11777435c7
check if the rule is a flow director rule, and get the flow director info. Signed-off-by: Wei Zhao <wei.zhao1@intel.com> Signed-off-by: Wenzhuo Lu <wenzhuo.lu@intel.com> Acked-by: Beilei Xing <beilei.xing@intel.com> Acked-by: Wei Dai <wei.dai@intel.com>
2516 lines
71 KiB
C
2516 lines
71 KiB
C
/*-
|
|
* BSD LICENSE
|
|
*
|
|
* Copyright(c) 2010-2016 Intel Corporation. All rights reserved.
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* * Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* * Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in
|
|
* the documentation and/or other materials provided with the
|
|
* distribution.
|
|
* * Neither the name of Intel Corporation nor the names of its
|
|
* contributors may be used to endorse or promote products derived
|
|
* from this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include <sys/queue.h>
|
|
#include <stdio.h>
|
|
#include <errno.h>
|
|
#include <stdint.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
#include <stdarg.h>
|
|
#include <inttypes.h>
|
|
#include <netinet/in.h>
|
|
#include <rte_byteorder.h>
|
|
#include <rte_common.h>
|
|
#include <rte_cycles.h>
|
|
|
|
#include <rte_interrupts.h>
|
|
#include <rte_log.h>
|
|
#include <rte_debug.h>
|
|
#include <rte_pci.h>
|
|
#include <rte_atomic.h>
|
|
#include <rte_branch_prediction.h>
|
|
#include <rte_memory.h>
|
|
#include <rte_memzone.h>
|
|
#include <rte_eal.h>
|
|
#include <rte_alarm.h>
|
|
#include <rte_ether.h>
|
|
#include <rte_ethdev.h>
|
|
#include <rte_atomic.h>
|
|
#include <rte_malloc.h>
|
|
#include <rte_random.h>
|
|
#include <rte_dev.h>
|
|
#include <rte_hash_crc.h>
|
|
#include <rte_flow.h>
|
|
#include <rte_flow_driver.h>
|
|
|
|
#include "ixgbe_logs.h"
|
|
#include "base/ixgbe_api.h"
|
|
#include "base/ixgbe_vf.h"
|
|
#include "base/ixgbe_common.h"
|
|
#include "ixgbe_ethdev.h"
|
|
#include "ixgbe_bypass.h"
|
|
#include "ixgbe_rxtx.h"
|
|
#include "base/ixgbe_type.h"
|
|
#include "base/ixgbe_phy.h"
|
|
#include "rte_pmd_ixgbe.h"
|
|
|
|
static int ixgbe_flow_flush(struct rte_eth_dev *dev,
|
|
struct rte_flow_error *error);
|
|
static int
|
|
cons_parse_ntuple_filter(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct rte_eth_ntuple_filter *filter,
|
|
struct rte_flow_error *error);
|
|
static int
|
|
ixgbe_parse_ntuple_filter(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct rte_eth_ntuple_filter *filter,
|
|
struct rte_flow_error *error);
|
|
static int
|
|
cons_parse_ethertype_filter(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item *pattern,
|
|
const struct rte_flow_action *actions,
|
|
struct rte_eth_ethertype_filter *filter,
|
|
struct rte_flow_error *error);
|
|
static int
|
|
ixgbe_parse_ethertype_filter(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct rte_eth_ethertype_filter *filter,
|
|
struct rte_flow_error *error);
|
|
static int
|
|
cons_parse_syn_filter(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct rte_eth_syn_filter *filter,
|
|
struct rte_flow_error *error);
|
|
static int
|
|
ixgbe_parse_syn_filter(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct rte_eth_syn_filter *filter,
|
|
struct rte_flow_error *error);
|
|
static int
|
|
cons_parse_l2_tn_filter(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct rte_eth_l2_tunnel_conf *filter,
|
|
struct rte_flow_error *error);
|
|
static int
|
|
ixgbe_validate_l2_tn_filter(struct rte_eth_dev *dev,
|
|
const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct rte_eth_l2_tunnel_conf *rule,
|
|
struct rte_flow_error *error);
|
|
static int
|
|
ixgbe_validate_fdir_filter(struct rte_eth_dev *dev,
|
|
const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct ixgbe_fdir_rule *rule,
|
|
struct rte_flow_error *error);
|
|
static int
|
|
ixgbe_parse_fdir_filter_normal(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct ixgbe_fdir_rule *rule,
|
|
struct rte_flow_error *error);
|
|
static int
|
|
ixgbe_parse_fdir_filter_tunnel(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct ixgbe_fdir_rule *rule,
|
|
struct rte_flow_error *error);
|
|
static int
|
|
ixgbe_parse_fdir_filter(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct ixgbe_fdir_rule *rule,
|
|
struct rte_flow_error *error);
|
|
static int
|
|
ixgbe_flow_validate(__rte_unused struct rte_eth_dev *dev,
|
|
const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct rte_flow_error *error);
|
|
|
|
const struct rte_flow_ops ixgbe_flow_ops = {
|
|
ixgbe_flow_validate,
|
|
NULL,
|
|
NULL,
|
|
ixgbe_flow_flush,
|
|
NULL,
|
|
};
|
|
|
|
#define IXGBE_MIN_N_TUPLE_PRIO 1
|
|
#define IXGBE_MAX_N_TUPLE_PRIO 7
|
|
#define NEXT_ITEM_OF_PATTERN(item, pattern, index)\
|
|
do { \
|
|
item = pattern + index;\
|
|
while (item->type == RTE_FLOW_ITEM_TYPE_VOID) {\
|
|
index++; \
|
|
item = pattern + index; \
|
|
} \
|
|
} while (0)
|
|
|
|
#define NEXT_ITEM_OF_ACTION(act, actions, index)\
|
|
do { \
|
|
act = actions + index; \
|
|
while (act->type == RTE_FLOW_ACTION_TYPE_VOID) {\
|
|
index++; \
|
|
act = actions + index; \
|
|
} \
|
|
} while (0)
|
|
|
|
/**
|
|
* Please aware there's an asumption for all the parsers.
|
|
* rte_flow_item is using big endian, rte_flow_attr and
|
|
* rte_flow_action are using CPU order.
|
|
* Because the pattern is used to describe the packets,
|
|
* normally the packets should use network order.
|
|
*/
|
|
|
|
/**
|
|
* Parse the rule to see if it is a n-tuple rule.
|
|
* And get the n-tuple filter info BTW.
|
|
* pattern:
|
|
* The first not void item can be ETH or IPV4.
|
|
* The second not void item must be IPV4 if the first one is ETH.
|
|
* The third not void item must be UDP or TCP.
|
|
* The next not void item must be END.
|
|
* action:
|
|
* The first not void action should be QUEUE.
|
|
* The next not void action should be END.
|
|
* pattern example:
|
|
* ITEM Spec Mask
|
|
* ETH NULL NULL
|
|
* IPV4 src_addr 192.168.1.20 0xFFFFFFFF
|
|
* dst_addr 192.167.3.50 0xFFFFFFFF
|
|
* next_proto_id 17 0xFF
|
|
* UDP/TCP src_port 80 0xFFFF
|
|
* dst_port 80 0xFFFF
|
|
* END
|
|
* other members in mask and spec should set to 0x00.
|
|
* item->last should be NULL.
|
|
*/
|
|
static int
|
|
cons_parse_ntuple_filter(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct rte_eth_ntuple_filter *filter,
|
|
struct rte_flow_error *error)
|
|
{
|
|
const struct rte_flow_item *item;
|
|
const struct rte_flow_action *act;
|
|
const struct rte_flow_item_ipv4 *ipv4_spec;
|
|
const struct rte_flow_item_ipv4 *ipv4_mask;
|
|
const struct rte_flow_item_tcp *tcp_spec;
|
|
const struct rte_flow_item_tcp *tcp_mask;
|
|
const struct rte_flow_item_udp *udp_spec;
|
|
const struct rte_flow_item_udp *udp_mask;
|
|
uint32_t index;
|
|
|
|
if (!pattern) {
|
|
rte_flow_error_set(error,
|
|
EINVAL, RTE_FLOW_ERROR_TYPE_ITEM_NUM,
|
|
NULL, "NULL pattern.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (!actions) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ACTION_NUM,
|
|
NULL, "NULL action.");
|
|
return -rte_errno;
|
|
}
|
|
if (!attr) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR,
|
|
NULL, "NULL attribute.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* parse pattern */
|
|
index = 0;
|
|
|
|
/* the first not void item can be MAC or IPv4 */
|
|
NEXT_ITEM_OF_PATTERN(item, pattern, index);
|
|
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_ETH &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_IPV4) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by ntuple filter");
|
|
return -rte_errno;
|
|
}
|
|
/* Skip Ethernet */
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_ETH) {
|
|
/*Not supported last point for range*/
|
|
if (item->last) {
|
|
rte_flow_error_set(error,
|
|
EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
|
|
}
|
|
/* if the first item is MAC, the content should be NULL */
|
|
if (item->spec || item->mask) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by ntuple filter");
|
|
return -rte_errno;
|
|
}
|
|
/* check if the next not void item is IPv4 */
|
|
index++;
|
|
NEXT_ITEM_OF_PATTERN(item, pattern, index);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_IPV4) {
|
|
rte_flow_error_set(error,
|
|
EINVAL, RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by ntuple filter");
|
|
return -rte_errno;
|
|
}
|
|
}
|
|
|
|
/* get the IPv4 info */
|
|
if (!item->spec || !item->mask) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Invalid ntuple mask");
|
|
return -rte_errno;
|
|
}
|
|
/*Not supported last point for range*/
|
|
if (item->last) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
|
|
}
|
|
|
|
ipv4_mask = (const struct rte_flow_item_ipv4 *)item->mask;
|
|
/**
|
|
* Only support src & dst addresses, protocol,
|
|
* others should be masked.
