9d441c4551
The patch supports ipv6 flow rules for BGP or ICMP packets. Signed-off-by: Xiaoyun Wang <cloud.wangxiaoyun@huawei.com>
3273 lines
93 KiB
C
3273 lines
93 KiB
C
/* SPDX-License-Identifier: BSD-3-Clause
|
|
* Copyright(c) 2017 Huawei Technologies Co., Ltd
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <errno.h>
|
|
#include <stdint.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
|
|
#include <rte_byteorder.h>
|
|
#include <rte_common.h>
|
|
#include <rte_ether.h>
|
|
#include <rte_ethdev.h>
|
|
#include <rte_malloc.h>
|
|
#include <rte_flow.h>
|
|
#include <rte_flow_driver.h>
|
|
#include "base/hinic_compat.h"
|
|
#include "base/hinic_pmd_hwdev.h"
|
|
#include "base/hinic_pmd_hwif.h"
|
|
#include "base/hinic_pmd_wq.h"
|
|
#include "base/hinic_pmd_cmdq.h"
|
|
#include "base/hinic_pmd_niccfg.h"
|
|
#include "hinic_pmd_ethdev.h"
|
|
|
|
#define HINIC_MAX_RX_QUEUE_NUM 64
|
|
|
|
#ifndef UINT8_MAX
|
|
#define UINT8_MAX (u8)(~((u8)0)) /* 0xFF */
|
|
#define UINT16_MAX (u16)(~((u16)0)) /* 0xFFFF */
|
|
#define UINT32_MAX (u32)(~((u32)0)) /* 0xFFFFFFFF */
|
|
#define UINT64_MAX (u64)(~((u64)0)) /* 0xFFFFFFFFFFFFFFFF */
|
|
#define ASCII_MAX (0x7F)
|
|
#endif
|
|
|
|
/* IPSURX MACRO */
|
|
#define PA_ETH_TYPE_ROCE 0
|
|
#define PA_ETH_TYPE_IPV4 1
|
|
#define PA_ETH_TYPE_IPV6 2
|
|
#define PA_ETH_TYPE_OTHER 3
|
|
|
|
#define PA_IP_PROTOCOL_TYPE_TCP 1
|
|
#define PA_IP_PROTOCOL_TYPE_UDP 2
|
|
#define PA_IP_PROTOCOL_TYPE_ICMP 3
|
|
#define PA_IP_PROTOCOL_TYPE_IPV4_IGMP 4
|
|
#define PA_IP_PROTOCOL_TYPE_SCTP 5
|
|
#define PA_IP_PROTOCOL_TYPE_VRRP 112
|
|
|
|
#define IP_HEADER_PROTOCOL_TYPE_TCP 6
|
|
#define IP_HEADER_PROTOCOL_TYPE_UDP 17
|
|
#define IP_HEADER_PROTOCOL_TYPE_ICMP 1
|
|
#define IP_HEADER_PROTOCOL_TYPE_ICMPV6 58
|
|
|
|
#define FDIR_TCAM_NORMAL_PACKET 0
|
|
#define FDIR_TCAM_TUNNEL_PACKET 1
|
|
|
|
#define HINIC_MIN_N_TUPLE_PRIO 1
|
|
#define HINIC_MAX_N_TUPLE_PRIO 7
|
|
|
|
/* TCAM type mask in hardware */
|
|
#define TCAM_PKT_BGP_SPORT 1
|
|
#define TCAM_PKT_VRRP 2
|
|
#define TCAM_PKT_BGP_DPORT 3
|
|
#define TCAM_PKT_LACP 4
|
|
|
|
#define TCAM_DIP_IPV4_TYPE 0
|
|
#define TCAM_DIP_IPV6_TYPE 1
|
|
|
|
#define BGP_DPORT_ID 179
|
|
#define IPPROTO_VRRP 112
|
|
|
|
/* Packet type defined in hardware to perform filter */
|
|
#define PKT_IGMP_IPV4_TYPE 64
|
|
#define PKT_ICMP_IPV4_TYPE 65
|
|
#define PKT_ICMP_IPV6_TYPE 66
|
|
#define PKT_ICMP_IPV6RS_TYPE 67
|
|
#define PKT_ICMP_IPV6RA_TYPE 68
|
|
#define PKT_ICMP_IPV6NS_TYPE 69
|
|
#define PKT_ICMP_IPV6NA_TYPE 70
|
|
#define PKT_ICMP_IPV6RE_TYPE 71
|
|
#define PKT_DHCP_IPV4_TYPE 72
|
|
#define PKT_DHCP_IPV6_TYPE 73
|
|
#define PKT_LACP_TYPE 74
|
|
#define PKT_ARP_REQ_TYPE 79
|
|
#define PKT_ARP_REP_TYPE 80
|
|
#define PKT_ARP_TYPE 81
|
|
#define PKT_BGPD_DPORT_TYPE 83
|
|
#define PKT_BGPD_SPORT_TYPE 84
|
|
#define PKT_VRRP_TYPE 85
|
|
|
|
#define HINIC_DEV_PRIVATE_TO_FILTER_INFO(nic_dev) \
|
|
(&((struct hinic_nic_dev *)nic_dev)->filter)
|
|
|
|
#define HINIC_DEV_PRIVATE_TO_TCAM_INFO(nic_dev) \
|
|
(&((struct hinic_nic_dev *)nic_dev)->tcam)
|
|
|
|
|
|
enum hinic_atr_flow_type {
|
|
HINIC_ATR_FLOW_TYPE_IPV4_DIP = 0x1,
|
|
HINIC_ATR_FLOW_TYPE_IPV4_SIP = 0x2,
|
|
HINIC_ATR_FLOW_TYPE_DPORT = 0x3,
|
|
HINIC_ATR_FLOW_TYPE_SPORT = 0x4,
|
|
};
|
|
|
|
/* Structure to store fdir's info. */
|
|
struct hinic_fdir_info {
|
|
uint8_t fdir_flag;
|
|
uint8_t qid;
|
|
uint32_t fdir_key;
|
|
};
|
|
|
|
/**
|
|
* Endless loop will never happen with below assumption
|
|
* 1. there is at least one no-void item(END)
|
|
* 2. cur is before END.
|
|
*/
|
|
static inline const struct rte_flow_item *
|
|
next_no_void_pattern(const struct rte_flow_item pattern[],
|
|
const struct rte_flow_item *cur)
|
|
{
|
|
const struct rte_flow_item *next =
|
|
cur ? cur + 1 : &pattern[0];
|
|
while (1) {
|
|
if (next->type != RTE_FLOW_ITEM_TYPE_VOID)
|
|
return next;
|
|
next++;
|
|
}
|
|
}
|
|
|
|
static inline const struct rte_flow_action *
|
|
next_no_void_action(const struct rte_flow_action actions[],
|
|
const struct rte_flow_action *cur)
|
|
{
|
|
const struct rte_flow_action *next =
|
|
cur ? cur + 1 : &actions[0];
|
|
while (1) {
|
|
if (next->type != RTE_FLOW_ACTION_TYPE_VOID)
|
|
return next;
|
|
next++;
|
|
}
|
|
}
|
|
|
|
static int hinic_check_ethertype_attr_ele(const struct rte_flow_attr *attr,
|
|
struct rte_flow_error *error)
|
|
{
|
|
/* Must be input direction */
|
|
if (!attr->ingress) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_INGRESS,
|
|
attr, "Only support ingress.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (attr->egress) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_EGRESS,
|
|
attr, "Not support egress.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (attr->priority) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_PRIORITY,
|
|
attr, "Not support priority.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (attr->group) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_GROUP,
|
|
attr, "Not support group.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_check_filter_arg(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item *pattern,
|
|
const struct rte_flow_action *actions,
|
|
struct rte_flow_error *error)
|
|
{
|
|
if (!pattern) {
|
|
rte_flow_error_set(error, EINVAL, RTE_FLOW_ERROR_TYPE_ITEM_NUM,
|
|
NULL, "NULL pattern.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (!actions) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ACTION_NUM,
|
|
NULL, "NULL action.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (!attr) {
|
|
rte_flow_error_set(error, EINVAL, RTE_FLOW_ERROR_TYPE_ATTR,
|
|
NULL, "NULL attribute.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_check_ethertype_first_item(const struct rte_flow_item *item,
|
|
struct rte_flow_error *error)
|
|
{
|
|
/* The first non-void item should be MAC */
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_ETH) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by ethertype filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* Not supported last point for range */
|
|
if (item->last) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* Get the MAC info. */
|
|
if (!item->spec || !item->mask) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by ethertype filter");
|
|
return -rte_errno;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
hinic_parse_ethertype_aciton(const struct rte_flow_action *actions,
|
|
const struct rte_flow_action *act,
|
|
const struct rte_flow_action_queue *act_q,
|
|
struct rte_eth_ethertype_filter *filter,
|
|
struct rte_flow_error *error)
|
|
{
|
|
/* Parse action */
|
|
act = next_no_void_action(actions, NULL);
|
|
if (act->type != RTE_FLOW_ACTION_TYPE_QUEUE &&
|
|
act->type != RTE_FLOW_ACTION_TYPE_DROP) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ACTION,
|
|
act, "Not supported action.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (act->type == RTE_FLOW_ACTION_TYPE_QUEUE) {
|
|
act_q = (const struct rte_flow_action_queue *)act->conf;
|
|
filter->queue = act_q->index;
|
|
} else {
|
|
filter->flags |= RTE_ETHTYPE_FLAGS_DROP;
|
|
}
|
|
|
|
/* Check if the next non-void item is END */
|
|
act = next_no_void_action(actions, act);
|
|
if (act->type != RTE_FLOW_ACTION_TYPE_END) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ACTION,
|
|
act, "Not supported action.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* Parse the rule to see if it is a ethertype rule.
|
|
* And get the ethertype filter info BTW.
|
|
* pattern:
|
|
* The first not void item can be ETH.
|
|
* The next not void item must be END.
|
|
* action:
|
|
* The first not void action should be QUEUE.
|
|
* The next not void action should be END.
|
|
* pattern example:
|
|
* ITEM Spec Mask
|
|
* ETH type 0x0807 0xFFFF
|
|
* END
|
|
* other members in mask and spec should set to 0x00.
|
|
* item->last should be NULL.
|
|
*/
|
|
static int cons_parse_ethertype_filter(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item *pattern,
|
|
const struct rte_flow_action *actions,
|
|
struct rte_eth_ethertype_filter *filter,
|
|
struct rte_flow_error *error)
|
|
{
|
|
const struct rte_flow_item *item;
|
|
const struct rte_flow_action *act = NULL;
|
|
const struct rte_flow_item_eth *eth_spec;
|
|
const struct rte_flow_item_eth *eth_mask;
|
|
const struct rte_flow_action_queue *act_q = NULL;
|
|
|
|
if (hinic_check_filter_arg(attr, pattern, actions, error))
|
|
return -rte_errno;
|
|
|
|
item = next_no_void_pattern(pattern, NULL);
|
|
if (hinic_check_ethertype_first_item(item, error))
|
|
return -rte_errno;
|
|
|
|
eth_spec = (const struct rte_flow_item_eth *)item->spec;
|
|
eth_mask = (const struct rte_flow_item_eth *)item->mask;
|
|
|
|
/*
|
|
* Mask bits of source MAC address must be full of 0.
|
|
* Mask bits of destination MAC address must be full
|
|
* of 1 or full of 0.
|
|
*/
|
|
if (!rte_is_zero_ether_addr(ð_mask->src) ||
|
|
(!rte_is_zero_ether_addr(ð_mask->dst) &&
|
|
!rte_is_broadcast_ether_addr(ð_mask->dst))) {
|
|
rte_flow_error_set(error, EINVAL, RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Invalid ether address mask");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if ((eth_mask->type & UINT16_MAX) != UINT16_MAX) {
|
|
rte_flow_error_set(error, EINVAL, RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Invalid ethertype mask");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/*
|
|
* If mask bits of destination MAC address
|
|
* are full of 1, set RTE_ETHTYPE_FLAGS_MAC.
|
|
*/
|
|
if (rte_is_broadcast_ether_addr(ð_mask->dst)) {
|
|
filter->mac_addr = eth_spec->dst;
|
|
filter->flags |= RTE_ETHTYPE_FLAGS_MAC;
|
|
} else {
|
|
filter->flags &= ~RTE_ETHTYPE_FLAGS_MAC;
|
|
}
|
|
filter->ether_type = rte_be_to_cpu_16(eth_spec->type);
|
|
|
|
/* Check if the next non-void item is END. */
|
|
item = next_no_void_pattern(pattern, item);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_END) {
|
|
rte_flow_error_set(error, EINVAL, RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by ethertype filter.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (hinic_parse_ethertype_aciton(actions, act, act_q, filter, error))
|
|
return -rte_errno;
|
|
|
|
if (hinic_check_ethertype_attr_ele(attr, error))
|
|
return -rte_errno;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_parse_ethertype_filter(struct rte_eth_dev *dev,
|
|
const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct rte_eth_ethertype_filter *filter,
|
|
struct rte_flow_error *error)
|
|
{
|
|
if (cons_parse_ethertype_filter(attr, pattern, actions, filter, error))
|
|
return -rte_errno;
|
|
|
|
/* NIC doesn't support MAC address. */
|
|
if (filter->flags & RTE_ETHTYPE_FLAGS_MAC) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ethertype_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
NULL, "Not supported by ethertype filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (filter->queue >= dev->data->nb_rx_queues) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ethertype_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
NULL, "Queue index much too big");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (filter->ether_type == RTE_ETHER_TYPE_IPV4 ||
|
|
filter->ether_type == RTE_ETHER_TYPE_IPV6) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ethertype_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
NULL, "IPv4/IPv6 not supported by ethertype filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (filter->flags & RTE_ETHTYPE_FLAGS_DROP) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ethertype_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
NULL, "Drop option is unsupported");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* Hinic only support LACP/ARP for ether type */
|
|
if (filter->ether_type != RTE_ETHER_TYPE_SLOW &&
|
|
filter->ether_type != RTE_ETHER_TYPE_ARP) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ethertype_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM, NULL,
|
|
"only lacp/arp type supported by ethertype filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_check_ntuple_attr_ele(const struct rte_flow_attr *attr,
|
|
struct rte_eth_ntuple_filter *filter,
|
|
struct rte_flow_error *error)
|
|
{
|
|
/* Must be input direction */
|
|
if (!attr->ingress) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ntuple_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_INGRESS,
|
|
attr, "Only support ingress.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (attr->egress) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ntuple_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_EGRESS,
|
|
attr, "Not support egress.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (attr->priority > 0xFFFF) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ntuple_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_PRIORITY,
|
|
attr, "Error priority.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (attr->priority < HINIC_MIN_N_TUPLE_PRIO ||
|
|
attr->priority > HINIC_MAX_N_TUPLE_PRIO)
|
|
filter->priority = 1;
|
|
else
|
|
filter->priority = (uint16_t)attr->priority;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
hinic_check_ntuple_act_ele(__rte_unused const struct rte_flow_item *item,
|
|
const struct rte_flow_action actions[],
|
|
struct rte_eth_ntuple_filter *filter,
|
|
struct rte_flow_error *error)
|
|
{
|
|
const struct rte_flow_action *act;
|
|
/*
|
|
* n-tuple only supports forwarding,
|
|
* check if the first not void action is QUEUE.
