162306a36Sopenharmony_ci// SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 262306a36Sopenharmony_ci/* Copyright (C) 2017-2018 Netronome Systems, Inc. */ 362306a36Sopenharmony_ci 462306a36Sopenharmony_ci#include <linux/bitfield.h> 562306a36Sopenharmony_ci#include <linux/mpls.h> 662306a36Sopenharmony_ci#include <net/pkt_cls.h> 762306a36Sopenharmony_ci#include <net/tc_act/tc_csum.h> 862306a36Sopenharmony_ci#include <net/tc_act/tc_gact.h> 962306a36Sopenharmony_ci#include <net/tc_act/tc_mirred.h> 1062306a36Sopenharmony_ci#include <net/tc_act/tc_mpls.h> 1162306a36Sopenharmony_ci#include <net/tc_act/tc_pedit.h> 1262306a36Sopenharmony_ci#include <net/tc_act/tc_vlan.h> 1362306a36Sopenharmony_ci#include <net/tc_act/tc_tunnel_key.h> 1462306a36Sopenharmony_ci 1562306a36Sopenharmony_ci#include "cmsg.h" 1662306a36Sopenharmony_ci#include "main.h" 1762306a36Sopenharmony_ci#include "../nfp_net_repr.h" 1862306a36Sopenharmony_ci 1962306a36Sopenharmony_ci/* The kernel versions of TUNNEL_* are not ABI and therefore vulnerable 2062306a36Sopenharmony_ci * to change. Such changes will break our FW ABI. 2162306a36Sopenharmony_ci */ 2262306a36Sopenharmony_ci#define NFP_FL_TUNNEL_CSUM cpu_to_be16(0x01) 2362306a36Sopenharmony_ci#define NFP_FL_TUNNEL_KEY cpu_to_be16(0x04) 2462306a36Sopenharmony_ci#define NFP_FL_TUNNEL_GENEVE_OPT cpu_to_be16(0x0800) 2562306a36Sopenharmony_ci#define NFP_FL_SUPPORTED_TUNNEL_INFO_FLAGS (IP_TUNNEL_INFO_TX | \ 2662306a36Sopenharmony_ci IP_TUNNEL_INFO_IPV6) 2762306a36Sopenharmony_ci#define NFP_FL_SUPPORTED_UDP_TUN_FLAGS (NFP_FL_TUNNEL_CSUM | \ 2862306a36Sopenharmony_ci NFP_FL_TUNNEL_KEY | \ 2962306a36Sopenharmony_ci NFP_FL_TUNNEL_GENEVE_OPT) 3062306a36Sopenharmony_ci 3162306a36Sopenharmony_cistatic int 3262306a36Sopenharmony_cinfp_fl_push_mpls(struct nfp_fl_push_mpls *push_mpls, 3362306a36Sopenharmony_ci const struct flow_action_entry *act, 3462306a36Sopenharmony_ci struct netlink_ext_ack *extack) 3562306a36Sopenharmony_ci{ 3662306a36Sopenharmony_ci size_t act_size = sizeof(struct nfp_fl_push_mpls); 3762306a36Sopenharmony_ci u32 mpls_lse = 0; 3862306a36Sopenharmony_ci 3962306a36Sopenharmony_ci push_mpls->head.jump_id = NFP_FL_ACTION_OPCODE_PUSH_MPLS; 4062306a36Sopenharmony_ci push_mpls->head.len_lw = act_size >> NFP_FL_LW_SIZ; 4162306a36Sopenharmony_ci 4262306a36Sopenharmony_ci /* BOS is optional in the TC action but required for offload. */ 4362306a36Sopenharmony_ci if (act->mpls_push.bos != ACT_MPLS_BOS_NOT_SET) { 4462306a36Sopenharmony_ci mpls_lse |= act->mpls_push.bos << MPLS_LS_S_SHIFT; 4562306a36Sopenharmony_ci } else { 4662306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: BOS field must explicitly be set for MPLS push"); 4762306a36Sopenharmony_ci return -EOPNOTSUPP; 4862306a36Sopenharmony_ci } 4962306a36Sopenharmony_ci 5062306a36Sopenharmony_ci /* Leave MPLS TC as a default value of 0 if not explicitly set. */ 5162306a36Sopenharmony_ci if (act->mpls_push.tc != ACT_MPLS_TC_NOT_SET) 5262306a36Sopenharmony_ci mpls_lse |= act->mpls_push.tc << MPLS_LS_TC_SHIFT; 5362306a36Sopenharmony_ci 5462306a36Sopenharmony_ci /* Proto, label and TTL are enforced and verified for MPLS push. */ 5562306a36Sopenharmony_ci mpls_lse |= act->mpls_push.label << MPLS_LS_LABEL_SHIFT; 5662306a36Sopenharmony_ci mpls_lse |= act->mpls_push.ttl << MPLS_LS_TTL_SHIFT; 5762306a36Sopenharmony_ci push_mpls->ethtype = act->mpls_push.proto; 5862306a36Sopenharmony_ci push_mpls->lse = cpu_to_be32(mpls_lse); 5962306a36Sopenharmony_ci 6062306a36Sopenharmony_ci return 0; 6162306a36Sopenharmony_ci} 6262306a36Sopenharmony_ci 6362306a36Sopenharmony_cistatic void 6462306a36Sopenharmony_cinfp_fl_pop_mpls(struct nfp_fl_pop_mpls *pop_mpls, 6562306a36Sopenharmony_ci const struct flow_action_entry *act) 6662306a36Sopenharmony_ci{ 6762306a36Sopenharmony_ci size_t act_size = sizeof(struct nfp_fl_pop_mpls); 6862306a36Sopenharmony_ci 6962306a36Sopenharmony_ci pop_mpls->head.jump_id = NFP_FL_ACTION_OPCODE_POP_MPLS; 7062306a36Sopenharmony_ci pop_mpls->head.len_lw = act_size >> NFP_FL_LW_SIZ; 7162306a36Sopenharmony_ci pop_mpls->ethtype = act->mpls_pop.proto; 7262306a36Sopenharmony_ci} 7362306a36Sopenharmony_ci 7462306a36Sopenharmony_cistatic void 7562306a36Sopenharmony_cinfp_fl_set_mpls(struct nfp_fl_set_mpls *set_mpls, 7662306a36Sopenharmony_ci const struct flow_action_entry *act) 7762306a36Sopenharmony_ci{ 7862306a36Sopenharmony_ci size_t act_size = sizeof(struct nfp_fl_set_mpls); 7962306a36Sopenharmony_ci u32 mpls_lse = 0, mpls_mask = 0; 8062306a36Sopenharmony_ci 8162306a36Sopenharmony_ci set_mpls->head.jump_id = NFP_FL_ACTION_OPCODE_SET_MPLS; 8262306a36Sopenharmony_ci set_mpls->head.len_lw = act_size >> NFP_FL_LW_SIZ; 8362306a36Sopenharmony_ci 8462306a36Sopenharmony_ci if (act->mpls_mangle.label != ACT_MPLS_LABEL_NOT_SET) { 8562306a36Sopenharmony_ci mpls_lse |= act->mpls_mangle.label << MPLS_LS_LABEL_SHIFT; 8662306a36Sopenharmony_ci mpls_mask |= MPLS_LS_LABEL_MASK; 8762306a36Sopenharmony_ci } 8862306a36Sopenharmony_ci if (act->mpls_mangle.tc != ACT_MPLS_TC_NOT_SET) { 8962306a36Sopenharmony_ci mpls_lse |= act->mpls_mangle.tc << MPLS_LS_TC_SHIFT; 9062306a36Sopenharmony_ci mpls_mask |= MPLS_LS_TC_MASK; 9162306a36Sopenharmony_ci } 9262306a36Sopenharmony_ci if (act->mpls_mangle.bos != ACT_MPLS_BOS_NOT_SET) { 9362306a36Sopenharmony_ci mpls_lse |= act->mpls_mangle.bos << MPLS_LS_S_SHIFT; 9462306a36Sopenharmony_ci mpls_mask |= MPLS_LS_S_MASK; 9562306a36Sopenharmony_ci } 9662306a36Sopenharmony_ci if (act->mpls_mangle.ttl) { 9762306a36Sopenharmony_ci mpls_lse |= act->mpls_mangle.ttl << MPLS_LS_TTL_SHIFT; 9862306a36Sopenharmony_ci mpls_mask |= MPLS_LS_TTL_MASK; 9962306a36Sopenharmony_ci } 10062306a36Sopenharmony_ci 10162306a36Sopenharmony_ci set_mpls->lse = cpu_to_be32(mpls_lse); 10262306a36Sopenharmony_ci set_mpls->lse_mask = cpu_to_be32(mpls_mask); 10362306a36Sopenharmony_ci} 10462306a36Sopenharmony_ci 10562306a36Sopenharmony_cistatic void nfp_fl_pop_vlan(struct nfp_fl_pop_vlan *pop_vlan) 10662306a36Sopenharmony_ci{ 10762306a36Sopenharmony_ci size_t act_size = sizeof(struct nfp_fl_pop_vlan); 10862306a36Sopenharmony_ci 10962306a36Sopenharmony_ci pop_vlan->head.jump_id = NFP_FL_ACTION_OPCODE_POP_VLAN; 11062306a36Sopenharmony_ci pop_vlan->head.len_lw = act_size >> NFP_FL_LW_SIZ; 11162306a36Sopenharmony_ci pop_vlan->reserved = 0; 11262306a36Sopenharmony_ci} 11362306a36Sopenharmony_ci 11462306a36Sopenharmony_cistatic void 11562306a36Sopenharmony_cinfp_fl_push_vlan(struct nfp_fl_push_vlan *push_vlan, 11662306a36Sopenharmony_ci const struct flow_action_entry *act) 11762306a36Sopenharmony_ci{ 11862306a36Sopenharmony_ci size_t act_size = sizeof(struct nfp_fl_push_vlan); 11962306a36Sopenharmony_ci u16 tmp_push_vlan_tci; 12062306a36Sopenharmony_ci 12162306a36Sopenharmony_ci push_vlan->head.jump_id = NFP_FL_ACTION_OPCODE_PUSH_VLAN; 12262306a36Sopenharmony_ci push_vlan->head.len_lw = act_size >> NFP_FL_LW_SIZ; 12362306a36Sopenharmony_ci push_vlan->reserved = 0; 12462306a36Sopenharmony_ci push_vlan->vlan_tpid = act->vlan.proto; 12562306a36Sopenharmony_ci 12662306a36Sopenharmony_ci tmp_push_vlan_tci = 12762306a36Sopenharmony_ci FIELD_PREP(NFP_FL_PUSH_VLAN_PRIO, act->vlan.prio) | 12862306a36Sopenharmony_ci FIELD_PREP(NFP_FL_PUSH_VLAN_VID, act->vlan.vid); 12962306a36Sopenharmony_ci push_vlan->vlan_tci = cpu_to_be16(tmp_push_vlan_tci); 13062306a36Sopenharmony_ci} 13162306a36Sopenharmony_ci 13262306a36Sopenharmony_cistatic int 13362306a36Sopenharmony_cinfp_fl_pre_lag(struct nfp_app *app, const struct flow_action_entry *act, 13462306a36Sopenharmony_ci struct nfp_fl_payload *nfp_flow, int act_len, 13562306a36Sopenharmony_ci struct netlink_ext_ack *extack) 13662306a36Sopenharmony_ci{ 13762306a36Sopenharmony_ci size_t act_size = sizeof(struct nfp_fl_pre_lag); 13862306a36Sopenharmony_ci struct nfp_fl_pre_lag *pre_lag; 13962306a36Sopenharmony_ci struct net_device *out_dev; 14062306a36Sopenharmony_ci int err; 14162306a36Sopenharmony_ci 14262306a36Sopenharmony_ci out_dev = act->dev; 14362306a36Sopenharmony_ci if (!out_dev || !netif_is_lag_master(out_dev)) 14462306a36Sopenharmony_ci return 0; 14562306a36Sopenharmony_ci 14662306a36Sopenharmony_ci if (act_len + act_size > NFP_FL_MAX_A_SIZ) { 14762306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: maximum allowed action list size exceeded at LAG action"); 14862306a36Sopenharmony_ci return -EOPNOTSUPP; 14962306a36Sopenharmony_ci } 15062306a36Sopenharmony_ci 15162306a36Sopenharmony_ci /* Pre_lag action must be first on action list. 15262306a36Sopenharmony_ci * If other actions already exist they need to be pushed forward. 