>-----Original Message-----
>From: Ananyev, Konstantin
>Sent: Wednesday, October 4, 2017 4:09 PM
>To: Kavanagh, Mark B <mark.b.kavan...@intel.com>; dev@dpdk.org
>Cc: Hu, Jiayu <jiayu...@intel.com>; Tan, Jianfeng <jianfeng....@intel.com>;
>Yigit, Ferruh <ferruh.yi...@intel.com>; tho...@monjalon.net
>Subject: RE: [PATCH v6 5/6] app/testpmd: enable TCP/IPv4, VxLAN and GRE GSO
>
>
>
>> -----Original Message-----
>> From: Kavanagh, Mark B
>> Sent: Monday, October 2, 2017 5:46 PM
>> To: dev@dpdk.org
>> Cc: Hu, Jiayu <jiayu...@intel.com>; Tan, Jianfeng <jianfeng....@intel.com>;
>Ananyev, Konstantin <konstantin.anan...@intel.com>; Yigit,
>> Ferruh <ferruh.yi...@intel.com>; tho...@monjalon.net; Kavanagh, Mark B
><mark.b.kavan...@intel.com>
>> Subject: [PATCH v6 5/6] app/testpmd: enable TCP/IPv4, VxLAN and GRE GSO
>>
>> From: Jiayu Hu <jiayu...@intel.com>
>>
>> This patch adds GSO support to the csum forwarding engine. Oversized
>> packets transmitted over a GSO-enabled port will undergo segmentation
>> (with the exception of packet-types unsupported by the GSO library).
>> GSO support is disabled by default.
>>
>> GSO support may be toggled on a per-port basis, using the command:
>>
>>         "set port <port_id> gso on|off"
>>
>> The maximum packet length (including the packet header and payload) for
>> GSO segments may be set with the command:
>>
>>         "set gso segsz <length>"
>>
>> Show GSO configuration for a given port with the command:
>>
>>      "show port <port_id> gso"
>>
>> Signed-off-by: Jiayu Hu <jiayu...@intel.com>
>> Signed-off-by: Mark Kavanagh <mark.b.kavan...@intel.com>
>> ---
>>  app/test-pmd/cmdline.c                      | 178
>++++++++++++++++++++++++++++
>>  app/test-pmd/config.c                       |  24 ++++
>>  app/test-pmd/csumonly.c                     |  69 ++++++++++-
>>  app/test-pmd/testpmd.c                      |  13 ++
>>  app/test-pmd/testpmd.h                      |  10 ++
>>  doc/guides/testpmd_app_ug/testpmd_funcs.rst |  46 +++++++
>>  6 files changed, 335 insertions(+), 5 deletions(-)
>>
>> diff --git a/app/test-pmd/cmdline.c b/app/test-pmd/cmdline.c
>> index ccdf239..05b0ce8 100644
>> --- a/app/test-pmd/cmdline.c
>> +++ b/app/test-pmd/cmdline.c
>> @@ -431,6 +431,17 @@ static void cmd_help_long_parsed(void *parsed_result,
>>                      "    Set max flow number and max packet number per-flow"
>>                      " for GRO.\n\n"
>>
>> +                    "set port (port_id) gso (on|off)"
>> +                    "    Enable or disable Generic Segmentation Offload in"
>> +                    " csum forwarding engine.\n\n"
>> +
>> +                    "set gso segsz (length)\n"
>> +                    "    Set max packet length for output GSO segments,"
>> +                    " including packet header and payload.\n\n"
>
>Probably a  good future improvement would be to allow user to specify gso_type
>too.

Would you like to see that change implemented in time for the 17.11 release?