|
|
*/
|
|
if (ipv4_mask->hdr.version_ihl ||
|
|
ipv4_mask->hdr.type_of_service ||
|
|
ipv4_mask->hdr.total_length ||
|
|
ipv4_mask->hdr.packet_id ||
|
|
ipv4_mask->hdr.fragment_offset ||
|
|
ipv4_mask->hdr.time_to_live ||
|
|
ipv4_mask->hdr.hdr_checksum) {
|
|
rte_flow_error_set(error,
|
|
EINVAL, RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by ntuple filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
filter->dst_ip_mask = ipv4_mask->hdr.dst_addr;
|
|
filter->src_ip_mask = ipv4_mask->hdr.src_addr;
|
|
filter->proto_mask = ipv4_mask->hdr.next_proto_id;
|
|
|
|
ipv4_spec = (const struct rte_flow_item_ipv4 *)item->spec;
|
|
filter->dst_ip = ipv4_spec->hdr.dst_addr;
|
|
filter->src_ip = ipv4_spec->hdr.src_addr;
|
|
filter->proto = ipv4_spec->hdr.next_proto_id;
|
|
|
|
/* check if the next not void item is TCP or UDP */
|
|
index++;
|
|
NEXT_ITEM_OF_PATTERN(item, pattern, index);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_TCP &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_UDP) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ntuple_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by ntuple filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* get the TCP/UDP info */
|
|
if (!item->spec || !item->mask) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ntuple_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Invalid ntuple mask");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/*Not supported last point for range*/
|
|
if (item->last) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ntuple_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
|
|
}
|
|
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_TCP) {
|
|
tcp_mask = (const struct rte_flow_item_tcp *)item->mask;
|
|
|
|
/**
|
|
* Only support src & dst ports, tcp flags,
|
|
* others should be masked.
|
|
*/
|
|
if (tcp_mask->hdr.sent_seq ||
|
|
tcp_mask->hdr.recv_ack ||
|
|
tcp_mask->hdr.data_off ||
|
|
tcp_mask->hdr.rx_win ||
|
|
tcp_mask->hdr.cksum ||
|
|
tcp_mask->hdr.tcp_urp) {
|
|
memset(filter, 0,
|
|
sizeof(struct rte_eth_ntuple_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by ntuple filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
filter->dst_port_mask = tcp_mask->hdr.dst_port;
|
|
filter->src_port_mask = tcp_mask->hdr.src_port;
|
|
if (tcp_mask->hdr.tcp_flags == 0xFF) {
|
|
filter->flags |= RTE_NTUPLE_FLAGS_TCP_FLAG;
|
|
} else if (!tcp_mask->hdr.tcp_flags) {
|
|
filter->flags &= ~RTE_NTUPLE_FLAGS_TCP_FLAG;
|
|
} else {
|
|
memset(filter, 0, sizeof(struct rte_eth_ntuple_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by ntuple filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
tcp_spec = (const struct rte_flow_item_tcp *)item->spec;
|
|
filter->dst_port = tcp_spec->hdr.dst_port;
|
|
filter->src_port = tcp_spec->hdr.src_port;
|
|
filter->tcp_flags = tcp_spec->hdr.tcp_flags;
|
|
} else {
|
|
udp_mask = (const struct rte_flow_item_udp *)item->mask;
|
|
|
|
/**
|
|
* Only support src & dst ports,
|
|
* others should be masked.
|
|
*/
|
|
if (udp_mask->hdr.dgram_len ||
|
|
udp_mask->hdr.dgram_cksum) {
|
|
memset(filter, 0,
|
|
sizeof(struct rte_eth_ntuple_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by ntuple filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
filter->dst_port_mask = udp_mask->hdr.dst_port;
|
|
filter->src_port_mask = udp_mask->hdr.src_port;
|
|
|
|
udp_spec = (const struct rte_flow_item_udp *)item->spec;
|
|
filter->dst_port = udp_spec->hdr.dst_port;
|
|
filter->src_port = udp_spec->hdr.src_port;
|
|
}
|
|
|
|
/* check if the next not void item is END */
|
|
index++;
|
|
NEXT_ITEM_OF_PATTERN(item, pattern, index);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_END) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ntuple_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by ntuple filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* parse action */
|
|
index = 0;
|
|
|
|
/**
|
|
* n-tuple only supports forwarding,
|
|
* check if the first not void action is QUEUE.
|
|
*/
|
|
NEXT_ITEM_OF_ACTION(act, actions, index);
|
|
if (act->type != RTE_FLOW_ACTION_TYPE_QUEUE) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ntuple_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ACTION,
|
|
item, "Not supported action.");
|
|
return -rte_errno;
|
|
}
|
|
filter->queue =
|
|
((const struct rte_flow_action_queue *)act->conf)->index;
|
|
|
|
/* check if the next not void item is END */
|
|
index++;
|
|
NEXT_ITEM_OF_ACTION(act, actions, index);
|
|
if (act->type != RTE_FLOW_ACTION_TYPE_END) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ntuple_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ACTION,
|
|
act, "Not supported action.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* parse attr */
|
|
/* must be input direction */
|
|
if (!attr->ingress) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ntuple_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_INGRESS,
|
|
attr, "Only support ingress.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* not supported */
|
|
if (attr->egress) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ntuple_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_EGRESS,
|
|
attr, "Not support egress.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (attr->priority > 0xFFFF) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ntuple_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_PRIORITY,
|
|
attr, "Error priority.");
|
|
return -rte_errno;
|
|
}
|
|
filter->priority = (uint16_t)attr->priority;
|
|
if (attr->priority < IXGBE_MIN_N_TUPLE_PRIO ||
|
|
attr->priority > IXGBE_MAX_N_TUPLE_PRIO)
|
|
filter->priority = 1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* a specific function for ixgbe because the flags is specific */
|
|
static int
|
|
ixgbe_parse_ntuple_filter(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct rte_eth_ntuple_filter *filter,
|
|
struct rte_flow_error *error)
|
|
{
|
|
int ret;
|
|
|
|
ret = cons_parse_ntuple_filter(attr, pattern, actions, filter, error);
|
|
|
|
if (ret)
|
|
return ret;
|
|
|
|
/* Ixgbe doesn't support tcp flags. */
|
|
if (filter->flags & RTE_NTUPLE_FLAGS_TCP_FLAG) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ntuple_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
NULL, "Not supported by ntuple filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* Ixgbe doesn't support many priorities. */
|
|
if (filter->priority < IXGBE_MIN_N_TUPLE_PRIO ||
|
|
filter->priority > IXGBE_MAX_N_TUPLE_PRIO) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ntuple_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
NULL, "Priority not supported by ntuple filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (filter->queue >= IXGBE_MAX_RX_QUEUE_NUM ||
|
|
filter->priority > IXGBE_5TUPLE_MAX_PRI ||
|
|
filter->priority < IXGBE_5TUPLE_MIN_PRI)
|
|
return -rte_errno;
|
|
|
|
/* fixed value for ixgbe */
|
|
filter->flags = RTE_5TUPLE_FLAGS;
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* Parse the rule to see if it is a ethertype rule.
|
|
* And get the ethertype filter info BTW.
|
|
* pattern:
|
|
* The first not void item can be ETH.
|
|
* The next not void item must be END.
|
|
* action:
|
|
* The first not void action should be QUEUE.
|
|
* The next not void action should be END.
|
|
* pattern example:
|
|
* ITEM Spec Mask
|
|
* ETH type 0x0807 0xFFFF
|
|
* END
|
|
* other members in mask and spec should set to 0x00.
