From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 24469A0560; Tue, 18 Oct 2022 05:13:10 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 215CE4114B; Tue, 18 Oct 2022 05:12:59 +0200 (CEST) Received: from NAM04-MW2-obe.outbound.protection.outlook.com (mail-mw2nam04on2101.outbound.protection.outlook.com [40.107.101.101]) by mails.dpdk.org (Postfix) with ESMTP id DED9441614 for ; Tue, 18 Oct 2022 05:12:56 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZnMdNyyHQtERWjK/B3kTP3YCHI3ZVj0TIXFxCNOQx16kCS09UnH/VHauktFcsXCAt5quUZDOve3as7VnkiIknXn6wtaGlsMuPMFFc/ZU+ZUYWeINi43h37H86v7wFKniMH8X+VTR/XpIVwjvD/4va3R7hF331XvbQUVKfv9ottOStihCHSbMey1Wtkk1XGyBbOMsJ6x0iE4ENT3njhenU21vv93AJoXoOtYHn1hcjTa3Avq1sHRWxGTNTfayyWxJx5ja0h8imxvYznJKxYsQf/k6sqfDhETk5pFm5OKlTy8tK9IunIB9hwZq4NglaG33wIqEBw5Y9SPR7pa64WobAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=q/kYiEFweyI/0iuwm/Tojb+4JGMXZzNM3OZ/YOKt9JA=; b=lEVPpjjVlM2jgNwQPHKAGH9u7D0oBmCJBU4KphqXYbsanhTTmWoCsLaHgVMHCQO2ZD4G1dCykLkSVRJ00yJkmNU1Playph+DFviXa9kWinjJpNIIBFHwQmvjI/1n5Iy/+WAISMwyQAsbfTrK0xFmdvNeM43jXAFu0HkMAxm0oEAOmQor4pLUUitpZUL40VX1tp7xd0CvWaTb2iOk1viAcLBq48cFgpy8zK5gWnAJ+PhFtfju4t8tKhApOxi+UqjIDT0l1P/1w8Di6XQpRFPm7uJtAW17QaUATpr6IKNFsyf6RNjfNL0B3qG4b3ha14ZdPJpl4uL1TSXsUMMT31jvtw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=corigine.com; dmarc=pass action=none header.from=corigine.com; dkim=pass header.d=corigine.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=corigine.onmicrosoft.com; s=selector2-corigine-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=q/kYiEFweyI/0iuwm/Tojb+4JGMXZzNM3OZ/YOKt9JA=; b=DOZr1mXmA8xOj8KirVE2QLqWbhruhYfO3kMxBoHKgS8aWmY71Phr2NH4JcitGjBjqy7/IEHgoKKt53sZvu2Ql0dAnh1kYLd1VVY/NKl5Wk9CrEN6idCglyHjisLmZ3ZQq7Tr7gAmN9j/DT/bwpDAAr+1OMkz1wKx3WhsMl5W9IE= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=corigine.com; Received: from SJ0PR13MB5545.namprd13.prod.outlook.com (2603:10b6:a03:424::5) by DM6PR13MB3788.namprd13.prod.outlook.com (2603:10b6:5:242::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5723.20; Tue, 18 Oct 2022 03:12:55 +0000 Received: from SJ0PR13MB5545.namprd13.prod.outlook.com ([fe80::7c26:1a0b:2825:6f4b]) by SJ0PR13MB5545.namprd13.prod.outlook.com ([fe80::7c26:1a0b:2825:6f4b%4]) with mapi id 15.20.5723.014; Tue, 18 Oct 2022 03:12:55 +0000 From: Chaoyong He To: dev@dpdk.org Cc: oss-drivers@corigine.com, niklas.soderlund@corigine.com, Chaoyong He Subject: [PATCH v3 03/25] net/nfp: add the structures and functions for flow offload Date: Tue, 18 Oct 2022 11:12:10 +0800 Message-Id: <1666062752-33689-4-git-send-email-chaoyong.he@corigine.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1666062752-33689-1-git-send-email-chaoyong.he@corigine.com> References: <1666062752-33689-1-git-send-email-chaoyong.he@corigine.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-ClientProxiedBy: SI1PR02CA0010.apcprd02.prod.outlook.com (2603:1096:4:1f7::17) To SJ0PR13MB5545.namprd13.prod.outlook.com (2603:10b6:a03:424::5) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ0PR13MB5545:EE_|DM6PR13MB3788:EE_ X-MS-Office365-Filtering-Correlation-Id: 7891c7f1-3d87-428e-8236-08dab0b6a679 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR13MB5545.namprd13.