blob: 756bc19fbefc69889d516b5a1d97f23cae7667ed [file] [log] [blame]
Neale Rannsdd4ccf22020-06-30 07:47:14 +00001/*
2 * ipsec_itf.c: IPSec dedicated interface type
3 *
4 * Copyright (c) 2020 Cisco and/or its affiliates.
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at:
8 *
9 * http://www.apache.org/licenses/LICENSE-2.0
10 *
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
16 */
17
18#include <vnet/ip/ip.h>
19#include <vnet/ipsec/ipsec_itf.h>
20#include <vnet/ipsec/ipsec_tun.h>
21#include <vnet/ipsec/ipsec.h>
22#include <vnet/adj/adj_midchain.h>
23
24/* bitmap of Allocated IPSEC_ITF instances */
25static uword *ipsec_itf_instances;
26
27/* pool of interfaces */
28static ipsec_itf_t *ipsec_itf_pool;
29
30static u32 *ipsec_itf_index_by_sw_if_index;
31
32static ipsec_itf_t *
33ipsec_itf_find_by_sw_if_index (u32 sw_if_index)
34{
35 if (vec_len (ipsec_itf_index_by_sw_if_index) <= sw_if_index)
36 return NULL;
37 u32 ti = ipsec_itf_index_by_sw_if_index[sw_if_index];
38 if (ti == ~0)
39 return NULL;
40 return pool_elt_at_index (ipsec_itf_pool, ti);
41}
42
43static u8 *
44format_ipsec_itf_name (u8 * s, va_list * args)
45{
46 u32 dev_instance = va_arg (*args, u32);
47 return format (s, "ipsec%d", dev_instance);
48}
49
50void
51ipsec_itf_adj_unstack (adj_index_t ai)
52{
53 adj_midchain_delegate_unstack (ai);
54}
55
56void
57ipsec_itf_adj_stack (adj_index_t ai, u32 sai)
58{
59 const vnet_hw_interface_t *hw;
60
61 hw = vnet_get_sup_hw_interface (vnet_get_main (), adj_get_sw_if_index (ai));
62
63 if (hw->flags & VNET_HW_INTERFACE_FLAG_LINK_UP)
64 {
65 const ipsec_sa_t *sa;
66
67 sa = ipsec_sa_get (sai);
68
69 /* *INDENT-OFF* */
70 const fib_prefix_t dst = {
71 .fp_len = (ipsec_sa_is_set_IS_TUNNEL_V6(sa) ? 128 : 32),
72 .fp_proto = (ipsec_sa_is_set_IS_TUNNEL_V6(sa)?
73 FIB_PROTOCOL_IP6 :
74 FIB_PROTOCOL_IP4),
75 .fp_addr = sa->tunnel_dst_addr,
76 };
77 /* *INDENT-ON* */
78
79 adj_midchain_delegate_stack (ai, 0, &dst);
80 }
81 else
82 adj_midchain_delegate_unstack (ai);
83}
84
85static adj_walk_rc_t
86ipsec_itf_adj_stack_cb (adj_index_t ai, void *arg)
87{
88 ipsec_tun_protect_t *itp = arg;
89
90 ipsec_itf_adj_stack (ai, itp->itp_out_sa);
91
92 return (ADJ_WALK_RC_CONTINUE);
93}
94
95static void
96ipsec_itf_restack (index_t itpi, const ipsec_itf_t * itf)
97{
98 ipsec_tun_protect_t *itp;
99 fib_protocol_t proto;
100
101 itp = ipsec_tun_protect_get (itpi);
102
103 /*
104 * walk all the adjacencies on the interface and restack them
105 */
106 FOR_EACH_FIB_IP_PROTOCOL (proto)
107 {
108 adj_nbr_walk (itf->ii_sw_if_index, proto, ipsec_itf_adj_stack_cb, itp);
109 }
110}
111
112static walk_rc_t
113ipsec_tun_protect_walk_state_change (index_t itpi, void *arg)
114{
115 const ipsec_itf_t *itf = arg;
116
117 ipsec_itf_restack (itpi, itf);
118
119 return (WALK_CONTINUE);
120}
121
122static clib_error_t *
123ipsec_itf_admin_up_down (vnet_main_t * vnm, u32 hw_if_index, u32 flags)
124{
125 vnet_hw_interface_t *hi;
126 ipsec_itf_t *itf;
127 u32 hw_flags;
128
129 hi = vnet_get_hw_interface (vnm, hw_if_index);
130 hw_flags = (flags & VNET_SW_INTERFACE_FLAG_ADMIN_UP ?