>
>> +
>> +                    "show port (port_id) gso\n"
>> +                    "    Show GSO configuration.\n\n"
>> +
>>                      "set fwd (%s)\n"
>>                      "    Set packet forwarding mode.\n\n"
>>
>> @@ -3967,6 +3978,170 @@ struct cmd_gro_set_result {
>>      },
>>  };
>>
>> +/* *** ENABLE/DISABLE GSO *** */
>> +struct cmd_gso_enable_result {
>> +    cmdline_fixed_string_t cmd_set;
>> +    cmdline_fixed_string_t cmd_port;
>> +    cmdline_fixed_string_t cmd_keyword;
>> +    cmdline_fixed_string_t cmd_mode;
>> +    uint8_t cmd_pid;
>> +};
>> +
>> +static void
>> +cmd_gso_enable_parsed(void *parsed_result,
>> +            __attribute__((unused)) struct cmdline *cl,
>> +            __attribute__((unused)) void *data)
>> +{
>> +    struct cmd_gso_enable_result *res;
>> +
>> +    res = parsed_result;
>> +    if (!strcmp(res->cmd_keyword, "gso"))
>> +            setup_gso(res->cmd_mode, res->cmd_pid);
>> +}
>> +
>> +cmdline_parse_token_string_t cmd_gso_enable_set =
>> +    TOKEN_STRING_INITIALIZER(struct cmd_gso_enable_result,
>> +                    cmd_set, "set");
>> +cmdline_parse_token_string_t cmd_gso_enable_port =
>> +    TOKEN_STRING_INITIALIZER(struct cmd_gso_enable_result,
>> +                    cmd_port, "port");
>> +cmdline_parse_token_string_t cmd_gso_enable_keyword =
>> +    TOKEN_STRING_INITIALIZER(struct cmd_gso_enable_result,
>> +                    cmd_keyword, "gso");
>> +cmdline_parse_token_string_t cmd_gso_enable_mode =
>> +    TOKEN_STRING_INITIALIZER(struct cmd_gso_enable_result,
>> +                    cmd_mode, "on#off");
>> +cmdline_parse_token_num_t cmd_gso_enable_pid =
>> +    TOKEN_NUM_INITIALIZER(struct cmd_gso_enable_result,
>> +                    cmd_pid, UINT8);
>> +
>> +cmdline_parse_inst_t cmd_gso_enable = {
>> +    .f = cmd_gso_enable_parsed,
>> +    .data = NULL,
>> +    .help_str = "set port <port_id> gso on|off",
>> +    .tokens = {
>> +            (void *)&cmd_gso_enable_set,
>> +            (void *)&cmd_gso_enable_port,
>> +            (void *)&cmd_gso_enable_pid,
>> +            (void *)&cmd_gso_enable_keyword,
>> +            (void *)&cmd_gso_enable_mode,
>> +            NULL,
>> +    },
>> +};
>> +
>> +/* *** SET MAX PACKET LENGTH FOR GSO SEGMENTS *** */
>> +struct cmd_gso_size_result {
>> +    cmdline_fixed_string_t cmd_set;
>> +    cmdline_fixed_string_t cmd_keyword;
>> +    cmdline_fixed_string_t cmd_segsz;
>> +    uint16_t cmd_size;
>> +};
>> +
>> +static void
>> +cmd_gso_size_parsed(void *parsed_result,
>> +                   __attribute__((unused)) struct cmdline *cl,
>> +                   __attribute__((unused)) void *data)
>> +{
>> +    struct cmd_gso_size_result *res = parsed_result;
>> +
>> +    if (test_done == 0) {
>> +            printf("Before setting GSO segsz, please first stop 
>> fowarding\n");
>> +            return;
>> +    }
>> +
>> +    if (!strcmp(res->cmd_keyword, "gso") &&
>> +                    !strcmp(res->cmd_segsz, "segsz")) {
>> +            if (res->cmd_size == 0) {
>
>As your gso_size includes packet header too, you probably shouldn't allow
>gso_size less
>then some minimal value of l2_len + l3_len + l4_len + ...
>Another alternative change gso_ctx.gso_size to count only payload size.

Okay - I'll take a look at this, thanks.

>
>> +                    printf("gso_size should be larger than 0."
