Kernel for Galaxy S24, rebased on CLO sources (WIP)
Go to file
David S. Miller 08cbabb77e mlx5-updates-2021-02-04
Vlad Buslov says:
 =================
 
 Implement support for VF tunneling
 
 Abstract
 
 Currently, mlx5 only supports configuration with tunnel endpoint IP address on
 uplink representor. Remove implicit and explicit assumptions of tunnel always
 being terminated on uplink and implement necessary infrastructure for
 configuring tunnels on VF representors and updating rules on such tunnels
 according to routing changes.
 
 SW TC model
 
 From TC perspective VF tunnel configuration requires two rules in both
 directions:
 
 TX rules
 
 1. Rule that redirects packets from UL to VF rep that has the tunnel
 endpoint IP address:
 
 $ tc -s filter show dev enp8s0f0 ingress
 filter protocol ip pref 4 flower chain 0
 filter protocol ip pref 4 flower chain 0 handle 0x1
   dst_mac 16:c9:a0:2d:69:2c
   src_mac 0c:42:a1:58:ab:e4
   eth_type ipv4
   ip_flags nofrag
   in_hw in_hw_count 1
         action order 1: mirred (Egress Redirect to device enp8s0f0_0) stolen
         index 3 ref 1 bind 1 installed 377 sec used 0 sec
         Action statistics:
         Sent 114096 bytes 952 pkt (dropped 0, overlimits 0 requeues 0)
         Sent software 0 bytes 0 pkt
         Sent hardware 114096 bytes 952 pkt
         backlog 0b 0p requeues 0
         cookie 878fa48d8c423fc08c3b6ca599b50a97
         no_percpu
         used_hw_stats delayed
 
 2. Rule that decapsulates the tunneled flow and redirects to destination VF
 representor:
 
 $ tc -s filter show dev vxlan_sys_4789 ingress
 filter protocol ip pref 4 flower chain 0
 filter protocol ip pref 4 flower chain 0 handle 0x1
   dst_mac ca:2e:a7:3f:f5:0f
   src_mac 0a:40:bd:30:89:99
   eth_type ipv4
   enc_dst_ip 7.7.7.5
   enc_src_ip 7.7.7.1
   enc_key_id 98
   enc_dst_port 4789
   enc_tos 0
   ip_flags nofrag
   in_hw in_hw_count 1
         action order 1: tunnel_key  unset pipe
          index 2 ref 1 bind 1 installed 434 sec used 434 sec
         Action statistics:
         Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
         backlog 0b 0p requeues 0
         used_hw_stats delayed
 
         action order 2: mirred (Egress Redirect to device enp8s0f0_1) stolen
         index 4 ref 1 bind 1 installed 434 sec used 0 sec
         Action statistics:
         Sent 129936 bytes 1082 pkt (dropped 0, overlimits 0 requeues 0)
         Sent software 0 bytes 0 pkt
         Sent hardware 129936 bytes 1082 pkt
         backlog 0b 0p requeues 0
         cookie ac17cf398c4c69e4a5b2f7aabd1b88ff
         no_percpu
         used_hw_stats delayed
 
 RX rules
 
 1. Rule that encapsulates the tunneled flow and redirects packets from
 source VF rep to tunnel device:
 
 $ tc -s filter show dev enp8s0f0_1 ingress
 filter protocol ip pref 4 flower chain 0
 filter protocol ip pref 4 flower chain 0 handle 0x1
   dst_mac 0a:40:bd:30:89:99
   src_mac ca:2e:a7:3f:f5:0f
   eth_type ipv4
   ip_tos 0/0x3
   ip_flags nofrag
   in_hw in_hw_count 1
         action order 1: tunnel_key  set
         src_ip 7.7.7.5
         dst_ip 7.7.7.1
         key_id 98
         dst_port 4789
         nocsum
         ttl 64 pipe
          index 1 ref 1 bind 1 installed 411 sec used 411 sec
         Action statistics:
         Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
         backlog 0b 0p requeues 0
         no_percpu
         used_hw_stats delayed
 
         action order 2: mirred (Egress Redirect to device vxlan_sys_4789) stolen
         index 1 ref 1 bind 1 installed 411 sec used 0 sec
         Action statistics:
         Sent 5615833 bytes 4028 pkt (dropped 0, overlimits 0 requeues 0)
         Sent software 0 bytes 0 pkt
         Sent hardware 5615833 bytes 4028 pkt
         backlog 0b 0p requeues 0
         cookie bb406d45d343bf7ade9690ae80c7cba4
         no_percpu
         used_hw_stats delayed
 
