Revert "ipsec: Use the new tunnel API types to add flow label and TTL copy"
[vpp.git] / src / vnet / ipsec / ipsec_itf.c
1 /*
2  * ipsec_itf.c: IPSec dedicated interface type
3  *
4  * Copyright (c) 2020 Cisco and/or its affiliates.
5  * Licensed under the Apache License, Version 2.0 (the "License");
6  * you may not use this file except in compliance with the License.
7  * You may obtain a copy of the License at:
8  *
9  *     http://www.apache.org/licenses/LICENSE-2.0
10  *
11  * Unless required by applicable law or agreed to in writing, software
12  * distributed under the License is distributed on an "AS IS" BASIS,
13  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14  * See the License for the specific language governing permissions and
15  * limitations under the License.
16  */
17
18 #include <vnet/ip/ip.h>
19 #include <vnet/ipsec/ipsec_itf.h>
20 #include <vnet/ipsec/ipsec_tun.h>
21 #include <vnet/ipsec/ipsec.h>
22 #include <vnet/adj/adj_midchain.h>
23 #include <vnet/ethernet/mac_address.h>
24
25 /* bitmap of Allocated IPSEC_ITF instances */
26 static uword *ipsec_itf_instances;
27
28 /* pool of interfaces */
29 static ipsec_itf_t *ipsec_itf_pool;
30
31 static u32 *ipsec_itf_index_by_sw_if_index;
32
33 ipsec_itf_t *
34 ipsec_itf_get (index_t ii)
35 {
36   return (pool_elt_at_index (ipsec_itf_pool, ii));
37 }
38
39 static ipsec_itf_t *
40 ipsec_itf_find_by_sw_if_index (u32 sw_if_index)
41 {
42   if (vec_len (ipsec_itf_index_by_sw_if_index) <= sw_if_index)
43     return NULL;
44   u32 ti = ipsec_itf_index_by_sw_if_index[sw_if_index];
45   if (ti == ~0)
46     return NULL;
47   return pool_elt_at_index (ipsec_itf_pool, ti);
48 }
49
50 static u8 *
51 format_ipsec_itf_name (u8 * s, va_list * args)
52 {
53   u32 dev_instance = va_arg (*args, u32);
54   return format (s, "ipsec%d", dev_instance);
55 }
56
57 void
58 ipsec_itf_adj_unstack (adj_index_t ai)
59 {
60   adj_midchain_delegate_unstack (ai);
61 }
62
63 void
64 ipsec_itf_adj_stack (adj_index_t ai, u32 sai)
65 {
66   const vnet_hw_interface_t *hw;
67
68   hw = vnet_get_sup_hw_interface (vnet_get_main (), adj_get_sw_if_index (ai));
69
70   if (hw->flags & VNET_HW_INTERFACE_FLAG_LINK_UP)
71     {
72       const ipsec_sa_t *sa;
73
74       sa = ipsec_sa_get (sai);
75
76       /* *INDENT-OFF* */
77       const fib_prefix_t dst = {
78         .fp_len = (ipsec_sa_is_set_IS_TUNNEL_V6(sa) ? 128 : 32),
79         .fp_proto = (ipsec_sa_is_set_IS_TUNNEL_V6(sa)?
80                      FIB_PROTOCOL_IP6 :
81                      FIB_PROTOCOL_IP4),
82         .fp_addr = sa->tunnel_dst_addr,
83       };
84       /* *INDENT-ON* */
85
86       adj_midchain_delegate_stack (ai, sa->tx_fib_index, &dst);
87     }
88   else
89     adj_midchain_delegate_unstack (ai);
90 }
91
92 static adj_walk_rc_t
93 ipsec_itf_adj_stack_cb (adj_index_t ai, void *arg)
94 {
95   ipsec_tun_protect_t *itp = arg;
96
97   ipsec_itf_adj_stack (ai, itp->itp_out_sa);
98
99   return (ADJ_WALK_RC_CONTINUE);
100 }
101
102 static void
103 ipsec_itf_restack (index_t itpi, const ipsec_itf_t * itf)
104 {
105   ipsec_tun_protect_t *itp;
106   fib_protocol_t proto;
107
108   itp = ipsec_tun_protect_get (itpi);
109
110   /*
111    * walk all the adjacencies on the interface and restack them
112    */
113   FOR_EACH_FIB_IP_PROTOCOL (proto)
114   {
115     adj_nbr_walk (itf->ii_sw_if_index, proto, ipsec_itf_adj_stack_cb, itp);
116   }
117 }
118
119 static walk_rc_t
120 ipsec_tun_protect_walk_state_change (index_t itpi, void *arg)
121 {
122   const ipsec_itf_t *itf = arg;
123
124   ipsec_itf_restack (itpi, itf);
125
126   return (WALK_CONTINUE);
127 }
128
129 static clib_error_t *
130 ipsec_itf_admin_up_down (vnet_main_t * vnm, u32 hw_if_index, u32 flags)
131 {
132   vnet_hw_interface_t *hi;
133   ipsec_itf_t *itf;
134   u32 hw_flags;
135
136   hi = vnet_get_hw_interface (vnm, hw_if_index);
137   hw_flags = (flags & VNET_SW_INTERFACE_FLAG_ADMIN_UP ?
