examples/ip_pipeline: add table entry commands
Add commands to add pipeline table entries which contains match and action part. Signed-off-by: Cristian Dumitrescu <cristian.dumitrescu@intel.com> Signed-off-by: Jasvinder Singh <jasvinder.singh@intel.com> Signed-off-by: Kevin Laatz <kevin.laatz@intel.com>
This commit is contained in:
parent
50e73d0518
commit
a3a95b7d58
File diff suppressed because it is too large
Load Diff
@ -295,4 +295,17 @@ pipeline_table_stats_read(const char *pipeline_name,
|
||||
struct rte_pipeline_table_stats *stats,
|
||||
int clear);
|
||||
|
||||
int
|
||||
pipeline_table_rule_add(const char *pipeline_name,
|
||||
uint32_t table_id,
|
||||
struct table_rule_match *match,
|
||||
struct table_rule_action *action,
|
||||
void **data);
|
||||
|
||||
int
|
||||
pipeline_table_rule_add_default(const char *pipeline_name,
|
||||
uint32_t table_id,
|
||||
struct table_rule_action *action,
|
||||
void **data);
|
||||
|
||||
#endif /* _INCLUDE_PIPELINE_H_ */
|
||||
|
@ -488,6 +488,8 @@ enum pipeline_req_type {
|
||||
|
||||
/* Table */
|
||||
PIPELINE_REQ_TABLE_STATS_READ,
|
||||
PIPELINE_REQ_TABLE_RULE_ADD,
|
||||
PIPELINE_REQ_TABLE_RULE_ADD_DEFAULT,
|
||||
|
||||
PIPELINE_REQ_MAX
|
||||
};
|
||||
@ -504,6 +506,15 @@ struct pipeline_msg_req_table_stats_read {
|
||||
int clear;
|
||||
};
|
||||
|
||||
struct pipeline_msg_req_table_rule_add {
|
||||
struct table_rule_match match;
|
||||
struct table_rule_action action;
|
||||
};
|
||||
|
||||
struct pipeline_msg_req_table_rule_add_default {
|
||||
struct table_rule_action action;
|
||||
};
|
||||
|
||||
struct pipeline_msg_req {
|
||||
enum pipeline_req_type type;
|
||||
uint32_t id; /* Port IN, port OUT or table ID */
|
||||
@ -513,6 +524,8 @@ struct pipeline_msg_req {
|
||||
struct pipeline_msg_req_port_in_stats_read port_in_stats_read;
|
||||
struct pipeline_msg_req_port_out_stats_read port_out_stats_read;
|
||||
struct pipeline_msg_req_table_stats_read table_stats_read;
|
||||
struct pipeline_msg_req_table_rule_add table_rule_add;
|
||||
struct pipeline_msg_req_table_rule_add_default table_rule_add_default;
|
||||
};
|
||||
};
|
||||
|
||||
@ -528,6 +541,14 @@ struct pipeline_msg_rsp_table_stats_read {
|
||||
struct rte_pipeline_table_stats stats;
|
||||
};
|
||||
|
||||
struct pipeline_msg_rsp_table_rule_add {
|
||||
void *data;
|
||||
};
|
||||
|
||||
struct pipeline_msg_rsp_table_rule_add_default {
|
||||
void *data;
|
||||
};
|
||||
|
||||
struct pipeline_msg_rsp {
|
||||
int status;
|
||||
|
||||
@ -536,6 +557,8 @@ struct pipeline_msg_rsp {
|
||||
struct pipeline_msg_rsp_port_in_stats_read port_in_stats_read;
|
||||
struct pipeline_msg_rsp_port_out_stats_read port_out_stats_read;
|
||||
struct pipeline_msg_rsp_table_stats_read table_stats_read;
|
||||
struct pipeline_msg_rsp_table_rule_add table_rule_add;
|
||||
struct pipeline_msg_rsp_table_rule_add_default table_rule_add_default;
|
||||
};
|
||||
};
|
||||
|
||||
@ -807,6 +830,272 @@ pipeline_table_stats_read(const char *pipeline_name,
