From 08eb2bb205f998a75dacd1f3b999ec1a10160b35 Mon Sep 17 00:00:00 2001 From: Dave Barach Date: Wed, 15 Apr 2020 09:34:43 -0400 Subject: pg: set vnet buffer flags in pg streams See .../extras/pg/checksum_offload.pg for a nontrivial example, which deliberately sets bogus ip and udp checksums in the generated packets, then fixes the mess with (software emulated) hardware checksum offload. Validated via "pcap dispatch trace on max 1000 buffer-trace pg-input 100". Packets stuffed into loop1-output have the configured bogus ip and udp checksums. vnet_calc_checksums_inline(...) fixes the checksums, which are correct when packets visit loop1-tx. The packet generator is a dumb robot in this regard. If you ask for a ridiculous flag combination - example: ip4 and ip6 - your mileage may vary. Type: feature Signed-off-by: Dave Barach Change-Id: I6d9e790f373bcd9e445a89113ca8e4c8f9aa9419 --- src/vnet/pg/pg.h | 3 +++ 1 file changed, 3 insertions(+) (limited to 'src/vnet/pg/pg.h') diff --git a/src/vnet/pg/pg.h b/src/vnet/pg/pg.h index 55bc75dc282..a6616d9ced7 100644 --- a/src/vnet/pg/pg.h +++ b/src/vnet/pg/pg.h @@ -123,6 +123,9 @@ typedef struct pg_stream_t for max_packet_bytes. */ u32 buffer_bytes; + /* Buffer flags to set in each packet e.g. checksum offload flags */ + u32 buffer_flags; + /* Last packet length if packet size edit type is increment. */ u32 last_increment_packet_size; -- cgit 1.2.3-korg