[dpdk-dev] [PATCH v4 3/3] app/testpmd: fix Tx offload on tunneling packet

Tan, Jianfeng jianfeng.tan at intel.com
Thu Sep 22 03:29:08 CEST 2016


Hi Konstantin,


On 9/21/2016 11:47 PM, Ananyev, Konstantin wrote:
> Hi Jianfeng,
>
>> Hi Konstantin,
>>
>>
>> On 9/19/2016 8:09 PM, Ananyev, Konstantin wrote:
>>> Hi Jainfeng,
>>>
>>>> -----Original Message-----
>>>> From: Tan, Jianfeng
>>>> Sent: Monday, August 1, 2016 4:57 AM
>>>> To: dev at dpdk.org
>>>> Cc: thomas.monjalon at 6wind.com; De Lara Guarch, Pablo
>>>> <pablo.de.lara.guarch at intel.com>; Ananyev, Konstantin
>>>> <konstantin.ananyev at intel.com>; Wu, Jingjing <jingjing.wu at intel.com>;
>>>> Zhang, Helin <helin.zhang at intel.com>; Tan, Jianfeng
>>>> <jianfeng.tan at intel.com>; Tao, Zhe <zhe.tao at intel.com>
>>>> Subject: [PATCH v4 3/3] app/testpmd: fix Tx offload on tunneling
>>>> packet
>>>>
>>>> Tx offload on tunneling packet now requires applications to correctly
>>>> set tunneling type. Without setting it, i40e driver does not parse
>>>> tunneling parameters. Besides that, add a check to see if NIC supports TSO on tunneling packet when executing "csum
>> parse_tunnel on _port"
>>>> after "tso set _size _port" or the other way around.
>>>>
>>>> Fixes: b51c47536a9e ("app/testpmd: support TSO in checksum forward
>>>> engine")
>>>>
>>>> Signed-off-by: Zhe Tao <zhe.tao at intel.com>
>>>> Signed-off-by: Jianfeng Tan <jianfeng.tan at intel.com>
>>>> ---
>>>>    app/test-pmd/cmdline.c  | 42 ++++++++++++++++++++++++++++++++++++------
>>>>    app/test-pmd/csumonly.c | 37 +++++++++++++++++++++++++++++--------
>>>>    2 files changed, 65 insertions(+), 14 deletions(-)
>>>>
>>>> [...]
>>>>
>>>> @@ -745,7 +762,7 @@ pkt_burst_checksum_forward(struct fwd_stream *fs)
>>>>    		 * processed in hardware. */
>>>>    		if (info.is_tunnel == 1) {
>>>>    			ol_flags |= process_outer_cksums(outer_l3_hdr, &info,
>>>> -				testpmd_ol_flags);
>>>> +				testpmd_ol_flags, ol_flags & PKT_TX_TCP_SEG);
>>>>    		}
>>>>
>>>>    		/* step 4: fill the mbuf meta data (flags and header lengths) */
>>>> @@ -806,6 +823,10 @@
>>> It was a while since I looked a t it closely, but shouldn't you also update step 4 below:
>>>
>>> if (info.is_tunnel == 1) {
>>>                           if (testpmd_ol_flags & TESTPMD_TX_OFFLOAD_OUTER_IP_CKSUM) {
>>>                                   m->outer_l2_len = info.outer_l2_len;
>>>                                   m->outer_l3_len = info.outer_l3_len;
>>>                                   m->l2_len = info.l2_len;
>>>                                   m->l3_len = info.l3_len;
>>>                                   m->l4_len = info.l4_len;
>>>                           }
>>>                           else {
>>>                                   /* if there is a outer UDP cksum
>>>                                      processed in sw and the inner in hw,
>>>                                      the outer checksum will be wrong as
>>>                                      the payload will be modified by the
>>>                                      hardware */
>>>                                   m->l2_len = info.outer_l2_len +
>>>                                           info.outer_l3_len + info.l2_len;
>>>                                   m->l3_len = info.l3_len;
>>>                                   m->l4_len = info.l4_len;
>>>                           }
>>>
>>>
>>> ?
>>>
>>> In particular shouldn't it be something like:
>>> if ((testpmd_ol_flags & TESTPMD_TX_OFFLOAD_OUTER_IP_CKSUM) != 0 ||
>>>         ((testmpd_ol_flags & TESTPMD_TX_OFFLOAD_PARSE_TUNNEL) != 0 &&
>>> info.tso_segsz != 0)) { ....
>>> ?
>> Sorry for late response, because I also take some time to refresh memory. And, you are right, I missed this corner case. After applying
>> your way above, it works!
>>
>> The case below settings in testpmd:
>> $ set fwd csum
>> $ csum parse_tunnel on 0
>> $ tso set 800 0
>> <keep outer-ip checksum offload is sw>
> Great :)
>
>> And unfortunately, our previous verification is based on "outer-ip checksum offload is hw".
>>
>>> Another thought, might be it is worth to introduce new flag:
>>> TESTPMD_TX_OFFLOAD_TSO_TUNNEL, and new command in cmdline.c, that would set/clear that flag.
>>> Instead of trying to make assumptions does user wants tso for tunneled
>>> packets based on 2 different things:
>>> - enable/disable tso
>>> - enable/disable tunneled packets parsing ?
>> Currently, if we do parse_tunnel is based on the command "csum parse_tunnel on/off <port>".
>> If we add a command like "tso_tunnel set <length> <port>", it's a little duplicated with "tso set <length> <port>", and there is too
>> much info to just set a flag like TESTPMD_TX_OFFLOAD_TSO_TUNNEL; If we add a command like "csum tunnel_tso on <port>", it also
>> depends on "csum parse_tunnel on <port>" so that tunnel packets are parsed.
> But I thought in some cases user might want to enable tunnel parsing, but do tso for non-tunneled packets only.
> I.E.
>   - enable tunnel parsing
> - for non-tunneled packets do tso
> - for tunneled packets don't do tso
> My understanding that with current set commands/flags this is not possible, correct?
> Konstantin

Yes, correct, above case is not supported now. A twin case would be:
- for non-tunneled packets, don't do tso
- for tunneled packets, do tso

Considering above two cases, so how about adding a command like;
$ tunnel_tso set 800 0
which needs "csum parse_tunnel on 0" has been set before it.

And original "tso set 800 0" will only control tso of non-tunneled packets.
?


Thanks,
Jianfeng



More information about the dev mailing list