Type: refactor Change-Id: I5235bf3e9aff58af6ba2c14e8c6529c4fc9ec86c Signed-off-by: Damjan Marion <damarion@cisco.com>
410 lines
11 KiB
C
410 lines
11 KiB
C
/*
|
|
* Copyright (c) 2016,2020 Cisco and/or its affiliates.
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at:
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
#include <vnet/ethernet/ethernet.h>
|
|
#include <vnet/plugin/plugin.h>
|
|
#include <vpp/app/version.h>
|
|
#include <plugins/adl/adl.h>
|
|
|
|
adl_main_t adl_main;
|
|
|
|
static clib_error_t *
|
|
adl_sw_interface_add_del (vnet_main_t * vnm, u32 sw_if_index, u32 is_add)
|
|
{
|
|
adl_main_t *am = &adl_main;
|
|
adl_config_data_t _data, *data = &_data;
|
|
vlib_main_t *vm = am->vlib_main;
|
|
vnet_hw_interface_t *hi = vnet_get_sup_hw_interface (vnm, sw_if_index);;
|
|
adl_config_main_t *acm;
|
|
int address_family;
|
|
u32 ci, default_next;
|
|
|
|
clib_memset (data, 0, sizeof (*data));
|
|
|
|
/*
|
|
* Ignore local interface, pg interfaces. $$$ need a #define for the
|
|
* first "real" interface. The answer is 5 at the moment.
|
|
*/
|
|
if (hi->dev_class_index == vnet_local_interface_device_class.index)
|
|
return 0;
|
|
|
|
for (address_family = VNET_ADL_IP4; address_family < VNET_N_ADLS;
|
|
address_family++)
|
|
{
|
|
acm = &am->adl_config_mains[address_family];
|
|
|
|
/*
|
|
* Once-only code to initialize the per-address-family
|
|
* adl feature subgraphs.
|
|
* Since the (single) start-node, adl-input, must be able
|
|
* to push pkts into three separate subgraphs, we
|
|
* use a unified adl_feature_type_t enumeration.
|
|
*/
|
|
|
|
if (!(acm->config_main.node_index_by_feature_index))
|
|
{
|
|
switch (address_family)
|
|
{
|
|
case VNET_ADL_IP4:
|
|
{
|
|
static char *start_nodes[] = { "adl-input" };
|
|
static char *feature_nodes[] = {
|
|
[IP4_RX_ADL_ALLOWLIST] = "ip4-adl-allowlist",
|
|
[IP4_RX_ADL_INPUT] = "ip4-input",
|
|
};
|
|
|
|
vnet_config_init (vm, &acm->config_main,
|
|
start_nodes, ARRAY_LEN (start_nodes),
|
|
feature_nodes, ARRAY_LEN (feature_nodes));
|
|
}
|
|
break;
|
|
case VNET_ADL_IP6:
|
|
{
|
|
static char *start_nodes[] = { "adl-input" };
|
|
static char *feature_nodes[] = {
|
|
[IP6_RX_ADL_ALLOWLIST] = "ip6-adl-allowlist",
|
|
[IP6_RX_ADL_INPUT] = "ip6-input",
|
|
};
|
|
vnet_config_init (vm, &acm->config_main,
|
|
start_nodes, ARRAY_LEN (start_nodes),
|
|
feature_nodes, ARRAY_LEN (feature_nodes));
|
|
}
|
|
break;
|
|
|
|
case VNET_ADL_DEFAULT:
|
|
{
|
|
static char *start_nodes[] = { "adl-input" };
|
|
static char *feature_nodes[] = {
|
|
[DEFAULT_RX_ADL_ALLOWLIST] = "default-adl-allowlist",
|
|
[DEFAULT_RX_ADL_INPUT] = "ethernet-input",
|
|
};
|
|
vnet_config_init (vm, &acm->config_main,
|
|
start_nodes, ARRAY_LEN (start_nodes),
|
|
feature_nodes, ARRAY_LEN (feature_nodes));
|
|
}
|
|
break;
|
|
|
|
default:
|
|
clib_warning ("bug");
|
|
break;
|
|
}
|
|
}
|
|
vec_validate_init_empty (acm->config_index_by_sw_if_index, sw_if_index,
|
|
~0);
|
|
|
|
ci = acm->config_index_by_sw_if_index[sw_if_index];
|
|
|
|
/* Create a sensible initial config: send pkts to xxx-input */
|
|
if (address_family == VNET_ADL_IP4)
|
|
default_next = IP4_RX_ADL_INPUT;
|
|
else if (address_family == VNET_ADL_IP6)
|
|
default_next = IP6_RX_ADL_INPUT;
|
|
else
|
|
default_next = DEFAULT_RX_ADL_INPUT;
|
|
|
|
if (is_add)
|
|
ci = vnet_config_add_feature (vm, &acm->config_main,
|
|
ci, default_next, data, sizeof (*data));
|
|
else
|
|
{
|
|
