examples: add flush after stats printing
[dpdk.git] / examples / l2fwd-crypto / main.c
index 06f5d1d..827da9b 100644 (file)
@@ -136,6 +136,7 @@ struct l2fwd_crypto_options {
        struct rte_crypto_sym_xform cipher_xform;
        unsigned ckey_param;
        int ckey_random_size;
+       uint8_t cipher_key[MAX_KEY_SIZE];
 
        struct l2fwd_iv cipher_iv;
        unsigned int cipher_iv_param;
@@ -144,6 +145,7 @@ struct l2fwd_crypto_options {
        struct rte_crypto_sym_xform auth_xform;
        uint8_t akey_param;
        int akey_random_size;
+       uint8_t auth_key[MAX_KEY_SIZE];
 
        struct l2fwd_iv auth_iv;
        unsigned int auth_iv_param;
@@ -152,6 +154,7 @@ struct l2fwd_crypto_options {
        struct rte_crypto_sym_xform aead_xform;
        unsigned int aead_key_param;
        int aead_key_random_size;
+       uint8_t aead_key[MAX_KEY_SIZE];
 
        struct l2fwd_iv aead_iv;
        unsigned int aead_iv_param;
@@ -331,6 +334,8 @@ print_stats(void)
                   total_packets_dropped,
                   total_packets_errors);
        printf("\n====================================================\n");
+
+       fflush(stdout);
 }
 
 static int
@@ -396,7 +401,7 @@ l2fwd_simple_crypto_enqueue(struct rte_mbuf *m,
 
        eth_hdr = rte_pktmbuf_mtod(m, struct rte_ether_hdr *);
 
-       if (eth_hdr->ether_type != rte_cpu_to_be_16(RTE_ETHER_TYPE_IPv4))
+       if (eth_hdr->ether_type != rte_cpu_to_be_16(RTE_ETHER_TYPE_IPV4))
                return -1;
 
        ipdata_offset = sizeof(struct rte_ether_hdr);
@@ -404,8 +409,8 @@ l2fwd_simple_crypto_enqueue(struct rte_mbuf *m,
        ip_hdr = (struct rte_ipv4_hdr *)(rte_pktmbuf_mtod(m, char *) +
                        ipdata_offset);
 
-       ipdata_offset += (ip_hdr->version_ihl & IPV4_HDR_IHL_MASK)
-                       * IPV4_IHL_MULTIPLIER;
+       ipdata_offset += (ip_hdr->version_ihl & RTE_IPV4_HDR_IHL_MASK)
+                       * RTE_IPV4_IHL_MULTIPLIER;
 
 
        /* Zero pad data to be crypto'd so it is block aligned */
@@ -1219,8 +1224,7 @@ l2fwd_crypto_parse_args_long_options(struct l2fwd_crypto_options *options,
        else if (strcmp(lgopts[option_index].name, "cipher_key") == 0) {
                options->ckey_param = 1;
                options->cipher_xform.cipher.key.length =
-                       parse_bytes(options->cipher_xform.cipher.key.data, optarg,
-                                       MAX_KEY_SIZE);
+                       parse_bytes(options->cipher_key, optarg, MAX_KEY_SIZE);
                if (options->cipher_xform.cipher.key.length > 0)
                        return 0;
                else
@@ -1256,8 +1260,7 @@ l2fwd_crypto_parse_args_long_options(struct l2fwd_crypto_options *options,
        else if (strcmp(lgopts[option_index].name, "auth_key") == 0) {
                options->akey_param = 1;
                options->auth_xform.auth.key.length =
-                       parse_bytes(options->auth_xform.auth.key.data, optarg,
-                                       MAX_KEY_SIZE);
+                       parse_bytes(options->auth_key, optarg, MAX_KEY_SIZE);
                if (options->auth_xform.auth.key.length > 0)
                        return 0;
                else
@@ -1294,8 +1297,7 @@ l2fwd_crypto_parse_args_long_options(struct l2fwd_crypto_options *options,
        else if (strcmp(lgopts[option_index].name, "aead_key") == 0) {
                options->aead_key_param = 1;
                options->aead_xform.aead.key.length =
-                       parse_bytes(options->aead_xform.aead.key.data, optarg,
-                                       MAX_KEY_SIZE);
+                       parse_bytes(options->aead_key, optarg, MAX_KEY_SIZE);
                if (options->aead_xform.aead.key.length > 0)
                        return 0;
                else
@@ -1731,6 +1733,7 @@ check_all_ports_link_status(uint32_t port_mask)
        uint16_t portid;
        uint8_t count, all_ports_up, print_flag = 0;
        struct rte_eth_link link;
+       int ret;
 
