8 #include <netinet/in.h>
12 #include <boost/date_time/posix_time/posix_time.hpp>
13 #include <boost/assign/list_of.hpp>
14 #include <boost/unordered_map.hpp>
15 #include <sandesh/sandesh_trace.h>
45 #include <pkt/pkt_types.h>
53 using namespace boost::asio::ip;
54 using boost::uuids::nil_uuid;
55 const std::map<FlowEntry::FlowPolicyState, const char*>
57 (NOT_EVALUATED,
"00000000-0000-0000-0000-000000000000")
58 (IMPLICIT_ALLOW,
"00000000-0000-0000-0000-000000000001")
59 (IMPLICIT_DENY,
"00000000-0000-0000-0000-000000000002")
60 (DEFAULT_GW_ICMP_OR_DNS,
"00000000-0000-0000-0000-000000000003")
61 (LINKLOCAL_FLOW,
"00000000-0000-0000-0000-000000000004")
62 (MULTICAST_FLOW,
"00000000-0000-0000-0000-000000000005")
63 (NON_IP_FLOW,
"00000000-0000-0000-0000-000000000006")
64 (BGPROUTERSERVICE_FLOW,
"00000000-0000-0000-0000-000000000007");
66 const std::map<uint16_t, const char*>
68 ((uint16_t)DROP_UNKNOWN,
"UNKNOWN")
69 ((uint16_t)SHORT_UNAVIALABLE_INTERFACE,
70 "Short flow Interface unavialable")
71 ((uint16_t)SHORT_IPV4_FWD_DIS,
"Short flow Ipv4 forwarding disabled")
72 ((uint16_t)SHORT_UNAVIALABLE_VRF,
73 "Short flow VRF unavailable")
74 ((uint16_t)SHORT_NO_SRC_ROUTE,
"Short flow No Source route")
75 ((uint16_t)SHORT_NO_DST_ROUTE,
"Short flow No Destination route")
76 ((uint16_t)SHORT_AUDIT_ENTRY,
"Short flow Audit Entry")
77 ((uint16_t)SHORT_VRF_CHANGE,
"Short flow VRF CHANGE")
78 ((uint16_t)SHORT_NO_REVERSE_FLOW,
"Short flow No Reverse flow")
79 ((uint16_t)SHORT_REVERSE_FLOW_CHANGE,
80 "Short flow Reverse flow change")
81 ((uint16_t)SHORT_NAT_CHANGE,
"Short flow NAT Changed")
82 ((uint16_t)SHORT_FLOW_LIMIT,
"Short flow Flow Limit Reached")
83 ((uint16_t)SHORT_LINKLOCAL_SRC_NAT,
84 "Short flow Linklocal source NAT failed")
85 ((uint16_t)SHORT_FAILED_VROUTER_INSTALL,
86 "Short flow vrouter install failed")
87 ((uint16_t)SHORT_INVALID_L2_FLOW,
"Short flow invalid L2 flow")
88 ((uint16_t)SHORT_FLOW_ON_TSN,
"Short flow TSN flow")
89 ((uint16_t)SHORT_NO_MIRROR_ENTRY,
"Short flow No mirror entry ")
90 ((uint16_t)SHORT_SAME_FLOW_RFLOW_KEY,
"Short flow same flow and rflow")
91 ((uint16_t)DROP_POLICY,
"Flow drop Policy")
92 ((uint16_t)DROP_OUT_POLICY,
"Flow drop Out Policy")
93 ((uint16_t)DROP_SG,
"Flow drop SG")
94 ((uint16_t)DROP_OUT_SG,
"Flow drop OUT SG")
95 ((uint16_t)DROP_REVERSE_SG,
"Flow drop REVERSE SG")
96 ((uint16_t)DROP_REVERSE_OUT_SG,
"Flow drop REVERSE OUT SG")
97 ((uint16_t)DROP_FIREWALL_POLICY,
"Flow drop Firewall Policy")
98 ((uint16_t)DROP_OUT_FIREWALL_POLICY,
"Flow drop OUT Firewall Policy")
99 ((uint16_t)DROP_REVERSE_FIREWALL_POLICY,
"Flow drop REVERSE Firewall Policy")
100 ((uint16_t)DROP_REVERSE_OUT_FIREWALL_POLICY,
"Flow drop REVERSE OUT Firewall Policy")
101 ((uint16_t)SHORT_NO_SRC_ROUTE_L2RPF,
"Short flow No Source route for RPF NH")
102 ((uint16_t)SHORT_FAT_FLOW_NAT_CONFLICT,
"Short flow Conflicting config for NAT and FAT flow")
103 ((uint16_t)DROP_FWAAS_POLICY,
"Flow drop FWAAS Policy")
104 ((uint16_t)DROP_FWAAS_OUT_POLICY,
"Flow drop OUT FWAAS Policy")
105 ((uint16_t)DROP_FWAAS_REVERSE_POLICY,
"Flow drop REVERSE FWAAS Policy")
106 ((uint16_t)DROP_FWAAS_REVERSE_OUT_POLICY,
"Flow drop REVERSE OUT FWAAS Policy")
107 ((uint16_t)SHORT_L3MH_PHY_INTF_DOWN,
"Short flow l3mh compute physical interface flap");
117 vm_(NULL), fd_(kInvalidFd), port_(0), flow_(NULL) {
142 assert(rhs.
port_ == 0);
146 assert(rhs.
