From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from EUR02-VE1-obe.outbound.protection.outlook.com (mail-eopbgr20070.outbound.protection.outlook.com [40.107.2.70]) by dpdk.org (Postfix) with ESMTP id B7CE65B1E for ; Sat, 3 Nov 2018 07:18:41 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Mellanox.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DAh0eKiBzCqPccaJI8j2H9RfndbG6OWeP9trJuBwPmk=; b=i9pJ+f1I2KWzdIUzjcs+1dw8A0DjrUmsPeI8VeMSU8jovZ39fJ/uM7ZmApnSorodDuCb5CJnea5eEvmmZiYObg62j4TuyKtjPPY8Tmsf7VsIzXLSVySi2lUEYHoUHgQhvyBQ+FWm5CzRjF8oDbnV8oM3B7WXv+X8kMKNEcVH4Wk= Received: from AM4PR05MB3265.eurprd05.prod.outlook.com (10.171.186.150) by AM4PR05MB3250.eurprd05.prod.outlook.com (10.171.186.147) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1294.21; Sat, 3 Nov 2018 06:18:40 +0000 Received: from AM4PR05MB3265.eurprd05.prod.outlook.com ([fe80::544b:a68d:e6a5:ba6e]) by AM4PR05MB3265.eurprd05.prod.outlook.com ([fe80::544b:a68d:e6a5:ba6e%2]) with mapi id 15.20.1294.027; Sat, 3 Nov 2018 06:18:40 +0000 From: Slava Ovsiienko To: Shahaf Shuler CC: "dev@dpdk.org" , Yongseok Koh , Slava Ovsiienko Thread-Topic: [PATCH v5 07/13] net/mlx5: add VXLAN support to flow prepare routine Thread-Index: AQHUcz0QlWsgUMIv/0q35gN+UHUk6A== Date: Sat, 3 Nov 2018 06:18:40 +0000 Message-ID: <1541225876-8817-8-git-send-email-viacheslavo@mellanox.com> References: <1541181152-15788-2-git-send-email-viacheslavo@mellanox.com> <1541225876-8817-1-git-send-email-viacheslavo@mellanox.com> In-Reply-To: <1541225876-8817-1-git-send-email-viacheslavo@mellanox.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-clientproxiedby: CWLP123CA0088.GBRP123.PROD.OUTLOOK.COM (2603:10a6:401:5b::28) To AM4PR05MB3265.eurprd05.prod.outlook.com (2603:10a6:205:4::22) authentication-results: spf=none (sender IP is ) smtp.mailfrom=viacheslavo@mellanox.com; x-ms-exchange-messagesentrepresentingtype: 1 x-originating-ip: [37.142.13.130] x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1; AM4PR05MB3250; 6:Tmy+edMsRK9+JeAVy5kh51zVVzF6Lyb3eW+h4Ph1QTk9ld9BQPQ7LqfoFLIa4RFTdypSYudVbvg3jKZ5vF2HNt55chuPWjHSahwJQxTVh4mPy6XX+TOKQJugRMTLBWYqMMcEzFB6rkEzYZ/HwG1gpwOr0l1ly+HoVqPfDvtGxjFO/PqZno4zHd2RvG6fsbuE5JghHbHo3Xtfe4cL+KdTUb6NzmBKLG1TjgWE/m5VOcFO59jWyE3YGSo4PpGFBsPwtdTQ6NJi4KgKjXsJVpO6Fp0GRdTDFWfQm63hfen0M7W8CaqY2weAkH9ZViiY5/5RNjIsn8QskjzLnmbBubtQJ+f49F3zEjvvMo5lE0kDj3+l4x6pcInfpyJlFq0KRZN3YDf4p5V0xowxsCb4yf7GEky/GJrT0HMPWZA1z2DKSSnrgZLm7HxBgdsWO3wgsorEysRjeyTr6fPbbdOiOP5OrQ==; 5:6y39CyroyJljXrTILBy9OvizDNd8tIwTBqqVBERmEsUjKQJXTFTAAhbVgJssgdabUKgJZthEr4paCUhpTZX7FBuPNXsxPf1CaeenTQhhWf5r3HvGI/LWbx5ok8bnYgnguRj98NAVJdXvRA4lRiFhGz3YqrW3tbXko2Ti1WKAdt4=; 7:xvFis4kdGg1wBrxYUa9XarQRGP7BFP2ZSajtUWAFKTAk7L6agTS44AG2CnIFxevETonF6nAYHcLQmcejvki6BMm8Kw9crS7qJiu2RMP8z372Xn40oE1j9WZBG5b6u23ZK7U1Tpyk3MPNcEzK5S+iag== x-ms-office365-filtering-correlation-id: b6a0903d-3bd8-4b48-7aed-08d6415432ba x-ms-office365-filtering-ht: Tenant