get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/58715/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 58715,
    "url": "http://patches.dpdk.org/api/patches/58715/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/patch/20190906120058.108073-5-yahui.cao@intel.com/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20190906120058.108073-5-yahui.cao@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20190906120058.108073-5-yahui.cao@intel.com",
    "date": "2019-09-06T12:00:50",
    "name": "[04/12] net/ice: add FDIR create and destroy",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "8b2c48899778480c3159bd417a49b49751f6af62",
    "submitter": {
        "id": 1176,
        "url": "http://patches.dpdk.org/api/people/1176/?format=api",
        "name": "Cao, Yahui",
        "email": "yahui.cao@intel.com"
    },
    "delegate": {
        "id": 31221,
        "url": "http://patches.dpdk.org/api/users/31221/?format=api",
        "username": "yexl",
        "first_name": "xiaolong",
        "last_name": "ye",
        "email": "xiaolong.ye@intel.com"
    },
    "mbox": "http://patches.dpdk.org/project/dpdk/patch/20190906120058.108073-5-yahui.cao@intel.com/mbox/",
    "series": [
        {
            "id": 6273,
            "url": "http://patches.dpdk.org/api/series/6273/?format=api",
            "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=6273",
            "date": "2019-09-06T12:00:46",
            "name": "net/ice: add ice Flow Director driver",
            "version": 1,
            "mbox": "http://patches.dpdk.org/series/6273/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/58715/comments/",
    "check": "fail",
    "checks": "http://patches.dpdk.org/api/patches/58715/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@dpdk.org",
        "Delivered-To": "patchwork@dpdk.org",
        "Received": [
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id AAD611F0FA;\n\tFri,  6 Sep 2019 06:16:27 +0200 (CEST)",
            "from mga02.intel.com (mga02.intel.com [134.134.136.20])\n\tby dpdk.org (Postfix) with ESMTP id E6CA81F0F1\n\tfor <dev@dpdk.org>; Fri,  6 Sep 2019 06:16:20 +0200 (CEST)",
            "from fmsmga003.fm.intel.com ([10.253.24.29])\n\tby orsmga101.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384;\n\t05 Sep 2019 21:16:20 -0700",
            "from dpdk-yahui-skylake.sh.intel.com ([10.67.119.16])\n\tby FMSMGA003.fm.intel.com with ESMTP; 05 Sep 2019 21:16:18 -0700"
        ],
        "X-Amp-Result": "SKIPPED(no attachment in message)",
        "X-Amp-File-Uploaded": "False",
        "X-ExtLoop1": "1",
        "X-IronPort-AV": "E=Sophos;i=\"5.64,472,1559545200\"; d=\"scan'208\";a=\"190709711\"",
        "From": "Yahui Cao <yahui.cao@intel.com>",