15362306a36Sopenharmony_ci */ 15462306a36Sopenharmony_ci if (act_len) 15562306a36Sopenharmony_ci memmove(nfp_flow->action_data + act_size, 15662306a36Sopenharmony_ci nfp_flow->action_data, act_len); 15762306a36Sopenharmony_ci 15862306a36Sopenharmony_ci pre_lag = (struct nfp_fl_pre_lag *)nfp_flow->action_data; 15962306a36Sopenharmony_ci err = nfp_flower_lag_populate_pre_action(app, out_dev, pre_lag, extack); 16062306a36Sopenharmony_ci if (err) 16162306a36Sopenharmony_ci return err; 16262306a36Sopenharmony_ci 16362306a36Sopenharmony_ci pre_lag->head.jump_id = NFP_FL_ACTION_OPCODE_PRE_LAG; 16462306a36Sopenharmony_ci pre_lag->head.len_lw = act_size >> NFP_FL_LW_SIZ; 16562306a36Sopenharmony_ci 16662306a36Sopenharmony_ci nfp_flow->meta.shortcut = cpu_to_be32(NFP_FL_SC_ACT_NULL); 16762306a36Sopenharmony_ci 16862306a36Sopenharmony_ci return act_size; 16962306a36Sopenharmony_ci} 17062306a36Sopenharmony_ci 17162306a36Sopenharmony_cistatic int 17262306a36Sopenharmony_cinfp_fl_output(struct nfp_app *app, struct nfp_fl_output *output, 17362306a36Sopenharmony_ci const struct flow_action_entry *act, 17462306a36Sopenharmony_ci struct nfp_fl_payload *nfp_flow, 17562306a36Sopenharmony_ci bool last, struct net_device *in_dev, 17662306a36Sopenharmony_ci enum nfp_flower_tun_type tun_type, int *tun_out_cnt, 17762306a36Sopenharmony_ci bool pkt_host, struct netlink_ext_ack *extack) 17862306a36Sopenharmony_ci{ 17962306a36Sopenharmony_ci size_t act_size = sizeof(struct nfp_fl_output); 18062306a36Sopenharmony_ci struct nfp_flower_priv *priv = app->priv; 18162306a36Sopenharmony_ci struct net_device *out_dev; 18262306a36Sopenharmony_ci u16 tmp_flags; 18362306a36Sopenharmony_ci 18462306a36Sopenharmony_ci output->head.jump_id = NFP_FL_ACTION_OPCODE_OUTPUT; 18562306a36Sopenharmony_ci output->head.len_lw = act_size >> NFP_FL_LW_SIZ; 18662306a36Sopenharmony_ci 18762306a36Sopenharmony_ci out_dev = act->dev; 18862306a36Sopenharmony_ci if (!out_dev) { 18962306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: invalid egress interface for mirred action"); 19062306a36Sopenharmony_ci return -EOPNOTSUPP; 19162306a36Sopenharmony_ci } 19262306a36Sopenharmony_ci 19362306a36Sopenharmony_ci tmp_flags = last ? NFP_FL_OUT_FLAGS_LAST : 0; 19462306a36Sopenharmony_ci 19562306a36Sopenharmony_ci if (tun_type) { 19662306a36Sopenharmony_ci /* Verify the egress netdev matches the tunnel type. */ 19762306a36Sopenharmony_ci if (!nfp_fl_netdev_is_tunnel_type(out_dev, tun_type)) { 19862306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: egress interface does not match the required tunnel type"); 19962306a36Sopenharmony_ci return -EOPNOTSUPP; 20062306a36Sopenharmony_ci } 20162306a36Sopenharmony_ci 20262306a36Sopenharmony_ci if (*tun_out_cnt) { 20362306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: cannot offload more than one tunnel mirred output per filter"); 20462306a36Sopenharmony_ci return -EOPNOTSUPP; 20562306a36Sopenharmony_ci } 20662306a36Sopenharmony_ci (*tun_out_cnt)++; 20762306a36Sopenharmony_ci 20862306a36Sopenharmony_ci output->flags = cpu_to_be16(tmp_flags | 20962306a36Sopenharmony_ci NFP_FL_OUT_FLAGS_USE_TUN); 21062306a36Sopenharmony_ci output->port = cpu_to_be32(NFP_FL_PORT_TYPE_TUN | tun_type); 21162306a36Sopenharmony_ci } else if (netif_is_lag_master(out_dev) && 21262306a36Sopenharmony_ci priv->flower_en_feats & NFP_FL_ENABLE_LAG) { 21362306a36Sopenharmony_ci int gid; 21462306a36Sopenharmony_ci 21562306a36Sopenharmony_ci output->flags = cpu_to_be16(tmp_flags); 21662306a36Sopenharmony_ci gid = nfp_flower_lag_get_output_id(app, out_dev); 21762306a36Sopenharmony_ci if (gid < 0) { 21862306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "invalid entry: cannot find group id for LAG action"); 21962306a36Sopenharmony_ci return gid; 22062306a36Sopenharmony_ci } 22162306a36Sopenharmony_ci output->port = cpu_to_be32(NFP_FL_LAG_OUT | gid); 22262306a36Sopenharmony_ci } else if (nfp_flower_internal_port_can_offload(app, out_dev)) { 22362306a36Sopenharmony_ci if (!(priv->flower_ext_feats & NFP_FL_FEATS_PRE_TUN_RULES) && 22462306a36Sopenharmony_ci !(priv->flower_ext_feats & NFP_FL_FEATS_DECAP_V2)) { 22562306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: pre-tunnel rules not supported in loaded firmware"); 22662306a36Sopenharmony_ci return -EOPNOTSUPP; 22762306a36Sopenharmony_ci } 22862306a36Sopenharmony_ci 22962306a36Sopenharmony_ci if (nfp_flow->pre_tun_rule.dev || !pkt_host) { 23062306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: pre-tunnel rules require single egress dev and ptype HOST action"); 23162306a36Sopenharmony_ci return -EOPNOTSUPP; 23262306a36Sopenharmony_ci } 23362306a36Sopenharmony_ci 23462306a36Sopenharmony_ci nfp_flow->pre_tun_rule.dev = out_dev; 23562306a36Sopenharmony_ci 23662306a36Sopenharmony_ci return 0; 23762306a36Sopenharmony_ci } else { 23862306a36Sopenharmony_ci /* Set action output parameters. */ 23962306a36Sopenharmony_ci output->flags = cpu_to_be16(tmp_flags); 24062306a36Sopenharmony_ci 24162306a36Sopenharmony_ci if (nfp_netdev_is_nfp_repr(in_dev)) { 24262306a36Sopenharmony_ci /* Confirm ingress and egress are on same device. */ 24362306a36Sopenharmony_ci if (!netdev_port_same_parent_id(in_dev, out_dev)) { 24462306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: ingress and egress interfaces are on different devices"); 24562306a36Sopenharmony_ci return -EOPNOTSUPP; 24662306a36Sopenharmony_ci } 24762306a36Sopenharmony_ci } 24862306a36Sopenharmony_ci 24962306a36Sopenharmony_ci if (!nfp_netdev_is_nfp_repr(out_dev)) { 25062306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: egress interface is not an nfp port"); 25162306a36Sopenharmony_ci return -EOPNOTSUPP; 25262306a36Sopenharmony_ci } 25362306a36Sopenharmony_ci 25462306a36Sopenharmony_ci output->port = cpu_to_be32(nfp_repr_get_port_id(out_dev)); 25562306a36Sopenharmony_ci if (!output->port) { 25662306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: invalid port id for egress interface"); 25762306a36Sopenharmony_ci return -EOPNOTSUPP; 25862306a36Sopenharmony_ci } 25962306a36Sopenharmony_ci } 26062306a36Sopenharmony_ci nfp_flow->meta.shortcut = output->port; 26162306a36Sopenharmony_ci 26262306a36Sopenharmony_ci return 0; 26362306a36Sopenharmony_ci} 26462306a36Sopenharmony_ci 26562306a36Sopenharmony_cistatic bool 26662306a36Sopenharmony_cinfp_flower_tun_is_gre(struct flow_rule *rule, int start_idx) 26762306a36Sopenharmony_ci{ 26862306a36Sopenharmony_ci struct flow_action_entry *act = rule->action.entries; 26962306a36Sopenharmony_ci int num_act = rule->action.num_entries; 27062306a36Sopenharmony_ci int act_idx; 27162306a36Sopenharmony_ci 27262306a36Sopenharmony_ci /* Preparse action list for next mirred or redirect action */ 27362306a36Sopenharmony_ci for (act_idx = start_idx + 1; act_idx < num_act; act_idx++) 27462306a36Sopenharmony_ci if (act[act_idx].id == FLOW_ACTION_REDIRECT || 27562306a36Sopenharmony_ci act[act_idx].id == FLOW_ACTION_MIRRED) 27662306a36Sopenharmony_ci return netif_is_gretap(act[act_idx].dev) || 27762306a36Sopenharmony_ci netif_is_ip6gretap(act[act_idx].dev); 27862306a36Sopenharmony_ci 27962306a36Sopenharmony_ci return false; 28062306a36Sopenharmony_ci} 28162306a36Sopenharmony_ci 28262306a36Sopenharmony_cistatic enum nfp_flower_tun_type 28362306a36Sopenharmony_cinfp_fl_get_tun_from_act(struct nfp_app *app, 28462306a36Sopenharmony_ci struct flow_rule *rule, 28562306a36Sopenharmony_ci const struct flow_action_entry *act, int act_idx) 28662306a36Sopenharmony_ci{ 28762306a36Sopenharmony_ci const struct ip_tunnel_info *tun = act->tunnel; 28862306a36Sopenharmony_ci struct nfp_flower_priv *priv = app->priv; 28962306a36Sopenharmony_ci 29062306a36Sopenharmony_ci /* Determine the tunnel type based on the egress netdev 29162306a36Sopenharmony_ci * in the mirred action for tunnels without l4. 29262306a36Sopenharmony_ci */ 29362306a36Sopenharmony_ci if (nfp_flower_tun_is_gre(rule, act_idx)) 29462306a36Sopenharmony_ci return NFP_FL_TUNNEL_GRE; 29562306a36Sopenharmony_ci 29662306a36Sopenharmony_ci switch (tun->key.tp_dst) { 29762306a36Sopenharmony_ci case htons(IANA_VXLAN_UDP_PORT): 29862306a36Sopenharmony_ci return NFP_FL_TUNNEL_VXLAN; 29962306a36Sopenharmony_ci case htons(GENEVE_UDP_PORT): 30062306a36Sopenharmony_ci if (priv->flower_ext_feats & NFP_FL_FEATS_GENEVE) 30162306a36Sopenharmony_ci return NFP_FL_TUNNEL_GENEVE; 30262306a36Sopenharmony_ci fallthrough; 30362306a36Sopenharmony_ci default: 30462306a36Sopenharmony_ci return NFP_FL_TUNNEL_NONE; 30562306a36Sopenharmony_ci } 30662306a36Sopenharmony_ci} 30762306a36Sopenharmony_ci 30862306a36Sopenharmony_cistatic struct nfp_fl_pre_tunnel *nfp_fl_pre_tunnel(char *act_data, int act_len) 30962306a36Sopenharmony_ci{ 31062306a36Sopenharmony_ci size_t act_size = sizeof(struct nfp_fl_pre_tunnel); 31162306a36Sopenharmony_ci struct nfp_fl_pre_tunnel *pre_tun_act; 31262306a36Sopenharmony_ci 31362306a36Sopenharmony_ci /* Pre_tunnel action must be first on action list. 31462306a36Sopenharmony_ci * If other actions already exist they need to be pushed forward. 