Merge pull request #9007 from donaldsharp/pbr_stuff

add ability to match on proto to pbr
This commit is contained in:
Jafar Al-Gharaibeh 2021-07-27 15:09:29 -05:00 committed by GitHub
commit 213d980ff9
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
13 changed files with 184 additions and 19 deletions

View File

@ -2576,6 +2576,7 @@ static void bgp_encode_pbr_rule_action(struct stream *s,
stream_putl(s, pbr->unique);
else
stream_putl(s, pbra->unique);
stream_putc(s, 0); /* ip protocol being used */
if (pbr && pbr->flags & MATCH_IP_SRC_SET)
memcpy(&pfx, &(pbr->src), sizeof(struct prefix));
else {

View File

@ -117,6 +117,21 @@ end destination.
both v4 and v6 prefixes. This command is used in conjunction of the
:clicmd:`match src-ip PREFIX` command for matching.
.. clicmd:: match src-port (1-65535)
When a incoming packet matches the source port specified, take the
packet and forward according to the nexthops specified.
.. clicmd:: match dst-port (1-65535)
When a incoming packet matches the destination port specified, take the
packet and forward according to the nexthops specified.
.. clicmd:: match ip-protocol [tcp|udp]
When a incoming packet matches the specified ip protocol, take the
packet and forward according to the nexthops specified.
.. clicmd:: match mark (1-4294967295)
Select the mark to match. This is a linux only command and if attempted

View File

@ -49,7 +49,8 @@ struct pbr_filter {
#define PBR_FILTER_PROTO (1 << 5)
#define PBR_FILTER_SRC_PORT_RANGE (1 << 6)
#define PBR_FILTER_DST_PORT_RANGE (1 << 7)
#define PBR_FILTER_DSFIELD (1 << 8)
#define PBR_FILTER_DSFIELD (1 << 8)
#define PBR_FILTER_IP_PROTOCOL (1 << 9)
#define PBR_DSFIELD_DSCP (0xfc) /* Upper 6 bits of DS field: DSCP */
#define PBR_DSFIELD_ECN (0x03) /* Lower 2 bits of DS field: BCN */
@ -67,6 +68,9 @@ struct pbr_filter {
/* Filter with fwmark */
uint32_t fwmark;
/* Filter with the ip protocol */
uint8_t ip_proto;
};
/*

View File

@ -84,6 +84,17 @@ struct pbr_map_sequence {
*/
uint32_t ruleno;
/*
* src and dst ports
*/
uint16_t src_prt;
uint16_t dst_prt;
/*
* The ip protocol we want to match on
*/
uint8_t ip_proto;
/*
* Our policy Catchers
*/

