2 * Copyright (c) 2017-2019 Cisco and/or its affiliates.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
7 * http://www.apache.org/licenses/LICENSE-2.0
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
17 * @brief Session and session manager
20 #include <vnet/session/session.h>
21 #include <vnet/session/session_debug.h>
22 #include <vnet/session/application.h>
23 #include <vnet/dpo/load_balance.h>
24 #include <vnet/fib/ip4_fib.h>
26 session_main_t session_main;
29 session_send_evt_to_thread (void *data, void *args, u32 thread_index,
30 session_evt_type_t evt_type)
36 mq = session_main_get_vpp_event_queue (thread_index);
37 if (PREDICT_FALSE (svm_msg_q_lock (mq)))
39 if (PREDICT_FALSE (svm_msg_q_is_full (mq)
40 || svm_msg_q_ring_is_full (mq, SESSION_MQ_IO_EVT_RING)))
42 svm_msg_q_unlock (mq);
47 case SESSION_CTRL_EVT_RPC:
48 msg = svm_msg_q_alloc_msg_w_ring (mq, SESSION_MQ_IO_EVT_RING);
49 evt = (session_event_t *) svm_msg_q_msg_data (mq, &msg);
50 evt->rpc_args.fp = data;
51 evt->rpc_args.arg = args;
53 case SESSION_IO_EVT_RX:
54 case SESSION_IO_EVT_TX:
55 case SESSION_IO_EVT_TX_FLUSH:
56 case SESSION_IO_EVT_BUILTIN_RX:
57 msg = svm_msg_q_alloc_msg_w_ring (mq, SESSION_MQ_IO_EVT_RING);
58 evt = (session_event_t *) svm_msg_q_msg_data (mq, &msg);
59 evt->session_index = *(u32 *) data;
61 case SESSION_IO_EVT_BUILTIN_TX:
62 case SESSION_CTRL_EVT_CLOSE:
63 case SESSION_CTRL_EVT_RESET:
64 msg = svm_msg_q_alloc_msg_w_ring (mq, SESSION_MQ_IO_EVT_RING);
65 evt = (session_event_t *) svm_msg_q_msg_data (mq, &msg);
66 evt->session_handle = session_handle ((session_t *) data);
69 clib_warning ("evt unhandled!");
70 svm_msg_q_unlock (mq);
73 evt->event_type = evt_type;
75 svm_msg_q_add_and_unlock (mq, &msg);
80 session_send_io_evt_to_thread (svm_fifo_t * f, session_evt_type_t evt_type)
82 return session_send_evt_to_thread (&f->master_session_index, 0,
83 f->master_thread_index, evt_type);
87 session_send_io_evt_to_thread_custom (void *data, u32 thread_index,
88 session_evt_type_t evt_type)
90 return session_send_evt_to_thread (data, 0, thread_index, evt_type);
94 session_send_ctrl_evt_to_thread (session_t * s, session_evt_type_t evt_type)
96 /* only events supported are disconnect and reset */
97 ASSERT (evt_type == SESSION_CTRL_EVT_CLOSE
98 || evt_type == SESSION_CTRL_EVT_RESET);
99 return session_send_evt_to_thread (s, 0, s->thread_index, evt_type);
103 session_send_rpc_evt_to_thread_force (u32 thread_index, void *fp,
106 session_send_evt_to_thread (fp, rpc_args, thread_index,
107 SESSION_CTRL_EVT_RPC);
111 session_send_rpc_evt_to_thread (u32 thread_index, void *fp, void *rpc_args)
113 if (thread_index != vlib_get_thread_index ())
114 session_send_rpc_evt_to_thread_force (thread_index, fp, rpc_args);
117 void (*fnp) (void *) = fp;
123 session_add_self_custom_tx_evt (transport_connection_t * tc, u8 has_prio)
127 s = session_get (tc->s_index, tc->thread_index);
128 ASSERT (s->thread_index == vlib_get_thread_index ());
129 ASSERT (s->session_state != SESSION_STATE_TRANSPORT_DELETED);
130 if (!(s->flags & SESSION_F_CUSTOM_TX))
132 s->flags |= SESSION_F_CUSTOM_TX;
133 if (svm_fifo_set_event (s->tx_fifo))
135 session_worker_t *wrk;
136 session_evt_elt_t *elt;
137 wrk = session_main_get_worker (tc->thread_index);
139 elt = session_evt_alloc_new (wrk);
141 elt = session_evt_alloc_old (wrk);
142 elt->evt.session_index = tc->s_index;
143 elt->evt.event_type = SESSION_IO_EVT_TX;
149 session_program_transport_ctrl_evt (session_t * s, session_evt_type_t evt)
151 u32 thread_index = vlib_get_thread_index ();
152 session_evt_elt_t *elt;
153 session_worker_t *wrk;
155 /* If we are in the handler thread, or being called with the worker barrier
156 * held, just append a new event to pending disconnects vector. */
157 if (vlib_thread_is_main_w_barrier () || thread_index == s->thread_index)
159 wrk = session_main_get_worker (s->thread_index);
160 elt = session_evt_alloc_ctrl (wrk);
161 clib_memset (&elt->evt, 0, sizeof (session_event_t));
162 elt->evt.session_handle = session_handle (s);
163 elt->evt.event_type = evt;
166 session_send_ctrl_evt_to_thread (s, evt);
170 session_alloc (u32 thread_index)
172 session_worker_t *wrk = &session_main.wrk[thread_index];
175 pool_get_aligned_will_expand (wrk->sessions, will_expand,
176 CLIB_CACHE_LINE_BYTES);
177 /* If we have peekers, let them finish */
178 if (PREDICT_FALSE (will_expand && vlib_num_workers ()))
180 clib_rwlock_writer_lock (&wrk->peekers_rw_locks);
181 pool_get_aligned (wrk->sessions, s, CLIB_CACHE_LINE_BYTES);
182 clib_rwlock_writer_unlock (&wrk->peekers_rw_locks);
186 pool_get_aligned (wrk->sessions, s, CLIB_CACHE_LINE_BYTES);
188 clib_memset (s, 0, sizeof (*s));
189 s->session_index = s - wrk->sessions;
190 s->thread_index = thread_index;
191 s->app_index = APP_INVALID_INDEX;
196 session_free (session_t * s)
200 u8 thread_index = s->thread_index;
201 clib_memset (s, 0xFA, sizeof (*s));
202 pool_put (session_main.wrk[thread_index].sessions, s);
205 SESSION_EVT (SESSION_EVT_FREE, s);
206 pool_put (session_main.wrk[s->thread_index].sessions, s);
210 session_is_valid (u32 si, u8 thread_index)
213 transport_connection_t *tc;
215 s = pool_elt_at_index (session_main.wrk[thread_index].sessions, si);
220 if (s->thread_index != thread_index || s->session_index != si)
223 if (s->session_state == SESSION_STATE_TRANSPORT_DELETED
224 || s->session_state <= SESSION_STATE_LISTENING)
227 tc = session_get_transport (s);
228 if (s->connection_index != tc->c_index
229 || s->thread_index != tc->thread_index || tc->s_index != si)
236 session_cleanup_notify (session_t * s, session_cleanup_ntf_t ntf)
238 app_worker_t *app_wrk;
240 app_wrk = app_worker_get_if_valid (s->app_wrk_index);
243 app_worker_cleanup_notify (app_wrk, s, ntf);
247 session_free_w_fifos (session_t * s)
249 session_cleanup_notify (s, SESSION_CLEANUP_SESSION);
250 segment_manager_dealloc_fifos (s->rx_fifo, s->tx_fifo);
255 * Cleans up session and lookup table.