131 VNET_HW_INTERFACE_FLAG_LINK_UP : 0);
132 vnet_hw_interface_set_flags (vnm, hw_if_index, hw_flags);
133
134 itf = ipsec_itf_find_by_sw_if_index (hi->sw_if_index);
135
136 if (itf)
137 ipsec_tun_protect_walk_itf (itf->ii_sw_if_index,
138 ipsec_tun_protect_walk_state_change, itf);
139
140 return (NULL);
141}
142
143static int
144ipsec_itf_tunnel_desc (u32 sw_if_index,
145 ip46_address_t * src, ip46_address_t * dst, u8 * is_l2)
146{
147 ip46_address_reset (src);
148 ip46_address_reset (dst);
149 *is_l2 = 0;
150
151 return (0);
152}
153
154static u8 *
155ipsec_itf_build_rewrite (void)
156{
157 /*
158 * passing the adj code a NULL rewrite means 'i don't have one cos
159 * t'other end is unresolved'. That's not the case here. For the ipsec
160 * tunnel there are just no bytes of encap to apply in the adj.
161 * So return a zero length rewrite. Encap will be added by a tunnel mode SA.
162 */
163 u8 *rewrite = NULL;
164
165 vec_validate (rewrite, 0);
166 vec_reset_length (rewrite);
167
168 return (rewrite);
169}
170
171static u8 *
172ipsec_itf_build_rewrite_i (vnet_main_t * vnm,
173 u32 sw_if_index,
174 vnet_link_t link_type, const void *dst_address)
175{
176 return (ipsec_itf_build_rewrite ());
177}
178
179void
180ipsec_itf_update_adj (vnet_main_t * vnm, u32 sw_if_index, adj_index_t ai)
181{
182 adj_nbr_midchain_update_rewrite
183 (ai, NULL, NULL, ADJ_FLAG_MIDCHAIN_IP_STACK, ipsec_itf_build_rewrite ());
184}
185
186/* *INDENT-OFF* */
187VNET_DEVICE_CLASS (ipsec_itf_device_class) = {
188 .name = "IPSEC Tunnel",
189 .format_device_name = format_ipsec_itf_name,
190 .admin_up_down_function = ipsec_itf_admin_up_down,
191 .ip_tun_desc = ipsec_itf_tunnel_desc,
192};
193
194VNET_HW_INTERFACE_CLASS(ipsec_hw_interface_class) = {
195 .name = "IPSec",
196 .build_rewrite = ipsec_itf_build_rewrite_i,
197 .update_adjacency = ipsec_itf_update_adj,
198 .flags = VNET_HW_INTERFACE_CLASS_FLAG_P2P,
199};
200/* *INDENT-ON* */
201
202/*
203 * Maintain a bitmap of allocated ipsec_itf instance numbers.
204 */
205#define IPSEC_ITF_MAX_INSTANCE (16 * 1024)
206
207static u32
208ipsec_itf_instance_alloc (u32 want)
209{
210 /*
211 * Check for dynamically allocated instance number.
212 */
213 if (~0 == want)
214 {
215 u32 bit;
216
217 bit = clib_bitmap_first_clear (ipsec_itf_instances);
218 if (bit >= IPSEC_ITF_MAX_INSTANCE)
219 {
220 return ~0;
221 }
222 ipsec_itf_instances = clib_bitmap_set (ipsec_itf_instances, bit, 1);
223 return bit;
224 }
225
226 /*
227 * In range?
