sopenharmony_ci	/* Determine the tunnel type based on the egress netdev
29162306a36Sopenharmony_ci	 * in the mirred action for tunnels without l4.
29262306a36Sopenharmony_ci	 */
29362306a36Sopenharmony_ci	if (nfp_flower_tun_is_gre(rule, act_idx))
29462306a36Sopenharmony_ci		return NFP_FL_TUNNEL_GRE;
29562306a36Sopenharmony_ci
29662306a36Sopenharmony_ci	switch (tun->key.tp_dst) {
29762306a36Sopenharmony_ci	case htons(IANA_VXLAN_UDP_PORT):
29862306a36Sopenharmony_ci		return NFP_FL_TUNNEL_VXLAN;
29962306a36Sopenharmony_ci	case htons(GENEVE_UDP_PORT):
30062306a36Sopenharmony_ci		if (priv->flower_ext_feats & NFP_FL_FEATS_GENEVE)
30162306a36Sopenharmony_ci			return NFP_FL_TUNNEL_GENEVE;
30262306a36Sopenharmony_ci		fallthrough;
30362306a36Sopenharmony_ci	default:
30462306a36Sopenharmony_ci		return NFP_FL_TUNNEL_NONE;
30562306a36Sopenharmony_ci	}
30662306a36Sopenharmony_ci}
30762306a36Sopenharmony_ci
30862306a36Sopenharmony_cistatic struct nfp_fl_pre_tunnel *nfp_fl_pre_tunnel(char *act_data, int act_len)
30962306a36Sopenharmony_ci{
31062306a36Sopenharmony_ci	size_t act_size = sizeof(struct nfp_fl_pre_tunnel);
31162306a36Sopenharmony_ci	struct nfp_fl_pre_tunnel *pre_tun_act;
31262306a36Sopenharmony_ci
31362306a36Sopenharmony_ci	/* Pre_tunnel action must be first on action list.
31462306a36Sopenharmony_ci	 * If other actions already exist they need to be pushed forward.
31562306a36Sopenharmony_ci	 */
31662306a36Sopenharmony_ci	if (act_len)
31762306a36Sopenharmony_ci		memmove(act_data + act_size, act_data, act_len);
31862306a36Sopenharmony_ci
31962306a36Sopenharmony_ci	pre_tun_act = (struct nfp_fl_pre_tunnel *)act_data;
32062306a36Sopenharmony_ci
32162306a36Sopenharmony_ci	memset(pre_tun_act, 0, act_size);
32262306a36Sopenharmony_ci
32362306a36Sopenharmony_ci	pre_tun_act->head.jump_id = NFP_FL_ACTION_OPCODE_PRE_TUNNEL;
32462306a36Sopenharmony_ci	pre_tun_act->head.len_lw = act_size >> NFP_FL_LW_SIZ;
32562306a36Sopenharmony_ci
32662306a36Sopenharmony_ci	return pre_tun_act;
32762306a36Sopenharmony_ci}
32862306a36Sopenharmony_ci
32962306a36Sopenharmony_cistatic int
33062306a36Sopenharmony_cinfp_fl_push_geneve_options(struct nfp_fl_payload *nfp_fl, int *list_len,
33162306a36Sopenharmony_ci			   const struct flow_action_entry *act,
33262306a36Sopenharmony_ci			   struct netlink_ext_ack *extack)
33362306a36Sopenharmony_ci{
33462306a36Sopenharmony_ci	struct ip_tunnel_info *ip_tun = (struct ip_tunnel_info *)act->tunnel;
33562306a36Sopenharmony_ci	int opt_len, opt_cnt, act_start, tot_push_len;
33662306a36Sopenharmony_ci	u8 *src = ip_tunnel_info_opts(ip_tun);
33762306a36Sopenharmony_ci
33862306a36Sopenharmony_ci	/* We need to populate the options in reverse order for HW.
33962306a36Sopenharmony_ci	 * Therefore we go through the options, calculating the
34062306a36Sopenharmony_ci	 * number of options and the total size, then we populate
34162306a36Sopenharmony_ci	 * them in reverse order in the action list.
34262306a36Sopenharmony_ci	 */
34362306a36Sopenharmony_ci	opt_cnt = 0;
34462306a36Sopenharmony_ci	tot_push_len = 0;
34562306a36Sopenharmony_ci	opt_len = ip_tun->options_len;
34662306a36Sopenharmony_ci	while (opt_len > 0) {
34762306a36Sopenharmony_ci		struct geneve_opt *opt = (struct geneve_opt *)src;
34862306a36Sopenharmony_ci
34962306a36Sopenharmony_ci		opt_cnt++;
35062306a36Sopenharmony_ci		if (opt_cnt > NFP_FL_MAX_GENEVE_OPT_CNT) {
35162306a36Sopenharmony_ci			NL_SET_ERR_MSG_MOD(extack, "unsupported offload: maximum allowed number of geneve options exceeded");
35262306a36Sopenharmony_ci			return -EOPNOTSUPP;
35362306a36Sopenharmony_ci		}
35462306a36Sopenharmony_ci
35562306a36Sopenharmony_ci		tot_push_len += sizeof(struct nfp_fl_push_geneve) +
35662306a36Sopenharmony_ci			       opt->length * 4;
35762306a36Sopenharmony_ci		if (tot_push_len > NFP_FL_MAX_GENEVE_OPT_ACT) {
35862306a36Sopenharmony_ci			NL_SET_ERR_MSG_MOD(extack, "unsupported offload: maximum allowed action list size exceeded at push geneve options");
35962306a36Sopenharmony_ci			return -EOPNOTSUPP;
36062306a36Sopenharmony_ci		}
36162306a36Sopenharmony_ci
36262306a36Sopenharmony_ci		opt_len -= sizeof(struct geneve_opt) + opt->length * 4;
36362306a36Sopenharmony_ci		src += sizeof(struct geneve_opt) + opt->length * 4;
36462306a36Sopenharmony_ci	}
36562306a36Sopenharmony_ci
36662306a36Sopenharmony_ci	if (*list_len + tot_push_len > NFP_FL_MAX_A_SIZ) {
36762306a36Sopenharmony_ci		NL_SET_ERR_MSG_MOD(extack, "unsupported offload: maximum allowed action list size exceeded at push geneve options");
36862306a36Sopenharmony_ci		return -EOPNOTSUPP;
36962306a36Sopenharmony_ci	}
37062306a36Sopenharmony_ci
37162306a36Sopenharmony_ci	act_start = *list_len;
37262306a36Sopenharmony_ci	*list_len += tot_push_len;
37362306a36Sopenharmony_ci	src = ip_tunnel_info_opts(ip_tun);
37462306a36Sopenharmony_ci	while (opt_cnt) {
37562306a36Sopenharmony_ci		struct geneve_opt *opt = (struct geneve_opt *)src;
37662306a36Sopenharmony_ci		struct nfp_fl_push_geneve *push;
37762306a36Sopenharmony_ci		size_t act_size, len;
37862306a36Sopenharmony_ci
37962306a36Sopenharmony_ci		opt_cnt--;
38062306a36Sopenharmony_ci		act_size = sizeof(struct nfp_fl_push_geneve) + opt->length * 4;
38162306a36Sopenharmony_ci		tot_push_len -= act_size;
38262306a36Sopenharmony_ci		len = act_start + tot_push_len;
38362306a36Sopenharmony_ci
38462306a36Sopenharmony_ci		push = (struct nfp_fl_push_geneve *)&nfp_fl->action_data[len];
38562306a36Sopenharmony_ci		push->head.jump_id = NFP_FL_ACTION_OPCODE_PUSH_GENEVE;
38662306a36Sopenharmony_ci		push->head.len_lw = act_size >> NFP_FL_LW_SIZ;
38762306a36Sopenharmony_ci		push->reserved = 0;
38862306a36Sopenharmony_ci		push->class = opt->opt_class;
38962306a36Sopenharmony_ci		push->type = opt->type;
39062306a36Sopenharmony_ci		push->length = opt->length;
39162306a36Sopenharmony_ci		memcpy(&push->opt_data, opt->opt_data, opt->length * 4);
39262306a36Sopenharmony_ci
39362306a36Sopenharmony_ci		src += sizeof(struct geneve_opt) + opt->length * 4;
39462306a36Sopenharmony_ci	}
39562306a36Sopenharmony_ci
39662306a36Sopenharmony_ci	return 0;
39762306a36Sopenharmony_ci}
39862306a36Sopenharmony_ci
39962306a36Sopenharmony_cistatic int
40062306a36Sopenharmony_cinfp_fl_set_tun(struct nfp_app *app, struct nfp_fl_set_tun *set_tun,
40162306a36Sopenharmony_ci	       const struct flow_action_entry *act,
40262306a36Sopenharmony_ci	       struct nfp_fl_pre_tunnel *pre_tun,
40362306a36Sopenharmony_ci	       enum nfp_flower_tun_type tun_type,
40462306a36Sopenharmony_ci	       struct net_device *netdev, struct netlink_ext_ack *extack)
40562306a36Sopenharmony_ci{
40662306a36Sopenharmony_ci	const struct ip_tunnel_info *ip_tun = act->tunnel;
40762306a36Sopenharmony_ci	bool ipv6 = ip_tunnel_info_af(ip_tun) == AF_INET6;
40862306a36Sopenharmony_ci	size_t act_size = sizeof(struct nfp_fl_set_tun);
40962306a36Sopenharmony_ci	struct nfp_flower_priv *priv = app->priv;
41062306a36Sopenharmony_ci	u32 tmp_set_ip_tun_type_index = 0;
