blob: a10df27fa32cebc17d93cb09506b0c8470150c55 [file] [log] [blame]
Sathya Perla2ae74082017-08-28 13:40:33 -04001/* Broadcom NetXtreme-C/E network driver.
2 *
3 * Copyright (c) 2017 Broadcom Limited
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation.
8 */
9
10#include <linux/netdevice.h>
11#include <linux/inetdevice.h>
12#include <linux/if_vlan.h>
13#include <net/flow_dissector.h>
14#include <net/pkt_cls.h>
15#include <net/tc_act/tc_gact.h>
16#include <net/tc_act/tc_skbedit.h>
17#include <net/tc_act/tc_mirred.h>
18#include <net/tc_act/tc_vlan.h>
19
20#include "bnxt_hsi.h"
21#include "bnxt.h"
22#include "bnxt_sriov.h"
23#include "bnxt_tc.h"
24#include "bnxt_vfr.h"
25
26#ifdef CONFIG_BNXT_FLOWER_OFFLOAD
27
28#define BNXT_FID_INVALID 0xffff
29#define VLAN_TCI(vid, prio) ((vid) | ((prio) << VLAN_PRIO_SHIFT))
30
31/* Return the dst fid of the func for flow forwarding
32 * For PFs: src_fid is the fid of the PF
33 * For VF-reps: src_fid the fid of the VF
34 */
35static u16 bnxt_flow_get_dst_fid(struct bnxt *pf_bp, struct net_device *dev)
36{
37 struct bnxt *bp;
38
39 /* check if dev belongs to the same switch */
40 if (!switchdev_port_same_parent_id(pf_bp->dev, dev)) {
41 netdev_info(pf_bp->dev, "dev(ifindex=%d) not on same switch",
42 dev->ifindex);
43 return BNXT_FID_INVALID;
44 }
45
46 /* Is dev a VF-rep? */
47 if (dev != pf_bp->dev)
48 return bnxt_vf_rep_get_fid(dev);
49
50 bp = netdev_priv(dev);
51 return bp->pf.fw_fid;
52}
53
54static int bnxt_tc_parse_redir(struct bnxt *bp,
55 struct bnxt_tc_actions *actions,
56 const struct tc_action *tc_act)
57{
58 int ifindex = tcf_mirred_ifindex(tc_act);
59 struct net_device *dev;
60 u16 dst_fid;
61
62 dev = __dev_get_by_index(dev_net(bp->dev), ifindex);
63 if (!dev) {
64 netdev_info(bp->dev, "no dev for ifindex=%d", ifindex);
65 return -EINVAL;
66 }
67
68 /* find the FID from dev */
69 dst_fid = bnxt_flow_get_dst_fid(bp, dev);
70 if (dst_fid == BNXT_FID_INVALID) {
71 netdev_info(bp->dev, "can't get fid for ifindex=%d", ifindex);
72 return -EINVAL;
73 }
74
75 actions->flags |= BNXT_TC_ACTION_FLAG_FWD;
76 actions->dst_fid = dst_fid;
77 actions->dst_dev = dev;
78 return 0;
79}
80
81static void bnxt_tc_parse_vlan(struct bnxt *bp,
82 struct bnxt_tc_actions *actions,
83 const struct tc_action *tc_act)
84{
85 if (tcf_vlan_action(tc_act) == TCA_VLAN_ACT_POP) {
86 actions->flags |= BNXT_TC_ACTION_FLAG_POP_VLAN;
87 } else if (tcf_vlan_action(tc_act) == TCA_VLAN_ACT_PUSH) {
88 actions->flags |= BNXT_TC_ACTION_FLAG_PUSH_VLAN;
89 actions->push_vlan_tci = htons(tcf_vlan_push_vid(tc_act));
90 actions->push_vlan_tpid = tcf_vlan_push_proto(tc_act);
91 }
92}
93
94static int bnxt_tc_parse_actions(struct bnxt *bp,
95 struct bnxt_tc_actions *actions,
96 struct tcf_exts *tc_exts)
97{
98 const struct tc_action *tc_act;
99 LIST_HEAD(tc_actions);
100 int rc;
101
102 if (!tcf_exts_has_actions(tc_exts)) {
