seq_printf(s, "%d ", ntohs(rule->packet.dport));
                        seq_printf(s, "mask 0x%x\n", ntohs(rule->mask.dport));
                        break;
+               case NPC_TCP_FLAGS:
+                       seq_printf(s, "%d ", rule->packet.tcp_flags);
+                       seq_printf(s, "mask 0x%x\n", rule->mask.tcp_flags);
+                       break;
                case NPC_IPSEC_SPI:
                        seq_printf(s, "0x%x ", ntohl(rule->packet.spi));
                        seq_printf(s, "mask 0x%x\n", ntohl(rule->mask.spi));
 
        [NPC_MPLS4_TTL]     = "lse depth 4",
        [NPC_TYPE_ICMP] = "icmp type",
        [NPC_CODE_ICMP] = "icmp code",
+       [NPC_TCP_FLAGS] = "tcp flags",
        [NPC_UNKNOWN]   = "unknown",
 };
 
        NPC_SCAN_HDR(NPC_DPORT_SCTP, NPC_LID_LD, NPC_LT_LD_SCTP, 2, 2);
        NPC_SCAN_HDR(NPC_TYPE_ICMP, NPC_LID_LD, NPC_LT_LD_ICMP, 0, 1);
        NPC_SCAN_HDR(NPC_CODE_ICMP, NPC_LID_LD, NPC_LT_LD_ICMP, 1, 1);
+       NPC_SCAN_HDR(NPC_TCP_FLAGS, NPC_LID_LD, NPC_LT_LD_TCP, 12, 2);
        NPC_SCAN_HDR(NPC_ETYPE_ETHER, NPC_LID_LA, NPC_LT_LA_ETHER, 12, 2);
        NPC_SCAN_HDR(NPC_ETYPE_TAG1, NPC_LID_LB, NPC_LT_LB_CTAG, 4, 2);
        NPC_SCAN_HDR(NPC_ETYPE_TAG2, NPC_LID_LB, NPC_LT_LB_STAG_QINQ, 8, 2);
                       BIT_ULL(NPC_DPORT_TCP) | BIT_ULL(NPC_DPORT_UDP) |
                       BIT_ULL(NPC_SPORT_SCTP) | BIT_ULL(NPC_DPORT_SCTP) |
                       BIT_ULL(NPC_SPORT_SCTP) | BIT_ULL(NPC_DPORT_SCTP) |
-                      BIT_ULL(NPC_TYPE_ICMP) | BIT_ULL(NPC_CODE_ICMP);
+                      BIT_ULL(NPC_TYPE_ICMP) | BIT_ULL(NPC_CODE_ICMP) |
+                      BIT_ULL(NPC_TCP_FLAGS);
 
        /* for tcp/udp/sctp corresponding layer type should be in the key */
        if (*features & proto_flags) {
                       mask->icmp_type, 0);
        NPC_WRITE_FLOW(NPC_CODE_ICMP, icmp_code, pkt->icmp_code, 0,
                       mask->icmp_code, 0);
-
+       NPC_WRITE_FLOW(NPC_TCP_FLAGS, tcp_flags, ntohs(pkt->tcp_flags), 0,
+                      ntohs(mask->tcp_flags), 0);
        NPC_WRITE_FLOW(NPC_IPSEC_SPI, spi, ntohl(pkt->spi), 0,
                       ntohl(mask->spi), 0);
 
 
              BIT(FLOW_DISSECTOR_KEY_IPSEC) |
              BIT_ULL(FLOW_DISSECTOR_KEY_MPLS) |
              BIT_ULL(FLOW_DISSECTOR_KEY_ICMP) |
+             BIT_ULL(FLOW_DISSECTOR_KEY_TCP) |
              BIT_ULL(FLOW_DISSECTOR_KEY_IP))))  {
                netdev_info(nic->netdev, "unsupported flow used key 0x%llx",
                            dissector->used_keys);
                }
        }
 
+       if (flow_rule_match_key(rule, FLOW_DISSECTOR_KEY_TCP)) {
+               struct flow_match_tcp match;
+
+               flow_rule_match_tcp(rule, &match);
+
+               flow_spec->tcp_flags = match.key->flags;
+               flow_mask->tcp_flags = match.mask->flags;
+               req->features |= BIT_ULL(NPC_TCP_FLAGS);
+       }
+
        if (flow_rule_match_key(rule, FLOW_DISSECTOR_KEY_MPLS)) {
                struct flow_match_mpls match;
                u8 bit;