2 * Copyright (c) 2016 Cisco and/or its affiliates.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
7 * http://www.apache.org/licenses/LICENSE-2.0
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
19 #include <vnet/session/application_interface.h>
20 #include <svm/svm_fifo_segment.h>
21 #include <vlibmemory/api.h>
23 #include <vpp/api/vpe_msg_enum.h>
25 #define vl_typedefs /* define message structures */
26 #include <vpp/api/vpe_all_api_h.h>
29 /* declare message handlers for each api */
31 #define vl_endianfun /* define message structures */
32 #include <vpp/api/vpe_all_api_h.h>
35 /* instantiate all the print functions we know about */
36 #define vl_print(handle, ...)
38 #include <vpp/api/vpe_all_api_h.h>
43 svm_fifo_t *server_rx_fifo;
44 svm_fifo_t *server_tx_fifo;
46 u64 vpp_session_handle;
63 svm_queue_t *vl_input_queue;
65 /* API client handle */
68 /* The URI we're playing with */
74 /* Hash table for disconnect processing */
75 uword *session_index_by_vpp_handles;
77 /* intermediate rx buffer */
80 /* URI for slave's connect */
83 u32 connected_session_index;
87 /* drop all packets */
91 svm_queue_t *our_event_queue;
93 /* $$$ single thread only for the moment */
94 svm_queue_t *vpp_event_queue;
100 /* For deadman timers */
101 clib_time_t clib_time;
103 /* State of the connection, shared between msg RX thread and main thread */
104 volatile connection_state_t state;
106 /* Signal variables */
107 volatile int time_to_stop;
108 volatile int time_to_print_stats;
110 u32 configured_segment_size;
112 /* VNET_API_ERROR_FOO -> "Foo" hash table */
113 uword *error_string_by_error_number;
115 u8 *connect_test_data;
116 pthread_t client_rx_thread_handle;
117 u32 client_bytes_received;
118 u8 test_return_packets;
121 /** Flag that decides if socket, instead of svm, api is used to connect to
122 * vpp. If sock api is used, shm binary api is subsequently bootstrapped
123 * and all other messages are exchanged using shm IPC. */
127 svm_fifo_segment_main_t *segment_main;
130 echo_main_t echo_main;
135 #define NITER 4000000
138 const char test_srv_crt_rsa[] =
139 "-----BEGIN CERTIFICATE-----\r\n"
140 "MIIDNzCCAh+gAwIBAgIBAjANBgkqhkiG9w0BAQUFADA7MQswCQYDVQQGEwJOTDER\r\n"
141 "MA8GA1UEChMIUG9sYXJTU0wxGTAXBgNVBAMTEFBvbGFyU1NMIFRlc3QgQ0EwHhcN\r\n"
142 "MTEwMjEyMTQ0NDA2WhcNMjEwMjEyMTQ0NDA2WjA0MQswCQYDVQQGEwJOTDERMA8G\r\n"
143 "A1UEChMIUG9sYXJTU0wxEjAQBgNVBAMTCWxvY2FsaG9zdDCCASIwDQYJKoZIhvcN\r\n"
144 "AQEBBQADggEPADCCAQoCggEBAMFNo93nzR3RBNdJcriZrA545Do8Ss86ExbQWuTN\r\n"
145 "owCIp+4ea5anUrSQ7y1yej4kmvy2NKwk9XfgJmSMnLAofaHa6ozmyRyWvP7BBFKz\r\n"
146 "NtSj+uGxdtiQwWG0ZlI2oiZTqqt0Xgd9GYLbKtgfoNkNHC1JZvdbJXNG6AuKT2kM\r\n"
147 "tQCQ4dqCEGZ9rlQri2V5kaHiYcPNQEkI7mgM8YuG0ka/0LiqEQMef1aoGh5EGA8P\r\n"
148 "hYvai0Re4hjGYi/HZo36Xdh98yeJKQHFkA4/J/EwyEoO79bex8cna8cFPXrEAjya\r\n"
149 "HT4P6DSYW8tzS1KW2BGiLICIaTla0w+w3lkvEcf36hIBMJcCAwEAAaNNMEswCQYD\r\n"
150 "VR0TBAIwADAdBgNVHQ4EFgQUpQXoZLjc32APUBJNYKhkr02LQ5MwHwYDVR0jBBgw\r\n"
151 "FoAUtFrkpbPe0lL2udWmlQ/rPrzH/f8wDQYJKoZIhvcNAQEFBQADggEBAJxnXClY\r\n"
152 "oHkbp70cqBrsGXLybA74czbO5RdLEgFs7rHVS9r+c293luS/KdliLScZqAzYVylw\r\n"
153 "UfRWvKMoWhHYKp3dEIS4xTXk6/5zXxhv9Rw8SGc8qn6vITHk1S1mPevtekgasY5Y\r\n"
154 "iWQuM3h4YVlRH3HHEMAD1TnAexfXHHDFQGe+Bd1iAbz1/sH9H8l4StwX6egvTK3M\r\n"
155 "wXRwkKkvjKaEDA9ATbZx0mI8LGsxSuCqe9r9dyjmttd47J1p1Rulz3CLzaRcVIuS\r\n"
156 "RRQfaD8neM9c1S/iJ/amTVqJxA1KOdOS5780WhPfSArA+g4qAmSjelc3p4wWpha8\r\n"
157 "zhuYwjVuX6JHG0c=\r\n" "-----END CERTIFICATE-----\r\n";
158 const u32 test_srv_crt_rsa_len = sizeof (test_srv_crt_rsa);
160 const char test_srv_key_rsa[] =
161 "-----BEGIN RSA PRIVATE KEY-----\r\n"
162 "MIIEpAIBAAKCAQEAwU2j3efNHdEE10lyuJmsDnjkOjxKzzoTFtBa5M2jAIin7h5r\r\n"
