2018-02-01 17:18:17 +00:00
|
|
|
.. SPDX-License-Identifier: BSD-3-Clause
|
|
|
|
Copyright(c) 2016 Intel Corporation.
|
2016-12-12 14:38:38 +00:00
|
|
|
|
2018-01-23 14:29:26 +00:00
|
|
|
Tap Poll Mode Driver
|
|
|
|
====================
|
2016-12-12 14:38:38 +00:00
|
|
|
|
2018-01-23 14:29:26 +00:00
|
|
|
The ``rte_eth_tap.c`` PMD creates a device using TAP interfaces on the
|
2016-12-12 14:38:38 +00:00
|
|
|
local host. The PMD allows for DPDK and the host to communicate using a raw
|
|
|
|
device interface on the host and in the DPDK application.
|
|
|
|
|
|
|
|
The device created is a TAP device, which sends/receives packet in a raw
|
|
|
|
format with a L2 header. The usage for a TAP PMD is for connectivity to the
|
|
|
|
local host using a TAP interface. When the TAP PMD is initialized it will
|
|
|
|
create a number of tap devices in the host accessed via ``ifconfig -a`` or
|
|
|
|
``ip`` command. The commands can be used to assign and query the virtual like
|
|
|
|
device.
|
|
|
|
|
|
|
|
These TAP interfaces can be used with Wireshark or tcpdump or Pktgen-DPDK
|
|
|
|
along with being able to be used as a network connection to the DPDK
|
|
|
|
application. The method enable one or more interfaces is to use the
|
2017-02-06 19:40:32 +00:00
|
|
|
``--vdev=net_tap0`` option on the DPDK application command line. Each
|
2017-04-12 07:30:21 +00:00
|
|
|
``--vdev=net_tap1`` option given will create an interface named dtap0, dtap1,
|
2016-12-12 14:38:38 +00:00
|
|
|
and so on.
|
|
|
|
|
2017-02-06 19:40:32 +00:00
|
|
|
The interface name can be changed by adding the ``iface=foo0``, for example::
|
2016-12-12 14:38:38 +00:00
|
|
|
|
2017-02-06 19:40:32 +00:00
|
|
|
--vdev=net_tap0,iface=foo0 --vdev=net_tap1,iface=foo1, ...
|
2016-12-12 14:38:38 +00:00
|
|
|
|
2017-04-12 07:30:21 +00:00
|
|
|
Normally the PMD will generate a random MAC address, but when testing or with
|
|
|
|
a static configuration the developer may need a fixed MAC address style.
|
|
|
|
Using the option ``mac=fixed`` you can create a fixed known MAC address::
|
|
|
|
|
|
|
|
--vdev=net_tap0,mac=fixed
|
|
|
|
|
|
|
|
The MAC address will have a fixed value with the last octet incrementing by one
|
|
|
|
for each interface string containing ``mac=fixed``. The MAC address is formatted
|
|
|
|
as 00:'d':'t':'a':'p':[00-FF]. Convert the characters to hex and you get the
|
|
|
|
actual MAC address: ``00:64:74:61:70:[00-FF]``.
|
|
|
|
|
2017-03-23 08:42:11 +00:00
|
|
|
It is possible to specify a remote netdevice to capture packets from by adding
|
|
|
|
``remote=foo1``, for example::
|
|
|
|
|
|
|
|
--vdev=net_tap,iface=tap0,remote=foo1
|
|
|
|
|
|
|
|
If a ``remote`` is set, the tap MAC address will be set to match the remote one
|
|
|
|
just after netdevice creation. Using TC rules, traffic from the remote netdevice
|
|
|
|
will be redirected to the tap. If the tap is in promiscuous mode, then all
|
|
|
|
packets will be redirected. In allmulti mode, all multicast packets will be
|
|
|
|
redirected.
|
|
|
|
|
|
|
|
Using the remote feature is especially useful for capturing traffic from a
|
|
|
|
netdevice that has no support in the DPDK. It is possible to add explicit
|
|
|
|
rte_flow rules on the tap PMD to capture specific traffic (see next section for
|
|
|
|
examples).