|
|
* item->last should be NULL.
|
|
*/
|
|
static int
|
|
cons_parse_ethertype_filter(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item *pattern,
|
|
const struct rte_flow_action *actions,
|
|
struct rte_eth_ethertype_filter *filter,
|
|
struct rte_flow_error *error)
|
|
{
|
|
const struct rte_flow_item *item;
|
|
const struct rte_flow_action *act;
|
|
const struct rte_flow_item_eth *eth_spec;
|
|
const struct rte_flow_item_eth *eth_mask;
|
|
const struct rte_flow_action_queue *act_q;
|
|
uint32_t index;
|
|
|
|
if (!pattern) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM_NUM,
|
|
NULL, "NULL pattern.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (!actions) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ACTION_NUM,
|
|
NULL, "NULL action.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (!attr) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR,
|
|
NULL, "NULL attribute.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* Parse pattern */
|
|
index = 0;
|
|
|
|
/* The first non-void item should be MAC. */
|
|
item = pattern + index;
|
|
while (item->type == RTE_FLOW_ITEM_TYPE_VOID) {
|
|
index++;
|
|
item = pattern + index;
|
|
}
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_ETH) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by ethertype filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/*Not supported last point for range*/
|
|
if (item->last) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* Get the MAC info. */
|
|
if (!item->spec || !item->mask) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by ethertype filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
eth_spec = (const struct rte_flow_item_eth *)item->spec;
|
|
eth_mask = (const struct rte_flow_item_eth *)item->mask;
|
|
|
|
/* Mask bits of source MAC address must be full of 0.
|
|
* Mask bits of destination MAC address must be full
|
|
* of 1 or full of 0.
|
|
*/
|
|
if (!is_zero_ether_addr(ð_mask->src) ||
|
|
(!is_zero_ether_addr(ð_mask->dst) &&
|
|
!is_broadcast_ether_addr(ð_mask->dst))) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Invalid ether address mask");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if ((eth_mask->type & UINT16_MAX) != UINT16_MAX) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Invalid ethertype mask");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* If mask bits of destination MAC address
|
|
* are full of 1, set RTE_ETHTYPE_FLAGS_MAC.
|
|
*/
|
|
if (is_broadcast_ether_addr(ð_mask->dst)) {
|
|
filter->mac_addr = eth_spec->dst;
|
|
filter->flags |= RTE_ETHTYPE_FLAGS_MAC;
|
|
} else {
|
|
filter->flags &= ~RTE_ETHTYPE_FLAGS_MAC;
|
|
}
|
|
filter->ether_type = rte_be_to_cpu_16(eth_spec->type);
|
|
|
|
/* Check if the next non-void item is END. */
|
|
index++;
|
|
item = pattern + index;
|
|
while (item->type == RTE_FLOW_ITEM_TYPE_VOID) {
|
|
index++;
|
|
item = pattern + index;
|
|
}
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_END) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by ethertype filter.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* Parse action */
|
|
|
|
index = 0;
|
|
/* Check if the first non-void action is QUEUE or DROP. */
|
|
act = actions + index;
|
|
while (act->type == RTE_FLOW_ACTION_TYPE_VOID) {
|
|
index++;
|
|
act = actions + index;
|
|
}
|
|
if (act->type != RTE_FLOW_ACTION_TYPE_QUEUE &&
|
|
act->type != RTE_FLOW_ACTION_TYPE_DROP) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ACTION,
|
|
act, "Not supported action.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (act->type == RTE_FLOW_ACTION_TYPE_QUEUE) {
|
|
act_q = (const struct rte_flow_action_queue *)act->conf;
|
|
filter->queue = act_q->index;
|
|
} else {
|
|
filter->flags |= RTE_ETHTYPE_FLAGS_DROP;
|
|
}
|
|
|
|
/* Check if the next non-void item is END */
|
|
index++;
|
|
act = actions + index;
|
|
while (act->type == RTE_FLOW_ACTION_TYPE_VOID) {
|
|
index++;
|
|
act = actions + index;
|
|
}
|
|
if (act->type != RTE_FLOW_ACTION_TYPE_END) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ACTION,
|
|
act, "Not supported action.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* Parse attr */
|
|
/* Must be input direction */
|
|
if (!attr->ingress) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_INGRESS,
|
|
attr, "Only support ingress.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* Not supported */
|
|
if (attr->egress) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_EGRESS,
|
|
attr, "Not support egress.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* Not supported */
|
|
if (attr->priority) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_PRIORITY,
|
|
attr, "Not support priority.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* Not supported */
|
|
if (attr->group) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_GROUP,
|
|
attr, "Not support group.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
ixgbe_parse_ethertype_filter(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct rte_eth_ethertype_filter *filter,
|
|
struct rte_flow_error *error)
|
|
{
|
|
int ret;
|
|
|
|
ret = cons_parse_ethertype_filter(attr, pattern,
|
|
actions, filter, error);
|
|
|
|
if (ret)
|
|
return ret;
|
|
|
|
/* Ixgbe doesn't support MAC address. */
|
|
if (filter->flags & RTE_ETHTYPE_FLAGS_MAC) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ethertype_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
NULL, "Not supported by ethertype filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (filter->queue >= IXGBE_MAX_RX_QUEUE_NUM) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ethertype_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
NULL, "queue index much too big");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (filter->ether_type == ETHER_TYPE_IPv4 ||
|
|
filter->ether_type == ETHER_TYPE_IPv6) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ethertype_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
NULL, "IPv4/IPv6 not supported by ethertype filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (filter->flags & RTE_ETHTYPE_FLAGS_MAC) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ethertype_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
NULL, "mac compare is unsupported");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (filter->flags & RTE_ETHTYPE_FLAGS_DROP) {
|
|
memset(filter, 0, sizeof(struct rte_eth_ethertype_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
NULL, "drop option is unsupported");
|
|
return -rte_errno;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* Parse the rule to see if it is a TCP SYN rule.
|
|
* And get the TCP SYN filter info BTW.
|
|
* pattern:
|
|
* The first not void item must be ETH.
|
|
* The second not void item must be IPV4 or IPV6.
|
|
* The third not void item must be TCP.
|
|
* The next not void item must be END.
|
|
* action:
|
|
* The first not void action should be QUEUE.
|
|
* The next not void action should be END.
|
|
* pattern example:
|
|
* ITEM Spec Mask
|
|
* ETH NULL NULL
|
|
* IPV4/IPV6 NULL NULL
|
|
* TCP tcp_flags 0x02 0xFF
|
|
* END
|
|
* other members in mask and spec should set to 0x00.
|
|
* item->last should be NULL.