|
|
*/
|
|
act = next_no_void_action(actions, NULL);
|
|
if (act->type != RTE_FLOW_ACTION_TYPE_QUEUE) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ntuple_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ACTION,
|
|
act, "Flow action type is not QUEUE.");
|
|
return -rte_errno;
|
|
}
|
|
filter->queue =
|
|
((const struct rte_flow_action_queue *)act->conf)->index;
|
|
|
|
/* Check if the next not void item is END */
|
|
act = next_no_void_action(actions, act);
|
|
if (act->type != RTE_FLOW_ACTION_TYPE_END) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ntuple_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ACTION,
|
|
act, "Next not void item is not END.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_ntuple_item_check_ether(const struct rte_flow_item **ipv4_item,
|
|
const struct rte_flow_item pattern[],
|
|
struct rte_flow_error *error)
|
|
{
|
|
const struct rte_flow_item *item;
|
|
|
|
/* The first not void item can be MAC or IPv4 */
|
|
item = next_no_void_pattern(pattern, NULL);
|
|
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_ETH &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_IPV4) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by ntuple filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* Skip Ethernet */
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_ETH) {
|
|
/* Not supported last point for range */
|
|
if (item->last) {
|
|
rte_flow_error_set(error,
|
|
EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
}
|
|
/* if the first item is MAC, the content should be NULL */
|
|
if (item->spec || item->mask) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by ntuple filter");
|
|
return -rte_errno;
|
|
}
|
|
/* check if the next not void item is IPv4 */
|
|
item = next_no_void_pattern(pattern, item);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_IPV4) {
|
|
rte_flow_error_set(error,
|
|
EINVAL, RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by ntuple filter");
|
|
return -rte_errno;
|
|
}
|
|
}
|
|
|
|
*ipv4_item = item;
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
hinic_ntuple_item_check_ipv4(const struct rte_flow_item **in_out_item,
|
|
const struct rte_flow_item pattern[],
|
|
struct rte_eth_ntuple_filter *filter,
|
|
struct rte_flow_error *error)
|
|
{
|
|
const struct rte_flow_item_ipv4 *ipv4_spec;
|
|
const struct rte_flow_item_ipv4 *ipv4_mask;
|
|
const struct rte_flow_item *item = *in_out_item;
|
|
|
|
/* Get the IPv4 info */
|
|
if (!item->spec || !item->mask) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Invalid ntuple mask");
|
|
return -rte_errno;
|
|
}
|
|
/* Not supported last point for range */
|
|
if (item->last) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
}
|
|
|
|
ipv4_mask = (const struct rte_flow_item_ipv4 *)item->mask;
|
|
/*
|
|
* Only support src & dst addresses, protocol,
|
|
* others should be masked.
|
|
*/
|
|
if (ipv4_mask->hdr.version_ihl ||
|
|
ipv4_mask->hdr.type_of_service ||
|
|
ipv4_mask->hdr.total_length ||
|
|
ipv4_mask->hdr.packet_id ||
|
|
ipv4_mask->hdr.fragment_offset ||
|
|
ipv4_mask->hdr.time_to_live ||
|
|
ipv4_mask->hdr.hdr_checksum ||
|
|
!ipv4_mask->hdr.next_proto_id) {
|
|
rte_flow_error_set(error,
|
|
EINVAL, RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by ntuple filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
filter->dst_ip_mask = ipv4_mask->hdr.dst_addr;
|
|
filter->src_ip_mask = ipv4_mask->hdr.src_addr;
|
|
filter->proto_mask = ipv4_mask->hdr.next_proto_id;
|
|
|
|
ipv4_spec = (const struct rte_flow_item_ipv4 *)item->spec;
|
|
filter->dst_ip = ipv4_spec->hdr.dst_addr;
|
|
filter->src_ip = ipv4_spec->hdr.src_addr;
|
|
filter->proto = ipv4_spec->hdr.next_proto_id;
|
|
|
|
/* Get next no void item */
|
|
*in_out_item = next_no_void_pattern(pattern, item);
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_ntuple_item_check_l4(const struct rte_flow_item **in_out_item,
|
|
const struct rte_flow_item pattern[],
|
|
struct rte_eth_ntuple_filter *filter,
|
|
struct rte_flow_error *error)
|
|
{
|
|
const struct rte_flow_item_tcp *tcp_spec;
|
|
const struct rte_flow_item_tcp *tcp_mask;
|
|
const struct rte_flow_item_icmp *icmp_mask;
|
|
const struct rte_flow_item *item = *in_out_item;
|
|
u32 ntuple_filter_size = sizeof(struct rte_eth_ntuple_filter);
|
|
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_END)
|
|
return 0;
|
|
|
|
/* Get TCP or UDP info */
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_END &&
|
|
(!item->spec || !item->mask)) {
|
|
memset(filter, 0, ntuple_filter_size);
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Invalid ntuple mask");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* Not supported last point for range */
|
|
if (item->last) {
|
|
memset(filter, 0, ntuple_filter_size);
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_TCP) {
|
|
tcp_mask = (const struct rte_flow_item_tcp *)item->mask;
|
|
|
|
/*
|
|
* Only support src & dst ports, tcp flags,
|
|
* others should be masked.
|
|
*/
|
|
if (tcp_mask->hdr.sent_seq ||
|
|
tcp_mask->hdr.recv_ack ||
|
|
tcp_mask->hdr.data_off ||
|
|
tcp_mask->hdr.rx_win ||
|
|
tcp_mask->hdr.cksum ||
|
|
tcp_mask->hdr.tcp_urp) {
|
|
memset(filter, 0, ntuple_filter_size);
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by ntuple filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
filter->dst_port_mask = tcp_mask->hdr.dst_port;
|
|
filter->src_port_mask = tcp_mask->hdr.src_port;
|
|
if (tcp_mask->hdr.tcp_flags == 0xFF) {
|
|
filter->flags |= RTE_NTUPLE_FLAGS_TCP_FLAG;
|
|
} else if (!tcp_mask->hdr.tcp_flags) {
|
|
filter->flags &= ~RTE_NTUPLE_FLAGS_TCP_FLAG;
|
|
} else {
|
|
memset(filter, 0, ntuple_filter_size);
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by ntuple filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
tcp_spec = (const struct rte_flow_item_tcp *)item->spec;
|
|
filter->dst_port = tcp_spec->hdr.dst_port;
|
|
filter->src_port = tcp_spec->hdr.src_port;
|
|
filter->tcp_flags = tcp_spec->hdr.tcp_flags;
|
|
} else if (item->type == RTE_FLOW_ITEM_TYPE_ICMP) {
|
|
icmp_mask = (const struct rte_flow_item_icmp *)item->mask;
|
|
|
|
/* ICMP all should be masked. */
|
|
if (icmp_mask->hdr.icmp_cksum ||
|
|
icmp_mask->hdr.icmp_ident ||
|
|
icmp_mask->hdr.icmp_seq_nb ||
|
|
icmp_mask->hdr.icmp_type ||
|
|
icmp_mask->hdr.icmp_code) {
|
|
memset(filter, 0, ntuple_filter_size);
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by ntuple filter");
|
|
return -rte_errno;
|
|
}
|
|
}
|
|
|
|
/* Get next no void item */
|
|
*in_out_item = next_no_void_pattern(pattern, item);
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_ntuple_item_check_end(const struct rte_flow_item *item,
|
|
struct rte_eth_ntuple_filter *filter,
|
|
struct rte_flow_error *error)
|
|
{
|
|
/* Check if the next not void item is END */
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_END) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ntuple_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by ntuple filter");
|
|
return -rte_errno;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_check_ntuple_item_ele(const struct rte_flow_item *item,
|
|
const struct rte_flow_item pattern[],
|
|
struct rte_eth_ntuple_filter *filter,
|
|
struct rte_flow_error *error)
|
|
{
|
|
if (hinic_ntuple_item_check_ether(&item, pattern, error) ||
|
|
hinic_ntuple_item_check_ipv4(&item, pattern, filter, error) ||
|
|
hinic_ntuple_item_check_l4(&item, pattern, filter, error) ||
|
|
hinic_ntuple_item_check_end(item, filter, error))
|
|
return -rte_errno;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* Parse the rule to see if it is a n-tuple rule.
|
|
* And get the n-tuple filter info BTW.
|
|
* pattern:
|
|
* The first not void item can be ETH or IPV4.
|
|
* The second not void item must be IPV4 if the first one is ETH.
|
|
* The third not void item must be UDP or TCP.
|
|
* The next not void item must be END.
|
|
* action:
|
|
* The first not void action should be QUEUE.
|
|
* The next not void action should be END.
|
|
* pattern example:
|
|
* ITEM Spec Mask
|
|
* ETH NULL NULL
|
|
* IPV4 src_addr 192.168.1.20 0xFFFFFFFF
|
|
* dst_addr 192.167.3.50 0xFFFFFFFF
|
|
* next_proto_id 17 0xFF
|
|
* UDP/TCP/ src_port 80 0xFFFF
|
|
* SCTP dst_port 80 0xFFFF
|
|
* END
|
|
* other members in mask and spec should set to 0x00.
|
|
* item->last should be NULL.
|
|
* Please aware there's an asumption for all the parsers.
|
|
* rte_flow_item is using big endian, rte_flow_attr and
|
|
* rte_flow_action are using CPU order.
|
|
* Because the pattern is used to describe the packets,
|
|
* normally the packets should use network order.
|
|
*/
|
|
static int cons_parse_ntuple_filter(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct rte_eth_ntuple_filter *filter,
|
|
struct rte_flow_error *error)
|
|
{
|
|
const struct rte_flow_item *item = NULL;
|
|
|
|
if (hinic_check_filter_arg(attr, pattern, actions, error))
|
|
return -rte_errno;
|
|
|
|
if (hinic_check_ntuple_item_ele(item, pattern, filter, error))
|
|
return -rte_errno;
|
|
|
|
if (hinic_check_ntuple_act_ele(item, actions, filter, error))
|
|
return -rte_errno;
|
|
|
|
if (hinic_check_ntuple_attr_ele(attr, filter, error))
|
|
return -rte_errno;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_parse_ntuple_filter(struct rte_eth_dev *dev,
|
|
const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct rte_eth_ntuple_filter *filter,
|
|
struct rte_flow_error *error)
|
|
{
|
|
int ret;
|
|
|
|
ret = cons_parse_ntuple_filter(attr, pattern, actions, filter, error);
|
|
if (ret)
|
|
return ret;
|
|
|
|
/* Hinic doesn't support tcp flags */
|
|
if (filter->flags & RTE_NTUPLE_FLAGS_TCP_FLAG) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ntuple_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
NULL, "Not supported by ntuple filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* Hinic doesn't support many priorities */
|
|
if (filter->priority < HINIC_MIN_N_TUPLE_PRIO ||
|
|
filter->priority > HINIC_MAX_N_TUPLE_PRIO) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ntuple_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
NULL, "Priority not supported by ntuple filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (filter->queue >= dev->data->nb_rx_queues)
|
|
return -rte_errno;
|
|
|
|
/* Fixed value for hinic */
|
|
filter->flags = RTE_5TUPLE_FLAGS;
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_normal_item_check_ether(const struct rte_flow_item **ip_item,
|
|
const struct rte_flow_item pattern[],
|
|
struct rte_flow_error *error)
|
|
{
|
|
const struct rte_flow_item *item;
|
|
|
|
/* The first not void item can be MAC or IPv4 or TCP or UDP */
|
|
item = next_no_void_pattern(pattern, NULL);
|
|
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_ETH &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_IPV4 &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_TCP &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_UDP) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM, item,
|
|
"Not supported by fdir filter,support mac,ipv4,tcp,udp");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* Not supported last point for range */
|
|
if (item->last) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED, item,
|
|
"Not supported last point for range");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* Skip Ethernet */
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_ETH) {
|
|
/* All should be masked. */
|
|
if (item->spec || item->mask) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter,support mac");
|
|
return -rte_errno;
|
|
}
|
|
/* Check if the next not void item is IPv4 */
|
|
item = next_no_void_pattern(pattern, item);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_IPV4 &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_IPV6) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM, item,
|
|
"Not supported by fdir filter,support mac,ipv4");
|
|
return -rte_errno;
|
|
}
|
|
}
|
|
|
|
*ip_item = item;
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_normal_item_check_ip(const struct rte_flow_item **in_out_item,
|
|
const struct rte_flow_item pattern[],
|
|
struct hinic_fdir_rule *rule,
|
|
struct rte_flow_error *error)
|
|
{
|
|
const struct rte_flow_item_ipv4 *ipv4_spec;
|
|
const struct rte_flow_item_ipv4 *ipv4_mask;
|
|
const struct rte_flow_item_ipv6 *ipv6_spec;
|
|
const struct rte_flow_item_ipv6 *ipv6_mask;
|
|
const struct rte_flow_item *item = *in_out_item;
|
|
int i;
|
|
|
|
/* Get the IPv4 info */
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_IPV4) {
|
|
/* Not supported last point for range */
|
|
if (item->last) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (!item->mask) {
|
|
memset(rule, 0, sizeof(struct hinic_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Invalid fdir filter mask");
|
|
return -rte_errno;
|
|
}
|
|
|
|
ipv4_mask = (const struct rte_flow_item_ipv4 *)item->mask;
|
|
/*
|
|
* Only support src & dst addresses,
|
|
* others should be masked.
|
|
*/
|
|
if (ipv4_mask->hdr.version_ihl ||
|
|
ipv4_mask->hdr.type_of_service ||
|
|
ipv4_mask->hdr.total_length ||
|
|
ipv4_mask->hdr.packet_id ||
|
|
ipv4_mask->hdr.fragment_offset ||
|
|
ipv4_mask->hdr.time_to_live ||
|
|
ipv4_mask->hdr.next_proto_id ||
|
|
ipv4_mask->hdr.hdr_checksum) {
|
|
rte_flow_error_set(error,
|
|
EINVAL, RTE_FLOW_ERROR_TYPE_ITEM, item,
|
|
"Not supported by fdir filter, support src,dst ip");
|
|
return -rte_errno;
|
|
}
|
|
|
|
rule->mask.dst_ipv4_mask = ipv4_mask->hdr.dst_addr;
|
|
rule->mask.src_ipv4_mask = ipv4_mask->hdr.src_addr;
|
|
rule->mode = HINIC_FDIR_MODE_NORMAL;
|
|
|
|
if (item->spec) {
|
|
ipv4_spec =
|
|
(const struct rte_flow_item_ipv4 *)item->spec;
|
|
rule->hinic_fdir.dst_ip = ipv4_spec->hdr.dst_addr;
|
|
rule->hinic_fdir.src_ip = ipv4_spec->hdr.src_addr;
|
|
}
|
|
|
|
/*
|
|
* Check if the next not void item is
|
|
* TCP or UDP or END.
|
|
*/
|
|
item = next_no_void_pattern(pattern, item);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_TCP &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_UDP &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_ICMP &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_ANY &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_END) {
|
|
memset(rule, 0, sizeof(struct hinic_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM, item,
|
|
"Not supported by fdir filter, support tcp, udp, end");
|
|
return -rte_errno;
|
|
}
|
|
} else if (item->type == RTE_FLOW_ITEM_TYPE_IPV6) {
|
|
/* Not supported last point for range */
|
|
if (item->last) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (!item->mask) {
|
|
memset(rule, 0, sizeof(struct hinic_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Invalid fdir filter mask");
|
|
return -rte_errno;
|
|
}
|
|
|
|
ipv6_mask = (const struct rte_flow_item_ipv6 *)item->mask;
|
|
|
|
/* Only support dst addresses, others should be masked */
|
|
if (ipv6_mask->hdr.vtc_flow ||
|
|
ipv6_mask->hdr.payload_len ||
|
|
ipv6_mask->hdr.proto ||
|
|
ipv6_mask->hdr.hop_limits) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM, item,
|
|
"Not supported by fdir filter, support dst ipv6");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* check ipv6 src addr mask, ipv6 src addr is 16 bytes */
|
|
for (i = 0; i < 16; i++) {
|
|
if (ipv6_mask->hdr.src_addr[i] == UINT8_MAX) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM, item,
|
|
"Not supported by fdir filter, do not support src ipv6");
|
|
return -rte_errno;
|
|
}
|
|
}
|
|
|
|
if (!item->spec) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM, item,
|
|
"Not supported by fdir filter, ipv6 spec is NULL");
|
|
return -rte_errno;
|
|
}
|
|
|
|
for (i = 0; i < 16; i++) {
|
|
if (ipv6_mask->hdr.dst_addr[i] == UINT8_MAX)
|
|
rule->mask.dst_ipv6_mask |= 1 << i;
|
|
}
|
|
|
|
ipv6_spec = (const struct rte_flow_item_ipv6 *)item->spec;
|
|
rte_memcpy(rule->hinic_fdir.dst_ipv6,
|
|
ipv6_spec->hdr.dst_addr, 16);
|
|
|
|
/*
|
|
* Check if the next not void item is TCP or UDP or ICMP.
