]> git.proxmox.com Git - ceph.git/blob - ceph/src/dpdk/app/test/test_table_acl.c
add subtree-ish sources for 12.0.3
[ceph.git] / ceph / src / dpdk / app / test / test_table_acl.c
1 /*-
2 * BSD LICENSE
3 *
4 * Copyright(c) 2010-2014 Intel Corporation. All rights reserved.
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 *
11 * * Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * * Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in
15 * the documentation and/or other materials provided with the
16 * distribution.
17 * * Neither the name of Intel Corporation nor the names of its
18 * contributors may be used to endorse or promote products derived
19 * from this software without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
22 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
23 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
24 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
25 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
26 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
27 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
28 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
29 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
30 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
31 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
32 */
33
34 #include <rte_hexdump.h>
35 #include "test_table.h"
36 #include "test_table_acl.h"
37
38 #define IPv4(a, b, c, d) ((uint32_t)(((a) & 0xff) << 24) | \
39 (((b) & 0xff) << 16) | \
40 (((c) & 0xff) << 8) | \
41 ((d) & 0xff))
42
43 /*
44 * Rule and trace formats definitions.
45 **/
46
47 struct ipv4_5tuple {
48 uint8_t proto;
49 uint32_t ip_src;
50 uint32_t ip_dst;
51 uint16_t port_src;
52 uint16_t port_dst;
53 };
54
55 enum {
56 PROTO_FIELD_IPV4,
57 SRC_FIELD_IPV4,
58 DST_FIELD_IPV4,
59 SRCP_FIELD_IPV4,
60 DSTP_FIELD_IPV4,
61 NUM_FIELDS_IPV4
62 };
63
64 struct rte_acl_field_def ipv4_defs[NUM_FIELDS_IPV4] = {
65 {
66 .type = RTE_ACL_FIELD_TYPE_BITMASK,
67 .size = sizeof(uint8_t),
68 .field_index = PROTO_FIELD_IPV4,
69 .input_index = PROTO_FIELD_IPV4,
70 .offset = offsetof(struct ipv4_5tuple, proto),
71 },
72 {
73 .type = RTE_ACL_FIELD_TYPE_MASK,
74 .size = sizeof(uint32_t),
75 .field_index = SRC_FIELD_IPV4,
76 .input_index = SRC_FIELD_IPV4,
77 .offset = offsetof(struct ipv4_5tuple, ip_src),
78 },
79 {
80 .type = RTE_ACL_FIELD_TYPE_MASK,
81 .size = sizeof(uint32_t),
82 .field_index = DST_FIELD_IPV4,
83 .input_index = DST_FIELD_IPV4,
84 .offset = offsetof(struct ipv4_5tuple, ip_dst),
85 },
86 {
87 .type = RTE_ACL_FIELD_TYPE_RANGE,
88 .size = sizeof(uint16_t),
89 .field_index = SRCP_FIELD_IPV4,
90 .input_index = SRCP_FIELD_IPV4,
91 .offset = offsetof(struct ipv4_5tuple, port_src),
92 },
93 {
94 .type = RTE_ACL_FIELD_TYPE_RANGE,
95 .size = sizeof(uint16_t),
96 .field_index = DSTP_FIELD_IPV4,
97 .input_index = SRCP_FIELD_IPV4,
98 .offset = offsetof(struct ipv4_5tuple, port_dst),
99 },
100 };
101
102 struct rte_table_acl_rule_add_params table_acl_IPv4_rule;
103