        "To": "Qiming Yang <qiming.yang@intel.com>,\n\tWenzhuo Lu <wenzhuo.lu@intel.com>",
        "Cc": "dev@dpdk.org, Qi Zhang <qi.z.zhang@intel.com>,\n\tXiaolong Ye <xiaolong.ye@intel.com>,\n\tBeilei Xing <beilei.xing@intel.com>, Yahui Cao <yahui.cao@intel.com>",
        "Date": "Fri,  6 Sep 2019 20:00:50 +0800",
        "Message-Id": "<20190906120058.108073-5-yahui.cao@intel.com>",
        "X-Mailer": "git-send-email 2.17.1",
        "In-Reply-To": "<20190906120058.108073-1-yahui.cao@intel.com>",
        "References": "<20190906120058.108073-1-yahui.cao@intel.com>",
        "Subject": "[dpdk-dev] [dpdk-dev 04/12] net/ice: add FDIR create and destroy",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n\t<mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n\t<mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "Add ice_create_fdir_filter to create a rule. If a flow is matched by\nflow director filter, filter rule will be set to HW. Only basic pattern\nand queue/passthru/drop are supported.\n\nAdd ice_destroy_fdir_filter to destroy a rule. If a flow is created\nbefore, filter rule will be removed from HW.\n\nSigned-off-by: Yahui Cao <yahui.cao@intel.com>\n---\n drivers/net/ice/ice_ethdev.h      |   6 +\n drivers/net/ice/ice_fdir_filter.c | 508 ++++++++++++++++++++++++++++++\n 2 files changed, 514 insertions(+)",
    "diff": "diff --git a/drivers/net/ice/ice_ethdev.h b/drivers/net/ice/ice_ethdev.h\nindex ea68858d1..bb821bc41 100644\n--- a/drivers/net/ice/ice_ethdev.h\n+++ b/drivers/net/ice/ice_ethdev.h\n@@ -249,6 +249,11 @@ TAILQ_HEAD(ice_flow_list, rte_flow);\n struct ice_flow_parser;\n TAILQ_HEAD(ice_parser_list, ice_flow_parser);\n \n+struct ice_fdir_filter_conf {\n+\tstruct ice_fdir_fltr input;\n+\tuint64_t input_set;\n+};\n+\n /**\n  *  A structure used to define fields of a FDIR related info.\n  */\n@@ -258,6 +263,7 @@ struct ice_fdir_info {\n \tstruct ice_rx_queue *rxq;\n \tvoid *prg_pkt;                 /* memory for fdir program packet */\n \tuint64_t dma_addr;             /* physic address of packet memory*/\n+\tstruct ice_fdir_filter_conf conf;\n };\n \n struct ice_pf {\ndiff --git a/drivers/net/ice/ice_fdir_filter.c b/drivers/net/ice/ice_fdir_filter.c\nindex 0840c3b4b..98bc1be49 100644\n--- a/drivers/net/ice/ice_fdir_filter.c\n+++ b/drivers/net/ice/ice_fdir_filter.c\n@@ -7,6 +7,51 @@\n #include \"ice_rxtx.h\"\n #include \"ice_generic_flow.h\"\n \n+#define ICE_FDIR_INSET_ETH_IPV4 (\\\n+\tICE_INSET_IPV4_SRC | ICE_INSET_IPV4_DST | ICE_INSET_IPV4_TOS | \\\n+\tICE_INSET_IPV4_TTL | ICE_INSET_IPV4_PROTO)\n+\n+#define ICE_FDIR_INSET_ETH_IPV4_UDP (\\\n+\tICE_FDIR_INSET_ETH_IPV4 | \\\n+\tICE_INSET_UDP_SRC_PORT | ICE_INSET_UDP_DST_PORT)\n+\n+#define ICE_FDIR_INSET_ETH_IPV4_TCP (\\\n+\tICE_FDIR_INSET_ETH_IPV4 | \\\n+\tICE_INSET_TCP_SRC_PORT | ICE_INSET_TCP_DST_PORT)\n+\n+#define ICE_FDIR_INSET_ETH_IPV4_SCTP (\\\n+\tICE_FDIR_INSET_ETH_IPV4 | \\\n+\tICE_INSET_SCTP_SRC_PORT | ICE_INSET_SCTP_DST_PORT)\n+\n+#define ICE_FDIR_INSET_ETH_IPV6 (\\\n+\tICE_INSET_IPV6_SRC | ICE_INSET_IPV6_DST | ICE_INSET_IPV6_TC | \\\n+\tICE_INSET_IPV6_HOP_LIMIT | ICE_INSET_IPV6_NEXT_HDR)\n+\n+#define ICE_FDIR_INSET_ETH_IPV6_UDP (\\\n+\tICE_FDIR_INSET_ETH_IPV6 | \\\n+\tICE_INSET_UDP_SRC_PORT | ICE_INSET_UDP_DST_PORT)\n+\n+#define ICE_FDIR_INSET_ETH_IPV6_TCP (\\\n+\tICE_FDIR_INSET_ETH_IPV6 | \\\n+\tICE_INSET_TCP_SRC_PORT | ICE_INSET_TCP_DST_PORT)\n+\n+#define ICE_FDIR_INSET_ETH_IPV6_SCTP (\\\n+\tICE_FDIR_INSET_ETH_IPV6 | \\\n+\tICE_INSET_SCTP_SRC_PORT | ICE_INSET_SCTP_DST_PORT)\n+\n+static struct ice_pattern_match_item ice_fdir_pattern[] = {\n+\t{pattern_eth_ipv4,             ICE_FDIR_INSET_ETH_IPV4,              ICE_INSET_NONE},\n+\t{pattern_eth_ipv4_udp,         ICE_FDIR_INSET_ETH_IPV4_UDP,          ICE_INSET_NONE},\n+\t{pattern_eth_ipv4_tcp,         ICE_FDIR_INSET_ETH_IPV4_TCP,          ICE_INSET_NONE},\n+\t{pattern_eth_ipv4_sctp,        ICE_FDIR_INSET_ETH_IPV4_SCTP,         ICE_INSET_NONE},\n+\t{pattern_eth_ipv6,             ICE_FDIR_INSET_ETH_IPV6,              ICE_INSET_NONE},\n+\t{pattern_eth_ipv6_udp,         ICE_FDIR_INSET_ETH_IPV6_UDP,          ICE_INSET_NONE},\n+\t{pattern_eth_ipv6_tcp,         ICE_FDIR_INSET_ETH_IPV6_TCP,          ICE_INSET_NONE},\n+\t{pattern_eth_ipv6_sctp,        ICE_FDIR_INSET_ETH_IPV6_SCTP,         ICE_INSET_NONE},\n+};\n+\n+static struct ice_flow_parser ice_fdir_parser;\n+\n static const struct rte_memzone *\n ice_memzone_reserve(const char *name, uint32_t len, int socket_id)\n {\n@@ -400,6 +445,10 @@ ice_init_fdir_filter(struct ice_adapter *ad)\n \tint ret;\n \n \tret = ice_fdir_setup(pf);\n+\tif (ret)\n+\t\treturn ret;\n+\n+\tret = ice_register_parser(&ice_fdir_parser, ad);\n \n \treturn ret;\n }\n@@ -409,15 +458,474 @@ ice_uninit_fdir_filter(struct ice_adapter *ad)\n {\n \tstruct ice_pf *pf = &ad->pf;\n \n+\tice_unregister_parser(&ice_fdir_parser, ad);\n+\n \tice_fdir_teardown(pf);\n }\n \n+static int\n+ice_add_del_fdir_filter(struct ice_pf *pf,\n+\t\t\tstruct ice_fdir_filter_conf *filter,\n+\t\t\tbool add)\n+{\n+\tstruct ice_fltr_desc desc;\n+\tstruct ice_hw *hw = ICE_PF_TO_HW(pf);\n+\tunsigned char *pkt = (unsigned char *)pf->fdir.prg_pkt;\n+\tint ret = 0;\n+\n+\tmemset(&desc, 0, sizeof(desc));\n+\tice_fdir_get_prgm_desc(hw, &filter->input, &desc, add);\n+\n+\tmemset(pkt, 0, ICE_FDIR_PKT_LEN);\n+\tret = ice_fdir_get_prgm_pkt(&filter->input, pkt, false);\n+\tif (ret) {\n+\t\tPMD_DRV_LOG(ERR, \"Generate dummy packet failed\");\n+\t\treturn -EINVAL;\n+\t}\n+\n+\tret = ice_fdir_programming(pf, &desc);\n+\tif (ret)\n+\t\treturn ret;\n+\n+\treturn 0;\n+}\n+\n+static int\n+ice_create_fdir_filter(struct ice_adapter *ad,\n+\t\t       struct rte_flow *flow,\n+\t\t       void *meta,\n+\t\t       struct rte_flow_error *error)\n+{\n+\tstruct ice_pf *pf = &ad->pf;\n+\tstruct ice_hw *hw = ICE_PF_TO_HW(pf);\n+\tstruct ice_fdir_filter_conf *filter = meta;\n+\tstruct ice_fdir_filter_conf *rule;\n+\tint ret = 0;\n+\n+\trule = rte_zmalloc(\"fdir_entry\", sizeof(*rule), 0);\n+\tif (!rule) {\n+\t\trte_flow_error_set(error, ENOMEM,\n+\t\t\t\t   RTE_FLOW_ERROR_TYPE_HANDLE, NULL,\n+\t\t\t\t   \"Failed to allocate memory\");\n+\t\treturn -rte_errno;\n+\t}\n+\n+\tret = ice_fdir_input_set_conf(pf, filter->input.flow_type,\n+\t\t\tfilter->input_set);\n+\tif (ret) {\n+\t\trte_flow_error_set(error, -ret,\n+\t\t\t\t   RTE_FLOW_ERROR_TYPE_HANDLE, NULL,\n+\t\t\t\t   \"Profile configure failed.\");\n+\t\tgoto free_entry;\n+\t}\n+\n+\tret = ice_add_del_fdir_filter(pf, filter, true);\n+\tif (ret) {\n+\t\trte_flow_error_set(error, -ret,\n+\t\t\t\t   RTE_FLOW_ERROR_TYPE_HANDLE, NULL,\n+\t\t\t\t   \"Add filter rule failed.\");\n+\t\tgoto free_entry;\n+\t}\n+\n+\trte_memcpy(rule, filter, sizeof(*rule));\n+\tflow->rule = rule;\n+\tice_fdir_update_cntrs(hw, filter->input.flow_type, true);\n+\treturn 0;\n+\n+free_entry:\n+\trte_free(rule);\n+\treturn -rte_errno;\n+}\n+\n+static int\n+ice_destroy_fdir_filter(struct ice_adapter *ad,\n+\t\t\tstruct rte_flow *flow,\n+\t\t\tstruct rte_flow_error *error)\n+{\n+\tstruct ice_pf *pf = &ad->pf;\n+\tstruct ice_fdir_filter_conf *filter;\n+\tint ret;\n+\n+\tfilter = (struct ice_fdir_filter_conf *)flow->rule;\n+\n+\tret = ice_add_del_fdir_filter(pf, filter, false);\n+\tif (ret) {\n+\t\trte_flow_error_set(error, -ret,\n+\t\t\t\t   RTE_FLOW_ERROR_TYPE_HANDLE, NULL,\n+\t\t\t\t   \"Del filter rule failed.\");\n+\t\treturn -rte_errno;\n+\t}\n+\n+\trte_free(filter);\n+\n+\treturn 0;\n+}\n+\n static struct ice_flow_engine ice_fdir_engine = {\n \t.init = ice_init_fdir_filter,\n \t.uninit = ice_uninit_fdir_filter,\n+\t.create = ice_create_fdir_filter,\n+\t.destroy = ice_destroy_fdir_filter,\n \t.type = ICE_FLOW_ENGINE_FDIR,\n };\n \n+static int\n+ice_fdir_parse_action(struct ice_adapter *ad,\n+\t\t      const struct rte_flow_action actions[],\n+\t\t      struct rte_flow_error *error,\n+\t\t      struct ice_fdir_filter_conf *filter)\n+{\n+\tstruct ice_pf *pf = &ad->pf;\n+\tconst struct rte_flow_action_queue *act_q;\n+\tuint32_t dest_num = 0;\n+\n+\tfor (; actions->type != RTE_FLOW_ACTION_TYPE_END; actions++) {\n+\t\tswitch (actions->type) {\n+\t\tcase RTE_FLOW_ACTION_TYPE_VOID:\n+\t\t\tbreak;\n+\t\tcase RTE_FLOW_ACTION_TYPE_QUEUE:\n+\t\t\tdest_num++;\n+\n+\t\t\tact_q = actions->conf;\n+\t\t\tfilter->input.q_index = act_q->index;\n+\t\t\tif (filter->input.q_index >=\n+\t\t\t\t\tpf->dev_data->nb_rx_queues) {\n+\t\t\t\trte_flow_error_set(error, EINVAL,\n+\t\t\t\t\t\t   RTE_FLOW_ERROR_TYPE_ACTION,\n+\t\t\t\t\t\t   actions,\n+\t\t\t\t\t\t   \"Invalid queue for FDIR.