From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 8A488A0544; Mon, 10 Oct 2022 08:11:55 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id A484642B76; Mon, 10 Oct 2022 08:10:07 +0200 (CEST) Received: from NAM10-MW2-obe.outbound.protection.outlook.com (mail-mw2nam10on2118.outbound.protection.outlook.com [40.107.94.118]) by mails.dpdk.org (Postfix) with ESMTP id 5E59F42BD5 for ; Mon, 10 Oct 2022 08:10:05 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=V+6EB6FxycKAOM8UsqSDefCFbaDd9c6mklbzIfpSIiP9PHG4HcVktL5aOoBizdVauqU/VZV5tjyA6KgdEocUem+78bujSPJmWdtWfNxnbqOsDVvBbnDYN/eBf/BmkbcOYrcbXiAeGJveFdDt2ppxhEiu+cjN1+UpB9swO65Pl64lkGqR1U9JfgZE0EsUKIWMOZWHzSRQ9x20xn66EkX4FNb5oebWJCPt0lshDfgB/gC8c3/KvAYss/ejBIx15TONXKRxv+8zrW6kIlai+0G8Rcgk96/h/R1W6r1jEu/rFnp6VfaBIZjqU4saCw9ps/7SBqT7/LClmo4GsdIM0rUOQQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=sPKuaa75krBv60w0f4MZ4drzdKfSLIs3v9BjzLMnIrA=; b=Z+cchxkqHP6JlvRn9pqsfrGrCm4R2vwdT9BMsXU90MvvIgl3TZKtYnAEsYR4kHM/4Ow9TAv86DpKxyLwVPN22fgyh1J0KQWO9t65r52sypQlRzse5nYXjXRDjtJkoUjlQAzFxN+M4txhAiouvia8ym7b5u5i2g1sqXW63eHnqUjHBK0ZhpEeMiX1/C0MVTH8kTN334HaNI+NIowBHNfnXBvnBRPftAZE5Leti3112PuG/0TN5spCTgH7ptXyKLarbJk6TcMIVkwiBhep+BrgcQPa3ETQ3WXL3TGGZX5u5d/8lGD2doNxmAhAW2wJRVql/1Moi13+IpPE7kFNHhUQPQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=corigine.com; dmarc=pass action=none header.from=corigine.com; dkim=pass header.d=corigine.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=corigine.onmicrosoft.com; s=selector2-corigine-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=sPKuaa75krBv60w0f4MZ4drzdKfSLIs3v9BjzLMnIrA=; b=wSojWG6rcQwcMn3LYypwVfHyHdPX4mZFXFbqp7AMfgNbZteL2SlZDRy7b44Lgr18D/2WNPnANuXszWRWd9VY+nc77aVW5evFrjgOGwJQQgKTav/fquiMZsX+5TvHFmEvAFpvOaQJoxB0xENOxxLiXh5kSyjilO/vr1oQcvE+3eE= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=corigine.com; Received: from SJ0PR13MB5545.namprd13.prod.outlook.com (2603:10b6:a03:424::5) by CH2PR13MB3877.namprd13.prod.outlook.com (2603:10b6:610:91::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5723.14; Mon, 10 Oct 2022 06:10:03 +0000 Received: from SJ0PR13MB5545.namprd13.prod.outlook.com ([fe80::7c26:1a0b:2825:6f4b]) by SJ0PR13MB5545.namprd13.prod.outlook.com ([fe80::7c26:1a0b:2825:6f4b%4]) with mapi id 15.20.5723.014; Mon, 10 Oct 2022 06:10:03 +0000 From: Chaoyong He To: dev@dpdk.org Cc: oss-drivers@corigine.com, niklas.soderlund@corigine.com, Chaoyong He Subject: [PATCH v2 22/24] net/nfp: add the offload support of set TTL action Date: Mon, 10 Oct 2022 14:09:00 +0800 Message-Id: <1665382142-21684-23-git-send-email-chaoyong.he@corigine.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1665382142-21684-1-git-send-email-chaoyong.he@corigine.com> References: <1665382142-21684-1-git-send-email-chaoyong.he@corigine.