| /* |
| * Copyright (c) 2017-2019 Cisco and/or its affiliates. |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at: |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| #include <vnet/session/mma_16.h> |
| #include <vnet/session/mma_template.c> |
| #include <vnet/session/mma_40.h> |
| #include <vnet/session/mma_template.c> |
| #include <vnet/session/transport.h> |
| #include <vnet/session/session.h> |
| #include <vnet/session/session_table.h> |
| #include <vnet/session/session_rules_table.h> |
| #include <vnet/session/session_sdl.h> |
| |
| VLIB_REGISTER_LOG_CLASS (session_rt_log, static) = { .class_name = "session", |
| .subclass_name = "rt" }; |
| |
| #define log_debug(fmt, ...) \ |
| vlib_log_debug (session_rt_log.class, "%s: " fmt, __func__, __VA_ARGS__) |
| #define log_warn(fmt, ...) \ |
| vlib_log_warn (session_rt_log.class, fmt, __VA_ARGS__) |
| #define log_err(fmt, ...) vlib_log_err (session_rt_log.class, fmt, __VA_ARGS__) |
| |
| static session_rules_table_group_t *srt_instances; |
| const session_rt_engine_vft_t *session_rt_engine_vft; |
| |
| u32 |
| session_rule_tag_key_index (u32 ri, u8 is_ip4) |
| { |
| return ((ri << 1) | is_ip4); |
| } |
| |
| void |
| session_rule_tag_key_index_parse (u32 rti_key, u32 * ri, u8 * is_ip4) |
| { |
| *is_ip4 = rti_key & 1; |
| *ri = rti_key >> 1; |
| } |
| |
| u8 * |
| session_rules_table_rule_tag (session_rules_table_t * srt, u32 ri, u8 is_ip4) |
| { |
| uword *tip; |
| session_rule_tag_t *rt; |
| |
| tip = |
| hash_get (srt->tags_by_rules, session_rule_tag_key_index (ri, is_ip4)); |
| if (tip) |
| { |
| rt = pool_elt_at_index (srt->rule_tags, *tip); |
| return rt->tag; |
| } |
| return 0; |
| } |
| |
| void |
| session_rules_table_del_tag (session_rules_table_t * srt, u8 * tag, u8 is_ip4) |
| { |
| uword *rip, *rtip; |
| session_rule_tag_t *rt; |
| u32 rti_key; |
| |
| if (tag == 0) |
| return; |
| rip = hash_get_mem (srt->rules_by_tag, tag); |
| if (!rip) |
| { |
| clib_warning ("tag has no rule associated"); |
| return; |
| } |
| rti_key = session_rule_tag_key_index (*rip, is_ip4); |
| rtip = hash_get (srt->tags_by_rules, rti_key); |
| if (!rtip) |
| { |
| clib_warning ("rule has no tag associated"); |
| return; |
| } |
| rt = pool_elt_at_index (srt->rule_tags, *rtip); |
| ASSERT (rt); |
| hash_unset_mem (srt->rules_by_tag, tag); |
| hash_unset (srt->tags_by_rules, rti_key); |
| vec_free (rt->tag); |
| pool_put (srt->rule_tags, rt); |
| } |
| |
| void |
| session_rules_table_add_tag (session_rules_table_t * srt, u8 * tag, |
| u32 rule_index, u8 is_ip4) |
| { |
| uword *rip; |
| session_rule_tag_t *rt; |
| u32 rti_key; |
| |
| if (tag == 0) |
| return; |
| rip = hash_get_mem (srt->rules_by_tag, tag); |
| if (rip) |
| session_rules_table_del_tag (srt, tag, is_ip4); |
| pool_get (srt->rule_tags, rt); |
| rt->tag = vec_dup (tag); |
| hash_set_mem (srt->rules_by_tag, rt->tag, rule_index); |
| rti_key = session_rule_tag_key_index (rule_index, is_ip4); |
| hash_set (srt->tags_by_rules, rti_key, rt - srt->rule_tags); |
| } |
| |
| u32 |
| session_rules_table_rule_for_tag (session_rules_table_t * srt, u8 * tag) |
| { |
| uword *rp; |
| if (tag == 0) |
| return SESSION_RULES_TABLE_INVALID_INDEX; |
