hs-test: fixed timed out tests passing in the CI
[vpp.git] / src / plugins / acl / sess_mgmt_node.c
1 /*
2  * Copyright (c) 2016-2018 Cisco and/or its affiliates.
3  * Licensed under the Apache License, Version 2.0 (the "License");
4  * you may not use this file except in compliance with the License.
5  * You may obtain a copy of the License at:
6  *
7  *     http://www.apache.org/licenses/LICENSE-2.0
8  *
9  * Unless required by applicable law or agreed to in writing, software
10  * distributed under the License is distributed on an "AS IS" BASIS,
11  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12  * See the License for the specific language governing permissions and
13  * limitations under the License.
14  */
15 #include <stddef.h>
16 #include <netinet/in.h>
17
18 #include <vlib/vlib.h>
19 #include <vnet/vnet.h>
20 #include <vppinfra/error.h>
21
22
23 #include <acl/acl.h>
24 #include <vnet/ip/icmp46_packet.h>
25
26 #include <plugins/acl/fa_node.h>
27 #include <plugins/acl/acl.h>
28 #include <plugins/acl/lookup_context.h>
29 #include <plugins/acl/public_inlines.h>
30 #include <plugins/acl/session_inlines.h>
31
32
33
34 static_always_inline u8 *
35 format_ip46_session_bihash_kv (u8 * s, va_list * args, int is_ip6)
36 {
37   fa_5tuple_t a5t;
38   void *paddr0;
39   void *paddr1;
40   void *format_addr_func;
41
42   if (is_ip6)
43     {
44       clib_bihash_kv_40_8_t *kv_40_8 =
45         va_arg (*args, clib_bihash_kv_40_8_t *);
46       a5t.kv_40_8 = *kv_40_8;
47       paddr0 = &a5t.ip6_addr[0];
48       paddr1 = &a5t.ip6_addr[1];
49       format_addr_func = format_ip6_address;
50     }
51   else
52     {
53       clib_bihash_kv_16_8_t *kv_16_8 =
54         va_arg (*args, clib_bihash_kv_16_8_t *);
55       a5t.kv_16_8 = *kv_16_8;
56       paddr0 = &a5t.ip4_addr[0];
57       paddr1 = &a5t.ip4_addr[1];
58       format_addr_func = format_ip4_address;
59     }
60
61   fa_full_session_id_t *sess = (fa_full_session_id_t *) & a5t.pkt;
62
63   return (format (s, "l3 %U -> %U %U | sess id %d thread id %d epoch %04x",
64                   format_addr_func, paddr0,
65                   format_addr_func, paddr1,
66                   format_fa_session_l4_key, &a5t.l4,
67                   sess->session_index, sess->thread_index,
68                   sess->intf_policy_epoch));
69 }
70
71 static u8 *
72 format_ip6_session_bihash_kv (u8 * s, va_list * args)
73 {
74   return format_ip46_session_bihash_kv (s, args, 1);
75 }
76
77 static u8 *
78 format_ip4_session_bihash_kv (u8 * s, va_list * args)
79 {
80   return format_ip46_session_bihash_kv (s, args, 0);
81 }
82
83
84 static void
85 acl_fa_verify_init_sessions (acl_main_t * am)
86 {
87   if (!am->fa_sessions_hash_is_initialized)
88     {
89       u16 wk;
90       /* Allocate the per-worker sessions pools */
91       for (wk = 0; wk < vec_len (am->per_worker_data); wk++)
92         {
93           acl_fa_per_worker_data_t *pw = &am->per_worker_data[wk];
94
95           /*
96            * // In lieu of trying to preallocate the pool and its free bitmap, rather use pool_init_fixed
97            * pool_alloc_aligned(pw->fa_sessions_pool, am->fa_conn_table_max_entries, CLIB_CACHE_LINE_BYTES);
98            * clib_bitmap_validate(pool_header(pw->fa_sessions_pool)->free_bitmap, am->fa_conn_table_max_entries);
99            */
100           pool_init_fixed (pw->fa_sessions_pool,
101                            am->fa_conn_table_max_entries);
102         }
103
104       /* ... and the interface session hash table */
105       clib_bihash_init_40_8 (&am->fa_ip6_sessions_hash,
106                              "ACL plugin FA IPv6 session bihash",
107                              am->fa_conn_table_hash_num_buckets,
108                              am->fa_conn_table_hash_memory_size);
109       clib_bihash_set_kvp_format_fn_40_8 (&am->fa_ip6_sessions_hash,
110                                           format_ip6_session_bihash_kv);
111
112       clib_bihash_init_16_8 (&am->fa_ip4_sessions_hash,
113                              "ACL plugin FA IPv4 session bihash",
114                              am->fa_conn_table_hash_num_buckets,
115                              am->fa_conn_table_hash_memory_size);
116       clib_bihash_set_kvp_format_fn_16_8 (&am->fa_ip4_sessions_hash,
117                                           format_ip4_session_bihash_kv);
118
119       am->fa_sessions_hash_is_initialized = 1;
120     }
121 }
122
123
124 /*
125  * Get the timeout of the session in a list since its enqueue time.
