From patchwork Fri Aug 1 21:08:43 2014 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Bill Fischofer X-Patchwork-Id: 34738 Return-Path: X-Original-To: linaro@patches.linaro.org Delivered-To: linaro@patches.linaro.org Received: from mail-qa0-f72.google.com (mail-qa0-f72.google.com [209.85.216.72]) by ip-10-151-82-157.ec2.internal (Postfix) with ESMTPS id E895A202A1 for ; Fri, 1 Aug 2014 21:09:23 +0000 (UTC) Received: by mail-qa0-f72.google.com with SMTP id cm18sf11148328qab.11 for ; Fri, 01 Aug 2014 14:09:23 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:delivered-to:from:to:date:message-id :mime-version:subject:precedence:list-id:list-unsubscribe :list-archive:list-post:list-help:list-subscribe:errors-to:sender :x-original-sender:x-original-authentication-results:mailing-list :content-type:content-transfer-encoding; bh=EOMb/2v61O8chTuiXqPy4Mjj83ODXWTkRTVWF//Tv1g=; b=daEe1S8OzDFXY8/ya+d+fz5MGHVykzVyKQ1oryJ74ns8vdiItgn3pxdjpCHu2vFmrt p6Lsd0JcONGpVzD4iG/0rw23hzHfd0M6lnn3E+JPalMU4mNMkb+96oRwpuEy4Rx25Yld tsdoLBMdQ09cI+bPtSLrNzq+Kvi7P3CnSKQJGvcZfVBc8qcR6HRbclmqR5rAoYTz1BPb +WJPDv+vGRP5Clfw4Q65RjvSQk7QZX2da7iaI/9cR7W2SG52PzXDyLnVV9r646GbncF0 5aPgE7aweVb45C6PiGCI8bTgr9FxqGHcGP3BFOHKPVEawBLhvVde8WujN8mfSdC6pF5M MnMg== X-Gm-Message-State: ALoCoQla4rdSft+gGx11H8SuYnew6KyL4SJ05ZNLNMwVTIlujtcRhmTtRNv9osI2TKfVZVyHUP7T X-Received: by 10.236.39.165 with SMTP id d25mr1515658yhb.2.1406927363733; Fri, 01 Aug 2014 14:09:23 -0700 (PDT) X-BeenThere: patchwork-forward@linaro.org Received: by 10.140.84.239 with SMTP id l102ls1472405qgd.81.gmail; Fri, 01 Aug 2014 14:09:23 -0700 (PDT) X-Received: by 10.221.66.67 with SMTP id xp3mr9480144vcb.44.1406927363561; Fri, 01 Aug 2014 14:09:23 -0700 (PDT) Received: from mail-vc0-f169.google.com (mail-vc0-f169.google.com [209.85.220.169]) by mx.google.com with ESMTPS id cu6si8404113vdc.20.2014.08.01.14.09.23 for (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 01 Aug 2014 14:09:23 -0700 (PDT) Received-SPF: pass (google.com: domain of patch+caf_=patchwork-forward=linaro.org@linaro.org designates 209.85.220.169 as permitted sender) client-ip=209.85.220.169; Received: by mail-vc0-f169.google.com with SMTP id le20so7641209vcb.28 for ; Fri, 01 Aug 2014 14:09:23 -0700 (PDT) X-Received: by 10.52.244.138 with SMTP id xg10mr8280116vdc.40.1406927363191; Fri, 01 Aug 2014 14:09:23 -0700 (PDT) X-Forwarded-To: patchwork-forward@linaro.org X-Forwarded-For: patch@linaro.org patchwork-forward@linaro.org Delivered-To: patch@linaro.org Received: by 10.221.37.5 with SMTP id tc5csp138829vcb; Fri, 1 Aug 2014 14:09:21 -0700 (PDT) X-Received: by 10.140.48.161 with SMTP id o30mr12603561qga.68.1406927360721; Fri, 01 Aug 2014 14:09:20 -0700 (PDT) Received: from ip-10-141-164-156.ec2.internal (lists.linaro.org. [54.225.227.206]) by mx.google.com with ESMTPS id w35si17672083qge.36.2014.08.01.14.09.16 for (version=TLSv1 cipher=RC4-SHA bits=128/128); Fri, 01 Aug 2014 14:09:20 -0700 (PDT) Received-SPF: none (google.com: lng-odp-bounces@lists.linaro.org does not designate permitted sender hosts) client-ip=54.225.227.206; Received: from localhost ([127.0.0.1] helo=ip-10-141-164-156.ec2.internal) by ip-10-141-164-156.ec2.internal with esmtp (Exim 4.76) (envelope-from ) id 1XDK4i-000178-Er; Fri, 01 Aug 2014 21:09:16 +0000 Received: from mail-oi0-f46.google.com ([209.85.218.46]) by ip-10-141-164-156.ec2.internal with esmtp (Exim 4.76) (envelope-from ) id 1XDK4S-000170-9n for lng-odp@lists.linaro.org; Fri, 01 Aug 2014 21:09:00 +0000 Received: by mail-oi0-f46.google.com with SMTP id i138so3084498oig.19 for ; Fri, 01 Aug 2014 14:08:54 -0700 (PDT) X-Received: by 10.60.62.234 with SMTP id b10mr12261852oes.3.1406927334625; Fri, 01 Aug 2014 14:08:54 -0700 (PDT) Received: from localhost.localdomain (cpe-24-28-70-239.austin.res.rr.com. [24.28.70.239]) by mx.google.com with ESMTPSA id h4sm40415603oew.11.2014.08.01.14.08.51 for (version=TLSv1.1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 01 Aug 2014 14:08:53 -0700 (PDT) From: Bill Fischofer To: lng-odp@lists.linaro.org Date: Fri, 1 Aug 2014 16:08:43 -0500 Message-Id: <1406927323-23862-1-git-send-email-bill.fischofer@linaro.org> X-Mailer: git-send-email 1.8.3.2 MIME-Version: 1.0 X-Topics: Architecture Classification patch Subject: [lng-odp] [ARCH PATCHv1] Publish Classification Design for ODP 1.0 X-BeenThere: lng-odp@lists.linaro.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: , List-Help: , List-Subscribe: , Errors-To: lng-odp-bounces@lists.linaro.org Sender: lng-odp-bounces@lists.linaro.org X-Removed-Original-Auth: Dkim didn't pass. X-Original-Sender: bill.fischofer@linaro.org X-Original-Authentication-Results: mx.google.com; spf=pass (google.com: domain of patch+caf_=patchwork-forward=linaro.org@linaro.org designates 209.85.220.169 as permitted sender) smtp.mail=patch+caf_=patchwork-forward=linaro.org@linaro.org Mailing-list: list patchwork-forward@linaro.org; contact patchwork-forward+owners@linaro.org X-Google-Group-Id: 836684582541 Signed-off-by: Bill Fischofer --- classification_design.dox | 869 +++++++++++++++++++++++++++++++++++++++++ images/classification_flow.png | Bin 0 -> 35193 bytes 2 files changed, 869 insertions(+) create mode 100644 classification_design.dox create mode 100644 images/classification_flow.png diff --git a/images/classification_flow.png b/images/classification_flow.png new file mode 100644 index 0000000000000000000000000000000000000000..2d94ff64ec772aa97f3687181c121fb91d671889 GIT binary patch literal 35193 zcma&OWmJ@5*EWozA_z!INewLmA}K97Gy;NxLy9zr4Bbli2uMkfgtYWf2HgxXG*ZGa zgv5Xh^Gev54CSnf<#e!~?l zm-e2&T9oTLGmW9>vu+K6dxhiAG~PT34<_c`$TF;brp~1?qA$kT`NC;0x&deSBQ`#o z?;h#t&Z3;7u;bB35%-}1x%I7pp;Nix<- za%)M>@fPMxQxu;W@tu$g))tlEp6t^I^Xb!(r1qnR%kG8f>Qf09tgiHmyDLLp8%I^1 z;Uj!oP6nS3UK(G`S~n(#G^o}qWKZ=YF6;W+u_2V3nXOuOxABb>Ku>N)%AamB-80H< z7Ppx}mFbylO%US0P%#L7!!-?GK7M)=ig_ZxcdWZ$ZeVbbol1Og1>Y4+lj(rjB(GSk z9jv?q6EtnBpAh7P^a|j=5vb=sQN*?!w3|G=IzLlVl(mGKoV*y~n7xJn$Qh|Zh3?;J zYQLv~tCLuCX+?`P(&9g`QIax_S2_QNsf7#AxJ53gW#hDYeT^^vu)bkA*r=yNw94;n z356Pw!!Byp&1yjbN*2^acGfaTsjEQmuLLEP<)x=T4@HLKwGV%BAa$K&dM_s@7Ud4T z#>g5%jRakB)j#5IRWxxA&1)a~q|a-wW%0z~m4<-Cs!Vy!re;0G5FP|w?M6f$zL_o3 zk>+Um)xSQ#IxT*J{lWcxHUD`+y*{d{t8I4p-1>aD~(?i|@4``lfrrd$5x ztaNE{zY!z7ioU!+kf~6kFSqC9x7@9s6!XDtcj_cgICLbd$0D(G?{bnF*YFF@6?&zi z&`15T^3V958goEw&>qV6#4!-(%{zkG#N77jDgZ&OOoex;j&P=nVuw?fc|8q_m@c^M z?8L7GskL#vkBh!2*`@W>tVu6_FD#)7C3;=wg0(sZ>WB*xRc8?0`28+KPu`;M?%&zG zU}lkjCid2~aQY1>MM_`qckLeQn0aLc?M5k!e;MjEoiSWuv0CQr>^5s){;cg`R(H^9 z=<=2vqt?}EE@U|$Q7bo#88_)GmIf9A0ywdaYFeb_Gxf4jOc9T)Z;Q;PFT`pt8X8vY z%{|mynFck6Yd+{tVmXg(*_6up4o0r3Cv;)>WqNL6OQ0tN1c^7euhlQc2sK{~w`?`7 zNsWRX(Frt_vcXtrYmCzPQHXO03$!y2Q)Jd}3}4siF5VsY*`NK%>{T1Ws$L)5nR8#NPk2-_H8{BOl@eU&_&$w*!1ujF9)|fpKQLqQmkm0 zpWiG23tU3I3csaVu;}>1B6>;v@(^wNK?~k5nm&5WEc~Y@s1QR$5L_F17)5hkq1Uds zynH*k+mB5cZKC|y+tE3a1|sQjy(IIoDhT4XHLZ*wbA0^r0uqT;zHu_jZ4HICj*!p;Vp(L0*zsqQurBbm^lpynPP9Vf1NIZ1*_RE+??qp zYf92}Fm&nAP?c&R=V1cq*Nh5qjH~yuAq*DDk5t#6a;I6@c)=PLV}xTjrYyTX?qRLW ztY#A;SmJVXZA7!| zUR1-qg@rRyH7vR6VDsyN^_i%N1YYh$_mz4iiVumNmTu2w{d#T z`YdzkIDI&KqU4ezr|h8__u)-IuVCZ^5qd_S^puY!xMc?mqZFMX^F-e+#bgTi?@~?O zNEw@6*P21idO5x+Sa}>R{QfN-0#d>8mhW_|Sj{S-l@^JY&*Mg~!|UfKTV z2;q}fXDIv)D=yF4>owiK_W4>yrv@K=%)c8|uX+XUwnbB*bL3XE7PqcS72dRwdRTRy z^Jlf__|TJ#MjEJMkJJABj!nnJ$u38>yDo~ z&W4=qC0d+>(;G!E3g zEbKzeVwui4zt$6p^H<@hQaFIa!++JIQ6&=ZWSUZyUlX^fw7;)3&5i_|Iv|h42f$|n zJz-FQsLB=m8VG`4Mjfg~U&VL(yD0oF{z`!YjsFZB6agE)Gs#OnVD!JOdh@RXL*c*v zZH%83KXxP(-xc5Z{~7E5&o2O#3{I4^;WRjM=XV2y)<{X<@zea=Z zN7ds-hb6_MLH{KB^{ZV~z%=DMBG#6`J+HH;x8*(<dk9!kbj96$-`!2&)l7_DiGJbJwDQ=m~#XpR5%j0q15mzOVpQ4lSR)??c?#3ig_lQZl&c@71O&m zWmLdHR*+f{Os{!l&b+JUX0I*SqTGzzf9oqxxBo9}|3z)d%4~z+Y4GWzpynf?9dFl} z*nVj_QKvsIS$-TE97#g`b5Vr zu&x~#tK*g-J&ey)0iOEty2FNhWowk`^VR1kBi0doLWj~UxAgHwO$s9?%&o6KlAE9& zs$0(JL)Avq&3R1p$3Kidgmjah>#f&AoJD)6I-1hE+LBG%e3fxxgAHMCr37mpbyc>W z96cM3vD`Ti1M7-nJ+Ro*`_eBd8V5Tlu+?CPuUaIR(T`&el9c zZYhz6jRst1Y0EUR&-S-L`VR_2(4RRb=vEx|woQ$LGQ~r{LNVamDjib`t`}$%fU>%DtZms;;MRvv zzD{Xp0P+z~kx)jdIA#hoy(+89;@eSf0$BX$ z6#F;O`IqT~Gr$$_{W(jJ!DcGkJRP}&Va{!i=XT9s_r|&u(xe=?wusHGHONa7V(!NA z1bvs^J*#B7x2v1uR#+KlZ6y1LK7fV|$I~xox${U*s38}3GLGmTzK(hC`OeN&$qPG>j4C)mZFUlWIo_NUNcopCxF7BA8 zmEfR^a2;!+8%V3D!@oY~va9?8i1|Q=^qOB6>iz33w=|iTPVr8%D96W>elu@(3UPq_ z?a>;9fgJy#3koo5l&x3Pn%e~ukF8UTcxb-KdNPs8`c!?Xz}#2O%AguF;X5;Oo&!cMqC*2_5ezMk|fk9NmC`2 z&{4RMsvuXr2Y;ZYyzG8ZX+|D~2t9qG#!4NH()y?mnB?=C;|3%jmGn zvksx~oUu#C;ZMEcX41CE)bC%$u>D)B-!FCxbRLPxr1s6~cvEmv7?=zcKZbYm{MVqB?w<0iiHaM~qIRy#PAqoMrR)M`_e~SA>52a|r z`+W`>y-tv7H?mF!#2|KEi>!GGKA`<&&gkN7pvl%2OrXCaByj zH_gQ)%GN`7S{xF|wMICtk7kIZRORAIKe*;hH9KH*a}E7eB5KVhb=T*Rjz zA2_w)n#r%EjRj$5#^$@y`FWYsD_;b}>(=AK^EMdE^gfJ0YF8^Bz?Ca8-aeD39LSnZ zxMmp!=j^S07c?&?)?*_jh`P*PmUAF=ZmJCkA6pk<+L#g`$~ax+cc9v39NSLH@z<|K zEY2G<4Ng|<3uAAcQyxV^d2dvHQirP%Ni}fvG~{t0{hYTVt|4SX>z%5hCKca=$v}`i zL6h;4kVg)aw-(G{f|a$(wcpKF}@t=-rOI1 zI`k1`V+(qR6mr!d;jPVRBE2lRQCVr=W`Ktl@I}T6$08Q*wBX~x8}0nGIPU!8Y}Cd_ zoPE253aB+x!Arz-N-g}El-4bQrwJ(0#SbR1im)69)Tp~=qoeo%lJfw0zS&15O7*im^2-s-a2)*`=07nnX7+ zLDex#rk3nS95pE3}Hi8JNKUnDYoYNR)077J{tgGd0j_6yWsSJ zr?v2?q(0ZpFlctXG$5>bLmJxBWf8Z_*zQ5z06~jLscwTSG4ypR*eeKbi8Jl)DU~(c ztOH4wL5{oEl_RZ5u2VyhpsoyvSziFTtw`0%vzrn}^pxWbUEnjJ)U!Nc-UtGH~_R~dzz0Vk~rX3KDHoL|(6M?*R`=#R5u57h{ zglmXx3;CXl)db1hF1T|LMpf+$E!wax=LiWVr%)e zSNrw2^G(9J*Uyb#&L%QP1^SgE1c~2BC?(4ktU%*3BD+(b6T`?$sL)MXWL?pkVv`$! z0iIuL7K>Dwuy0Dgm5!>1+L}(6@Ae%1fiOpIU)%bc)iG|{Dtg4{`Ask5%{}X0TJ*VC zU8WPYsl<*{#V)dG%SZF6kc-T@g4X&-)4lRm5HiWuApwhxVE&EJ-@EfdX!6@yc!k}W z2hWbfX~qEJxYlgUz(u<4h#OhXAvnW5*IT&|6W+Zcrad(8=%#|m-a@;g99@1myeP^F zL?wAzA@e?~Am+*wp##drb#uY2R8!ooJeBG%s-ZwI_=5tC7K@9*BP(87S!ELjsEhHKF1@%PN9rFs z8iy!p2N?aJv0XmIwmviSBh?Gah-@<(CcgsR*+co>S;6%T>4kMF^ilS}9fMuD`D2hD zJsUFQb?V*1E(fNpI}vu=PIO^dZsa`09YA(%a@MSM>Trx#7KcN9jd}_ASZlpme>dT* zby0ppE-JB`ZT2#j3$^uOKN5O>8w3fEbVi8&l4=npXYn``KGg~kz5R0Q1K&qw>*Diy z?L!OMBj1ct>+zu8D@ATSw9~Co&;V|Pts-FNA3yvy-iYpU@cHJUb3UI6PLNv~OOkAL z@gfv7Ql(dxGW-ZmRcM%vYtF{DDI;2bxs+uvwdF6;Rys>FplW}2iVxAmK>HPkR||}v zmlPP82qql9EUC%JV7&Y#ZOn$Ou8ltItzALR;8V0@y;KEpc0rAhN7lL44NNRnbe1#o zLG$z;t*im>9qGJ*9NIm~zL}#c5H;oz(7+^Kw1_nkgt;*LKXJBLnRUJ)p)AFQJfK07 z$h&z-82+eFs9SwH%!R}Hm~ zO--#VOLSF=8H0q#_o_5pac}J!@`!;%OxR=Om(80AKfr%xK2_&-^%V8*=t^#8fAA(4 zEhb$Es2Z(lMOY?d&33+Xb7?g*X6;+5T$Oc8ms_TApLXwNI!)