/* * Copyright (c) 2020 Cisco and/or its affiliates. * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at: * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #ifndef included_ip_vtep_h #define included_ip_vtep_h #include <vppinfra/hash.h> #include <vnet/ip/ip.h> #include <vnet/ip/ip4.h> #include <vnet/ip/ip6.h> /** * @brief Tunnel endpoint key (IPv4) * * Tunnel modules maintain a set of vtep4_key_t-s to track local IP * addresses that have tunnels established. Bypass node consults the * corresponding set to decide whether a packet should bypass normal * processing and go directly to the tunnel protocol handler node. */ /* *INDENT-OFF* */ typedef CLIB_PACKED (struct { union { struct { ip4_address_t addr; u32 fib_index; }; u64 as_u64; }; }) vtep4_key_t; /* *INDENT-ON* */ /** * @brief Tunnel endpoint key (IPv6) * * Tunnel modules maintain a set of vtep6_key_t-s to track local IP * addresses that have tunnels established. Bypass node consults the * corresponding set to decide whether a packet should bypass normal * processing and go directly to the tunnel protocol handler node. */ /* *INDENT-OFF* */ typedef CLIB_PACKED (struct { ip6_address_t addr; u32 fib_index; }) vtep6_key_t; /* *INDENT-ON* */ typedef struct { uword *vtep4; /* local ip4 VTEPs keyed on their ip4 addr + fib_index */ uword *vtep6; /* local ip6 VTEPs keyed on their ip6 addr + fib_index */ } vtep_table_t; always_inline vtep_table_t vtep_table_create () { vtep_table_t t = { }; t.vtep6 = hash_create_mem (0, sizeof (vtep6_key_t), sizeof (uword)); return t; } uword vtep_addr_ref (vtep_table_t * t, u32 fib_index, ip46_address_t * ip); uword vtep_addr_unref (vtep_table_t * t, u32 fib_index, ip46_address_t * ip); always_inline void vtep4_key_init (vtep4_key_t * k4) { k4->as_u64 = ~((u64) 0); } always_inline void vtep6_key_init (vtep6_key_t * k6) { ip6_address_set_zero (&k6->addr); k6->fib_index = (u32) ~ 0; } enum { VTEP_CHECK_FAIL = 0, VTEP_CHECK_PASS = 1, VTEP_CHECK_PASS_UNCHANGED = 2 }; always_inline u8 vtep4_check (vtep_table_t * t, vlib_buffer_t * b0, ip4_header_t * ip40, vtep4_key_t * last_k4) { vtep4_key_t k4; k4.addr.as_u32 = ip40->dst_address.as_u32; k4.fib_index = vlib_buffer_get_ip4_fib_index (b0); if (PREDICT_TRUE (k4.as_u64 == last_k4->as_u64)) return VTEP_CHECK_PASS_UNCHANGED; if (PREDICT_FALSE (!hash_get (t->vtep4, k4.as_u64))) return VTEP_CHECK_FAIL; last_k4->as_u64 = k4.as_u64; return VTEP_CHECK_PASS; } always_inline u8 vtep6_check (vtep_table_t * t, vlib_buffer_t * b0, ip6_header_t * ip60, vtep6_key_t * last_k6) { vtep6_key_t k6; k6.fib_index = vlib_buffer_get_ip6_fib_index (b0); if (PREDICT_TRUE (k6.fib_index == last_k6->fib_index && ip60->dst_address.as_u64[0] == last_k6->addr.as_u64[0] && ip60->dst_address.as_u64[1] == last_k6->addr.as_u64[1])) { return VTEP_CHECK_PASS_UNCHANGED; } k6.addr = ip60->dst_address; if (PREDICT_FALSE (!hash_get_mem (t->vtep6, &k6))) return VTEP_CHECK_FAIL; *last_k6 = k6; return VTEP_CHECK_PASS; } #endif /* included_ip_vtep_h */ /* * fd.io coding-style-patch-verification: ON * * Local Variables: * eval: (c-set-style "gnu") * End: */