126  */
127
128 static u64
129 fa_session_get_list_timeout (acl_main_t * am, fa_session_t * sess)
130 {
131   u64 timeout = am->vlib_main->clib_time.clocks_per_second / 1000;
132   timeout = fa_session_get_timeout (am, sess);
133   /* for all user lists, check them twice per timeout */
134   timeout >>= (sess->link_list_id != ACL_TIMEOUT_PURGATORY);
135   return timeout;
136 }
137
138 static u64
139 acl_fa_get_list_head_expiry_time (acl_main_t * am,
140                                   acl_fa_per_worker_data_t * pw, u64 now,
141                                   u16 thread_index, int timeout_type)
142 {
143   return pw->fa_conn_list_head_expiry_time[timeout_type];
144 }
145
146 static int
147 acl_fa_conn_time_to_check (acl_main_t * am, acl_fa_per_worker_data_t * pw,
148                            u64 now, u16 thread_index, u32 session_index)
149 {
150   if (session_index == FA_SESSION_BOGUS_INDEX)
151     return 0;
152   fa_session_t *sess = get_session_ptr (am, thread_index, session_index);
153   u64 timeout_time =
154     sess->link_enqueue_time + fa_session_get_list_timeout (am, sess);
155   return (timeout_time < now)
156     || (sess->link_enqueue_time <= pw->swipe_end_time);
157 }
158
159 /*
160  * see if there are sessions ready to be checked,
161  * do the maintenance (requeue or delete), and
162  * return the total number of sessions reclaimed.
163  */
164 static int
165 acl_fa_check_idle_sessions (acl_main_t * am, u16 thread_index, u64 now)
166 {
167   acl_fa_per_worker_data_t *pw = &am->per_worker_data[thread_index];
168   fa_full_session_id_t fsid;
169   fsid.thread_index = thread_index;
170   int total_expired = 0;
171
172   /* let the other threads enqueue more requests while we process, if they like */
173   aclp_swap_wip_and_pending_session_change_requests (am, thread_index);
174   u64 *psr = NULL;
175
176   vec_foreach (psr, pw->wip_session_change_requests)
177   {
178     acl_fa_sess_req_t op = *psr >> 32;
179     fsid.session_index = *psr & 0xffffffff;
180     switch (op)
181       {
182       case ACL_FA_REQ_SESS_RESCHEDULE:
183         acl_fa_restart_timer_for_session (am, now, fsid);
184         break;
185       default:
186         /* do nothing */
187         break;
188       }
189   }
190   if (pw->wip_session_change_requests)
191     vec_set_len (pw->wip_session_change_requests, 0);
192
193   {
194     u8 tt = 0;
195     int n_pending_swipes = 0;
196     for (tt = 0; tt < ACL_N_TIMEOUTS; tt++)
197       {
198         int n_expired = 0;
199         while (n_expired < am->fa_max_deleted_sessions_per_interval)
200           {
201             fsid.session_index = pw->fa_conn_list_head[tt];
202             if (!acl_fa_conn_time_to_check
203                 (am, pw, now, thread_index, pw->fa_conn_list_head[tt]))
204               {
205                 break;
206               }
207             if (am->trace_sessions > 3)
208               {
209                 elog_acl_maybe_trace_X3 (am,
210                                          "acl_fa_check_idle_sessions: expire session %d in list %d on thread %d",
211                                          "i4i4i4", (u32) fsid.session_index,
212                                          (u32) tt, (u32) thread_index);
213               }
214             vec_add1 (pw->expired, fsid.session_index);
215             n_expired++;
216             acl_fa_conn_list_delete_session (am, fsid, now);
217           }
218       }
219     for (tt = 0; tt < ACL_N_TIMEOUTS; tt++)
220       {
221         u32 session_index = pw->fa_conn_list_head[tt];
222         if (session_index == FA_SESSION_BOGUS_INDEX)
223           break;
224         fa_session_t *sess =
225           get_session_ptr (am, thread_index, session_index);
226         n_pending_swipes += sess->link_enqueue_time <= pw->swipe_end_time;
227       }
228     if (n_pending_swipes == 0)
229       {
230         pw->swipe_end_time = 0;
231       }
232   }
233
234   u32 *psid = NULL;
235   vec_foreach (psid, pw->expired)
236   {
237     fsid.session_index = *psid;
238     if (!pool_is_free_index (pw->fa_sessions_pool, fsid.session_index))
239       {
240         fa_session_t *sess =
241           get_session_ptr (am, thread_index, fsid.session_index);
242         u32 sw_if_index = sess->sw_if_index;
243         u64 sess_timeout_time =
244           sess->last_active_time + fa_session_get_timeout (am, sess);