| rp = hash_get_mem (srt->rules_by_tag, tag); |
| return (rp == 0 ? SESSION_RULES_TABLE_INVALID_INDEX : *rp); |
| } |
| |
| static void |
| fib_pref_normalize (fib_prefix_t * pref) |
| { |
| if (pref->fp_proto == FIB_PROTOCOL_IP4) |
| ip4_address_normalize (&pref->fp_addr.ip4, pref->fp_len); |
| else |
| ip6_address_normalize (&pref->fp_addr.ip6, pref->fp_len); |
| } |
| |
| u8 * |
| format_session_rule_tag (u8 *s, va_list *args) |
| { |
| static u8 *null_tag = 0; |
| u8 *tag = va_arg (*args, u8 *); |
| |
| if (!null_tag) |
| null_tag = format (0, "none"); |
| s = format (s, "%v", (tag != 0) ? tag : null_tag); |
| return s; |
| } |
| |
| u8 * |
| format_session_rule4 (u8 * s, va_list * args) |
| { |
| session_rules_table_t *srt = va_arg (*args, session_rules_table_t *); |
| mma_rule_16_t *sr = va_arg (*args, mma_rule_16_t *); |
| session_mask_or_match_4_t *mask, *match; |
| mma_rules_table_16_t *srt4; |
| u8 *tag = 0; |
| u32 ri; |
| int i; |
| |
| srt4 = &srt->session_rules_tables_16; |
| ri = mma_rules_table_rule_index_16 (srt4, sr); |
| tag = session_rules_table_rule_tag (srt, ri, 1); |
| match = (session_mask_or_match_4_t *) & sr->match; |
| mask = (session_mask_or_match_4_t *) & sr->mask; |
| |
| s = format (s, "[%d] rule: %U/%d %d %U/%d %d action: %d tag: %U", ri, |
| format_ip4_address, &match->lcl_ip, |
| ip4_mask_to_preflen (&mask->lcl_ip), match->lcl_port, |
| format_ip4_address, &match->rmt_ip, |
| ip4_mask_to_preflen (&mask->rmt_ip), match->rmt_port, |
| sr->action_index, format_session_rule_tag, tag); |
| if (vec_len (sr->next_indices)) |
| { |
| s = format (s, "\n children: "); |
| for (i = 0; i < vec_len (sr->next_indices); i++) |
| s = format (s, "%d ", sr->next_indices[i]); |
| } |
| return s; |
| } |
| |
| u8 * |
| format_session_rule6 (u8 * s, va_list * args) |
| { |
| session_rules_table_t *srt = va_arg (*args, session_rules_table_t *); |
| mma_rule_40_t *sr = va_arg (*args, mma_rule_40_t *); |
| session_mask_or_match_6_t *mask, *match; |
| mma_rules_table_40_t *srt6; |
| u8 *tag = 0; |
| u32 ri; |
| int i; |
| |
| srt6 = &srt->session_rules_tables_40; |
| ri = mma_rules_table_rule_index_40 (srt6, sr); |
| tag = session_rules_table_rule_tag (srt, ri, 0); |
| match = (session_mask_or_match_6_t *) & sr->match; |
| mask = (session_mask_or_match_6_t *) & sr->mask; |
| |
| s = format (s, "[%d] rule: %U/%d %d %U/%d %d action: %d tag: %U", ri, |
| format_ip6_address, &match->lcl_ip, |
| ip6_mask_to_preflen (&mask->lcl_ip), match->lcl_port, |
| format_ip6_address, &match->rmt_ip, |
| ip6_mask_to_preflen (&mask->rmt_ip), match->rmt_port, |
| sr->action_index, format_session_rule_tag, tag); |
| if (vec_len (sr->next_indices)) |
| { |
| s = format (s, "\n children: "); |
| for (i = 0; i < vec_len (sr->next_indices); i++) |
| s = format (s, "%d ", sr->next_indices[i]); |
| } |
| return s; |
| } |
| |
| void * |
| session_rules_table_get (session_rules_table_t * srt, u8 fib_proto) |
| { |
| if (fib_proto == FIB_PROTOCOL_IP4) |
| return &srt->session_rules_tables_16; |
| else if (fib_proto == FIB_PROTOCOL_IP6) |
| return &srt->session_rules_tables_40; |
| return 0; |
| } |
| |
| int |
| rule_cmp_16 (mma_rule_16_t * rule1, mma_rule_16_t * rule2) |
