From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from smtp4.osuosl.org (smtp4.osuosl.org [140.211.166.137]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id C83BAEA3C55 for ; Thu, 9 Apr 2026 13:00:29 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp4.osuosl.org (Postfix) with ESMTP id 9881A409B3; Thu, 9 Apr 2026 13:00:29 +0000 (UTC) X-Virus-Scanned: amavis at osuosl.org Received: from smtp4.osuosl.org ([127.0.0.1]) by localhost (smtp4.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP id 73mDqVE-cOin; Thu, 9 Apr 2026 13:00:28 +0000 (UTC) X-Comment: SPF check N/A for local connections - client-ip=140.211.166.142; helo=lists1.osuosl.org; envelope-from=intel-wired-lan-bounces@osuosl.org; receiver= DKIM-Filter: OpenDKIM Filter v2.11.0 smtp4.osuosl.org C27EE40A98 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=osuosl.org; s=default; t=1775739628; bh=RhesB1e78Ey4J4x9bt/a4Kb7RRvowWPoYQ3N1B32E00=; h=From:To:Cc:Date:Subject:List-Id:List-Unsubscribe:List-Archive: List-Post:List-Help:List-Subscribe:From; b=zdoa0McftgaP7TNOnyHKrXMLkSLZIxa+D7X459Jj+d1kLYvQnSvi77jRtarzQ8Rhv WcBaZP9AFa+gnbws+Dm98AWU72K3PmeiUVjhx6+DPNgb0YEjOVvG5bG1MXgGCcfG3z +loNrPxJLpn09SQU+bf9FDG6Bim9aMOmU/jn1LkAj+Zbgs/uCyrrk0CWLoBoLBD3zl J9VXvSY1C39F3NjUaX9wJ2fLn8SUsxGFh2Tc8HnQLtY7YQWB7OOnD12XUS688IohZk jWKaSye8po5d9vbPrhQGZFYA8ETq7rM7GBbsIN0FyufymUiCj9QI59+X71UyJkWAP+ oVbrHVzL45d+A== Received: from lists1.osuosl.org (lists1.osuosl.org [140.211.166.142]) by smtp4.osuosl.org (Postfix) with ESMTP id C27EE40A98; Thu, 9 Apr 2026 13:00:28 +0000 (UTC) Received: from smtp2.osuosl.org (smtp2.osuosl.org [IPv6:2605:bc80:3010::133]) by lists1.osuosl.org (Postfix) with ESMTP id CDFF91F6 for ; Thu, 9 Apr 2026 13:00:27 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp2.osuosl.org (Postfix) with ESMTP id C017040340 for ; Thu, 9 Apr 2026 13:00:27 +0000 (UTC) X-Virus-Scanned: amavis at osuosl.org Received: from smtp2.osuosl.org ([127.0.0.1]) by localhost (smtp2.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP id xqXtDbYgTUvs for ; Thu, 9 Apr 2026 13:00:26 +0000 (UTC) Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=192.198.163.19; helo=mgamail.intel.com; envelope-from=marcin.szycik@linux.intel.com; receiver= DMARC-Filter: OpenDMARC Filter v1.4.2 smtp2.osuosl.org 96093400F6 DKIM-Filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org 96093400F6 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.19]) by smtp2.osuosl.org (Postfix) with ESMTPS id 96093400F6 for ; Thu, 9 Apr 2026 13:00:26 +0000 (UTC) X-CSE-ConnectionGUID: ibk98RnHRAeJITWmAXFlRQ== X-CSE-MsgGUID: 4SodwL13R1yYpj4BwExJlQ== X-IronPort-AV: E=McAfee;i="6800,10657,11753"; a="75777510" X-IronPort-AV: E=Sophos;i="6.23,169,1770624000"; d="scan'208";a="75777510" Received: from orviesa002.jf.intel.com ([10.64.159.142]) by fmvoesa113.