]> The Tcpdump Group git mirrors - libpcap/blob - pcap-dpdk.c
dpdk: make the length argument dpdk_gather_data() unsigned.
[libpcap] / pcap-dpdk.c
1 /*
2 * Copyright (C) 2018 jingle YANG. All rights reserved.
3 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
6 * are met:
7 *
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 *
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS''AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24 * SUCH DAMAGE.
25 */
26
27 /*
28 Date: Dec 16, 2018
29
30 Description:
31 1. Pcap-dpdk provides libpcap the ability to use DPDK with the device name as dpdk:{portid}, such as dpdk:0.
32 2. DPDK is a set of libraries and drivers for fast packet processing. (https://www.dpdk.org/)
33 3. The testprogs/capturetest provides 6.4Gbps/800,000 pps on Intel 10-Gigabit X540-AT2 with DPDK 18.11.
34
35 Limitations:
36 1. DPDK support will be on if DPDK is available. Please set DIR for --with-dpdk[=DIR] with ./configure or -DDPDK_DIR[=DIR] with cmake if DPDK is installed manually.
37 2. Only support link libdpdk.so dynamicly, because the libdpdk.a will not work correctly.
38 3. Only support read operation, and packet injection has not been supported yet.
39
40 Usage:
41 1. Compile DPDK as shared library and install.(https://github.com/DPDK/dpdk.git)
42
43 You shall modify the file $RTE_SDK/$RTE_TARGET/.config and set:
44 CONFIG_RTE_BUILD_SHARED_LIB=y
45 By the following command:
46 sed -i 's/CONFIG_RTE_BUILD_SHARED_LIB=n/CONFIG_RTE_BUILD_SHARED_LIB=y/' $RTE_SDK/$RTE_TARGET/.config
47
48 2. Launch l2fwd that is one of DPDK examples correctly, and get device information.
49
50 You shall learn how to bind nic with DPDK-compatible driver by $RTE_SDK/usertools/dpdk-devbind.py, such as igb_uio.
51 And enable hugepages by dpdk-setup.sh
52
53 Then launch the l2fwd with dynamic dirver support. For example:
54 $RTE_SDK/examples/l2fwd/$RTE_TARGET/l2fwd -dlibrte_pmd_e1000.so -dlibrte_pmd_ixgbe.so -dlibrte_mempool_ring.so -- -p 0x1
55
56 3. Compile libpcap with dpdk options.
57
58 If DPDK has not been found automatically, you shall export DPDK envionment variable which are used for compiling DPDK. And then pass $RTE_SDK/$RTE_TARGET to --with-dpdk or -DDPDK_DIR
59
60 export RTE_SDK={your DPDK base directory}
61 export RTE_TARGET={your target name}
62
63 3.1 With configure
64
65 ./configure --with-dpdk=$RTE_SDK/$RTE_TARGET && make -s all && make -s testprogs && make install
66
67 3.2 With cmake
68
69 mkdir -p build && cd build && cmake -DDPDK_DIR=$RTE_SDK/$RTE_TARGET ../ && make -s all && make -s testprogs && make install
70
71 4. Link your own program with libpcap, and use DPDK with the device name as dpdk:{portid}, such as dpdk:0.
72 And you shall set DPDK configure options by environment variable DPDK_CFG
73 For example, the testprogs/capturetest could be lanched by:
74
75 env DPDK_CFG="--log-level=debug -l0 -dlibrte_pmd_e1000.so -dlibrte_pmd_ixgbe.so -dlibrte_mempool_ring.so" ./capturetest -i dpdk:0
76 */
77
78 #ifdef HAVE_CONFIG_H
79 #include <config.h>
80 #endif
81
82 #include <errno.h>
83 #include <netdb.h>
84 #include <stdio.h>
85 #include <stdlib.h>
86 #include <string.h>
87 #include <unistd.h>
88 #include <time.h>
89
90 #include <sys/time.h>
91
92 //header for calling dpdk
93 #include <rte_config.h>
94 #include <rte_common.h>
95 #include <rte_errno.h>
96 #include <rte_log.h>
97 #include <rte_malloc.h>
98 #include <rte_memory.h>
99 #include <rte_eal.h>
100 #include <rte_launch.h>
101 #include <rte_atomic.h>
102 #include <rte_cycles.h>
103 #include <rte_lcore.h>
104 #include <rte_per_lcore.h>
105 #include <rte_branch_prediction.h>
106 #include <rte_interrupts.h>
107 #include <rte_random.h>
108 #include <rte_debug.h>
109 #include <rte_ether.h>
110 #include <rte_ethdev.h>
111 #include <rte_mempool.h>
112 #include <rte_mbuf.h>
113 #include <rte_bus.h>
114
115 #include "pcap-int.h"
116 #include "pcap-dpdk.h"
117
118 /*
119 * Deal with API changes that break source compatibility.
120 */
121
122 #ifdef HAVE_STRUCT_RTE_ETHER_ADDR
123 #define ETHER_ADDR_TYPE struct rte_ether_addr
124 #else
125 #define ETHER_ADDR_TYPE struct ether_addr
126 #endif
127
128 #define DPDK_DEF_LOG_LEV RTE_LOG_ERR
129 //
130 // This is set to 0 if we haven't initialized DPDK yet, 1 if we've
131 // successfully initialized it, a negative value, which is the negative
132 // of the rte_errno from rte_eal_init(), if we tried to initialize it
133 // and got an error.
