/* $NetBSD: radix.h,v 1.23 2016/11/15 01:50:06 ozaki-r Exp $ */
/*
* Copyright (c) 1988, 1989, 1993
* The Regents of the University of California. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. Neither the name of the University nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* @(#)radix.h 8.2 (Berkeley) 10/31/94
*/
#ifndef _NET_RADIX_H_
#define _NET_RADIX_H_
#include <vlib/vlib.h>
/*
* Radix search tree node layout.
*/
struct radix_node {
struct radix_mask *rn_mklist; /* list of masks contained in subtree */
struct radix_node *rn_p; /* parent */
i16 rn_b; /* bit offset; -1-index(netmask) */
u8 rn_bmask; /* node: mask for bit test*/
u8 rn_flags; /* enumerated next */
#define RNF_NORMAL 1 /* leaf contains normal route */
#define RNF_ROOT 2 /* leaf is root leaf for tree */
#define RNF_ACTIVE 4 /* This node is alive (for rtfree) */
union {
struct { /* leaf only data: */
const char *rn_Key; /* object of search */
const char *rn_Mask; /* netmask, if present */
struct radix_node *rn_Dupedkey;
} rn_leaf;
struct { /* node only data: */
int rn_Off; /* where to start compare */
struct radix_node *rn_L;/* progeny */
struct radix_node *rn_R;/* progeny */
} rn_node;
} rn_u;
#ifdef RN_DEBUG
i32 rn_info;
struct radix_node *rn_twin;
struct radix_node *rn_ybro;
#endif
};
#define rn_dupedkey rn_u.rn_leaf.rn_Dupedkey
#define rn_key rn_u.rn_leaf.rn_Key
#define rn_mask rn_u.rn_leaf.rn_Mask
#define rn_off rn_u.rn_node.rn_Off
#define rn_l rn_u.rn_node.rn_L
#define rn_r rn_u.rn_node.rn_R
/*
* Annotations to tree concerning potential routes applying to subtrees.
*/
struct radix_mask {
i16 rm_b; /* bit offset; -1-index(netmask) */
i8 rm_unused; /* cf. rn_bmask */
u8 rm_flags; /* cf. rn_flags */
struct radix_mask *rm_mklist; /* more masks to try */
union {
const char *rmu_mask; /* the mask */
struct radix_node *rmu_leaf; /* for normal routes */
} rm_rmu;
i32 rm_refs; /* # of references to this struct */
};
#define rm_mask rm_rmu.rmu_mask
#define rm_leaf rm_rmu.rmu_leaf /* extra field would make 32 bytes */
struct radix_node_head {
struct radix_node *rnh_treetop;
i32 rnh_addrsize; /* permit, but not require fixed keys */
i32 rnh_pktsize; /* permit, but not require fixed keys */
struct radix_node *(*rnh_addaddr) /* add based on sockaddr */
(const void *v, const void *mask,
struct radix_node_head *head, struct radix_node nodes[]);
struct radix_node *(*rnh_addpkt) /* add based on packet hdr */
(const void *v, const void *mask,
struct radix_node_head *head, struct radix_node nodes[]);
struct radix_node *(*rnh_deladdr) /* remove based on sockaddr */
(const void *v, const void *mask, struct radix_node_head *head);
struct radix_node *(*rnh_delpkt) /* remove based on packet hdr */
(const void *v, const void *mask, struct radix_node_head *head);
struct radix_node *(*rnh_matchaddr) /* locate based on sockaddr */
(const void *v, struct radix_node_head *head);
struct radix_node *(*rnh_lookup) /* locate based on sockaddr */
(const void *v, const void *mask, struct radix_node_head *head);
struct radix_node *(*rnh_matchpkt) /* locate based on packet hdr */
(const void *v, struct radix_node_head *head);
struct radix_node rnh_nodes[3]; /* empty tree for common case */
};
void rn_init(void);
int rn_inithead(void **, int);
void rn_delayedinit(void **, int);
int rn_inithead0(struct radix_node_head *, int);
int rn_refines(const void *, const void *);
int rn_walktree(struct radix_node_head *,
int (*)(struct radix_node *, void *),
void *);
struct radix_node *
rn_search_matched(struct radix_node_head *,
int (*)(struct radix_node *, void *),
void *);
struct radix_node
*rn_addmask(const void *, int, int),
*rn_addroute(const void *, const void *, struct radix_node_head *,
struct radix_node [2]),
*rn_delete1(const void *, const void *, struct radix_node_head *,
struct radix_node *),
*rn_delete(const void *, const void *, struct radix_node_head *),
*rn_insert(const void *, struct radix_node_head *, int *,
struct radix_node [2]),
*rn_lookup(const void *, const void *, struct radix_node_head *),
*rn_match(const void *, struct radix_node_head *),
*rn_newpair(const void *, int, struct radix_node[2]),
*.highlight .hll { background-color: #ffffcc }
.highlight .c { color: #888888 } /* Comment */
.highlight .err { color: #a61717; background-color: #e3d2d2 } /* Error */
.highlight .k { color: #008800; font-weight: bold } /* Keyword */
.highlight .ch { color: #888888 } /* Comment.Hashbang */