| { |
| session_mask_or_match_4_t *m1, *m2; |
| |
| m1 = (session_mask_or_match_4_t *) & rule1->max_match; |
| m2 = (session_mask_or_match_4_t *) & rule2->max_match; |
| if (m1->rmt_ip.as_u32 != m2->rmt_ip.as_u32) |
| return (m1->rmt_ip.as_u32 < m2->rmt_ip.as_u32 ? -1 : 1); |
| if (m1->lcl_ip.as_u32 != m2->lcl_ip.as_u32) |
| return (m1->lcl_ip.as_u32 < m2->lcl_ip.as_u32 ? -1 : 1); |
| if (m1->rmt_port != m2->rmt_port) |
| return (m1->rmt_port < m2->rmt_port ? -1 : 1); |
| if (m1->lcl_port != m2->lcl_port) |
| return (m1->lcl_port < m2->lcl_port ? -1 : 1); |
| return 0; |
| } |
| |
| int |
| rule_cmp_40 (mma_rule_40_t * rule1, mma_rule_40_t * rule2) |
| { |
| session_mask_or_match_6_t *r1, *r2; |
| r1 = (session_mask_or_match_6_t *) & rule1->max_match; |
| r2 = (session_mask_or_match_6_t *) & rule2->max_match; |
| if (r1->rmt_ip.as_u64[0] != r2->rmt_ip.as_u64[0]) |
| return (r1->rmt_ip.as_u64[0] < r2->rmt_ip.as_u64[0] ? -1 : 1); |
| if (r1->rmt_ip.as_u64[1] != r2->rmt_ip.as_u64[1]) |
| return (r1->rmt_ip.as_u64[1] < r2->rmt_ip.as_u64[1] ? -1 : 1); |
| if (r1->lcl_ip.as_u64[0] != r2->lcl_ip.as_u64[0]) |
| return (r1->lcl_ip.as_u64[0] < r2->lcl_ip.as_u64[0] ? -1 : 1); |
| if (r1->lcl_ip.as_u64[1] != r2->lcl_ip.as_u64[1]) |
| return (r1->lcl_ip.as_u64[1] < r2->lcl_ip.as_u64[1]) ? -1 : 1; |
| if (r1->rmt_port != r2->rmt_port) |
| return (r1->rmt_port < r2->rmt_port ? -1 : 1); |
| if (r1->lcl_port != r2->lcl_port) |
| return (r1->lcl_port < r2->lcl_port ? -1 : 1); |
| return 0; |
| } |
| |
| void |
| session_rules_table_init_rule_16 (mma_rule_16_t * rule, |
| fib_prefix_t * lcl, u16 lcl_port, |
| fib_prefix_t * rmt, u16 rmt_port) |
| { |
| session_mask_or_match_4_t *match, *mask, *max_match; |
| fib_pref_normalize (lcl); |
| fib_pref_normalize (rmt); |
| match = (session_mask_or_match_4_t *) & rule->match; |
| match->lcl_ip.as_u32 = lcl->fp_addr.ip4.as_u32; |
| match->rmt_ip.as_u32 = rmt->fp_addr.ip4.as_u32; |
| match->lcl_port = lcl_port; |
| match->rmt_port = rmt_port; |
| mask = (session_mask_or_match_4_t *) & rule->mask; |
| ip4_preflen_to_mask (lcl->fp_len, &mask->lcl_ip); |
| ip4_preflen_to_mask (rmt->fp_len, &mask->rmt_ip); |
| mask->lcl_port = lcl_port == 0 ? 0 : (u16) ~ 0; |
| mask->rmt_port = rmt_port == 0 ? 0 : (u16) ~ 0; |
| max_match = (session_mask_or_match_4_t *) & rule->max_match; |
| ip4_prefix_max_address_host_order (&rmt->fp_addr.ip4, rmt->fp_len, |
| &max_match->rmt_ip); |
| ip4_prefix_max_address_host_order (&lcl->fp_addr.ip4, lcl->fp_len, |
| &max_match->lcl_ip); |
| max_match->lcl_port = lcl_port == 0 ? (u16) ~ 0 : lcl_port; |
| max_match->rmt_port = rmt_port == 0 ? (u16) ~ 0 : rmt_port; |
| } |
| |
| void |
| session_rules_table_init_rule_40 (mma_rule_40_t * rule, |
| fib_prefix_t * lcl, u16 lcl_port, |
| fib_prefix_t * rmt, u16 rmt_port) |
| { |
| session_mask_or_match_6_t *match, *mask, *max_match; |
| fib_pref_normalize (lcl); |
| fib_pref_normalize (rmt); |
| match = (session_mask_or_match_6_t *) & rule->match; |
| clib_memcpy_fast (&match->lcl_ip, &lcl->fp_addr.ip6, |
| sizeof (match->lcl_ip)); |
| clib_memcpy_fast (&match->rmt_ip, &rmt->fp_addr.ip6, |
| sizeof (match->rmt_ip)); |
| match->lcl_port = lcl_port; |
