summaryrefslogtreecommitdiffstats
path: root/src/vnet/session/session_rules_table.c
diff options
context:
space:
mode:
authorFlorin Coras <fcoras@cisco.com>2017-10-17 00:03:13 -0700
committerDave Barach <openvpp@barachs.net>2017-10-28 19:56:39 +0000
commit1c7104514cd40d2377caca36cf40c13b791bc5aa (patch)
tree2b95bb11dd8658e826ad8cb3fe4d399adbab7e01 /src/vnet/session/session_rules_table.c
parentae5a02f8235b9a243df09b42e932ae5f238e366b (diff)
session: rules tables
This introduces 5-tuple lookup tables that may be used to implement custom session layer actions at connection establishment time (session layer perspective). The rules table build mask-match-action lookup trees that for a given 5-tuple key return the action for the first longest match. If rules overlap, ordering is established by tuple longest match with the following descending priority: remote ip, local ip, remote port, local port. At this time, the only match action supported is to forward packets to the application identified by the action. Change-Id: Icbade6fac720fa3979820d50cd7d6137f8b635c3 Signed-off-by: Florin Coras <fcoras@cisco.com>
Diffstat (limited to 'src/vnet/session/session_rules_table.c')
-rw-r--r--src/vnet/session/session_rules_table.c429
1 files changed, 429 insertions, 0 deletions
diff --git a/src/vnet/session/session_rules_table.c b/src/vnet/session/session_rules_table.c
new file mode 100644
index 00000000000..fb433114cf2
--- /dev/null
+++ b/src/vnet/session/session_rules_table.c
@@ -0,0 +1,429 @@
+/*
+ * Copyright (c) 2017 Cisco and/or its affiliates.
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at:
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+*/
+
+#include <vnet/session/mma_16.h>
+#include <vnet/session/mma_template.c>
+#include <vnet/session/mma_40.h>
+#include <vnet/session/mma_template.c>
+#include <vnet/session/session_rules_table.h>
+#include <vnet/session/transport.h>
+
+static void
+fib_pref_normalize (fib_prefix_t * pref)
+{
+ if (pref->fp_proto == FIB_PROTOCOL_IP4)
+ ip4_address_normalize (&pref->fp_addr.ip4, pref->fp_len);
+ else
+ ip6_address_normalize (&pref->fp_addr.ip6, pref->fp_len);
+}
+
+u8 *
+format_session_rule4 (u8 * s, va_list * args)
+{
+ mma_rules_table_16_t *srt = va_arg (*args, mma_rules_table_16_t *);
+ mma_rule_16_t *sr = va_arg (*args, mma_rule_16_t *);
+ session_mask_or_match_4_t *mask, *match;
+ int i;
+
+ match = (session_mask_or_match_4_t *) & sr->match;
+ mask = (session_mask_or_match_4_t *) & sr->mask;
+
+ s = format (s, "[%d] rule: %U/%d %d %U/%d %d action: %d",
+ mma_rules_table_rule_index_16 (srt, sr), format_ip4_address,
+ &match->lcl_ip,
+ ip4_mask_to_preflen (&mask->lcl_ip),
+ match->lcl_port, format_ip4_address, &match->rmt_ip,
+ ip4_mask_to_preflen (&mask->rmt_ip),
+ match->rmt_port, sr->action_index);
+ if (vec_len (sr->next_indices))
+ {
+ s = format (s, "\n children: ");
+ for (i = 0; i < vec_len (sr->next_indices); i++)
