aboutsummaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
Diffstat (limited to 'src')
-rw-r--r--src/plugins/dev_iavf/virtchnl.h1
-rw-r--r--src/plugins/hs_apps/echo_client.c52
-rw-r--r--src/plugins/hs_apps/echo_client.h2
-rw-r--r--src/vlib/CMakeLists.txt15
-rw-r--r--src/vlib/node_funcs.h24
-rw-r--r--src/vlib/unix/main.c20
-rw-r--r--src/vnet/CMakeLists.txt1
-rw-r--r--src/vnet/crypto/config.c105
-rw-r--r--src/vnet/crypto/crypto.c30
-rw-r--r--src/vnet/crypto/crypto.h11
10 files changed, 245 insertions, 16 deletions
diff --git a/src/plugins/dev_iavf/virtchnl.h b/src/plugins/dev_iavf/virtchnl.h
index 2099104c8ad..72158684e9e 100644
--- a/src/plugins/dev_iavf/virtchnl.h
+++ b/src/plugins/dev_iavf/virtchnl.h
@@ -560,6 +560,7 @@ typedef struct
{
u16 unicast_promisc : 1;
u16 multicast_promisc : 1;
+ u16 unused : 14;
};
u16 flags;
};
diff --git a/src/plugins/hs_apps/echo_client.c b/src/plugins/hs_apps/echo_client.c
index b08edaaa5f5..f57fd748dba 100644
--- a/src/plugins/hs_apps/echo_client.c
+++ b/src/plugins/hs_apps/echo_client.c
@@ -79,21 +79,27 @@ ec_session_get (ec_worker_t *wrk, u32 ec_index)
static void
send_data_chunk (ec_main_t *ecm, ec_session_t *es)
{
+ const u64 max_burst = 128000;
u8 *test_data = ecm->connect_test_data;
int test_buf_len, test_buf_offset, rv;
+ u64 bytes_to_send;
u32 bytes_this_chunk;
+ svm_fifo_t *f = es->tx_fifo;
test_buf_len = vec_len (test_data);
ASSERT (test_buf_len > 0);
+ if (ecm->run_time)
+ bytes_to_send = clib_min (svm_fifo_max_enqueue_prod (f), max_burst);
+ else
+ bytes_to_send = clib_min (es->bytes_to_send, max_burst);
test_buf_offset = es->bytes_sent % test_buf_len;
- bytes_this_chunk =
- clib_min (test_buf_len - test_buf_offset, es->bytes_to_send);
+
+ bytes_this_chunk = clib_min (test_buf_len - test_buf_offset, bytes_to_send);
if (!es->is_dgram)
{
if (ecm->no_copy)
{
- svm_fifo_t *f = es->tx_fifo;
rv = clib_min (svm_fifo_max_enqueue_prod (f), bytes_this_chunk);
svm_fifo_enqueue_nocopy (f, rv);
session_program_tx_io_evt (es->tx_fifo->vpp_sh, SESSION_IO_EVT_TX);
@@ -105,7 +111,6 @@ send_data_chunk (ec_main_t *ecm, ec_session_t *es)
}
else
{
- svm_fifo_t *f = es->tx_fifo;
u32 max_enqueue = svm_fifo_max_enqueue_prod (f);
if (max_enqueue < sizeof (session_dgram_hdr_t))
@@ -147,8 +152,11 @@ send_data_chunk (ec_main_t *ecm, ec_session_t *es)
if (rv > 0)
{
/* Account for it... */
- es->bytes_to_send -= rv;
es->bytes_sent += rv;
+ if (ecm->run_time)
+ es->bytes_to_receive += rv;
+ else
+ es->bytes_to_send -= rv;
if (ecm->cfg.verbose)
{
@@ -266,7 +274,7 @@ ec_node_fn (vlib_main_t *vm, vlib_node_runtime_t *node, vlib_frame_t *frame)
{
ecm->repeats++;
ecm->prev_conns = vec_len (conns_this_batch);
- if (ecm->repeats == 500000)
+ if (ecm->repeats == 500000 && !ecm->run_time)
{
ec_err ("stuck clients");
}
@@ -297,7 +305,7 @@ ec_node_fn (vlib_main_t *vm, vlib_node_runtime_t *node, vlib_frame_t *frame)
delete_session = 0;
}
- if (PREDICT_FALSE (delete_session == 1))
+ if (PREDICT_FALSE (delete_session == 1) || ecm->timer_expired)
{
clib_atomic_fetch_add (&ecm->tx_total, es->bytes_sent);
