/* * Copyright (c) 2016,2020 Cisco and/or its affiliates. * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at: * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include <vnet/ethernet/ethernet.h> #include <vnet/plugin/plugin.h> #include <vpp/app/version.h> #include <plugins/adl/adl.h> adl_main_t adl_main; static clib_error_t * adl_sw_interface_add_del (vnet_main_t * vnm, u32 sw_if_index, u32 is_add) { adl_main_t *am = &adl_main; adl_config_data_t _data, *data = &_data; vlib_main_t *vm = am->vlib_main; vnet_hw_interface_t *hi = vnet_get_sup_hw_interface (vnm, sw_if_index);; adl_config_main_t *acm; int address_family; u32 ci, default_next; clib_memset (data, 0, sizeof (*data)); /* * Ignore local interface, pg interfaces. $$$ need a #define for the * first "real" interface. The answer is 5 at the moment. */ if (hi->dev_class_index == vnet_local_interface_device_class.index) return 0; for (address_family = VNET_ADL_IP4; address_family < VNET_N_ADLS; address_family++) { acm = &am->adl_config_mains[address_family]; /* * Once-only code to initialize the per-address-family * adl feature subgraphs. * Since the (single) start-node, adl-input, must be able * to push pkts into three separate subgraphs, we * use a unified adl_feature_type_t enumeration. */ if (!(acm->config_main.node_index_by_feature_index)) { switch (address_family) { case VNET_ADL_IP4: { static char *start_nodes[] = { "adl-input" }; static char *feature_nodes[] = { [IP4_RX_ADL_ALLOWLIST] = "ip4-adl-allowlist", [IP4_RX_ADL_INPUT] = "ip4-input", }; vnet_config_init (vm, &acm->config_main, start_nodes, ARRAY_LEN (start_nodes), feature_nodes, ARRAY_LEN (feature_nodes)); } break; case VNET_ADL_IP6: { static char *start_nodes[] = { "adl-input" }; static char *feature_nodes[] = { [IP6_RX_ADL_ALLOWLIST] = "ip6-adl-allowlist", [IP6_RX_ADL_INPUT] = "ip6-input", }; vnet_config_init (vm, &acm->config_main, start_nodes, ARRAY_LEN (start_nodes), feature_nodes, ARRAY_LEN (feature_nodes)); } break; case VNET_ADL_DEFAULT: { static char *start_nodes[] = { "adl-input" }; static char *feature_nodes[] = { [DEFAULT_RX_ADL_ALLOWLIST] = "default-adl-allowlist", [DEFAULT_RX_ADL_INPUT] = "ethernet-input", }; vnet_config_init (vm, &acm->config_main, start_nodes, ARRAY_LEN (start_nodes), feature_nodes, ARRAY_LEN (feature_nodes)); } break; default: clib_warning ("bug"); break; } } vec_validate_init_empty (acm->config_index_by_sw_if_index, sw_if_index, ~0); ci = acm->config_index_by_sw_if_index[sw_if_index]; /* Create a sensible initial config: send pkts to xxx-input */ if (address_family == VNET_ADL_IP4) default_next = IP4_RX_ADL_INPUT; else if (address_family == VNET_ADL_IP6) default_next = IP6_RX_ADL_INPUT; else default_next = DEFAULT_RX_ADL_INPUT; if (is_add) ci = vnet_config_add_feature (vm, &acm->config_main, ci, default_next, data, sizeof (*data)); else { /* If the feature was actually configured */ if (ci != ~0) { ci = vnet_config_del_feature (vm, &acm->config_main, ci, default_next, data, sizeof (*data)); } } acm->config_index_by_sw_if_index[sw_if_index] = ci; } return 0; } VNET_SW_INTERFACE_ADD_DEL_FUNCTION (adl_sw_interface_add_del); static clib_error_t * adl_init (vlib_main_t * vm) { adl_main_t *cm = &adl_main; cm->vlib_main = vm; cm->vnet_main = vnet_get_main (); /* * Setup the packet generator so we can inject ethernet * frames into this node */ ethernet_setup_node (vm, adl_input_node.index); return 0; } /* *INDENT-OFF* */ VLIB_INIT_FUNCTION (adl_init) = { .runs_after = VLIB_INITS ("ip4_allowlist_init", "ip6_allowlist_init"), }; /* *INDENT-ON* */ /* *INDENT-OFF* */ VNET_FEATURE_INIT (adl, static) = { .arc_name = "device-input", .node_name = "adl-input", .runs_before = VNET_FEATURES ("ethernet-input"), }; /* *INDENT-ON */ int adl_interface_enable_disable (u32 sw_if_index, int enable_disable) { /* * Redirect pkts from the driver to the adl node. */ vnet_feature_enable_disable ("device-input", "adl-input", sw_if_index, enable_disable, 0, 0); return 0; } static clib_error_t * adl_enable_disable_command_fn (vlib_main_t * vm, unformat_input_t * input, vlib_cli_command_t * cmd) { adl_main_t * cm = &adl_main; u32 sw_if_index = ~0; int enable_disable = 1; int rv; while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT) { if (unformat (input, "disable")) enable_disable = 0; else if (unformat (input, "%U", unformat_vnet_sw_interface, cm->vnet_main, &sw_if_index)) ; else break; } if (sw_if_index == ~0) return clib_error_return (0, "Please specify an interface..."); rv = adl_interface_enable_disable (sw_if_index, enable_disable); switch(rv) { case 0: break; case VNET_API_ERROR_INVALID_SW_IF_INDEX: return clib_error_return (0, "Invalid interface, only works on physical ports"); break; case VNET_API_ERROR_UNIMPLEMENTED: return clib_error_return (0, "Device driver doesn't support redirection"); break; default: return clib_error_return (0, "adl_interface_enable_disable returned %d", rv); } return 0; } VLIB_CLI_COMMAND (adl_interface_command, static) = { .path = "adl interface", .short_help = "adl interface <interface-name> [disable]", .function = adl_enable_disable_command_fn, }; int adl_allowlist_enable_disable (adl_allowlist_enable_disable_args_t *a) { adl_main_t * cm = &adl_main; vlib_main_t * vm = cm->vlib_main; ip4_main_t * im4 = &ip4_main; ip6_main_t * im6 = &ip6_main; int address_family; int is_add; adl_config_main_t * acm; u32 next_to_add_del = 0; uword * p; u32 fib_index = 0; u32 ci; adl_config_data_t _data, *data=&_data; /* * Enable / disable allowlist processing on the specified interface */ for (address_family = VNET_ADL_IP4; address_family < VNET_N_ADLS; address_family++) { acm = &cm->adl_config_mains[address_family]; switch(address_family) { case VNET_ADL_IP4: is_add = (a->ip4 != 0); next_to_add_del = IP4_RX_ADL_ALLOWLIST; /* configured opaque data must match, or no supper */ p = hash_get (im4->fib_index_by_table_id, a->fib_id); if (p) fib_index = p[0]; else { if (is_add) return VNET_API_ERROR_NO_SUCH_FIB; else continue; } break; case VNET_ADL_IP6: is_add = (a->ip6 != 0); next_to_add_del = IP6_RX_ADL_ALLOWLIST; p = hash_get (im6->fib_index_by_table_id, a->fib_id); if (p) fib_index = p[0]; else { if (is_add) return VNET_API_ERROR_NO_SUCH_FIB; else continue; } break; case VNET_ADL_DEFAULT: is_add = (a->default_adl != 0); next_to_add_del = DEFAULT_RX_ADL_ALLOWLIST; break; default: clib_warning ("BUG"); } ci = acm->config_index_by_sw_if_index[a->sw_if_index]; data->fib_index = fib_index; if (is_add) ci = vnet_config_add_feature (vm, &acm->config_main, ci, next_to_add_del, data, sizeof (*data)); else { /* If the feature was actually configured... */ if (ci != ~0) { /* delete it */ ci = vnet_config_del_feature (vm, &acm->config_main, ci, next_to_add_del, data, sizeof (*data)); } } acm->config_index_by_sw_if_index[a->sw_if_index] = ci; } return 0; } static clib_error_t * adl_allowlist_enable_disable_command_fn (vlib_main_t * vm, unformat_input_t * input, vlib_cli_command_t * cmd) { adl_main_t * cm = &adl_main; u32 sw_if_index = ~0; u8 ip4 = 0; u8 ip6 = 0; u8 default_adl = 0; u32 fib_id = 0; int rv; adl_allowlist_enable_disable_args_t _a, * a = &_a; while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT) { if (unformat (input, "ip4")) ip4 = 1; else if (unformat (input, "ip6")) ip6 = 1; else if (unformat (input, "default")) default_adl = 1; else if (unformat (input, "%U", unformat_vnet_sw_interface, cm->vnet_main, &sw_if_index)) ; else if (unformat (input, "fib-id %d", &fib_id)) ; else break; } if (sw_if_index == ~0) return clib_error_return (0, "Please specify an interface..."); a->sw_if_index = sw_if_index; a->ip4 = ip4; a->ip6 = ip6; a->default_adl = default_adl; a->fib_id = fib_id; rv = adl_allowlist_enable_disable (a); switch(rv) { case 0: break; case VNET_API_ERROR_INVALID_SW_IF_INDEX: return clib_error_return (0, "Invalid interface, only works on physical ports"); break; case VNET_API_ERROR_NO_SUCH_FIB: return clib_error_return (0, "Invalid fib"); break; case VNET_API_ERROR_UNIMPLEMENTED: return clib_error_return (0, "Device driver doesn't support redirection"); break; default: return clib_error_return (0, "adl_allowlist_enable_disable returned %d", rv); } return 0; } /* *INDENT-OFF* */ VLIB_CLI_COMMAND (adl_allowlist_command, static) = { .path = "adl allowlist", .short_help = "adl allowlist <interface-name> [ip4][ip6][default][fib-id <NN>][disable]", .function = adl_allowlist_enable_disable_command_fn, }; /* *INDENT-ON* */ /* *INDENT-OFF* */ VLIB_PLUGIN_REGISTER () = { .version = VPP_BUILD_VER, .description = "Allow/deny list plugin", }; /* *INDENT-ON* */ /* * fd.io coding-style-patch-verification: ON * * Local Variables: * eval: (c-set-style "gnu") * End: */