|
|
*/
|
|
item = next_no_void_pattern(pattern, item);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_TCP &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_UDP &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_ICMP &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_ICMP6){
|
|
memset(rule, 0, sizeof(struct hinic_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM, item,
|
|
"Not supported by fdir filter, support tcp, udp, icmp");
|
|
return -rte_errno;
|
|
}
|
|
}
|
|
|
|
*in_out_item = item;
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_normal_item_check_l4(const struct rte_flow_item **in_out_item,
|
|
__rte_unused const struct rte_flow_item pattern[],
|
|
__rte_unused struct hinic_fdir_rule *rule,
|
|
struct rte_flow_error *error)
|
|
{
|
|
const struct rte_flow_item *item = *in_out_item;
|
|
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_END) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by normal fdir filter, not support l4");
|
|
return -rte_errno;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int hinic_normal_item_check_end(const struct rte_flow_item *item,
|
|
struct hinic_fdir_rule *rule,
|
|
struct rte_flow_error *error)
|
|
{
|
|
/* Check if the next not void item is END */
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_END) {
|
|
memset(rule, 0, sizeof(struct hinic_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter, support end");
|
|
return -rte_errno;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_check_normal_item_ele(const struct rte_flow_item *item,
|
|
const struct rte_flow_item pattern[],
|
|
struct hinic_fdir_rule *rule,
|
|
struct rte_flow_error *error)
|
|
{
|
|
if (hinic_normal_item_check_ether(&item, pattern, error) ||
|
|
hinic_normal_item_check_ip(&item, pattern, rule, error) ||
|
|
hinic_normal_item_check_l4(&item, pattern, rule, error) ||
|
|
hinic_normal_item_check_end(item, rule, error))
|
|
return -rte_errno;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
hinic_tcam_normal_item_check_l4(const struct rte_flow_item **in_out_item,
|
|
const struct rte_flow_item pattern[],
|
|
struct hinic_fdir_rule *rule,
|
|
struct rte_flow_error *error)
|
|
{
|
|
const struct rte_flow_item *item = *in_out_item;
|
|
const struct rte_flow_item_tcp *tcp_spec;
|
|
const struct rte_flow_item_tcp *tcp_mask;
|
|
const struct rte_flow_item_udp *udp_spec;
|
|
const struct rte_flow_item_udp *udp_mask;
|
|
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_ICMP) {
|
|
rule->mode = HINIC_FDIR_MODE_TCAM;
|
|
rule->mask.proto_mask = UINT16_MAX;
|
|
rule->hinic_fdir.proto = IP_HEADER_PROTOCOL_TYPE_ICMP;
|
|
} else if (item->type == RTE_FLOW_ITEM_TYPE_ICMP6) {
|
|
rule->mode = HINIC_FDIR_MODE_TCAM;
|
|
rule->mask.proto_mask = UINT16_MAX;
|
|
rule->hinic_fdir.proto = IP_HEADER_PROTOCOL_TYPE_ICMPV6;
|
|
} else if (item->type == RTE_FLOW_ITEM_TYPE_ANY) {
|
|
rule->mode = HINIC_FDIR_MODE_TCAM;
|
|
} else if (item->type == RTE_FLOW_ITEM_TYPE_TCP) {
|
|
if (!item->mask) {
|
|
(void)memset(rule, 0, sizeof(struct hinic_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter, support src, dst ports");
|
|
return -rte_errno;
|
|
}
|
|
|
|
tcp_mask = (const struct rte_flow_item_tcp *)item->mask;
|
|
|
|
/*
|
|
* Only support src & dst ports, tcp flags,
|
|
* others should be masked.
|
|
*/
|
|
if (tcp_mask->hdr.sent_seq ||
|
|
tcp_mask->hdr.recv_ack ||
|
|
tcp_mask->hdr.data_off ||
|
|
tcp_mask->hdr.rx_win ||
|
|
tcp_mask->hdr.cksum ||
|
|
tcp_mask->hdr.tcp_urp) {
|
|
(void)memset(rule, 0, sizeof(struct hinic_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir normal tcam filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
rule->mode = HINIC_FDIR_MODE_TCAM;
|
|
rule->mask.proto_mask = UINT16_MAX;
|
|
rule->mask.dst_port_mask = tcp_mask->hdr.dst_port;
|
|
rule->mask.src_port_mask = tcp_mask->hdr.src_port;
|
|
|
|
rule->hinic_fdir.proto = IP_HEADER_PROTOCOL_TYPE_TCP;
|
|
if (item->spec) {
|
|
tcp_spec = (const struct rte_flow_item_tcp *)item->spec;
|
|
rule->hinic_fdir.dst_port = tcp_spec->hdr.dst_port;
|
|
rule->hinic_fdir.src_port = tcp_spec->hdr.src_port;
|
|
}
|
|
} else if (item->type == RTE_FLOW_ITEM_TYPE_UDP) {
|
|
/*
|
|
* Only care about src & dst ports,
|
|
* others should be masked.
|
|
*/
|
|
if (!item->mask) {
|
|
(void)memset(rule, 0, sizeof(struct hinic_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter, support src, dst ports");
|
|
return -rte_errno;
|
|
}
|
|
|
|
udp_mask = (const struct rte_flow_item_udp *)item->mask;
|
|
if (udp_mask->hdr.dgram_len ||
|
|
udp_mask->hdr.dgram_cksum) {
|
|
(void)memset(rule, 0, sizeof(struct hinic_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter, support udp");
|
|
return -rte_errno;
|
|
}
|
|
|
|
rule->mode = HINIC_FDIR_MODE_TCAM;
|
|
rule->mask.proto_mask = UINT16_MAX;
|
|
rule->mask.src_port_mask = udp_mask->hdr.src_port;
|
|
rule->mask.dst_port_mask = udp_mask->hdr.dst_port;
|
|
|
|
rule->hinic_fdir.proto = IP_HEADER_PROTOCOL_TYPE_UDP;
|
|
if (item->spec) {
|
|
udp_spec = (const struct rte_flow_item_udp *)item->spec;
|
|
rule->hinic_fdir.src_port = udp_spec->hdr.src_port;
|
|
rule->hinic_fdir.dst_port = udp_spec->hdr.dst_port;
|
|
}
|
|
} else {
|
|
(void)memset(rule, 0, sizeof(struct hinic_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter tcam normal, l4 only support icmp, tcp");
|
|
return -rte_errno;
|
|
}
|
|
|
|
item = next_no_void_pattern(pattern, item);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_END) {
|
|
(void)memset(rule, 0, sizeof(struct hinic_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter tcam normal, support end");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* get next no void item */
|
|
*in_out_item = item;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_check_tcam_normal_item_ele(const struct rte_flow_item *item,
|
|
const struct rte_flow_item pattern[],
|
|
struct hinic_fdir_rule *rule,
|
|
struct rte_flow_error *error)
|
|
{
|
|
if (hinic_normal_item_check_ether(&item, pattern, error) ||
|
|
hinic_normal_item_check_ip(&item, pattern, rule, error) ||
|
|
hinic_tcam_normal_item_check_l4(&item, pattern, rule, error) ||
|
|
hinic_normal_item_check_end(item, rule, error))
|
|
return -rte_errno;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_tunnel_item_check_l4(const struct rte_flow_item **in_out_item,
|
|
const struct rte_flow_item pattern[],
|
|
struct hinic_fdir_rule *rule,
|
|
struct rte_flow_error *error)
|
|
{
|
|
const struct rte_flow_item *item = *in_out_item;
|
|
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_UDP) {
|
|
item = next_no_void_pattern(pattern, item);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_VXLAN) {
|
|
(void)memset(rule, 0, sizeof(struct hinic_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter, support vxlan");
|
|
return -rte_errno;
|
|
}
|
|
|
|
*in_out_item = item;
|
|
} else {
|
|
(void)memset(rule, 0, sizeof(struct hinic_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter tcam tunnel, outer l4 only support udp");
|
|
return -rte_errno;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
hinic_tunnel_item_check_vxlan(const struct rte_flow_item **in_out_item,
|
|
const struct rte_flow_item pattern[],
|
|
struct hinic_fdir_rule *rule,
|
|
struct rte_flow_error *error)
|
|
{
|
|
const struct rte_flow_item *item = *in_out_item;
|
|
|
|
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_VXLAN) {
|
|
item = next_no_void_pattern(pattern, item);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_TCP &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_UDP &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_ANY) {
|
|
(void)memset(rule, 0, sizeof(struct hinic_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter, support tcp/udp");
|
|
return -rte_errno;
|
|
}
|
|
|
|
*in_out_item = item;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
hinic_tunnel_inner_item_check_l4(const struct rte_flow_item **in_out_item,
|
|
const struct rte_flow_item pattern[],
|
|
struct hinic_fdir_rule *rule,
|
|
struct rte_flow_error *error)
|
|
{
|
|
const struct rte_flow_item_tcp *tcp_spec;
|
|
const struct rte_flow_item_tcp *tcp_mask;
|
|
const struct rte_flow_item_udp *udp_spec;
|
|
const struct rte_flow_item_udp *udp_mask;
|
|
const struct rte_flow_item *item = *in_out_item;
|
|
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_END) {
|
|
/* Not supported last point for range */
|
|
if (item->last) {
|
|
memset(rule, 0, sizeof(struct hinic_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* get the TCP/UDP info */
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_TCP) {
|
|
/*
|
|
* Only care about src & dst ports,
|
|
* others should be masked.
|
|
*/
|
|
if (!item->mask) {
|
|
memset(rule, 0, sizeof(struct hinic_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter, support src, dst ports");
|
|
return -rte_errno;
|
|
}
|
|
|
|
tcp_mask = (const struct rte_flow_item_tcp *)item->mask;
|
|
if (tcp_mask->hdr.sent_seq ||
|
|
tcp_mask->hdr.recv_ack ||
|
|
tcp_mask->hdr.data_off ||
|
|
tcp_mask->hdr.tcp_flags ||
|
|
tcp_mask->hdr.rx_win ||
|
|
tcp_mask->hdr.cksum ||
|
|
tcp_mask->hdr.tcp_urp) {
|
|
(void)memset(rule, 0,
|
|
sizeof(struct hinic_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter, support tcp");
|
|
return -rte_errno;
|
|
}
|
|
|
|
rule->mode = HINIC_FDIR_MODE_TCAM;
|
|
rule->mask.tunnel_flag = UINT16_MAX;
|
|
rule->mask.tunnel_inner_src_port_mask =
|
|
tcp_mask->hdr.src_port;
|
|
rule->mask.tunnel_inner_dst_port_mask =
|
|
tcp_mask->hdr.dst_port;
|
|
rule->mask.proto_mask = UINT16_MAX;
|
|
|
|
rule->hinic_fdir.proto = IP_HEADER_PROTOCOL_TYPE_TCP;
|
|
if (item->spec) {
|
|
tcp_spec =
|
|
(const struct rte_flow_item_tcp *)item->spec;
|
|
rule->hinic_fdir.tunnel_inner_src_port =
|
|
tcp_spec->hdr.src_port;
|
|
rule->hinic_fdir.tunnel_inner_dst_port =
|
|
tcp_spec->hdr.dst_port;
|
|
}
|
|
} else if (item->type == RTE_FLOW_ITEM_TYPE_UDP) {
|
|
/*
|
|
* Only care about src & dst ports,
|
|
* others should be masked.
|
|
*/
|
|
if (!item->mask) {
|
|
memset(rule, 0, sizeof(struct hinic_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter, support src, dst ports");
|
|
return -rte_errno;
|
|
}
|
|
|
|
udp_mask = (const struct rte_flow_item_udp *)item->mask;
|
|
if (udp_mask->hdr.dgram_len ||
|
|
udp_mask->hdr.dgram_cksum) {
|
|
memset(rule, 0, sizeof(struct hinic_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter, support udp");
|
|
return -rte_errno;
|
|
}
|
|
|
|
rule->mode = HINIC_FDIR_MODE_TCAM;
|
|
rule->mask.tunnel_flag = UINT16_MAX;
|
|
rule->mask.tunnel_inner_src_port_mask =
|
|
udp_mask->hdr.src_port;
|
|
rule->mask.tunnel_inner_dst_port_mask =
|
|
udp_mask->hdr.dst_port;
|
|
rule->mask.proto_mask = UINT16_MAX;
|
|
|
|
rule->hinic_fdir.proto = IP_HEADER_PROTOCOL_TYPE_UDP;
|
|
if (item->spec) {
|
|
udp_spec =
|
|
(const struct rte_flow_item_udp *)item->spec;
|
|
rule->hinic_fdir.tunnel_inner_src_port =
|
|
udp_spec->hdr.src_port;
|
|
rule->hinic_fdir.tunnel_inner_dst_port =
|
|
udp_spec->hdr.dst_port;
|
|
}
|
|
} else if (item->type == RTE_FLOW_ITEM_TYPE_ANY) {
|
|
rule->mode = HINIC_FDIR_MODE_TCAM;
|
|
rule->mask.tunnel_flag = UINT16_MAX;
|
|
} else {
|
|
memset(rule, 0, sizeof(struct hinic_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter, support tcp/udp");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* get next no void item */
|
|
*in_out_item = next_no_void_pattern(pattern, item);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_check_tcam_tunnel_item_ele(const struct rte_flow_item *item,
|
|
const struct rte_flow_item pattern[],
|
|
struct hinic_fdir_rule *rule,
|
|
struct rte_flow_error *error)
|
|
{
|
|
if (hinic_normal_item_check_ether(&item, pattern, error) ||
|
|
hinic_normal_item_check_ip(&item, pattern, rule, error) ||
|
|
hinic_tunnel_item_check_l4(&item, pattern, rule, error) ||
|
|
hinic_tunnel_item_check_vxlan(&item, pattern, rule, error) ||
|
|
hinic_tunnel_inner_item_check_l4(&item, pattern, rule, error) ||
|
|
hinic_normal_item_check_end(item, rule, error))
|
|
return -rte_errno;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_check_normal_attr_ele(const struct rte_flow_attr *attr,
|
|
struct hinic_fdir_rule *rule,
|
|
struct rte_flow_error *error)
|
|
{
|
|
/* Must be input direction */
|
|
if (!attr->ingress) {
|
|
memset(rule, 0, sizeof(struct hinic_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_INGRESS,
|
|
attr, "Only support ingress.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* Not supported */
|
|
if (attr->egress) {
|
|
memset(rule, 0, sizeof(struct hinic_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_EGRESS,
|
|
attr, "Not support egress.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* Not supported */
|
|
if (attr->priority) {
|
|
memset(rule, 0, sizeof(struct hinic_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_PRIORITY,
|
|
attr, "Not support priority.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_check_normal_act_ele(const struct rte_flow_item *item,
|
|
const struct rte_flow_action actions[],
|
|
struct hinic_fdir_rule *rule,
|
|
struct rte_flow_error *error)
|
|
{
|
|
const struct rte_flow_action *act;
|
|
|
|
/* Check if the first not void action is QUEUE */
|
|
act = next_no_void_action(actions, NULL);
|
|
if (act->type != RTE_FLOW_ACTION_TYPE_QUEUE) {
|
|
memset(rule, 0, sizeof(struct hinic_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL, RTE_FLOW_ERROR_TYPE_ACTION,
|
|
item, "Not supported action.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
rule->queue = ((const struct rte_flow_action_queue *)act->conf)->index;
|
|
|
|
/* Check if the next not void item is END */
|
|
act = next_no_void_action(actions, act);
|
|
if (act->type != RTE_FLOW_ACTION_TYPE_END) {
|
|
memset(rule, 0, sizeof(struct hinic_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL, RTE_FLOW_ERROR_TYPE_ACTION,
|
|
act, "Not supported action.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* Parse the rule to see if it is a IP or MAC VLAN flow director rule.
|
|
* And get the flow director filter info BTW.
|
|
* UDP/TCP/SCTP PATTERN:
|
|
* The first not void item can be ETH or IPV4 or IPV6
|
|
* The second not void item must be IPV4 or IPV6 if the first one is ETH.
|
|
* The next not void item could be UDP or TCP(optional)
|
|
* The next not void item must be END.
|
|
* ACTION:
|
|
* The first not void action should be QUEUE.
|
|
* The second not void optional action should be MARK,
|
|
* mark_id is a uint32_t number.
|
|
* The next not void action should be END.
|
|
* UDP/TCP pattern example:
|
|
* ITEM Spec Mask
|
|
* ETH NULL NULL
|
|
* IPV4 src_addr 1.2.3.6 0xFFFFFFFF
|
|
* dst_addr 1.2.3.5 0xFFFFFFFF
|
|
* UDP/TCP src_port 80 0xFFFF
|
|
* dst_port 80 0xFFFF
|
|
* END
|
|
* Other members in mask and spec should set to 0x00.
