2 * Copyright (c) 2016 Cisco and/or its affiliates.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
7 * http://www.apache.org/licenses/LICENSE-2.0
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
15 #include <vnet/session/application_interface.h>
17 #include <vnet/session/session.h>
18 #include <vlibmemory/api.h>
19 #include <vnet/dpo/load_balance.h>
22 VPP's application/session API bind/unbind/connect/disconnect calls
26 * TLS server cert and keys to be used for testing only
28 const char test_srv_crt_rsa[] =
29 "-----BEGIN CERTIFICATE-----\r\n"
30 "MIID5zCCAs+gAwIBAgIJALeMYCEHrTtJMA0GCSqGSIb3DQEBCwUAMIGJMQswCQYD\r\n"
31 "VQQGEwJVUzELMAkGA1UECAwCQ0ExETAPBgNVBAcMCFNhbiBKb3NlMQ4wDAYDVQQK\r\n"
32 "DAVDaXNjbzEOMAwGA1UECwwFZmQuaW8xFjAUBgNVBAMMDXRlc3R0bHMuZmQuaW8x\r\n"
33 "IjAgBgkqhkiG9w0BCQEWE3ZwcC1kZXZAbGlzdHMuZmQuaW8wHhcNMTgwMzA1MjEx\r\n"
34 "NTEyWhcNMjgwMzAyMjExNTEyWjCBiTELMAkGA1UEBhMCVVMxCzAJBgNVBAgMAkNB\r\n"
35 "MREwDwYDVQQHDAhTYW4gSm9zZTEOMAwGA1UECgwFQ2lzY28xDjAMBgNVBAsMBWZk\r\n"
36 "LmlvMRYwFAYDVQQDDA10ZXN0dGxzLmZkLmlvMSIwIAYJKoZIhvcNAQkBFhN2cHAt\r\n"
37 "ZGV2QGxpc3RzLmZkLmlvMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA\r\n"
38 "4C1k8a1DuStgggqT4o09fP9sJ2dC54bxhS/Xk2VEfaIZ222WSo4X/syRVfVy9Yah\r\n"
39 "cpI1zJ/RDxaZSFhgA+nPZBrFMsrULkrdAOpOVj8eDEp9JuWdO2ODSoFnCvLxcYWB\r\n"
40 "Yc5kHryJpEaGJl1sFQSesnzMFty/59ta0stk0Fp8r5NhIjWvSovGzPo6Bhz+VS2c\r\n"
41 "ebIZh4x1t2hHaFcgm0qJoJ6DceReWCW8w+yOVovTolGGq+bpb2Hn7MnRSZ2K2NdL\r\n"
42 "+aLXpkZbS/AODP1FF2vTO1mYL290LO7/51vJmPXNKSDYMy5EvILr5/VqtjsFCwRL\r\n"
43 "Q4jcM/+GeHSAFWx4qIv0BwIDAQABo1AwTjAdBgNVHQ4EFgQUWa1SOB37xmT53tZQ\r\n"
44 "aXuLLhRI7U8wHwYDVR0jBBgwFoAUWa1SOB37xmT53tZQaXuLLhRI7U8wDAYDVR0T\r\n"
45 "BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAQEAoUht13W4ya27NVzQuCMvqPWL3VM4\r\n"
46 "3xbPFk02FaGz/WupPu276zGlzJAZrbuDcQowwwU1Ni1Yygxl96s1c2M5rHDTrOKG\r\n"
47 "rK0hbkSFBo+i6I8u4HiiQ4rYmG0Hv6+sXn3of0HsbtDPGgWZoipPWDljPYEURu3e\r\n"
48 "3HRe/Dtsj9CakBoSDzs8ndWaBR+f4sM9Tk1cjD46Gq2T/qpSPXqKxEUXlzhdCAn4\r\n"
49 "twub17Bq2kykHpppCwPg5M+v30tHG/R2Go15MeFWbEJthFk3TZMjKL7UFs7fH+x2\r\n"
50 "wSonXb++jY+KmCb93C+soABBizE57g/KmiR2IxQ/LMjDik01RSUIaM0lLA==\r\n"
51 "-----END CERTIFICATE-----\r\n";
52 const u32 test_srv_crt_rsa_len = sizeof (test_srv_crt_rsa);
54 const char test_srv_key_rsa[] =
55 "-----BEGIN PRIVATE KEY-----\r\n"
56 "MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQDgLWTxrUO5K2CC\r\n"
57 "CpPijT18/2wnZ0LnhvGFL9eTZUR9ohnbbZZKjhf+zJFV9XL1hqFykjXMn9EPFplI\r\n"
58 "WGAD6c9kGsUyytQuSt0A6k5WPx4MSn0m5Z07Y4NKgWcK8vFxhYFhzmQevImkRoYm\r\n"
