From patchwork Mon Sep 25 01:38:17 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Dexia Li X-Patchwork-Id: 1838814 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=jaguarmicro.com header.i=@jaguarmicro.com header.a=rsa-sha256 header.s=selector2 header.b=nZVNvKxA; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=openvswitch.org (client-ip=2605:bc80:3010::138; helo=smtp1.osuosl.org; envelope-from=ovs-dev-bounces@openvswitch.org; receiver=patchwork.ozlabs.org) Received: from smtp1.osuosl.org (smtp1.osuosl.org [IPv6:2605:bc80:3010::138]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4Rv5BV2wW2z1yng for ; Mon, 25 Sep 2023 11:38:56 +1000 (AEST) Received: from localhost (localhost [127.0.0.1]) by smtp1.osuosl.org (Postfix) with ESMTP id D063381E00; Mon, 25 Sep 2023 01:38:50 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp1.osuosl.org D063381E00 Authentication-Results: smtp1.osuosl.org; dkim=fail reason="signature verification failed" (2048-bit key, unprotected) header.d=jaguarmicro.com header.i=@jaguarmicro.com header.a=rsa-sha256 header.s=selector2 header.b=nZVNvKxA X-Virus-Scanned: amavisd-new at osuosl.org Received: from smtp1.osuosl.org ([127.0.0.1]) by localhost (smtp1.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qcuE6W6LqM8j; Mon, 25 Sep 2023 01:38:49 +0000 (UTC) Received: from lists.linuxfoundation.org (lf-lists.osuosl.org [140.211.9.56]) by smtp1.osuosl.org (Postfix) with ESMTPS id 24F6481771; Mon, 25 Sep 2023 01:38:48 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp1.osuosl.org 24F6481771 Received: from lf-lists.osuosl.org (localhost [127.0.0.1]) by lists.linuxfoundation.org (Postfix) with ESMTP id D119AC0071; Mon, 25 Sep 2023 01:38:47 +0000 (UTC) X-Original-To: ovs-dev@openvswitch.org Delivered-To: ovs-dev@lists.linuxfoundation.org Received: from smtp3.osuosl.org (smtp3.osuosl.org [IPv6:2605:bc80:3010::136]) by lists.linuxfoundation.org (Postfix) with ESMTP id 6A7E2C0032 for ; Mon, 25 Sep 2023 01:38:44 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp3.osuosl.org (Postfix) with ESMTP id B096F60F0F for ; Mon, 25 Sep 2023 01:38:43 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org B096F60F0F Authentication-Results: smtp3.osuosl.org; dkim=pass (2048-bit key, unprotected) header.d=jaguarmicro.com header.i=@jaguarmicro.com header.a=rsa-sha256 header.s=selector2 header.b=nZVNvKxA X-Virus-Scanned: amavisd-new at osuosl.org Received: from smtp3.osuosl.org ([127.0.0.1]) by localhost (smtp3.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MraPjDhcN8PW for ; Mon, 25 Sep 2023 01:38:41 +0000 (UTC) Received: from APC01-SG2-obe.outbound.protection.outlook.com (mail-sgaapc01on2060b.outbound.protection.outlook.com [IPv6:2a01:111:f400:feab::60b]) by smtp3.osuosl.org (Postfix) with ESMTPS id 4237760EF8 for ; Mon, 25 Sep 2023 01:38:39 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org 4237760EF8 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=O5LSvZdoCQVNj6lU31VboHVidy+jlTVS7giqdWtuFdg33w+0HDpTwQuOvY6l63jRuTkaYCIkiTKAk9Lx7yZZEvVBCe3oz1BEhdf/M+ZRcNAmUfEHu5SZTzd1PbVKjAHXeZIjwjEQFMiCvDZ8gUA3GTlSqwm/VXOGaPzHgqLv0zomRjZ7GJ0mTpL13dM3mgXv6BTbm8O/OF6eMyhojd+yUHkd4lgzcw2+cJAiGyDOe26dn26n4L2D8ugYJgc4v/lrRFTh3rYvXnWz7oVGzrrmxK3y3sdsfCFZ81ejT2e9gjK9pDLpSD01FX78tpY2k9/wnb5SylKv2VST2fYEWTMbCQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=xhBLEg/JlAVUEpwLTX0QiyXOrJXdzhFsjrTDU+qm3NQ=; b=glUlwzvRPoeEEWNIquKOlT7OsAUUNYXJupbzrvktgTpvPUJ+3HnQ0PzmqR0qBXAVziAOCD1tP31ddZmMoewccVbgraQP1tR3GGKnd5c+8ILFb5622rYLh2g1UQQdtys4d3bl1uDN8uPcvbKAerer/A7NHZBIVNfCZWxSCa030VpyunMONZVrU53TNrWU6Oc2oyMzkUt2Irbz2geTN/uOBTr6cTp8wX6lElD/oofECgw7V9y1K4iTP9Nc7lFBKvQcLRHje4rbaRik8oL0l3Qyvf/RdQjiNGlxwit2Dx/tWFICqojZZxQPGEpb36n75bLg+5iKbzy/SxQAGXnrLQ3vug== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=jaguarmicro.com; dmarc=pass action=none header.from=jaguarmicro.com; dkim=pass header.d=jaguarmicro.