}6B%}r!9DvM4VKdrh z!+(H~S76yi;0F7&!wt=ZaZybpYvXPU+g-quGG@m&WW624{S>6HUWXM;zls>yn$!OF z3|ML`EA$T~b9`zTIS4|-l}!hWuXfY4IcE69H+SpX@Tl9dfDu&fnD;f^>lvD8#s)D} zQ%eEiIb#ylxCyFF&#ihi9YnXqY>d8QcSN$n5!MvNnH<+8G7WbsYZ?3u->pGygolBU zd7CN-#%EB%kOd?7>}#^-8B?;sp#`j8#r5|l<5nvJH8%F6Cr+g1hoc!4LhAN(L{n2t z5qCYtOMi*1*xkd!2;tz$XN3$Q7coEAe_I_2h!^Nrlqvfz# zUKnc>8rzlXV#aKr;>a_n)ln<262738c3@Tpxts3Oo?ro^dajvka8M(MO+>V4g=9TK3LGt>^8k^yQuy?HiL-P#^h5qZ&)^!Y7t7Kzi6?UIh&V@Xm zNQQ$W9{7CaJV?T40>o5kCJMBurvkj256RUx-}wv&Nl2xo`Y^a<@WqZd1JaU(aj$65 zTwF?TG>P&ke?00-DT|BWq2L|kaAa1yRKQ2AwZ!1hVAs6A!MUg)tm3-S{>x_J%z*8m z>5l8#5s^O9QP8D$S- zB=~Q#^AR-9LaptSHvXESSi}H+^%MXUU!TdwwyV*SGqA zRF;1~NH?_j-^>lxMNZ3sM7hq~Vd1DY(|}cw3P|brjMjXz81K@+UDzQyPb3x?U8r?f zAOClFX);-EpO$l`k zgk#ut*$iY2XS>qn(&b$236m3>EwC-~=B~Ed^t<062Wm|NoiA4oZ^CL`+= zJG$8Ic-;ZzbFn1rKZ!B)C?|Ob^IkkFP4&Bb3S?4w!Kt}L2?}r}vjIKkl8Q##7}rU4 z%BgEEvdX@E3`M(bhfFp0kz8NgxdVE|kCx_ek%v~%P#ecReTwyRQ5e;MsaKm0YX~^v zjD9!WNpr5IQ$jXG)Y86i=*up%n<>Q zn3~3IO7tfRbf0vE=*F_vd7x;Vq3cSN^Oq<5s0 zeIL=An3|q;;eB+hi~rkBTPi~UEg*7qa4@^s*OEQU0y86lxg4bOcqFl5A30fsf+GU+ zaKuWyO|CK4Z&-SwDD2=vxn*i@{p`s8&SV7{7CV`fm77@5R7Q^64y*K5<4|tiu{@7&rzB>K}t+(+{qMPRhF7zCBl4^uuR8NX&`o@yP|~&-B;waImZT z*Sem9g$m50oj(cC&!haZ1;`S03X6cuWt3=d({D$S^MV8h->;(ksjUMJ{>6&0!0o|? zZr_CIIx--_R?YljC1JZw3X)~!UFi||T*I!$d>+!p(zSh&Fu!gtdH!>WOzrLiXA5f! zrN&MQG=d?6`i-no>wp!~c)-K*ya5s-U~$K+POFg2g0Jp8BrcD*=tjAFhGW;=oyCw@ zPobn37B)A~yvp8~L7ZAunx~^hR;w5zwcr~FaRnE7=63?3c)gq`OPeopr$*MNpmYAr zdU&cZ7h?nesHkU+0u7LOX{ylQ$?YzSj)=`*S@e+!yiO2V=lUt=IsnS9izTj_-0W85 zCJ6p>YJ@Z9<=B5VEW&sbz(fE9HWz3W2A|9P#iL-w5CK;Ehu*@-6Yq0_{(`oV&|(lb zfJpzRwF;bYhA5bc7C>zQ5Ln@qK;qs%96OOkH80@5W2(TFzR)jMyWRN*{2rF$fna4R ze9ONb@zdZj(SPm#0m+nTQV<@OEvEnF zoJcPN(!?7uv%v)ae@Jt&V74lp5Ww5W2^1DJE=hW=+$~P|ZYaPx0FZmb6m8D_95i1< z|KBA7+g`0Ahmot>KK$D!7#wlWTG2w}YH1NK+h`W=e||{>oFIMx3iM$mesy@%{C^gn z>k1qPfM(;t?MP^_90SuccZ&i(lK*>7ob3%20FT1=!*3=xh@esZKke^V>5~5UfDS7Y zA8=>*xl*cJQMY<21cFGr##yjgQd|M%SE7wPd=-85eMj-v4>pu&strd%rtb>h*{%X2 zh#+|-3SxfW=g9$(W0wVACy6He{^ye#xq9cPgnV8$`}+@>SL8Et^tZ>B4gWnF0tb*y^{wGTd0RxF5c8?Nfbyz598g^K&BD znxpCYeQL(V6-tJG!1hg1HD%knPy{K1Xt8DH#d=qgJS905z(w9)XR`|PJz(xX2Pjz9 z4-;-2a$lzV@7MkV>lMlx*@Y%(Hj&!J!)am-#vy`!N1wqrvJdyFhIHi*oPhB6vSN7nh20M24dB$2rQp%n$ir)%q$e5M z3d@poAIN7B2OgJ0yYqD6Ei`Wu9`xW@685LDzZR6>*0fHf5C4ip0dD=zlKv_kkcRxV zCt(j#z)jupBqtOWpr2@}08rm6Ik!r+YL0KdBmFC){SEpDWgT5?gm{fPeDJM*i&i8f zpVzIMLT#qwmio8Iwe-TI#{hp0BS$x@5oYQ<;Viah<7VdI{yW25!7m;*q%dBGt%c8d zID`5A#eGBs7WWG;LthGy&IR4#CBcV+|NT`IUSsjl_Z0&A7_>Y)L+oR~j{bLum>WV# z;cmPtA$S)~KoHw`m_q<1{fl@1<%#}{g{Q3kGcmAN0MGsJ7HS57eCdBj3k5txE>g(onGI8=hQ=Fi>X!jR~hA` z_N|vrh;Z%xm`&G+MIlQUZImcbA+Ur&E%^I=TaU%eyu{O^L8I@ReOuZ#zjdE|Q)5Z5 zn;XhHqrJ@3MscaYFWI#Lo)JjI^J!sbT%hxgt|Y}J`hZK@;noe*1nLx@qrO!^3^5gf zhkudb@$4i1GM);@q@ou#2S8jCVK%mlkDqu)+_hZ}uUU*Nky)N_E5I*}E%*sDX`aar zQUEffL??QO6HS7J4MV`G#>V-=jQb!VEMJb)wqCKiVXoO3_IaMIsiH3)uQdd z>_{ABOd1q4f8!GAIv}@7>Dp%PBN1X62~I`(MlgG|1P#H3Jg9f2cEijw83H3JMn5PW z&b$z6ky#8gn*|D0Mt^X~;UUQ{PKc!sWoy5De+p&F3K4_OpB@+-MW^;QOU3`X38)TW z61+9whU|H}o*1k0^+j*T+tnqKjy_Xdpk{|N{yT_B1Yq; zLXDwrK`IERK9$sPGe=D4q}M$f)vM1?+`?tUK|mFTY{g*oOJa-@iaR6+;|Jt?){|$4 zdoGn2R}A|ufJXVPhUtQ}a8qADFv48S7ip)Kzp9RkUJ0(Ihmk9E>)n6}x(N(_VcOpZ zied>j_<)$*3r&a>|8;R7*DK^fQt4Ao)f)ZrYWYgVxS~=C?-Kc0Oe*ROk#X<#wgZm}`D3 zy*W2|u7#PIx-ORT5ClN{TtR=!5VFmu-KjF>Kd}P^Q{}guayX_Wu8a5gcl@{lSmc%9 z_`Ea_CO)o1W$RR zL%-ZH0SFKedP1S$x@(QJ2r3kAHUly~oe4&Hp%0E`pybT_-^%Hs=d7NvS3pL0`9#qS zRY)A|=Nx%h*7HtIqDo*0uEBJ#4BJCNh`-z4&ljndDTzfwnfCMJ-mb_Ouc!Sw zNyEb7_EGyLrUhqe$+=@&EBwS&u~7(Cu{-WZbzvmgPslPzQ1JWX3jle?ez{Mu%|E9S zqrLrh;vy0nU|zqgJ^e~GE<|Aep)lsiKibAPJdIe?9=QAnX`aG|;k=)f;j`DX_w$?6 z&0bWOh=%uRRWP7IX2EEDb_H6F z5D)wLvRPbPkVdLtH_G>NKCBSevR|@}II?R}S?sS5F^pD0#I$Viw`4O|-SK@Hc?Gx+ zzAB{K?R@j0Q3;Da49QTgW{OxyRiE1Yvw*zQWw{^TOr7Abb*Yqx;;uH|&?!5@i83Tg zv?;0}RQAvYEm|!&Gr(lBvq**Uw+ww6*tL)sfJN_&y?rLDGGaBRC|6WOSYg`^_{*4w zUwM^cAAX-A6~;AvYmo~T{L9k&2$SRUj(v(bmli)cGic`_-MuY-1$cAMJ3(FFdQ##2 zmL&EYcs{>rRB}4<-7Q!=*3#rMqk6utH|jkoBb~mNXXw?9e>}o`t$DS zNT=6(%ZhaHVrdwx{ze4&i_c6onf+BpYA;32Fs6^9rk6vB6c{fLq32mkO9RBoN^qXI zJTq>k0q)BFX2GSlq5iFoNrlv_fXIt2YD5shC7q}1E#STyugcSp#x45qgS7MwB z22vF3$U_aANPDl$SiJ@YD-+p=9Rv^Vj0Gv~cR%2@>3$95ZV_2O6t?ys9sD3)&GQ%c2j$?@E+0kOAWvxQ%2D%Mkcj>4a$7KeAJB5>c6sOq2&cYoE;5 zJ#1uQsSr0z8TW2{pS7w5Q!8MRhf;vH0eY^|Y)qJ`_(Y+J-r-up{6YXwn05Ff>&DqszUk^&4?#%lUUS zooeDMnB2?@Q%z!S&3*Xp5n_3gORoD(=C6-)yh;O}fc<_rcX2nzTa5*qmKt2?5m3jY zruaICGQtLvY%s#UD{k}|k$z`t%@rbqfzBo)gs^a26to9SMleM>s5AV9s0zZ zYuH2B)QgFJCm0r~-VAmXMoAz#7E3$tm75(mdW88=L}W4fjIL=Xyo!9j3InVfMy}V0 zcNw`fT5cUNp|&M=_zEHL;Rh&*X064_G6@aBCKQGQlbD*;h@IPr3SAyYNv*xAK^L?1 zQV;@r-H6)*$jB6n=f6AzYBQfK@9H*#SuHDE1JWy%+%SC%E-1<^kt6{{Dc_=Ra|h*S z#u{p}SyL8fJO$+VtTT7D=awTK%K5l2DMkjs`FV|f)!uSLL|S%YxKr|9KWy;J>3LW2 z0+X5bCFyl)ca}dEFlK___iXI8tXLub0)mojFqa(VSj{Pqk^vLuZ%scU^_C}3RfRWi z;azMkhVP$5391Xaj|Jj4cpD<>sFZPr?s2!MeFJ)_Rjfc}9sb6(zkLG>QHC&VBKHEXA^tCshD+^M z)gup!NNuFGo8t4m@hU_R_Hg)S@42cTCs$iNl`_J6CUQYE^u1`>8!x3twR&%;202|f zwSCYfhN4OXG6_XAcqav2&3&#W{8fS8z!K!ya+z4%!}L0&ZEz5*E&S#@2e}2YMT~)%qREBZyM_4Yc=ljPFI1s z%;CO=E{LeBzV-h=x#3yBmxA`?Sbbi53rL^(DDmEpm&WIDW*j(CAua2tV>u0M!J-d` zPF|Ge7-${)byI5_sovtTWH%V0Xr8@?$Tozg^-|=i0ILQ|NK>LmSS_nMF&a&&hg;Ms zAY`Yii16po-{Chznr6`+VXhnYq-dhk2<}HFx2Ogw3RH?$cv%3uhm&uYjH(JNv~9Tg zMxehM6)N91dJi_YtMG6Ln>Pk7w?E#@!wl61_bokYDQ{Tel5$xJ{ z-g75qK#`7@ysywP_kbdW9&E?U@x0T3M?`iZ$wx|)y6<@XWfI3MvV-`w+bHmnzWk$01hBBXv~OH{Hv%!T=K>36iy^66T|$3>-(Du6s>LR;@RbjeFmYT zrGv;{E#$Vy036+4425m<-5;q+{-+D88r#VRQ|!ayDCvUe9W`z8wd?h_K5Q4t8OSbA z5=9?9N~7a5)gGveLUQ)e;T5X)vDQRS*Fcw#)G+BKq2%9UXYRuv4@$4ZD`2WL+S~63;c4e*jU#&*YkUG0z(|WcYAS8K)JUkFYyL$i$m)iWizluhDq* z^rb9(E1%<^fw-rm*04_-yQ~r#v5gEa+>ie`>pdV220C9nAcUC(XdNK#%$EPYx481O z1Qd|owBt6149KSt?9`pD5?s4x{6gLhvsXaxAt1H5<1tK8&=yWA3@p1RCyFJn{HfAA z23}|GSbJz+$xdQX2F9$XJWB%GC9*^U7D(e>sFd6w&dPqV<=J;id%#G|37pp|4>FT4 zx{vj~^NzLbdl$HYPC!Ii+Rt;h=+0VzIbpaQVe-D!YIO{~A zzFHohZkg!(hdm$2wG-5j7#|mfQC+8B}}2FsE}@|L8qf<`QD;oWWW z=6#dI61ZgXdpQ2eT66i=&hivOz5Xf;T= zvjY+qyuJFOlHW{Q+WE`UWB>0@j$;9B%Zuh|`t*^LZ_X~sV25f4xGS+Ym97FeKb%5V z&S*-h^u+WQ@iCLB!k*zvE!++FLEURd*{C`X>313}T1N=a6L+z`+1Y$M#}Pou38ZZ7f6z&mzSA# zq`EM@yopHF)SBQsAq|J;Rx6T4uRket@3Z0XZ{ zSaUOOzy6NMr_C0XhA_cGHe~85{c?hjWQeGMM_8y=_LvE=v7;2dQ>N{NaeeKR*HivY7W8rw! z?_Cr%5Yu)#iIazaR$bztZpq%8Q?HS3iS2$7Ga;z{r;gi(I?XByIxn(9ZMcx?lP+n$ z+5X4bWQjIt$!0Qm)$zbSC&IH+VDj>C?dt`yKlHS9vAe@Qv!t7If~e^y051Vtoq62l zpW+|n(q}v0)X1mD)NJFic)+qY&7<6SVS96h22I5f^VaW|eDPvidD}(RF(YIAA2(u5 zkfC$HIiwbSR#wp#Xg+TlabA24YrS%GY_QXsk=?V=J0J=L!1k}Xu>ntMcR;S4NB|Li z(0+)ob!`9np5daQ;-Y@hzk9zb#OhokC9iKE0C|q^Xv@@e`WLgb4xOf8av!S)Xm5jV za#_zb`IEOXO}6`GmoqanLm-sAvsC)Fdn9GnlI-vF;lQ13S8>R?kjWc5kEJPWO#2Fe z2%|0sY=<`w5w0IQ1see0^I7p-I7=9=$bVDxvbmJCXIih?+X<+*Jyr`W8zq<1)W3)1 zQSZ4c?EU*2z#nb`uWMB2@913uz-=-m1}NkmD@-z#7j76wHvOiW@XkeAbTr-%nfd@gK5UOo;&o)|3V ztq4_;$$CynKZew%{0?V|1hW<$({O0acUous9-o|Sqf|Oi$k*<6Wo2>uPDJRGgYDad zZra=GWeZRD=KO(sR?o+%K87njMZOR?woZE*tkd4&xpbH=F1t`n6AAsKcq<`qXIWU= z+v@WrUoBdBQdhFN6~I&bM7RyOSqyjzM)`rrZpd%4^sSTb%Rq3jK%;%{EY}VJP-XGG7E<0)8&2Sk_&I2JdryKc07@5W3qta_g7d+ys&MH-=gtHvT$-MO zjfiyBPccQfnzh=&$z>hA7W)-#iMi$5a{E1cwFba6=#`-hMY{k2q(MNjnV~%X>DQkI z@zlJ)U*1rutj=jBQpYS?08`LUP ziKn*Aiox<196Wyv1QDW+ftwCfqoTc_006t4e5IME;3bRs5ic!Avs*j790g4|opW^U zbN*f&xR=ysL>}yiI zLaE09z=XOb==}9D*@EHulh#v;5E~lwtY=+VHp=dq3Lbu(6$Q0=gU<2qmyUp!TgI|~ z(&RUO-!S(<)l6i~7*^<|1LaeSroPnZ&6*@C+*`aT*^t&0=>5>m(Z-G@+L;-Wb36op zJ=pooWxXHXUBOa~tmBSBaoPzC)G zKrk0P%Wp+aW(`#aPQGyDUB!lKc)UW9pgpkdp3HBrwN5gYBux6@O4-kNMlp8<`K_fhE@MOVl0WAzYj~J zkyCdv|J3zOSN!sLQq)1CU&(}TT&N7>kS69XXmW@c4wI=W#NMJ}SKvl3o8gwb;0|K{RB1_$yGccMt7_xds#Y5xwK&Q8dg;m@tXmkn};h zM?o>qcLlNvai<#@c^BbTfE}X=+%{2P#W|2fY{<2eJ*{V&hmxIQCb#33nPiiCl|b6; zLY_;x%2<{=NA_%LMws2pD9*SVlg)LxcFh(Gx5_Rt!=F1fW z&FYViDz<;}aVQBBkiK(8*$!sjid;2hzqwk`?RQ z3;+WacHipcTrrwCHMb6(eNDX%9%y%nE+K`f7BdpPBsr1JG6?0iyPPhb0+4qfIV;r6$f?eqWw9=w zO~YE1D`(}j@l@oMzWc}kJcg-u6ND_uc^?Hpra(c&Mv@K7Ej55yd`k$^Imff}kHPJvSN^h(O8-bsAkbc>MbBs{G2A?yc9^x26ap7Mli;N9(m>3usohf%VT z)oWnnPR*w~XpPol>ze05JI|d>;KN49ovKJxW#1G7)+uiT)@diZ55uv7D|=+Zcjd+3 zXlaVgC0!@mXjt&jozknj5-o#fe1Y}Z)+r(r-XcIEPMTi-Mh)wGEl@#s$o)tqdnwQv zbJHzD56=bi1YtasFwDVB{KDYDoVmN#NNn_X2Rby>s>^&&En(G6?Y_(Lk&knRb$?xZ zVOGTa#rF?tbwY>Djs`@3+(Wo3f?8e)3dG zhnk3=0ATsIev4u90-&?E@``lVJu4^7auymE%Q0ie=oZf}c}3Up(ZeC{rbm`}^8q^& z*w#JsR@)y*hCIF|1Dm3*O!yO=Xv zS-m!@3CoOs=w~Ff*Ob(*4?OA66^6>qAJo67JNPt{)Aw{6;{2UVJF1>R*2cY3t^4yp zc~RgvUs3pR`1UPB*ZQ0)kHUkJdE3myRIBxVcqG*Eo_tCc|M!A`FWg4;LH%4v=VybT ziCFt_qMDUxS>^&yd|8me0s-+I^o*6syLUHq$-YD@4RcM+yYtsR&Kc8<+QHBTttV16 zblZJR`Td??>=@jksob=zPS_R~l=>Sf%s5hRtp2V==A3Frs`5sT+o zE;g0cFVqz3BB3djeIpQ8N=U@Yq@y^@rQh(pXo$-_#}4gviojV0$f@h{QpN#yud;9a z73BqyF^eBpo-G^Y^Ubnxgup`--ua5}{Q}-XR5^i$d;?Y=zt4S>FzN$=QIdH9gqk0CL{ea?J%}?e59P7jXvM)uxILMJ-BP6+o^EuQNB|UL zrbgiIAh(Gjs-nS2(d^ihPf@l{0Lj(iG~ct8bUjPcYRFk+6nmutYF=!rcDa-7@OmBB6dnW?oXN(*4cA*L_o3#5=f9__PX za}KvR37vE7&T#&jQ%|(LllF@WO%*cT(uTNQ z?%m*liT>)ZjM(9ddg>>OXwwfxa6X357Fkb16G~;lY1p-S4;6$Q9hpFqx?bN8mt7(W zLk?D$3+9K;##V=X{Pj+IQ_0W!lO4StyfpWaVpn30yrgn)Zc!fR0z%E%4yrk3hbh}c zfTxdm|6qK)(+((7SrCvDHf0oQ41$XwgSv#DQTiHdy#4-cG{9n^&pd zE&LcaD7DvgzwkgsT=trR=C1)5H3-sk5Af|Aa+DrTJox9K~0M z%SEsazPd^4`Y954rx@^XbX-jYsFaaU4tmkepDkm20hO*o5F)PW)<5p(y0XrX6nk8y z*pF@NOEND8qu3Tx!Kn>0rnn}nRYq0#IuG(G$`h2f?dz;D0@j zcC1UWApBOcD6WHTO&}IkCU+lc{8!a#v zP{3%zO+$W?2!?4N0!8{$#%7$yr-wl^v22lt$QY<})0_X()mO(w8Fb+yDhLwNNQ*QG z($XE$of3j{iF8X!Bhnz<-JODflCpFyO1h-L(y@0|zwf*Eclm31-*@WF%$b>Up7V^z zQkm|uNgHmR2t7=>KyH@*cf0mhn{K`xaMAijxnc+=WgDJG!gMp@YuL5G`@1F2${p9$ zlT%t3z=%2doke&GZL&kJu&GN_EZFj1&HX5yIUB~+w!vW)g{_HPnsaw~(l7O7)oCEO zY4^&}USZ?w%ndEt*Q3nALnb6-55Mr`2aD#b5%pIS(?T}BH=`;%{I)(Z>-DCMinZ4P zjW_}on{CFN;|XJ6&e@*F83Tk@4fX=V*G~ni?U!2w81J?szUpoVKk(6>Cb#nX^3@kh zSLazAtpxdIznVRChwS1bH}ett1~(;uQ{YAQUKzD~bM^AX1%JzydVf`G=TU9KGbFSU z{|UqpV6eP#56cEC$q4DP>=z{Y;~bkPbvpxGNm6o5r{zdD~2{_<=L+|Aap4?4&p^wUz2)V_A7uR!M9e6 z8++w`&n8ib>7O>KERMG2KBKgx-i~x=D<>^1FA=Mm}d5#$Rd01 z1o(ba%Ve9xe&y#(Xl#tXiR++xhN@AuOg((A;^}ltn!4+%-DL1~vDInzj{@xkQjba% zt%CAcdv+g6#`^YQgI`X4Bqy#~ew9Y~1kJ$!Tqch$E%=oQa%GOm5fMggZ938OG130c z?h6Bo_$-F{$L#Ma+e@Uu&xG(Zg+%hs&tSWV?Ppbm9kMH}eI?L>gLMU$d?og?82W#r`S#h3BA{D$t?gj1?As#!>9 z3e&?V0I}oLYLOo&-o$H$IX88{@Wr#fpOg>&EF8*;cWvKQ%@9;Vf5CU3)-NoD-d%XK z=t?s|R+(-%zEjfSNzrAtK^dQsLcI{B9kv9|5(E8-W_&_%ogm+8#vCdwB~2@>-=)Qh zuz0bFvCxf6wi7qy&p(9W@WZV72Lw@DFEy1;#A5j@4kBLw3ljPp*eZM z+`ZGL7fK(&HcuQ|(`s+0yUi-?c6JaV1DD0hgY%+*-(g@%)G%$1!QCthY+8!