From patchwork Mon Apr 19 08:29:07 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gregory Etelson X-Patchwork-Id: 91734 X-Patchwork-Delegate: ferruh.yigit@amd.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id EA1CFA0547; Mon, 19 Apr 2021 10:29:39 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 2B29F4120A; Mon, 19 Apr 2021 10:29:35 +0200 (CEST) Received: from NAM12-MW2-obe.outbound.protection.outlook.com (mail-mw2nam12on2057.outbound.protection.outlook.com [40.107.244.57]) by mails.dpdk.org (Postfix) with ESMTP id 1EDA941203 for ; Mon, 19 Apr 2021 10:29:34 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=fnl9aqKj9bd8dN60B8y5Ihsop1hc0A2enPHSQJST49ywLZWHyQ3KOawOk6H/Seo+ils3QtvWQjLzjZJoBSVL1S2X9R423ff9PZ5VYu3D1ci8mi8KqRzDADPX03UfJ5UpKZGigR/PA4+UZjYEG5oGEMp7TLzEPwFBCD8r/o3DLp/HI4AaeDeAIxgqnU9ug0s3cqmGstuHWDtUgqyS6yipyqj978XF3287USKF0SunWxc+AAPAwwaHZKKaLLuV80ilJwn73HDaDyoL/Ggrzq5RLw8/vhSqMPIX1rIL5eaRnZyGANpBBsLE8MbmE0E7XBroWlAsX5u5Yhlx35FhBE16iw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=bi/eoqlYV/Rbge8gDMoaJKgK4YFbkb5Rgfxp+BKtaWc=; b=VtOOMC5il+aksqNSYd0MRQ6scwSSa/SJPwml9fpbbmimT39Fu3FBETcpnooP4qUY9op8iEFwxOLDtMkgJ4tcczWbC9nPusS1YqtJOwyhv2K6RuYdUyT25avMZKQwdrS2KnG4hDic2E84aXWoCweA79pELnmDS7CPhRtlSO3P3ckQy9D+NtHssxX08EdiEk22itzFlz+3QPMv/sfDXPs99QsLeTzaeHSzQAO7ulLbprN7pTMz/UrnXk+/95Tocj3WUPpfxtSZzcDbeiHpxjqqs4Erg+4YnQbE4/+pwmnwgzdALUUnDV0L1/j3XA8oavmtUUXd8r7bEQ1SGbaaGE+ufg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.112.34) smtp.rcpttodomain=gmail.com smtp.mailfrom=nvidia.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=bi/eoqlYV/Rbge8gDMoaJKgK4YFbkb5Rgfxp+BKtaWc=; b=nwsQXys0DeNBnFJApPbFi/FzdVJKXJ0TI3dJzp0X31DDQvBwyS2Mtr/ZhjMvgu2j8wm483dWEEgBjk5bhRohNQjjXiRasz99gb0fgP6DR73Qr0o8zQjJFNW41iB+MC1C0Kwmy5Xi7nOjxfv1P3qKPT9Hhq6MKPKSYddjyP7nh6j6Jh0kYZ6qpmVAHlt+y6W5k5yAOVJDYfJ3PFuEWxCYhNPMV0exxkPqlZC9EpeJfQZaegql8QYqOih/YSYqJPKvtmmfDeibLdvfGl8KhOgzheY6uRVodOPAAXFL+DlZ/nEoEW1SkIK6VIua+uTBbkEXZS8l5PzDsNc9Hineo798qA== Received: from MW4PR04CA0157.namprd04.prod.outlook.com (2603:10b6:303:85::12) by MWHPR12MB1232.namprd12.prod.outlook.com (2603:10b6:300:10::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4042.19; Mon, 19 Apr 2021 08:29:30 +0000 Received: from CO1NAM11FT010.eop-nam11.prod.protection.outlook.com (2603:10b6:303:85:cafe::69) by MW4PR04CA0157.outlook.office365.com (2603:10b6:303:85::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4042.16 via Frontend Transport; Mon, 19 Apr 2021 08:29:30 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.112.34) smtp.mailfrom=nvidia.com; gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.112.34 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.112.34; helo=mail.nvidia.com; Received: from mail.nvidia.com (216.228.112.34) by CO1NAM11FT010.mail.protection.outlook.com (10.13.175.88) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.4042.16 via Frontend Transport; Mon, 19 Apr 2021 08:29:29 +0000 Received: from nvidia.com (172.20.145.6) by HQMAIL107.nvidia.com (172.20.187.13) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Mon, 19 Apr 2021 08:29:26 +0000 From: Gregory Etelson To: CC: , , , , , , , , , , , Date: Mon, 19 Apr 2021 11:29:07 +0300 Message-ID: <20210419082908.8805-2-getelson@nvidia.