59 "XWwVBJ6yfMwW3L/n21rSy2TQWnyvk2EiNa9Ki8bM+joGHP5VLZx5shmHjHW3aEdo\r\n"
60 "VyCbSomgnoNx5F5YJbzD7I5Wi9OiUYar5ulvYefsydFJnYrY10v5otemRltL8A4M\r\n"
61 "/UUXa9M7WZgvb3Qs7v/nW8mY9c0pINgzLkS8guvn9Wq2OwULBEtDiNwz/4Z4dIAV\r\n"
62 "bHioi/QHAgMBAAECggEBAMzGipP8+oT166U+NlJXRFifFVN1DvdhG9PWnOxGL+c3\r\n"
63 "ILmBBC08WQzmHshPemBvR6DZkA1H23cV5JTiLWrFtC00CvhXsLRMrE5+uWotI6yE\r\n"
64 "iofybMroHvD6/X5R510UX9hQ6MHu5ShLR5VZ9zXHz5MpTmB/60jG5dLx+jgcwBK8\r\n"
65 "LuGv2YB/WCUwT9QJ3YU2eaingnXtz/MrFbkbltrqlnBdlD+kTtw6Yac9y1XuuQXc\r\n"
66 "BPeulLNDuPolJVWbUvDBZrpt2dXTgz8ws1sv+wCNE0xwQJsqW4Nx3QkpibUL9RUr\r\n"
67 "CVbKlNfa9lopT6nGKlgX69R/uH35yh9AOsfasro6w0ECgYEA82UJ8u/+ORah+0sF\r\n"
68 "Q0FfW5MTdi7OAUHOz16pUsGlaEv0ERrjZxmAkHA/VRwpvDBpx4alCv0Hc39PFLIk\r\n"
69 "nhSsM2BEuBkTAs6/GaoNAiBtQVE/hN7awNRWVmlieS0go3Y3dzaE9IUMyj8sPOFT\r\n"
70 "5JdJ6BM69PHKCkY3dKdnnfpFEuECgYEA68mRpteunF1mdZgXs+WrN+uLlRrQR20F\r\n"
71 "ZyMYiUCH2Dtn26EzA2moy7FipIIrQcX/j+KhYNGM3e7MU4LymIO29E18mn8JODnH\r\n"
72 "sQOXzBTsf8A4yIVMkcuQD3bfb0JiUGYUPOidTp2N7IJA7+6Yc3vQOyb74lnKnJoO\r\n"
73 "gougPT2wS+cCgYAn7muzb6xFsXDhyW0Tm6YJYBfRS9yAWEuVufINobeBZPSl2cN1\r\n"
74 "Jrnw+HlrfTNbrJWuJmjtZJXUXQ6cVp2rUbjutNyRV4vG6iRwEXYQ40EJdkr1gZpi\r\n"
75 "CHQhuShuuPih2MNAy7EEbM+sXrDjTBR3bFqzuHPzu7dp+BshCFX3lRfAAQKBgGQt\r\n"
76 "K5i7IhCFDjb/+3IPLgOAK7mZvsvZ4eXD33TQ2eZgtut1PXtBtNl17/b85uv293Fm\r\n"
77 "VDISVcsk3eLNS8zIiT6afUoWlxAwXEs0v5WRfjl4radkGvgGiJpJYvyeM67877RB\r\n"
78 "EDSKc/X8ESLfOB44iGvZUEMG6zJFscx9DgN25iQZAoGAbyd+JEWwdVH9/K3IH1t2\r\n"
79 "PBkZX17kNWv+iVM1WyFjbe++vfKZCrOJiyiqhDeEqgrP3AuNMlaaduC3VRC3G5oV\r\n"
80 "Mj1tlhDWQ/qhvKdCKNdIVQYDE75nw+FRWV8yYkHAnXYW3tNoweDIwixE0hkPR1bc\r\n"
81 "oEjPLVNtx8SOj/M4rhaPT3I=\r\n" "-----END PRIVATE KEY-----\r\n";
82 const u32 test_srv_key_rsa_len = sizeof (test_srv_key_rsa);
84 #define app_interface_check_thread_and_barrier(_fn, _arg) \
85 if (PREDICT_FALSE (!vlib_thread_is_main_w_barrier ())) \
87 vlib_rpc_call_main_thread (_fn, (u8 *) _arg, sizeof(*_arg)); \
92 session_endpoint_is_local (session_endpoint_t * sep)
94 return (ip_is_zero (&sep->ip, sep->is_ip4)
95 || ip_is_local_host (&sep->ip, sep->is_ip4));
99 session_endpoint_is_zero (session_endpoint_t * sep)
101 return ip_is_zero (&sep->ip, sep->is_ip4);
105 session_endpoint_in_ns (session_endpoint_t * sep)
107 u8 is_lep = session_endpoint_is_local (sep);
108 if (!is_lep && sep->sw_if_index != ENDPOINT_INVALID_INDEX
109 && !ip_interface_has_address (sep->sw_if_index, &sep->ip, sep->is_ip4))
111 clib_warning ("sw_if_index %u not configured with ip %U",
112 sep->sw_if_index, format_ip46_address, &sep->ip,