31562306a36Sopenharmony_ci */ 31662306a36Sopenharmony_ci if (act_len) 31762306a36Sopenharmony_ci memmove(act_data + act_size, act_data, act_len); 31862306a36Sopenharmony_ci 31962306a36Sopenharmony_ci pre_tun_act = (struct nfp_fl_pre_tunnel *)act_data; 32062306a36Sopenharmony_ci 32162306a36Sopenharmony_ci memset(pre_tun_act, 0, act_size); 32262306a36Sopenharmony_ci 32362306a36Sopenharmony_ci pre_tun_act->head.jump_id = NFP_FL_ACTION_OPCODE_PRE_TUNNEL; 32462306a36Sopenharmony_ci pre_tun_act->head.len_lw = act_size >> NFP_FL_LW_SIZ; 32562306a36Sopenharmony_ci 32662306a36Sopenharmony_ci return pre_tun_act; 32762306a36Sopenharmony_ci} 32862306a36Sopenharmony_ci 32962306a36Sopenharmony_cistatic int 33062306a36Sopenharmony_cinfp_fl_push_geneve_options(struct nfp_fl_payload *nfp_fl, int *list_len, 33162306a36Sopenharmony_ci const struct flow_action_entry *act, 33262306a36Sopenharmony_ci struct netlink_ext_ack *extack) 33362306a36Sopenharmony_ci{ 33462306a36Sopenharmony_ci struct ip_tunnel_info *ip_tun = (struct ip_tunnel_info *)act->tunnel; 33562306a36Sopenharmony_ci int opt_len, opt_cnt, act_start, tot_push_len; 33662306a36Sopenharmony_ci u8 *src = ip_tunnel_info_opts(ip_tun); 33762306a36Sopenharmony_ci 33862306a36Sopenharmony_ci /* We need to populate the options in reverse order for HW. 33962306a36Sopenharmony_ci * Therefore we go through the options, calculating the 34062306a36Sopenharmony_ci * number of options and the total size, then we populate 34162306a36Sopenharmony_ci * them in reverse order in the action list. 34262306a36Sopenharmony_ci */ 34362306a36Sopenharmony_ci opt_cnt = 0; 34462306a36Sopenharmony_ci tot_push_len = 0; 34562306a36Sopenharmony_ci opt_len = ip_tun->options_len; 34662306a36Sopenharmony_ci while (opt_len > 0) { 34762306a36Sopenharmony_ci struct geneve_opt *opt = (struct geneve_opt *)src; 34862306a36Sopenharmony_ci 34962306a36Sopenharmony_ci opt_cnt++; 35062306a36Sopenharmony_ci if (opt_cnt > NFP_FL_MAX_GENEVE_OPT_CNT) { 35162306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: maximum allowed number of geneve options exceeded"); 35262306a36Sopenharmony_ci return -EOPNOTSUPP; 35362306a36Sopenharmony_ci } 35462306a36Sopenharmony_ci 35562306a36Sopenharmony_ci tot_push_len += sizeof(struct nfp_fl_push_geneve) + 35662306a36Sopenharmony_ci opt->length * 4; 35762306a36Sopenharmony_ci if (tot_push_len > NFP_FL_MAX_GENEVE_OPT_ACT) { 35862306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: maximum allowed action list size exceeded at push geneve options"); 35962306a36Sopenharmony_ci return -EOPNOTSUPP; 36062306a36Sopenharmony_ci } 36162306a36Sopenharmony_ci 36262306a36Sopenharmony_ci opt_len -= sizeof(struct geneve_opt) + opt->length * 4; 36362306a36Sopenharmony_ci src += sizeof(struct geneve_opt) + opt->length * 4; 36462306a36Sopenharmony_ci } 36562306a36Sopenharmony_ci 36662306a36Sopenharmony_ci if (*list_len + tot_push_len > NFP_FL_MAX_A_SIZ) { 36762306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: maximum allowed action list size exceeded at push geneve options"); 36862306a36Sopenharmony_ci return -EOPNOTSUPP; 36962306a36Sopenharmony_ci } 37062306a36Sopenharmony_ci 37162306a36Sopenharmony_ci act_start = *list_len; 37262306a36Sopenharmony_ci *list_len += tot_push_len; 37362306a36Sopenharmony_ci src = ip_tunnel_info_opts(ip_tun); 37462306a36Sopenharmony_ci while (opt_cnt) { 37562306a36Sopenharmony_ci struct geneve_opt *opt = (struct geneve_opt *)src; 37662306a36Sopenharmony_ci struct nfp_fl_push_geneve *push; 37762306a36Sopenharmony_ci size_t act_size, len; 37862306a36Sopenharmony_ci 37962306a36Sopenharmony_ci opt_cnt--; 38062306a36Sopenharmony_ci act_size = sizeof(struct nfp_fl_push_geneve) + opt->length * 4; 38162306a36Sopenharmony_ci tot_push_len -= act_size; 38262306a36Sopenharmony_ci len = act_start + tot_push_len; 38362306a36Sopenharmony_ci 38462306a36Sopenharmony_ci push = (struct nfp_fl_push_geneve *)&nfp_fl->action_data[len]; 38562306a36Sopenharmony_ci push->head.jump_id = NFP_FL_ACTION_OPCODE_PUSH_GENEVE; 38662306a36Sopenharmony_ci push->head.len_lw = act_size >> NFP_FL_LW_SIZ; 38762306a36Sopenharmony_ci push->reserved = 0; 38862306a36Sopenharmony_ci push->class = opt->opt_class; 38962306a36Sopenharmony_ci push->type = opt->type; 39062306a36Sopenharmony_ci push->length = opt->length; 39162306a36Sopenharmony_ci memcpy(&push->opt_data, opt->opt_data, opt->length * 4); 39262306a36Sopenharmony_ci 39362306a36Sopenharmony_ci src += sizeof(struct geneve_opt) + opt->length * 4; 39462306a36Sopenharmony_ci } 39562306a36Sopenharmony_ci 39662306a36Sopenharmony_ci return 0; 39762306a36Sopenharmony_ci} 39862306a36Sopenharmony_ci 39962306a36Sopenharmony_cistatic int 40062306a36Sopenharmony_cinfp_fl_set_tun(struct nfp_app *app, struct nfp_fl_set_tun *set_tun, 40162306a36Sopenharmony_ci const struct flow_action_entry *act, 40262306a36Sopenharmony_ci struct nfp_fl_pre_tunnel *pre_tun, 40362306a36Sopenharmony_ci enum nfp_flower_tun_type tun_type, 40462306a36Sopenharmony_ci struct net_device *netdev, struct netlink_ext_ack *extack) 40562306a36Sopenharmony_ci{ 40662306a36Sopenharmony_ci const struct ip_tunnel_info *ip_tun = act->tunnel; 40762306a36Sopenharmony_ci bool ipv6 = ip_tunnel_info_af(ip_tun) == AF_INET6; 40862306a36Sopenharmony_ci size_t act_size = sizeof(struct nfp_fl_set_tun); 40962306a36Sopenharmony_ci struct nfp_flower_priv *priv = app->priv; 41062306a36Sopenharmony_ci u32 tmp_set_ip_tun_type_index = 0; 41162306a36Sopenharmony_ci /* Currently support one pre-tunnel so index is always 0. */ 41262306a36Sopenharmony_ci int pretun_idx = 0; 41362306a36Sopenharmony_ci 41462306a36Sopenharmony_ci if (!IS_ENABLED(CONFIG_IPV6) && ipv6) 41562306a36Sopenharmony_ci return -EOPNOTSUPP; 41662306a36Sopenharmony_ci 41762306a36Sopenharmony_ci if (ipv6 && !(priv->flower_ext_feats & NFP_FL_FEATS_IPV6_TUN)) 41862306a36Sopenharmony_ci return -EOPNOTSUPP; 41962306a36Sopenharmony_ci 42062306a36Sopenharmony_ci BUILD_BUG_ON(NFP_FL_TUNNEL_CSUM != TUNNEL_CSUM || 42162306a36Sopenharmony_ci NFP_FL_TUNNEL_KEY != TUNNEL_KEY || 42262306a36Sopenharmony_ci NFP_FL_TUNNEL_GENEVE_OPT != TUNNEL_GENEVE_OPT); 42362306a36Sopenharmony_ci if (ip_tun->options_len && 42462306a36Sopenharmony_ci (tun_type != NFP_FL_TUNNEL_GENEVE || 42562306a36Sopenharmony_ci !(priv->flower_ext_feats & NFP_FL_FEATS_GENEVE_OPT))) { 42662306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: loaded firmware does not support geneve options offload"); 42762306a36Sopenharmony_ci return -EOPNOTSUPP; 42862306a36Sopenharmony_ci } 42962306a36Sopenharmony_ci 43062306a36Sopenharmony_ci if (ip_tun->key.tun_flags & ~NFP_FL_SUPPORTED_UDP_TUN_FLAGS) { 43162306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, 43262306a36Sopenharmony_ci "unsupported offload: loaded firmware does not support tunnel flag offload"); 43362306a36Sopenharmony_ci return -EOPNOTSUPP; 43462306a36Sopenharmony_ci } 43562306a36Sopenharmony_ci 43662306a36Sopenharmony_ci set_tun->head.jump_id = NFP_FL_ACTION_OPCODE_SET_TUNNEL; 43762306a36Sopenharmony_ci set_tun->head.len_lw = act_size >> NFP_FL_LW_SIZ; 43862306a36Sopenharmony_ci 43962306a36Sopenharmony_ci /* Set tunnel type and pre-tunnel index. */ 44062306a36Sopenharmony_ci tmp_set_ip_tun_type_index |= 44162306a36Sopenharmony_ci FIELD_PREP(NFP_FL_TUNNEL_TYPE, tun_type) | 44262306a36Sopenharmony_ci FIELD_PREP(NFP_FL_PRE_TUN_INDEX, pretun_idx); 44362306a36Sopenharmony_ci 44462306a36Sopenharmony_ci set_tun->tun_type_index = cpu_to_be32(tmp_set_ip_tun_type_index); 44562306a36Sopenharmony_ci if (ip_tun->key.tun_flags & NFP_FL_TUNNEL_KEY) 44662306a36Sopenharmony_ci set_tun->tun_id = ip_tun->key.tun_id; 44762306a36Sopenharmony_ci 44862306a36Sopenharmony_ci if (ip_tun->key.ttl) { 44962306a36Sopenharmony_ci set_tun->ttl = ip_tun->key.ttl; 45062306a36Sopenharmony_ci#ifdef CONFIG_IPV6 45162306a36Sopenharmony_ci } else if (ipv6) { 45262306a36Sopenharmony_ci struct net *net = dev_net(netdev); 45362306a36Sopenharmony_ci struct flowi6 flow = {}; 45462306a36Sopenharmony_ci struct dst_entry *dst; 45562306a36Sopenharmony_ci 45662306a36Sopenharmony_ci flow.daddr = ip_tun->key.u.ipv6.dst; 45762306a36Sopenharmony_ci flow.flowi4_proto = IPPROTO_UDP; 45862306a36Sopenharmony_ci dst = ipv6_stub->ipv6_dst_lookup_flow(net, NULL, &flow, NULL); 45962306a36Sopenharmony_ci if (!IS_ERR(dst)) { 46062306a36Sopenharmony_ci set_tun->ttl = ip6_dst_hoplimit(dst); 46162306a36Sopenharmony_ci dst_release(dst); 46262306a36Sopenharmony_ci } else { 46362306a36Sopenharmony_ci set_tun->ttl = net->ipv6.devconf_all->hop_limit; 46462306a36Sopenharmony_ci } 46562306a36Sopenharmony_ci#endif 46662306a36Sopenharmony_ci } else { 46762306a36Sopenharmony_ci struct net *net = dev_net(netdev); 46862306a36Sopenharmony_ci struct flowi4 flow = {}; 46962306a36Sopenharmony_ci struct rtable *rt; 47062306a36Sopenharmony_ci int err; 47162306a36Sopenharmony_ci 47262306a36Sopenharmony_ci /* Do a route lookup to determine ttl - if fails then use 47362306a36Sopenharmony_ci * default. Note that CONFIG_INET is a requirement of 47462306a36Sopenharmony_ci * CONFIG_NET_SWITCHDEV so must be defined here. 47562306a36Sopenharmony_ci */ 47662306a36Sopenharmony_ci flow.daddr = ip_tun->key.u.ipv4.dst; 47762306a36Sopenharmony_ci flow.flowi4_proto = IPPROTO_UDP; 47862306a36Sopenharmony_ci rt = ip_route_output_key(net, &flow); 47962306a36Sopenharmony_ci err = PTR_ERR_OR_ZERO(rt); 48062306a36Sopenharmony_ci if (!err) { 48162306a36Sopenharmony_ci set_tun->ttl = ip4_dst_hoplimit(&rt->dst); 48262306a36Sopenharmony_ci ip_rt_put(rt); 48362306a36Sopenharmony_ci } else { 48462306a36Sopenharmony_ci set_tun->ttl = READ_ONCE(net->ipv4.sysctl_ip_default_ttl); 48562306a36Sopenharmony_ci } 48662306a36Sopenharmony_ci } 48762306a36Sopenharmony_ci 48862306a36Sopenharmony_ci set_tun->tos = ip_tun->key.tos; 48962306a36Sopenharmony_ci set_tun->tun_flags = ip_tun->key.tun_flags; 49062306a36Sopenharmony_ci 49162306a36Sopenharmony_ci if (tun_type == NFP_FL_TUNNEL_GENEVE) { 49262306a36Sopenharmony_ci set_tun->tun_proto = htons(ETH_P_TEB); 49362306a36Sopenharmony_ci set_tun->tun_len = ip_tun->options_len / 4; 49462306a36Sopenharmony_ci } 49562306a36Sopenharmony_ci 49662306a36Sopenharmony_ci /* Complete pre_tunnel action. */ 49762306a36Sopenharmony_ci if (ipv6) { 49862306a36Sopenharmony_ci pre_tun->flags |= cpu_to_be16(NFP_FL_PRE_TUN_IPV6); 49962306a36Sopenharmony_ci pre_tun->ipv6_dst = ip_tun->key.u.ipv6.dst; 50062306a36Sopenharmony_ci } else { 50162306a36Sopenharmony_ci pre_tun->ipv4_dst = ip_tun->key.u.ipv4.dst; 50262306a36Sopenharmony_ci } 50362306a36Sopenharmony_ci 50462306a36Sopenharmony_ci return 0; 50562306a36Sopenharmony_ci} 50662306a36Sopenharmony_ci 50762306a36Sopenharmony_cistatic void nfp_fl_set_helper32(u32 value, u32 mask, u8 *p_exact, u8 *p_mask) 50862306a36Sopenharmony_ci{ 50962306a36Sopenharmony_ci u32 oldvalue = get_unaligned((u32 *)p_exact); 51062306a36Sopenharmony_ci u32 oldmask = get_unaligned((u32 *)p_mask); 51162306a36Sopenharmony_ci 51262306a36Sopenharmony_ci value &= mask; 51362306a36Sopenharmony_ci value |= oldvalue & ~mask; 51462306a36Sopenharmony_ci 51562306a36Sopenharmony_ci put_unaligned(oldmask | mask, (u32 *)p_mask); 51662306a36Sopenharmony_ci put_unaligned(value, (u32 *)p_exact); 51762306a36Sopenharmony_ci} 51862306a36Sopenharmony_ci 51962306a36Sopenharmony_cistatic int 52062306a36Sopenharmony_cinfp_fl_set_eth(const struct flow_action_entry *act, u32 off, 52162306a36Sopenharmony_ci struct nfp_fl_set_eth *set_eth, struct netlink_ext_ack *extack) 52262306a36Sopenharmony_ci{ 52362306a36Sopenharmony_ci u32 exact, mask; 52462306a36Sopenharmony_ci 52562306a36Sopenharmony_ci if (off + 4 > ETH_ALEN * 2) { 52662306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: invalid pedit ethernet action"); 52762306a36Sopenharmony_ci return -EOPNOTSUPP; 52862306a36Sopenharmony_ci } 52962306a36Sopenharmony_ci 53062306a36Sopenharmony_ci mask = ~act->mangle.mask; 53162306a36Sopenharmony_ci exact = act->mangle.val; 53262306a36Sopenharmony_ci 53362306a36Sopenharmony_ci if (exact & ~mask) { 53462306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: invalid pedit ethernet action"); 53562306a36Sopenharmony_ci return -EOPNOTSUPP; 53662306a36Sopenharmony_ci } 53762306a36Sopenharmony_ci 53862306a36Sopenharmony_ci nfp_fl_set_helper32(exact, mask, &set_eth->eth_addr_val[off], 53962306a36Sopenharmony_ci &set_eth->eth_addr_mask[off]); 54062306a36Sopenharmony_ci 54162306a36Sopenharmony_ci set_eth->reserved = cpu_to_be16(0); 54262306a36Sopenharmony_ci set_eth->head.jump_id = NFP_FL_ACTION_OPCODE_SET_ETHERNET; 54362306a36Sopenharmony_ci set_eth->head.len_lw = sizeof(*set_eth) >> NFP_FL_LW_SIZ; 54462306a36Sopenharmony_ci 54562306a36Sopenharmony_ci return 0; 54662306a36Sopenharmony_ci} 54762306a36Sopenharmony_ci 54862306a36Sopenharmony_cistruct ipv4_ttl_word { 54962306a36Sopenharmony_ci __u8 ttl; 55062306a36Sopenharmony_ci __u8 protocol; 55162306a36Sopenharmony_ci __sum16 check; 55262306a36Sopenharmony_ci}; 55362306a36Sopenharmony_ci 55462306a36Sopenharmony_cistatic int 55562306a36Sopenharmony_cinfp_fl_set_ip4(const struct flow_action_entry *act, u32 off, 55662306a36Sopenharmony_ci struct nfp_fl_set_ip4_addrs *set_ip_addr, 55762306a36Sopenharmony_ci struct nfp_fl_set_ip4_ttl_tos *set_ip_ttl_tos, 55862306a36Sopenharmony_ci struct netlink_ext_ack *extack) 55962306a36Sopenharmony_ci{ 56062306a36Sopenharmony_ci struct ipv4_ttl_word *ttl_word_mask; 56162306a36Sopenharmony_ci struct ipv4_ttl_word *ttl_word; 56262306a36Sopenharmony_ci struct iphdr *tos_word_mask; 56362306a36Sopenharmony_ci struct iphdr *tos_word; 56462306a36Sopenharmony_ci __be32 exact, mask; 56562306a36Sopenharmony_ci 56662306a36Sopenharmony_ci /* We are expecting tcf_pedit to return a big endian value */ 56762306a36Sopenharmony_ci mask = (__force __be32)~act->mangle.mask; 56862306a36Sopenharmony_ci exact = (__force __be32)act->mangle.val; 56962306a36Sopenharmony_ci 57062306a36Sopenharmony_ci if (exact & ~mask) { 57162306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: invalid pedit IPv4 action"); 57262306a36Sopenharmony_ci return -EOPNOTSUPP; 57362306a36Sopenharmony_ci } 57462306a36Sopenharmony_ci 57562306a36Sopenharmony_ci switch (off) { 57662306a36Sopenharmony_ci case offsetof(struct iphdr, daddr): 57762306a36Sopenharmony_ci set_ip_addr->ipv4_dst_mask |= mask; 57862306a36Sopenharmony_ci set_ip_addr->ipv4_dst &= ~mask; 57962306a36Sopenharmony_ci set_ip_addr->ipv4_dst |= exact & mask; 58062306a36Sopenharmony_ci set_ip_addr->head.jump_id = NFP_FL_ACTION_OPCODE_SET_IPV4_ADDRS; 58162306a36Sopenharmony_ci set_ip_addr->head.len_lw = sizeof(*set_ip_addr) >> 58262306a36Sopenharmony_ci NFP_FL_LW_SIZ; 58362306a36Sopenharmony_ci break; 58462306a36Sopenharmony_ci case offsetof(struct iphdr, saddr): 58562306a36Sopenharmony_ci set_ip_addr->ipv4_src_mask |= mask; 58662306a36Sopenharmony_ci set_ip_addr->ipv4_src &= ~mask; 58762306a36Sopenharmony_ci set_ip_addr->ipv4_src |= exact & mask; 58862306a36Sopenharmony_ci set_ip_addr->head.jump_id = NFP_FL_ACTION_OPCODE_SET_IPV4_ADDRS; 58962306a36Sopenharmony_ci set_ip_addr->head.len_lw = sizeof(*set_ip_addr) >> 59062306a36Sopenharmony_ci NFP_FL_LW_SIZ; 59162306a36Sopenharmony_ci break; 59262306a36Sopenharmony_ci case offsetof(struct iphdr, ttl): 59362306a36Sopenharmony_ci ttl_word_mask = (struct ipv4_ttl_word *)&mask; 59462306a36Sopenharmony_ci ttl_word = (struct ipv4_ttl_word *)&exact; 59562306a36Sopenharmony_ci 59662306a36Sopenharmony_ci if (ttl_word_mask->protocol || ttl_word_mask->check) { 59762306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: invalid pedit IPv4 ttl action"); 59862306a36Sopenharmony_ci return -EOPNOTSUPP; 59962306a36Sopenharmony_ci } 60062306a36Sopenharmony_ci 60162306a36Sopenharmony_ci set_ip_ttl_tos->ipv4_ttl_mask |= ttl_word_mask->ttl; 60262306a36Sopenharmony_ci set_ip_ttl_tos->ipv4_ttl &= ~ttl_word_mask->ttl; 60362306a36Sopenharmony_ci set_ip_ttl_tos->ipv4_ttl |= ttl_word->ttl & ttl_word_mask->ttl; 60462306a36Sopenharmony_ci set_ip_ttl_tos->head.jump_id = 60562306a36Sopenharmony_ci NFP_FL_ACTION_OPCODE_SET_IPV4_TTL_TOS; 60662306a36Sopenharmony_ci set_ip_ttl_tos->head.len_lw = sizeof(*set_ip_ttl_tos) >> 60762306a36Sopenharmony_ci NFP_FL_LW_SIZ; 60862306a36Sopenharmony_ci break; 60962306a36Sopenharmony_ci case round_down(offsetof(struct iphdr, tos), 4): 61062306a36Sopenharmony_ci tos_word_mask = (struct iphdr *)&mask; 61162306a36Sopenharmony_ci tos_word = (struct iphdr *)&exact; 61262306a36Sopenharmony_ci 61362306a36Sopenharmony_ci if (tos_word_mask->version || tos_word_mask->ihl || 61462306a36Sopenharmony_ci tos_word_mask->tot_len) { 61562306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: invalid pedit IPv4 tos action"); 61662306a36Sopenharmony_ci return -EOPNOTSUPP; 61762306a36Sopenharmony_ci } 61862306a36Sopenharmony_ci 61962306a36Sopenharmony_ci set_ip_ttl_tos->ipv4_tos_mask |= tos_word_mask->tos; 62062306a36Sopenharmony_ci set_ip_ttl_tos->ipv4_tos &= ~tos_word_mask->tos; 62162306a36Sopenharmony_ci set_ip_ttl_tos->ipv4_tos |= tos_word->tos & tos_word_mask->tos; 62262306a36Sopenharmony_ci set_ip_ttl_tos->head.jump_id = 62362306a36Sopenharmony_ci NFP_FL_ACTION_OPCODE_SET_IPV4_TTL_TOS; 62462306a36Sopenharmony_ci set_ip_ttl_tos->head.len_lw = sizeof(*set_ip_ttl_tos) >> 62562306a36Sopenharmony_ci NFP_FL_LW_SIZ; 62662306a36Sopenharmony_ci break; 62762306a36Sopenharmony_ci default: 62862306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: pedit on unsupported section of IPv4 header"); 62962306a36Sopenharmony_ci return -EOPNOTSUPP; 63062306a36Sopenharmony_ci } 63162306a36Sopenharmony_ci 63262306a36Sopenharmony_ci return 0; 63362306a36Sopenharmony_ci} 63462306a36Sopenharmony_ci 63562306a36Sopenharmony_cistatic void 63662306a36Sopenharmony_cinfp_fl_set_ip6_helper(int opcode_tag, u8 word, __be32 exact, __be32 mask, 63762306a36Sopenharmony_ci struct nfp_fl_set_ipv6_addr *ip6) 63862306a36Sopenharmony_ci{ 63962306a36Sopenharmony_ci ip6->ipv6[word].mask |= mask; 64062306a36Sopenharmony_ci ip6->ipv6[word].exact &= ~mask; 64162306a36Sopenharmony_ci ip6->ipv6[word].exact |= exact & mask; 64262306a36Sopenharmony_ci 64362306a36Sopenharmony_ci ip6->reserved = cpu_to_be16(0); 64462306a36Sopenharmony_ci ip6->head.jump_id = opcode_tag; 64562306a36Sopenharmony_ci ip6->head.len_lw = sizeof(*ip6) >> NFP_FL_LW_SIZ; 64662306a36Sopenharmony_ci} 64762306a36Sopenharmony_ci 64862306a36Sopenharmony_cistruct ipv6_hop_limit_word { 64962306a36Sopenharmony_ci __be16 payload_len; 65062306a36Sopenharmony_ci u8 nexthdr; 65162306a36Sopenharmony_ci u8 hop_limit; 65262306a36Sopenharmony_ci}; 65362306a36Sopenharmony_ci 65462306a36Sopenharmony_cistatic int 65562306a36Sopenharmony_cinfp_fl_set_ip6_hop_limit_flow_label(u32 off, __be32 