228 */
229 if (want >= IPSEC_ITF_MAX_INSTANCE)
230 {
231 return ~0;
232 }
233
234 /*
235 * Already in use?
236 */
237 if (clib_bitmap_get (ipsec_itf_instances, want))
238 {
239 return ~0;
240 }
241
242 /*
243 * Grant allocation request.
244 */
245 ipsec_itf_instances = clib_bitmap_set (ipsec_itf_instances, want, 1);
246
247 return want;
248}
249
250static int
251ipsec_itf_instance_free (u32 instance)
252{
253 if (instance >= IPSEC_ITF_MAX_INSTANCE)
254 {
255 return -1;
256 }
257
258 if (clib_bitmap_get (ipsec_itf_instances, instance) == 0)
259 {
260 return -1;
261 }
262
263 ipsec_itf_instances = clib_bitmap_set (ipsec_itf_instances, instance, 0);
264 return 0;
265}
266
267int
268ipsec_itf_create (u32 user_instance, tunnel_mode_t mode, u32 * sw_if_indexp)
269{
270 vnet_main_t *vnm = vnet_get_main ();
271 u32 instance, hw_if_index;
272 vnet_hw_interface_t *hi;
273 ipsec_itf_t *ipsec_itf;
274
275 ASSERT (sw_if_indexp);
276
277 *sw_if_indexp = (u32) ~ 0;
278
279 if (mode != TUNNEL_MODE_P2P)
280 return VNET_API_ERROR_UNSUPPORTED;
281
282 /*
283 * Allocate a ipsec_itf instance. Either select on dynamically
284 * or try to use the desired user_instance number.
285 */
286 instance = ipsec_itf_instance_alloc (user_instance);
287 if (instance == ~0)
288 return VNET_API_ERROR_INVALID_REGISTRATION;
289
290 pool_get (ipsec_itf_pool, ipsec_itf);
291
292 /* tunnel index (or instance) */
293 u32 t_idx = ipsec_itf - ipsec_itf_pool;
294
295 ipsec_itf->ii_mode = mode;
296 ipsec_itf->ii_user_instance = instance;
297 if (~0 == ipsec_itf->ii_user_instance)
298 ipsec_itf->ii_user_instance = t_idx;
299
300 hw_if_index = vnet_register_interface (vnm,
301 ipsec_itf_device_class.index,
302 t_idx,
303 ipsec_hw_interface_class.index,
304 t_idx);
305
306 hi = vnet_get_hw_interface (vnm, hw_if_index);
307
308 vec_validate_init_empty (ipsec_itf_index_by_sw_if_index, hi->sw_if_index,
309 INDEX_INVALID);
310 ipsec_itf_index_by_sw_if_index[hi->sw_if_index] = t_idx;
311
312 ipsec_itf->ii_sw_if_index = *sw_if_indexp = hi->sw_if_index;
313
314 return 0;
315}
316
317int
318ipsec_itf_delete (u32 sw_if_index)
319{
320 vnet_main_t *vnm = vnet_get_main ();
321
322 if (pool_is_free_index (vnm->interface_main.sw_interfaces, sw_if_index))
323 return VNET_API_ERROR_INVALID_SW_IF_INDEX;
324
325 vnet_hw_interface_t *hw = vnet_get_sup_hw_interface (vnm, sw_if_index);
326 if (hw == 0 || hw->dev_class_index != ipsec_itf_device_class.index)
327 return VNET_API_ERROR_INVALID_SW_IF_INDEX;
328
329 ipsec_itf_t *ipsec_itf;
330 ipsec_itf = ipsec_itf_find_by_sw_if_index (sw_if_index);
331 if (NULL == ipsec_itf)
332 return VNET_API_ERROR_INVALID_SW_IF_INDEX;
333
334 if (ipsec_itf_instance_free (hw->dev_instance) < 0)
335 return VNET_API_ERROR_INVALID_SW_IF_INDEX;
336
337 vnet_delete_hw_interface (vnm, hw->hw_if_index);
338 pool_put (ipsec_itf_pool, ipsec_itf);
339
340 return 0;
341}
342
343static clib_error_t *