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-ClientProxiedBy: SI2PR01CA0051.apcprd01.prod.exchangelabs.com (2603:1096:4:193::6) To SJ0PR13MB5545.namprd13.prod.outlook.com (2603:10b6:a03:424::5) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ0PR13MB5545:EE_|CH2PR13MB3877:EE_ X-MS-Office365-Filtering-Correlation-Id: 5ba8169b-44dc-4f58-79e5-08daaa861258 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR13MB5545.namprd13.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(136003)(376002)(366004)(39830400003)(346002)(396003)(451199015)(36756003)(4326008)(2906002)(8936002)(44832011)(5660300002)(41300700001)(83380400001)(66574015)(52116002)(2616005)(107886003)(26005)(6512007)(86362001)(8676002)(66476007)(66556008)(6486002)(478600001)(6916009)(66946007)(316002)(6506007)(38350700002)(186003)(38100700002); DIR:OUT; SFP:1102; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?L3lxL2NXK0trK1ZqOUdzSjdtbVljRjRuenNzditDK2R5aHlEeEhYRUFXdGxk?= =?utf-8?B?QlRlUmJjYk16SW1lTlhpQTlyK0FaYnpwb2dvbVlxMmdtdzlCRUw0RVNvUE1J?= =?utf-8?B?Y2RvYk9DdENkcFl1ZDg1K2VCa3FNbHlDRENKVUlWaTUyT3hXVi9QQzhuNzIy?= =?utf-8?B?b1BkUk1XMTFDQ05NTURBNXdxOUhzTGxKL0dheERuSkhibjc3UlBFZmVtb0VK?= =?utf-8?B?VW9SUEJnQmozVk9YcFV0WUxGNTZZZnoyME1JU2QvOXp5SXpGclNaWVFZekor?= =?utf-8?B?OTlyRnNNQU9MTFdPNk83cEJrdE9qRnR0TCt4TDNxZUEvUFFRS0FqZVYrSnBH?= =?utf-8?B?WDJhUUtLcXJGYmFBelNrVjg4N215bEJYczU1NCs0ckZIQUNIbVVQQnBIQUV3?= =?utf-8?B?eVVpSUdCVVBoWWVramhobHVNY1JiNHZaaFVweEJsdXJQU3VjS1F6RTM4d1RT?= =?utf-8?B?K3p4dkRWdlMrT2RtMWg4K2NSODBNaTU4WStxYThyYzZJckF4UmViZklFa0Qw?= =?utf-8?B?RFBwdEJrK3FkVWZuemlzYUZLeUlac0xZTDFXYXBsTGNORUNnUzBiREdBaVYz?= =?utf-8?B?WDVpdmxlQzVJTWlhQmpMRHRKSEdYTm5STVAxZjlHYVRrTWxNaWc2MGJ3YkNC?= =?utf-8?B?UnZuVVloaCt3TFhtZnI4ZkZwYjh4cVVsMnpvRmNONWhEaTIyZEthTUcrSFVW?= =?utf-8?B?TXkxa1RabjAwVkN1UFVoSnJFWDNOR1RscFlUZEh5Q0FMTjI4OE9IbU9ibExm?= =?utf-8?B?ZU1HSnA1Z2YyNnBpdFNXaElpUjFTNjBGWklGeFZZTkowQzNKUklyVndWaWNM?= =?utf-8?B?R1VpSlU1d2V2eVNOamRSMUs2L1BLZlNKUjJCb2dzQ2YwZGc1cjJhcVBQOEkz?= =?utf-8?B?amNMSXVQajhGTkJBZHhpdlVvUWVyRjNNQThTYmJ3ajJkWkRHTi9hZko5T1lR?= =?utf-8?B?RE5BSlpYY2ZQNGhvTk05VUEvTExJVVNxSHppa05COVBkSG5wQXVpenI4SFoz?= =?utf-8?B?RDk1VDBZYkNFWU1MRmZUVFRBM2djOUZEOWJIZEF6cGlpcThCVDRvWEpnRUdI?= =?utf-8?B?b0RFcTdwV1ZjbE1GRGdpRlpwWkJJRHgwNGsvMGVyc3RRaDZidFJUV0tCRXlw?= =?utf-8?B?dlZpZFZxV3VDVXdHVU9PMVRyQUYvcFBaU2UxSlBpWTN1TEw3ZmJubHg0Sm9R?= =?utf-8?B?QlVjcnBJYnNrc1VZeDZkUFpNRms4TUJQY1dhYTZ0V1QybGtiK3lOaDdUNEdS?= =?utf-8?B?OEsvS3VhdGpJU29pOHd0cHdnRCtQZ0tjUXRUa3lnNFlURlc4Q2g0RVpCTEZn?= =?utf-8?B?WG40UXIxR1FmTkJ1bS9zNlBKOU80MGloc05ob0toM2RZM1BFYkdJREdkL0F6?= =?utf-8?B?TGExckJ1ZC9sTXloRTh1aVlZZXNwcWwwdTlrOEJYSlNpZURnbmo2clFIYUtk?= =?utf-8?B?eFFmMDk5Z0ppT05XTUNnQ0hDZUdJQWhsU0p6ZEwwb3JCQnlKR0Rkc2dkZWgy?