|
|
*/
|
|
static int
|
|
cons_parse_syn_filter(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct rte_eth_syn_filter *filter,
|
|
struct rte_flow_error *error)
|
|
{
|
|
const struct rte_flow_item *item;
|
|
const struct rte_flow_action *act;
|
|
const struct rte_flow_item_tcp *tcp_spec;
|
|
const struct rte_flow_item_tcp *tcp_mask;
|
|
const struct rte_flow_action_queue *act_q;
|
|
uint32_t index;
|
|
|
|
if (!pattern) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM_NUM,
|
|
NULL, "NULL pattern.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (!actions) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ACTION_NUM,
|
|
NULL, "NULL action.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (!attr) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR,
|
|
NULL, "NULL attribute.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* parse pattern */
|
|
index = 0;
|
|
|
|
/* the first not void item should be MAC or IPv4 or IPv6 or TCP */
|
|
NEXT_ITEM_OF_PATTERN(item, pattern, index);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_ETH &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_IPV4 &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_IPV6 &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_TCP) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by syn filter");
|
|
return -rte_errno;
|
|
}
|
|
/*Not supported last point for range*/
|
|
if (item->last) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* Skip Ethernet */
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_ETH) {
|
|
/* if the item is MAC, the content should be NULL */
|
|
if (item->spec || item->mask) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Invalid SYN address mask");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* check if the next not void item is IPv4 or IPv6 */
|
|
index++;
|
|
NEXT_ITEM_OF_PATTERN(item, pattern, index);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_IPV4 &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_IPV6) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by syn filter");
|
|
return -rte_errno;
|
|
}
|
|
}
|
|
|
|
/* Skip IP */
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_IPV4 ||
|
|
item->type == RTE_FLOW_ITEM_TYPE_IPV6) {
|
|
/* if the item is IP, the content should be NULL */
|
|
if (item->spec || item->mask) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Invalid SYN mask");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* check if the next not void item is TCP */
|
|
index++;
|
|
NEXT_ITEM_OF_PATTERN(item, pattern, index);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_TCP) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by syn filter");
|
|
return -rte_errno;
|
|
}
|
|
}
|
|
|
|
/* Get the TCP info. Only support SYN. */
|
|
if (!item->spec || !item->mask) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Invalid SYN mask");
|
|
return -rte_errno;
|
|
}
|
|
/*Not supported last point for range*/
|
|
if (item->last) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
}
|
|
|
|
tcp_spec = (const struct rte_flow_item_tcp *)item->spec;
|
|
tcp_mask = (const struct rte_flow_item_tcp *)item->mask;
|
|
if (!(tcp_spec->hdr.tcp_flags & TCP_SYN_FLAG) ||
|
|
tcp_mask->hdr.src_port ||
|
|
tcp_mask->hdr.dst_port ||
|
|
tcp_mask->hdr.sent_seq ||
|
|
tcp_mask->hdr.recv_ack ||
|
|
tcp_mask->hdr.data_off ||
|
|
tcp_mask->hdr.tcp_flags != TCP_SYN_FLAG ||
|
|
tcp_mask->hdr.rx_win ||
|
|
tcp_mask->hdr.cksum ||
|
|
tcp_mask->hdr.tcp_urp) {
|
|
memset(filter, 0, sizeof(struct rte_eth_syn_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by syn filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* check if the next not void item is END */
|
|
index++;
|
|
NEXT_ITEM_OF_PATTERN(item, pattern, index);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_END) {
|
|
memset(filter, 0, sizeof(struct rte_eth_syn_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by syn filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* parse action */
|
|
index = 0;
|
|
|
|
/* check if the first not void action is QUEUE. */
|
|
NEXT_ITEM_OF_ACTION(act, actions, index);
|
|
if (act->type != RTE_FLOW_ACTION_TYPE_QUEUE) {
|
|
memset(filter, 0, sizeof(struct rte_eth_syn_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ACTION,
|
|
act, "Not supported action.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
act_q = (const struct rte_flow_action_queue *)act->conf;
|
|
filter->queue = act_q->index;
|
|
if (filter->queue >= IXGBE_MAX_RX_QUEUE_NUM) {
|
|
memset(filter, 0, sizeof(struct rte_eth_syn_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ACTION,
|
|
act, "Not supported action.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* check if the next not void item is END */
|
|
index++;
|
|
NEXT_ITEM_OF_ACTION(act, actions, index);
|
|
if (act->type != RTE_FLOW_ACTION_TYPE_END) {
|
|
memset(filter, 0, sizeof(struct rte_eth_syn_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ACTION,
|
|
act, "Not supported action.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* parse attr */
|
|
/* must be input direction */
|
|
if (!attr->ingress) {
|
|
memset(filter, 0, sizeof(struct rte_eth_syn_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_INGRESS,
|
|
attr, "Only support ingress.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* not supported */
|
|
if (attr->egress) {
|
|
memset(filter, 0, sizeof(struct rte_eth_syn_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_EGRESS,
|
|
attr, "Not support egress.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* Support 2 priorities, the lowest or highest. */
|
|
if (!attr->priority) {
|
|
filter->hig_pri = 0;
|
|
} else if (attr->priority == (uint32_t)~0U) {
|
|
filter->hig_pri = 1;
|
|
} else {
|
|
memset(filter, 0, sizeof(struct rte_eth_syn_filter));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_PRIORITY,
|
|
attr, "Not support priority.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
ixgbe_parse_syn_filter(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct rte_eth_syn_filter *filter,
|
|
struct rte_flow_error *error)
|
|
{
|
|
int ret;
|
|
|
|
ret = cons_parse_syn_filter(attr, pattern,
|
|
actions, filter, error);
|
|
|
|
if (ret)
|
|
return ret;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* Parse the rule to see if it is a L2 tunnel rule.
|
|
* And get the L2 tunnel filter info BTW.
|
|
* Only support E-tag now.
|
|
* pattern:
|
|
* The first not void item can be E_TAG.
|
|
* The next not void item must be END.
|
|
* action:
|
|
* The first not void action should be QUEUE.
|
|
* The next not void action should be END.
|
|
* pattern example:
|
|
* ITEM Spec Mask
|
|
* E_TAG grp 0x1 0x3
|
|
e_cid_base 0x309 0xFFF
|
|
* END
|
|
* other members in mask and spec should set to 0x00.
|
|
* item->last should be NULL.
|
|
*/
|
|
static int
|
|
cons_parse_l2_tn_filter(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct rte_eth_l2_tunnel_conf *filter,
|
|
struct rte_flow_error *error)
|
|
{
|
|
const struct rte_flow_item *item;
|
|
const struct rte_flow_item_e_tag *e_tag_spec;
|
|
const struct rte_flow_item_e_tag *e_tag_mask;
|
|
const struct rte_flow_action *act;
|
|
const struct rte_flow_action_queue *act_q;
|
|
uint32_t index;
|
|
|
|
if (!pattern) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM_NUM,
|
|
NULL, "NULL pattern.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (!actions) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ACTION_NUM,
|
|
NULL, "NULL action.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (!attr) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR,
|
|
NULL, "NULL attribute.");
|
|
return -rte_errno;
|
|
}
|
|
/* parse pattern */
|
|
index = 0;
|
|
|
|
/* The first not void item should be e-tag. */
|
|
NEXT_ITEM_OF_PATTERN(item, pattern, index);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_E_TAG) {
|
|
memset(filter, 0, sizeof(struct rte_eth_l2_tunnel_conf));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by L2 tunnel filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (!item->spec || !item->mask) {
|
|
memset(filter, 0, sizeof(struct rte_eth_l2_tunnel_conf));
|
|
rte_flow_error_set(error, EINVAL, RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by L2 tunnel filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/*Not supported last point for range*/
|
|
if (item->last) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
}
|
|
|
|
e_tag_spec = (const struct rte_flow_item_e_tag *)item->spec;
|
|
e_tag_mask = (const struct rte_flow_item_e_tag *)item->mask;
|
|
|
|
/* Only care about GRP and E cid base. */
|
|
if (e_tag_mask->epcp_edei_in_ecid_b ||
|
|
e_tag_mask->in_ecid_e ||
|
|
e_tag_mask->ecid_e ||
|
|
e_tag_mask->rsvd_grp_ecid_b != rte_cpu_to_be_16(0x3FFF)) {
|
|
memset(filter, 0, sizeof(struct rte_eth_l2_tunnel_conf));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by L2 tunnel filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
filter->l2_tunnel_type = RTE_L2_TUNNEL_TYPE_E_TAG;
|
|
/**
|
|
* grp and e_cid_base are bit fields and only use 14 bits.
|
|
* e-tag id is taken as little endian by HW.