|
||||
return status;
|
||||
}
|
||||
|
||||
static int
|
||||
match_check(struct table_rule_match *match,
|
||||
struct pipeline *p,
|
||||
uint32_t table_id)
|
||||
{
|
||||
struct table *table;
|
||||
|
||||
if ((match == NULL) ||
|
||||
(p == NULL) ||
|
||||
(table_id >= p->n_tables))
|
||||
return -1;
|
||||
|
||||
table = &p->table[table_id];
|
||||
if (match->match_type != table->params.match_type)
|
||||
return -1;
|
||||
|
||||
switch (match->match_type) {
|
||||
case TABLE_ACL:
|
||||
{
|
||||
struct table_acl_params *t = &table->params.match.acl;
|
||||
struct table_rule_match_acl *r = &match->match.acl;
|
||||
|
||||
if ((r->ip_version && (t->ip_version == 0)) ||
|
||||
((r->ip_version == 0) && t->ip_version))
|
||||
return -1;
|
||||
|
||||
if (r->ip_version) {
|
||||
if ((r->sa_depth > 32) ||
|
||||
(r->da_depth > 32))
|
||||
return -1;
|
||||
} else {
|
||||
if ((r->sa_depth > 128) ||
|
||||
(r->da_depth > 128))
|
||||
return -1;
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
case TABLE_ARRAY:
|
||||
return 0;
|
||||
|
||||
case TABLE_HASH:
|
||||
return 0;
|
||||
|
||||
case TABLE_LPM:
|
||||
{
|
||||
struct table_lpm_params *t = &table->params.match.lpm;
|
||||
struct table_rule_match_lpm *r = &match->match.lpm;
|
||||
|
||||
if ((r->ip_version && (t->key_size != 4)) ||
|
||||
((r->ip_version == 0) && (t->key_size != 16)))
|
||||
return -1;
|
||||
|
||||
if (r->ip_version) {
|
||||
if (r->depth > 32)
|
||||
return -1;
|
||||
} else {
|
||||
if (r->depth > 128)
|
||||
return -1;
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
case TABLE_STUB:
|
||||
return -1;
|
||||
|
||||
default:
|
||||
return -1;
|
||||
}
|
||||
}
|
||||
|
||||
static int
|
||||
action_check(struct table_rule_action *action,
|
||||
struct pipeline *p,
|
||||
uint32_t table_id)
|
||||
{
|
||||
struct table_action_profile *ap;
|
||||
|
||||
if ((action == NULL) ||
|
||||
(p == NULL) ||
|
||||
(table_id >= p->n_tables))
|
||||
return -1;
|
||||
|
||||
ap = p->table[table_id].ap;
|
||||
if (action->action_mask != ap->params.action_mask)
|
||||
return -1;
|
||||
|
||||
if (action->action_mask & (1LLU << RTE_TABLE_ACTION_FWD)) {
|
||||
if ((action->fwd.action == RTE_PIPELINE_ACTION_PORT) &&
|
||||
(action->fwd.id >= p->n_ports_out))
|
||||
return -1;
|
||||
|
||||
if ((action->fwd.action == RTE_PIPELINE_ACTION_TABLE) &&
|
||||
(action->fwd.id >= p->n_tables))
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (action->action_mask & (1LLU << RTE_TABLE_ACTION_MTR)) {
|
||||
uint32_t tc_mask0 = (1 << ap->params.mtr.n_tc) - 1;
|
||||
uint32_t tc_mask1 = action->mtr.tc_mask;
|
||||
|
||||
if (tc_mask1 != tc_mask0)
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (action->action_mask & (1LLU << RTE_TABLE_ACTION_TM)) {
|
||||
uint32_t n_subports_per_port =
|
||||
ap->params.tm.n_subports_per_port;
|
||||
uint32_t n_pipes_per_subport =
|
||||
ap->params.tm.n_pipes_per_subport;
|
||||
uint32_t subport_id = action->tm.subport_id;
|