104 typedef int (*parse_5tuple)(char *text,
105 struct rte_table_acl_rule_add_params *rule);
106
107 /*
108 * The order of the fields in the rule string after the initial '@'
109 */
110 enum {
111 CB_FLD_SRC_ADDR,
112 CB_FLD_DST_ADDR,
113 CB_FLD_SRC_PORT_RANGE,
114 CB_FLD_DST_PORT_RANGE,
115 CB_FLD_PROTO,
116 CB_FLD_NUM,
117 };
118
119
120 #define GET_CB_FIELD(in, fd, base, lim, dlm) \
121 do { \
122 unsigned long val; \
123 char *end; \
124 \
125 errno = 0; \
126 val = strtoul((in), &end, (base)); \
127 if (errno != 0 || end[0] != (dlm) || val > (lim)) \
128 return -EINVAL; \
129 (fd) = (typeof(fd)) val; \
130 (in) = end + 1; \
131 } while (0)
132
133
134
135
136 static int
137 parse_ipv4_net(const char *in, uint32_t *addr, uint32_t *mask_len)
138 {
139 uint8_t a, b, c, d, m;
140
141 GET_CB_FIELD(in, a, 0, UINT8_MAX, '.');
142 GET_CB_FIELD(in, b, 0, UINT8_MAX, '.');
143 GET_CB_FIELD(in, c, 0, UINT8_MAX, '.');
144 GET_CB_FIELD(in, d, 0, UINT8_MAX, '/');
145 GET_CB_FIELD(in, m, 0, sizeof(uint32_t) * CHAR_BIT, 0);
146
147 addr[0] = IPv4(a, b, c, d);
148 mask_len[0] = m;
149
150 return 0;
151 }
152
153 static int
154 parse_port_range(const char *in, uint16_t *port_low, uint16_t *port_high)
155 {
156 uint16_t a, b;
157
158 GET_CB_FIELD(in, a, 0, UINT16_MAX, ':');
159 GET_CB_FIELD(in, b, 0, UINT16_MAX, 0);
160
161 port_low[0] = a;
162 port_high[0] = b;
163
164 return 0;
165 }
166
167 static int
168 parse_cb_ipv4_rule(char *str, struct rte_table_acl_rule_add_params *v)
169 {
170 int i, rc;
171 char *s, *sp, *in[CB_FLD_NUM];
172 static const char *dlm = " \t\n";
173
174 /*
175 ** Skip leading '@'
176 */
177 if (strchr(str, '@') != str)
178 return -EINVAL;
179
180 s = str + 1;
181
182 /*
183 * Populate the 'in' array with the location of each
184 * field in the string we're parsing
185 */
186 for (i = 0; i != DIM(in); i++) {
187 in[i] = strtok_r(s, dlm, &sp);
188 if (in[i] == NULL)
189 return -EINVAL;
190 s = NULL;
191 }
192
193 /* Parse x.x.x.x/x */
194 rc = parse_ipv4_net(in[CB_FLD_SRC_ADDR],
195 &v->field_value[SRC_FIELD_IPV4].value.u32,
196 &v->field_value[SRC_FIELD_IPV4].mask_range.u32);
197 if (rc != 0) {
198 RTE_LOG(ERR, PIPELINE, "failed to read src address/mask: %s\n",
199 in[CB_FLD_SRC_ADDR]);
200 return rc;
201 }
202
203 printf("V=%u, mask=%u\n", v->field_value[SRC_FIELD_IPV4].value.u32,
204 v->field_value[SRC_FIELD_IPV4].mask_range.u32);
205
206 /* Parse x.x.x.x/x */
207 rc = parse_ipv4_net(in[CB_FLD_DST_ADDR],
208 &v->field_value[DST_FIELD_IPV4].value.u32,
209 &v->field_value[DST_FIELD_IPV4].mask_range.u32);
210 if (rc != 0) {
211 RTE_LOG(ERR, PIPELINE, "failed to read dest address/mask: %s\n",
212 in[CB_FLD_DST_ADDR]);
213 return rc;
214 }
215
216 printf("V=%u, mask=%u\n", v->field_value[DST_FIELD_IPV4].value.u32,
217 v->field_value[DST_FIELD_IPV4].mask_range.u32);
218 /* Parse n:n */
219 rc = parse_port_range(in[CB_FLD_SRC_PORT_RANGE],
220 &v->field_value[SRCP_FIELD_IPV4].value.u16,
221 &v->field_value[SRCP_FIELD_IPV4].mask_range.u16);
222 if (rc != 0) {