|
|
*/
|
|
filter->tunnel_id = rte_be_to_cpu_16(e_tag_spec->rsvd_grp_ecid_b);
|
|
|
|
/* check if the next not void item is END */
|
|
index++;
|
|
NEXT_ITEM_OF_PATTERN(item, pattern, index);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_END) {
|
|
memset(filter, 0, sizeof(struct rte_eth_l2_tunnel_conf));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by L2 tunnel filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* parse attr */
|
|
/* must be input direction */
|
|
if (!attr->ingress) {
|
|
memset(filter, 0, sizeof(struct rte_eth_l2_tunnel_conf));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_INGRESS,
|
|
attr, "Only support ingress.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* not supported */
|
|
if (attr->egress) {
|
|
memset(filter, 0, sizeof(struct rte_eth_l2_tunnel_conf));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_EGRESS,
|
|
attr, "Not support egress.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* not supported */
|
|
if (attr->priority) {
|
|
memset(filter, 0, sizeof(struct rte_eth_l2_tunnel_conf));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_PRIORITY,
|
|
attr, "Not support priority.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* parse action */
|
|
index = 0;
|
|
|
|
/* check if the first not void action is QUEUE. */
|
|
NEXT_ITEM_OF_ACTION(act, actions, index);
|
|
if (act->type != RTE_FLOW_ACTION_TYPE_QUEUE) {
|
|
memset(filter, 0, sizeof(struct rte_eth_l2_tunnel_conf));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ACTION,
|
|
act, "Not supported action.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
act_q = (const struct rte_flow_action_queue *)act->conf;
|
|
filter->pool = act_q->index;
|
|
|
|
/* check if the next not void item is END */
|
|
index++;
|
|
NEXT_ITEM_OF_ACTION(act, actions, index);
|
|
if (act->type != RTE_FLOW_ACTION_TYPE_END) {
|
|
memset(filter, 0, sizeof(struct rte_eth_l2_tunnel_conf));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ACTION,
|
|
act, "Not supported action.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
ixgbe_validate_l2_tn_filter(struct rte_eth_dev *dev,
|
|
const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct rte_eth_l2_tunnel_conf *l2_tn_filter,
|
|
struct rte_flow_error *error)
|
|
{
|
|
int ret = 0;
|
|
struct ixgbe_hw *hw = IXGBE_DEV_PRIVATE_TO_HW(dev->data->dev_private);
|
|
|
|
ret = cons_parse_l2_tn_filter(attr, pattern,
|
|
actions, l2_tn_filter, error);
|
|
|
|
if (hw->mac.type != ixgbe_mac_X550 &&
|
|
hw->mac.type != ixgbe_mac_X550EM_x &&
|
|
hw->mac.type != ixgbe_mac_X550EM_a) {
|
|
memset(l2_tn_filter, 0, sizeof(struct rte_eth_l2_tunnel_conf));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
NULL, "Not supported by L2 tunnel filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Parse to get the attr and action info of flow director rule. */
|
|
static int
|
|
ixgbe_parse_fdir_act_attr(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_action actions[],
|
|
struct ixgbe_fdir_rule *rule,
|
|
struct rte_flow_error *error)
|
|
{
|
|
const struct rte_flow_action *act;
|
|
const struct rte_flow_action_queue *act_q;
|
|
const struct rte_flow_action_mark *mark;
|
|
uint32_t index;
|
|
|
|
/* parse attr */
|
|
/* must be input direction */
|
|
if (!attr->ingress) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_INGRESS,
|
|
attr, "Only support ingress.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* not supported */
|
|
if (attr->egress) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_EGRESS,
|
|
attr, "Not support egress.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* not supported */
|
|
if (attr->priority) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR_PRIORITY,
|
|
attr, "Not support priority.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* parse action */
|
|
index = 0;
|
|
|
|
/* check if the first not void action is QUEUE or DROP. */
|
|
NEXT_ITEM_OF_ACTION(act, actions, index);
|
|
if (act->type != RTE_FLOW_ACTION_TYPE_QUEUE &&
|
|
act->type != RTE_FLOW_ACTION_TYPE_DROP) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ACTION,
|
|
act, "Not supported action.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (act->type == RTE_FLOW_ACTION_TYPE_QUEUE) {
|
|
act_q = (const struct rte_flow_action_queue *)act->conf;
|
|
rule->queue = act_q->index;
|
|
} else { /* drop */
|
|
rule->fdirflags = IXGBE_FDIRCMD_DROP;
|
|
}
|
|
|
|
/* check if the next not void item is MARK */
|
|
index++;
|
|
NEXT_ITEM_OF_ACTION(act, actions, index);
|
|
if ((act->type != RTE_FLOW_ACTION_TYPE_MARK) &&
|
|
(act->type != RTE_FLOW_ACTION_TYPE_END)) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ACTION,
|
|
act, "Not supported action.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
rule->soft_id = 0;
|
|
|
|
if (act->type == RTE_FLOW_ACTION_TYPE_MARK) {
|
|
mark = (const struct rte_flow_action_mark *)act->conf;
|
|
rule->soft_id = mark->id;
|
|
index++;
|
|
NEXT_ITEM_OF_ACTION(act, actions, index);
|
|
}
|
|
|
|
/* check if the next not void item is END */
|
|
if (act->type != RTE_FLOW_ACTION_TYPE_END) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ACTION,
|
|
act, "Not supported action.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* Parse the rule to see if it is a IP or MAC VLAN flow director rule.
|
|
* And get the flow director filter info BTW.
|
|
* UDP/TCP/SCTP PATTERN:
|
|
* The first not void item can be ETH or IPV4.
|
|
* The second not void item must be IPV4 if the first one is ETH.
|
|
* The third not void item must be UDP or TCP or SCTP.
|
|
* The next not void item must be END.
|
|
* MAC VLAN PATTERN:
|
|
* The first not void item must be ETH.
|
|
* The second not void item must be MAC VLAN.
|
|
* The next not void item must be END.
|
|
* ACTION:
|
|
* The first not void action should be QUEUE or DROP.
|
|
* The second not void optional action should be MARK,
|
|
* mark_id is a uint32_t number.
|
|
* The next not void action should be END.
|
|
* UDP/TCP/SCTP pattern example:
|
|
* ITEM Spec Mask
|
|
* ETH NULL NULL
|
|
* IPV4 src_addr 192.168.1.20 0xFFFFFFFF
|
|
* dst_addr 192.167.3.50 0xFFFFFFFF
|
|
* UDP/TCP/SCTP src_port 80 0xFFFF
|
|
* dst_port 80 0xFFFF
|
|
* END
|
|
* MAC VLAN pattern example:
|
|
* ITEM Spec Mask
|
|
* ETH dst_addr
|
|
{0xAC, 0x7B, 0xA1, {0xFF, 0xFF, 0xFF,
|
|
0x2C, 0x6D, 0x36} 0xFF, 0xFF, 0xFF}
|
|
* MAC VLAN tci 0x2016 0xFFFF
|
|
* tpid 0x8100 0xFFFF
|
|
* END
|
|
* Other members in mask and spec should set to 0x00.
|
|
* Item->last should be NULL.
|
|
*/
|
|
static int
|
|
ixgbe_parse_fdir_filter_normal(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct ixgbe_fdir_rule *rule,
|
|
struct rte_flow_error *error)
|
|
{
|
|
const struct rte_flow_item *item;
|
|
const struct rte_flow_item_eth *eth_spec;
|
|
const struct rte_flow_item_eth *eth_mask;
|
|
const struct rte_flow_item_ipv4 *ipv4_spec;
|
|
const struct rte_flow_item_ipv4 *ipv4_mask;
|
|
const struct rte_flow_item_tcp *tcp_spec;
|
|
const struct rte_flow_item_tcp *tcp_mask;
|
|
const struct rte_flow_item_udp *udp_spec;
|
|
const struct rte_flow_item_udp *udp_mask;
|
|
const struct rte_flow_item_sctp *sctp_spec;
|
|
const struct rte_flow_item_sctp *sctp_mask;
|
|
const struct rte_flow_item_vlan *vlan_spec;
|
|
const struct rte_flow_item_vlan *vlan_mask;
|
|
|
|
uint32_t index, j;
|
|
|
|
if (!pattern) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM_NUM,
|
|
NULL, "NULL pattern.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (!actions) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ACTION_NUM,
|
|
NULL, "NULL action.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (!attr) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR,
|
|
NULL, "NULL attribute.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/**
|
|
* Some fields may not be provided. Set spec to 0 and mask to default
|
|
* value. So, we need not do anything for the not provided fields later.
|
|
*/
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
memset(&rule->mask, 0xFF, sizeof(struct ixgbe_hw_fdir_mask));
|
|
rule->mask.vlan_tci_mask = 0;
|
|
|
|
/* parse pattern */
|
|
index = 0;
|
|
|
|
/**
|
|
* The first not void item should be
|
|
* MAC or IPv4 or TCP or UDP or SCTP.
|
|
*/
|
|
NEXT_ITEM_OF_PATTERN(item, pattern, index);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_ETH &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_IPV4 &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_TCP &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_UDP &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_SCTP) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
rule->mode = RTE_FDIR_MODE_PERFECT;
|
|
|
|
/*Not supported last point for range*/
|
|
if (item->last) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* Get the MAC info. */
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_ETH) {
|
|
/**
|
|
* Only support vlan and dst MAC address,
|
|
* others should be masked.
|
|
*/
|
|
if (item->spec && !item->mask) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (item->spec) {
|
|
rule->b_spec = TRUE;
|
|
eth_spec = (const struct rte_flow_item_eth *)item->spec;
|
|
|
|
/* Get the dst MAC. */
|
|
for (j = 0; j < ETHER_ADDR_LEN; j++) {
|
|
rule->ixgbe_fdir.formatted.inner_mac[j] =
|
|
eth_spec->dst.addr_bytes[j];
|
|
}
|
|
}
|
|
|
|
|
|
if (item->mask) {
|
|
/* If ethernet has meaning, it means MAC VLAN mode. */
|
|
rule->mode = RTE_FDIR_MODE_PERFECT_MAC_VLAN;
|
|
|
|
rule->b_mask = TRUE;
|
|
eth_mask = (const struct rte_flow_item_eth *)item->mask;
|
|
|
|
/* Ether type should be masked. */
|
|
if (eth_mask->type) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/**
|
|
* src MAC address must be masked,
|
|
* and don't support dst MAC address mask.
|
|
*/
|
|
for (j = 0; j < ETHER_ADDR_LEN; j++) {
|
|
if (eth_mask->src.addr_bytes[j] ||
|
|
eth_mask->dst.addr_bytes[j] != 0xFF) {
|
|
memset(rule, 0,
|
|
sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
}
|
|
|
|
/* When no VLAN, considered as full mask. */
|
|
rule->mask.vlan_tci_mask = rte_cpu_to_be_16(0xEFFF);
|
|
}
|
|
/*** If both spec and mask are item,
|
|
* it means don't care about ETH.