103 netdev_info(bp->dev, "no actions");
104 return -EINVAL;
105 }
106
107 tcf_exts_to_list(tc_exts, &tc_actions);
108 list_for_each_entry(tc_act, &tc_actions, list) {
109 /* Drop action */
110 if (is_tcf_gact_shot(tc_act)) {
111 actions->flags |= BNXT_TC_ACTION_FLAG_DROP;
112 return 0; /* don't bother with other actions */
113 }
114
115 /* Redirect action */
116 if (is_tcf_mirred_egress_redirect(tc_act)) {
117 rc = bnxt_tc_parse_redir(bp, actions, tc_act);
118 if (rc)
119 return rc;
120 continue;
121 }
122
123 /* Push/pop VLAN */
124 if (is_tcf_vlan(tc_act)) {
125 bnxt_tc_parse_vlan(bp, actions, tc_act);
126 continue;
127 }
128 }
129
130 return 0;
131}
132
133#define GET_KEY(flow_cmd, key_type) \
134 skb_flow_dissector_target((flow_cmd)->dissector, key_type,\
135 (flow_cmd)->key)
136#define GET_MASK(flow_cmd, key_type) \
137 skb_flow_dissector_target((flow_cmd)->dissector, key_type,\
138 (flow_cmd)->mask)
139
140static int bnxt_tc_parse_flow(struct bnxt *bp,
141 struct tc_cls_flower_offload *tc_flow_cmd,
142 struct bnxt_tc_flow *flow)
143{
144 struct flow_dissector *dissector = tc_flow_cmd->dissector;
145 u16 addr_type = 0;
146
147 /* KEY_CONTROL and KEY_BASIC are needed for forming a meaningful key */
148 if ((dissector->used_keys & BIT(FLOW_DISSECTOR_KEY_CONTROL)) == 0 ||
149 (dissector->used_keys & BIT(FLOW_DISSECTOR_KEY_BASIC)) == 0) {
150 netdev_info(bp->dev, "cannot form TC key: used_keys = 0x%x",
151 dissector->used_keys);
152 return -EOPNOTSUPP;
153 }
154
155 if (dissector_uses_key(dissector, FLOW_DISSECTOR_KEY_CONTROL)) {
156 struct flow_dissector_key_control *key =
157 GET_KEY(tc_flow_cmd, FLOW_DISSECTOR_KEY_CONTROL);
158
159 addr_type = key->addr_type;
160 }
161
162 if (dissector_uses_key(dissector, FLOW_DISSECTOR_KEY_BASIC)) {
163 struct flow_dissector_key_basic *key =
164 GET_KEY(tc_flow_cmd, FLOW_DISSECTOR_KEY_BASIC);
165 struct flow_dissector_key_basic *mask =
166 GET_MASK(tc_flow_cmd, FLOW_DISSECTOR_KEY_BASIC);
167
168 flow->l2_key.ether_type = key->n_proto;
169 flow->l2_mask.ether_type = mask->n_proto;
170
171 if (key->n_proto == htons(ETH_P_IP) ||
172 key->n_proto == htons(ETH_P_IPV6)) {
173 flow->l4_key.ip_proto = key->ip_proto;
174 flow->l4_mask.ip_proto = mask->ip_proto;
175 }
176 }
177
178 if (dissector_uses_key(dissector, FLOW_DISSECTOR_KEY_ETH_ADDRS)) {
179 struct flow_dissector_key_eth_addrs *key =
180 GET_KEY(tc_flow_cmd, FLOW_DISSECTOR_KEY_ETH_ADDRS);
181 struct flow_dissector_key_eth_addrs *mask =
182 GET_MASK(tc_flow_cmd, FLOW_DISSECTOR_KEY_ETH_ADDRS);
183
184 flow->flags |= BNXT_TC_FLOW_FLAGS_ETH_ADDRS;
185 ether_addr_copy(flow->l2_key.dmac, key->dst);
186 ether_addr_copy(flow->l2_mask.dmac, mask->dst);
187 ether_addr_copy(flow->l2_key.smac, key->src);
188 ether_addr_copy(flow->l2_mask.smac, mask->src);
189 }
190
191 if (dissector_uses_key(dissector, FLOW_DISSECTOR_KEY_VLAN)) {