.highlight .cm { color: #888888 } /* Comment.Multiline */
.highlight .cp { color: #cc0000; font-weight: bold } /* Comment.Preproc */
.highlight .cpf { color: #888888 } /* Comment.PreprocFile */
.highlight .c1 { color: #888888 } /* Comment.Single */
.highlight .cs { color: #cc0000; font-weight: bold; background-color: #fff0f0 } /* Comment.Special */
.highlight .gd { color: #000000; background-color: #ffdddd } /* Generic.Deleted */
.highlight .ge { font-style: italic } /* Generic.Emph */
.highlight .gr { color: #aa0000 } /* Generic.Error */
.highlight .gh { color: #333333 } /* Generic.Heading */
.highlight .gi { color: #000000; background-color: #ddffdd } /* Generic.Inserted */
.highlight .go { color: #888888 } /* Generic.Output */
.highlight .gp { color: #555555 } /* Generic.Prompt */
.highlight .gs { font-weight: bold } /* Generic.Strong */
.highlight .gu { color: #666666 } /* Generic.Subheading */
.highlight .gt { color: #aa0000 } /* Generic.Traceback */
.highlight .kc { color: #008800; font-weight: bold } /* Keyword.Constant */
.highlight .kd { color: #008800; font-weight: bold } /* Keyword.Declaration */
.highlight .kn { color: #008800; font-weight: bold } /* Keyword.Namespace */
.highlight .kp { color: #008800 } /* Keyword.Pseudo */
.highlight .kr { color: #008800; font-weight: bold } /* Keyword.Reserved */
.highlight .kt { color: #888888; font-weight: bold } /* Keyword.Type */
.highlight .m { color: #0000DD; font-weight: bold } /* Literal.Number */
.highlight .s { color: #dd2200; background-color: #fff0f0 } /* Literal.String */
.highlight .na { color: #336699 } /* Name.Attribute */
.highlight .nb { color: #003388 } /* Name.Builtin */
.highlight .nc { color: #bb0066; font-weight: bold } /* Name.Class */
.highlight .no { color: #003366; font-weight: bold } /* Name.Constant */
.highlight .nd { color: #555555 } /* Name.Decorator */
.highlight .ne { color: #bb0066; font-weight: bold } /* Name.Exception */
.highlight .nf { color: #0066bb; font-weight: bold } /* Name.Function */
.highlight .nl { color: #336699; font-style: italic } /* Name.Label */
.highlight .nn { color: #bb0066; font-weight: bold } /* Name.Namespace */
.highlight .py { color: #336699; font-weight: bold } /* Name.Property */
.highlight .nt { color: #bb0066; font-weight: bold } /* Name.Tag */
.highlight .nv { color: #336699 } /* Name.Variable */
.highlight .ow { color: #008800 } /* Operator.Word */
.highlight .w { color: #bbbbbb } /* Text.Whitespace */
.highlight .mb { color: #0000DD; font-weight: bold } /* Literal.Number.Bin */
.highlight .mf { color: #0000DD; font-weight: bold } /* Literal.Number.Float */
.highlight .mh { color: #0000DD; font-weight: bold } /* Literal.Number.Hex */
.highlight .mi { color: #0000DD; font-weight: bold } /* Literal.Number.Integer */
.highlight .mo { color: #0000DD; font-weight: bold } /* Literal.Number.Oct */
.highlight .sa { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Affix */
.highlight .sb { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Backtick */
.highlight .sc { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Char */
.highlight .dl { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Delimiter */
.highlight .sd { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Doc */
.highlight .s2 { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Double */
.highlight .se { color: #0044dd; background-color: #fff0f0 } /* Literal.String.Escape */
.highlight .sh { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Heredoc */
.highlight .si { color: #3333bb; background-color: #fff0f0 } /* Literal.String.Interpol */
.highlight .sx { color: #22bb22; background-color: #f0fff0 } /* Literal.String.Other */
.highlight .sr { color: #008800; background-color: #fff0ff } /* Literal.String.Regex */
.highlight .s1 { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Single */
.highlight .ss { color: #aa6600; background-color: #fff0f0 } /* Literal.String.Symbol */
.highlight .bp { color: #003388 } /* Name.Builtin.Pseudo */
.highlight .fm { color: #0066bb; font-weight: bold } /* Name.Function.Magic */
.highlight .vc { color: #336699 } /* Name.Variable.Class */
.highlight .vg { color: #dd7700 } /* Name.Variable.Global */
.highlight .vi { color: #3333bb } /* Name.Variable.Instance */
.highlight .vm { color: #336699 } /* Name.Variable.Magic */
.highlight .il { color: #0000DD; font-weight: bold } /* Literal.Number.Integer.Long *//*
* gre.c: gre
*
* Copyright (c) 2012 Cisco and/or its affiliates.
