aboutsummaryrefslogtreecommitdiffstats
path: root/src/plugins/vrrp/node.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/plugins/vrrp/node.c')
-rw-r--r--src/plugins/vrrp/node.c753
1 files changed, 753 insertions, 0 deletions
diff --git a/src/plugins/vrrp/node.c b/src/plugins/vrrp/node.c
new file mode 100644
index 00000000000..b819919e428
--- /dev/null
+++ b/src/plugins/vrrp/node.c
@@ -0,0 +1,753 @@
+/*
+ * node.c - vrrp packet handling node definitions
+ *
+ * Copyright 2019-2020 Rubicon Communications, LLC (Netgate)
+ *
+ * SPDX-License-Identifier: Apache-2.0
+ *
+ */
+#include <vlib/vlib.h>
+#include <vlibmemory/api.h>
+#include <vnet/vnet.h>
+#include <vnet/ip/ip4_packet.h>
+#include <vnet/ip/ip6_link.h>
+#include <vnet/ethernet/arp_packet.h>
+#include <vnet/pg/pg.h>
+#include <vppinfra/error.h>
+#include <vrrp/vrrp.h>
+#include <vrrp/vrrp_packet.h>
+
+typedef struct
+{
+ u32 sw_if_index;
+ u8 is_ipv6;
+ vrrp_header_t vrrp;
+ u8 addrs[256]; /* print up to 64 IPv4 or 16 IPv6 addresses */
+} vrrp_trace_t;
+
+/* packet trace format function */
+static u8 *
+format_vrrp_trace (u8 * s, va_list * args)
+{
+ CLIB_UNUSED (vlib_main_t * vm) = va_arg (*args, vlib_main_t *);
+ CLIB_UNUSED (vlib_node_t * node) = va_arg (*args, vlib_node_t *);
+ vrrp_trace_t *t = va_arg (*args, vrrp_trace_t *);
+ int i;
+
+ s = format (s, "VRRP: sw_if_index %d IPv%d\n",
+ t->sw_if_index, (t->is_ipv6) ? 6 : 4);
+ s = format (s, " %U\n", format_vrrp_packet_hdr, &t->vrrp);
+ s = format (s, " addresses: ");
+
+ for (i = 0; i < t->vrrp.n_addrs; i++)
+ {
+ if (t->is_ipv6)
+ s = format (s, "%U ", format_ip6_address,
+ (ip6_address_t *) (t->addrs + i * 16));
+ else
+ s = format (s, "%U ", format_ip4_address,
+ (ip4_address_t *) (t->addrs + i * 4));
+ }
+
+ return s;
+}
+
+extern vlib_node_registration_t vrrp4_input_node;
+extern vlib_node_registration_t vrrp6_input_node;
+extern vlib_node_registration_t vrrp4_arp_input_node;
+extern vlib_node_registration_t vrrp6_nd_input_node;
+
+#define foreach_vrrp_error \
+_(RECEIVED, "VRRP packets processed") \
+_(BAD_TTL, "VRRP advertisement TTL is not 255") \
+_(NOT_VERSION_3, "VRRP version is not 3") \
+_(INCOMPLETE_PKT, "VRRP packet has wrong size") \
+_(BAD_CHECKSUM, "VRRP checksum is invalid") \
+_(UNKNOWN_VR, "VRRP message does not match known VRs") \
+_(ADDR_MISMATCH, "VR addrs do not match configuration")
+
+typedef enum
+{
+#define _(sym,str) VRRP_ERROR_##sym,
+ foreach_vrrp_error
+#undef _
+ VRRP_N_ERROR,
+} vrrp_error_t;
+
+static char *vrrp_error_strings[] = {
+#define _(sym,string) string,
+ foreach_vrrp_error
+#undef _
+};
+
+typedef enum
+{
+ VRRP_INPUT_NEXT_DROP,
+ VRRP_INPUT_N_NEXT,
+} vrrp_next_t;
+
+typedef struct vrrp_input_process_args
+{
+ u32 vr_index;
+ vrrp_header_t *pkt;
