Hi Sean,

Few nits, that I didn't spot previously, pls see below.
 
> l3fwd-acl contains duplicate functions to l3fwd.
> For this reason we merge l3fwd-acl code into l3fwd
> with '--lookup acl' cmdline option to run ACL.
> 
> Signed-off-by: Sean Morrissey <sean.morris...@intel.com>
> ---
>  MAINTAINERS                                   |    2 -
>  doc/guides/rel_notes/release_22_07.rst        |    5 +
>  doc/guides/sample_app_ug/index.rst            |    1 -
>  doc/guides/sample_app_ug/l3_forward.rst       |   63 +-
>  .../sample_app_ug/l3_forward_access_ctrl.rst  |  340 ---
>  examples/l3fwd-acl/Makefile                   |   51 -
>  examples/l3fwd-acl/main.c                     | 2272 -----------------
>  examples/l3fwd-acl/meson.build                |   13 -
>  examples/l3fwd/Makefile                       |    2 +-
>  examples/l3fwd/l3fwd.h                        |   39 +-
>  examples/l3fwd/l3fwd_acl.c                    | 1098 ++++++++
>  examples/l3fwd/l3fwd_acl.h                    |   51 +
>  examples/l3fwd/l3fwd_acl_scalar.h             |  112 +
>  examples/l3fwd/l3fwd_route.h                  |   16 +
>  examples/l3fwd/main.c                         |   65 +-
>  examples/l3fwd/meson.build                    |    3 +-
>  examples/meson.build                          |    1 -
>  17 files changed, 1434 insertions(+), 2700 deletions(-)
>  delete mode 100644 doc/guides/sample_app_ug/l3_forward_access_ctrl.rst
>  delete mode 100644 examples/l3fwd-acl/Makefile
>  delete mode 100644 examples/l3fwd-acl/main.c
>  delete mode 100644 examples/l3fwd-acl/meson.build
>  create mode 100644 examples/l3fwd/l3fwd_acl.c
>  create mode 100644 examples/l3fwd/l3fwd_acl.h
>  create mode 100644 examples/l3fwd/l3fwd_acl_scalar.h
> 
> diff --git a/MAINTAINERS b/MAINTAINERS
> index 15008c03bc..b29ff8929d 100644
> --- a/MAINTAINERS
> +++ b/MAINTAINERS
> @@ -1505,8 +1505,6 @@ F: lib/acl/
>  F: doc/guides/prog_guide/packet_classif_access_ctrl.rst
>  F: app/test-acl/
>  F: app/test/test_acl.*
> -F: examples/l3fwd-acl/
> -F: doc/guides/sample_app_ug/l3_forward_access_ctrl.rst
> 
...

> diff --git a/examples/l3fwd/l3fwd.h b/examples/l3fwd/l3fwd.h
> index ad39496e64..c22cb796f5 100644
> --- a/examples/l3fwd/l3fwd.h
> +++ b/examples/l3fwd/l3fwd.h
> @@ -7,6 +7,7 @@
> 
>  #include <rte_ethdev.h>
>  #include <rte_vect.h>
> +#include <rte_acl.h>
> 
>  #define DO_RFC_1812_CHECKS
> 
> @@ -61,6 +62,12 @@
>  struct parm_cfg {
>       const char *rule_ipv4_name;
>       const char *rule_ipv6_name;
> +     enum rte_acl_classify_alg alg;
> +};
> +
> +struct acl_algorithms {
> +     const char *name;
> +     enum rte_acl_classify_alg alg;
>  };
> 
>  struct mbuf_table {
> @@ -80,6 +87,7 @@ struct lcore_conf {
>       uint16_t tx_port_id[RTE_MAX_ETHPORTS];
>       uint16_t tx_queue_id[RTE_MAX_ETHPORTS];
>       struct mbuf_table tx_mbufs[RTE_MAX_ETHPORTS];
> +     struct rte_eth_dev_tx_buffer *tx_buffer[RTE_MAX_ETHPORTS];

I don't think it is used anywhere.
Probably remains from previous iterations.


>       void *ipv4_lookup_struct;
>       void *ipv6_lookup_struct;
>  } __rte_cache_aligned;
> @@ -107,6 +115,8 @@ extern struct lcore_conf lcore_conf[RTE_MAX_LCORE];
> 
>  extern struct parm_cfg parm_config;
> 
> +extern struct acl_algorithms acl_alg[];
> +
>  /* Send burst of packets on an output interface */
>  static inline int
>  send_burst(struct lcore_conf *qconf, uint16_t n, uint16_t port)
> @@ -190,10 +200,19 @@ is_valid_ipv4_pkt(struct rte_ipv4_hdr *pkt, uint32_t 
> link_len)
>  }
>  #endif /* DO_RFC_1812_CHECKS */
> 
> +enum rte_acl_classify_alg
> +parse_acl_alg(const char *alg);
> +
> +int
> +usage_acl_alg(char *buf, size_t sz);
> +
>  int
>  init_mem(uint16_t portid, unsigned int nb_mbuf);
> 
> -/* Function pointers for LPM, EM or FIB functionality. */
> +/* Function pointers for ACL, LPM, EM or FIB functionality. */
> +void
> +setup_acl(const int socketid);
> +
>  void
>  setup_lpm(const int socketid);
> 
> @@ -203,12 +222,19 @@ setup_hash(const int socketid);
>  void
>  setup_fib(const int socketid);
> 
> +int
> +acl_check_ptype(int portid);
> +
>  int
>  em_check_ptype(int portid);
> 
>  int
>  lpm_check_ptype(int portid);

Seems not used/defined.

