
Type: improvement Support SO_ORIGINAL_DST socket option to get original dst_ip4 and dst_port if nat44 rule enabled. Change-Id: If00e00d03e48f3b78a23a68f1b078954d79dd0f7 Signed-off-by: qinyang <qiny@yusur.tech>
481 lines
12 KiB
C
481 lines
12 KiB
C
/*
|
|
* Copyright (c) 2020 Cisco and/or its affiliates.
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this
|
|
* You may obtain a copy of the License at:
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include <vcl/vcl_private.h>
|
|
|
|
static int
|
|
vcl_api_connect_app_socket (vcl_worker_t * wrk)
|
|
{
|
|
clib_socket_t *cs = &wrk->app_api_sock;
|
|
clib_error_t *err;
|
|
int rv = 0;
|
|
|
|
cs->config = (char *) vcm->cfg.vpp_app_socket_api;
|
|
cs->flags =
|
|
CLIB_SOCKET_F_IS_CLIENT | CLIB_SOCKET_F_SEQPACKET | CLIB_SOCKET_F_BLOCKING;
|
|
|
|
wrk->vcl_needs_real_epoll = 1;
|
|
|
|
if ((err = clib_socket_init (cs)))
|
|
{
|
|
/* don't report the error to avoid flood of error messages during
|
|
* reconnect */
|
|
clib_error_free (err);
|
|
rv = -1;
|
|
goto done;
|
|
}
|
|
|
|
done:
|
|
|
|
wrk->vcl_needs_real_epoll = 0;
|
|
|
|
return rv;
|
|
}
|
|
|
|
static int
|
|
vcl_api_attach_reply_handler (app_sapi_attach_reply_msg_t * mp, int *fds)
|
|
{
|
|
vcl_worker_t *wrk = vcl_worker_get_current ();
|
|
int i, rv, n_fds_used = 0;
|
|
u64 segment_handle;
|
|
u8 *segment_name;
|
|
|
|
if (mp->retval)
|
|
{
|
|
VERR ("attach failed: %U", format_session_error, mp->retval);
|
|
goto failed;
|
|
}
|
|
|
|
wrk->api_client_handle = mp->api_client_handle;
|
|
/* reattaching via `vcl_api_retry_attach` wants wrk->vpp_wrk_index to be 0 */
|
|
wrk->vpp_wrk_index = 0;
|
|
segment_handle = mp->segment_handle;
|
|
if (segment_handle == VCL_INVALID_SEGMENT_HANDLE)
|
|
{
|
|
VERR ("invalid segment handle");
|
|
goto failed;
|
|
}
|
|
|
|
if (!mp->n_fds)
|
|
goto failed;
|
|
|
|
if (mp->fd_flags & SESSION_FD_F_VPP_MQ_SEGMENT)
|
|
if (vcl_segment_attach (vcl_vpp_worker_segment_handle (0), "vpp-mq-seg",
|
|
SSVM_SEGMENT_MEMFD, fds[n_fds_used++]))
|
|
goto failed;
|
|
|
|
if (mp->fd_flags & SESSION_FD_F_MEMFD_SEGMENT)
|
|
{
|
|
segment_name = format (0, "memfd-%ld%c", segment_handle, 0);
|
|
rv = vcl_segment_attach (segment_handle, (char *) segment_name,
|
|
SSVM_SEGMENT_MEMFD, fds[n_fds_used++]);
|
|
vec_free (segment_name);
|
|
if (rv != 0)
|
|
goto failed;
|
|
}
|
|
|
|
vcl_segment_attach_mq (segment_handle, mp->app_mq, 0, &wrk->app_event_queue);
|
|
|
|
if (mp->fd_flags & SESSION_FD_F_MQ_EVENTFD)
|
|
{
|
|
