Packets recieved on VLAN-0 map to the main interface

Change-Id: I21b1ad39275495d4d006023b58f630a213445854
Signed-off-by: Neale Ranns <nranns@cisco.com>
This commit is contained in:
Neale Ranns
2017-05-30 07:30:04 -07:00
committed by Damjan Marion
parent 761787bd0b
commit 30d0fd4804
4 changed files with 138 additions and 166 deletions

View File

@ -830,21 +830,11 @@ unset_random_arp_entry (void)
static int
arp_unnumbered (vlib_buffer_t * p0,
u32 pi0,
ethernet_header_t * eth0,
u32 input_sw_if_index, u32 conn_sw_if_index)
{
vlib_main_t *vm = vlib_get_main ();
vnet_main_t *vnm = vnet_get_main ();
vnet_interface_main_t *vim = &vnm->interface_main;
vnet_sw_interface_t *si;
vnet_hw_interface_t *hi;
u32 *buffers = 0;
vlib_buffer_t *b0;
int i;
u8 dst_mac_address[6];
i16 header_size;
ethernet_arp_header_t *arp0;
/* verify that the input interface is unnumbered to the connected.
* the connected interface is the interface on which the subnet is
@ -860,92 +850,6 @@ arp_unnumbered (vlib_buffer_t * p0,
return 0;
}
/* Save the dst mac address */
clib_memcpy (dst_mac_address, eth0->dst_address, sizeof (dst_mac_address));
vec_insert (buffers, 1, 0);
buffers[0] = pi0;
for (i = 0; i < vec_len (buffers); i++)
{
b0 = vlib_get_buffer (vm, buffers[i]);
arp0 = vlib_buffer_get_current (b0);
hi = vnet_get_sup_hw_interface (vnm, input_sw_if_index);
si = vnet_get_sw_interface (vnm, input_sw_if_index);
/* For decoration, most likely */
vnet_buffer (b0)->sw_if_index[VLIB_TX] = hi->sw_if_index;
/* Fix ARP pkt src address */
clib_memcpy (arp0->ip4_over_ethernet[0].ethernet, hi->hw_address, 6);
/* Build L2 encaps for this swif */
header_size = sizeof (ethernet_header_t);
if (si->sub.eth.flags.one_tag)
header_size += 4;
else if (si->sub.eth.flags.two_tags)
header_size += 8;
vlib_buffer_advance (b0, -header_size);
eth0 = vlib_buffer_get_current (b0);
if (si->sub.eth.flags.one_tag)
{
ethernet_vlan_header_t *outer = (void *) (eth0 + 1);
eth0->type = si->sub.eth.flags.dot1ad ?
clib_host_to_net_u16 (ETHERNET_TYPE_DOT1AD) :
clib_host_to_net_u16 (ETHERNET_TYPE_VLAN);
outer->priority_cfi_and_id =
clib_host_to_net_u16 (si->sub.eth.outer_vlan_id);
outer->type = clib_host_to_net_u16 (ETHERNET_TYPE_ARP);
}
else if (si->sub.eth.flags.two_tags)
{
ethernet_vlan_header_t *outer = (void *) (eth0 + 1);
ethernet_vlan_header_t *inner = (void *) (outer + 1);
eth0->type = si->sub.eth.flags.dot1ad ?
clib_host_to_net_u16 (ETHERNET_TYPE_DOT1AD) :
clib_host_to_net_u16 (ETHERNET_TYPE_VLAN);
outer->priority_cfi_and_id =
clib_host_to_net_u16 (si->sub.eth.outer_vlan_id);
outer->type = clib_host_to_net_u16 (ETHERNET_TYPE_VLAN);
inner->priority_cfi_and_id =
clib_host_to_net_u16 (si->sub.eth.inner_vlan_id);
inner->type = clib_host_to_net_u16 (ETHERNET_TYPE_ARP);
}
else
{
eth0->type = clib_host_to_net_u16 (ETHERNET_TYPE_ARP);
}
/* Restore the original dst address, set src address */
clib_memcpy (eth0->dst_address, dst_mac_address,
sizeof (eth0->dst_address));
clib_memcpy (eth0->src_address, hi->hw_address,
sizeof (eth0->src_address));
/* Transmit replicas */
if (i > 0)
{
vlib_frame_t *f =
vlib_get_frame_to_node (vm, hi->output_node_index);
u32 *to_next = vlib_frame_vector_args (f);
to_next[0] = buffers[i];
f->n_vectors = 1;
vlib_put_frame_to_node (vm, hi->output_node_index, f);
}
}
/* The regular path outputs the original pkt.. */
vnet_buffer (p0)->sw_if_index[VLIB_TX] = input_sw_if_index;
vec_free (buffers);
return !0;
}
@ -990,7 +894,7 @@ arp_input (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * frame)
vlib_buffer_t *p0;
vnet_hw_interface_t *hw_if0;
ethernet_arp_header_t *arp0;
ethernet_header_t *eth0;
ethernet_header_t *eth_rx, *eth_tx;
ip4_address_t *if_addr0, proxy_src;
u32 pi0, error0, next0, sw_if_index0, conn_sw_if_index0, fib_index0;
u8 is_request0, dst_is_local0, is_unnum0, is_vrrp_reply0;
@ -998,6 +902,8 @@ arp_input (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * frame)
fib_node_index_t dst_fei, src_fei;
fib_prefix_t pfx0;
fib_entry_flag_t src_flags, dst_flags;
ip_adjacency_t *adj0 = NULL;
adj_index_t ai;
pi0 = from[0];
to_next[0] = pi0;
@ -1009,6 +915,8 @@ arp_input (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * frame)
p0 = vlib_get_buffer (vm, pi0);
arp0 = vlib_buffer_get_current (p0);
