2 * Copyright (c) 2016 Cisco and/or its affiliates.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
7 * http://www.apache.org/licenses/LICENSE-2.0
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
15 #ifndef included_acl_h
16 #define included_acl_h
18 #include <vnet/vnet.h>
19 #include <vnet/ip/ip.h>
20 #include <vnet/l2/l2_output.h>
23 #include <vppinfra/hash.h>
24 #include <vppinfra/error.h>
25 #include <vppinfra/bitmap.h>
26 #include <vppinfra/elog.h>
27 #include <vppinfra/bihash_48_8.h>
28 #include <vppinfra/bihash_40_8.h>
29 #include <vppinfra/bihash_16_8.h>
30 #include <vlib/counter.h>
34 #include "hash_lookup_types.h"
35 #include "lookup_context.h"
37 #define ACL_PLUGIN_VERSION_MAJOR 1
38 #define ACL_PLUGIN_VERSION_MINOR 4
40 #define UDP_SESSION_IDLE_TIMEOUT_SEC 600
41 #define TCP_SESSION_IDLE_TIMEOUT_SEC (3600*24)
42 #define TCP_SESSION_TRANSIENT_TIMEOUT_SEC 120
44 #define SESSION_PURGATORY_TIMEOUT_USEC 10
46 #define ACL_PLUGIN_HASH_LOOKUP_HEAP_SIZE (2 << 25)
47 #define ACL_PLUGIN_HASH_LOOKUP_HASH_BUCKETS 65536
48 #define ACL_PLUGIN_HASH_LOOKUP_HASH_MEMORY (2 << 25)
50 extern vlib_node_registration_t acl_in_node;
51 extern vlib_node_registration_t acl_out_node;
53 void input_acl_packet_match(u32 sw_if_index, vlib_buffer_t * b0, u32 *nextp, u32 *acl_match_p, u32 *rule_match_p, u32 *trace_bitmap);
54 void output_acl_packet_match(u32 sw_if_index, vlib_buffer_t * b0, u32 *nextp, u32 *acl_match_p, u32 *rule_match_p, u32 *trace_bitmap);
57 ACL_TIMEOUT_UNUSED = 0,
60 ACL_TIMEOUT_TCP_TRANSIENT,
62 ACL_TIMEOUT_PURGATORY = ACL_N_USER_TIMEOUTS, /* a special-case queue for deletion-in-progress sessions */
67 enum address_e { IP4, IP6 };
83 ip46_address_t src_ip_addr;
92 /** Required for pool_get_aligned */
93 CLIB_CACHE_LINE_ALIGN_MARK(cacheline0);
100 /** Required for pool_get_aligned */
101 CLIB_CACHE_LINE_ALIGN_MARK(cacheline0);
104 macip_acl_rule_t *rules;
105 /* References to the classifier tables that will enforce the rules */
109 /* outacl classifier tables */
110 u32 out_ip4_table_index;
111 u32 out_ip6_table_index;
112 u32 out_l2_table_index;
116 * An element describing a particular configuration fo the mask,
117 * and how many times it has been used.
121 /** Required for pool_get_aligned */
122 CLIB_CACHE_LINE_ALIGN_MARK(cacheline0);
126 } ace_mask_type_entry_t;
129 /* mheap to hold all the ACL module related allocations, other than hash */
131 uword acl_mheap_size;
133 /* API message ID base */
136 /* The pool of users of ACL lookup contexts */
137 acl_lookup_context_user_t *acl_users;
138 /* The pool of ACL lookup contexts */
139 acl_lookup_context_t *acl_lookup_contexts;
141 acl_list_t *acls; /* Pool of ACLs */
142 hash_acl_info_t *hash_acl_infos; /* corresponding hash matching housekeeping info */
143 clib_bihash_48_8_t acl_lookup_hash; /* ACL lookup hash table. */
144 u32 hash_lookup_hash_buckets;
145 uword hash_lookup_hash_memory;
147 /* mheap to hold all the miscellaneous allocations related to hash-based lookups */
148 void *hash_lookup_mheap;
149 uword hash_lookup_mheap_size;
150 int acl_lookup_hash_initialized;
152 applied_hash_ace_entry_t **input_hash_entry_vec_by_sw_if_index;
153 applied_hash_ace_entry_t **output_hash_entry_vec_by_sw_if_index;
154 applied_hash_acl_info_t *input_applied_hash_acl_info_by_sw_if_index;
155 applied_hash_acl_info_t *output_applied_hash_acl_info_by_sw_if_index;
157 applied_hash_ace_entry_t **hash_entry_vec_by_lc_index;
158 applied_hash_acl_info_t *applied_hash_acl_info_by_lc_index;
160 /* Corresponding lookup context indices for in/out lookups per sw_if_index */
161 u32 *input_lc_index_by_sw_if_index;
162 u32 *output_lc_index_by_sw_if_index;
