2 * drivers/net/ethernet/mellanox/mlxsw/spectrum_flower.c
3 * Copyright (c) 2017 Mellanox Technologies. All rights reserved.
4 * Copyright (c) 2017 Jiri Pirko <jiri@mellanox.com>
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions are met:
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * 3. Neither the names of the copyright holders nor the names of its
15 * contributors may be used to endorse or promote products derived from
16 * this software without specific prior written permission.
18 * Alternatively, this software may be distributed under the terms of the
19 * GNU General Public License ("GPL") version 2 as published by the Free
20 * Software Foundation.
22 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
23 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
26 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
27 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
28 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
29 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
30 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
31 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
32 * POSSIBILITY OF SUCH DAMAGE.
35 #include <linux/kernel.h>
36 #include <linux/errno.h>
37 #include <linux/netdevice.h>
38 #include <net/flow_dissector.h>
39 #include <net/pkt_cls.h>
40 #include <net/tc_act/tc_gact.h>
41 #include <net/tc_act/tc_mirred.h>
42 #include <net/tc_act/tc_vlan.h>
45 #include "core_acl_flex_keys.h"
47 static int mlxsw_sp_flower_parse_actions(struct mlxsw_sp *mlxsw_sp,
48 struct net_device *dev,
49 struct mlxsw_sp_acl_rule_info *rulei,
50 struct tcf_exts *exts)
52 const struct tc_action *a;
56 if (tc_no_actions(exts))
59 /* Count action is inserted first */
60 err = mlxsw_sp_acl_rulei_act_count(mlxsw_sp, rulei);
64 tcf_exts_to_list(exts, &actions);
65 list_for_each_entry(a, &actions, list) {
66 if (is_tcf_gact_shot(a)) {
67 err = mlxsw_sp_acl_rulei_act_drop(rulei);
70 } else if (is_tcf_gact_trap(a)) {
71 err = mlxsw_sp_acl_rulei_act_trap(rulei);
74 } else if (is_tcf_mirred_egress_redirect(a)) {
75 int ifindex = tcf_mirred_ifindex(a);
76 struct net_device *out_dev;
77 struct mlxsw_sp_fid *fid;
80 fid = mlxsw_sp_acl_dummy_fid(mlxsw_sp);
81 fid_index = mlxsw_sp_fid_index(fid);
82 err = mlxsw_sp_acl_rulei_act_fid_set(mlxsw_sp, rulei,
87 out_dev = __dev_get_by_index(dev_net(dev), ifindex);
91 err = mlxsw_sp_acl_rulei_act_fwd(mlxsw_sp, rulei,
95 } else if (is_tcf_vlan(a)) {
96 u16 proto = be16_to_cpu(tcf_vlan_push_proto(a));
97 u32 action = tcf_vlan_action(a);
98 u8 prio = tcf_vlan_push_prio(a);
99 u16 vid = tcf_vlan_push_vid(a);
101 return mlxsw_sp_acl_rulei_act_vlan(mlxsw_sp, rulei,
105 dev_err(mlxsw_sp->bus_info->dev, "Unsupported action\n");