| match->rmt_port = rmt_port; |
| mask = (session_mask_or_match_6_t *) & rule->mask; |
| ip6_preflen_to_mask (lcl->fp_len, &mask->lcl_ip); |
| ip6_preflen_to_mask (rmt->fp_len, &mask->rmt_ip); |
| mask->lcl_port = lcl_port == 0 ? 0 : (u16) ~ 0; |
| mask->rmt_port = rmt_port == 0 ? 0 : (u16) ~ 0; |
| max_match = (session_mask_or_match_6_t *) & rule->max_match; |
| ip6_prefix_max_address_host_order (&rmt->fp_addr.ip6, rmt->fp_len, |
| &max_match->rmt_ip); |
| ip6_prefix_max_address_host_order (&lcl->fp_addr.ip6, lcl->fp_len, |
| &max_match->lcl_ip); |
| max_match->lcl_port = lcl_port == 0 ? (u16) ~ 0 : lcl_port; |
| max_match->rmt_port = rmt_port == 0 ? (u16) ~ 0 : rmt_port; |
| } |
| |
| mma_rule_16_t * |
| session_rules_table_alloc_rule_16 (mma_rules_table_16_t * srt, |
| fib_prefix_t * lcl, u16 lcl_port, |
| fib_prefix_t * rmt, u16 rmt_port) |
| { |
| mma_rule_16_t *rule = 0; |
| rule = mma_rules_table_rule_alloc_16 (srt); |
| session_rules_table_init_rule_16 (rule, lcl, lcl_port, rmt, rmt_port); |
| return rule; |
| } |
| |
| mma_rule_40_t * |
| session_rules_table_alloc_rule_40 (mma_rules_table_40_t * srt, |
| fib_prefix_t * lcl, u16 lcl_port, |
| fib_prefix_t * rmt, u16 rmt_port) |
| { |
| mma_rule_40_t *rule; |
| rule = mma_rules_table_rule_alloc_40 (srt); |
| session_rules_table_init_rule_40 (rule, lcl, lcl_port, rmt, rmt_port); |
| return rule; |
| } |
| |
| static u32 |
| session_rules_table_lookup_rule4 (session_rules_table_t *srt, |
| ip4_address_t *lcl_ip, ip4_address_t *rmt_ip, |
| u16 lcl_port, u16 rmt_port) |
| { |
| mma_rules_table_16_t *srt4 = &srt->session_rules_tables_16; |
| session_mask_or_match_4_t key = { |
| .lcl_ip.as_u32 = lcl_ip->as_u32, |
| .rmt_ip.as_u32 = rmt_ip->as_u32, |
| .lcl_port = lcl_port, |
| .rmt_port = rmt_port, |
| }; |
| |
| if (srt4->rules == 0) |
| return SESSION_TABLE_INVALID_INDEX; |
| return mma_rules_table_lookup_rule_16 (srt4, |
| (mma_mask_or_match_16_t *) & key, |
| srt4->root_index); |
| } |
| |
| u32 |
| session_rules_table_lookup4_ (u32 srtg_handle, u32 proto, |
| ip4_address_t *lcl_ip, ip4_address_t *rmt_ip, |
| u16 lcl_port, u16 rmt_port) |
| { |
| session_rules_table_t *srt = srtg_handle_to_srt (srtg_handle, proto); |
| mma_rules_table_16_t *srt4 = &srt->session_rules_tables_16; |
| session_mask_or_match_4_t key = { |
| .lcl_ip.as_u32 = lcl_ip->as_u32, |
| .rmt_ip.as_u32 = rmt_ip->as_u32, |
| .lcl_port = lcl_port, |
| .rmt_port = rmt_port, |
| }; |
| |
| if (srt4->rules == 0) |
| return SESSION_TABLE_INVALID_INDEX; |
| return mma_rules_table_lookup_16 (srt4, (mma_mask_or_match_16_t *) & key, |
| srt4->root_index); |
| } |
| |
| session_rules_table_t * |
| srtg_handle_to_srt (u32 srtg_handle, u32 proto) |
| { |
| session_rules_table_group_t *srtg = |
| pool_elt_at_index (srt_instances, srtg_handle); |
| session_rules_table_t *srt = &srtg->session_rules[proto]; |
| |
| return srt; |
| } |
| |
| static u32 |
| session_rules_table_lookup_rule6 (session_rules_table_t *srt, |
| ip6_address_t *lcl_ip, ip6_address_t *rmt_ip, |
| u16 lcl_port, u16 rmt_port) |
| { |
| mma_rules_table_40_t *srt6 = &srt->session_rules_tables_40; |
| session_mask_or_match_6_t key = { |
| .lcl_port = lcl_port, |
| .rmt_port = rmt_port, |