245         int timeout_passed = (now >= sess_timeout_time);
246         int clearing_interface =
247           clib_bitmap_get (pw->pending_clear_sw_if_index_bitmap, sw_if_index);
248         if (am->trace_sessions > 3)
249           {
250             elog_acl_maybe_trace_X2 (am,
251                                      "acl_fa_check_idle_sessions: now %lu sess_timeout_time %lu",
252                                      "i8i8", now, sess_timeout_time);
253             elog_acl_maybe_trace_X4 (am,
254                                      "acl_fa_check_idle_sessions: session %d sw_if_index %d timeout_passed %d clearing_interface %d",
255                                      "i4i4i4i4", (u32) fsid.session_index,
256                                      (u32) sess->sw_if_index,
257                                      (u32) timeout_passed,
258                                      (u32) clearing_interface);
259           }
260         if (timeout_passed || clearing_interface)
261           {
262             if (acl_fa_two_stage_delete_session (am, sw_if_index, fsid, now))
263               {
264                 if (am->trace_sessions > 3)
265                   {
266                     elog_acl_maybe_trace_X2 (am,
267                                              "acl_fa_check_idle_sessions: deleted session %d sw_if_index %d",
268                                              "i4i4", (u32) fsid.session_index,
269                                              (u32) sess->sw_if_index);
270                   }
271                 /* the session has been put */
272                 pw->cnt_deleted_sessions++;
273               }
274             else
275               {
276                 /* the connection marked as deleted and put to purgatory */
277                 if (am->trace_sessions > 3)
278                   {
279                     elog_acl_maybe_trace_X2 (am,
280                                              "acl_fa_check_idle_sessions: session %d sw_if_index %d marked as deleted, put to purgatory",
281                                              "i4i4", (u32) fsid.session_index,
282                                              (u32) sess->sw_if_index);
283                   }
284               }
285           }
286         else
287
288           {
289             if (am->trace_sessions > 3)
290               {
291                 elog_acl_maybe_trace_X2 (am,
292                                          "acl_fa_check_idle_sessions: restart timer for session %d sw_if_index %d",
293                                          "i4i4", (u32) fsid.session_index,
294                                          (u32) sess->sw_if_index);
295               }
296             /* There was activity on the session, so the idle timeout
297                has not passed. Enqueue for another time period. */
298
299             acl_fa_conn_list_add_session (am, fsid, now);
300             pw->cnt_session_timer_restarted++;
301           }
302       }
303     else
304       {
305         pw->cnt_already_deleted_sessions++;
306       }
307   }
308   total_expired = vec_len (pw->expired);
309   /* zero out the vector which we have acted on */
310   if (pw->expired)
311     vec_set_len (pw->expired, 0);
312   /* if we were advancing and reached the end
313    * (no more sessions to recycle), reset the fast-forward timestamp */
314
315   if (pw->swipe_end_time && 0 == total_expired)
316     pw->swipe_end_time = 0;
317
318   elog_acl_maybe_trace_X1 (am,
319                            "acl_fa_check_idle_sessions: done, total sessions expired: %d",
320                            "i4", (u32) total_expired);
321   return (total_expired);
322 }
323
324 /*
325  * This process ensures the connection cleanup happens every so often
326  * even in absence of traffic, as well as provides general orchestration
327  * for requests like connection deletion on a given sw_if_index.
328  */
329
330
331 #define foreach_acl_fa_cleaner_error \
332 _(UNKNOWN_EVENT, "unknown event received")  \
333 /* end  of errors */
334
335 typedef enum
336 {
337 #define _(sym,str) ACL_FA_CLEANER_ERROR_##sym,
338   foreach_acl_fa_cleaner_error
339 #undef _
340     ACL_FA_CLEANER_N_ERROR,
341 } acl_fa_cleaner_error_t;
342
343 static char *acl_fa_cleaner_error_strings[] = {
344 #define _(sym,string) string,
