summaryrefslogtreecommitdiffstats
path: root/src/vppinfra/socket.h
blob: c4f0b87e3e1847e9fa6ed8773c1b54c59e912db0 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
/*
 * Copyright (c) 2015 Cisco and/or its affiliates.
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at:
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
/*
  Copyright (c) 2001, 2002, 2003 Eliot Dresselhaus

  Permission is hereby granted, free of charge, to any person obtaining
  a copy of this software and associated documentation files (the
  "Software"), to deal in the Software without restriction, including
  without limitation the rights to use, copy, modify, merge, publish,
  distribute, sublicense, and/or sell copies of the Software, and to
  permit persons to whom the Software is furnished to do so, subject to
  the following conditions:

  The above copyright notice and this permission notice shall be
  included in all copies or substantial portions of the Software.

  THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
  EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
  MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
  NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
  LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
  OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
  WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
*/

#ifndef _clib_included_socket_h
#define _clib_included_socket_h

#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#ifdef __FreeBSD__
#include <errno.h>
#define EBADFD EBADF
#endif /* __FreeBSD__ */

#include <vppinfra/clib.h>
#include <vppinfra/error.h>
#include <vppinfra/format.h>

typedef enum
{
  CLIB_SOCKET_TYPE_UNKNOWN = 0,
  CLIB_SOCKET_TYPE_INET,
  CLIB_SOCKET_TYPE_UNIX,
#if CLIB_LINUX
  CLIB_SOCKET_TYPE_LINUX_ABSTRACT,
#endif
} clib_socket_type_t;

typedef struct _socket_t
{
  /* File descriptor. */
  i32 fd;

  /* Config string for socket HOST:PORT or just HOST. */
  char *config;

  union
  {
    struct
    {
      u32 is_server : 1;
      u32 rx_end_of_file : 1;
      u32 non_blocking_connect : 1;
      u32 allow_group_write : 1;
      u32 is_seqpacket : 1;
      u32 passcred : 1;
      u32 is_blocking : 1;
      u32 local_only : 1;
    };
    u32 flags;
  };

  /* Transmit buffer.  Holds data waiting to be written. */
  u8 *tx_buffer;

  /* Receive buffer.  Holds data read from socket. */
  u8 *rx_buffer;

  /* Peer socket we are connected to. */
  struct sockaddr_in peer;

  /* Credentials, populated if CLIB_SOCKET_F_PASSCRED is set */
  pid_t pid;
  uid_t uid;
  gid_t gid;

  clib_error_t *(*write_func) (struct _socket_t * sock);
  clib_error_t *(*read_func) (struct _socket_t * sock, int min_bytes);
  clib_error_t *(*close_func) (struct _socket_t * sock);
  clib_error_t *(*recvmsg_func) (struct _socket_t * s, void *msg, int msglen,
				 int fds[], int num_fds);
  clib_error_t *(*sendmsg_func) (struct _socket_t * s, void *msg, int msglen,
				 int fds[], int num_fds);
  clib_socket_type_t type;
  uword private_data;
} clib_socket_t;

#define CLIB_SOCKET_FLAG(f)		(((clib_socket_t){ .f = 1 }).flags)
#define CLIB_SOCKET_F_IS_CLIENT		0
#define CLIB_SOCKET_F_IS_SERVER		CLIB_SOCKET_FLAG (is_server)
#define CLIB_SOCKET_F_ALLOW_GROUP_WRITE CLIB_SOCKET_FLAG (allow_group_write)
#define CLIB_SOCKET_F_SEQPACKET		CLIB_SOCKET_FLAG (is_seqpacket)
#define CLIB_SOCKET_F_PASSCRED		CLIB_SOCKET_FLAG (passcred)
#define CLIB_SOCKET_F_BLOCKING		CLIB_SOCKET_FLAG (is_blocking)

