summaryrefslogtreecommitdiffstats
path: root/src/vnet/session/session.h
AgeCommit message (Expand)AuthorFilesLines
2019-06-17session: use listener_handle instead of listener_indexNathan Skrzypczak1-1/+1
2019-04-25session: use teps in accept/connect notificationsFlorin Coras1-2/+2
2019-04-24Add get_endpoint in transport vftAloys Augustin1-2/+4
2019-04-16svm_fifo rework to avoid contention on cursizeSirshak Das1-2/+2
2019-04-02tcp: improve rcv process ack processingFlorin Coras1-0/+7
2019-03-29Integrate first QUIC protocol implementationNathan Skrzypczak1-0/+2
2019-03-28session: remove unused tx context fieldFlorin Coras1-1/+0
2019-03-18session: add session flagsFlorin Coras1-5/+0
2019-03-06session: use vpp to switch io events for ct sessionsFlorin Coras1-0/+5
2019-03-02session: cleanup/rename functionsFlorin Coras1-73/+46
2019-03-02session: cleanup session event typesFlorin Coras1-1/+1
2019-02-23session: separate local session logicFlorin Coras1-4/+4
2019-02-21tcp: drop outstanding data when entering closing stateFlorin Coras1-1/+1
2019-02-18session: move fifo allocation logic to app workerFlorin Coras1-2/+1
2019-02-11session: add config for evt qs segment sizeFlorin Coras1-1/+1
2019-02-09session: refactor listen logicFlorin Coras1-104/+1
2019-02-06transport: cleanupFlorin Coras1-103/+102
2019-02-05session: cleanup part 3Florin Coras1-78/+0
2019-02-04session: cleanup part 1Florin Coras1-59/+57
2019-01-24session/vcl: support worker ownership change for listenersFlorin Coras1-1/+6
2019-01-10session/vcl: improve fifo tx notificationsFlorin Coras1-16/+13
2019-01-05vcl/session: add api for changing session app workerFlorin Coras1-1/+4
2018-12-28session: free session after transport and app confirmFlorin Coras1-7/+7
2018-12-22tcp: improve waitclose in closing statesFlorin Coras1-0/+1
2018-12-18tcp/session: drop connections if message queue is fullFlorin Coras1-1/+1
2018-12-13session/tcp: support tx flush markFlorin Coras1-0/+8
2018-11-30session: segment handle in accept/connect notificationsFlorin Coras1-0/+8
2018-11-14Remove c-11 memcpy checks from perf-critical codeDave Barach1-1/+1
2018-11-07tcp: consume incoming buffers instead of reusingFlorin Coras1-0/+7
2018-11-02session: measure dispatch period only if under loadFlorin Coras1-0/+2
2018-10-31session: prioritize postponed sessionsFlorin Coras1-0/+3
2018-10-31session: add wrk contextFlorin Coras1-47/+66
2018-10-28session: extend connect api for internal appsFlorin Coras1-1/+1
2018-10-25tcp/session: add tx pacerFlorin Coras1-0/+18
2018-10-16tls: fix multi threaded medium scale test (VPP-1457)Florin Coras1-1/+2
2018-10-02tls: fix disconnects for sessions with pending dataFlorin Coras1-1/+2
2018-09-19session: improve close procedureFlorin Coras1-0/+1
2018-09-06session: support multiple worker bindsFlorin Coras1-3/+3
2018-08-28vcl/session: use mq for bind repliesFlorin Coras1-0/+1
2018-08-24tcp: fix cc recovery re-entry and persist timer popFlorin Coras1-0/+9
2018-07-31vcl: add read/write udp supportFlorin Coras1-2/+2
2018-07-27vcl: use events for epoll/select/read/writeFlorin Coras1-0/+2
2018-07-17session: send ctrl msg over mqFlorin Coras1-9/+14
2018-07-17session: use msg queue for eventsFlorin Coras1-15/+32
2018-06-30session: send tx notification to appFlorin Coras1-0/+1
2018-06-11tcp: cleanup connection/session fixesFlorin Coras1-1/+1
2018-05-23tcp: cc improvements and fixesFlorin Coras1-2/+9
2018-05-18session: add session process nodeFlorin Coras1-0/+6
2018-05-13session: alloc one frame per output node dispatchFlorin Coras1-7/+4
2018-05-09session: cleanup session tx functionFlorin Coras1-27/+49