134 //
135 static int is_dpdk_pre_inited=0;
136 #define DPDK_LIB_NAME "libpcap_dpdk"
137 #define DPDK_DESC "Data Plane Development Kit (DPDK) Interface"
138 #define DPDK_ERR_PERM_MSG "permission denied, DPDK needs root permission"
139 #define DPDK_ARGC_MAX 64
140 #define DPDK_CFG_MAX_LEN 1024
141 #define DPDK_DEV_NAME_MAX 32
142 #define DPDK_DEV_DESC_MAX 512
143 #define DPDK_CFG_ENV_NAME "DPDK_CFG"
144 #define DPDK_DEF_MIN_SLEEP_MS 1
145 static char dpdk_cfg_buf[DPDK_CFG_MAX_LEN];
146 #define DPDK_MAC_ADDR_SIZE 32
147 #define DPDK_DEF_MAC_ADDR "00:00:00:00:00:00"
148 #define DPDK_PCI_ADDR_SIZE 16
149 #define DPDK_DEF_CFG "--log-level=error -l0 -dlibrte_pmd_e1000.so -dlibrte_pmd_ixgbe.so -dlibrte_mempool_ring.so"
150 #define DPDK_PREFIX "dpdk:"
151 #define DPDK_PORTID_MAX 65535U
152 #define MBUF_POOL_NAME "mbuf_pool"
153 #define DPDK_TX_BUF_NAME "tx_buffer"
154 //The number of elements in the mbuf pool.
155 #define DPDK_NB_MBUFS 8192U
156 #define MEMPOOL_CACHE_SIZE 256
157 #define MAX_PKT_BURST 32
158 // Configurable number of RX/TX ring descriptors
159 #define RTE_TEST_RX_DESC_DEFAULT 1024
160 #define RTE_TEST_TX_DESC_DEFAULT 1024
161
162 static uint16_t nb_rxd = RTE_TEST_RX_DESC_DEFAULT;
163 static uint16_t nb_txd = RTE_TEST_TX_DESC_DEFAULT;
164
165 #ifdef RTE_ETHER_MAX_JUMBO_FRAME_LEN
166 #define RTE_ETH_PCAP_SNAPLEN RTE_ETHER_MAX_JUMBO_FRAME_LEN
167 #else
168 #define RTE_ETH_PCAP_SNAPLEN ETHER_MAX_JUMBO_FRAME_LEN
169 #endif
170
171 static struct rte_eth_dev_tx_buffer *tx_buffer;
172
173 struct dpdk_ts_helper{
174 struct timeval start_time;
175 uint64_t start_cycles;
176 uint64_t hz;
177 };
178 struct pcap_dpdk{
179 pcap_t * orig;
180 uint16_t portid; // portid of DPDK
181 int must_clear_promisc;
182 uint64_t bpf_drop;
183 int nonblock;
184 struct timeval required_select_timeout;
185 struct timeval prev_ts;
186 struct rte_eth_stats prev_stats;
187 struct timeval curr_ts;
188 struct rte_eth_stats curr_stats;
189 uint64_t pps;
190 uint64_t bps;
191 struct rte_mempool * pktmbuf_pool;
192 struct dpdk_ts_helper ts_helper;
193 ETHER_ADDR_TYPE eth_addr;
194 char mac_addr[DPDK_MAC_ADDR_SIZE];
195 char pci_addr[DPDK_PCI_ADDR_SIZE];
196 unsigned char pcap_tmp_buf[RTE_ETH_PCAP_SNAPLEN];
197 };
198
199 static struct rte_eth_conf port_conf = {
200 .rxmode = {
201 .split_hdr_size = 0,
202 },
203 .txmode = {
204 .mq_mode = ETH_MQ_TX_NONE,
205 },
206 };
207
208 static void dpdk_fmt_errmsg_for_rte_errno(char *, size_t, int,
209 PCAP_FORMAT_STRING(const char *), ...) PCAP_PRINTFLIKE(4, 5);
210
211 /*
212 * Generate an error message based on a format, arguments, and an
213 * rte_errno, with a message for the rte_errno after the formatted output.
214 */
215 static void dpdk_fmt_errmsg_for_rte_errno(char *errbuf, size_t errbuflen,
216 int errnum, const char *fmt, ...)
217 {
218 va_list ap;
219 size_t msglen;
220 char *p;
221 size_t errbuflen_remaining;
222
223 va_start(ap, fmt);
224 vsnprintf(errbuf, errbuflen, fmt, ap);
225 va_end(ap);
226 msglen = strlen(errbuf);
227
228 /*
229 * Do we have enough space to append ": "?
230 * Including the terminating '\0', that's 3 bytes.
231 */
232 if (msglen + 3 > errbuflen) {
233 /* No - just give them what we've produced. */
234 return;
235 }
236 p = errbuf + msglen;
237 errbuflen_remaining = errbuflen - msglen;
238 *p++ = ':';
239 *p++ = ' ';
240 *p = '\0';
241 msglen += 2;
242 errbuflen_remaining -= 2;
243
244 /*
245 * Now append the string for the error code.
246 * rte_strerror() is thread-safe, at least as of dpdk 18.11,
247 * unlike strerror() - it uses strerror_r() rather than strerror()
248 * for UN*X errno values, and prints to what I assume is a per-thread
249 * buffer (based on the "PER_LCORE" in "RTE_DEFINE_PER_LCORE" used
250 * to declare the buffers statically) for DPDK errors.
