blob: 58de9aeea228659f292bf8909fc76c7dcad0b29b [file] [log] [blame]
/*
* Copyright (c) 2017 Cisco and/or its affiliates.
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this
* You may obtain a copy of the License at:
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <stdio.h>
#include <stdlib.h>
#include <signal.h>
#include <svm/svm_fifo_segment.h>
#include <vlibmemory/api.h>
#include <vpp/api/vpe_msg_enum.h>
#include <vnet/session/application_interface.h>
#include <vcl/vppcom.h>
#include <vcl/vcl_event.h>
#include <vlib/unix/unix.h>
#include <vppinfra/vec_bootstrap.h>
#include <vppinfra/elog.h>
#define vl_typedefs /* define message structures */
#include <vpp/api/vpe_all_api_h.h>
#undef vl_typedefs
/* declare message handlers for each api */
#define vl_endianfun /* define message structures */
#include <vpp/api/vpe_all_api_h.h>
#undef vl_endianfun
/* instantiate all the print functions we know about */
#define vl_print(handle, ...)
#define vl_printfun
#include <vpp/api/vpe_all_api_h.h>
#undef vl_printfun
#if (CLIB_DEBUG > 0)
/* Set VPPCOM_DEBUG_INIT 2 for connection debug,
* 3 for read/write debug output
* or
* export VCL_DEBUG=<#> to set dynamically.
*/
#define VPPCOM_DEBUG_INIT 1
#else
#define VPPCOM_DEBUG_INIT 0
#endif
#define VPPCOM_DEBUG vcm->debug
/*
* VPPCOM Private definitions and functions.
*/
typedef enum
{
STATE_APP_START,
STATE_APP_CONN_VPP,
STATE_APP_ENABLED,
STATE_APP_ATTACHED,
} app_state_t;
typedef enum
{
STATE_START = 0x01,
STATE_CONNECT = 0x02,
STATE_LISTEN = 0x04,
STATE_ACCEPT = 0x08,
STATE_CLOSE_ON_EMPTY = 0x10,
STATE_DISCONNECT = 0x20,
STATE_FAILED = 0x40
} session_state_t;
#define SERVER_STATE_OPEN (STATE_ACCEPT|STATE_CLOSE_ON_EMPTY)
#define CLIENT_STATE_OPEN (STATE_CONNECT|STATE_CLOSE_ON_EMPTY)
typedef struct epoll_event vppcom_epoll_event_t;
typedef struct
{
u32 next_sid;
u32 prev_sid;
u32 vep_idx;
vppcom_epoll_event_t ev;
#define VEP_DEFAULT_ET_MASK (EPOLLIN|EPOLLOUT)
#define VEP_UNSUPPORTED_EVENTS (EPOLLONESHOT|EPOLLEXCLUSIVE)
u32 et_mask;
} vppcom_epoll_t;
typedef struct
{
u8 is_ip4;
ip46_address_t ip46;
} vppcom_ip46_t;
enum
{
VCL_SESS_ATTR_SERVER,
VCL_SESS_ATTR_CUT_THRU,
VCL_SESS_ATTR_VEP,
VCL_SESS_ATTR_VEP_SESSION,
VCL_SESS_ATTR_LISTEN, // SOL_SOCKET,SO_ACCEPTCONN
VCL_SESS_ATTR_NONBLOCK, // fcntl,O_NONBLOCK
VCL_SESS_ATTR_REUSEADDR, // SOL_SOCKET,SO_REUSEADDR
VCL_SESS_ATTR_REUSEPORT, // SOL_SOCKET,SO_REUSEPORT
VCL_SESS_ATTR_BROADCAST, // SOL_SOCKET,SO_BROADCAST
VCL_SESS_ATTR_V6ONLY, // SOL_TCP,IPV6_V6ONLY
VCL_SESS_ATTR_KEEPALIVE, // SOL_SOCKET,SO_KEEPALIVE
VCL_SESS_ATTR_TCP_NODELAY, // SOL_TCP,TCP_NODELAY
VCL_SESS_ATTR_TCP_KEEPIDLE, // SOL_TCP,TCP_KEEPIDLE
VCL_SESS_ATTR_TCP_KEEPINTVL, // SOL_TCP,TCP_KEEPINTVL
VCL_SESS_ATTR_MAX
} vppcom_session_attr_t;
#define VCL_SESS_ATTR_SET(ATTR, VAL) \
do { \
(ATTR) |= 1 << (VAL); \
} while (0)
#define VCL_SESS_ATTR_CLR(ATTR, VAL) \
do { \
(ATTR) &= ~(1 << (VAL)); \
} while (0)
#define VCL_SESS_ATTR_TEST(ATTR, VAL) \
((ATTR) & (1 << (VAL)) ? 1 : 0)
typedef struct
{
volatile session_state_t state;
svm_fifo_t *rx_fifo;
svm_fifo_t *tx_fifo;
u32 sndbuf_size; // VPP-TBD: Hack until support setsockopt(SO_SNDBUF)
u32 rcvbuf_size; // VPP-TBD: Hack until support setsockopt(SO_RCVBUF)
u32 user_mss; // VPP-TBD: Hack until support setsockopt(TCP_MAXSEG)
u8 *segment_name;
u32 sm_seg_index;
u32 client_context;
u64 vpp_handle;
svm_queue_t *vpp_event_queue;
/* Socket configuration state */
u8 is_vep;
u8 is_vep_session;
u32 attr;
u32 wait_cont_idx;
vppcom_epoll_t vep;
int libc_epfd;
vppcom_ip46_t lcl_addr;
vppcom_ip46_t peer_addr;
u16 lcl_port; // network order
u16 peer_port; // network order
u8 proto;
u64 client_queue_address;
u64 options[16];
elog_track_t elog_track;
vce_event_handler_reg_t *poll_reg;
} session_t;
typedef struct vppcom_cfg_t_
{
u64 heapsize;
u32 vpp_api_q_length;
u64 segment_baseva;
u32 segment_size;
u32 add_segment_size;
u32 preallocated_fifo_pairs;
u32 rx_fifo_size;
u32 tx_fifo_size;
u32 event_queue_size;
u32 listen_queue_size;
u8 app_proxy_transport_tcp;
u8 app_proxy_transport_udp;
u8 app_scope_local;
u8 app_scope_global;
u8 *namespace_id;
u64 namespace_secret;
f64 app_timeout;
f64 session_timeout;
f64 accept_timeout;
u32 event_ring_size;
char *event_log_path;
u8 *vpp_api_filename;
} vppcom_cfg_t;
/* VPPCOM Event typedefs */
typedef enum vcl_event_id_
{
VCL_EVENT_INVALID_EVENT,
VCL_EVENT_CONNECT_REQ_ACCEPTED,
VCL_EVENT_N_EVENTS
} vcl_event_id_t;
typedef struct vce_event_connect_request_
{
u32 accepted_session_index;
} vce_event_connect_request_t;
typedef struct vppcom_session_listener
{
vppcom_session_listener_cb user_cb;
vppcom_session_listener_errcb user_errcb;
void *user_cb_data;
} vppcom_session_listener_t;
typedef struct vppcom_main_t_
{
u8 init;
u32 debug;
int main_cpu;
/* FIFO for accepted connections - used in epoll/select */
clib_spinlock_t session_fifo_lockp;
u32 *client_session_index_fifo;
/* vpp input queue */
svm_queue_t *vl_input_queue;
/* API client handle */
u32 my_client_index;
/* Session pool */
clib_spinlock_t sessions_lockp;
session_t *sessions;
/* Hash table for disconnect processing */
uword *session_index_by_vpp_handles;
/* Select bitmaps */
clib_bitmap_t *rd_bitmap;
clib_bitmap_t *wr_bitmap;
clib_bitmap_t *ex_bitmap;
/* Our event queue */
svm_queue_t *app_event_queue;
/* unique segment name counter */
u32 unique_segment_index;
/* For deadman timers */
clib_time_t clib_time;
/* State of the connection, shared between msg RX thread and main thread */
volatile app_state_t app_state;
vppcom_cfg_t cfg;
/* Event thread */
vce_event_thread_t event_thread;
/* VPP Event-logger */
elog_main_t elog_main;
elog_track_t elog_track;
/* VNET_API_ERROR_FOO -> "Foo" hash table */
uword *error_string_by_error_number;
} vppcom_main_t;
/* NOTE: _vppcom_main is only used until the heap is allocated.
* Do not access it directly -- use vcm which will point to
* the heap allocated copy after init.
*/
static vppcom_main_t _vppcom_main = {
.debug = VPPCOM_DEBUG_INIT,
.my_client_index = ~0
};
static vppcom_main_t *vcm = &_vppcom_main;
#define VCL_LOCK_AND_GET_SESSION(I, S) \
do { \
clib_spinlock_lock (&vcm->sessions_lockp); \
rv = vppcom_session_at_index (I, S); \
if (PREDICT_FALSE (rv)) \
{ \
clib_spinlock_unlock (&vcm->sessions_lockp); \
clib_warning ("VCL<%d>: ERROR: Invalid ##I (%u)!", \
getpid (), I); \
goto done; \
} \
} while (0)
static const char *
vppcom_app_state_str (app_state_t state)
{
char *st;
switch (state)
{
case STATE_APP_START:
st = "STATE_APP_START";
break;
case STATE_APP_CONN_VPP:
st = "STATE_APP_CONN_VPP";
break;
case STATE_APP_ENABLED:
st = "STATE_APP_ENABLED";
break;
case STATE_APP_ATTACHED:
st = "STATE_APP_ATTACHED";
break;
default:
st = "UNKNOWN_APP_STATE";
break;
}
return st;
}
static const char *
vppcom_session_state_str (session_state_t state)
{
char *st;
switch (state)
{
case STATE_START:
st = "STATE_START";
break;
case STATE_CONNECT:
st = "STATE_CONNECT";
break;
case STATE_LISTEN:
st = "STATE_LISTEN";
break;
case STATE_ACCEPT:
st = "STATE_ACCEPT";
break;
case STATE_CLOSE_ON_EMPTY:
st = "STATE_CLOSE_ON_EMPTY";
break;
case STATE_DISCONNECT:
st = "STATE_DISCONNECT";
break;
case STATE_FAILED:
st = "STATE_FAILED";
break;
default:
st = "UNKNOWN_STATE";
break;
}
return st;
}
/*
* VPPCOM Utility Functions
*/
static inline int
vppcom_session_at_index (u32 session_index, session_t * volatile *sess)
{
/* Assumes that caller has acquired spinlock: vcm->sessions_lockp */
if (PREDICT_FALSE ((session_index == ~0) ||
pool_is_free_index (vcm->sessions, session_index)))
{
clib_warning ("VCL<%d>: invalid session, sid (%u) has been closed!",
getpid (), session_index);
return VPPCOM_EBADFD;
}
*sess = pool_elt_at_index (vcm->sessions, session_index);
return VPPCOM_OK;
}
static inline void
vppcom_session_table_add_listener (u64 listener_handle, u32 value)
{
/* Session and listener handles have different formats. The latter has
* the thread index in the upper 32 bits while the former has the session
* type. Knowing that, for listeners we just flip the MSB to 1 */
listener_handle |= 1ULL << 63;
hash_set (vcm->session_index_by_vpp_handles, listener_handle, value);
}
static inline session_t *
vppcom_session_table_lookup_listener (u64 listener_handle)
{
uword *p;
u64 handle = listener_handle | (1ULL << 63);
session_t *session;
p = hash_get (vcm->session_index_by_vpp_handles, handle);
if (!p)
{
clib_warning ("VCL<%d>: couldn't find listen session: unknown vpp "
"listener handle %llx", getpid (), listener_handle);
return 0;
}
if (pool_is_free_index (vcm->sessions, p[0]))
{
if (VPPCOM_DEBUG > 1)
clib_warning ("VCL<%d>: invalid listen session, sid (%u)",
getpid (), p[0]);
return 0;
}
session = pool_elt_at_index (vcm->sessions, p[0]);
ASSERT (session->state & STATE_LISTEN);
return session;
}
static inline void
vppcom_session_table_del_listener (u64 listener_handle)
{
listener_handle |= 1ULL << 63;
hash_unset (vcm->session_index_by_vpp_handles, listener_handle);
}
static void
write_elog (void)
{
elog_main_t *em = &vcm->elog_main;
char *chroot_file;
clib_error_t *error = 0;
chroot_file =
(char *) format (0, "%s/%d-%d-vcl-elog%c", vcm->cfg.event_log_path,
vcm->my_client_index, getpid (), 0);
error = elog_write_file (em, chroot_file, 1 /* flush ring */ );
if (error)
{
clib_error_report (error);
}
if (VPPCOM_DEBUG > 0)
clib_warning ("[%d] Event Log:'%s' ", getpid (), chroot_file);
}
static inline void
vppcom_send_accept_session_reply (u64 handle, u32 context, int retval)
{
vl_api_accept_session_reply_t *rmp;
rmp = vl_msg_api_alloc (sizeof (*rmp));
memset (rmp, 0, sizeof (*rmp));
rmp->_vl_msg_id = ntohs (VL_API_ACCEPT_SESSION_REPLY);
rmp->retval = htonl (retval);
rmp->context = context;
rmp->handle = handle;
vl_msg_api_send_shmem (vcm->vl_input_queue, (u8 *) & rmp);
}
/*
* VPPCOM Event Functions
*/
void
vce_registered_listener_connect_handler_fn (void *arg)
{
vce_event_handler_reg_t *reg = (vce_event_handler_reg_t *) arg;
vce_event_connect_request_t *ecr;
vce_event_t *ev;
vppcom_endpt_t ep;
session_t *new_session;
int rv;
vppcom_session_listener_t *session_listener =
(vppcom_session_listener_t *) reg->handler_fn_args;
ev = vce_get_event_from_index (&vcm->event_thread, reg->ev_idx);
ecr = (vce_event_connect_request_t *) ev->data;
VCL_LOCK_AND_GET_SESSION (ecr->accepted_session_index, &new_session);
ep.is_ip4 = new_session->peer_addr.is_ip4;
ep.port = new_session->peer_port;
if (new_session->peer_addr.is_ip4)
clib_memcpy (&ep.ip, &new_session->peer_addr.ip46.ip4,
sizeof (ip4_address_t));
else
clib_memcpy (&ep.ip, &new_session->peer_addr.ip46.ip6,
sizeof (ip6_address_t));
vppcom_send_accept_session_reply (new_session->vpp_handle,
new_session->client_context,
0 /* retval OK */ );
clib_spinlock_unlock (&vcm->sessions_lockp);
(session_listener->user_cb) (ecr->accepted_session_index, &ep,
session_listener->user_cb_data);
/*TODO - Unregister check in close for this listener */
return;
done:
ASSERT (0); // If we can't get a lock or accepted session fails, lets blow up.
}
/**
* * @brief vce_connect_request_handler_fn
* - used for listener sessions
* - when a vl_api_accept_session_t_handler() generates an event
* this callback is alerted and sets fields that consumers such as
* vppcom_session_accept() expect to see, ie. accepted_client_index
*
* @param arg - void* to be cast to vce_event_handler_reg_t*
*/
void
vce_connect_request_handler_fn (void *arg)
{
vce_event_handler_reg_t *reg = (vce_event_handler_reg_t *) arg;
pthread_mutex_lock (&reg->handler_lock);
pthread_cond_signal (&reg->handler_cond);
pthread_mutex_unlock (&reg->handler_lock);
}
/**
* @brief vce_poll_wait_connect_request_handler_fn
* - used by vppcom_epoll_xxxx() for listener sessions
* - when a vl_api_accept_session_t_handler() generates an event
* this callback is alerted and sets the fields that vppcom_epoll_wait()
* expects to see.