> +uint16_t
> +acl_cb_parse_ptype(uint16_t port, uint16_t queue, struct rte_mbuf *pkts[],
> +               uint16_t nb_pkts, uint16_t max_pkts, void *user_param);
> +

Same not used/defined.


>  uint16_t
>  em_cb_parse_ptype(uint16_t port, uint16_t queue, struct rte_mbuf *pkts[],
>                 uint16_t nb_pkts, uint16_t max_pkts, void *user_param);
> @@ -217,6 +243,9 @@ uint16_t
>  lpm_cb_parse_ptype(uint16_t port, uint16_t queue, struct rte_mbuf *pkts[],
>                  uint16_t nb_pkts, uint16_t max_pkts, void *user_param);
> 
> +int
> +acl_main_loop(__rte_unused void *dummy);
> +
>  int
>  em_main_loop(__rte_unused void *dummy);
> 
> @@ -278,7 +307,13 @@ int
>  fib_event_main_loop_tx_q_burst_vector(__rte_unused void *dummy);
> 
> 
> -/* Return ipv4/ipv6 fwd lookup struct for LPM, EM or FIB. */
> +/* Return ipv4/ipv6 fwd lookup struct for ACL, LPM, EM or FIB. */
> +void *
> +acl_get_ipv4_l3fwd_lookup_struct(const int socketid);
> +
> +void *
> +acl_get_ipv6_l3fwd_lookup_struct(const int socketid);
> +
>  void *
>  em_get_ipv4_l3fwd_lookup_struct(const int socketid);
> 
> diff --git a/examples/l3fwd/l3fwd_acl.c b/examples/l3fwd/l3fwd_acl.c
> new file mode 100644
> index 0000000000..e5fe38dba5
> --- /dev/null
> +++ b/examples/l3fwd/l3fwd_acl.c
> @@ -0,0 +1,1098 @@
> +/* SPDX-License-Identifier: BSD-3-Clause
> + * Copyright(c) 2022 Intel Corporation
> + */
> +
> +#include "l3fwd.h"
> +#include "l3fwd_route.h"
> +
> +/*
> + * Rule and trace formats definitions.
> + */
> +
> +enum {
> +     PROTO_FIELD_IPV4,
> +     SRC_FIELD_IPV4,
> +     DST_FIELD_IPV4,
> +     SRCP_FIELD_IPV4,
> +     DSTP_FIELD_IPV4,
> +     NUM_FIELDS_IPV4
> +};
> +
> +/*
> + * That effectively defines order of IPV4VLAN classifications:
> + *  - PROTO
> + *  - VLAN (TAG and DOMAIN)
> + *  - SRC IP ADDRESS
> + *  - DST IP ADDRESS
> + *  - PORTS (SRC and DST)
> + */
> +enum {
> +     RTE_ACL_IPV4VLAN_PROTO,
> +     RTE_ACL_IPV4VLAN_VLAN,
> +     RTE_ACL_IPV4VLAN_SRC,
> +     RTE_ACL_IPV4VLAN_DST,
> +     RTE_ACL_IPV4VLAN_PORTS,
> +     RTE_ACL_IPV4VLAN_NUM
> +};
> +
> +struct acl_algorithms acl_alg[] = {
> +     {
> +             .name = "scalar",
> +             .alg = RTE_ACL_CLASSIFY_SCALAR,
> +     },
> +     {
> +             .name = "sse",
> +             .alg = RTE_ACL_CLASSIFY_SSE,
> +     },
> +     {
> +             .name = "avx2",
> +             .alg = RTE_ACL_CLASSIFY_AVX2,
> +     },
> +     {
> +             .name = "neon",
> +             .alg = RTE_ACL_CLASSIFY_NEON,
> +     },
> +     {
> +             .name = "altivec",
> +             .alg = RTE_ACL_CLASSIFY_ALTIVEC,
> +     },
> +     {
> +             .name = "avx512x16",
> +             .alg = RTE_ACL_CLASSIFY_AVX512X16,
> +     },
> +     {
> +             .name = "avx512x32",
> +             .alg = RTE_ACL_CLASSIFY_AVX512X32,
> +     },
> +};
> +
> +struct rte_acl_field_def ipv4_defs[NUM_FIELDS_IPV4] = {
> +     {
> +             .type = RTE_ACL_FIELD_TYPE_BITMASK,
> +             .size = sizeof(uint8_t),
> +             .field_index = PROTO_FIELD_IPV4,
> +             .input_index = RTE_ACL_IPV4VLAN_PROTO,
> +             .offset = 0,
> +     },
> +     {
> +             .type = RTE_ACL_FIELD_TYPE_MASK,
> +             .size = sizeof(uint32_t),
> +             .field_index = SRC_FIELD_IPV4,
> +             .input_index = RTE_ACL_IPV4VLAN_SRC,
> +             .offset = offsetof(struct rte_ipv4_hdr, src_addr) -