251 */
252 snprintf(p, errbuflen_remaining, "%s", rte_strerror(errnum));
253 }
254
255 static int dpdk_init_timer(struct pcap_dpdk *pd){
256 gettimeofday(&(pd->ts_helper.start_time),NULL);
257 pd->ts_helper.start_cycles = rte_get_timer_cycles();
258 pd->ts_helper.hz = rte_get_timer_hz();
259 if (pd->ts_helper.hz == 0){
260 return -1;
261 }
262 return 0;
263 }
264 static inline void calculate_timestamp(struct dpdk_ts_helper *helper,struct timeval *ts)
265 {
266 uint64_t cycles;
267 // delta
268 struct timeval cur_time;
269 cycles = rte_get_timer_cycles() - helper->start_cycles;
270 cur_time.tv_sec = (time_t)(cycles/helper->hz);
271 cur_time.tv_usec = (suseconds_t)((cycles%helper->hz)*1e6/helper->hz);
272 timeradd(&(helper->start_time), &cur_time, ts);
273 }
274
275 static uint32_t dpdk_gather_data(unsigned char *data, uint32_t len, struct rte_mbuf *mbuf)
276 {
277 uint32_t total_len = 0;
278 while (mbuf && (total_len+mbuf->data_len) < len ){
279 rte_memcpy(data+total_len, rte_pktmbuf_mtod(mbuf,void *),mbuf->data_len);
280 total_len+=mbuf->data_len;
281 mbuf=mbuf->next;
282 }
283 return total_len;
284 }
285
286
287 static int dpdk_read_with_timeout(pcap_t *p, uint16_t portid, struct rte_mbuf **pkts_burst, const uint16_t burst_cnt){
288 struct pcap_dpdk *pd = (struct pcap_dpdk*)(p->priv);
289 int nb_rx = 0;
290 int timeout_ms = p->opt.timeout;
291 int sleep_ms = 0;
292 if (pd->nonblock){
293 // In non-blocking mode, just read once, no matter how many packets are captured.
294 nb_rx = (int)rte_eth_rx_burst(pd->portid, 0, pkts_burst, burst_cnt);
295 }else{
296 // In blocking mode, read many times until packets are captured or timeout or break_loop is setted.
297 // if timeout_ms == 0, it may be blocked forever.
298 while (timeout_ms == 0 || sleep_ms < timeout_ms){
299 nb_rx = (int)rte_eth_rx_burst(pd->portid, 0, pkts_burst, burst_cnt);
300 if (nb_rx){ // got packets within timeout_ms
301 break;
302 }else{ // no packet arrives at this round.
303 if (p->break_loop){
304 break;
305 }
306 // sleep for a very short while.
307 // block sleep is the only choice, since usleep() will impact performance dramatically.
308 rte_delay_us_block(DPDK_DEF_MIN_SLEEP_MS*1000);
309 sleep_ms += DPDK_DEF_MIN_SLEEP_MS;
310 }
311 }
312 }
313 return nb_rx;
314 }
315
316 static int pcap_dpdk_dispatch(pcap_t *p, int max_cnt, pcap_handler cb, u_char *cb_arg)
317 {
318 struct pcap_dpdk *pd = (struct pcap_dpdk*)(p->priv);
319 int burst_cnt = 0;
320 int nb_rx = 0;
321 struct rte_mbuf *pkts_burst[MAX_PKT_BURST];
322 struct rte_mbuf *m;
323 struct pcap_pkthdr pcap_header;
324 uint16_t portid = pd->portid;
325 // In DPDK, pkt_len is sum of lengths for all segments. And data_len is for one segment
326 uint32_t pkt_len = 0;
327 uint32_t caplen = 0;
328 u_char *bp = NULL;
329 int i=0;
330 unsigned int gather_len =0;
331 int pkt_cnt = 0;
332 u_char *large_buffer=NULL;
333 int timeout_ms = p->opt.timeout;
334
335 if ( !PACKET_COUNT_IS_UNLIMITED(max_cnt) && max_cnt < MAX_PKT_BURST){
336 burst_cnt = max_cnt;
337 }else{
338 burst_cnt = MAX_PKT_BURST;
339 }
340
341 while( PACKET_COUNT_IS_UNLIMITED(max_cnt) || pkt_cnt < max_cnt){
342 if (p->break_loop){
343 p->break_loop = 0;
344 return PCAP_ERROR_BREAK;
345 }
346 // read once in non-blocking mode, or try many times waiting for timeout_ms.
347 // if timeout_ms == 0, it will be blocked until one packet arrives or break_loop is setted.
348 nb_rx = dpdk_read_with_timeout(p, portid, pkts_burst, burst_cnt);
349 if (nb_rx == 0){
350 if (pd->nonblock){
351 RTE_LOG(DEBUG, USER1, "dpdk: no packets available in non-blocking mode.\n");
352 }else{
353 if (p->break_loop){
354 RTE_LOG(DEBUG, USER1, "dpdk: no packets available and break_loop is setted in blocking mode.\n");
355 p->break_loop = 0;
356 return PCAP_ERROR_BREAK;
357
358 }
359 RTE_LOG(DEBUG, USER1, "dpdk: no packets available for timeout %d ms in blocking mode.\n", timeout_ms);
360 }
361 // break if dpdk reads 0 packet, no matter in blocking(timeout) or non-blocking mode.
