2018-10-17 15:22:09 +00:00
|
|
|
/* SPDX-License-Identifier: BSD-3-Clause
|
|
|
|
* Copyright(c) 2010-2014 Intel Corporation
|
2020-02-09 21:14:52 +00:00
|
|
|
* Copyright 2018 Mellanox Technologies, Ltd
|
2018-10-17 15:22:09 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
|
|
|
|
#include <rte_net.h>
|
|
|
|
#include <rte_mbuf.h>
|
|
|
|
#include <rte_ether.h>
|
2019-10-23 13:19:27 +00:00
|
|
|
#include <rte_vxlan.h>
|
2018-10-17 15:22:09 +00:00
|
|
|
#include <rte_ethdev.h>
|
|
|
|
#include <rte_flow.h>
|
|
|
|
|
|
|
|
#include "testpmd.h"
|
|
|
|
|
|
|
|
static inline void
|
2019-07-24 10:58:56 +00:00
|
|
|
print_ether_addr(const char *what, const struct rte_ether_addr *eth_addr)
|
2018-10-17 15:22:09 +00:00
|
|
|
{
|
2019-05-21 16:13:05 +00:00
|
|
|
char buf[RTE_ETHER_ADDR_FMT_SIZE];
|
|
|
|
rte_ether_format_addr(buf, RTE_ETHER_ADDR_FMT_SIZE, eth_addr);
|
2018-10-17 15:22:09 +00:00
|
|
|
printf("%s%s", what, buf);
|
|
|
|
}
|
|
|
|
|
2018-10-17 15:22:10 +00:00
|
|
|
static inline void
|
2018-10-17 15:22:09 +00:00
|
|
|
dump_pkt_burst(uint16_t port_id, uint16_t queue, struct rte_mbuf *pkts[],
|
|
|
|
uint16_t nb_pkts, int is_rx)
|
|
|
|
{
|
|
|
|
struct rte_mbuf *mb;
|
2019-07-24 10:58:56 +00:00
|
|
|
const struct rte_ether_hdr *eth_hdr;
|
|
|
|
struct rte_ether_hdr _eth_hdr;
|
2018-10-17 15:22:09 +00:00
|
|
|
uint16_t eth_type;
|
|
|
|
uint64_t ol_flags;
|
|
|
|
uint16_t i, packet_type;
|
|
|
|
uint16_t is_encapsulation;
|
|
|
|
char buf[256];
|
|
|
|
struct rte_net_hdr_lens hdr_lens;
|
|
|
|
uint32_t sw_packet_type;
|
|
|
|
uint16_t udp_port;
|
|
|
|
uint32_t vx_vni;
|
2019-01-07 08:57:12 +00:00
|
|
|
const char *reason;
|
2020-01-16 12:53:10 +00:00
|
|
|
int dynf_index;
|
2018-10-17 15:22:09 +00:00
|
|
|
|
|
|
|
if (!nb_pkts)
|
|
|
|
return;
|
|
|
|
printf("port %u/queue %u: %s %u packets\n",
|
|
|
|
port_id, queue,
|
|
|
|
is_rx ? "received" : "sent",
|
|
|
|
(unsigned int) nb_pkts);
|
|
|
|
for (i = 0; i < nb_pkts; i++) {
|
|
|
|
mb = pkts[i];
|
2019-07-24 10:58:56 +00:00
|
|
|
eth_hdr = rte_pktmbuf_read(mb, 0, sizeof(_eth_hdr), &_eth_hdr);
|
2018-10-17 15:22:09 +00:00
|
|
|
eth_type = RTE_BE_TO_CPU_16(eth_hdr->ether_type);
|
|
|
|
ol_flags = mb->ol_flags;
|
|
|
|
packet_type = mb->packet_type;
|
|
|
|
is_encapsulation = RTE_ETH_IS_TUNNEL_PKT(packet_type);
|
|
|
|
|
|
|
|
print_ether_addr(" src=", ð_hdr->s_addr);
|
|
|
|
print_ether_addr(" - dst=", ð_hdr->d_addr);
|
|
|
|
printf(" - type=0x%04x - length=%u - nb_segs=%d",
|
|
|
|
eth_type, (unsigned int) mb->pkt_len,
|
|
|
|
(int)mb->nb_segs);
|
|
|
|
if (ol_flags & PKT_RX_RSS_HASH) {
|
|
|
|
printf(" - RSS hash=0x%x", (unsigned int) mb->hash.rss);
|
|
|
|
printf(" - RSS queue=0x%x", (unsigned int) queue);
|
|
|
|
}
|
|
|
|
if (ol_flags & PKT_RX_FDIR) {
|
|
|
|
printf(" - FDIR matched ");
|
|
|
|
if (ol_flags & PKT_RX_FDIR_ID)
|
|
|
|
printf("ID=0x%x",
|
|
|
|
mb->hash.fdir.hi);
|
|
|
|
else if (ol_flags & PKT_RX_FDIR_FLX)
|
|
|
|
printf("flex bytes=0x%08x %08x",
|
|
|
|
mb->hash.fdir.hi, mb->hash.fdir.lo);
|
|
|
|
else
|
|
|
|
printf("hash=0x%x ID=0x%x ",
|
|
|
|
mb->hash.fdir.hash, mb->hash.fdir.id);
|
|
|
|
}
|
|
|
|
if (ol_flags & PKT_RX_TIMESTAMP)
|
|
|
|
printf(" - timestamp %"PRIu64" ", mb->timestamp);
|
|
|
|
if (ol_flags & PKT_RX_QINQ)
|
|
|
|
