| /* |
| * Copyright (c) 2017 Cisco and/or its affiliates. |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this |
| * You may obtain a copy of the License at: |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <svm/svm_fifo_segment.h> |
| #include <vcl/vppcom.h> |
| #include <vcl/vcl_debug.h> |
| #include <vcl/vcl_private.h> |
| |
| __thread uword __vcl_worker_index = ~0; |
| |
| static u8 not_ready; |
| |
| void |
| sigsegv_signal (int signum) |
| { |
| not_ready = 1; |
| } |
| |
| static void |
| vcl_wait_for_memory (void *mem) |
| { |
| u8 __clib_unused test; |
| if (vcm->mounting_segment) |
| { |
| while (vcm->mounting_segment) |
| ; |
| return; |
| } |
| if (1 || vcm->debug) |
| { |
| usleep (1e5); |
| return; |
| } |
| if (signal (SIGSEGV, sigsegv_signal)) |
| { |
| perror ("signal()"); |
| return; |
| } |
| not_ready = 0; |
| |
| again: |
| test = *(u8 *) mem; |
| if (not_ready) |
| { |
| not_ready = 0; |
| usleep (1); |
| goto again; |
| } |
| |
| signal (SIGSEGV, SIG_DFL); |
| } |
| |
| const char * |
| vppcom_session_state_str (session_state_t state) |
| { |
| char *st; |
| |
| switch (state) |
| { |
| case STATE_START: |
| st = "STATE_START"; |
| break; |
| |
| case STATE_CONNECT: |
| st = "STATE_CONNECT"; |
| break; |
| |
| case STATE_LISTEN: |
| st = "STATE_LISTEN"; |
| break; |
| |
| case STATE_ACCEPT: |
| st = "STATE_ACCEPT"; |
| break; |
| |
| case STATE_CLOSE_ON_EMPTY: |
| st = "STATE_CLOSE_ON_EMPTY"; |
| break; |
| |
| case STATE_DISCONNECT: |
| st = "STATE_DISCONNECT"; |
| break; |
| |
| case STATE_FAILED: |
| st = "STATE_FAILED"; |
| break; |
| |
| default: |
| st = "UNKNOWN_STATE"; |
| break; |
| } |
| |
| return st; |
| } |
| |
| u8 * |
| format_ip4_address (u8 * s, va_list * args) |
| { |
| u8 *a = va_arg (*args, u8 *); |
| return format (s, "%d.%d.%d.%d", a[0], a[1], a[2], a[3]); |
| } |
| |
| u8 * |
| format_ip6_address (u8 * s, va_list * args) |
| { |
| ip6_address_t *a = va_arg (*args, ip6_address_t *); |
| u32 i, i_max_n_zero, max_n_zeros, i_first_zero, n_zeros, last_double_colon; |
| |
| i_max_n_zero = ARRAY_LEN (a->as_u16); |
| max_n_zeros = 0; |
| i_first_zero = i_max_n_zero; |
| n_zeros = 0; |
| for (i = 0; i < ARRAY_LEN (a->as_u16); i++) |
| { |
| u32 is_zero = a->as_u16[i] == 0; |
| if (is_zero && i_first_zero >= ARRAY_LEN (a->as_u16)) |
| { |
| i_first_zero = i; |
| n_zeros = 0; |
| } |
| n_zeros += is_zero; |
| if ((!is_zero && n_zeros > max_n_zeros) |
| || (i + 1 >= ARRAY_LEN (a->as_u16) && n_zeros > max_n_zeros)) |
| { |
| i_max_n_zero = i_first_zero; |
| max_n_zeros = n_zeros; |
| i_first_zero = ARRAY_LEN (a->as_u16); |
| n_zeros = 0; |
| } |
| } |
| |
| last_double_colon = 0; |
| for (i = 0; i < ARRAY_LEN (a->as_u16); i++) |
| { |
| if (i == i_max_n_zero && max_n_zeros > 1) |
| { |
| s = format (s, "::"); |
| i += max_n_zeros - 1; |
| last_double_colon = 1; |
| } |
| else |
| { |
| s = format (s, "%s%x", |
| (last_double_colon || i == 0) ? "" : ":", |
| clib_net_to_host_u16 (a->as_u16[i])); |
| last_double_colon = 0; |
| } |
| } |
| |
| return s; |
| } |
| |
| /* Format an IP46 address. */ |
| u8 * |
| format_ip46_address (u8 * s, va_list * args) |
| { |
| ip46_address_t *ip46 = va_arg (*args, ip46_address_t *); |
| ip46_type_t type = va_arg (*args, ip46_type_t); |
| int is_ip4 = 1; |
| |
| switch (type) |
| { |
| case IP46_TYPE_ANY: |
| is_ip4 = ip46_address_is_ip4 (ip46); |
| break; |
| case IP46_TYPE_IP4: |
| is_ip4 = 1; |
| break; |
| case IP46_TYPE_IP6: |
| is_ip4 = 0; |
| break; |
| } |
| |
| return is_ip4 ? |
| format (s, "%U", format_ip4_address, &ip46->ip4) : |
| format (s, "%U", format_ip6_address, &ip46->ip6); |
| } |
| |
| /* |
| * VPPCOM Utility Functions |
| */ |
| |
| |
| static svm_msg_q_t * |
| vcl_session_vpp_evt_q (vcl_worker_t * wrk, vcl_session_t * s) |
| { |
| if (vcl_session_is_ct (s)) |
| return wrk->vpp_event_queues[0]; |
| else |
| return wrk->vpp_event_queues[s->tx_fifo->master_thread_index]; |
| } |
| |
| static void |
| vcl_send_session_accepted_reply (svm_msg_q_t * mq, u32 context, |
| session_handle_t handle, int retval) |
| { |
| app_session_evt_t _app_evt, *app_evt = &_app_evt; |
| session_accepted_reply_msg_t *rmp; |
| app_alloc_ctrl_evt_to_vpp (mq, app_evt, SESSION_CTRL_EVT_ACCEPTED_REPLY); |
| rmp = (session_accepted_reply_msg_t *) app_evt->evt->data; |
| rmp->handle = handle; |
| rmp->context = context; |
| rmp->retval = retval; |
| app_send_ctrl_evt_to_vpp (mq, app_evt); |
| } |
| |
| static void |
| vcl_send_session_disconnected_reply (svm_msg_q_t * mq, u32 context, |
| session_handle_t handle, int retval) |
| { |
| app_session_evt_t _app_evt, *app_evt = &_app_evt; |
| session_disconnected_reply_msg_t *rmp; |
| app_alloc_ctrl_evt_to_vpp (mq, app_evt, |
| SESSION_CTRL_EVT_DISCONNECTED_REPLY); |
| rmp = (session_disconnected_reply_msg_t *) app_evt->evt->data; |
| rmp->handle = handle; |
| rmp->context = context; |
| rmp->retval = retval; |
| app_send_ctrl_evt_to_vpp (mq, app_evt); |
| } |
| |
| static void |
| vcl_send_session_reset_reply (svm_msg_q_t * mq, u32 context, |
| session_handle_t handle, int retval) |
| { |
| app_session_evt_t _app_evt, *app_evt = &_app_evt; |
| session_reset_reply_msg_t *rmp; |
| app_alloc_ctrl_evt_to_vpp (mq, app_evt, SESSION_CTRL_EVT_RESET_REPLY); |
| rmp = (session_reset_reply_msg_t *) app_evt->evt->data; |
| rmp->handle = handle; |
| rmp->context = context; |
| rmp->retval = retval; |
| app_send_ctrl_evt_to_vpp (mq, app_evt); |
| } |
| |
| static u32 |
| vcl_session_accepted_handler (vcl_worker_t * wrk, session_accepted_msg_t * mp) |
| { |
| vcl_session_t *session, *listen_session; |
| svm_fifo_t *rx_fifo, *tx_fifo; |
| u32 vpp_wrk_index; |
| svm_msg_q_t *evt_q; |
| |
| session = vcl_session_alloc (wrk); |
| |
| listen_session = vcl_session_table_lookup_listener (wrk, |
| mp->listener_handle); |
| if (!listen_session) |
| { |
| svm_msg_q_t *evt_q; |
| evt_q = uword_to_pointer (mp->vpp_event_queue_address, svm_msg_q_t *); |
| clib_warning ("VCL<%d>: ERROR: couldn't find listen session: " |
| "unknown vpp listener handle %llx", |
| getpid (), mp->listener_handle); |
| vcl_send_session_accepted_reply (evt_q, mp->context, mp->handle, |
| VNET_API_ERROR_INVALID_ARGUMENT); |
| vcl_session_free (wrk, session); |
| return VCL_INVALID_SESSION_INDEX; |
| } |
| |
| rx_fifo = uword_to_pointer (mp->server_rx_fifo, svm_fifo_t *); |
| tx_fifo = uword_to_pointer (mp->server_tx_fifo, svm_fifo_t *); |
| |
| if (mp->server_event_queue_address) |
| { |
| session->vpp_evt_q = uword_to_pointer (mp->client_event_queue_address, |
| svm_msg_q_t *); |
| session->our_evt_q = uword_to_pointer (mp->server_event_queue_address, |
| svm_msg_q_t *); |
| vcl_wait_for_memory (session->vpp_evt_q); |
| rx_fifo->master_session_index = session->session_index; |
| tx_fifo->master_session_index = session->session_index; |
| rx_fifo->master_thread_index = vcl_get_worker_index (); |
| tx_fifo->master_thread_index = vcl_get_worker_index (); |
| vec_validate (wrk->vpp_event_queues, 0); |
| evt_q = uword_to_pointer (mp->vpp_event_queue_address, svm_msg_q_t *); |
| wrk->vpp_event_queues[0] = evt_q; |
| } |
| else |
| { |
| session->vpp_evt_q = uword_to_pointer (mp->vpp_event_queue_address, |
| svm_msg_q_t *); |
| rx_fifo->client_session_index = session->session_index; |
| tx_fifo->client_session_index = session->session_index; |
| rx_fifo->client_thread_index = vcl_get_worker_index (); |
| tx_fifo->client_thread_index = vcl_get_worker_index (); |
| vpp_wrk_index = tx_fifo->master_thread_index; |
| vec_validate (wrk->vpp_event_queues, vpp_wrk_index); |
| wrk->vpp_event_queues[vpp_wrk_index] = session->vpp_evt_q; |
| } |
| |
| session->vpp_handle = mp->handle; |
| session->client_context = mp->context; |
| session->rx_fifo = rx_fifo; |
| session->tx_fifo = tx_fifo; |
| |
| session->session_state = STATE_ACCEPT; |
| session->transport.rmt_port = mp->port; |
| session->transport.is_ip4 = mp->is_ip4; |
| clib_memcpy (&session->transport.rmt_ip, mp->ip, sizeof (ip46_address_t)); |
| |
| vcl_session_table_add_vpp_handle (wrk, mp->handle, session->session_index); |
| session->transport.lcl_port = listen_session->transport.lcl_port; |
| session->transport.lcl_ip = listen_session->transport.lcl_ip; |
| session->session_type = listen_session->session_type; |
| session->is_dgram = session->session_type == VPPCOM_PROTO_UDP; |
| |
| VDBG (1, "VCL<%d>: vpp handle 0x%llx, sid %u: client accept request from %s" |
| " address %U port %d queue %p!", getpid (), mp->handle, |
| session->session_index, |
| mp->is_ip4 ? "IPv4" : "IPv6", format_ip46_address, &mp->ip, |
| mp->is_ip4 ? IP46_TYPE_IP4 : IP46_TYPE_IP6, |
| clib_net_to_host_u16 (mp->port), session->vpp_evt_q); |
| vcl_evt (VCL_EVT_ACCEPT, session, listen_session, session_index); |
| |
| return session->session_index; |
| } |
| |
| static u32 |
| vcl_session_connected_handler (vcl_worker_t * wrk, |
| session_connected_msg_t * mp) |
| { |
| u32 session_index, vpp_wrk_index; |
| svm_fifo_t *rx_fifo, *tx_fifo; |
| vcl_session_t *session = 0; |
| svm_msg_q_t *evt_q; |
| |
| session_index = mp->context; |
| session = vcl_session_get (wrk, session_index); |
| if (!session) |
| { |
| clib_warning ("[%s] ERROR: vpp handle 0x%llx, sid %u: " |
| "Invalid session index (%u)!", |
| getpid (), mp->handle, session_index); |
| return VCL_INVALID_SESSION_INDEX; |
| } |
| if (mp->retval) |
| { |
| clib_warning ("VCL<%d>: ERROR: sid %u: connect failed! %U", getpid (), |
| session_index, format_api_error, ntohl (mp->retval)); |
| session->session_state = STATE_FAILED; |
| session->vpp_handle = mp->handle; |
| return session_index; |
| } |
| |
| rx_fifo = uword_to_pointer (mp->server_rx_fifo, svm_fifo_t *); |
| tx_fifo = uword_to_pointer (mp->server_tx_fifo, svm_fifo_t *); |
| vcl_wait_for_memory (rx_fifo); |
| rx_fifo->client_session_index = session_index; |
| tx_fifo->client_session_index = session_index; |
| rx_fifo->client_thread_index = vcl_get_worker_index (); |
| tx_fifo->client_thread_index = vcl_get_worker_index (); |
| |
| if (mp->client_event_queue_address) |
| { |
| session->vpp_evt_q = uword_to_pointer (mp->server_event_queue_address, |
| svm_msg_q_t *); |
| session->our_evt_q = uword_to_pointer (mp->client_event_queue_address, |
| svm_msg_q_t *); |
| |
| vec_validate (wrk->vpp_event_queues, 0); |
| evt_q = uword_to_pointer (mp->vpp_event_queue_address, svm_msg_q_t *); |
| wrk->vpp_event_queues[0] = evt_q; |
| } |
| else |
| { |
| session->vpp_evt_q = uword_to_pointer (mp->vpp_event_queue_address, |
| svm_msg_q_t *); |
| vpp_wrk_index = tx_fifo->master_thread_index; |
| vec_validate (wrk->vpp_event_queues, vpp_wrk_index); |
| wrk->vpp_event_queues[vpp_wrk_index] = session->vpp_evt_q; |
| } |
| |
| session->rx_fifo = rx_fifo; |
| session->tx_fifo = tx_fifo; |
| session->vpp_handle = mp->handle; |
| session->transport.is_ip4 = mp->is_ip4; |
| clib_memcpy (&session->transport.lcl_ip, mp->lcl_ip, |
| sizeof (session->transport.lcl_ip)); |
| session->transport.lcl_port = mp->lcl_port; |
| session->session_state = STATE_CONNECT; |
| |
| /* Add it to lookup table */ |
| hash_set (wrk->session_index_by_vpp_handles, mp->handle, session_index); |
| |
| VDBG (1, "VCL<%d>: vpp handle 0x%llx, sid %u: connect succeeded! " |
| "session_rx_fifo %p, refcnt %d, session_tx_fifo %p, refcnt %d", |
| getpid (), mp->handle, session_index, session->rx_fifo, |
| session->rx_fifo->refcnt, session->tx_fifo, session->tx_fifo->refcnt); |
| |
| return session_index; |
| } |
| |
| static u32 |
| vcl_session_reset_handler (vcl_worker_t * wrk, |
| session_reset_msg_t * reset_msg) |
| { |
| vcl_session_t *session; |
| u32 sid; |
| |
| sid = vcl_session_index_from_vpp_handle (wrk, reset_msg->handle); |
| session = vcl_session_get (wrk, sid); |
| if (!session) |
| { |
| VDBG (0, "request to reset unknown handle 0x%llx", reset_msg->handle); |