|
|
* Item->last should be NULL.
|
|
*/
|
|
static int
|
|
hinic_parse_fdir_filter_normal(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct hinic_fdir_rule *rule,
|
|
struct rte_flow_error *error)
|
|
{
|
|
const struct rte_flow_item *item = NULL;
|
|
|
|
if (hinic_check_filter_arg(attr, pattern, actions, error))
|
|
return -rte_errno;
|
|
|
|
if (hinic_check_normal_item_ele(item, pattern, rule, error))
|
|
return -rte_errno;
|
|
|
|
if (hinic_check_normal_attr_ele(attr, rule, error))
|
|
return -rte_errno;
|
|
|
|
if (hinic_check_normal_act_ele(item, actions, rule, error))
|
|
return -rte_errno;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* Parse the rule to see if it is a IP or MAC VLAN flow director rule.
|
|
* And get the flow director filter info BTW.
|
|
* UDP/TCP/SCTP PATTERN:
|
|
* The first not void item can be ETH or IPV4 or IPV6
|
|
* The second not void item must be IPV4 or IPV6 if the first one is ETH.
|
|
* The next not void item can be ANY/TCP/UDP
|
|
* ACTION:
|
|
* The first not void action should be QUEUE.
|
|
* The second not void optional action should be MARK,
|
|
* mark_id is a uint32_t number.
|
|
* The next not void action should be END.
|
|
* UDP/TCP pattern example:
|
|
* ITEM Spec Mask
|
|
* ETH NULL NULL
|
|
* IPV4 src_addr 1.2.3.6 0xFFFFFFFF
|
|
* dst_addr 1.2.3.5 0xFFFFFFFF
|
|
* UDP/TCP src_port 80 0xFFFF
|
|
* dst_port 80 0xFFFF
|
|
* END
|
|
* Other members in mask and spec should set to 0x00.
|
|
* Item->last should be NULL.
|
|
*/
|
|
static int
|
|
hinic_parse_fdir_filter_tcam_normal(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct hinic_fdir_rule *rule,
|
|
struct rte_flow_error *error)
|
|
{
|
|
const struct rte_flow_item *item = NULL;
|
|
|
|
if (hinic_check_filter_arg(attr, pattern, actions, error))
|
|
return -rte_errno;
|
|
|
|
if (hinic_check_tcam_normal_item_ele(item, pattern, rule, error))
|
|
return -rte_errno;
|
|
|
|
if (hinic_check_normal_attr_ele(attr, rule, error))
|
|
return -rte_errno;
|
|
|
|
if (hinic_check_normal_act_ele(item, actions, rule, error))
|
|
return -rte_errno;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* Parse the rule to see if it is a IP or MAC VLAN flow director rule.
|
|
* And get the flow director filter info BTW.
|
|
* UDP/TCP/SCTP PATTERN:
|
|
* The first not void item can be ETH or IPV4 or IPV6
|
|
* The second not void item must be IPV4 or IPV6 if the first one is ETH.
|
|
* The next not void item must be UDP
|
|
* The next not void item must be VXLAN(optional)
|
|
* The first not void item can be ETH or IPV4 or IPV6
|
|
* The next not void item could be ANY or UDP or TCP(optional)
|
|
* The next not void item must be END.
|
|
* ACTION:
|
|
* The first not void action should be QUEUE.
|
|
* The second not void optional action should be MARK,
|
|
* mark_id is a uint32_t number.
|
|
* The next not void action should be END.
|
|
* UDP/TCP pattern example:
|
|
* ITEM Spec Mask
|
|
* ETH NULL NULL
|
|
* IPV4 src_addr 1.2.3.6 0xFFFFFFFF
|
|
* dst_addr 1.2.3.5 0xFFFFFFFF
|
|
* UDP NULL NULL
|
|
* VXLAN NULL NULL
|
|
* UDP/TCP src_port 80 0xFFFF
|
|
* dst_port 80 0xFFFF
|
|
* END
|
|
* Other members in mask and spec should set to 0x00.
|
|
* Item->last should be NULL.
|
|
*/
|
|
static int
|
|
hinic_parse_fdir_filter_tacm_tunnel(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct hinic_fdir_rule *rule,
|
|
struct rte_flow_error *error)
|
|
{
|
|
const struct rte_flow_item *item = NULL;
|
|
|
|
if (hinic_check_filter_arg(attr, pattern, actions, error))
|
|
return -rte_errno;
|
|
|
|
if (hinic_check_tcam_tunnel_item_ele(item, pattern, rule, error))
|
|
return -rte_errno;
|
|
|
|
if (hinic_check_normal_attr_ele(attr, rule, error))
|
|
return -rte_errno;
|
|
|
|
if (hinic_check_normal_act_ele(item, actions, rule, error))
|
|
return -rte_errno;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_parse_fdir_filter(struct rte_eth_dev *dev,
|
|
const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct hinic_fdir_rule *rule,
|
|
struct rte_flow_error *error)
|
|
{
|
|
int ret;
|
|
|
|
ret = hinic_parse_fdir_filter_normal(attr, pattern, actions,
|
|
rule, error);
|
|
if (!ret)
|
|
goto step_next;
|
|
|
|
ret = hinic_parse_fdir_filter_tcam_normal(attr, pattern, actions,
|
|
rule, error);
|
|
if (!ret)
|
|
goto step_next;
|
|
|
|
ret = hinic_parse_fdir_filter_tacm_tunnel(attr, pattern, actions,
|
|
rule, error);
|
|
if (ret)
|
|
return ret;
|
|
|
|
step_next:
|
|
if (rule->queue >= dev->data->nb_rx_queues)
|
|
return -ENOTSUP;
|
|
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* Check if the flow rule is supported by nic.
|
|
* It only checkes the format. Don't guarantee the rule can be programmed into
|
|
* the HW. Because there can be no enough room for the rule.
|
|
*/
|
|
static int hinic_flow_validate(struct rte_eth_dev *dev,
|
|
const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct rte_flow_error *error)
|
|
{
|
|
struct rte_eth_ethertype_filter ethertype_filter;
|
|
struct rte_eth_ntuple_filter ntuple_filter;
|
|
struct hinic_fdir_rule fdir_rule;
|
|
int ret;
|
|
|
|
memset(&ntuple_filter, 0, sizeof(struct rte_eth_ntuple_filter));
|
|
ret = hinic_parse_ntuple_filter(dev, attr, pattern,
|
|
actions, &ntuple_filter, error);
|
|
if (!ret)
|
|
return 0;
|
|
|
|
memset(ðertype_filter, 0, sizeof(struct rte_eth_ethertype_filter));
|
|
ret = hinic_parse_ethertype_filter(dev, attr, pattern,
|
|
actions, ðertype_filter, error);
|
|
|
|
if (!ret)
|
|
return 0;
|
|
|
|
memset(&fdir_rule, 0, sizeof(struct hinic_fdir_rule));
|
|
ret = hinic_parse_fdir_filter(dev, attr, pattern,
|
|
actions, &fdir_rule, error);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static inline int ntuple_ip_filter(struct rte_eth_ntuple_filter *filter,
|
|
struct hinic_5tuple_filter_info *hinic_filter_info)
|
|
{
|
|
switch (filter->dst_ip_mask) {
|
|
case UINT32_MAX:
|
|
hinic_filter_info->dst_ip_mask = 0;
|
|
hinic_filter_info->dst_ip = filter->dst_ip;
|
|
break;
|
|
case 0:
|
|
hinic_filter_info->dst_ip_mask = 1;
|
|
hinic_filter_info->dst_ip = 0;
|
|
break;
|
|
default:
|
|
PMD_DRV_LOG(ERR, "Invalid dst_ip mask.");
|
|
return -EINVAL;
|
|
}
|
|
|
|
switch (filter->src_ip_mask) {
|
|
case UINT32_MAX:
|
|
hinic_filter_info->src_ip_mask = 0;
|
|
hinic_filter_info->src_ip = filter->src_ip;
|
|
break;
|
|
case 0:
|
|
hinic_filter_info->src_ip_mask = 1;
|
|
hinic_filter_info->src_ip = 0;
|
|
break;
|
|
default:
|
|
PMD_DRV_LOG(ERR, "Invalid src_ip mask.");
|
|
return -EINVAL;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static inline int ntuple_port_filter(struct rte_eth_ntuple_filter *filter,
|
|
struct hinic_5tuple_filter_info *hinic_filter_info)
|
|
{
|
|
switch (filter->dst_port_mask) {
|
|
case UINT16_MAX:
|
|
hinic_filter_info->dst_port_mask = 0;
|
|
hinic_filter_info->dst_port = filter->dst_port;
|
|
break;
|
|
case 0:
|
|
hinic_filter_info->dst_port_mask = 1;
|
|
hinic_filter_info->dst_port = 0;
|
|
break;
|
|
default:
|
|
PMD_DRV_LOG(ERR, "Invalid dst_port mask.");
|
|
return -EINVAL;
|
|
}
|
|
|
|
switch (filter->src_port_mask) {
|
|
case UINT16_MAX:
|
|
hinic_filter_info->src_port_mask = 0;
|
|
hinic_filter_info->src_port = filter->src_port;
|
|
break;
|
|
case 0:
|
|
hinic_filter_info->src_port_mask = 1;
|
|
hinic_filter_info->src_port = 0;
|
|
break;
|
|
default:
|
|
PMD_DRV_LOG(ERR, "Invalid src_port mask.");
|
|
return -EINVAL;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static inline int ntuple_proto_filter(struct rte_eth_ntuple_filter *filter,
|
|
struct hinic_5tuple_filter_info *hinic_filter_info)
|
|
{
|
|
switch (filter->proto_mask) {
|
|
case UINT8_MAX:
|
|
hinic_filter_info->proto_mask = 0;
|
|
hinic_filter_info->proto = filter->proto;
|
|
break;
|
|
case 0:
|
|
hinic_filter_info->proto_mask = 1;
|
|
hinic_filter_info->proto = 0;
|
|
break;
|
|
default:
|
|
PMD_DRV_LOG(ERR, "Invalid protocol mask.");
|
|
return -EINVAL;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static inline int ntuple_filter_to_5tuple(struct rte_eth_ntuple_filter *filter,
|
|
struct hinic_5tuple_filter_info *filter_info)
|
|
{
|
|
if (filter->queue >= HINIC_MAX_RX_QUEUE_NUM ||
|
|
filter->priority > HINIC_MAX_N_TUPLE_PRIO ||
|
|
filter->priority < HINIC_MIN_N_TUPLE_PRIO)
|
|
return -EINVAL;
|
|
|
|
if (ntuple_ip_filter(filter, filter_info) ||
|
|
ntuple_port_filter(filter, filter_info) ||
|
|
ntuple_proto_filter(filter, filter_info))
|
|
return -EINVAL;
|
|
|
|
filter_info->priority = (uint8_t)filter->priority;
|
|
return 0;
|
|
}
|
|
|
|
static inline struct hinic_5tuple_filter *
|
|
hinic_5tuple_filter_lookup(struct hinic_5tuple_filter_list *filter_list,
|
|
struct hinic_5tuple_filter_info *key)
|
|
{
|
|
struct hinic_5tuple_filter *it;
|
|
|
|
TAILQ_FOREACH(it, filter_list, entries) {
|
|
if (memcmp(key, &it->filter_info,
|
|
sizeof(struct hinic_5tuple_filter_info)) == 0) {
|
|
return it;
|
|
}
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static int hinic_set_lacp_tcam(struct hinic_nic_dev *nic_dev)
|
|
{
|
|
struct tag_pa_rule lacp_rule;
|
|
struct tag_pa_action lacp_action;
|
|
|
|
memset(&lacp_rule, 0, sizeof(lacp_rule));
|
|
memset(&lacp_action, 0, sizeof(lacp_action));
|
|
/* LACP TCAM rule */
|
|
lacp_rule.eth_type = PA_ETH_TYPE_OTHER;
|
|
lacp_rule.l2_header.eth_type.val16 = 0x8809;
|
|
lacp_rule.l2_header.eth_type.mask16 = 0xffff;
|
|
|
|
/* LACP TCAM action */
|
|
lacp_action.err_type = 0x3f; /* err from ipsu, not convert */
|
|
lacp_action.fwd_action = 0x7; /* 0x3:drop; 0x7: not convert */
|
|
lacp_action.pkt_type = PKT_LACP_TYPE;
|
|
lacp_action.pri = 0x0;
|
|
lacp_action.push_len = 0xf; /* push_len:0xf, not convert */
|
|
|
|
return hinic_set_fdir_tcam(nic_dev->hwdev, TCAM_PKT_LACP,
|
|
&lacp_rule, &lacp_action);
|
|
}
|
|
|
|
static int hinic_set_bgp_dport_tcam(struct hinic_nic_dev *nic_dev)
|
|
{
|
|
struct tag_pa_rule bgp_rule;
|
|
struct tag_pa_action bgp_action;
|
|
|
|
memset(&bgp_rule, 0, sizeof(bgp_rule));
|
|
memset(&bgp_action, 0, sizeof(bgp_action));
|
|
/* BGP TCAM rule */
|
|
bgp_rule.eth_type = PA_ETH_TYPE_IPV4; /* Eth type is IPV4 */
|
|
bgp_rule.ip_header.protocol.val8 = IP_HEADER_PROTOCOL_TYPE_TCP;
|
|
bgp_rule.ip_header.protocol.mask8 = UINT8_MAX;
|
|
bgp_rule.ip_protocol_type = PA_IP_PROTOCOL_TYPE_TCP;
|
|
bgp_rule.eth_ip_tcp.dport.val16 = BGP_DPORT_ID; /* Dport is 179 */
|
|
bgp_rule.eth_ip_tcp.dport.mask16 = UINT16_MAX;
|
|
|
|
/* BGP TCAM action */
|
|
bgp_action.err_type = 0x3f; /* err from ipsu, not convert */
|
|
bgp_action.fwd_action = 0x7; /* 0x3:drop; 0x7: not convert */
|
|
bgp_action.pkt_type = PKT_BGPD_DPORT_TYPE; /* bgp_dport: 83 */
|
|
bgp_action.pri = 0xf; /* pri of BGP is 0xf, result from ipsu parse
|
|
* results, not need to convert
|
|
*/
|
|
bgp_action.push_len = 0xf; /* push_len:0xf, not convert */
|
|
|
|
return hinic_set_fdir_tcam(nic_dev->hwdev,
|
|
TCAM_PKT_BGP_DPORT, &bgp_rule, &bgp_action);
|
|
}
|
|
|
|
static int hinic_set_bgp_sport_tcam(struct hinic_nic_dev *nic_dev)
|
|
{
|
|
struct tag_pa_rule bgp_rule;
|
|
struct tag_pa_action bgp_action;
|
|
|
|
memset(&bgp_rule, 0, sizeof(bgp_rule));
|
|
memset(&bgp_action, 0, sizeof(bgp_action));
|
|
/* BGP TCAM rule */
|
|
bgp_rule.eth_type = PA_ETH_TYPE_IPV4;
|
|
bgp_rule.ip_header.protocol.val8 = IP_HEADER_PROTOCOL_TYPE_TCP;
|
|
bgp_rule.ip_header.protocol.mask8 = UINT8_MAX;
|
|
bgp_rule.ip_protocol_type = PA_IP_PROTOCOL_TYPE_TCP;
|
|
bgp_rule.eth_ip_tcp.sport.val16 = BGP_DPORT_ID;
|
|
bgp_rule.eth_ip_tcp.sport.mask16 = UINT16_MAX;
|
|
|
|
/* BGP TCAM action */
|
|
bgp_action.err_type = 0x3f; /* err from ipsu, not convert */
|
|
bgp_action.fwd_action = 0x7; /* 0x3:drop; 0x7: not convert */
|
|
bgp_action.pkt_type = PKT_BGPD_SPORT_TYPE; /* bgp:sport: 84 */
|
|
bgp_action.pri = 0xf; /* pri of BGP is 0xf, result from ipsu parse
|
|
* results, not need to convert
|
|
*/
|
|
bgp_action.push_len = 0xf; /* push_len:0xf, not convert */
|
|
|
|
return hinic_set_fdir_tcam(nic_dev->hwdev, TCAM_PKT_BGP_SPORT,
|
|
&bgp_rule, &bgp_action);
|
|
}
|
|
|
|
static int hinic_set_vrrp_tcam(struct hinic_nic_dev *nic_dev)
|
|
{
|
|
struct tag_pa_rule vrrp_rule;
|
|
struct tag_pa_action vrrp_action;
|
|
|
|
memset(&vrrp_rule, 0, sizeof(vrrp_rule));
|
|
memset(&vrrp_action, 0, sizeof(vrrp_action));
|
|
/* VRRP TCAM rule */
|
|
vrrp_rule.eth_type = PA_ETH_TYPE_IPV4;
|
|
vrrp_rule.ip_protocol_type = PA_IP_PROTOCOL_TYPE_TCP;
|
|
vrrp_rule.ip_header.protocol.mask8 = 0xff;
|
|
vrrp_rule.ip_header.protocol.val8 = PA_IP_PROTOCOL_TYPE_VRRP;
|
|
|
|
/* VRRP TCAM action */
|
|
vrrp_action.err_type = 0x3f;
|
|
vrrp_action.fwd_action = 0x7;
|
|
vrrp_action.pkt_type = PKT_VRRP_TYPE; /* VRRP: 85 */
|
|
vrrp_action.pri = 0xf;
|
|
vrrp_action.push_len = 0xf;
|
|
|
|
return hinic_set_fdir_tcam(nic_dev->hwdev, TCAM_PKT_VRRP,
|
|
&vrrp_rule, &vrrp_action);
|
|
}
|
|
|
|
/**
|
|
* Clear all fdir configuration.