vm_.get() == NULL);
176 if (
vm_.get() == NULL)
179 vm_->update_flow_count(-1);
181 vm_->update_linklocal_flow_count(-1);
212 vm_->update_linklocal_flow_count(1);
227 if (l3_proto == IPPROTO_TCP) {
228 fd_ = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
229 }
else if (l3_proto == IPPROTO_UDP) {
230 fd_ = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
243 if (l3_proto == IPPROTO_TCP) {
245 setsockopt(
fd_, SOL_SOCKET, SO_REUSEADDR,
246 (
const char*)&optval,
sizeof(optval));
249 struct sockaddr_in address;
250 memset(&address, 0,
sizeof(address));
251 address.sin_family = AF_INET;
252 if (::bind(
fd_, (
struct sockaddr*) &address,
sizeof(address)) < 0) {
257 struct sockaddr_in bound_to;
258 socklen_t len =
sizeof(bound_to);
259 if (getsockname(
fd_, (
struct sockaddr*) &bound_to, &len) < 0) {
264 port_ = ntohs(bound_to.sin_port);
331 std::vector<std::string> olist;
332 for (VnListType::const_iterator it = ilist.begin();
333 it != ilist.end(); ++it) {
334 olist.push_back(*it);
436 flow_handle_(
FlowEntry::kInvalidFlowHandle), flow_gen_id_(0),
437 ksync_entry_(NULL), hash_id_(
FlowEntry::kInvalidFlowHandle), gen_id_(0),
438 vrouter_flow_handle_(
FlowEntry::kInvalidFlowHandle), vrouter_gen_id_(0) {
448 flow_table_(flow_table), flags_(0),
450 fip_vmi_(
AgentKey::ADD_DEL_CHANGE, nil_uuid(),
""),
451 flow_mgmt_request_(NULL), flow_mgmt_info_() {
517 if (flow_table == NULL) {
554 if (update ==
false) {
572 int prev = fe->
refcount_.fetch_and_decrement();
582 FlowTable::FlowEntryMap::iterator it =
594 boost::hash_combine(hash, val);
604 }
else if (ip.is_v4()) {
691 if (
InitFlowCmn(info, ctrl, rev_ctrl, rflow) ==
false) {
712 if (ctrl->
rt_ != NULL) {
717 if (info->
ttl == 1) {
775 info->
pkt->ip_saddr, info->
pkt->ip_daddr,
776 info->
pkt->ip_proto, info->
pkt->sport, info->
pkt->dport);
784 if (
InitFlowCmn(info, ctrl, rev_ctrl, rflow) ==
false) {
805 if (ctrl->
rt_ != NULL) {
867 info->
pkt->ip_saddr, info->
pkt->ip_daddr,
868 info->
pkt->ip_proto, info->
pkt->sport, info->
pkt->dport);
931 std::ostringstream collector;
934 std::vector<string>::const_iterator it =
937 if (collector.str() == *it) {
943 uint16_t metadata_fabric_port = 0;
945 uint16_t local_port = 0;
946 std::string nova_hostname;
949 &local_ip, &local_port,
952 &metadata_fabric_port);
1008 uint32_t ethernet_tag) {
1019 return rflow->
fip();
1055 bool set_dest_vrf =
true;
1062 set_dest_vrf =
false;
1211 if (bridge_rt != NULL) {
1254 bool rpf_enable =
true;
1288 if (src_ip_rt == NULL) {
1324 if (rflow == NULL) {
1340 assert(cnh != NULL);
1373 "in reverse flow", flow_info);
1383 "destination vrf", flow_info);
1478 std::map<uint16_t, const char*>::const_iterator it =
1481 return string(it->second);
1496 static_cast<const VrfEntry *
>(agent->
1539 static_cast<const VrfNH *
>(anh);
1570 static_cast<const VrfEntry *
>(agent->
1612 static_cast<const VrfNH *
>(anh);
1697 bool vgw_pass =
true;
1850 bool vgw_pass =
false;
1871 if (rflow != NULL) {
1874 reverse_vm_port =
static_cast<const VmInterface *
>
1909 if (vm_port != NULL) {
1911 FirewallPolicyList::const_iterator it =
1939 if (r_intf == NULL) {
1943 vm_port =
dynamic_cast<const VmInterface *
>(r_intf);
1944 if (vm_port != NULL) {
1946 FirewallPolicyList::const_iterator it =
1977 std::list<MatchAclParams> &list) {
1983 for (VmInterface::SecurityGroupEntrySet::const_iterator it =
1986 if (it->sg_ == NULL)
1989 if (it->sg_->IsAclSet()) {
1997 acl.
acl = it->sg_->GetEgressAcl();
1999 acl.
acl = it->sg_->GetIngressAcl();
2002 list.push_back(acl);
2019 if (reverse_vm_port) {
2038 if (reverse_vm_port) {
2126 if ( src_intf == NULL || dst_intf == NULL ) {
2152 (src_intf->
id() < dst_intf->
id()) ?
2194 std::string vrf_assigned_name =
2196 std::list<MatchAclParams>::const_iterator acl_it;
2197 for (acl_it =
match_p().m_vrf_assign_acl_l.begin();
2200 std::string vrf = acl_it->action_info.vrf_translate_action_.vrf_name();
2205 acl_it->action_info.vrf_translate_action_.ignore_acl();
2222 std::list<MatchAclParams> &acl,
2223 bool add_implicit_deny,
bool add_implicit_allow,
2228 if (acl.size() == 0 && add_implicit_allow) {
2258 if ((hdr.