(Dkaio zIkiMJQ5OSN53)P5B|2S;5^dzDx#68TyJy~MdaGYuhb~;df!5%9>NhbB9#sbv`d~@_ z3?Rw{<}%KyallfvgSCI`VP2N~)~x*8eTd(gzz_@!k(k{F_Wb>7lp~Wlpqf8bL>L&e z8a<0L@sm>KJb#}i*)Ry3##229Tg1~9*QLUh)XWl!A)69}n)TF7m&w;leuv8k3$9{| zRy03WqFViDJ`gPKAo3FG_7Pv1t@*oIgUyjZ3RSX`wu)~=92BNk=>N@&nd%S zA1+q)5Z{~mIHl6sgQFk!c`F?eb-CAv8h>aOu>;JW6{lX-W{W@qD}FZH^iEvP+ZL;? zFpEs7Si#F+S`}bx2aBy%-e82L@?DiOBfL~9zb>M=-4K)Vj&yU#4`y6Y=Y$*|%fbul zWHm&D{bZBBj?U|w=e5e&|B(O)T>OYeoJ!u9mdDgCueyZzmhjdWKy3p;~@KpNQvi!J0njXi#zoNClw7uGnnD*oeEAN6Aes> zn^OKESX99%Q7AaR$L8h6m6B&FjP!4Ow&%=zP}&NnDtw)rDt_!M25{e~QATrTej`SL zTIE%RV~YHfH3%bKv(aWA0%rnBzgZ`JO z5#R$(x|&(koj>2GBjv5sUbe}vC~>MW0ym0(oO6Lv=oGZ$s}3#XvDPO=@}TF=yTvL< zfdD(US)N04bH*Jjo_-K@B3&m`lSwGGy1o85G7wZc%M&d_b6? zOes;f{f48z2U%y~7}=aSAmY&_2f-A5&@4d2AfAcDFMRr<#*q-KZu9tq8ZsT$v!Ynf zp(Ki#Cy>XW!YFDA#Hl!zoS;)ad`0ry1PR^&J})iCqp3Yid+K0Zu*UT%+H36JxUSFJ29mo-^Bk%j!qtjK2qk){JCbS}Ho!z)%{`MbZRwuAX^T>Lp z-7heZUl2!rQa3xH^sjb=(eCK}>1OX0`UZ^H3;yPr8cCx>kx)u7a97&9Od5$uXTkRR z(byW#CqVYMfV$_kLyW^Os}f`g@2~xJkE=Q2H3z8xCL9Z*kWs?>ZlCCgeGy_GOs0>1EvSG4eHqpb&*i^95WOr4I1}rFRbP622-xa#3K?8JvEFp* zWNhC%Siy>OGDgUrU+l~@d7M5veC7aX+_EwJt6K6b#)ZAsx+m&{Y%m@o9jAH*%3ItR z$o2l->m+XBQMbIei9ZsSAzi#I->TcIMF?kBuJk{2`!5>a7HzGZA~p&;1wu=CDa*$Z zebp=b$8!!}E?k%5nz}Zs=io&F!@+yE*VGL%{a4T*YyM7)SfSHMOx8Q@q2Z8@-3Jv^ zNQL!D-D%tUnM^#B?^=hv@R0(4rDHbXgCh&&@LE-`%|?1|M#|nO1c@Zx;SBy4Gd#nk&%M;KnqB| z9_)BC^S!FzRdmPD&;X>NY%ja=g)Wm~t+Y$2j5kk_(G$*D=&a)!Y{k}gzW$BMa28&; z>$hGI2B7uu#L{#@_dY*}fd54IU_Lrn@Vf%jnBjsk*8QFBrr;w!#H5qL(=iYqR>}NI z?hw9WoPxKbaN^lt)>P<{eDF9(9v!{i=aMNBwJeZ%Gt2~OfslGR7a^}of$8Q|`I#iA zf|22aS1RSk6=Ld_*vYC8J<%30q>F>k2>mc8I~MuL;B4wvoW5kNXappJb84d3c0R)sNWmx*@7=8kmEc_bdcUe}Iu zb_QHpU|T~r;GNcQpG3hJ1;*i%bu)8;ZMtodlo#y9FH}FtHy5d8XZRn0?+XT7KlSfTW>&xt`Rdi z9!z_fNi*On6J`m6Yu~{MS8W|O(K!O}2iXL@eerklu_cK++1mJ=ZBsWe4)|ofiFZ`a z;4$(sxw?IRy#ZZOkpk-%?`!i;aDD+LJ`Q?xWM)&k{T0*IE0o_}HA`HzPCn)4I@DwJ z(KgaqKzWqYy=p<+sJ)O+2l_3OCM1ZGkU)X{hhg^1B5~C=`4pR{j3S{Q)pXN95Oa<} zjieLM=O9XiDC7s@nzCX1d@;GMKy|-hga+9co(FIq0Fb_XcY?bhs9kjPuZU;ko@w?R zz*`exRq>Q1`3)XferqOyuIjTXO0>vm!RbiC zZ=;Lzj0lq7Hu$hQAAXOJ*)lHK0^R!rN}W8KgleM|{MfI#XhjZHyoT@mW z71n`ll}#dn`_wY=kjti~tol8o_>(!LQ9y;y$@F2fbKbcZPOgeb67G(2oXR_M!vq%# z#YHX*U|#J`!VJvfi)U|lDnBV|-e6qT@XOrtFE5Ic#2ZgwfwEmWXL-Wu!{O4C zt8Qoa@T=uSByL-v@UGQ~q&D@8-|#f$^&y`{19}Re#aAD|0efP)*!j1oH^_)!?+GMt zQf>~F`_iF5a2)>0_Pw3%7%v{*eua#YL4wY@20cb@nA%8+ZL4lC?6x_W^)Q#M%BaNU%5DGZ^>HSN*TYAdyVZSln`CO>5Vrr z^6&j>`AqAly;wy)(|PF6DGftXgjQc5Sv3cJyp?B}IDERc>_BYFA8!29iBwk%53jj| zedTU%<;5>Q+nQ-0tW=@-F@>ZkTuP7o&Y`LQ( zrp_|#j=kT={`NMdbQAIUXQG72@&j?Nx%EPyl&`jrV0w|;q;9Bu_9%pNu`Uxl0K z>K+8_f9ALdIO(Q3a=Km2KBq=Z!EQfG#Hudi z5#6_k8*|knj+1UXhy>+s+tvVRMLP)0wX=^5Uz5SBy})JZ9#_523ji#fz2C=L>bu{5 zgRl2Q90!c1W{?3{Z?gC- zJu-j_JS7cFn%G9CJWLL8WKa<_ZvWku9ky~fZAUe-b50a20~CC8cg!Q~)?9?2)Tp8*%L*eFW7Jkw#X<>*SzV zeR8V}8M?w0{Pi45EAk}++I}f=SzLrqqN5M^)BwmU_9g5r%esKiMGHgs}|HnXSQej2CsD9 zW(qOZ=QKd&(|MuG@nNO>#nG$53hzIh$nd$o6}R0ydXJMAvbj`8WWX^QDHrExSwOLi zr$Ysgv|IEjJ!?-K}yZV!`R|6+g$CU$!NK zF^VbKM<@TkiI{Dd3WDbwIEc*QHRw^|!aH%XYC&8MtH7=45SxI?e#4hYjb z@l>t$QgL*#cqage%^Y(nkJ4Euqi#AnHWXmz0IcC1?%G*wzVSu1OdQeQZFN+DPU|N_ zY`(niN>9+&EYPUCd`(QQwLl)sHyst(y@*LZg9vrJ^KFB-G*MB8ych2Zo z+isQx=!5gC4VO*o1x~Hrh2;`?athds&`#^)r+akUj-GUPs?JX4C$b+OWb?sPua7w{ z*8Y%oy5FoG&@DtkFO@9KoMncyynwzIgKtl_to9bR(!S{@)UJ|gc_+E%3G|GXNa zux`VhpgbIgJd80h>o)E_X8l#72Q!P%Jh6#KD9xx!?L3u~7MOaPKG+x-jd#N18CM0}3sU2)^H9QjUZA@!UL zHTuSu`E`57;}zUOqdt)l)Dnl1^v}O6EoC6L)bp)%g`F~zH(#uv3LQThiLpIi4xbpe z+Kw+fN25n$L=5ipPOOY3kVS`0Xp&f@!NeP+=q}n_@yqg6+WH(^Qg=Gn zkk-Pc*&*6REQS_tX_Iw~CK93Y)mZUR(lr61YSG2t>AyF%+ebXcq#LBtf0+0CSZc+q@3w)Hk!ucrecSaT8BQrS_6KZDVh6SP*Yu6&^5( zE?b%PNlQJGjl}pACOE)nE=Ay*iIhLNE_9Ml<{|kc&D10fg#HKeRP>5%p`pyr_Vd~u zb5yuQXDi2g!P5Row3V)9+Dj^9clihPqob|BFN*RplXV{)6nP$;6hy%pE5vnE71fHI z!am+SrTH5q_7=|a2M~mTC-B|I~&sW z5!|Y_Ii_Ab#G&mJ_u20ExF!!+@~?US`8Tk7@-Do2={4u!wcKY$$dd188Kx$!X3LO4 z?ks{F!*A@9zj&Vs1T?HWt*fW-zle~0QA%q>1t&jnIzwmrfd_-h!3dHZ=&^;ux5-Gn z()x=|vox~Y3#)Y~gff^VzR$gJ?7;xCD3OF~sn?b)gk2L=Uzr~yIU>xYOz2+d+IvqT zQc@nlI_HrGK~^RC+35z`@jSCw$2Im3`l^thSS)znR)pI;tVSzbj)A z-TEs_0&J_3o-bk50D6~t(GIf^ud(}YbQ>Dty2=Xo1Tel6Xd5A8qO(Wj5o@CKyUv$CVp{4#e-A`<&RzrP*_tTWI$W z*RN+@V#*yCmfg2t8$=8a>;WGMtGzX(+uUt3ojSLk?coxpTH?hUw~myc#P8GMUP)H_ z6p?ON&JwgbYw>@L&=K$;<vkV?tAXIbFW! zZv$fL513|g3O9&hL%#Lkyk2p3o#}7+R-!y zC8!DzexZcYOo+^e|M4?Ed!9@bs2t(*qrn(Nr8;ych<9#wxd%*-3-v}bfI~I)<;LQz zNu%Z0){`ug)}xsCLMmKR0zg-hQT`M0Y6~v*?)^}^Xu2T^S`b>*vN1!K?L9CQG=h{f zoBDRLA|zfv!*qJA85yOf_u=cMwwSe3ie9I!n-3{k{w_lj10>)-hrRS!a_204B_D+L zGoOKEJFrlQ7cgS=S93gX8-k`pTFeqKn9b&zDDm@aJOugU@2dTvt+XbMqQE*b9sM(u zN;~Q~V>Mzj*~AKGt9E?YCr+1#Xbp#+XoSN9E=L!CX$HwK6s~q8pPtyNuhQY zjaFnCi}wVg7m8?y7&-lEtLxk4I^#B@#N4!Tc^aeK(+E01eD3_H(RkdR&BF&{wBkoY zn;#^I*TK-9DSVd$aYlZ-%_w+1h!_`&Ab~|z&t4>pofZY$#4TigOm6Z(suSZsHwd4u2N4PjO~JSs(SR-l@ex&b?6KP4Bj1O2pFnyNnnMdxKlNerprwgDm~o z3Y)9qa-HUGr~WG93>G?B=Vb*$J;(T}=fuiXghNNOaUG>>&pw2Byq|niHTK6L-s@*ofqGDwlo@ zC09P{5ZH`N7CEL{sMeosIxd@bKx|-IWN^y9<{HX7%KWeb@4ot-k&AA8_zN>LUL3I) zu=^m+=)x0eaZ30(d+6c#&DS{L{e8Q(Y_Vt#ljYmfX))`oRY< z0`bQ3_Tl$Bxu%wwC^tPo30Q<8X_}aIF|p56&R#`{4QdKsgMuxEkz1=)k4{7Vq*?mpe3&a-)KSJkp~9$LGve%&HVm z7|DmH4gu!_gmKKn(}=l0aV+V&8`xJ_k!%e2Unh97GE zcM9XpfTj1vE^wYIbxt+zGu=J9rx71S=zJ>E>#6qlu zCDERs59OD;MjM=Km(4MO!NN5mZs)-;^K&BT1+eIfPcVJRC)5~_bV=X=8?-WfFXzoP zjP?a6LtLs07|ev^0uqUP{mU5sOg9`YJgMYwvUSO-0bw(Z0FSrPV?*OZt~7LHa9UyR z{L)H&W_RmsE;%2)8c-oQW%nS)lTaP+jm1z9t_tkK41@;OQqj`~+ss9u3;FJ)`A~YB zcG~p&j{r*+6Nh(&ce9Pvf|fa^4A?IHX2eXIw3Mwd`JVm6m;w9LfFnW1F0FMi;9Dn7 zE9pU!rH=`yy%+k2QR7)l={FW2^b0G5SW_&9Q09wYty}Cqx7f;-@dv1$o#V$+&TNm* zt*|$WM}$bK^lt-dA}Dtyv#P8*s{Rl|{3Qgw`3V2EP%;&k#{mouck#FRmMiUml};f) zZDKFd86}&v^A6w(7XoBl$&FIR;NFn&cYOxrGDLUaKF@2~!|H}96QiisB$Sm$17EF4 zP@AK!NpRIXq#o2HyxGraeget;p??_E;@AW3Z)kX$_V-E<<9HZin_AqyM0ua`oM-{h(Q9?aUoCcVx`g>!|M3&zy+v~Nnv zOk{Ex6J#C?&xHzFV03Z~FEM!tRacV#6p#bAo^&k(H`Q2|FyjLd232FIdXPgY5kyM) z;G`MH>BXwJ=-M4rk%&_@IvRlb?TZb6HqKiP3F<-x@ixPPt~?ol55 zAYF*!JDXdNexvluI1I8Y&>9nd3LD7s`|I|C4&1%x&EhJZf00Hw;JHkoTJXJ#VvgRT z3vI@S?m=h++X+`(Z?RyI-zOL;|2_A{3z1mgp-H-1G2zt^T>sOhC{V#w&hecKX)KzT zA!}d$;Kt3RI0%d9NChwi7)0-GsE7xiIQX>2eEI+}6LDY}WS9&1sx^n;6(i|qrc${) zXTAaqf9stdjnS(S;_A&xdo)od&N>{;W03oRIR&&8E=JOAnDdQsemsC zz*_PjrCQNS`gulgc^vakKDqlfnAlJ8cXR<0jm&eZf`r;4D9`}Fh)LD;c-dZ; ziTjcLZ>oLUqafL4@ZxZ|GE!3qV-Dn?{z!1!q#~CJh@8lld@N}kMhIJ)pK1U2#R5hD z6+oMUFA8N|vkU$HTLBt|shR24_AGPGH_k6(@T zGW?&9zpZM7u(6i{UV9xgbG1OT=i^Hzn*UnD6F-*F=$WmgqwSvZ@Vo5$jkMYzP)F(V z*6y&sRRlEaERqETQW1Dk7)0+^Cz>ab6<1?O)V2i&g7~qVAkGpLSM_~Q*GtXlTS7kc z833{c9!66v78IjIA*#$(U+EwbMOZAP!I+^8X}a!|BF_^u}7LeIeCC;WBjI=`xV``wDom|8Gq^p>!@L z&;I3vibVeY%}AcUe#DPA23eK+NEGnjOlTgn@tsY-_*-oxoHtYAJ`m0uQ*IV4j^0*s zm})KNZ&kSo<$uUuM_NG6U$_bDIVJwpq1n;v&RHnd|7k9J;pHxA8}Nc4WuY7hRAgcY z@!YA|N!}wvf)mL!(-&2we0^J`{!e~7`w|v_jhfO4H;jG&C{>}^ zYq&Fldu>ec;|H~3P$gOjBT$eOFWl#xGXc>Lj)OpE(<~ma|ATR+kZwO69CrcYG2DFi z=2HZ(N4vdS2WtVmRi@kR*ySaqR*+_aYw;K$CQgw+%1G;5~^E^F7Bv z+H!DDGLU@wHNN#HY0MY52hZRq|@qaNYi@LoPTj*}&~*B^$YMm^3YVtd-yc@omHMyw^%xRLbpb;2xKj7ogIZ% zZog%Fj?@Ov&KvK1o}wvVGvBIqaqmtba{xnMTd8DrBzquRx-@}Z9q^ck)Fc?If}kD! z+mes+-7Lg09gg!uKM=M)%!BP#%VBQ=A{h*GBr{XNjZa*@S!;xIjY=gA}7&tz_=>MgG)t|Bp; z8$Ch}rVR=hI~jkKpDoF|HI9$Q*W||NBC;jZP z+f+>$N;CZ!XASUOuAf5#>UrSieXYq!e+JzcAbk>3__j;M`I-eg&`<7=!_le0*(QZ4 zulwwZ(>CF7G&~rC`x-OHc3SCdF*Wq&kX};z3E`cIttla`g%4045I7zj$4#W&l$A;4 z!m^#`;H^4lG_fvuF@GW5rbOhw5bc6)!WvY0v(U=yT{s}!8h7Zzjb0Z1d5CGjVvFH* z=D`wS=d7qsr9OX)^2VNEOA%9iReZbhto9<%w|v)2n-6cVA&98$!zOQH*tSwjkVN&G zDC0ivM#_3{WwdX~V$C4AchYo%D!+%x;>gzau_L2IH4%17+!Ue^z=&}!=6&OZvEkEQ z8$KslKJ3IcJOTDwIV*1clpY^!0+S8$cQ!>i8|`wr1V8vP3-KNmn;RM!tPD${hrpwM zMY+NX=(?xfE+7Buj0Ad_L|bL`l?vCbo(hgy9HUV@doAmiQiUQpz9E~$`WgRqrjxD{ z(?+8S&nSj+jk4(2VhRyT%|$tIPA7K5V7mg0J;N(tN7vAHZLUM7drN zb}|Ooips@!ie~3?9mOwHX9!wdj8>r}QYZd&559NVaawA=ecV>9EsHuw8{=&fQW{bJxBiLhN*y&n3GY5X_yJ-A)FzG@&+c{)jE{(TihqHXj8#okZ)4pwZpi)b_ z44w7(IH}u5nEgb2YXi!*-wL~eEv@1G@l0fLwEcb5>9k_VpCE{G=mKfo7Ou!wV~kPY z&~$ixVk;N(*hSC3_(7ntW&n%Hn&@isLBb22HI@K#QO57o3ZB~metDHd12pdDpC!i9 zN>qeN5RI^u#UAXBOS?RYcjUg?ayJ&oueN#@}Z%3Mk67d(l zvDh^u{PejS!iIxAe&bm*WfF0?=Tq((HbsEx7!1pM4So1`S}nn_*un>GjwqBI+43O#hnkqO&V?Lc_3xJK6#Es5gpH=` z=rgje-$_)^)hg!G84}AnVqCed0|UYX#_r6z?(*rY{U`Yp!0`*Cn!UD6&u-%R8jnTM zXx;7C1+L0~>JBo%I(S)?L~!_?^=3nh&V*vgj(Po?e*tQ?Vv)dijO{<{9)`Cu1UiyQ znZ2UC@qB!NrJL~t!p#nO#;7pCvLU%3PN`eK(dMszZVc%u;Tg1xGbW00cBwg8I4#V| z-w+;R6HHJo*x|Mk}L`mF- zRcNBjlDg6Ix@uot(CW%Y)yRKdir!ZP)HSvwuKqSKp=80i99p9jcR4Lb;;OvYH|qK_ zZ4kXrGvq%yZBd0Co{`&NliSDsr%4@5XWTCf3?m~(^~?lx4j(jme<<^1$-miY%oAa$ zmg}_rxa+Le^;qQ-)#CQy$Jk<*w?Yq3{Rro4?`ZSU^oayu*f`YVO&z*SBAUWA7h3gs zMu^Uud~47=zEV#PpbNm3K4r-Rq~ezgx*8**IVbkA@>cJ&;?N=b3yO>A7O_N6zF(E^ z_!=uBu3FT1O>736zjcJvftA^v+=p`3((^kbWW&WMz;Z8S?7MX9{kQN3##?#rUj(VZ z)gX%ZA$)$uD~2m#U2iplBVBzKcu4rwd2y!NQF3O`)KQv-zIeO+|vEmQvYK8}$Zr5%|W zKvwSTN^m{=jBRCMme?F;>$HO$#T#^7o<3CQz zihcQhhq+q`F{t_4O<1Jxljp3ar(4xB+XKq-K@VRx{Mym#*BRpmPQ-iv_ zY>+&_Kq4RYac(!&XXabNzHG^7GJ<@<@mYg76D6kf8SfzUQ&C0&TI#MF?OPcap|bbM zQlF`J4*gOE!IM*|MiY~O7JV%o-oSgW4QzX2Fnhk~kx!Sy&NZD`|vV{zf4!GC)?~?^Dpl$8Bw(C{q5lI>Yd)C0g=B{ z0X-cNcT^O2FtEt=S!?A4T|>)9f@J>|0N`^=tTx;&O5@kKs`)_^CF0l@N&GcOO#fQa zDuzks`UJAGZ~QX7zpy=vl^_OFHXl{r)KIILVO5p$ntAHuhrE^h@nfBm`9aS4DAIWN z)0O&vv*s<}xHKA*E^w*-QDVBpgc8pYb^9-gLBZKnzSH-*&Xz4B#Dy*tW3RT@#J1#4 z9uEs>|C==K{I-+76+opG5o+>TDZZT{alZnG0c2b6ziouE`j6<_n$_x32e zzc)5IMESPTt`Nvw;jZiujjesDd1oNC87d+5oV&~%7Yw0mW*W#2WASyC8~HVqm6(M~ zR4>4#bq3*J<8V{_`^xQ*yO^I%u_k@7O#Mity>%le$afQ)%|1lzS+$daW{+e4hcz%h zs7N-4Se={>NC`J9D;=DC?s~0m9o9?czx~Yru`hW|10_0q&v=i7cL;x3Sy|b{EA(j_ z`rVA)4OG%jTBA}nGPuCOwoGlf*FKSx=^qABRI*Qt9SfTf)Hi#^20evL*)P;?>(N*k z=Cx4tmpgc8GaOH5=($E4_@xu># z9*srqf9QI*@&VV;yUelZ<&R?r558ae}? zf2epE*{4#tGD3fc6pxQ+O@kdE_;O@v{mj$OSObb0X`shu=8^{Q1OkSpY<{tP#)qV% zokCACdaq8AWBBRHh4lH(K>%^G&rxei9}LgQ#_CrPrzvyyR!e@v|{yzm8 zF3AZ)sA&U5;CN)|_iNgbllVPbPT<^!Je=pi7gk3DG2(e{Y{NU;8OUtq;VB2Pe7JzY znB`mIvfEPqFewTxrh5bX9&UKh{H|wULTEQDmKCkuF#{XFw)9Sx{Vy&Q9`@sor{x3lsBCth z9e6xZp5_mlKj#CkHWbr)6{q3nceH~1<4To*+XMxr?<<=3^J;E!uQVczZ~jQBf`=&E z=ov5zDr7$)|2qlP>77(kxDvKhmPB&iqlhopFyMdkdj;%6;-Tu^%l_=(src)LZy%B; zb)+-zEP#qCM7d@UqkP0}pq;~Q!9pRjs2Zfv0R9(HfC9=d5Q$*_2!{W+7bS%O81)-k z>u*a-H?H?XF0V|{QH4nLNK)>CVRDC0_DmW*1vRG@7U{Sd^9u8QSxt}75j=9<7_>ME zA9fEFh3qr)#ArvD;vKaU*~D5JQ24ug2250?RSgs#J`pO-zB^jvmHXw)5T3)^OE<>L-(KiL#o3KN(Q~#c zZ7>!m9+a6~td&5pWwHlTAA$Cuh{w-Sl)u!8J-XsH5OoOU7t7zc(iFsMWI@;~e6R%_ z%UpYX!%X=tJ`q7vvm&#FIOf_7uykGiwA+L~%)u;m0mVyRDYoNwTZmSR9=w04+AO@2 z&FvF=bIT!