Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Dpdk Backend : Do not treat BAnd expresion in table key as simple expression #3823

Merged
merged 2 commits into from
Jan 5, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 3 additions & 2 deletions backends/dpdk/backend.cpp
Original file line number Diff line number Diff line change
Expand Up @@ -56,8 +56,9 @@ void DpdkBackend::convert(const IR::ToplevelBlock* tlb) {
new P4::ClearTypeMap(typeMap),
new P4::TypeChecking(refMap, typeMap),
new ByteAlignment(typeMap, refMap, &structure),
new P4::SimplifyKey(refMap, typeMap,
new P4::OrPolicy(new P4::IsValid(refMap, typeMap), new P4::IsMask())),
new P4::SimplifyKey(
refMap, typeMap,
new P4::OrPolicy(new P4::IsValid(refMap, typeMap), new P4::IsLikeLeftValue())),
new P4::TypeChecking(refMap, typeMap),
// TBD: implement dpdk lowering passes instead of reusing bmv2's lowering pass.
new PassRepeated({new BMV2::LowerExpressions(typeMap, DPDK_MAX_SHIFT_AMOUNT)}, 2),
Expand Down
2 changes: 1 addition & 1 deletion backends/dpdk/midend.cpp
Original file line number Diff line number Diff line change
Expand Up @@ -181,7 +181,7 @@ DpdkMidEnd::DpdkMidEnd(CompilerOptions& options, std::ostream* outStream) {
new P4::TypeChecking(&refMap, &typeMap),
new P4::SimplifyKey(
&refMap, &typeMap,
new P4::OrPolicy(new P4::IsValid(&refMap, &typeMap), new P4::IsMask())),
new P4::OrPolicy(new P4::IsValid(&refMap, &typeMap), new P4::IsLikeLeftValue())),
new P4::RemoveExits(&refMap, &typeMap),
new P4::ConstantFolding(&refMap, &typeMap),
new P4::StrengthReduction(&refMap, &typeMap),
Expand Down
179 changes: 179 additions & 0 deletions testdata/p4_16_samples/pna-example-bAnd-in-tableKey.p4
Original file line number Diff line number Diff line change
@@ -0,0 +1,179 @@
/*
Copyright 2023 Intel Corporation

Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/

#include <core.p4>
#include "pna.p4"


typedef bit<48> EthernetAddress;

header ethernet_t {
EthernetAddress dstAddr;
EthernetAddress srcAddr;
bit<16> etherType;
}

header ipv4_t {
bit<4> version;
bit<4> ihl;
bit<8> diffserv;
bit<16> totalLen;
bit<16> identification;
bit<3> flags;
bit<13> fragOffset;
bit<8> ttl;
bit<8> protocol;
bit<16> hdrChecksum;
bit<32> srcAddr;
bit<32> dstAddr;
}

struct empty_metadata_t {
}

// BEGIN:Counter_Example_Part1
typedef bit<48> ByteCounter_t;
typedef bit<32> PacketCounter_t;
typedef bit<80> PacketByteCounter_t;

const bit<32> NUM_PORTS = 4;
// END:Counter_Example_Part1


//////////////////////////////////////////////////////////////////////
// Struct types for holding user-defined collections of headers and
// metadata in the P4 developer's program.
//
// Note: The names of these struct types are completely up to the P4
// developer, as are their member fields, with the only restriction
// being that the structs intended to contain headers should only
// contain members whose types are header, header stack, or
// header_union.
//////////////////////////////////////////////////////////////////////

struct main_metadata_t {
// empty for this skeleton
}

// User-defined struct containing all of those headers parsed in the
// main parser.
struct headers_t {
ethernet_t ethernet;
ipv4_t ipv4;
}

control PreControlImpl(
in headers_t hdr,
inout main_metadata_t meta,
in pna_pre_input_metadata_t istd,
inout pna_pre_output_metadata_t ostd)
{
apply {
// Note: This program does not demonstrate all of the code
// that would be necessary if you were implementing IPsec
// packet decryption.