112 static void mlxsw_sp_flower_parse_ipv4(struct mlxsw_sp_acl_rule_info *rulei,
113 struct tc_cls_flower_offload *f)
115 struct flow_dissector_key_ipv4_addrs *key =
116 skb_flow_dissector_target(f->dissector,
117 FLOW_DISSECTOR_KEY_IPV4_ADDRS,
119 struct flow_dissector_key_ipv4_addrs *mask =
120 skb_flow_dissector_target(f->dissector,
121 FLOW_DISSECTOR_KEY_IPV4_ADDRS,
124 mlxsw_sp_acl_rulei_keymask_u32(rulei, MLXSW_AFK_ELEMENT_SRC_IP4,
125 ntohl(key->src), ntohl(mask->src));
126 mlxsw_sp_acl_rulei_keymask_u32(rulei, MLXSW_AFK_ELEMENT_DST_IP4,
127 ntohl(key->dst), ntohl(mask->dst));
130 static void mlxsw_sp_flower_parse_ipv6(struct mlxsw_sp_acl_rule_info *rulei,
131 struct tc_cls_flower_offload *f)
133 struct flow_dissector_key_ipv6_addrs *key =
134 skb_flow_dissector_target(f->dissector,
135 FLOW_DISSECTOR_KEY_IPV6_ADDRS,
137 struct flow_dissector_key_ipv6_addrs *mask =
138 skb_flow_dissector_target(f->dissector,
139 FLOW_DISSECTOR_KEY_IPV6_ADDRS,
141 size_t addr_half_size = sizeof(key->src) / 2;
143 mlxsw_sp_acl_rulei_keymask_buf(rulei, MLXSW_AFK_ELEMENT_SRC_IP6_HI,
144 &key->src.s6_addr[0],
145 &mask->src.s6_addr[0],
147 mlxsw_sp_acl_rulei_keymask_buf(rulei, MLXSW_AFK_ELEMENT_SRC_IP6_LO,
148 &key->src.s6_addr[addr_half_size],
149 &mask->src.s6_addr[addr_half_size],
151 mlxsw_sp_acl_rulei_keymask_buf(rulei, MLXSW_AFK_ELEMENT_DST_IP6_HI,
152 &key->dst.s6_addr[0],
153 &mask->dst.s6_addr[0],
155 mlxsw_sp_acl_rulei_keymask_buf(rulei, MLXSW_AFK_ELEMENT_DST_IP6_LO,
156 &key->dst.s6_addr[addr_half_size],
157 &mask->dst.s6_addr[addr_half_size],
161 static int mlxsw_sp_flower_parse_ports(struct mlxsw_sp *mlxsw_sp,
162 struct mlxsw_sp_acl_rule_info *rulei,
163 struct tc_cls_flower_offload *f,
166 struct flow_dissector_key_ports *key, *mask;
168 if (!dissector_uses_key(f->dissector, FLOW_DISSECTOR_KEY_PORTS))
171 if (ip_proto != IPPROTO_TCP && ip_proto != IPPROTO_UDP) {
172 dev_err(mlxsw_sp->bus_info->dev, "Only UDP and TCP keys are supported\n");
176 key = skb_flow_dissector_target(f->dissector,
177 FLOW_DISSECTOR_KEY_PORTS,
179 mask = skb_flow_dissector_target(f->dissector,
180 FLOW_DISSECTOR_KEY_PORTS,
182 mlxsw_sp_acl_rulei_keymask_u32(rulei, MLXSW_AFK_ELEMENT_DST_L4_PORT,
183 ntohs(key->dst), ntohs(mask->dst));
184 mlxsw_sp_acl_rulei_keymask_u32(rulei, MLXSW_AFK_ELEMENT_SRC_L4_PORT,
185 ntohs(key->src), ntohs(mask->src));
189 static int mlxsw_sp_flower_parse_tcp(struct mlxsw_sp *mlxsw_sp,
190 struct mlxsw_sp_acl_rule_info *rulei,
191 struct tc_cls_flower_offload *f,
194 struct flow_dissector_key_tcp *key, *mask;
196 if (!dissector_uses_key(f->dissector, FLOW_DISSECTOR_KEY_TCP))
199 if (ip_proto != IPPROTO_TCP) {
200 dev_err(mlxsw_sp->bus_info->dev, "TCP keys supported only for TCP\n");