163 "lqdStJDvLXJ6PiSa/LY0rCT1d+AmZIycsCh9odrqjObJHJa8/sEEUrM21KP64bF2\r\n"
164 "2JDBYbRmUjaiJlOqq3ReB30Zgtsq2B+g2Q0cLUlm91slc0boC4pPaQy1AJDh2oIQ\r\n"
165 "Zn2uVCuLZXmRoeJhw81ASQjuaAzxi4bSRr/QuKoRAx5/VqgaHkQYDw+Fi9qLRF7i\r\n"
166 "GMZiL8dmjfpd2H3zJ4kpAcWQDj8n8TDISg7v1t7HxydrxwU9esQCPJodPg/oNJhb\r\n"
167 "y3NLUpbYEaIsgIhpOVrTD7DeWS8Rx/fqEgEwlwIDAQABAoIBAQCXR0S8EIHFGORZ\r\n"
168 "++AtOg6eENxD+xVs0f1IeGz57Tjo3QnXX7VBZNdj+p1ECvhCE/G7XnkgU5hLZX+G\r\n"
169 "Z0jkz/tqJOI0vRSdLBbipHnWouyBQ4e/A1yIJdlBtqXxJ1KE/ituHRbNc4j4kL8Z\r\n"
170 "/r6pvwnTI0PSx2Eqs048YdS92LT6qAv4flbNDxMn2uY7s4ycS4Q8w1JXnCeaAnYm\r\n"
171 "WYI5wxO+bvRELR2Mcz5DmVnL8jRyml6l6582bSv5oufReFIbyPZbQWlXgYnpu6He\r\n"
172 "GTc7E1zKYQGG/9+DQUl/1vQuCPqQwny0tQoX2w5tdYpdMdVm+zkLtbajzdTviJJa\r\n"
173 "TWzL6lt5AoGBAN86+SVeJDcmQJcv4Eq6UhtRr4QGMiQMz0Sod6ettYxYzMgxtw28\r\n"
174 "CIrgpozCc+UaZJLo7UxvC6an85r1b2nKPCLQFaggJ0H4Q0J/sZOhBIXaoBzWxveK\r\n"
175 "nupceKdVxGsFi8CDy86DBfiyFivfBj+47BbaQzPBj7C4rK7UlLjab2rDAoGBAN2u\r\n"
176 "AM2gchoFiu4v1HFL8D7lweEpi6ZnMJjnEu/dEgGQJFjwdpLnPbsj4c75odQ4Gz8g\r\n"
177 "sw9lao9VVzbusoRE/JGI4aTdO0pATXyG7eG1Qu+5Yc1YGXcCrliA2xM9xx+d7f+s\r\n"
178 "mPzN+WIEg5GJDYZDjAzHG5BNvi/FfM1C9dOtjv2dAoGAF0t5KmwbjWHBhcVqO4Ic\r\n"
179 "BVvN3BIlc1ue2YRXEDlxY5b0r8N4XceMgKmW18OHApZxfl8uPDauWZLXOgl4uepv\r\n"
180 "whZC3EuWrSyyICNhLY21Ah7hbIEBPF3L3ZsOwC+UErL+dXWLdB56Jgy3gZaBeW7b\r\n"
181 "vDrEnocJbqCm7IukhXHOBK8CgYEAwqdHB0hqyNSzIOGY7v9abzB6pUdA3BZiQvEs\r\n"
182 "3LjHVd4HPJ2x0N8CgrBIWOE0q8+0hSMmeE96WW/7jD3fPWwCR5zlXknxBQsfv0gP\r\n"
183 "3BC5PR0Qdypz+d+9zfMf625kyit4T/hzwhDveZUzHnk1Cf+IG7Q+TOEnLnWAWBED\r\n"
184 "ISOWmrUCgYAFEmRxgwAc/u+D6t0syCwAYh6POtscq9Y0i9GyWk89NzgC4NdwwbBH\r\n"
185 "4AgahOxIxXx2gxJnq3yfkJfIjwf0s2DyP0kY2y6Ua1OeomPeY9mrIS4tCuDQ6LrE\r\n"
186 "TB6l9VGoxJL4fyHnZb8L5gGvnB1bbD8cL6YPaDiOhcRseC9vBiEuVg==\r\n"
187 "-----END RSA PRIVATE KEY-----\r\n";
188 const u32 test_srv_key_rsa_len = sizeof (test_srv_key_rsa);
191 format_api_error (u8 * s, va_list * args)
193 echo_main_t *em = &echo_main;
194 i32 error = va_arg (*args, u32);
197 p = hash_get (em->error_string_by_error_number, -error);
200 s = format (s, "%s", p[0]);
202 s = format (s, "%d", error);
207 init_error_string_table (echo_main_t * em)
209 em->error_string_by_error_number = hash_create (0, sizeof (uword));
211 #define _(n,v,s) hash_set (em->error_string_by_error_number, -v, s);
212 foreach_vnet_api_error;
215 hash_set (em->error_string_by_error_number, 99, "Misc");
219 wait_for_state_change (echo_main_t * em, connection_state_t state)
222 #define TIMEOUT 600.0
224 #define TIMEOUT 600.0
227 f64 timeout = clib_time_now (&em->clib_time) + TIMEOUT;
229 while (clib_time_now (&em->clib_time) < timeout)
231 if (em->state == state)
233 if (em->state == STATE_FAILED)
235 if (em->time_to_stop == 1)
238 clib_warning ("timeout waiting for STATE_READY");
243 application_send_attach (echo_main_t * em)
245 vl_api_application_attach_t *bmp;
246 vl_api_application_tls_cert_add_t *cert_mp;
247 vl_api_application_tls_key_add_t *key_mp;
249 u32 fifo_size = 4 << 20;
250 bmp = vl_msg_api_alloc (sizeof (*bmp));
251 memset (bmp, 0, sizeof (*bmp));
253 bmp->_vl_msg_id = ntohs (VL_API_APPLICATION_ATTACH);
254 bmp->client_index = em->my_client_index;
255 bmp->context = ntohl (0xfeedface);
256 bmp->options[APP_OPTIONS_FLAGS] =
257 APP_OPTIONS_FLAGS_ACCEPT_REDIRECT | APP_OPTIONS_FLAGS_ADD_SEGMENT;
258 bmp->options[APP_OPTIONS_PREALLOC_FIFO_PAIRS] = 16;
259 bmp->options[APP_OPTIONS_RX_FIFO_SIZE] = fifo_size;
260 bmp->options[APP_OPTIONS_TX_FIFO_SIZE] = fifo_size;
261 bmp->options[APP_OPTIONS_ADD_SEGMENT_SIZE] = 128 << 20;
262 bmp->options[APP_OPTIONS_SEGMENT_SIZE] = 256 << 20;
263 vl_msg_api_send_shmem (em->vl_input_queue, (u8 *) & bmp);
265 cert_mp = vl_msg_api_alloc (sizeof (*cert_mp) + test_srv_crt_rsa_len);