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20210419082908.8805-1-getelson@nvidia.com> References: <20210419082908.8805-1-getelson@nvidia.com> MIME-Version: 1.0 X-Originating-IP: [172.20.145.6] X-ClientProxiedBy: HQMAIL105.nvidia.com (172.20.187.12) To HQMAIL107.nvidia.com (172.20.187.13) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 208be4bc-c42d-4499-cf7a-08d9030d4061 X-MS-TrafficTypeDiagnostic: MWHPR12MB1232: X-LD-Processed: 43083d15-7273-40c1-b7db-39efd9ccc17a,ExtAddr X-Microsoft-Antispam-PRVS: X-MS-Exchange-Transport-Forked: True X-MS-Oob-TLC-OOBClassifiers: OLM:10000; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:216.228.112.34; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:schybrid03.nvidia.com; CAT:NONE; SFS:(4636009)(39860400002)(346002)(396003)(376002)(136003)(46966006)(36840700001)(6862004)(2906002)(36756003)(4326008)(82310400003)(336012)(55016002)(426003)(7696005)(316002)(37006003)(1076003)(54906003)(2616005)(82740400003)(26005)(47076005)(36906005)(6666004)(5660300002)(16526019)(7636003)(86362001)(70206006)(83380400001)(186003)(70586007)(356005)(6636002)(107886003)(478600001)(8936002)(6286002)(8676002)(36860700001); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 19 Apr 2021 08:29:29.8166 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 208be4bc-c42d-4499-cf7a-08d9030d4061 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.112.34]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: CO1NAM11FT010.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR12MB1232 Subject: [dpdk-dev] [PATCH v7 1/2] ethdev: add packet integrity checks X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" From: Ori Kam Currently, DPDK application can offload the checksum check, and report it in the mbuf. However, as more and more applications are offloading some or all logic and action to the HW, there is a need to check the packet integrity so the right decision can be taken. The application logic can be positive meaning if the packet is valid jump / do actions, or negative if packet is not valid jump to SW / do actions (like drop) and add default flow (match all in low priority) that will direct the miss packet to the miss path. Since currently rte_flow works in positive way the assumption is that the positive way will be the common way in this case also. When thinking what is the best API to implement such feature, we need to consider the following (in no specific order): 1. API breakage. 2. Simplicity. 3. Performance. 4. HW capabilities. 5. rte_flow limitation. 6. Flexibility. First option: Add integrity flags to each of the items. For example add checksum_ok to ipv4 item. Pros: 1. No new rte_flow item. 2. Simple in the way that on each item the app can see what checks are available. Cons: 1. API breakage. 2. increase number of flows, since app can't add global rule and must have dedicated flow for each of the flow combinations, for example matching on icmp traffic or UDP/TCP traffic with IPv4 / IPv6 will result in 5 flows. Second option: dedicated item Pros: 1. No API breakage, and there will be no for some time due to having extra space. (by using bits) 2. Just one flow to support the icmp or UDP/TCP traffic with IPv4 / IPv6. 3. Simplicity application can just look at one place to see all possible checks. 4. Allow future support for more tests. Cons: 1. New item, that holds number of fields from different items. For starter the following bits are suggested: 1. packet_ok - means that all HW checks depending on packet layer have passed. This may mean that in some HW such flow should be splited to number of flows or fail. 2. l2_ok - all check for layer 2 have passed. 