From patchwork Mon Oct 10 06:09:00 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Chaoyong He X-Patchwork-Id: 117784 X-Patchwork-Delegate: ferruh.yigit@amd.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 8A488A0544; Mon, 10 Oct 2022 08:11:55 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id A484642B76; Mon, 10 Oct 2022 08:10:07 +0200 (CEST) Received: from NAM10-MW2-obe.outbound.protection.outlook.com (mail-mw2nam10on2118.outbound.protection.outlook.com [40.107.94.118]) by mails.dpdk.org (Postfix) with ESMTP id 5E59F42BD5 for ; Mon, 10 Oct 2022 08:10:05 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=V+6EB6FxycKAOM8UsqSDefCFbaDd9c6mklbzIfpSIiP9PHG4HcVktL5aOoBizdVauqU/VZV5tjyA6KgdEocUem+78bujSPJmWdtWfNxnbqOsDVvBbnDYN/eBf/BmkbcOYrcbXiAeGJveFdDt2ppxhEiu+cjN1+UpB9swO65Pl64lkGqR1U9JfgZE0EsUKIWMOZWHzSRQ9x20xn66EkX4FNb5oebWJCPt0lshDfgB/gC8c3/KvAYss/ejBIx15TONXKRxv+8zrW6kIlai+0G8Rcgk96/h/R1W6r1jEu/rFnp6VfaBIZjqU4saCw9ps/7SBqT7/LClmo4GsdIM0rUOQQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=sPKuaa75krBv60w0f4MZ4drzdKfSLIs3v9BjzLMnIrA=; b=Z+cchxkqHP6JlvRn9pqsfrGrCm4R2vwdT9BMsXU90MvvIgl3TZKtYnAEsYR4kHM/4Ow9TAv86DpKxyLwVPN22fgyh1J0KQWO9t65r52sypQlRzse5nYXjXRDjtJkoUjlQAzFxN+M4txhAiouvia8ym7b5u5i2g1sqXW63eHnqUjHBK0ZhpEeMiX1/C0MVTH8kTN334HaNI+NIowBHNfnXBvnBRPftAZE5Leti3112PuG/0TN5spCTgH7ptXyKLarbJk6TcMIVkwiBhep+BrgcQPa3ETQ3WXL3TGGZX5u5d/8lGD2doNxmAhAW2wJRVql/1Moi13+IpPE7kFNHhUQPQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=corigine.com; dmarc=pass action=none header.from=corigine.com; dkim=pass header.d=corigine.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=corigine.onmicrosoft.com; s=selector2-corigine-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=sPKuaa75krBv60w0f4MZ4drzdKfSLIs3v9BjzLMnIrA=; b=wSojWG6rcQwcMn3LYypwVfHyHdPX4mZFXFbqp7AMfgNbZteL2SlZDRy7b44Lgr18D/2WNPnANuXszWRWd9VY+nc77aVW5evFrjgOGwJQQgKTav/fquiMZsX+5TvHFmEvAFpvOaQJoxB0xENOxxLiXh5kSyjilO/vr1oQcvE+3eE= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=corigine.com; Received: from SJ0PR13MB5545.namprd13.prod.outlook.com (2603:10b6:a03:424::5) by CH2PR13MB3877.namprd13.prod.outlook.com (2603:10b6:610:91::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5723.14; Mon, 10 Oct 2022 06:10:03 +0000 Received: from SJ0PR13MB5545.namprd13.prod.outlook.com ([fe80::7c26:1a0b:2825:6f4b]) by SJ0PR13MB5545.namprd13.prod.outlook.com ([fe80::7c26:1a0b:2825:6f4b%4]) with mapi id 15.20.5723.014; Mon, 10 Oct 2022 06:10:03 +0000 From: Chaoyong He To: dev@dpdk.org Cc: oss-drivers@corigine.com, niklas.soderlund@corigine.com, Chaoyong He Subject: [PATCH v2 22/24] net/nfp: add the offload support of set TTL action Date: Mon, 10 Oct 2022 14:09:00 +0800 Message-Id: <1665382142-21684-23-git-send-email-chaoyong.he@corigine.