+} vrrp_input_process_args_t;
+
+/* Given a VR and a pointer to the VRRP header of an incoming packet,
+ * compare the local src address to the peers. Return < 0 if the local
+ * address < the peer address, 0 if they're equal, > 0 if
+ * the local address > the peer address
+ */
+static int
+vrrp_vr_addr_cmp (vrrp_vr_t * vr, vrrp_header_t * pkt)
+{
+ vrrp_vr_config_t *vrc = &vr->config;
+ void *peer_addr, *local_addr;
+ ip46_address_t addr;
+ int addr_size;
+
+ clib_memset (&addr, 0, sizeof (addr));
+
+ if (vrrp_vr_is_ipv6 (vr))
+ {
+ peer_addr = &(((ip6_header_t *) pkt) - 1)->src_address;
+ local_addr = &addr.ip6;
+ addr_size = 16;
+ ip6_address_copy (local_addr,
+ ip6_get_link_local_address (vrc->sw_if_index));
+ }
+ else
+ {
+ peer_addr = &(((ip4_header_t *) pkt) - 1)->src_address;
+ local_addr = &addr.ip4;
+ addr_size = 4;
+ ip4_src_address_for_packet (&ip4_main.lookup_main,
+ vrc->sw_if_index, local_addr);
+ }
+
+ return memcmp (local_addr, peer_addr, addr_size);
+}
+
+static void
+vrrp_input_process_master (vrrp_vr_t * vr, vrrp_header_t * pkt)
+{
+ /* received priority 0, another VR is shutting down. send an adv and
+ * remain in the master state
+ */
+ if (pkt->priority == 0)
+ {
+ clib_warning ("Received shutdown message from a peer on VR %U",
+ format_vrrp_vr_key, vr);
+ vrrp_adv_send (vr, 0);
+ vrrp_vr_timer_set (vr, VRRP_VR_TIMER_ADV);
+ return;
+ }
+
+ /* if either:
+ * - received priority > adjusted priority, or
+ * - received priority == adjusted priority and peer addr > local addr
+ * allow the local VR to be preempted by the peer
+ */
+ if ((pkt->priority > vrrp_vr_priority (vr)) ||
+ ((pkt->priority == vrrp_vr_priority (vr)) &&
+ (vrrp_vr_addr_cmp (vr, pkt) < 0)))
+ {
+ vrrp_vr_transition (vr, VRRP_VR_STATE_BACKUP, pkt);
+
+ return;
+ }
+
+ /* if we made it this far, eiher received prority < adjusted priority or
+ * received == adjusted and local addr > peer addr. Ignore.
+ */
+ return;
+}
+
+/* RFC 5798 section 6.4.2 */
+static void
+vrrp_input_process_backup (vrrp_vr_t * vr, vrrp_header_t * pkt)
+{
+ vrrp_vr_config_t *vrc = &vr->config;
+ vrrp_vr_runtime_t *vrt = &vr->runtime;
+
+ /* master shutting down, ready for election */
+ if (pkt->priority == 0)
+ {
+ clib_warning ("Master for VR %U is shutting down", format_vrrp_vr_key,
+ vr);
+ vrt->master_down_int = vrt->skew;
+ vrrp_vr_timer_set (vr, VRRP_VR_TIMER_MASTER_DOWN);
+ return;
+ }
+
+ /* no preempt set or adv from a higher priority router, update timers */
+ if (!(vrc->flags & VRRP_VR_PREEMPT) ||
+ (pkt->priority >= vrrp_vr_priority (vr)))
+ {
+ vrt->master_adv_int = clib_net_to_host_u16 (pkt->rsvd_and_max_adv_int);
+ vrt->master_adv_int &= ((u16) 0x0fff); /* ignore rsvd bits */
+
+ vrrp_vr_skew_compute (vr);
