diff options
| author | Dmitry Torokhov <[email protected]> | 2023-05-01 15:20:08 -0700 | 
|---|---|---|
| committer | Dmitry Torokhov <[email protected]> | 2023-05-01 15:20:08 -0700 | 
| commit | 9a87ffc99ec8eb8d35eed7c4f816d75f5cc9662e (patch) | |
| tree | d57f3a63479a07b4e0cece029886e76e04feb984 /drivers/net/ethernet/microchip/vcap/vcap_ag_api.h | |
| parent | 5dc63e56a9cf8df0b59c234a505a1653f1bdf885 (diff) | |
| parent | 53bea86b5712c7491bb3dae12e271666df0a308c (diff) | |
Merge branch 'next' into for-linus
Prepare input updates for 6.4 merge window.
Diffstat (limited to 'drivers/net/ethernet/microchip/vcap/vcap_ag_api.h')
| -rw-r--r-- | drivers/net/ethernet/microchip/vcap/vcap_ag_api.h | 499 | 
1 files changed, 279 insertions, 220 deletions
diff --git a/drivers/net/ethernet/microchip/vcap/vcap_ag_api.h b/drivers/net/ethernet/microchip/vcap/vcap_ag_api.h index 84de2aee4169..0844fcaeee68 100644 --- a/drivers/net/ethernet/microchip/vcap/vcap_ag_api.h +++ b/drivers/net/ethernet/microchip/vcap/vcap_ag_api.h @@ -1,16 +1,17 @@  /* SPDX-License-Identifier: BSD-3-Clause */ -/* Copyright (C) 2022 Microchip Technology Inc. and its subsidiaries. +/* Copyright (C) 2023 Microchip Technology Inc. and its subsidiaries.   * Microchip VCAP API   */ -/* This file is autogenerated by cml-utils 2022-10-13 10:04:41 +0200. - * Commit ID: fd7cafd175899f0672c73afb3a30fc872500ae86 +/* This file is autogenerated by cml-utils 2023-02-10 11:15:56 +0100. + * Commit ID: c30fb4bf0281cd4a7133bdab6682f9e43c872ada   */  #ifndef __VCAP_AG_API__  #define __VCAP_AG_API__  enum vcap_type { +	VCAP_TYPE_ES0,  	VCAP_TYPE_ES2,  	VCAP_TYPE_IS0,  	VCAP_TYPE_IS2, @@ -20,27 +21,25 @@ enum vcap_type {  /* Keyfieldset names with origin information */  enum vcap_keyfield_set {  	VCAP_KFS_NO_VALUE,          /* initial value */ -	VCAP_KFS_ARP,               /* sparx5 is2 X6, sparx5 es2 X6 */ +	VCAP_KFS_ARP,               /* sparx5 is2 X6, sparx5 es2 X6, lan966x is2 X2 */  	VCAP_KFS_ETAG,              /* sparx5 is0 X2 */ -	VCAP_KFS_IP4_OTHER,         /* sparx5 is2 X6, sparx5 es2 X6 */ -	VCAP_KFS_IP4_TCP_UDP,       /* sparx5 is2 X6, sparx5 es2 X6 */ +	VCAP_KFS_IP4_OTHER,         /* sparx5 is2 X6, sparx5 es2 X6, lan966x is2 X2 */ +	VCAP_KFS_IP4_TCP_UDP,       /* sparx5 is2 X6, sparx5 es2 X6, lan966x is2 X2 */  	VCAP_KFS_IP4_VID,           /* sparx5 es2 X3 */ -	VCAP_KFS_IP6_STD,           /* sparx5 is2 X6 */ -	VCAP_KFS_IP6_VID,           /* sparx5 is2 X6, sparx5 es2 X6 */ +	VCAP_KFS_IP6_OTHER,         /* lan966x is2 X4 */ +	VCAP_KFS_IP6_STD,           /* sparx5 is2 X6, sparx5 es2 X6, lan966x is2 X2 */ +	VCAP_KFS_IP6_TCP_UDP,       /* lan966x is2 X4 */ +	VCAP_KFS_IP6_VID,           /* sparx5 es2 X6 */  	VCAP_KFS_IP_7TUPLE,         /* sparx5 is2 X12, sparx5 es2 X12 */ +	VCAP_KFS_ISDX,              /* sparx5 es0 X1 */  	VCAP_KFS_LL_FULL,           /* sparx5 is0 X6 */ -	VCAP_KFS_MAC_ETYPE,         /* sparx5 is2 X6, sparx5 es2 X6 */ -	VCAP_KFS_MLL,               /* sparx5 is0 X3 */ -	VCAP_KFS_NORMAL,            /* sparx5 is0 X6 */ -	VCAP_KFS_NORMAL_5TUPLE_IP4,  /* sparx5 is0 X6 */ -	VCAP_KFS_NORMAL_7TUPLE,     /* sparx5 is0 X12 */ -	VCAP_KFS_PURE_5TUPLE_IP4,   /* sparx5 is0 X3 */ -	VCAP_KFS_TRI_VID,           /* sparx5 is0 X2 */ +	VCAP_KFS_MAC_ETYPE,         /* sparx5 is2 X6, sparx5 es2 X6, lan966x is2 X2 */  	VCAP_KFS_MAC_LLC,           /* lan966x is2 X2 */  	VCAP_KFS_MAC_SNAP,          /* lan966x is2 X2 */ +	VCAP_KFS_NORMAL_5TUPLE_IP4,  /* sparx5 is0 X6 */ +	VCAP_KFS_NORMAL_7TUPLE,     /* sparx5 is0 X12 */  	VCAP_KFS_OAM,               /* lan966x is2 X2 */ -	VCAP_KFS_IP6_TCP_UDP,       /* lan966x is2 X4 */ -	VCAP_KFS_IP6_OTHER,         /* lan966x is2 X4 */ +	VCAP_KFS_PURE_5TUPLE_IP4,   /* sparx5 is0 X3 */  	VCAP_KFS_SMAC_SIP4,         /* lan966x is2 X1 */  	VCAP_KFS_SMAC_SIP6,         /* lan966x is2 X2 */  }; @@ -78,6 +77,8 @@ enum vcap_keyfield_set {   *   Third PCP in multiple vlan tags (not always available)   * VCAP_KF_8021Q_PCP_CLS: W3, sparx5: is2/es2, lan966x: is2   *   Classified PCP + * VCAP_KF_8021Q_TPID: W3, sparx5: es0 + *   TPID for outer tag: 0: Customer TPID 1: Service TPID (88A8 or programmable)   * VCAP_KF_8021Q_TPID0: W3, sparx5: is0   *   First TPIC in multiple vlan tags (outer tag or default port tag)   * VCAP_KF_8021Q_TPID1: W3, sparx5: is0 @@ -90,7 +91,8 @@ enum vcap_keyfield_set {   *   Second VID in multiple vlan tags (inner tag)   * VCAP_KF_8021Q_VID2: W12, sparx5: is0   *   Third VID in multiple vlan tags (not always available) - * VCAP_KF_8021Q_VID_CLS: W13, sparx5: is2/es2, lan966x is2 W12 + * VCAP_KF_8021Q_VID_CLS: sparx5 is2 W13, sparx5 es0 W13, sparx5 es2 W13, + *   lan966x is2 W12   *   Classified VID   * VCAP_KF_8021Q_VLAN_TAGGED_IS: W1, sparx5: is2/es2, lan966x: is2   *   Sparx5: Set if frame was received with a VLAN tag, LAN966x: Set