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at:
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <vnet/vnet.h>
#include <vnet/gre/gre.h>
#include <vnet/adj/adj_midchain.h>
#include <vnet/tunnel/tunnel_dp.h>
extern gre_main_t gre_main;
#ifndef CLIB_MARCH_VARIANT
gre_main_t gre_main;
typedef struct
{
union
{
ip4_and_gre_header_t ip4_and_gre;
u64 as_u64[3];
};
} ip4_and_gre_union_t;
typedef struct
{
union
{
ip6_and_gre_header_t ip6_and_gre;
u64 as_u64[3];
};
} ip6_and_gre_union_t;
#endif /* CLIB_MARCH_VARIANT */
/* Packet trace structure */
typedef struct
{
/* Tunnel-id / index in tunnel vector */
u32 tunnel_id;
/* pkt length */
u32 length;
/* tunnel ip addresses */
ip46_address_t src;
ip46_address_t dst;
} gre_tx_trace_t;
extern u8 *format_gre_tx_trace (u8 * s, va_list * args);
#ifndef CLIB_MARCH_VARIANT
u8 *
format_gre_tx_trace (u8 * s, va_list * args)
{
CLIB_UNUSED (vlib_main_t * vm) = va_arg (*args, vlib_main_t *);
CLIB_UNUSED (vlib_node_t * node) = va_arg (*args, vlib_node_t *);
gre_tx_trace_t *t = va_arg (*args, gre_tx_trace_t *);
s = format (s, "GRE: tunnel %d len %d src %U dst %U",
t->tunnel_id, t->length,
format_ip46_address, &t->src, IP46_TYPE_ANY,
format_ip46_address, &t->dst, IP46_TYPE_ANY);
return s;
}
u8 *
format_gre_protocol (u8 * s, va_list * args)
{
gre_protocol_t p = va_arg (*args, u32);
gre_main_t *gm = &gre_main;
gre_protocol_info_t *pi = gre_get_protocol_info (gm, p);
if (pi)
s = format (s, "%s", pi->name);
else
s = format (s, "0x%04x", p);
return s;
}
u8 *
format_gre_header_with_length (u8 * s, va_list * args)
{
gre_main_t *gm = &gre_main;
gre_header_t *h = va_arg (*args, gre_header_t *);
u32 max_header_bytes = va_arg (*args, u32);
gre_protocol_t p = clib_net_to_host_u16 (h->protocol);
u32 indent, header_bytes;
header_bytes = sizeof (h[0]);
if (max_header_bytes != 0 && header_bytes > max_header_bytes)
return format (s, "gre header truncated");
indent = format_get_indent (s);
s = format (s, "GRE %U", format_gre_protocol, p);
if (max_header_bytes != 0 && header_bytes < max_header_bytes)
{
gre_protocol_info_t *pi = gre_get_protocol_info (gm, p);
vlib_node_t *node = vlib_get_node (gm->vlib_main, pi->node_index);
if (node->format_buffer)
s = format (s, "\n%U%U",
format_white_space, indent,
node->format_buffer, (void *) (h + 1),
max_header_bytes - header_bytes);
}
return s;
}
u8 *
format_gre_header (u8 * s, va_list * args)
{
gre_header_t *h = va_arg (*args, gre_header_t *);
return format (s, "%U", format_gre_header_with_length, h, 0);
}
/* Returns gre protocol as an int in host byte order. */
uword
unformat_gre_protocol_host_byte_order (unformat_input_t * input,
va_list * args)
{
u16 *result = va_arg (*args, u16 *);
gre_main_t *gm = &gre_main;
int i;
/* Named type. */
if (unformat_user (input, unformat_vlib_number_by_name,
gm->protocol_info_by_name, &i))
{
gre_protocol_info_t *pi = vec_elt_at_index (gm->protocol_infos, i);
*result = pi->protocol;
return 1;
}
return 0;
}
uword
unformat_gre_protocol_net_byte_order (unformat_input_t * input,
va_list * args)
{
u16 *result = va_arg (*args, u16 *);
if (!unformat_user (input, unformat_gre_protocol_host_byte_order, result))
return 0;
*result = clib_host_to_net_u16 ((u16) * result);
return 1;
}
uword
unformat_gre_header (unformat_input_t * input, va_list * args)
{
u8 **result = va_arg (*args, u8 **);
gre_header_t _h, *h = &_h;
u16 p;
if (!unformat (input, "%U", unformat_gre_protocol_host_byte_order, &p))
return 0;
h->protocol = clib_host_to_net_u16 (p);