| }; |
| |
| if (srt6->rules == 0) |
| return SESSION_TABLE_INVALID_INDEX; |
| clib_memcpy_fast (&key.lcl_ip, lcl_ip, sizeof (*lcl_ip)); |
| clib_memcpy_fast (&key.rmt_ip, rmt_ip, sizeof (*rmt_ip)); |
| return mma_rules_table_lookup_rule_40 (srt6, |
| (mma_mask_or_match_40_t *) & key, |
| srt6->root_index); |
| } |
| |
| u32 |
| session_rules_table_lookup6_ (u32 srtg_handle, u32 proto, |
| ip6_address_t *lcl_ip, ip6_address_t *rmt_ip, |
| u16 lcl_port, u16 rmt_port) |
| { |
| session_rules_table_t *srt = srtg_handle_to_srt (srtg_handle, proto); |
| mma_rules_table_40_t *srt6 = &srt->session_rules_tables_40; |
| session_mask_or_match_6_t key = { |
| .lcl_port = lcl_port, |
| .rmt_port = rmt_port, |
| }; |
| |
| if (srt6->rules == 0) |
| return SESSION_TABLE_INVALID_INDEX; |
| clib_memcpy_fast (&key.lcl_ip, lcl_ip, sizeof (*lcl_ip)); |
| clib_memcpy_fast (&key.rmt_ip, rmt_ip, sizeof (*rmt_ip)); |
| return mma_rules_table_lookup_40 (srt6, (mma_mask_or_match_40_t *) & key, |
| srt6->root_index); |
| } |
| |
| /** |
| * Add/delete session rule |
| * |
| * @param srt table where rule should be added |
| * @param args rule arguments |
| * |
| * @return 0 if success, session_error_t error otherwise |
| */ |
| session_error_t |
| session_rules_table_add_del_ (u32 srtg_handle, u32 proto, |
| session_rule_table_add_del_args_t *args) |
| { |
| session_rules_table_t *srt = srtg_handle_to_srt (srtg_handle, proto); |
| u8 fib_proto = args->rmt.fp_proto, *rt; |
| u32 ri_from_tag, ri; |
| int rv; |
| |
| ri_from_tag = session_rules_table_rule_for_tag (srt, args->tag); |
| if (args->is_add && ri_from_tag != SESSION_RULES_TABLE_INVALID_INDEX) |
| return SESSION_E_INVALID; |
| |
| if (fib_proto == FIB_PROTOCOL_IP4) |
| { |
| mma_rules_table_16_t *srt4; |
| srt4 = &srt->session_rules_tables_16; |
| if (args->is_add) |
| { |
| mma_rule_16_t *rule4; |
| rule4 = session_rules_table_alloc_rule_16 (srt4, &args->lcl, |
| args->lcl_port, |
| &args->rmt, |
| args->rmt_port); |
| rule4->action_index = args->action_index; |
| rv = mma_rules_table_add_rule_16 (srt4, rule4); |
| if (!rv) |
| { |
| ri = mma_rules_table_rule_index_16 (srt4, rule4); |
| session_rules_table_add_tag (srt, args->tag, ri, 1); |
| } |
| else |
| { |
| ri = session_rules_table_lookup_rule4 (srt, |
| &args->lcl.fp_addr.ip4, |
| &args->rmt.fp_addr.ip4, |
| args->lcl_port, |
| args->rmt_port); |
| if (ri != SESSION_RULES_TABLE_INVALID_INDEX) |
| { |
| rt = session_rules_table_rule_tag (srt, ri, 1); |
| session_rules_table_del_tag (srt, rt, 1); |
| session_rules_table_add_tag (srt, args->tag, ri, 1); |
| } |
| } |
| } |
| else |
| { |
| mma_rule_16_t *rule; |
| if (ri_from_tag != SESSION_RULES_TABLE_INVALID_INDEX) |
| { |
| rule = mma_rules_table_get_rule_16 (srt4, ri_from_tag); |
| mma_rules_table_del_rule_16 (srt4, rule, srt4->root_index); |
| session_rules_table_del_tag (srt, args->tag, 1); |
| } |
| else |
| { |
| mma_rule_16_t _rule; |
| rule = &_rule; |
| clib_memset (rule, 0, sizeof (*rule)); |
| session_rules_table_init_rule_16 (rule, &args->lcl, |
| args->lcl_port, &args->rmt, |
| args->rmt_port); |
| mma_rules_table_del_rule_16 (srt4, rule, srt4->root_index); |
| } |
| } |
| } |
