Merge branch 'nfp-extend-match-and-action'
Simon Horman says: ==================== nfp: extend match and action for flower offload Pieter says: This series extends flower offload match and action capabilities. It specifically adds offload capabilities for matching on MPLS, TTL, TOS and flow label. Furthermore offload capabilities for action have been expanded to include set ethernet, ipv4, ipv6, tcp and udp headers. ==================== Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
commit
c6a157525b
|
@ -36,6 +36,7 @@
|
|||
#include <net/switchdev.h>
|
||||
#include <net/tc_act/tc_gact.h>
|
||||
#include <net/tc_act/tc_mirred.h>
|
||||
#include <net/tc_act/tc_pedit.h>
|
||||
#include <net/tc_act/tc_vlan.h>
|
||||
#include <net/tc_act/tc_tunnel_key.h>
|
||||
|
||||
|
@ -223,6 +224,247 @@ nfp_fl_set_vxlan(struct nfp_fl_set_vxlan *set_vxlan,
|
|||
return 0;
|
||||
}
|
||||
|
||||
static void nfp_fl_set_helper32(u32 value, u32 mask, u8 *p_exact, u8 *p_mask)
|
||||
{
|
||||
u32 oldvalue = get_unaligned((u32 *)p_exact);
|
||||
u32 oldmask = get_unaligned((u32 *)p_mask);
|
||||
|
||||
value &= mask;
|
||||
value |= oldvalue & ~mask;
|
||||
|
||||
put_unaligned(oldmask | mask, (u32 *)p_mask);
|
||||
put_unaligned(value, (u32 *)p_exact);
|
||||
}
|
||||
|
||||
static int
|
||||
nfp_fl_set_eth(const struct tc_action *action, int idx, u32 off,
|
||||
struct nfp_fl_set_eth *set_eth)
|
||||
{
|
||||
u16 tmp_set_eth_op;
|
||||
u32 exact, mask;
|
||||
|
||||
if (off + 4 > ETH_ALEN * 2)
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
mask = ~tcf_pedit_mask(action, idx);
|
||||
exact = tcf_pedit_val(action, idx);
|
||||
|
||||
if (exact & ~mask)
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
nfp_fl_set_helper32(exact, mask, &set_eth->eth_addr_val[off],
|
||||
&set_eth->eth_addr_mask[off]);
|
||||
|
||||
set_eth->reserved = cpu_to_be16(0);
|
||||
tmp_set_eth_op = FIELD_PREP(NFP_FL_ACT_LEN_LW,
|
||||
sizeof(*set_eth) >> NFP_FL_LW_SIZ) |
|
||||
FIELD_PREP(NFP_FL_ACT_JMP_ID,
|
||||
NFP_FL_ACTION_OPCODE_SET_ETHERNET);
|
||||
set_eth->a_op = cpu_to_be16(tmp_set_eth_op);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int
|
||||
nfp_fl_set_ip4(const struct tc_action *action, int idx, u32 off,
|
||||
struct nfp_fl_set_ip4_addrs *set_ip_addr)
|
||||
{
|
||||
u16 tmp_set_ipv4_op;
|
||||
__be32 exact, mask;
|
||||
|
||||
/* We are expecting tcf_pedit to return a big endian value */
|
||||
mask = (__force __be32)~tcf_pedit_mask(action, idx);
|
||||
exact = (__force __be32)tcf_pedit_val(action, idx);
|
||||
|
||||
if (exact & ~mask)
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