/* If the feature was actually configured */
|
|
if (ci != ~0)
|
|
{
|
|
ci = vnet_config_del_feature (vm, &acm->config_main,
|
|
ci, default_next, data,
|
|
sizeof (*data));
|
|
}
|
|
}
|
|
|
|
acm->config_index_by_sw_if_index[sw_if_index] = ci;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
VNET_SW_INTERFACE_ADD_DEL_FUNCTION (adl_sw_interface_add_del);
|
|
|
|
static clib_error_t *
|
|
adl_init (vlib_main_t * vm)
|
|
{
|
|
adl_main_t *cm = &adl_main;
|
|
|
|
cm->vlib_main = vm;
|
|
cm->vnet_main = vnet_get_main ();
|
|
|
|
/*
|
|
* Setup the packet generator so we can inject ethernet
|
|
* frames into this node
|
|
*/
|
|
ethernet_setup_node (vm, adl_input_node.index);
|
|
return 0;
|
|
}
|
|
|
|
VLIB_INIT_FUNCTION (adl_init) =
|
|
{
|
|
.runs_after = VLIB_INITS ("ip4_allowlist_init", "ip6_allowlist_init"),
|
|
};
|
|
|
|
VNET_FEATURE_INIT (adl, static) =
|
|
{
|
|
.arc_name = "device-input",
|
|
.node_name = "adl-input",
|
|
.runs_before = VNET_FEATURES ("ethernet-input"),
|
|
};
|
|
|
|
int adl_interface_enable_disable (u32 sw_if_index, int enable_disable)
|
|
{
|
|
/*
|
|
* Redirect pkts from the driver to the adl node.
|
|
*/
|
|
vnet_feature_enable_disable ("device-input", "adl-input",
|
|
sw_if_index, enable_disable, 0, 0);
|
|
return 0;
|
|
}
|
|
|
|
static clib_error_t *
|
|
adl_enable_disable_command_fn (vlib_main_t * vm,
|
|
unformat_input_t * input,
|
|
vlib_cli_command_t * cmd)
|
|
{
|
|
adl_main_t * cm = &adl_main;
|
|
u32 sw_if_index = ~0;
|
|
int enable_disable = 1;
|
|
|
|
int rv;
|
|
|
|
while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT) {
|
|
if (unformat (input, "disable"))
|
|
enable_disable = 0;
|
|
else if (unformat (input, "%U", unformat_vnet_sw_interface,
|
|
cm->vnet_main, &sw_if_index))
|
|
;
|
|
else
|
|
break;
|
|
}
|
|
|
|
if (sw_if_index == ~0)
|
|
return clib_error_return (0, "Please specify an interface...");
|
|
|
|
rv = adl_interface_enable_disable (sw_if_index, enable_disable);
|
|
|
|
switch(rv) {
|
|
case 0:
|
|
break;
|
|
|
|
case VNET_API_ERROR_INVALID_SW_IF_INDEX:
|
|
return clib_error_return
|
|
(0, "Invalid interface, only works on physical ports");
|
|
break;
|
|
|
|
case VNET_API_ERROR_UNIMPLEMENTED:
|
|
return clib_error_return (0, "Device driver doesn't support redirection");
|
|
break;
|
|
|
|
default:
|
|
return clib_error_return (0, "adl_interface_enable_disable returned %d",
|
|
rv);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
VLIB_CLI_COMMAND (adl_interface_command, static) = {
|
|
.path = "adl interface",
|
|
.short_help =
|
|
"adl interface <interface-name> [disable]",
|
|
.function = adl_enable_disable_command_fn,
|
|
};
|
|
|
|
|
|
int adl_allowlist_enable_disable (adl_allowlist_enable_disable_args_t *a)
|
|
{
|
|
adl_main_t * cm = &adl_main;
|
|
vlib_main_t * vm = cm->vlib_main;
|
|
ip4_main_t * im4 = &ip4_main;
|
|
ip6_main_t * im6 = &ip6_main;
|
|
int address_family;
|
|
int is_add;
|
|
adl_config_main_t * acm;
|
|
u32 next_to_add_del = 0;
|
|
uword * p;
|
|
u32 fib_index = 0;
|
|
u32 ci;
|
|
adl_config_data_t _data, *data=&_data;
|
|
|
|
/*
|
|
* Enable / disable allowlist processing on the specified interface
|
|
*/
|
|
|
|
for (address_family = VNET_ADL_IP4; address_family < VNET_N_ADLS;
|
|
address_family++)
|
|
{
|
|
acm = &cm->adl_config_mains[address_family];
|
|
|
|
switch(address_family)
|
|
{
|
|
case VNET_ADL_IP4:
|
|
is_add = (a->ip4 != 0);
|
|
next_to_add_del = IP4_RX_ADL_ALLOWLIST;
|
|