/* socket config format is host:port.
   Unspecified port causes a free one to be chosen starting
   from IPPORT_USERRESERVED (5000). */
clib_error_t *clib_socket_init (clib_socket_t * socket);

clib_error_t *clib_socket_accept (clib_socket_t * server,
				  clib_socket_t * client);

int clib_socket_prefix_is_valid (char *s);
int clib_socket_prefix_get_type (char *s);

always_inline uword
clib_socket_is_server (clib_socket_t * sock)
{
  return sock->is_server;
}

always_inline uword
clib_socket_is_client (clib_socket_t * s)
{
  return !clib_socket_is_server (s);
}

always_inline uword
clib_socket_is_connected (clib_socket_t * sock)
{
  return sock->fd > 0;
}


always_inline int
clib_socket_rx_end_of_file (clib_socket_t * s)
{
  return s->rx_end_of_file;
}

always_inline void *
clib_socket_tx_add (clib_socket_t * s, int n_bytes)
{
  u8 *result;
  vec_add2 (s->tx_buffer, result, n_bytes);
  return result;
}

always_inline void
clib_socket_tx_add_va_formatted (clib_socket_t * s, char *fmt, va_list * va)
{
  s->tx_buffer = va_format (s->tx_buffer, fmt, va);
}

always_inline clib_error_t *
clib_socket_tx (clib_socket_t * s)
{
  return s->write_func (s);
}

always_inline clib_error_t *
clib_socket_rx (clib_socket_t * s, int n_bytes)
{
  return s->read_func (s, n_bytes);
}

always_inline clib_error_t *
clib_socket_sendmsg (clib_socket_t * s, void *msg, int msglen,
		     int fds[], int num_fds)
{
  return s->sendmsg_func (s, msg, msglen, fds, num_fds);
}

always_inline clib_error_t *
clib_socket_recvmsg (clib_socket_t * s, void *msg, int msglen,
		     int fds[], int num_fds)
{
  return s->recvmsg_func (s, msg, msglen, fds, num_fds);
}

always_inline void
clib_socket_free (clib_socket_t * s)
{
  vec_free (s->tx_buffer);
  vec_free (s->rx_buffer);
  if (clib_mem_is_heap_object (s->config))
    vec_free (s->config);
  clib_memset (s, 0, sizeof (s[0]));
}

always_inline clib_error_t *
clib_socket_close (clib_socket_t * sock)
{
  clib_error_t *err;
  err = (*sock->close_func) (sock);
  return err;
}

void clib_socket_tx_add_formatted (clib_socket_t * s, char *fmt, ...);