192 struct flow_dissector_key_vlan *key =
193 GET_KEY(tc_flow_cmd, FLOW_DISSECTOR_KEY_VLAN);
194 struct flow_dissector_key_vlan *mask =
195 GET_MASK(tc_flow_cmd, FLOW_DISSECTOR_KEY_VLAN);
196
197 flow->l2_key.inner_vlan_tci =
198 cpu_to_be16(VLAN_TCI(key->vlan_id, key->vlan_priority));
199 flow->l2_mask.inner_vlan_tci =
200 cpu_to_be16((VLAN_TCI(mask->vlan_id, mask->vlan_priority)));
201 flow->l2_key.inner_vlan_tpid = htons(ETH_P_8021Q);
202 flow->l2_mask.inner_vlan_tpid = htons(0xffff);
203 flow->l2_key.num_vlans = 1;
204 }
205
206 if (dissector_uses_key(dissector, FLOW_DISSECTOR_KEY_IPV4_ADDRS)) {
207 struct flow_dissector_key_ipv4_addrs *key =
208 GET_KEY(tc_flow_cmd, FLOW_DISSECTOR_KEY_IPV4_ADDRS);
209 struct flow_dissector_key_ipv4_addrs *mask =
210 GET_MASK(tc_flow_cmd, FLOW_DISSECTOR_KEY_IPV4_ADDRS);
211
212 flow->flags |= BNXT_TC_FLOW_FLAGS_IPV4_ADDRS;
213 flow->l3_key.ipv4.daddr.s_addr = key->dst;
214 flow->l3_mask.ipv4.daddr.s_addr = mask->dst;
215 flow->l3_key.ipv4.saddr.s_addr = key->src;
216 flow->l3_mask.ipv4.saddr.s_addr = mask->src;
217 } else if (dissector_uses_key(dissector,
218 FLOW_DISSECTOR_KEY_IPV6_ADDRS)) {
219 struct flow_dissector_key_ipv6_addrs *key =
220 GET_KEY(tc_flow_cmd, FLOW_DISSECTOR_KEY_IPV6_ADDRS);
221 struct flow_dissector_key_ipv6_addrs *mask =
222 GET_MASK(tc_flow_cmd, FLOW_DISSECTOR_KEY_IPV6_ADDRS);
223
224 flow->flags |= BNXT_TC_FLOW_FLAGS_IPV6_ADDRS;
225 flow->l3_key.ipv6.daddr = key->dst;
226 flow->l3_mask.ipv6.daddr = mask->dst;
227 flow->l3_key.ipv6.saddr = key->src;
228 flow->l3_mask.ipv6.saddr = mask->src;
229 }
230
231 if (dissector_uses_key(dissector, FLOW_DISSECTOR_KEY_PORTS)) {
232 struct flow_dissector_key_ports *key =
233 GET_KEY(tc_flow_cmd, FLOW_DISSECTOR_KEY_PORTS);
234 struct flow_dissector_key_ports *mask =
235 GET_MASK(tc_flow_cmd, FLOW_DISSECTOR_KEY_PORTS);
236
237 flow->flags |= BNXT_TC_FLOW_FLAGS_PORTS;
238 flow->l4_key.ports.dport = key->dst;
239 flow->l4_mask.ports.dport = mask->dst;
240 flow->l4_key.ports.sport = key->src;
241 flow->l4_mask.ports.sport = mask->src;
242 }
243
244 if (dissector_uses_key(dissector, FLOW_DISSECTOR_KEY_ICMP)) {
245 struct flow_dissector_key_icmp *key =
246 GET_KEY(tc_flow_cmd, FLOW_DISSECTOR_KEY_ICMP);
247 struct flow_dissector_key_icmp *mask =
248 GET_MASK(tc_flow_cmd, FLOW_DISSECTOR_KEY_ICMP);
249
250 flow->flags |= BNXT_TC_FLOW_FLAGS_ICMP;
251 flow->l4_key.icmp.type = key->type;
252 flow->l4_key.icmp.code = key->code;
253 flow->l4_mask.icmp.type = mask->type;
254 flow->l4_mask.icmp.code = mask->code;
255 }
256
257 return bnxt_tc_parse_actions(bp, &flow->actions, tc_flow_cmd->exts);
258}
259
260static int bnxt_hwrm_cfa_flow_free(struct bnxt *bp, __le16 flow_handle)
261{
262 return 0;
263}
264
265static int bnxt_hwrm_cfa_flow_alloc(struct bnxt *bp, struct bnxt_tc_flow *flow,