svm_msg_q_set_eventfd (wrk->app_event_queue, fds[n_fds_used++]);
|
|
vcl_mq_epoll_add_evfd (wrk, wrk->app_event_queue);
|
|
}
|
|
|
|
vcl_segment_discover_mqs (vcl_vpp_worker_segment_handle (0),
|
|
fds + n_fds_used, mp->n_fds - n_fds_used);
|
|
vcl_segment_attach_mq (vcl_vpp_worker_segment_handle (0), mp->vpp_ctrl_mq,
|
|
mp->vpp_ctrl_mq_thread, &wrk->ctrl_mq);
|
|
vcm->ctrl_mq = wrk->ctrl_mq;
|
|
vcm->app_index = mp->app_index;
|
|
|
|
return 0;
|
|
|
|
failed:
|
|
|
|
for (i = clib_max (n_fds_used - 1, 0); i < mp->n_fds; i++)
|
|
close (fds[i]);
|
|
|
|
return -1;
|
|
}
|
|
|
|
static int
|
|
vcl_api_send_attach (clib_socket_t * cs)
|
|
{
|
|
app_sapi_msg_t msg = { 0 };
|
|
app_sapi_attach_msg_t *mp = &msg.attach;
|
|
u8 app_is_proxy, tls_engine;
|
|
clib_error_t *err;
|
|
|
|
app_is_proxy = (vcm->cfg.app_proxy_transport_tcp ||
|
|
vcm->cfg.app_proxy_transport_udp);
|
|
tls_engine = CRYPTO_ENGINE_OPENSSL;
|
|
|
|
clib_memcpy (&mp->name, vcm->app_name, vec_len (vcm->app_name));
|
|
mp->options[APP_OPTIONS_FLAGS] =
|
|
APP_OPTIONS_FLAGS_ACCEPT_REDIRECT | APP_OPTIONS_FLAGS_ADD_SEGMENT |
|
|
(vcm->cfg.app_scope_local ? APP_OPTIONS_FLAGS_USE_LOCAL_SCOPE : 0) |
|
|
(vcm->cfg.app_scope_global ? APP_OPTIONS_FLAGS_USE_GLOBAL_SCOPE : 0) |
|
|
(app_is_proxy ? APP_OPTIONS_FLAGS_IS_PROXY : 0) |
|
|
(vcm->cfg.use_mq_eventfd ? APP_OPTIONS_FLAGS_EVT_MQ_USE_EVENTFD : 0) |
|
|
(vcm->cfg.huge_page ? APP_OPTIONS_FLAGS_USE_HUGE_PAGE : 0) |
|
|
(vcm->cfg.app_original_dst ? APP_OPTIONS_FLAGS_GET_ORIGINAL_DST : 0);
|
|
mp->options[APP_OPTIONS_PROXY_TRANSPORT] =
|
|
(u64) ((vcm->cfg.app_proxy_transport_tcp ? 1 << TRANSPORT_PROTO_TCP : 0) |
|
|
(vcm->cfg.app_proxy_transport_udp ? 1 << TRANSPORT_PROTO_UDP : 0));
|
|
mp->options[APP_OPTIONS_SEGMENT_SIZE] = vcm->cfg.segment_size;
|
|
mp->options[APP_OPTIONS_ADD_SEGMENT_SIZE] = vcm->cfg.add_segment_size;
|
|
mp->options[APP_OPTIONS_RX_FIFO_SIZE] = vcm->cfg.rx_fifo_size;
|
|
mp->options[APP_OPTIONS_TX_FIFO_SIZE] = vcm->cfg.tx_fifo_size;
|
|
mp->options[APP_OPTIONS_PREALLOC_FIFO_PAIRS] =
|
|
vcm->cfg.preallocated_fifo_pairs;
|
|
mp->options[APP_OPTIONS_EVT_QUEUE_SIZE] = vcm->cfg.event_queue_size;
|
|
mp->options[APP_OPTIONS_TLS_ENGINE] = tls_engine;
|
|
|
|
msg.type = APP_SAPI_MSG_TYPE_ATTACH;
|
|
err = clib_socket_sendmsg (cs, &msg, sizeof (msg), 0, 0);
|
|
if (err)
|
|
{
|
|
clib_error_report (err);
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
vcl_sapi_attach (void)
|
|
{
|
|
vcl_worker_t *wrk = vcl_worker_get_current ();
|
|