|
|
*
|
|
* @param nic_dev
|
|
* The hardware interface of a Ethernet device.
|
|
*
|
|
* @return
|
|
* 0 on success,
|
|
* negative error value otherwise.
|
|
*/
|
|
void hinic_free_fdir_filter(struct hinic_nic_dev *nic_dev)
|
|
{
|
|
(void)hinic_set_fdir_filter(nic_dev->hwdev, 0, 0, 0, false);
|
|
|
|
(void)hinic_clear_fdir_tcam(nic_dev->hwdev, TCAM_PKT_BGP_DPORT);
|
|
|
|
(void)hinic_clear_fdir_tcam(nic_dev->hwdev, TCAM_PKT_BGP_SPORT);
|
|
|
|
(void)hinic_clear_fdir_tcam(nic_dev->hwdev, TCAM_PKT_VRRP);
|
|
|
|
(void)hinic_clear_fdir_tcam(nic_dev->hwdev, TCAM_PKT_LACP);
|
|
|
|
(void)hinic_flush_tcam_rule(nic_dev->hwdev);
|
|
}
|
|
|
|
static int hinic_filter_info_init(struct hinic_5tuple_filter *filter,
|
|
struct hinic_filter_info *filter_info)
|
|
{
|
|
switch (filter->filter_info.proto) {
|
|
case IPPROTO_TCP:
|
|
/* Filter type is bgp type if dst_port or src_port is 179 */
|
|
if (filter->filter_info.dst_port == RTE_BE16(BGP_DPORT_ID) &&
|
|
!(filter->filter_info.dst_port_mask)) {
|
|
filter_info->pkt_type = PKT_BGPD_DPORT_TYPE;
|
|
} else if (filter->filter_info.src_port ==
|
|
RTE_BE16(BGP_DPORT_ID) &&
|
|
!(filter->filter_info.src_port_mask)) {
|
|
filter_info->pkt_type = PKT_BGPD_SPORT_TYPE;
|
|
} else {
|
|
PMD_DRV_LOG(INFO, "TCP PROTOCOL:5tuple filters"
|
|
" just support BGP now, proto:0x%x, "
|
|
"dst_port:0x%x, dst_port_mask:0x%x."
|
|
"src_port:0x%x, src_port_mask:0x%x.",
|
|
filter->filter_info.proto,
|
|
filter->filter_info.dst_port,
|
|
filter->filter_info.dst_port_mask,
|
|
filter->filter_info.src_port,
|
|
filter->filter_info.src_port_mask);
|
|
return -EINVAL;
|
|
}
|
|
break;
|
|
|
|
case IPPROTO_VRRP:
|
|
filter_info->pkt_type = PKT_VRRP_TYPE;
|
|
break;
|
|
|
|
case IPPROTO_ICMP:
|
|
filter_info->pkt_type = PKT_ICMP_IPV4_TYPE;
|
|
break;
|
|
|
|
case IPPROTO_ICMPV6:
|
|
filter_info->pkt_type = PKT_ICMP_IPV6_TYPE;
|
|
break;
|
|
|
|
default:
|
|
PMD_DRV_LOG(ERR, "5tuple filters just support BGP/VRRP/ICMP now, "
|
|
"proto: 0x%x, dst_port: 0x%x, dst_port_mask: 0x%x."
|
|
"src_port: 0x%x, src_port_mask: 0x%x.",
|
|
filter->filter_info.proto, filter->filter_info.dst_port,
|
|
filter->filter_info.dst_port_mask,
|
|
filter->filter_info.src_port,
|
|
filter->filter_info.src_port_mask);
|
|
return -EINVAL;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_lookup_new_filter(struct hinic_5tuple_filter *filter,
|
|
struct hinic_filter_info *filter_info, int *index)
|
|
{
|
|
int type_id;
|
|
|
|
type_id = HINIC_PKT_TYPE_FIND_ID(filter_info->pkt_type);
|
|
|
|
if (type_id > HINIC_MAX_Q_FILTERS - 1) {
|
|
PMD_DRV_LOG(ERR, "Pkt filters only support 64 filter type.");
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (!(filter_info->type_mask & (1 << type_id))) {
|
|
filter_info->type_mask |= 1 << type_id;
|
|
filter->index = type_id;
|
|
filter_info->pkt_filters[type_id].enable = true;
|
|
filter_info->pkt_filters[type_id].pkt_proto =
|
|
filter->filter_info.proto;
|
|
TAILQ_INSERT_TAIL(&filter_info->fivetuple_list,
|
|
filter, entries);
|
|
} else {
|
|
PMD_DRV_LOG(ERR, "Filter type: %d exists.", type_id);
|
|
return -EIO;
|
|
}
|
|
|
|
*index = type_id;
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Add a 5tuple filter
|
|
*
|
|
* @param dev:
|
|
* Pointer to struct rte_eth_dev.
|
|
* @param filter:
|
|
* Pointer to the filter that will be added.
|
|
* @return
|
|
* - On success, zero.
|
|
* - On failure, a negative value.
|
|
*/
|
|
static int hinic_add_5tuple_filter(struct rte_eth_dev *dev,
|
|
struct hinic_5tuple_filter *filter)
|
|
{
|
|
struct hinic_filter_info *filter_info =
|
|
HINIC_DEV_PRIVATE_TO_FILTER_INFO(dev->data->dev_private);
|
|
int i, ret_fw;
|
|
struct hinic_nic_dev *nic_dev = HINIC_ETH_DEV_TO_PRIVATE_NIC_DEV(dev);
|
|
|
|
if (hinic_filter_info_init(filter, filter_info) ||
|
|
hinic_lookup_new_filter(filter, filter_info, &i))
|
|
return -EFAULT;
|
|
|
|
ret_fw = hinic_set_fdir_filter(nic_dev->hwdev, filter_info->pkt_type,
|
|
filter_info->qid,
|
|
filter_info->pkt_filters[i].enable,
|
|
true);
|
|
if (ret_fw) {
|
|
PMD_DRV_LOG(ERR, "Set fdir filter failed, type: 0x%x, qid: 0x%x, enable: 0x%x",
|
|
filter_info->pkt_type, filter->queue,
|
|
filter_info->pkt_filters[i].enable);
|
|
return -EFAULT;
|
|
}
|
|
|
|
PMD_DRV_LOG(INFO, "Add 5tuple succeed, type: 0x%x, qid: 0x%x, enable: 0x%x",
|
|
filter_info->pkt_type, filter_info->qid,
|
|
filter_info->pkt_filters[filter->index].enable);
|
|
|
|
switch (filter->filter_info.proto) {
|
|
case IPPROTO_TCP:
|
|
if (filter->filter_info.dst_port == RTE_BE16(BGP_DPORT_ID)) {
|
|
ret_fw = hinic_set_bgp_dport_tcam(nic_dev);
|
|
if (ret_fw) {
|
|
PMD_DRV_LOG(ERR, "Set dport bgp failed, "
|
|
"type: 0x%x, qid: 0x%x, enable: 0x%x",
|
|
filter_info->pkt_type, filter->queue,
|
|
filter_info->pkt_filters[i].enable);
|
|
return -EFAULT;
|
|
}
|
|
|
|
PMD_DRV_LOG(INFO, "Set dport bgp succeed, qid: 0x%x, enable: 0x%x",
|
|
filter->queue,
|
|
filter_info->pkt_filters[i].enable);
|
|
} else if (filter->filter_info.src_port ==
|
|
RTE_BE16(BGP_DPORT_ID)) {
|
|
ret_fw = hinic_set_bgp_sport_tcam(nic_dev);
|
|
if (ret_fw) {
|
|
PMD_DRV_LOG(ERR, "Set sport bgp failed, "
|
|
"type: 0x%x, qid: 0x%x, enable: 0x%x",
|
|
filter_info->pkt_type, filter->queue,
|
|
filter_info->pkt_filters[i].enable);
|
|
return -EFAULT;
|
|
}
|
|
|
|
PMD_DRV_LOG(INFO, "Set sport bgp succeed, qid: 0x%x, enable: 0x%x",
|
|
filter->queue,
|
|
filter_info->pkt_filters[i].enable);
|
|
}
|
|
|
|
break;
|
|
|
|
case IPPROTO_VRRP:
|
|
ret_fw = hinic_set_vrrp_tcam(nic_dev);
|
|
if (ret_fw) {
|
|
PMD_DRV_LOG(ERR, "Set VRRP failed, "
|
|
"type: 0x%x, qid: 0x%x, enable: 0x%x",
|
|
filter_info->pkt_type, filter->queue,
|
|
filter_info->pkt_filters[i].enable);
|
|
return -EFAULT;
|
|
}
|
|
PMD_DRV_LOG(INFO, "Set VRRP succeed, qid: 0x%x, enable: 0x%x",
|
|
filter->queue,
|
|
filter_info->pkt_filters[i].enable);
|
|
break;
|
|
|
|
default:
|
|
break;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Remove a 5tuple filter
|
|
*
|
|
* @param dev
|
|
* Pointer to struct rte_eth_dev.
|
|
* @param filter
|
|
* The pointer of the filter will be removed.
|
|
*/
|
|
static void hinic_remove_5tuple_filter(struct rte_eth_dev *dev,
|
|
struct hinic_5tuple_filter *filter)
|
|
{
|
|
struct hinic_filter_info *filter_info =
|
|
HINIC_DEV_PRIVATE_TO_FILTER_INFO(dev->data->dev_private);
|
|
struct hinic_nic_dev *nic_dev = HINIC_ETH_DEV_TO_PRIVATE_NIC_DEV(dev);
|
|
|
|
switch (filter->filter_info.proto) {
|
|
case IPPROTO_VRRP:
|
|
(void)hinic_clear_fdir_tcam(nic_dev->hwdev, TCAM_PKT_VRRP);
|
|
break;
|
|
|
|
case IPPROTO_TCP:
|
|
if (filter->filter_info.dst_port == RTE_BE16(BGP_DPORT_ID))
|
|
(void)hinic_clear_fdir_tcam(nic_dev->hwdev,
|
|
TCAM_PKT_BGP_DPORT);
|
|
else if (filter->filter_info.src_port == RTE_BE16(BGP_DPORT_ID))
|
|
(void)hinic_clear_fdir_tcam(nic_dev->hwdev,
|
|
TCAM_PKT_BGP_SPORT);
|
|
break;
|
|
|
|
default:
|
|
break;
|
|
}
|
|
|
|
hinic_filter_info_init(filter, filter_info);
|
|
|
|
filter_info->pkt_filters[filter->index].enable = false;
|
|
filter_info->pkt_filters[filter->index].pkt_proto = 0;
|
|
|
|
PMD_DRV_LOG(INFO, "Del 5tuple succeed, type: 0x%x, qid: 0x%x, enable: 0x%x",
|
|
filter_info->pkt_type,
|
|
filter_info->pkt_filters[filter->index].qid,
|
|
filter_info->pkt_filters[filter->index].enable);
|
|
(void)hinic_set_fdir_filter(nic_dev->hwdev, filter_info->pkt_type,
|
|
filter_info->pkt_filters[filter->index].qid,
|
|
filter_info->pkt_filters[filter->index].enable,
|
|
true);
|
|
|
|
filter_info->pkt_type = 0;
|
|
filter_info->qid = 0;
|
|
filter_info->pkt_filters[filter->index].qid = 0;
|
|
filter_info->type_mask &= ~(1 << (filter->index));
|
|
TAILQ_REMOVE(&filter_info->fivetuple_list, filter, entries);
|
|
|
|
rte_free(filter);
|
|
}
|
|
|
|
/*
|
|
* Add or delete a ntuple filter
|
|
*
|
|
* @param dev
|
|
* Pointer to struct rte_eth_dev.
|
|
* @param ntuple_filter
|
|
* Pointer to struct rte_eth_ntuple_filter
|
|
* @param add
|
|
* If true, add filter; if false, remove filter
|
|
* @return
|
|
* - On success, zero.
|
|
* - On failure, a negative value.