clib_atomic_fetch_add (&ecm->rx_total, es->bytes_received);
@@ -356,6 +364,7 @@ ec_reset_runtime_config (ec_main_t *ecm)
ecm->tls_engine = CRYPTO_ENGINE_OPENSSL;
ecm->no_copy = 0;
ecm->run_test = EC_STARTING;
+ ecm->timer_expired = false;
ecm->ready_connections = 0;
ecm->connect_conn_index = 0;
ecm->rx_total = 0;
@@ -368,6 +377,7 @@ ec_reset_runtime_config (ec_main_t *ecm)
ecm->attach_flags = 0;
ecm->syn_timeout = 20.0;
ecm->test_timeout = 20.0;
+ ecm->run_time = 0;
vec_free (ecm->connect_uri);
}
@@ -1072,7 +1082,7 @@ ec_command_fn (vlib_main_t *vm, unformat_input_t *input,
ec_main_t *ecm = &ec_main;
uword *event_data = 0, event_type;
clib_error_t *error = 0;
- int rv, had_config = 1;
+ int rv, timed_run_conflict = 0, had_config = 1;
u64 total_bytes;
f64 delta;
@@ -1101,11 +1111,13 @@ ec_command_fn (vlib_main_t *vm, unformat_input_t *input,
;
else if (unformat (line_input, "bytes %U", unformat_memory_size,
&ecm->bytes_to_send))
- ;
+ timed_run_conflict++;
else if (unformat (line_input, "test-timeout %f", &ecm->test_timeout))
;
else if (unformat (line_input, "syn-timeout %f", &ecm->syn_timeout))
;
+ else if (unformat (line_input, "run-time %f", &ecm->run_time))
+ ;
else if (unformat (line_input, "echo-bytes"))
ecm->echo_bytes = 1;
else if (unformat (line_input, "fifo-size %U", unformat_memory_size,
@@ -1149,6 +1161,9 @@ ec_command_fn (vlib_main_t *vm, unformat_input_t *input,
}
}
+ if (timed_run_conflict && ecm->run_time)
+ return clib_error_return (0, "failed: invalid arguments for a timed run!");
+
parse_config:
ecm->cfg.num_test_sessions = ecm->expected_connections =
@@ -1234,11 +1249,22 @@ parse_config:
goto stop_test;
}
+ /* Testing officially starts now */
+ ecm->test_start_time = vlib_time_now (ecm->vlib_main);
+ ec_cli ("Test started at %.6f", ecm->test_start_time);
+
+ /*
+ * If a timed run, wait and expire timer
+ */
+ if (ecm->run_time)
+ {
+ vlib_process_suspend (vm, ecm->run_time);
+ ec_main.timer_expired = true;
+ }
+
/*
* Wait for the sessions to finish or test_timeout seconds pass
*/
- ecm->test_start_time = vlib_time_now (ecm->vlib_main);
- ec_cli ("Test started at %.6f", ecm->test_start_time);
vlib_process_wait_for_event_or_clock (vm, ecm->test_timeout);
event_type = vlib_process_get_events (vm, &event_data);
switch (event_type)
@@ -1332,8 +1358,8 @@ cleanup:
VLIB_CLI_COMMAND (ec_command, static) = {
.path = "test echo clients",
.short_help =
- "test echo clients [nclients %d][bytes <bytes>[m|g]]"
- "[test-timeout <time>][syn-timeout <time>][echo-bytes][fifo-size <size>]"
+ "test echo clients [nclients %d][bytes <bytes>[m|g]][test-timeout <time>]"
+ "[run-time <time>][syn-timeout <time>][echo-bytes][fifo-size <size>]"
"[private-segment-count <count>][private-segment-size <bytes>[m|g]]"
"[preallocate-fifos][preallocate-sessions][client-batch <batch-size>]"
"[uri <tcp://ip/port>][test-bytes][verbose]",
diff --git a/src/plugins/hs_apps/echo_client.h b/src/plugins/hs_apps/echo_client.h
index 5868c3652ce..d06f237c757 100644
--- a/src/plugins/hs_apps/echo_client.h
+++ b/src/plugins/hs_apps/echo_client.h
@@ -57,6 +57,7 @@ typedef struct