| return VCL_INVALID_SESSION_INDEX; |
| } |
| session->session_state = STATE_CLOSE_ON_EMPTY; |
| VDBG (0, "reset handle 0x%llx, sid %u ", reset_msg->handle, sid); |
| vcl_send_session_reset_reply (vcl_session_vpp_evt_q (wrk, session), |
| vcm->my_client_index, reset_msg->handle, 0); |
| return sid; |
| } |
| |
| static u32 |
| vcl_session_bound_handler (vcl_worker_t * wrk, session_bound_msg_t * mp) |
| { |
| vcl_session_t *session; |
| u32 sid = mp->context; |
| |
| session = vcl_session_get (wrk, sid); |
| if (mp->retval) |
| { |
| VDBG (0, "VCL<%d>: ERROR: vpp handle 0x%llx, sid %u: bind failed: %U", |
| getpid (), mp->handle, sid, format_api_error, ntohl (mp->retval)); |
| if (session) |
| { |
| session->session_state = STATE_FAILED; |
| session->vpp_handle = mp->handle; |
| return sid; |
| } |
| else |
| { |
| clib_warning ("[%s] ERROR: vpp handle 0x%llx, sid %u: " |
| "Invalid session index (%u)!", |
| getpid (), mp->handle, sid); |
| return VCL_INVALID_SESSION_INDEX; |
| } |
| } |
| |
| session->vpp_handle = mp->handle; |
| session->transport.is_ip4 = mp->lcl_is_ip4; |
| clib_memcpy (&session->transport.lcl_ip, mp->lcl_ip, |
| sizeof (ip46_address_t)); |
| session->transport.lcl_port = mp->lcl_port; |
| vcl_session_table_add_listener (wrk, mp->handle, sid); |
| session->session_state = STATE_LISTEN; |
| |
| if (session->is_dgram) |
| { |
| svm_fifo_t *rx_fifo, *tx_fifo; |
| session->vpp_evt_q = uword_to_pointer (mp->vpp_evt_q, svm_msg_q_t *); |
| rx_fifo = uword_to_pointer (mp->rx_fifo, svm_fifo_t *); |
| rx_fifo->client_session_index = sid; |
| tx_fifo = uword_to_pointer (mp->tx_fifo, svm_fifo_t *); |
| tx_fifo->client_session_index = sid; |
| session->rx_fifo = rx_fifo; |
| session->tx_fifo = tx_fifo; |
| } |
| |
| VDBG (1, "VCL<%d>: vpp handle 0x%llx, sid %u: bind succeeded!", |
| getpid (), mp->handle, sid); |
| return sid; |
| } |
| |
| static int |
| vcl_handle_mq_event (vcl_worker_t * wrk, session_event_t * e) |
| { |
| session_accepted_msg_t *accepted_msg; |
| session_disconnected_msg_t *disconnected_msg; |
| vcl_session_msg_t *vcl_msg; |
| vcl_session_t *session; |
| u64 handle; |
| u32 sid; |
| |
| switch (e->event_type) |
| { |
| case FIFO_EVENT_APP_RX: |
| case FIFO_EVENT_APP_TX: |
| case SESSION_IO_EVT_CT_RX: |
| case SESSION_IO_EVT_CT_TX: |
| vec_add1 (wrk->unhandled_evts_vector, *e); |
| break; |
| case SESSION_CTRL_EVT_ACCEPTED: |
| accepted_msg = (session_accepted_msg_t *) e->data; |
| handle = accepted_msg->listener_handle; |
| session = vcl_session_table_lookup_listener (wrk, handle); |
| if (!session) |
| { |
| clib_warning ("VCL<%d>: ERROR: couldn't find listen session:" |
| "listener handle %llx", getpid (), handle); |
| break; |
| } |
| |
| clib_fifo_add2 (session->accept_evts_fifo, vcl_msg); |
| vcl_msg->accepted_msg = *accepted_msg; |
| break; |
| case SESSION_CTRL_EVT_CONNECTED: |
| vcl_session_connected_handler (wrk, |
| (session_connected_msg_t *) e->data); |
| break; |
| case SESSION_CTRL_EVT_DISCONNECTED: |
| disconnected_msg = (session_disconnected_msg_t *) e->data; |
| sid = vcl_session_index_from_vpp_handle (wrk, disconnected_msg->handle); |
| session = vcl_session_get (wrk, sid); |
| if (!session) |
| { |
| VDBG (0, "request to disconnect unknown handle 0x%llx", |
| disconnected_msg->handle); |
| break; |
| } |
| session->session_state = STATE_DISCONNECT; |
| VDBG (0, "disconnected handle 0x%llx, sid %u", disconnected_msg->handle, |
| sid); |
| break; |
| case SESSION_CTRL_EVT_RESET: |
| vcl_session_reset_handler (wrk, (session_reset_msg_t *) e->data); |
| break; |
| case SESSION_CTRL_EVT_BOUND: |
| vcl_session_bound_handler (wrk, (session_bound_msg_t *) e->data); |
| break; |
| default: |
| clib_warning ("unhandled %u", e->event_type); |
| } |
| return VPPCOM_OK; |
| } |
| |
| static inline int |
| vppcom_wait_for_session_state_change (u32 session_index, |
| session_state_t state, |
| f64 wait_for_time) |
| { |
| vcl_worker_t *wrk = vcl_worker_get_current (); |
| f64 timeout = clib_time_now (&wrk->clib_time) + wait_for_time; |
| vcl_session_t *volatile session; |
| svm_msg_q_msg_t msg; |
| session_event_t *e; |
| |
| do |
| { |
| session = vcl_session_get (wrk, session_index); |
| if (PREDICT_FALSE (!session)) |
| { |
| return VPPCOM_EBADFD; |
| } |
| if (session->session_state & state) |
| { |
| return VPPCOM_OK; |
| } |
| if (session->session_state & STATE_FAILED) |
| { |
| return VPPCOM_ECONNREFUSED; |
| } |
| |
| if (svm_msg_q_sub (wrk->app_event_queue, &msg, SVM_Q_NOWAIT, 0)) |
| continue; |
| e = svm_msg_q_msg_data (wrk->app_event_queue, &msg); |
| vcl_handle_mq_event (wrk, e); |
| svm_msg_q_free_msg (wrk->app_event_queue, &msg); |
| } |
| while (clib_time_now (&wrk->clib_time) < timeout); |
| |
| VDBG (0, "VCL<%d>: timeout waiting for state 0x%x (%s)", getpid (), state, |
| vppcom_session_state_str (state)); |
| vcl_evt (VCL_EVT_SESSION_TIMEOUT, session, session_state); |
| |
| return VPPCOM_ETIMEDOUT; |
| } |
| |
| static int |
| vppcom_app_session_enable (void) |
| { |
| int rv; |
| |
| if (vcm->app_state != STATE_APP_ENABLED) |
| { |
| vppcom_send_session_enable_disable (1 /* is_enabled == TRUE */ ); |
| rv = vcl_wait_for_app_state_change (STATE_APP_ENABLED); |
| if (PREDICT_FALSE (rv)) |
| { |
| VDBG (0, "VCL<%d>: application session enable timed out! " |
| "returning %d (%s)", getpid (), rv, vppcom_retval_str (rv)); |
| return rv; |
| } |
| } |
| return VPPCOM_OK; |
| } |
| |
| static int |
| vppcom_app_attach (void) |
| { |
| int rv; |
| |
| vppcom_app_send_attach (); |
| rv = vcl_wait_for_app_state_change (STATE_APP_ATTACHED); |
| if (PREDICT_FALSE (rv)) |
| { |
| VDBG (0, "VCL<%d>: application attach timed out! returning %d (%s)", |
| getpid (), rv, vppcom_retval_str (rv)); |
| return rv; |
| } |
| |
| return VPPCOM_OK; |
| } |
| |
| static int |
| vppcom_session_unbind (u32 session_handle) |
| { |
| vcl_worker_t *wrk = vcl_worker_get_current (); |
| vcl_session_t *session = 0; |
| u64 vpp_handle; |
| |
| session = vcl_session_get_w_handle (wrk, session_handle); |
| if (!session) |
| return VPPCOM_EBADFD; |
| |
| vpp_handle = session->vpp_handle; |
| vcl_session_table_del_listener (wrk, vpp_handle); |
| session->vpp_handle = ~0; |
| session->session_state = STATE_DISCONNECT; |
| |
| VDBG (1, "VCL<%d>: vpp handle 0x%llx, sid %u: sending unbind msg! new state" |
| " 0x%x (%s)", getpid (), vpp_handle, session_handle, STATE_DISCONNECT, |
| vppcom_session_state_str (STATE_DISCONNECT)); |
| vcl_evt (VCL_EVT_UNBIND, session); |
| vppcom_send_unbind_sock (vpp_handle); |
| |
| return VPPCOM_OK; |
| } |
| |
| static int |
| vppcom_session_disconnect (u32 session_handle) |
| { |
| vcl_worker_t *wrk = vcl_worker_get_current (); |
| svm_msg_q_t *vpp_evt_q; |
| vcl_session_t *session; |
| session_state_t state; |
| u64 vpp_handle; |
| |
| session = vcl_session_get_w_handle (wrk, session_handle); |
| if (!session) |
| return VPPCOM_EBADFD; |
| |
| vpp_handle = session->vpp_handle; |
| state = session->session_state; |
| |
| VDBG (1, "VCL<%d>: vpp handle 0x%llx, sid %u state 0x%x (%s)", getpid (), |
| vpp_handle, session_handle, state, vppcom_session_state_str (state)); |
| |
| if (PREDICT_FALSE (state & STATE_LISTEN)) |
| { |
| clib_warning ("VCL<%d>: ERROR: vpp handle 0x%llx, sid %u: " |
| "Cannot disconnect a listen socket!", |
| getpid (), vpp_handle, session_handle); |
| return VPPCOM_EBADFD; |
| } |
| |
| if (state & STATE_CLOSE_ON_EMPTY) |
| { |
| vpp_evt_q = vcl_session_vpp_evt_q (wrk, session); |
| vcl_send_session_disconnected_reply (vpp_evt_q, vcm->my_client_index, |
| vpp_handle, 0); |
| VDBG (1, "VCL<%d>: vpp handle 0x%llx, sid %u: sending disconnect " |
| "REPLY...", getpid (), vpp_handle, session_handle); |
| } |
| else |
| { |
| VDBG (1, "VCL<%d>: vpp handle 0x%llx, sid %u: sending disconnect...", |
| getpid (), vpp_handle, session_handle); |
| vppcom_send_disconnect_session (vpp_handle); |
| } |
| |
| return VPPCOM_OK; |
| } |
| |
| /* |
| * VPPCOM Public API functions |
| */ |
| int |
| vppcom_app_create (char *app_name) |
| { |
| vppcom_cfg_t *vcl_cfg = &vcm->cfg; |
| int rv; |
| |
| if (!vcm->is_init) |
| { |
| vcm->is_init = 1; |
| vppcom_cfg (&vcm->cfg); |
| vcl_cfg = &vcm->cfg; |
| |
| vcm->main_cpu = pthread_self (); |
| vppcom_init_error_string_table (); |
| svm_fifo_segment_main_init (vcl_cfg->segment_baseva, |
| 20 /* timeout in secs */ ); |
| pool_init_fixed (vcm->workers, vcl_cfg->max_workers); |
| clib_spinlock_init (&vcm->workers_lock); |
| vcl_worker_alloc_and_init (); |
| } |
| |
| if (vcm->my_client_index == ~0) |
| { |
| /* API hookup and connect to VPP */ |
| vppcom_api_hookup (); |
| vcl_elog_init (vcm); |
| vcm->app_state = STATE_APP_START; |
| rv = vppcom_connect_to_vpp (app_name); |
| if (rv) |
| { |
| clib_warning ("VCL<%d>: ERROR: couldn't connect to VPP!", |
| getpid ()); |
| return rv; |
| } |
| |
| VDBG (0, "VCL<%d>: sending session enable", getpid ()); |
| rv = vppcom_app_session_enable (); |
| if (rv) |
| { |
| clib_warning ("VCL<%d>: ERROR: vppcom_app_session_enable() " |
| "failed!", getpid ()); |
| return rv; |
| } |
| |
| VDBG (0, "VCL<%d>: sending app attach", getpid ()); |
| rv = vppcom_app_attach (); |
| if (rv) |
| { |
| clib_warning ("VCL<%d>: ERROR: vppcom_app_attach() failed!", |
| getpid ()); |
| return rv; |
| } |
| |
| VDBG (0, "VCL<%d>: app_name '%s', my_client_index %d (0x%x)", |
| getpid (), app_name, vcm->my_client_index, vcm->my_client_index); |
| } |
| |
| return VPPCOM_OK; |
| } |
| |
| void |
| vppcom_app_destroy (void) |
| { |
| int rv; |
| f64 orig_app_timeout; |
| |
| if (vcm->my_client_index == ~0) |
| return; |
| |
| VDBG (0, "VCL<%d>: detaching from VPP, my_client_index %d (0x%x)", |
| getpid (), vcm->my_client_index, vcm->my_client_index); |
| vcl_evt (VCL_EVT_DETACH, vcm); |
| |
| vppcom_app_send_detach (); |
| orig_app_timeout = vcm->cfg.app_timeout; |
| vcm->cfg.app_timeout = 2.0; |
| rv = vcl_wait_for_app_state_change (STATE_APP_ENABLED); |
| vcm->cfg.app_timeout = orig_app_timeout; |
| if (PREDICT_FALSE (rv)) |
| VDBG (0, "VCL<%d>: application detach timed out! returning %d (%s)", |
| getpid (), rv, vppcom_retval_str (rv)); |
| |
| vcl_elog_stop (vcm); |
| vl_client_disconnect_from_vlib (); |
| vcm->my_client_index = ~0; |
| vcm->app_state = STATE_APP_START; |
| } |
| |
| int |
| vppcom_session_create (u8 proto, u8 is_nonblocking) |
| { |
| vcl_worker_t *wrk = vcl_worker_get_current (); |
| vcl_session_t *session; |
| |
| session = vcl_session_alloc (wrk); |
| |
| session->session_type = proto; |
| session->session_state = STATE_START; |
| session->vpp_handle = ~0; |
| session->is_dgram = proto == VPPCOM_PROTO_UDP; |
| |
| if (is_nonblocking) |
| VCL_SESS_ATTR_SET (session->attr, VCL_SESS_ATTR_NONBLOCK); |
| |
| vcl_evt (VCL_EVT_CREATE, session, session_type, session->session_state, |
| is_nonblocking, session_index); |
| |
| VDBG (0, "VCL<%d>: sid %u", getpid (), session->session_index); |
| |
| return vcl_session_handle (session); |
| } |
| |
| int |
| vppcom_session_close (uint32_t session_handle) |
| { |
| vcl_worker_t *wrk = vcl_worker_get_current (); |
| vcl_session_t *session = 0; |
| u8 is_vep, is_vep_session; |
| session_state_t state; |
| u32 next_sh, vep_sh; |
| int rv = VPPCOM_OK; |
| u64 vpp_handle; |
| |
| session = vcl_session_get_w_handle (wrk, session_handle); |
| if (!session) |
| return VPPCOM_EBADFD; |
| |
| is_vep = session->is_vep; |
| is_vep_session = session->is_vep_session; |
| next_sh = session->vep.next_sh; |
| vep_sh = session->vep.vep_sh; |
| state = session->session_state; |
| vpp_handle = session->vpp_handle; |
| |
| if (VPPCOM_DEBUG > 0) |
| { |
| if (is_vep) |
| clib_warning ("VCL<%d>: vep_idx %u / sid %u: " |
| "closing epoll session...", |
| getpid (), session_handle, session_handle); |
| else |
| clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %d: " |
| "closing session...", |
| getpid (), vpp_handle, session_handle); |
| } |
| |
| if (is_vep) |
| { |
| while (next_sh != ~0) |
| { |
| rv = vppcom_epoll_ctl (session_handle, EPOLL_CTL_DEL, next_sh, 0); |
| if (PREDICT_FALSE (rv < 0)) |
| VDBG (0, "VCL<%d>: vpp handle 0x%llx, sid %u: EPOLL_CTL_DEL " |
| "vep_idx %u failed! rv %d (%s)", |
| getpid (), vpp_handle, next_sh, vep_sh, |
| rv, vppcom_retval_str (rv)); |
| |
| next_sh = session->vep.next_sh; |
| } |
| } |
| else |
| { |
| if (is_vep_session) |
| { |
| rv = vppcom_epoll_ctl (vep_sh, EPOLL_CTL_DEL, session_handle, 0); |
| if (rv < 0) |
| VDBG (0, "VCL<%d>: vpp handle 0x%llx, sid %u: EPOLL_CTL_DEL " |
| "vep_idx %u failed! rv %d (%s)", |
| getpid (), vpp_handle, session_handle, |
| vep_sh, rv, vppcom_retval_str (rv)); |
| } |
| |
| if (state & STATE_LISTEN) |
| { |
| rv = vppcom_session_unbind (session_handle); |
| if (PREDICT_FALSE (rv < 0)) |
| VDBG (0, "VCL<%d>: vpp handle 0x%llx, sid %u: listener unbind " |
| "failed! rv %d (%s)", |
| getpid (), vpp_handle, session_handle, |
| rv, vppcom_retval_str (rv)); |
| } |
| else if (state & STATE_OPEN) |
| { |
| rv = vppcom_session_disconnect (session_handle); |
| if (PREDICT_FALSE (rv < 0)) |
| clib_warning ("VCL<%d>: ERROR: vpp handle 0x%llx, sid %u: " |
| "session disconnect failed! rv %d (%s)", |
| getpid (), vpp_handle, session_handle, |
| rv, vppcom_retval_str (rv)); |
| } |
| } |
| |
| if (vcl_session_is_ct (session)) |
| { |
| vcl_cut_through_registration_t *ctr; |
| uword mq_addr; |
| |
| mq_addr = pointer_to_uword (session->our_evt_q); |
| ctr = vcl_ct_registration_lock_and_lookup (wrk, mq_addr); |
| ASSERT (ctr); |
| if (ctr->epoll_evt_conn_index != ~0) |
| vcl_mq_epoll_del_evfd (wrk, ctr->epoll_evt_conn_index); |
| VDBG (0, "Removing ct registration %u", |
| vcl_ct_registration_index (wrk, ctr)); |
| vcl_ct_registration_del (wrk, ctr); |
| vcl_ct_registration_lookup_del (wrk, mq_addr); |
| vcl_ct_registration_unlock (wrk); |
| } |
| |
| if (vpp_handle != ~0) |
| { |
| vcl_session_table_del_vpp_handle (wrk, vpp_handle); |
| } |
| vcl_session_free (wrk, session); |
| |
| if (VPPCOM_DEBUG > 0) |
| { |
| if (is_vep) |
| clib_warning ("VCL<%d>: vep_idx %u / sid %u: epoll session removed.", |
| getpid (), session_handle, session_handle); |
| else |
| clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: session removed.", |
| getpid (), vpp_handle, session_handle); |
| } |
| |
| vcl_evt (VCL_EVT_CLOSE, session, rv); |
| |
| return rv; |
| } |
| |
| int |
| vppcom_session_bind (uint32_t session_handle, vppcom_endpt_t * ep) |
| { |
| vcl_worker_t *wrk = vcl_worker_get_current (); |
| vcl_session_t *session = 0; |
| |
| if (!ep || !ep->ip) |
| return VPPCOM_EINVAL; |
| |
| session = vcl_session_get_w_handle (wrk, session_handle); |
| if (!session) |
| return VPPCOM_EBADFD; |
| |
| if (session->is_vep) |
| { |
| clib_warning ("VCL<%d>: ERROR: sid %u: cannot " |
| "bind to an epoll session!", getpid (), session_handle); |
| return VPPCOM_EBADFD; |
| } |
| |
| session->transport.is_ip4 = ep->is_ip4; |
| if (ep->is_ip4) |
| clib_memcpy (&session->transport.lcl_ip.ip4, ep->ip, |
| sizeof (ip4_address_t)); |
| else |
| clib_memcpy (&session->transport.lcl_ip.ip6, ep->ip, |
| sizeof (ip6_address_t)); |
| session->transport.lcl_port = ep->port; |
| |
| VDBG (0, "VCL<%d>: sid %u: binding to local %s address %U port %u, " |
| "proto %s", getpid (), session_handle, |
| session->transport.is_ip4 ? "IPv4" : "IPv6", |
| format_ip46_address, &session->transport.lcl_ip, |
| session->transport.is_ip4 ? IP46_TYPE_IP4 : IP46_TYPE_IP6, |
| clib_net_to_host_u16 (session->transport.lcl_port), |
| session->session_type ? "UDP" : "TCP"); |
| vcl_evt (VCL_EVT_BIND, session); |
| |
| if (session->session_type == VPPCOM_PROTO_UDP) |
| vppcom_session_listen (session_handle, 10); |
| |
| return VPPCOM_OK; |
| } |
| |
| int |
| vppcom_session_listen (uint32_t listen_sh, uint32_t q_len) |
| { |
| vcl_worker_t *wrk = vcl_worker_get_current (); |
| vcl_session_t *listen_session = 0; |
| u64 listen_vpp_handle; |
| int rv; |
| |
| listen_session = vcl_session_get_w_handle (wrk, listen_sh); |
| if (!listen_session) |
| return VPPCOM_EBADFD; |
| |
| if (q_len == 0 || q_len == ~0) |
| q_len = vcm->cfg.listen_queue_size; |
| |
| if (listen_session->is_vep) |
| { |
| clib_warning ("VCL<%d>: ERROR: sid %u: cannot listen on an " |
| "epoll session!", getpid (), listen_sh); |
| return VPPCOM_EBADFD; |
| } |
| |
| listen_vpp_handle = listen_session->vpp_handle; |
| if (listen_session->session_state & STATE_LISTEN) |
| { |
| VDBG (0, "VCL<%d>: vpp handle 0x%llx, sid %u: already in listen state!", |
| getpid (), listen_vpp_handle, listen_sh); |
| return VPPCOM_OK; |
| } |
| |
| VDBG (0, "VCL<%d>: vpp handle 0x%llx, sid %u: sending VPP bind+listen " |
| "request...", getpid (), listen_vpp_handle, listen_sh); |
| |
| /* |
| * Send listen request to vpp and wait for reply |
| */ |
| vppcom_send_bind_sock (listen_session); |
| rv = vppcom_wait_for_session_state_change (listen_session->session_index, |
| STATE_LISTEN, |
| vcm->cfg.session_timeout); |
| |
| if (PREDICT_FALSE (rv)) |
| { |
| listen_session = vcl_session_get_w_handle (wrk, listen_sh); |
| VDBG (0, "VCL<%d>: vpp handle 0x%llx, sid %u: bind+listen failed! " |
| "returning %d (%s)", getpid (), listen_session->vpp_handle, |
| listen_sh, rv, vppcom_retval_str (rv)); |
| return rv; |
| } |
| |
| return VPPCOM_OK; |
| } |
| |
| static int |
| validate_args_session_accept_ (vcl_worker_t * wrk, |
| vcl_session_t * listen_session) |
| { |
| /* Input validation - expects spinlock on sessions_lockp */ |
| if (listen_session->is_vep) |
| { |
| clib_warning ("VCL<%d>: ERROR: sid %u: cannot accept on an " |
| "epoll session!", getpid (), |
| listen_session->session_index); |
| return VPPCOM_EBADFD; |
| } |
| |
| if (listen_session->session_state != STATE_LISTEN) |
| { |
| clib_warning ("VCL<%d>: ERROR: vpp handle 0x%llx, sid %u: " |
| "not in listen state! state 0x%x (%s)", getpid (), |
| listen_session->vpp_handle, listen_session->session_index, |
| listen_session->session_state, |
| vppcom_session_state_str (listen_session->session_state)); |
| return VPPCOM_EBADFD; |
| } |
| return VPPCOM_OK; |
| } |
| |
| int |
| vppcom_session_accept (uint32_t listen_session_handle, vppcom_endpt_t * ep, |
| uint32_t flags) |
| { |
| u32 client_session_index = ~0, listen_session_index; |
| vcl_worker_t *wrk = vcl_worker_get_current (); |
| session_accepted_msg_t accepted_msg; |
| vcl_session_t *listen_session = 0; |
| vcl_session_t *client_session = 0; |
| svm_msg_q_t *vpp_evt_q; |
| vcl_session_msg_t *evt; |
| u64 listen_vpp_handle; |
| svm_msg_q_msg_t msg; |
| session_event_t *e; |
| u8 is_nonblocking; |
| int rv; |
| |
| listen_session = vcl_session_get_w_handle (wrk, listen_session_handle); |
| if (!listen_session) |
| return VPPCOM_EBADFD; |
| |
| listen_session_index = listen_session->session_index; |
| if ((rv = validate_args_session_accept_ (wrk, listen_session))) |
| return rv; |
| |
| if (clib_fifo_elts (listen_session->accept_evts_fifo)) |
| { |
| clib_fifo_sub2 (listen_session->accept_evts_fifo, evt); |
| accepted_msg = evt->accepted_msg; |
| goto handle; |
| } |
| |
| is_nonblocking = VCL_SESS_ATTR_TEST (listen_session->attr, |
| VCL_SESS_ATTR_NONBLOCK); |
| if (svm_msg_q_is_empty (wrk->app_event_queue) && is_nonblocking) |
| return VPPCOM_EAGAIN; |
| |
| while (1) |
| { |
| if (svm_msg_q_sub (wrk->app_event_queue, &msg, SVM_Q_WAIT, 0)) |
| return VPPCOM_EAGAIN; |
| |
| e = svm_msg_q_msg_data (wrk->app_event_queue, &msg); |
| if (e->event_type != SESSION_CTRL_EVT_ACCEPTED) |
| { |
| clib_warning ("discarded event: %u", e->event_type); |
| svm_msg_q_free_msg (wrk->app_event_queue, &msg); |
| continue; |
| } |
| clib_memcpy (&accepted_msg, e->data, sizeof (accepted_msg)); |
| svm_msg_q_free_msg (wrk->app_event_queue, &msg); |
| break; |
| } |
| |
| handle: |
| |
| client_session_index = vcl_session_accepted_handler (wrk, &accepted_msg); |
| listen_session = vcl_session_get (wrk, listen_session_index); |
| client_session = vcl_session_get (wrk, client_session_index); |
| |
| if (flags & O_NONBLOCK) |
| VCL_SESS_ATTR_SET (client_session->attr, VCL_SESS_ATTR_NONBLOCK); |
| |
| listen_vpp_handle = listen_session->vpp_handle; |
| VDBG (0, "VCL<%d>: vpp handle 0x%llx, sid %u: Got a client request! " |
| "vpp handle 0x%llx, sid %u, flags %d, is_nonblocking %u", |
| getpid (), listen_vpp_handle, listen_session_handle, |
| client_session->vpp_handle, client_session_index, |
| flags, VCL_SESS_ATTR_TEST (client_session->attr, |
| VCL_SESS_ATTR_NONBLOCK)); |
| |
| if (ep) |
| { |
| ep->is_ip4 = client_session->transport.is_ip4; |
| ep->port = client_session->transport.rmt_port; |
| if (client_session->transport.is_ip4) |
| clib_memcpy (ep->ip, &client_session->transport.rmt_ip.ip4, |
| sizeof (ip4_address_t)); |
| else |
| clib_memcpy (ep->ip, &client_session->transport.rmt_ip.ip6, |
| sizeof (ip6_address_t)); |
| } |
| |
| if (accepted_msg.server_event_queue_address) |
| vpp_evt_q = uword_to_pointer (accepted_msg.vpp_event_queue_address, |
| svm_msg_q_t *); |
| else |
| vpp_evt_q = client_session->vpp_evt_q; |
| |
| vcl_send_session_accepted_reply (vpp_evt_q, client_session->client_context, |
| client_session->vpp_handle, 0); |
| |
| VDBG (0, "VCL<%d>: vpp handle 0x%llx, sid %u: accepted vpp handle 0x%llx, " |
| "sid %u connection from peer %s address %U port %u to local %s " |
| "address %U port %u", getpid (), listen_vpp_handle, |
| listen_session_handle, client_session->vpp_handle, |
| client_session_index, |
| client_session->transport.is_ip4 ? "IPv4" : "IPv6", |
| format_ip46_address, &client_session->transport.rmt_ip, |
| client_session->transport.is_ip4 ? IP46_TYPE_IP4 : IP46_TYPE_IP6, |
| clib_net_to_host_u16 (client_session->transport.rmt_port), |
| client_session->transport.is_ip4 ? "IPv4" : "IPv6", |
| format_ip46_address, &client_session->transport.lcl_ip, |
| client_session->transport.is_ip4 ? IP46_TYPE_IP4 : IP46_TYPE_IP6, |
| clib_net_to_host_u16 (client_session->transport.lcl_port)); |
| vcl_evt (VCL_EVT_ACCEPT, client_session, listen_session, |
| client_session_index); |
| |
| return vcl_session_handle (client_session); |
| } |
| |
| int |
| vppcom_session_connect (uint32_t session_handle, vppcom_endpt_t * server_ep) |
| { |
| vcl_worker_t *wrk = vcl_worker_get_current (); |
| vcl_session_t *session = 0; |
| u32 session_index; |
| int rv; |
| |
| session = vcl_session_get_w_handle (wrk, session_handle); |
| if (!session) |
| return VPPCOM_EBADFD; |
| session_index = session->session_index; |
| |
| if (PREDICT_FALSE (session->is_vep)) |
| { |
| clib_warning ("VCL<%d>: ERROR: sid %u: cannot " |
| "connect on an epoll session!", getpid (), |
| session_handle); |
| return VPPCOM_EBADFD; |
| } |
| |
| if (PREDICT_FALSE (session->session_state & CLIENT_STATE_OPEN)) |
| { |
| VDBG (0, "VCL<%d>: vpp handle 0x%llx, sid %u: session already " |
| "connected to %s %U port %d proto %s, state 0x%x (%s)", |
| getpid (), session->vpp_handle, session_handle, |
| session->transport.is_ip4 ? "IPv4" : "IPv6", |
| format_ip46_address, |
| &session->transport.rmt_ip, session->transport.is_ip4 ? |
| IP46_TYPE_IP4 : IP46_TYPE_IP6, |
| clib_net_to_host_u16 (session->transport.rmt_port), |
| session->session_type ? "UDP" : "TCP", session->session_state, |
| vppcom_session_state_str (session->session_state)); |
| return VPPCOM_OK; |
| } |
| |
| session->transport.is_ip4 = server_ep->is_ip4; |
| if (session->transport.is_ip4) |
| clib_memcpy (&session->transport.rmt_ip.ip4, server_ep->ip, |
| sizeof (ip4_address_t)); |
| else |
| clib_memcpy (&session->transport.rmt_ip.ip6, server_ep->ip, |
| sizeof (ip6_address_t)); |
| session->transport.rmt_port = server_ep->port; |
