From patchwork Sun Sep 16 16:53:42 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ori Kam X-Patchwork-Id: 44765 X-Patchwork-Delegate: ferruh.yigit@amd.com Return-Path: X-Original-To: patchwork@dpdk.org Delivered-To: patchwork@dpdk.org Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 8DC375A6A; Sun, 16 Sep 2018 18:56:29 +0200 (CEST) Received: from EUR02-AM5-obe.outbound.protection.outlook.com (mail-eopbgr00056.outbound.protection.outlook.com [40.107.0.56]) by dpdk.org (Postfix) with ESMTP id 279895A44 for ; Sun, 16 Sep 2018 18:56:28 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Mellanox.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=wnRYNtNZbYuWSG4wxILPJuH7aYzlvpfTEO7JOeZBOyE=; b=N5+qL6BG9FSj8in/8o15VnXSRn8z3pDTJPgmMOiN/FYbHWYjzgo8J2p4sK/1E6Fx9IA5WcjWc3G4smD9INo0VJiAUubWGYFycu8Ig33mu8NzmskyXMZ4FvdacszJYUqkvbyo5mSLo533YG3RalKbaBnIrfBSOdYbjfq7B2XcZ24= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=orika@mellanox.com; Received: from mellanox.com (37.142.13.130) by HE1PR05MB3434.eurprd05.prod.outlook.com (2603:10a6:7:33::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1143.15; Sun, 16 Sep 2018 16:56:24 +0000 From: Ori Kam To: arybchenko@solarflare.com, ferruh.yigit@intel.com, stephen@networkplumber.org, adrien.mazarguil@6wind.com Cc: dev@dpdk.org, dekelp@mellanox.com, thomas@monjalon.net, nelio.laranjeiro@6wind.com, yskoh@mellanox.com, orika@mellanox.com Date: Sun, 16 Sep 2018 16:53:42 +0000 Message-Id: <1537116824-191205-2-git-send-email-orika@mellanox.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1537116824-191205-1-git-send-email-orika@mellanox.com> References: <1537116824-191205-1-git-send-email-orika@mellanox.com> MIME-Version: 1.0 X-Originating-IP: [37.142.13.130] X-ClientProxiedBy: DB6P193CA0021.EURP193.PROD.OUTLOOK.COM (2603:10a6:6:29::31) To HE1PR05MB3434.eurprd05.prod.outlook.com (2603:10a6:7:33::24) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 4c2ff7e1-70a8-4c98-da1c-08d61bf556f2 X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989137)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(4618075)(2017052603328)(7153060)(7193020); SRVR:HE1PR05MB3434; X-Microsoft-Exchange-Diagnostics: 1; HE1PR05MB3434; 3:iP2XCksQWnvddXSrjTBB8n7NHye8ceOch3M25vpidOWUgYseBrQeiTgt2w5Z8kXID3gE9ASafj40bb1tAyS59Hy+PBcKDADYp2UXwdAf+HWevtqnfsqRvcHcxOc1Nn4z0WXOQG3Lp2Ur9mudk/yPugcIAXGnTz7JppkCEQYVF8fYNoon3zEgzAEnf4sRgb7PelROYMWi3gejU0A7n3Ea5YdNU10D6A05wmfMybyaj6Ew6iUPV4+X2jOSjLS6orG2; 25:JaIiLgPpZli35GyFd4KTX1bpFuOEESUfuQNY35jqEPdVNzlJZP2JthzQ6QdUJhRr0VyvCFo3gOx15h144BnuZyaE5AS+I5jQsMvOxFC2MT6+scogmD0QcqbJXhg5tlA1Ml2YDIybvAtskfUPp1WeXeMBAxXTxsUhuVP5NCJ4uPNsRgDXug4sQssjf4terWQfK+RrfjQnmXK44DkLD8JRfWXBQywliUT9R67v5ACpPZceIaTU9u8I/dXb4zYZg2VyojpUl96eGQctFalH3Ng6CUCIC7jfHIzmpwM1uBC4avFbXgV33TEP1Yn/ESE6HbQlLxqoQ5EDC3KXxFyy8bEOQw==; 31:b4KkLSx8md6V7cvMG2s3QiiVaPrEmZ4NWu8HWVD97l+H18+T07QH1LvO5BE9YfibTNy0fccofBxSA6CWgeHoNXkuq8Bv4q9BWAAJxwWOHJ0lro9LOaFKTVkc/yxSFCxvrBIHXrWu1TyKrEQd4yNxbJ3/g6wVXydnsAQBnMb8jwgI0Is9QbS2/qv/Uid+M2pJhFiSwvrU5Uf0icit68+T6VwRt6CU+wcBCDRxrnuypzw= X-MS-TrafficTypeDiagnostic: HE1PR05MB3434: X-LD-Processed: a652971c-7d2e-4d9b-a6a4-d149256f461b,ExtAddr X-Microsoft-Exchange-Diagnostics: 1; HE1PR05MB3434; 20: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; 4:cDDse+UcACTWqxa4FdPOPFsmglT1YnEJQCzqWWL9nTKCPOTSzI76NCBFxyNOKc2ELIZXJj44mfub/tL9afQLrBHCifN1gbf9W+RAYG30Saj0mqjZEbsGdJ9KrhaVa+LO7c6miPU0ouaiK3n1dMPTOx1fgjvke607dZtE2N5H93DSUJVz/Byw3YtMl65aux5WNcoMKXzgoKoDQZfxAgA0xup/zuB0Xs75Sgi5roaZLIy8ms4FTwWcy0zbZIxTUDDRDfM0UrnJ2c+9AP9TrVU2aw== X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:; X-MS-Exchange-SenderADCheck: 1 X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(3231355)(944501410)(52105095)(10201501046)(3002001)(93006095)(93001095)(6055026)(149027)(150027)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(20161123560045)(20161123562045)(20161123564045)(201708071742011)(7699050); SRVR:HE1PR05MB3434; BCL:0; PCL:0; RULEID:; SRVR:HE1PR05MB3434; X-Forefront-PRVS: 079756C6B9 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(136003)(346002)(366004)(396003)(39860400002)(376002)(189003)(199004)(16586007)(47776003)(81156014)(6666003)(50226002)(8936002)(25786009)(5660300001)(68736007)(81166006)(8676002)(4326008)(106356001)(105586002)(2906002)(4720700003)(69596002)(316002)(21086003)(305945005)(8886007)(7736002)(66066001)(33026002)(107886003)(956004)(3846002)(476003)(48376002)(51416003)(478600001)(97736004)(7696005)(52116002)(55016002)(53936002)(14444005)(26005)(36756003)(186003)(16526019)(386003)(50466002)(76176011)(2616005)(86362001)(6116002)(11346002)(446003)(486006)(41533002); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR05MB3434; H:mellanox.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; Received-SPF: None (protection.outlook.com: mellanox.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; HE1PR05MB3434; 23:S9uRAYIxNVjxXodR5stIAIS0qHan1YeYJnJTglRTE?= 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 X-Microsoft-Antispam-Message-Info: XCmip9LMpXB2d74IgL4JHxzKGXqBvS+7ZX0nI1VwcCjr65E0pDxWrAHf5hbRUf6uIwGCyC++GgChVWkhZ+10PvDiFzY+O4fPYdtKBBcGM2xV0LmkeBWaGXUbXqNQgt1A9I/8ItRCN61bAgDQdwuwV+QIQzyZsRQR2epNqzsy7RYWx+OETvVCv2XYpCemUzbceBNbPTmJoPVStW0WxiqoAjYxt9Se19gCa+JqZXMVQRnjh5cEUPV/se8xdjgcf6QfJ1HhMAVDU4qwIkvdVrxOaQGycXxii4pQjo6sD54vfCPU4dwF8Apa1/Skn5CUX1RH1z5DDd7N5uCRmzntxy6CgrNKHPjQIgMBiPZ9Jbz2qgk= X-Microsoft-Exchange-Diagnostics: 1; HE1PR05MB3434; 6:N7bk2i4si3u/PuePRkfJWOTdV7lA32gUJ7B2uk+NXQqMGZHMSemy6TTfeHTXTY6jExJOfkVMzKcwl6+XUdYHKdxyEYQHdzC0CdSSdQDsZBF5ph1joqhmjONKuGTp36FKhoVj6iJorUpwIEz726Be/BmzOYjjrdYgHBFSXvWW+txGqO5dAti8XbW9c5Ps4P+HZaAB1c8hQwz8plL2cJCMcXh5yKB6FddgNoCgkU27h3QlXiN6F63RGeAvBR7RWR5IhsnaSoZSKUEO/wt4mDz2gG5dRHfnB2lXcPnp2OYzQSPpoUYIM/5Pjn7mebyiZYh95xhI9gROADJA8D5micGbra5lhQNjuI1DI85pcAHugnp963uee2rwWylcJ/wtCKwB366UVKa1NVuUrF2Td6qkAjsy3DB88wFMMTujwWsnXfft3eezN7XUa1AOCC8LGR78zT5S+P55j826+1+iIoSRbg==; 5:NoP04LN8FgzHb/IUryfnrIb5mqSTk4nWIXJcpCrxCs0eOwu28nGv946b3pRkRWldpH0AZKh74LoSuQTRlxSKypnbpm5gcmuKp4DGuSM2QW5Ol5WPobsNMxybIU5+WrQDqiNtKDV5QfSegQ4uOaOOe/qJzj8DbX6HNOK2V/mkXzA=; 7:zm+huPeVc8IKLbb4khaYOIb80TOoyCkSjpfB7UKUQ5iOQcYscbmfZIUofwz0AMS798QiREsdzLuzvIfIGxZ81X6nURIOzavooODg1FDJ/MzgiwMWwY3N/o2ajTkE+4Za/c2taSIh1BgqH0d3zd3O425fzHMthcm+E907iITdVy72XBtZiRhyKcOoNBgipXrS7OpLXmfxHdD+rTW6Ulkryns1a7kRLrvPFSVyi6ZXoV1QtPnyoMfLeglp22hX+GQW SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-OriginatorOrg: Mellanox.