app/testpmd: add L4 port to verbose output

Message ID 20240815142051.531978-1-alex.chapman@arm.com (mailing list archive)
State New
Delegated to: Stephen Hemminger
Headers
Series app/testpmd: add L4 port to verbose output |

Checks

Context Check Description
ci/checkpatch success coding style OK
ci/loongarch-compilation success Compilation OK
ci/loongarch-unit-testing success Unit Testing PASS
ci/Intel-compilation success Compilation OK
ci/intel-Testing success Testing PASS
ci/intel-Functional success Functional PASS
ci/github-robot: build success github build: passed
ci/iol-mellanox-Performance success Performance Testing PASS
ci/iol-intel-Performance success Performance Testing PASS
ci/iol-marvell-Functional success Functional Testing PASS
ci/iol-unit-amd64-testing success Testing PASS
ci/iol-compile-amd64-testing success Testing PASS
ci/iol-unit-arm64-testing success Testing PASS
ci/iol-broadcom-Performance success Performance Testing PASS
ci/iol-broadcom-Functional success Functional Testing PASS
ci/iol-intel-Functional success Functional Testing PASS
ci/iol-compile-arm64-testing success Testing PASS
ci/iol-sample-apps-testing success Testing PASS

Commit Message

Alex Chapman Aug. 15, 2024, 2:20 p.m. UTC
To help distinguish packets we want to add more identifiable
information and print port number for all packets.
This will make packet metadata more uniform as previously it
only printed port number for encapsulated packets.

Bugzilla-ID: 1517

Signed-off-by: Alex Chapman <alex.chapman@arm.com>
Reviewed-by: Luca Vizzarro <luca.vizzarro@arm.com>
Reviewed-by: Paul Szczepanek <paul.szczepanek@arm.com>
---
 app/test-pmd/util.c | 71 +++++++++++++++++++++++++++------------------
 1 file changed, 42 insertions(+), 29 deletions(-)
  

Comments

Stephen Hemminger Aug. 15, 2024, 3:22 p.m. UTC | #1
On Thu, 15 Aug 2024 15:20:51 +0100
Alex Chapman <alex.chapman@arm.com> wrote:

> To help distinguish packets we want to add more identifiable
> information and print port number for all packets.
> This will make packet metadata more uniform as previously it
> only printed port number for encapsulated packets.
> 
> Bugzilla-ID: 1517
> 
> Signed-off-by: Alex Chapman <alex.chapman@arm.com>
> Reviewed-by: Luca Vizzarro <luca.vizzarro@arm.com>
> Reviewed-by: Paul Szczepanek <paul.szczepanek@arm.com>

The verbose output is already too verbose.
Maybe you would like the simpler format (which does include the port number)
see the network packet dissector patches.
  
Luca Vizzarro Aug. 16, 2024, 11:46 a.m. UTC | #2
On 15/08/2024 16:22, Stephen Hemminger wrote:
> The verbose output is already too verbose.
> Maybe you would like the simpler format (which does include the port number)
> see the network packet dissector patches.

Hi Stephen,

Thank you for the reply you left to Alex's patch. This is actually quite 
helpful.

I've had a look at your patch series and the hexdump is actually quite 
great for our purpose at DTS, as it will allow us to detect a preset 
packet identifier in the payload.

Unfortunately, your patch doesn't solve the problem that Alex is having. 
He's currently writing up a test suite to test the RSS hash keys and the 
respective queues to which the incoming packets are placed into. To 
correctly match the packets to the queue and hash key, he needs a way to 
identify them. We explored some solutions and the L4 port seemed to be 
the most problem-free with the least effort. Using the payload is 
probably best and you've already posted the required changes too. The 
only problem is that your hexdump output does not print the required RSS 
values.

Would you be be keen to add these to your patch? Otherwise, do you have 
any ideas and/or solutions to tackle this specific problem?

Thank you,
Luca Vizzarro
  
Juraj Linkeš Sept. 9, 2024, 8:32 a.m. UTC | #3
On 16. 8. 2024 13:46, Luca Vizzarro wrote:
> On 15/08/2024 16:22, Stephen Hemminger wrote:
>> The verbose output is already too verbose.
>> Maybe you would like the simpler format (which does include the port 
>> number)
>> see the network packet dissector patches.
> 
> Hi Stephen,
> 
> Thank you for the reply you left to Alex's patch. This is actually quite 
> helpful.
> 
> I've had a look at your patch series and the hexdump is actually quite 
> great for our purpose at DTS, as it will allow us to detect a preset 
> packet identifier in the payload.
> 
> Unfortunately, your patch doesn't solve the problem that Alex is having. 
> He's currently writing up a test suite to test the RSS hash keys and the 
> respective queues to which the incoming packets are placed into. To 
> correctly match the packets to the queue and hash key, he needs a way to 
> identify them. We explored some solutions and the L4 port seemed to be 
> the most problem-free with the least effort. Using the payload is 
> probably best and you've already posted the required changes too. The 
> only problem is that your hexdump output does not print the required RSS 
> values.
> 
> Would you be be keen to add these to your patch? Otherwise, do you have 
> any ideas and/or solutions to tackle this specific problem?
> 

Hi Stephen,

Do you have any advice for us?