| |
| VDBG (0, "VCL<%d>: vpp handle 0x%llx, sid %u: connecting to server %s %U " |
| "port %d proto %s", |
| getpid (), session->vpp_handle, session_handle, |
| session->transport.is_ip4 ? "IPv4" : "IPv6", |
| format_ip46_address, |
| &session->transport.rmt_ip, session->transport.is_ip4 ? |
| IP46_TYPE_IP4 : IP46_TYPE_IP6, |
| clib_net_to_host_u16 (session->transport.rmt_port), |
| session->session_type ? "UDP" : "TCP"); |
| |
| /* |
| * Send connect request and wait for reply from vpp |
| */ |
| vppcom_send_connect_sock (session); |
| rv = vppcom_wait_for_session_state_change (session_index, STATE_CONNECT, |
| vcm->cfg.session_timeout); |
| |
| session = vcl_session_get (wrk, session_index); |
| |
| if (PREDICT_FALSE (rv)) |
| { |
| if (VPPCOM_DEBUG > 0) |
| { |
| if (session) |
| clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: connect " |
| "failed! returning %d (%s)", getpid (), |
| session->vpp_handle, session_handle, rv, |
| vppcom_retval_str (rv)); |
| else |
| clib_warning ("VCL<%d>: no session for sid %u: connect failed! " |
| "returning %d (%s)", getpid (), |
| session_handle, rv, vppcom_retval_str (rv)); |
| } |
| } |
| else |
| VDBG (0, "VCL<%d>: vpp handle 0x%llx, sid %u: connected!", |
| getpid (), session->vpp_handle, session_handle); |
| |
| return rv; |
| } |
| |
| static u8 |
| vcl_is_rx_evt_for_session (session_event_t * e, u32 sid, u8 is_ct) |
| { |
| if (!is_ct) |
| return (e->event_type == FIFO_EVENT_APP_RX |
| && e->fifo->client_session_index == sid); |
| else |
| return (e->event_type == SESSION_IO_EVT_CT_TX); |
| } |
| |
| static inline u8 |
| vcl_session_is_readable (vcl_session_t * s) |
| { |
| return ((s->session_state & STATE_OPEN) |
| || (s->session_state == STATE_LISTEN |
| && s->session_type == VPPCOM_PROTO_UDP)); |
| } |
| |
| static inline int |
| vppcom_session_read_internal (uint32_t session_handle, void *buf, int n, |
| u8 peek) |
| { |
| vcl_worker_t *wrk = vcl_worker_get_current (); |
| int n_read = 0, rv, is_nonblocking; |
| vcl_session_t *s = 0; |
| svm_fifo_t *rx_fifo; |
| svm_msg_q_msg_t msg; |
| session_event_t *e; |
| svm_msg_q_t *mq; |
| u8 is_ct; |
| |
| if (PREDICT_FALSE (!buf)) |
| return VPPCOM_EINVAL; |
| |
| s = vcl_session_get_w_handle (wrk, session_handle); |
| if (PREDICT_FALSE (!s || s->is_vep)) |
| return VPPCOM_EBADFD; |
| |
| if (PREDICT_FALSE (!vcl_session_is_readable (s))) |
| { |
| session_state_t state = s->session_state; |
| rv = ((state & STATE_DISCONNECT) ? VPPCOM_ECONNRESET : VPPCOM_ENOTCONN); |
| |
| VDBG (0, "VCL<%d>: vpp handle 0x%llx, sid %u: %s session is not open! " |
| "state 0x%x (%s), returning %d (%s)", |
| getpid (), s->vpp_handle, session_handle, state, |
| vppcom_session_state_str (state), rv, vppcom_retval_str (rv)); |
| return rv; |
| } |
| |
| is_nonblocking = VCL_SESS_ATTR_TEST (s->attr, VCL_SESS_ATTR_NONBLOCK); |
| is_ct = vcl_session_is_ct (s); |
| mq = is_ct ? s->our_evt_q : wrk->app_event_queue; |
| rx_fifo = s->rx_fifo; |
| s->has_rx_evt = 0; |
| |
| if (svm_fifo_is_empty (rx_fifo)) |
| { |
| if (is_nonblocking) |
| { |
| svm_fifo_unset_event (rx_fifo); |
| return VPPCOM_EWOULDBLOCK; |
| } |
| while (svm_fifo_is_empty (rx_fifo)) |
| { |
| svm_fifo_unset_event (rx_fifo); |
| svm_msg_q_lock (mq); |
| if (svm_msg_q_is_empty (mq)) |
| svm_msg_q_wait (mq); |
| |
| svm_msg_q_sub_w_lock (mq, &msg); |
| e = svm_msg_q_msg_data (mq, &msg); |
| svm_msg_q_unlock (mq); |
| if (!vcl_is_rx_evt_for_session (e, s->session_index, is_ct)) |
| { |
| vcl_handle_mq_event (wrk, e); |
| svm_msg_q_free_msg (mq, &msg); |
| continue; |
| } |
| svm_msg_q_free_msg (mq, &msg); |
| |
| if (PREDICT_FALSE (s->session_state == STATE_CLOSE_ON_EMPTY)) |
| return 0; |
| } |
| } |
| |
| if (s->is_dgram) |
| n_read = app_recv_dgram_raw (rx_fifo, buf, n, &s->transport, 0, peek); |
| else |
| n_read = app_recv_stream_raw (rx_fifo, buf, n, 0, peek); |
| |
| if (svm_fifo_is_empty (rx_fifo)) |
| svm_fifo_unset_event (rx_fifo); |
| |
| if (is_ct && svm_fifo_want_tx_evt (rx_fifo)) |
| { |
| svm_fifo_set_want_tx_evt (s->rx_fifo, 0); |
| app_send_io_evt_to_vpp (s->vpp_evt_q, s->rx_fifo, SESSION_IO_EVT_CT_RX, |
| SVM_Q_WAIT); |
| } |
| |
| VDBG (2, "VCL<%d>: vpp handle 0x%llx, sid %u: read %d bytes from (%p)", |
| getpid (), s->vpp_handle, session_handle, n_read, rx_fifo); |
| |
| return n_read; |
| } |
| |
| int |
| vppcom_session_read (uint32_t session_handle, void *buf, size_t n) |
| { |
| return (vppcom_session_read_internal (session_handle, buf, n, 0)); |
| } |
| |
| static int |
| vppcom_session_peek (uint32_t session_handle, void *buf, int n) |
| { |
| return (vppcom_session_read_internal (session_handle, buf, n, 1)); |
| } |
| |
| int |
| vppcom_session_read_segments (uint32_t session_handle, |
| vppcom_data_segments_t ds) |
| { |
| vcl_worker_t *wrk = vcl_worker_get_current (); |
| int n_read = 0, rv, is_nonblocking; |
| vcl_session_t *s = 0; |
| svm_fifo_t *rx_fifo; |
| svm_msg_q_msg_t msg; |
| session_event_t *e; |
| svm_msg_q_t *mq; |
| u8 is_ct; |
| |
| s = vcl_session_get_w_handle (wrk, session_handle); |
| if (PREDICT_FALSE (!s || s->is_vep)) |
| return VPPCOM_EBADFD; |
| |
| if (PREDICT_FALSE (!vcl_session_is_readable (s))) |
| { |
| session_state_t state = s->session_state; |
| rv = ((state & STATE_DISCONNECT) ? VPPCOM_ECONNRESET : VPPCOM_ENOTCONN); |
| return rv; |
| } |
| |
| is_nonblocking = VCL_SESS_ATTR_TEST (s->attr, VCL_SESS_ATTR_NONBLOCK); |
| is_ct = vcl_session_is_ct (s); |
| mq = is_ct ? s->our_evt_q : wrk->app_event_queue; |
| rx_fifo = s->rx_fifo; |
| s->has_rx_evt = 0; |
| |
| if (svm_fifo_is_empty (rx_fifo)) |
| { |
| if (is_nonblocking) |
| { |
| svm_fifo_unset_event (rx_fifo); |
| return VPPCOM_EWOULDBLOCK; |
| } |
| while (svm_fifo_is_empty (rx_fifo)) |
| { |
| svm_fifo_unset_event (rx_fifo); |
| svm_msg_q_lock (mq); |
| if (svm_msg_q_is_empty (mq)) |
| svm_msg_q_wait (mq); |
| |
| svm_msg_q_sub_w_lock (mq, &msg); |
| e = svm_msg_q_msg_data (mq, &msg); |
| svm_msg_q_unlock (mq); |
| if (!vcl_is_rx_evt_for_session (e, s->session_index, is_ct)) |
| { |
| vcl_handle_mq_event (wrk, e); |
| svm_msg_q_free_msg (mq, &msg); |
| continue; |
| } |
| svm_msg_q_free_msg (mq, &msg); |
| |
| if (PREDICT_FALSE (s->session_state == STATE_CLOSE_ON_EMPTY)) |
| return 0; |
| } |
| } |
| |
| n_read = svm_fifo_segments (rx_fifo, (svm_fifo_segment_t *) ds); |
| svm_fifo_unset_event (rx_fifo); |
| |
| if (is_ct && n_read + svm_fifo_max_dequeue (rx_fifo) == rx_fifo->nitems) |
| { |
| /* If the peer is not polling send notification */ |
| if (!svm_fifo_has_event (s->rx_fifo)) |
| app_send_io_evt_to_vpp (s->vpp_evt_q, s->rx_fifo, |
| SESSION_IO_EVT_CT_RX, SVM_Q_WAIT); |
| } |
| |
| return n_read; |
| } |
| |
| void |
| vppcom_session_free_segments (uint32_t session_handle, |
| vppcom_data_segments_t ds) |
| { |
| vcl_worker_t *wrk = vcl_worker_get_current (); |
| vcl_session_t *s; |
| |
| s = vcl_session_get_w_handle (wrk, session_handle); |
| if (PREDICT_FALSE (!s || s->is_vep)) |
| return; |
| |
| svm_fifo_segments_free (s->rx_fifo, (svm_fifo_segment_t *) ds); |
| } |
| |
| static inline int |
| vppcom_session_read_ready (vcl_session_t * session) |
| { |
| /* Assumes caller has acquired spinlock: vcm->sessions_lockp */ |
| if (PREDICT_FALSE (session->is_vep)) |
| { |
| clib_warning ("VCL<%d>: ERROR: sid %u: cannot read from an " |
| "epoll session!", getpid (), session->session_index); |
| return VPPCOM_EBADFD; |
| } |
| |
| if (PREDICT_FALSE (!(session->session_state & (STATE_OPEN | STATE_LISTEN)))) |
| { |
| session_state_t state = session->session_state; |
| int rv; |
| |
| rv = ((state & STATE_DISCONNECT) ? VPPCOM_ECONNRESET : VPPCOM_ENOTCONN); |
| |
| VDBG (1, "VCL<%d>: vpp handle 0x%llx, sid %u: session is not open!" |
| " state 0x%x (%s), returning %d (%s)", getpid (), |
| session->vpp_handle, session->session_index, state, |
| vppcom_session_state_str (state), rv, vppcom_retval_str (rv)); |
| return rv; |
| } |
| |
| if (session->session_state & STATE_LISTEN) |
| return clib_fifo_elts (session->accept_evts_fifo); |
| |
| return svm_fifo_max_dequeue (session->rx_fifo); |
| } |
| |
| int |
| vppcom_data_segment_copy (void *buf, vppcom_data_segments_t ds, u32 max_bytes) |
| { |
| u32 first_copy = clib_min (ds[0].len, max_bytes); |
| clib_memcpy (buf, ds[0].data, first_copy); |
| if (first_copy < max_bytes) |
| { |
| clib_memcpy (buf + first_copy, ds[1].data, |
| clib_min (ds[1].len, max_bytes - first_copy)); |
| } |
| return 0; |
| } |
| |
| static u8 |
| vcl_is_tx_evt_for_session (session_event_t * e, u32 sid, u8 is_ct) |
| { |
| if (!is_ct) |
| return (e->event_type == FIFO_EVENT_APP_TX |
| && e->fifo->client_session_index == sid); |
| else |
| return (e->event_type == SESSION_IO_EVT_CT_RX); |
| } |
| |
| int |
| vppcom_session_write (uint32_t session_handle, void *buf, size_t n) |
| { |
| vcl_worker_t *wrk = vcl_worker_get_current (); |
| int rv, n_write, is_nonblocking; |
| vcl_session_t *s = 0; |
| svm_fifo_t *tx_fifo = 0; |
| session_evt_type_t et; |
| svm_msg_q_msg_t msg; |
| session_event_t *e; |
| svm_msg_q_t *mq; |
| u8 is_ct; |
| |
| if (PREDICT_FALSE (!buf)) |
| return VPPCOM_EINVAL; |
| |
| s = vcl_session_get_w_handle (wrk, session_handle); |
| if (PREDICT_FALSE (!s)) |
| return VPPCOM_EBADFD; |
| |
| if (PREDICT_FALSE (s->is_vep)) |
| { |
| clib_warning ("VCL<%d>: ERROR: vpp handle 0x%llx, sid %u: " |
| "cannot write to an epoll session!", |
| getpid (), s->vpp_handle, session_handle); |
| |
| return VPPCOM_EBADFD; |
| } |
| |
| if (PREDICT_FALSE (!(s->session_state & STATE_OPEN))) |
| { |
| session_state_t state = s->session_state; |
| rv = ((state & STATE_DISCONNECT) ? VPPCOM_ECONNRESET : VPPCOM_ENOTCONN); |
| VDBG (1, "VCL<%d>: vpp handle 0x%llx, sid %u: session is not open! " |
| "state 0x%x (%s)", getpid (), s->vpp_handle, session_handle, |
| state, vppcom_session_state_str (state)); |
| return rv; |
| } |
| |
| tx_fifo = s->tx_fifo; |
| is_ct = vcl_session_is_ct (s); |
| is_nonblocking = VCL_SESS_ATTR_TEST (s->attr, VCL_SESS_ATTR_NONBLOCK); |
| mq = is_ct ? s->our_evt_q : wrk->app_event_queue; |
| if (svm_fifo_is_full (tx_fifo)) |
| { |
| if (is_nonblocking) |
| { |
| return VPPCOM_EWOULDBLOCK; |
| } |
| while (svm_fifo_is_full (tx_fifo)) |
| { |
| svm_fifo_set_want_tx_evt (tx_fifo, 1); |
| svm_msg_q_lock (mq); |
| if (svm_msg_q_is_empty (mq)) |
| svm_msg_q_wait (mq); |
| |
| svm_msg_q_sub_w_lock (mq, &msg); |
| e = svm_msg_q_msg_data (mq, &msg); |
| svm_msg_q_unlock (mq); |
| |
| if (!vcl_is_tx_evt_for_session (e, s->session_index, is_ct)) |
| vcl_handle_mq_event (wrk, e); |
| svm_msg_q_free_msg (mq, &msg); |
| } |
| } |
| |
| ASSERT (FIFO_EVENT_APP_TX + 1 == SESSION_IO_EVT_CT_TX); |
| et = FIFO_EVENT_APP_TX + vcl_session_is_ct (s); |
| if (s->is_dgram) |
| n_write = app_send_dgram_raw (tx_fifo, &s->transport, |
| s->vpp_evt_q, buf, n, et, SVM_Q_WAIT); |
| else |
| n_write = app_send_stream_raw (tx_fifo, s->vpp_evt_q, buf, n, et, |
| SVM_Q_WAIT); |
| |
| ASSERT (n_write > 0); |
| |
| VDBG (2, "VCL<%d>: vpp handle 0x%llx, sid %u: wrote %d bytes", getpid (), |
| s->vpp_handle, session_handle, n_write); |
| |
| return n_write; |
| } |
| |
| static vcl_session_t * |
| vcl_ct_session_get_from_fifo (vcl_worker_t * wrk, svm_fifo_t * f, u8 type) |
| { |
| vcl_session_t *s; |
| s = vcl_session_get (wrk, f->client_session_index); |
| if (s) |
| { |
| /* rx fifo */ |
| if (type == 0 && s->rx_fifo == f) |
| return s; |
| /* tx fifo */ |
| if (type == 1 && s->tx_fifo == f) |
| return s; |
| } |
| s = vcl_session_get (wrk, f->master_session_index); |
| if (s) |
| { |
| if (type == 0 && s->rx_fifo == f) |
| return s; |
| if (type == 1 && s->tx_fifo == f) |
| return s; |
| } |
| return 0; |
| } |
| |
| static inline int |
| vppcom_session_write_ready (vcl_session_t * session) |
| { |