/* Add header to result. */
{
void *p;
u32 n_bytes = sizeof (h[0]);
vec_add2 (*result, p, n_bytes);
clib_memcpy (p, h, n_bytes);
}
return 1;
}
static int
gre_proto_from_vnet_link (vnet_link_t link)
{
switch (link)
{
case VNET_LINK_IP4:
return (GRE_PROTOCOL_ip4);
case VNET_LINK_IP6:
return (GRE_PROTOCOL_ip6);
case VNET_LINK_MPLS:
return (GRE_PROTOCOL_mpls_unicast);
case VNET_LINK_ETHERNET:
return (GRE_PROTOCOL_teb);
case VNET_LINK_ARP:
return (GRE_PROTOCOL_arp);
case VNET_LINK_NSH:
ASSERT (0);
break;
}
ASSERT (0);
return (GRE_PROTOCOL_ip4);
}
static u8 *
gre_build_rewrite (vnet_main_t * vnm,
u32 sw_if_index,
vnet_link_t link_type, const void *dst_address)
{
gre_main_t *gm = &gre_main;
const ip46_address_t *dst;
ip4_and_gre_header_t *h4;
ip6_and_gre_header_t *h6;
gre_header_t *gre;
u8 *rewrite = NULL;
gre_tunnel_t *t;
u32 ti;
u8 is_ipv6;
dst = dst_address;
ti = gm->tunnel_index_by_sw_if_index[sw_if_index];
if (~0 == ti)
/* not one of ours */
return (0);
t = pool_elt_at_index (gm->tunnels, ti);
is_ipv6 = t->tunnel_dst.fp_proto == FIB_PROTOCOL_IP6 ? 1 : 0;
if (!is_ipv6)
{
vec_validate (rewrite, sizeof (*h4) - 1);
h4 = (ip4_and_gre_header_t *) rewrite;
gre = &h4->gre;
h4->ip4.ip_version_and_header_length = 0x45;
h4->ip4.ttl = 254;
h4->ip4.protocol = IP_PROTOCOL_GRE;
/* fixup ip4 header length and checksum after-the-fact */
h4->ip4.src_address.as_u32 = t->tunnel_src.ip4.as_u32;
h4->ip4.dst_address.as_u32 = dst->ip4.as_u32;
h4->ip4.checksum = ip4_header_checksum (&h4->ip4);
}
else
{
vec_validate (rewrite, sizeof (*h6) - 1);
h6 = (ip6_and_gre_header_t *) rewrite;
gre = &h6->gre;
h6->ip6.ip_version_traffic_class_and_flow_label =
clib_host_to_net_u32 (6 << 28);
h6->ip6.hop_limit = 255;
h6->ip6.protocol = IP_PROTOCOL_GRE;
/* fixup ip6 header length and checksum after-the-fact */
h6->ip6.src_address.as_u64[0] = t->tunnel_src.ip6.as_u64[0];
h6->ip6.src_address.as_u64[1] = t->tunnel_src.ip6.as_u64[1];
h6->ip6.dst_address.as_u64[0] = dst->ip6.as_u64[0];
h6->ip6.dst_address.as_u64[1] = dst->ip6.as_u64[1];
}
if (PREDICT_FALSE (t->type == GRE_TUNNEL_TYPE_ERSPAN))
{
gre->protocol = clib_host_to_net_u16 (GRE_PROTOCOL_erspan);
gre->flags_and_version = clib_host_to_net_u16 (GRE_FLAGS_SEQUENCE);
}
else
gre->protocol =
clib_host_to_net_u16 (gre_proto_from_vnet_link (link_type));
return (rewrite);
}
static void
gre44_fixup (vlib_main_t * vm,
const ip_adjacency_t * adj, vlib_buffer_t * b0, const void *data)
{
tunnel_encap_decap_flags_t flags;
ip4_and_gre_header_t *ip0;
ip0 = vlib_buffer_get_current (b0);
flags = pointer_to_uword (data);
/* Fixup the checksum and len fields in the GRE tunnel encap
* that was applied at the midchain node */
ip0->ip4.length =
clib_host_to_net_u16 (vlib_buffer_length_in_chain (vm, b0));
tunnel_encap_fixup_4o4 (flags, (ip4_header_t *) (ip0 + 1), &ip0->ip4);
ip0->ip4.checksum = ip4_header_checksum (&ip0->ip4);
}
static void
gre64_fixup (vlib_main_t * vm,
const ip_adjacency_t * adj, vlib_buffer_t * b0, const void *data)
{
tunnel_encap_decap_flags_t flags;
ip4_and_gre_header_t *ip0;
ip0 = vlib_buffer_get_current (b0);
flags = pointer_to_uword (data);
/* Fixup the checksum and len fields in the GRE tunnel encap
* that was applied at the midchain node */
ip0->ip4.length =
clib_host_to_net_u16 (vlib_buffer_length_in_chain (vm, b0));
tunnel_encap_fixup_6o4 (flags, (ip6_header_t *) (ip0 + 1), &ip0->ip4);
ip0->ip4.checksum = ip4_header_checksum (&ip0->ip4);
}
static void
grex4_fixup (vlib_main_t * vm,