| else if (fib_proto == FIB_PROTOCOL_IP6) |
| { |
| mma_rules_table_40_t *srt6; |
| mma_rule_40_t *rule6; |
| srt6 = &srt->session_rules_tables_40; |
| if (args->is_add) |
| { |
| rule6 = session_rules_table_alloc_rule_40 (srt6, &args->lcl, |
| args->lcl_port, |
| &args->rmt, |
| args->rmt_port); |
| rule6->action_index = args->action_index; |
| rv = mma_rules_table_add_rule_40 (srt6, rule6); |
| if (!rv) |
| { |
| ri = mma_rules_table_rule_index_40 (srt6, rule6); |
| session_rules_table_add_tag (srt, args->tag, ri, 0); |
| } |
| else |
| { |
| ri = session_rules_table_lookup_rule6 (srt, |
| &args->lcl.fp_addr.ip6, |
| &args->rmt.fp_addr.ip6, |
| args->lcl_port, |
| args->rmt_port); |
| if (ri != SESSION_RULES_TABLE_INVALID_INDEX) |
| { |
| rt = session_rules_table_rule_tag (srt, ri, 0); |
| session_rules_table_del_tag (srt, rt, 1); |
| session_rules_table_add_tag (srt, args->tag, ri, 0); |
| } |
| } |
| } |
| else |
| { |
| mma_rule_40_t *rule; |
| if (ri_from_tag != SESSION_RULES_TABLE_INVALID_INDEX) |
| { |
| rule = mma_rules_table_get_rule_40 (srt6, ri_from_tag); |
| mma_rules_table_del_rule_40 (srt6, rule, srt6->root_index); |
| session_rules_table_del_tag (srt, args->tag, 0); |
| } |
| else |
| { |
| mma_rule_40_t _rule; |
| rule = &_rule; |
| clib_memset (rule, 0, sizeof (*rule)); |
| session_rules_table_init_rule_40 (rule, &args->lcl, |
| args->lcl_port, &args->rmt, |
| args->rmt_port); |
| mma_rules_table_del_rule_40 (srt6, rule, srt6->root_index); |
| } |
| } |
| } |
| else |
| return SESSION_E_INVALID; |
| return 0; |
| } |
| |
| void |
| session_rules_table_free_ (session_table_t *st, u8 fib_proto) |
| { |
| session_rules_table_group_t *srtg = |
| pool_elt_at_index (srt_instances, st->srtg_handle); |
| session_rules_table_t *srt; |
| |
| vec_foreach (srt, srtg->session_rules) |
| { |
| mma_rules_table_free_16 (&srt->session_rules_tables_16); |
| mma_rules_table_free_40 (&srt->session_rules_tables_40); |
| |
| hash_free (srt->tags_by_rules); |
| hash_free (srt->rules_by_tag); |
| } |
| srtg_instance_free (st); |
| } |
| |
| void |
| srtg_instance_free (session_table_t *st) |
| { |
| session_rules_table_group_t *srtg = |
| pool_elt_at_index (srt_instances, st->srtg_handle); |
| |
| vec_free (srtg->session_rules); |
| pool_put (srt_instances, srtg); |
| st->srtg_handle = SESSION_SRTG_HANDLE_INVALID; |
| } |
| |
| session_rules_table_group_t * |
| srtg_instance_alloc (session_table_t *st, u32 n_proto) |
| { |
| session_rules_table_group_t *srtg; |
| |
| pool_get (srt_instances, srtg); |
| vec_validate (srtg->session_rules, n_proto); |
| st->srtg_handle = srtg - srt_instances; |
| return (srtg); |
| } |
| |
| void |
| session_rules_table_init_ (session_table_t *st, u8 fib_proto) |
| { |
| mma_rules_table_16_t *srt4; |
| mma_rules_table_40_t *srt6; |
| mma_rule_16_t *rule4; |
| mma_rule_40_t *rule6; |
| fib_prefix_t null_prefix; |
| session_rules_table_t *srt; |
| session_rules_table_group_t *srtg; |
| |
| srtg = srtg_instance_alloc (st, TRANSPORT_N_PROTOS - 1); |
| |
| clib_memset (&null_prefix, 0, sizeof (null_prefix)); |
| vec_foreach (srt, srtg->session_rules) |
| { |
| srt4 = &srt->session_rules_tables_16; |
| |
| ASSERT (srt4->rules == 0); |