View File

@ -193,6 +193,76 @@ DEFPY(pbr_map_match_dst, pbr_map_match_dst_cmd,
return CMD_SUCCESS;
}
DEFPY(pbr_map_match_ip_proto, pbr_map_match_ip_proto_cmd,
"[no] match ip-protocol [tcp|udp]$ip_proto",
NO_STR
"Match the rest of the command\n"
"Choose an ip-protocol\n"
"Match on tcp flows\n"
"Match on udp flows\n")
{
struct pbr_map_sequence *pbrms = VTY_GET_CONTEXT(pbr_map_sequence);
struct protoent *p;
if (!no) {
p = getprotobyname(ip_proto);
if (!p) {
vty_out(vty, "Unable to convert %s to proto id\n",
ip_proto);
return CMD_WARNING;
}
pbrms->ip_proto = p->p_proto;
} else
pbrms->ip_proto = 0;
return CMD_SUCCESS;
}
DEFPY(pbr_map_match_src_port, pbr_map_match_src_port_cmd,
"[no] match src-port (1-65535)$port",
NO_STR
"Match the rest of the command\n"
"Choose the source port to use\n"
"The Source Port\n")
{
struct pbr_map_sequence *pbrms = VTY_GET_CONTEXT(pbr_map_sequence);
if (!no) {
if (pbrms->src_prt == port)
return CMD_SUCCESS;
else
pbrms->src_prt = port;
} else
pbrms->src_prt = 0;
pbr_map_check(pbrms, true);
return CMD_SUCCESS;
}
DEFPY(pbr_map_match_dst_port, pbr_map_match_dst_port_cmd,
"[no] match dst-port (1-65535)$port",
NO_STR
"Match the rest of the command\n"
"Choose the destination port to use\n"
"The Destination Port\n")
{
struct pbr_map_sequence *pbrms = VTY_GET_CONTEXT(pbr_map_sequence);
if (!no) {
if (pbrms->dst_prt == port)
return CMD_SUCCESS;
else
pbrms->dst_prt = port;
} else
pbrms->dst_prt = 0;
pbr_map_check(pbrms, true);
return CMD_SUCCESS;
}
DEFPY(pbr_map_match_dscp, pbr_map_match_dscp_cmd,
"[no] match dscp DSCP$dscp",
NO_STR
@ -674,6 +744,13 @@ static void vty_show_pbrms(struct vty *vty,
pbrms->installed ? "yes" : "no",
pbrms->reason ? rbuf : "Valid");
if (pbrms->ip_proto) {
struct protoent *p;
p = getprotobynumber(pbrms->ip_proto);
vty_out(vty, " IP Protocol Match: %s\n", p->p_name);
}
if (pbrms->src)
vty_out(vty, " SRC Match: %pFX\n", pbrms->src);
if (pbrms->dst)
@ -1079,6 +1156,18 @@ static int pbr_vty_map_config_write_sequence(struct vty *vty,
if (pbrms->dst)
vty_out(vty, " match dst-ip %pFX\n", pbrms->dst);
if (pbrms->src_prt)
vty_out(vty, " match src-port %u\n", pbrms->src_prt);
if (pbrms->dst_prt)
vty_out(vty, " match dst-port %u\n", pbrms->dst_prt);
if (pbrms->ip_proto) {
struct protoent *p;
p = getprotobynumber(pbrms->ip_proto);
vty_out(vty, " match ip-protocol %s\n", p->p_name);
}
if (pbrms->dsfield & PBR_DSFIELD_DSCP)
vty_out(vty, " match dscp %u\n",
(pbrms->dsfield & PBR_DSFIELD_DSCP) >> 2);
@ -1169,6 +1258,9 @@ void pbr_vty_init(void)
install_element(CONFIG_NODE, &pbr_set_table_range_cmd);
install_element(CONFIG_NODE, &no_pbr_set_table_range_cmd);
install_element(INTERFACE_NODE, &pbr_policy_cmd);
install_element(PBRMAP_NODE, &pbr_map_match_ip_proto_cmd);
install_element(PBRMAP_NODE, &pbr_map_match_src_port_cmd);
install_element(PBRMAP_NODE, &pbr_map_match_dst_port_cmd);
install_element(PBRMAP_NODE, &pbr_map_match_src_cmd);
install_element(PBRMAP_NODE, &pbr_map_match_dst_cmd);
install_element(PBRMAP_NODE, &pbr_map_match_dscp_cmd);

View File

@ -534,10 +534,11 @@ static void pbr_encode_pbr_map_sequence(struct stream *s,
stream_putl(s, pbrms->seqno);
stream_putl(s, pbrms->ruleno);
stream_putl(s, pbrms->unique);
stream_putc(s, pbrms->ip_proto); /* The ip_proto */
pbr_encode_pbr_map_sequence_prefix(s, pbrms->src, family);
stream_putw(s, 0); /* src port */
stream_putw(s, pbrms->src_prt);
pbr_encode_pbr_map_sequence_prefix(s, pbrms->dst, family);
stream_putw(s, 0); /* dst port */
stream_putw(s, pbrms->dst_prt);
stream_putc(s, pbrms->dsfield);
stream_putl(s, pbrms->mark);

View File

@ -550,6 +550,12 @@ bool nl_attr_put(struct nlmsghdr *n, unsigned int maxlen, int type,
return true;
}
bool nl_attr_put8(struct nlmsghdr *n, unsigned int maxlen, int type,
uint8_t data)
{
return nl_attr_put(n, maxlen, type, &data, sizeof(uint8_t));
}
bool nl_attr_put16(struct nlmsghdr *n, unsigned int maxlen, int type,
uint16_t data)
{

View File

@ -38,6 +38,8 @@ extern "C" {
*/
extern bool nl_attr_put(struct nlmsghdr *n, unsigned int maxlen, int type,
const void *data, unsigned int alen);
extern bool nl_attr_put8(struct nlmsghdr *n, unsigned int maxlen, int type,
uint8_t data);
extern bool nl_attr_put16(struct nlmsghdr *n, unsigned int maxlen, int type,
uint16_t data);
extern bool nl_attr_put32(struct nlmsghdr *n, unsigned int maxlen, int type,