257 * Transport connection must still be valid.
260 session_delete (session_t * s)
264 /* Delete from the main lookup table. */
265 if ((rv = session_lookup_del_session (s)))
266 clib_warning ("session %u hash delete rv %d", s->session_index, rv);
268 session_free_w_fifos (s);
272 session_alloc_for_connection (transport_connection_t * tc)
275 u32 thread_index = tc->thread_index;
277 ASSERT (thread_index == vlib_get_thread_index ()
278 || transport_protocol_is_cl (tc->proto));
280 s = session_alloc (thread_index);
281 s->session_type = session_type_from_proto_and_ip (tc->proto, tc->is_ip4);
282 s->session_state = SESSION_STATE_CLOSED;
284 /* Attach transport to session and vice versa */
285 s->connection_index = tc->c_index;
286 tc->s_index = s->session_index;
291 * Discards bytes from buffer chain
293 * It discards n_bytes_to_drop starting at first buffer after chain_b
296 session_enqueue_discard_chain_bytes (vlib_main_t * vm, vlib_buffer_t * b,
297 vlib_buffer_t ** chain_b,
300 vlib_buffer_t *next = *chain_b;
301 u32 to_drop = n_bytes_to_drop;
302 ASSERT (b->flags & VLIB_BUFFER_NEXT_PRESENT);
303 while (to_drop && (next->flags & VLIB_BUFFER_NEXT_PRESENT))
305 next = vlib_get_buffer (vm, next->next_buffer);
306 if (next->current_length > to_drop)
308 vlib_buffer_advance (next, to_drop);
313 to_drop -= next->current_length;
314 next->current_length = 0;
320 b->total_length_not_including_first_buffer -= n_bytes_to_drop;
324 * Enqueue buffer chain tail
327 session_enqueue_chain_tail (session_t * s, vlib_buffer_t * b,
328 u32 offset, u8 is_in_order)
330 vlib_buffer_t *chain_b;
331 u32 chain_bi, len, diff;
332 vlib_main_t *vm = vlib_get_main ();
337 if (is_in_order && offset)
339 diff = offset - b->current_length;
340 if (diff > b->total_length_not_including_first_buffer)
343 session_enqueue_discard_chain_bytes (vm, b, &chain_b, diff);
344 chain_bi = vlib_get_buffer_index (vm, chain_b);
347 chain_bi = b->next_buffer;
351 chain_b = vlib_get_buffer (vm, chain_bi);
352 data = vlib_buffer_get_current (chain_b);
353 len = chain_b->current_length;
358 rv = svm_fifo_enqueue (s->rx_fifo, len, data);
365 return (rv > 0) ? (written + rv) : written;
371 /* written more than what was left in chain */
372 if (written > b->total_length_not_including_first_buffer)
375 /* drop the bytes that have already been delivered */
376 session_enqueue_discard_chain_bytes (vm, b, &chain_b, rv - len);
381 rv = svm_fifo_enqueue_with_offset (s->rx_fifo, offset, len, data);
384 clib_warning ("failed to enqueue multi-buffer seg");
390 while ((chain_bi = (chain_b->flags & VLIB_BUFFER_NEXT_PRESENT)
391 ? chain_b->next_buffer : 0));
400 * Enqueue data for delivery to session peer. Does not notify peer of enqueue
401 * event but on request can queue notification events for later delivery by
402 * calling stream_server_flush_enqueue_events().
404 * @param tc Transport connection which is to be enqueued data
405 * @param b Buffer to be enqueued
406 * @param offset Offset at which to start enqueueing if out-of-order
407 * @param queue_event Flag to indicate if peer is to be notified or if event
408 * is to be queued. The former is useful when more data is
409 * enqueued and only one event is to be generated.
410 * @param is_in_order Flag to indicate if data is in order
411 * @return Number of bytes enqueued or a negative value if enqueueing failed.