344ipsec_itf_create_cli (vlib_main_t * vm,
345 unformat_input_t * input, vlib_cli_command_t * cmd)
346{
347 unformat_input_t _line_input, *line_input = &_line_input;
348 u32 instance, sw_if_index;
349 clib_error_t *error;
350 mac_address_t mac;
351 int rv;
352
353 error = NULL;
354 instance = sw_if_index = ~0;
355 mac_address_set_zero (&mac);
356
357 if (unformat_user (input, unformat_line_input, line_input))
358 {
359 while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
360 {
361 if (unformat (line_input, "instance %d", &instance))
362 ;
363 else
364 {
365 error = clib_error_return (0, "unknown input: %U",
366 format_unformat_error, line_input);
367 break;
368 }
369 }
370
371 unformat_free (line_input);
372
373 if (error)
374 return error;
375 }
376
377 rv = ipsec_itf_create (instance, TUNNEL_MODE_P2P, &sw_if_index);
378
379 if (rv)
380 return clib_error_return (0, "iPSec interface create failed");
381
382 vlib_cli_output (vm, "%U\n", format_vnet_sw_if_index_name, vnet_get_main (),
383 sw_if_index);
384 return 0;
385}
386
387/*?
388 * Create a IPSec interface.
389 *
390 * @cliexpar
391 * The following two command syntaxes are equivalent:
392 * @cliexcmd{ipsec itf create [instance <instance>]}
393 * Example of how to create a ipsec interface:
394 * @cliexcmd{ipsec itf create}
395?*/
396/* *INDENT-OFF* */
397VLIB_CLI_COMMAND (ipsec_itf_create_command, static) = {
398 .path = "ipsec itf create",
399 .short_help = "ipsec itf create [instance <instance>]",
400 .function = ipsec_itf_create_cli,
401};
402/* *INDENT-ON* */
403
404static clib_error_t *
405ipsec_itf_delete_cli (vlib_main_t * vm,
406 unformat_input_t * input, vlib_cli_command_t * cmd)
407{
408 vnet_main_t *vnm;
409 u32 sw_if_index;
410 int rv;
411
412 vnm = vnet_get_main ();
413 sw_if_index = ~0;
414
415 while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT)
416 {
417 if (unformat
418 (input, "%U", unformat_vnet_sw_interface, vnm, &sw_if_index))
419 ;
420 else
421 break;
422 }
423
424 if (~0 != sw_if_index)
425 {
426 rv = ipsec_itf_delete (sw_if_index);
427
428 if (rv)
429 return clib_error_return (0, "ipsec interface delete failed");
430 }
431 else
432 return clib_error_return (0, "no such interface: %U",
433 format_unformat_error, input);
434
435 return 0;
436}
437
438/*?
439 * Delete a IPSEC_ITF interface.
440 *
441 * @cliexpar
442 * The following two command syntaxes are equivalent:
443 * @cliexcmd{ipsec itf delete <interface>}
444 * Example of how to create a ipsec_itf interface:
445 * @cliexcmd{ipsec itf delete ipsec0}
446?*/
447/* *INDENT-OFF* */
448VLIB_CLI_COMMAND (ipsec_itf_delete_command, static) = {
449 .path = "ipsec itf delete",
450 .short_help = "ipsec itf delete <interface>",
451 .function = ipsec_itf_delete_cli,
452};
453/* *INDENT-ON* */
454
455
456/*
457 * fd.io coding-style-patch-verification: ON
458 *
459 * Local Variables:
460 * eval: (c-set-style "gnu")
461 * End:
462 */