examples: add eal cleanup to examples
[dpdk.git] / examples / ipsec-secgw / ipsec-secgw.c
index 6d02341..a9f9b58 100644 (file)
 #include <rte_eventdev.h>
 #include <rte_ip.h>
 #include <rte_ip_frag.h>
+#include <rte_alarm.h>
 
 #include "event_helper.h"
+#include "flow.h"
 #include "ipsec.h"
 #include "ipsec_worker.h"
 #include "parser.h"
@@ -62,8 +64,8 @@ volatile bool force_quit;
 
 #define CDEV_QUEUE_DESC 2048
 #define CDEV_MAP_ENTRIES 16384
-#define CDEV_MP_NB_OBJS 1024
 #define CDEV_MP_CACHE_SZ 64
+#define CDEV_MP_CACHE_MULTIPLIER 1.5 /* from rte_mempool.c */
 #define MAX_QUEUE_PAIRS 1
 
 #define BURST_TX_DRAIN_US 100 /* TX drain every ~100us */
@@ -182,7 +184,8 @@ static uint64_t frag_ttl_ns = MAX_FRAG_TTL_NS;
 /* application wide librte_ipsec/SA parameters */
 struct app_sa_prm app_sa_prm = {
                        .enable = 0,
-                       .cache_sz = SA_CACHE_SZ
+                       .cache_sz = SA_CACHE_SZ,
+                       .udp_encap = 0
                };
 static const char *cfgfile;
 
@@ -288,12 +291,79 @@ adjust_ipv6_pktlen(struct rte_mbuf *m, const struct rte_ipv6_hdr *iph,
        }
 }
 
+#if (STATS_INTERVAL > 0)
+
+/* Print out statistics on packet distribution */
+static void
+print_stats_cb(__rte_unused void *param)
+{
+       uint64_t total_packets_dropped, total_packets_tx, total_packets_rx;
+       float burst_percent, rx_per_call, tx_per_call;
+       unsigned int coreid;
+
+       total_packets_dropped = 0;
+       total_packets_tx = 0;
+       total_packets_rx = 0;
+
+       const char clr[] = { 27, '[', '2', 'J', '\0' };
+       const char topLeft[] = { 27, '[', '1', ';', '1', 'H', '\0' };
+
+       /* Clear screen and move to top left */
+       printf("%s%s", clr, topLeft);
+
+       printf("\nCore statistics ====================================");
+
+       for (coreid = 0; coreid < RTE_MAX_LCORE; coreid++) {
+               /* skip disabled cores */
+               if (rte_lcore_is_enabled(coreid) == 0)
+                       continue;
+               burst_percent = (float)(core_statistics[coreid].burst_rx * 100)/
+                                       core_statistics[coreid].rx;
+               rx_per_call =  (float)(core_statistics[coreid].rx)/
+                                      core_statistics[coreid].rx_call;
+               tx_per_call =  (float)(core_statistics[coreid].tx)/
+                                      core_statistics[coreid].tx_call;
+               printf("\nStatistics for core %u ------------------------------"
+                          "\nPackets received: %20"PRIu64
+                          "\nPackets sent: %24"PRIu64
+                          "\nPackets dropped: %21"PRIu64
+                          "\nBurst percent: %23.2f"
+                          "\nPackets per Rx call: %17.2f"
+                          "\nPackets per Tx call: %17.2f",
+                          coreid,
+                          core_statistics[coreid].rx,
+                          core_statistics[coreid].tx,
+                          core_statistics[coreid].dropped,
+                          burst_percent,
+                          rx_per_call,
+                          tx_per_call);
+
+               total_packets_dropped += core_statistics[coreid].dropped;
+               total_packets_tx += core_statistics[coreid].tx;
+               total_packets_rx += core_statistics[coreid].rx;
+       }
+       printf("\nAggregate statistics ==============================="
+                  "\nTotal packets received: %14"PRIu64
+                  "\nTotal packets sent: %18"PRIu64
+                  "\nTotal packets dropped: %15"PRIu64,
+                  total_packets_rx,
+                  total_packets_tx,
+                  total_packets_dropped);
+       printf("\n====================================================\n");
+
+       rte_eal_alarm_set(STATS_INTERVAL * US_PER_S, print_stats_cb, NULL);
+}
+#endif /* STATS_INTERVAL */
+
 static inline void
 prepare_one_packet(struct rte_mbuf *pkt, struct ipsec_traffic *t)
 {
        const struct rte_ether_hdr *eth;
        const struct rte_ipv4_hdr *iph4;
        const struct rte_ipv6_hdr *iph6;
+       const struct rte_udp_hdr *udp;
+       uint16_t ip4_hdr_len;
+       uint16_t nat_port;
 
