summaryrefslogtreecommitdiffstats
path: root/src/vnet/session
AgeCommit message (Expand)AuthorFilesLines
2021-05-21session: improve main thread connects rpcFlorin Coras2-18/+26
2021-05-20session: fix transport half-open cleanup callFlorin Coras1-1/+1
2021-05-19session: cleanup event llist usageFlorin Coras3-41/+27
2021-05-19session: fix session queue node access on disableFlorin Coras1-1/+1
2021-05-18tls: fix dtls with no workersFlorin Coras2-1/+14
2021-05-18session: poll main thread if pending connectsFlorin Coras3-48/+76
2021-05-18session: only handle old ctrl events per dispatchFlorin Coras1-6/+12
2021-05-18session: move tx-buffers to tx ctxFlorin Coras2-16/+14
2021-05-16session: rpc for connects to mainFlorin Coras3-5/+88
2021-05-15session: fix coverity warningFlorin Coras1-1/+1
2021-05-14session: switch ct to vc and track half-opensFlorin Coras5-77/+220
2021-05-14tls: switch dtls to vc and track half-opensFlorin Coras3-10/+73
2021-05-12tls: switch to vc service and track half-open sessionsFlorin Coras5-6/+14
2021-05-12session: return connect session handle to appFlorin Coras6-32/+36
2021-05-12session: support half-close connectionliuyacan8-4/+114
2021-05-10session: use half-open sessions for vc establishmentFlorin Coras8-116/+111
2021-05-07session: connects seg manager is always firstFlorin Coras3-77/+23
2021-05-03session: lookup listener with iface addressliuyacan1-0/+26
2021-05-01vlib: refactor trajectory trace debug featureBenoƮt Ganne1-5/+0
2021-04-29session: accept notifies for sessions in created stateFlorin Coras1-0/+2
2021-04-29session: cleanup CREATED sessions when listener goes downliuyacan3-0/+63
2021-04-27session: fix mq ext config cleanupFlorin Coras1-2/+1
2021-04-26session: fix race condition in fifo allocationliuyacan3-43/+39
2021-04-23session: set connected session index for ctFlorin Coras1-2/+5
2021-04-23tls quic: improve error reportingFlorin Coras1-1/+4
2021-04-23session: set fifo's session index before vcl attachliuyacan1-0/+2
2021-04-22session: remove unused connect/listen msg membersFlorin Coras1-5/+0
2021-04-22vcl session: refactor passing of crypto contextFlorin Coras6-50/+36
2021-04-22vcl session: extended connect/listen configurationFlorin Coras4-18/+65
2021-04-20tcp: req app deq notification on fifo fullFlorin Coras1-0/+7
2021-04-15tcp: support for rate sample attr flagFlorin Coras1-1/+9
2021-04-14session: fix next node add on transport registrationFlorin Coras1-7/+2
2021-04-14session tcp vcl: api to update connection attributesFlorin Coras8-26/+159
2021-04-07session: fix coverity warningFlorin Coras2-6/+6
2021-04-06session: basic support for interrupt modeFlorin Coras4-4/+176
2021-04-05tcp: time infra improvementsFlorin Coras4-2/+22
2021-04-01session: always clean rx mqs on app detachFlorin Coras1-4/+3
2021-03-30session: interrupt mode for session node on main threadFlorin Coras1-15/+20
2021-03-29svm session vcl: per app rx message queuesFlorin Coras8-101/+496
