>
> Add telemetry support for ipsec SAs
>
> Signed-off-by: Declan Doherty <declan.dohe...@intel.com>
> Signed-off-by: Radu Nicolau <radu.nico...@intel.com>
> Signed-off-by: Abhijit Sinha <abhijit.si...@intel.com>
> Signed-off-by: Daniel Martin Buckley <daniel.m.buck...@intel.com>
> Acked-by: Fan Zhang <roy.fan.zh...@intel.com>
> ---
> /* check if packet will exceed MSS and segmentation is required */
> diff --git a/lib/ipsec/ipsec_telemetry.c b/lib/ipsec/ipsec_telemetry.c
> new file mode 100644
> index 0000000000..f963d062a8
> --- /dev/null
> +++ b/lib/ipsec/ipsec_telemetry.c
> @@ -0,0 +1,237 @@
> +/* SPDX-License-Identifier: BSD-3-Clause
> + * Copyright(c) 2021 Intel Corporation
> + */
> +
> +#include <rte_ipsec.h>
> +#include <rte_telemetry.h>
> +#include <rte_malloc.h>
> +#include "sa.h"
> +
> +
> +struct ipsec_telemetry_entry {
> + LIST_ENTRY(ipsec_telemetry_entry) next;
> + struct rte_ipsec_sa *sa;
As a nit, might be const struct rte_ipsec_sa *sa?
> +};
> +static LIST_HEAD(ipsec_telemetry_head, ipsec_telemetry_entry)
> + ipsec_telemetry_list = LIST_HEAD_INITIALIZER();
> +
> +static int
> +handle_telemetry_cmd_ipsec_sa_list(const char *cmd __rte_unused,
> + const char *params __rte_unused,
> + struct rte_tel_data *data)
> +{
> + struct ipsec_telemetry_entry *entry;
> + rte_tel_data_start_array(data, RTE_TEL_U64_VAL);
> +
> + LIST_FOREACH(entry, &ipsec_telemetry_list, next) {
> + struct rte_ipsec_sa *sa = entry->sa;
> + rte_tel_data_add_array_u64(data, rte_be_to_cpu_32(sa->spi));
> + }
> +
> + return 0;
> +}
> +
> +/**
> + * Handle IPsec SA statistics telemetry request
> + *
> + * Return dict of SA's with dict of key/value counters
> + *
> + * {
> + * "SA_SPI_XX": {"count": 0, "bytes": 0, "errors": 0},
> + * "SA_SPI_YY": {"count": 0, "bytes": 0, "errors": 0}
> + * }
> + *
> + */
> +static int
> +handle_telemetry_cmd_ipsec_sa_stats(const char *cmd __rte_unused,
> + const char *params,
> + struct rte_tel_data *data)
> +{
> + struct ipsec_telemetry_entry *entry;
> + struct rte_ipsec_sa *sa;
> + uint32_t sa_spi = 0;
> +
> + if (params)
> + sa_spi = rte_cpu_to_be_32((uint32_t)strtoul(params, NULL, 10));
As a nit - probably worth to check that strtoul didn't return any errors.
Also, I don't know should be limit users to decimal input only.
> +
> + rte_tel_data_start_dict(data);
> +
> + LIST_FOREACH(entry, &ipsec_telemetry_list, next) {
> + char sa_name[64];
> + sa = entry->sa;
> + static const char *name_pkt_cnt = "count";
> + static const char *name_byte_cnt = "bytes";
> + static const char *name_error_cnt = "errors";
> + struct rte_tel_data *sa_data;
> +
> + /* If user provided SPI only get telemetry for that SA */
> + if (sa_spi && (sa_spi != sa->spi))
> + continue;
> +
> + /* allocate telemetry data struct for SA telemetry */
> + sa_data = rte_tel_data_alloc();
> + if (!sa_data)
> + return -ENOMEM;
> +
> + rte_tel_data_start_dict(sa_data);
> +
> + /* add telemetry key/values pairs */
> + rte_tel_data_add_dict_u64(sa_data, name_pkt_cnt,
> + sa->statistics.count);
> +
> + rte_tel_data_add_dict_u64(sa_data, name_byte_cnt,
> + sa->statistics.bytes -
> + (sa->statistics.count * sa->hdr_len));
> +
> + rte_tel_data_add_dict_u64(sa_data, name_error_cnt,
> + sa->statistics.errors.count);
> +
> + /* generate telemetry label */
> + snprintf(sa_name, sizeof(sa_name), "SA_SPI_%i",
> + rte_be_to_cpu_32(sa->spi));
> +
> + /* add SA telemetry to dictionary container */
> + rte_tel_data_add_dict_container(data, sa_name, sa_data, 0);
> + }
> +
> + return 0;