41162306a36Sopenharmony_ci	/* Currently support one pre-tunnel so index is always 0. */
41262306a36Sopenharmony_ci	int pretun_idx = 0;
41362306a36Sopenharmony_ci
41462306a36Sopenharmony_ci	if (!IS_ENABLED(CONFIG_IPV6) && ipv6)
41562306a36Sopenharmony_ci		return -EOPNOTSUPP;
41662306a36Sopenharmony_ci
41762306a36Sopenharmony_ci	if (ipv6 && !(priv->flower_ext_feats & NFP_FL_FEATS_IPV6_TUN))
41862306a36Sopenharmony_ci		return -EOPNOTSUPP;
41962306a36Sopenharmony_ci
42062306a36Sopenharmony_ci	BUILD_BUG_ON(NFP_FL_TUNNEL_CSUM != TUNNEL_CSUM ||
42162306a36Sopenharmony_ci		     NFP_FL_TUNNEL_KEY	!= TUNNEL_KEY ||
42262306a36Sopenharmony_ci		     NFP_FL_TUNNEL_GENEVE_OPT != TUNNEL_GENEVE_OPT);
42362306a36Sopenharmony_ci	if (ip_tun->options_len &&
42462306a36Sopenharmony_ci	    (tun_type != NFP_FL_TUNNEL_GENEVE ||
42562306a36Sopenharmony_ci	    !(priv->flower_ext_feats & NFP_FL_FEATS_GENEVE_OPT))) {
42662306a36Sopenharmony_ci		NL_SET_ERR_MSG_MOD(extack, "unsupported offload: loaded firmware does not support geneve options offload");
42762306a36Sopenharmony_ci		return -EOPNOTSUPP;
42862306a36Sopenharmony_ci	}
42962306a36Sopenharmony_ci
43062306a36Sopenharmony_ci	if (ip_tun->key.tun_flags & ~NFP_FL_SUPPORTED_UDP_TUN_FLAGS) {
43162306a36Sopenharmony_ci		NL_SET_ERR_MSG_MOD(extack,
43262306a36Sopenharmony_ci				   "unsupported offload: loaded firmware does not support tunnel flag offload");
43362306a36Sopenharmony_ci		return -EOPNOTSUPP;
43462306a36Sopenharmony_ci	}
43562306a36Sopenharmony_ci
43662306a36Sopenharmony_ci	set_tun->head.jump_id = NFP_FL_ACTION_OPCODE_SET_TUNNEL;
43762306a36Sopenharmony_ci	set_tun->head.len_lw = act_size >> NFP_FL_LW_SIZ;
43862306a36Sopenharmony_ci
43962306a36Sopenharmony_ci	/* Set tunnel type and pre-tunnel index. */
44062306a36Sopenharmony_ci	tmp_set_ip_tun_type_index |=
44162306a36Sopenharmony_ci		FIELD_PREP(NFP_FL_TUNNEL_TYPE, tun_type) |
44262306a36Sopenharmony_ci		FIELD_PREP(NFP_FL_PRE_TUN_INDEX, pretun_idx);
44362306a36Sopenharmony_ci
44462306a36Sopenharmony_ci	set_tun->tun_type_index = cpu_to_be32(tmp_set_ip_tun_type_index);
44562306a36Sopenharmony_ci	if (ip_tun->key.tun_flags & NFP_FL_TUNNEL_KEY)
44662306a36Sopenharmony_ci		set_tun->tun_id = ip_tun->key.tun_id;
44762306a36Sopenharmony_ci
44862306a36Sopenharmony_ci	if (ip_tun->key.ttl) {
44962306a36Sopenharmony_ci		set_tun->ttl = ip_tun->key.ttl;
45062306a36Sopenharmony_ci#ifdef CONFIG_IPV6
45162306a36Sopenharmony_ci	} else if (ipv6) {
45262306a36Sopenharmony_ci		struct net *net = dev_net(netdev);
45362306a36Sopenharmony_ci		struct flowi6 flow = {};
45462306a36Sopenharmony_ci		struct dst_entry *dst;
45562306a36Sopenharmony_ci
45662306a36Sopenharmony_ci		flow.daddr = ip_tun->key.u.ipv6.dst;
45762306a36Sopenharmony_ci		flow.flowi4_proto = IPPROTO_UDP;
45862306a36Sopenharmony_ci		dst = ipv6_stub->ipv6_dst_lookup_flow(net, NULL, &flow, NULL);
45962306a36Sopenharmony_ci		if (!IS_ERR(dst)) {
46062306a36Sopenharmony_ci			set_tun->ttl = ip6_dst_hoplimit(dst);
46162306a36Sopenharmony_ci			dst_release(dst);
46262306a36Sopenharmony_ci		} else {
46362306a36Sopenharmony_ci			set_tun->ttl = net->ipv6.devconf_all->hop_limit;
46462306a36Sopenharmony_ci		}
46562306a36Sopenharmony_ci#endif
46662306a36Sopenharmony_ci	} else {
46762306a36Sopenharmony_ci		struct net *net = dev_net(netdev);
46862306a36Sopenharmony_ci		struct flowi4 flow = {};
46962306a36Sopenharmony_ci		struct rtable *rt;
47062306a36Sopenharmony_ci		int err;
47162306a36Sopenharmony_ci
47262306a36Sopenharmony_ci		/* Do a route lookup to determine ttl - if fails then use
47362306a36Sopenharmony_ci		 * default. Note that CONFIG_INET is a requirement of
47462306a36Sopenharmony_ci		 * CONFIG_NET_SWITCHDEV so must be defined here.
47562306a36Sopenharmony_ci		 */
47662306a36Sopenharmony_ci		flow.daddr = ip_tun->key.u.ipv4.dst;
47762306a36Sopenharmony_ci		flow.flowi4_proto = IPPROTO_UDP;
47862306a36Sopenharmony_ci		rt = ip_route_output_key(net, &flow);
47962306a36Sopenharmony_ci		err = PTR_ERR_OR_ZERO(rt);
48062306a36Sopenharmony_ci		if (!err) {
48162306a36Sopenharmony_ci			set_tun->ttl = ip4_dst_hoplimit(&rt->dst);
48262306a36Sopenharmony_ci			ip_rt_put(rt);
48362306a36Sopenharmony_ci		} else {
48462306a36Sopenharmony_ci			set_tun->ttl = READ_ONCE(net->ipv4.sysctl_ip_default_ttl);
48562306a36Sopenharmony_ci		}
48662306a36Sopenharmony_ci	}
48762306a36Sopenharmony_ci
48862306a36Sopenharmony_ci	set_tun->tos = ip_tun->key.tos;
48962306a36Sopenharmony_ci	set_tun->tun_flags = ip_tun->key.tun_flags;
49062306a36Sopenharmony_ci
49162306a36Sopenharmony_ci	if (tun_type == NFP_FL_TUNNEL_GENEVE) {
49262306a36Sopenharmony_ci		set_tun->tun_proto = htons(ETH_P_TEB);
49362306a36Sopenharmony_ci		set_tun->tun_len = ip_tun->options_len / 4;
49462306a36Sopenharmony_ci	}
49562306a36Sopenharmony_ci
49662306a36Sopenharmony_ci	/* Complete pre_tunnel action. */
49762306a36Sopenharmony_ci	if (ipv6) {
49862306a36Sopenharmony_ci		pre_tun->flags |= cpu_to_be16(NFP_FL_PRE_TUN_IPV6);
49962306a36Sopenharmony_ci		pre_tun->ipv6_dst = ip_tun->key.u.ipv6.dst;
50062306a36Sopenharmony_ci	} else {
50162306a36Sopenharmony_ci		pre_tun->ipv4_dst = ip_tun->key.u.ipv4.dst;
50262306a36Sopenharmony_ci	}
50362306a36Sopenharmony_ci
50462306a36Sopenharmony_ci	return 0;
50562306a36Sopenharmony_ci}
50662306a36Sopenharmony_ci
50762306a36Sopenharmony_cistatic void nfp_fl_set_helper32(u32 value, u32 mask, u8 *p_exact, u8 *p_mask)
50862306a36Sopenharmony_ci{
50962306a36Sopenharmony_ci	u32 oldvalue = get_unaligned((u32 *)p_exact);
51062306a36Sopenharmony_ci	u32 oldmask = get_unaligned((u32 *)p_mask);
51162306a36Sopenharmony_ci
51262306a36Sopenharmony_ci	value &= mask;
51362306a36Sopenharmony_ci	value |= oldvalue & ~mask;
51462306a36Sopenharmony_ci
51562306a36Sopenharmony_ci	put_unaligned(oldmask | mask, (u32 *)p_mask);
51662306a36Sopenharmony_ci	put_unaligned(value, (u32 *)p_exact);
51762306a36Sopenharmony_ci}
51862306a36Sopenharmony_ci
51962306a36Sopenharmony_cistatic int
52062306a36Sopenharmony_cinfp_fl_set_eth(const struct flow_action_entry *act, u32 off,
52162306a36Sopenharmony_ci	       struct nfp_fl_set_eth *set_eth, struct netlink_ext_ack *extack)
52262306a36Sopenharmony_ci{
52362306a36Sopenharmony_ci	u32 exact, mask;
52462306a36Sopenharmony_ci
52562306a36Sopenharmony_ci	if (off + 4 > ETH_ALEN * 2) {
52662306a36Sopenharmony_ci		NL_SET_ERR_MSG_MOD(extack, "unsupported offload: invalid pedit ethernet action");
52762306a36Sopenharmony_ci		return -EOPNOTSUPP;
52862306a36Sopenharmony_ci	}
52962306a36Sopenharmony_ci
53062306a36Sopenharmony_ci	mask = ~act->mangle.mask;
53162306a36Sopenharmony_ci	exact = act->mangle.val;
53262306a36Sopenharmony_ci
53362306a36Sopenharmony_ci	if (exact & ~mask) {
53462306a36Sopenharmony_ci		NL_SET_ERR_MSG_MOD(extack, "unsupported offload: invalid pedit ethernet action");
53562306a36Sopenharmony_ci		return -EOPNOTSUPP;
53662306a36Sopenharmony_ci	}
53762306a36Sopenharmony_ci
53862306a36Sopenharmony_ci	nfp_fl_set_helper32(exact, mask, &set_eth->eth_addr_val[off],
53962306a36Sopenharmony_ci			    &set_eth->eth_addr_mask[off]);
