aboutsummaryrefslogtreecommitdiffstats
path: root/src/vnet/ethernet/sfp.c
blob: 0ebdb99339b5d90e0b34614d1cf56f87cdf5a95d (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
/*
 * Copyright (c) 2016 Cisco and/or its affiliates.
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at:
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

#include <vnet/ethernet/sfp.h>

static u8 *
format_space_terminated (u8 * s, va_list * args)
{
  u32 l = va_arg (*args, u32);
  u8 *v = va_arg (*args, u8 *);
  u8 *p;

  for (p = v + l - 1; p >= v && p[0] == ' '; p--)
    ;
  vec_add (s, v, clib_min (p - v + 1, l));
  return s;
}

static u8 *
format_sfp_id (u8 * s, va_list * args)
{
  u32 id = va_arg (*args, u32);
  char *t = 0;
  switch (id)
    {
#define _(f) case SFP_ID_##f: t = #f; break;
      foreach_sfp_id
#undef _
    default:
      return format (s, "unknown 0x%x", id);
    }
  return format (s, "%s", t);
}

static u8 *
format_sfp_compatibility (u8 * s, va_list * args)
{
  u32 c = va_arg (*args, u32);
  char *t = 0;
  switch (c)
    {
#define _(a,b,f) case SFP_COMPATIBILITY_##f: t = #f; break;
      foreach_sfp_compatibility
#undef _
    default:
      return format (s, "unknown 0x%x", c);
    }
  return format (s, "%s", t);
}

u32
sfp_is_comatible (sfp_eeprom_t * e, sfp_compatibility_t c)
{
  static struct
  {
    u8 byte, bit;
  } t[] =
  {
#define _(a,b,f) { .byte = a, .bit = b, },
    foreach_sfp_compatibility
#undef _
  };

  ASSERT (c < ARRAY_LEN (t));
  return (e->compatibility[t[c].byte] & (1 << t[c].bit)) != 0;
}

u8 *
format_sfp_eeprom (u8 * s, va_list * args)
{
  sfp_eeprom_t *e = va_arg (*args, sfp_eeprom_t *);
  u32 indent = format_get_indent (s);
  int i;

  if (e->id != SFP_ID_sfp)
    s = format (s, "id %U, ", format_sfp_id, e->id);

  s = format (s, "compatibility:");
  for (i = 0; i < SFP_N_COMPATIBILITY; i++)
    if (sfp_is_comatible (e, i))
      s = format (s, " %U", format_sfp_compatibility, i);

  s = format (s, "\n%Uvendor: %U, part %U",
	      format_white_space, indent,
	      format_space_terminated, sizeof (e->vendor_name),
	      e->vendor_name, format_space_terminated,
	      sizeof (e->vendor_part_number), e->vendor_part_number);
  s =
    format (s, "\n%Urevision: %U, serial: %U, date code: %U",
	    format_white_space, indent, format_space_terminated,
	    sizeof (e->vendor_revision), e->vendor_revision,
	    format_space_terminated, sizeof (e->vendor_serial_number),
	    e->vendor_serial_number, format_space_terminated,
	    sizeof (e->vendor_date_code), e->vendor_date_code);