/* Fill in ethernet header. */
eth_rx = ethernet_buffer_get_header (p0);
is_request0 = arp0->opcode
== clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_request);
@ -1075,6 +983,7 @@ arp_input (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * frame)
error0 = ETHERNET_ARP_ERROR_l3_src_address_not_local;
goto drop2;
}
if (sw_if_index0 != fib_entry_get_resolving_interface (src_fei))
{
/*
@ -1096,9 +1005,6 @@ arp_input (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * frame)
fib_entry_get_prefix (dst_fei, &pfx0);
if_addr0 = &pfx0.fp_addr.ip4;
/* Fill in ethernet header. */
eth0 = ethernet_buffer_get_header (p0);
is_vrrp_reply0 =
((arp0->opcode ==
clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_reply))
@ -1110,8 +1016,9 @@ arp_input (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * frame)
/* Trash ARP packets whose ARP-level source addresses do not
match their L2-frame-level source addresses, unless it's
a reply from a VRRP virtual router */
if (memcmp (eth0->src_address, arp0->ip4_over_ethernet[0].ethernet,
sizeof (eth0->src_address)) && !is_vrrp_reply0)
if (memcmp
(eth_rx->src_address, arp0->ip4_over_ethernet[0].ethernet,
sizeof (eth_rx->src_address)) && !is_vrrp_reply0)
{
error0 = ETHERNET_ARP_ERROR_l2_address_mismatch;
goto drop2;
@ -1130,6 +1037,20 @@ arp_input (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * frame)
/* Send a reply. */
send_reply:
ai = fib_entry_get_adj (src_fei);
if (ADJ_INDEX_INVALID != ai)
{
adj0 = adj_get (ai);
}
else
{
error0 = ETHERNET_ARP_ERROR_missing_interface_address;
goto drop2;
}
/* Figure out how much to rewind current data from adjacency. */
vlib_buffer_advance (p0, -adj0->rewrite_header.data_bytes);
eth_tx = vlib_buffer_get_current (p0);
vnet_buffer (p0)->sw_if_index[VLIB_TX] = sw_if_index0;
hw_if0 = vnet_get_sup_hw_interface (vnm, sw_if_index0);
@ -1149,68 +1070,19 @@ arp_input (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * frame)
/* Hardware must be ethernet-like. */
ASSERT (vec_len (hw_if0->hw_address) == 6);
clib_memcpy (eth0->dst_address, eth0->src_address, 6);
clib_memcpy (eth0->src_address, hw_if0->hw_address, 6);
/* the rx nd tx ethernet headers wil overlap in the case
* when we received a tagged VLAN=0 packet, but we are sending
* back untagged */
memmove (eth_tx->dst_address, eth_rx->src_address, 6);
clib_memcpy (eth_tx->src_address, hw_if0->hw_address, 6);
/* Figure out how much to rewind current data from adjacency. */
/* get the adj from the destination's covering connected */
if (NULL == pa)
{
if (is_unnum0)
{
if (!arp_unnumbered (p0, pi0, eth0,
sw_if_index0, conn_sw_if_index0))
if (!arp_unnumbered (p0, sw_if_index0, conn_sw_if_index0))
goto drop2;
}
else
{
ip_adjacency_t *adj0 = NULL;
adj_index_t ai;
if (FIB_ENTRY_FLAG_ATTACHED & src_flags)
{
/*
* If the source is attached use the adj from that source.
*/
ai = fib_entry_get_adj (src_fei);
if (ADJ_INDEX_INVALID != ai)
{
adj0 = adj_get (ai);
}
}
else
{
/*
* Get the glean adj from the cover. This is presumably interface
* sourced, and therefre needs to be a glean adj.
*/
ai = fib_entry_get_adj_for_source
(ip4_fib_table_lookup
(ip4_fib_get (fib_index0),
&arp0->ip4_over_ethernet[1].ip4, 31),
FIB_SOURCE_INTERFACE);
if (ADJ_INDEX_INVALID != ai)
{
adj0 = adj_get (ai);
if (adj0->lookup_next_index == IP_LOOKUP_NEXT_GLEAN)
{
adj0 = NULL;
}
}
}
if (NULL != adj0)
{
vlib_buffer_advance (p0,
-adj0->rewrite_header.data_bytes);
}
else
{
error0 = ETHERNET_ARP_ERROR_missing_interface_address;
goto drop2;
}
}
}
/* We are going to reply to this request, so learn the sender */
@ -1256,20 +1128,14 @@ arp_input (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * frame)
if ((this_addr >= lo_addr && this_addr <= hi_addr) &&
(fib_index0 == pa->fib_index))
{
eth0 = ethernet_buffer_get_header (p0);
proxy_src.as_u32 =
arp0->ip4_over_ethernet[1].ip4.data_u32;
/*
* Rewind buffer, direct code above not to
* think too hard about it.
* change the interface address to the proxied
*/
if_addr0 = &proxy_src;
is_unnum0 = 0;
i32 ethernet_start =
vnet_buffer (p0)->ethernet.start_of_ethernet_header;
i32 rewind = p0->current_data - ethernet_start;
vlib_buffer_advance (p0, -rewind);
n_proxy_arp_replies_sent++;
goto send_reply;
}