| rule4 = session_rules_table_alloc_rule_16 (srt4, &null_prefix, 0, |
| &null_prefix, 0); |
| rule4->action_index = SESSION_RULES_TABLE_INVALID_INDEX; |
| srt4->root_index = mma_rules_table_rule_index_16 (srt4, rule4); |
| srt4->rule_cmp_fn = rule_cmp_16; |
| |
| srt6 = &srt->session_rules_tables_40; |
| ASSERT (srt6->rules == 0); |
| rule6 = session_rules_table_alloc_rule_40 (srt6, &null_prefix, 0, |
| &null_prefix, 0); |
| rule6->action_index = SESSION_RULES_TABLE_INVALID_INDEX; |
| srt6->root_index = mma_rules_table_rule_index_40 (srt6, rule6); |
| srt6->rule_cmp_fn = rule_cmp_40; |
| |
| srt->rules_by_tag = hash_create_vec (0, sizeof (u8), sizeof (uword)); |
| srt->tags_by_rules = hash_create (0, sizeof (uword)); |
| } |
| } |
| |
| void |
| session_rules_table_show_rule_ (vlib_main_t *vm, u32 srtg_handle, u32 proto, |
| ip46_address_t *lcl_ip, u16 lcl_port, |
| ip46_address_t *rmt_ip, u16 rmt_port, |
| u8 is_ip4) |
| { |
| session_rules_table_t *srt = srtg_handle_to_srt (srtg_handle, proto); |
| mma_rules_table_16_t *srt4; |
| mma_rules_table_40_t *srt6; |
| mma_rule_16_t *sr4; |
| mma_rule_40_t *sr6; |
| u32 ri; |
| |
| if (is_ip4) |
| { |
| srt4 = session_rules_table_get (srt, FIB_PROTOCOL_IP4); |
| session_mask_or_match_4_t key = { |
| .lcl_ip.as_u32 = lcl_ip->ip4.as_u32, |
| .rmt_ip.as_u32 = rmt_ip->ip4.as_u32, |
| .lcl_port = lcl_port, |
| .rmt_port = rmt_port, |
| }; |
| ri = |
| mma_rules_table_lookup_rule_16 (srt4, |
| (mma_mask_or_match_16_t *) & key, |
| srt4->root_index); |
| sr4 = mma_rules_table_get_rule_16 (srt4, ri); |
| vlib_cli_output (vm, "%U", format_session_rule4, srt, sr4); |
| } |
| else |
| { |
| srt6 = session_rules_table_get (srt, FIB_PROTOCOL_IP6); |
| session_mask_or_match_6_t key = { |
| .lcl_port = lcl_port, |
| .rmt_port = rmt_port, |
| }; |
| clib_memcpy_fast (&key.lcl_ip, &lcl_ip->ip6, sizeof (lcl_ip->ip6)); |
| clib_memcpy_fast (&key.rmt_ip, &rmt_ip->ip6, sizeof (rmt_ip->ip6)); |
| ri = mma_rules_table_lookup_rule_40 (srt6, |
| (mma_mask_or_match_40_t *) & key, |
| srt6->root_index); |
| sr6 = mma_rules_table_get_rule_40 (srt6, ri); |
| vlib_cli_output (vm, "%U", format_session_rule6, srt, sr6); |
| } |
| } |
| |
| void |
| session_rules_table_cli_dump_ (vlib_main_t *vm, u32 srtg_handle, u32 proto, |
| u8 fib_proto) |
| { |
| session_rules_table_t *srt = srtg_handle_to_srt (srtg_handle, proto); |
| if (fib_proto == FIB_PROTOCOL_IP4) |
| { |
| mma_rules_table_16_t *srt4; |
| mma_rule_16_t *sr4; |
| srt4 = &srt->session_rules_tables_16; |
| vlib_cli_output (vm, "IP4 rules"); |
| |
| pool_foreach (sr4, srt4->rules) { |
| vlib_cli_output (vm, "%U", format_session_rule4, srt, sr4); |
| } |
| |
| } |
| else if (fib_proto == FIB_PROTOCOL_IP6) |
| { |
| mma_rules_table_40_t *srt6; |
| mma_rule_40_t *sr6; |
| srt6 = &srt->session_rules_tables_40; |
| vlib_cli_output (vm, "IP6 rules"); |
| |
| pool_foreach (sr6, srt6->rules) { |
| vlib_cli_output (vm, "%U", format_session_rule6, srt, sr6); |
| } |
| |
| } |
| } |
| |
| static const session_rt_engine_vft_t session_rules_table_vft = { |
| .backend_engine = RT_BACKEND_ENGINE_RULE_TABLE, |
| .table_lookup4 = session_rules_table_lookup4_, |
| .table_lookup6 = session_rules_table_lookup6_, |
