2 * Copyright (c) 2019 Cisco and/or its affiliates.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
7 * http://www.apache.org/licenses/LICENSE-2.0
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
16 #include <vnet/vnet.h>
17 #include <vppinfra/vec.h>
18 #include <vppinfra/format.h>
21 #include <vnet/ip/ip.h>
22 #include <vnet/ethernet/ethernet.h>
23 #include <vnet/ethernet/arp_packet.h>
24 #include <vxlan/vxlan.h>
25 #include <dpdk/device/dpdk.h>
26 #include <dpdk/device/dpdk_priv.h>
27 #include <vppinfra/error.h>
29 #define FLOW_IS_ETHERNET_CLASS(f) \
30 (f->type == VNET_FLOW_TYPE_ETHERNET)
32 #define FLOW_IS_IPV4_CLASS(f) \
33 ((f->type == VNET_FLOW_TYPE_IP4) || \
34 (f->type == VNET_FLOW_TYPE_IP4_N_TUPLE) || \
35 (f->type == VNET_FLOW_TYPE_IP4_N_TUPLE_TAGGED) || \
36 (f->type == VNET_FLOW_TYPE_IP4_VXLAN) || \
37 (f->type == VNET_FLOW_TYPE_IP4_GTPC) || \
38 (f->type == VNET_FLOW_TYPE_IP4_GTPU) || \
39 (f->type == VNET_FLOW_TYPE_IP4_L2TPV3OIP) || \
40 (f->type == VNET_FLOW_TYPE_IP4_IPSEC_ESP) || \
41 (f->type == VNET_FLOW_TYPE_IP4_IPSEC_AH))
43 #define FLOW_IS_IPV6_CLASS(f) \
44 ((f->type == VNET_FLOW_TYPE_IP6) || \
45 (f->type == VNET_FLOW_TYPE_IP6_N_TUPLE) || \
46 (f->type == VNET_FLOW_TYPE_IP6_N_TUPLE_TAGGED) || \
47 (f->type == VNET_FLOW_TYPE_IP6_VXLAN))
49 /* check if flow is VLAN sensitive */
50 #define FLOW_HAS_VLAN_TAG(f) \
51 ((f->type == VNET_FLOW_TYPE_IP4_N_TUPLE_TAGGED) || \
52 (f->type == VNET_FLOW_TYPE_IP6_N_TUPLE_TAGGED))
54 /* check if flow is L3 type */
55 #define FLOW_IS_L3_TYPE(f) \
56 ((f->type == VNET_FLOW_TYPE_IP4) || \
57 (f->type == VNET_FLOW_TYPE_IP6))
59 /* check if flow is L4 type */
60 #define FLOW_IS_L4_TYPE(f) \
61 ((f->type == VNET_FLOW_TYPE_IP4_N_TUPLE) || \
62 (f->type == VNET_FLOW_TYPE_IP6_N_TUPLE) || \
63 (f->type == VNET_FLOW_TYPE_IP4_N_TUPLE_TAGGED) || \
64 (f->type == VNET_FLOW_TYPE_IP6_N_TUPLE_TAGGED))
66 /* check if flow is L4 tunnel type */
67 #define FLOW_IS_L4_TUNNEL_TYPE(f) \
68 ((f->type == VNET_FLOW_TYPE_IP4_VXLAN) || \
69 (f->type == VNET_FLOW_TYPE_IP6_VXLAN) || \
70 (f->type == VNET_FLOW_TYPE_IP4_GTPC) || \
71 (f->type == VNET_FLOW_TYPE_IP4_GTPU))
73 /* constant structs */
74 static const struct rte_flow_attr ingress = {.ingress = 1 };
77 mac_address_is_all_zero (const u8 addr[6])
81 for (i = 0; i < 6; i++)
89 dpdk_flow_convert_rss_types (u64 type, u64 * dpdk_rss_type)
91 #define BIT_IS_SET(v, b) \
98 if (n != -1 && BIT_IS_SET(type, n)) \
106 /** Maximum number of queue indices in struct rte_flow_action_rss. */
107 #define ACTION_RSS_QUEUE_NUM 128
110 dpdk_flow_convert_rss_queues (u32 queue_index, u32 queue_num,
111 struct rte_flow_action_rss *rss)
113 u16 *queues = clib_mem_alloc (sizeof (*queues) * ACTION_RSS_QUEUE_NUM);
116 for (i = 0; i < queue_num; i++)
117 queues[i] = queue_index++;
119 rss->queue_num = queue_num;
125 static inline enum rte_eth_hash_function