volatile u64 rx_total;
volatile u64 tx_total;
volatile int run_test; /**< Signal start of test */
+ volatile bool timer_expired; /**< Signal end of timed test */
f64 syn_start_time;
f64 test_start_time;
@@ -97,6 +98,7 @@ typedef struct
u64 appns_secret; /**< App namespace secret */
f64 syn_timeout; /**< Test syn timeout (s) */
f64 test_timeout; /**< Test timeout (s) */
+ f64 run_time; /**< Length of a test (s) */
/*
* Flags
diff --git a/src/vlib/CMakeLists.txt b/src/vlib/CMakeLists.txt
index 3c354b764dd..1f1a1396d0d 100644
--- a/src/vlib/CMakeLists.txt
+++ b/src/vlib/CMakeLists.txt
@@ -71,6 +71,19 @@ set(PLATFORM_SOURCES
)
endif()
+set(VLIB_LIBS vppinfra svm ${CMAKE_DL_LIBS} ${EPOLL_LIB})
+
+vpp_find_path(LIBIBERTY_INCLUDE_DIR libiberty/demangle.h)
+vpp_find_library(LIBIBERTY_LIB NAMES iberty libiberty)
+
+if (LIBIBERTY_INCLUDE_DIR AND LIBUNWIND_LIB)
+ message(STATUS "libiberty found at ${LIBIBERTY_LIB}")
+ list(APPEND VLIB_LIBS ${LIBIBERTY_LIB})
+ add_definitions(-DHAVE_LIBIBERTY)
+else()
+ message(WARNING "libiberty not found - stack trace demangle disabled")
+endif()
+
add_vpp_library(vlib
SOURCES
buffer.c
@@ -159,7 +172,7 @@ add_vpp_library(vlib
API_FILES
pci/pci_types.api
- LINK_LIBRARIES vppinfra svm ${CMAKE_DL_LIBS} ${EPOLL_LIB}
+ LINK_LIBRARIES ${VLIB_LIBS}
DEPENDS api_headers
)
diff --git a/src/vlib/node_funcs.h b/src/vlib/node_funcs.h
index 91fedaa4c9c..ef8cf78e838 100644
--- a/src/vlib/node_funcs.h
+++ b/src/vlib/node_funcs.h
@@ -261,6 +261,13 @@ vlib_node_set_interrupt_pending (vlib_main_t *vm, u32 node_index)
clib_interrupt_set (interrupts, n->runtime_index);
}
+always_inline int
+vlib_node_is_scheduled (vlib_main_t *vm, u32 node_index)
+{
+ vlib_node_runtime_t *rt = vlib_node_get_runtime (vm, node_index);
+ return rt->stop_timer_handle_plus_1 ? 1 : 0;
+}
+
always_inline void
vlib_node_schedule (vlib_main_t *vm, u32 node_index, f64 dt)
{
@@ -273,6 +280,9 @@ vlib_node_schedule (vlib_main_t *vm, u32 node_index, f64 dt)
.index = node_index,
};
+ ASSERT (vm == vlib_get_main ());
+ ASSERT (vlib_node_is_scheduled (vm, node_index) == 0);
+
dt = flt_round_nearest (dt * VLIB_TW_TICKS_PER_SECOND);
ticks = clib_max ((u64) dt, 1);
@@ -280,6 +290,20 @@ vlib_node_schedule (vlib_main_t *vm, u32 node_index, f64 dt)
1 + TW (tw_timer_start) (tw, e.as_u32, 0 /* timer_id */, ticks);
}
+always_inline void
+vlib_node_unschedule (vlib_main_t *vm, u32 node_index)
+{
+ vlib_node_runtime_t *rt = vlib_node_get_runtime (vm, node_index);
+ TWT (tw_timer_wheel) *tw = (TWT (tw_timer_wheel) *) vm->timing_wheel;
+
+ ASSERT (vm == vlib_get_main ());
+ ASSERT (vlib_node_is_scheduled (vm, node_index) == 1);
+
+ TW (tw_timer_stop) (tw, rt->stop_timer_handle_plus_1);
+
+ rt->stop_timer_handle_plus_1 = 0;
+}
+
always_inline vlib_process_t *
vlib_get_process_from_node (vlib_main_t * vm, vlib_node_t * node)
{
diff --git a/src/vlib/unix/main.c b/src/vlib/unix/main.c
index 11d0cb1160c..49aa5d3a8ab 100644
--- a/src/vlib/unix/main.c
+++ b/src/vlib/unix/main.c
@@ -54,6 +54,10 @@
#include <sys/resource.h>
#include <unistd.h>
+#ifdef HAVE_LIBIBERTY