> +                     offsetof(struct rte_ipv4_hdr, next_proto_id),
> +     },
> +     {
> +             .type = RTE_ACL_FIELD_TYPE_MASK,
> +             .size = sizeof(uint32_t),
> +             .field_index = DST_FIELD_IPV4,
> +             .input_index = RTE_ACL_IPV4VLAN_DST,
> +             .offset = offsetof(struct rte_ipv4_hdr, dst_addr) -
> +                     offsetof(struct rte_ipv4_hdr, next_proto_id),
> +     },
> +     {
> +             .type = RTE_ACL_FIELD_TYPE_RANGE,
> +             .size = sizeof(uint16_t),
> +             .field_index = SRCP_FIELD_IPV4,
> +             .input_index = RTE_ACL_IPV4VLAN_PORTS,
> +             .offset = sizeof(struct rte_ipv4_hdr) -
> +                     offsetof(struct rte_ipv4_hdr, next_proto_id),
> +     },
> +     {
> +             .type = RTE_ACL_FIELD_TYPE_RANGE,
> +             .size = sizeof(uint16_t),
> +             .field_index = DSTP_FIELD_IPV4,
> +             .input_index = RTE_ACL_IPV4VLAN_PORTS,
> +             .offset = sizeof(struct rte_ipv4_hdr) -
> +                     offsetof(struct rte_ipv4_hdr, next_proto_id) +
> +                     sizeof(uint16_t),
> +     },
> +};
> +
> +enum {
> +     PROTO_FIELD_IPV6,
> +     SRC1_FIELD_IPV6,
> +     SRC2_FIELD_IPV6,
> +     SRC3_FIELD_IPV6,
> +     SRC4_FIELD_IPV6,
> +     DST1_FIELD_IPV6,
> +     DST2_FIELD_IPV6,
> +     DST3_FIELD_IPV6,
> +     DST4_FIELD_IPV6,
> +     SRCP_FIELD_IPV6,
> +     DSTP_FIELD_IPV6,
> +     NUM_FIELDS_IPV6
> +};
> +
> +struct rte_acl_field_def ipv6_defs[NUM_FIELDS_IPV6] = {
> +     {
> +             .type = RTE_ACL_FIELD_TYPE_BITMASK,
> +             .size = sizeof(uint8_t),
> +             .field_index = PROTO_FIELD_IPV6,
> +             .input_index = PROTO_FIELD_IPV6,
> +             .offset = 0,
> +     },
> +     {
> +             .type = RTE_ACL_FIELD_TYPE_MASK,
> +             .size = sizeof(uint32_t),
> +             .field_index = SRC1_FIELD_IPV6,
> +             .input_index = SRC1_FIELD_IPV6,
> +             .offset = offsetof(struct rte_ipv6_hdr, src_addr) -
> +                     offsetof(struct rte_ipv6_hdr, proto),
> +     },
> +     {
> +             .type = RTE_ACL_FIELD_TYPE_MASK,
> +             .size = sizeof(uint32_t),
> +             .field_index = SRC2_FIELD_IPV6,
> +             .input_index = SRC2_FIELD_IPV6,
> +             .offset = offsetof(struct rte_ipv6_hdr, src_addr) -
> +                     offsetof(struct rte_ipv6_hdr, proto) + sizeof(uint32_t),
> +     },
> +     {
> +             .type = RTE_ACL_FIELD_TYPE_MASK,
> +             .size = sizeof(uint32_t),
> +             .field_index = SRC3_FIELD_IPV6,
> +             .input_index = SRC3_FIELD_IPV6,
> +             .offset = offsetof(struct rte_ipv6_hdr, src_addr) -
> +                     offsetof(struct rte_ipv6_hdr, proto) +
> +                     2 * sizeof(uint32_t),
> +     },
> +     {
> +             .type = RTE_ACL_FIELD_TYPE_MASK,
> +             .size = sizeof(uint32_t),
> +             .field_index = SRC4_FIELD_IPV6,
> +             .input_index = SRC4_FIELD_IPV6,
> +             .offset = offsetof(struct rte_ipv6_hdr, src_addr) -
> +                     offsetof(struct rte_ipv6_hdr, proto) +
> +                     3 * sizeof(uint32_t),
> +     },
> +     {
> +             .type = RTE_ACL_FIELD_TYPE_MASK,
> +             .size = sizeof(uint32_t),
> +             .field_index = DST1_FIELD_IPV6,
> +             .input_index = DST1_FIELD_IPV6,