printf(" - QinQ VLAN tci=0x%x, VLAN tci outer=0x%x",
|
|
|
|
mb->vlan_tci, mb->vlan_tci_outer);
|
|
|
|
else if (ol_flags & PKT_RX_VLAN)
|
|
|
|
printf(" - VLAN tci=0x%x", mb->vlan_tci);
|
2019-11-14 13:59:13 +00:00
|
|
|
if (!is_rx && (ol_flags & PKT_TX_DYNF_METADATA))
|
2019-11-05 14:19:31 +00:00
|
|
|
printf(" - Tx metadata: 0x%x",
|
|
|
|
*RTE_FLOW_DYNF_METADATA(mb));
|
2019-11-14 13:59:13 +00:00
|
|
|
if (is_rx && (ol_flags & PKT_RX_DYNF_METADATA))
|
ethdev: extend flow metadata
Currently, metadata can be set on egress path via mbuf tx_metadata field
with PKT_TX_METADATA flag and RTE_FLOW_ITEM_TYPE_META matches metadata.
This patch extends the metadata feature usability.
1) RTE_FLOW_ACTION_TYPE_SET_META
When supporting multiple tables, Tx metadata can also be set by a rule and
matched by another rule. This new action allows metadata to be set as a
result of flow match.
2) Metadata on ingress
There's also need to support metadata on ingress. Metadata can be set by
SET_META action and matched by META item like Tx. The final value set by
the action will be delivered to application via metadata dynamic field of
mbuf which can be accessed by RTE_FLOW_DYNF_METADATA() macro or with
rte_flow_dynf_metadata_set() and rte_flow_dynf_metadata_get() helper
routines. PKT_RX_DYNF_METADATA flag will be set along with the data.
The mbuf dynamic field must be registered by calling
rte_flow_dynf_metadata_register() prior to use SET_META action.
The availability of dynamic mbuf metadata field can be checked
with rte_flow_dynf_metadata_avail() routine.
If application is going to engage the metadata feature it registers
the metadata dynamic fields, then PMD checks the metadata field
availability and handles the appropriate fields in datapath.
For loopback/hairpin packet, metadata set on Rx/Tx may or may not be
propagated to the other path depending on hardware capability.
MARK and METADATA look similar and might operate in similar way,
but not interacting.
Initially, there were proposed two metadata related actions:
- RTE_FLOW_ACTION_TYPE_FLAG
- RTE_FLOW_ACTION_TYPE_MARK
These actions set the special flag in the packet metadata, MARK action
stores some specified value in the metadata storage, and, on the packet
receiving PMD puts the flag and value to the mbuf and applications can
see the packet was threated inside flow engine according to the appropriate
RTE flow(s). MARK and FLAG are like some kind of gateway to transfer some
per-packet information from the flow engine to the application via
receiving datapath. Also, there is the item of type RTE_FLOW_ITEM_TYPE_MARK
provided. It allows us to extend the flow match pattern with the capability
to match the metadata values set by MARK/FLAG actions on other flows.
From the datapath point of view, the MARK and FLAG are related to the
receiving side only. It would useful to have the same gateway on the
transmitting side and there was the feature of type RTE_FLOW_ITEM_TYPE_META
was proposed. The application can fill the field in mbuf and this value
will be transferred to some field in the packet metadata inside the flow
engine. It did not matter whether these metadata fields are shared because
of MARK and META items belonged to different domains (receiving and
transmitting) and could be vendor-specific.