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Sep 2018 16:56:24.0760 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 4c2ff7e1-70a8-4c98-da1c-08d61bf556f2 X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: a652971c-7d2e-4d9b-a6a4-d149256f461b X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR05MB3434 Subject: [dpdk-dev] [PATCH 1/3] ethdev: add generic L2/L3 tunnel encapsulation actions X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" Currenlty the encap/decap actions only support encapsulation of VXLAN and NVGRE L2 packets (L2 encapsulation is where the inner packet has a valid Ethernet header, while L3 encapsulation is where the inner packet doesn't have the Ethernet header). In addtion the parameter to to the encap action is a list of rte items, this results in 2 extra translation, between the application to the action and from the action to the NIC. This results in negetive impact on the insertion performance. Looking forward there are going to be a need to support many more tunnel encapsulations. For example MPLSoGRE, MPLSoUDP. Adding the new encapsulation will result in duplication of code. For example the code for handling NVGRE and VXLAN are exactly the same, and each new tunnel will have the same exact structure. This patch introduce a generic encapsulation for L2 tunnel types, and generic encapsulation for L3 tunnel types. In addtion the new encapsulations commands are using raw buffer inorder to save the converstion time, both for the application and the PMD. Signed-off-by: Ori Kam --- doc/guides/prog_guide/rte_flow.rst | 70 ++++++++++++++++++++++++++++++++++++++ lib/librte_ethdev/rte_flow.h | 64 ++++++++++++++++++++++++++++++++++ 2 files changed, 134 insertions(+) diff --git a/doc/guides/prog_guide/rte_flow.rst b/doc/guides/prog_guide/rte_flow.rst index b305a72..0f29435 100644 --- a/doc/guides/prog_guide/rte_flow.rst +++ b/doc/guides/prog_guide/rte_flow.rst @@ -2076,6 +2076,76 @@ RTE_FLOW_ERROR_TYPE_ACTION error should be returned. This action modifies the payload of matched flows. +Action: ``TUNNEL_ENCAP`` +^^^^^^^^^^^^^^^^^^^^^^^^ + +Performs a tunnel encapsulation action by encapsulating the matched flow with +a tunnel header as defined in the``rte_flow_action_tunnel_encap``. + +This action modifies the payload of matched flows. The flow definition specified +in the ``rte_flow_action_tunnel_encap`` action structure must define a valid +tunnel packet overlay. + +.. _table_rte_flow_action_tunnel_encap: + +.. table:: TUNNEL_ENCAP + + +----------------+-------------------------------------+ + | Field | Value | + +================+=====================================+ + | ``buf`` | Tunnel end-point overlay definition | + +----------------+-------------------------------------+ + | ``size`` | The size of the buffer in bytes | + +----------------+-------------------------------------+ + +Action: ``TUNNEL_DECAP`` +^^^^^^^^^^^^^^^^^^^^^^^^ + +Performs a decapsulation action by stripping all headers of the tunnel +network overlay from the matched flow. + +The flow items pattern defined for the flow rule with which a ``TUNNEL_DECAP`` +action is specified, must define a valid tunnel. If the +flow pattern does not specify a valid tunnel then a +RTE_FLOW_ERROR_TYPE_ACTION error should be returned. + +This action modifies the payload of matched flows. + +Action: ``TUNNEL_ENCAP_L3`` +^^^^^^^^^^^^^^^^^^^^^^^^^^^ + +Replace the packet layer 2 header with the encapsulation tunnel header +as defined in the ``rte_flow_action_tunnel_encap_l3``. + +This action modifies the payload of matched flows. The flow definition specified +in the ``rte_flow_action_tunnel_encap_l3`` action structure must define a valid +tunnel packet overlay. + +.. _table_rte_flow_action_tunnel_encap_l3: + +.. table:: TUNNEL_ENCAP_L3 + + +----------------+-------------------------------------+ + | Field | Value | + +================+=====================================+ + | ``buf`` | Tunnel end-point overlay definition | + +----------------+-------------------------------------+ + | ``size`` | The size of the buffer in bytes | + +----------------+-------------------------------------+ + +Action: ``TUNNEL_DECAP_L3`` +^^^^^^^^^^^^^^^^^^^^^^^^^^^ + +Replace the packet tunnel network overlay from the matched flow with +layer 2 header as defined by ``rte_flow_action_tunnel_decap_l3``. + +The flow items pattern defined for the flow rule with which a ``TUNNEL_DECAP_L3`` +action is specified, must define a valid tunnel. If the +flow pattern does not specify a valid tunnel then a +RTE_FLOW_ERROR_TYPE_ACTION error should be returned. + +This action modifies the payload of matched flows. + Negative types ~~~~~~~~~~~~~~ diff --git a/lib/librte_ethdev/rte_flow.h b/lib/librte_ethdev/rte_flow.h index f8ba71c..d1f7ebf 100644 --- a/lib/librte_ethdev/rte_flow.h +++ b/lib/librte_ethdev/rte_flow.h @@ -1505,6 +1505,40 @@ enum rte_flow_action_type { * error. */ RTE_FLOW_ACTION_TYPE_NVGRE_DECAP, + + /** + * Encapsulate the packet with tunnel header as defined in + * rte_flow_action_tunnel_encap action structure. + * + * See struct rte_flow_action_tunnel_encap. + */ + RTE_FLOW_ACTION_TYPE_TUNNEL_ENCAP, + + /** + * Decapsulate outer most tunnel from matched flow. + * + * The flow pattern must have a valid tunnel header + */ + RTE_FLOW_ACTION_TYPE_TUNNEL_DECAP, + + /** + * Remove the packet L2 header and encapsulate the + * packet with tunnel header as defined in + * rte_flow_action_tunnel_encap_l3 action structure. + * + * See struct rte_flow_action_tunnel_encap. + */ + RTE_FLOW_ACTION_TYPE_TUNNEL_ENCAP_L3, + + /** + * Decapsulate outer most tunnel from matched flow, + * and add L2 layer. + * + * The flow pattern must have a valid tunnel header. + * + * See struct ret_flow_action_tunnel_decap_l3 + */ + RTE_FLOW_ACTION_TYPE_TUNNEL_DECAP_L3, }; /** @@ -1868,6 +1902,36 @@ struct rte_flow_action_nvgre_encap { struct rte_flow_item *definition; }; +/** + * @warning + * @b EXPERIMENTAL: this structure may change without prior notice + * + * RTE_FLOW_ACTION_TYPE_TUNNEL_ENCAP + * + * Tunnel end-point encapsulation data definition + * + * The encapsulation header is provided through raw buffer. + */ +struct rte_flow_action_tunnel_encap { + uint8_t *buf; /**< Encapsulation data. */ + uint16_t size; /**< Buffer size. */ +}; + +/** + * @warning + * @b EXPERIMENTAL: this structure may change without prior notice + * + * RTE_FLOW_ACTION_TYPE_TUNNEL_ENCAP_L3 + * + * Tunnel end-point encapsulation data definition + * + * The encapsulation header is provided through raw buffer. + */ +struct rte_flow_action_tunnel_encap_l3 { + uint8_t *buf; /**< Encapsulation data. */ + uint16_t size; /**< Buffer size. */ +}; + /* * Definition of a single action. * From patchwork Sun Sep 16 16:53:43 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ori Kam X-Patchwork-Id: 44766 X-Patchwork-Delegate: ferruh.yigit@amd.com Return-Path: X-Original-To: patchwork@dpdk.org Delivered-To: patchwork@dpdk.org Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id D09A35B26; Sun, 16 Sep 2018 18:56:38 +0200 (CEST) Received: from EUR02-AM5-obe.outbound.protection.outlook.com (mail-eopbgr00089.outbound.protection.outlook.com [40.107.0.89]) by dpdk.org (Postfix) with ESMTP id 824BE5B1E for ; Sun, 16 Sep 2018 18:56:37 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Mellanox.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JGN00lqg8V7hbmRGEKG1d0GC+NaP2Bf4B41+ZcsGPHQ=; b=yEpjC/PFozFOgN1mkR02Rqb9LX5UbOxjAM5E6RspWeaoyLHCXWMggTs+U58vOpdVzx18FYhQANEWwRkkxCsELI8jzjH1A4DU467ueEtJodyIKRYtKEbJC4ycM0IXsg8Fw0hVWLewkviPA9I/cQHdk6UP4Tmg1UDAUhhItf8eweA= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=orika@mellanox.com; Received: from mellanox.com (37.142.13.130) by HE1PR05MB3434.eurprd05.prod.outlook.com (2603:10a6:7:33::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1143.15; Sun, 16 Sep 2018 16:56:33 +0000 From: Ori Kam To: arybchenko@solarflare.com, ferruh.yigit@intel.com, stephen@networkplumber.org, adrien.mazarguil@6wind.com Cc: dev@dpdk.org, dekelp@mellanox.com, thomas@monjalon.net, nelio.laranjeiro@6wind.com, yskoh@mellanox.com, orika@mellanox.com Date: Sun, 16 Sep 2018 16:53:43 +0000 Message-Id: <1537116824-191205-3-git-send-email-orika@mellanox.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1537116824-191205-1-git-send-email-orika@mellanox.com> References: <1537116824-191205-1-git-send-email-orika@mellanox.com> MIME-Version: 1.0 X-Originating-IP: [37.142.13.130] X-ClientProxiedBy: DB6P193CA0021.EURP193.PROD.OUTLOOK.COM (2603:10a6:6:29::31) To HE1PR05MB3434.eurprd05.prod.outlook.com (2603:10a6:7:33::24) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 99759dbc-494a-4028-086e-08d61bf55cd8 X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989137)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(4618075)(2017052603328)(7153060)(7193020); SRVR:HE1PR05MB3434; X-Microsoft-Exchange-Diagnostics: 1; HE1PR05MB3434; 3:gX3bwoZzREnGcjMR2f3L0WIN2URbciu0iVhwSL87MYTrH8UhVk/22sn2/Ed/jotymw0jH9AZkXfE15oLbl7N1qsE+1GPbRFJIBmq+eKVrLtb5UXk45OLuZ1QTXT2/GcEMgQYjbx0QnHsuePWAjJX84XxQCV+5lWUznS18v0AknhqBwjRxSpLkC34hx1AA5fsbEYNz3H1xYAQQwTq5XHzYFDr2X4h8rM/JRC5jq/9SWpt3pxtebFPMN0laNdZLg6i; 25:IyJAXBVKt+/tN6yfn9IxTec2iACDFfuggLReyyy3H6r1ZwudLw23Hyhpn6eoMEifEuNZEwyCxKGJQ9qVv+mnOzKSFV//dB6PC3upSiBG+uC+SADhU/q6se+iwg0PNxT29XvucMzYECcUeWdJ0xAngtekrnX3qGN+8uara8UN5NZHBJ6eAsA/DQ/17sgCsVDtbRA3uY7kQLuLKPFEI4IyS64fsmPVW4gYfl3AsMFPdYlzK1ayLq/lOOADZx25v0/sNh9m05pf8tZkyZtWr0MFvT2oaIP58Rk2lJOb72SqWZ6T+yW6Z+lb857iVnwNs1OcFXHGNihmXj3AZk+HbYKSNA==; 31:r39o1pG/gDxJA5WYAXTUs4qOVYyOdN5iqPCr1fqNCtw5rjKFHFCPuxl8PqAkQgtvqzVhj6vYnRZ1kXz2k+GGu/TEapU4V61BSYk4bAPCk+uOnQ/iLXDExkqV5jPaNQUvs8wbMbS2Or+qZQgcSOtdBEbo1DNh+VtskwC7tI9GVTq4n3UP+twrMW7iy2JLkR4o/QGJTsbc2PV52O+thRoB6zx1GdWYyK26xJzVk1M/wnM= X-MS-TrafficTypeDiagnostic: HE1PR05MB3434: X-LD-Processed: a652971c-7d2e-4d9b-a6a4-d149256f461b,ExtAddr X-Microsoft-Exchange-Diagnostics: 1; HE1PR05MB3434; 20:eyfuuaR1fWduVtRKDAGnX+O4RbmKtj2SjjCTkqnkAP3SmV0gykuUrNPVchTmLQ/ofgw2UVeK7ShyzeT5aldbIEabItdE7aCAap0Addc6L4ogctQ3JCchlLIfbjX5aB51NNr+IBEJCVfNRkEYqUuYZeSsj58YwoOrCvIRdIa6pi1PIze7XKNdbjcQwwtp9b7/oFN9QX1238FA3GyC4Xa6FQDvhvQKyoNM+iBgg0xqCigoTu8SMizuNPitCiyFelzggW13u5EkfIOsyENFnadBS7hmGtIATKvYkgCg1KiPMolHg71LJRzqW/0Iw+yahxPU9ebWDuqTEUIrFN9C5umO4VUrHehx5D/0NaiddCrCVAlt9SKB3XC6tVYRiqF1wjYe56TyV+PbPIl7CxYZgi9RJqBWttqJrzitU3A4K82h8k4vWUbtei3z0zm78LP5IcTr6en4i6sNe9TDUceai7hNXxFgHCdq2cZdASVh85ctl20oKtwzy4plB1yAn8NjlhWF; 4:RdQX1T21n1OmAi4Pm5Bj2qD4qrNlZOt0mjOG0zSZ4SJspvOkCMY0K4oidNvJ3qd29FGU5RPeRjUp9EbQHhCmf3OpGGb5gNcVrtzrf7S+g79/6GRtPPBgZ7ZAkGUVZr5PeMf4msky4vhUzFuyJYWPySQ/kbdW8LFXyjN80Upnv6vMlEyupVGjfxR1EOHtM/0qyw5G4Nuyz5MOHux7qm4bPfm907cuZZZqN6K6ae4Tt2/ZM5uUkY4KgU2G/EYXSXnlSsiGitPPUtMSI7nZwEm2uQ== X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:; X-MS-Exchange-SenderADCheck: 1 X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(3231355)(944501410)(52105095)(10201501046)(3002001)(93006095)(93001095)(6055026)(149027)(150027)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(20161123560045)(20161123562045)(20161123564045)(201708071742011)(7699050); SRVR:HE1PR05MB3434; BCL:0; PCL:0; RULEID:; SRVR:HE1PR05MB3434; X-Forefront-PRVS: 079756C6B9 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(136003)(346002)(366004)(396003)(39860400002)(376002)(189003)(199004)(16586007)(47776003)(81156014)(6666003)(50226002)(8936002)(25786009)(5660300001)(68736007)(81166006)(8676002)(4326008)(106356001)(105586002)(2906002)(4720700003)(69596002)(316002)(21086003)(305945005)(8886007)(7736002)(66066001)(33026002)(107886003)(956004)(3846002)(476003)(48376002)(51416003)(478600001)(97736004)(7696005)(52116002)(55016002)(53936002)(14444005)(26005)(36756003)(186003)(16526019)(386003)(50466002)(76176011)(2616005)(86362001)(6116002)(11346002)(446003)(486006); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR05MB3434; H:mellanox.