X-Git-Url: https://gerrit.fd.io/r/gitweb?a=blobdiff_plain;f=src%2Fvnet%2Fclassify%2Fvnet_classify.c;h=de11a107ef037573795fae1edcf39042aba4b304;hb=71a70d73f34f7c057dd95dbca39fb8e602087a75;hp=94cc2419775d1eda15533df1b844e9c37bb8486e;hpb=9137e5400699bed9f7c0095187839a8b38273100;p=vpp.git diff --git a/src/vnet/classify/vnet_classify.c b/src/vnet/classify/vnet_classify.c index 94cc2419775..de11a107ef0 100755 --- a/src/vnet/classify/vnet_classify.c +++ b/src/vnet/classify/vnet_classify.c @@ -19,6 +19,7 @@ #include /* for L2_INPUT_CLASSIFY_NEXT_xxx */ #include #include +#include /** * @file @@ -774,6 +775,9 @@ vnet_classify_add_del_table (vnet_classify_main_t * cm, if (nbuckets == 0) return VNET_API_ERROR_INVALID_VALUE; + if (match < 1 || match > 5) + return VNET_API_ERROR_INVALID_VALUE; + t = vnet_classify_new_table (cm, mask, nbuckets, memory_size, skip, match); t->next_table_index = next_table_index; @@ -1691,16 +1695,27 @@ classify_filter_command_fn (vlib_main_t * vm, u32 miss_next_index = ~0; u32 current_data_flag = 0; int current_data_offset = 0; + u32 sw_if_index = ~0; + int pkt_trace = 0; int i; vnet_classify_table_t *t; u8 *mask = 0; vnet_classify_main_t *cm = &vnet_classify_main; int rv = 0; + vnet_classify_filter_set_t *set = 0; + u32 set_index = ~0; while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT) { if (unformat (input, "del")) is_add = 0; + else if (unformat (input, "pcap %=", &sw_if_index, 0)) + ; + else if (unformat (input, "trace")) + pkt_trace = 1; + else if (unformat (input, "%U", + unformat_vnet_sw_interface, vnm, &sw_if_index)) + ; else if (unformat (input, "buckets %d", &nbuckets)) ; else if (unformat (input, "mask %U", unformat_classify_mask, @@ -1713,6 +1728,9 @@ classify_filter_command_fn (vlib_main_t * vm, break; } + if (sw_if_index == 0) + return clib_error_return (0, "Local interface not supported..."); + if (is_add && mask == 0 && table_index == ~0) return clib_error_return (0, "Mask required"); @@ -1722,21 +1740,79 @@ classify_filter_command_fn (vlib_main_t * vm, if (is_add && match == ~0 && table_index == ~0) return clib_error_return (0, "match count required"); + if (sw_if_index == ~0 && pkt_trace == 0) + return clib_error_return (0, "Must specify trace, pcap or interface..."); + + if (pkt_trace && sw_if_index != ~0) + return clib_error_return (0, "Packet trace filter is per-system"); + if (!is_add) { - if (vec_len (vnm->classify_filter_table_indices) == 0) - return clib_error_return (0, "No classify filter set..."); - del_chain = 1; - table_index = vnm->classify_filter_table_indices[0]; - vec_reset_length (vnm->classify_filter_table_indices); - } + if (pkt_trace) + set_index = vlib_global_main.trace_filter.trace_filter_set_index; + else if (sw_if_index < vec_len (cm->filter_set_by_sw_if_index)) + set_index = cm->filter_set_by_sw_if_index[sw_if_index]; - /* see if we already have a table for that... */ + if (set_index == ~0) + { + if (pkt_trace) + return clib_error_return (0, + "No pkt trace classify filter set..."); + if (sw_if_index == 0) + return clib_error_return (0, "No pcap classify filter set..."); + else + return clib_error_return (0, "No classify filter set for %U...", + format_vnet_sw_if_index_name, vnm, + sw_if_index); + } + + set = pool_elt_at_index (cm->filter_sets, set_index); + + set->refcnt--; + ASSERT (set->refcnt >= 0); + if (set->refcnt == 0) + { + del_chain = 1; + table_index = set->table_indices[0]; + vec_reset_length (set->table_indices); + pool_put (cm->filter_sets, set); + if (pkt_trace) + { + vlib_global_main.trace_filter.trace_filter_set_index = ~0; + vlib_global_main.trace_filter.trace_classify_table_index = ~0; + } + else + { + cm->filter_set_by_sw_if_index[sw_if_index] = ~0; + if (sw_if_index > 0) + { + vnet_hw_interface_t *hi = + vnet_get_sup_hw_interface (vnm, sw_if_index); + hi->trace_classify_table_index = ~0; + } + } + } + } if (is_add) { - for (i = 0; i < vec_len (vnm->classify_filter_table_indices); i++) + if (pkt_trace) + set_index = vlib_global_main.trace_filter.trace_filter_set_index; + else if (sw_if_index < vec_len (cm->filter_set_by_sw_if_index)) + set_index = cm->filter_set_by_sw_if_index[sw_if_index]; + + /* Do we have a filter set for this intfc / pcap yet? */ + if (set_index == ~0) + { + pool_get (cm->filter_sets, set); + set_index = set - cm->filter_sets; + set->refcnt = 1; + } + else + set = pool_elt_at_index (cm->filter_sets, set_index); + + for (i = 0; i < vec_len (set->table_indices); i++) { t = pool_elt_at_index (cm->tables, i); /* classifier geometry mismatch, can't use this table */ @@ -1776,7 +1852,40 @@ classify_filter_command_fn (vlib_main_t * vm, return 0; /* Remember the table */ - vec_add1 (vnm->classify_filter_table_indices, table_index); + vec_add1 (set->table_indices, table_index); + + if (pkt_trace) + vlib_global_main.trace_filter.trace_filter_set_index = set_index; + else + { + vec_validate_init_empty (cm->filter_set_by_sw_if_index, sw_if_index, + ~0); + cm->filter_set_by_sw_if_index[sw_if_index] = set - cm->filter_sets; + } + + /* Put top table index where device drivers can find them */ + if (sw_if_index > 0 && pkt_trace == 0) + { + vnet_hw_interface_t *hi = vnet_get_sup_hw_interface (vnm, sw_if_index); + ASSERT (vec_len (set->table_indices) > 0); + hi->trace_classify_table_index = set->table_indices[0]; + } + + /* Sort filter tables from most-specific mask to least-specific mask */ + vec_sort_with_function (set->table_indices, filter_table_mask_compare); + + ASSERT (set); + + /* Setup next_table_index fields */ + for (i = 0; i < vec_len (set->table_indices); i++) + { + t = pool_elt_at_index (cm->tables, set->table_indices[i]); + + if ((i + 1) < vec_len (set->table_indices)) + t->next_table_index = set->table_indices[i + 1]; + else + t->next_table_index = ~0; + } found_table: @@ -1785,7 +1894,6 @@ found_table: cm, &match_vector, table_index) == 0) return 0; - /* * We use hit or miss to determine whether to trace or pcap pkts * so the session setup is very limited @@ -1800,31 +1908,37 @@ found_table: vec_free (match_vector); - /* Sort filter tables from most-specific mask to least-specific mask */ - vec_sort_with_function (vnm->classify_filter_table_indices, - filter_table_mask_compare); - - ASSERT (vec_len (vnm->classify_filter_table_indices)); + return 0; +} - /* Setup next_table_index fields */ - for (i = 0; i < vec_len (vnm->classify_filter_table_indices); i++) +/** Enable / disable packet trace filter */ +int +vlib_enable_disable_pkt_trace_filter (int enable) +{ + if (enable) { - t = pool_elt_at_index (cm->tables, - vnm->classify_filter_table_indices[i]); + vnet_classify_main_t *cm = &vnet_classify_main; + vnet_classify_filter_set_t *set; + u32 set_index = vlib_global_main.trace_filter.trace_filter_set_index; - if ((i + 1) < vec_len (vnm->classify_filter_table_indices)) - t->next_table_index = vnm->classify_filter_table_indices[i + 1]; - else - t->next_table_index = ~0; - } + if (set_index == ~0) + return -1; + set = pool_elt_at_index (cm->filter_sets, set_index); + vlib_global_main.trace_filter.trace_classify_table_index = + set->table_indices[0]; + vlib_global_main.trace_filter.trace_filter_enable = 1; + } + else + { + vlib_global_main.trace_filter.trace_filter_enable = 0; + } return 0; } /*? * Construct an arbitrary set of packet classifier tables for use with - * "pcap rx | tx trace," and (eventually) with the vpp packet - * tracer + * "pcap rx | tx trace," and with the vpp packet tracer * * Packets which match a rule in the classifier table chain * will be traced. The tables are automatically ordered so that @@ -1869,16 +1983,24 @@ found_table: * * Configure a simple classify filter, and configure pcap rx trace to use it: * - * classify filter mask l3 ip4 src match l3 ip4 src 192.168.1.11"
+ * classify filter rx mask l3 ip4 src match l3 ip4 src 192.168.1.11"