116 return (is_lep || ip_is_local (sep->fib_index, &sep->ip, sep->is_ip4));
120 api_parse_session_handle (u64 handle, u32 * session_index, u32 * thread_index)
122 session_manager_main_t *smm = vnet_get_session_manager_main ();
123 stream_session_t *pool;
125 *thread_index = handle & 0xFFFFFFFF;
126 *session_index = handle >> 32;
128 if (*thread_index >= vec_len (smm->wrk))
129 return VNET_API_ERROR_INVALID_VALUE;
131 pool = smm->wrk[*thread_index].sessions;
133 if (pool_is_free_index (pool, *session_index))
134 return VNET_API_ERROR_INVALID_VALUE_2;
140 session_endpoint_update_for_app (session_endpoint_cfg_t * sep,
141 application_t * app, u8 is_connect)
143 app_namespace_t *app_ns;
144 u32 ns_index, fib_index;
146 ns_index = app->ns_index;
148 /* App is a transport proto, so fetch the calling app's ns */
149 if (app->flags & APP_OPTIONS_FLAGS_IS_TRANSPORT_APP)
151 app_worker_t *owner_wrk;
152 application_t *owner_app;
154 owner_wrk = app_worker_get (sep->app_wrk_index);
155 owner_app = application_get (owner_wrk->app_index);
156 ns_index = owner_app->ns_index;
158 app_ns = app_namespace_get (ns_index);
162 /* Ask transport and network to bind to/connect using local interface
163 * that "supports" app's namespace. This will fix our local connection
167 /* If in default namespace and user requested a fib index use it */
168 if (ns_index == 0 && sep->fib_index != ENDPOINT_INVALID_INDEX)
169 fib_index = sep->fib_index;
171 fib_index = sep->is_ip4 ? app_ns->ip4_fib_index : app_ns->ip6_fib_index;
172 sep->peer.fib_index = fib_index;
173 sep->fib_index = fib_index;
177 sep->sw_if_index = app_ns->sw_if_index;
181 if (app_ns->sw_if_index != APP_NAMESPACE_INVALID_INDEX
182 && sep->peer.sw_if_index != ENDPOINT_INVALID_INDEX
183 && sep->peer.sw_if_index != app_ns->sw_if_index)
184 clib_warning ("Local sw_if_index different from app ns sw_if_index");
186 sep->peer.sw_if_index = app_ns->sw_if_index;
191 vnet_bind_inline (vnet_bind_args_t * a)
193 u64 ll_handle = SESSION_INVALID_HANDLE;
194 app_worker_t *app_wrk;
198 app = application_get_if_valid (a->app_index);
201 SESSION_DBG ("app not attached");
202 return VNET_API_ERROR_APPLICATION_NOT_ATTACHED;
204 app_wrk = application_get_worker (app, a->wrk_map_index);
205 a->sep_ext.app_wrk_index = app_wrk->wrk_index;
207 session_endpoint_update_for_app (&a->sep_ext, app, 0 /* is_connect */ );
208 if (!session_endpoint_in_ns (&a->sep))
209 return VNET_API_ERROR_INVALID_VALUE_2;
212 * Add session endpoint to local session table. Only binds to "inaddr_any"
213 * (i.e., zero address) are added to local scope table.
