blob: 4a0f9e7bb6cd3b4f356bc9fe6288f3aaf8fc986c [file] [log] [blame]
Neale Rannsdd4ccf22020-06-30 07:47:14 +00001/*
2 * ipsec_itf.c: IPSec dedicated interface type
3 *
4 * Copyright (c) 2020 Cisco and/or its affiliates.
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at:
8 *
9 * http://www.apache.org/licenses/LICENSE-2.0
10 *
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
16 */
17
18#include <vnet/ip/ip.h>
19#include <vnet/ipsec/ipsec_itf.h>
20#include <vnet/ipsec/ipsec_tun.h>
21#include <vnet/ipsec/ipsec.h>
22#include <vnet/adj/adj_midchain.h>
Neale Rannse4031132020-10-26 13:00:06 +000023#include <vnet/ethernet/mac_address.h>
Neale Rannsdd4ccf22020-06-30 07:47:14 +000024
25/* bitmap of Allocated IPSEC_ITF instances */
26static uword *ipsec_itf_instances;
27
28/* pool of interfaces */
29static ipsec_itf_t *ipsec_itf_pool;
30
31static u32 *ipsec_itf_index_by_sw_if_index;
32
Neale Ranns6ba4e412020-10-19 09:59:41 +000033ipsec_itf_t *
34ipsec_itf_get (index_t ii)
35{
36 return (pool_elt_at_index (ipsec_itf_pool, ii));
37}
38
Neale Rannsdd4ccf22020-06-30 07:47:14 +000039static ipsec_itf_t *
40ipsec_itf_find_by_sw_if_index (u32 sw_if_index)
41{
42 if (vec_len (ipsec_itf_index_by_sw_if_index) <= sw_if_index)
43 return NULL;
44 u32 ti = ipsec_itf_index_by_sw_if_index[sw_if_index];
45 if (ti == ~0)
46 return NULL;
47 return pool_elt_at_index (ipsec_itf_pool, ti);
48}
49
50static u8 *
51format_ipsec_itf_name (u8 * s, va_list * args)
52{
53 u32 dev_instance = va_arg (*args, u32);
54 return format (s, "ipsec%d", dev_instance);
55}
56
57void
58ipsec_itf_adj_unstack (adj_index_t ai)
59{
60 adj_midchain_delegate_unstack (ai);
61}
62
63void
64ipsec_itf_adj_stack (adj_index_t ai, u32 sai)
65{
66 const vnet_hw_interface_t *hw;
67
68 hw = vnet_get_sup_hw_interface (vnet_get_main (), adj_get_sw_if_index (ai));
69
70 if (hw->flags & VNET_HW_INTERFACE_FLAG_LINK_UP)
71 {
72 const ipsec_sa_t *sa;
73
74 sa = ipsec_sa_get (sai);
Matthew Smith751bb132021-02-08 22:13:59 +000075
76 /* *INDENT-OFF* */
77 const fib_prefix_t dst = {
78 .fp_len = (ipsec_sa_is_set_IS_TUNNEL_V6(sa) ? 128 : 32),
79 .fp_proto = (ipsec_sa_is_set_IS_TUNNEL_V6(sa)?
80 FIB_PROTOCOL_IP6 :
81 FIB_PROTOCOL_IP4),
82 .fp_addr = sa->tunnel_dst_addr,
83 };
84 /* *INDENT-ON* */
85
86 adj_midchain_delegate_stack (ai, sa->tx_fib_index, &dst);
Neale Rannsdd4ccf22020-06-30 07:47:14 +000087 }
88 else
89 adj_midchain_delegate_unstack (ai);
90}
91
92static adj_walk_rc_t
93ipsec_itf_adj_stack_cb (adj_index_t ai, void *arg)
94{
95 ipsec_tun_protect_t *itp = arg;
96
97 ipsec_itf_adj_stack (ai, itp->itp_out_sa);
98
99 return (ADJ_WALK_RC_CONTINUE);
100}
101
102static void
103ipsec_itf_restack (index_t itpi, const ipsec_itf_t * itf)
104{
105 ipsec_tun_protect_t *itp;
106 fib_protocol_t proto;
107
108 itp = ipsec_tun_protect_get (itpi);
109
110 /*
111 * walk all the adjacencies on the interface and restack them
112 */
113 FOR_EACH_FIB_IP_PROTOCOL (proto)
114 {
115 adj_nbr_walk (itf->ii_sw_if_index, proto, ipsec_itf_adj_stack_cb, itp);
116 }
117}
118
119static walk_rc_t
120ipsec_tun_protect_walk_state_change (index_t itpi, void *arg)
121{
122 const ipsec_itf_t *itf = arg;
123
124 ipsec_itf_restack (itpi, itf);
125
126 return (WALK_CONTINUE);
127}
128
129static clib_error_t *
130ipsec_itf_admin_up_down (vnet_main_t * vnm, u32 hw_if_index, u32 flags)
131{
132 vnet_hw_interface_t *hi;
133 ipsec_itf_t *itf;
134 u32 hw_flags;
135
136 hi = vnet_get_hw_interface (vnm, hw_if_index);
137 hw_flags = (flags & VNET_SW_INTERFACE_FLAG_ADMIN_UP ?