So far, so good, DPDK proposes some entities to control metadata inside
the flow engine and gateways to exchange these values on a per-packet basis
via datapaths.
As we can see, the MARK and META means are not symmetric, there is absent
action which would allow us to set META value on the transmitting path.
So, the action of type:
- RTE_FLOW_ACTION_TYPE_SET_META was proposed.
The next, applications raise the new requirements for packet metadata.
The flow ngines are getting more complex, internal switches are introduced,
multiple ports might be supported within the same flow engine namespace.
From the DPDK points of view, it means the packets might be sent on one
eth_dev port and received on the other one, and the packet path inside
the flow engine entirely belongs to the same hardware device. The simplest
example is SR-IOV with PF, VFs and the representors. And there is a
brilliant opportunity to provide some out-of-band channel to transfer
some extra data from one port to another one, besides the packet data
itself. And applications would like to use this opportunity.
It is supposed for application to use trials (with rte_flow_validate)
to detect which metadata features (FLAG, MARK, META) actually supported
by PMD and underlying hardware. It might depend on PMD configuration,
system software, hardware settings, etc., and should be detected
in run time.
Signed-off-by: Yongseok Koh <yskoh@mellanox.com>
Signed-off-by: Viacheslav Ovsiienko <viacheslavo@mellanox.com>
Acked-by: Andrew Rybchenko <arybchenko@solarflare.com>
Acked-by: Olivier Matz <olivier.matz@6wind.com>
Acked-by: Ori Kam <orika@mellanox.com>
2019-11-05 14:19:30 +00:00
|
|
|
printf(" - Rx metadata: 0x%x",
|
|
|
|
*RTE_FLOW_DYNF_METADATA(mb));
|
2020-01-16 12:53:10 +00:00
|
|
|
for (dynf_index = 0; dynf_index < 64; dynf_index++) {
|
|
|
|
if (dynf_names[dynf_index][0] != '\0')
|
|
|
|
printf(" - dynf %s: %d",
|
|
|
|
dynf_names[dynf_index],
|
|
|
|
!!(ol_flags & (1UL << dynf_index)));
|
|
|
|
}
|
2018-10-17 15:22:09 +00:00
|
|
|
if (mb->packet_type) {
|
|
|
|
rte_get_ptype_name(mb->packet_type, buf, sizeof(buf));
|
|
|
|
printf(" - hw ptype: %s", buf);
|
|
|
|
}
|
|
|
|
sw_packet_type = rte_net_get_ptype(mb, &hdr_lens,
|
|
|
|
RTE_PTYPE_ALL_MASK);
|
|
|
|
rte_get_ptype_name(sw_packet_type, buf, sizeof(buf));
|
|
|
|
printf(" - sw ptype: %s", buf);
|
|
|
|
if (sw_packet_type & RTE_PTYPE_L2_MASK)
|
|
|
|
printf(" - l2_len=%d", hdr_lens.l2_len);
|
|
|
|
if (sw_packet_type & RTE_PTYPE_L3_MASK)
|
|
|
|
printf(" - l3_len=%d", hdr_lens.l3_len);
|
|
|
|
if (sw_packet_type & RTE_PTYPE_L4_MASK)
|
|
|
|
printf(" - l4_len=%d", hdr_lens.l4_len);
|
|
|
|
if (sw_packet_type & RTE_PTYPE_TUNNEL_MASK)
|
|
|
|
printf(" - tunnel_len=%d", hdr_lens.tunnel_len);
|
|
|
|
if (sw_packet_type & RTE_PTYPE_INNER_L2_MASK)
|
|
|
|
printf(" - inner_l2_len=%d", hdr_lens.inner_l2_len);
|
|
|
|
if (sw_packet_type & RTE_PTYPE_INNER_L3_MASK)
|
|
|
|
printf(" - inner_l3_len=%d", hdr_lens.inner_l3_len);
|
|
|
|
if (sw_packet_type & RTE_PTYPE_INNER_L4_MASK)
|
|
|
|
printf(" - inner_l4_len=%d", hdr_lens.inner_l4_len);
|
|
|
|
if (is_encapsulation) {
|
2019-05-21 16:13:10 +00:00
|
|
|
struct rte_ipv4_hdr *ipv4_hdr;
|
|
|
|
struct rte_ipv6_hdr *ipv6_hdr;
|