3. l3_ok - all check for layer 3 have passed. If packet doesn't have l3 layer this check should fail. 4. l4_ok - all check for layer 4 have passed. If packet doesn't have l4 layer this check should fail. 5. l2_crc_ok - the layer 2 crc is O.K. 6. ipv4_csum_ok - IPv4 checksum is O.K. it is possible that the IPv4 checksum will be O.K. but the l3_ok will be 0. it is not possible that checksum will be 0 and the l3_ok will be 1. 7. l4_csum_ok - layer 4 checksum is O.K. 8. l3_len_OK - check that the reported layer 3 len is smaller than the frame len. Example of usage: 1. check packets from all possible layers for integrity. flow create integrity spec packet_ok = 1 mask packet_ok = 1 ..... 2. Check only packet with layer 4 (UDP / TCP) flow create integrity spec l3_ok = 1, l4_ok = 1 mask l3_ok = 1 l4_ok = 1 Signed-off-by: Ori Kam Acked-by: Ferruh Yigit --- doc/guides/prog_guide/rte_flow.rst | 20 +++++++++++ doc/guides/rel_notes/release_21_05.rst | 5 +++ lib/librte_ethdev/rte_flow.h | 49 ++++++++++++++++++++++++++ 3 files changed, 74 insertions(+) diff --git a/doc/guides/prog_guide/rte_flow.rst b/doc/guides/prog_guide/rte_flow.rst index e1b93ecedf..1dd2301a07 100644 --- a/doc/guides/prog_guide/rte_flow.rst +++ b/doc/guides/prog_guide/rte_flow.rst @@ -1398,6 +1398,26 @@ Matches a eCPRI header. - ``hdr``: eCPRI header definition (``rte_ecpri.h``). - Default ``mask`` matches nothing, for all eCPRI messages. +Item: ``PACKET_INTEGRITY_CHECKS`` +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ + +Matches packet integrity. +For some devices application needs to enable integration checks in HW +before using this item. + +- ``level``: the encapsulation level that should be checked. level 0 means the + default PMD mode (Can be inner most / outermost). value of 1 means outermost + and higher value means inner header. See also RSS level. +- ``packet_ok``: All HW packet integrity checks have passed based on the max + layer of the packet. +- ``l2_ok``: all layer 2 HW integrity checks passed. +- ``l3_ok``: all layer 3 HW integrity checks passed. +- ``l4_ok``: all layer 4 HW integrity checks passed. +- ``l2_crc_ok``: layer 2 crc check passed. +- ``ipv4_csum_ok``: ipv4 checksum check passed. +- ``l4_csum_ok``: layer 4 checksum check passed. +- ``l3_len_ok``: the layer 3 len is smaller than the frame len. + Actions ~~~~~~~ diff --git a/doc/guides/rel_notes/release_21_05.rst b/doc/guides/rel_notes/release_21_05.rst index 82ee71152f..b1c90f4d9f 100644 --- a/doc/guides/rel_notes/release_21_05.rst +++ b/doc/guides/rel_notes/release_21_05.rst @@ -55,6 +55,11 @@ New Features Also, make sure to start the actual text at the margin. ======================================================= +* **Added packet integrity match to flow rules.** + + * Added ``RTE_FLOW_ITEM_TYPE_INTEGRITY`` flow item. + * Added ``rte_flow_item_integrity`` data structure. + * **Added support for Marvell CN10K SoC drivers.