|
|
*/
|
|
static int hinic_add_del_ntuple_filter(struct rte_eth_dev *dev,
|
|
struct rte_eth_ntuple_filter *ntuple_filter,
|
|
bool add)
|
|
{
|
|
struct hinic_filter_info *filter_info =
|
|
HINIC_DEV_PRIVATE_TO_FILTER_INFO(dev->data->dev_private);
|
|
struct hinic_5tuple_filter_info filter_5tuple;
|
|
struct hinic_5tuple_filter *filter;
|
|
int ret;
|
|
|
|
if (ntuple_filter->flags != RTE_5TUPLE_FLAGS) {
|
|
PMD_DRV_LOG(ERR, "Only 5tuple is supported.");
|
|
return -EINVAL;
|
|
}
|
|
|
|
memset(&filter_5tuple, 0, sizeof(struct hinic_5tuple_filter_info));
|
|
ret = ntuple_filter_to_5tuple(ntuple_filter, &filter_5tuple);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
filter = hinic_5tuple_filter_lookup(&filter_info->fivetuple_list,
|
|
&filter_5tuple);
|
|
if (filter != NULL && add) {
|
|
PMD_DRV_LOG(ERR, "Filter exists.");
|
|
return -EEXIST;
|
|
}
|
|
if (filter == NULL && !add) {
|
|
PMD_DRV_LOG(ERR, "Filter doesn't exist.");
|
|
return -ENOENT;
|
|
}
|
|
|
|
if (add) {
|
|
filter = rte_zmalloc("hinic_5tuple_filter",
|
|
sizeof(struct hinic_5tuple_filter), 0);
|
|
if (filter == NULL)
|
|
return -ENOMEM;
|
|
rte_memcpy(&filter->filter_info, &filter_5tuple,
|
|
sizeof(struct hinic_5tuple_filter_info));
|
|
filter->queue = ntuple_filter->queue;
|
|
|
|
filter_info->qid = ntuple_filter->queue;
|
|
|
|
ret = hinic_add_5tuple_filter(dev, filter);
|
|
if (ret)
|
|
rte_free(filter);
|
|
|
|
return ret;
|
|
}
|
|
|
|
hinic_remove_5tuple_filter(dev, filter);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static inline int
|
|
hinic_check_ethertype_filter(struct rte_eth_ethertype_filter *filter)
|
|
{
|
|
if (filter->queue >= HINIC_MAX_RX_QUEUE_NUM)
|
|
return -EINVAL;
|
|
|
|
if (filter->ether_type == RTE_ETHER_TYPE_IPV4 ||
|
|
filter->ether_type == RTE_ETHER_TYPE_IPV6) {
|
|
PMD_DRV_LOG(ERR, "Unsupported ether_type(0x%04x) in"
|
|
" ethertype filter", filter->ether_type);
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (filter->flags & RTE_ETHTYPE_FLAGS_MAC) {
|
|
PMD_DRV_LOG(ERR, "Mac compare is not supported");
|
|
return -EINVAL;
|
|
}
|
|
if (filter->flags & RTE_ETHTYPE_FLAGS_DROP) {
|
|
PMD_DRV_LOG(ERR, "Drop option is not supported");
|
|
return -EINVAL;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static inline int
|
|
hinic_ethertype_filter_lookup(struct hinic_filter_info *filter_info,
|
|
struct hinic_pkt_filter *ethertype_filter)
|
|
{
|
|
switch (ethertype_filter->pkt_proto) {
|
|
case RTE_ETHER_TYPE_SLOW:
|
|
filter_info->pkt_type = PKT_LACP_TYPE;
|
|
break;
|
|
|
|
case RTE_ETHER_TYPE_ARP:
|
|
filter_info->pkt_type = PKT_ARP_TYPE;
|
|
break;
|
|
|
|
default:
|
|
PMD_DRV_LOG(ERR, "Just support LACP/ARP for ethertype filters");
|
|
return -EIO;
|
|
}
|
|
|
|
return HINIC_PKT_TYPE_FIND_ID(filter_info->pkt_type);
|
|
}
|
|
|
|
static inline int
|
|
hinic_ethertype_filter_insert(struct hinic_filter_info *filter_info,
|
|
struct hinic_pkt_filter *ethertype_filter)
|
|
{
|
|
int id;
|
|
|
|
/* Find LACP or VRRP type id */
|
|
id = hinic_ethertype_filter_lookup(filter_info, ethertype_filter);
|
|
if (id < 0)
|
|
return -EINVAL;
|
|
|
|
if (!(filter_info->type_mask & (1 << id))) {
|
|
filter_info->type_mask |= 1 << id;
|
|
filter_info->pkt_filters[id].pkt_proto =
|
|
ethertype_filter->pkt_proto;
|
|
filter_info->pkt_filters[id].enable = ethertype_filter->enable;
|
|
filter_info->qid = ethertype_filter->qid;
|
|
return id;
|
|
}
|
|
|
|
PMD_DRV_LOG(ERR, "Filter type: %d exists", id);
|
|
return -EINVAL;
|
|
}
|
|
|
|
static inline void
|
|
hinic_ethertype_filter_remove(struct hinic_filter_info *filter_info,
|
|
uint8_t idx)
|
|
{
|
|
if (idx >= HINIC_MAX_Q_FILTERS)
|
|
return;
|
|
|
|
filter_info->pkt_type = 0;
|
|
filter_info->type_mask &= ~(1 << idx);
|
|
filter_info->pkt_filters[idx].pkt_proto = (uint16_t)0;
|
|
filter_info->pkt_filters[idx].enable = FALSE;
|
|
filter_info->pkt_filters[idx].qid = 0;
|
|
}
|
|
|
|
static inline int
|
|
hinic_add_del_ethertype_filter(struct rte_eth_dev *dev,
|
|
struct rte_eth_ethertype_filter *filter,
|
|
bool add)
|
|
{
|
|
struct hinic_nic_dev *nic_dev = HINIC_ETH_DEV_TO_PRIVATE_NIC_DEV(dev);
|
|
struct hinic_filter_info *filter_info =
|
|
HINIC_DEV_PRIVATE_TO_FILTER_INFO(dev->data->dev_private);
|
|
struct hinic_pkt_filter ethertype_filter;
|
|
int i;
|
|
int ret_fw;
|
|
|
|
if (hinic_check_ethertype_filter(filter))
|
|
return -EINVAL;
|
|
|
|
if (add) {
|
|
ethertype_filter.pkt_proto = filter->ether_type;
|
|
ethertype_filter.enable = TRUE;
|
|
ethertype_filter.qid = (u8)filter->queue;
|
|
i = hinic_ethertype_filter_insert(filter_info,
|
|
ðertype_filter);
|
|
if (i < 0)
|
|
return -ENOSPC;
|
|
|
|
ret_fw = hinic_set_fdir_filter(nic_dev->hwdev,
|
|
filter_info->pkt_type, filter_info->qid,
|
|
filter_info->pkt_filters[i].enable, true);
|
|
if (ret_fw) {
|
|
PMD_DRV_LOG(ERR, "add ethertype failed, type: 0x%x, qid: 0x%x, enable: 0x%x",
|
|
filter_info->pkt_type, filter->queue,
|
|
filter_info->pkt_filters[i].enable);
|
|
|
|
hinic_ethertype_filter_remove(filter_info, i);
|
|
return -ENOENT;
|
|
}
|
|
PMD_DRV_LOG(INFO, "Add ethertype succeed, type: 0x%x, qid: 0x%x, enable: 0x%x",
|
|
filter_info->pkt_type, filter->queue,
|
|
filter_info->pkt_filters[i].enable);
|
|
|
|
switch (ethertype_filter.pkt_proto) {
|
|
case RTE_ETHER_TYPE_SLOW:
|
|
ret_fw = hinic_set_lacp_tcam(nic_dev);
|
|
if (ret_fw) {
|
|
PMD_DRV_LOG(ERR, "Add lacp tcam failed");
|
|
hinic_ethertype_filter_remove(filter_info, i);
|
|
return -ENOENT;
|
|
}
|
|
|
|
PMD_DRV_LOG(INFO, "Add lacp tcam succeed");
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
} else {
|
|
ethertype_filter.pkt_proto = filter->ether_type;
|
|
i = hinic_ethertype_filter_lookup(filter_info,
|
|
ðertype_filter);
|
|
|
|
if ((filter_info->type_mask & (1 << i))) {
|
|
filter_info->pkt_filters[i].enable = FALSE;
|
|
(void)hinic_set_fdir_filter(nic_dev->hwdev,
|
|
filter_info->pkt_type,
|
|
filter_info->pkt_filters[i].qid,
|
|
filter_info->pkt_filters[i].enable,
|
|
true);
|
|
|
|
PMD_DRV_LOG(INFO, "Del ethertype succeed, type: 0x%x, qid: 0x%x, enable: 0x%x",
|
|
filter_info->pkt_type,
|
|
filter_info->pkt_filters[i].qid,
|
|
filter_info->pkt_filters[i].enable);
|
|
|
|
switch (ethertype_filter.pkt_proto) {
|
|
case RTE_ETHER_TYPE_SLOW:
|
|
(void)hinic_clear_fdir_tcam(nic_dev->hwdev,
|
|
TCAM_PKT_LACP);
|
|
PMD_DRV_LOG(INFO, "Del lacp tcam succeed");
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
|
|
hinic_ethertype_filter_remove(filter_info, i);
|
|
|
|
} else {
|
|
PMD_DRV_LOG(ERR, "Ethertype doesn't exist, type: 0x%x, qid: 0x%x, enable: 0x%x",
|
|
filter_info->pkt_type, filter->queue,
|
|
filter_info->pkt_filters[i].enable);
|
|
return -ENOENT;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_fdir_info_init(struct hinic_fdir_rule *rule,
|
|
struct hinic_fdir_info *fdir_info)
|
|
{
|
|
switch (rule->mask.src_ipv4_mask) {
|
|
case UINT32_MAX:
|
|
fdir_info->fdir_flag = HINIC_ATR_FLOW_TYPE_IPV4_SIP;
|
|
fdir_info->qid = rule->queue;
|
|
fdir_info->fdir_key = rule->hinic_fdir.src_ip;
|
|
return 0;
|
|
|
|
case 0:
|
|
break;
|
|
|
|
default:
|
|
PMD_DRV_LOG(ERR, "Invalid src_ip mask.");
|
|
return -EINVAL;
|
|
}
|
|
|
|
switch (rule->mask.dst_ipv4_mask) {
|
|
case UINT32_MAX:
|
|
fdir_info->fdir_flag = HINIC_ATR_FLOW_TYPE_IPV4_DIP;
|
|
fdir_info->qid = rule->queue;
|
|
fdir_info->fdir_key = rule->hinic_fdir.dst_ip;
|
|
return 0;
|
|
|
|
case 0:
|
|
break;
|
|
|
|
default:
|
|
PMD_DRV_LOG(ERR, "Invalid dst_ip mask.");
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (fdir_info->fdir_flag == 0) {
|
|
PMD_DRV_LOG(ERR, "All support mask is NULL.");
|
|
return -EINVAL;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static inline int hinic_add_del_fdir_filter(struct rte_eth_dev *dev,
|
|
struct hinic_fdir_rule *rule, bool add)
|
|
{
|
|
struct hinic_nic_dev *nic_dev = HINIC_ETH_DEV_TO_PRIVATE_NIC_DEV(dev);
|
|
struct hinic_fdir_info fdir_info;
|
|
int ret;
|
|
|
|
memset(&fdir_info, 0, sizeof(struct hinic_fdir_info));
|
|
|
|
ret = hinic_fdir_info_init(rule, &fdir_info);
|
|
if (ret) {
|
|
PMD_DRV_LOG(ERR, "Init hinic fdir info failed!");
|
|
return ret;
|
|
}
|
|
|
|
if (add) {
|
|
ret = hinic_set_normal_filter(nic_dev->hwdev, fdir_info.qid,
|
|
true, fdir_info.fdir_key,
|
|
true, fdir_info.fdir_flag);
|
|
if (ret) {
|
|
PMD_DRV_LOG(ERR, "Add fdir filter failed, flag: 0x%x, qid: 0x%x, key: 0x%x",
|
|
fdir_info.fdir_flag, fdir_info.qid,
|
|
fdir_info.fdir_key);
|
|
return -ENOENT;
|
|
}
|
|
PMD_DRV_LOG(INFO, "Add fdir filter succeed, flag: 0x%x, qid: 0x%x, key: 0x%x",
|
|
fdir_info.fdir_flag, fdir_info.qid,
|
|
fdir_info.fdir_key);
|
|
} else {
|
|
ret = hinic_set_normal_filter(nic_dev->hwdev, fdir_info.qid,
|
|
false, fdir_info.fdir_key, true,
|
|
fdir_info.fdir_flag);
|
|
if (ret) {
|
|
PMD_DRV_LOG(ERR, "Del fdir filter failed, flag: 0x%x, qid: 0x%x, key: 0x%x",
|
|
fdir_info.fdir_flag, fdir_info.qid,
|
|
fdir_info.fdir_key);
|
|
return -ENOENT;
|
|
}
|
|
PMD_DRV_LOG(INFO, "Del fdir filter succeed, flag: 0x%x, qid: 0x%x, key: 0x%x",
|
|
fdir_info.fdir_flag, fdir_info.qid,
|
|
fdir_info.fdir_key);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void tcam_translate_key_y(u8 *key_y, u8 *src_input, u8 *mask, u8 len)
|
|
{
|
|
u8 idx;
|
|
|
|
for (idx = 0; idx < len; idx++)
|
|
key_y[idx] = src_input[idx] & mask[idx];
|
|
}
|
|
|
|
static void tcam_translate_key_x(u8 *key_x, u8 *key_y, u8 *mask, u8 len)
|
|
{
|
|
u8 idx;
|
|
|
|
for (idx = 0; idx < len; idx++)
|
|
key_x[idx] = key_y[idx] ^ mask[idx];
|
|
}
|
|
|
|
static void tcam_key_calculate(struct tag_tcam_key *tcam_key,
|
|
struct tag_tcam_cfg_rule *fdir_tcam_rule)
|
|
{
|
|
tcam_translate_key_y(fdir_tcam_rule->key.y,
|
|
(u8 *)(&tcam_key->key_info),
|
|
(u8 *)(&tcam_key->key_mask),
|
|
TCAM_FLOW_KEY_SIZE);
|
|
tcam_translate_key_x(fdir_tcam_rule->key.x,
|
|
fdir_tcam_rule->key.y,
|
|
(u8 *)(&tcam_key->key_mask),
|
|
TCAM_FLOW_KEY_SIZE);
|
|
}
|
|
|
|
static int hinic_fdir_tcam_ipv4_init(struct rte_eth_dev *dev,
|
|
struct hinic_fdir_rule *rule,
|
|
struct tag_tcam_key *tcam_key)
|
|
{
|
|
struct hinic_nic_dev *nic_dev = HINIC_ETH_DEV_TO_PRIVATE_NIC_DEV(dev);
|
|
|
|
switch (rule->mask.dst_ipv4_mask) {
|
|
case UINT32_MAX:
|
|
tcam_key->key_info.ext_dip_h =
|
|
(rule->hinic_fdir.dst_ip >> 16) & 0xffffU;
|
|
tcam_key->key_info.ext_dip_l =
|
|
rule->hinic_fdir.dst_ip & 0xffffU;
|
|
tcam_key->key_mask.ext_dip_h =
|
|
(rule->mask.dst_ipv4_mask >> 16) & 0xffffU;
|
|
tcam_key->key_mask.ext_dip_l =
|
|
rule->mask.dst_ipv4_mask & 0xffffU;
|
|
break;
|
|
|
|
case 0:
|
|
break;
|
|
|
|
default:
|
|
PMD_DRV_LOG(ERR, "invalid src_ip mask.");
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (rule->mask.dst_port_mask > 0) {
|
|
tcam_key->key_info.dst_port = rule->hinic_fdir.dst_port;
|
|
tcam_key->key_mask.dst_port = rule->mask.dst_port_mask;
|
|
}
|
|
|
|
if (rule->mask.src_port_mask > 0) {
|
|
tcam_key->key_info.src_port = rule->hinic_fdir.src_port;
|
|
tcam_key->key_mask.src_port = rule->mask.src_port_mask;
|
|
}
|
|
|
|
switch (rule->mask.tunnel_flag) {
|
|
case UINT16_MAX:
|
|
tcam_key->key_info.tunnel_flag = FDIR_TCAM_TUNNEL_PACKET;
|
|
tcam_key->key_mask.tunnel_flag = UINT8_MAX;
|
|
break;
|
|
|
|
case 0:
|
|
