Files
vpp/src/plugins/map/map.c
Nathan Skrzypczak d0ea764a5d docs: plugin comment nitfixes
Type: improvement

Change-Id: Ib7e2f5f314144064de7b6be0fade3db2f9c943fe
Signed-off-by: Nathan Skrzypczak <nathan.skrzypczak@gmail.com>
2021-10-04 08:26:43 +00:00

1548 lines
38 KiB
C

/*
* map.c : MAP support
*
* Copyright (c) 2015 Cisco and/or its affiliates.
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at:
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <vnet/fib/fib_table.h>
#include <vnet/fib/fib_entry_track.h>
#include <vnet/fib/ip6_fib.h>
#include <vnet/adj/adj.h>
#include <vppinfra/crc32.h>
#include <vnet/plugin/plugin.h>
#include <vpp/app/version.h>
#include "map.h"
map_main_t map_main;
/*
* This code supports the following MAP modes:
*
* Algorithmic Shared IPv4 address (ea_bits_len > 0):
* ea_bits_len + ip4_prefix > 32
* psid_length > 0, ip6_prefix < 64, ip4_prefix <= 32
* Algorithmic Full IPv4 address (ea_bits_len > 0):
* ea_bits_len + ip4_prefix = 32
* psid_length = 0, ip6_prefix < 64, ip4_prefix <= 32
* Algorithmic IPv4 prefix (ea_bits_len > 0):
* ea_bits_len + ip4_prefix < 32
* psid_length = 0, ip6_prefix < 64, ip4_prefix <= 32
*
* Independent Shared IPv4 address (ea_bits_len = 0):
* ip4_prefix = 32
* psid_length > 0
* Rule IPv6 address = 128, Rule PSID Set
* Independent Full IPv4 address (ea_bits_len = 0):
* ip4_prefix = 32
* psid_length = 0, ip6_prefix = 128
* Independent IPv4 prefix (ea_bits_len = 0):
* ip4_prefix < 32
* psid_length = 0, ip6_prefix = 128
*
*/
/*
* This code supports MAP-T:
*
* With a DMR prefix length of 64 or 96 (RFC6052).
*
*/
/*
* Save user-assigned MAP domain names ("tags") in a vector of
* extra domain information.
*/
static void
map_save_extras (u32 map_domain_index, u8 * tag)
{
map_main_t *mm = &map_main;
map_domain_extra_t *de;
if (map_domain_index == ~0)
return;
vec_validate (mm->domain_extras, map_domain_index);
de = vec_elt_at_index (mm->domain_extras, map_domain_index);
clib_memset (de, 0, sizeof (*de));
if (!tag)
return;
vec_validate_init_c_string (de->tag, tag, strlen ((char *) tag));
}
static void
map_free_extras (u32 map_domain_index)
{
map_main_t *mm = &map_main;
map_domain_extra_t *de;
if (map_domain_index == ~0)
return;
if (map_domain_index >= vec_len (mm->domain_extras))
return;
de = vec_elt_at_index (mm->domain_extras, map_domain_index);
vec_free (de->tag);
}
int
map_create_domain (ip4_address_t * ip4_prefix,
u8 ip4_prefix_len,
ip6_address_t * ip6_prefix,
u8 ip6_prefix_len,
ip6_address_t * ip6_src,
u8 ip6_src_len,
u8 ea_bits_len,
u8 psid_offset,
u8 psid_length,
u32 * map_domain_index, u16 mtu, u8 flags, u8 * tag)
{
u8 suffix_len, suffix_shift;
map_main_t *mm = &map_main;
map_domain_t *d;
/* How many, and which bits to grab from the IPv4 DA */
if (ip4_prefix_len + ea_bits_len < 32)
{
flags |= MAP_DOMAIN_PREFIX;
suffix_shift = 32 - ip4_prefix_len - ea_bits_len;
suffix_len = ea_bits_len;
}
else
{
suffix_shift = 0;
suffix_len = 32 - ip4_prefix_len;
}
/* EA bits must be within the first 64 bits */
if (ea_bits_len > 0 && ((ip6_prefix_len + ea_bits_len) > 64 ||
ip6_prefix_len + suffix_len + psid_length > 64))
{
clib_warning
("Embedded Address bits must be within the first 64 bits of "
"the IPv6 prefix");
return -1;
}
/* Get domain index */
pool_get_aligned (mm->domains, d, CLIB_CACHE_LINE_BYTES);
clib_memset (d, 0, sizeof (*d));
*map_domain_index = d - mm->domains;
/* Init domain struct */
d->ip4_prefix.as_u32 = ip4_prefix->as_u32;
d->ip4_prefix_len = ip4_prefix_len;
d->ip6_prefix = *ip6_prefix;
d->ip6_prefix_len = ip6_prefix_len;
d->ip6_src = *ip6_src;
d->ip6_src_len = ip6_src_len;
d->ea_bits_len = ea_bits_len;
d->psid_offset = psid_offset;
d->psid_length = psid_length;
d->mtu = mtu;
d->flags = flags;
d->suffix_shift = suffix_shift;
d->suffix_mask = (1 << suffix_len) - 1;
d->psid_shift = 16 - psid_length - psid_offset;
d->psid_mask = (1 << d->psid_length) - 1;
d->ea_shift = 64 - ip6_prefix_len - suffix_len - d->psid_length;
/* Save a user-assigned MAP domain name if provided. */
if (tag)
map_save_extras (*map_domain_index, tag);
/* MAP longest match lookup table (input feature / FIB) */