138               VNET_HW_INTERFACE_FLAG_LINK_UP : 0);
139   vnet_hw_interface_set_flags (vnm, hw_if_index, hw_flags);
140
141   itf = ipsec_itf_find_by_sw_if_index (hi->sw_if_index);
142
143   if (itf)
144     ipsec_tun_protect_walk_itf (itf->ii_sw_if_index,
145                                 ipsec_tun_protect_walk_state_change, itf);
146
147   return (NULL);
148 }
149
150 static int
151 ipsec_itf_tunnel_desc (u32 sw_if_index,
152                        ip46_address_t * src, ip46_address_t * dst, u8 * is_l2)
153 {
154   ip46_address_reset (src);
155   ip46_address_reset (dst);
156   *is_l2 = 0;
157
158   return (0);
159 }
160
161 static u8 *
162 ipsec_itf_build_rewrite (void)
163 {
164   /*
165    * passing the adj code a NULL rewrite means 'i don't have one cos
166    * t'other end is unresolved'. That's not the case here. For the ipsec
167    * tunnel there are just no bytes of encap to apply in the adj.
168    * So return a zero length rewrite. Encap will be added by a tunnel mode SA.
169    */
170   u8 *rewrite = NULL;
171
172   vec_validate (rewrite, 0);
173   vec_reset_length (rewrite);
174
175   return (rewrite);
176 }
177
178 static u8 *
179 ipsec_itf_build_rewrite_i (vnet_main_t * vnm,
180                            u32 sw_if_index,
181                            vnet_link_t link_type, const void *dst_address)
182 {
183   return (ipsec_itf_build_rewrite ());
184 }
185
186 void
187 ipsec_itf_update_adj (vnet_main_t * vnm, u32 sw_if_index, adj_index_t ai)
188 {
189   adj_nbr_midchain_update_rewrite
190     (ai, NULL, NULL, ADJ_FLAG_MIDCHAIN_IP_STACK, ipsec_itf_build_rewrite ());
191 }
192
193 /* *INDENT-OFF* */
194 VNET_DEVICE_CLASS (ipsec_itf_device_class) = {
195   .name = "IPSEC Tunnel",
196   .format_device_name = format_ipsec_itf_name,
197   .admin_up_down_function = ipsec_itf_admin_up_down,
198   .ip_tun_desc = ipsec_itf_tunnel_desc,
199 };
200
201 VNET_HW_INTERFACE_CLASS(ipsec_hw_interface_class) = {
202   .name = "IPSec",
203   .build_rewrite = ipsec_itf_build_rewrite_i,
204   .update_adjacency = ipsec_itf_update_adj,
205   .flags = VNET_HW_INTERFACE_CLASS_FLAG_P2P,
206 };
207 VNET_HW_INTERFACE_CLASS(ipsec_p2mp_hw_interface_class) = {
208   .name = "IPSec",
209   .build_rewrite = ipsec_itf_build_rewrite_i,
210   .update_adjacency = ipsec_itf_update_adj,
211   .flags = VNET_HW_INTERFACE_CLASS_FLAG_NBMA,
212 };
213 /* *INDENT-ON* */
214
215 /*
216  * Maintain a bitmap of allocated ipsec_itf instance numbers.
217  */
218 #define IPSEC_ITF_MAX_INSTANCE          (16 * 1024)
219
220 static u32
221 ipsec_itf_instance_alloc (u32 want)
222 {
223   /*
224    * Check for dynamically allocated instance number.