#endif /* _clib_included_socket_h */

/*
 * fd.io coding-style-patch-verification: ON
 *
 * Local Variables:
 * eval: (c-set-style "gnu")
 * End:
 */
self.logger.info("Failed to create subif %d %s" % ( i, macs[i-1])) raise intfs = self.vapi.cli("show interface").split("\n") count = 0 for intf in intfs: if intf.startswith('pg2.'): count += 1 self.assertEqual(count, clients) self.logger.info("FFP_TEST_FINISH_0001") class P2PEthernetIPV6(VppTestCase): """P2P Ethernet IPv6 tests""" p2p_sub_ifs = [] packets = [] @classmethod def setUpClass(cls): super(P2PEthernetIPV6, cls).setUpClass() # Create pg interfaces cls.create_pg_interfaces(range(3)) # Packet sizes cls.pg_if_packet_sizes = [64, 512, 1518, 9018] # Set up all interfaces for i in cls.pg_interfaces: i.admin_up() cls.pg0.generate_remote_hosts(3) cls.pg0.configure_ipv6_neighbors() cls.pg1.config_ip6() cls.pg1.generate_remote_hosts(3) cls.pg1.configure_ipv6_neighbors() cls.pg1.disable_ipv6_ra() def setUp(self): super(P2PEthernetIPV6, self).setUp() for p in self.packets: self.packets.remove(p) self.p2p_sub_ifs.append( self.create_p2p_ethernet(self.pg0, 1, self.pg0._remote_hosts[0].mac)) self.p2p_sub_ifs.append( self.create_p2p_ethernet(self.pg0, 2, self.pg0._remote_hosts[1].mac)) self.vapi.cli("trace add p2p-ethernet-input 50") def tearDown(self): while len(self.p2p_sub_ifs): p2p = self.p2p_sub_ifs.pop() self.delete_p2p_ethernet(p2p) super(P2PEthernetIPV6, self).tearDown() def create_p2p_ethernet(self, parent_if, sub_id, remote_mac): p2p = VppP2PSubint(self, parent_if, sub_id, mactobinary(remote_mac)) p2p.admin_up() p2p.config_ip6() p2p.disable_ipv6_ra() return p2p def delete_p2p_ethernet(self, p2p): p2p.unconfig_ip6() p2p.admin_down() self.vapi.delete_p2pethernet_subif(p2p.parent.sw_if_index, p2p.p2p_remote_mac) def create_stream(self, src_mac=None, dst_mac=None, src_ip=None, dst_ip=None, size=None): pkt_size = size if size is None: pkt_size = random.choice(self.pg_if_packet_sizes) p = Ether(src=src_mac, dst=dst_mac) p /= IPv6(src=src_ip, dst=dst_ip) p /= (UDP(sport=1234, dport=4321) / Raw('\xa5' * 20)) self.extend_packet(p, pkt_size) return p def send_packets(self, src_if=None, dst_if=None, packets=None, count=None): self.pg_enable_capture([dst_if]) if packets is None: packets = self.packets src_if.add_stream(packets) self.pg_start() if count is None: count = len(packets) return dst_if.get_capture(count) def test_no_p2p_subif(self): """standard routing without p2p subinterfaces""" self.logger.info("FFP_TEST_START_0001") route_8000 = VppIpRoute(self, "8000::", 64, [VppRoutePath(self.pg0.remote_ip6, self.pg0.sw_if_index, proto=DpoProto.DPO_PROTO_IP6)], is_ip6=1) route_8000.add_vpp_config() self.packets = [(Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac) / IPv6(src="3001::1", dst="8000::100") / UDP(sport=1234, dport=1234) / Raw('\xa5' * 100))] self.send_packets(self.pg1, self.pg0) self.logger.info("FFP_TEST_FINISH_0001") def test_ip6_rx_p2p_subif(self): """receive ipv6 packet via p2p subinterface""" self.logger.info("FFP_TEST_START_0002") route_9001 = VppIpRoute(self, "9001::", 64, [VppRoutePath(self.pg1.remote_ip6, self.pg1.sw_if_index, proto=DpoProto.DPO_PROTO_IP6)], is_ip6=1) route_9001.add_vpp_config() self.packets.append( self.create_stream(src_mac=self.pg0._remote_hosts[0].mac, dst_mac=self.pg0.local_mac, src_ip=self.p2p_sub_ifs[0].remote_ip6, dst_ip="9001::100")) self.send_packets(self.pg0, self.pg1, self.packets) self.assert_packet_counter_equal('p2p-ethernet-input', 