        eth = rte_pktmbuf_mtod(pkt, const struct rte_ether_hdr *);
        if (eth->ether_type == rte_cpu_to_be_16(RTE_ETHER_TYPE_IPV4)) {
@@ -302,9 +372,28 @@ prepare_one_packet(struct rte_mbuf *pkt, struct ipsec_traffic *t)
                        RTE_ETHER_HDR_LEN);
                adjust_ipv4_pktlen(pkt, iph4, 0);
 
-               if (iph4->next_proto_id == IPPROTO_ESP)
+               switch (iph4->next_proto_id) {
+               case IPPROTO_ESP:
                        t->ipsec.pkts[(t->ipsec.num)++] = pkt;
-               else {
+                       break;
+               case IPPROTO_UDP:
+                       if (app_sa_prm.udp_encap == 1) {
+                               ip4_hdr_len = ((iph4->version_ihl &
+                                       RTE_IPV4_HDR_IHL_MASK) *
+                                       RTE_IPV4_IHL_MULTIPLIER);
+                               udp = rte_pktmbuf_mtod_offset(pkt,
+                                       struct rte_udp_hdr *, ip4_hdr_len);
+                               nat_port = rte_cpu_to_be_16(IPSEC_NAT_T_PORT);
+                               if (udp->src_port == nat_port ||
+                                       udp->dst_port == nat_port){
+                                       t->ipsec.pkts[(t->ipsec.num)++] = pkt;
+                                       pkt->packet_type |=
+                                               MBUF_PTYPE_TUNNEL_ESP_IN_UDP;
+                                       break;
+                               }
+                       }
+               /* Fall through */
+               default:
                        t->ip4.data[t->ip4.num] = &iph4->next_proto_id;
                        t->ip4.pkts[(t->ip4.num)++] = pkt;
                }
@@ -333,13 +422,29 @@ prepare_one_packet(struct rte_mbuf *pkt, struct ipsec_traffic *t)
 
                /* drop packet when IPv6 header exceeds first segment length */
                if (unlikely(l3len > pkt->data_len)) {
-                       rte_pktmbuf_free(pkt);
+                       free_pkts(&pkt, 1);
                        return;
                }
 
-               if (next_proto == IPPROTO_ESP)
+               switch (iph6->proto) {
+               case IPPROTO_ESP:
                        t->ipsec.pkts[(t->ipsec.num)++] = pkt;
-               else {
+                       break;
+               case IPPROTO_UDP:
+                       if (app_sa_prm.udp_encap == 1) {
+                               udp = rte_pktmbuf_mtod_offset(pkt,
+                                       struct rte_udp_hdr *, l3len);
+                               nat_port = rte_cpu_to_be_16(IPSEC_NAT_T_PORT);
+                               if (udp->src_port == nat_port ||
+                                       udp->dst_port == nat_port){
+                                       t->ipsec.pkts[(t->ipsec.num)++] = pkt;
+                                       pkt->packet_type |=
+                                               MBUF_PTYPE_TUNNEL_ESP_IN_UDP;
+                                       break;
+                               }
+                       }
+               /* Fall through */
+               default:
                        t->ip6.data[t->ip6.num] = &iph6->proto;
                        t->ip6.pkts[(t->ip6.num)++] = pkt;
                }
@@ -350,7 +455,7 @@ prepare_one_packet(struct rte_mbuf *pkt, struct ipsec_traffic *t)
                /* Unknown/Unsupported type, drop the packet */
                RTE_LOG(ERR, IPSEC, "Unsupported packet type 0x%x\n",
                        rte_be_to_cpu_16(eth->ether_type));
-               rte_pktmbuf_free(pkt);
+               free_pkts(&pkt, 1);
                return;
        }
 
@@ -361,7 +466,8 @@ prepare_one_packet(struct rte_mbuf *pkt, struct ipsec_traffic *t)
         * with the security session.
         */
 