> +}
> +
> +static int
> +handle_telemetry_cmd_ipsec_sa_details(const char *cmd __rte_unused,
> + const char *params,
> + struct rte_tel_data *data)
> +{
> + struct ipsec_telemetry_entry *entry;
> + struct rte_ipsec_sa *sa;
> + uint32_t sa_spi;
> +
> + if (params)
> + sa_spi = rte_cpu_to_be_32((uint32_t)strtoul(params, NULL, 10));
> + else
> + return -EINVAL;
> +
> + rte_tel_data_start_dict(data);
> +
> + LIST_FOREACH(entry, &ipsec_telemetry_list, next) {
> + uint64_t mode;
> + sa = entry->sa;
> + if (sa_spi != sa->spi)
> + continue;
> +
> + /* add SA configuration key/values pairs */
> + rte_tel_data_add_dict_string(data, "Type",
> + (sa->type & RTE_IPSEC_SATP_PROTO_MASK) ==
> + RTE_IPSEC_SATP_PROTO_AH ? "AH" : "ESP");
> +
> + rte_tel_data_add_dict_string(data, "Direction",
> + (sa->type & RTE_IPSEC_SATP_DIR_MASK) ==
> + RTE_IPSEC_SATP_DIR_IB ? "Inbound" : "Outbound");
> +
> + mode = sa->type & RTE_IPSEC_SATP_MODE_MASK;
> +
> + if (mode == RTE_IPSEC_SATP_MODE_TRANS) {
> + rte_tel_data_add_dict_string(data, "Mode", "Transport");
> + } else {
> + rte_tel_data_add_dict_string(data, "Mode", "Tunnel");
> +
> + if ((sa->type & RTE_IPSEC_SATP_NATT_MASK) ==
> + RTE_IPSEC_SATP_NATT_ENABLE) {
> + if (sa->type & RTE_IPSEC_SATP_MODE_TUNLV4) {
> + rte_tel_data_add_dict_string(data,
> + "Tunnel-Type",
> + "IPv4-UDP");
> + } else if (sa->type &
> + RTE_IPSEC_SATP_MODE_TUNLV6) {
> + rte_tel_data_add_dict_string(data,
> + "Tunnel-Type",
> + "IPv4-UDP");
> + }
> + } else {
> + if (sa->type & RTE_IPSEC_SATP_MODE_TUNLV4) {
> + rte_tel_data_add_dict_string(data,
> + "Tunnel-Type",
> + "IPv4-UDP");
> + } else if (sa->type &
> + RTE_IPSEC_SATP_MODE_TUNLV6) {
> + rte_tel_data_add_dict_string(data,
> + "Tunnel-Type",
> + "IPv4-UDP");
> + }
> + }
> + }
> +
> + rte_tel_data_add_dict_string(data,
> + "extended-sequence-number",
> + (sa->type & RTE_IPSEC_SATP_ESN_MASK) ==
> + RTE_IPSEC_SATP_ESN_ENABLE ?
> + "enabled" : "disabled");
> +
> + if ((sa->type & RTE_IPSEC_SATP_DIR_MASK) ==
> + RTE_IPSEC_SATP_DIR_IB)
> +
> + if (sa->sqn.inb.rsn[sa->sqn.inb.rdidx])
> + rte_tel_data_add_dict_u64(data,
> + "sequence-number",
> + sa->sqn.inb.rsn[sa->sqn.inb.rdidx]->sqn);
> + else
> + rte_tel_data_add_dict_u64(data,
> + "sequence-number", 0);
> + else
> + rte_tel_data_add_dict_u64(data, "sequence-number",
> + sa->sqn.outb);
> +
> + rte_tel_data_add_dict_string(data,
> + "explicit-congestion-notification",
> + (sa->type & RTE_IPSEC_SATP_ECN_MASK) ==
> + RTE_IPSEC_SATP_ECN_ENABLE ?
> + "enabled" : "disabled");
> +
> + rte_tel_data_add_dict_string(data,
> + "copy-DSCP",
> + (sa->type & RTE_IPSEC_SATP_DSCP_MASK) ==
> + RTE_IPSEC_SATP_DSCP_ENABLE ?
> + "enabled" : "disabled");
> + }
> +
> + return 0;
> +}
> +
> +
> +int
> +rte_ipsec_telemetry_sa_add(struct rte_ipsec_sa *sa)
Just as a nit, here and in _del:
it probably could be const struct rte_ipsec_sa *sa
> +{
> + struct ipsec_telemetry_entry *entry = rte_zmalloc(NULL,
> + sizeof(struct ipsec_telemetry_entry), 0);
Need to check malloc() return value.
Can't assume it is always successful.
With that fixed:
Acked-by: Konstantin Ananyev <konstantin.anan...@intel.com>
> + entry->sa = sa;
> + LIST_INSERT_HEAD(&ipsec_telemetry_list, entry, next);
> + return 0;
> +}
> +
> +void
> +rte_ipsec_telemetry_sa_del(struct rte_ipsec_sa *sa)
> +{
> + struct ipsec_telemetry_entry *entry;
> + LIST_FOREACH(entry, &ipsec_telemetry_list, next) {
> + if (sa == entry->sa) {
> + LIST_REMOVE(entry, next);
> + rte_free(entry);
> + return;
> + }
> + }
> +}
> +
> +