>> +                                    " Please input a legal value\n");
>> +            } else
>> +                    gso_max_segment_size = res->cmd_size;
>> +    }
>> +}
>> +
>> +cmdline_parse_token_string_t cmd_gso_size_set =
>> +    TOKEN_STRING_INITIALIZER(struct cmd_gso_size_result,
>> +                            cmd_set, "set");
>> +cmdline_parse_token_string_t cmd_gso_size_keyword =
>> +    TOKEN_STRING_INITIALIZER(struct cmd_gso_size_result,
>> +                            cmd_keyword, "gso");
>> +cmdline_parse_token_string_t cmd_gso_size_segsz =
>> +    TOKEN_STRING_INITIALIZER(struct cmd_gso_size_result,
>> +                            cmd_segsz, "segsz");
>> +cmdline_parse_token_num_t cmd_gso_size_size =
>> +    TOKEN_NUM_INITIALIZER(struct cmd_gso_size_result,
>> +                            cmd_size, UINT16);
>> +
>> +cmdline_parse_inst_t cmd_gso_size = {
>> +    .f = cmd_gso_size_parsed,
>> +    .data = NULL,
>> +    .help_str = "set gso segsz <length>",
>> +    .tokens = {
>> +            (void *)&cmd_gso_size_set,
>> +            (void *)&cmd_gso_size_keyword,
>> +            (void *)&cmd_gso_size_segsz,
>> +            (void *)&cmd_gso_size_size,
>> +            NULL,
>> +    },
>> +};
>> +
>> +/* *** SHOW GSO CONFIGURATION *** */
>> +struct cmd_gso_show_result {
>> +    cmdline_fixed_string_t cmd_show;
>> +    cmdline_fixed_string_t cmd_port;
>> +    cmdline_fixed_string_t cmd_keyword;
>> +    uint8_t cmd_pid;
>> +};
>> +
>> +static void
>> +cmd_gso_show_parsed(void *parsed_result,
>> +                   __attribute__((unused)) struct cmdline *cl,
>> +                   __attribute__((unused)) void *data)
>> +{
>> +    struct cmd_gso_show_result *res = parsed_result;
>> +
>> +    if (!rte_eth_dev_is_valid_port(res->cmd_pid)) {
>> +            printf("invalid port id %u\n", res->cmd_pid);
>> +            return;
>> +    }
>> +    if (!strcmp(res->cmd_keyword, "gso")) {
>> +            if (gso_ports[res->cmd_pid].enable) {
>> +                    printf("Max GSO'd packet size: %uB\n"
>> +                                    "Supported GSO types: TCP/IPv4, "
>> +                                    "VxLAN with inner TCP/IPv4 packet, "
>> +                                    "GRE with inner TCP/IPv4  packet\n",
>> +                                    gso_max_segment_size);
>> +            } else
>> +                    printf("GSO is not enabled on Port %u\n", res->cmd_pid);
>> +    }
>> +}
>> +
>> +cmdline_parse_token_string_t cmd_gso_show_show =
>> +TOKEN_STRING_INITIALIZER(struct cmd_gso_show_result,
>> +            cmd_show, "show");
>> +cmdline_parse_token_string_t cmd_gso_show_port =
>> +TOKEN_STRING_INITIALIZER(struct cmd_gso_show_result,
>> +            cmd_port, "port");
>> +cmdline_parse_token_string_t cmd_gso_show_keyword =
>> +    TOKEN_STRING_INITIALIZER(struct cmd_gso_show_result,
>> +                            cmd_keyword, "gso");
>> +cmdline_parse_token_num_t cmd_gso_show_pid =
>> +    TOKEN_NUM_INITIALIZER(struct cmd_gso_show_result,
>> +                            cmd_pid, UINT8);
>> +
>> +cmdline_parse_inst_t cmd_gso_show = {
>> +    .f = cmd_gso_show_parsed,
>> +    .data = NULL,
>> +    .help_str = "show port <port_id> gso",
>> +    .tokens = {
>> +            (void *)&cmd_gso_show_show,