}Nm+k^adi-zd0HVrE&r zQ=v{{I8M1V`$S9BLz?&yEFrqoc+o6C|4aC+KjP9iHJghFU`>;spSY~3_SyXXI zt&5{?!$-sSrOvQN66r_VkRvc6)M&}b-!W|yDp73Ank9SCk(KDPL@Ime!+agR)5a_+ zQnLJ$3Fkl0{oH8pfPb^s=oIFb+92_XA$iHs2=1ar!3x%f#y7-F2nKk^kwiVOuzVJD@sz#LkUST&1*6i}Sd?NFm+UK%RD{vq4gveuw z64N`5C=qldN)9URNu|8?82O&$O?A~3bSv~;o4pUh7(t$(ax3M!ykAU){7k%6J$=9` zkP<$WVwkC)TP1&WjzPftM@Qg>wNw;Yq8hXJ(}_}j9oZcS^nPeR_peG66bzo1(h^#i zcjJVAc~J0f?i3XjaRj}4Si<)=flUKu4TRtLME2nGV5#H{aL;16{K&}22-u+?XZ|~% z)bOZ|NFQ9tN#3-tbkAG*U(AuG$^!OtP-|OjmH`sl+%B@*{flDdv@#wVu@t*$+k%7= zaIFNW4Qrq+cNd#fiI2ab;hEAb~awWPxVF_vlVwdA$XUCQIBIz?ifRz|zK+|3k{nfa! zm=+mn@wX4gkZ=C!ko$U+5nZ~SN8^-PJW<1Bln2S}{s0EgHlH6e~Y#r|9(>Ed_IA75GAt+4+t{-Fw~r6msI- zb(Q}3)sRpW5|sh|Fl#ySL!G?t3T$5n)U!gq3voE@3;cTpNhQSi(*0ofu%`hCQL|B@qLAS3Ai|KvHsv^OVbV#f#i&0o6D>sW8}UD*GOAGCh$e%)Vr%W-;3 z_TR3s1!2&KrBYK7&9a>`Qn^%!71d7${ETP(Uqh1Rb?+IW-psA3 z{%P*2@%iQhOux5YEp#w*S3!~ z@&4)u8@Uh0buA}Oh9wV6zg-?zcO)=rBn`6H&o(cetkrz}dec!(5;~a5<(9sJ7(kc0 z=WwmJ;J&8pfg^j7^mJtgig(+H_-ix%J8pI(;b4hIczLX$yj#p=(z($fGv@HUDjxyFFpVBi^o1k=8 zUik;hxJb6V?wBt`ltp9_iQfT#wjhRlSi$%CW|R*UyO}xQRehbcSb8C#4?0ZKUusAL znmLo{`sA@2<|~QvoB69ICjyv(+RI?&wXKSVw1TwP|Cw+Y@$80;mdiht*pfZizcA-k z?M+&K7NYBZ6-B|UEX&= zm6yJ6?Oa@rXTPk#w8W6&W6F>pj3j`?Q)2Bl_5e>K$y`}aTd6nl)qDBs71)@h?SV%>DjxiwS?i50{ubQ(z6g=%eP25fK0$! zTx|^G@BdD*|J=xeoY%7vB8VZOTreq=EuH_9fPSxEGscjN592#)b?ldZR z@Uyg7S-=xsJ4iXQVbFb~Vd=yPuGi9d{J(_EO<;!InyYpbj#+iRJzVh@aa)+r2EG!C zp{HGE=uI3ow>?ehO%vp)UkW)aSw;Sr@b%)wsoX7cfkn<$u{G7=fC*sYe!>!mP)eC15b?`BZzk%$Q)8w#QrOxw@= zwpZ#MgT=sc$bW0D)}&wh;vrO=Wk|^%@XaIJuKVM1<-7-}83O#r>HY2O7H4Ch>)y7! z8}LCLKCDMYens2aJ4tQZvn5c!bzZx4WCRs&@Wm8+ihT73xXD{!rES9;e>GlW>Ex;= zB}=ofjp^XwBvO>(I{K!x=OF~Dr@)~k{F%ddFRb$R^tMwwgX-`w`vzj-Jh*%t>cVjX z4!>=^*T+8(HhYNC`I58$_N45?NF^s52ZyVks8JFq&?~a_99_E#h&Bt>8*RIpQ1vq~ z0tJ+$n0Xy!vfDjwiqt;Z^=ttL)%mm5r62u)=^1C<>nVQ+5*8N_Ift*8DeeZK7eKvo z;uw$2z&`@6JKpJmnCy?2^P9=Zh(k0>vv{U#5=v@h>rf)aOBvF~)Q+P$j?p$LW?4QP z#MF0p-joE`*?jk#gF+8$Z_^tafv&Ujx$5?o)7hJ1$yCgb?V)35MG+T7;C{vRuUS@| Ru|ekbQbt9(O42mw{{YqNUv2;Z literal 0 HcmV?d00001 diff --git a/classification_design.dox b/classification_design.dox new file mode 100644 index 0000000..d37fbb4 --- /dev/null +++ b/classification_design.dox @@ -0,0 +1,869 @@ +/* Copyright (c) 2014, Linaro Limited + * All rights reserved + * + * SPDX-License-Identifier: BSD-3-Clause + */ + +/*! +@page classification_design ODP Design - Classification API +For the implementation of the ODP classification API please see @ref odp_classify.h + +@tableofcontents + +@section introduction Introduction +This document defines the Classification APIs supported by ODP v1.0. +Classification is logically composed of two stages: Parsing and Rule Matching. +Parsing takes a raw packet and validates its structure and identifies fields of interest in the various headers that comprise the layers of the packet. +Rule Matching, in turn, takes the result of parsing and sorts packets into Classes of Service (CoS) based on application-defined rule sets. +@subsection use_of_terms Use of Terms +The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC 2119](https://tools.ietf.org/html/rfc21199). +@subsection purpose Purpose +ODP is a framework for software-based packet forwarding/filtering applications, and the purpose of the Packet Classifier API is to enable applications to program the platform hardware or software implementation to assist in prioritization, classification and scheduling of each packet, so that the software application can run faster, scale better and adhere to QoS requirements. +The following API abstraction are not modelled after any existing product implementation, but is instead defined in terms of what a typical data-plane application may require from such a platform, without sacrificing simplicity and avoiding ambiguity. Certain terms that are being used within the context of existing products in relation to packet parsing and classification, such as “access lists” are avoided such that not to suggest any relationship between the abstraction used within this API and any particular manner in which they may be implemented in hardware. +These are the key ODP objects that the parser needs to employ, that are presently defined in ODP: +@subsubsection odp_pktio odp_pktio +odp_pktio specifies an individual packet I/O channel instance. In other words, it would translate to a physical interface or a logical port, or in the case of channelized protocols (e.g., [Interlaken](https://www.google.com/url?q=https%3A%2F%2Fwww.cortina-systems.com%2Fimages%2Fdocuments%2F400023_Interlaken_Technology_White_Paper.pdf&sa=D&sntz=1&usg=AFQjCNEBdJTBmA1XaNGY3pmumQTfgSi1oA)) it would map to a logical channel on that interface. +Since the classifier API deals exclusively with ingress, this object represents the source of packets into the classifier. In order to support any non-trivial use case, the classifier API needs to be able to assign multiple odp_queue instances for any single odp_pktio object, and may also assign any odp_queue instance to more than one odp_pktio object. +@subsubsection odp_queue odp_queue +odp_queue specifies a logical queue for packets, and in the case of ingress, this would represent a stream of packets which share several attributes, that are delivered to the ODP application for processing. The per-queue attributes currently defined are: queue type, sync (ordering); priority; and schedule group (set of processor cores). +@subsubsection odp_buffer_pool odp_buffer_pool +odp_buffer_pool specifies a collection of buffers of same size and alignment, as well as a set of policies such as flow control and processor affinity. The classifier API refers to such pools that are designated for storing ingress packets. +@section functional_description Functional Description +Following is the functionality that is required of the classifier API, and its underlying implementation. The details and order of the following paragraph is informative, and is only intended to help convey the functional scope of a classifier and provide context for the API. In reality, implementations may execute many of these steps concurrently, or in different order while maintaining the evident dependencies: + +-# Apply a set of \e classification \e rules to the header of an incoming packet, identify the header fields, e.g., \e ethertype, IP version, IP protocol, transport layer port numbers, IP DiffServ, VLAN id, 802.1p priority. + +-# Store these fields as packet meta data for application use, and for the remainder of parser operations. The \e odp_pktio is also stored as one of the meta data fields for subsequent use. + +-# Compute an \e odp_cos (Class of Service) value from a subset of supported fields from 1) above. + + +-# Based on the \e odp_cos from 3) above, select the \e odp_queue through which the packet is delivered to the application. + +-# Validate the packet data integrity (checksums, FCS) and correctness (e.g., length fields) and store the validation result, along with optional error layer and type indicator, in packet meta data. Optionally, if a packet fails validation, override the \e odp_cos selection in step 3 to a class of service designated for errored packets. + +-# Since the selected \e odp_queue may require preservation of packet order, i.e., SYNC_ATOMIC or SYNC_ORDERED, optionally select the packet header fields from which the parser calculates a \e odp_flow_signature, which may be a unique flow identifier or a hash, such that the packets which are assigned the same \e odp_flow_signature are scheduled in the same order they are received. + +-# Based on the \e odp_cos from 3) above, select the \e odp_buffer_pool that should be used to acquire a buffer to store the packet data and meta data. + +-# Allocate a buffer from \e odp_buffer_pool selected in 6) above and logically store the packet data and meta data to the allocated buffer, or in accordance with class-of-service drop policy and subject to pool buffer availability, optionally discard the packet. + +-# Enqueue the buffer into the \e odp_queue selected in 4) above. + +The above is an abstract description of the classifier functionality, and may be applied to a variety of applications in many different ways. +The ultimate meaning of how this functionality applies to an application also depends on other ODP modules, so the above may not complete a full depiction. +For instance, the exact meaning of \e priority, which is a per-queue attribute is influenced by the ODP scheduler semantics, and the system behavior under stress depends on the ODP buffer pool module behavior. + +For the sole purpose of illustrating the above abstract functionality, here is an example of a Layer-2 (IEEE 802.1D) bridge application: +Such a forwarding application that also adheres to IEEE 802.1p/q priority, which has 8 traffic priority levels, might create 8 \e odp_buffer_pool instances, one for each PCP priority level, and 8 \e odp_queue instances one per priority level. +Incoming packets will be inspected for a VLAN header; the PCP field will be extracted, and used to select both the pool and the queue. +Because each queue will be assigned a priority value, the packets with highest PCP values will be scheduled before any packet with a lower PCP value. +Also, in a case of congestion, buffer pools for lower priority packets will be depleted earlier than the pools containing packets of the high priority, and hence the lower priority packets will be dropped (assuming that is the only flow control method that is supported in the platform) while higher priority packets will continue to be received into buffers and processed. +@subsection flow_diagram Classification Processing Flow Diagram +@image html classification_flow.png "Figure 1: Classification Flow Diagram" +@image latex classification_flow.eps "Figure 1: Classification Flow Diagram" + +@section api_elements API Elements +While the above description refers to the abstracted packet classifier, the following is the description of the API designed to program the packet classifier, and is intended to add clarity to the functions provided further below. +@subsection cos_creation Class of Service