+ vrrp_vr_master_down_compute (vr);
+ vrrp_vr_timer_set (vr, VRRP_VR_TIMER_MASTER_DOWN);
+ return;
+ }
+
+ /* preempt set or our priority > received, continue to wait on master down */
+ return;
+}
+
+always_inline void
+vrrp_input_process (vrrp_input_process_args_t * args)
+{
+ vrrp_vr_t *vr;
+
+ vr = vrrp_vr_lookup_index (args->vr_index);
+
+ if (!vr)
+ {
+ clib_warning ("Error retrieving VR with index %u", args->vr_index);
+ return;
+ }
+
+ switch (vr->runtime.state)
+ {
+ case VRRP_VR_STATE_INIT:
+ return;
+ case VRRP_VR_STATE_BACKUP:
+ /* this is usually the only state an advertisement should be received */
+ vrrp_input_process_backup (vr, args->pkt);
+ break;
+ case VRRP_VR_STATE_MASTER:
+ /* might be getting preempted. or have a misbehaving peer */
+ clib_warning ("Received advertisement for master VR %U",
+ format_vrrp_vr_key, vr);
+ vrrp_input_process_master (vr, args->pkt);
+ break;
+ default:
+ clib_warning ("Received advertisement for VR %U in unknown state %d",
+ format_vrrp_vr_key, vr, vr->runtime.state);
+ break;
+ }
+
+ return;
+}
+
+typedef struct
+{
+ ip46_address_t ip;
+ u32 vr_index;
+ u8 vr_id;
+ u8 is_ipv6;
+} vrrp_arp_nd_trace_t;
+
+
+static u8 *
+format_vrrp_arp_nd_input_trace (u8 * s, va_list * va)
+{
+ CLIB_UNUSED (vlib_main_t * vm) = va_arg (*va, vlib_main_t *);
+ CLIB_UNUSED (vlib_node_t * node) = va_arg (*va, vlib_node_t *);
+ vrrp_arp_nd_trace_t *t = va_arg (*va, vrrp_arp_nd_trace_t *);
+
+ s = format (s, "address %U",
+ (t->is_ipv6) ? format_ip6_address : format_ip4_address,
+ (t->is_ipv6) ? (void *) &t->ip.ip6 : (void *) &t->ip.ip4);
+
+ if (t->vr_index != ~0)
+ s = format (s, ": vr_index %u vr_id %u", t->vr_index, t->vr_id);
+
+ return s;
+}
+
+typedef enum
+{
+ VRRP_ARP_INPUT_NEXT_DROP,
+ VRRP_ARP_INPUT_NEXT_REPLY_TX,
+ VRRP_ARP_N_NEXT,
+} vrrp_arp_next_t;
+
+typedef enum
+{
+ VRRP_ND_INPUT_NEXT_DROP,
+ VRRP_ND_INPUT_NEXT_REPLY_TX,
+ VRRP_ND_N_NEXT,
+} vrrp_nd_next_t;
+
+static_always_inline void
+vrrp_arp_nd_next (vlib_buffer_t * b, u32 * next_index, u32 * vr_index,
+ u8 is_ipv6)
+{
+ vnet_main_t *vnm = vnet_get_main ();
+ vlib_main_t *vm = vlib_get_main ();
+ ethernet_header_t *eth, *eth_new;
+ void *lookup_addr = 0;
+ vrrp_vr_t *vr;
+ u32 sw_if_index;
+ vnet_link_t link_type;
+ u8 *rewrite, rewrite_len;
+ int bogus_length;
+ /* ND vars */
+ ip6_header_t *ip6 = 0;
+ icmp6_neighbor_solicitation_or_advertisement_header_t *sol_adv = 0;
+ icmp6_neighbor_discovery_ethernet_link_layer_address_option_t *lladdr = 0;
+ /* ARP vars */
+ ethernet_arp_header_t *arp;
+ ip4_address_t ip4_addr;
+
+ if (is_ipv6)
+ {
+ ip6 = vlib_buffer_get_current (b);
+
+ /* we only care about about ICMP6 neighbor solicitiations */
+ if (ip6->protocol != IP_PROTOCOL_ICMP6)
+ return;
+