126 dpdk_flow_convert_rss_func (vnet_rss_function_t func)
128 enum rte_eth_hash_function rss_func;
132 case VNET_RSS_FUNC_DEFAULT:
133 rss_func = RTE_ETH_HASH_FUNCTION_DEFAULT;
135 case VNET_RSS_FUNC_TOEPLITZ:
136 rss_func = RTE_ETH_HASH_FUNCTION_TOEPLITZ;
138 case VNET_RSS_FUNC_SIMPLE_XOR:
139 rss_func = RTE_ETH_HASH_FUNCTION_SIMPLE_XOR;
141 case VNET_RSS_FUNC_SYMMETRIC_TOEPLITZ:
142 rss_func = RTE_ETH_HASH_FUNCTION_SYMMETRIC_TOEPLITZ;
145 rss_func = RTE_ETH_HASH_FUNCTION_MAX;
153 dpdk_flow_add (dpdk_device_t * xd, vnet_flow_t * f, dpdk_flow_entry_t * fe)
155 struct rte_flow_item_eth eth[2] = { };
156 struct rte_flow_item_ipv4 ip4[2] = { };
157 struct rte_flow_item_ipv6 ip6[2] = { };
158 struct rte_flow_item_udp udp[2] = { };
159 struct rte_flow_item_tcp tcp[2] = { };
160 struct rte_flow_item_gtp gtp[2] = { };
161 struct rte_flow_item_l2tpv3oip l2tp[2] = { };
162 struct rte_flow_item_esp esp[2] = { };
163 struct rte_flow_item_ah ah[2] = { };
164 struct rte_flow_item_raw generic[2] = {};
165 struct rte_flow_action_mark mark = { 0 };
166 struct rte_flow_action_queue queue = { 0 };
167 struct rte_flow_action_rss rss = { 0 };
168 struct rte_flow_item *item, *items = 0;
169 struct rte_flow_action *action, *actions = 0;
174 vxlan_hdr_sz = sizeof (vxlan_header_t),
175 raw_sz = sizeof (struct rte_flow_item_raw)
180 struct rte_flow_item_raw item;
181 u8 val[raw_sz + vxlan_hdr_sz];
184 u16 src_port = 0, dst_port = 0, src_port_mask = 0, dst_port_mask = 0;
185 u8 protocol = IP_PROTOCOL_RESERVED;
188 /* Handle generic flow first */
189 if (f->type == VNET_FLOW_TYPE_GENERIC)
191 generic[0].pattern = f->generic.pattern.spec;
192 generic[1].pattern = f->generic.pattern.mask;
194 vec_add2 (items, item, 1);
195 item->type = RTE_FLOW_ITEM_TYPE_RAW;
196 item->spec = generic;
197 item->mask = generic + 1;
208 } flow_class = FLOW_UNKNOWN_CLASS;
210 if (FLOW_IS_ETHERNET_CLASS (f))
211 flow_class = FLOW_ETHERNET_CLASS;
212 else if (FLOW_IS_IPV4_CLASS (f))
213 flow_class = FLOW_IPV4_CLASS;
214 else if (FLOW_IS_IPV6_CLASS (f))
215 flow_class = FLOW_IPV6_CLASS;
217 return VNET_FLOW_ERROR_NOT_SUPPORTED;
219 if (f->actions & (~xd->supported_flow_actions))
220 return VNET_FLOW_ERROR_NOT_SUPPORTED;
223 /* Layer 2, Ethernet */
224 vec_add2 (items, item, 1);
225 item->type = RTE_FLOW_ITEM_TYPE_ETH;
227 if (flow_class == FLOW_ETHERNET_CLASS)
229 vnet_flow_ethernet_t *te = &f->ethernet;
231 clib_memset (ð[0], 0, sizeof (eth[0]));
232 clib_memset (ð[1], 0, sizeof (eth[1]));
234 /* check if SMAC/DMAC/Ether_type assigned */
235 if (!mac_address_is_all_zero (te->eth_hdr.dst_address))
237 clib_memcpy_fast (ð[0].dst, &te->eth_hdr.dst_address,
238 sizeof (eth[0].dst));
239 clib_memset (ð[1].dst, 0xFF, sizeof (eth[1].dst));
242 if (!mac_address_is_all_zero (te->eth_hdr.src_address))
244 clib_memcpy_fast (ð[0].src, &te->eth_hdr.src_address,