163 /* context user id for interface ACLs */
164 u32 interface_acl_user_id;
166 macip_acl_list_t *macip_acls; /* Pool of MAC-IP ACLs */
168 /* ACLs associated with interfaces */
169 u32 **input_acl_vec_by_sw_if_index;
170 u32 **output_acl_vec_by_sw_if_index;
172 /* interfaces on which given ACLs are applied */
173 u32 **input_sw_if_index_vec_by_acl;
174 u32 **output_sw_if_index_vec_by_acl;
176 /* bitmaps 1=sw_if_index has in/out ACL processing enabled */
177 uword *in_acl_on_sw_if_index;
178 uword *out_acl_on_sw_if_index;
180 /* lookup contexts where a given ACL is used */
181 u32 **lc_index_vec_by_acl;
183 /* input and output policy epochs by interface */
184 u32 *input_policy_epoch_by_sw_if_index;
185 u32 *output_policy_epoch_by_sw_if_index;
187 /* whether we need to take the epoch of the session into account */
188 int reclassify_sessions;
192 /* Total count of interface+direction pairs enabled */
193 u32 fa_total_enabled_count;
195 /* Do we use hash-based ACL matching or linear */
196 int use_hash_acl_matching;
198 /* Do we use the TupleMerge for hash ACLs or not */
201 /* Max collision vector length before splitting the tuple */
202 #define TM_SPLIT_THRESHOLD 39
203 int tuple_merge_split_threshold;
205 /* a pool of all mask types present in all ACEs */
206 ace_mask_type_entry_t *ace_mask_type_pool;
208 /* vec of vectors of all info of all mask types present in ACEs contained in each lc_index */
209 hash_applied_mask_info_t **hash_applied_mask_info_vec_by_lc_index;
212 * Classify tables used to grab the packets for the ACL check,
213 * and serving as the 5-tuple session tables at the same time
215 u32 *acl_ip4_input_classify_table_by_sw_if_index;
216 u32 *acl_ip6_input_classify_table_by_sw_if_index;
217 u32 *acl_ip4_output_classify_table_by_sw_if_index;
218 u32 *acl_ip6_output_classify_table_by_sw_if_index;
220 u32 *acl_dot1q_input_classify_table_by_sw_if_index;
221 u32 *acl_dot1ad_input_classify_table_by_sw_if_index;
222 u32 *acl_dot1q_output_classify_table_by_sw_if_index;
223 u32 *acl_dot1ad_output_classify_table_by_sw_if_index;
225 u32 *acl_etype_input_classify_table_by_sw_if_index;
226 u32 *acl_etype_output_classify_table_by_sw_if_index;
228 u16 **input_etype_whitelist_by_sw_if_index;
229 u16 **output_etype_whitelist_by_sw_if_index;
231 /* MACIP (input) ACLs associated with the interfaces */
232 u32 *macip_acl_by_sw_if_index;
234 /* Vector of interfaces on which given MACIP ACLs are applied */
235 u32 **sw_if_index_vec_by_macip_acl;
237 /* bitmaps when set the processing is enabled on the interface */
238 uword *fa_in_acl_on_sw_if_index;
239 uword *fa_out_acl_on_sw_if_index;
240 /* bihash holding all of the sessions */
241 int fa_sessions_hash_is_initialized;
242 clib_bihash_40_8_t fa_ip6_sessions_hash;
243 clib_bihash_16_8_t fa_ip4_sessions_hash;
244 /* The process node which orchestrates the cleanup */
245 u32 fa_cleaner_node_index;
246 /* FA session timeouts, in seconds */
247 u32 session_timeout_sec[ACL_N_TIMEOUTS];
248 /* total session adds/dels */
249 u64 fa_session_total_adds;
250 u64 fa_session_total_dels;
251 /* how many sessions went into purgatory */
252 u64 fa_session_total_deactivations;
254 /* EH values that we can skip over */
255 uword *fa_ipv6_known_eh_bitmap;
257 /* whether to match L4 ACEs with ports on the non-initial fragment */
258 int l4_match_nonfirst_fragment;
260 /* conn table per-interface conn table parameters */
261 u32 fa_conn_table_hash_num_buckets;
262 uword fa_conn_table_hash_memory_size;
263 u64 fa_conn_table_max_entries;
269 * If the cleaner has to delete more than this number
270 * of connections, it halves the sleep time.
