From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from EUR03-VE1-obe.outbound.protection.outlook.com (mail-eopbgr50064.outbound.protection.outlook.com [40.107.5.64]) by dpdk.org (Postfix) with ESMTP id D61176833 for ; Fri, 2 Nov 2018 18:53:20 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Mellanox.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=KTFUrGIIgCCXXvIZ5w8HQjz9cRyjwMsJIdKXAXERfUY=; b=Q49zUQUScg/nQI+vY5QRDXLDYBx4xdpKq6uX3/uYVzvO4XuAW9BZE+YfMwjYO0LiBvSCAiylsFxi7rt4oyO1uwAA6OYE2KzhNzAEd2NwJQHNQIe4oKVH4CSoSb+kkZ0fiUHt9QQFIAfgTSWUq+A1+blEKEqIQpvk0EippakK7+I= Received: from AM4PR05MB3265.eurprd05.prod.outlook.com (10.171.186.150) by AM4PR05MB3203.eurprd05.prod.outlook.com (10.171.186.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1294.20; Fri, 2 Nov 2018 17:53:19 +0000 Received: from AM4PR05MB3265.eurprd05.prod.outlook.com ([fe80::544b:a68d:e6a5:ba6e]) by AM4PR05MB3265.eurprd05.prod.outlook.com ([fe80::544b:a68d:e6a5:ba6e%2]) with mapi id 15.20.1294.024; Fri, 2 Nov 2018 17:53:19 +0000 From: Slava Ovsiienko To: Shahaf Shuler CC: "dev@dpdk.org" , Yongseok Koh , Slava Ovsiienko Thread-Topic: [PATCH v4 07/13] net/mlx5: add VXLAN support to flow prepare routine Thread-Index: AQHUctTww1MuOAVnRUOYtMPoDGuSSA== Date: Fri, 2 Nov 2018 17:53:19 +0000 Message-ID: <1541181152-15788-8-git-send-email-viacheslavo@mellanox.com> References: <1541074741-41368-1-git-send-email-viacheslavo@mellanox.com> <1541181152-15788-1-git-send-email-viacheslavo@mellanox.com> In-Reply-To: <1541181152-15788-1-git-send-email-viacheslavo@mellanox.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-clientproxiedby: LO2P265CA0112.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:c::28) To AM4PR05MB3265.eurprd05.prod.outlook.com (2603:10a6:205:4::22) authentication-results: spf=none (sender IP is ) smtp.mailfrom=viacheslavo@mellanox.com; x-ms-exchange-messagesentrepresentingtype: 1 x-originating-ip: [37.142.13.130] x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1; AM4PR05MB3203; 6:lsKcSJMc3BwjMPeZ2Fm7KZke0VYx3ZJAYl99ewN1iA6sHYn+RUMnDMtsIqLLJEWsKuUEIqzZZ0LkhWaOBFx0Wr/QEhmMA4SIevSWsAFovdVGlvZJUypIxFcTgI+xioIuLdFFvEHpdXmpTXE8Q6xYJYcdaCrVTn1g2UMv8NEuNyUepZavogHLcJhe/q7LCW5EH8mWHi9rvKhd58wjbLzYSXmTBET0RcLxZ3FNIHWWrKeI1be9b1yzCve+f931ctP/yImVfdu3iomcpl3l9dmhLSyc5tpPQXeKi3HrR83iSsKDLPRfWBW6Jra8L51Yv0ilMSbO/eWC/l/zgsfR8FJl9iQDyoUmAAS91mHScmWoANkB888QiEea80IjjijSWuhgGhNIA+nmQhbpT9JjmQg+qtNHmtm3LxAF1necFXifCWVn8Eymj4QqmFW7bci7gRKGsGK0ZI/A9hMuUS7G0rh6ww==; 5:qnRkvKDfHm6n0zgewdLHL5EK6608m1yUV7ctjy+SCqBO04PL6OElHhBvHoJVGaF1CgWjLnrQz62WlK4J6NgT1DtM1ns/U89W284wjLsENRqfNd8B/2CmWsUssrxu3mmmankp54sYnQ+zewx3g2pBl5mSvyM0zRBwqeuPnefDrlU=; 7:bF+AwbASlkyruRQaw7vIYGz9sknZ7Ql93aPBr7HrX70hS8l5XqtJ+xUa+bcb7k/zNwSUGkS6zBTxDnmqgnaaLW6v3likxeoG0c4MObCOmJ+3KzWydR+UcY+ijuVUTAZiPGTornD6b38etEVzwt/bRQ== x-ms-office365-filtering-correlation-id: 7f301e29-0faa-4b51-aeb3-08d640ec131e x-ms-office365-filtering-ht: Tenant