aboutsummaryrefslogtreecommitdiffstats
AgeCommit message (Expand)AuthorFilesLines
2020-06-11docs: update 2n-clx job_specs for report_iterativeMaciek Konstantynowicz2-223/+146
2020-06-11docs: update 3n-skx job_specs for report_iterativeMaciek Konstantynowicz2-142/+67
2020-06-11Update selection of report-iterative test setsTibor Frank19-1/+204
2020-06-11Report 2005: Add dataTibor Frank1-29/+40
2020-06-10Report 2005: Add data, 2n-clx x533 cur vs prev tabTibor Frank2-7/+462
2020-06-10docs: update 3n-skx job_specs for report_coverageMaciek Konstantynowicz38-1419/+71
2020-06-10Report 2005: Add dataTibor Frank1-0/+32
2020-06-10NAT44 EI testsMaros Mullner27-25/+3907
2020-06-10Report 2005: vpp-device static contentJan Gelety2-3/+3
2020-06-10Infra: Ansible speed uppmikus3-19/+10
2020-06-09docs: update 2n-dnv job_specs for report_coverageMaciek Konstantynowicz7-104/+14
2020-06-09docs: update 3n-hsw job_specs for report_coverageMaciek Konstantynowicz37-1177/+89
2020-06-09docs: update 2n-skx job_specs for report_coverageMaciek Konstantynowicz16-428/+32
2020-06-09docs: update 3n-dnv job_specs for report_coverageMaciek Konstantynowicz10-136/+20
2020-06-09Infra: Ansible Nomadpmikus10-3/+159
2020-06-09Remove leading tc[nn] from test namesJuraj Linkeš563-5678/+5670
2020-06-09Report 2005: Add dataTibor Frank1-0/+8
2020-06-08Report 2005: Add data, configure 2005.24Tibor Frank4-3/+13
2020-06-04Report 2005: Add dataTibor Frank1-5/+5
2020-06-04Report 2005: Add dataTibor Frank1-16/+19
2020-06-03Report 2005: Temporarily disable VPP Compare NICs 3n-skx ?t?c mrrTibor Frank1-68/+68
2020-06-03Infra: Ansible Nomadpmikus4-2/+40
2020-06-03Report 2005: Fix wrong indentation in spec fileTibor Frank1-2/+2
2020-06-03Report 2005: Add dataTibor Frank1-95/+51
2020-06-03FIX: IP4 IP6 3n-onlypmikus2-3/+3
2020-06-03Fix DPDK build on armJuraj Linkeš1-0/+6
2020-06-02Report 2005: Add dataTibor Frank2-176/+208
2020-06-02Report 2005: Add dataTibor Frank1-3/+14
2020-06-02Report 2005: Add dataTibor Frank1-133/+92
2020-06-01Report 2005: Add dataTibor Frank1-40/+16
2020-05-27Update of VPP_STABLE_VER filesJan Gelety2-2/+2
2020-06-01Report: Add dataTibor Frank1-41/+63
2020-06-01Infra: Ansible ARMpmikus4-7/+26
2020-06-01Report 2005: Add dataTibor Frank1-43/+83
2020-05-29docs: update 2n-clx job_specs for report_coverageMaciek Konstantynowicz16-455/+32
2020-05-29Report: Add data and dpdk comparison tablesTibor Frank2-501/+954
2020-05-27FIX: check if testpmd is aliveJan Gelety1-3/+5
2020-05-28Remove hugepage dirs when killing dpdkJuraj Linkeš1-1/+1
2020-05-28Report: Fix links to html tablesTibor Frank9-92/+85
2020-05-28Update of VPP_STABLE_VER filesJan Gelety2-2/+2
2020-05-28PAL: Improvements in tables and formattingTibor Frank2-47/+64
2020-05-26FIX: do not fail when skipping patch for l3fwdJan Gelety2-3/+5
2020-05-27INFO: Add Juraj to committersVratko Polak1-0/+5
2020-05-27Terraform and ansible changes for Cloud environment (AWS, Azure).Maros Mullner17-55/+129
2020-05-27PAL: Fix table_comparison againTibor Frank1-1/+3
2020-05-27PAL: Fix table_comparisonTibor Frank1-1/+3
2020-05-27Report: configure report rls2005Tibor Frank7-1739/+1202
2020-05-26FIX: add dpdk mrr_weekly and report_iterative job specsJan Gelety34-18/+469
2020-05-26Add csit-vpp/dpdk-perf-report-coverage job and job specificationsJan Gelety144-0/+17490
2020-05-25FIX: vts perf testsJan Gelety3-12/+12
