From patchwork Thu Nov 30 11:46:05 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Hemant Agrawal X-Patchwork-Id: 120139 Delivered-To: patch@linaro.org Received: by 10.140.22.227 with SMTP id 90csp557991qgn; Thu, 30 Nov 2017 03:47:07 -0800 (PST) X-Google-Smtp-Source: AGs4zMYpWe83b4+G1s3Tf7CA5nFW9uCSurijLHikMFPnnNkH0L3ztR3cLGjKvlkl5xQNeAXxWEz2 X-Received: by 10.28.84.19 with SMTP id i19mr1842455wmb.62.1512042426897; Thu, 30 Nov 2017 03:47:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1512042426; cv=none; d=google.com; s=arc-20160816; b=E3Bi2XDJQZwT59r1qc+81B9Uvp+yQ/EUejjkVViVLoWVy/mIx1QLIaNKfhJ82ER6oL s9/yVzSvbgSybM+mwt7IjdLq2Il2Z3hRbV21eeaEnOGq0bIEFgAT7kg6C+aKu/PbmK8b nKWGuF8tou6+reWm0f8kS7oHlRtoJwOZ1PgktWYzfj87SDcMLMTtGG4FLEAY2FdbqLLn HySDpX1UJBhhGB7MvRtUss0VZIpT7G17130LDVoy88ReD3yZeZHbHZgtfA2v7DrGcRxH GZF2e/6B8K/xjPK01Q6E7hbbClnh91Y7dkrFeg0sp+k1IRw3CXJMXTiPdDKB6tLiFG6Z 6TXQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:list-subscribe:list-help:list-post:list-archive :list-unsubscribe:list-id:precedence:subject:spamdiagnosticmetadata :spamdiagnosticoutput:mime-version:message-id:date:cc:to:from :arc-authentication-results; bh=wbHs2V2RNaVNjGHUB/f8WRCabbfiud7peo/YaBsVAYo=; b=bce9w/QcjI93ZY4s1z9avHWJGk5EBYsU1ithEBp0/a8xWxBxGeIEws3D41NHamvLXb fEniLGu5boM8mjXz+DbXXSEH9M3YQ5WnvW/D+Z44I3+2tBzQ+APDthu8WJtKcyN2pDFX SaovILPaUo+SBPwVDfVNOUjARoyF+hthHQJm6ZCJJTnNbO9Rv4A7zdluiwJakQSALxWl BDjjl/HzOc4OQQi1p12SgfDFv+ond46DBnHiGXhS1LOn7el48PAAzvarufxUS6wenRdW eTKmRURKlOaPQ9+qifCPC/t21q5fXn9s4SUIzL55Zfh+Oqie83srEy4hYISBfBmIvjuL f8Mg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of dev-bounces@dpdk.org designates 92.243.14.124 as permitted sender) smtp.mailfrom=dev-bounces@dpdk.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nxp.com Return-Path: Received: from dpdk.org (dpdk.org. [92.243.14.124]) by mx.google.com with ESMTP id w19si2945326wra.165.2017.11.30.03.47.06; Thu, 30 Nov 2017 03:47:06 -0800 (PST) Received-SPF: pass (google.com: domain of dev-bounces@dpdk.org designates 92.243.14.124 as permitted sender) client-ip=92.243.14.124; Authentication-Results: mx.google.com; spf=pass (google.com: domain of dev-bounces@dpdk.org designates 92.243.14.124 as permitted sender) smtp.mailfrom=dev-bounces@dpdk.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nxp.com Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 960772B9E; Thu, 30 Nov 2017 12:47:05 +0100 (CET) Received: from NAM03-BY2-obe.outbound.protection.outlook.com (mail-by2nam03on0080.outbound.protection.outlook.com [104.47.42.80]) by dpdk.org (Postfix) with ESMTP id EE21528EE for ; Thu, 30 Nov 2017 12:47:03 +0100 (CET) Received: from BN6PR03CA0024.namprd03.prod.outlook.com (10.168.230.162) by BN6PR03MB2691.namprd03.prod.outlook.com (10.173.144.10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.282.5; Thu, 30 Nov 2017 11:47:01 +0000 Received: from BN1BFFO11FD029.protection.gbl (2a01:111:f400:7c10::1:137) by