>> +            (void *)&cmd_gso_show_port,
>> +            (void *)&cmd_gso_show_pid,
>> +            (void *)&cmd_gso_show_keyword,
>> +            NULL,
>> +    },
>> +};
>> +
>>  /* *** ENABLE/DISABLE FLUSH ON RX STREAMS *** */
>>  struct cmd_set_flush_rx {
>>      cmdline_fixed_string_t set;
>> @@ -14255,6 +14430,9 @@ struct cmd_cmdfile_result {
>>      (cmdline_parse_inst_t *)&cmd_tunnel_tso_show,
>>      (cmdline_parse_inst_t *)&cmd_enable_gro,
>>      (cmdline_parse_inst_t *)&cmd_gro_set,
>> +    (cmdline_parse_inst_t *)&cmd_gso_enable,
>> +    (cmdline_parse_inst_t *)&cmd_gso_size,
>> +    (cmdline_parse_inst_t *)&cmd_gso_show,
>>      (cmdline_parse_inst_t *)&cmd_link_flow_control_set,
>>      (cmdline_parse_inst_t *)&cmd_link_flow_control_set_rx,
>>      (cmdline_parse_inst_t *)&cmd_link_flow_control_set_tx,
>> diff --git a/app/test-pmd/config.c b/app/test-pmd/config.c
>> index 3ae3e1c..88d09d0 100644
>> --- a/app/test-pmd/config.c
>> +++ b/app/test-pmd/config.c
>> @@ -2454,6 +2454,30 @@ struct igb_ring_desc_16_bytes {
>>      }
>>  }
>>
>> +void
>> +setup_gso(const char *mode, uint8_t port_id)
>> +{
>> +    if (!rte_eth_dev_is_valid_port(port_id)) {
>> +            printf("invalid port id %u\n", port_id);
>> +            return;
>> +    }
>> +    if (strcmp(mode, "on") == 0) {
>> +            if (test_done == 0) {
>> +                    printf("before enabling GSO,"
>> +                                    " please stop forwarding first\n");
>> +                    return;
>> +            }
>> +            gso_ports[port_id].enable = 1;
>> +    } else if (strcmp(mode, "off") == 0) {
>> +            if (test_done == 0) {
>> +                    printf("before disabling GSO,"
>> +                                    " please stop forwarding first\n");
>> +                    return;
>> +            }
>> +            gso_ports[port_id].enable = 0;
>> +    }
>> +}
>> +
>>  char*
>>  list_pkt_forwarding_modes(void)
>>  {
>> diff --git a/app/test-pmd/csumonly.c b/app/test-pmd/csumonly.c
>> index 90c8119..bd1a287 100644
>> --- a/app/test-pmd/csumonly.c
>> +++ b/app/test-pmd/csumonly.c
>> @@ -70,6 +70,8 @@
>>  #include <rte_string_fns.h>
>>  #include <rte_flow.h>
>>  #include <rte_gro.h>
>> +#include <rte_gso.h>
>> +
>>  #include "testpmd.h"
>>
>>  #define IP_DEFTTL  64   /* from RFC 1340. */
>> @@ -91,6 +93,7 @@
>>  /* structure that caches offload info for the current packet */
>>  struct testpmd_offload_info {
>>      uint16_t ethertype;
>> +    uint8_t gso_enable;
>>      uint16_t l2_len;
>>      uint16_t l3_len;
>>      uint16_t l4_len;
>> @@ -381,6 +384,8 @@ struct simple_gre_hdr {
>>                              get_udptcp_checksum(l3_hdr, tcp_hdr,
>>                                      info->ethertype);
>>              }
>> +            if (info->gso_enable)
>> +                    ol_flags |= PKT_TX_TCP_SEG;
>>      } else if (info->l4_proto == IPPROTO_SCTP) {
>>              sctp_hdr = (struct sctp_hdr *)((char *)l3_hdr + info->l3_len);
>>              sctp_hdr->cksum = 0;
>> @@ -627,6 +632,9 @@ struct simple_gre_hdr {
>>  pkt_burst_checksum_forward(struct fwd_stream *fs)
>>  {
>>      struct rte_mbuf *pkts_burst[MAX_PKT_BURST];
>> +    struct rte_mbuf *gso_segments[GSO_MAX_PKT_BURST];