|
|
* Do nothing.
|
|
*/
|
|
|
|
/**
|
|
* Check if the next not void item is vlan or ipv4.
|
|
* IPv6 is not supported.
|
|
*/
|
|
index++;
|
|
NEXT_ITEM_OF_PATTERN(item, pattern, index);
|
|
if (rule->mode == RTE_FDIR_MODE_PERFECT_MAC_VLAN) {
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_VLAN) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
} else {
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_IPV4) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_VLAN) {
|
|
if (!(item->spec && item->mask)) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/*Not supported last point for range*/
|
|
if (item->last) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
}
|
|
|
|
vlan_spec = (const struct rte_flow_item_vlan *)item->spec;
|
|
vlan_mask = (const struct rte_flow_item_vlan *)item->mask;
|
|
|
|
if (vlan_spec->tpid != rte_cpu_to_be_16(ETHER_TYPE_VLAN)) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
rule->ixgbe_fdir.formatted.vlan_id = vlan_spec->tci;
|
|
|
|
if (vlan_mask->tpid != (uint16_t)~0U) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
rule->mask.vlan_tci_mask = vlan_mask->tci;
|
|
/* More than one tags are not supported. */
|
|
|
|
/**
|
|
* Check if the next not void item is not vlan.
|
|
*/
|
|
index++;
|
|
NEXT_ITEM_OF_PATTERN(item, pattern, index);
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_VLAN) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
} else if (item->type != RTE_FLOW_ITEM_TYPE_END) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
}
|
|
|
|
/* Get the IP info. */
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_IPV4) {
|
|
/**
|
|
* Set the flow type even if there's no content
|
|
* as we must have a flow type.
|
|
*/
|
|
rule->ixgbe_fdir.formatted.flow_type =
|
|
IXGBE_ATR_FLOW_TYPE_IPV4;
|
|
/*Not supported last point for range*/
|
|
if (item->last) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
}
|
|
/**
|
|
* Only care about src & dst addresses,
|
|
* others should be masked.
|
|
*/
|
|
if (!item->mask) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
rule->b_mask = TRUE;
|
|
ipv4_mask =
|
|
(const struct rte_flow_item_ipv4 *)item->mask;
|
|
if (ipv4_mask->hdr.version_ihl ||
|
|
ipv4_mask->hdr.type_of_service ||
|
|
ipv4_mask->hdr.total_length ||
|
|
ipv4_mask->hdr.packet_id ||
|
|
ipv4_mask->hdr.fragment_offset ||
|
|
ipv4_mask->hdr.time_to_live ||
|
|
ipv4_mask->hdr.next_proto_id ||
|
|
ipv4_mask->hdr.hdr_checksum) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
rule->mask.dst_ipv4_mask = ipv4_mask->hdr.dst_addr;
|
|
rule->mask.src_ipv4_mask = ipv4_mask->hdr.src_addr;
|
|
|
|
if (item->spec) {
|
|
rule->b_spec = TRUE;
|
|
ipv4_spec =
|
|
(const struct rte_flow_item_ipv4 *)item->spec;
|
|
rule->ixgbe_fdir.formatted.dst_ip[0] =
|
|
ipv4_spec->hdr.dst_addr;
|
|
rule->ixgbe_fdir.formatted.src_ip[0] =
|
|
ipv4_spec->hdr.src_addr;
|
|
}
|
|
|
|
/**
|
|
* Check if the next not void item is
|
|
* TCP or UDP or SCTP or END.
|
|
*/
|
|
index++;
|
|
NEXT_ITEM_OF_PATTERN(item, pattern, index);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_TCP &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_UDP &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_SCTP &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_END) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
}
|
|
|
|
/* Get the TCP info. */
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_TCP) {
|
|
/**
|
|
* Set the flow type even if there's no content
|
|
* as we must have a flow type.
|
|
*/
|
|
rule->ixgbe_fdir.formatted.flow_type =
|
|
IXGBE_ATR_FLOW_TYPE_TCPV4;
|
|
/*Not supported last point for range*/
|
|
if (item->last) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
}
|
|
/**
|
|
* Only care about src & dst ports,
|
|
* others should be masked.
|
|
*/
|
|
if (!item->mask) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
rule->b_mask = TRUE;
|
|
tcp_mask = (const struct rte_flow_item_tcp *)item->mask;
|
|
if (tcp_mask->hdr.sent_seq ||
|
|
tcp_mask->hdr.recv_ack ||
|
|
tcp_mask->hdr.data_off ||
|
|
tcp_mask->hdr.tcp_flags ||
|
|
tcp_mask->hdr.rx_win ||
|
|
tcp_mask->hdr.cksum ||
|
|
tcp_mask->hdr.tcp_urp) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
rule->mask.src_port_mask = tcp_mask->hdr.src_port;
|
|
rule->mask.dst_port_mask = tcp_mask->hdr.dst_port;
|
|
|
|
if (item->spec) {
|
|
rule->b_spec = TRUE;
|
|
tcp_spec = (const struct rte_flow_item_tcp *)item->spec;
|
|
rule->ixgbe_fdir.formatted.src_port =
|
|
tcp_spec->hdr.src_port;
|
|
rule->ixgbe_fdir.formatted.dst_port =
|
|
tcp_spec->hdr.dst_port;
|
|
}
|
|
}
|
|
|
|
/* Get the UDP info */
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_UDP) {
|
|
/**
|
|
* Set the flow type even if there's no content
|
|
* as we must have a flow type.
|
|
*/
|
|
rule->ixgbe_fdir.formatted.flow_type =
|
|
IXGBE_ATR_FLOW_TYPE_UDPV4;
|
|
/*Not supported last point for range*/
|
|
if (item->last) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
}
|
|
/**
|
|
* Only care about src & dst ports,
|
|
* others should be masked.
|
|
*/
|
|
if (!item->mask) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
rule->b_mask = TRUE;
|
|
udp_mask = (const struct rte_flow_item_udp *)item->mask;
|
|
if (udp_mask->hdr.dgram_len ||
|
|
udp_mask->hdr.dgram_cksum) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
rule->mask.src_port_mask = udp_mask->hdr.src_port;
|
|
rule->mask.dst_port_mask = udp_mask->hdr.dst_port;
|
|
|
|
if (item->spec) {
|
|
rule->b_spec = TRUE;
|
|
udp_spec = (const struct rte_flow_item_udp *)item->spec;
|
|
rule->ixgbe_fdir.formatted.src_port =
|
|
udp_spec->hdr.src_port;
|
|
rule->ixgbe_fdir.formatted.dst_port =
|
|
udp_spec->hdr.dst_port;
|
|
}
|
|
}
|
|
|
|
/* Get the SCTP info */
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_SCTP) {
|
|
/**
|
|
* Set the flow type even if there's no content
|
|
* as we must have a flow type.
|
|
*/
|
|
rule->ixgbe_fdir.formatted.flow_type =
|
|
IXGBE_ATR_FLOW_TYPE_SCTPV4;
|
|
/*Not supported last point for range*/
|
|
if (item->last) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
}
|
|
/**
|
|
* Only care about src & dst ports,
|
|
* others should be masked.
|
|
*/
|
|
if (!item->mask) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
rule->b_mask = TRUE;
|
|
sctp_mask =
|
|
(const struct rte_flow_item_sctp *)item->mask;
|
|
if (sctp_mask->hdr.tag ||
|
|
sctp_mask->hdr.cksum) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
rule->mask.src_port_mask = sctp_mask->hdr.src_port;
|
|
rule->mask.dst_port_mask = sctp_mask->hdr.dst_port;
|
|
|
|
if (item->spec) {
|
|
rule->b_spec = TRUE;
|
|
sctp_spec =
|
|
(const struct rte_flow_item_sctp *)item->spec;
|
|
rule->ixgbe_fdir.formatted.src_port =
|
|
sctp_spec->hdr.src_port;
|
|
rule->ixgbe_fdir.formatted.dst_port =
|
|
sctp_spec->hdr.dst_port;
|
|
}
|
|
}
|
|
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_END) {
|
|
/* check if the next not void item is END */
|
|
index++;
|
|
NEXT_ITEM_OF_PATTERN(item, pattern, index);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_END) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
}
|
|
|
|
return ixgbe_parse_fdir_act_attr(attr, actions, rule, error);
|
|
}
|
|
|
|
#define NVGRE_PROTOCOL 0x6558
|
|
|
|
/**
|
|
* Parse the rule to see if it is a VxLAN or NVGRE flow director rule.
|
|
* And get the flow director filter info BTW.
|
|
* VxLAN PATTERN:
|
|
* The first not void item must be ETH.
