diff options
Diffstat (limited to 'src')
-rw-r--r-- | src/plugins/dev_iavf/virtchnl.h | 1 | ||||
-rw-r--r-- | src/plugins/hs_apps/echo_client.c | 52 | ||||
-rw-r--r-- | src/plugins/hs_apps/echo_client.h | 2 | ||||
-rw-r--r-- | src/vlib/CMakeLists.txt | 15 | ||||
-rw-r--r-- | src/vlib/node_funcs.h | 24 | ||||
-rw-r--r-- | src/vlib/unix/main.c | 20 | ||||
-rw-r--r-- | src/vnet/CMakeLists.txt | 1 | ||||
-rw-r--r-- | src/vnet/crypto/config.c | 105 | ||||
-rw-r--r-- | src/vnet/crypto/crypto.c | 30 | ||||
-rw-r--r-- | src/vnet/crypto/crypto.h | 11 |
10 files changed, 245 insertions, 16 deletions
diff --git a/src/plugins/dev_iavf/virtchnl.h b/src/plugins/dev_iavf/virtchnl.h index 2099104c8ad..72158684e9e 100644 --- a/src/plugins/dev_iavf/virtchnl.h +++ b/src/plugins/dev_iavf/virtchnl.h @@ -560,6 +560,7 @@ typedef struct { u16 unicast_promisc : 1; u16 multicast_promisc : 1; + u16 unused : 14; }; u16 flags; }; diff --git a/src/plugins/hs_apps/echo_client.c b/src/plugins/hs_apps/echo_client.c index b08edaaa5f5..f57fd748dba 100644 --- a/src/plugins/hs_apps/echo_client.c +++ b/src/plugins/hs_apps/echo_client.c @@ -79,21 +79,27 @@ ec_session_get (ec_worker_t *wrk, u32 ec_index) static void send_data_chunk (ec_main_t *ecm, ec_session_t *es) { + const u64 max_burst = 128000; u8 *test_data = ecm->connect_test_data; int test_buf_len, test_buf_offset, rv; + u64 bytes_to_send; u32 bytes_this_chunk; + svm_fifo_t *f = es->tx_fifo; test_buf_len = vec_len (test_data); ASSERT (test_buf_len > 0); + if (ecm->run_time) + bytes_to_send = clib_min (svm_fifo_max_enqueue_prod (f), max_burst); + else + bytes_to_send = clib_min (es->bytes_to_send, max_burst); test_buf_offset = es->bytes_sent % test_buf_len; - bytes_this_chunk = - clib_min (test_buf_len - test_buf_offset, es->bytes_to_send); + + bytes_this_chunk = clib_min (test_buf_len - test_buf_offset, bytes_to_send); if (!es->is_dgram) { if (ecm->no_copy) { - svm_fifo_t *f = es->tx_fifo; rv = clib_min (svm_fifo_max_enqueue_prod (f), bytes_this_chunk); svm_fifo_enqueue_nocopy (f, rv); session_program_tx_io_evt (es->tx_fifo->vpp_sh, SESSION_IO_EVT_TX); @@ -105,7 +111,6 @@ send_data_chunk (ec_main_t *ecm, ec_session_t *es) } else { - svm_fifo_t *f = es->tx_fifo; u32 max_enqueue = svm_fifo_max_enqueue_prod (f); if (max_enqueue < sizeof (session_dgram_hdr_t)) @@ -147,8 +152,11 @@ send_data_chunk (ec_main_t *ecm, ec_session_t *es) if (rv > 0) { /* Account for it... */ - es->bytes_to_send -= rv; es->bytes_sent += rv; + if (ecm->run_time) + es->bytes_to_receive += rv; + else + es->bytes_to_send -= rv; if (ecm->cfg.verbose) { @@ -266,7 +274,7 @@ ec_node_fn (vlib_main_t *vm, vlib_node_runtime_t *node, vlib_frame_t *frame) { ecm->repeats++; ecm->prev_conns = vec_len (conns_this_batch); - if (ecm->repeats == 500000) + if (ecm->repeats == 500000 && !ecm->run_time) { ec_err ("stuck clients"); } @@ -297,7 +305,7 @@ ec_node_fn (vlib_main_t *vm, vlib_node_runtime_t *node, vlib_frame_t *frame) delete_session = 0; } - if (PREDICT_FALSE (delete_session == 1)) + if (PREDICT_FALSE (delete_session == 1) || ecm->timer_expired) { clib_atomic_fetch_add (&ecm->tx_total, es->bytes_sent); clib_atomic_fetch_add (&ecm->rx_total, es->bytes_received); @@ -356,6 +364,7 @@ ec_reset_runtime_config (ec_main_t *ecm) ecm->tls_engine = CRYPTO_ENGINE_OPENSSL; ecm->no_copy = 0; ecm->run_test = EC_STARTING; + ecm->timer_expired = false; ecm->ready_connections = 0; ecm->connect_conn_index = 0; ecm->rx_total = 0; @@ -368,6 +377,7 @@ ec_reset_runtime_config (ec_main_t *ecm) ecm->attach_flags = 0; ecm->syn_timeout = 20.0; ecm->test_timeout = 20.0; + ecm->run_time = 0; vec_free (ecm->connect_uri); } @@ -1072,7 +1082,7 @@ ec_command_fn (vlib_main_t *vm, unformat_input_t *input, ec_main_t *ecm = &ec_main; uword *event_data = 0, event_type; clib_error_t *error = 0; - int rv, had_config = 1; + int rv, timed_run_conflict = 0, had_config = 1; u64 total_bytes; f64 delta; @@ -1101,11 +1111,13 @@ ec_command_fn (vlib_main_t *vm, unformat_input_t *input, ; else if (unformat (line_input, "bytes %U", unformat_memory_size, &ecm->bytes_to_send)) - ; + timed_run_conflict++; else if (unformat (line_input, "test-timeout %f", &ecm->test_timeout)) ; else if (unformat (line_input, "syn-timeout %f", &ecm->syn_timeout)) ; + else if (unformat (line_input, "run-time %f", &ecm->run_time)) + ; else if (unformat (line_input, "echo-bytes")) ecm->echo_bytes = 1; else if (unformat (line_input, "fifo-size %U", unformat_memory_size, @@ -1149,6 +1161,9 @@ ec_command_fn (vlib_main_t *vm, unformat_input_t *input, } } + if (timed_run_conflict && ecm->run_time) + return clib_error_return (0, "failed: invalid arguments for a timed run!"); + parse_config: ecm->cfg.num_test_sessions = ecm->expected_connections = @@ -1234,11 +1249,22 @@ parse_config: goto stop_test; } + /* Testing officially starts now */ + ecm->test_start_time = vlib_time_now (ecm->vlib_main); + ec_cli ("Test started at %.6f", ecm->test_start_time); + + /* + * If a timed run, wait and expire timer + */ + if (ecm->run_time) + { + vlib_process_suspend (vm, ecm->run_time); + ec_main.timer_expired = true; + } + /* * Wait for the sessions to finish or test_timeout seconds pass */ - ecm->test_start_time = vlib_time_now (ecm->vlib_main); - ec_cli ("Test started at %.6f", ecm->test_start_time); vlib_process_wait_for_event_or_clock (vm, ecm->test_timeout); event_type = vlib_process_get_events (vm, &event_data); switch (event_type) @@ -1332,8 +1358,8 @@ cleanup: VLIB_CLI_COMMAND (ec_command, static) = { .path = "test echo clients", .short_help = - "test echo clients [nclients %d][bytes <bytes>[m|g]]" - "[test-timeout <time>][syn-timeout <time>][echo-bytes][fifo-size <size>]" + "test echo clients [nclients %d][bytes <bytes>[m|g]][test-timeout <time>]" + "[run-time <time>][syn-timeout <time>][echo-bytes][fifo-size <size>]" "[private-segment-count <count>][private-segment-size <bytes>[m|g]]" "[preallocate-fifos][preallocate-sessions][client-batch <batch-size>]" "[uri <tcp://ip/port>][test-bytes][verbose]", diff --git a/src/plugins/hs_apps/echo_client.h b/src/plugins/hs_apps/echo_client.h index 5868c3652ce..d06f237c757 100644 --- a/src/plugins/hs_apps/echo_client.h +++ b/src/plugins/hs_apps/echo_client.h @@ -57,6 +57,7 @@ typedef struct volatile u64 rx_total; volatile u64 tx_total; volatile int run_test; /**< Signal start of test */ + volatile bool timer_expired; /**< Signal end of timed test */ f64 syn_start_time; f64 test_start_time; @@ -97,6 +98,7 @@ typedef struct u64 appns_secret; /**< App namespace secret */ f64 syn_timeout; /**< Test syn timeout (s) */ f64 test_timeout; /**< Test timeout (s) */ + f64 run_time; /**< Length of a test (s) */ /* * Flags diff --git a/src/vlib/CMakeLists.txt b/src/vlib/CMakeLists.txt index 3c354b764dd..1f1a1396d0d 100644 --- a/src/vlib/CMakeLists.txt +++ b/src/vlib/CMakeLists.txt @@ -71,6 +71,19 @@ set(PLATFORM_SOURCES ) endif() +set(VLIB_LIBS vppinfra svm ${CMAKE_DL_LIBS} ${EPOLL_LIB}) + +vpp_find_path(LIBIBERTY_INCLUDE_DIR libiberty/demangle.h) +vpp_find_library(LIBIBERTY_LIB NAMES iberty libiberty) + +if (LIBIBERTY_INCLUDE_DIR AND LIBUNWIND_LIB) + message(STATUS "libiberty found at ${LIBIBERTY_LIB}") + list(APPEND VLIB_LIBS ${LIBIBERTY_LIB}) + add_definitions(-DHAVE_LIBIBERTY) +else() + message(WARNING "libiberty not found - stack trace demangle disabled") +endif() + add_vpp_library(vlib SOURCES buffer.c @@ -159,7 +172,7 @@ add_vpp_library(vlib API_FILES pci/pci_types.api - LINK_LIBRARIES vppinfra svm ${CMAKE_DL_LIBS} ${EPOLL_LIB} + LINK_LIBRARIES ${VLIB_LIBS} DEPENDS api_headers ) diff --git a/src/vlib/node_funcs.h b/src/vlib/node_funcs.h index 91fedaa4c9c..ef8cf78e838 100644 --- a/src/vlib/node_funcs.h +++ b/src/vlib/node_funcs.h @@ -261,6 +261,13 @@ vlib_node_set_interrupt_pending (vlib_main_t *vm, u32 node_index) clib_interrupt_set (interrupts, n->runtime_index); } +always_inline int +vlib_node_is_scheduled (vlib_main_t *vm, u32 node_index) +{ + vlib_node_runtime_t *rt = vlib_node_get_runtime (vm, node_index); + return rt->stop_timer_handle_plus_1 ? 1 : 0; +} + always_inline void vlib_node_schedule (vlib_main_t *vm, u32 node_index, f64 dt) { @@ -273,6 +280,9 @@ vlib_node_schedule (vlib_main_t *vm, u32 node_index, f64 dt) .index = node_index, }; + ASSERT (vm == vlib_get_main ()); + ASSERT (vlib_node_is_scheduled (vm, node_index) == 0); + dt = flt_round_nearest (dt * VLIB_TW_TICKS_PER_SECOND); ticks = clib_max ((u64) dt, 1); @@ -280,6 +290,20 @@ vlib_node_schedule (vlib_main_t *vm, u32 node_index, f64 dt) 1 + TW (tw_timer_start) (tw, e.as_u32, 0 /* timer_id */, ticks); } +always_inline void +vlib_node_unschedule (vlib_main_t *vm, u32 node_index) +{ + vlib_node_runtime_t *rt = vlib_node_get_runtime (vm, node_index); + TWT (tw_timer_wheel) *tw = (TWT (tw_timer_wheel) *) vm->timing_wheel; + + ASSERT (vm == vlib_get_main ()); + ASSERT (vlib_node_is_scheduled (vm, node_index) == 1); + + TW (tw_timer_stop) (tw, rt->stop_timer_handle_plus_1); + + rt->stop_timer_handle_plus_1 = 0; +} + always_inline vlib_process_t * vlib_get_process_from_node (vlib_main_t * vm, vlib_node_t * node) { diff --git a/src/vlib/unix/main.c b/src/vlib/unix/main.c index 11d0cb1160c..49aa5d3a8ab 100644 --- a/src/vlib/unix/main.c +++ b/src/vlib/unix/main.c @@ -54,6 +54,10 @@ #include <sys/resource.h> #include <unistd.h> +#ifdef