266 memset (cert_mp, 0, sizeof (*cert_mp));
267 cert_mp->_vl_msg_id = ntohs (VL_API_APPLICATION_TLS_CERT_ADD);
268 cert_mp->client_index = em->my_client_index;
269 cert_mp->context = ntohl (0xfeedface);
270 cert_mp->cert_len = clib_host_to_net_u16 (test_srv_crt_rsa_len);
271 clib_memcpy (cert_mp->cert, test_srv_crt_rsa, test_srv_crt_rsa_len);
272 vl_msg_api_send_shmem (em->vl_input_queue, (u8 *) & cert_mp);
274 key_mp = vl_msg_api_alloc (sizeof (*key_mp) + test_srv_key_rsa_len);
275 memset (key_mp, 0, sizeof (*key_mp) + test_srv_key_rsa_len);
276 key_mp->_vl_msg_id = ntohs (VL_API_APPLICATION_TLS_KEY_ADD);
277 key_mp->client_index = em->my_client_index;
278 key_mp->context = ntohl (0xfeedface);
279 key_mp->key_len = clib_host_to_net_u16 (test_srv_key_rsa_len);
280 clib_memcpy (key_mp->key, test_srv_key_rsa, test_srv_key_rsa_len);
281 vl_msg_api_send_shmem (em->vl_input_queue, (u8 *) & key_mp);
285 application_attach (echo_main_t * em)
287 application_send_attach (em);
288 if (wait_for_state_change (em, STATE_ATTACHED))
290 clib_warning ("timeout waiting for STATE_ATTACHED");
297 application_detach (echo_main_t * em)
299 vl_api_application_detach_t *bmp;
300 bmp = vl_msg_api_alloc (sizeof (*bmp));
301 memset (bmp, 0, sizeof (*bmp));
303 bmp->_vl_msg_id = ntohs (VL_API_APPLICATION_DETACH);
304 bmp->client_index = em->my_client_index;
305 bmp->context = ntohl (0xfeedface);
306 vl_msg_api_send_shmem (em->vl_input_queue, (u8 *) & bmp);
308 clib_warning ("Sent detach");
312 memfd_segment_attach (void)
314 ssvm_private_t _ssvm = { 0 }, *ssvm = &_ssvm;
318 if ((error = vl_socket_client_recv_fd_msg (&ssvm->fd, 5)))
320 clib_error_report (error);
324 if ((rv = ssvm_slave_init_memfd (ssvm)))
331 fifo_segment_attach (char *name, u32 size, ssvm_segment_type_t type)
333 svm_fifo_segment_create_args_t _a, *a = &_a;
337 memset (a, 0, sizeof (*a));
338 a->segment_name = (char *) name;
339 a->segment_size = size;
340 a->segment_type = type;
342 if (type == SSVM_SEGMENT_MEMFD)
344 if ((error = vl_socket_client_recv_fd_msg (&a->memfd_fd, 5)))
346 clib_error_report (error);
351 if ((rv = svm_fifo_segment_attach (a)))
353 clib_warning ("svm_fifo_segment_attach ('%s') failed", name);
361 vl_api_application_attach_reply_t_handler (vl_api_application_attach_reply_t *
364 echo_main_t *em = &echo_main;
365 ssvm_segment_type_t seg_type;
369 clib_warning ("attach failed: %U", format_api_error,
370 clib_net_to_host_u32 (mp->retval));
371 em->state = STATE_FAILED;
375 if (mp->segment_name_length == 0)
377 clib_warning ("segment_name_length zero");
381 seg_type = em->use_sock_api ? SSVM_SEGMENT_MEMFD : SSVM_SEGMENT_SHM;
383 /* Attach to fifo segment */
384 if (fifo_segment_attach ((char *) mp->segment_name, mp->segment_size,
387 em->state = STATE_FAILED;
391 /* If we're using memfd segments, read and attach to event qs segment */
392 if (seg_type == SSVM_SEGMENT_MEMFD)
394 if (memfd_segment_attach ())
396 clib_warning ("failed to attach to evt q segment");
397 em->state = STATE_FAILED;
402 ASSERT (mp->app_event_queue_address);
403 em->our_event_queue = uword_to_pointer (mp->app_event_queue_address,
405 em->state = STATE_ATTACHED;
409 vl_api_application_detach_reply_t_handler (vl_api_application_detach_reply_t *
413 clib_warning ("detach returned with err: %d", mp->retval);
417 stop_signal (int signum)
419 echo_main_t *um = &echo_main;
421 um->time_to_stop = 1;
425 stats_signal (int signum)
427 echo_main_t *um = &echo_main;
429 um->time_to_print_stats = 1;
432 static clib_error_t *
433 setup_signal_handlers (void)
435 signal (SIGINT, stats_signal);
436 signal (SIGQUIT, stop_signal);
437 signal (SIGTERM, stop_signal);
443 vlib_cli_output (struct vlib_main_t *vm, char *fmt, ...)
