[dpdk-dev] FW: [PATCH v2] examples/ip_fragmentation: fix check of packet type

Wei, FangfangX fangfangx.wei at intel.com
Wed Mar 15 03:42:34 CET 2017



-----Original Message-----
From: Dai, Wei 
Sent: Wednesday, March 15, 2017 9:39 AM
To: Wei, FangfangX <fangfangx.wei at intel.com>
Subject: FW: [PATCH v2] examples/ip_fragmentation: fix check of packet type

> -----Original Message-----
> From: Dai, Wei
> Sent: Tuesday, March 14, 2017 10:48 PM
> To: dev at dpdk.org
> Cc: Ananyev, Konstantin <konstantin.ananyev at intel.com>; Dai, Wei 
> <wei.dai at intel.com>; stable at dpdk.org
> Subject: [PATCH v2] examples/ip_fragmentation: fix check of packet 
> type
> 
> The packet_type in mbuf is not correctly filled by ixgbe 82599 NIC.
> To use the ether_type in ethernet header to check packet type is more reliaber.
> 
> Fixes: 3c0184cc0c60 ("examples: replace some offload flags with packet 
> type")
> Fixes: ab351fe1c95c ("mbuf: remove packet type from offload flags")
> 
> Cc: stable at dpdk.org
> 
> Reported-by: Fangfang Wei <fangfangx.wei at intel.com>
> Signed-off-by: Wei Dai <wei.dai at intel.com>
Tested-by: Fangfang Wei <fangfangx.wei at intel.com>
> ---
>  examples/ip_fragmentation/main.c | 74
> ++++++++++++++++++++++++++++++++++++++++
>  1 file changed, 74 insertions(+)
> 
> diff --git a/examples/ip_fragmentation/main.c
> b/examples/ip_fragmentation/main.c
> index 9e9ecae..151f059 100644
> --- a/examples/ip_fragmentation/main.c
> +++ b/examples/ip_fragmentation/main.c
> @@ -653,6 +653,74 @@ check_all_ports_link_status(uint8_t port_num, 
> uint32_t port_mask)
>  	}
>  }
> 
> +/* Check L3 packet type detection capablity of the NIC port */ static 
> +int check_ptype(int portid) {
> +	int i, ret;
> +	int ptype_l3_ipv4 = 0, ptype_l3_ipv6 = 0;
> +	uint32_t ptype_mask = RTE_PTYPE_L3_MASK;
> +
> +	ret = rte_eth_dev_get_supported_ptypes(portid, ptype_mask, NULL, 0);
> +	if (ret <= 0)
> +		return 0;
> +
> +	uint32_t ptypes[ret];
> +
> +	ret = rte_eth_dev_get_supported_ptypes(portid, ptype_mask, ptypes,
> ret);
> +	for (i = 0; i < ret; ++i) {
> +		if (ptypes[i] & RTE_PTYPE_L3_IPV4)
> +			ptype_l3_ipv4 = 1;
> +		if (ptypes[i] & RTE_PTYPE_L3_IPV6)
> +			ptype_l3_ipv6 = 1;
> +	}
> +
> +	if (ptype_l3_ipv4 == 0)
> +		printf("port %d cannot parse RTE_PTYPE_L3_IPV4\n", portid);
> +
> +	if (ptype_l3_ipv6 == 0)
> +		printf("port %d cannot parse RTE_PTYPE_L3_IPV6\n", portid);
> +
> +	if (ptype_l3_ipv4 && ptype_l3_ipv6)
> +		return 1;
> +
> +	return 0;
> +
> +}
> +
> +/* Parse packet type of a packet by SW */ static inline void 
> +parse_ptype(struct rte_mbuf *m) {
> +	struct ether_hdr *eth_hdr;
> +	uint32_t packet_type = RTE_PTYPE_UNKNOWN;
> +	uint16_t ether_type;
> +
> +	eth_hdr = rte_pktmbuf_mtod(m, struct ether_hdr *);
> +	ether_type = eth_hdr->ether_type;
> +	if (ether_type == rte_cpu_to_be_16(ETHER_TYPE_IPv4))
> +		packet_type |= RTE_PTYPE_L3_IPV4_EXT_UNKNOWN;
> +	else if (ether_type == rte_cpu_to_be_16(ETHER_TYPE_IPv6))
> +		packet_type |= RTE_PTYPE_L3_IPV6_EXT_UNKNOWN;
> +
> +	m->packet_type = packet_type;
> +}
> +
> +/* callback function to detect packet type for a queue of a port */ 
> +static uint16_t cb_parse_ptype(uint8_t port __rte_unused, uint16_t 
> +queue __rte_unused,
> +		   struct rte_mbuf *pkts[], uint16_t nb_pkts,
> +		   uint16_t max_pkts __rte_unused,
> +		   void *user_param __rte_unused)
> +{
> +	uint16_t i;
> +
> +	for (i = 0; i < nb_pkts; ++i)
> +		parse_ptype(pkts[i]);
> +
> +	return nb_pkts;
> +}
> +
>  static int
>  init_routing_table(void)
>  {
> @@ -944,6 +1012,12 @@ main(int argc, char **argv)
>  				ret, portid);
> 
>  		rte_eth_promiscuous_enable(portid);
> +
> +		if (check_ptype(portid) == 0) {
> +			rte_eth_add_rx_callback(portid, 0, cb_parse_ptype, NULL);
> +			printf("Add Rx callback funciton to detect L3 packet type by
> SW :"
> +				" port = %d\n", portid);
> +		}
>  	}
> 
>  	if (init_routing_table() < 0)
> --
> 2.7.4



More information about the dev mailing list