From patchwork Fri Jul 22 14:49:58 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Huichao Cai X-Patchwork-Id: 114117 X-Patchwork-Delegate: thomas@monjalon.net Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 96131A0032; Fri, 22 Jul 2022 16:50:12 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 819884021E; Fri, 22 Jul 2022 16:50:12 +0200 (CEST) Received: from m12-12.163.com (m12-12.163.com [220.181.12.12]) by mails.dpdk.org (Postfix) with ESMTP id C694940156 for ; Fri, 22 Jul 2022 16:50:09 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=163.com; s=s110527; h=From:Subject:Date:Message-Id; bh=si9PtxBfqH7wGl9z7d wcHsGpydU07AbEUYuV4/s3zBE=; b=PZnc5yVJlIQV9vtYC5BtPHTNqxry5Tsqpv MMlUeKR4jWnHjbZraOw50V/9Vn4uibtJNSbKCALVvbb73ry/MBxqLoJPPLUWWEXo yy7gNqmdxAkPOYLkyiBaLy2TxVkgjszYZNQAh/kJ4Zmb9E5UPflidX5VsGrXEAiO isI0SgRBg= Received: from 192.168.227.150 (unknown [120.244.160.203]) by smtp8 (Coremail) with SMTP id DMCowAAHYN4Yudpi8BbYOw--.3367S2; Fri, 22 Jul 2022 22:50:06 +0800 (CST) From: Huichao Cai To: dev@dpdk.org Cc: konstantin.v.ananyev@yandex.ru Subject: [PATCH v4] ip_frag: add IPv4 fragment copy packet API Date: Fri, 22 Jul 2022 22:49:58 +0800 Message-Id: <1658501398-4036-1-git-send-email-chcchc88@163.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1658494910-7869-1-git-send-email-chcchc88@163.com> References: <1658494910-7869-1-git-send-email-chcchc88@163.com> X-CM-TRANSID: DMCowAAHYN4Yudpi8BbYOw--.3367S2 X-Coremail-Antispam: 1Uf129KBjvJXoW3GFy3JFyDtF1rCFWxtF13Arb_yoWfCw1fp3 W3KrWkXrn5Jrn7Gwn7XF45ZFW3Ka4SgrWjgrZ3u3sxtr42g3sYgayIkr1Yyryaq34DAr9a vwsFqF1Yka1xJa7anT9S1TB71UUUUUUqnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2 9KBjDUYxBIdaVFxhVjvjDU0xZFpf9x07UZzVnUUUUU= X-Originating-IP: [120.244.160.203] X-CM-SenderInfo: pfkfuxrfyyqiywtou0bp/1tbiIAFGF10TJQdiwAABs- X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Some NIC drivers support MBUF_FAST_FREE(Device supports optimization for fast release of mbufs. When set application must guarantee that per-queue all mbufs comes from the same mempool and has refcnt = 1) offload. In order to adapt to this offload function, add this API. Add some test data for this API. Signed-off-by: Huichao Cai --- app/test/test_ipfrag.c | 8 +- lib/ip_frag/rte_ip_frag.h | 29 +++++ lib/ip_frag/rte_ipv4_fragmentation.c | 208 +++++++++++++++++++++++++++++++++++ lib/ip_frag/version.map | 1 + 4 files changed, 245 insertions(+), 1 deletion(-) diff --git a/app/test/test_ipfrag.c b/app/test/test_ipfrag.c index ba0ffd0..8eddbe9 100644 --- a/app/test/test_ipfrag.c +++ b/app/test/test_ipfrag.c @@ -418,10 +418,16 @@ static void ut_teardown(void) } if (tests[i].ipv == 4) - len = rte_ipv4_fragment_packet(b, pkts_out, BURST, + if (i % 2) + len = rte_ipv4_fragment_packet(b, pkts_out, BURST, tests[i].mtu_size, direct_pool, indirect_pool); + else + len = rte_ipv4_fragment_copy_packet(b, pkts_out, + BURST, + tests[i].mtu_size, + direct_pool); else if (tests[i].ipv == 6) len = rte_ipv6_fragment_packet(b, pkts_out, BURST, tests[i].mtu_size, diff --git a/lib/ip_frag/rte_ip_frag.h b/lib/ip_frag/rte_ip_frag.h index 7d2abe1..a84e5f7 100644 --- a/lib/ip_frag/rte_ip_frag.h +++ b/lib/ip_frag/rte_ip_frag.h @@ -179,6 +179,35 @@ int32_t rte_ipv4_fragment_packet(struct rte_mbuf *pkt_in, struct rte_mempool *pool_indirect); /** + * IPv4 fragmentation by copy. + * + * This function implements the fragmentation of IPv4 packets by copy. + * + * @param pkt_in + * The input packet. + * @param pkts_out + * Array storing the output fragments. + * @param nb_pkts_out + * Number of