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; Received-SPF: None (protection.outlook.com: mellanox.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; HE1PR05MB3434; 23:vhH1RDpxHhEw6W8EyvANolnn+LGRoTXIjODtU9aZG?= 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 X-Microsoft-Antispam-Message-Info: kcnrZ9JYAS5V3vArD+KpV4mYw/i5KEew6PTdHofrPx5v2kNxwdxY/kpYVl5ixsSoUMALsZKx/h/9uFj99aVCkugrIf2i9COUiA3KWrDpY/gxR2FoP7JXdB2NyhXK0fPKFjZqMk36Dpv5r4lS+ACVHnV5B4kiKAeS4dWnYMHjSzt2299XYgmUbz9ORFxUhHZOcFA09pukVPNvRPR4DIe5s7LTBYevakD3iJbzwjbTL8edVjDZT61T2UrfNiMnO9Ptbca0UehxS19Sw79cpAvYszRSsKQoOaE/ev3h2pE4vrayQIySGjal4ijVpiB8Yvjrvnb+SYpw5xMvlpZthxH8jmxc+fPxA8xIMmR8rWm1xRg= X-Microsoft-Exchange-Diagnostics: 1; HE1PR05MB3434; 6:sk82tArYbn07OS/HmhA548eGp4J4OXnqHYAVNSpxMh9h68+JTjcqBsrcqMioYFOnb1Av3N7p58Dixyq4GSAZyr/TF4ilvjav7NYw8LShiznMNP+v07xWu5ZsJplE2ORBgJrtwA5a8jJyQODsqF9IZwqyMHN0CffzpRb3fMgoi1afAaJXkqOQ9IVzCo94W1/+PSyCeadrzroXl9VLaefiWZUK2cxUoRHu5BGcE9ia043Qu26jed7XT+dBlsb2uSkd0cxzEoQ+Vm0CpNuCITKTrNqtq7+fCMy1Od/bPz8OI6p06poECaVGYbK43L7hl+hiUjr8DevIHCqbzNBRuoFiFP1pWzVWkKCZk12FTyjnVVbt0x34xjUNIyqpGEfFoE/j/7De03P3udpsG41oD8iRRpyI49X04dDCylxZCTpiCHJstIrOpVRD13JuheedOgyZ4FrCgJxzfEsXEoZ51lFP4A==; 5:t9tlqum7GfKWc/+oDpOeP+i5ckVAAzpbZiEdXn6VjTRNScVl/a9LczdQcuaXGAf/8n5ll4jA3qHeESSLCw7JqZ6HI+WKLrep+bz4KuBsayFyDKkeIyG+2VNHW8XrggK5GUQZE3cSWUMXTHWVK1Sc061qTE31ojlInNm3fCNUWf4=; 7:0qzzwHqObBOzoB6KaXxAx7a9GZ/RW5sOSZ7kq7vQIvb9F254bhhobZZFj/TOxUD2b3SEsTaczM3khxXDvMF0fmDRX4tNm6nceSyd7dCfikhUy/MObGTq7JKXYUX79IzvEJB5iVx/bL37i79ngnCmFLezJmF9maTAv2U7Nft+LbXT7MDZNM2QafTcK8WhyqzXiq9Mvv9hWF3qf6mCMLWUkG2Cr58J6oQ9zqVAn+KaIz/Qov3R+YB6ddft5306Z1/s SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-OriginatorOrg: Mellanox.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Sep 2018 16:56:33.8572 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 99759dbc-494a-4028-086e-08d61bf55cd8 X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: a652971c-7d2e-4d9b-a6a4-d149256f461b X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR05MB3434 Subject: [dpdk-dev] [PATCH 2/3] ethdev: convert testpmd encap commands to new API X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" Currently there are 2 encapsulation commands in testpmd one for VXLAN and one for NVGRE, both of those commands are using the old rte encap command. This commit update the commands to work with the new tunnel encap actions. The reason that we have different encapsulation commands, one for VXLAN and one for NVGRE is the ease of use in testpmd, both commands are using the same rte flow action for tunnel encap. Signed-off-by: Ori Kam --- app/test-pmd/cmdline_flow.c | 294 +++++++++++++++++++++----------------------- 1 file changed, 137 insertions(+), 157 deletions(-) diff --git a/app/test-pmd/cmdline_flow.c b/app/test-pmd/cmdline_flow.c index f926060..349e822 100644 --- a/app/test-pmd/cmdline_flow.c +++ b/app/test-pmd/cmdline_flow.c @@ -262,37 +262,13 @@ struct action_rss_data { uint16_t queue[ACTION_RSS_QUEUE_NUM]; }; -/** Maximum number of items in struct rte_flow_action_vxlan_encap. */ -#define ACTION_VXLAN_ENCAP_ITEMS_NUM 6 - -/** Storage for struct rte_flow_action_vxlan_encap including external data. */ -struct action_vxlan_encap_data { - struct rte_flow_action_vxlan_encap conf; - struct rte_flow_item items[ACTION_VXLAN_ENCAP_ITEMS_NUM]; - struct rte_flow_item_eth item_eth; - struct rte_flow_item_vlan item_vlan; - union { - struct rte_flow_item_ipv4 item_ipv4; - struct rte_flow_item_ipv6 item_ipv6; - }; - struct rte_flow_item_udp item_udp; - struct rte_flow_item_vxlan item_vxlan; -}; +/** Maximum buffer size for the encap data. */ +#define ACTION_TUNNEL_ENCAP_MAX_BUFFER_SIZE 64 -/** Maximum number of items in struct rte_flow_action_nvgre_encap. */ -#define ACTION_NVGRE_ENCAP_ITEMS_NUM 5 - -/** Storage for struct rte_flow_action_nvgre_encap including external data. */ -struct action_nvgre_encap_data { - struct rte_flow_action_nvgre_encap conf; - struct rte_flow_item items[ACTION_NVGRE_ENCAP_ITEMS_NUM]; - struct rte_flow_item_eth item_eth; - struct rte_flow_item_vlan item_vlan; - union { - struct rte_flow_item_ipv4 item_ipv4; - struct rte_flow_item_ipv6 item_ipv6; - }; - struct rte_flow_item_nvgre item_nvgre; +/** Storage for struct rte_flow_action_tunnel_encap including external data. */ +struct action_tunnel_encap_data { + struct rte_flow_action_tunnel_encap conf; + uint8_t buf[ACTION_TUNNEL_ENCAP_MAX_BUFFER_SIZE]; }; /** Maximum number of subsequent tokens and arguments on the stack. */ @@ -2438,8 +2414,8 @@ static int comp_vc_action_rss_queue(struct context *, const struct token *, .name = "vxlan_encap", .help = "VXLAN encapsulation, uses configuration set by \"set" " vxlan\"", - .priv = PRIV_ACTION(VXLAN_ENCAP, - sizeof(struct action_vxlan_encap_data)), + .priv = PRIV_ACTION(TUNNEL_ENCAP, + sizeof(struct action_tunnel_encap_data)), .next = NEXT(NEXT_ENTRY(ACTION_NEXT)), .call = parse_vc_action_vxlan_encap, }, @@ -2448,7 +2424,7 @@ static int comp_vc_action_rss_queue(struct context *, const struct token *, .help = "Performs a decapsulation action by stripping all" " headers of the VXLAN tunnel network overlay