switch (off) {
|
||||
case offsetof(struct iphdr, daddr):
|
||||
set_ip_addr->ipv4_dst_mask = mask;
|
||||
set_ip_addr->ipv4_dst = exact;
|
||||
break;
|
||||
case offsetof(struct iphdr, saddr):
|
||||
set_ip_addr->ipv4_src_mask = mask;
|
||||
set_ip_addr->ipv4_src = exact;
|
||||
break;
|
||||
default:
|
||||
return -EOPNOTSUPP;
|
||||
}
|
||||
|
||||
set_ip_addr->reserved = cpu_to_be16(0);
|
||||
tmp_set_ipv4_op = FIELD_PREP(NFP_FL_ACT_LEN_LW,
|
||||
sizeof(*set_ip_addr) >> NFP_FL_LW_SIZ) |
|
||||
FIELD_PREP(NFP_FL_ACT_JMP_ID,
|
||||
NFP_FL_ACTION_OPCODE_SET_IPV4_ADDRS);
|
||||
set_ip_addr->a_op = cpu_to_be16(tmp_set_ipv4_op);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static void
|
||||
nfp_fl_set_ip6_helper(int opcode_tag, int idx, __be32 exact, __be32 mask,
|
||||
struct nfp_fl_set_ipv6_addr *ip6)
|
||||
{
|
||||
u16 tmp_set_op;
|
||||
|
||||
ip6->ipv6[idx % 4].mask = mask;
|
||||
ip6->ipv6[idx % 4].exact = exact;
|
||||
|
||||
ip6->reserved = cpu_to_be16(0);
|
||||
tmp_set_op = FIELD_PREP(NFP_FL_ACT_LEN_LW, sizeof(*ip6) >>
|
||||
NFP_FL_LW_SIZ) |
|
||||
FIELD_PREP(NFP_FL_ACT_JMP_ID, opcode_tag);
|
||||
ip6->a_op = cpu_to_be16(tmp_set_op);
|
||||
}
|
||||
|
||||
static int
|
||||
nfp_fl_set_ip6(const struct tc_action *action, int idx, u32 off,
|
||||
struct nfp_fl_set_ipv6_addr *ip_dst,
|
||||
struct nfp_fl_set_ipv6_addr *ip_src)
|
||||
{
|
||||
__be32 exact, mask;
|
||||
|
||||
/* We are expecting tcf_pedit to return a big endian value */
|
||||
mask = (__force __be32)~tcf_pedit_mask(action, idx);
|
||||
exact = (__force __be32)tcf_pedit_val(action, idx);
|
||||
|
||||
if (exact & ~mask)
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
if (off < offsetof(struct ipv6hdr, saddr))
|
||||
return -EOPNOTSUPP;
|
||||
else if (off < offsetof(struct ipv6hdr, daddr))
|
||||
nfp_fl_set_ip6_helper(NFP_FL_ACTION_OPCODE_SET_IPV6_SRC, idx,
|
||||
exact, mask, ip_src);
|
||||
else if (off < offsetof(struct ipv6hdr, daddr) +
|
||||
sizeof(struct in6_addr))
|
||||
nfp_fl_set_ip6_helper(NFP_FL_ACTION_OPCODE_SET_IPV6_DST, idx,
|
||||
exact, mask, ip_dst);
|
||||
else
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int
|
||||
nfp_fl_set_tport(const struct tc_action *action, int idx, u32 off,
|
||||
struct nfp_fl_set_tport *set_tport, int opcode)
|
||||
{
|
||||
u32 exact, mask;
|
||||
u16 tmp_set_op;
|
||||
|
||||
if (off)
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
mask = ~tcf_pedit_mask(action, idx);
|
||||
exact = tcf_pedit_val(action, idx);
|
||||
|
||||
if (exact & ~mask)
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
nfp_fl_set_helper32(exact, mask, set_tport->tp_port_val,