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(346002)(39830400003)(136003)(366004)(376002)(396003)(451199015)(2616005)(41300700001)(6666004)(26005)(6512007)(107886003)(186003)(316002)(52116002)(30864003)(83380400001)(66574015)(5660300002)(6506007)(8676002)(44832011)(2906002)(6916009)(8936002)(66476007)(66946007)(478600001)(6486002)(4326008)(66556008)(86362001)(36756003)(38350700002)(38100700002); DIR:OUT; SFP:1102; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?QVFtdE1YN1FxNjFYWm1DRUhRTDk1R2lFYkF3R0x3RGRsck4ycEF0c1RFKy9a?= =?utf-8?B?cndTZGUrMHJ1cjRGelZ4L1plMW52YmZySWxWbEZWSytjNGpCblNxQkxXbS9V?= =?utf-8?B?RkZ1eXB1cDh5RjdPVi9DMExGcUhyMTVhRmtrdkpKbk11Y21STnF6QXhoMGhy?= =?utf-8?B?OE5oTFZ0ZzNHRGtZOE5HOWdOUGhIajJVNVBOMzlERk9sWWVwQk9sbjlWKzNq?= =?utf-8?B?bTlHaDNDUGd0VWJ6OGJUUEdkYm9iVFJJeEI0cmh5d1lDUDZhQ3Z2eGxISGxq?= =?utf-8?B?SWVrTXVBN1ByMGtVdGxMVTUzY2NFVjV4OUoxTitFSEZkbll1cWN1bTVITURO?= =?utf-8?B?N2kvN1k2OEQwZnZzRjNPaVBFcjcvNXluRDdlQ3JPLzFLTVJLQVNFUFQ0SWJM?= =?utf-8?B?ak96eGpGYTFaUS9MZWhqeG8vZ0ZSaERVZG1rbjg1enB4WG8yUG9KeE5JaTJV?= =?utf-8?B?clR4Q0N5dXNnMm82Tk8wamRDdlhNSWpRVTdwa09TTEtIRmx3bDNQTDkyVHN5?= =?utf-8?B?dERRVkhPMVEvUDVtbHpKTEFVRFE5VXA1bUZ0MHBhZjZXMWgvOGtYTTFsZnA1?= =?utf-8?B?SkhFMDJNeGdQUFkzOFE1WUd4TEU2SXpBNUFZZzIyR3lhTG0wcWNONnhJU2Q3?= =?utf-8?B?SFE1VDhlUGZBQm80Q2pWRG1SSTFqQTk4U1RBYnY0THF3a0ZSMWZENWthb0xh?= =?utf-8?B?RU5wOHFnK0V6bnA5bzlDTDJMTmNlSXBuTUFobGZ4NythcllLNUZtVkprQk9t?= =?utf-8?B?SmVSa2ZOTm5rV2M1ejg4RWx6NVBtajBQMXhlUVBoNnIzNkFPVGVYbmw2WGxG?= =?utf-8?B?V1hXeUtUNUpQbkREeDl2ZUs3VUF6UEs3YVpmaVVlOWw1Q043bnlTeFdjd1hp?= =?utf-8?B?R3hwYjVFN2d2ekxmWmJxcmdyTHIrVEdoV1lqZGF4aU8zekJCblM2MFRxQW9x?= =?utf-8?B?bVpmZmdqZmtGK0pmVlZHeWtEZFdMSFF3dnIwMDQxQ0NkdkNESVZrK0tOQk5G?= =?utf-8?B?L3pJUm5heGFCQTc0YXljWG1tVU1mSlpaSWZEdE1oVXRuRm4yRmszRFYrV2FS?= =?utf-8?B?OEJlaFZzTGlKVVJyZ0ViSW5JU3d5WXk5ZVZLK21KRjgvYkU4RWcrallzeEhs?= =?utf-8?B?OUxYcFNYU0x3M21mRkRsNmlmU3Y0QnUrUllVTWp6b0VnZ1ZqbDRlUFUrajlZ?= =?utf-8?B?eWhXbmZmR0QvSUZjTThQamJIdWhCN2VIZ296K052Yy82L0xycnB3T2E4UWt6?= =?utf-8?B?YnVsRkxOVW9JOS9jS3ZXQTZTU0ZNTWplc1dVbmVkVUJnTkhNdkJBc1JGU25K?= =?utf-8?B?ZVVjRHJUWjc2R2FFK1pIdFVyOFdoUWpuLzE4NFkyWW1sajRpS2FqKy9EMW4x?= =?utf-8?B?RkxBSVZMMUJXTlcyMDJWQ1VPcDJRZUM1TmFNLzJCNFZ2RGxGM29TSk5MYVFN?= =?utf-8?B?aUR4OTNVY21oYms1OHFsSFExOWZqQkE3aStKa2M3eUVQQmZwRDFhaE5hQUlT?= =?utf-8?B?KzFFSWlwcFQ3allSZGJ4SFgxaTY3ZnladWNnQXoram5vVlFLRGZEK0lhQ2lL?= =?utf-8?B?bzI4Kzc1K294WFFHSzM1RDdVVjVSbWxsd0JKd0RvVllJQ01iVC81eHI0REdT?= =?utf-8?B?OGZhV210S1p4RU1ySTBOK091MTN4eWc4Q3NIWktnb29rdVBTL2xZVzBKMmdQ?= =?utf-8?B?cWZ2ZzV6bXBoODk2V3ZxOVI2dWNXSUN3aSt2aXh4VUIwUWtKV2lkdEdsV1py?= =?utf-8?B?NUtLSldRSjlPRUlnWFdhM3RtTnBDYzF3d0FYTG8vRmpRYmV3VzNWdHhZTjVF?= =?utf-8?B?MnEvbXNWdXJORnNWZnlOVzZVeXBjME8vL045ZlNCeVJmRTNxV3pNZXN4SEpk?= =?utf-8?B?a1RoWkNrZ3VZZnArTG5RNmcrZUpRRlhFSk5jSytsYXRCU0hUKzhwYWl3SXNX?= =?utf-8?B?N2svcWlLWGh4SkZidnhrb3RRSkJ5Q29mOVBmcXVIYjVURDdiWXE2YU1KV0pz?= =?utf-8?B?Skc0LzMxMkRyWVd5ZDQ5NHZyNjNUanJxaThQZHVSM3JQYUlsS0hUa1NrcEtk?