From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 841C2A0560; Tue, 18 Oct 2022 05:14:01 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 4F83C42B7A; Tue, 18 Oct 2022 05:13:14 +0200 (CEST) Received: from NAM11-CO1-obe.outbound.protection.outlook.com (mail-co1nam11on2096.outbound.protection.outlook.com [40.107.220.96]) by mails.dpdk.org (Postfix) with ESMTP id 2CACE41145 for ; Tue, 18 Oct 2022 05:13:11 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=I+8/jD5NvbCqJIktK9rqe8zuXCE5fIFj4y9yN2nNsb/aLrhyX2fHQWVNsNC6XS8tEL7f8pVsnXSSlnsLHCX8PXh9QU95wqLX0uvaMblnD4KsUGVw7m7GJ0wgWiapu9TT2NkGdjbO3vXrKSSzO7fZLmBgqdufqMgUX0AIQufJUOiyjMPdOs5TWRmFDRL+kUe+VUetiwy1zTzlMrmy3hOYdARoQ/rDe1HJPd+QUV/tDFVGOjeKun7aEYLZKEd4Z0Smo0EVNT3S90wLLTSVu7TIFRoKIHKqxXK2lCsyB4K/kRZXNZqWWNU6cfDrS4VCvYIIOoAoAlG8rVRcOAFT2Hu6nQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=TXcfBunDU2gSrEc9XRhtPU56rBwyJrxaGUw/t8O+mpk=; b=asCC5MusRphnlOc4/Hqqxy9PcJeQGIE+wkCh5gjuE4po68xdT2bKnXRUDQ8vXJaZzkF1c2+RUx902+WT3k3sA7pj1BfYBcruCccxdKzN1Mr5J87Xno9S6arqL5KYQZVbADuhTQNI/4ZFDx3hAt/hyuJYegAXwVLrJo9IhgIjURe/FT07IgNZHggQDccLlv5w5SMK8tuZPRufCvu1skI++MOto7PvznY8bQlJNn+L8QiWC7rfaSJcYj0NtT9Yf9voSrOv32O+lqHZdUkNIvkmzVMAo5TW0vsXavOadDZHxXA4T2g5dc2MdGgqEZkDke0zjLCFDvjdbHZ3p0cxxDCM0w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=corigine.com; dmarc=pass action=none header.from=corigine.com; dkim=pass header.d=corigine.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=corigine.onmicrosoft.com; s=selector2-corigine-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=TXcfBunDU2gSrEc9XRhtPU56rBwyJrxaGUw/t8O+mpk=; b=IluYw6MTFlWW+c4KNljRjrC+jRZVQ6/STpAyvyOia4/ATKDvFLAowh6XbMKGFgJLJiVW959T57DHEltAE+GSCizB3o/ARl8wTxQr/fTOUZiU1dDEfPcs7KbOZPdMdylY41qDjmHEOW06kFQWCxY/NENhNEomlFZJAEssKzgunXA= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=corigine.com; Received: from SJ0PR13MB5545.namprd13.prod.outlook.com (2603:10b6:a03:424::5) by DM6PR13MB3865.namprd13.prod.outlook.com (2603:10b6:5:1::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5723.20; Tue, 18 Oct 2022 03:13:09 +0000 Received: from SJ0PR13MB5545.namprd13.prod.outlook.com ([fe80::7c26:1a0b:2825:6f4b]) by SJ0PR13MB5545.namprd13.prod.outlook.com ([fe80::7c26:1a0b:2825:6f4b%4]) with mapi id 15.20.5723.014; Tue, 18 Oct 2022 03:13:09 +0000 From: Chaoyong He To: dev@dpdk.org Cc: oss-drivers@corigine.com, niklas.soderlund@corigine.com, Chaoyong He Subject: [PATCH v3 10/25] net/nfp: add the offload support of TCP item Date: Tue, 18 Oct 2022 11:12:17 +0800 Message-Id: <1666062752-33689-11-git-send-email-chaoyong.he@corigine.