/* * Copyright (c) 2017-2019 Cisco and/or its affiliates. * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at: * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include #include #include #include #include #include #include #include #include VLIB_REGISTER_LOG_CLASS (session_rt_log, static) = { .class_name = "session", .subclass_name = "rt" }; #define log_debug(fmt, ...) \ vlib_log_debug (session_rt_log.class, "%s: " fmt, __func__, __VA_ARGS__) #define log_warn(fmt, ...) \ vlib_log_warn (session_rt_log.class, fmt, __VA_ARGS__) #define log_err(fmt, ...) vlib_log_err (session_rt_log.class, fmt, __VA_ARGS__) static session_rules_table_group_t *srt_instances; const session_rt_engine_vft_t *session_rt_engine_vft; u32 session_rule_tag_key_index (u32 ri, u8 is_ip4) { return ((ri << 1) | is_ip4); } void session_rule_tag_key_index_parse (u32 rti_key, u32 * ri, u8 * is_ip4) { *is_ip4 = rti_key & 1; *ri = rti_key >> 1; } u8 * session_rules_table_rule_tag (session_rules_table_t * srt, u32 ri, u8 is_ip4) { uword *tip; session_rule_tag_t *rt; tip = hash_get (srt->tags_by_rules, session_rule_tag_key_index (ri, is_ip4)); if (tip) { rt = pool_elt_at_index (srt->rule_tags, *tip); return rt->tag; } return 0; } void session_rules_table_del_tag (session_rules_table_t * srt, u8 * tag, u8 is_ip4) { uword *rip, *rtip; session_rule_tag_t *rt; u32 rti_key; if (tag == 0) return; rip = hash_get_mem (srt->rules_by_tag, tag); if (!rip) { clib_warning ("tag has no rule associated"); return; } rti_key = session_rule_tag_key_index (*rip, is_ip4); rtip = hash_get (srt->tags_by_rules, rti_key); if (!rtip) { clib_warning ("rule has no tag associated"); return; } rt = pool_elt_at_index (srt->rule_tags, *rtip); ASSERT (rt); hash_unset_mem (srt->rules_by_tag, tag); hash_unset (srt->tags_by_rules, rti_key); vec_free (rt->tag); pool_put (srt->rule_tags, rt); } void session_rules_table_add_tag (session_rules_table_t * srt, u8 * tag, u32 rule_index, u8 is_ip4) { uword *rip; session_rule_tag_t *rt; u32 rti_key; if (tag == 0) return; rip = hash_get_mem (srt->rules_by_tag, tag); if (rip) session_rules_table_del_tag (srt, tag, is_ip4); pool_get (srt->rule_tags, rt); rt->tag = vec_dup (tag); hash_set_mem (srt->rules_by_tag, rt->tag, rule_index); rti_key = session_rule_tag_key_index (rule_index, is_ip4); hash_set (srt->tags_by_rules, rti_key, rt - srt->rule_tags); } u32 session_rules_table_rule_for_tag (session_rules_table_t * srt, u8 * tag) { uword *rp; if (tag == 0) return SESSION_RULES_TABLE_INVALID_INDEX; rp = hash_get_mem (srt->rules_by_tag, tag); return (rp == 0 ? SESSION_RULES_TABLE_INVALID_INDEX : *rp); } static void fib_pref_normalize (fib_prefix_t * pref) { if (pref->fp_proto == FIB_PROTOCOL_IP4) ip4_address_normalize (&pref->fp_addr.ip4, pref->fp_len); else ip6_address_normalize (&pref->fp_addr.ip6, pref->fp_len); } u8 * format_session_rule_tag (u8 *s, va_list *args) { static u8 *null_tag = 0; u8 *tag = va_arg (*args, u8 *); if (!null_tag) null_tag = format (0, "none"); s = format (s, "%v", (tag != 0) ? tag : null_tag); return s; } u8 * format_session_rule4 (u8 * s, va_list * args) { session_rules_table_t *srt = va_arg (*args, session_rules_table_t *); mma_rule_16_t *sr = va_arg (*args, mma_rule_16_t *); session_mask_or_match_4_t *mask, *match; mma_rules_table_16_t *srt4; u8 *tag = 0; u32 ri; int i; srt4 = &srt->session_rules_tables_16; ri = mma_rules_table_rule_index_16 (srt4, sr); tag = session_rules_table_rule_tag (srt, ri, 1); match = (session_mask_or_match_4_t *) & sr->match; mask = (session_mask_or_match_4_t *) & sr->mask; s = format (s, "[%d] rule: %U/%d %d %U/%d %d action: %d tag: %U", ri, format_ip4_address, &match->lcl_ip, ip4_mask_to_preflen (&mask->lcl_ip), match->lcl_port, format_ip4_address, &match->rmt_ip, ip4_mask_to_preflen (&mask->rmt_ip), match->rmt_port, sr->action_index, format_session_rule_tag, tag); if (vec_len (sr->next_indices)) { s = format (s, "\n children: "); for (i = 0; i < vec_len (sr->next_indices); i++) s = format (s, "%d ", sr->next_indices[i]); } return s; } u8 * format_session_rule6 (u8 * s, va_list * args) { session_rules_table_t *srt = va_arg (*args, session_rules_table_t *); mma_rule_40_t *sr = va_arg (*args, mma_rule_40_t *); session_mask_or_match_6_t *mask, *match; mma_rules_table_40_t *srt6; u8 *tag = 0; u32 ri; int i; srt6 = &srt->session_rules_tables_40; ri = mma_rules_table_rule_index_40 (srt6, sr); tag = session_rules_table_rule_tag (srt, ri, 0); match = (session_mask_or_match_6_t *) & sr->match; mask = (session_mask_or_match_6_t *) & sr->mask; s = format (s, "[%d] rule: %U/%d %d %U/%d %d action: %d tag: %U", ri, format_ip6_address, &match->lcl_ip, ip6_mask_to_preflen (&mask->lcl_ip), match->lcl_port, format_ip6_address, &match->rmt_ip, ip6_mask_to_preflen (&mask->rmt_ip), match->rmt_port, sr->action_index, format_session_rule_tag, tag); if (vec_len (sr->next_indices)) { s = format (s, "\n children: "); for (i = 0; i < vec_len (sr->next_indices); i++) s = format (s, "%d ", sr->next_indices[i]); } return s; } void * session_rules_table_get (session_rules_table_t * srt, u8 fib_proto) { if (fib_proto == FIB_PROTOCOL_IP4) return &srt->session_rules_tables_16; else if (fib_proto == FIB_PROTOCOL_IP6) return &srt->session_rules_tables_40; return 0; } int rule_cmp_16 (mma_rule_16_t * rule1, mma_rule_16_t * rule2) { session_mask_or_match_4_t *m1, *m2; m1 = (session_mask_or_match_4_t *) & rule1->max_match; m2 = (session_mask_or_match_4_t *) & rule2->max_match; if (m1->rmt_ip.as_u32 != m2->rmt_ip.as_u32) return (m1->rmt_ip.as_u32 < m2->rmt_ip.as_u32 ? -1 : 1); if (m1->lcl_ip.as_u32 != m2->lcl_ip.as_u32) return (m1->lcl_ip.as_u32 < m2->lcl_ip.as_u32 ? -1 : 1); if (m1->rmt_port != m2->rmt_port) return (m1->rmt_port < m2->rmt_port ? -1 : 1); if (m1->lcl_port != m2->lcl_port) return (m1->lcl_port < m2->lcl_port ? -1 : 1); return 0; } int rule_cmp_40 (mma_rule_40_t * rule1, mma_rule_40_t * rule2) { session_mask_or_match_6_t *r1, *r2; r1 = (session_mask_or_match_6_t *) & rule1->max_match; r2 = (session_mask_or_match_6_t *) & rule2->max_match; if (r1->rmt_ip.as_u64[0] != r2->rmt_ip.as_u64[0]) return (r1->rmt_ip.as_u64[0] < r2->rmt_ip.as_u64[0] ? -1 : 1); if (r1->rmt_ip.as_u64[1] != r2->rmt_ip.as_u64[1]) return (r1->rmt_ip.as_u64[1] < r2->rmt_ip.as_u64[1] ? -1 : 1); if (r1->lcl_ip.as_u64[0] != r2->lcl_ip.as_u64[0]) return (r1->lcl_ip.as_u64[0] < r2->lcl_ip.as_u64[0] ? -1 : 1); if (r1->lcl_ip.as_u64[1] != r2->lcl_ip.as_u64[1]) return (r1->lcl_ip.as_u64[1] < r2->lcl_ip.as_u64[1]) ? -1 : 1; if (r1->rmt_port != r2->rmt_port) return (r1->rmt_port < r2->rmt_port ? -1 : 1); if (r1->lcl_port != r2->lcl_port) return (r1->lcl_port < r2->lcl_port ? -1 : 1); return 0; } void session_rules_table_init_rule_16 (mma_rule_16_t * rule, fib_prefix_t * lcl, u16 lcl_port, fib_prefix_t * rmt, u16 rmt_port) { session_mask_or_match_4_t *match, *mask, *max_match; fib_pref_normalize (lcl); fib_pref_normalize (rmt); match = (session_mask_or_match_4_t *) & rule->match; match->lcl_ip.as_u32 = lcl->fp_addr.ip4.as_u32; match->rmt_ip.as_u32 = rmt->fp_addr.ip4.as_u32; match->lcl_port = lcl_port; match->rmt_port = rmt_port; mask = (session_mask_or_match_4_t *) & rule->mask; ip4_preflen_to_mask (lcl->fp_len, &mask->lcl_ip); ip4_preflen_to_mask (rmt->fp_len, &mask->rmt_ip); mask->lcl_port = lcl_port == 0 ? 0 : (u16) ~ 0; mask->rmt_port = rmt_port == 0 ? 0 : (u16) ~ 0; max_match = (session_mask_or_match_4_t *) & rule->max_match; ip4_prefix_max_address_host_order (&rmt->fp_addr.ip4, rmt->fp_len, &max_match->rmt_ip); ip4_prefix_max_address_host_order (&lcl->fp_addr.ip4, lcl->fp_len, &max_match->lcl_ip); max_match->lcl_port = lcl_port == 0 ? (u16) ~ 0 : lcl_port; max_match->rmt_port = rmt_port == 0 ? (u16) ~ 0 : rmt_port; } void session_rules_table_init_rule_40 (mma_rule_40_t * rule, fib_prefix_t * lcl, u16 lcl_port, fib_prefix_t * rmt, u16 rmt_port) { session_mask_or_match_6_t *match, *mask, *max_match; fib_pref_normalize (lcl); fib_pref_normalize (rmt); match = (session_mask_or_match_6_t *) & rule->match; clib_memcpy_fast (&match->lcl_ip, &lcl->fp_addr.ip6, sizeof (match->lcl_ip)); clib_memcpy_fast (&match->rmt_ip, &rmt->fp_addr.ip6, sizeof (match->rmt_ip)); match->lcl_port = lcl_port; match->rmt_port = rmt_port; mask = (session_mask_or_match_6_t *) & rule->mask; ip6_preflen_to_mask (lcl->fp_len, &mask->lcl_ip); ip6_preflen_to_mask (rmt->fp_len, &mask->rmt_ip); mask->lcl_port = lcl_port == 0 ? 0 : (u16) ~ 0; mask->rmt_port = rmt_port == 0 ? 0 : (u16) ~ 0; max_match = (session_mask_or_match_6_t *) & rule->max_match; ip6_prefix_max_address_host_order (&rmt->fp_addr.ip6, rmt->fp_len, &max_match->rmt_ip); ip6_prefix_max_address_host_order (&lcl->fp_addr.ip6, lcl->fp_len, &max_match->lcl_ip); max_match->lcl_port = lcl_port == 0 ? (u16) ~ 0 : lcl_port; max_match->rmt_port = rmt_port == 0 ? (u16) ~ 0 : rmt_port; } mma_rule_16_t * session_rules_table_alloc_rule_16 (mma_rules_table_16_t * srt, fib_prefix_t * lcl, u16 lcl_port, fib_prefix_t * rmt, u16 rmt_port) { mma_rule_16_t *rule = 0; rule = mma_rules_table_rule_alloc_16 (srt); session_rules_table_init_rule_16 (rule, lcl, lcl_port, rmt, rmt_port); return rule; } mma_rule_40_t * session_rules_table_alloc_rule_40 (mma_rules_table_40_t * srt, fib_prefix_t * lcl, u16 lcl_port, fib_prefix_t * rmt, u16 rmt_port) { mma_rule_40_t *rule; rule = mma_rules_table_rule_alloc_40 (srt); session_rules_table_init_rule_40 (rule, lcl, lcl_port, rmt, rmt_port); return rule; } static u32 session_rules_table_lookup_rule4 (session_rules_table_t *srt, ip4_address_t *lcl_ip, ip4_address_t *rmt_ip, u16 lcl_port, u16 rmt_port) { mma_rules_table_16_t *srt4 = &srt->session_rules_tables_16; session_mask_or_match_4_t key = { .lcl_ip.as_u32 = lcl_ip->as_u32, .rmt_ip.as_u32 = rmt_ip->as_u32, .lcl_port = lcl_port, .rmt_port = rmt_port, }; if (srt4->rules == 0) return SESSION_TABLE_INVALID_INDEX; return mma_rules_table_lookup_rule_16 (srt4, (mma_mask_or_match_16_t *) & key, srt4->root_index); } u32 session_rules_table_lookup4_ (u32 srtg_handle, u32 proto, ip4_address_t *lcl_ip, ip4_address_t *rmt_ip, u16 lcl_port, u16 rmt_port) { session_rules_table_t *srt = srtg_handle_to_srt (srtg_handle, proto); mma_rules_table_16_t *srt4 = &srt->session_rules_tables_16; session_mask_or_match_4_t key = { .lcl_ip.as_u32 = lcl_ip->as_u32, .rmt_ip.as_u32 = rmt_ip->as_u32, .lcl_port = lcl_port, .rmt_port = rmt_port, }; if (srt4->rules == 0) return SESSION_TABLE_INVALID_INDEX; return mma_rules_table_lookup_16 (srt4, (mma_mask_or_match_16_t *) & key, srt4->root_index); } session_rules_table_t * srtg_handle_to_srt (u32 srtg_handle, u32 proto) { session_rules_table_group_t *srtg = pool_elt_at_index (srt_instances, srtg_handle); session_rules_table_t *srt = &srtg->session_rules[proto]; return srt; } static u32 session_rules_table_lookup_rule6 (session_rules_table_t *srt, ip6_address_t *lcl_ip, ip6_address_t *rmt_ip, u16 lcl_port, u16 rmt_port) { mma_rules_table_40_t *srt6 = &srt->session_rules_tables_40; session_mask_or_match_6_t key = { .lcl_port = lcl_port, .rmt_port = rmt_port, }; if (srt6->rules == 0) return SESSION_TABLE_INVALID_INDEX; clib_memcpy_fast (&key.lcl_ip, lcl_ip, sizeof (*lcl_ip)); clib_memcpy_fast (&key.rmt_ip, rmt_ip, sizeof (*rmt_ip)); return mma_rules_table_lookup_rule_40 (srt6, (mma_mask_or_match_40_t *) & key, srt6->root_index); } u32 session_rules_table_lookup6_ (u32 srtg_handle, u32 proto, ip6_address_t *lcl_ip, ip6_address_t *rmt_ip, u16 lcl_port, u16 rmt_port) { session_rules_table_t *srt = srtg_handle_to_srt (srtg_handle, proto); mma_rules_table_40_t *srt6 = &srt->session_rules_tables_40; session_mask_or_match_6_t key = { .lcl_port = lcl_port, .rmt_port = rmt_port, }; if (srt6->rules == 0) return SESSION_TABLE_INVALID_INDEX; clib_memcpy_fast (&key.lcl_ip, lcl_ip, sizeof (*lcl_ip)); clib_memcpy_fast (&key.rmt_ip, rmt_ip, sizeof (*rmt_ip)); return mma_rules_table_lookup_40 (srt6, (mma_mask_or_match_40_t *) & key, srt6->root_index); } /** * Add/delete session rule * * @param srt table where rule should be added * @param args rule arguments * * @return 0 if success, session_error_t error otherwise */ session_error_t session_rules_table_add_del_ (u32 srtg_handle, u32 proto, session_rule_table_add_del_args_t *args) { session_rules_table_t *srt = srtg_handle_to_srt (srtg_handle, proto); u8 fib_proto = args->rmt.fp_proto, *rt; u32 ri_from_tag, ri; int rv; ri_from_tag = session_rules_table_rule_for_tag (srt, args->tag); if (args->is_add && ri_from_tag != SESSION_RULES_TABLE_INVALID_INDEX) return SESSION_E_INVALID; if (fib_proto == FIB_PROTOCOL_IP4) { mma_rules_table_16_t *srt4; srt4 = &srt->session_rules_tables_16; if (args->is_add) { mma_rule_16_t *rule4; rule4 = session_rules_table_alloc_rule_16 (srt4, &args->lcl, args->lcl_port, &args->rmt, args->rmt_port); rule4->action_index = args->action_index; rv = mma_rules_table_add_rule_16 (srt4, rule4); if (!rv) { ri = mma_rules_table_rule_index_16 (srt4, rule4); session_rules_table_add_tag (srt, args->tag, ri, 1); } else { ri = session_rules_table_lookup_rule4 (srt, &args->lcl.fp_addr.ip4, &args->rmt.fp_addr.ip4, args->lcl_port, args->rmt_port); if (ri != SESSION_RULES_TABLE_INVALID_INDEX) { rt = session_rules_table_rule_tag (srt, ri, 1); session_rules_table_del_tag (srt, rt, 1); session_rules_table_add_tag (srt, args->tag, ri, 1); } } } else { mma_rule_16_t *rule; if (ri_from_tag != SESSION_RULES_TABLE_INVALID_INDEX) { rule = mma_rules_table_get_rule_16 (srt4, ri_from_tag); mma_rules_table_del_rule_16 (srt4, rule, srt4->root_index); session_rules_table_del_tag (srt, args->tag, 1); } else { mma_rule_16_t _rule; rule = &_rule; clib_memset (rule, 0, sizeof (*rule)); session_rules_table_init_rule_16 (rule, &args->lcl, args->lcl_port, &args->rmt, args->rmt_port); mma_rules_table_del_rule_16 (srt4, rule, srt4->root_index); } } } else if (fib_proto == FIB_PROTOCOL_IP6) { mma_rules_table_40_t *srt6; mma_rule_40_t *rule6; srt6 = &srt->session_rules_tables_40; if (args->is_add) { rule6 = session_rules_table_alloc_rule_40 (srt6, &args->lcl, args->lcl_port, &args->rmt, args->rmt_port); rule6->action_index = args->action_index; rv = mma_rules_table_add_rule_40 (srt6, rule6); if (!rv) { ri = mma_rules_table_rule_index_40 (srt6, rule6); session_rules_table_add_tag (srt, args->tag, ri, 0); } else { ri = session_rules_table_lookup_rule6 (srt, &args->lcl.fp_addr.ip6, &args->rmt.fp_addr.ip6, args->lcl_port, args->rmt_port); if (ri != SESSION_RULES_TABLE_INVALID_INDEX) { rt = session_rules_table_rule_tag (srt, ri, 0); session_rules_table_del_tag (srt, rt, 1); session_rules_table_add_tag (srt, args->tag, ri, 0); } } } else { mma_rule_40_t *rule; if (ri_from_tag != SESSION_RULES_TABLE_INVALID_INDEX) { rule = mma_rules_table_get_rule_40 (srt6, ri_from_tag); mma_rules_table_del_rule_40 (srt6, rule, srt6->root_index); session_rules_table_del_tag (srt, args->tag, 0); } else { mma_rule_40_t _rule; rule = &_rule; clib_memset (rule, 0, sizeof (*rule)); session_rules_table_init_rule_40 (rule, &args->lcl, args->lcl_port, &args->rmt, args->rmt_port); mma_rules_table_del_rule_40 (srt6, rule, srt6->root_index); } } } else return SESSION_E_INVALID; return 0; } void session_rules_table_free_ (session_table_t *st, u8 fib_proto) { session_rules_table_group_t *srtg = pool_elt_at_index (srt_instances, st->srtg_handle); session_rules_table_t *srt; vec_foreach (srt, srtg->session_rules) { mma_rules_table_free_16 (&srt->session_rules_tables_16); mma_rules_table_free_40 (&srt->session_rules_tables_40); hash_free (srt->tags_by_rules); hash_free (srt->rules_by_tag); } srtg_instance_free (st); } void srtg_instance_free (session_table_t *st) { session_rules_table_group_t *srtg = pool_elt_at_index (srt_instances, st->srtg_handle); vec_free (srtg->session_rules); pool_put (srt_instances, srtg); st->srtg_handle = SESSION_SRTG_HANDLE_INVALID; } session_rules_table_group_t * srtg_instance_alloc (session_table_t *st, u32 n_proto) { session_rules_table_group_t *srtg; pool_get (srt_instances, srtg); vec_validate (srtg->session_rules, n_proto); st->srtg_handle = srtg - srt_instances; return (srtg); } void session_rules_table_init_ (session_table_t *st, u8 fib_proto) { mma_rules_table_16_t *srt4; mma_rules_table_40_t *srt6; mma_rule_16_t *rule4; mma_rule_40_t *rule6; fib_prefix_t null_prefix; session_rules_table_t *srt; session_rules_table_group_t *srtg; srtg = srtg_instance_alloc (st, TRANSPORT_N_PROTOS - 1); clib_memset (&null_prefix, 0, sizeof (null_prefix)); vec_foreach (srt, srtg->session_rules) { srt4 = &srt->session_rules_tables_16; ASSERT (srt4->rules == 0); rule4 = session_rules_table_alloc_rule_16 (srt4, &null_prefix, 0, &null_prefix, 0); rule4->action_index = SESSION_RULES_TABLE_INVALID_INDEX; srt4->root_index = mma_rules_table_rule_index_16 (srt4, rule4); srt4->rule_cmp_fn = rule_cmp_16; srt6 = &srt->session_rules_tables_40; ASSERT (srt6->rules == 0); rule6 = session_rules_table_alloc_rule_40 (srt6, &null_prefix, 0, &null_prefix, 0); rule6->action_index = SESSION_RULES_TABLE_INVALID_INDEX; srt6->root_index = mma_rules_table_rule_index_40 (srt6, rule6); srt6->rule_cmp_fn = rule_cmp_40; srt->rules_by_tag = hash_create_vec (0, sizeof (u8), sizeof (uword)); srt->tags_by_rules = hash_create (0, sizeof (uword)); } } void session_rules_table_show_rule_ (vlib_main_t *vm, u32 srtg_handle, u32 proto, ip46_address_t *lcl_ip, u16 lcl_port, ip46_address_t *rmt_ip, u16 rmt_port, u8 is_ip4) { session_rules_table_t *srt = srtg_handle_to_srt (srtg_handle, proto); mma_rules_table_16_t *srt4; mma_rules_table_40_t *srt6; mma_rule_16_t *sr4; mma_rule_40_t *sr6; u32 ri; if (is_ip4) { srt4 = session_rules_table_get (srt, FIB_PROTOCOL_IP4); session_mask_or_match_4_t key = { .lcl_ip.as_u32 = lcl_ip->ip4.as_u32, .rmt_ip.as_u32 = rmt_ip->ip4.as_u32, .lcl_port = lcl_port, .rmt_port = rmt_port, }; ri = mma_rules_table_lookup_rule_16 (srt4, (mma_mask_or_match_16_t *) & key, srt4->root_index); sr4 = mma_rules_table_get_rule_16 (srt4, ri); vlib_cli_output (vm, "%U", format_session_rule4, srt, sr4); } else { srt6 = session_rules_table_get (srt, FIB_PROTOCOL_IP6); session_mask_or_match_6_t key = { .lcl_port = lcl_port, .rmt_port = rmt_port, }; clib_memcpy_fast (&key.lcl_ip, &lcl_ip->ip6, sizeof (lcl_ip->ip6)); clib_memcpy_fast (&key.rmt_ip, &rmt_ip->ip6, sizeof (rmt_ip->ip6)); ri = mma_rules_table_lookup_rule_40 (srt6, (mma_mask_or_match_40_t *) & key, srt6->root_index); sr6 = mma_rules_table_get_rule_40 (srt6, ri); vlib_cli_output (vm, "%U", format_session_rule6, srt, sr6); } } void session_rules_table_cli_dump_ (vlib_main_t *vm, u32 srtg_handle, u32 proto, u8 fib_proto) { session_rules_table_t *srt = srtg_handle_to_srt (srtg_handle, proto); if (fib_proto == FIB_PROTOCOL_IP4) { mma_rules_table_16_t *srt4; mma_rule_16_t *sr4; srt4 = &srt->session_rules_tables_16; vlib_cli_output (vm, "IP4 rules"); pool_foreach (sr4, srt4->rules) { vlib_cli_output (vm, "%U", format_session_rule4, srt, sr4); } } else if (fib_proto == FIB_PROTOCOL_IP6) { mma_rules_table_40_t *srt6; mma_rule_40_t *sr6; srt6 = &srt->session_rules_tables_40; vlib_cli_output (vm, "IP6 rules"); pool_foreach (sr6, srt6->rules) { vlib_cli_output (vm, "%U", format_session_rule6, srt, sr6); } } } static const session_rt_engine_vft_t session_rules_table_vft = { .backend_engine = RT_BACKEND_ENGINE_RULE_TABLE, .table_lookup4 = session_rules_table_lookup4_, .table_lookup6 = session_rules_table_lookup6_, .table_cli_dump = session_rules_table_cli_dump_, .table_show_rule = session_rules_table_show_rule_, .table_add_del = session_rules_table_add_del_, .table_init = session_rules_table_init_, .table_free = session_rules_table_free_, }; static void session_rules_table_app_namespace_walk_cb (app_namespace_t *app_ns, void *ctx) { u32 fib_index, table_index; session_table_t *st; log_debug ("disable app_ns %s", app_ns->ns_id); st = session_table_get (app_ns->local_table_index); if (st) session_rules_table_free (st, FIB_PROTOCOL_MAX); fib_index = app_namespace_get_fib_index (app_ns, FIB_PROTOCOL_IP4); table_index = session_lookup_get_index_for_fib (FIB_PROTOCOL_IP4, fib_index); st = session_table_get (table_index); if (st) session_rules_table_free (st, FIB_PROTOCOL_IP4); fib_index = app_namespace_get_fib_index (app_ns, FIB_PROTOCOL_IP6); table_index = session_lookup_get_index_for_fib (FIB_PROTOCOL_IP6, fib_index); st = session_table_get (table_index); if (st) session_rules_table_free (st, FIB_PROTOCOL_IP6); } clib_error_t * session_rules_table_enable_disable (int enable) { clib_error_t *error; if (enable) error = session_rule_table_register_engine (&session_rules_table_vft); else { app_namespace_walk (session_rules_table_app_namespace_walk_cb, 0); error = session_rule_table_deregister_engine (&session_rules_table_vft); } return error; } clib_error_t * session_rt_backend_enable_disable (session_rt_engine_type_t rt_engine_type) { session_main_t *smm = &session_main; clib_error_t *error = 0; if (rt_engine_type < RT_BACKEND_ENGINE_DISABLE || rt_engine_type > RT_BACKEND_ENGINE_SDL) return clib_error_return (0, "invalid rt-backend %d", rt_engine_type); if (rt_engine_type == RT_BACKEND_ENGINE_SDL) error = session_sdl_enable_disable (1); else if (rt_engine_type == RT_BACKEND_ENGINE_RULE_TABLE) error = session_rules_table_enable_disable (1); else if (rt_engine_type == RT_BACKEND_ENGINE_DISABLE) { if (session_sdl_is_enabled ()) error = session_sdl_enable_disable (0); else if (session_rule_table_is_enabled ()) error = session_rules_table_enable_disable (0); } if (!error) smm->rt_engine_type = rt_engine_type; return error; } clib_error_t * session_rule_table_register_engine (const session_rt_engine_vft_t *vft) { if (session_rt_engine_vft == vft) return 0; if (session_rt_engine_vft) return clib_error_return (0, "session rule engine is already registered"); session_rt_engine_vft = vft; return 0; } clib_error_t * session_rule_table_deregister_engine (const session_rt_engine_vft_t *vft) { if (session_rt_engine_vft == vft) session_rt_engine_vft = 0; else return clib_error_return ( 0, "session rule engine is not registered to this engine"); return 0; } /* * fd.io coding-style-patch-verification: ON * * Local Variables: * eval: (c-set-style "gnu") * End: */