54062306a36Sopenharmony_ci
54162306a36Sopenharmony_ci	set_eth->reserved = cpu_to_be16(0);
54262306a36Sopenharmony_ci	set_eth->head.jump_id = NFP_FL_ACTION_OPCODE_SET_ETHERNET;
54362306a36Sopenharmony_ci	set_eth->head.len_lw = sizeof(*set_eth) >> NFP_FL_LW_SIZ;
54462306a36Sopenharmony_ci
54562306a36Sopenharmony_ci	return 0;
54662306a36Sopenharmony_ci}
54762306a36Sopenharmony_ci
54862306a36Sopenharmony_cistruct ipv4_ttl_word {
54962306a36Sopenharmony_ci	__u8	ttl;
55062306a36Sopenharmony_ci	__u8	protocol;
55162306a36Sopenharmony_ci	__sum16	check;
55262306a36Sopenharmony_ci};
55362306a36Sopenharmony_ci
55462306a36Sopenharmony_cistatic int
55562306a36Sopenharmony_cinfp_fl_set_ip4(const struct flow_action_entry *act, u32 off,
55662306a36Sopenharmony_ci	       struct nfp_fl_set_ip4_addrs *set_ip_addr,
55762306a36Sopenharmony_ci	       struct nfp_fl_set_ip4_ttl_tos *set_ip_ttl_tos,
55862306a36Sopenharmony_ci	       struct netlink_ext_ack *extack)
55962306a36Sopenharmony_ci{
56062306a36Sopenharmony_ci	struct ipv4_ttl_word *ttl_word_mask;
56162306a36Sopenharmony_ci	struct ipv4_ttl_word *ttl_word;
56262306a36Sopenharmony_ci	struct iphdr *tos_word_mask;
56362306a36Sopenharmony_ci	struct iphdr *tos_word;
56462306a36Sopenharmony_ci	__be32 exact, mask;
56562306a36Sopenharmony_ci
56662306a36Sopenharmony_ci	/* We are expecting tcf_pedit to return a big endian value */
56762306a36Sopenharmony_ci	mask = (__force __be32)~act->mangle.mask;
56862306a36Sopenharmony_ci	exact = (__force __be32)act->mangle.val;
56962306a36Sopenharmony_ci
57062306a36Sopenharmony_ci	if (exact & ~mask) {
57162306a36Sopenharmony_ci		NL_SET_ERR_MSG_MOD(extack, "unsupported offload: invalid pedit IPv4 action");
57262306a36Sopenharmony_ci		return -EOPNOTSUPP;
57362306a36Sopenharmony_ci	}
57462306a36Sopenharmony_ci
57562306a36Sopenharmony_ci	switch (off) {
57662306a36Sopenharmony_ci	case offsetof(struct iphdr, daddr):
57762306a36Sopenharmony_ci		set_ip_addr->ipv4_dst_mask |= mask;
57862306a36Sopenharmony_ci		set_ip_addr->ipv4_dst &= ~mask;
57962306a36Sopenharmony_ci		set_ip_addr->ipv4_dst |= exact & mask;
58062306a36Sopenharmony_ci		set_ip_addr->head.jump_id = NFP_FL_ACTION_OPCODE_SET_IPV4_ADDRS;
58162306a36Sopenharmony_ci		set_ip_addr->head.len_lw = sizeof(*set_ip_addr) >>
58262306a36Sopenharmony_ci					   NFP_FL_LW_SIZ;
58362306a36Sopenharmony_ci		break;
58462306a36Sopenharmony_ci	case offsetof(struct iphdr, saddr):
58562306a36Sopenharmony_ci		set_ip_addr->ipv4_src_mask |= mask;
58662306a36Sopenharmony_ci		set_ip_addr->ipv4_src &= ~mask;
58762306a36Sopenharmony_ci		set_ip_addr->ipv4_src |= exact & mask;
58862306a36Sopenharmony_ci		set_ip_addr->head.jump_id = NFP_FL_ACTION_OPCODE_SET_IPV4_ADDRS;
58962306a36Sopenharmony_ci		set_ip_addr->head.len_lw = sizeof(*set_ip_addr) >>
59062306a36Sopenharmony_ci					   NFP_FL_LW_SIZ;
59162306a36Sopenharmony_ci		break;
59262306a36Sopenharmony_ci	case offsetof(struct iphdr, ttl):
59362306a36Sopenharmony_ci		ttl_word_mask = (struct ipv4_ttl_word *)&mask;
59462306a36Sopenharmony_ci		ttl_word = (struct ipv4_ttl_word *)&exact;
59562306a36Sopenharmony_ci
59662306a36Sopenharmony_ci		if (ttl_word_mask->protocol || ttl_word_mask->check) {
59762306a36Sopenharmony_ci			NL_SET_ERR_MSG_MOD(extack, "unsupported offload: invalid pedit IPv4 ttl action");
59862306a36Sopenharmony_ci			return -EOPNOTSUPP;
59962306a36Sopenharmony_ci		}
60062306a36Sopenharmony_ci
60162306a36Sopenharmony_ci		set_ip_ttl_tos->ipv4_ttl_mask |= ttl_word_mask->ttl;
60262306a36Sopenharmony_ci		set_ip_ttl_tos->ipv4_ttl &= ~ttl_word_mask->ttl;
60362306a36Sopenharmony_ci		set_ip_ttl_tos->ipv4_ttl |= ttl_word->ttl & ttl_word_mask->ttl;
60462306a36Sopenharmony_ci		set_ip_ttl_tos->head.jump_id =
60562306a36Sopenharmony_ci			NFP_FL_ACTION_OPCODE_SET_IPV4_TTL_TOS;
60662306a36Sopenharmony_ci		set_ip_ttl_tos->head.len_lw = sizeof(*set_ip_ttl_tos) >>
60762306a36Sopenharmony_ci					      NFP_FL_LW_SIZ;
60862306a36Sopenharmony_ci		break;
60962306a36Sopenharmony_ci	case round_down(offsetof(struct iphdr, tos), 4):
61062306a36Sopenharmony_ci		tos_word_mask = (struct iphdr *)&mask;
61162306a36Sopenharmony_ci		tos_word = (struct iphdr *)&exact;
61262306a36Sopenharmony_ci
61362306a36Sopenharmony_ci		if (tos_word_mask->version || tos_word_mask->ihl ||
61462306a36Sopenharmony_ci		    tos_word_mask->tot_len) {
61562306a36Sopenharmony_ci			NL_SET_ERR_MSG_MOD(extack, "unsupported offload: invalid pedit IPv4 tos action");
61662306a36Sopenharmony_ci			return -EOPNOTSUPP;
61762306a36Sopenharmony_ci		}
61862306a36Sopenharmony_ci
61962306a36Sopenharmony_ci		set_ip_ttl_tos->ipv4_tos_mask |= tos_word_mask->tos;
62062306a36Sopenharmony_ci		set_ip_ttl_tos->ipv4_tos &= ~tos_word_mask->tos;
62162306a36Sopenharmony_ci		set_ip_ttl_tos->ipv4_tos |= tos_word->tos & tos_word_mask->tos;
62262306a36Sopenharmony_ci		set_ip_ttl_tos->head.jump_id =
62362306a36Sopenharmony_ci			NFP_FL_ACTION_OPCODE_SET_IPV4_TTL_TOS;
62462306a36Sopenharmony_ci		set_ip_ttl_tos->head.len_lw = sizeof(*set_ip_ttl_tos) >>
62562306a36Sopenharmony_ci					      NFP_FL_LW_SIZ;
62662306a36Sopenharmony_ci		break;
62762306a36Sopenharmony_ci	default:
62862306a36Sopenharmony_ci		NL_SET_ERR_MSG_MOD(extack, "unsupported offload: pedit on unsupported section of IPv4 header");
62962306a36Sopenharmony_ci		return -EOPNOTSUPP;
63062306a36Sopenharmony_ci	}
63162306a36Sopenharmony_ci
63262306a36Sopenharmony_ci	return 0;
63362306a36Sopenharmony_ci}
63462306a36Sopenharmony_ci
63562306a36Sopenharmony_cistatic void
63662306a36Sopenharmony_cinfp_fl_set_ip6_helper(int opcode_tag, u8 word, __be32 exact, __be32 mask,
63762306a36Sopenharmony_ci		      struct nfp_fl_set_ipv6_addr *ip6)
63862306a36Sopenharmony_ci{
63962306a36Sopenharmony_ci	ip6->ipv6[word].mask |= mask;
64062306a36Sopenharmony_ci	ip6->ipv6[word].exact &= ~mask;
64162306a36Sopenharmony_ci	ip6->ipv6[word].exact |= exact & mask;
64262306a36Sopenharmony_ci
64362306a36Sopenharmony_ci	ip6->reserved = cpu_to_be16(0);
64462306a36Sopenharmony_ci	ip6->head.jump_id = opcode_tag;
64562306a36Sopenharmony_ci	ip6->head.len_lw = sizeof(*ip6) >> NFP_FL_LW_SIZ;
64662306a36Sopenharmony_ci}
64762306a36Sopenharmony_ci
64862306a36Sopenharmony_cistruct ipv6_hop_limit_word {
64962306a36Sopenharmony_ci	__be16 payload_len;
65062306a36Sopenharmony_ci	u8 nexthdr;
65162306a36Sopenharmony_ci	u8 hop_limit;
65262306a36Sopenharmony_ci};
65362306a36Sopenharmony_ci
65462306a36Sopenharmony_cistatic int
65562306a36Sopenharmony_cinfp_fl_set_ip6_hop_limit_flow_label(u32 off, __be32 exact, __be32 mask,
65662306a36Sopenharmony_ci				    struct nfp_fl_set_ipv6_tc_hl_fl *ip_hl_fl,
65762306a36Sopenharmony_ci				    struct netlink_ext_ack *extack)
65862306a36Sopenharmony_ci{
65962306a36Sopenharmony_ci	struct ipv6_hop_limit_word *fl_hl_mask;
66062306a36Sopenharmony_ci	struct ipv6_hop_limit_word *fl_hl;
66162306a36Sopenharmony_ci
66262306a36Sopenharmony_ci	switch (off) {
66362306a36Sopenharmony_ci	case offsetof(struct ipv6hdr, payload_len):
66462306a36Sopenharmony_ci		fl_hl_mask = (struct ipv6_hop_limit_word *)&mask;