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jaguarmicro.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=xhBLEg/JlAVUEpwLTX0QiyXOrJXdzhFsjrTDU+qm3NQ=; b=nZVNvKxA0NW9Fz9sVrb9QOB4wio+3Kx23Rim5+nffV2TsRj58pp3Vpb6SHmCcE8kpVfxEdQPwpJM9O2Rnqq07fkAuZYt8e/ZQztMma7SK/FLoNghDHuK2ZDwF6b/Xe7KDXe8flPLTI+LJizaoIDPC9lWrC0xXa1y9s8AC8VQXxW+7OStbm4RwRQNwZYOrpaZhNUAFTxuYyG4fjTurHM6flcqr9VuqFOjemr513JfU7JSIuhkRMKuOv6ozWZ22aUez5eKQKJyaHj4nq/bIejM91TOiucbY5tMRatkLwwSmDzeT8yvRgqUpjBnCXxoFwCsj+oI8h42LdTNRH9MUgqxFA== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=jaguarmicro.com; Received: from KL1PR06MB5893.apcprd06.prod.outlook.com (2603:1096:820:df::7) by SEZPR06MB6287.apcprd06.prod.outlook.com (2603:1096:101:126::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6813.27; Mon, 25 Sep 2023 01:38:31 +0000 Received: from KL1PR06MB5893.apcprd06.prod.outlook.com ([fe80::6fd:8ffb:4d15:e43b]) by KL1PR06MB5893.apcprd06.prod.outlook.com ([fe80::6fd:8ffb:4d15:e43b%3]) with mapi id 15.20.6813.027; Mon, 25 Sep 2023 01:38:30 +0000 To: ovs-dev@openvswitch.org Date: Mon, 25 Sep 2023 09:38:17 +0800 Message-Id: <20230925013817.171-1-dexia.li@jaguarmicro.com> X-Mailer: git-send-email 2.33.0.windows.2 X-ClientProxiedBy: SI2PR01CA0046.apcprd01.prod.exchangelabs.com (2603:1096:4:193::18) To KL1PR06MB5893.apcprd06.prod.outlook.com (2603:1096:820:df::7) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: KL1PR06MB5893:EE_|SEZPR06MB6287:EE_ X-MS-Office365-Filtering-Correlation-Id: e12fa1da-f214-4203-1de6-08dbbd681f0b X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:KL1PR06MB5893.apcprd06.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(376002)(366004)(346002)(396003)(136003)(39830400003)(230922051799003)(1800799009)(186009)(451199024)(66899024)(6506007)(6486002)(6666004)(6512007)(52116002)(26005)(107886003)(1076003)(2616005)(66946007)(66556008)(66476007)(86362001)(10290500003)(478600001)(38350700002)(38100700002)(83380400001)(2906002)(8936002)(8676002)(4326008)(36756003)(5660300002)(316002)(6916009)(30864003)(44832011)(41300700001); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: jaguarmicro.com X-MS-Exchange-CrossTenant-Network-Message-Id: e12fa1da-f214-4203-1de6-08dbbd681f0b X-MS-Exchange-CrossTenant-AuthSource: KL1PR06MB5893.apcprd06.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Sep 2023 01:38:30.0457 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 1e45a5c2-d3e1-46b3-a0e6-c5ebf6d8ba7b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: V4XrBCdEZQAXWTXPljTngP+6Xpe/3QoVxUtLjIbPPjE+Da1sd89mICefFAerV3yZ6CCftvNu3p1LdIvVfn/c79vpFpJaHll/gpdEAXEyddM= X-MS-Exchange-Transport-CrossTenantHeadersStamped: SEZPR06MB6287 Cc: qingmin.liu@jaguarmicro.com, david.marchand@redhat.com, i.maximets@ovn.org, joey.xing@jaguarmicro.com Subject: [ovs-dev] [PATCH v3] netdev-dpdk: Add vxlan and geneve tunnel tso. X-BeenThere: ovs-dev@openvswitch.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-Patchwork-Original-From: Dexia Li via dev From: Dexia Li Reply-To: Dexia Li Errors-To: ovs-dev-bounces@openvswitch.org Sender: "dev" For dpdk datapath, this patch provides vxlan and geneve tunnel tso. Only support userspace vxlan or geneve tunnel, meanwhile support tunnel outter and inner csum offload. if netdev do not support offload features, there is a software fallback. Signed-off-by: Dexia Li --- lib/dp-packet.h | 165 ++++++++++++++++++++++++++++++++++++---- lib/netdev-dpdk.c | 100 +++++++++++++++++++++--- lib/netdev-native-tnl.c | 106 +++++++++++++++++++++++--- lib/netdev-native-tnl.h | 5 +- lib/netdev-provider.h | 4 + lib/netdev.c | 34 ++++++--- tests/dpif-netdev.at | 4 +- 7 files changed, 369 insertions(+), 49 deletions(-) diff --git