266 __le16 ref_flow_handle, __le16 *flow_handle)
267{
268 return 0;
269}
270
271static int bnxt_tc_put_l2_node(struct bnxt *bp,
272 struct bnxt_tc_flow_node *flow_node)
273{
274 struct bnxt_tc_l2_node *l2_node = flow_node->l2_node;
275 struct bnxt_tc_info *tc_info = &bp->tc_info;
276 int rc;
277
278 /* remove flow_node from the L2 shared flow list */
279 list_del(&flow_node->l2_list_node);
280 if (--l2_node->refcount == 0) {
281 rc = rhashtable_remove_fast(&tc_info->l2_table, &l2_node->node,
282 tc_info->l2_ht_params);
283 if (rc)
284 netdev_err(bp->dev,
285 "Error: %s: rhashtable_remove_fast: %d",
286 __func__, rc);
287 kfree_rcu(l2_node, rcu);
288 }
289 return 0;
290}
291
292static struct bnxt_tc_l2_node *
293bnxt_tc_get_l2_node(struct bnxt *bp, struct rhashtable *l2_table,
294 struct rhashtable_params ht_params,
295 struct bnxt_tc_l2_key *l2_key)
296{
297 struct bnxt_tc_l2_node *l2_node;
298 int rc;
299
300 l2_node = rhashtable_lookup_fast(l2_table, l2_key, ht_params);
301 if (!l2_node) {
302 l2_node = kzalloc(sizeof(*l2_node), GFP_KERNEL);
303 if (!l2_node) {
304 rc = -ENOMEM;
305 return NULL;
306 }
307
308 l2_node->key = *l2_key;
309 rc = rhashtable_insert_fast(l2_table, &l2_node->node,
310 ht_params);
311 if (rc) {
312 kfree(l2_node);
313 netdev_err(bp->dev,
314 "Error: %s: rhashtable_insert_fast: %d",
315 __func__, rc);
316 return NULL;
317 }
318 INIT_LIST_HEAD(&l2_node->common_l2_flows);
319 }
320 return l2_node;
321}
322
323/* Get the ref_flow_handle for a flow by checking if there are any other
324 * flows that share the same L2 key as this flow.
325 */
326static int
327bnxt_tc_get_ref_flow_handle(struct bnxt *bp, struct bnxt_tc_flow *flow,
328 struct bnxt_tc_flow_node *flow_node,
329 __le16 *ref_flow_handle)
330{
331 struct bnxt_tc_info *tc_info = &bp->tc_info;
332 struct bnxt_tc_flow_node *ref_flow_node;
333 struct bnxt_tc_l2_node *l2_node;
334
335 l2_node = bnxt_tc_get_l2_node(bp, &tc_info->l2_table,
336 tc_info->l2_ht_params,
337 &flow->l2_key);
338 if (!l2_node)
339 return -1;
340
341 /* If any other flow is using this l2_node, use it's flow_handle
342 * as the ref_flow_handle
343 */
344 if (l2_node->refcount > 0) {
345 ref_flow_node = list_first_entry(&l2_node->common_l2_flows,
346 struct bnxt_tc_flow_node,
347 l2_list_node);
348 *ref_flow_handle = ref_flow_node->flow_handle;
349 } else {
350 *ref_flow_handle = cpu_to_le16(0xffff);
351 }
352
353 /* Insert the l2_node into the flow_node so that subsequent flows
354 * with a matching l2 key can use the flow_handle of this flow
355 * as their ref_flow_handle
356 */
357 flow_node->l2_node = l2_node;
358 list_add(&flow_node->l2_list_node, &l2_node->common_l2_flows);
359 l2_node->refcount++;
360 return 0;
361}
362
363/* After the flow parsing is done, this routine is used for checking
364 * if there are any aspects of the flow that prevent it from being
365 * offloaded.