66562306a36Sopenharmony_ci		fl_hl = (struct ipv6_hop_limit_word *)&exact;
66662306a36Sopenharmony_ci
66762306a36Sopenharmony_ci		if (fl_hl_mask->nexthdr || fl_hl_mask->payload_len) {
66862306a36Sopenharmony_ci			NL_SET_ERR_MSG_MOD(extack, "unsupported offload: invalid pedit IPv6 hop limit action");
66962306a36Sopenharmony_ci			return -EOPNOTSUPP;
67062306a36Sopenharmony_ci		}
67162306a36Sopenharmony_ci
67262306a36Sopenharmony_ci		ip_hl_fl->ipv6_hop_limit_mask |= fl_hl_mask->hop_limit;
67362306a36Sopenharmony_ci		ip_hl_fl->ipv6_hop_limit &= ~fl_hl_mask->hop_limit;
67462306a36Sopenharmony_ci		ip_hl_fl->ipv6_hop_limit |= fl_hl->hop_limit &
67562306a36Sopenharmony_ci					    fl_hl_mask->hop_limit;
67662306a36Sopenharmony_ci		break;
67762306a36Sopenharmony_ci	case round_down(offsetof(struct ipv6hdr, flow_lbl), 4):
67862306a36Sopenharmony_ci		if (mask & ~IPV6_FLOWINFO_MASK ||
67962306a36Sopenharmony_ci		    exact & ~IPV6_FLOWINFO_MASK) {
68062306a36Sopenharmony_ci			NL_SET_ERR_MSG_MOD(extack, "unsupported offload: invalid pedit IPv6 flow info action");
68162306a36Sopenharmony_ci			return -EOPNOTSUPP;
68262306a36Sopenharmony_ci		}
68362306a36Sopenharmony_ci
68462306a36Sopenharmony_ci		ip_hl_fl->ipv6_label_mask |= mask;
68562306a36Sopenharmony_ci		ip_hl_fl->ipv6_label &= ~mask;
68662306a36Sopenharmony_ci		ip_hl_fl->ipv6_label |= exact & mask;
68762306a36Sopenharmony_ci		break;
68862306a36Sopenharmony_ci	}
68962306a36Sopenharmony_ci
69062306a36Sopenharmony_ci	ip_hl_fl->head.jump_id = NFP_FL_ACTION_OPCODE_SET_IPV6_TC_HL_FL;
69162306a36Sopenharmony_ci	ip_hl_fl->head.len_lw = sizeof(*ip_hl_fl) >> NFP_FL_LW_SIZ;
69262306a36Sopenharmony_ci
69362306a36Sopenharmony_ci	return 0;
69462306a36Sopenharmony_ci}
69562306a36Sopenharmony_ci
69662306a36Sopenharmony_cistatic int
69762306a36Sopenharmony_cinfp_fl_set_ip6(const struct flow_action_entry *act, u32 off,
69862306a36Sopenharmony_ci	       struct nfp_fl_set_ipv6_addr *ip_dst,
69962306a36Sopenharmony_ci	       struct nfp_fl_set_ipv6_addr *ip_src,
70062306a36Sopenharmony_ci	       struct nfp_fl_set_ipv6_tc_hl_fl *ip_hl_fl,
70162306a36Sopenharmony_ci	       struct netlink_ext_ack *extack)
70262306a36Sopenharmony_ci{
70362306a36Sopenharmony_ci	__be32 exact, mask;
70462306a36Sopenharmony_ci	int err = 0;
70562306a36Sopenharmony_ci	u8 word;
70662306a36Sopenharmony_ci
70762306a36Sopenharmony_ci	/* We are expecting tcf_pedit to return a big endian value */
70862306a36Sopenharmony_ci	mask = (__force __be32)~act->mangle.mask;
70962306a36Sopenharmony_ci	exact = (__force __be32)act->mangle.val;
71062306a36Sopenharmony_ci
71162306a36Sopenharmony_ci	if (exact & ~mask) {
71262306a36Sopenharmony_ci		NL_SET_ERR_MSG_MOD(extack, "unsupported offload: invalid pedit IPv6 action");
71362306a36Sopenharmony_ci		return -EOPNOTSUPP;
71462306a36Sopenharmony_ci	}
71562306a36Sopenharmony_ci
71662306a36Sopenharmony_ci	if (off < offsetof(struct ipv6hdr, saddr)) {
71762306a36Sopenharmony_ci		err = nfp_fl_set_ip6_hop_limit_flow_label(off, exact, mask,
71862306a36Sopenharmony_ci							  ip_hl_fl, extack);
71962306a36Sopenharmony_ci	} else if (off < offsetof(struct ipv6hdr, daddr)) {
72062306a36Sopenharmony_ci		word = (off - offsetof(struct ipv6hdr, saddr)) / sizeof(exact);
72162306a36Sopenharmony_ci		nfp_fl_set_ip6_helper(NFP_FL_ACTION_OPCODE_SET_IPV6_SRC, word,
72262306a36Sopenharmony_ci				      exact, mask, ip_src);
72362306a36Sopenharmony_ci	} else if (off < offsetof(struct ipv6hdr, daddr) +
72462306a36Sopenharmony_ci		       sizeof(struct in6_addr)) {
72562306a36Sopenharmony_ci		word = (off - offsetof(struct ipv6hdr, daddr)) / sizeof(exact);
72662306a36Sopenharmony_ci		nfp_fl_set_ip6_helper(NFP_FL_ACTION_OPCODE_SET_IPV6_DST, word,
72762306a36Sopenharmony_ci				      exact, mask, ip_dst);
72862306a36Sopenharmony_ci	} else {
72962306a36Sopenharmony_ci		NL_SET_ERR_MSG_MOD(extack, "unsupported offload: pedit on unsupported section of IPv6 header");
73062306a36Sopenharmony_ci		return -EOPNOTSUPP;
73162306a36Sopenharmony_ci	}
73262306a36Sopenharmony_ci
73362306a36Sopenharmony_ci	return err;
73462306a36Sopenharmony_ci}
73562306a36Sopenharmony_ci
73662306a36Sopenharmony_cistatic int
73762306a36Sopenharmony_cinfp_fl_set_tport(const struct flow_action_entry *act, u32 off,
73862306a36Sopenharmony_ci		 struct nfp_fl_set_tport *set_tport, int opcode,
73962306a36Sopenharmony_ci		 struct netlink_ext_ack *extack)
74062306a36Sopenharmony_ci{
74162306a36Sopenharmony_ci	u32 exact, mask;
74262306a36Sopenharmony_ci
74362306a36Sopenharmony_ci	if (off) {
74462306a36Sopenharmony_ci		NL_SET_ERR_MSG_MOD(extack, "unsupported offload: pedit on unsupported section of L4 header");
74562306a36Sopenharmony_ci		return -EOPNOTSUPP;
74662306a36Sopenharmony_ci	}
74762306a36Sopenharmony_ci
74862306a36Sopenharmony_ci	mask = ~act->mangle.mask;
74962306a36Sopenharmony_ci	exact = act->mangle.val;
75062306a36Sopenharmony_ci
75162306a36Sopenharmony_ci	if (exact & ~mask) {
75262306a36Sopenharmony_ci		NL_SET_ERR_MSG_MOD(extack, "unsupported offload: invalid pedit L4 action");
75362306a36Sopenharmony_ci		return -EOPNOTSUPP;
75462306a36Sopenharmony_ci	}
75562306a36Sopenharmony_ci
75662306a36Sopenharmony_ci	nfp_fl_set_helper32(exact, mask, set_tport->tp_port_val,
75762306a36Sopenharmony_ci			    set_tport->tp_port_mask);
75862306a36Sopenharmony_ci
75962306a36Sopenharmony_ci	set_tport->reserved = cpu_to_be16(0);
76062306a36Sopenharmony_ci	set_tport->head.jump_id = opcode;
76162306a36Sopenharmony_ci	set_tport->head.len_lw = sizeof(*set_tport) >> NFP_FL_LW_SIZ;
76262306a36Sopenharmony_ci
76362306a36Sopenharmony_ci	return 0;
76462306a36Sopenharmony_ci}
76562306a36Sopenharmony_ci
76662306a36Sopenharmony_cistatic u32 nfp_fl_csum_l4_to_flag(u8 ip_proto)
76762306a36Sopenharmony_ci{
76862306a36Sopenharmony_ci	switch (ip_proto) {
76962306a36Sopenharmony_ci	case 0:
77062306a36Sopenharmony_ci		/* Filter doesn't force proto match,
77162306a36Sopenharmony_ci		 * both TCP and UDP will be updated if encountered
77262306a36Sopenharmony_ci		 */
77362306a36Sopenharmony_ci		return TCA_CSUM_UPDATE_FLAG_TCP | TCA_CSUM_UPDATE_FLAG_UDP;
77462306a36Sopenharmony_ci	case IPPROTO_TCP:
77562306a36Sopenharmony_ci		return TCA_CSUM_UPDATE_FLAG_TCP;
77662306a36Sopenharmony_ci	case IPPROTO_UDP:
77762306a36Sopenharmony_ci		return TCA_CSUM_UPDATE_FLAG_UDP;
77862306a36Sopenharmony_ci	default:
77962306a36Sopenharmony_ci		/* All other protocols will be ignored by FW */
78062306a36Sopenharmony_ci		return 0;
78162306a36Sopenharmony_ci	}
78262306a36Sopenharmony_ci}
78362306a36Sopenharmony_ci
78462306a36Sopenharmony_cistruct nfp_flower_pedit_acts {
78562306a36Sopenharmony_ci	struct nfp_fl_set_ipv6_addr set_ip6_dst, set_ip6_src;
78662306a36Sopenharmony_ci	struct nfp_fl_set_ipv6_tc_hl_fl set_ip6_tc_hl_fl;
78762306a36Sopenharmony_ci	struct nfp_fl_set_ip4_ttl_tos set_ip_ttl_tos;
78862306a36Sopenharmony_ci	struct nfp_fl_set_ip4_addrs set_ip_addr;
78962306a36Sopenharmony_ci	struct nfp_fl_set_tport set_tport;