if frame has @@ -104,7 +106,7 @@ enum vcap_keyfield_set {   *   Set if hardware address is Ethernet   * VCAP_KF_ARP_LEN_OK_IS: W1, sparx5: is2/es2, lan966x: is2   *   Set if hardware address length = 6 (Ethernet) and IP address length = 4 (IP). - * VCAP_KF_ARP_OPCODE: W2, sparx5: is2/es2, lan966x: i2 + * VCAP_KF_ARP_OPCODE: W2, sparx5: is2/es2, lan966x: is2   *   ARP opcode   * VCAP_KF_ARP_OPCODE_UNKNOWN_IS: W1, sparx5: is2/es2, lan966x: is2   *   Set if not one of the codes defined in VCAP_KF_ARP_OPCODE @@ -114,25 +116,25 @@ enum vcap_keyfield_set {   *   Sender Hardware Address = SMAC (ARP)   * VCAP_KF_ARP_TGT_MATCH_IS: W1, sparx5: is2/es2, lan966x: is2   *   Target Hardware Address = SMAC (RARP) - * VCAP_KF_COSID_CLS: W3, sparx5: es2 + * VCAP_KF_COSID_CLS: W3, sparx5: es0/es2   *   Class of service - * VCAP_KF_DST_ENTRY: W1, sparx5: is0 - *   Selects whether the frame’s destination or source information is used for - *   fields L2_SMAC and L3_IP4_SIP   * VCAP_KF_ES0_ISDX_KEY_ENA: W1, sparx5: es2   *   The value taken from the IFH .FWD.ES0_ISDX_KEY_ENA   * VCAP_KF_ETYPE: W16, sparx5: is0/is2/es2, lan966x: is2   *   Ethernet type   * VCAP_KF_ETYPE_LEN_IS: W1, sparx5: is0/is2/es2   *   Set if frame has EtherType >= 0x600 - * VCAP_KF_ETYPE_MPLS: W2, sparx5: is0 - *   Type of MPLS Ethertype (or not) + * VCAP_KF_HOST_MATCH: W1, lan966x: is2 + *   The action from the SMAC_SIP4 or SMAC_SIP6 lookups. Used for IP source + *   guarding.   * VCAP_KF_IF_EGR_PORT_MASK: W32, sparx5: es2   *   Egress port mask, one bit per port   * VCAP_KF_IF_EGR_PORT_MASK_RNG: W3, sparx5: es2   *   Select which 32 port group is available in IF_EGR_PORT (or virtual ports or   *   CPU queue) - * VCAP_KF_IF_IGR_PORT: sparx5 is0 W7, sparx5 es2 W9 + * VCAP_KF_IF_EGR_PORT_NO: W7, sparx5: es0 + *   Egress port number + * VCAP_KF_IF_IGR_PORT: sparx5 is0 W7, sparx5 es2 W9, lan966x is2 W4   *   Sparx5: Logical ingress port number retrieved from   *   ANA_CL::PORT_ID_CFG.LPORT_NUM or ERLEG, LAN966x: ingress port nunmber   * VCAP_KF_IF_IGR_PORT_MASK: sparx5 is0 W65, sparx5 is2 W32, sparx5 is2 W65, @@ -152,45 +154,61 @@ enum vcap_keyfield_set {   * VCAP_KF_IP4_IS: W1, sparx5: is0/is2/es2, lan966x: is2   *   Set if frame has EtherType = 0x800 and IP version = 4   * VCAP_KF_IP_MC_IS: W1, sparx5: is0 - *   Set if frame is IPv4 frame and frame’s destination MAC address is an IPv4 - *   multicast address (0x01005E0 /25). Set if frame is IPv6 frame and frame’s + *   Set if frame is IPv4 frame and frame's destination MAC address is an IPv4 + *   multicast address (0x01005E0 /25). Set if frame is IPv6 frame and frame's   *   destination MAC address is an IPv6 multicast address (0x3333/16).   * VCAP_KF_IP_PAYLOAD_5TUPLE: W32, sparx5: is0   *   Payload bytes after IP header   * VCAP_KF_IP_SNAP_IS: W1, sparx5: is0   *   Set if frame is IPv4, IPv6, or SNAP frame - * VCAP_KF_ISDX_CLS: W12, sparx5: is2/es2 + * VCAP_KF_ISDX_CLS: W12, sparx5: is2/es0/es2   *   Classified ISDX - * VCAP_KF_ISDX_GT0_IS: W1, sparx5: is2/es2, lan966x: is2 + * VCAP_KF_ISDX_GT0_IS: W1, sparx5: is2/es0/es2, lan966x: is2   *   Set if classified ISDX > 0   * VCAP_KF_L2_BC_IS: W1, sparx5: is0/is2/es2, lan966x: is2 - *   Set if frame’s destination MAC address is the broadcast address + *   Set if frame's destination MAC address is the broadcast address   *   (FF-FF-FF-FF-FF-FF).   * VCAP_KF_L2_DMAC: W48, sparx5: is0/is2/es2, lan966x: is2   *   Destination MAC address + * VCAP_KF_L2_FRM_TYPE: W4, lan966x: is2 + *   Frame subtype for specific EtherTypes (MRP, DLR)   * VCAP_KF_L2_FWD_IS: W1, sparx5: is2   *   Set if the frame is allowed to be forwarded to front ports - * VCAP_KF_L2_MC_IS: W1, sparx5: is0/is2/es2, lan9966x is2 - *   Set if frame’s destination MAC address is a multicast address (bit 40 = 1). + * VCAP_KF_L2_LLC: W40, lan966x: is2 + *   LLC header and data after up to two VLAN tags and the type/length field + * VCAP_KF_L2_MC_IS: W1, sparx5: is0/is2/es2, lan966x: is2 + *   Set if frame's destination MAC address is a multicast address (bit 40 = 1). + * VCAP_KF_L2_PAYLOAD0: W16, lan966x: is2 + *   Payload bytes 0-1 after the frame's EtherType + * VCAP_KF_L2_PAYLOAD1: W8, lan966x: is2 + *   Payload byte 4 after the frame's EtherType. This is specifically for PTP + *   frames. + * VCAP_KF_L2_PAYLOAD2: W3, lan966x: is2 + *   Bits 7, 2, and 1 from payload byte 6 after the frame's EtherType. This is + *   specifically for PTP frames.   * VCAP_KF_L2_PAYLOAD_ETYPE: W64, sparx5: is2/es2   *   Byte 0-7 of L2 payload after Type/Len field and overloading for OAM - * VCAP_KF_L2_SMAC: W48, sparx5: is0/is2/es2, lan966x is2 + * VCAP_KF_L2_SMAC: W48, sparx5: is0/is2/es2, lan966x: is2   *   Source MAC address + * VCAP_KF_L2_SNAP: W40, lan966x: is2 + *   SNAP header after LLC header (AA-AA-03)   * VCAP_KF_L3_DIP_EQ_SIP_IS: W1, sparx5: is2/es2, lan966x: is2   *   Set if Src IP matches Dst IP address - * VCAP_KF_L3_DMAC_DIP_MATCH: W1, sparx5: is2 - *   Match found in DIP security lookup in ANA_L3 - * VCAP_KF_L3_DPL_CLS: W1, sparx5: es2 + * VCAP_KF_L3_DPL_CLS: W1, sparx5: es0/es2   *   The frames drop precedence level   * VCAP_KF_L3_DSCP: W6, sparx5: is0 - *   Frame’s DSCP value + *   Frame's DSCP value   * VCAP_KF_L3_DST_IS: W1, sparx5: is2   *   Set if lookup is done for egress router leg + * VCAP_KF_L3_FRAGMENT: W1, lan966x: is2 + *   Set if IPv4 frame is fragmented   * VCAP_KF_L3_FRAGMENT_TYPE: W2, sparx5: is0/is2/es2   *   L3 Fragmentation type (none, initial, suspicious, valid follow up)   * VCAP_KF_L3_FRAG_INVLD_L4_LEN: W1, sparx5: is0/is2   *   Set if frame's L4 length is less than ANA_CL:COMMON:CLM_FRAGMENT_CFG.L4_MIN_L   *   EN + * VCAP_KF_L3_FRAG_OFS_GT0: W1, lan966x: is2 + *   Set if IPv4 frame is fragmented and it is not the first fragment   * VCAP_KF_L3_IP4_DIP: W32, sparx5: is0/is2/es2, lan966x: is2   *   Destination IPv4 Address   * VCAP_KF_L3_IP4_SIP: W32, sparx5: is0/is2/es2, lan966x: is2 @@ -205,36 +223,38 @@ enum vcap_keyfield_set {   *   IPv4 frames: IP protocol. IPv6 frames: Next header, same as for IPV4   * VCAP_KF_L3_OPTIONS_IS: W1, sparx5: is0/is2/es2, lan966x: is2   *   Set if IPv4 frame contains options (IP len > 5) - * VCAP_KF_L3_PAYLOAD: sparx5 is2 W96, sparx5 is2 W40, sparx5 es2 W96, - *   lan966x is2 W56 + * VCAP_KF_L3_PAYLOAD: sparx5 is2 W96, sparx5 is2 W40, sparx5 es2 W96, sparx5 + *   es2 W40, lan966x is2 W56   *   Sparx5: Payload bytes after IP header. IPv4: IPv4 options are not parsed so   *   payload is always taken 20 bytes after the start of the IPv4 header, LAN966x:   *   Bytes 0-6 after IP header   * VCAP_KF_L3_RT_IS: W1, sparx5: is2/es2   *   Set if frame has hit a router leg - * VCAP_KF_L3_SMAC_SIP_MATCH: W1, sparx5: is2 - *   Match found in SIP security lookup in ANA_L3   * VCAP_KF_L3_TOS: W8, sparx5: is2/es2, lan966x: is2   *   Sparx5: Frame's IPv4/IPv6 DSCP and ECN fields, LAN966x: IP TOS field   * VCAP_KF_L3_TTL_GT0: W1, sparx5: is2/es2, lan966x: is2   *   Set if IPv4 TTL / IPv6 hop limit is greater than 0 + * VCAP_KF_L4_1588_DOM: W8, lan966x: is2 + *   PTP over UDP: domainNumber + * VCAP_KF_L4_1588_VER: W4, lan966x: is2 + *   PTP over UDP: version   * VCAP_KF_L4_ACK: W1, sparx5: is2/es2, lan966x: is2   *   Sparx5 and LAN966x: TCP flag ACK, LAN966x only: PTP over UDP: flagField bit 2   *   (unicastFlag)   * VCAP_KF_L4_DPORT: W16, sparx5: is2/es2, lan966x: is2   *   Sparx5: TCP/UDP destination port. Overloading for IP_7TUPLE: Non-TCP/UDP IP   *   frames: L4_DPORT = L3_IP_PROTO, LAN966x: TCP/UDP destination port - * VCAP_KF_L4_FIN: W1, sparx5: is2/es2 + * VCAP_KF_L4_FIN: W1, sparx5: is2/es2, lan966x: is2   *   TCP flag FIN, LAN966x: TCP flag FIN, and for PTP over UDP: messageType bit 1   * VCAP_KF_L4_PAYLOAD: W64, sparx5: is2/es2   *   Payload bytes after TCP/UDP header Overloading for IP_7TUPLE: Non TCP/UDP - *   frames: Payload bytes 0–7 after IP header. IPv4 options are not parsed so + *   frames: Payload bytes 0-7 after IP header. IPv4 options are not parsed so   *   payload is always taken 20 bytes after the start of the IPv4 header for non   *   TCP/UDP IPv4 frames   * VCAP_KF_L4_PSH: W1, sparx5: is2/es2, lan966x: is2   *   Sparx5: TCP flag PSH, LAN966x: TCP: TCP flag PSH. PTP over UDP: flagField bit   *   1 (twoStepFlag) - * VCAP_KF_L4_RNG: sparx5 is0 W8, sparx5 is2 W16, sparx5 es2 W16, lan966x: is2 + * VCAP_KF_L4_RNG: sparx5 is0 W8, sparx5 is2 W16, sparx5 es2 W16, lan966x is2 W8   *   Range checker bitmask (one for each range checker). Input into range checkers   *   is taken from classified results (VID, DSCP) and frame (SPORT, DPORT, ETYPE,   *   outer VID, inner VID) @@ -263,58 +283,35 @@ enum vcap_keyfield_set {   *   Select the mode of the Generic Index   * VCAP_KF_LOOKUP_PAG: W8, sparx5: is2, lan966x: is2   *   Classified Policy Association Group: chains rules from IS1/CLM to IS2 + * VCAP_KF_MIRROR_PROBE: W2, sparx5: es2 + *   Identifies frame copies generated as a result of mirroring   * VCAP_KF_OAM_CCM_CNTS_EQ0: W1, sparx5: is2/es2, lan966x: is2   *   Dual-ended loss measurement counters in CCM frames are all zero - * VCAP_KF_OAM_MEL_FLAGS: W7, sparx5: is0, lan966x: is2 + * VCAP_KF_OAM_DETECTED: W1, lan966x: is2 + *   This is missing in the datasheet, but present in the OAM keyset in XML + * VCAP_KF_OAM_FLAGS: W8, lan966x: is2 + *   Frame's OAM flags + * VCAP_KF_OAM_MEL_FLAGS: W7, lan966x: is2   *   Encoding of MD level/MEG level (MEL) - * VCAP_KF_OAM_Y1731_IS: W1, sparx5: is0/is2/es2, lan966x: is2 - *   Set if frame’s EtherType = 0x8902 - * VCAP_KF_PROT_ACTIVE: W1, sparx5: es2 + * VCAP_KF_OAM_MEPID: W16, lan966x: is2 + *   CCM frame's OAM MEP ID + * VCAP_KF_OAM_OPCODE: W8, lan966x: is2 + *   Frame's OAM opcode + * VCAP_KF_OAM_VER: W5, lan966x: is2 + *   Frame's OAM version + * VCAP_KF_OAM_Y1731_IS: W1, sparx5: is2/es2, lan966x: is2 + *   Set if frame's EtherType = 0x8902 + * VCAP_KF_PROT_ACTIVE: W1, sparx5: es0/es2   *   Protection is active   * VCAP_KF_TCP_IS: W1, sparx5: is0/is2/es2, lan966x: is2   *   Set if frame is IPv4 TCP frame (IP protocol = 6) or IPv6 TCP frames (Next   *   header = 6) - * VCAP_KF_TCP_UDP_IS: W1, sparx5: is0/is2/es2, lan966x: is2 + * VCAP_KF_TCP_UDP_IS: W1, sparx5: is0/is2/es2   *   Set if frame is IPv4/IPv6 TCP or UDP frame (IP protocol/next header equals 6   *   or 17)   * VCAP_KF_TYPE: sparx5 is0 W2, sparx5 is0 W1, sparx5 is2 W4, sparx5 is2 W2, - *   sparx5 es2 W3, lan966x: is2 + *   sparx5 es0 W1, sparx5 es2 W3, lan966x is2 W4, lan966x is2 W2   *   Keyset type id - set by the API - * VCAP_KF_HOST_MATCH: W1, lan966x: is2 - *   The action from the SMAC_SIP4 or SMAC_SIP6 lookups. Used for IP source - *   guarding. - * VCAP_KF_L2_FRM_TYPE: W4, lan966x: is2 - *   Frame subtype for specific EtherTypes (MRP, DLR) - * VCAP_KF_L2_PAYLOAD0: W16, lan966x: is2 - *   Payload bytes 0-1 after the frame’s EtherType - * VCAP_KF_L2_PAYLOAD1: W8, lan966x: is2 - *   Payload byte 4 after the frame’s EtherType. This is specifically for PTP - *   frames. - * VCAP_KF_L2_PAYLOAD2: W3, lan966x: is2 - *   Bits 7, 2, and 1 from payload byte 6 after the frame’s EtherType. This is - *   specifically for PTP frames. - * VCAP_KF_L2_LLC: W40, lan966x: is2 - *   LLC header and data after up to two VLAN tags and the type/length field - * VCAP_KF_L3_FRAGMENT: W1, lan966x: is2 - *   Set if IPv4 frame is fragmented - * VCAP_KF_L3_FRAG_OFS_GT0: W1, lan966x: is2 - *   Set if IPv4 frame is fragmented and it is not the first fragment - * VCAP_KF_L2_SNAP: W40, lan966x: is2 - *   SNAP header after LLC header (AA-AA-03) - * VCAP_KF_L4_1588_DOM: W8, lan966x: is2 - *   PTP over UDP: domainNumber - * VCAP_KF_L4_1588_VER: W4, lan966x: is2 - *   PTP over UDP: version - * VCAP_KF_OAM_MEPID: W16, lan966x: is2 - *   CCM frame’s OAM MEP ID - * VCAP_KF_OAM_OPCODE: W8, lan966x: is2 - *   Frame’s OAM opcode - * VCAP_KF_OAM_VER: W5, lan966x: is2 - *   Frame’s OAM version - * VCAP_KF_OAM_FLAGS: W8, lan966x: is2 - *   Frame’s OAM flags - * VCAP_KF_OAM_DETECTED: W1, lan966x: is2 - *   This is missing in the datasheet, but present in the OAM keyset in XML   */  /* Keyfield names */ @@ -334,6 +331,7 @@ enum vcap_key_field {  	VCAP_KF_8021Q_PCP1,  	VCAP_KF_8021Q_PCP2,  	VCAP_KF_8021Q_PCP_CLS, +	VCAP_KF_8021Q_TPID,  	VCAP_KF_8021Q_TPID0,  	VCAP_KF_8021Q_TPID1,  	VCAP_KF_8021Q_TPID2, @@ -352,13 +350,13 @@ enum vcap_key_field {  	VCAP_KF_ARP_SENDER_MATCH_IS,  	VCAP_KF_ARP_TGT_MATCH_IS,  	VCAP_KF_COSID_CLS, -	VCAP_KF_DST_ENTRY,  	VCAP_KF_ES0_ISDX_KEY_ENA,  	VCAP_KF_ETYPE,  	VCAP_KF_ETYPE_LEN_IS, -	VCAP_KF_ETYPE_MPLS, +	VCAP_KF_HOST_MATCH,  	VCAP_KF_IF_EGR_PORT_MASK,  	VCAP_KF_IF_EGR_PORT_MASK_RNG, +	VCAP_KF_IF_EGR_PORT_NO,  	VCAP_KF_IF_IGR_PORT,  	VCAP_KF_IF_IGR_PORT_MASK,  	VCAP_KF_IF_IGR_PORT_MASK_L3, @@ -373,17 +371,24 @@ enum vcap_key_field {  	VCAP_KF_ISDX_GT0_IS,  	VCAP_KF_L2_BC_IS,  	VCAP_KF_L2_DMAC, +	VCAP_KF_L2_FRM_TYPE,  	VCAP_KF_L2_FWD_IS, +	VCAP_KF_L2_LLC,  	VCAP_KF_L2_MC_IS, +	VCAP_KF_L2_PAYLOAD0, +	VCAP_KF_L2_PAYLOAD1, +	VCAP_KF_L2_PAYLOAD2,  	VCAP_KF_L2_PAYLOAD_ETYPE,  	VCAP_KF_L2_SMAC, +	VCAP_KF_L2_SNAP,  	VCAP_KF_L3_DIP_EQ_SIP_IS, -	VCAP_KF_L3_DMAC_DIP_MATCH,  	VCAP_KF_L3_DPL_CLS,  	VCAP_KF_L3_DSCP,  	VCAP_KF_L3_DST_IS, +	VCAP_KF_L3_FRAGMENT,  	VCAP_KF_L3_FRAGMENT_TYPE,  	VCAP_KF_L3_FRAG_INVLD_L4_LEN, +	VCAP_KF_L3_FRAG_OFS_GT0,  	VCAP_KF_L3_IP4_DIP,  	VCAP_KF_L3_IP4_SIP,  	VCAP_KF_L3_IP6_DIP, @@ -392,9 +397,10 @@ enum vcap_key_field {  	VCAP_KF_L3_OPTIONS_IS,  	VCAP_KF_L3_PAYLOAD,  	VCAP_KF_L3_RT_IS, -	VCAP_KF_L3_SMAC_SIP_MATCH,  	VCAP_KF_L3_TOS,  	VCAP_KF_L3_TTL_GT0, +	VCAP_KF_L4_1588_DOM, +	VCAP_KF_L4_1588_VER,  	VCAP_KF_L4_ACK,  	VCAP_KF_L4_DPORT,  	VCAP_KF_L4_FIN, @@ -411,30 +417,19 @@ enum vcap_key_field {  	VCAP_KF_LOOKUP_GEN_IDX,  	VCAP_KF_LOOKUP_GEN_IDX_SEL,  	VCAP_KF_LOOKUP_PAG, -	VCAP_KF_MIRROR_ENA, +	VCAP_KF_MIRROR_PROBE,  	VCAP_KF_OAM_CCM_CNTS_EQ0, +	VCAP_KF_OAM_DETECTED, +	VCAP_KF_OAM_FLAGS,  	VCAP_KF_OAM_MEL_FLAGS, +	VCAP_KF_OAM_MEPID, +	VCAP_KF_OAM_OPCODE, +	VCAP_KF_OAM_VER,  	VCAP_KF_OAM_Y1731_IS,  	VCAP_KF_PROT_ACTIVE,  	VCAP_KF_TCP_IS,  	VCAP_KF_TCP_UDP_IS,  	VCAP_KF_TYPE, -	VCAP_KF_HOST_MATCH, -	VCAP_KF_L2_FRM_TYPE, -	VCAP_KF_L2_PAYLOAD0, -	VCAP_KF_L2_PAYLOAD1, -	VCAP_KF_L2_PAYLOAD2, -	VCAP_KF_L2_LLC, -	VCAP_KF_L3_FRAGMENT, -	VCAP_KF_L3_FRAG_OFS_GT0, -	VCAP_KF_L2_SNAP, -	VCAP_KF_L4_1588_DOM, -	VCAP_KF_L4_1588_VER, -	VCAP_KF_OAM_MEPID, -	VCAP_KF_OAM_OPCODE, -	VCAP_KF_OAM_VER, -	VCAP_KF_OAM_FLAGS, -	VCAP_KF_OAM_DETECTED,  };  /* Actionset names with origin information */ @@ -443,14 +438,17 @@ enum vcap_actionfield_set {  	VCAP_AFS_BASE_TYPE,         /* sparx5 is2 X3, sparx5 es2 X3, lan966x is2 X2 */  	VCAP_AFS_CLASSIFICATION,    /* sparx5 is0 X2 */  	VCAP_AFS_CLASS_REDUCED,     /* sparx5 is0 X1 */ +	VCAP_AFS_ES0,               /* sparx5 es0 X1 */  	VCAP_AFS_FULL,              /* sparx5 is0 X3 */ -	VCAP_AFS_MLBS,              /* sparx5 is0 X2 */ -	VCAP_AFS_MLBS_REDUCED,      /* sparx5 is0 X1 */ -	VCAP_AFS_SMAC_SIP,          /* lan966x is2 x1 */ +	VCAP_AFS_SMAC_SIP,          /* lan966x is2 X1 */  };  /* List of actionfields with description   * + * VCAP_AF_ACL_ID: W6, lan966x: is2 + *   Logical ID for the entry. This ID is extracted together with the frame in the + *   CPU extraction header. Only applicable to actions with CPU_COPY_ENA or + *   HIT_ME_ONCE set.   * VCAP_AF_CLS_VID_SEL: W3, sparx5: is0   *   Controls the classified VID: 0: VID_NONE: No action. 1: VID_ADD: New VID =   *   old VID + VID_VAL. 2: VID_REPLACE: New VID = VID_VAL. 3: VID_FIRST_TAG: New @@ -468,8 +466,16 @@ enum vcap_actionfield_set {   * VCAP_AF_CPU_COPY_ENA: W1, sparx5: is2/es2, lan966x: is2   *   Setting this bit to 1 causes all frames that hit this action to be copied to   *   the CPU extraction queue specified in CPU_QUEUE_NUM. + * VCAP_AF_CPU_QU: W3, sparx5: es0 + *   CPU extraction queue. Used when FWD_SEL >0 and PIPELINE_ACT = XTR.   * VCAP_AF_CPU_QUEUE_NUM: W3, sparx5: is2/es2, lan966x: is2   *   CPU queue number. Used when CPU_COPY_ENA is set. + * VCAP_AF_DEI_A_VAL: W1, sparx5: es0 + *   DEI used in ES0 tag A. See TAG_A_DEI_SEL. + * VCAP_AF_DEI_B_VAL: W1, sparx5: es0 + *   DEI used in ES0 tag B. See TAG_B_DEI_SEL. + * VCAP_AF_DEI_C_VAL: W1, sparx5: es0 + *   DEI used in ES0 tag C. See TAG_C_DEI_SEL.   * VCAP_AF_DEI_ENA: W1, sparx5: is0   *   If set, use DEI_VAL as classified DEI value. Otherwise, DEI from basic   *   classification is used @@ -483,19 +489,38 @@ enum vcap_actionfield_set {   * VCAP_AF_DSCP_ENA: W1, sparx5: is0   *   If set, use DSCP_VAL as classified DSCP value. Otherwise, DSCP value from   *   basic classification is used. - * VCAP_AF_DSCP_VAL: W6, sparx5: is0 + * VCAP_AF_DSCP_SEL: W3, sparx5: es0 + *   Selects source for DSCP. 0: Controlled by port configuration and IFH. 1: + *   Classified DSCP via IFH. 2: DSCP_VAL. 3: Reserved. 4: Mapped using mapping + *   table 0, otherwise use DSCP_VAL. 5: Mapped using mapping table 1, otherwise + *   use mapping table 0. 6: Mapped using mapping table 2, otherwise use DSCP_VAL. + *   7: Mapped using mapping table 3, otherwise use mapping table 2 + * VCAP_AF_DSCP_VAL: W6, sparx5: is0/es0   *   See DSCP_ENA.   * VCAP_AF_ES2_REW_CMD: W3, sparx5: es2   *   Command forwarded to REW: 0: No action. 1: SWAP MAC addresses. 2: Do L2CP   *   DMAC translation when entering or leaving a tunnel. + * VCAP_AF_ESDX: W13, sparx5: es0 + *   Egress counter index. Used to index egress counter set as defined in + *   REW::STAT_CFG. + * VCAP_AF_FWD_KILL_ENA: W1, lan966x: is2 + *   Setting this bit to 1 denies forwarding of the frame forwarding to any front + *   port. The frame can still be copied to the CPU by other actions.   * VCAP_AF_FWD_MODE: W2, sparx5: es2   *   Forward selector: 0: Forward. 1: Discard. 2: Redirect. 3: Copy. + * VCAP_AF_FWD_SEL: W2, sparx5: es0 + *   ES0 Forward selector. 0: No action. 1: Copy to loopback interface. 2: + *   Redirect to loopback interface. 3: Discard   * VCAP_AF_HIT_ME_ONCE: W1, sparx5: is2/es2, lan966x: is2   *   Setting this bit to 1 causes the first frame that hits this action where the   *   HIT_CNT counter is zero to be copied to the CPU extraction queue specified in   *   CPU_QUEUE_NUM. The HIT_CNT counter is then incremented and any frames that   *   hit this action later are not copied to the CPU. To re-enable the HIT_ME_ONCE   *   functionality, the HIT_CNT counter must be cleared. + * VCAP_AF_HOST_MATCH: W1, lan966x: is2 + *   Used for IP source guarding. If set, it signals that the host is a valid (for + *   instance a valid combination of source MAC address and source IP address). + *   HOST_MATCH is input to the IS2 keys.   * VCAP_AF_IGNORE_PIPELINE_CTRL: W1, sparx5: is2/es2   *   Ignore ingress pipeline control. This enforces the use of the VCAP IS2 action   *   even when the pipeline control has terminated the frame before VCAP IS2. @@ -504,8 +529,13 @@ enum vcap_actionfield_set {   * VCAP_AF_ISDX_ADD_REPLACE_SEL: W1, sparx5: is0   *   Controls the classified ISDX. 0: New ISDX = old ISDX + ISDX_VAL. 1: New ISDX   *   = ISDX_VAL. + * VCAP_AF_ISDX_ENA: W1, lan966x: is2 + *   Setting this bit to 1 causes the classified ISDX to be set to the value of + *   POLICE_IDX[8:0].   * VCAP_AF_ISDX_VAL: W12, sparx5: is0   *   See isdx_add_replace_sel + * VCAP_AF_LOOP_ENA: W1, sparx5: es0 + *   0: Forward based on PIPELINE_PT and FWD_SEL   * VCAP_AF_LRN_DIS: W1, sparx5: is2, lan966x: is2   *   Setting this bit to 1 disables learning of frames hitting this action.   * VCAP_AF_MAP_IDX: W9, sparx5: is0 @@ -521,136 +551,190 @@ enum vcap_actionfield_set {   *   are applied to. 0: No changes to the QoS Mapping Table lookup. 1: Update key   *   type and index for QoS Mapping Table lookup #0. 2: Update key type and index   *   for QoS Mapping Table lookup #1. 3: Reserved. - * VCAP_AF_MASK_MODE: W3, sparx5: is0/is2, lan966x is2 W2 + * VCAP_AF_MASK_MODE: sparx5 is0 W3, sparx5 is2 W3, lan966x is2 W2   *   Controls the PORT_MASK use. Sparx5: 0: OR_DSTMASK, 1: AND_VLANMASK, 2:   *   REPLACE_PGID, 3: REPLACE_ALL, 4: REDIR_PGID, 5: OR_PGID_MASK, 6: VSTAX, 7:   *   Not applicable. LAN966X: 0: No action, 1: Permit/deny (AND), 2: Policy   *   forwarding (DMAC lookup), 3: Redirect. The CPU port is untouched by   *   MASK_MODE. - * VCAP_AF_MATCH_ID: W16, sparx5: is0/is2 + * VCAP_AF_MATCH_ID: W16, sparx5: is2   *   Logical ID for the entry. The MATCH_ID is extracted together with the frame   *   if the frame is forwarded to the CPU (CPU_COPY_ENA). The result is placed in   *   IFH.CL_RSLT. - * VCAP_AF_MATCH_ID_MASK: W16, sparx5: is0/is2 + * VCAP_AF_MATCH_ID_MASK: W16, sparx5: is2   *   Mask used by MATCH_ID. + * VCAP_AF_MIRROR_ENA: W1, lan966x: is2 + *   Setting this bit to 1 causes frames to be mirrored to the mirror target port + *   (ANA::MIRRPORPORTS).   * VCAP_AF_MIRROR_PROBE: W2, sparx5: is2   *   Mirroring performed according to configuration of a mirror probe. 0: No   *   mirroring. 1: Mirror probe 0. 2: Mirror probe 1. 3: Mirror probe 2   * VCAP_AF_MIRROR_PROBE_ID: W2, sparx5: es2   *   Signals a mirror probe to be placed in the IFH. Only possible when FWD_MODE - *   is copy. 0: No mirroring. 1–3: Use mirror probe 0-2. + *   is copy. 0: No mirroring. 1-3: Use mirror probe 0-2.   * VCAP_AF_NXT_IDX: W12, sparx5: is0   *   Index used as part of key (field G_IDX) in the next lookup.   * VCAP_AF_NXT_IDX_CTRL: W3, sparx5: is0   *   Controls the generation of the G_IDX used in the VCAP CLM next lookup   * VCAP_AF_PAG_OVERRIDE_MASK: W8, sparx5: is0 - *   Bits set in this mask will override PAG_VAL from port profile.  New PAG = - *   (PAG (input) AND ~PAG_OVERRIDE_MASK) OR (PAG_VAL AND PAG_OVERRIDE_MASK) + *   Bits set in this mask will override PAG_VAL from port profile. New PAG = (PAG + *   (input) AND ~PAG_OVERRIDE_MASK) OR (PAG_VAL AND PAG_OVERRIDE_MASK)   * VCAP_AF_PAG_VAL: W8, sparx5: is0   *   See PAG_OVERRIDE_MASK. + * VCAP_AF_PCP_A_VAL: W3, sparx5: es0 + *   PCP used in ES0 tag A. See TAG_A_PCP_SEL. + * VCAP_AF_PCP_B_VAL: W3, sparx5: es0 + *   PCP used in ES0 tag B. See TAG_B_PCP_SEL. + * VCAP_AF_PCP_C_VAL: W3, sparx5: es0 + *   PCP used in ES0 tag C. See TAG_C_PCP_SEL.   * VCAP_AF_PCP_ENA: W1, sparx5: is0   *   If set, use PCP_VAL as classified PCP value. Otherwise, PCP from basic   *   classification is used.   * VCAP_AF_PCP_VAL: W3, sparx5: is0   *   See PCP_ENA. - * VCAP_AF_PIPELINE_FORCE_ENA: sparx5 is0 W2, sparx5 is2 W1 + * VCAP_AF_PIPELINE_ACT: W1, sparx5: es0 + *   Pipeline action when FWD_SEL > 0. 0: XTR. CPU_QU selects CPU extraction queue + *   1: LBK_ASM. + * VCAP_AF_PIPELINE_FORCE_ENA: W1, sparx5: is2   *   If set, use PIPELINE_PT unconditionally and set PIPELINE_ACT = NONE if   *   PIPELINE_PT == NONE. Overrules previous settings of pipeline point. - * VCAP_AF_PIPELINE_PT: W5, sparx5: is0/is2 + * VCAP_AF_PIPELINE_PT: sparx5 is2 W5, sparx5 es0 W2   *   Pipeline point used if PIPELINE_FORCE_ENA is set   * VCAP_AF_POLICE_ENA: W1, sparx5: is2/es2, lan966x: is2   *   Setting this bit to 1 causes frames that hit this action to be policed by the   *   ACL policer specified in POLICE_IDX. Only applies to the first lookup. - * VCAP_AF_POLICE_IDX: W6, sparx5: is2/es2, lan966x: is2 W9 + * VCAP_AF_POLICE_IDX: sparx5 is2 W6, sparx5 es2 W6, lan966x is2 W9   *   Selects VCAP policer used when policing frames (POLICE_ENA)   * VCAP_AF_POLICE_REMARK: W1, sparx5: es2   *   If set, frames exceeding policer rates are marked as yellow but not   *   discarded. + * VCAP_AF_POLICE_VCAP_ONLY: W1, lan966x: is2 + *   Disable policing from QoS, and port policers. Only the VCAP policer selected + *   by POLICE_IDX is active. Only applies to the second lookup. + * VCAP_AF_POP_VAL: W2, sparx5: es0 + *   Controls popping of Q-tags. The final number of Q-tags popped is calculated + *   as shown in section 4.28.7.2 VLAN Pop Decision.   * VCAP_AF_PORT_MASK: sparx5 is0 W65, sparx5 is2 W68, lan966x is2 W8   *   Port mask applied to the forwarding decision based on MASK_MODE. + * VCAP_AF_PUSH_CUSTOMER_TAG: W2, sparx5: es0 + *   Selects tag C mode: 0: Do not push tag C. 1: Push tag C if + *   IFH.VSTAX.TAG.WAS_TAGGED = 1. 