|
|
|
|
|
2016-12-12 14:38:38 +00:00
|
|
|
After the DPDK application is started you can send and receive packets on the
|
|
|
|
interface using the standard rx_burst/tx_burst APIs in DPDK. From the host
|
|
|
|
point of view you can use any host tool like tcpdump, Wireshark, ping, Pktgen
|
|
|
|
and others to communicate with the DPDK application. The DPDK application may
|
|
|
|
not understand network protocols like IPv4/6, UDP or TCP unless the
|
|
|
|
application has been written to understand these protocols.
|
|
|
|
|
|
|
|
If you need the interface as a real network interface meaning running and has
|
|
|
|
a valid IP address then you can do this with the following commands::
|
|
|
|
|
|
|
|
sudo ip link set dtap0 up; sudo ip addr add 192.168.0.250/24 dev dtap0
|
|
|
|
sudo ip link set dtap1 up; sudo ip addr add 192.168.1.250/24 dev dtap1
|
|
|
|
|
|
|
|
Please change the IP addresses as you see fit.
|
|
|
|
|
|
|
|
If routing is enabled on the host you can also communicate with the DPDK App
|
|
|
|
over the internet via a standard socket layer application as long as you
|
|
|
|
account for the protocol handing in the application.
|
|
|
|
|
|
|
|
If you have a Network Stack in your DPDK application or something like it you
|
|
|
|
can utilize that stack to handle the network protocols. Plus you would be able
|
|
|
|
to address the interface using an IP address assigned to the internal
|
|
|
|
interface.
|
|
|
|
|
net/tap: add basic flow API patterns and actions
Supported flow rules are now mapped to TC rules on the tap netdevice.
The netlink message used for creating the TC rule is stored in struct
rte_flow. That way, by simply changing a metadata in it, we can require
for the rule deletion without further parsing.
Supported items:
- eth: src and dst (with variable masks), and eth_type (0xffff mask).
- vlan: vid, pcp, tpid, but not eid.
- ipv4/6: src and dst (with variable masks), and ip_proto (0xffff mask).
- udp/tcp: src and dst port (0xffff) mask.
Supported actions:
- DROP
- QUEUE
- PASSTHRU
It is generally not possible to provide a "last" item. However, if the
"last" item, once masked, is identical to the masked spec, then it is
supported.
Only IPv4/6 and MAC addresses can use a variable mask. All other
items need a full mask (exact match).
Support for VLAN requires kernel headers >= 4.9, checked using
auto-config.sh.
Signed-off-by: Pascal Mazon <pascal.mazon@6wind.com>
Acked-by: Olga Shern <olgas@mellanox.com>
Acked-by: Keith Wiles <keith.wiles@intel.com>
2017-03-23 08:33:57 +00:00
|
|
|
Flow API support
|
|
|
|
----------------
|
|
|
|
|
|
|
|
The tap PMD supports major flow API pattern items and actions, when running on
|
2017-09-20 13:03:13 +00:00
|
|
|
linux kernels above 4.2 ("Flower" classifier required).
|
|
|
|
The kernel support can be checked with this command::
|
|
|
|
|
|
|
|
zcat /proc/config.gz | ( grep 'CLS_FLOWER=' || echo 'not supported' ) |
|
|
|
|
tee -a /dev/stderr | grep -q '=m' &&
|
|
|
|
lsmod | ( grep cls_flower || echo 'try modprobe cls_flower' )
|
|
|
|
|
|
|
|
Supported items:
|
net/tap: add basic flow API patterns and actions
Supported flow rules are now mapped to TC rules on the tap netdevice.
The netlink message used for creating the TC rule is stored in struct
rte_flow. That way, by simply changing a metadata in it, we can require
for the rule deletion without further parsing.
Supported items:
- eth: src and dst (with variable masks), and eth_type (0xffff mask).
- vlan: vid, pcp, tpid, but not eid.
- ipv4/6: src and dst (with variable masks), and ip_proto (0xffff mask).
- udp/tcp: src and dst port (0xffff) mask.
Supported actions:
- DROP
- QUEUE
- PASSTHRU
It is generally not possible to provide a "last" item. However, if the
"last" item, once masked, is identical to the masked spec, then it is
supported.
