summaryrefslogtreecommitdiffstats
path: root/src/vnet/fib/fib_bfd.c
blob: b02fbc67a6318a8fb4016a4d5e8489b0568add16 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
/*
 * Copyright (c) 2016 Cisco and/or its affiliates.
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at:
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

#include <vnet/bfd/bfd_main.h>

#include <vnet/fib/fib_entry_delegate.h>
#include <vnet/fib/fib_entry.h>
#include <vnet/fib/fib_table.h>
#include <vnet/fib/fib_walk.h>

static fib_bfd_state_t
fib_bfd_bfd_state_to_fib (bfd_state_e bstate)
{
    switch (bstate)
    {
    case BFD_STATE_up:
        return (FIB_BFD_STATE_UP);
    case BFD_STATE_down:
    case BFD_STATE_admin_down:
    case BFD_STATE_init:
        return (FIB_BFD_STATE_DOWN);
    }
    return (FIB_BFD_STATE_DOWN);
}

static void
fib_bfd_update_walk (fib_node_index_t fei)
{
    /*
     * initiate a backwalk of dependent children
     * to notify of the state change of this entry.
     */
    fib_node_back_walk_ctx_t ctx = {
        .fnbw_reason = FIB_NODE_BW_REASON_FLAG_EVALUATE,
    };
    fib_walk_sync(FIB_NODE_TYPE_ENTRY, fei, &ctx);
}

/**
 * @brief Callback function registered with BFD module to receive notifications
 * of the CRUD of BFD sessions
 * would be static but for the fact it's called from the unit-tests
 */
void
fib_bfd_notify (bfd_listen_event_e event,
                const bfd_session_t *session)
{
    fib_entry_delegate_t *fed;
    const bfd_udp_key_t *key;
    fib_node_index_t fei;

    if (BFD_HOP_TYPE_MULTI != session->hop_type)
    {
        /*
         * multi-hop BFD sessions attach directly to the FIB entry
         * single-hop adj to the associate adjacency.
         */
        return;
    }

    key = &session->udp.key;

    fib_prefix_t pfx = {
        .fp_addr = key->peer_addr,
        .fp_proto = (ip46_address_is_ip4 (&key->peer_addr) ?
                     FIB_PROTOCOL_IP4:
                     FIB_PROTOCOL_IP6),
        .fp_len = (ip46_address_is_ip4 (&key->peer_addr) ?
                   32:
                   128),
    };

    /*
     * get the FIB entry
     */
    fei = fib_table_lookup_exact_match(key->fib_index, &pfx);

    switch (event)
    {
    case BFD_LISTEN_EVENT_CREATE:
        /*
         * The creation of a new session
         */
        if ((FIB_NODE_INDEX_INVALID != fei) &&
            (fed = fib_entry_delegate_find(fib_entry_get(fei),
                                           FIB_ENTRY_DELEGATE_BFD)))
        {
            /*
             * already got state for this entry
             */
        }
        else
        {
            /*
             * source and lock the entry. add the delegate
             */
            fei = fib_table_entry_special_add(key->fib_index,
                                              &pfx,
                                              FIB_SOURCE_RR,
                                              FIB_ENTRY_FLAG_NONE);
            fib_entry_lock(fei);

            fed = fib_entry_delegate_find_or_add(fib_entry_get(fei),
                                                 FIB_ENTRY_DELEGATE_BFD);

            /*
             * pretend the session is up and skip the walk.
             * If we set it down then we get traffic loss on new children.
             * if we walk then we lose traffic for existing children. Wait
             * for the first BFD UP/DOWN before we let the session's state
             * influence forwarding.
             */
            fed->fd_bfd_state = FIB_BFD_STATE_UP;
        }
        break;

    case BFD_LISTEN_EVENT_UPDATE:
        /*
         * state change up/dowm and
         */
        ASSERT(FIB_NODE_INDEX_INVALID != fei);

        fed = fib_entry_delegate_find(fib_entry_get(fei),
                                      FIB_ENTRY_DELEGATE_BFD);

        if (NULL != fed)
        {
            fed->fd_bfd_state = fib_bfd_bfd_state_to_fib(session->local_state);
            fib_bfd_update_walk(fei);
        }
        /*
         * else
         *   no BFD state
         */
        break;