|
||||
set_tport->tp_port_mask);
|
||||
|
||||
set_tport->reserved = cpu_to_be16(0);
|
||||
tmp_set_op = FIELD_PREP(NFP_FL_ACT_LEN_LW,
|
||||
sizeof(*set_tport) >> NFP_FL_LW_SIZ);
|
||||
tmp_set_op |= FIELD_PREP(NFP_FL_ACT_JMP_ID, opcode);
|
||||
set_tport->a_op = cpu_to_be16(tmp_set_op);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int
|
||||
nfp_fl_pedit(const struct tc_action *action, char *nfp_action, int *a_len)
|
||||
{
|
||||
struct nfp_fl_set_ipv6_addr set_ip6_dst, set_ip6_src;
|
||||
struct nfp_fl_set_ip4_addrs set_ip_addr;
|
||||
struct nfp_fl_set_tport set_tport;
|
||||
struct nfp_fl_set_eth set_eth;
|
||||
enum pedit_header_type htype;
|
||||
int idx, nkeys, err;
|
||||
size_t act_size;
|
||||
u32 offset, cmd;
|
||||
|
||||
memset(&set_ip6_dst, 0, sizeof(set_ip6_dst));
|
||||
memset(&set_ip6_src, 0, sizeof(set_ip6_src));
|
||||
memset(&set_ip_addr, 0, sizeof(set_ip_addr));
|
||||
memset(&set_tport, 0, sizeof(set_tport));
|
||||
memset(&set_eth, 0, sizeof(set_eth));
|
||||
nkeys = tcf_pedit_nkeys(action);
|
||||
|
||||
for (idx = 0; idx < nkeys; idx++) {
|
||||
cmd = tcf_pedit_cmd(action, idx);
|
||||
htype = tcf_pedit_htype(action, idx);
|
||||
offset = tcf_pedit_offset(action, idx);
|
||||
|
||||
if (cmd != TCA_PEDIT_KEY_EX_CMD_SET)
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
switch (htype) {
|
||||
case TCA_PEDIT_KEY_EX_HDR_TYPE_ETH:
|
||||
err = nfp_fl_set_eth(action, idx, offset, &set_eth);
|
||||
break;
|
||||
case TCA_PEDIT_KEY_EX_HDR_TYPE_IP4:
|
||||
err = nfp_fl_set_ip4(action, idx, offset, &set_ip_addr);
|
||||
break;
|
||||
case TCA_PEDIT_KEY_EX_HDR_TYPE_IP6:
|
||||
err = nfp_fl_set_ip6(action, idx, offset, &set_ip6_dst,
|
||||
&set_ip6_src);
|
||||
break;
|
||||
case TCA_PEDIT_KEY_EX_HDR_TYPE_TCP:
|
||||
err = nfp_fl_set_tport(action, idx, offset, &set_tport,
|
||||
NFP_FL_ACTION_OPCODE_SET_TCP);
|
||||
break;
|
||||
case TCA_PEDIT_KEY_EX_HDR_TYPE_UDP:
|
||||
err = nfp_fl_set_tport(action, idx, offset, &set_tport,
|
||||
NFP_FL_ACTION_OPCODE_SET_UDP);
|
||||
break;
|
||||
default:
|
||||
return -EOPNOTSUPP;
|
||||
}
|
||||
if (err)
|
||||
return err;
|
||||
}
|
||||
|
||||
if (set_eth.a_op) {
|
||||
act_size = sizeof(set_eth);
|
||||
memcpy(nfp_action, &set_eth, act_size);
|
||||
*a_len += act_size;
|
||||
} else if (set_ip_addr.a_op) {
|
||||
act_size = sizeof(set_ip_addr);
|
||||
memcpy(nfp_action, &set_ip_addr, act_size);
|
||||
*a_len += act_size;
|
||||
} else if (set_ip6_dst.a_op && set_ip6_src.a_op) {
|
||||
/* TC compiles set src and dst IPv6 address as a single action,
|
||||
* the hardware requires this to be 2 separate actions.
