mlxsw: spectrum_acl: Fix ACL scale regression and firmware errors
[ Upstream commit 75d8d7a63065b18df9555dbaab0b42d4c6f20943 ]
ACLs that reside in the algorithmic TCAM (A-TCAM) in Spectrum-2 and
newer ASICs can share the same mask if their masks only differ in up to
8 consecutive bits. For example, consider the following filters:
# tc filter add dev swp1 ingress pref 1 proto ip flower dst_ip 192.0.2.0/24 action drop
# tc filter add dev swp1 ingress pref 1 proto ip flower dst_ip 198.51.100.128/25 action drop
The second filter can use the same mask as the first (dst_ip/24) with a
delta of 1 bit.
However, the above only works because the two filters have different
values in the common unmasked part (dst_ip/24). When entries have the
same value in the common unmasked part they create undesired collisions
in the device since many entries now have the same key. This leads to
firmware errors such as [1] and to a reduced scale.
Fix by adjusting the hash table key to only include the value in the
common unmasked part. That is, without including the delta bits. That
way the driver will detect the collision during filter insertion and
spill the filter into the circuit TCAM (C-TCAM).
Add a test case that fails without the fix and adjust existing cases
that check C-TCAM spillage according to the above limitation.
[1]
mlxsw_spectrum2 0000:06:00.0: EMAD reg access failed (tid=3379b18a00003394,reg_id=3027(ptce3),type=write,status=8(resource not available))
Fixes: c22291f7cf
("mlxsw: spectrum: acl: Implement delta for ERP")
Reported-by: Alexander Zubkov <green@qrator.net>
Signed-off-by: Ido Schimmel <idosch@nvidia.com>
Reviewed-by: Amit Cohen <amcohen@nvidia.com>
Tested-by: Alexander Zubkov <green@qrator.net>
Signed-off-by: Petr Machata <petrm@nvidia.com>
Reviewed-by: Simon Horman <horms@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Sasha Levin <sashal@kernel.org>
This commit is contained in:
Родитель
4b60b403f7
Коммит
d794f62614
|
@ -391,7 +391,8 @@ mlxsw_sp_acl_atcam_region_entry_insert(struct mlxsw_sp *mlxsw_sp,
|
|||
if (err)
|
||||
return err;
|
||||
|
||||
lkey_id = aregion->ops->lkey_id_get(aregion, aentry->enc_key, erp_id);
|
||||
lkey_id = aregion->ops->lkey_id_get(aregion, aentry->ht_key.enc_key,
|
||||
erp_id);
|
||||
if (IS_ERR(lkey_id))
|
||||
return PTR_ERR(lkey_id);
|
||||
aentry->lkey_id = lkey_id;
|
||||
|
@ -399,7 +400,7 @@ mlxsw_sp_acl_atcam_region_entry_insert(struct mlxsw_sp *mlxsw_sp,
|
|||
kvdl_index = mlxsw_afa_block_first_kvdl_index(rulei->act_block);
|
||||
mlxsw_reg_ptce3_pack(ptce3_pl, true, MLXSW_REG_PTCE3_OP_WRITE_WRITE,
|
||||
priority, region->tcam_region_info,
|
||||
aentry->enc_key, erp_id,
|
||||
aentry->ht_key.enc_key, erp_id,
|
||||
aentry->delta_info.start,
|
||||
aentry->delta_info.mask,
|
||||
aentry->delta_info.value,
|
||||
|
@ -428,7 +429,7 @@ mlxsw_sp_acl_atcam_region_entry_remove(struct mlxsw_sp *mlxsw_sp,
|
|||
|
||||
mlxsw_reg_ptce3_pack(ptce3_pl, false, MLXSW_REG_PTCE3_OP_WRITE_WRITE, 0,
|
||||
region->tcam_region_info,
|
||||
aentry->enc_key, erp_id,
|