223 RTE_LOG(ERR, PIPELINE, "failed to read source port range: %s\n",
224 in[CB_FLD_SRC_PORT_RANGE]);
225 return rc;
226 }
227
228 printf("V=%u, mask=%u\n", v->field_value[SRCP_FIELD_IPV4].value.u16,
229 v->field_value[SRCP_FIELD_IPV4].mask_range.u16);
230 /* Parse n:n */
231 rc = parse_port_range(in[CB_FLD_DST_PORT_RANGE],
232 &v->field_value[DSTP_FIELD_IPV4].value.u16,
233 &v->field_value[DSTP_FIELD_IPV4].mask_range.u16);
234 if (rc != 0) {
235 RTE_LOG(ERR, PIPELINE, "failed to read dest port range: %s\n",
236 in[CB_FLD_DST_PORT_RANGE]);
237 return rc;
238 }
239
240 printf("V=%u, mask=%u\n", v->field_value[DSTP_FIELD_IPV4].value.u16,
241 v->field_value[DSTP_FIELD_IPV4].mask_range.u16);
242 /* parse 0/0xnn */
243 GET_CB_FIELD(in[CB_FLD_PROTO],
244 v->field_value[PROTO_FIELD_IPV4].value.u8,
245 0, UINT8_MAX, '/');
246 GET_CB_FIELD(in[CB_FLD_PROTO],
247 v->field_value[PROTO_FIELD_IPV4].mask_range.u8,
248 0, UINT8_MAX, 0);
249
250 printf("V=%u, mask=%u\n",
251 (unsigned int)v->field_value[PROTO_FIELD_IPV4].value.u8,
252 v->field_value[PROTO_FIELD_IPV4].mask_range.u8);
253 return 0;
254 }
255
256 static int
257 parse_cb_ipv4_rule_del(char *str, struct rte_table_acl_rule_delete_params *v)
258 {
259 int i, rc;
260 char *s, *sp, *in[CB_FLD_NUM];
261 static const char *dlm = " \t\n";
262
263 /*
264 ** Skip leading '@'
265 */
266 if (strchr(str, '@') != str)
267 return -EINVAL;
268
269 s = str + 1;
270
271 /*
272 * Populate the 'in' array with the location of each
273 * field in the string we're parsing
274 */
275 for (i = 0; i != DIM(in); i++) {
276 in[i] = strtok_r(s, dlm, &sp);
277 if (in[i] == NULL)
278 return -EINVAL;
279 s = NULL;
280 }
281
282 /* Parse x.x.x.x/x */
283 rc = parse_ipv4_net(in[CB_FLD_SRC_ADDR],
284 &v->field_value[SRC_FIELD_IPV4].value.u32,
285 &v->field_value[SRC_FIELD_IPV4].mask_range.u32);
286 if (rc != 0) {
287 RTE_LOG(ERR, PIPELINE, "failed to read src address/mask: %s\n",
288 in[CB_FLD_SRC_ADDR]);
289 return rc;
290 }
291
292 printf("V=%u, mask=%u\n", v->field_value[SRC_FIELD_IPV4].value.u32,
293 v->field_value[SRC_FIELD_IPV4].mask_range.u32);
294
295 /* Parse x.x.x.x/x */
296 rc = parse_ipv4_net(in[CB_FLD_DST_ADDR],
297 &v->field_value[DST_FIELD_IPV4].value.u32,
298 &v->field_value[DST_FIELD_IPV4].mask_range.u32);
299 if (rc != 0) {
300 RTE_LOG(ERR, PIPELINE, "failed to read dest address/mask: %s\n",
301 in[CB_FLD_DST_ADDR]);
302 return rc;
303 }
304
305 printf("V=%u, mask=%u\n", v->field_value[DST_FIELD_IPV4].value.u32,
306 v->field_value[DST_FIELD_IPV4].mask_range.u32);
307 /* Parse n:n */
308 rc = parse_port_range(in[CB_FLD_SRC_PORT_RANGE],
309 &v->field_value[SRCP_FIELD_IPV4].value.u16,
310 &v->field_value[SRCP_FIELD_IPV4].mask_range.u16);
311 if (rc != 0) {
312 RTE_LOG(ERR, PIPELINE, "failed to read source port range: %s\n",
313 in[CB_FLD_SRC_PORT_RANGE]);
314 return rc;
315 }
316
317 printf("V=%u, mask=%u\n", v->field_value[SRCP_FIELD_IPV4].value.u16,
318 v->field_value[SRCP_FIELD_IPV4].mask_range.u16);
319 /* Parse n:n */
320 rc = parse_port_range(in[CB_FLD_DST_PORT_RANGE],