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1666062752-33689-1-git-send-email-chaoyong.he@corigine.com> References: <1666062752-33689-1-git-send-email-chaoyong.he@corigine.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-ClientProxiedBy: SI1PR02CA0010.apcprd02.prod.outlook.com (2603:1096:4:1f7::17) To SJ0PR13MB5545.namprd13.prod.outlook.com (2603:10b6:a03:424::5) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ0PR13MB5545:EE_|DM6PR13MB3865:EE_ X-MS-Office365-Filtering-Correlation-Id: ecdf9127-ebfe-4b5d-c0ef-08dab0b6aec8 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR13MB5545.namprd13.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(39830400003)(376002)(366004)(136003)(346002)(396003)(451199015)(66476007)(6916009)(36756003)(2906002)(8676002)(86362001)(38100700002)(38350700002)(44832011)(186003)(41300700001)(66946007)(66556008)(8936002)(6512007)(26005)(52116002)(6666004)(107886003)(6506007)(5660300002)(316002)(4326008)(2616005)(83380400001)(6486002)(478600001); DIR:OUT; SFP:1102; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?aUV5bWJYYm1TM0NNbm41bm85ZXJacm1ZT1Q4SWxXeGg1djVXMFY3bzFKZThw?= =?utf-8?B?QXEwcDVZKytWM3hIT3dVYkpDQms3TnFmb1JUODFkanhWZkhscWR1cEFMVU9H?= =?utf-8?B?eUQwczYxVmhGTFRSY0NMUjdSem9VUnp0eitGYnJQa0gwa0g3SXMvczI0WkZs?= =?utf-8?B?dDRESjROV1pWWEg3L1E2M2hDRmhzZnVlVVhHMC9hTnhsYUEycmlDNGk2Uk5B?= =?utf-8?B?ZzZyWjhWM1EvRzhYMHlTV3o0L2poZ1A0enhBeThlUHdqNG9PQ1oxWHhYa0dl?= =?utf-8?B?bXZxVUlVbzZHSFhZRndGNU9KdE42bHpValdTQjNPVnJOWWg0U2lIdTFra1Jt?= =?utf-8?B?ZkdVcUFEMEZnQ1JtNzZWNEZaVkQrbFFJcUxQMzlpR1poclpXL1JOcFllVitN?= =?utf-8?B?Ri9MeEErQWRhNHV1aSs5N0JZUlJRYndjTjhZTTV4dENPWUJhZ3F3REpjNVhJ?= =?utf-8?B?KzErSXV2T1oydGNhb1hyaDlPN3lVdWFEWUZJVkZFaG4zaGd3SHBKU0RlcVNK?= =?utf-8?B?dUpuUXVNRExjS1c4NnpURjFzMUU5VVBSVURXNDlnVmw3VkRVZEZwejhmVDZF?= =?utf-8?B?dmNVUUNTNXdzcGJPZzhOVk9LM3Z1L25tekUwMVhzeFVvQWs5Ni9rTUQyM05F?= =?utf-8?B?bEFMazVKTFBaTDVVR25nU0JGeGhTd0FrbGdabElTL281N1RML2ZXcm1yeUZV?= =?utf-8?B?OFZvSVErdVFzQzhjaFYyRUplV3RhTDViS2pNa1dqQTZ1d2ppWXlkWWlhN1Jt?= =?utf-8?B?clRKYUl2cmllM05ySEdyOFJKbkdYZTJqNm4wRUgybFJsY1gvUHBodlJySGVK?= =?utf-8?B?Y1REMmVEZEVneHgrZFNYTGJBQlN4QytlTUJsZVpEOXo4SUI4eEQzaUQ1SWRh?= =?utf-8?B?YmtCSXBnaGtCRWJJdlV6Q1NCV2JrZ2IwdDdCcUVnL0lWeVNUeWEvVHdtMUhw?= =?utf-8?B?eEdJTFJJcDFaYmJORmhNMmY3S2hyTCsvdGh6Ukl1b0FQSzdSOGtjb0lQTXN2?= =?utf-8?B?SVBXamxiMCs2djRuTkRwL2dYV1pGQnVyVHF5Wi9SVnp6akZTY0FtU2dlV3Qz?= =?utf-8?B?eGluelNDR3hrcGRZdzVTOWhQUmEwaFllNHAxdHFNV3ZlWjl1YjA0Nmhia0Rh?