2: Push tag C if IFH.VSTAX.TAG.WAS_TAGGED = 0. + *   3: Push tag C if UNTAG_VID_ENA = 0 or (C-TAG.VID ! = VID_C_VAL). + * VCAP_AF_PUSH_INNER_TAG: W1, sparx5: es0 + *   Controls inner tagging. 0: Do not push ES0 tag B as inner tag. 1: Push ES0 + *   tag B as inner tag. + * VCAP_AF_PUSH_OUTER_TAG: W2, sparx5: es0 + *   Controls outer tagging. 0: No ES0 tag A: Port tag is allowed if enabled on + *   port. 1: ES0 tag A: Push ES0 tag A. No port tag. 2: Force port tag: Always + *   push port tag. No ES0 tag A. 3: Force untag: Never push port tag or ES0 tag + *   A.   * VCAP_AF_QOS_ENA: W1, sparx5: is0   *   If set, use QOS_VAL as classified QoS class. Otherwise, QoS class from basic   *   classification is used.   * VCAP_AF_QOS_VAL: W3, sparx5: is0   *   See QOS_ENA. + * VCAP_AF_REW_OP: W16, lan966x: is2 + *   Rewriter operation command.   * VCAP_AF_RT_DIS: W1, sparx5: is2   *   If set, routing is disallowed. Only applies when IS_INNER_ACL is 0. See also   *   IGR_ACL_ENA, EGR_ACL_ENA, and RLEG_STAT_IDX. + * VCAP_AF_SWAP_MACS_ENA: W1, sparx5: es0 + *   This setting is only active when FWD_SEL = 1 or FWD_SEL = 2 and PIPELINE_ACT + *   = LBK_ASM. 0: No action. 1: Swap MACs and clear bit 40 in new SMAC. + * VCAP_AF_TAG_A_DEI_SEL: W3, sparx5: es0 + *   Selects PCP for ES0 tag A. 0: Classified DEI. 1: DEI_A_VAL. 2: DP and QoS + *   mapped to PCP (per port table). 3: DP. + * VCAP_AF_TAG_A_PCP_SEL: W3, sparx5: es0 + *   Selects PCP for ES0 tag A. 0: Classified PCP. 1: PCP_A_VAL. 2: DP and QoS + *   mapped to PCP (per port table). 3: QoS class. + * VCAP_AF_TAG_A_TPID_SEL: W3, sparx5: es0 + *   Selects TPID for ES0 tag A: 0: 0x8100. 1: 0x88A8. 2: Custom + *   (REW:PORT:PORT_VLAN_CFG.PORT_TPID). 3: If IFH.TAG_TYPE = 0 then 0x8100 else + *   custom. + * VCAP_AF_TAG_A_VID_SEL: W2, sparx5: es0 + *   Selects VID for ES0 tag A. 0: Classified VID + VID_A_VAL. 1: VID_A_VAL. + * VCAP_AF_TAG_B_DEI_SEL: W3, sparx5: es0 + *   Selects PCP for ES0 tag B. 0: Classified DEI. 1: DEI_B_VAL. 2: DP and QoS + *   mapped to PCP (per port table). 3: DP. + * VCAP_AF_TAG_B_PCP_SEL: W3, sparx5: es0 + *   Selects PCP for ES0 tag B. 0: Classified PCP. 1: PCP_B_VAL. 2: DP and QoS + *   mapped to PCP (per port table). 3: QoS class. + * VCAP_AF_TAG_B_TPID_SEL: W3, sparx5: es0 + *   Selects TPID for ES0 tag B. 0: 0x8100. 1: 0x88A8. 2: Custom + *   (REW:PORT:PORT_VLAN_CFG.PORT_TPID). 3: If IFH.TAG_TYPE = 0 then 0x8100 else + *   custom. + * VCAP_AF_TAG_B_VID_SEL: W2, sparx5: es0 + *   Selects VID for ES0 tag B. 0: Classified VID + VID_B_VAL. 1: VID_B_VAL. + * VCAP_AF_TAG_C_DEI_SEL: W3, sparx5: es0 + *   Selects DEI source for ES0 tag C. 0: Classified DEI. 1: DEI_C_VAL. 2: + *   REW::DP_MAP.DP [IFH.VSTAX.QOS.DP]. 3: DEI of popped VLAN tag if available + *   (IFH.VSTAX.TAG.WAS_TAGGED = 1 and tot_pop_cnt>0) else DEI_C_VAL. 4: Mapped + *   using mapping table 0, otherwise use DEI_C_VAL. 5: Mapped using mapping table + *   1, otherwise use mapping table 0. 6: Mapped using mapping table 2, otherwise + *   use DEI_C_VAL. 7: Mapped using mapping table 3, otherwise use mapping table + *   2. + * VCAP_AF_TAG_C_PCP_SEL: W3, sparx5: es0 + *   Selects PCP source for ES0 tag C. 0: Classified PCP. 1: PCP_C_VAL. 2: + *   Reserved. 3: PCP of popped VLAN tag if available (IFH.VSTAX.TAG.WAS_TAGGED=1 + *   and tot_pop_cnt>0) else PCP_C_VAL. 4: Mapped using mapping table 0, otherwise + *   use PCP_C_VAL. 5: Mapped using mapping table 1, otherwise use mapping table + *   0. 6: Mapped using mapping table 2, otherwise use PCP_C_VAL. 7: Mapped using + *   mapping table 3, otherwise use mapping table 2. + * VCAP_AF_TAG_C_TPID_SEL: W3, sparx5: es0 + *   Selects TPID for ES0 tag C. 0: 0x8100. 1: 0x88A8. 2: Custom 1. 3: Custom 2. + *   4: Custom 3. 5: See TAG_A_TPID_SEL. + * VCAP_AF_TAG_C_VID_SEL: W2, sparx5: es0 + *   Selects VID for ES0 tag C. The resulting VID is termed C-TAG.VID. 0: + *   Classified VID. 1: VID_C_VAL. 2: IFH.ENCAP.GVID. 3: Reserved.   * VCAP_AF_TYPE: W1, sparx5: is0   *   Actionset type id - Set by the API + * VCAP_AF_UNTAG_VID_ENA: W1, sparx5: es0 + *   Controls insertion of tag C. Untag or insert mode can be selected. See + *   PUSH_CUSTOMER_TAG. + * VCAP_AF_VID_A_VAL: W12, sparx5: es0 + *   VID used in ES0 tag A. See TAG_A_VID_SEL. + * VCAP_AF_VID_B_VAL: W12, sparx5: es0 + *   VID used in ES0 tag B. See TAG_B_VID_SEL. + * VCAP_AF_VID_C_VAL: W12, sparx5: es0 + *   VID used in ES0 tag C. See TAG_C_VID_SEL.   * VCAP_AF_VID_VAL: W13, sparx5: is0   *   New VID Value - * VCAP_AF_MIRROR_ENA: W1, lan966x: is2 - *   Setting this bit to 1 causes frames to be mirrored to the mirror target - *   port (ANA::MIRRPORPORTS). - * VCAP_AF_POLICE_VCAP_ONLY: W1, lan966x: is2 - *   Disable policing from QoS, and port policers. Only the VCAP policer - *   selected by POLICE_IDX is active. Only applies to the second lookup. - * VCAP_AF_REW_OP: W16, lan966x: is2 - *   Rewriter operation command. - * VCAP_AF_ISDX_ENA: W1, lan966x: is2 - *   Setting this bit to 1 causes the classified ISDX to be set to the value of - *   POLICE_IDX[8:0]. - * VCAP_AF_ACL_ID: W6, lan966x: is2 - *   Logical ID for the entry. This ID is extracted together with the frame in - *   the CPU extraction header. Only applicable to actions with CPU_COPY_ENA or - *   HIT_ME_ONCE set. - * VCAP_AF_FWD_KILL_ENA: W1, lan966x: is2 - *   Setting this bit to 1 denies forwarding of the frame forwarding to any - *   front port. The frame can still be copied to the CPU by other actions. - * VCAP_AF_HOST_MATCH: W1, lan966x: is2 - *  Used for IP source guarding. If set, it signals that the host is a valid - *  (for instance a valid combination of source MAC address and source IP - *  address). HOST_MATCH is input to the IS2 keys.   */  /* Actionfield names */  enum vcap_action_field {  	VCAP_AF_NO_VALUE,  /* initial value */ -	VCAP_AF_ACL_MAC, -	VCAP_AF_ACL_RT_MODE, +	VCAP_AF_ACL_ID,  	VCAP_AF_CLS_VID_SEL,  	VCAP_AF_CNT_ID,  	VCAP_AF_COPY_PORT_NUM,  	VCAP_AF_COPY_QUEUE_NUM, -	VCAP_AF_COSID_ENA, -	VCAP_AF_COSID_VAL,  	VCAP_AF_CPU_COPY_ENA, -	VCAP_AF_CPU_DIS, -	VCAP_AF_CPU_ENA, -	VCAP_AF_CPU_Q, +	VCAP_AF_CPU_QU,  	VCAP_AF_CPU_QUEUE_NUM, -	VCAP_AF_CUSTOM_ACE_ENA, -	VCAP_AF_CUSTOM_ACE_OFFSET, +	VCAP_AF_DEI_A_VAL, +	VCAP_AF_DEI_B_VAL, +	VCAP_AF_DEI_C_VAL,  	VCAP_AF_DEI_ENA,  	VCAP_AF_DEI_VAL, -	VCAP_AF_DLB_OFFSET, -	VCAP_AF_DMAC_OFFSET_ENA,  	VCAP_AF_DP_ENA,  	VCAP_AF_DP_VAL,  	VCAP_AF_DSCP_ENA, +	VCAP_AF_DSCP_SEL,  	VCAP_AF_DSCP_VAL, -	VCAP_AF_EGR_ACL_ENA,  	VCAP_AF_ES2_REW_CMD, -	VCAP_AF_FWD_DIS, +	VCAP_AF_ESDX, +	VCAP_AF_FWD_KILL_ENA,  	VCAP_AF_FWD_MODE, -	VCAP_AF_FWD_TYPE, -	VCAP_AF_GVID_ADD_REPLACE_SEL, +	VCAP_AF_FWD_SEL,  	VCAP_AF_HIT_ME_ONCE, +	VCAP_AF_HOST_MATCH,  	VCAP_AF_IGNORE_PIPELINE_CTRL, -	VCAP_AF_IGR_ACL_ENA, -	VCAP_AF_INJ_MASQ_ENA, -	VCAP_AF_INJ_MASQ_LPORT, -	VCAP_AF_INJ_MASQ_PORT,  	VCAP_AF_INTR_ENA,  	VCAP_AF_ISDX_ADD_REPLACE_SEL, +	VCAP_AF_ISDX_ENA,  	VCAP_AF_ISDX_VAL, -	VCAP_AF_IS_INNER_ACL, -	VCAP_AF_L3_MAC_UPDATE_DIS, -	VCAP_AF_LOG_MSG_INTERVAL, -	VCAP_AF_LPM_AFFIX_ENA, -	VCAP_AF_LPM_AFFIX_VAL, -	VCAP_AF_LPORT_ENA, +	VCAP_AF_LOOP_ENA,  	VCAP_AF_LRN_DIS,  	VCAP_AF_MAP_IDX,  	VCAP_AF_MAP_KEY, @@ -658,78 +742,53 @@ enum vcap_action_field {  	VCAP_AF_MASK_MODE,  	VCAP_AF_MATCH_ID,  	VCAP_AF_MATCH_ID_MASK, -	VCAP_AF_MIP_SEL, +	VCAP_AF_MIRROR_ENA,  	VCAP_AF_MIRROR_PROBE,  	VCAP_AF_MIRROR_PROBE_ID, -	VCAP_AF_MPLS_IP_CTRL_ENA, -	VCAP_AF_MPLS_MEP_ENA, -	VCAP_AF_MPLS_MIP_ENA, -	VCAP_AF_MPLS_OAM_FLAVOR, -	VCAP_AF_MPLS_OAM_TYPE, -	VCAP_AF_NUM_VLD_LABELS,  	VCAP_AF_NXT_IDX,  	VCAP_AF_NXT_IDX_CTRL, -	VCAP_AF_NXT_KEY_TYPE, -	VCAP_AF_NXT_NORMALIZE, -	VCAP_AF_NXT_NORM_W16_OFFSET, -	VCAP_AF_NXT_NORM_W32_OFFSET, -	VCAP_AF_NXT_OFFSET_FROM_TYPE, -	VCAP_AF_NXT_TYPE_AFTER_OFFSET, -	VCAP_AF_OAM_IP_BFD_ENA, -	VCAP_AF_OAM_TWAMP_ENA, -	VCAP_AF_OAM_Y1731_SEL,  	VCAP_AF_PAG_OVERRIDE_MASK,  	VCAP_AF_PAG_VAL, +	VCAP_AF_PCP_A_VAL, +	VCAP_AF_PCP_B_VAL, +	VCAP_AF_PCP_C_VAL,  	VCAP_AF_PCP_ENA,  	VCAP_AF_PCP_VAL, -	VCAP_AF_PIPELINE_ACT_SEL, +	VCAP_AF_PIPELINE_ACT,  	VCAP_AF_PIPELINE_FORCE_ENA,  	VCAP_AF_PIPELINE_PT, -	VCAP_AF_PIPELINE_PT_REDUCED,  	VCAP_AF_POLICE_ENA,  	VCAP_AF_POLICE_IDX,  	VCAP_AF_POLICE_REMARK, +	VCAP_AF_POLICE_VCAP_ONLY, +	VCAP_AF_POP_VAL,  	VCAP_AF_PORT_MASK, -	VCAP_AF_PTP_MASTER_SEL, +	VCAP_AF_PUSH_CUSTOMER_TAG, +	VCAP_AF_PUSH_INNER_TAG, +	VCAP_AF_PUSH_OUTER_TAG,  	VCAP_AF_QOS_ENA,  	VCAP_AF_QOS_VAL, -	VCAP_AF_REW_CMD, -	VCAP_AF_RLEG_DMAC_CHK_DIS, -	VCAP_AF_RLEG_STAT_IDX, -	VCAP_AF_RSDX_ENA, -	VCAP_AF_RSDX_VAL, -	VCAP_AF_RSVD_LBL_VAL, +	VCAP_AF_REW_OP,  	VCAP_AF_RT_DIS, -	VCAP_AF_RT_SEL, -	VCAP_AF_S2_KEY_SEL_ENA, -	VCAP_AF_S2_KEY_SEL_IDX, -	VCAP_AF_SAM_SEQ_ENA, -	VCAP_AF_SIP_IDX, -	VCAP_AF_SWAP_MAC_ENA, -	VCAP_AF_TCP_UDP_DPORT, -	VCAP_AF_TCP_UDP_ENA, -	VCAP_AF_TCP_UDP_SPORT, -	VCAP_AF_TC_ENA, -	VCAP_AF_TC_LABEL, -	VCAP_AF_TPID_SEL, -	VCAP_AF_TTL_DECR_DIS, -	VCAP_AF_TTL_ENA, -	VCAP_AF_TTL_LABEL, -	VCAP_AF_TTL_UPDATE_ENA, +	VCAP_AF_SWAP_MACS_ENA, +	VCAP_AF_TAG_A_DEI_SEL, +	VCAP_AF_TAG_A_PCP_SEL, +	VCAP_AF_TAG_A_TPID_SEL, +	VCAP_AF_TAG_A_VID_SEL, +	VCAP_AF_TAG_B_DEI_SEL, +	VCAP_AF_TAG_B_PCP_SEL, +	VCAP_AF_TAG_B_TPID_SEL, +	VCAP_AF_TAG_B_VID_SEL, +	VCAP_AF_TAG_C_DEI_SEL, +	VCAP_AF_TAG_C_PCP_SEL, +	VCAP_AF_TAG_C_TPID_SEL, +	VCAP_AF_TAG_C_VID_SEL,  	VCAP_AF_TYPE, +	VCAP_AF_UNTAG_VID_ENA, +	VCAP_AF_VID_A_VAL, +	VCAP_AF_VID_B_VAL, +	VCAP_AF_VID_C_VAL,  	VCAP_AF_VID_VAL, -	VCAP_AF_VLAN_POP_CNT, -	VCAP_AF_VLAN_POP_CNT_ENA, -	VCAP_AF_VLAN_PUSH_CNT, -	VCAP_AF_VLAN_PUSH_CNT_ENA, -	VCAP_AF_VLAN_WAS_TAGGED, -	VCAP_AF_MIRROR_ENA, -	VCAP_AF_POLICE_VCAP_ONLY, -	VCAP_AF_REW_OP, -	VCAP_AF_ISDX_ENA, -	VCAP_AF_ACL_ID, -	VCAP_AF_FWD_KILL_ENA, -	VCAP_AF_HOST_MATCH,  };  #endif /* __VCAP_AG_API__ */  |