| /* Assumes caller has acquired spinlock: vcm->sessions_lockp */ |
| if (PREDICT_FALSE (session->is_vep)) |
| { |
| clib_warning ("VCL<%d>: ERROR: vpp handle 0x%llx, sid %u: " |
| "cannot write to an epoll session!", |
| getpid (), session->vpp_handle, session->session_index); |
| return VPPCOM_EBADFD; |
| } |
| |
| if (PREDICT_FALSE (session->session_state & STATE_LISTEN)) |
| { |
| clib_warning ("VCL<%d>: ERROR: vpp handle 0x%llx, sid %u: " |
| "cannot write to a listen session!", |
| getpid (), session->vpp_handle, session->session_index); |
| return VPPCOM_EBADFD; |
| } |
| |
| if (PREDICT_FALSE (!(session->session_state & STATE_OPEN))) |
| { |
| session_state_t state = session->session_state; |
| int rv; |
| |
| rv = ((state & STATE_DISCONNECT) ? VPPCOM_ECONNRESET : VPPCOM_ENOTCONN); |
| clib_warning ("VCL<%d>: ERROR: vpp handle 0x%llx, sid %u: " |
| "session is not open! state 0x%x (%s), " |
| "returning %d (%s)", getpid (), session->vpp_handle, |
| session->session_index, |
| state, vppcom_session_state_str (state), |
| rv, vppcom_retval_str (rv)); |
| return rv; |
| } |
| |
| VDBG (3, "VCL<%d>: vpp handle 0x%llx, sid %u: peek %s (%p), ready = %d", |
| getpid (), session->vpp_handle, session->session_index, |
| session->tx_fifo, svm_fifo_max_enqueue (session->tx_fifo)); |
| |
| return svm_fifo_max_enqueue (session->tx_fifo); |
| } |
| |
| static inline int |
| vcl_mq_dequeue_batch (vcl_worker_t * wrk, svm_msg_q_t * mq) |
| { |
| svm_msg_q_msg_t *msg; |
| u32 n_msgs; |
| int i; |
| |
| n_msgs = svm_msg_q_size (mq); |
| for (i = 0; i < n_msgs; i++) |
| { |
| vec_add2 (wrk->mq_msg_vector, msg, 1); |
| svm_msg_q_sub_w_lock (mq, msg); |
| } |
| return n_msgs; |
| } |
| |
| #define vcl_fifo_rx_evt_valid_or_break(_fifo) \ |
| if (PREDICT_FALSE (svm_fifo_is_empty (_fifo))) \ |
| { \ |
| svm_fifo_unset_event (_fifo); \ |
| if (svm_fifo_is_empty (_fifo)) \ |
| break; \ |
| } \ |
| |
| static void |
| vcl_select_handle_mq_event (vcl_worker_t * wrk, session_event_t * e, |
| unsigned long n_bits, unsigned long *read_map, |
| unsigned long *write_map, |
| unsigned long *except_map, u32 * bits_set) |
| { |
| session_disconnected_msg_t *disconnected_msg; |
| session_connected_msg_t *connected_msg; |
| session_accepted_msg_t *accepted_msg; |
| vcl_session_msg_t *vcl_msg; |
| vcl_session_t *session; |
| u64 handle; |
| u32 sid; |
| |
| switch (e->event_type) |
| { |
| case FIFO_EVENT_APP_RX: |
| vcl_fifo_rx_evt_valid_or_break (e->fifo); |
| sid = e->fifo->client_session_index; |
| session = vcl_session_get (wrk, sid); |
| if (!session) |
| break; |
| if (sid < n_bits && read_map) |
| { |
| clib_bitmap_set_no_check (read_map, sid, 1); |
| *bits_set += 1; |
| } |
| break; |
| case FIFO_EVENT_APP_TX: |
| sid = e->fifo->client_session_index; |
| session = vcl_session_get (wrk, sid); |
| if (!session) |
| break; |
| if (sid < n_bits && write_map) |
| { |
| clib_bitmap_set_no_check (write_map, sid, 1); |
| *bits_set += 1; |
| } |
| break; |
| case SESSION_IO_EVT_CT_TX: |
| vcl_fifo_rx_evt_valid_or_break (e->fifo); |
| session = vcl_ct_session_get_from_fifo (wrk, e->fifo, 0); |
| if (!session) |
| break; |
| sid = session->session_index; |
| if (sid < n_bits && read_map) |
| { |
| clib_bitmap_set_no_check (read_map, sid, 1); |
| *bits_set += 1; |
| } |
| break; |
| case SESSION_IO_EVT_CT_RX: |
| session = vcl_ct_session_get_from_fifo (wrk, e->fifo, 1); |
| if (!session) |
| break; |
| sid = session->session_index; |
| if (sid < n_bits && write_map) |
| { |
| clib_bitmap_set_no_check (write_map, sid, 1); |
| *bits_set += 1; |
| } |
| break; |
| case SESSION_CTRL_EVT_ACCEPTED: |
| accepted_msg = (session_accepted_msg_t *) e->data; |
| handle = accepted_msg->listener_handle; |
| session = vcl_session_table_lookup_listener (wrk, handle); |
| if (!session) |
| { |
| clib_warning ("VCL<%d>: ERROR: couldn't find listen session:" |
| "listener handle %llx", getpid (), handle); |
| break; |
| } |
| |
| clib_fifo_add2 (session->accept_evts_fifo, vcl_msg); |
| vcl_msg->accepted_msg = *accepted_msg; |
| sid = session->session_index; |
| if (sid < n_bits && read_map) |
| { |
| clib_bitmap_set_no_check (read_map, sid, 1); |
| *bits_set += 1; |
| } |
| break; |
| case SESSION_CTRL_EVT_CONNECTED: |
| connected_msg = (session_connected_msg_t *) e->data; |
| vcl_session_connected_handler (wrk, connected_msg); |
| break; |
| case SESSION_CTRL_EVT_DISCONNECTED: |
| disconnected_msg = (session_disconnected_msg_t *) e->data; |
| sid = vcl_session_index_from_vpp_handle (wrk, disconnected_msg->handle); |
| if (sid < n_bits && except_map) |
| { |
| clib_bitmap_set_no_check (except_map, sid, 1); |
| *bits_set += 1; |
| } |
| break; |
| case SESSION_CTRL_EVT_RESET: |
| sid = vcl_session_reset_handler (wrk, (session_reset_msg_t *) e->data); |
| if (sid < n_bits && except_map) |
| { |
| clib_bitmap_set_no_check (except_map, sid, 1); |
| *bits_set += 1; |
| } |
| break; |
| default: |
| clib_warning ("unhandled: %u", e->event_type); |
| break; |
| } |
| } |
| |
| static int |
| vcl_select_handle_mq (vcl_worker_t * wrk, svm_msg_q_t * mq, |
| unsigned long n_bits, unsigned long *read_map, |
| unsigned long *write_map, unsigned long *except_map, |
| double time_to_wait, u32 * bits_set) |
| { |
| svm_msg_q_msg_t *msg; |
| session_event_t *e; |
| u32 i; |
| |
| svm_msg_q_lock (mq); |
| if (svm_msg_q_is_empty (mq)) |
| { |
| if (*bits_set) |
| { |
| svm_msg_q_unlock (mq); |
| return 0; |
| } |
| |
| if (!time_to_wait) |
| { |
| svm_msg_q_unlock (mq); |
| return 0; |
| } |
| else if (time_to_wait < 0) |
| { |
| svm_msg_q_wait (mq); |
| } |
| else |
| { |
| if (svm_msg_q_timedwait (mq, time_to_wait)) |
| { |
| svm_msg_q_unlock (mq); |
| return 0; |
| } |
| } |
| } |
| vcl_mq_dequeue_batch (wrk, mq); |
| svm_msg_q_unlock (mq); |
| |
| for (i = 0; i < vec_len (wrk->mq_msg_vector); i++) |
| { |
| msg = vec_elt_at_index (wrk->mq_msg_vector, i); |
| e = svm_msg_q_msg_data (mq, msg); |
| vcl_select_handle_mq_event (wrk, e, n_bits, read_map, write_map, |
| except_map, bits_set); |
| svm_msg_q_free_msg (mq, msg); |
| } |
| vec_reset_length (wrk->mq_msg_vector); |
| return *bits_set; |
| } |
| |
| static int |
| vppcom_select_condvar (vcl_worker_t * wrk, unsigned long n_bits, |
| unsigned long *read_map, unsigned long *write_map, |
| unsigned long *except_map, double time_to_wait, |
| u32 * bits_set) |
| { |
| double total_wait = 0, wait_slice; |
| vcl_cut_through_registration_t *cr; |
| |
| time_to_wait = (time_to_wait == -1) ? 10e9 : time_to_wait; |
| wait_slice = wrk->cut_through_registrations ? 10e-6 : time_to_wait; |
| do |
| { |
| vcl_ct_registration_lock (wrk); |
| /* *INDENT-OFF* */ |
| pool_foreach (cr, wrk->cut_through_registrations, ({ |
| vcl_select_handle_mq (wrk, cr->mq, n_bits, read_map, write_map, except_map, |
| 0, bits_set); |
| })); |
| /* *INDENT-ON* */ |
| vcl_ct_registration_unlock (wrk); |
| |
| vcl_select_handle_mq (wrk, wrk->app_event_queue, n_bits, read_map, |
| write_map, except_map, time_to_wait, bits_set); |
| total_wait += wait_slice; |
| if (*bits_set) |
| return *bits_set; |
| } |
| while (total_wait < time_to_wait); |
| |
| return 0; |
| } |
| |
| static int |
| vppcom_select_eventfd (vcl_worker_t * wrk, unsigned long n_bits, |
| unsigned long *read_map, unsigned long *write_map, |
| unsigned long *except_map, double time_to_wait, |
| u32 * bits_set) |
| { |
| vcl_mq_evt_conn_t *mqc; |
| int __clib_unused n_read; |
| int n_mq_evts, i; |
| u64 buf; |
| |
| vec_validate (wrk->mq_events, pool_elts (wrk->mq_evt_conns)); |
| n_mq_evts = epoll_wait (wrk->mqs_epfd, wrk->mq_events, |
| vec_len (wrk->mq_events), time_to_wait); |
| for (i = 0; i < n_mq_evts; i++) |
| { |
| mqc = vcl_mq_evt_conn_get (wrk, wrk->mq_events[i].data.u32); |
| n_read = read (mqc->mq_fd, &buf, sizeof (buf)); |
| vcl_select_handle_mq (wrk, mqc->mq, n_bits, read_map, write_map, |
| except_map, 0, bits_set); |
| } |
| |
| return (n_mq_evts > 0 ? (int) *bits_set : 0); |
| } |
| |
| int |
| vppcom_select (unsigned long n_bits, unsigned long *read_map, |
| unsigned long *write_map, unsigned long *except_map, |
| double time_to_wait) |
| { |
| u32 sid, minbits = clib_max (n_bits, BITS (uword)), bits_set = 0; |
| vcl_worker_t *wrk = vcl_worker_get_current (); |
| vcl_session_t *session = 0; |
| int rv, i; |
| |
| ASSERT (sizeof (clib_bitmap_t) == sizeof (long int)); |
| |
| if (n_bits && read_map) |
| { |
| clib_bitmap_validate (wrk->rd_bitmap, minbits); |
| clib_memcpy (wrk->rd_bitmap, read_map, |
| vec_len (wrk->rd_bitmap) * sizeof (clib_bitmap_t)); |
| memset (read_map, 0, vec_len (wrk->rd_bitmap) * sizeof (clib_bitmap_t)); |
| } |
| if (n_bits && write_map) |
| { |
| clib_bitmap_validate (wrk->wr_bitmap, minbits); |
| clib_memcpy (wrk->wr_bitmap, write_map, |
| vec_len (wrk->wr_bitmap) * sizeof (clib_bitmap_t)); |
| memset (write_map, 0, |
| vec_len (wrk->wr_bitmap) * sizeof (clib_bitmap_t)); |
| } |
| if (n_bits && except_map) |
| { |
| clib_bitmap_validate (wrk->ex_bitmap, minbits); |
| clib_memcpy (wrk->ex_bitmap, except_map, |
| vec_len (wrk->ex_bitmap) * sizeof (clib_bitmap_t)); |
| memset (except_map, 0, |
| vec_len (wrk->ex_bitmap) * sizeof (clib_bitmap_t)); |
| } |
| |
| if (!n_bits) |
| return 0; |
| |
| if (!write_map) |
| goto check_rd; |
| |
| /* *INDENT-OFF* */ |
| clib_bitmap_foreach (sid, wrk->wr_bitmap, ({ |
| if (!(session = vcl_session_get (wrk, sid))) |
| { |
| VDBG (0, "VCL<%d>: session %d specified in write_map is closed.", |
| getpid (), sid); |
| return VPPCOM_EBADFD; |
| } |
| |
| rv = svm_fifo_is_full (session->tx_fifo); |
| if (!rv) |
| { |
| clib_bitmap_set_no_check (write_map, sid, 1); |
| bits_set++; |
| } |
| })); |
| |
| check_rd: |
| if (!read_map) |
| goto check_mq; |
| |
| clib_bitmap_foreach (sid, wrk->rd_bitmap, ({ |
| if (!(session = vcl_session_get (wrk, sid))) |
| { |
| VDBG (0, "VCL<%d>: session %d specified in write_map is closed.", |
| getpid (), sid); |
| return VPPCOM_EBADFD; |
| } |
| |
| rv = vppcom_session_read_ready (session); |
| if (rv) |
| { |
| clib_bitmap_set_no_check (read_map, sid, 1); |
| bits_set++; |
| } |
| })); |
| /* *INDENT-ON* */ |
| |
| check_mq: |
| |
| for (i = 0; i < vec_len (wrk->unhandled_evts_vector); i++) |
| { |
| vcl_select_handle_mq_event (wrk, &wrk->unhandled_evts_vector[i], n_bits, |
| read_map, write_map, except_map, &bits_set); |
| } |
| vec_reset_length (wrk->unhandled_evts_vector); |
| |
| if (vcm->cfg.use_mq_eventfd) |
| vppcom_select_eventfd (wrk, n_bits, read_map, write_map, except_map, |
| time_to_wait, &bits_set); |
| else |
| vppcom_select_condvar (wrk, n_bits, read_map, write_map, except_map, |
| time_to_wait, &bits_set); |
| |
| return (bits_set); |
| } |
| |
| static inline void |
| vep_verify_epoll_chain (vcl_worker_t * wrk, u32 vep_idx) |
| { |
| vcl_session_t *session; |
| vppcom_epoll_t *vep; |
| u32 sid = vep_idx; |
| |
| if (VPPCOM_DEBUG <= 1) |
| return; |
| |
| /* Assumes caller has acquired spinlock: vcm->sessions_lockp */ |
| session = vcl_session_get (wrk, vep_idx); |
| if (PREDICT_FALSE (!session)) |
| { |
| clib_warning ("VCL<%d>: ERROR: Invalid vep_idx (%u)!", |
| getpid (), vep_idx); |
| goto done; |
| } |
| if (PREDICT_FALSE (!session->is_vep)) |
| { |
| clib_warning ("VCL<%d>: ERROR: vep_idx (%u) is not a vep!", |
| getpid (), vep_idx); |
| goto done; |
| } |
| vep = &session->vep; |
| clib_warning ("VCL<%d>: vep_idx (%u): Dumping epoll chain\n" |
| "{\n" |
| " is_vep = %u\n" |
| " is_vep_session = %u\n" |
| " next_sid = 0x%x (%u)\n" |
| " wait_cont_idx = 0x%x (%u)\n" |
| "}\n", getpid (), vep_idx, |
| session->is_vep, session->is_vep_session, |
| vep->next_sh, vep->next_sh, |
| session->wait_cont_idx, session->wait_cont_idx); |
| |
| for (sid = vep->next_sh; sid != ~0; sid = vep->next_sh) |
| { |
| session = vcl_session_get (wrk, sid); |
| if (PREDICT_FALSE (!session)) |