= =?utf-8?B?ZTgwRnhoV1hxaGZFZjA2Y0ZQNFZqTWJRaW54OW43R1lFQlNaSFdscEdncWhC?= =?utf-8?B?TzZ4ZktIYUhLQ3JVaVk4SGFnM1VZRlVZN1NkcXQ3THBmc2VxNURLS2hSMHVi?= =?utf-8?B?MEJ0aGZCaEhlSGd0cUlNSjFYRFhLQmYrRWV5TE5aMTJmLzNCclFhVUF0T3lV?= =?utf-8?B?UG9lTTA3MUZ6S0loL01MS21NYXVteGlvUmtFd2pYOEN4RDVlMG1kdDBWM0x1?= =?utf-8?B?b2lzRXJPMW9JcXN4RWFHdHMzZWpCdmhjTHgvcHVLa3hscHIrczlTQVh3OWkx?= =?utf-8?B?QjhiVnkyKzFoWnZiWGo4WFo3bkR1ankxK2dyS0dJeExpMnBkNC95YmpVcGxo?= =?utf-8?B?SE5maXp0SnVnUVZpSWJSbnhCQ2MyVnBzT0pOSmF0bHVFVkVzUVZjelhuWUwv?= =?utf-8?B?aUNTdTg2V3ZETU83YmpQOE1zM2s3MXZaMGJSV002VmI1Y0JmZUFid2hIVUcx?= =?utf-8?B?RS91VEVrZEw2S1N3WWtWdlhaVHc0MEtjK2hDQUFTOTRFUExqNVoyR3dWUU1G?= =?utf-8?B?MkR0WnBQUU0xWDMzcEJOcnE5eVBCUXFoUWpreXlVMzlwbUtVZUsybmprMjBB?= =?utf-8?B?TVd5Q1M0OHJ5a1ZRa0gxZ1Blc1c0b1NuWkcyck0vbW00TzZFN28vYkVBRy9i?= =?utf-8?B?TkswNzVNY0JZQStZdmNTUzdZNlpLTWtPQ0ZodGFzcHdibm1XR05MZjZXWXd6?= =?utf-8?B?STEyUDRVLzF4Mi9saGliTmh3bWJnMmw0WXFFbVNkdUdCcTk4YjJwRDg1aHhE?= =?utf-8?B?cVhVckZrK2UydzZySG5TaUw2YWFyaGh3bkFRRE5kSFVXRjBUK2xEdmRtNC9S?= =?utf-8?B?RmtJa2QvdXJpNHJrMWdXdDV2cXFRWlVvOGZFZENSdVlRU1BnS29XUlRRbllr?= =?utf-8?B?MUtxSzlUazJESnQ0cU1JeFdQK2NEZmdzcUs0akptQm1Lb2M0UkdPRnpIREJv?= =?utf-8?B?d2lqUlYrSWJQaktEOGxCeUQ0QmhxK2VJektTNWwxSktpaDExUnlGbTFSQjlO?= =?utf-8?B?N2c9PQ==?= X-OriginatorOrg: corigine.com X-MS-Exchange-CrossTenant-Network-Message-Id: ecdf9127-ebfe-4b5d-c0ef-08dab0b6aec8 X-MS-Exchange-CrossTenant-AuthSource: SJ0PR13MB5545.namprd13.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 18 Oct 2022 03:13:09.2260 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: fe128f2c-073b-4c20-818e-7246a585940c X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: tg1ReA7+BUmfjJ13I0UrT7oZGY5kHL3suB0Pcg4AL6+JqPE47zZoqp60BS0IWUNanUhQEoP78Op7xoB1a4UmM41om2WuLgilqFdLOStGRMI= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR13MB3865 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Add the corresponding data structure and logics, to support the offload of TCP item. Signed-off-by: Chaoyong He Reviewed-by: Niklas Söderlund --- doc/guides/nics/features/nfp.ini | 1 + doc/guides/rel_notes/release_22_11.rst | 1 + drivers/net/nfp/nfp_flow.c | 91 ++++++++++++++++++++++++++++++++++ drivers/net/nfp/nfp_flow.h | 7 +++ 4 files changed, 100 insertions(+) diff --git a/doc/guides/nics/features/nfp.ini b/doc/guides/nics/features/nfp.ini index 9dff34b..66ee03c 100644 --- a/doc/guides/nics/features/nfp.ini +++ b/doc/guides/nics/features/nfp.ini @@ -32,6 +32,7 @@ ipv4 = Y ipv6 = Y ipv6_frag_ext = Y port_id = Y +tcp = Y vlan = Y [rte_flow actions] diff --git a/doc/guides/rel_notes/release_22_11.rst b/doc/guides/rel_notes/release_22_11.rst index fcc5d00..0ec1c07 100644 --- a/doc/guides/rel_notes/release_22_11.rst +++ b/doc/guides/rel_notes/release_22_11.rst @@ -169,6 +169,7 @@ New Features * Single VLAN * IPv4 * IPv6 + * TCP Add the support of rte_flow actions as follow: diff --git a/drivers/net/nfp/nfp_flow.c b/drivers/net/nfp/nfp_flow.c index e713491..739d980 100644 --- a/drivers/net/nfp/nfp_flow.c +++ b/drivers/net/nfp/nfp_flow.c @@ -544,6 +544,11 @@ struct nfp_mask_id_entry { key_ls->key_layer |= NFP_FLOWER_LAYER_IPV6; key_ls->key_size += sizeof(struct nfp_flower_ipv6); break; + case RTE_FLOW_ITEM_TYPE_TCP: + PMD_DRV_LOG(DEBUG, "RTE_FLOW_ITEM_TYPE_TCP detected"); + key_ls->key_layer |= NFP_FLOWER_LAYER_TP; + key_ls->key_size += sizeof(struct nfp_flower_tp_ports); + break; default: PMD_DRV_LOG(ERR, "Item type %d not supported.", item->type); return -ENOTSUP; @@ -773,6 +778,78 @@ struct nfp_mask_id_entry { return 0; } +static int +nfp_flow_merge_tcp(struct rte_flow *nfp_flow, + char **mbuf_off, + const struct rte_flow_item *item, + const struct nfp_flow_item_proc *proc, + bool is_mask) +{ + uint8_t tcp_flags; + struct nfp_flower_tp_ports *ports; + struct nfp_flower_ipv4 *ipv4 = NULL; + struct nfp_flower_ipv6 *ipv6 = NULL; + const struct rte_flow_item_tcp *spec; + const struct rte_flow_item_tcp *mask; + struct nfp_flower_meta_tci *meta_tci; + + spec = item->spec; + if (spec == NULL) { + PMD_DRV_LOG(DEBUG, "nfp flow merge tcp: no item->spec!"); + return 0; + } + + meta_tci = (struct nfp_flower_meta_tci *)nfp_flow->payload.unmasked_data; + if (meta_tci->nfp_flow_key_layer & NFP_FLOWER_LAYER_IPV4) { + ipv4 = (struct nfp_flower_ipv4 *) + (*mbuf_off - sizeof(struct nfp_flower_ipv4)); + ports = (struct nfp_flower_tp_ports *) + ((char *)ipv4 - sizeof(struct nfp_flower_tp_ports)); + } else { /* IPv6 */ + ipv6 = (struct nfp_flower_ipv6 *) + (*mbuf_off - sizeof(struct nfp_flower_ipv6)); + ports = (struct nfp_flower_tp_ports *) + ((char *)ipv6 - sizeof(struct nfp_flower_tp_ports)); + } + + mask = item->mask ? item->mask : proc->mask_default; + if (is_mask) { + ports->port_src = mask->hdr.src_port; + ports->port_dst = mask->hdr.dst_port; + tcp_flags = mask->hdr.tcp_flags; + } else { + ports->port_src = spec->hdr.src_port; + ports->port_dst = spec->hdr.dst_port; + tcp_flags = spec->hdr.tcp_flags; + } + + if (ipv4) { + if (tcp_flags & RTE_TCP_FIN_FLAG) + ipv4->ip_ext.flags |= NFP_FL_TCP_FLAG_FIN; + if (tcp_flags & RTE_TCP_SYN_FLAG) + ipv4->ip_ext.flags |= NFP_FL_TCP_FLAG_SYN; + if (tcp_flags & RTE_TCP_RST_FLAG) + ipv4->ip_ext.flags |= NFP_FL_TCP_FLAG_RST; + if (tcp_flags & RTE_TCP_PSH_FLAG) + ipv4->ip_ext.flags |= NFP_FL_TCP_FLAG_PSH; + if (tcp_flags & RTE_TCP_URG_FLAG) + ipv4->ip_ext.flags |= NFP_FL_TCP_FLAG_URG; + } else { /* IPv6 */ + if (tcp_flags & RTE_TCP_FIN_FLAG) + ipv6->ip_ext.flags |= NFP_FL_TCP_FLAG_FIN; + if (tcp_flags & RTE_TCP_SYN_FLAG) + ipv6->ip_ext.flags |= NFP_FL_TCP_FLAG_SYN; + if (tcp_flags & RTE_TCP_RST_FLAG) + ipv6->ip_ext.flags |= NFP_FL_TCP_FLAG_RST; + if (tcp_flags & RTE_TCP_PSH_FLAG) + ipv6->ip_ext.flags |= NFP_FL_TCP_FLAG_PSH; + if (tcp_flags & RTE_TCP_URG_FLAG) + ipv6->ip_ext.flags |= NFP_FL_TCP_FLAG_URG; + } + + return 0; +} + /* Graph of supported items and associated process function */ static const struct nfp_flow_item_proc nfp_flow_item_proc_list[] = { [RTE_FLOW_ITEM_TYPE_END] = { @@ -809,6 +886,7 @@ struct nfp_mask_id_entry { .merge = nfp_flow_merge_vlan, }, [RTE_FLOW_ITEM_TYPE_IPV4] = { + .next_item = NEXT_ITEM(RTE_FLOW_ITEM_TYPE_TCP), .mask_support = &(const struct rte_flow_item_ipv4){ .hdr = { .type_of_service = 0xff, @@ -824,6 +902,7 @@ struct nfp_mask_id_entry { .merge = nfp_flow_merge_ipv4, }, [RTE_FLOW_ITEM_TYPE_IPV6] = { + .next_item = NEXT_ITEM(RTE_FLOW_ITEM_TYPE_TCP), .mask_support = &(const struct rte_flow_item_ipv6){ .hdr = { .vtc_flow = RTE_BE32(0x0ff00000), @@ -840,6 +919,18 @@ struct nfp_mask_id_entry { .mask_sz = sizeof(struct rte_flow_item_ipv6), .merge = nfp_flow_merge_ipv6, }, + [RTE_FLOW_ITEM_TYPE_TCP] = { + .mask_support = &(const struct rte_flow_item_tcp){ + .hdr = { + .tcp_flags = 0xff, + .src_port = RTE_BE16(0xffff), + .dst_port = RTE_BE16(0xffff), + }, + }, + .mask_default = &rte_flow_item_tcp_mask, + .mask_sz = sizeof(struct rte_flow_item_tcp), + .merge = nfp_flow_merge_tcp, + }, }; static int diff --git a/drivers/net/nfp/nfp_flow.h b/drivers/net/nfp/nfp_flow.h index f6bd3e4..b3bd949 100644 --- a/drivers/net/nfp/nfp_flow.h +++ b/drivers/net/nfp/nfp_flow.h @@ -23,6 +23,13 @@ #define NFP_FLOWER_LAYER2_GENEVE_OP (1 << 6) #define NFP_FLOWER_LAYER2_TUN_IPV6 (1 << 7) +/* Compressed HW representation of TCP Flags */ +#define NFP_FL_TCP_FLAG_FIN (1 << 0) +#define NFP_FL_TCP_FLAG_SYN (1 << 1) +#define NFP_FL_TCP_FLAG_RST (1 << 2) +#define NFP_FL_TCP_FLAG_PSH (1 << 3) +#define NFP_FL_TCP_FLAG_URG (1 << 4) + #define NFP_FL_META_FLAG_MANAGE_MASK (1 << 7) #define NFP_FLOWER_MASK_VLAN_CFI (1 << 12) -- 1.8.3.1