examples/ip_pipeline: support rule TTL stats read
authorCristian Dumitrescu <cristian.dumitrescu@intel.com>
Tue, 30 Oct 2018 18:28:48 +0000 (18:28 +0000)
committerCristian Dumitrescu <cristian.dumitrescu@intel.com>
Fri, 2 Nov 2018 11:29:52 +0000 (12:29 +0100)
Add support for the table rule TTL stats read operation.

Signed-off-by: Cristian Dumitrescu <cristian.dumitrescu@intel.com>
Signed-off-by: Jasvinder Singh <jasvinder.singh@intel.com>
examples/ip_pipeline/cli.c
examples/ip_pipeline/pipeline.h
examples/ip_pipeline/thread.c

index 78539d1..6561152 100644 (file)
@@ -5311,15 +5311,100 @@ cmd_pipeline_table_dscp(char **tokens,
 
 
 static const char cmd_pipeline_table_rule_ttl_read_help[] =
-"pipeline <pipeline_name> table <table_id> rule read ttl [clear]\n";
+"pipeline <pipeline_name> table <table_id> rule read ttl [clear]\n"
+"     match <match>\n";
 
 static void
 cmd_pipeline_table_rule_ttl_read(char **tokens,
-       uint32_t n_tokens __rte_unused,
+       uint32_t n_tokens,
        char *out,
        size_t out_size)
 {
-       snprintf(out, out_size, MSG_CMD_UNIMPLEM, tokens[0]);
+       struct table_rule_match m;
+       struct rte_table_action_ttl_counters stats;
+       char *pipeline_name;
+       uint32_t table_id, n_tokens_parsed;
+       int clear = 0, status;
+
+       if (n_tokens < 7) {
+               snprintf(out, out_size, MSG_ARG_MISMATCH, tokens[0]);
+               return;
+       }
+
+       pipeline_name = tokens[1];
+
+       if (strcmp(tokens[2], "table") != 0) {
+               snprintf(out, out_size, MSG_ARG_NOT_FOUND, "table");
+               return;
+       }
+
+       if (parser_read_uint32(&table_id, tokens[3]) != 0) {
+               snprintf(out, out_size, MSG_ARG_INVALID, "table_id");
+               return;
+       }
+
+       if (strcmp(tokens[4], "rule") != 0) {
+               snprintf(out, out_size, MSG_ARG_NOT_FOUND, "rule");
+               return;
+       }
+
+       if (strcmp(tokens[5], "read") != 0) {
+               snprintf(out, out_size, MSG_ARG_NOT_FOUND, "read");
+               return;
+       }
+
+       if (strcmp(tokens[6], "ttl") != 0) {
+               snprintf(out, out_size, MSG_ARG_NOT_FOUND, "ttl");
+               return;
+       }
+
+       n_tokens -= 7;
+       tokens += 7;
+
+       /* clear */
+       if (n_tokens && (strcmp(tokens[0], "clear") == 0)) {
+               clear = 1;
+
+               n_tokens--;
+               tokens++;
+       }
+
+       /* match */
+       if ((n_tokens == 0) || strcmp(tokens[0], "match")) {
+               snprintf(out, out_size, MSG_ARG_NOT_FOUND, "match");
+               return;
+       }
+
+       n_tokens_parsed = parse_match(tokens,
+               n_tokens,
+               out,
+               out_size,
+               &m);
+       if (n_tokens_parsed == 0)
+               return;
+       n_tokens -= n_tokens_parsed;
+       tokens += n_tokens_parsed;
+
+       /* end */
+       if (n_tokens) {
+               snprintf(out, out_size, MSG_ARG_INVALID, tokens[0]);
+               return;
+       }
+
+       /* Read table rule TTL stats. */
+       status = pipeline_table_rule_ttl_read(pipeline_name,
+               table_id,
+               &m,
+               &stats,
+               clear);
+       if (status) {
+               snprintf(out, out_size, MSG_CMD_FAIL, tokens[0]);
+               return;
+       }
+
+       /* Print stats. */
+       snprintf(out, out_size, "Packets: %" PRIu64 "\n",
+               stats.n_packets);
 }
 
 
index 57553bd..4e2d328 100644 (file)
@@ -386,7 +386,7 @@ pipeline_table_dscp_table_update(const char *pipeline_name,
 int
 pipeline_table_rule_ttl_read(const char *pipeline_name,
        uint32_t table_id,
-       void *data,
+       struct table_rule_match *match,
        struct rte_table_action_ttl_counters *stats,
        int clear);
 struct table_rule *
index 0252db9..e1142d9 100644 (file)
@@ -2100,31 +2100,40 @@ pipeline_table_dscp_table_update(const char *pipeline_name,
 int
 pipeline_table_rule_ttl_read(const char *pipeline_name,
        uint32_t table_id,
-       void *data,
+       struct table_rule_match *match,
        struct rte_table_action_ttl_counters *stats,
        int clear)
 {
        struct pipeline *p;
+       struct table *table;
        struct pipeline_msg_req *req;
        struct pipeline_msg_rsp *rsp;
+       struct table_rule *rule;
        int status;
 
        /* Check input params */
        if ((pipeline_name == NULL) ||
-               (data == NULL) ||
+               (match == NULL) ||
                (stats == NULL))
                return -1;
 
        p = pipeline_find(pipeline_name);
        if ((p == NULL) ||
-               (table_id >= p->n_tables))
+               (table_id >= p->n_tables) ||
+               match_check(match, p, table_id))
                return -1;
 
-       if (!pipeline_is_running(p)) {
-               struct rte_table_action *a = p->table[table_id].a;
+       table = &p->table[table_id];
+       if (!table->ap->params.ttl.n_packets_enabled)
+               return -1;
+
+       rule = table_rule_find(table, match);
+       if (rule == NULL)
+               return -1;
 
-               status = rte_table_action_ttl_read(a,
-                               data,
+       if (!pipeline_is_running(p)) {
+               status = rte_table_action_ttl_read(table->a,
+                               rule->data,
                                stats,
                                clear);
 
@@ -2139,7 +2148,7 @@ pipeline_table_rule_ttl_read(const char *pipeline_name,
        /* Write request */
        req->type = PIPELINE_REQ_TABLE_RULE_TTL_READ;
        req->id = table_id;
-       req->table_rule_ttl_read.data = data;
+       req->table_rule_ttl_read.data = rule->data;
        req->table_rule_ttl_read.clear = clear;
 
        /* Send request and wait for response */
@@ -2149,7 +2158,7 @@ pipeline_table_rule_ttl_read(const char *pipeline_name,
 
        /* Read response */
        status = rsp->status;
-       if (status)
+       if (status == 0)
                memcpy(stats, &rsp->table_rule_ttl_read.stats, sizeof(*stats));
 
        /* Free response */