  return s;
}

/*
 * fd.io coding-style-patch-verification: ON
 *
 * Local Variables:
 * eval: (c-set-style "gnu")
 * End:
 */
n't report the error to avoid flood of error messages during * reconnect */ clib_error_free (err); rv = -1; goto done; } done: wrk->vcl_needs_real_epoll = 0; return rv; } static int vcl_api_attach_reply_handler (app_sapi_attach_reply_msg_t * mp, int *fds) { vcl_worker_t *wrk = vcl_worker_get_current (); int i, rv, n_fds_used = 0; u64 segment_handle; u8 *segment_name; if (mp->retval) { VERR ("attach failed: %U", format_session_error, mp->retval); goto failed; } wrk->api_client_handle = mp->api_client_handle; /* reattaching via `vcl_api_retry_attach` wants wrk->vpp_wrk_index to be 0 */ wrk->vpp_wrk_index = 0; segment_handle = mp->segment_handle; if (segment_handle == VCL_INVALID_SEGMENT_HANDLE) { VERR ("invalid segment handle"); goto failed; } if (!mp->n_fds) goto failed; if (mp->fd_flags & SESSION_FD_F_VPP_MQ_SEGMENT) if (vcl_segment_attach (vcl_vpp_worker_segment_handle (0), "vpp-mq-seg", SSVM_SEGMENT_MEMFD, fds[n_fds_used++])) goto failed; if (mp->fd_flags & SESSION_FD_F_MEMFD_SEGMENT) { segment_name = format (0, "memfd-%ld%c", segment_handle, 0); rv = vcl_segment_attach (segment_handle, (char *) segment_name, SSVM_SEGMENT_MEMFD, fds[n_fds_used++]); vec_free (segment_name); if (rv != 0) goto failed; } vcl_segment_attach_mq (segment_handle, mp->app_mq, 0, &wrk->app_event_queue); if (mp->fd_flags & SESSION_FD_F_MQ_EVENTFD) { svm_msg_q_set_eventfd (wrk->app_event_queue, fds[n_fds_used++]); vcl_mq_epoll_add_evfd (wrk, wrk->app_event_queue); } vcl_segment_discover_mqs (vcl_vpp_worker_segment_handle (0), fds + n_fds_used, mp->n_fds - n_fds_used); vcl_segment_attach_mq (vcl_vpp_worker_segment_handle (0), mp->vpp_ctrl_mq, mp->vpp_ctrl_mq_thread, &wrk->ctrl_mq); vcm->ctrl_mq = wrk->ctrl_mq; vcm->app_index = mp->app_index; return 0; failed: for (i = clib_max (n_fds_used - 1, 0); i < mp->n_fds; i++) close (fds[i]); return -1; } static int vcl_api_send_attach (clib_socket_t * cs) { app_sapi_msg_t msg = { 0 }; app_sapi_attach_msg_t *mp = &msg.attach; u8 app_is_proxy, tls_engine; clib_error_t *err; app_is_proxy = (vcm->cfg.app_proxy_transport_tcp || vcm->cfg.app_proxy_transport_udp); tls_engine = CRYPTO_ENGINE_OPENSSL; clib_memcpy (&mp->name, vcm->app_name, vec_len (vcm->app_name)); mp->options[APP_OPTIONS_FLAGS] = APP_OPTIONS_FLAGS_ACCEPT_REDIRECT | APP_OPTIONS_FLAGS_ADD_SEGMENT | (vcm->cfg.app_scope_local ? APP_OPTIONS_FLAGS_USE_LOCAL_SCOPE : 0) | (vcm->cfg.app_scope_global ? APP_OPTIONS_FLAGS_USE_GLOBAL_SCOPE : 0) | (app_is_proxy ? APP_OPTIONS_FLAGS_IS_PROXY : 0) | (vcm->cfg.use_mq_eventfd ? APP_OPTIONS_FLAGS_EVT_MQ_USE_EVENTFD : 0) | (vcm->cfg.huge_page ? APP_OPTIONS_FLAGS_USE_HUGE_PAGE : 0) | (vcm->cfg.app_original_dst ? APP_OPTIONS_FLAGS_GET_ORIGINAL_DST : 0); mp->options[APP_OPTIONS_PROXY_TRANSPORT] = (u64) ((vcm->cfg.app_proxy_transport_tcp ? 1 << TRANSPORT_PROTO_TCP : 0) | (vcm->cfg.app_proxy_transport_udp ? 