summaryrefslogtreecommitdiffstats
path: root/src/vppinfra
AgeCommit message (Expand)AuthorFilesLines
2019-10-11vppinfra: fix page boundary crossing bug in hash_memory64Dave Barach1-4/+47
2019-10-04vppinfra: create unformat function for data size parsingMathiasRaoul2-0/+26
2019-09-27vppinfra: implement CLIB_PAUSE () for aarch64 platformsjaszha031-0/+2
2019-09-26classify: use vector code even when data is not alignedDamjan Marion1-0/+2
2019-09-16dpdk: initialize rte_mbuf during mempool dequeueDamjan Marion1-0/+3
2019-09-03vppinfra: add bihash_init2Dave Barach2-20/+53
2019-08-20fix pcap_write functionJack Xu2-3/+3
2019-08-19vppinfra: Update "show cpu" output for AArch64 chipsNitin Saxena1-15/+18
2019-08-02vppinfra: Expose function setting __os_thread_indexNathan Skrzypczak2-0/+27
2019-08-01interface: fix pcap tx/rx trace cli handlingJohn Lo1-0/+2
2019-08-01vppinfra: fix spinlock and rwlock testsFlorin Coras3-15/+15
2019-08-01vppinfra: refactor clib_rwlock_t to use single condition variablejaszha031-24/+19
2019-08-01vppinfra: remove unused historical codeDave Barach3-375/+0
2019-08-01vppinfra: make first bihash add thread-safeDave Barach2-7/+25
2019-08-01vppinfra: refactor clib_spinlock_t to use compare and swapjaszha032-2/+13
2019-07-31vppinfra: added performance test for clib_rwlock_t (test_rwlock.c)jaszha032-0/+265
2019-07-31vppinfra: refactor test_and_set spinlocks to use clib_spinlock_tjaszha031-0/+3
2019-07-31vppinfra: added lock performance test for clib_spinlock_t (test_spinlock.c)jaszha032-0/+207
2019-07-30vppinfra: refactor use of CLIB_MEMORY_BARRIER ()jaszha033-17/+8
2019-07-30vppinfra: conformed spinlocks to use CLIB_PAUSEjaszha032-2/+4
2019-07-26session: separate ctrl, new and old eventsFlorin Coras1-0/+38
2019-07-25vppinfra: fix coverity warning in mpcap.cDave Barach1-5/+14
2019-07-24vppinfra: add mapped pcap file supportGary Boon3-0/+506
2019-07-19vppinfra: fix OOM check in bihashAndreas Schultz1-1/+1
2019-07-17session: use llist in session node evt handlingFlorin Coras1-2/+27
2019-07-17vppinfra: elog: fix read overflow in string lookupBenoƮt Ganne1-5/+7
2019-07-13vppinfra: add doubly linked listFlorin Coras2-0/+255
2019-07-11vppinfra: bihash add-but-do-not-overwrite semanticsDave Barach1-0/+7
2019-07-09vppinfra: allocate bihash virtual space on demandDave Barach4-11/+136
2019-07-02api: fix coverity warningsDave Barach1-1/+1
2019-06-28vppinfra: add dummy/noop f32/f64 endian swap fnsDave Barach1-0/+8
2019-06-26vppinfra: add u64x2_scatter/u32x4_scatterLijian.Zhang1-0/+16
2019-06-25vppinfra: fix tw_timer_first_expires_in_ticks for multiple wheelsAndreas Schultz1-0/+13
2019-06-21vppinfra: add u64x2_gather/u32x4_gatherLijian.Zhang1-0/+18
2019-06-19vppinfra: fix rbtree node deleteFlorin Coras1-3/+7
2019-06-18vppinfra: rbtree custom insert/search/delFlorin Coras2-24/+99
2019-06-18stats: fix memory leakage when adding / deleting interfacesOle Troan2-0/+16
2019-06-18vppinfra: add format_hex_bytes_no_wrapDamjan Marion2-0/+17
2019-06-16vlib: add "memory-trace stats-segment"Dave Barach5-21/+52
2019-06-14vppinfra: optimize elog_stringDave Barach2-5/+31
2019-06-05Switch atomic release API from __sync to __atomic builtin.Sirshak Das1-1/+1
2019-06-05Switch atomic test and set API from __sync to __atomic builtinSirshak Das1-1/+1
2019-06-04elog: make elog_string() multi-thread safeSteven Luong1-0/+2
2019-05-27vppinfra: add pclmulqdq x86 cpuid flagDamjan Marion1-0/+1
2019-05-24Add callback multiplex supportDave Barach2-0/+112
2019-05-17Add a debug-CLI leak-checkerDave Barach1-0/+2
2019-05-14Preallocate mhash key_tmps vectorDave Barach1-8/+1