||||
uint32_t pipe_id = action->tm.pipe_id;
|
||||
|
||||
if ((subport_id >= n_subports_per_port) ||
|
||||
(pipe_id >= n_pipes_per_subport))
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (action->action_mask & (1LLU << RTE_TABLE_ACTION_ENCAP)) {
|
||||
uint64_t encap_mask = ap->params.encap.encap_mask;
|
||||
enum rte_table_action_encap_type type = action->encap.type;
|
||||
|
||||
if ((encap_mask & (1LLU << type)) == 0)
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (action->action_mask & (1LLU << RTE_TABLE_ACTION_NAT)) {
|
||||
int ip_version0 = ap->params.common.ip_version;
|
||||
int ip_version1 = action->nat.ip_version;
|
||||
|
||||
if ((ip_version1 && (ip_version0 == 0)) ||
|
||||
((ip_version1 == 0) && ip_version0))
|
||||
return -1;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int
|
||||
action_default_check(struct table_rule_action *action,
|
||||
struct pipeline *p,
|
||||
uint32_t table_id)
|
||||
{
|
||||
if ((action == NULL) ||
|
||||
(action->action_mask != (1LLU << RTE_TABLE_ACTION_FWD)) ||
|
||||
(p == NULL) ||
|
||||
(table_id >= p->n_tables))
|
||||
return -1;
|
||||
|
||||
if (action->action_mask & (1LLU << RTE_TABLE_ACTION_FWD)) {
|
||||
if ((action->fwd.action == RTE_PIPELINE_ACTION_PORT) &&
|
||||
(action->fwd.id >= p->n_ports_out))
|
||||
return -1;
|
||||
|
||||
if ((action->fwd.action == RTE_PIPELINE_ACTION_TABLE) &&
|
||||
(action->fwd.id >= p->n_tables))
|
||||
return -1;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int
|
||||
pipeline_table_rule_add(const char *pipeline_name,
|
||||
uint32_t table_id,
|
||||
struct table_rule_match *match,
|
||||
struct table_rule_action *action,
|
||||
void **data)
|
||||
{
|
||||
struct pipeline *p;
|
||||
struct pipeline_msg_req *req;
|
||||
struct pipeline_msg_rsp *rsp;
|
||||
int status;
|
||||
|
||||
/* Check input params */
|
||||
if ((pipeline_name == NULL) ||
|
||||
(match == NULL) ||
|
||||
(action == NULL) ||
|
||||
(data == NULL))
|
||||
return -1;
|
||||
|
||||
p = pipeline_find(pipeline_name);
|
||||
if ((p == NULL) ||
|
||||
(p->enabled == 0) ||
|
||||
(table_id >= p->n_tables) ||
|
||||
match_check(match, p, table_id) ||
|
||||
action_check(action, p, table_id))
|
||||
return -1;
|
||||
|
||||
/* Allocate request */
|
||||
req = pipeline_msg_alloc();
|
||||
if (req == NULL)
|
||||
return -1;
|
||||
|
||||
/* Write request */
|
||||
req->type = PIPELINE_REQ_TABLE_RULE_ADD;
|
||||
req->id = table_id;
|
||||
memcpy(&req->table_rule_add.match, match, sizeof(*match));
|
||||
memcpy(&req->table_rule_add.action, action, sizeof(*action));
|
||||
|
||||
/* Send request and wait for response */
|
||||
rsp = pipeline_msg_send_recv(p, req);
|
||||
if (rsp == NULL)
|
||||
return -1;
|
||||
|
||||
/* Read response */
|
||||
status = rsp->status;
|
||||
if (status == 0)
|
||||
*data = rsp->table_rule_add.data;
|
||||
|
||||
/* Free response */
|
||||
pipeline_msg_free(rsp);
|
||||
|
||||
return status;
|
||||
}
|
||||
|
||||
int
|
||||