    case BFD_LISTEN_EVENT_DELETE:
        /*
         * session has been removed.
         */
        if (FIB_NODE_INDEX_INVALID == fei)
        {
            /*
             * no FIB entry
             */
        }
        else if (fib_entry_delegate_find(fib_entry_get(fei),
                                         FIB_ENTRY_DELEGATE_BFD))
        {
            /*
             * has an associated BFD tracking delegate
             * usource the entry and remove the BFD tracking delegate
             */
            fib_entry_delegate_remove(fib_entry_get(fei),
                                      FIB_ENTRY_DELEGATE_BFD);
            fib_bfd_update_walk(fei);

            fib_table_entry_special_remove(key->fib_index,
                                           &pfx,
                                           FIB_SOURCE_RR);
            fib_entry_unlock(fei);
        }
        /*
         * else
         * no BFD associated state
         */
        break;
    }
}

static clib_error_t *
fib_bfd_main_init (vlib_main_t * vm)
{
    bfd_register_listener(fib_bfd_notify);

    return (NULL);
}

/* *INDENT-OFF* */
VLIB_INIT_FUNCTION (fib_bfd_main_init) =
{
    .runs_after = VLIB_INITS("bfd_main_init"),
};
/* *INDENT-ON* */
ass="n">is_async = va_arg (*args, int); if (is_async) { vec_foreach (e, cm->engines) { if (e->enqueue_handlers[id] && e->dequeue_handlers[id]) { s = format (s, "%U", format_vnet_crypto_engine, e - cm->engines); if (ei == e - cm->engines) s = format (s, "%c ", '*'); else s = format (s, " "); } } return s; } else { vec_foreach (e, cm->engines) { void * h = is_chained ? (void *) e->chained_ops_handlers[id] : (void *) e->ops_handlers[id]; if (h) { s = format (s, "%U", format_vnet_crypto_engine, e - cm->engines); if (ei == e - cm->engines) s = format (s, "%c ", '*'); else s = format (s, " "); } } return s; } } static u8 * format_vnet_crypto_handlers (u8 * s, va_list * args) { vnet_crypto_alg_t alg = va_arg (*args, vnet_crypto_alg_t); vnet_crypto_main_t *cm = &crypto_main; vnet_crypto_alg_data_t *d = vec_elt_at_index (cm->algs, alg); u32 indent = format_get_indent (s); int i, first = 1; for (i = 0; i < VNET_CRYPTO_OP_N_TYPES; i++) { vnet_crypto_op_data_t *od; vnet_crypto_op_id_t id = d->op_by_type[i]; if (id == 0) continue; od = cm->opt_data + id; if (first == 0) s = format (s, "\n%U", format_white_space, indent); s = format (s, "%-16U", format_vnet_crypto_op_type, od->type); s = format (s, "%-28U", format_vnet_crypto_engine_candidates, id, od->active_engine_index_simple, 0, 0); s = format (s, "%U", format_vnet_crypto_engine_candidates, id, od->active_engine_index_chained, 1, 0); first = 0; } return s; } static clib_error_t * show_crypto_handlers_command_fn (vlib_main_t * vm, unformat_input_t * input, vlib_cli_command_t * cmd) { unformat_input_t _line_input, *line_input = &_line_input; int i; if (unformat_user (input, unformat_line_input, line_input)) unformat_free (line_input); vlib_cli_output (vm, "%-16s%-16s%-28s%s", "Algo", "Type", "Simple", "Chained"); for (i = 0; i < VNET_CRYPTO_N_ALGS; i++) vlib_cli_output (vm, "%-16U%U", format_vnet_crypto_alg, i, format_vnet_crypto_handlers, i); return 0; } /* *INDENT-OFF* */ VLIB_CLI_COMMAND (show_crypto_handlers_command, static) = { .path = "show crypto handlers", .short_help = "show crypto handlers", .function = show_crypto_handlers_command_fn, }; /* *INDENT-ON* */ static clib_error_t * set_crypto_handler_command_fn (vlib_main_t * vm, unformat_input_t * input, vlib_cli_command_t * cmd) { unformat_input_t _line_input, *line_input = &_line_input; vnet_crypto_main_t *cm = &crypto_main; int rc = 0; char **args = 0, *s, **arg, *engine = 0; int all = 0; clib_error_t *error = 0; crypto_op_class_type_t oct = CRYPTO_OP_BOTH; if (!unformat_user (input, unformat_line_input, line_input)) return 0; while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT) { if (unformat (line_input, "all")) all = 1; else if (unformat (line_input, "simple")) oct = CRYPTO_OP_SIMPLE; else if (unformat (line_input, "chained")) oct = CRYPTO_OP_CHAINED; else if (unformat (line_input, "both")) oct = CRYPTO_OP_BOTH; else if (unformat (line_input, "%s", &s)) vec_add1 (args, s); else { error = clib_error_return (0, "invalid params"); goto done; } } if ((vec_len (args) < 2 && !all) || (vec_len (args) == 0 && all)) { error = clib_error_return (0, "missing cipher or engine!"); goto done; } engine = vec_elt_at_index (args, vec_len (args) - 1)[0]; vec_del1 (args, vec_len (args) - 1); if (all) { char *key; u8 *value; /* *INDENT-OFF* */ hash_foreach_mem (key, value, cm->alg_index_by_name, ({ (void) value; rc += vnet_crypto_set_handler2 (key, engine, oct); })); /* *INDENT-ON* */ if (rc) vlib_cli_output (vm, "failed to set crypto engine!"); } else { vec_foreach (arg, args) { rc = vnet_crypto_set_handler2 (arg[0], engine, oct); if (rc) { vlib_cli_output (vm, "failed to set engine %s for %s!", engine, arg[0]); } } } done: vec_free (engine); vec_foreach (arg, args) vec_free (arg[0]); vec_free (args); unformat_free (line_input); return error; } /* *INDENT-OFF* */ VLIB_CLI_COMMAND (set_crypto_handler_command, static) = { .path = "set crypto handler", .short_help = "set crypto handler cipher [cipher2 cipher3 ...] engine" " [simple|chained]", .function = set_crypto_handler_command_fn, }; /* *INDENT-ON* */ static u8 * format_vnet_crypto_async_handlers (u8 * s, va_list * args) { vnet_crypto_async_alg_t alg = va_arg (*args, vnet_crypto_async_alg_t); vnet_crypto_main_t *cm = &crypto_main; vnet_crypto_async_alg_data_t *d = vec_elt_at_index (cm->async_algs, alg); u32 indent = format_get_indent (s); int i, first = 1; for (i = 0; i < VNET_CRYPTO_ASYNC_OP_N_TYPES; i++) { vnet_crypto_async_op_data_t *od; vnet_crypto_async_op_id_t id = d->op_by_type[i]; if (id == 0) continue; od = cm->async_opt_data + id; if (first == 0) s = format (s, "\n%U", format_white_space, indent); s = format (s, "%-16U", format_vnet_crypto_async_op_type, od->type); s = format (s, "%U", format_vnet_crypto_engine_candidates, id, od->active_engine_index_async, 0, 1); first = 0; } return s; } static clib_error_t * show_crypto_async_handlers_command_fn (vlib_main_t * vm, unformat_input_t * input, vlib_cli_command_t * cmd) { unformat_input_t _line_input, *line_input = &_line_input; int i; if (unformat_user (input, unformat_line_input, line_input)) unformat_free (line_input); vlib_cli_output (vm, "%-28s%-16s%s", "Algo", "Type", "Handler"); for (i = 0; i < VNET_CRYPTO_N_ASYNC_ALGS; i++) vlib_cli_output (vm, "%-28U%U", format_vnet_crypto_async_alg, i, format_vnet_crypto_async_handlers, i); return 0; } /* *INDENT-OFF* */ VLIB_CLI_COMMAND (show_crypto_async_handlers_command, static) = { .path = "show crypto async handlers", .short_help = "show crypto async handlers", .function = show_crypto_async_handlers_command_fn, }; /* *INDENT-ON* */ static clib_error_t * show_crypto_async_status_command_fn (vlib_main_t * vm, unformat_input_t * input, vlib_cli_command_t * cmd) { vnet_crypto_main_t *cm = &crypto_main; u32 skip_master = vlib_num_workers () > 0; vlib_thread_main_t *tm = vlib_get_thread_main (); unformat_input_t _line_input, *line_input = &_line_input; int i; if (unformat_user (input, unformat_line_input, line_input)) unformat_free (line_input); vlib_cli_output (vm, "Crypto async dispatch mode: %s", cm->dispatch_mode == VNET_CRYPTO_ASYNC_DISPATCH_POLLING ? "POLLING" : "INTERRUPT"); for (i = skip_master; i < tm->n_vlib_mains; i++) { vlib_node_state_t state = vlib_node_get_state ( vlib_get_main_by_index (i), cm->crypto_node_index); if (state == VLIB_NODE_STATE_POLLING) vlib_cli_output (vm, "threadId: %-6d POLLING", i); if (state == VLIB_NODE_STATE_INTERRUPT) vlib_cli_output (vm, "threadId: %-6d INTERRUPT", i); if (state == VLIB_NODE_STATE_DISABLED) vlib_cli_output (vm, "threadId: %-6d DISABLED", i); } return 0; } /* *INDENT-OFF* */ VLIB_CLI_COMMAND (show_crypto_async_status_command, static) = { .path = "show crypto async status", .short_help = "show crypto async status", .function = show_crypto_async_status_command_fn, }; /* *INDENT-ON* */ static clib_error_t * set_crypto_async_handler_command_fn (vlib_main_t * vm, unformat_input_t * input, vlib_cli_command_t * cmd) { unformat_input_t _line_input, *line_input = &_line_input; vnet_crypto_main_t *cm = &crypto_main; int rc = 0; char **args = 0, *s, **arg, *engine = 0; int all = 0; clib_error_t *error = 0; if (!unformat_user (input, unformat_line_input, line_input)) return 0; while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT) { if (unformat (line_input, "all")) all = 1; else if (unformat (line_input, "%s", &s)) vec_add1 (args, s); else { error = clib_error_return (0, "invalid params"); goto done; } } if ((vec_len (args) < 2 && !all) || (vec_len (args) == 0 && all)) { error = clib_error_return (0, "missing cipher or engine!"); goto done; } engine = vec_elt_at_index (args, vec_len (args) - 1)[0]; vec_del1 (args, vec_len (args) - 1); if (all) { char *key; u8 *value; /* *INDENT-OFF* */ hash_foreach_mem (key, value, cm->async_alg_index_by_name, ({ (void) value; rc += vnet_crypto_set_async_handler2 (key, engine); })); /* *INDENT-ON* */ if (rc) vlib_cli_output (vm, "failed to set crypto engine!"); } else { vec_foreach (arg, args) { rc = vnet_crypto_set_async_handler2 (arg[0], engine); if (rc) { vlib_cli_output (vm, "failed to set engine %s for %s!", engine, arg[0]); } } } done: vec_free (engine); vec_foreach (arg, args) vec_free (arg[0]); vec_free (args); unformat_free (line_input); return error; } /* *INDENT-OFF* */ VLIB_CLI_COMMAND (set_crypto_async_handler_command, static) = { .path = "set crypto async handler", .short_help = "set crypto async handler type [type2 type3 ...] engine", .function = set_crypto_async_handler_command_fn, }; /* *INDENT-ON* */ static inline void print_crypto_async_dispatch_warning () { clib_warning ("Switching dispatch mode might not work is some situations."); clib_warning ("Use 'show crypto async status' to verify that the nodes' states were set"); clib_warning ("and if not, set 'crypto async dispatch' mode again."); } static clib_error_t * set_crypto_async_dispatch_polling_command_fn (vlib_main_t * vm, unformat_input_t * input, vlib_cli_command_t * cmd) { print_crypto_async_dispatch_warning (); vnet_crypto_set_async_dispatch_mode (VNET_CRYPTO_ASYNC_DISPATCH_POLLING); return 0; } static clib_error_t * set_crypto_async_dispatch_interrupt_command_fn (vlib_main_t * vm, unformat_input_t * input, vlib_cli_command_t * cmd) { print_crypto_async_dispatch_warning (); vnet_crypto_set_async_dispatch_mode (VNET_CRYPTO_ASYNC_DISPATCH_INTERRUPT); return 0; } /* *INDENT-OFF* */ VLIB_CLI_COMMAND (set_crypto_async_dispatch_polling_command, static) = { .path = "set crypto async dispatch polling", .short_help = "set crypto async dispatch polling|interrupt", .function = set_crypto_async_dispatch_polling_command_fn, }; VLIB_CLI_COMMAND (set_crypto_async_dispatch_interrupt_command, static) = { .path = "set crypto async dispatch interrupt", .short_help = "set crypto async dispatch polling|interrupt", .function = set_crypto_async_dispatch_interrupt_command_fn, }; /* * fd.io coding-style-patch-verification: ON * * Local Variables: * eval: (c-set-style "gnu") * End: */