protocol == IPPROTO_ICMP ||
2270 uint32_t action = 0;
2271 for (std::list<MatchAclParams>::iterator it = acl.begin();
2272 it != acl.end(); ++it) {
2273 if (it->acl.get() == NULL) {
2277 if (it->acl->PacketMatch(hdr, *it, info)) {
2278 action |= it->action_info.action;
2282 it->action_info.mirror_l.begin(),
2283 it->action_info.mirror_l.end());
2286 if (it->terminal_rule) {
2293 if (action == 0 && add_implicit_deny) {
2355 bool tcp_rev,
bool is_sg) {
2358 if (rflow == NULL) {
2370 if (fwd_flow_info.
drop) {
2378 if (rev_flow_info.
drop) {
2384 if (tcp_rev ==
false) {
2408 if (tcp_rev ==
true) {
2496 SetAclInfo(sp, rsp, acl_info, out_acl_info,
false, is_sg);
2502 SetAclInfo(sp, rsp, acl_info, out_acl_info,
false, is_sg);
2512 SetAclInfo(sp, rsp, acl_info, out_acl_info,
false, is_sg);
2514 SetAclInfo(sp, rsp, rev_out_acl_info, rev_acl_info,
true, is_sg);
2585 true, &nw_acl_info);
2590 true,
true, &nw_acl_info);
2676 MatchAclParamsList::const_iterator it;
2690 it->action_info.qos_config_action_.id()
2692 i = it->action_info.qos_config_action_.id();
2700 it->action_info.qos_config_action_.id() !=
2702 i = it->action_info.qos_config_action_.id();
2710 it->action_info.qos_config_action_.id() !=
2712 i = it->action_info.qos_config_action_.id();
2720 it->action_info.qos_config_action_.id() !=
2722 i = it->action_info.qos_config_action_.id();
2747 uint32_t action = 0;
2853 if (vn && vn->
GetVrf()) {
2862 if (rvn && rvn->
GetVrf()) {
3016 std::vector<ActionStr> &action_str_l) {
3017 std::bitset<32> bs(action_info.
action);
3018 for (
unsigned int i = 0; i < bs.size(); i++) {
3023 action_str_l.push_back(astr);
3025 std::vector<MirrorActionSpec>::const_iterator m_it;
3026 for (m_it = action_info.
mirror_l.begin();
3027 m_it != action_info.
mirror_l.end();
3030 mstr.action += (*m_it).ip.to_string();
3034 mstr.action += (*m_it).vrf_name;
3036 mstr.action += (*m_it).encap;
3037 action_str_l.push_back(mstr);
3041 ActionStr vrf_action_str;
3042 vrf_action_str.action +=
3044 action_str_l.push_back(vrf_action_str);
3047 ActionStr hbf_action_str;
3048 hbf_action_str.action +=
"hbs";
3049 action_str_l.push_back(hbf_action_str);
3056 std::vector<AclAction> &acl_action_l,
3057 std::string &acl_type) {
3058 std::list<MatchAclParams>::const_iterator it;
3059 for(it = acl_l.begin(); it != acl_l.end(); ++it) {
3060 AclAction acl_action;
3061 acl_action.set_acl_id(
UuidToString((*it).acl->GetUuid()));
3062 acl_action.set_acl_type(acl_type);
3063 std::vector<ActionStr> action_str_l;
3065 acl_action.set_action_l(action_str_l);
3066 acl_action_l.push_back(acl_action);
3072 std::string acl_type(
"nw policy");
3080 acl_type =
"dynamic";
3084 acl_type =
"o nw policy";
3087 const std::list<MatchAclParams> &out_sg_acl_l =
3092 const std::list<MatchAclParams> &out_m_acl_l =
3094 acl_type =
"o dynamic";
3101 const std::list<MatchAclParams> &r_out_sg_l =
3103 acl_type =
"r o sg";
3106 const std::list<MatchAclParams> &vrf_assign_acl_l =
3108 acl_type =
"vrf assign";
3111 const std::list<MatchAclParams> &aps_l =
3113 acl_type =
"fw acl";
3116 const std::list<MatchAclParams> &out_aps_l =
3118 acl_type =
"reverse fw acl";
3120 acl_action_l, acl_type);
3122 const std::list<MatchAclParams> &fwaas_l =
3124 acl_type =
"fwaas acl";
3127 const std::list<MatchAclParams> &out_fwaas_l =
3129 acl_type =
"reverse fwaas acl";
3131 acl_action_l, acl_type);
3139 info.set_destination_ip(
key_.
dst_addr.to_v4().to_ulong());
3141 uint64_t sip[2], dip[2];
3144 info.set_sip_upper(sip[0]);
3145 info.set_sip_lower(sip[1]);
3146 info.set_dip_upper(dip[0]);
3147 info.set_dip_lower(dip[1]);
3148 info.set_source_ip(0);
3149 info.set_destination_ip(0);
3161 std::vector<uint32_t> v;
3162 SecurityGroupList::const_iterator it;
3167 info.set_source_sg_id_l(v);
3173 info.set_dest_sg_id_l(v);
3177 info.set_deny(
true);
3179 info.set_allow(
true);
3193 info.set_nat_source_ip
3196 info.set_nat_source_ip(0);
3202 info.set_nat_destination_ip
3205 info.set_nat_destination_ip(0);
3210 info.set_nat_source_port(nat_flow->
key().
dst_port);
3214 info.set_nat_destination_port(nat_flow->
key().
