From patchwork Fri Oct 7 02:18:44 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Chaoyong He X-Patchwork-Id: 117527 X-Patchwork-Delegate: ferruh.yigit@amd.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 83480A0093; Fri, 7 Oct 2022 04:21:42 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id A1376427F4; Fri, 7 Oct 2022 04:19:57 +0200 (CEST) Received: from NAM11-CO1-obe.outbound.protection.outlook.com (mail-co1nam11on2094.outbound.protection.outlook.com [40.107.220.94]) by mails.dpdk.org (Postfix) with ESMTP id 6DB5742684 for ; Fri, 7 Oct 2022 04:19:55 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ASZj4R7KDq1bJGWGHB+4asp+3Y/82vGZZ9doBvsD8Zdum7YgauQVL/HY20EE90tVfU7n3d5OOdK/tZEvht801TcsqBmGetieDwmjAAdQ1qN4UnzrNT7kqSclEFiuQdLEkpVJZzUUWuy94yrP1hVZ1QwoHOCNx3OJaXzYfME36d3YlI3QhgBaRuJM+Fix193voOy4UQgjdQfPY1XcB1BMwR1nG+y1Z8bW/YNEc/9pyQ+nCvXQodgpApcRRpd5+p7vVF0LtsvxyFc6dOo9EryWw8nMHkqy/pta/DYy3xKau9SXQlMEFcABmmltODa9bCMjqeEd9lYxLZwpB13+vv/Y2w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=2A7CMtqZ9BfmnmMHSAY+FObV+rIlI1MweKoOT1ut6t4=; b=NzJzK1RUlhXD80JjxiYCF0CbYA4idV5gPwWMa4Pke2FedTIoqw5kiCtlmJ5nW5rJYCqlaJvPjcULRBIyiC0ytQHqfMrc3W/Jkm4MqxncaIigGxqQ9banFa9CC9PbD+VD6CvzMBafV9/r+x8EEvA6v/IBkiLM097i3el8UY1DoddvYdQd5Ni/vBo3+t0bcYsDCwXqASgzcpR3bH0N97Ovsm2Xj0x6r2zO+p7Hb+UHZ3D3q5ZVR5dBoxtvIm5oVXVlOz9oNUwKLO9bA0grzT289OraUoFRpz+UGQfUtrIgBqOvIMIv51Z7eeionrb7toEoATFX2qY/zbYtwQfRour7pg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=corigine.com; dmarc=pass action=none header.from=corigine.com; dkim=pass header.d=corigine.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=corigine.onmicrosoft.com; s=selector2-corigine-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2A7CMtqZ9BfmnmMHSAY+FObV+rIlI1MweKoOT1ut6t4=; b=R4tuThBg4tkXjzsLbdedtBNcgyAsQteC4Gzd0RaD/O/+CYQJ1roFDmJtU5w+x8Uv14SqQSUb6cslzw/di8pTyxHIhCXhHKU/pXM6Wjnnqj0Z/S4qiGPIErl2S5x9Voumbc2LBA54FHcxXPd2Q6ZJJLLkANEQDBb01CY8mkbaA4Y= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=corigine.com; Received: from SJ0PR13MB5545.namprd13.prod.outlook.com (2603:10b6:a03:424::5) by SA1PR13MB5465.namprd13.prod.outlook.com (2603:10b6:806:230::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5709.10; Fri, 7 Oct 2022 02:19:53 +0000 Received: from SJ0PR13MB5545.namprd13.prod.outlook.com ([fe80::a192:2720:1ef8:2773]) by SJ0PR13MB5545.namprd13.prod.outlook.com ([fe80::a192:2720:1ef8:2773%4]) with mapi id 15.20.5723.010; Fri, 7 Oct 2022 02:19:53 +0000 From: Chaoyong He To: dev@dpdk.org Cc: oss-drivers@corigine.com, niklas.soderlund@corigine.com, Chaoyong He Subject: [PATCH 22/24] net/nfp: add the offload support of set TTL action Date: Fri, 7 Oct 2022 10:18:44 +0800 Message-Id: <1665109126-16201-23-git-send-email-chaoyong.he@corigine.