225    */
226   if (~0 == want)
227     {
228       u32 bit;
229
230       bit = clib_bitmap_first_clear (ipsec_itf_instances);
231       if (bit >= IPSEC_ITF_MAX_INSTANCE)
232         {
233           return ~0;
234         }
235       ipsec_itf_instances = clib_bitmap_set (ipsec_itf_instances, bit, 1);
236       return bit;
237     }
238
239   /*
240    * In range?
241    */
242   if (want >= IPSEC_ITF_MAX_INSTANCE)
243     {
244       return ~0;
245     }
246
247   /*
248    * Already in use?
249    */
250   if (clib_bitmap_get (ipsec_itf_instances, want))
251     {
252       return ~0;
253     }
254
255   /*
256    * Grant allocation request.
257    */
258   ipsec_itf_instances = clib_bitmap_set (ipsec_itf_instances, want, 1);
259
260   return want;
261 }
262
263 static int
264 ipsec_itf_instance_free (u32 instance)
265 {
266   if (instance >= IPSEC_ITF_MAX_INSTANCE)
267     {
268       return -1;
269     }
270
271   if (clib_bitmap_get (ipsec_itf_instances, instance) == 0)
272     {
273       return -1;
274     }
275
276   ipsec_itf_instances = clib_bitmap_set (ipsec_itf_instances, instance, 0);
277   return 0;
278 }
279
280 int
281 ipsec_itf_create (u32 user_instance, tunnel_mode_t mode, u32 * sw_if_indexp)
282 {
283   vnet_main_t *vnm = vnet_get_main ();
284   u32 instance, hw_if_index;
285   vnet_hw_interface_t *hi;
286   ipsec_itf_t *ipsec_itf;
287
288   ASSERT (sw_if_indexp);
289
290   *sw_if_indexp = (u32) ~ 0;
291
292   /*
293    * Allocate a ipsec_itf instance.  Either select on dynamically
294    * or try to use the desired user_instance number.
295    */
296   instance = ipsec_itf_instance_alloc (user_instance);
297   if (instance == ~0)
298     return VNET_API_ERROR_INVALID_REGISTRATION;
299
300   pool_get (ipsec_itf_pool, ipsec_itf);
301
302   /* tunnel index (or instance) */
303   u32 t_idx = ipsec_itf - ipsec_itf_pool;
304
305   ipsec_itf->ii_mode = mode;
306   ipsec_itf->ii_user_instance = instance;
307
308   hw_if_index = vnet_register_interface (vnm,
309                                          ipsec_itf_device_class.index,
310                                          ipsec_itf->ii_user_instance,
311                                          (mode == TUNNEL_MODE_P2P ?
312                                           ipsec_hw_interface_class.index :
313                                           ipsec_p2mp_hw_interface_class.index),
314                                          t_idx);
315
316   hi = vnet_get_hw_interface (vnm, hw_if_index);
317
318   vec_validate_init_empty (ipsec_itf_index_by_sw_if_index, hi->sw_if_index,
319                            INDEX_INVALID);
320   ipsec_itf_index_by_sw_if_index[hi->sw_if_index] = t_idx;
321
322   ipsec_itf->ii_sw_if_index = *sw_if_indexp = hi->sw_if_index;
323
324   return 0;
325 }
326
327 int
328 ipsec_itf_delete (u32 sw_if_index)
329 {
330   vnet_main_t *vnm = vnet_get_main ();
331
332   if (pool_is_free_index (vnm->interface_main.sw_interfaces, sw_if_index))
333     return VNET_API_ERROR_INVALID_SW_IF_INDEX;
334
335   vnet_hw_interface_t *hw = vnet_get_sup_hw_interface (vnm, sw_if_index);
336   if (hw == 0 || hw->dev_class_index != ipsec_itf_device_class.index)
337     return VNET_API_ERROR_INVALID_SW_IF_INDEX;
338
339   ipsec_itf_t *ipsec_itf;
340   ipsec_itf = ipsec_itf_find_by_sw_if_index (sw_if_index);
341   if (NULL == ipsec_itf)
342     return VNET_API_ERROR_INVALID_SW_IF_INDEX;
343
344   if (ipsec_itf_instance_free (hw->dev_instance) < 0)
345     return VNET_API_ERROR_INVALID_SW_IF_INDEX;
346
347   vnet_delete_hw_interface (vnm, hw->hw_if_index);
348   pool_put (ipsec_itf_pool, ipsec_itf);
349
350   return 0;
351 }
352
353 static clib_error_t *
354 ipsec_itf_create_cli (vlib_main_t * vm,
355                       unformat_input_t * input, vlib_cli_command_t * cmd)
356 {
357   unformat_input_t _line_input, *line_input = &_line_input;
358   u32 instance, sw_if_index;
359   clib_error_t *error;
360   mac_address_t mac;
361   int rv;
362
363   error = NULL;
364   instance = sw_if_index = ~0;
365   mac_address_set_zero (&mac);
366
367   if (unformat_user (input, unformat_line_input, line_input))
368     {
369       while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
370         {
371           if (unformat (line_input, "instance %d", &instance))
372             ;
373           else
374             {
375               error = clib_error_return (0, "unknown input: %U",
376                                          format_unformat_error, line_input);
377               break;
378             }
379         }
380
381       unformat_free (line_input);
382
383       if (error)
384         return error;
385     }
386
387   rv = ipsec_itf_create (instance, TUNNEL_MODE_P2P, &sw_if_index);
388
389   if (rv)
390     return clib_error_return (0, "iPSec interface create failed");
391
392   vlib_cli_output (vm, "%U\n", format_vnet_sw_if_index_name, vnet_get_main (),
393                    sw_if_index);
394   return 0;
395 }
396
397 /*?