-       if (pkt->ol_flags & PKT_RX_SEC_OFFLOAD) {
+       if (pkt->ol_flags & PKT_RX_SEC_OFFLOAD &&
+                       rte_security_dynfield_is_registered()) {
                struct ipsec_sa *sa;
                struct ipsec_mbuf_metadata *priv;
                struct rte_security_ctx *ctx = (struct rte_security_ctx *)
@@ -371,10 +477,8 @@ prepare_one_packet(struct rte_mbuf *pkt, struct ipsec_traffic *t)
                /* Retrieve the userdata registered. Here, the userdata
                 * registered is the SA pointer.
                 */
-
-               sa = (struct ipsec_sa *)
-                               rte_security_get_userdata(ctx, pkt->udata64);
-
+               sa = (struct ipsec_sa *)rte_security_get_userdata(ctx,
+                               *rte_security_dynfield(pkt));
                if (sa == NULL) {
                        /* userdata could not be retrieved */
                        return;
@@ -477,9 +581,12 @@ send_burst(struct lcore_conf *qconf, uint16_t n, uint16_t port)
        prepare_tx_burst(m_table, n, port, qconf);
 
        ret = rte_eth_tx_burst(port, queueid, m_table, n);
+
+       core_stats_update_tx(ret);
+
        if (unlikely(ret < n)) {
                do {
-                       rte_pktmbuf_free(m_table[ret]);
+                       free_pkts(&m_table[ret], 1);
                } while (++ret < n);
        }
 
@@ -525,7 +632,7 @@ send_fragment_packet(struct lcore_conf *qconf, struct rte_mbuf *m,
                        "error code: %d\n",
                        __func__, m->pkt_len, rte_errno);
 
-       rte_pktmbuf_free(m);
+       free_pkts(&m, 1);
        return len;
 }
 
@@ -550,7 +657,7 @@ send_single_packet(struct rte_mbuf *m, uint16_t port, uint8_t proto)
        } else if (frag_tbl_sz > 0)
                len = send_fragment_packet(qconf, m, port, proto);
        else
-               rte_pktmbuf_free(m);
+               free_pkts(&m, 1);
 
        /* enough pkts to be sent */
        if (unlikely(len == MAX_PKT_BURST)) {
@@ -584,19 +691,19 @@ inbound_sp_sa(struct sp_ctx *sp, struct sa_ctx *sa, struct traffic_type *ip,
                        continue;
                }
                if (res == DISCARD) {
-                       rte_pktmbuf_free(m);
+                       free_pkts(&m, 1);
                        continue;
                }
 
                /* Only check SPI match for processed IPSec packets */
                if (i < lim && ((m->ol_flags & PKT_RX_SEC_OFFLOAD) == 0)) {
-                       rte_pktmbuf_free(m);
+                       free_pkts(&m, 1);
                        continue;
                }
 
                sa_idx = res - 1;
                if (!inbound_sa_check(sa, m, sa_idx)) {
-                       rte_pktmbuf_free(m);
+                       free_pkts(&m, 1);
                        continue;
                }
                ip->pkts[j++] = m;
@@ -631,7 +738,7 @@ split46_traffic(struct ipsec_traffic *trf, struct rte_mbuf *mb[], uint32_t num)
                                        offsetof(struct ip6_hdr, ip6_nxt));
                        n6++;
                } else
-                       rte_pktmbuf_free(m);
+                       free_pkts(&m, 1);
        }
 
        trf->ip4.num = n4;
@@ -683,7 +790,7 @@ outbound_sp(struct sp_ctx *sp, struct traffic_type *ip,
                m = ip->pkts[i];
                sa_idx = ip->res[i] - 1;
                if (ip->res[i] == DISCARD)
-                       rte_pktmbuf_free(m);
+                       free_pkts(&m, 1);
                else if (ip->res[i] == BYPASS)
                        ip->pkts[j++] = m;
                else {
@@ -702,8 +809,7 @@ process_pkts_outbound(struct ipsec_ctx *ipsec_ctx,
        uint16_t idx, nb_pkts_out, i;
 
        /* Drop any IPsec traffic from protected ports */
-       for (i = 0; i < traffic->ipsec.num; i++)
-               rte_pktmbuf_free(traffic->ipsec.pkts[i]);
+       free_pkts(traffic->ipsec.pkts, traffic->ipsec.num);
 
        traffic->ipsec.num = 0;
 