mm->ip4_prefix_tbl->add (mm->ip4_prefix_tbl, &d->ip4_prefix,
d->ip4_prefix_len, *map_domain_index);
/* Really needed? Or always use FIB? */
mm->ip6_src_prefix_tbl->add (mm->ip6_src_prefix_tbl, &d->ip6_src,
d->ip6_src_len, *map_domain_index);
/* Validate packet/byte counters */
map_domain_counter_lock (mm);
int i;
for (i = 0; i < vec_len (mm->simple_domain_counters); i++)
{
vlib_validate_simple_counter (&mm->simple_domain_counters[i],
*map_domain_index);
vlib_zero_simple_counter (&mm->simple_domain_counters[i],
*map_domain_index);
}
for (i = 0; i < vec_len (mm->domain_counters); i++)
{
vlib_validate_combined_counter (&mm->domain_counters[i],
*map_domain_index);
vlib_zero_combined_counter (&mm->domain_counters[i], *map_domain_index);
}
map_domain_counter_unlock (mm);
return 0;
}
/*
* map_delete_domain
*/
int
map_delete_domain (u32 map_domain_index)
{
map_main_t *mm = &map_main;
map_domain_t *d;
if (pool_is_free_index (mm->domains, map_domain_index))
{
clib_warning ("MAP domain delete: domain does not exist: %d",
map_domain_index);
return -1;
}
d = pool_elt_at_index (mm->domains, map_domain_index);
mm->ip4_prefix_tbl->delete (mm->ip4_prefix_tbl, &d->ip4_prefix,
d->ip4_prefix_len);
mm->ip6_src_prefix_tbl->delete (mm->ip6_src_prefix_tbl, &d->ip6_src,
d->ip6_src_len);
/* Release user-assigned MAP domain name. */
map_free_extras (map_domain_index);
/* Deleting rules */
if (d->rules)
clib_mem_free (d->rules);
pool_put (mm->domains, d);
return 0;
}
int
map_add_del_psid (u32 map_domain_index, u16 psid, ip6_address_t * tep,
bool is_add)
{
map_domain_t *d;
map_main_t *mm = &map_main;
if (pool_is_free_index (mm->domains, map_domain_index))
{
clib_warning ("MAP rule: domain does not exist: %d", map_domain_index);
return -1;
}
d = pool_elt_at_index (mm->domains, map_domain_index);
/* Rules are only used in 1:1 independent case */
if (d->ea_bits_len > 0)
return (-1);
if (!d->rules)
{
u32 l = (0x1 << d->psid_length) * sizeof (ip6_address_t);
d->rules = clib_mem_alloc_aligned (l, CLIB_CACHE_LINE_BYTES);
if (!d->rules)
return -1;
clib_memset (d->rules, 0, l);
}
if (psid >= (0x1 << d->psid_length))
{
clib_warning ("MAP rule: PSID outside bounds: %d [%d]", psid,
0x1 << d->psid_length);
return -1;
}
if (is_add)
{
d->rules[psid] = *tep;
}
else
{
clib_memset (&d->rules[psid], 0, sizeof (ip6_address_t));
}
return 0;
}
#ifdef MAP_SKIP_IP6_LOOKUP
/**
* Pre-resolved per-protocol global next-hops
*/
map_main_pre_resolved_t pre_resolved[FIB_PROTOCOL_MAX];
static void
map_pre_resolve_init (map_main_pre_resolved_t * pr)
{
pr->fei = FIB_NODE_INDEX_INVALID;
fib_node_init (&pr->node, FIB_NODE_TYPE_MAP_E);
}
static u8 *
format_map_pre_resolve (u8 * s, va_list * ap)
{
map_main_pre_resolved_t *pr = va_arg (*ap, map_main_pre_resolved_t *);
if (FIB_NODE_INDEX_INVALID != pr->fei)
{
const fib_prefix_t *pfx;
pfx = fib_entry_get_prefix (pr->fei);
return (format (s, "%U (%u)",
format_ip46_address, &pfx->fp_addr, IP46_TYPE_ANY,
pr->dpo.dpoi_index));
}
else
{
return (format (s, "un-set"));
}
}
/**
* Function definition to inform the FIB node that its last lock has gone.
*/
static void
map_last_lock_gone (fib_node_t * node)
{
/*
* The MAP is a root of the graph. As such
* it never has children and thus is never locked.
*/
ASSERT (0);
}
static map_main_pre_resolved_t *
map_from_fib_node (fib_node_t * node)
{
ASSERT (FIB_NODE_TYPE_MAP_E == node->fn_type);
return ((map_main_pre_resolved_t *)
(((char *) node) -
STRUCT_OFFSET_OF (map_main_pre_resolved_t, node)));
}
static void
map_stack (map_main_pre_resolved_t * pr)
{
const dpo_id_t *dpo;
dpo = fib_entry_contribute_ip_forwarding (pr->fei);
dpo_copy (&pr->dpo, dpo);
}
/**
* Function definition to backwalk a FIB node
*/
static fib_node_back_walk_rc_t
map_back_walk (fib_node_t * node, fib_node_back_walk_ctx_t * ctx)
{
map_stack (map_from_fib_node (node));
return (FIB_NODE_BACK_WALK_CONTINUE);
}
/**
* Function definition to get a FIB node from its index
*/
static fib_node_t *
map_fib_node_get (fib_node_index_t index)
{
return (&pre_resolved[index].node);
}
/*
* Virtual function table registered by MPLS GRE tunnels
* for participation in the FIB object graph.