BN6PR03CA0024.outlook.office365.com (2603:10b6:404:23::34) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.282.5 via Frontend Transport; Thu, 30 Nov 2017 11:47:01 +0000 Authentication-Results: spf=fail (sender IP is 192.88.168.50) smtp.mailfrom=nxp.com; intel.com; dkim=none (message not signed) header.d=none; intel.com; dmarc=fail action=none header.from=nxp.com; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.168.50 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.168.50; helo=tx30smr01.am.freescale.net; Received: from tx30smr01.am.freescale.net (192.88.168.50) by BN1BFFO11FD029.mail.protection.outlook.com (10.58.144.92) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.20.239.4 via Frontend Transport; Thu, 30 Nov 2017 11:47:01 +0000 Received: from bf-netperf1.ap.freescale.net (bf-netperf1.ap.freescale.net [10.232.134.28]) by tx30smr01.am.freescale.net (8.14.3/8.14.0) with ESMTP id vAUBkx6w031415; Thu, 30 Nov 2017 04:46:59 -0700 From: Hemant Agrawal To: CC: Date: Thu, 30 Nov 2017 17:16:05 +0530 Message-ID: <1512042367-6361-1-git-send-email-hemant.agrawal@nxp.com> X-Mailer: git-send-email 2.7.4 X-EOPAttributedMessage: 0 X-Matching-Connectors: 131565160216805358; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.168.50; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(336005)(39860400002)(346002)(39380400002)(376002)(2980300002)(1109001)(1110001)(339900001)(3190300001)(189002)(199003)(8936002)(8676002)(6916009)(498600001)(5660300001)(189998001)(105606002)(53936002)(106466001)(81156014)(33646002)(50986010)(77096006)(16586007)(316002)(356003)(4326008)(86362001)(36756003)(68736007)(2351001)(305945005)(50466002)(81166006)(48376002)(2906002)(51416003)(47776003)(85426001)(50226002)(6666003)(97736004)(104016004); DIR:OUT; SFP:1101; SCL:1; SRVR:BN6PR03MB2691; H:tx30smr01.am.freescale.net; FPR:; SPF:Fail; PTR:InfoDomainNonexistent; MX:1; A:1; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; BN1BFFO11FD029; 1:Wq/xQVJz2r/zTMsCyh5iN0CS2hnH5VaSwFtw+iksl/89LoSeR+SNSKvho6aDVdUps3GgHbbAr43Fpvegu8UzYbVuFRKDb+GBNIYZNq/U7Qpq5rwLzcwnzE357rLLwbR0 MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: a8be16d4-7b85-4383-de8f-08d537e811fe X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(4534020)(4628075)(201703131517081)(5600026)(4604075)(2017052603285); SRVR:BN6PR03MB2691; X-Microsoft-Exchange-Diagnostics: 1; BN6PR03MB2691; 3:H/OqliQ2LJQnYbBqJ5c93IvXWjLDw0zdrC1Qk7ouIixu1Gcx9tnpE2/0lcSZqC0bu/DVh2bw6h8zOjDQb3gqRqXRdEumtO0xepGEVxYsiI9FLaz830fJ555QVWO+ZKcYwGQccYNsFmbCaf7K6IgbeiDA5D+iPeUGRMEz3g/3of7X5YLc6WwnuBTeBHwf/slvScDUhWlW8id6ZINAOT4QltkD3d+RxSZH14vjfOwHK7cqlvupovMjE51racJVoDZNHYS7P5ZSCgoyMHI77SCb0mgXfDnAHpnyU3MhPhU+/WXP0aiODadl3q/Y3681YsIVOGkL3T253PBbuvcnavefGHz3Jz7CnWBfEPPpTjxx+Jg=; 