204 key = skb_flow_dissector_target(f->dissector,
205 FLOW_DISSECTOR_KEY_TCP,
207 mask = skb_flow_dissector_target(f->dissector,
208 FLOW_DISSECTOR_KEY_TCP,
210 mlxsw_sp_acl_rulei_keymask_u32(rulei, MLXSW_AFK_ELEMENT_TCP_FLAGS,
211 ntohs(key->flags), ntohs(mask->flags));
215 static int mlxsw_sp_flower_parse(struct mlxsw_sp *mlxsw_sp,
216 struct net_device *dev,
217 struct mlxsw_sp_acl_rule_info *rulei,
218 struct tc_cls_flower_offload *f)
224 if (f->dissector->used_keys &
225 ~(BIT(FLOW_DISSECTOR_KEY_CONTROL) |
226 BIT(FLOW_DISSECTOR_KEY_BASIC) |
227 BIT(FLOW_DISSECTOR_KEY_ETH_ADDRS) |
228 BIT(FLOW_DISSECTOR_KEY_IPV4_ADDRS) |
229 BIT(FLOW_DISSECTOR_KEY_IPV6_ADDRS) |
230 BIT(FLOW_DISSECTOR_KEY_PORTS) |
231 BIT(FLOW_DISSECTOR_KEY_TCP) |
232 BIT(FLOW_DISSECTOR_KEY_VLAN))) {
233 dev_err(mlxsw_sp->bus_info->dev, "Unsupported key\n");
237 mlxsw_sp_acl_rulei_priority(rulei, f->prio);
239 if (dissector_uses_key(f->dissector, FLOW_DISSECTOR_KEY_CONTROL)) {
240 struct flow_dissector_key_control *key =
241 skb_flow_dissector_target(f->dissector,
242 FLOW_DISSECTOR_KEY_CONTROL,
244 addr_type = key->addr_type;
247 if (dissector_uses_key(f->dissector, FLOW_DISSECTOR_KEY_BASIC)) {
248 struct flow_dissector_key_basic *key =
249 skb_flow_dissector_target(f->dissector,
250 FLOW_DISSECTOR_KEY_BASIC,
252 struct flow_dissector_key_basic *mask =
253 skb_flow_dissector_target(f->dissector,
254 FLOW_DISSECTOR_KEY_BASIC,
256 u16 n_proto_key = ntohs(key->n_proto);
257 u16 n_proto_mask = ntohs(mask->n_proto);
259 if (n_proto_key == ETH_P_ALL) {
263 mlxsw_sp_acl_rulei_keymask_u32(rulei,
264 MLXSW_AFK_ELEMENT_ETHERTYPE,
265 n_proto_key, n_proto_mask);
267 ip_proto = key->ip_proto;
268 mlxsw_sp_acl_rulei_keymask_u32(rulei,
269 MLXSW_AFK_ELEMENT_IP_PROTO,
270 key->ip_proto, mask->ip_proto);
273 if (dissector_uses_key(f->dissector, FLOW_DISSECTOR_KEY_ETH_ADDRS)) {
274 struct flow_dissector_key_eth_addrs *key =
275 skb_flow_dissector_target(f->dissector,
276 FLOW_DISSECTOR_KEY_ETH_ADDRS,
278 struct flow_dissector_key_eth_addrs *mask =
279 skb_flow_dissector_target(f->dissector,
280 FLOW_DISSECTOR_KEY_ETH_ADDRS,
283 mlxsw_sp_acl_rulei_keymask_buf(rulei,
284 MLXSW_AFK_ELEMENT_DMAC,
287 mlxsw_sp_acl_rulei_keymask_buf(rulei,
288 MLXSW_AFK_ELEMENT_SMAC,
293 if (dissector_uses_key(f->dissector, FLOW_DISSECTOR_KEY_VLAN)) {
294 struct flow_dissector_key_vlan *key =
295 skb_flow_dissector_target(f->dissector,
296 FLOW_DISSECTOR_KEY_VLAN,
298 struct flow_dissector_key_vlan *mask =
299 skb_flow_dissector_target(f->dissector,
300 FLOW_DISSECTOR_KEY_VLAN,
302 if (mask->vlan_id != 0)
303 mlxsw_sp_acl_rulei_keymask_u32(rulei,
304 MLXSW_AFK_ELEMENT_VID,
307 if (mask->vlan_priority != 0)
308 mlxsw_sp_acl_rulei_keymask_u32(rulei,