+ sol_adv = ip6_next_header (ip6);
+ lladdr = (void *) (sol_adv + 1);
+
+ /* skip anything other than neighbor solicitations */
+ if (sol_adv->icmp.type != ICMP6_neighbor_solicitation)
+ return;
+
+ lookup_addr = &sol_adv->target_address;
+ link_type = VNET_LINK_IP6;
+ }
+ else
+ {
+ arp = vlib_buffer_get_current (b);
+
+ /* skip non-request packets */
+ if (arp->opcode != clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_request))
+ return;
+
+ lookup_addr = &arp->ip4_over_ethernet[1].ip4;
+ link_type = VNET_LINK_ARP;
+ }
+
+ sw_if_index = vnet_buffer (b)->sw_if_index[VLIB_RX];
+
+ /* Don't bother with a hash lookup if no VRs configured on this interface */
+ if (!vrrp_intf_num_vrs (sw_if_index, is_ipv6))
+ return;
+
+ /* skip requests that are not for VRRP addresses */
+ *vr_index = vrrp_vr_lookup_address (sw_if_index, is_ipv6, lookup_addr);
+ if (*vr_index == ~0)
+ return;
+
+ /* only reply if the VR is in the master state */
+ vr = vrrp_vr_lookup_index (*vr_index);
+ if (!vr || vr->runtime.state != VRRP_VR_STATE_MASTER)
+ return;
+
+ eth = ethernet_buffer_get_header (b);
+ rewrite = ethernet_build_rewrite (vnm, sw_if_index, link_type,
+ eth->src_address);
+ rewrite_len = vec_len (rewrite);
+ if (rewrite_len == 0)
+ return;
+
+ /* send the reply out the incoming interface */
+ *next_index = VRRP_ARP_INPUT_NEXT_REPLY_TX;
+ vnet_buffer (b)->sw_if_index[VLIB_TX] = sw_if_index;
+
+ /* the outbound ethernet & vlan headers may have a different length than
+ * the received header, so get a pointer to the new start of the packet
+ * and write the header there.
+ */
+ vlib_buffer_advance (b, -rewrite_len);
+ eth_new = vlib_buffer_get_current (b);
+ clib_memcpy_fast (eth_new, rewrite, rewrite_len);
+ vec_free (rewrite);
+
+ if (is_ipv6)
+ {
+ if (ip6_address_is_unspecified (&ip6->src_address))
+ ip6_set_reserved_multicast_address (&ip6->dst_address,
+ IP6_MULTICAST_SCOPE_link_local,
+ IP6_MULTICAST_GROUP_ID_all_hosts);
+ else
+ ip6->dst_address = ip6->src_address;
+
+ ip6->src_address = sol_adv->target_address;
+ ip6->hop_limit = 255;
+ sol_adv->icmp.type = ICMP6_neighbor_advertisement;
+ sol_adv->icmp.checksum = 0;
+ sol_adv->advertisement_flags =
+ clib_host_to_net_u32 (ICMP6_NEIGHBOR_ADVERTISEMENT_FLAG_ROUTER
+ | ICMP6_NEIGHBOR_ADVERTISEMENT_FLAG_SOLICITED
+ | ICMP6_NEIGHBOR_ADVERTISEMENT_FLAG_OVERRIDE);
+
+ clib_memcpy (lladdr->ethernet_address, vr->runtime.mac.bytes,
+ sizeof (mac_address_t));
+ lladdr->header.type =
+ ICMP6_NEIGHBOR_DISCOVERY_OPTION_target_link_layer_address;
+
+ sol_adv->icmp.checksum =
+ ip6_tcp_udp_icmp_compute_checksum (vm, b, ip6, &bogus_length);
+
+ }
+ else
+ {
+ ip4_addr = arp->ip4_over_ethernet[1].ip4;
+
+ arp->opcode = clib_host_to_net_u16 (ETHERNET_ARP_OPCODE_reply);
