On Thursday, June 06/25/20, 2020 at 15:55:10 -0700, Jakub Kicinski wrote: > On Thu, 25 Jun 2020 17:28:40 +0530 Rahul Lakkireddy wrote: > > This series of patches add support to mirror all ingress traffic > > for TC-MATCHALL ingress offload. > > > > Patch 1 adds support to dynamically create a mirror Virtual Interface > > (VI) that accepts all mirror ingress traffic when mirror action is > > set in TC-MATCHALL offload. > > > > Patch 2 adds support to allocate mirror Rxqs and setup RSS for the > > mirror VI. > > > > Patch 3 adds support to replicate all the main VI configuration to > > mirror VI. This includes replicating MTU, promiscuous mode, > > all-multicast mode, and enabled netdev Rx feature offloads. > > Could you say more about this mirror VI? Is this an internal object > within the NIC or something visible to the user? >
The Virtual Interface (VI) is an internal object managed by firmware and Multi Port Switch (MPS) module in hardware. Each VI can be programmed with a unique MAC address in the MPS TCAM. So, 1 physical port can have multiple VIs, each with their own MAC address. It's also possible for VIs to share the same MAC address, which would result in MPS setting the replication mode for that entry in the TCAM. In this case, the incoming packet would get replicated and sent to all the VIs sharing the MAC address. When MPS is able to classify the destination MAC in the incoming packet with an entry in the MPS TCAM, it forwards the packet to the corresponding VI(s). In case of Mirror VI, we program the same MAC as the existing main VI. This will result in MPS setting the replication mode for that existing entry in the MPS TCAM. So, the MPS would replicate the incoming packet and send it to both the main VI and mirror VI. Note that for the main VI, we also programmed the flow Lookup Engine (LE) module to switch the packet back out on one of the underlying ports. So, when this rule hits in the LE, the main VI's packet would get switched back out in hardware to one of the underlying ports and will not reach driver. The mirror VI's packet will not hit any rule in the LE and will be received by the driver and will be sent up to Linux networking stack. > Also looking at the implementation of redirect: > > case FLOW_ACTION_REDIRECT: { > struct net_device *out = act->dev; > struct port_info *pi = netdev_priv(out); > > fs->action = FILTER_SWITCH; > fs->eport = pi->port_id; > } > > How do you know the output interface is controlled by your driver, and > therefore it's sage to cast netdev_priv() to port_info? We're validating it earlier in cxgb4_validate_flow_actions(). Here's the code snippet. We're saving the netdevice pointer returned by alloc_etherdev_mq() during PCI probe in cxgb4_main.c::init_one() and using it to compare the netdevice given by redirect action. If the redirect action's netdevice doesn't match any of our underlying ports, then we fail offloading this rule. case FLOW_ACTION_REDIRECT: { struct adapter *adap = netdev2adap(dev); struct net_device *n_dev, *target_dev; unsigned int i; bool found = false; target_dev = act->dev; for_each_port(adap, i) { n_dev = adap->port[i]; if (target_dev == n_dev) { found = true; break; } } /* If interface doesn't belong to our hw, then * the provided output port is not valid */ if (!found) { netdev_err(dev, "%s: Out port invalid\n", __func__); return -EINVAL; } act_redir = true; } break; Thanks, Rahul