345   foreach_acl_fa_cleaner_error
346 #undef _
347 };
348
349
350 static vlib_node_registration_t acl_fa_session_cleaner_process_node;
351 static vlib_node_registration_t acl_fa_worker_session_cleaner_process_node;
352
353 static void
354 send_one_worker_interrupt (vlib_main_t * vm, acl_main_t * am,
355                            int thread_index)
356 {
357   acl_fa_per_worker_data_t *pw = &am->per_worker_data[thread_index];
358   if (!pw->interrupt_is_pending)
359     {
360       pw->interrupt_is_pending = 1;
361       vlib_node_set_interrupt_pending (
362         vlib_get_main_by_index (thread_index),
363         acl_fa_worker_session_cleaner_process_node.index);
364       elog_acl_maybe_trace_X1 (am,
365                                "send_one_worker_interrupt: send interrupt to worker %u",
366                                "i4", ((u32) thread_index));
367       /* if the interrupt was requested, mark that done. */
368       /* pw->interrupt_is_needed = 0; */
369       CLIB_MEMORY_BARRIER ();
370     }
371 }
372
373 void
374 aclp_post_session_change_request (acl_main_t *am, u32 target_thread,
375                                   u32 target_session,
376                                   acl_fa_sess_req_t request_type)
377 {
378   acl_fa_per_worker_data_t *pw_me =
379     &am->per_worker_data[os_get_thread_index ()];
380   acl_fa_per_worker_data_t *pw = &am->per_worker_data[target_thread];
381   clib_spinlock_lock_if_init (&pw->pending_session_change_request_lock);
382   /* vec_add1 might cause a reallocation */
383   vec_add1 (pw->pending_session_change_requests,
384             (((u64) request_type) << 32) | target_session);
385   pw->rcvd_session_change_requests++;
386   pw_me->sent_session_change_requests++;
387   if (vec_len (pw->pending_session_change_requests) == 1)
388     {
389       /* ensure the requests get processed */
390       send_one_worker_interrupt (am->vlib_main, am, target_thread);
391     }
392   clib_spinlock_unlock_if_init (&pw->pending_session_change_request_lock);
393 }
394
395 void
396 aclp_swap_wip_and_pending_session_change_requests (acl_main_t * am,
397                                                    u32 target_thread)
398 {
399   acl_fa_per_worker_data_t *pw = &am->per_worker_data[target_thread];
400   u64 *tmp;
401   clib_spinlock_lock_if_init (&pw->pending_session_change_request_lock);
402   tmp = pw->pending_session_change_requests;
403   pw->pending_session_change_requests = pw->wip_session_change_requests;
404   pw->wip_session_change_requests = tmp;
405   clib_spinlock_unlock_if_init (&pw->pending_session_change_request_lock);
406 }
407
408
409 static int
410 purgatory_has_connections (vlib_main_t * vm, acl_main_t * am,
411                            int thread_index)
412 {
413   acl_fa_per_worker_data_t *pw = &am->per_worker_data[thread_index];
414
415   return (FA_SESSION_BOGUS_INDEX !=
416           pw->fa_conn_list_head[ACL_TIMEOUT_PURGATORY]);
417
418 }
419
420
421 /*
422  * Per-worker thread interrupt-driven cleaner thread
423  * to clean idle connections if there are no packets
424  */
425 static uword
426 acl_fa_worker_conn_cleaner_process (vlib_main_t * vm,
427                                     vlib_node_runtime_t * rt,
428                                     vlib_frame_t * f)
429 {
430   acl_main_t *am = &acl_main;
431   u64 now = clib_cpu_time_now ();
432   u16 thread_index = os_get_thread_index ();
433   acl_fa_per_worker_data_t *pw = &am->per_worker_data[thread_index];
434   int num_expired;
435   elog_acl_maybe_trace_X1 (am,
436                            "acl_fa_worker_conn_cleaner interrupt: now %lu",
437                            "i8", now);
438   /* allow another interrupt to be queued */
439   pw->interrupt_is_pending = 0;
440   if (pw->clear_in_process)
441     {
442       if (0 == pw->swipe_end_time)
443         {
444           /*
445            * Someone has just set the flag to start clearing.
446            * we do this by combing through the connections up to a "time T"
447            * which is now, and requeueing everything except the expired
448            * connections and those matching the interface(s) being cleared.
449            */
450
451           /*
452            * first filter the sw_if_index bitmap that they want from us, by
453            * a bitmap of sw_if_index for which we actually have connections.