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1665382142-21684-1-git-send-email-chaoyong.he@corigine.com> References: <1665382142-21684-1-git-send-email-chaoyong.he@corigine.com> X-ClientProxiedBy: SI2PR01CA0051.apcprd01.prod.exchangelabs.com (2603:1096:4:193::6) To SJ0PR13MB5545.namprd13.prod.outlook.com (2603:10b6:a03:424::5) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ0PR13MB5545:EE_|CH2PR13MB3877:EE_ X-MS-Office365-Filtering-Correlation-Id: 5ba8169b-44dc-4f58-79e5-08daaa861258 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR13MB5545.namprd13.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(136003)(376002)(366004)(39830400003)(346002)(396003)(451199015)(36756003)(4326008)(2906002)(8936002)(44832011)(5660300002)(41300700001)(83380400001)(66574015)(52116002)(2616005)(107886003)(26005)(6512007)(86362001)(8676002)(66476007)(66556008)(6486002)(478600001)(6916009)(66946007)(316002)(6506007)(38350700002)(186003)(38100700002); DIR:OUT; SFP:1102; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?q?/yq/cW+Kk+Vj9GsJ7mmYcF4nzssv?= =?utf-8?q?+C+dyhyDxHXEAWtldBTeRbcbMzImeNXiA9r+AZbzpogomYq2gmw9BEL4ESoPMIcdo?= =?utf-8?q?bOCtCdpYud85+eBkqMlyCDCJUIVi52OxWV/PC8n722oPdRMW11CCNMMDA5wq9HsLl?= =?utf-8?q?J/GaxDnJHbn77RPEfemoEJUoRPBgBj3VOXpUtYLF56Yfz20MISd/9zyIzFrSZYQYz?= =?utf-8?q?J+99rFsMAOLLWO6O7pBktOjFttL+xL3qeA/PQQKAjeV+JpGX2aQKKqrFbaAzSkV88?= =?utf-8?q?7mylBXs554+4rFHACHmUPBpHAEwyUiIGBUPhYekjhhluMcRb4vZhUpxBlurPSucKQ?= =?utf-8?q?zE38wTS+zxvDVvS+Odm1h8+cR80Mi58Y+qa8rc6IrAxRebfIEkD0DPptBk+qdUfnz?= =?utf-8?q?isaFKyIZsLYL1WaplLcNECgS0bDGAiV3X5ivleC5IMiaBjLDtJHGXNnRMP1f9GaTk?= =?utf-8?q?MlMig60bwbCBRvnUYhh+wLXmfr8fFpb8xqUl2zoFcN5hDi22dKaMG+HUVMy1kTZn0?= =?utf-8?q?0VCuPUhJrEX3NGTlpYTdHyCALN288OHmOblLfeMGJp5gf26pitSWhIiR1S60FZIFx?= =?utf-8?q?VYNJ0C3JRIrVwVicLGUiJU5wevySNjdR1K6/PKfSJR2BogsCf0dg5r2aqPP8I3jcL?= =?utf-8?q?IuPj8FNBAdxivUoQerF3MA8Sbbwj2dZDGN/afJ9OYQDNAJZXcfP4hoNM9UA/LLIUS?= =?utf-8?q?qHzikNB9PdHnpAuizr8HZ3D95T0YbCEYMLFfTTTA3gc9FD9bHdAzpiiq8BT4oXJgE?= =?utf-8?q?GHoDEq7pWVclMFDgiFZpZBIDx04k/0erstQh6btRTWKBEypvVidVqWuCUwGUOO1Tr?= =?utf-8?q?AF/pPZSe1JPiY3uLL7fbnlx4JoQBUcrpIbsksUYx6dPZMFk8MBPcWaa6tWT2lkb+y?= =?utf-8?q?Nh7T4GR8K/KuatjISoi8wtpwgD+PgKcQtTkyg4YTFW8Ch4EZBLFgXn4Qr1GQfNBum?= =?utf-8?q?/s6PJ9O40ihsNhoKh3dY3PEbGIDGd/AzLa1rBud/lMyhE8uiYYespql0u9k8BXJSi?= =?utf-8?q?eDgnj6rQHaKdxQf099gJiONWMCgCHCeGIAhlSJzdL0orBByJGDdsgdeh2yE2X4MCw?= =?utf-8?q?GhXOEw0BECb5E3dVU6MTjggf5QvP5MsAdf35kVlnA4HKovHL/E6GC22xgDDUwi047?