exact, __be32 mask, 65662306a36Sopenharmony_ci struct nfp_fl_set_ipv6_tc_hl_fl *ip_hl_fl, 65762306a36Sopenharmony_ci struct netlink_ext_ack *extack) 65862306a36Sopenharmony_ci{ 65962306a36Sopenharmony_ci struct ipv6_hop_limit_word *fl_hl_mask; 66062306a36Sopenharmony_ci struct ipv6_hop_limit_word *fl_hl; 66162306a36Sopenharmony_ci 66262306a36Sopenharmony_ci switch (off) { 66362306a36Sopenharmony_ci case offsetof(struct ipv6hdr, payload_len): 66462306a36Sopenharmony_ci fl_hl_mask = (struct ipv6_hop_limit_word *)&mask; 66562306a36Sopenharmony_ci fl_hl = (struct ipv6_hop_limit_word *)&exact; 66662306a36Sopenharmony_ci 66762306a36Sopenharmony_ci if (fl_hl_mask->nexthdr || fl_hl_mask->payload_len) { 66862306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: invalid pedit IPv6 hop limit action"); 66962306a36Sopenharmony_ci return -EOPNOTSUPP; 67062306a36Sopenharmony_ci } 67162306a36Sopenharmony_ci 67262306a36Sopenharmony_ci ip_hl_fl->ipv6_hop_limit_mask |= fl_hl_mask->hop_limit; 67362306a36Sopenharmony_ci ip_hl_fl->ipv6_hop_limit &= ~fl_hl_mask->hop_limit; 67462306a36Sopenharmony_ci ip_hl_fl->ipv6_hop_limit |= fl_hl->hop_limit & 67562306a36Sopenharmony_ci fl_hl_mask->hop_limit; 67662306a36Sopenharmony_ci break; 67762306a36Sopenharmony_ci case round_down(offsetof(struct ipv6hdr, flow_lbl), 4): 67862306a36Sopenharmony_ci if (mask & ~IPV6_FLOWINFO_MASK || 67962306a36Sopenharmony_ci exact & ~IPV6_FLOWINFO_MASK) { 68062306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: invalid pedit IPv6 flow info action"); 68162306a36Sopenharmony_ci return -EOPNOTSUPP; 68262306a36Sopenharmony_ci } 68362306a36Sopenharmony_ci 68462306a36Sopenharmony_ci ip_hl_fl->ipv6_label_mask |= mask; 68562306a36Sopenharmony_ci ip_hl_fl->ipv6_label &= ~mask; 68662306a36Sopenharmony_ci ip_hl_fl->ipv6_label |= exact & mask; 68762306a36Sopenharmony_ci break; 68862306a36Sopenharmony_ci } 68962306a36Sopenharmony_ci 69062306a36Sopenharmony_ci ip_hl_fl->head.jump_id = NFP_FL_ACTION_OPCODE_SET_IPV6_TC_HL_FL; 69162306a36Sopenharmony_ci ip_hl_fl->head.len_lw = sizeof(*ip_hl_fl) >> NFP_FL_LW_SIZ; 69262306a36Sopenharmony_ci 69362306a36Sopenharmony_ci return 0; 69462306a36Sopenharmony_ci} 69562306a36Sopenharmony_ci 69662306a36Sopenharmony_cistatic int 69762306a36Sopenharmony_cinfp_fl_set_ip6(const struct flow_action_entry *act, u32 off, 69862306a36Sopenharmony_ci struct nfp_fl_set_ipv6_addr *ip_dst, 69962306a36Sopenharmony_ci struct nfp_fl_set_ipv6_addr *ip_src, 70062306a36Sopenharmony_ci struct nfp_fl_set_ipv6_tc_hl_fl *ip_hl_fl, 70162306a36Sopenharmony_ci struct netlink_ext_ack *extack) 70262306a36Sopenharmony_ci{ 70362306a36Sopenharmony_ci __be32 exact, mask; 70462306a36Sopenharmony_ci int err = 0; 70562306a36Sopenharmony_ci u8 word; 70662306a36Sopenharmony_ci 70762306a36Sopenharmony_ci /* We are expecting tcf_pedit to return a big endian value */ 70862306a36Sopenharmony_ci mask = (__force __be32)~act->mangle.mask; 70962306a36Sopenharmony_ci exact = (__force __be32)act->mangle.val; 71062306a36Sopenharmony_ci 71162306a36Sopenharmony_ci if (exact & ~mask) { 71262306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: invalid pedit IPv6 action"); 71362306a36Sopenharmony_ci return -EOPNOTSUPP; 71462306a36Sopenharmony_ci } 71562306a36Sopenharmony_ci 71662306a36Sopenharmony_ci if (off < offsetof(struct ipv6hdr, saddr)) { 71762306a36Sopenharmony_ci err = nfp_fl_set_ip6_hop_limit_flow_label(off, exact, mask, 71862306a36Sopenharmony_ci ip_hl_fl, extack); 71962306a36Sopenharmony_ci } else if (off < offsetof(struct ipv6hdr, daddr)) { 72062306a36Sopenharmony_ci word = (off - offsetof(struct ipv6hdr, saddr)) / sizeof(exact); 72162306a36Sopenharmony_ci nfp_fl_set_ip6_helper(NFP_FL_ACTION_OPCODE_SET_IPV6_SRC, word, 72262306a36Sopenharmony_ci exact, mask, ip_src); 72362306a36Sopenharmony_ci } else if (off < offsetof(struct ipv6hdr, daddr) + 72462306a36Sopenharmony_ci sizeof(struct in6_addr)) { 72562306a36Sopenharmony_ci word = (off - offsetof(struct ipv6hdr, daddr)) / sizeof(exact); 72662306a36Sopenharmony_ci nfp_fl_set_ip6_helper(NFP_FL_ACTION_OPCODE_SET_IPV6_DST, word, 72762306a36Sopenharmony_ci exact, mask, ip_dst); 72862306a36Sopenharmony_ci } else { 72962306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: pedit on unsupported section of IPv6 header"); 73062306a36Sopenharmony_ci return -EOPNOTSUPP; 73162306a36Sopenharmony_ci } 73262306a36Sopenharmony_ci 73362306a36Sopenharmony_ci return err; 73462306a36Sopenharmony_ci} 73562306a36Sopenharmony_ci 73662306a36Sopenharmony_cistatic int 73762306a36Sopenharmony_cinfp_fl_set_tport(const struct flow_action_entry *act, u32 off, 73862306a36Sopenharmony_ci struct nfp_fl_set_tport *set_tport, int opcode, 73962306a36Sopenharmony_ci struct netlink_ext_ack *extack) 74062306a36Sopenharmony_ci{ 74162306a36Sopenharmony_ci u32 exact, mask; 74262306a36Sopenharmony_ci 74362306a36Sopenharmony_ci if (off) { 74462306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: pedit on unsupported section of L4 header"); 74562306a36Sopenharmony_ci return -EOPNOTSUPP; 74662306a36Sopenharmony_ci } 74762306a36Sopenharmony_ci 74862306a36Sopenharmony_ci mask = ~act->mangle.mask; 74962306a36Sopenharmony_ci exact = act->mangle.val; 75062306a36Sopenharmony_ci 75162306a36Sopenharmony_ci if (exact & ~mask) { 75262306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: invalid pedit L4 action"); 75362306a36Sopenharmony_ci return -EOPNOTSUPP; 75462306a36Sopenharmony_ci } 75562306a36Sopenharmony_ci 75662306a36Sopenharmony_ci nfp_fl_set_helper32(exact, mask, set_tport->tp_port_val, 75762306a36Sopenharmony_ci set_tport->tp_port_mask); 75862306a36Sopenharmony_ci 75962306a36Sopenharmony_ci set_tport->reserved = cpu_to_be16(0); 76062306a36Sopenharmony_ci set_tport->head.jump_id = opcode; 76162306a36Sopenharmony_ci set_tport->head.len_lw = sizeof(*set_tport) >> NFP_FL_LW_SIZ; 76262306a36Sopenharmony_ci 76362306a36Sopenharmony_ci return 0; 76462306a36Sopenharmony_ci} 76562306a36Sopenharmony_ci 76662306a36Sopenharmony_cistatic u32 nfp_fl_csum_l4_to_flag(u8 ip_proto) 76762306a36Sopenharmony_ci{ 76862306a36Sopenharmony_ci switch (ip_proto) { 76962306a36Sopenharmony_ci case 0: 77062306a36Sopenharmony_ci /* Filter doesn't force proto match, 77162306a36Sopenharmony_ci * both TCP and UDP will be updated if encountered 77262306a36Sopenharmony_ci */ 77362306a36Sopenharmony_ci return TCA_CSUM_UPDATE_FLAG_TCP | TCA_CSUM_UPDATE_FLAG_UDP; 77462306a36Sopenharmony_ci case IPPROTO_TCP: 77562306a36Sopenharmony_ci return TCA_CSUM_UPDATE_FLAG_TCP; 77662306a36Sopenharmony_ci case IPPROTO_UDP: 77762306a36Sopenharmony_ci return TCA_CSUM_UPDATE_FLAG_UDP; 77862306a36Sopenharmony_ci default: 77962306a36Sopenharmony_ci /* All other protocols will be ignored by FW */ 78062306a36Sopenharmony_ci return 0; 78162306a36Sopenharmony_ci } 78262306a36Sopenharmony_ci} 78362306a36Sopenharmony_ci 78462306a36Sopenharmony_cistruct nfp_flower_pedit_acts { 78562306a36Sopenharmony_ci struct nfp_fl_set_ipv6_addr set_ip6_dst, set_ip6_src; 78662306a36Sopenharmony_ci struct nfp_fl_set_ipv6_tc_hl_fl set_ip6_tc_hl_fl; 78762306a36Sopenharmony_ci struct nfp_fl_set_ip4_ttl_tos set_ip_ttl_tos; 78862306a36Sopenharmony_ci struct nfp_fl_set_ip4_addrs set_ip_addr; 78962306a36Sopenharmony_ci struct nfp_fl_set_tport set_tport; 79062306a36Sopenharmony_ci struct nfp_fl_set_eth set_eth; 79162306a36Sopenharmony_ci}; 79262306a36Sopenharmony_ci 79362306a36Sopenharmony_cistatic int 79462306a36Sopenharmony_cinfp_fl_commit_mangle(struct flow_rule *rule, char *nfp_action, 79562306a36Sopenharmony_ci int *a_len, struct nfp_flower_pedit_acts *set_act, 79662306a36Sopenharmony_ci u32 *csum_updated) 79762306a36Sopenharmony_ci{ 79862306a36Sopenharmony_ci size_t act_size = 0; 79962306a36Sopenharmony_ci u8 ip_proto = 0; 80062306a36Sopenharmony_ci 80162306a36Sopenharmony_ci if (flow_rule_match_key(rule, FLOW_DISSECTOR_KEY_BASIC)) { 80262306a36Sopenharmony_ci struct flow_match_basic match; 80362306a36Sopenharmony_ci 80462306a36Sopenharmony_ci flow_rule_match_basic(rule, &match); 80562306a36Sopenharmony_ci ip_proto = match.key->ip_proto; 80662306a36Sopenharmony_ci } 80762306a36Sopenharmony_ci 80862306a36Sopenharmony_ci if (set_act->set_eth.head.len_lw) { 80962306a36Sopenharmony_ci act_size = sizeof(set_act->set_eth); 81062306a36Sopenharmony_ci memcpy(nfp_action, &set_act->set_eth, act_size); 81162306a36Sopenharmony_ci *a_len += act_size; 81262306a36Sopenharmony_ci } 81362306a36Sopenharmony_ci 81462306a36Sopenharmony_ci if (set_act->set_ip_ttl_tos.head.len_lw) { 81562306a36Sopenharmony_ci nfp_action += act_size; 81662306a36Sopenharmony_ci act_size = sizeof(set_act->set_ip_ttl_tos); 81762306a36Sopenharmony_ci memcpy(nfp_action, &set_act->set_ip_ttl_tos, act_size); 81862306a36Sopenharmony_ci *a_len += act_size; 81962306a36Sopenharmony_ci 82062306a36Sopenharmony_ci /* Hardware will automatically fix IPv4 and TCP/UDP checksum. */ 82162306a36Sopenharmony_ci *csum_updated |= TCA_CSUM_UPDATE_FLAG_IPV4HDR | 82262306a36Sopenharmony_ci nfp_fl_csum_l4_to_flag(ip_proto); 82362306a36Sopenharmony_ci } 82462306a36Sopenharmony_ci 82562306a36Sopenharmony_ci