tcam_key->key_info.tunnel_flag = FDIR_TCAM_NORMAL_PACKET;
|
|
tcam_key->key_mask.tunnel_flag = 0;
|
|
break;
|
|
|
|
default:
|
|
PMD_DRV_LOG(ERR, "invalid tunnel flag mask.");
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (rule->mask.tunnel_inner_dst_port_mask > 0) {
|
|
tcam_key->key_info.dst_port =
|
|
rule->hinic_fdir.tunnel_inner_dst_port;
|
|
tcam_key->key_mask.dst_port =
|
|
rule->mask.tunnel_inner_dst_port_mask;
|
|
}
|
|
|
|
if (rule->mask.tunnel_inner_src_port_mask > 0) {
|
|
tcam_key->key_info.src_port =
|
|
rule->hinic_fdir.tunnel_inner_src_port;
|
|
tcam_key->key_mask.src_port =
|
|
rule->mask.tunnel_inner_src_port_mask;
|
|
}
|
|
|
|
switch (rule->mask.proto_mask) {
|
|
case UINT16_MAX:
|
|
tcam_key->key_info.protocol = rule->hinic_fdir.proto;
|
|
tcam_key->key_mask.protocol = UINT8_MAX;
|
|
break;
|
|
|
|
case 0:
|
|
break;
|
|
|
|
default:
|
|
PMD_DRV_LOG(ERR, "invalid tunnel flag mask.");
|
|
return -EINVAL;
|
|
}
|
|
|
|
tcam_key->key_mask.function_id = UINT16_MAX;
|
|
tcam_key->key_info.function_id =
|
|
hinic_global_func_id(nic_dev->hwdev) & 0x7fff;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_fdir_tcam_ipv6_init(struct rte_eth_dev *dev,
|
|
struct hinic_fdir_rule *rule,
|
|
struct tag_tcam_key *tcam_key)
|
|
{
|
|
struct hinic_nic_dev *nic_dev = HINIC_ETH_DEV_TO_PRIVATE_NIC_DEV(dev);
|
|
|
|
switch (rule->mask.dst_ipv6_mask) {
|
|
case UINT16_MAX:
|
|
tcam_key->key_info_ipv6.ipv6_key0 =
|
|
((rule->hinic_fdir.dst_ipv6[0] << 8) & 0xff00) |
|
|
rule->hinic_fdir.dst_ipv6[1];
|
|
tcam_key->key_info_ipv6.ipv6_key1 =
|
|
((rule->hinic_fdir.dst_ipv6[2] << 8) & 0xff00) |
|
|
rule->hinic_fdir.dst_ipv6[3];
|
|
tcam_key->key_info_ipv6.ipv6_key2 =
|
|
((rule->hinic_fdir.dst_ipv6[4] << 8) & 0xff00) |
|
|
rule->hinic_fdir.dst_ipv6[5];
|
|
tcam_key->key_info_ipv6.ipv6_key3 =
|
|
((rule->hinic_fdir.dst_ipv6[6] << 8) & 0xff00) |
|
|
rule->hinic_fdir.dst_ipv6[7];
|
|
tcam_key->key_info_ipv6.ipv6_key4 =
|
|
((rule->hinic_fdir.dst_ipv6[8] << 8) & 0xff00) |
|
|
rule->hinic_fdir.dst_ipv6[9];
|
|
tcam_key->key_info_ipv6.ipv6_key5 =
|
|
((rule->hinic_fdir.dst_ipv6[10] << 8) & 0xff00) |
|
|
rule->hinic_fdir.dst_ipv6[11];
|
|
tcam_key->key_info_ipv6.ipv6_key6 =
|
|
((rule->hinic_fdir.dst_ipv6[12] << 8) & 0xff00) |
|
|
rule->hinic_fdir.dst_ipv6[13];
|
|
tcam_key->key_info_ipv6.ipv6_key7 =
|
|
((rule->hinic_fdir.dst_ipv6[14] << 8) & 0xff00) |
|
|
rule->hinic_fdir.dst_ipv6[15];
|
|
tcam_key->key_mask_ipv6.ipv6_key0 = UINT16_MAX;
|
|
tcam_key->key_mask_ipv6.ipv6_key1 = UINT16_MAX;
|
|
tcam_key->key_mask_ipv6.ipv6_key2 = UINT16_MAX;
|
|
tcam_key->key_mask_ipv6.ipv6_key3 = UINT16_MAX;
|
|
tcam_key->key_mask_ipv6.ipv6_key4 = UINT16_MAX;
|
|
tcam_key->key_mask_ipv6.ipv6_key5 = UINT16_MAX;
|
|
tcam_key->key_mask_ipv6.ipv6_key6 = UINT16_MAX;
|
|
tcam_key->key_mask_ipv6.ipv6_key7 = UINT16_MAX;
|
|
break;
|
|
|
|
case 0:
|
|
break;
|
|
|
|
default:
|
|
PMD_DRV_LOG(ERR, "invalid dst_ipv6 mask");
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (rule->mask.dst_port_mask > 0) {
|
|
tcam_key->key_info_ipv6.dst_port = rule->hinic_fdir.dst_port;
|
|
tcam_key->key_mask_ipv6.dst_port = rule->mask.dst_port_mask;
|
|
}
|
|
|
|
switch (rule->mask.proto_mask) {
|
|
case UINT16_MAX:
|
|
tcam_key->key_info_ipv6.protocol =
|
|
(rule->hinic_fdir.proto) & 0x7F;
|
|
tcam_key->key_mask_ipv6.protocol = 0x7F;
|
|
break;
|
|
|
|
case 0:
|
|
break;
|
|
|
|
default:
|
|
PMD_DRV_LOG(ERR, "invalid tunnel flag mask");
|
|
return -EINVAL;
|
|
}
|
|
|
|
tcam_key->key_info_ipv6.ipv6_flag = 1;
|
|
tcam_key->key_mask_ipv6.ipv6_flag = 1;
|
|
|
|
tcam_key->key_mask_ipv6.function_id = UINT8_MAX;
|
|
tcam_key->key_info_ipv6.function_id =
|
|
(u8)hinic_global_func_id(nic_dev->hwdev);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_fdir_tcam_info_init(struct rte_eth_dev *dev,
|
|
struct hinic_fdir_rule *rule,
|
|
struct tag_tcam_key *tcam_key,
|
|
struct tag_tcam_cfg_rule *fdir_tcam_rule)
|
|
{
|
|
int ret = -1;
|
|
|
|
if (rule->mask.dst_ipv4_mask == UINT32_MAX)
|
|
ret = hinic_fdir_tcam_ipv4_init(dev, rule, tcam_key);
|
|
else if (rule->mask.dst_ipv6_mask == UINT16_MAX)
|
|
ret = hinic_fdir_tcam_ipv6_init(dev, rule, tcam_key);
|
|
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
fdir_tcam_rule->data.qid = rule->queue;
|
|
|
|
tcam_key_calculate(tcam_key, fdir_tcam_rule);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static inline struct hinic_tcam_filter *
|
|
hinic_tcam_filter_lookup(struct hinic_tcam_filter_list *filter_list,
|
|
struct tag_tcam_key *key)
|
|
{
|
|
struct hinic_tcam_filter *it;
|
|
|
|
TAILQ_FOREACH(it, filter_list, entries) {
|
|
if (memcmp(key, &it->tcam_key,
|
|
sizeof(struct tag_tcam_key)) == 0) {
|
|
return it;
|
|
}
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static int hinic_lookup_new_tcam_filter(struct rte_eth_dev *dev,
|
|
struct hinic_tcam_info *tcam_info,
|
|
struct hinic_tcam_filter *tcam_filter,
|
|
u16 *tcam_index)
|
|
{
|
|
int index;
|
|
int max_index;
|
|
struct hinic_nic_dev *nic_dev = HINIC_ETH_DEV_TO_PRIVATE_NIC_DEV(dev);
|
|
|
|
if (hinic_func_type(nic_dev->hwdev) == TYPE_VF)
|
|
max_index = HINIC_VF_MAX_TCAM_FILTERS;
|
|
else
|
|
max_index = HINIC_PF_MAX_TCAM_FILTERS;
|
|
|
|
for (index = 0; index < max_index; index++) {
|
|
if (tcam_info->tcam_index_array[index] == 0)
|
|
break;
|
|
}
|
|
|
|
if (index == max_index) {
|
|
PMD_DRV_LOG(ERR, "function 0x%x tcam filters only support %d filter rules",
|
|
hinic_global_func_id(nic_dev->hwdev), max_index);
|
|
return -EINVAL;
|
|
}
|
|
|
|
tcam_filter->index = index;
|
|
*tcam_index = index;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_add_tcam_filter(struct rte_eth_dev *dev,
|
|
struct hinic_tcam_filter *tcam_filter,
|
|
struct tag_tcam_cfg_rule *fdir_tcam_rule)
|
|
{
|
|
struct hinic_tcam_info *tcam_info =
|
|
HINIC_DEV_PRIVATE_TO_TCAM_INFO(dev->data->dev_private);
|
|
struct hinic_nic_dev *nic_dev = HINIC_ETH_DEV_TO_PRIVATE_NIC_DEV(dev);
|
|
u16 index = 0;
|
|
u16 tcam_block_index = 0;
|
|
int rc;
|
|
|
|
if (hinic_lookup_new_tcam_filter(dev, tcam_info, tcam_filter, &index))
|
|
return -EINVAL;
|
|
|
|
if (tcam_info->tcam_rule_nums == 0) {
|
|
if (hinic_func_type(nic_dev->hwdev) == TYPE_VF) {
|
|
rc = hinic_alloc_tcam_block(nic_dev->hwdev,
|
|
HINIC_TCAM_BLOCK_TYPE_VF, &tcam_block_index);
|
|
if (rc != 0) {
|
|
PMD_DRV_LOG(ERR, "VF fdir filter tcam alloc block failed!");
|
|
return -EFAULT;
|
|
}
|
|
} else {
|
|
rc = hinic_alloc_tcam_block(nic_dev->hwdev,
|
|
HINIC_TCAM_BLOCK_TYPE_PF, &tcam_block_index);
|
|
if (rc != 0) {
|
|
PMD_DRV_LOG(ERR, "PF fdir filter tcam alloc block failed!");
|
|
return -EFAULT;
|
|
}
|
|
}
|
|
|
|
tcam_info->tcam_block_index = tcam_block_index;
|
|
} else {
|
|
tcam_block_index = tcam_info->tcam_block_index;
|
|
}
|
|
|
|
if (hinic_func_type(nic_dev->hwdev) == TYPE_VF) {
|
|
fdir_tcam_rule->index =
|
|
HINIC_PKT_VF_TCAM_INDEX_START(tcam_block_index) + index;
|
|
} else {
|
|
fdir_tcam_rule->index =
|
|
tcam_block_index * HINIC_PF_MAX_TCAM_FILTERS + index;
|
|
}
|
|
|
|
rc = hinic_add_tcam_rule(nic_dev->hwdev, fdir_tcam_rule);
|
|
if (rc != 0) {
|
|
PMD_DRV_LOG(ERR, "Fdir_tcam_rule add failed!");
|
|
return -EFAULT;
|
|
}
|
|
|
|
PMD_DRV_LOG(INFO, "Add fdir_tcam_rule function_id: 0x%x,"
|
|
"tcam_block_id: %d, index: %d, queue: %d, tcam_rule_nums: %d succeed",
|
|
hinic_global_func_id(nic_dev->hwdev), tcam_block_index,
|
|
fdir_tcam_rule->index, fdir_tcam_rule->data.qid,
|
|
tcam_info->tcam_rule_nums + 1);
|
|
|
|
if (tcam_info->tcam_rule_nums == 0) {
|
|
rc = hinic_set_fdir_filter(nic_dev->hwdev, 0, 0, 0, true);
|
|
if (rc < 0) {
|
|
(void)hinic_del_tcam_rule(nic_dev->hwdev,
|
|
fdir_tcam_rule->index);
|
|
return rc;
|
|
}
|
|
}
|
|
|
|
TAILQ_INSERT_TAIL(&tcam_info->tcam_list, tcam_filter, entries);
|
|
|
|
tcam_info->tcam_index_array[index] = 1;
|
|
tcam_info->tcam_rule_nums++;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_del_tcam_filter(struct rte_eth_dev *dev,
|
|
struct hinic_tcam_filter *tcam_filter)
|
|
{
|
|
struct hinic_tcam_info *tcam_info =
|
|
HINIC_DEV_PRIVATE_TO_TCAM_INFO(dev->data->dev_private);
|
|
struct hinic_nic_dev *nic_dev = HINIC_ETH_DEV_TO_PRIVATE_NIC_DEV(dev);
|
|
u32 index = 0;
|
|
u16 tcam_block_index = tcam_info->tcam_block_index;
|
|
int rc;
|
|
u8 block_type = 0;
|
|
|
|
if (hinic_func_type(nic_dev->hwdev) == TYPE_VF) {
|
|
index = HINIC_PKT_VF_TCAM_INDEX_START(tcam_block_index) +
|
|
tcam_filter->index;
|
|
block_type = HINIC_TCAM_BLOCK_TYPE_VF;
|
|
} else {
|
|
index = tcam_block_index * HINIC_PF_MAX_TCAM_FILTERS +
|
|
tcam_filter->index;
|
|
block_type = HINIC_TCAM_BLOCK_TYPE_PF;
|
|
}
|
|
|
|
rc = hinic_del_tcam_rule(nic_dev->hwdev, index);
|
|
if (rc != 0) {
|
|
PMD_DRV_LOG(ERR, "fdir_tcam_rule del failed!");
|
|
return -EFAULT;
|
|
}
|
|
|
|
PMD_DRV_LOG(INFO, "Del fdir_tcam_rule function_id: 0x%x, "
|
|
"tcam_block_id: %d, index: %d, tcam_rule_nums: %d succeed",
|
|
hinic_global_func_id(nic_dev->hwdev), tcam_block_index, index,
|
|
tcam_info->tcam_rule_nums - 1);
|
|
|
|
TAILQ_REMOVE(&tcam_info->tcam_list, tcam_filter, entries);
|
|
|
|
tcam_info->tcam_index_array[tcam_filter->index] = 0;
|
|
|
|
rte_free(tcam_filter);
|
|
|
|
tcam_info->tcam_rule_nums--;
|
|
|
|
if (tcam_info->tcam_rule_nums == 0) {
|
|
(void)hinic_free_tcam_block(nic_dev->hwdev, block_type,
|
|
&tcam_block_index);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int hinic_add_del_tcam_fdir_filter(struct rte_eth_dev *dev,
|
|
struct hinic_fdir_rule *rule, bool add)
|
|
{
|
|
struct hinic_tcam_info *tcam_info =
|
|
HINIC_DEV_PRIVATE_TO_TCAM_INFO(dev->data->dev_private);
|
|
struct hinic_tcam_filter *tcam_filter;
|
|
struct tag_tcam_cfg_rule fdir_tcam_rule;
|
|
struct tag_tcam_key tcam_key;
|
|
int ret;
|
|
|
|
memset(&fdir_tcam_rule, 0, sizeof(struct tag_tcam_cfg_rule));
|
|
memset((void *)&tcam_key, 0, sizeof(struct tag_tcam_key));
|
|
|
|
ret = hinic_fdir_tcam_info_init(dev, rule, &tcam_key, &fdir_tcam_rule);
|
|
if (ret) {
|
|
PMD_DRV_LOG(ERR, "Init hinic fdir info failed!");
|
|
return ret;
|
|
}
|
|
|
|
tcam_filter = hinic_tcam_filter_lookup(&tcam_info->tcam_list,
|
|
&tcam_key);
|
|
if (tcam_filter != NULL && add) {
|
|
PMD_DRV_LOG(ERR, "Filter exists.");
|
|
return -EEXIST;
|
|
}
|
|
if (tcam_filter == NULL && !add) {
|
|
PMD_DRV_LOG(ERR, "Filter doesn't exist.");
|
|
return -ENOENT;
|
|
}
|
|
|
|
if (add) {
|
|
tcam_filter = rte_zmalloc("hinic_5tuple_filter",
|
|
sizeof(struct hinic_tcam_filter), 0);
|
|
if (tcam_filter == NULL)
|
|
return -ENOMEM;
|
|
(void)rte_memcpy(&tcam_filter->tcam_key,
|
|
&tcam_key, sizeof(struct tag_tcam_key));
|
|
tcam_filter->queue = fdir_tcam_rule.data.qid;
|
|
|
|
ret = hinic_add_tcam_filter(dev, tcam_filter, &fdir_tcam_rule);
|
|
if (ret < 0) {
|
|
rte_free(tcam_filter);
|
|
return ret;
|
|
}
|
|
|
|
rule->tcam_index = fdir_tcam_rule.index;
|
|
|
|
} else {
|
|
PMD_DRV_LOG(INFO, "begin to hinic_del_tcam_filter");
|
|
ret = hinic_del_tcam_filter(dev, tcam_filter);
|
|
if (ret < 0)
|
|
return ret;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* Create or destroy a flow rule.
|
|
* Theorically one rule can match more than one filters.
|
|
* We will let it use the filter which it hitt first.
|
|
* So, the sequence matters.