src_port);
3223 info.set_mirror(
true);
3224 std::vector<MirrorActionSpec>::const_iterator it;
3225 std::vector<MirrorInfo> mirror_l;
3229 MirrorInfo mirror_info;
3230 mirror_info.set_mirror_destination((*it).ip.to_string());
3231 mirror_info.set_mirror_port((*it).port);
3232 mirror_info.set_mirror_vrf((*it).vrf_name);
3233 mirror_info.set_analyzer((*it).analyzer_name);
3234 mirror_l.push_back(mirror_info);
3236 info.set_mirror_l(mirror_l);
3246 info.set_trap(
true);
3259 info.set_rpf_nh(
rpf_nh()->
id());
3261 info.set_rpf_nh(0xFFFFFFFF);
3266 info.set_src_ip_nh(0xFFFFFFFF);
3272 std::vector<AceId> &ace_l) {
3273 std::list<MatchAclParams>::const_iterator ma_it;
3274 for (ma_it = acl_l.begin();
3275 ma_it != acl_l.end();
3277 if ((*ma_it).acl != acl) {
3280 AclEntryIDList::const_iterator ait;
3281 for (ait = (*ma_it).ace_id_list.begin();
3282 ait != (*ma_it).ace_id_list.end(); ++ ait) {
3284 ace_id.id = ait->id_;
3285 ace_l.push_back(ace_id);
3291 FlowSandeshData &fe_sandesh_data,
Agent *agent)
const {
3299 std::vector<ActionStr> action_str_l;
3301 fe_sandesh_data.set_action_l(action_str_l);
3303 std::vector<AclAction> acl_action_l;
3305 fe_sandesh_data.set_acl_action_l(acl_action_l);
3328 std::vector<uint32_t> v;
3329 SecurityGroupList::const_iterator it;
3334 fe_sandesh_data.set_source_sg_id_l(v);
3340 fe_sandesh_data.set_dest_sg_id_l(v);
3348 fe_sandesh_data.set_teardown_time(
3351 fe_sandesh_data.set_teardown_time(
"");
3363 fe_sandesh_data.ace_l);
3365 fe_sandesh_data.ace_l);
3368 fe_sandesh_data.ace_l);
3370 fe_sandesh_data.ace_l);
3372 fe_sandesh_data.ace_l);
3374 fe_sandesh_data.ace_l);
3376 fe_sandesh_data.ace_l);
3378 fe_sandesh_data.ace_l);
3386 fe_sandesh_data.set_l3_flow(
l3_flow_);
3392 std::ostringstream str;
3394 str <<
" Idx : " << idx
3406 std::string &event_str) {
3409 event_str =
"FlowAdd";
3412 event_str =
"FlowUpdate";
3415 event_str =
"FlowDelete";
3418 event_str =
"FlowEvict";
3421 event_str =
"FlowHandleAssign";
3424 event_str =
"FlowMessageSkippedEvictedFlow";
3427 event_str =
"Unknown";
3446 std::vector<SandeshFlowIndexTrace> trace_list;
3447 for (
int i = 0; i < count; i++) {
3448 SandeshFlowIndexTrace
trace;
3450 trace.set_timestamp(log->
time_);
3455 trace.set_ksync_hash_id(log->
hash_id_);
3456 trace.set_ksync_gen_id(log->
gen_id_);
3459 trace_list.push_back(trace);
3461 info->set_flow_index_trace(trace_list);
3465 uint32_t flow_handle, uint8_t gen_id) {
3470 <<
" flow = " << (
void *)
this
3472 <<
" flow->gen_id = " << (
int)
gen_id_
3473 <<
" ksync = " << (
void *)ksync
3474 <<
" Ksync->hash_id = " << ((ksync != NULL) ? ksync->
hash_id() : -1)
3475 <<
" Ksync->gen_id = " << ((ksync != NULL) ? (int)ksync->
gen_id() : 0)
3476 <<
" new_flow_handle = " << flow_handle
3477 <<
" new_gen_id = " << (
int)
gen_id);
3520 FlowRouteRefMap::const_iterator it;
3521 for (it = rt_list.begin(); it != rt_list.end(); it++) {
3522 if (it->first == static_cast<int>(vrf)) {
3649 const IpAddress &dip, uint8_t proto, uint16_t sport,
3650 uint16_t dport)
const {
3655 uint8_t underlay_gw_index = -1;
3658 if (rflow != NULL) {
3661 return underlay_gw_index;
3666 const TunnelNH *tunnel_nh = rt !=
nullptr ?
3676 FindInterface(intf_in);
3678 underlay_gw_index = intf->
id();
3679 return underlay_gw_index;
3681 std::size_t hash = 0;
3682 hash =
HashIp(hash, sip);
3683 hash =
HashIp(hash, dip);
3691 if (rt ==
nullptr) {
3694 if ( !(tunnel_nh && (tunnel_nh->
IsValid()))) {
3699 while (index < encap_list.size()) {
3700 if (encap_list[index].
get()->interface_.get() &&
3701 underlay_gw_index == (encap_list[index].get()->interface_).
get()->id()) {
3702 underlay_gw_index = index;
3709 return underlay_gw_index;
3710 }
else if ( ((underlay_gw_index +1) < (uint8_t)tunnel_nh->
GetEncapDataList().size()) &&
3712 return underlay_gw_index +1;
3713 }
else if (((underlay_gw_index +1) >= (uint8_t)tunnel_nh->
GetEncapDataList().size()) &&
3725 boost::system::error_code ec;
3740 boost::system::error_code ec;
3771 *(table->agent()->event_manager())->io_service(),
3772 "FlowPortBindTimer",
3785 if (
tree_.size() == 0) {
3791 uint16_t entries_processed = 0;
3794 PortCacheTree::iterator it =
tree_.lower_bound(
hash_);
3795 while (it !=
tree_.end() && entries_processed <= no_of_entries) {
3798 PortCacheEntryList::iterator pcit = it->second.begin();
3799 while (pcit != it->second.end() && entries_processed <= no_of_entries) {
3800 PortCacheEntryList::iterator saved_pcit = pcit;
3802 if (saved_pcit->CanBeAged(current_time,
timeout_)) {
3807 entries_processed++;
3812 if (it ==
tree_.end()) {
3833 tree_[hash].insert(cache_entry);
3835 if (
tree_.size() == 1) {
3842 tree_[hash].erase(cache_entry);
3843 if (
tree_[hash].size() == 0) {
3847 if (
tree_.size() == 0) {
3855 PortCacheEntryList::iterator it =
tree_[hash].find(cache_entry);
3856 if (it !=
tree_[hash].end()) {
3866 PortCacheTree::const_iterator pct_it =
tree_.find(hash);
3867 if (pct_it ==
tree_.end()) {
3871 PortCacheEntryList::const_iterator it = pct_it->second.find(cache_entry);
3872 if (it != pct_it->second.end()) {
3880 std::size_t hash = 0;
3881 boost::hash_combine(hash, key.