| { |
| clib_warning ("VCL<%d>: ERROR: Invalid sid (%u)!", getpid (), sid); |
| goto done; |
| } |
| if (PREDICT_FALSE (session->is_vep)) |
| clib_warning ("VCL<%d>: ERROR: sid (%u) is a vep!", |
| getpid (), vep_idx); |
| else if (PREDICT_FALSE (!session->is_vep_session)) |
| { |
| clib_warning ("VCL<%d>: ERROR: session (%u) " |
| "is not a vep session!", getpid (), sid); |
| goto done; |
| } |
| vep = &session->vep; |
| if (PREDICT_FALSE (vep->vep_sh != vep_idx)) |
| clib_warning ("VCL<%d>: ERROR: session (%u) vep_idx (%u) != " |
| "vep_idx (%u)!", getpid (), |
| sid, session->vep.vep_sh, vep_idx); |
| if (session->is_vep_session) |
| { |
| clib_warning ("vep_idx[%u]: sid 0x%x (%u)\n" |
| "{\n" |
| " next_sid = 0x%x (%u)\n" |
| " prev_sid = 0x%x (%u)\n" |
| " vep_idx = 0x%x (%u)\n" |
| " ev.events = 0x%x\n" |
| " ev.data.u64 = 0x%llx\n" |
| " et_mask = 0x%x\n" |
| "}\n", |
| vep_idx, sid, sid, |
| vep->next_sh, vep->next_sh, |
| vep->prev_sh, vep->prev_sh, |
| vep->vep_sh, vep->vep_sh, |
| vep->ev.events, vep->ev.data.u64, vep->et_mask); |
| } |
| } |
| |
| done: |
| clib_warning ("VCL<%d>: vep_idx (%u): Dump complete!\n", |
| getpid (), vep_idx); |
| } |
| |
| int |
| vppcom_epoll_create (void) |
| { |
| vcl_worker_t *wrk = vcl_worker_get_current (); |
| vcl_session_t *vep_session; |
| |
| vep_session = vcl_session_alloc (wrk); |
| |
| vep_session->is_vep = 1; |
| vep_session->vep.vep_sh = ~0; |
| vep_session->vep.next_sh = ~0; |
| vep_session->vep.prev_sh = ~0; |
| vep_session->wait_cont_idx = ~0; |
| vep_session->vpp_handle = ~0; |
| |
| vcl_evt (VCL_EVT_EPOLL_CREATE, vep_session, vep_sh); |
| VDBG (0, "VCL<%d>: Created vep_idx %u / sid %u!", |
| getpid (), vep_session->session_index, vep_session->session_index); |
| |
| return vcl_session_handle (vep_session); |
| } |
| |
| int |
| vppcom_epoll_ctl (uint32_t vep_handle, int op, uint32_t session_handle, |
| struct epoll_event *event) |
| { |
| vcl_worker_t *wrk = vcl_worker_get_current (); |
| vcl_session_t *vep_session; |
| vcl_session_t *session; |
| int rv = VPPCOM_OK; |
| |
| if (vep_handle == session_handle) |
| { |
| clib_warning ("VCL<%d>: ERROR: vep_idx == session_index (%u)!", |
| getpid (), vep_handle); |
| return VPPCOM_EINVAL; |
| } |
| |
| vep_session = vcl_session_get_w_handle (wrk, vep_handle); |
| if (PREDICT_FALSE (!vep_session)) |
| { |
| clib_warning ("VCL<%d>: ERROR: Invalid vep_idx (%u)!", vep_handle); |
| return VPPCOM_EBADFD; |
| } |
| if (PREDICT_FALSE (!vep_session->is_vep)) |
| { |
| clib_warning ("VCL<%d>: ERROR: vep_idx (%u) is not a vep!", |
| getpid (), vep_handle); |
| return VPPCOM_EINVAL; |
| } |
| |
| ASSERT (vep_session->vep.vep_sh == ~0); |
| ASSERT (vep_session->vep.prev_sh == ~0); |
| |
| session = vcl_session_get_w_handle (wrk, session_handle); |
| if (PREDICT_FALSE (!session)) |
| { |
| VDBG (0, "VCL<%d>: ERROR: Invalid session_handle (%u)!", |
| getpid (), session_handle); |
| return VPPCOM_EBADFD; |
| } |
| if (PREDICT_FALSE (session->is_vep)) |
| { |
| clib_warning ("ERROR: session_handle (%u) is a vep!", vep_handle); |
| return VPPCOM_EINVAL; |
| } |
| |
| switch (op) |
| { |
| case EPOLL_CTL_ADD: |
| if (PREDICT_FALSE (!event)) |
| { |
| clib_warning ("VCL<%d>: ERROR: EPOLL_CTL_ADD: NULL pointer to " |
| "epoll_event structure!", getpid ()); |
| return VPPCOM_EINVAL; |
| } |
| if (vep_session->vep.next_sh != ~0) |
| { |
| vcl_session_t *next_session; |
| next_session = vcl_session_get_w_handle (wrk, |
| vep_session->vep.next_sh); |
| if (PREDICT_FALSE (!next_session)) |
| { |
| clib_warning ("VCL<%d>: ERROR: EPOLL_CTL_ADD: Invalid " |
| "vep.next_sid (%u) on vep_idx (%u)!", |
| getpid (), vep_session->vep.next_sh, vep_handle); |
| return VPPCOM_EBADFD; |
| } |
| ASSERT (next_session->vep.prev_sh == vep_handle); |
| next_session->vep.prev_sh = session_handle; |
| } |
| session->vep.next_sh = vep_session->vep.next_sh; |
| session->vep.prev_sh = vep_handle; |
| session->vep.vep_sh = vep_handle; |
| session->vep.et_mask = VEP_DEFAULT_ET_MASK; |
| session->vep.ev = *event; |
| session->is_vep = 0; |
| session->is_vep_session = 1; |
| vep_session->vep.next_sh = session_handle; |
| |
| VDBG (1, "VCL<%d>: EPOLL_CTL_ADD: vep_idx %u, sid %u, events 0x%x, " |
| "data 0x%llx!", getpid (), vep_handle, session_handle, |
| event->events, event->data.u64); |
| vcl_evt (VCL_EVT_EPOLL_CTLADD, session, event->events, event->data.u64); |
| break; |
| |
| case EPOLL_CTL_MOD: |
| if (PREDICT_FALSE (!event)) |
| { |
| clib_warning ("VCL<%d>: ERROR: EPOLL_CTL_MOD: NULL pointer to " |
| "epoll_event structure!", getpid ()); |
| rv = VPPCOM_EINVAL; |
| goto done; |
| } |
| else if (PREDICT_FALSE (!session->is_vep_session)) |
| { |
| clib_warning ("VCL<%d>: ERROR: sid %u EPOLL_CTL_MOD: " |
| "not a vep session!", getpid (), session_handle); |
| rv = VPPCOM_EINVAL; |
| goto done; |
| } |
| else if (PREDICT_FALSE (session->vep.vep_sh != vep_handle)) |
| { |
| clib_warning ("VCL<%d>: ERROR: sid %u EPOLL_CTL_MOD: " |
| "vep_idx (%u) != vep_idx (%u)!", |
| getpid (), session_handle, |
| session->vep.vep_sh, vep_handle); |
| rv = VPPCOM_EINVAL; |
| goto done; |
| } |
| session->vep.et_mask = VEP_DEFAULT_ET_MASK; |
| session->vep.ev = *event; |
| VDBG (1, "VCL<%d>: EPOLL_CTL_MOD: vep_idx %u, sid %u, events 0x%x," |
| " data 0x%llx!", getpid (), vep_handle, session_handle, |
| event->events, event->data.u64); |
| break; |
| |
| case EPOLL_CTL_DEL: |
| if (PREDICT_FALSE (!session->is_vep_session)) |
| { |
| clib_warning ("VCL<%d>: ERROR: sid %u EPOLL_CTL_DEL: " |
| "not a vep session!", getpid (), session_handle); |
| rv = VPPCOM_EINVAL; |
| goto done; |
| } |
| else if (PREDICT_FALSE (session->vep.vep_sh != vep_handle)) |
| { |
| clib_warning ("VCL<%d>: ERROR: sid %u EPOLL_CTL_DEL: " |
| "vep_idx (%u) != vep_idx (%u)!", |
| getpid (), session_handle, |
| session->vep.vep_sh, vep_handle); |
| rv = VPPCOM_EINVAL; |
| goto done; |
| } |
| |
| vep_session->wait_cont_idx = |
| (vep_session->wait_cont_idx == session_handle) ? |
| session->vep.next_sh : vep_session->wait_cont_idx; |
| |
| if (session->vep.prev_sh == vep_handle) |
| vep_session->vep.next_sh = session->vep.next_sh; |
| else |
| { |
| vcl_session_t *prev_session; |
| prev_session = vcl_session_get_w_handle (wrk, session->vep.prev_sh); |
| if (PREDICT_FALSE (!prev_session)) |
| { |
| clib_warning ("VCL<%d>: ERROR: EPOLL_CTL_DEL: Invalid " |
| "vep.prev_sid (%u) on sid (%u)!", |
| getpid (), session->vep.prev_sh, session_handle); |
| return VPPCOM_EBADFD; |
| } |
| ASSERT (prev_session->vep.next_sh == session_handle); |
| prev_session->vep.next_sh = session->vep.next_sh; |
| } |
| if (session->vep.next_sh != ~0) |
| { |
| vcl_session_t *next_session; |
| next_session = vcl_session_get_w_handle (wrk, session->vep.next_sh); |
| if (PREDICT_FALSE (!next_session)) |
| { |
| clib_warning ("VCL<%d>: ERROR: EPOLL_CTL_DEL: Invalid " |
| "vep.next_sid (%u) on sid (%u)!", |
| getpid (), session->vep.next_sh, session_handle); |
| return VPPCOM_EBADFD; |
| } |
| ASSERT (next_session->vep.prev_sh == session_handle); |
| next_session->vep.prev_sh = session->vep.prev_sh; |
| } |
| |
| memset (&session->vep, 0, sizeof (session->vep)); |
| session->vep.next_sh = ~0; |
| session->vep.prev_sh = ~0; |
| session->vep.vep_sh = ~0; |
| session->is_vep_session = 0; |
| VDBG (1, "VCL<%d>: EPOLL_CTL_DEL: vep_idx %u, sid %u!", |
| getpid (), vep_handle, session_handle); |
| vcl_evt (VCL_EVT_EPOLL_CTLDEL, session, vep_sh); |
| break; |
| |
| default: |
| clib_warning ("VCL<%d>: ERROR: Invalid operation (%d)!", getpid (), op); |
| rv = VPPCOM_EINVAL; |
| } |
| |
| vep_verify_epoll_chain (wrk, vep_handle); |
| |
| done: |
| return rv; |
| } |
| |
| static inline void |
| vcl_epoll_wait_handle_mq_event (vcl_worker_t * wrk, session_event_t * e, |
| struct epoll_event *events, u32 * num_ev) |
| { |
| session_disconnected_msg_t *disconnected_msg; |
| session_connected_msg_t *connected_msg; |
| session_accepted_msg_t *accepted_msg; |
| u64 session_evt_data = ~0, handle; |
| u32 sid = ~0, session_events; |
| vcl_session_msg_t *vcl_msg; |
| vcl_session_t *session; |
| u8 add_event = 0; |
| |
| switch (e->event_type) |
| { |
| case FIFO_EVENT_APP_RX: |
| ASSERT (e->fifo->client_thread_index == vcl_get_worker_index ()); |
| vcl_fifo_rx_evt_valid_or_break (e->fifo); |
| sid = e->fifo->client_session_index; |
| session = vcl_session_get (wrk, sid); |
| session_events = session->vep.ev.events; |
| if (!(EPOLLIN & session->vep.ev.events) || session->has_rx_evt) |
| break; |
| add_event = 1; |
| events[*num_ev].events |= EPOLLIN; |
| session_evt_data = session->vep.ev.data.u64; |
| session->has_rx_evt = 1; |
| break; |
| case FIFO_EVENT_APP_TX: |
| sid = e->fifo->client_session_index; |
| session = vcl_session_get (wrk, sid); |
| session_events = session->vep.ev.events; |
| if (!(EPOLLOUT & session_events)) |
| break; |
| add_event = 1; |
| events[*num_ev].events |= EPOLLOUT; |
| session_evt_data = session->vep.ev.data.u64; |
| break; |
| case SESSION_IO_EVT_CT_TX: |
| vcl_fifo_rx_evt_valid_or_break (e->fifo); |
| session = vcl_ct_session_get_from_fifo (wrk, e->fifo, 0); |
| sid = session->session_index; |
| session_events = session->vep.ev.events; |
| if (!(EPOLLIN & session->vep.ev.events) || session->has_rx_evt) |
| break; |
| add_event = 1; |
| events[*num_ev].events |= EPOLLIN; |
| session_evt_data = session->vep.ev.data.u64; |
| session->has_rx_evt = 1; |
| break; |
| case SESSION_IO_EVT_CT_RX: |
| session = vcl_ct_session_get_from_fifo (wrk, e->fifo, 1); |
| sid = session->session_index; |
| session_events = session->vep.ev.events; |
| if (!(EPOLLOUT & session_events)) |
| break; |
| add_event = 1; |
| events[*num_ev].events |= EPOLLOUT; |
| session_evt_data = session->vep.ev.data.u64; |
| break; |
| case SESSION_CTRL_EVT_ACCEPTED: |
| accepted_msg = (session_accepted_msg_t *) e->data; |
| handle = accepted_msg->listener_handle; |
| session = vcl_session_table_lookup_listener (wrk, handle); |
| if (!session) |
| { |
| clib_warning ("VCL<%d>: ERROR: couldn't find listen session:" |
| "listener handle %llx", getpid (), handle); |
| break; |
| } |
| |
| clib_fifo_add2 (session->accept_evts_fifo, vcl_msg); |
| vcl_msg->accepted_msg = *accepted_msg; |
| session_events = session->vep.ev.events; |
| if (!(EPOLLIN & session_events)) |
| break; |
| |
| add_event = 1; |
| events[*num_ev].events |= EPOLLIN; |
| session_evt_data = session->vep.ev.data.u64; |
| break; |
| case SESSION_CTRL_EVT_CONNECTED: |
| connected_msg = (session_connected_msg_t *) e->data; |
| vcl_session_connected_handler (wrk, connected_msg); |
| /* Generate EPOLLOUT because there's no connected event */ |
| sid = vcl_session_index_from_vpp_handle (wrk, connected_msg->handle); |
| session = vcl_session_get (wrk, sid); |
| session_events = session->vep.ev.events; |
| if (EPOLLOUT & session_events) |
| { |
| add_event = 1; |
| events[*num_ev].events |= EPOLLOUT; |
| session_evt_data = session->vep.ev.data.u64; |
| } |
| break; |
| case SESSION_CTRL_EVT_DISCONNECTED: |
| disconnected_msg = (session_disconnected_msg_t *) e->data; |
| sid = vcl_session_index_from_vpp_handle (wrk, disconnected_msg->handle); |
| if (!(session = vcl_session_get (wrk, sid))) |
| break; |
| add_event = 1; |
| events[*num_ev].events |= EPOLLHUP | EPOLLRDHUP; |
| session_evt_data = session->vep.ev.data.u64; |
| session_events = session->vep.ev.events; |
| break; |
| case SESSION_CTRL_EVT_RESET: |
| sid = vcl_session_reset_handler (wrk, (session_reset_msg_t *) e->data); |
| if (!(session = vcl_session_get (wrk, sid))) |
| break; |
| add_event = 1; |
| events[*num_ev].events |= EPOLLHUP | EPOLLRDHUP; |
| session_evt_data = session->vep.ev.data.u64; |
| session_events = session->vep.ev.events; |
| break; |
| default: |
| VDBG (0, "unhandled: %u", e->event_type); |
| break; |