414 session_enqueue_stream_connection (transport_connection_t * tc,
415 vlib_buffer_t * b, u32 offset,
416 u8 queue_event, u8 is_in_order)
419 int enqueued = 0, rv, in_order_off;
421 s = session_get (tc->s_index, tc->thread_index);
425 enqueued = svm_fifo_enqueue (s->rx_fifo,
427 vlib_buffer_get_current (b));
428 if (PREDICT_FALSE ((b->flags & VLIB_BUFFER_NEXT_PRESENT)
431 in_order_off = enqueued > b->current_length ? enqueued : 0;
432 rv = session_enqueue_chain_tail (s, b, in_order_off, 1);
439 rv = svm_fifo_enqueue_with_offset (s->rx_fifo, offset,
441 vlib_buffer_get_current (b));
442 if (PREDICT_FALSE ((b->flags & VLIB_BUFFER_NEXT_PRESENT) && !rv))
443 session_enqueue_chain_tail (s, b, offset + b->current_length, 0);
444 /* if something was enqueued, report even this as success for ooo
445 * segment handling */
451 /* Queue RX event on this fifo. Eventually these will need to be flushed
452 * by calling stream_server_flush_enqueue_events () */
453 session_worker_t *wrk;
455 wrk = session_main_get_worker (s->thread_index);
456 if (!(s->flags & SESSION_F_RX_EVT))
458 s->flags |= SESSION_F_RX_EVT;
459 vec_add1 (wrk->session_to_enqueue[tc->proto], s->session_index);
467 session_enqueue_dgram_connection (session_t * s,
468 session_dgram_hdr_t * hdr,
469 vlib_buffer_t * b, u8 proto, u8 queue_event)
471 int enqueued = 0, rv, in_order_off;
473 ASSERT (svm_fifo_max_enqueue_prod (s->rx_fifo)
474 >= b->current_length + sizeof (*hdr));
476 svm_fifo_enqueue (s->rx_fifo, sizeof (session_dgram_hdr_t), (u8 *) hdr);
477 enqueued = svm_fifo_enqueue (s->rx_fifo, b->current_length,
478 vlib_buffer_get_current (b));
479 if (PREDICT_FALSE ((b->flags & VLIB_BUFFER_NEXT_PRESENT) && enqueued >= 0))
481 in_order_off = enqueued > b->current_length ? enqueued : 0;
482 rv = session_enqueue_chain_tail (s, b, in_order_off, 1);
488 /* Queue RX event on this fifo. Eventually these will need to be flushed
489 * by calling stream_server_flush_enqueue_events () */
490 session_worker_t *wrk;
492 wrk = session_main_get_worker (s->thread_index);
493 if (!(s->flags & SESSION_F_RX_EVT))
495 s->flags |= SESSION_F_RX_EVT;
496 vec_add1 (wrk->session_to_enqueue[proto], s->session_index);
503 session_tx_fifo_peek_bytes (transport_connection_t * tc, u8 * buffer,
504 u32 offset, u32 max_bytes)
506 session_t *s = session_get (tc->s_index, tc->thread_index);
507 return svm_fifo_peek (s->tx_fifo, offset, max_bytes, buffer);
511 session_tx_fifo_dequeue_drop (transport_connection_t * tc, u32 max_bytes)
513 session_t *s = session_get (tc->s_index, tc->thread_index);
516 rv = svm_fifo_dequeue_drop (s->tx_fifo, max_bytes);
518 if (svm_fifo_needs_deq_ntf (s->tx_fifo, max_bytes))
519 session_dequeue_notify (s);
525 session_notify_subscribers (u32 app_index, session_t * s,
526 svm_fifo_t * f, session_evt_type_t evt_type)
528 app_worker_t *app_wrk;
532 app = application_get (app_index);
536 for (i = 0; i < f->n_subscribers; i++)
538 app_wrk = application_get_worker (app, f->subscribers[i]);
541 if (app_worker_lock_and_send_event (app_wrk, s, evt_type))
549 * Notify session peer that new data has been enqueued.
551 * @param s Stream session for which the event is to be generated.
552 * @param lock Flag to indicate if call should lock message queue.
554 * @return 0 on success or negative number if failed to send notification.
557 session_enqueue_notify_inline (session_t * s)
559 app_worker_t *app_wrk;
563 session_index = s->session_index;
564 n_subscribers = svm_fifo_n_subscribers (s->rx_fifo);
566 app_wrk = app_worker_get_if_valid (s->app_wrk_index);
567 if (PREDICT_FALSE (!app_wrk))
569 SESSION_DBG ("invalid s->app_index = %d", s->app_wrk_index);
573 SESSION_EVT (SESSION_EVT_ENQ, s, svm_fifo_max_dequeue_prod (s->rx_fifo));
575 s->flags &= ~SESSION_F_RX_EVT;
576 if (PREDICT_FALSE (app_worker_lock_and_send_event (app_wrk, s,
580 if (PREDICT_FALSE (n_subscribers))
582 s = session_get (session_index, vlib_get_thread_index ());
583 return session_notify_subscribers (app_wrk->app_index, s,
584 s->rx_fifo, SESSION_IO_EVT_RX);
591 session_enqueue_notify (session_t * s)
593 return session_enqueue_notify_inline (s);
597 session_enqueue_notify_rpc (void *arg)
599 u32 session_index = pointer_to_uword (arg);
602 s = session_get_if_valid (session_index, vlib_get_thread_index ());
606 session_enqueue_notify (s);
610 * Like session_enqueue_notify, but can be called from a thread that does not
614 session_enqueue_notify_thread (session_handle_t sh)
616 u32 thread_index = session_thread_from_handle (sh);
617 u32 session_index = session_index_from_handle (sh);
620 * Pass session index (u32) as opposed to handle (u64) in case pointers
623 session_send_rpc_evt_to_thread (thread_index,
624 session_enqueue_notify_rpc,
625 uword_to_pointer (session_index, void *));
629 session_dequeue_notify (session_t * s)
631 app_worker_t *app_wrk;
633 svm_fifo_clear_deq_ntf (s->tx_fifo);
635 app_wrk = app_worker_get_if_valid (s->app_wrk_index);
636 if (PREDICT_FALSE (!app_wrk))
639 if (PREDICT_FALSE (app_worker_lock_and_send_event (app_wrk, s,
643 if (PREDICT_FALSE (s->tx_fifo->n_subscribers))
644 return session_notify_subscribers (app_wrk->app_index, s,
645 s->tx_fifo, SESSION_IO_EVT_TX);
651 * Flushes queue of sessions that are to be notified of new data
654 * @param thread_index Thread index for which the flush is to be performed.
655 * @return 0 on success or a positive number indicating the number of
656 * failures due to API queue being full.