dst_addr.to_v4().to_ulong());
3882 boost::hash_combine(hash, key.
dst_port);
3888 agent_(agent), protocol_(protocol), cache_(this),
3889 hash_table_size_(hash_table_size) {
3890 for (uint32_t i = 0; i < hash_table_size; i++) {
3906 tbb::recursive_mutex::scoped_lock lock(
mutex_);
3911 return entry->
port();
3920 uint16_t index = bit_map->Insert(key);
3922 bit_map->Remove(index);
3950 tbb::recursive_mutex::scoped_lock lock(
mutex_);
3965 if (existing_key.
IsEqual(key)) {
4011 Free(key, port_no,
true);
4022 uint16_t index = it->second;
4033 std::vector<PortConfig::PortRange>::const_iterator it =
4037 if (port >= it->port_start && port <= it->port_end) {
4058 new_pc), task_id, 0));
4063 tbb::recursive_mutex::scoped_lock lock(
mutex_);
4069 for (uint16_t index = 0; index < old_port_count; index++) {
4071 if (port.get() &&
IsValidPort(port->port(), count) ==
false) {
4082 std::vector<PortConfig::PortRange>::const_iterator it =
4087 for (uint16_t port = it->port_start;
4088 it->port_end && port <= it->port_end;
4110 std::vector<FlowKey> &list)
const {
4111 tbb::recursive_mutex::scoped_lock lock(
mutex_);
4120 list.push_back(existing_key);
4135 for (uint16_t proto = 0; proto < IPPROTO_MAX; proto++) {
EntryType At(size_t index) const
uint8_t prefix_length() const
!
bool InitFlowCmn(const PktFlowInfo *info, const PktControlInfo *ctrl, const PktControlInfo *rev_ctrl, FlowEntry *rflow)
bool AllocateFd(Agent *agent, uint8_t l3_proto)
bool linklocal_bind_local_port
static tbb::atomic< int > alloc_count_
void Delete(const PortCacheEntry &cache_entry)
bool is_flow_on_unresolved_list
void Move(VmFlowRef *rhs)
VmInterfaceKey reverse_flow_vmi() const
VnListType source_vn_list
int intrusive_ptr_add_ref(const AsPath *cpath)
boost::uuids::uuid rand_gen()
FlowStatsCollector * fsc_
bool bgp_router_service_flow
VnListType origin_vn_dst_list
void SetVm(const VmEntry *vm)
void GetSourceRouteInfo(const AgentRoute *rt)
const VnListType & dest_vn_list() const
bool ConcurrencyCheck(int task_id, bool check_task_instance)
bool operator<(const PortCacheEntry &rhs) const
uint16_t short_flow_reason_
void LogFlow(FlowEventLog::Event event, FlowTableKSyncEntry *ksync, uint32_t flow_handle, uint8_t gen_id)
void update_flow_count(int val) const
const TagList & local_tagset() const
void DelLinkLocalFlowInfo(int fd)
void FillUveLocalRevFlowStatsInfo(FlowUveFwPolicyInfo *info, bool added) const
boost::asio::ip::udp::socket socket_
FlowEntryMap flow_entry_map_
MatchAclParamsList m_reverse_acl_l
bool flood_unknown_unicast
uint16_t HashFlowKey(const FlowKey &key)
virtual uint8_t prefix_length() const
Returns the length of a stored prefix address.
const AgentQosConfig * qos_config() const
void update_linklocal_flow_count(int val)
static Agent * GetInstance()
const string & GetCfgName() const
The TaskScheduler keeps track of what tasks are currently schedulable. When a task is enqueued it is ...