*/
const static fib_node_vft_t map_vft = {
.fnv_get = map_fib_node_get,
.fnv_last_lock = map_last_lock_gone,
.fnv_back_walk = map_back_walk,
};
static void
map_fib_resolve (map_main_pre_resolved_t * pr,
fib_protocol_t proto, u8 len, const ip46_address_t * addr)
{
fib_prefix_t pfx = {
.fp_proto = proto,
.fp_len = len,
.fp_addr = *addr,
};
pr->fei = fib_entry_track (0, // default fib
&pfx, FIB_NODE_TYPE_MAP_E, proto, &pr->sibling);
map_stack (pr);
}
static void
map_fib_unresolve (map_main_pre_resolved_t * pr,
fib_protocol_t proto, u8 len, const ip46_address_t * addr)
{
if (pr->fei != FIB_NODE_INDEX_INVALID)
{
fib_entry_untrack (pr->fei, pr->sibling);
dpo_reset (&pr->dpo);
pr->fei = FIB_NODE_INDEX_INVALID;
pr->sibling = FIB_NODE_INDEX_INVALID;
}
}
void
map_pre_resolve (ip4_address_t * ip4, ip6_address_t * ip6, bool is_del)
{
if (ip6 && (ip6->as_u64[0] != 0 || ip6->as_u64[1] != 0))
{
ip46_address_t addr = {
.ip6 = *ip6,
};
if (is_del)
map_fib_unresolve (&pre_resolved[FIB_PROTOCOL_IP6],
FIB_PROTOCOL_IP6, 128, &addr);
else
map_fib_resolve (&pre_resolved[FIB_PROTOCOL_IP6],
FIB_PROTOCOL_IP6, 128, &addr);
}
if (ip4 && (ip4->as_u32 != 0))
{
ip46_address_t addr = {
.ip4 = *ip4,
};
if (is_del)
map_fib_unresolve (&pre_resolved[FIB_PROTOCOL_IP4],
FIB_PROTOCOL_IP4, 32, &addr);
else
map_fib_resolve (&pre_resolved[FIB_PROTOCOL_IP4],
FIB_PROTOCOL_IP4, 32, &addr);
}
}
#endif
static clib_error_t *
map_security_check_command_fn (vlib_main_t * vm,
unformat_input_t * input,
vlib_cli_command_t * cmd)
{
unformat_input_t _line_input, *line_input = &_line_input;
clib_error_t *error = NULL;
bool enable = false;
bool check_frag = false;
bool saw_enable = false;
bool saw_frag = false;
/* Get a line of input. */
if (!unformat_user (input, unformat_line_input, line_input))
return 0;
while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
{
if (unformat (line_input, "enable"))
{
enable = true;
saw_enable = true;
}
else if (unformat (line_input, "disable"))
{
enable = false;
saw_enable = true;
}
else if (unformat (line_input, "fragments on"))
{
check_frag = true;
saw_frag = true;
}
else if (unformat (line_input, "fragments off"))
{
check_frag = false;
saw_frag = true;
}
else
{
error = clib_error_return (0, "unknown input `%U'",
format_unformat_error, line_input);
goto done;
}
}
if (!saw_enable)
{
error = clib_error_return (0,
"Must specify enable 'enable' or 'disable'");
goto done;
}
if (!saw_frag)
{
error = clib_error_return (0, "Must specify fragments 'on' or 'off'");
goto done;
}
map_param_set_security_check (enable, check_frag);
done:
unformat_free (line_input);
return error;
}
static clib_error_t *
map_add_domain_command_fn (vlib_main_t * vm,
unformat_input_t * input, vlib_cli_command_t * cmd)
{
unformat_input_t _line_input, *line_input = &_line_input;
ip4_address_t ip4_prefix;
ip6_address_t ip6_prefix;
ip6_address_t ip6_src;
u32 ip6_prefix_len = 0, ip4_prefix_len = 0, map_domain_index, ip6_src_len;
u32 num_m_args = 0;
/* Optional arguments */
u32 ea_bits_len = 0, psid_offset = 0, psid_length = 0;
u32 mtu = 0;
u8 flags = 0;
u8 *tag = 0;
ip6_src_len = 128;
clib_error_t *error = NULL;
/* Get a line of input. */
if (!unformat_user (input, unformat_line_input, line_input))
return 0;
while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
{
if (unformat
(line_input, "ip4-pfx %U/%d", unformat_ip4_address, &ip4_prefix,
&ip4_prefix_len))
num_m_args++;
else
if (unformat
(line_input, "ip6-pfx %U/%d", unformat_ip6_address, &ip6_prefix,
&ip6_prefix_len))
num_m_args++;
else
if (unformat
(line_input, "ip6-src %U/%d", unformat_ip6_address, &ip6_src,
&ip6_src_len))
num_m_args++;
else
if (unformat
(line_input, "ip6-src %U", unformat_ip6_address, &ip6_src))
num_m_args++;
else if (unformat (line_input, "ea-bits-len %d", &ea_bits_len))
num_m_args++;
else if (unformat (line_input, "psid-offset %d", &psid_offset))
num_m_args++;
else if (unformat (line_input, "psid-len %d", &psid_length))
num_m_args++;
else if (unformat (line_input, "mtu %d", &mtu))
num_m_args++;
else if (unformat (line_input, "tag %s", &tag))
;
else
{
error = clib_error_return (0, "unknown input `%U'",
format_unformat_error, line_input);
goto done;
}
}
if (num_m_args < 3)
{
error = clib_error_return (0, "mandatory argument(s) missing");
goto done;
}
map_create_domain (&ip4_prefix, ip4_prefix_len,
&ip6_prefix, ip6_prefix_len, &ip6_src, ip6_src_len,
ea_bits_len, psid_offset, psid_length, &map_domain_index,
mtu, flags, tag);
done:
vec_free (tag);
unformat_free (line_input);
return error;
}
static clib_error_t *