|
|
*/
|
|
static struct rte_flow *hinic_flow_create(struct rte_eth_dev *dev,
|
|
const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct rte_flow_error *error)
|
|
{
|
|
int ret;
|
|
struct rte_eth_ntuple_filter ntuple_filter;
|
|
struct rte_eth_ethertype_filter ethertype_filter;
|
|
struct hinic_fdir_rule fdir_rule;
|
|
struct rte_flow *flow = NULL;
|
|
struct hinic_ethertype_filter_ele *ethertype_filter_ptr;
|
|
struct hinic_ntuple_filter_ele *ntuple_filter_ptr;
|
|
struct hinic_fdir_rule_ele *fdir_rule_ptr;
|
|
struct hinic_flow_mem *hinic_flow_mem_ptr;
|
|
struct hinic_nic_dev *nic_dev = HINIC_ETH_DEV_TO_PRIVATE_NIC_DEV(dev);
|
|
|
|
flow = rte_zmalloc("hinic_rte_flow", sizeof(struct rte_flow), 0);
|
|
if (!flow) {
|
|
PMD_DRV_LOG(ERR, "Failed to allocate flow memory");
|
|
return NULL;
|
|
}
|
|
|
|
hinic_flow_mem_ptr = rte_zmalloc("hinic_flow_mem",
|
|
sizeof(struct hinic_flow_mem), 0);
|
|
if (!hinic_flow_mem_ptr) {
|
|
PMD_DRV_LOG(ERR, "Failed to allocate hinic_flow_mem_ptr");
|
|
rte_free(flow);
|
|
return NULL;
|
|
}
|
|
|
|
hinic_flow_mem_ptr->flow = flow;
|
|
TAILQ_INSERT_TAIL(&nic_dev->hinic_flow_list, hinic_flow_mem_ptr,
|
|
entries);
|
|
|
|
/* Add ntuple filter */
|
|
memset(&ntuple_filter, 0, sizeof(struct rte_eth_ntuple_filter));
|
|
ret = hinic_parse_ntuple_filter(dev, attr, pattern,
|
|
actions, &ntuple_filter, error);
|
|
if (!ret) {
|
|
ret = hinic_add_del_ntuple_filter(dev, &ntuple_filter, TRUE);
|
|
if (!ret) {
|
|
ntuple_filter_ptr = rte_zmalloc("hinic_ntuple_filter",
|
|
sizeof(struct hinic_ntuple_filter_ele), 0);
|
|
rte_memcpy(&ntuple_filter_ptr->filter_info,
|
|
&ntuple_filter,
|
|
sizeof(struct rte_eth_ntuple_filter));
|
|
TAILQ_INSERT_TAIL(&nic_dev->filter_ntuple_list,
|
|
ntuple_filter_ptr, entries);
|
|
flow->rule = ntuple_filter_ptr;
|
|
flow->filter_type = RTE_ETH_FILTER_NTUPLE;
|
|
|
|
PMD_DRV_LOG(INFO, "Create flow ntuple succeed, func_id: 0x%x",
|
|
hinic_global_func_id(nic_dev->hwdev));
|
|
return flow;
|
|
}
|
|
goto out;
|
|
}
|
|
|
|
/* Add ethertype filter */
|
|
memset(ðertype_filter, 0, sizeof(struct rte_eth_ethertype_filter));
|
|
ret = hinic_parse_ethertype_filter(dev, attr, pattern, actions,
|
|
ðertype_filter, error);
|
|
if (!ret) {
|
|
ret = hinic_add_del_ethertype_filter(dev, ðertype_filter,
|
|
TRUE);
|
|
if (!ret) {
|
|
ethertype_filter_ptr =
|
|
rte_zmalloc("hinic_ethertype_filter",
|
|
sizeof(struct hinic_ethertype_filter_ele), 0);
|
|
rte_memcpy(ðertype_filter_ptr->filter_info,
|
|
ðertype_filter,
|
|
sizeof(struct rte_eth_ethertype_filter));
|
|
TAILQ_INSERT_TAIL(&nic_dev->filter_ethertype_list,
|
|
ethertype_filter_ptr, entries);
|
|
flow->rule = ethertype_filter_ptr;
|
|
flow->filter_type = RTE_ETH_FILTER_ETHERTYPE;
|
|
|
|
PMD_DRV_LOG(INFO, "Create flow ethertype succeed, func_id: 0x%x",
|
|
hinic_global_func_id(nic_dev->hwdev));
|
|
return flow;
|
|
}
|
|
goto out;
|
|
}
|
|
|
|
/* Add fdir filter */
|
|
memset(&fdir_rule, 0, sizeof(struct hinic_fdir_rule));
|
|
ret = hinic_parse_fdir_filter(dev, attr, pattern,
|
|
actions, &fdir_rule, error);
|
|
if (!ret) {
|
|
if (fdir_rule.mode == HINIC_FDIR_MODE_NORMAL) {
|
|
ret = hinic_add_del_fdir_filter(dev,
|
|
&fdir_rule, TRUE);
|
|
} else if (fdir_rule.mode == HINIC_FDIR_MODE_TCAM) {
|
|
ret = hinic_add_del_tcam_fdir_filter(dev,
|
|
&fdir_rule, TRUE);
|
|
} else {
|
|
PMD_DRV_LOG(INFO, "flow fdir rule create failed, rule mode wrong");
|
|
goto out;
|
|
}
|
|
if (!ret) {
|
|
fdir_rule_ptr = rte_zmalloc("hinic_fdir_rule",
|
|
sizeof(struct hinic_fdir_rule_ele), 0);
|
|
rte_memcpy(&fdir_rule_ptr->filter_info, &fdir_rule,
|
|
sizeof(struct hinic_fdir_rule));
|
|
TAILQ_INSERT_TAIL(&nic_dev->filter_fdir_rule_list,
|
|
fdir_rule_ptr, entries);
|
|
flow->rule = fdir_rule_ptr;
|
|
flow->filter_type = RTE_ETH_FILTER_FDIR;
|
|
|
|
PMD_DRV_LOG(INFO, "Create flow fdir rule succeed, func_id : 0x%x",
|
|
hinic_global_func_id(nic_dev->hwdev));
|
|
return flow;
|
|
}
|
|
goto out;
|
|
}
|
|
|
|
out:
|
|
TAILQ_REMOVE(&nic_dev->hinic_flow_list, hinic_flow_mem_ptr, entries);
|
|
rte_flow_error_set(error, -ret,
|
|
RTE_FLOW_ERROR_TYPE_HANDLE, NULL,
|
|
"Failed to create flow.");
|
|
rte_free(hinic_flow_mem_ptr);
|
|
rte_free(flow);
|
|
return NULL;
|
|
}
|
|
|
|
/* Destroy a flow rule on hinic. */
|
|
static int hinic_flow_destroy(struct rte_eth_dev *dev, struct rte_flow *flow,
|
|
struct rte_flow_error *error)
|
|
{
|
|
int ret;
|
|
struct rte_flow *pmd_flow = flow;
|
|
enum rte_filter_type filter_type = pmd_flow->filter_type;
|
|
struct rte_eth_ntuple_filter ntuple_filter;
|
|
struct rte_eth_ethertype_filter ethertype_filter;
|
|
struct hinic_fdir_rule fdir_rule;
|
|
struct hinic_ntuple_filter_ele *ntuple_filter_ptr;
|
|
struct hinic_ethertype_filter_ele *ethertype_filter_ptr;
|
|
struct hinic_fdir_rule_ele *fdir_rule_ptr;
|
|
struct hinic_flow_mem *hinic_flow_mem_ptr;
|
|
struct hinic_nic_dev *nic_dev = HINIC_ETH_DEV_TO_PRIVATE_NIC_DEV(dev);
|
|
|
|
switch (filter_type) {
|
|
case RTE_ETH_FILTER_NTUPLE:
|
|
ntuple_filter_ptr = (struct hinic_ntuple_filter_ele *)
|
|
pmd_flow->rule;
|
|
rte_memcpy(&ntuple_filter, &ntuple_filter_ptr->filter_info,
|
|
sizeof(struct rte_eth_ntuple_filter));
|
|
ret = hinic_add_del_ntuple_filter(dev, &ntuple_filter, FALSE);
|
|
if (!ret) {
|
|
TAILQ_REMOVE(&nic_dev->filter_ntuple_list,
|
|
ntuple_filter_ptr, entries);
|
|
rte_free(ntuple_filter_ptr);
|
|
}
|
|
break;
|
|
case RTE_ETH_FILTER_ETHERTYPE:
|
|
ethertype_filter_ptr = (struct hinic_ethertype_filter_ele *)
|
|
pmd_flow->rule;
|
|
rte_memcpy(ðertype_filter,
|
|
ðertype_filter_ptr->filter_info,
|
|
sizeof(struct rte_eth_ethertype_filter));
|
|
ret = hinic_add_del_ethertype_filter(dev,
|
|
ðertype_filter, FALSE);
|
|
if (!ret) {
|
|
TAILQ_REMOVE(&nic_dev->filter_ethertype_list,
|
|
ethertype_filter_ptr, entries);
|
|
rte_free(ethertype_filter_ptr);
|
|
}
|
|
break;
|
|
case RTE_ETH_FILTER_FDIR:
|
|
fdir_rule_ptr = (struct hinic_fdir_rule_ele *)pmd_flow->rule;
|
|
rte_memcpy(&fdir_rule,
|
|
&fdir_rule_ptr->filter_info,
|
|
sizeof(struct hinic_fdir_rule));
|
|
if (fdir_rule.mode == HINIC_FDIR_MODE_NORMAL) {
|
|
ret = hinic_add_del_fdir_filter(dev, &fdir_rule, FALSE);
|
|
} else if (fdir_rule.mode == HINIC_FDIR_MODE_TCAM) {
|
|
ret = hinic_add_del_tcam_fdir_filter(dev, &fdir_rule,
|
|
FALSE);
|
|
} else {
|
|
PMD_DRV_LOG(ERR, "FDIR Filter type is wrong!");
|
|
ret = -EINVAL;
|
|
}
|
|
if (!ret) {
|
|
TAILQ_REMOVE(&nic_dev->filter_fdir_rule_list,
|
|
fdir_rule_ptr, entries);
|
|
rte_free(fdir_rule_ptr);
|
|
}
|
|
break;
|
|
default:
|
|
PMD_DRV_LOG(WARNING, "Filter type (%d) is not supported",
|
|
filter_type);
|
|
ret = -EINVAL;
|
|
break;
|
|
}
|
|
|
|
if (ret) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_HANDLE,
|
|
NULL, "Failed to destroy flow");
|
|
return ret;
|
|
}
|
|
|
|
TAILQ_FOREACH(hinic_flow_mem_ptr, &nic_dev->hinic_flow_list, entries) {
|
|
if (hinic_flow_mem_ptr->flow == pmd_flow) {
|
|
TAILQ_REMOVE(&nic_dev->hinic_flow_list,
|
|
hinic_flow_mem_ptr, entries);
|
|
rte_free(hinic_flow_mem_ptr);
|
|
break;
|
|
}
|
|
}
|
|
rte_free(flow);
|
|
|
|
PMD_DRV_LOG(INFO, "Destroy flow succeed, func_id: 0x%x",
|
|
hinic_global_func_id(nic_dev->hwdev));
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Remove all the n-tuple filters */
|
|
static void hinic_clear_all_ntuple_filter(struct rte_eth_dev *dev)
|
|
{
|
|
struct hinic_filter_info *filter_info =
|
|
HINIC_DEV_PRIVATE_TO_FILTER_INFO(dev->data->dev_private);
|
|
struct hinic_5tuple_filter *p_5tuple;
|
|
|
|
while ((p_5tuple = TAILQ_FIRST(&filter_info->fivetuple_list)))
|
|
hinic_remove_5tuple_filter(dev, p_5tuple);
|
|
}
|
|
|
|
/* Remove all the ether type filters */
|
|
static void hinic_clear_all_ethertype_filter(struct rte_eth_dev *dev)
|
|
{
|
|
struct hinic_nic_dev *nic_dev = HINIC_ETH_DEV_TO_PRIVATE_NIC_DEV(dev);
|
|
struct hinic_filter_info *filter_info =
|
|
HINIC_DEV_PRIVATE_TO_FILTER_INFO(nic_dev);
|
|
int ret = 0;
|
|
|
|
if (filter_info->type_mask &
|
|
(1 << HINIC_PKT_TYPE_FIND_ID(PKT_LACP_TYPE))) {
|
|
hinic_ethertype_filter_remove(filter_info,
|
|
HINIC_PKT_TYPE_FIND_ID(PKT_LACP_TYPE));
|
|
ret = hinic_set_fdir_filter(nic_dev->hwdev, PKT_LACP_TYPE,
|
|
filter_info->qid, false, true);
|
|
|
|
(void)hinic_clear_fdir_tcam(nic_dev->hwdev, TCAM_PKT_LACP);
|
|
}
|
|
|
|
if (filter_info->type_mask &
|
|
(1 << HINIC_PKT_TYPE_FIND_ID(PKT_ARP_TYPE))) {
|
|
hinic_ethertype_filter_remove(filter_info,
|
|
HINIC_PKT_TYPE_FIND_ID(PKT_ARP_TYPE));
|
|
ret = hinic_set_fdir_filter(nic_dev->hwdev, PKT_ARP_TYPE,
|
|
filter_info->qid, false, true);
|
|
}
|
|
|
|
if (ret)
|
|
PMD_DRV_LOG(ERR, "Clear ethertype failed, filter type: 0x%x",
|
|
filter_info->pkt_type);
|
|
}
|
|
|
|
/* Remove all the ether type filters */
|
|
static void hinic_clear_all_fdir_filter(struct rte_eth_dev *dev)
|
|
{
|
|
struct hinic_nic_dev *nic_dev = HINIC_ETH_DEV_TO_PRIVATE_NIC_DEV(dev);
|
|
struct hinic_tcam_info *tcam_info =
|
|
HINIC_DEV_PRIVATE_TO_TCAM_INFO(dev->data->dev_private);
|
|
struct hinic_tcam_filter *tcam_filter_ptr;
|
|
|
|
while ((tcam_filter_ptr = TAILQ_FIRST(&tcam_info->tcam_list)))
|
|
(void)hinic_del_tcam_filter(dev, tcam_filter_ptr);
|
|
|
|
(void)hinic_set_fdir_filter(nic_dev->hwdev, 0, 0, 0, false);
|
|
|
|
(void)hinic_flush_tcam_rule(nic_dev->hwdev);
|
|
}
|
|
|
|
static void hinic_filterlist_flush(struct rte_eth_dev *dev)
|
|
{
|
|
struct hinic_ntuple_filter_ele *ntuple_filter_ptr;
|
|
struct hinic_ethertype_filter_ele *ethertype_filter_ptr;
|
|
struct hinic_fdir_rule_ele *fdir_rule_ptr;
|
|
struct hinic_flow_mem *hinic_flow_mem_ptr;
|
|
struct hinic_nic_dev *nic_dev = HINIC_ETH_DEV_TO_PRIVATE_NIC_DEV(dev);
|
|
|
|
while ((ntuple_filter_ptr =
|
|
TAILQ_FIRST(&nic_dev->filter_ntuple_list))) {
|
|
TAILQ_REMOVE(&nic_dev->filter_ntuple_list, ntuple_filter_ptr,
|
|
entries);
|
|
rte_free(ntuple_filter_ptr);
|
|
}
|
|
|
|
while ((ethertype_filter_ptr =
|
|
TAILQ_FIRST(&nic_dev->filter_ethertype_list))) {
|
|
TAILQ_REMOVE(&nic_dev->filter_ethertype_list,
|
|
ethertype_filter_ptr,
|
|
entries);
|
|
rte_free(ethertype_filter_ptr);
|
|
}
|
|
|
|
while ((fdir_rule_ptr =
|
|
TAILQ_FIRST(&nic_dev->filter_fdir_rule_list))) {
|
|
TAILQ_REMOVE(&nic_dev->filter_fdir_rule_list, fdir_rule_ptr,
|
|
entries);
|
|
rte_free(fdir_rule_ptr);
|
|
}
|
|
|
|
while ((hinic_flow_mem_ptr =
|
|
TAILQ_FIRST(&nic_dev->hinic_flow_list))) {
|
|
TAILQ_REMOVE(&nic_dev->hinic_flow_list, hinic_flow_mem_ptr,
|
|
entries);
|
|
rte_free(hinic_flow_mem_ptr->flow);
|
|
rte_free(hinic_flow_mem_ptr);
|
|
}
|
|
}
|
|
|
|
/* Destroy all flow rules associated with a port on hinic. */
|
|
static int hinic_flow_flush(struct rte_eth_dev *dev,
|
|
__rte_unused struct rte_flow_error *error)
|
|
{
|
|
struct hinic_nic_dev *nic_dev = HINIC_ETH_DEV_TO_PRIVATE_NIC_DEV(dev);
|
|
|
|
hinic_clear_all_ntuple_filter(dev);
|
|
hinic_clear_all_ethertype_filter(dev);
|
|
hinic_clear_all_fdir_filter(dev);
|
|
hinic_filterlist_flush(dev);
|
|
|
|
PMD_DRV_LOG(INFO, "Flush flow succeed, func_id: 0x%x",
|
|
hinic_global_func_id(nic_dev->hwdev));
|
|
return 0;
|
|
}
|
|
|
|
void hinic_destroy_fdir_filter(struct rte_eth_dev *dev)
|
|
{
|
|
hinic_clear_all_ntuple_filter(dev);
|
|
hinic_clear_all_ethertype_filter(dev);
|
|
hinic_clear_all_fdir_filter(dev);
|
|
hinic_filterlist_flush(dev);
|
|
}
|
|
|
|
const struct rte_flow_ops hinic_flow_ops = {
|
|
.validate = hinic_flow_validate,
|
|
.create = hinic_flow_create,
|
|
.destroy = hinic_flow_destroy,
|
|
.flush = hinic_flow_flush,
|
|
};
|
|
|