*
* @param arg - void* to be cast to vce_event_handler_reg_t*
*/
void
vce_poll_wait_connect_request_handler_fn (void *arg)
{
vce_event_handler_reg_t *reg = (vce_event_handler_reg_t *) arg;
vce_event_t *ev;
/* Retrieve the VCL_EVENT_CONNECT_REQ_ACCEPTED event */
ev = vce_get_event_from_index (&vcm->event_thread, reg->ev_idx);
vce_event_connect_request_t *ecr = (vce_event_connect_request_t *) ev->data;
/* Add the accepted_session_index to the FIFO */
clib_spinlock_lock (&vcm->session_fifo_lockp);
clib_fifo_add1 (vcm->client_session_index_fifo,
ecr->accepted_session_index);
clib_spinlock_unlock (&vcm->session_fifo_lockp);
/* Recycling the event. */
clib_spinlock_lock (&(vcm->event_thread.events_lockp));
vcm->event_thread.recycle_event = 1;
clib_fifo_add1 (vcm->event_thread.event_index_fifo, reg->ev_idx);
clib_spinlock_unlock (&(vcm->event_thread.events_lockp));
}
static int
vppcom_connect_to_vpp (char *app_name)
{
api_main_t *am = &api_main;
vppcom_cfg_t *vcl_cfg = &vcm->cfg;
int rv = VPPCOM_OK;
if (!vcl_cfg->vpp_api_filename)
vcl_cfg->vpp_api_filename = format (0, "/vpe-api%c", 0);
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: app (%s) connecting to VPP api (%s)...",
getpid (), app_name, vcl_cfg->vpp_api_filename);
if (vl_client_connect_to_vlib ((char *) vcl_cfg->vpp_api_filename, app_name,
vcm->cfg.vpp_api_q_length) < 0)
{
clib_warning ("VCL<%d>: app (%s) connect failed!", getpid (), app_name);
rv = VPPCOM_ECONNREFUSED;
}
else
{
vcm->vl_input_queue = am->shmem_hdr->vl_input_queue;
vcm->my_client_index = (u32) am->my_client_index;
vcm->app_state = STATE_APP_CONN_VPP;
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: app (%s) is connected to VPP!",
getpid (), app_name);
}
if (VPPCOM_DEBUG > 0)
{
vcm->elog_main.lock =
clib_mem_alloc_aligned (CLIB_CACHE_LINE_BYTES, CLIB_CACHE_LINE_BYTES);
vcm->elog_main.lock[0] = 0;
vcm->elog_main.event_ring_size = vcm->cfg.event_ring_size;
elog_init (&vcm->elog_main, vcm->elog_main.event_ring_size);
elog_enable_disable (&vcm->elog_main, 1);
vcm->elog_track.name =
(char *) format (0, "P:%d:C:%d%c", getpid (),
vcm->my_client_index, 0);
elog_track_register (&vcm->elog_main, &vcm->elog_track);
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "connect_vpp:rv:%d",
.format_args = "i4",
};
struct
{
u32 data;
} *ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, vcm->elog_track);
ed->data = (u32) rv;
/* *INDENT-ON* */
}
return rv;
}
static u8 *
format_api_error (u8 * s, va_list * args)
{
i32 error = va_arg (*args, u32);
uword *p;
p = hash_get (vcm->error_string_by_error_number, -error);
if (p)
s = format (s, "%s (%d)", p[0], error);
else
s = format (s, "%d", error);
return s;
}
static void
vppcom_init_error_string_table (void)
{
vcm->error_string_by_error_number = hash_create (0, sizeof (uword));
#define _(n, v, s) hash_set (vcm->error_string_by_error_number, -v, s);
foreach_vnet_api_error;
#undef _
hash_set (vcm->error_string_by_error_number, 99, "Misc");
}
static inline int
vppcom_wait_for_app_state_change (app_state_t app_state)
{
f64 timeout = clib_time_now (&vcm->clib_time) + vcm->cfg.app_timeout;
while (clib_time_now (&vcm->clib_time) < timeout)
{
if (vcm->app_state == app_state)
return VPPCOM_OK;
}
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: timeout waiting for state %s (%d)", getpid (),
vppcom_app_state_str (app_state), app_state);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "ERR: timeout state:%d",
.format_args = "i4",
};
struct
{
u32 data;
} *ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, vcm->elog_track);
ed->data = app_state;
/* *INDENT-ON* */
}
return VPPCOM_ETIMEDOUT;
}
static inline int
vppcom_wait_for_session_state_change (u32 session_index,
session_state_t state,
f64 wait_for_time)
{
f64 timeout = clib_time_now (&vcm->clib_time) + wait_for_time;
session_t *volatile session;
int rv;
do
{
clib_spinlock_lock (&vcm->sessions_lockp);
rv = vppcom_session_at_index (session_index, &session);
if (PREDICT_FALSE (rv))
{
clib_spinlock_unlock (&vcm->sessions_lockp);
return rv;
}
if (session->state & state)
{
clib_spinlock_unlock (&vcm->sessions_lockp);
return VPPCOM_OK;
}
if (session->state & STATE_FAILED)
{
clib_spinlock_unlock (&vcm->sessions_lockp);
return VPPCOM_ECONNREFUSED;
}
clib_spinlock_unlock (&vcm->sessions_lockp);
}
while (clib_time_now (&vcm->clib_time) < timeout);
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: timeout waiting for state 0x%x (%s)", getpid (),
state, vppcom_session_state_str (state));
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "ERR: timeout state:%d",
.format_args = "i4",
};
struct
{
u32 data;
} *ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data = state;
/* *INDENT-ON* */
}
return VPPCOM_ETIMEDOUT;
}
/*
* VPP-API message functions
*/
static void
vppcom_send_session_enable_disable (u8 is_enable)
{
vl_api_session_enable_disable_t *bmp;
bmp = vl_msg_api_alloc (sizeof (*bmp));
memset (bmp, 0, sizeof (*bmp));
bmp->_vl_msg_id = ntohs (VL_API_SESSION_ENABLE_DISABLE);
bmp->client_index = vcm->my_client_index;
bmp->context = htonl (0xfeedface);
bmp->is_enable = is_enable;
vl_msg_api_send_shmem (vcm->vl_input_queue, (u8 *) & bmp);
}
static int
vppcom_app_session_enable (void)
{
int rv;
if (vcm->app_state != STATE_APP_ENABLED)
{
vppcom_send_session_enable_disable (1 /* is_enabled == TRUE */ );
rv = vppcom_wait_for_app_state_change (STATE_APP_ENABLED);
if (PREDICT_FALSE (rv))
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: application session enable timed out! "
"returning %d (%s)",
getpid (), rv, vppcom_retval_str (rv));
return rv;
}
}
return VPPCOM_OK;
}
static void
vl_api_session_enable_disable_reply_t_handler
(vl_api_session_enable_disable_reply_t * mp)
{
if (mp->retval)
{
clib_warning ("VCL<%d>: session_enable_disable failed: %U", getpid (),
format_api_error, ntohl (mp->retval));
}
else
vcm->app_state = STATE_APP_ENABLED;
}
static void
vppcom_app_send_attach (void)
{
vl_api_application_attach_t *bmp;
u8 nsid_len = vec_len (vcm->cfg.namespace_id);
u8 app_is_proxy = (vcm->cfg.app_proxy_transport_tcp ||
vcm->cfg.app_proxy_transport_udp);
bmp = vl_msg_api_alloc (sizeof (*bmp));
memset (bmp, 0, sizeof (*bmp));
bmp->_vl_msg_id = ntohs (VL_API_APPLICATION_ATTACH);
bmp->client_index = vcm->my_client_index;
bmp->context = htonl (0xfeedface);
bmp->options[APP_OPTIONS_FLAGS] =
APP_OPTIONS_FLAGS_ACCEPT_REDIRECT | APP_OPTIONS_FLAGS_ADD_SEGMENT |
(vcm->cfg.app_scope_local ? APP_OPTIONS_FLAGS_USE_LOCAL_SCOPE : 0) |
(vcm->cfg.app_scope_global ? APP_OPTIONS_FLAGS_USE_GLOBAL_SCOPE : 0) |
(app_is_proxy ? APP_OPTIONS_FLAGS_IS_PROXY : 0);
bmp->options[APP_OPTIONS_PROXY_TRANSPORT] =
(vcm->cfg.app_proxy_transport_tcp ? 1 << TRANSPORT_PROTO_TCP : 0) |
(vcm->cfg.app_proxy_transport_udp ? 1 << TRANSPORT_PROTO_UDP : 0);
bmp->options[APP_OPTIONS_SEGMENT_SIZE] = vcm->cfg.segment_size;
bmp->options[APP_OPTIONS_ADD_SEGMENT_SIZE] = vcm->cfg.add_segment_size;
bmp->options[APP_OPTIONS_RX_FIFO_SIZE] = vcm->cfg.rx_fifo_size;
bmp->options[APP_OPTIONS_TX_FIFO_SIZE] = vcm->cfg.tx_fifo_size;
bmp->options[APP_OPTIONS_PREALLOC_FIFO_PAIRS] =
vcm->cfg.preallocated_fifo_pairs;
bmp->options[APP_OPTIONS_EVT_QUEUE_SIZE] = vcm->cfg.event_queue_size;
if (nsid_len)
{
bmp->namespace_id_len = nsid_len;
clib_memcpy (bmp->namespace_id, vcm->cfg.namespace_id, nsid_len);
bmp->options[APP_OPTIONS_NAMESPACE_SECRET] = vcm->cfg.namespace_secret;
}
vl_msg_api_send_shmem (vcm->vl_input_queue, (u8 *) & bmp);
}
static int
vppcom_app_attach (void)
{
int rv;
vppcom_app_send_attach ();
rv = vppcom_wait_for_app_state_change (STATE_APP_ATTACHED);
if (PREDICT_FALSE (rv))
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: application attach timed out! "
"returning %d (%s)",
getpid (), rv, vppcom_retval_str (rv));
return rv;
}
return VPPCOM_OK;
}
static void
vppcom_app_detach (void)
{
vl_api_application_detach_t *bmp;
bmp = vl_msg_api_alloc (sizeof (*bmp));
memset (bmp, 0, sizeof (*bmp));
bmp->_vl_msg_id = ntohs (VL_API_APPLICATION_DETACH);
bmp->client_index = vcm->my_client_index;
bmp->context = htonl (0xfeedface);
vl_msg_api_send_shmem (vcm->vl_input_queue, (u8 *) & bmp);
}
static void
vl_api_application_attach_reply_t_handler (vl_api_application_attach_reply_t *
mp)
{
static svm_fifo_segment_create_args_t _a;
svm_fifo_segment_create_args_t *a = &_a;
int rv;
memset (a, 0, sizeof (*a));
if (mp->retval)
{
clib_warning ("VCL<%d>: attach failed: %U", getpid (),
format_api_error, ntohl (mp->retval));
return;
}
if (mp->segment_name_length == 0)
{
clib_warning ("VCL<%d>: segment_name_length zero", getpid ());
return;
}
a->segment_name = (char *) mp->segment_name;
a->segment_size = mp->segment_size;
ASSERT (mp->app_event_queue_address);
/* Attach to the segment vpp created */
rv = svm_fifo_segment_attach (a);
vec_reset_length (a->new_segment_indices);
if (PREDICT_FALSE (rv))
{
clib_warning ("VCL<%d>: svm_fifo_segment_attach ('%s') failed",
getpid (), mp->segment_name);
return;
}
vcm->app_event_queue =
uword_to_pointer (mp->app_event_queue_address, svm_queue_t *);
vcm->app_state = STATE_APP_ATTACHED;
}
static void
vl_api_application_detach_reply_t_handler (vl_api_application_detach_reply_t *
mp)
{
if (mp->retval)
clib_warning ("VCL<%d>: detach failed: %U", getpid (), format_api_error,
ntohl (mp->retval));
vcm->app_state = STATE_APP_ENABLED;
}
static void
vl_api_disconnect_session_reply_t_handler (vl_api_disconnect_session_reply_t *
mp)
{
if (mp->retval)
clib_warning ("VCL<%d>: vpp handle 0x%llx: disconnect session failed: %U",
getpid (), mp->handle, format_api_error,
ntohl (mp->retval));
}
static void
vl_api_map_another_segment_t_handler (vl_api_map_another_segment_t * mp)
{
static svm_fifo_segment_create_args_t _a;
svm_fifo_segment_create_args_t *a = &_a;
int rv;
memset (a, 0, sizeof (*a));
a->segment_name = (char *) mp->segment_name;
a->segment_size = mp->segment_size;
/* Attach to the segment vpp created */
rv = svm_fifo_segment_attach (a);
vec_reset_length (a->new_segment_indices);
if (PREDICT_FALSE (rv))
{
clib_warning ("VCL<%d>: svm_fifo_segment_attach ('%s') failed",
getpid (), mp->segment_name);
return;
}
if (VPPCOM_DEBUG > 1)
clib_warning ("VCL<%d>: mapped new segment '%s' size %d", getpid (),
mp->segment_name, mp->segment_size);
}
static void
vl_api_unmap_segment_t_handler (vl_api_unmap_segment_t * mp)
{
/*
* XXX Need segment_name to session_id hash,
* XXX - have sessionID by handle hash currently
*/
if (VPPCOM_DEBUG > 1)
clib_warning ("Unmapped segment '%s'", mp->segment_name);
}
static void
vl_api_disconnect_session_t_handler (vl_api_disconnect_session_t * mp)
{
uword *p;
p = hash_get (vcm->session_index_by_vpp_handles, mp->handle);
if (p)
{
int rv;
session_t *session = 0;
u32 session_index = p[0];
VCL_LOCK_AND_GET_SESSION (session_index, &session);
session->state = STATE_CLOSE_ON_EMPTY;
if (VPPCOM_DEBUG > 1)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: "
"setting state to 0x%x (%s)",
getpid (), mp->handle, session_index, session->state,
vppcom_session_state_str (session->state));
clib_spinlock_unlock (&vcm->sessions_lockp);
return;
done:
if (VPPCOM_DEBUG > 1)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: "
"session lookup failed!",
getpid (), mp->handle, session_index);
}
else
clib_warning ("VCL<%d>: vpp handle 0x%llx: session lookup by "
"handle failed!", getpid (), mp->handle);
}
static void
vl_api_reset_session_t_handler (vl_api_reset_session_t * mp)
{
session_t *session = 0;
vl_api_reset_session_reply_t *rmp;
uword *p;
int rv = 0;
p = hash_get (vcm->session_index_by_vpp_handles, mp->handle);
if (p)
{
int rval;
clib_spinlock_lock (&vcm->sessions_lockp);
rval = vppcom_session_at_index (p[0], &session);
if (PREDICT_FALSE (rval))
{
rv = VNET_API_ERROR_INVALID_VALUE_2;
clib_warning ("VCL<%d>: ERROR: vpp handle 0x%llx, sid %u: "
"session lookup failed! returning %d %U",
getpid (), mp->handle, p[0],
rv, format_api_error, rv);
}
else
{
/* TBD: should this disconnect immediately and
* flush the fifos?
*/
session->state = STATE_CLOSE_ON_EMPTY;
if (VPPCOM_DEBUG > 1)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: "
"state set to %d (%s)!", getpid (),
mp->handle, p[0], session->state,
vppcom_session_state_str (session->state));
}
clib_spinlock_unlock (&vcm->sessions_lockp);
}
else
{
rv = VNET_API_ERROR_INVALID_VALUE;
clib_warning ("VCL<%d>: ERROR: vpp handle 0x%llx: session lookup "
"failed! returning %d %U",
getpid (), mp->handle, rv, format_api_error, rv);
}
rmp = vl_msg_api_alloc (sizeof (*rmp));
memset (rmp, 0, sizeof (*rmp));
rmp->_vl_msg_id = ntohs (VL_API_RESET_SESSION_REPLY);
rmp->retval = htonl (rv);
rmp->handle = mp->handle;
vl_msg_api_send_shmem (vcm->vl_input_queue, (u8 *) & rmp);
}
static void
vl_api_connect_session_reply_t_handler (vl_api_connect_session_reply_t * mp)
{
session_t *session = 0;
u32 session_index;
svm_fifo_t *rx_fifo, *tx_fifo;
int rv = VPPCOM_OK;
session_index = mp->context;
VCL_LOCK_AND_GET_SESSION (session_index, &session);
done:
if (mp->retval)
{
clib_warning ("VCL<%d>: ERROR: vpp handle 0x%llx, sid %u: "
"connect failed! %U",
getpid (), mp->handle, session_index,
format_api_error, ntohl (mp->retval));
if (session)
{
session->state = STATE_FAILED;
session->vpp_handle = mp->handle;
}
else
{
clib_warning ("[%s] ERROR: vpp handle 0x%llx, sid %u: "
"Invalid session index (%u)!",
getpid (), mp->handle, session_index);
}
goto done_unlock;
}
if (rv)
goto done_unlock;
/*
* Setup session
*/
session->vpp_event_queue = uword_to_pointer (mp->vpp_event_queue_address,
svm_queue_t *);
rx_fifo = uword_to_pointer (mp->server_rx_fifo, svm_fifo_t *);
rx_fifo->client_session_index = session_index;
tx_fifo = uword_to_pointer (mp->server_tx_fifo, svm_fifo_t *);
tx_fifo->client_session_index = session_index;
session->rx_fifo = rx_fifo;
session->tx_fifo = tx_fifo;
session->vpp_handle = mp->handle;
session->lcl_addr.is_ip4 = mp->is_ip4;
clib_memcpy (&session->lcl_addr.ip46, mp->lcl_ip,
sizeof (session->peer_addr.ip46));
session->lcl_port = mp->lcl_port;
session->state = STATE_CONNECT;
/* Add it to lookup table */
hash_set (vcm->session_index_by_vpp_handles, mp->handle, session_index);
if (VPPCOM_DEBUG > 1)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: connect succeeded!"
" session_rx_fifo %p, refcnt %d,"
" session_tx_fifo %p, refcnt %d",
getpid (), mp->handle, session_index,
session->rx_fifo,
session->rx_fifo->refcnt,
session->tx_fifo, session->tx_fifo->refcnt);
done_unlock:
clib_spinlock_unlock (&vcm->sessions_lockp);
}
static void
vppcom_send_connect_sock (session_t * session, u32 session_index)
{
vl_api_connect_sock_t *cmp;
/* Assumes caller as acquired the spinlock: vcm->sessions_lockp */
cmp = vl_msg_api_alloc (sizeof (*cmp));
memset (cmp, 0, sizeof (*cmp));
cmp->_vl_msg_id = ntohs (VL_API_CONNECT_SOCK);
cmp->client_index = vcm->my_client_index;
cmp->context = session_index;
cmp->is_ip4 = session->peer_addr.is_ip4;
clib_memcpy (cmp->ip, &session->peer_addr.ip46, sizeof (cmp->ip));
cmp->port = session->peer_port;
cmp->proto = session->proto;
clib_memcpy (cmp->options, session->options, sizeof (cmp->options));
vl_msg_api_send_shmem (vcm->vl_input_queue, (u8 *) & cmp);
}
static inline void
vppcom_send_disconnect_session_reply (u64 vpp_handle, u32 session_index,
int rv)
{
vl_api_disconnect_session_reply_t *rmp;
if (VPPCOM_DEBUG > 1)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: "
"sending disconnect msg",
getpid (), vpp_handle, session_index);
rmp = vl_msg_api_alloc (sizeof (*rmp));
memset (rmp, 0, sizeof (*rmp));
rmp->_vl_msg_id = ntohs (VL_API_DISCONNECT_SESSION_REPLY);
rmp->retval = htonl (rv);
rmp->handle = vpp_handle;
vl_msg_api_send_shmem (vcm->vl_input_queue, (u8 *) & rmp);
}
static inline void
vppcom_send_disconnect_session (u64 vpp_handle, u32 session_index)
{
vl_api_disconnect_session_t *dmp;
if (VPPCOM_DEBUG > 1)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: "
"sending disconnect msg",
getpid (), vpp_handle, session_index);
dmp = vl_msg_api_alloc (sizeof (*dmp));
memset (dmp, 0, sizeof (*dmp));
dmp->_vl_msg_id = ntohs (VL_API_DISCONNECT_SESSION);
dmp->client_index = vcm->my_client_index;
dmp->handle = vpp_handle;
vl_msg_api_send_shmem (vcm->vl_input_queue, (u8 *) & dmp);
}
static void
vl_api_bind_sock_reply_t_handler (vl_api_bind_sock_reply_t * mp)
{
session_t *session = 0;
u32 session_index = mp->context;
int rv;
VCL_LOCK_AND_GET_SESSION (session_index, &session);
done:
if (mp->retval)
{
clib_warning ("VCL<%d>: ERROR: vpp handle 0x%llx, "
"sid %u: bind failed: %U",
getpid (), mp->handle, session_index,
format_api_error, ntohl (mp->retval));
rv = vppcom_session_at_index (session_index, &session);
if (rv == VPPCOM_OK)
{
session->state = STATE_FAILED;
session->vpp_handle = mp->handle;
}
else
{
clib_warning ("[%s] ERROR: vpp handle 0x%llx, sid %u: "
"Invalid session index (%u)!",
getpid (), mp->handle, session_index);
}
goto done_unlock;
}
session->vpp_handle = mp->handle;
session->lcl_addr.is_ip4 = mp->lcl_is_ip4;
clib_memcpy (&session->lcl_addr.ip46, mp->lcl_ip,
sizeof (session->peer_addr.ip46));
session->lcl_port = mp->lcl_port;
vppcom_session_table_add_listener (mp->handle, session_index);
session->state = STATE_LISTEN;
if (VPPCOM_DEBUG > 1)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: bind succeeded!",
getpid (), mp->handle, mp->context);
done_unlock:
clib_spinlock_unlock (&vcm->sessions_lockp);
}
static void
vl_api_unbind_sock_reply_t_handler (vl_api_unbind_sock_reply_t * mp)
{
if (mp->retval)
clib_warning ("VCL<%d>: ERROR: sid %u: unbind failed: %U",
getpid (), mp->context, format_api_error,
ntohl (mp->retval));
else if (VPPCOM_DEBUG > 1)
clib_warning ("VCL<%d>: sid %u: unbind succeeded!",
getpid (), mp->context);
}
u8 *
format_ip4_address (u8 * s, va_list * args)
{
u8 *a = va_arg (*args, u8 *);
return format (s, "%d.%d.%d.%d", a[0], a[1], a[2], a[3]);
}
u8 *
format_ip6_address (u8 * s, va_list * args)
{
ip6_address_t *a = va_arg (*args, ip6_address_t *);
u32 i, i_max_n_zero, max_n_zeros, i_first_zero, n_zeros, last_double_colon;
i_max_n_zero = ARRAY_LEN (a->as_u16);
max_n_zeros = 0;
i_first_zero = i_max_n_zero;
n_zeros = 0;
for (i = 0; i < ARRAY_LEN (a->as_u16); i++)
{
u32 is_zero = a->as_u16[i] == 0;
if (is_zero && i_first_zero >= ARRAY_LEN (a->as_u16))
{
i_first_zero = i;
n_zeros = 0;
}
n_zeros += is_zero;
if ((!is_zero && n_zeros > max_n_zeros)
|| (i + 1 >= ARRAY_LEN (a->as_u16) && n_zeros > max_n_zeros))
{
i_max_n_zero = i_first_zero;
max_n_zeros = n_zeros;
i_first_zero = ARRAY_LEN (a->as_u16);
n_zeros = 0;
}
}
last_double_colon = 0;
for (i = 0; i < ARRAY_LEN (a->as_u16); i++)
{
if (i == i_max_n_zero && max_n_zeros > 1)
{
s = format (s, "::");
i += max_n_zeros - 1;
last_double_colon = 1;
}
else
{
s = format (s, "%s%x",
(last_double_colon || i == 0) ? "" : ":",
clib_net_to_host_u16 (a->as_u16[i]));
last_double_colon = 0;
}
}
return s;
}
/* Format an IP46 address. */
u8 *
format_ip46_address (u8 * s, va_list * args)
{
ip46_address_t *ip46 = va_arg (*args, ip46_address_t *);
ip46_type_t type = va_arg (*args, ip46_type_t);
int is_ip4 = 1;
switch (type)
{
case IP46_TYPE_ANY:
is_ip4 = ip46_address_is_ip4 (ip46);
break;
case IP46_TYPE_IP4:
is_ip4 = 1;
break;
case IP46_TYPE_IP6:
is_ip4 = 0;
break;
}
return is_ip4 ?