map_del_domain_command_fn (vlib_main_t * vm,
unformat_input_t * input, vlib_cli_command_t * cmd)
{
unformat_input_t _line_input, *line_input = &_line_input;
u32 num_m_args = 0;
u32 map_domain_index;
clib_error_t *error = NULL;
/* Get a line of input. */
if (!unformat_user (input, unformat_line_input, line_input))
return 0;
while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
{
if (unformat (line_input, "index %d", &map_domain_index))
num_m_args++;
else
{
error = clib_error_return (0, "unknown input `%U'",
format_unformat_error, line_input);
goto done;
}
}
if (num_m_args != 1)
{
error = clib_error_return (0, "mandatory argument(s) missing");
goto done;
}
map_delete_domain (map_domain_index);
done:
unformat_free (line_input);
return error;
}
static clib_error_t *
map_add_rule_command_fn (vlib_main_t * vm,
unformat_input_t * input, vlib_cli_command_t * cmd)
{
unformat_input_t _line_input, *line_input = &_line_input;
ip6_address_t tep;
u32 num_m_args = 0;
u32 psid = 0, map_domain_index;
clib_error_t *error = NULL;
/* Get a line of input. */
if (!unformat_user (input, unformat_line_input, line_input))
return 0;
while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
{
if (unformat (line_input, "index %d", &map_domain_index))
num_m_args++;
else if (unformat (line_input, "psid %d", &psid))
num_m_args++;
else
if (unformat (line_input, "ip6-dst %U", unformat_ip6_address, &tep))
num_m_args++;
else
{
error = clib_error_return (0, "unknown input `%U'",
format_unformat_error, line_input);
goto done;
}
}
if (num_m_args != 3)
{
error = clib_error_return (0, "mandatory argument(s) missing");
goto done;
}
if (map_add_del_psid (map_domain_index, psid, &tep, 1) != 0)
{
error = clib_error_return (0, "Failing to add Mapping Rule");
goto done;
}
done:
unformat_free (line_input);
return error;
}
#if MAP_SKIP_IP6_LOOKUP
static clib_error_t *
map_pre_resolve_command_fn (vlib_main_t * vm,
unformat_input_t * input,
vlib_cli_command_t * cmd)
{
unformat_input_t _line_input, *line_input = &_line_input;
ip4_address_t ip4nh, *p_v4 = NULL;
ip6_address_t ip6nh, *p_v6 = NULL;
clib_error_t *error = NULL;
bool is_del = false;
clib_memset (&ip4nh, 0, sizeof (ip4nh));
clib_memset (&ip6nh, 0, sizeof (ip6nh));
/* Get a line of input. */
if (!unformat_user (input, unformat_line_input, line_input))
return 0;
while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
{
if (unformat (line_input, "ip4-nh %U", unformat_ip4_address, &ip4nh))
p_v4 = &ip4nh;
else
if (unformat (line_input, "ip6-nh %U", unformat_ip6_address, &ip6nh))
p_v6 = &ip6nh;
else if (unformat (line_input, "del"))
is_del = true;
else
{
error = clib_error_return (0, "unknown input `%U'",
format_unformat_error, line_input);
goto done;
}
}
map_pre_resolve (p_v4, p_v6, is_del);
done:
unformat_free (line_input);
return error;
}
#endif
static clib_error_t *
map_icmp_relay_source_address_command_fn (vlib_main_t * vm,
unformat_input_t * input,
vlib_cli_command_t * cmd)
{
unformat_input_t _line_input, *line_input = &_line_input;
ip4_address_t icmp_src_address;
ip4_address_t *p_icmp_addr = 0;
map_main_t *mm = &map_main;
clib_error_t *error = NULL;
mm->icmp4_src_address.as_u32 = 0;
/* Get a line of input. */
if (!unformat_user (input, unformat_line_input, line_input))
return 0;
while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
{
if (unformat
(line_input, "%U", unformat_ip4_address, &icmp_src_address))
{
mm->icmp4_src_address = icmp_src_address;
p_icmp_addr = &icmp_src_address;
}
else
{
error = clib_error_return (0, "unknown input `%U'",
format_unformat_error, line_input);
goto done;
}
}
map_param_set_icmp (p_icmp_addr);
done:
unformat_free (line_input);
return error;
}
static clib_error_t *
map_icmp_unreachables_command_fn (vlib_main_t * vm,
unformat_input_t * input,
vlib_cli_command_t * cmd)
{
unformat_input_t _line_input, *line_input = &_line_input;
int num_m_args = 0;
clib_error_t *error = NULL;
bool enabled = false;
/* Get a line of input. */
if (!unformat_user (input, unformat_line_input, line_input))
return 0;
while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
{
num_m_args++;
if (unformat (line_input, "on"))
enabled = true;
else if (unformat (line_input, "off"))
enabled = false;
else
{
error = clib_error_return (0, "unknown input `%U'",
format_unformat_error, line_input);
goto done;
}
}
if (num_m_args != 1)
error = clib_error_return (0, "mandatory argument(s) missing");
map_param_set_icmp6 (enabled);
done:
unformat_free (line_input);
return error;
}
static clib_error_t *
map_fragment_command_fn (vlib_main_t * vm,