app_sapi_msg_t _rmp, *rmp = &_rmp;
|
|
clib_error_t *err;
|
|
clib_socket_t *cs;
|
|
int fds[32];
|
|
|
|
/*
|
|
* Init client socket and send attach
|
|
*/
|
|
if (vcl_api_connect_app_socket (wrk))
|
|
return -1;
|
|
|
|
cs = &wrk->app_api_sock;
|
|
if (vcl_api_send_attach (cs))
|
|
return -1;
|
|
|
|
/*
|
|
* Wait for attach reply
|
|
*/
|
|
err = clib_socket_recvmsg (cs, rmp, sizeof (*rmp), fds, ARRAY_LEN (fds));
|
|
if (err)
|
|
{
|
|
clib_error_report (err);
|
|
return -1;
|
|
}
|
|
|
|
if (rmp->type != APP_SAPI_MSG_TYPE_ATTACH_REPLY)
|
|
return -1;
|
|
|
|
return vcl_api_attach_reply_handler (&rmp->attach_reply, fds);
|
|
}
|
|
|
|
static int
|
|
vcl_api_add_del_worker_reply_handler (app_sapi_worker_add_del_reply_msg_t *
|
|
mp, int *fds)
|
|
{
|
|
int n_fds = 0, i, rv;
|
|
u64 segment_handle;
|
|
vcl_worker_t *wrk;
|
|
|
|
if (mp->retval)
|
|
{
|
|
VDBG (0, "add/del worker failed: %U", format_session_error, mp->retval);
|
|
goto failed;
|
|
}
|
|
|
|
if (!mp->is_add)
|
|
goto failed;
|
|
|
|
wrk = vcl_worker_get_current ();
|
|
wrk->api_client_handle = mp->api_client_handle;
|
|
wrk->vpp_wrk_index = mp->wrk_index;
|
|
wrk->ctrl_mq = vcm->ctrl_mq;
|
|
|
|
segment_handle = mp->segment_handle;
|
|
if (segment_handle == VCL_INVALID_SEGMENT_HANDLE)
|
|
{
|
|
clib_warning ("invalid segment handle");
|
|
goto failed;
|
|
}
|
|
|
|
if (!mp->n_fds)
|
|
goto failed;
|
|
|
|
if (mp->fd_flags & SESSION_FD_F_VPP_MQ_SEGMENT)
|
|
if (vcl_segment_attach (vcl_vpp_worker_segment_handle (wrk->wrk_index),
|
|
"vpp-worker-seg", SSVM_SEGMENT_MEMFD,
|
|
fds[n_fds++]))
|
|
goto failed;
|
|
|
|
if (mp->fd_flags & SESSION_FD_F_MEMFD_SEGMENT)
|
|
{
|
|
u8 *segment_name = format (0, "memfd-%ld%c", segment_handle, 0);
|
|
rv = vcl_segment_attach (segment_handle, (char *) segment_name,
|
|
SSVM_SEGMENT_MEMFD, fds[n_fds++]);
|
|
vec_free (segment_name);
|
|
if (rv != 0)
|
|
goto failed;
|
|
}
|
|
|
|
vcl_segment_attach_mq (segment_handle, mp->app_event_queue_address, 0,
|
|
&wrk->app_event_queue);
|
|
|
|
if (mp->fd_flags & SESSION_FD_F_MQ_EVENTFD)
|
|
{
|
|
svm_msg_q_set_eventfd (wrk->app_event_queue, fds[n_fds]);
|
|
vcl_mq_epoll_add_evfd (wrk, wrk->app_event_queue);
|
|
n_fds++;
|
|
}
|
|
|
|
VDBG (0, "worker %u vpp-worker %u added", wrk->wrk_index,
|
|
wrk->vpp_wrk_index);
|
|
|
|
return 0;
|
|
|
|
failed:
|
|
for (i = clib_max (n_fds - 1, 0); i < mp->n_fds; i++)
|
|
close (fds[i]);
|
|
|
|
return -1;
|
|
}
|
|
|
|
int
|
|
vcl_sapi_app_worker_add (void)
|
|
{
|
|
vcl_worker_t *wrk = vcl_worker_get_current ();