format (s, "%U", format_ip4_address, &ip46->ip4) :
format (s, "%U", format_ip6_address, &ip46->ip6);
}
static void
vl_api_accept_session_t_handler (vl_api_accept_session_t * mp)
{
svm_fifo_t *rx_fifo, *tx_fifo;
session_t *session, *listen_session;
u32 session_index;
vce_event_connect_request_t *ecr;
vce_event_t *ev;
int rv;
u32 ev_idx;
uword elts = 0;
clib_spinlock_lock (&vcm->sessions_lockp);
clib_spinlock_lock (&vcm->session_fifo_lockp);
elts = clib_fifo_free_elts (vcm->client_session_index_fifo);
clib_spinlock_unlock (&vcm->session_fifo_lockp);
if (!elts)
{
clib_warning ("VCL<%d>: client session queue is full!", getpid ());
vppcom_send_accept_session_reply (mp->handle, mp->context,
VNET_API_ERROR_QUEUE_FULL);
clib_spinlock_unlock (&vcm->sessions_lockp);
return;
}
listen_session = vppcom_session_table_lookup_listener (mp->listener_handle);
if (!listen_session)
{
clib_warning ("VCL<%d>: ERROR: couldn't find listen session: "
"unknown vpp listener handle %llx",
getpid (), mp->listener_handle);
vppcom_send_accept_session_reply (mp->handle, mp->context,
VNET_API_ERROR_INVALID_ARGUMENT);
clib_spinlock_unlock (&vcm->sessions_lockp);
return;
}
/* TODO check listener depth and update */
/* TODO on "child" fd close, update listener depth */
/* Allocate local session and set it up */
pool_get (vcm->sessions, session);
memset (session, 0, sizeof (*session));
session_index = session - vcm->sessions;
rx_fifo = uword_to_pointer (mp->server_rx_fifo, svm_fifo_t *);
rx_fifo->client_session_index = session_index;
tx_fifo = uword_to_pointer (mp->server_tx_fifo, svm_fifo_t *);
tx_fifo->client_session_index = session_index;
session->vpp_handle = mp->handle;
session->client_context = mp->context;
session->rx_fifo = rx_fifo;
session->tx_fifo = tx_fifo;
session->vpp_event_queue = uword_to_pointer (mp->vpp_event_queue_address,
svm_queue_t *);
session->state = STATE_ACCEPT;
session->peer_port = mp->port;
session->peer_addr.is_ip4 = mp->is_ip4;
clib_memcpy (&session->peer_addr.ip46, mp->ip,
sizeof (session->peer_addr.ip46));
/* Add it to lookup table */
hash_set (vcm->session_index_by_vpp_handles, mp->handle, session_index);
session->lcl_port = listen_session->lcl_port;
session->lcl_addr = listen_session->lcl_addr;
/* Create an event for handlers */
clib_spinlock_lock (&vcm->event_thread.events_lockp);
pool_get (vcm->event_thread.vce_events, ev);
ev->data = clib_mem_alloc (sizeof (vce_event_connect_request_t));
ev->refcnt = 0;
ev_idx = (u32) (ev - vcm->event_thread.vce_events);
ecr = ev->data;
ev->evk.eid = VCL_EVENT_CONNECT_REQ_ACCEPTED;
listen_session = vppcom_session_table_lookup_listener (mp->listener_handle);
ev->evk.session_index = (u32) (listen_session - vcm->sessions);
ecr->accepted_session_index = session_index;
clib_spinlock_unlock (&vcm->event_thread.events_lockp);
rv = vce_generate_event (&vcm->event_thread, ev_idx);
ASSERT (rv == 0);
if (VPPCOM_DEBUG > 1)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: client accept "
"request from %s address %U port %d queue %p!", getpid (),
mp->handle, session_index, mp->is_ip4 ? "IPv4" : "IPv6",
format_ip46_address, &mp->ip, mp->is_ip4,
clib_net_to_host_u16 (mp->port), session->vpp_event_queue);
if (VPPCOM_DEBUG > 0)
{
session->elog_track.name =
(char *) format (0, "C:%d:S:%d%c", vcm->my_client_index,
session_index, 0);
elog_track_register (&vcm->elog_main, &session->elog_track);
if (session->peer_addr.is_ip4)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format =
"client_accept:handle:%x addr:%d.%d.%d.%d:%d",
.format_args = "i8i1i1i1i1i2",
};
CLIB_PACKED (struct {
u64 handle; //8
u8 addr[4]; //4
u16 port; //2
}) * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->handle = mp->handle;
ed->addr[0] = session->peer_addr.ip46.ip4.as_u8[0];
ed->addr[1] = session->peer_addr.ip46.ip4.as_u8[1];
ed->addr[2] = session->peer_addr.ip46.ip4.as_u8[2];
ed->addr[3] = session->peer_addr.ip46.ip4.as_u8[3];
ed->port = clib_net_to_host_u16 (session->peer_port);
/* *INDENT-ON* */
}
else
{
clib_warning ("ip6");
}
}
clib_spinlock_unlock (&vcm->sessions_lockp);
}
static void
vppcom_send_bind_sock (session_t * session, u32 session_index)
{
vl_api_bind_sock_t *bmp;
/* Assumes caller has acquired spinlock: vcm->sessions_lockp */
bmp = vl_msg_api_alloc (sizeof (*bmp));
memset (bmp, 0, sizeof (*bmp));
bmp->_vl_msg_id = ntohs (VL_API_BIND_SOCK);
bmp->client_index = vcm->my_client_index;
bmp->context = session_index;
bmp->is_ip4 = session->lcl_addr.is_ip4;
clib_memcpy (bmp->ip, &session->lcl_addr.ip46, sizeof (bmp->ip));
bmp->port = session->lcl_port;
bmp->proto = session->proto;
clib_memcpy (bmp->options, session->options, sizeof (bmp->options));
vl_msg_api_send_shmem (vcm->vl_input_queue, (u8 *) & bmp);
}
static void
vppcom_send_unbind_sock (u64 vpp_handle)
{
vl_api_unbind_sock_t *ump;
ump = vl_msg_api_alloc (sizeof (*ump));
memset (ump, 0, sizeof (*ump));
ump->_vl_msg_id = ntohs (VL_API_UNBIND_SOCK);
ump->client_index = vcm->my_client_index;
ump->handle = vpp_handle;
vl_msg_api_send_shmem (vcm->vl_input_queue, (u8 *) & ump);
}
static int
vppcom_session_unbind (u32 session_index)
{
session_t *session = 0;
int rv;
u64 vpp_handle;
elog_track_t session_elog_track;
VCL_LOCK_AND_GET_SESSION (session_index, &session);
vpp_handle = session->vpp_handle;
vppcom_session_table_del_listener (vpp_handle);
session->vpp_handle = ~0;
session->state = STATE_DISCONNECT;
session_elog_track = session->elog_track;
clib_spinlock_unlock (&vcm->sessions_lockp);
if (VPPCOM_DEBUG > 1)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: "
"sending unbind msg! new state 0x%x (%s)",
getpid (), vpp_handle, session_index,
STATE_DISCONNECT,
vppcom_session_state_str (STATE_DISCONNECT));
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "unbind: handle:%x",
.format_args = "i8",
};
struct
{
u64 handle;
} *ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session_elog_track);
ed->handle = vpp_handle;
/* *INDENT-ON* */
}
vppcom_send_unbind_sock (vpp_handle);
done:
return rv;
}
static inline int
vppcom_session_disconnect (u32 session_index)
{
int rv;
session_t *session;
u64 vpp_handle;
session_state_t state;
VCL_LOCK_AND_GET_SESSION (session_index, &session);
vpp_handle = session->vpp_handle;
state = session->state;
clib_spinlock_unlock (&vcm->sessions_lockp);
if (VPPCOM_DEBUG > 1)
{
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u "
"state 0x%x (%s)",
getpid (), vpp_handle, session_index,
state, vppcom_session_state_str (state));
}
if (PREDICT_FALSE (state & STATE_LISTEN))
{
clib_warning ("VCL<%d>: ERROR: vpp handle 0x%llx, sid %u: "
"Cannot disconnect a listen socket!",
getpid (), vpp_handle, session_index);
rv = VPPCOM_EBADFD;
goto done;
}
/* The peer has already initiated the close,
* so send the disconnect session reply.
*/
if (state & STATE_CLOSE_ON_EMPTY)
{
//XXX alagalah - Check and drain here?
vppcom_send_disconnect_session_reply (vpp_handle,
session_index, 0 /* rv */ );
if (VPPCOM_DEBUG > 1)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: "
"sending disconnect REPLY...",
getpid (), vpp_handle, session_index);
}
/* Otherwise, send a disconnect session msg...
*/
else
{
if (VPPCOM_DEBUG > 1)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: "
"sending disconnect...",
getpid (), vpp_handle, session_index);
vppcom_send_disconnect_session (vpp_handle, session_index);
}
done:
return rv;
}
#define foreach_sock_msg \
_(SESSION_ENABLE_DISABLE_REPLY, session_enable_disable_reply) \
_(BIND_SOCK_REPLY, bind_sock_reply) \
_(UNBIND_SOCK_REPLY, unbind_sock_reply) \
_(ACCEPT_SESSION, accept_session) \
_(CONNECT_SESSION_REPLY, connect_session_reply) \
_(DISCONNECT_SESSION, disconnect_session) \
_(DISCONNECT_SESSION_REPLY, disconnect_session_reply) \
_(RESET_SESSION, reset_session) \
_(APPLICATION_ATTACH_REPLY, application_attach_reply) \
_(APPLICATION_DETACH_REPLY, application_detach_reply) \
_(MAP_ANOTHER_SEGMENT, map_another_segment) \
_(UNMAP_SEGMENT, unmap_segment)
static void
vppcom_api_hookup (void)
{
#define _(N, n) \
vl_msg_api_set_handlers(VL_API_##N, #n, \
vl_api_##n##_t_handler, \
vl_noop_handler, \
vl_api_##n##_t_endian, \
vl_api_##n##_t_print, \
sizeof(vl_api_##n##_t), 1);
foreach_sock_msg;
#undef _
}
static void
vppcom_cfg_init (vppcom_cfg_t * vcl_cfg)
{
ASSERT (vcl_cfg);
vcl_cfg->heapsize = (256ULL << 20);
vcl_cfg->vpp_api_q_length = 1024;
vcl_cfg->segment_baseva = 0x200000000ULL;
vcl_cfg->segment_size = (256 << 20);
vcl_cfg->add_segment_size = (128 << 20);
vcl_cfg->preallocated_fifo_pairs = 8;
vcl_cfg->rx_fifo_size = (1 << 20);
vcl_cfg->tx_fifo_size = (1 << 20);
vcl_cfg->event_queue_size = 2048;
vcl_cfg->listen_queue_size = CLIB_CACHE_LINE_BYTES / sizeof (u32);
vcl_cfg->app_timeout = 10 * 60.0;
vcl_cfg->session_timeout = 10 * 60.0;
vcl_cfg->accept_timeout = 60.0;
vcl_cfg->event_ring_size = (128 << 10);
vcl_cfg->event_log_path = "/dev/shm";
}
static void
vppcom_cfg_heapsize (char *conf_fname)
{
vppcom_cfg_t *vcl_cfg = &vcm->cfg;
FILE *fp;
char inbuf[4096];
int argc = 1;
char **argv = NULL;
char *arg = NULL;
char *p;
int i;
u8 *sizep;
u32 size;
void *vcl_mem;
void *heap;
fp = fopen (conf_fname, "r");
if (fp == NULL)
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: using default heapsize %lld (0x%llx)",
getpid (), vcl_cfg->heapsize, vcl_cfg->heapsize);
goto defaulted;
}
argv = calloc (1, sizeof (char *));
if (argv == NULL)
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: calloc failed, using default "
"heapsize %lld (0x%llx)",
getpid (), vcl_cfg->heapsize, vcl_cfg->heapsize);
goto defaulted;
}
while (1)
{
if (fgets (inbuf, 4096, fp) == 0)
break;
p = strtok (inbuf, " \t\n");
while (p != NULL)
{
if (*p == '#')
break;
argc++;
char **tmp = realloc (argv, argc * sizeof (char *));
if (tmp == NULL)
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: realloc failed, "
"using default heapsize %lld (0x%llx)",
getpid (), vcl_cfg->heapsize,
vcl_cfg->heapsize);
goto defaulted;
}
argv = tmp;
arg = strndup (p, 1024);
if (arg == NULL)
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: strndup failed, "
"using default heapsize %lld (0x%llx)",
getpid (), vcl_cfg->heapsize,
vcl_cfg->heapsize);
goto defaulted;
}
argv[argc - 1] = arg;
p = strtok (NULL, " \t\n");
}
}
fclose (fp);
fp = NULL;
char **tmp = realloc (argv, (argc + 1) * sizeof (char *));
if (tmp == NULL)
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: realloc failed, "
"using default heapsize %lld (0x%llx)",
getpid (), vcl_cfg->heapsize, vcl_cfg->heapsize);
goto defaulted;
}
argv = tmp;
argv[argc] = NULL;
/*
* Look for and parse the "heapsize" config parameter.
* Manual since none of the clib infra has been bootstrapped yet.
*
* Format: heapsize <nn>[mM][gG]
*/
for (i = 1; i < (argc - 1); i++)
{
if (!strncmp (argv[i], "heapsize", 8))
{
sizep = (u8 *) argv[i + 1];
size = 0;
while (*sizep >= '0' && *sizep <= '9')
{
size *= 10;
size += *sizep++ - '0';
}
if (size == 0)
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: parse error '%s %s', "
"using default heapsize %lld (0x%llx)",
getpid (), argv[i], argv[i + 1],
vcl_cfg->heapsize, vcl_cfg->heapsize);
goto defaulted;
}
if (*sizep == 'g' || *sizep == 'G')
vcl_cfg->heapsize = size << 30;
else if (*sizep == 'm' || *sizep == 'M')
vcl_cfg->heapsize = size << 20;
else
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: parse error '%s %s', "
"using default heapsize %lld (0x%llx)",
getpid (), argv[i], argv[i + 1],
vcl_cfg->heapsize, vcl_cfg->heapsize);
goto defaulted;
}
}
}
defaulted:
if (fp != NULL)
fclose (fp);
if (argv != NULL)
free (argv);
vcl_mem = mmap (0, vcl_cfg->heapsize, PROT_READ | PROT_WRITE,
MAP_SHARED | MAP_ANONYMOUS, -1, 0);
if (vcl_mem == MAP_FAILED)
{
clib_unix_error ("VCL<%d>: ERROR: mmap(0, %lld == 0x%llx, "
"PROT_READ | PROT_WRITE,MAP_SHARED | MAP_ANONYMOUS, "
"-1, 0) failed!",
getpid (), vcl_cfg->heapsize, vcl_cfg->heapsize);
ASSERT (vcl_mem != MAP_FAILED);
return;
}
heap = clib_mem_init (vcl_mem, vcl_cfg->heapsize);
if (!heap)
{
clib_warning ("VCL<%d>: ERROR: clib_mem_init() failed!", getpid ());
ASSERT (heap);
return;
}
vcl_mem = clib_mem_alloc (sizeof (_vppcom_main));
if (!vcl_mem)
{
clib_warning ("VCL<%d>: ERROR: clib_mem_alloc() failed!", getpid ());
ASSERT (vcl_mem);
return;
}
clib_memcpy (vcl_mem, &_vppcom_main, sizeof (_vppcom_main));
vcm = vcl_mem;
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: allocated VCL heap = %p, size %lld (0x%llx)",
getpid (), heap, vcl_cfg->heapsize, vcl_cfg->heapsize);
}
static void
vppcom_cfg_read (char *conf_fname)
{
vppcom_cfg_t *vcl_cfg = &vcm->cfg;
int fd;
unformat_input_t _input, *input = &_input;
unformat_input_t _line_input, *line_input = &_line_input;
u8 vc_cfg_input = 0;
u8 *chroot_path;
struct stat s;
u32 uid, gid, q_len;
fd = open (conf_fname, O_RDONLY);
if (fd < 0)
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: using default configuration.",
getpid (), conf_fname);
goto file_done;
}
if (fstat (fd, &s) < 0)
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: failed to stat `%s', "
"using default configuration", getpid (), conf_fname);
goto file_done;
}
if (!(S_ISREG (s.st_mode) || S_ISLNK (s.st_mode)))
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: not a regular file `%s', "
"using default configuration", getpid (), conf_fname);
goto file_done;
}
unformat_init_clib_file (input, fd);
while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT)
{
(void) unformat_user (input, unformat_line_input, line_input);
unformat_skip_white_space (line_input);
if (unformat (line_input, "vcl {"))
{
vc_cfg_input = 1;
continue;
}
if (vc_cfg_input)
{
if (unformat (line_input, "heapsize %s", &chroot_path))
{
vec_terminate_c_string (chroot_path);
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured heapsize %s, "
"actual heapsize %lld (0x%llx)",
getpid (), chroot_path, vcl_cfg->heapsize,
vcl_cfg->heapsize);
vec_free (chroot_path);
}
else if (unformat (line_input, "api-prefix %s", &chroot_path))
{
vec_terminate_c_string (chroot_path);
if (vcl_cfg->vpp_api_filename)
vec_free (vcl_cfg->vpp_api_filename);
vcl_cfg->vpp_api_filename = format (0, "/%s-vpe-api%c",
chroot_path, 0);
vl_set_memory_root_path ((char *) chroot_path);
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured api-prefix (%s) and "
"api filename (%s)", getpid (), chroot_path,
vcl_cfg->vpp_api_filename);
chroot_path = 0; /* Don't vec_free() it! */
}
else if (unformat (line_input, "vpp-api-q-length %d", &q_len))
{
if (q_len < vcl_cfg->vpp_api_q_length)
{