Creation and Binding +To program the classifier, a class-of-service instance must be created, which will contain the packet filtering resources that it may require. +All subsequent calls refer to one or more of these resources. +Each class of service instance must be associated with a single queue or queue group, which will be the destination of all packets matching that particular filter. +The queue assignment is implemented as a separate function call such that the queue may be modified at any time, without tearing down the filters that define the class of service. In other words, it is possible to change the destination queue for a class of service defined by its filters quickly and dynamically. +Optionally, on platforms that support multiple packet buffer pools, each class of service may be assigned a different pool such that when buffers are exhausted for one class of service, other classes are not negatively impacted and continue to be processed. + +@subsection default_packet_handling Default packet handling +There SHOULD be one \b odp_cos assigned to each port with the \c odp_cos_pktio_set() function, which will function as the default class-of-service for all packets received from an ingress port, that do not match any of the filters defined subsequently. At minimum this default class-of-service MUST have a queue and a buffer pool assigned to it on platforms that support multiple packet buffer pools. Multiple odp_pktio instances (i.e., multiple ports) MAY each have their own default odp_cos, or MAY share a odp_cos with other ports, based on application requirements. + +@subsection packet_classification Packet Classification +For each odp_pktio port, the API allows the assignment of a class-of-service to a packet using one of three methods: + +-# The packet may be assigned a specific class-of-service based on its Layer-2 (802.1P/902.1Q VLAN tag) priority field. Since the standard field defines 8 discrete priority levels, the API allows to assign an odp_cos to each of these priority levels with the \c odp_cos_with_l2_priority() function. + +-# Similarly, a class-of-service may be assigned using the Layer-3 (IP DiffServ) header field. The application supplies an array of \e odp_cos values that covers the entire range of the standard protocol header field, where array elements do not need to contain unique values. There is also a need to specify if Layer-3 priority takes precedence over Layer-2 priority in a packet with both headers present. + +-# Additionally, the application may also program a number of \e pattern \e matching \e rules that assign a class-of-service for packets with header fields matching specified values. The field-matching rules take precedence over the previously described priority-based assignment of a class-of-service. Using these matching rules the application should be able for example to identify all packets containing VoIP traffic based on the protocol being UDP, and a specific destination or source port numbers, and appropriately assign these packets an class-of-service that maps to a higher priority queue, assuring voice packets a lower and bound latency. + +@subsection scaling_and_flow Scaling and Flow Discrimination +In addition to classifying packets and routing them to those queues with the appropriate priority, and optionally limiting their memory consumption by designating certain classes of packets to specific buffer pools, the classifier API also facilitates the scaling of data-plane application on multi-core systems by creating a mechanism to define which packet headers need to be combined to result in a value representing a specific packet flow. The classifier generates a signature, which can be a checksum or hash of arbitrary strength that covers those packet header fields that are identified by the application as identifying flows. + +The \e flow \e signatures that result from hashing are then stored with the packet meta data (along with its class-of-service and its ingress \e odp_pktio port), and subsequently may be utilized by the implementation of a scheduler queue to maintain the order of packets with the same flow signature, while allowing packets with different signatures to be processed concurrently and independently on different processing cores. + +@subsection packet_meta_data Packet meta data Elements +Here are the specific information elements that SHOULD be stored within the packet meta data structure: +- Protocol fields that are decoded and extracted by the parsing phase +- Flow-signature calculated from a prescribed collection of protocol fields +- The class-of-service identifier that is selected for the packet +- The ingress port identifier +- The result of packet validation, including an indication of the type of error detected, if any + +The ODP packet API module SHALL provide accessors for retrieving the above meta data fields from the container buffer in an implementation-independent manner. + +@section api_definitions API Definitions +@subsection data_types Data Types +The following data types are referenced in the API descriptions described below. +The names are part of the ODP API and MUST be present in any conforming implementation, however the type values shown here are illustrative and implementations SHOULD either use these or substitute their own type values that are appropriate to the underlying platform. + +~~~~~{.c} +/** + * 'odp_pktio_t' value to indicate any port + */ +#define ODP_PKTIO_ANY ((odp_pktio_t)~0) + + +/** + * 'odp_pktio_t' value to indicate an error + */ +#define ODP_PKTIO_INVALID ((odp_pktio_t)0) + + +/** + * Class of service instance type + */ +typedef uint32_t odp_cos_t; + + +/** + * flow signature type, only used for packet meta data field. + */ +typedef uint32_t odp_flowsig_t; + + +/** + * This value is returned from odp_cos_create() on failure, + * May also be used as a “sink” class of service that + * results in packets being discarded. + */ +#define ODP_COS_INVALID ((odp_cos_t)~0) +~~~~~ + +@subsection cos_routines Class of Service Routines +Conforming ODP implementations MUST provide the following Classification APIs: +@subsubsection cos_create odp_cos_create + +/** + * Create a class-of-service + * + * @param name is a string intended for debugging purposes. + * + * @return Class of service instance identifier, + * or ODP_COS_INVALID on error. + * +@code +odp_cos_t odp_cos_create(const char *name); +@endcode + +This routine is used to create a class of service that can be the target of classifier rules. +The number of such classes supported is implementation-defined. +Attempts to create more than are supported by the implementation will result in an \c ODP_COS_INVALID return and errno being set to \c ODP_IMPLEMENTATION_LIMIT. + +@subsubsection cos_destroy odp_cos_destroy + +/** + * Discard a class-of-service along with all its associated resources + * + * @param cos_id class-of-service instance. + * + * @return 0 on success, -1 on error. + * +@code +int odp_cos_destroy(odp_cos_t cos_id); +@endcode + +This routine is the bracketing routine for odp_cos_create(). +It is used to destroy an existing CoS. +It is the caller’s responsibility to ensure that no active pattern matching rules refer to the CoS prior to calling this routine. +Results are unpredictable if this restriction is not met. +@subsubsection cos_set_queue odp_cos_set_queue +/** + * Assign a queue for a class-of-service + * + * @param cos_id class-of-service instance. + * + * @param queue_id is the identifier of a queue where all packets + * of this specific class of service will be enqueued. + * + * @return 0 on success, negative error code on failure. + * +@code +int odp_cos_set_queue(odp_cos_t cos_id, odp_queue_t queue_id); +@endcode + +This routine associates a target queue with a CoS such that all packets assigned to this CoS will be enqueued to the specified queue_id at the end of classification processing. +@subsubsection cos_set_queue_group odp_cos_set_queue_group +/** + * Assign a homogenous queue-group to a class-of-service. + * + * @param cos_id identifier of class-of-service instance + * @param queue_group_id identifier of the queue group to receive packets + * associated with this class of service. + * + * @return 0 on success, negative error code on failure. + * +@code +int odp_cos_set_queue_group(odp_cos_t cos_id, odp_queue_group_t queue_group_id); +@endcode + +This routine associates a target queue group with a CoS such that all packets assigned to this CoS will be distributed to the specified queue_group_id at the end of classification processing. +@subsubsection cos_set_pool odp_cos_set_pool +/** + * Assign packet buffer pool for specific class-of-service + * + * @param cos_id class-of-service instance. + * @param pool_id is a buffer pool identifier where all packet buffers + * will be sourced to store packet that belong to this + * class of service. + * + * @return 0 on success negative error code on failure. + * + * + * +@code +int odp_cos_set_pool(odp_cos_t cos_id, odp_buffer_pool_t pool_id); +@endcode + +This OPTIONAL routine associates a target buffer pool with a CoS such that all packets assigned to this CoS will be stored in packet buffers allocated from the designated pool_id. + + +@subsection cos_drop_policy Class of Service Drop Policy Routines +These routines control how drop policies are to be observed for a given class of service. +@subsubsection drop_data_types Data types +~~~~~{.c} +enum odp_cos_drop_e { + ODP_COS_DROP_POOL, /**< Follow buffer pool drop policy */ + ODP_COS_DROP_NEVER, /**< Never drop, ignoring buffer pool policy */ +}; +typedef enum odp_drop_e odp_drop_t; +~~~~~ + +@subsubsection cos_set_drop odp_cos_set_drop +/** + * Assign packet drop policy for specific class-of-service + * + * @param cos_id class-of-service instance. + * @param drop_policy is the desired packet drop policy for this class. + * + * @return 0 on success negative error code on failure. + * + * . + * +@code +int odp_cos_set_drop(odp_cos_t cos_id, odp_drop_t drop_policy); +@endcode + +This routine sets the drop policy for a class of service. +It is an