|
||||
*/
|
||||
act_size = sizeof(set_ip6_src);
|
||||
memcpy(nfp_action, &set_ip6_src, act_size);
|
||||
*a_len += act_size;
|
||||
|
||||
act_size = sizeof(set_ip6_dst);
|
||||
memcpy(&nfp_action[sizeof(set_ip6_src)], &set_ip6_dst,
|
||||
act_size);
|
||||
*a_len += act_size;
|
||||
} else if (set_ip6_dst.a_op) {
|
||||
act_size = sizeof(set_ip6_dst);
|
||||
memcpy(nfp_action, &set_ip6_dst, act_size);
|
||||
*a_len += act_size;
|
||||
} else if (set_ip6_src.a_op) {
|
||||
act_size = sizeof(set_ip6_src);
|
||||
memcpy(nfp_action, &set_ip6_src, act_size);
|
||||
*a_len += act_size;
|
||||
} else if (set_tport.a_op) {
|
||||
act_size = sizeof(set_tport);
|
||||
memcpy(nfp_action, &set_tport, act_size);
|
||||
*a_len += act_size;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int
|
||||
nfp_flower_loop_action(const struct tc_action *a,
|
||||
struct nfp_fl_payload *nfp_fl, int *a_len,
|
||||
|
@ -301,6 +543,9 @@ nfp_flower_loop_action(const struct tc_action *a,
|
|||
} else if (is_tcf_tunnel_release(a)) {
|
||||
/* Tunnel decap is handled by default so accept action. */
|
||||
return 0;
|
||||
} else if (is_tcf_pedit(a)) {
|
||||
if (nfp_fl_pedit(a, &nfp_fl->action_data[*a_len], a_len))
|
||||
return -EOPNOTSUPP;
|
||||
} else {
|
||||
/* Currently we do not handle any other actions. */
|
||||
return -EOPNOTSUPP;
|
||||
|
|
|
@ -57,6 +57,11 @@
|
|||
#define NFP_FLOWER_MASK_VLAN_CFI BIT(12)
|
||||
#define NFP_FLOWER_MASK_VLAN_VID GENMASK(11, 0)
|
||||
|
||||
#define NFP_FLOWER_MASK_MPLS_LB GENMASK(31, 12)
|
||||
#define NFP_FLOWER_MASK_MPLS_TC GENMASK(11, 9)
|
||||
#define NFP_FLOWER_MASK_MPLS_BOS BIT(8)
|
||||
#define NFP_FLOWER_MASK_MPLS_Q BIT(0)
|
||||
|
||||
#define NFP_FL_SC_ACT_DROP 0x80000000
|
||||
#define NFP_FL_SC_ACT_USER 0x7D000000
|
||||
#define NFP_FL_SC_ACT_POPV 0x6A000000
|
||||
|
@ -72,6 +77,12 @@
|
|||
#define NFP_FL_ACTION_OPCODE_PUSH_VLAN 1
|
||||
#define NFP_FL_ACTION_OPCODE_POP_VLAN 2
|
||||
#define NFP_FL_ACTION_OPCODE_SET_IPV4_TUNNEL 6
|
||||
#define NFP_FL_ACTION_OPCODE_SET_ETHERNET 7
|
||||
#define NFP_FL_ACTION_OPCODE_SET_IPV4_ADDRS 9
|
||||
#define NFP_FL_ACTION_OPCODE_SET_IPV6_SRC 11
|
||||
#define NFP_FL_ACTION_OPCODE_SET_IPV6_DST 12
|
||||
#define NFP_FL_ACTION_OPCODE_SET_UDP 14
|
||||
#define NFP_FL_ACTION_OPCODE_SET_TCP 15
|
||||
#define NFP_FL_ACTION_OPCODE_PRE_TUNNEL 17
|
||||
#define NFP_FL_ACTION_OPCODE_NUM 32
|
||||
|
||||
|
@ -102,6 +113,38 @@ enum nfp_flower_tun_type {
|
|||
NFP_FL_TUNNEL_VXLAN = 2,
|
||||
};
|
||||
|
||||
struct nfp_fl_set_eth {
|
||||
__be16 a_op;
|
||||
__be16 reserved;
|
||||
u8 eth_addr_mask[ETH_ALEN * 2];
|
||||