445 clib_warning ("BUG");
449 connect_to_vpp (char *name)
451 echo_main_t *em = &echo_main;
452 api_main_t *am = &api_main;
454 if (em->use_sock_api)
456 if (vl_socket_client_connect ((char *) em->socket_name, name,
457 0 /* default rx, tx buffer */ ))
459 clib_warning ("socket connect failed");
463 if (vl_socket_client_init_shm (0))
465 clib_warning ("init shm api failed");
471 if (vl_client_connect_to_vlib ("/vpe-api", name, 32) < 0)
473 clib_warning ("shmem connect failed");
477 em->vl_input_queue = am->shmem_hdr->vl_input_queue;
478 em->my_client_index = am->my_client_index;
483 disconnect_from_vpp (echo_main_t * em)
485 if (em->use_sock_api)
486 vl_socket_client_disconnect ();
488 vl_client_disconnect_from_vlib ();
492 vl_api_map_another_segment_t_handler (vl_api_map_another_segment_t * mp)
494 svm_fifo_segment_create_args_t _a, *a = &_a;
497 memset (a, 0, sizeof (*a));
498 a->segment_name = (char *) mp->segment_name;
499 a->segment_size = mp->segment_size;
500 /* Attach to the segment vpp created */
501 rv = svm_fifo_segment_attach (a);
504 clib_warning ("svm_fifo_segment_attach ('%s') failed",
508 clib_warning ("Mapped new segment '%s' size %d", mp->segment_name,
513 session_print_stats (echo_main_t * em, session_t * session)
518 deltat = clib_time_now (&em->clib_time) - session->start;
519 bytes = em->i_am_master ? session->bytes_received : em->bytes_to_send;
520 fformat (stdout, "Finished in %.6f\n", deltat);
521 fformat (stdout, "%.4f Gbit/second\n", (bytes * 8.0) / deltat / 1e9);
525 vl_api_disconnect_session_t_handler (vl_api_disconnect_session_t * mp)
527 echo_main_t *em = &echo_main;
528 session_t *session = 0;
529 vl_api_disconnect_session_reply_t *rmp;
533 p = hash_get (em->session_index_by_vpp_handles, mp->handle);
537 session = pool_elt_at_index (em->sessions, p[0]);
538 hash_unset (em->session_index_by_vpp_handles, mp->handle);
539 pool_put (em->sessions, session);
543 clib_warning ("couldn't find session key %llx", mp->handle);
547 // em->time_to_stop = 1;
549 rmp = vl_msg_api_alloc (sizeof (*rmp));
550 memset (rmp, 0, sizeof (*rmp));
552 rmp->_vl_msg_id = ntohs (VL_API_DISCONNECT_SESSION_REPLY);
554 rmp->handle = mp->handle;
555 rmp->context = mp->context;
556 vl_msg_api_send_shmem (em->vl_input_queue, (u8 *) & rmp);
559 session_print_stats (em, session);
563 vl_api_reset_session_t_handler (vl_api_reset_session_t * mp)
565 echo_main_t *em = &echo_main;
566 vl_api_reset_session_reply_t *rmp;
570 p = hash_get (em->session_index_by_vpp_handles, mp->handle);
574 clib_warning ("got reset");
576 em->time_to_stop = 1;
580 clib_warning ("couldn't find session key %llx", mp->handle);
584 rmp = vl_msg_api_alloc (sizeof (*rmp));
585 memset (rmp, 0, sizeof (*rmp));
586 rmp->_vl_msg_id = ntohs (VL_API_RESET_SESSION_REPLY);
588 rmp->handle = mp->handle;
589 vl_msg_api_send_shmem (em->vl_input_queue, (u8 *) & rmp);
593 client_handle_fifo_event_rx (echo_main_t * em, session_fifo_event_t * e)
596 int n_read, bytes, i;
600 bytes = svm_fifo_max_dequeue (rx_fifo);
601 /* Allow enqueuing of new event */
602 svm_fifo_unset_event (rx_fifo);
607 n_read = svm_fifo_dequeue_nowait (rx_fifo,
608 clib_min (vec_len (em->rx_buf),
613 if (em->test_return_packets)
615 for (i = 0; i < n_read; i++)
618 != ((em->client_bytes_received + i) & 0xff))
620 clib_warning ("error at byte %lld, 0x%x not 0x%x",
621 em->client_bytes_received + i,
623 ((em->client_bytes_received + i) & 0xff));
627 em->client_bytes_received += n_read;
633 // clib_warning ("weird!");
643 client_handle_event_queue (echo_main_t * em)
645 session_fifo_event_t _e, *e = &_e;;
647 svm_queue_sub (em->our_event_queue, (u8 *) e, SVM_Q_WAIT, 0);
648 switch (e->event_type)
650 case FIFO_EVENT_APP_RX:
651 client_handle_fifo_event_rx (em, e);
654 case FIFO_EVENT_DISCONNECT:
658 clib_warning ("unknown event type %d", e->event_type);
664 client_rx_thread_fn (void *arg)
666 session_fifo_event_t _e, *e = &_e;
667 echo_main_t *em = &echo_main;
669 em->client_bytes_received = 0;
672 svm_queue_sub (em->our_event_queue, (u8 *) e, SVM_Q_WAIT, 0);
673 switch (e->event_type)
675 case FIFO_EVENT_APP_RX:
676 client_handle_fifo_event_rx (em, e);