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 Apr 2026 06:00:14 -0700 X-CSE-ConnectionGUID: 8wv93W6YRNaPv+b/8xQJPQ== X-CSE-MsgGUID: hj2hNAosRf6DGP2BuA3UgA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.23,169,1770624000"; d="scan'208";a="259208076" Received: from irvmail002.ir.intel.com ([10.43.11.120]) by orviesa002.jf.intel.com with ESMTP; 09 Apr 2026 06:00:12 -0700 Received: from gond.igk.intel.com (gond.igk.intel.com [10.123.220.52]) by irvmail002.ir.intel.com (Postfix) with ESMTP id E0D982FC63; Thu, 9 Apr 2026 14:00:10 +0100 (IST) From: Marcin Szycik To: intel-wired-lan@lists.osuosl.org Cc: netdev@vger.kernel.org, sandeep.penigalapati@intel.com, ananth.s@intel.com, alexander.duyck@gmail.com, Marcin Szycik Date: Thu, 9 Apr 2026 13:59:53 +0200 Message-ID: <20260409120003.2719-1-marcin.szycik@linux.intel.com> X-Mailer: git-send-email 2.49.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Mailman-Original-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1775739627; x=1807275627; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=VI0ZDfzHgiwnpIuAdeBY0OblRdeN+BOSmlc2ltdCi0o=; b=ltI9arQ5ZFHRWNSl32xt9evExU9B9qTcmCheMT/G35HiU1dryshUOZVq t3tC5MS3FkHZfT15ROP2GqUu3QskRkcEvBo83mEE5KWn6u3EQs+lFHTf8 aeBsGfcROkLP9hWMhgYMK12ELczideCsidAIWtUfEwO5BGG1Q5YQoC/p8 xpKhwCjp+IyRLx1RCE1Y5prrEbfe1b0BIO1oi9HQZxIesPU+jF95VBuKE GZZKU9SABkNNgyL5cAO/9riicfSlYQRlaN7NLL4YhyA8uOrtU08ntrJy2 PRCo467M2XldoH+t7QtLZ4Ixi+0uCWu3/lA7XG68KokLLtFrkagAhK+6b g==; X-Mailman-Original-Authentication-Results: smtp2.osuosl.org; dmarc=none (p=none dis=none) header.from=linux.intel.com X-Mailman-Original-Authentication-Results: smtp2.osuosl.org; dkim=pass (2048-bit key, unprotected) header.d=intel.com header.i=@intel.com header.a=rsa-sha256 header.s=Intel header.b=ltI9arQ5 Subject: [Intel-wired-lan] [PATCH iwl-next v2 00/10] Add ACL support X-BeenThere: intel-wired-lan@osuosl.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Intel Wired Ethernet Linux Kernel Driver Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: intel-wired-lan-bounces@osuosl.org Sender: "Intel-wired-lan" E8xx hardware provides a Ternary Classifier block for implementing functions such as ACL (Access Control List). In this series it's simply referred to as "ACL". Implement ACL filtering. This expands support of network flow classification rules for the ethtool ntuple command. ACL filtering allows for an ip or port field's optional mask to be specified. Example filters: ethtool -N eth0 flow-type tcp4 dst-port 8880 m 0x00ff action 10 ethtool -N eth0 flow-type tcp4 src-ip 192.168.0.55 m 0.0.0.255 action -1 This is a resurrection of an old series from 2020 [1] with several improvements, but the fundamental logic unchanged. v1 was almost pulled in, but ultimately it was decided to drop it [2] because of unresolved issues. One issue was too many defensive NULL checks. Second issue is about inconsistency when using multiple input sets. Both are addressed in this patchset. More about the second issue: >From [3]: >I would argue that you need to have some sort of logic that basically >checks to see if you are going to hit the input set issue and falls >back and applies the ACL rules. Otherwise you are significantly >hampering the usefulness of this filter type. It doesn't make sense >that dropping a field will cause a rule to fail to be added, but >masking a single bit in some field will make it valid. It would make >it a nightmare to use from the user point of view as the rules come >across as arbitrary. Flow Director (FD) has a hardware limitation where all filters for the same packet type must use identical input sets. Previously, attempting to add the second filter would