fragments. + * @param mtu_size + * Size in bytes of the Maximum Transfer Unit (MTU) for the outgoing IPv4 + * datagrams. This value includes the size of the IPv4 header. + * @param pool_direct + * MBUF pool used for allocating direct buffers for the output fragments. + * @return + * Upon successful completion - number of output fragments placed + * in the pkts_out array. + * Otherwise - (-1) * errno. + */ +__rte_experimental +int32_t +rte_ipv4_fragment_copy_packet(struct rte_mbuf *pkt_in, + struct rte_mbuf **pkts_out, + uint16_t nb_pkts_out, + uint16_t mtu_size, + struct rte_mempool *pool_direct); + +/** * This function implements reassembly of fragmented IPv4 packets. * Incoming mbufs should have its l2_len/l3_len fields setup correctly. * diff --git a/lib/ip_frag/rte_ipv4_fragmentation.c b/lib/ip_frag/rte_ipv4_fragmentation.c index 27a8ad2..326c640 100644 --- a/lib/ip_frag/rte_ipv4_fragmentation.c +++ b/lib/ip_frag/rte_ipv4_fragmentation.c @@ -83,6 +83,48 @@ static inline uint16_t __create_ipopt_frag_hdr(uint8_t *iph, return ipopt_len; } +static struct rte_mbuf * +__copy_to_pktmbuf(char *src, struct rte_mbuf *m_head, + struct rte_mbuf *m_tail, struct rte_mempool *mp, uint32_t len) +{ + struct rte_mbuf *m_last, **prev; + + m_last = m_tail; + prev = &m_last->next; + while (len > 0) { + uint32_t copy_len; + + /* current buffer is full, chain a new one */ + if (unlikely(rte_pktmbuf_tailroom(m_last) == 0)) { + m_last = rte_pktmbuf_alloc(mp); + if (unlikely(m_last == NULL)) + return NULL; + + ++m_head->nb_segs; + *prev = m_last; + prev = &m_last->next; + } + + /* + * copy the min of data in len + * vs space available in output (m_last) + */ + copy_len = RTE_MIN(rte_pktmbuf_tailroom(m_last), len); + + /* append from seg to m_last */ + memcpy(rte_pktmbuf_mtod_offset(m_last, char *, m_last->data_len), + src, copy_len); + + /* update offsets and lengths */ + m_last->data_len += copy_len; + m_head->pkt_len += copy_len; + src += copy_len; + len -= copy_len; + } + + return m_last; +} + /** * IPv4 fragmentation. * @@ -259,3 +301,169 @@ static inline uint16_t __create_ipopt_frag_hdr(uint8_t *iph, return out_pkt_pos; } + +/** + * IPv4 fragmentation by copy. + * + * This function implements the fragmentation of IPv4 packets by copy. + * + * @param pkt_in + * The input packet. + * @param pkts_out + * Array storing the output fragments. + * @param nb_pkts_out + * Number of fragments. + * @param mtu_size + * Size in bytes of the Maximum Transfer Unit (MTU) for the outgoing IPv4 + * datagrams. This value includes the size of the IPv4 header. + * @param pool_direct + * MBUF pool used for allocating direct buffers for the output fragments. + * @return + * Upon successful completion - number of output fragments placed + * in the pkts_out array. + * Otherwise - (-1) * errno. + */ +int32_t +rte_ipv4_fragment_copy_packet(struct rte_mbuf *pkt_in, + struct rte_mbuf **pkts_out, + uint16_t nb_pkts_out, + uint16_t mtu_size, + struct rte_mempool *pool_direct) +{ + struct rte_mbuf *in_seg = NULL; + struct rte_ipv4_hdr *in_hdr; + uint32_t out_pkt_pos, in_seg_data_pos; + uint32_t more_in_segs; + uint16_t fragment_offset, flag_offset, frag_size, header_len; + uint16_t frag_bytes_remaining; + uint8_t ipopt_frag_hdr[IPV4_HDR_MAX_LEN]; + uint16_t ipopt_len; + + /* + * Formal parameter checking. + */ + if (unlikely(pkt_in == NULL) || unlikely(pkts_out == NULL) || + unlikely(nb_pkts_out == 0) || unlikely(pool_direct == NULL) || + unlikely(mtu_size < RTE_ETHER_MIN_MTU)) + return -EINVAL; + + in_hdr = rte_pktmbuf_mtod(pkt_in, struct rte_ipv4_hdr *); + header_len = (in_hdr->version_ihl & RTE_IPV4_HDR_IHL_MASK) * + RTE_IPV4_IHL_MULTIPLIER; + + /* Check IP header length */ + if (unlikely(pkt_in->data_len < header_len) || + unlikely(mtu_size < header_len)) + return -EINVAL; + + /* + * Ensure the IP payload length of all fragments is aligned to a + * multiple of 8 bytes as per RFC791 section 2.3. + */ + frag_size = RTE_ALIGN_FLOOR((mtu_size - header_len), + IPV4_HDR_FO_ALIGN); + + flag_offset = rte_cpu_to_be_16(in_hdr->fragment_offset); + + /* If Don't Fragment flag is set */ + if (unlikely((flag_offset & IPV4_HDR_DF_MASK) != 0)) + return -ENOTSUP; + + /* Check that pkts_out is big enough to hold all fragments */ + if (unlikely(frag_size * nb_pkts_out < + (uint16_t)(pkt_in->pkt_len - header_len))) + return -EINVAL; + + in_seg = pkt_in; + in_seg_data_pos = header_len; + out_pkt_pos = 0; + fragment_offset = 0; + + ipopt_len = header_len - sizeof(struct rte_ipv4_hdr); + if (unlikely(ipopt_len > RTE_IPV4_HDR_OPT_MAX_LEN)) + return -EINVAL; + + more_in_segs = 1; + while (likely(more_in_segs)) { + struct rte_mbuf *out_pkt = NULL, *tail_pkt = NULL; + uint32_t more_out_segs; + struct rte_ipv4_hdr *out_hdr; + + /* Allocate direct buffer */ + out_pkt = rte_pktmbuf_alloc(pool_direct); + if (unlikely(out_pkt == NULL)) { + __free_fragments(pkts_out, out_pkt_pos); + return -ENOMEM; + } + + /* Reserve space for the IP header that will be built later */ + out_pkt->data_len = header_len; + out_pkt->pkt_len = header_len; + frag_bytes_remaining = frag_size; + tail_pkt = out_pkt; + + more_out_segs = 1; + while (likely(more_out_segs && more_in_segs)) { + uint32_t len; + + len = frag_bytes_remaining; + if (len > (in_seg->data_len - in_seg_data_pos)) + len = in_seg->data_len - in_seg_data_pos; + + tail_pkt = __copy_to_pktmbuf(rte_pktmbuf_mtod_offset( + in_seg, char *, in_seg_data_pos), + out_pkt, tail_pkt, pool_direct, len); + if (unlikely(!tail_pkt)) { + rte_pktmbuf_free(out_pkt); + __free_fragments(pkts_out, out_pkt_pos); + return -ENOMEM; + } + + in_seg_data_pos += len; + frag_bytes_remaining -= len; + + /* Current output packet (i.e. fragment) done ? */ + if (unlikely(frag_bytes_remaining == 0)) + more_out_segs = 0; + + /* Current input segment done ? */ + if (unlikely(in_seg_data_pos == in_seg->data_len)) { + in_seg = in_seg->next; + in_seg_data_pos = 0; + + if (unlikely(in_seg == NULL)) + more_in_segs = 0; + } + } + + /* Build the IP header */ + + out_hdr = rte_pktmbuf_mtod(out_pkt, struct rte_ipv4_hdr *); + + __fill_ipv4hdr_frag(out_hdr, in_hdr, header_len, + (uint16_t)out_pkt->pkt_len, + flag_offset, fragment_offset, more_in_segs); + + if (unlikely((fragment_offset == 0) && (ipopt_len) && + ((flag_offset & RTE_IPV4_HDR_OFFSET_MASK) == 0))) { + ipopt_len = __create_ipopt_frag_hdr((uint8_t *)in_hdr, + ipopt_len, ipopt_frag_hdr); + fragment_offset = (uint16_t)(fragment_offset + + out_pkt->pkt_len - header_len); + out_pkt->l3_len = header_len; + + header_len = sizeof(struct rte_ipv4_hdr) + ipopt_len; + in_hdr = (struct rte_ipv4_hdr *)ipopt_frag_hdr; + } else { + fragment_offset = (uint16_t)(fragment_offset + + out_pkt->pkt_len - header_len); + out_pkt->l3_len = header_len; + } + + /* Write the fragment to the output list */ + pkts_out[out_pkt_pos] = out_pkt; + out_pkt_pos++; + } + + return out_pkt_pos; +} diff --git a/lib/ip_frag/version.map b/lib/ip_frag/version.map index b9c1cca..122ae8d 100644 --- a/lib/ip_frag/version.map +++ b/lib/ip_frag/version.map @@ -17,4 +17,5 @@ EXPERIMENTAL { global: rte_ip_frag_table_del_expired_entries; + rte_ipv4_fragment_copy_packet; };