 2. Rule that redirects from tunnel device to UL rep:
 
 $ tc -s filter show dev vxlan_sys_4789 ingress
 filter protocol ip pref 4 flower chain 0
 filter protocol ip pref 4 flower chain 0 handle 0x1
   dst_mac ca:2e:a7:3f:f5:0f
   src_mac 0a:40:bd:30:89:99
   eth_type ipv4
   enc_dst_ip 7.7.7.5
   enc_src_ip 7.7.7.1
   enc_key_id 98
   enc_dst_port 4789
   enc_tos 0
   ip_flags nofrag
   in_hw in_hw_count 1
         action order 1: tunnel_key  unset pipe
          index 2 ref 1 bind 1 installed 434 sec used 434 sec
         Action statistics:
         Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
         backlog 0b 0p requeues 0
         used_hw_stats delayed
 
         action order 2: mirred (Egress Redirect to device enp8s0f0_1) stolen
         index 4 ref 1 bind 1 installed 434 sec used 0 sec
         Action statistics:
         Sent 129936 bytes 1082 pkt (dropped 0, overlimits 0 requeues 0)
         Sent software 0 bytes 0 pkt
         Sent hardware 129936 bytes 1082 pkt
         backlog 0b 0p requeues 0
         cookie ac17cf398c4c69e4a5b2f7aabd1b88ff
         no_percpu
         used_hw_stats delayed
 
 HW offloads model
 
 For hardware offload the goal is to mach packet on both rules without exposing
 it to software on tunnel endpoint VF. In order to achieve this for tx, TC
 implementation marks encap rules with tunnel endpoint on mlx5 VF of same eswitch
 with MLX5_ESW_DEST_CHAIN_WITH_SRC_PORT_CHANGE flag and adds header modification
 rule to overwrite packet source port to the value of tunnel VF. Eswitch code is
 modified to recirculate such packets after source port value is changed, which
 allows second tx rules to match.
 
 For rx path indirect table infrastructure is used to allow fully processing VF
 tunnel traffic in hardware. To implement such pipeline driver needs to program
 the hardware after matching on UL rule to overwrite source vport from UL to
 tunnel VF and recirculate the packet to the root table to allow matching on the
 rule installed on tunnel VF. For this, indirect table matches all encapsulated
 traffic by tunnel parameters and all other IP traffic is sent to tunnel VF by
 the miss rule. Such configuration will cause packet to appear on VF representor
 instead of VF itself if packet has been matches by indirect table rule based on
 tunnel parameters but missed on second rule (after recirculation). Handle such
 case by marking packets processed by indirect table with special 0xFFF value in
 reg_c1 and extending slow table with additional flow group that matches on
 reg_c0 (source port value set by indirect tables) and reg_c1 (special 0xFFF
 mark). When creating offloads fdb tables, install one rule per VF vport to match
 on recirculated miss packets and redirect them to appropriate VF vport.
 
 Routing events
 
 In order to support routing changes and migration of tunnel device between
 different endpoint VFs, implement routing infrastructure and update it with FIB
 events. Routing entry table is introduced to mlx5 TC. Every rx and tx VF tunnel
 rule is attached to a routing entry, which is shared for rules of same tunnel.
 On FIB event the work is scheduled to delete/recreate all rules of affected
 tunnel.
 
 Note: only vxlan tunnel type is supported by this series.
 