245 sizeof (eth[0].src));
246 clib_memset (ð[1].src, 0xFF, sizeof (eth[1].src));
249 if (te->eth_hdr.type)
251 eth[0].type = clib_host_to_net_u16 (te->eth_hdr.type);
252 eth[1].type = clib_host_to_net_u16 (0xFFFF);
256 item->mask = eth + 1;
264 /* currently only single empty vlan tag is supported */
265 if (FLOW_HAS_VLAN_TAG (f))
267 vec_add2 (items, item, 1);
268 item->type = RTE_FLOW_ITEM_TYPE_VLAN;
273 if (FLOW_IS_ETHERNET_CLASS (f))
277 vec_add2 (items, item, 1);
278 if (flow_class == FLOW_IPV4_CLASS)
280 vnet_flow_ip4_t *ip4_ptr = &f->ip4;
282 item->type = RTE_FLOW_ITEM_TYPE_IPV4;
283 if ((!ip4_ptr->src_addr.mask.as_u32) &&
284 (!ip4_ptr->dst_addr.mask.as_u32) && (!ip4_ptr->protocol.mask))
291 ip4[0].hdr.src_addr = ip4_ptr->src_addr.addr.as_u32;
292 ip4[1].hdr.src_addr = ip4_ptr->src_addr.mask.as_u32;
293 ip4[0].hdr.dst_addr = ip4_ptr->dst_addr.addr.as_u32;
294 ip4[1].hdr.dst_addr = ip4_ptr->dst_addr.mask.as_u32;
295 ip4[0].hdr.next_proto_id = ip4_ptr->protocol.prot;
296 ip4[1].hdr.next_proto_id = ip4_ptr->protocol.mask;
299 item->mask = ip4 + 1;
302 if (FLOW_IS_L4_TYPE (f) || FLOW_IS_L4_TUNNEL_TYPE (f))
304 vnet_flow_ip4_n_tuple_t *ip4_n_ptr = &f->ip4_n_tuple;
306 src_port = ip4_n_ptr->src_port.port;
307 dst_port = ip4_n_ptr->dst_port.port;
308 src_port_mask = ip4_n_ptr->src_port.mask;
309 dst_port_mask = ip4_n_ptr->dst_port.mask;
312 protocol = ip4_ptr->protocol.prot;
314 else if (flow_class == FLOW_IPV6_CLASS)
316 vnet_flow_ip6_t *ip6_ptr = &f->ip6;
318 item->type = RTE_FLOW_ITEM_TYPE_IPV6;
320 if ((ip6_ptr->src_addr.mask.as_u64[0] == 0) &&
321 (ip6_ptr->src_addr.mask.as_u64[1] == 0) &&
322 (!ip6_ptr->protocol.mask))
329 clib_memcpy (ip6[0].hdr.src_addr, &ip6_ptr->src_addr.addr,
330 ARRAY_LEN (ip6_ptr->src_addr.addr.as_u8));
331 clib_memcpy (ip6[1].hdr.src_addr, &ip6_ptr->src_addr.mask,
332 ARRAY_LEN (ip6_ptr->src_addr.mask.as_u8));
333 clib_memcpy (ip6[0].hdr.dst_addr, &ip6_ptr->dst_addr.addr,
334 ARRAY_LEN (ip6_ptr->dst_addr.addr.as_u8));
335 clib_memcpy (ip6[1].hdr.dst_addr, &ip6_ptr->dst_addr.mask,
336 ARRAY_LEN (ip6_ptr->dst_addr.mask.as_u8));
337 ip6[0].hdr.proto = ip6_ptr->protocol.prot;
338 ip6[1].hdr.proto = ip6_ptr->protocol.mask;
341 item->mask = ip6 + 1;
344 if (FLOW_IS_L4_TYPE (f) || FLOW_IS_L4_TUNNEL_TYPE (f))
346 vnet_flow_ip6_n_tuple_t *ip6_n_ptr = &f->ip6_n_tuple;
348 src_port = ip6_n_ptr->src_port.port;
349 dst_port = ip6_n_ptr->dst_port.port;
350 src_port_mask = ip6_n_ptr->src_port.mask;
351 dst_port_mask = ip6_n_ptr->dst_port.mask;
354 protocol = ip6_ptr->protocol.prot;
357 if (FLOW_IS_L3_TYPE (f))
361 vec_add2 (items, item, 1);
364 case IP_PROTOCOL_L2TP:
365 item->type = RTE_FLOW_ITEM_TYPE_L2TPV3OIP;
366 l2tp[0].session_id = clib_host_to_net_u32 (f->ip4_l2tpv3oip.session_id);
367 l2tp[1].session_id = ~0;
370 item->mask = l2tp + 1;
373 case IP_PROTOCOL_IPSEC_ESP:
