From: Roman Zhukov <roman.zhu...@oktetlabs.ru>

Exact match of IP protocol, source and destination
addresses is supported by parser.
EtherType match is enforced to IPv4 EtherType.

Signed-off-by: Roman Zhukov <roman.zhu...@oktetlabs.ru>
Signed-off-by: Andrew Rybchenko <arybche...@solarflare.com>
Reviewed-by: Andrew Lee <a...@solarflare.com>
---
 doc/guides/nics/sfc_efx.rst |  3 ++
 drivers/net/sfc/sfc_flow.c  | 82 +++++++++++++++++++++++++++++++++++++++++++++
 2 files changed, 85 insertions(+)

diff --git a/doc/guides/nics/sfc_efx.rst b/doc/guides/nics/sfc_efx.rst
index 71dc99f..12ac308 100644
--- a/doc/guides/nics/sfc_efx.rst
+++ b/doc/guides/nics/sfc_efx.rst
@@ -131,6 +131,9 @@ Supported pattern items:
 
 - VLAN (exact match of VID, double-tagging is supported)
 
+- IPV4 (exact match of source/destination addresses,
+  IP transport protocol)
+
 Supported actions:
 
 - VOID
diff --git a/drivers/net/sfc/sfc_flow.c b/drivers/net/sfc/sfc_flow.c
index ff55631..ed71ec0 100644
--- a/drivers/net/sfc/sfc_flow.c
+++ b/drivers/net/sfc/sfc_flow.c
@@ -73,6 +73,7 @@ struct sfc_flow_item {
 static sfc_flow_item_parse sfc_flow_parse_void;
 static sfc_flow_item_parse sfc_flow_parse_eth;
 static sfc_flow_item_parse sfc_flow_parse_vlan;
+static sfc_flow_item_parse sfc_flow_parse_ipv4;
 
 static boolean_t
 sfc_flow_is_zero(const uint8_t *buf, unsigned int size)
@@ -315,6 +316,81 @@ sfc_flow_parse_vlan(const struct rte_flow_item *item,
        return 0;
 }
 
+static int
+sfc_flow_parse_ipv4(const struct rte_flow_item *item,
+                   efx_filter_spec_t *efx_spec,
+                   struct rte_flow_error *error)
+{
+       int rc;
+       const struct rte_flow_item_ipv4 *spec = NULL;
+       const struct rte_flow_item_ipv4 *mask = NULL;
+       const uint16_t ether_type_ipv4 = rte_cpu_to_le_16(EFX_ETHER_TYPE_IPV4);
+       const struct rte_flow_item_ipv4 supp_mask = {
+               .hdr = {
+                       .src_addr = 0xffffffff,
+                       .dst_addr = 0xffffffff,
+                       .next_proto_id = 0xff,
+               }
+       };
+
+       rc = sfc_flow_parse_init(item,
+                                (const void **)&spec,
+                                (const void **)&mask,
+                                &supp_mask,
+                                &rte_flow_item_ipv4_mask,
+                                sizeof(struct rte_flow_item_ipv4),
+                                error);
+       if (rc != 0)
+               return rc;
+
+       /*
+        * Filtering by IPv4 source and destination addresses requires
+        * the appropriate ETHER_TYPE in hardware filters
+        */
+       if (!(efx_spec->efs_match_flags & EFX_FILTER_MATCH_ETHER_TYPE)) {
+               efx_spec->efs_match_flags |= EFX_FILTER_MATCH_ETHER_TYPE;
+               efx_spec->efs_ether_type = ether_type_ipv4;
+       } else if (efx_spec->efs_ether_type != ether_type_ipv4) {
+               rte_flow_error_set(error, EINVAL,
+                       RTE_FLOW_ERROR_TYPE_ITEM, item,
+                       "Ethertype in pattern with IPV4 item should be 
appropriate");
+               return -rte_errno;
+       }
+
+       if (spec == NULL)
+               return 0;
+
+       /* IPv4 adresses are in big-endian byte order in item and in efx_spec */
+       if (mask->hdr.src_addr == supp_mask.hdr.src_addr) {
+               efx_spec->efs_match_flags |= EFX_FILTER_MATCH_REM_HOST;
+               efx_spec->efs_rem_host.eo_u32[0] = spec->hdr.src_addr;
+       } else if (mask->hdr.src_addr != 0) {
+               goto fail_bad_mask;
+       }
+
+       if (mask->hdr.dst_addr == supp_mask.hdr.dst_addr) {
+               efx_spec->efs_match_flags |= EFX_FILTER_MATCH_LOC_HOST;
+               efx_spec->efs_loc_host.eo_u32[0] = spec->hdr.dst_addr;
+       } else if (mask->hdr.dst_addr != 0) {
+               goto fail_bad_mask;
+       }
+
+       if (mask->hdr.next_proto_id == supp_mask.hdr.next_proto_id) {
+               efx_spec->efs_match_flags |= EFX_FILTER_MATCH_IP_PROTO;
+               efx_spec->efs_ip_proto = spec->hdr.next_proto_id;
+       } else if (mask->hdr.next_proto_id != 0) {
+               goto fail_bad_mask;
+       }
+
+       return 0;
+
+fail_bad_mask:
+       rte_flow_error_set(error, EINVAL,
+                          RTE_FLOW_ERROR_TYPE_ITEM, item,
+                          "Bad mask in the IPV4 pattern item");
+       return -rte_errno;
+}
+
 static const struct sfc_flow_item sfc_flow_items[] = {
        {
                .type = RTE_FLOW_ITEM_TYPE_VOID,
@@ -334,6 +410,12 @@ static const struct sfc_flow_item sfc_flow_items[] = {
                .layer = SFC_FLOW_ITEM_L2,
                .parse = sfc_flow_parse_vlan,
        },
+       {
+               .type = RTE_FLOW_ITEM_TYPE_IPV4,
+               .prev_layer = SFC_FLOW_ITEM_L2,
+               .layer = SFC_FLOW_ITEM_L3,
+               .parse = sfc_flow_parse_ipv4,
+       },
 };
 
 /*
-- 
2.9.3

Reply via email to