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1665109126-16201-1-git-send-email-chaoyong.he@corigine.com> References: <1665109126-16201-1-git-send-email-chaoyong.he@corigine.com> X-ClientProxiedBy: SG2P153CA0043.APCP153.PROD.OUTLOOK.COM (2603:1096:4:c6::12) To SJ0PR13MB5545.namprd13.prod.outlook.com (2603:10b6:a03:424::5) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ0PR13MB5545:EE_|SA1PR13MB5465:EE_ X-MS-Office365-Filtering-Correlation-Id: 79499a78-24d4-4a78-acea-08daa80a6baf X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: b9LUa0HblGjOXjFkityo+sqF5kNirjgQLVQaIZ/umkCYFHw0379IE+MLhDnp1AshG5dwVirTmLNTKgW6aBu7CFSlARBvK78z6PDT9hMru2+OKk5iE0dbBL+CxGUCUuwHsyFouLvTXW8m7hNm2Y9zwI1NYWwuNhqsjH1HWMiynqfJIOqiQ1mSOdOni0x+0mdbqNO9M0KwxzQ5QA6VIJdaAfK39BIR/EUQq4jgXd/8hCKx2sA7V6nNxilICa1CmWMTUC4PVPlqbvK3Sex/gQiNSEwD/IPXFZ1bfiutmasGloCIqx0WHZv99gWQc5iBmPcw1AGgH8kmUPEa9ZEnkvydqdCYIC6XOpboOWtzo+LAk678AsNbNxZssVB8KfK+1lOqPIlWhFk8Jj0gZarDQHycOkf1ZMAHT2ofT9wUKhc3ex6WULaqLs++LSBZq5zRzUTJyFeKq7oQRcR91+aox5cZ+QlI8meGQ6WCvCcW4TXzuEVRCQGx9iwQiiWPSbTQd1H6Y9AQRX6LQxvAKDzW26Dl9UbEKAIFFcUfFvX3WYvM66VXbuBiURQdmYN9prqXUI76+jerXk7Ydp6DUDaqDhWU6ROjduY79E3lMO0EeTu0i5F5zYQjSFJJLI4Ne5BbFdSh8q09iC3N/dy9f/sy06PQ/u9KkhGmZl3uFUaj2AkRV2ksbQ7WKj8RZXQsWbnBf6pjP/juSztt4xT1lv5v51OEB8QWyuoQU1ZvP6pFzzlabXq2Na9wKjtT7TYx78dgYwbQ X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR13MB5545.namprd13.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(39830400003)(366004)(136003)(346002)(376002)(396003)(451199015)(36756003)(86362001)(66946007)(44832011)(38350700002)(38100700002)(8936002)(6486002)(6916009)(66574015)(83380400001)(52116002)(478600001)(41300700001)(6512007)(4326008)(107886003)(26005)(2616005)(6506007)(316002)(6666004)(5660300002)(66476007)(66556008)(2906002)(186003)(8676002); DIR:OUT; SFP:1102; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?q?ui0CmNcAcdsLGy5LMmFAnj2NzGeA?= =?utf-8?q?oqKjKsrnWyWD4M7s+1QkmLjuPo0d0A/ltSVQD/Y+J40pTITueFQizLv6kdsPYizcO?= =?utf-8?q?+SYAS3tUc8y0VJYDYFqyxRNN6UwqBIV7zxiWPguzaHXo+/7R2TvxrUupXkU74z8G4?= =?utf-8?q?+9WeKm7LeT6RCVzz/3fPb8mvrv8jQ6mD252s/QoO5jY9Egl9L/UW7kK+wB2taNT13?= =?utf-8?q?qBbCBcZ165vw3k9GEAmBVNd9qpJDeAAO2BfU/zj9F+fZOuADTZ+tU/id+7ZrGxDTX?= =?utf-8?q?JaTyWB27CnWiFxQ2FZm0xv9nSkcB4B6GkJSn+HAYhjU8U0OoE3/yI5rqiEHQ9CjJG?= =?utf-8?q?FgdXTZs+U+iYs1uT9LX6VEfP8wQpYZITJIFSB+zTlrUBKm8XkzJAzFOCHRboXkGnc?= =?utf-8?q?8amr19Kb3ejQJUYsBPObodyyb4SlA1H4l86F5VWfakTIoNXKfwqUJSxX28YZJuaiw?= =?utf-8?q?QaGpgwsRwOhsh7T1+VHYtm7De/i6t937RSmfw0SoBuLfbWqKW4i04QJczjl/bC8yP?= =?utf-8?q?/hj1ooShxlRFFa0foeziHe/1cMdYjfEEFuLmZEpZkf4FK8STH4LAVlBMtm+t2Qwp0?= =?utf-8?q?idd7noWowKmUjrK2xLMPxSB67GdndfuJYLttX938hNkDWA/Oe1ltrHKKbouImGljw?= =?utf-8?q?l53h/v/c7gWNiDuDs7I78KDoN5Hwh5psF/wzu1h493Yi74/V5zLVvB9979EygiiRq?= =?utf-8?q?lWfOpNsSjNOiizszEiCXqkz13ygwFUn4DKnm83+Iegv6eOUmfAP+PfFaJTmxP8+Ql?