273 #define ACL_FA_DEFAULT_MAX_DELETED_SESSIONS_PER_INTERVAL 100
274 u64 fa_max_deleted_sessions_per_interval;
277 * If the cleaner deletes less than these connections,
278 * it increases the wait time by the "increment"
281 #define ACL_FA_DEFAULT_MIN_DELETED_SESSIONS_PER_INTERVAL 1
282 u64 fa_min_deleted_sessions_per_interval;
284 #define ACL_FA_DEFAULT_CLEANER_WAIT_TIME_INCREMENT 0.1
285 f64 fa_cleaner_wait_time_increment;
287 u64 fa_current_cleaner_timer_wait_interval;
289 int fa_interrupt_generation;
291 /* per-worker data related t conn management */
292 acl_fa_per_worker_data_t *per_worker_data;
294 /* Configured session timeout */
295 u64 session_timeout[ACL_N_TIMEOUTS];
298 /* Counters for the cleaner thread */
300 #define foreach_fa_cleaner_counter \
301 _(fa_cleaner_cnt_delete_by_sw_index, "delete_by_sw_index events") \
302 _(fa_cleaner_cnt_delete_by_sw_index_ok, "delete_by_sw_index handled ok") \
303 _(fa_cleaner_cnt_unknown_event, "unknown events received") \
304 _(fa_cleaner_cnt_timer_restarted, "session idle timers restarted") \
305 _(fa_cleaner_cnt_wait_with_timeout, "event wait with timeout called") \
306 _(fa_cleaner_cnt_wait_without_timeout, "event wait w/o timeout called") \
307 _(fa_cleaner_cnt_event_cycles, "total event cycles") \
308 /* end of counters */
309 #define _(id, desc) u32 id;
310 foreach_fa_cleaner_counter
314 vlib_main_t * vlib_main;
315 vnet_main_t * vnet_main;
317 vlib_log_class_t log_default;
318 /* acl counters exposed via stats segment */
319 volatile u32 *acl_counter_lock;
320 vlib_combined_counter_main_t *combined_acl_counters;
321 /* enable/disable ACL counters for interface processing */
322 u32 interface_acl_counters_enabled;
325 #define acl_log_err(...) \
326 vlib_log(VLIB_LOG_LEVEL_ERR, acl_main.log_default, __VA_ARGS__)
327 #define acl_log_warn(...) \
328 vlib_log(VLIB_LOG_LEVEL_WARNING, acl_main.log_default, __VA_ARGS__)
329 #define acl_log_notice(...) \
330 vlib_log(VLIB_LOG_LEVEL_NOTICE, acl_main.log_default, __VA_ARGS__)
331 #define acl_log_info(...) \
332 vlib_log(VLIB_LOG_LEVEL_INFO, acl_main.log_default, __VA_ARGS__)
336 acl_plugin_counter_lock (acl_main_t * am)
338 if (am->acl_counter_lock)
339 while (clib_atomic_test_and_set (am->acl_counter_lock))
344 acl_plugin_counter_unlock (acl_main_t * am)
346 if (am->acl_counter_lock)
347 clib_atomic_release (am->acl_counter_lock);
351 #define foreach_acl_eh \
352 _(HOPBYHOP , 0 , "IPv6ExtHdrHopByHop") \
353 _(ROUTING , 43 , "IPv6ExtHdrRouting") \
354 _(DESTOPT , 60 , "IPv6ExtHdrDestOpt") \
355 _(FRAGMENT , 44 , "IPv6ExtHdrFragment") \
356 _(MOBILITY , 135, "Mobility Header") \
357 _(HIP , 139, "Experimental use Host Identity Protocol") \
358 _(SHIM6 , 140, "Shim6 Protocol") \
359 _(EXP1 , 253, "Use for experimentation and testing") \
360 _(EXP2 , 254, "Use for experimentation and testing")
364 "No Next Header" is not a header.
365 Also, Fragment header needs special processing.
367 _(NONEXT , 59 , "NoNextHdr") \
370 ESP is hiding its internal format, so no point in trying to go past it.
372 _(ESP , 50 , "EncapsulatingSecurityPayload") \
375 AH has a special treatment of its length, it is in 32-bit words, not 64-bit words like the rest.
377 _(AUTH , 51 , "Authentication Header") \
384 #define _(N, v, s) ACL_EH_##N = v,
391 extern acl_main_t acl_main;
393 void *acl_plugin_set_heap();
396 ACL_FA_REQ_SESS_RESCHEDULE = 0,
400 void aclp_post_session_change_request(acl_main_t *am, u32 target_thread, u32 target_session, acl_fa_sess_req_t request_type);
401 void aclp_swap_wip_and_pending_session_change_requests(acl_main_t *am, u32 target_thread);