aboutsummaryrefslogtreecommitdiffstats
path: root/src
AgeCommit message (Expand)AuthorFilesLines
2023-10-12dpdk: add Mellanox BlueField NICsAlexander Kozyrev1-0/+12
2023-10-12session: ignore connecting half_open session in session_tx_fifo_dequeue_internalSteven Luong1-1/+3
2023-10-11tls: Fix SSL_CTX leak on every client sessionBrian Morris2-11/+12
2023-10-11session: ignore app rx ntf if transport closedFlorin Coras1-1/+1
2023-10-11session: fix tx deq ntf assert for clFlorin Coras1-1/+1
2023-10-10lb: fix intermittent per-port-vip idx lookup failureDave Wallace1-0/+1
2023-10-10session: maintain old state on premature closeFlorin Coras1-7/+14
2023-10-09vppinfra: fix coverity issue CID 323952Dave Wallace1-1/+1
2023-10-09buffers: buffer allocation improvementsDamjan Marion2-38/+47
2023-10-08tls: propagate reads to app irrespective of stateFlorin Coras2-3/+2
2023-10-08tls: report error if connected cannot be initializedFlorin Coras1-4/+6
2023-10-08tls: no read after app closeFlorin Coras1-1/+1
2023-10-07session: propagate delayed rx evts after connect/acceptFlorin Coras1-5/+20
2023-10-07session: handle accept and connect errorsFlorin Coras2-6/+29
2023-10-06cnat: add flow hash config to cnat translationhedi bouattour4-7/+29
2023-10-04vppinfra: fix string termination in clib_file_get_resolved_basenameDamjan Marion1-0/+2
2023-10-03session: make port range configurableNathan Skrzypczak3-1/+16
2023-10-03build: add ability to disable some plugins from packaging and testsAndrew Yourtchenko1-1/+21
2023-10-03vppinfra: add foreach_int macroDamjan Marion1-0/+6
2023-10-03vppinfra: splat and gather vector inlinesDamjan Marion2-0/+24
2023-10-03nat: nat66 cli bug fixFilip Varga1-5/+5
2023-10-03stats: added optional CLI arg "port" to specify non-default portFahad Khan1-6/+8
2023-10-02tls: limit openssl engine max read burstFlorin Coras2-4/+6
2023-10-02tls: fix formatting of half open connectionsFlorin Coras1-0/+1
2023-10-01flow dpdk avf: add support for using l2tpv3 as RSS typeXinyao Cai3-0/+3
2023-10-01build: modify N_PREFETCH on Arm N2 to achieve best perfJieqiang Wang1-3/+2
2023-10-01fib: Crash when specify a big prefix length from CLI.Gavril Florian4-1/+33
2023-09-28dpdk-cryptodev: improve dequeue behavior, fix cache stats loggingPiotr Bronowski4-76/+88
2023-09-28dpdk: add ConnectX-6LX and ConnectX-7 supportAlexander Kozyrev1-3/+9
2023-09-26tls: init connection for prealloced app sessionsFlorin Coras1-0/+3
2023-09-26ping: Simple binary API for running ping based on eventsNikitaSkrynnik5-70/+285
2023-09-26crypto-ipsecmb: bump intel-ipsec-mb version to 1.4Ranjan Raj1-50/+59
2023-09-26fib: fix mpls label dpo drop protoVladislav Grishenko1-2/+2
2023-09-25fib: fix mpls label dpo packets prefetchingVladislav Grishenko1-16/+16
2023-09-24fib: Don't use an address from an attached prefix when sending ARP requests.Neale Ranns2-4/+12
2023-09-23udp: fix udp encap tracingDmitry Valter1-2/+2
2023-09-22tls: ignore tx events for not fully established sessionsFlorin Coras1-6/+9
2023-09-19npt66: ensure feature is not configured multiple timesOle Troan2-12/+23
2023-09-18vcl: unset fifo evt before size checkFlorin Coras1-6/+8
2023-09-16vapi: fix coverity warningsDave Wallace1-12/+13
2023-09-13nat: fix nat44_ed set_session_limit crashVladislav Grishenko1-8/+4
2023-09-13quic: fix quic sessions state updatesFlorin Coras1-11/+5