/* configured opaque data must match, or no supper */
|
|
p = hash_get (im4->fib_index_by_table_id, a->fib_id);
|
|
if (p)
|
|
fib_index = p[0];
|
|
else
|
|
{
|
|
if (is_add)
|
|
return VNET_API_ERROR_NO_SUCH_FIB;
|
|
else
|
|
continue;
|
|
}
|
|
break;
|
|
|
|
case VNET_ADL_IP6:
|
|
is_add = (a->ip6 != 0);
|
|
next_to_add_del = IP6_RX_ADL_ALLOWLIST;
|
|
p = hash_get (im6->fib_index_by_table_id, a->fib_id);
|
|
if (p)
|
|
fib_index = p[0];
|
|
else
|
|
{
|
|
if (is_add)
|
|
return VNET_API_ERROR_NO_SUCH_FIB;
|
|
else
|
|
continue;
|
|
}
|
|
break;
|
|
|
|
case VNET_ADL_DEFAULT:
|
|
is_add = (a->default_adl != 0);
|
|
next_to_add_del = DEFAULT_RX_ADL_ALLOWLIST;
|
|
break;
|
|
|
|
default:
|
|
clib_warning ("BUG");
|
|
}
|
|
|
|
ci = acm->config_index_by_sw_if_index[a->sw_if_index];
|
|
data->fib_index = fib_index;
|
|
|
|
if (is_add)
|
|
ci = vnet_config_add_feature (vm, &acm->config_main,
|
|
ci,
|
|
next_to_add_del,
|
|
data, sizeof (*data));
|
|
else
|
|
{
|
|
/* If the feature was actually configured... */
|
|
if (ci != ~0)
|
|
{
|
|
/* delete it */
|
|
ci = vnet_config_del_feature (vm, &acm->config_main,
|
|
ci,
|
|
next_to_add_del,
|
|
data, sizeof (*data));
|
|
}
|
|
}
|
|
|
|
acm->config_index_by_sw_if_index[a->sw_if_index] = ci;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static clib_error_t *
|
|
adl_allowlist_enable_disable_command_fn (vlib_main_t * vm,
|
|
unformat_input_t * input,
|
|
vlib_cli_command_t * cmd)
|
|
{
|
|
adl_main_t * cm = &adl_main;
|
|
u32 sw_if_index = ~0;
|
|
u8 ip4 = 0;
|
|
u8 ip6 = 0;
|
|
u8 default_adl = 0;
|
|
u32 fib_id = 0;
|
|
int rv;
|
|
adl_allowlist_enable_disable_args_t _a, * a = &_a;
|
|
|
|
while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT) {
|
|
if (unformat (input, "ip4"))
|
|
ip4 = 1;
|
|
else if (unformat (input, "ip6"))
|
|
ip6 = 1;
|
|
else if (unformat (input, "default"))
|
|
default_adl = 1;
|
|
else if (unformat (input, "%U", unformat_vnet_sw_interface,
|
|
cm->vnet_main, &sw_if_index))
|
|
;
|
|
else if (unformat (input, "fib-id %d", &fib_id))
|
|
;
|
|
else
|
|
break;
|
|
}
|
|
|
|
if (sw_if_index == ~0)
|
|
return clib_error_return (0, "Please specify an interface...");
|
|
|
|
a->sw_if_index = sw_if_index;
|
|
a->ip4 = ip4;
|
|
a->ip6 = ip6;
|
|
a->default_adl = default_adl;
|
|
a->fib_id = fib_id;
|
|
|
|
rv = adl_allowlist_enable_disable (a);
|
|
|
|
switch(rv) {
|
|
case 0:
|
|
break;
|
|
|
|
case VNET_API_ERROR_INVALID_SW_IF_INDEX:
|
|
return clib_error_return
|
|
(0, "Invalid interface, only works on physical ports");
|
|
break;
|
|
|
|
case VNET_API_ERROR_NO_SUCH_FIB:
|
|
return clib_error_return
|
|
(0, "Invalid fib");
|
|
break;
|
|
|
|
case VNET_API_ERROR_UNIMPLEMENTED:
|
|
return clib_error_return (0, "Device driver doesn't support redirection");
|
|
break;
|
|
|
|
default:
|
|
return clib_error_return (0, "adl_allowlist_enable_disable returned %d",
|
|
rv);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
VLIB_CLI_COMMAND (adl_allowlist_command, static) =
|
|
{
|
|
.path = "adl allowlist",
|
|
.short_help =
|
|
"adl allowlist <interface-name> [ip4][ip6][default][fib-id <NN>][disable]",
|
|
.function = adl_allowlist_enable_disable_command_fn,
|
|
};
|
|
|
|
VLIB_PLUGIN_REGISTER () =
|
|
{
|
|
.version = VPP_BUILD_VER,
|
|
.description = "Allow/deny list plugin",
|
|
};
|
|
|
|
|
|
/*
|
|
* fd.io coding-style-patch-verification: ON
|
|
*
|
|
* Local Variables:
|
|
* eval: (c-set-style "gnu")
|
|
* End:
|
|
*/
|