>> +    struct rte_gso_ctx *gso_ctx;
>> +    struct rte_mbuf **tx_pkts_burst;
>>      struct rte_port *txp;
>>      struct rte_mbuf *m, *p;
>>      struct ether_hdr *eth_hdr;
>> @@ -634,13 +642,15 @@ struct simple_gre_hdr {
>>      uint16_t nb_rx;
>>      uint16_t nb_tx;
>>      uint16_t nb_prep;
>> -    uint16_t i;
>> +    uint16_t i, j;
>>      uint64_t rx_ol_flags, tx_ol_flags;
>>      uint16_t testpmd_ol_flags;
>>      uint32_t retry;
>>      uint32_t rx_bad_ip_csum;
>>      uint32_t rx_bad_l4_csum;
>>      struct testpmd_offload_info info;
>> +    uint16_t nb_segments = 0;
>> +    int ret;
>>
>>  #ifdef RTE_TEST_PMD_RECORD_CORE_CYCLES
>>      uint64_t start_tsc;
>> @@ -674,6 +684,8 @@ struct simple_gre_hdr {
>>      memset(&info, 0, sizeof(info));
>>      info.tso_segsz = txp->tso_segsz;
>>      info.tunnel_tso_segsz = txp->tunnel_tso_segsz;
>> +    if (gso_ports[fs->tx_port].enable)
>> +            info.gso_enable = 1;
>>
>>      for (i = 0; i < nb_rx; i++) {
>>              if (likely(i < nb_rx - 1))
>> @@ -851,13 +863,59 @@ struct simple_gre_hdr {
>>              }
>>      }
>>
>> +    if (gso_ports[fs->tx_port].enable == 0)
>> +            tx_pkts_burst = pkts_burst;
>> +    else {
>> +            gso_ctx = &(current_fwd_lcore()->gso_ctx);
>> +            gso_ctx->gso_size = gso_max_segment_size;
>> +            for (i = 0; i < nb_rx; i++) {
>
>It seems quite a lot of code to handle an error case, which I suppose
>will happen pretty rare.
>Why not just:
>
>ret = rte_gso_segment(pkts_burst[i], gso_ctx,
>                                       &gso_segments[nb_segments],
>                                       RTE_DIM(gso_segments) - nb_segments);
>If (ret < 0)  {
>    RTE_LOG(DEBUG, ....);
>     rte_free(pkts_burst[i]);
>} else
>   nb_segments += ret;

Ditto - thanks!

>
>
>
>> +                    if (unlikely(nb_rx - i >= GSO_MAX_PKT_BURST -
>> +                                            nb_segments)) {
>> +                            /*
>> +                             * insufficient space in gso_segments,
>> +                             * stop GSO.
>> +                             */
>> +                            for (j = i; j < GSO_MAX_PKT_BURST -
>> +                                            nb_segments; j++) {
>> +                                    pkts_burst[j]->ol_flags &=
>> +                                            (~PKT_TX_TCP_SEG);
>> +                                    gso_segments[nb_segments++] =
>> +                                            pkts_burst[j];
>> +                            }
>> +                            for (; j < nb_rx; j++)
>> +                                    rte_pktmbuf_free(pkts_burst[j]);
>> +                            break;
>> +                    }
>> +                    ret = rte_gso_segment(pkts_burst[i], gso_ctx,
>> +                                    &gso_segments[nb_segments],
>> +                                    GSO_MAX_PKT_BURST - nb_segments);
>> +                    if (ret >= 1)
>> +                            nb_segments += ret;
>> +                    else if (ret < 0) {
>> +                            /*
>> +                             * insufficient MBUFs or space in
>> +                             * gso_segments, stop GSO.