321 &v->field_value[DSTP_FIELD_IPV4].value.u16,
322 &v->field_value[DSTP_FIELD_IPV4].mask_range.u16);
323 if (rc != 0) {
324 RTE_LOG(ERR, PIPELINE, "failed to read dest port range: %s\n",
325 in[CB_FLD_DST_PORT_RANGE]);
326 return rc;
327 }
328
329 printf("V=%u, mask=%u\n", v->field_value[DSTP_FIELD_IPV4].value.u16,
330 v->field_value[DSTP_FIELD_IPV4].mask_range.u16);
331 /* parse 0/0xnn */
332 GET_CB_FIELD(in[CB_FLD_PROTO],
333 v->field_value[PROTO_FIELD_IPV4].value.u8,
334 0, UINT8_MAX, '/');
335 GET_CB_FIELD(in[CB_FLD_PROTO],
336 v->field_value[PROTO_FIELD_IPV4].mask_range.u8,
337 0, UINT8_MAX, 0);
338
339 printf("V=%u, mask=%u\n",
340 (unsigned int)v->field_value[PROTO_FIELD_IPV4].value.u8,
341 v->field_value[PROTO_FIELD_IPV4].mask_range.u8);
342 return 0;
343 }
344
345 /*
346 * The format for these rules DO NOT need the port ranges to be
347 * separated by ' : ', just ':'. It's a lot more readable and
348 * cleaner, IMO.
349 */
350 char lines[][128] = {
351 "@0.0.0.0/0 0.0.0.0/0 0:65535 0:65535 2/0xff", /* Protocol check */
352 "@192.168.3.1/32 0.0.0.0/0 0:65535 0:65535 0/0", /* Src IP checl */
353 "@0.0.0.0/0 10.4.4.1/32 0:65535 0:65535 0/0", /* dst IP check */
354 "@0.0.0.0/0 0.0.0.0/0 105:105 0:65535 0/0", /* src port check */
355 "@0.0.0.0/0 0.0.0.0/0 0:65535 206:206 0/0", /* dst port check */
356 };
357
358 char line[128];
359
360
361 static int
362 setup_acl_pipeline(void)
363 {
364 int ret;
365 int i;
366 struct rte_pipeline_params pipeline_params = {
367 .name = "PIPELINE",
368 .socket_id = 0,
369 };
370 uint32_t n;
371 struct rte_table_acl_rule_add_params rule_params;
372 struct rte_pipeline_table_acl_rule_delete_params *delete_params;
373 parse_5tuple parser;
374 char acl_name[64];
375
376 /* Pipeline configuration */
377 p = rte_pipeline_create(&pipeline_params);
378 if (p == NULL) {
379 RTE_LOG(INFO, PIPELINE, "%s: Failed to configure pipeline\n",
380 __func__);
381 goto fail;
382 }
383
384 /* Input port configuration */
385 for (i = 0; i < N_PORTS; i++) {
386 struct rte_port_ring_reader_params port_ring_params = {
387 .ring = rings_rx[i],
388 };
389
390 struct rte_pipeline_port_in_params port_params = {
391 .ops = &rte_port_ring_reader_ops,
392 .arg_create = (void *) &port_ring_params,
393 .f_action = NULL,
394 .burst_size = BURST_SIZE,
395 };
396
397 /* Put in action for some ports */
398 if (i)
399 port_params.f_action = port_in_action;
400
401 ret = rte_pipeline_port_in_create(p, &port_params,
402 &port_in_id[i]);
403 if (ret) {
404 rte_panic("Unable to configure input port %d, ret:%d\n",
405 i, ret);
406 goto fail;
407 }
408 }
409
410 /* output Port configuration */
411 for (i = 0; i < N_PORTS; i++) {
412 struct rte_port_ring_writer_params port_ring_params = {
413 .ring = rings_tx[i],
414 .tx_burst_sz = BURST_SIZE,
415 };
416
417 struct rte_pipeline_port_out_params port_params = {
418 .ops = &rte_port_ring_writer_ops,
419 .arg_create = (void *) &port_ring_params,
420 .f_action = NULL,
421 .arg_ah = NULL,
422 };
423
424
425 if (rte_pipeline_port_out_create(p, &port_params,