Only IPv4/6 and MAC addresses can use a variable mask. All other
items need a full mask (exact match).
Support for VLAN requires kernel headers >= 4.9, checked using
auto-config.sh.
Signed-off-by: Pascal Mazon <pascal.mazon@6wind.com>
Acked-by: Olga Shern <olgas@mellanox.com>
Acked-by: Keith Wiles <keith.wiles@intel.com>
2017-03-23 08:33:57 +00:00
|
|
|
|
|
|
|
- eth: src and dst (with variable masks), and eth_type (0xffff mask).
|
|
|
|
- vlan: vid, pcp, tpid, but not eid. (requires kernel 4.9)
|
|
|
|
- ipv4/6: src and dst (with variable masks), and ip_proto (0xffff mask).
|
|
|
|
- udp/tcp: src and dst port (0xffff) mask.
|
|
|
|
|
|
|
|
Supported actions:
|
|
|
|
|
|
|
|
- DROP
|
|
|
|
- QUEUE
|
|
|
|
- PASSTHRU
|
2018-02-08 14:54:14 +00:00
|
|
|
- RSS (requires kernel 4.9)
|
net/tap: add basic flow API patterns and actions
Supported flow rules are now mapped to TC rules on the tap netdevice.
The netlink message used for creating the TC rule is stored in struct
rte_flow. That way, by simply changing a metadata in it, we can require
for the rule deletion without further parsing.
Supported items:
- eth: src and dst (with variable masks), and eth_type (0xffff mask).
- vlan: vid, pcp, tpid, but not eid.
- ipv4/6: src and dst (with variable masks), and ip_proto (0xffff mask).
- udp/tcp: src and dst port (0xffff) mask.
Supported actions:
- DROP
- QUEUE
- PASSTHRU
It is generally not possible to provide a "last" item. However, if the
"last" item, once masked, is identical to the masked spec, then it is
supported.
Only IPv4/6 and MAC addresses can use a variable mask. All other
items need a full mask (exact match).
Support for VLAN requires kernel headers >= 4.9, checked using
auto-config.sh.
Signed-off-by: Pascal Mazon <pascal.mazon@6wind.com>
Acked-by: Olga Shern <olgas@mellanox.com>
Acked-by: Keith Wiles <keith.wiles@intel.com>
2017-03-23 08:33:57 +00:00
|
|
|
|
|
|
|
It is generally not possible to provide a "last" item. However, if the "last"
|
|
|
|
item, once masked, is identical to the masked spec, then it is supported.
|
|
|
|
|
|
|
|
Only IPv4/6 and MAC addresses can use a variable mask. All other items need a
|
|
|
|
full mask (exact match).
|
|
|
|
|
|
|
|
As rules are translated to TC, it is possible to show them with something like::
|
|
|
|
|
|
|
|
tc -s filter show dev tap1 parent 1:
|
|
|
|
|
|
|
|
Examples of testpmd flow rules
|
|
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
Drop packets for destination IP 192.168.0.1::
|
|
|
|
|
|
|
|
testpmd> flow create 0 priority 1 ingress pattern eth / ipv4 dst is 1.1.1.1 \
|
|
|
|
/ end actions drop / end
|
|
|
|
|
|
|
|
Ensure packets from a given MAC address are received on a queue 2::
|
|
|
|
|
|
|
|
testpmd> flow create 0 priority 2 ingress pattern eth src is 06:05:04:03:02:01 \
|
|
|
|
/ end actions queue index 2 / end
|
|
|
|
|
|
|
|
Drop UDP packets in vlan 3::
|
|
|
|
|
|
|
|
testpmd> flow create 0 priority 3 ingress pattern eth / vlan vid is 3 / \
|
|
|
|
ipv4 proto is 17 / end actions drop / end
|
|
|
|
|
2018-01-20 21:11:37 +00:00
|
|
|
Distribute IPv4 TCP packets using RSS to a given MAC address over queues 0-3::
|
|
|
|
|
|
|
|
testpmd> flow create 0 priority 4 ingress pattern eth dst is 0a:0b:0c:0d:0e:0f \
|
|
|
|
/ ipv4 / tcp / end actions rss queues 0 1 2 3 end / end
|
|
|
|
|
2016-12-12 14:38:38 +00:00
|
|
|
Example
|
|
|
|
-------
|
|
|
|
|
2018-01-23 14:29:26 +00:00
|
|
|
The following is a simple example of using the TAP PMD with the Pktgen
|
2016-12-12 14:38:38 +00:00
|
|
|
packet generator. It requires that the ``socat`` utility is installed on the
|
|
|
|
test system.