+ s = format (s, "%d ", sr->next_indices[i]);
+ }
+ return s;
+}
+
+u8 *
+format_session_rule6 (u8 * s, va_list * args)
+{
+ mma_rules_table_40_t *srt = va_arg (*args, mma_rules_table_40_t *);
+ mma_rule_40_t *sr = va_arg (*args, mma_rule_40_t *);
+ session_mask_or_match_6_t *mask, *match;
+ int i;
+
+ match = (session_mask_or_match_6_t *) & sr->match;
+ mask = (session_mask_or_match_6_t *) & sr->mask;
+
+ s = format (s, "[%d] rule: %U/%d %d %U/%d %d action: %d",
+ mma_rules_table_rule_index_40 (srt, sr), format_ip6_address,
+ &match->lcl_ip, ip6_mask_to_preflen (&mask->lcl_ip),
+ match->lcl_port, format_ip6_address, &match->rmt_ip,
+ ip6_mask_to_preflen (&mask->rmt_ip), match->rmt_port,
+ sr->action_index);
+ if (vec_len (sr->next_indices))
+ {
+ s = format (s, "\n children: ");
+ for (i = 0; i < vec_len (sr->next_indices); i++)
+ s = format (s, "%d ", sr->next_indices[i]);
+ }
+ return s;
+}
+
+void *
+session_rules_table_get (session_rules_table_t * srt, u8 transport_proto,
+ u8 fib_proto)
+{
+ if (fib_proto == FIB_PROTOCOL_IP4)
+ return &srt->session_rules_tables_16[transport_proto];
+ else if (fib_proto == FIB_PROTOCOL_IP6)
+ return &srt->session_rules_tables_40[transport_proto];
+ return 0;
+}
+
+int
+rule_cmp_16 (mma_rule_16_t * rule1, mma_rule_16_t * rule2)
+{
+ session_mask_or_match_4_t *m1, *m2;
+
+ m1 = (session_mask_or_match_4_t *) & rule1->max_match;
+ m2 = (session_mask_or_match_4_t *) & rule2->max_match;
+ if (m1->rmt_ip.as_u32 != m2->rmt_ip.as_u32)
+ return (m1->rmt_ip.as_u32 < m2->rmt_ip.as_u32 ? -1 : 1);
+ if (m1->lcl_ip.as_u32 != m2->lcl_ip.as_u32)
+ return (m1->lcl_ip.as_u32 < m2->lcl_ip.as_u32 ? -1 : 1);
+ if (m1->rmt_port != m2->rmt_port)
+ return (m1->rmt_port < m2->rmt_port ? -1 : 1);
+ if (m1->lcl_port != m2->lcl_port)
+ return (m1->lcl_port < m2->lcl_port ? -1 : 1);
+ return 0;
+}
+
+int
+rule_cmp_40 (mma_rule_40_t * rule1, mma_rule_40_t * rule2)
+{
+ session_mask_or_match_6_t *r1, *r2;
+ r1 = (session_mask_or_match_6_t *) & rule1->max_match;
+ r2 = (session_mask_or_match_6_t *) & rule2->max_match;
+ if (r1->rmt_ip.as_u64[0] != r2->rmt_ip.as_u64[0])
+ return (r1->rmt_ip.as_u64[0] < r2->rmt_ip.as_u64[0] ? -1 : 1);
+ if (r1->rmt_ip.as_u64[1] != r2->rmt_ip.as_u64[1])
+ return (r1->rmt_ip.as_u64[1] < r2->rmt_ip.as_u64[1] ? -1 : 1);
+ if (r1->lcl_ip.as_u64[0] != r2->lcl_ip.as_u64[0])
+ return (r1->lcl_ip.as_u64[0] < r2->lcl_ip.as_u64[0] ? -1 : 1);
+ if (r1->lcl_ip.as_u64[1] != r2->lcl_ip.as_u64[1])
+ return (r1->lcl_ip.as_u64[1] < r2->lcl_ip.as_u64[1]) ? -1 : 1;
+ if (r1->rmt_port != r2->rmt_port)
+ return (r1->rmt_port < r2->rmt_port ? -1 : 1);
+ if (r1->lcl_port != r2->lcl_port)
+ return (r1->lcl_port < r2->lcl_port ? -1 : 1);
+ return 0;
+}
+
+void
+session_rules_table_init_rule_16 (mma_rule_16_t * rule,
+ fib_prefix_t * lcl, u16 lcl_port,
+ fib_prefix_t * rmt, u16 rmt_port)
+{
+ session_mask_or_match_4_t *match, *mask, *max_match;
+ fib_pref_normalize (lcl);