2019-05-21 16:13:14 +00:00
|
|
|
struct rte_udp_hdr *udp_hdr;
|
2018-10-17 15:22:09 +00:00
|
|
|
uint8_t l2_len;
|
|
|
|
uint8_t l3_len;
|
|
|
|
uint8_t l4_len;
|
|
|
|
uint8_t l4_proto;
|
2019-05-21 16:13:03 +00:00
|
|
|
struct rte_vxlan_hdr *vxlan_hdr;
|
2018-10-17 15:22:09 +00:00
|
|
|
|
2019-05-21 16:13:03 +00:00
|
|
|
l2_len = sizeof(struct rte_ether_hdr);
|
2018-10-17 15:22:09 +00:00
|
|
|
|
|
|
|
/* Do not support ipv4 option field */
|
|
|
|
if (RTE_ETH_IS_IPV4_HDR(packet_type)) {
|
2019-05-21 16:13:10 +00:00
|
|
|
l3_len = sizeof(struct rte_ipv4_hdr);
|
2018-10-17 15:22:09 +00:00
|
|
|
ipv4_hdr = rte_pktmbuf_mtod_offset(mb,
|
2019-05-21 16:13:10 +00:00
|
|
|
struct rte_ipv4_hdr *,
|
2018-10-17 15:22:09 +00:00
|
|
|
l2_len);
|
|
|
|
l4_proto = ipv4_hdr->next_proto_id;
|
|
|
|
} else {
|
2019-05-21 16:13:10 +00:00
|
|
|
l3_len = sizeof(struct rte_ipv6_hdr);
|
2018-10-17 15:22:09 +00:00
|
|
|
ipv6_hdr = rte_pktmbuf_mtod_offset(mb,
|
2019-05-21 16:13:10 +00:00
|
|
|
struct rte_ipv6_hdr *,
|
2018-10-17 15:22:09 +00:00
|
|
|
l2_len);
|
|
|
|
l4_proto = ipv6_hdr->proto;
|
|
|
|
}
|
|
|
|
if (l4_proto == IPPROTO_UDP) {
|
|
|
|
udp_hdr = rte_pktmbuf_mtod_offset(mb,
|
2019-05-21 16:13:14 +00:00
|
|
|
struct rte_udp_hdr *,
|
2018-10-17 15:22:09 +00:00
|
|
|
l2_len + l3_len);
|
2019-05-21 16:13:14 +00:00
|
|
|
l4_len = sizeof(struct rte_udp_hdr);
|
2018-10-17 15:22:09 +00:00
|
|
|
vxlan_hdr = rte_pktmbuf_mtod_offset(mb,
|
2019-05-21 16:13:03 +00:00
|
|
|
struct rte_vxlan_hdr *,
|
2018-10-17 15:22:09 +00:00
|
|
|
l2_len + l3_len + l4_len);
|
|
|
|
udp_port = RTE_BE_TO_CPU_16(udp_hdr->dst_port);
|
|
|
|
vx_vni = rte_be_to_cpu_32(vxlan_hdr->vx_vni);
|
|
|
|
printf(" - VXLAN packet: packet type =%d, "
|
|
|
|
"Destination UDP port =%d, VNI = %d",
|
|
|
|
packet_type, udp_port, vx_vni >> 8);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
printf(" - %s queue=0x%x", is_rx ? "Receive" : "Send",
|
|
|
|
(unsigned int) queue);
|
|
|
|
printf("\n");
|
|
|
|
rte_get_rx_ol_flag_list(mb->ol_flags, buf, sizeof(buf));
|
|
|
|
printf(" ol_flags: %s\n", buf);
|
2019-01-07 08:57:12 +00:00
|
|
|
if (rte_mbuf_check(mb, 1, &reason) < 0)
|
|
|
|
printf("INVALID mbuf: %s\n", reason);
|
2018-10-17 15:22:09 +00:00
|
|
|
}
|
|
|
|
}
|
2018-10-17 15:22:10 +00:00
|
|
|
|
|
|
|
uint16_t
|
|
|
|
dump_rx_pkts(uint16_t port_id, uint16_t queue, struct rte_mbuf *pkts[],
|
|
|
|
uint16_t nb_pkts, __rte_unused uint16_t max_pkts,
|
|
|
|
__rte_unused void *user_param)
|
|
|
|
{
|
|
|
|
dump_pkt_burst(port_id, queue, pkts, nb_pkts, 1);
|
|
|
|
return nb_pkts;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint16_t
|
|
|
|
dump_tx_pkts(uint16_t port_id, uint16_t queue, struct rte_mbuf *pkts[],
|
|
|
|
uint16_t nb_pkts, __rte_unused void *user_param)
|
|
|
|
{
|
|
|
|
dump_pkt_burst(port_id, queue, pkts, nb_pkts, 0);
|
|
|
|
return nb_pkts;
|
|
|
|
}
|
2018-10-24 06:21:59 +00:00
|
|
|
|
|
|
|
uint16_t
|
|
|
|
tx_pkt_set_md(uint16_t port_id, __rte_unused uint16_t queue,
|
|
|
|
struct rte_mbuf *pkts[], uint16_t nb_pkts,
|
|
|
|
__rte_unused void *user_param)
|
|
|
|
{
|
|
|
|
uint16_t i = 0;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Add metadata value to every Tx packet,
|
|
|
|
* and set ol_flags accordingly.