const std::string BuildRemotePrefix(const FlowRouteRefMap &rt_list, uint32_t vr, const IpAddress &ip) const
const TagList & tag_list() const
static const uint32_t kInvalidComponentNHIdx
VmInterfaceKey InterfaceIdToKey(Agent *agent, uint32_t id)
void ResetRecomputeDBEntry()
bool get_vhost_disable_policy()
const uint16_t controller_ifmap_xmpp_port(uint8_t idx) const
AgentRouteTable * GetEvpnRouteTable() const
bool IsLess(const FlowKey &key) const
void SetAclAction(std::vector< AclAction > &acl_action_l) const
const AclDBEntry * GetAcl() const
const std::string fw_policy_name_uuid() const
const boost::uuids::uuid & GetUuid() const
std::string dest_vn_match
void SetAclInfo(SessionPolicy *sp, SessionPolicy *rsp, const FlowPolicyInfo &fwd_flow_info, const FlowPolicyInfo &rev_flow_info, bool tcp_rev, bool is_sg)
const VrfEntry * GetVrf() const
FlowTable * flow_table() const
const uint32_t id() const
uint32_t bgp_as_a_service_dport
boost::shared_ptr< PortBitMap > PortBitMapPtr
MatchAclParamsList m_vrf_assign_acl_l
tbb::atomic< int > refcount_
uint32_t component_nh_idx
void Add(const PortCacheEntry &cache_entry)
std::string source_vn_match
void DeleteAllFlow(uint16_t port, uint16_t index)
const MacAddress & dmac() const
uint32_t vrf_assign_acl_action
MatchAclParamsList m_acl_l
static std::vector< std::string > MakeList(const VnListType &ilist)
uint32_t reverse_flow_fip() const
const std::string & dns_server(uint8_t idx) const
uint32_t acl_assigned_vrf_index_
boost::asio::ip::address IpAddress
void reset_flags(const FlowEntryFlags &flags)
uint8_t underlay_gw_index_
std::vector< int > SecurityGroupList
boost::uuids::uuid egress_uuid_
uint32_t InterfaceKeyToId(Agent *agent, const VmInterfaceKey &key)
AgentStats * stats() const
uint8_t flow_retry_attempts_
uint32_t out_component_nh_idx
bool is_multicast() const
static bool ShouldDrop(uint32_t action)
boost::asio::io_context * io_service()
std::vector< std::string > SourceVnList() const
static const uint32_t DROP_FLAGS
static const uint32_t kInvalidIndex
void FillUveFwdFlowStatsInfo(FlowUveFwPolicyInfo *info, bool added) const
AgentDBEntry * FindActiveEntry(const DBEntry *key)
InterfaceTable * interface_table() const
void SetMirrorVrfFromAction()
std::pair< uint16_t, uint16_t > PortToBitIndexPair
void Init(FlowEntry *flow)
FlowRouteRefMap flow_source_plen_map
PortCacheTable(PortTable *table)
uint16_t event_log_index_
static const uint8_t kMaxV4PrefixLen
uint16_t table_index() const
void SetHbsInfofromAction()
boost::shared_ptr< PortTable > PortTablePtr
static const uint64_t kCacheAging
static std::string UuidToString(const boost::uuids::uuid &id)
static AgentRoute * GetEvpnRoute(const VrfEntry *entry, const MacAddress &mac, const IpAddress &addr, uint32_t ethernet_tag)
static AgentRoute * GetL2Route(const VrfEntry *entry, const MacAddress &mac)
std::vector< std::string > OriginVnDstList() const
void FillUveFwStatsInfo(FlowUveFwPolicyInfo *info, bool added) const
PortTableManager * port_table_manager()
void SetActionStr(const FlowAction &action_info, std::vector< ActionStr > &action_str_l)
uint32_t bgp_as_a_service_sport
bool CanRecomputeDBEntry()
const std::string & vrf_name() const
const bool & IsEncapValid(const uint32_t &i) const
bool IsFabricControlFlow() const
bool RpfFromSrcIpNh() const
uint16_t hash_table_size_
void RpfInit(const AgentRoute *rt, const IpAddress &sip)
static void PortConfigHandler(Agent *agent, uint8_t protocol, const PortConfig *pc)
tbb::recursive_mutex & mutex()
FlowPendingAction pending_actions_
FlowRouteRefMap flow_source_plen_map
boost::shared_ptr< Port > PortPtr
static FlowEntry * Allocate(const FlowKey &key, FlowTable *flow_table)
Base class for all Route entries in agent.
#define BGP_SERVICE_TTL_FWD_FLOW
BridgeRouteEntry * FindRouteNoLock(const MacAddress &mac)
FlowEntryPtr reverse_flow_entry_
uint32_t out_mirror_action
static const int kInvalidFd
static const VnListType UnknownVnList()
void InitRevFlow(const PktFlowInfo *info, const PktInfo *pkt, const PktControlInfo *ctrl, const PktControlInfo *rev_ctrl, FlowEntry *rflow, Agent *agent)
const NextHop * flow_key_nh() const
const std::string & sg_rule_uuid() const
uint16_t Allocate(const FlowKey &key)
boost::asio::ip::tcp::socket socket_
boost::shared_ptr< PktInfo > pkt
const std::string & service_intf_type() const
int GetTaskId(const std::string &name)
void UpdatePortConfig(const PortConfig *port_config)
std::string ToString() const
void InitFwdFlow(const PktFlowInfo *info, const PktInfo *pkt, const PktControlInfo *ctrl, const PktControlInfo *rev_ctrl, FlowEntry *rflow, Agent *agent)
static const SecurityGroupList & default_sg_list()
static void SetAclListAclAction(const std::list< MatchAclParams > &acl_l, std::vector< AclAction > &acl_action_l, std::string &acl_type)
MatchAclParamsList m_out_mirror_acl_l
std::vector< MirrorActionSpec > mirror_l
const FlowKey & key() const
void Remove(size_t index)
static const uint8_t kInvalidPort
const AgentPath * GetActivePath() const
void SetOutPacketHeader(PacketHeader *hdr)
void operator=(const VmFlowRef &rhs)
size_t Insert(EntryType entry)
FlowRouteRefMap flow_dest_plen_map
void MarkDelete(const PortCacheEntry &cache_entry)
bool reverse_rule_present
IndexVector< FlowKey > PortBitMap
EvpnRouteEntry * FindRouteNoLock(const MacAddress &mac, const IpAddress &ip_addr, uint32_t plen, uint32_t ethernet_tag)
std::vector< std::string > OriginVnSrcList() const
static SecurityGroupList default_sg_list_
BridgeRouteEntry * FindRoute(const MacAddress &mac)
static const std::string UnknownVn()