362 break;
363 }
364 pkt_cnt += nb_rx;
365 for ( i = 0; i < nb_rx; i++) {
366 m = pkts_burst[i];
367 calculate_timestamp(&(pd->ts_helper),&(pcap_header.ts));
368 pkt_len = rte_pktmbuf_pkt_len(m);
369 // caplen = min(pkt_len, p->snapshot);
370 // caplen will not be changed, no matter how long the rte_pktmbuf
371 caplen = pkt_len < (uint32_t)p->snapshot ? pkt_len: (uint32_t)p->snapshot;
372 pcap_header.caplen = caplen;
373 pcap_header.len = pkt_len;
374 // volatile prefetch
375 rte_prefetch0(rte_pktmbuf_mtod(m, void *));
376 bp = NULL;
377 if (m->nb_segs == 1)
378 {
379 bp = rte_pktmbuf_mtod(m, u_char *);
380 }else{
381 // use fast buffer pcap_tmp_buf if pkt_len is small, no need to call malloc and free
382 if ( pkt_len <= RTE_ETH_PCAP_SNAPLEN)
383 {
384 gather_len = dpdk_gather_data(pd->pcap_tmp_buf, RTE_ETH_PCAP_SNAPLEN, m);
385 bp = pd->pcap_tmp_buf;
386 }else{
387 // need call free later
388 large_buffer = (u_char *)malloc(caplen*sizeof(u_char));
389 gather_len = dpdk_gather_data(large_buffer, caplen, m);
390 bp = large_buffer;
391 }
392
393 }
394 if (bp){
395 if (p->fcode.bf_insns==NULL || pcap_filter(p->fcode.bf_insns, bp, pcap_header.len, pcap_header.caplen)){
396 cb(cb_arg, &pcap_header, bp);
397 }else{
398 pd->bpf_drop++;
399 }
400 }
401 //free all pktmbuf
402 rte_pktmbuf_free(m);
403 if (large_buffer){
404 free(large_buffer);
405 large_buffer=NULL;
406 }
407 }
408 }
409 return pkt_cnt;
410 }
411
412 static int pcap_dpdk_inject(pcap_t *p, const void *buf _U_, int size _U_)
413 {
414 //not implemented yet
415 pcap_strlcpy(p->errbuf,
416 "dpdk error: Inject function has not been implemented yet",
417 PCAP_ERRBUF_SIZE);
418 return PCAP_ERROR;
419 }
420
421 static void pcap_dpdk_close(pcap_t *p)
422 {
423 struct pcap_dpdk *pd = p->priv;
424 if (pd==NULL)
425 {
426 return;
427 }
428 if (pd->must_clear_promisc)
429 {
430 rte_eth_promiscuous_disable(pd->portid);
431 }
432 rte_eth_dev_stop(pd->portid);
433 rte_eth_dev_close(pd->portid);
434 pcap_cleanup_live_common(p);
435 }
436
437 static void nic_stats_display(struct pcap_dpdk *pd)
438 {
439 uint16_t portid = pd->portid;
440 struct rte_eth_stats stats;
441 rte_eth_stats_get(portid, &stats);
442 RTE_LOG(INFO,USER1, "portid:%d, RX-packets: %-10"PRIu64" RX-errors: %-10"PRIu64
443 " RX-bytes: %-10"PRIu64" RX-Imissed: %-10"PRIu64"\n", portid, stats.ipackets, stats.ierrors,
444 stats.ibytes,stats.imissed);
445 RTE_LOG(INFO,USER1, "portid:%d, RX-PPS: %-10"PRIu64" RX-Mbps: %.2lf\n", portid, pd->pps, pd->bps/1e6f );
446 }
447
448 static int pcap_dpdk_stats(pcap_t *p, struct pcap_stat *ps)
449 {
450 struct pcap_dpdk *pd = p->priv;
451 calculate_timestamp(&(pd->ts_helper), &(pd->curr_ts));
452 rte_eth_stats_get(pd->portid,&(pd->curr_stats));
453 if (ps){
454 ps->ps_recv = pd->curr_stats.ipackets;
455 ps->ps_drop = pd->curr_stats.ierrors;
456 ps->ps_drop += pd->bpf_drop;
457 ps->ps_ifdrop = pd->curr_stats.imissed;
458 }
459 uint64_t delta_pkt = pd->curr_stats.ipackets - pd->prev_stats.ipackets;
460 struct timeval delta_tm;
461 timersub(&(pd->curr_ts),&(pd->prev_ts), &delta_tm);
462 uint64_t delta_usec = delta_tm.tv_sec*1e6+delta_tm.tv_usec;
463 uint64_t delta_bit = (pd->curr_stats.ibytes-pd->prev_stats.ibytes)*8;
464 RTE_LOG(DEBUG, USER1, "delta_usec: %-10"PRIu64" delta_pkt: %-10"PRIu64" delta_bit: %-10"PRIu64"\n", delta_usec, delta_pkt, delta_bit);
465 pd->pps = (uint64_t)(delta_pkt*1e6f/delta_usec);
466 pd->bps = (uint64_t)(delta_bit*1e6f/delta_usec);
467 nic_stats_display(pd);
468 pd->prev_stats = pd->curr_stats;
469 pd->prev_ts = pd->curr_ts;
470 return 0;
471 }
472
473 static int pcap_dpdk_setnonblock(pcap_t *p, int nonblock){
474 struct pcap_dpdk *pd = (struct pcap_dpdk*)(p->priv);
475 pd->nonblock = nonblock;
476 return 0;
477 }
478
479 static int pcap_dpdk_getnonblock(pcap_t *p){
480 struct pcap_dpdk *pd = (struct pcap_dpdk*)(p->priv);
481 return pd->nonblock;
482 }
483 static int check_link_status(uint16_t portid, struct rte_eth_link *plink)
484 {
485 // wait up to 9 seconds to get link status
486 rte_eth_link_get(portid, plink);
487 return plink->link_status == ETH_LINK_UP;
488 }
489 static void eth_addr_str(ETHER_ADDR_TYPE *addrp, char* mac_str, int len)
490 {
491 int offset=0;