unformat_input_t * input, vlib_cli_command_t * cmd)
{
unformat_input_t _line_input, *line_input = &_line_input;
clib_error_t *error = NULL;
bool frag_inner = false;
bool frag_ignore_df = false;
bool saw_in_out = false;
bool saw_df = false;
/* Get a line of input. */
if (!unformat_user (input, unformat_line_input, line_input))
return 0;
while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
{
if (unformat (line_input, "inner"))
{
frag_inner = true;
saw_in_out = true;
}
else if (unformat (line_input, "outer"))
{
frag_inner = false;
saw_in_out = true;
}
else if (unformat (line_input, "ignore-df"))
{
frag_ignore_df = true;
saw_df = true;
}
else if (unformat (line_input, "honor-df"))
{
frag_ignore_df = false;
saw_df = true;
}
else
{
error = clib_error_return (0, "unknown input `%U'",
format_unformat_error, line_input);
goto done;
}
}
if (!saw_in_out)
{
error = clib_error_return (0, "Must specify 'inner' or 'outer'");
goto done;
}
if (!saw_df)
{
error = clib_error_return (0, "Must specify 'ignore-df' or 'honor-df'");
goto done;
}
map_param_set_fragmentation (frag_inner, frag_ignore_df);
done:
unformat_free (line_input);
return error;
}
static clib_error_t *
map_traffic_class_command_fn (vlib_main_t * vm,
unformat_input_t * input,
vlib_cli_command_t * cmd)
{
unformat_input_t _line_input, *line_input = &_line_input;
u32 tc = 0;
clib_error_t *error = NULL;
bool tc_copy = false;
/* Get a line of input. */
if (!unformat_user (input, unformat_line_input, line_input))
return 0;
while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
{
if (unformat (line_input, "copy"))
tc_copy = true;
else if (unformat (line_input, "%x", &tc))
tc = tc & 0xff;
else
{
error = clib_error_return (0, "unknown input `%U'",
format_unformat_error, line_input);
goto done;
}
}
map_param_set_traffic_class (tc_copy, tc);
done:
unformat_free (line_input);
return error;
}
static char *
map_flags_to_string (u32 flags)
{
if (flags & MAP_DOMAIN_PREFIX)
return "prefix";
return "";
}
static u8 *
format_map_domain (u8 * s, va_list * args)
{
map_domain_t *d = va_arg (*args, map_domain_t *);
bool counters = va_arg (*args, int);
map_main_t *mm = &map_main;
ip6_address_t ip6_prefix;
u32 map_domain_index = d - mm->domains;
map_domain_extra_t *de = 0;
if (d->rules)
clib_memset (&ip6_prefix, 0, sizeof (ip6_prefix));
else
ip6_prefix = d->ip6_prefix;
if (map_domain_index < vec_len (mm->domain_extras))
de = vec_elt_at_index (mm->domain_extras, map_domain_index);
s = format (s,
"[%d] tag {%s} ip4-pfx %U/%d ip6-pfx %U/%d ip6-src %U/%d "
"ea-bits-len %d psid-offset %d psid-len %d mtu %d %s",
map_domain_index, (de && de->tag) ? de->tag : (u8 *) "[no-tag]",
format_ip4_address, &d->ip4_prefix, d->ip4_prefix_len,
format_ip6_address, &ip6_prefix, d->ip6_prefix_len,
format_ip6_address, &d->ip6_src, d->ip6_src_len,
d->ea_bits_len, d->psid_offset, d->psid_length, d->mtu,
map_flags_to_string (d->flags));
if (counters)
{
map_domain_counter_lock (mm);
vlib_counter_t v;
vlib_get_combined_counter (&mm->domain_counters[MAP_DOMAIN_COUNTER_TX],
map_domain_index, &v);
s = format (s, " TX: %lld/%lld", v.packets, v.bytes);
vlib_get_combined_counter (&mm->domain_counters[MAP_DOMAIN_COUNTER_RX],
map_domain_index, &v);
s = format (s, " RX: %lld/%lld", v.packets, v.bytes);
map_domain_counter_unlock (mm);
}
s = format (s, "\n");
if (d->rules)
{
int i;
ip6_address_t dst;
for (i = 0; i < (0x1 << d->psid_length); i++)
{
dst = d->rules[i];
if (dst.as_u64[0] == 0 && dst.as_u64[1] == 0)
continue;
s = format (s,
" rule psid: %d ip6-dst %U\n", i, format_ip6_address,
&dst);
}
}
return s;
}
static clib_error_t *
show_map_domain_command_fn (vlib_main_t * vm, unformat_input_t * input,
vlib_cli_command_t * cmd)
{
unformat_input_t _line_input, *line_input = &_line_input;
map_main_t *mm = &map_main;
map_domain_t *d;
bool counters = false;
u32 map_domain_index = ~0;
clib_error_t *error = NULL;
/* Get a line of input. */
if (!unformat_user (input, unformat_line_input, line_input))
{
/* *INDENT-OFF* */
pool_foreach (d, mm->domains)
{vlib_cli_output(vm, "%U", format_map_domain, d, counters);}
/* *INDENT-ON* */
return 0;
}
while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
{
if (unformat (line_input, "counters"))
counters = true;
else if (unformat (line_input, "index %d", &map_domain_index))
;
else
{
error = clib_error_return (0, "unknown input `%U'",
format_unformat_error, line_input);
goto done;
}
}
if (pool_elts (mm->domains) == 0)
{
vlib_cli_output (vm, "No MAP domains are configured...");
goto done;