= =?utf-8?B?RXNGdUN3YlNCMGNpVkhFNTRIZ2dTQzZzZmYxWUtQaloxM1lCUGxESUFJSTVI?= =?utf-8?B?bU9PWjFxVWF4dllZVjVnUEdsTmRxSzg0RU5sYXpMNktybVJLM1FUVEJKN3Zu?= =?utf-8?B?V2c9PQ==?= X-OriginatorOrg: corigine.com X-MS-Exchange-CrossTenant-Network-Message-Id: 7891c7f1-3d87-428e-8236-08dab0b6a679 X-MS-Exchange-CrossTenant-AuthSource: SJ0PR13MB5545.namprd13.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 18 Oct 2022 03:12:55.1269 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: fe128f2c-073b-4c20-818e-7246a585940c X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: 6cBJ0khwckKJRUWZMYOmH0IpKZ4eHSpORlCkc+EpA4lXggpJqxdE6bNGJmW9zzjmx/s2txsb/exjrDjdonqWoi3eQGfUUQye4xunt1WHpZQ= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR13MB3788 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Add the structures and functions to process mask table, flow table, and flow stats id, which are used in the rte_flow offload logics. Signed-off-by: Chaoyong He Reviewed-by: Niklas Söderlund --- drivers/net/nfp/flower/nfp_flower.c | 11 +- drivers/net/nfp/meson.build | 3 + drivers/net/nfp/nfp_flow.c | 507 ++++++++++++++++++++++++++++++++++++ drivers/net/nfp/nfp_flow.h | 81 ++++++ 4 files changed, 601 insertions(+), 1 deletion(-) create mode 100644 drivers/net/nfp/nfp_flow.c diff --git a/drivers/net/nfp/flower/nfp_flower.c b/drivers/net/nfp/flower/nfp_flower.c index 3e97f5c..168bf0c 100644 --- a/drivers/net/nfp/flower/nfp_flower.c +++ b/drivers/net/nfp/flower/nfp_flower.c @@ -15,6 +15,7 @@ #include "../nfp_ctrl.h" #include "../nfp_cpp_bridge.h" #include "../nfp_rxtx.h" +#include "../nfp_flow.h" #include "../nfpcore/nfp_mip.h" #include "../nfpcore/nfp_rtsym.h" #include "../nfpcore/nfp_nsp.h" @@ -1089,13 +1090,19 @@ pf_dev->app_fw_priv = app_fw_flower; + ret = nfp_flow_priv_init(pf_dev); + if (ret != 0) { + PMD_INIT_LOG(ERR, "init flow priv failed"); + goto app_cleanup; + } + /* Allocate memory for the PF AND ctrl vNIC here (hence the * 2) */ pf_hw = rte_zmalloc_socket("nfp_pf_vnic", 2 * sizeof(struct nfp_net_adapter), RTE_CACHE_LINE_SIZE, numa_node); if (pf_hw == NULL) { PMD_INIT_LOG(ERR, "Could not malloc nfp pf vnic"); ret = -ENOMEM; - goto app_cleanup; + goto flow_priv_cleanup; } /* Map the PF ctrl bar */ @@ -1173,6 +1180,8 @@ nfp_cpp_area_free(pf_dev->ctrl_area); vnic_cleanup: rte_free(pf_hw); +flow_priv_cleanup: + nfp_flow_priv_uninit(pf_dev); app_cleanup: rte_free(app_fw_flower); diff --git a/drivers/net/nfp/meson.build b/drivers/net/nfp/meson.build index 8a63979..7416fd3 100644 --- a/drivers/net/nfp/meson.build +++ b/drivers/net/nfp/meson.build @@ -27,4 +27,7 @@ sources = files( 'nfp_cpp_bridge.c', 'nfp_ethdev_vf.c', 'nfp_ethdev.c', + 'nfp_flow.c', ) + +deps += ['hash'] diff --git a/drivers/net/nfp/nfp_flow.c b/drivers/net/nfp/nfp_flow.c new file mode 100644 index 0000000..97f5d1b --- /dev/null +++ b/drivers/net/nfp/nfp_flow.c @@ -0,0 +1,507 @@ +/* SPDX-License-Identifier: BSD-3-Clause + * Copyright (c) 2022 Corigine, Inc. + * All rights reserved. + */ + +#include +#include +#include +#include + +#include "nfp_common.h" +#include "nfp_flow.h" +#include "nfp_logs.h" +#include "flower/nfp_flower.h" +#include "nfpcore/nfp_mip.h" +#include "nfpcore/nfp_rtsym.h" + +struct nfp_mask_id_entry { + uint32_t hash_key; + uint32_t ref_cnt; + uint8_t mask_id; +}; + +static int +nfp_mask_id_alloc(struct nfp_flow_priv *priv, uint8_t *mask_id) +{ + uint8_t temp_id; + uint8_t freed_id; + struct circ_buf *ring; + + /* Checking for unallocated entries first. */ + if (priv->mask_ids.init_unallocated > 0) { + *mask_id = priv->mask_ids.init_unallocated; + priv->mask_ids.init_unallocated--; + return 0; + } + + /* Checking if buffer is empty. */ + freed_id = NFP_FLOWER_MASK_ENTRY_RS - 1; + ring = &priv->mask_ids.free_list; + if (ring->head == ring->tail) { + *mask_id = freed_id; + return -ENOENT; + } + + rte_memcpy(&temp_id, &ring->buf[ring->tail], NFP_FLOWER_MASK_ELEMENT_RS); + *mask_id = temp_id; + + rte_memcpy(&ring->buf[ring->tail], &freed_id, NFP_FLOWER_MASK_ELEMENT_RS); + ring->tail = (ring->tail + NFP_FLOWER_MASK_ELEMENT_RS) % + (NFP_FLOWER_MASK_ENTRY_RS * NFP_FLOWER_MASK_ELEMENT_RS); + + return 0; +} + +static int +nfp_mask_id_free(struct nfp_flow_priv *priv, uint8_t mask_id) +{ + struct circ_buf *ring; + + ring = &priv->mask_ids.free_list; + + /* Checking if buffer is full. */ + if (CIRC_SPACE(ring->head, ring->tail, NFP_FLOWER_MASK_ENTRY_RS) == 0) + return -ENOBUFS; + + rte_memcpy(&ring->buf[ring->head], &mask_id, NFP_FLOWER_MASK_ELEMENT_RS); + ring->head = (ring->head + NFP_FLOWER_MASK_ELEMENT_RS) % + (NFP_FLOWER_MASK_ENTRY_RS * NFP_FLOWER_MASK_ELEMENT_RS); + + return 0; +} + +static int +nfp_mask_table_add(struct nfp_flow_priv *priv, + char *mask_data, + uint32_t mask_len, + uint8_t *id) +{ + int ret; + uint8_t mask_id; + uint32_t hash_key; + struct nfp_mask_id_entry *mask_entry; + + mask_entry = rte_zmalloc("mask_entry", sizeof(struct nfp_mask_id_entry), 0); + if (mask_entry == NULL) { + ret = -ENOMEM; + goto exit; + } + + ret = nfp_mask_id_alloc(priv, &mask_id); + if (ret != 0) + goto mask_entry_free; + + hash_key = rte_jhash(mask_data, mask_len, priv->hash_seed); + mask_entry->mask_id = mask_id; + mask_entry->hash_key = hash_key; + mask_entry->ref_cnt = 1; + PMD_DRV_LOG(DEBUG, "hash_key=%#x id=%u ref=%u", hash_key, + mask_id, mask_entry->ref_cnt); + + ret = rte_hash_add_key_data(priv->mask_table, &hash_key, mask_entry); + if (ret != 0) { + PMD_DRV_LOG(ERR, "Add to mask table failed."); + goto mask_id_free; + } + + *id = mask_id; + return 0; + +mask_id_free: + nfp_mask_id_free(priv, mask_id); +mask_entry_free: + rte_free(mask_entry); +exit: + return ret; +} + +static int +nfp_mask_table_del(struct nfp_flow_priv *priv, + char *mask_data, + uint32_t mask_len, + uint8_t id) +{ + int ret; + uint32_t hash_key; + + hash_key = rte_jhash(mask_data, mask_len, priv->hash_seed); + ret = rte_hash_del_key(priv->mask_table, &hash_key); + if (ret < 0) { + PMD_DRV_LOG(ERR, "Delete from mask table failed."); + return ret; + } + + ret = nfp_mask_id_free(priv, id); + if (ret != 0) { + PMD_DRV_LOG(ERR, "Free mask id failed."); + return ret; + } + + return 0; +} + +static struct nfp_mask_id_entry * +nfp_mask_table_search(struct nfp_flow_priv *priv, + char *mask_data, + uint32_t mask_len) +{ + int index; + uint32_t hash_key; + struct nfp_mask_id_entry *entry; + + hash_key = rte_jhash(mask_data, mask_len, priv->hash_seed); + index = rte_hash_lookup_data(priv->mask_table, &hash_key, (void **)&entry); + if (index < 0) { + PMD_DRV_LOG(DEBUG, "Data NOT found in the mask table."); + return NULL; + } + + return entry; +} + +__rte_unused static bool +nfp_check_mask_add(struct nfp_flow_priv *priv, + char *mask_data, + uint32_t mask_len, + uint8_t *meta_flags, + uint8_t *mask_id) +{ + int ret; + struct nfp_mask_id_entry *mask_entry; + + mask_entry = nfp_mask_table_search(priv, mask_data, mask_len); + if (mask_entry == NULL) { + /* mask entry does not exist, let's create one */ + ret = nfp_mask_table_add(priv, mask_data, mask_len, mask_id); + if (ret != 0) + return false; + + *meta_flags |= NFP_FL_META_FLAG_MANAGE_MASK; + } else { + /* mask entry already exist */ + mask_entry->ref_cnt++; + *mask_id = mask_entry->mask_id; + } + + return true; +} + +__rte_unused static bool +nfp_check_mask_remove(struct nfp_flow_priv *priv, + char *mask_data, + uint32_t mask_len, + uint8_t *meta_flags) +{ + int ret; + struct nfp_mask_id_entry *mask_entry; + + mask_entry = nfp_mask_table_search(priv, mask_data, mask_len); + if (mask_entry == NULL) + return false; + + mask_entry->ref_cnt--; + if (mask_entry->ref_cnt == 0) { + ret = nfp_mask_table_del(priv, mask_data, mask_len, + mask_entry->mask_id); + if (ret != 0) + return false; + + rte_free(mask_entry); + if (meta_flags) + *meta_flags &= ~NFP_FL_META_FLAG_MANAGE_MASK; + } + + return true; +} + +__rte_unused static int +nfp_flow_table_add(struct nfp_flow_priv *priv, + struct rte_flow *nfp_flow) +{ + int ret; + char *hash_data; + uint32_t hash_key; + + hash_data = (char *)(nfp_flow->payload.unmasked_data); + hash_key = rte_jhash(hash_data, nfp_flow->length, priv->hash_seed); + ret = rte_hash_add_key_data(priv->flow_table, &hash_key, nfp_flow); + if (ret != 0) { + PMD_DRV_LOG(ERR, "Add to flow table failed."); + return ret; + } + + return 0; +} + +__rte_unused static int +nfp_flow_table_delete(struct nfp_flow_priv *priv, + struct rte_flow *nfp_flow) +{ + int ret; + char *hash_data; + uint32_t hash_key; + + hash_data = (char *)(nfp_flow->payload.unmasked_data); + hash_key = rte_jhash(hash_data, nfp_flow->length, priv->hash_seed); + ret = rte_hash_del_key(priv->flow_table, &hash_key); + if (ret < 0) { + PMD_DRV_LOG(ERR, "Delete from flow table failed."); + return ret; + } + + return 0; +} + +__rte_unused static struct rte_flow * +nfp_flow_table_search(struct nfp_flow_priv *priv, + struct rte_flow *nfp_flow) +{ + int index; + char *hash_data; + uint32_t hash_key; + struct rte_flow *flow_find; + + hash_data = (char *)(nfp_flow->payload.unmasked_data); + hash_key = rte_jhash(hash_data, nfp_flow->length, priv->hash_seed); + index = rte_hash_lookup_data(priv->flow_table, &hash_key, (void **)&flow_find); + if (index < 0) { + PMD_DRV_LOG(DEBUG, "Data NOT found in the flow table."); + return NULL; + } + + return