492 if (addrp == NULL){
493 snprintf(mac_str, len-1, DPDK_DEF_MAC_ADDR);
494 return;
495 }
496 for (int i=0; i<6; i++)
497 {
498 if (offset >= len)
499 { // buffer overflow
500 return;
501 }
502 if (i==0)
503 {
504 snprintf(mac_str+offset, len-1-offset, "%02X",addrp->addr_bytes[i]);
505 offset+=2; // FF
506 }else{
507 snprintf(mac_str+offset, len-1-offset, ":%02X", addrp->addr_bytes[i]);
508 offset+=3; // :FF
509 }
510 }
511 return;
512 }
513 // return portid by device name, otherwise return -1
514 static uint16_t portid_by_device(char * device)
515 {
516 uint16_t ret = DPDK_PORTID_MAX;
517 int len = strlen(device);
518 int prefix_len = strlen(DPDK_PREFIX);
519 unsigned long ret_ul = 0L;
520 char *pEnd;
521 if (len<=prefix_len || strncmp(device, DPDK_PREFIX, prefix_len)) // check prefix dpdk:
522 {
523 return ret;
524 }
525 //check all chars are digital
526 for (int i=prefix_len; device[i]; i++){
527 if (device[i]<'0' || device[i]>'9'){
528 return ret;
529 }
530 }
531 ret_ul = strtoul(&(device[prefix_len]), &pEnd, 10);
532 if (pEnd == &(device[prefix_len]) || *pEnd != '\0'){
533 return ret;
534 }
535 // too large for portid
536 if (ret_ul >= DPDK_PORTID_MAX){
537 return ret;
538 }
539 ret = (uint16_t)ret_ul;
540 return ret;
541 }
542
543 static int parse_dpdk_cfg(char* dpdk_cfg,char** dargv)
544 {
545 int cnt=0;
546 memset(dargv,0,sizeof(dargv[0])*DPDK_ARGC_MAX);
547 //current process name
548 int skip_space = 1;
549 int i=0;
550 RTE_LOG(INFO, USER1,"dpdk cfg: %s\n",dpdk_cfg);
551 // find first non space char
552 // The last opt is NULL
553 for (i=0;dpdk_cfg[i] && cnt<DPDK_ARGC_MAX-1;i++){
554 if (skip_space && dpdk_cfg[i]!=' '){ // not space
555 skip_space=!skip_space; // skip normal char
556 dargv[cnt++] = dpdk_cfg+i;
557 }
558 if (!skip_space && dpdk_cfg[i]==' '){ // fint a space
559 dpdk_cfg[i]=0x00; // end of this opt
560 skip_space=!skip_space; // skip space char
561 }
562 }
563 dargv[cnt]=NULL;
564 return cnt;
565 }
566
567 // only called once
568 // Returns:
569 //
570 // 1 on success;
571 //
572 // 0 if "the EAL cannot initialize on this system", which we treat as
573 // meaning "DPDK isn't available";
574 //
575 // a PCAP_ERROR_ code for other errors.
576 //
577 // If eaccess_not_fatal is non-zero, treat "a permissions issue" the way
578 // we treat "the EAL cannot initialize on this system". We use that
579 // when trying to find DPDK devices, as we don't want to fail to return
580 // *any* devices just because we can't support DPDK; when we're trying
581 // to open a device, we need to return a permissions error in that case.
582 static int dpdk_pre_init(char * ebuf, int eaccess_not_fatal)
583 {
584 int dargv_cnt=0;
585 char *dargv[DPDK_ARGC_MAX];
586 char *ptr_dpdk_cfg = NULL;
587 int ret;
588 // globale var
589 if (is_dpdk_pre_inited != 0)
590 {
591 // already inited; did that succeed?
592 if (is_dpdk_pre_inited < 0)
593 {
594 // failed
595 goto error;
596 }
597 else
598 {
599 // succeeded
600 return 1;
601 }
602 }
603 // init EAL
604 ptr_dpdk_cfg = getenv(DPDK_CFG_ENV_NAME);
605 // set default log level to debug
606 rte_log_set_global_level(DPDK_DEF_LOG_LEV);
607 if (ptr_dpdk_cfg == NULL)
608 {
609 RTE_LOG(INFO,USER1,"env $DPDK_CFG is unset, so using default: %s\n",DPDK_DEF_CFG);
610 ptr_dpdk_cfg = DPDK_DEF_CFG;
611 }
612 memset(dpdk_cfg_buf,0,sizeof(dpdk_cfg_buf));
613 snprintf(dpdk_cfg_buf,DPDK_CFG_MAX_LEN-1,"%s %s",DPDK_LIB_NAME,ptr_dpdk_cfg);
614 dargv_cnt = parse_dpdk_cfg(dpdk_cfg_buf,dargv);
615 ret = rte_eal_init(dargv_cnt,dargv);
616 if (ret == -1)
617 {
618 // Indicate that we've called rte_eal_init() by setting
619 // is_dpdk_pre_inited to the negative of the error code,
620 // and process the error.
621 is_dpdk_pre_inited = -rte_errno;
622 goto error;
623 }
624 // init succeeded, so we do not need to do it again later.
625 is_dpdk_pre_inited = 1;
626 return 1;
627
628 error:
629 switch (-is_dpdk_pre_inited)
630 {
631 case EACCES:
632 // This "indicates a permissions issue.".
633 RTE_LOG(ERR, USER1, "%s\n", DPDK_ERR_PERM_MSG);
634 // If we were told to treat this as just meaning
635 // DPDK isn't available, do so.
636 if (eaccess_not_fatal)
637 return 0;
638 // Otherwise report a fatal error.