pipeline_table_rule_add_default(const char *pipeline_name,
|
||||
uint32_t table_id,
|
||||
struct table_rule_action *action,
|
||||
void **data)
|
||||
{
|
||||
struct pipeline *p;
|
||||
struct pipeline_msg_req *req;
|
||||
struct pipeline_msg_rsp *rsp;
|
||||
int status;
|
||||
|
||||
/* Check input params */
|
||||
if ((pipeline_name == NULL) ||
|
||||
(action == NULL) ||
|
||||
(data == NULL))
|
||||
return -1;
|
||||
|
||||
p = pipeline_find(pipeline_name);
|
||||
if ((p == NULL) ||
|
||||
(p->enabled == 0) ||
|
||||
(table_id >= p->n_tables) ||
|
||||
action_default_check(action, p, table_id))
|
||||
return -1;
|
||||
|
||||
/* Allocate request */
|
||||
req = pipeline_msg_alloc();
|
||||
if (req == NULL)
|
||||
return -1;
|
||||
|
||||
/* Write request */
|
||||
req->type = PIPELINE_REQ_TABLE_RULE_ADD_DEFAULT;
|
||||
req->id = table_id;
|
||||
memcpy(&req->table_rule_add_default.action, action, sizeof(*action));
|
||||
|
||||
/* Send request and wait for response */
|
||||
rsp = pipeline_msg_send_recv(p, req);
|
||||
if (rsp == NULL)
|
||||
return -1;
|
||||
|
||||
/* Read response */
|
||||
status = rsp->status;
|
||||
if (status == 0)
|
||||
*data = rsp->table_rule_add_default.data;
|
||||
|
||||
/* Free response */
|
||||
pipeline_msg_free(rsp);
|
||||
|
||||
return status;
|
||||
}
|
||||
|
||||
/**
|
||||
* Data plane threads: message handling
|
||||
*/
|
||||
@ -908,6 +1197,461 @@ pipeline_msg_handle_table_stats_read(struct pipeline_data *p,
|
||||
return rsp;
|
||||
}
|
||||
|
||||
union table_rule_match_low_level {
|
||||
struct rte_table_acl_rule_add_params acl_add;
|
||||
struct rte_table_acl_rule_delete_params acl_delete;
|
||||
struct rte_table_array_key array;
|
||||
uint8_t hash[TABLE_RULE_MATCH_SIZE_MAX];
|
||||
struct rte_table_lpm_key lpm_ipv4;
|
||||
struct rte_table_lpm_ipv6_key lpm_ipv6;
|
||||
};
|
||||
|
||||
static int
|
||||
match_convert_ipv6_depth(uint32_t depth, uint32_t *depth32)
|
||||
{
|
||||
if (depth > 128)
|
||||
return -1;
|
||||
|
||||
switch (depth / 32) {
|
||||
case 0:
|
||||
depth32[0] = depth;
|
||||
depth32[1] = 0;
|
||||
depth32[2] = 0;
|
||||
depth32[3] = 0;
|
||||
return 0;
|
||||
|
||||
case 1:
|
||||
depth32[0] = 32;
|
||||
depth32[1] = depth - 32;
|
||||
depth32[2] = 0;
|
||||
depth32[3] = 0;
|
||||
return 0;
|
||||
|
||||
case 2:
|
||||
depth32[0] = 32;
|
||||
depth32[1] = 32;
|
||||
depth32[2] = depth - 64;
|
||||
depth32[3] = 0;
|
||||
return 0;
|
||||
|
||||
case 3:
|
||||
depth32[0] = 32;
|
||||
depth32[1] = 32;
|
||||
depth32[2] = 32;
|
||||
depth32[3] = depth - 96;
|
||||
return 0;
|
||||
|
||||
case 4:
|
||||
depth32[0] = 32;
|
||||
depth32[1] = 32;
|
||||
depth32[2] = 32;
|
||||
depth32[3] = 32;
|
||||
return 0;
|
||||
|
||||
default:
|
||||
return -1;
|
||||
}
|
||||
}
|
||||
|
||||
static int
|
||||
match_convert(struct table_rule_match *mh,
|
||||
union table_rule_match_low_level *ml,
|
||||
int add)
|
||||
{
|
||||
memset(ml, 0, sizeof(*ml));
|
||||
|
||||
switch (mh->match_type) {
|
||||