> +             .offset = offsetof(struct rte_ipv6_hdr, dst_addr)
> +                             - offsetof(struct rte_ipv6_hdr, proto),
> +     },
> +     {
> +             .type = RTE_ACL_FIELD_TYPE_MASK,
> +             .size = sizeof(uint32_t),
> +             .field_index = DST2_FIELD_IPV6,
> +             .input_index = DST2_FIELD_IPV6,
> +             .offset = offsetof(struct rte_ipv6_hdr, dst_addr) -
> +                     offsetof(struct rte_ipv6_hdr, proto) + sizeof(uint32_t),
> +     },
> +     {
> +             .type = RTE_ACL_FIELD_TYPE_MASK,
> +             .size = sizeof(uint32_t),
> +             .field_index = DST3_FIELD_IPV6,
> +             .input_index = DST3_FIELD_IPV6,
> +             .offset = offsetof(struct rte_ipv6_hdr, dst_addr) -
> +                     offsetof(struct rte_ipv6_hdr, proto) +
> +                     2 * sizeof(uint32_t),
> +     },
> +     {
> +             .type = RTE_ACL_FIELD_TYPE_MASK,
> +             .size = sizeof(uint32_t),
> +             .field_index = DST4_FIELD_IPV6,
> +             .input_index = DST4_FIELD_IPV6,
> +             .offset = offsetof(struct rte_ipv6_hdr, dst_addr) -
> +                     offsetof(struct rte_ipv6_hdr, proto) +
> +                     3 * sizeof(uint32_t),
> +     },
> +     {
> +             .type = RTE_ACL_FIELD_TYPE_RANGE,
> +             .size = sizeof(uint16_t),
> +             .field_index = SRCP_FIELD_IPV6,
> +             .input_index = SRCP_FIELD_IPV6,
> +             .offset = sizeof(struct rte_ipv6_hdr) -
> +                     offsetof(struct rte_ipv6_hdr, proto),
> +     },
> +     {
> +             .type = RTE_ACL_FIELD_TYPE_RANGE,
> +             .size = sizeof(uint16_t),
> +             .field_index = DSTP_FIELD_IPV6,
> +             .input_index = SRCP_FIELD_IPV6,
> +             .offset = sizeof(struct rte_ipv6_hdr) -
> +                     offsetof(struct rte_ipv6_hdr, proto) + sizeof(uint16_t),
> +     },
> +};
> +
> +enum {
> +     CB_FLD_SRC_ADDR,
> +     CB_FLD_DST_ADDR,
> +     CB_FLD_SRC_PORT_LOW,
> +     CB_FLD_SRC_PORT_DLM,
> +     CB_FLD_SRC_PORT_HIGH,
> +     CB_FLD_DST_PORT_LOW,
> +     CB_FLD_DST_PORT_DLM,
> +     CB_FLD_DST_PORT_HIGH,
> +     CB_FLD_PROTO,
> +     CB_FLD_USERDATA,
> +     CB_FLD_NUM,
> +};
> +
> +RTE_ACL_RULE_DEF(acl4_rule, RTE_DIM(ipv4_defs));
> +RTE_ACL_RULE_DEF(acl6_rule, RTE_DIM(ipv6_defs));
> +
> +struct acl_search_t {
> +     const uint8_t *data_ipv4[MAX_PKT_BURST];
> +     struct rte_mbuf *m_ipv4[MAX_PKT_BURST];
> +     uint32_t res_ipv4[MAX_PKT_BURST];
> +     int num_ipv4;
> +
> +     const uint8_t *data_ipv6[MAX_PKT_BURST];
> +     struct rte_mbuf *m_ipv6[MAX_PKT_BURST];
> +     uint32_t res_ipv6[MAX_PKT_BURST];
> +     int num_ipv6;
> +};
> +
> +static struct {
> +     struct rte_acl_ctx *acx_ipv4[NB_SOCKETS];
> +     struct rte_acl_ctx *acx_ipv6[NB_SOCKETS];
> +#ifdef L3FWDACL_DEBUG
> +     struct acl4_rule *rule_ipv4;
> +     struct acl6_rule *rule_ipv6;
> +#endif
> +} acl_config;
> +
> +static const char cb_port_delim[] = ":";
> +
> +static struct rte_acl_rule *acl_base_ipv4, *route_base_ipv4,
> +             *acl_base_ipv6, *route_base_ipv6;
> +static unsigned int acl_num_ipv4, route_num_ipv4,
> +             acl_num_ipv6, route_num_ipv6;
> +
> +#include "l3fwd_acl.h"
> +
> +#include "l3fwd_acl_scalar.h"
> +
> +/*
> + * Parse IPV6 address, expects the following format:
> + * XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX (where X is a hexadecimal digit).