OPTIONAL routine. +If an implementation does not provide this function it MUST supply a definition of it that simply returns ODP_FUNCTION_NOT_AVAILABLE. +@subsubsection pktio_set_default_cos odp_pktio_set_default_cos +/** + * Setup per-port default class-of-service + * + * @param pktio_in ingress port identifier. + * @param default_cos class-of-service set to all packets arriving + * at the 'pktio_in' ingress port, unless overridden by subsequent + * header-based filters. + * + * @return 0 on success negative error code on failure. + * + * + * @note This may replace the default queue per pktio. + * +@code +int odp_pktio_set_default_cos(odp_pktio_t pktio_in, odp_cos_t default_cos); +@endcode + +This routine specifies a default class of service for a given pktio instance. +Incoming packets on the specified pktio are assigned to this class of service if no other pattern matching rule obtains. +@subsubsection pktio_set_error_cos odp_pktio_set_error_cos +/** + * Setup per-port error class-of-service + * + * @param pktio_in ingress port identifier. + * @param error_cos class-of-service set to all packets arriving + * at the 'pktio_in' ingress port that contain an error. + * + * @return 0 on success negative error code on failure. + * + * + * + * +@code +int odp_pktio_set_error_cos(odp_pktio_t pktio_in, odp_cos_t error_cos); +@endcode + +This OPTIONAL function assigns a class-of-service used to handle packets containing various types of errors. The specific errors types include L2 FCS and optionally L3/L4 checksum errors, malformed headers, etc., depending on platform capabilities. +The specified error_cos MAY simply discard these packets or deliver them via a queue to the application for further processing. +@subsubsection pktio_set_skip odp_pktio_set_skip +/** + * Setup per-port header offset + * + * @param pktio_in ingress port identifier. + * @param offset is the number of bytes the classifier must skip. + * + * @return Success or ODP_FUNCTION_NOT_AVAILABLE + * + * + * +@code +int odp_pktio_set_skip(odp_pktio_t pktio_in, size_t offset); +@endcode + +This OPTIONAL function applies to ports that carry an additional headers preceding the standard Ethernet header. Such headers are typically vendor-specific and thus the classifier is not required to parse such headers, but the size of a custom header is critical for the classifier to be able to parse standard protocol headers that normally follow. +@subsubsection cos_set_headroom odp_cos_set_headroom +/** + * Specify per-port buffer headroom + * + * @param pktio_in ingress port identifier. + * @param headroom number of bytes of space preceding packet data to reserve + * for use as headroom. Must not exceed the implementation + * defined ODP_PACKET_MAX_HEADROOM. + * + * @return Success or ODP_PARAMETER_ERROR, + * or ODP_FUNCTION_NOT_AVAILABLE + * + * + * +@code +int odp_cos_set_headroom(odp_cos_t cos_id, size_t req_room); +@endcode + +This OPTIONAL routine specifies the number of bytes of headroom that should be reserved for each packet assigned to this class of service. +Each implementation defines an ODP_PACKET_MAX_HEADROOM limit that sets an upper bound on the size of the headroom that can be reserved for a packet. +@subsubsection cos_with_l2_priority odp_cos_with_l2_priority +/** + * Request to override per-port class of service + * based on Layer-2 priority field if present. + * + * @param pktio_in ingress port identifier. + * @param num_qos is the number of QoS levels, typically 8. + * @param qos_table are the values of the Layer-2 QoS header field. + * @param cos_table is the class-of-service assigned to each of the + * allowed Layer-2 QOS levels. + * @return 0 on success negative error code on failure. + * + * + * +@code +int odp_cos_with_l2_priority(odp_pktio_t pktio_in, + size_t num_qos, + uint8_t qos_table[], /**< 'num_qos' elements */ + odp_cos_t cos_table[]); /**< 'num_qos' elements */ +@endcode + +This routine is used to assign classes of service based on the layer 2 (L2) priority associated with input packets received on the specified pktio_in. +For each of the values in qos_table[], the corresponding value in cos_table[] will be assigned. +@subsubsection cos_with_l3_dscp odp_cos_with_l3_dscp +/** + * + * @param pktio_in ingress port identifier. + * @param num_qos is the number of allowed Layer-3 QoS levels. + * @param qos_table are the values of the Layer-3 QoS header field. + * @param cos_table is the class-of-service assigned to each of the + * allowed Layer-3 QOS levels. + * @param l3_preference when true, Layer-3 QoS overrides L2 QoS when present. + * + * @return 0 on success negative error code on failure. + * + * + * +@code +int odp_cos_with_l3_qos(odp_pktio_t pktio_in, + size_t num_qos, + uint8_t qos_table[], /**< 'num_qos' elements */ + odp_cos_t cos_table[], /**< 'num_qos' elements */ + odp_bool_t l3_preference); +@endcode + +This OPTIONAL routine is used to assign classes of service based on the layer 3 (L3) Differentiated Services (DS) designation. +This is the DSCP field of an IPv4 header or the first six bits of the Traffic Class of an IPv6 header. +For each of the values in qos_table[], the corresponding value in cos_table[] will be assigned. +The l3_preference flag is use to control whether the CoS assigned by this routine takes precedence over the CoS assigned by odp_cos_with_l2_priority() in the event that both apply to the same packet. + +@subsection pmrs Pattern Matching Rules +While the above routines permit class of service assignments to be made based on static criteria, the real power of classification is the ability to identify flows based on the variable contents of packet headers. +To do this ODP provides support for defining pattern matching rules (PMRs) that operate based on values contained in specified header fields. + +Associated with PMRs are enums that are used to specify standard packet header fields: +@subsubsection cos_hdr_flow_fields odp_cos_hdr_flow_fields_e +/** + * Packet header field enumeration + * for fields that may be used to calculate + * the flow signature, if present in a packet. + * +@code +enum odp_cos_hdr_flow_fields_e { + ODP_COS_FHDR_IN_PKTIO, /**< Ingress port number */ + ODP_COS_FHDR_L2_SAP, /**< Ethernet Source MAC address */ + ODP_COS_FHDR_L2_DAP, /**< Ethernet Destination MAC address */ + ODP_COS_FHDR_L2_VID, /**< Ethernet VLAN ID */ + ODP_COS_FHDR_L3_FLOW /**< IPv6 flow_id */ + ODP_COS_FHDR_L3_SAP, /**< IP source address */ + ODP_COS_FHDR_L3_DAP, /**< IP destination address */ + ODP_COS_FHDR_L4_PROTO, /**< IP protocol (e.g. TCP/UDP/ICMP) */ + ODP_COS_FHDR_L4_SAP, /**< Transport source port */ + ODP_COS_FHDR_L4_DAP, /**< Transport destination port */ + ODP_COS_FHDR_IPSEC_SPI, /**< IPsec session identifier */ + ODP_COS_FHDR_LD_VNI, /**< NVGRE/VXLAN network identifier */ + ODP_COS_FHDR_USER /**< Application-specific header field(s) */ +}; +@endcode + +Conforming ODP implementations SHOULD implement efficient flow set management routines such as these: + +~~~~~{.c} +/** + * Set of header fields that take part in flow signature hash calculation: + * bit positions per 'odp_cos_hdr_flow_fields_e' enumeration. + * +typedef uint16_t odp_cos_flow_set_t; + + +/** + * Set a member of the flow signature fields data set + * +static inline odp_cos_flow_set_t +odp_cos_flow_set( odp_cos_flow_set_t set, + enum odp_cos_hdr_flow_fields_e field) +{ + return set | (1U << field); +} + + +/** + * Test a member of the flow signature fields data set + * +static inline bool +odp_cos_flow_is_set( odp_cos_flow_set_t set, + enum odp_cos_hdr_flow_fields_e field) +{ + return (set & (1U << field)) != 0; +} +~~~~~ + +These routines are intended to be used in support of the following flow signature APIs: + +@subsubsection cos_class_flow_sig odp_cos_class_flow_signature +/** + * Set up set of headers used to calculate a flow signature + * based on class-of-service. + * + * @param cos_id class of service instance identifier + * @param req_data_set requested data-set for flow signature calculation + * + * @return data-set that was successfully applied. All-zeros data set + * indicates a failure to assign any of the requested fields, or other + * error. + * + * +@code +odp_cos_flow_set_t +odp_cos_class_flow_signature(odp_cos_t cos_id, + odp_cos_flow_set_t req_data_set); +@endcode + +This OPTIONAL routine associates a fow set with a class of service for flow signature calculation. + +@subsubsection cos_port_flow_sig odp_cos_port_flow_signature +/** + * Set up set of headers used to calculate a flow signature + * based on ingress port. + * + * @param pktio_in ingress port identifier. + * @param req_data_set requested data-set for flow signature calculation + * + * @return data-set that was successfully applied. An all-zeros data-set + * indicates a failure to assign any of the requested fields, or other + * error. + * + * +@code +odp_cos_flow_set_t +odp_cos_port_flow_signature(odp_pktio_t pktio_in, + odp_cos_flow_set_t req_data_set); +@endcode + +@subsection pmr_routines Pattern Matching Rules Routines +The following data structures SHOULD be implemented to support the definition of pattern matching routines by conforming ODP implementations: + +~~~~~{.c} +/** + * PMR - Packet Matching Rule + * Up to 32 bit of ternary matching of one of the available header fields + * + + +#define ODP_PMR_INVAL ((odp_pmr_t)NULL) +typedef struct odp_pmr_s *odp_pmr_t; +~~~~~ + +@subsecion terms Terms +Terms are the elements of a PMR and are identified by the following enum: + +@code +enum odp_pmr_term_e { + ODP_PMR_ETHTYPE_0, /**< Initial (outer) Ethertype only (*val=uint16_t)*/ + ODP_PMR_ETHTYPE_X, /**< Ethertype of most inner VLAN tag (*val=uint16_t)*/ + ODP_PMR_VLAN_ID_0, /**< First VLAN ID (outer) (*val=uint16_t) */ + ODP_PMR_VLAN_ID_X, /**< Last VLAN ID (inner) (*val=uint16_t) */ + ODP_PMR_DMAC, /**< destination MAC address (*val=uint64_t) */ + ODP_PMR_IPPROTO, /**< IP Protocol or IPv6 Next Header (*val=uint8_t) */ + ODP_PMR_UDP_DPORT, /**< Destination UDP port, implies IPPROTO=17 */ + ODP_PMR_TCP_DPORT, /**< Destination TCP port implies IPPROTO=6 */ + ODP_PMR_UDP_SPORT, /**< Source UDP Port (*val=uint16_t) */ + ODP_PMR_TCP_SPORT, /**< Source TCP port (*val=uint16_t) */ + ODP_PMR_SIP_ADDR, /**< Source IP address (uint32_t) */ + ODP_PMR_DIP_ADDR, /**< Destination IP address (uint32_t) */ + ODP_PMR_SIP6_ADDR, /**< Source IP address (uint8_t[16]) */ + ODP_PMR_DIP6_ADDR, /**< Destination IP address (uint8_t[16]) */ + ODP_PMR_IPSEC_SPI, /**< IPsec session identifier(*val=uint32_t) */ + ODP_PMR_LD_VNI, /**< NVGRE/VXLAN network identifier (*val=uint32_t) */ + + + /** Inner header may repeat above values with this offset */ + ODP_PMR_INNER_HDR_OFF=32 +}; +@endcode + +@subsubsection tunnel_considerations Tunnel Considerations +Note that PMRs may be extended to support tunnels and tenants (NVGRE, VXLAN) via the ODP_PMR_INNER_HDR_OFF enum. +This enum is intended to be used as an “adder” to a PMR to indicate that the term refers to an inner header. +For example, the term ODP_PMR_DMAC would refer to the destination MAC address of the packet if the packet is not a tunnel, or of the outer header (the tunnel) if the packet is a tunnel. +To refer to the inner (tenant) destination MAC, the term would be specified as ODP_PMR_INNER_HDR_OFF+ODP_PMR_DMAC. + +@subsection pmr_apis PMR APIs +The following APIs are provided to enable an ODP application to specify PMRs as a series of individual or cascaded terms: +@subsubsection pmr_create_match odp_pmr_create_match +/** + * Create a packet match rule with mask and value + * + * @param term is one value of the enumerated values supported + * @param val is the value to match against the packet header + * in native byte order. + * @param mask is the mask to indicate which bits of the header + * should be matched ('1') and which should be ignored ('0') + * @param val_sz size of the ‘val’ and ‘mask’ arguments, + * that must match the value size requirement of the + * specific ‘term’. + * + * @return a handle of the matching rule or ODP_PMR_INVAL on error + * +@code +odp_pmr_t odp_pmr_create_match(enum odp_pmr_term_e term, + const void *val, const void *mask, size_t val_sz); +@endcode + +This routine creates a PMR that matches a single value to a term. + +@subsubsection pmr_create_range odp_pmr_create_range +/** + * Create a packet match rule with value range + * + * @param term is one value of the enumerated values supported + * @param val1 is the lower bound of the header field range. + * @param val2 is the upper bound of the header field range. + * @param val_sz size of the ‘val1’ and ‘val2’ arguments, + * that must match the value size requirement of the + * specific ‘term’. + * + * @return a handle of the matching rule or ODP_PMR_INVAL on error + * @note: Range is inclusive [val1..val2]. + * +@code +odp_pmr_t odp_pmr_create_range(enum odp_pmr_term_e term, + const void *val1, const void *val2, size_t val_sz); +@endcode + +This routine creates a PMR that matches an inclusive range of values to a term. + +@subsubsection pmr_destroy odp_pmr_destroy +/** + * Invalidate a packet match rule and vacate its resources + * + * @param pmr_id the identifier of the PMR to be destroyed + * + * @return Success or ODP_PMR_INVALID if the specified pmr_id not found. + * +@code +int odp_pmr_destroy(odp_omr_t pmr_id); +@endcode + +This routine destroys a previously created PMR. +If the PMR is currently associated with an active class of service it is unpredictable at which point the match defined by the PMR is deactivated in terms of packet flow. +However, implementations MUST ensure that a PMR is either matched or not matched in its entirety such that dynamic changes to PMRs do not result in partial matches. + +@subsubsection pktio_pmr_cos odp_pktio_pmr_cos +/** + * Apply a PMR to a pktio to assign a CoS. + * + * @param pmr_id the id of the PMR to be activated + * @param src_pktio the pktio to which this PMR is to be applied + * @param dst_cos the CoS to be assigned by this PMR + * + * @return Success or ODP_PARAMETER_ERROR + * +@code +int odp_pktio_pmr_cos(odp_pmr_t pmr_id, odp_pktio_t src_pktio, odp_cos_t dst_cos); +@endcode + +This routine links a pktio to a corresponding class of service via a specified PMR. +Any packet received on the specified src_pktio that matches the specified pmr_id will be assigned to the specified dst_cos. +If multiple PMRs match the implementation MAY define an inherent precedence or it MAY be unpredictable as to which PMR will determine the assigned CoS. +For this reason applications SHOULD NOT be written to use conflicting or ambiguous PMR definitions. + +@subsubsection cos_pmr_cos odp_cos_pmr_cos +/** + * Cascade a PMR to refine packets from one CoS to another. + * + * @param pmr_id the id of the PMR to be activated + * @param src_cos the id of the CoS to be filtered + * @param dst_cos the id of the CoS to be assigned to packets filtered + * from src_cos that match pmr_id. + * + * @return Success or ODP_PARAMETER_ERROR if an input is in error + * or ODP_IMPLEMENTATION_LIMIT if cascade depth is exceeded + * +@code +int odp_cos_pmr_cos(odp_pmr_t pmr_id, odp_cos_t src_cos, odp_cos_t dst_cos); +@endcode + +This routine is used to cascade PMRs by passing packets assigned to the src_cos through another PMR. +Those matching are reassigned to the specified dst_cos. +Note that this process can be repeated to an implementation-defined maximum supported cascade depth. +When cascades are defined, the actual class of service assigned to a packet is the result of the longest chain of PMRs that can be matched against the packet. + +For example, suppose the following sequence of PMRs is in effect: + +@code +odp_pktio_pmr_cos(pmr_idA, pktio_id, cos_idA); +odp_cos_pmr_cos(pmr_idB, cos_idA, cos_idB); +odp_cos_pmr_cos(pmr_idC, cos_idB, cos_idC); +odp_cos_pmr_cos(pmr_idD, cos_idC, cos_idD); +@endcode + +If a packet arrives on pktio_id that matches pmr_idA it is assigned to cos_idA. +But since it is now on cos_idA it is further filtered by pmr_idB and if it matches is reassigned to cos_idB. +This process continues until no further more specific match is found to determine the final CoS that the packet receives. + +Note that given this rule set a packet that matched pmr_idA and pmr_idC it would be assigned to cos_idA because the rule that can assign packets to pmr_idC is only applicable to packets that are assigned to cos_idB, not cos_idA. + +Using cascaded PMRs it is possible to build quite sophisticated filters (up to the implementation limits supported by a given platform). +For example, one could add additional rules to the above set: + +@code +odp_cos_pmr_cos(pmr_idAC, cos_idA, cos_idC); +odp_cos_pmr_cos(pmr_idAD, cos_idA, cos_idD); +@endcode + +To cover cases where some packets on cos_idA should be further sorted to cos_idB while others should be sorted directly to cos_idC or cos_idD. +Again it is the application’s responsibility to ensure that the cascades remain unambiguous and that loops be avoided (e.g., having rules that bounce packets between cos_idA and cos_idB endlessly). + +@subsection pmr_stats PMR Statistics +Conforming ODP implementations SHOULD maintain statistics regarding PMRs and provide the following routines for retrieving them: + +@subsubsection pmr_match_count odp_pmr_match_count +/** + * Retrieve packet matcher statistics + * + * @param pmr_id the id of the PMR from which to retrieve the count + * + * @return The current number of matches for a given matcher instance. + * +@code +signed long odp_pmr_match_count(odp_pmr_t pmr_id); +@endcode + +@subsubsection pmr_terms_cap odp_pmr_terms_cap +/** + * Inquire about matching terms supported by the classifier + * + * @return A mask one bit per enumerated term, one for each of op_pmr_term_e + * +@code +unsigned long long odp_pmr_terms_cap(void); +@endcode + +@subsubsection pmr_terms_avail odp_pmr_terms_avail +/** + * Return the number of packet matching terms available for use + * + * @return A number of packet matcher resources available for use. + * +@code +unsigned odp_pmr_terms_avail(void); +@endcode + +@subsection pmr_composite_rules Pattern Matching Composite Routines +As a shorthand, applications MAY express pattern matching rules using a table rather than constructing them term-by-term. +ODP implementations MUST support both methods of rule specification but MAY have implementation-specific restrictions on the complexity of table-based rules they support. +Note that some implementations MAY be able to implement tables directly while others MAY choose to implement tables by internally generating the equivalent set of term generating calls. + +@subsubsection pmr_table_structure PMR Table Structure +/** + * Following structure is used to define composite packet matching rules + * in the form of an array of individual match or range rules. + * The underlying platform may not support all or any specific combination + * of value match or range rules, and the application should take care + * of inspecting the return value when installing such rules, and perform + * appropriate fallback action. + * +@code +typedef struct odp_pmr_match_t { + enum odp_pmr_match_type_e { + ODP_PMR_MASK, /**< Match a masked set of bits */ + ODP_PMR_RANGE, /**< Match an integer range */ + } match_type; + union { + struct { + enum odp_pmr_term_e term; + const void *val; + const void *mask; + unsigned int val_sz; + } mask; /**< Match a masked set of bits */ + struct { + enum odp_pmr_term_e term; + const void *val1; + const void *val2; + unsigned int val_sz; + } range; /**< Match an integer range */ + }; +} odp_pmr_match_t; + + +/** An opaque handle to a composite packet match rule-set */ +typedef struct odp_pmr_set_s *odp_pmr_set_t; +@endcode; + +The above structure is used with the following APIs to implement table-based PMRs: + +@subsubsection pmr_match_set_create odp_pmr_match_set_create +/** + * Create a composite packet match rule + * + * @param num_terms is the number of terms in the match rule. + * @param terms is an array of num_terms entries, one entry per + * term desired. + * @param dst_cos is the class-of-service to be assigned to packets + * that match the compound rule-set, or a subset thereof, + * if partly