u8 eth_addr_val[ETH_ALEN * 2];
|
||||
};
|
||||
|
||||
struct nfp_fl_set_ip4_addrs {
|
||||
__be16 a_op;
|
||||
__be16 reserved;
|
||||
__be32 ipv4_src_mask;
|
||||
__be32 ipv4_src;
|
||||
__be32 ipv4_dst_mask;
|
||||
__be32 ipv4_dst;
|
||||
};
|
||||
|
||||
struct nfp_fl_set_ipv6_addr {
|
||||
__be16 a_op;
|
||||
__be16 reserved;
|
||||
struct {
|
||||
__be32 mask;
|
||||
__be32 exact;
|
||||
} ipv6[4];
|
||||
};
|
||||
|
||||
struct nfp_fl_set_tport {
|
||||
__be16 a_op;
|
||||
__be16 reserved;
|
||||
u8 tp_port_mask[4];
|
||||
u8 tp_port_val[4];
|
||||
};
|
||||
|
||||
struct nfp_fl_output {
|
||||
__be16 a_op;
|
||||
__be16 flags;
|
||||
|
|
|
@ -111,8 +111,21 @@ nfp_flower_compile_mac(struct nfp_flower_mac_mpls *frame,
|
|||
ether_addr_copy(frame->mac_src, &addr->src[0]);
|
||||
}
|
||||
|
||||
if (mask_version)
|
||||
frame->mpls_lse = cpu_to_be32(~0);
|
||||
if (dissector_uses_key(flow->dissector, FLOW_DISSECTOR_KEY_MPLS)) {
|
||||
struct flow_dissector_key_mpls *mpls;
|
||||
u32 t_mpls;
|
||||
|
||||
mpls = skb_flow_dissector_target(flow->dissector,
|
||||
FLOW_DISSECTOR_KEY_MPLS,
|
||||
target);
|
||||
|
||||
t_mpls = FIELD_PREP(NFP_FLOWER_MASK_MPLS_LB, mpls->mpls_label) |
|
||||
FIELD_PREP(NFP_FLOWER_MASK_MPLS_TC, mpls->mpls_tc) |
|
||||
FIELD_PREP(NFP_FLOWER_MASK_MPLS_BOS, mpls->mpls_bos) |
|
||||
NFP_FLOWER_MASK_MPLS_Q;
|
||||
|
||||
frame->mpls_lse = cpu_to_be32(t_mpls);
|
||||
}
|
||||
}
|
||||
|
||||
static void
|
||||
|
@ -143,7 +156,6 @@ nfp_flower_compile_ipv4(struct nfp_flower_ipv4 *frame,
|
|||
struct flow_dissector_key_ipv4_addrs *addr;
|
||||
struct flow_dissector_key_basic *basic;
|
||||
|
||||
/* Wildcard TOS/TTL for now. */
|
||||
memset(frame, 0, sizeof(struct nfp_flower_ipv4));
|
||||
|
||||
if (dissector_uses_key(flow->dissector,
|
||||
|
@ -161,6 +173,16 @@ nfp_flower_compile_ipv4(struct nfp_flower_ipv4 *frame,
|
|||
target);
|
||||
frame->proto = basic->ip_proto;
|
||||
}
|
||||
|
||||
if (dissector_uses_key(flow->dissector, FLOW_DISSECTOR_KEY_IP)) {
|
||||
struct flow_dissector_key_ip *flow_ip;
|
||||
|
||||
flow_ip = skb_flow_dissector_target(flow->dissector,
|
||||
FLOW_DISSECTOR_KEY_IP,
|
||||
target);
|
||||
frame->tos = flow_ip->tos;
|
||||
frame->ttl = flow_ip->ttl;
|
||||
}
|
||||
}
|
||||
|
||||
static void
|
||||
|
@ -172,7 +194,6 @@ nfp_flower_compile_ipv6(struct nfp_flower_ipv6 *frame,
|
|||
struct flow_dissector_key_ipv6_addrs *addr;
|
||||
struct flow_dissector_key_basic *basic;
|
||||
|
||||
/* Wildcard LABEL/TOS/TTL for now. */
|
||||
memset(frame, 0, sizeof(struct nfp_flower_ipv6));
|
||||
|
||||
if (dissector_uses_key(flow->dissector,
|