| .table_cli_dump = session_rules_table_cli_dump_, |
| .table_show_rule = session_rules_table_show_rule_, |
| .table_add_del = session_rules_table_add_del_, |
| .table_init = session_rules_table_init_, |
| .table_free = session_rules_table_free_, |
| }; |
| |
| static void |
| session_rules_table_app_namespace_walk_cb (app_namespace_t *app_ns, void *ctx) |
| { |
| u32 fib_index, table_index; |
| session_table_t *st; |
| |
| log_debug ("disable app_ns %s", app_ns->ns_id); |
| st = session_table_get (app_ns->local_table_index); |
| if (st) |
| session_rules_table_free (st, FIB_PROTOCOL_MAX); |
| |
| fib_index = app_namespace_get_fib_index (app_ns, FIB_PROTOCOL_IP4); |
| table_index = session_lookup_get_index_for_fib (FIB_PROTOCOL_IP4, fib_index); |
| st = session_table_get (table_index); |
| if (st) |
| session_rules_table_free (st, FIB_PROTOCOL_IP4); |
| |
| fib_index = app_namespace_get_fib_index (app_ns, FIB_PROTOCOL_IP6); |
| table_index = session_lookup_get_index_for_fib (FIB_PROTOCOL_IP6, fib_index); |
| st = session_table_get (table_index); |
| if (st) |
| session_rules_table_free (st, FIB_PROTOCOL_IP6); |
| } |
| |
| clib_error_t * |
| session_rules_table_enable_disable (int enable) |
| { |
| clib_error_t *error; |
| |
| if (enable) |
| error = session_rule_table_register_engine (&session_rules_table_vft); |
| else |
| { |
| app_namespace_walk (session_rules_table_app_namespace_walk_cb, 0); |
| error = session_rule_table_deregister_engine (&session_rules_table_vft); |
| } |
| |
| return error; |
| } |
| |
| clib_error_t * |
| session_rt_backend_enable_disable (session_rt_engine_type_t rt_engine_type) |
| { |
| session_main_t *smm = &session_main; |
| clib_error_t *error = 0; |
| |
| if (rt_engine_type < RT_BACKEND_ENGINE_DISABLE || |
| rt_engine_type > RT_BACKEND_ENGINE_SDL) |
| return clib_error_return (0, "invalid rt-backend %d", rt_engine_type); |
| |
| if (rt_engine_type == RT_BACKEND_ENGINE_SDL) |
| error = session_sdl_enable_disable (1); |
| else if (rt_engine_type == RT_BACKEND_ENGINE_RULE_TABLE) |
| error = session_rules_table_enable_disable (1); |
| else if (rt_engine_type == RT_BACKEND_ENGINE_DISABLE) |
| { |
| if (session_sdl_is_enabled ()) |
| error = session_sdl_enable_disable (0); |
| else if (session_rule_table_is_enabled ()) |
| error = session_rules_table_enable_disable (0); |
| } |
| |
| if (!error) |
| smm->rt_engine_type = rt_engine_type; |
| return error; |
| } |
| |
| clib_error_t * |
| session_rule_table_register_engine (const session_rt_engine_vft_t *vft) |
| { |
| if (session_rt_engine_vft == vft) |
| return 0; |
| if (session_rt_engine_vft) |
| return clib_error_return (0, "session rule engine is already registered"); |
| |
| session_rt_engine_vft = vft; |
| return 0; |
| } |
| |
| clib_error_t * |
| session_rule_table_deregister_engine (const session_rt_engine_vft_t *vft) |
| { |
| if (session_rt_engine_vft == vft) |
| session_rt_engine_vft = 0; |
| else |
| return clib_error_return ( |
| 0, "session rule engine is not registered to this engine"); |
| |
| return 0; |
| } |
| |
| /* |
| * fd.io coding-style-patch-verification: ON |
| * |
| * Local Variables: |
| * eval: (c-set-style "gnu") |
| * End: |
| */ |