|
|
|
|
|
|
|
|
Build DPDK, then pull down Pktgen and build pktgen using the DPDK SDK/Target
|
|
|
|
used to build the dpdk you pulled down.
|
|
|
|
|
|
|
|
Run pktgen from the pktgen directory in a terminal with a commandline like the
|
|
|
|
following::
|
|
|
|
|
|
|
|
sudo ./app/app/x86_64-native-linuxapp-gcc/app/pktgen -l 1-5 -n 4 \
|
|
|
|
--proc-type auto --log-level 8 --socket-mem 512,512 --file-prefix pg \
|
2017-02-06 19:40:32 +00:00
|
|
|
--vdev=net_tap0 --vdev=net_tap1 -b 05:00.0 -b 05:00.1 \
|
2016-12-12 14:38:38 +00:00
|
|
|
-b 04:00.0 -b 04:00.1 -b 04:00.2 -b 04:00.3 \
|
|
|
|
-b 81:00.0 -b 81:00.1 -b 81:00.2 -b 81:00.3 \
|
|
|
|
-b 82:00.0 -b 83:00.0 -- -T -P -m [2:3].0 -m [4:5].1 \
|
|
|
|
-f themes/black-yellow.theme
|
|
|
|
|
|
|
|
.. Note:
|
|
|
|
|
|
|
|
Change the ``-b`` options to blacklist all of your physical ports. The
|
|
|
|
following command line is all one line.
|
|
|
|
|
|
|
|
Also, ``-f themes/black-yellow.theme`` is optional if the default colors
|
|
|
|
work on your system configuration. See the Pktgen docs for more
|
|
|
|
information.
|
|
|
|
|
|
|
|
Verify with ``ifconfig -a`` command in a different xterm window, should have a
|
|
|
|
``dtap0`` and ``dtap1`` interfaces created.
|
|
|
|
|
|
|
|
Next set the links for the two interfaces to up via the commands below::
|
|
|
|
|
|
|
|
sudo ip link set dtap0 up; sudo ip addr add 192.168.0.250/24 dev dtap0
|
|
|
|
sudo ip link set dtap1 up; sudo ip addr add 192.168.1.250/24 dev dtap1
|
|
|
|
|
|
|
|
Then use socat to create a loopback for the two interfaces::
|
|
|
|
|
|
|
|
sudo socat interface:dtap0 interface:dtap1
|
|
|
|
|
|
|
|
Then on the Pktgen command line interface you can start sending packets using
|
|
|
|
the commands ``start 0`` and ``start 1`` or you can start both at the same
|
|
|
|
time with ``start all``. The command ``str`` is an alias for ``start all`` and
|
|
|
|
``stp`` is an alias for ``stop all``.
|
|
|
|
|
|
|
|
While running you should see the 64 byte counters increasing to verify the
|
|
|
|
traffic is being looped back. You can use ``set all size XXX`` to change the
|
2017-02-06 19:40:32 +00:00
|
|
|
size of the packets after you stop the traffic. Use pktgen ``help``
|
2016-12-12 14:38:38 +00:00
|
|
|
command to see a list of all commands. You can also use the ``-f`` option to
|
2017-02-06 19:40:32 +00:00
|
|
|
load commands at startup in command line or Lua script in pktgen.
|
2018-01-20 21:11:37 +00:00
|
|
|
|
|
|
|
RSS specifics
|
|
|
|
-------------
|
|
|
|
Packet distribution in TAP is done by the kernel which has a default
|
|
|
|
distribution. This feature is adding RSS distribution based on eBPF code.