Thanks,
Juraj

> Thank you,
> Luca Vizzarro
  

Patch

diff --git a/app/test-pmd/util.c b/app/test-pmd/util.c
index bf9b639d95..5fa05fad16 100644
--- a/app/test-pmd/util.c
+++ b/app/test-pmd/util.c
@@ -81,7 +81,6 @@  dump_pkt_burst(uint16_t port_id, uint16_t queue, struct rte_mbuf *pkts[],
 	char buf[256];
 	struct rte_net_hdr_lens hdr_lens;
 	uint32_t sw_packet_type;
-	uint16_t udp_port;
 	uint32_t vx_vni;
 	const char *reason;
 	int dynf_index;
@@ -234,49 +233,63 @@  dump_pkt_burst(uint16_t port_id, uint16_t queue, struct rte_mbuf *pkts[],
 		if (sw_packet_type & RTE_PTYPE_INNER_L4_MASK)
 			MKDUMPSTR(print_buf, buf_size, cur_len,
 				  " - inner_l4_len=%d", hdr_lens.inner_l4_len);
-		if (is_encapsulation) {
-			struct rte_ipv4_hdr *ipv4_hdr;
-			struct rte_ipv6_hdr *ipv6_hdr;
-			struct rte_udp_hdr *udp_hdr;
-			uint8_t l2_len;
-			uint8_t l3_len;
-			uint8_t l4_len;
-			uint8_t l4_proto;
-			struct  rte_vxlan_hdr *vxlan_hdr;
-
-			l2_len  = sizeof(struct rte_ether_hdr);
-
-			/* Do not support ipv4 option field */
-			if (RTE_ETH_IS_IPV4_HDR(packet_type)) {
-				l3_len = sizeof(struct rte_ipv4_hdr);
-				ipv4_hdr = rte_pktmbuf_mtod_offset(mb,
+
+		struct rte_ipv4_hdr *ipv4_hdr;
+		struct rte_ipv6_hdr *ipv6_hdr;
+		struct rte_udp_hdr *udp_hdr;
+		struct rte_tcp_hdr *tcp_hdr;
+		uint8_t l2_len;
+		uint8_t l3_len;
+		uint8_t l4_len;
+		uint8_t l4_proto;
+		uint16_t l4_port;
+		struct  rte_vxlan_hdr *vxlan_hdr;
+
+		l2_len  = sizeof(struct rte_ether_hdr);
+
+		/* Do not support ipv4 option field */
+		if (RTE_ETH_IS_IPV4_HDR(packet_type)) {
+			l3_len = sizeof(struct rte_ipv4_hdr);
+			ipv4_hdr = rte_pktmbuf_mtod_offset(mb,
 				struct rte_ipv4_hdr *,
 				l2_len);
-				l4_proto = ipv4_hdr->next_proto_id;
-			} else {
-				l3_len = sizeof(struct rte_ipv6_hdr);
-				ipv6_hdr = rte_pktmbuf_mtod_offset(mb,
+			l4_proto = ipv4_hdr->next_proto_id;
+		} else {
+			l3_len = sizeof(struct rte_ipv6_hdr);
+			ipv6_hdr = rte_pktmbuf_mtod_offset(mb,
 				struct rte_ipv6_hdr *,
 				l2_len);
-				l4_proto = ipv6_hdr->proto;
-			}
-			if (l4_proto == IPPROTO_UDP) {
-				udp_hdr = rte_pktmbuf_mtod_offset(mb,
+			l4_proto = ipv6_hdr->proto;
+		}
+		if (l4_proto == IPPROTO_UDP) {
+			udp_hdr = rte_pktmbuf_mtod_offset(mb,
 				struct rte_udp_hdr *,
 				l2_len + l3_len);
+			l4_port = RTE_BE_TO_CPU_16(udp_hdr->dst_port);
+			if (is_encapsulation) {
 				l4_len = sizeof(struct rte_udp_hdr);
 				vxlan_hdr = rte_pktmbuf_mtod_offset(mb,
-				struct rte_vxlan_hdr *,
-				l2_len + l3_len + l4_len);
-				udp_port = RTE_BE_TO_CPU_16(udp_hdr->dst_port);
+					struct rte_vxlan_hdr *,
+					l2_len + l3_len + l4_len);
 				vx_vni = rte_be_to_cpu_32(vxlan_hdr->vx_vni);
 				MKDUMPSTR(print_buf, buf_size, cur_len,
 					  " - VXLAN packet: packet type =%d, "
 					  "Destination UDP port =%d, VNI = %d, "
 					  "last_rsvd = %d", packet_type,
-					  udp_port, vx_vni >> 8, vx_vni & 0xff);
+					  l4_port, vx_vni >> 8, vx_vni & 0xff);
+			} else {
+				MKDUMPSTR(print_buf, buf_size, cur_len,
+					" - Destination UDP port=%d", l4_port);
 			}
+		} else if (l4_proto == IPPROTO_TCP) {
+			tcp_hdr = rte_pktmbuf_mtod_offset(mb,
+				struct rte_tcp_hdr *,
+				l2_len + l3_len);
+			l4_port = RTE_BE_TO_CPU_16(tcp_hdr->dst_port);
+			MKDUMPSTR(print_buf, buf_size, cur_len,
+				" - Destination TCP port=%d", l4_port);
 		}
+
 		MKDUMPSTR(print_buf, buf_size, cur_len,
 			  " - %s queue=0x%x", is_rx ? "Receive" : "Send",
 			  (unsigned int) queue);