|
|
|
|
*/
|
2019-11-05 14:19:31 +00:00
|
|
|
if (rte_flow_dynf_metadata_avail())
|
|
|
|
for (i = 0; i < nb_pkts; i++) {
|
|
|
|
*RTE_FLOW_DYNF_METADATA(pkts[i]) =
|
|
|
|
ports[port_id].tx_metadata;
|
|
|
|
pkts[i]->ol_flags |= PKT_TX_DYNF_METADATA;
|
|
|
|
}
|
2018-10-24 06:21:59 +00:00
|
|
|
return nb_pkts;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
add_tx_md_callback(portid_t portid)
|
|
|
|
{
|
|
|
|
struct rte_eth_dev_info dev_info;
|
|
|
|
uint16_t queue;
|
2019-09-12 16:42:14 +00:00
|
|
|
int ret;
|
2018-10-24 06:21:59 +00:00
|
|
|
|
|
|
|
if (port_id_is_invalid(portid, ENABLED_WARN))
|
|
|
|
return;
|
2019-09-12 16:42:14 +00:00
|
|
|
|
|
|
|
ret = eth_dev_info_get_print_err(portid, &dev_info);
|
|
|
|
if (ret != 0)
|
|
|
|
return;
|
|
|
|
|
2018-10-24 06:21:59 +00:00
|
|
|
for (queue = 0; queue < dev_info.nb_tx_queues; queue++)
|
|
|
|
if (!ports[portid].tx_set_md_cb[queue])
|
|
|
|
ports[portid].tx_set_md_cb[queue] =
|
|
|
|
rte_eth_add_tx_callback(portid, queue,
|
|
|
|
tx_pkt_set_md, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
remove_tx_md_callback(portid_t portid)
|
|
|
|
{
|
|
|
|
struct rte_eth_dev_info dev_info;
|
|
|
|
uint16_t queue;
|
2019-09-12 16:42:14 +00:00
|
|
|
int ret;
|
2018-10-24 06:21:59 +00:00
|
|
|
|
|
|
|
if (port_id_is_invalid(portid, ENABLED_WARN))
|
|
|
|
return;
|
2019-09-12 16:42:14 +00:00
|
|
|
|
|
|
|
ret = eth_dev_info_get_print_err(portid, &dev_info);
|
|
|
|
if (ret != 0)
|
|
|
|
return;
|
|
|
|
|
2018-10-24 06:21:59 +00:00
|
|
|
for (queue = 0; queue < dev_info.nb_tx_queues; queue++)
|
|
|
|
if (ports[portid].tx_set_md_cb[queue]) {
|
|
|
|
rte_eth_remove_tx_callback(portid, queue,
|
|
|
|
ports[portid].tx_set_md_cb[queue]);
|
|
|
|
ports[portid].tx_set_md_cb[queue] = NULL;
|
|
|
|
}
|
|
|
|
}
|
2019-09-12 16:42:14 +00:00
|
|
|
|
2020-01-16 12:53:10 +00:00
|
|
|
uint16_t
|
|
|
|
tx_pkt_set_dynf(uint16_t port_id, __rte_unused uint16_t queue,
|
|
|
|
struct rte_mbuf *pkts[], uint16_t nb_pkts,
|
|
|
|
__rte_unused void *user_param)
|
|
|
|
{
|
|
|
|
uint16_t i = 0;
|
|
|
|
|
|
|
|
if (ports[port_id].mbuf_dynf)
|
|
|
|
for (i = 0; i < nb_pkts; i++)
|
|
|
|
pkts[i]->ol_flags |= ports[port_id].mbuf_dynf;
|
|
|
|
return nb_pkts;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
add_tx_dynf_callback(portid_t portid)
|
|
|
|
{
|
|
|
|
struct rte_eth_dev_info dev_info;
|
|
|
|
uint16_t queue;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (port_id_is_invalid(portid, ENABLED_WARN))
|
|
|
|
return;
|
|
|
|
|
|
|
|
ret = eth_dev_info_get_print_err(portid, &dev_info);
|
|
|
|
if (ret != 0)
|
|
|
|
return;
|
|
|
|
|
|
|
|
for (queue = 0; queue < dev_info.nb_tx_queues; queue++)
|
|
|
|
if (!ports[portid].tx_set_dynf_cb[queue])
|
|
|
|
ports[portid].tx_set_dynf_cb[queue] =
|
|
|
|
rte_eth_add_tx_callback(portid, queue,
|
|
|
|