215 if (application_has_local_scope (app)
216 && session_endpoint_is_local (&a->sep))
218 if ((rv = application_start_local_listen (app, &a->sep_ext,
221 ll_handle = a->handle;
224 if (!application_has_global_scope (app))
225 return (ll_handle == SESSION_INVALID_HANDLE ? -1 : 0);
228 * Add session endpoint to global session table
231 /* Setup listen path down to transport */
232 rv = application_start_listen (app, &a->sep_ext, &a->handle);
233 if (rv && ll_handle != SESSION_INVALID_HANDLE)
235 application_stop_local_listen (a->app_index, a->wrk_map_index,
241 * Store in local table listener the index of the transport layer
242 * listener. We'll need if if local listeners are hit and we need to
243 * return global handle
245 if (ll_handle != SESSION_INVALID_HANDLE)
248 stream_session_t *tl;
249 ll = application_get_local_listener_w_handle (ll_handle);
250 tl = listen_session_get_from_handle (a->handle);
251 if (ll->transport_listener_index == ~0)
252 ll->transport_listener_index = tl->session_index;
258 vnet_unbind_inline (vnet_unbind_args_t * a)
263 if (!(app = application_get_if_valid (a->app_index)))
265 SESSION_DBG ("app (%d) not attached", wrk_map_index);
266 return VNET_API_ERROR_APPLICATION_NOT_ATTACHED;
269 if (application_has_local_scope (app))
271 if ((rv = application_stop_local_listen (a->app_index,
272 a->wrk_map_index, a->handle)))
277 * Clear the global scope table of the listener
279 if (application_has_global_scope (app))
280 return application_stop_listen (a->app_index, a->wrk_map_index,
286 application_connect (vnet_connect_args_t * a)
288 app_worker_t *server_wrk, *client_wrk;
289 u32 table_index, server_index, li;
290 stream_session_t *listener;
291 application_t *client, *server;
296 if (session_endpoint_is_zero (&a->sep))
297 return VNET_API_ERROR_INVALID_VALUE;
299 client = application_get (a->app_index);
300 session_endpoint_update_for_app (&a->sep_ext, client, 1 /* is_connect */ );
301 client_wrk = application_get_worker (client, a->wrk_map_index);
304 * First check the local scope for locally attached destinations.
305 * If we have local scope, we pass *all* connects through it since we may
306 * have special policy rules even for non-local destinations, think proxy.
308 if (application_has_local_scope (client))
310 table_index = application_local_session_table (client);
311 lh = session_lookup_local_endpoint (table_index, &a->sep);
312 if (lh == SESSION_DROP_HANDLE)
313 return VNET_API_ERROR_APP_CONNECT_FILTERED;
315 if (lh == SESSION_INVALID_HANDLE)
318 local_session_parse_handle (lh, &server_index, &li);
321 * Break loop if rule in local table points to connecting app. This
322 * can happen if client is a generic proxy. Route connect through
323 * global table instead.
325 if (server_index != a->app_index)
327 server = application_get (server_index);
328 ll = application_get_local_listen_session (server, li);
329 listener = (stream_session_t *) ll;
330 server_wrk = application_listener_select_worker (listener,
332 return application_local_session_connect (client_wrk,
339 * If nothing found, check the global scope for locally attached
340 * destinations. Make sure first that we're allowed to.