View File

@ -58,12 +58,11 @@
* Returns -1 on failure, 0 when the msg doesn't fit entirely in the buffer
* or the number of bytes written to buf.
*/
static ssize_t
netlink_rule_msg_encode(int cmd, const struct zebra_dplane_ctx *ctx,
uint32_t filter_bm, uint32_t priority, uint32_t table,
const struct prefix *src_ip,
const struct prefix *dst_ip, uint32_t fwmark,
uint8_t dsfield, void *buf, size_t buflen)
static ssize_t netlink_rule_msg_encode(
int cmd, const struct zebra_dplane_ctx *ctx, uint32_t filter_bm,
uint32_t priority, uint32_t table, const struct prefix *src_ip,
const struct prefix *dst_ip, uint32_t fwmark, uint8_t dsfield,
uint8_t ip_protocol, void *buf, size_t buflen)
{
uint8_t protocol = RTPROT_ZEBRA;
int family;
@ -136,6 +135,10 @@ netlink_rule_msg_encode(int cmd, const struct zebra_dplane_ctx *ctx,
if (filter_bm & PBR_FILTER_DSFIELD)
req->frh.tos = dsfield;
/* protocol to match on */
if (filter_bm & PBR_FILTER_IP_PROTOCOL)
nl_attr_put8(&req->n, buflen, FRA_IP_PROTO, ip_protocol);
/* Route table to use to forward, if filter criteria matches. */
if (table < 256)
req->frh.table = table;
@ -168,7 +171,8 @@ static ssize_t netlink_rule_msg_encoder(struct zebra_dplane_ctx *ctx, void *buf,
dplane_ctx_rule_get_table(ctx), dplane_ctx_rule_get_src_ip(ctx),
dplane_ctx_rule_get_dst_ip(ctx),
dplane_ctx_rule_get_fwmark(ctx),
dplane_ctx_rule_get_dsfield(ctx), buf, buflen);
dplane_ctx_rule_get_dsfield(ctx),
dplane_ctx_rule_get_ipproto(ctx), buf, buflen);
}
static ssize_t netlink_oldrule_msg_encoder(struct zebra_dplane_ctx *ctx,
@ -181,7 +185,8 @@ static ssize_t netlink_oldrule_msg_encoder(struct zebra_dplane_ctx *ctx,
dplane_ctx_rule_get_old_src_ip(ctx),
dplane_ctx_rule_get_old_dst_ip(ctx),
dplane_ctx_rule_get_old_fwmark(ctx),
dplane_ctx_rule_get_old_dsfield(ctx), buf, buflen);
dplane_ctx_rule_get_old_dsfield(ctx),
dplane_ctx_rule_get_old_ipproto(ctx), buf, buflen);
}
/* Public functions */
@ -236,6 +241,7 @@ int netlink_rule_change(struct nlmsghdr *h, ns_id_t ns_id, int startup)
char *ifname;
struct zebra_pbr_rule rule = {};
uint8_t proto = 0;
uint8_t ip_proto = 0;
/* Basic validation followed by extracting attributes. */
if (h->nlmsg_type != RTM_NEWRULE && h->nlmsg_type != RTM_DELRULE)
@ -312,6 +318,9 @@ int netlink_rule_change(struct nlmsghdr *h, ns_id_t ns_id, int startup)
if (tb[FRA_PROTOCOL])
proto = *(uint8_t *)RTA_DATA(tb[FRA_PROTOCOL]);
if (tb[FRA_IP_PROTO])
ip_proto = *(uint8_t *)RTA_DATA(tb[FRA_IP_PROTO]);
ifname = (char *)RTA_DATA(tb[FRA_IFNAME]);
strlcpy(rule.ifname, ifname, sizeof(rule.ifname));
@ -326,7 +335,7 @@ int netlink_rule_change(struct nlmsghdr *h, ns_id_t ns_id, int startup)
ret = dplane_pbr_rule_delete(&rule);
zlog_debug(
"%s: %s leftover rule: family %s IF %s Pref %u Src %pFX Dst %pFX Table %u",
"%s: %s leftover rule: family %s IF %s Pref %u Src %pFX Dst %pFX Table %u ip-proto: %u",
__func__,
((ret == ZEBRA_DPLANE_REQUEST_FAILURE)
? "Failed to remove"
@ -334,7 +343,7 @@ int netlink_rule_change(struct nlmsghdr *h, ns_id_t ns_id, int startup)
nl_family_to_str(frh->family), rule.ifname,
rule.rule.priority, &rule.rule.filter.src_ip,
&rule.rule.filter.dst_ip,
rule.rule.action.table);
rule.rule.action.table, ip_proto);
}
/* TBD */
@ -349,11 +358,12 @@ int netlink_rule_change(struct nlmsghdr *h, ns_id_t ns_id, int startup)
if (IS_ZEBRA_DEBUG_KERNEL)
zlog_debug(
"Rx %s family %s IF %s Pref %u Src %pFX Dst %pFX Table %u",
"Rx %s family %s IF %s Pref %u Src %pFX Dst %pFX Table %u ip-proto: %u",
nl_msg_type_to_str(h->nlmsg_type),
nl_family_to_str(frh->family), rule.ifname,
rule.rule.priority, &rule.rule.filter.src_ip,
&rule.rule.filter.dst_ip, rule.rule.action.table);
&rule.rule.filter.dst_ip, rule.rule.action.table,
ip_proto);
return kernel_pbr_rule_del(&rule);
}