tx_pkt_set_dynf, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
remove_tx_dynf_callback(portid_t portid)
|
|
|
|
{
|
|
|
|
struct rte_eth_dev_info dev_info;
|
|
|
|
uint16_t queue;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (port_id_is_invalid(portid, ENABLED_WARN))
|
|
|
|
return;
|
|
|
|
|
|
|
|
ret = eth_dev_info_get_print_err(portid, &dev_info);
|
|
|
|
if (ret != 0)
|
|
|
|
return;
|
|
|
|
|
|
|
|
for (queue = 0; queue < dev_info.nb_tx_queues; queue++)
|
|
|
|
if (ports[portid].tx_set_dynf_cb[queue]) {
|
|
|
|
rte_eth_remove_tx_callback(portid, queue,
|
|
|
|
ports[portid].tx_set_dynf_cb[queue]);
|
|
|
|
ports[portid].tx_set_dynf_cb[queue] = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-09-12 16:42:14 +00:00
|
|
|
int
|
|
|
|
eth_dev_info_get_print_err(uint16_t port_id,
|
|
|
|
struct rte_eth_dev_info *dev_info)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = rte_eth_dev_info_get(port_id, dev_info);
|
|
|
|
if (ret != 0)
|
|
|
|
printf("Error during getting device (port %u) info: %s\n",
|
|
|
|
port_id, strerror(-ret));
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
2019-09-14 11:37:27 +00:00
|
|
|
|
|
|
|
void
|
|
|
|
eth_set_promisc_mode(uint16_t port, int enable)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (enable)
|
|
|
|
ret = rte_eth_promiscuous_enable(port);
|
|
|
|
else
|
|
|
|
ret = rte_eth_promiscuous_disable(port);
|
|
|
|
|
|
|
|
if (ret != 0)
|
|
|
|
printf("Error during %s promiscuous mode for port %u: %s\n",
|
|
|
|
enable ? "enabling" : "disabling",
|
|
|
|
port, rte_strerror(-ret));
|
|
|
|
}
|
2019-09-10 08:25:43 +00:00
|
|
|
|
2019-09-24 12:56:12 +00:00
|
|
|
void
|
|
|
|
eth_set_allmulticast_mode(uint16_t port, int enable)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (enable)
|
|
|
|
ret = rte_eth_allmulticast_enable(port);
|
|
|
|
else
|
|
|
|
ret = rte_eth_allmulticast_disable(port);
|
|
|
|
|
|
|
|
if (ret != 0)
|
|
|
|
printf("Error during %s all-multicast mode for port %u: %s\n",
|
|
|
|
enable ? "enabling" : "disabling",
|
|
|
|
port, rte_strerror(-ret));
|
|
|
|
}
|
|
|
|
|
2019-09-10 08:25:43 +00:00
|
|
|
int
|
|
|
|
eth_link_get_nowait_print_err(uint16_t port_id, struct rte_eth_link *link)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = rte_eth_link_get_nowait(port_id, link);
|
|
|
|
if (ret < 0)
|
|
|
|
printf("Device (port %u) link get (without wait) failed: %s\n",
|
|
|
|
port_id, rte_strerror(-ret));
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
2019-09-10 08:52:16 +00:00
|
|
|
|
|
|
|
int
|
|
|
|
eth_macaddr_get_print_err(uint16_t port_id, struct rte_ether_addr *mac_addr)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = rte_eth_macaddr_get(port_id, mac_addr);
|
|
|
|
if (ret != 0)
|
|
|
|
printf("Error getting device (port %u) mac address: %s\n",
|
|
|
|
port_id, rte_strerror(-ret));
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|