a/lib/dp-packet.h b/lib/dp-packet.h index 70ddf8aa4..4b5883dba 100644 --- a/lib/dp-packet.h +++ b/lib/dp-packet.h @@ -86,22 +86,43 @@ enum dp_packet_offload_mask { DEF_OL_FLAG(DP_PACKET_OL_TX_SCTP_CKSUM, RTE_MBUF_F_TX_SCTP_CKSUM, 0x800), /* Offload IP checksum. */ DEF_OL_FLAG(DP_PACKET_OL_TX_IP_CKSUM, RTE_MBUF_F_TX_IP_CKSUM, 0x1000), + /* Offload packet is tunnel GENEVE. */ + DEF_OL_FLAG(DP_PACKET_OL_TX_TUNNEL_GENEVE, + RTE_MBUF_F_TX_TUNNEL_GENEVE, 0x2000), + /* Offload packet is tunnel VXLAN. */ + DEF_OL_FLAG(DP_PACKET_OL_TX_TUNNEL_VXLAN, + RTE_MBUF_F_TX_TUNNEL_VXLAN, 0x4000), + /* Offload tunnel packet, out is ipv4 */ + DEF_OL_FLAG(DP_PACKET_OL_TX_OUTER_IPV4, + RTE_MBUF_F_TX_OUTER_IPV4, 0x8000), + /* Offload TUNNEL out ipv4 checksum */ + DEF_OL_FLAG(DP_PACKET_OL_TX_OUTER_IP_CKSUM, + RTE_MBUF_F_TX_OUTER_IP_CKSUM, 0x10000), + /* Offload TUNNEL out udp checksum */ + DEF_OL_FLAG(DP_PACKET_OL_TX_OUTER_UDP_CKSUM, + RTE_MBUF_F_TX_OUTER_UDP_CKSUM, 0x20000), + /* Adding new field requires adding to DP_PACKET_OL_SUPPORTED_MASK. */ }; -#define DP_PACKET_OL_SUPPORTED_MASK (DP_PACKET_OL_RSS_HASH | \ - DP_PACKET_OL_FLOW_MARK | \ - DP_PACKET_OL_RX_L4_CKSUM_BAD | \ - DP_PACKET_OL_RX_IP_CKSUM_BAD | \ - DP_PACKET_OL_RX_L4_CKSUM_GOOD | \ - DP_PACKET_OL_RX_IP_CKSUM_GOOD | \ - DP_PACKET_OL_TX_TCP_SEG | \ - DP_PACKET_OL_TX_IPV4 | \ - DP_PACKET_OL_TX_IPV6 | \ - DP_PACKET_OL_TX_TCP_CKSUM | \ - DP_PACKET_OL_TX_UDP_CKSUM | \ - DP_PACKET_OL_TX_SCTP_CKSUM | \ - DP_PACKET_OL_TX_IP_CKSUM) +#define DP_PACKET_OL_SUPPORTED_MASK (DP_PACKET_OL_RSS_HASH | \ + DP_PACKET_OL_FLOW_MARK | \ + DP_PACKET_OL_RX_L4_CKSUM_BAD | \ + DP_PACKET_OL_RX_IP_CKSUM_BAD | \ + DP_PACKET_OL_RX_L4_CKSUM_GOOD | \ + DP_PACKET_OL_RX_IP_CKSUM_GOOD | \ + DP_PACKET_OL_TX_TCP_SEG | \ + DP_PACKET_OL_TX_IPV4 | \ + DP_PACKET_OL_TX_IPV6 | \ + DP_PACKET_OL_TX_TCP_CKSUM | \ + DP_PACKET_OL_TX_UDP_CKSUM | \ + DP_PACKET_OL_TX_SCTP_CKSUM | \ + DP_PACKET_OL_TX_IP_CKSUM | \ + DP_PACKET_OL_TX_TUNNEL_GENEVE | \ + DP_PACKET_OL_TX_TUNNEL_VXLAN | \ + DP_PACKET_OL_TX_OUTER_IPV4 | \ + DP_PACKET_OL_TX_OUTER_IP_CKSUM | \ + DP_PACKET_OL_TX_OUTER_UDP_CKSUM) #define DP_PACKET_OL_TX_L4_MASK (DP_PACKET_OL_TX_TCP_CKSUM | \ DP_PACKET_OL_TX_UDP_CKSUM | \ @@ -535,6 +556,25 @@ dp_packet_get_nd_payload(const struct dp_packet *b) } #ifdef DPDK_NETDEV +static inline void +dp_packet_set_l2_len(struct dp_packet *b, size_t l2_len) +{ + b->mbuf.l2_len = l2_len; +} + +static inline void +dp_packet_set_l3_len(struct dp_packet *b, size_t l3_len) +{ + b->mbuf.l3_len = l3_len; +} + +static inline void +dp_packet_set_l4_len(struct dp_packet *b, size_t l4_len) +{ + b->mbuf.l4_len = l4_len; +} + + static inline uint64_t * dp_packet_ol_flags_ptr(const struct dp_packet *b) { @@ -554,6 +594,24 @@ dp_packet_flow_mark_ptr(const struct dp_packet *b) } #else +static inline void +dp_packet_set_l2_len(struct dp_packet *b OVS_UNUSED, size_t l2_len OVS_UNUSED) +{ + /* There are no implementation */ +} + +static inline void +dp_packet_set_l3_len(struct dp_packet *b OVS_UNUSED, size_t l3_len OVS_UNUSED) +{ + /* There are no implementation */ +} + +static inline void +dp_packet_set_l4_len(struct dp_packet *b OVS_UNUSED, size_t l4_len OVS_UNUSED) +{ + /* There are no implementation */ +} + static inline uint32_t * dp_packet_ol_flags_ptr(const struct dp_packet *b) { @@ -615,9 +673,10 @@ dp_packet_set_size(struct dp_packet *b, uint32_t v) * (and thus 'v') will always be <= UINT16_MAX; this means that there is no * loss of accuracy in assigning 'v' to 'data_len'. */ - b->mbuf.data_len = (uint16_t)v; /* Current seg length. */ - b->mbuf.pkt_len = v; /* Total length of all segments linked to - * this segment. */ + /* Current seg length. */ + b->mbuf.data_len += (uint16_t)(v - b->mbuf.pkt_len); + /* Total length of all segments linked to this segment. */ + b->mbuf.pkt_len = v; } static inline uint16_t @@ -1030,6 +1089,43 @@ dp_packet_hwol_l4_is_sctp(struct dp_packet *b) DP_PACKET_OL_TX_SCTP_CKSUM; } +/* Returns 'true' if packet 'b' is marked for tunnel GENEVE + * checksum offloading. */ +static inline bool +dp_packet_hwol_is_tunnel_geneve(struct dp_packet *b) +{ + return !!