x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600074)(711020)(4618075)(2017052603328)(7153060)(7193020); SRVR:AM4PR05MB3203; x-ms-traffictypediagnostic: AM4PR05MB3203: x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:; x-ms-exchange-senderadcheck: 1 x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(3231382)(944501410)(52105095)(93006095)(93001095)(10201501046)(3002001)(6055026)(148016)(149066)(150057)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(20161123562045)(20161123564045)(20161123560045)(201708071742011)(7699051)(76991095); SRVR:AM4PR05MB3203; BCL:0; PCL:0; RULEID:; SRVR:AM4PR05MB3203; x-forefront-prvs: 08444C7C87 x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(346002)(39860400002)(136003)(366004)(396003)(199004)(189003)(6636002)(11346002)(478600001)(446003)(2616005)(476003)(486006)(256004)(14444005)(386003)(6506007)(102836004)(26005)(99286004)(86362001)(3846002)(6116002)(14454004)(6512007)(316002)(25786009)(53936002)(97736004)(71190400001)(37006003)(4326008)(6862004)(71200400001)(186003)(107886003)(6436002)(54906003)(6486002)(5660300001)(2906002)(106356001)(36756003)(66066001)(105586002)(2900100001)(8936002)(52116002)(76176011)(81166006)(305945005)(81156014)(8676002)(68736007)(7736002); DIR:OUT; SFP:1101; SCL:1; SRVR:AM4PR05MB3203; H:AM4PR05MB3265.eurprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; received-spf: None (protection.outlook.com: mellanox.com does not designate permitted sender hosts) x-microsoft-antispam-message-info: c/6DqfQnUPrRaq6UE6CTZFm0xlVAdgrLAPXuy4knc6sGGAEE35DR8X1T4sQvK8S8ofh7HIR1OV6lt6z6g9egU4OC3AAPGgv5z/zqOzdc0z5nznWDz/WZKa9wwHLDxE0OByQzuRIVUB9kwcpKP62dVZNzvsQzNOKT+R4++F4IFKQMCgADjRiNto5GYyrL1IvNbvMtSt+vgJvPmZpwwJ58Qki93hQSrGSlX3u7eBmktKZmXitjtRXowfX6yUYKLctrFkMB2uu13dRim6foun02EH7Qy0C63jQMYddbCRVI5x2Zz+Io8rIn6Px8x5PEZf3J3Z7XUiWDCuhJZ+fim1c8u9g285cwiG31ar3GUXyhLeo= spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: Mellanox.com X-MS-Exchange-CrossTenant-Network-Message-Id: 7f301e29-0faa-4b51-aeb3-08d640ec131e X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Nov 2018 17:53:19.8502 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: a652971c-7d2e-4d9b-a6a4-d149256f461b X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR05MB3203 Subject: [dpdk-dev] [PATCH v4 07/13] net/mlx5: add VXLAN support to flow prepare routine X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Nov 2018 17:53:21 -0000 The e-switch Flow prepare function is updated to support VXLAN encapsulation/and decapsulation actions. The function calculates buffer size for Netlink message and Flow description structures, including optional ones for tunneling purposes. Suggested-by: Adrien Mazarguil Signed-off-by: Viacheslav Ovsiienko --- drivers/net/mlx5/mlx5_flow_tcf.c | 137 +++++++++++++++++++++++++++++++++++= +++- 1 file changed, 134 insertions(+), 3 deletions(-) diff --git a/drivers/net/mlx5/mlx5_flow_tcf.c b/drivers/net/mlx5/mlx5_flow_= tcf.c index 6299069..017f2bd 100644 --- a/drivers/net/mlx5/mlx5_flow_tcf.c +++ b/drivers/net/mlx5/mlx5_flow_tcf.c @@ -2422,7 +2422,7 @@ struct pedit_parser { case RTE_FLOW_ITEM_TYPE_IPV6: size +=3D SZ_NLATTR_TYPE_OF(uint16_t) + /* Ether type. */ SZ_NLATTR_TYPE_OF(uint8_t) + /* IP proto. */ - SZ_NLATTR_TYPE_OF(IPV6_ADDR_LEN) * 4; + SZ_NLATTR_DATA_OF(IPV6_ADDR_LEN) * 4; /* dst/src IP addr and mask. */ flags |=3D MLX5_FLOW_LAYER_OUTER_L3_IPV6; break; @@ -2438,6 +2438,10 @@ struct pedit_parser { /* dst/src port and mask. */ flags |=3D MLX5_FLOW_LAYER_OUTER_L4_TCP; break; + case RTE_FLOW_ITEM_TYPE_VXLAN: + size +=3D SZ_NLATTR_TYPE_OF(uint32_t); + flags |=3D MLX5_FLOW_LAYER_VXLAN; + break; default: DRV_LOG(WARNING, "unsupported item %p type %d," @@ -2451,6 +2455,69 @@ struct pedit_parser { } =20 /** + * Calculate size of memory to store the VXLAN encapsultion + * related items in the Netlink message buffer. Items list + * is specified by RTE_FLOW_ACTION_TYPE_VXLAN_ENCAP action. + * The item list should be validated. + * + * @param[in] action + * RTE_FLOW_ACTION_TYPE_VXLAN_ENCAP action object. + * List of pattern items to scan data from. + * + * @return + * The size the part of Netlink message buffer to store the + * VXLAN encapsulation item attributes. + */ +static int +flow_tcf_vxlan_encap_size(const struct rte_flow_action *action) +{ + const struct rte_flow_item *items; + int size =3D 0; + + assert(action->type =3D=3D RTE_FLOW_ACTION_TYPE_VXLAN_ENCAP); + assert(action->conf); + + items =3D ((const struct rte_flow_action_vxlan_encap *) + action->conf)->definition; + assert(items); + for (; items->type !=3D RTE_FLOW_ITEM_TYPE_END; items++) { + switch (items->type) { + case RTE_FLOW_ITEM_TYPE_VOID: + break; + case RTE_FLOW_ITEM_TYPE_ETH: + /* This item does not require message buffer. */ + break; + case RTE_FLOW_ITEM_TYPE_IPV4: + size +=3D SZ_NLATTR_DATA_OF(IPV4_ADDR_LEN) * 2; + break; + case RTE_FLOW_ITEM_TYPE_IPV6: + size +=3D SZ_NLATTR_DATA_OF(IPV6_ADDR_LEN) * 2; + break; + case RTE_FLOW_ITEM_TYPE_UDP: { + const struct rte_flow_item_udp *udp =3D items->mask; + + size +=3D SZ_NLATTR_TYPE_OF(uint16_t); + if (!udp || udp->hdr.src_port !=3D RTE_BE16(0x0000)) + size +=3D SZ_NLATTR_TYPE_OF(uint16_t); + break; + } + case RTE_FLOW_ITEM_TYPE_VXLAN: + size +=3D SZ_NLATTR_TYPE_OF(uint32_t); + break; + default: + assert(false); + DRV_LOG(WARNING, + "unsupported item %p type %d," + " items must be validated" + " before flow creation", + (const void *)items, items->type); + return 0; + } + } + return size; +} + +/** * Calculate maximum size of memory for flow actions of Linux TC flower an= d * extract specified actions. * @@ -2519,6 +2586,29 @@ struct pedit_parser { SZ_NLATTR_TYPE_OF(uint16_t) + /* VLAN ID. */ SZ_NLATTR_TYPE_OF(uint8_t); /* VLAN prio. */ break; + case RTE_FLOW_ACTION_TYPE_VXLAN_ENCAP: + size +=3D SZ_NLATTR_NEST + /* na_act_index. */ + SZ_NLATTR_STRZ_OF("tunnel_key") + + SZ_NLATTR_NEST + /* TCA_ACT_OPTIONS. */ + SZ_NLATTR_TYPE_OF(uint8_t); + size +=3D