+ fib_pref_normalize (rmt);
+ match = (session_mask_or_match_4_t *) & rule->match;
+ match->lcl_ip.as_u32 = lcl->fp_addr.ip4.as_u32;
+ match->rmt_ip.as_u32 = rmt->fp_addr.ip4.as_u32;
+ match->lcl_port = lcl_port;
+ match->rmt_port = rmt_port;
+ mask = (session_mask_or_match_4_t *) & rule->mask;
+ ip4_preflen_to_mask (lcl->fp_len, &mask->lcl_ip);
+ ip4_preflen_to_mask (rmt->fp_len, &mask->rmt_ip);
+ mask->lcl_port = lcl_port == 0 ? 0 : (u16) ~ 0;
+ mask->rmt_port = rmt_port == 0 ? 0 : (u16) ~ 0;
+ max_match = (session_mask_or_match_4_t *) & rule->max_match;
+ ip4_prefix_max_address_host_order (&rmt->fp_addr.ip4, rmt->fp_len,
+ &max_match->rmt_ip);
+ ip4_prefix_max_address_host_order (&lcl->fp_addr.ip4, lcl->fp_len,
+ &max_match->lcl_ip);
+ max_match->lcl_port = lcl_port == 0 ? (u16) ~ 0 : lcl_port;
+ max_match->rmt_port = rmt_port == 0 ? (u16) ~ 0 : rmt_port;
+}
+
+void
+session_rules_table_init_rule_40 (mma_rule_40_t * rule,
+ fib_prefix_t * lcl, u16 lcl_port,
+ fib_prefix_t * rmt, u16 rmt_port)
+{
+ session_mask_or_match_6_t *match, *mask, *max_match;
+ fib_pref_normalize (lcl);
+ fib_pref_normalize (rmt);
+ match = (session_mask_or_match_6_t *) & rule->match;
+ clib_memcpy (&match->lcl_ip, &lcl->fp_addr.ip6, sizeof (match->lcl_ip));
+ clib_memcpy (&match->rmt_ip, &rmt->fp_addr.ip6, sizeof (match->rmt_ip));
+ match->lcl_port = lcl_port;
+ match->rmt_port = rmt_port;
+ mask = (session_mask_or_match_6_t *) & rule->mask;
+ ip6_preflen_to_mask (lcl->fp_len, &mask->lcl_ip);
+ ip6_preflen_to_mask (rmt->fp_len, &mask->rmt_ip);
+ mask->lcl_port = lcl_port == 0 ? 0 : (u16) ~ 0;
+ mask->rmt_port = rmt_port == 0 ? 0 : (u16) ~ 0;
+ max_match = (session_mask_or_match_6_t *) & rule->max_match;
+ ip6_prefix_max_address_host_order (&rmt->fp_addr.ip6, rmt->fp_len,
+ &max_match->rmt_ip);
+ ip6_prefix_max_address_host_order (&lcl->fp_addr.ip6, lcl->fp_len,
+ &max_match->lcl_ip);
+ max_match->lcl_port = lcl_port == 0 ? (u16) ~ 0 : lcl_port;
+ max_match->rmt_port = rmt_port == 0 ? (u16) ~ 0 : rmt_port;
+}
+
+mma_rule_16_t *
+session_rules_table_alloc_rule_16 (mma_rules_table_16_t * srt,
+ fib_prefix_t * lcl, u16 lcl_port,
+ fib_prefix_t * rmt, u16 rmt_port)
+{
+ mma_rule_16_t *rule = 0;
+ rule = mma_rules_table_rule_alloc_16 (srt);
+ session_rules_table_init_rule_16 (rule, lcl, lcl_port, rmt, rmt_port);
+ return rule;
+}
+
+mma_rule_40_t *
+session_rules_table_alloc_rule_40 (mma_rules_table_40_t * srt,
+ fib_prefix_t * lcl, u16 lcl_port,
+ fib_prefix_t * rmt, u16 rmt_port)
+{
+ mma_rule_40_t *rule;
+ rule = mma_rules_table_rule_alloc_40 (srt);
+ session_rules_table_init_rule_40 (rule, lcl, lcl_port, rmt, rmt_port);
+ return rule;
+}
+
+clib_error_t *
+session_rules_table_add_del (session_rules_table_t * srt,
+ session_rule_table_add_del_args_t * args)
+{
+ u8 fib_proto = args->rmt.fp_proto;
+
+ if (args->transport_proto != TRANSPORT_PROTO_TCP
+ && args->transport_proto != TRANSPORT_PROTO_UDP)