79062306a36Sopenharmony_ci	struct nfp_fl_set_eth set_eth;
79162306a36Sopenharmony_ci};
79262306a36Sopenharmony_ci
79362306a36Sopenharmony_cistatic int
79462306a36Sopenharmony_cinfp_fl_commit_mangle(struct flow_rule *rule, char *nfp_action,
79562306a36Sopenharmony_ci		     int *a_len, struct nfp_flower_pedit_acts *set_act,
79662306a36Sopenharmony_ci		     u32 *csum_updated)
79762306a36Sopenharmony_ci{
79862306a36Sopenharmony_ci	size_t act_size = 0;
79962306a36Sopenharmony_ci	u8 ip_proto = 0;
80062306a36Sopenharmony_ci
80162306a36Sopenharmony_ci	if (flow_rule_match_key(rule, FLOW_DISSECTOR_KEY_BASIC)) {
80262306a36Sopenharmony_ci		struct flow_match_basic match;
80362306a36Sopenharmony_ci
80462306a36Sopenharmony_ci		flow_rule_match_basic(rule, &match);
80562306a36Sopenharmony_ci		ip_proto = match.key->ip_proto;
80662306a36Sopenharmony_ci	}
80762306a36Sopenharmony_ci
80862306a36Sopenharmony_ci	if (set_act->set_eth.head.len_lw) {
80962306a36Sopenharmony_ci		act_size = sizeof(set_act->set_eth);
81062306a36Sopenharmony_ci		memcpy(nfp_action, &set_act->set_eth, act_size);
81162306a36Sopenharmony_ci		*a_len += act_size;
81262306a36Sopenharmony_ci	}
81362306a36Sopenharmony_ci
81462306a36Sopenharmony_ci	if (set_act->set_ip_ttl_tos.head.len_lw) {
81562306a36Sopenharmony_ci		nfp_action += act_size;
81662306a36Sopenharmony_ci		act_size = sizeof(set_act->set_ip_ttl_tos);
81762306a36Sopenharmony_ci		memcpy(nfp_action, &set_act->set_ip_ttl_tos, act_size);
81862306a36Sopenharmony_ci		*a_len += act_size;
81962306a36Sopenharmony_ci
82062306a36Sopenharmony_ci		/* Hardware will automatically fix IPv4 and TCP/UDP checksum. */
82162306a36Sopenharmony_ci		*csum_updated |= TCA_CSUM_UPDATE_FLAG_IPV4HDR |
82262306a36Sopenharmony_ci				nfp_fl_csum_l4_to_flag(ip_proto);
82362306a36Sopenharmony_ci	}
82462306a36Sopenharmony_ci
82562306a36Sopenharmony_ci	if (set_act->set_ip_addr.head.len_lw) {
82662306a36Sopenharmony_ci		nfp_action += act_size;
82762306a36Sopenharmony_ci		act_size = sizeof(set_act->set_ip_addr);
82862306a36Sopenharmony_ci		memcpy(nfp_action, &set_act->set_ip_addr, act_size);
82962306a36Sopenharmony_ci		*a_len += act_size;
83062306a36Sopenharmony_ci
83162306a36Sopenharmony_ci		/* Hardware will automatically fix IPv4 and TCP/UDP checksum. */
83262306a36Sopenharmony_ci		*csum_updated |= TCA_CSUM_UPDATE_FLAG_IPV4HDR |
83362306a36Sopenharmony_ci				nfp_fl_csum_l4_to_flag(ip_proto);
83462306a36Sopenharmony_ci	}
83562306a36Sopenharmony_ci
83662306a36Sopenharmony_ci	if (set_act->set_ip6_tc_hl_fl.head.len_lw) {
83762306a36Sopenharmony_ci		nfp_action += act_size;
83862306a36Sopenharmony_ci		act_size = sizeof(set_act->set_ip6_tc_hl_fl);
83962306a36Sopenharmony_ci		memcpy(nfp_action, &set_act->set_ip6_tc_hl_fl, act_size);
84062306a36Sopenharmony_ci		*a_len += act_size;
84162306a36Sopenharmony_ci
84262306a36Sopenharmony_ci		/* Hardware will automatically fix TCP/UDP checksum. */
84362306a36Sopenharmony_ci		*csum_updated |= nfp_fl_csum_l4_to_flag(ip_proto);
84462306a36Sopenharmony_ci	}
84562306a36Sopenharmony_ci
84662306a36Sopenharmony_ci	if (set_act->set_ip6_dst.head.len_lw &&
84762306a36Sopenharmony_ci	    set_act->set_ip6_src.head.len_lw) {
84862306a36Sopenharmony_ci		/* TC compiles set src and dst IPv6 address as a single action,
84962306a36Sopenharmony_ci		 * the hardware requires this to be 2 separate actions.
85062306a36Sopenharmony_ci		 */
85162306a36Sopenharmony_ci		nfp_action += act_size;
85262306a36Sopenharmony_ci		act_size = sizeof(set_act->set_ip6_src);
85362306a36Sopenharmony_ci		memcpy(nfp_action, &set_act->set_ip6_src, act_size);
85462306a36Sopenharmony_ci		*a_len += act_size;
85562306a36Sopenharmony_ci
85662306a36Sopenharmony_ci		act_size = sizeof(set_act->set_ip6_dst);
85762306a36Sopenharmony_ci		memcpy(&nfp_action[sizeof(set_act->set_ip6_src)],
85862306a36Sopenharmony_ci		       &set_act->set_ip6_dst, act_size);
85962306a36Sopenharmony_ci		*a_len += act_size;
86062306a36Sopenharmony_ci
86162306a36Sopenharmony_ci		/* Hardware will automatically fix TCP/UDP checksum. */
86262306a36Sopenharmony_ci		*csum_updated |= nfp_fl_csum_l4_to_flag(ip_proto);
86362306a36Sopenharmony_ci	} else if (set_act->set_ip6_dst.head.len_lw) {
86462306a36Sopenharmony_ci		nfp_action += act_size;
86562306a36Sopenharmony_ci		act_size = sizeof(set_act->set_ip6_dst);
86662306a36Sopenharmony_ci		memcpy(nfp_action, &set_act->set_ip6_dst, act_size);
86762306a36Sopenharmony_ci		*a_len += act_size;
86862306a36Sopenharmony_ci
86962306a36Sopenharmony_ci		/* Hardware will automatically fix TCP/UDP checksum. */
87062306a36Sopenharmony_ci		*csum_updated |= nfp_fl_csum_l4_to_flag(ip_proto);
87162306a36Sopenharmony_ci	} else if (set_act->set_ip6_src.head.len_lw) {
87262306a36Sopenharmony_ci		nfp_action += act_size;
87362306a36Sopenharmony_ci		act_size = sizeof(set_act->set_ip6_src);
87462306a36Sopenharmony_ci		memcpy(nfp_action, &set_act->set_ip6_src, act_size);
87562306a36Sopenharmony_ci		*a_len += act_size;
87662306a36Sopenharmony_ci
87762306a36Sopenharmony_ci		/* Hardware will automatically fix TCP/UDP checksum. */
87862306a36Sopenharmony_ci		*csum_updated |= nfp_fl_csum_l4_to_flag(ip_proto);
87962306a36Sopenharmony_ci	}
88062306a36Sopenharmony_ci	if (set_act->set_tport.head.len_lw) {
88162306a36Sopenharmony_ci		nfp_action += act_size;
88262306a36Sopenharmony_ci		act_size = sizeof(set_act->set_tport);
88362306a36Sopenharmony_ci		memcpy(nfp_action, &set_act->set_tport, act_size);
88462306a36Sopenharmony_ci		*a_len += act_size;
88562306a36Sopenharmony_ci
88662306a36Sopenharmony_ci		/* Hardware will automatically fix TCP/UDP checksum. */
88762306a36Sopenharmony_ci		*csum_updated |= nfp_fl_csum_l4_to_flag(ip_proto);
88862306a36Sopenharmony_ci	}
88962306a36Sopenharmony_ci
89062306a36Sopenharmony_ci	return 0;
89162306a36Sopenharmony_ci}
89262306a36Sopenharmony_ci
89362306a36Sopenharmony_cistatic int
89462306a36Sopenharmony_cinfp_fl_pedit(const struct flow_action_entry *act,
89562306a36Sopenharmony_ci	     char *nfp_action, int *a_len,
89662306a36Sopenharmony_ci	     u32 *csum_updated, struct nfp_flower_pedit_acts *set_act,
89762306a36Sopenharmony_ci	     struct netlink_ext_ack *extack)
89862306a36Sopenharmony_ci{
89962306a36Sopenharmony_ci	enum flow_action_mangle_base htype;
90062306a36Sopenharmony_ci	u32 offset;
90162306a36Sopenharmony_ci
90262306a36Sopenharmony_ci	htype = act->mangle.htype;
90362306a36Sopenharmony_ci	offset = act->mangle.offset;
90462306a36Sopenharmony_ci
90562306a36Sopenharmony_ci	switch (htype) {
90662306a36Sopenharmony_ci	case TCA_PEDIT_KEY_EX_HDR_TYPE_ETH:
90762306a36Sopenharmony_ci		return nfp_fl_set_eth(act, offset, &set_act->set_eth, extack);
90862306a36Sopenharmony_ci	case TCA_PEDIT_KEY_EX_HDR_TYPE_IP4:
90962306a36Sopenharmony_ci		return nfp_fl_set_ip4(act, offset, &set_act->set_ip_addr,
91062306a36Sopenharmony_ci				      &set_act->set_ip_ttl_tos, extack);
91162306a36Sopenharmony_ci	case TCA_PEDIT_KEY_EX_HDR_TYPE_IP6:
91262306a36Sopenharmony_ci		return nfp_fl_set_ip6(act, offset, &set_act->set_ip6_dst,