||||
aentry->ht_key.enc_key, erp_id,
|
||||
aentry->delta_info.start,
|
||||
aentry->delta_info.mask,
|
||||
aentry->delta_info.value,
|
||||
|
@ -457,7 +458,7 @@ mlxsw_sp_acl_atcam_region_entry_action_replace(struct mlxsw_sp *mlxsw_sp,
|
|||
kvdl_index = mlxsw_afa_block_first_kvdl_index(rulei->act_block);
|
||||
mlxsw_reg_ptce3_pack(ptce3_pl, true, MLXSW_REG_PTCE3_OP_WRITE_UPDATE,
|
||||
priority, region->tcam_region_info,
|
||||
aentry->enc_key, erp_id,
|
||||
aentry->ht_key.enc_key, erp_id,
|
||||
aentry->delta_info.start,
|
||||
aentry->delta_info.mask,
|
||||
aentry->delta_info.value,
|
||||
|
@ -480,15 +481,13 @@ __mlxsw_sp_acl_atcam_entry_add(struct mlxsw_sp *mlxsw_sp,
|
|||
int err;
|
||||
|
||||
mlxsw_afk_encode(afk, region->key_info, &rulei->values,
|
||||
aentry->ht_key.full_enc_key, mask);
|
||||
aentry->ht_key.enc_key, mask);
|
||||
|
||||
erp_mask = mlxsw_sp_acl_erp_mask_get(aregion, mask, false);
|
||||
if (IS_ERR(erp_mask))
|
||||
return PTR_ERR(erp_mask);
|
||||
aentry->erp_mask = erp_mask;
|
||||
aentry->ht_key.erp_id = mlxsw_sp_acl_erp_mask_erp_id(erp_mask);
|
||||
memcpy(aentry->enc_key, aentry->ht_key.full_enc_key,
|
||||
sizeof(aentry->enc_key));
|
||||
|
||||
/* Compute all needed delta information and clear the delta bits
|
||||
* from the encrypted key.
|
||||
|
@ -497,9 +496,8 @@ __mlxsw_sp_acl_atcam_entry_add(struct mlxsw_sp *mlxsw_sp,
|
|||
aentry->delta_info.start = mlxsw_sp_acl_erp_delta_start(delta);
|
||||
aentry->delta_info.mask = mlxsw_sp_acl_erp_delta_mask(delta);
|
||||
aentry->delta_info.value =
|
||||
mlxsw_sp_acl_erp_delta_value(delta,
|
||||
aentry->ht_key.full_enc_key);
|
||||
mlxsw_sp_acl_erp_delta_clear(delta, aentry->enc_key);
|
||||
mlxsw_sp_acl_erp_delta_value(delta, aentry->ht_key.enc_key);
|
||||
mlxsw_sp_acl_erp_delta_clear(delta, aentry->ht_key.enc_key);
|
||||
|
||||
/* Add rule to the list of A-TCAM rules, assuming this
|
||||
* rule is intended to A-TCAM. In case this rule does
|
||||
|
|
|
@ -136,7 +136,7 @@ __mlxsw_sp_acl_bf_key_encode(struct mlxsw_sp_acl_atcam_region *aregion,
|
|||
memcpy(chunk + pad_bytes, &erp_region_id,
|
||||
sizeof(erp_region_id));
|
||||
memcpy(chunk + key_offset,
|
||||
&aentry->enc_key[chunk_key_offsets[chunk_index]],
|
||||
&aentry->ht_key.enc_key[chunk_key_offsets[chunk_index]],
|
||||
chunk_key_len);
|
||||
chunk += chunk_len;
|
||||
}
|
||||
|
|
|
@ -171,9 +171,9 @@ struct mlxsw_sp_acl_atcam_region {
|
|||
};
|
||||
|
||||
struct mlxsw_sp_acl_atcam_entry_ht_key {
|
||||
char full_enc_key[MLXSW_REG_PTCEX_FLEX_KEY_BLOCKS_LEN]; /* Encoded
|
||||
* key.
|
||||
*/
|
||||
char enc_key[MLXSW_REG_PTCEX_FLEX_KEY_BLOCKS_LEN]; /* Encoded key, minus
|
||||
* delta bits.
|
||||
*/
|
||||
u8 erp_id;
|
||||
};
|
||||
|
||||
|
@ -185,9 +185,6 @@ struct mlxsw_sp_acl_atcam_entry {
|
|||
struct rhash_head ht_node;
|
||||
struct list_head list; /* Member in entries_list */
|
||||
struct mlxsw_sp_acl_atcam_entry_ht_key ht_key;
|
||||
char enc_key[MLXSW_REG_PTCEX_FLEX_KEY_BLOCKS_LEN]; /* Encoded key,
|
||||
* minus delta bits.