659 session_main_flush_enqueue_events (u8 transport_proto, u32 thread_index)
661 session_worker_t *wrk = session_main_get_worker (thread_index);
666 indices = wrk->session_to_enqueue[transport_proto];
668 for (i = 0; i < vec_len (indices); i++)
670 s = session_get_if_valid (indices[i], thread_index);
671 if (PREDICT_FALSE (!s))
677 if (PREDICT_FALSE (session_enqueue_notify_inline (s)))
681 vec_reset_length (indices);
682 wrk->session_to_enqueue[transport_proto] = indices;
688 session_main_flush_all_enqueue_events (u8 transport_proto)
690 vlib_thread_main_t *vtm = vlib_get_thread_main ();
692 for (i = 0; i < 1 + vtm->n_threads; i++)
693 errors += session_main_flush_enqueue_events (transport_proto, i);
698 session_stream_connect_notify_inline (transport_connection_t * tc, u8 is_fail,
699 session_state_t opened_state)
701 u32 opaque = 0, new_ti, new_si;
702 app_worker_t *app_wrk;
707 * Find connection handle and cleanup half-open table
709 ho_handle = session_lookup_half_open_handle (tc);
710 if (ho_handle == HALF_OPEN_LOOKUP_INVALID_VALUE)
712 SESSION_DBG ("half-open was removed!");
715 session_lookup_del_half_open (tc);
717 /* Get the app's index from the handle we stored when opening connection
718 * and the opaque (api_context for external apps) from transport session
720 app_wrk = app_worker_get_if_valid (ho_handle >> 32);
724 opaque = tc->s_index;
727 return app_worker_connect_notify (app_wrk, s, opaque);
729 s = session_alloc_for_connection (tc);
730 s->session_state = SESSION_STATE_CONNECTING;
731 s->app_wrk_index = app_wrk->wrk_index;
732 new_si = s->session_index;
733 new_ti = s->thread_index;
735 if (app_worker_init_connected (app_wrk, s))
738 app_worker_connect_notify (app_wrk, 0, opaque);
742 s = session_get (new_si, new_ti);
743 s->session_state = opened_state;
744 session_lookup_add_connection (tc, session_handle (s));
746 if (app_worker_connect_notify (app_wrk, s, opaque))
748 s = session_get (new_si, new_ti);
749 session_free_w_fifos (s);
757 session_stream_connect_notify (transport_connection_t * tc, u8 is_fail)
759 return session_stream_connect_notify_inline (tc, is_fail,
760 SESSION_STATE_READY);
764 session_ho_stream_connect_notify (transport_connection_t * tc, u8 is_fail)
766 return session_stream_connect_notify_inline (tc, is_fail,
767 SESSION_STATE_OPENED);
770 typedef struct _session_switch_pool_args
774 u32 new_thread_index;
775 u32 new_session_index;
776 } session_switch_pool_args_t;
779 * Notify old thread of the session pool switch
782 session_switch_pool (void *cb_args)
784 session_switch_pool_args_t *args = (session_switch_pool_args_t *) cb_args;
785 app_worker_t *app_wrk;
788 ASSERT (args->thread_index == vlib_get_thread_index ());
789 s = session_get (args->session_index, args->thread_index);
790 s->tx_fifo->master_session_index = args->new_session_index;
791 s->tx_fifo->master_thread_index = args->new_thread_index;
792 transport_cleanup (session_get_transport_proto (s), s->connection_index,
795 app_wrk = app_worker_get_if_valid (s->app_wrk_index);
798 session_handle_t new_sh;
799 new_sh = session_make_handle (args->new_session_index,
800 args->new_thread_index);
801 app_worker_migrate_notify (app_wrk, s, new_sh);
803 /* Trigger app read on the new thread */
804 session_enqueue_notify_thread (new_sh);
808 clib_mem_free (cb_args);
812 * Move dgram session to the right thread
815 session_dgram_connect_notify (transport_connection_t * tc,
816 u32 old_thread_index, session_t ** new_session)
819 session_switch_pool_args_t *rpc_args;
822 * Clone half-open session to the right thread.
824 new_s = session_clone_safe (tc->s_index, old_thread_index);
825 new_s->connection_index = tc->c_index;
826 new_s->rx_fifo->master_session_index = new_s->session_index;
827 new_s->rx_fifo->master_thread_index = new_s->thread_index;
828 new_s->session_state = SESSION_STATE_READY;
829 new_s->flags |= SESSION_F_IS_MIGRATING;
830 session_lookup_add_connection (tc, session_handle (new_s));
833 * Ask thread owning the old session to clean it up and make us the tx
836 rpc_args = clib_mem_alloc (sizeof (*rpc_args));
837 rpc_args->new_session_index = new_s->session_index;
838 rpc_args->new_thread_index = new_s->thread_index;
839 rpc_args->session_index = tc->s_index;
840 rpc_args->thread_index = old_thread_index;
841 session_send_rpc_evt_to_thread (rpc_args->thread_index, session_switch_pool,
844 tc->s_index = new_s->session_index;
845 new_s->connection_index = tc->c_index;
846 *new_session = new_s;
851 * Notification from transport that connection is being closed.
853 * A disconnect is sent to application but state is not removed. Once
854 * disconnect is acknowledged by application, session disconnect is called.
855 * Ultimately this leads to close being called on transport (passive close).
858 session_transport_closing_notify (transport_connection_t * tc)
860 app_worker_t *app_wrk;
863 s = session_get (tc->s_index, tc->thread_index);
864 if (s->session_state >= SESSION_STATE_TRANSPORT_CLOSING)
866 s->session_state = SESSION_STATE_TRANSPORT_CLOSING;
867 app_wrk = app_worker_get (s->app_wrk_index);
868 app_worker_close_notify (app_wrk, s);
872 * Notification from transport that connection is being deleted
874 * This removes the session if it is still valid. It should be called only on
875 * previously fully established sessions. For instance failed connects should
876 * call stream_session_connect_notify and indicate that the connect has
880 session_transport_delete_notify (transport_connection_t * tc)
884 /* App might've been removed already */
885 if (!(s = session_get_if_valid (tc->s_index, tc->thread_index)))
888 switch (s->session_state)
890 case SESSION_STATE_CREATED:
891 /* Session was created but accept notification was not yet sent to the
892 * app. Cleanup everything. */
893 session_lookup_del_session (s);
894 segment_manager_dealloc_fifos (s->rx_fifo, s->tx_fifo);
897 case SESSION_STATE_ACCEPTING:
898 case SESSION_STATE_TRANSPORT_CLOSING:
899 case SESSION_STATE_CLOSING:
900 case SESSION_STATE_TRANSPORT_CLOSED:
901 /* If transport finishes or times out before we get a reply
902 * from the app, mark transport as closed and wait for reply
903 * before removing the session. Cleanup session table in advance
904 * because transport will soon be closed and closed sessions
905 * are assumed to have been removed from the lookup table */
906 session_lookup_del_session (s);
907 s->session_state = SESSION_STATE_TRANSPORT_DELETED;
908 session_cleanup_notify (s, SESSION_CLEANUP_TRANSPORT);
909 svm_fifo_dequeue_drop_all (s->tx_fifo);
911 case SESSION_STATE_APP_CLOSED:
912 /* Cleanup lookup table as transport needs to still be valid.