flow_find; +} + +__rte_unused static struct rte_flow * +nfp_flow_alloc(struct nfp_fl_key_ls *key_layer) +{ + char *tmp; + size_t len; + struct rte_flow *nfp_flow; + struct nfp_fl_payload *payload; + + nfp_flow = rte_zmalloc("nfp_flow", sizeof(struct rte_flow), 0); + if (nfp_flow == NULL) + goto exit; + + len = key_layer->key_size + key_layer->key_size + key_layer->act_size; + tmp = rte_zmalloc("nfp_flow_payload", len + sizeof(struct nfp_fl_rule_metadata), 0); + if (tmp == NULL) + goto free_flow; + + nfp_flow->length = len; + + payload = &nfp_flow->payload; + payload->meta = (struct nfp_fl_rule_metadata *)tmp; + payload->unmasked_data = tmp + sizeof(struct nfp_fl_rule_metadata); + payload->mask_data = payload->unmasked_data + key_layer->key_size; + payload->action_data = payload->mask_data + key_layer->key_size; + + return nfp_flow; + +free_flow: + rte_free(nfp_flow); +exit: + return NULL; +} + +__rte_unused static void +nfp_flow_free(struct rte_flow *nfp_flow) +{ + rte_free(nfp_flow->payload.meta); + rte_free(nfp_flow); +} + +__rte_unused static int +nfp_stats_id_alloc(struct nfp_flow_priv *priv, uint32_t *ctx) +{ + struct circ_buf *ring; + uint32_t freed_stats_id; + uint32_t temp_stats_id; + + /* Check for unallocated entries first. */ + if (priv->stats_ids.init_unallocated > 0) { + *ctx = ((priv->stats_ids.init_unallocated - 1) & NFP_FL_STAT_ID_STAT) | + (priv->active_mem_unit & NFP_FL_STAT_ID_MU_NUM); + if (++priv->active_mem_unit == priv->total_mem_units) { + priv->stats_ids.init_unallocated--; + priv->active_mem_unit = 0; + } + return 0; + } + + /* Check if buffer is empty */ + ring = &priv->stats_ids.free_list; + freed_stats_id = priv->stats_ring_size; + if (ring->head == ring->tail) { + *ctx = freed_stats_id; + return -ENOENT; + } + + memcpy(&temp_stats_id, &ring->buf[ring->tail], NFP_FL_STATS_ELEM_RS); + *ctx = temp_stats_id; + memcpy(&ring->buf[ring->tail], &freed_stats_id, NFP_FL_STATS_ELEM_RS); + ring->tail = (ring->tail + NFP_FL_STATS_ELEM_RS) % + (priv->stats_ring_size * NFP_FL_STATS_ELEM_RS); + + return 0; +} + +__rte_unused static int +nfp_stats_id_free(struct nfp_flow_priv *priv, uint32_t ctx) +{ + struct circ_buf *ring; + + /* Check if buffer is full */ + ring = &priv->stats_ids.free_list; + if (!CIRC_SPACE(ring->head, ring->tail, priv->stats_ring_size * + NFP_FL_STATS_ELEM_RS - NFP_FL_STATS_ELEM_RS + 1)) + return -ENOBUFS; + + memcpy(&ring->buf[ring->head], &ctx, NFP_FL_STATS_ELEM_RS); + ring->head = (ring->head + NFP_FL_STATS_ELEM_RS) % + (priv->stats_ring_size * NFP_FL_STATS_ELEM_RS); + + return 0; +} + +int +nfp_flow_priv_init(struct nfp_pf_dev *pf_dev) +{ + int ret = 0; + uint64_t ctx_count; + uint64_t ctx_split; + size_t stats_size; + struct nfp_flow_priv *priv; + struct nfp_app_fw_flower *app_fw_flower; + + struct rte_hash_parameters mask_hash_params = { + .name = "mask_hash_table", + .entries = NFP_MASK_TABLE_ENTRIES, + .hash_func = rte_jhash, + .socket_id = rte_socket_id(), + .key_len = sizeof(uint32_t), + .extra_flag = RTE_HASH_EXTRA_FLAGS_RW_CONCURRENCY, + }; + + struct rte_hash_parameters flow_hash_params = { + .name = "flow_hash_table", + .hash_func = rte_jhash, + .socket_id = rte_socket_id(), + .key_len = sizeof(uint32_t), + .extra_flag = RTE_HASH_EXTRA_FLAGS_RW_CONCURRENCY, + }; + + ctx_count = nfp_rtsym_read_le(pf_dev->sym_tbl, + "CONFIG_FC_HOST_CTX_COUNT", &ret); + if (ret < 0) { + PMD_INIT_LOG(ERR, "Read CTX_COUNT from symbol table failed"); + goto exit; + } + + ctx_split = nfp_rtsym_read_le(pf_dev->sym_tbl, + "CONFIG_FC_HOST_CTX_SPLIT", &ret); + if (ret < 0) { + PMD_INIT_LOG(ERR, "Read CTX_SPLIT from symbol table failed"); + goto exit; + } + + priv = rte_zmalloc("nfp_app_flow_priv", sizeof(struct nfp_flow_priv), 0); + if (priv == NULL) { + PMD_INIT_LOG(ERR, "nfp app flow priv creation failed"); + ret = -ENOMEM; + goto exit; + } + + app_fw_flower = NFP_PRIV_TO_APP_FW_FLOWER(pf_dev->app_fw_priv); + app_fw_flower->flow_priv = priv; + priv->hash_seed = (uint32_t)rte_rand(); + priv->stats_ring_size = ctx_count; + priv->total_mem_units = ctx_split; + + /* Init ring buffer and unallocated mask_ids. */ + priv->mask_ids.init_unallocated = NFP_FLOWER_MASK_ENTRY_RS - 1; + priv->mask_ids.free_list.buf = rte_zmalloc("nfp_app_mask_ids", + NFP_FLOWER_MASK_ENTRY_RS * NFP_FLOWER_MASK_ELEMENT_RS, 0); + if (priv->mask_ids.free_list.buf == NULL) { + PMD_INIT_LOG(ERR, "mask id free list creation failed"); + ret = -ENOMEM; + goto free_priv; + } + + /* Init ring buffer and unallocated stats_ids. */ + priv->stats_ids.init_unallocated = ctx_count / ctx_split; + priv->stats_ids.free_list.buf = rte_zmalloc("nfp_app_stats_ids", + priv->stats_ring_size * NFP_FL_STATS_ELEM_RS, 0); + if (priv->stats_ids.free_list.buf == NULL) { + PMD_INIT_LOG(ERR, "stats id free list creation failed"); + ret = -ENOMEM; + goto free_mask_id; + } + + /* flow stats */ + rte_spinlock_init(&priv->stats_lock); + stats_size = (ctx_count & NFP_FL_STAT_ID_STAT) | + ((ctx_split - 1) & NFP_FL_STAT_ID_MU_NUM); + PMD_INIT_LOG(INFO, "ctx_count:%0lx, ctx_split:%0lx, stats_size:%0lx ", + ctx_count, ctx_split, stats_size); + priv->stats = rte_zmalloc("nfp_flow_stats", + stats_size * sizeof(struct nfp_fl_stats), 0); + if (priv->stats == NULL) { + PMD_INIT_LOG(ERR, "flow stats creation failed"); + ret = -ENOMEM; + goto free_stats_id; + } + + /* mask table */ + mask_hash_params.hash_func_init_val = priv->hash_seed; + priv->mask_table = rte_hash_create(&mask_hash_params); + if (priv->mask_table == NULL) { + PMD_INIT_LOG(ERR, "mask hash table creation failed"); + ret = -ENOMEM; + goto free_stats; + } + + /* flow table */ + flow_hash_params.hash_func_init_val = priv->hash_seed; + flow_hash_params.entries = ctx_count; + priv->flow_table = rte_hash_create(&flow_hash_params); + if (priv->flow_table == NULL) { + PMD_INIT_LOG(ERR, "flow hash table creation failed"); + ret = -ENOMEM; + goto free_mask_table; + } + + return 0; + +free_mask_table: + rte_free(priv->mask_table); +free_stats: + rte_free(priv->stats); +free_stats_id: + rte_free(priv->stats_ids.free_list.buf); +free_mask_id: + rte_free(priv->mask_ids.free_list.buf); +free_priv: + rte_free(priv); +exit: + return ret; +} + +void +nfp_flow_priv_uninit(struct nfp_pf_dev *pf_dev) +{ + struct nfp_app_fw_flower *app_fw_flower; + struct nfp_flow_priv *priv; + + app_fw_flower = NFP_PRIV_TO_APP_FW_FLOWER(pf_dev->app_fw_priv); + priv = app_fw_flower->flow_priv; + + rte_hash_free(priv->flow_table); + rte_hash_free(priv->mask_table); + rte_free(priv->stats); + rte_free(priv->stats_ids.free_list.buf); + rte_free(priv->mask_ids.free_list.buf); + rte_free(priv); +} diff --git a/drivers/net/nfp/nfp_flow.h b/drivers/net/nfp/nfp_flow.h index 971ba69..142d7d5 100644 --- a/drivers/net/nfp/nfp_flow.h +++ b/drivers/net/nfp/nfp_flow.h @@ -6,15 +6,96 @@ #ifndef _NFP_FLOW_H_ #define _NFP_FLOW_H_ +#define NFP_FL_META_FLAG_MANAGE_MASK (1 << 7) + +#define NFP_MASK_TABLE_ENTRIES 1024 + +enum nfp_flower_tun_type { + NFP_FL_TUN_NONE = 0, + NFP_FL_TUN_GRE = 1, + NFP_FL_TUN_VXLAN = 2, + NFP_FL_TUN_GENEVE = 4, +}; + +struct nfp_fl_key_ls { + uint32_t key_layer_two; + uint8_t key_layer; + int key_size; + int act_size; + uint32_t port; + uint16_t vlan; + enum nfp_flower_tun_type tun_type; +}; + +struct nfp_fl_rule_metadata { + uint8_t key_len; + uint8_t mask_len; + uint8_t act_len; + uint8_t flags; + rte_be32_t host_ctx_id; + rte_be64_t host_cookie __rte_packed; + rte_be64_t flow_version __rte_packed; + rte_be32_t shortcut; +}; + +struct nfp_fl_payload { + struct nfp_fl_rule_metadata *meta; + char *unmasked_data; + char *mask_data; + char *action_data; +}; + +#define CIRC_CNT(head, tail, size) (((head) - (tail)) & ((size) - 1)) +#define CIRC_SPACE(head, tail, size) CIRC_CNT((tail), ((head) + 1), (size)) +struct circ_buf { + uint32_t head; + uint32_t tail; + char *buf; +}; + +#define NFP_FLOWER_MASK_ENTRY_RS 256 +#define NFP_FLOWER_MASK_ELEMENT_RS sizeof(uint8_t) +struct nfp_fl_mask_id { + struct circ_buf free_list; + uint8_t init_unallocated; +}; + +#define NFP_FL_STATS_ELEM_RS sizeof(uint32_t) +struct nfp_fl_stats_id { + struct circ_buf free_list; + uint32_t init_unallocated; +}; + +#define NFP_FL_STAT_ID_MU_NUM 0xffc00000 +#define NFP_FL_STAT_ID_STAT 0x003fffff struct nfp_fl_stats { uint64_t pkts; uint64_t bytes; }; struct nfp_flow_priv { + uint32_t hash_seed; /**< Hash seed for hash tables in this structure. */ + /* mask hash table */ + struct nfp_fl_mask_id mask_ids; /**< Entry for mask hash table */ + struct rte_hash *mask_table; /**< Hash table to store mask ids. */ + /* flow hash table */ + struct rte_hash *flow_table; /**< Hash table to store flow rules. */ /* flow stats */ + uint32_t active_mem_unit; /**< The size of active mem units. */ + uint32_t total_mem_units; /**< The size of total mem units. */ + uint32_t stats_ring_size; /**< The size of stats id ring. */ + struct nfp_fl_stats_id stats_ids; /**< The stats id ring. */ struct nfp_fl_stats *stats; /**< Store stats of flow. */ rte_spinlock_t stats_lock; /** < Lock the update of 'stats' field. */ }; +struct rte_flow { + struct nfp_fl_payload payload; + size_t length; + bool install_flag; +}; + +int nfp_flow_priv_init(struct nfp_pf_dev *pf_dev); +void nfp_flow_priv_uninit(struct nfp_pf_dev *pf_dev); + #endif /* _NFP_FLOW_H_ */ -- 1.8.3.1