 =================
 -----BEGIN PGP SIGNATURE-----
 
 iQEzBAABCAAdFiEEGhZs6bAKwk/OTgTpSD+KveBX+j4FAmAeINMACgkQSD+KveBX
 +j5ssAgAlmHUXB13W8FzXmp37hj6990QVVUNMe1tX09u6TOKi3X9VgRydCLdZlIm
 CEgdknjhlesjiYsy4z9o8MTV4IXGnNoy+qW9cuL9SCpDpVLeJ0g+3/laUv21oOhr
 zGxR4nmLwDxpzAj8huqOv5kVlojiA90x9wZIiOjx0+obOmglhfjzpUORAGXeHQTf
 yxeiEi1ef5MO02lE854gzPBF60XB6LN7+Viw+4E+G67n7TdvIQ0xu2j/DpOubpH2
 BzXoU12a424FvpAhhW8xrIZF4wFEo120Ln+vDMGq30Hqo/9gFQ1EmSBXaOOVhPwx
 M/gJ3OJhckrMpNs36tdCyoOm/pTS+w==
 =7d1N
 -----END PGP SIGNATURE-----

Merge tag 'mlx5-updates-2021-02-04' of git://git.kernel.org/pub/scm/linux/kernel/git/saeed/linux

mlx5-updates-2021-02-04

Vlad Buslov says:
=================

Implement support for VF tunneling

Abstract

Currently, mlx5 only supports configuration with tunnel endpoint IP address on
uplink representor. Remove implicit and explicit assumptions of tunnel always
being terminated on uplink and implement necessary infrastructure for
configuring tunnels on VF representors and updating rules on such tunnels
according to routing changes.

SW TC model

From TC perspective VF tunnel configuration requires two rules in both
directions:

TX rules

1. Rule that redirects packets from UL to VF rep that has the tunnel
endpoint IP address:

$ tc -s filter show dev enp8s0f0 ingress
filter protocol ip pref 4 flower chain 0
filter protocol ip pref 4 flower chain 0 handle 0x1
  dst_mac 16:c9:a0:2d:69:2c
  src_mac 0c:42:a1:58:ab:e4
  eth_type ipv4
  ip_flags nofrag
  in_hw in_hw_count 1
        action order 1: mirred (Egress Redirect to device enp8s0f0_0) stolen
        index 3 ref 1 bind 1 installed 377 sec used 0 sec
        Action statistics:
        Sent 114096 bytes 952 pkt (dropped 0, overlimits 0 requeues 0)
        Sent software 0 bytes 0 pkt
        Sent hardware 114096 bytes 952 pkt
        backlog 0b 0p requeues 0
        cookie 878fa48d8c423fc08c3b6ca599b50a97
        no_percpu
        used_hw_stats delayed

2. Rule that decapsulates the tunneled flow and redirects to destination VF
representor:

$ tc -s filter show dev vxlan_sys_4789 ingress
filter protocol ip pref 4 flower chain 0
filter protocol ip pref 4 flower chain 0 handle 0x1
  dst_mac ca:2e:a7:3f:f5:0f
  src_mac 0a:40:bd:30:89:99
  eth_type ipv4
  enc_dst_ip 7.7.7.5
  enc_src_ip 7.7.7.1
  enc_key_id 98
  enc_dst_port 4789
  enc_tos 0
  ip_flags nofrag
  in_hw in_hw_count 1
        action order 1: tunnel_key  unset pipe
         index 2 ref 1 bind 1 installed 434 sec used 434 sec
        Action statistics:
        Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
        backlog 0b 0p requeues 0
        used_hw_stats delayed

        action order 2: mirred (Egress Redirect to device enp8s0f0_1) stolen
        index 4 ref 1 bind 1 installed 434 sec used 0 sec
        Action statistics:
        Sent 129936 bytes 1082 pkt (dropped 0, overlimits 0 requeues 0)
        Sent software 0 bytes 0 pkt
        Sent hardware 129936 bytes 1082 pkt
        backlog 0b 0p requeues 0
        cookie ac17cf398c4c69e4a5b2f7aabd1b88ff
        no_percpu
        used_hw_stats delayed