const ip_adjacency_t * adj, vlib_buffer_t * b0, const void *data)
{
ip4_header_t *ip0;
ip0 = vlib_buffer_get_current (b0);
/* Fixup the checksum and len fields in the GRE tunnel encap
* that was applied at the midchain node */
ip0->length = clib_host_to_net_u16 (vlib_buffer_length_in_chain (vm, b0));
ip0->checksum = ip4_header_checksum (ip0);
}
static void
gre46_fixup (vlib_main_t * vm,
const ip_adjacency_t * adj, vlib_buffer_t * b0, const void *data)
{
tunnel_encap_decap_flags_t flags;
ip6_and_gre_header_t *ip0;
ip0 = vlib_buffer_get_current (b0);
flags = pointer_to_uword (data);
/* Fixup the payload length field in the GRE tunnel encap that was applied
* at the midchain node */
ip0->ip6.payload_length =
clib_host_to_net_u16 (vlib_buffer_length_in_chain (vm, b0) -
sizeof (ip0->ip6));
tunnel_encap_fixup_4o6 (flags, b0, (ip4_header_t *) (ip0 + 1), &ip0->ip6);
}
static void
gre66_fixup (vlib_main_t * vm,
const ip_adjacency_t * adj, vlib_buffer_t * b0, const void *data)
{
tunnel_encap_decap_flags_t flags;
ip6_and_gre_header_t *ip0;
ip0 = vlib_buffer_get_current (b0);
flags = pointer_to_uword (data);
/* Fixup the payload length field in the GRE tunnel encap that was applied
* at the midchain node */
ip0->ip6.payload_length =
clib_host_to_net_u16 (vlib_buffer_length_in_chain (vm, b0) -
sizeof (ip0->ip6));
tunnel_encap_fixup_6o6 (flags, (ip6_header_t *) (ip0 + 1), &ip0->ip6);
}
static void
grex6_fixup (vlib_main_t * vm,
const ip_adjacency_t * adj, vlib_buffer_t * b0, const void *data)
{
ip6_and_gre_header_t *ip0;
ip0 = vlib_buffer_get_current (b0);
/* Fixup the payload length field in the GRE tunnel encap that was applied
* at the midchain node */
ip0->ip6.payload_length =
clib_host_to_net_u16 (vlib_buffer_length_in_chain (vm, b0) -
sizeof (ip0->ip6));
}
/**
* return the appropriate fixup function given the overlay (link-type) and
* underlay (fproto) combination
*/
static adj_midchain_fixup_t
gre_get_fixup (fib_protocol_t fproto, vnet_link_t lt)
{
if (fproto == FIB_PROTOCOL_IP6 && lt == VNET_LINK_IP6)
return (gre66_fixup);
if (fproto == FIB_PROTOCOL_IP6 && lt == VNET_LINK_IP4)
return (gre46_fixup);
if (fproto == FIB_PROTOCOL_IP4 && lt == VNET_LINK_IP6)
return (gre64_fixup);
if (fproto == FIB_PROTOCOL_IP4 && lt == VNET_LINK_IP4)
return (gre44_fixup);
if (fproto == FIB_PROTOCOL_IP6)
return (grex6_fixup);
if (fproto == FIB_PROTOCOL_IP4)
return (grex4_fixup);
ASSERT (0);
return (gre44_fixup);
}
void
gre_update_adj (vnet_main_t * vnm, u32 sw_if_index, adj_index_t ai)
{
gre_main_t *gm = &gre_main;
gre_tunnel_t *t;
adj_flags_t af;
u32 ti;
ti = gm->tunnel_index_by_sw_if_index[sw_if_index];
t = pool_elt_at_index (gm->tunnels, ti);
af = ADJ_FLAG_NONE;
/*
* the user has not requested that the load-balancing be based on
* a flow hash of the inner packet. so use the stacking to choose
* a path.
*/
if (!(t->flags & TUNNEL_ENCAP_DECAP_FLAG_ENCAP_INNER_HASH))
af |= ADJ_FLAG_MIDCHAIN_IP_STACK;
adj_nbr_midchain_update_rewrite
(ai, gre_get_fixup (t->tunnel_dst.fp_proto,
adj_get_link_type (ai)),
uword_to_pointer (t->flags, void *), af,
gre_build_rewrite (vnm, sw_if_index, adj_get_link_type (ai),
&t->tunnel_dst.fp_addr));
gre_tunnel_stack (ai);
}
adj_walk_rc_t
mgre_mk_complete_walk (adj_index_t ai, void *data)
{
mgre_walk_ctx_t *ctx = data;
adj_flags_t af;
af = ADJ_FLAG_NONE;
/*
* the user has not requested that the load-balancing be based on
* a flow hash of the inner packet. so use the stacking to choose
* a path.