fail. Patch 10 adds automatic fallback to ACL block when FD cannot accommodate a filter due to input set conflicts, which resolves this inconsistency. v2: * Rebase. Notable conflicts were the removal of ice_status and the addition of libie (which affected AdminQ communication) * Reduce the number of defensive NULL checks * Use = {} instead of memset for definitions * Use kzalloc_obj() instead of plain kzalloc() * Move from devm_ to plain allocation for objects that don't require it * Move iterator declaration to loop start * Move some defines out of structs * Fix kdoc (except untouched ice_ethtool_fdir.c functions) * Adjust style (err for return variable, spacing, rewrite some comments, * commit messages) * Remove overly verbose comments * Add patches 5, 6, 9 and 10 * More changes listed in patches (if applicable) [1] https://lore.kernel.org/intel-wired-lan/20200914153720.48498-1-anthony.l.nguyen@intel.com [2] https://lore.kernel.org/netdev/7192efe4d27c93148b3205e65f37203c89170316.camel@intel.com/#t [3] https://lore.kernel.org/netdev/CAKgT0Ucxd5-gvEwWAdbL04ER2o++RX_oekUV3E0rYquEgFKj1w@mail.gmail.com Lukasz Czapnik (1): ice: use ACL for ntuple rules that conflict with FDir Marcin Szycik (3): Revert "ice: remove unused ice_flow_entry fields" ice: use plain alloc/dealloc for ice_ntuple_fltr ice: re-introduce ice_dealloc_flow_entry() helper Real Valiquette (5): ice: initialize ACL table ice: initialize ACL scenario ice: create flow profile ice: create ACL entry ice: program ACL entry Tony Nguyen (1): ice: rename shared Flow Director functions and structs drivers/net/ethernet/intel/ice/Makefile | 5 +- drivers/net/ethernet/intel/ice/ice.h | 21 +- drivers/net/ethernet/intel/ice/ice_acl.h | 170 +++ drivers/net/ethernet/intel/ice/ice_acl_main.h | 9 + .../net/ethernet/intel/ice/ice_adminq_cmd.h | 391 +++++- drivers/net/ethernet/intel/ice/ice_arfs.h | 2 +- drivers/net/ethernet/intel/ice/ice_fdir.h | 18 +- .../net/ethernet/intel/ice/ice_flex_pipe.h | 2 + drivers/net/ethernet/intel/ice/ice_flow.h | 39 +- .../net/ethernet/intel/ice/ice_lan_tx_rx.h | 3 + drivers/net/ethernet/intel/ice/ice_type.h | 5 + drivers/net/ethernet/intel/ice/ice_acl.c | 486 +++++++ drivers/net/ethernet/intel/ice/ice_acl_ctrl.c | 1111 +++++++++++++++ drivers/net/ethernet/intel/ice/ice_acl_main.c | 293 ++++ drivers/net/ethernet/intel/ice/ice_arfs.c | 8 +- drivers/net/ethernet/intel/ice/ice_ethtool.c | 8 +- ...ce_ethtool_fdir.c => ice_ethtool_ntuple.c} | 641 ++++++--- drivers/net/ethernet/intel/ice/ice_fdir.c | 30 +- .../net/ethernet/intel/ice/ice_flex_pipe.c | 11 +- drivers/net/ethernet/intel/ice/ice_flow.c | 1208 ++++++++++++++++- drivers/net/ethernet/intel/ice/ice_lib.c | 10 +- drivers/net/ethernet/intel/ice/ice_main.c | 91 +- drivers/net/ethernet/intel/ice/virt/fdir.c | 32 +- 23 files changed, 4344 insertions(+), 250 deletions(-) create mode 100644 drivers/net/ethernet/intel/ice/ice_acl.h create mode 100644 drivers/net/ethernet/intel/ice/ice_acl_main.h create mode 100644 drivers/net/ethernet/intel/ice/ice_acl.c create mode 100644 drivers/net/ethernet/intel/ice/ice_acl_ctrl.c create mode 100644 drivers/net/ethernet/intel/ice/ice_acl_main.c rename drivers/net/ethernet/intel/ice/{ice_ethtool_fdir.c => ice_ethtool_ntuple.c} (79%) -- 2.49.0