+ arp->ip4_over_ethernet[1] = arp->ip4_over_ethernet[0];
+
+ arp->ip4_over_ethernet[0].mac = vr->runtime.mac;
+ arp->ip4_over_ethernet[0].ip4 = ip4_addr;
+ }
+}
+
+static_always_inline uword
+vrrp_arp_nd_input_inline (vlib_main_t * vm, vlib_node_runtime_t * node,
+ vlib_frame_t * frame, u8 is_ipv6)
+{
+ u32 n_left_from, *from, next_index, *to_next;
+
+ from = vlib_frame_vector_args (frame);
+ n_left_from = frame->n_vectors;
+ next_index = node->cached_next_index;
+
+ while (n_left_from > 0)
+ {
+ u32 n_left_to_next;
+
+ vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
+
+ while (n_left_from > 0 && n_left_to_next > 0)
+ {
+
+ vlib_buffer_t *b0;
+ u32 bi0;
+ u32 next0;
+ u32 vr_index = ~0;
+
+ bi0 = from[0];
+ to_next[0] = bi0;
+ from += 1;
+ to_next += 1;
+ n_left_from -= 1;
+ n_left_to_next -= 1;
+
+ b0 = vlib_get_buffer (vm, bi0);
+
+ vnet_feature_next (&next0, b0);
+ vrrp_arp_nd_next (b0, &next0, &vr_index, is_ipv6);
+
+ if (b0->flags & VLIB_BUFFER_IS_TRACED)
+ {
+ vrrp_arp_nd_trace_t *t =
+ vlib_add_trace (vm, node, b0, sizeof (*t));
+ vrrp_vr_t *vr;
+
+ if (is_ipv6)
+ {
+ ip6_header_t *ip0;
+ icmp6_neighbor_solicitation_or_advertisement_header_t
+ * sol_adv0;
+
+ ip0 = vlib_buffer_get_current (b0);
+ sol_adv0 = ip6_next_header (ip0);
+ t->ip.ip6 = sol_adv0->target_address;
+ }
+ else
+ {
+ ethernet_arp_header_t *arp0;
+
+ arp0 = vlib_buffer_get_current (b0);
+ t->ip.ip4 = arp0->ip4_over_ethernet[0].ip4;
+ }
+
+ vr = vrrp_vr_lookup_index (vr_index);
+ if (vr)
+ t->vr_id = vr->config.vr_id;
+
+ t->vr_index = vr_index;
+ t->is_ipv6 = is_ipv6;
+ }
+
+ vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
+ n_left_to_next, bi0, next0);
+ }
+
+ vlib_put_next_frame (vm, node, next_index, n_left_to_next);
+ }
+
+ return frame->n_vectors;
+}
+
+VLIB_NODE_FN (vrrp4_arp_input_node) (vlib_main_t * vm,
+ vlib_node_runtime_t * node,
+ vlib_frame_t * frame)
+{
+ return vrrp_arp_nd_input_inline (vm, node, frame, 0 /* is_ipv6 */ );
+}
+
+/* *INDENT-OFF* */
+VLIB_REGISTER_NODE (vrrp4_arp_input_node) =
+{
+ .name = "vrrp4-arp-input",
+ .vector_size = sizeof (u32),
+ .format_trace = format_vrrp_arp_nd_input_trace,
+ .type = VLIB_NODE_TYPE_INTERNAL,
+
+ .n_errors = ARRAY_LEN(vrrp_error_strings),
+ .error_strings = vrrp_error_strings,
+
+ .n_next_nodes = VRRP_ARP_N_NEXT,
+
+ .next_nodes = {
+ [VRRP_ARP_INPUT_NEXT_DROP] = "error-drop",
+ [VRRP_ARP_INPUT_NEXT_REPLY_TX] = "interface-output",
+ },
+};
+
+VNET_FEATURE_INIT (vrrp4_arp_feat_node, static) =
+{
+ .arc_name = "arp",
+ .node_name = "vrrp4-arp-input",
+ .runs_before = VNET_FEATURES ("arp-reply"),
+};
+
+VLIB_NODE_FN (vrrp6_nd_input_node) (vlib_main_t * vm,
+ vlib_node_runtime_t * node,
+ vlib_frame_t * frame)
+{
+ return vrrp_arp_nd_input_inline (vm, node, frame, 1 /* is_ipv6 */);