@@ -743,14 +849,12 @@ process_pkts_inbound_nosp(struct ipsec_ctx *ipsec_ctx,
        uint32_t nb_pkts_in, i, idx;
 
        /* Drop any IPv4 traffic from unprotected ports */
-       for (i = 0; i < traffic->ip4.num; i++)
-               rte_pktmbuf_free(traffic->ip4.pkts[i]);
+       free_pkts(traffic->ip4.pkts, traffic->ip4.num);
 
        traffic->ip4.num = 0;
 
        /* Drop any IPv6 traffic from unprotected ports */
-       for (i = 0; i < traffic->ip6.num; i++)
-               rte_pktmbuf_free(traffic->ip6.pkts[i]);
+       free_pkts(traffic->ip6.pkts, traffic->ip6.num);
 
        traffic->ip6.num = 0;
 
@@ -786,8 +890,7 @@ process_pkts_outbound_nosp(struct ipsec_ctx *ipsec_ctx,
        struct ip *ip;
 
        /* Drop any IPsec traffic from protected ports */
-       for (i = 0; i < traffic->ipsec.num; i++)
-               rte_pktmbuf_free(traffic->ipsec.pkts[i]);
+       free_pkts(traffic->ipsec.pkts, traffic->ipsec.num);
 
        n = 0;
 
@@ -901,7 +1004,7 @@ route4_pkts(struct rt_ctx *rt_ctx, struct rte_mbuf *pkts[], uint8_t nb_pkts)
                }
 
                if ((pkt_hop & RTE_LPM_LOOKUP_SUCCESS) == 0) {
-                       rte_pktmbuf_free(pkts[i]);
+                       free_pkts(&pkts[i], 1);
                        continue;
                }
                send_single_packet(pkts[i], pkt_hop & 0xff, IPPROTO_IP);
@@ -953,7 +1056,7 @@ route6_pkts(struct rt_ctx *rt_ctx, struct rte_mbuf *pkts[], uint8_t nb_pkts)
                }
 
                if (pkt_hop == -1) {
-                       rte_pktmbuf_free(pkts[i]);
+                       free_pkts(&pkts[i], 1);
                        continue;
                }
                send_single_packet(pkts[i], pkt_hop & 0xff, IPPROTO_IPV6);
@@ -1169,8 +1272,10 @@ ipsec_poll_mode_worker(void)
                        nb_rx = rte_eth_rx_burst(portid, queueid,
                                        pkts, MAX_PKT_BURST);
 
-                       if (nb_rx > 0)
+                       if (nb_rx > 0) {
+                               core_stats_update_rx(nb_rx);
                                process_pkts(qconf, pkts, nb_rx, portid);
+                       }
 
                        /* dequeue and process completed crypto-ops */
                        if (is_unprotected_port(portid))
@@ -1776,6 +1881,7 @@ check_all_ports_link_status(uint32_t port_mask)
        uint8_t count, all_ports_up, print_flag = 0;
        struct rte_eth_link link;
        int ret;
+       char link_status_text[RTE_ETH_LINK_MAX_STR_LEN];
 
        printf("\nChecking link status");
        fflush(stdout);
@@ -1795,14 +1901,10 @@ check_all_ports_link_status(uint32_t port_mask)
                        }
                        /* print link status if flag set */
                        if (print_flag == 1) {
-                               if (link.link_status)
-                                       printf(
-                                       "Port%d Link Up - speed %u Mbps -%s\n",
-                                               portid, link.link_speed,
-                               (link.link_duplex == ETH_LINK_FULL_DUPLEX) ?
-                                       ("full-duplex") : ("half-duplex\n"));
-                               else
-                                       printf("Port %d Link Down\n", portid);
+                               rte_eth_link_to_str(link_status_text,
+                                       sizeof(link_status_text), &link);
+                               printf("Port %d %s\n", portid,
+                                      link_status_text);
                                continue;
                        }
                        /* clear all_ports_up flag if any link down */
@@ -2025,10 +2127,11 @@ cryptodevs_init(uint16_t req_queue_num)
                dev_conf.ff_disable = RTE_CRYPTODEV_FF_ASYMMETRIC_CRYPTO;
 
