This adds both the source and destination chain id to the information kept for enabled port lookups. This allows enabling and disabling a chain of lookups by walking the chain information for a port. This changes the way that VCAP lookups are enabled from userspace: instead of one matchall rule that enables all the 4 Sparx5 IS2 lookups, you need a matchall rule per lookup. In practice that is done by adding one matchall rule in chain 0 to goto IS2 Lookup 0, and then for each lookup you add a rule per lookup (low priority) that does a goto to the next lookup chain. Examples: If you want IS2 Lookup 0 to be enabled you add the same matchall filter as before: tc filter add dev eth12 ingress chain 0 prio 1000 handle 1000 matchall \ skip_sw action goto chain 8000000 If you also want to enable lookup 1 to 3 in IS2 and chain them you need to add the following matchall filters: tc filter add dev eth12 ingress chain 8000000 prio 1000 handle 1000 \ matchall skip_sw action goto chain 8100000 tc filter add dev eth12 ingress chain 8100000 prio 1000 handle 1000 \ matchall skip_sw action goto chain 8200000 tc filter add dev eth12 ingress chain 8200000 prio 1000 handle 1000 \ matchall skip_sw action goto chain 8300000 Signed-off-by: Horatiu Vultur <horatiu.vultur@microchip.com> Signed-off-by: Steen Hegelund <steen.hegelund@microchip.com> Signed-off-by: David S. Miller <davem@davemloft.net>
98 lines
2.4 KiB
C
98 lines
2.4 KiB
C
// SPDX-License-Identifier: GPL-2.0+
|
|
/* Microchip VCAP API
|
|
*
|
|
* Copyright (c) 2022 Microchip Technology Inc. and its subsidiaries.
|
|
*/
|
|
|
|
#include "sparx5_tc.h"
|
|
#include "vcap_api.h"
|
|
#include "vcap_api_client.h"
|
|
#include "sparx5_main_regs.h"
|
|
#include "sparx5_main.h"
|
|
#include "sparx5_vcap_impl.h"
|
|
|
|
static int sparx5_tc_matchall_replace(struct net_device *ndev,
|
|
struct tc_cls_matchall_offload *tmo,
|
|
bool ingress)
|
|
{
|
|
struct sparx5_port *port = netdev_priv(ndev);
|
|
struct flow_action_entry *action;
|
|
struct sparx5 *sparx5;
|
|
int err;
|
|
|
|
if (!flow_offload_has_one_action(&tmo->rule->action)) {
|
|
NL_SET_ERR_MSG_MOD(tmo->common.extack,
|
|
"Only one action per filter is supported");
|
|
return -EOPNOTSUPP;
|
|
}
|
|
action = &tmo->rule->action.entries[0];
|
|
|
|
sparx5 = port->sparx5;
|
|
switch (action->id) {
|
|
case FLOW_ACTION_GOTO:
|
|
err = vcap_enable_lookups(sparx5->vcap_ctrl, ndev,
|
|
tmo->common.chain_index,
|
|
action->chain_index, tmo->cookie,
|
|
true);
|
|
if (err == -EFAULT) {
|
|
NL_SET_ERR_MSG_MOD(tmo->common.extack,
|
|
"Unsupported goto chain");
|
|
return -EOPNOTSUPP;
|
|
}
|
|
if (err == -EADDRINUSE) {
|
|
NL_SET_ERR_MSG_MOD(tmo->common.extack,
|
|
"VCAP already enabled");
|
|
return -EOPNOTSUPP;
|
|
}
|
|
if (err == -EADDRNOTAVAIL) {
|
|
NL_SET_ERR_MSG_MOD(tmo->common.extack,
|
|
"Already matching this chain");
|
|
return -EOPNOTSUPP;
|
|
}
|
|
if (err) {
|
|
NL_SET_ERR_MSG_MOD(tmo->common.extack,
|
|
"Could not enable VCAP lookups");
|
|
return err;
|
|
}
|
|
break;
|
|
default:
|
|
NL_SET_ERR_MSG_MOD(tmo->common.extack, "Unsupported action");
|
|
return -EOPNOTSUPP;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static int sparx5_tc_matchall_destroy(struct net_device *ndev,
|
|
struct tc_cls_matchall_offload *tmo,
|
|
bool ingress)
|
|
{
|
|
struct sparx5_port *port = netdev_priv(ndev);
|
|
struct sparx5 *sparx5;
|
|
int err;
|
|
|
|
sparx5 = port->sparx5;
|
|
if (!tmo->rule && tmo->cookie) {
|
|
err = vcap_enable_lookups(sparx5->vcap_ctrl, ndev,
|
|
0, 0, tmo->cookie, false);
|
|
if (err)
|
|
return err;
|
|
return 0;
|
|
}
|
|
NL_SET_ERR_MSG_MOD(tmo->common.extack, "Unsupported action");
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
int sparx5_tc_matchall(struct net_device *ndev,
|
|
struct tc_cls_matchall_offload *tmo,
|
|
bool ingress)
|
|
{
|
|
switch (tmo->command) {
|
|
case TC_CLSMATCHALL_REPLACE:
|
|
return sparx5_tc_matchall_replace(ndev, tmo, ingress);
|
|
case TC_CLSMATCHALL_DESTROY:
|
|
return sparx5_tc_matchall_destroy(ndev, tmo, ingress);
|
|
default:
|
|
return -EOPNOTSUPP;
|
|
}
|
|
}
|