+#include <libiberty/demangle.h>
+#endif
+
/** Default CLI pager limit is not configured in startup.conf */
#define UNIX_CLI_DEFAULT_PAGER_LIMIT 100000
@@ -226,8 +230,20 @@ unix_signal_handler (int signum, siginfo_t * si, ucontext_t * uc)
{
if (color)
syslog_msg = format (syslog_msg, ANSI_FG_YELLOW);
- syslog_msg =
- format (syslog_msg, " %s + 0x%x", sf->name, sf->offset);
+#if HAVE_LIBIBERTY
+ if (strncmp (sf->name, "_Z", 2) == 0)
+ {
+ char *demangled = cplus_demangle (sf->name, DMGL_AUTO);
+ syslog_msg = format (syslog_msg, " %s",
+ demangled ? demangled : sf->name);
+ if (demangled)
+ free (demangled);
+ }
+ else
+#endif
+ syslog_msg = format (syslog_msg, " %s", sf->name);
+
+ syslog_msg = format (syslog_msg, " + 0x%x", sf->offset);
if (color)
syslog_msg = format (syslog_msg, ANSI_FG_DEFAULT);
}
diff --git a/src/vnet/CMakeLists.txt b/src/vnet/CMakeLists.txt
index 9e7734e20cb..5c9c5cc0dc5 100644
--- a/src/vnet/CMakeLists.txt
+++ b/src/vnet/CMakeLists.txt
@@ -522,6 +522,7 @@ list(APPEND VNET_API_FILES bfd/bfd.api)
list(APPEND VNET_SOURCES
crypto/cli.c
+ crypto/config.c
crypto/crypto.c
crypto/format.c
crypto/main.c
diff --git a/src/vnet/crypto/config.c b/src/vnet/crypto/config.c
new file mode 100644
index 00000000000..09f39b38b4e
--- /dev/null
+++ b/src/vnet/crypto/config.c
@@ -0,0 +1,105 @@
+/*
+ * config.c: crypto engines configuration
+ *
+ * Copyright (c) 2025 Cisco and/or its affiliates.
+ * SPDX-License-Identifier: Apache-2.0
+ * https://spdx.org/licenses/Apache-2.0.html
+ */
+
+#include <vlib/vlib.h>
+#include <vnet/crypto/crypto.h>
+
+static clib_error_t *
+config_one_crypto (vlib_main_t *vm, char *name, unformat_input_t *input)
+{
+ vnet_crypto_main_t *cm = &crypto_main;
+ vnet_crypto_config_t *pc;
+ clib_error_t *error = 0;
+ uword *p;
+ int is_enable = 0;
+ int is_disable = 0;
+
+ if (cm->config_index_by_name == 0)
+ cm->config_index_by_name = hash_create_string (0, sizeof (uword));
+
+ p = hash_get_mem (cm->config_index_by_name, name);
+ if (p)
+ {
+ error = clib_error_return (0, "crypto '%s' already configured", name);
+ goto done;
+ }
+
+ while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT)
+ {
+ if (unformat (input, "enable"))
+ is_enable = 1;
+ else if (unformat (input, "disable"))
+ is_disable = 1;
+ else
+ {
+ error = clib_error_return (0, "unknown input '%U'",
+ format_unformat_error, input);
+ goto done;
+ }
+ }
+
+ if (is_enable && is_disable)
+ {
+ error = clib_error_return (0,
+ "please specify either enable or disable"
+ " for crypto '%s'",
+ name);
+ goto done;
+ }
+
+ vec_add2 (cm->configs, pc, 1);
+ pc->is_enabled = is_enable;
+ pc->is_disabled = is_disable;
+ pc->name = vec_dup (name);
+ hash_set_mem (cm->config_index_by_name, pc->name, pc - cm->configs);
+
+done:
+ return error;
+}
+
+static clib_error_t *
+crypto_engines_config (vlib_main_t *vm, unformat_input_t *input)
+{
+ vnet_crypto_main_t *cm = &crypto_main;
+ clib_error_t *error = 0;
+
+ while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT)
+ {
+ unformat_input_t sub_input;
+ u8 *s = 0;
+ if (unformat (input, "default %U", unformat_vlib_cli_sub_input,