// If it did, then this pre control implementation would do
// one or more table lookups in order to determine whether the
// packet was IPsec encapsulated, and if so, whether it is
// part of a security association that was established by the
// control plane software.

// It would also likely perform anti-replay attack detection
// on the IPsec sequence number, which is in the unencrypted
// part of the packet.

// Any headers parsed by the pre parser in pre_hdr will be
// forgotten after this point. The main parser will start
// parsing over from the beginning, either on the same packet
// if the inline extern block did nothing, or on the packet as
// modified by the inline extern block.
}
}

parser MainParserImpl(
packet_in pkt,
out headers_t hdr,
inout main_metadata_t main_meta,
in pna_main_parser_input_metadata_t istd)
{
state start {
pkt.extract(hdr.ethernet);
transition select(hdr.ethernet.etherType) {
0x0800: parse_ipv4;
default: accept;
}
}
state parse_ipv4 {
pkt.extract(hdr.ipv4);
transition accept;
}
}

// BEGIN:Counter_Example_Part2
control MainControlImpl(
inout headers_t hdr, // from main parser
inout main_metadata_t user_meta, // from main parser, to "next block"
in pna_main_input_metadata_t istd,
inout pna_main_output_metadata_t ostd)
{
action next_hop(PortId_t vport) {
send_to_port(vport);
}
action default_route_drop() {
drop_packet();
}
table ipv4_da_lpm {
key = {
hdr.ipv4.dstAddr & 0xf: exact;
}
actions = {
next_hop;
default_route_drop;
}
const default_action = default_route_drop;
}
apply {
if (hdr.ipv4.isValid()) {
ipv4_da_lpm.apply();
}
}
}
// END:Counter_Example_Part2

control MainDeparserImpl(
packet_out pkt,
in headers_t hdr, // from main control
in main_metadata_t user_meta, // from main control
in pna_main_output_metadata_t ostd)
{
apply {
pkt.emit(hdr.ethernet);
pkt.emit(hdr.ipv4);
}
}

// BEGIN:Package_Instantiation_Example
PNA_NIC(
MainParserImpl(),
PreControlImpl(),
MainControlImpl(),
MainDeparserImpl()
// Hoping to make this optional parameter later, but not supported
// by p4c yet.
//, PreParserImpl()
) main;
// END:Package_Instantiation_Example
Original file line number Diff line number Diff line change
@@ -0,0 +1,91 @@
#include <core.p4>
#include <pna.p4>

typedef bit<48> EthernetAddress;
header ethernet_t {
EthernetAddress dstAddr;
EthernetAddress srcAddr;
bit<16> etherType;
}

header ipv4_t {
bit<4> version;
bit<4> ihl;
bit<8> diffserv;
bit<16> totalLen;
bit<16> identification;
bit<3> flags;
bit<13> fragOffset;
bit<8> ttl;
bit<8> protocol;
bit<16> hdrChecksum;
bit<32> srcAddr;
bit<32> dstAddr;
}

struct empty_metadata_t {
}

typedef bit<48> ByteCounter_t;
typedef bit<32> PacketCounter_t;
typedef bit<80> PacketByteCounter_t;
const bit<32> NUM_PORTS = 32w4;
struct main_metadata_t {
}

struct headers_t {
ethernet_t ethernet;
ipv4_t ipv4;
}

control PreControlImpl(in headers_t hdr, inout main_metadata_t meta, in pna_pre_input_metadata_t istd, inout pna_pre_output_metadata_t ostd) {
apply {
}
}

parser MainParserImpl(packet_in pkt, out headers_t hdr, inout main_metadata_t main_meta, in pna_main_parser_input_metadata_t istd) {
state start {
pkt.extract<ethernet_t>(hdr.ethernet);
transition select(hdr.ethernet.etherType) {
16w0x800: parse_ipv4;
default: accept;
}
}
state parse_ipv4 {
pkt.extract<ipv4_t>(hdr.ipv4);
transition accept;
}
}