*/
if (!(ctx->t->flags & TUNNEL_ENCAP_DECAP_FLAG_ENCAP_INNER_HASH))
af |= ADJ_FLAG_MIDCHAIN_IP_STACK;
adj_nbr_midchain_update_rewrite
(ai, gre_get_fixup (ctx->t->tunnel_dst.fp_proto,
adj_get_link_type (ai)),
uword_to_pointer (ctx->t->flags, void *),
af,
gre_build_rewrite (vnet_get_main (),
ctx->t->sw_if_index,
adj_get_link_type (ai),
&teib_entry_get_nh (ctx->ne)->fp_addr));
teib_entry_adj_stack (ctx->ne, ai);
return (ADJ_WALK_RC_CONTINUE);
}
adj_walk_rc_t
mgre_mk_incomplete_walk (adj_index_t ai, void *data)
{
gre_tunnel_t *t = data;
adj_nbr_midchain_update_rewrite (ai, gre_get_fixup (t->tunnel_dst.fp_proto,
adj_get_link_type (ai)),
NULL, ADJ_FLAG_NONE, NULL);
adj_midchain_delegate_unstack (ai);
return (ADJ_WALK_RC_CONTINUE);
}
void
mgre_update_adj (vnet_main_t * vnm, u32 sw_if_index, adj_index_t ai)
{
gre_main_t *gm = &gre_main;
ip_adjacency_t *adj;
teib_entry_t *ne;
gre_tunnel_t *t;
u32 ti;
adj = adj_get (ai);
ti = gm->tunnel_index_by_sw_if_index[sw_if_index];
t = pool_elt_at_index (gm->tunnels, ti);
ne = teib_entry_find_46 (sw_if_index,
adj->ia_nh_proto, &adj->sub_type.nbr.next_hop);
if (NULL == ne)
{
// no TEIB entry to provide the next-hop
adj_nbr_midchain_update_rewrite (
ai, gre_get_fixup (t->tunnel_dst.fp_proto, adj_get_link_type (ai)),
uword_to_pointer (t->flags, void *), ADJ_FLAG_NONE, NULL);
return;
}
mgre_walk_ctx_t ctx = {
.t = t,
.ne = ne
};
adj_nbr_walk_nh (sw_if_index,
adj->ia_nh_proto,
&adj->sub_type.nbr.next_hop, mgre_mk_complete_walk, &ctx);
}
#endif /* CLIB_MARCH_VARIANT */
typedef enum
{
GRE_ENCAP_NEXT_L2_MIDCHAIN,
GRE_ENCAP_N_NEXT,
} gre_encap_next_t;
/**
* @brief TX function. Only called for L2 payload including TEB or ERSPAN.
* L3 traffic uses the adj-midchains.
*/
static_always_inline u32
gre_encap_inline (vlib_main_t * vm,
vlib_node_runtime_t * node,
vlib_frame_t * frame, gre_tunnel_type_t type)
{
gre_main_t *gm = &gre_main;
u32 *from, n_left_from;
vlib_buffer_t *bufs[VLIB_FRAME_SIZE], **b = bufs;
u32 sw_if_index[2] = { ~0, ~0 };
const gre_tunnel_t *gt[2] = { 0 };
adj_index_t adj_index[2] = { ADJ_INDEX_INVALID, ADJ_INDEX_INVALID };
from = vlib_frame_vector_args (frame);
n_left_from = frame->n_vectors;
vlib_get_buffers (vm, from, bufs, n_left_from);
while (n_left_from >= 2)
{
if (PREDICT_FALSE
(sw_if_index[0] != vnet_buffer (b[0])->sw_if_index[VLIB_TX]))
{
const vnet_hw_interface_t *hi;
sw_if_index[0] = vnet_buffer (b[0])->sw_if_index[VLIB_TX];
hi = vnet_get_sup_hw_interface (gm->vnet_main, sw_if_index[0]);
gt[0] = &gm->tunnels[hi->dev_instance];
adj_index[0] = gt[0]->l2_adj_index;
}
if (PREDICT_FALSE
(sw_if_index[1] != vnet_buffer (b[1])->sw_if_index[VLIB_TX]))
{
const vnet_hw_interface_t *hi;
sw_if_index[1] = vnet_buffer (b[1])->sw_if_index[VLIB_TX];
hi = vnet_get_sup_hw_interface (gm->vnet_main, sw_if_index[1]);
gt[1] = &gm->tunnels[hi->dev_instance];
adj_index[1] = gt[1]->l2_adj_index;
}
vnet_buffer (b[0])->ip.adj_index[VLIB_TX] = adj_index[0];
vnet_buffer (b[1])->ip.adj_index[VLIB_TX] = adj_index[1];
if (type == GRE_TUNNEL_TYPE_ERSPAN)
{
/* Encap GRE seq# and ERSPAN type II header */
erspan_t2_t *h0;
u32 seq_num;
u64 hdr;
vlib_buffer_advance (b[0], -sizeof (erspan_t2_t));
h0 = vlib_buffer_get_current (b[0]);
seq_num = clib_atomic_fetch_add (>[0]->gre_sn->seq_num, 1);
hdr = clib_host_to_net_u64 (ERSPAN_HDR2);
h0->seq_num = clib_host_to_net_u32 (seq_num);
h0->t2_u64 = hdr;
h0->t2.cos_en_t_session |= clib_host_to_net_u16 (gt[0]->session_id);
}
if (type == GRE_TUNNEL_TYPE_ERSPAN)
{
/* Encap GRE seq# and ERSPAN type II header */
erspan_t2_t *h0;
u32 seq_num;
u64 hdr;