clib_warning ("VCL<%d>: ERROR: configured vpp-api-q-length "
"(%u) is too small! Using default: %u ",
getpid (), q_len, vcl_cfg->vpp_api_q_length);
}
else
{
vcl_cfg->vpp_api_q_length = q_len;
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured vpp-api-q-length %u",
getpid (), vcl_cfg->vpp_api_q_length);
}
}
else if (unformat (line_input, "uid %d", &uid))
{
vl_set_memory_uid (uid);
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured uid %d", getpid (), uid);
}
else if (unformat (line_input, "gid %d", &gid))
{
vl_set_memory_gid (gid);
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured gid %d", getpid (), gid);
}
else if (unformat (line_input, "segment-baseva 0x%lx",
&vcl_cfg->segment_baseva))
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured segment_baseva 0x%lx",
getpid (), vcl_cfg->segment_baseva);
}
else if (unformat (line_input, "segment-size 0x%lx",
&vcl_cfg->segment_size))
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured segment_size 0x%lx (%ld)",
getpid (), vcl_cfg->segment_size,
vcl_cfg->segment_size);
}
else if (unformat (line_input, "segment-size %ld",
&vcl_cfg->segment_size))
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured segment_size %ld (0x%lx)",
getpid (), vcl_cfg->segment_size,
vcl_cfg->segment_size);
}
else if (unformat (line_input, "add-segment-size 0x%lx",
&vcl_cfg->add_segment_size))
{
if (VPPCOM_DEBUG > 0)
clib_warning
("VCL<%d>: configured add_segment_size 0x%lx (%ld)",
getpid (), vcl_cfg->add_segment_size,
vcl_cfg->add_segment_size);
}
else if (unformat (line_input, "add-segment-size %ld",
&vcl_cfg->add_segment_size))
{
if (VPPCOM_DEBUG > 0)
clib_warning
("VCL<%d>: configured add_segment_size %ld (0x%lx)",
getpid (), vcl_cfg->add_segment_size,
vcl_cfg->add_segment_size);
}
else if (unformat (line_input, "preallocated-fifo-pairs %d",
&vcl_cfg->preallocated_fifo_pairs))
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured preallocated_fifo_pairs "
"%d (0x%x)", getpid (),
vcl_cfg->preallocated_fifo_pairs,
vcl_cfg->preallocated_fifo_pairs);
}
else if (unformat (line_input, "rx-fifo-size 0x%lx",
&vcl_cfg->rx_fifo_size))
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured rx_fifo_size 0x%lx (%ld)",
getpid (), vcl_cfg->rx_fifo_size,
vcl_cfg->rx_fifo_size);
}
else if (unformat (line_input, "rx-fifo-size %ld",
&vcl_cfg->rx_fifo_size))
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured rx_fifo_size %ld (0x%lx)",
getpid (), vcl_cfg->rx_fifo_size,
vcl_cfg->rx_fifo_size);
}
else if (unformat (line_input, "tx-fifo-size 0x%lx",
&vcl_cfg->tx_fifo_size))
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured tx_fifo_size 0x%lx (%ld)",
getpid (), vcl_cfg->tx_fifo_size,
vcl_cfg->tx_fifo_size);
}
else if (unformat (line_input, "tx-fifo-size %ld",
&vcl_cfg->tx_fifo_size))
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured tx_fifo_size %ld (0x%lx)",
getpid (), vcl_cfg->tx_fifo_size,
vcl_cfg->tx_fifo_size);
}
else if (unformat (line_input, "event-queue-size 0x%lx",
&vcl_cfg->event_queue_size))
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured event_queue_size "
"0x%lx (%ld)",
getpid (), vcl_cfg->event_queue_size,
vcl_cfg->event_queue_size);
}
else if (unformat (line_input, "event-queue-size %ld",
&vcl_cfg->event_queue_size))
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured event_queue_size "
"%ld (0x%lx)",
getpid (), vcl_cfg->event_queue_size,
vcl_cfg->event_queue_size);
}
else if (unformat (line_input, "listen-queue-size 0x%lx",
&vcl_cfg->listen_queue_size))
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured listen_queue_size "
"0x%lx (%ld)",
getpid (), vcl_cfg->listen_queue_size,
vcl_cfg->listen_queue_size);
}
else if (unformat (line_input, "listen-queue-size %ld",
&vcl_cfg->listen_queue_size))
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured listen_queue_size "
"%ld (0x%lx)",
getpid (), vcl_cfg->listen_queue_size,
vcl_cfg->listen_queue_size);
}
else if (unformat (line_input, "app-timeout %f",
&vcl_cfg->app_timeout))
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured app_timeout %f",
getpid (), vcl_cfg->app_timeout);
}
else if (unformat (line_input, "session-timeout %f",
&vcl_cfg->session_timeout))
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured session_timeout %f",
getpid (), vcl_cfg->session_timeout);
}
else if (unformat (line_input, "accept-timeout %f",
&vcl_cfg->accept_timeout))
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured accept_timeout %f",
getpid (), vcl_cfg->accept_timeout);
}
else if (unformat (line_input, "app-proxy-transport-tcp"))
{
vcl_cfg->app_proxy_transport_tcp = 1;
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured "
"app_proxy_transport_tcp (%d)",
getpid (), vcl_cfg->app_proxy_transport_tcp);
}
else if (unformat (line_input, "app-proxy-transport-udp"))
{
vcl_cfg->app_proxy_transport_udp = 1;
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured "
"app_proxy_transport_udp (%d)",
getpid (), vcl_cfg->app_proxy_transport_udp);
}
else if (unformat (line_input, "app-scope-local"))
{
vcl_cfg->app_scope_local = 1;
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured app_scope_local (%d)",
getpid (), vcl_cfg->app_scope_local);
}
else if (unformat (line_input, "app-scope-global"))
{
vcl_cfg->app_scope_global = 1;
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured app_scope_global (%d)",
getpid (), vcl_cfg->app_scope_global);
}
else if (unformat (line_input, "namespace-secret %lu",
&vcl_cfg->namespace_secret))
{
if (VPPCOM_DEBUG > 0)
clib_warning
("VCL<%d>: configured namespace_secret %lu (0x%lx)",
getpid (), vcl_cfg->namespace_secret,
vcl_cfg->namespace_secret);
}
else if (unformat (line_input, "namespace-id %v",
&vcl_cfg->namespace_id))
{
vl_api_application_attach_t *mp;
u32 max_nsid_vec_len = sizeof (mp->namespace_id) - 1;
u32 nsid_vec_len = vec_len (vcl_cfg->namespace_id);
if (nsid_vec_len > max_nsid_vec_len)
{
_vec_len (vcl_cfg->namespace_id) = max_nsid_vec_len;
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured namespace_id is "
"too long, truncated to %d characters!",
getpid (), max_nsid_vec_len);
}
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured namespace_id %v",
getpid (), vcl_cfg->namespace_id);
}
else if (unformat (line_input, "}"))
{
vc_cfg_input = 0;
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: completed parsing vppcom config!",
getpid ());
goto input_done;
}
else
{
if (line_input->buffer[line_input->index] != '#')
{
clib_warning ("VCL<%d>: Unknown vppcom config option: '%s'",
getpid (), (char *)
&line_input->buffer[line_input->index]);
}
}
}
}
input_done:
unformat_free (input);
file_done:
if (fd >= 0)
close (fd);
}
/*
* VPPCOM Public API functions
*/
int
vppcom_app_create (char *app_name)
{
vppcom_cfg_t *vcl_cfg = &vcm->cfg;
u8 *heap;
mheap_t *h;
int rv;
if (!vcm->init)
{
char *conf_fname;
char *env_var_str;
vcm->init = 1;
vppcom_cfg_init (vcl_cfg);
env_var_str = getenv (VPPCOM_ENV_DEBUG);
if (env_var_str)
{
u32 tmp;
if (sscanf (env_var_str, "%u", &tmp) != 1)
clib_warning ("VCL<%d>: WARNING: Invalid debug level specified "
"in the environment variable " VPPCOM_ENV_DEBUG
" (%s)!\n", getpid (), env_var_str);
else
{
vcm->debug = tmp;
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured VCL debug level (%u) from "
VPPCOM_ENV_DEBUG "!", getpid (), vcm->debug);
}
}
conf_fname = getenv (VPPCOM_ENV_CONF);
if (!conf_fname)
conf_fname = VPPCOM_CONF_DEFAULT;
vppcom_cfg_heapsize (conf_fname);
vcl_cfg = &vcm->cfg;
clib_spinlock_init (&vcm->session_fifo_lockp);
clib_fifo_validate (vcm->client_session_index_fifo,
vcm->cfg.listen_queue_size);
vppcom_cfg_read (conf_fname);
env_var_str = getenv (VPPCOM_ENV_API_PREFIX);
if (env_var_str)
{
if (vcl_cfg->vpp_api_filename)
vec_free (vcl_cfg->vpp_api_filename);
vcl_cfg->vpp_api_filename = format (0, "/%s-vpe-api%c",
env_var_str, 0);
vl_set_memory_root_path ((char *) env_var_str);
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured api prefix (%s) and "
"filename (%s) from " VPPCOM_ENV_API_PREFIX "!",
getpid (), env_var_str, vcl_cfg->vpp_api_filename);
}
env_var_str = getenv (VPPCOM_ENV_APP_NAMESPACE_ID);
if (env_var_str)
{
u32 ns_id_vec_len = strlen (env_var_str);
vec_reset_length (vcm->cfg.namespace_id);
vec_validate (vcm->cfg.namespace_id, ns_id_vec_len - 1);
clib_memcpy (vcm->cfg.namespace_id, env_var_str, ns_id_vec_len);
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured namespace_id (%v) from "
VPPCOM_ENV_APP_NAMESPACE_ID
"!", getpid (), vcm->cfg.namespace_id);
}
env_var_str = getenv (VPPCOM_ENV_APP_NAMESPACE_SECRET);
if (env_var_str)
{
u64 tmp;
if (sscanf (env_var_str, "%lu", &tmp) != 1)
clib_warning ("VCL<%d>: WARNING: Invalid namespace secret "
"specified in the environment variable "
VPPCOM_ENV_APP_NAMESPACE_SECRET
" (%s)!\n", getpid (), env_var_str);
else
{
vcm->cfg.namespace_secret = tmp;
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured namespace secret "
"(%lu) from "
VPPCOM_ENV_APP_NAMESPACE_SECRET
"!", getpid (), vcm->cfg.namespace_secret);
}
}
if (getenv (VPPCOM_ENV_APP_PROXY_TRANSPORT_TCP))
{
vcm->cfg.app_proxy_transport_tcp = 1;
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured app_proxy_transport_tcp "
"(%u) from "
VPPCOM_ENV_APP_PROXY_TRANSPORT_TCP
"!", getpid (), vcm->cfg.app_proxy_transport_tcp);
}
if (getenv (VPPCOM_ENV_APP_PROXY_TRANSPORT_UDP))
{
vcm->cfg.app_proxy_transport_udp = 1;
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured app_proxy_transport_udp "
"(%u) from "
VPPCOM_ENV_APP_PROXY_TRANSPORT_UDP
"!", getpid (), vcm->cfg.app_proxy_transport_udp);
}
if (getenv (VPPCOM_ENV_APP_SCOPE_LOCAL))
{
vcm->cfg.app_scope_local = 1;
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured app_scope_local (%u) from "
VPPCOM_ENV_APP_SCOPE_LOCAL
"!", getpid (), vcm->cfg.app_scope_local);
}
if (getenv (VPPCOM_ENV_APP_SCOPE_GLOBAL))
{
vcm->cfg.app_scope_global = 1;
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: configured app_scope_global (%u) from "
VPPCOM_ENV_APP_SCOPE_GLOBAL
"!", getpid (), vcm->cfg.app_scope_global);
}
vcm->main_cpu = os_get_thread_index ();
heap = clib_mem_get_per_cpu_heap ();
h = mheap_header (heap);
/* make the main heap thread-safe */
h->flags |= MHEAP_FLAG_THREAD_SAFE;
vcm->session_index_by_vpp_handles = hash_create (0, sizeof (uword));
clib_time_init (&vcm->clib_time);
vppcom_init_error_string_table ();
svm_fifo_segment_main_init (vcl_cfg->segment_baseva,
20 /* timeout in secs */ );
clib_spinlock_init (&vcm->sessions_lockp);
}
if (vcm->my_client_index == ~0)
{
/* API hookup and connect to VPP */
vppcom_api_hookup ();
vcm->app_state = STATE_APP_START;
rv = vppcom_connect_to_vpp (app_name);
if (rv)
{
clib_warning ("VCL<%d>: ERROR: couldn't connect to VPP!",
getpid ());
return rv;
}
/* State event handling thread */
rv = vce_start_event_thread (&(vcm->event_thread), 20);
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: sending session enable", getpid ());
rv = vppcom_app_session_enable ();
if (rv)
{
clib_warning ("VCL<%d>: ERROR: vppcom_app_session_enable() "
"failed!", getpid ());
return rv;
}
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: sending app attach", getpid ());
rv = vppcom_app_attach ();
if (rv)
{
clib_warning ("VCL<%d>: ERROR: vppcom_app_attach() failed!",
getpid ());
return rv;
}
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: app_name '%s', my_client_index %d (0x%x)",
getpid (), app_name, vcm->my_client_index,
vcm->my_client_index);
}
return VPPCOM_OK;
}
void
vppcom_app_destroy (void)
{
int rv;
if (vcm->my_client_index == ~0)
return;
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: detaching from VPP, my_client_index %d (0x%x)",
getpid (), vcm->my_client_index, vcm->my_client_index);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "app_detach:C:%d",
.format_args = "i4",
};
struct
{
u32 data;
} *ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, vcm->elog_track);
ed->data = vcm->my_client_index;
/* *INDENT-ON* */
}
vppcom_app_detach ();
rv = vppcom_wait_for_app_state_change (STATE_APP_ENABLED);
if (PREDICT_FALSE (rv))
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: application detach timed out! "
"returning %d (%s)",
getpid (), rv, vppcom_retval_str (rv));
}
/* Finished with logging before client gets reset to ~0 */
if (VPPCOM_DEBUG > 0)
write_elog ();
vl_client_disconnect_from_vlib ();
vcm->my_client_index = ~0;
vcm->app_state = STATE_APP_START;
}
int
vppcom_session_create (u8 proto, u8 is_nonblocking)
{
session_t *session;
u32 session_index;
session_state_t state;
elog_track_t session_elog_track;
clib_spinlock_lock (&vcm->sessions_lockp);
pool_get (vcm->sessions, session);
memset (session, 0, sizeof (*session));
session_index = session - vcm->sessions;
session->proto = proto;
session->state = STATE_START;
state = session->state;
session->vpp_handle = ~0;
if (is_nonblocking)
VCL_SESS_ATTR_SET (session->attr, VCL_SESS_ATTR_NONBLOCK);
else
VCL_SESS_ATTR_CLR (session->attr, VCL_SESS_ATTR_NONBLOCK);
if (VPPCOM_DEBUG > 0)
{
session->elog_track.name =
(char *) format (0, "C:%d:S:%d%c", vcm->my_client_index,
session_index, 0);
elog_track_register (&vcm->elog_main, &session->elog_track);
session_elog_track = session->elog_track;
}
clib_spinlock_unlock (&vcm->sessions_lockp);
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: sid %u", getpid (), session_index);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "session_create:proto:%d state:%d is_nonblocking:%d",
.format_args = "i4i4i4",
};
struct
{
u32 data[3];
} *ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session_elog_track);
ed->data[0] = proto;
ed->data[1] = state;
ed->data[2] = is_nonblocking;
/* *INDENT-ON* */
}
return (int) session_index;
}
int
vppcom_session_close (uint32_t session_index)
{
session_t *session = 0;
int rv;
u8 is_vep;
u8 is_vep_session;
u32 next_sid;
u32 vep_idx;
u64 vpp_handle;
uword *p;
session_state_t state;
elog_track_t session_elog_track;
VCL_LOCK_AND_GET_SESSION (session_index, &session);
is_vep = session->is_vep;
is_vep_session = session->is_vep_session;
next_sid = session->vep.next_sid;
vep_idx = session->vep.vep_idx;
state = session->state;
vpp_handle = session->vpp_handle;
clib_spinlock_unlock (&vcm->sessions_lockp);
/*
* Why two if(VPPCOM_DEBUG) checks?
*
* Eventually all clib_warnings need their own way of being
* logged and signalled (like severity) where event logging
* is a separate debugging tool. It will make the separation
* easier. ... parting is such sweet sorrow ...