case TABLE_ACL:
|
||||
if (mh->match.acl.ip_version)
|
||||
if (add) {
|
||||
ml->acl_add.field_value[0].value.u8 =
|
||||
mh->match.acl.proto;
|
||||
ml->acl_add.field_value[0].mask_range.u8 =
|
||||
mh->match.acl.proto_mask;
|
||||
|
||||
ml->acl_add.field_value[1].value.u32 =
|
||||
mh->match.acl.ipv4.sa;
|
||||
ml->acl_add.field_value[1].mask_range.u32 =
|
||||
mh->match.acl.sa_depth;
|
||||
|
||||
ml->acl_add.field_value[2].value.u32 =
|
||||
mh->match.acl.ipv4.da;
|
||||
ml->acl_add.field_value[2].mask_range.u32 =
|
||||
mh->match.acl.da_depth;
|
||||
|
||||
ml->acl_add.field_value[3].value.u16 =
|
||||
mh->match.acl.sp0;
|
||||
ml->acl_add.field_value[3].mask_range.u16 =
|
||||
mh->match.acl.sp1;
|
||||
|
||||
ml->acl_add.field_value[4].value.u16 =
|
||||
mh->match.acl.dp0;
|
||||
ml->acl_add.field_value[4].mask_range.u16 =
|
||||
mh->match.acl.dp1;
|
||||
|
||||
ml->acl_add.priority =
|
||||
(int32_t) mh->match.acl.priority;
|
||||
} else {
|
||||
ml->acl_delete.field_value[0].value.u8 =
|
||||
mh->match.acl.proto;
|
||||
ml->acl_delete.field_value[0].mask_range.u8 =
|
||||
mh->match.acl.proto_mask;
|
||||
|
||||
ml->acl_delete.field_value[1].value.u32 =
|
||||
mh->match.acl.ipv4.sa;
|
||||
ml->acl_delete.field_value[1].mask_range.u32 =
|
||||
mh->match.acl.sa_depth;
|
||||
|
||||
ml->acl_delete.field_value[2].value.u32 =
|
||||
mh->match.acl.ipv4.da;
|
||||
ml->acl_delete.field_value[2].mask_range.u32 =
|
||||
mh->match.acl.da_depth;
|
||||
|
||||
ml->acl_delete.field_value[3].value.u16 =
|
||||
mh->match.acl.sp0;
|
||||
ml->acl_delete.field_value[3].mask_range.u16 =
|
||||
mh->match.acl.sp1;
|
||||
|
||||
ml->acl_delete.field_value[4].value.u16 =
|
||||
mh->match.acl.dp0;
|
||||
ml->acl_delete.field_value[4].mask_range.u16 =
|
||||
mh->match.acl.dp1;
|
||||
}
|
||||
else
|
||||
if (add) {
|
||||
uint32_t *sa32 =
|
||||
(uint32_t *) mh->match.acl.ipv6.sa;
|
||||
uint32_t *da32 =
|
||||
(uint32_t *) mh->match.acl.ipv6.da;
|
||||
uint32_t sa32_depth[4], da32_depth[4];
|
||||
int status;
|
||||
|
||||
status = match_convert_ipv6_depth(
|
||||
mh->match.acl.sa_depth,
|
||||
sa32_depth);
|
||||
if (status)
|
||||
return status;
|
||||
|
||||
status = match_convert_ipv6_depth(
|
||||
mh->match.acl.da_depth,
|
||||
da32_depth);
|
||||
if (status)
|
||||
return status;
|
||||
|
||||
ml->acl_add.field_value[0].value.u8 =
|
||||
mh->match.acl.proto;
|
||||
ml->acl_add.field_value[0].mask_range.u8 =
|
||||
mh->match.acl.proto_mask;
|
||||
|
||||
ml->acl_add.field_value[1].value.u32 = sa32[0];
|
||||
ml->acl_add.field_value[1].mask_range.u32 =
|
||||
sa32_depth[0];
|
||||
ml->acl_add.field_value[2].value.u32 = sa32[1];
|
||||
ml->acl_add.field_value[2].mask_range.u32 =
|
||||
sa32_depth[1];
|
||||
ml->acl_add.field_value[3].value.u32 = sa32[2];
|
||||
ml->acl_add.field_value[3].mask_range.u32 =
|
||||
sa32_depth[2];
|
||||
ml->acl_add.field_value[4].value.u32 = sa32[3];
|
||||
ml->acl_add.field_value[4].mask_range.u32 =
|
||||
sa32_depth[3];
|