\");\n+\t\t\t\treturn -rte_errno;\n+\t\t\t}\n+\t\t\tfilter->input.dest_ctl =\n+\t\t\t\tICE_FLTR_PRGM_DESC_DEST_DIRECT_PKT_QINDEX;\n+\t\t\tbreak;\n+\t\tcase RTE_FLOW_ACTION_TYPE_DROP:\n+\t\t\tdest_num++;\n+\n+\t\t\tfilter->input.dest_ctl = ICE_FLTR_PRGM_DESC_DEST_DROP_PKT;\n+\t\t\tbreak;\n+\t\tcase RTE_FLOW_ACTION_TYPE_PASSTHRU:\n+\t\t\tdest_num++;\n+\n+\t\t\tfilter->input.dest_ctl =\n+\t\t\t\tICE_FLTR_PRGM_DESC_DEST_DIRECT_PKT_QINDEX;\n+\t\t\tfilter->input.q_index = 0;\n+\t\t\tbreak;\n+\t\tdefault:\n+\t\t\trte_flow_error_set(error, EINVAL,\n+\t\t\t\t   RTE_FLOW_ERROR_TYPE_ACTION, actions,\n+\t\t\t\t   \"Invalid action.\");\n+\t\t\treturn -rte_errno;\n+\t\t}\n+\t}\n+\n+\tif (dest_num == 0 || dest_num >= 2) {\n+\t\trte_flow_error_set(error, EINVAL,\n+\t\t\t   RTE_FLOW_ERROR_TYPE_ACTION, actions,\n+\t\t\t   \"Unsupported action combination\");\n+\t\treturn -rte_errno;\n+\t}\n+\n+\treturn 0;\n+}\n+\n+static int\n+ice_fdir_parse_pattern(__rte_unused struct ice_adapter *ad,\n+\t\t       const struct rte_flow_item pattern[],\n+\t\t       struct rte_flow_error *error,\n+\t\t       struct ice_fdir_filter_conf *filter)\n+{\n+\tconst struct rte_flow_item *item = pattern;\n+\tenum rte_flow_item_type item_type;\n+\tenum rte_flow_item_type l3 = RTE_FLOW_ITEM_TYPE_END;\n+\tconst struct rte_flow_item_eth *eth_spec, *eth_mask;\n+\tconst struct rte_flow_item_ipv4 *ipv4_spec, *ipv4_mask;\n+\tconst struct rte_flow_item_ipv6 *ipv6_spec, *ipv6_mask;\n+\tconst struct rte_flow_item_tcp *tcp_spec, *tcp_mask;\n+\tconst struct rte_flow_item_udp *udp_spec, *udp_mask;\n+\tconst struct rte_flow_item_sctp *sctp_spec, *sctp_mask;\n+\tuint64_t input_set = ICE_INSET_NONE;\n+\tuint8_t flow_type = ICE_FLTR_PTYPE_NONF_NONE;\n+\tuint8_t  ipv6_addr_mask[16] = {\n+\t\t0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,\n+\t\t0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF\n+\t};\n+\n+\n+\tfor (item = pattern; item->type != RTE_FLOW_ITEM_TYPE_END; item++) {\n+\t\tif (item->last) {\n+\t\t\trte_flow_error_set(error, EINVAL,\n+\t\t\t\t\tRTE_FLOW_ERROR_TYPE_ITEM,\n+\t\t\t\t\titem,\n+\t\t\t\t\t\"Not support range\");\n+\t\t\treturn -rte_errno;\n+\t\t}\n+\t\titem_type = item->type;\n+\n+\t\tswitch (item_type) {\n+\t\tcase RTE_FLOW_ITEM_TYPE_ETH:\n+\t\t\teth_spec = item->spec;\n+\t\t\teth_mask = item->mask;\n+\t\t\tif (eth_spec || eth_mask) {\n+\t\t\t\trte_flow_error_set(error, EINVAL,\n+\t\t\t\t\t\tRTE_FLOW_ERROR_TYPE_ITEM,\n+\t\t\t\t\t\titem,\n+\t\t\t\t\t\t\"eth