vlib_buffer_advance (b[1], -sizeof (erspan_t2_t));
h0 = vlib_buffer_get_current (b[1]);
seq_num = clib_atomic_fetch_add (>[1]->gre_sn->seq_num, 1);
hdr = clib_host_to_net_u64 (ERSPAN_HDR2);
h0->seq_num = clib_host_to_net_u32 (seq_num);
h0->t2_u64 = hdr;
h0->t2.cos_en_t_session |= clib_host_to_net_u16 (gt[1]->session_id);
}
if (PREDICT_FALSE (b[0]->flags & VLIB_BUFFER_IS_TRACED))
{
gre_tx_trace_t *tr = vlib_add_trace (vm, node,
b[0], sizeof (*tr));
tr->tunnel_id = gt[0] - gm->tunnels;
tr->src = gt[0]->tunnel_src;
tr->dst = gt[0]->tunnel_dst.fp_addr;
tr->length = vlib_buffer_length_in_chain (vm, b[0]);
}
if (PREDICT_FALSE (b[1]->flags & VLIB_BUFFER_IS_TRACED))
{
gre_tx_trace_t *tr = vlib_add_trace (vm, node,
b[1], sizeof (*tr));
tr->tunnel_id = gt[1] - gm->tunnels;
tr->src = gt[1]->tunnel_src;
tr->dst = gt[1]->tunnel_dst.fp_addr;
tr->length = vlib_buffer_length_in_chain (vm, b[1]);
}
b += 2;
n_left_from -= 2;
}
while (n_left_from >= 1)
{
if (PREDICT_FALSE
(sw_if_index[0] != vnet_buffer (b[0])->sw_if_index[VLIB_TX]))
{
const vnet_hw_interface_t *hi;
sw_if_index[0] = vnet_buffer (b[0])->sw_if_index[VLIB_TX];
hi = vnet_get_sup_hw_interface (gm->vnet_main, sw_if_index[0]);
gt[0] = &gm->tunnels[hi->dev_instance];
adj_index[0] = gt[0]->l2_adj_index;
}
vnet_buffer (b[0])->ip.adj_index[VLIB_TX] = adj_index[0];
if (type == GRE_TUNNEL_TYPE_ERSPAN)
{
/* Encap GRE seq# and ERSPAN type II header */
erspan_t2_t *h0;
u32 seq_num;
u64 hdr;
ASSERT (gt[0]->type == GRE_TUNNEL_TYPE_ERSPAN);
vlib_buffer_advance (b[0], -sizeof (erspan_t2_t));
h0 = vlib_buffer_get_current (b[0]);
seq_num = clib_atomic_fetch_add (>[0]->gre_sn->seq_num, 1);
hdr = clib_host_to_net_u64 (ERSPAN_HDR2);
h0->seq_num = clib_host_to_net_u32 (seq_num);
h0->t2_u64 = hdr;
h0->t2.cos_en_t_session |= clib_host_to_net_u16 (gt[0]->session_id);
}
if (PREDICT_FALSE (b[0]->flags & VLIB_BUFFER_IS_TRACED))
{
gre_tx_trace_t *tr = vlib_add_trace (vm, node,
b[0], sizeof (*tr));
tr->tunnel_id = gt[0] - gm->tunnels;
tr->src = gt[0]->tunnel_src;
tr->dst = gt[0]->tunnel_dst.fp_addr;
tr->length = vlib_buffer_length_in_chain (vm, b[0]);
}
b += 1;
n_left_from -= 1;
}
vlib_buffer_enqueue_to_single_next (vm, node, from,
GRE_ENCAP_NEXT_L2_MIDCHAIN,
frame->n_vectors);
vlib_node_increment_counter (vm, node->node_index,
GRE_ERROR_PKTS_ENCAP, frame->n_vectors);
return frame->n_vectors;
}
static char *gre_error_strings[] = {
#define gre_error(n,s) s,
#include "error.def"
#undef gre_error
};
VLIB_NODE_FN (gre_teb_encap_node) (vlib_main_t * vm,
vlib_node_runtime_t * node,
vlib_frame_t * frame)
{
return (gre_encap_inline (vm, node, frame, GRE_TUNNEL_TYPE_TEB));
}
VLIB_NODE_FN (gre_erspan_encap_node) (vlib_main_t * vm,
vlib_node_runtime_t * node,
vlib_frame_t * frame)
{
return (gre_encap_inline (vm, node, frame, GRE_TUNNEL_TYPE_ERSPAN));
}
/* *INDENT-OFF* */
VLIB_REGISTER_NODE (gre_teb_encap_node) =
{
.name = "gre-teb-encap",
.vector_size = sizeof (u32),
.format_trace = format_gre_tx_trace,
.type = VLIB_NODE_TYPE_INTERNAL,
.n_errors = GRE_N_ERROR,
.error_strings = gre_error_strings,
.n_next_nodes = GRE_ENCAP_N_NEXT,
.next_nodes = {
[GRE_ENCAP_NEXT_L2_MIDCHAIN] = "adj-l2-midchain",
},
};
VLIB_REGISTER_NODE (gre_erspan_encap_node) =
{
.name = "gre-erspan-encap",
.vector_size = sizeof (u32),
.format_trace = format_gre_tx_trace,
.type = VLIB_NODE_TYPE_INTERNAL,
.n_errors = GRE_N_ERROR,
.error_strings = gre_error_strings,
.n_next_nodes = GRE_ENCAP_N_NEXT,
.next_nodes = {
[GRE_ENCAP_NEXT_L2_MIDCHAIN] = "adj-l2-midchain",
},
};
/* *INDENT-ON* */
#ifndef CLIB_MARCH_VARIANT
static u8 *