1 << TRANSPORT_PROTO_UDP : 0)); mp->options[APP_OPTIONS_SEGMENT_SIZE] = vcm->cfg.segment_size; mp->options[APP_OPTIONS_ADD_SEGMENT_SIZE] = vcm->cfg.add_segment_size; mp->options[APP_OPTIONS_RX_FIFO_SIZE] = vcm->cfg.rx_fifo_size; mp->options[APP_OPTIONS_TX_FIFO_SIZE] = vcm->cfg.tx_fifo_size; mp->options[APP_OPTIONS_PREALLOC_FIFO_PAIRS] = vcm->cfg.preallocated_fifo_pairs; mp->options[APP_OPTIONS_EVT_QUEUE_SIZE] = vcm->cfg.event_queue_size; mp->options[APP_OPTIONS_TLS_ENGINE] = tls_engine; msg.type = APP_SAPI_MSG_TYPE_ATTACH; err = clib_socket_sendmsg (cs, &msg, sizeof (msg), 0, 0); if (err) { clib_error_report (err); return -1; } return 0; } int vcl_sapi_attach (void) { vcl_worker_t *wrk = vcl_worker_get_current (); app_sapi_msg_t _rmp, *rmp = &_rmp; clib_error_t *err; clib_socket_t *cs; int fds[32]; /* * Init client socket and send attach */ if (vcl_api_connect_app_socket (wrk)) return -1; cs = &wrk->app_api_sock; if (vcl_api_send_attach (cs)) return -1; /* * Wait for attach reply */ err = clib_socket_recvmsg (cs, rmp, sizeof (*rmp), fds, ARRAY_LEN (fds)); if (err) { clib_error_report (err); return -1; } if (rmp->type != APP_SAPI_MSG_TYPE_ATTACH_REPLY) return -1; return vcl_api_attach_reply_handler (&rmp->attach_reply, fds); } static int vcl_api_add_del_worker_reply_handler (app_sapi_worker_add_del_reply_msg_t * mp, int *fds) { int n_fds = 0, i, rv; u64 segment_handle; vcl_worker_t *wrk; if (mp->retval) { VDBG (0, "add/del worker failed: %U", format_session_error, mp->retval); goto failed; } if (!mp->is_add) goto failed; wrk = vcl_worker_get_current (); wrk->api_client_handle = mp->api_client_handle; wrk->vpp_wrk_index = mp->wrk_index; wrk->ctrl_mq = vcm->ctrl_mq; segment_handle = mp->segment_handle; if (segment_handle == VCL_INVALID_SEGMENT_HANDLE) { clib_warning ("invalid segment handle"); goto failed; } if (!mp->n_fds) goto failed; if (mp->fd_flags & SESSION_FD_F_VPP_MQ_SEGMENT) if (vcl_segment_attach (vcl_vpp_worker_segment_handle (wrk->wrk_index), "vpp-worker-seg", SSVM_SEGMENT_MEMFD, fds[n_fds++])) goto failed; if (mp->fd_flags & SESSION_FD_F_MEMFD_SEGMENT) { u8 *segment_name = format (0, "memfd-%ld%c", segment_handle, 0); rv = vcl_segment_attach (segment_handle, (char *) segment_name, SSVM_SEGMENT_MEMFD, fds[n_fds++]); vec_free (segment_name); if (rv != 0) goto failed; } vcl_segment_attach_mq (segment_handle, mp->app_event_queue_address, 0, &wrk->app_event_queue); if (mp->fd_flags & SESSION_FD_F_MQ_EVENTFD) { svm_msg_q_set_eventfd (wrk->app_event_queue, fds[n_fds]); vcl_mq_epoll_add_evfd (wrk, wrk->app_event_queue); n_fds++; } VDBG (0, "worker %u vpp-worker %u added", wrk->wrk_index, wrk->vpp_wrk_index); return 0; failed: for (i = clib_max (n_fds - 1, 0); i < mp->n_fds; i++) close (fds[i]); return -1; } int vcl_sapi_app_worker_add (void) { vcl_worker_t *wrk = vcl_worker_get_current (); app_sapi_worker_add_del_msg_t *mp; app_sapi_msg_t _rmp, *rmp = &_rmp; app_sapi_msg_t msg = { 0 }; int fds[SESSION_N_FD_TYPE]; clib_error_t *err; clib_socket_t *cs; /* Connect to socket api */ if (vcl_api_connect_app_socket (wrk)) return -1; /* * Send add worker */ cs = &wrk->app_api_sock; msg.type = APP_SAPI_MSG_TYPE_ADD_DEL_WORKER; mp = &msg.worker_add_del; mp->app_index = vcm->app_index; mp->is_add = 1; err = clib_socket_sendmsg (cs, &msg, sizeof (msg), 0, 0); if (err) { clib_error_report (err); return -1; } /* * Wait for reply and process it */ err = clib_socket_recvmsg (cs, rmp, sizeof (*rmp), fds, ARRAY_LEN (fds)); if (err) { clib_error_report (err); return -1; } if (rmp->type != APP_SAPI_MSG_TYPE_ADD_DEL_WORKER_REPLY) { clib_warning ("unexpected reply type %u", rmp->type); return -1; } return vcl_api_add_del_worker_reply_handler (&rmp->worker_add_del_reply, fds); } void vcl_sapi_app_worker_del (vcl_worker_t * wrk) { app_sapi_worker_add_del_msg_t *mp; app_sapi_msg_t msg = { 0 }; clib_error_t *err; clib_socket_t *cs; cs = &wrk->app_api_sock; msg.type = APP_SAPI_MSG_TYPE_ADD_DEL_WORKER; mp = &msg.worker_add_del; mp->app_index = vcm->app_index; mp->wrk_index = wrk->vpp_wrk_index; mp->is_add = 0; err = clib_socket_sendmsg (cs, &msg, sizeof (msg), 0, 0); if (err) clib_error_report (err); clib_socket_close (cs); } void vcl_sapi_detach (vcl_worker_t * wrk) { clib_socket_t *cs = &wrk->app_api_sock; clib_socket_close (cs); } int vcl_sapi_recv_fds (vcl_worker_t * wrk, int *fds, int n_fds) { app_sapi_msg_t _msg, *msg = &_msg; clib_socket_t *cs; clib_error_t *err; cs = &wrk->app_api_sock; err = clib_socket_recvmsg (cs, msg, sizeof (*msg), fds, n_fds); if (err) { clib_error_report (err); return -1; } if (msg->type != APP_SAPI_MSG_TYPE_SEND_FDS) return -1; return 0; } int vcl_sapi_add_cert_key_pair (vppcom_cert_key_pair_t *ckpair) { u32 cert_len = ckpair->cert_len, key_len = ckpair->key_len, certkey_len; vcl_worker_t *wrk = vcl_worker_get_current (); app_sapi_msg_t _msg = { 0 }, *msg = &_msg; app_sapi_cert_key_add_del_msg_t *mp; app_sapi_msg_t _rmp, *rmp = &_rmp; clib_error_t *err; clib_socket_t *cs; u8 *certkey = 0; int rv = -1; msg->type = APP_SAPI_MSG_TYPE_ADD_DEL_CERT_KEY; mp = &msg->cert_key_add_del; mp->context = wrk->wrk_index; mp->cert_len = cert_len; mp->certkey_len = cert_len + key_len; mp->is_add = 1; certkey_len = cert_len + key_len; vec_validate (certkey, certkey_len - 1); clib_memcpy_fast (certkey, ckpair->cert, cert_len); clib_memcpy_fast (certkey + cert_len, ckpair->key, key_len); cs = &wrk->app_api_sock; err = clib_socket_sendmsg (cs, msg, sizeof (*msg), 0, 0); if (err) { clib_error_report (err); goto done; } err = clib_socket_sendmsg (cs, certkey, certkey_len, 0, 0); if (err) { clib_error_report (err); goto done; } /* * Wait for reply and process it */ err = clib_socket_recvmsg (cs, rmp, sizeof (*rmp), 0, 0); if (err) { clib_error_report (err); goto done; } if (rmp->type != APP_SAPI_MSG_TYPE_ADD_DEL_CERT_KEY_REPLY) { clib_warning ("unexpected reply type %u", rmp->type); goto done; } if (!rmp->cert_key_add_del_reply.retval) rv = rmp->cert_key_add_del_reply.index; done: return rv; } int vcl_sapi_del_cert_key_pair (u32 ckpair_index) { vcl_worker_t *wrk = vcl_worker_get_current (); app_sapi_msg_t _msg = { 0 }, *msg = &_msg; app_sapi_cert_key_add_del_msg_t *mp; app_sapi_msg_t _rmp, *rmp = &_rmp; clib_error_t *err; clib_socket_t *cs; msg->type = APP_SAPI_MSG_TYPE_ADD_DEL_CERT_KEY; mp = &msg->cert_key_add_del; mp->context = wrk->wrk_index; mp->index = ckpair_index; cs = &wrk->app_api_sock; err = clib_socket_sendmsg (cs, msg, sizeof (*msg), 0, 0); if (err) { clib_error_report (err); return -1; } /* * Wait for reply and process it */ err = clib_socket_recvmsg (cs, rmp, sizeof (*rmp), 0, 0); if (err) { clib_error_report (err); return -1; } if (rmp->type != APP_SAPI_MSG_TYPE_ADD_DEL_CERT_KEY_REPLY) { clib_warning ("unexpected reply type %u", rmp->type); return -1; } if (rmp->cert_key_add_del_reply.retval) return -1; return 0; } /* * fd.io coding-style-patch-verification: ON * * Local Variables: * eval: (c-set-style "gnu") * End: */