679 case FIFO_EVENT_DISCONNECT:
682 clib_warning ("unknown event type %d", e->event_type);
686 if (PREDICT_FALSE (em->time_to_stop == 1))
694 vl_api_connect_session_reply_t_handler (vl_api_connect_session_reply_t * mp)
696 echo_main_t *em = &echo_main;
699 svm_fifo_t *rx_fifo, *tx_fifo;
704 clib_warning ("connection failed with code: %U", format_api_error,
705 clib_net_to_host_u32 (mp->retval));
706 em->state = STATE_FAILED;
711 clib_warning ("connected with local ip %U port %d", format_ip46_address,
712 mp->lcl_ip, mp->is_ip4,
713 clib_net_to_host_u16 (mp->lcl_port));
716 em->vpp_event_queue =
717 uword_to_pointer (mp->vpp_event_queue_address, svm_queue_t *);
723 pool_get (em->sessions, session);
724 session_index = session - em->sessions;
726 rx_fifo = uword_to_pointer (mp->server_rx_fifo, svm_fifo_t *);
727 rx_fifo->client_session_index = session_index;
728 tx_fifo = uword_to_pointer (mp->server_tx_fifo, svm_fifo_t *);
729 tx_fifo->client_session_index = session_index;
731 session->server_rx_fifo = rx_fifo;
732 session->server_tx_fifo = tx_fifo;
733 session->vpp_session_handle = mp->handle;
734 session->start = clib_time_now (&em->clib_time);
737 em->connected_session_index = session_index;
738 em->state = STATE_READY;
740 /* Add it to lookup table */
741 hash_set (em->session_index_by_vpp_handles, mp->handle, session_index);
743 /* Start RX thread */
744 rv = pthread_create (&em->client_rx_thread_handle,
745 NULL /*attr */ , client_rx_thread_fn, 0);
748 clib_warning ("pthread_create returned %d", rv);
749 rv = VNET_API_ERROR_SYSCALL_ERROR_1;
754 send_test_chunk (echo_main_t * em, svm_fifo_t * tx_fifo, int mypid, u32 bytes)
756 u8 *test_data = em->connect_test_data;
758 int test_buf_offset = 0;
760 u32 queue_max_chunk = 128 << 10, actual_write;
761 session_fifo_event_t evt;
764 bytes_to_snd = (bytes == 0) ? vec_len (test_data) : bytes;
765 if (bytes_to_snd > vec_len (test_data))
766 bytes_to_snd = vec_len (test_data);
768 while (bytes_to_snd > 0 && !em->time_to_stop)
770 actual_write = (bytes_to_snd > queue_max_chunk) ?
771 queue_max_chunk : bytes_to_snd;
772 rv = svm_fifo_enqueue_nowait (tx_fifo, actual_write,
773 test_data + test_buf_offset);
778 test_buf_offset += rv;
781 if (svm_fifo_set_event (tx_fifo))
783 /* Fabricate TX event, send to vpp */
785 evt.event_type = FIFO_EVENT_APP_TX;
787 svm_queue_add (em->vpp_event_queue,
788 (u8 *) & evt, 0 /* do wait for mutex */ );
795 client_send_data (echo_main_t * em)
797 u8 *test_data = em->connect_test_data;
798 int mypid = getpid ();
801 u32 n_iterations, leftover;
804 session = pool_elt_at_index (em->sessions, em->connected_session_index);
805 tx_fifo = session->server_tx_fifo;
807 ASSERT (vec_len (test_data) > 0);
809 vec_validate (em->rx_buf, vec_len (test_data) - 1);
810 n_iterations = em->bytes_to_send / vec_len (test_data);
812 for (i = 0; i < n_iterations; i++)
814 send_test_chunk (em, tx_fifo, mypid, 0);
815 if (em->time_to_stop)
819 leftover = em->bytes_to_send % vec_len (test_data);
821 send_test_chunk (em, tx_fifo, mypid, leftover);
823 if (!em->drop_packets)
825 f64 timeout = clib_time_now (&em->clib_time) + 10;
827 /* Wait for the outstanding packets */
828 while (em->client_bytes_received <
829 vec_len (test_data) * n_iterations + leftover)
831 if (clib_time_now (&em->clib_time) > timeout)
833 clib_warning ("timed out waiting for the missing packets");
838 em->time_to_stop = 1;
842 client_send_connect (echo_main_t * em)
844 vl_api_connect_uri_t *cmp;
845 cmp = vl_msg_api_alloc (sizeof (*cmp));
846 memset (cmp, 0, sizeof (*cmp));
848 cmp->_vl_msg_id = ntohs (VL_API_CONNECT_URI);
849 cmp->client_index = em->my_client_index;
850 cmp->context = ntohl (0xfeedface);
851 memcpy (cmp->uri, em->connect_uri, vec_len (em->connect_uri));
852 vl_msg_api_send_shmem (em->vl_input_queue, (u8 *) & cmp);
856 client_connect (echo_main_t * em)
858 client_send_connect (em);
859 if (wait_for_state_change (em, STATE_READY))
861 clib_warning ("Connect failed");
868 client_send_disconnect (echo_main_t * em)
870 session_t *connected_session;
871 vl_api_disconnect_session_t *dmp;
872 connected_session = pool_elt_at_index (em->sessions,
873 em->connected_session_index);