|
|
* The second not void item must be IPV4/ IPV6.
|
|
* The third not void item must be NVGRE.
|
|
* The next not void item must be END.
|
|
* NVGRE PATTERN:
|
|
* The first not void item must be ETH.
|
|
* The second not void item must be IPV4/ IPV6.
|
|
* The third not void item must be NVGRE.
|
|
* The next not void item must be END.
|
|
* ACTION:
|
|
* The first not void action should be QUEUE or DROP.
|
|
* The second not void optional action should be MARK,
|
|
* mark_id is a uint32_t number.
|
|
* The next not void action should be END.
|
|
* VxLAN pattern example:
|
|
* ITEM Spec Mask
|
|
* ETH NULL NULL
|
|
* IPV4/IPV6 NULL NULL
|
|
* UDP NULL NULL
|
|
* VxLAN vni{0x00, 0x32, 0x54} {0xFF, 0xFF, 0xFF}
|
|
* END
|
|
* NEGRV pattern example:
|
|
* ITEM Spec Mask
|
|
* ETH NULL NULL
|
|
* IPV4/IPV6 NULL NULL
|
|
* NVGRE protocol 0x6558 0xFFFF
|
|
* tni{0x00, 0x32, 0x54} {0xFF, 0xFF, 0xFF}
|
|
* END
|
|
* other members in mask and spec should set to 0x00.
|
|
* item->last should be NULL.
|
|
*/
|
|
static int
|
|
ixgbe_parse_fdir_filter_tunnel(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct ixgbe_fdir_rule *rule,
|
|
struct rte_flow_error *error)
|
|
{
|
|
const struct rte_flow_item *item;
|
|
const struct rte_flow_item_vxlan *vxlan_spec;
|
|
const struct rte_flow_item_vxlan *vxlan_mask;
|
|
const struct rte_flow_item_nvgre *nvgre_spec;
|
|
const struct rte_flow_item_nvgre *nvgre_mask;
|
|
const struct rte_flow_item_eth *eth_spec;
|
|
const struct rte_flow_item_eth *eth_mask;
|
|
const struct rte_flow_item_vlan *vlan_spec;
|
|
const struct rte_flow_item_vlan *vlan_mask;
|
|
uint32_t index, j;
|
|
|
|
if (!pattern) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM_NUM,
|
|
NULL, "NULL pattern.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (!actions) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ACTION_NUM,
|
|
NULL, "NULL action.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (!attr) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ATTR,
|
|
NULL, "NULL attribute.");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/**
|
|
* Some fields may not be provided. Set spec to 0 and mask to default
|
|
* value. So, we need not do anything for the not provided fields later.
|
|
*/
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
memset(&rule->mask, 0xFF, sizeof(struct ixgbe_hw_fdir_mask));
|
|
rule->mask.vlan_tci_mask = 0;
|
|
|
|
/* parse pattern */
|
|
index = 0;
|
|
|
|
/**
|
|
* The first not void item should be
|
|
* MAC or IPv4 or IPv6 or UDP or VxLAN.
|
|
*/
|
|
NEXT_ITEM_OF_PATTERN(item, pattern, index);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_ETH &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_IPV4 &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_IPV6 &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_UDP &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_VXLAN &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_NVGRE) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
rule->mode = RTE_FDIR_MODE_PERFECT_TUNNEL;
|
|
|
|
/* Skip MAC. */
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_ETH) {
|
|
/* Only used to describe the protocol stack. */
|
|
if (item->spec || item->mask) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
/*Not supported last point for range*/
|
|
if (item->last) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* Check if the next not void item is IPv4 or IPv6. */
|
|
index++;
|
|
NEXT_ITEM_OF_PATTERN(item, pattern, index);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_IPV4 &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_IPV6) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
}
|
|
|
|
/* Skip IP. */
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_IPV4 ||
|
|
item->type == RTE_FLOW_ITEM_TYPE_IPV6) {
|
|
/* Only used to describe the protocol stack. */
|
|
if (item->spec || item->mask) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
/*Not supported last point for range*/
|
|
if (item->last) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* Check if the next not void item is UDP or NVGRE. */
|
|
index++;
|
|
NEXT_ITEM_OF_PATTERN(item, pattern, index);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_UDP &&
|
|
item->type != RTE_FLOW_ITEM_TYPE_NVGRE) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
}
|
|
|
|
/* Skip UDP. */
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_UDP) {
|
|
/* Only used to describe the protocol stack. */
|
|
if (item->spec || item->mask) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
/*Not supported last point for range*/
|
|
if (item->last) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* Check if the next not void item is VxLAN. */
|
|
index++;
|
|
NEXT_ITEM_OF_PATTERN(item, pattern, index);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_VXLAN) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
}
|
|
|
|
/* Get the VxLAN info */
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_VXLAN) {
|
|
rule->ixgbe_fdir.formatted.tunnel_type =
|
|
RTE_FDIR_TUNNEL_TYPE_VXLAN;
|
|
|
|
/* Only care about VNI, others should be masked. */
|
|
if (!item->mask) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
/*Not supported last point for range*/
|
|
if (item->last) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
}
|
|
rule->b_mask = TRUE;
|
|
|
|
/* Tunnel type is always meaningful. */
|
|
rule->mask.tunnel_type_mask = 1;
|
|
|
|
vxlan_mask =
|
|
(const struct rte_flow_item_vxlan *)item->mask;
|
|
if (vxlan_mask->flags) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
/* VNI must be totally masked or not. */
|
|
if ((vxlan_mask->vni[0] || vxlan_mask->vni[1] ||
|
|
vxlan_mask->vni[2]) &&
|
|
((vxlan_mask->vni[0] != 0xFF) ||
|
|
(vxlan_mask->vni[1] != 0xFF) ||
|
|
(vxlan_mask->vni[2] != 0xFF))) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
rte_memcpy(&rule->mask.tunnel_id_mask, vxlan_mask->vni,
|
|
RTE_DIM(vxlan_mask->vni));
|
|
rule->mask.tunnel_id_mask <<= 8;
|
|
|
|
if (item->spec) {
|
|
rule->b_spec = TRUE;
|
|
vxlan_spec = (const struct rte_flow_item_vxlan *)
|
|
item->spec;
|
|
rte_memcpy(&rule->ixgbe_fdir.formatted.tni_vni,
|
|
vxlan_spec->vni, RTE_DIM(vxlan_spec->vni));
|
|
rule->ixgbe_fdir.formatted.tni_vni <<= 8;
|
|
}
|
|
}
|
|
|
|
/* Get the NVGRE info */
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_NVGRE) {
|
|
rule->ixgbe_fdir.formatted.tunnel_type =
|
|
RTE_FDIR_TUNNEL_TYPE_NVGRE;
|
|
|
|
/**
|
|
* Only care about flags0, flags1, protocol and TNI,
|
|
* others should be masked.
|
|
*/
|
|
if (!item->mask) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
/*Not supported last point for range*/
|
|
if (item->last) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
}
|
|
rule->b_mask = TRUE;
|
|
|
|
/* Tunnel type is always meaningful. */
|
|
rule->mask.tunnel_type_mask = 1;
|
|
|
|
nvgre_mask =
|
|
(const struct rte_flow_item_nvgre *)item->mask;
|
|
if (nvgre_mask->flow_id) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
if (nvgre_mask->c_k_s_rsvd0_ver !=
|
|
rte_cpu_to_be_16(0x3000) ||
|
|
nvgre_mask->protocol != 0xFFFF) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
/* TNI must be totally masked or not. */
|
|
if (nvgre_mask->tni[0] &&
|
|
((nvgre_mask->tni[0] != 0xFF) ||
|
|
(nvgre_mask->tni[1] != 0xFF) ||
|
|
(nvgre_mask->tni[2] != 0xFF))) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
/* tni is a 24-bits bit field */
|
|
rte_memcpy(&rule->mask.tunnel_id_mask, nvgre_mask->tni,
|
|
RTE_DIM(nvgre_mask->tni));
|
|
rule->mask.tunnel_id_mask <<= 8;
|
|
|
|
if (item->spec) {
|
|
rule->b_spec = TRUE;
|
|
nvgre_spec =
|
|
(const struct rte_flow_item_nvgre *)item->spec;
|
|
if (nvgre_spec->c_k_s_rsvd0_ver !=
|
|
rte_cpu_to_be_16(0x2000) ||
|
|
nvgre_spec->protocol !=
|
|
rte_cpu_to_be_16(NVGRE_PROTOCOL)) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
/* tni is a 24-bits bit field */
|
|
rte_memcpy(&rule->ixgbe_fdir.formatted.tni_vni,
|
|
nvgre_spec->tni, RTE_DIM(nvgre_spec->tni));
|
|
rule->ixgbe_fdir.formatted.tni_vni <<= 8;
|
|
}
|
|
}
|
|
|
|
/* check if the next not void item is MAC */
|
|
index++;
|
|
NEXT_ITEM_OF_PATTERN(item, pattern, index);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_ETH) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/**
|
|
* Only support vlan and dst MAC address,
|
|
* others should be masked.