}
if (map_domain_index == ~0)
{
/* *INDENT-OFF* */
pool_foreach (d, mm->domains)
{vlib_cli_output(vm, "%U", format_map_domain, d, counters);}
/* *INDENT-ON* */
}
else
{
if (pool_is_free_index (mm->domains, map_domain_index))
{
error = clib_error_return (0, "MAP domain does not exists %d",
map_domain_index);
goto done;
}
d = pool_elt_at_index (mm->domains, map_domain_index);
vlib_cli_output (vm, "%U", format_map_domain, d, counters);
}
done:
unformat_free (line_input);
return error;
}
u64
map_error_counter_get (u32 node_index, map_error_t map_error)
{
vlib_main_t *vm = vlib_get_main ();
vlib_node_runtime_t *error_node = vlib_node_get_runtime (vm, node_index);
vlib_error_main_t *em = &vm->error_main;
vlib_error_t e = error_node->errors[map_error];
vlib_node_t *n = vlib_get_node (vm, node_index);
u32 ci;
ci = vlib_error_get_code (&vm->node_main, e);
ASSERT (ci < n->n_errors);
ci += n->error_heap_index;
return (em->counters[ci]);
}
static clib_error_t *
show_map_stats_command_fn (vlib_main_t * vm, unformat_input_t * input,
vlib_cli_command_t * cmd)
{
map_main_t *mm = &map_main;
map_domain_t *d;
int domains = 0, rules = 0, domaincount = 0, rulecount = 0;
if (pool_elts (mm->domains) == 0)
{
vlib_cli_output (vm, "No MAP domains are configured...");
return 0;
}
/* *INDENT-OFF* */
pool_foreach (d, mm->domains) {
if (d->rules) {
rulecount+= 0x1 << d->psid_length;
rules += sizeof(ip6_address_t) * 0x1 << d->psid_length;
}
domains += sizeof(*d);
domaincount++;
}
/* *INDENT-ON* */
vlib_cli_output (vm, "MAP domains structure: %d\n", sizeof (map_domain_t));
vlib_cli_output (vm, "MAP domains: %d (%d bytes)\n", domaincount, domains);
vlib_cli_output (vm, "MAP rules: %d (%d bytes)\n", rulecount, rules);
vlib_cli_output (vm, "Total: %d bytes)\n", rules + domains);
#if MAP_SKIP_IP6_LOOKUP
vlib_cli_output (vm,
"MAP pre-resolve: IP6 next-hop: %U, IP4 next-hop: %U\n",
format_map_pre_resolve, &pre_resolved[FIB_PROTOCOL_IP6],
format_map_pre_resolve, &pre_resolved[FIB_PROTOCOL_IP4]);
#endif
if (mm->tc_copy)
vlib_cli_output (vm, "MAP traffic-class: copy");
else
vlib_cli_output (vm, "MAP traffic-class: %x", mm->tc);
if (mm->tcp_mss)
vlib_cli_output (vm, "MAP TCP MSS clamping: %u", mm->tcp_mss);
vlib_cli_output (vm,
"MAP IPv6 inbound security check: %s, fragmented packet security check: %s",
mm->sec_check ? "enabled" : "disabled",
mm->sec_check_frag ? "enabled" : "disabled");
vlib_cli_output (vm, "ICMP-relay IPv4 source address: %U\n",
format_ip4_address, &mm->icmp4_src_address);
vlib_cli_output (vm, "ICMP6 unreachables sent for unmatched packets: %s\n",
mm->icmp6_enabled ? "enabled" : "disabled");
vlib_cli_output (vm, "Inner fragmentation: %s\n",
mm->frag_inner ? "enabled" : "disabled");
vlib_cli_output (vm, "Fragment packets regardless of DF flag: %s\n",
mm->frag_ignore_df ? "enabled" : "disabled");
/*
* Counters
*/
vlib_combined_counter_main_t *cm = mm->domain_counters;
u64 total_pkts[MAP_N_DOMAIN_COUNTER];
u64 total_bytes[MAP_N_DOMAIN_COUNTER];
int which, i;
vlib_counter_t v;
clib_memset (total_pkts, 0, sizeof (total_pkts));
clib_memset (total_bytes, 0, sizeof (total_bytes));
map_domain_counter_lock (mm);
vec_foreach (cm, mm->domain_counters)
{
which = cm - mm->domain_counters;
for (i = 0; i < vlib_combined_counter_n_counters (cm); i++)
{
vlib_get_combined_counter (cm, i, &v);
total_pkts[which] += v.packets;
total_bytes[which] += v.bytes;
}
}
map_domain_counter_unlock (mm);
vlib_cli_output (vm, "Encapsulated packets: %lld bytes: %lld\n",
total_pkts[MAP_DOMAIN_COUNTER_TX],
total_bytes[MAP_DOMAIN_COUNTER_TX]);
vlib_cli_output (vm, "Decapsulated packets: %lld bytes: %lld\n",
total_pkts[MAP_DOMAIN_COUNTER_RX],
total_bytes[MAP_DOMAIN_COUNTER_RX]);
vlib_cli_output (vm, "ICMP relayed packets: %d\n",
vlib_get_simple_counter (&mm->icmp_relayed, 0));
return 0;
}
static clib_error_t *
map_if_command_fn (vlib_main_t * vm,
unformat_input_t * input, vlib_cli_command_t * cmd)
{
unformat_input_t _line_input, *line_input = &_line_input;
clib_error_t *error = NULL;
bool is_enable = true, is_translation = false;
vnet_main_t *vnm = vnet_get_main ();
u32 sw_if_index = ~0;
/* Get a line of input. */
if (!unformat_user (input, unformat_line_input, line_input))
return 0;
while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
{
if (unformat
(line_input, "%U", unformat_vnet_sw_interface, vnm, &sw_if_index))
;
else if (unformat (line_input, "del"))
is_enable = false;
else if (unformat (line_input, "map-t"))
is_translation = true;
else
{
error = clib_error_return (0, "unknown input `%U'",