        printf("\nChecking link status");
        fflush(stdout);
@@ -1740,7 +1743,14 @@ check_all_ports_link_status(uint32_t port_mask)
                        if ((port_mask & (1 << portid)) == 0)
                                continue;
                        memset(&link, 0, sizeof(link));
-                       rte_eth_link_get_nowait(portid, &link);
+                       ret = rte_eth_link_get_nowait(portid, &link);
+                       if (ret < 0) {
+                               all_ports_up = 0;
+                               if (print_flag == 1)
+                                       printf("Port %u link get failed: %s\n",
+                                               portid, rte_strerror(-ret));
+                               continue;
+                       }
                        /* print link status if flag set */
                        if (print_flag == 1) {
                                if (link.link_status)
@@ -1748,7 +1758,7 @@ check_all_ports_link_status(uint32_t port_mask)
                                        "Port%d Link Up. Speed %u Mbps - %s\n",
                                                portid, link.link_speed,
                                (link.link_duplex == ETH_LINK_FULL_DUPLEX) ?
-                                       ("full-duplex") : ("half-duplex\n"));
+                                       ("full-duplex") : ("half-duplex"));
                                else
                                        printf("Port %d Link Down\n", portid);
                                continue;
@@ -2256,6 +2266,7 @@ initialize_cryptodevs(struct l2fwd_crypto_options *options, unsigned nb_ports,
                struct rte_cryptodev_config conf = {
                        .nb_queue_pairs = 1,
                        .socket_id = socket_id,
+                       .ff_disable = RTE_CRYPTODEV_FF_SECURITY,
                };
 
                rte_cryptodev_info_get(cdev_id, &dev_info);
@@ -2348,8 +2359,7 @@ initialize_cryptodevs(struct l2fwd_crypto_options *options, unsigned nb_ports,
                                        options->aead_xform.aead.key.length =
                                                cap->sym.aead.key_size.min;
 
-                               generate_random_key(
-                                       options->aead_xform.aead.key.data,
+                               generate_random_key(options->aead_key,
                                        options->aead_xform.aead.key.length);
                        }
 
@@ -2406,8 +2416,7 @@ initialize_cryptodevs(struct l2fwd_crypto_options *options, unsigned nb_ports,
                                        options->cipher_xform.cipher.key.length =
                                                cap->sym.cipher.key_size.min;
 
-                               generate_random_key(
-                                       options->cipher_xform.cipher.key.data,
+                               generate_random_key(options->cipher_key,
                                        options->cipher_xform.cipher.key.length);
                        }
                }
@@ -2440,8 +2449,7 @@ initialize_cryptodevs(struct l2fwd_crypto_options *options, unsigned nb_ports,
                                        options->auth_xform.auth.key.length =
                                                cap->sym.auth.key_size.min;
 
-                               generate_random_key(
-                                       options->auth_xform.auth.key.data,
+                               generate_random_key(options->auth_key,
                                        options->auth_xform.auth.key.length);
                        }
 
@@ -2515,7 +2523,14 @@ initialize_ports(struct l2fwd_crypto_options *options)
                /* init port */
                printf("Initializing port %u... ", portid);
                fflush(stdout);
-               rte_eth_dev_info_get(portid, &dev_info);
+
+               retval = rte_eth_dev_info_get(portid, &dev_info);
+               if (retval != 0) {
+                       printf("Error during getting device (port %u) info: %s\n",
+                                       portid, strerror(-retval));
+                       return retval;
+               }
+
                if (dev_info.tx_offload_capa & DEV_TX_OFFLOAD_MBUF_FAST_FREE)
                        local_port_conf.txmode.offloads |=
                                DEV_TX_OFFLOAD_MBUF_FAST_FREE;
@@ -2569,9 +2584,20 @@ initialize_ports(struct l2fwd_crypto_options *options)
                        return -1;
                }
 
-               rte_eth_promiscuous_enable(portid);
+               retval = rte_eth_promiscuous_enable(portid);
+               if (retval != 0) {
+                       printf("rte_eth_promiscuous_enable:err=%s, port=%u\n",
+                               rte_strerror(-retval), portid);
+                       return -1;
+               }
 
-               rte_eth_macaddr_get(portid, &l2fwd_ports_eth_addr[portid]);
+               retval = rte_eth_macaddr_get(portid,
+                                            &l2fwd_ports_eth_addr[portid]);
+               if (retval < 0) {
+                       printf("rte_eth_macaddr_get :err=%d, port=%u\n",
+                                       retval, portid);
+                       return -1;
+               }
 
                printf("Port %u, MAC address: %02X:%02X:%02X:%02X:%02X:%02X\n\n",
                                portid,
@@ -2612,20 +2638,11 @@ initialize_ports(struct l2fwd_crypto_options *options)
 static void
 reserve_key_memory(struct l2fwd_crypto_options *options)
 {
-       options->cipher_xform.cipher.key.data = rte_malloc("crypto key",
-                                               MAX_KEY_SIZE, 0);
-       if (options->cipher_xform.cipher.key.data == NULL)
-               rte_exit(EXIT_FAILURE, "Failed to allocate memory for cipher key");
-
-       options->auth_xform.auth.key.data = rte_malloc("auth key",
-                                               MAX_KEY_SIZE, 0);
-       if (options->auth_xform.auth.key.data == NULL)
-               rte_exit(EXIT_FAILURE, "Failed to allocate memory for auth key");
-
-       options->aead_xform.aead.key.data = rte_malloc("aead key",
-                                               MAX_KEY_SIZE, 0);
-       if (options->aead_xform.aead.key.data == NULL)
-               rte_exit(EXIT_FAILURE, "Failed to allocate memory for AEAD key");
+       options->cipher_xform.cipher.key.data = options->cipher_key;
+
+       options->auth_xform.auth.key.data = options->auth_key;
+
+       options->aead_xform.aead.key.data = options->aead_key;
 
        options->cipher_iv.data = rte_malloc("cipher iv", MAX_KEY_SIZE, 0);
        if (options->cipher_iv.data == NULL)