||||
|
@ -190,6 +211,16 @@ nfp_flower_compile_ipv6(struct nfp_flower_ipv6 *frame,
|
|||
target);
|
||||
frame->proto = basic->ip_proto;
|
||||
}
|
||||
|
||||
if (dissector_uses_key(flow->dissector, FLOW_DISSECTOR_KEY_IP)) {
|
||||
struct flow_dissector_key_ip *flow_ip;
|
||||
|
||||
flow_ip = skb_flow_dissector_target(flow->dissector,
|
||||
FLOW_DISSECTOR_KEY_IP,
|
||||
target);
|
||||
frame->tos = flow_ip->tos;
|
||||
frame->ttl = flow_ip->ttl;
|
||||
}
|
||||
}
|
||||
|
||||
static void
|
||||
|
|
|
@ -57,6 +57,7 @@
|
|||
BIT(FLOW_DISSECTOR_KEY_ENC_IPV6_ADDRS) | \
|
||||
BIT(FLOW_DISSECTOR_KEY_ENC_CONTROL) | \
|
||||
BIT(FLOW_DISSECTOR_KEY_ENC_PORTS) | \
|
||||
BIT(FLOW_DISSECTOR_KEY_MPLS) | \
|
||||
BIT(FLOW_DISSECTOR_KEY_IP))
|
||||
|
||||
#define NFP_FLOWER_WHITELIST_TUN_DISSECTOR \
|
||||
|
@ -134,7 +135,6 @@ nfp_flower_calculate_key_layers(struct nfp_fl_key_ls *ret_key_ls,
|
|||
{
|
||||
struct flow_dissector_key_basic *mask_basic = NULL;
|
||||
struct flow_dissector_key_basic *key_basic = NULL;
|
||||
struct flow_dissector_key_ip *mask_ip = NULL;
|
||||
u32 key_layer_two;
|
||||
u8 key_layer;
|
||||
int key_size;
|
||||
|
@ -206,28 +206,15 @@ nfp_flower_calculate_key_layers(struct nfp_fl_key_ls *ret_key_ls,
|
|||
flow->key);
|
||||
}
|
||||
|
||||
if (dissector_uses_key(flow->dissector, FLOW_DISSECTOR_KEY_IP))
|
||||
mask_ip = skb_flow_dissector_target(flow->dissector,
|
||||
FLOW_DISSECTOR_KEY_IP,
|
||||
flow->mask);
|
||||
|
||||
if (mask_basic && mask_basic->n_proto) {
|
||||
/* Ethernet type is present in the key. */
|
||||
switch (key_basic->n_proto) {
|
||||
case cpu_to_be16(ETH_P_IP):
|
||||
if (mask_ip && mask_ip->tos)
|
||||
return -EOPNOTSUPP;
|
||||
if (mask_ip && mask_ip->ttl)
|
||||
return -EOPNOTSUPP;
|
||||
key_layer |= NFP_FLOWER_LAYER_IPV4;
|
||||
key_size += sizeof(struct nfp_flower_ipv4);
|
||||
break;
|
||||
|
||||
case cpu_to_be16(ETH_P_IPV6):
|
||||
if (mask_ip && mask_ip->tos)
|
||||
return -EOPNOTSUPP;
|
||||
if (mask_ip && mask_ip->ttl)
|
||||
return -EOPNOTSUPP;
|
||||
key_layer |= NFP_FLOWER_LAYER_IPV6;
|
||||
key_size += sizeof(struct nfp_flower_ipv6);
|
||||
break;
|
||||
|
@ -238,11 +225,6 @@ nfp_flower_calculate_key_layers(struct nfp_fl_key_ls *ret_key_ls,
|
|||
case cpu_to_be16(ETH_P_ARP):
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
/* Currently we do not offload MPLS. */
|
||||
case cpu_to_be16(ETH_P_MPLS_UC):
|
||||
case cpu_to_be16(ETH_P_MPLS_MC):
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
/* Will be included in layer 2. */
|
||||
case cpu_to_be16(ETH_P_8021Q):
|
||||
break;
|
||||
|
|
Loading…
Reference in New Issue