91362306a36Sopenharmony_ci				      &set_act->set_ip6_src,
91462306a36Sopenharmony_ci				      &set_act->set_ip6_tc_hl_fl, extack);
91562306a36Sopenharmony_ci	case TCA_PEDIT_KEY_EX_HDR_TYPE_TCP:
91662306a36Sopenharmony_ci		return nfp_fl_set_tport(act, offset, &set_act->set_tport,
91762306a36Sopenharmony_ci					NFP_FL_ACTION_OPCODE_SET_TCP, extack);
91862306a36Sopenharmony_ci	case TCA_PEDIT_KEY_EX_HDR_TYPE_UDP:
91962306a36Sopenharmony_ci		return nfp_fl_set_tport(act, offset, &set_act->set_tport,
92062306a36Sopenharmony_ci					NFP_FL_ACTION_OPCODE_SET_UDP, extack);
92162306a36Sopenharmony_ci	default:
92262306a36Sopenharmony_ci		NL_SET_ERR_MSG_MOD(extack, "unsupported offload: pedit on unsupported header");
92362306a36Sopenharmony_ci		return -EOPNOTSUPP;
92462306a36Sopenharmony_ci	}
92562306a36Sopenharmony_ci}
92662306a36Sopenharmony_ci
92762306a36Sopenharmony_cistatic struct nfp_fl_meter *nfp_fl_meter(char *act_data)
92862306a36Sopenharmony_ci{
92962306a36Sopenharmony_ci	size_t act_size = sizeof(struct nfp_fl_meter);
93062306a36Sopenharmony_ci	struct nfp_fl_meter *meter_act;
93162306a36Sopenharmony_ci
93262306a36Sopenharmony_ci	meter_act = (struct nfp_fl_meter *)act_data;
93362306a36Sopenharmony_ci
93462306a36Sopenharmony_ci	memset(meter_act, 0, act_size);
93562306a36Sopenharmony_ci
93662306a36Sopenharmony_ci	meter_act->head.jump_id = NFP_FL_ACTION_OPCODE_METER;
93762306a36Sopenharmony_ci	meter_act->head.len_lw = act_size >> NFP_FL_LW_SIZ;
93862306a36Sopenharmony_ci
93962306a36Sopenharmony_ci	return meter_act;
94062306a36Sopenharmony_ci}
94162306a36Sopenharmony_ci
94262306a36Sopenharmony_cistatic int
94362306a36Sopenharmony_cinfp_flower_meter_action(struct nfp_app *app,
94462306a36Sopenharmony_ci			const struct flow_action_entry *action,
94562306a36Sopenharmony_ci			struct nfp_fl_payload *nfp_fl, int *a_len,
94662306a36Sopenharmony_ci			struct net_device *netdev,
94762306a36Sopenharmony_ci			struct netlink_ext_ack *extack)
94862306a36Sopenharmony_ci{
94962306a36Sopenharmony_ci	struct nfp_fl_meter *fl_meter;
95062306a36Sopenharmony_ci	u32 meter_id;
95162306a36Sopenharmony_ci
95262306a36Sopenharmony_ci	if (*a_len + sizeof(struct nfp_fl_meter) > NFP_FL_MAX_A_SIZ) {
95362306a36Sopenharmony_ci		NL_SET_ERR_MSG_MOD(extack,
95462306a36Sopenharmony_ci				   "unsupported offload:meter action size beyond the allowed maximum");
95562306a36Sopenharmony_ci		return -EOPNOTSUPP;
95662306a36Sopenharmony_ci	}
95762306a36Sopenharmony_ci
95862306a36Sopenharmony_ci	meter_id = action->hw_index;
95962306a36Sopenharmony_ci	if (!nfp_flower_search_meter_entry(app, meter_id)) {
96062306a36Sopenharmony_ci		NL_SET_ERR_MSG_MOD(extack,
96162306a36Sopenharmony_ci				   "can not offload flow table with unsupported police action.");
96262306a36Sopenharmony_ci		return -EOPNOTSUPP;
96362306a36Sopenharmony_ci	}
96462306a36Sopenharmony_ci
96562306a36Sopenharmony_ci	fl_meter = nfp_fl_meter(&nfp_fl->action_data[*a_len]);
96662306a36Sopenharmony_ci	*a_len += sizeof(struct nfp_fl_meter);
96762306a36Sopenharmony_ci	fl_meter->meter_id = cpu_to_be32(meter_id);
96862306a36Sopenharmony_ci
96962306a36Sopenharmony_ci	return 0;
97062306a36Sopenharmony_ci}
97162306a36Sopenharmony_ci
97262306a36Sopenharmony_cistatic int
97362306a36Sopenharmony_cinfp_flower_output_action(struct nfp_app *app,
97462306a36Sopenharmony_ci			 const struct flow_action_entry *act,
97562306a36Sopenharmony_ci			 struct nfp_fl_payload *nfp_fl, int *a_len,
97662306a36Sopenharmony_ci			 struct net_device *netdev, bool last,
97762306a36Sopenharmony_ci			 enum nfp_flower_tun_type *tun_type, int *tun_out_cnt,
97862306a36Sopenharmony_ci			 int *out_cnt, u32 *csum_updated, bool pkt_host,
97962306a36Sopenharmony_ci			 struct netlink_ext_ack *extack)
98062306a36Sopenharmony_ci{
98162306a36Sopenharmony_ci	struct nfp_flower_priv *priv = app->priv;
98262306a36Sopenharmony_ci	struct nfp_fl_output *output;
98362306a36Sopenharmony_ci	int err, prelag_size;
98462306a36Sopenharmony_ci
98562306a36Sopenharmony_ci	/* If csum_updated has not been reset by now, it means HW will
98662306a36Sopenharmony_ci	 * incorrectly update csums when they are not requested.
98762306a36Sopenharmony_ci	 */
98862306a36Sopenharmony_ci	if (*csum_updated) {
98962306a36Sopenharmony_ci		NL_SET_ERR_MSG_MOD(extack, "unsupported offload: set actions without updating checksums are not supported");
99062306a36Sopenharmony_ci		return -EOPNOTSUPP;
99162306a36Sopenharmony_ci	}
99262306a36Sopenharmony_ci
99362306a36Sopenharmony_ci	if (*a_len + sizeof(struct nfp_fl_output) > NFP_FL_MAX_A_SIZ) {
99462306a36Sopenharmony_ci		NL_SET_ERR_MSG_MOD(extack, "unsupported offload: mirred output increases action list size beyond the allowed maximum");
99562306a36Sopenharmony_ci		return -EOPNOTSUPP;
99662306a36Sopenharmony_ci	}
99762306a36Sopenharmony_ci
99862306a36Sopenharmony_ci	output = (struct nfp_fl_output *)&nfp_fl->action_data[*a_len];
99962306a36Sopenharmony_ci	err = nfp_fl_output(app, output, act, nfp_fl, last, netdev, *tun_type,
100062306a36Sopenharmony_ci			    tun_out_cnt, pkt_host, extack);
100162306a36Sopenharmony_ci	if (err)
100262306a36Sopenharmony_ci		return err;
100362306a36Sopenharmony_ci
100462306a36Sopenharmony_ci	*a_len += sizeof(struct nfp_fl_output);
100562306a36Sopenharmony_ci
100662306a36Sopenharmony_ci	if (priv->flower_en_feats & NFP_FL_ENABLE_LAG) {
100762306a36Sopenharmony_ci		/* nfp_fl_pre_lag returns -err or size of prelag action added.
100862306a36Sopenharmony_ci		 * This will be 0 if it is not egressing to a lag dev.
100962306a36Sopenharmony_ci		 */
101062306a36Sopenharmony_ci		prelag_size = nfp_fl_pre_lag(app, act, nfp_fl, *a_len, extack);
101162306a36Sopenharmony_ci		if (prelag_size < 0) {
101262306a36Sopenharmony_ci			return prelag_size;
101362306a36Sopenharmony_ci		} else if (prelag_size > 0 && (!last || *out_cnt)) {
101462306a36Sopenharmony_ci			NL_SET_ERR_MSG_MOD(extack, "unsupported offload: LAG action has to be last action in action list");
101562306a36Sopenharmony_ci			return -EOPNOTSUPP;
101662306a36Sopenharmony_ci		}
101762306a36Sopenharmony_ci
101862306a36Sopenharmony_ci		*a_len += prelag_size;
101962306a36Sopenharmony_ci	}
102062306a36Sopenharmony_ci	(*out_cnt)++;
102162306a36Sopenharmony_ci
102262306a36Sopenharmony_ci	return 0;
102362306a36Sopenharmony_ci}
102462306a36Sopenharmony_ci
102562306a36Sopenharmony_cistatic int
102662306a36Sopenharmony_cinfp_flower_loop_action(struct nfp_app *app, const struct flow_action_entry *act,
102762306a36Sopenharmony_ci		       struct flow_rule *rule,
102862306a36Sopenharmony_ci		       struct nfp_fl_payload *nfp_fl, int *a_len,
102962306a36Sopenharmony_ci		       struct net_device *netdev,
103062306a36Sopenharmony_ci		       enum nfp_flower_tun_type *tun_type, int *tun_out_cnt,
103162306a36Sopenharmony_ci		       int *out_cnt, u32 *csum_updated,
103262306a36Sopenharmony_ci		       struct nfp_flower_pedit_acts *set_act, bool *pkt_host,
103362306a36Sopenharmony_ci		       struct netlink_ext_ack *extack, int act_idx)