+ return clib_error_return_code (0, VNET_API_ERROR_INVALID_VALUE, 0,
+ "invalid transport proto");
+
+ if (fib_proto == FIB_PROTOCOL_IP4)
+ {
+ mma_rules_table_16_t *srt4;
+ srt4 = &srt->session_rules_tables_16[args->transport_proto];
+ if (args->is_add)
+ {
+ mma_rule_16_t *rule;
+ rule = session_rules_table_alloc_rule_16 (srt4, &args->lcl,
+ args->lcl_port,
+ &args->rmt,
+ args->rmt_port);
+ rule->action_index = args->action_index;
+ mma_rules_table_add_rule_16 (srt4, rule);
+ }
+ else
+ {
+ mma_rule_16_t rule;
+ memset (&rule, 0, sizeof (rule));
+ session_rules_table_init_rule_16 (&rule, &args->lcl, args->lcl_port,
+ &args->rmt, args->rmt_port);
+ mma_rules_table_del_rule_16 (srt4, &rule, srt4->root_index);
+ }
+ }
+ else if (fib_proto == FIB_PROTOCOL_IP6)
+ {
+ mma_rules_table_40_t *srt6;
+ mma_rule_40_t *rule;
+ srt6 = &srt->session_rules_tables_40[args->transport_proto];
+ if (args->is_add)
+ {
+ rule = session_rules_table_alloc_rule_40 (srt6, &args->lcl,
+ args->lcl_port,
+ &args->rmt,
+ args->rmt_port);
+ rule->action_index = args->action_index;
+ mma_rules_table_add_rule_40 (srt6, rule);
+ }
+ else
+ {
+ mma_rule_40_t rule;
+ memset (&rule, 0, sizeof (rule));
+ session_rules_table_init_rule_40 (&rule, &args->lcl, args->lcl_port,
+ &args->rmt, args->rmt_port);
+ mma_rules_table_del_rule_40 (srt6, &rule, srt6->root_index);
+ }
+ }
+ else
+ return clib_error_return_code (0, VNET_API_ERROR_INVALID_VALUE_2, 0,
+ "invalid fib proto");
+ return 0;
+}
+
+u32
+session_rules_table_lookup4 (session_rules_table_t * srt, u8 transport_proto,
+ ip4_address_t * lcl_ip, ip4_address_t * rmt_ip,
+ u16 lcl_port, u16 rmt_port)
+{
+ mma_rules_table_16_t *srt4 = &srt->session_rules_tables_16[transport_proto];
+ session_mask_or_match_4_t key = {
+ .lcl_ip.as_u32 = lcl_ip->as_u32,
+ .rmt_ip.as_u32 = rmt_ip->as_u32,
+ .lcl_port = lcl_port,
+ .rmt_port = rmt_port,
+ };
+ return mma_rules_table_lookup_16 (srt4,
+ (mma_mask_or_match_16_t *) & key,
+ srt4->root_index);
+}
+
+u32
+session_rules_table_lookup6 (session_rules_table_t * srt, u8 transport_proto,
+ ip6_address_t * lcl_ip, ip6_address_t * rmt_ip,
+ u16 lcl_port, u16 rmt_port)
+{
+ mma_rules_table_40_t *srt6 = &srt->session_rules_tables_40[transport_proto];
+ session_mask_or_match_6_t key = {
+ .lcl_port = lcl_port,
+ .rmt_port = rmt_port,
+ };
+ clib_memcpy (&key.lcl_ip, &lcl_ip, sizeof (&lcl_ip));
+ clib_memcpy (&key.rmt_ip, &rmt_ip, sizeof (&rmt_ip));
+ return mma_rules_table_lookup_40 (srt6,
+ (mma_mask_or_match_40_t *) & key,
+ srt6->root_index);
+}
+
+void
+session_rules_table_init (session_rules_table_t * srt)
+{
+ mma_rules_table_16_t *srt4;
+ mma_rules_table_40_t *srt6;
+ mma_rule_16_t *rule4;
+ mma_rule_40_t *rule6;
+ fib_prefix_t null_prefix;
+ int i;
+
+ memset (&null_prefix, 0, sizeof (null_prefix));
+
+ for (i = 0; i < TRANSPORT_N_PROTO; i++)
+ {
+ srt4 = &srt->session_rules_tables_16[i];
+ rule4 = session_rules_table_alloc_rule_16 (srt4, &null_prefix, 0,
