diff options
author | Andrew Yourtchenko <ayourtch@gmail.com> | 2018-10-26 15:13:56 +0200 |
---|---|---|
committer | Dave Barach <openvpp@barachs.net> | 2018-11-02 12:19:07 +0000 |
commit | cc8fa169297b0052e5a8d570eb41e5875b28561f (patch) | |
tree | e7853c0dfbdb6f580c768dbc3a258cfea5249562 /src/vnet/ip | |
parent | bd0da97e5ac0f84e1ea8e6e7f9549dd4e1a6a4ab (diff) |
vnet: ping: rewrite for maintainability and multicore support
Refactor most of the ping code to be address-family agnostic,
and add support for chained buffers (thus, sending
the payloads bigger than 2K).
Change-Id: I749c302ca2f3390e0d1f84046fc72da5cf13e3ef
Signed-off-by: Andrew Yourtchenko <ayourtch@gmail.com>
Diffstat (limited to 'src/vnet/ip')
-rwxr-xr-x | src/vnet/ip/ping.c | 1130 | ||||
-rw-r--r-- | src/vnet/ip/ping.h | 57 |
2 files changed, 737 insertions, 450 deletions
diff --git a/src/vnet/ip/ping.c b/src/vnet/ip/ping.c index 2c5c44f5f26..f147e47f1c2 100755 --- a/src/vnet/ip/ping.c +++ b/src/vnet/ip/ping.c @@ -31,6 +31,14 @@ ping_main_t ping_main; * */ +typedef struct +{ + u16 id; + u16 seq; + u32 cli_process_node; + u8 is_ip6; +} icmp_echo_trace_t; + u8 * format_icmp_echo_trace (u8 * s, va_list * va) @@ -39,13 +47,22 @@ format_icmp_echo_trace (u8 * s, va_list * va) CLIB_UNUSED (vlib_node_t * node) = va_arg (*va, vlib_node_t *); icmp_echo_trace_t *t = va_arg (*va, icmp_echo_trace_t *); - s = format (s, "ICMP echo id %d seq %d%s", - clib_net_to_host_u16 (t->id), - clib_net_to_host_u16 (t->seq), t->bound ? "" : " (unknown)"); + s = + format (s, "ICMP%s echo id %d seq %d", t->is_ip6 ? "6" : "4", t->id, + t->seq); + if (t->cli_process_node == PING_CLI_UNKNOWN_NODE) + { + s = format (s, " (unknown)"); + } + else + { + s = format (s, " send to cli node %d", t->cli_process_node); + } return s; } + static u8 * format_ip46_ping_result (u8 * s, va_list * args) { @@ -53,7 +70,7 @@ format_ip46_ping_result (u8 * s, va_list * args) switch (res) { -#define _(v, n) case SEND_PING_##v: s = format(s, "%s", n); +#define _(v, n) case SEND_PING_##v: s = format(s, "%s", n);break; foreach_ip46_ping_result #undef _ } @@ -61,497 +78,803 @@ format_ip46_ping_result (u8 * s, va_list * args) return (s); } + /* - * If we can find the ping run by an ICMP ID, then we send the signal - * to the CLI process referenced by that ping run, alongside with - * a freshly made copy of the packet. - * I opted for a packet copy to keep the main packet processing path - * the same as for all the other nodes. + * Poor man's get-set-clear functions + * for manipulation of icmp_id -> cli_process_id + * mappings. + * + * There should normally be very few (0..1..2) of these + * mappings, so the linear search is a good strategy. + * + * Make them thread-safe via a simple spinlock. * */ -static int -signal_ip46_icmp_reply_event (u8 event_type, vlib_buffer_t * b0) + +static_always_inline uword +get_cli_process_id_by_icmp_id_mt (vlib_main_t * vm, u16 icmp_id) { ping_main_t *pm = &ping_main; - u16 net_icmp_id = 0; - u32 bi0_copy = 0; + uword cli_process_id = PING_CLI_UNKNOWN_NODE; + ping_run_t *pr; - switch (event_type) - { - case PING_RESPONSE_IP4: + clib_spinlock_lock_if_init (&pm->ping_run_check_lock); + vec_foreach (pr, pm->active_ping_runs) + { + if (pr->icmp_id == icmp_id) { - icmp4_echo_request_header_t *h0 = vlib_buffer_get_current (b0); - net_icmp_id = h0->icmp_echo.id; + cli_process_id = pr->cli_process_id; + break; } - break; - case PING_RESPONSE_IP6: + } + clib_spinlock_unlock_if_init (&pm->ping_run_check_lock); + return cli_process_id; +} + + +static_always_inline void +set_cli_process_id_by_icmp_id_mt (vlib_main_t * vm, u16 icmp_id, + uword cli_process_id) +{ + ping_main_t *pm = &ping_main; + ping_run_t *pr; + + clib_spinlock_lock_if_init (&pm->ping_run_check_lock); + vec_foreach (pr, pm->active_ping_runs) + { + if (pr->icmp_id == icmp_id) { - icmp6_echo_request_header_t *h0 = vlib_buffer_get_current (b0); - net_icmp_id = h0->icmp_echo.id; + pr->cli_process_id = cli_process_id; + goto have_found_and_set; } - break; - default: - return 0; - } + } + /* no such key yet - add a new one */ + ping_run_t new_pr = {.icmp_id = icmp_id,.cli_process_id = cli_process_id }; + vec_add1 (pm->active_ping_runs, new_pr); +have_found_and_set: + clib_spinlock_unlock_if_init (&pm->ping_run_check_lock); +} + + +static_always_inline void +clear_cli_process_id_by_icmp_id_mt (vlib_main_t * vm, u16 icmp_id) +{ + ping_main_t *pm = &ping_main; + ping_run_t *pr; - uword *p = hash_get (pm->ping_run_by_icmp_id, - clib_net_to_host_u16 (net_icmp_id)); - if (!p) - return 0; + clib_spinlock_lock_if_init (&pm->ping_run_check_lock); + vec_foreach (pr, pm->active_ping_runs) + { + if (pr->icmp_id == icmp_id) + { + vec_del1 (pm->active_ping_runs, pm->active_ping_runs - pr); + break; + } + } + clib_spinlock_unlock_if_init (&pm->ping_run_check_lock); +} - ping_run_t *pr = vec_elt_at_index (pm->ping_runs, p[0]); - vlib_main_t *vm = vlib_mains[pr->cli_thread_index]; - if (vlib_buffer_alloc (vm, &bi0_copy, 1) == 1) +static_always_inline int +ip46_get_icmp_id_and_seq (vlib_main_t * vm, vlib_buffer_t * b0, + u16 * out_icmp_id, u16 * out_icmp_seq, int is_ip6) +{ + int l4_offset; + if (is_ip6) { - void *dst = vlib_buffer_get_current (vlib_get_buffer (vm, - bi0_copy)); - clib_memcpy (dst, vlib_buffer_get_current (b0), b0->current_length); + ip6_header_t *ip6 = vlib_buffer_get_current (b0); + if (ip6->protocol != IP_PROTOCOL_ICMP6) + { + return 0; + } + l4_offset = sizeof (*ip6); // IPv6 EH } - /* If buffer_alloc failed, bi0_copy == 0 - just signaling an event. */ - f64 nowts = vlib_time_now (vm); - /* Pass the timestamp to the cli_process thanks to the vnet_buffer unused metadata field */ - clib_memcpy (vnet_buffer - (vlib_get_buffer - (vm, bi0_copy))->unused, &nowts, sizeof (nowts)); - vlib_process_signal_event_mt (vm, pr->cli_process_id, event_type, bi0_copy); + else + { + ip4_header_t *ip4 = vlib_buffer_get_current (b0); + l4_offset = ip4_header_bytes (ip4); + + } + icmp46_header_t *icmp46 = vlib_buffer_get_current (b0) + l4_offset; + icmp46_echo_request_t *icmp46_echo = (icmp46_echo_request_t *) (icmp46 + 1); + + *out_icmp_id = clib_net_to_host_u16 (icmp46_echo->id); + *out_icmp_seq = clib_net_to_host_u16 (icmp46_echo->seq); return 1; } /* - * Process ICMPv6 echo replies + * post the buffer to a given cli process node - the caller should forget bi0 after return. */ -static uword -ip6_icmp_echo_reply_node_fn (vlib_main_t * vm, - vlib_node_runtime_t * node, vlib_frame_t * frame) -{ - u32 n_left_from, *from; - - from = vlib_frame_vector_args (frame); /* array of buffer indices */ - n_left_from = frame->n_vectors; /* number of buffer indices */ - while (n_left_from > 0) - { - u32 bi0; - vlib_buffer_t *b0; - u32 next0; +static_always_inline void +ip46_post_icmp_reply_event (vlib_main_t * vm, uword cli_process_id, u32 bi0, + int is_ip6) +{ + vlib_buffer_t *b0 = vlib_get_buffer (vm, bi0); + u64 nowts = clib_cpu_time_now (); - bi0 = from[0]; - b0 = vlib_get_buffer (vm, bi0); + /* Pass the timestamp to the cli_process thanks to the vnet_buffer unused metadata field */ - next0 = signal_ip46_icmp_reply_event (PING_RESPONSE_IP6, b0) ? - ICMP6_ECHO_REPLY_NEXT_DROP : ICMP6_ECHO_REPLY_NEXT_PUNT; + /* Camping on unused data... just ensure statically that there is enough space */ + STATIC_ASSERT (ARRAY_LEN (vnet_buffer (b0)->unused) * + sizeof (vnet_buffer (b0)->unused[0]) > sizeof (nowts), + "ping reply timestamp fits within remaining space of vnet_buffer unused data"); + u64 *pnowts = (void *) &vnet_buffer (b0)->unused[0]; + *pnowts = nowts; - if (PREDICT_FALSE (b0->flags & VLIB_BUFFER_IS_TRACED)) - { - icmp6_echo_request_header_t *h0 = vlib_buffer_get_current (b0); - icmp_echo_trace_t *tr = vlib_add_trace (vm, node, b0, sizeof (*tr)); - tr->id = h0->icmp_echo.id; - tr->seq = h0->icmp_echo.seq; - tr->bound = (next0 == ICMP6_ECHO_REPLY_NEXT_DROP); - } + u32 event_id = is_ip6 ? PING_RESPONSE_IP6 : PING_RESPONSE_IP4; + vlib_process_signal_event_mt (vm, cli_process_id, event_id, bi0); +} - /* push this pkt to the next graph node */ - vlib_set_next_frame_buffer (vm, node, next0, bi0); - from += 1; - n_left_from -= 1; +static_always_inline void +ip46_echo_reply_maybe_trace_buffer (vlib_main_t * vm, + vlib_node_runtime_t * node, + uword cli_process_id, u16 id, u16 seq, + vlib_buffer_t * b0, int is_ip6) +{ + if (PREDICT_FALSE (b0->flags & VLIB_BUFFER_IS_TRACED)) + { + icmp_echo_trace_t *tr = vlib_add_trace (vm, node, b0, sizeof (*tr)); + tr->id = id; + tr->seq = seq; + tr->cli_process_node = cli_process_id; + tr->is_ip6 = is_ip6; } - - return frame->n_vectors; } -/* *INDENT-OFF* */ -VLIB_REGISTER_NODE (ip6_icmp_echo_reply_node, static) = -{ - .function = ip6_icmp_echo_reply_node_fn, - .name = "ip6-icmp-echo-reply", - .vector_size = sizeof (u32), - .format_trace = format_icmp_echo_trace, - .n_next_nodes = ICMP6_ECHO_REPLY_N_NEXT, - .next_nodes = { - [ICMP6_ECHO_REPLY_NEXT_DROP] = "ip6-drop", - [ICMP6_ECHO_REPLY_NEXT_PUNT] = "ip6-punt", - }, -}; -/* *INDENT-ON* */ -/* - * Process ICMPv4 echo replies - */ -static uword -ip4_icmp_echo_reply_node_fn (vlib_main_t * vm, - vlib_node_runtime_t * node, vlib_frame_t * frame) +static_always_inline uword +ip46_icmp_echo_reply_inner_node_fn (vlib_main_t * vm, + vlib_node_runtime_t * node, + vlib_frame_t * frame, int do_trace, + int is_ip6) { - u32 n_left_from, *from; + u32 n_left_from, *from, *to_next; + icmp46_echo_reply_next_t next_index; + + from = vlib_frame_vector_args (frame); + n_left_from = frame->n_vectors; - from = vlib_frame_vector_args (frame); /* array of buffer indices */ - n_left_from = frame->n_vectors; /* number of buffer indices */ + next_index = node->cached_next_index; while (n_left_from > 0) { - u32 bi0; - vlib_buffer_t *b0; - u32 next0; + u32 n_left_to_next; + vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next); - bi0 = from[0]; - b0 = vlib_get_buffer (vm, bi0); + while (n_left_from > 0 && n_left_to_next > 0) + { + u32 bi0; + vlib_buffer_t *b0; + /* + * The buffers (replies) are either posted to the CLI thread + * awaiting for them for subsequent analysis and disposal, + * or are sent to the punt node. + * + * So the only "next" node is a punt, normally. + */ + u32 next0 = ICMP46_ECHO_REPLY_NEXT_PUNT; + + bi0 = from[0]; + b0 = vlib_get_buffer (vm, bi0); + from += 1; + n_left_from -= 1; + + u16 icmp_id = ~0; + u16 icmp_seq = ~0; + uword cli_process_id = PING_CLI_UNKNOWN_NODE; + + if (ip46_get_icmp_id_and_seq (vm, b0, &icmp_id, &icmp_seq, is_ip6)) + { + cli_process_id = get_cli_process_id_by_icmp_id_mt (vm, icmp_id); + } - next0 = signal_ip46_icmp_reply_event (PING_RESPONSE_IP4, b0) ? - ICMP4_ECHO_REPLY_NEXT_DROP : ICMP4_ECHO_REPLY_NEXT_PUNT; + if (do_trace) + ip46_echo_reply_maybe_trace_buffer (vm, node, cli_process_id, + icmp_id, icmp_seq, b0, + is_ip6); - if (PREDICT_FALSE (b0->flags & VLIB_BUFFER_IS_TRACED)) - { - icmp4_echo_request_header_t *h0 = vlib_buffer_get_current (b0); - icmp_echo_trace_t *tr = vlib_add_trace (vm, node, b0, sizeof (*tr)); - tr->id = h0->icmp_echo.id; - tr->seq = h0->icmp_echo.seq; - tr->bound = (next0 == ICMP4_ECHO_REPLY_NEXT_DROP); + if (~0 == cli_process_id) + { + /* no outstanding requests for this reply, punt */ + /* speculatively enqueue b0 to the current next frame */ + to_next[0] = bi0; + to_next += 1; + n_left_to_next -= 1; + /* verify speculative enqueue, maybe switch current next frame */ + vlib_validate_buffer_enqueue_x1 (vm, node, next_index, + to_next, n_left_to_next, + bi0, next0); + } + else + { + /* Post the buffer to CLI thread. It will take care of freeing it. */ + ip46_post_icmp_reply_event (vm, cli_process_id, bi0, is_ip6); + } } + vlib_put_next_frame (vm, node, next_index, n_left_to_next); + } + return frame->n_vectors; +} - /* push this pkt to the next graph node */ - vlib_set_next_frame_buffer (vm, node, next0, bi0); +/* + * select "with-trace" or "without-trace" codepaths upfront. + */ +static_always_inline uword +ip46_icmp_echo_reply_outer_node_fn (vlib_main_t * vm, + vlib_node_runtime_t * node, + vlib_frame_t * frame, int is_ip6) +{ + if (node->flags & VLIB_NODE_FLAG_TRACE) + return ip46_icmp_echo_reply_inner_node_fn (vm, node, frame, + 1 /* do_trace */ , is_ip6); + else + return ip46_icmp_echo_reply_inner_node_fn (vm, node, frame, + 0 /* do_trace */ , is_ip6); +} - from += 1; - n_left_from -= 1; - } +static uword +ip4_icmp_echo_reply_node_fn (vlib_main_t * vm, + vlib_node_runtime_t * node, vlib_frame_t * frame) +{ + return ip46_icmp_echo_reply_outer_node_fn (vm, node, frame, + 0 /* is_ip6 */ ); +} - return frame->n_vectors; +static uword +ip6_icmp_echo_reply_node_fn (vlib_main_t * vm, + vlib_node_runtime_t * node, vlib_frame_t * frame) +{ + return ip46_icmp_echo_reply_outer_node_fn (vm, node, frame, + 1 /* is_ip6 */ ); } /* *INDENT-OFF* */ +VLIB_REGISTER_NODE (ip6_icmp_echo_reply_node, static) = +{ + .function = ip6_icmp_echo_reply_node_fn, + .name = "ip6-icmp-echo-reply", + .vector_size = sizeof (u32), + .format_trace = format_icmp_echo_trace, + .n_next_nodes = ICMP46_ECHO_REPLY_N_NEXT, + .next_nodes = { + [ICMP46_ECHO_REPLY_NEXT_DROP] = "ip6-drop", + [ICMP46_ECHO_REPLY_NEXT_PUNT] = "ip6-punt", + }, +}; + VLIB_REGISTER_NODE (ip4_icmp_echo_reply_node, static) = { .function = ip4_icmp_echo_reply_node_fn, .name = "ip4-icmp-echo-reply", .vector_size = sizeof (u32), .format_trace = format_icmp_echo_trace, - .n_next_nodes = ICMP4_ECHO_REPLY_N_NEXT, + .n_next_nodes = ICMP46_ECHO_REPLY_N_NEXT, .next_nodes = { - [ICMP4_ECHO_REPLY_NEXT_DROP] = "ip4-drop", - [ICMP4_ECHO_REPLY_NEXT_PUNT] = "ip4-punt", + [ICMP46_ECHO_REPLY_NEXT_DROP] = "ip4-drop", + [ICMP46_ECHO_REPLY_NEXT_PUNT] = "ip4-punt", }, }; /* *INDENT-ON* */ + +/* + * A swarm of address-family agnostic helper functions + * for building and sending the ICMP echo request. + * + * Deliberately mostly "static" rather than "static inline" + * so one can trace them sanely if needed in debugger, if needed. + * + */ + +static_always_inline u8 +get_icmp_echo_payload_byte (int offset) +{ + return (offset % 256); +} + /* Fill in the ICMP ECHO structure, return the safety-checked and possibly shrunk data_len */ static u16 -init_icmp46_echo_request (icmp46_echo_request_t * icmp46_echo, - u16 seq_host, u16 id_host, u16 data_len) +init_icmp46_echo_request (vlib_main_t * vm, vlib_buffer_t * b0, + int l4_header_offset, + icmp46_echo_request_t * icmp46_echo, u16 seq_host, + u16 id_host, u64 now, u16 data_len) { int i; + + + int l34_len = + l4_header_offset + sizeof (icmp46_header_t) + + offsetof (icmp46_echo_request_t, data); + int max_data_len = VLIB_BUFFER_DATA_SIZE - l34_len; + + int first_buf_data_len = data_len < max_data_len ? data_len : max_data_len; + + int payload_offset = 0; + for (i = 0; i < first_buf_data_len; i++) + icmp46_echo->data[i] = get_icmp_echo_payload_byte (payload_offset++); + + /* inspired by vlib_buffer_add_data */ + vlib_buffer_t *hb = b0; + int remaining_data_len = data_len - first_buf_data_len; + while (remaining_data_len) + { + int this_buf_data_len = + remaining_data_len < + VLIB_BUFFER_DATA_SIZE ? remaining_data_len : VLIB_BUFFER_DATA_SIZE; + int n_alloc = vlib_buffer_alloc_from_free_list (vm, &b0->next_buffer, 1, + hb->free_list_index); + if (n_alloc < 1) + { + /* That is how much we have so far - return it... */ + return (data_len - remaining_data_len); + } + b0->flags |= VLIB_BUFFER_NEXT_PRESENT; + /* move on to the newly acquired buffer */ + b0 = vlib_get_buffer (vm, b0->next_buffer); + /* initialize the data */ + for (i = 0; i < this_buf_data_len; i++) + { + b0->data[i] = get_icmp_echo_payload_byte (payload_offset++); + } + b0->current_length = this_buf_data_len; + b0->current_data = 0; + remaining_data_len -= this_buf_data_len; + } + hb->flags |= VLIB_BUFFER_TOTAL_LENGTH_VALID; + hb->current_length = l34_len + first_buf_data_len; + hb->total_length_not_including_first_buffer = data_len - first_buf_data_len; + + icmp46_echo->time_sent = now; icmp46_echo->seq = clib_host_to_net_u16 (seq_host); icmp46_echo->id = clib_host_to_net_u16 (id_host); - - if (data_len > PING_MAXIMUM_DATA_SIZE) - data_len = PING_MAXIMUM_DATA_SIZE; - for (i = 0; i < data_len; i++) - icmp46_echo->data[i] = i % 256; return data_len; } -static send_ip46_ping_result_t -send_ip6_ping (vlib_main_t * vm, ip6_main_t * im, - u32 table_id, ip6_address_t * pa6, - u32 sw_if_index, u16 seq_host, u16 id_host, u16 data_len, - u32 burst, u8 verbose) -{ - icmp6_echo_request_header_t *h0; - u32 bi0 = 0; - int bogus_length = 0; - vlib_buffer_t *p0; - vlib_frame_t *f; - u32 *to_next; - vlib_buffer_free_list_t *fl; - if (vlib_buffer_alloc (vm, &bi0, 1) != 1) - return SEND_PING_ALLOC_FAIL; +static u32 +ip46_fib_index_from_table_id (u32 table_id, int is_ip6) +{ + u32 fib_index = is_ip6 ? + ip6_fib_index_from_table_id (table_id) : + ip4_fib_index_from_table_id (table_id); + return fib_index; +} - p0 = vlib_get_buffer (vm, bi0); - fl = vlib_buffer_get_free_list (vm, VLIB_BUFFER_DEFAULT_FREE_LIST_INDEX); - vlib_buffer_init_for_free_list (p0, fl); - VLIB_BUFFER_TRACE_TRAJECTORY_INIT (p0); +static fib_node_index_t +ip46_fib_table_lookup_host (u32 fib_index, ip46_address_t * pa46, int is_ip6) +{ + fib_node_index_t fib_entry_index = is_ip6 ? + ip6_fib_table_lookup (fib_index, &pa46->ip6, 128) : + ip4_fib_table_lookup (ip4_fib_get (fib_index), &pa46->ip4, 32); + return fib_entry_index; +} - /* - * if the user did not provide a source interface, use the any interface - * that the destination resolves via. - */ - if (~0 == sw_if_index) +static u32 +ip46_get_resolving_interface (u32 fib_index, ip46_address_t * pa46, + int is_ip6) +{ + u32 sw_if_index = ~0; + if (~0 != fib_index) { fib_node_index_t fib_entry_index; - u32 fib_index; + fib_entry_index = ip46_fib_table_lookup_host (fib_index, pa46, is_ip6); + sw_if_index = fib_entry_get_resolving_interface (fib_entry_index); + } + return sw_if_index; +} - fib_index = ip6_fib_index_from_table_id (table_id); +static u32 +ip46_fib_table_get_index_for_sw_if_index (u32 sw_if_index, int is_ip6) +{ + u32 fib_table_index = is_ip6 ? + ip6_fib_table_get_index_for_sw_if_index (sw_if_index) : + ip4_fib_table_get_index_for_sw_if_index (sw_if_index); + return fib_table_index; - if (~0 == fib_index) - { - vlib_buffer_free (vm, &bi0, 1); - return SEND_PING_NO_TABLE; - } +} - fib_entry_index = ip6_fib_table_lookup (fib_index, pa6, 128); - sw_if_index = fib_entry_get_resolving_interface (fib_entry_index); - /* - * Set the TX interface to force ip-lookup to use its table ID - */ - vnet_buffer (p0)->sw_if_index[VLIB_TX] = fib_index; + +static int +ip46_fill_l3_header (ip46_address_t * pa46, vlib_buffer_t * b0, int is_ip6) +{ + if (is_ip6) + { + ip6_header_t *ip6 = vlib_buffer_get_current (b0); + /* Fill in ip6 header fields */ + ip6->ip_version_traffic_class_and_flow_label = + clib_host_to_net_u32 (0x6 << 28); + ip6->payload_length = 0; /* will be set later */ + ip6->protocol = IP_PROTOCOL_ICMP6; + ip6->hop_limit = 255; + ip6->dst_address = pa46->ip6; + ip6->src_address = pa46->ip6; + return (sizeof (ip6_header_t)); } else { - /* - * force an IP lookup in the table bound to the user's chosen - * source interface. - */ - vnet_buffer (p0)->sw_if_index[VLIB_TX] = - ip6_fib_table_get_index_for_sw_if_index (sw_if_index); + ip4_header_t *ip4 = vlib_buffer_get_current (b0); + /* Fill in ip4 header fields */ + ip4->checksum = 0; + ip4->ip_version_and_header_length = 0x45; + ip4->tos = 0; + ip4->length = 0; /* will be set later */ + ip4->fragment_id = 0; + ip4->flags_and_fragment_offset = 0; + ip4->ttl = 0xff; + ip4->protocol = IP_PROTOCOL_ICMP; + ip4->src_address = pa46->ip4; + ip4->dst_address = pa46->ip4; + return (sizeof (ip4_header_t)); } +} - if (~0 == sw_if_index) +static int +ip46_set_src_address (u32 sw_if_index, vlib_buffer_t * b0, int is_ip6) +{ + int res; + if (is_ip6) { - vlib_buffer_free (vm, &bi0, 1); - return SEND_PING_NO_INTERFACE; + ip6_main_t *im = &ip6_main; + ip6_header_t *ip6 = vlib_buffer_get_current (b0); + res = + ip6_src_address_for_packet (&im->lookup_main, sw_if_index, + &ip6->dst_address, &ip6->src_address); } + else + { + ip4_main_t *im = &ip4_main; + ip4_header_t *ip4 = vlib_buffer_get_current (b0); + res = + ip4_src_address_for_packet (&im->lookup_main, sw_if_index, + &ip4->src_address); + /* IP4 and IP6 paths have the inverse logic. Harmonize. */ + res = !res; + } + return res; +} - vnet_buffer (p0)->sw_if_index[VLIB_RX] = sw_if_index; - - h0 = vlib_buffer_get_current (p0); - - /* Fill in ip6 header fields */ - h0->ip6.ip_version_traffic_class_and_flow_label = - clib_host_to_net_u32 (0x6 << 28); - h0->ip6.payload_length = 0; /* Set below */ - h0->ip6.protocol = IP_PROTOCOL_ICMP6; - h0->ip6.hop_limit = 255; - h0->ip6.dst_address = *pa6; - h0->ip6.src_address = *pa6; - - /* Fill in the correct source now */ - if (!ip6_src_address_for_packet (&im->lookup_main, - sw_if_index, - &h0->ip6.dst_address, - &h0->ip6.src_address)) +static void +ip46_print_buffer_src_address (vlib_main_t * vm, vlib_buffer_t * b0, + int is_ip6) +{ + void *format_addr_func; + void *paddr; + if (is_ip6) { - vlib_buffer_free (vm, &bi0, 1); - return SEND_PING_NO_SRC_ADDRESS; + ip6_header_t *ip6 = vlib_buffer_get_current (b0); + format_addr_func = format_ip6_address; + paddr = &ip6->src_address; } + else + { + ip4_header_t *ip4 = vlib_buffer_get_current (b0); + format_addr_func = format_ip4_address; + paddr = &ip4->src_address; + } + vlib_cli_output (vm, "Source address: %U ", format_addr_func, paddr); +} - /* Fill in icmp fields */ - h0->icmp.type = ICMP6_echo_request; - h0->icmp.code = 0; - h0->icmp.checksum = 0; +static u16 +ip46_fill_icmp_request_at (vlib_main_t * vm, int l4_offset, u16 seq_host, + u16 id_host, u16 data_len, vlib_buffer_t * b0, + int is_ip6) +{ + icmp46_header_t *icmp46 = vlib_buffer_get_current (b0) + l4_offset; + + icmp46->type = is_ip6 ? ICMP6_echo_request : ICMP4_echo_request; + icmp46->code = 0; + icmp46->checksum = 0; + + icmp46_echo_request_t *icmp46_echo = (icmp46_echo_request_t *) (icmp46 + 1); data_len = - init_icmp46_echo_request (&h0->icmp_echo, seq_host, id_host, data_len); - h0->icmp_echo.time_sent = vlib_time_now (vm); + init_icmp46_echo_request (vm, b0, l4_offset, icmp46_echo, seq_host, + id_host, clib_cpu_time_now (), data_len); + return data_len; +} - /* Fix up the lengths */ - h0->ip6.payload_length = - clib_host_to_net_u16 (data_len + sizeof (icmp46_header_t)); - p0->current_length = clib_net_to_host_u16 (h0->ip6.payload_length) + - STRUCT_OFFSET_OF (icmp6_echo_request_header_t, icmp); +/* Compute ICMP4 checksum with multibuffer support. */ +u16 +ip4_icmp_compute_checksum (vlib_main_t * vm, vlib_buffer_t * p0, + ip4_header_t * ip0) +{ + ip_csum_t sum0; + u32 ip_header_length, payload_length_host_byte_order; + u32 n_this_buffer, n_bytes_left, n_ip_bytes_this_buffer; + u16 sum16; + void *data_this_buffer; + + ip_header_length = ip4_header_bytes (ip0); + payload_length_host_byte_order = + clib_net_to_host_u16 (ip0->length) - ip_header_length; + + /* ICMP4 checksum does not include the IP header */ + sum0 = 0; + + n_bytes_left = n_this_buffer = payload_length_host_byte_order; + data_this_buffer = (void *) ip0 + ip_header_length; + n_ip_bytes_this_buffer = + p0->current_length - (((u8 *) ip0 - p0->data) - p0->current_data); + if (n_this_buffer + ip_header_length > n_ip_bytes_this_buffer) + { + n_this_buffer = n_ip_bytes_this_buffer > ip_header_length ? + n_ip_bytes_this_buffer - ip_header_length : 0; + } + while (1) + { + sum0 = ip_incremental_checksum (sum0, data_this_buffer, n_this_buffer); + n_bytes_left -= n_this_buffer; + if (n_bytes_left == 0) + break; + + ASSERT (p0->flags & VLIB_BUFFER_NEXT_PRESENT); + p0 = vlib_get_buffer (vm, p0->next_buffer); + data_this_buffer = vlib_buffer_get_current (p0); + n_this_buffer = p0->current_length; + } + + sum16 = ~ip_csum_fold (sum0); - /* Calculate the ICMP checksum */ - h0->icmp.checksum = 0; - h0->icmp.checksum = - ip6_tcp_udp_icmp_compute_checksum (vm, 0, &h0->ip6, &bogus_length); + return sum16; +} - /* Enqueue the packet right now */ - f = vlib_get_frame_to_node (vm, ip6_lookup_node.index); - to_next = vlib_frame_vector_args (f); - to_next[0] = bi0; - ASSERT (burst <= VLIB_FRAME_SIZE); - f->n_vectors = burst; - while (--burst) +static void +ip46_fix_len_and_csum (vlib_main_t * vm, int l4_offset, u16 data_len, + vlib_buffer_t * b0, int is_ip6) +{ + u16 payload_length = + data_len + sizeof (icmp46_header_t) + offsetof (icmp46_echo_request_t, + data); + u16 total_length = payload_length + l4_offset; + icmp46_header_t *icmp46 = vlib_buffer_get_current (b0) + l4_offset; + icmp46->checksum = 0; + + if (is_ip6) { - vlib_buffer_t *c0 = vlib_buffer_copy (vm, p0); - to_next++; - to_next[0] = vlib_get_buffer_index (vm, c0); + ip6_header_t *ip6 = vlib_buffer_get_current (b0); + ip6->payload_length = clib_host_to_net_u16 (payload_length); + + int bogus_length = 0; + icmp46->checksum = + ip6_tcp_udp_icmp_compute_checksum (vm, b0, ip6, &bogus_length); } - vlib_put_frame_to_node (vm, ip6_lookup_node.index, f); + else + { + ip4_header_t *ip4 = vlib_buffer_get_current (b0); + ip4->length = clib_host_to_net_u16 (total_length); - return SEND_PING_OK; + ip4->checksum = ip4_header_checksum (ip4); + icmp46->checksum = ip4_icmp_compute_checksum (vm, b0, ip4); + } } -static send_ip46_ping_result_t -send_ip4_ping (vlib_main_t * vm, - ip4_main_t * im, - u32 table_id, - ip4_address_t * pa4, - u32 sw_if_index, - u16 seq_host, u16 id_host, u16 data_len, u32 burst, u8 verbose) +static u16 +at_most_a_frame (u32 count) { - icmp4_echo_request_header_t *h0; - u32 bi0 = 0; - ip_lookup_main_t *lm = &im->lookup_main; - vlib_buffer_t *p0; - vlib_frame_t *f; - u32 *to_next; - u32 if_add_index0; - vlib_buffer_free_list_t *fl; + return count > VLIB_FRAME_SIZE ? VLIB_FRAME_SIZE : count; +} - if (vlib_buffer_alloc (vm, &bi0, 1) != 1) - return SEND_PING_ALLOC_FAIL; +static int +ip46_enqueue_packet (vlib_main_t * vm, vlib_buffer_t * b0, u32 burst, + int is_ip6) +{ + vlib_frame_t *f = 0; + u32 lookup_node_index = + is_ip6 ? ip6_lookup_node.index : ip4_lookup_node.index; + int n_sent = 0; - p0 = vlib_get_buffer (vm, bi0); - fl = vlib_buffer_get_free_list (vm, VLIB_BUFFER_DEFAULT_FREE_LIST_INDEX); - vlib_buffer_init_for_free_list (p0, fl); - VLIB_BUFFER_TRACE_TRAJECTORY_INIT (p0); + u16 n_to_send; /* - * if the user did not provide a source interface, use the any interface - * that the destination resolves via. + * Enqueue the packet, possibly as one or more frames of copies to make + * bursts. We enqueue b0 as the very last buffer, when there is no possibility + * for error in vlib_buffer_copy, so as to allow the caller to free it + * in case we encounter the error in the middle of the loop. */ - if (~0 == sw_if_index) + for (n_to_send = at_most_a_frame (burst), burst -= n_to_send; n_to_send > 0; + n_to_send = at_most_a_frame (burst), burst -= n_to_send) { - fib_node_index_t fib_entry_index; - u32 fib_index; + f = vlib_get_frame_to_node (vm, lookup_node_index); + /* f can not be NULL here - frame allocation failure causes panic */ - fib_index = ip4_fib_index_from_table_id (table_id); + u32 *to_next = vlib_frame_vector_args (f); + f->n_vectors = n_to_send; - if (~0 == fib_index) + while (n_to_send > 1) { - vlib_buffer_free (vm, &bi0, 1); - return SEND_PING_NO_TABLE; + vlib_buffer_t *b0copy = vlib_buffer_copy (vm, b0); + if (PREDICT_FALSE (b0copy == NULL)) + goto ship_and_ret; + *to_next++ = vlib_get_buffer_index (vm, b0copy); + n_to_send--; + n_sent++; } - fib_entry_index = - ip4_fib_table_lookup (ip4_fib_get (fib_index), pa4, 32); - sw_if_index = fib_entry_get_resolving_interface (fib_entry_index); - /* - * Set the TX interface to force ip-lookup to use the user's table ID - */ - vnet_buffer (p0)->sw_if_index[VLIB_TX] = fib_index; - } - else - { - /* - * force an IP lookup in the table bound to the user's chosen - * source interface. - */ - vnet_buffer (p0)->sw_if_index[VLIB_TX] = - ip4_fib_table_get_index_for_sw_if_index (sw_if_index); + /* n_to_send is guaranteed to equal 1 here */ + if (burst > 0) + { + /* not the last burst, so still make a copy for the last buffer */ + vlib_buffer_t *b0copy = vlib_buffer_copy (vm, b0); + if (PREDICT_FALSE (b0copy == NULL)) + goto ship_and_ret; + n_to_send--; + *to_next++ = vlib_get_buffer_index (vm, b0copy); + } + else + { + /* put the original buffer as the last one of an error-free run */ + *to_next++ = vlib_get_buffer_index (vm, b0); + } + vlib_put_frame_to_node (vm, lookup_node_index, f); + n_sent += f->n_vectors; } + return n_sent; + /* + * We reach here in case we already enqueued one or more buffers + * and maybe one or more frames but could not make more copies. + * There is an outstanding frame - so ship it and return. + * Caller will have to free the b0 in this case, since + * we did not enqueue it here yet. + */ +ship_and_ret: + n_sent += f->n_vectors; + vlib_put_frame_to_node (vm, lookup_node_index, f); + return n_sent; +} - if (~0 == sw_if_index) - { - vlib_buffer_free (vm, &bi0, 1); - return SEND_PING_NO_INTERFACE; - } - vnet_buffer (p0)->sw_if_index[VLIB_RX] = sw_if_index; +/* + * An address-family agnostic ping send function. + */ + +#define ERROR_OUT(e) do { err = e; goto done; } while (0) - h0 = vlib_buffer_get_current (p0); +static send_ip46_ping_result_t +send_ip46_ping (vlib_main_t * vm, + u32 table_id, + ip46_address_t * pa46, + u32 sw_if_index, + u16 seq_host, u16 id_host, u16 data_len, u32 burst, + u8 verbose, int is_ip6) +{ + int err = SEND_PING_OK; + u32 bi0 = 0; + int n_buf0 = 0; + vlib_buffer_t *b0; + vlib_buffer_free_list_t *fl; + + n_buf0 = vlib_buffer_alloc (vm, &bi0, 1); + if (n_buf0 < 1) + ERROR_OUT (SEND_PING_ALLOC_FAIL); - /* Fill in ip4 header fields */ - h0->ip4.checksum = 0; - h0->ip4.ip_version_and_header_length = 0x45; - h0->ip4.tos = 0; - h0->ip4.length = 0; /* Set below */ - h0->ip4.fragment_id = 0; - h0->ip4.flags_and_fragment_offset = 0; - h0->ip4.ttl = 0xff; - h0->ip4.protocol = IP_PROTOCOL_ICMP; - h0->ip4.dst_address = *pa4; - h0->ip4.src_address = *pa4; + b0 = vlib_get_buffer (vm, bi0); + fl = vlib_buffer_get_free_list (vm, VLIB_BUFFER_DEFAULT_FREE_LIST_INDEX); + vlib_buffer_init_for_free_list (b0, fl); + VLIB_BUFFER_TRACE_TRAJECTORY_INIT (b0); - /* Fill in the correct source now */ - if_add_index0 = lm->if_address_pool_index_by_sw_if_index[sw_if_index]; - if (PREDICT_TRUE (if_add_index0 != ~0)) + /* + * if the user did not provide a source interface, + * perform a resolution and use an interface + * via which it succeeds. + */ + u32 fib_index; + if (~0 == sw_if_index) { - ip_interface_address_t *if_add = - pool_elt_at_index (lm->if_address_pool, if_add_index0); - ip4_address_t *if_ip = ip_interface_address_get_address (lm, if_add); - h0->ip4.src_address = *if_ip; - if (verbose) - { - vlib_cli_output (vm, "Source address: %U", - format_ip4_address, &h0->ip4.src_address); - } + fib_index = ip46_fib_index_from_table_id (table_id, is_ip6); + sw_if_index = ip46_get_resolving_interface (fib_index, pa46, is_ip6); } + else + fib_index = + ip46_fib_table_get_index_for_sw_if_index (sw_if_index, is_ip6); - /* Fill in icmp fields */ - h0->icmp.type = ICMP4_echo_request; - h0->icmp.code = 0; - h0->icmp.checksum = 0; + if (~0 == fib_index) + ERROR_OUT (SEND_PING_NO_TABLE); + if (~0 == sw_if_index) + ERROR_OUT (SEND_PING_NO_INTERFACE); - data_len = - init_icmp46_echo_request (&h0->icmp_echo, seq_host, id_host, data_len); - h0->icmp_echo.time_sent = vlib_time_now (vm); + vnet_buffer (b0)->sw_if_index[VLIB_RX] = sw_if_index; + vnet_buffer (b0)->sw_if_index[VLIB_TX] = fib_index; - /* Fix up the lengths */ - h0->ip4.length = - clib_host_to_net_u16 (data_len + sizeof (icmp46_header_t) + - sizeof (ip4_header_t)); + int l4_header_offset = ip46_fill_l3_header (pa46, b0, is_ip6); - p0->current_length = clib_net_to_host_u16 (h0->ip4.length); + /* set the src address in the buffer */ + if (!ip46_set_src_address (sw_if_index, b0, is_ip6)) + ERROR_OUT (SEND_PING_NO_SRC_ADDRESS); + if (verbose) + ip46_print_buffer_src_address (vm, b0, is_ip6); + + data_len = + ip46_fill_icmp_request_at (vm, l4_header_offset, seq_host, id_host, + data_len, b0, is_ip6); - /* Calculate the IP and ICMP checksums */ - h0->ip4.checksum = ip4_header_checksum (&(h0->ip4)); - h0->icmp.checksum = - ~ip_csum_fold (ip_incremental_checksum (0, &(h0->icmp), - p0->current_length - - sizeof (ip4_header_t))); + ip46_fix_len_and_csum (vm, l4_header_offset, data_len, b0, is_ip6); - /* Enqueue the packet right now */ - f = vlib_get_frame_to_node (vm, ip4_lookup_node.index); - to_next = vlib_frame_vector_args (f); - to_next[0] = bi0; + int n_sent = ip46_enqueue_packet (vm, b0, burst, is_ip6); + if (n_sent < burst) + err = SEND_PING_NO_BUFFERS; - ASSERT (burst <= VLIB_FRAME_SIZE); - f->n_vectors = burst; - while (--burst) +done: + if (err != SEND_PING_OK) { - vlib_buffer_t *c0 = vlib_buffer_copy (vm, p0); - to_next++; - to_next[0] = vlib_get_buffer_index (vm, c0); + if (n_buf0 > 0) + vlib_buffer_free (vm, &bi0, 1); } - vlib_put_frame_to_node (vm, ip4_lookup_node.index, f); - - return SEND_PING_OK; + return err; } +static send_ip46_ping_result_t +send_ip6_ping (vlib_main_t * vm, + u32 table_id, ip6_address_t * pa6, + u32 sw_if_index, u16 seq_host, u16 id_host, u16 data_len, + u32 burst, u8 verbose) +{ + ip46_address_t target; + target.ip6 = *pa6; + return send_ip46_ping (vm, table_id, &target, sw_if_index, seq_host, + id_host, data_len, burst, verbose, 1 /* is_ip6 */ ); +} -static void -print_ip6_icmp_reply (vlib_main_t * vm, u32 bi0) +static send_ip46_ping_result_t +send_ip4_ping (vlib_main_t * vm, + u32 table_id, ip4_address_t * pa4, + u32 sw_if_index, u16 seq_host, u16 id_host, u16 data_len, + u32 burst, u8 verbose) { - vlib_buffer_t *b0 = vlib_get_buffer (vm, bi0); - icmp6_echo_request_header_t *h0 = vlib_buffer_get_current (b0); - f64 rtt = 0; - clib_memcpy (&rtt, vnet_buffer (b0)->unused, sizeof (rtt)); - rtt -= h0->icmp_echo.time_sent; - vlib_cli_output (vm, - "%d bytes from %U: icmp_seq=%d ttl=%d time=%.4f ms", - clib_host_to_net_u16 (h0->ip6.payload_length), - format_ip6_address, - &h0->ip6.src_address, - clib_host_to_net_u16 (h0->icmp_echo.seq), - h0->ip6.hop_limit, rtt * 1000.0); + ip46_address_t target; + ip46_address_set_ip4 (&target, pa4); + return send_ip46_ping (vm, table_id, &target, sw_if_index, seq_host, + id_host, data_len, burst, verbose, 0 /* is_ip6 */ ); } static void -print_ip4_icmp_reply (vlib_main_t * vm, u32 bi0) +print_ip46_icmp_reply (vlib_main_t * vm, u32 bi0, int is_ip6) { vlib_buffer_t *b0 = vlib_get_buffer (vm, bi0); - icmp4_echo_request_header_t *h0 = vlib_buffer_get_current (b0); - f64 rtt = 0; - clib_memcpy (&rtt, vnet_buffer (b0)->unused, sizeof (rtt)); - rtt -= h0->icmp_echo.time_sent; - u32 rcvd_icmp_len = - clib_host_to_net_u16 (h0->ip4.length) - - (4 * (0xF & h0->ip4.ip_version_and_header_length)); + int l4_offset; + void *paddr; + void *format_addr_func; + u16 payload_length; + u8 ttl; + if (is_ip6) + { + ip6_header_t *ip6 = vlib_buffer_get_current (b0); + paddr = (void *) &ip6->src_address; + format_addr_func = (void *) format_ip6_address; + ttl = ip6->hop_limit; + l4_offset = sizeof (ip6_header_t); // FIXME - EH processing ? + payload_length = clib_net_to_host_u16 (ip6->payload_length); + } + else + { + ip4_header_t *ip4 = vlib_buffer_get_current (b0); + paddr = (void *) &ip4->src_address; + format_addr_func = (void *) format_ip4_address; + ttl = ip4->ttl; + l4_offset = ip4_header_bytes (ip4); + payload_length = + clib_net_to_host_u16 (ip4->length) + ip4_header_bytes (ip4); + } + icmp46_header_t *icmp = vlib_buffer_get_current (b0) + l4_offset; + icmp46_echo_request_t *icmp_echo = (icmp46_echo_request_t *) (icmp + 1); + u64 *dataplane_ts = (u64 *) & vnet_buffer (b0)->unused[0]; + + f64 clocks_per_second = ((f64) vm->clib_time.clocks_per_second); + f64 rtt = + ((f64) (*dataplane_ts - icmp_echo->time_sent)) / clocks_per_second; vlib_cli_output (vm, "%d bytes from %U: icmp_seq=%d ttl=%d time=%.4f ms", - rcvd_icmp_len, - format_ip4_address, - &h0->ip4.src_address, - clib_host_to_net_u16 (h0->icmp_echo.seq), - h0->ip4.ttl, rtt * 1000.0); + payload_length, + format_addr_func, + paddr, + clib_host_to_net_u16 (icmp_echo->seq), ttl, rtt * 1000.0); } - /* * Perform the ping run with the given parameters in the current CLI process. * Depending on whether pa4 or pa6 is set, runs IPv4 or IPv6 ping. @@ -566,12 +889,9 @@ run_ping_ip46_address (vlib_main_t * vm, u32 table_id, ip4_address_t * pa4, u32 ping_burst, u32 verbose) { int i; - ping_main_t *pm = &ping_main; uword curr_proc = vlib_current_process (vm); u32 n_replies = 0; u32 n_requests = 0; - ping_run_t *pr = 0; - u32 ping_run_index = 0; u16 icmp_id; static u32 rand_seed = 0; @@ -581,43 +901,42 @@ run_ping_ip46_address (vlib_main_t * vm, u32 table_id, ip4_address_t * pa4, icmp_id = random_u32 (&rand_seed) & 0xffff; - while (hash_get (pm->ping_run_by_icmp_id, icmp_id)) + while (~0 != get_cli_process_id_by_icmp_id_mt (vm, icmp_id)) { vlib_cli_output (vm, "ICMP ID collision at %d, incrementing", icmp_id); icmp_id++; } - pool_get (pm->ping_runs, pr); - ping_run_index = pr - pm->ping_runs; - pr->cli_process_id = curr_proc; - pr->cli_thread_index = vm->thread_index; - pr->icmp_id = icmp_id; - hash_set (pm->ping_run_by_icmp_id, icmp_id, ping_run_index); + + set_cli_process_id_by_icmp_id_mt (vm, icmp_id, curr_proc); + for (i = 1; i <= ping_repeat; i++) { send_ip46_ping_result_t res = SEND_PING_OK; f64 sleep_interval; f64 time_ping_sent = vlib_time_now (vm); - /* Reset pr: running ping in other process could have changed pm->ping_runs */ - pr = vec_elt_at_index (pm->ping_runs, ping_run_index); - pr->curr_seq = i; if (pa6) { - res = send_ip6_ping (vm, ping_main.ip6_main, table_id, + res = send_ip6_ping (vm, table_id, pa6, sw_if_index, i, icmp_id, data_len, ping_burst, verbose); + if (SEND_PING_OK == res) + n_requests += ping_burst; + else + vlib_cli_output (vm, "Failed: %U", format_ip46_ping_result, res); } if (pa4) { - res = send_ip4_ping (vm, ping_main.ip4_main, table_id, pa4, + res = send_ip4_ping (vm, table_id, pa4, sw_if_index, i, icmp_id, data_len, ping_burst, verbose); + if (SEND_PING_OK == res) + n_requests += ping_burst; + else + vlib_cli_output (vm, "Failed: %U", format_ip46_ping_result, res); } - if (SEND_PING_OK == res) - { - n_requests += ping_burst; - } - else - vlib_cli_output (vm, "Failed: %U", format_ip46_ping_result, res); + + /* Collect and print the responses until it is time to send a next ping */ + while ((i <= ping_repeat) && ((sleep_interval = @@ -631,44 +950,31 @@ run_ping_ip46_address (vlib_main_t * vm, u32 table_id, ip4_address_t * pa4, case ~0: /* no events => timeout */ break; case PING_RESPONSE_IP6: - { - int i; - for (i = 0; i < vec_len (event_data); i++) - { - u32 bi0 = event_data[i]; - print_ip6_icmp_reply (vm, bi0); - n_replies++; - if (0 != bi0) - { - vlib_buffer_free (vm, &bi0, 1); - } - } - } - break; + /* fall-through */ case PING_RESPONSE_IP4: { - int i; - for (i = 0; i < vec_len (event_data); i++) + int ii; + int is_ip6 = (event_type == PING_RESPONSE_IP6); + for (ii = 0; ii < vec_len (event_data); ii++) { - u32 bi0 = event_data[i]; - print_ip4_icmp_reply (vm, bi0); + u32 bi0 = event_data[ii]; + print_ip46_icmp_reply (vm, bi0, is_ip6); n_replies++; if (0 != bi0) - { - vlib_buffer_free (vm, &bi0, 1); - } + vlib_buffer_free (vm, &bi0, 1); } } break; default: /* someone pressed a key, abort */ vlib_cli_output (vm, "Aborted due to a keypress."); - i = 1 + ping_repeat; + goto double_break; break; } vec_free (event_data); } } +double_break: vlib_cli_output (vm, "\n"); { float loss = @@ -678,17 +984,12 @@ run_ping_ip46_address (vlib_main_t * vm, u32 table_id, ip4_address_t * pa4, vlib_cli_output (vm, "Statistics: %u sent, %u received, %f%% packet loss\n", n_requests, n_replies, loss); - /* Reset pr: running ping in other process could have changed pm->ping_runs */ - pr = vec_elt_at_index (pm->ping_runs, ping_run_index); - hash_unset (pm->ping_run_by_icmp_id, icmp_id); - pool_put (pm->ping_runs, pr); + clear_cli_process_id_by_icmp_id_mt (vm, icmp_id); } } - - static clib_error_t * ping_ip_address (vlib_main_t * vm, unformat_input_t * input, vlib_cli_command_t * cmd) @@ -860,9 +1161,20 @@ ping_ip_address (vlib_main_t * vm, } } - if (ping_burst < 1 || ping_burst > VLIB_FRAME_SIZE) +/* + * Operationally, one won't (and shouldn't) need to send more than a frame worth of pings. + * But it may be handy during the debugging. + */ + +#ifdef CLIB_DEBUG +#define MAX_PING_BURST (10*VLIB_FRAME_SIZE) +#else +#define MAX_PING_BURST (VLIB_FRAME_SIZE) +#endif + + if (ping_burst < 1 || ping_burst > MAX_PING_BURST) return clib_error_return (0, "burst size must be between 1 and %u", - VLIB_FRAME_SIZE); + MAX_PING_BURST); run_ping_ip46_address (vm, table_id, ping_ip4 ? &a4 : NULL, ping_ip6 ? &a6 : NULL, sw_if_index, ping_interval, @@ -928,12 +1240,16 @@ VLIB_CLI_COMMAND (ping_command, static) = static clib_error_t * ping_cli_init (vlib_main_t * vm) { + vlib_thread_main_t *tm = vlib_get_thread_main (); ping_main_t *pm = &ping_main; + pm->ip6_main = &ip6_main; pm->ip4_main = &ip4_main; icmp6_register_type (vm, ICMP6_echo_reply, ip6_icmp_echo_reply_node.index); ip4_icmp_register_type (vm, ICMP4_echo_reply, ip4_icmp_echo_reply_node.index); + if (tm->n_vlib_mains > 1) + clib_spinlock_init (&pm->ping_run_check_lock); return 0; } diff --git a/src/vnet/ip/ping.h b/src/vnet/ip/ping.h index 442ba732dda..f1faa998f7d 100644 --- a/src/vnet/ip/ping.h +++ b/src/vnet/ip/ping.h @@ -30,8 +30,9 @@ typedef enum _ (OK, "OK") \ _ (ALLOC_FAIL, "packet allocation failed") \ _ (NO_INTERFACE, "no egress interface") \ - _ (NO_TABLE, "no IPv6 Table for lookup") \ + _ (NO_TABLE, "no FIB table for lookup") \ _ (NO_SRC_ADDRESS, "no source address for egress interface") \ + _ (NO_BUFFERS, "could not allocate a new buffer") \ typedef enum { @@ -46,19 +47,17 @@ typedef enum typedef struct ping_run_t { u16 icmp_id; - u16 curr_seq; uword cli_process_id; - uword cli_thread_index; } ping_run_t; typedef struct ping_main_t { ip6_main_t *ip6_main; ip4_main_t *ip4_main; - ping_run_t *ping_runs; - /* hash table to find back the CLI process for a reply */ - // uword *cli_proc_by_icmp_id; - ping_run_t *ping_run_by_icmp_id; + /* a vector of current ping runs. */ + ping_run_t *active_ping_runs; + /* a lock held while add/remove/search on active_ping_runs */ + clib_spinlock_t ping_run_check_lock; } ping_main_t; extern ping_main_t ping_main; @@ -66,55 +65,27 @@ extern ping_main_t ping_main; #define PING_DEFAULT_DATA_LEN 60 #define PING_DEFAULT_INTERVAL 1.0 -#define PING_MAXIMUM_DATA_SIZE (VLIB_BUFFER_DATA_SIZE - sizeof(ip6_header_t) - sizeof(icmp46_header_t) - offsetof(icmp46_echo_request_t, data)) +#define PING_MAXIMUM_DATA_SIZE 32768 + +#define PING_CLI_UNKNOWN_NODE (~0) /* *INDENT-OFF* */ typedef CLIB_PACKED (struct { u16 id; u16 seq; - f64 time_sent; + u64 time_sent; u8 data[0]; }) icmp46_echo_request_t; - -typedef CLIB_PACKED (struct { - ip6_header_t ip6; - icmp46_header_t icmp; - icmp46_echo_request_t icmp_echo; -}) icmp6_echo_request_header_t; - -typedef CLIB_PACKED (struct { - ip4_header_t ip4; - icmp46_header_t icmp; - icmp46_echo_request_t icmp_echo; -}) icmp4_echo_request_header_t; - /* *INDENT-ON* */ -typedef struct -{ - u16 id; - u16 seq; - u8 bound; -} icmp_echo_trace_t; - - - - -typedef enum -{ - ICMP6_ECHO_REPLY_NEXT_DROP, - ICMP6_ECHO_REPLY_NEXT_PUNT, - ICMP6_ECHO_REPLY_N_NEXT, -} icmp6_echo_reply_next_t; - typedef enum { - ICMP4_ECHO_REPLY_NEXT_DROP, - ICMP4_ECHO_REPLY_NEXT_PUNT, - ICMP4_ECHO_REPLY_N_NEXT, -} icmp4_echo_reply_next_t; + ICMP46_ECHO_REPLY_NEXT_DROP, + ICMP46_ECHO_REPLY_NEXT_PUNT, + ICMP46_ECHO_REPLY_N_NEXT, +} icmp46_echo_reply_next_t; #endif /* included_vnet_ping_h */ |