> + */
> +static int
> +parse_ipv6_addr(char *in, uint32_t v[IPV6_ADDR_U32], uint32_t *mask)
> +{
> +     char *sa, *sm, *sv;
> +     const char *dlm =  "/";
> +
> +     sv = NULL;
> +     sa = strtok_r(in, dlm, &sv);
> +     if (sa == NULL)
> +             return -EINVAL;
> +     sm = strtok_r(NULL, dlm, &sv);
> +     if (sm == NULL)
> +             return -EINVAL;
> +
> +     if (inet_pton(AF_INET6, sa, v) != 1)
> +             return -EINVAL;
> +
> +     GET_CB_FIELD(sm, *mask, 0, 128, 0);
> +     return 0;
> +}
> +
> +static int
> +parse_ipv6_net(char *in, struct rte_acl_field field[4])
> +{
> +     int32_t rc;
> +     uint32_t i, v[4];
> +     uint32_t m;
> +     const uint32_t nbu32 = sizeof(uint32_t) * CHAR_BIT;
> +
> +     /* get address. */
> +     rc = parse_ipv6_addr(in, v, &m);
> +     if (rc != 0)
> +             return rc;
> +
> +     /* put all together. */
> +     for (i = 0; i != RTE_DIM(v); i++) {
> +             if (m >= (i + 1) * nbu32)
> +                     field[i].mask_range.u32 = nbu32;
> +             else
> +                     field[i].mask_range.u32 = m > (i * nbu32) ?
> +                             m - (i * 32) : 0;
> +
> +             field[i].value.u32 = v[i];
> +     }
> +
> +     return 0;
> +}
> +
> +static int
> +parse_cb_ipv6_rule(char *str, struct rte_acl_rule *v, int has_userdata)
> +{
> +     int i, rc;
> +     char *s, *sp, *in[CB_FLD_NUM];
> +     static const char *dlm = " \t\n";
> +     int dim = has_userdata ? CB_FLD_NUM : CB_FLD_USERDATA;
> +     s = str;
> +
> +     for (i = 0; i != dim; i++, s = NULL) {
> +             in[i] = strtok_r(s, dlm, &sp);
> +             if (in[i] == NULL)
> +                     return -EINVAL;
> +     }
> +
> +     rc = parse_ipv6_net(in[CB_FLD_SRC_ADDR], v->field + SRC1_FIELD_IPV6);
> +     if (rc != 0) {
> +             acl_log("failed to read source address/mask: %s\n",
> +                     in[CB_FLD_SRC_ADDR]);
> +             return rc;
> +     }
> +
> +     rc = parse_ipv6_net(in[CB_FLD_DST_ADDR], v->field + DST1_FIELD_IPV6);
> +     if (rc != 0) {
> +             acl_log("failed to read destination address/mask: %s\n",
> +                     in[CB_FLD_DST_ADDR]);
> +             return rc;
> +     }
> +
> +     /* source port. */
> +     GET_CB_FIELD(in[CB_FLD_SRC_PORT_LOW],
> +             v->field[SRCP_FIELD_IPV6].value.u16,
> +             0, UINT16_MAX, 0);
> +     GET_CB_FIELD(in[CB_FLD_SRC_PORT_HIGH],
> +             v->field[SRCP_FIELD_IPV6].mask_range.u16,
> +             0, UINT16_MAX, 0);
> +
> +     if (strncmp(in[CB_FLD_SRC_PORT_DLM], cb_port_delim,
> +                     sizeof(cb_port_delim)) != 0)
> +             return -EINVAL;
> +
> +     /* destination port. */
> +     GET_CB_FIELD(in[CB_FLD_DST_PORT_LOW],
> +             v->field[DSTP_FIELD_IPV6].value.u16,
> +             0, UINT16_MAX, 0);
> +     GET_CB_FIELD(in[CB_FLD_DST_PORT_HIGH],
> +             v->field[DSTP_FIELD_IPV6].mask_range.u16,
> +             0, UINT16_MAX, 0);
> +
> +     if (strncmp(in[CB_FLD_DST_PORT_DLM], cb_port_delim,
> +                     sizeof(cb_port_delim)) != 0)
> +             return -EINVAL;
> +
> +     if (v->field[SRCP_FIELD_IPV6].mask_range.u16
> +                     < v->field[SRCP_FIELD_IPV6].value.u16
> +                     || v->field[DSTP_FIELD_IPV6].mask_range.u16
> +                     < v->field[DSTP_FIELD_IPV6].value.u16)
> +             return -EINVAL;
> +
> +     GET_CB_FIELD(in[CB_FLD_PROTO], v->field[PROTO_FIELD_IPV6].value.u8,
> +             0, UINT8_MAX, '/');
> +     GET_CB_FIELD(in[CB_FLD_PROTO], v->field[PROTO_FIELD_IPV6].mask_range.u8,
> +             0, UINT8_MAX, 0);
> +
> +     if (has_userdata)
> +             GET_CB_FIELD(in[CB_FLD_USERDATA], v->data.userdata,
> +                     0, UINT32_MAX, 0);
> +
> +     return 0;
> +}
> +
> +/*
> + * Parse ClassBench rules file.