454            */
455           if ((pw->pending_clear_sw_if_index_bitmap == 0)
456               || (pw->serviced_sw_if_index_bitmap == 0))
457             {
458               elog_acl_maybe_trace_X1 (am,
459                                        "acl_fa_worker_conn_cleaner: now %lu, someone tried to call clear but one of the bitmaps are empty",
460                                        "i8", now);
461               clib_bitmap_zero (pw->pending_clear_sw_if_index_bitmap);
462             }
463           else
464             {
465 #ifdef FA_NODE_VERBOSE_DEBUG
466               clib_warning
467                 ("WORKER-CLEAR: (before and) swiping sw-if-index bitmap: %U, my serviced bitmap %U",
468                  format_bitmap_hex, pw->pending_clear_sw_if_index_bitmap,
469                  format_bitmap_hex, pw->serviced_sw_if_index_bitmap);
470 #endif
471               pw->pending_clear_sw_if_index_bitmap =
472                 clib_bitmap_and (pw->pending_clear_sw_if_index_bitmap,
473                                  pw->serviced_sw_if_index_bitmap);
474             }
475
476           if (clib_bitmap_is_zero (pw->pending_clear_sw_if_index_bitmap))
477             {
478               /* if the cross-section is a zero vector, no need to do anything. */
479               elog_acl_maybe_trace_X1 (am,
480                                        "acl_fa_worker_conn_cleaner: now %lu, clearing done, nothing to do",
481                                        "i8", now);
482               pw->clear_in_process = 0;
483               pw->swipe_end_time = 0;
484             }
485           else
486             {
487 #ifdef FA_NODE_VERBOSE_DEBUG
488               clib_warning
489                 ("WORKER-CLEAR: swiping sw-if-index bitmap: %U, my serviced bitmap %U",
490                  format_bitmap_hex, pw->pending_clear_sw_if_index_bitmap,
491                  format_bitmap_hex, pw->serviced_sw_if_index_bitmap);
492 #endif
493               elog_acl_maybe_trace_X1 (am,
494                                        "acl_fa_worker_conn_cleaner: swiping until %lu",
495                                        "i8", now);
496               /* swipe through the connection lists until enqueue timestamps become above "now" */
497               pw->swipe_end_time = now;
498             }
499         }
500     }
501   num_expired = acl_fa_check_idle_sessions (am, thread_index, now);
502   // clib_warning("WORKER-CLEAR: checked %d sessions (clear_in_progress: %d)", num_expired, pw->clear_in_process);
503   elog_acl_maybe_trace_X2 (am,
504                            "acl_fa_worker_conn_cleaner: checked %d sessions (clear_in_process: %d)",
505                            "i4i4", (u32) num_expired,
506                            (u32) pw->clear_in_process);
507   if (pw->clear_in_process)
508     {
509       if (pw->swipe_end_time == 0)
510         {
511           /* we were clearing but we could not process any more connections. time to stop. */
512           clib_bitmap_zero (pw->pending_clear_sw_if_index_bitmap);
513           pw->clear_in_process = 0;
514           elog_acl_maybe_trace_X1 (am,
515                                    "acl_fa_worker_conn_cleaner: now %lu, clearing done - all done",
516                                    "i8", now);
517         }
518       else
519         {
520           elog_acl_maybe_trace_X1 (am,
521                                    "acl_fa_worker_conn_cleaner: now %lu, more work to do - requesting interrupt",
522                                    "i8", now);
523           /* should continue clearing.. So could they please sent an interrupt again? */
524           send_one_worker_interrupt (vm, am, thread_index);
525           // pw->interrupt_is_needed = 1;
526         }
527     }
528   else
529     {
530       if (num_expired > 0)
531         {
532           /* there was too much work, we should get an interrupt ASAP */
533           // pw->interrupt_is_needed = 1;
534           send_one_worker_interrupt (vm, am, thread_index);
535           pw->interrupt_is_unwanted = 0;
536         }
537       else
538         {
539           /* the current rate of interrupts is ok */
540           pw->interrupt_is_needed = 0;
541           pw->interrupt_is_unwanted = 0;
542         }
543       elog_acl_maybe_trace_X3 (am,
544                                "acl_fa_worker_conn_cleaner: now %lu, interrupt needed: %u, interrupt unwanted: %u",
545                                "i8i4i4", now, ((u32) pw->interrupt_is_needed),
546                                ((u32) pw->interrupt_is_unwanted));
547     }
548   /* be persistent about quickly deleting the connections from the purgatory */
549   if (purgatory_has_connections (vm, am, thread_index))
550     {
551       send_one_worker_interrupt (vm, am, thread_index);
552     }
553   pw->interrupt_generation = am->fa_interrupt_generation;
554   return 0;
555 }
556
557 static void
558 send_interrupts_to_workers (vlib_main_t * vm, acl_main_t * am)
559 {
560   int i;
561   /* Can't use vec_len(am->per_worker_data) since the threads might not have come up yet; */
562   int n_threads = vlib_get_n_threads ();
563   for (i = 0; i < n_threads; i++)
564     {
565       send_one_worker_interrupt (vm, am, i);
566     }
567 }
568
569 /* centralized process to drive per-worker cleaners */
570 static uword
571 acl_fa_session_cleaner_process (vlib_main_t * vm, vlib_node_runtime_t * rt,
572                                 vlib_frame_t * f)
573 {
574   acl_main_t *am = &acl_main;
575   u64 now;
576   f64 cpu_cps = vm->clib_time.clocks_per_second;
577   u64 next_expire;
578   /* We should check if there are connections to clean up - at least twice a second */
579   u64 max_timer_wait_interval = cpu_cps / 2;
580   uword event_type, *event_data = 0;
581   acl_fa_per_worker_data_t *pw0;
582
583   am->fa_current_cleaner_timer_wait_interval = max_timer_wait_interval;
584   am->fa_cleaner_node_index = acl_fa_session_cleaner_process_node.index;
585   am->fa_interrupt_generation = 1;
586   while (1)
587     {
588       now = clib_cpu_time_now ();
589       next_expire = now + am->fa_current_cleaner_timer_wait_interval;
590       int has_pending_conns = 0;
591       u16 ti;
592       u8 tt;
593
594       /*
595        * walk over all per-thread list heads of different timeouts,
596        * and see if there are any connections pending.