374 item->type = RTE_FLOW_ITEM_TYPE_ESP;
375 esp[0].hdr.spi = clib_host_to_net_u32 (f->ip4_ipsec_esp.spi);
379 item->mask = esp + 1;
382 case IP_PROTOCOL_IPSEC_AH:
383 item->type = RTE_FLOW_ITEM_TYPE_AH;
384 ah[0].spi = clib_host_to_net_u32 (f->ip4_ipsec_ah.spi);
390 case IP_PROTOCOL_TCP:
391 item->type = RTE_FLOW_ITEM_TYPE_TCP;
392 if ((src_port_mask == 0) && (dst_port_mask == 0))
399 tcp[0].hdr.src_port = clib_host_to_net_u16 (src_port);
400 tcp[1].hdr.src_port = clib_host_to_net_u16 (src_port_mask);
401 tcp[0].hdr.dst_port = clib_host_to_net_u16 (dst_port);
402 tcp[1].hdr.dst_port = clib_host_to_net_u16 (dst_port_mask);
404 item->mask = tcp + 1;
408 case IP_PROTOCOL_UDP:
409 item->type = RTE_FLOW_ITEM_TYPE_UDP;
410 if ((src_port_mask == 0) && (dst_port_mask == 0))
417 udp[0].hdr.src_port = clib_host_to_net_u16 (src_port);
418 udp[1].hdr.src_port = clib_host_to_net_u16 (src_port_mask);
419 udp[0].hdr.dst_port = clib_host_to_net_u16 (dst_port);
420 udp[1].hdr.dst_port = clib_host_to_net_u16 (dst_port_mask);
422 item->mask = udp + 1;
425 /* handle the UDP tunnels */
426 if (f->type == VNET_FLOW_TYPE_IP4_GTPC)
428 gtp[0].teid = clib_host_to_net_u32 (f->ip4_gtpc.teid);
431 vec_add2 (items, item, 1);
432 item->type = RTE_FLOW_ITEM_TYPE_GTPC;
434 item->mask = gtp + 1;
436 else if (f->type == VNET_FLOW_TYPE_IP4_GTPU)
438 gtp[0].teid = clib_host_to_net_u32 (f->ip4_gtpu.teid);
441 vec_add2 (items, item, 1);
442 item->type = RTE_FLOW_ITEM_TYPE_GTPU;
444 item->mask = gtp + 1;
446 else if (f->type == VNET_FLOW_TYPE_IP4_VXLAN)
448 u32 vni = f->ip4_vxlan.vni;
450 vxlan_header_t spec_hdr = {
451 .flags = VXLAN_FLAGS_I,
452 .vni_reserved = clib_host_to_net_u32 (vni << 8)
454 vxlan_header_t mask_hdr = {
456 .vni_reserved = clib_host_to_net_u32 (((u32) - 1) << 8)
459 clib_memset (raw, 0, sizeof raw);
460 raw[0].item.relative = 1;
461 raw[0].item.length = vxlan_hdr_sz;
463 clib_memcpy_fast (raw[0].val + raw_sz, &spec_hdr, vxlan_hdr_sz);
464 raw[0].item.pattern = raw[0].val + raw_sz;
465 clib_memcpy_fast (raw[1].val + raw_sz, &mask_hdr, vxlan_hdr_sz);
466 raw[1].item.pattern = raw[1].val + raw_sz;
468 vec_add2 (items, item, 1);
469 item->type = RTE_FLOW_ITEM_TYPE_RAW;
471 item->mask = raw + 1;
476 rv = VNET_FLOW_ERROR_NOT_SUPPORTED;
481 if ((f->actions & VNET_FLOW_ACTION_RSS) &&
482 (f->rss_types & (1ULL << VNET_FLOW_RSS_TYPES_ESP)))
485 vec_add2 (items, item, 1);
486 item->type = RTE_FLOW_ITEM_TYPE_ESP;
489 vec_add2 (items, item, 1);
490 item->type = RTE_FLOW_ITEM_TYPE_END;
493 /* Only one 'fate' can be assigned */
494 if (f->actions & VNET_FLOW_ACTION_REDIRECT_TO_QUEUE)
496 vec_add2 (actions, action, 1);
497 queue.index = f->redirect_queue;
498 action->type = RTE_FLOW_ACTION_TYPE_QUEUE;
499 action->conf = &queue;
503 if (f->actions & VNET_FLOW_ACTION_DROP)
505 vec_add2 (actions, action, 1);