|
|
|
|
The default eBPF code calculates RSS hash based on Toeplitz algorithm for
|
|
|
|
a fixed RSS key. It is calculated on fixed packet offsets. For IPv4 and IPv6 it
|
|
|
|
is calculated over src/dst addresses (8 or 32 bytes for IPv4 or IPv6
|
|
|
|
respectively) and src/dst TCP/UDP ports (4 bytes).
|
|
|
|
|
|
|
|
The RSS algorithm is written in file ``tap_bpf_program.c`` which
|
|
|
|
does not take part in TAP PMD compilation. Instead this file is compiled
|
|
|
|
in advance to eBPF object file. The eBPF object file is then parsed and
|
|
|
|
translated into eBPF byte code in the format of C arrays of eBPF
|
|
|
|
instructions. The C array of eBPF instructions is part of TAP PMD tree and
|
|
|
|
is taking part in TAP PMD compilation. At run time the C arrays are uploaded to
|
|
|
|
the kernel via BPF system calls and the RSS hash is calculated by the
|
|
|
|
kernel.
|
|
|
|
|
|
|
|
It is possible to support different RSS hash algorithms by updating file
|
|
|
|
``tap_bpf_program.c`` In order to add a new RSS hash algorithm follow these
|
|
|
|
steps:
|
|
|
|
|
|
|
|
1. Write the new RSS implementation in file ``tap_bpf_program.c``
|
|
|
|
|
|
|
|
BPF programs which are uploaded to the kernel correspond to
|
|
|
|
C functions under different ELF sections.
|
|
|
|
|
|
|
|
2. Install ``LLVM`` library and ``clang`` compiler versions 3.7 and above
|
|
|
|
|
|
|
|
3. Compile ``tap_bpf_program.c`` via ``LLVM`` into an object file::
|
|
|
|
|
|
|
|
clang -O2 -emit-llvm -c tap_bpf_program.c -o - | llc -march=bpf \
|
|
|
|
-filetype=obj -o <tap_bpf_program.o>
|
|
|
|
|
|
|
|
|
|
|
|
4. Use a tool that receives two parameters: an eBPF object file and a section
|
|
|
|
name, and prints out the section as a C array of eBPF instructions.
|
|
|
|
Embed the C array in your TAP PMD tree.
|
|
|
|
|
|
|
|
The C arrays are uploaded to the kernel using BPF system calls.
|
|
|
|
|
|
|
|
``tc`` (traffic control) is a well known user space utility program used to
|
|
|
|
configure the Linux kernel packet scheduler. It is usually packaged as
|
|
|
|
part of the ``iproute2`` package.
|
|
|
|
Since commit 11c39b5e9 ("tc: add eBPF support to f_bpf") ``tc`` can be used
|
|
|
|
to uploads eBPF code to the kernel and can be patched in order to print the
|
|
|
|
C arrays of eBPF instructions just before calling the BPF system call.
|
|
|
|
Please refer to ``iproute2`` package file ``lib/bpf.c`` function
|
|
|
|
``bpf_prog_load()``.
|
|
|
|
|
|
|
|
An example utility for eBPF instruction generation in the format of C arrays will
|
|
|
|
be added in next releases
|
|
|
|
|
2018-02-08 14:54:14 +00:00
|
|
|
Systems supporting flow API
|
|
|
|
---------------------------
|
|
|
|
|
|
|
|
- "tc flower" classifier requires linux kernel above 4.2
|
|
|
|
- eBPF/RSS requires linux kernel above 4.9
|
|
|
|
|
|
|
|
+--------------------+-----------------------+
|
|
|
|
| RH7.3 | No flow rule support |
|
|
|
|
+--------------------+-----------------------+
|
|
|
|
| RH7.4 | No RSS action support |
|
|
|
|
+--------------------+-----------------------+
|
|
|
|
| RH7.5 | No RSS action support |
|
|
|
|
+--------------------+-----------------------+
|
|
|
|
| SLES 15, | No limitation |
|
|
|
|
| kernel 4.12 | |
|
|
|
|
+--------------------+-----------------------+
|
|
|
|
| Azure Ubuntu 16.04,| No limitation |
|
|
|
|
| kernel 4.13 | |
|
|
|
|
+--------------------+-----------------------+
|
|
|
|
|