from the" " matched flow.", - .priv = PRIV_ACTION(VXLAN_DECAP, 0), + .priv = PRIV_ACTION(TUNNEL_DECAP, 0), .next = NEXT(NEXT_ENTRY(ACTION_NEXT)), .call = parse_vc, }, @@ -2456,8 +2432,8 @@ static int comp_vc_action_rss_queue(struct context *, const struct token *, .name = "nvgre_encap", .help = "NVGRE encapsulation, uses configuration set by \"set" " nvgre\"", - .priv = PRIV_ACTION(NVGRE_ENCAP, - sizeof(struct action_nvgre_encap_data)), + .priv = PRIV_ACTION(TUNNEL_ENCAP, + sizeof(struct action_tunnel_encap_data)), .next = NEXT(NEXT_ENTRY(ACTION_NEXT)), .call = parse_vc_action_nvgre_encap, }, @@ -2466,7 +2442,7 @@ static int comp_vc_action_rss_queue(struct context *, const struct token *, .help = "Performs a decapsulation action by stripping all" " headers of the NVGRE tunnel network overlay from the" " matched flow.", - .priv = PRIV_ACTION(NVGRE_DECAP, 0), + .priv = PRIV_ACTION(TUNNEL_DECAP, 0), .next = NEXT(NEXT_ENTRY(ACTION_NEXT)), .call = parse_vc, }, @@ -3034,6 +3010,9 @@ static int comp_vc_action_rss_queue(struct context *, const struct token *, return len; } +/** IP next protocol UDP. */ +#define IP_PROTO_UDP 0x11 + /** Parse VXLAN encap action. */ static int parse_vc_action_vxlan_encap(struct context *ctx, const struct token *token, @@ -3042,7 +3021,32 @@ static int comp_vc_action_rss_queue(struct context *, const struct token *, { struct buffer *out = buf; struct rte_flow_action *action; - struct action_vxlan_encap_data *action_vxlan_encap_data; + struct action_tunnel_encap_data *action_vxlan_encap_data; + struct rte_flow_item_eth eth = { .type = 0, }; + struct rte_flow_item_vlan vlan = { + .tci = vxlan_encap_conf.vlan_tci, + .inner_type = 0, + }; + struct rte_flow_item_ipv4 ipv4 = { + .hdr = { + .src_addr = vxlan_encap_conf.ipv4_src, + .dst_addr = vxlan_encap_conf.ipv4_dst, + .next_proto_id = IP_PROTO_UDP, + }, + }; + struct rte_flow_item_ipv6 ipv6 = { + .hdr = { + .proto = IP_PROTO_UDP, + }, + }; + struct rte_flow_item_udp udp = { + .hdr = { + .src_port = vxlan_encap_conf.udp_src, + .dst_port = vxlan_encap_conf.udp_dst, + }, + }; + struct rte_flow_item_vxlan vxlan = { .flags = 0, }; + uint8_t *header; int ret; ret = parse_vc(ctx, token, str, len, buf, size); @@ -3057,83 +3061,58 @@ static int comp_vc_action_rss_queue(struct context *, const struct token *, /* Point to selected object. */ ctx->object = out->args.vc.data; ctx->objmask = NULL; - /* Set up default configuration. */ + /* Copy the headers to the buffer. */ action_vxlan_encap_data = ctx->object; - *action_vxlan_encap_data = (struct action_vxlan_encap_data){ - .conf = (struct rte_flow_action_vxlan_encap){ - .definition = action_vxlan_encap_data->items, - }, - .items = { - { - .type = RTE_FLOW_ITEM_TYPE_ETH, - .spec = &action_vxlan_encap_data->item_eth, - .mask = &rte_flow_item_eth_mask, - }, - { - .type = RTE_FLOW_ITEM_TYPE_VLAN, - .spec = &action_vxlan_encap_data->item_vlan, - .mask = &rte_flow_item_vlan_mask, - }, - { - .type = RTE_FLOW_ITEM_TYPE_IPV4, - .spec = &action_vxlan_encap_data->item_ipv4, - .mask = &rte_flow_item_ipv4_mask, - }, - { - .type = RTE_FLOW_ITEM_TYPE_UDP, - .spec = &action_vxlan_encap_data->item_udp, - .mask = &rte_flow_item_udp_mask, - }, - { - .type = RTE_FLOW_ITEM_TYPE_VXLAN, - .spec = &action_vxlan_encap_data->item_vxlan, - .mask = &rte_flow_item_vxlan_mask, - }, - { - .type = RTE_FLOW_ITEM_TYPE_END, - }, - }, - .item_eth.type = 0, - .item_vlan = { - .tci = vxlan_encap_conf.vlan_tci, - .inner_type = 0, - }, - .item_ipv4.hdr = { - .src_addr = vxlan_encap_conf.ipv4_src, - .dst_addr = vxlan_encap_conf.ipv4_dst, + *action_vxlan_encap_data = (struct action_tunnel_encap_data) { + .conf = (struct rte_flow_action_tunnel_encap){ + .buf = action_vxlan_encap_data->buf, }, - .item_udp.hdr = { - .src_port = vxlan_encap_conf.udp_src, - .dst_port = vxlan_encap_conf.udp_dst, - }, - .item_vxlan.flags = 0, + .buf = {}, }; - memcpy(action_vxlan_encap_data->item_eth.dst.addr_bytes, + header = action_vxlan_encap_data->buf; + if (vxlan_encap_conf.select_vlan) + eth.type = rte_cpu_to_be_16(ETHER_TYPE_VLAN); + else if (vxlan_encap_conf.select_ipv4) + eth.type = rte_cpu_to_be_16(ETHER_TYPE_IPv4); + else + eth.type = rte_cpu_to_be_16(ETHER_TYPE_IPv6); + memcpy(eth.dst.addr_bytes, vxlan_encap_conf.eth_dst, ETHER_ADDR_LEN); - memcpy(action_vxlan_encap_data->item_eth.src.addr_bytes, + memcpy(eth.src.addr_bytes, vxlan_encap_conf.eth_src, ETHER_ADDR_LEN); - if (!vxlan_encap_conf.select_ipv4) { - memcpy(&action_vxlan_encap_data->item_ipv6.hdr.src_addr, + memcpy(header, ð, sizeof(eth)); + header += sizeof(eth); + if (vxlan_encap_conf.select_vlan) { + if (vxlan_encap_conf.select_ipv4) + vlan.inner_type = rte_cpu_to_be_16(ETHER_TYPE_IPv4); + else + vlan.inner_type = rte_cpu_to_be_16(ETHER_TYPE_IPv6); + memcpy(header, &vlan, sizeof(vlan)); + header += sizeof(vlan); + } + if (vxlan_encap_conf.select_ipv4) { + memcpy(header, &ipv4, sizeof(ipv4)); + header += sizeof(ipv4); + } else { + memcpy(&ipv6.hdr.src_addr, &vxlan_encap_conf.ipv6_src, sizeof(vxlan_encap_conf.ipv6_src)); - memcpy(&action_vxlan_encap_data->item_ipv6.hdr.dst_addr, + memcpy(&ipv6.hdr.dst_addr, &vxlan_encap_conf.ipv6_dst, sizeof(vxlan_encap_conf.ipv6_dst)); - action_vxlan_encap_data->items[2] = (struct rte_flow_item){ - .type = RTE_FLOW_ITEM_TYPE_IPV6, - .spec = &action_vxlan_encap_data->item_ipv6, - .mask = &rte_flow_item_ipv6_mask, - }; + memcpy(header, &ipv6, sizeof(ipv6)); + header += sizeof(ipv6); } - if (!vxlan_encap_conf.select_vlan) - action_vxlan_encap_data->items[1].type = - RTE_FLOW_ITEM_TYPE_VOID; - memcpy(action_vxlan_encap_data->item_vxlan.vni, vxlan_encap_conf.vni, - RTE_DIM(vxlan_encap_conf.vni)); + memcpy(header, &udp, sizeof(udp)); + header += sizeof(udp); + memcpy(vxlan.vni, vxlan_encap_conf.vni, RTE_DIM(vxlan_encap_conf.vni)); + memcpy(header, &vxlan, sizeof(vxlan)); + header += sizeof(vxlan); + action_vxlan_encap_data->conf.size = header - + action_vxlan_encap_data->buf; action->conf = &action_vxlan_encap_data->conf; return ret; } - /** Parse NVGRE encap action. */ static int parse_vc_action_nvgre_encap(struct context *ctx, const struct token *token, @@ -3142,7 +3121,26 @@ static int comp_vc_action_rss_queue(struct context *, const struct token *, { struct buffer *out = buf; struct rte_flow_action *action; - struct action_nvgre_encap_data *action_nvgre_encap_data; + struct action_tunnel_encap_data *action_nvgre_encap_data; + struct rte_flow_item_eth eth = { .type = 0, }; + struct rte_flow_item_vlan vlan = { + .tci = nvgre_encap_conf.vlan_tci, + .inner_type = 0, + }; + struct rte_flow_item_ipv4 ipv4 = { + .hdr = { + .src_addr = nvgre_encap_conf.ipv4_src, + .dst_addr = nvgre_encap_conf.ipv4_dst, + .next_proto_id = IP_PROTO_UDP, + }, + }; + struct rte_flow_item_ipv6 ipv6 = { + .hdr = { + .proto = IP_PROTO_UDP, + }, + }; + struct rte_flow_item_nvgre nvgre = { .flow_id = 0, }; + uint8_t *header; int ret; ret = parse_vc(ctx, token, str, len, buf, size); @@ -3157,74 +3155,56 @@ static int comp_vc_action_rss_queue(struct context *, const struct token *, /* Point to selected object. */ ctx->object = out->args.vc.data; ctx->objmask = NULL; - /* Set up default configuration. */ + /* Copy the headers to the buffer. */ action_nvgre_encap_data = ctx->object; - *action_nvgre_encap_data = (struct action_nvgre_encap_data){ - .conf = (struct rte_flow_action_nvgre_encap){ - .definition = action_nvgre_encap_data->items, - }, - .items = { - { - .type = RTE_FLOW_ITEM_TYPE_ETH, - .spec = &action_nvgre_encap_data->item_eth, - .mask = &rte_flow_item_eth_mask, - }, - { - .type = RTE_FLOW_ITEM_TYPE_VLAN, - .spec = &action_nvgre_encap_data->item_vlan, - .mask = &rte_flow_item_vlan_mask, - }, - { - .type = RTE_FLOW_ITEM_TYPE_IPV4, - .spec = &action_nvgre_encap_data->item_ipv4, - .mask = &rte_flow_item_ipv4_mask, - }, - { - .type = RTE_FLOW_ITEM_TYPE_NVGRE, - .spec = &action_nvgre_encap_data->item_nvgre, - .mask = &rte_flow_item_nvgre_mask, - }, - { - .type = RTE_FLOW_ITEM_TYPE_END, - }, - }, - .item_eth.type = 0, - .item_vlan = { - .tci = nvgre_encap_conf.vlan_tci, - .inner_type = 0, - }, - .item_ipv4.hdr = { - .src_addr = nvgre_encap_conf.ipv4_src, - .dst_addr = nvgre_encap_conf.ipv4_dst, + *action_nvgre_encap_data = (struct action_tunnel_encap_data) { + .conf = (struct rte_flow_action_tunnel_encap){ + .buf = action_nvgre_encap_data->buf, }, - .item_nvgre.flow_id = 0, + .buf = {}, }; - memcpy(action_nvgre_encap_data->item_eth.dst.addr_bytes, + header = action_nvgre_encap_data->buf; + if (nvgre_encap_conf.select_vlan) + eth.type = rte_cpu_to_be_16(ETHER_TYPE_VLAN); + else if (nvgre_encap_conf.select_ipv4) + eth.type = rte_cpu_to_be_16(ETHER_TYPE_IPv4); + else + eth.type = rte_cpu_to_be_16(ETHER_TYPE_IPv6); + memcpy(eth.dst.addr_bytes, nvgre_encap_conf.eth_dst, ETHER_ADDR_LEN); - memcpy(action_nvgre_encap_data->item_eth.src.addr_bytes, + memcpy(eth.src.addr_bytes, nvgre_encap_conf.eth_src, ETHER_ADDR_LEN); - if (!nvgre_encap_conf.select_ipv4) { - memcpy(&action_nvgre_encap_data->item_ipv6.hdr.src_addr, + memcpy(header, ð, sizeof(eth)); + header += sizeof(eth); + if (nvgre_encap_conf.select_vlan) { + if (nvgre_encap_conf.select_ipv4) + vlan.inner_type = rte_cpu_to_be_16(ETHER_TYPE_IPv4); + else + vlan.inner_type = rte_cpu_to_be_16(ETHER_TYPE_IPv6); + memcpy(header, &vlan, sizeof(vlan)); + header += sizeof(vlan); + } + if (nvgre_encap_conf.select_ipv4) { + memcpy(header, &ipv4, sizeof(ipv4)); + header += sizeof(ipv4); + } else { + memcpy(&ipv6.hdr.src_addr, &nvgre_encap_conf.ipv6_src, sizeof(nvgre_encap_conf.ipv6_src)); - memcpy(&action_nvgre_encap_data->item_ipv6.hdr.dst_addr, + memcpy(&ipv6.hdr.dst_addr, &nvgre_encap_conf.ipv6_dst, sizeof(nvgre_encap_conf.ipv6_dst)); - action_nvgre_encap_data->items[2] = (struct rte_flow_item){ - .type = RTE_FLOW_ITEM_TYPE_IPV6, - .spec = &action_nvgre_encap_data->item_ipv6, - .mask = &rte_flow_item_ipv6_mask, - }; + memcpy(header, &ipv6, sizeof(ipv6)); + header += sizeof(ipv6); } - if (!nvgre_encap_conf.select_vlan) - action_nvgre_encap_data->items[1].type = - RTE_FLOW_ITEM_TYPE_VOID; - memcpy(action_nvgre_encap_data->item_nvgre.tni, nvgre_encap_conf.tni, - RTE_DIM(nvgre_encap_conf.tni)); + memcpy(nvgre.tni, nvgre_encap_conf.tni, RTE_DIM(nvgre_encap_conf.tni)); + memcpy(header, &nvgre, sizeof(nvgre)); + header += sizeof(nvgre); + action_nvgre_encap_data->conf.size = header - + action_nvgre_encap_data->buf; action->conf = &action_nvgre_encap_data->conf; return ret; } - /** Parse tokens for destroy command. */ static int parse_destroy(struct context *ctx, const struct token *token, From patchwork Sun Sep 16 16:53:44 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ori Kam X-Patchwork-Id: 44767 X-Patchwork-Delegate: ferruh.yigit@amd.com Return-Path: X-Original-To: patchwork@dpdk.org Delivered-To: patchwork@dpdk.org Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id B89E95B36; Sun, 16 Sep 2018 18:56:42 +0200 (CEST) Received: from EUR02-AM5-obe.outbound.protection.outlook.com (mail-eopbgr00071.outbound.protection.outlook.com [40.107.0.71]) by dpdk.org (Postfix) with ESMTP id 8370C5B3A for ; Sun, 16 Sep 2018 18:56:41 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Mellanox.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=wK1wxlVEO7/Spa57lJIpEYVWFBLABlyhtPDxbR9P8uk=; b=xCbxco3lKVuYr4x6DQshSzdKFPq6c7EVV3myaj5AGrSLJsnvwzzx+TnVN/c+7NiTKRSQGZrq5zv0ZzFBB2GgU36k2fo+LFpYPtmIhrC2NxyynWbJkAUBQvaQn0Di6UJbbenWpYxEMOh8AjaBBu7S8tSuHNd4VH4AbbAM6uKTiBM= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=orika@mellanox.com; Received: from mellanox.com (37.142.13.130) by HE1PR05MB3434.eurprd05.prod.outlook.com (2603:10a6:7:33::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1143.15; Sun, 16 Sep 2018 16:56:37 +0000 From: Ori Kam To: arybchenko@solarflare.com, ferruh.yigit@intel.com, stephen@networkplumber.org, adrien.mazarguil@6wind.com Cc: dev@dpdk.org, dekelp@mellanox.com, thomas@monjalon.net, nelio.laranjeiro@6wind.com, yskoh@mellanox.com, orika@mellanox.com Date: Sun, 16 Sep 2018 16:53:44 +0000 Message-Id: <1537116824-191205-4-git-send-email-orika@mellanox.