426 &port_out_id[i])) {
427 rte_panic("Unable to configure output port %d\n", i);
428 goto fail;
429 }
430 }
431
432 /* Table configuration */
433 for (i = 0; i < N_PORTS; i++) {
434 struct rte_pipeline_table_params table_params;
435
436 /* Set up defaults for stub */
437 table_params.ops = &rte_table_stub_ops;
438 table_params.arg_create = NULL;
439 table_params.f_action_hit = action_handler_hit;
440 table_params.f_action_miss = NULL;
441 table_params.action_data_size = 0;
442
443 RTE_LOG(INFO, PIPELINE, "miss_action=%x\n",
444 table_entry_miss_action);
445
446 printf("RTE_ACL_RULE_SZ(%zu) = %zu\n", DIM(ipv4_defs),
447 RTE_ACL_RULE_SZ(DIM(ipv4_defs)));
448
449 struct rte_table_acl_params acl_params;
450
451 acl_params.n_rules = 1 << 5;
452 acl_params.n_rule_fields = DIM(ipv4_defs);
453 snprintf(acl_name, sizeof(acl_name), "ACL%d", i);
454 acl_params.name = acl_name;
455 memcpy(acl_params.field_format, ipv4_defs, sizeof(ipv4_defs));
456
457 table_params.ops = &rte_table_acl_ops;
458 table_params.arg_create = &acl_params;
459
460 if (rte_pipeline_table_create(p, &table_params, &table_id[i])) {
461 rte_panic("Unable to configure table %u\n", i);
462 goto fail;
463 }
464
465 if (connect_miss_action_to_table) {
466 if (rte_pipeline_table_create(p, &table_params,
467 &table_id[i+2])) {
468 rte_panic("Unable to configure table %u\n", i);
469 goto fail;
470 }
471 }
472 }
473
474 for (i = 0; i < N_PORTS; i++) {
475 if (rte_pipeline_port_in_connect_to_table(p, port_in_id[i],
476 table_id[i])) {
477 rte_panic("Unable to connect input port %u to "
478 "table %u\n",
479 port_in_id[i], table_id[i]);
480 goto fail;
481 }
482 }
483
484 /* Add bulk entries to tables */
485 for (i = 0; i < N_PORTS; i++) {
486 struct rte_table_acl_rule_add_params keys[5];
487 struct rte_pipeline_table_entry entries[5];
488 struct rte_table_acl_rule_add_params *key_array[5];
489 struct rte_pipeline_table_entry *table_entries[5];
490 int key_found[5];
491 struct rte_pipeline_table_entry *table_entries_ptr[5];
492 struct rte_pipeline_table_entry entries_ptr[5];
493
494 parser = parse_cb_ipv4_rule;
495 for (n = 0; n < 5; n++) {
496 memset(&keys[n], 0, sizeof(struct rte_table_acl_rule_add_params));
497 key_array[n] = &keys[n];
498
499 snprintf(line, sizeof(line), "%s", lines[n]);
500 printf("PARSING [%s]\n", line);
501
502 ret = parser(line, &keys[n]);
503 if (ret != 0) {
504 RTE_LOG(ERR, PIPELINE,
505 "line %u: parse_cb_ipv4vlan_rule"
506 " failed, error code: %d (%s)\n",
507 n, ret, strerror(-ret));
508 return ret;
509 }
510
511 keys[n].priority = RTE_ACL_MAX_PRIORITY - n - 1;
512
513 entries[n].action = RTE_PIPELINE_ACTION_PORT;
514 entries[n].port_id = port_out_id[i^1];
515 table_entries[n] = &entries[n];
516 table_entries_ptr[n] = &entries_ptr[n];
517 }
518
519 ret = rte_pipeline_table_entry_add_bulk(p, table_id[i],
520 (void **)key_array, table_entries, 5, key_found, table_entries_ptr);
521 if (ret < 0) {
522 rte_panic("Add entry bulk to table %u failed (%d)\n",
523 table_id[i], ret);
524 goto fail;