+ &sub_input))
+ {
+ cm->default_disabled = unformat (&sub_input, "disable") ? 1 : 0;
+ unformat_free (&sub_input);
+ }
+ else if (unformat (input, "%s %U", &s, unformat_vlib_cli_sub_input,
+ &sub_input))
+ {
+ error = config_one_crypto (vm, (char *) s, &sub_input);
+ vec_free (s);
+ unformat_free (&sub_input);
+ if (error)
+ goto done;
+ }
+ else
+ {
+ error = clib_error_return (0, "unknown input '%U'",
+ format_unformat_error, input);
+ {
+ vec_free (s);
+ goto done;
+ }
+ }
+ }
+
+done:
+ return error;
+}
+
+VLIB_EARLY_CONFIG_FUNCTION (crypto_engines_config, "crypto-engines");
diff --git a/src/vnet/crypto/crypto.c b/src/vnet/crypto/crypto.c
index d1a6a6b12a1..765dc499078 100644
--- a/src/vnet/crypto/crypto.c
+++ b/src/vnet/crypto/crypto.c
@@ -18,6 +18,8 @@ VLIB_REGISTER_LOG_CLASS (crypto_main_log, static) = {
#define log_debug(f, ...) \
vlib_log (VLIB_LOG_LEVEL_DEBUG, crypto_main_log.class, f, ##__VA_ARGS__)
+#define log_notice(f, ...) \
+ vlib_log (VLIB_LOG_LEVEL_NOTICE, crypto_main_log.class, f, ##__VA_ARGS__)
#define log_err(f, ...) \
vlib_log (VLIB_LOG_LEVEL_ERR, crypto_main_log.class, f, ##__VA_ARGS__)
@@ -564,11 +566,14 @@ static void
vnet_crypto_load_engines (vlib_main_t *vm)
{
vlib_thread_main_t *tm = vlib_get_thread_main ();
+ vnet_crypto_main_t *cm = &crypto_main;
+ vnet_crypto_config_t *pc;
u8 *path;
char *p;
u32 path_len;
struct dirent *entry;
DIR *dp;
+ uword *config_index;
path = os_get_exec_path ();
log_debug ("exec path is %s", path);
@@ -623,6 +628,31 @@ vnet_crypto_load_engines (vlib_main_t *vm)
continue;
}
+ /* follow crypto-engines config section directive */
+ config_index = hash_get_mem (cm->config_index_by_name, r->name);
+ if (config_index)
+ {
+ pc = vec_elt_at_index (cm->configs, config_index[0]);
+ if (pc->is_disabled)
+ {
+ log_notice ("crypto disabled: %s", r->name);
+ dlclose (handle);
+ continue;
+ }
+ if (cm->default_disabled && pc->is_enabled == 0)
+ {
+ log_notice ("crypto disabled (default): %s", r->name);
+ dlclose (handle);
+ continue;
+ }
+ }
+ else if (cm->default_disabled)
+ {
+ log_notice ("crypto disabled (default): %s", r->name);
+ dlclose (handle);
+ continue;
+ }
+
if (r->per_thread_data_sz)
{
u64 sz =
diff --git a/src/vnet/crypto/crypto.h b/src/vnet/crypto/crypto.h
index 0a021282b5d..c80987ecff7 100644
--- a/src/vnet/crypto/crypto.h
+++ b/src/vnet/crypto/crypto.h
@@ -420,17 +420,28 @@ typedef struct
typedef struct
{
+ char *name;
+ u8 is_disabled;
+ u8 is_enabled;
+} vnet_crypto_config_t;
+
+typedef struct
+{
vnet_crypto_key_t **keys;
u8 keys_lock;
u32 crypto_node_index;
vnet_crypto_thread_t *threads;
vnet_crypto_frame_dequeue_t **dequeue_handlers;
vnet_crypto_engine_t *engines;
+ /* configs and hash by name */
+ vnet_crypto_config_t *configs;
+ uword *config_index_by_name;
uword *engine_index_by_name;
uword *alg_index_by_name;
vnet_crypto_async_next_node_t *next_nodes;
vnet_crypto_alg_data_t algs[VNET_CRYPTO_N_ALGS];
vnet_crypto_op_data_t opt_data[VNET_CRYPTO_N_OP_IDS];
+ u8 default_disabled;
} vnet_crypto_main_t;
extern vnet_crypto_main_t crypto_main;