366 */
367static bool bnxt_tc_can_offload(struct bnxt *bp, struct bnxt_tc_flow *flow)
368{
369 /* If L4 ports are specified then ip_proto must be TCP or UDP */
370 if ((flow->flags & BNXT_TC_FLOW_FLAGS_PORTS) &&
371 (flow->l4_key.ip_proto != IPPROTO_TCP &&
372 flow->l4_key.ip_proto != IPPROTO_UDP)) {
373 netdev_info(bp->dev, "Cannot offload non-TCP/UDP (%d) ports",
374 flow->l4_key.ip_proto);
375 return false;
376 }
377
378 return true;
379}
380
381static int __bnxt_tc_del_flow(struct bnxt *bp,
382 struct bnxt_tc_flow_node *flow_node)
383{
384 struct bnxt_tc_info *tc_info = &bp->tc_info;
385 int rc;
386
387 /* send HWRM cmd to free the flow-id */
388 bnxt_hwrm_cfa_flow_free(bp, flow_node->flow_handle);
389
390 mutex_lock(&tc_info->lock);
391
392 /* release reference to l2 node */
393 bnxt_tc_put_l2_node(bp, flow_node);
394
395 mutex_unlock(&tc_info->lock);
396
397 rc = rhashtable_remove_fast(&tc_info->flow_table, &flow_node->node,
398 tc_info->flow_ht_params);
399 if (rc)
400 netdev_err(bp->dev, "Error: %s: rhashtable_remove_fast rc=%d",
401 __func__, rc);
402
403 kfree_rcu(flow_node, rcu);
404 return 0;
405}
406
407/* Add a new flow or replace an existing flow.
408 * Notes on locking:
409 * There are essentially two critical sections here.
410 * 1. while adding a new flow
411 * a) lookup l2-key
412 * b) issue HWRM cmd and get flow_handle
413 * c) link l2-key with flow
414 * 2. while deleting a flow
415 * a) unlinking l2-key from flow
416 * A lock is needed to protect these two critical sections.
417 *
418 * The hash-tables are already protected by the rhashtable API.
419 */
420static int bnxt_tc_add_flow(struct bnxt *bp, u16 src_fid,
421 struct tc_cls_flower_offload *tc_flow_cmd)
422{
423 struct bnxt_tc_flow_node *new_node, *old_node;
424 struct bnxt_tc_info *tc_info = &bp->tc_info;
425 struct bnxt_tc_flow *flow;
426 __le16 ref_flow_handle;
427 int rc;
428
429 /* allocate memory for the new flow and it's node */
430 new_node = kzalloc(sizeof(*new_node), GFP_KERNEL);
431 if (!new_node) {
432 rc = -ENOMEM;
433 goto done;
434 }
435 new_node->cookie = tc_flow_cmd->cookie;
436 flow = &new_node->flow;
437
438 rc = bnxt_tc_parse_flow(bp, tc_flow_cmd, flow);
439 if (rc)
440 goto free_node;
441 flow->src_fid = src_fid;
442
443 if (!bnxt_tc_can_offload(bp, flow)) {
444 rc = -ENOSPC;
445 goto free_node;
446 }
447
448 /* If a flow exists with the same cookie, delete it */
449 old_node = rhashtable_lookup_fast(&tc_info->flow_table,
450 &tc_flow_cmd->cookie,
451 tc_info->flow_ht_params);
452 if (old_node)
453 __bnxt_tc_del_flow(bp, old_node);
454
455 /* Check if the L2 part of the flow has been offloaded already.
456 * If so, bump up it's refcnt and get it's reference handle.