x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989299)(5600074)(711020)(4618075)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7153060)(7193020); SRVR:AM4PR05MB3250; x-ms-traffictypediagnostic: AM4PR05MB3250: x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:; x-ms-exchange-senderadcheck: 1 x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(3231382)(944501410)(52105095)(3002001)(10201501046)(93006095)(93001095)(6055026)(148016)(149066)(150057)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(20161123560045)(20161123564045)(20161123558120)(201708071742011)(7699051)(76991095); SRVR:AM4PR05MB3250; BCL:0; PCL:0; RULEID:; SRVR:AM4PR05MB3250; x-forefront-prvs: 08457955C4 x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(346002)(376002)(366004)(39860400002)(136003)(396003)(189003)(199004)(81156014)(66066001)(107886003)(6436002)(71200400001)(71190400001)(6636002)(106356001)(68736007)(25786009)(316002)(52116002)(3846002)(6486002)(6116002)(4326008)(76176011)(97736004)(6862004)(486006)(476003)(478600001)(11346002)(305945005)(37006003)(5660300001)(7736002)(105586002)(2900100001)(26005)(2906002)(99286004)(186003)(2616005)(53936002)(446003)(6512007)(6506007)(8676002)(256004)(8936002)(386003)(14454004)(14444005)(36756003)(102836004)(81166006)(86362001)(54906003); DIR:OUT; SFP:1101; SCL:1; SRVR:AM4PR05MB3250; H:AM4PR05MB3265.eurprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; received-spf: None (protection.outlook.com: mellanox.com does not designate permitted sender hosts) x-microsoft-antispam-message-info: mT9MGcdWlEfVs8vdM39U7CQrFgpBlbSQlSroxWVcGNMXz8QcWZ7O+J8H+vKODexk4yB6nRir6NVXsKJRhv3T8XQfkoa7n0OPh12FKX83XmXeCZwJm4FNn56YXP/TZ4nCqXK9cUZUjvVKj0NxxlBMXao/kUDqSgAHd2I0d+DcSo0E5uBbw82xfvOhAOupoYcNzmXxghX+mMDmNJMWQmo654CTa/QqyiLvgDrSnMvqxkefbWipZFr5CUTfU/7kBZYVFRuf8QFDmyS5vL5HmjWk7UIQDnVz9UWwyrkL1ycxw36mGJanELMOiXBkfIx69NUDKZ87XC9VByIdrCcy48fH40StC88+z7XCPMBP/hvGmaw= spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: Mellanox.com X-MS-Exchange-CrossTenant-Network-Message-Id: b6a0903d-3bd8-4b48-7aed-08d6415432ba X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Nov 2018 06:18:40.5355 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: a652971c-7d2e-4d9b-a6a4-d149256f461b X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR05MB3250 Subject: [dpdk-dev] [PATCH v5 07/13] net/mlx5: add VXLAN support to flow prepare routine X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 03 Nov 2018 06:18:42 -0000 The e-switch Flow prepare function is updated to support VXLAN encapsulation/and decapsulation actions. The function calculates buffer size for Netlink message and Flow description structures, including optional ones for tunneling purposes. Suggested-by: Adrien Mazarguil Signed-off-by: Viacheslav Ovsiienko Acked-by: Yongseok Koh --- drivers/net/mlx5/mlx5_flow_tcf.c | 137 +++++++++++++++++++++++++++++++++++= +++- 1 file changed, 134 insertions(+), 3 deletions(-) diff --git a/drivers/net/mlx5/mlx5_flow_tcf.c b/drivers/net/mlx5/mlx5_flow_= tcf.c index 