format_gre_tunnel_name (u8 * s, va_list * args)
{
u32 dev_instance = va_arg (*args, u32);
gre_main_t *gm = &gre_main;
gre_tunnel_t *t;
if (dev_instance >= vec_len (gm->tunnels))
return format (s, "<improperly-referenced>");
t = pool_elt_at_index (gm->tunnels, dev_instance);
return format (s, "gre%d", t->user_instance);
}
static u8 *
format_gre_device (u8 * s, va_list * args)
{
u32 dev_instance = va_arg (*args, u32);
CLIB_UNUSED (int verbose) = va_arg (*args, int);
s = format (s, "GRE tunnel: id %d\n", dev_instance);
return s;
}
static int
gre_tunnel_desc (u32 sw_if_index,
ip46_address_t * src, ip46_address_t * dst, u8 * is_l2)
{
gre_main_t *gm = &gre_main;
gre_tunnel_t *t;
u32 ti;
ti = gm->tunnel_index_by_sw_if_index[sw_if_index];
if (~0 == ti)
/* not one of ours */
return -1;
t = pool_elt_at_index (gm->tunnels, ti);
*src = t->tunnel_src;
*dst = t->tunnel_dst.fp_addr;
*is_l2 = t->type == GRE_TUNNEL_TYPE_TEB;
return (0);
}
/* *INDENT-OFF* */
VNET_DEVICE_CLASS (gre_device_class) = {
.name = "GRE tunnel device",
.format_device_name = format_gre_tunnel_name,
.format_device = format_gre_device,
.format_tx_trace = format_gre_tx_trace,
.admin_up_down_function = gre_interface_admin_up_down,
.ip_tun_desc = gre_tunnel_desc,
#ifdef SOON
.clear counter = 0;
#endif
};
VNET_HW_INTERFACE_CLASS (gre_hw_interface_class) = {
.name = "GRE",
.format_header = format_gre_header_with_length,
.unformat_header = unformat_gre_header,
.build_rewrite = gre_build_rewrite,
.update_adjacency = gre_update_adj,
.flags = VNET_HW_INTERFACE_CLASS_FLAG_P2P,
};
VNET_HW_INTERFACE_CLASS (mgre_hw_interface_class) = {
.name = "mGRE",
.format_header = format_gre_header_with_length,
.unformat_header = unformat_gre_header,
.build_rewrite = gre_build_rewrite,
.update_adjacency = mgre_update_adj,
.flags = VNET_HW_INTERFACE_CLASS_FLAG_NBMA,
};
/* *INDENT-ON* */
#endif /* CLIB_MARCH_VARIANT */
static void
add_protocol (gre_main_t * gm, gre_protocol_t protocol, char *protocol_name)
{
gre_protocol_info_t *pi;
u32 i;
vec_add2 (gm->protocol_infos, pi, 1);
i = pi - gm->protocol_infos;
pi->name = protocol_name;
pi->protocol = protocol;
pi->next_index = pi->node_index = ~0;
hash_set (gm->protocol_info_by_protocol, protocol, i);
hash_set_mem (gm->protocol_info_by_name, pi->name, i);
}
static clib_error_t *
gre_init (vlib_main_t * vm)
{
gre_main_t *gm = &gre_main;
clib_error_t *error;
ip_main_t *im = &ip_main;
ip_protocol_info_t *pi;
clib_memset (gm, 0, sizeof (gm[0]));
gm->vlib_main = vm;
gm->vnet_main = vnet_get_main ();
if ((error = vlib_call_init_function (vm, ip_main_init)))
return error;
if ((error = vlib_call_init_function (vm, ip4_lookup_init)))
return error;
if ((error = vlib_call_init_function (vm, ip6_lookup_init)))
return error;
/* Set up the ip packet generator */
pi = ip_get_protocol_info (im, IP_PROTOCOL_GRE);
pi->format_header = format_gre_header;
pi->unformat_pg_edit = unformat_pg_gre_header;
gm->protocol_info_by_name = hash_create_string (0, sizeof (uword));
gm->protocol_info_by_protocol = hash_create (0, sizeof (uword));
gm->tunnel_by_key4 =
hash_create_mem (0, sizeof (gre_tunnel_key4_t), sizeof (uword));
gm->tunnel_by_key6 =
hash_create_mem (0, sizeof (gre_tunnel_key6_t), sizeof (uword));
gm->seq_num_by_key =
hash_create_mem (0, sizeof (gre_sn_key_t), sizeof (uword));
#define _(n,s) add_protocol (gm, GRE_PROTOCOL_##s, #s);
foreach_gre_protocol
#undef _
return vlib_call_init_function (vm, gre_input_init);
}
VLIB_INIT_FUNCTION (gre_init);
/*
* fd.io coding-style-patch-verification: ON
*
* Local Variables:
* eval: (c-set-style "gnu")
* End:
*/