RX rules

1. Rule that encapsulates the tunneled flow and redirects packets from
source VF rep to tunnel device:

$ tc -s filter show dev enp8s0f0_1 ingress
filter protocol ip pref 4 flower chain 0
filter protocol ip pref 4 flower chain 0 handle 0x1
  dst_mac 0a:40:bd:30:89:99
  src_mac ca:2e:a7:3f:f5:0f
  eth_type ipv4
  ip_tos 0/0x3
  ip_flags nofrag
  in_hw in_hw_count 1
        action order 1: tunnel_key  set
        src_ip 7.7.7.5
        dst_ip 7.7.7.1
        key_id 98
        dst_port 4789
        nocsum
        ttl 64 pipe
         index 1 ref 1 bind 1 installed 411 sec used 411 sec
        Action statistics:
        Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
        backlog 0b 0p requeues 0
        no_percpu
        used_hw_stats delayed

        action order 2: mirred (Egress Redirect to device vxlan_sys_4789) stolen
        index 1 ref 1 bind 1 installed 411 sec used 0 sec
        Action statistics:
        Sent 5615833 bytes 4028 pkt (dropped 0, overlimits 0 requeues 0)
        Sent software 0 bytes 0 pkt
        Sent hardware 5615833 bytes 4028 pkt
        backlog 0b 0p requeues 0
        cookie bb406d45d343bf7ade9690ae80c7cba4
        no_percpu
        used_hw_stats delayed

2. Rule that redirects from tunnel device to UL rep:

$ tc -s filter show dev vxlan_sys_4789 ingress
filter protocol ip pref 4 flower chain 0
filter protocol ip pref 4 flower chain 0 handle 0x1
  dst_mac ca:2e:a7:3f:f5:0f
  src_mac 0a:40:bd:30:89:99
  eth_type ipv4
  enc_dst_ip 7.7.7.5
  enc_src_ip 7.7.7.1
  enc_key_id 98
  enc_dst_port 4789
  enc_tos 0
  ip_flags nofrag
  in_hw in_hw_count 1
        action order 1: tunnel_key  unset pipe
         index 2 ref 1 bind 1 installed 434 sec used 434 sec
        Action statistics:
        Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
        backlog 0b 0p requeues 0
        used_hw_stats delayed

        action order 2: mirred (Egress Redirect to device enp8s0f0_1) stolen
        index 4 ref 1 bind 1 installed 434 sec used 0 sec
        Action statistics:
        Sent 129936 bytes 1082 pkt (dropped 0, overlimits 0 requeues 0)
        Sent software 0 bytes 0 pkt
        Sent hardware 129936 bytes 1082 pkt
        backlog 0b 0p requeues 0
        cookie ac17cf398c4c69e4a5b2f7aabd1b88ff
        no_percpu
        used_hw_stats delayed

HW offloads model

For hardware offload the goal is to mach packet on both rules without exposing
it to software on tunnel endpoint VF. In order to achieve this for tx, TC
implementation marks encap rules with tunnel endpoint on mlx5 VF of same eswitch
with MLX5_ESW_DEST_CHAIN_WITH_SRC_PORT_CHANGE flag and adds header modification
rule to overwrite packet source port to the value of tunnel VF. Eswitch code is
modified to recirculate such packets after source port value is changed, which
allows second tx rules to match.

For rx path indirect table infrastructure is used to allow fully processing VF
tunnel traffic in hardware. To implement such pipeline driver needs to program
the hardware after matching on UL rule to overwrite source vport from UL to
tunnel VF and recirculate the packet to the root table to allow matching on the
rule installed on tunnel VF. For this, indirect table matches all encapsulated
traffic by tunnel parameters and all other IP traffic is sent to tunnel VF by
the miss rule. Such configuration will cause packet to appear on VF representor
instead of VF itself if packet has been matches by indirect table rule based on
tunnel parameters but missed on second rule (after recirculation). Handle such
case by marking packets processed by indirect table with special 0xFFF value in
reg_c1 and extending slow table with additional flow group that matches on
reg_c0 (source port value set by indirect tables) and reg_c1 (special 0xFFF
mark). When creating offloads fdb tables, install one rule per VF vport to match
on recirculated miss packets and redirect them to appropriate VF vport.

Routing events

In order to support routing changes and migration of tunnel device between
different endpoint VFs, implement routing infrastructure and update it with FIB
events. Routing entry table is introduced to mlx5 TC. Every rx and tx VF tunnel
rule is attached to a routing entry, which is shared for rules of same tunnel.
On FIB event the work is scheduled to delete/recreate all rules of affected
tunnel.

Note: only vxlan tunnel type is supported by this series.