s="kt">int n_send_req = 0, n_avail = 0, n_sending = 0, n_tot = 0, n_wrong = 0; do { tph = (struct tpacket2_hdr *) (block_start + tx_frame * frame_size); tx_frame = (tx_frame + 1) % frame_num; if (tph->tp_status == 0) n_avail++; else if (tph->tp_status & TP_STATUS_SEND_REQUEST) n_send_req++; else if (tph->tp_status & TP_STATUS_SENDING) n_sending++; else n_wrong++; n_tot++; } while (tx_frame != apif->next_tx_frame); s = format (s, "%Uavailable:%d request:%d sending:%d wrong:%d total:%d\n", format_white_space, indent, n_avail, n_send_req, n_sending, n_wrong, n_tot); clib_spinlock_unlock_if_init (&apif->lockp); return s; } static u8 * format_af_packet_tx_trace (u8 * s, va_list * args) { s = format (s, "Unimplemented..."); return s; } VNET_DEVICE_CLASS_TX_FN (af_packet_device_class) (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * frame) { af_packet_main_t *apm = &af_packet_main; u32 *buffers = vlib_frame_vector_args (frame); u32 n_left = frame->n_vectors; u32 n_sent = 0; vnet_interface_output_runtime_t *rd = (void *) node->runtime_data; af_packet_if_t *apif = pool_elt_at_index (apm->interfaces, rd->dev_instance); clib_spinlock_lock_if_init (&apif->lockp); int block = 0; u32 block_size = apif->tx_req->tp_block_size; u32 frame_size = apif->tx_req->tp_frame_size; u32 frame_num = apif->tx_req->tp_frame_nr; u8 *block_start = apif->tx_ring + block * block_size; u32 tx_frame = apif->next_tx_frame; struct tpacket2_hdr *tph; u32 frame_not_ready = 0; while (n_left) { u32 len; u32 offset = 0; vlib_buffer_t *b0; n_left--; u32 bi = buffers[0]; buffers++; nextframe: tph = (struct tpacket2_hdr *) (block_start + tx_frame * frame_size); if (PREDICT_FALSE (tph->tp_status & (TP_STATUS_SEND_REQUEST | TP_STATUS_SENDING))) { tx_frame = (tx_frame + 1) % frame_num; frame_not_ready++; /* check if we've exhausted the ring */ if (PREDICT_FALSE (frame_not_ready + n_sent == frame_num)) break; goto nextframe; } do { b0 = vlib_get_buffer (vm, bi); len = b0->current_length; clib_memcpy_fast ((u8 *) tph + TPACKET_ALIGN (sizeof (struct tpacket2_hdr)) + offset, vlib_buffer_get_current (b0), len); offset += len; } while ((bi = (b0->flags & VLIB_BUFFER_NEXT_PRESENT) ? b0->next_buffer : 0)); tph->tp_len = tph->tp_snaplen = offset; tph->tp_status = TP_STATUS_SEND_REQUEST; n_sent++; tx_frame = (tx_frame + 1) % frame_num; /* check if we've exhausted the ring */ if (PREDICT_FALSE (frame_not_ready + n_sent == frame_num)) break; } CLIB_MEMORY_BARRIER (); apif->next_tx_frame = tx_frame; if (PREDICT_TRUE (n_sent)) if (PREDICT_FALSE (sendto (apif->fd, NULL, 0, MSG_DONTWAIT, NULL, 0) == -1)) { /* Uh-oh, drop & move on, but count whether it was fatal or not. * Note that we have no reliable way to properly determine the * disposition of the packets we just enqueued for delivery. */ vlib_error_count (vm, node->node_index, unix_error_is_fatal (errno) ? AF_PACKET_TX_ERROR_TXRING_FATAL : AF_PACKET_TX_ERROR_TXRING_EAGAIN, n_sent); } clib_spinlock_unlock_if_init (&apif->lockp); if (PREDICT_FALSE (frame_not_ready)) vlib_error_count (vm, node->node_index, AF_PACKET_TX_ERROR_FRAME_NOT_READY, frame_not_ready); if (PREDICT_FALSE (frame_not_ready + n_sent == frame_num)) vlib_error_count (vm, node->node_index, AF_PACKET_TX_ERROR_TXRING_OVERRUN, n_left); vlib_buffer_free (vm, vlib_frame_vector_args (frame), frame->n_vectors); return frame->n_vectors; } static void af_packet_set_interface_next_node (vnet_main_t * vnm, u32 hw_if_index, u32 node_index) { af_packet_main_t *apm = &af_packet_main; vnet_hw_interface_t *hw = vnet_get_hw_interface (vnm, hw_if_index); af_packet_if_t *apif = pool_elt_at_index (apm->interfaces, hw->dev_instance); /* Shut off redirection */ if (node_index == ~0) { apif->per_interface_next_index = node_index; return; } apif->per_interface_next_index = vlib_node_add_next (vlib_get_main (), af_packet_input_node.index, node_index); } static void af_packet_clear_hw_interface_counters (u32 instance) { /* Nothing for now */ } static clib_error_t * af_packet_interface_admin_up_down (vnet_main_t * vnm, u32 hw_if_index, u32 flags) { af_packet_main_t *apm = &af_packet_main; vnet_hw_interface_t *hw = vnet_get_hw_interface (vnm, hw_if_index); af_packet_if_t *apif = pool_elt_at_index (apm->interfaces, hw->dev_instance); u32 hw_flags; int rv, fd = socket (AF_UNIX, SOCK_DGRAM, 0); struct ifreq ifr; if (0 > fd) { vlib_log_warn (apm->log_class, "af_packet_%s could not open socket", apif->host_if_name); return 0; } /* if interface is a bridge ignore */ if (apif->host_if_index < 0) goto error; /* no error */ /* use host_if_index in case host name has changed */ ifr.ifr_ifindex = apif->host_if_index; if ((rv = ioctl (fd, SIOCGIFNAME, &ifr)) < 0) { vlib_log_warn (apm->log_class, "af_packet_%s ioctl could not retrieve eth name", apif->host_if_name); goto error; } apif->is_admin_up = (flags & VNET_SW_INTERFACE_FLAG_ADMIN_UP) != 0; if ((rv = ioctl (fd, SIOCGIFFLAGS, &ifr)) < 0) { vlib_log_warn (apm->log_class, "af_packet_%s error: %d", apif->is_admin_up ? "up" : "down", rv); goto error; } if (apif->is_admin_up) { hw_flags = VNET_HW_INTERFACE_FLAG_LINK_UP; ifr.ifr_flags |= IFF_UP; } else { hw_flags = 0; ifr.ifr_flags &= ~IFF_UP; } if ((rv = ioctl (fd, SIOCSIFFLAGS, &ifr)) < 0) { vlib_log_warn (apm->log_class, "af_packet_%s error: %d", apif->is_admin_up ? "up" : "down", rv); goto error; } vnet_hw_interface_set_flags (vnm, hw_if_index, hw_flags); error: if (0 <= fd) close (fd); return 0; /* no error */ } static clib_error_t * af_packet_subif_add_del_function (vnet_main_t * vnm, u32 hw_if_index, struct vnet_sw_interface_t *st, int is_add) { /* Nothing for now */ return 0; } static clib_error_t *af_packet_set_mac_address_function (struct vnet_hw_interface_t *hi, const u8 * old_address, const u8 * address) { af_packet_main_t *apm = &af_packet_main; af_packet_if_t *apif = pool_elt_at_index (apm->interfaces, hi->dev_instance); int rv, fd = socket (AF_UNIX, SOCK_DGRAM, 0); struct ifreq ifr; if (0 > fd) { vlib_log_warn (apm->log_class, "af_packet_%s could not open socket", apif->host_if_name); return 0; } /* if interface is a bridge ignore */ if (apif->host_if_index < 0) goto error; /* no error */ /* use host_if_index in case host name has changed */ ifr.ifr_ifindex = apif->host_if_index; if ((rv = ioctl (fd, SIOCGIFNAME, &ifr)) < 0) { vlib_log_warn (apm->log_class, "af_packet_%s ioctl could not retrieve eth name, error: %d", apif->host_if_name, rv); goto error; } clib_memcpy (ifr.ifr_hwaddr.sa_data, address, 6); ifr.ifr_hwaddr.sa_family = ARPHRD_ETHER; if ((rv = ioctl (fd, SIOCSIFHWADDR, &ifr)) < 0) { vlib_log_warn (apm->log_class, "af_packet_%s ioctl could not set mac, error: %d", apif->host_if_name, rv); goto error; } error: if (0 <= fd) close (fd); return 0; /* no error */ } /* *INDENT-OFF* */ VNET_DEVICE_CLASS (af_packet_device_class) = { .name = "af-packet", .format_device_name = format_af_packet_device_name, .format_device = format_af_packet_device, .format_tx_trace = format_af_packet_tx_trace, .tx_function_n_errors = AF_PACKET_TX_N_ERROR, .tx_function_error_strings = af_packet_tx_func_error_strings, .rx_redirect_to_node = af_packet_set_interface_next_node, .clear_counters = af_packet_clear_hw_interface_counters, .admin_up_down_function = af_packet_interface_admin_up_down, .subif_add_del_function = af_packet_subif_add_del_function, .mac_addr_change_function = af_packet_set_mac_address_function, }; /* *INDENT-ON* */ /* * fd.io coding-style-patch-verification: ON * * Local Variables: * eval: (c-set-style "gnu") * End: */