|
|
app_sapi_worker_add_del_msg_t *mp;
|
|
app_sapi_msg_t _rmp, *rmp = &_rmp;
|
|
app_sapi_msg_t msg = { 0 };
|
|
int fds[SESSION_N_FD_TYPE];
|
|
clib_error_t *err;
|
|
clib_socket_t *cs;
|
|
|
|
/* Connect to socket api */
|
|
if (vcl_api_connect_app_socket (wrk))
|
|
return -1;
|
|
|
|
/*
|
|
* Send add worker
|
|
*/
|
|
cs = &wrk->app_api_sock;
|
|
|
|
msg.type = APP_SAPI_MSG_TYPE_ADD_DEL_WORKER;
|
|
mp = &msg.worker_add_del;
|
|
mp->app_index = vcm->app_index;
|
|
mp->is_add = 1;
|
|
|
|
err = clib_socket_sendmsg (cs, &msg, sizeof (msg), 0, 0);
|
|
if (err)
|
|
{
|
|
clib_error_report (err);
|
|
return -1;
|
|
}
|
|
|
|
/*
|
|
* Wait for reply and process it
|
|
*/
|
|
err = clib_socket_recvmsg (cs, rmp, sizeof (*rmp), fds, ARRAY_LEN (fds));
|
|
if (err)
|
|
{
|
|
clib_error_report (err);
|
|
return -1;
|
|
}
|
|
|
|
if (rmp->type != APP_SAPI_MSG_TYPE_ADD_DEL_WORKER_REPLY)
|
|
{
|
|
clib_warning ("unexpected reply type %u", rmp->type);
|
|
return -1;
|
|
}
|
|
|
|
return vcl_api_add_del_worker_reply_handler (&rmp->worker_add_del_reply,
|
|
fds);
|
|
}
|
|
|
|
void
|
|
vcl_sapi_app_worker_del (vcl_worker_t * wrk)
|
|
{
|
|
app_sapi_worker_add_del_msg_t *mp;
|
|
app_sapi_msg_t msg = { 0 };
|
|
clib_error_t *err;
|
|
clib_socket_t *cs;
|
|
|
|
cs = &wrk->app_api_sock;
|
|
|
|
msg.type = APP_SAPI_MSG_TYPE_ADD_DEL_WORKER;
|
|
mp = &msg.worker_add_del;
|
|
mp->app_index = vcm->app_index;
|
|
mp->wrk_index = wrk->vpp_wrk_index;
|
|
mp->is_add = 0;
|
|
|
|
err = clib_socket_sendmsg (cs, &msg, sizeof (msg), 0, 0);
|
|
if (err)
|
|
clib_error_report (err);
|
|
clib_socket_close (cs);
|
|
}
|
|
|
|
void
|
|
vcl_sapi_detach (vcl_worker_t * wrk)
|
|
{
|
|
clib_socket_t *cs = &wrk->app_api_sock;
|
|
clib_socket_close (cs);
|
|
}
|
|
|
|
int
|
|
vcl_sapi_recv_fds (vcl_worker_t * wrk, int *fds, int n_fds)
|
|
{
|
|
app_sapi_msg_t _msg, *msg = &_msg;
|
|
clib_socket_t *cs;
|
|
clib_error_t *err;
|
|
|
|
cs = &wrk->app_api_sock;
|
|
|
|
err = clib_socket_recvmsg (cs, msg, sizeof (*msg), fds, n_fds);
|
|
if (err)
|
|
{
|
|
clib_error_report (err);
|
|
return -1;
|
|
}
|
|
if (msg->type != APP_SAPI_MSG_TYPE_SEND_FDS)
|
|
return -1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
vcl_sapi_add_cert_key_pair (vppcom_cert_key_pair_t *ckpair)
|
|
{
|
|
u32 cert_len = ckpair->cert_len, key_len = ckpair->key_len, certkey_len;
|
|
vcl_worker_t *wrk = vcl_worker_get_current ();
|
|
app_sapi_msg_t _msg = { 0 }, *msg = &_msg;
|
|
app_sapi_cert_key_add_del_msg_t *mp;