506 action->type = RTE_FLOW_ACTION_TYPE_DROP;
509 rv = VNET_FLOW_ERROR_INTERNAL;
516 if (f->actions & VNET_FLOW_ACTION_RSS)
520 vec_add2 (actions, action, 1);
521 action->type = RTE_FLOW_ACTION_TYPE_RSS;
524 /* convert types to DPDK rss bitmask */
525 dpdk_flow_convert_rss_types (f->rss_types, &rss_type);
528 /* convert rss queues to array */
529 dpdk_flow_convert_rss_queues (f->queue_index, f->queue_num, &rss);
531 rss.types = rss_type;
532 if ((rss.func = dpdk_flow_convert_rss_func (f->rss_fun)) ==
533 RTE_ETH_HASH_FUNCTION_MAX)
535 rv = VNET_FLOW_ERROR_NOT_SUPPORTED;
541 rv = VNET_FLOW_ERROR_INTERNAL;
550 vec_add2 (actions, action, 1);
551 action->type = RTE_FLOW_ACTION_TYPE_PASSTHRU;
554 if (f->actions & VNET_FLOW_ACTION_MARK)
556 vec_add2 (actions, action, 1);
558 action->type = RTE_FLOW_ACTION_TYPE_MARK;
559 action->conf = &mark;
562 vec_add2 (actions, action, 1);
563 action->type = RTE_FLOW_ACTION_TYPE_END;
565 rv = rte_flow_validate (xd->device_index, &ingress, items, actions,
566 &xd->last_flow_error);
571 rv = VNET_FLOW_ERROR_NOT_SUPPORTED;
572 else if (rv == -EEXIST)
573 rv = VNET_FLOW_ERROR_ALREADY_EXISTS;
575 rv = VNET_FLOW_ERROR_INTERNAL;
580 fe->handle = rte_flow_create (xd->device_index, &ingress, items, actions,
581 &xd->last_flow_error);
584 rv = VNET_FLOW_ERROR_NOT_SUPPORTED;
593 dpdk_flow_ops_fn (vnet_main_t * vnm, vnet_flow_dev_op_t op, u32 dev_instance,
594 u32 flow_index, uword * private_data)
596 vlib_main_t *vm = vlib_get_main ();
597 dpdk_main_t *dm = &dpdk_main;
598 vnet_flow_t *flow = vnet_get_flow (flow_index);
599 dpdk_device_t *xd = vec_elt_at_index (dm->devices, dev_instance);
600 dpdk_flow_entry_t *fe;
601 dpdk_flow_lookup_entry_t *fle = 0;
604 /* recycle old flow lookup entries only after the main loop counter
605 increases - i.e. previously DMA'ed packets were handled */
606 if (vec_len (xd->parked_lookup_indexes) > 0 &&
607 xd->parked_loop_count != vm->main_loop_count)
611 vec_foreach (fl_index, xd->parked_lookup_indexes)
612 pool_put_index (xd->flow_lookup_entries, *fl_index);
613 vec_reset_length (xd->parked_lookup_indexes);
616 if (op == VNET_FLOW_DEV_OP_DEL_FLOW)
618 fe = vec_elt_at_index (xd->flow_entries, *private_data);
620 if ((rv = rte_flow_destroy (xd->device_index, fe->handle,
621 &xd->last_flow_error)))
622 return VNET_FLOW_ERROR_INTERNAL;
626 /* make sure no action is taken for in-flight (marked) packets */
627 fle = pool_elt_at_index (xd->flow_lookup_entries, fe->mark);
628 clib_memset (fle, -1, sizeof (*fle));
629 vec_add1 (xd->parked_lookup_indexes, fe->mark);
630 xd->parked_loop_count = vm->main_loop_count;
633 clib_memset (fe, 0, sizeof (*fe));
634 pool_put (xd->flow_entries, fe);
636 goto disable_rx_offload;
639 if (op != VNET_FLOW_DEV_OP_ADD_FLOW)
640 return VNET_FLOW_ERROR_NOT_SUPPORTED;
642 pool_get (xd->flow_entries, fe);
643 fe->flow_index = flow->index;