525 }
526 }
527
528 /* Delete bulk entries from tables */
529 for (i = 0; i < N_PORTS; i++) {
530 struct rte_table_acl_rule_delete_params keys[5];
531 struct rte_table_acl_rule_delete_params *key_array[5];
532 struct rte_pipeline_table_entry *table_entries[5];
533 int key_found[5];
534
535 for (n = 0; n < 5; n++) {
536 memset(&keys[n], 0, sizeof(struct rte_table_acl_rule_delete_params));
537 key_array[n] = &keys[n];
538
539 snprintf(line, sizeof(line), "%s", lines[n]);
540 printf("PARSING [%s]\n", line);
541
542 ret = parse_cb_ipv4_rule_del(line, &keys[n]);
543 if (ret != 0) {
544 RTE_LOG(ERR, PIPELINE,
545 "line %u: parse_cb_ipv4vlan_rule"
546 " failed, error code: %d (%s)\n",
547 n, ret, strerror(-ret));
548 return ret;
549 }
550 }
551
552 ret = rte_pipeline_table_entry_delete_bulk(p, table_id[i],
553 (void **)key_array, 5, key_found, table_entries);
554 if (ret < 0) {
555 rte_panic("Delete bulk entries from table %u failed (%d)\n",
556 table_id[i], ret);
557 goto fail;
558 } else
559 printf("Bulk deleted rules.\n");
560 }
561
562 /* Add entries to tables */
563 for (i = 0; i < N_PORTS; i++) {
564 struct rte_pipeline_table_entry table_entry = {
565 .action = RTE_PIPELINE_ACTION_PORT,
566 {.port_id = port_out_id[i^1]},
567 };
568 int key_found;
569 struct rte_pipeline_table_entry *entry_ptr;
570
571 memset(&rule_params, 0, sizeof(rule_params));
572 parser = parse_cb_ipv4_rule;
573
574 for (n = 1; n <= 5; n++) {
575 snprintf(line, sizeof(line), "%s", lines[n-1]);
576 printf("PARSING [%s]\n", line);
577
578 ret = parser(line, &rule_params);
579 if (ret != 0) {
580 RTE_LOG(ERR, PIPELINE,
581 "line %u: parse_cb_ipv4vlan_rule"
582 " failed, error code: %d (%s)\n",
583 n, ret, strerror(-ret));
584 return ret;
585 }
586
587 rule_params.priority = RTE_ACL_MAX_PRIORITY - n;
588
589 ret = rte_pipeline_table_entry_add(p, table_id[i],
590 &rule_params,
591 &table_entry, &key_found, &entry_ptr);
592 if (ret < 0) {
593 rte_panic("Add entry to table %u failed (%d)\n",
594 table_id[i], ret);
595 goto fail;
596 }
597 }
598
599 /* delete a few rules */
600 for (n = 2; n <= 3; n++) {
601 snprintf(line, sizeof(line), "%s", lines[n-1]);
602 printf("PARSING [%s]\n", line);
603
604 ret = parser(line, &rule_params);
605 if (ret != 0) {
606 RTE_LOG(ERR, PIPELINE, "line %u: parse rule "
607 " failed, error code: %d (%s)\n",
608 n, ret, strerror(-ret));
609 return ret;
610 }
611
612 delete_params = (struct
613 rte_pipeline_table_acl_rule_delete_params *)
614 &(rule_params.field_value[0]);
615 ret = rte_pipeline_table_entry_delete(p, table_id[i],
616 delete_params, &key_found, NULL);
617 if (ret < 0) {
618 rte_panic("Add entry to table %u failed (%d)\n",
619 table_id[i], ret);
620 goto fail;
621 } else
622 printf("Deleted Rule.\n");
623 }
624
625
626 /* Try to add duplicates */
627 for (n = 1; n <= 5; n++) {
628 snprintf(line, sizeof(line), "%s", lines[n-1]);
629 printf("PARSING [%s]\n", line);
630
631 ret = parser(line, &rule_params);
632 if (ret != 0) {
633 RTE_LOG(ERR, PIPELINE, "line %u: parse rule"