** Added Marvell CN10K SoC support. Marvell CN10K SoC are based on Octeon 10 diff --git a/lib/librte_ethdev/rte_flow.h b/lib/librte_ethdev/rte_flow.h index 203c4cde9a..2450b30fc1 100644 --- a/lib/librte_ethdev/rte_flow.h +++ b/lib/librte_ethdev/rte_flow.h @@ -551,6 +551,17 @@ enum rte_flow_item_type { * See struct rte_flow_item_geneve_opt */ RTE_FLOW_ITEM_TYPE_GENEVE_OPT, + + /** + * [META] + * + * Matches on packet integrity. + * For some devices application needs to enable integration checks in HW + * before using this item. + * + * See struct rte_flow_item_integrity. + */ + RTE_FLOW_ITEM_TYPE_INTEGRITY, }; /** @@ -1685,6 +1696,44 @@ rte_flow_item_geneve_opt_mask = { }; #endif +struct rte_flow_item_integrity { + /**< Tunnel encapsulation level the item should apply to. + * @see rte_flow_action_rss + */ + uint32_t level; + union { + __extension__ + struct { + /**< The packet is valid after passing all HW checks. */ + uint64_t packet_ok:1; + /**< L2 layer is valid after passing all HW checks. */ + uint64_t l2_ok:1; + /**< L3 layer is valid after passing all HW checks. */ + uint64_t l3_ok:1; + /**< L4 layer is valid after passing all HW checks. */ + uint64_t l4_ok:1; + /**< L2 layer CRC is valid. */ + uint64_t l2_crc_ok:1; + /**< IPv4 layer checksum is valid. */ + uint64_t ipv4_csum_ok:1; + /**< L4 layer checksum is valid. */ + uint64_t l4_csum_ok:1; + /**< The l3 length is smaller than the frame length. */ + uint64_t l3_len_ok:1; + uint64_t reserved:56; + }; + uint64_t value; + }; +}; + +#ifndef __cplusplus +static const struct rte_flow_item_integrity +rte_flow_item_integrity_mask = { + .level = 0, + .value = 0, +}; +#endif + /** * Matching pattern item definition. * From patchwork Mon Apr 19 08:29:08 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gregory Etelson X-Patchwork-Id: 91735 X-Patchwork-Delegate: ferruh.yigit@amd.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id C2AFEA0547; Mon, 19 Apr 2021 10:29:46 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 7FBDA41205; Mon, 19 Apr 2021 10:29:45 +0200 (CEST) Received: from NAM02-CY1-obe.outbound.protection.outlook.com (mail-eopbgr760073.outbound.protection.outlook.com [40.107.76.73]) by mails.dpdk.org (Postfix) with ESMTP id DC55941204 for ; Mon, 19 Apr 2021 10:29:43 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=S4tT7HECCazeN9QjsBPJUiwlw3mOpBx9fcHemTxCazFuiAdhs7EJroVGu/NNRrLIhjgnBUEuPTbw8v6Pw8dHwujUkfT5PBxtlrf4NdsGXxtIrYoQux05Pg7bWA19DaInc+YGnbwT3qgohkw0lRTdmNm1QA7GrCRZDdKK5NkJZMPkorOFtIuTqbMMd9nicnduUFJseNB0kfqnsZWD8htrRU08LAmU6Y7ldomSCwOhYnbpuuOqo3lnA0xD0cZchhAw3/FsahxaPe3n57XgGmDbC5BJLbG62x5ImP21PS00FphbR5GTsceKfrqagkZQsy+PJbSbS8GkJjoF3wYkCMXyhw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=l3jgr6W/MxC4h07wfnrSUw2uyFiW+XZMLGYj1X50PAg=; b=oJ/aib2dpCCZWaH+fNSC/kskaBY0WhhC7J72OJEERciSdgoVJkPqh4hZoffgSli8U5QeMAeeAbfGJ9tcNxM4/ns38+6uBKS6mkL/O5A4RMm9crOKleVs46hYYpVlhcfJw25KdRPBWm/+/s3swa3yEMk4SBQ1+xUxtkCKYDGYTRs0sbKq44UVkq4mBiOl+G2hlmcB78XdIrKx/kKeKhIfSQfwX80fca9RKm/L7H8pGNun3A0e36f2jDqQ8GWfMqV5q/lK5w4jsKW4Crp6c2zpaOdjpcl5Ab6ZPtnyCDlwEQIWF4CyYs1KmjLo10lKKwC5YI8WPIJeO3n+aXoPEdrokw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.112.34) smtp.rcpttodomain=6wind.com smtp.mailfrom=nvidia.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=l3jgr6W/MxC4h07wfnrSUw2uyFiW+XZMLGYj1X50PAg=; b=DZSeQ8FMFI6jwRbiWo8pSbLHAZdgUfEFK4s8yGuxy2hVSUby44oEbkSQMVqxXhkT/gAYCchvObBKFiy7htNGGn6+ynRfmOpHxDyT/fW4rDQa6KDynTIc7VKRKeKAPYMAeza4fnbinJb9UHg/zLCW7RGuvtQ4r7Ad4gLbNTHrzUuIZp1+cbtZ6IVTd2NKexVPeIt+XYEKmbRGUhDPOij9OYv509zmfCcBblLysseHLcqTMuc+Jcn1SNeoi/n/klPrCO9tkob9sjafOChe+kkoK6krMslOQ5IJHd0tepkt5ncOn2jWpaFPQIOWVst3J8JEyJ8TsT0cvuC1l5mzHJ6zuA== Received: from MW4PR03CA0324.namprd03.prod.outlook.com (2603:10b6:303:dd::29) by CH2PR12MB3864.namprd12.prod.outlook.com (2603:10b6:610:25::27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4042.16; Mon, 19 Apr 2021 08:29:35 +0000 Received: from CO1NAM11FT044.eop-nam11.prod.protection.outlook.com (2603:10b6:303:dd:cafe::6d) by MW4PR03CA0324.outlook.office365.com (2603:10b6:303:dd::29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4042.16 via Frontend Transport; Mon, 19 Apr 2021 08:29:35 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.112.34) smtp.mailfrom=nvidia.com; 6wind.com; dkim=none (message not signed) header.d=none;6wind.com; dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.112.34 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.112.34; helo=mail.nvidia.com; Received: from mail.nvidia.com (216.228.112.34) by CO1NAM11FT044.mail.protection.outlook.com (10.13.175.188) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.4042.16 via Frontend Transport; Mon, 19 Apr 2021 08:29:33 +0000 Received: from nvidia.com (172.20.145.6) by HQMAIL107.nvidia.com (172.20.187.13) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Mon, 19 Apr 2021 08:29:29 +0000 From: Gregory Etelson To: CC: , , , , , , , , , , , , Xiaoyun Li Date: Mon, 19 Apr 2021 11:29:08 +0300 Message-ID: <20210419082908.8805-3-getelson@nvidia.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20210419082908.8805-1-getelson@nvidia.com> References: <20210419082908.8805-1-getelson@nvidia.com> MIME-Version: 1.0 X-Originating-IP: [172.20.145.6] X-ClientProxiedBy: HQMAIL105.nvidia.com (172.20.187.12) To HQMAIL107.nvidia.com (172.20.187.13) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 7915d1f9-3776-4f9e-174f-08d9030d42b6 X-MS-TrafficTypeDiagnostic: CH2PR12MB3864: X-LD-Processed: 43083d15-7273-40c1-b7db-39efd9ccc17a,ExtAddr X-Microsoft-Antispam-PRVS: X-MS-Exchange-Transport-Forked: True X-MS-Oob-TLC-OOBClassifiers: OLM:6790; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:216.228.112.34; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:schybrid03.nvidia.com; CAT:NONE; SFS:(4636009)(136003)(39860400002)(346002)(396003)(376002)(46966006)(36840700001)(426003)(478600001)(26005)(336012)(4326008)(55016002)(2616005)(70586007)(86362001)(2906002)(6286002)(8936002)(16526019)(82310400003)(36860700001)(186003)(70206006)(6862004)(6666004)(7636003)(54906003)(36906005)(7696005)(1076003)(356005)(47076005)(83380400001)(6636002)(8676002)(82740400003)(5660300002)(316002)(37006003)(36756003); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 19 Apr 2021 08:29:33.7234 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 7915d1f9-3776-4f9e-174f-08d9030d42b6 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.112.34]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: CO1NAM11FT044.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH2PR12MB3864 Subject: [dpdk-dev] [PATCH v7 2/2] app/testpmd: add support for integrity item X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" From: Ori Kam The integrity item allows the application to match on the integrity of a packet. use example: match that packet integrity checks are ok. The checks depend on packet layers. For example ICMP packet will not check L4 level. flow create 0 ingress pattern integrity value mask 0x01 value spec 0x01 match that L4 packet is ok - check L2 & L3 & L4 layers: flow create 0 ingress pattern integrity value mask 0xfe value spec 0xfe Signed-off-by: Ori Kam Signed-off-by: Gregory Etelson Acked-by: Ferruh Yigit --- app/test-pmd/cmdline_flow.c | 39 +++++++++++++++++++++ doc/guides/testpmd_app_ug/testpmd_funcs.rst | 28 +++++++++++++++ 2 files changed, 67 insertions(+) diff --git a/app/test-pmd/cmdline_flow.c b/app/test-pmd/cmdline_flow.c index 0127d9e7d6..a1b0fa4a32 100644 --- a/app/test-pmd/cmdline_flow.c +++ b/app/test-pmd/cmdline_flow.c @@ -293,6 +293,9 @@ enum index { ITEM_GENEVE_OPT_TYPE, ITEM_GENEVE_OPT_LENGTH, ITEM_GENEVE_OPT_DATA, + ITEM_INTEGRITY, + ITEM_INTEGRITY_LEVEL, + ITEM_INTEGRITY_VALUE, /* Validate/create actions. */ ACTIONS, @@ -968,6 +971,7 @@ static const enum index next_item[] = { ITEM_PFCP, ITEM_ECPRI, ITEM_GENEVE_OPT, + ITEM_INTEGRITY, END_SET, ZERO, }; @@ -1319,6 +1323,19 @@ static const enum index item_geneve_opt[] = { ZERO, }; +static const enum index item_integrity[] = { + ITEM_INTEGRITY_LEVEL, + ITEM_INTEGRITY_VALUE, + ZERO, +}; + +static const enum index item_integrity_lv[] = { + ITEM_INTEGRITY_LEVEL, + ITEM_INTEGRITY_VALUE, + ITEM_NEXT, + ZERO, +}; + static const enum index next_action[] = { ACTION_END, ACTION_VOID, @@ -3400,6 +3417,28 @@ static const struct token token_list[] = { (sizeof(struct rte_flow_item_geneve_opt), ITEM_GENEVE_OPT_DATA_SIZE)), }, + [ITEM_INTEGRITY] = { + .name = "integrity", + .help = "match packet integrity", + .priv = PRIV_ITEM(INTEGRITY, + sizeof(struct rte_flow_item_integrity)), + .next = NEXT(item_integrity), + .call = parse_vc, + }, + [ITEM_INTEGRITY_LEVEL] = { + .name = "level", + .help = "integrity level", + .next = NEXT(item_integrity_lv, NEXT_ENTRY(UNSIGNED), + item_param), + .args = ARGS(ARGS_ENTRY(struct rte_flow_item_integrity, level)), + }, + [ITEM_INTEGRITY_VALUE] = { + .name = "value", + .help = "integrity value", + .next = NEXT(item_integrity_lv, NEXT_ENTRY(UNSIGNED), + item_param), + .args = ARGS(ARGS_ENTRY(struct rte_flow_item_integrity, value)), + }, /* Validate/create actions. */ [ACTIONS] = { .name = "actions", diff --git a/doc/guides/testpmd_app_ug/testpmd_funcs.rst b/doc/guides/testpmd_app_ug/testpmd_funcs.rst index e3bfed566d..feaae9350b 100644 --- a/doc/guides/testpmd_app_ug/testpmd_funcs.rst +++ b/doc/guides/testpmd_app_ug/testpmd_funcs.rst @@ -3791,6 +3791,13 @@ This section lists supported pattern items and their attributes, if any. - ``s_field {unsigned}``: S field. - ``seid {unsigned}``: session endpoint identifier. +- ``integrity``: match packet integrity. + + - ``level {unsigned}``: Packet encapsulation level the item should + apply to. See rte_flow_action_rss for details. + - ``value {unsigned}``: A bitmask that specify what packet elements + must be matched for integrity. + Actions list ^^^^^^^^^^^^ @@ -4925,6 +4932,27 @@ NVGRE encapsulation header and sent to port id 0. testpmd> flow create 0 ingress transfer pattern eth / end actions sample ratio 1 index 0 / port_id id 2 / end +Sample integrity rules +~~~~~~~~~~~~~~~~~~~~~~ + +Integrity rules can be created by the following commands: + +Integrity rule that forwards valid TCP packets to group 1. +TCP packet integrity is matched with the ``l4_ok`` bit 3. + +:: + + testpmd> flow create 0 ingress + pattern eth / ipv4 / tcp / integrity value mask 8 value spec 8 / end + actions jump group 1 / end + +Integrity rule that forwards invalid packets to application. +General packet integrity is matched with the ``packet_ok`` bit 0. + +:: + + testpmd> flow create 0 ingress pattern integrity value mask 1 value spec 0 / end actions queue index 0 / end + BPF Functions --------------