> + * Expected format:
> + * '@'<src_ipv4_addr>'/'<masklen> <space> \
> + * <dst_ipv4_addr>'/'<masklen> <space> \
> + * <src_port_low> <space> ":" <src_port_high> <space> \
> + * <dst_port_low> <space> ":" <dst_port_high> <space> \
> + * <proto>'/'<mask>
> + */
> +static int
> +parse_ipv4_net(char *in, uint32_t *addr, uint32_t *mask_len)
> +{
> +     char *sa, *sm, *sv;
> +     const char *dlm =  "/";
> +
> +     sv = NULL;
> +     sa = strtok_r(in, dlm, &sv);
> +     if (sa == NULL)
> +             return -EINVAL;
> +     sm = strtok_r(NULL, dlm, &sv);
> +     if (sm == NULL)
> +             return -EINVAL;
> +
> +     if (inet_pton(AF_INET, sa, addr) != 1)
> +             return -EINVAL;
> +
> +     GET_CB_FIELD(sm, *mask_len, 0, 32, 0);
> +     *addr = ntohl(*addr);
> +     return 0;
> +}
> +
> +static int
> +parse_cb_ipv4vlan_rule(char *str, struct rte_acl_rule *v, int has_userdata)
> +{
> +     int i, rc;
> +     char *s, *sp, *in[CB_FLD_NUM];
> +     static const char *dlm = " \t\n";
> +     int dim = has_userdata ? CB_FLD_NUM : CB_FLD_USERDATA;
> +     s = str;
> +
> +     for (i = 0; i != dim; i++, s = NULL) {
> +             in[i] = strtok_r(s, dlm, &sp);
> +             if (in[i] == NULL)
> +                     return -EINVAL;
> +     }
> +
> +     rc = parse_ipv4_net(in[CB_FLD_SRC_ADDR],
> +                     &v->field[SRC_FIELD_IPV4].value.u32,
> +                     &v->field[SRC_FIELD_IPV4].mask_range.u32);
> +     if (rc != 0) {
> +             acl_log("failed to read source address/mask: %s\n",
> +                     in[CB_FLD_SRC_ADDR]);
> +             return rc;
> +     }
> +
> +     rc = parse_ipv4_net(in[CB_FLD_DST_ADDR],
> +                     &v->field[DST_FIELD_IPV4].value.u32,
> +                     &v->field[DST_FIELD_IPV4].mask_range.u32);
> +     if (rc != 0) {
> +             acl_log("failed to read destination address/mask: %s\n",
> +                     in[CB_FLD_DST_ADDR]);
> +             return rc;
> +     }
> +
> +     GET_CB_FIELD(in[CB_FLD_SRC_PORT_LOW],
> +             v->field[SRCP_FIELD_IPV4].value.u16,
> +             0, UINT16_MAX, 0);
> +     GET_CB_FIELD(in[CB_FLD_SRC_PORT_HIGH],
> +             v->field[SRCP_FIELD_IPV4].mask_range.u16,
> +             0, UINT16_MAX, 0);
> +
> +     if (strncmp(in[CB_FLD_SRC_PORT_DLM], cb_port_delim,
> +                     sizeof(cb_port_delim)) != 0) {
> +             return -EINVAL;
> +     }
> +
> +     GET_CB_FIELD(in[CB_FLD_DST_PORT_LOW],
> +             v->field[DSTP_FIELD_IPV4].value.u16,
> +             0, UINT16_MAX, 0);
> +     GET_CB_FIELD(in[CB_FLD_DST_PORT_HIGH],
> +             v->field[DSTP_FIELD_IPV4].mask_range.u16,
> +             0, UINT16_MAX, 0);
> +
> +     if (strncmp(in[CB_FLD_DST_PORT_DLM], cb_port_delim,
> +                     sizeof(cb_port_delim)) != 0) {
> +             return -EINVAL;
> +     }
> +
> +     if (v->field[SRCP_FIELD_IPV4].mask_range.u16
> +                     < v->field[SRCP_FIELD_IPV4].value.u16
> +                     || v->field[DSTP_FIELD_IPV4].mask_range.u16
> +                     < v->field[DSTP_FIELD_IPV4].value.u16) {
> +             return -EINVAL;
> +     }
> +
> +     GET_CB_FIELD(in[CB_FLD_PROTO], v->field[PROTO_FIELD_IPV4].value.u8,
> +             0, UINT8_MAX, '/');
> +     GET_CB_FIELD(in[CB_FLD_PROTO], v->field[PROTO_FIELD_IPV4].mask_range.u8,
> +             0, UINT8_MAX, 0);
> +
> +     if (has_userdata)
> +             GET_CB_FIELD(in[CB_FLD_USERDATA], v->data.userdata, 0,
> +                     UINT32_MAX, 0);
> +
> +     return 0;
> +}
> +
> +static int
> +acl_add_rules(const char *rule_path,
> +             struct rte_acl_rule **proute_base,
> +             unsigned int *proute_num,
> +             struct rte_acl_rule **pacl_base,
> +             unsigned int *pacl_num, uint32_t rule_size,