634 " failed, error code: %d (%s)\n",
635 n, ret, strerror(-ret));
636 return ret;
637 }
638
639 rule_params.priority = RTE_ACL_MAX_PRIORITY - n;
640
641 ret = rte_pipeline_table_entry_add(p, table_id[i],
642 &rule_params,
643 &table_entry, &key_found, &entry_ptr);
644 if (ret < 0) {
645 rte_panic("Add entry to table %u failed (%d)\n",
646 table_id[i], ret);
647 goto fail;
648 }
649 }
650 }
651
652 /* Enable input ports */
653 for (i = 0; i < N_PORTS ; i++)
654 if (rte_pipeline_port_in_enable(p, port_in_id[i]))
655 rte_panic("Unable to enable input port %u\n",
656 port_in_id[i]);
657
658 /* Check pipeline consistency */
659 if (rte_pipeline_check(p) < 0) {
660 rte_panic("Pipeline consistency check failed\n");
661 goto fail;
662 }
663
664 return 0;
665 fail:
666
667 return -1;
668 }
669
670 static int
671 test_pipeline_single_filter(int expected_count)
672 {
673 int i, j, ret, tx_count;
674 struct ipv4_5tuple five_tuple;
675
676 /* Allocate a few mbufs and manually insert into the rings. */
677 for (i = 0; i < N_PORTS; i++) {
678 for (j = 0; j < 8; j++) {
679 struct rte_mbuf *mbuf;
680
681 mbuf = rte_pktmbuf_alloc(pool);
682 if (mbuf == NULL)
683 /* this will cause test failure after cleanup
684 * of already enqueued mbufs, as the mbuf
685 * counts won't match */
686 break;
687 memset(rte_pktmbuf_mtod(mbuf, char *), 0x00,
688 sizeof(struct ipv4_5tuple));
689
690 five_tuple.proto = j;
691 five_tuple.ip_src = rte_bswap32(IPv4(192, 168, j, 1));
692 five_tuple.ip_dst = rte_bswap32(IPv4(10, 4, j, 1));
693 five_tuple.port_src = rte_bswap16(100 + j);
694 five_tuple.port_dst = rte_bswap16(200 + j);
695
696 memcpy(rte_pktmbuf_mtod(mbuf, char *), &five_tuple,
697 sizeof(struct ipv4_5tuple));
698 RTE_LOG(INFO, PIPELINE, "%s: Enqueue onto ring %d\n",
699 __func__, i);
700 rte_ring_enqueue(rings_rx[i], mbuf);
701 }
702 }
703
704 /* Run pipeline once */
705 for (i = 0; i< N_PORTS; i++)
706 rte_pipeline_run(p);
707
708 rte_pipeline_flush(p);
709
710 tx_count = 0;
711
712 for (i = 0; i < N_PORTS; i++) {
713 void *objs[RING_TX_SIZE];
714 struct rte_mbuf *mbuf;
715
716 ret = rte_ring_sc_dequeue_burst(rings_tx[i], objs, 10);
717 if (ret <= 0) {
718 printf("Got no objects from ring %d - error code %d\n",
719 i, ret);
720 } else {
721 printf("Got %d object(s) from ring %d!\n", ret, i);
722 for (j = 0; j < ret; j++) {
723 mbuf = (struct rte_mbuf *)objs[j];
724 rte_hexdump(stdout, "mbuf",
725 rte_pktmbuf_mtod(mbuf, char *), 64);
726 rte_pktmbuf_free(mbuf);
727 }
728 tx_count += ret;
729 }
730 }
731
732 if (tx_count != expected_count) {
733 RTE_LOG(INFO, PIPELINE,
734 "%s: Unexpected packets for ACL test, "
735 "expected %d, got %d\n",
736 __func__, expected_count, tx_count);
737 goto fail;
738 }
739
740 rte_pipeline_free(p);
741
742 return 0;
743 fail:
744 return -1;
745
746 }
747
748 int
749 test_table_acl(void)
750 {
751
752
753 override_hit_mask = 0xFF; /* All packets are a hit */
754
755 setup_acl_pipeline();
756 if (test_pipeline_single_filter(10) < 0)
757 return -1;
758
759 return 0;
760 }