*/
if (VPPCOM_DEBUG > 0)
{
session_elog_track = session->elog_track;
}
if (VPPCOM_DEBUG > 0)
{
if (is_vep)
clib_warning ("VCL<%d>: vep_idx %u / sid %u: "
"closing epoll session...",
getpid (), session_index, session_index);
else
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %d: "
"closing session...",
getpid (), vpp_handle, session_index);
}
if (is_vep)
{
while (next_sid != ~0)
{
rv = vppcom_epoll_ctl (session_index, EPOLL_CTL_DEL, next_sid, 0);
if ((VPPCOM_DEBUG > 0) && PREDICT_FALSE (rv < 0))
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: "
"EPOLL_CTL_DEL vep_idx %u failed! rv %d (%s)",
getpid (), vpp_handle, next_sid, vep_idx,
rv, vppcom_retval_str (rv));
VCL_LOCK_AND_GET_SESSION (session_index, &session);
next_sid = session->vep.next_sid;
clib_spinlock_unlock (&vcm->sessions_lockp);
}
}
else
{
if (is_vep_session)
{
rv = vppcom_epoll_ctl (vep_idx, EPOLL_CTL_DEL, session_index, 0);
if ((VPPCOM_DEBUG > 0) && (rv < 0))
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: "
"EPOLL_CTL_DEL vep_idx %u failed! rv %d (%s)",
getpid (), vpp_handle, session_index,
vep_idx, rv, vppcom_retval_str (rv));
}
if (state & STATE_LISTEN)
{
rv = vppcom_session_unbind (session_index);
if (PREDICT_FALSE (rv < 0))
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: "
"listener unbind failed! rv %d (%s)",
getpid (), vpp_handle, session_index,
rv, vppcom_retval_str (rv));
}
}
else if (state & (CLIENT_STATE_OPEN | SERVER_STATE_OPEN))
{
rv = vppcom_session_disconnect (session_index);
if (PREDICT_FALSE (rv < 0))
clib_warning ("VCL<%d>: ERROR: vpp handle 0x%llx, sid %u: "
"session disconnect failed! rv %d (%s)",
getpid (), vpp_handle, session_index,
rv, vppcom_retval_str (rv));
}
}
VCL_LOCK_AND_GET_SESSION (session_index, &session);
vpp_handle = session->vpp_handle;
if (vpp_handle != ~0)
{
p = hash_get (vcm->session_index_by_vpp_handles, vpp_handle);
if (p)
hash_unset (vcm->session_index_by_vpp_handles, vpp_handle);
}
pool_put_index (vcm->sessions, session_index);
clib_spinlock_unlock (&vcm->sessions_lockp);
if (VPPCOM_DEBUG > 0)
{
if (is_vep)
clib_warning ("VCL<%d>: vep_idx %u / sid %u: epoll session removed.",
getpid (), session_index, session_index);
else
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: session removed.",
getpid (), vpp_handle, session_index);
}
done:
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "session_close:rv:%d",
.format_args = "i4",
};
struct
{
u32 data;
} *ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session_elog_track);
ed->data = rv;
/* *INDENT-ON* */
}
return rv;
}
int
vppcom_session_bind (uint32_t session_index, vppcom_endpt_t * ep)
{
session_t *session = 0;
int rv;
if (!ep || !ep->ip)
return VPPCOM_EINVAL;
VCL_LOCK_AND_GET_SESSION (session_index, &session);
if (session->is_vep)
{
clib_spinlock_unlock (&vcm->sessions_lockp);
clib_warning ("VCL<%d>: ERROR: sid %u: cannot "
"bind to an epoll session!", getpid (), session_index);
rv = VPPCOM_EBADFD;
goto done;
}
session->lcl_addr.is_ip4 = ep->is_ip4;
session->lcl_addr.ip46 = to_ip46 (!ep->is_ip4, ep->ip);
session->lcl_port = ep->port;
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: sid %u: binding to local %s address %U "
"port %u, proto %s", getpid (), session_index,
session->lcl_addr.is_ip4 ? "IPv4" : "IPv6",
format_ip46_address, &session->lcl_addr.ip46,
session->lcl_addr.is_ip4,
clib_net_to_host_u16 (session->lcl_port),
session->proto ? "UDP" : "TCP");
if (VPPCOM_DEBUG > 0)
{
if (session->lcl_addr.is_ip4)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "bind local:%s:%d.%d.%d.%d:%d ",
.format_args = "t1i1i1i1i1i2",
.n_enum_strings = 2,
.enum_strings = {"TCP", "UDP",},
};
CLIB_PACKED (struct {
u8 proto;
u8 addr[4];
u16 port;
}) *ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->proto = session->proto;
ed->addr[0] = session->lcl_addr.ip46.ip4.as_u8[0];
ed->addr[1] = session->lcl_addr.ip46.ip4.as_u8[1];
ed->addr[2] = session->lcl_addr.ip46.ip4.as_u8[2];
ed->addr[3] = session->lcl_addr.ip46.ip4.as_u8[3];
ed->port = clib_net_to_host_u16 (session->lcl_port);
/* *INDENT-ON* */
}
}
clib_spinlock_unlock (&vcm->sessions_lockp);
done:
return rv;
}
int
vppcom_session_listen (uint32_t listen_session_index, uint32_t q_len)
{
session_t *listen_session = 0;
u64 listen_vpp_handle;
int rv, retval;
if (q_len == 0 || q_len == ~0)
q_len = vcm->cfg.listen_queue_size;
VCL_LOCK_AND_GET_SESSION (listen_session_index, &listen_session);
if (listen_session->is_vep)
{
clib_spinlock_unlock (&vcm->sessions_lockp);
clib_warning ("VCL<%d>: ERROR: sid %u: cannot listen on an "
"epoll session!", getpid (), listen_session_index);
rv = VPPCOM_EBADFD;
goto done;
}
listen_vpp_handle = listen_session->vpp_handle;
if (listen_session->state & STATE_LISTEN)
{
clib_spinlock_unlock (&vcm->sessions_lockp);
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: "
"already in listen state!",
getpid (), listen_vpp_handle, listen_session_index);
rv = VPPCOM_OK;
goto done;
}
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: vpp handle 0x%llx, "
"sid %u: sending bind request...",
getpid (), listen_vpp_handle, listen_session_index);
vppcom_send_bind_sock (listen_session, listen_session_index);
clib_spinlock_unlock (&vcm->sessions_lockp);
retval =
vppcom_wait_for_session_state_change (listen_session_index, STATE_LISTEN,
vcm->cfg.session_timeout);
VCL_LOCK_AND_GET_SESSION (listen_session_index, &listen_session);
if (PREDICT_FALSE (retval))
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: bind failed! "
"returning %d (%s)", getpid (),
listen_session->vpp_handle, listen_session_index,
retval, vppcom_retval_str (retval));
clib_spinlock_unlock (&vcm->sessions_lockp);
rv = retval;
goto done;
}
clib_spinlock_lock (&vcm->session_fifo_lockp);
clib_fifo_validate (vcm->client_session_index_fifo, q_len);
clib_spinlock_unlock (&vcm->session_fifo_lockp);
clib_spinlock_unlock (&vcm->sessions_lockp);
done:
return rv;
}
int
vppcom_session_register_listener (uint32_t session_index,
vppcom_session_listener_cb cb,
vppcom_session_listener_errcb
errcb, uint8_t flags, int q_len, void *ptr)
{
int rv = VPPCOM_OK;
vce_event_key_t evk;
vppcom_session_listener_t *listener_args;
rv = vppcom_session_listen (session_index, q_len);
if (rv)
{
goto done;
}
/* Register handler for connect_request event on listen_session_index */
listener_args = clib_mem_alloc (sizeof (vppcom_session_listener_t));
listener_args->user_cb = cb;
listener_args->user_cb_data = ptr;
listener_args->user_errcb = errcb;
evk.session_index = session_index;
evk.eid = VCL_EVENT_CONNECT_REQ_ACCEPTED;
(void) vce_register_handler (&vcm->event_thread, &evk,
vce_registered_listener_connect_handler_fn,
listener_args);
done:
return rv;
}
int
validate_args_session_accept_ (session_t * listen_session)
{
u32 listen_session_index = listen_session - vcm->sessions;
/* Input validation - expects spinlock on sessions_lockp */
if (listen_session->is_vep)
{
clib_warning ("VCL<%d>: ERROR: sid %u: cannot accept on an "
"epoll session!", getpid (), listen_session_index);
return VPPCOM_EBADFD;
}
if (listen_session->state != STATE_LISTEN)
{
clib_warning ("VCL<%d>: ERROR: vpp handle 0x%llx, sid %u: "
"not in listen state! state 0x%x (%s)", getpid (),
listen_session->vpp_handle, listen_session_index,
listen_session->state,
vppcom_session_state_str (listen_session->state));
return VPPCOM_EBADFD;
}
return VPPCOM_OK;
}
int
vppcom_session_accept (uint32_t listen_session_index, vppcom_endpt_t * ep,
uint32_t flags)
{
session_t *listen_session = 0;
session_t *client_session = 0;
u32 client_session_index = ~0;
int rv;
u64 listen_vpp_handle;
vce_event_handler_reg_t *reg;
vce_event_t *ev;
vce_event_connect_request_t *result;
struct timespec ts;
struct timeval tv;
int millisecond_timeout = 1;
int hours_timeout = 20 * 60 * 60;
VCL_LOCK_AND_GET_SESSION (listen_session_index, &listen_session);
listen_vpp_handle = listen_session->vpp_handle; // For debugging
rv = validate_args_session_accept_ (listen_session);
if (rv)
{
clib_spinlock_unlock (&vcm->sessions_lockp);
goto done;
}
/* Using an aggressive timer of 1ms and a generous timer of
* 20 hours, we can implement a blocking and non-blocking listener
* as both event and time driven */
gettimeofday (&tv, NULL);
ts.tv_nsec = (tv.tv_usec * 1000) + (1000 * millisecond_timeout);
ts.tv_sec = tv.tv_sec;
/* Predict that the Listener is blocking more often than not */
if (PREDICT_TRUE (!VCL_SESS_ATTR_TEST (listen_session->attr,
VCL_SESS_ATTR_NONBLOCK)))
ts.tv_sec += hours_timeout;
clib_spinlock_unlock (&vcm->sessions_lockp);
/* Register handler for connect_request event on listen_session_index */
vce_event_key_t evk;
evk.session_index = listen_session_index;
evk.eid = VCL_EVENT_CONNECT_REQ_ACCEPTED;
reg = vce_register_handler (&vcm->event_thread, &evk,
vce_connect_request_handler_fn, 0);
ev = vce_get_event_from_index (&vcm->event_thread, reg->ev_idx);
pthread_mutex_lock (&reg->handler_lock);
while (!ev)
{
rv =
pthread_cond_timedwait (&reg->handler_cond, &reg->handler_lock, &ts);
if (rv == ETIMEDOUT)
{
rv = VPPCOM_EAGAIN;
goto cleanup;
}
ev = vce_get_event_from_index (&vcm->event_thread, reg->ev_idx);
}
result = (vce_event_connect_request_t *) ev->data;
client_session_index = result->accepted_session_index;
/* Remove from the FIFO used to service epoll */
clib_spinlock_lock (&vcm->session_fifo_lockp);
if (clib_fifo_elts (vcm->client_session_index_fifo))
{
u32 tmp_client_session_index;
clib_fifo_sub1 (vcm->client_session_index_fifo,
tmp_client_session_index);
/* It wasn't ours... put it back ... */
if (tmp_client_session_index != client_session_index)
clib_fifo_add1 (vcm->client_session_index_fifo,
tmp_client_session_index);
}
clib_spinlock_unlock (&vcm->session_fifo_lockp);
clib_spinlock_lock (&vcm->sessions_lockp);
rv = vppcom_session_at_index (client_session_index, &client_session);
if (PREDICT_FALSE (rv))
{
rv = VPPCOM_ECONNABORTED;
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: client sid %u "
"lookup failed! returning %d (%s)", getpid (),
listen_vpp_handle, listen_session_index,
client_session_index, rv, vppcom_retval_str (rv));
goto done;
}
if (flags & O_NONBLOCK)
VCL_SESS_ATTR_SET (client_session->attr, VCL_SESS_ATTR_NONBLOCK);
else
VCL_SESS_ATTR_CLR (client_session->attr, VCL_SESS_ATTR_NONBLOCK);
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: Got a client request! "
"vpp handle 0x%llx, sid %u, flags %d, is_nonblocking %u",
getpid (), listen_vpp_handle, listen_session_index,
client_session->vpp_handle, client_session_index,
flags, VCL_SESS_ATTR_TEST (client_session->attr,
VCL_SESS_ATTR_NONBLOCK));
if (ep)
{
ep->is_ip4 = client_session->peer_addr.is_ip4;
ep->port = client_session->peer_port;
if (client_session->peer_addr.is_ip4)
clib_memcpy (ep->ip, &client_session->peer_addr.ip46.ip4,
sizeof (ip4_address_t));
else
clib_memcpy (ep->ip, &client_session->peer_addr.ip46.ip6,
sizeof (ip6_address_t));
}
vppcom_send_accept_session_reply (client_session->vpp_handle,
client_session->client_context,
0 /* retval OK */ );
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: accepted vpp handle "
"0x%llx, sid %u connection to local %s address "
"%U port %u", getpid (), listen_vpp_handle,
listen_session_index, client_session->vpp_handle,
client_session_index,
client_session->lcl_addr.is_ip4 ? "IPv4" : "IPv6",
format_ip46_address, &client_session->lcl_addr.ip46,
client_session->lcl_addr.is_ip4,
clib_net_to_host_u16 (client_session->lcl_port));
if (VPPCOM_DEBUG > 0)
{
client_session->elog_track.name =
(char *) format (0, "C:%d:S:%d%c", vcm->my_client_index,
client_session_index, 0);
elog_track_register (&vcm->elog_main, &client_session->elog_track);
// Two elog entries due to 20-byte per entry constraint.
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "accept: listen_handle:%x from_handle:%x",
.format_args = "i8i8",
};
struct
{
u64 handle[2];
} *ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, client_session->elog_track);
ed->handle[0] = listen_vpp_handle;
ed->handle[1] = client_session->vpp_handle;
/* *INDENT-ON* */
if (client_session->lcl_addr.is_ip4)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e2) =
{
.format = "accept: S:%d %d.%d.%d.%d:%d ",
.format_args = "i4i1i1i1i1i2",
};
CLIB_PACKED (struct {
u32 session;
u8 addr[4];
u16 port;
}) *ed2;
ed2 =
ELOG_TRACK_DATA (&vcm->elog_main, e2, client_session->elog_track);
ed2->session = client_session_index;
ed2->addr[0] = client_session->lcl_addr.ip46.ip4.as_u8[0];
ed2->addr[1] = client_session->lcl_addr.ip46.ip4.as_u8[1];
ed2->addr[2] = client_session->lcl_addr.ip46.ip4.as_u8[2];
ed2->addr[3] = client_session->lcl_addr.ip46.ip4.as_u8[3];
ed2->port = clib_net_to_host_u16 (client_session->lcl_port);
/* *INDENT-ON* */
}
}
clib_spinlock_unlock (&vcm->sessions_lockp);
rv = (int) client_session_index;
vce_clear_event (&vcm->event_thread, ev);
cleanup:
vce_unregister_handler (&vcm->event_thread, reg);
pthread_mutex_unlock (&reg->handler_lock);
done:
return rv;
}
int
vppcom_session_connect (uint32_t session_index, vppcom_endpt_t * server_ep)
{
session_t *session = 0;
u64 vpp_handle = 0;
int rv, retval = VPPCOM_OK;
VCL_LOCK_AND_GET_SESSION (session_index, &session);
if (PREDICT_FALSE (session->is_vep))
{
clib_spinlock_unlock (&vcm->sessions_lockp);
clib_warning ("VCL<%d>: ERROR: sid %u: cannot "
"connect on an epoll session!", getpid (), session_index);
rv = VPPCOM_EBADFD;
goto done;
}
if (PREDICT_FALSE (session->state & CLIENT_STATE_OPEN))
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: session already "
"connected to %s %U port %d proto %s, state 0x%x (%s)",
getpid (), session->vpp_handle, session_index,
session->peer_addr.is_ip4 ? "IPv4" : "IPv6",
format_ip46_address,
&session->peer_addr.ip46, session->peer_addr.is_ip4,
clib_net_to_host_u16 (session->peer_port),
session->proto ? "UDP" : "TCP", session->state,
vppcom_session_state_str (session->state));
clib_spinlock_unlock (&vcm->sessions_lockp);
goto done;
}
session->peer_addr.is_ip4 = server_ep->is_ip4;
session->peer_addr.ip46 = to_ip46 (!server_ep->is_ip4, server_ep->ip);
session->peer_port = server_ep->port;
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: connecting to server "
"%s %U port %d proto %s",
getpid (), session->vpp_handle, session_index,
session->peer_addr.is_ip4 ? "IPv4" : "IPv6",
format_ip46_address,
&session->peer_addr.ip46, session->peer_addr.is_ip4,
clib_net_to_host_u16 (session->peer_port),
session->proto ? "UDP" : "TCP");
vppcom_send_connect_sock (session, session_index);
clib_spinlock_unlock (&vcm->sessions_lockp);
retval =
vppcom_wait_for_session_state_change (session_index, STATE_CONNECT,
vcm->cfg.session_timeout);
VCL_LOCK_AND_GET_SESSION (session_index, &session);
vpp_handle = session->vpp_handle;
clib_spinlock_unlock (&vcm->sessions_lockp);
done:
if (PREDICT_FALSE (retval))
{
rv = retval;
if (VPPCOM_DEBUG > 0)
{
if (session)
clib_warning
("VCL<%d>: vpp handle 0x%llx, sid %u: connect failed! "
"returning %d (%s)", getpid (), vpp_handle,
session_index, rv, vppcom_retval_str (rv));
else
clib_warning ("VCL<%d>: no session for sid %u: connect failed! "
"returning %d (%s)", getpid (),
session_index, rv, vppcom_retval_str (rv));
}
}
else if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: connected!",
getpid (), vpp_handle, session_index);
return rv;
}
static inline int
vppcom_session_read_internal (uint32_t session_index, void *buf, int n,
u8 peek)
{
session_t *session = 0;
svm_fifo_t *rx_fifo;
int n_read = 0;
int rv;
int is_nonblocking;
u64 vpp_handle;
u32 poll_et;
session_state_t state;
ASSERT (buf);
VCL_LOCK_AND_GET_SESSION (session_index, &session);
is_nonblocking = VCL_SESS_ATTR_TEST (session->attr, VCL_SESS_ATTR_NONBLOCK);
rx_fifo = session->rx_fifo;
state = session->state;
vpp_handle = session->vpp_handle;
if (PREDICT_FALSE (session->is_vep))
{
clib_spinlock_unlock (&vcm->sessions_lockp);
clib_warning ("VCL<%d>: ERROR: sid %u: cannot "
"read from an epoll session!", getpid (), session_index);
rv = VPPCOM_EBADFD;
goto done;
}
if (PREDICT_FALSE (!(state & (SERVER_STATE_OPEN | CLIENT_STATE_OPEN))))
{
clib_spinlock_unlock (&vcm->sessions_lockp);
rv = ((state & STATE_DISCONNECT) ? VPPCOM_ECONNRESET : VPPCOM_ENOTCONN);
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: %s session is "
"not open! state 0x%x (%s), returning %d (%s)",
getpid (), vpp_handle, session_index, state,
vppcom_session_state_str (state),
rv, vppcom_retval_str (rv));
goto done;
}
clib_spinlock_unlock (&vcm->sessions_lockp);
do
{
if (peek)
n_read = svm_fifo_peek (rx_fifo, 0, n, buf);
else
n_read = svm_fifo_dequeue_nowait (rx_fifo, n, buf);
}
while (!is_nonblocking && (n_read <= 0));
if (n_read <= 0)
{
VCL_LOCK_AND_GET_SESSION (session_index, &session);
poll_et = (((EPOLLET | EPOLLIN) & session->vep.ev.events) ==
(EPOLLET | EPOLLIN));
if (poll_et)
session->vep.et_mask |= EPOLLIN;
if (state & STATE_CLOSE_ON_EMPTY)
{
rv = VPPCOM_ECONNRESET;
if (VPPCOM_DEBUG > 1)
{
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: Empty fifo "
"with session state 0x%x (%s)!"
" Setting state to 0x%x (%s), returning %d (%s)",
getpid (), session->vpp_handle, session_index,
state, vppcom_session_state_str (state),
STATE_DISCONNECT,
vppcom_session_state_str (STATE_DISCONNECT), rv,
vppcom_retval_str (rv));
}
session->state = STATE_DISCONNECT;
}
else
rv = VPPCOM_EAGAIN;
clib_spinlock_unlock (&vcm->sessions_lockp);
}
else
rv = n_read;
if (VPPCOM_DEBUG > 2)
{
if (rv > 0)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: read %d bytes "
"from (%p)", getpid (), vpp_handle,
session_index, n_read, rx_fifo);
else
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: nothing read! "
"returning %d (%s)", getpid (), vpp_handle,
session_index, rv, vppcom_retval_str (rv));
}
done:
return rv;
}
int
vppcom_session_read (uint32_t session_index, void *buf, size_t n)
{
return (vppcom_session_read_internal (session_index, buf, n, 0));
}
static int
vppcom_session_peek (uint32_t session_index, void *buf, int n)
{
return (vppcom_session_read_internal (session_index, buf, n, 1));
}
static inline int
vppcom_session_read_ready (session_t * session, u32 session_index)
{
int ready = 0;
u32 poll_et;
int rv;
session_state_t state = session->state;
u64 vpp_handle = session->vpp_handle;
/* Assumes caller has acquired spinlock: vcm->sessions_lockp */
if (PREDICT_FALSE (session->is_vep))
{
clib_warning ("VCL<%d>: ERROR: sid %u: cannot read from an "
"epoll session!", getpid (), session_index);
rv = VPPCOM_EBADFD;
goto done;
}
if (session->state & STATE_LISTEN)
{
clib_spinlock_lock (&vcm->session_fifo_lockp);
ready = clib_fifo_elts (vcm->client_session_index_fifo);
clib_spinlock_unlock (&vcm->session_fifo_lockp);
}
else
{
if (!(state & (SERVER_STATE_OPEN | CLIENT_STATE_OPEN | STATE_LISTEN)))
{
rv = ((state & STATE_DISCONNECT) ? VPPCOM_ECONNRESET :
VPPCOM_ENOTCONN);
if (VPPCOM_DEBUG > 1)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: session is "
"not open! state 0x%x (%s), returning %d (%s)",
getpid (), vpp_handle, session_index,
state, vppcom_session_state_str (state),
rv, vppcom_retval_str (rv));
goto done;
}
ready = svm_fifo_max_dequeue (session->rx_fifo);
}
if (ready == 0)
{
poll_et =
((EPOLLET | EPOLLIN) & session->vep.ev.events) == (EPOLLET | EPOLLIN);
if (poll_et)
session->vep.et_mask |= EPOLLIN;
if (state & STATE_CLOSE_ON_EMPTY)
{
rv = VPPCOM_ECONNRESET;
if (VPPCOM_DEBUG > 1)
{
clib_warning ("VCL<%d>: vpp handle 0x%llx, "
"sid %u: Empty fifo with"
" session state 0x%x (%s)! Setting state to "
"0x%x (%s), returning %d (%s)",
getpid (), session_index, vpp_handle,
state, vppcom_session_state_str (state),
STATE_DISCONNECT,
vppcom_session_state_str (STATE_DISCONNECT), rv,
vppcom_retval_str (rv));
}
session->state = STATE_DISCONNECT;
goto done;
}
}
rv = ready;
if (vcm->app_event_queue->cursize &&
!pthread_mutex_trylock (&vcm->app_event_queue->mutex))
{
u32 i, n_to_dequeue = vcm->app_event_queue->cursize;
session_fifo_event_t e;
for (i = 0; i < n_to_dequeue; i++)
svm_queue_sub_raw (vcm->app_event_queue, (u8 *) & e);
pthread_mutex_unlock (&vcm->app_event_queue->mutex);
}
done:
return rv;
}
int
vppcom_session_write (uint32_t session_index, void *buf, size_t n)
{
session_t *session = 0;
svm_fifo_t *tx_fifo = 0;
svm_queue_t *q;
session_fifo_event_t evt;
session_state_t state;
int rv, n_write, is_nonblocking;
u32 poll_et;
u64 vpp_handle;
ASSERT (buf);
VCL_LOCK_AND_GET_SESSION (session_index, &session);
tx_fifo = session->tx_fifo;
is_nonblocking = VCL_SESS_ATTR_TEST (session->attr, VCL_SESS_ATTR_NONBLOCK);
vpp_handle = session->vpp_handle;
state = session->state;
if (PREDICT_FALSE (session->is_vep))
{
clib_spinlock_unlock (&vcm->sessions_lockp);
clib_warning ("VCL<%d>: ERROR: vpp handle 0x%llx, sid %u: "
"cannot write to an epoll session!",
getpid (), vpp_handle, session_index);
rv = VPPCOM_EBADFD;
goto done;
}
if (!(session->state & (SERVER_STATE_OPEN | CLIENT_STATE_OPEN)))
{
rv =
((session->state & STATE_DISCONNECT) ? VPPCOM_ECONNRESET :
VPPCOM_ENOTCONN);
clib_spinlock_unlock (&vcm->sessions_lockp);
if (VPPCOM_DEBUG > 1)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: "
"session is not open! state 0x%x (%s)",
getpid (), vpp_handle, session_index,
state, vppcom_session_state_str (state));
goto done;
}
clib_spinlock_unlock (&vcm->sessions_lockp);
do
{
n_write = svm_fifo_enqueue_nowait (tx_fifo, n, (void *) buf);
}
while (!is_nonblocking && (n_write <= 0));
/* If event wasn't set, add one */
if ((n_write > 0) && svm_fifo_set_event (tx_fifo))
{
/* Fabricate TX event, send to vpp */
evt.fifo = tx_fifo;
evt.event_type = FIFO_EVENT_APP_TX;
VCL_LOCK_AND_GET_SESSION (session_index, &session);
q = session->vpp_event_queue;
ASSERT (q);
svm_queue_add (q, (u8 *) & evt, 0 /* do wait for mutex */ );
clib_spinlock_unlock (&vcm->sessions_lockp);
if (VPPCOM_DEBUG > 1)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: "
"added FIFO_EVENT_APP_TX to "
"vpp_event_q %p, n_write %d", getpid (),
vpp_handle, session_index, q, n_write);
}
if (n_write <= 0)
{
VCL_LOCK_AND_GET_SESSION (session_index, &session);
poll_et = (((EPOLLET | EPOLLOUT) & session->vep.ev.events) ==
(EPOLLET | EPOLLOUT));
if (poll_et)
session->vep.et_mask |= EPOLLOUT;
if (session->state & STATE_CLOSE_ON_EMPTY)
{
rv = VPPCOM_ECONNRESET;
if (VPPCOM_DEBUG > 1)
{
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: "
"Empty fifo with session state 0x%x (%s)!"
