1 /* 2 * Copyright (C) 2017 Netronome Systems, Inc. 3 * 4 * This software is dual licensed under the GNU General License Version 2, 5 * June 1991 as shown in the file COPYING in the top-level directory of this 6 * source tree or the BSD 2-Clause License provided below. You have the 7 * option to license this software under the complete terms of either license. 8 * 9 * The BSD 2-Clause License: 10 * 11 * Redistribution and use in source and binary forms, with or 12 * without modification, are permitted provided that the following 13 * conditions are met: 14 * 15 * 1. Redistributions of source code must retain the above 16 * copyright notice, this list of conditions and the following 17 * disclaimer. 18 * 19 * 2. Redistributions in binary form must reproduce the above 20 * copyright notice, this list of conditions and the following 21 * disclaimer in the documentation and/or other materials 22 * provided with the distribution. 23 * 24 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, 25 * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF 26 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND 27 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS 28 * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN 29 * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN 30 * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 31 * SOFTWARE. 32 */ 33 34 #include <linux/bitfield.h> 35 #include <net/pkt_cls.h> 36 37 #include "cmsg.h" 38 #include "main.h" 39 40 static void 41 nfp_flower_compile_meta_tci(struct nfp_flower_meta_tci *frame, 42 struct tc_cls_flower_offload *flow, u8 key_type, 43 bool mask_version) 44 { 45 struct fl_flow_key *target = mask_version ? flow->mask : flow->key; 46 struct flow_dissector_key_vlan *flow_vlan; 47 u16 tmp_tci; 48 49 memset(frame, 0, sizeof(struct nfp_flower_meta_tci)); 50 /* Populate the metadata frame. */ 51 frame->nfp_flow_key_layer = key_type; 52 frame->mask_id = ~0; 53 54 if (dissector_uses_key(flow->dissector, FLOW_DISSECTOR_KEY_VLAN)) { 55 flow_vlan = skb_flow_dissector_target(flow->dissector, 56 FLOW_DISSECTOR_KEY_VLAN, 57 target); 58 /* Populate the tci field. */ 59 if (flow_vlan->vlan_id) { 60 tmp_tci = FIELD_PREP(NFP_FLOWER_MASK_VLAN_PRIO, 61 flow_vlan->vlan_priority) | 62 FIELD_PREP(NFP_FLOWER_MASK_VLAN_VID, 63 flow_vlan->vlan_id) | 64 NFP_FLOWER_MASK_VLAN_CFI; 65 frame->tci = cpu_to_be16(tmp_tci); 66 } 67 } 68 } 69 70 static void 71 nfp_flower_compile_ext_meta(struct nfp_flower_ext_meta *frame, u32 key_ext) 72 { 73 frame->nfp_flow_key_layer2 = cpu_to_be32(key_ext); 74 } 75 76 static int 77 nfp_flower_compile_port(struct nfp_flower_in_port *frame, u32 cmsg_port, 78 bool mask_version, enum nfp_flower_tun_type tun_type) 79 { 80 if (mask_version) { 81 frame->in_port = cpu_to_be32(~0); 82 return 0; 83 } 84 85 if (tun_type) 86 frame->in_port = cpu_to_be32(NFP_FL_PORT_TYPE_TUN | tun_type); 87 else 88 frame->in_port = cpu_to_be32(cmsg_port); 89 90 return 0; 91 } 92 93 static void 94 nfp_flower_compile_mac(struct nfp_flower_mac_mpls *frame, 95 struct tc_cls_flower_offload *flow, 96 bool mask_version) 97 { 98 struct fl_flow_key *target = mask_version ? flow->mask : flow->key; 99 struct flow_dissector_key_eth_addrs *addr; 100 101 memset(frame, 0, sizeof(struct nfp_flower_mac_mpls)); 102 103 if (dissector_uses_key(flow->dissector, FLOW_DISSECTOR_KEY_ETH_ADDRS)) { 104 addr = skb_flow_dissector_target(flow->dissector, 