138 VNET_HW_INTERFACE_FLAG_LINK_UP : 0);
139 vnet_hw_interface_set_flags (vnm, hw_if_index, hw_flags);
140
141 itf = ipsec_itf_find_by_sw_if_index (hi->sw_if_index);
142
143 if (itf)
144 ipsec_tun_protect_walk_itf (itf->ii_sw_if_index,
145 ipsec_tun_protect_walk_state_change, itf);
146
147 return (NULL);
148}
149
150static int
151ipsec_itf_tunnel_desc (u32 sw_if_index,
152 ip46_address_t * src, ip46_address_t * dst, u8 * is_l2)
153{
154 ip46_address_reset (src);
155 ip46_address_reset (dst);
156 *is_l2 = 0;
157
158 return (0);
159}
160
161static u8 *
162ipsec_itf_build_rewrite (void)
163{
164 /*
165 * passing the adj code a NULL rewrite means 'i don't have one cos
166 * t'other end is unresolved'. That's not the case here. For the ipsec
167 * tunnel there are just no bytes of encap to apply in the adj.
168 * So return a zero length rewrite. Encap will be added by a tunnel mode SA.
169 */
170 u8 *rewrite = NULL;
171
172 vec_validate (rewrite, 0);
173 vec_reset_length (rewrite);
174
175 return (rewrite);
176}
177
178static u8 *
179ipsec_itf_build_rewrite_i (vnet_main_t * vnm,
180 u32 sw_if_index,
181 vnet_link_t link_type, const void *dst_address)
182{
183 return (ipsec_itf_build_rewrite ());
184}
185
186void
187ipsec_itf_update_adj (vnet_main_t * vnm, u32 sw_if_index, adj_index_t ai)
188{
189 adj_nbr_midchain_update_rewrite
190 (ai, NULL, NULL, ADJ_FLAG_MIDCHAIN_IP_STACK, ipsec_itf_build_rewrite ());
191}
192
193/* *INDENT-OFF* */
194VNET_DEVICE_CLASS (ipsec_itf_device_class) = {
195 .name = "IPSEC Tunnel",
196 .format_device_name = format_ipsec_itf_name,
197 .admin_up_down_function = ipsec_itf_admin_up_down,
198 .ip_tun_desc = ipsec_itf_tunnel_desc,
199};
200
201VNET_HW_INTERFACE_CLASS(ipsec_hw_interface_class) = {
202 .name = "IPSec",
203 .build_rewrite = ipsec_itf_build_rewrite_i,
204 .update_adjacency = ipsec_itf_update_adj,
205 .flags = VNET_HW_INTERFACE_CLASS_FLAG_P2P,
206};
Neale Ranns6ba4e412020-10-19 09:59:41 +0000207VNET_HW_INTERFACE_CLASS(ipsec_p2mp_hw_interface_class) = {
208 .name = "IPSec",
209 .build_rewrite = ipsec_itf_build_rewrite_i,
210 .update_adjacency = ipsec_itf_update_adj,
Neale Rannscfe949d2020-11-25 19:35:38 +0000211 .flags = VNET_HW_INTERFACE_CLASS_FLAG_NBMA,
Neale Ranns6ba4e412020-10-19 09:59:41 +0000212};
Neale Rannsdd4ccf22020-06-30 07:47:14 +0000213/* *INDENT-ON* */
214
215/*
216 * Maintain a bitmap of allocated ipsec_itf instance numbers.
217 */
218#define IPSEC_ITF_MAX_INSTANCE (16 * 1024)
219
220static u32
221ipsec_itf_instance_alloc (u32 want)
222{
223 /*
224 * Check for dynamically allocated instance number.
225 */
226 if (~0 == want)
227 {
228 u32 bit;
229
230 bit = clib_bitmap_first_clear (ipsec_itf_instances);
231 if (bit >= IPSEC_ITF_MAX_INSTANCE)
232 {
233 return ~0;
234 }
235 ipsec_itf_instances = clib_bitmap_set (ipsec_itf_instances, bit, 1);
236 return bit;
237 }
238
239 /*
240 * In range?