||||
|
||||
ml->acl_add.field_value[5].value.u32 = da32[0];
|
||||
ml->acl_add.field_value[5].mask_range.u32 =
|
||||
da32_depth[0];
|
||||
ml->acl_add.field_value[6].value.u32 = da32[1];
|
||||
ml->acl_add.field_value[6].mask_range.u32 =
|
||||
da32_depth[1];
|
||||
ml->acl_add.field_value[7].value.u32 = da32[2];
|
||||
ml->acl_add.field_value[7].mask_range.u32 =
|
||||
da32_depth[2];
|
||||
ml->acl_add.field_value[8].value.u32 = da32[3];
|
||||
ml->acl_add.field_value[8].mask_range.u32 =
|
||||
da32_depth[3];
|
||||
|
||||
ml->acl_add.field_value[9].value.u16 =
|
||||
mh->match.acl.sp0;
|
||||
ml->acl_add.field_value[9].mask_range.u16 =
|
||||
mh->match.acl.sp1;
|
||||
|
||||
ml->acl_add.field_value[10].value.u16 =
|
||||
mh->match.acl.dp0;
|
||||
ml->acl_add.field_value[10].mask_range.u16 =
|
||||
mh->match.acl.dp1;
|
||||
|
||||
ml->acl_add.priority =
|
||||
(int32_t) mh->match.acl.priority;
|
||||
} else {
|
||||
uint32_t *sa32 =
|
||||
(uint32_t *) mh->match.acl.ipv6.sa;
|
||||
uint32_t *da32 =
|
||||
(uint32_t *) mh->match.acl.ipv6.da;
|
||||
uint32_t sa32_depth[4], da32_depth[4];
|
||||
int status;
|
||||
|
||||
status = match_convert_ipv6_depth(
|
||||
mh->match.acl.sa_depth,
|
||||
sa32_depth);
|
||||
if (status)
|
||||
return status;
|
||||
|
||||
status = match_convert_ipv6_depth(
|
||||
mh->match.acl.da_depth,
|
||||
da32_depth);
|
||||
if (status)
|
||||
return status;
|
||||
|
||||
ml->acl_delete.field_value[0].value.u8 =
|
||||
mh->match.acl.proto;
|
||||
ml->acl_delete.field_value[0].mask_range.u8 =
|
||||
mh->match.acl.proto_mask;
|
||||
|
||||
ml->acl_delete.field_value[1].value.u32 =
|
||||
sa32[0];
|
||||
ml->acl_delete.field_value[1].mask_range.u32 =
|
||||
sa32_depth[0];
|
||||
ml->acl_delete.field_value[2].value.u32 =
|
||||
sa32[1];
|
||||
ml->acl_delete.field_value[2].mask_range.u32 =
|
||||
sa32_depth[1];
|
||||
ml->acl_delete.field_value[3].value.u32 =
|
||||
sa32[2];
|
||||
ml->acl_delete.field_value[3].mask_range.u32 =
|
||||
sa32_depth[2];
|
||||
ml->acl_delete.field_value[4].value.u32 =
|
||||
sa32[3];
|
||||
ml->acl_delete.field_value[4].mask_range.u32 =
|
||||
sa32_depth[3];
|
||||
|
||||
ml->acl_delete.field_value[5].value.u32 =
|
||||
da32[0];
|
||||
ml->acl_delete.field_value[5].mask_range.u32 =
|
||||
da32_depth[0];
|
||||
ml->acl_delete.field_value[6].value.u32 =
|
||||
da32[1];
|
||||
ml->acl_delete.field_value[6].mask_range.u32 =
|
||||
da32_depth[1];
|
||||
ml->acl_delete.field_value[7].value.u32 =
|
||||
da32[2];
|
||||
ml->acl_delete.field_value[7].mask_range.u32 =
|
||||
da32_depth[2];
|
||||
ml->acl_delete.field_value[8].value.u32 =
|
||||
da32[3];
|
||||
ml->acl_delete.field_value[8].mask_range.u32 =
|
||||
da32_depth[3];
|
||||
|
||||
ml->acl_delete.field_value[9].value.u16 =
|
||||
mh->match.acl.sp0;
|
||||
ml->acl_delete.field_value[9].mask_range.u16 =
|
||||
mh->match.acl.sp1;
|
||||
|
||||
ml->acl_delete.field_value[10].value.u16 =
|
||||
mh->match.acl.dp0;
|
||||
ml->acl_delete.field_value[10].mask_range.u16 =