639 snprintf(ebuf, PCAP_ERRBUF_SIZE,
640 "DPDK requires that it run as root");
641 return PCAP_ERROR_PERM_DENIED;
642
643 case EAGAIN:
644 // This "indicates either a bus or system
645 // resource was not available, setup may
646 // be attempted again."
647 // There's no such error in pcap, so I'm
648 // not sure what we should do here.
649 snprintf(ebuf, PCAP_ERRBUF_SIZE,
650 "Bus or system resource was not available");
651 break;
652
653 case EALREADY:
654 // This "indicates that the rte_eal_init
655 // function has already been called, and
656 // cannot be called again."
657 // That's not an error; set the "we've
658 // been here before" flag and return
659 // success.
660 is_dpdk_pre_inited = 1;
661 return 1;
662
663 case EFAULT:
664 // This "indicates the tailq configuration
665 // name was not found in memory configuration."
666 snprintf(ebuf, PCAP_ERRBUF_SIZE,
667 "The tailq configuration name was not found in the memory configuration");
668 return PCAP_ERROR;
669
670 case EINVAL:
671 // This "indicates invalid parameters were
672 // passed as argv/argc." Those came from
673 // the configuration file.
674 snprintf(ebuf, PCAP_ERRBUF_SIZE,
675 "The configuration file has invalid parameters");
676 break;
677
678 case ENOMEM:
679 // This "indicates failure likely caused by
680 // an out-of-memory condition."
681 snprintf(ebuf, PCAP_ERRBUF_SIZE,
682 "Out of memory");
683 break;
684
685 case ENODEV:
686 // This "indicates memory setup issues."
687 snprintf(ebuf, PCAP_ERRBUF_SIZE,
688 "An error occurred setting up memory");
689 break;
690
691 case ENOTSUP:
692 // This "indicates that the EAL cannot
693 // initialize on this system." We treat
694 // that as meaning DPDK isn't available
695 // on this machine, rather than as a
696 // fatal error, and let our caller decide
697 // whether that's a fatal error (if trying
698 // to activate a DPDK device) or not (if
699 // trying to enumerate devices).
700 return 0;
701
702 case EPROTO:
703 // This "indicates that the PCI bus is
704 // either not present, or is not readable
705 // by the eal." Does "the PCI bus is not
706 // present" mean "this machine has no PCI
707 // bus", which strikes me as a "not available"
708 // case? If so, should "is not readable by
709 // the EAL" also something we should treat
710 // as a "not available" case? If not, we
711 // can't distinguish between the two, so
712 // we're stuck.
713 snprintf(ebuf, PCAP_ERRBUF_SIZE,
714 "PCI bus is not present or not readable by the EAL");
715 break;
716
717 case ENOEXEC:
718 // This "indicates that a service core
719 // failed to launch successfully."
720 snprintf(ebuf, PCAP_ERRBUF_SIZE,
721 "A service core failed to launch successfully");
722 break;
723
724 default:
725 //
726 // That's not in the list of errors in
727 // the documentation; let it be reported
728 // as an error.
729 //
730 dpdk_fmt_errmsg_for_rte_errno(ebuf,
731 PCAP_ERRBUF_SIZE, -is_dpdk_pre_inited,
732 "dpdk error: dpdk_pre_init failed");
733 break;
734 }
735 // Error.
736 return PCAP_ERROR;
737 }
738
739 static int pcap_dpdk_activate(pcap_t *p)
740 {
741 struct pcap_dpdk *pd = p->priv;
742 pd->orig = p;
743 int ret = PCAP_ERROR;
744 uint16_t nb_ports=0;
745 uint16_t portid= DPDK_PORTID_MAX;
746 unsigned nb_mbufs = DPDK_NB_MBUFS;
747 struct rte_eth_rxconf rxq_conf;
748 struct rte_eth_txconf txq_conf;
749 struct rte_eth_conf local_port_conf = port_conf;
750 struct rte_eth_dev_info dev_info;
751 int is_port_up = 0;
752 struct rte_eth_link link;
753 do{
754 //init EAL; fail if we have insufficient permission
755 char dpdk_pre_init_errbuf[PCAP_ERRBUF_SIZE];
756 ret = dpdk_pre_init(dpdk_pre_init_errbuf, 0);
757 if (ret < 0)
758 {
759 // This returns a negative value on an error.
760 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
761 "Can't open device %s: %s",
762 p->opt.device, dpdk_pre_init_errbuf);
763 // ret is set to the correct error
764 break;
765 }
766 if (ret == 0)
767 {
768 // This means DPDK isn't available on this machine.