+}
+
+/* *INDENT-OFF* */
+VLIB_REGISTER_NODE (vrrp6_nd_input_node) =
+{
+ .name = "vrrp6-nd-input",
+ .vector_size = sizeof (u32),
+ .format_trace = format_vrrp_arp_nd_input_trace,
+ .type = VLIB_NODE_TYPE_INTERNAL,
+
+ .n_errors = ARRAY_LEN(vrrp_error_strings),
+ .error_strings = vrrp_error_strings,
+
+ .n_next_nodes = VRRP_ND_N_NEXT,
+
+ .next_nodes = {
+ [VRRP_ND_INPUT_NEXT_DROP] = "error-drop",
+ [VRRP_ND_INPUT_NEXT_REPLY_TX] = "interface-output",
+ },
+};
+
+VNET_FEATURE_INIT (vrrp6_nd_feat_node, static) =
+{
+ .arc_name = "ip6-local",
+ .node_name = "vrrp6-nd-input",
+ .runs_before = VNET_FEATURES ("ip6-local-end-of-arc"),
+};
+
+static_always_inline uword
+vrrp_input_inline (vlib_main_t * vm, vlib_node_runtime_t * node,
+ vlib_frame_t * frame, u8 is_ipv6)
+{
+ u32 n_left_from, *from;
+ vrrp_main_t *vmp = &vrrp_main;
+
+ from = vlib_frame_vector_args (frame);
+ n_left_from = frame->n_vectors;
+
+ while (n_left_from > 0)
+ {
+ u32 bi0;
+ vlib_buffer_t *b0;
+ u32 next0, error0;
+ void *ip0;
+ vrrp_header_t *vrrp0;
+ vrrp_vr_t *vr0;
+ vrrp_input_process_args_t args0;
+ u8 *ttl0;
+ u16 rx_csum0;
+ u16 payload_len0;
+ int addr_len;
+
+ bi0 = from[0];
+ b0 = vlib_get_buffer (vm, bi0);
+
+ ip0 = vlib_buffer_get_current (b0);
+
+ if (is_ipv6)
+ {
+ ip6_header_t *ip6 = ip0;
+
+ vrrp0 = (vrrp_header_t *) (ip6 + 1);
+ ttl0 = &ip6->hop_limit;
+ addr_len = 16;
+ payload_len0 = clib_net_to_host_u16 (ip6->payload_length);
+ vlib_buffer_advance (b0, sizeof (*ip6));
+ }
+ else
+ {
+ ip4_header_t *ip4 = ip0;
+
+ vrrp0 = (vrrp_header_t *) (ip4 + 1);
+ ttl0 = &ip4->ttl;
+ addr_len = 4;
+ payload_len0 = clib_net_to_host_u16 (ip4->length) - sizeof(*ip4);
+ vlib_buffer_advance (b0, sizeof (*ip4));
+ }
+
+ next0 = VRRP_INPUT_NEXT_DROP;
+
+ error0 = VRRP_ERROR_RECEIVED;
+
+ /* Validation from RFC 5798 sec 7.1 */
+
+ /* checksum set to 0 for calculation, save original value */
+ rx_csum0 = vrrp0->checksum;
+ vrrp0->checksum = 0;
+
+ /* Mandatory - TTL/hop limit must be 255 */
+ if (*ttl0 != 255)
+ {
+ error0 = VRRP_ERROR_BAD_TTL;
+ goto trace;
+ }
+
+ /* Mandatory - VRRP version must be 3 */
+ if ((vrrp0->vrrp_version_and_type >> 4) != 3)
+ {
+ error0 = VRRP_ERROR_NOT_VERSION_3;
+ goto trace;
+ }
+
+ /* Mandatory - packet must be complete */
+ if (b0->current_length < sizeof (*vrrp0) + vrrp0->n_addrs * addr_len)
+ {
+ error0 = VRRP_ERROR_INCOMPLETE_PKT;
+ goto trace;
+ }
+
+ /* Mandatory - checksum must be correct */
+ if (rx_csum0 != vrrp_adv_csum (ip0, vrrp0, is_ipv6, payload_len0))
+ {
+ error0 = VRRP_ERROR_BAD_CHECKSUM;
+ goto trace;
+ }
+
+ /* Mandatory - VR must be configured on the interface adv received on */
+ if (!(vr0 =
+ vrrp_vr_lookup (vnet_buffer(b0)->sw_if_index[VLIB_RX],