= =?utf-8?B?eUUyWDRNQ3dHaFhPRXcwQkVDYjVFM2RWVTZNVGpnZ2Y1UXZQNU1zQWRmMzVr?= =?utf-8?B?VmxuQTRIS292SEwvRTZHQzIyeGdERFV3aTA0N2Z6Z1ZLcDh4STRqRnBiS3RS?= =?utf-8?B?d0RIM3VNWnJUNmVuakVLNnFXS1BBSmR2OUpIZGs1V1A1bUtDRVZ6YjJyd3Ry?= =?utf-8?B?QUd3N1VWQ1M0Q1gwelFveGx5OXdtUjg0MVpsTnRhQlpIN28ybG1QZEFhSkNV?= =?utf-8?B?bzltelFYQXUwakdpOEdJdEpidDlmY0VrQmVYOXRSQ3RJbHZwUFdmUHA3amly?= =?utf-8?B?M1FmOTVPbCt2WVEza1Z0eE1lQWQ5RHVEV3YrNm9FMGFBRnFTQnpoL00zcjBV?= =?utf-8?B?ajFzYTIwL3NkQld1TFNPcVpjdFhFeE41N1ViUU9CdGFZK0dqRHVWNDFaT1dr?= =?utf-8?B?Y1M4VXc3a1dJTXVrM2t6ZExhclNxaHg3dDBXb1V4TWZSSWdESjVGRWcrdGtX?= =?utf-8?B?VlpGVHBoZVVyQTZ6cThLTXFVMEw4V04yalJGUDBJNmlqNmlBbFo5d1h5UlZK?= =?utf-8?B?Ky9RRUpiek1HV3lpd2dHQ0ljdFNRd2FiMmh6RGpPSkxYYlJWQjNPZ0RTSDVk?= =?utf-8?B?b2luVHlORW1kU2NsdW8veEdvZm1Vbm9Yb3NPSVZjb241dHIrQXNzaGRVRzF0?= =?utf-8?B?aVE9PQ==?= X-OriginatorOrg: corigine.com X-MS-Exchange-CrossTenant-Network-Message-Id: 5ba8169b-44dc-4f58-79e5-08daaa861258 X-MS-Exchange-CrossTenant-AuthSource: SJ0PR13MB5545.namprd13.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Oct 2022 06:10:03.7880 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: fe128f2c-073b-4c20-818e-7246a585940c X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: rKNciqFQrb0MOJ1lxm5ObUluNyBAR34KFAmHdrBEPj+DVRzEv+sJbh9PxHQjNR6LJt+t8MeMeOhwZ0S+HoyjUmOg4uBSFNm0PxdNVWOE3eE= X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH2PR13MB3877 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Add the corresponding data structure and logics, to support the offload of set TTL action. Signed-off-by: Chaoyong He Reviewed-by: Niklas Söderlund --- doc/guides/nics/features/nfp.ini | 1 + doc/guides/rel_notes/release_22_11.rst | 1 + drivers/net/nfp/flower/nfp_flower_cmsg.h | 44 +++++++++++++++++ drivers/net/nfp/nfp_flow.c | 84 ++++++++++++++++++++++++++++++++ 4 files changed, 130 insertions(+) diff --git a/doc/guides/nics/features/nfp.ini b/doc/guides/nics/features/nfp.ini index c7b560b..2706fd2 100644 --- a/doc/guides/nics/features/nfp.ini +++ b/doc/guides/nics/features/nfp.ini @@ -54,3 +54,4 @@ set_mac_dst = Y set_mac_src = Y set_tp_dst = Y set_tp_src = Y +set_ttl = Y diff --git a/doc/guides/rel_notes/release_22_11.rst b/doc/guides/rel_notes/release_22_11.rst index f0416e5..121094e 100644 --- a/doc/guides/rel_notes/release_22_11.rst +++ b/doc/guides/rel_notes/release_22_11.rst @@ -170,6 +170,7 @@ New Features * POP and PUSH VLAN * Set the IP address of IPv4 and IPv6 * Set the port number + * Set the TTL * **Updated NXP dpaa2 driver.