25:5Ugx6QKnSIjDCAkX4/6mT4Ap/Nm6AS2AucFU0B6PbfNH43fEf2Ogz2gV7f6LfikeAHacy4TZOlnknx2xj2/ZDpGXGnRNLZ59EZBSaQs7su4fQvT82ygQN7aak/S0fn7Wb2jr9AM90zATwLcmtcUa/qxLX8eiOdCirqG2hN40/zwaucFyroY1n98OTbDa4x0Jgo2T/yRAIzZId1u8/fARo2MScZc7McIeKPbRPmmzodQj3PsTsV9rzwaXibAwINBObsa5MVlGLzDyIbxtTIhRBeDTzjsNCAcmrJU16MB++uxNc95iM5hh0MHhDWddDzVCXeIzL/pV4VFkO1ZGF0DsKmOYQIyM9qR0Y96DAcpW8Gk= X-MS-TrafficTypeDiagnostic: BN6PR03MB2691: X-Microsoft-Exchange-Diagnostics: 1; BN6PR03MB2691; 31:wIzF/Clj1E/ktTQcuAD/LByZEQlkjWCaX8l7QKZpq8Buge94I/aMSVRNemuDNn/rYQCxl33LVueYmbpzy6M3V1oQxvvyBtJaVLZ9RdRGMbVIhwGxFWYaz6Zz76BajJ2R799l0Y8XnEUv9xWRiYQSG/4xnYe0IFpQaaB8v9KRnmFiYI/ZJCIEjLwE5pDwCHjJQTaXx8uaVBKu1/8+3RuxKli+ya1ymVoM16nNgDWC8mo=; 4:fSj0QRy8tWSbSNG75FmY56VDPpbwdIAXzup/+bY4JhOWMgdHaqqd8oir5I0Z7tyQLC1ZgjJAPC4fQeukuP5B/OrUFJDRP7VlxXMQQtriusgxGWimhTxzOTlCKv/tFEopLhftZvyTiCviz+pP4VdkUcM+jTywouUDxU6y4qvuWhJFiskYtrm/wW0idZzy2QeqsYuwOBFsXFWovPnW+IAsVRYQbV9rPHoqmBx2lj45MQKt3Ke1aLoXCi13AWuBhS+BvrnNpa7vMAxVR/pS1zrcFIROJwEEHvnHo75VsAxeQVsZ3BT1a2M9UK1j1dq8Uluo X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(185117386973197); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6095135)(2401047)(5005006)(8121501046)(10201501046)(3231022)(3002001)(93006095)(93001095)(6055026)(6096035)(20161123561025)(201703131430075)(201703131433075)(201703131448075)(201703161259150)(201703151042153)(20161123563025)(20161123565025)(20161123559100)(20161123556025)(201708071742011); SRVR:BN6PR03MB2691; BCL:0; PCL:0; RULEID:(100000803101)(100110400095)(400006); SRVR:BN6PR03MB2691; X-Forefront-PRVS: 05079D8470 X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BN6PR03MB2691; 23:WjEVaBuMnaH8RUa7zVaw1c26dmh6hnbcN6GsWj+Ma?= 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 X-Microsoft-Exchange-Diagnostics: 1; BN6PR03MB2691; 6:FbFU2f75ikgHqPqTcfx09+yujTcCKcAvAwvY5Y4FyXf0euoYcVvinY9g1ABzDVrVTxazvhxjpqIJ7JmsqIiDFrP2pB3sAXvgknD4VARmIewFE1i1oSTIlhutdgabJyQvG9HnB3ZA0MNrtS85yt+uK0dCb7fCvsUOB4rY8A0oWGCSohIO9U32Psi32wIYkLDgZ9V777yYya3ApfiYag9Ck5ijwo3vosO3qXseu8SlzqHsqoXoRfEAYTzBpNaA/KyYJmTIGxebPZWr/vAsskzslrmA6CS7t+OhLDxJvbE9RXX1/E/k2LZBCIgImaIczpaVUHgwX5oTUZoiOdxA0HhRpwqvPTcMvRUafgskd700h/Y=; 5:USAXzksy+HBCf7ccv7T5o9vHJG25qfJna6buv8RobwSQwQpm2jAHsT7Z8ifJ7q+yoS/0vBLH087s7STeRNp4g2FBlDNNLJ482/7cEPhJo7OOPGMCZwQBjbw7AB8FndHnhS3bjip4SMUPWPOQ91t4ZqzurfUHtjIK8TGi+/4R+Jc=; 24:cKq2UTwiQ1APMZJgh0ckfUWOor31DK+krP8eMWUvxE5iQou/Ru7jq9cVhsOE80PpU6gmaNzj9ZjBHhY0A7p5XHIXWNRbwiX91YBXHGyHKR0=; 7:FGaroupZbMTuejTGqAHlkD4exaMpwnjuz9wvZ/4KH+m/ixaZkXfTBpBLzPkYTGmJoKSVKYcJkGa7SuysrBaG3m6+Hv7LZShFxQ9/ufEov9Gw9FLjHEnTgouq6B0WOwN5puMVdI8zRE2axrvY8yG/MqifIChR5ZyofMoFA3woRJRVDutzSoMVvNI3H/KYkngu+7G+CK42JvYSFpOIusAMSyO98m7TMAa7y+aYRGtyRqAPDu/oH49WiZfcC7SgiisB SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Nov 2017 11:47:01.4933 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: a8be16d4-7b85-4383-de8f-08d537e811fe X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.168.50]; Helo=[tx30smr01.am.