control MainControlImpl(inout headers_t hdr, inout main_metadata_t user_meta, in pna_main_input_metadata_t istd, inout pna_main_output_metadata_t ostd) {
action next_hop(PortId_t vport) {
send_to_port(vport);
}
action default_route_drop() {
drop_packet();
}
table ipv4_da_lpm {
key = {
hdr.ipv4.dstAddr & 32w0xf: exact @name("hdr.ipv4.dstAddr & 0xf");
}
actions = {
next_hop();
default_route_drop();
}
const default_action = default_route_drop();
}
apply {
if (hdr.ipv4.isValid()) {
ipv4_da_lpm.apply();
}
}
}

control MainDeparserImpl(packet_out pkt, in headers_t hdr, in main_metadata_t user_meta, in pna_main_output_metadata_t ostd) {
apply {
pkt.emit<ethernet_t>(hdr.ethernet);
pkt.emit<ipv4_t>(hdr.ipv4);
}
}

PNA_NIC<headers_t, main_metadata_t, headers_t, main_metadata_t>(MainParserImpl(), PreControlImpl(), MainControlImpl(), MainDeparserImpl()) main;
Original file line number Diff line number Diff line change
@@ -0,0 +1,87 @@
#include <core.p4>
#include <pna.p4>

typedef bit<48> EthernetAddress;
header ethernet_t {
EthernetAddress dstAddr;
EthernetAddress srcAddr;
bit<16> etherType;
}

header ipv4_t {
bit<4> version;
bit<4> ihl;
bit<8> diffserv;
bit<16> totalLen;
bit<16> identification;
bit<3> flags;
bit<13> fragOffset;
bit<8> ttl;
bit<8> protocol;
bit<16> hdrChecksum;
bit<32> srcAddr;
bit<32> dstAddr;
}

struct empty_metadata_t {
}

struct main_metadata_t {
}

struct headers_t {
ethernet_t ethernet;
ipv4_t ipv4;
}

control PreControlImpl(in headers_t hdr, inout main_metadata_t meta, in pna_pre_input_metadata_t istd, inout pna_pre_output_metadata_t ostd) {
apply {
}
}

parser MainParserImpl(packet_in pkt, out headers_t hdr, inout main_metadata_t main_meta, in pna_main_parser_input_metadata_t istd) {
state start {
pkt.extract<ethernet_t>(hdr.ethernet);
transition select(hdr.ethernet.etherType) {
16w0x800: parse_ipv4;
default: accept;
}
}
state parse_ipv4 {
pkt.extract<ipv4_t>(hdr.ipv4);
transition accept;
}
}

control MainControlImpl(inout headers_t hdr, inout main_metadata_t user_meta, in pna_main_input_metadata_t istd, inout pna_main_output_metadata_t ostd) {
@name("MainControlImpl.next_hop") action next_hop(@name("vport") PortId_t vport) {
send_to_port(vport);
}
@name("MainControlImpl.default_route_drop") action default_route_drop() {
drop_packet();
}
@name("MainControlImpl.ipv4_da_lpm") table ipv4_da_lpm_0 {
key = {
hdr.ipv4.dstAddr & 32w0xf: exact @name("hdr.ipv4.dstAddr & 0xf");
}
actions = {
next_hop();
default_route_drop();
}
const default_action = default_route_drop();
}
apply {
if (hdr.ipv4.isValid()) {
ipv4_da_lpm_0.apply();
}
}
}

control MainDeparserImpl(packet_out pkt, in headers_t hdr, in main_metadata_t user_meta, in pna_main_output_metadata_t ostd) {
apply {
pkt.emit<ethernet_t>(hdr.ethernet);
pkt.emit<ipv4_t>(hdr.ipv4);
}
}

PNA_NIC<headers_t, main_metadata_t, headers_t, main_metadata_t>(MainParserImpl(), PreControlImpl(), MainControlImpl(), MainDeparserImpl()) main;
Loading