View File

@ -3131,6 +3131,7 @@ static inline void zread_rule(ZAPI_HANDLER_ARGS)
STREAM_GETL(s, zpr.rule.seq);
STREAM_GETL(s, zpr.rule.priority);
STREAM_GETL(s, zpr.rule.unique);
STREAM_GETC(s, zpr.rule.filter.ip_proto);
STREAM_GETC(s, zpr.rule.filter.src_ip.family);
STREAM_GETC(s, zpr.rule.filter.src_ip.prefixlen);
STREAM_GET(&zpr.rule.filter.src_ip.u.prefix, s,
@ -3164,6 +3165,9 @@ static inline void zread_rule(ZAPI_HANDLER_ARGS)
if (zpr.rule.filter.dsfield)
zpr.rule.filter.filter_bm |= PBR_FILTER_DSFIELD;
if (zpr.rule.filter.ip_proto)
zpr.rule.filter.filter_bm |= PBR_FILTER_IP_PROTOCOL;
if (zpr.rule.filter.fwmark)
zpr.rule.filter.filter_bm |= PBR_FILTER_FWMARK;

View File

@ -259,6 +259,7 @@ struct dplane_ctx_rule {
uint8_t dsfield;
struct prefix src_ip;
struct prefix dst_ip;
uint8_t ip_proto;
char ifname[INTERFACE_NAMSIZ + 1];
};
@ -1929,6 +1930,20 @@ uint32_t dplane_ctx_rule_get_old_fwmark(const struct zebra_dplane_ctx *ctx)
return ctx->u.rule.old.fwmark;
}
uint8_t dplane_ctx_rule_get_ipproto(const struct zebra_dplane_ctx *ctx)
{
DPLANE_CTX_VALID(ctx);
return ctx->u.rule.new.ip_proto;
}
uint8_t dplane_ctx_rule_get_old_ipproto(const struct zebra_dplane_ctx *ctx)
{
DPLANE_CTX_VALID(ctx);
return ctx->u.rule.old.ip_proto;
}
uint8_t dplane_ctx_rule_get_dsfield(const struct zebra_dplane_ctx *ctx)
{
DPLANE_CTX_VALID(ctx);
@ -2636,6 +2651,7 @@ static void dplane_ctx_rule_init_single(struct dplane_ctx_rule *dplane_rule,
dplane_rule->filter_bm = rule->rule.filter.filter_bm;
dplane_rule->fwmark = rule->rule.filter.fwmark;
dplane_rule->dsfield = rule->rule.filter.dsfield;
dplane_rule->ip_proto = rule->rule.filter.ip_proto;
prefix_copy(&(dplane_rule->dst_ip), &rule->rule.filter.dst_ip);
prefix_copy(&(dplane_rule->src_ip), &rule->rule.filter.src_ip);
strlcpy(dplane_rule->ifname, rule->ifname, INTERFACE_NAMSIZ);

View File

@ -493,6 +493,8 @@ uint32_t dplane_ctx_rule_get_fwmark(const struct zebra_dplane_ctx *ctx);
uint32_t dplane_ctx_rule_get_old_fwmark(const struct zebra_dplane_ctx *ctx);
uint8_t dplane_ctx_rule_get_dsfield(const struct zebra_dplane_ctx *ctx);
uint8_t dplane_ctx_rule_get_old_dsfield(const struct zebra_dplane_ctx *ctx);
uint8_t dplane_ctx_rule_get_ipproto(const struct zebra_dplane_ctx *ctx);
uint8_t dplane_ctx_rule_get_old_ipproto(const struct zebra_dplane_ctx *ctx);
const struct prefix *
dplane_ctx_rule_get_src_ip(const struct zebra_dplane_ctx *ctx);
const struct prefix *

View File

@ -166,10 +166,8 @@ uint32_t zebra_pbr_rules_hash_key(const void *arg)
rule->rule.action.table,
prefix_hash_key(&rule->rule.filter.src_ip));
if (rule->rule.filter.fwmark)
key = jhash_2words(rule->rule.filter.fwmark, rule->vrf_id, key);
else
key = jhash_1word(rule->vrf_id, key);
key = jhash_3words(rule->rule.filter.fwmark, rule->vrf_id,
rule->rule.filter.ip_proto, key);
key = jhash(rule->ifname, strlen(rule->ifname), key);
@ -207,6 +205,9 @@ bool zebra_pbr_rules_hash_equal(const void *arg1, const void *arg2)
if (r1->rule.filter.fwmark != r2->rule.filter.fwmark)
return false;
if (r1->rule.filter.ip_proto != r2->rule.filter.ip_proto)
return false;
if (!prefix_same(&r1->rule.filter.src_ip, &r2->rule.filter.src_ip))
return false;