1) route_9001.remove_vpp_config() self.logger.info("FFP_TEST_FINISH_0002") def test_ip6_rx_p2p_subif_route(self): """route rx ip6 packet not matching p2p subinterface""" self.logger.info("FFP_TEST_START_0003") self.pg0.config_ip6() route_3 = VppIpRoute(self, "9000::", 64, [VppRoutePath(self.pg1._remote_hosts[0].ip6, self.pg1.sw_if_index, proto=DpoProto.DPO_PROTO_IP6)], is_ip6=1) route_3.add_vpp_config() self.packets.append( self.create_stream(src_mac="02:03:00:00:ff:ff", dst_mac=self.pg0.local_mac, src_ip="a000::100", dst_ip="9000::100")) self.send_packets(self.pg0, self.pg1) self.pg0.unconfig_ip6() route_3.remove_vpp_config() self.logger.info("FFP_TEST_FINISH_0003") def test_ip6_rx_p2p_subif_drop(self): """drop rx packet not matching p2p subinterface""" self.logger.info("FFP_TEST_START_0004") route_9001 = VppIpRoute(self, "9000::", 64, [VppRoutePath(self.pg1._remote_hosts[0].ip6, self.pg1.sw_if_index, proto=DpoProto.DPO_PROTO_IP6)], is_ip6=1) route_9001.add_vpp_config() self.packets.append( self.create_stream(src_mac="02:03:00:00:ff:ff", dst_mac=self.pg0.local_mac, src_ip="a000::100", dst_ip="9000::100")) # no packet received self.send_packets(self.pg0, self.pg1, count=0) self.logger.info("FFP_TEST_FINISH_0004") def test_ip6_tx_p2p_subif(self): """send packet via p2p subinterface""" self.logger.info("FFP_TEST_START_0005") route_8000 = VppIpRoute(self, "8000::", 64, [VppRoutePath(self.pg0.remote_ip6, self.pg0.sw_if_index, proto=DpoProto.DPO_PROTO_IP6)], is_ip6=1) route_8000.add_vpp_config() route_8001 = VppIpRoute(self, "8001::", 64, [VppRoutePath(self.p2p_sub_ifs[0].remote_ip6, self.p2p_sub_ifs[0].sw_if_index, proto=DpoProto.DPO_PROTO_IP6)], is_ip6=1) route_8001.add_vpp_config() route_8002 = VppIpRoute(self, "8002::", 64, [VppRoutePath(self.p2p_sub_ifs[1].remote_ip6, self.p2p_sub_ifs[1].sw_if_index, proto=DpoProto.DPO_PROTO_IP6)], is_ip6=1) route_8002.add_vpp_config() for i in range(0, 3): self.packets.append( self.create_stream(src_mac=self.pg1.remote_mac, dst_mac=self.pg1.local_mac, src_ip=self.pg1.remote_ip6, dst_ip="800%d::100" % i)) self.send_packets(self.pg1, self.pg0, count=3) route_8000.remove_vpp_config() route_8001.remove_vpp_config() route_8002.remove_vpp_config() self.logger.info("FFP_TEST_FINISH_0005") def test_ip6_tx_p2p_subif_drop(self): """drop tx ip6 packet not matching p2p subinterface""" self.logger.info("FFP_TEST_START_0006") self.packets.append( self.create_stream(src_mac="02:03:00:00:ff:ff", dst_mac=self.pg0.local_mac, src_ip="a000::100", dst_ip="9000::100")) # no packet received self.send_packets(self.pg0, self.pg1, count=0) self.logger.info("FFP_TEST_FINISH_0006") class P2PEthernetIPV4(VppTestCase): """P2P Ethernet IPv4 tests""" p2p_sub_ifs = [] packets = [] @classmethod def setUpClass(cls): super(P2PEthernetIPV4, cls).setUpClass() # Create pg interfaces cls.create_pg_interfaces(range(3)) # Packet sizes cls.pg_if_packet_sizes = [64, 512, 1518, 9018] # Set up all interfaces for i in cls.pg_interfaces: i.admin_up() cls.pg0.config_ip4() cls.pg0.generate_remote_hosts(5) cls.pg0.configure_ipv4_neighbors() cls.pg1.config_ip4() cls.pg1.generate_remote_hosts(5) cls.pg1.configure_ipv4_neighbors() def setUp(self): super(P2PEthernetIPV4, self).setUp() for p in self.packets: self.packets.remove(p) self.p2p_sub_ifs.append( self.create_p2p_ethernet(self.pg0, 1, self.pg0._remote_hosts[0].mac)) self.p2p_sub_ifs.append( self.create_p2p_ethernet(self.pg0, 2, self.pg0._remote_hosts[1].mac)) self.vapi.cli("trace add p2p-ethernet-input 50") def tearDown(self): while len(self.p2p_sub_ifs): p2p = self.p2p_sub_ifs.pop() self.delete_p2p_ethernet(p2p) super(P2PEthernetIPV4, self).tearDown() def create_stream(self, src_mac=None, dst_mac=None, src_ip=None, dst_ip=None, size=None): pkt_size = size if size is None: pkt_size = random.choice(self.pg_if_packet_sizes) p = Ether(src=src_mac, dst=dst_mac) p /= IP(src=src_ip, dst=dst_ip) p /= (UDP(sport=1234, dport=4321) / Raw('\xa5' * 20)) self.extend_packet(p, pkt_size) return p def send_packets(self, src_if=None, dst_if=None, packets=None, count=None): self.pg_enable_capture([dst_if]) if packets is None: packets = self.packets src_if.add_stream(packets) self.pg_start() if count is None: count = len(packets) return dst_if.get_capture(count) def create_p2p_ethernet(self, parent_if, sub_id, remote_mac): p2p = VppP2PSubint(self, parent_if, sub_id, mactobinary(remote_mac)) p2p.admin_up() p2p.config_ip4() return p2p def delete_p2p_ethernet(self, p2p): p2p.unconfig_ip4() p2p.admin_down() self.vapi.delete_p2pethernet_subif(p2p.parent.sw_if_index, p2p.p2p_remote_mac) def test_ip4_rx_p2p_subif(self): """receive ipv4 packet via p2p subinterface""" self.logger.info("FFP_TEST_START_0002") route_9000 = VppIpRoute(self, "9.0.0.0", 16, [VppRoutePath(self.pg1.remote_ip4, self.pg1.sw_if_index)]) route_9000.add_vpp_config() self.packets.append( self.create_stream(src_mac=self.pg0._remote_hosts[0].mac, dst_mac=self.pg0.local_mac, src_ip=self.p2p_sub_ifs[0].remote_ip4, dst_ip="9.0.0.100")) self.send_packets(self.pg0, self.pg1, self.packets) self.assert_packet_counter_equal('p2p-ethernet-input', 1) route_9000.remove_vpp_config() self.logger.info("FFP_TEST_FINISH_0002") def test_ip4_rx_p2p_subif_route(self): """route rx packet not matching p2p subinterface""" self.logger.info("FFP_TEST_START_0003") route_9001 = VppIpRoute(self, "9.0.0.0", 24, [VppRoutePath(self.pg1.remote_ip4, self.pg1.sw_if_index)]) route_9001.add_vpp_config() self.packets.append( self.create_stream(src_mac="02:01:00:00:ff:ff", dst_mac=self.pg0.local_mac, src_ip="8.0.0.100", dst_ip="9.0.0.100")) self.send_packets(self.pg0, self.pg1) route_9001.remove_vpp_config() self.logger.info("FFP_TEST_FINISH_0003") def test_ip4_tx_p2p_subif(self): """send ip4 packet via p2p subinterface""" self.logger.info("FFP_TEST_START_0005") route_9100 = VppIpRoute(self, "9.1.0.100", 24, [VppRoutePath(self.pg0.remote_ip4, self.pg0.sw_if_index, )]) route_9100.add_vpp_config() route_9200 = VppIpRoute(self, "9.2.0.100", 24, [VppRoutePath(self.p2p_sub_ifs[0].remote_ip4, self.p2p_sub_ifs[0].sw_if_index, )]) route_9200.add_vpp_config() route_9300 = VppIpRoute(self, "9.3.0.100", 24, [VppRoutePath(self.p2p_sub_ifs[1].remote_ip4, self.p2p_sub_ifs[1].sw_if_index )]) route_9300.add_vpp_config() for i in range(0, 3): self.packets.append( self.create_stream(src_mac=self.pg1.remote_mac, dst_mac=self.pg1.local_mac, src_ip=self.pg1.remote_ip4, dst_ip="9.%d.0.100" % (i+1))) self.send_packets(self.pg1, self.pg0) # route_7000.remove_vpp_config() route_9100.remove_vpp_config() route_9200.remove_vpp_config() route_9300.remove_vpp_config() self.logger.info("FFP_TEST_FINISH_0005") def test_ip4_tx_p2p_subif_drop(self): """drop tx ip4 packet not matching p2p subinterface""" self.logger.info("FFP_TEST_START_0006") self.packets.append( self.create_stream(src_mac="02:01:00:00:ff:ff", dst_mac=self.pg0.local_mac, src_ip="8.0.0.100", dst_ip="9.0.0.100")) # no packet received self.send_packets(self.pg0, self.pg1, count=0) self.logger.info("FFP_TEST_FINISH_0006") if __name__ == '__main__': unittest.main(testRunner=VppTestRunner)