= =?utf-8?q?fzgVKp8xI4jFpbKtRwDH3uMZrT6enjEK6qWKPAJdv9JHdk5WP5mKCEVzb2rwtrAGw?= =?utf-8?q?7UVCS4CX0zQoxly9wmR841ZlNtaBZH7o2lmPdAaJCUo9mzQXAu0jGi8GItJbt9fcE?= =?utf-8?q?kBeX9tRCtIlvpPWfPp7jir3Qf95Ol+vYQ3kVtxMeAd9DuDWv+6oE0aAFqSBzh/M3r?= =?utf-8?q?0Uj1sa20/sdBWuLSOqZctXExN57UbQOBtaY+GjDuV41ZOWkcS8Uw7kWIMuk3kzdLa?= =?utf-8?q?rSqhx7t0WoUxMfRIgDJ5FEg+tkWVZFTpheUrA6zq8KMqU0L8WN2jRFP0I6ij6iAlZ?= =?utf-8?q?9wXyRVJ+/QEJbzMGWyiwgGCIctSQwab2hzDjOJLXbRVB3OgDSH5doinTyNEmdSclu?= =?utf-8?q?o/xGofmUnoXosOIVcon5tr+AsshdUG1tiQ=3D=3D?= X-OriginatorOrg: corigine.com X-MS-Exchange-CrossTenant-Network-Message-Id: 5ba8169b-44dc-4f58-79e5-08daaa861258 X-MS-Exchange-CrossTenant-AuthSource: SJ0PR13MB5545.namprd13.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Oct 2022 06:10:03.7880 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: fe128f2c-073b-4c20-818e-7246a585940c X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: rKNciqFQrb0MOJ1lxm5ObUluNyBAR34KFAmHdrBEPj+DVRzEv+sJbh9PxHQjNR6LJt+t8MeMeOhwZ0S+HoyjUmOg4uBSFNm0PxdNVWOE3eE= X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH2PR13MB3877 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Add the corresponding data structure and logics, to support the offload of set TTL action. Signed-off-by: Chaoyong He Reviewed-by: Niklas Söderlund --- doc/guides/nics/features/nfp.ini | 1 + doc/guides/rel_notes/release_22_11.rst | 1 + drivers/net/nfp/flower/nfp_flower_cmsg.h | 44 +++++++++++++++++ drivers/net/nfp/nfp_flow.c | 84 ++++++++++++++++++++++++++++++++ 4 files changed, 130 insertions(+) diff --git a/doc/guides/nics/features/nfp.ini b/doc/guides/nics/features/nfp.ini index c7b560b..2706fd2 100644 --- a/doc/guides/nics/features/nfp.ini +++ b/doc/guides/nics/features/nfp.ini @@ -54,3 +54,4 @@ set_mac_dst = Y set_mac_src = Y set_tp_dst = Y set_tp_src = Y +set_ttl = Y diff --git a/doc/guides/rel_notes/release_22_11.rst b/doc/guides/rel_notes/release_22_11.rst index f0416e5..121094e 100644 --- a/doc/guides/rel_notes/release_22_11.rst +++ b/doc/guides/rel_notes/release_22_11.rst @@ -170,6 +170,7 @@ New Features * POP and PUSH VLAN * Set the IP address of IPv4 and IPv6 * Set the port number + * Set the TTL * **Updated NXP dpaa2 driver.** diff --git a/drivers/net/nfp/flower/nfp_flower_cmsg.h b/drivers/net/nfp/flower/nfp_flower_cmsg.h index 26de8b1..6bf8ff7 100644 --- a/drivers/net/nfp/flower/nfp_flower_cmsg.h +++ b/drivers/net/nfp/flower/nfp_flower_cmsg.h @@ -400,6 +400,25 @@ struct nfp_fl_act_set_ip4_addrs { }; /* + * IPv4 ttl tos + * 3 2 1 + * 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + * | - |opcode | |jump_id| ttl_mask | tos_mask | + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + * | ttl | tos | 0 | + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + */ +struct nfp_fl_act_set_ip4_ttl_tos { + struct nfp_fl_act_head head; + uint8_t ipv4_ttl_mask; + uint8_t ipv4_tos_mask; + uint8_t ipv4_ttl; + uint8_t ipv4_tos; + rte_be16_t reserved; +}; + +/* * IPv6 addr * 3 2 1 * 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 @@ -433,6 +452,31 @@ struct nfp_fl_act_set_ipv6_addr { }; /* + * ipv6 tc hl fl + * 3 2 1 + * 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + * | - |opcode | |jump_id| tclass_mask | hlimit_mask | + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + * | 0 | tclass | hlimit | + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + * | 0 | flabel_mask | + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + * | 0 | flabel | + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + */ +struct nfp_fl_act_set_ipv6_tc_hl_fl { + struct nfp_fl_act_head head; + uint8_t ipv6_tc_mask; + uint8_t ipv6_hop_limit_mask; + rte_be16_t reserved; + uint8_t ipv6_tc; + uint8_t ipv6_hop_limit; + rte_be32_t ipv6_label_mask; + rte_be32_t ipv6_label; +}; + +/* * TCP/UDP/SCTP * 3 2 1 * 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 diff --git a/drivers/net/nfp/nfp_flow.c b/drivers/net/nfp/nfp_flow.c index cbdd357..928f909 100644 --- a/drivers/net/nfp/nfp_flow.c +++ b/drivers/net/nfp/nfp_flow.c @@ -573,9 +573,11 @@ struct nfp_mask_id_entry { struct nfp_fl_key_ls *key_ls) { int ret = 0; + bool tc_hl_flag = false; bool mac_set_flag = false; bool ip_set_flag = false; bool tp_set_flag = false; + bool ttl_tos_flag = false; const struct rte_flow_action *action; for (action = actions; action->type != RTE_FLOW_ACTION_TYPE_END; ++action) { @@ -672,6 +674,22 @@ struct nfp_mask_id_entry { tp_set_flag = true; } break; + case RTE_FLOW_ACTION_TYPE_SET_TTL: + PMD_DRV_LOG(DEBUG, "RTE_FLOW_ACTION_TYPE_SET_TTL detected"); + if (key_ls->key_layer & NFP_FLOWER_LAYER_IPV4) { + if (!ttl_tos_flag) { + key_ls->act_size += + sizeof(struct nfp_fl_act_set_ip4_ttl_tos); + ttl_tos_flag = true; + } + } else { + if (!tc_hl_flag) { + key_ls->act_size += + sizeof(struct nfp_fl_act_set_ipv6_tc_hl_fl); + tc_hl_flag = true; + } + } + break; default: PMD_DRV_LOG(ERR, "Action type %d not supported.", action->type); return -ENOTSUP; @@ -1449,6 +1467,52 @@ struct nfp_mask_id_entry { return 0; } +static void +nfp_flow_action_set_ttl(char *act_data, + const struct rte_flow_action *action, + bool ttl_tos_flag) +{ + size_t act_size; + struct nfp_fl_act_set_ip4_ttl_tos *ttl_tos; + const struct rte_flow_action_set_ttl *ttl_conf; + + if (ttl_tos_flag) + ttl_tos = (struct