" Setting state to 0x%x (%s), returning %d (%s)",
getpid (), session->vpp_handle, session_index,
session->state,
vppcom_session_state_str (session->state),
STATE_DISCONNECT,
vppcom_session_state_str (STATE_DISCONNECT), rv,
vppcom_retval_str (rv));
}
session->state = STATE_DISCONNECT;
}
else
rv = VPPCOM_EAGAIN;
clib_spinlock_unlock (&vcm->sessions_lockp);
}
else
rv = n_write;
if (VPPCOM_DEBUG > 2)
{
if (n_write <= 0)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: "
"FIFO-FULL (%p)", getpid (), vpp_handle,
session_index, tx_fifo);
else
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: "
"wrote %d bytes tx-fifo: (%p)", getpid (),
vpp_handle, session_index, n_write, tx_fifo);
}
done:
return rv;
}
static inline int
vppcom_session_write_ready (session_t * session, u32 session_index)
{
int ready;
u32 poll_et;
int rv;
ASSERT (session);
/* Assumes caller has acquired spinlock: vcm->sessions_lockp */
if (PREDICT_FALSE (session->is_vep))
{
clib_warning ("VCL<%d>: ERROR: vpp handle 0x%llx, sid %u: "
"cannot write to an epoll session!",
getpid (), session->vpp_handle, session_index);
rv = VPPCOM_EBADFD;
goto done;
}
if (PREDICT_FALSE (session->state & STATE_LISTEN))
{
clib_warning ("VCL<%d>: ERROR: vpp handle 0x%llx, sid %u: "
"cannot write to a listen session!",
getpid (), session->vpp_handle, session_index);
rv = VPPCOM_EBADFD;
goto done;
}
if (!(session->state & (SERVER_STATE_OPEN | CLIENT_STATE_OPEN)))
{
session_state_t state = session->state;
rv = ((state & STATE_DISCONNECT) ? VPPCOM_ECONNRESET : VPPCOM_ENOTCONN);
clib_warning ("VCL<%d>: ERROR: vpp handle 0x%llx, sid %u: "
"session is not open! state 0x%x (%s), "
"returning %d (%s)", getpid (), session->vpp_handle,
session_index,
state, vppcom_session_state_str (state),
rv, vppcom_retval_str (rv));
goto done;
}
ready = svm_fifo_max_enqueue (session->tx_fifo);
if (VPPCOM_DEBUG > 3)
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: "
"peek %s (%p), ready = %d", getpid (),
session->vpp_handle, session_index,
session->tx_fifo, ready);
if (ready == 0)
{
poll_et = (((EPOLLET | EPOLLOUT) & session->vep.ev.events) ==
(EPOLLET | EPOLLOUT));
if (poll_et)
session->vep.et_mask |= EPOLLOUT;
if (session->state & STATE_CLOSE_ON_EMPTY)
{
rv = VPPCOM_ECONNRESET;
if (VPPCOM_DEBUG > 1)
{
clib_warning ("VCL<%d>: vpp handle 0x%llx, sid %u: "
"Empty fifo with session "
"state 0x%x (%s)! Setting state to 0x%x (%s), "
"returning %d (%s)", getpid (),
session->vpp_handle, session_index,
session->state,
vppcom_session_state_str (session->state),
STATE_DISCONNECT,
vppcom_session_state_str (STATE_DISCONNECT), rv,
vppcom_retval_str (rv));
}
session->state = STATE_DISCONNECT;
goto done;
}
}
rv = ready;
done:
return rv;
}
int
vppcom_select (unsigned long n_bits, unsigned long *read_map,
unsigned long *write_map, unsigned long *except_map,
double time_to_wait)
{
u32 session_index;
session_t *session = 0;
int rv, bits_set = 0;
f64 timeout = clib_time_now (&vcm->clib_time) + time_to_wait;
u32 minbits = clib_max (n_bits, BITS (uword));
ASSERT (sizeof (clib_bitmap_t) == sizeof (long int));
if (n_bits && read_map)
{
clib_bitmap_validate (vcm->rd_bitmap, minbits);
clib_memcpy (vcm->rd_bitmap, read_map,
vec_len (vcm->rd_bitmap) * sizeof (clib_bitmap_t));
memset (read_map, 0, vec_len (vcm->rd_bitmap) * sizeof (clib_bitmap_t));
}
if (n_bits && write_map)
{
clib_bitmap_validate (vcm->wr_bitmap, minbits);
clib_memcpy (vcm->wr_bitmap, write_map,
vec_len (vcm->wr_bitmap) * sizeof (clib_bitmap_t));
memset (write_map, 0,
vec_len (vcm->wr_bitmap) * sizeof (clib_bitmap_t));
}
if (n_bits && except_map)
{
clib_bitmap_validate (vcm->ex_bitmap, minbits);
clib_memcpy (vcm->ex_bitmap, except_map,
vec_len (vcm->ex_bitmap) * sizeof (clib_bitmap_t));
memset (except_map, 0,
vec_len (vcm->ex_bitmap) * sizeof (clib_bitmap_t));
}
do
{
/* *INDENT-OFF* */
if (n_bits)
{
if (read_map)
{
clib_bitmap_foreach (session_index, vcm->rd_bitmap,
({
clib_spinlock_lock (&vcm->sessions_lockp);
rv = vppcom_session_at_index (session_index, &session);
if (rv < 0)
{
clib_spinlock_unlock (&vcm->sessions_lockp);
if (VPPCOM_DEBUG > 1)
clib_warning ("VCL<%d>: session %d specified in "
"read_map is closed.", getpid (),
session_index);
bits_set = VPPCOM_EBADFD;
goto select_done;
}
if (session->state & STATE_LISTEN)
{
vce_event_handler_reg_t *reg = 0;
vce_event_key_t evk;
/* Check if handler already registered for this
* event.
* If not, register handler for connect_request event
* on listen_session_index
*/
evk.session_index = session_index;
evk.eid = VCL_EVENT_CONNECT_REQ_ACCEPTED;
reg = vce_get_event_handler (&vcm->event_thread, &evk);
if (!reg)
reg = vce_register_handler (&vcm->event_thread, &evk,
vce_poll_wait_connect_request_handler_fn,
0 /* No callback args */);
rv = vppcom_session_read_ready (session, session_index);
if (rv > 0)
{
vce_unregister_handler (&vcm->event_thread, reg);
}
}
else
rv = vppcom_session_read_ready (session, session_index);
clib_spinlock_unlock (&vcm->sessions_lockp);
if (except_map && vcm->ex_bitmap &&
clib_bitmap_get (vcm->ex_bitmap, session_index) &&
(rv < 0))
{
clib_bitmap_set_no_check (except_map, session_index, 1);
bits_set++;
}
else if (rv > 0)
{
clib_bitmap_set_no_check (read_map, session_index, 1);
bits_set++;
}
}));
}
if (write_map)
{
clib_bitmap_foreach (session_index, vcm->wr_bitmap,
({
clib_spinlock_lock (&vcm->sessions_lockp);
rv = vppcom_session_at_index (session_index, &session);
if (rv < 0)
{
clib_spinlock_unlock (&vcm->sessions_lockp);
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: session %d specified in "
"write_map is closed.", getpid (),
session_index);
bits_set = VPPCOM_EBADFD;
goto select_done;
}
rv = vppcom_session_write_ready (session, session_index);
clib_spinlock_unlock (&vcm->sessions_lockp);
if (write_map && (rv > 0))
{
clib_bitmap_set_no_check (write_map, session_index, 1);
bits_set++;
}
}));
}
if (except_map)
{
clib_bitmap_foreach (session_index, vcm->ex_bitmap,
({
clib_spinlock_lock (&vcm->sessions_lockp);
rv = vppcom_session_at_index (session_index, &session);
if (rv < 0)
{
clib_spinlock_unlock (&vcm->sessions_lockp);
if (VPPCOM_DEBUG > 1)
clib_warning ("VCL<%d>: session %d specified in "
"except_map is closed.", getpid (),
session_index);
bits_set = VPPCOM_EBADFD;
goto select_done;
}
rv = vppcom_session_read_ready (session, session_index);
clib_spinlock_unlock (&vcm->sessions_lockp);
if (rv < 0)
{
clib_bitmap_set_no_check (except_map, session_index, 1);
bits_set++;
}
}));
}
}
/* *INDENT-ON* */
}
while ((time_to_wait == -1) || (clib_time_now (&vcm->clib_time) < timeout));
select_done:
return (bits_set);
}
static inline void
vep_verify_epoll_chain (u32 vep_idx)
{
session_t *session;
vppcom_epoll_t *vep;
int rv;
u32 sid = vep_idx;
if (VPPCOM_DEBUG <= 1)
return;
/* Assumes caller has acquired spinlock: vcm->sessions_lockp */
rv = vppcom_session_at_index (vep_idx, &session);
if (PREDICT_FALSE (rv))
{
clib_warning ("VCL<%d>: ERROR: Invalid vep_idx (%u)!",
getpid (), vep_idx);
goto done;
}
if (PREDICT_FALSE (!session->is_vep))
{
clib_warning ("VCL<%d>: ERROR: vep_idx (%u) is not a vep!",
getpid (), vep_idx);
goto done;
}
vep = &session->vep;
clib_warning ("VCL<%d>: vep_idx (%u): Dumping epoll chain\n"
"{\n"
" is_vep = %u\n"
" is_vep_session = %u\n"
" next_sid = 0x%x (%u)\n"
" wait_cont_idx = 0x%x (%u)\n"
"}\n", getpid (), vep_idx,
session->is_vep, session->is_vep_session,
vep->next_sid, vep->next_sid,
session->wait_cont_idx, session->wait_cont_idx);
for (sid = vep->next_sid; sid != ~0; sid = vep->next_sid)
{
rv = vppcom_session_at_index (sid, &session);
if (PREDICT_FALSE (rv))
{
clib_warning ("VCL<%d>: ERROR: Invalid sid (%u)!", getpid (), sid);
goto done;
}
if (PREDICT_FALSE (session->is_vep))
clib_warning ("VCL<%d>: ERROR: sid (%u) is a vep!",
getpid (), vep_idx);
else if (PREDICT_FALSE (!session->is_vep_session))
{
clib_warning ("VCL<%d>: ERROR: session (%u) "
"is not a vep session!", getpid (), sid);
goto done;
}
vep = &session->vep;
if (PREDICT_FALSE (vep->vep_idx != vep_idx))
clib_warning ("VCL<%d>: ERROR: session (%u) vep_idx (%u) != "
"vep_idx (%u)!", getpid (),
sid, session->vep.vep_idx, vep_idx);
if (session->is_vep_session)
{
clib_warning ("vep_idx[%u]: sid 0x%x (%u)\n"
"{\n"
" next_sid = 0x%x (%u)\n"
" prev_sid = 0x%x (%u)\n"
" vep_idx = 0x%x (%u)\n"
" ev.events = 0x%x\n"
" ev.data.u64 = 0x%llx\n"
" et_mask = 0x%x\n"
"}\n",
vep_idx, sid, sid,
vep->next_sid, vep->next_sid,
vep->prev_sid, vep->prev_sid,
vep->vep_idx, vep->vep_idx,
vep->ev.events, vep->ev.data.u64, vep->et_mask);
}
}
done:
clib_warning ("VCL<%d>: vep_idx (%u): Dump complete!\n",
getpid (), vep_idx);
}
int
vppcom_epoll_create (void)
{
session_t *vep_session;
u32 vep_idx;
elog_track_t vep_elog_track;
clib_spinlock_lock (&vcm->sessions_lockp);
pool_get (vcm->sessions, vep_session);
memset (vep_session, 0, sizeof (*vep_session));
vep_idx = vep_session - vcm->sessions;
vep_session->is_vep = 1;
vep_session->vep.vep_idx = ~0;
vep_session->vep.next_sid = ~0;
vep_session->vep.prev_sid = ~0;
vep_session->wait_cont_idx = ~0;
vep_session->vpp_handle = ~0;
vep_session->poll_reg = 0;
if (VPPCOM_DEBUG > 0)
{
vep_session->elog_track.name =
(char *) format (0, "C:%d:VEP:%d%c", vcm->my_client_index,
vep_idx, 0);
elog_track_register (&vcm->elog_main, &vep_session->elog_track);
vep_elog_track = vep_session->elog_track;
}
clib_spinlock_unlock (&vcm->sessions_lockp);
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: Created vep_idx %u / sid %u!",
getpid (), vep_idx, vep_idx);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "created epoll session:%d",
.format_args = "i4",
};
struct
{
u32 data;
} *ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, vep_elog_track);
ed->data = vep_idx;
/* *INDENT-ON* */
}
return (vep_idx);
}
int
vppcom_epoll_ctl (uint32_t vep_idx, int op, uint32_t session_index,
struct epoll_event *event)
{
session_t *vep_session;
session_t *session;
int rv;
if (vep_idx == session_index)
{
clib_warning ("VCL<%d>: ERROR: vep_idx == session_index (%u)!",
getpid (), vep_idx);
return VPPCOM_EINVAL;
}
clib_spinlock_lock (&vcm->sessions_lockp);
rv = vppcom_session_at_index (vep_idx, &vep_session);
if (PREDICT_FALSE (rv))
{
clib_warning ("VCL<%d>: ERROR: Invalid vep_idx (%u)!", vep_idx);
goto done;
}
if (PREDICT_FALSE (!vep_session->is_vep))
{
clib_warning ("VCL<%d>: ERROR: vep_idx (%u) is not a vep!",
getpid (), vep_idx);
rv = VPPCOM_EINVAL;
goto done;
}
ASSERT (vep_session->vep.vep_idx == ~0);
ASSERT (vep_session->vep.prev_sid == ~0);
rv = vppcom_session_at_index (session_index, &session);
if (PREDICT_FALSE (rv))
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: ERROR: Invalid session_index (%u)!",
getpid (), session_index);
goto done;
}
if (PREDICT_FALSE (session->is_vep))
{
clib_warning ("ERROR: session_index (%u) is a vep!", vep_idx);
rv = VPPCOM_EINVAL;
goto done;
}
switch (op)
{
case EPOLL_CTL_ADD:
if (PREDICT_FALSE (!event))
{
clib_warning ("VCL<%d>: ERROR: EPOLL_CTL_ADD: NULL pointer to "
"epoll_event structure!", getpid ());
rv = VPPCOM_EINVAL;
goto done;
}
if (vep_session->vep.next_sid != ~0)
{
session_t *next_session;
rv = vppcom_session_at_index (vep_session->vep.next_sid,
&next_session);
if (PREDICT_FALSE (rv))
{
clib_warning ("VCL<%d>: ERROR: EPOLL_CTL_ADD: Invalid "
"vep.next_sid (%u) on vep_idx (%u)!",
getpid (), vep_session->vep.next_sid, vep_idx);
goto done;
}
ASSERT (next_session->vep.prev_sid == vep_idx);
next_session->vep.prev_sid = session_index;
}
session->vep.next_sid = vep_session->vep.next_sid;
session->vep.prev_sid = vep_idx;
session->vep.vep_idx = vep_idx;
session->vep.et_mask = VEP_DEFAULT_ET_MASK;
session->vep.ev = *event;
session->is_vep = 0;
session->is_vep_session = 1;
vep_session->vep.next_sid = session_index;
/* VCL Event Register handler */
if (session->state & STATE_LISTEN)
{
/* Register handler for connect_request event on listen_session_index */
vce_event_key_t evk;
evk.session_index = session_index;
evk.eid = VCL_EVENT_CONNECT_REQ_ACCEPTED;
vep_session->poll_reg =
vce_register_handler (&vcm->event_thread, &evk,
vce_poll_wait_connect_request_handler_fn,
0 /* No callback args */ );
}
if (VPPCOM_DEBUG > 1)
clib_warning ("VCL<%d>: EPOLL_CTL_ADD: vep_idx %u, "
"sid %u, events 0x%x, data 0x%llx!",
getpid (), vep_idx, session_index,
event->events, event->data.u64);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "epoll_ctladd: events:%x data:%x",
.format_args = "i4i4i8",
};
struct
{
u32 events;
u64 event_data;
} *ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->events = event->events;
ed->event_data = event->data.u64;
/* *INDENT-ON* */
}
break;
case EPOLL_CTL_MOD:
if (PREDICT_FALSE (!event))
{
clib_warning ("VCL<%d>: ERROR: EPOLL_CTL_MOD: NULL pointer to "
"epoll_event structure!", getpid ());
rv = VPPCOM_EINVAL;
goto done;
}
else if (PREDICT_FALSE (!session->is_vep_session))
{
clib_warning ("VCL<%d>: ERROR: sid %u EPOLL_CTL_MOD: "
"not a vep session!", getpid (), session_index);
rv = VPPCOM_EINVAL;
goto done;
}
else if (PREDICT_FALSE (session->vep.vep_idx != vep_idx))
{
clib_warning ("VCL<%d>: ERROR: sid %u EPOLL_CTL_MOD: "
"vep_idx (%u) != vep_idx (%u)!",
getpid (), session_index,
session->vep.vep_idx, vep_idx);
rv = VPPCOM_EINVAL;
goto done;
}
session->vep.et_mask = VEP_DEFAULT_ET_MASK;
session->vep.ev = *event;
if (VPPCOM_DEBUG > 1)
clib_warning
("VCL<%d>: EPOLL_CTL_MOD: vep_idx %u, sid %u, events 0x%x,"
" data 0x%llx!", getpid (), vep_idx, session_index, event->events,
event->data.u64);
break;
case EPOLL_CTL_DEL:
if (PREDICT_FALSE (!session->is_vep_session))
{
clib_warning ("VCL<%d>: ERROR: sid %u EPOLL_CTL_DEL: "
"not a vep session!", getpid (), session_index);
rv = VPPCOM_EINVAL;
goto done;
}
else if (PREDICT_FALSE (session->vep.vep_idx != vep_idx))
{
clib_warning ("VCL<%d>: ERROR: sid %u EPOLL_CTL_DEL: "
"vep_idx (%u) != vep_idx (%u)!",
getpid (), session_index,
session->vep.vep_idx, vep_idx);
rv = VPPCOM_EINVAL;
goto done;
}
/* VCL Event Un-register handler */
if ((session->state & STATE_LISTEN) && vep_session->poll_reg)
{
(void) vce_unregister_handler (&vcm->event_thread,
vep_session->poll_reg);
}
vep_session->wait_cont_idx =
(vep_session->wait_cont_idx == session_index) ?