(*dp_packet_ol_flags_ptr(b) & DP_PACKET_OL_TX_TUNNEL_GENEVE); +} + +/* Returns 'true' if packet 'b' is marked for tunnel VXLAN + * checksum offloading. */ +static inline bool +dp_packet_hwol_is_tunnel_vxlan(struct dp_packet *b) +{ + return !!(*dp_packet_ol_flags_ptr(b) & DP_PACKET_OL_TX_TUNNEL_VXLAN); +} + +/* Returns 'true' if packet 'b' is marked for out ipv4. */ +static inline bool +dp_packet_hwol_is_outer_ipv4(struct dp_packet *b) +{ + return !!(*dp_packet_ol_flags_ptr(b) & DP_PACKET_OL_TX_OUTER_IPV4); +} + +/* Returns 'true' if packet 'b' is marked for out ipv4 csum offload. */ +static inline bool +dp_packet_hwol_is_outer_ipv4_cksum(struct dp_packet *b) +{ + return !!(*dp_packet_ol_flags_ptr(b) & DP_PACKET_OL_TX_OUTER_IP_CKSUM); +} + +/* Returns 'true' if packet 'b' is marked for out udp csum offload. */ +static inline bool +dp_packet_hwol_is_outer_UDP_cksum(struct dp_packet *b) +{ + return !!(*dp_packet_ol_flags_ptr(b) & DP_PACKET_OL_TX_OUTER_UDP_CKSUM); +} + static inline void dp_packet_hwol_reset_tx_l4_csum(struct dp_packet *p) { @@ -1105,6 +1201,43 @@ dp_packet_hwol_set_tcp_seg(struct dp_packet *b) *dp_packet_ol_flags_ptr(b) |= DP_PACKET_OL_TX_TCP_SEG; } +/* Mark packet 'b' for tunnel geneve offloading. It implies that + * the packet 'b' is marked for tunnel geneve offloading. */ +static inline void +dp_packet_hwol_set_tunnel_geneve(struct dp_packet *b) +{ + *dp_packet_ol_flags_ptr(b) |= DP_PACKET_OL_TX_TUNNEL_GENEVE; +} + +/* Mark packet 'b' for tunnel vxlan offloading. It implies that + * the packet 'b' is marked for tunnel vxlan offloading. */ +static inline void +dp_packet_hwol_set_tunnel_vxlan(struct dp_packet *b) +{ + *dp_packet_ol_flags_ptr(b) |= DP_PACKET_OL_TX_TUNNEL_VXLAN; +} + +/* Mark packet 'b' for out ipv4 packet. */ +static inline void +dp_packet_hwol_set_outer_ipv4(struct dp_packet *b) +{ + *dp_packet_ol_flags_ptr(b) |= DP_PACKET_OL_TX_OUTER_IPV4; +} + +/* Mark packet 'b' for out ipv4 csum offloading. */ +static inline void +dp_packet_hwol_set_outer_ipv4_csum(struct dp_packet *b) +{ + *dp_packet_ol_flags_ptr(b) |= DP_PACKET_OL_TX_OUTER_IP_CKSUM; +} + +/* Mark packet 'b' for out udp csum offloading. */ +static inline void +dp_packet_hwol_set_outer_udp_csum(struct dp_packet *b) +{ + *dp_packet_ol_flags_ptr(b) |= DP_PACKET_OL_TX_OUTER_UDP_CKSUM; +} + /* Returns 'true' if the IP header has good integrity and the * checksum in it is complete. */ static inline bool diff --git a/lib/netdev-dpdk.c b/lib/netdev-dpdk.c index 55700250d..fbe46fc4b 100644 --- a/lib/netdev-dpdk.c +++ b/lib/netdev-dpdk.c @@ -416,6 +416,10 @@ enum dpdk_hw_ol_features { NETDEV_TX_UDP_CKSUM_OFFLOAD = 1 << 5, NETDEV_TX_SCTP_CKSUM_OFFLOAD = 1 << 6, NETDEV_TX_TSO_OFFLOAD = 1 << 7, + NETDEV_TX_VXLAN_TNL_TSO_OFFLOAD = 1 << 8, + NETDEV_TX_GENEVE_TNL_TSO_OFFLOAD = 1 << 9, + NETDEV_TX_OUTER_IP_CKSUM_OFFLOAD = 1 << 10, + NETDEV_TX_OUTER_UDP_CKSUM_OFFLOAD = 1 << 11, }; enum dpdk_rx_steer_flags { @@ -1075,6 +1079,14 @@ netdev_dpdk_update_netdev_flags(struct netdev_dpdk *dev) NETDEV_TX_OFFLOAD_SCTP_CKSUM); netdev_dpdk_update_netdev_flag(dev, NETDEV_TX_TSO_OFFLOAD, NETDEV_TX_OFFLOAD_TCP_TSO); + netdev_dpdk_update_netdev_flag(dev, NETDEV_TX_VXLAN_TNL_TSO_OFFLOAD, + NETDEV_TX_VXLAN_TNL_TSO); + netdev_dpdk_update_netdev_flag(dev, NETDEV_TX_GENEVE_TNL_TSO_OFFLOAD, + NETDEV_TX_GENEVE_TNL_TSO); + netdev_dpdk_update_netdev_flag(dev, NETDEV_TX_OUTER_IP_CKSUM_OFFLOAD, + NETDEV_TX_OFFLOAD_OUTER_IP_CKSUM); + netdev_dpdk_update_netdev_flag(dev, NETDEV_TX_OUTER_UDP_CKSUM_OFFLOAD, + NETDEV_TX_OFFLOAD_OUTER_UDP_CKSUM); } static