/* SPDX-License-Identifier: BSD-3-Clause * Copyright(c) 2017 Intel Corporation */ #include #include #include #include "gro_tcp4.h" #include "gro_tcp_internal.h" void * gro_tcp4_tbl_create(uint16_t socket_id, uint16_t max_flow_num, uint16_t max_item_per_flow) { struct gro_tcp4_tbl *tbl; size_t size; uint32_t entries_num, i; entries_num = max_flow_num * max_item_per_flow; entries_num = RTE_MIN(entries_num, GRO_TCP4_TBL_MAX_ITEM_NUM); if (entries_num == 0) return NULL; tbl = rte_zmalloc_socket(__func__, sizeof(struct gro_tcp4_tbl), RTE_CACHE_LINE_SIZE, socket_id); if (tbl == NULL) return NULL; size = sizeof(struct gro_tcp_item) * entries_num; tbl->items = rte_zmalloc_socket(__func__, size, RTE_CACHE_LINE_SIZE, socket_id); if (tbl->items == NULL) { rte_free(tbl); return NULL; } tbl->max_item_num = entries_num; size = sizeof(struct gro_tcp4_flow) * entries_num; tbl->flows = rte_zmalloc_socket(__func__, size, RTE_CACHE_LINE_SIZE, socket_id); if (tbl->flows == NULL) { rte_free(tbl->items); rte_free(tbl); return NULL; } /* INVALID_ARRAY_INDEX indicates an empty flow */ for (i = 0; i < entries_num; i++) tbl->flows[i].start_index = INVALID_ARRAY_INDEX; tbl->max_flow_num = entries_num; return tbl; } void gro_tcp4_tbl_destroy(void *tbl) { struct gro_tcp4_tbl *tcp_tbl = tbl; if (tcp_tbl) { rte_free(tcp_tbl->items); rte_free(tcp_tbl->flows); } rte_free(tcp_tbl); } static inline uint32_t find_an_empty_flow(struct gro_tcp4_tbl *tbl) { uint32_t i; uint32_t max_flow_num = tbl->max_flow_num; for (i = 0; i < max_flow_num; i++) if (tbl->flows[i].start_index == INVALID_ARRAY_INDEX) return i; return INVALID_ARRAY_INDEX; } static inline uint32_t insert_new_flow(struct gro_tcp4_tbl *tbl, struct tcp4_flow_key *src, uint32_t item_idx) { struct tcp4_flow_key *dst; uint32_t flow_idx; flow_idx = find_an_empty_flow(tbl); if (unlikely(flow_idx == INVALID_ARRAY_INDEX)) return INVALID_ARRAY_INDEX; dst = &(tbl->flows[flow_idx].key); ASSIGN_COMMON_TCP_KEY((&src->cmn_key), (&dst->cmn_key)); dst->ip_src_addr = src->ip_src_addr; dst->ip_dst_addr = src->ip_dst_addr; tbl->flows[flow_idx].start_index = item_idx; tbl->flow_num++; return flow_idx; } int32_t gro_tcp4_reassemble(struct rte_mbuf *pkt, struct gro_tcp4_tbl *tbl, uint64_t start_time) { struct rte_ether_hdr *eth_hdr; struct rte_ipv4_hdr *ipv4_hdr; struct rte_tcp_hdr *tcp_hdr; uint32_t sent_seq; int32_t tcp_dl; uint16_t ip_id, hdr_len, frag_off, ip_tlen; uint8_t is_atomic; struct tcp4_flow_key key; uint32_t item_idx; uint32_t i, max_flow_num, remaining_flow_num; uint8_t find; uint32_t item_start_idx; /* * Don't process the packet whose TCP header length is greater * than 60 bytes or less than 20 bytes. */ if (unlikely(INVALID_TCP_HDRLEN(pkt->l4_len))) return -1; eth_hdr = rte_pktmbuf_mtod(pkt, struct rte_ether_hdr *); ipv4_hdr = (struct rte_ipv4_hdr *)((char *)eth_hdr + pkt->l2_len); tcp_hdr = (struct rte_tcp_hdr *)((char *)ipv4_hdr + pkt->l3_len); hdr_len = pkt->l2_len + pkt->l3_len + pkt->l4_len; /* Return early if the TCP flags are not handled in GRO layer */ if (tcp_hdr->tcp_flags & ~VALID_GRO_TCP_FLAGS) return -1; /* trim the tail padding bytes */ ip_tlen = rte_be_to_cpu_16(ipv4_hdr->total_length); if (pkt->pkt_len > (uint32_t)(ip_tlen + pkt->l2_len)) rte_pktmbuf_trim(pkt, pkt->pkt_len - ip_tlen - pkt->l2_len); /* * Don't process the packet whose payload length is less than or * equal to 0. */ tcp_dl = pkt->pkt_len - hdr_len; if (tcp_dl <= 0) return -1; rte_ether_addr_copy(&(eth_hdr->src_addr), &(key.cmn_key.eth_saddr)); rte_ether_addr_copy(&(eth_hdr->dst_addr), &(key.cmn_key.eth_daddr)); key.ip_src_addr = ipv4_hdr->src_addr; key.ip_dst_addr = ipv4_hdr->dst_addr; key.cmn_key.src_port = tcp_hdr->src_port; key.cmn_key.dst_port = tcp_hdr->dst_port; key.cmn_key.recv_ack = tcp_hdr->recv_ack; /* * Save IPv4 ID for the packet whose DF bit is 0. For the packet * whose DF bit is 1, IPv4 ID is ignored. */ frag_off = rte_be_to_cpu_16(ipv4_hdr->fragment_offset); is_atomic = (frag_off & RTE_IPV4_HDR_DF_FLAG) == RTE_IPV4_HDR_DF_FLAG; ip_id = is_atomic ? 