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR03MB2691 Subject: [dpdk-dev] [PATCH 1/3] kni: support for MAC addr change X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" This patch adds following: 1. Option to configure the mac address during create. Generate random address only if the user has not provided any valid address. 2. Inform usespace, if mac address is being changed in linux. 3. Implement default handling of mac address change in the corresponding ethernet device. Signed-off-by: Hemant Agrawal --- doc/guides/sample_app_ug/kernel_nic_interface.rst | 41 +++++++++++++++++++++- examples/kni/main.c | 36 +++++++++++++++++++ .../linuxapp/eal/include/exec-env/rte_kni_common.h | 3 ++ lib/librte_eal/linuxapp/kni/kni_misc.c | 17 +++++---- lib/librte_eal/linuxapp/kni/kni_net.c | 14 +++++++- lib/librte_kni/rte_kni.c | 40 +++++++++++++++++++-- lib/librte_kni/rte_kni.h | 5 +++ test/test/test_kni.c | 2 ++ 8 files changed, 147 insertions(+), 11 deletions(-) -- 2.7.4 diff --git a/doc/guides/sample_app_ug/kernel_nic_interface.rst b/doc/guides/sample_app_ug/kernel_nic_interface.rst index e1ac415..d9d8e4a 100644 --- a/doc/guides/sample_app_ug/kernel_nic_interface.rst +++ b/doc/guides/sample_app_ug/kernel_nic_interface.rst @@ -209,6 +209,12 @@ Dumping the network traffic: #tcpdump -i vEth0_0 +Change the MAC address: + +.. code-block:: console + + #ifconfig vEth0_0 hw ether 0C:01:02:03:04:08 + When the DPDK userspace application is closed, all the KNI devices are deleted from Linux*. Explanation @@ -269,11 +275,15 @@ The code for allocating the kernel NIC interfaces for a specific port is as foll conf.addr = dev_info.pci_dev->addr; conf.id = dev_info.pci_dev->id; + /* Get the interface default mac address */ + rte_eth_macaddr_get(port_id, struct ether_addr *)&conf.mac_addr); + memset(&ops, 0, sizeof(ops)); ops.port_id = port_id; ops.change_mtu = kni_change_mtu; ops.config_network_if = kni_config_network_interface; + ops.config_mac_address = kni_config_mac_address; kni = rte_kni_alloc(pktmbuf_pool, &conf, &ops); } else @@ -502,13 +512,19 @@ Callbacks for Kernel Requests To execute specific PMD operations in user space requested by some Linux* commands, callbacks must be implemented and filled in the struct rte_kni_ops structure. -Currently, setting a new MTU and configuring the network interface (up/ down) are supported. +Currently, setting a new MTU, change in mac address and configuring the network interface(up/ down) +are supported. +Default implementation for following is available in rte_kni library. Application +may choose to not implement follwoing callbacks: + ``config_mac_address`` + .. code-block:: c static struct rte_kni_ops kni_ops = { .change_mtu = kni_change_mtu, .config_network_if = kni_config_network_interface, + .config_mac_address = kni_config_mac_address, }; /* Callback for request of changing MTU */ @@ -587,3 +603,26 @@ Currently, setting a new MTU and configuring the network interface (up/ down) ar RTE_LOG(ERR, APP, "Failed to start port %d\n", port_id); return ret; } + + /* Callback for request of configuring device mac