105 FLOW_DISSECTOR_KEY_ETH_ADDRS, 106 target); 107 /* Populate mac frame. */ 108 ether_addr_copy(frame->mac_dst, &addr->dst[0]); 109 ether_addr_copy(frame->mac_src, &addr->src[0]); 110 } 111 112 if (dissector_uses_key(flow->dissector, FLOW_DISSECTOR_KEY_MPLS)) { 113 struct flow_dissector_key_mpls *mpls; 114 u32 t_mpls; 115 116 mpls = skb_flow_dissector_target(flow->dissector, 117 FLOW_DISSECTOR_KEY_MPLS, 118 target); 119 120 t_mpls = FIELD_PREP(NFP_FLOWER_MASK_MPLS_LB, mpls->mpls_label) | 121 FIELD_PREP(NFP_FLOWER_MASK_MPLS_TC, mpls->mpls_tc) | 122 FIELD_PREP(NFP_FLOWER_MASK_MPLS_BOS, mpls->mpls_bos) | 123 NFP_FLOWER_MASK_MPLS_Q; 124 125 frame->mpls_lse = cpu_to_be32(t_mpls); 126 } else if (dissector_uses_key(flow->dissector, 127 FLOW_DISSECTOR_KEY_BASIC)) { 128 /* Check for mpls ether type and set NFP_FLOWER_MASK_MPLS_Q 129 * bit, which indicates an mpls ether type but without any 130 * mpls fields. 131 */ 132 struct flow_dissector_key_basic *key_basic; 133 134 key_basic = skb_flow_dissector_target(flow->dissector, 135 FLOW_DISSECTOR_KEY_BASIC, 136 flow->key); 137 if (key_basic->n_proto == cpu_to_be16(ETH_P_MPLS_UC) || 138 key_basic->n_proto == cpu_to_be16(ETH_P_MPLS_MC)) 139 frame->mpls_lse = cpu_to_be32(NFP_FLOWER_MASK_MPLS_Q); 140 } 141 } 142 143 static void 144 nfp_flower_compile_tport(struct nfp_flower_tp_ports *frame, 145 struct tc_cls_flower_offload *flow, 146 bool mask_version) 147 { 148 struct fl_flow_key *target = mask_version ? flow->mask : flow->key; 149 struct flow_dissector_key_ports *tp; 150 151 memset(frame, 0, sizeof(struct nfp_flower_tp_ports)); 152 153 if (dissector_uses_key(flow->dissector, FLOW_DISSECTOR_KEY_PORTS)) { 154 tp = skb_flow_dissector_target(flow->dissector, 155 FLOW_DISSECTOR_KEY_PORTS, 156 target); 157 frame->port_src = tp->src; 158 frame->port_dst = tp->dst; 159 } 160 } 161 162 static void 163 nfp_flower_compile_ip_ext(struct nfp_flower_ip_ext *frame, 164 struct tc_cls_flower_offload *flow, 165 bool mask_version) 166 { 167 struct fl_flow_key *target = mask_version ? flow->mask : flow->key; 168 169 if (dissector_uses_key(flow->dissector, FLOW_DISSECTOR_KEY_BASIC)) { 170 struct flow_dissector_key_basic *basic; 171 172 basic = skb_flow_dissector_target(flow->dissector, 173 FLOW_DISSECTOR_KEY_BASIC, 174 target); 175 frame->proto = basic->ip_proto; 176 } 177 178 if (dissector_uses_key(flow->dissector, FLOW_DISSECTOR_KEY_IP)) { 179 struct flow_dissector_key_ip *flow_ip; 180 181 flow_ip = skb_flow_dissector_target(flow->dissector, 182 FLOW_DISSECTOR_KEY_IP, 183 target); 184 frame->tos = flow_ip->tos; 185 frame->ttl = flow_ip->ttl; 186 } 187 188 if (dissector_uses_key(flow->dissector, FLOW_DISSECTOR_KEY_TCP)) { 189 struct flow_dissector_key_tcp *tcp; 190 u32 tcp_flags; 191 192 tcp = skb_flow_dissector_target(flow->dissector, 193 FLOW_DISSECTOR_KEY_TCP, target); 194 tcp_flags = be16_to_cpu(tcp->flags); 195 196 if (tcp_flags & TCPHDR_FIN) 197 frame->flags |= NFP_FL_TCP_FLAG_FIN; 198 if (tcp_flags & TCPHDR_SYN) 199 frame->flags |= NFP_FL_TCP_FLAG_SYN; 200 if (tcp_flags & TCPHDR_RST) 201 frame->flags |= NFP_FL_TCP_FLAG_RST; 202 if (tcp_flags & TCPHDR_PSH) 203 frame->flags |= NFP_FL_TCP_FLAG_PSH; 204 if (tcp_flags & TCPHDR_URG) 205 frame->flags |= NFP_FL_TCP_FLAG_URG; 206 } 207 208 if (dissector_uses_key(flow->dissector, FLOW_DISSECTOR_KEY_CONTROL)) { 209 struct flow_dissector_key_control *key; 210 211 key = skb_flow_dissector_target(flow->dissector, 212 FLOW_DISSECTOR_KEY_CONTROL, 213 target); 214 if (key->flags & FLOW_DIS_IS_FRAGMENT) 215 frame->flags |= NFP_FL_IP_FRAGMENTED; 216 if (key->flags & FLOW_DIS_FIRST_FRAG) 217 frame->flags |= NFP_FL_IP_FRAG_FIRST; 218 } 219 } 220 221 static void 222 nfp_flower_compile_ipv4(struct nfp_flower_ipv4 *frame, 223 struct tc_cls_flower_offload *flow, 224 bool mask_version) 225 { 226 struct fl_flow_key *target = mask_version ? flow->mask : flow->key; 227 struct flow_dissector_key_ipv4_addrs *addr; 228 229 memset(frame, 0, sizeof(struct nfp_flower_ipv4)); 230 231 if (dissector_uses_key(flow->dissector, 232 FLOW_DISSECTOR_KEY_IPV4_ADDRS)) { 233 addr = skb_flow_dissector_target(flow->dissector, 234 FLOW_DISSECTOR_KEY_IPV4_ADDRS, 235 target); 236 frame->ipv4_src = addr->src; 237 frame->ipv4_dst = addr->dst; 238 } 239 240 nfp_flower_compile_ip_ext(&frame->ip_ext, flow, mask_version); 241 } 242 243 static void 244 nfp_flower_compile_ipv6(struct nfp_flower_ipv6 *frame, 245 struct tc_cls_flower_offload *flow, 246 bool mask_version) 247 { 248 struct fl_flow_key *target = mask_version ? flow->mask : flow->key; 249 struct flow_dissector_key_ipv6_addrs *addr; 250 251 memset(frame, 0, sizeof(struct nfp_flower_ipv6)); 252 253 if (dissector_uses_key(flow->dissector, 254 FLOW_DISSECTOR_KEY_IPV6_ADDRS)) { 255 addr = skb_flow_dissector_target(flow->dissector, 256 FLOW_DISSECTOR_KEY_IPV6_ADDRS, 257 target); 258 frame->ipv6_src = addr->src; 259 frame->ipv6_dst = addr->dst; 260 } 261 262 nfp_flower_compile_ip_ext(&frame->ip_ext, flow, mask_version); 263 } 264 265 static void 266 nfp_flower_compile_ipv4_udp_tun(struct nfp_flower_ipv4_udp_tun *frame, 267 struct tc_cls_flower_offload *flow, 268 bool mask_version) 269 { 270 struct fl_flow_key *target = mask_version ? flow->mask : flow->key; 271 struct flow_dissector_key_ipv4_addrs *tun_ips; 272 struct flow_dissector_key_keyid *vni; 273 274 memset(frame, 0, sizeof(struct nfp_flower_ipv4_udp_tun)); 275 276 if (dissector_uses_key(flow->dissector, 277 FLOW_DISSECTOR_KEY_ENC_KEYID)) { 278 u32 temp_vni; 279 280 vni = skb_flow_dissector_target(flow->dissector, 281 FLOW_DISSECTOR_KEY_ENC_KEYID, 282 target); 283 temp_vni = be32_to_cpu(vni->keyid) << NFP_FL_TUN_VNI_OFFSET; 284 frame->tun_id = cpu_to_be32(temp_vni); 285 } 286 287 if (dissector_uses_key(flow->dissector, 288 FLOW_DISSECTOR_KEY_ENC_IPV4_ADDRS)) { 289 tun_ips = 290 skb_flow_dissector_target(flow->dissector, 291 FLOW_DISSECTOR_KEY_ENC_IPV4_ADDRS, 292 target); 293 frame->ip_src = tun_ips->src; 294 frame->ip_dst = tun_ips->dst; 295 } 296 } 297 298 int nfp_flower_compile_flow_match(struct tc_cls_flower_offload *flow, 299 struct nfp_fl_key_ls *key_ls, 300 struct net_device *netdev, 301 struct nfp_fl_payload *nfp_flow, 302 enum nfp_flower_tun_type tun_type) 303 { 304 struct nfp_repr *netdev_repr; 305 int err; 306 u8 *ext; 307 u8 *msk; 308 309 memset(nfp_flow->unmasked_data, 0, key_ls->key_size); 310 memset(nfp_flow->mask_data, 0, key_ls->key_size); 311 312 ext = nfp_flow->unmasked_data; 313 msk = nfp_flow->mask_data; 314 315 /* Populate Exact Metadata. */ 316 nfp_flower_compile_meta_tci((struct nfp_flower_meta_tci *)ext, 317 flow, key_ls->key_layer, false); 318 /* Populate Mask Metadata. */ 319 nfp_flower_compile_meta_tci((struct nfp_flower_meta_tci *)msk, 320 flow, key_ls->key_layer, true); 321 ext += sizeof(struct