457 */
458 mutex_lock(&tc_info->lock);
459 rc = bnxt_tc_get_ref_flow_handle(bp, flow, new_node, &ref_flow_handle);
460 if (rc)
461 goto unlock;
462
463 /* send HWRM cmd to alloc the flow */
464 rc = bnxt_hwrm_cfa_flow_alloc(bp, flow, ref_flow_handle,
465 &new_node->flow_handle);
466 if (rc)
467 goto put_l2;
468
469 /* add new flow to flow-table */
470 rc = rhashtable_insert_fast(&tc_info->flow_table, &new_node->node,
471 tc_info->flow_ht_params);
472 if (rc)
473 goto hwrm_flow_free;
474
475 mutex_unlock(&tc_info->lock);
476 return 0;
477
478hwrm_flow_free:
479 bnxt_hwrm_cfa_flow_free(bp, new_node->flow_handle);
480put_l2:
481 bnxt_tc_put_l2_node(bp, new_node);
482unlock:
483 mutex_unlock(&tc_info->lock);
484free_node:
485 kfree(new_node);
486done:
487 netdev_err(bp->dev, "Error: %s: cookie=0x%lx error=%d",
488 __func__, tc_flow_cmd->cookie, rc);
489 return rc;
490}
491
492static int bnxt_tc_del_flow(struct bnxt *bp,
493 struct tc_cls_flower_offload *tc_flow_cmd)
494{
495 struct bnxt_tc_info *tc_info = &bp->tc_info;
496 struct bnxt_tc_flow_node *flow_node;
497
498 flow_node = rhashtable_lookup_fast(&tc_info->flow_table,
499 &tc_flow_cmd->cookie,
500 tc_info->flow_ht_params);
501 if (!flow_node) {
502 netdev_info(bp->dev, "ERROR: no flow_node for cookie %lx",
503 tc_flow_cmd->cookie);
504 return -EINVAL;
505 }
506
507 return __bnxt_tc_del_flow(bp, flow_node);
508}
509
510static int bnxt_tc_get_flow_stats(struct bnxt *bp,
511 struct tc_cls_flower_offload *tc_flow_cmd)
512{
513 return 0;
514}
515
516int bnxt_tc_setup_flower(struct bnxt *bp, u16 src_fid,
517 struct tc_cls_flower_offload *cls_flower)
518{
519 int rc = 0;
520
521 switch (cls_flower->command) {
522 case TC_CLSFLOWER_REPLACE:
523 rc = bnxt_tc_add_flow(bp, src_fid, cls_flower);
524 break;
525
526 case TC_CLSFLOWER_DESTROY:
527 rc = bnxt_tc_del_flow(bp, cls_flower);
528 break;
529
530 case TC_CLSFLOWER_STATS:
531 rc = bnxt_tc_get_flow_stats(bp, cls_flower);
532 break;
533 }
534 return rc;
535}
536
537static const struct rhashtable_params bnxt_tc_flow_ht_params = {
538 .head_offset = offsetof(struct bnxt_tc_flow_node, node),
539 .key_offset = offsetof(struct bnxt_tc_flow_node, cookie),
540 .key_len = sizeof(((struct bnxt_tc_flow_node *)0)->cookie),
541 .automatic_shrinking = true
542};
543
544static const struct rhashtable_params bnxt_tc_l2_ht_params = {
545 .head_offset = offsetof(struct bnxt_tc_l2_node, node),
546 .key_offset = offsetof(struct bnxt_tc_l2_node, key),
547 .key_len = BNXT_TC_L2_KEY_LEN,
548 .automatic_shrinking = true
549};
550
551/* convert counter width in bits to a mask */
552#define mask(width) ((u64)~0 >> (64 - (width)))
553
554int bnxt_init_tc(struct bnxt *bp)
555{
556 struct bnxt_tc_info *tc_info = &bp->tc_info;
557 int rc;
558
559 if (bp->hwrm_spec_code < 0x10800) {
560 netdev_warn(bp->dev,
561 "Firmware does not support TC flower offload.\n");
562 return -ENOTSUPP;
563 }
564 mutex_init(&tc_info->lock);
565
566 /* Counter widths are programmed by FW */
567 tc_info->bytes_mask = mask(36);
568 tc_info->packets_mask = mask(28);
569
570 tc_info->flow_ht_params = bnxt_tc_flow_ht_params;
571 rc = rhashtable_init(&tc_info->flow_table, &tc_info->flow_ht_params);
572 if (rc)
573 return rc;
574
575 tc_info->l2_ht_params = bnxt_tc_l2_ht_params;
576 rc = rhashtable_init(&tc_info->l2_table, &tc_info->l2_ht_params);
577 if (rc)
578 goto destroy_flow_table;
579
580 tc_info->enabled = true;
581 bp->dev->hw_features |= NETIF_F_HW_TC;
582 bp->dev->features |= NETIF_F_HW_TC;
583 return 0;
584
585destroy_flow_table:
586 rhashtable_destroy(&tc_info->flow_table);
587 return rc;
588}
589
590void bnxt_shutdown_tc(struct bnxt *bp)
591{
592 struct bnxt_tc_info *tc_info = &bp->tc_info;
593
594 if (!tc_info->enabled)
595 return;
596
597 rhashtable_destroy(&tc_info->flow_table);
598 rhashtable_destroy(&tc_info->l2_table);
599}
600
601#else
602#endif