2019-05-13Fix typoIgor Mikhailov (imichail)1-1/+1
2019-05-10zero-pad date string output.Paul Vinciguerra1-2/+2
2019-05-07bihash: Freeing up working_copy_lengths vectorVijayabhaskar Katamreddy1-1/+2
class="p">, acontext); acontext->acl_indices = 0; acontext->context_user_id = acl_user_id; acontext->user_val1 = val1; acontext->user_val2 = val2; u32 new_context_id = acontext - am->acl_lookup_contexts; vec_add1(am->acl_users[acl_user_id].lookup_contexts, new_context_id); return new_context_id; } static void lock_acl(acl_main_t *am, u32 acl, u32 lc_index) { vec_validate(am->lc_index_vec_by_acl, acl); elog_acl_cond_trace_X2(am, (am->trace_acl), "lock acl %d in lc_index %d", "i4i4", acl, lc_index); vec_add1(am->lc_index_vec_by_acl[acl], lc_index); } static void lock_acl_vec(u32 lc_index, u32 *acls) { int i; acl_main_t *am = &acl_main; for(i=0; i<vec_len(acls); i++) { lock_acl(am, acls[i], lc_index); } } static void unlock_acl(acl_main_t *am, u32 acl, u32 lc_index) { vec_validate(am->lc_index_vec_by_acl, acl); elog_acl_cond_trace_X2(am, (am->trace_acl), "unlock acl %d in lc_index %d", "i4i4", acl, lc_index); u32 index = vec_search(am->lc_index_vec_by_acl[acl], lc_index); if (index != ~0) vec_del1(am->lc_index_vec_by_acl[acl], index); else clib_warning("BUG: can not unlock acl %d lc_index %d", acl, lc_index); } static void unlock_acl_vec(u32 lc_index, u32 *acls) { int i; acl_main_t *am = &acl_main; for(i=0; i<vec_len(acls); i++) unlock_acl(am, acls[i], lc_index); } static void apply_acl_vec(u32 lc_index, u32 *acls) { int i; acl_main_t *am = &acl_main; for(i=0; i<vec_len(acls); i++) hash_acl_apply(am, lc_index, acls[i], i); } static void unapply_acl_vec(u32 lc_index, u32 *acls) { int i; acl_main_t *am = &acl_main; if (vec_len(acls) == 0) return; for(i=vec_len(acls); i > 0; i--) hash_acl_unapply(am, lc_index, acls[i-1]); } /* * Release the lookup context index and destroy * any associated data structures. */ static void acl_plugin_put_lookup_context_index (u32 lc_index) { acl_main_t *am = &acl_main; elog_acl_cond_trace_X1(am, (am->trace_acl), "LOOKUP-CONTEXT: put-context lc_index %d", "i4", lc_index); if (!acl_lc_index_valid(am, lc_index)) { clib_warning("BUG: lc_index %d is not valid", lc_index); return; } acl_lookup_context_t *acontext = pool_elt_at_index(am->acl_lookup_contexts, lc_index); u32 index = vec_search(am->acl_users[acontext->context_user_id].lookup_contexts, lc_index); ASSERT(index != ~0); vec_del1(am->acl_users[acontext->context_user_id].lookup_contexts, index); unapply_acl_vec(lc_index, acontext->acl_indices); unlock_acl_vec(lc_index, acontext->acl_indices); vec_free(acontext->acl_indices); pool_put(am->acl_lookup_contexts, acontext); } /* * Prepare the sequential vector of ACL#s to lookup within a given context. * Any existing list will be overwritten. acl_list is a vector. */ static int acl_plugin_set_acl_vec_for_context (u32 lc_index, u32 *acl_list) { int rv = 0; uword *seen_acl_bitmap = 0; u32 *pacln = 0; acl_main_t *am = &acl_main; acl_lookup_context_t *acontext; if (am->trace_acl) { u32 i; elog_acl_cond_trace_X1(am, (1), "LOOKUP-CONTEXT: set-acl-list lc_index %d", "i4", lc_index); for(i=0; i<vec_len(acl_list); i++) { elog_acl_cond_trace_X2(am, (1), " acl-list[%d]: %d", "i4i4", i, acl_list[i]); } } if (!acl_lc_index_valid(am, lc_index)) { clib_warning("BUG: lc_index %d is not valid", lc_index); return -1; } vec_foreach (pacln, acl_list) { if (pool_is_free_index (am->acls, *pacln)) { /* ACL is not defined. Can not apply */ clib_warning ("ERROR: ACL %d not defined", *pacln); rv = VNET_API_ERROR_NO_SUCH_ENTRY; goto done; } if (clib_bitmap_get (seen_acl_bitmap, *pacln)) { /* ACL being applied twice within the list. error. */ clib_warning ("ERROR: ACL %d being applied twice", *pacln); rv = VNET_API_ERROR_ENTRY_ALREADY_EXISTS; goto done; } seen_acl_bitmap = clib_bitmap_set (seen_acl_bitmap, *pacln, 1); } acontext = pool_elt_at_index(am->acl_lookup_contexts, lc_index); u32 *old_acl_vector = acontext->acl_indices; acontext->acl_indices = vec_dup(acl_list); unapply_acl_vec(lc_index, old_acl_vector); unlock_acl_vec(lc_index, old_acl_vector); lock_acl_vec(lc_index, acontext->acl_indices); apply_acl_vec(lc_index, acontext->acl_indices); vec_free(old_acl_vector); done: clib_bitmap_free (seen_acl_bitmap); return rv; } void acl_plugin_lookup_context_notify_acl_change(u32 acl_num) { acl_main_t *am = &acl_main; if (acl_plugin_acl_exists(acl_num)) { if (hash_acl_exists(am, acl_num)) { /* this is a modification, clean up the older entries */ hash_acl_delete(am, acl_num); } hash_acl_add(am, acl_num); } else { /* this is a deletion notification */ hash_acl_delete(am, acl_num); } } /* Fill the 5-tuple from the packet */ static void acl_plugin_fill_5tuple (u32 lc_index, vlib_buffer_t * b0, int is_ip6, int is_input, int is_l2_path, fa_5tuple_opaque_t * p5tuple_pkt) { acl_plugin_fill_5tuple_inline(&acl_main, lc_index, b0, is_ip6, is_input, is_l2_path, p5tuple_pkt); } static int acl_plugin_match_5tuple (u32 lc_index, fa_5tuple_opaque_t * pkt_5tuple, int is_ip6, u8 * r_action, u32 * r_acl_pos_p, u32 * r_acl_match_p, u32 * r_rule_match_p, u32 * trace_bitmap) { return acl_plugin_match_5tuple_inline (&acl_main, lc_index, pkt_5tuple, is_ip6, r_action, r_acl_pos_p, r_acl_match_p, r_rule_match_p, trace_bitmap); } void acl_plugin_show_lookup_user (u32 user_index) { acl_main_t *am = &acl_main; vlib_main_t *vm = am->vlib_main; acl_lookup_context_user_t *auser; pool_foreach (auser, am->acl_users) { u32 curr_user_index = (auser - am->acl_users); if (user_index == ~0 || (curr_user_index == user_index)) { vlib_cli_output (vm, "index %d:%s:%s:%s", curr_user_index, auser->user_module_name, auser->val1_label, auser->val2_label); } } } void acl_plugin_show_lookup_context (u32 lc_index) { acl_main_t *am = &acl_main; vlib_main_t *vm = am->vlib_main; acl_lookup_context_t *acontext; // clib_warning("LOOKUP-CONTEXT: lc_index %d acl_list [ %U ]", lc_index, format_vec32, acl_list, "%d"); if (!am->acl_lookup_contexts) { vlib_cli_output(vm, "ACL lookup contexts are not initialized"); return; } pool_foreach (acontext, am->acl_lookup_contexts) { u32 curr_lc_index = (acontext - am->acl_lookup_contexts); if ((lc_index == ~0) || (curr_lc_index == lc_index)) { if (acl_user_id_valid(am, acontext->context_user_id)) { acl_lookup_context_user_t *auser = pool_elt_at_index(am->acl_users, acontext->context_user_id); vlib_cli_output (vm, "index %d:%s %s: %d %s: %d, acl_indices: %U", curr_lc_index, auser->user_module_name, auser->val1_label, acontext->user_val1, auser->val2_label, acontext->user_val2, format_vec32, acontext->acl_indices, "%d"); } else { vlib_cli_output (vm, "index %d: user_id: %d user_val1: %d user_val2: %d, acl_indices: %U", curr_lc_index, acontext->context_user_id, acontext->user_val1, acontext->user_val2, format_vec32, acontext->acl_indices, "%d"); } } } } void * acl_plugin_get_p_acl_main(void) { return &acl_main; } __clib_export clib_error_t * acl_plugin_methods_vtable_init(acl_plugin_methods_t *m) { m->p_acl_main = &acl_main; #define _(name) m->name = acl_plugin_ ## name; foreach_acl_plugin_exported_method_name #undef _ return 0; }