597        * If there aren't - we do not need to wake up until the
598        * worker code signals that it has added a connection.
599        *
600        * Also, while we are at it, calculate the earliest we need to wake up.
601        */
602       for (ti = 0; ti < vlib_get_n_threads (); ti++)
603         {
604           if (ti >= vec_len (am->per_worker_data))
605             {
606               continue;
607             }
608           acl_fa_per_worker_data_t *pw = &am->per_worker_data[ti];
609           for (tt = 0; tt < vec_len (pw->fa_conn_list_head); tt++)
610             {
611               u64 head_expiry =
612                 acl_fa_get_list_head_expiry_time (am, pw, now, ti, tt);
613               if ((head_expiry < next_expire) && !pw->interrupt_is_pending)
614                 {
615                   elog_acl_maybe_trace_X3 (am,
616                                            "acl_fa_session_cleaner_process: now %lu, worker: %u tt: %u",
617                                            "i8i2i2", now, ti, tt);
618                   elog_acl_maybe_trace_X2 (am,
619                                            "acl_fa_session_cleaner_process: head expiry: %lu, is earlier than curr next expire: %lu",
620                                            "i8i8", head_expiry, next_expire);
621                   next_expire = head_expiry;
622                 }
623               if (FA_SESSION_BOGUS_INDEX != pw->fa_conn_list_head[tt])
624                 {
625                   has_pending_conns = 1;
626                 }
627             }
628         }
629
630       /* If no pending connections and no ACL applied then no point in timing out */
631       if (!has_pending_conns && (0 == am->fa_total_enabled_count))
632         {
633           am->fa_cleaner_cnt_wait_without_timeout++;
634           elog_acl_maybe_trace_X1 (am,
635                                    "acl_conn_cleaner: now %lu entering wait without timeout",
636                                    "i8", now);
637           (void) vlib_process_wait_for_event (vm);
638           event_type = vlib_process_get_events (vm, &event_data);
639         }
640       else
641         {
642           f64 timeout = ((i64) next_expire - (i64) now) / cpu_cps;
643           if (timeout <= 0)
644             {
645               /* skip waiting altogether */
646               event_type = ~0;
647             }
648           else
649             {
650               am->fa_cleaner_cnt_wait_with_timeout++;
651               elog_acl_maybe_trace_X2 (am,
652                                        "acl_conn_cleaner: now %lu entering wait with timeout %.6f sec",
653                                        "i8f8", now, timeout);
654               (void) vlib_process_wait_for_event_or_clock (vm, timeout);
655               event_type = vlib_process_get_events (vm, &event_data);
656             }
657         }
658
659       switch (event_type)
660         {
661         case ~0:
662           /* nothing to do */
663           break;
664         case ACL_FA_CLEANER_RESCHEDULE:
665           /* Nothing to do. */
666           break;
667         case ACL_FA_CLEANER_DELETE_BY_SW_IF_INDEX:
668           {
669             uword *clear_sw_if_index_bitmap = 0;
670             uword *sw_if_index0;
671             int clear_all = 0;
672             now = clib_cpu_time_now ();
673             elog_acl_maybe_trace_X1 (am,
674                                      "acl_fa_session_cleaner_process: now %lu, received ACL_FA_CLEANER_DELETE_BY_SW_IF_INDEX",
675                                      "i8", now);
676             vec_foreach (sw_if_index0, event_data)
677             {
678               am->fa_cleaner_cnt_delete_by_sw_index++;
679               elog_acl_maybe_trace_X1 (am,
680                                        "acl_fa_session_cleaner_process: ACL_FA_CLEANER_DELETE_BY_SW_IF_INDEX %u",
681                                        "i4", *sw_if_index0);
682               if (*sw_if_index0 == ~0)
683                 {
684                   clear_all = 1;
685                 }
686               else
687                 {
688                   if (!pool_is_free_index
689                       (am->vnet_main->interface_main.sw_interfaces,
690                        *sw_if_index0))
691                     {
692                       clear_sw_if_index_bitmap =
693                         clib_bitmap_set (clear_sw_if_index_bitmap,
694                                          *sw_if_index0, 1);
695                     }
696                 }
697             }