309 MLXSW_AFK_ELEMENT_PCP,
311 mask->vlan_priority);
314 if (addr_type == FLOW_DISSECTOR_KEY_IPV4_ADDRS)
315 mlxsw_sp_flower_parse_ipv4(rulei, f);
317 if (addr_type == FLOW_DISSECTOR_KEY_IPV6_ADDRS)
318 mlxsw_sp_flower_parse_ipv6(rulei, f);
320 err = mlxsw_sp_flower_parse_ports(mlxsw_sp, rulei, f, ip_proto);
323 err = mlxsw_sp_flower_parse_tcp(mlxsw_sp, rulei, f, ip_proto);
327 return mlxsw_sp_flower_parse_actions(mlxsw_sp, dev, rulei, f->exts);
330 int mlxsw_sp_flower_replace(struct mlxsw_sp_port *mlxsw_sp_port, bool ingress,
331 __be16 protocol, struct tc_cls_flower_offload *f)
333 struct mlxsw_sp *mlxsw_sp = mlxsw_sp_port->mlxsw_sp;
334 struct net_device *dev = mlxsw_sp_port->dev;
335 struct mlxsw_sp_acl_rule_info *rulei;
336 struct mlxsw_sp_acl_ruleset *ruleset;
337 struct mlxsw_sp_acl_rule *rule;
340 ruleset = mlxsw_sp_acl_ruleset_get(mlxsw_sp, dev, ingress,
341 MLXSW_SP_ACL_PROFILE_FLOWER);
343 return PTR_ERR(ruleset);
345 rule = mlxsw_sp_acl_rule_create(mlxsw_sp, ruleset, f->cookie);
348 goto err_rule_create;
351 rulei = mlxsw_sp_acl_rule_rulei(rule);
352 err = mlxsw_sp_flower_parse(mlxsw_sp, dev, rulei, f);
354 goto err_flower_parse;
356 err = mlxsw_sp_acl_rulei_commit(rulei);
358 goto err_rulei_commit;
360 err = mlxsw_sp_acl_rule_add(mlxsw_sp, rule);
364 mlxsw_sp_acl_ruleset_put(mlxsw_sp, ruleset);
370 mlxsw_sp_acl_rule_destroy(mlxsw_sp, rule);
372 mlxsw_sp_acl_ruleset_put(mlxsw_sp, ruleset);
376 void mlxsw_sp_flower_destroy(struct mlxsw_sp_port *mlxsw_sp_port, bool ingress,
377 struct tc_cls_flower_offload *f)
379 struct mlxsw_sp *mlxsw_sp = mlxsw_sp_port->mlxsw_sp;
380 struct mlxsw_sp_acl_ruleset *ruleset;
381 struct mlxsw_sp_acl_rule *rule;
383 ruleset = mlxsw_sp_acl_ruleset_get(mlxsw_sp, mlxsw_sp_port->dev,
385 MLXSW_SP_ACL_PROFILE_FLOWER);
389 rule = mlxsw_sp_acl_rule_lookup(mlxsw_sp, ruleset, f->cookie);
391 mlxsw_sp_acl_rule_del(mlxsw_sp, rule);
392 mlxsw_sp_acl_rule_destroy(mlxsw_sp, rule);
395 mlxsw_sp_acl_ruleset_put(mlxsw_sp, ruleset);
398 int mlxsw_sp_flower_stats(struct mlxsw_sp_port *mlxsw_sp_port, bool ingress,
399 struct tc_cls_flower_offload *f)
401 struct mlxsw_sp *mlxsw_sp = mlxsw_sp_port->mlxsw_sp;
402 struct mlxsw_sp_acl_ruleset *ruleset;
403 struct mlxsw_sp_acl_rule *rule;
409 ruleset = mlxsw_sp_acl_ruleset_get(mlxsw_sp, mlxsw_sp_port->dev,
411 MLXSW_SP_ACL_PROFILE_FLOWER);
412 if (WARN_ON(IS_ERR(ruleset)))
415 rule = mlxsw_sp_acl_rule_lookup(mlxsw_sp, ruleset, f->cookie);
419 err = mlxsw_sp_acl_rule_get_stats(mlxsw_sp, rule, &packets, &bytes,
422 goto err_rule_get_stats;
424 tcf_exts_stats_update(f->exts, bytes, packets, lastuse);
426 mlxsw_sp_acl_ruleset_put(mlxsw_sp, ruleset);
430 mlxsw_sp_acl_ruleset_put(mlxsw_sp, ruleset);