913 * Program transport close to ensure that all session events
914 * have been cleaned up. Once transport close is called, the
915 * session is just removed because both transport and app have
916 * confirmed the close*/
917 session_lookup_del_session (s);
918 s->session_state = SESSION_STATE_TRANSPORT_DELETED;
919 session_cleanup_notify (s, SESSION_CLEANUP_TRANSPORT);
920 svm_fifo_dequeue_drop_all (s->tx_fifo);
921 session_program_transport_ctrl_evt (s, SESSION_CTRL_EVT_CLOSE);
923 case SESSION_STATE_TRANSPORT_DELETED:
925 case SESSION_STATE_CLOSED:
926 session_cleanup_notify (s, SESSION_CLEANUP_TRANSPORT);
930 clib_warning ("session state %u", s->session_state);
931 session_cleanup_notify (s, SESSION_CLEANUP_TRANSPORT);
938 * Notification from transport that it is closed
940 * Should be called by transport, prior to calling delete notify, once it
941 * knows that no more data will be exchanged. This could serve as an
942 * early acknowledgment of an active close especially if transport delete
943 * can be delayed a long time, e.g., tcp time-wait.
946 session_transport_closed_notify (transport_connection_t * tc)
948 app_worker_t *app_wrk;
951 if (!(s = session_get_if_valid (tc->s_index, tc->thread_index)))
954 /* Transport thinks that app requested close but it actually didn't.
955 * Can happen for tcp if fin and rst are received in close succession. */
956 if (s->session_state == SESSION_STATE_READY)
958 session_transport_closing_notify (tc);
959 svm_fifo_dequeue_drop_all (s->tx_fifo);
960 s->session_state = SESSION_STATE_TRANSPORT_CLOSED;
962 /* If app close has not been received or has not yet resulted in
963 * a transport close, only mark the session transport as closed */
964 else if (s->session_state <= SESSION_STATE_CLOSING)
966 s->session_state = SESSION_STATE_TRANSPORT_CLOSED;
968 /* If app also closed, switch to closed */
969 else if (s->session_state == SESSION_STATE_APP_CLOSED)
970 s->session_state = SESSION_STATE_CLOSED;
972 app_wrk = app_worker_get_if_valid (s->app_wrk_index);
974 app_worker_transport_closed_notify (app_wrk, s);
978 * Notify application that connection has been reset.
981 session_transport_reset_notify (transport_connection_t * tc)
983 app_worker_t *app_wrk;
986 s = session_get (tc->s_index, tc->thread_index);
987 svm_fifo_dequeue_drop_all (s->tx_fifo);
988 if (s->session_state >= SESSION_STATE_TRANSPORT_CLOSING)
990 s->session_state = SESSION_STATE_TRANSPORT_CLOSING;
991 app_wrk = app_worker_get (s->app_wrk_index);
992 app_worker_reset_notify (app_wrk, s);
996 session_stream_accept_notify (transport_connection_t * tc)
998 app_worker_t *app_wrk;
1001 s = session_get (tc->s_index, tc->thread_index);
1002 app_wrk = app_worker_get_if_valid (s->app_wrk_index);
1005 s->session_state = SESSION_STATE_ACCEPTING;
1006 if (app_worker_accept_notify (app_wrk, s))
1008 /* On transport delete, no notifications should be sent. Unless, the
1009 * accept is retried and successful. */
1010 s->session_state = SESSION_STATE_CREATED;
1017 * Accept a stream session. Optionally ping the server by callback.
1020 session_stream_accept (transport_connection_t * tc, u32 listener_index,
1021 u32 thread_index, u8 notify)
1026 s = session_alloc_for_connection (tc);
1027 s->listener_handle = ((u64) thread_index << 32) | (u64) listener_index;
1028 s->session_state = SESSION_STATE_CREATED;
1030 if ((rv = app_worker_init_accepted (s)))
1033 session_lookup_add_connection (tc, session_handle (s));
1035 /* Shoulder-tap the server */
1038 app_worker_t *app_wrk = app_worker_get (s->app_wrk_index);
1039 return app_worker_accept_notify (app_wrk, s);
1046 session_open_cl (u32 app_wrk_index, session_endpoint_t * rmt, u32 opaque)
1048 transport_connection_t *tc;
1049 transport_endpoint_cfg_t *tep;
1050 app_worker_t *app_wrk;
1051 session_handle_t sh;
1055 tep = session_endpoint_to_transport_cfg (rmt);
1056 rv = transport_connect (rmt->transport_proto, tep);
1059 SESSION_DBG ("Transport failed to open connection.");
1060 return VNET_API_ERROR_SESSION_CONNECT;
1063 tc = transport_get_half_open (rmt->transport_proto, (u32) rv);
1065 /* For dgram type of service, allocate session and fifos now */
1066 app_wrk = app_worker_get (app_wrk_index);
1067 s = session_alloc_for_connection (tc);
1068 s->app_wrk_index = app_wrk->wrk_index;
1069 s->session_state = SESSION_STATE_OPENED;
1070 if (app_worker_init_connected (app_wrk, s))
1076 sh = session_handle (s);
1077 session_lookup_add_connection (tc, sh);
1078 return app_worker_connect_notify (app_wrk, s, opaque);
1082 session_open_vc (u32 app_wrk_index, session_endpoint_t * rmt, u32 opaque)
1084 transport_connection_t *tc;
1085 transport_endpoint_cfg_t *tep;
1089 tep = session_endpoint_to_transport_cfg (rmt);
1090 rv = transport_connect (rmt->transport_proto, tep);
1093 SESSION_DBG ("Transport failed to open connection.");
1094 return VNET_API_ERROR_SESSION_CONNECT;
1097 tc = transport_get_half_open (rmt->transport_proto, (u32) rv);
1099 /* If transport offers a stream service, only allocate session once the
1100 * connection has been established.
1101 * Add connection to half-open table and save app and tc index. The
1102 * latter is needed to help establish the connection while the former
1103 * is needed when the connect notify comes and we have to notify the
1106 handle = (((u64) app_wrk_index) << 32) | (u64) tc->c_index;
1107 session_lookup_add_half_open (tc, handle);
1109 /* Store api_context (opaque) for when the reply comes. Not the nicest
1110 * thing but better than allocating a separate half-open pool.
1112 tc->s_index = opaque;
1113 if (transport_half_open_has_fifos (rmt->transport_proto))
1114 return session_ho_stream_connect_notify (tc, 0 /* is_fail */ );
1119 session_open_app (u32 app_wrk_index, session_endpoint_t * rmt, u32 opaque)
1121 session_endpoint_cfg_t *sep = (session_endpoint_cfg_t *) rmt;
1122 transport_endpoint_cfg_t *tep_cfg = session_endpoint_to_transport_cfg (sep);
1124 sep->app_wrk_index = app_wrk_index;
1125 sep->opaque = opaque;
1127 return transport_connect (rmt->transport_proto, tep_cfg);
1130 typedef int (*session_open_service_fn) (u32, session_endpoint_t *, u32);
1133 static session_open_service_fn session_open_srv_fns[TRANSPORT_N_SERVICES] = {
1141 * Ask transport to open connection to remote transport endpoint.