nfp_fl_act_set_ip4_ttl_tos *)act_data - 1; + else + ttl_tos = (struct nfp_fl_act_set_ip4_ttl_tos *)act_data; + + act_size = sizeof(struct nfp_fl_act_set_ip4_ttl_tos); + ttl_tos->head.jump_id = NFP_FL_ACTION_OPCODE_SET_IPV4_TTL_TOS; + ttl_tos->head.len_lw = act_size >> NFP_FL_LW_SIZ; + + ttl_conf = (const struct rte_flow_action_set_ttl *)action->conf; + ttl_tos->ipv4_ttl = ttl_conf->ttl_value; + ttl_tos->reserved = 0; +} + +static void +nfp_flow_action_set_hl(char *act_data, + const struct rte_flow_action *action, + bool tc_hl_flag) +{ + size_t act_size; + struct nfp_fl_act_set_ipv6_tc_hl_fl *tc_hl; + const struct rte_flow_action_set_ttl *ttl_conf; + + if (tc_hl_flag) + tc_hl = (struct nfp_fl_act_set_ipv6_tc_hl_fl *)act_data - 1; + else + tc_hl = (struct nfp_fl_act_set_ipv6_tc_hl_fl *)act_data; + + act_size = sizeof(struct nfp_fl_act_set_ipv6_tc_hl_fl); + tc_hl->head.jump_id = NFP_FL_ACTION_OPCODE_SET_IPV6_TC_HL_FL; + tc_hl->head.len_lw = act_size >> NFP_FL_LW_SIZ; + + ttl_conf = (const struct rte_flow_action_set_ttl *)action->conf; + tc_hl->ipv6_hop_limit = ttl_conf->ttl_value; + tc_hl->reserved = 0; +} + static int nfp_flow_compile_action(__rte_unused struct nfp_flower_representor *representor, const struct rte_flow_action actions[], @@ -1457,17 +1521,21 @@ struct nfp_mask_id_entry { int ret = 0; char *position; char *action_data; + bool ttl_tos_flag = false; + bool tc_hl_flag = false; bool drop_flag = false; bool ip_set_flag = false; bool tp_set_flag = false; bool mac_set_flag = false; uint32_t total_actions = 0; const struct rte_flow_action *action; + struct nfp_flower_meta_tci *meta_tci; struct nfp_fl_rule_metadata *nfp_flow_meta; nfp_flow_meta = nfp_flow->payload.meta; action_data = nfp_flow->payload.action_data; position = action_data; + meta_tci = (struct nfp_flower_meta_tci *)nfp_flow->payload.unmasked_data; for (action = actions; action->type != RTE_FLOW_ACTION_TYPE_END; ++action) { switch (action->type) { @@ -1577,6 +1645,22 @@ struct nfp_mask_id_entry { tp_set_flag = true; } break; + case RTE_FLOW_ACTION_TYPE_SET_TTL: + PMD_DRV_LOG(DEBUG, "Process RTE_FLOW_ACTION_TYPE_SET_TTL"); + if (meta_tci->nfp_flow_key_layer & NFP_FLOWER_LAYER_IPV4) { + nfp_flow_action_set_ttl(position, action, ttl_tos_flag); + if (!ttl_tos_flag) { + position += sizeof(struct nfp_fl_act_set_ip4_ttl_tos); + ttl_tos_flag = true; + } + } else { + nfp_flow_action_set_hl(position, action, ttl_tos_flag); + if (!tc_hl_flag) { + position += sizeof(struct nfp_fl_act_set_ipv6_tc_hl_fl); + tc_hl_flag = true; + } + } + break; default: PMD_DRV_LOG(ERR, "Unsupported action type: %d", action->type); return -ENOTSUP;