= =?utf-8?q?Pu7lXRvbeE6Wo8EPHWnsmloajJiLFrFpNAwELfiNv/mdthRCDoMA5OsyuQZU7Lsbz?= =?utf-8?q?vCunZUuecf45i4yq2koOHRiZtoCBhTKK4L0TBp8YdyoSgaRW0l95OUWsPlZwdNGPE?= =?utf-8?q?XgIXFbvyeDaxt4FbT6ldYc9ao0hK5RSp8rn5joLYFaTLhDwyuOqbaaNym2lVfkIve?= =?utf-8?q?0yAixlSZbOI2SQUOlRHka6+zz2vXKR/cNdfslI/P2Ps8dkxpQWWFYjVcdUZkx5cfY?= =?utf-8?q?8DveUk7Eke83HT4NYO8oicZUfgYGYSX/wuuGX9+uMLjjZJVWeUDgsLEJxtVIQyrE2?= =?utf-8?q?YTT8Svg5nbnFE9HsQSXb7QS4jgq3FtqBSptoK8+av8oQhq5LI0reH8J+XmIeolhCo?= =?utf-8?q?kzawJqtDgu9CYhzkCRFBxMBaLllvP1Pas7YKBE7Cq03py4W0Jh+tGwo8Rt79/4kH/?= =?utf-8?q?6zSinh1nXaDN8D7ln9Y/yd0gV8HgaluoVYCYxRvAGv7NaQPMSZIgaOhEhD+yoc0RL?= =?utf-8?q?0WSHeBe54sRcextzOn+6JymrbmC8134FBuRlhSLHYK0v/uTfsbzmoIs9aNtSnzNh4?= =?utf-8?q?xunfJOWGwCvryahmO7xzfewc1ynonGxmCfMLg0dPoxM7dxQaVzHnzH76l5/bCsxoT?= =?utf-8?q?3QybaWiSrDjCf0hIwNiivdqVieI0XwIi84Jm4lMXgZg3Jh4Ab367HfRNBZmZ5fbfq?= =?utf-8?q?WXqM2b0olxKfWKjHRKzeG3Rc3KxZdzdatlJttPAIHKdZTpgVXgae45QfTnFQZcF5y?= =?utf-8?q?wbSY8idEPY30Jvn8DAe90Ooe9tfGkYO9NQ=3D=3D?= X-OriginatorOrg: corigine.com X-MS-Exchange-CrossTenant-Network-Message-Id: 79499a78-24d4-4a78-acea-08daa80a6baf X-MS-Exchange-CrossTenant-AuthSource: SJ0PR13MB5545.namprd13.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Oct 2022 02:19:53.7254 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: fe128f2c-073b-4c20-818e-7246a585940c X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: frgZS5kFSSfbAwi8dtKfhLQrIjPhVEyyt3+VPPGonWctX70AGXOg1vC9z6ACttOg7cbjPbuBnRP2CvbHnv343duHeRkDpDbsRpL91Kxyi4Y= X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR13MB5465 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Add the corresponding data structure and logics, to support the offload of set TTL action. Signed-off-by: Chaoyong He Reviewed-by: Niklas Söderlund --- doc/guides/nics/features/nfp.ini | 1 + doc/guides/rel_notes/release_22_11.rst | 1 + drivers/net/nfp/flower/nfp_flower_cmsg.h | 44 +++++++++++++++++ drivers/net/nfp/nfp_flow.c | 84 ++++++++++++++++++++++++++++++++ 4 files changed, 130 insertions(+) diff --git a/doc/guides/nics/features/nfp.ini b/doc/guides/nics/features/nfp.ini index c7b560b..2706fd2 100644 --- a/doc/guides/nics/features/nfp.ini +++ b/doc/guides/nics/features/nfp.ini @@ -54,3 +54,4 @@ set_mac_dst = Y set_mac_src = Y set_tp_dst = Y set_tp_src = Y +set_ttl = Y diff --git a/doc/guides/rel_notes/release_22_11.rst b/doc/guides/rel_notes/release_22_11.rst index 4206b67..35d2bbf 100644 --- a/doc/guides/rel_notes/release_22_11.rst +++ b/doc/guides/rel_notes/release_22_11.rst @@ -124,6 +124,7 @@ New Features * POP and PUSH VLAN * Set the IP address of IPv4 and IPv6 * Set the port number + * Set the TTL * **Updated NXP dpaa2 driver.