if (set_act->set_ip_addr.head.len_lw) { 82662306a36Sopenharmony_ci nfp_action += act_size; 82762306a36Sopenharmony_ci act_size = sizeof(set_act->set_ip_addr); 82862306a36Sopenharmony_ci memcpy(nfp_action, &set_act->set_ip_addr, act_size); 82962306a36Sopenharmony_ci *a_len += act_size; 83062306a36Sopenharmony_ci 83162306a36Sopenharmony_ci /* Hardware will automatically fix IPv4 and TCP/UDP checksum. */ 83262306a36Sopenharmony_ci *csum_updated |= TCA_CSUM_UPDATE_FLAG_IPV4HDR | 83362306a36Sopenharmony_ci nfp_fl_csum_l4_to_flag(ip_proto); 83462306a36Sopenharmony_ci } 83562306a36Sopenharmony_ci 83662306a36Sopenharmony_ci if (set_act->set_ip6_tc_hl_fl.head.len_lw) { 83762306a36Sopenharmony_ci nfp_action += act_size; 83862306a36Sopenharmony_ci act_size = sizeof(set_act->set_ip6_tc_hl_fl); 83962306a36Sopenharmony_ci memcpy(nfp_action, &set_act->set_ip6_tc_hl_fl, act_size); 84062306a36Sopenharmony_ci *a_len += act_size; 84162306a36Sopenharmony_ci 84262306a36Sopenharmony_ci /* Hardware will automatically fix TCP/UDP checksum. */ 84362306a36Sopenharmony_ci *csum_updated |= nfp_fl_csum_l4_to_flag(ip_proto); 84462306a36Sopenharmony_ci } 84562306a36Sopenharmony_ci 84662306a36Sopenharmony_ci if (set_act->set_ip6_dst.head.len_lw && 84762306a36Sopenharmony_ci set_act->set_ip6_src.head.len_lw) { 84862306a36Sopenharmony_ci /* TC compiles set src and dst IPv6 address as a single action, 84962306a36Sopenharmony_ci * the hardware requires this to be 2 separate actions. 85062306a36Sopenharmony_ci */ 85162306a36Sopenharmony_ci nfp_action += act_size; 85262306a36Sopenharmony_ci act_size = sizeof(set_act->set_ip6_src); 85362306a36Sopenharmony_ci memcpy(nfp_action, &set_act->set_ip6_src, act_size); 85462306a36Sopenharmony_ci *a_len += act_size; 85562306a36Sopenharmony_ci 85662306a36Sopenharmony_ci act_size = sizeof(set_act->set_ip6_dst); 85762306a36Sopenharmony_ci memcpy(&nfp_action[sizeof(set_act->set_ip6_src)], 85862306a36Sopenharmony_ci &set_act->set_ip6_dst, act_size); 85962306a36Sopenharmony_ci *a_len += act_size; 86062306a36Sopenharmony_ci 86162306a36Sopenharmony_ci /* Hardware will automatically fix TCP/UDP checksum. */ 86262306a36Sopenharmony_ci *csum_updated |= nfp_fl_csum_l4_to_flag(ip_proto); 86362306a36Sopenharmony_ci } else if (set_act->set_ip6_dst.head.len_lw) { 86462306a36Sopenharmony_ci nfp_action += act_size; 86562306a36Sopenharmony_ci act_size = sizeof(set_act->set_ip6_dst); 86662306a36Sopenharmony_ci memcpy(nfp_action, &set_act->set_ip6_dst, act_size); 86762306a36Sopenharmony_ci *a_len += act_size; 86862306a36Sopenharmony_ci 86962306a36Sopenharmony_ci /* Hardware will automatically fix TCP/UDP checksum. */ 87062306a36Sopenharmony_ci *csum_updated |= nfp_fl_csum_l4_to_flag(ip_proto); 87162306a36Sopenharmony_ci } else if (set_act->set_ip6_src.head.len_lw) { 87262306a36Sopenharmony_ci nfp_action += act_size; 87362306a36Sopenharmony_ci act_size = sizeof(set_act->set_ip6_src); 87462306a36Sopenharmony_ci memcpy(nfp_action, &set_act->set_ip6_src, act_size); 87562306a36Sopenharmony_ci *a_len += act_size; 87662306a36Sopenharmony_ci 87762306a36Sopenharmony_ci /* Hardware will automatically fix TCP/UDP checksum. */ 87862306a36Sopenharmony_ci *csum_updated |= nfp_fl_csum_l4_to_flag(ip_proto); 87962306a36Sopenharmony_ci } 88062306a36Sopenharmony_ci if (set_act->set_tport.head.len_lw) { 88162306a36Sopenharmony_ci nfp_action += act_size; 88262306a36Sopenharmony_ci act_size = sizeof(set_act->set_tport); 88362306a36Sopenharmony_ci memcpy(nfp_action, &set_act->set_tport, act_size); 88462306a36Sopenharmony_ci *a_len += act_size; 88562306a36Sopenharmony_ci 88662306a36Sopenharmony_ci /* Hardware will automatically fix TCP/UDP checksum. */ 88762306a36Sopenharmony_ci *csum_updated |= nfp_fl_csum_l4_to_flag(ip_proto); 88862306a36Sopenharmony_ci } 88962306a36Sopenharmony_ci 89062306a36Sopenharmony_ci return 0; 89162306a36Sopenharmony_ci} 89262306a36Sopenharmony_ci 89362306a36Sopenharmony_cistatic int 89462306a36Sopenharmony_cinfp_fl_pedit(const struct flow_action_entry *act, 89562306a36Sopenharmony_ci char *nfp_action, int *a_len, 89662306a36Sopenharmony_ci u32 *csum_updated, struct nfp_flower_pedit_acts *set_act, 89762306a36Sopenharmony_ci struct netlink_ext_ack *extack) 89862306a36Sopenharmony_ci{ 89962306a36Sopenharmony_ci enum flow_action_mangle_base htype; 90062306a36Sopenharmony_ci u32 offset; 90162306a36Sopenharmony_ci 90262306a36Sopenharmony_ci htype = act->mangle.htype; 90362306a36Sopenharmony_ci offset = act->mangle.offset; 90462306a36Sopenharmony_ci 90562306a36Sopenharmony_ci switch (htype) { 90662306a36Sopenharmony_ci case TCA_PEDIT_KEY_EX_HDR_TYPE_ETH: 90762306a36Sopenharmony_ci return nfp_fl_set_eth(act, offset, &set_act->set_eth, extack); 90862306a36Sopenharmony_ci case TCA_PEDIT_KEY_EX_HDR_TYPE_IP4: 90962306a36Sopenharmony_ci return nfp_fl_set_ip4(act, offset, &set_act->set_ip_addr, 91062306a36Sopenharmony_ci &set_act->set_ip_ttl_tos, extack); 91162306a36Sopenharmony_ci case TCA_PEDIT_KEY_EX_HDR_TYPE_IP6: 91262306a36Sopenharmony_ci return nfp_fl_set_ip6(act, offset, &set_act->set_ip6_dst, 91362306a36Sopenharmony_ci &set_act->set_ip6_src, 91462306a36Sopenharmony_ci &set_act->set_ip6_tc_hl_fl, extack); 91562306a36Sopenharmony_ci case TCA_PEDIT_KEY_EX_HDR_TYPE_TCP: 91662306a36Sopenharmony_ci return nfp_fl_set_tport(act, offset, &set_act->set_tport, 91762306a36Sopenharmony_ci NFP_FL_ACTION_OPCODE_SET_TCP, extack); 91862306a36Sopenharmony_ci case TCA_PEDIT_KEY_EX_HDR_TYPE_UDP: 91962306a36Sopenharmony_ci return nfp_fl_set_tport(act, offset, &set_act->set_tport, 92062306a36Sopenharmony_ci NFP_FL_ACTION_OPCODE_SET_UDP, extack); 92162306a36Sopenharmony_ci default: 92262306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: pedit on unsupported header"); 92362306a36Sopenharmony_ci return -EOPNOTSUPP; 92462306a36Sopenharmony_ci } 92562306a36Sopenharmony_ci} 92662306a36Sopenharmony_ci 92762306a36Sopenharmony_cistatic struct nfp_fl_meter *nfp_fl_meter(char *act_data) 92862306a36Sopenharmony_ci{ 92962306a36Sopenharmony_ci size_t act_size = sizeof(struct nfp_fl_meter); 93062306a36Sopenharmony_ci struct nfp_fl_meter *meter_act; 93162306a36Sopenharmony_ci 93262306a36Sopenharmony_ci meter_act = (struct nfp_fl_meter *)act_data; 93362306a36Sopenharmony_ci 93462306a36Sopenharmony_ci memset(meter_act, 0, act_size); 93562306a36Sopenharmony_ci 93662306a36Sopenharmony_ci meter_act->head.jump_id = NFP_FL_ACTION_OPCODE_METER; 93762306a36Sopenharmony_ci meter_act->head.len_lw = act_size >> NFP_FL_LW_SIZ; 93862306a36Sopenharmony_ci 93962306a36Sopenharmony_ci return meter_act; 94062306a36Sopenharmony_ci} 94162306a36Sopenharmony_ci 94262306a36Sopenharmony_cistatic int 94362306a36Sopenharmony_cinfp_flower_meter_action(struct nfp_app *app, 94462306a36Sopenharmony_ci const struct flow_action_entry *action, 94562306a36Sopenharmony_ci struct nfp_fl_payload *nfp_fl, int *a_len, 94662306a36Sopenharmony_ci struct net_device *netdev, 94762306a36Sopenharmony_ci struct netlink_ext_ack *extack) 94862306a36Sopenharmony_ci{ 94962306a36Sopenharmony_ci struct nfp_fl_meter *fl_meter; 95062306a36Sopenharmony_ci u32 meter_id; 95162306a36Sopenharmony_ci 95262306a36Sopenharmony_ci if (*a_len + sizeof(struct nfp_fl_meter) > NFP_FL_MAX_A_SIZ) { 95362306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, 95462306a36Sopenharmony_ci "unsupported offload:meter action size beyond the allowed maximum"); 95562306a36Sopenharmony_ci return -EOPNOTSUPP; 95662306a36Sopenharmony_ci } 95762306a36Sopenharmony_ci 95862306a36Sopenharmony_ci meter_id = action->hw_index; 95962306a36Sopenharmony_ci if (!nfp_flower_search_meter_entry(app, meter_id)) { 96062306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, 96162306a36Sopenharmony_ci "can not offload flow table with unsupported police action."); 96262306a36Sopenharmony_ci return -EOPNOTSUPP; 96362306a36Sopenharmony_ci } 96462306a36Sopenharmony_ci 96562306a36Sopenharmony_ci fl_meter = nfp_fl_meter(&nfp_fl->action_data[*a_len]); 96662306a36Sopenharmony_ci *a_len += sizeof(struct nfp_fl_meter); 96762306a36Sopenharmony_ci fl_meter->meter_id = cpu_to_be32(meter_id); 96862306a36Sopenharmony_ci 96962306a36Sopenharmony_ci return 0; 97062306a36Sopenharmony_ci} 97162306a36Sopenharmony_ci 97262306a36Sopenharmony_cistatic int 97362306a36Sopenharmony_cinfp_flower_output_action(struct nfp_app *app, 97462306a36Sopenharmony_ci const struct flow_action_entry *act, 97562306a36Sopenharmony_ci struct nfp_fl_payload *nfp_fl, int *a_len, 97662306a36Sopenharmony_ci struct net_device *netdev, bool last, 97762306a36Sopenharmony_ci enum nfp_flower_tun_type *tun_type, int *tun_out_cnt, 97862306a36Sopenharmony_ci int *out_cnt, u32 *csum_updated, bool pkt_host, 97962306a36Sopenharmony_ci struct netlink_ext_ack *extack) 98062306a36Sopenharmony_ci{ 98162306a36Sopenharmony_ci struct nfp_flower_priv *priv = app->priv; 98262306a36Sopenharmony_ci struct nfp_fl_output *output; 98362306a36Sopenharmony_ci int err, prelag_size; 98462306a36Sopenharmony_ci 98562306a36Sopenharmony_ci /* If csum_updated has not been reset by now, it means HW will 98662306a36Sopenharmony_ci * incorrectly update csums when they are not requested. 