> +             int (*parser)(char *, struct rte_acl_rule*, int))
> +{
> +     uint8_t *acl_rules, *route_rules;
> +     struct rte_acl_rule *next;
> +     unsigned int acl_num = 0, route_num = 0, total_num = 0;
> +     unsigned int acl_cnt = 0, route_cnt = 0;
> +     char buff[LINE_MAX];
> +     FILE *fh = fopen(rule_path, "rb");
> +     unsigned int i = 0;
> +     int val;
> +
> +     if (fh == NULL)
> +             rte_exit(EXIT_FAILURE, "%s: Open %s failed\n", __func__,
> +                     rule_path);
> +
> +     while ((fgets(buff, LINE_MAX, fh) != NULL)) {
> +             if (buff[0] == ROUTE_LEAD_CHAR)
> +                     route_num++;
> +             else if (buff[0] == ACL_LEAD_CHAR)
> +                     acl_num++;
> +     }
> +
> +     if (route_num == 0)
> +             rte_exit(EXIT_FAILURE, "Not find any route entries in %s!\n",
> +                             rule_path);
> +
> +     val = fseek(fh, 0, SEEK_SET);
> +     if (val < 0) {
> +             rte_exit(EXIT_FAILURE, "%s: File seek operation failed\n",
> +                     __func__);
> +     }
> +
> +     acl_rules = calloc(acl_num, rule_size);
> +
> +     if (acl_rules == NULL)
> +             rte_exit(EXIT_FAILURE, "%s: failed to malloc memory\n",
> +                     __func__);
> +
> +     route_rules = calloc(route_num, rule_size);
> +
> +     if (route_rules == NULL)
> +             rte_exit(EXIT_FAILURE, "%s: failed to malloc memory\n",
> +                     __func__);
> +
> +     i = 0;
> +     while (fgets(buff, LINE_MAX, fh) != NULL) {
> +             i++;
> +
> +             if (is_bypass_line(buff))
> +                     continue;
> +
> +             char s = buff[0];
> +
> +             /* Route entry */
> +             if (s == ROUTE_LEAD_CHAR)
> +                     next = (struct rte_acl_rule *)(route_rules +
> +                             route_cnt * rule_size);
> +
> +             /* ACL entry */
> +             else if (s == ACL_LEAD_CHAR)
> +                     next = (struct rte_acl_rule *)(acl_rules +
> +                             acl_cnt * rule_size);
> +
> +             /* Illegal line */
> +             else
> +                     rte_exit(EXIT_FAILURE,
> +                             "%s Line %u: should start with leading "
> +                             "char %c or %c\n",
> +                             rule_path, i, ROUTE_LEAD_CHAR, ACL_LEAD_CHAR);
> +
> +             if (parser(buff + 1, next, s == ROUTE_LEAD_CHAR) != 0)
> +                     rte_exit(EXIT_FAILURE,
> +                             "%s Line %u: parse rules error\n",
> +                             rule_path, i);
> +
> +             if (s == ROUTE_LEAD_CHAR) {
> +                     /* Check the forwarding port number */
> +                     if ((enabled_port_mask & (1 << next->data.userdata)) ==
> +                                     0)
> +                             rte_exit(EXIT_FAILURE,
> +                                     "%s Line %u: fwd number illegal:%u\n",
> +                                     rule_path, i, next->data.userdata);
> +                     next->data.userdata += FWD_PORT_SHIFT;
> +                     route_cnt++;
> +             } else {
> +                     next->data.userdata = ACL_DENY_SIGNATURE + acl_cnt;
> +                     acl_cnt++;
> +             }
> +
> +             next->data.priority = RTE_ACL_MAX_PRIORITY - total_num;
> +             next->data.category_mask = -1;
> +             total_num++;
> +     }
> +
> +     fclose(fh);
> +
> +     *pacl_base = (struct rte_acl_rule *)acl_rules;
> +     *pacl_num = acl_num;
> +     *proute_base = (struct rte_acl_rule *)route_rules;
> +     *proute_num = route_cnt;
> +
> +     return 0;
> +}
> +
> +enum rte_acl_classify_alg
> +parse_acl_alg(const char *alg)