344 if (session_endpoint_is_local (&a->sep))
345 return VNET_API_ERROR_SESSION_CONNECT;
347 if (!application_has_global_scope (client))
348 return VNET_API_ERROR_APP_CONNECT_SCOPE;
350 fib_proto = session_endpoint_fib_proto (&a->sep);
351 table_index = application_session_table (client, fib_proto);
352 listener = session_lookup_listener (table_index, &a->sep);
355 server_wrk = application_listener_select_worker (listener,
357 ll = (local_session_t *) listener;
358 return application_local_session_connect (client_wrk, server_wrk, ll,
363 * Not connecting to a local server, propagate to transport
365 if (app_worker_open_session (client_wrk, &a->sep, a->api_context))
366 return VNET_API_ERROR_SESSION_CONNECT;
371 * unformat a vnet URI
373 * transport-proto://[hostname]ip46-addr:port
374 * eg. tcp://ip46-addr:port
375 * tls://[testtsl.fd.io]ip46-addr:port
377 * u8 ip46_address[16];
378 * u16 port_in_host_byte_order;
379 * stream_session_type_t sst;
382 * if (unformat (input, "%U", unformat_vnet_uri, &ip46_address,
383 * &sst, &port, &fifo_name))
388 unformat_vnet_uri (unformat_input_t * input, va_list * args)
390 session_endpoint_cfg_t *sep = va_arg (*args, session_endpoint_cfg_t *);
391 u32 transport_proto = 0, port;
393 if (unformat (input, "%U://%U/%d", unformat_transport_proto,
394 &transport_proto, unformat_ip4_address, &sep->ip.ip4, &port))
396 sep->transport_proto = transport_proto;
397 sep->port = clib_host_to_net_u16 (port);
401 else if (unformat (input, "%U://[%s]%U/%d", unformat_transport_proto,
402 &transport_proto, &sep->hostname, unformat_ip4_address,
403 &sep->ip.ip4, &port))
405 sep->transport_proto = transport_proto;
406 sep->port = clib_host_to_net_u16 (port);
410 else if (unformat (input, "%U://%U/%d", unformat_transport_proto,
411 &transport_proto, unformat_ip6_address, &sep->ip.ip6,
414 sep->transport_proto = transport_proto;
415 sep->port = clib_host_to_net_u16 (port);
419 else if (unformat (input, "%U://[%s]%U/%d", unformat_transport_proto,
420 &transport_proto, &sep->hostname, unformat_ip6_address,
421 &sep->ip.ip6, &port))
423 sep->transport_proto = transport_proto;
424 sep->port = clib_host_to_net_u16 (port);
431 static u8 *cache_uri;
432 static session_endpoint_cfg_t *cache_sep;
435 parse_uri (char *uri, session_endpoint_cfg_t * sep)
437 unformat_input_t _input, *input = &_input;
439 if (cache_uri && !strncmp (uri, (char *) cache_uri, vec_len (cache_uri)))
446 uri = (char *) format (0, "%s%c", uri, 0);
449 unformat_init_string (input, uri, strlen (uri));
450 if (!unformat (input, "%U", unformat_vnet_uri, sep))
452 unformat_free (input);
453 return VNET_API_ERROR_INVALID_VALUE;
455 unformat_free (input);
457 vec_free (cache_uri);
458 cache_uri = (u8 *) uri;
460 clib_mem_free (cache_sep);
461 cache_sep = clib_mem_alloc (sizeof (*sep));
468 app_validate_namespace (u8 * namespace_id, u64 secret, u32 * app_ns_index)
470 app_namespace_t *app_ns;
471 if (vec_len (namespace_id) == 0)
473 /* Use default namespace */
478 *app_ns_index = app_namespace_index_from_id (namespace_id);
479 if (*app_ns_index == APP_NAMESPACE_INVALID_INDEX)
480 return VNET_API_ERROR_APP_INVALID_NS;
481 app_ns = app_namespace_get (*app_ns_index);
483 return VNET_API_ERROR_APP_INVALID_NS;
484 if (app_ns->ns_secret != secret)
485 return VNET_API_ERROR_APP_WRONG_NS_SECRET;
490 app_name_from_api_index (u32 api_client_index)
492 vl_api_registration_t *regp;
493 regp = vl_api_client_index_to_registration (api_client_index);
495 return format (0, "%s%c", regp->name, 0);
497 clib_warning ("api client index %u does not have an api registration!",
499 return format (0, "unknown%c", 0);
503 * Attach application to vpp
505 * Allocates a vpp app, i.e., a structure that keeps back pointers
506 * to external app and a segment manager for shared memory fifo based
507 * communication with the external app.