698             acl_log_info
699               ("ACL_FA_CLEANER_DELETE_BY_SW_IF_INDEX bitmap: %U, clear_all: %u",
700                format_bitmap_hex, clear_sw_if_index_bitmap, clear_all);
701             vec_foreach (pw0, am->per_worker_data)
702             {
703               CLIB_MEMORY_BARRIER ();
704               while (pw0->clear_in_process)
705                 {
706                   CLIB_MEMORY_BARRIER ();
707                   elog_acl_maybe_trace_X1 (am,
708                                            "ACL_FA_NODE_CLEAN: waiting previous cleaning cycle to finish on %u",
709                                            "i4",
710                                            (u32) (pw0 - am->per_worker_data));
711                   vlib_process_suspend (vm, 0.0001);
712                   if (pw0->interrupt_is_needed)
713                     {
714                       send_one_worker_interrupt (vm, am,
715                                                  (pw0 - am->per_worker_data));
716                     }
717                 }
718               if (pw0->clear_in_process)
719                 {
720                   acl_log_err
721                     ("ERROR-BUG! Could not initiate cleaning on worker because another cleanup in progress");
722                 }
723               else
724                 {
725                   clib_bitmap_free (pw0->pending_clear_sw_if_index_bitmap);
726                   if (clear_all)
727                     {
728                       /* if we need to clear all, then just clear the interfaces that we are servicing */
729                       pw0->pending_clear_sw_if_index_bitmap =
730                         clib_bitmap_dup (pw0->serviced_sw_if_index_bitmap);
731                     }
732                   else
733                     {
734                       pw0->pending_clear_sw_if_index_bitmap =
735                         clib_bitmap_dup (clear_sw_if_index_bitmap);
736                     }
737                   acl_log_info
738                     ("ACL_FA_CLEANER: thread %u, pending clear bitmap: %U",
739                      (am->per_worker_data - pw0), format_bitmap_hex,
740                      pw0->pending_clear_sw_if_index_bitmap);
741                   pw0->clear_in_process = 1;
742                 }
743             }
744             /* send some interrupts so they can start working */
745             send_interrupts_to_workers (vm, am);
746
747             /* now wait till they all complete */
748             acl_log_info ("CLEANER mains len: %u per-worker len: %d",
749                           vlib_get_n_threads (),
750                           vec_len (am->per_worker_data));
751             vec_foreach (pw0, am->per_worker_data)
752             {
753               CLIB_MEMORY_BARRIER ();
754               while (pw0->clear_in_process)
755                 {
756                   CLIB_MEMORY_BARRIER ();
757                   elog_acl_maybe_trace_X1 (am,
758                                            "ACL_FA_NODE_CLEAN: waiting for my cleaning cycle to finish on %u",
759                                            "i4",
760                                            (u32) (pw0 - am->per_worker_data));
761                   vlib_process_suspend (vm, 0.0001);
762                   if (pw0->interrupt_is_needed)
763                     {
764                       send_one_worker_interrupt (vm, am,
765                                                  (pw0 - am->per_worker_data));
766                     }
767                 }
768             }
769             acl_log_info ("ACL_FA_NODE_CLEAN: cleaning done");
770             clib_bitmap_free (clear_sw_if_index_bitmap);
771           }
772           am->fa_cleaner_cnt_delete_by_sw_index_ok++;
773           break;
774         default:
775 #ifdef FA_NODE_VERBOSE_DEBUG
776           clib_warning ("ACL plugin connection cleaner: unknown event %u",
777                         event_type);
778 #endif
779           vlib_node_increment_counter (vm,
780                                        acl_fa_session_cleaner_process_node.
781                                        index,
782                                        ACL_FA_CLEANER_ERROR_UNKNOWN_EVENT, 1);
783           am->fa_cleaner_cnt_unknown_event++;
784           break;
785         }
786
787       send_interrupts_to_workers (vm, am);
788
789       if (event_data)
790         vec_set_len (event_data, 0);
791
792       /*
793        * If the interrupts were not processed yet, ensure we wait a bit,
794        * but up to a point.