98762306a36Sopenharmony_ci */ 98862306a36Sopenharmony_ci if (*csum_updated) { 98962306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: set actions without updating checksums are not supported"); 99062306a36Sopenharmony_ci return -EOPNOTSUPP; 99162306a36Sopenharmony_ci } 99262306a36Sopenharmony_ci 99362306a36Sopenharmony_ci if (*a_len + sizeof(struct nfp_fl_output) > NFP_FL_MAX_A_SIZ) { 99462306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: mirred output increases action list size beyond the allowed maximum"); 99562306a36Sopenharmony_ci return -EOPNOTSUPP; 99662306a36Sopenharmony_ci } 99762306a36Sopenharmony_ci 99862306a36Sopenharmony_ci output = (struct nfp_fl_output *)&nfp_fl->action_data[*a_len]; 99962306a36Sopenharmony_ci err = nfp_fl_output(app, output, act, nfp_fl, last, netdev, *tun_type, 100062306a36Sopenharmony_ci tun_out_cnt, pkt_host, extack); 100162306a36Sopenharmony_ci if (err) 100262306a36Sopenharmony_ci return err; 100362306a36Sopenharmony_ci 100462306a36Sopenharmony_ci *a_len += sizeof(struct nfp_fl_output); 100562306a36Sopenharmony_ci 100662306a36Sopenharmony_ci if (priv->flower_en_feats & NFP_FL_ENABLE_LAG) { 100762306a36Sopenharmony_ci /* nfp_fl_pre_lag returns -err or size of prelag action added. 100862306a36Sopenharmony_ci * This will be 0 if it is not egressing to a lag dev. 100962306a36Sopenharmony_ci */ 101062306a36Sopenharmony_ci prelag_size = nfp_fl_pre_lag(app, act, nfp_fl, *a_len, extack); 101162306a36Sopenharmony_ci if (prelag_size < 0) { 101262306a36Sopenharmony_ci return prelag_size; 101362306a36Sopenharmony_ci } else if (prelag_size > 0 && (!last || *out_cnt)) { 101462306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: LAG action has to be last action in action list"); 101562306a36Sopenharmony_ci return -EOPNOTSUPP; 101662306a36Sopenharmony_ci } 101762306a36Sopenharmony_ci 101862306a36Sopenharmony_ci *a_len += prelag_size; 101962306a36Sopenharmony_ci } 102062306a36Sopenharmony_ci (*out_cnt)++; 102162306a36Sopenharmony_ci 102262306a36Sopenharmony_ci return 0; 102362306a36Sopenharmony_ci} 102462306a36Sopenharmony_ci 102562306a36Sopenharmony_cistatic int 102662306a36Sopenharmony_cinfp_flower_loop_action(struct nfp_app *app, const struct flow_action_entry *act, 102762306a36Sopenharmony_ci struct flow_rule *rule, 102862306a36Sopenharmony_ci struct nfp_fl_payload *nfp_fl, int *a_len, 102962306a36Sopenharmony_ci struct net_device *netdev, 103062306a36Sopenharmony_ci enum nfp_flower_tun_type *tun_type, int *tun_out_cnt, 103162306a36Sopenharmony_ci int *out_cnt, u32 *csum_updated, 103262306a36Sopenharmony_ci struct nfp_flower_pedit_acts *set_act, bool *pkt_host, 103362306a36Sopenharmony_ci struct netlink_ext_ack *extack, int act_idx) 103462306a36Sopenharmony_ci{ 103562306a36Sopenharmony_ci struct nfp_flower_priv *fl_priv = app->priv; 103662306a36Sopenharmony_ci struct nfp_fl_pre_tunnel *pre_tun; 103762306a36Sopenharmony_ci struct nfp_fl_set_tun *set_tun; 103862306a36Sopenharmony_ci struct nfp_fl_push_vlan *psh_v; 103962306a36Sopenharmony_ci struct nfp_fl_push_mpls *psh_m; 104062306a36Sopenharmony_ci struct nfp_fl_pop_vlan *pop_v; 104162306a36Sopenharmony_ci struct nfp_fl_pop_mpls *pop_m; 104262306a36Sopenharmony_ci struct nfp_fl_set_mpls *set_m; 104362306a36Sopenharmony_ci int err; 104462306a36Sopenharmony_ci 104562306a36Sopenharmony_ci switch (act->id) { 104662306a36Sopenharmony_ci case FLOW_ACTION_DROP: 104762306a36Sopenharmony_ci nfp_fl->meta.shortcut = cpu_to_be32(NFP_FL_SC_ACT_DROP); 104862306a36Sopenharmony_ci break; 104962306a36Sopenharmony_ci case FLOW_ACTION_REDIRECT_INGRESS: 105062306a36Sopenharmony_ci case FLOW_ACTION_REDIRECT: 105162306a36Sopenharmony_ci err = nfp_flower_output_action(app, act, nfp_fl, a_len, netdev, 105262306a36Sopenharmony_ci true, tun_type, tun_out_cnt, 105362306a36Sopenharmony_ci out_cnt, csum_updated, *pkt_host, 105462306a36Sopenharmony_ci extack); 105562306a36Sopenharmony_ci if (err) 105662306a36Sopenharmony_ci return err; 105762306a36Sopenharmony_ci break; 105862306a36Sopenharmony_ci case FLOW_ACTION_MIRRED_INGRESS: 105962306a36Sopenharmony_ci case FLOW_ACTION_MIRRED: 106062306a36Sopenharmony_ci err = nfp_flower_output_action(app, act, nfp_fl, a_len, netdev, 106162306a36Sopenharmony_ci false, tun_type, tun_out_cnt, 106262306a36Sopenharmony_ci out_cnt, csum_updated, *pkt_host, 106362306a36Sopenharmony_ci extack); 106462306a36Sopenharmony_ci if (err) 106562306a36Sopenharmony_ci return err; 106662306a36Sopenharmony_ci break; 106762306a36Sopenharmony_ci case FLOW_ACTION_VLAN_POP: 106862306a36Sopenharmony_ci if (*a_len + 106962306a36Sopenharmony_ci sizeof(struct nfp_fl_pop_vlan) > NFP_FL_MAX_A_SIZ) { 107062306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: maximum allowed action list size exceeded at pop vlan"); 107162306a36Sopenharmony_ci return -EOPNOTSUPP; 107262306a36Sopenharmony_ci } 107362306a36Sopenharmony_ci 107462306a36Sopenharmony_ci pop_v = (struct nfp_fl_pop_vlan *)&nfp_fl->action_data[*a_len]; 107562306a36Sopenharmony_ci nfp_fl->meta.shortcut = cpu_to_be32(NFP_FL_SC_ACT_POPV); 107662306a36Sopenharmony_ci 107762306a36Sopenharmony_ci nfp_fl_pop_vlan(pop_v); 107862306a36Sopenharmony_ci *a_len += sizeof(struct nfp_fl_pop_vlan); 107962306a36Sopenharmony_ci break; 108062306a36Sopenharmony_ci case FLOW_ACTION_VLAN_PUSH: 108162306a36Sopenharmony_ci if (*a_len + 108262306a36Sopenharmony_ci sizeof(struct nfp_fl_push_vlan) > NFP_FL_MAX_A_SIZ) { 108362306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: maximum allowed action list size exceeded at push vlan"); 108462306a36Sopenharmony_ci return -EOPNOTSUPP; 108562306a36Sopenharmony_ci } 108662306a36Sopenharmony_ci 108762306a36Sopenharmony_ci psh_v = (struct nfp_fl_push_vlan *)&nfp_fl->action_data[*a_len]; 108862306a36Sopenharmony_ci nfp_fl->meta.shortcut = cpu_to_be32(NFP_FL_SC_ACT_NULL); 108962306a36Sopenharmony_ci 109062306a36Sopenharmony_ci nfp_fl_push_vlan(psh_v, act); 109162306a36Sopenharmony_ci *a_len += sizeof(struct nfp_fl_push_vlan); 109262306a36Sopenharmony_ci break; 109362306a36Sopenharmony_ci case FLOW_ACTION_TUNNEL_ENCAP: { 109462306a36Sopenharmony_ci const struct ip_tunnel_info *ip_tun = act->tunnel; 109562306a36Sopenharmony_ci 109662306a36Sopenharmony_ci *tun_type = nfp_fl_get_tun_from_act(app, rule, act, act_idx); 109762306a36Sopenharmony_ci if (*tun_type == NFP_FL_TUNNEL_NONE) { 109862306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: unsupported tunnel type in action list"); 109962306a36Sopenharmony_ci return -EOPNOTSUPP; 110062306a36Sopenharmony_ci } 110162306a36Sopenharmony_ci 110262306a36Sopenharmony_ci if (ip_tun->mode & ~NFP_FL_SUPPORTED_TUNNEL_INFO_FLAGS) { 110362306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: unsupported tunnel flags in action list"); 110462306a36Sopenharmony_ci return -EOPNOTSUPP; 110562306a36Sopenharmony_ci } 110662306a36Sopenharmony_ci 110762306a36Sopenharmony_ci /* Pre-tunnel action is required for tunnel encap. 110862306a36Sopenharmony_ci * This checks for next hop entries on NFP. 110962306a36Sopenharmony_ci * If none, the packet falls back before applying other actions. 111062306a36Sopenharmony_ci */ 111162306a36Sopenharmony_ci if (*a_len + sizeof(struct nfp_fl_pre_tunnel) + 111262306a36Sopenharmony_ci sizeof(struct nfp_fl_set_tun) > NFP_FL_MAX_A_SIZ) { 111362306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: maximum allowed action list size exceeded at tunnel encap"); 111462306a36Sopenharmony_ci return -EOPNOTSUPP; 111562306a36Sopenharmony_ci } 111662306a36Sopenharmony_ci 111762306a36Sopenharmony_ci pre_tun = nfp_fl_pre_tunnel(nfp_fl->action_data, *a_len); 111862306a36Sopenharmony_ci nfp_fl->meta.shortcut = cpu_to_be32(NFP_FL_SC_ACT_NULL); 111962306a36Sopenharmony_ci *a_len += sizeof(struct nfp_fl_pre_tunnel); 112062306a36Sopenharmony_ci 112162306a36Sopenharmony_ci err = nfp_fl_push_geneve_options(nfp_fl, a_len, act, extack); 112262306a36Sopenharmony_ci if (err) 112362306a36Sopenharmony_ci return err; 112462306a36Sopenharmony_ci 112562306a36Sopenharmony_ci set_tun = (void *)&nfp_fl->action_data[*a_len]; 112662306a36Sopenharmony_ci err = nfp_fl_set_tun(app, set_tun, act, pre_tun, *tun_type, 112762306a36Sopenharmony_ci netdev, extack); 112862306a36Sopenharmony_ci if (err) 112962306a36Sopenharmony_ci return err; 113062306a36Sopenharmony_ci *a_len += sizeof(struct nfp_fl_set_tun); 113162306a36Sopenharmony_ci } 113262306a36Sopenharmony_ci break; 113362306a36Sopenharmony_ci case FLOW_ACTION_TUNNEL_DECAP: 113462306a36Sopenharmony_ci /* Tunnel decap is handled by default so accept action. */ 113562306a36Sopenharmony_ci return 0; 113662306a36Sopenharmony_ci case FLOW_ACTION_MANGLE: 113762306a36Sopenharmony_ci if (nfp_fl_pedit(act, &nfp_fl->action_data[*a_len], 113862306a36Sopenharmony_ci a_len, csum_updated, set_act, extack)) 113962306a36Sopenharmony_ci return -EOPNOTSUPP; 114062306a36Sopenharmony_ci break; 114162306a36Sopenharmony_ci case FLOW_ACTION_CSUM: 114262306a36Sopenharmony_ci /* csum action requests recalc of something we have not fixed */ 114362306a36Sopenharmony_ci if (act->csum_flags & ~*csum_updated) { 114462306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: unsupported csum update action in action list"); 114562306a36Sopenharmony_ci return -EOPNOTSUPP; 114662306a36Sopenharmony_ci } 114762306a36Sopenharmony_ci /* If we will correctly fix the csum we can remove it from the 114862306a36Sopenharmony_ci * csum update list. Which will later be used to check support. 