241 */
242 if (want >= IPSEC_ITF_MAX_INSTANCE)
243 {
244 return ~0;
245 }
246
247 /*
248 * Already in use?
249 */
250 if (clib_bitmap_get (ipsec_itf_instances, want))
251 {
252 return ~0;
253 }
254
255 /*
256 * Grant allocation request.
257 */
258 ipsec_itf_instances = clib_bitmap_set (ipsec_itf_instances, want, 1);
259
260 return want;
261}
262
263static int
264ipsec_itf_instance_free (u32 instance)
265{
266 if (instance >= IPSEC_ITF_MAX_INSTANCE)
267 {
268 return -1;
269 }
270
271 if (clib_bitmap_get (ipsec_itf_instances, instance) == 0)
272 {
273 return -1;
274 }
275
276 ipsec_itf_instances = clib_bitmap_set (ipsec_itf_instances, instance, 0);
277 return 0;
278}
279
280int
281ipsec_itf_create (u32 user_instance, tunnel_mode_t mode, u32 * sw_if_indexp)
282{
283 vnet_main_t *vnm = vnet_get_main ();
284 u32 instance, hw_if_index;
285 vnet_hw_interface_t *hi;
286 ipsec_itf_t *ipsec_itf;
287
288 ASSERT (sw_if_indexp);
289
290 *sw_if_indexp = (u32) ~ 0;
291
Neale Rannsdd4ccf22020-06-30 07:47:14 +0000292 /*
293 * Allocate a ipsec_itf instance. Either select on dynamically
294 * or try to use the desired user_instance number.
295 */
296 instance = ipsec_itf_instance_alloc (user_instance);
297 if (instance == ~0)
298 return VNET_API_ERROR_INVALID_REGISTRATION;
299
300 pool_get (ipsec_itf_pool, ipsec_itf);
301
302 /* tunnel index (or instance) */
303 u32 t_idx = ipsec_itf - ipsec_itf_pool;
304
305 ipsec_itf->ii_mode = mode;
306 ipsec_itf->ii_user_instance = instance;
Neale Rannsdd4ccf22020-06-30 07:47:14 +0000307
308 hw_if_index = vnet_register_interface (vnm,
309 ipsec_itf_device_class.index,
Eric Kinzie609d5792020-10-13 20:02:11 -0400310 ipsec_itf->ii_user_instance,
Neale Ranns6ba4e412020-10-19 09:59:41 +0000311 (mode == TUNNEL_MODE_P2P ?
312 ipsec_hw_interface_class.index :
313 ipsec_p2mp_hw_interface_class.index),
Neale Rannsdd4ccf22020-06-30 07:47:14 +0000314 t_idx);
315
316 hi = vnet_get_hw_interface (vnm, hw_if_index);
317
318 vec_validate_init_empty (ipsec_itf_index_by_sw_if_index, hi->sw_if_index,
319 INDEX_INVALID);
320 ipsec_itf_index_by_sw_if_index[hi->sw_if_index] = t_idx;
321
322 ipsec_itf->ii_sw_if_index = *sw_if_indexp = hi->sw_if_index;
323
324 return 0;
325}
326
327int
328ipsec_itf_delete (u32 sw_if_index)
329{
330 vnet_main_t *vnm = vnet_get_main ();
331
332 if (pool_is_free_index (vnm->interface_main.sw_interfaces, sw_if_index))
333 return VNET_API_ERROR_INVALID_SW_IF_INDEX;
334
335 vnet_hw_interface_t *hw = vnet_get_sup_hw_interface (vnm, sw_if_index);
336 if (hw == 0 || hw->dev_class_index != ipsec_itf_device_class.index)
337 return VNET_API_ERROR_INVALID_SW_IF_INDEX;
338
339 ipsec_itf_t *ipsec_itf;
340 ipsec_itf = ipsec_itf_find_by_sw_if_index (sw_if_index);
341 if (NULL == ipsec_itf)
342 return VNET_API_ERROR_INVALID_SW_IF_INDEX;
343
344 if (ipsec_itf_instance_free (hw->dev_instance) < 0)
345 return VNET_API_ERROR_INVALID_SW_IF_INDEX;
346
347 vnet_delete_hw_interface (vnm, hw->hw_if_index);
348 pool_put (ipsec_itf_pool, ipsec_itf);
349
350 return 0;
351}
352
353static clib_error_t *
354ipsec_itf_create_cli (vlib_main_t * vm,
355 unformat_input_t * input, vlib_cli_command_t * cmd)
356{
357 unformat_input_t _line_input, *line_input = &_line_input;
358 u32 instance, sw_if_index;
359 clib_error_t *error;
360 mac_address_t mac;
361 int rv;
362
363 error = NULL;
364 instance = sw_if_index = ~0;
365 mac_address_set_zero (&mac);
366
367 if (unformat_user (input, unformat_line_input, line_input))
368 {
369 while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
370 {
371 if (unformat (line_input, "instance %d", &instance))
372 ;
373 else
374 {
375 error = clib_error_return (0, "unknown input: %U",
376 format_unformat_error, line_input);
377 break;
378 }
379 }
380
381 unformat_free (line_input);
382
383 if (error)
384 return error;
385 }
386
387 rv = ipsec_itf_create (instance, TUNNEL_MODE_P2P, &sw_if_index);
388
389 if (rv)
390 return clib_error_return (0, "iPSec interface create failed");
391
392 vlib_cli_output (vm, "%U\n", format_vnet_sw_if_index_name, vnet_get_main (),
393 sw_if_index);
394 return 0;
395}
396
397/*?