|
||||
mh->match.acl.dp1;
|
||||
}
|
||||
return 0;
|
||||
|
||||
case TABLE_ARRAY:
|
||||
ml->array.pos = mh->match.array.pos;
|
||||
return 0;
|
||||
|
||||
case TABLE_HASH:
|
||||
memcpy(ml->hash, mh->match.hash.key, sizeof(ml->hash));
|
||||
return 0;
|
||||
|
||||
case TABLE_LPM:
|
||||
if (mh->match.lpm.ip_version) {
|
||||
ml->lpm_ipv4.ip = mh->match.lpm.ipv4;
|
||||
ml->lpm_ipv4.depth = mh->match.lpm.depth;
|
||||
} else {
|
||||
memcpy(ml->lpm_ipv6.ip,
|
||||
mh->match.lpm.ipv6, sizeof(ml->lpm_ipv6.ip));
|
||||
ml->lpm_ipv6.depth = mh->match.lpm.depth;
|
||||
}
|
||||
|
||||
return 0;
|
||||
|
||||
default:
|
||||
return -1;
|
||||
}
|
||||
}
|
||||
|
||||
static struct pipeline_msg_rsp *
|
||||
pipeline_msg_handle_table_rule_add(struct pipeline_data *p,
|
||||
struct pipeline_msg_req *req)
|
||||
{
|
||||
union table_rule_match_low_level match_ll;
|
||||
struct pipeline_msg_rsp *rsp = (struct pipeline_msg_rsp *) req;
|
||||
struct table_rule_match *match = &req->table_rule_add.match;
|
||||
struct table_rule_action *action = &req->table_rule_add.action;
|
||||
struct rte_pipeline_table_entry *data_in, *data_out;
|
||||
uint32_t table_id = req->id;
|
||||
int key_found, status;
|
||||
struct rte_table_action *a = p->table_data[table_id].a;
|
||||
|
||||
/* Apply actions */
|
||||
memset(p->buffer, 0, sizeof(p->buffer));
|
||||
data_in = (struct rte_pipeline_table_entry *) p->buffer;
|
||||
|
||||
if (action->action_mask & (1LLU << RTE_TABLE_ACTION_FWD)) {
|
||||
status = rte_table_action_apply(a,
|
||||
data_in,
|
||||
RTE_TABLE_ACTION_FWD,
|
||||
&action->fwd);
|
||||
|
||||
if (status) {
|
||||
rsp->status = -1;
|
||||
return rsp;
|
||||
}
|
||||
}
|
||||
|
||||
if (action->action_mask & (1LLU << RTE_TABLE_ACTION_MTR)) {
|
||||
status = rte_table_action_apply(a,
|
||||
data_in,
|
||||
RTE_TABLE_ACTION_MTR,
|
||||
&action->mtr);
|
||||
|
||||
if (status) {
|
||||
rsp->status = -1;
|
||||
return rsp;
|
||||
}
|
||||
}
|
||||
|
||||
if (action->action_mask & (1LLU << RTE_TABLE_ACTION_TM)) {
|
||||
status = rte_table_action_apply(a,
|
||||
data_in,
|
||||
RTE_TABLE_ACTION_TM,
|
||||
&action->tm);
|
||||
|
||||
if (status) {
|
||||
rsp->status = -1;
|
||||
return rsp;
|
||||
}
|
||||
}
|
||||
|
||||
if (action->action_mask & (1LLU << RTE_TABLE_ACTION_ENCAP)) {
|
||||
status = rte_table_action_apply(a,
|
||||
data_in,
|
||||
RTE_TABLE_ACTION_ENCAP,
|
||||
&action->encap);
|
||||
|
||||
if (status) {
|
||||
rsp->status = -1;
|
||||
return rsp;
|
||||
}
|
||||
}
|
||||
|
||||
if (action->action_mask & (1LLU << RTE_TABLE_ACTION_NAT)) {
|
||||
status = rte_table_action_apply(a,
|
||||
data_in,
|
||||
RTE_TABLE_ACTION_NAT,
|
||||
&action->nat);
|
||||
|
||||
if (status) {
|
||||
rsp->status = -1;
|
||||
return rsp;
|
||||
}
|
||||
}
|
||||
|
||||
if (action->action_mask & (1LLU << RTE_TABLE_ACTION_TTL)) {
|
||||
status = rte_table_action_apply(a,
|
||||
data_in,
|
||||
RTE_TABLE_ACTION_TTL,
|
||||
&action->ttl);
|
||||
|