398  * Create a IPSec interface.
399  *
400  * @cliexpar
401  * The following two command syntaxes are equivalent:
402  * @cliexcmd{ipsec itf create [instance <instance>]}
403  * Example of how to create a ipsec interface:
404  * @cliexcmd{ipsec itf create}
405 ?*/
406 /* *INDENT-OFF* */
407 VLIB_CLI_COMMAND (ipsec_itf_create_command, static) = {
408   .path = "ipsec itf create",
409   .short_help = "ipsec itf create [instance <instance>]",
410   .function = ipsec_itf_create_cli,
411 };
412 /* *INDENT-ON* */
413
414 static clib_error_t *
415 ipsec_itf_delete_cli (vlib_main_t * vm,
416                       unformat_input_t * input, vlib_cli_command_t * cmd)
417 {
418   vnet_main_t *vnm;
419   u32 sw_if_index;
420   int rv;
421
422   vnm = vnet_get_main ();
423   sw_if_index = ~0;
424
425   while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT)
426     {
427       if (unformat
428           (input, "%U", unformat_vnet_sw_interface, vnm, &sw_if_index))
429         ;
430       else
431         break;
432     }
433
434   if (~0 != sw_if_index)
435     {
436       rv = ipsec_itf_delete (sw_if_index);
437
438       if (rv)
439         return clib_error_return (0, "ipsec interface delete failed");
440     }
441   else
442     return clib_error_return (0, "no such interface: %U",
443                               format_unformat_error, input);
444
445   return 0;
446 }
447
448 /*?
449  * Delete a IPSEC_ITF interface.
450  *
451  * @cliexpar
452  * The following two command syntaxes are equivalent:
453  * @cliexcmd{ipsec itf delete <interface>}
454  * Example of how to create a ipsec_itf interface:
455  * @cliexcmd{ipsec itf delete ipsec0}
456 ?*/
457 /* *INDENT-OFF* */
458 VLIB_CLI_COMMAND (ipsec_itf_delete_command, static) = {
459   .path = "ipsec itf delete",
460   .short_help = "ipsec itf delete <interface>",
461   .function = ipsec_itf_delete_cli,
462 };
463 /* *INDENT-ON* */
464
465 static clib_error_t *
466 ipsec_interface_show (vlib_main_t * vm,
467                       unformat_input_t * input, vlib_cli_command_t * cmd)
468 {
469   index_t ii;
470
471   /* *INDENT-OFF* */
472   pool_foreach_index (ii, ipsec_itf_pool)
473    {
474     vlib_cli_output (vm, "%U", format_ipsec_itf, ii);
475   }
476   /* *INDENT-ON* */
477
478   return NULL;
479 }
480
481 /**
482  * show IPSEC tunnel protection hash tables
483  */
484 /* *INDENT-OFF* */
485 VLIB_CLI_COMMAND (ipsec_interface_show_node, static) =
486 {
487   .path = "show ipsec interface",
488   .function = ipsec_interface_show,
489   .short_help =  "show ipsec interface",
490 };
491 /* *INDENT-ON* */
492
493 /*
494  * fd.io coding-style-patch-verification: ON
495  *
496  * Local Variables:
497  * eval: (c-set-style "gnu")
498  * End:
499  */