645 if (flow->actions == 0)
647 rv = VNET_FLOW_ERROR_NOT_SUPPORTED;
651 /* if we need to mark packets, assign one mark */
652 if (flow->actions & (VNET_FLOW_ACTION_MARK |
653 VNET_FLOW_ACTION_REDIRECT_TO_NODE |
654 VNET_FLOW_ACTION_BUFFER_ADVANCE))
657 if (xd->flow_lookup_entries == 0)
658 pool_get_aligned (xd->flow_lookup_entries, fle,
659 CLIB_CACHE_LINE_BYTES);
660 pool_get_aligned (xd->flow_lookup_entries, fle, CLIB_CACHE_LINE_BYTES);
661 fe->mark = fle - xd->flow_lookup_entries;
663 /* install entry in the lookup table */
664 clib_memset (fle, -1, sizeof (*fle));
665 if (flow->actions & VNET_FLOW_ACTION_MARK)
666 fle->flow_id = flow->mark_flow_id;
667 if (flow->actions & VNET_FLOW_ACTION_REDIRECT_TO_NODE)
668 fle->next_index = flow->redirect_device_input_next_index;
669 if (flow->actions & VNET_FLOW_ACTION_BUFFER_ADVANCE)
670 fle->buffer_advance = flow->buffer_advance;
675 if ((xd->flags & DPDK_DEVICE_FLAG_RX_FLOW_OFFLOAD) == 0)
677 xd->flags |= DPDK_DEVICE_FLAG_RX_FLOW_OFFLOAD;
678 dpdk_device_setup (xd);
683 case VNET_FLOW_TYPE_ETHERNET:
684 case VNET_FLOW_TYPE_IP4:
685 case VNET_FLOW_TYPE_IP6:
686 case VNET_FLOW_TYPE_IP4_N_TUPLE:
687 case VNET_FLOW_TYPE_IP6_N_TUPLE:
688 case VNET_FLOW_TYPE_IP4_VXLAN:
689 case VNET_FLOW_TYPE_IP4_GTPC:
690 case VNET_FLOW_TYPE_IP4_GTPU:
691 case VNET_FLOW_TYPE_IP4_L2TPV3OIP:
692 case VNET_FLOW_TYPE_IP4_IPSEC_ESP:
693 case VNET_FLOW_TYPE_IP4_IPSEC_AH:
694 case VNET_FLOW_TYPE_GENERIC:
695 if ((rv = dpdk_flow_add (xd, flow, fe)))
699 rv = VNET_FLOW_ERROR_NOT_SUPPORTED;
703 *private_data = fe - xd->flow_entries;
708 clib_memset (fe, 0, sizeof (*fe));
709 pool_put (xd->flow_entries, fe);
712 clib_memset (fle, -1, sizeof (*fle));
713 pool_put (xd->flow_lookup_entries, fle);
717 if ((xd->flags & DPDK_DEVICE_FLAG_RX_FLOW_OFFLOAD) != 0
718 && pool_elts (xd->flow_entries) == 0)
720 xd->flags &= ~DPDK_DEVICE_FLAG_RX_FLOW_OFFLOAD;
721 dpdk_device_setup (xd);
728 format_dpdk_flow (u8 * s, va_list * args)
730 u32 dev_instance = va_arg (*args, u32);
731 u32 flow_index = va_arg (*args, u32);
732 uword private_data = va_arg (*args, uword);
733 dpdk_main_t *dm = &dpdk_main;
734 dpdk_device_t *xd = vec_elt_at_index (dm->devices, dev_instance);
735 dpdk_flow_entry_t *fe;
737 if (flow_index == ~0)
739 s = format (s, "%-25s: %U\n", "supported flow actions",
740 format_flow_actions, xd->supported_flow_actions);
741 s = format (s, "%-25s: %d\n", "last DPDK error type",
742 xd->last_flow_error.type);
743 s = format (s, "%-25s: %s\n", "last DPDK error message",
744 xd->last_flow_error.message ? xd->last_flow_error.message :
749 if (private_data >= vec_len (xd->flow_entries))
750 return format (s, "unknown flow");
752 fe = vec_elt_at_index (xd->flow_entries, private_data);
753 s = format (s, "mark %u", fe->mark);
758 * fd.io coding-style-patch-verification: ON
761 * eval: (c-set-style "gnu")