769 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
770 "Can't open device %s: DPDK is not available on this machine",
771 p->opt.device);
772 return PCAP_ERROR_NO_SUCH_DEVICE;
773 }
774
775 ret = dpdk_init_timer(pd);
776 if (ret<0)
777 {
778 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
779 "dpdk error: Init timer is zero with device %s",
780 p->opt.device);
781 ret = PCAP_ERROR;
782 break;
783 }
784
785 nb_ports = rte_eth_dev_count_avail();
786 if (nb_ports == 0)
787 {
788 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
789 "dpdk error: No Ethernet ports");
790 ret = PCAP_ERROR;
791 break;
792 }
793
794 portid = portid_by_device(p->opt.device);
795 if (portid == DPDK_PORTID_MAX){
796 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
797 "dpdk error: portid is invalid. device %s",
798 p->opt.device);
799 ret = PCAP_ERROR_NO_SUCH_DEVICE;
800 break;
801 }
802
803 pd->portid = portid;
804
805 if (p->snapshot <= 0 || p->snapshot > MAXIMUM_SNAPLEN)
806 {
807 p->snapshot = MAXIMUM_SNAPLEN;
808 }
809 // create the mbuf pool
810 pd->pktmbuf_pool = rte_pktmbuf_pool_create(MBUF_POOL_NAME, nb_mbufs,
811 MEMPOOL_CACHE_SIZE, 0, RTE_MBUF_DEFAULT_BUF_SIZE,
812 rte_socket_id());
813 if (pd->pktmbuf_pool == NULL)
814 {
815 dpdk_fmt_errmsg_for_rte_errno(p->errbuf,
816 PCAP_ERRBUF_SIZE, rte_errno,
817 "dpdk error: Cannot init mbuf pool");
818 ret = PCAP_ERROR;
819 break;
820 }
821 // config dev
822 rte_eth_dev_info_get(portid, &dev_info);
823 if (dev_info.tx_offload_capa & DEV_TX_OFFLOAD_MBUF_FAST_FREE)
824 {
825 local_port_conf.txmode.offloads |=DEV_TX_OFFLOAD_MBUF_FAST_FREE;
826 }
827 // only support 1 queue
828 ret = rte_eth_dev_configure(portid, 1, 1, &local_port_conf);
829 if (ret < 0)
830 {
831 dpdk_fmt_errmsg_for_rte_errno(p->errbuf,
832 PCAP_ERRBUF_SIZE, -ret,
833 "dpdk error: Cannot configure device: port=%u",
834 portid);
835 ret = PCAP_ERROR;
836 break;
837 }
838 // adjust rx tx
839 ret = rte_eth_dev_adjust_nb_rx_tx_desc(portid, &nb_rxd, &nb_txd);
840 if (ret < 0)
841 {
842 dpdk_fmt_errmsg_for_rte_errno(p->errbuf,
843 PCAP_ERRBUF_SIZE, -ret,
844 "dpdk error: Cannot adjust number of descriptors: port=%u",
845 portid);
846 ret = PCAP_ERROR;
847 break;
848 }
849 // get MAC addr
850 rte_eth_macaddr_get(portid, &(pd->eth_addr));
851 eth_addr_str(&(pd->eth_addr), pd->mac_addr, DPDK_MAC_ADDR_SIZE-1);
852
853 // init one RX queue
854 rxq_conf = dev_info.default_rxconf;
855 rxq_conf.offloads = local_port_conf.rxmode.offloads;
856 ret = rte_eth_rx_queue_setup(portid, 0, nb_rxd,
857 rte_eth_dev_socket_id(portid),
858 &rxq_conf,
859 pd->pktmbuf_pool);
860 if (ret < 0)
861 {
862 dpdk_fmt_errmsg_for_rte_errno(p->errbuf,
863 PCAP_ERRBUF_SIZE, -ret,
864 "dpdk error: rte_eth_rx_queue_setup:port=%u",
865 portid);
866 ret = PCAP_ERROR;
867 break;
868 }
869
870 // init one TX queue
871 txq_conf = dev_info.default_txconf;
872 txq_conf.offloads = local_port_conf.txmode.offloads;
873 ret = rte_eth_tx_queue_setup(portid, 0, nb_txd,
874 rte_eth_dev_socket_id(portid),
875 &txq_conf);
876 if (ret < 0)
877 {
878 dpdk_fmt_errmsg_for_rte_errno(p->errbuf,
879 PCAP_ERRBUF_SIZE, -ret,
880 "dpdk error: rte_eth_tx_queue_setup:port=%u",
881 portid);
882 ret = PCAP_ERROR;
883 break;
884 }
885 // Initialize TX buffers
886 tx_buffer = rte_zmalloc_socket(DPDK_TX_BUF_NAME,
887 RTE_ETH_TX_BUFFER_SIZE(MAX_PKT_BURST), 0,
888 rte_eth_dev_socket_id(portid));
889 if (tx_buffer == NULL)
890 {
891 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
892 "dpdk error: Cannot allocate buffer for tx on port %u", portid);
893 ret = PCAP_ERROR;
894 break;
895 }
896 rte_eth_tx_buffer_init(tx_buffer, MAX_PKT_BURST);
897 // Start device
898 ret = rte_eth_dev_start(portid);
899 if (ret < 0)
900 {
901 dpdk_fmt_errmsg_for_rte_errno(p->errbuf,
902 PCAP_ERRBUF_SIZE, -ret,
903 "dpdk error: rte_eth_dev_start:port=%u",
904 portid);
905 ret = PCAP_ERROR;
906 break;
907 }
908 // set promiscuous mode
909 if (p->opt.promisc){
910 pd->must_clear_promisc=1;
911 rte_eth_promiscuous_enable(portid);
912 }
913 // check link status
914 is_port_up = check_link_status(portid, &link);
915 if (!is_port_up){
916 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
917 "dpdk error: link is down, port=%u",portid);
918 ret = PCAP_ERROR_IFACE_NOT_UP;
919 break;
920 }
921 // reset statistics
922 rte_eth_stats_reset(pd->portid);
923 calculate_timestamp(&(pd->ts_helper), &(pd->prev_ts));
924 rte_eth_stats_get(pd->portid,&(pd->prev_stats));
925 // format pcap_t
926 pd->portid = portid;
927 p->fd = pd->portid;
928 if (p->snapshot <=0 || p->snapshot> MAXIMUM_SNAPLEN)
929 {
930 p->snapshot = MAXIMUM_SNAPLEN;
931 }
932 p->linktype = DLT_EN10MB; // Ethernet, the 10MB is historical.
933 p->selectable_fd = p->fd;
934 p->read_op = pcap_dpdk_dispatch;
935 p->inject_op = pcap_dpdk_inject;
936 // using pcap_filter currently, though DPDK provides their own BPF function. Because DPDK BPF needs load a ELF file as a filter.