GlobalVrouter * global_vrouter() const
void SetHbsInterface(HbsInterface intf)
VrfEntry * FindVrfFromId(size_t index)
void AddLinkLocalFlowInfo(int fd, uint32_t index, const FlowKey &key, const uint64_t timestamp)
const SecurityGroupEntryList & sg_list() const
PortTable(Agent *agent, uint32_t bucket_size, uint8_t protocol)
bool is_flags_set(const FlowEntryFlags &flags) const
static const uint16_t CollectorPort()
static const std::string integerToString(const NumberType &num)
std::vector< string > & GetCollectorlist()
bool IsEqual(const FlowKey &key) const
void SetMirrorVrf(const uint32_t id)
VrfTranslateActionSpec vrf_translate_action_
PortToBitIndexMap port_to_bit_index_
const FlowKey & key() const
void RevFlowDepInfo(RevFlowDepParams *params)
bool reverse_out_rule_present
const std::string fw_policy_uuid() const
std::string peer_vrouter_
static TaskScheduler * GetInstance()
void UpdateReflexiveAction()
void Copy(FlowEntry *rhs, bool update)
const boost::uuids::uuid & uuid() const
const FirewallPolicyList & fwaas_fw_policy_list() const
SessionPolicy fwaas_policy
bool CanBeAged(uint64_t current_time, uint64_t timeout) const
const NextHop * GetActiveNextHop() const
void InitAuditFlow(uint32_t flow_idx, uint8_t gen_id)
Ip4Address router_id() const
map< int, int > FlowRouteRefMap
MatchAclParamsList m_acl_l
MatchAclParamsList m_reverse_out_acl_l
VmInterfaceKey fip_vmi() const
const boost::uuids::uuid & egress_uuid() const
EventManager * event_manager() const
FlowTableKSyncEntry * ksync_entry_
const std::vector< std::string > & fabric_interface_name_list() const
const AclDBEntry * GetMirrorAcl() const
static void SetRpfFieldsInternal(FlowEntry *flow, const AgentRoute *rt)
static boost::posix_time::ptime UTCUsecToPTime(uint64_t tusec)
uint32_t out_policy_action
static std::string EventToString(FlowEventLog::Event event, std::string &event_str)
FlowEntry * Allocate(const FlowKey &key)
static const std::string & NullString()
bool vrf_assign_evaluated
bool IsGwPacket(const Interface *intf, const IpAddress &dst_ip)
static bool ComputeDirection(const Interface *intf)
bool IsValidPort(uint16_t port, uint16_t count)
static std::string DropReasonStr(uint16_t reason)
void Reset(bool reset_flow)
AgentRouteTable * GetBridgeRouteTable() const
void set_flags(const FlowEntryFlags &flags)
void Free(const FlowKey &key, uint16_t port, bool release)
const std::string & origin_vn() const
PktHandler * pkt_handler() const
FlowTableKSyncEntry * ksync_entry_
void GetDestRouteInfo(const AgentRoute *rt)
uint16_t sm_log_count() const
#define FLOW_TRACE(obj,...)
bool policy_enabled() const
void MakeShortFlow(FlowShortReason reason)
static AgentRoute * GetUcRoute(const VrfEntry *entry, const IpAddress &addr)
bool ImplicitDenyFlow() const
void update_flow_count(int val) const
void Ip6AddressToU64Array(const Ip6Address &addr, uint64_t *arr, int size)
std::string origin_vn_src
void Reset(const FlowKey &k)
static void GetFlowSandeshActionParams(const FlowAction &action_info, std::string &action_str)
void set_stale(bool stale) const
const std::string & controller_ifmap_xmpp_server(uint8_t idx) const
bool HasVmInterface(const VmInterface *vmi) const
void set_acl_assigned_vrf_index()
const uint32_t vrf_id() const
std::set< std::string > VnListType
static std::string ActionToString(enum Action at)
void set_port_config_handler(PortConfigHandler handler)
bool HandlePortConfig(const PortConfig &pc)
void RpfSetSrcIpNhFields(const AgentRoute *rt, const NextHop *src_ip_nh)
const AclDBEntry * vrf_assign_acl() const
PortTablePtr port_table_list_[IPPROTO_MAX]
void RpfSetRpfNhFields(const NextHop *rpf_nh)
virtual const PrefixType & prefix_address() const
Returns the value of a stored prefix address (IPv4, IPv6 or MAC address)
boost::asio::ip::address_v4 Ip4Address
const uint16_t dns_server_port(uint8_t idx) const
void GetPolicy(const VnEntry *vn, const FlowEntry *rflow)
FlowProto * get_flow_proto() const
void SessionMatch(SessionPolicy *sp, SessionPolicy *rsp, bool is_sg)
void SetPacketHeader(PacketHeader *hdr)
const MacAddress & smac() const
VrfTable * vrf_table() const
const Interface * intf_entry() const
std::string origin_vn_dst
FlowMgmtRequest * flow_mgmt_request_
const TagList & remote_tagset() const
static bool CopySgEntries(const VmInterface *vm_port, bool ingress_acl, std::list< MatchAclParams > &list)
uint16_t Allocate(const FlowKey &key)
void set_ignore_acl(bool ignore_acl)
uint16_t GetPortIndex(uint16_t port) const
SecurityGroupList dest_sg_id_l
MatchAclParamsList m_mirror_acl_l
boost::scoped_array< FlowEventLog > event_logs_
const AgentHdr & GetAgentHdr() const
std::string remote_prefix_
VrfEntry * GetVrf() const
const EncapDataList GetEncapDataList() const
void Relocate(uint16_t port_no)
uint32_t flow_handle() const
MatchAclParamsList m_out_acl_l
static const std::string kMetadataService
static uint64_t UTCTimestampUsec()
const VnEntry * vn_entry() const
MatchAclParamsList m_out_acl_l
static const std::map< uint16_t, const char * > FlowDropReasonStr
VmInterface::VmiType vmi_type() const
uint8_t GetUnderlayGwIndex(uint32_t intf_in, const IpAddress &sip, const IpAddress &dip, uint8_t proto, uint16_t sport, uint16_t dport) const
const PortCacheEntry * Find(const FlowKey &key) const
bool IsRPFInvalid() const
void DeleteFlowRequest(FlowEntry *flow)
void GetApplicationPolicySet(const Interface *intf, const FlowEntry *rflow)
uint16_t short_flow_reason
boost::uuids::uuid rev_uuid_
uint8_t prefix_length() const
The length of L3 IP prefix (if present) associated with this L2 address.