lk") \ _(TABLE_MISS, "input ACL table-miss drops") \ _(SESSION_DENY, "input ACL session deny drops") #define foreach_l2_outacl_error \ _(NONE, "valid output ACL packets") \ _(MISS, "output ACL misses") \ _(HIT, "output ACL hits") \ _(CHAIN_HIT, "output ACL hits after chain walk") \ _(TABLE_MISS, "output ACL table-miss drops") \ _(SESSION_DENY, "output ACL session deny drops") typedef enum { #define _(sym,str) L2_INACL_ERROR_##sym, foreach_l2_inacl_error #undef _ L2_INACL_N_ERROR, } l2_inacl_error_t; static char *l2_inacl_error_strings[] = { #define _(sym,string) string, foreach_l2_inacl_error #undef _ }; typedef enum { #define _(sym,str) L2_OUTACL_ERROR_##sym, foreach_l2_outacl_error #undef _ L2_OUTACL_N_ERROR, } l2_outacl_error_t; static char *l2_outacl_error_strings[] = { #define _(sym,string) string, foreach_l2_outacl_error #undef _ }; static inline uword l2_in_out_acl_node_fn (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * frame, int is_output) { u32 n_left_from, *from, *to_next; acl_next_index_t next_index; l2_in_out_acl_main_t *msm = &l2_in_out_acl_main; in_out_acl_main_t *am = &in_out_acl_main; vnet_classify_main_t *vcm = am->vnet_classify_main; in_out_acl_table_id_t tid = IN_OUT_ACL_TABLE_L2; f64 now = vlib_time_now (vm); u32 hits = 0; u32 misses = 0; u32 chain_hits = 0; from = vlib_frame_vector_args (frame); n_left_from = frame->n_vectors; /* number of packets to process */ next_index = node->cached_next_index; /* First pass: compute hashes */ while (n_left_from > 2) { vlib_buffer_t *b0, *b1; u32 bi0, bi1; u8 *h0, *h1; u32 sw_if_index0, sw_if_index1; u32 table_index0, table_index1; vnet_classify_table_t *t0, *t1; /* prefetch next iteration */ { vlib_buffer_t *p1, *p2; p1 = vlib_get_buffer (vm, from[1]); p2 = vlib_get_buffer (vm, from[2]); vlib_prefetch_buffer_header (p1, STORE); CLIB_PREFETCH (p1->data, CLIB_CACHE_LINE_BYTES, STORE); vlib_prefetch_buffer_header (p2, STORE); CLIB_PREFETCH (p2->data, CLIB_CACHE_LINE_BYTES, STORE); } bi0 = from[0]; b0 = vlib_get_buffer (vm, bi0); bi1 = from[1]; b1 = vlib_get_buffer (vm, bi1); sw_if_index0 = vnet_buffer (b0)->sw_if_index[is_output ? VLIB_TX : VLIB_RX]; table_index0 = am->classify_table_index_by_sw_if_index[is_output][tid][sw_if_index0]; sw_if_index1 = vnet_buffer (b1)->sw_if_index[is_output ? VLIB_TX : VLIB_RX]; table_index1 = am->classify_table_index_by_sw_if_index[is_output][tid][sw_if_index1]; t0 = pool_elt_at_index (vcm->tables, table_index0); t1 = pool_elt_at_index (vcm->tables, table_index1); if (t0->current_data_flag == CLASSIFY_FLAG_USE_CURR_DATA) h0 = (void *) vlib_buffer_get_current (b0) + t0->current_data_offset; else h0 = (void *) vlib_buffer_get_current (b0); vnet_buffer (b0)->l2_classify.hash = vnet_classify_hash_packet (t0, (u8 *) h0); vnet_classify_prefetch_bucket (t0, vnet_buffer (b0)->l2_classify.hash); if (t1->current_data_flag == CLASSIFY_FLAG_USE_CURR_DATA) h1 = (void *) vlib_buffer_get_current (b1) + t1->current_data_offset; else h1 = (void *) vlib_buffer_get_current (b1); vnet_buffer (b1)->l2_classify.hash = vnet_classify_hash_packet (t1, (u8 *) h1); vnet_classify_prefetch_bucket (t1, vnet_buffer (b1)->l2_classify.hash); vnet_buffer (b0)->l2_classify.table_index = table_index0; vnet_buffer (b1)->l2_classify.table_index = table_index1; from += 2; n_left_from -= 2; } while (n_left_from > 0) { vlib_buffer_t *b0; u32 bi0; u8 *h0; u32 sw_if_index0; u32 table_index0; vnet_classify_table_t *t0; bi0 = from[0]; b0 = vlib_get_buffer (vm, bi0); sw_if_index0 = vnet_buffer (b0)->sw_if_index[is_output ? VLIB_TX : VLIB_RX]; table_index0 = am->classify_table_index_by_sw_if_index[is_output][tid][sw_if_index0]; t0 = pool_elt_at_index (vcm->tables, table_index0); if (t0->current_data_flag == CLASSIFY_FLAG_USE_CURR_DATA) h0 = (void *) vlib_buffer_get_current (b0) + t0->current_data_offset; else h0 = (void *) vlib_buffer_get_current (b0); vnet_buffer (b0)->l2_classify.hash = vnet_classify_hash_packet (t0, (u8 *) h0); vnet_buffer (b0)->l2_classify.table_index = table_index0; vnet_classify_prefetch_bucket (t0, vnet_buffer (b0)->l2_classify.hash); from++; n_left_from--; } next_index = node->cached_next_index; from = vlib_frame_vector_args (frame); n_left_from = frame->n_vectors; while (n_left_from > 0) { u32 n_left_to_next; vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next); /* Not enough load/store slots to dual loop... */ while (n_left_from > 0 && n_left_to_next > 0) { u32 bi0; vlib_buffer_t *b0; u32 next0 = ACL_NEXT_INDEX_DENY; u32 table_index0; vnet_classify_table_t *t0; vnet_classify_entry_t *e0; u64 hash0; u8 *h0; u8 error0; /* Stride 3 seems to work best */ if (PREDICT_TRUE (n_left_from > 3)) { vlib_buffer_t *p1 = vlib_get_buffer (vm, from[3]); vnet_classify_table_t *tp1; u32 table_index1; u64 phash1; table_index1 = vnet_buffer (p1)->l2_classify.table_index; if (PREDICT_TRUE (table_index1 != ~0)) { tp1 = pool_elt_at_index (vcm->tables, table_index1); phash1 = vnet_buffer (p1)->l2_classify.hash; vnet_classify_prefetch_entry (tp1, phash1); } } /* speculatively enqueue b0 to the current next frame */ bi0 = from[0]; to_next[0] = bi0; from += 1; to_next += 1; n_left_from -= 1; n_left_to_next -= 1; b0 = vlib_get_buffer (vm, bi0); table_index0 = vnet_buffer (b0)->l2_classify.table_index; e0 = 0; t0 = 0; vnet_buffer (b0)->l2_classify.opaque_index = ~0; /* Determine the next node */ next0 = vnet_l2_feature_next (b0, msm->feat_next_node_index[is_output], is_output ? L2OUTPUT_FEAT_ACL : L2INPUT_FEAT_ACL); if (PREDICT_TRUE (table_index0 != ~0)) { hash0 = vnet_buffer (b0)->l2_classify.hash; t0 = pool_elt_at_index (vcm->tables, table_index0); if (t0->current_data_flag == CLASSIFY_FLAG_USE_CURR_DATA) h0 = (void *) vlib_buffer_get_current (b0) + t0->current_data_offset; else h0 = (void *) vlib_buffer_get_current (b0); e0 = vnet_classify_find_entry (t0, (u8 *) h0, hash0, now); if (e0) { vnet_buffer (b0)->l2_classify.opaque_index = e0->opaque_index; vlib_buffer_advance (b0, e0->advance); next0 = (e0->next_index < ACL_NEXT_INDEX_N_NEXT) ? e0->next_index : next0; hits++; if (is_output) error0 = (next0 == ACL_NEXT_INDEX_DENY) ? L2_OUTACL_ERROR_SESSION_DENY : L2_INACL_ERROR_NONE; else error0 = (next0 == ACL_NEXT_INDEX_DENY) ? L2_OUTACL_ERROR_SESSION_DENY : L2_OUTACL_ERROR_NONE; b0->error = node->errors[error0]; } else { while (1) { if (PREDICT_TRUE (t0->next_table_index != ~0)) t0 = pool_elt_at_index (vcm->tables, t0->next_table_index); else { next0 = (t0->miss_next_index < ACL_NEXT_INDEX_N_NEXT) ? t0->miss_next_index : next0; misses++; if (is_output) error0 = (next0 == ACL_NEXT_INDEX_DENY) ? L2_OUTACL_ERROR_TABLE_MISS : L2_OUTACL_ERROR_NONE; else error0 = (next0 == ACL_NEXT_INDEX_DENY) ? L2_INACL_ERROR_TABLE_MISS : L2_INACL_ERROR_NONE; b0->error = node->errors[error0]; break; } if (t0->current_data_flag == CLASSIFY_FLAG_USE_CURR_DATA) h0 = (void *) vlib_buffer_get_current (b0) + t0->current_data_offset; else h0 = (void *) vlib_buffer_get_current (b0); hash0 = vnet_classify_hash_packet (t0, (u8 *) h0); e0 = vnet_classify_find_entry (t0, (u8 *) h0, hash0, now); if (e0) { vlib_buffer_advance (b0, e0->advance); next0 = (e0->next_index < ACL_NEXT_INDEX_N_NEXT) ? e0->next_index : next0; hits++; chain_hits++; if (is_output) error0 = (next0 == ACL_NEXT_INDEX_DENY) ? L2_OUTACL_ERROR_SESSION_DENY : L2_OUTACL_ERROR_NONE; else error0 = (next0 == ACL_NEXT_INDEX_DENY) ? L2_INACL_ERROR_SESSION_DENY : L2_INACL_ERROR_NONE; b0->error = node->errors[error0]; break; } } } } if (PREDICT_FALSE ((node->flags & VLIB_NODE_FLAG_TRACE) && (b0->flags & VLIB_BUFFER_IS_TRACED))) { l2_in_out_acl_trace_t *t = vlib_add_trace (vm, node, b0, sizeof (*t)); t->sw_if_index = vnet_buffer (b0)->sw_if_index[is_output ? VLIB_TX : VLIB_RX]; t->next_index = next0; t->table_index = t0 ? t0 - vcm->tables : ~0; t->offset = (t0 && e0) ? vnet_classify_get_offset (t0, e0) : ~0; } /* verify speculative enqueue, maybe switch current next frame */ vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next, n_left_to_next, bi0, next0); } vlib_put_next_frame (vm, node, next_index, n_left_to_next); } vlib_node_increment_counter (vm, node->node_index, is_output ? L2_OUTACL_ERROR_MISS : L2_INACL_ERROR_MISS, misses); vlib_node_increment_counter (vm, node->node_index, is_output ? L2_OUTACL_ERROR_HIT : L2_INACL_ERROR_HIT, hits); vlib_node_increment_counter (vm, node->node_index, is_output ? L2_OUTACL_ERROR_CHAIN_HIT : L2_INACL_ERROR_CHAIN_HIT, chain_hits); return frame->n_vectors; } static uword l2_inacl_node_fn (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * frame) { return l2_in_out_acl_node_fn (vm, node, frame, IN_OUT_ACL_INPUT_TABLE_GROUP); } static uword l2_outacl_node_fn (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * frame) { return l2_in_out_acl_node_fn (vm, node, frame, IN_OUT_ACL_OUTPUT_TABLE_GROUP); } /* *INDENT-OFF* */ VLIB_REGISTER_NODE (l2_inacl_node,static) = { .function = l2_inacl_node_fn, .name = "l2-input-acl", .vector_size = sizeof (u32), .format_trace = format_l2_inacl_trace, .type = VLIB_NODE_TYPE_INTERNAL, .n_errors = ARRAY_LEN(l2_inacl_error_strings), .error_strings = l2_inacl_error_strings, .n_next_nodes = ACL_NEXT_INDEX_N_NEXT, /* edit / add dispositions here */ .next_nodes = { [ACL_NEXT_INDEX_DENY] = "error-drop", }, }; VLIB_REGISTER_NODE (l2_outacl_node,static) = { .function = l2_outacl_node_fn, .name = "l2-output-acl", .vector_size = sizeof (u32), .format_trace = format_l2_outacl_trace, .type = VLIB_NODE_TYPE_INTERNAL, .n_errors = ARRAY_LEN(l2_outacl_error_strings), .error_strings = l2_outacl_error_strings, .n_next_nodes = ACL_NEXT_INDEX_N_NEXT, /* edit / add dispositions here */ .next_nodes = { [ACL_NEXT_INDEX_DENY] = "error-drop", }, }; VLIB_NODE_FUNCTION_MULTIARCH (l2_inacl_node, l2_inacl_node_fn) VLIB_NODE_FUNCTION_MULTIARCH (l2_outacl_node, l2_outacl_node_fn) /* *INDENT-ON* */ clib_error_t * l2_in_out_acl_init (vlib_main_t * vm) { l2_in_out_acl_main_t *mp = &l2_in_out_acl_main; mp->vlib_main = vm; mp->vnet_main = vnet_get_main (); /* Initialize the feature next-node indexes */ feat_bitmap_init_next_nodes (vm, l2_inacl_node.index, L2INPUT_N_FEAT, l2input_get_feat_names (), mp->feat_next_node_index [IN_OUT_ACL_INPUT_TABLE_GROUP]); feat_bitmap_init_next_nodes (vm, l2_outacl_node.index, L2OUTPUT_N_FEAT, l2output_get_feat_names (), mp->feat_next_node_index [IN_OUT_ACL_OUTPUT_TABLE_GROUP]); return 0; } VLIB_INIT_FUNCTION (l2_in_out_acl_init); /* * fd.io coding-style-patch-verification: ON * * Local Variables: * eval: (c-set-style "gnu") * End: */