=================
2021-02-08 16:10:16 -08:00
arch Merge git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net 2021-02-02 14:21:31 -08:00
block block-5.11-2021-01-29 2021-01-29 13:50:06 -08:00
certs .gitignore: add SPDX License Identifier 2020-03-25 11:50:48 +01:00
crypto X.509: Fix crash caused by NULL pointer 2021-01-20 11:33:51 -08:00
Documentation net: dsa: automatically bring up DSA master when opening user port 2021-02-06 14:42:57 -08:00
drivers mlx5-updates-2021-02-04 2021-02-08 16:10:16 -08:00
fs Networking fixes for 5.11-rc7, including fixes from bpf and mac80211 2021-02-02 10:26:09 -08:00
include mlx5-updates-2021-02-04 2021-02-08 16:10:16 -08:00
init Revert "init/console: Use ttynull as a fallback when there is no console" 2021-01-08 11:02:18 -08:00
ipc Merge branch 'akpm' (patches from Andrew) 2020-12-15 12:53:37 -08:00
kernel Merge git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net 2021-02-02 14:21:31 -08:00
lib Merge git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net 2021-01-28 17:09:31 -08:00
LICENSES LICENSES: Add the CC-BY-4.0 license 2020-12-08 10:33:27 -07:00
mm mm: page_frag: Introduce page_frag_alloc_align() 2021-02-06 11:57:28 -08:00
net net: bridge: use switchdev for port flags set through sysfs too 2021-02-08 15:43:19 -08:00
samples bpf: Rename BPF_XADD and prepare to encode other atomics in .imm 2021-01-14 18:34:29 -08:00
scripts Kbuild fixes for v5.11 2021-01-10 13:24:55 -08:00
security dump_common_audit_data(): fix racy accesses to ->d_name 2021-01-16 15:11:35 -05:00
sound ALSA: hda/via: Apply the workaround generically for Clevo machines 2021-01-26 18:05:03 +01:00
tools selftests: tc-testing: u32: Add tests covering sample option 2021-02-08 15:18:57 -08:00
usr Merge branch 'work.fdpic' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs 2020-08-07 13:29:39 -07:00
virt KVM/arm64 fixes for 5.11, take #2 2021-01-25 18:52:01 -05:00
.clang-format clang-format: Update with the latest for_each macro list 2021-01-29 15:00:23 +01:00
.cocciconfig scripts: add Linux .cocciconfig for coccinelle 2016-07-22 12:13:39 +02:00
.get_maintainer.ignore Opt out of scripts/get_maintainer.pl 2019-05-16 10:53:40 -07:00
.gitattributes .gitattributes: use 'dts' diff driver for dts files 2019-12-04 19:44:11 -08:00
.gitignore .gitignore: docs: ignore sphinx_*/ directories 2020-09-10 10:44:31 -06:00
.mailmap mailmap: remove the "repo-abbrev" comment 2021-01-26 11:40:17 -08:00
COPYING COPYING: state that all contributions really are covered by this file 2020-02-10 13:32:20 -08:00
CREDITS MAINTAINERS: dccp: move Gerrit Renker to CREDITS 2021-01-14 10:53:49 -08:00
Kbuild kbuild: rename hostprogs-y/always to hostprogs/always-y 2020-02-04 01:53:07 +09:00
Kconfig kbuild: ensure full rebuild when the compiler is updated 2020-05-12 13:28:33 +09:00
MAINTAINERS net: dsa: add a second tagger for Ocelot switches based on tag_8021q 2021-01-29 21:25:27 -08:00
Makefile Merge git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net 2021-02-02 14:21:31 -08:00
README Drop all 00-INDEX files from Documentation/ 2018-09-09 15:08:58 -06:00

Linux kernel
============

There are several guides for kernel developers and users. These guides can
be rendered in a number of formats, like HTML and PDF. Please read
Documentation/admin-guide/README.rst first.

In order to build the documentation, use ``make htmldocs`` or
``make pdfdocs``.  The formatted documentation can also be read online at:

    https://www.kernel.org/doc/html/latest/

There are various text files in the Documentation/ subdirectory,
several of them using the Restructured Text markup notation.

Please read the Documentation/process/changes.rst file, as it contains the
requirements for building and running the kernel, and information about
the problems which may result by upgrading your kernel.