||||
if (status) {
|
||||
rsp->status = -1;
|
||||
return rsp;
|
||||
}
|
||||
}
|
||||
|
||||
if (action->action_mask & (1LLU << RTE_TABLE_ACTION_STATS)) {
|
||||
status = rte_table_action_apply(a,
|
||||
data_in,
|
||||
RTE_TABLE_ACTION_STATS,
|
||||
&action->stats);
|
||||
|
||||
if (status) {
|
||||
rsp->status = -1;
|
||||
return rsp;
|
||||
}
|
||||
}
|
||||
|
||||
if (action->action_mask & (1LLU << RTE_TABLE_ACTION_TIME)) {
|
||||
status = rte_table_action_apply(a,
|
||||
data_in,
|
||||
RTE_TABLE_ACTION_TIME,
|
||||
&action->time);
|
||||
|
||||
if (status) {
|
||||
rsp->status = -1;
|
||||
return rsp;
|
||||
}
|
||||
}
|
||||
|
||||
/* Add rule (match, action) to table */
|
||||
status = match_convert(match, &match_ll, 1);
|
||||
if (status) {
|
||||
rsp->status = -1;
|
||||
return rsp;
|
||||
}
|
||||
|
||||
status = rte_pipeline_table_entry_add(p->p,
|
||||
table_id,
|
||||
&match_ll,
|
||||
data_in,
|
||||
&key_found,
|
||||
&data_out);
|
||||
if (status) {
|
||||
rsp->status = -1;
|
||||
return rsp;
|
||||
}
|
||||
|
||||
/* Write response */
|
||||
rsp->status = 0;
|
||||
rsp->table_rule_add.data = data_out;
|
||||
|
||||
return rsp;
|
||||
}
|
||||
|
||||
static struct pipeline_msg_rsp *
|
||||
pipeline_msg_handle_table_rule_add_default(struct pipeline_data *p,
|
||||
struct pipeline_msg_req *req)
|
||||
{
|
||||
struct pipeline_msg_rsp *rsp = (struct pipeline_msg_rsp *) req;
|
||||
struct table_rule_action *action = &req->table_rule_add_default.action;
|
||||
struct rte_pipeline_table_entry *data_in, *data_out;
|
||||
uint32_t table_id = req->id;
|
||||
int status;
|
||||
|
||||
/* Apply actions */
|
||||
memset(p->buffer, 0, sizeof(p->buffer));
|
||||
data_in = (struct rte_pipeline_table_entry *) p->buffer;
|
||||
|
||||
data_in->action = action->fwd.action;
|
||||
if (action->fwd.action == RTE_PIPELINE_ACTION_PORT)
|
||||
data_in->port_id = action->fwd.id;
|
||||
if (action->fwd.action == RTE_PIPELINE_ACTION_TABLE)
|
||||
data_in->table_id = action->fwd.id;
|
||||
|
||||
/* Add default rule to table */
|
||||
status = rte_pipeline_table_default_entry_add(p->p,
|
||||
table_id,
|
||||
data_in,
|
||||
&data_out);
|
||||
if (status) {
|
||||
rsp->status = -1;
|
||||
return rsp;
|
||||
}
|
||||
|
||||
/* Write response */
|
||||
rsp->status = 0;
|
||||
rsp->table_rule_add_default.data = data_out;
|
||||
|
||||
return rsp;
|
||||
}
|
||||
|
||||
static void
|
||||
pipeline_msg_handle(struct pipeline_data *p)
|
||||
{
|
||||
@ -940,6 +1684,13 @@ pipeline_msg_handle(struct pipeline_data *p)
|
||||
rsp = pipeline_msg_handle_table_stats_read(p, req);
|
||||
break;
|
||||
|
||||
case PIPELINE_REQ_TABLE_RULE_ADD:
|
||||
rsp = pipeline_msg_handle_table_rule_add(p, req);
|
||||
break;
|
||||
|
||||
case PIPELINE_REQ_TABLE_RULE_ADD_DEFAULT:
|
||||
rsp = pipeline_msg_handle_table_rule_add_default(p, req);
|
||||
break;
|
||||
|
||||
default:
|
||||
rsp = (struct pipeline_msg_rsp *) req;
|
||||
|
Loading…
Reference in New Issue
Block a user