|
||||
*/
|
||||
struct {
|
||||
u16 start;
|
||||
u8 mask;
|
||||
|
|
|
@ -11,7 +11,7 @@ ALL_TESTS="single_mask_test identical_filters_test two_masks_test \
|
|||
multiple_masks_test ctcam_edge_cases_test delta_simple_test \
|
||||
delta_two_masks_one_key_test delta_simple_rehash_test \
|
||||
bloom_simple_test bloom_complex_test bloom_delta_test \
|
||||
max_erp_entries_test max_group_size_test"
|
||||
max_erp_entries_test max_group_size_test collision_test"
|
||||
NUM_NETIFS=2
|
||||
source $lib_dir/lib.sh
|
||||
source $lib_dir/tc_common.sh
|
||||
|
@ -457,7 +457,7 @@ delta_two_masks_one_key_test()
|
|||
{
|
||||
# If 2 keys are the same and only differ in mask in a way that
|
||||
# they belong under the same ERP (second is delta of the first),
|
||||
# there should be no C-TCAM spill.
|
||||
# there should be C-TCAM spill.
|
||||
|
||||
RET=0
|
||||
|
||||
|
@ -474,8 +474,8 @@ delta_two_masks_one_key_test()
|
|||
tp_record "mlxsw:*" "tc filter add dev $h2 ingress protocol ip \
|
||||
pref 2 handle 102 flower $tcflags dst_ip 192.0.2.2 \
|
||||
action drop"
|
||||
tp_check_hits "mlxsw:mlxsw_sp_acl_atcam_entry_add_ctcam_spill" 0
|
||||
check_err $? "incorrect C-TCAM spill while inserting the second rule"
|
||||
tp_check_hits "mlxsw:mlxsw_sp_acl_atcam_entry_add_ctcam_spill" 1
|
||||
check_err $? "C-TCAM spill did not happen while inserting the second rule"
|
||||
|
||||
$MZ $h1 -c 1 -p 64 -a $h1mac -b $h2mac -A 192.0.2.1 -B 192.0.2.2 \
|
||||
-t ip -q
|
||||
|
@ -1087,6 +1087,53 @@ max_group_size_test()
|
|||
log_test "max ACL group size test ($tcflags). max size $max_size"
|
||||
}
|
||||
|
||||
collision_test()
|
||||
{
|
||||
# Filters cannot share an eRP if in the common unmasked part (i.e.,
|
||||
# without the delta bits) they have the same values. If the driver does
|
||||
# not prevent such configuration (by spilling into the C-TCAM), then
|
||||
# multiple entries will be present in the device with the same key,
|
||||
# leading to collisions and a reduced scale.
|
||||
#
|
||||
# Create such a scenario and make sure all the filters are successfully
|
||||
# added.
|
||||
|
||||
RET=0
|
||||
|
||||
local ret
|
||||
|
||||
if [[ "$tcflags" != "skip_sw" ]]; then
|
||||
return 0;
|
||||
fi
|
||||
|
||||
# Add a single dst_ip/24 filter and multiple dst_ip/32 filters that all
|
||||
# have the same values in the common unmasked part (dst_ip/24).
|
||||
|
||||
tc filter add dev $h2 ingress pref 1 proto ipv4 handle 101 \
|
||||
flower $tcflags dst_ip 198.51.100.0/24 \
|
||||
action drop
|
||||
|
||||
for i in {0..255}; do
|
||||
tc filter add dev $h2 ingress pref 2 proto ipv4 \
|
||||
handle $((102 + i)) \
|
||||
flower $tcflags dst_ip 198.51.100.${i}/32 \
|
||||
action drop
|
||||
ret=$?
|
||||
[[ $ret -ne 0 ]] && break
|
||||
done
|
||||
|
||||
check_err $ret "failed to add all the filters"
|
||||
|
||||
for i in {255..0}; do
|
||||
tc filter del dev $h2 ingress pref 2 proto ipv4 \
|
||||
handle $((102 + i)) flower
|
||||
done
|
||||
|
||||
tc filter del dev $h2 ingress pref 1 proto ipv4 handle 101 flower
|
||||
|
||||
log_test "collision test ($tcflags)"
|
||||
}
|
||||
|
||||
setup_prepare()
|
||||
{
|
||||
h1=${NETIFS[p1]}
|
||||
|
|
Загрузка…
Ссылка в новой задаче