103462306a36Sopenharmony_ci{
103562306a36Sopenharmony_ci	struct nfp_flower_priv *fl_priv = app->priv;
103662306a36Sopenharmony_ci	struct nfp_fl_pre_tunnel *pre_tun;
103762306a36Sopenharmony_ci	struct nfp_fl_set_tun *set_tun;
103862306a36Sopenharmony_ci	struct nfp_fl_push_vlan *psh_v;
103962306a36Sopenharmony_ci	struct nfp_fl_push_mpls *psh_m;
104062306a36Sopenharmony_ci	struct nfp_fl_pop_vlan *pop_v;
104162306a36Sopenharmony_ci	struct nfp_fl_pop_mpls *pop_m;
104262306a36Sopenharmony_ci	struct nfp_fl_set_mpls *set_m;
104362306a36Sopenharmony_ci	int err;
104462306a36Sopenharmony_ci
104562306a36Sopenharmony_ci	switch (act->id) {
104662306a36Sopenharmony_ci	case FLOW_ACTION_DROP:
104762306a36Sopenharmony_ci		nfp_fl->meta.shortcut = cpu_to_be32(NFP_FL_SC_ACT_DROP);
104862306a36Sopenharmony_ci		break;
104962306a36Sopenharmony_ci	case FLOW_ACTION_REDIRECT_INGRESS:
105062306a36Sopenharmony_ci	case FLOW_ACTION_REDIRECT:
105162306a36Sopenharmony_ci		err = nfp_flower_output_action(app, act, nfp_fl, a_len, netdev,
105262306a36Sopenharmony_ci					       true, tun_type, tun_out_cnt,
105362306a36Sopenharmony_ci					       out_cnt, csum_updated, *pkt_host,
105462306a36Sopenharmony_ci					       extack);
105562306a36Sopenharmony_ci		if (err)
105662306a36Sopenharmony_ci			return err;
105762306a36Sopenharmony_ci		break;
105862306a36Sopenharmony_ci	case FLOW_ACTION_MIRRED_INGRESS:
105962306a36Sopenharmony_ci	case FLOW_ACTION_MIRRED:
106062306a36Sopenharmony_ci		err = nfp_flower_output_action(app, act, nfp_fl, a_len, netdev,
106162306a36Sopenharmony_ci					       false, tun_type, tun_out_cnt,
106262306a36Sopenharmony_ci					       out_cnt, csum_updated, *pkt_host,
106362306a36Sopenharmony_ci					       extack);
106462306a36Sopenharmony_ci		if (err)
106562306a36Sopenharmony_ci			return err;
106662306a36Sopenharmony_ci		break;
106762306a36Sopenharmony_ci	case FLOW_ACTION_VLAN_POP:
106862306a36Sopenharmony_ci		if (*a_len +
106962306a36Sopenharmony_ci		    sizeof(struct nfp_fl_pop_vlan) > NFP_FL_MAX_A_SIZ) {
107062306a36Sopenharmony_ci			NL_SET_ERR_MSG_MOD(extack, "unsupported offload: maximum allowed action list size exceeded at pop vlan");
107162306a36Sopenharmony_ci			return -EOPNOTSUPP;
107262306a36Sopenharmony_ci		}
107362306a36Sopenharmony_ci
107462306a36Sopenharmony_ci		pop_v = (struct nfp_fl_pop_vlan *)&nfp_fl->action_data[*a_len];
107562306a36Sopenharmony_ci		nfp_fl->meta.shortcut = cpu_to_be32(NFP_FL_SC_ACT_POPV);
107662306a36Sopenharmony_ci
107762306a36Sopenharmony_ci		nfp_fl_pop_vlan(pop_v);
107862306a36Sopenharmony_ci		*a_len += sizeof(struct nfp_fl_pop_vlan);
107962306a36Sopenharmony_ci		break;
108062306a36Sopenharmony_ci	case FLOW_ACTION_VLAN_PUSH:
108162306a36Sopenharmony_ci		if (*a_len +
108262306a36Sopenharmony_ci		    sizeof(struct nfp_fl_push_vlan) > NFP_FL_MAX_A_SIZ) {
108362306a36Sopenharmony_ci			NL_SET_ERR_MSG_MOD(extack, "unsupported offload: maximum allowed action list size exceeded at push vlan");
108462306a36Sopenharmony_ci			return -EOPNOTSUPP;
108562306a36Sopenharmony_ci		}
108662306a36Sopenharmony_ci
108762306a36Sopenharmony_ci		psh_v = (struct nfp_fl_push_vlan *)&nfp_fl->action_data[*a_len];
108862306a36Sopenharmony_ci		nfp_fl->meta.shortcut = cpu_to_be32(NFP_FL_SC_ACT_NULL);
108962306a36Sopenharmony_ci
109062306a36Sopenharmony_ci		nfp_fl_push_vlan(psh_v, act);
109162306a36Sopenharmony_ci		*a_len += sizeof(struct nfp_fl_push_vlan);
109262306a36Sopenharmony_ci		break;
109362306a36Sopenharmony_ci	case FLOW_ACTION_TUNNEL_ENCAP: {
109462306a36Sopenharmony_ci		const struct ip_tunnel_info *ip_tun = act->tunnel;
109562306a36Sopenharmony_ci
109662306a36Sopenharmony_ci		*tun_type = nfp_fl_get_tun_from_act(app, rule, act, act_idx);
109762306a36Sopenharmony_ci		if (*tun_type == NFP_FL_TUNNEL_NONE) {
109862306a36Sopenharmony_ci			NL_SET_ERR_MSG_MOD(extack, "unsupported offload: unsupported tunnel type in action list");
109962306a36Sopenharmony_ci			return -EOPNOTSUPP;
110062306a36Sopenharmony_ci		}
110162306a36Sopenharmony_ci
110262306a36Sopenharmony_ci		if (ip_tun->mode & ~NFP_FL_SUPPORTED_TUNNEL_INFO_FLAGS) {
110362306a36Sopenharmony_ci			NL_SET_ERR_MSG_MOD(extack, "unsupported offload: unsupported tunnel flags in action list");
110462306a36Sopenharmony_ci			return -EOPNOTSUPP;
110562306a36Sopenharmony_ci		}
110662306a36Sopenharmony_ci
110762306a36Sopenharmony_ci		/* Pre-tunnel action is required for tunnel encap.
110862306a36Sopenharmony_ci		 * This checks for next hop entries on NFP.
110962306a36Sopenharmony_ci		 * If none, the packet falls back before applying other actions.
111062306a36Sopenharmony_ci		 */
111162306a36Sopenharmony_ci		if (*a_len + sizeof(struct nfp_fl_pre_tunnel) +
111262306a36Sopenharmony_ci		    sizeof(struct nfp_fl_set_tun) > NFP_FL_MAX_A_SIZ) {
111362306a36Sopenharmony_ci			NL_SET_ERR_MSG_MOD(extack, "unsupported offload: maximum allowed action list size exceeded at tunnel encap");
111462306a36Sopenharmony_ci			return -EOPNOTSUPP;
111562306a36Sopenharmony_ci		}
111662306a36Sopenharmony_ci
111762306a36Sopenharmony_ci		pre_tun = nfp_fl_pre_tunnel(nfp_fl->action_data, *a_len);
111862306a36Sopenharmony_ci		nfp_fl->meta.shortcut = cpu_to_be32(NFP_FL_SC_ACT_NULL);
111962306a36Sopenharmony_ci		*a_len += sizeof(struct nfp_fl_pre_tunnel);
112062306a36Sopenharmony_ci
112162306a36Sopenharmony_ci		err = nfp_fl_push_geneve_options(nfp_fl, a_len, act, extack);
112262306a36Sopenharmony_ci		if (err)
112362306a36Sopenharmony_ci			return err;
112462306a36Sopenharmony_ci
112562306a36Sopenharmony_ci		set_tun = (void *)&nfp_fl->action_data[*a_len];
112662306a36Sopenharmony_ci		err = nfp_fl_set_tun(app, set_tun, act, pre_tun, *tun_type,
112762306a36Sopenharmony_ci				     netdev, extack);
112862306a36Sopenharmony_ci		if (err)
112962306a36Sopenharmony_ci			return err;
113062306a36Sopenharmony_ci		*a_len += sizeof(struct nfp_fl_set_tun);
113162306a36Sopenharmony_ci		}
113262306a36Sopenharmony_ci		break;
113362306a36Sopenharmony_ci	case FLOW_ACTION_TUNNEL_DECAP:
113462306a36Sopenharmony_ci		/* Tunnel decap is handled by default so accept action. */
113562306a36Sopenharmony_ci		return 0;
113662306a36Sopenharmony_ci	case FLOW_ACTION_MANGLE:
113762306a36Sopenharmony_ci		if (nfp_fl_pedit(act, &nfp_fl->action_data[*a_len],
113862306a36Sopenharmony_ci				 a_len, csum_updated, set_act, extack))
113962306a36Sopenharmony_ci			return -EOPNOTSUPP;
114062306a36Sopenharmony_ci		break;
114162306a36Sopenharmony_ci	case FLOW_ACTION_CSUM:
114262306a36Sopenharmony_ci		/* csum action requests recalc of something we have not fixed */
114362306a36Sopenharmony_ci		if (act->csum_flags & ~*csum_updated) {
114462306a36Sopenharmony_ci			NL_SET_ERR_MSG_MOD(extack, "unsupported offload: unsupported csum update action in action list");
114562306a36Sopenharmony_ci			return -EOPNOTSUPP;
114662306a36Sopenharmony_ci		}
114762306a36Sopenharmony_ci		/* If we will correctly fix the csum we can remove it from the
114862306a36Sopenharmony_ci		 * csum update list. Which will later be used to check support.