HAVE_LIBIBERTY +#include <libiberty/demangle.h> +#endif + /** Default CLI pager limit is not configured in startup.conf */ #define UNIX_CLI_DEFAULT_PAGER_LIMIT 100000 @@ -226,8 +230,20 @@ unix_signal_handler (int signum, siginfo_t * si, ucontext_t * uc) { if (color) syslog_msg = format (syslog_msg, ANSI_FG_YELLOW); - syslog_msg = - format (syslog_msg, " %s + 0x%x", sf->name, sf->offset); +#if HAVE_LIBIBERTY + if (strncmp (sf->name, "_Z", 2) == 0) + { + char *demangled = cplus_demangle (sf->name, DMGL_AUTO); + syslog_msg = format (syslog_msg, " %s", + demangled ? demangled : sf->name); + if (demangled) + free (demangled); + } + else +#endif + syslog_msg = format (syslog_msg, " %s", sf->name); + + syslog_msg = format (syslog_msg, " + 0x%x", sf->offset); if (color) syslog_msg = format (syslog_msg, ANSI_FG_DEFAULT); } diff --git a/src/vnet/CMakeLists.txt b/src/vnet/CMakeLists.txt index 9e7734e20cb..5c9c5cc0dc5 100644 --- a/src/vnet/CMakeLists.txt +++ b/src/vnet/CMakeLists.txt @@ -522,6 +522,7 @@ list(APPEND VNET_API_FILES bfd/bfd.api) list(APPEND VNET_SOURCES crypto/cli.c + crypto/config.c crypto/crypto.c crypto/format.c crypto/main.c diff --git a/src/vnet/crypto/config.c b/src/vnet/crypto/config.c new file mode 100644 index 00000000000..09f39b38b4e --- /dev/null +++ b/src/vnet/crypto/config.c @@ -0,0 +1,105 @@ +/* + * config.c: crypto engines configuration + * + * Copyright (c) 2025 Cisco and/or its affiliates. + * SPDX-License-Identifier: Apache-2.0 + * https://spdx.org/licenses/Apache-2.0.html + */ + +#include <vlib/vlib.h> +#include <vnet/crypto/crypto.h> + +static clib_error_t * +config_one_crypto (vlib_main_t *vm, char *name, unformat_input_t *input) +{ + vnet_crypto_main_t *cm = &crypto_main; + vnet_crypto_config_t *pc; + clib_error_t *error = 0; + uword *p; + int is_enable = 0; + int is_disable = 0; + + if (cm->config_index_by_name == 0) + cm->config_index_by_name = hash_create_string (0, sizeof (uword)); + + p = hash_get_mem (cm->config_index_by_name, name); + if (p) + { + error = clib_error_return (0, "crypto '%s' already configured", name); + goto done; + } + + while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT) + { + if (unformat (input, "enable")) + is_enable = 1; + else if (unformat (input, "disable")) + is_disable = 1; + else + { + error = clib_error_return (0, "unknown input '%U'", + format_unformat_error, input); + goto done; + } + } + + if (is_enable && is_disable) + { + error = clib_error_return (0, + "please specify either enable or disable" + " for crypto '%s'", + name); + goto done; + } + + vec_add2 (cm->configs, pc, 1); + pc->is_enabled = is_enable; + pc->is_disabled = is_disable; + pc->name = vec_dup (name); + hash_set_mem (cm->config_index_by_name, pc->name, pc - cm->configs); + +done: + return error; +} + +static clib_error_t * +crypto_engines_config (vlib_main_t *vm, unformat_input_t *input) +{ + vnet_crypto_main_t *cm = &crypto_main; + clib_error_t *error = 0; + + while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT) + { + unformat_input_t sub_input; + u8 *s = 0; + if (unformat (input, "default %U", unformat_vlib_cli_sub_input, + &sub_input)) + { + cm->default_disabled = unformat (&sub_input, "disable") ? 