0 : rte_be_to_cpu_16(ipv4_hdr->packet_id); /* Search for a matched flow. */ max_flow_num = tbl->max_flow_num; remaining_flow_num = tbl->flow_num; find = 0; for (i = 0; i < max_flow_num && remaining_flow_num; i++) { if (tbl->flows[i].start_index != INVALID_ARRAY_INDEX) { if (is_same_tcp4_flow(tbl->flows[i].key, key)) { find = 1; item_start_idx = tbl->flows[i].start_index; break; } remaining_flow_num--; } } if (find == 1) { /* * Any packet with additional flags like PSH,FIN should be processed * and flushed immediately. * Hence marking the start time to 0, so that the packets will be flushed * immediately in timer mode. */ if (tcp_hdr->tcp_flags & (RTE_TCP_ACK_FLAG | RTE_TCP_PSH_FLAG | RTE_TCP_FIN_FLAG)) { if (tcp_hdr->tcp_flags != RTE_TCP_ACK_FLAG) tbl->items[item_start_idx].start_time = 0; return process_tcp_item(pkt, tcp_hdr, tcp_dl, tbl->items, tbl->flows[i].start_index, &tbl->item_num, tbl->max_item_num, ip_id, is_atomic, start_time); } else { return -1; } } /* * Add new flow to the table only if contains ACK flag with data. * Do not add any packets with additional tcp flags to the GRO table */ if (tcp_hdr->tcp_flags == RTE_TCP_ACK_FLAG) { sent_seq = rte_be_to_cpu_32(tcp_hdr->sent_seq); item_idx = insert_new_tcp_item(pkt, tbl->items, &tbl->item_num, tbl->max_item_num, start_time, INVALID_ARRAY_INDEX, sent_seq, ip_id, is_atomic); if (item_idx == INVALID_ARRAY_INDEX) return -1; if (insert_new_flow(tbl, &key, item_idx) == INVALID_ARRAY_INDEX) { /* * Fail to insert a new flow, so delete the * stored packet. */ delete_tcp_item(tbl->items, item_idx, &tbl->item_num, INVALID_ARRAY_INDEX); return -1; } return 0; } return -1; } /* * update the packet length for the flushed packet. */ static inline void update_header(struct gro_tcp_item *item) { struct rte_ipv4_hdr *ipv4_hdr; struct rte_mbuf *pkt = item->firstseg; ipv4_hdr = (struct rte_ipv4_hdr *)(rte_pktmbuf_mtod(pkt, char *) + pkt->l2_len); ipv4_hdr->total_length = rte_cpu_to_be_16(pkt->pkt_len - pkt->l2_len); } uint16_t gro_tcp4_tbl_timeout_flush(struct gro_tcp4_tbl *tbl, uint64_t flush_timestamp, struct rte_mbuf **out, uint16_t nb_out) { uint16_t k = 0; uint32_t i, j; uint32_t max_flow_num = tbl->max_flow_num; for (i = 0; i < max_flow_num; i++) { if (unlikely(tbl->flow_num == 0)) return k; j = tbl->flows[i].start_index; while (j != INVALID_ARRAY_INDEX) { if (tbl->items[j].start_time <= flush_timestamp) { out[k++] = tbl->items[j].firstseg; if (tbl->items[j].nb_merged > 1) update_header(&(tbl->items[j])); /* * Delete the packet and get the next * packet in the flow. */ j = delete_tcp_item(tbl->items, j, &tbl->item_num, INVALID_ARRAY_INDEX); tbl->flows[i].start_index = j; if (j == INVALID_ARRAY_INDEX) tbl->flow_num--; if (unlikely(k == nb_out)) return k; } else /* * The left packets in this flow won't be * timeout. Go to check other flows. */ break; } } return k; } uint32_t gro_tcp4_tbl_pkt_count(void *tbl) { struct gro_tcp4_tbl *gro_tbl = tbl; if (gro_tbl) return gro_tbl->item_num; return 0; }