session->vep.next_sid : vep_session->wait_cont_idx;
if (session->vep.prev_sid == vep_idx)
vep_session->vep.next_sid = session->vep.next_sid;
else
{
session_t *prev_session;
rv = vppcom_session_at_index (session->vep.prev_sid, &prev_session);
if (PREDICT_FALSE (rv))
{
clib_warning ("VCL<%d>: ERROR: EPOLL_CTL_DEL: Invalid "
"vep.prev_sid (%u) on sid (%u)!",
getpid (), session->vep.prev_sid, session_index);
goto done;
}
ASSERT (prev_session->vep.next_sid == session_index);
prev_session->vep.next_sid = session->vep.next_sid;
}
if (session->vep.next_sid != ~0)
{
session_t *next_session;
rv = vppcom_session_at_index (session->vep.next_sid, &next_session);
if (PREDICT_FALSE (rv))
{
clib_warning ("VCL<%d>: ERROR: EPOLL_CTL_DEL: Invalid "
"vep.next_sid (%u) on sid (%u)!",
getpid (), session->vep.next_sid, session_index);
goto done;
}
ASSERT (next_session->vep.prev_sid == session_index);
next_session->vep.prev_sid = session->vep.prev_sid;
}
memset (&session->vep, 0, sizeof (session->vep));
session->vep.next_sid = ~0;
session->vep.prev_sid = ~0;
session->vep.vep_idx = ~0;
session->is_vep_session = 0;
if (VPPCOM_DEBUG > 1)
clib_warning ("VCL<%d>: EPOLL_CTL_DEL: vep_idx %u, sid %u!",
getpid (), vep_idx, session_index);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "epoll_ctldel: vep:%d",
.format_args = "i4",
};
struct
{
u32 data;
} *ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data = vep_idx;
/* *INDENT-ON* */
}
break;
default:
clib_warning ("VCL<%d>: ERROR: Invalid operation (%d)!", getpid (), op);
rv = VPPCOM_EINVAL;
}
vep_verify_epoll_chain (vep_idx);
done:
clib_spinlock_unlock (&vcm->sessions_lockp);
return rv;
}
int
vppcom_epoll_wait (uint32_t vep_idx, struct epoll_event *events,
int maxevents, double wait_for_time)
{
session_t *vep_session;
elog_track_t vep_elog_track;
int rv;
f64 timeout = clib_time_now (&vcm->clib_time) + wait_for_time;
u32 keep_trying = 1;
int num_ev = 0;
u32 vep_next_sid, wait_cont_idx;
u8 is_vep;
if (PREDICT_FALSE (maxevents <= 0))
{
clib_warning ("VCL<%d>: ERROR: Invalid maxevents (%d)!",
getpid (), maxevents);
return VPPCOM_EINVAL;
}
memset (events, 0, sizeof (*events) * maxevents);
VCL_LOCK_AND_GET_SESSION (vep_idx, &vep_session);
vep_next_sid = vep_session->vep.next_sid;
is_vep = vep_session->is_vep;
wait_cont_idx = vep_session->wait_cont_idx;
vep_elog_track = vep_session->elog_track;
clib_spinlock_unlock (&vcm->sessions_lockp);
if (PREDICT_FALSE (!is_vep))
{
clib_warning ("VCL<%d>: ERROR: vep_idx (%u) is not a vep!",
getpid (), vep_idx);
rv = VPPCOM_EINVAL;
goto done;
}
if (PREDICT_FALSE (vep_next_sid == ~0))
{
if (VPPCOM_DEBUG > 1)
clib_warning ("VCL<%d>: WARNING: vep_idx (%u) is empty!",
getpid (), vep_idx);
if (VPPCOM_DEBUG > 1)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "WRN: vep_idx:%d empty",
.format_args = "i4",
};
struct
{
u32 data;
} *ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, vep_elog_track);
ed->data = vep_idx;
/* *INDENT-ON* */
}
goto done;
}
do
{
u32 sid;
u32 next_sid = ~0;
session_t *session;
elog_track_t session_elog_track;
for (sid = (wait_cont_idx == ~0) ? vep_next_sid : wait_cont_idx;
sid != ~0; sid = next_sid)
{
u32 session_events, et_mask, clear_et_mask, session_vep_idx;
u8 add_event, is_vep_session;
int ready;
u64 session_ev_data;
VCL_LOCK_AND_GET_SESSION (sid, &session);
next_sid = session->vep.next_sid;
session_events = session->vep.ev.events;
et_mask = session->vep.et_mask;
is_vep = session->is_vep;
is_vep_session = session->is_vep_session;
session_vep_idx = session->vep.vep_idx;
session_ev_data = session->vep.ev.data.u64;
if (VPPCOM_DEBUG > 0)
{
session_elog_track = session->elog_track;
}
clib_spinlock_unlock (&vcm->sessions_lockp);
if (PREDICT_FALSE (is_vep))
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: ERROR: sid (%u) is a vep!",
getpid (), vep_idx);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "ERR:vep_idx:%d is vep",
.format_args = "i4",
};
struct
{
u32 data;
} *ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session_elog_track);
ed->data = vep_idx;
/* *INDENT-ON* */
}
rv = VPPCOM_EINVAL;
goto done;
}
if (PREDICT_FALSE (!is_vep_session))
{
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: ERROR: session (%u) is not "
"a vep session!", getpid (), sid);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "ERR:SID:%d not vep",
.format_args = "i4",
};
struct
{
u32 data;
} *ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session_elog_track);
ed->data = sid;
/* *INDENT-ON* */
}
rv = VPPCOM_EINVAL;
goto done;
}
if (PREDICT_FALSE (session_vep_idx != vep_idx))
{
clib_warning ("VCL<%d>: ERROR: session (%u) "
"vep_idx (%u) != vep_idx (%u)!",
getpid (), sid, session_vep_idx, vep_idx);
rv = VPPCOM_EINVAL;
goto done;
}
add_event = clear_et_mask = 0;
if (EPOLLIN & session_events)
{
VCL_LOCK_AND_GET_SESSION (sid, &session);
ready = vppcom_session_read_ready (session, sid);
clib_spinlock_unlock (&vcm->sessions_lockp);
if ((ready > 0) && (EPOLLIN & et_mask))
{
add_event = 1;
events[num_ev].events |= EPOLLIN;
if (((EPOLLET | EPOLLIN) & session_events) ==
(EPOLLET | EPOLLIN))
clear_et_mask |= EPOLLIN;
}
else if (ready < 0)
{
add_event = 1;
switch (ready)
{
case VPPCOM_ECONNRESET:
events[num_ev].events |= EPOLLHUP | EPOLLRDHUP;
break;
default:
events[num_ev].events |= EPOLLERR;
break;
}
}
}
if (EPOLLOUT & session_events)
{
VCL_LOCK_AND_GET_SESSION (sid, &session);
ready = vppcom_session_write_ready (session, sid);
clib_spinlock_unlock (&vcm->sessions_lockp);
if ((ready > 0) && (EPOLLOUT & et_mask))
{
add_event = 1;
events[num_ev].events |= EPOLLOUT;
if (((EPOLLET | EPOLLOUT) & session_events) ==
(EPOLLET | EPOLLOUT))
clear_et_mask |= EPOLLOUT;
}
else if (ready < 0)
{
add_event = 1;
switch (ready)
{
case VPPCOM_ECONNRESET:
events[num_ev].events |= EPOLLHUP;
break;
default:
events[num_ev].events |= EPOLLERR;
break;
}
}
}
if (add_event)
{
events[num_ev].data.u64 = session_ev_data;
if (EPOLLONESHOT & session_events)
{
VCL_LOCK_AND_GET_SESSION (sid, &session);
session->vep.ev.events = 0;
clib_spinlock_unlock (&vcm->sessions_lockp);
}
num_ev++;
if (num_ev == maxevents)
{
VCL_LOCK_AND_GET_SESSION (vep_idx, &vep_session);
vep_session->wait_cont_idx = next_sid;
clib_spinlock_unlock (&vcm->sessions_lockp);
goto done;
}
}
if (wait_cont_idx != ~0)
{
if (next_sid == ~0)
next_sid = vep_next_sid;
else if (next_sid == wait_cont_idx)
next_sid = ~0;
}
}
if (wait_for_time != -1)
keep_trying = (clib_time_now (&vcm->clib_time) <= timeout) ? 1 : 0;
}
while ((num_ev == 0) && keep_trying);
if (wait_cont_idx != ~0)
{
VCL_LOCK_AND_GET_SESSION (vep_idx, &vep_session);
vep_session->wait_cont_idx = ~0;
clib_spinlock_unlock (&vcm->sessions_lockp);
}
done:
return (rv != VPPCOM_OK) ? rv : num_ev;
}
int
vppcom_session_attr (uint32_t session_index, uint32_t op,
void *buffer, uint32_t * buflen)
{
session_t *session;
int rv = VPPCOM_OK;
u32 *flags = buffer;
vppcom_endpt_t *ep = buffer;
VCL_LOCK_AND_GET_SESSION (session_index, &session);
ASSERT (session);
switch (op)
{
case VPPCOM_ATTR_GET_NREAD:
rv = vppcom_session_read_ready (session, session_index);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_GET_NREAD: sid %u, nread = %d",
getpid (), rv);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_GET_NREAD: nread=%d",
.format_args = "i4",
};
struct
{
u32 data;
} *ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data = rv;
/* *INDENT-ON* */
}
break;
case VPPCOM_ATTR_GET_NWRITE:
rv = vppcom_session_write_ready (session, session_index);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_GET_NWRITE: sid %u, nwrite = %d",
getpid (), session_index, rv);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_GET_NWRITE: nwrite=%d",
.format_args = "i4",
};
struct
{
u32 data;
} *ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data = rv;
/* *INDENT-ON* */
}
break;
case VPPCOM_ATTR_GET_FLAGS:
if (PREDICT_TRUE (buffer && buflen && (*buflen >= sizeof (*flags))))
{
*flags = O_RDWR | (VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_NONBLOCK));
*buflen = sizeof (*flags);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_GET_FLAGS: sid %u, "
"flags = 0x%08x, is_nonblocking = %u", getpid (),
session_index, *flags,
VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_NONBLOCK));
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_GET_FLAGS: flags=%x is_nonblk=%d",
.format_args = "i4i4",
};
struct
{
u32 flags;
u32 is_nonblk;
} *ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->flags = *flags;
ed->is_nonblk = VCL_SESS_ATTR_TEST (session->attr, VCL_SESS_ATTR_NONBLOCK);
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_SET_FLAGS:
if (PREDICT_TRUE (buffer && buflen && (*buflen == sizeof (*flags))))
{
if (*flags & O_NONBLOCK)
VCL_SESS_ATTR_SET (session->attr, VCL_SESS_ATTR_NONBLOCK);
else
VCL_SESS_ATTR_CLR (session->attr, VCL_SESS_ATTR_NONBLOCK);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_SET_FLAGS: sid %u, "
"flags = 0x%08x, is_nonblocking = %u",
getpid (), session_index, *flags,
VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_NONBLOCK));
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_SET_FLAGS: flags=%x is_nonblk=%d",
.format_args = "i4i4",
};
struct
{
u32 flags;
u32 is_nonblk;
} *ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->flags = *flags;
ed->is_nonblk = VCL_SESS_ATTR_TEST (session->attr, VCL_SESS_ATTR_NONBLOCK);
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_GET_PEER_ADDR:
if (PREDICT_TRUE (buffer && buflen &&
(*buflen >= sizeof (*ep)) && ep->ip))
{
ep->is_ip4 = session->peer_addr.is_ip4;
ep->port = session->peer_port;
if (session->peer_addr.is_ip4)
clib_memcpy (ep->ip, &session->peer_addr.ip46.ip4,
sizeof (ip4_address_t));
else
clib_memcpy (ep->ip, &session->peer_addr.ip46.ip6,
sizeof (ip6_address_t));
*buflen = sizeof (*ep);
if (VPPCOM_DEBUG > 1)
clib_warning ("VCL<%d>: VPPCOM_ATTR_GET_PEER_ADDR: sid %u, "
"is_ip4 = %u, addr = %U, port %u", getpid (),
session_index, ep->is_ip4, format_ip46_address,
&session->peer_addr.ip46, ep->is_ip4,
clib_net_to_host_u16 (ep->port));
if (VPPCOM_DEBUG > 0)
{
if (ep->is_ip4)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_GET_PEER_ADDR: addr:%d.%d.%d.%d:%d",
.format_args = "i1i1i1i1i2",
};
CLIB_PACKED (struct {
u8 addr[4]; //4
u16 port; //2
}) * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->addr[0] = session->peer_addr.ip46.ip4.as_u8[0];
ed->addr[1] = session->peer_addr.ip46.ip4.as_u8[1];
ed->addr[2] = session->peer_addr.ip46.ip4.as_u8[2];
ed->addr[3] = session->peer_addr.ip46.ip4.as_u8[3];
ed->port = clib_net_to_host_u16 (session->peer_port);
/* *INDENT-ON* */
}
else
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_GET_PEER_ADDR: addr:IP6:%d",
.format_args = "i2",
};
CLIB_PACKED (struct {
u16 port; //2
}) * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->port = clib_net_to_host_u16 (session->peer_port);
/* *INDENT-ON* */
}
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_GET_LCL_ADDR:
if (PREDICT_TRUE (buffer && buflen &&
(*buflen >= sizeof (*ep)) && ep->ip))
{
ep->is_ip4 = session->lcl_addr.is_ip4;
ep->port = session->lcl_port;
if (session->lcl_addr.is_ip4)
clib_memcpy (ep->ip, &session->lcl_addr.ip46.ip4,
sizeof (ip4_address_t));
else
clib_memcpy (ep->ip, &session->lcl_addr.ip46.ip6,
sizeof (ip6_address_t));
*buflen = sizeof (*ep);
if (VPPCOM_DEBUG > 1)
clib_warning ("VCL<%d>: VPPCOM_ATTR_GET_LCL_ADDR: sid %u, "
"is_ip4 = %u, addr = %U port %d", getpid (),
session_index, ep->is_ip4, format_ip46_address,
&session->lcl_addr.ip46, ep->is_ip4,
clib_net_to_host_u16 (ep->port));
if (VPPCOM_DEBUG > 0)
{
if (ep->is_ip4)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_GET_LCL_ADDR: addr:%d.%d.%d.%d:%d",
.format_args = "i1i1i1i1i2",
};
CLIB_PACKED (struct {
u8 addr[4]; //4
u16 port; //2
}) * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->addr[0] = session->lcl_addr.ip46.ip4.as_u8[0];
ed->addr[1] = session->lcl_addr.ip46.ip4.as_u8[1];
ed->addr[2] = session->lcl_addr.ip46.ip4.as_u8[2];
ed->addr[3] = session->lcl_addr.ip46.ip4.as_u8[3];
ed->port = clib_net_to_host_u16 (session->peer_port);
/* *INDENT-ON* */
}
else
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_GET_LCL_ADDR: addr:IP6:%d",
.format_args = "i2",
};
CLIB_PACKED (struct {
u16 port; //2
}) * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->port = clib_net_to_host_u16 (session->peer_port);
/* *INDENT-ON* */
}
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_GET_LIBC_EPFD:
rv = session->libc_epfd;
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_GET_LIBC_EPFD: libc_epfd %d",
getpid (), rv);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_GET_LIBC_EPFD: libc_epfd=%d",
.format_args = "i4",
};
CLIB_PACKED (struct {
i32 data;
}) *ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data = session->libc_epfd;
/* *INDENT-ON* */
}
break;
case VPPCOM_ATTR_SET_LIBC_EPFD:
if (PREDICT_TRUE (buffer && buflen &&
(*buflen == sizeof (session->libc_epfd))))
{
session->libc_epfd = *(int *) buffer;
*buflen = sizeof (session->libc_epfd);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_SET_LIBC_EPFD: libc_epfd %d, "
"buflen %d", getpid (), session->libc_epfd,
*buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_SET_LIBC_EPFD: libc_epfd=%s%d buflen=%d",
.format_args = "t1i4i4",
.n_enum_strings = 2,
.enum_strings = {"", "-",},
};
CLIB_PACKED (struct {
u8 sign;
u32 data[2];
}) * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->sign = (session->libc_epfd < 0);
ed->data[0] = abs(session->libc_epfd);
ed->data[1] = *buflen;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_GET_PROTOCOL:
if (buffer && buflen && (*buflen >= sizeof (int)))
{
*(int *) buffer = session->proto;
*buflen = sizeof (int);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_GET_PROTOCOL: %d (%s), "
"buflen %d", getpid (), *(int *) buffer,
*(int *) buffer ? "UDP" : "TCP", *buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_GET_PROTOCOL: %s buflen=%d",
.format_args = "t1i4",
.n_enum_strings = 2,
.enum_strings = {"TCP", "UDP",},
};
CLIB_PACKED (struct {
u8 proto;
u32 buflen;
}) * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->proto = session->proto;
ed->buflen = *(int *) buffer;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_GET_LISTEN:
if (buffer && buflen && (*buflen >= sizeof (int)))
{
*(int *) buffer = VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_LISTEN);
*buflen = sizeof (int);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_GET_LISTEN: %d, "
"buflen %d", getpid (), *(int *) buffer, *buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_GET_LISTEN: %d buflen=%d",
.format_args = "i4i4",
};
struct {
u32 data[2];
} * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data[0] = *(int *) buffer;
ed->data[1] = *buflen;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_GET_ERROR:
if (buffer && buflen && (*buflen >= sizeof (int)))
{
*(int *) buffer = 0;
*buflen = sizeof (int);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_GET_ERROR: %d, "
"buflen %d, #VPP-TBD#", getpid (),
*(int *) buffer, *buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_GET_ERROR: %d buflen=%d",
.format_args = "i4i4",
};
struct {
u32 data[2];
} * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data[0] = *(int *) buffer;
ed->data[1] = *buflen;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_GET_TX_FIFO_LEN:
if (buffer && buflen && (*buflen >= sizeof (u32)))
{
/* VPP-TBD */
*(size_t *) buffer = (session->sndbuf_size ? session->sndbuf_size :
session->tx_fifo ? session->tx_fifo->nitems :
vcm->cfg.tx_fifo_size);
*buflen = sizeof (u32);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_GET_TX_FIFO_LEN: %u (0x%x), "
"buflen %d, #VPP-TBD#", getpid (),
*(size_t *) buffer, *(size_t *) buffer, *buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_GET_TX_FIFO_LEN: 0x%x buflen=%d",
.format_args = "i4i4",
};
struct {
u32 data[2];
} * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data[0] = *(size_t *) buffer;
ed->data[1] = *buflen;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_SET_TX_FIFO_LEN:
if (buffer && buflen && (*buflen == sizeof (u32)))
{
/* VPP-TBD */
session->sndbuf_size = *(u32 *) buffer;
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_SET_TX_FIFO_LEN: %u (0x%x), "
"buflen %d, #VPP-TBD#", getpid (),
session->sndbuf_size, session->sndbuf_size,
*buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_SET_TX_FIFO_LEN: 0x%x buflen=%d",
.format_args = "i4i4",
};
struct {
u32 data[2];
} * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data[0] = session->sndbuf_size;
ed->data[1] = *buflen;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_GET_RX_FIFO_LEN:
if (buffer && buflen && (*buflen >= sizeof (u32)))
{
/* VPP-TBD */
*(size_t *) buffer = (session->rcvbuf_size ? session->rcvbuf_size :
session->rx_fifo ? session->rx_fifo->nitems :
vcm->cfg.rx_fifo_size);
*buflen = sizeof (u32);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_GET_RX_FIFO_LEN: %u (0x%x), "
"buflen %d, #VPP-TBD#", getpid (),
*(size_t *) buffer, *(size_t *) buffer, *buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_GET_RX_FIFO_LEN: 0x%x buflen=%d",