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1537116824-191205-1-git-send-email-orika@mellanox.com> References: <1537116824-191205-1-git-send-email-orika@mellanox.com> MIME-Version: 1.0 X-Originating-IP: [37.142.13.130] X-ClientProxiedBy: DB6P193CA0021.EURP193.PROD.OUTLOOK.COM (2603:10a6:6:29::31) To HE1PR05MB3434.eurprd05.prod.outlook.com (2603:10a6:7:33::24) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: a87d738a-b86f-4147-136e-08d61bf55f2c X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989137)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(4618075)(2017052603328)(7153060)(7193020); SRVR:HE1PR05MB3434; X-Microsoft-Exchange-Diagnostics: 1; HE1PR05MB3434; 3:Q0Fk3SborpNdDDQY6pW5L9AmCF+udXJhSXmktyyhH7AuU8BuC2ku31uXmpp9uNcseyzwdCWxciwqAU9SUS2ODFA3yKC/jcVRe3vRWwP2aqVLxKiFosr19Jp4hh60+yapaXSMY9hTOuOrIHuZjxZoXoQ0M+0tSXfXio5xmEA5XEi4wAMfYNxWP82L9AOt4zJ3u5CA4mDjGFYmzIKZJK8idAAXbAeSX58pabGb5AOIsFiZGj/U0Cz1g1sH3GLkQSJB; 25:MH+7k5DSWXJMvWk1wDik0zfYdTejxpePEtWvRnWCEzm6XwzWxFVBOQk6H6ZCWXiUwEU9h8u4TlA8cLSc6+GQY9oAzrZj2Kz4y+ZBWnngOtdgrMI9UevRhDvrpTBdEd128fi21mwvwK3ejvCsgLeMvoG0L10tURvh451jPeWVUiJ/qUHECIlf1yLiW29jE4Il3CmrAdtgIOYAMBCzjVdNVtcegymBvGsyyRQB8SjmMSyGeLew9PPjREdTyGbNyIBJsy3ezgK2BtxYW07EBpgnqjxlcpFU7i2GnWxeZuvi8tgiZ1K2XcGvLiXTImnCKRlwQ8HMbvepbrVThBvqQ6xWPg==; 31:OEpTD/GR+vCLRdjTtMxlBG8gm5UAMGxZZJgm1YdvV2VomuEaz2M7A6gLrmWGZsW5utGuY9vH4jUjrPnzj1BO61JD8KCPZKNepn6GfiZSziXeGicVZ06iWBdlVJvsWXWpjCZA/YVST45ZYgO13dS8J6bNs5WgdltRVCclPvDPQQysOoa0QNDCxu60uYTM2TUTOd9eJ+0MAOy/dmTthRYTlV9Uc5d/YqtvclmZyEplcEg= X-MS-TrafficTypeDiagnostic: HE1PR05MB3434: X-LD-Processed: a652971c-7d2e-4d9b-a6a4-d149256f461b,ExtAddr X-Microsoft-Exchange-Diagnostics: 1; HE1PR05MB3434; 20:CmmRkMyfcmNdNJ3P5zRyudTaLU8LDh58q0+52eAueZ6BaecV97vKfLH3nlmNhEtfEB4Jp716CFVWfe4dAxPAgOQiQFsvgyFdjB3c8cTgpyKu33PIDJtvv22Y2ujrYE1g0bQx62XFX9CHEmSkjGHPuUNeeiwG4V4OUO93YQxcSBE+VU4wswdjpfWXkx8wa4JgHUZaOxenuKC0e9RtmxE7E4Vu9p6kd82UcJjCbMGu/DE2ODmev596dDjm+Aq81nLgzRu4eXR0KtnGfyih8Ifu4g/M2pA61KaCVd+1nH3H9JU/AdmWbuHOHiSHMWkwq6pSFyfsnmo/HjolwCucIoBORgyJNt9dditsb6nM3VdE0Kh2PVav+zKg9xZRg6d6sDkmyuh7v9HaAbVge9t25KkxQ9hTzMVfiLWvx+7hIHDh2aOLRVwmazAtBrp/EfBvyQjyGl1ZHQ7VNYvOm6MKvlDxuHLjlBGK58vjNWf1GUuvuUDv7i94v2n0RN+QnspqutBi; 4:VnPCkINxfVTzVAu8uMa/4KBOOC2s8iWU+jFd9odvt0vS4Pwkctz0HWkNzXDIjMNcaQU119SnNAzJhnTk/HCNJBnkJJhfOACgqsFzZKvmzEIpJeh83Cm4v2A6uVJiz3mrYN9IKYSl/gPca5J6TmHDp2hqLfk9hC76mmmWK9px8mpOOay9O9QycP10jsVBShFnml/7Hk9TdM8Pk66LwAjNYusWnQGokCpQf/vffTdkAFZSseQw9kHEuIsw+VkRBeL0QOMPY02VbKQH8h+3Uf1NAQ== X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:; X-MS-Exchange-SenderADCheck: 1 X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(3231355)(944501410)(52105095)(10201501046)(3002001)(93006095)(93001095)(6055026)(149027)(150027)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(20161123560045)(20161123562045)(20161123564045)(201708071742011)(7699050); SRVR:HE1PR05MB3434; BCL:0; PCL:0; RULEID:; SRVR:HE1PR05MB3434; X-Forefront-PRVS: 079756C6B9 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(136003)(346002)(366004)(396003)(39860400002)(376002)(189003)(199004)(16586007)(47776003)(81156014)(6666003)(50226002)(8936002)(25786009)(5660300001)(68736007)(81166006)(8676002)(4326008)(106356001)(105586002)(2906002)(4720700003)(69596002)(316002)(21086003)(305945005)(8886007)(7736002)(66066001)(33026002)(107886003)(956004)(3846002)(476003)(48376002)(51416003)(478600001)(97736004)(7696005)(52116002)(55016002)(53936002)(26005)(36756003)(186003)(16526019)(386003)(50466002)(76176011)(2616005)(86362001)(6116002)(11346002)(446003)(486006); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR05MB3434; H:mellanox.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; Received-SPF: None (protection.outlook.com: mellanox.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; HE1PR05MB3434; 23:pcaLl0g6NwE1AwaQLELSm+82tm+Cw4cJXjWfXLRbw?= 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 X-Microsoft-Antispam-Message-Info: cpxglRIIfg/joiR/YhPmA8oXLmiWgHFbIBGXJZlwhyev+TfiHOCae+6O7g+QmLtQKrXDbw+A6F3HGfQoaCsvS7YuwljOlkBNHsqvAuw38Fx4zMk8NBuCI+8PLN331FBlWJa4dWHP1bO1X8+C0CUMpfPsqfL/UfHFxHIW+rc9njbXxqnlz7Xir7WtcTg8L9vewLlTznFBZHUNEiWiwhxeQCQArJDYxQg6K/ZoZzBmcE/JtVoOAEWtW7Qkg9ylPWh9Pokdi77Z+qvZA+jFVRqZOYHH4xKsWn+LHZjWNQjt3O1uewYj8yXBQj4V5iG3PRhTqH7BM77B4JO6ysSPQFO0IvI8TRwUXrqr5Vb3MjTzL3I= X-Microsoft-Exchange-Diagnostics: 1; HE1PR05MB3434; 6:1GY3P6ZfmZQRcFFMgWdCBKA4hoDaFmyfgmyFkncc+HweaXFtg8G9VlaBN/kuYeJu4MGTMVAeVF044Hf/Nwg2dJpDWWkABnVVvkBVCTPIUrOo6U5vXOtdNnoz3qQcaTAkjhORrL4+Ahz5NHer6IFqZxTfOqkh6kLtEjedBhvtVfsNKKjXVpYUg6K1XMJCJ2Fno5mwv74DgghVxcyLnKGW0/+kf/WE1cOT0v+b7pO0Bb819NCgzTMHhj7PkQ5cp+QNbBfYmCOASTl7okVFL9Yiu06WxW3RR1Qo9Jj7SlDnYjFQ1NS2qeLW1iQjmmka2qtU+djovI1ljcr1dvojuilc+K3Yt6aF2jUApv20bcht9Te+QKjy75upQFVWExy/c0AHF6d6uZ3Q1xPHzlMrCXU/mRj3ziWkxx+qwn9NAqcfocQoCSut9O/17lAABHoeLTJpFTMtAdmCWVEA9lzkR5ArHw==; 5:tA6EB0wbkRJuY/z2ESBIbxaHK9w755pAAzodRMF7YEt7UZ/0TK65So2D5/RNIXBAqSVU4hsr2dfRzF07YtVVGOLPbAHCDE37CzaSahXh7eNk187cozp/8ml89wFx2rPGVf4qaPyyXNMm2lQIylpKVALfMzXKrmDbZOV1yKX3YUs=; 7:2WJw2gwHtE2i+7JYTkz8TEXpOnu6MJ0RiqpodSDp8PN4yCcYPGK92qMUfbjlCGqfe/gft9OfuRlhxGVerxdzot0dfFIW1q9jCawKicQKeuAkqPntx6my3Yrw39/wU5adefoGcgSqHeuPGFTBcPssNIjZYt7sPN9ZlLK4m4DX57VRb5jRV62ahmSNxZY9ljB/MCmVlCrtB1NONlu5Y0lBGL/IwqFIZvdHgUSyaLbiYbnphjGqLLj4sgKH0/2MFBN4 SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-OriginatorOrg: Mellanox.