937 p->setfilter_op = install_bpf_program;
938 p->setdirection_op = NULL;
939 p->set_datalink_op = NULL;
940 p->getnonblock_op = pcap_dpdk_getnonblock;
941 p->setnonblock_op = pcap_dpdk_setnonblock;
942 p->stats_op = pcap_dpdk_stats;
943 p->cleanup_op = pcap_dpdk_close;
944 p->breakloop_op = pcap_breakloop_common;
945 // set default timeout
946 pd->required_select_timeout.tv_sec = 0;
947 pd->required_select_timeout.tv_usec = DPDK_DEF_MIN_SLEEP_MS*1000;
948 p->required_select_timeout = &pd->required_select_timeout;
949 ret = 0; // OK
950 }while(0);
951
952 if (ret <= PCAP_ERROR) // all kinds of error code
953 {
954 pcap_cleanup_live_common(p);
955 }else{
956 rte_eth_dev_get_name_by_port(portid,pd->pci_addr);
957 RTE_LOG(INFO, USER1,"Port %d device: %s, MAC:%s, PCI:%s\n", portid, p->opt.device, pd->mac_addr, pd->pci_addr);
958 RTE_LOG(INFO, USER1,"Port %d Link Up. Speed %u Mbps - %s\n",
959 portid, link.link_speed,
960 (link.link_duplex == ETH_LINK_FULL_DUPLEX) ?
961 ("full-duplex") : ("half-duplex\n"));
962 }
963 return ret;
964 }
965
966 // device name for dpdk shoud be in the form as dpdk:number, such as dpdk:0
967 pcap_t * pcap_dpdk_create(const char *device, char *ebuf, int *is_ours)
968 {
969 pcap_t *p=NULL;
970 *is_ours = 0;
971
972 *is_ours = !strncmp(device, "dpdk:", 5);
973 if (! *is_ours)
974 return NULL;
975 //memset will happen
976 p = pcap_create_common(ebuf, sizeof(struct pcap_dpdk));
977
978 if (p == NULL)
979 return NULL;
980 p->activate_op = pcap_dpdk_activate;
981 return p;
982 }
983
984 int pcap_dpdk_findalldevs(pcap_if_list_t *devlistp, char *ebuf)
985 {
986 int ret=0;
987 unsigned int nb_ports = 0;
988 char dpdk_name[DPDK_DEV_NAME_MAX];
989 char dpdk_desc[DPDK_DEV_DESC_MAX];
990 ETHER_ADDR_TYPE eth_addr;
991 char mac_addr[DPDK_MAC_ADDR_SIZE];
992 char pci_addr[DPDK_PCI_ADDR_SIZE];
993 do{
994 // init EAL; return "DPDK not available" if we
995 // have insufficient permission
996 char dpdk_pre_init_errbuf[PCAP_ERRBUF_SIZE];
997 ret = dpdk_pre_init(dpdk_pre_init_errbuf, 1);
998 if (ret < 0)
999 {
1000 // This returns a negative value on an error.
1001 snprintf(ebuf, PCAP_ERRBUF_SIZE,
1002 "Can't look for DPDK devices: %s",
1003 dpdk_pre_init_errbuf);
1004 ret = PCAP_ERROR;
1005 break;
1006 }
1007 if (ret == 0)
1008 {
1009 // This means DPDK isn't available on this machine.
1010 // That just means "don't return any devices".
1011 break;
1012 }
1013 nb_ports = rte_eth_dev_count_avail();
1014 if (nb_ports == 0)
1015 {
1016 // That just means "don't return any devices".
1017 ret = 0;
1018 break;
1019 }
1020 for (unsigned int i=0; i<nb_ports; i++){
1021 snprintf(dpdk_name, DPDK_DEV_NAME_MAX-1,
1022 "%s%u", DPDK_PREFIX, i);
1023 // mac addr
1024 rte_eth_macaddr_get(i, &eth_addr);
1025 eth_addr_str(&eth_addr,mac_addr,DPDK_MAC_ADDR_SIZE);
1026 // PCI addr
1027 rte_eth_dev_get_name_by_port(i,pci_addr);
1028 snprintf(dpdk_desc,DPDK_DEV_DESC_MAX-1,"%s %s, MAC:%s, PCI:%s", DPDK_DESC, dpdk_name, mac_addr, pci_addr);
1029 if (add_dev(devlistp, dpdk_name, 0, dpdk_desc, ebuf)==NULL){
1030 ret = PCAP_ERROR;
1031 break;
1032 }
1033 }
1034 }while(0);
1035 return ret;
1036 }
1037
1038 #ifdef DPDK_ONLY
1039 /*
1040 * This libpcap build supports only DPDK, not regular network interfaces.
1041 */
1042
1043 /*
1044 * There are no regular interfaces, just DPDK interfaces.
1045 */
1046 int
1047 pcap_platform_finddevs(pcap_if_list_t *devlistp _U_, char *errbuf)
1048 {
1049 return (0);
1050 }
1051
1052 /*
1053 * Attempts to open a regular interface fail.
1054 */
1055 pcap_t *
1056 pcap_create_interface(const char *device, char *errbuf)
1057 {
1058 snprintf(errbuf, PCAP_ERRBUF_SIZE,
1059 "This version of libpcap only supports DPDK");
1060 return NULL;
1061 }
1062
1063 /*
1064 * Libpcap version string.
1065 */
1066 const char *
1067 pcap_lib_version(void)
1068 {
1069 return (PCAP_VERSION_STRING " (DPDK-only)");
1070 }
1071 #endif