address */ + + static int + kni_config_mac_address(uint16_t port_id, uint8_t mac_addr[]) + { + int ret = 0; + + if (port_id >= rte_eth_dev_count() || port_id >= RTE_MAX_ETHPORTS) { + RTE_LOG(ERR, KNI, "Invalid port id %d\n", port_id); + return -EINVAL; + } + + RTE_LOG(INFO, KNI, "Configure mac address of %d", port_id); + /* Configure network interface mac address */ + ret = rte_eth_dev_default_mac_addr_set(port_id, + (struct ether_addr *)mac_addr); + if (ret < 0) + RTE_LOG(ERR, KNI, "Failed to config mac_addr for port %d\n", + port_id); + + return ret; + } diff --git a/examples/kni/main.c b/examples/kni/main.c index 3f17385..1c251c2 100644 --- a/examples/kni/main.c +++ b/examples/kni/main.c @@ -163,6 +163,7 @@ static struct kni_interface_stats kni_stats[RTE_MAX_ETHPORTS]; static int kni_change_mtu(uint16_t port_id, unsigned int new_mtu); static int kni_config_network_interface(uint16_t port_id, uint8_t if_up); +static int kni_config_mac_address(uint16_t port_id, uint8_t mac_addr[]); static rte_atomic32_t kni_stop = RTE_ATOMIC32_INIT(0); @@ -766,6 +767,37 @@ kni_config_network_interface(uint16_t port_id, uint8_t if_up) return ret; } +static void +print_ethaddr(const char *name, struct ether_addr *mac_addr) +{ + char buf[ETHER_ADDR_FMT_SIZE]; + ether_format_addr(buf, ETHER_ADDR_FMT_SIZE, mac_addr); + RTE_LOG(INFO, APP, "\t%s%s\n", name, buf); +} + +/* Callback for request of configuring mac address */ +static int +kni_config_mac_address(uint16_t port_id, uint8_t mac_addr[]) +{ + int ret = 0; + + if (port_id >= rte_eth_dev_count() || port_id >= RTE_MAX_ETHPORTS) { + RTE_LOG(ERR, APP, "Invalid port id %d\n", port_id); + return -EINVAL; + } + + RTE_LOG(INFO, APP, "Configure mac address of %d\n", port_id); + print_ethaddr("Address:", (struct ether_addr *)mac_addr); + + ret = rte_eth_dev_default_mac_addr_set(port_id, + (struct ether_addr *)mac_addr); + if (ret < 0) + RTE_LOG(ERR, APP, "Failed to config mac_addr for port %d\n", + port_id); + + return ret; +} + static int kni_alloc(uint16_t port_id) { @@ -809,11 +841,15 @@ kni_alloc(uint16_t port_id) conf.addr = dev_info.pci_dev->addr; conf.id = dev_info.pci_dev->id; } + /* Get the interface default mac address */ + rte_eth_macaddr_get(port_id, + (struct ether_addr *)&conf.mac_addr); memset(&ops, 0, sizeof(ops)); ops.port_id = port_id; ops.change_mtu = kni_change_mtu; ops.config_network_if = kni_config_network_interface; + ops.config_mac_address = kni_config_mac_address; kni = rte_kni_alloc(pktmbuf_pool, &conf, &ops); } else diff --git a/lib/librte_eal/linuxapp/eal/include/exec-env/rte_kni_common.h b/lib/librte_eal/linuxapp/eal/include/exec-env/rte_kni_common.h index 2ac879f..1a760de 100644 --- a/lib/librte_eal/linuxapp/eal/include/exec-env/rte_kni_common.h +++ b/lib/librte_eal/linuxapp/eal/include/exec-env/rte_kni_common.h @@ -80,6 +80,7 @@ enum rte_kni_req_id { RTE_KNI_REQ_UNKNOWN = 0, RTE_KNI_REQ_CHANGE_MTU, RTE_KNI_REQ_CFG_NETWORK_IF, + RTE_KNI_REQ_CHANGE_MAC_ADDR, RTE_KNI_REQ_MAX, }; @@ -92,6 +93,7 @@ struct rte_kni_request { union { uint32_t new_mtu; /**< New MTU */ uint8_t if_up; /**< 1: interface up, 0: interface down */ + uint8_t mac_addr[6]; /**< MAC address for interface */ }; int32_t result; /**< Result for processing request */ } __attribute__((__packed__)); @@ -168,6 +170,7 @@ struct rte_kni_device_info { /* mbuf size */ unsigned mbuf_size; + char mac_addr[6]; }; #define KNI_DEVICE "kni" diff --git a/lib/librte_eal/linuxapp/kni/kni_misc.c b/lib/librte_eal/linuxapp/kni/kni_misc.c index 7590f1f..b524d30 100644 --- a/lib/librte_eal/linuxapp/kni/kni_misc.c +++ b/lib/librte_eal/linuxapp/kni/kni_misc.c @@ -458,12 +458,17 @@ kni_ioctl_create(struct net *net, uint32_t ioctl_num, if (kni->lad_dev) ether_addr_copy(net_dev->dev_addr, kni->lad_dev->dev_addr); - else - /* - * Generate random mac address. eth_random_addr() is the newer - * version of generating mac address in linux kernel. - */ - random_ether_addr(net_dev->dev_addr); + else { + /* if user has provided a valid mac address */ + if (is_valid_ether_addr((unsigned char *)(dev_info.mac_addr))) + memcpy(net_dev->dev_addr, dev_info.mac_addr, ETH_ALEN); + else + /* + * Generate random mac address. eth_random_addr() is the + * newer version of generating mac address in kernel. + */ + random_ether_addr(net_dev->dev_addr); + } ret = register_netdev(net_dev); if (ret) { diff --git a/lib/librte_eal/linuxapp/kni/kni_net.c b/lib/librte_eal/linuxapp/kni/kni_net.c index db9f489..3e02ea1 100644 --- a/lib/librte_eal/linuxapp/kni/kni_net.c +++ b/lib/librte_eal/linuxapp/kni/kni_net.c @@ -668,12 +668,24 @@ kni_net_rebuild_header(struct sk_buff *skb) static int kni_net_set_mac(struct net_device *netdev, void *p) { + int ret; + struct rte_kni_request req; + struct kni_dev *kni; struct sockaddr *addr = p; + memset(&req, 0, sizeof(req)); + req.req_id = RTE_KNI_REQ_CHANGE_MAC_ADDR; + if (!is_valid_ether_addr((unsigned char *)(addr->sa_data))) return -EADDRNOTAVAIL; + + memcpy(req.mac_addr, addr->sa_data, netdev->addr_len); memcpy(netdev->dev_addr, addr->sa_data, netdev->addr_len); - return 0; + + kni = netdev_priv(netdev); + ret = kni_net_process_request(kni, &req); + + return (ret == 0 ? req.result : ret); } #ifdef HAVE_CHANGE_CARRIER_CB diff --git a/lib/librte_kni/rte_kni.c b/lib/librte_kni/rte_kni.c index 8eca8c0..04db3df 100644 --- a/lib/librte_kni/rte_kni.c +++ b/lib/librte_kni/rte_kni.c @@ -368,6 +368,8 @@ rte_kni_alloc(struct rte_mempool *pktmbuf_pool, dev_info.group_id = conf->group_id; dev_info.mbuf_size = conf->mbuf_size; + memcpy(dev_info.mac_addr, conf->mac_addr, ETHER_ADDR_LEN); + snprintf(ctx->name, RTE_KNI_NAMESIZE, "%s", intf_name); snprintf(dev_info.name, RTE_KNI_NAMESIZE, "%s", intf_name); @@ -528,6 +530,28 @@ rte_kni_release(struct rte_kni *kni) return 0; } +/* default callback for request of configuring device mac address */ +static int +kni_config_mac_address(uint16_t