applied. + * @param pmr_set_id is the returned handle to the composite rule set. + * + * @return The return value may be a negative number indicating a general + * error, or a positive number indicating the number of ‘terms’ elements that + * have been successfully mapped to the underlying platform classification engine, + * and may be in the range from 1 to ‘num_terms’. + * +@code +int odp_pmr_match_set_create(int num_terms, odp_pmr_match_t *terms, + odp_pmr_set_t *pmr_set_id); +@endcode + +This routine is used to create a PMR match set. + It is the equivalent to a cascade of PMRs except that there are no “intermediate” classes of service defined. +Instead, the entire match set either matches or does not match as a single entity. + +@subsubsection pmr_match_set_destroy odp_pmr_match_set_destroy +/** + * Function to delete a composite packet match rule set + * + * All of the resources pertaining to the match set associated with the + * class-of-service will be released, but the class-of-service will + * remain intact. + * + * @param pmr_set_id a composite rule-set handle returned when created. + * + * @note Depending on the implementation details, destroying a rule-set + * may not guarantee the availability of hardware resources to create the + * same or essentially similar rule-set. + * +@code +int odp_pmr_match_set_destroy(odp_pmr_set_t pmr_set_id); +@endcode + +This routine destroys a PMR match set previously created by odp_pmr_match_set_create(). + +@subsubsection pktio_pmr_match_set_cos odp_pktio_pmr_match_set_cos +/** + * Apply a PMR Match Set to a pktio to assign a CoS. + * + * @param pmr_set_id the id of the PMR match set to be activated + * @param src_pktio the pktio to which this PMR match set is to be applied + * @param dst_cos the CoS to be assigned by this PMR match set + * + * @return Success or ODP_PARAMETER_ERROR + * +@code +int odp_pktio_pmr_match_set_cos(odp_pmr_t pmr_id, odp_pktio_t src_pktio, + odp_cos_t dst_cos); +@endcode + +This routine is the same as odp_pktio_pmr_cos() except that it operates on PMR match sets rather than individual PMRs. + +@section items_pending Items pending resolution +- Revise ‘odp_packet_io.h’ API with respect of default input queue per ‘pktio’ instance. +- Revise ‘odp_queue.h’ API to support an arbitrary priority range, typically 8 priority levels with numeric priority values are platform-specific. +- Add specific packet meta data fields to go into packet buffer which contain all meta data fields parsed and generated by the classifier, for later application use. + +@section implementation_notes Implementation Notes +The following sections are not part of the specification, but shed light into the intent of the specification in several areas, describing some specific implementation approaches of these aspects. + +@subsection supporting_multi_pools Supporting multiple buffer pools +The support of multiple buffer pools for containing packet buffers is optional, and may not be supported by some platforms. +The importance of this feature stems from the need of protecting a networking application in the event of a congestion, or an attempted denial of service attack. +Separating different classes of service to dedicated buffer pools allows the system to limit the memory resources that may be consumed by a particular type of traffic, thereby reserving buffer resources for other classes of traffic. + +In a software implementation, a packet would already be stored in memory when the classifier is invoked, and so it seems the classifier is unable to insert itself into the process of selecting a buffer pool. +For obvious reasons the copying of a packet into a new buffer allocated from a different pool by the classifier is not a desirable solution. + +The recommended solution is to implement buffer pools in the form of buffer counters, while the actual buffers all belong to a single free list when not used to store a packet. +In such an implementation, the classifier will be able to associate a packet already occupying a buffer to a different pool than the default by incrementing the buffer counter of the newly selected pool, and decrementing the counter representing the default pool. +If however the selected pool counter has already reached a certain limit, the classifier would be able to e.g discard the packet instead of incrementing the destination pool counter, and thereby enforce the desirable semantics of distinct buffer pools per class of service. + +Other possible action that may be taken in response to running out of buffers or coming too low on buffers include back-pressure and random-early-detect with a discard probability inversely proportional to the number of free buffers in a pool. +A related implementation topic is the ability to begin dropping some packets before a buffer pool is entirely exhausted. +This is typically referred to as Random Early Detect (or “RED”). +This is deemed to be a feature of the buffer pool implementation on a given platform, where in addition to a hard limit on the number of buffers that can be allocated to a pool, there can also be an option discard packets with a probability the increases as the number of outstanding buffers approaches that hard limit. + +@subsection resolving_gaps Resolving gaps between the API and hardware capabilities +On platforms that support hardware packet accelerators, it is possible that the packet parsing and classification functionality is sufficient to address only a portion of the functionality specified within this document. +This gap may be potentially bridged by augmenting the hardware classification capabilities with a software logic implemented as part of the platform. +In that case, the platform will have to curve out a fraction of the processing resources and dedicate those to the software classification logic, which would be invoked for packets that the hardware platform was unable to classify completely. +At the time of this writing, it is believed however that the performance penalty that will be incurred as a result of software augmentation is unjustified for most application, i.e. +it is preferred to lose the precision of packet prioritization while maintaining full hardware packet processing speed. + +@subsection loopback_case The case for loopback ports, and some of their uses +In some applications, it may be desirable to be able to run a single packet through the classifier more than once. +For example, an encrypted IPsec packet is received from a physical port. +The encrypted packet is assigned a class of service based on its outer unencrypted header fields. +Later, processing the packet entails decrypting the payload of the packet, authenticating it, and removing the original outer headers, which reveals a new set of protocol headers which need to be used to re-classify the packet, and assign it a new priority and buffer pool. +An elegant solution for this use case would be to take advantage of “loopback” logical ports that may be implemented in certain platforms, by transmitting decapsulated packet into a loop-back port. +The same packet then is received from a loop-back port and is examined by the classifier in accordance to the rules assigned to the loopback odp_pktio logical port instance. +Similar mechanism may be applied to tunnel termination processing, fragment reassembly et al. + +@section related_topics Related Topics +The following section discusses aspects of the ODP API that are not integral to the classifier, which only applies to ingress preprocessing. +This section covers miscellaneous aspects of the API that need to be addressed, and are related to packet buffer processing and egress post-processing. +Additional packet buffer manipulation APIs +The need for these following calls are made evident by the need to encapsulate, i.e., remove some headers and add other, thereby changing the size of the headers of a packet during processing. + +@subsection initial_headroom Configuring initial packet buffer headroom +The following function is provided to configure the pktio receive mechanism to (optionally)reserve some headroom between start of the first buffer to the first byte of the first packet data byte, which subsequently could be used to increase the header size “in-place”, without allocating additional gather list elements. +If the request is granted, at least bytes will be reserved in the front of the packet data: +@code +int odp_pktio_set_headroom(odp_pktio_t port_id, unsigned req_bytes); +@endcode +The return value should be negative if the request can not be satisfied, or positive otherwise indicating the actual minimum headroom reserved. +Note that the implementation may reserve more than the requested amount of headroom, and hence on platforms that are unable to support per-port (or per CoS) headroom configuration, a system-wide headroom configuration may be set to the largest of all such requests, and thus satisfy the requirement. +In addition to the above per-port headroom configuration call, there should be an optional, per-CoS call that allows the reservation of different amounts of packet buffer headroom for packets that match certain criteria: for example, the following call allows the application to request that only packets that are expected to be encapsulated in a tunnel, be augmented with a large headroom amount, while packets that are received from a tunnel, and are IP fragments, be assigned a different headroom requirement (see definition for odp_cos_set_headroom() above. +Egress packet scheduling, prioritization and ordering + + +Open Issues +* Parallel matching rules relative precedence. +* Specify application-defined header field declaration APIs. +* Review RFC 4301 for match requirements for IPsec SA, consider the use of L4 port ranges instead of or in addition to value & mask matching criteria. +* Consider the type of packet checks should route a packet through the error CoS: L2 is a safe choice, but L3/L4 checksum or other exceptions deserve consideration. +Usage Examples +Following is a simple sample configuration using the API elements described above. +TBD. + +*/