+ &null_prefix, 0);
+ rule4->action_index = SESSION_RULES_TABLE_INVALID_INDEX;
+ srt4->root_index = mma_rules_table_rule_index_16 (srt4, rule4);
+ srt4->rule_cmp_fn = rule_cmp_16;
+ }
+
+ for (i = 0; i < TRANSPORT_N_PROTO; i++)
+ {
+ srt6 = &srt->session_rules_tables_40[i];;
+ rule6 = session_rules_table_alloc_rule_40 (srt6, &null_prefix, 0,
+ &null_prefix, 0);
+ rule6->action_index = SESSION_RULES_TABLE_INVALID_INDEX;
+ srt6->root_index = mma_rules_table_rule_index_40 (srt6, rule6);
+ srt6->rule_cmp_fn = rule_cmp_40;
+ }
+}
+
+void
+session_rules_table_show_rule (vlib_main_t * vm, session_rules_table_t * srt,
+ u8 transport_proto, ip46_address_t * lcl_ip,
+ u16 lcl_port, ip46_address_t * rmt_ip,
+ u16 rmt_port, u8 is_ip4)
+{
+ mma_rules_table_16_t *srt4;
+ mma_rules_table_40_t *srt6;
+ mma_rule_16_t *sr4;
+ mma_rule_40_t *sr6;
+ u32 ri;
+
+ if (is_ip4)
+ {
+ srt4 = session_rules_table_get (srt, transport_proto, FIB_PROTOCOL_IP4);
+ session_mask_or_match_4_t key = {
+ .lcl_ip.as_u32 = lcl_ip->ip4.as_u32,
+ .rmt_ip.as_u32 = rmt_ip->ip4.as_u32,
+ .lcl_port = lcl_port,
+ .rmt_port = rmt_port,
+ };
+ ri =
+ mma_rules_table_lookup_rule_16 (srt4,
+ (mma_mask_or_match_16_t *) & key,
+ srt4->root_index);
+ sr4 = mma_rules_table_get_rule_16 (srt4, ri);
+ vlib_cli_output (vm, "%U", format_session_rule4, srt4, sr4);
+ }
+ else
+ {
+ srt6 = session_rules_table_get (srt, transport_proto, FIB_PROTOCOL_IP6);
+ session_mask_or_match_6_t key = {
+ .lcl_port = lcl_port,
+ .rmt_port = rmt_port,
+ };
+ clib_memcpy (&key.lcl_ip, &lcl_ip->ip6, sizeof (&lcl_ip->ip6));
+ clib_memcpy (&key.rmt_ip, &rmt_ip->ip6, sizeof (&rmt_ip->ip6));
+ ri =
+ mma_rules_table_lookup_rule_40 (srt6,
+ (mma_mask_or_match_40_t *) &
+ key, srt6->root_index);
+ sr6 = mma_rules_table_get_rule_40 (srt6, ri);
+ vlib_cli_output (vm, "%U", format_session_rule6, srt6, sr6);
+ }
+}
+
+void
+session_rules_table_cli_dump (vlib_main_t * vm, session_rules_table_t * srt,
+ u8 fib_proto, u8 transport_proto)
+{
+ if (fib_proto == FIB_PROTOCOL_IP4)
+ {
+ mma_rules_table_16_t *srt4;
+ mma_rule_16_t *sr4;
+ srt4 = &srt->session_rules_tables_16[transport_proto];
+ vlib_cli_output (vm, "%U IP4 rules table", format_transport_proto,
+ transport_proto);
+
+ /* *INDENT-OFF* */
+ pool_foreach(sr4, srt4->rules, ({
+ vlib_cli_output (vm, "%U", format_session_rule4, srt4, sr4);
+ }));
+ /* *INDENT-ON* */
+
+ }
+ else if (fib_proto == FIB_PROTOCOL_IP6)
+ {
+ mma_rules_table_40_t *srt6;
+ mma_rule_40_t *sr6;
+ srt6 = &srt->session_rules_tables_40[transport_proto];
+ vlib_cli_output (vm, "\n%U IP6 rules table", format_transport_proto,
+ transport_proto);
+
+ /* *INDENT-OFF* */
+ pool_foreach(sr6, srt6->rules, ({
+ vlib_cli_output (vm, "%U", format_session_rule6, srt6, sr6);
+ }));
+ /* *INDENT-ON* */
+
+ }
+}
+
+/*
+ * fd.io coding-style-patch-verification: ON
+ *
+ * Local Variables:
+ * eval: (c-set-style "gnu")
+ * End:
+ */