** diff --git a/drivers/net/nfp/flower/nfp_flower_cmsg.h b/drivers/net/nfp/flower/nfp_flower_cmsg.h index 26de8b1..6bf8ff7 100644 --- a/drivers/net/nfp/flower/nfp_flower_cmsg.h +++ b/drivers/net/nfp/flower/nfp_flower_cmsg.h @@ -400,6 +400,25 @@ struct nfp_fl_act_set_ip4_addrs { }; /* + * IPv4 ttl tos + * 3 2 1 + * 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + * | - |opcode | |jump_id| ttl_mask | tos_mask | + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + * | ttl | tos | 0 | + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + */ +struct nfp_fl_act_set_ip4_ttl_tos { + struct nfp_fl_act_head head; + uint8_t ipv4_ttl_mask; + uint8_t ipv4_tos_mask; + uint8_t ipv4_ttl; + uint8_t ipv4_tos; + rte_be16_t reserved; +}; + +/* * IPv6 addr * 3 2 1 * 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 @@ -433,6 +452,31 @@ struct nfp_fl_act_set_ipv6_addr { }; /* + * ipv6 tc hl fl + * 3 2 1 + * 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + * | - |opcode | |jump_id| tclass_mask | hlimit_mask | + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + * | 0 | tclass | hlimit | + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + * | 0 | flabel_mask | + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + * | 0 | flabel | + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + */ +struct nfp_fl_act_set_ipv6_tc_hl_fl { + struct nfp_fl_act_head head; + uint8_t ipv6_tc_mask; + uint8_t ipv6_hop_limit_mask; + rte_be16_t reserved; + uint8_t ipv6_tc; + uint8_t ipv6_hop_limit; + rte_be32_t ipv6_label_mask; + rte_be32_t ipv6_label; +}; + +/* * TCP/UDP/SCTP * 3 2 1 * 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 diff --git a/drivers/net/nfp/nfp_flow.c b/drivers/net/nfp/nfp_flow.c index cbdd357..928f909 100644 --- a/drivers/net/nfp/nfp_flow.c +++ b/drivers/net/nfp/nfp_flow.c @@ -573,9 +573,11 @@ struct nfp_mask_id_entry { struct nfp_fl_key_ls *key_ls) { int ret = 0; + bool tc_hl_flag = false; bool mac_set_flag = false; bool ip_set_flag = false; bool tp_set_flag = false; + bool ttl_tos_flag = false; const struct rte_flow_action *action; for (action = actions; action->type != RTE_FLOW_ACTION_TYPE_END; ++action) { @@ -672,6 +674,22 @@ struct nfp_mask_id_entry { tp_set_flag = true; } break; + case RTE_FLOW_ACTION_TYPE_SET_TTL: + PMD_DRV_LOG(DEBUG, "RTE_FLOW_ACTION_TYPE_SET_TTL detected"); + if (key_ls->key_layer & NFP_FLOWER_LAYER_IPV4) { + if (!ttl_tos_flag) { + key_ls->act_size += + sizeof(struct nfp_fl_act_set_ip4_ttl_tos); + ttl_tos_flag = true; + } + } else { + if (!tc_hl_flag) { + key_ls->act_size += + sizeof(struct nfp_fl_act_set_ipv6_tc_hl_fl); + tc_hl_flag = true; + } + } + break; default: PMD_DRV_LOG(ERR, "Action type %d not supported.", action->type); return -ENOTSUP; @@ -1449,6 +1467,52 @@ struct nfp_mask_id_entry { return 0; } +static void +nfp_flow_action_set_ttl(char *act_data, + const struct rte_flow_action *action, + bool ttl_tos_flag) +{ + size_t act_size; + struct nfp_fl_act_set_ip4_ttl_tos *ttl_tos; + const struct rte_flow_action_set_ttl *ttl_conf; + + if (ttl_tos_flag) + ttl_tos = (struct nfp_fl_act_set_ip4_ttl_tos *)act_data - 1; + else + ttl_tos = (struct nfp_fl_act_set_ip4_ttl_tos *)act_data; + + act_size = sizeof(struct nfp_fl_act_set_ip4_ttl_tos); + ttl_tos->head.jump_id = NFP_FL_ACTION_OPCODE_SET_IPV4_TTL_TOS; + ttl_tos->head.len_lw = act_size >> NFP_FL_LW_SIZ; + + ttl_conf = (const struct rte_flow_action_set_ttl *)action->conf; + ttl_tos->ipv4_ttl = ttl_conf->ttl_value; + ttl_tos->reserved = 0; +} + +static void +nfp_flow_action_set_hl(char *act_data, + const struct rte_flow_action *action, + bool tc_hl_flag) +{ + size_t act_size; + struct nfp_fl_act_set_ipv6_tc_hl_fl *tc_hl; + const struct rte_flow_action_set_ttl *ttl_conf; + + if (tc_hl_flag) + tc_hl = (struct nfp_fl_act_set_ipv6_tc_hl_fl *)act_data - 1; + else + tc_hl = (struct nfp_fl_act_set_ipv6_tc_hl_fl *)act_data; + + act_size = sizeof(struct nfp_fl_act_set_ipv6_tc_hl_fl); + tc_hl->head.jump_id = NFP_FL_ACTION_OPCODE_SET_IPV6_TC_HL_FL; + tc_hl->head.len_lw = act_size >> NFP_FL_LW_SIZ; + + ttl_conf = (const struct rte_flow_action_set_ttl *)action->conf; + tc_hl->ipv6_hop_limit = ttl_conf->ttl_value; + tc_hl->reserved = 0; +} + static int nfp_flow_compile_action(__rte_unused struct nfp_flower_representor *representor, const struct rte_flow_action actions[], @@ -1457,17 +1521,21 @@ struct nfp_mask_id_entry { int ret = 0; char *position; char *action_data; + bool ttl_tos_flag = false; + bool tc_hl_flag = false; bool drop_flag = false; bool ip_set_flag = false; bool tp_set_flag = false; bool mac_set_flag = false; uint32_t total_actions = 0; const struct rte_flow_action *action; + struct nfp_flower_meta_tci *meta_tci; struct nfp_fl_rule_metadata *nfp_flow_meta; nfp_flow_meta = nfp_flow->payload.meta; action_data = nfp_flow->payload.action_data; position = action_data; + meta_tci = (struct nfp_flower_meta_tci *)nfp_flow->payload.unmasked_data; for (action = actions; action->type != RTE_FLOW_ACTION_TYPE_END; ++action) { switch (action->type) { @@ -1577,6 +1645,22 @@ struct nfp_mask_id_entry { tp_set_flag = true; } break; + case RTE_FLOW_ACTION_TYPE_SET_TTL: + PMD_DRV_LOG(DEBUG, "Process RTE_FLOW_ACTION_TYPE_SET_TTL"); + if (meta_tci->nfp_flow_key_layer & NFP_FLOWER_LAYER_IPV4) { + nfp_flow_action_set_ttl(position, action, ttl_tos_flag); + if (!ttl_tos_flag) { + position += sizeof(struct nfp_fl_act_set_ip4_ttl_tos); + ttl_tos_flag = true; + } + } else { + nfp_flow_action_set_hl(position, action, ttl_tos_flag); + if (!tc_hl_flag) { + position += sizeof(struct nfp_fl_act_set_ipv6_tc_hl_fl); + tc_hl_flag = true; + } + } + break; default: PMD_DRV_LOG(ERR, "Unsupported action type: %d", action->type); return -ENOTSUP;