format_unformat_error, line_input);
goto done;
}
}
done:
unformat_free (line_input);
if (sw_if_index == ~0)
{
error = clib_error_return (0, "unknown interface");
return error;
}
int rv = map_if_enable_disable (is_enable, sw_if_index, is_translation);
if (rv)
{
error = clib_error_return (0, "failure enabling MAP on interface");
}
return error;
}
/*
* packet trace format function
*/
u8 *
format_map_trace (u8 * s, va_list * args)
{
CLIB_UNUSED (vlib_main_t * vm) = va_arg (*args, vlib_main_t *);
CLIB_UNUSED (vlib_node_t * node) = va_arg (*args, vlib_node_t *);
map_trace_t *t = va_arg (*args, map_trace_t *);
u32 map_domain_index = t->map_domain_index;
u16 port = t->port;
s =
format (s, "MAP domain index: %d L4 port: %u", map_domain_index,
clib_net_to_host_u16 (port));
return s;
}
static clib_error_t *
map_tcp_mss_command_fn (vlib_main_t * vm,
unformat_input_t * input, vlib_cli_command_t * cmd)
{
unformat_input_t _line_input, *line_input = &_line_input;
clib_error_t *error = NULL;
u32 tcp_mss = 0;
/* Get a line of input. */
if (!unformat_user (input, unformat_line_input, line_input))
return 0;
while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
{
if (unformat (line_input, "%u", &tcp_mss))
;
else
{
error = clib_error_return (0, "unknown input `%U'",
format_unformat_error, line_input);
goto done;
}
}
if (tcp_mss >= (0x1 << 16))
{
error = clib_error_return (0, "invalid value `%u'", tcp_mss);
goto done;
}
map_param_set_tcp (tcp_mss);
done:
unformat_free (line_input);
return error;
}
/* *INDENT-OFF* */
/*?
* Set or copy the IP TOS/Traffic Class field
*
* @cliexpar
* @cliexstart{map params traffic-class}
*
* This command is used to set the traffic-class field in translated
* or encapsulated packets. If copy is specifed (the default) then the
* traffic-class/TOS field is copied from the original packet to the
* translated / encapsulating header.
* @cliexend
?*/
VLIB_CLI_COMMAND(map_traffic_class_command, static) = {
.path = "map params traffic-class",
.short_help = "map params traffic-class {0x0-0xff | copy}",
.function = map_traffic_class_command_fn,
};
/*?
* TCP MSS clamping
*
* @cliexpar
* @cliexstart{map params tcp-mss}
*
* This command is used to set the TCP MSS in translated
* or encapsulated packets.
* @cliexend
?*/
VLIB_CLI_COMMAND(map_tcp_mss_command, static) = {
.path = "map params tcp-mss",
.short_help = "map params tcp-mss <value>",
.function = map_tcp_mss_command_fn,
};
/*?
* Bypass IP4/IP6 lookup
*
* @cliexpar
* @cliexstart{map params pre-resolve}
*
* Bypass a second FIB lookup of the translated or encapsulated
* packet, and forward the packet directly to the specified
* next-hop. This optimization trades forwarding flexibility for
* performance.
* @cliexend
?*/
VLIB_CLI_COMMAND(map_pre_resolve_command, static) = {
.path = "map params pre-resolve",
.short_help = " map params pre-resolve {ip4-nh <address>} "
"| {ip6-nh <address>}",
.function = map_pre_resolve_command_fn,
};
/*?
* Enable or disable the MAP-E inbound security check
* Specify if the inbound security check should be done on fragments
*
* @cliexpar
* @cliexstart{map params security-check}
*
* By default, a decapsulated packet's IPv4 source address will be
* verified against the outer header's IPv6 source address. Disabling
* this feature will allow IPv4 source address spoofing.
*
* Typically the inbound on-decapsulation security check is only done
* on the first packet. The packet that contains the L4
* information. While a security check on every fragment is possible,
* it has a cost. State must be created on the first fragment.
* @cliexend
?*/
VLIB_CLI_COMMAND(map_security_check_command, static) = {
.path = "map params security-check",
.short_help = "map params security-check enable|disable fragments on|off",
.function = map_security_check_command_fn,
};
/*?
* Specify the IPv4 source address used for relayed ICMP error messages
*
* @cliexpar
* @cliexstart{map params icmp source-address}
*
* This command specifies which IPv4 source address (must be local to
* the system), that is used for relayed received IPv6 ICMP error
* messages.
* @cliexend
?*/
VLIB_CLI_COMMAND(map_icmp_relay_source_address_command, static) = {
.path = "map params icmp source-address",
.short_help = "map params icmp source-address <ip4-address>",
.function = map_icmp_relay_source_address_command_fn,
};
/*?
* Send IPv6 ICMP unreachables
*
* @cliexpar
* @cliexstart{map params icmp6 unreachables}
*
* Send IPv6 ICMP unreachable messages back if security check fails or
* no MAP domain exists.