874 dmp = vl_msg_api_alloc (sizeof (*dmp));
875 memset (dmp, 0, sizeof (*dmp));
876 dmp->_vl_msg_id = ntohs (VL_API_DISCONNECT_SESSION);
877 dmp->client_index = em->my_client_index;
878 dmp->handle = connected_session->vpp_session_handle;
879 vl_msg_api_send_shmem (em->vl_input_queue, (u8 *) & dmp);
883 client_disconnect (echo_main_t * em)
885 client_send_disconnect (em);
886 clib_warning ("Sent disconnect");
887 if (wait_for_state_change (em, STATE_START))
889 clib_warning ("Disconnect failed");
896 client_run (echo_main_t * em)
900 if (application_attach (em))
903 if (client_connect (em))
905 application_detach (em);
910 vec_validate (em->connect_test_data, 128 * 1024 - 1);
911 for (i = 0; i < vec_len (em->connect_test_data); i++)
912 em->connect_test_data[i] = i & 0xff;
915 client_send_data (em);
917 /* Disconnect and detach */
918 client_disconnect (em);
919 application_detach (em);
923 vl_api_bind_uri_reply_t_handler (vl_api_bind_uri_reply_t * mp)
925 echo_main_t *em = &echo_main;
929 clib_warning ("bind failed: %U", format_api_error,
930 clib_net_to_host_u32 (mp->retval));
931 em->state = STATE_FAILED;
935 em->state = STATE_READY;
939 vl_api_unbind_uri_reply_t_handler (vl_api_unbind_uri_reply_t * mp)
941 echo_main_t *em = &echo_main;
944 clib_warning ("returned %d", ntohl (mp->retval));
946 em->state = STATE_START;
950 format_ip4_address (u8 * s, va_list * args)
952 u8 *a = va_arg (*args, u8 *);
953 return format (s, "%d.%d.%d.%d", a[0], a[1], a[2], a[3]);
957 format_ip6_address (u8 * s, va_list * args)
959 ip6_address_t *a = va_arg (*args, ip6_address_t *);
960 u32 i, i_max_n_zero, max_n_zeros, i_first_zero, n_zeros, last_double_colon;
962 i_max_n_zero = ARRAY_LEN (a->as_u16);
964 i_first_zero = i_max_n_zero;
966 for (i = 0; i < ARRAY_LEN (a->as_u16); i++)
968 u32 is_zero = a->as_u16[i] == 0;
969 if (is_zero && i_first_zero >= ARRAY_LEN (a->as_u16))
975 if ((!is_zero && n_zeros > max_n_zeros)
976 || (i + 1 >= ARRAY_LEN (a->as_u16) && n_zeros > max_n_zeros))
978 i_max_n_zero = i_first_zero;
979 max_n_zeros = n_zeros;
980 i_first_zero = ARRAY_LEN (a->as_u16);
985 last_double_colon = 0;
986 for (i = 0; i < ARRAY_LEN (a->as_u16); i++)
988 if (i == i_max_n_zero && max_n_zeros > 1)
990 s = format (s, "::");
991 i += max_n_zeros - 1;
992 last_double_colon = 1;
996 s = format (s, "%s%x",
997 (last_double_colon || i == 0) ? "" : ":",
998 clib_net_to_host_u16 (a->as_u16[i]));
999 last_double_colon = 0;
1006 /* Format an IP46 address. */
1008 format_ip46_address (u8 * s, va_list * args)
1010 ip46_address_t *ip46 = va_arg (*args, ip46_address_t *);
1011 ip46_type_t type = va_arg (*args, ip46_type_t);
1017 is_ip4 = ip46_address_is_ip4 (ip46);
1028 format (s, "%U", format_ip4_address, &ip46->ip4) :
1029 format (s, "%U", format_ip6_address, &ip46->ip6);
1033 vl_api_accept_session_t_handler (vl_api_accept_session_t * mp)
1035 echo_main_t *em = &echo_main;
1036 vl_api_accept_session_reply_t *rmp;
1037 svm_fifo_t *rx_fifo, *tx_fifo;
1039 static f64 start_time;
1043 if (start_time == 0.0)
1044 start_time = clib_time_now (&em->clib_time);
1046 ip_str = format (0, "%U", format_ip46_address, &mp->ip, mp->is_ip4);
1047 clib_warning ("Accepted session from: %s:%d", ip_str,
1048 clib_net_to_host_u16 (mp->port));
1049 em->vpp_event_queue =
1050 uword_to_pointer (mp->vpp_event_queue_address, svm_queue_t *);
1052 /* Allocate local session and set it up */
1053 pool_get (em->sessions, session);
1054 session_index = session - em->sessions;
1056 rx_fifo = uword_to_pointer (mp->server_rx_fifo, svm_fifo_t *);
1057 rx_fifo->client_session_index = session_index;
1058 tx_fifo = uword_to_pointer (mp->server_tx_fifo, svm_fifo_t *);
1059 tx_fifo->client_session_index = session_index;
1061 session->server_rx_fifo = rx_fifo;
1062 session->server_tx_fifo = tx_fifo;
1064 /* Add it to lookup table */
1065 hash_set (em->session_index_by_vpp_handles, mp->handle, session_index);
1067 em->state = STATE_READY;
1069 /* Stats printing */
1070 if (pool_elts (em->sessions) && (pool_elts (em->sessions) % 20000) == 0)
1072 f64 now = clib_time_now (&em->clib_time);
1073 fformat (stdout, "%d active sessions in %.2f seconds, %.2f/sec...\n",