View File

@ -142,6 +142,8 @@ parse_header (ethernet_input_variant_t variant,
tag = clib_net_to_host_u16 (h0->priority_cfi_and_id);
*outer_id = tag & 0xfff;
if (0 == *outer_id)
*match_flags &= ~SUBINT_CONFIG_MATCH_1_TAG;
*type = clib_net_to_host_u16 (h0->type);

View File

@ -928,5 +928,51 @@ class TestIPLoadBalance(VppTestCase):
[self.pg1, self.pg2,
self.pg3, self.pg4])
class TestIPVlan0(VppTestCase):
""" IPv4 VLAN-0 """
def setUp(self):
super(TestIPVlan0, self).setUp()
self.create_pg_interfaces(range(2))
for i in self.pg_interfaces:
i.admin_up()
i.config_ip4()
i.resolve_arp()
i.enable_mpls()
def tearDown(self):
super(TestIPVlan0, self).tearDown()
for i in self.pg_interfaces:
i.disable_mpls()
i.unconfig_ip4()
i.admin_down()
def send_and_expect(self, input, pkts, output):
input.add_stream(pkts)
self.pg_enable_capture(self.pg_interfaces)
self.pg_start()
rx = output.get_capture(len(pkts))
def test_ip_vlan_0(self):
""" IP VLAN-0 """
pkts = (Ether(src=self.pg0.remote_mac,
dst=self.pg0.local_mac) /
Dot1Q(vlan=0) /
IP(dst=self.pg1.remote_ip4,
src=self.pg0.remote_ip4) /
UDP(sport=1234, dport=1234) /
Raw('\xa5' * 100)) * 65
#
# Expect that packets sent on VLAN-0 are forwarded on the
# main interface.
#
self.send_and_expect(self.pg0, pkts, self.pg1)
if __name__ == '__main__':
unittest.main(testRunner=VppTestRunner)