bool is_vn_qos_config() const
static const uint32_t kInvalidIndex
const boost::uuids::uuid & vmi_cfg_uuid() const
bool Start(int time, Handler handler, ErrorHandler error_handler=NULL)
void SetAclFlowSandeshData(const AclDBEntry *acl, FlowSandeshData &fe_sandesh_data, Agent *agent) const
static const uint32_t kInvalidFlowHandle
SecurityGroupEntrySet list_
FlowEntry * reverse_flow_entry()
std::vector< EncapDataPtr > EncapDataList
static const std::map< FlowPolicyState, const char * > FlowPolicyStateStr
void set_flow_handle(uint32_t flow_handle, uint8_t gen_id)
void DeletePort(uint16_t port_no)
void AddPort(uint16_t port_no)
static uint32_t ComputeHostIpPlen(const IpAddress &addr)
void FillUveVnAceInfo(FlowUveVnAcePolicyInfo *info) const
const Interface * FindInterface(size_t index) const
void Free(FlowEntry *flow)
static const uint32_t kInvalidIndex
std::list< MatchAclParams > MatchAclParamsList
#define LOG(_Level, _Msg)
void Free(const FlowKey &key, uint16_t port, bool release)
void GetNonLocalFlowSgList(const VmInterface *vm_port)
void ForceEnqueueFreeFlowReference(FlowEntryPtr &flow)
void intrusive_ptr_release(const AsPath *cpath)
void set_flow_mgmt_info(FlowEntryInfo *info)
const FirewallPolicyList & fw_policy_list() const
const std::string RemotePrefix() const
const VrfEntry * GetDestinationVrf() const
const std::string & name() const
bool SetRecomputeDBEntry()
uint64_t teardown_time() const
static uint64_t ClockMonotonicUsec()
PortPtr CreatePortEntry(uint16_t port_no)
std::string KeyString() const
void UpdatePortConfig(uint8_t protocol, const PortConfig *config)
const string & GetName() const
static std::size_t HashCombine(std::size_t hash, uint64_t val)
const std::string & nw_ace_uuid() const
boost::uuids::uuid rev_egress_uuid_
uint32_t vrouter_flow_handle_
static const uint32_t IMPLICIT_DENY_FLAGS
void GetLocalFlowSgList(const VmInterface *vm_port, const VmInterface *reverse_vm_port)
void UpdateFipStatsInfo(uint32_t fip, uint32_t id, Agent *agent)
const NextHop * src_ip_nh() const
KSyncFlowIndexManager * ksync_flow_index_manager() const
void GetSgList(const Interface *intf)
void ResetRuleMatchInfo()
PortTableManager(Agent *agent, uint16_t hash_table_size)
InetUnicastRouteEntry * GetUcRoute(const IpAddress &addr) const
FlowRouteRefMap flow_dest_plen_map
uint32_t reverse_out_action
const NextHop * rpf_nh() const
uint32_t MatchAcl(const PacketHeader &hdr, MatchAclParamsList &acl, bool add_implicit_deny, bool add_implicit_allow, FlowPolicyInfo *info)
const std::string & acl_assigned_vrf() const
SecurityGroupList source_sg_id_l
PortHashTable hash_table_
std::vector< std::string > DestinationVnList() const
void FillFlowInfo(FlowInfo &info) const
tbb::recursive_mutex mutex_
static const uint16_t DnsXmpp()
void set_vrf_name(const std::string &vrf_name)
FlowMgmtEntryInfoPtr flow_mgmt_info_
const MatchPolicy & match_p() const
const std::string InterfaceIdToVmCfgName(Agent *agent, uint32_t id)
InterfaceConstRef intf_entry
std::vector< PortRange > port_range
static void SetAclListAceId(const AclDBEntry *acl, const MatchAclParamsList &acl_l, std::vector< AceId > &ace_l)
FlowEntryFreeList * free_list()
bool FindFlowExportInfo(const FlowEntry *fe, FlowEntryTree::iterator &it)
const SecurityGroupList & sg_list() const
bool IsIngressFlow() const
VnListType origin_vn_src_list
const VmEntry * vm() const
const AclDBEntry * GetMirrorCfgAcl() const
static std::size_t HashIp(std::size_t hash, const IpAddress &ip)
void GetFlowKeyList(uint16_t port, std::vector< FlowKey > &key) const
uint32_t acl_assigned_vrf_index() const
FlowEntry(FlowTable *flow_table)
#define BGP_SERVICE_TTL_REV_FLOW
static bool DeleteTimer(Timer *Timer)
boost::intrusive_ptr< FlowEntry > FlowEntryPtr
void SetEventSandeshData(SandeshFlowIndexInfo *info)
NextHopConstRef src_ip_nh
std::vector< int > TagList
std::unique_ptr< TaskTrigger > task_trigger_