1074 pool_elts (em->sessions), now - start_time,
1075 (f64) pool_elts (em->sessions) / (now - start_time));
1079 * Send accept reply to vpp
1081 rmp = vl_msg_api_alloc (sizeof (*rmp));
1082 memset (rmp, 0, sizeof (*rmp));
1083 rmp->_vl_msg_id = ntohs (VL_API_ACCEPT_SESSION_REPLY);
1084 rmp->handle = mp->handle;
1085 rmp->context = mp->context;
1086 vl_msg_api_send_shmem (em->vl_input_queue, (u8 *) & rmp);
1088 session->bytes_received = 0;
1089 session->start = clib_time_now (&em->clib_time);
1093 server_handle_fifo_event_rx (echo_main_t * em, session_fifo_event_t * e)
1095 svm_fifo_t *rx_fifo, *tx_fifo;
1097 session_fifo_event_t evt;
1101 u32 max_dequeue, offset, max_transfer, rx_buf_len;
1103 rx_buf_len = vec_len (em->rx_buf);
1105 session = &em->sessions[rx_fifo->client_session_index];
1106 tx_fifo = session->server_tx_fifo;
1108 max_dequeue = svm_fifo_max_dequeue (rx_fifo);
1109 /* Allow enqueuing of a new event */
1110 svm_fifo_unset_event (rx_fifo);
1112 if (PREDICT_FALSE (max_dequeue == 0))
1117 /* Read the max_dequeue */
1120 max_transfer = clib_min (rx_buf_len, max_dequeue);
1121 n_read = svm_fifo_dequeue_nowait (rx_fifo, max_transfer, em->rx_buf);
1124 max_dequeue -= n_read;
1125 session->bytes_received += n_read;
1128 /* Reflect if a non-drop session */
1129 if (!em->drop_packets && n_read > 0)
1134 rv = svm_fifo_enqueue_nowait (tx_fifo, n_read,
1135 &em->rx_buf[offset]);
1142 while ((rv <= 0 || n_read > 0) && !em->time_to_stop);
1144 /* If event wasn't set, add one */
1145 if (svm_fifo_set_event (tx_fifo))
1147 /* Fabricate TX event, send to vpp */
1149 evt.event_type = FIFO_EVENT_APP_TX;
1151 q = em->vpp_event_queue;
1152 svm_queue_add (q, (u8 *) & evt, 1 /* do wait for mutex */ );
1156 while ((n_read < 0 || max_dequeue > 0) && !em->time_to_stop);
1160 server_handle_event_queue (echo_main_t * em)
1162 session_fifo_event_t _e, *e = &_e;
1166 svm_queue_sub (em->our_event_queue, (u8 *) e, SVM_Q_WAIT, 0);
1167 switch (e->event_type)
1169 case FIFO_EVENT_APP_RX:
1170 server_handle_fifo_event_rx (em, e);
1173 case FIFO_EVENT_DISCONNECT:
1177 clib_warning ("unknown event type %d", e->event_type);
1180 if (PREDICT_FALSE (em->time_to_stop == 1))
1182 if (PREDICT_FALSE (em->time_to_print_stats == 1))
1184 em->time_to_print_stats = 0;
1185 fformat (stdout, "%d connections\n", pool_elts (em->sessions));
1191 server_send_listen (echo_main_t * em)
1193 vl_api_bind_uri_t *bmp;
1194 bmp = vl_msg_api_alloc (sizeof (*bmp));
1195 memset (bmp, 0, sizeof (*bmp));
1197 bmp->_vl_msg_id = ntohs (VL_API_BIND_URI);
1198 bmp->client_index = em->my_client_index;
1199 bmp->context = ntohl (0xfeedface);
1200 memcpy (bmp->uri, em->uri, vec_len (em->uri));
1201 vl_msg_api_send_shmem (em->vl_input_queue, (u8 *) & bmp);
1205 server_listen (echo_main_t * em)
1207 server_send_listen (em);
1208 if (wait_for_state_change (em, STATE_READY))
1210 clib_warning ("timeout waiting for STATE_READY");
1217 server_send_unbind (echo_main_t * em)
1219 vl_api_unbind_uri_t *ump;
1221 ump = vl_msg_api_alloc (sizeof (*ump));
1222 memset (ump, 0, sizeof (*ump));
1224 ump->_vl_msg_id = ntohs (VL_API_UNBIND_URI);
1225 ump->client_index = em->my_client_index;
1226 memcpy (ump->uri, em->uri, vec_len (em->uri));
1227 vl_msg_api_send_shmem (em->vl_input_queue, (u8 *) & ump);
1231 server_unbind (echo_main_t * em)
1233 server_send_unbind (em);
1234 if (wait_for_state_change (em, STATE_START))
1236 clib_warning ("timeout waiting for STATE_START");
1243 server_run (echo_main_t * em)
1248 /* $$$$ hack preallocation */
1249 for (i = 0; i < 200000; i++)
1251 pool_get (em->sessions, session);
1252 memset (session, 0, sizeof (*session));
1254 for (i = 0; i < 200000; i++)
1255 pool_put_index (em->sessions, i);
1257 if (application_attach (em))
1261 if (server_listen (em))
1264 /* Enter handle event loop */
1265 server_handle_event_queue (em);
1268 server_send_unbind (em);
1270 application_detach (em);
1272 fformat (stdout, "Test complete...\n");
1276 vl_api_disconnect_session_reply_t_handler (vl_api_disconnect_session_reply_t *
1279 echo_main_t *em = &echo_main;
1284 clib_warning ("vpp complained about disconnect: %d",
1285 ntohl (mp->retval));