View File

@ -8,7 +8,7 @@ from vpp_neighbor import VppNeighbor, find_nbr
from vpp_ip_route import VppIpRoute, VppRoutePath, find_route
from scapy.packet import Raw
from scapy.layers.l2 import Ether, ARP
from scapy.layers.l2 import Ether, ARP, Dot1Q
from scapy.layers.inet import IP, UDP
from scapy.contrib.mpls import MPLS
@ -142,7 +142,7 @@ class ARPTestCase(VppTestCase):
#
# Generate some hosts on the LAN
#
self.pg1.generate_remote_hosts(9)
self.pg1.generate_remote_hosts(10)
#
# Send IP traffic to one of these unresolved hosts.
@ -286,6 +286,12 @@ class ARPTestCase(VppTestCase):
hwsrc=self.pg2.remote_mac,
pdst=self.pg1.local_ip4,
psrc=self.pg2.remote_hosts[3].ip4))
pt = (Ether(dst="ff:ff:ff:ff:ff:ff", src=self.pg2.remote_mac) /
Dot1Q(vlan=0) /
ARP(op="who-has",
hwsrc=self.pg2.remote_mac,
pdst=self.pg1.local_ip4,
psrc=self.pg2.remote_hosts[3].ip4))
self.send_and_assert_no_replies(self.pg2, p,
"interface not IP enabled")
@ -311,6 +317,17 @@ class ARPTestCase(VppTestCase):
self.pg_enable_capture(self.pg_interfaces)
self.pg_start()
rx = self.pg2.get_capture(1)
self.verify_arp_resp(rx[0],
self.pg2.local_mac,
self.pg2.remote_mac,
self.pg1.local_ip4,
self.pg2.remote_hosts[3].ip4)
self.pg2.add_stream(pt)
self.pg_enable_capture(self.pg_interfaces)
self.pg_start()
rx = self.pg2.get_capture(1)
self.verify_arp_resp(rx[0],
self.pg2.local_mac,
@ -455,6 +472,29 @@ class ARPTestCase(VppTestCase):
self.pg1.local_ip4,
self.pg1.remote_hosts[8].ip4)
#
# Send an ARP request from one of the so-far unlearned remote hosts
# with a VLAN0 tag
#
p = (Ether(dst="ff:ff:ff:ff:ff:ff",
src=self.pg1._remote_hosts[9].mac) /
Dot1Q(vlan=0) /
ARP(op="who-has",
hwsrc=self.pg1._remote_hosts[9].mac,
pdst=self.pg1.local_ip4,
psrc=self.pg1._remote_hosts[9].ip4))
self.pg1.add_stream(p)
self.pg_enable_capture(self.pg_interfaces)
self.pg_start()
rx = self.pg1.get_capture(1)
self.verify_arp_resp(rx[0],
self.pg1.local_mac,
self.pg1._remote_hosts[9].mac,
self.pg1.local_ip4,
self.pg1._remote_hosts[9].ip4)
#
# ERROR Cases
# 1 - don't respond to ARP request for address not within the
@ -563,6 +603,13 @@ class ARPTestCase(VppTestCase):
hwsrc=self.pg0.remote_mac,
pdst="10.10.10.3",
psrc=self.pg0.remote_ip4))
arp_req_pg0_tagged = (Ether(src=self.pg0.remote_mac,
dst="ff:ff:ff:ff:ff:ff") /
Dot1Q(vlan=0) /
ARP(op="who-has",
hwsrc=self.pg0.remote_mac,
pdst="10.10.10.3",
psrc=self.pg0.remote_ip4))
arp_req_pg1 = (Ether(src=self.pg1.remote_mac,
dst="ff:ff:ff:ff:ff:ff") /
ARP(op="who-has",
@ -620,6 +667,17 @@ class ARPTestCase(VppTestCase):
self.pg_enable_capture(self.pg_interfaces)
self.pg_start()
rx = self.pg0.get_capture(1)
self.verify_arp_resp(rx[0],
self.pg0.local_mac,
self.pg0.remote_mac,
"10.10.10.3",
self.pg0.remote_ip4)
self.pg0.add_stream(arp_req_pg0_tagged)
self.pg_enable_capture(self.pg_interfaces)
self.pg_start()
rx = self.pg0.get_capture(1)
self.verify_arp_resp(rx[0],
self.pg0.local_mac,