2023-09-13sr: mark sr_policies_v2_details message as productionAndrew Yourtchenko1-1/+0
2023-09-13adl: stabilize the APIAndrew Yourtchenko1-1/+1
2023-09-13flow: mark API as productionAndrew Yourtchenko1-1/+1
2023-09-13wireguard: stabilize the APIAndrew Yourtchenko1-1/+1
2023-09-13crypto-sw-scheduler: stabilize the APIAndrew Yourtchenko1-1/+1
2023-09-13hsa: fix coverity issue CID-313635Dave Wallace2-2/+8
2023-09-13api: fix vlibmemory coverity warning CID-300152Dave Wallace1-0/+4
2023-09-13vppinfra: add ARM Neoverse-N2 supportDamjan Marion3-94/+131
an class="o">~0; } return 0; } int vnet_set_input_acl_intfc (vlib_main_t * vm, u32 sw_if_index, u32 ip4_table_index, u32 ip6_table_index, u32 l2_table_index, u32 is_add) { return vnet_set_in_out_acl_intfc (vm, sw_if_index, ip4_table_index, ip6_table_index, l2_table_index, is_add, IN_OUT_ACL_INPUT_TABLE_GROUP); } int vnet_set_output_acl_intfc (vlib_main_t * vm, u32 sw_if_index, u32 ip4_table_index, u32 ip6_table_index, u32 l2_table_index, u32 is_add) { return vnet_set_in_out_acl_intfc (vm, sw_if_index, ip4_table_index, ip6_table_index, l2_table_index, is_add, IN_OUT_ACL_OUTPUT_TABLE_GROUP); } static clib_error_t * set_in_out_acl_command_fn (vlib_main_t * vm, unformat_input_t * input, vlib_cli_command_t * cmd, u32 is_output) { vnet_main_t *vnm = vnet_get_main (); u32 sw_if_index = ~0; u32 ip4_table_index = ~0; u32 ip6_table_index = ~0; u32 l2_table_index = ~0; u32 is_add = 1; u32 idx_cnt = 0; int rv; while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT) { if (unformat (input, "intfc %U", unformat_vnet_sw_interface, vnm, &sw_if_index)) ; else if (unformat (input, "ip4-table %d", &ip4_table_index)) idx_cnt++; else if (unformat (input, "ip6-table %d", &ip6_table_index)) idx_cnt++; else if (unformat (input, "l2-table %d", &l2_table_index)) idx_cnt++; else if (unformat (input, "del")) is_add = 0; else break; } if (sw_if_index == ~0) return clib_error_return (0, "Interface must be specified."); if (!idx_cnt) return clib_error_return (0, "Table index should be specified."); if (idx_cnt > 1) return clib_error_return (0, "Only one table index per API is allowed."); rv = vnet_set_in_out_acl_intfc (vm, sw_if_index, ip4_table_index, ip6_table_index, l2_table_index, is_add, is_output); switch (rv) { case 0: break; case VNET_API_ERROR_NO_MATCHING_INTERFACE: return clib_error_return (0, "No such interface"); case VNET_API_ERROR_NO_SUCH_ENTRY: return clib_error_return (0, "No such classifier table"); } return 0; } static clib_error_t * set_input_acl_command_fn (vlib_main_t * vm, unformat_input_t * input, vlib_cli_command_t * cmd) { return set_in_out_acl_command_fn (vm, input, cmd, IN_OUT_ACL_INPUT_TABLE_GROUP); } static clib_error_t * set_output_acl_command_fn (vlib_main_t * vm, unformat_input_t * input, vlib_cli_command_t * cmd) { return set_in_out_acl_command_fn (vm, input, cmd, IN_OUT_ACL_OUTPUT_TABLE_GROUP); } /* * Configure interface to enable/disble input/output ACL features: * intfc - interface name to be configured as input ACL * Ip4-table <index> [del] - enable/disable IP4 input ACL * Ip6-table <index> [del] - enable/disable IP6 input ACL * l2-table <index> [del] - enable/disable Layer2 input ACL * * Note: Only one table index per API call is allowed. * */ /* *INDENT-OFF* */ VLIB_CLI_COMMAND (set_input_acl_command, static) = { .path = "set interface input acl", .short_help = "set interface input acl intfc <int> [ip4-table <index>]\n" " [ip6-table <index>] [l2-table <index>] [del]", .function = set_input_acl_command_fn, }; VLIB_CLI_COMMAND (set_output_acl_command, static) = { .path = "set interface output acl", .short_help = "set interface output acl intfc <int> [ip4-table <index>]\n" " [ip6-table <index>] [l2-table <index>] [del]", .function = set_output_acl_command_fn, }; /* *INDENT-ON* */ clib_error_t * in_out_acl_init (vlib_main_t * vm) { in_out_acl_main_t *am = &in_out_acl_main; am->vlib_main = vm; am->vnet_main = vnet_get_main (); am->vnet_classify_main = &vnet_classify_main; return 0; } /* *INDENT-OFF* */ VLIB_INIT_FUNCTION (in_out_acl_init) = { .runs_after = VLIB_INITS("ip_in_out_acl_init"), }; /* *INDENT-ON* */ uword unformat_acl_type (unformat_input_t * input, va_list * args) { u32 *acl_type = va_arg (*args, u32 *); u32 tid = IN_OUT_ACL_N_TABLES; while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT) { if (unformat (input, "ip4")) tid = IN_OUT_ACL_TABLE_IP4; else if (unformat (input, "ip6")) tid = IN_OUT_ACL_TABLE_IP6; else if (unformat (input, "l2")) tid = IN_OUT_ACL_TABLE_L2; else break; } *acl_type = tid; return 1; } u8 * format_vnet_in_out_acl_info (u8 * s, va_list * va) { in_out_acl_main_t *am = va_arg (*va, in_out_acl_main_t *); int sw_if_idx = va_arg (*va, int); u32 tid = va_arg (*va, u32); if (tid == ~0) { s = format (s, "%10s%20s\t\t%s", "Intfc idx", "Classify table", "Interface name"); return s; } s = format (s, "%10d%20d\t\t%U", sw_if_idx, tid, format_vnet_sw_if_index_name, am->vnet_main, sw_if_idx); return s; } static clib_error_t * show_in_out_acl_command_fn (vlib_main_t * vm, unformat_input_t * input, vlib_cli_command_t * cmd, u32 is_output) { in_out_acl_main_t *am = &in_out_acl_main; u32 type = IN_OUT_ACL_N_TABLES; int i; u32 *vec_tbl; while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT) { if (unformat (input, "type %U", unformat_acl_type, &type)) ; else break; } if (type == IN_OUT_ACL_N_TABLES) return clib_error_return (0, is_output ? "Invalid output ACL table type." : "Invalid input ACL table type."); vec_tbl = am->classify_table_index_by_sw_if_index[is_output][type]; if (vec_len (vec_tbl)) vlib_cli_output (vm, "%U", format_vnet_in_out_acl_info, am, ~0 /* hdr */ , ~0); else vlib_cli_output (vm, is_output ? "No output ACL tables configured" : "No input ACL tables configured"); for (i = 0; i < vec_len (vec_tbl); i++) { if (vec_elt (vec_tbl, i) == ~0) continue; vlib_cli_output (vm, "%U", format_vnet_in_out_acl_info, am, i, vec_elt (vec_tbl, i)); } return 0; } static clib_error_t * show_inacl_command_fn (vlib_main_t * vm, unformat_input_t * input, vlib_cli_command_t * cmd) { return show_in_out_acl_command_fn (vm, input, cmd, IN_OUT_ACL_INPUT_TABLE_GROUP); } static clib_error_t * show_outacl_command_fn (vlib_main_t * vm, unformat_input_t * input, vlib_cli_command_t * cmd) { return show_in_out_acl_command_fn (vm, input, cmd, IN_OUT_ACL_OUTPUT_TABLE_GROUP); } /* *INDENT-OFF* */ VLIB_CLI_COMMAND (show_inacl_command, static) = { .path = "show inacl", .short_help = "show inacl type [ip4|ip6|l2]", .function = show_inacl_command_fn, }; VLIB_CLI_COMMAND (show_outacl_command, static) = { .path = "show outacl", .short_help = "show outacl type [ip4|ip6|l2]", .function = show_outacl_command_fn, }; /* *INDENT-ON* */ /* * fd.io coding-style-patch-verification: ON * * Local Variables: * eval: (c-set-style "gnu") * End: */