+ vrrp0->vr_id, is_ipv6)))
+ {
+ error0 = VRRP_ERROR_UNKNOWN_VR;
+ goto trace;
+ }
+
+ /* Optional - count of addresses should match configuration */
+ /* Could also check that addresses match, but likely to be O(n^2) */
+ if (vrrp0->n_addrs != vec_len (vr0->config.vr_addrs))
+ {
+ error0 = VRRP_ERROR_ADDR_MISMATCH;
+ goto trace;
+ }
+
+ /* signal main thread to process contents of packet */
+ args0.vr_index = vr0 - vmp->vrs;
+ args0.pkt = vrrp0;
+
+ vl_api_rpc_call_main_thread (vrrp_input_process, (u8 *) &args0,
+ sizeof (args0));
+
+ trace:
+ vrrp0->checksum = rx_csum0; /* restore csum for correct trace output */
+ b0->error = node->errors[error0];
+
+ if (b0->flags & VLIB_BUFFER_IS_TRACED)
+ {
+ vrrp_trace_t *t = vlib_add_trace (vm, node, b0, sizeof (*t));
+
+ t->sw_if_index = vnet_buffer(b0)->sw_if_index[VLIB_RX];
+ t->is_ipv6 = is_ipv6;
+ clib_memcpy_fast (&t->vrrp, vrrp0, sizeof (*vrrp0));
+ clib_memcpy_fast (t->addrs, (void *) (vrrp0 + 1),
+ vrrp0->n_addrs * (is_ipv6 ? 16 : 4));
+ }
+
+ /* always drop, never forward or reply here */
+ vlib_set_next_frame_buffer (vm, node, next0, bi0);
+
+ from += 1;
+ n_left_from -= 1;
+ }
+
+ return frame->n_vectors;
+}
+
+VLIB_NODE_FN (vrrp4_input_node) (vlib_main_t * vm, vlib_node_runtime_t * node,
+ vlib_frame_t * frame)
+{
+ return vrrp_input_inline (vm, node, frame, 0);
+}
+
+/* *INDENT-OFF* */
+VLIB_REGISTER_NODE (vrrp4_input_node) =
+{
+ .name = "vrrp4-input",
+ .vector_size = sizeof (u32),
+ .format_trace = format_vrrp_trace,
+ .type = VLIB_NODE_TYPE_INTERNAL,
+
+ .n_errors = ARRAY_LEN(vrrp_error_strings),
+ .error_strings = vrrp_error_strings,
+
+ .n_next_nodes = VRRP_INPUT_N_NEXT,
+
+ .next_nodes = {
+ [VRRP_INPUT_NEXT_DROP] = "error-drop",
+ },
+};
+
+VLIB_NODE_FN (vrrp6_input_node) (vlib_main_t * vm, vlib_node_runtime_t * node,
+ vlib_frame_t * frame)
+{
+ return vrrp_input_inline (vm, node, frame, 1);
+}
+
+VLIB_REGISTER_NODE (vrrp6_input_node) =
+{
+ .name = "vrrp6-input",
+ .vector_size = sizeof (u32),
+ .format_trace = format_vrrp_trace,
+ .type = VLIB_NODE_TYPE_INTERNAL,
+
+ .n_errors = ARRAY_LEN(vrrp_error_strings),
+ .error_strings = vrrp_error_strings,
+
+ .n_next_nodes = VRRP_INPUT_N_NEXT,
+
+ .next_nodes = {
+ [VRRP_INPUT_NEXT_DROP] = "error-drop",
+ },
+};
+
+static clib_error_t *
+vrrp_input_init (vlib_main_t *vm)
+{
+ clib_error_t *error;
+
+ if ((error = vlib_call_init_function (vm, vrrp_init)))
+ return error;
+
+ ip4_register_protocol (IP_PROTOCOL_VRRP, vrrp4_input_node.index);
+ ip6_register_protocol (IP_PROTOCOL_VRRP, vrrp6_input_node.index);
+
+ return 0;
+}
+
+VLIB_INIT_FUNCTION (vrrp_input_init);
+
+/* *INDENT-ON* */
+
+/*
+ * fd.io coding-style-patch-verification: ON
+ *
+ * Local Variables:
+ * eval: (c-set-style "gnu")
+ * End:
+ */