2021-03-26vlib: convert foreach_vlib_main macro to be more gdb and clang-format friendlyDamjan Marion1-32/+28
2021-03-26vlib: introduce vlib_get_elog_main()Damjan Marion1-1/+1
2021-03-26vlib: introduce vlib_get_main_by_index(), vlib_get_n_threads()Damjan Marion4-4/+4
2021-03-25svm: add producer wait functionFlorin Coras1-1/+1
2021-03-17session: fix populating chained buffersIvan Shvedunov1-3/+5
2021-03-11session tls: deq notifications for custom txFlorin Coras1-0/+4
2021-03-10session: check if fifo exists in cl bound notificationFlorin Coras1-1/+2
2021-02-28session svm: segment manager and fifo segment leaksFlorin Coras1-0/+2
2021-02-24session: init ctrl msg without mq lockFlorin Coras1-102/+96
2021-02-15session: coverity fixFlorin Coras1-3/+0
2021-02-10vcl: validate seg handle on migrate only if neededFlorin Coras1-1/+1
); s = format (s, "VXLAN encap to vxlan_tunnel%d vni %d", t->tunnel_index, t->vni); return s; } #define foreach_fixed_header4_offset \ _(0) _(1) _(2) _(3) #define foreach_fixed_header6_offset \ _(0) _(1) _(2) _(3) _(4) _(5) _(6) always_inline uword vxlan_encap_inline (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * from_frame, u32 is_ip4) { u32 n_left_from, next_index, * from, * to_next; vxlan_main_t * vxm = &vxlan_main; vnet_main_t * vnm = vxm->vnet_main; vnet_interface_main_t * im = &vnm->interface_main; u32 pkts_encapsulated = 0; u16 old_l0 = 0, old_l1 = 0; u32 cpu_index = os_get_cpu_number(); u32 stats_sw_if_index, stats_n_packets, stats_n_bytes; u32 sw_if_index0 = 0, sw_if_index1 = 0; u32 next0 = 0, next1 = 0; vnet_hw_interface_t * hi0, * hi1; vxlan_tunnel_t * t0 = NULL, * t1 = NULL; from = vlib_frame_vector_args (from_frame); n_left_from = from_frame->n_vectors; next_index = node->cached_next_index; stats_sw_if_index = node->runtime_data[0]; stats_n_packets = stats_n_bytes = 0; while (n_left_from > 0) { u32 n_left_to_next; vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next); while (n_left_from >= 4 && n_left_to_next >= 2) { u32 bi0, bi1; vlib_buffer_t * b0, * b1; u32 flow_hash0, flow_hash1; u32 len0, len1; ip4_header_t * ip4_0, * ip4_1; ip6_header_t * ip6_0, * ip6_1; udp_header_t * udp0, * udp1; u64 * copy_src0, * copy_dst0; u64 * copy_src1, * copy_dst1; u32 * copy_src_last0, * copy_dst_last0; u32 * copy_src_last1, * copy_dst_last1; u16 new_l0, new_l1; ip_csum_t sum0, sum1; /* Prefetch next iteration. */ { vlib_buffer_t * p2, * p3; p2 = vlib_get_buffer (vm, from[2]); p3 = vlib_get_buffer (vm, from[3]); vlib_prefetch_buffer_header (p2, LOAD); vlib_prefetch_buffer_header (p3, LOAD); CLIB_PREFETCH (p2->data, 2*CLIB_CACHE_LINE_BYTES, LOAD); CLIB_PREFETCH (p3->data, 2*CLIB_CACHE_LINE_BYTES, LOAD); } bi0 = from[0]; bi1 = from[1]; to_next[0] = bi0; to_next[1] = bi1; from += 2; to_next += 2; n_left_to_next -= 2; n_left_from -= 2; b0 = vlib_get_buffer (vm, bi0); b1 = vlib_get_buffer (vm, bi1); flow_hash0 = vnet_l2_compute_flow_hash (b0); flow_hash1 = vnet_l2_compute_flow_hash (b1); /* Get next node index and adj index