|
|
app_sapi_msg_t _rmp, *rmp = &_rmp;
|
|
clib_error_t *err;
|
|
clib_socket_t *cs;
|
|
u8 *certkey = 0;
|
|
int rv = -1;
|
|
|
|
msg->type = APP_SAPI_MSG_TYPE_ADD_DEL_CERT_KEY;
|
|
mp = &msg->cert_key_add_del;
|
|
mp->context = wrk->wrk_index;
|
|
mp->cert_len = cert_len;
|
|
mp->certkey_len = cert_len + key_len;
|
|
mp->is_add = 1;
|
|
|
|
certkey_len = cert_len + key_len;
|
|
vec_validate (certkey, certkey_len - 1);
|
|
clib_memcpy_fast (certkey, ckpair->cert, cert_len);
|
|
clib_memcpy_fast (certkey + cert_len, ckpair->key, key_len);
|
|
|
|
cs = &wrk->app_api_sock;
|
|
err = clib_socket_sendmsg (cs, msg, sizeof (*msg), 0, 0);
|
|
if (err)
|
|
{
|
|
clib_error_report (err);
|
|
goto done;
|
|
}
|
|
|
|
err = clib_socket_sendmsg (cs, certkey, certkey_len, 0, 0);
|
|
if (err)
|
|
{
|
|
clib_error_report (err);
|
|
goto done;
|
|
}
|
|
|
|
/*
|
|
* Wait for reply and process it
|
|
*/
|
|
err = clib_socket_recvmsg (cs, rmp, sizeof (*rmp), 0, 0);
|
|
if (err)
|
|
{
|
|
clib_error_report (err);
|
|
goto done;
|
|
}
|
|
|
|
if (rmp->type != APP_SAPI_MSG_TYPE_ADD_DEL_CERT_KEY_REPLY)
|
|
{
|
|
clib_warning ("unexpected reply type %u", rmp->type);
|
|
goto done;
|
|
}
|
|
|
|
if (!rmp->cert_key_add_del_reply.retval)
|
|
rv = rmp->cert_key_add_del_reply.index;
|
|
|
|
done:
|
|
|
|
return rv;
|
|
}
|
|
|
|
int
|
|
vcl_sapi_del_cert_key_pair (u32 ckpair_index)
|
|
{
|
|
vcl_worker_t *wrk = vcl_worker_get_current ();
|
|
app_sapi_msg_t _msg = { 0 }, *msg = &_msg;
|
|
app_sapi_cert_key_add_del_msg_t *mp;
|
|
app_sapi_msg_t _rmp, *rmp = &_rmp;
|
|
clib_error_t *err;
|
|
clib_socket_t *cs;
|
|
|
|
msg->type = APP_SAPI_MSG_TYPE_ADD_DEL_CERT_KEY;
|
|
mp = &msg->cert_key_add_del;
|
|
mp->context = wrk->wrk_index;
|
|
mp->index = ckpair_index;
|
|
|
|
cs = &wrk->app_api_sock;
|
|
err = clib_socket_sendmsg (cs, msg, sizeof (*msg), 0, 0);
|
|
if (err)
|
|
{
|
|
clib_error_report (err);
|
|
return -1;
|
|
}
|
|
|
|
/*
|
|
* Wait for reply and process it
|
|
*/
|
|
err = clib_socket_recvmsg (cs, rmp, sizeof (*rmp), 0, 0);
|
|
if (err)
|
|
{
|
|
clib_error_report (err);
|
|
return -1;
|
|
}
|
|
|
|
if (rmp->type != APP_SAPI_MSG_TYPE_ADD_DEL_CERT_KEY_REPLY)
|
|
{
|
|
clib_warning ("unexpected reply type %u", rmp->type);
|
|
return -1;
|
|
}
|
|
|
|
if (rmp->cert_key_add_del_reply.retval)
|
|
return -1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* fd.io coding-style-patch-verification: ON
|
|
*
|
|
* Local Variables:
|
|
* eval: (c-set-style "gnu")
|
|
* End:
|
|
*/
|