SZ_NLATTR_TYPE_OF(struct tc_tunnel_key); + size +=3D flow_tcf_vxlan_encap_size(actions) + + RTE_ALIGN_CEIL /* preceding encap params. */ + (sizeof(struct flow_tcf_vxlan_encap), + MNL_ALIGNTO); + flags |=3D MLX5_FLOW_ACTION_VXLAN_ENCAP; + break; + case RTE_FLOW_ACTION_TYPE_VXLAN_DECAP: + size +=3D SZ_NLATTR_NEST + /* na_act_index. */ + SZ_NLATTR_STRZ_OF("tunnel_key") + + SZ_NLATTR_NEST + /* TCA_ACT_OPTIONS. */ + SZ_NLATTR_TYPE_OF(uint8_t); + size +=3D SZ_NLATTR_TYPE_OF(struct tc_tunnel_key); + size +=3D RTE_ALIGN_CEIL /* preceding decap params. */ + (sizeof(struct flow_tcf_vxlan_decap), + MNL_ALIGNTO); + flags |=3D MLX5_FLOW_ACTION_VXLAN_DECAP; + break; case RTE_FLOW_ACTION_TYPE_SET_IPV4_SRC: case RTE_FLOW_ACTION_TYPE_SET_IPV4_DST: case RTE_FLOW_ACTION_TYPE_SET_IPV6_SRC: @@ -2594,12 +2684,15 @@ struct pedit_parser { uint64_t *item_flags, uint64_t *action_flags, struct rte_flow_error *error) { - size_t size =3D sizeof(struct mlx5_flow) + + size_t size =3D RTE_ALIGN_CEIL + (sizeof(struct mlx5_flow), + alignof(struct flow_tcf_tunnel_hdr)) + MNL_ALIGN(sizeof(struct nlmsghdr)) + MNL_ALIGN(sizeof(struct tcmsg)); struct mlx5_flow *dev_flow; struct nlmsghdr *nlh; struct tcmsg *tcm; + uint8_t *sp, *tun =3D NULL; =20 size +=3D flow_tcf_get_items_and_size(attr, items, item_flags); size +=3D flow_tcf_get_actions_and_size(actions, action_flags); @@ -2610,14 +2703,52 @@ struct pedit_parser { "not enough memory to create E-Switch flow"); return NULL; } - nlh =3D mnl_nlmsg_put_header((void *)(dev_flow + 1)); + sp =3D (uint8_t *)(dev_flow + 1); + if (*action_flags & MLX5_FLOW_ACTION_VXLAN_ENCAP) { + sp =3D RTE_PTR_ALIGN + (sp, alignof(struct flow_tcf_tunnel_hdr)); + tun =3D sp; + sp +=3D RTE_ALIGN_CEIL + (sizeof(struct flow_tcf_vxlan_encap), + MNL_ALIGNTO); +#ifndef NDEBUG + size -=3D RTE_ALIGN_CEIL + (sizeof(struct flow_tcf_vxlan_encap), + MNL_ALIGNTO); +#endif + } else if (*action_flags & MLX5_FLOW_ACTION_VXLAN_DECAP) { + sp =3D RTE_PTR_ALIGN + (sp, alignof(struct flow_tcf_tunnel_hdr)); + tun =3D sp; + sp +=3D RTE_ALIGN_CEIL + (sizeof(struct flow_tcf_vxlan_decap), + MNL_ALIGNTO); +#ifndef NDEBUG + size -=3D RTE_ALIGN_CEIL + (sizeof(struct flow_tcf_vxlan_decap), + MNL_ALIGNTO); +#endif + } else { + sp =3D RTE_PTR_ALIGN(sp, MNL_ALIGNTO); + } + nlh =3D mnl_nlmsg_put_header(sp); tcm =3D mnl_nlmsg_put_extra_header(nlh, sizeof(*tcm)); *dev_flow =3D (struct mlx5_flow){ .tcf =3D (struct mlx5_flow_tcf){ +#ifndef NDEBUG + .nlsize =3D size - RTE_ALIGN_CEIL + (sizeof(struct mlx5_flow), + alignof(struct flow_tcf_tunnel_hdr)), +#endif + .tunnel =3D (struct flow_tcf_tunnel_hdr *)tun, .nlh =3D nlh, .tcm =3D tcm, }, }; + if (*action_flags & MLX5_FLOW_ACTION_VXLAN_DECAP) + dev_flow->tcf.tunnel->type =3D FLOW_TCF_TUNACT_VXLAN_DECAP; + else if (*action_flags & MLX5_FLOW_ACTION_VXLAN_ENCAP) + dev_flow->tcf.tunnel->type =3D FLOW_TCF_TUNACT_VXLAN_ENCAP; /* * Generate a reasonably unique handle based on the address of the * target buffer. --=20 1.8.3.1