>> +                             */
>> +                            for (j = i; j < nb_rx; j++) {
>> +                                    pkts_burst[j]->ol_flags &=
>> +                                            (~PKT_TX_TCP_SEG);
>> +                                    gso_segments[nb_segments++] =
>> +                                            pkts_burst[j];
>> +                            }
>> +                            break;
>> +                    }
>> +            }
>> +            tx_pkts_burst = gso_segments;
>> +            nb_rx = nb_segments;
>> +    }
>> +
>>      nb_prep = rte_eth_tx_prepare(fs->tx_port, fs->tx_queue,
>> -                    pkts_burst, nb_rx);
>> +                    tx_pkts_burst, nb_rx);
>>      if (nb_prep != nb_rx)
>>              printf("Preparing packet burst to transmit failed: %s\n",
>>                              rte_strerror(rte_errno));
>>
>> -    nb_tx = rte_eth_tx_burst(fs->tx_port, fs->tx_queue, pkts_burst,
>> +    nb_tx = rte_eth_tx_burst(fs->tx_port, fs->tx_queue, tx_pkts_burst,
>>                      nb_prep);
>>
>>      /*
>> @@ -868,7 +926,7 @@ struct simple_gre_hdr {
>>              while (nb_tx < nb_rx && retry++ < burst_tx_retry_num) {
>>                      rte_delay_us(burst_tx_delay_time);
>>                      nb_tx += rte_eth_tx_burst(fs->tx_port, fs->tx_queue,
>> -                                    &pkts_burst[nb_tx], nb_rx - nb_tx);
>> +                                    &tx_pkts_burst[nb_tx], nb_rx - nb_tx);
>>              }
>>      }
>>      fs->tx_packets += nb_tx;
>> @@ -881,9 +939,10 @@ struct simple_gre_hdr {
>>      if (unlikely(nb_tx < nb_rx)) {
>>              fs->fwd_dropped += (nb_rx - nb_tx);
>>              do {
>> -                    rte_pktmbuf_free(pkts_burst[nb_tx]);
>> +                    rte_pktmbuf_free(tx_pkts_burst[nb_tx]);
>>              } while (++nb_tx < nb_rx);
>>      }
>> +
>>  #ifdef RTE_TEST_PMD_RECORD_CORE_CYCLES
>>      end_tsc = rte_rdtsc();
>>      core_cycles = (end_tsc - start_tsc);
>> diff --git a/app/test-pmd/testpmd.c b/app/test-pmd/testpmd.c
>> index e097ee0..97e349d 100644
>> --- a/app/test-pmd/testpmd.c
>> +++ b/app/test-pmd/testpmd.c
>> @@ -400,6 +400,9 @@ static int eth_event_callback(uint8_t port_id,
>>   */
>>  static int all_ports_started(void);
>>
>> +struct gso_status gso_ports[RTE_MAX_ETHPORTS];
>> +uint16_t gso_max_segment_size = ETHER_MAX_LEN - ETHER_CRC_LEN;
>> +
>>  /*
>>   * Helper function to check if socket is already discovered.
>>   * If yes, return positive value. If not, return zero.
>> @@ -570,6 +573,7 @@ static int eth_event_callback(uint8_t port_id,
>>      unsigned int nb_mbuf_per_pool;
>>      lcoreid_t  lc_id;
>>      uint8_t port_per_socket[RTE_MAX_NUMA_NODES];
>> +    uint32_t gso_types = 0;
>>
>>      memset(port_per_socket,0,RTE_MAX_NUMA_NODES);
>>
>> @@ -654,6 +658,8 @@ static int eth_event_callback(uint8_t port_id,
>>
>>      init_port_config();
>>
>> +    gso_types = DEV_TX_OFFLOAD_TCP_TSO | DEV_TX_OFFLOAD_VXLAN_TNL_TSO |
>> +            DEV_TX_OFFLOAD_GRE_TNL_TSO;
>>      /*
>>       * Records which Mbuf pool to use by each logical core, if needed.
>>       */
>> @@ -664,6 +670,13 @@ static int eth_event_callback(uint8_t port_id,
>>              if (mbp == NULL)
>>                      mbp = mbuf_pool_find(0);
>>              fwd_lcores[lc_id]->mbp = mbp;
>> +            /* initialize GSO context */
>> +            fwd_lcores[lc_id]->gso_ctx.direct_pool = mbp;
>> +            fwd_lcores[lc_id]->gso_ctx.indirect_pool = mbp;
>> +            fwd_lcores[lc_id]->gso_ctx.gso_types = gso_types;
>> +            fwd_lcores[lc_id]->gso_ctx.gso_size = ETHER_MAX_LEN -
>> +                    ETHER_CRC_LEN;
>> +            fwd_lcores[lc_id]->gso_ctx.ipid_flag = !RTE_GSO_IPID_FIXED;
>
>Just
>fwd_lcores[lc_id]->gso_ctx.ipid_flag = 0;
>should do here.

Agreed.

Thanks again,
Mark 


>
>Konstantin

Reply via email to