.format_args = "i4i4",
};
struct {
u32 data[2];
} * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data[0] = *(size_t *) buffer;
ed->data[1] = *buflen;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_SET_RX_FIFO_LEN:
if (buffer && buflen && (*buflen == sizeof (u32)))
{
/* VPP-TBD */
session->rcvbuf_size = *(u32 *) buffer;
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_SET_RX_FIFO_LEN: %u (0x%x), "
"buflen %d, #VPP-TBD#", getpid (),
session->sndbuf_size, session->sndbuf_size,
*buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_SET_RX_FIFO_LEN: 0x%x buflen=%d",
.format_args = "i4i4",
};
struct {
u32 data[2];
} * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data[0] = session->sndbuf_size;
ed->data[1] = *buflen;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_GET_REUSEADDR:
if (buffer && buflen && (*buflen >= sizeof (int)))
{
/* VPP-TBD */
*(int *) buffer = VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_REUSEADDR);
*buflen = sizeof (int);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_GET_REUSEADDR: %d, "
"buflen %d, #VPP-TBD#", getpid (), *(int *) buffer,
*buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_GET_REUSEADDR: %d buflen=%d",
.format_args = "i4i4",
};
struct {
u32 data[2];
} * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data[0] = *(int *) buffer;
ed->data[1] = *buflen;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_SET_REUSEADDR:
if (buffer && buflen && (*buflen == sizeof (int)) &&
!VCL_SESS_ATTR_TEST (session->attr, VCL_SESS_ATTR_LISTEN))
{
/* VPP-TBD */
if (*(int *) buffer)
VCL_SESS_ATTR_SET (session->attr, VCL_SESS_ATTR_REUSEADDR);
else
VCL_SESS_ATTR_CLR (session->attr, VCL_SESS_ATTR_REUSEADDR);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_SET_REUSEADDR: %d, "
"buflen %d, #VPP-TBD#", getpid (),
VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_REUSEADDR),
*buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_SET_REUSEADDR: %d buflen=%d",
.format_args = "i4i4",
};
struct {
u32 data[2];
} * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data[0] = VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_REUSEADDR);
ed->data[1] = *buflen;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_GET_REUSEPORT:
if (buffer && buflen && (*buflen >= sizeof (int)))
{
/* VPP-TBD */
*(int *) buffer = VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_REUSEPORT);
*buflen = sizeof (int);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_GET_REUSEPORT: %d, "
"buflen %d, #VPP-TBD#", getpid (), *(int *) buffer,
*buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_GET_REUSEPORT: %d buflen=%d",
.format_args = "i4i4",
};
struct {
u32 data[2];
} * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data[0] = *(int *) buffer;
ed->data[1] = *buflen;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_SET_REUSEPORT:
if (buffer && buflen && (*buflen == sizeof (int)) &&
!VCL_SESS_ATTR_TEST (session->attr, VCL_SESS_ATTR_LISTEN))
{
/* VPP-TBD */
if (*(int *) buffer)
VCL_SESS_ATTR_SET (session->attr, VCL_SESS_ATTR_REUSEPORT);
else
VCL_SESS_ATTR_CLR (session->attr, VCL_SESS_ATTR_REUSEPORT);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_SET_REUSEPORT: %d, "
"buflen %d, #VPP-TBD#", getpid (),
VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_REUSEPORT),
*buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_SET_REUSEPORT: %d buflen=%d",
.format_args = "i4i4",
};
struct {
u32 data[2];
} * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data[0] = VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_REUSEPORT);
ed->data[1] = *buflen;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_GET_BROADCAST:
if (buffer && buflen && (*buflen >= sizeof (int)))
{
/* VPP-TBD */
*(int *) buffer = VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_BROADCAST);
*buflen = sizeof (int);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_GET_BROADCAST: %d, "
"buflen %d, #VPP-TBD#", getpid (), *(int *) buffer,
*buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_GET_BROADCAST: %d buflen=%d",
.format_args = "i4i4",
};
struct {
u32 data[2];
} * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data[0] = *(int *) buffer;
ed->data[1] = *buflen;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_SET_BROADCAST:
if (buffer && buflen && (*buflen == sizeof (int)))
{
/* VPP-TBD */
if (*(int *) buffer)
VCL_SESS_ATTR_SET (session->attr, VCL_SESS_ATTR_BROADCAST);
else
VCL_SESS_ATTR_CLR (session->attr, VCL_SESS_ATTR_BROADCAST);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_SET_BROADCAST: %d, "
"buflen %d, #VPP-TBD#", getpid (),
VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_BROADCAST),
*buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_SET_BROADCAST: %d buflen=%d",
.format_args = "i4i4",
};
struct {
u32 data[2];
} * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data[0] = VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_BROADCAST);
ed->data[1] = *buflen;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_GET_V6ONLY:
if (buffer && buflen && (*buflen >= sizeof (int)))
{
/* VPP-TBD */
*(int *) buffer = VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_V6ONLY);
*buflen = sizeof (int);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_GET_V6ONLY: %d, "
"buflen %d, #VPP-TBD#", getpid (), *(int *) buffer,
*buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_GET_V6ONLY: %d buflen=%d",
.format_args = "i4i4",
};
struct {
u32 data[2];
} * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data[0] = *(int *) buffer;
ed->data[1] = *buflen;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_SET_V6ONLY:
if (buffer && buflen && (*buflen == sizeof (int)))
{
/* VPP-TBD */
if (*(int *) buffer)
VCL_SESS_ATTR_SET (session->attr, VCL_SESS_ATTR_V6ONLY);
else
VCL_SESS_ATTR_CLR (session->attr, VCL_SESS_ATTR_V6ONLY);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_SET_V6ONLY: %d, "
"buflen %d, #VPP-TBD#", getpid (),
VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_V6ONLY), *buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_SET_V6ONLY: %d buflen=%d",
.format_args = "i4i4",
};
struct {
u32 data[2];
} * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data[0] = VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_V6ONLY);
ed->data[1] = *buflen;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_GET_KEEPALIVE:
if (buffer && buflen && (*buflen >= sizeof (int)))
{
/* VPP-TBD */
*(int *) buffer = VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_KEEPALIVE);
*buflen = sizeof (int);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_GET_KEEPALIVE: %d, "
"buflen %d, #VPP-TBD#", getpid (), *(int *) buffer,
*buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_GET_KEEPALIVE: %d buflen=%d",
.format_args = "i4i4",
};
struct {
u32 data[2];
} * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data[0] = *(int *) buffer;
ed->data[1] = *buflen;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_SET_KEEPALIVE:
if (buffer && buflen && (*buflen == sizeof (int)))
{
/* VPP-TBD */
if (*(int *) buffer)
VCL_SESS_ATTR_SET (session->attr, VCL_SESS_ATTR_KEEPALIVE);
else
VCL_SESS_ATTR_CLR (session->attr, VCL_SESS_ATTR_KEEPALIVE);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_SET_KEEPALIVE: %d, "
"buflen %d, #VPP-TBD#", getpid (),
VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_KEEPALIVE),
*buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_SET_KEEPALIVE: %d buflen=%d",
.format_args = "i4i4",
};
struct {
u32 data[2];
} * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data[0] = VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_KEEPALIVE);
ed->data[1] = *buflen;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_GET_TCP_NODELAY:
if (buffer && buflen && (*buflen >= sizeof (int)))
{
/* VPP-TBD */
*(int *) buffer = VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_TCP_NODELAY);
*buflen = sizeof (int);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_GET_TCP_NODELAY: %d, "
"buflen %d, #VPP-TBD#", getpid (), *(int *) buffer,
*buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_GET_TCP_NODELAY: %d buflen=%d",
.format_args = "i4i4",
};
struct {
u32 data[2];
} * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data[0] = *(int *) buffer;
ed->data[1] = *buflen;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_SET_TCP_NODELAY:
if (buffer && buflen && (*buflen == sizeof (int)))
{
/* VPP-TBD */
if (*(int *) buffer)
VCL_SESS_ATTR_SET (session->attr, VCL_SESS_ATTR_TCP_NODELAY);
else
VCL_SESS_ATTR_CLR (session->attr, VCL_SESS_ATTR_TCP_NODELAY);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_SET_TCP_NODELAY: %d, "
"buflen %d, #VPP-TBD#", getpid (),
VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_TCP_NODELAY),
*buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_SET_TCP_NODELAY: %d buflen=%d",
.format_args = "i4i4",
};
struct {
u32 data[2];
} * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data[0] = VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_TCP_NODELAY);
ed->data[1] = *buflen;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_GET_TCP_KEEPIDLE:
if (buffer && buflen && (*buflen >= sizeof (int)))
{
/* VPP-TBD */
*(int *) buffer = VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_TCP_KEEPIDLE);
*buflen = sizeof (int);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_GET_TCP_KEEPIDLE: %d, "
"buflen %d, #VPP-TBD#", getpid (), *(int *) buffer,
*buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_GET_TCP_KEEPIDLE: %d buflen=%d",
.format_args = "i4i4",
};
struct {
u32 data[2];
} * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data[0] = *(int *) buffer;
ed->data[1] = *buflen;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_SET_TCP_KEEPIDLE:
if (buffer && buflen && (*buflen == sizeof (int)))
{
/* VPP-TBD */
if (*(int *) buffer)
VCL_SESS_ATTR_SET (session->attr, VCL_SESS_ATTR_TCP_KEEPIDLE);
else
VCL_SESS_ATTR_CLR (session->attr, VCL_SESS_ATTR_TCP_KEEPIDLE);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_SET_TCP_KEEPIDLE: %d, "
"buflen %d, #VPP-TBD#", getpid (),
VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_TCP_KEEPIDLE),
*buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_SET_TCP_KEEPIDLE: %d buflen=%d",
.format_args = "i4i4",
};
struct {
u32 data[2];
} * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data[0] = VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_TCP_KEEPIDLE);
ed->data[1] = *buflen;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_GET_TCP_KEEPINTVL:
if (buffer && buflen && (*buflen >= sizeof (int)))
{
/* VPP-TBD */
*(int *) buffer = VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_TCP_KEEPINTVL);
*buflen = sizeof (int);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_GET_TCP_KEEPINTVL: %d, "
"buflen %d, #VPP-TBD#", getpid (), *(int *) buffer,
*buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_GET_TCP_KEEPIDLE: %d buflen=%d",
.format_args = "i4i4",
};
struct {
u32 data[2];
} * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data[0] = *(int *) buffer;
ed->data[1] = *buflen;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_SET_TCP_KEEPINTVL:
if (buffer && buflen && (*buflen == sizeof (int)))
{
/* VPP-TBD */
if (*(int *) buffer)
VCL_SESS_ATTR_SET (session->attr, VCL_SESS_ATTR_TCP_KEEPINTVL);
else
VCL_SESS_ATTR_CLR (session->attr, VCL_SESS_ATTR_TCP_KEEPINTVL);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_SET_TCP_KEEPINTVL: %d, "
"buflen %d, #VPP-TBD#", getpid (),
VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_TCP_KEEPINTVL),
*buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_SET_TCP_KEEPINTVL: %d buflen=%d",
.format_args = "i4i4",
};
struct {
u32 data[2];
} * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data[0] = VCL_SESS_ATTR_TEST (session->attr,
VCL_SESS_ATTR_TCP_KEEPINTVL);
ed->data[1] = *buflen;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_GET_TCP_USER_MSS:
if (buffer && buflen && (*buflen >= sizeof (u32)))
{
/* VPP-TBD */
*(u32 *) buffer = session->user_mss;
*buflen = sizeof (int);
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_GET_TCP_USER_MSS: %d, "
"buflen %d, #VPP-TBD#", getpid (), *(int *) buffer,
*buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_GET_TCP_USER_MSS: %d buflen=%d",
.format_args = "i4i4",
};
struct {
u32 data[2];
} * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data[0] = *(int *) buffer;
ed->data[1] = *buflen;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
case VPPCOM_ATTR_SET_TCP_USER_MSS:
if (buffer && buflen && (*buflen == sizeof (u32)))
{
/* VPP-TBD */
session->user_mss = *(u32 *) buffer;
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: VPPCOM_ATTR_SET_TCP_USER_MSS: %u, "
"buflen %d, #VPP-TBD#", getpid (),
session->user_mss, *buflen);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "VPPCOM_ATTR_SET_TCP_USER_MSS: %d buflen=%d",
.format_args = "i4i4",
};
struct {
u32 data[2];
} * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, session->elog_track);
ed->data[0] = session->user_mss;
ed->data[1] = *buflen;
/* *INDENT-ON* */
}
}
else
rv = VPPCOM_EINVAL;
break;
default:
rv = VPPCOM_EINVAL;
break;
}
done:
clib_spinlock_unlock (&vcm->sessions_lockp);
return rv;
}
int
vppcom_session_recvfrom (uint32_t session_index, void *buffer,
uint32_t buflen, int flags, vppcom_endpt_t * ep)
{
int rv = VPPCOM_OK;
session_t *session = 0;
if (ep)
{
clib_spinlock_lock (&vcm->sessions_lockp);
rv = vppcom_session_at_index (session_index, &session);
if (PREDICT_FALSE (rv))
{
clib_spinlock_unlock (&vcm->sessions_lockp);
if (VPPCOM_DEBUG > 0)
clib_warning ("VCL<%d>: invalid session, "
"sid (%u) has been closed!",
getpid (), session_index);
if (VPPCOM_DEBUG > 0)
{
/* *INDENT-OFF* */
ELOG_TYPE_DECLARE (e) =
{
.format = "invalid session: %d closed",
.format_args = "i4",
};
struct {
u32 data;
} * ed;
ed = ELOG_TRACK_DATA (&vcm->elog_main, e, vcm->elog_track);
ed->data = session_index;
/* *INDENT-ON* */
}
rv = VPPCOM_EBADFD;
clib_spinlock_unlock (&vcm->sessions_lockp);
goto done;
}
ep->is_ip4 = session->peer_addr.is_ip4;
ep->port = session->peer_port;
if (session->peer_addr.is_ip4)
clib_memcpy (ep->ip, &session->peer_addr.ip46.ip4,
sizeof (ip4_address_t));
else
clib_memcpy (ep->ip, &session->peer_addr.ip46.ip6,
sizeof (ip6_address_t));
clib_spinlock_unlock (&vcm->sessions_lockp);
}
if (flags == 0)
rv = vppcom_session_read (session_index, buffer, buflen);
else if (flags & MSG_PEEK)
rv = vppcom_session_peek (session_index, buffer, buflen);
else
{
clib_warning ("VCL<%d>: Unsupport flags for recvfrom %d",
getpid (), flags);
rv = VPPCOM_EAFNOSUPPORT;
}
done:
return rv;
}
int
vppcom_session_sendto (uint32_t session_index, void *buffer,
uint32_t buflen, int flags, vppcom_endpt_t * ep)
{
if (!buffer)
return VPPCOM_EINVAL;
if (ep)
{
// TBD
return VPPCOM_EINVAL;
}
if (flags)
{
// TBD check the flags and do the right thing
if (VPPCOM_DEBUG > 2)
clib_warning ("VCL<%d>: handling flags 0x%u (%d) "
"not implemented yet.", getpid (), flags, flags);
}
return (vppcom_session_write (session_index, buffer, buflen));
}
int
vppcom_poll (vcl_poll_t * vp, uint32_t n_sids, double wait_for_time)
{
f64 timeout = clib_time_now (&vcm->clib_time) + wait_for_time;
u32 i, keep_trying = 1;
int rv, num_ev = 0;
if (VPPCOM_DEBUG > 3)
clib_warning ("VCL<%d>: vp %p, nsids %u, wait_for_time %f",
getpid (), vp, n_sids, wait_for_time);
if (!vp)
return VPPCOM_EFAULT;
do
{
session_t *session;
for (i = 0; i < n_sids; i++)
{
ASSERT (vp[i].revents);
VCL_LOCK_AND_GET_SESSION (vp[i].sid, &session);
clib_spinlock_unlock (&vcm->sessions_lockp);
if (*vp[i].revents)
*vp[i].revents = 0;
if (POLLIN & vp[i].events)
{
VCL_LOCK_AND_GET_SESSION (vp[i].sid, &session);
rv = vppcom_session_read_ready (session, vp[i].sid);
clib_spinlock_unlock (&vcm->sessions_lockp);
if (rv > 0)
{
*vp[i].revents |= POLLIN;
num_ev++;
}
else if (rv < 0)
{
switch (rv)
{
case VPPCOM_ECONNRESET:
*vp[i].revents = POLLHUP;
break;
default:
*vp[i].revents = POLLERR;
break;
}
num_ev++;
}
}
if (POLLOUT & vp[i].events)
{
VCL_LOCK_AND_GET_SESSION (vp[i].sid, &session);
rv = vppcom_session_write_ready (session, vp[i].sid);
clib_spinlock_unlock (&vcm->sessions_lockp);
if (rv > 0)
{
*vp[i].revents |= POLLOUT;
num_ev++;
}
else if (rv < 0)
{
switch (rv)
{
case VPPCOM_ECONNRESET:
*vp[i].revents = POLLHUP;
break;
default:
*vp[i].revents = POLLERR;
break;
}
num_ev++;
}
}
if (0) // Note "done:" label used by VCL_LOCK_AND_GET_SESSION()
{
done:
*vp[i].revents = POLLNVAL;
num_ev++;
}
}
if (wait_for_time != -1)
keep_trying = (clib_time_now (&vcm->clib_time) <= timeout) ? 1 : 0;
}
while ((num_ev == 0) && keep_trying);
if (VPPCOM_DEBUG > 3)
{
clib_warning ("VCL<%d>: returning %d", getpid (), num_ev);
for (i = 0; i < n_sids; i++)
{
clib_warning ("VCL<%d>: vp[%d].sid %d (0x%x), .events 0x%x, "
".revents 0x%x", getpid (), i, vp[i].sid, vp[i].sid,
vp[i].events, *vp[i].revents);
}
}
return num_ev;
}
/*
* fd.io coding-style-patch-verification: ON
*
* Local Variables:
* eval: (c-set-style "gnu")
* End:
*/