1288 em->state = STATE_START;
1289 session = pool_elt_at_index (em->sessions, em->connected_session_index);
1291 session_print_stats (em, session);
1295 vl_api_application_tls_cert_add_reply_t_handler
1296 (vl_api_application_tls_cert_add_reply_t * mp)
1299 clib_warning ("failed to add tls cert");
1303 vl_api_application_tls_key_add_reply_t_handler
1304 (vl_api_application_tls_key_add_reply_t * mp)
1307 clib_warning ("failed to add tls key");
1310 #define foreach_tcp_echo_msg \
1311 _(BIND_URI_REPLY, bind_uri_reply) \
1312 _(UNBIND_URI_REPLY, unbind_uri_reply) \
1313 _(ACCEPT_SESSION, accept_session) \
1314 _(CONNECT_SESSION_REPLY, connect_session_reply) \
1315 _(DISCONNECT_SESSION, disconnect_session) \
1316 _(DISCONNECT_SESSION_REPLY, disconnect_session_reply) \
1317 _(RESET_SESSION, reset_session) \
1318 _(APPLICATION_ATTACH_REPLY, application_attach_reply) \
1319 _(APPLICATION_DETACH_REPLY, application_detach_reply) \
1320 _(MAP_ANOTHER_SEGMENT, map_another_segment) \
1321 _(APPLICATION_TLS_CERT_ADD_REPLY, application_tls_cert_add_reply) \
1322 _(APPLICATION_TLS_KEY_ADD_REPLY, application_tls_key_add_reply) \
1325 tcp_echo_api_hookup (echo_main_t * em)
1328 vl_msg_api_set_handlers(VL_API_##N, #n, \
1329 vl_api_##n##_t_handler, \
1331 vl_api_##n##_t_endian, \
1332 vl_api_##n##_t_print, \
1333 sizeof(vl_api_##n##_t), 1);
1334 foreach_tcp_echo_msg;
1339 main (int argc, char **argv)
1341 int i_am_master = 1, drop_packets = 0, test_return_packets = 0;
1342 echo_main_t *em = &echo_main;
1343 unformat_input_t _argv, *a = &_argv;
1346 u8 *bind_uri = (u8 *) "tcp://0.0.0.0/1234";
1347 u8 *connect_uri = (u8 *) "tcp://6.0.1.2/1234";
1348 u64 bytes_to_send = 64 << 10, mbytes;
1353 clib_mem_init (0, 256 << 20);
1355 heap = clib_mem_get_per_cpu_heap ();
1356 h = mheap_header (heap);
1358 /* make the main heap thread-safe */
1359 h->flags |= MHEAP_FLAG_THREAD_SAFE;
1361 vec_validate (em->rx_buf, 128 << 10);
1363 em->session_index_by_vpp_handles = hash_create (0, sizeof (uword));
1365 em->my_pid = getpid ();
1366 em->configured_segment_size = 1 << 20;
1367 em->socket_name = 0;
1368 em->use_sock_api = 1;
1370 clib_time_init (&em->clib_time);
1371 init_error_string_table (em);
1372 svm_fifo_segment_main_init (0x200000000ULL, 20);
1373 unformat_init_command_line (a, argv);
1375 while (unformat_check_input (a) != UNFORMAT_END_OF_INPUT)
1377 if (unformat (a, "chroot prefix %s", &chroot_prefix))
1379 vl_set_memory_root_path ((char *) chroot_prefix);
1381 else if (unformat (a, "uri %s", &uri))
1383 else if (unformat (a, "segment-size %dM", &tmp))
1384 em->configured_segment_size = tmp << 20;
1385 else if (unformat (a, "segment-size %dG", &tmp))
1386 em->configured_segment_size = tmp << 30;
1387 else if (unformat (a, "master"))
1389 else if (unformat (a, "slave"))
1391 else if (unformat (a, "drop"))
1393 else if (unformat (a, "test"))
1394 test_return_packets = 1;
1395 else if (unformat (a, "mbytes %lld", &mbytes))
1397 bytes_to_send = mbytes << 20;
1399 else if (unformat (a, "gbytes %lld", &mbytes))
1401 bytes_to_send = mbytes << 30;
1403 else if (unformat (a, "socket-name %s", &em->socket_name))
1405 else if (unformat (a, "use-svm-api"))
1406 em->use_sock_api = 0;
1409 fformat (stderr, "%s: usage [master|slave]\n");
1414 if (!em->socket_name)
1415 em->socket_name = format (0, "%s%c", API_SOCKET_FILE, 0);
1419 em->uri = format (0, "%s%c", uri, 0);
1420 em->connect_uri = format (0, "%s%c", uri, 0);
1424 em->uri = format (0, "%s%c", bind_uri, 0);
1425 em->connect_uri = format (0, "%s%c", connect_uri, 0);
1428 em->i_am_master = i_am_master;
1429 em->segment_main = &svm_fifo_segment_main;
1430 em->drop_packets = drop_packets;
1431 em->test_return_packets = test_return_packets;
1432 em->bytes_to_send = bytes_to_send;
1433 em->time_to_stop = 0;
1435 setup_signal_handlers ();
1436 tcp_echo_api_hookup (em);
1438 app_name = i_am_master ? "tcp_echo_server" : "tcp_echo_client";
1439 if (connect_to_vpp (app_name) < 0)
1442 fformat (stderr, "Couldn't connect to vpe, exiting...\n");
1446 if (i_am_master == 0)
1451 disconnect_from_vpp (em);
1456 * fd.io coding-style-patch-verification: ON
1459 * eval: (c-set-style "gnu")