| } |
| |
| if (add_event) |
| { |
| events[*num_ev].data.u64 = session_evt_data; |
| if (EPOLLONESHOT & session_events) |
| { |
| session = vcl_session_get (wrk, sid); |
| session->vep.ev.events = 0; |
| } |
| *num_ev += 1; |
| } |
| } |
| |
| static int |
| vcl_epoll_wait_handle_mq (vcl_worker_t * wrk, svm_msg_q_t * mq, |
| struct epoll_event *events, u32 maxevents, |
| double wait_for_time, u32 * num_ev) |
| { |
| svm_msg_q_msg_t *msg; |
| session_event_t *e; |
| int i; |
| |
| if (vec_len (wrk->mq_msg_vector) && svm_msg_q_is_empty (mq)) |
| goto handle_dequeued; |
| |
| svm_msg_q_lock (mq); |
| if (svm_msg_q_is_empty (mq)) |
| { |
| if (!wait_for_time) |
| { |
| svm_msg_q_unlock (mq); |
| return 0; |
| } |
| else if (wait_for_time < 0) |
| { |
| svm_msg_q_wait (mq); |
| } |
| else |
| { |
| if (svm_msg_q_timedwait (mq, wait_for_time / 1e3)) |
| { |
| svm_msg_q_unlock (mq); |
| return 0; |
| } |
| } |
| } |
| vcl_mq_dequeue_batch (wrk, mq); |
| svm_msg_q_unlock (mq); |
| |
| handle_dequeued: |
| for (i = 0; i < vec_len (wrk->mq_msg_vector); i++) |
| { |
| msg = vec_elt_at_index (wrk->mq_msg_vector, i); |
| e = svm_msg_q_msg_data (mq, msg); |
| if (*num_ev < maxevents) |
| vcl_epoll_wait_handle_mq_event (wrk, e, events, num_ev); |
| else |
| vec_add1 (wrk->unhandled_evts_vector, *e); |
| svm_msg_q_free_msg (mq, msg); |
| } |
| vec_reset_length (wrk->mq_msg_vector); |
| |
| return *num_ev; |
| } |
| |
| static int |
| vppcom_epoll_wait_condvar (vcl_worker_t * wrk, struct epoll_event *events, |
| int maxevents, u32 n_evts, double wait_for_time) |
| { |
| vcl_cut_through_registration_t *cr; |
| double total_wait = 0, wait_slice; |
| int rv; |
| |
| wait_for_time = (wait_for_time == -1) ? (double) 10e9 : wait_for_time; |
| wait_slice = wrk->cut_through_registrations ? 10e-6 : wait_for_time; |
| |
| do |
| { |
| vcl_ct_registration_lock (wrk); |
| /* *INDENT-OFF* */ |
| pool_foreach (cr, wrk->cut_through_registrations, ({ |
| vcl_epoll_wait_handle_mq (wrk, cr->mq, events, maxevents, 0, &n_evts); |
| })); |
| /* *INDENT-ON* */ |
| vcl_ct_registration_unlock (wrk); |
| |
| rv = vcl_epoll_wait_handle_mq (wrk, wrk->app_event_queue, events, |
| maxevents, n_evts ? 0 : wait_slice, |
| &n_evts); |
| if (rv) |
| total_wait += wait_slice; |
| if (n_evts) |
| return n_evts; |
| } |
| while (total_wait < wait_for_time); |
| return n_evts; |
| } |
| |
| static int |
| vppcom_epoll_wait_eventfd (vcl_worker_t * wrk, struct epoll_event *events, |
| int maxevents, u32 n_evts, double wait_for_time) |
| { |
| vcl_mq_evt_conn_t *mqc; |
| int __clib_unused n_read; |
| int n_mq_evts, i; |
| u64 buf; |
| |
| vec_validate (wrk->mq_events, pool_elts (wrk->mq_evt_conns)); |
| again: |
| n_mq_evts = epoll_wait (wrk->mqs_epfd, wrk->mq_events, |
| vec_len (wrk->mq_events), wait_for_time); |
| for (i = 0; i < n_mq_evts; i++) |
| { |
| mqc = vcl_mq_evt_conn_get (wrk, wrk->mq_events[i].data.u32); |
| n_read = read (mqc->mq_fd, &buf, sizeof (buf)); |
| vcl_epoll_wait_handle_mq (wrk, mqc->mq, events, maxevents, 0, &n_evts); |
| } |
| if (!n_evts && n_mq_evts > 0) |
| goto again; |
| |
| return (int) n_evts; |
| } |
| |
| int |
| vppcom_epoll_wait (uint32_t vep_handle, struct epoll_event *events, |
| int maxevents, double wait_for_time) |
| { |
| vcl_worker_t *wrk = vcl_worker_get_current (); |
| vcl_session_t *vep_session; |
| u32 n_evts = 0; |
| int i; |
| |
| if (PREDICT_FALSE (maxevents <= 0)) |
| { |
| clib_warning ("VCL<%d>: ERROR: Invalid maxevents (%d)!", |
| getpid (), maxevents); |
| return VPPCOM_EINVAL; |
| } |
| |
| vep_session = vcl_session_get_w_handle (wrk, vep_handle); |
| if (!vep_session) |
| return VPPCOM_EBADFD; |
| |
| if (PREDICT_FALSE (!vep_session->is_vep)) |
| { |
| clib_warning ("VCL<%d>: ERROR: vep_idx (%u) is not a vep!", |
| getpid (), vep_handle); |
| return VPPCOM_EINVAL; |
| } |
| |
| memset (events, 0, sizeof (*events) * maxevents); |
| |
| if (vec_len (wrk->unhandled_evts_vector)) |
| { |
| for (i = 0; i < vec_len (wrk->unhandled_evts_vector); i++) |
| { |
| vcl_epoll_wait_handle_mq_event (wrk, &wrk->unhandled_evts_vector[i], |
| events, &n_evts); |
| if (n_evts == maxevents) |
| { |
| i += 1; |
| break; |
| } |
| } |
| |
| vec_delete (wrk->unhandled_evts_vector, i, 0); |
| } |
| |
| if (vcm->cfg.use_mq_eventfd) |
| return vppcom_epoll_wait_eventfd (wrk, events, maxevents, n_evts, |
| wait_for_time); |
| |
| return vppcom_epoll_wait_condvar (wrk, events, maxevents, n_evts, |
| wait_for_time); |
| } |
| |
| int |
| vppcom_session_attr (uint32_t session_handle, uint32_t op, |
| void *buffer, uint32_t * buflen) |
| { |
| vcl_worker_t *wrk = vcl_worker_get_current (); |
| vcl_session_t *session; |
| int rv = VPPCOM_OK; |
| u32 *flags = buffer; |
| vppcom_endpt_t *ep = buffer; |
| |
| session = vcl_session_get_w_handle (wrk, session_handle); |
| if (!session) |
| return VPPCOM_EBADFD; |
| |
| switch (op) |
| { |
| case VPPCOM_ATTR_GET_NREAD: |
| rv = vppcom_session_read_ready (session); |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_GET_NREAD: sid %u, nread = %d", |
| getpid (), rv); |
| break; |
| |
| case VPPCOM_ATTR_GET_NWRITE: |
| rv = vppcom_session_write_ready (session); |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_GET_NWRITE: sid %u, nwrite = %d", |
| getpid (), session_handle, rv); |
| break; |
| |
| case VPPCOM_ATTR_GET_FLAGS: |
| if (PREDICT_TRUE (buffer && buflen && (*buflen >= sizeof (*flags)))) |
| { |
| *flags = O_RDWR | (VCL_SESS_ATTR_TEST (session->attr, |
| VCL_SESS_ATTR_NONBLOCK)); |
| *buflen = sizeof (*flags); |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_GET_FLAGS: sid %u, flags = 0x%08x, " |
| "is_nonblocking = %u", getpid (), |
| session_handle, *flags, |
| VCL_SESS_ATTR_TEST (session->attr, VCL_SESS_ATTR_NONBLOCK)); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_SET_FLAGS: |
| if (PREDICT_TRUE (buffer && buflen && (*buflen == sizeof (*flags)))) |
| { |
| if (*flags & O_NONBLOCK) |
| VCL_SESS_ATTR_SET (session->attr, VCL_SESS_ATTR_NONBLOCK); |
| else |
| VCL_SESS_ATTR_CLR (session->attr, VCL_SESS_ATTR_NONBLOCK); |
| |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_SET_FLAGS: sid %u, flags = 0x%08x," |
| " is_nonblocking = %u", |
| getpid (), session_handle, *flags, |
| VCL_SESS_ATTR_TEST (session->attr, VCL_SESS_ATTR_NONBLOCK)); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_GET_PEER_ADDR: |
| if (PREDICT_TRUE (buffer && buflen && |
| (*buflen >= sizeof (*ep)) && ep->ip)) |
| { |
| ep->is_ip4 = session->transport.is_ip4; |
| ep->port = session->transport.rmt_port; |
| if (session->transport.is_ip4) |
| clib_memcpy (ep->ip, &session->transport.rmt_ip.ip4, |
| sizeof (ip4_address_t)); |
| else |
| clib_memcpy (ep->ip, &session->transport.rmt_ip.ip6, |
| sizeof (ip6_address_t)); |
| *buflen = sizeof (*ep); |
| VDBG (1, "VCL<%d>: VPPCOM_ATTR_GET_PEER_ADDR: sid %u, is_ip4 = %u, " |
| "addr = %U, port %u", getpid (), |
| session_handle, ep->is_ip4, format_ip46_address, |
| &session->transport.rmt_ip, |
| ep->is_ip4 ? IP46_TYPE_IP4 : IP46_TYPE_IP6, |
| clib_net_to_host_u16 (ep->port)); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_GET_LCL_ADDR: |
| if (PREDICT_TRUE (buffer && buflen && |
| (*buflen >= sizeof (*ep)) && ep->ip)) |
| { |
| ep->is_ip4 = session->transport.is_ip4; |
| ep->port = session->transport.lcl_port; |
| if (session->transport.is_ip4) |
| clib_memcpy (ep->ip, &session->transport.lcl_ip.ip4, |
| sizeof (ip4_address_t)); |
| else |
| clib_memcpy (ep->ip, &session->transport.lcl_ip.ip6, |
| sizeof (ip6_address_t)); |
| *buflen = sizeof (*ep); |
| VDBG (1, "VCL<%d>: VPPCOM_ATTR_GET_LCL_ADDR: sid %u, is_ip4 = %u," |
| " addr = %U port %d", getpid (), |
| session_handle, ep->is_ip4, format_ip46_address, |
| &session->transport.lcl_ip, |
| ep->is_ip4 ? IP46_TYPE_IP4 : IP46_TYPE_IP6, |
| clib_net_to_host_u16 (ep->port)); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_GET_LIBC_EPFD: |
| rv = session->libc_epfd; |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_GET_LIBC_EPFD: libc_epfd %d", |
| getpid (), rv); |
| break; |
| |
| case VPPCOM_ATTR_SET_LIBC_EPFD: |
| if (PREDICT_TRUE (buffer && buflen && |
| (*buflen == sizeof (session->libc_epfd)))) |
| { |
| session->libc_epfd = *(int *) buffer; |
| *buflen = sizeof (session->libc_epfd); |
| |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_SET_LIBC_EPFD: libc_epfd %d, " |
| "buflen %d", getpid (), session->libc_epfd, *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_GET_PROTOCOL: |
| if (buffer && buflen && (*buflen >= sizeof (int))) |
| { |
| *(int *) buffer = session->session_type; |
| *buflen = sizeof (int); |
| |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_GET_PROTOCOL: %d (%s), buflen %d", |
| getpid (), *(int *) buffer, *(int *) buffer ? "UDP" : "TCP", |
| *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_GET_LISTEN: |
| if (buffer && buflen && (*buflen >= sizeof (int))) |
| { |
| *(int *) buffer = VCL_SESS_ATTR_TEST (session->attr, |
| VCL_SESS_ATTR_LISTEN); |
| *buflen = sizeof (int); |
| |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_GET_LISTEN: %d, buflen %d", |
| getpid (), *(int *) buffer, *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_GET_ERROR: |
| if (buffer && buflen && (*buflen >= sizeof (int))) |
| { |
| *(int *) buffer = 0; |
| *buflen = sizeof (int); |
| |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_GET_ERROR: %d, buflen %d, #VPP-TBD#", |
| getpid (), *(int *) buffer, *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_GET_TX_FIFO_LEN: |
| if (buffer && buflen && (*buflen >= sizeof (u32))) |
| { |
| |
| /* VPP-TBD */ |
| *(size_t *) buffer = (session->sndbuf_size ? session->sndbuf_size : |
| session->tx_fifo ? session->tx_fifo->nitems : |
| vcm->cfg.tx_fifo_size); |
| *buflen = sizeof (u32); |
| |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_GET_TX_FIFO_LEN: %u (0x%x), " |
| "buflen %d, #VPP-TBD#", getpid (), |
| *(size_t *) buffer, *(size_t *) buffer, *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_SET_TX_FIFO_LEN: |
| if (buffer && buflen && (*buflen == sizeof (u32))) |
| { |
| /* VPP-TBD */ |
| session->sndbuf_size = *(u32 *) buffer; |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_SET_TX_FIFO_LEN: %u (0x%x), " |
| "buflen %d, #VPP-TBD#", getpid (), |
| session->sndbuf_size, session->sndbuf_size, *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_GET_RX_FIFO_LEN: |
| if (buffer && buflen && (*buflen >= sizeof (u32))) |
| { |
| |
| /* VPP-TBD */ |
| *(size_t *) buffer = (session->rcvbuf_size ? session->rcvbuf_size : |
| session->rx_fifo ? session->rx_fifo->nitems : |
| vcm->cfg.rx_fifo_size); |
| *buflen = sizeof (u32); |
| |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_GET_RX_FIFO_LEN: %u (0x%x), " |
| "buflen %d, #VPP-TBD#", getpid (), |
| *(size_t *) buffer, *(size_t *) buffer, *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_SET_RX_FIFO_LEN: |
| if (buffer && buflen && (*buflen == sizeof (u32))) |
| { |
| /* VPP-TBD */ |
| session->rcvbuf_size = *(u32 *) buffer; |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_SET_RX_FIFO_LEN: %u (0x%x), " |
| "buflen %d, #VPP-TBD#", getpid (), |
| session->sndbuf_size, session->sndbuf_size, *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_GET_REUSEADDR: |
| if (buffer && buflen && (*buflen >= sizeof (int))) |
| { |
| /* VPP-TBD */ |
| *(int *) buffer = VCL_SESS_ATTR_TEST (session->attr, |
| VCL_SESS_ATTR_REUSEADDR); |
| *buflen = sizeof (int); |
| |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_GET_REUSEADDR: %d, " |
| "buflen %d, #VPP-TBD#", getpid (), *(int *) buffer, *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_SET_REUSEADDR: |
| if (buffer && buflen && (*buflen == sizeof (int)) && |
| !VCL_SESS_ATTR_TEST (session->attr, VCL_SESS_ATTR_LISTEN)) |
| { |
| /* VPP-TBD */ |