> +{
> +     uint32_t i;
> +
> +     for (i = 0; i != RTE_DIM(acl_alg); i++) {
> +             if (strcmp(alg, acl_alg[i].name) == 0)
> +                     return acl_alg[i].alg;
> +     }
> +
> +     return RTE_ACL_CLASSIFY_DEFAULT;
> +}
> +
> +int
> +usage_acl_alg(char *buf, size_t sz)
> +{
> +     uint32_t i, n, rc, tn;
> +
> +     n = 0;
> +     tn = 0;
> +     for (i = 0; i < RTE_DIM(acl_alg); i++) {
> +             rc = snprintf(buf + n, sz - n,
> +                     i == RTE_DIM(acl_alg) - 1 ? "%s" : "%s|",
> +                     acl_alg[i].name);
> +             tn += rc;
> +             if (rc < sz - n)
> +                     n += rc;
> +     }
> +
> +     return tn;
> +}
> +
> +static const char *
> +str_acl_alg(enum rte_acl_classify_alg alg)
> +{
> +     uint32_t i;
> +
> +     for (i = 0; i != RTE_DIM(acl_alg); i++) {
> +             if (alg == acl_alg[i].alg)
> +                     return acl_alg[i].name;
> +     }
> +
> +     return "default";
> +}
> +
> +static void
> +dump_acl_config(void)
> +{
> +     printf("ACL options are:\n");
> +     printf("rule_ipv4: %s\n", parm_config.rule_ipv4_name);
> +     printf("rule_ipv6: %s\n", parm_config.rule_ipv6_name);
> +     printf("alg: %s\n", str_acl_alg(parm_config.alg));
> +}
> +
> +static int
> +check_acl_config(void)
> +{
> +     if (parm_config.rule_ipv4_name == NULL) {
> +             acl_log("ACL IPv4 rule file not specified\n");
> +             return -1;
> +     } else if (parm_config.rule_ipv6_name == NULL) {
> +             acl_log("ACL IPv6 rule file not specified\n");
> +             return -1;
> +     }
> +
> +     return 0;
> +}
> +
> +/* Setup ACL context. 8< */

Looks like some typo within comments.

> +static struct rte_acl_ctx*
> +app_acl_init(struct rte_acl_rule *route_base,
> +             struct rte_acl_rule *acl_base, unsigned int route_num,
> +             unsigned int acl_num, int ipv6, int socketid)
> +{
> +     char name[PATH_MAX];
> +     struct rte_acl_param acl_param;
> +     struct rte_acl_config acl_build_param;
> +     struct rte_acl_ctx *context;
> +     int dim = ipv6 ? RTE_DIM(ipv6_defs) : RTE_DIM(ipv4_defs);
> +
> +     /* Create ACL contexts */
> +     snprintf(name, sizeof(name), "%s%d",
> +                     ipv6 ? L3FWD_ACL_IPV6_NAME : L3FWD_ACL_IPV4_NAME,
> +                     socketid);
> +
> +     acl_param.name = name;
> +     acl_param.socket_id = socketid;
> +     acl_param.rule_size = RTE_ACL_RULE_SZ(dim);
> +     acl_param.max_rule_num = MAX_ACL_RULE_NUM;
> +
> +     context = rte_acl_create(&acl_param);
> +     if (context == NULL)
> +             rte_exit(EXIT_FAILURE, "Failed to create ACL context\n");
> +
> +     if (parm_config.alg != RTE_ACL_CLASSIFY_DEFAULT &&
> +                     rte_acl_set_ctx_classify(context, parm_config.alg) != 0)
> +             rte_exit(EXIT_FAILURE,
> +                     "Failed to setup classify method for  ACL context\n");
> +
> +     if (rte_acl_add_rules(context, route_base, route_num) < 0)
> +             rte_exit(EXIT_FAILURE, "add rules failed\n");
> +
> +     if (rte_acl_add_rules(context, acl_base, acl_num) < 0)
> +             rte_exit(EXIT_FAILURE, "add rules failed\n");
> +
> +     /* Perform builds */
> +     memset(&acl_build_param, 0, sizeof(acl_build_param));
> +
> +     acl_build_param.num_categories = DEFAULT_MAX_CATEGORIES;
> +     acl_build_param.num_fields = dim;
> +     memcpy(&acl_build_param.defs, ipv6 ? ipv6_defs : ipv4_defs,
> +             ipv6 ? sizeof(ipv6_defs) : sizeof(ipv4_defs));
> +
> +     if (rte_acl_build(context, &acl_build_param) != 0)
> +             rte_exit(EXIT_FAILURE, "Failed to build ACL trie\n");
> +
> +     rte_acl_dump(context);
> +
> +     return context;
> +}
> +/* >8 End of ACL context setup. */

Typo in comments. 

Reply via email to