510 vnet_application_attach (vnet_app_attach_args_t * a)
512 svm_fifo_segment_private_t *fs;
513 application_t *app = 0;
514 app_worker_t *app_wrk;
515 segment_manager_t *sm;
516 u32 app_ns_index = 0;
521 if (a->api_client_index != APP_INVALID_INDEX)
522 app = application_lookup (a->api_client_index);
524 app = application_lookup_name (a->name);
526 return clib_error_return_code (0, VNET_API_ERROR_INVALID_VALUE, 0,
527 "api index or name must be provided");
530 return clib_error_return_code (0, VNET_API_ERROR_APP_ALREADY_ATTACHED, 0,
531 "app already attached");
533 if (a->api_client_index != APP_INVALID_INDEX)
535 app_name = app_name_from_api_index (a->api_client_index);
539 secret = a->options[APP_OPTIONS_NAMESPACE_SECRET];
540 if ((rv = app_validate_namespace (a->namespace_id, secret, &app_ns_index)))
541 return clib_error_return_code (0, rv, 0, "namespace validation: %d", rv);
542 a->options[APP_OPTIONS_NAMESPACE] = app_ns_index;
544 if ((rv = application_alloc_and_init ((app_init_args_t *) a)))
545 return clib_error_return_code (0, rv, 0, "app init: %d", rv);
547 app = application_get (a->app_index);
548 if ((rv = app_worker_alloc_and_init (app, &app_wrk)))
549 return clib_error_return_code (0, rv, 0, "app default wrk init: %d", rv);
551 a->app_evt_q = app_wrk->event_queue;
552 app_wrk->api_client_index = a->api_client_index;
553 sm = segment_manager_get (app_wrk->first_segment_manager);
554 fs = segment_manager_get_segment_w_lock (sm, 0);
556 if (application_is_proxy (app))
557 application_setup_proxy (app);
559 ASSERT (vec_len (fs->ssvm.name) <= 128);
560 a->segment = &fs->ssvm;
561 a->segment_handle = segment_manager_segment_handle (sm, fs);
563 segment_manager_segment_reader_unlock (sm);
569 * Detach application from vpp
572 vnet_application_detach (vnet_app_detach_args_t * a)
576 app = application_get_if_valid (a->app_index);
579 clib_warning ("app not attached");
580 return VNET_API_ERROR_APPLICATION_NOT_ATTACHED;
583 app_interface_check_thread_and_barrier (vnet_application_detach, a);
584 application_detach_process (app, a->api_client_index);
589 vnet_bind_uri (vnet_bind_args_t * a)
591 session_endpoint_cfg_t sep = SESSION_ENDPOINT_CFG_NULL;
594 rv = parse_uri (a->uri, &sep);
597 sep.app_wrk_index = 0;
598 clib_memcpy (&a->sep_ext, &sep, sizeof (sep));
599 return vnet_bind_inline (a);
603 vnet_unbind_uri (vnet_unbind_args_t * a)
605 session_endpoint_cfg_t sep = SESSION_ENDPOINT_CFG_NULL;
606 stream_session_t *listener;
610 rv = parse_uri (a->uri, &sep);
614 /* NOTE: only default fib tables supported for uri apis */
615 table_index = session_lookup_get_index_for_fib (fib_ip_proto (!sep.is_ip4),
617 listener = session_lookup_listener (table_index,
618 (session_endpoint_t *) & sep);
620 return VNET_API_ERROR_ADDRESS_NOT_IN_USE;
621 a->handle = listen_session_get_handle (listener);
622 return vnet_unbind_inline (a);
626 vnet_connect_uri (vnet_connect_args_t * a)
628 session_endpoint_cfg_t sep = SESSION_ENDPOINT_CFG_NULL;
632 rv = parse_uri (a->uri, &sep);
634 return clib_error_return_code (0, rv, 0, "app init: %d", rv);
636 clib_memcpy (&a->sep_ext, &sep, sizeof (sep));
637 if ((rv = application_connect (a)))
638 return clib_error_return_code (0, rv, 0, "connect failed");
643 vnet_disconnect_session (vnet_disconnect_args_t * a)
645 if (session_handle_is_local (a->handle))
649 /* Disconnect reply came to worker 1 not main thread */
650 app_interface_check_thread_and_barrier (vnet_disconnect_session, a);
652 if (!(ls = application_get_local_session_from_handle (a->handle)))
655 return application_local_session_disconnect (a->app_index, ls);
659 app_worker_t *app_wrk;
662 s = session_get_from_handle_if_valid (a->handle);
664 return VNET_API_ERROR_INVALID_VALUE;
665 app_wrk = app_worker_get (s->app_wrk_index);
666 if (app_wrk->app_index != a->app_index)
667 return VNET_API_ERROR_INVALID_VALUE;
669 /* We're peeking into another's thread pool. Make sure */
670 ASSERT (s->session_index == session_index_from_handle (a->handle));
678 vnet_bind (vnet_bind_args_t * a)
681 if ((rv = vnet_bind_inline (a)))
682 return clib_error_return_code (0, rv, 0, "bind failed: %d", rv);
687 vnet_unbind (vnet_unbind_args_t * a)
690 if ((rv = vnet_unbind_inline (a)))
691 return clib_error_return_code (0, rv, 0, "unbind failed: %d", rv);
696 vnet_connect (vnet_connect_args_t * a)
700 if ((rv = application_connect (a)))
701 return clib_error_return_code (0, rv, 0, "connect failed: %d", rv);
706 * fd.io coding-style-patch-verification: ON
709 * eval: (c-set-style "gnu")