398 * Create a IPSec interface.
399 *
400 * @cliexpar
401 * The following two command syntaxes are equivalent:
402 * @cliexcmd{ipsec itf create [instance <instance>]}
403 * Example of how to create a ipsec interface:
404 * @cliexcmd{ipsec itf create}
405?*/
406/* *INDENT-OFF* */
407VLIB_CLI_COMMAND (ipsec_itf_create_command, static) = {
408 .path = "ipsec itf create",
409 .short_help = "ipsec itf create [instance <instance>]",
410 .function = ipsec_itf_create_cli,
411};
412/* *INDENT-ON* */
413
414static clib_error_t *
415ipsec_itf_delete_cli (vlib_main_t * vm,
416 unformat_input_t * input, vlib_cli_command_t * cmd)
417{
418 vnet_main_t *vnm;
419 u32 sw_if_index;
420 int rv;
421
422 vnm = vnet_get_main ();
423 sw_if_index = ~0;
424
425 while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT)
426 {
427 if (unformat
428 (input, "%U", unformat_vnet_sw_interface, vnm, &sw_if_index))
429 ;
430 else
431 break;
432 }
433
434 if (~0 != sw_if_index)
435 {
436 rv = ipsec_itf_delete (sw_if_index);
437
438 if (rv)
439 return clib_error_return (0, "ipsec interface delete failed");
440 }
441 else
442 return clib_error_return (0, "no such interface: %U",
443 format_unformat_error, input);
444
445 return 0;
446}
447
448/*?
449 * Delete a IPSEC_ITF interface.
450 *
451 * @cliexpar
452 * The following two command syntaxes are equivalent:
453 * @cliexcmd{ipsec itf delete <interface>}
454 * Example of how to create a ipsec_itf interface:
455 * @cliexcmd{ipsec itf delete ipsec0}
456?*/
457/* *INDENT-OFF* */
458VLIB_CLI_COMMAND (ipsec_itf_delete_command, static) = {
459 .path = "ipsec itf delete",
460 .short_help = "ipsec itf delete <interface>",
461 .function = ipsec_itf_delete_cli,
462};
463/* *INDENT-ON* */
464
Neale Ranns6ba4e412020-10-19 09:59:41 +0000465static clib_error_t *
466ipsec_interface_show (vlib_main_t * vm,
467 unformat_input_t * input, vlib_cli_command_t * cmd)
468{
469 index_t ii;
470
471 /* *INDENT-OFF* */
Damjan Marionb2c31b62020-12-13 21:47:40 +0100472 pool_foreach_index (ii, ipsec_itf_pool)
473 {
Neale Ranns6ba4e412020-10-19 09:59:41 +0000474 vlib_cli_output (vm, "%U", format_ipsec_itf, ii);
Damjan Marionb2c31b62020-12-13 21:47:40 +0100475 }
Neale Ranns6ba4e412020-10-19 09:59:41 +0000476 /* *INDENT-ON* */
477
478 return NULL;
479}
480
481/**
482 * show IPSEC tunnel protection hash tables
483 */
484/* *INDENT-OFF* */
485VLIB_CLI_COMMAND (ipsec_interface_show_node, static) =
486{
487 .path = "show ipsec interface",
488 .function = ipsec_interface_show,
489 .short_help = "show ipsec interface",
490};
491/* *INDENT-ON* */
Neale Rannsdd4ccf22020-06-30 07:47:14 +0000492
493/*
494 * fd.io coding-style-patch-verification: ON
495 *
496 * Local Variables:
497 * eval: (c-set-style "gnu")
498 * End:
499 */