6299069..017f2bd 100644 --- a/drivers/net/mlx5/mlx5_flow_tcf.c +++ b/drivers/net/mlx5/mlx5_flow_tcf.c @@ -2422,7 +2422,7 @@ struct pedit_parser { case RTE_FLOW_ITEM_TYPE_IPV6: size +=3D SZ_NLATTR_TYPE_OF(uint16_t) + /* Ether type. */ SZ_NLATTR_TYPE_OF(uint8_t) + /* IP proto. */ - SZ_NLATTR_TYPE_OF(IPV6_ADDR_LEN) * 4; + SZ_NLATTR_DATA_OF(IPV6_ADDR_LEN) * 4; /* dst/src IP addr and mask. */ flags |=3D MLX5_FLOW_LAYER_OUTER_L3_IPV6; break; @@ -2438,6 +2438,10 @@ struct pedit_parser { /* dst/src port and mask. */ flags |=3D MLX5_FLOW_LAYER_OUTER_L4_TCP; break; + case RTE_FLOW_ITEM_TYPE_VXLAN: + size +=3D SZ_NLATTR_TYPE_OF(uint32_t); + flags |=3D MLX5_FLOW_LAYER_VXLAN; + break; default: DRV_LOG(WARNING, "unsupported item %p type %d," @@ -2451,6 +2455,69 @@ struct pedit_parser { } =20 /** + * Calculate size of memory to store the VXLAN encapsultion + * related items in the Netlink message buffer. Items list + * is specified by RTE_FLOW_ACTION_TYPE_VXLAN_ENCAP action. + * The item list should be validated. + * + * @param[in] action + * RTE_FLOW_ACTION_TYPE_VXLAN_ENCAP action object. + * List of pattern items to scan data from. + * + * @return + * The size the part of Netlink message buffer to store the + * VXLAN encapsulation item attributes. + */ +static int +flow_tcf_vxlan_encap_size(const struct rte_flow_action *action) +{ + const struct rte_flow_item *items; + int size =3D 0; + + assert(action->type =3D=3D RTE_FLOW_ACTION_TYPE_VXLAN_ENCAP); + assert(action->conf); + + items =3D ((const struct rte_flow_action_vxlan_encap *) + action->conf)->definition; + assert(items); + for (; items->type !=3D RTE_FLOW_ITEM_TYPE_END; items++) { + switch (items->type) { + case RTE_FLOW_ITEM_TYPE_VOID: + break; + case RTE_FLOW_ITEM_TYPE_ETH: + /* This item does not require message buffer. */ + break; + case RTE_FLOW_ITEM_TYPE_IPV4: + size +=3D SZ_NLATTR_DATA_OF(IPV4_ADDR_LEN) * 2; + break; + case RTE_FLOW_ITEM_TYPE_IPV6: + size +=3D SZ_NLATTR_DATA_OF(IPV6_ADDR_LEN) * 2; + break; + case RTE_FLOW_ITEM_TYPE_UDP: { + const struct rte_flow_item_udp *udp =3D items->mask; + + size +=3D SZ_NLATTR_TYPE_OF(uint16_t); + if (!udp || udp->hdr.src_port !=3D RTE_BE16(0x0000)) + size +=3D SZ_NLATTR_TYPE_OF(uint16_t); + break; + } + case RTE_FLOW_ITEM_TYPE_VXLAN: + size +=3D SZ_NLATTR_TYPE_OF(uint32_t); + break; + default: + assert(false); + DRV_LOG(WARNING, + "unsupported item %p type %d," + " items must be validated" + " before flow creation", + (const void *)items, items->type); + return 0; + } + } + return size; +} + +/** * Calculate maximum size of memory for flow actions of Linux TC flower an= d * extract specified actions. * @@ -2519,6 +2586,29 @@ struct pedit_parser { SZ_NLATTR_TYPE_OF(uint16_t) + /* VLAN ID. */ SZ_NLATTR_TYPE_OF(uint8_t); /* VLAN prio. */ break; + case RTE_FLOW_ACTION_TYPE_VXLAN_ENCAP: + size +=3D SZ_NLATTR_NEST + /* na_act_index. */ + SZ_NLATTR_STRZ_OF("tunnel_key") + + SZ_NLATTR_NEST + /* TCA_ACT_OPTIONS. */ + SZ_NLATTR_TYPE_OF(uint8_t); + size +=3D SZ_NLATTR_TYPE_OF(struct tc_tunnel_key); + size +=3D flow_tcf_vxlan_encap_size(actions) + + RTE_ALIGN_CEIL /* preceding encap params. */ + (sizeof(struct flow_tcf_vxlan_encap), + MNL_ALIGNTO); + flags |=3D MLX5_FLOW_ACTION_VXLAN_ENCAP; + break; + case RTE_FLOW_ACTION_TYPE_VXLAN_DECAP: + size +=3D SZ_NLATTR_NEST + /* na_act_index. */ + SZ_NLATTR_STRZ_OF("tunnel_key") + + SZ_NLATTR_NEST + /* TCA_ACT_OPTIONS. */ + SZ_NLATTR_TYPE_OF(uint8_t); + size +=3D SZ_NLATTR_TYPE_OF(struct tc_tunnel_key); + size +=3D RTE_ALIGN_CEIL /* preceding decap params. */ + (sizeof(struct flow_tcf_vxlan_decap), + MNL_ALIGNTO); + flags |=3D MLX5_FLOW_ACTION_VXLAN_DECAP; + break; case RTE_FLOW_ACTION_TYPE_SET_IPV4_SRC: case RTE_FLOW_ACTION_TYPE_SET_IPV4_DST: case RTE_FLOW_ACTION_TYPE_SET_IPV6_SRC: @@ -2594,12 +2684,15 @@ struct pedit_parser { uint64_t *item_flags, uint64_t *action_flags, struct rte_flow_error *error) { - size_t size =3D sizeof(struct mlx5_flow) + + size_t size =3D RTE_ALIGN_CEIL + (sizeof(struct mlx5_flow), + alignof(struct flow_tcf_tunnel_hdr)) + MNL_ALIGN(sizeof(struct nlmsghdr)) + MNL_ALIGN(sizeof(struct tcmsg)); struct mlx5_flow *dev_flow; struct nlmsghdr *nlh; struct tcmsg *tcm; + uint8_t *sp, *tun =3D NULL; =20 size +=3D flow_tcf_get_items_and_size(attr, items, item_flags); size +=3D flow_tcf_get_actions_and_size(actions, action_flags); @@ -2610,14 +2703,52 @@ struct pedit_parser { "not enough memory to create E-Switch flow"); return NULL; } - nlh =3D mnl_nlmsg_put_header((void *)(dev_flow + 1)); + sp =3D (uint8_t *)(dev_flow + 1); + if (*action_flags & MLX5_FLOW_ACTION_VXLAN_ENCAP) { + sp =3D RTE_PTR_ALIGN + (sp, alignof(struct flow_tcf_tunnel_hdr)); + tun =3D sp; + sp +=3D RTE_ALIGN_CEIL + (sizeof(struct flow_tcf_vxlan_encap), + MNL_ALIGNTO); +#ifndef NDEBUG + size -=3D RTE_ALIGN_CEIL + (sizeof(struct flow_tcf_vxlan_encap), + MNL_ALIGNTO); +#endif + } else if (*action_flags & MLX5_FLOW_ACTION_VXLAN_DECAP) { + sp =3D RTE_PTR_ALIGN + (sp, alignof(struct flow_tcf_tunnel_hdr)); + tun =3D sp; + sp +=3D RTE_ALIGN_CEIL + (sizeof(struct flow_tcf_vxlan_decap), + MNL_ALIGNTO); +#ifndef NDEBUG + size -=3D RTE_ALIGN_CEIL + (sizeof(struct flow_tcf_vxlan_decap), + MNL_ALIGNTO); +#endif + } else { + sp =3D RTE_PTR_ALIGN(sp, MNL_ALIGNTO); + } + nlh =3D mnl_nlmsg_put_header(sp); tcm =3D mnl_nlmsg_put_extra_header(nlh, sizeof(*tcm)); *dev_flow =3D (struct mlx5_flow){ .tcf =3D (struct mlx5_flow_tcf){ +#ifndef NDEBUG + .nlsize =3D size - RTE_ALIGN_CEIL + (sizeof(struct mlx5_flow), + alignof(struct flow_tcf_tunnel_hdr)), +#endif + .tunnel =3D (struct flow_tcf_tunnel_hdr *)tun, .nlh =3D nlh, .tcm =3D tcm, }, }; + if (*action_flags & MLX5_FLOW_ACTION_VXLAN_DECAP) + dev_flow->tcf.tunnel->type =3D FLOW_TCF_TUNACT_VXLAN_DECAP; + else if (*action_flags & MLX5_FLOW_ACTION_VXLAN_ENCAP) + dev_flow->tcf.tunnel->type =3D FLOW_TCF_TUNACT_VXLAN_ENCAP; /* * Generate a reasonably unique handle based on the address of the * target buffer. --=20 1.8.3.1