nfp_flower_meta_tci); 322 msk += sizeof(struct nfp_flower_meta_tci); 323 324 /* Populate Extended Metadata if Required. */ 325 if (NFP_FLOWER_LAYER_EXT_META & key_ls->key_layer) { 326 nfp_flower_compile_ext_meta((struct nfp_flower_ext_meta *)ext, 327 key_ls->key_layer_two); 328 nfp_flower_compile_ext_meta((struct nfp_flower_ext_meta *)msk, 329 key_ls->key_layer_two); 330 ext += sizeof(struct nfp_flower_ext_meta); 331 msk += sizeof(struct nfp_flower_ext_meta); 332 } 333 334 /* Populate Exact Port data. */ 335 err = nfp_flower_compile_port((struct nfp_flower_in_port *)ext, 336 nfp_repr_get_port_id(netdev), 337 false, tun_type); 338 if (err) 339 return err; 340 341 /* Populate Mask Port Data. */ 342 err = nfp_flower_compile_port((struct nfp_flower_in_port *)msk, 343 nfp_repr_get_port_id(netdev), 344 true, tun_type); 345 if (err) 346 return err; 347 348 ext += sizeof(struct nfp_flower_in_port); 349 msk += sizeof(struct nfp_flower_in_port); 350 351 if (NFP_FLOWER_LAYER_MAC & key_ls->key_layer) { 352 /* Populate Exact MAC Data. */ 353 nfp_flower_compile_mac((struct nfp_flower_mac_mpls *)ext, 354 flow, false); 355 /* Populate Mask MAC Data. */ 356 nfp_flower_compile_mac((struct nfp_flower_mac_mpls *)msk, 357 flow, true); 358 ext += sizeof(struct nfp_flower_mac_mpls); 359 msk += sizeof(struct nfp_flower_mac_mpls); 360 } 361 362 if (NFP_FLOWER_LAYER_TP & key_ls->key_layer) { 363 /* Populate Exact TP Data. */ 364 nfp_flower_compile_tport((struct nfp_flower_tp_ports *)ext, 365 flow, false); 366 /* Populate Mask TP Data. */ 367 nfp_flower_compile_tport((struct nfp_flower_tp_ports *)msk, 368 flow, true); 369 ext += sizeof(struct nfp_flower_tp_ports); 370 msk += sizeof(struct nfp_flower_tp_ports); 371 } 372 373 if (NFP_FLOWER_LAYER_IPV4 & key_ls->key_layer) { 374 /* Populate Exact IPv4 Data. */ 375 nfp_flower_compile_ipv4((struct nfp_flower_ipv4 *)ext, 376 flow, false); 377 /* Populate Mask IPv4 Data. */ 378 nfp_flower_compile_ipv4((struct nfp_flower_ipv4 *)msk, 379 flow, true); 380 ext += sizeof(struct nfp_flower_ipv4); 381 msk += sizeof(struct nfp_flower_ipv4); 382 } 383 384 if (NFP_FLOWER_LAYER_IPV6 & key_ls->key_layer) { 385 /* Populate Exact IPv4 Data. */ 386 nfp_flower_compile_ipv6((struct nfp_flower_ipv6 *)ext, 387 flow, false); 388 /* Populate Mask IPv4 Data. */ 389 nfp_flower_compile_ipv6((struct nfp_flower_ipv6 *)msk, 390 flow, true); 391 ext += sizeof(struct nfp_flower_ipv6); 392 msk += sizeof(struct nfp_flower_ipv6); 393 } 394 395 if (key_ls->key_layer & NFP_FLOWER_LAYER_VXLAN || 396 key_ls->key_layer_two & NFP_FLOWER_LAYER2_GENEVE) { 397 __be32 tun_dst; 398 399 /* Populate Exact VXLAN Data. */ 400 nfp_flower_compile_ipv4_udp_tun((void *)ext, flow, false); 401 /* Populate Mask VXLAN Data. */ 402 nfp_flower_compile_ipv4_udp_tun((void *)msk, flow, true); 403 tun_dst = ((struct nfp_flower_ipv4_udp_tun *)ext)->ip_dst; 404 ext += sizeof(struct nfp_flower_ipv4_udp_tun); 405 msk += sizeof(struct nfp_flower_ipv4_udp_tun); 406 407 /* Configure tunnel end point MAC. */ 408 if (nfp_netdev_is_nfp_repr(netdev)) { 409 netdev_repr = netdev_priv(netdev); 410 nfp_tunnel_write_macs(netdev_repr->app); 411 412 /* Store the tunnel destination in the rule data. 413 * This must be present and be an exact match. 414 */ 415 nfp_flow->nfp_tun_ipv4_addr = tun_dst; 416 nfp_tunnel_add_ipv4_off(netdev_repr->app, tun_dst); 417 } 418 } 419 420 return 0; 421 } 422