** diff --git a/drivers/net/nfp/flower/nfp_flower_cmsg.h b/drivers/net/nfp/flower/nfp_flower_cmsg.h index 26de8b1..6bf8ff7 100644 --- a/drivers/net/nfp/flower/nfp_flower_cmsg.h +++ b/drivers/net/nfp/flower/nfp_flower_cmsg.h @@ -400,6 +400,25 @@ struct nfp_fl_act_set_ip4_addrs { }; /* + * IPv4 ttl tos + * 3 2 1 + * 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + * | - |opcode | |jump_id| ttl_mask | tos_mask | + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + * | ttl | tos | 0 | + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + */ +struct nfp_fl_act_set_ip4_ttl_tos { + struct nfp_fl_act_head head; + uint8_t ipv4_ttl_mask; + uint8_t ipv4_tos_mask; + uint8_t ipv4_ttl; + uint8_t ipv4_tos; + rte_be16_t reserved; +}; + +/* * IPv6 addr * 3 2 1 * 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 @@ -433,6 +452,31 @@ struct nfp_fl_act_set_ipv6_addr { }; /* + * ipv6 tc hl fl + * 3 2 1 + * 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + * | - |opcode | |jump_id| tclass_mask | hlimit_mask | + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + * | 0 | tclass | hlimit | + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + * | 0 | flabel_mask | + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + * | 0 | flabel | + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + */ +struct nfp_fl_act_set_ipv6_tc_hl_fl { + struct nfp_fl_act_head head; + uint8_t ipv6_tc_mask; + uint8_t ipv6_hop_limit_mask; + rte_be16_t reserved; + uint8_t ipv6_tc; + uint8_t ipv6_hop_limit; + rte_be32_t ipv6_label_mask; + rte_be32_t ipv6_label; +}; + +/* * TCP/UDP/SCTP * 3 2 1 * 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 diff --git a/drivers/net/nfp/nfp_flow.c b/drivers/net/nfp/nfp_flow.c index cbdd357..928f909 100644 --- a/drivers/net/nfp/nfp_flow.c +++ b/drivers/net/nfp/nfp_flow.c @@ -573,9 +573,11 @@ struct nfp_mask_id_entry { struct nfp_fl_key_ls *key_ls) { int ret = 0; + bool tc_hl_flag = false; bool mac_set_flag = false; bool ip_set_flag = false; bool tp_set_flag = false; + bool ttl_tos_flag = false; const struct rte_flow_action *action; for (action = actions; action->type != RTE_FLOW_ACTION_TYPE_END; ++action) { @@ -672,6 +674,22 @@ struct nfp_mask_id_entry { tp_set_flag = true; } break; + case RTE_FLOW_ACTION_TYPE_SET_TTL: + PMD_DRV_LOG(DEBUG, "RTE_FLOW_ACTION_TYPE_SET_TTL detected"); + if (key_ls->key_layer & NFP_FLOWER_LAYER_IPV4) { + if (!ttl_tos_flag) { + key_ls->act_size += + sizeof(struct nfp_fl_act_set_ip4_ttl_tos); + ttl_tos_flag = true; + } + } else { + if (!tc_hl_flag) { + key_ls->act_size += + sizeof(struct nfp_fl_act_set_ipv6_tc_hl_fl); + tc_hl_flag = true; + } + } + break; default: PMD_DRV_LOG(ERR, "Action type %d not supported.", action->type); return -ENOTSUP; @@ -1449,6 +1467,52 @@ struct nfp_mask_id_entry { return 0; } +static void +nfp_flow_action_set_ttl(char *act_data, + const struct rte_flow_action *action, + bool ttl_tos_flag) +{ + size_t act_size; + struct nfp_fl_act_set_ip4_ttl_tos *ttl_tos; + const struct rte_flow_action_set_ttl *ttl_conf; + + if (ttl_tos_flag) + ttl_tos = (struct nfp_fl_act_set_ip4_ttl_tos *)act_data - 1; + else + ttl_tos = (struct nfp_fl_act_set_ip4_ttl_tos *)act_data; + + act_size = sizeof(struct nfp_fl_act_set_ip4_ttl_tos); + ttl_tos->head.jump_id = NFP_FL_ACTION_OPCODE_SET_IPV4_TTL_TOS; + ttl_tos->head.len_lw = act_size >> NFP_FL_LW_SIZ; + + ttl_conf = (const struct rte_flow_action_set_ttl *)action->conf; + ttl_tos->ipv4_ttl = ttl_conf->ttl_value; + ttl_tos->reserved = 0; +} + +static void +nfp_flow_action_set_hl(char *act_data, + const struct rte_flow_action *action, + bool tc_hl_flag) +{ + size_t act_size; + struct nfp_fl_act_set_ipv6_tc_hl_fl *tc_hl; + const struct rte_flow_action_set_ttl *ttl_conf; + + if (tc_hl_flag) + tc_hl = (struct nfp_fl_act_set_ipv6_tc_hl_fl *)act_data - 1; + else + tc_hl = (struct nfp_fl_act_set_ipv6_tc_hl_fl *)act_data; + + act_size = sizeof(struct nfp_fl_act_set_ipv6_tc_hl_fl); + tc_hl->head.jump_id = NFP_FL_ACTION_OPCODE_SET_IPV6_TC_HL_FL; + tc_hl->head.len_lw = act_size >> NFP_FL_LW_SIZ; + + ttl_conf = (const struct rte_flow_action_set_ttl *)action->conf; + tc_hl->ipv6_hop_limit = ttl_conf->ttl_value; + tc_hl->reserved = 0; +} + static int nfp_flow_compile_action(__rte_unused struct nfp_flower_representor *representor, const struct rte_flow_action actions[], @@ -1457,17 +1521,21 @@ struct nfp_mask_id_entry { int ret = 0; char *position; char *action_data; + bool ttl_tos_flag = false; + bool tc_hl_flag = false; bool drop_flag = false; bool ip_set_flag = false; bool tp_set_flag = false; bool mac_set_flag = false; uint32_t total_actions = 0; const struct rte_flow_action *action; + struct nfp_flower_meta_tci *meta_tci; struct nfp_fl_rule_metadata *nfp_flow_meta; nfp_flow_meta = nfp_flow->payload.meta; action_data = nfp_flow->payload.action_data; position = action_data; + meta_tci = (struct nfp_flower_meta_tci *)nfp_flow->payload.unmasked_data; for (action = actions; action->type != RTE_FLOW_ACTION_TYPE_END; ++action) { switch (action->type) { @@ -1577,6 +1645,22 @@ struct nfp_mask_id_entry { tp_set_flag = true; } break; + case RTE_FLOW_ACTION_TYPE_SET_TTL: + PMD_DRV_LOG(DEBUG, "Process RTE_FLOW_ACTION_TYPE_SET_TTL"); + if (meta_tci->nfp_flow_key_layer & NFP_FLOWER_LAYER_IPV4) { + nfp_flow_action_set_ttl(position, action, ttl_tos_flag); + if (!ttl_tos_flag) { + position += sizeof(struct nfp_fl_act_set_ip4_ttl_tos); + ttl_tos_flag = true; + } + } else { + nfp_flow_action_set_hl(position, action, ttl_tos_flag); + if (!tc_hl_flag) { + position += sizeof(struct nfp_fl_act_set_ipv6_tc_hl_fl); + tc_hl_flag = true; + } + } + break; default: PMD_DRV_LOG(ERR, "Unsupported action type: %d", action->type); return -ENOTSUP; -- 1.8.3.1