1143 * Stores handle for matching request with reply since the call can be
1144 * asynchronous. For instance, for TCP the 3-way handshake must complete
1145 * before reply comes. Session is only created once connection is established.
1147 * @param app_index Index of the application requesting the connect
1148 * @param st Session type requested.
1149 * @param tep Remote transport endpoint
1150 * @param opaque Opaque data (typically, api_context) the application expects
1151 * on open completion.
1154 session_open (u32 app_wrk_index, session_endpoint_t * rmt, u32 opaque)
1156 transport_service_type_t tst;
1157 tst = transport_protocol_service_type (rmt->transport_proto);
1158 return session_open_srv_fns[tst] (app_wrk_index, rmt, opaque);
1162 * Ask transport to listen on session endpoint.
1164 * @param s Session for which listen will be called. Note that unlike
1165 * established sessions, listen sessions are not associated to a
1167 * @param sep Local endpoint to be listened on.
1170 session_listen (session_t * ls, session_endpoint_cfg_t * sep)
1172 transport_endpoint_t *tep;
1173 u32 tc_index, s_index;
1175 /* Transport bind/listen */
1176 tep = session_endpoint_to_transport (sep);
1177 s_index = ls->session_index;
1178 tc_index = transport_start_listen (session_get_transport_proto (ls),
1181 if (tc_index == (u32) ~ 0)
1184 /* Attach transport to session. Lookup tables are populated by the app
1185 * worker because local tables (for ct sessions) are not backed by a fib */
1186 ls = listen_session_get (s_index);
1187 ls->connection_index = tc_index;
1193 * Ask transport to stop listening on local transport endpoint.
1195 * @param s Session to stop listening on. It must be in state LISTENING.
1198 session_stop_listen (session_t * s)
1200 transport_proto_t tp = session_get_transport_proto (s);
1201 transport_connection_t *tc;
1203 if (s->session_state != SESSION_STATE_LISTENING)
1206 tc = transport_get_listener (tp, s->connection_index);
1208 return VNET_API_ERROR_ADDRESS_NOT_IN_USE;
1210 if (!(tc->flags & TRANSPORT_CONNECTION_F_NO_LOOKUP))
1211 session_lookup_del_connection (tc);
1212 transport_stop_listen (tp, s->connection_index);
1217 * Initialize session closing procedure.
1219 * Request is always sent to session node to ensure that all outstanding
1220 * requests are served before transport is notified.
1223 session_close (session_t * s)
1228 if (s->session_state >= SESSION_STATE_CLOSING)
1230 /* Session will only be removed once both app and transport
1231 * acknowledge the close */
1232 if (s->session_state == SESSION_STATE_TRANSPORT_CLOSED
1233 || s->session_state == SESSION_STATE_TRANSPORT_DELETED)
1234 session_program_transport_ctrl_evt (s, SESSION_CTRL_EVT_CLOSE);
1238 s->session_state = SESSION_STATE_CLOSING;
1239 session_program_transport_ctrl_evt (s, SESSION_CTRL_EVT_CLOSE);
1243 * Force a close without waiting for data to be flushed
1246 session_reset (session_t * s)
1248 if (s->session_state >= SESSION_STATE_CLOSING)
1250 /* Drop all outstanding tx data */
1251 svm_fifo_dequeue_drop_all (s->tx_fifo);
1252 s->session_state = SESSION_STATE_CLOSING;
1253 session_program_transport_ctrl_evt (s, SESSION_CTRL_EVT_RESET);
1257 * Notify transport the session can be disconnected. This should eventually
1258 * result in a delete notification that allows us to cleanup session state.
1259 * Called for both active/passive disconnects.
1261 * Must be called from the session's thread.
1264 session_transport_close (session_t * s)
1266 if (s->session_state >= SESSION_STATE_APP_CLOSED)
1268 if (s->session_state == SESSION_STATE_TRANSPORT_CLOSED)
1269 s->session_state = SESSION_STATE_CLOSED;
1270 /* If transport is already deleted, just free the session */
1271 else if (s->session_state >= SESSION_STATE_TRANSPORT_DELETED)
1272 session_free_w_fifos (s);
1276 /* If the tx queue wasn't drained, the transport can continue to try
1277 * sending the outstanding data (in closed state it cannot). It MUST however
1278 * at one point, either after sending everything or after a timeout, call
1279 * delete notify. This will finally lead to the complete cleanup of the
1282 s->session_state = SESSION_STATE_APP_CLOSED;
1284 transport_close (session_get_transport_proto (s), s->connection_index,
1289 * Force transport close
1292 session_transport_reset (session_t * s)
1294 if (s->session_state >= SESSION_STATE_APP_CLOSED)
1296 if (s->session_state == SESSION_STATE_TRANSPORT_CLOSED)
1297 s->session_state = SESSION_STATE_CLOSED;
1298 else if (s->session_state >= SESSION_STATE_TRANSPORT_DELETED)
1299 session_free_w_fifos (s);
1303 s->session_state = SESSION_STATE_APP_CLOSED;
1304 transport_reset (session_get_transport_proto (s), s->connection_index,
1309 * Cleanup transport and session state.
1311 * Notify transport of the cleanup and free the session. This should
1312 * be called only if transport reported some error and is already
1316 session_transport_cleanup (session_t * s)
1318 /* Delete from main lookup table before we axe the the transport */
1319 session_lookup_del_session (s);
1320 if (s->session_state != SESSION_STATE_TRANSPORT_DELETED)
1321 transport_cleanup (session_get_transport_proto (s), s->connection_index,
1323 /* Since we called cleanup, no delete notification will come. So, make
1324 * sure the session is properly freed. */
1325 segment_manager_dealloc_fifos (s->rx_fifo, s->tx_fifo);
1330 * Allocate event queues in the shared-memory segment
1332 * That can either be a newly created memfd segment, that will need to be
1333 * mapped by all stack users, or the binary api's svm region. The latter is
1334 * assumed to be already mapped. NOTE that this assumption DOES NOT hold if
1335 * api clients bootstrap shm api over sockets (i.e. use memfd segments) and
1336 * vpp uses api svm region for event queues.