114962306a36Sopenharmony_ci		 */
115062306a36Sopenharmony_ci		*csum_updated &= ~act->csum_flags;
115162306a36Sopenharmony_ci		break;
115262306a36Sopenharmony_ci	case FLOW_ACTION_MPLS_PUSH:
115362306a36Sopenharmony_ci		if (*a_len +
115462306a36Sopenharmony_ci		    sizeof(struct nfp_fl_push_mpls) > NFP_FL_MAX_A_SIZ) {
115562306a36Sopenharmony_ci			NL_SET_ERR_MSG_MOD(extack, "unsupported offload: maximum allowed action list size exceeded at push MPLS");
115662306a36Sopenharmony_ci			return -EOPNOTSUPP;
115762306a36Sopenharmony_ci		}
115862306a36Sopenharmony_ci
115962306a36Sopenharmony_ci		psh_m = (struct nfp_fl_push_mpls *)&nfp_fl->action_data[*a_len];
116062306a36Sopenharmony_ci		nfp_fl->meta.shortcut = cpu_to_be32(NFP_FL_SC_ACT_NULL);
116162306a36Sopenharmony_ci
116262306a36Sopenharmony_ci		err = nfp_fl_push_mpls(psh_m, act, extack);
116362306a36Sopenharmony_ci		if (err)
116462306a36Sopenharmony_ci			return err;
116562306a36Sopenharmony_ci		*a_len += sizeof(struct nfp_fl_push_mpls);
116662306a36Sopenharmony_ci		break;
116762306a36Sopenharmony_ci	case FLOW_ACTION_MPLS_POP:
116862306a36Sopenharmony_ci		if (*a_len +
116962306a36Sopenharmony_ci		    sizeof(struct nfp_fl_pop_mpls) > NFP_FL_MAX_A_SIZ) {
117062306a36Sopenharmony_ci			NL_SET_ERR_MSG_MOD(extack, "unsupported offload: maximum allowed action list size exceeded at pop MPLS");
117162306a36Sopenharmony_ci			return -EOPNOTSUPP;
117262306a36Sopenharmony_ci		}
117362306a36Sopenharmony_ci
117462306a36Sopenharmony_ci		pop_m = (struct nfp_fl_pop_mpls *)&nfp_fl->action_data[*a_len];
117562306a36Sopenharmony_ci		nfp_fl->meta.shortcut = cpu_to_be32(NFP_FL_SC_ACT_NULL);
117662306a36Sopenharmony_ci
117762306a36Sopenharmony_ci		nfp_fl_pop_mpls(pop_m, act);
117862306a36Sopenharmony_ci		*a_len += sizeof(struct nfp_fl_pop_mpls);
117962306a36Sopenharmony_ci		break;
118062306a36Sopenharmony_ci	case FLOW_ACTION_MPLS_MANGLE:
118162306a36Sopenharmony_ci		if (*a_len +
118262306a36Sopenharmony_ci		    sizeof(struct nfp_fl_set_mpls) > NFP_FL_MAX_A_SIZ) {
118362306a36Sopenharmony_ci			NL_SET_ERR_MSG_MOD(extack, "unsupported offload: maximum allowed action list size exceeded at set MPLS");
118462306a36Sopenharmony_ci			return -EOPNOTSUPP;
118562306a36Sopenharmony_ci		}
118662306a36Sopenharmony_ci
118762306a36Sopenharmony_ci		set_m = (struct nfp_fl_set_mpls *)&nfp_fl->action_data[*a_len];
118862306a36Sopenharmony_ci		nfp_fl->meta.shortcut = cpu_to_be32(NFP_FL_SC_ACT_NULL);
118962306a36Sopenharmony_ci
119062306a36Sopenharmony_ci		nfp_fl_set_mpls(set_m, act);
119162306a36Sopenharmony_ci		*a_len += sizeof(struct nfp_fl_set_mpls);
119262306a36Sopenharmony_ci		break;
119362306a36Sopenharmony_ci	case FLOW_ACTION_PTYPE:
119462306a36Sopenharmony_ci		/* TC ptype skbedit sets PACKET_HOST for ingress redirect. */
119562306a36Sopenharmony_ci		if (act->ptype != PACKET_HOST)
119662306a36Sopenharmony_ci			return -EOPNOTSUPP;
119762306a36Sopenharmony_ci
119862306a36Sopenharmony_ci		*pkt_host = true;
119962306a36Sopenharmony_ci		break;
120062306a36Sopenharmony_ci	case FLOW_ACTION_POLICE:
120162306a36Sopenharmony_ci		if (!(fl_priv->flower_ext_feats & NFP_FL_FEATS_QOS_METER)) {
120262306a36Sopenharmony_ci			NL_SET_ERR_MSG_MOD(extack,
120362306a36Sopenharmony_ci					   "unsupported offload: unsupported police action in action list");
120462306a36Sopenharmony_ci			return -EOPNOTSUPP;
120562306a36Sopenharmony_ci		}
120662306a36Sopenharmony_ci
120762306a36Sopenharmony_ci		err = nfp_flower_meter_action(app, act, nfp_fl, a_len, netdev,
120862306a36Sopenharmony_ci					      extack);
120962306a36Sopenharmony_ci		if (err)
121062306a36Sopenharmony_ci			return err;
121162306a36Sopenharmony_ci		break;
121262306a36Sopenharmony_ci	default:
121362306a36Sopenharmony_ci		/* Currently we do not handle any other actions. */
121462306a36Sopenharmony_ci		NL_SET_ERR_MSG_MOD(extack, "unsupported offload: unsupported action in action list");
121562306a36Sopenharmony_ci		return -EOPNOTSUPP;
121662306a36Sopenharmony_ci	}
121762306a36Sopenharmony_ci
121862306a36Sopenharmony_ci	return 0;
121962306a36Sopenharmony_ci}
122062306a36Sopenharmony_ci
122162306a36Sopenharmony_cistatic bool nfp_fl_check_mangle_start(struct flow_action *flow_act,
122262306a36Sopenharmony_ci				      int current_act_idx)
122362306a36Sopenharmony_ci{
122462306a36Sopenharmony_ci	struct flow_action_entry current_act;
122562306a36Sopenharmony_ci	struct flow_action_entry prev_act;
122662306a36Sopenharmony_ci
122762306a36Sopenharmony_ci	current_act = flow_act->entries[current_act_idx];
122862306a36Sopenharmony_ci	if (current_act.id != FLOW_ACTION_MANGLE)
122962306a36Sopenharmony_ci		return false;
123062306a36Sopenharmony_ci
123162306a36Sopenharmony_ci	if (current_act_idx == 0)
123262306a36Sopenharmony_ci		return true;
123362306a36Sopenharmony_ci
123462306a36Sopenharmony_ci	prev_act = flow_act->entries[current_act_idx - 1];
123562306a36Sopenharmony_ci
123662306a36Sopenharmony_ci	return prev_act.id != FLOW_ACTION_MANGLE;
123762306a36Sopenharmony_ci}
123862306a36Sopenharmony_ci
123962306a36Sopenharmony_cistatic bool nfp_fl_check_mangle_end(struct flow_action *flow_act,
124062306a36Sopenharmony_ci				    int current_act_idx)
124162306a36Sopenharmony_ci{
124262306a36Sopenharmony_ci	struct flow_action_entry current_act;
124362306a36Sopenharmony_ci	struct flow_action_entry next_act;
124462306a36Sopenharmony_ci
124562306a36Sopenharmony_ci	current_act = flow_act->entries[current_act_idx];
124662306a36Sopenharmony_ci	if (current_act.id != FLOW_ACTION_MANGLE)
124762306a36Sopenharmony_ci		return false;
124862306a36Sopenharmony_ci
124962306a36Sopenharmony_ci	if (current_act_idx == flow_act->num_entries)
125062306a36Sopenharmony_ci		return true;
125162306a36Sopenharmony_ci
125262306a36Sopenharmony_ci	next_act = flow_act->entries[current_act_idx + 1];
125362306a36Sopenharmony_ci
125462306a36Sopenharmony_ci	return next_act.id != FLOW_ACTION_MANGLE;
125562306a36Sopenharmony_ci}
125662306a36Sopenharmony_ci
125762306a36Sopenharmony_ciint nfp_flower_compile_action(struct nfp_app *app,
125862306a36Sopenharmony_ci			      struct flow_rule *rule,
125962306a36Sopenharmony_ci			      struct net_device *netdev,
126062306a36Sopenharmony_ci			      struct nfp_fl_payload *nfp_flow,
126162306a36Sopenharmony_ci			      struct netlink_ext_ack *extack)
126262306a36Sopenharmony_ci{
126362306a36Sopenharmony_ci	int act_len, act_cnt, err, tun_out_cnt, out_cnt, i;
126462306a36Sopenharmony_ci	struct nfp_flower_pedit_acts set_act;
126562306a36Sopenharmony_ci	enum nfp_flower_tun_type tun_type;
126662306a36Sopenharmony_ci	struct flow_action_entry *act;
126762306a36Sopenharmony_ci	bool pkt_host = false;
126862306a36Sopenharmony_ci	u32 csum_updated = 0;
126962306a36Sopenharmony_ci
127062306a36Sopenharmony_ci	if (!flow_action_hw_stats_check(&rule->action, extack,
127162306a36Sopenharmony_ci					FLOW_ACTION_HW_STATS_DELAYED_BIT))
127262306a36Sopenharmony_ci		return -EOPNOTSUPP;
127362306a36Sopenharmony_ci
127462306a36Sopenharmony_ci	memset(nfp_flow->action_data, 0, NFP_FL_MAX_A_SIZ);
127562306a36Sopenharmony_ci	nfp_flow->meta.act_len = 0;
127662306a36Sopenharmony_ci	tun_type = NFP_FL_TUNNEL_NONE;
127762306a36Sopenharmony_ci	act_len = 0;
127862306a36Sopenharmony_ci	act_cnt = 0;
127962306a36Sopenharmony_ci	tun_out_cnt = 0;
128062306a36Sopenharmony_ci	out_cnt = 0;
128162306a36Sopenharmony_ci
128262306a36Sopenharmony_ci	flow_action_for_each(i, act, &rule->action) {
128362306a36Sopenharmony_ci		if (nfp_fl_check_mangle_start(&rule->action, i))
128462306a36Sopenharmony_ci			memset(&set_act, 0, sizeof(set_act));
128562306a36Sopenharmony_ci		err = nfp_flower_loop_action(app, act, rule, nfp_flow, &act_len,
128662306a36Sopenharmony_ci					     netdev, &tun_type, &tun_out_cnt,
128762306a36Sopenharmony_ci					     &out_cnt, &csum_updated,
128862306a36Sopenharmony_ci					     &set_act, &pkt_host, extack, i);
128962306a36Sopenharmony_ci		if (err)
129062306a36Sopenharmony_ci			return err;
129162306a36Sopenharmony_ci		act_cnt++;
129262306a36Sopenharmony_ci		if (nfp_fl_check_mangle_end(&rule->action, i))
129362306a36Sopenharmony_ci			nfp_fl_commit_mangle(rule,
129462306a36Sopenharmony_ci					     &nfp_flow->action_data[act_len],
129562306a36Sopenharmony_ci					     &act_len, &set_act, &csum_updated);
129662306a36Sopenharmony_ci	}
129762306a36Sopenharmony_ci
129862306a36Sopenharmony_ci	/* We optimise when the action list is small, this can unfortunately
129962306a36Sopenharmony_ci	 * not happen once we have more than one action in the action list.
130062306a36Sopenharmony_ci	 */
130162306a36Sopenharmony_ci	if (act_cnt > 1)
130262306a36Sopenharmony_ci		nfp_flow->meta.shortcut = cpu_to_be32(NFP_FL_SC_ACT_NULL);
130362306a36Sopenharmony_ci
130462306a36Sopenharmony_ci	nfp_flow->meta.act_len = act_len;
130562306a36Sopenharmony_ci
130662306a36Sopenharmony_ci	return 0;
130762306a36Sopenharmony_ci}
1308