int @@ -1129,6 +1141,23 @@ dpdk_eth_dev_port_config(struct netdev_dpdk *dev, int n_rxq, int n_txq) conf.txmode.offloads |= RTE_ETH_TX_OFFLOAD_TCP_TSO; } + if (dev->hw_ol_features & NETDEV_TX_VXLAN_TNL_TSO_OFFLOAD) { + conf.txmode.offloads |= RTE_ETH_TX_OFFLOAD_VXLAN_TNL_TSO; + } + + if (dev->hw_ol_features & NETDEV_TX_GENEVE_TNL_TSO_OFFLOAD) { + conf.txmode.offloads |= RTE_ETH_TX_OFFLOAD_GENEVE_TNL_TSO; + } + + if (dev->hw_ol_features & NETDEV_TX_OUTER_IP_CKSUM_OFFLOAD) { + conf.txmode.offloads |= RTE_ETH_TX_OFFLOAD_OUTER_IPV4_CKSUM; + } + + if (dev->hw_ol_features & NETDEV_TX_OUTER_UDP_CKSUM_OFFLOAD) { + conf.txmode.offloads |= RTE_ETH_TX_OFFLOAD_OUTER_UDP_CKSUM; + } + + /* Limit configured rss hash functions to only those supported * by the eth device. */ conf.rx_adv_conf.rss_conf.rss_hf &= info.flow_type_rss_offloads; @@ -1346,6 +1375,18 @@ dpdk_eth_dev_init(struct netdev_dpdk *dev) dev->hw_ol_features &= ~NETDEV_TX_SCTP_CKSUM_OFFLOAD; } + if (info.tx_offload_capa & RTE_ETH_TX_OFFLOAD_OUTER_IPV4_CKSUM) { + dev->hw_ol_features |= NETDEV_TX_OUTER_IP_CKSUM_OFFLOAD; + } else { + dev->hw_ol_features &= ~NETDEV_TX_OUTER_IP_CKSUM_OFFLOAD; + } + + if (info.tx_offload_capa & RTE_ETH_TX_OFFLOAD_OUTER_UDP_CKSUM) { + dev->hw_ol_features |= NETDEV_TX_OUTER_UDP_CKSUM_OFFLOAD; + } else { + dev->hw_ol_features &= ~NETDEV_TX_OUTER_UDP_CKSUM_OFFLOAD; + } + dev->hw_ol_features &= ~NETDEV_TX_TSO_OFFLOAD; if (userspace_tso_enabled()) { if (info.tx_offload_capa & RTE_ETH_TX_OFFLOAD_TCP_TSO) { @@ -1354,6 +1395,20 @@ dpdk_eth_dev_init(struct netdev_dpdk *dev) VLOG_WARN("%s: Tx TSO offload is not supported.", netdev_get_name(&dev->up)); } + + if (info.tx_offload_capa & RTE_ETH_TX_OFFLOAD_VXLAN_TNL_TSO) { + dev->hw_ol_features |= NETDEV_TX_VXLAN_TNL_TSO_OFFLOAD; + } else { + VLOG_WARN("%s: Tx Vxlan tunnel TSO offload is not supported.", + netdev_get_name(&dev->up)); + } + + if (info.tx_offload_capa & RTE_ETH_TX_OFFLOAD_GENEVE_TNL_TSO) { + dev->hw_ol_features |= NETDEV_TX_GENEVE_TNL_TSO_OFFLOAD; + } else { + VLOG_WARN("%s: Tx Geneve tunnel TSO offload is not supported.", + netdev_get_name(&dev->up)); + } } n_rxq = MIN(info.max_rx_queues, dev->up.n_rxq); @@ -2445,29 +2500,56 @@ netdev_dpdk_prep_hwol_packet(struct netdev_dpdk *dev, struct rte_mbuf *mbuf) return true; } - mbuf->l2_len = (char *) dp_packet_l3(pkt) - (char *) dp_packet_eth(pkt); - mbuf->l3_len = (char *) dp_packet_l4(pkt) - (char *) dp_packet_l3(pkt); - mbuf->l4_len = 0; - mbuf->outer_l2_len = 0; - mbuf->outer_l3_len = 0; + /* If packet is vxlan or geneve tunnel packet, calculate outer + * l2 len and outer l3 len. Inner l2/l3/l4 len are calculated + * before. */ + if (mbuf->ol_flags & RTE_MBUF_F_TX_L4_MASK) { + if (mbuf->ol_flags & + (RTE_MBUF_F_TX_TUNNEL_GENEVE | RTE_MBUF_F_TX_TUNNEL_VXLAN)) { + mbuf->outer_l2_len = (char *) dp_packet_l3(pkt) - + (char *) dp_packet_eth(pkt); + mbuf->outer_l3_len = (char *) dp_packet_l4(pkt) - + (char *) dp_packet_l3(pkt); + } else { + mbuf->l2_len = (char *) dp_packet_l3(pkt) - + (char *) dp_packet_eth(pkt); + mbuf->l3_len = (char *) dp_packet_l4(pkt) - + (char *) dp_packet_l3(pkt); + mbuf->outer_l2_len = 0; + mbuf->outer_l3_len = 0; + } + } if (mbuf->ol_flags & RTE_MBUF_F_TX_TCP_SEG) { struct tcp_header *th = dp_packet_l4(pkt); if (!th) { - VLOG_WARN_RL(&rl, "%s: TCP Segmentation without L4 header" - " pkt len: %"PRIu32"", dev->up.name, mbuf->pkt_len); + VLOG_WARN_RL(&rl, + "%s: TCP Segmentation without L4 header,pkt len: %"PRIu32"", + dev->up.name, mbuf->pkt_len); return false; } - mbuf->l4_len = TCP_OFFSET(th->tcp_ctl) * 4; + if (mbuf->ol_flags & (RTE_MBUF_F_TX_TUNNEL_GENEVE | + RTE_MBUF_F_TX_TUNNEL_VXLAN)) { + mbuf->tso_segsz = dev->mtu - mbuf->l2_len - mbuf->l3_len - + mbuf->l4_len - mbuf->outer_l3_len; + } else { + mbuf->l4_len = TCP_OFFSET(th->tcp_ctl) * 4; + mbuf->tso_segsz = dev->mtu - mbuf->l3_len - mbuf->l4_len; + } + mbuf->ol_flags |= RTE_MBUF_F_TX_TCP_CKSUM; - mbuf->tso_segsz = dev->mtu - mbuf->l3_len - mbuf->l4_len; if (mbuf->ol_flags & RTE_MBUF_F_TX_IPV4) { mbuf->ol_flags |= RTE_MBUF_F_TX_IP_CKSUM; } } + + if ((mbuf->ol_flags & RTE_MBUF_F_TX_L4_MASK) + && (mbuf->ol_flags & RTE_MBUF_F_TX_IPV4)) + mbuf->ol_flags |= RTE_MBUF_F_TX_IP_CKSUM; + return true; } diff --git a/lib/netdev-native-tnl.c b/lib/netdev-native-tnl.c index 715bbab2b..427f5f8b9 100644 --- a/lib/netdev-native-tnl.c +++ b/lib/netdev-native-tnl.c @@ -60,6 +60,12 @@ static struct vlog_rate_limit err_rl = VLOG_RATE_LIMIT_INIT(60, 5); uint16_t tnl_udp_port_min = 32768; uint16_t tnl_udp_port_max = 61000; +static void +dp_packet_tnl_ol_send_prepare(const struct netdev *netdev, + struct dp_packet *packet, + uint64_t netdev_ol_flags, + const struct ovs_action_push_tnl *data); + void * netdev_tnl_ip_extract_tnl_md(struct dp_packet *packet, struct flow_tnl *tnl, unsigned int *hlen) @@ -150,8 +156,9 @@ netdev_tnl_ip_extract_tnl_md(struct dp_packet *packet, struct flow_tnl *tnl, * * Return pointer to the L4 header added to 'packet'. */ void * -netdev_tnl_push_ip_header(struct dp_packet *packet, const void *header, - int size, int *ip_tot_size, ovs_be32 ipv6_label) +netdev_tnl_push_ip_header(uint64_t netdev_ol_flags, struct dp_packet *packet, + const void *header, int size, + int *ip_tot_size, ovs_be32 ipv6_label) { struct eth_header *eth; struct ip_header *ip; @@ -178,6 +185,20 @@ netdev_tnl_push_ip_header(struct dp_packet *packet, const void *header, } else { ip = netdev_tnl_ip_hdr(eth); ip->ip_tot_len = htons(*ip_tot_size); + /* if support out ip csum offload, set relative flags. + * otherwise postpone csum to when the packet is pushed to the port. */ + if ((dp_packet_hwol_is_tunnel_geneve(packet) || + dp_packet_hwol_is_tunnel_vxlan(packet)) && + (netdev_ol_flags & NETDEV_TX_OFFLOAD_OUTER_IP_CKSUM)) { + dp_packet_hwol_set_outer_ipv4(packet); + dp_packet_hwol_set_outer_ipv4_csum(packet); + } else { + /* offload tunnel out ipv4 checksum as normal ipv4 csum. + * Postpone checksum to when the packet is pushed to the port. */ + dp_packet_hwol_set_tx_ipv4(packet); + dp_packet_hwol_set_tx_ip_csum(packet); + dp_packet_ol_reset_ip_csum_good(packet); + } /* Postpone checksum to when the packet is pushed to the port. */ dp_packet_hwol_set_tx_ipv4(packet); dp_packet_hwol_set_tx_ip_csum(packet); @@ -225,23 +246,88 @@ udp_extract_tnl_md(struct dp_packet *packet, struct flow_tnl *tnl, return udp + 1; } +/* Calculate inner l2 l3 l4 len as tunnel outer header is not + * encapsulated now. */ +static void +dp_packet_tnl_ol_send_prepare(const struct netdev *netdev, + struct dp_packet *packet, + uint64_t netdev_ol_flags, + const struct ovs_action_push_tnl *data) +{ + struct udp_header *udp = NULL; + uint8_t opt_len = 0; + struct eth_header *eth = NULL; + struct ip_header *ip = NULL; + struct genevehdr *gnh = NULL; + + /* l2 l3 l4 len refer to inner len, tunnel outer + * header is not encapsulated here. */ + if (dp_packet_hwol_l4_mask(packet)) { + ip = dp_packet_l3(packet); + + if (ip->ip_proto == IPPROTO_TCP) { + struct tcp_header *th = dp_packet_l4(packet); + dp_packet_set_l4_len(packet, TCP_OFFSET(th->tcp_ctl) * 4); + } else if (ip->ip_proto == IPPROTO_UDP) { + dp_packet_set_l4_len(packet, UDP_HEADER_LEN); + } else if (ip->ip_proto == IPPROTO_SCTP) { + dp_packet_set_l4_len(packet, SCTP_HEADER_LEN); + } + + dp_packet_set_l3_len(packet, (char *) dp_packet_l4(packet) - + (char *) dp_packet_l3(packet)); + + /* Attention please, tunnel inner l2 len is consist of udp header + * len and tunnel header len and inner l2 len. */ + if (!strcmp(netdev_get_type(netdev), "geneve")) { + eth = (struct eth_header *)(data->header); + ip = (struct ip_header *)(eth + 1); + udp = (struct udp_header *)(ip + 1); + gnh = (struct genevehdr *)(udp + 1); + opt_len = gnh->opt_len * 4; + if (netdev_ol_flags & NETDEV_TX_GENEVE_TNL_TSO) { + dp_packet_hwol_set_tunnel_geneve(packet); + dp_packet_set_l2_len(packet, (char *) dp_packet_l3(packet) - + (char *) dp_packet_eth(packet) + + GENEVE_BASE_HLEN + opt_len); + } + } else if (!strcmp(netdev_get_type(netdev), "vxlan")) { + if (netdev_ol_flags & NETDEV_TX_VXLAN_TNL_TSO) { + dp_packet_hwol_set_tunnel_vxlan(packet); + dp_packet_set_l2_len(packet, (char *) dp_packet_l3(packet) - + (char *) dp_packet_eth(packet) + + VXLAN_HLEN); + } + } + } +} + void -netdev_tnl_push_udp_header(const struct netdev *netdev OVS_UNUSED, +netdev_tnl_push_udp_header(const struct netdev *netdev, struct dp_packet *packet, const struct ovs_action_push_tnl *data) { struct udp_header *udp; int ip_tot_size; - udp = netdev_tnl_push_ip_header(packet, data->header, data->header_len, + dp_packet_tnl_ol_send_prepare(netdev, packet, netdev->ol_flags, data); + + udp = netdev_tnl_push_ip_header(netdev->ol_flags, packet, data->header, + data->header_len, &ip_tot_size, 0); /* set udp src port */ udp->udp_src = netdev_tnl_get_src_port(packet); udp->udp_len = htons(ip_tot_size); - /* Postpone checksum to the egress netdev. */ - dp_packet_hwol_set_csum_udp(packet); + /* if netdev support outer udp csum offload, positon relative bit. + * otherwise postpone checksum to the egress netdev. */ + if (netdev->ol_flags & NETDEV_TX_OFFLOAD_OUTER_UDP_CKSUM) { + dp_packet_hwol_set_outer_udp_csum(packet); + } else { + udp->udp_csum = 0; + } + if (udp->udp_csum) { dp_packet_ol_reset_l4_csum_good(packet); } else { @@ -449,7 +535,7 @@ netdev_gre_push_header(const struct netdev *netdev, struct gre_base_hdr *greh; int ip_tot_size; - greh = netdev_tnl_push_ip_header(packet, data->header, data->header_len, + greh = netdev_tnl_push_ip_header(0, packet, data->header, data->header_len, &ip_tot_size, 0); if (greh->flags & htons(GRE_CSUM)) { @@ -597,7 +683,7 @@ netdev_erspan_push_header(const struct netdev *netdev, struct erspan_md2 *md2; int ip_tot_size; - greh = netdev_tnl_push_ip_header(packet, data->header, data->header_len, + greh = netdev_tnl_push_ip_header(0, packet, data->header, data->header_len, &ip_tot_size, 0); /* update GRE seqno */ @@ -771,7 +857,7 @@ netdev_gtpu_push_header(const struct netdev *netdev, unsigned int payload_len; payload_len = dp_packet_size(packet); - udp = netdev_tnl_push_ip_header(packet, data->header, data->header_len, + udp = netdev_tnl_push_ip_header(0, packet, data->header, data->header_len, &ip_tot_size, 0); udp->udp_src = netdev_tnl_get_src_port(packet); udp->udp_len = htons(ip_tot_size); @@ -919,7 +1005,7 @@ netdev_srv6_push_header(const struct netdev *netdev OVS_UNUSED, break; } - netdev_tnl_push_ip_header(packet, data->header, + netdev_tnl_push_ip_header(0, packet, data->header, data->header_len, &ip_tot_size, ipv6_label); } diff --git a/lib/netdev-native-tnl.h b/lib/netdev-native-tnl.h index eb55dd041..d95a34b90 100644 --- a/lib/netdev-native-tnl.h +++ b/lib/netdev-native-tnl.h @@ -138,8 +138,9 @@ void * netdev_tnl_ip_extract_tnl_md(struct dp_packet *packet, struct flow_tnl *tnl, unsigned int *hlen); void * -netdev_tnl_push_ip_header(struct dp_packet *packet, const void *header, - int size, int *ip_tot_size, ovs_be32 ipv6_label); +netdev_tnl_push_ip_header(uint64_t netdev_ol_flags, struct dp_packet *packet, + const void *header, int size, + int *ip_tot_size, ovs_be32 ipv6_label); void netdev_tnl_egress_port_range(struct unixctl_conn *conn, int argc, const char *argv[], void *aux OVS_UNUSED); diff --git a/lib/netdev-provider.h b/lib/netdev-provider.h index