                uint32_t dev_max_sess = cdev_info.sym.max_nb_sessions;
-               if (dev_max_sess != 0 && dev_max_sess < CDEV_MP_NB_OBJS)
+               if (dev_max_sess != 0 &&
+                               dev_max_sess < get_nb_crypto_sessions())
                        rte_exit(EXIT_FAILURE,
                                "Device does not support at least %u "
-                               "sessions", CDEV_MP_NB_OBJS);
+                               "sessions", get_nb_crypto_sessions());
 
                if (rte_cryptodev_configure(cdev_id, &dev_conf))
                        rte_panic("Failed to initialize cryptodev %u\n",
@@ -2280,12 +2383,16 @@ session_pool_init(struct socket_ctx *ctx, int32_t socket_id, size_t sess_sz)
 {
        char mp_name[RTE_MEMPOOL_NAMESIZE];
        struct rte_mempool *sess_mp;
+       uint32_t nb_sess;
 
        snprintf(mp_name, RTE_MEMPOOL_NAMESIZE,
                        "sess_mp_%u", socket_id);
+       nb_sess = (get_nb_crypto_sessions() + CDEV_MP_CACHE_SZ *
+               rte_lcore_count());
+       nb_sess = RTE_MAX(nb_sess, CDEV_MP_CACHE_SZ *
+                       CDEV_MP_CACHE_MULTIPLIER);
        sess_mp = rte_cryptodev_sym_session_pool_create(
-                       mp_name, CDEV_MP_NB_OBJS,
-                       sess_sz, CDEV_MP_CACHE_SZ, 0,
+                       mp_name, nb_sess, sess_sz, CDEV_MP_CACHE_SZ, 0,
                        socket_id);
        ctx->session_pool = sess_mp;
 
@@ -2302,11 +2409,16 @@ session_priv_pool_init(struct socket_ctx *ctx, int32_t socket_id,
 {
        char mp_name[RTE_MEMPOOL_NAMESIZE];
        struct rte_mempool *sess_mp;
+       uint32_t nb_sess;
 
        snprintf(mp_name, RTE_MEMPOOL_NAMESIZE,
                        "sess_mp_priv_%u", socket_id);
+       nb_sess = (get_nb_crypto_sessions() + CDEV_MP_CACHE_SZ *
+               rte_lcore_count());
+       nb_sess = RTE_MAX(nb_sess, CDEV_MP_CACHE_SZ *
+                       CDEV_MP_CACHE_MULTIPLIER);
        sess_mp = rte_mempool_create(mp_name,
-                       CDEV_MP_NB_OBJS,
+                       nb_sess,
                        sess_sz,
                        CDEV_MP_CACHE_SZ,
                        0, NULL, NULL, NULL,
@@ -2901,11 +3013,19 @@ main(int32_t argc, char **argv)
                }
        }
 
+       flow_init();
+
        check_all_ports_link_status(enabled_port_mask);
 
+#if (STATS_INTERVAL > 0)
+       rte_eal_alarm_set(STATS_INTERVAL * US_PER_S, print_stats_cb, NULL);
+#else
+       RTE_LOG(INFO, IPSEC, "Stats display disabled\n");
+#endif /* STATS_INTERVAL */
+
        /* launch per-lcore init on every lcore */
-       rte_eal_mp_remote_launch(ipsec_launch_one_lcore, eh_conf, CALL_MASTER);
-       RTE_LCORE_FOREACH_SLAVE(lcore_id) {
+       rte_eal_mp_remote_launch(ipsec_launch_one_lcore, eh_conf, CALL_MAIN);
+       RTE_LCORE_FOREACH_WORKER(lcore_id) {
                if (rte_eal_wait_lcore(lcore_id) < 0)
                        return -1;
        }
@@ -2947,10 +3067,18 @@ main(int32_t argc, char **argv)
                                        " for port %u, err msg: %s\n", portid,
                                        err.message);
                }
-               rte_eth_dev_stop(portid);
+               ret = rte_eth_dev_stop(portid);
+               if (ret != 0)
+                       RTE_LOG(ERR, IPSEC,
+                               "rte_eth_dev_stop: err=%s, port=%u\n",
+                               rte_strerror(-ret), portid);
+
                rte_eth_dev_close(portid);
                printf(" Done\n");
        }
+
+       /* clean up the EAL */
+       rte_eal_cleanup();
        printf("Bye...\n");
 
        return 0;