* @cliexend
?*/
VLIB_CLI_COMMAND(map_icmp_unreachables_command, static) = {
.path = "map params icmp6 unreachables",
.short_help = "map params icmp6 unreachables {on|off}",
.function = map_icmp_unreachables_command_fn,
};
/*?
* Configure MAP fragmentation behaviour
*
* @cliexpar
* @cliexstart{map params fragment}
*
* Allows fragmentation of the IPv4 packet even if the DF bit is
* set. The choice between inner or outer fragmentation of tunnel
* packets is complicated. The benefit of inner fragmentation is that
* the ultimate endpoint must reassemble, instead of the tunnel
* endpoint.
* @cliexend
?*/
VLIB_CLI_COMMAND(map_fragment_command, static) = {
.path = "map params fragment",
.short_help = "map params fragment inner|outer ignore-df|honor-df",
.function = map_fragment_command_fn,
};
/*?
* Add MAP domain
*
* @cliexpar
* @cliexstart{map add domain}
* @cliexend
?*/
VLIB_CLI_COMMAND(map_add_domain_command, static) = {
.path = "map add domain",
.short_help = "map add domain [tag <tag>] ip4-pfx <ip4-pfx> "
"ip6-pfx <ip6-pfx> "
"ip6-src <ip6-pfx> ea-bits-len <n> psid-offset <n> psid-len <n> "
"[map-t] [mtu <mtu>]",
.function = map_add_domain_command_fn,
};
/*?
* Add MAP rule to a domain
*
* @cliexpar
* @cliexstart{map add rule}
* @cliexend
?*/
VLIB_CLI_COMMAND(map_add_rule_command, static) = {
.path = "map add rule",
.short_help = "map add rule index <domain> psid <psid> ip6-dst <ip6-addr>",
.function = map_add_rule_command_fn,
};
/*?
* Delete MAP domain
*
* @cliexpar
* @cliexstart{map del domain}
* @cliexend
?*/
VLIB_CLI_COMMAND(map_del_command, static) = {
.path = "map del domain",
.short_help = "map del domain index <domain>",
.function = map_del_domain_command_fn,
};
/*?
* Show MAP domains
*
* @cliexpar
* @cliexstart{show map domain}
* @cliexend
?*/
VLIB_CLI_COMMAND(show_map_domain_command, static) = {
.path = "show map domain",
.short_help = "show map domain index <n> [counters]",
.function = show_map_domain_command_fn,
};
/*?
* Show MAP statistics
*
* @cliexpar
* @cliexstart{show map stats}
* @cliexend
?*/
VLIB_CLI_COMMAND(show_map_stats_command, static) = {
.path = "show map stats",
.short_help = "show map stats",
.function = show_map_stats_command_fn,
};
/*?
* Enable MAP processing on interface (input feature)
*
?*/
VLIB_CLI_COMMAND(map_if_command, static) = {
.path = "map interface",
.short_help = "map interface <interface-name> [map-t] [del]",
.function = map_if_command_fn,
};
VLIB_PLUGIN_REGISTER() = {
.version = VPP_BUILD_VER,
.description = "Mapping of Address and Port (MAP)",
};
/* *INDENT-ON* */
/*
* map_init
*/
clib_error_t *
map_init (vlib_main_t * vm)
{
map_main_t *mm = &map_main;
clib_error_t *error = 0;
memset (mm, 0, sizeof (*mm));
mm->vnet_main = vnet_get_main ();
mm->vlib_main = vm;
#ifdef MAP_SKIP_IP6_LOOKUP
fib_protocol_t proto;
FOR_EACH_FIB_PROTOCOL (proto)
{
map_pre_resolve_init (&pre_resolved[proto]);
}
#endif
/* traffic class */
mm->tc = 0;
mm->tc_copy = true;
/* Inbound security check */
mm->sec_check = true;
mm->sec_check_frag = false;
/* ICMP6 Type 1, Code 5 for security check failure */
mm->icmp6_enabled = false;
/* Inner or outer fragmentation */
mm->frag_inner = false;
mm->frag_ignore_df = false;
vec_validate (mm->domain_counters, MAP_N_DOMAIN_COUNTER - 1);
mm->domain_counters[MAP_DOMAIN_COUNTER_RX].name = "/map/rx";
mm->domain_counters[MAP_DOMAIN_COUNTER_TX].name = "/map/tx";
vlib_validate_simple_counter (&mm->icmp_relayed, 0);
vlib_zero_simple_counter (&mm->icmp_relayed, 0);
mm->icmp_relayed.stat_segment_name = "/map/icmp-relayed";
/* IP6 virtual reassembly */
#ifdef MAP_SKIP_IP6_LOOKUP
fib_node_register_type (FIB_NODE_TYPE_MAP_E, &map_vft);
#endif
/* LPM lookup tables */
mm->ip4_prefix_tbl = lpm_table_init (LPM_TYPE_KEY32);
mm->ip6_prefix_tbl = lpm_table_init (LPM_TYPE_KEY128);
mm->ip6_src_prefix_tbl = lpm_table_init (LPM_TYPE_KEY128);
mm->bm_trans_enabled_by_sw_if = 0;
mm->bm_encap_enabled_by_sw_if = 0;
error = map_plugin_api_hookup (vm);
return error;
}
VLIB_INIT_FUNCTION (map_init);
/*
* fd.io coding-style-patch-verification: ON
*
* Local Variables:
* eval: (c-set-style "gnu")
* End:
*/