mac not support\");\n+\t\t\t\treturn -rte_errno;\n+\t\t\t}\n+\t\t\tbreak;\n+\t\tcase RTE_FLOW_ITEM_TYPE_IPV4:\n+\t\t\tl3 = RTE_FLOW_ITEM_TYPE_IPV4;\n+\t\t\tipv4_spec = item->spec;\n+\t\t\tipv4_mask = item->mask;\n+\n+\t\t\tif (ipv4_spec && ipv4_mask) {\n+\t\t\t\t/* Check IPv4 mask and update input set */\n+\t\t\t\tif (ipv4_mask->hdr.version_ihl ||\n+\t\t\t\t    ipv4_mask->hdr.total_length ||\n+\t\t\t\t    ipv4_mask->hdr.packet_id ||\n+\t\t\t\t    ipv4_mask->hdr.fragment_offset ||\n+\t\t\t\t    ipv4_mask->hdr.hdr_checksum) {\n+\t\t\t\t\trte_flow_error_set(error, EINVAL,\n+\t\t\t\t\t\t   RTE_FLOW_ERROR_TYPE_ITEM,\n+\t\t\t\t\t\t   item,\n+\t\t\t\t\t\t   \"Invalid IPv4 mask.\");\n+\t\t\t\t\treturn -rte_errno;\n+\t\t\t\t}\n+\t\t\t\tif (ipv4_mask->hdr.src_addr == UINT32_MAX)\n+\t\t\t\t\tinput_set |= ICE_INSET_IPV4_SRC;\n+\t\t\t\tif (ipv4_mask->hdr.dst_addr == UINT32_MAX)\n+\t\t\t\t\tinput_set |= ICE_INSET_IPV4_DST;\n+\n+\t\t\t\tfilter->input.ip.v4.dst_ip =\n+\t\t\t\t\tipv4_spec->hdr.src_addr;\n+\t\t\t\tfilter->input.ip.v4.src_ip =\n+\t\t\t\t\tipv4_spec->hdr.dst_addr;\n+\t\t\t}\n+\n+\t\t\tflow_type = ICE_FLTR_PTYPE_NONF_IPV4_OTHER;\n+\n+\t\t\tbreak;\n+\t\tcase RTE_FLOW_ITEM_TYPE_IPV6:\n+\t\t\tl3 = RTE_FLOW_ITEM_TYPE_IPV6;\n+\t\t\tipv6_spec = item->spec;\n+\t\t\tipv6_mask = item->mask;\n+\n+\t\t\tif (ipv6_spec && ipv6_mask) {\n+\t\t\t\t/* Check IPv6 mask and update input set */\n+\t\t\t\tif (ipv6_mask->hdr.payload_len) {\n+\t\t\t\t\trte_flow_error_set(error, EINVAL,\n+\t\t\t\t\t\t   RTE_FLOW_ERROR_TYPE_ITEM,\n+\t\t\t\t\t\t   item,\n+\t\t\t\t\t\t   \"Invalid IPv6 mask\");\n+\t\t\t\t\treturn -rte_errno;\n+\t\t\t\t}\n+\n+\t\t\t\tif (!memcmp(ipv6_mask->hdr.src_addr,\n+\t\t\t\t\t    ipv6_addr_mask,\n+\t\t\t\t\t    RTE_DIM(ipv6_mask->hdr.src_addr)))\n+\t\t\t\t\tinput_set |= ICE_INSET_IPV6_SRC;\n+\t\t\t\tif (!memcmp(ipv6_mask->hdr.dst_addr,\n+\t\t\t\t\t    ipv6_addr_mask,\n+\t\t\t\t\t    RTE_DIM(ipv6_mask->hdr.dst_addr)))\n+\t\t\t\t\tinput_set |= ICE_INSET_IPV6_DST;\n+\n+\t\t\t\trte_memcpy(filter->input.ip.v6.dst_ip,\n+\t\t\t\t\t   ipv6_spec->hdr.src_addr, 16);\n+\t\t\t\trte_memcpy(filter->input.ip.v6.src_ip,\n+\t\t\t\t\t   ipv6_spec->hdr.dst_addr, 16);\n+\t\t\t}\n+\n+\t\t\tflow_type = ICE_FLTR_PTYPE_NONF_IPV6_OTHER;\n+\n+\t\t\tbreak;\n+\t\tcase RTE_FLOW_ITEM_TYPE_TCP:\n+\t\t\ttcp_spec = item->spec;\n+\t\t\ttcp_mask = item->mask;\n+\n+\t\t\tif (tcp_spec && tcp_mask) {\n+\t\t\t\t/* Check TCP mask and update input set */\n+\t\t\t\tif (tcp_mask->hdr.sent_seq ||\n+\t\t\t\t    tcp_mask->hdr.recv_ack ||\n+\t\t\t\t    tcp_mask->hdr.data_off ||\n+\t\t\t\t    tcp_mask->hdr.tcp_flags ||\n+\t\t\t\t    tcp_mask->hdr.rx_win ||\n+\t\t\t\t    tcp_mask->hdr.cksum ||\n+\t\t\t\t    