|
|
*/
|
|
|
|
if (!item->mask) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
/*Not supported last point for range*/
|
|
if (item->last) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
}
|
|
rule->b_mask = TRUE;
|
|
eth_mask = (const struct rte_flow_item_eth *)item->mask;
|
|
|
|
/* Ether type should be masked. */
|
|
if (eth_mask->type) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
/* src MAC address should be masked. */
|
|
for (j = 0; j < ETHER_ADDR_LEN; j++) {
|
|
if (eth_mask->src.addr_bytes[j]) {
|
|
memset(rule, 0,
|
|
sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
}
|
|
rule->mask.mac_addr_byte_mask = 0;
|
|
for (j = 0; j < ETHER_ADDR_LEN; j++) {
|
|
/* It's a per byte mask. */
|
|
if (eth_mask->dst.addr_bytes[j] == 0xFF) {
|
|
rule->mask.mac_addr_byte_mask |= 0x1 << j;
|
|
} else if (eth_mask->dst.addr_bytes[j]) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
}
|
|
|
|
/* When no vlan, considered as full mask. */
|
|
rule->mask.vlan_tci_mask = rte_cpu_to_be_16(0xEFFF);
|
|
|
|
if (item->spec) {
|
|
rule->b_spec = TRUE;
|
|
eth_spec = (const struct rte_flow_item_eth *)item->spec;
|
|
|
|
/* Get the dst MAC. */
|
|
for (j = 0; j < ETHER_ADDR_LEN; j++) {
|
|
rule->ixgbe_fdir.formatted.inner_mac[j] =
|
|
eth_spec->dst.addr_bytes[j];
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Check if the next not void item is vlan or ipv4.
|
|
* IPv6 is not supported.
|
|
*/
|
|
index++;
|
|
NEXT_ITEM_OF_PATTERN(item, pattern, index);
|
|
if ((item->type != RTE_FLOW_ITEM_TYPE_VLAN) &&
|
|
(item->type != RTE_FLOW_ITEM_TYPE_VLAN)) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
/*Not supported last point for range*/
|
|
if (item->last) {
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_UNSPECIFIED,
|
|
item, "Not supported last point for range");
|
|
return -rte_errno;
|
|
}
|
|
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_VLAN) {
|
|
if (!(item->spec && item->mask)) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
vlan_spec = (const struct rte_flow_item_vlan *)item->spec;
|
|
vlan_mask = (const struct rte_flow_item_vlan *)item->mask;
|
|
|
|
if (vlan_spec->tpid != rte_cpu_to_be_16(ETHER_TYPE_VLAN)) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
|
|
rule->ixgbe_fdir.formatted.vlan_id = vlan_spec->tci;
|
|
|
|
if (vlan_mask->tpid != (uint16_t)~0U) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
rule->mask.vlan_tci_mask = vlan_mask->tci;
|
|
/* More than one tags are not supported. */
|
|
|
|
/**
|
|
* Check if the next not void item is not vlan.
|
|
*/
|
|
index++;
|
|
NEXT_ITEM_OF_PATTERN(item, pattern, index);
|
|
if (item->type == RTE_FLOW_ITEM_TYPE_VLAN) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
} else if (item->type != RTE_FLOW_ITEM_TYPE_END) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
/* check if the next not void item is END */
|
|
index++;
|
|
NEXT_ITEM_OF_PATTERN(item, pattern, index);
|
|
if (item->type != RTE_FLOW_ITEM_TYPE_END) {
|
|
memset(rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
rte_flow_error_set(error, EINVAL,
|
|
RTE_FLOW_ERROR_TYPE_ITEM,
|
|
item, "Not supported by fdir filter");
|
|
return -rte_errno;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* If the tags is 0, it means don't care about the VLAN.
|
|
* Do nothing.
|
|
*/
|
|
|
|
return ixgbe_parse_fdir_act_attr(attr, actions, rule, error);
|
|
}
|
|
|
|
static int
|
|
ixgbe_validate_fdir_filter(struct rte_eth_dev *dev,
|
|
const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct ixgbe_fdir_rule *rule,
|
|
struct rte_flow_error *error)
|
|
{
|
|
int ret = 0;
|
|
|
|
enum rte_fdir_mode fdir_mode = dev->data->dev_conf.fdir_conf.mode;
|
|
|
|
ixgbe_parse_fdir_filter(attr, pattern, actions,
|
|
rule, error);
|
|
|
|
|
|
if (fdir_mode == RTE_FDIR_MODE_NONE ||
|
|
fdir_mode != rule->mode)
|
|
return -ENOTSUP;
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int
|
|
ixgbe_parse_fdir_filter(const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct ixgbe_fdir_rule *rule,
|
|
struct rte_flow_error *error)
|
|
{
|
|
int ret;
|
|
|
|
ret = ixgbe_parse_fdir_filter_normal(attr, pattern,
|
|
actions, rule, error);
|
|
|
|
if (!ret)
|
|
return 0;
|
|
|
|
ret = ixgbe_parse_fdir_filter_tunnel(attr, pattern,
|
|
actions, rule, error);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* Check if the flow rule is supported by ixgbe.
|
|
* It only checkes the format. Don't guarantee the rule can be programmed into
|
|
* the HW. Because there can be no enough room for the rule.
|
|
*/
|
|
static int
|
|
ixgbe_flow_validate(__rte_unused struct rte_eth_dev *dev,
|
|
const struct rte_flow_attr *attr,
|
|
const struct rte_flow_item pattern[],
|
|
const struct rte_flow_action actions[],
|
|
struct rte_flow_error *error)
|
|
{
|
|
struct rte_eth_ntuple_filter ntuple_filter;
|
|
struct rte_eth_ethertype_filter ethertype_filter;
|
|
struct rte_eth_syn_filter syn_filter;
|
|
struct rte_eth_l2_tunnel_conf l2_tn_filter;
|
|
struct ixgbe_fdir_rule fdir_rule;
|
|
int ret;
|
|
|
|
memset(&ntuple_filter, 0, sizeof(struct rte_eth_ntuple_filter));
|
|
ret = ixgbe_parse_ntuple_filter(attr, pattern,
|
|
actions, &ntuple_filter, error);
|
|
if (!ret)
|
|
return 0;
|
|
|
|
memset(ðertype_filter, 0, sizeof(struct rte_eth_ethertype_filter));
|
|
ret = ixgbe_parse_ethertype_filter(attr, pattern,
|
|
actions, ðertype_filter, error);
|
|
if (!ret)
|
|
return 0;
|
|
|
|
memset(&syn_filter, 0, sizeof(struct rte_eth_syn_filter));
|
|
ret = ixgbe_parse_syn_filter(attr, pattern,
|
|
actions, &syn_filter, error);
|
|
if (!ret)
|
|
return 0;
|
|
|
|
memset(&fdir_rule, 0, sizeof(struct ixgbe_fdir_rule));
|
|
ret = ixgbe_validate_fdir_filter(dev, attr, pattern,
|
|
actions, &fdir_rule, error);
|
|
if (!ret)
|
|
return 0;
|
|
|
|
memset(&l2_tn_filter, 0, sizeof(struct rte_eth_l2_tunnel_conf));
|
|
ret = ixgbe_validate_l2_tn_filter(dev, attr, pattern,
|
|
actions, &l2_tn_filter, error);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Destroy all flow rules associated with a port on ixgbe. */
|
|
static int
|
|
ixgbe_flow_flush(struct rte_eth_dev *dev,
|
|
struct rte_flow_error *error)
|
|
{
|
|
int ret = 0;
|
|
|
|
ixgbe_clear_all_ntuple_filter(dev);
|
|
ixgbe_clear_all_ethertype_filter(dev);
|
|
ixgbe_clear_syn_filter(dev);
|
|
|
|
ret = ixgbe_clear_all_fdir_filter(dev);
|
|
if (ret < 0) {
|
|
rte_flow_error_set(error, EINVAL, RTE_FLOW_ERROR_TYPE_HANDLE,
|
|
NULL, "Failed to flush rule");
|
|
return ret;
|
|
}
|
|
|
|
ret = ixgbe_clear_all_l2_tn_filter(dev);
|
|
if (ret < 0) {
|
|
rte_flow_error_set(error, EINVAL, RTE_FLOW_ERROR_TYPE_HANDLE,
|
|
NULL, "Failed to flush rule");
|
|
return ret;
|
|
}
|
|
|
|
return 0;
|
|
}
|