| if (*(int *) buffer) |
| VCL_SESS_ATTR_SET (session->attr, VCL_SESS_ATTR_REUSEADDR); |
| else |
| VCL_SESS_ATTR_CLR (session->attr, VCL_SESS_ATTR_REUSEADDR); |
| |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_SET_REUSEADDR: %d, buflen %d," |
| " #VPP-TBD#", getpid (), |
| VCL_SESS_ATTR_TEST (session->attr, |
| VCL_SESS_ATTR_REUSEADDR), *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_GET_REUSEPORT: |
| if (buffer && buflen && (*buflen >= sizeof (int))) |
| { |
| /* VPP-TBD */ |
| *(int *) buffer = VCL_SESS_ATTR_TEST (session->attr, |
| VCL_SESS_ATTR_REUSEPORT); |
| *buflen = sizeof (int); |
| |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_GET_REUSEPORT: %d, buflen %d," |
| " #VPP-TBD#", getpid (), *(int *) buffer, *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_SET_REUSEPORT: |
| if (buffer && buflen && (*buflen == sizeof (int)) && |
| !VCL_SESS_ATTR_TEST (session->attr, VCL_SESS_ATTR_LISTEN)) |
| { |
| /* VPP-TBD */ |
| if (*(int *) buffer) |
| VCL_SESS_ATTR_SET (session->attr, VCL_SESS_ATTR_REUSEPORT); |
| else |
| VCL_SESS_ATTR_CLR (session->attr, VCL_SESS_ATTR_REUSEPORT); |
| |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_SET_REUSEPORT: %d, buflen %d," |
| " #VPP-TBD#", getpid (), |
| VCL_SESS_ATTR_TEST (session->attr, |
| VCL_SESS_ATTR_REUSEPORT), *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_GET_BROADCAST: |
| if (buffer && buflen && (*buflen >= sizeof (int))) |
| { |
| /* VPP-TBD */ |
| *(int *) buffer = VCL_SESS_ATTR_TEST (session->attr, |
| VCL_SESS_ATTR_BROADCAST); |
| *buflen = sizeof (int); |
| |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_GET_BROADCAST: %d, buflen %d," |
| " #VPP-TBD#", getpid (), *(int *) buffer, *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_SET_BROADCAST: |
| if (buffer && buflen && (*buflen == sizeof (int))) |
| { |
| /* VPP-TBD */ |
| if (*(int *) buffer) |
| VCL_SESS_ATTR_SET (session->attr, VCL_SESS_ATTR_BROADCAST); |
| else |
| VCL_SESS_ATTR_CLR (session->attr, VCL_SESS_ATTR_BROADCAST); |
| |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_SET_BROADCAST: %d, buflen %d, " |
| "#VPP-TBD#", getpid (), |
| VCL_SESS_ATTR_TEST (session->attr, |
| VCL_SESS_ATTR_BROADCAST), *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_GET_V6ONLY: |
| if (buffer && buflen && (*buflen >= sizeof (int))) |
| { |
| /* VPP-TBD */ |
| *(int *) buffer = VCL_SESS_ATTR_TEST (session->attr, |
| VCL_SESS_ATTR_V6ONLY); |
| *buflen = sizeof (int); |
| |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_GET_V6ONLY: %d, buflen %d, " |
| "#VPP-TBD#", getpid (), *(int *) buffer, *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_SET_V6ONLY: |
| if (buffer && buflen && (*buflen == sizeof (int))) |
| { |
| /* VPP-TBD */ |
| if (*(int *) buffer) |
| VCL_SESS_ATTR_SET (session->attr, VCL_SESS_ATTR_V6ONLY); |
| else |
| VCL_SESS_ATTR_CLR (session->attr, VCL_SESS_ATTR_V6ONLY); |
| |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_SET_V6ONLY: %d, buflen %d, " |
| "#VPP-TBD#", getpid (), |
| VCL_SESS_ATTR_TEST (session->attr, |
| VCL_SESS_ATTR_V6ONLY), *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_GET_KEEPALIVE: |
| if (buffer && buflen && (*buflen >= sizeof (int))) |
| { |
| /* VPP-TBD */ |
| *(int *) buffer = VCL_SESS_ATTR_TEST (session->attr, |
| VCL_SESS_ATTR_KEEPALIVE); |
| *buflen = sizeof (int); |
| |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_GET_KEEPALIVE: %d, buflen %d, " |
| "#VPP-TBD#", getpid (), *(int *) buffer, *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_SET_KEEPALIVE: |
| if (buffer && buflen && (*buflen == sizeof (int))) |
| { |
| /* VPP-TBD */ |
| if (*(int *) buffer) |
| VCL_SESS_ATTR_SET (session->attr, VCL_SESS_ATTR_KEEPALIVE); |
| else |
| VCL_SESS_ATTR_CLR (session->attr, VCL_SESS_ATTR_KEEPALIVE); |
| |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_SET_KEEPALIVE: %d, buflen %d, " |
| "#VPP-TBD#", getpid (), |
| VCL_SESS_ATTR_TEST (session->attr, |
| VCL_SESS_ATTR_KEEPALIVE), *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_GET_TCP_NODELAY: |
| if (buffer && buflen && (*buflen >= sizeof (int))) |
| { |
| /* VPP-TBD */ |
| *(int *) buffer = VCL_SESS_ATTR_TEST (session->attr, |
| VCL_SESS_ATTR_TCP_NODELAY); |
| *buflen = sizeof (int); |
| |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_GET_TCP_NODELAY: %d, buflen %d, " |
| "#VPP-TBD#", getpid (), *(int *) buffer, *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_SET_TCP_NODELAY: |
| if (buffer && buflen && (*buflen == sizeof (int))) |
| { |
| /* VPP-TBD */ |
| if (*(int *) buffer) |
| VCL_SESS_ATTR_SET (session->attr, VCL_SESS_ATTR_TCP_NODELAY); |
| else |
| VCL_SESS_ATTR_CLR (session->attr, VCL_SESS_ATTR_TCP_NODELAY); |
| |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_SET_TCP_NODELAY: %d, buflen %d, " |
| "#VPP-TBD#", getpid (), |
| VCL_SESS_ATTR_TEST (session->attr, |
| VCL_SESS_ATTR_TCP_NODELAY), *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_GET_TCP_KEEPIDLE: |
| if (buffer && buflen && (*buflen >= sizeof (int))) |
| { |
| /* VPP-TBD */ |
| *(int *) buffer = VCL_SESS_ATTR_TEST (session->attr, |
| VCL_SESS_ATTR_TCP_KEEPIDLE); |
| *buflen = sizeof (int); |
| |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_GET_TCP_KEEPIDLE: %d, buflen %d, " |
| "#VPP-TBD#", getpid (), *(int *) buffer, *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_SET_TCP_KEEPIDLE: |
| if (buffer && buflen && (*buflen == sizeof (int))) |
| { |
| /* VPP-TBD */ |
| if (*(int *) buffer) |
| VCL_SESS_ATTR_SET (session->attr, VCL_SESS_ATTR_TCP_KEEPIDLE); |
| else |
| VCL_SESS_ATTR_CLR (session->attr, VCL_SESS_ATTR_TCP_KEEPIDLE); |
| |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_SET_TCP_KEEPIDLE: %d, buflen %d, " |
| "#VPP-TBD#", getpid (), |
| VCL_SESS_ATTR_TEST (session->attr, |
| VCL_SESS_ATTR_TCP_KEEPIDLE), *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_GET_TCP_KEEPINTVL: |
| if (buffer && buflen && (*buflen >= sizeof (int))) |
| { |
| /* VPP-TBD */ |
| *(int *) buffer = VCL_SESS_ATTR_TEST (session->attr, |
| VCL_SESS_ATTR_TCP_KEEPINTVL); |
| *buflen = sizeof (int); |
| |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_GET_TCP_KEEPINTVL: %d, buflen %d, " |
| "#VPP-TBD#", getpid (), *(int *) buffer, *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_SET_TCP_KEEPINTVL: |
| if (buffer && buflen && (*buflen == sizeof (int))) |
| { |
| /* VPP-TBD */ |
| if (*(int *) buffer) |
| VCL_SESS_ATTR_SET (session->attr, VCL_SESS_ATTR_TCP_KEEPINTVL); |
| else |
| VCL_SESS_ATTR_CLR (session->attr, VCL_SESS_ATTR_TCP_KEEPINTVL); |
| |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_SET_TCP_KEEPINTVL: %d, buflen %d, " |
| "#VPP-TBD#", getpid (), |
| VCL_SESS_ATTR_TEST (session->attr, |
| VCL_SESS_ATTR_TCP_KEEPINTVL), *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_GET_TCP_USER_MSS: |
| if (buffer && buflen && (*buflen >= sizeof (u32))) |
| { |
| /* VPP-TBD */ |
| *(u32 *) buffer = session->user_mss; |
| *buflen = sizeof (int); |
| |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_GET_TCP_USER_MSS: %d, buflen %d," |
| " #VPP-TBD#", getpid (), *(int *) buffer, *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| case VPPCOM_ATTR_SET_TCP_USER_MSS: |
| if (buffer && buflen && (*buflen == sizeof (u32))) |
| { |
| /* VPP-TBD */ |
| session->user_mss = *(u32 *) buffer; |
| |
| VDBG (2, "VCL<%d>: VPPCOM_ATTR_SET_TCP_USER_MSS: %u, buflen %d, " |
| "#VPP-TBD#", getpid (), session->user_mss, *buflen); |
| } |
| else |
| rv = VPPCOM_EINVAL; |
| break; |
| |
| default: |
| rv = VPPCOM_EINVAL; |
| break; |
| } |
| |
| return rv; |
| } |
| |
| int |
| vppcom_session_recvfrom (uint32_t session_handle, void *buffer, |
| uint32_t buflen, int flags, vppcom_endpt_t * ep) |
| { |
| vcl_worker_t *wrk = vcl_worker_get_current (); |
| int rv = VPPCOM_OK; |
| vcl_session_t *session = 0; |
| |
| if (ep) |
| { |
| session = vcl_session_get_w_handle (wrk, session_handle); |
| if (PREDICT_FALSE (!session)) |
| { |
| VDBG (0, "VCL<%d>: invalid session, sid (%u) has been closed!", |
| getpid (), session_handle); |
| return VPPCOM_EBADFD; |
| } |
| ep->is_ip4 = session->transport.is_ip4; |
| ep->port = session->transport.rmt_port; |
| } |
| |
| if (flags == 0) |
| rv = vppcom_session_read (session_handle, buffer, buflen); |
| else if (flags & MSG_PEEK) |
| rv = vppcom_session_peek (session_handle, buffer, buflen); |
| else |
| { |
| clib_warning ("VCL<%d>: Unsupport flags for recvfrom %d", |
| getpid (), flags); |
| return VPPCOM_EAFNOSUPPORT; |
| } |
| |
| if (ep) |
| { |
| if (session->transport.is_ip4) |
| clib_memcpy (ep->ip, &session->transport.rmt_ip.ip4, |
| sizeof (ip4_address_t)); |
| else |
| clib_memcpy (ep->ip, &session->transport.rmt_ip.ip6, |
| sizeof (ip6_address_t)); |
| } |
| |
| return rv; |
| } |
| |
| int |
| vppcom_session_sendto (uint32_t session_handle, void *buffer, |
| uint32_t buflen, int flags, vppcom_endpt_t * ep) |
| { |
| if (!buffer) |
| return VPPCOM_EINVAL; |
| |
| if (ep) |
| { |
| // TBD |
| return VPPCOM_EINVAL; |
| } |
| |
| if (flags) |
| { |
| // TBD check the flags and do the right thing |
| VDBG (2, "VCL<%d>: handling flags 0x%u (%d) not implemented yet.", |
| getpid (), flags, flags); |
| } |
| |
| return (vppcom_session_write (session_handle, buffer, buflen)); |
| } |
| |
| int |
| vppcom_poll (vcl_poll_t * vp, uint32_t n_sids, double wait_for_time) |
| { |
| vcl_worker_t *wrk = vcl_worker_get_current (); |
| f64 timeout = clib_time_now (&wrk->clib_time) + wait_for_time; |
| u32 i, keep_trying = 1; |
| int rv, num_ev = 0; |
| |
| VDBG (3, "VCL<%d>: vp %p, nsids %u, wait_for_time %f", |
| getpid (), vp, n_sids, wait_for_time); |
| |
| if (!vp) |
| return VPPCOM_EFAULT; |
| |
| do |
| { |
| vcl_session_t *session; |
| |
| for (i = 0; i < n_sids; i++) |
| { |
| ASSERT (vp[i].revents); |
| |
| session = vcl_session_get (wrk, vp[i].sid); |
| if (!session) |
| continue; |
| |
| if (*vp[i].revents) |
| *vp[i].revents = 0; |
| |
| if (POLLIN & vp[i].events) |
| { |
| rv = vppcom_session_read_ready (session); |
| if (rv > 0) |
| { |
| *vp[i].revents |= POLLIN; |
| num_ev++; |
| } |
| else if (rv < 0) |
| { |
| switch (rv) |
| { |
| case VPPCOM_ECONNRESET: |
| *vp[i].revents = POLLHUP; |
| break; |
| |
| default: |
| *vp[i].revents = POLLERR; |
| break; |
| } |
| num_ev++; |
| } |
| } |
| |
| if (POLLOUT & vp[i].events) |
| { |
| rv = vppcom_session_write_ready (session); |
| if (rv > 0) |
| { |
| *vp[i].revents |= POLLOUT; |
| num_ev++; |
| } |
| else if (rv < 0) |
| { |
| switch (rv) |
| { |
| case VPPCOM_ECONNRESET: |
| *vp[i].revents = POLLHUP; |
| break; |
| |
| default: |
| *vp[i].revents = POLLERR; |
| break; |
| } |
| num_ev++; |
| } |
| } |
| |
| if (0) // Note "done:" label used by VCL_SESSION_LOCK_AND_GET() |
| { |
| *vp[i].revents = POLLNVAL; |
| num_ev++; |
| } |
| } |
| if (wait_for_time != -1) |
| keep_trying = (clib_time_now (&wrk->clib_time) <= timeout) ? 1 : 0; |
| } |
| while ((num_ev == 0) && keep_trying); |
| |
| if (VPPCOM_DEBUG > 3) |
| { |
| clib_warning ("VCL<%d>: returning %d", getpid (), num_ev); |
| for (i = 0; i < n_sids; i++) |
| { |
| clib_warning ("VCL<%d>: vp[%d].sid %d (0x%x), .events 0x%x, " |
| ".revents 0x%x", getpid (), i, vp[i].sid, vp[i].sid, |
| vp[i].events, *vp[i].revents); |
| } |
| } |
| return num_ev; |
| } |
| |
| int |
| vppcom_mq_epoll_fd (void) |
| { |
| vcl_worker_t *wrk = vcl_worker_get_current (); |
| return wrk->mqs_epfd; |
| } |
| |
| int |
| vppcom_session_index (uint32_t session_handle) |
| { |
| return session_handle & 0xFFFFFF; |
| } |
| |
| int |
| vppcom_worker_register (void) |
| { |
| if (vcl_worker_alloc_and_init ()) |
| return VPPCOM_OK; |
| return VPPCOM_EEXIST; |
| } |
| |
| /* |
| * fd.io coding-style-patch-verification: ON |
| * |
| * Local Variables: |
| * eval: (c-set-style "gnu") |
| * End: |
| */ |