1339 session_vpp_event_queues_allocate (session_main_t * smm)
1341 u32 evt_q_length = 2048, evt_size = sizeof (session_event_t);
1342 ssvm_private_t *eqs = &smm->evt_qs_segment;
1343 uword eqs_size = 64 << 20;
1344 pid_t vpp_pid = getpid ();
1348 if (smm->configured_event_queue_length)
1349 evt_q_length = smm->configured_event_queue_length;
1351 if (smm->evt_qs_use_memfd_seg)
1353 if (smm->evt_qs_segment_size)
1354 eqs_size = smm->evt_qs_segment_size;
1356 eqs->ssvm_size = eqs_size;
1357 eqs->i_am_master = 1;
1358 eqs->my_pid = vpp_pid;
1359 eqs->name = format (0, "%s%c", "evt-qs-segment", 0);
1360 eqs->requested_va = smm->session_baseva;
1362 if (ssvm_master_init (eqs, SSVM_SEGMENT_MEMFD))
1364 clib_warning ("failed to initialize queue segment");
1369 if (smm->evt_qs_use_memfd_seg)
1370 oldheap = ssvm_push_heap (eqs->sh);
1372 oldheap = vl_msg_push_heap ();
1374 for (i = 0; i < vec_len (smm->wrk); i++)
1376 svm_msg_q_cfg_t _cfg, *cfg = &_cfg;
1377 svm_msg_q_ring_cfg_t rc[SESSION_MQ_N_RINGS] = {
1378 {evt_q_length, evt_size, 0}
1380 {evt_q_length >> 1, 256, 0}
1382 cfg->consumer_pid = 0;
1384 cfg->q_nitems = evt_q_length;
1385 cfg->ring_cfgs = rc;
1386 smm->wrk[i].vpp_event_queue = svm_msg_q_alloc (cfg);
1387 if (smm->evt_qs_use_memfd_seg)
1389 if (svm_msg_q_alloc_consumer_eventfd (smm->wrk[i].vpp_event_queue))
1390 clib_warning ("eventfd returned");
1394 if (smm->evt_qs_use_memfd_seg)
1395 ssvm_pop_heap (oldheap);
1397 vl_msg_pop_heap (oldheap);
1401 session_main_get_evt_q_segment (void)
1403 session_main_t *smm = &session_main;
1404 if (smm->evt_qs_use_memfd_seg)
1405 return &smm->evt_qs_segment;
1410 session_segment_handle (session_t * s)
1415 return SESSION_INVALID_HANDLE;
1418 return segment_manager_make_segment_handle (f->segment_manager,
1423 static session_fifo_rx_fn *session_tx_fns[TRANSPORT_TX_N_FNS] = {
1424 session_tx_fifo_peek_and_snd,
1425 session_tx_fifo_dequeue_and_snd,
1426 session_tx_fifo_dequeue_internal,
1427 session_tx_fifo_dequeue_and_snd
1432 * Initialize session layer for given transport proto and ip version
1434 * Allocates per session type (transport proto + ip version) data structures
1435 * and adds arc from session queue node to session type output node.
1438 session_register_transport (transport_proto_t transport_proto,
1439 const transport_proto_vft_t * vft, u8 is_ip4,
1442 session_main_t *smm = &session_main;
1443 session_type_t session_type;
1444 u32 next_index = ~0;
1446 session_type = session_type_from_proto_and_ip (transport_proto, is_ip4);
1448 vec_validate (smm->session_type_to_next, session_type);
1449 vec_validate (smm->session_tx_fns, session_type);
1452 if (output_node != ~0)
1454 foreach_vlib_main (({
1455 next_index = vlib_node_add_next (this_vlib_main,
1456 session_queue_node.index,
1462 smm->session_type_to_next[session_type] = next_index;
1463 smm->session_tx_fns[session_type] =
1464 session_tx_fns[vft->transport_options.tx_type];
1467 transport_connection_t *
1468 session_get_transport (session_t * s)
1470 if (s->session_state != SESSION_STATE_LISTENING)
1471 return transport_get_connection (session_get_transport_proto (s),
1472 s->connection_index, s->thread_index);
1474 return transport_get_listener (session_get_transport_proto (s),
1475 s->connection_index);
1479 session_get_endpoint (session_t * s, transport_endpoint_t * tep, u8 is_lcl)
1481 if (s->session_state != SESSION_STATE_LISTENING)
1482 return transport_get_endpoint (session_get_transport_proto (s),
1483 s->connection_index, s->thread_index, tep,
1486 return transport_get_listener_endpoint (session_get_transport_proto (s),
1487 s->connection_index, tep, is_lcl);
1490 transport_connection_t *
1491 listen_session_get_transport (session_t * s)
1493 return transport_get_listener (session_get_transport_proto (s),
1494 s->connection_index);
1498 session_flush_frames_main_thread (vlib_main_t * vm)
1500 ASSERT (vlib_get_thread_index () == 0);
1501 vlib_process_signal_event_mt (vm, session_queue_process_node.index,
1502 SESSION_Q_PROCESS_FLUSH_FRAMES, 0);
1505 static clib_error_t *
1506 session_manager_main_enable (vlib_main_t * vm)
1508 segment_manager_main_init_args_t _sm_args = { 0 }, *sm_args = &_sm_args;
1509 session_main_t *smm = &session_main;
1510 vlib_thread_main_t *vtm = vlib_get_thread_main ();
1511 u32 num_threads, preallocated_sessions_per_worker;
1512 session_worker_t *wrk;
1515 num_threads = 1 /* main thread */ + vtm->n_threads;
1517 if (num_threads < 1)
1518 return clib_error_return (0, "n_thread_stacks not set");
1520 /* Allocate cache line aligned worker contexts */
1521 vec_validate_aligned (smm->wrk, num_threads - 1, CLIB_CACHE_LINE_BYTES);
1523 for (i = 0; i < num_threads; i++)
1526 wrk->ctrl_head = clib_llist_make_head (wrk->event_elts, evt_list);
1527 wrk->new_head = clib_llist_make_head (wrk->event_elts, evt_list);
1528 wrk->old_head = clib_llist_make_head (wrk->event_elts, evt_list);
1529 wrk->vm = vlib_mains[i];
1530 wrk->last_vlib_time = vlib_time_now (vlib_mains[i]);
1531 wrk->last_vlib_us_time = wrk->last_vlib_time * CLIB_US_TIME_FREQ;
1533 if (num_threads > 1)
1534 clib_rwlock_init (&smm->wrk[i].peekers_rw_locks);
1537 /* Allocate vpp event queues segment and queue */
1538 session_vpp_event_queues_allocate (smm);
1540 /* Initialize fifo segment main baseva and timeout */