795        */
796       int need_more_wait = 0;
797       int max_wait_cycles = 100;
798       do
799         {
800           need_more_wait = 0;
801           vec_foreach (pw0, am->per_worker_data)
802           {
803             if (pw0->interrupt_generation != am->fa_interrupt_generation)
804               {
805                 need_more_wait = 1;
806               }
807           }
808           if (need_more_wait)
809             {
810               vlib_process_suspend (vm, 0.0001);
811             }
812         }
813       while (need_more_wait && (--max_wait_cycles > 0));
814
815       int interrupts_needed = 0;
816       int interrupts_unwanted = 0;
817
818       vec_foreach (pw0, am->per_worker_data)
819       {
820         if (pw0->interrupt_is_needed)
821           {
822             interrupts_needed++;
823             /* the per-worker value is reset when sending the interrupt */
824           }
825         if (pw0->interrupt_is_unwanted)
826           {
827             interrupts_unwanted++;
828             pw0->interrupt_is_unwanted = 0;
829           }
830       }
831       if (interrupts_needed)
832         {
833           /* they need more interrupts, do less waiting around next time */
834           am->fa_current_cleaner_timer_wait_interval /= 2;
835           /* never go into zero-wait either though - we need to give the space to others */
836           am->fa_current_cleaner_timer_wait_interval += 1;
837         }
838       else if (interrupts_unwanted)
839         {
840           /* slowly increase the amount of sleep up to a limit */
841           if (am->fa_current_cleaner_timer_wait_interval <
842               max_timer_wait_interval)
843             am->fa_current_cleaner_timer_wait_interval +=
844               cpu_cps * am->fa_cleaner_wait_time_increment;
845         }
846       am->fa_cleaner_cnt_event_cycles++;
847       am->fa_interrupt_generation++;
848     }
849   /* NOT REACHED */
850   return 0;
851 }
852
853
854 void
855 acl_fa_enable_disable (u32 sw_if_index, int is_input, int enable_disable)
856 {
857   acl_main_t *am = &acl_main;
858   if (enable_disable)
859     {
860       acl_fa_verify_init_sessions (am);
861       am->fa_total_enabled_count++;
862       vlib_process_signal_event (am->vlib_main, am->fa_cleaner_node_index,
863                                  ACL_FA_CLEANER_RESCHEDULE, 0);
864     }
865   else
866     {
867       am->fa_total_enabled_count--;
868     }
869
870   if (is_input)
871     {
872       ASSERT (clib_bitmap_get (am->fa_in_acl_on_sw_if_index, sw_if_index) !=
873               enable_disable);
874       vnet_feature_enable_disable ("ip4-unicast", "acl-plugin-in-ip4-fa",
875                                    sw_if_index, enable_disable, 0, 0);
876       vnet_feature_enable_disable ("ip6-unicast", "acl-plugin-in-ip6-fa",
877                                    sw_if_index, enable_disable, 0, 0);
878       am->fa_in_acl_on_sw_if_index =
879         clib_bitmap_set (am->fa_in_acl_on_sw_if_index, sw_if_index,
880                          enable_disable);
881     }
882   else
883     {
884       ASSERT (clib_bitmap_get (am->fa_out_acl_on_sw_if_index, sw_if_index) !=
885               enable_disable);
886       vnet_feature_enable_disable ("ip4-output", "acl-plugin-out-ip4-fa",
887                                    sw_if_index, enable_disable, 0, 0);
888       vnet_feature_enable_disable ("ip6-output", "acl-plugin-out-ip6-fa",
889                                    sw_if_index, enable_disable, 0, 0);
890       am->fa_out_acl_on_sw_if_index =
891         clib_bitmap_set (am->fa_out_acl_on_sw_if_index, sw_if_index,
892                          enable_disable);
893     }
894   if ((!enable_disable) && (!acl_fa_ifc_has_in_acl (am, sw_if_index))
895       && (!acl_fa_ifc_has_out_acl (am, sw_if_index)))
896     {
897 #ifdef FA_NODE_VERBOSE_DEBUG
898       clib_warning ("ENABLE-DISABLE: clean the connections on interface %d",
899                     sw_if_index);
900 #endif
901       vlib_process_signal_event (am->vlib_main, am->fa_cleaner_node_index,
902                                  ACL_FA_CLEANER_DELETE_BY_SW_IF_INDEX,
903                                  sw_if_index);
904     }
905 }
906
907 void
908 show_fa_sessions_hash (vlib_main_t * vm, u32 verbose)
909 {
910   acl_main_t *am = &acl_main;
911   if (am->fa_sessions_hash_is_initialized)
912     {
913       vlib_cli_output (vm, "\nIPv6 Session lookup hash table:\n%U\n\n",
914                        format_bihash_40_8, &am->fa_ip6_sessions_hash,
915                        verbose);
916
917       vlib_cli_output (vm, "\nIPv4 Session lookup hash table:\n%U\n\n",
918                        format_bihash_16_8, &am->fa_ip4_sessions_hash,
919                        verbose);
920     }
921   else
922     {
923       vlib_cli_output (vm,
924                        "\nSession lookup hash table is not allocated.\n\n");
925     }
926 }
927
928
929
930 VLIB_REGISTER_NODE (acl_fa_worker_session_cleaner_process_node, static) = {
931   .function = acl_fa_worker_conn_cleaner_process,
932   .name = "acl-plugin-fa-worker-cleaner-process",
933   .type = VLIB_NODE_TYPE_INPUT,
934   .state = VLIB_NODE_STATE_INTERRUPT,
935 };
936
937 VLIB_REGISTER_NODE (acl_fa_session_cleaner_process_node, static) = {
938   .function = acl_fa_session_cleaner_process,
939   .type = VLIB_NODE_TYPE_PROCESS,
940   .name = "acl-plugin-fa-cleaner-process",
941   .n_errors = ARRAY_LEN (acl_fa_cleaner_error_strings),
942   .error_strings = acl_fa_cleaner_error_strings,
943   .n_next_nodes = 0,
944   .next_nodes = {},
945 };
946
947
948
949 /*
950  * fd.io coding-style-patch-verification: ON
951  *
952  * Local Variables:
953  * eval: (c-set-style "gnu")
954  * End:
955  */