X-Git-Url: https://gerrit.fd.io/r/gitweb?a=blobdiff_plain;f=src%2Fvnet%2Fcrypto%2Fcli.c;h=a6098a18e118c5870d7c0deab13f103137111a3b;hb=refs%2Fchanges%2F82%2F31782%2F4;hp=ef6371ad3dc9c0f65f0571a1700e18cce48f52c9;hpb=efcad1a9d22c4a664f3004cafe09d9c3a68e1620;p=vpp.git diff --git a/src/vnet/crypto/cli.c b/src/vnet/crypto/cli.c index ef6371ad3dc..a6098a18e11 100644 --- a/src/vnet/crypto/cli.c +++ b/src/vnet/crypto/cli.c @@ -53,6 +53,52 @@ VLIB_CLI_COMMAND (show_crypto_engines_command, static) = .function = show_crypto_engines_command_fn, }; +static u8 * +format_vnet_crypto_engine_candidates (u8 * s, va_list * args) +{ + vnet_crypto_engine_t *e; + vnet_crypto_main_t *cm = &crypto_main; + u32 id = va_arg (*args, u32); + u32 ei = va_arg (*args, u32); + int is_chained = va_arg (*args, int); + int is_async = va_arg (*args, int); + + if (is_async) + { + vec_foreach (e, cm->engines) + { + if (e->enqueue_handlers[id] && e->dequeue_handlers[id]) + { + s = format (s, "%U", format_vnet_crypto_engine, e - cm->engines); + if (ei == e - cm->engines) + s = format (s, "%c ", '*'); + else + s = format (s, " "); + } + } + + return s; + } + else + { + vec_foreach (e, cm->engines) + { + void * h = is_chained ? (void *) e->chained_ops_handlers[id] + : (void *) e->ops_handlers[id]; + + if (h) + { + s = format (s, "%U", format_vnet_crypto_engine, e - cm->engines); + if (ei == e - cm->engines) + s = format (s, "%c ", '*'); + else + s = format (s, " "); + } + } + return s; + } +} + static u8 * format_vnet_crypto_handlers (u8 * s, va_list * args) { @@ -65,7 +111,6 @@ format_vnet_crypto_handlers (u8 * s, va_list * args) for (i = 0; i < VNET_CRYPTO_OP_N_TYPES; i++) { vnet_crypto_op_data_t *od; - vnet_crypto_engine_t *e; vnet_crypto_op_id_t id = d->op_by_type[i]; if (id == 0) @@ -74,24 +119,12 @@ format_vnet_crypto_handlers (u8 * s, va_list * args) od = cm->opt_data + id; if (first == 0) s = format (s, "\n%U", format_white_space, indent); - s = format (s, "%-22U%-20U", format_vnet_crypto_op_type, od->type, 0, - format_vnet_crypto_engine, od->active_engine_index_simple,s); - - vec_foreach (e, cm->engines) - { - if (e->ops_handlers[id] != 0) - s = format (s, "%U ", format_vnet_crypto_engine, e - cm->engines); - } + s = format (s, "%-16U", format_vnet_crypto_op_type, od->type); - s = format (s, "\n%U", format_white_space, indent); - s = format (s, "%-22U%-20U", format_vnet_crypto_op_type, od->type, 1, - format_vnet_crypto_engine, - od->active_engine_index_chained); - vec_foreach (e, cm->engines) - { - if (e->chained_ops_handlers[id] != 0) - s = format (s, "%U ", format_vnet_crypto_engine, e - cm->engines); - } + s = format (s, "%-28U", format_vnet_crypto_engine_candidates, id, + od->active_engine_index_simple, 0, 0); + s = format (s, "%U", format_vnet_crypto_engine_candidates, id, + od->active_engine_index_chained, 1, 0); first = 0; } return s; @@ -108,11 +141,11 @@ show_crypto_handlers_command_fn (vlib_main_t * vm, if (unformat_user (input, unformat_line_input, line_input)) unformat_free (line_input); - vlib_cli_output (vm, "%-20s%-22s%-20s%s", "Algo", "Type", "Active", - "Candidates"); + vlib_cli_output (vm, "%-16s%-16s%-28s%s", "Algo", "Type", "Simple", + "Chained"); for (i = 0; i < VNET_CRYPTO_N_ALGS; i++) - vlib_cli_output (vm, "%-20U%U", format_vnet_crypto_alg, i, + vlib_cli_output (vm, "%-16U%U", format_vnet_crypto_alg, i, format_vnet_crypto_handlers, i); return 0; @@ -218,6 +251,232 @@ VLIB_CLI_COMMAND (set_crypto_handler_command, static) = }; /* *INDENT-ON* */ +static u8 * +format_vnet_crypto_async_handlers (u8 * s, va_list * args) +{ + vnet_crypto_async_alg_t alg = va_arg (*args, vnet_crypto_async_alg_t); + vnet_crypto_main_t *cm = &crypto_main; + vnet_crypto_async_alg_data_t *d = vec_elt_at_index (cm->async_algs, alg); + u32 indent = format_get_indent (s); + int i, first = 1; + + for (i = 0; i < VNET_CRYPTO_ASYNC_OP_N_TYPES; i++) + { + vnet_crypto_async_op_data_t *od; + vnet_crypto_async_op_id_t id = d->op_by_type[i]; + + if (id == 0) + continue; + + od = cm->async_opt_data + id; + if (first == 0) + s = format (s, "\n%U", format_white_space, indent); + s = format (s, "%-16U", format_vnet_crypto_async_op_type, od->type); + + s = format (s, "%U", format_vnet_crypto_engine_candidates, id, + od->active_engine_index_async, 0, 1); + first = 0; + } + return s; +} + +static clib_error_t * +show_crypto_async_handlers_command_fn (vlib_main_t * vm, + unformat_input_t * input, + vlib_cli_command_t * cmd) +{ + unformat_input_t _line_input, *line_input = &_line_input; + int i; + + if (unformat_user (input, unformat_line_input, line_input)) + unformat_free (line_input); + + vlib_cli_output (vm, "%-28s%-16s%s", "Algo", "Type", "Handler"); + + for (i = 0; i < VNET_CRYPTO_N_ASYNC_ALGS; i++) + vlib_cli_output (vm, "%-28U%U", format_vnet_crypto_async_alg, i, + format_vnet_crypto_async_handlers, i); + + return 0; +} + +/* *INDENT-OFF* */ +VLIB_CLI_COMMAND (show_crypto_async_handlers_command, static) = +{ + .path = "show crypto async handlers", + .short_help = "show crypto async handlers", + .function = show_crypto_async_handlers_command_fn, +}; +/* *INDENT-ON* */ + + +static clib_error_t * +show_crypto_async_status_command_fn (vlib_main_t * vm, + unformat_input_t * input, + vlib_cli_command_t * cmd) +{ + vnet_crypto_main_t *cm = &crypto_main; + u32 skip_master = vlib_num_workers () > 0; + vlib_thread_main_t *tm = vlib_get_thread_main (); + unformat_input_t _line_input, *line_input = &_line_input; + int i; + + if (unformat_user (input, unformat_line_input, line_input)) + unformat_free (line_input); + + vlib_cli_output (vm, "Crypto async dispatch mode: %s", + cm->dispatch_mode == + VNET_CRYPTO_ASYNC_DISPATCH_POLLING ? "POLLING" : + "INTERRUPT"); + + for (i = skip_master; i < tm->n_vlib_mains; i++) + { + vlib_node_state_t state = vlib_node_get_state ( + vlib_get_main_by_index (i), cm->crypto_node_index); + if (state == VLIB_NODE_STATE_POLLING) + vlib_cli_output (vm, "threadId: %-6d POLLING", i); + if (state == VLIB_NODE_STATE_INTERRUPT) + vlib_cli_output (vm, "threadId: %-6d INTERRUPT", i); + if (state == VLIB_NODE_STATE_DISABLED) + vlib_cli_output (vm, "threadId: %-6d DISABLED", i); + } + return 0; +} + +/* *INDENT-OFF* */ +VLIB_CLI_COMMAND (show_crypto_async_status_command, static) = +{ + .path = "show crypto async status", + .short_help = "show crypto async status", + .function = show_crypto_async_status_command_fn, +}; +/* *INDENT-ON* */ + +static clib_error_t * +set_crypto_async_handler_command_fn (vlib_main_t * vm, + unformat_input_t * input, + vlib_cli_command_t * cmd) +{ + unformat_input_t _line_input, *line_input = &_line_input; + vnet_crypto_main_t *cm = &crypto_main; + int rc = 0; + char **args = 0, *s, **arg, *engine = 0; + int all = 0; + clib_error_t *error = 0; + + if (!unformat_user (input, unformat_line_input, line_input)) + return 0; + + while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT) + { + if (unformat (line_input, "all")) + all = 1; + else if (unformat (line_input, "%s", &s)) + vec_add1 (args, s); + else + { + error = clib_error_return (0, "invalid params"); + goto done; + } + } + + if ((vec_len (args) < 2 && !all) || (vec_len (args) == 0 && all)) + { + error = clib_error_return (0, "missing cipher or engine!"); + goto done; + } + + engine = vec_elt_at_index (args, vec_len (args) - 1)[0]; + vec_del1 (args, vec_len (args) - 1); + + if (all) + { + char *key; + u8 *value; + + /* *INDENT-OFF* */ + hash_foreach_mem (key, value, cm->async_alg_index_by_name, + ({ + (void) value; + rc += vnet_crypto_set_async_handler2 (key, engine); + })); + /* *INDENT-ON* */ + + if (rc) + vlib_cli_output (vm, "failed to set crypto engine!"); + } + else + { + vec_foreach (arg, args) + { + rc = vnet_crypto_set_async_handler2 (arg[0], engine); + if (rc) + { + vlib_cli_output (vm, "failed to set engine %s for %s!", + engine, arg[0]); + } + } + } + +done: + vec_free (engine); + vec_foreach (arg, args) vec_free (arg[0]); + vec_free (args); + unformat_free (line_input); + return error; +} + +/* *INDENT-OFF* */ +VLIB_CLI_COMMAND (set_crypto_async_handler_command, static) = +{ + .path = "set crypto async handler", + .short_help = "set crypto async handler type [type2 type3 ...] engine", + .function = set_crypto_async_handler_command_fn, +}; +/* *INDENT-ON* */ + +static inline void +print_crypto_async_dispatch_warning () +{ + clib_warning ("Switching dispatch mode might not work is some situations."); + clib_warning + ("Use 'show crypto async status' to verify that the nodes' states were set"); + clib_warning ("and if not, set 'crypto async dispatch' mode again."); +} + +static clib_error_t * +set_crypto_async_dispatch_polling_command_fn (vlib_main_t * vm, + unformat_input_t * input, + vlib_cli_command_t * cmd) +{ + print_crypto_async_dispatch_warning (); + vnet_crypto_set_async_dispatch_mode (VNET_CRYPTO_ASYNC_DISPATCH_POLLING); + return 0; +} + +static clib_error_t * +set_crypto_async_dispatch_interrupt_command_fn (vlib_main_t * vm, + unformat_input_t * input, + vlib_cli_command_t * cmd) +{ + print_crypto_async_dispatch_warning (); + vnet_crypto_set_async_dispatch_mode (VNET_CRYPTO_ASYNC_DISPATCH_INTERRUPT); + return 0; +} + +/* *INDENT-OFF* */ +VLIB_CLI_COMMAND (set_crypto_async_dispatch_polling_command, static) = +{ + .path = "set crypto async dispatch polling", + .short_help = "set crypto async dispatch polling|interrupt", + .function = set_crypto_async_dispatch_polling_command_fn, +}; +VLIB_CLI_COMMAND (set_crypto_async_dispatch_interrupt_command, static) = +{ + .path = "set crypto async dispatch interrupt", + .short_help = "set crypto async dispatch polling|interrupt", + .function = set_crypto_async_dispatch_interrupt_command_fn, +}; /* * fd.io coding-style-patch-verification: ON *