* pcap rx trace on max 100 filter * * Configure another fairly simple filter * * classify filter mask l3 ip4 src dst match l3 ip4 src 192.168.1.10 dst 192.168.2.10" * - * Clear all current classifier filters * - * classify filter del + * Configure a filter for use with the vpp packet tracer: + * classify filter trace mask l3 ip4 src dst match l3 ip4 src 192.168.1.10 dst 192.168.2.10" + * trace add dpdk-input 100 filter + * + * Clear classifier filters + * + * classify filter [trace | rx | tx | ] del + * + * To display the top-level classifier tables for each use case: + * show classify filter * * To inspect the classifier tables, use * @@ -1891,12 +2013,110 @@ VLIB_CLI_COMMAND (classify_filter, static) = { .path = "classify filter", .short_help = - "classify filter mask match [del]" - "[buckets ] [memory-size ]", + "classify filter | pcap mask match \n" + " | trace mask match [del]\n" + " [buckets ] [memory-size ]", .function = classify_filter_command_fn, }; /* *INDENT-ON* */ +static clib_error_t * +show_classify_filter_command_fn (vlib_main_t * vm, + unformat_input_t * input, + vlib_cli_command_t * cmd) +{ + vnet_classify_main_t *cm = &vnet_classify_main; + vnet_main_t *vnm = vnet_get_main (); + vnet_classify_filter_set_t *set; + u8 *name = 0; + u8 *s = 0; + u32 set_index; + u32 table_index; + int verbose = 0; + int i, j, limit; + + (void) unformat (input, "verbose %=", &verbose, 1); + + vlib_cli_output (vm, "%-30s%s", "Filter Used By", " Table(s)"); + vlib_cli_output (vm, "%-30s%s", "--------------", " --------"); + + limit = vec_len (cm->filter_set_by_sw_if_index); + + for (i = -1; i < limit; i++) + { + if (i < 0) + set_index = vlib_global_main.trace_filter.trace_filter_set_index; + else + set_index = cm->filter_set_by_sw_if_index[i]; + + if (set_index == ~0) + continue; + + set = pool_elt_at_index (cm->filter_sets, set_index); + + switch (i) + { + case -1: + name = format (0, "packet tracer:"); + break; + case 0: + name = format (0, "pcap rx/tx/drop:"); + break; + default: + name = format (0, "%U:", format_vnet_sw_if_index_name, vnm, i); + break; + } + + if (verbose) + { + u8 *s = 0; + u32 table_index; + + for (j = 0; j < vec_len (set->table_indices); j++) + { + table_index = set->table_indices[j]; + if (table_index != ~0) + s = format (s, " %u", table_index); + else + s = format (s, " none"); + } + + vlib_cli_output (vm, "%-30v table(s)%v", name, s); + vec_reset_length (s); + } + else + { + u8 *s = 0; + table_index = set->table_indices[0]; + + if (table_index != ~0) + s = format (s, " %u", table_index); + else + s = format (s, " none"); + + vlib_cli_output (vm, "%-30v first table%v", name, s); + vec_reset_length (s); + } + vec_reset_length (name); + } + vec_free (s); + vec_free (name); + return 0; +} + + +/* *INDENT-OFF* */ +VLIB_CLI_COMMAND (show_classify_filter, static) = +{ + .path = "show classify filter", + .short_help = "show classify filter [verbose [nn]]", + .function = show_classify_filter_command_fn, +}; +/* *INDENT-ON* */ + + + + static u8 * format_vnet_classify_table (u8 * s, va_list * args) { @@ -2710,6 +2930,7 @@ static clib_error_t * vnet_classify_init (vlib_main_t * vm) { vnet_classify_main_t *cm = &vnet_classify_main; + vnet_classify_filter_set_t *set; cm->vlib_main = vm; cm->vnet_main = vnet_get_main (); @@ -2727,11 +2948,29 @@ vnet_classify_init (vlib_main_t * vm) vnet_classify_register_unformat_acl_next_index_fn (unformat_acl_next_node); + /* Filter set 0 is grounded... */ + pool_get (cm->filter_sets, set); + set->refcnt = 0x7FFFFFFF; + vec_validate (set->table_indices, 0); + set->table_indices[0] = ~0; + /* Initialize the pcap filter set */ + vec_validate (cm->filter_set_by_sw_if_index, 0); + cm->filter_set_by_sw_if_index[0] = ~0; + /* Initialize the packet tracer filter set */ + vlib_global_main.trace_filter.trace_filter_set_index = ~0; + return 0; } VLIB_INIT_FUNCTION (vnet_classify_init); +int +vnet_is_packet_traced (vlib_buffer_t * b, u32 classify_table_index, int func) +{ + return vnet_is_packet_traced_inline (b, classify_table_index, func); +} + + #define TEST_CODE 0 #if TEST_CODE > 0