1 : 0; + unformat_free (&sub_input); + } + else if (unformat (input, "%s %U", &s, unformat_vlib_cli_sub_input, + &sub_input)) + { + error = config_one_crypto (vm, (char *) s, &sub_input); + vec_free (s); + unformat_free (&sub_input); + if (error) + goto done; + } + else + { + error = clib_error_return (0, "unknown input '%U'", + format_unformat_error, input); + { + vec_free (s); + goto done; + } + } + } + +done: + return error; +} + +VLIB_EARLY_CONFIG_FUNCTION (crypto_engines_config, "crypto-engines"); diff --git a/src/vnet/crypto/crypto.c b/src/vnet/crypto/crypto.c index d1a6a6b12a1..765dc499078 100644 --- a/src/vnet/crypto/crypto.c +++ b/src/vnet/crypto/crypto.c @@ -18,6 +18,8 @@ VLIB_REGISTER_LOG_CLASS (crypto_main_log, static) = { #define log_debug(f, ...) \ vlib_log (VLIB_LOG_LEVEL_DEBUG, crypto_main_log.class, f, ##__VA_ARGS__) +#define log_notice(f, ...) \ + vlib_log (VLIB_LOG_LEVEL_NOTICE, crypto_main_log.class, f, ##__VA_ARGS__) #define log_err(f, ...) \ vlib_log (VLIB_LOG_LEVEL_ERR, crypto_main_log.class, f, ##__VA_ARGS__) @@ -564,11 +566,14 @@ static void vnet_crypto_load_engines (vlib_main_t *vm) { vlib_thread_main_t *tm = vlib_get_thread_main (); + vnet_crypto_main_t *cm = &crypto_main; + vnet_crypto_config_t *pc; u8 *path; char *p; u32 path_len; struct dirent *entry; DIR *dp; + uword *config_index; path = os_get_exec_path (); log_debug ("exec path is %s", path); @@ -623,6 +628,31 @@ vnet_crypto_load_engines (vlib_main_t *vm) continue; } + /* follow crypto-engines config section directive */ + config_index = hash_get_mem (cm->config_index_by_name, r->name); + if (config_index) + { + pc = vec_elt_at_index (cm->configs, config_index[0]); + if (pc->is_disabled) + { + log_notice ("crypto disabled: %s", r->name); + dlclose (handle); + continue; + } + if (cm->default_disabled && pc->is_enabled == 0) + { + log_notice ("crypto disabled (default): %s", r->name); + dlclose (handle); + continue; + } + } + else if (cm->default_disabled) + { + log_notice ("crypto disabled (default): %s", r->name); + dlclose (handle); + continue; + } + if (r->per_thread_data_sz) { u64 sz = diff --git a/src/vnet/crypto/crypto.h b/src/vnet/crypto/crypto.h index 0a021282b5d..c80987ecff7 100644 --- a/src/vnet/crypto/crypto.h +++ b/src/vnet/crypto/crypto.h @@ -420,17 +420,28 @@ typedef struct typedef struct { + char *name; + u8 is_disabled; + u8 is_enabled; +} vnet_crypto_config_t; + +typedef struct +{ vnet_crypto_key_t **keys; u8 keys_lock; u32 crypto_node_index; vnet_crypto_thread_t *threads; vnet_crypto_frame_dequeue_t **dequeue_handlers; vnet_crypto_engine_t *engines; + /* configs and hash by name */ + vnet_crypto_config_t *configs; + uword *config_index_by_name; uword *engine_index_by_name; uword *alg_index_by_name; vnet_crypto_async_next_node_t *next_nodes; vnet_crypto_alg_data_t algs[VNET_CRYPTO_N_ALGS]; vnet_crypto_op_data_t opt_data[VNET_CRYPTO_N_OP_IDS]; + u8 default_disabled; } vnet_crypto_main_t; extern vnet_crypto_main_t crypto_main; |