1541 sm_args->baseva = smm->session_baseva + smm->evt_qs_segment_size;
1542 sm_args->size = smm->session_va_space_size;
1543 segment_manager_main_init (sm_args);
1545 /* Preallocate sessions */
1546 if (smm->preallocated_sessions)
1548 if (num_threads == 1)
1550 pool_init_fixed (smm->wrk[0].sessions, smm->preallocated_sessions);
1555 preallocated_sessions_per_worker =
1556 (1.1 * (f64) smm->preallocated_sessions /
1557 (f64) (num_threads - 1));
1559 for (j = 1; j < num_threads; j++)
1561 pool_init_fixed (smm->wrk[j].sessions,
1562 preallocated_sessions_per_worker);
1567 session_lookup_init ();
1568 app_namespaces_init ();
1571 smm->is_enabled = 1;
1573 /* Enable transports */
1574 transport_enable_disable (vm, 1);
1579 session_node_enable_disable (u8 is_en)
1581 u8 state = is_en ? VLIB_NODE_STATE_POLLING : VLIB_NODE_STATE_DISABLED;
1582 vlib_thread_main_t *vtm = vlib_get_thread_main ();
1583 u8 have_workers = vtm->n_threads != 0;
1586 foreach_vlib_main (({
1587 if (have_workers && ii == 0)
1589 vlib_node_set_state (this_vlib_main, session_queue_process_node.index,
1593 vlib_node_t *n = vlib_get_node (this_vlib_main,
1594 session_queue_process_node.index);
1595 vlib_start_process (this_vlib_main, n->runtime_index);
1599 vlib_process_signal_event_mt (this_vlib_main,
1600 session_queue_process_node.index,
1601 SESSION_Q_PROCESS_STOP, 0);
1606 vlib_node_set_state (this_vlib_main, session_queue_node.index,
1613 vnet_session_enable_disable (vlib_main_t * vm, u8 is_en)
1615 clib_error_t *error = 0;
1618 if (session_main.is_enabled)
1621 error = session_manager_main_enable (vm);
1622 session_node_enable_disable (is_en);
1626 session_main.is_enabled = 0;
1627 session_node_enable_disable (is_en);
1634 session_manager_main_init (vlib_main_t * vm)
1636 session_main_t *smm = &session_main;
1637 smm->session_baseva = HIGH_SEGMENT_BASEVA;
1638 #if (HIGH_SEGMENT_BASEVA > (4ULL << 30))
1639 smm->session_va_space_size = 128ULL << 30;
1640 smm->evt_qs_segment_size = 64 << 20;
1642 smm->session_va_space_size = 128 << 20;
1643 smm->evt_qs_segment_size = 1 << 20;
1645 smm->is_enabled = 0;
1646 smm->session_enable_asap = 0;
1650 static clib_error_t *
1651 session_main_init (vlib_main_t * vm)
1653 session_main_t *smm = &session_main;
1654 if (smm->session_enable_asap)
1656 vlib_worker_thread_barrier_sync (vm);
1657 vnet_session_enable_disable (vm, 1 /* is_en */ );
1658 vlib_worker_thread_barrier_release (vm);
1663 VLIB_INIT_FUNCTION (session_manager_main_init);
1664 VLIB_MAIN_LOOP_ENTER_FUNCTION (session_main_init);
1666 static clib_error_t *
1667 session_config_fn (vlib_main_t * vm, unformat_input_t * input)
1669 session_main_t *smm = &session_main;
1673 while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT)
1675 if (unformat (input, "event-queue-length %d", &nitems))
1678 smm->configured_event_queue_length = nitems;
1680 clib_warning ("event queue length %d too small, ignored", nitems);
1682 else if (unformat (input, "preallocated-sessions %d",
1683 &smm->preallocated_sessions))
1685 else if (unformat (input, "v4-session-table-buckets %d",
1686 &smm->configured_v4_session_table_buckets))
1688 else if (unformat (input, "v4-halfopen-table-buckets %d",
1689 &smm->configured_v4_halfopen_table_buckets))
1691 else if (unformat (input, "v6-session-table-buckets %d",
1692 &smm->configured_v6_session_table_buckets))
1694 else if (unformat (input, "v6-halfopen-table-buckets %d",
1695 &smm->configured_v6_halfopen_table_buckets))
1697 else if (unformat (input, "v4-session-table-memory %U",
1698 unformat_memory_size, &tmp))
1700 if (tmp >= 0x100000000)
1701 return clib_error_return (0, "memory size %llx (%lld) too large",
1703 smm->configured_v4_session_table_memory = tmp;
1705 else if (unformat (input, "v4-halfopen-table-memory %U",
1706 unformat_memory_size, &tmp))
1708 if (tmp >= 0x100000000)
1709 return clib_error_return (0, "memory size %llx (%lld) too large",
1711 smm->configured_v4_halfopen_table_memory = tmp;
1713 else if (unformat (input, "v6-session-table-memory %U",
1714 unformat_memory_size, &tmp))
1716 if (tmp >= 0x100000000)
1717 return clib_error_return (0, "memory size %llx (%lld) too large",
1719 smm->configured_v6_session_table_memory = tmp;
1721 else if (unformat (input, "v6-halfopen-table-memory %U",
1722 unformat_memory_size, &tmp))
1724 if (tmp >= 0x100000000)
1725 return clib_error_return (0, "memory size %llx (%lld) too large",
1727 smm->configured_v6_halfopen_table_memory = tmp;
1729 else if (unformat (input, "local-endpoints-table-memory %U",
1730 unformat_memory_size, &tmp))
1732 if (tmp >= 0x100000000)
1733 return clib_error_return (0, "memory size %llx (%lld) too large",
1735 smm->local_endpoints_table_memory = tmp;
1737 else if (unformat (input, "local-endpoints-table-buckets %d",
1738 &smm->local_endpoints_table_buckets))
1740 else if (unformat (input, "evt_qs_memfd_seg"))
1741 smm->evt_qs_use_memfd_seg = 1;
1742 else if (unformat (input, "evt_qs_seg_size %U", unformat_memory_size,
1743 &smm->evt_qs_segment_size))
1745 else if (unformat (input, "enable"))
1746 smm->session_enable_asap = 1;
1748 return clib_error_return (0, "unknown input `%U'",
1749 format_unformat_error, input);
1754 VLIB_CONFIG_FUNCTION (session_config_fn, "session");
1757 * fd.io coding-style-patch-verification: ON
1760 * eval: (c-set-style "gnu")