port_id, uint8_t mac_addr[]) +{ + int ret = 0; + + if (port_id >= rte_eth_dev_count() || port_id >= RTE_MAX_ETHPORTS) { + RTE_LOG(ERR, KNI, "Invalid port id %d\n", port_id); + return -EINVAL; + } + + RTE_LOG(INFO, KNI, "Configure mac address of %d", port_id); + + ret = rte_eth_dev_default_mac_addr_set(port_id, + (struct ether_addr *)mac_addr); + if (ret < 0) + RTE_LOG(ERR, KNI, "Failed to config mac_addr for port %d\n", + port_id); + + return ret; +} + int rte_kni_handle_request(struct rte_kni *kni) { @@ -559,6 +583,14 @@ rte_kni_handle_request(struct rte_kni *kni) req->result = kni->ops.config_network_if(\ kni->ops.port_id, req->if_up); break; + case RTE_KNI_REQ_CHANGE_MAC_ADDR: /* Change MAC Address */ + if (kni->ops.config_mac_address) + req->result = kni->ops.config_mac_address( + kni->ops.port_id, req->mac_addr); + else + req->result = kni_config_mac_address( + kni->ops.port_id, req->mac_addr); + break; default: RTE_LOG(ERR, KNI, "Unknown request id %u\n", req->req_id); req->result = -EINVAL; @@ -707,7 +739,9 @@ kni_check_request_register(struct rte_kni_ops *ops) if( NULL == ops ) return KNI_REQ_NO_REGISTER; - if((NULL == ops->change_mtu) && (NULL == ops->config_network_if)) + if ((NULL == ops->change_mtu) + && (NULL == ops->config_network_if) + && (NULL == ops->config_mac_address)) return KNI_REQ_NO_REGISTER; return KNI_REQ_REGISTERED; @@ -746,8 +780,8 @@ rte_kni_unregister_handlers(struct rte_kni *kni) return -1; } - kni->ops.change_mtu = NULL; - kni->ops.config_network_if = NULL; + memset(&kni->ops, 0, sizeof(struct rte_kni_ops)); + return 0; } void diff --git a/lib/librte_kni/rte_kni.h b/lib/librte_kni/rte_kni.h index d43b5b2..a53329b 100644 --- a/lib/librte_kni/rte_kni.h +++ b/lib/librte_kni/rte_kni.h @@ -49,6 +49,7 @@ #include #include #include +#include #include @@ -70,6 +71,9 @@ struct rte_kni_ops { /* Pointer to function of configuring network interface */ int (*config_network_if)(uint16_t port_id, uint8_t if_up); + + /* Pointer to function of configuring mac address */ + int (*config_mac_address)(uint16_t port_id, uint8_t mac_addr[]); }; /** @@ -87,6 +91,7 @@ struct rte_kni_conf { unsigned mbuf_size; /* mbuf size */ struct rte_pci_addr addr; struct rte_pci_id id; + char mac_addr[ETHER_ADDR_LEN]; /* MAC address assigned to KNI */ __extension__ uint8_t force_bind : 1; /* Flag to bind kernel thread */ diff --git a/test/test/test_kni.c b/test/test/test_kni.c index b956727..06448c9 100644 --- a/test/test/test_kni.c +++ b/test/test/test_kni.c @@ -103,6 +103,7 @@ static const struct rte_eth_conf port_conf = { static struct rte_kni_ops kni_ops = { .change_mtu = NULL, .config_network_if = NULL, + .config_mac_address = NULL, }; static unsigned lcore_master, lcore_ingress, lcore_egress; @@ -260,6 +261,7 @@ test_kni_register_handler_mp(void) struct rte_kni_ops ops = { .change_mtu = kni_change_mtu, .config_network_if = NULL, + .config_mac_address = NULL, }; if (!kni) {