from tunnel next_dpo */ if (sw_if_index0 != vnet_buffer(b0)->sw_if_index[VLIB_TX]) { sw_if_index0 = vnet_buffer(b0)->sw_if_index[VLIB_TX]; hi0 = vnet_get_sup_hw_interface (vnm, sw_if_index0); t0 = &vxm->tunnels[hi0->dev_instance]; /* Note: change to always set next0 if it may be set to drop */ next0 = t0->next_dpo.dpoi_next_node; } vnet_buffer(b0)->ip.adj_index[VLIB_TX] = t0->next_dpo.dpoi_index; /* Get next node index and adj index from tunnel next_dpo */ if (sw_if_index1 != vnet_buffer(b1)->sw_if_index[VLIB_TX]) { sw_if_index1 = vnet_buffer(b1)->sw_if_index[VLIB_TX]; hi1 = vnet_get_sup_hw_interface (vnm, sw_if_index1); t1 = &vxm->tunnels[hi1->dev_instance]; /* Note: change to always set next1 if it may be set to drop */ next1 = t1->next_dpo.dpoi_next_node; } vnet_buffer(b1)->ip.adj_index[VLIB_TX] = t1->next_dpo.dpoi_index; /* Apply the rewrite string. $$$$ vnet_rewrite? */ vlib_buffer_advance (b0, -(word)_vec_len(t0->rewrite)); vlib_buffer_advance (b1, -(word)_vec_len(t1->rewrite)); if (is_ip4) { /* IP4 VXLAN header should be 36 octects */ ASSERT(sizeof(ip4_vxlan_header_t) == 36); ASSERT(vec_len(t0->rewrite) == sizeof(ip4_vxlan_header_t)); ASSERT(vec_len(t1->rewrite) == sizeof(ip4_vxlan_header_t)); ip4_0 = vlib_buffer_get_current(b0); ip4_1 = vlib_buffer_get_current(b1); /* Copy the fixed header */ copy_dst0 = (u64 *) ip4_0; copy_src0 = (u64 *) t0->rewrite; copy_dst1 = (u64 *) ip4_1; copy_src1 = (u64 *) t1->rewrite; /* Copy first 32 octets 8-bytes at a time */ #define _(offs) copy_dst0[offs] = copy_src0[offs]; foreach_fixed_header4_offset; #undef _ #define _(offs) copy_dst1[offs] = copy_src1[offs]; foreach_fixed_header4_offset; #undef _ /* Last 4 octets. Hopefully gcc will be our friend */ copy_dst_last0 = (u32 *)(&copy_dst0[4]); copy_src_last0 = (u32 *)(&copy_src0[4]); copy_dst_last0[0] = copy_src_last0[0]; copy_dst_last1 = (u32 *)(&copy_dst1[4]); copy_src_last1 = (u32 *)(&copy_src1[4]); copy_dst_last1[0] = copy_src_last1[0]; /* Fix the IP4 checksum and length */ sum0 = ip4_0->checksum; new_l0 = /* old_l0 always 0, see the rewrite setup */ clib_host_to_net_u16 (vlib_buffer_length_in_chain (vm, b0)); sum0 = ip_csum_update (sum0, old_l0, new_l0, ip4_header_t, length /* changed member */); ip4_0->checksum = ip_csum_fold (sum0); ip4_0->length = new_l0; sum1 = ip4_1->checksum; new_l1 = /* old_l1 always 0, see the rewrite setup */ clib_host_to_net_u16 (vlib_buffer_length_in_chain (vm, b1)); sum1 = ip_csum_update (sum1, old_l1, new_l1, ip4_header_t, length /* changed member */); ip4_1->checksum = ip_csum_fold (sum1); ip4_1->length = new_l1; /* Fix UDP length and set source port */ udp0 = (udp_header_t *)(ip4_0+1); new_l0 = clib_host_to_net_u16 (vlib_buffer_length_in_chain(vm, b0) - sizeof (*ip4_0)); udp0->length = new_l0; udp0->src_port = flow_hash0; udp1 = (udp_header_t *)(ip4_1+1); new_l1 = clib_host_to_net_u16 (vlib_buffer_length_in_chain(vm, b1) - sizeof (*ip4_1)); udp1->length = new_l1; udp1->src_port = flow_hash1; } else /* ipv6 */ { int bogus = 0; /* IP6 VXLAN header should be 56 octects */ ASSERT(sizeof(ip6_vxlan_header_t) == 56); ASSERT(vec_len(t0->rewrite) == sizeof(ip6_vxlan_header_t)); ASSERT(vec_len(t1->rewrite) == sizeof(ip6_vxlan_header_t)); ip6_0 = vlib_buffer_get_current(b0); ip6_1 = vlib_buffer_get_current(b1); /* Copy the fixed header */ copy_dst0 = (u64 *) ip6_0; copy_src0 = (u64 *) t0->rewrite; copy_dst1 = (u64 *) ip6_1; copy_src1 = (u64 *) t1->rewrite; /* Copy first 56 (ip6) octets 8-bytes at a time */ #define _(offs) copy_dst0[offs] = copy_src0[offs]; foreach_fixed_header6_offset; #undef _ #define _(offs) copy_dst1[offs] = copy_src1[offs]; foreach_fixed_header6_offset; #undef _ /* Fix IP6 payload length */ new_l0 = clib_host_to_net_u16 (vlib_buffer_length_in_chain (vm, b0) - sizeof(*ip6_0)); ip6_0->payload_length = new_l0; new_l1 = clib_host_to_net_u16 (vlib_buffer_length_in_chain (vm, b1) - sizeof(*ip6_1)); ip6_1->payload_length = new_l1; /* Fix UDP length and set source port */ udp0 = (udp_header_t *)(ip6_0+1); udp0->length = new_l0; udp0->src_port = flow_hash0; udp1 = (udp_header_t *)(ip6_1+1); udp1->length = new_l1; udp1->src_port = flow_hash1; /* IPv6 UDP checksum is mandatory */ udp0->checksum = ip6_tcp_udp_icmp_compute_checksum(vm, b0, ip6_0, &bogus); ASSERT(bogus == 0); if (udp0->checksum == 0) udp0->checksum = 0xffff; udp1->checksum = ip6_tcp_udp_icmp_compute_checksum(vm, b1, ip6_1, &bogus); ASSERT(bogus == 0); if (udp1->checksum == 0) udp1->checksum = 0xffff; } pkts_encapsulated += 2; len0 = vlib_buffer_length_in_chain (vm, b0); len1 = vlib_buffer_length_in_chain (vm, b1); stats_n_packets += 2; stats_n_bytes += len0 + len1; /* Batch stats increment on the same vxlan tunnel so counter is not incremented per packet. Note stats are still incremented for deleted and admin-down tunnel where packets are dropped. It is not worthwhile to check for this rare case and affect normal path performance. */ if (PREDICT_FALSE ((sw_if_index0 != stats_sw_if_index) || (sw_if_index1 != stats_sw_if_index))) { stats_n_packets -= 2; stats_n_bytes -= len0 + len1; if (sw_if_index0 == sw_if_index1) { if (stats_n_packets) vlib_increment_combined_counter (im->combined_sw_if_counters + VNET_INTERFACE_COUNTER_TX, cpu_index, stats_sw_if_index, stats_n_packets, stats_n_bytes); stats_sw_if_index = sw_if_index0; stats_n_packets = 2; stats_n_bytes = len0 + len1; } else { vlib_increment_combined_counter (im->combined_sw_if_counters + VNET_INTERFACE_COUNTER_TX, cpu_index, sw_if_index0, 1, len0); vlib_increment_combined_counter (im->combined_sw_if_counters + VNET_INTERFACE_COUNTER_TX, cpu_index, sw_if_index1, 1, len1); } } if (PREDICT_FALSE(b0->flags & VLIB_BUFFER_IS_TRACED)) { vxlan_encap_trace_t *tr = vlib_add_trace (vm, node, b0, sizeof (*tr)); tr->tunnel_index = t0 - vxm->tunnels; tr->vni = t0->vni; } if (PREDICT_FALSE(b1->flags & VLIB_BUFFER_IS_TRACED)) { vxlan_encap_trace_t *tr = vlib_add_trace (vm, node, b1, sizeof (*tr)); tr->tunnel_index = t1 - vxm->tunnels; tr->vni = t1->vni; } vlib_validate_buffer_enqueue_x2 (vm, node, next_index, to_next, n_left_to_next, bi0, bi1, next0, next1); } while (n_left_from > 0 && n_left_to_next > 0) { u32 bi0; vlib_buffer_t * b0; u32 flow_hash0; u32 len0; ip4_header_t * ip4_0; ip6_header_t * ip6_0; udp_header_t * udp0; u64 * copy_src0, * copy_dst0; u32 * copy_src_last0, * copy_dst_last0; u16 new_l0; ip_csum_t sum0; bi0 = from[0]; to_next[0] = bi0; from += 1; to_next += 1; n_left_from -= 1; n_left_to_next -= 1; b0 = vlib_get_buffer (vm, bi0); flow_hash0 = vnet_l2_compute_flow_hash(b0); /* Get next node index and adj index from tunnel next_dpo */ if (sw_if_index0 != vnet_buffer(b0)->sw_if_index[VLIB_TX]) { sw_if_index0 = vnet_buffer(b0)->sw_if_index[VLIB_TX]; hi0 = vnet_get_sup_hw_interface (vnm, sw_if_index0); t0 = &vxm->tunnels[hi0->dev_instance]; /* Note: change to always set next0 if it may be set to drop */ next0 = t0->next_dpo.dpoi_next_node; } vnet_buffer(b0)->ip.adj_index[VLIB_TX] = t0->next_dpo.dpoi_index; /* Apply the rewrite string. $$$$ vnet_rewrite? */ vlib_buffer_advance (b0, -(word)_vec_len(t0->rewrite)); if (is_ip4) { /* IP4 VXLAN header should be 36 octects */ ASSERT(sizeof(ip4_vxlan_header_t) == 36); ASSERT(vec_len(t0->rewrite) == sizeof(ip4_vxlan_header_t)); ip4_0 = vlib_buffer_get_current(b0); /* Copy the fixed header */ copy_dst0 = (u64 *) ip4_0; copy_src0 = (u64 *) t0->rewrite; /* Copy first 32 octets 8-bytes at a time */ #define _(offs) copy_dst0[offs] = copy_src0[offs]; foreach_fixed_header4_offset; #undef _ /* Last 4 octets. Hopefully gcc will be our friend */ copy_dst_last0 = (u32 *)(&copy_dst0[4]); copy_src_last0 = (u32 *)(&copy_src0[4]); copy_dst_last0[0] = copy_src_last0[0]; /* Fix the IP4 checksum and length */ sum0 = ip4_0->checksum; new_l0 = /* old_l0 always 0, see the rewrite setup */ clib_host_to_net_u16 (vlib_buffer_length_in_chain (vm, b0)); sum0 = ip_csum_update (sum0, old_l0, new_l0, ip4_header_t, length /* changed member */); ip4_0->checksum = ip_csum_fold (sum0); ip4_0->length = new_l0; /* Fix UDP length and set source port */ udp0 = (udp_header_t *)(ip4_0+1); new_l0 = clib_host_to_net_u16 (vlib_buffer_length_in_chain(vm, b0) - sizeof (*ip4_0)); udp0->length = new_l0; udp0->src_port = flow_hash0; } else /* ip6 path */ { int bogus = 0; /* IP6 VXLAN header should be 56 octects */ ASSERT(sizeof(ip6_vxlan_header_t) == 56); ASSERT(vec_len(t0->rewrite) == sizeof(ip6_vxlan_header_t)); ip6_0 = vlib_buffer_get_current(b0); /* Copy the fixed header */ copy_dst0 = (u64 *) ip6_0; copy_src0 = (u64 *) t0->rewrite; /* Copy first 56 (ip6) octets 8-bytes at a time */ #define _(offs) copy_dst0[offs] = copy_src0[offs]; foreach_fixed_header6_offset; #undef _ /* Fix IP6 payload length */ new_l0 = clib_host_to_net_u16 (vlib_buffer_length_in_chain (vm, b0) - sizeof(*ip6_0)); ip6_0->payload_length = new_l0; /* Fix UDP length and set source port */ udp0 = (udp_header_t *)(ip6_0+1); udp0->length = new_l0; udp0->src_port = flow_hash0; /* IPv6 UDP checksum is mandatory */ udp0->checksum = ip6_tcp_udp_icmp_compute_checksum(vm, b0, ip6_0, &bogus); ASSERT(bogus == 0); if (udp0->checksum == 0) udp0->checksum = 0xffff; } pkts_encapsulated ++; len0 = vlib_buffer_length_in_chain (vm, b0); stats_n_packets += 1; stats_n_bytes += len0; /* Batch stats increment on the same vxlan tunnel so counter is not incremented per packet. Note stats are still incremented for deleted and admin-down tunnel where packets are dropped. It is not worthwhile to check for this rare case and affect normal path performance. */ if (PREDICT_FALSE (sw_if_index0 != stats_sw_if_index)) { stats_n_packets -= 1; stats_n_bytes -= len0; if (stats_n_packets) vlib_increment_combined_counter (im->combined_sw_if_counters + VNET_INTERFACE_COUNTER_TX, cpu_index, stats_sw_if_index, stats_n_packets, stats_n_bytes); stats_n_packets = 1; stats_n_bytes = len0; stats_sw_if_index = sw_if_index0; } if (PREDICT_FALSE(b0->flags & VLIB_BUFFER_IS_TRACED)) { vxlan_encap_trace_t *tr = vlib_add_trace (vm, node, b0, sizeof (*tr)); tr->tunnel_index = t0 - vxm->tunnels; tr->vni = t0->vni; } vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next, n_left_to_next, bi0, next0); } vlib_put_next_frame (vm, node, next_index, n_left_to_next); } /* Do we still need this now that tunnel tx stats is kept? */ vlib_node_increment_counter (vm, node->node_index, VXLAN_ENCAP_ERROR_ENCAPSULATED, pkts_encapsulated); /* Increment any remaining batch stats */ if (stats_n_packets) { vlib_increment_combined_counter (im->combined_sw_if_counters + VNET_INTERFACE_COUNTER_TX, cpu_index, stats_sw_if_index, stats_n_packets, stats_n_bytes); node->runtime_data[0] = stats_sw_if_index; } return from_frame->n_vectors; } static uword vxlan4_encap (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * from_frame) { return vxlan_encap_inline (vm, node, from_frame, /* is_ip4 */ 1); } static uword vxlan6_encap (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * from_frame) { return vxlan_encap_inline (vm, node, from_frame, /* is_ip4 */ 0); } VLIB_REGISTER_NODE (vxlan4_encap_node) = { .function = vxlan4_encap, .name = "vxlan4-encap", .vector_size = sizeof (u32), .format_trace = format_vxlan_encap_trace, .type = VLIB_NODE_TYPE_INTERNAL, .n_errors = ARRAY_LEN(vxlan_encap_error_strings), .error_strings = vxlan_encap_error_strings, .n_next_nodes = VXLAN_ENCAP_N_NEXT, .next_nodes = { [VXLAN_ENCAP_NEXT_DROP] = "error-drop", }, }; VLIB_NODE_FUNCTION_MULTIARCH (vxlan4_encap_node, vxlan4_encap) VLIB_REGISTER_NODE (vxlan6_encap_node) = { .function = vxlan6_encap, .name = "vxlan6-encap", .vector_size = sizeof (u32), .format_trace = format_vxlan_encap_trace, .type = VLIB_NODE_TYPE_INTERNAL, .n_errors = ARRAY_LEN(vxlan_encap_error_strings), .error_strings = vxlan_encap_error_strings, .n_next_nodes = VXLAN_ENCAP_N_NEXT, .next_nodes = { [VXLAN_ENCAP_NEXT_DROP] = "error-drop", }, }; VLIB_NODE_FUNCTION_MULTIARCH (vxlan6_encap_node, vxlan6_encap)