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Sep 2018 16:56:37.8571 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: a87d738a-b86f-4147-136e-08d61bf55f2c X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: a652971c-7d2e-4d9b-a6a4-d149256f461b X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR05MB3434 Subject: [dpdk-dev] [PATCH 3/3] ethdev: remove vxlan and nvgre encapsulation commands X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" This patch removes the VXLAN and NVGRE encapsulation commands. Those commands are subset of the TUNNEL_ENCAP command so there is no need to keep both versions. Signed-off-by: Ori Kam --- doc/guides/prog_guide/rte_flow.rst | 107 ------------------------------------- lib/librte_ethdev/rte_flow.h | 34 ------------ 2 files changed, 141 deletions(-) diff --git a/doc/guides/prog_guide/rte_flow.rst b/doc/guides/prog_guide/rte_flow.rst index 0f29435..b600b2d 100644 --- a/doc/guides/prog_guide/rte_flow.rst +++ b/doc/guides/prog_guide/rte_flow.rst @@ -1969,113 +1969,6 @@ Implements ``OFPAT_PUSH_MPLS`` ("push a new MPLS tag") as defined by the | ``ethertype`` | EtherType | +---------------+-----------+ -Action: ``VXLAN_ENCAP`` -^^^^^^^^^^^^^^^^^^^^^^^ - -Performs a VXLAN encapsulation action by encapsulating the matched flow in the -VXLAN tunnel as defined in the``rte_flow_action_vxlan_encap`` flow items -definition. - -This action modifies the payload of matched flows. The flow definition specified -in the ``rte_flow_action_tunnel_encap`` action structure must define a valid -VLXAN network overlay which conforms with RFC 7348 (Virtual eXtensible Local -Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks -over Layer 3 Networks). The pattern must be terminated with the -RTE_FLOW_ITEM_TYPE_END item type. - -.. _table_rte_flow_action_vxlan_encap: - -.. table:: VXLAN_ENCAP - - +----------------+-------------------------------------+ - | Field | Value | - +================+=====================================+ - | ``definition`` | Tunnel end-point overlay definition | - +----------------+-------------------------------------+ - -.. _table_rte_flow_action_vxlan_encap_example: - -.. table:: IPv4 VxLAN flow pattern example. - - +-------+----------+ - | Index | Item | - +=======+==========+ - | 0 | Ethernet | - +-------+----------+ - | 1 | IPv4 | - +-------+----------+ - | 2 | UDP | - +-------+----------+ - | 3 | VXLAN | - +-------+----------+ - | 4 | END | - +-------+----------+ - -Action: ``VXLAN_DECAP`` -^^^^^^^^^^^^^^^^^^^^^^^ - -Performs a decapsulation action by stripping all headers of the VXLAN tunnel -network overlay from the matched flow. - -The flow items pattern defined for the flow rule with which a ``VXLAN_DECAP`` -action is specified, must define a valid VXLAN tunnel as per RFC7348. If the -flow pattern does not specify a valid VXLAN tunnel then a -RTE_FLOW_ERROR_TYPE_ACTION error should be returned. - -This action modifies the payload of matched flows. - -Action: ``NVGRE_ENCAP`` -^^^^^^^^^^^^^^^^^^^^^^^ - -Performs a NVGRE encapsulation action by encapsulating the matched flow in the -NVGRE tunnel as defined in the``rte_flow_action_tunnel_encap`` flow item -definition. - -This action modifies the payload of matched flows. The flow definition specified -in the ``rte_flow_action_tunnel_encap`` action structure must defined a valid -NVGRE network overlay which conforms with RFC 7637 (NVGRE: Network -Virtualization Using Generic Routing Encapsulation). The pattern must be -terminated with the RTE_FLOW_ITEM_TYPE_END item type. - -.. _table_rte_flow_action_nvgre_encap: - -.. table:: NVGRE_ENCAP - - +----------------+-------------------------------------+ - | Field | Value | - +================+=====================================+ - | ``definition`` | NVGRE end-point overlay definition | - +----------------+-------------------------------------+ - -.. _table_rte_flow_action_nvgre_encap_example: - -.. table:: IPv4 NVGRE flow pattern example. - - +-------+----------+ - | Index | Item | - +=======+==========+ - | 0 | Ethernet | - +-------+----------+ - | 1 | IPv4 | - +-------+----------+ - | 2 | NVGRE | - +-------+----------+ - | 3 | END | - +-------+----------+ - -Action: ``NVGRE_DECAP`` -^^^^^^^^^^^^^^^^^^^^^^^ - -Performs a decapsulation action by stripping all headers of the NVGRE tunnel -network overlay from the matched flow. - -The flow items pattern defined for the flow rule with which a ``NVGRE_DECAP`` -action is specified, must define a valid NVGRE tunnel as per RFC7637. If the -flow pattern does not specify a valid NVGRE tunnel then a -RTE_FLOW_ERROR_TYPE_ACTION error should be returned. - -This action modifies the payload of matched flows. - Action: ``TUNNEL_ENCAP`` ^^^^^^^^^^^^^^^^^^^^^^^^ diff --git a/lib/librte_ethdev/rte_flow.h b/lib/librte_ethdev/rte_flow.h index d1f7ebf..9505281 100644 --- a/lib/librte_ethdev/rte_flow.h +++ b/lib/librte_ethdev/rte_flow.h @@ -1473,40 +1473,6 @@ enum rte_flow_action_type { RTE_FLOW_ACTION_TYPE_OF_PUSH_MPLS, /** - * Encapsulate flow in VXLAN tunnel as defined in - * rte_flow_action_vxlan_encap action structure. - * - * See struct rte_flow_action_vxlan_encap. - */ - RTE_FLOW_ACTION_TYPE_VXLAN_ENCAP, - - /** - * Decapsulate outer most VXLAN tunnel from matched flow. - * - * If flow pattern does not define a valid VXLAN tunnel (as specified by - * RFC7348) then the PMD should return a RTE_FLOW_ERROR_TYPE_ACTION - * error. - */ - RTE_FLOW_ACTION_TYPE_VXLAN_DECAP, - - /** - * Encapsulate flow in NVGRE tunnel defined in the - * rte_flow_action_nvgre_encap action structure. - * - * See struct rte_flow_action_nvgre_encap. - */ - RTE_FLOW_ACTION_TYPE_NVGRE_ENCAP, - - /** - * Decapsulate outer most NVGRE tunnel from matched flow. - * - * If flow pattern does not define a valid NVGRE tunnel (as specified by - * RFC7637) then the PMD should return a RTE_FLOW_ERROR_TYPE_ACTION - * error. - */ - RTE_FLOW_ACTION_TYPE_NVGRE_DECAP, - - /** * Encapsulate the packet with tunnel header as defined in * rte_flow_action_tunnel_encap action structure. *