114962306a36Sopenharmony_ci */ 115062306a36Sopenharmony_ci *csum_updated &= ~act->csum_flags; 115162306a36Sopenharmony_ci break; 115262306a36Sopenharmony_ci case FLOW_ACTION_MPLS_PUSH: 115362306a36Sopenharmony_ci if (*a_len + 115462306a36Sopenharmony_ci sizeof(struct nfp_fl_push_mpls) > NFP_FL_MAX_A_SIZ) { 115562306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: maximum allowed action list size exceeded at push MPLS"); 115662306a36Sopenharmony_ci return -EOPNOTSUPP; 115762306a36Sopenharmony_ci } 115862306a36Sopenharmony_ci 115962306a36Sopenharmony_ci psh_m = (struct nfp_fl_push_mpls *)&nfp_fl->action_data[*a_len]; 116062306a36Sopenharmony_ci nfp_fl->meta.shortcut = cpu_to_be32(NFP_FL_SC_ACT_NULL); 116162306a36Sopenharmony_ci 116262306a36Sopenharmony_ci err = nfp_fl_push_mpls(psh_m, act, extack); 116362306a36Sopenharmony_ci if (err) 116462306a36Sopenharmony_ci return err; 116562306a36Sopenharmony_ci *a_len += sizeof(struct nfp_fl_push_mpls); 116662306a36Sopenharmony_ci break; 116762306a36Sopenharmony_ci case FLOW_ACTION_MPLS_POP: 116862306a36Sopenharmony_ci if (*a_len + 116962306a36Sopenharmony_ci sizeof(struct nfp_fl_pop_mpls) > NFP_FL_MAX_A_SIZ) { 117062306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: maximum allowed action list size exceeded at pop MPLS"); 117162306a36Sopenharmony_ci return -EOPNOTSUPP; 117262306a36Sopenharmony_ci } 117362306a36Sopenharmony_ci 117462306a36Sopenharmony_ci pop_m = (struct nfp_fl_pop_mpls *)&nfp_fl->action_data[*a_len]; 117562306a36Sopenharmony_ci nfp_fl->meta.shortcut = cpu_to_be32(NFP_FL_SC_ACT_NULL); 117662306a36Sopenharmony_ci 117762306a36Sopenharmony_ci nfp_fl_pop_mpls(pop_m, act); 117862306a36Sopenharmony_ci *a_len += sizeof(struct nfp_fl_pop_mpls); 117962306a36Sopenharmony_ci break; 118062306a36Sopenharmony_ci case FLOW_ACTION_MPLS_MANGLE: 118162306a36Sopenharmony_ci if (*a_len + 118262306a36Sopenharmony_ci sizeof(struct nfp_fl_set_mpls) > NFP_FL_MAX_A_SIZ) { 118362306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: maximum allowed action list size exceeded at set MPLS"); 118462306a36Sopenharmony_ci return -EOPNOTSUPP; 118562306a36Sopenharmony_ci } 118662306a36Sopenharmony_ci 118762306a36Sopenharmony_ci set_m = (struct nfp_fl_set_mpls *)&nfp_fl->action_data[*a_len]; 118862306a36Sopenharmony_ci nfp_fl->meta.shortcut = cpu_to_be32(NFP_FL_SC_ACT_NULL); 118962306a36Sopenharmony_ci 119062306a36Sopenharmony_ci nfp_fl_set_mpls(set_m, act); 119162306a36Sopenharmony_ci *a_len += sizeof(struct nfp_fl_set_mpls); 119262306a36Sopenharmony_ci break; 119362306a36Sopenharmony_ci case FLOW_ACTION_PTYPE: 119462306a36Sopenharmony_ci /* TC ptype skbedit sets PACKET_HOST for ingress redirect. */ 119562306a36Sopenharmony_ci if (act->ptype != PACKET_HOST) 119662306a36Sopenharmony_ci return -EOPNOTSUPP; 119762306a36Sopenharmony_ci 119862306a36Sopenharmony_ci *pkt_host = true; 119962306a36Sopenharmony_ci break; 120062306a36Sopenharmony_ci case FLOW_ACTION_POLICE: 120162306a36Sopenharmony_ci if (!(fl_priv->flower_ext_feats & NFP_FL_FEATS_QOS_METER)) { 120262306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, 120362306a36Sopenharmony_ci "unsupported offload: unsupported police action in action list"); 120462306a36Sopenharmony_ci return -EOPNOTSUPP; 120562306a36Sopenharmony_ci } 120662306a36Sopenharmony_ci 120762306a36Sopenharmony_ci err = nfp_flower_meter_action(app, act, nfp_fl, a_len, netdev, 120862306a36Sopenharmony_ci extack); 120962306a36Sopenharmony_ci if (err) 121062306a36Sopenharmony_ci return err; 121162306a36Sopenharmony_ci break; 121262306a36Sopenharmony_ci default: 121362306a36Sopenharmony_ci /* Currently we do not handle any other actions. */ 121462306a36Sopenharmony_ci NL_SET_ERR_MSG_MOD(extack, "unsupported offload: unsupported action in action list"); 121562306a36Sopenharmony_ci return -EOPNOTSUPP; 121662306a36Sopenharmony_ci } 121762306a36Sopenharmony_ci 121862306a36Sopenharmony_ci return 0; 121962306a36Sopenharmony_ci} 122062306a36Sopenharmony_ci 122162306a36Sopenharmony_cistatic bool nfp_fl_check_mangle_start(struct flow_action *flow_act, 122262306a36Sopenharmony_ci int current_act_idx) 122362306a36Sopenharmony_ci{ 122462306a36Sopenharmony_ci struct flow_action_entry current_act; 122562306a36Sopenharmony_ci struct flow_action_entry prev_act; 122662306a36Sopenharmony_ci 122762306a36Sopenharmony_ci current_act = flow_act->entries[current_act_idx]; 122862306a36Sopenharmony_ci if (current_act.id != FLOW_ACTION_MANGLE) 122962306a36Sopenharmony_ci return false; 123062306a36Sopenharmony_ci 123162306a36Sopenharmony_ci if (current_act_idx == 0) 123262306a36Sopenharmony_ci return true; 123362306a36Sopenharmony_ci 123462306a36Sopenharmony_ci prev_act = flow_act->entries[current_act_idx - 1]; 123562306a36Sopenharmony_ci 123662306a36Sopenharmony_ci return prev_act.id != FLOW_ACTION_MANGLE; 123762306a36Sopenharmony_ci} 123862306a36Sopenharmony_ci 123962306a36Sopenharmony_cistatic bool nfp_fl_check_mangle_end(struct flow_action *flow_act, 124062306a36Sopenharmony_ci int current_act_idx) 124162306a36Sopenharmony_ci{ 124262306a36Sopenharmony_ci struct flow_action_entry current_act; 124362306a36Sopenharmony_ci struct flow_action_entry next_act; 124462306a36Sopenharmony_ci 124562306a36Sopenharmony_ci current_act = flow_act->entries[current_act_idx]; 124662306a36Sopenharmony_ci if (current_act.id != FLOW_ACTION_MANGLE) 124762306a36Sopenharmony_ci return false; 124862306a36Sopenharmony_ci 124962306a36Sopenharmony_ci if (current_act_idx == flow_act->num_entries) 125062306a36Sopenharmony_ci return true; 125162306a36Sopenharmony_ci 125262306a36Sopenharmony_ci next_act = flow_act->entries[current_act_idx + 1]; 125362306a36Sopenharmony_ci 125462306a36Sopenharmony_ci return next_act.id != FLOW_ACTION_MANGLE; 125562306a36Sopenharmony_ci} 125662306a36Sopenharmony_ci 125762306a36Sopenharmony_ciint nfp_flower_compile_action(struct nfp_app *app, 125862306a36Sopenharmony_ci struct flow_rule *rule, 125962306a36Sopenharmony_ci struct net_device *netdev, 126062306a36Sopenharmony_ci struct nfp_fl_payload *nfp_flow, 126162306a36Sopenharmony_ci struct netlink_ext_ack *extack) 126262306a36Sopenharmony_ci{ 126362306a36Sopenharmony_ci int act_len, act_cnt, err, tun_out_cnt, out_cnt, i; 126462306a36Sopenharmony_ci struct nfp_flower_pedit_acts set_act; 126562306a36Sopenharmony_ci enum nfp_flower_tun_type tun_type; 126662306a36Sopenharmony_ci struct flow_action_entry *act; 126762306a36Sopenharmony_ci bool pkt_host = false; 126862306a36Sopenharmony_ci u32 csum_updated = 0; 126962306a36Sopenharmony_ci 127062306a36Sopenharmony_ci if (!flow_action_hw_stats_check(&rule->action, extack, 127162306a36Sopenharmony_ci FLOW_ACTION_HW_STATS_DELAYED_BIT)) 127262306a36Sopenharmony_ci return -EOPNOTSUPP; 127362306a36Sopenharmony_ci 127462306a36Sopenharmony_ci memset(nfp_flow->action_data, 0, NFP_FL_MAX_A_SIZ); 127562306a36Sopenharmony_ci nfp_flow->meta.act_len = 0; 127662306a36Sopenharmony_ci tun_type = NFP_FL_TUNNEL_NONE; 127762306a36Sopenharmony_ci act_len = 0; 127862306a36Sopenharmony_ci act_cnt = 0; 127962306a36Sopenharmony_ci tun_out_cnt = 0; 128062306a36Sopenharmony_ci out_cnt = 0; 128162306a36Sopenharmony_ci 128262306a36Sopenharmony_ci flow_action_for_each(i, act, &rule->action) { 128362306a36Sopenharmony_ci if (nfp_fl_check_mangle_start(&rule->action, i)) 128462306a36Sopenharmony_ci memset(&set_act, 0, sizeof(set_act)); 128562306a36Sopenharmony_ci err = nfp_flower_loop_action(app, act, rule, nfp_flow, &act_len, 128662306a36Sopenharmony_ci netdev, &tun_type, &tun_out_cnt, 128762306a36Sopenharmony_ci &out_cnt, &csum_updated, 128862306a36Sopenharmony_ci &set_act, &pkt_host, extack, i); 128962306a36Sopenharmony_ci if (err) 129062306a36Sopenharmony_ci return err; 129162306a36Sopenharmony_ci act_cnt++; 129262306a36Sopenharmony_ci if (nfp_fl_check_mangle_end(&rule->action, i)) 129362306a36Sopenharmony_ci nfp_fl_commit_mangle(rule, 129462306a36Sopenharmony_ci &nfp_flow->action_data[act_len], 129562306a36Sopenharmony_ci &act_len, &set_act, &csum_updated); 129662306a36Sopenharmony_ci } 129762306a36Sopenharmony_ci 129862306a36Sopenharmony_ci /* We optimise when the action list is small, this can unfortunately 129962306a36Sopenharmony_ci * not happen once we have more than one action in the action list. 130062306a36Sopenharmony_ci */ 130162306a36Sopenharmony_ci if (act_cnt > 1) 130262306a36Sopenharmony_ci nfp_flow->meta.shortcut = cpu_to_be32(NFP_FL_SC_ACT_NULL); 130362306a36Sopenharmony_ci 130462306a36Sopenharmony_ci nfp_flow->meta.act_len = act_len; 130562306a36Sopenharmony_ci 130662306a36Sopenharmony_ci return 0; 130762306a36Sopenharmony_ci} 1308