a7393c7ce..22840a058 100644 --- a/lib/netdev-provider.h +++ b/lib/netdev-provider.h @@ -43,6 +43,10 @@ enum netdev_ol_flags { NETDEV_TX_OFFLOAD_UDP_CKSUM = 1 << 2, NETDEV_TX_OFFLOAD_SCTP_CKSUM = 1 << 3, NETDEV_TX_OFFLOAD_TCP_TSO = 1 << 4, + NETDEV_TX_VXLAN_TNL_TSO = 1 << 5, + NETDEV_TX_GENEVE_TNL_TSO = 1 << 6, + NETDEV_TX_OFFLOAD_OUTER_IP_CKSUM = 1 << 7, + NETDEV_TX_OFFLOAD_OUTER_UDP_CKSUM = 1 << 8, }; /* A network device (e.g. an Ethernet device). diff --git a/lib/netdev.c b/lib/netdev.c index e5ac7713d..7120983ff 100644 --- a/lib/netdev.c +++ b/lib/netdev.c @@ -953,16 +953,26 @@ netdev_push_header(const struct netdev *netdev, size_t i, size = dp_packet_batch_size(batch); DP_PACKET_BATCH_REFILL_FOR_EACH (i, size, packet, batch) { - if (OVS_UNLIKELY(dp_packet_hwol_is_tso(packet))) { - COVERAGE_INC(netdev_push_header_drops); - dp_packet_delete(packet); - VLOG_WARN_RL(&rl, "%s: Tunneling packets with TSO is " - "not supported: packet dropped", - netdev_get_name(netdev)); - } else { - /* The packet is going to be encapsulated and there is - * no support yet for inner network header csum offloading. */ - dp_packet_ol_send_prepare(packet, 0); + if (OVS_UNLIKELY(strcmp(netdev_get_type(netdev), "vxlan") && + strcmp(netdev_get_type(netdev), "geneve") && + dp_packet_hwol_is_tso(packet))) { + COVERAGE_INC(netdev_push_header_drops); + dp_packet_delete(packet); + VLOG_WARN_RL(&rl, + "%s: Tunneling packets with tso HW offload flags" + "is not supported: packet dropped", + netdev_get_name(netdev)); + } else { + /* The packet is going to be encapsulated, geneve/vxlan inner + * network header csum offloading and tso are supported. Other + * tunnel inner csum and tso are not supported yet then we + * offer the software fallback.*/ + if (!strcmp(netdev_get_type(netdev), "vxlan") || + !strcmp(netdev_get_type(netdev), "geneve")) { + dp_packet_ol_send_prepare(packet, netdev->ol_flags); + } else { + dp_packet_ol_send_prepare(packet, 0); + } netdev->netdev_class->push_header(netdev, packet, data); @@ -1409,6 +1419,10 @@ netdev_get_status(const struct netdev *netdev, struct smap *smap) OL_ADD_STAT("udp_csum", NETDEV_TX_OFFLOAD_UDP_CKSUM); OL_ADD_STAT("sctp_csum", NETDEV_TX_OFFLOAD_SCTP_CKSUM); OL_ADD_STAT("tcp_seg", NETDEV_TX_OFFLOAD_TCP_TSO); + OL_ADD_STAT("vxlan_tso", NETDEV_TX_VXLAN_TNL_TSO); + OL_ADD_STAT("geneve_tso", NETDEV_TX_GENEVE_TNL_TSO); + OL_ADD_STAT("out_ip_csum", NETDEV_TX_OFFLOAD_OUTER_IP_CKSUM); + OL_ADD_STAT("out_udp_csum", NETDEV_TX_OFFLOAD_OUTER_UDP_CKSUM); #undef OL_ADD_STAT err = 0; diff --git a/tests/dpif-netdev.at b/tests/dpif-netdev.at index 85119fb81..0f6271760 100644 --- a/tests/dpif-netdev.at +++ b/tests/dpif-netdev.at @@ -658,11 +658,11 @@ OVS_VSWITCHD_START( other-config:datapath-id=1234 fail-mode=secure]) AT_CHECK([ovs-vsctl get interface p1 status | sed -n 's/^{\(.*\).*}$/\1/p'], [0], [dnl -tx_ip_csum_offload="false", tx_sctp_csum_offload="false", tx_tcp_csum_offload="false", tx_tcp_seg_offload="false", tx_udp_csum_offload="false" +tx_geneve_tso_offload="false", tx_ip_csum_offload="false", tx_out_ip_csum_offload="false", tx_out_udp_csum_offload="false", tx_sctp_csum_offload="false", tx_tcp_csum_offload="false", tx_tcp_seg_offload="false", tx_udp_csum_offload="false", tx_vxlan_tso_offload="false" ], []) AT_CHECK([ovs-vsctl get interface br0 status | sed -n 's/^{\(.*\).*}$/\1/p'], [0], [dnl -tx_ip_csum_offload="false", tx_sctp_csum_offload="false", tx_tcp_csum_offload="false", tx_tcp_seg_offload="false", tx_udp_csum_offload="false" +tx_geneve_tso_offload="false", tx_ip_csum_offload="false", tx_out_ip_csum_offload="false", tx_out_udp_csum_offload="false", tx_sctp_csum_offload="false", tx_tcp_csum_offload="false", tx_tcp_seg_offload="false", tx_udp_csum_offload="false", tx_vxlan_tso_offload="false" ], []) OVS_VSWITCHD_STOP