tcp_mask->hdr.tcp_urp) {\n+\t\t\t\t\trte_flow_error_set(error, EINVAL,\n+\t\t\t\t\t\t   RTE_FLOW_ERROR_TYPE_ITEM,\n+\t\t\t\t\t\t   item,\n+\t\t\t\t\t\t   \"Invalid TCP mask\");\n+\t\t\t\t\treturn -rte_errno;\n+\t\t\t\t}\n+\n+\t\t\t\tif (tcp_mask->hdr.src_port == UINT16_MAX)\n+\t\t\t\t\tinput_set |= ICE_INSET_TCP_SRC_PORT;\n+\t\t\t\tif (tcp_mask->hdr.dst_port == UINT16_MAX)\n+\t\t\t\t\tinput_set |= ICE_INSET_TCP_DST_PORT;\n+\n+\t\t\t\t/* Get filter info */\n+\t\t\t\tif (l3 == RTE_FLOW_ITEM_TYPE_IPV4) {\n+\t\t\t\t\tfilter->input.ip.v4.dst_port =\n+\t\t\t\t\t\ttcp_spec->hdr.src_port;\n+\t\t\t\t\tfilter->input.ip.v4.src_port =\n+\t\t\t\t\t\ttcp_spec->hdr.dst_port;\n+\t\t\t\t\tflow_type =\n+\t\t\t\t\t\tICE_FLTR_PTYPE_NONF_IPV4_TCP;\n+\t\t\t\t} else if (l3 == RTE_FLOW_ITEM_TYPE_IPV6) {\n+\t\t\t\t\tfilter->input.ip.v6.dst_port =\n+\t\t\t\t\t\ttcp_spec->hdr.src_port;\n+\t\t\t\t\tfilter->input.ip.v6.src_port =\n+\t\t\t\t\t\ttcp_spec->hdr.dst_port;\n+\t\t\t\t\tflow_type =\n+\t\t\t\t\t\tICE_FLTR_PTYPE_NONF_IPV6_TCP;\n+\t\t\t\t}\n+\t\t\t}\n+\n+\t\t\tbreak;\n+\t\tcase RTE_FLOW_ITEM_TYPE_UDP:\n+\t\t\tudp_spec = item->spec;\n+\t\t\tudp_mask = item->mask;\n+\n+\t\t\tif (udp_spec && udp_mask) {\n+\t\t\t\t/* Check UDP mask and update input set*/\n+\t\t\t\tif (udp_mask->hdr.dgram_len ||\n+\t\t\t\t    udp_mask->hdr.dgram_cksum) {\n+\t\t\t\t\trte_flow_error_set(error, EINVAL,\n+\t\t\t\t\t\t   RTE_FLOW_ERROR_TYPE_ITEM,\n+\t\t\t\t\t\t   item,\n+\t\t\t\t\t\t   \"Invalid UDP mask\");\n+\t\t\t\t\treturn -rte_errno;\n+\t\t\t\t}\n+\n+\t\t\t\tif (udp_mask->hdr.src_port == UINT16_MAX)\n+\t\t\t\t\tinput_set |= ICE_INSET_UDP_SRC_PORT;\n+\t\t\t\tif (udp_mask->hdr.dst_port == UINT16_MAX)\n+\t\t\t\t\tinput_set |= ICE_INSET_UDP_DST_PORT;\n+\n+\t\t\t\t/* Get filter info */\n+\t\t\t\tif (l3 == RTE_FLOW_ITEM_TYPE_IPV4) {\n+\t\t\t\t\tfilter->input.ip.v4.dst_port =\n+\t\t\t\t\t\tudp_spec->hdr.src_port;\n+\t\t\t\t\tfilter->input.ip.v4.src_port =\n+\t\t\t\t\t\tudp_spec->hdr.dst_port;\n+\t\t\t\t\tflow_type =\n+\t\t\t\t\t\tICE_FLTR_PTYPE_NONF_IPV4_UDP;\n+\t\t\t\t} else if (l3 == RTE_FLOW_ITEM_TYPE_IPV6) {\n+\t\t\t\t\tfilter->input.ip.v6.src_port =\n+\t\t\t\t\t\tudp_spec->hdr.src_port;\n+\t\t\t\t\tfilter->input.ip.v6.dst_port =\n+\t\t\t\t\t\tudp_spec->hdr.dst_port;\n+\t\t\t\t\tflow_type =\n+\t\t\t\t\t\tICE_FLTR_PTYPE_NONF_IPV6_UDP;\n+\t\t\t\t}\n+\t\t\t}\n+\n+\t\t\tbreak;\n+\t\tcase RTE_FLOW_ITEM_TYPE_SCTP:\n+\t\t\tsctp_spec = item->spec;\n+\t\t\tsctp_mask = item->mask;\n+\n+\t\t\tif (sctp_spec && sctp_mask) {\n+\t\t\t\t/* Check SCTP mask and update input set */\n+\t\t\t\tif (sctp_mask->hdr.cksum) {\n+\t\t\t\t\trte_flow_error_set(error, EINVAL,\n+\t\t\t\t\t\t   RTE_FLOW_ERROR_TYPE_ITEM,\n+\t\t\t\t\t\t   item,\n+\t\t\t\t\t\t   \"Invalid UDP mask\");\n+\t\t\t\t\treturn -rte_errno;\n+\t\t\t\t}\n+\n+\t\t\t\tif (sctp_mask->hdr.src_port == UINT16_MAX)\n+\t\t\t\t\tinput_set |= ICE_INSET_SCTP_SRC_PORT;\n+\t\t\t\tif (sctp_mask->hdr.dst_port == UINT16_MAX)\n+\t\t\t\t\tinput_set |= ICE_INSET_SCTP_DST_PORT;\n+\n+\t\t\t\t/* Get filter info */\n+\t\t\t\tif (l3 == RTE_FLOW_ITEM_TYPE_IPV4) {\n+\t\t\t\t\tfilter->input.ip.v4.dst_port =\n+\t\t\t\t\t\tsctp_spec->hdr.src_port;\n+\t\t\t\t\tfilter->input.ip.v4.src_port =\n+\t\t\t\t\t\tsctp_spec->hdr.dst_port;\n+\t\t\t\t\tflow_type =\n+\t\t\t\t\t\tICE_FLTR_PTYPE_NONF_IPV4_SCTP;\n+\t\t\t\t} else if (l3 == RTE_FLOW_ITEM_TYPE_IPV6) {\n+\t\t\t\t\tfilter->input.ip.v6.dst_port =\n+\t\t\t\t\t\tsctp_spec->hdr.src_port;\n+\t\t\t\t\tfilter->input.ip.v6.src_port =\n+\t\t\t\t\t\tsctp_spec->hdr.dst_port;\n+\t\t\t\t\tflow_type =\n+\t\t\t\t\t\tICE_FLTR_PTYPE_NONF_IPV6_SCTP;\n+\t\t\t\t}\n+\t\t\t}\n+\n+\t\t\tbreak;\n+\t\tcase RTE_FLOW_ITEM_TYPE_VOID:\n+\t\t\tbreak;\n+\t\tdefault:\n+\t\t\trte_flow_error_set(error, EINVAL,\n+\t\t\t\t   RTE_FLOW_ERROR_TYPE_ITEM,\n+\t\t\t\t   item,\n+\t\t\t\t   \"Invalid pattern item.\");\n+\t\t\treturn -rte_errno;\n+\t\t}\n+\t}\n+\n+\tfilter->input.flow_type = flow_type;\n+\tfilter->input_set = input_set;\n+\n+\treturn 0;\n+}\n+\n+static int\n+ice_fdir_parse(struct ice_adapter *ad,\n+\t       struct ice_pattern_match_item *array,\n+\t       uint32_t array_len,\n+\t       const struct rte_flow_item pattern[],\n+\t       const struct rte_flow_action actions[],\n+\t       void **meta,\n+\t       struct rte_flow_error *error)\n+{\n+\tstruct ice_pf *pf = &ad->pf;\n+\tstruct ice_fdir_filter_conf *filter = &pf->fdir.conf;\n+\tstruct ice_pattern_match_item *item = NULL;\n+\tuint64_t input_set;\n+\tint ret;\n+\n+\tmemset(filter, 0, sizeof(*filter));\n+\titem = ice_search_pattern_match_item(pattern, array, array_len, error);\n+\tif (!item)\n+\t\treturn -rte_errno;\n+\n+\tret = ice_fdir_parse_pattern(ad, pattern, error, filter);\n+\tif (ret)\n+\t\treturn ret;\n+\tinput_set = filter->input_set;\n+\tif (!input_set || input_set & (~item->input_set_mask)) {\n+\t\trte_flow_error_set(error, EINVAL,\n+\t\t\t\t   RTE_FLOW_ERROR_TYPE_ITEM_SPEC,\n+\t\t\t\t   pattern,\n+\t\t\t\t   \"Invalid input set\");\n+\t\treturn -rte_errno;\n+\t}\n+\n+\tret = ice_fdir_parse_action(ad, actions, error, filter);\n+\tif (ret)\n+\t\treturn ret;\n+\n+\t*meta = filter;\n+\n+\treturn 0;\n+}\n+\n+static struct ice_flow_parser ice_fdir_parser = {\n+\t.engine = &ice_fdir_engine,\n+\t.array = ice_fdir_pattern,\n+\t.array_len = RTE_DIM(ice_fdir_pattern),\n+\t.parse_pattern_action = ice_fdir_parse,\n+\t.stage = ICE_FLOW_STAGE_DISTRIBUTOR,\n+};\n+\n RTE_INIT(ice_fdir_init_log)\n {\n \tice_register_flow_engine(&ice_fdir_engine);\n",
    "prefixes": [
        "04/12"
    ]
}